This text file is the raw feed for the TSCM-L, dating back to the LISTSERVE move back and 1994, and spanning foward with a large segment of the archive in a single file in order to make it easier to use for your reference in TSCM matters between 1999 and 2006. The earlier 1991-1994 and 1994-1999 LISTSERV archives can only be provided to confirmed U.S Citizens, and the post 2006 posts can be found on Google. In total this part of the archive is almost 35 megabytes, the 1991 to 1999 list serve is a huge amount of source code used to drive TSCM instruments (about 500 MB worth), and I have no idea how large the Google Archive of the post-2006 materials are (it has been rolling for over 12 years). ------------------------------ From: Charles P Date: Tue Jan 2, 2001 10:15pm Subject: Re: Re: Playstation 2 Tomb Raiders ----- Original Message ----- From: To: Sent: Tuesday, January 02, 2001 12:51 PM Subject: [TSCM-L] Re: Playstation 2 > Anyone have ideas as to what Saddam Hussein intends to use the Sony > Playstation 2 for? > > > > > > HAVE A GREAT DAY !!! > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > 2223 From: Date: Tue Jan 2, 2001 10:42pm Subject: ZDNet: News: Is PlayStation2 a military weapon? HAVE A GREAT DAY !!! ---------- http://www.zdnet.com/zdnn/stories/news/0,4586,2550857,00.html [Non-text portions of this message have been removed] 2224 From: Kohlenberg, Toby Date: Tue Jan 2, 2001 10:16am Subject: RE: A lesson in reality... Out of curiousity, what exactly does any portion of this discussion have to do with TSCM? toby Toby Kohlenberg, CISSP Intel Corporate Information Security STAT Team Information Security Specialist 503-264-9783 Office & Voicemail 877-497-1696 Pager "Just because you're paranoid, doesn't mean they're not after you." PGP Fingerprint: 92E2 E2FC BB8B 98CD 88FA 01A1 6E09 B5BA 9E84 9E70 > -----Original Message----- > From: Robert G. Ferrell [mailto:rferrell@r...] > Sent: Tuesday, January 02, 2001 5:18 AM > To: TSCM-L@egroups.com > Subject: Re: [TSCM-L] A lesson in reality... > > > >The toilet paper costs a buck. The 2000 pages of paperwork it > >takes to comply with all the applicable regulations and agencies > >and sanctions and certifications and programs is where the > >difference comes from. > > I've never seen a political discussion between extreme > opposing viewpoints where either side accomplished much of > anything beyond enraging their opponents, so I'm going to > stay far away from the central thrust of this thread. > However, I would like to point out that a great many folks > are putting considerable effort into reducing or eliminating > the need for paperwork when providing services to the U. S. > government. My agency, for example. The National Business > Center is a franchise agency of the U. S. Department of the > Interior that (among other things) develops applications > for paperless bidding, bid notification, invoice tracking, > and payment from Treasury. If you're a potential contractor > for the U.S. government, take a look at > > http://www.nbc.gov/products/procurement.html > > More and more agencies are signing up for this sort of thing > every day. As a franchise agency, I might add, we're required > (eventually) to "pay our own way" without any direct financial > support from Congress. > > As H. L. Mencken once wrote, "The wheels of bureacracy grind > slowly, but exceedingly fine." That doesn't have a lot of > relevance here, but it's still a great quote. > > ;-) > > Cheers, > > RGF > > Robert G. Ferrell, CISSP > Information Systems Security Officer > National Business Center > U. S. Dept. of the Interior > Robert_G_Ferrell@n... > ======================================== > Who goeth without humor goeth unarmed. > ======================================== > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2225 From: Shawn Hughes Date: Wed Jan 3, 2001 0:10am Subject: computers >>> Subject: WORD PERFECT >>> >>> >>> This has got to be one of the funniest I've heard of in a long time. >>> Truthfully, I think this guy should have been promoted, not fired. This >> is a true story from the WordPerfect Helpline which was transcribed from a >>> recording monitoring the customer care department. Needless to say the >>Help Desk employee was fired; however, he/she is currently suing the Word >>Perfect organization for "Termination without Cause." >>> >>> Actual dialogue of a former Word Perfect Customer Support employee (now I >>> know why they record these conversations!) >>> "Ridge Hall computer assistance; may I help you?" >>> "Yes, well, I'm having trouble with WordPerfect." >>> "What sort of trouble?" >>> "Well, I was just typing along, and all of a sudden the words went away." >>> "Went away?" >>> "They disappeared." >>> "Hmm. So what does your screen look like now?" >>> "Nothing." >>> "Nothing?" >>> "It's blank; it won't accept anything when I type." >>> "Are you still in WordPerfect, or did you get out?" >>> "How do I tell?" >>> "Can you see the C: prompt on the screen?" >>> "What's a sea-prompt?" >>> "Never mind, can you move your cursor around the screen?" >>> "There isn't any cursor: I told you, it won't accept anything I type." >>> "Does your monitor have a power indicator?" >>> "What's a monitor? >>> "It's the thing with the screen on it that looks like a TV. >>> "Does it have a little light that tells you when it's on?" >>> "I don't know," >>> "Well, then look on the back of the monitor and find where the power cord >>> goes into it. Can you see that?" >>> "Yes, I think so," >>> "Great. Follow the cord to the plug, and tell me if it's plugged into the >>> wall." >>> "Yes, it is," >>> "When you were behind the monitor, did you notice that there were two >>cables >>> plugged into the back of it, not just one?" "No." >>> >>> "Well, there are. I need you to look back there again and find the other >>> cable." >>> "Okay, here it is," >>> "Follow it for me, and tell me if it's plugged securely into the back of >>> your computer." >>> "I can't reach," >>> "Uh huh. Well, can you see if it is?" >>> "No." >>> "Even if you maybe put your knee on something and lean way over?" "Oh, >>it's >>> not because I don't have the right angle - it's because its dark." >>> >>> "Dark?" >>> "Yes the office light is off, and the only light I have is coming in from >>> the window." >>> "Well, turn on the office light then." >>> "I can't." >>> "No? Why not?" >>> "Because there's a power failure," >>> "A power... A power failure? Aha, Okay, we've got it licked now. Do you >>> still have the boxes and manuals and packing stuff your computer came >in?" >>> "Well, yes, I keep them in the closet." >>> >>> Good. Go get them, and unplug your system and pack it up just like it was >>> when you got it. Then take it back to the store you bought it from." >>> "Really? Is it that bad?" >>> >>> "Yes, I'm afraid it is." >>> "Well, all right then, I suppose. What do I tell them?" >>> "Tell them you're too stupid to own a computer." 2226 From: Larry Hountz - -(©ø©)- Date: Tue Jan 2, 2001 2:37pm Subject: Re: Re: Playstation 2 I thought for the chips... here is some very good feedback.. http://www.zdnet.com/tlkbck/comment/22/0,7056,87627-402464,00.html Larry.. ----- Original Message ----- From: To: Sent: Tuesday, January 02, 2001 12:51 PM Subject: [TSCM-L] Re: Playstation 2 > Anyone have ideas as to what Saddam Hussein intends to use the Sony > Playstation 2 for? > > > > > > HAVE A GREAT DAY !!! > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 2227 From: Date: Wed Jan 3, 2001 4:05am Subject: Is Sony's Playstation2 a Military weapon ? Japan thinks the game machine could be used to guide missiles -- sothe coun= try is leveling export controls.By Reuters UPDATED April 16, 2000 8:21 AM PT= TOKYO -- Japan has slapped export controls on Sony Corp.'s new,hugely popul= ar Playstation2 video game because the machine is sosophisticated it could b= e used for military purposes, media saidSunday. The hit home game machine, w= hich includes a digital video disc playerand will eventually offer Internet = access, is Sony's most profitableproduct. The company said it had shipped 1.= 4 million in the monthafter the game's March 4 launch. Sound off here!! Post= your commenton this story. The console and its eight-megabyte memory card = have been designatedas ``general-purpose products related to conventional we= apons¥¥because they contain components that could be used for militarydevice= s such as missile guidance systems, Kyodo news agency quotedindustry sources= as saying. Playstation2 is the first game console to face export controls u= nderthe Foreign Exchange and Foreign Trade Control Law, Kyodo said. The law = requires the trade ministry's approval for the export ofrestricted products = worth more than 50,000 yen ($472). Thus, theexport of more than two consoles= would be controlled because each ispriced at 39,800 yen. Sony: Competition = allows no compromise``We have mixed feelings because our efforts to produce = a gameconsole of the highest quality have resulted in legalrestrictions,¥¥ t= he Asahi Shimbun newspaper quoted an official ofSony Computer Entertainment = Inc. as saying. ``We could not compromise because of the fierce competition = in theindustry,¥¥ he said. Officials of the trade ministry and Sony could no= t be reached forfurther comment. With U.S. software giant Microsoft Corp. (N= asdaq: MSFT) due to enterthe lucrative video game market next year with its = ownhigh-performance console, tentatively called the X-Box, exportcontrols co= uld hinder Sony's ability to compete, Kyodo quotedindustry sources as saying= . Get free e-mail and voicemai 2228 From: Date: Wed Jan 3, 2001 4:15am Subject: Is Sony's Playstation2 a Military weapon ? Japan thinks the game machine could be used to guide missiles -- so the country is leveling export controls. By Reuters UPDATED April 16, 2000 8:21 AM PT TOKYO -- Japan has slapped export controls on Sony Corp.'s new, hugely popular Playstation2 video game because the machine is so sophisticated it could be used for military purposes, media said Sunday. The hit home game machine, which includes a digital video disc player and will eventually offer Internet access, is Sony's most profitable product. The company said it had shipped 1.4 million in the month after the game's March 4 launch. Sound off here!! Post your comment on this story. The console and its eight-megabyte memory card have been designated as ``general-purpose products related to conventional weapons¥¥ because they contain components that could be used for military devices such as missile guidance systems, Kyodo news agency quoted industry sources as saying. Playstation2 is the first game console to face export controls under the Foreign Exchange and Foreign Trade Control Law, Kyodo said. The law requires the trade ministry's approval for the export of restricted products worth more than 50,000 yen ($472). Thus, the export of more than two consoles would be controlled because each is priced at 39,800 yen. Sony: Competition allows no compromise ``We have mixed feelings because our efforts to produce a game console of the highest quality have resulted in legal restrictions,¥¥ the Asahi Shimbun newspaper quoted an official of Sony Computer Entertainment Inc. as saying. ``We could not compromise because of the fierce competition in the industry,¥¥ he said. Officials of the trade ministry and Sony could not be reached for further comment. With U.S. software giant Microsoft Corp. (Nasdaq: MSFT) due to enter the lucrative video game market next year with its own high-performance console, tentatively called the X-Box, export controls could hinder Sony's ability to compete, Kyodo quoted industry sources as saying. Get free e-mail and voicemail Try ZDNet eCircles -- your private place on the Web Join ZDNet now! The first version of the PlayStation generated approximately 40 percent of Sony's group-based operating profits. Sony Computer Entertainment Inc, a Sony Corp. subsidiary, has said it aims to ship four million PlayStation2 consoles in Japan and three million each in Europe and the United States in 2000/01. Overseas shipments are due to start later this year. ``These days there are so many items that have technology for civilians that can also be used for military purposes, and of course, PlayStation2 is among these goods,¥¥ the Asahi Shimbun newspaper quoted military commentator Kensuke Ebata as saying. PlayStation2 could guide a missile Military analysts cited the example of a Tomahawk missile that needs to ``see¥¥ where it is going until it strikes its target and must process graphic material at high speed to keep to its target. PlayStation2's graphic processing capability is fast enough to enable it to be used in a missile. Japan's government has become increasingly wary of the possibility that products meant for civilian use could be diverted for weapons use. Japanese radar and communications devices for civilian use were discovered in a North Korean submarine sunk by the South Korean military in December 1998, and two Japanese men were arrested in January on suspicion of illegally shipping parts for anti-tank rocket launchers to Iran. The export restrictions are just the latest in a string of problems that have plagued Sony's most profitable product. Sony Computer Entertainment said this month that users could illegally manipulate the machine to copy DVD movies to videotape. Last month it said it had found the game player could be used to watch digital video disk software sold overseas in breach of a worldwide agreement among DVD player makers. HAVE A GREAT DAY !!! 2229 From: Tom Mann Date: Wed Jan 3, 2001 9:51am Subject: Re: Re: Playstation 2 Dear Pat: I was told that the chip in the Play Station will allow Hussein to radically improve his surface to air missile and anti-aircraft gunnery systems in relation to tracking targets. Tom Mann Guardian International Salem, OR 2230 From: Mike Date: Wed Jan 3, 2001 10:07am Subject: Playstation 2 Obviously he intends to modify them for use as computers. Nuff Said- Bootleg [Non-text portions of this message have been removed] 2231 From: Date: Wed Jan 3, 2001 11:26am Subject: Y2K Computer Glitch Hits 7-Eleven Y2K Computer Glitch Hits 7-Eleven By David Koenig AP Business Writer Wednesday, Jan. 3, 2001; 4:36 p.m. EST DALLAS ‚Äì‚Äì A Y2K-type computer bug hit cash registers in 7-Eleven stores this week, causing them to read the new year as 1901 instead of 2001 and inconveniencing customers who wanted to make credit-card purchases. A spokeswoman said the problem was fixed late Tuesday night and most stores were operating normally Wednesday. Officials at the Dallas-based chain of about 5,200 U.S. convenience stores and thousands more around the world thought they had nipped calendar-related computer glitches a year ago when, like many other big corporations, they geared up for an onslaught of Y2K bugs that never came. 7-Eleven said it spent $8.8 million preparing its in-store computer systems for the rollover from 1999 to 2000. "This was all specifically devised for 7-Eleven and was all Y2K-compliant," said Margaret Chabris. "We did some 10,000 tests on it, and it was working fine until Monday." Chabris said about 15 percent of 7-Eleven's sales involve credit cards ‚Äì not including credit-card ports on the outside gas pumps, which she said were not disrupted. 7-Eleven had 1999 sales of $8.25 billion. Chabris said it wasn't clear whether the company lost any sales because of the outage. For one thing, customers could still pay by cash or check. For another, she said, most of the stores still have devices for manually taking an imprint of a customer's credit card. The chain has a proprietary system that tracks inventory, weather forecasts ‚Äì to change the product mix during hot or cold spells ‚Äì and all cash-register sales. The system is critical in helping 7-Eleven manage inventory in stores that have limited shelf space. The 7-Eleven spokeswoman said major hardware and software vendors on the overall system, installed in 1999, included Electronic Data Systems Corp., NCR Corp., and Affiliated Computer Systems of Dallas. An EDS spokesman said the company did not work on the point-of-sale system, where the bug occurred, which 7-Eleven confirmed. Businesses and government agencies braced for service disruptions a year ago because older computers and software were programmed to use only two digits to represent the year. The shortcut saved computer memory by ignoring the 21st century. 2232 From: St. Clair, James Date: Wed Jan 3, 2001 10:14am Subject: RE: Re: Playstation 2 Well, it should be noted that while all of this is theoretically true, there is no magic fix for this. PS2's run on a standard 32-bit processor, but there vector graphics rendering is EXTREMELY fast, on the order of a super computer . The problem is these machines must be networked and reprogrammed to be used any other way but playing GOLF or NASCAR, and that is cantankerous: PS2s were not designed for this, and Saddam may not have the best script kiddies available. Given his historical penchant for charity, he may even be planning on handing them out to kids as a "hearts and minds". He has previously given away free art supplies before the embargo.. Jim -----Original Message----- From: Tom Mann [mailto:guardian@n...] Sent: Wednesday, January 03, 2001 10:51 AM To: patedwards@w... Cc: TSCM-L@eGroups.com Subject: Re: [TSCM-L] Re: Playstation 2 Dear Pat: I was told that the chip in the Play Station will allow Hussein to radically improve his surface to air missile and anti-aircraft gunnery systems in relation to tracking targets. Tom Mann Guardian International Salem, OR ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2233 From: Psiber Joe Date: Wed Jan 3, 2001 5:06pm Subject: Re: Re: Playstation 2 ----- Original Message ----- From: "Tom Mann" To: Cc: Sent: Wednesday, January 03, 2001 8:51 AM Subject: Re: [TSCM-L] Re: Playstation 2 > Dear Pat: > > I was told that the chip in the Play Station will allow Hussein to > radically improve his surface to air missile and anti-aircraft gunnery > systems in relation to tracking targets. > > Tom Mann > Guardian International > Salem, OR > > I believe this stems from the fact that the PS2 is the first console system with a powerful enough processor to make it worth your while. Somewhere (slashdot?) I believe it was quoted that it takes just 7 - 10 PS2 processors per missle; and at $200/unit wholesale, this is a /bargin/ for a country underneath econonic sanctions. Psiber Joe 2234 From: James M. Atkinson, Comm-Eng Date: Wed Jan 3, 2001 6:19pm Subject: New cameras focus on fuel bandits New cameras focus on fuel bandits http://www.thisislondon.co.uk/dynamic/news/story.html?in_review_id=347661 by David Williams, Motoring Editor Twenty-four surveillance is being launched by police at London filling stations to combat a huge rise in the number of people stealing fuel - following a year of sharp petrol price rises. Up to £2 million worth of fuel is now being stolen from forecourts in the capital every month. Motorists are driving off with up to £60 of fuel at a time, although the average haul in London is £26. The boom in "drive-offs" has doubled since the problem was reported in the summer, when 1,200 garages within the M25 were losing between £750,000 and £1 million every month. Then the British Oil Security Syndicate (Boss) said thousands of drive-offs were occurring every four weeks. Nationally the crisis cost petrol retailers at least £11.2 million last year. New Year figures, however, are expected to show a doubling in drive-offs in the past eight months, and police say the crimewave is nationwide. Now the Met has begun fighting back by installing high-resolution spy cameras linked to a powerful mobile police computer, and arrests have already been made. The computer reads every car number plate entering a forecourt and checks them against lists of known offenders who have previously been reported to police following drive-offs. Police also programmed the computer to issue an alert if it spots vehicles involved in other crimes or with no valid tax disc. In most cases offenders are approached by plain-clothes officers before they drive off. Backed by the oil industry, the operation was launched secretly at 30 south London forecourts and is expected to spread throughout London before going nationwide. Detective Inspector Larry Lawrence said: "The computer works in the blink of an eye and has proved very successful. "We are pleased to be working with Boss to tackle forecourt crime. The figures are quite high but this type of crime is preventable. "We believe the pattern we have found in south London reflects a London-wide problem." Tom Sterling, Boss chief, said: "The habitual drive-off offender is the tip of the iceberg as forecourt crime goes. People who do this normally engage in other crimes too." Earlier this year Boss reported that since 1998 credit card fraud at filling stations across Britain leapt from £12.2 million to £19 million. Drivers claiming to have "forgotten their wallet" and driving off rose to £5 million this year. Police also urged oil firms to install barriers at petrol station forecourts. They feel that with further rises in the cost of petrol, drive-offs will continue to soar. In January 2000 a litre of unleaded cost 72.9p a litre. Now it is around 77.9p. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2235 From: Talisker Date: Thu Jan 4, 2001 0:22pm Subject: Re: New cameras focus on fuel bandits I saw a TV programme on this recently, and know that the number plate reading is working well, however, I really can't see that reading the tax disc is feasible, in the UK the lettering is just over an inch tall and on top off hard to copy colouring making the letter outline difficult to read, add to this that the disc is displayed inside the windscreen at a variety of positions and angles. Also the disc is displayed in a portion of the windscreen outside the coverage of the wipers. Any opinions from the CCTV geeks out there? Oh and the range from camera to windcreen is 10,s of metres Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo talisker@n... The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "James M. Atkinson, Comm-Eng" To: "TSCM-L Mailing List" Sent: Thursday, January 04, 2001 12:19 AM Subject: [TSCM-L] New cameras focus on fuel bandits New cameras focus on fuel bandits http://www.thisislondon.co.uk/dynamic/news/story.html?in_review_id=347661 by David Williams, Motoring Editor Twenty-four surveillance is being launched by police at London filling stations to combat a huge rise in the number of people stealing fuel - following a year of sharp petrol price rises. Up to £2 million worth of fuel is now being stolen from forecourts in the capital every month. Motorists are driving off with up to £60 of fuel at a time, although the average haul in London is £26. The boom in "drive-offs" has doubled since the problem was reported in the summer, when 1,200 garages within the M25 were losing between £750,000 and £1 million every month. Then the British Oil Security Syndicate (Boss) said thousands of drive-offs were occurring every four weeks. Nationally the crisis cost petrol retailers at least £11.2 million last year. New Year figures, however, are expected to show a doubling in drive-offs in the past eight months, and police say the crimewave is nationwide. Now the Met has begun fighting back by installing high-resolution spy cameras linked to a powerful mobile police computer, and arrests have already been made. The computer reads every car number plate entering a forecourt and checks them against lists of known offenders who have previously been reported to police following drive-offs. Police also programmed the computer to issue an alert if it spots vehicles involved in other crimes or with no valid tax disc. In most cases offenders are approached by plain-clothes officers before they drive off. Backed by the oil industry, the operation was launched secretly at 30 south London forecourts and is expected to spread throughout London before going nationwide. Detective Inspector Larry Lawrence said: "The computer works in the blink of an eye and has proved very successful. "We are pleased to be working with Boss to tackle forecourt crime. The figures are quite high but this type of crime is preventable. "We believe the pattern we have found in south London reflects a London-wide problem." Tom Sterling, Boss chief, said: "The habitual drive-off offender is the tip of the iceberg as forecourt crime goes. People who do this normally engage in other crimes too." Earlier this year Boss reported that since 1998 credit card fraud at filling stations across Britain leapt from £12.2 million to £19 million. Drivers claiming to have "forgotten their wallet" and driving off rose to £5 million this year. Police also urged oil firms to install barriers at petrol station forecourts. They feel that with further rises in the cost of petrol, drive-offs will continue to soar. In January 2000 a litre of unleaded cost 72.9p a litre. Now it is around 77.9p. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2236 From: Date: Thu Jan 4, 2001 4:39pm Subject: Playstation2 The prices have risen dramatically on Playstation2 systems,from the suggested retail of $250 plus. Auctions at Ebay list $350-$550. At Amazom they are topping out at the $2200 range! That's supply and demand,for you! HAVE A GREAT DAY !!! 2237 From: James M. Atkinson, Comm-Eng Date: Fri Jan 5, 2001 6:34pm Subject: Clinton directive designed to reshape counterintelligence activities [News] Published Friday, January 5, 2001 Clinton directive designed to reshape counterintelligence activities Washington Post WASHINGTON, D.C. -- President Clinton has signed an order establishing a counterintelligence board that will bring together high-ranking FBI, CIA and Defense Department officials in an effort to devise a more effective strategy to combat spying, senior administration officials said Thursday. Dubbed "CI-21," which stands for counterintelligence for the 21st century, the "presidential decision directive" creates a board of directors, chaired by FBI Director Louis Freeh, that is charged with implementing a "pro-active" counterespionage program. The board will hire an executive who will be the federal government's foremost expert on counterintelligence, officials said. "It is a dramatic change," a senior Clinton administration official said. In addition to Freeh, other members of the board will be the CIA deputy director, the deputy secretary of defense and a representative of the attorney general. The operation will be housed at the CIA. The presidential directive is significant, senior Clinton administration officials said, because it restructures the counterintelligence community by formalizing information-sharing without regard to borders or federal agencies. It also reflects a heightened focus on economic espionage and other types of spying, rather than solely emphasizing the protection of government secrets. "We have always looked at spies and tried to figure out who was spying on us and what they were after," a senior administration official said. "Now, we are looking more at what it is we want to protect. We will no longer focus on embassies as the centers of foreign intelligence-gathering activities." The CI-21 concept was developed in the aftermath of recent security lapses that revealed systemic failures in sharing information about spying. While information will be shared and counterespionage strategy coordinated, the CIA will not be permitted to conduct surveillance activities in the United States; its agents will continue to operate abroad. Former FBI counterterrorism chief Bob Blitzer said CI-21 represents a major improvement. "It is a big change because of the deliberate focus" on counterespionage, Blitzer said. "This new structure will bring everyone together in terms of how to assess what is going on abroad, what is going on here, and what the entire intelligence community needs to do to counter past, present and emerging threats." The first task of the board of directors will be to identify American threats and vulnerabilities. And under CI-21, the National Security Council, composed of Cabinet-level secretaries with responsibility for security issues, also will have a new oversight role in counterintelligence. "All of this," a White House official said, "really depends on the willingness of the players to make sure that the directive is carried out and these agencies cooperate." © Copyright 2001 Washington Post. All rights reserved. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2238 From: James M. Atkinson, Comm-Eng Date: Fri Jan 5, 2001 6:37pm Subject: Judge gets video in home privacy case http://www.freep.com/news/locoak/zpriv_20010105.htm Judge gets video in home privacy case January 5, 2001 BY SALLY FARHAT FREE PRESS STAFF WRITER A prosecuting attorney turned in a videotape to an Oak Park judge Thursday depicting a 23-year-old woman taking a shower and using the toilet -- video her stepfather is accused of secretly filming. Oakland County Assistant Prosecutor Kathryn Steiner said that the nine scenes she gave Judge Marvin Frankel during a preliminary examination Thursday are strong enough to convict John Brown, 33, of eavesdropping. She chose not to include video Brown allegedly filmed of the woman in the living room. Defense attorney Scott Weinberg told the judge Thursday that no one has a reasonable expectation of privacy in a living room, whether a family member or a baby-sitter. That's his interpretation of a state eavesdropping statute that says it is illegal to spy on people with cameras or listening devices in places where they have a reasonable expectation of privacy. "This was the defendant's own home," said Weinberg, who also defended a Royal Oak man last year who was convicted of videotaping his daughter's 18-year-old girlfriend as she showered in their home. "The statute has to be reasonable expectation of privacy. The question of fact now becomes, is the bathroom in the clients' own home considered private?" The case was bound over to Oakland County Circuit Court, and that question will be decided by Judge Wendy Potts on Jan. 17. Brown's bond was reduced to $10,000, but he remained in Oakland County Jail. Brown, who is accused of secretly videotaping his wife and stepdaughter, is charged with 10 counts of eavesdropping. He faces up to 2 years in prison and a $2,000 fine on each count, if convicted. The visibly shaken stepdaughter, who found a camera hidden in the shower drain last month, recounted for Frankel how it felt to discover that she had been taped. "He said, 'It was an obsession,' " the stepdaughter said, burying her face in her hands as she referred to Brown. The videotaping started two weeks before the stepdaughter moved into the Oak Park home Brown shared with her mother, the 23-year-old testified. Brown also faces another court date in front of Judge Barry Howard on Jan. 24 for a probation violation relating to an earlier criminal sexual misconduct conviction involving a 9-year-old step-granddaughter. His bond in that case is set at $50,000. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2239 From: Gerard P. Keenan Date: Wed Jan 3, 2001 8:34pm Subject: FL licensing for security/Brad Robinson Sorry for the crosspostings. Can anyone point me in the right direction for licensing laws in Florida for security guard companies? We are licensed as a Guard and Patrol Agency in the state of NY, and are looking into establishing a presence in Florida due to a number of recent inquiries from that state. Is there a reciprocity licensing agreement between NY and FL? Secondly, I know Brad Robinson is on some of these lists. Can you please contact me via private email at your earliest convenience? I lost your contact info when I had my massive computer crash a couple of months ago. Thanks to everyone in advance. Jerry Keenan [Non-text portions of this message have been removed] 2240 From: Gerard P. Keenan Date: Thu Jan 4, 2001 11:22am Subject: FL lic./virus warning Just wanted to say a big "THANKS" to all the replies I received on the Florida Licensing info I requested. You guys (and gals!) are all terrific! I also want to pass out a warning about viruses. The holidays are over, but the danger from viruses is, apparently, far from over. We've all heard about the Snow White & the Seven Dwarfs virus that's been making the rounds. Be very, very careful of this one. It seems to be propagating big time. I've been hit with it eight times in the last 2 weeks -- two of those times were just this morning!! The first one came in today around 0930, and the second one came in about 1110. Luckily, I recognized it before opening it and they have been deleted from my computer. I don't know where they're coming from, but if I received it twice in less than 2 hours, I'm pretty sure it'll pop up again. So I wanted to let everyone know that it's out there and making the rounds today. I also received a 3rd virus in between the two SW&7Ds. It came with an email from another list I belong to. This time there was no warning, but my Norton caught it and got rid of it. As many of you know, I have two email accounts. The Snow White virus came in on my earthlink account. The unknown virus came in on my other one through a local server (suffolk.lib.ny.us). And all before noon! Again, thanks to everyone who responded. Got some really good info from it -- and all very helpful. Jerry K. [Non-text portions of this message have been removed] 2241 From: Shawn Hughes Date: Thu Jan 4, 2001 7:33pm Subject: decoding software Hello, I know that this is more a surveillance than a counter - surveillance question, but does anyone have experience with the Code - 3 series of decoding software from Hoka products? I don't have it in the budget ($800+) for it now, but would it be worthwhile to consider over, say a M8000 ? TIA, Shawn 2242 From: Craig Snedden Date: Fri Jan 5, 2001 8:36am Subject: Re: New cameras focus on fuel bandits I can see that a recognition system would be able to pick up the pre-printed portion of the tax disc and the colour (different colours for different validity periods), which may catch out quite a number of defaulters, but in my experience, only an inspection with the "mark one eyeball" will ascertain if the handwritten portion (the vehicles details) has been tampered with or not. It is a common method of alteration for a stolen tax disc to be treated with a substance to fade or remove the pen ink, then fill in the details for the car that it is going to be displayed on. Such alterations are easily spotted by close visual inspection and touching the disc, but I can't see a camera system being able to pick up on these. I'm sure the Government "boffins" will be looking at an RF device (passive or active) embedded in the vehicle which will be validated by some means and if invalid will send out a signal to static speed cameras, police cars etc. This raises questions of civil rights and freedom of movement....... Local authorities in the U.K. have just been given powers to raise revenue from taxing vehicles entering certain areas, commonly city centres, supposedly in a move to combat congestion. The U.K. has just recently adopted the European Convention of Human Rights. Does the imposition of a tax on my freedom of movement on the public highway, when there is no alternative route to my destination, not impose on my Human Rights? I know our cousins in the US have been tackling these sorts of questions for years now. Any comments? Sorry this got a bit off topic, but in a way it's still to do with surveillance..... ;-) Craig ----- Original Message ----- From: "Talisker" To: "TSCM-L Mailing List" ; "James M. Atkinson, Comm-Eng" Sent: Thursday, January 04, 2001 6:22 PM Subject: Re: [TSCM-L] New cameras focus on fuel bandits > I saw a TV programme on this recently, and know that the number plate > reading is working well, however, I really can't see that reading the tax > disc is feasible, in the UK the lettering is just over an inch tall and on > top off hard to copy colouring making the letter outline difficult to read, > add to this that the disc is displayed inside the windscreen at a variety of > positions and angles. Also the disc is displayed in a portion of the > windscreen outside the coverage of the wipers. > > Any opinions from the CCTV geeks out there? Oh and the range from camera to > windcreen is 10,s of metres > > Andy > http://www.networkintrusion.co.uk > Talisker's Network Security Tools List > ''' > (0 0) > ----oOO----(_)---------- > | The geek shall | > | Inherit the earth | > -----------------oOO---- > |__|__| > || || > ooO Ooo > talisker@n... > > The opinions contained within this transmission are entirely my own, and do > not necessarily reflect those of my employer. > > > > > > ----- Original Message ----- > From: "James M. Atkinson, Comm-Eng" > To: "TSCM-L Mailing List" > Sent: Thursday, January 04, 2001 12:19 AM > Subject: [TSCM-L] New cameras focus on fuel bandits > > > > New cameras focus on fuel bandits > > http://www.thisislondon.co.uk/dynamic/news/story.html?in_review_id=347661 > > by David Williams, > Motoring Editor > > Twenty-four surveillance is being launched by police at London filling > stations to combat a huge rise in the number of people stealing fuel - > following a year of sharp petrol price rises. > > Up to £2 million worth of fuel is now being stolen from forecourts in the > capital every month. Motorists are driving off with up to £60 of fuel at a > time, although the average haul in London is £26. > > The boom in "drive-offs" has doubled since the problem was reported in the > summer, when 1,200 garages within the M25 were losing between £750,000 and > £1 million every month. > > Then the British Oil Security Syndicate (Boss) said thousands of drive-offs > were occurring every four weeks. Nationally the crisis cost petrol retailers > at least £11.2 million last year. > > New Year figures, however, are expected to show a doubling in drive-offs in > the past eight months, and police say the crimewave is nationwide. > > Now the Met has begun fighting back by installing high-resolution spy > cameras linked to a powerful mobile police computer, and arrests have > already been made. The computer reads every car number plate entering a > forecourt and checks them against lists of known offenders who have > previously been reported to police following drive-offs. > > Police also programmed the computer to issue an alert if it spots vehicles > involved in other crimes or with no valid tax disc. > > In most cases offenders are approached by plain-clothes officers before they > drive off. Backed by the oil industry, the operation was launched secretly > at 30 south London forecourts and is expected to spread throughout London > before going nationwide. Detective Inspector Larry Lawrence said: "The > computer works in the blink of an eye and has proved very successful. > > "We are pleased to be working with Boss to tackle forecourt crime. The > figures are quite high but this type of crime is preventable. > > "We believe the pattern we have found in south London reflects a London-wide > problem." > > Tom Sterling, Boss chief, said: "The habitual drive-off offender is the tip > of the iceberg as forecourt crime goes. People who do this normally engage > in other crimes too." Earlier this year Boss reported that since 1998 credit > card fraud at filling stations across Britain leapt from £12.2 million to > £19 million. > > Drivers claiming to have "forgotten their wallet" and driving off rose to £5 > million this year. > > Police also urged oil firms to install barriers at petrol station > forecourts. They feel that with further rises in the cost of petrol, > drive-offs will continue to soar. > > In January 2000 a litre of unleaded cost 72.9p a litre. Now it is around > 77.9p. > > -- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 2243 From: Date: Fri Jan 5, 2001 6:14am Subject: PlayStations Some of you have been commenting on Saddams' PlayStation. Here are some ideas. Reportedly, the PS2's powerful chips could be put to military use, but according to a Sony representative, "If somebody buys and uses PlayStations for military purposes, it is something we cannot control." What will happen once all those PS2s arrive in Baghdad? Here are a few possibilities: 1. Parts and Labor: Iraqi government at standstill while federal employees redeployed to fill out warranty cards. 2. Fitting In: PlayStation 2 now available in camouflage colors. 3. Hollywood Calls: Saddam Hussein offered the title role in next year's highly anticipated sequel, "How the Grinch Stole Detroit's Christmas." 4. Keeping Up With the Jones's: Kuwait stockpiles thousands of Atari 2600s, declares formation of elite SuperPong battalion. 5. Form Follows Function: All Iraqi tanks redesigned to include reset button. 6. Cheat Code: Pressing Triangle plus Square while pressing the Down arrow on the PS2 console annihilates Desert Shield with a roundhouse kick. 7. Fashion Sense: Iraqi armed forces required to dress like fighters in Tekken Tag Tournament. 8. Entertainment Aloft: Iraqi jets now include in-flight DVD movies. 9. Sign Me Up: Kids who didn't get a PS2 start enlisting in the Iraqi military, hoping to score a spare unit. 10. New Game: SCUD Missile Command. [Non-text portions of this message have been removed] 2244 From: James M. Atkinson, Comm-Eng Date: Fri Jan 5, 2001 7:21pm Subject: Man Arrested at Wal-Mart, Charged With Video Voyeurism St. Petersburg Times January 04, 2001, Thursday Man Arrested at Wal-Mart, Charged With Video Voyeurism Times Staff Writers PLANT CITY - A man was arrested after he installed a tiny video camera in the toe of his sneaker and then followed women around a store to look up their skirts with the gadget, police said. Daniel W. Searfoss, 42, was charged with voyeurism Sunday and taken to the Hillsborough County jail, investigators said. He was released on $ 500 bail later that day. Two women at a local Wal-Mart complained to managers and police Sunday that Searfoss had been following them around the store, Plant City police Detective Kevin Shultz said. One of the women said she saw a camera on one of Searfoss' sneakers, Shultz said. Searfoss, who told police he was a mechanic, was held by store security while they waited for police to arrive. When authorities got there, they found Searfoss with a sophisticated filming system, police Chief Bill McDaniel said. "He had a camera in his shoe and wires that went up his pants and came out at his waist," McDaniel said. "It's the first time that I know of that someone did such an elaborate job. He had his shoes specially altered for this." The wires were connected to a videocassette recorder carried inside a bag, McDaniel said. Police examined the tapes and saw that other unsuspecting women had also been snooped upon. McDaniel said Plant City enacted the voyeurism law in 1998 because of similar problems at public beaches and restrooms. Voyeurism is the lewd or indecent watching, filming or taping of any person without that person's knowledge or consent. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2245 From: Date: Fri Jan 5, 2001 3:33pm Subject: Clinton orders retooling of counterintelligence Clinton orders retooling of counterintelligence By Steve Holland WASHINGTON, Jan 5 (Reuters) - President Bill Clinton, in his waning days in office, has ordered a retooling of the country's counterintelligence efforts to take account of new espionage threats and protect the private sector, the White House said on Friday. The order will establish a new top government position -- a national counterintelligence executive charged with overseeing activities between the FBI, CIA and other agencies, and making sure they have enough money. White House National Security Council spokesman P.J. Crowley said Clinton signed the order in late December with a view toward addressing a changing espionage environment in which computer hackers can steal government and corporate secrets. "Before, you were worried about foreign intelligence services that might be operational out of embassies here in the United States. Now you have to worry about getting hacked by someone who is trying to glean information that we need to protect," he said. Clinton leaves office on Jan. 20. President-elect George W. Bush's spokesman, Ari Fleischer, declined to comment on the order, which Bush could decide to change after taking office. The national executive job is similar to that of the national drug control policy director, which coordinates anti-drug activities among various agencies and lobbies for funding for the effort on Capitol Hill. Crowley said the executive would work not only within the government but with the private sector "to make sure we understand potential threats to technology and infrastructure." The executive, unlikely to be named before Clinton leaves office, would have no role in investigations. U.S. officials have long worried about the possibility of a terrorist attack on the country's electricity grid or telephone systems. Protecting company research and development secrets has increasingly been viewed as a priority in the government. DEFINE CROWN JEWELS A key goal of the new office would be to identify the most precious items for the protection of U.S. national security, that if stolen or tampered with could be disastrous. "The first element will be understanding what is truly the crown jewel rather than costume jewelry," a senior U.S. intelligence official told Reuters on condition of anonymity. For example it could be the sophisticated W-88 nuclear warhead, a secret policy stating the "real intentions" of the United States in some realm, and disruption of the Middle East peace process, the official said. In the private sector it could be the need to maintain U.S. dominance in the world of information technology, he added. "It's a much broader concept than simply what are hostile intelligence services doing to us?" the official said. "What is so important to us that it must not be damaged?" The government last year drew fire for its handling of Taiwanese-born Los Alamos scientist Wen Ho Lee, who was never charged with spying and was freed from jail in September 2000 after pleading guilty to one count of downloading nuclear weapons design secrets to a non-secure computer. The new office was not created in response to Lee or past espionage cases, but rather to shift from a predominant focus on hostile nations which "in today's world ... is going to miss more than it's going to get," the intelligence official said. "The FBI surveilling the Russian embassy is a good thing, we ought to keep doing it, but to think that that was 98 percent of your defense is crazy," he said. For example in the 1999 case of the Russian diplomat accused of monitoring an eavesdropping device planted in the State Department, the new counterintelligence executive might have checked to see whether the U.S. military or another agency had some interest in feeding him information before arresting him, the official said. The new counterintelligence executive's office would replace the National Counterintelligence Center, which was instituted after the 1994 arrest of a CIA officer, Aldrich Ames, who was later convicted of spying for Moscow. (Additional reporting by Tabassum Zakaria) 16:12 01-05-01 2246 From: Date: Fri Jan 5, 2001 3:32pm Subject: Conference on the Future of European Intelligence to Take Place in CastleOutside Rome, Italy 14-16 February 2001 Conference on the Future of European Intelligence to Take Place in CastleOutside Rome, Italy 14-16 February 2001 WASHINGTON, Jan. 4 /PRNewswire/ -- A very exclusive gathering of the top European intelligence authorities will take place within a castle on the outskirts of Rome, Italy, from 14 through 16 February 2001. With the support of the Italian government as well as the European Parliament and the European Commission, six Italian educational institutes have organized the first really high-level public conference on "Intelligence in the 21st Century." The purpose of the conference is to offer to a select audience of participants from government, business and academic communities a critical overview of the revolution of intelligence at the beginning of the new century and to discuss the emergence of a new cultural paradigm regarding intelligence and its use in the decision-making process. The Government of Italy itself anticipates a near-term modernization of its intelligence community while also seeking to establish new open relationships with appropriate private sector and non-governmental organizations. The larger European community in turn is contemplating the need for a special European intelligence architecture that uses the Internet and European encryption to create shared capabilities that reduce European dependence upon and vulnerability to non-European intelligence collection capabilities. Confirmed speakers include the most authoritative representatives from various European countries as well as England, the United States, and Canada. The event is organized into half-days covering the new intelligence challenges, economic and information warfare, transnational threats, new methods of intelligence analysis and the open source revolution, business intelligence sources and methods, and the future of intelligence in Italy. A number of exhibits and special meals will enhance the ability of participants to network with senior European intelligence officials and examine new private sector offerings. Due to the intimate nature of the castle and the security arrangements that will characterize this event there are only 120 seats and 15 exhibits available on a first come first served basis. Profile Keywords: Analytic Services, Business Information, C3I Systems, Database and Information Management, Education, Geographic Information, Graphics, Intelligence Support, Mission Planning, Modeling & Simulation, Open Source Intelligence, Research, Space Operations, Surveillance Systems, Training, Workstations SOURCE Open Source Solutions, Inc. 2247 From: A Grudko Date: Fri Jan 5, 2001 10:16am Subject: Re: Sony's Playstation2 a Military weapon ? ----- Original Message ----- > Japan thinks the game machine could be used to guide missiles -- so the > country is leveling export controls. And Elvis is alive and well in Tokyo. Just don't give him a Playstation or he could take over the world...... Sounds like marketing ploy no. 367, "Tell the public they can't have it and everyone will want one", or No. 448, "Make it illegal and the price goes up" Here in SA we have a few shops that sell LCO FM +/-100 Meg room and series phone bugs 'under the counter' for US$ 150 - and as we all know these things cost about $4 in components to build. The nice metal PCB enclosure, the fancy packaging and a 100% profit margin probably push the wholsale price up to a whopping $15! So how can the retailer get away with a 1 000% mark up? Consumer ignorance. First they think these things are actually sophisticated! Second, the retailer implies that the importation/manufacturing/posession of this 'high tech' equipment is ILLEGAL (which in this country it isn't but it's USE contravienes a number of laws). Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2248 From: A Grudko Date: Sat Jan 6, 2001 7:17am Subject: Re: New cameras focus on fuel bandits ----- Original Message ----- > I really can't see that reading the tax disc is feasible >..... the disc is displayed inside the windscreen at a variety of > positions and angles. Also the disc is displayed in a portion of the > windscreen outside the coverage of the wipers. > Any opinions from the CCTV geeks out there?.... the range from camera to > windcreen is 10,s of metres I don't consider myself an expert (not even a geek) but we've done a lot of covert CCTV observation under a wide range of conditions. There are many factors in play here but few problems are insummountable given enough motivation (usually money). We have a 1200mm focal length Bausch & Lomb reflector lens which will read a number plate at 1500 metres. It hooks up to a Nikon 35mm camera but has a 'C type' adaptor for CCTV cameras. I have not tried to read a tax disk at short range but I think it would work - I once photoed an airport employee's ID from our van at about 30 metres and could read his name, which was in about 12 point typeface, perhaps 4 mm high. I could envisage a camera with pan and tilt controlled by a computer which was programmed to recognise the specific shape of the disk as the target, even controlling focus (which is critical with this type of lens, as is camera 'wobble' with this kind of magnification). Multiple cameras would have to be available per vehicle on the forecourt to ensure the angle of view was optimmum, never mind factors such as dirty windscreens, poor lighting rain (in England? - no!) or reflections. And as you imply, anti- photocopy features (reflections or contrasts) are actualy designed to hinder camera resolution. And if the field of view was wide enough to see both the number plate (bottom front center of the car) and the tax disk (potentially a metre higher and an equal distance left or right) the resolution would have to be increadible and hence the digital drive space huge per frame. Unless someone sits there and pans/zooms manually. Different on the US or German type plates where the annual licence info is on the plate (Big Brother Uncle Sam worked that out long ago. Invalid licence - welcome to Club Fed and maybe have your car confiscated! Check out the tollgates on the Sam Houston Freeway, Tx) Sounds disproportunatly expensive to me. But who knows, Maybe Jack Straw doesn't only exceed the speed limit (the head of the UK's police service was nabbed by their excellent vehicle surveillance system but not prosicuted) but steals petrol and someone is out to nail him ;-) Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2249 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:00am Subject: NSA abandons wondrous stuff NSA abandons wondrous stuff http://www.sunspot.net/content/cover/story?section=cover&pagename=story&storyid=1150520223288 Surprises: Astronomers who took over an abandoned spy base find remarkable, expensive and often incomprehensible stuff at every turn. By Laura Sullivan Sun National Staff Originally published Jan 5 2001 "There are things on this site you will never see anywhere else." TRANSYLVANIA COUNTY, N.C. - Along the long, twisting road through the Pisgah National Forest, the first sign that something is out of the ordinary is a line of giant transformers. Then, around the bend, a barbed-wire fence, guard shack and surveillance cameras protect what looks like nothing more than another hill of trees and dense shrubbery. It is anything but. This is the entrance to one of the National Security Agency's former spy stations, a place shrouded in secrets and denials, the source of local lore that seems right out of "X-Files." What is inside that giant geodesic dome that looks like a golf ball? Where do the tunnels snaking beneath the 202-acre site lead? Why are the rugs welded to the floors of the windowless buildings? Few people have been beyond these gates, deep inside the Appalachian Mountains, 50 miles southwest of Asheville. The NSA abandoned the site to the U.S. Forest Service five years ago, leaving behind a deserted minicity in the middle of nowhere. Now, some of the secrets are being revealed. Last year, with the base boarded up and close to demolition, the property was transferred to a group of astronomers in exchange for a piece of land in western North Carolina. Over the past year, they have begun piecing together the site's past. "There are things on this site you will never see anywhere else," said site manager Jim Powers. "I've never had someone come here that wasn't blown away." The astronomers, who formed the Pisgah Astronomical Research Institute, were attracted by two 85-foot satellites dishes on the site - some of the largest in the country - which could be repositioned to catch deep-space radio signals and allow them to study the life and death of stars. When the group arrived in January 1999, they expected a basic, albeit large, government facility, but as the weeks passed they realized little about the site was what it appeared. As they began to install their computers, they found hundreds of miles of top-of-the-line cabling running under every floor. They discovered that the self-contained water and sewer treatment plant could handle tens of thousands of gallons of water at a time and the generator could produce 235 kilowatts of energy - powerful enough to light up a small city. In a basement room of one of the larger buildings, they found the entrance to a 1,200-foot tunnel system that connects two of the site's main buildings. Every inch of floor in more than four buildings was covered with two-by-two-foot squares of bleak brown carpet. When the astronomers tried to replace it, they discovered it was welded with tiny metal fibers to the floor. The result, they eventually realized, is that the rugs prevent the buildings from conducting static electricity. Even the regular lighting looks different, covered by sleek metal grids that prevent the light bulbs from giving off static interference. The few windows are bulletproof. But what fascinated the astronomers was the still-operable security system that, among other things, sounds an alarm in the main building any time the front perimeter is crossed. The group can watch on monitors as cars approach from miles away. Inside the site, the agency had taken further measures. One area is in a small, sunken river ravine surrounded by barbed wire and an additional guard post. Steps, with reflective metal paneling to shield the identity of those walking beneath, lead down a small hill and wind their way to two small buildings with conference rooms inside - both of which once emanated "white noise" to prevent electronic eavesdropping. What Powers and several others in the group find remarkable, though, is not just the expansive network of buildings and security, but the extraordinary cost of all they items they have found - items the agency discarded. He said the extensive fiber optic cabling that runs for miles under the floors and through the tunnel system is the most expensive on the market. When a state regulator came out to issue a permit for a massive underground storage tank with a double lining, the astronomers said he told them he wished he had a camera. He wanted to take a picture to show his co-workers because he had never seen a system so sophisticated. And the agency didn't just install one water tank; it installed two. In a basement room, beneath a system that pressurizes wells, is another system just like it. "You see this kind of thing everywhere here," Powers said. "They never have just one of something." Even most of the heavy bolt locks - which every door has - are covered by black boxes locked with padlocks. Despite the site's stark appearance, there are some human - and humorous - vestiges. A bright happy face is painted on the smallest of the four satellite dishes on the site, something one former employee said was done so that they could "smile back at the Russians." Inside the tunnels, too, are chalk drawings of animals and warriors resembling those found in caves thousands of years ago. Aside from the rustling of deer and the wild turkeys that run rampant across the hundreds of vacant parking spaces, everything about the place is now eerily quiet. Paperwork in the guard shack is held in place by a stapler though no one has been inside the small building in years. Security cameras still work and alarms all still sound, though no one is listening. When the agency withdrew in 1995, some of the 300 workers, especially those who grew up locally and got hired on as groundskeepers and mechanics, returned to the nearby towns, though many say they are still forbidden to talk about their work. Most of the others - the security officers, military personnel and cryptologists - left the area for their next Department of Defense post. The site dates back to the early 1960s, when a scaled-down version was carved out to support the space program. It was operated at first by the National Aeronautics and Space Administration, and scientists used the early satellite dishes to track the flights into outer space and kept the door open for school groups and visitors who wanted to learn more about space missions. But suddenly in 1981, the NSA took over from NASA. Local hikers and hunters who stumbled onto some of the agency's acreage would be suddenly surrounded by armed guards who appeared as if from nowhere to escort them out of the woods. Vans with darkened windows shuttled past the local coffee shops, fueling rumors. The agency's presence was hard on the local employees as well. Don Powell began working on the site in 1967 as a car mechanic and spent the next three decades learning the mechanics of every inch of the satellite dishes for the Defense Department. He also learned to avoid questions about his work and to lie to his neighbors. For 15 years people would approach him and the few other local workers, asking what was out there, what they did and, of course, what is that golf ball? "The kids would always ask, what's in [that] giant dome?" He would tell them it was "filled with chocolate pudding," he said. "I couldn't even tell my wife. I couldn't tell anyone." The 1995 closure appears to have caught the agency by surprise. It had recently cleared several more areas and laid the foundations for additional smaller satellite dishes that were never built. One newly built satellite dish, which one insider says was never turned on, was dismantled and shipped to England. The Forest Service tried unsuccessfully to engineer a land trade for three years, hampered by a site that posed many problems for the few interested parties - from the remote location to the expense of removing satellite dishes embedded 80 feet into the ground. The agency was about to return with a bulldozer when the astronomers group, headed by benefactor J. Donald Cline, a scientist and former computer executive, offered to buy and trade 375 acres along the French Broad River in North Carolina for the spy station. What made the site, shielded from interference in a natural bowl-shaped terrain, so perfect for the NSA made the site perfect for the astronomers as well. They plan to use the satellite dishes to read the characteristics of elements given off by dying stars. "This area is free of light pollution," Powers said, as he stood in the middle of a vast, empty parking lot. "It's also clean in terms of electromagnetic interference like cell phone towers or things that create electromagnetic noise. "And we can be sure there won't be any in the future because the Forest Service owns everything around here. ... It's easy to see why they liked this place." Recently, in one of a dozen large empty rooms in one of four mostly empty office buildings where the group decided to set up shop, four scientists stood around a portable panel of monitors and computers, watching the results of a test appear on a screen. "It's stardust," said the site's technical director, astronomer Charles Osborne. "This stuff is just floating around out there. It's the building blocks of life." In order to use the satellite dishes, they had to spend months trying to slow them down. Both of the 85-foot dishes swing on two axes, an extravagance the astronomers suspect allowed the agency to swing the face around swiftly to catch up with satellites orbiting Earth. The astronomers need the dishes to move no faster than the speed of Earth itself. But there is much on the site that the astronomers don't know what to do with, such as the paper-shredding building up on one hill, the large helicopter pad on top of another, and down in a valley of well-manicured grass, that giant golf ball, similar to those seen at NSA headquarters at Fort Meade. Close up from the outside, the ball is a circle of triangles, no two identical, that feel like Gore-Tex to the touch. When one triangle at the bottom is pushed, several triangles around it gyrate, letting off a low grumbling sound of bending metal echoing throughout the ball. Inside, past a small door less than 4 feet tall, the ball glows white, lighted by the sunlight outside reflecting and bouncing inside from one triangle to another. In its center is a 40-foot satellite dish, cleaner and smoother than any of the others. It looks new, though it has been there for years. There are unusual numbered patterns on the dish's white panels, laid out like a cheat sheet to a jigsaw puzzle. The astronomers believe that the triangles vary in size as a clever way to minimize the effect of interference that comes from patterns. Enclosing the dish under such a surface, they speculate, would protect it from the weather, and prevent anyone else from seeing it or reading the direction it is pointed. For the astronomers, though, this curious dish is somewhat irrelevant. They need dishes with large faces, like the two bigger ones, to read the radio signals of stars millions of light-years from Earth. >From far above on the perfectly level, perfectly painted helicopter pad with a view of miles of mountains and green trees, Powers laughed at the differences between the previous owners and the astronomers, a group short on staff and scraping for funding. He studied the golf ball. "You'll go a long way before you find anything like that around anywhere else," he said. " ... But nothing about this place is what it seems." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2250 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:09am Subject: Clinton Creates Secrets Panel January 05, 2001 Clinton Creates Secrets Panel http://www.lasvegassun.com/sunbin/stories/bw-wh/2001/jan/05/010500817.html ASSOCIATED PRESS WASHINGTON (AP) -- President Clinton has signed an order creating a national counterintelligence executive to oversee the government's efforts to protect its most vital national security secrets, administration officials said Friday. The new counterintelligence executive will have a four-member board composed of the director of the FBI, the deputy secretary of defense, the deputy director of the Central Intelligence Agency and a Justice Department representative. White House spokesman Jake Siewert said Clinton took the action to help adapt U.S. counterintelligence efforts to a post-Cold War era "in which danger could come just as easily from a laptop (computer) and not the traditional cloak-and-dagger spies." "The old system was designed to counter intelligence threats that came from our adversaries in the Cold War," Siewert said. "Now you're in a new era where those threats are not quite as centrally localized, and you need a more integrated system." Siewert said although the incoming Bush administration could reverse Clinton's decision, that looks doubtful since it is strongly supported by the CIA, FBI, Defense Department and other agencies involved in counterintelligence matters. He said national security adviser Sandy Berger had briefed his anticipated successor, Condoleezza Rice. "They can undo it, but this is not a partisan issue," Siewert said. The organization will reside at CIA headquarters and will replace the CIA's National Counterintelligence Center, according to an administration official who discussed the matter in advance of the White House announcement. The center was created in 1994 after the arrest of Aldrich Ames, a longtime CIA officer convicted of spying for the former Soviet Union. Clinton's order was first reported in Friday's editions of The New York Times and The Washington Post. The existing counterintelligence center at CIA focuses on known, suspected or potential intelligence losses. The new organization will take a broader, more forward-looking approach to determining which national secrets are most vital, which are of greatest interest to foreign governments and how U.S. agencies can cooperate to protect them. Siewert said he believed it was unlikely Clinton would name the counterintelligence executive before he leaves office Jan. 20. Prior to the Ames case, which was one of the worst intelligence disasters in CIA history, the FBI and other government agencies had their own counterintelligence operations but there was no central government-wide office in charge of protecting secrets. --- On the Net: the National Counterintelligence Center at http://www.nacic.gov -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2251 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:11am Subject: Interagency Board to Revise Counterintelligence Strategy Interagency Board to Revise Counterintelligence Strategy http://www.iht.com/articles/6496.html David A. Vise Washington Post Service Saturday, January 6, 2001 WASHINGTON President Bill Clinton has signed an order establishing a counterintelligence board that will bring together high-ranking FBI, CIA and Defense Department officials in an effort to devise a more effective strategy to combat spying, according to senior administration officials. . The presidential directive creates a board chaired by the head of the Federal Bureau of Investigation, Louis Freeh, that is charged with carrying out a "pro-active" counterespionage program. The board will hire an executive who will be the federal government's foremost expert on counterintelligence, officials said. . "It is a dramatic change," a senior Clinton administration official said. "It is revolutionary in its focus and perspective." . In addition to Mr. Freeh, other members of the board will be the deputy director of the Central Intelligence Agency, the deputy secretary of defense and a representative of the attorney general. The operation will be run out of offices at the CIA. The directive is significant, senior Clinton administration officials said, because it restructures the counterintelligence community by formalizing information-sharing without regard to borders or federal agencies. . It also reflects a heightened focus on economic espionage and other types of spying, rather than solely emphasizing the protection of government secrets. . "We have always looked at spies and tried to figure out who was spying on us and what they were after," a senior administration official said. "Now, we are looking more at what it is we want to protect. We will no longer focus on embassies as the centers of foreign intelligence-gathering activities." . The new approach was developed after security lapses that revealed systemic failures in sharing information about spying. The board's first task will be to produce a study identifying threats and vulnerabilities. . Under the concept, the National Security Council also will have a new oversight role in counterintelligence. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From: Ocean Group Date: Fri Jan 3, 2003 10:18am Subject: PCR Pcr....? Isn't that what the KGB(or whatever the Russian dept was in charge of making US tech's earn their wages!) planted in the US crest given to the Yanks in one of their embassies back in the olden days....? I read about that...the Yanks brought it into the UN Council meeting and gave the Russian rep's heart attacks...! Ha ha.... You might find some info on the unit from the UN minutes! I think I remember seeing it on someone's tscm website....I can't remember where exactly...but I think it was Kevin Murray's site..... I guess the use for it was that it was totally dorment most of the time, ie night time etc when sweeps were carried out, or if the sweeps were random only activated when someone important arrived at the embassy for meetings etc....the SA wouldn't see anything if there was no signal at the time....right? Cheers Vance Deran Ocean Group, Technical Security Division, Ireland. Message: 4 Date: Tue, 31 Dec 2002 01:20:27 -0000 From: "jdobbs2001 " Subject: passive cavity resonator operation Is there any public information regarding PCR's? estimated range and companies known to manufacture them. Is a PCR a typical T3 device used by LE or your typical PD? Why would someone use such a device since its operation would be obvious on any spectrum analyser. 6724 From: Ocean Group Date: Fri Jan 3, 2003 10:20am Subject: ID card solution... ######################################## Before I start, excuse anyone who has been getting emails bounced back from my email address, things went down over Christmas and no one noticed, hopefully all is back online though and please resend your messages, Thanks. ######################################## Hi Matt, Yeah that is a real fast buck option but to be honest I'd be too worried of sticky fingers messing around with the laminate and going design happy with creative id's. Ideally if a high grade laminate could pass as a pvc therm printed card then people would be less likely to munipulate them(or at least try)...that would be a fairly reasonable solution. Maybe a system whereby the inks are printed onto an ultra thin soft laminate and then over coated in a harder pvc like film that would give it an appearance of a therm printed card. But not only that making the things durable and waterproof and thus avoiding making them by the dozen per employee....Come to think of it I wouldn't see why the top over coat of laminate couldn't be hot thermal applied(like a standard laminator) hence making a good card. But the heat may cause image bleed on the underlying soft film from the standard OEM deskjet inks.... Unfortunately I haven't come by any high grade laminate system like that. Does anyone have any ideas regarding this? Of course I could just walk into Compustore and pick up a pack of HP laminate to run on a HP deskjet and off I go, but I see that coming back to haunt me in the future! But your right, $1400 is a waste of cash for an id system, fine for a large org but not for an SME. Hmmm, not easy, anyway maybe someone will have an idea. All the best Kind regards Vance Deran, Ocean Group, Technical Security Division, Ireland. Quoted: Message: 3 Date: Tue, 31 Dec 2002 22:04:38 -0800 From: "Matt Paulsen" Subject: RE: ID cards... If cost is a concern, why not just laminate a printout from a bubblejet/inkjet and a cheap webcam? Total cost is under $125 for everything easily and if you scrounge used you can get it all less than $50. Or if that's not great... around $1400 with a cam... but why waste the cash I ask.. you can get this http://www.pricegrabber.com/search_getprod.php/masterid=466060/search=FARGO% 2520printer/ut=0ce01c8e4f1f7082 http://www.pricegrabber.com/search_getprod.php/masterid=21255/search=card%25 20printer/ut=0ce01c8e4f1f7082 6725 From: cybersnoops1 Date: Fri Jan 3, 2003 1:37pm Subject: Wanted: Real-time GPS tracker... Seeking information on "real-time" GPS vehicle tracking devices. Any with knowledge of the best available to please contact via private email to: jhall@t... Thanks! John Hall President ASG Investigations jhall@t... 888.n2fraud 6726 From: Matt Paulsen Date: Sat Jan 4, 2003 11:31pm Subject: RE: ID card solution... Source it - http://www.123barcode.com/cards.htm -----Original Message----- From: Ocean Group [mailto:inertia@o...] Sent: Friday, January 03, 2003 8:21 AM To: TSCM Group Subject: [TSCM-L] ID card solution... ######################################## Before I start, excuse anyone who has been getting emails bounced back from my email address, things went down over Christmas and no one noticed, hopefully all is back online though and please resend your messages, Thanks. ######################################## Hi Matt, Yeah that is a real fast buck option but to be honest I'd be too worried of sticky fingers messing around with the laminate and going design happy with creative id's. Ideally if a high grade laminate could pass as a pvc therm printed card then people would be less likely to munipulate them(or at least try)...that would be a fairly reasonable solution. Maybe a system whereby the inks are printed onto an ultra thin soft laminate and then over coated in a harder pvc like film that would give it an appearance of a therm printed card. But not only that making the things durable and waterproof and thus avoiding making them by the dozen per employee....Come to think of it I wouldn't see why the top over coat of laminate couldn't be hot thermal applied(like a standard laminator) hence making a good card. But the heat may cause image bleed on the underlying soft film from the standard OEM deskjet inks.... Unfortunately I haven't come by any high grade laminate system like that. Does anyone have any ideas regarding this? Of course I could just walk into Compustore and pick up a pack of HP laminate to run on a HP deskjet and off I go, but I see that coming back to haunt me in the future! But your right, $1400 is a waste of cash for an id system, fine for a large org but not for an SME. Hmmm, not easy, anyway maybe someone will have an idea. All the best Kind regards Vance Deran, Ocean Group, Technical Security Division, Ireland. Quoted: Message: 3 Date: Tue, 31 Dec 2002 22:04:38 -0800 From: "Matt Paulsen" Subject: RE: ID cards... If cost is a concern, why not just laminate a printout from a bubblejet/inkjet and a cheap webcam? Total cost is under $125 for everything easily and if you scrounge used you can get it all less than $50. Or if that's not great... around $1400 with a cam... but why waste the cash I ask.. you can get this http://www.pricegrabber.com/search_getprod.php/masterid=466060/search=FARGO% 2520printer/ut=0ce01c8e4f1f7082 http://www.pricegrabber.com/search_getprod.php/masterid=21255/search=card%25 20printer/ut=0ce01c8e4f1f7082 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6727 From: Paolo Sfriso Date: Sun Jan 5, 2003 5:42am Subject: International Transport of TSCM Equipment Dear Colleagues. As most of you may know, an essential document for all involved in International TSCM services is an "ATA Carnet". More information on this document, how and where to obtain it, etc. can be found at the following website: http://www.iccwbo.org/index_ata.asp . Best wishes for a safe and prosperous 2003. Your Italian Contact. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 6728 From: Date: Sun Jan 5, 2003 8:05am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County, San Francisco, Silicon Valley, San Jose, San Diego, and Las Vegas. (Also, anywhere in a thousand mile radius from Los Angeles.) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 6729 From: Date: Sun Jan 5, 2003 8:05am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6730 From: Date: Mon Jan 6, 2003 1:51pm Subject: Spies keep busy as ever, quietly from the January 02, 2003 edition - http://www.csmonitor.com/2003/0102/p06s01-woeu.html Spies keep busy as ever, quietly On Friday, Russia banned US Peace Corps volunteers, accusing them of espionage. By Fred Weir | Special to The Christian Science Monitor MOSCOW - Following Russia's historic rapprochement with the West after Sept. 11, even celluloid superspy James Bond has forgiven his traditional nemesis in Moscow and gone in search of fresh enemies. The latest Bond flick, "Die Another Day," has the evergreen hero battling bad guys from the hermit state of North Korea. That's fiction, but in the real world, actual spies appear to be busier than ever. In the past month alone, Canada and Sweden angrily expelled Russian diplomats for "activities incompatible with their status," the familiar code for espionage. Moscow announced Friday that it will no longer accept US Peace Corps workers, after denying visas to 30 of 64 volunteers, charging they were up to more than humanitarian work. "The leading intelligence agencies of the world have strengthened their presence in Russia," complained Oleg Firomolotov, deputy chief of counterintelligence for the FSB security service, in a recent interview with the government paper Rossiskaya Gazeta. "Russia is a priority object of their activity." From the other side, the authoritative Jane's Intelligence Digest warns that "Russian intelligence operations in the West appear to be rapidly escalating." In London alone, the number of operatives of Moscow's SVR external spy service has jumped from just one in 1991 to 33 today, the journal estimates. Russian President Vladimir Putin responded to the Sept. 11 terrorist attacks by moving Russia into solid geopolitical alignment with the West. In the past year, Russian and US special services have cooperated closely in the war against terrorism, and Moscow has even forged a historic friendship pact with the Western military alliance NATO. Experts say Mr. Putin's gestures were genuine, and that the Kremlin sees cooperation with the West as crucial, to overcome Russia's post-Soviet economic malaise and national identity crisis. "In the war against the Taliban and Al Qaeda in Afghanistan, Russia provided more help to the United States than all the countries of NATO combined," says Vyacheslav Nikonov, head of the independent Politika Foundation, and a former political adviser to the Soviet KGB security service. "We have a common enemy now, and such contacts are very much in the interests of both sides." In the short term, however, Russia's political shift has not brought the hoped-for wave of foreign investment to revive its sluggish economy, particularly the crumbling military-industrial complex. One traditional solution, with which former KGB foreign agent Putin is personally familiar, is to ferret out Western technological and managerial secrets by means of espionage. "Intelligence services will always exist," says former KGB operative Stanislav Lekarev. "It's a mistake to associate espionage with war. In fact, the less shooting is going on, the more spying there will be. Russia's secret services were much depleted in the post-Soviet era, so they're only now beginning to get back up to speed." Two Russian diplomats expelled from Canada recently were reportedly agents of the GRU armed forces intelligence wing, seeking access to high-tech military secrets. Two Russians kicked out of Sweden in November were allegedly trying to penetrate Telefon AB LM Ericson, a company that makes cellphones and aircraft radar systems. Both cases resulted in old-fashioned tit-for-tat expulsions of Canadian and Swedish diplomats from Moscow. The thirty American Peace Corps workers barred from Russia last month stand accused of "collecting information on the social, political, and economic situation in Russian regions, [on] staff members of bodies of power, [and] on elections," according to FSB director Nikolai Patrushev. Russian security officials are understandably tight-lipped about their espionage abroad, but often publicly express pride in their Soviet heritage, which includes running a formidable spy network in the West. In a recent Rossiskaya Gazeta interview, the head of Russia's SVR external intelligence agency, Sergei Lebedev, suggested that tradition may not have died with the USSR. "Even now, many of our supporters help us out of political conviction," he said. "There are people abroad who sympathize with Russia and support our efforts to build a multipolar world, to ensure a global balance of forces." Experts say the international spy game now seldom leads to splashy public scandals the way it did in cold war days. Today, leaders dance a careful two-step around their countries' shadow activities. "We've learned to spy and smile at the same time," says Mikhail Lyubimov, a famous Soviet agent who, since his retirement, has become one of Russia's best-loved writers of espionage novels. "Our presidents go on kissing each other, and have become very adept at pretending nothing is happening." Mr. Lebedev, the SVR chief, also hinted that what the public sees of today's cloak-and-dagger world is just the tip of the iceberg. "I can tell you there are plenty of cases in which a spy is unmasked, and he is allowed by mutual agreement to leave the country quietly," he said. "Neither the press nor anyone else ever gets to hear about it." But the continuing focus of Russian security services on catching spies, and the broad definitions of the term they seem to apply, has some experts and human rights advocates worried. "All reforms are coming to an end and we are returning to the past," says Konstantin Preobrazhensky, a former KGB colonel turned critic. "The same bitter and vengeful people are in charge, and they feel their chance to return has arrived." "We see a lot of dubious accusations against journalists, environmentalists, human rights workers and scientists," says Otto Latsis, with the liberal daily Novoye Izvestiya. "This has nothing to do with ensuring national security, and a lot to do with intimidating people who commit themselves to political causes that are inconvenient for the state, or who associate too much with foreigners." In October, the FSB raided the offices of Baikal Ecological Wave, a coalition dedicated to saving Siberia's fragile Lake Baikal, seizing maps, volunteer lists, and computers. Then, this month, the commander of Russia's north Caucasus military zone, Viktor Kazantsev, accused humanitarian agencies of supplying food to Chechen rebels. "All this aid activity should be taken under tough control," he said. "We all know perfectly well who works in the Red Cross: spies." Some argue Russia's security services are using harsh domestic tactics in a misguided effort to prove their relevance to a population weary of old enemy stereotypes. "Our secret agents are the last children of the cold war," says Yury Shchekochikhin, deputy chairman of the State Duma's security commission. "Of course the state must protect its secrets. But it's time for our special services to grow up and stop trying to divide the world into black and white, them and us. That time is gone forever." [Non-text portions of this message have been removed] 6731 From: Louisiana Investigator Date: Tue Jan 7, 2003 9:53am Subject: RE: Wanted: Real-time GPS tracker... -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Check out the items at http://store.yahoo.com/national-scientific/ The NSC Followit looks interesting. Louisiana has a very poor GSM network, but most other areas in the US have good GSM coverage. If so, I think that this device would be excellent for asset or vehicle tracking. If you do purchase one of these items, please reply with a brief evaluation. Hope this helps, Ricky Gray Richard T. Gray Jr., Licensed Private Investigator Gray & Associates, L.L.C. A Professional Investigative Firm 408 North Parkerson Crowley, LA 70527 337-785-0046 Voice 337-785-2768 Fax Serving All of Louisiana WWW.LA-PI.COM - -----Original Message----- From: cybersnoops1 [mailto:info@n...] Sent: Friday, January 03, 2003 1:38 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Wanted: Real-time GPS tracker... Seeking information on "real-time" GPS vehicle tracking devices. Any with knowledge of the best available to please contact via private email to: jhall@t... Thanks! John Hall President ASG Investigations jhall@t... 888.n2fraud Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 7.0.3 for non-commercial use iQA/AwUBPhr35WUZ0inzIURkEQJ/dACgsViDjVQNrwtZmsMYyH/76Zsj6pMAoLzu HXXAttyrXYaPkJgXWT4ZSLVD =hD8e -----END PGP SIGNATURE----- 6732 From: Ocean Group Date: Tue Jan 7, 2003 11:22am Subject: High Tech Wire Strippers Hi, This may seem like a strange question, but a colleague informed me today he has seen a laser wire stripper. He says its just like a laser pointer but more powerful and can used to melt away the plastic in a precise area of typical small electronic wire.... He is however, unable to give me a supplier or any other details so I am a little skeptical as to its existance... Can anyone shed some light on this? Kind regards Vance Deran Ocean Group, Technical Security Division, Ireland. 6733 From: Date: Tue Jan 7, 2003 10:44am Subject: Cryptome Log Subpoenaed Cryptome Log Subpoenaed http://yro.slashdot.org/yro/03/01/07/0550242.shtml?tid=99 Posted by chrisd on Tuesday, January 07, @10:14AM from the john-has-my-tie dept. PaulBu writes "Stopped by on Cryptome tonight... It seems that their logs have been subpoenaed by Massachusetts Assistant Attorney General Chief, Corruption, Fruad (sic) & Computer Crime Division. Cryptome's answer was that "logs of Cryptome are deleted daily, or more often during heavy traffic, to protect the privacy of visitors to the site." (Good job!) See here: http://cryptome.org/cryptome-log.htm [Non-text portions of this message have been removed] 6734 From: Louisiana Investigator Date: Tue Jan 7, 2003 10:30pm Subject: Periscope for Surveillance Van -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Does any list members have any surveillance van equipment for sale? I am particularly interested in a motorized periscope. Thanks in advance, Richard Gray Richard T. Gray Jr., Licensed Private Investigator Gray & Associates, L.L.C. A Professional Investigative Firm 408 North Parkerson Crowley, LA 70527 337-785-0046 Voice 337-785-2768 Fax Serving All of Louisiana WWW.LA-PI.COM -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 7.0.3 for non-commercial use iQA/AwUBPhupZmUZ0inzIURkEQLZlgCbBjD2gnfATqsG3o11KD5WPwbZEewAoL9k OLVGWj+NqxqjRZ1fJQcKgflM =tfCJ -----END PGP SIGNATURE----- 6735 From: James M. Atkinson Date: Wed Jan 8, 2003 6:06pm Subject: Dear Abby Dear Abby My husband is a lying cheat. He tells me he loves me, but he has cheated our entire marriage. He is a good provider and has many friends and supporters. They know he is a lying cheat, but they just ignore the issue. He is a hard worker but many of his coworkers are leery of him. Every time he gets caught, he denies it all. Then he admits that he was wrong and begs me to forgive him. This has been going on for so long, everyone in town knows he is a lying cheat. To top it off, he ignores me just because I am a lesbian. Abby, I just don't know what to do. Signed, Frustrated in New York ----- Frustrated in New York: You should dump him. Now that you are finally a New York Senator, you don't need him anymore. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6736 From: Steve Uhrig Date: Wed Jan 8, 2003 8:10pm Subject: Executive World Services? If anyone is on here from Executive World Services, be advised sales@executiveworldservices just sent me a virus which was detected and quarantined. The message had a subject something like 'Frame Spacing'. Anyone having BOTH of these two addresses: sales@executiveworldservices *and* Steve@s... in their address book is a suspect for being infected. The infection may well not be on the executiveworldservices end. We've seen this before, and the culprit was an innocent third party who had both our addresses in his address book. Took a lot of investigation on the part of a savvy list member to isolate a third party problem. Someone needs to take appropriate action. If YOU have both addresses in your address book, it may be YOU. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6737 From: Marcel Date: Thu Jan 9, 2003 11:57am Subject: LJK-Junior Low Cost Vehicle Tracking Product ( BW)(NV-INTERTRAK-3)(NMRX) InterTrak, Televoke & Numerex Introduce LJK-Junior Low Cost Vehicle Tracking Product;``Security is More Important Than Ever Before'' Business Editors/High-Tech Writers 2003 International CES LAS VEGAS--(BUSINESS WIRE)--Jan. 9, 2003--InterTrak Tracking Services, L.L.C. (www.trackmenow.com), responding to dealer requests for a simplified version of their successful LJK-EXT GPS vehicle tracking product is proud to announce that it will be showing its new LJK-Junior model at the 2003 Consumer Electronics Show. The show takes place in Las Vegas, from January 9-12, 2003, Booth 4856. The LJK-Junior includes two inputs, three outputs and independently mounted combination Cellular/GPS hi-gain antennas. "The LJK-Junior culminates our dealer field experience and includes the most popular product features, yet the LJK-Junior is simple to install coupled with a lower MSRP," says Barnet Fagel, InterTrak's Vice President of Sales and Marketing. Fagel added "We have been in the market for the last two years collecting real world market information that has been used to define the new LJK-Junior to appeal to mass market buyers." About InterTrak InterTrak L.L.C. has offices in Frisco, Texas and Chicago whose employees have accumulated 20 years of vehicle security and tracking experience. InterTrak now markets the most cost efficient vehicle location products and service in North America. Coupling the combined industry talents of its corporate staff InterTrak is well positioned to take advantage of the burgeoning Telematics market. Combining the communications power of the Internet, Cellular Communications, and the Global Positioning System (GPS), InterTrak promises to be the bright star on the automotive location horizon. For additional information on InterTrak's products and services call1-866-FINDME1 (346-3631) or visit us www.trackmenow.com. About Televoke Televoke "connects people to things" by providing an automated web and telephony service platform that enables individuals and enterprises to track and control valuable assets (e.g., people or vehicle). For the first time ever, businesses and their customers can be proactively notified via phone, pager or email when a valuable fixed or mobile asset is at risk. The Televoke service platform can be customized and branded for any partner, and integrated with virtually any enterprise system, hardware device, GPS or other location technology, wireless or wire line network. For more information on Televoke, visit www.televoke.com or send an email to info@t.... About Numerex Numerex (Nasdaq:NMRX) is a technology company comprised of operating subsidiaries that develop and market a wide range of communications products and services. The Company's primary focus is wireless data communications utilizing proprietary network technologies. The Company primarily offers products and services in wireless data communications through Cellemetry(R) and Data1Source(TM), and digital multimedia through PowerPlay(TM). These services enable customers around the globe to monitor and move information for a variety of applications from home and business security to distance learning. In addition, the Company offers wire line alarm security products and services, as well as telecommunications network operational support systems. For more information on Numerex, please visit our Web site at: http://www.nmrx.com. --30--lr/da* CONTACT: InterTrak L.L.C., Frisco Barnet Fagel, 1-866-FINDME1 (346-3631) Ext. 111 barnet@t... KEYWORD: TEXAS NEVADA TRACK INDUSTRY KEYWORD: SOFTWARE COMPUTERS/ELECTRONICS AUTOMOTIVE TELECOMMUNICATIONS PRODUCT TRADESHOW SOURCE: InterTrak Tracking Services, L.L.C. http://www.businesswire.com/cgi-bin/f_headline.cgi?day0/230090318&ticker=nmrx 6738 From: Ocean Group Date: Wed Jan 8, 2003 3:46pm Subject: News - CCTV Security cameras are getting smart -- and scary From wealthy private homes to military installations, security cameras are going high tech. Prompted in part by new fears after the Sept. 11, 2001, terrorist attacks, camera makers, security specialists, hard-disk makers and chip designers are transforming the art of video surveillance, long known for its grainy, black-and-white images and reams of tape. http://www.siliconvalley.com/mld/siliconvalley/4883623.htm 6739 From: Jacob Date: Wed Jan 8, 2003 9:04pm Subject: Re: ID cards... Vance, The two big players in the card printer business are ELTRON and FARGO. They both have web sites and there are many distrubuters in the US. The also sell "overlaminates" that can contain gold ink patterns or hollograms. There can print on regular pvc or even ProxCards or MagStripe cards. Here are a few links to get you going. http://www.e-scan.com/plastic.htm http://store.yahoo.com/cardprinterwarehouse/ http://www.plastic-id-card-printers.com/ Jake Ryan This message was scanned with Norton AntiVirus 2002. [Non-text portions of this message have been removed] 6740 From: Buzz Benson Date: Thu Jan 9, 2003 2:41pm Subject: Re: Executive World Services? After reading Steve's msg I immediately ran a full Norton scan revealing no infections. Steve's infectious msg was received from the address "sales@executiveworldservices" which is not a valid sender address. It is only a a mailbox for incomming mail. I called Steve and after some discussion it was determined that the suspect virus probably uses SMTP to propagate and randomly selects email addresses from resident data bases in the host. An example would be a varient of the WORM KLEZ. So, as Steve said earlier, check your addresses for "sales@executiveworldservices" and "steve@swssec". If you have both you may be the host. Scan with Norton Anti-virus. Thanks for the heads-up Steve. Buzz Benson EWS Atlanta USA www.executiveworldservices.com email: buzzben@m... Tel: (678) 316 7002 Fax: (706) 654 2080 >From: "Steve Uhrig" >Reply-To: Steve@s... >To: tscm-l@yahoogroups.com >Subject: [TSCM-L] Executive World Services? >Date: Wed, 08 Jan 2003 21:10:54 -0500 > >If anyone is on here from Executive World Services, be advised >sales@executiveworldservices just sent me a virus which was detected >and quarantined. > >The message had a subject something like 'Frame Spacing'. > >Anyone having BOTH of these two addresses: > >sales@executiveworldservices > >*and* > >Steve@s... > >in their address book is a suspect for being infected. The infection >may well not be on the executiveworldservices end. We've seen this >before, and the culprit was an innocent third party who had both our >addresses in his address book. Took a lot of investigation on the >part of a savvy list member to isolate a third party problem. > >Someone needs to take appropriate action. If YOU have both addresses >in your address book, it may be YOU. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ _________________________________________________________________ The new MSN 8 is here: Try it free* for 2 months http://join.msn.com/?page=dept/dialup 6741 From: James M. Atkinson Date: Thu Jan 9, 2003 11:10pm Subject: SpyKing As many of you know my website concerns methods, techniques, and protocols used to find bugs and wire tapes, and the art and craft of hunting spies. Part of this involves covering court cases when spies and their associates are busted, and presenting historical public documents about how the business operated prior to the bust, during the bust, during the court case, and then watching how the people involved re-invent themselves (all culled from government documents). A good example is the following page where I cover the Frank Jones bust, which includes court documents on the case, incorporation documents, and so on. http://www.tscm.com/FNJspyking.html There is a very, very small amount of materials that is not based on court documents, but this small amount is based on interviews I have personally performed, or taken from published articles (with appropriate credit) and added my own added commentary. Please let me know if you find any errors or omissions, and please let me know if you think I need to clarify anything on this or any other page. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6742 From: Steve Uhrig Date: Sat Jan 11, 2003 8:45pm Subject: Someone else has a virus Anyone having both the following addresses in their address book should check their machine for virii: walshingham@c... AND Steve@s... I received a spoofed message from the compuserve address. As with the other one earlier this week, some third party machine is infected, and is sending random messages to persons in your address book, spoofing the headers of someone else in your address book. The spoof apparently is coming from the AOL domain, specifically: LugNutz3@a... Headers below. ================ Status: U Return-Path: Received: from halfdome.istep.com ([66.250.97.227]) by merlin (EarthLink SMTP Server) with ESMTP id 18xxZk1bz3NZFlq0 for ; Sat, 11 Jan 2003 18:36:38 -0800 (PST) Received: from rly-ip06.mx.aol.com (rly-ip06.mx.aol.com [205.188.156.51]) by halfdome.istep.com (8.12.3/8.12.3/Debian -4) with ESMTP id h0C2a51l006898 for ; Sat, 11 Jan 2003 18:36:06 -0800 Received: from logs-tp.proxy.aol.com (logs-tp.proxy.aol.com [152.163.204.135]) by rly-ip06.mx.aol.com (v89.10) with ESMTP id RELAYIN5-0111213522; Sat, 11 Jan 2003 21:35:22 1900 Received: from Wuntnqpno (AC958C1C.ipt.aol.com [172.149.140.28]) by logs-tp.proxy.aol.com (8.12.6/8.12.6) with SMTP id h0C2X7qq183116 for ; Sat, 11 Jan 2003 21:33:08 -0500 (EST) Date: Sat, 11 Jan 2003 21:33:07 -0500 (EST) Message-Id: <200301120233.h0C2X7qq183116@l...> From: walsingham To: steve@s... Subject: {Virus?} Bottom footer table MIME-Version: 1.0 Content-type: multipart/mixed; boundary="Ds85WC93ulO0637jf59tV66820v9zJQb386Sa" X-Apparently-From: LugNutz3@a... X-MailScanner: Found to be infected X-MailScanner-SpamCheck: not spam, SpamAssassin (Message larger than max testing size) X-PMFLAGS: 570949760 0 1 P6AE60.CNM --Ds85WC93ulO0637jf59tV66820v9zJQb386Sa Content-Type: text/plain Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Warning: This message has had one or more attachments removed Warning: (msg-4856-5.html, href.scr). Warning: Please read the "VirusWarning.txt" attachment(s) for more informat= ion. --Ds85WC93ulO0637jf59tV66820v9zJQb386Sa Content-Type: text/plain; charset="us-ascii"; name="VirusWarning.txt" Content-Disposition: attachment; filename="VirusWarning.txt" Content-Transfer-Encoding: quoted-printable This is a message from the I-Step E-Mail Virus Protection Service ---------------------------------------------------------------------- The original e-mail attachment "msg-4856-5.html" was believed to be infected by a virus and has been replaced by this warning message. If you wish to receive a copy of the *infected* attachment, please e-mail helpdesk and include the whole of this message in your request. Alternatively, you can call them, with the contents of this message to hand when you call. At Sat Jan 11 18:36:10 2003 the virus scanner said: Found dangerous IFrame tag in HTML message Note to Help Desk: Look on I-Step Mail System in /var/spool/MailScanner/qua= rantine/20030111 (message h0C2a51l006898). --=20 I-Step Communications Anti-Virus Team (415) 777-3268 mail-support@i... --Ds85WC93ulO0637jf59tV66820v9zJQb386Sa Content-Type: text/plain; charset="us-ascii"; name="VirusWarning.txt" Content-Disposition: attachment; filename="VirusWarning.txt" Content-Transfer-Encoding: quoted-printable This is a message from the I-Step E-Mail Virus Protection Service ---------------------------------------------------------------------- The original e-mail attachment "href.scr" was believed to be infected by a virus and has been replaced by this warning message. If you wish to receive a copy of the *infected* attachment, please e-mail helpdesk and include the whole of this message in your request. Alternatively, you can call them, with the contents of this message to hand when you call. At Sat Jan 11 18:36:10 2003 the virus scanner said: href.scr Infection: W32/Klez.H@mm Windows Screensavers are often used to hide viruses (href.scr) Note to Help Desk: Look on I-Step Mail System in /var/spool/MailScanner/qua= rantine/20030111 (message h0C2a51l006898). --=20 I-Step Communications Anti-Virus Team (415) 777-3268 mail-support@i... --Ds85WC93ulO0637jf59tV66820v9zJQb386Sa Content-Type: application/octet-stream; name=fact_driver[1].htm Content-Transfer-Encoding: base64 Content-ID: ================== Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6743 From: A Grudko Date: Sat Jan 11, 2003 10:33pm Subject: Re: Someone else has a virus - Original Message - From: Steve Uhrig > Anyone having both the following addresses in their address book > should check their machine for virii: > walshingham@c... Thanks Caught on it's way in and zapped by my code-warriors. Andy Grudko (British), Grad I.S, South Africa SIRA investigators Reg. No. 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 6744 From: A Grudko Date: Sun Jan 12, 2003 3:15am Subject: Yaesu FT90-R mods I have a Yaesu FT90-R (which is a great radio) which I use primarily for UHF comms on 407-409 Rx, 417- 419 Tx on a + 10 Meg repeater system. Secondary comms are simplex in the 407 - 409 range and this is a problem for me as Tx is blocked below 410.00 . Does anyone have a modification around this block. Private replies please. Andy Grudko (British), Grad I.S, South Africa SIRA investigators Reg. No. 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 6745 From: frost_bitten_ca Date: Fri Jan 10, 2003 0:54pm Subject: What might someone do with stuff like this? Usable range apparantly to 60 feet, audible to 300 feet. HyperSonic Sound What is HSS? HyperSonic Sound Technology is simply the most revolutionary sound reproduction system of this century. Not since the development of the "cone" loudspeaker more than 75 years ago has any technology provided such significant departure from conventional loudspeakers and such a remarkable new approach to the reproduction of sound ... http://www.atcsd.com/tl_hss.html --- Put sound where you want it Is already successfully used by major corporations, museums, and other venues all over the world ï Delivers clean, clear audio with ~1% distortion ï Is fully CE compliant ï Uses zero-lag, realtime processing, making video synchronization simple ï Has proven long-term reliability, with public installations running for years http://www.holosonics.com/ 6746 From: Rick Hofmann - MICROSEARCH Date: Sun Jan 12, 2003 7:09pm Subject: Antennas I am looking for input from anyone with experience using the Electrometrics or Summitek collapsible antennas. Any information will be greatly appreciated. Very truly yours, Rick Hofmann, CCO, CPP, PI16998 MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 http://home.earthlink.net/~microsearch 6747 From: James M. Atkinson Date: Mon Jan 13, 2003 7:17am Subject: Espionage Case May Face Public Trial Espionage Case May Face Public Trial By Ted Bridis Associated Press Writer Sunday, January 12, 2003; 1:20 PM Washington Post ALEXANDRIA, Va. -- It's the first U.S. espionage trial in nearly 50 years that could end in a death sentence: A retired Air Force master sergeant, deeply in debt, is accused of offering satellite secrets to Saddam Hussein and others for more than $13 million in Swiss currency. Barring a last-minute plea agreement, jury selection was to begin Monday in the case against Brian Patrick Regan in U.S. District Court. His lawyers waged a late, unsuccessful fight to delay the trial because of a possible U.S. invasion of Iraq, one of the countries to whom Regan was accused of offering to sell secrets. Legal experts said a plea avoiding trial this late was unlikely. "I think you can assume any offers that were put on the table have been long-since rejected," said Lawrence S. Robbins. He was the losing defense lawyer in the last espionage trial, in 1997, when a federal jury convicted a married couple of spying for East Germany. Full-blown spy trials in civilian courtrooms are rare. The Justice Department nearly always negotiates a plea agreement, even in cases where espionage has resulted in the deaths of America's foreign agents. That is because the government could suffer embarrassing disclosures of sensitive information in a public courtroom, including hints that could help other spies learn to evade detection and capture. The government also often needs the defendant's help to describe which secrets might have been handed over to foreign governments. Leverage to negotiate a plea is so powerful that prosecutors complain about threats from defense lawyers that a public trial could expose their secrets. "The government has to choose between dropping the charge or revealing the information," said Michael Woods, a former chief in the FBI spy-hunting unit that investigated Regan. Citing national security, U.S. District Judge Gerald Bruce Lee barred the public and reporters from attending some earlier hearings in Regan's case. Defense lawyers have pored over classified documents for weeks at the federal courthouse inside a secure room where cellular telephones and pagers are not allowed. Two other lawyers in the 1997 espionage case with Robbins, James Clyde Clark and Joseph John McCarthy, are among four court-appointed attorneys for Regan. In that case, Therese Marie Squillacote, a former Defense Department lawyer, was sentenced to nearly 22 years in prison; her husband, Kurt Alan Stand, got more than 17 years. Regan retired from the Air Force in August 2000 to work for a defense contractor in the National Reconnaissance Office. He was pulled off a flight to Zurich, Switzerland, at Dulles International Airport one year later by FBI spy-hunters, who had been secretly following him and videotaping him inside his office for months. The FBI said it found on Regan a spiral notebook with codes describing images of a missile launcher in the northern no-fly zone over Iraq and of another launcher in China. Agents said Regan also carried, tucked inside his right shoe, addresses he found on the Internet showing locations for embassies in Switzerland and Austria for the governments of Iraq, China and Libya. On Regan's home computer, the FBI said it found a dramatic letter drafted to Saddam offering details about American satellites that could help Iraq hide its anti-aircraft missiles. The letter demanded $13 million in Swiss francs and complained that movie stars and athletes make more money. "If I am going to risk my life and the future of my family, I am going to get a fair price," the letter said. Court records indicate that Regan, a father of four, carried debts of at least $53,000 at the time. Prosecutors have said they would introduce Regan's credit-card and banking records during the trial. Regan has pleaded innocent to three counts of attempted espionage and one additional count of illegally gathering national security information. The Bush administration has taken an unusually aggressive posture against Regan, pledging to seek the death penalty if he is convicted. That is despite government indications it has little evidence Regan actually turned over any information and no evidence anyone died as a result of any alleged disclosures. In espionage cases against the CIA's Aldrich Ames or the FBI's Robert Hanssen, the spying was tied directly to the executions of U.S. agents overseas. Following plea agreements, both were sentenced to life without parole. "It does seem rather a perverse reality," said Paul Stevens, the legal adviser to the White House National Security Council in 1987. "But the paramount interest here is in preserving and protecting national security." No U.S. citizen has been executed in an espionage case since Julius and Ethel Rosenberg in June 1953, for revealing nuclear bomb secrets to the Soviet Union. The death penalty was re-enacted in 1994 as a punishment for peacetime espionage, although none of 11 people indicted for espionage since then has faced it. "This may reflect a calculation on the part of the government that they need to show they are willing to try these cases," said Stewart Baker, former general counsel for the National Security Agency. "We're in a climate when the importance of maintaining secrets is likely to get a favorable response from a jury." Regan's lawyers have spent much of their time focused on the threat of the death penalty, which they criticize as "arbitrary and irrational." In one court filing, defense lawyers called his letter to Saddam "the alleged rantings of a retired Air Force master sergeant prepared in what appears to be an effort to scam a foreign government out of $13 million." Defense lawyers also have indicated they would introduce evidence about Regan's mental health during any penalty phase, to help him escape a death sentence. © 2003 The Associated Press -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 6748 From: Ben Evans Date: Sun Jan 12, 2003 0:42pm Subject: Re: Yaesu FT90-R mods www.mods.dk is the best place for this type of mod to be found. -Ben At 11:15 AM 1/12/2003 +0200, you wrote: >I have a Yaesu FT90-R (which is a great radio) which I use primarily for UHF >comms on 407-409 Rx, 417- 419 Tx on a + 10 Meg repeater system. > >Secondary comms are simplex in the 407 - 409 range and this is a problem for >me as Tx is blocked below 410.00 . > >Does anyone have a modification around this block. > >Private replies please. > >Andy Grudko (British), Grad I.S, South Africa >SIRA investigators Reg. No. 8642 >www.grudko.com , andy@g... . Est. 1981. International investigations >(+27 12) 244 0255 - 244 0256 (Fax). >IPA, SACI, WAD, CALI, UKPIN, IWWA. >When you need it done right - first time > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ----------------------------------------------- Counter Intelligence Solutions Group, Inc. http://www.cisginc.com/ Corporate Website http://www.spywholesalers.com/ Covert Cameras http://www.slantback.com Just for fun 585.889.2321(v) 585.889.0823(f) ----------------------------------------------- 6749 From: The Inhabitant Date: Sun Jan 12, 2003 5:29pm Subject: Spy King This ìspy kingî who was caught by this United States may have known how to acquire electronic bugs, but has not knowledge of the law. Ref: Title 18 USCA section 3401 The Warrant is invalid that was used to arrest Frank Jonesís liberty. Ref: Title 28 USCA section 601 et. seq. The Federal Magistrate has no authority to move, unless the unknowing respondent involuntarily volunteers to controvert its singular innocence. Ref: Title 18 USCA section 3041 Not only did the Magistrate fail to append its signature as required by law, but it has failed to effectuate the seal of its office. Ref: Title 28 USCA section 638c This particular covert agent apparently had no Intel on the laws of this United States. Ref: Title 28 USCA FRCP Rule 1, 2, 4, 9, 12 This Spy King was not convicted of any crime. It simply involuntarily volunteered for a criminal contempt in equity that which has not standing in law. Ref: Title 5 USCA section 701 et. seq. here on the banks of the Choptank, off the shores of the Chesapeake Bay, stands this Inhabitant upon the Land Consensus Tollit Errorem Communis error facit jus Speaking the Truth in times of universal deceit is a revolutionary act. George Orwell --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.443 / Virus Database: 248 - Release Date: 1/10/03 [Non-text portions of this message have been removed] 6750 From: AccessOneNetworkNorthwest AONNRecords Date: Sun Jan 12, 2003 11:17pm Subject: Foolish Frank Jones was foolish. I read the entire file and was astounded. I could see a master spy who would feign weakness in order to lead potential adversaries to believe that his capabilities were unsecure and low level, thus he could then dance circles around them, but Jones had no plan. His mind was gone and he didn't know what the hell he was doing - he didn't know what century it was. More alarming was was his blatant proliferation of restricted technology and the raising of awareness of things which most shouldn't be concerned with. Frank Jones was no SpyKing. The brief was most hilarious as well as frightening. Thank God for counter espionage. AONN --------------------------------- Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now [Non-text portions of this message have been removed] 6751 From: Hawkspirit Date: Mon Jan 13, 2003 9:17am Subject: Equipment for sale Date: Sun, 12 Jan 2003 21:11:20 -0000 From: "j7lionrush " Subject: Counter measures gear for sale All the equipment is new in box unless indicated and what I paid for it. What I'm asking is in ( ). Or best offer. 1. DP-19 $295.00 ($270) 2. TT-46 $395.00 ($370) 3. TD-20 $295.00 ($270) 4. WIDE BAND MICRO B.D. $295.00 ($270) 5. TE-4200 $395 ($370) 6. JM-20&SAFELINE $495.00 ($450) 7. CPM 700 $2525.00 (USED) ($2200) As I mentioned before all items except the CPM 700 are NIB. I also have the following items I'm trying to off load: Steiner Binos:10x50 Police. NIB ($500.00/$300). 10x30 Nighthunter, NIB.($300/$250) US Armor Body Armor custom made w/trauma plate, used, ex. condition. ($275) Elec. lock pick, NIB, best offer Lockaid Tool, NIB, best offer Master Pick Set, NIB, best offer High-Tech Pick Set, NIB, best offer Lock pick equip. made in US, (exept for elec. lock pick). Hatch lrg/x-lrg, slash guard gloves, new. Best offer. 2 pair. Various elec. c-s manuals/books, I'll throw in no charge. Anything you buy, I'll pay the shipping and insurance. Please respond privately by e-mail if interested. John M. Leontieff Alliance Security and Investigations 2510 Leach Ct. S.E. Olympia, WA 98501 (360) 709-0369 WA. State License 601886548 Member NAIS 6752 From: Date: Mon Jan 13, 2003 9:04am Subject: Testing Just wanted to see if I was able to get through. Because of SPAM I had to change e-mail accounts. Thanks. From: Does it matter Date: Sat Jan 3, 2004 9:10am Subject: Internet phone usuage I just wanted to let ppl on this group know incase they may wonder about this type of service it is great. At home I use Vonage's service and it is incredibly clear. Several times I moved it around from office to other locations and got mixed results because of the various signal strengths that I was getting pumped through my cable service. When I finally tried it at home where I have had Comcast's interenet service since day one there were 0 interrupts. If anyone is thinking of trying something like this I can recommend the service that I use to people. Thanks Darren 8135 From: Date: Tue Jan 6, 2004 6:38am Subject: Re: Re: CIA Science and Technology Directorate Museum Opens << The C130s had a detector that could, at short ranges, pick up the RF generated by a vehicle's electric's and then take them out.>> Delightful. About what year was this? Technology is a good thing. [Non-text portions of this message have been removed] 8136 From: David Alexander Date: Wed Jan 7, 2004 3:24am Subject: FW: Re: CIA Science and Technology Directorate Museum Opens Igloo White ran from 1969 onwards. The ignition detection system was code-named Black Crow. Don't forget they were basic trucks, probably using magnetos. Not much (probably square root of nothing) in the way of suppression fitted to them. See home.att.net/~c.jeppeson/igloo_white.html for more technical details on the remote trail sensor units Regards Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: MACCFound@a... [mailto:MACCFound@a...] Sent:06 January 2004 17:39 To:TSCM-L@yahoogroups.com Cc:dave_ale@o... Subject:Re: [TSCM-L] Re: CIA Science and Technology Directorate Museum Opens << The C130s had a detector that could, at short ranges, pick up the RF generated by a vehicle's electric's and then take them out.>> Delightful. About what year was this? Technology is a good thing. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ 8137 From: Mitch D Date: Wed Jan 7, 2004 4:10am Subject: RCA Lyra 2780 pocket Video/Audio Recorder Ran the Lyra 2780 through some simple tests for various applications,it performed well and passed. With an internal 20G HDD and removable compact Flash mem, its deadly in the field as a pocket recorder. It will record audio, as well as video for over 10 hours.It accepts a composite video input,as well as audio through an AV cable adapter. Unit accepts an external 12 V DC Input Video is in mpeg4 format we used a small low quality color cam for bench testing,playback on a monitor demonstrated smooth fluid video with a crisp color image. There is no on screen T/D stamp. Audio capability testing yielded excellent results utilizing a inexpensive consumer grade microphone,AKG 1000 pro line mic,and another mike from a law enforcement supplier. The unit is effective,easily passes for a PDA,and is something to be kept out of secure conference rooms,product development areas etc...
http://www.rca.com/product/viewdetail/0,,PI700667-CI700324,00.html At at 5 1/4 inches high by 3 1/4 inches wide by 1 inch deep, the Lyra AV Jukebox can slip into a large pocket. The color screen, measuring 2 7/8 inches wide by 2 1/4 inches high, sits in the middle of the Jukebox face, with two rocker buttons on the right side for navigating on-screen menus. Plugged into a Windows or Macintosh computer through a USB 2.0 cable, the Jukebox appears to the PC as a hard drive - so you move files back and forth by drag and drop. You can even use the Jukebox to store data files, such as Word documents, that can't be played on the device. For music, the Jukebox plays songs in the MP3 and WMA formats For photographs, the Jukebox displays images stored in the widespread JPEG format. You can show pictures one at a time, or start a slide show that automatically moves through images. For video, the Jukebox plays MPEG4 video clips. If you have clips in that format, you can drag them into the Jukebox. The Jukebox acts as a recorder for both audio and video. There's a "line in" jack on the Jukebox that connects to a cable, included in the box, ending in the familiar yellow video jack and red and white audio jacks. The cable can plug into any audio source - such as a home stereo system - to record music in MP3 format. Or the cable can plug into any video source - such as cable box, videocassette recorder, DVD player or camcorder - to record full-motion video with sound. The Jukebox holds 40 hours of video recorded this way; to get 80 hours, you must first prepare compressed video on a computer. In addition to the headset jack for listening to music, there is a "line out" jack for connecting the Jukebox to a stereo or television - again with the yellow, red and white plugs - for playing back audio and video. RCA promises a free software upgrade soon that will extend battery life to 12 hours for audio playback, by turning off the power-intensive color screen. __________________________________ Do you Yahoo!? Yahoo! Hotjobs: Enter the "Signing Bonus" Sweepstakes http://hotjobs.sweepstakes.yahoo.com/signingbonus 8138 From: Does it matter Date: Tue Jan 6, 2004 11:33am Subject: Re: Portable MP3 Players Brian, Not every device leaves a registry entry. In fact lots of the thumb drives/usb key chain drives don't leave any remnants of being there. Good advice on the disable of the usb. --- In TSCM-L@yahoogroups.com, "Brian Varine" wrote: > There is a way to lock out the USB ports on 2000/2003/XP. We did this at my > last company and DoD does it as well. I'm not sure which setting you need to > tweak but it can be done. I can look it up if someone is really interested. > One other interesting feature is that every device that gets connected to > the machine leaves a registry entry. When performing a forensic analysis you > can see what they've attached. Unfortunately it doesn't tell you what > they've transferred. > > Brian 8139 From: Mitch D Date: Thu Jan 8, 2004 5:15pm Subject: Landlord goes to trial for placing illegal wiretap/cam Alleged snooping landlord in pretrial conference Gary Alan Rubio By Jeanine Gore--Half Moon Bay Review The El Granada landlord accused of installing a video camera behind his tenant's bathroom mirror and tapping her telephone line will meet in closed session Thursday with the judge and prosecution to determine whether his case will move to trial. According to Deputy District Attorney Steve Wagstaffe, the Superior Court Review hearing is an opportunity for both the defense and prosecution to hear what sort of sentence Judge Craig Parsons plans to impose on Gary Alan Rubio, if convicted. Then Rubio will have a chance to re-enter his plea, said Wagstaffe. "It's like a pretrial conference," he said. Wagstaffe said Superior Court Reviews are occasionally used as a way to resolve "non-violent" felony cases before trial. But, he said, avoiding trial is unlikely for Rubio because of the unusual nature of his case. "This case is a little different," Wagstaffe said. "Something tells me this one won't be that easy to resolve." Rubio, an electrical engineer, was arrested Oct. 5 at his El Granada home. Police charged him with two misdemeanor counts for trespassing and invasion of privacy and one felony charge for installing an unauthorized wiretap. At his arraignment Nov. 10 he pleaded not guilty. If the case proceeds, the next step is a preliminary hearing and then trial. If convicted, Rubio faces up to three years in state prison for the wiretap, six months in county jail for invasion of privacy, and six months in county jail for trespassing. Wagstaffe said the DA's office is confident it has a "strong" case against Rubio. "We feel the evidence is strong enough that the jury will convict him," said Wagstaffe. Loretta Rhodes, the alleged victim, said she plans to bring a $1 million civil suit against her landlord following his criminal trial. Rhodes discovered the mini-camera Oct. 5 with the help of Sheriff's deputies, who later found evidence of a wiretap beneath the home. Neither Rhodes' attorney, Jim Lassart of San Francisco, nor Rubio's attorney, Stephen Defilippis of San Jose, could be reached for comment on the case. http://www.hmbreview.com/articles/2004/01/07/news/local_news/story3.txt __________________________________ Do you Yahoo!? Yahoo! Hotjobs: Enter the "Signing Bonus" Sweepstakes http://hotjobs.sweepstakes.yahoo.com/signingbonus 8140 From: James M. Atkinson Date: Fri Jan 9, 2004 7:21pm Subject: MARTIAN AIR FORCE DENIES STORIES OF UFO CRASH MARTIAN AIR FORCE DENIES STORIES OF UFO CRASH Gusev Crater (MPI) - A spokesthing for Mars Air Force denounced as false rumors that an alien space craft crashed in the desert, outside of Ares Vallis on Saturday. Appearing at a press conference today, General Rgrmrmy The Lesser stated that "the object was, in fact, a harmless high-altitude weather balloon, not an alien spacecraft". The story broke late Saturday night when a major stationed at nearby Ares Vallis Air Force Base contacted the Gusev Crater Daily Record with a story about a strange, balloon-shaped object which allegedly came down in the nearby desert, "bouncing" several times before coming to a stop, and "deflating in a sudden explosion of alien gases." Minutes later, General Rgrmrmy The Lesser contacted the Daily Record telepathically to contradict the earlier report. General Rgrmrmy The Lesser stated that hysterical stories of a detachable vehicle roaming across the Martian desert were blatant fiction, provoked by incidences involving swamp gas. But the general public has been slow to accept the Air Force's explanation of recent events, preferring to speculate on the "other-worldly" nature of the crash debris. Conspiracy theorists have condemned Rgrmrmy's statements as evidence of "an obvious government cover-up," pointing out that Mars has no swamps. They point to the release of secret government memos detailing attempts to discredit reports of the landings by alien space craft. The memos discuss stategies to avoid troubles similar to those caused by the War of the Worlds radio program of years ago. The program, which featured a sensational story of gigantic oxygen breathing two-eyed invaders from Earth, sparked planet wide panic. Local residents like Driv Rhodo, who lives in the area of the alleged landings, are even more sceptical. "I seen it with my own 5 eyes" claimed Rhodo last week. "I've lived here over 300 years, most of my adult life-form. Them things used to be few and far between but lately they come in every few years or so. The government wants to bury the truth but I can tell you what's real. The Earthlings are going to invade and the government is spending our hard earned tax dollars on press releases and denials instead of preparing for the battle to come." A spokesthing denied any government involvement in the disappearance of Rhodo, who has not been seen since shortly after the interview, claiming "Any sentient being knows that a planet with the concentrations of water and oxygen found on Earth is a deadly and inhospitable environment for the formation of life, much less intelligent life. The fear and consternation caused by the unfounded and wild speculations of citizens like Rhodo are a traitorous disservice to the citizens of Mars." ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8141 From: James M. Atkinson Date: Sat Jan 10, 2004 10:09am Subject: Florida judge sues women who accused him of spying http://www.montereyherald.com/mld/montereyherald/news/7670050.htm Posted on Fri, Jan. 09, 2004 Florida judge sues women who accused him of spying By KEVIN HOWE khowe@m... A Florida judge who was once charged with peeping and prowling in a case involving a Maryland mother and her daughter at a Carmel motel has filed a malicious-prosecution lawsuit against the two women. Charles Weaver Cope, 54, a judge on the Pinellas-Pasco Counties Circuit Court, served the Monterey County Superior Court lawsuit this week on veterinarian Lisa Jeanes, 33, and her mother, physician Nina Jeanes, both of Maryland. "I'm pretty scared," Lisa Jeanes said Thursday. "The whole thing's a horrifying experience. I was hoping it was over. I'm pretty shocked and disheartened to hear about this. I really want it to be over with for good." Being served with the suit, she added, was "Very much a surprise. I thought the whole thing was over with." Though the prowling and peeping charges were eventually reduced to public drunkenness, Cope was formally reprimanded by Florida judicial authorities as a result of the Carmel incident. Adding to his troubles, the November issue of Readers Digest cited the Carmel case while listing him as one of three recipients of its "Broken Gavel Award" given to "sleazy, corrupt or abusive" judges. "From what I know of the case, the lawsuit won't survive long," said John Mills, the lawyer who prosecuted Cope in Florida for the Judicial Qualifications Commission, a watchdog of judicial behavior. "What I've said all along is that the way Judge Cope has handled the allegations against him has done much more harm to the judiciary than any of the conduct he was charged with." Cope was arrested in April 2001 after the Jeaneses complained to Carmel police that he had tried to enter their hotel room with a stolen key. Cope had met the women earlier when all three were intoxicated, police said. They were vacationing in Carmel and he was attending a judicial conference. Monterey County prosecutors initially charged him with misdemeanor counts of peeping and prowling. The criminal case against him ended in a plea bargain in August 2002, when Cope entered a written no-contest plea of public drunkenness. Five other misdemeanor charges were dropped. Cope was ordered to pay a $1,000 fine and donate $5,000 to charity. He was credited for 28 days served in a Florida residential alcohol treatment center in September 2001, said Lisa Poll, a Monterey County deputy district attorney. The case caused a stir in Florida, where Cope was tried before Florida's Judicial Qualifications Commission in June 2002. According to reports in the St. Petersburg Times, Lisa Jeanes testified that Cope introduced himself by offering to help her in a time of emotional distress. She testified that he then made unwanted sexual advances on the beach and later tried to enter her room. Cope's Florida attorney countered that she was lying to cover up an amorous encounter with the judge. The Florida panel found Cope guilty of public drunkenness and inappropriate behavior but dismissed several other charges. Last August the Florida Supreme Court publicly reprimanded Cope for his behavior, but he remains on the bench. Cope's suit alleges that the women's allegations against him "were without probable cause, were malicious, and made for an improper purpose" and that "all charges against plaintiff (Cope) were favorably terminated in his favor." Prosecutor Poll commented at the time Cope entered his no-contest plea that her office believed the women's account of what went on in Carmel, and that the other misdemeanor charges -- prowling, peeping, aggravated trespassing, petty theft, and battery -- were not dropped for lack of evidence. "We discussed the resolution with (Lisa Jeanes) extensively and with her agreement decided not to put her through the hardship of a trial," Poll said. Prosecutors also felt that bringing in witnesses from Virginia, Maryland, and Florida would be too difficult for them and too costly for local taxpayers, Poll said. Cope's suit alleges that the accusations caused him economic harm and asks for actual and punitive damages in excess of $25,000. Lisa Jeanes said she is working on finding an attorney to respond to the suit within the required 30 days. The suit was filed Aug. 4 but was not formally served on the women until this week because Cope's attorney, Charles Warner of Monterey, had been waiting for legal documents from Florida. Kevin Howe can be reached at 646-4416. ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8142 From: James M. Atkinson Date: Sat Jan 10, 2004 1:24pm Subject: It's a fitting tribute. I would invite list members to check out the following: http://madblast.com/funflash/swf/theUSA.swf It's a fitting tribute. -jma ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8143 From: Date: Sat Jan 10, 2004 5:38pm Subject: pinhole camera attached to ATM was transmitting PIN numbers to van Article published January 10, 2004 ATM thief on probation Paul Raymore Valentin Raducan, 31, pleaded no contest to one charge of fraudulent use of an access card, a misdemeanor, in Nevada County Superior Court Nov. 18. Raducan had initially been charged with two other felony counts, including concealing, selling or withholding stolen property and burglary; however, both of these charges were dismissed. Raducan received three years of conditional probation for his plea (the equivalent of pleading guilty) in addition to 20 days' jail time and a fine of $708.78. Other conditions of his probation: He is required to submit to search and seizure, he is forbidden to possess any access cards such as credit cards and ATM cards unless they have been issued to him, and he is forbidden to possess electronic surveillance equipment. The defendant also agreed to pay restitution, although that amount had not yet been determined. After Raducan's arrest in early November, agents with the FBI were looking into whether Raducan might have ties to an organized crime ring linked to similar activities nationwide. After further investigation, the bureau decided that there was not enough evidence to pursue charges other than those he faced in the state of California. Raducan was arrested Nov. 5 in Truckee after local police noticed him talking with another man on a two-way radio in the vicinity of the U.S. Bank branch on Donner Pass Road. A silver van was parked nearby with the motor running and nobody inside. Inside the van, officers found a laptop computer, a suitcase and a new coffee maker that had recently been purchased from Starbucks Coffee. Further investigation revealed that Raducan had purchased more than $1,100 worth of coffee equipment from Starbucks, using two credit cards that had been reported stolen in the North Lake Tahoe area earlier that day. Officers also found a pinhole camera attached to the U.S. Bank ATM machine, which they believe was transmitting PIN numbers of potential victims to the laptop inside the van. [Non-text portions of this message have been removed] 8144 From: Date: Sat Jan 10, 2004 9:36pm Subject: "They were called 'shorties,'" a term he learned from wiretap surveillance Hints and hunches lead to an ID theft ring and an elusive suspect What began in Hudson County as simple bank-fraud case has mushroomed Sunday, January 11, 203 BY TED SHERMAN Star-Ledger Staff Some knew him as Sug, short for Sugar. Others called him Sabor. He was sued under the name Kendall Dailey and indicted as Annur Hamilton. He had an address in Newark, could be found in Baltimore, was living in a Springfield townhouse, and had an apartment in Hamilton Township outside Trenton. From Our Advertiser The credit card in his wallet was in the name of Barnum. He was arraigned last week on a 31-count indictment in Hudson County, where he now sits in jail on $2.5 million bail. His lawyer says he is the victim of mistaken identity. This is a story of how the man of many names came to be arrested in the parking lot of a Dunkin' Donuts in Plainfield. He is accused of heading a multimillion-dollar identity theft ring that used 29 people and a multitude of fake names to clear out bank accounts across the state. Investigators are still trying to unravel the scheme, which first came to light last year. They say it involved a nurse who provided names of terminally ill patients; several bank employees who supplied account numbers of their customers; state motor vehicle agents who provided bogus licenses; a Newark print shop that made phony documents; and a mortgage broker and real estate appraisers who falsified the value of houses that were bought and sold in the names of people whose identities were stolen. Were it not for a detective's hunch and a car -- a $68,500 silver-gray BMW 745i, registered to a sham address -- an arrest may never have been made in the case, law enforcement officials say. THE HOT WHITE-COLLAR CRIME Identity theft targeted nearly 10 million people last year at a cost of $5 billion to the victims and nearly $48 billion to business and financial institutions, the Federal Trade Commission estimates. It is a relatively easy fraud to commit. Personal and credit data are available to just about anyone. Online or telephone transactions require virtually no human contact. Many victims do not know they have been targeted until their money is gone. The ease of changing identities makes it hard for law enforcement to track suspects. "You are dealing with a phantom, basically, and that makes it more difficult," explained Joel S. Lisker, a former FBI special agent who is senior vice chairman of Dudinsky, Lisker and Associates, a Washington, D.C., consulting and lobbying firm. At the same time, identity theft is not a high priority for most law enforcement agencies, notes Robert D. McCrie, an expert in security management at John Jay College of Criminal Justice in New York. "That's why it's the most rapidly growing white-collar crime in the country," he said. Fraud artists who engage in identity theft typically fragment their activities so if someone does start an investigation, the crime will seem of little significance, McCrie pointed out. That was how it began for Hudson County Prosecutor Edward J. De Fazio. When representatives of the Provident Bank of New Jersey, based in Jersey City, came in one day last year to report apparent tampering with several customer accounts, he thought he had a simple fraud case on his hands, he recalled. The accounts had been converted illegally to make them Internet-accessible, enabling checks to be cut electronically and then mailed out. Provident Bank officials declined to explain how that could happen, but noted none of their customers lost money. The prosecutor said money was streaming out of the accounts. "The checks were being made out to various names and apparent businesses, at $8,000 to $9,000 at a clip, but not in even amounts," he said. "Initially we weren't sure what it was all about, but we saw they were going to a Mailboxes Etc. box in South Orange, so we knew we were on to something." The checks were made out to people and businesses that never saw the money -- all identity theft victims. One check for $7,914.30 was made out to a man with cerebral palsy who was a client of Cerebral Palsy of Essex and West Hudson in Belleville, but the check was mailed to the South Orange address. Later on, his name would turn up on several fraudulent real estate transactions. Investigators found a list of other people with cerebral palsy during a search of one suspect's apartment. Officials at the social service agency declined to comment on the matter. No arrests have been made of anyone connected with the center. In the beginning, De Fazio said, there was no paper trail beyond the identity theft victims, and the amounts of money involved were not particularly large. Many of the transactions stretched far beyond Hudson County. Investigators began recording similar transactions -- some linked by the same names -- in a series of thick, black, three-ring binders that now completely fill a bookcase in the sixth-floor office of the prosecutor. What emerged, said Sgt. Thomas Cooney, a member of the special investigations unit, was the discovery that a small network of operatives, most of them women with forged identification, was being used to cash checks on accounts in banks all over New Jersey -- including Provident, Fleet Bank, Sovereign Bank, PNC Bank and the former First Union. "They were called 'shorties,'" Cooney said of the women, a term he learned from later wiretap surveillance. "Some were paid as much as $1,000 per transaction. They would be dropped off and told if there were any problems, to leave the ID and just walk out." SARA MEETS SABOR Sara Henry had a good job. The 28-year-old registered nurse from Lindenwold in Camden County was employed by Cross Country TravCorps, the nation's largest medical staffing firm. She was living in Philadelphia while on assignment at Frankford Hospital, a small critical-care facility in the Northeast section of the city. In February, she went with a girlfriend to Atlanta for the annual NBA All-Star Game -- a glittery all-weekend extravaganza of flashing lights, thumping music and entertainment by Mariah Carey, as Michael Jordan battled it out on the floor of the Philips Arena with Kobe Bryant and Yao Ming. It was there that Henry met her friend's ex-boyfriend and his cousin, who was introduced to her as Sabor, a young man who tooled around in a high-performance BMW sedan. A transcript of Henry's interview with detectives, part of the public record in the state's case to revoke her New Jersey nursing license, outlines how her involvement began. Henry said she started dating Sabor when she got back home. She quickly learned he went by other names. Once, while they were at dinner, he paid for the meal by pulling out a credit card in the name of Barnum. "Did he ever explain to you who Mr. Barnum was?" Henry was asked. "No," she said. The conversation with her new boyfriend eventually turned to the subject of people who might not worry if their names were borrowed. "He said since you're a nurse, that you could get me into people that were maybe gonna be sick for a while; weren't gonna be checking their mail; somebody that may be dying or didn't have any family," she told investigators. "And he said I could take the names. All I would need is a name and a birthdate." No one would be hurt, she said he told her. "He said that he would take a name from someone; sometimes it was his friend's relatives or other people and he would take their names and put them into a mortgage and then, about a year later, they would reappraise the house for more than what they bought it for and they would sell it and then everyone would get money," Henry said. "The person whose name it was in, the loan would be paid off and then their credit would ... be higher." He suggested she could get 20 percent of any profits. She eventually gave him three names -- all gravely ill patients at Frankford Hospital. One was on life support. Two others were terminal, including a man with lung cancer. THE HUNCH Tom Cooney, the Hudson County investigator, felt as if he was tracking a ghost. He had a list of dummy accounts, reams of ATM activity, fraudulent credit cards, and he began to figure someone was at the center of a growing scheme. His suspect did not have a name. No one knew what the suspect looked like. Still, it wasn't exactly as if the guy was lying low. Cooney's gut told him his target was driving a silver-gray BMW 745i that had been leased and registered to one of the fake names and addresses in the binders. No one was making payments on the sedan. Cooney had only the license plate -- a hook he could not reel in without blowing the whole investigation. He didn't want to arrest the driver right away, not if he wanted any chance of unraveling what increasingly appeared to be a sophisticated fraud ring. In an effort to follow the vehicle and the driver, Cooney began trying to trace transactions on credit cards tied to some of his identity theft victims. As cops have for decades, he stuck pins onto a map to determine where money was being spent. Purchases clustered around Route 22, east of Mountainside, in Union County. "There were places he frequented. Restaurants, gas stations, stores," Cooney recounted. "So we staked out the highway, hoping he would drive down one morning." An undercover unit would be ready to roll off the center island of the east-west state highway and begin tailing the silver-gray BMW. It was a shot in the dark, Cooney readily conceded. As he sat there one morning, staking out the crawling, rush-hour traffic, Cooney glumly realized just how many high-end BMWs are out there. And it might well have ended there, a search for the veritable needle in a haystack, when Cooney spotted the familiar BMW logo atop a Springfield car dealership and played a hunch. Cooney decided he had nothing to lose by talking to the service manager. Maybe the manager had seen the car. "We hit pay dirt. It was just plain luck," he said, smiling as he retold the story. Employees at JMK BMW on Route 22 did remember the car and the driver. "We knew him," said a service adviser. "He came in a few times. We gave him a ride home." The address they had was a townhouse complex on the other side of the highway in Springfield. Two other cars leased under false names turned out to be parked there as well -- a Lincoln Navigator SUV and another BMW. Six weeks later, the prosecutor's office obtained a court order to wiretap cell phones. "We knew there were more people involved. We wanted to see who they were," explained De Fazio. CALLING THE BANKS Cooney still was not sure of the name of the suspect, but he concluded the driver of the BMW was the likely boss of the operation. Investigators in the Hudson County Prosecutor's Office said their cell phone surveillance showed calls to the toll-free numbers of several banks, one after another, to obtain account balances on specific customers. The accounts would then be drained. Lt. Timothy Griffin, commander of the special investigations unit, said: "We knew what they were doing, but not where or when." More surprising to investigators were some calls that led to bank employees. At least two bank employees would be charged with feeding account information about customers to the ring. It was not just bank accounts being looted. At the same time, more cars were being leased under assumed names and disappearing, including a Hummer H2, Mercedes-Benzes, Land Rovers and Jaguars. Authorities told a Randolph schoolteacher, Judy Moore, that several luxury cars had been purchased in her name. "For a couple of months, I was the owner of a Mercedes and a Hummer," Moore recalled later. "We would drive down the highway and see one and say, 'Is that one mine?'" Moore's savings account was raided as well -- a money market account that she had never written a check against. "There was nothing I could have done about it," she said. "The money was gone before I knew it." She did not learn of the fraud until she received a call from the prosecutor's office. Moore is not sure why her account and name were targeted, but an employee of Fleet Bank, identified by prosecutors as Shamia Nichole Jones, 24, of Orange, was later indicted. Fleet Bank quickly restored all of the stolen funds, Moore said. Luxury houses also were being purchased, and second mortgages were providing cash to the buyers through fraudulently inflated appraisals, said De Fazio. In one case, a newly built $895,000 beachfront house in Brigantine was bought, and a second $125,000 mortgage was taken out against an inflated value provided by an appraiser allegedly in on the plan. The real estate scheme extended throughout the state. When De Fazio's investigators swooped in, the group was negotiating to buy a $2.6 million house on Chelsea Drive in Livington, De Fazio said. THE MVC LINK Henry had a girlfriend who worked at the New Jersey Motor Vehicle Commission's Mount Holly agency. The woman, Sheilina Moore, could provide registration documents on vehicles with no questions asked, Henry told detectives. Sabor wanted to meet Sheilina Moore. He had a black 2003 Hummer H2, and Moore would provide documentation in the name of Terry C. Moore. Sabor told Henry that Terry Moore was a relative of his. "For doing this for Sabor, was she paid anything?" investigators asked. "Two thousand dollars," replied Henry. "I put it under the mat of her car she left unlocked in the back." Sheilina Moore was arrested in November by the FBI, accused of participating in a separate ring dealing in driver's licenses on the black market. Moore also got Sabor a driver's license, Henry said. She remembered the last name on the license was Hamilton. THE CRACKDOWN He was a man with many names. After hours of surveillance tapes, they knew him as "Sug." They knew he used the name Jamal Barnum. And they knew him as Annur Hamilton. "We weren't quite sure what his name was until we arrested him," said Cooney. As investigators got closer, the man with many names began to get nervous. He told his girlfriend people were following him. "He called me and said that the FBI were following him and his baby's mother," Henry told detectives. "He said that they didn't have anything on him." It was June, and De Fazio decided he had enough to move in. With 25 search warrants and an army of police and agents from the FBI, authorities made more than 20 arrests and seized cars, documents and computers across New Jersey. According to a search warrant report, authorities found keys to a BMW and Jaguar in Henry's apartment, along with computer equipment, digital cameras and lamination devices that investigators said were used to create phony licenses and ID. Photos of women Cooney identified as operatives in the scheme were found on the computer disk drive. Also discovered were automobile registration certificates for Jamal Barnum, blank New Jersey birth certificates with raised seals from the Township of Livingston and the city of Newark, and bank and brokerage account statements for several potential identity-theft victims, according to the report. Cooney arrested the man with many names outside a Dunkin' Donuts in Plainfield. He was booked as Annur Hamilton, 30, of Hamilton Township. Henry would later identify him from a photograph as the man she knew as Sabor. "He was really in shock," said Cooney, remembering the scene as the man was brought down to Jersey City to be booked. He was sitting there, Cooney said, and more than 20 of "his closest friends show up" to be fingerprinted and photographed. Last week, 23 men and women named in a 31-count indictment were arraigned in Hudson County on charges of conspiracy, theft by deception, identity theft, financial facilitation of criminal activity, possession of motor vehicles with altered identification numbers, and receiving stolen property, said Assistant Prosecutor Mary Ellen Gaffney, who is handling the case. Five others still have not been apprehended. Sara Henry, who had no prior criminal record, pleaded guilty Monday to a downgraded charge of conspiracy to commit fraud -- a third-degree crime that could mean no jail time when she is sentenced. She will be expected to testify as a prosecution witness, Gaffney said. Henry's lawyer, Ron Helmer of Haddon Heights, said his client received nothing for her participation in the scheme. The man with many names sits in the Hudson County jail, on $2.5 million bail. According to Cooney, he was charged with forgery in Union County in 1998 under the name of Kendall Dailey. There is a tax lien against him under several names in Essex County, records show, and a string of different addresses under the name of Hamilton. His attorney, Elise DiNardo of Jersey City, says authorities have the wrong man. "He has a college degree. His father is a physician," said the attorney. "They are alleging he's the mastermind of this organization, but I don't see how that's possible." According to DiNardo, Hamilton buys distressed houses in foreclosure, restores them and resells them for a living. DiNardo said the state has been very vague as to what proof it has, and her client did not know any of the co-defendants in the case. "Mr. Hamilton lives a modest life," she said. Cooney is convinced otherwise. "This," he said, "is a case of people where every instance of their lives -- from the time they got up in the morning until they went to bed at night -- was a fraud." Copyright 2004 NJ.com. All Rights Reserved. [Non-text portions of this message have been removed] 8145 From: Date: Sun Jan 11, 2004 1:23am Subject: Al Qaeda hunt follows old tracks -*Al Qaeda hunt follows old tracks Sat January 10, 2004 09:41 PM ET By Simon Cameron-Moore ANGOR ADDA, Pakistan (Reuters) - U.S. troops on the Afghan side of the border have two simple rules to follow: don't cross over, and radio the Pakistan army first before shooting at any suspected al Qaeda militant spotted over there.T The Pakistani general pointed across the dusty plain on the other side of the frontier from the village of Angor Adda, his finger following a jeep hurtling towards the U.S. base of Shikin a few miles to the north in the Afghan province of Paktia. "The camp is there, see that patch of white?" General Shaukat Sultan said, indicating a faintly visible compound near the foot of a range of ochre and grey hills. Everything in South Waziristan, a tribal area in Pakistan's North West Frontier Province has the same two-tone hue, from the high serrated ridges and rocky slopes of the mountains to the dried out riverbeds and mud walls of its isolated settlements. "Over there," he said sweeping round to another range of hills to the west, "is where our troops killed eight al Qaeda and captured 18 two months ago. "That encounter was billed as a demonstration of the Pakistan army's commitment to the U.S. led "war on terror". Two soldiers were killed. A month later a couple more al Qaeda men were gunned down in the same area. Just last week, the Pakistani army launched another operation against suspected Islamic militants in South Waziristan involving troops and helicopters. The army entered the semi-autonomous tribal areas for the first time in mid-2002 to seal the borders against fugitive al Qaeda and Taliban fighters. President Pervez Musharraf told Reuters just days after the first of two assassination attempts on him in December that the last time Pakistan had any substantial clue al Qaeda kingpin Osama bin Laden or his deputy Ayman al Zawahri were in Pakistan was nearly nine months ago. Electronic surveillance, possibly from one of the U.S.-manned listening posts in the tribal areas, put one of them in Waziristan -- but subsequent searches yielded nothing. BYWORD FOR MILITANCY Waziristan is ideal for any seasoned guerrilla fighter, like bin Laden and al Zawahri, to lie low. The region is redolent with conflict and intrigue. The British military intelligence officer T.E. Lawrence, better known as "Lawrence of Arabia", was in Waziristan in 1928 -- when the Raj was unhappy with a troublesome king in Kabul. For more than 150 years the mountain caves of the North West Frontier provided hiding for holy war warriors, or mujahideen, who India's British colonial rulers dubbed "Hindustani Fanatics". Like bin Laden, they were followers of the strict fundamentalist Wahabi sect of Islam that spread out of Arabia to the Indian sub-continent in the early 19th Century. Their running battles with the British lasted over a century. "We found the ashes of his fire still warm in his cave but he had flown. Our informer as usual informed both ways." Jack Lowis, the British Political Agent for South Waziristan, wrote those words 60 years ago about the hunt for the Faqir of Ipi, a Muslim holy man whose fighters took on the British Raj. The Faqir was never caught, but he represents more than just a historical parallel. His son was reportedly a brother-in-arms of bin Laden, fighting with the mujahideen who drove the Red Army out of Afghanistan in the 1980s. FRIEND OR FOE Pakistan says it has captured more than 500 al Qaeda suspects so far, but its army has suffered casualties in the hunt. At another village in South Waziristan 10 troops and two al Qaeda members were killed in a clash last June. But still, U.S. servicemen carry tales back to reporters in Kabul of Taliban militia slipping over the border for sanctuary in Pakistan, unhindered by watching Pakistani troops. General Sultan bristled with indignation: "There is no question of anyone in the Pakistan army assisting the enemy. They owe their loyalty to the flag, not to any individuals. "Pakistan's forces are full of Pashtuns. And the Taliban, an Islamic student militia that emerged less than two decades ago, is also largely Pashtun. While many tribesmen dislike the Taliban for preaching ways that go against traditional Pashtun culture, local leaders say the ethnic ties mean sympathies for the Taliban are there. To add to the complications of making out friend from foe on the border, a string of friendly fire incidents between U.S. and Pakistani forces highlighted a communication gap. On New Year's Eve last year, a U.S. F-16 warplane dropped a bomb on a madrassa near Angor Adda killing two Pakistani troopsafter an exchange of fire in which a U.S. soldier also died. In August, U.S. forces shot dead two Pakistani soldiers in another "friendly fire" incident in Waziristan -- this time provoking a protest from Musharraf. Procedures have been tightened since. U.S. officers from the Shikin base regularly meet their counterparts in Angor Adda, and keep them informed by radio. Pakistani officers say the U.S. troops are also required to alert them first before firing across the border to avoid return fire. STATUS SYMBOLS Bullets fly regularly in Waziristan even without the two friendly armies' crossfire. The tribes have a gun culture that makes Detroit appear tame. "People really do own heavy arms -- rocket and grenade launchers, sometimes even (shoulder-fired) stinger missiles," Sikander Hayat Khan Sherpao, an opposition lawmaker in Peshawar, a city at the southern end of the Khyber Pass. Olaf Caroe, the last British Governor-General on the Frontier and an authority on Pashtun tribes, compared to the Wazir to a panther and the region's other main clan, the Mahsud, to a wolf. He wrote: "The wolf pack is more purposeful, more united and more dangerous. "Angor Adda is in Mahsud territory. As an army patrol passed by, two Mahsud youths lounged around a Frontier Force checkpoint in the village as if they owned it. The Kalashnikovs cradled in their arms gave them the right to act that way, just as the Martini-Henry rifles and the long-barrelled jezails of their forefathers did in bygone eras. A Pakistan army colonel nodded sagely: "This is a very dangerous place. Every child has a gun." [Non-text portions of this message have been removed] 8146 From: James M. Atkinson Date: Sun Jan 11, 2004 10:48am Subject: Thieves plant spy cameras in Hong Kong cashpoint machines http://www.khaleejtimes.com/DisplayArticle.asp?xfile=data/theworld/2004/January/theworld_January165.xml§ion=theworld&col= Thieves plant spy cameras in Hong Kong cashpoint machines (DPA) 8 January 2004 HONG KONG - Pinhole spy cameras capable of filming people tapping in their PIN numbers have been found hidden in two bank cashpoint machines in Hong Kong, a news report said on Thursday. The cameras - discovered in two machines outside a Hang Seng Bank branch - could transmit images to a remote receiver, according to the South China Morning Post. Hundreds of customers who used the cashpoint machines have now been contacted for their cards to be cancelled although no thefts from accounts had been reported, the newspaper said. Similar hidden cameras have been found fitted into cashpoint machines in mainland China and Malaysia but the discovery at the Hang Seng Bank is the first of its kind in Hong Kong. A Hang Seng Bank spokeswoman refused to tell the newspaper where and how the spy cameras had been fitted into the cashpoint machine cubicles. It is believed thieves may have intended to use the information to empty bank accounts after stealing cashpoint cards from customers following their visits. Alternatively, duplicate cards could be produced so that thieves could then use the PIN numbers to access the accounts of customers they have photographed. Less than 50 reports of thefts involving cashpoint machine transactions were reported in Hong Kong last year, police said. However, only three months ago, Hong Kong Monetary Authority officials advised banks to step up cashpoint machine security amid fears of sophisticated new theft attempts. ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8147 From: Does it matter Date: Thu Jan 8, 2004 1:55pm Subject: Wiretaps, Feds, voip Hope this interests people. Darren The agencies have asked the Federal Communications Commission to order companies offering voice over Internet Protocol (VoIP) service to rewire their networks to guarantee police the ability to eavesdrop on subscribers' conversations. Without such mandatory rules, the two agencies predicted in a letter to the FCC last month that "criminals, terrorists, and spies (could) use VoIP services to avoid lawfully authorized surveillance." The letter also was signed by the Drug Enforcement Administration. This is not the first time the Bush administration has expressed concern about terrorists and other lawbreakers using VoIP to evade wiretaps. As previously reported by CNET News.com, a proposal presented quietly to the FCC in July sought guaranteed surveillance access to broadband providers. But the latest submission, which follows a recent FCC forum on Internet telephony, is more detailed than before and specifically targets VoIP providers as a regulatory focus. In general, VoIP providers have pledged to work with police, and some, like Level 3 Communications, do not oppose the regulations the FBI is seeking. Others, like a coalition of 12 smaller VoIP providers including BullDog Teleworks and PingTone Communications, have told the FCC that "there are various industry initatives under way and the commission should allow those initiatives time to succeed before preemptively regulating." Federal and local police rely heavily on wiretaps. In 2002, the most recent year for which information is available, police intercepted nearly 2.2 million conversations with court approval, according to the Administrative Office of the U.S. Courts. Wiretaps for that year cost taxpayers $69.5 million, and approximately 80 percent were related to drug investigations. Those statistics do not include approximately the same number of additional wiretaps authorized by the Foreign Intelligence Surveillance Act. When weighing the FBI's request, the FCC will have to decide whether a 1994 law called the Communications Assistance for Law Enforcement Act (CALEA) applies to VoIP providers. The law is ambiguous. It clearly requires "telecommunications carriers" to provide ready wiretapping access while explicitly exempting "information services." If the FCC decides CALEA does not apply, the debate would shift to Congress, which could decide to amend the law. When Internet links are used to carry voice calls that begin and end in the traditional, circuit-switched network--a move that Verizon Communications announced Wednesday--that would easily fall within CALEA's existing definitions. But Internet-to-Internet voice links like those offered by VoIP companies Vonage and Skype are closer to information services and fall into a regulatory gray area. The status of voice conversations carried through instant-messaging programs is even more unclear, as is the FCC's ability to compel overseas VoIP providers to comply with U.S. rules. "The FCC should ignore pleas about national security and sophisticated criminals because sophisticated parties will use noncompliant VoIP, available open source and offshore," said Jim Harper of Privacilla.org, a privacy advocacy Web site. "CALEA for VoIP will only be good for busting small-time bookies, small-time potheads and other nincompoops." One unusual section of the FBI letter is that it claims the bureau is seeking to protect Americans' privacy rights: "Mandatory CALEA compliance by VoIP providers would better protect the privacy of VoIP users than a voluntary approach. CALEA protects the privacy of surveillance suspects by requiring carriers to provision the surveillance in a confidential manner." Otherwise, the FBI argues, a VoIP company might turn over a "full pipe" to police that would include conversations of more people than necessary. At least one FCC commissioner has expressed strong support for sweeping VoIP into CALEA's requirements, which currently apply only to telephone companies. "We must understand the concerns raised by DOJ and FBI that classifying Vonage's VoIP as an information service severely undercuts CALEA," Jonathan Adelstein said last month. "VoIP jeopardizes the ability of federal, state and local governments to protect public safety and national security against domestic and foreign threats. Public safety is not negotiable." 8148 From: Brian Varine Date: Fri Jan 9, 2004 1:23pm Subject: Wireless transmitter intrusions This is pretty comical: http://www.ananova.com/news/story/sm_853744.html?menu=news.latestheadlines Burger King customers told: 'You are too fat to have a Whopper' Police believe teenage pranksters are hacking into the wireless frequency of a US Burger King drive-through speaker to tell potential customers they are too fat for fast food. Policeman Gerry Scherlink said the pranksters told one customer who had just placed an order: "You don't need a couple of Whoppers. You are too fat. Pull ahead." The offenders are reportedly tapping into the wireless frequency at the restaurant in Troy, Michigan. Police believe the culprits are watching and broadcasting from close range. Officer Scherlinck said the men are telling customers who order a Coca-Cola that, "We don't have Coke." And when the customer asks what they do have, the hacker would say: "We don't have anything. Pull ahead." But what has managers concerned is the profanity the hackers are using, according to police. A drive-through customer has told police if he had children with him in the car and someone used profanity, he would have been upset. Burger King franchise owner Tony Versace issued the following statement in response to the incidents: "We apologise to our customers who've been insulted by the use of this drive-through speaker." Management at the fast-food restaurant are reportedly trying to change the radio frequency used for the speakers, reports Local 4. 8149 From: James M. Atkinson Date: Mon Jan 12, 2004 11:49am Subject: The Charge of the Light Brigade The Charge of the Light Brigade by Alfred Tennyson. -------------------------------------------------------------------------------- Half a league, half a league, Half a league onward, All in the valley of Death Rode the six hundred. "Forward the Light Brigade! Charge for the guns!" he said. Into the valley of Death Rode the six hundred. Forward, the Light Brigade!" Was there a man dismay'd? Not tho' the soldier knew Some one had blunder'd. Theirs not to make reply, Theirs not to reason why, Theirs but to do and die. Into the valley of Death Rode the six hundred. Cannon to right of them, Cannon to left of them, Cannon in front of them Volley'd and thunder'd; Storm'd at with shot and shell, Boldly they rode and well, Into the jaws of Death, Into the mouth of hell Rode the six hundred. Flash'd all their sabres bare, Flash'd as they turn'd in air Sabring the gunners there, Charging an army, while All the world wonder'd. Plunged in the battery-smoke Right thro' the line they broke; Cossack and Russian Reel'd from the sabre-stroke Shatter'd and sunder'd. Then they rode back, but not, Not the six hundred. Cannon to right of them, Cannon to left of them, Cannon behind them Volley'd and thunder'd; Storm'd at with shot and shell, While horse and hero fell, They that had fought so well Came thro' the jaws of Death, Back from the mouth of hell, All that was left of them, Left of six hundred. When can their glory fade? O the wild charge they made! All the world wonder'd. Honor the charge they made! Honor the Light Brigade, Noble six hundred! ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8150 From: Michael Puchol Date: Sun Jan 11, 2004 4:37pm Subject: Re: Wiretaps, Feds, voip Hi, The greatest problem with this is the very old saying "if you outlaw xxxx, then only outlaws will have xxxx" (substitute the xxxx for your favourite weapon, device, algorithm or communications technology). In this case, what is to stop a criminal using an SSH session and tunnel the VoIP over it? It would look like normal, SSH-encrypted traffic to anyone watching the packets fly by, so the wiretap technology would be useless - unless the SSH keys could be obtained by some method, it is unlikely that the conversation could be recovered in a timeframe of use in an investigation. I just hope that most criminals stay as technically illiterate as they are now - read the "I was a hacker for the mob" article in Wired a couple months ago (nov. or dec. issue, can't remember right now), it's rather interesting. Best regards, Mike ----- Original Message ----- From: "Does it matter" To: Sent: Thursday, January 08, 2004 8:55 PM Subject: [TSCM-L] Wiretaps, Feds, voip > Hope this interests people. > > Darren > > > > > > The agencies have asked the Federal Communications Commission to > order companies offering voice over Internet Protocol (VoIP) service > to rewire their networks to guarantee police the ability to > eavesdrop on subscribers' conversations. > > Without such mandatory rules, the two agencies predicted in a letter > to the FCC last month that "criminals, terrorists, and spies (could) > use VoIP services to avoid lawfully authorized surveillance." The > letter also was signed by the Drug Enforcement Administration. > 8151 From: human being Date: Mon Jan 12, 2004 11:25am Subject: 'MRI system for semiconductors' saw this article about an ''MRI system for semiconductors'' and wondered exactly what it meant. apparently it is for quality control for chips, yet it also said their product line was related signal analyzers. how is this different from the gear that TSCM equipment works-- does the analysis of the guts of a computer and its signaling ever get review? or is this a part of the profession not meant for common review? why i ask is because i read something about how a single photon can affect a single transistor (in space, on a satellite for instance) and previously i wondered how a speaker can also be used as a microphone (as is said in basic texts i've read) - thus, could it be that a chip may be looking like a simple IC yet perform some dual-function, making a radio into a transmitter? and would a signal analyzer or oscilloscope or other tools find such a thing? or, then again, is this not realistic to the field, (of inquiry). brian 'MRI system for semiconductors' // signal analyzer? 'Leisz, 50, is founder, president and CEO of Wavecrest Corp., an Eden Prairie manufacturer of equipment that is fast enough and accurate enough to detect flaws in even the fastest of the hyper-speed semiconductors now under development.' ... 'Today, the speed of Wavecrest's products is measured in attoseconds, which is the time it takes light to traverse not a hair, but an atom. Whoops, there's that glaze again.' brian thomas carroll: research-design-development architecture, education, electromagnetism http://www.electronetwork.org/bc/ 8152 From: Nicolas Gregoire Date: Mon Jan 12, 2004 2:13am Subject: Re: Gen Hawleys politically incorrect mssg On Mon, 2004-01-05 at 18:33, Mitch D wrote: > The plain fact is that our country has, with all our > mistakes and blunders, always been and always will be the > greatest beacon of freedom, charity, opportunity, and affection > in history. If you need proof, open all the borders on Earth and > see what happens. OK. So let's forget that USA is/was giving money and/or weapons to the School of Americas, to Ben Laden, to the contras, etc. Have you ever heard about state-terrorism ? Please read some Chomsky books about this and give a real look to real life. -- Nicolas Gregoire 8153 From: Does it matter Date: Mon Jan 12, 2004 6:47pm Subject: I can "see" you aren't telling the truth? This takes the cake. One little gadget debuting at CES claims to put truth detection voice analysis on the bridge of your nose. "Voice Analysis Eyeglasses" provide real-time analysis on the inside of the lenses about whoever is talking at the time, says its maker, the Israeli company Nemesysco, which developed the technology for counterterrorism and government customers. "A chip inside the glasses is able to read the voice frequency of the person you are talking to," said Beata Gutman, a spokeswoman for the company. "The voice is analyzed through that chip and there are lights that indicate whether the person is lying." She said the truth specs were expected to be available at the end of January for $400-$500. 8154 From: Thomas Shaddack Date: Mon Jan 12, 2004 7:38pm Subject: Re: Wiretaps, Feds, voip (fwd) ---------- Forwarded message ---------- Subject: Re: [TSCM-L] Wiretaps, Feds, voip Date: Tue, 13 Jan 2004 01:54:57 +0100 (CET) From: Thomas Shaddack To: Michael Puchol On Sun, 11 Jan 2004, Michael Puchol wrote: > > The greatest problem with this is the very old saying "if you outlaw xxxx, > then only outlaws will have xxxx" (substitute the xxxx for your favourite > weapon, device, algorithm or communications technology). In this case, what > is to stop a criminal using an SSH session and tunnel the VoIP over it? Maybe the difference between TCP and UDP. VoIP is almost exclusively UDP-only, as little dropouts don't matter while latency is much more important. TCP, if available, is usually only a fallback mode. > It would look like normal, SSH-encrypted traffic to anyone watching the > packets fly by, so the wiretap technology would be useless - unless the > SSH keys could be obtained by some method, it is unlikely that the > conversation could be recovered in a timeframe of use in an > investigation. There are other possibilities as well. Any VPN system will do; industrial standard is IPSec, available for all major platforms - built-in in Windows, available for Linux 2.4 kernel at www.freeswan.org and either built-in or as different-named add-ons for other systems. Another VPN implementation that looks secure is OpenVPN , based on OpenSSL and running on Windows 2000/XP and Linux/BSD/Solaris/Mac. Any kind of VoIP can be run through a VPN. The VPN supplies the encryption of the call. There are even VoIP programs with strong crypto support. My favorite one is the old but good SpeakFreely (don't believe the rumours it's dead - all that happened is that the original author/maintainer steps away from the development which moves to Sourceforge), which runs in both various unixes and Windows; the problem there is the key handshake, which has to be performed by an external application (which then in turn can run SF process and feed it with the negotiated session key). Another one often suggested is Skype, but I'd be wary about it as it's closed-source. My favorite way is using SpeakFreely with session keys prenegotiated and physically exchanged on strips of paper and manually entered in every couple days, and call negotiation (when to call, and the IP addresses to use) done over Jabber or ICQ; more sophisticated software for this is under slow, relaxed-pace development. Even a combination of methods is possible. Occassionally one of my ISP's routers dies and I lose access to good part of the Net - I don't see most foreign IPs, but I see the office I have a VPN connection into, so by setting up a proxy (and UDP forwarding) I can regain the connectivity for the price of couple dozens milliseconds. With an "accomplice" (or a hired machine in a colocation) in other country, it's possible - for the cost of few dollars and couple milliseconds - foil (to certain degree) even traffic analysis, using the offshore machine as a "meeting point". For further increase of cost and delay and dropped packets it's possible to chain such machines as well. Personally I am pretty excited about the recent development of tiny computers with low power requirements and capability to run eg. Linux; they have lots of applications, including but not limited to low-cost mobile secure telephone devices. If time and money permit, I would like to try to hack together such toy. > I just hope that most criminals stay as technically illiterate as they > are now - read the "I was a hacker for the mob" article in Wired a > couple months ago (nov. or dec. issue, can't remember right now), it's > rather interesting. The state of technological literacy is atrocious in all segments of society. For some real stories from the trenches check http://www.userfriendly.org/community_techtalesarchive.html > Best regards, > > Mike > > ----- Original Message ----- > From: "Does it matter" > To: > Sent: Thursday, January 08, 2004 8:55 PM > Subject: [TSCM-L] Wiretaps, Feds, voip > > > > Hope this interests people. > > > > Darren > > > > > > > > > > > > The agencies have asked the Federal Communications Commission to > > order companies offering voice over Internet Protocol (VoIP) service > > to rewire their networks to guarantee police the ability to > > eavesdrop on subscribers' conversations. > > > > Without such mandatory rules, the two agencies predicted in a letter > > to the FCC last month that "criminals, terrorists, and spies (could) > > use VoIP services to avoid lawfully authorized surveillance." The > > letter also was signed by the Drug Enforcement Administration. > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to: > http://docs.yahoo.com/info/terms/ > > 8155 From: Date: Mon Jan 12, 2004 9:47pm Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: How much interest do you have in a new model of phone analyser for TSCM? o A. None at all o B. Somewhat Interested o C. Interested o D. Very Interested o E. Extremely Interested To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1170141 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 8156 From: Fernando Martins Date: Tue Jan 13, 2004 1:51am Subject: Re: pinhole camera attached to ATM was transmitting PIN numbers to van this is a present hazard in Europe, i think there is no need but, there are pictures available of the scam "implementation" watch out for strange boxes (like, in a ATM outside a bank, there is no box with the bank documentation/brochures ... the cam is in the bottom) where we insert the card, the gear is a little more fat (there is a fake one on the top) FM ----- Original Message ----- From: To: Sent: Sunday, January 11, 2004 4:38 AM Subject: [TSCM-L] pinhole camera attached to ATM was transmitting PIN numbers to van > > > > Article published January 10, 2004 > ATM thief on probation > > > Paul Raymore > > Valentin Raducan, 31, pleaded no contest to one charge of fraudulent use of > an access card, a misdemeanor, in Nevada County Superior Court Nov. 18. Raducan > had initially been charged with two other felony counts, including > concealing, selling or withholding stolen property and burglary; however, both of these > charges were dismissed. > > Raducan received three years of conditional probation for his plea (the > equivalent of pleading guilty) in addition to 20 days' jail time and a fine of > $708.78. > > Other conditions of his probation: He is required to submit to search and > seizure, he is forbidden to possess any access cards such as credit cards and ATM > cards unless they have been issued to him, and he is forbidden to possess > electronic surveillance equipment. The defendant also agreed to pay restitution, > although that amount had not yet been determined. > > After Raducan's arrest in early November, agents with the FBI were looking > into whether Raducan might have ties to an organized crime ring linked to > similar activities nationwide. After further investigation, the bureau decided that > there was not enough evidence to pursue charges other than those he faced in > the state of California. > > Raducan was arrested Nov. 5 in Truckee after local police noticed him talking > with another man on a two-way radio in the vicinity of the U.S. Bank branch > on Donner Pass Road. A silver van was parked nearby with the motor running and > nobody inside. > > Inside the van, officers found a laptop computer, a suitcase and a new coffee > maker that had recently been purchased from Starbucks Coffee. Further > investigation revealed that Raducan had purchased more than $1,100 worth of coffee > equipment from Starbucks, using two credit cards that had been reported stolen > in the North Lake Tahoe area earlier that day. > > Officers also found a pinhole camera attached to the U.S. Bank ATM machine, > which they believe was transmitting PIN numbers of potential victims to the > laptop inside the van. > > > > > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to: > http://docs.yahoo.com/info/terms/ > > 8157 From: David Alexander Date: Thu Jan 15, 2004 10:24am Subject: man flies Atlantic with 5 bullets in pocket The big news here in the UK this morning is that a man with a Sierra Leone passport arrived at Heathrow Airport (London, England) with 5 rounds of ammunition in his pocket. He arrived on a flight from the USA. I don't know if the US 'readers' of this list are aware of the problems that flights from the UK (and I suspect other countries too) have had. A lot of flights have either been delayed or cancelled. Also we are very unhappy with the (in our opinion) the high-handed way that the US security authorities have been dealing with other countries. For example, the FBI and DHS are insisting that European countries flout their own privacy laws and supply data about passengers that should not be in the public domain. The net result among most people I know is quite simple - we're not coming to America as long as this is in force. We have zero confidence in the security authorities to keep the information safe and not misuse it. I'd just like to say that right now, we are laughing ourselves stupid. I know it's not you guys who read this list, please don't think I'm having a go at you personally, I'm not. Your postings show how dumba** you think most of this is and how ineffective it is on internal flights. Now you know, it's no better on the international ones either. Considering how long your sea and land borders are I'm sure that, if I wanted to, I could get a whole platoon of 'illegals' into the USA without detection or going anywhere near a scheduled flight. I also think that, with the relatively low value of second-hand airliners at the moment, if I was OBL and looking to repeat 9/11 I'd just buy a couple of old soviet Aeroflot transport aircraft and book them on 'one-way cargo runs' into the USA. My 2c. David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 8158 From: James M. Atkinson Date: Thu Jan 15, 2004 6:40pm Subject: The leak that went awry http://www.csmonitor.com/2004/0116/p11s03-cods.html Commentary > Daniel Schorr from the January 16, 2004 edition The leak that went awry By Daniel Schorr WASHINGTON - The making of a coverup, like the making of a sausage, is not always pleasant to watch. Attorney General John Ashcroft, who rarely recuses himself from anything, has suddenly decided to get out from under the investigation of who leaked the identity of a CIA covert officer. And Mr. Ashcroft, who rarely misses his turn on camera, left it to Deputy Attorney General James Comey to make the announcement - and also to disqualify himself. Why would the Justice Department pass off what looks like a quintessentially Washington investigation to the US attorney in Chicago? Perhaps for that very reason. Fingering CIA officer Valerie Plame after her husband, former Ambassador Joseph Wilson exploded the administration's African-uranium-to-Iraq theory, smacked of typically Washingtonian bureaucratic revenge. Who in the White House could have picked up the telephone and made that vengeful call to columnist Robert Novak? The FBI has presumably interviewed a lot of officials and subpoenaed a lot of telephone records for the week of the leak last June. Mr. Comey says that what led to the attorney general's withdrawal was "an accumulation of facts." If those facts point to someone in the White House who has a personal relationship with the attorney general, it could present a perceived conflict of interest. As US Attorney Patrick Fitzgerald took over the investigation, word was leaked to The Washington Post that maybe no crime was committed in the first place. The Post's source pointed out that while it is a felony under the 1982 Agents' Protection Act to identify a federal agent undercover, this does not apply if the leaker did not know that Ms. Plame was an undercover operative. Nice try! The original Novak column last July that started all the fuss emphasized the importance of his scoop because "the agency has never before declassified that kind of information." White House spokesman Scott McLellan says that no one wants to get to the bottom of this more than President Bush, and that the president has directed staff members to cooperate with the investigation. But, if everyone on the staff were cooperating, the mystery probably would've been solved by now. Who took it on himself or herself to "declassify" a sensitive national security secret? Stay tuned for the 2004 chapter in the story of the leak that went awry. . Daniel Schorr is a senior news analyst at National Public Radio. ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8159 From: James M. Atkinson Date: Fri Jan 16, 2004 3:50pm Subject: CPM-700's and OSCOR's for Sale If any list member is interested I would like to move eight new CPM-700's, three new deluxe OSCOR's, and two new ORION's and can provide a attractive pricing on them along with immediate/next day shipment. All equipment is brand new, unused, unopened, and under a virgin factory warranty I can take all major credit cards, checks, and/or wire transfer. Please email me privately if your interested, -jma ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8160 From: Date: Fri Jan 16, 2004 3:51pm Subject: possible participation of foreign experts in the investigation Eurasia Insight - Wiretap Controversy Flares in Kyrgyzstan Eurasia Insight: WIRETAP CONTROVERSY FLARES IN KYRGYZSTAN 1/16/04 Kyrgyzstan’s presidential and parliamentary votes may be over a year away, but election-related maneuvering is already underway. Both critics and supporters of President Askar Akayev have taken steps in recent days to consolidate their respective forces. Meanwhile, controversy has erupted over the alleged “bugging” of a member of parliament’s office. The bugging controversy began January 14, when MP Ismail Isakov, who chairs the lower house of parliament’s State Security Committee, announced that he had discovered a listening device planted behind a radiator in his office. He hinted the National Security Service (NSS) was responsible for planting the bug, estimating that it had been functioning for up to 18 months, according to a report by the AKIpress news agency. Isakov called for the resignations of Akayev and NSS chief Kalyk Imankulov. Shortly after the initial discovery, bugs were uncovered in the offices of other MPs, including Azimbek Beknazarov and the leader of the Atameken Party, Omurbek Tekebaev. Beknazarov in recent years has been a fierce critic of Akayev’s administration. [For background see the Eurasia Insight archive]. Parliament Speaker Abdigani Erkebayev characterized the discoveries as “anti-constitutional actions,” and the legislature moved to open a probe into the incident. The head of parliament’s International Affairs Committee, Alisher Abdimomunov, suggested that foreign governments were “ready to cooperate with the investigating group,” the Kabar news agency reported January 15. Government officials have rejected the assertion that state security agents were involved. Imankulov, the NNS chief, hinted that government opponents could have staged the incident, insisting that security services haven’t employed “such a technique for the last 10 years,” the Kabar news agency reported. Imankulov went on to say the incident might “be the beginning of a PR campaign” in connection with the scheduled parliamentary vote in early 2005. He also raised the possibility of a “third force” being responsible for the episode. State prosecutors announced that they had opened a formal criminal investigation, citing Criminal Code Article 136, which prohibits unauthorized wiretaps and other invasions of privacy. Imankulov welcomed the possible participation of foreign experts in the investigation. Such experts could “satisfy both parties -- government and opposition -- so that as a result there won’t be doubts about the investigation’s legitimacy,” he said. The bugging controversy flared as political factions started preparing for the parliamentary election. At a January 14 news conference, six opposition parties announced that they were forming a united front called “For People’s Power.” The bloc comprises political movements that have sought to push Akayev from power. On January 12, two pro-government parties Unity and Alga – announced their merger. Such consolidation raises the chances that the political parties will gain a sufficient share of the vote to secure seats in the next parliament. http://www.eurasianet.org/departments/insight/articles/eav011604_pr.shtml [Non-text portions of this message have been removed] 8161 From: James M. Atkinson Date: Sat Jan 17, 2004 11:56am Subject: Profundity GEORGE CARLIN STRIKES AGAIN 1. Ever wonder about those people who spend $2.00 apiece on those little bottles of Evian water? Try spelling Evian backwards: NAIVE. 2. Isn't making a smoking section in a restaurant like making a peeing section in a swimming pool? 3. OK.... so if the Jacksonville Jaguars are known as the "Jags" and the Tampa Bay Buccaneers are known as the "Bucs," what does that make The Tennessee Titans? 4. If 4 out of 5 people SUFFER from diarrhea...does that mean that one enjoys it? 5. There are three religious truths: a. Jews do not recognize Jesus as the Messiah. b. Protestants do not recognize the Pope as the leader of the Christian faith. c. Baptists do not recognize each other in the liquor store or at Hooters. 6. If people from Poland are called Poles, why aren't people from Holland called Holes? 7. Do infants enjoy infancy as much as adults enjoy adultery? 8. If a pig loses its voice, is it disgruntled? 9. Why do croutons come in airtight packages? Aren't they just stale bread to begin with? 10. Why is a person who plays the piano called a pianist but a person who drives a racecar is not called a racist? 11. Why isn't the number 11 pronounced onety one? 12. If lawyers are disbarred and clergymen defrocked, doesn't it follow that electricians can be delighted, musicians denoted, cowboys eranged, models deposed, tree surgeons debarked, and dry cleaners depressed? 13. If Fed Ex and UPS were to merge, would they call it Fed UP? 14. Do Lipton Tea employees take coffee breaks? 15. What hair color do they put on the driver's licenses of bald men? 16. I was thinking about how people seem to read the Bible a whole lot more as they get older; then it dawned on me.... They're cramming for their final exam. 17. I thought about how mothers feed their babies with tiny little spoons and forks, so I wondered what do Chinese mothers use? Toothpicks? 18. Why do they put pictures of criminals up in the Post Office? What are we supposed to do, write to them? Why don't they just put their pictures on the postage stamps so the mailmen can look for them while they deliver the mail? 19. If it's true that we are here to help others, then what exactly are the others here for? 20. You never really learn to swear until you learn to drive. 21. Ever wonder what the speed of lightning would be if it didn't zigzag? 22. If a cow laughed, would milk come out of her nose? 23. Whatever happened to Preparations A through G? ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 8162 From: Steve Uhrig Date: Sat Jan 17, 2004 8:25pm Subject: FCC Radio Museum online courtesy of the Radio Club of America newsletter: http://www.fcc.gov/omd/history Covers the history of radio, ideas which made it possible, more. Emphasis on mobile radio and its applications for safety, business and personal use. Hertz, Marconi, Fessenden, Tesla, Alexanderson, DeForest and Armstrong are mentioned. Something to bookmark and read when you're stuck in a hotel room some evening. Good historical info. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8163 From: Date: Sun Jan 18, 2004 5:51am Subject: NSA relents on files' release NSA relents on files' release Secret agency allows EPA, MDE, Fort Meade to view pollution report; Cursory look shows no problems; Edited version planned because of security fears; access later to full study By Rona Kobell Sun Staff January 18, 2004 Baltimore Sun After months of denying regulators access to a key environmental study, the National Security Agency has opened its doors and its files - if only for a peek. Officials from the Environmental Protection Agency, the Maryland Department of the Environment and Fort Meade's environmental office got their first look last week at the super-secret eavesdropping agency's building contamination study, which outlines potential pollution problems. NSA is situated on a corner of the Fort Meade Army post in Odenton, which has been listed since 1998 on the EPA's Superfund list of the nation's most hazardous sites. Although NSA is not near the main areas of concern, regulators long have suspected that NSA has handled some hazardous waste over the years. But their cursory review of the NSA study didn't yield any red flags. "Based on my brief review, I did not see any regional environmental impacts resulting from historical operations at the NSA campus," said Fort Meade environmental engineer Jeffrey Thornburg. NSA expects to release an edited version of the report to regulators and the public next month. That version will include the environmental studies, but not maps, historical data and building function details that the NSA has deemed sensitive. "The study is currently under review to remove information relating to NSA's plans, operations, and potential security vulnerabilities," an NSA spokeswoman said last week. Federal and state regulators will be able to return to NSA and view the full report if they need more information. Historical data, such as the location of a wood-treatment facility or computer chip-making operation, might explain why certain contaminants turn up in certain places. If the edited report does not answer all such questions, Thornburg said, he'll go back to see the full version. For months, the lack of environmental information from the global code-breaking agency has frustrated regulators and citizens who have been working together to clean up the 86-year-old Army post. Over the past five years, the Army's environmental office has identified close to 200 areas of potential contamination that could cause long-term ground-water and soil problems, most stemming from fuel, solvents and munitions dating to the post's years as a major training camp for soldiers. By last summer, only 30 sites still required further cleanup. Board and Army That swift action and exchange of information improved the once-contentious relations between the Army and the Restoration Advisory Board, the citizen-regulator group overseeing the Superfund cleanup. Rather than participating in the Army's study, the NSA conducted its own in 2002. Last year, NSA officials gave the findings to an EPA representative, but abruptly took the report back, noting new post-Sept. 11, 2001, security concerns. NSA said the report revealed too much about its buildings and their functions. NSA told The Sun last month that it launched the study at the advisory board's request and not in response to Superfund requirements. However, EPA officials considered the pollution study a key part of the regulatory process. Advisory board Chairwoman Zoe Draughon said the NSA agreed to release the information only after the news reports circulated and public pressure increased. "The NSA is releasing the report not because it's the right thing to do, but because it's being forced to do it," she said. "But at this point, I'll take anything." Review by regulators Draughon said she doesn't need to see the unedited report as long as the regulators can review it. "NSA can't check themselves and say, 'Oh, we're OK,'" she said. "They have to let the people who are supposed to do the checking do their jobs." Board members hope that the NSA's cooperation is a sign that the agency's door may be opening more than just a crack. In the past few months, NSA and Army officials have met more frequently. "We're bridging any sort of gaps in our relationship," Thornburg said. "This is really setting the tone for future communication between NSA and Fort Meade." [Non-text portions of this message have been removed] From: Mitch D Date: Mon Jan 3, 2005 1:06am Subject: Re: un-bug / VLF reception PS to JMA's answer: if its not tx'ing or powered,only a nljd,or physical search would find it. __________________________________ Do you Yahoo!? Meet the all-new My Yahoo! - Try it today! http://my.yahoo.com 10497 From: Rob Muessel Date: Mon Jan 3, 2005 9:35am Subject: RE: Sweep needed Roger- I can recommend Steve Whitehead and Lorenzo Lombard of TSCM Services in South Africa. I've known these guys for 10+ years and they will do the job quite well. Best Regards, Rob Muessel -- -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 www.tscmtech.com USA -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Sunday, January 02, 2005 10:53 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Sweep needed Sweep needed in South Africa. Roger Tolces Electronic Security. Co. HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.825 / Virus Database: 563 - Release Date: 12/30/2004 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10498 From: James M. Atkinson Date: Mon Jan 3, 2005 9:25am Subject: Re: un-bug / VLF reception At 02:06 AM 1/3/2005, Mitch D wrote: >PS to JMA's answer: >if its not tx'ing or powered,only a nljd,or physical search >would find it. TDR Analysis of the power lines would have found it, so would thermal imagery, and acoustic sounding. A magnetic analysis of the area with a gauss probe (not a metal detector) would likely have revealed it as well. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10499 From: DJ Date: Mon Jan 3, 2005 6:50pm Subject: Microphones Steve you could probably answer this one. In the movie Enemy of the State (steve did a great job here), I saw many microphones used at long ranges to listen into the subjects conversations. Does anyone have any whitepapers or any other information on the availability of microphones that will work at a distance of over 20 feet from the subject? Thanks, IT2 Garrett 10500 From: fjansgmxnet Date: Tue Jan 4, 2005 8:15am Subject: Re: un-bug / VLF reception > A magnetic analysis of the area with a gauss probe (not a metal detector) would likely have revealed it as well. Very interesting point. If I would use some sensitve hall sensor as a gauss probe, what will I see in what range from the UN-bug? I would expect an AC magnetic field of a few milli-gauss in a range of about 10 to 20 cm apart from this bug, if the bug is in the non transmitting / non batterie loading mode, correct? Best regards, Frank 10501 From: delta Date: Tue Jan 4, 2005 8:33am Subject: looking for a tdr hello everybody i m looking for a little tdr portable to test telephone wire here in france what kind of product can i buy ? any reference ? someone here can help me to find this product at resonnable price ? many thanks david from paris 10502 From: Larry Nevin Date: Tue Jan 4, 2005 9:27pm Subject: Re: looking for a tdr David, I have a Riser Bond TDR that is in great shape. I am no longer in the business and I have not used it in three years. The unit has all of the manuals and cables in its own plastic case. If that fits your need I will sell it at a greatly reduced price. Thanks, Larry Nevin Fire In The Hole Inc. --- delta wrote: > > hello everybody > i m looking for a little tdr portable to test telephone wire here in france > what kind of product can i buy ? any reference ? > someone here can help me to find this product at resonnable price ? > many thanks > david from paris > > > > > ===== "EXPECT MORE THAN OTHERS THINK POSSIBLE!" 10503 From: delta Date: Wed Jan 5, 2005 1:48am Subject: Re: looking for a tdr hello larry and many thanks for your answer can you tell me the model you have to sell to me ? the price of course to buy your tdr here in france ? many thanks please contact me direct with my email agenceadi@o... david from paris 10504 From: James Greenwold Date: Wed Jan 5, 2005 6:31pm Subject: Re: Digital Cell phone scanning In days of old, (the analog days) We had software running a R7000. And could find the number we were looking for and follow the tower pass as the cell taveled along. I get ask regularily about the ability to scan a cell phone. I'm ask mostly by "foil hat club" members. But real or not the question is asked. Now, almost all phones are digital. The common answer would be that a phone could be hacked and turned into a scanner for close proximaty, but I have not seen one. So I ask you guys... How easy it is to listen to cell phone conversation and what is the level of the threat? Can the estranged husband be listening to his wife? Or is the tech needed place it in the expert mode? -- Thank you for your time James Greenwold Bureau Of Technical Services 715-726-1400 bts@t... 10506 From: J. Coote Date: Wed Jan 5, 2005 9:17pm Subject: RE: looking for a tdr David, You might find a used Tektronix 1502B, 1502C, 1503B or 1503C. These will do a good job on unenergized lines. The TDRs have some front-end voltage protection, but better to be careful. Tektronics had a protector or adapter for live lines, but I don't know the model number. The 1502 series is limited to 2,000 feet I believe but has good resolution. The 1503 series go to many times that. Another name that comes to mind is Riser-Bond. They make several TDRs. The very cheap TDRs only give basics, such as distance to open or distance to short and are unsuitable for TSCM. You might also look for companies who lease or rent test equipment. Jay -----Original Message----- From: delta [mailto:agenceadi@o...] Sent: Tuesday, January 04, 2005 6:33 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] looking for a tdr hello everybody i m looking for a little tdr portable to test telephone wire here in france what kind of product can i buy ? any reference ? someone here can help me to find this product at resonnable price ? many thanks david from paris 10507 From: Ian Wraith Date: Thu Jan 6, 2005 5:18am Subject: Re: Digital Cell phone scanning Hello James Greenwold wrote: > So I ask you guys... > How easy it is to listen to cell phone conversation and what is the level of > the threat? Can the estranged husband be listening to his wife? Or is the > tech needed place it in the expert mode? With an encrypted digital cell phone systems such as GSM the threat from monitoring comes from Government agencies and there is no risk of estranged husbands listening. There are a few sites on the internet advertising GSM monitoring equipment but usually this equipment looks very suspect. I have been told there are a few digital mobile phone systems in the US which have no encryption but even with those I have yet to see any hobbyist level equipment for monitoring. Regards Ian 10508 From: Hawkspirit Date: Thu Jan 6, 2005 10:48am Subject: Sweeps needed Home sweep needed in Naples Florida Business sweep needed in Flint, Michigan If you can handle these contact me ASAP. Roger Tolces Electronic Security Co. 760-329-4404 HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.825 / Virus Database: 563 - Release Date: 12/30/2004 [Non-text portions of this message have been removed] 10509 From: James M. Atkinson Date: Thu Jan 6, 2005 10:59am Subject: Warning: Don't brush teeth with toilet brush! http://www.msnbc.msn.com/id/6794153/ Warning: Don't brush teeth with toilet brush! Awards handed out for wackiest consumer warnings The Associated Press Updated: 10:15 a.m. ET Jan. 6, 2005 DETOIT - The sign on the toilet brush says it best: "Do not use for personal hygiene." That admonition was the winner of an anti-lawsuit group's contest for the wackiest consumer warning label of the year. The sponsor, Michigan Lawsuit Abuse Watch, says the goal is "to reveal how lawsuits, and concern about lawsuits, have created a need for common sense warnings on products." The $500 first prize went to Ed Gyetvai, of Oldcastle, Ontario, who submitted the toilet-brush label. A $250 second prize went to Matt Johnson, of Naperville, Ill., for a label on a children's scooter that said, "This product moves when used." No oral use A $100 third prize went to Ann Marie Taylor, of Camden, S.C., who submitted a warning from a digital thermometer that said, "Once used rectally, the thermometer should not be used orally." This year's contest coincides with a drive by President Bush and congressional Republicans to put caps and other limits on jury awards in liability cases. "Warning labels are a sign of our lawsuit-plagued times," said group President Robert Dorigo Jones. "From the moment we raise our head in the morning off pillows that bear those famous Do Not Remove warnings, to when we drop back in bed at night, we are overwhelmed with warnings." The leader of a group that opposes the campaign to limit lawsuits admits that while some warning labels may seem stupid, even dumb warnings can do good. "There are many cases of warning labels saving lives," said Joanne Doroshow, executive director of the Center for Justice and Democracy in New York. "It's much better to be very cautious ... than to be afraid of being made fun of by a tort reform group." The Wacky Warning Label Contest is in its eighth year. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10510 From: secureoffice Date: Thu Jan 6, 2005 1:39pm Subject: Re: Microphones Jim It's not my place to comment on the relationship between two people or how they behave. I was simply pointing out the fact. It was not meant as a condemnation or opposite. As a list owner you are perfectly entitled to do what you see fit. However, it's not my place to comment on who was right or wrong, and I won't. I was simply letting Mr Garrett know that he should contact Steve directly should he require his specific response. I trust the matter requires no further explanation. Kindest regards -Ois --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > Ois, > > The only time that I have ever banned or removed someone from the list is > when that person becomes extremely disruptive and rude or abusive to the > list membership, or if I catch them doing naughty, naughty things. > > Steve was indeed banned from this group a few months back, but only after > his repeat transgressions significantly exceeded his welcome and my > tolerance of his often offensive Prima Donna behavior. tripped the squelch > circuit. He was given ample time to mend his behavior for at least six > month before his being banned. > > "sapiens timet et declinat malum stultus transilit et confidit, > Proverb14:16 > > The list needs good communications, and a place where members can ask > questions and discuss all levels of TSCM from the beginner and apprentice > levels to the Technician and Engineering levels. The list exists to > improve the profession, and for no other purpose. > > Also, greetz to the list members who are going out to the Little Red School > house for the first time, enjoy the daily commute (you know who you are). > > -jma > > > > At 02:26 PM 1/5/2005, secureoffice wrote: > > > >Steve was banned from the group by the group owner, you'll need to > >email him directly if you want his opinion. > > > >Regards > > > >-Ois > > > > > >--- In TSCM-L@yahoogroups.com, "DJ" wrote: > > > > > > > > > Steve you could probably answer this one. In the movie Enemy of the > > > State (steve did a great job here), I saw many microphones used at > > > long ranges to listen into the subjects conversations. Does anyone > > > have any whitepapers or any other information on the availability of > > > microphones that will work at a distance of over 20 feet from the > > > subject? > > > > > > Thanks, > > > IT2 Garrett > > > ---------------------------------------------------------------------------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- 10511 From: Dragos Ruiu Date: Thu Jan 6, 2005 0:20pm Subject: Call For Articles: MISC Magazine - CanSecWest/core05 (Details in French Below) Win a trip to attend CanSecWest/core05. Get published in MISC Magazine. Contest Details: You just have to write an original article (3500-4000 words) for publication in MISC Magazine on any topic related to computer security: exploit writing, (anti-)virus, (anti-)forensics, network, protocol manipulation, honeypots, IDS/IPS, reverse engineering, telecoms, and so on... For a list of subjects already covered in the magazine have a look at http://www.miscmag.com/sommaire.php The best submitted article (details below) will win a free trip (airfare, hotel) and conference registration. All contest information available on http://www.miscmag.com/csw05-tc.php The conference website can be found at http://cansecwest.com The CanSecWest/core05 conference consists of tutorials on technical details about current issues, innovative techniques and best practices in the information security realm. Many famous researchers contribute each year. The attendees are a multi-national mix of professionals involved on a daily basis with security work and provide a social networking opportunity to mingle with eminent technical researchers. It will be held on May 4-6 at the Mariott Renaissance hotel in downtown Vancouver, British Columbia, Canada. MISC is a french magazine focusing on information security. Each issue features an in-depth coverage of a specific topic through a series of articles exploring the subject. Beside this key theme regular columns provide the reader with advanced techniques pertaining to information security. Because security can not be limited to technical and scientific aspects MISC also covers domains like law or information warfare. The winning article submission receives: - registration for CanSecWest/core05 donated by the conference - 4 nights in the conference hotel (Mariott Renaissance) paid for by the conference (though incidental costs are still your responsibility). - a round-trip to Vancouver (Canada), paid by Diamond Edition (the winner must have a valid passport and visa if needed) - the publication of your article in MISC, paid at the regular MISC rate (to use as spending money on your trip). The committee will select the best article which will be published in MISC Magazine. The 5 following criteria will guide the committee's choice: 1) education: how much does it teach? 2) innovation: how is it new? 3) technical level: what is the technical level of the article? 4) applicability: does it affect a lot of people? 5) style: grammar, orthography, syntax, clarity, ... More than one article may be published in MISC Magazine, but only the best one will win the trip. To have a chance to win, send article submission by email to csw05@m... along with the following information before the 29th of January 2005: 1) Author, and geographical location (country of origin/passport) and contact info (e-mail, postal address, phone, fax). We need a real name and real contact details or we won't be able to pay for the trip. 2) Employer and/or affiliations. 3) 3 to 5 keywords describing the topic of the proposal 4) The article, written either in French or English, and using the style sheets available at http://www.miscmag.com/styles/ 5) Optionally, any samples (code or whatever) related to the article. 6) The folowing declaration: I, , hereby certify that the submitted article has been written by me and that I own the intellectual property contained in it. I, , give Diamond Editions the right to publish this article in their magazines. If a submission is incomplete, the article will not be considered for the challenge. Only one submission per person is allowed - if there are multiple submissions, only the last one will be considered. Please submit all proposals by January 29 latest. Results will be communicated to the participants on the 15th February 2005. MISC Magazine : http://www.miscmag.com CanSecWest/core05 : http://cansecwest.com --------------------- CanSecWest/core05 - MISC Magazine Gagner un sÈjour pour assister ‡ CanSecWest/core05. Comment faire ? Simplement en Ècrivant un article original de 3500-4000 mots sur le thËme de la sÈcuritÈ informatique : techniques d'exploits, (anti-)virus, (anti-)forensics, manipulation de rÈseau, dÈtournement de protocoles, pots ‡ miel et autres IDS/IPS, reverse engineering, tÈlÈcoms, etc... Pour dÈcouvrir les sujets traitÈs dans MISC, vous pouvez visiter http://www.miscmag.com/sommaire.php. Tous les dÈtails sur : http://www.miscmag.com/csw05-tc.php La confÈrence CanSecWest/core05 se compose de tutoriaux sur les questions actuelles, les techniques innovatrices et les meilleures pratiques dans le domaine de sÈcuritÈ de l'information. De prestigieux orateurs y participent chaque annÈe, permettant ainsi aux auditeurs de se tenir informÈs des derniËres nouveautÈs du secteur. Elle se dÈroule du 4 au 6 Mai 2005 ‡ Vancouver (Canada). Le magazine franÁais ´ 100% sÈcuritÈ informatique ª MISC est composÈ d'un dossier traitant de maniËre approfondie d'un thËme, et de nombreuses rubriques permettant ‡ chacun de dÈcouvrir les techniques avancÈes liÈes ‡ la sÈcuritÈ de l'information. MISC traite Ègalement des domaines connexes (droit ou guerre de l'information par exemple) car la sÈcuritÈ de l'information ne se limite pas ‡ des problËmes techniques et scientifiques. Prix pour le vainqueur : - l'entrÈe ‡ CanSecWest - 4 nuits d'hÙtel ‡ l'hÙtel de la confÈrence (Mariott Renaissance) - le billet d'avion pour se rendre ‡ Vancouver, achetÈ par Diamond Edition (le vainqueur devra disposer, si besoin, d'un passeport valide et d'un visa pour le Canada) - la publication de l'article, rÈmunÈrÈ au tarif normal des auteurs de MISC, dans un numÈro ‡ venir de MISC. Le jury sÈlectionnera la meilleure proposition, qui sera ensuite publiÈe dans MISC Magazine. La barËme se dÈcompose en 5 critËres, d'importance Ègale : 1) Èducation : l'article est-il pÈdagogique ? 2) innovation : quelle(s) part(s) de nouveautÈ ? 3) technicitÈ : quel est le niveau technique de l'article ? 4) portÈe : est-ce que cela concerne beaucoup de personnes ? 5) style : orthographe, grammaire, clartÈ, ... Tous les bons articles seront susceptibles d'Ítre publiÈs dans MISC, mais seul le meilleur remportera le voyage ‡ CanSecWest. Pour participer, il faut envoyer un mail ‡ csw05@m... avec les informations suivantes avant le Samedi 29 Janvier : 1) prÈsentation : nom, prÈnom, ville/pays d'origine, nationalitÈ, contact (e-mail, adresse postale, tÈlÈphone, fax) Attention : sans ces informations, votre prix ne pourra vous Ítre remis. 2) employeur et/ou affiliation 3) 3-5 mots clÈ pour caractÈriser l'article 4) l'article, Ècrit en Anglais ou en FranÁais, et respectant les feuilles de style : http://www.miscmag.com/styles/ 5) Èventuellement, des exemples (codes ou autres) liÈs ‡ l'article 6) La mention suivante : Je soussignÈ dÈclare sur l'honneur Ítre l'auteur de l'article soumis afin de participer au concours, et que j'en dÈtiens donc les droits de propriÈtÈ intellectuelle. En cas de victoire, j'autorise Diamond Edition ‡ faire usage de mon article dans leurs publications. Tout mail incomplet invalidera la participation. Une seule participation par personne est autorisÈe. Date limite de participation : Samedi 29 Janvier 2005, date de rÈception du mail faisant foi. Liens utiles MISC Magazine : http://www.miscmag.com CanSecWest/core05 : http://cansecwest.com -- World Security Pros. Cutting Edge Training, Tools, and Techniques Vancouver, CanadaMay 4-6 2005 http://cansecwest.com pgpkey http://dragos.com/ kyxpgp 10512 From: delta Date: Thu Jan 6, 2005 0:27pm Subject: Re: looking for a tdr many thanks jay for your help i think i m going to buy a riserbond 3300 here in france thanks to all for your help and your experience with tdr i think this mailing liste is very good david 10513 From: Lawrence Dillard Date: Thu Jan 6, 2005 3:34pm Subject: Lawrence D. Dillard This is to tell all his friends, Larry died in his sleep, sometime last night or early this morning. If you need to know more , or want to contact me, my e-mail address is cdillards@m..., 303-661-0660 Cheryle 10514 From: Hawkspirit Date: Thu Jan 6, 2005 9:00pm Subject: Sweep Needed Anyone have a portable x-ray unit for a sweep in Cincinnati Ohio? Roger Tolces Electronic Security Co. HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.825 / Virus Database: 563 - Release Date: 12/30/2004 [Non-text portions of this message have been removed] 10515 From: littledog Date: Fri Jan 7, 2005 11:48am Subject: vonage? Hello, could anyone out the give me their insight on the new broadband cable phone services? Are they more or less secure and since it seems that everything is controlled through a website (or is it?) like customizing the service to a record of all incoming and outgoing calls, are they vulnerable to hackers? I'm new and still in the little red schoolhouse..thanx 10516 From: Agent Geiger Date: Fri Jan 7, 2005 6:15pm Subject: Re: vonage? I have been using the service for several months with no problems. --- littledog wrote: > > Hello, could anyone out the give me their insight on > the new broadband cable phone services? Are they > more or less secure and since it seems that > everything is controlled through a website (or is > it?) like customizing the service to a record of all > incoming and outgoing calls, are they vulnerable to > hackers? I'm new and still in the little red > schoolhouse..thanx > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Find what you need with new enhanced search. http://info.mail.yahoo.com/mail_250 10517 From: James M. Atkinson Date: Fri Jan 7, 2005 6:43pm Subject: Re: vonage? The quality of the audio tends to be less then that of a hard wired dedicated phone line with annoying echo's and barrel effect audio. Security is another question... because there is none. -jma At 12:48 PM 1/7/2005, littledog wrote: >Hello, could anyone out the give me their insight on the new broadband >cable phone services? Are they more or less secure and since it seems that >everything is controlled through a website (or is it?) like customizing >the service to a record of all incoming and outgoing calls, are they >vulnerable to hackers? I'm new and still in the little red schoolhouse..thanx ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10518 From: Agent Geiger Date: Fri Jan 7, 2005 8:51pm Subject: Re: vonage? There is no real security on ANY phone line. However, my line quality has been just as good a traditional landline. It depends on the quality of your Internet connection. The number can also have ANY area code and is very portable. Not to mention, is very cheap. --- "James M. Atkinson" wrote: > > The quality of the audio tends to be less then that > of a hard wired > dedicated phone line with annoying echo's and barrel > effect audio. > > Security is another question... because there is > none. > > -jma > > > > At 12:48 PM 1/7/2005, littledog wrote: > > > >Hello, could anyone out the give me their insight > on the new broadband > >cable phone services? Are they more or less secure > and since it seems that > >everything is controlled through a website (or is > it?) like customizing > >the service to a record of all incoming and > outgoing calls, are they > >vulnerable to hackers? I'm new and still in the > little red schoolhouse..thanx > > > ---------------------------------------------------------------------------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and > Real Wiretappers. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson > Phone: (978) 381-9111 > Granite Island Group Fax: > > 127 Eastern Avenue #291 > Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent > Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10519 From: David Kervin Date: Fri Jan 7, 2005 6:17pm Subject: Technical Surveillance Countermeasure Personnel Technical Surveillance Countermeasure Personnel General Information Document Type: Presolicitation Notice Solicitation Number:HQ0095-05-R-0012 Posted Date:Jan 06, 2005 Original Response Date:Jan 24, 2005 Current Response Date:Jan 24, 2005 Original Archive Date:Feb 08, 2005 Current Archive Date:Feb 08, 2005 Classification Code:R -- Professional, administrative, and management support services Set Aside:Total Small Business Naics Code:561611 -- Investigation Services Contracting Office Address Other Defense Agencies, Washington Headquarters Services, Acquisition and Procurement Office, Acquisition and Procurement Office, RDF, Room 1F1K711B 1155 Defense Pentagon, Washington, DC, 20301-1155 Description The contractor shall provide personnel that are Agilent certified to perform duties of management, coordination, and operation of advanced radio frequency monitoring equipment. The contractor will be responsible for the analysis of all signal data collected. Duties shall include the configuration of equipment to optimize performance, maintenance of a Windows 2000 network server, investigative data analysis, database management, advice and assistance for system development from software packages used to assist in collection and analysis. The contractor shall resolve any anomalies the system may detect and provide monthly progress reports of the systems development to the PFPA Technical Security Program Manager. The contractor shall provide quarterly status briefings to senior Department of Defense executives, policy and decision makers. This requirement will be solicited as a sole source requirement to Vector Technologies, LLC. The NAICS code associated with this requirement is 561611. Point of Contact Patricia Hill, Contract Specialist, Phone 703 614 6354, Fax 703 692 0811, Email patricia.hill.ctr@w... - Jeraline Artis, Procurement Analyst, Phone (703) 697 4350, Fax (703) 692 4091, Email jeraline.artis@w... Place of Performance Address:Pentagon Force Protection Agency 9000 Defense Pentagon, Room 4E139 Washington D.C. Postal Code:20301 [Non-text portions of this message have been removed] 10520 From: dj Date: Fri Jan 7, 2005 7:49pm Subject: Re: vonage? Vonage/Lingo/Primus .. basically all work the same way. The voice quality is a little less because of the compression but these type of q's are right up my alley. I work as a technology consultant and have been working with Voice Over IP for sometime now. The calls are not encrypted by no means and are vulnerable to about any type hack. The boxes that control these are similar in nature to cisco's voip but different in the fact that they provide a client with a dial tone on the down side of the box. The boxes have a mac address and obtain a ip through a dchp server. The big problems with them is that with NAT they tend to loose their stay alive signals. Lets say that the call generates on port 5060 and then another call comes in to the box via call waiting. NAT will migrate that port to lets say 17500 and keep the orginal call at that port. That port is migrated at your local router and not on the service providers end. So the keep alive signal ... (really just a packet) that says that this call shouldn't be disconnected is send to the box at port 5060 and cannot find an active conversation because you hung up with your 3rd party. So the system disconnects you. Also about 9 minutes into a call they boxes all seem to migrate with NAT to a new port number due in part to trying to free up lower level port numbers for use by local apps. Using Cain and Able a program that is readily available you can simply enumerate the MAC and IP of the local box and then using a port scanner see which port it is operating on. Solar Winds does this with no problem but there are a million port scanners and network analyzer/sniffers that one can use. If one does not password protect and encrypt the password of the administration side of the boxes it is simple to take control of ones box. As for putting the packets back together to generate the original call. Well I haven't found a program that will do that very well but let me know if you do. v/r, IT2 Garrett --------------------------------- Do you Yahoo!? Yahoo! Mail - You care about security. So do we. [Non-text portions of this message have been removed] 10521 From: Michael Puchol Date: Sat Jan 8, 2005 4:07am Subject: Re: vonage? Hi, A couple of months ago a phreaker demonstrated that you can give yourself any caller ID you want if you have a Vonage account, at least for a while. He simply called Vonage and gave them the number of a well-known TV actor, and told them it was his landline number, if they could link the caller ID of his VoIP account to this number. Amusingly, they complied without any questions, and he now could make calls using the actor's caller ID, and all calls made on the Vonage network to the actor's phone would be re-routed to the phreaker's VoIP phone. Vonage's comments were that yes, they would put any caller ID a costumer requests, it could even be President Bush's phone number (yes, they did say this!), and then do a check with the phone company involved, which could take some two weeks. So for two weeks you could make phone calls pretending to be anyone you want. Doesn't say much for them IMHO... Regards, Mike 10522 From: Tech Sec Lab Date: Sat Jan 8, 2005 7:49am Subject: RE: Technical Surveillance Countermeasure Personnel Does anyone have any info or experience regarding the Agilent certification? Please respond off list, Kind regards -Ois ******************************************** Message: 5 Date: Sat, 8 Jan 2005 02:17:12 +0200 From: "David Kervin" Subject: Technical Surveillance Countermeasure Personnel Technical Surveillance Countermeasure Personnel General Information Document Type: Presolicitation Notice Solicitation Number:HQ0095-05-R-0012 Posted Date:Jan 06, 2005 Original Response Date:Jan 24, 2005 Current Response Date:Jan 24, 2005 Original Archive Date:Feb 08, 2005 Current Archive Date:Feb 08, 2005 Classification Code:R -- Professional, administrative, and management support services Set Aside:Total Small Business Naics Code:561611 -- Investigation Services Contracting Office Address Other Defense Agencies, Washington Headquarters Services, Acquisition and Procurement Office, Acquisition and Procurement Office, RDF, Room 1F1K711B 1155 Defense Pentagon, Washington, DC, 20301-1155 Description The contractor shall provide personnel that are Agilent certified to perform duties of management, coordination, and operation of advanced radio frequency monitoring equipment. The contractor will be responsible for the analysis of all signal data collected. Duties shall include the configuration of equipment to optimize performance, maintenance of a Windows 2000 network server, investigative data analysis, database management, advice and assistance for system development from software packages used to assist in collection and analysis. The contractor shall resolve any anomalies the system may detect and provide monthly progress reports of the systems development to the PFPA Technical Security Program Manager. The contractor shall provide quarterly status briefings to senior Department of Defense executives, policy and decision makers. This requirement will be solicited as a sole source requirement to Vector Technologies, LLC. The NAICS code associated with this requirement is 561611. Point of Contact Patricia Hill, Contract Specialist, Phone 703 614 6354, Fax 703 692 0811, Email patricia.hill.ctr@w... - Jeraline Artis, Procurement Analyst, Phone (703) 697 4350, Fax (703) 692 4091, Email jeraline.artis@w... Place of Performance Address:Pentagon Force Protection Agency 9000 Defense Pentagon, Room 4E139 Washington D.C. Postal Code:20301 [Non-text portions of this message have been removed] 10523 From: Hawkspirit Date: Sat Jan 8, 2005 0:51pm Subject: TSCM History For those of you who collect TSCM history http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category=73336&item=5741413404 &rd=1 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.825 / Virus Database: 563 - Release Date: 12/30/2004 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.830 / Virus Database: 565 - Release Date: 1/6/2005 [Non-text portions of this message have been removed] 10524 From: Brian Varine Date: Sat Jan 8, 2005 7:35am Subject: Vonage/VoIP ----- Original Message ----- From: To: Sent: Saturday, January 08, 2005 5:21 AM Subject: [TSCM-L] Digest Number 1787 > Hello, could anyone out the give me their insight on the new broadband > cable phone services? Are they more or less secure and since it seems that > everything is controlled > through a website (or is it?) like customizing > the service to a record of all incoming and outgoing calls, are they > vulnerable to hackers? I'm new and still in the little red > schoolhouse..thanx Most VOIP providers are not "secure" but then again, neither are hardwired phones. All VoIP providers are using well known protocols for signalling and codecs so it's not difficult to tap a call. If the attacker can see the packets, they can decode the voice. There is a new VoIP freeware detector and recorder called VoIPong that works off Linux (http://www.enderunix.org/voipong/), it handles G.711 (64k) and they are looking to support G.723 and G.729 (8k). The other part of VoIP to secure is the call manager system. Most vendors are using standard Windows 2000/Windows 2003 Servers so security can vary from non-existant to really good, it all depends. I would ass*u*me companies like Vonage have good security on their call management systems since all of their services are directed at Internet users. I have audited some enterprises with VoIP systems and the security is typically not very good. Their rationale is they are "protected" by a firewall so why secure/harden the servers. A lot don't realize that if their network gets bombed (ala Nimda/Code Red/SQL Slammer), they lose their phone service. A few enterprises fortunately have done it right..secure servers on a protected subnet with the voice traffic going over separate VLAN's and wire. 10525 From: savanted1 Date: Sat Jan 8, 2005 1:46pm Subject: Comments Dear, Esteemed Group Members I have just formed the TICSA Study group on Yahoo. Please by all means feel free to join and participate in educating yourself towards ascertaining the TICSA Certified Associate credential. Group home page: http://groups.yahoo.com/group/TICSAStudy Group email address: TICSAStudy@yahoogroups.com Regards, 10526 From: Date: Sat Jan 8, 2005 11:34am Subject: Security Considerations For VOIP Systems January 2005 http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:11am Subject: Counter-intelligence entity formed Counter-intelligence entity formed http://www.dawn.com/2001/01/06/int11.htm WASHINGTON, Jan 5: President Bill Clinton has ordered the creation of a special entity to make US counterintelligence more responsive to new threats unlike Cold War "cloak and dagger" spy challenges, the White House said on Friday. "A threat today can as easily come from a laptop as it could from an old, cloak-and-dagger spy, and we need a counterintelligence capability that matches that new globalized reality," said Clinton spokesman Jake Siewert. A counterintelligence "czar," will head the special board, comprising top CIA, FBI and Defence Department officials, and will be charged with taking a forward-looking approach to safeguarding the nation's secrets. The move aims to "to create a process through which the agencies that are charged with responsibilities for counterintelligence ... can work together in a way that's more coordinated and looks at new threats, assesses them and decides how to protect our secrets," according to Siewert. "We've moved into a world in which threats are more diverse and diffuse, and we need a counterintelligence capacity that recognizes the realities of the changing world," said the official. The spokesman cited the threat posed by cyber-warfare, pointing to high-profile computer viruses spread globally last year. Siewert said President-elect George W. Bush, who takes office January 20, would likely appoint the first "czar" to head the board. But the Republican could also decide to reverse the order.-AFP -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2253 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:14am Subject: Former Cuban spy testifies against ex-allies on trial Former Cuban spy testifies against ex-allies on trial http://www.miamiherald.com/content/today/news/americas/carib/cuba/digdocs/102513.htm Published Saturday, January 6, 2001, in the Miami Herald Man gives agents' techniques, efforts to infiltrate Pentagon's Southern office BY GAIL EPSTEIN NIEVES gepstein@h... Avoiding eye contact with his former associates, an acknowledged former Cuban intelligence agent gave jurors a quick training course in spying Friday. He was the first witness to testify about personal in-the-field involvement with any of the five accused spies on trial. Joseph Santos, 40, looked toward the defendants only once when he identified accused spy Gerardo Hernandez. Santos said Hernandez was a Miami-based Cuban ``illegal officer,'' or ranking intelligence agent, who in 1995 assigned Santos and his wife, Amarylis, their primary mission: to infiltrate the Southern Command. Prosecutors contend that Havana was intent on penetrating the Pentagon's Southern Command headquarters, which directs U.S. military operations in Latin America and the Caribbean. Southcom announced its move to Miami from Panama in March 1995. Santos and his wife are already serving prison terms after pleading guilty to one count of conspiracy to act as a foreign agent. Their terms are likely to be cut short for their help testifying against Hernandez, who prosecutors say conspired with the Cuban military to murder four Brothers to the Rescue fliers in 1996. Santos was born in New Jersey to Cuban parents who later returned to Cuba. He became a university professor in electrical engineering and was recruited by the Directorate of Intelligence in April 1984, he said. His wife joined later. In 1986, he began ``basic training to work as an intelligence agent'' in Santa Clara. As his agent name, he chose Mario. His wife chose the name Julia. She was sentenced to 42 months in prison. Testifying through an interpreter, Santos said he was trained in all aspects of intelligence gathering, from how to penetrate an organization to how to photograph documents and handle them without leaving fingerprints. He also learned techniques for countersurveillance, recruitment, creating microdots, interpreting Morse code shortwave radio broadcasts, running computer encryption programs and how to pass findings to his fellow agents. The most sought-after morsels? ``Any information that might be classified, restricted or secret,'' he said. A frequent recruitment technique, especially overseas? Not telling the whole truth: ``Quite often the fact that they're working for Cuba is omitted,'' he said. Santos said agents were given a ``communications plan'' that designated permanent meeting places for different scenarios they might encounter. If he somehow lost contact with his handler, for instance, he was to go to the Driftwood Motel at 17121 Collins Ave. in Miami Beach and an intelligence officer would meet him. Santos' testimony was no surprise to the defense. His entire training history was outlined on computer disks that the FBI seized during their investigation of the spy ring. The contents fill three huge volumes that have been provided to jurors. In November 1995, Santos said, he was introduced to Hernandez during a meeting at the Pollo Tropical at Northwest 57th Avenue and Seventh Street. Hernandez -- who used a different name -- directed the Santoses to conduct research comparing FedEx, United Parcel Service and U.S. Postal Service because Cuba's intelligence headquarters was looking for new ways to transport its agents' encrypted computer diskettes. But Hernandez told the couple that their main mission was to penetrate the Southern Command by getting jobs there. They failed at that assignment, though at their sentencing hearing, prosecutors said the couple filed at least one ``detailed'' report on the Southcom headquarters complex in western Miami-Dade County. Prosecutors have said the Santoses were among the least culpable of 14 people indicted in 1998 after a major counterintelligence investigation into the so-called Cuban Wasp Network, La Red Avispa. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2254 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:16am Subject: Newly Created Spy Czar to Help U.S. Modernize Security Efforts Newly Created Spy Czar to Help U.S. Modernize Security Efforts http://www.latimes.com/news/nation/20010106/t000001491.html Espionage: Clinton's order envisions an updated counterintelligence system. It is backed by the CIA and FBI, and Bush is also expected to support it. From Associated Press WASHINGTON--President Clinton has signed an order creating a national counterintelligence executive to oversee the government's efforts to protect its most vital national security secrets, administration officials said Friday. The new executive will have a four-member board composed of the director of the FBI, the deputy secretary of Defense, the deputy director of the CIA and a Justice Department representative. White House spokesman Jake Siewert said Clinton took the action to help adapt U.S. counterintelligence efforts to a post-Cold War era "in which danger could come just as easily from a laptop [computer] and not the traditional cloak-and-dagger spies." "The old system was designed to counter intelligence threats that came from our adversaries in the Cold War," Siewert said. "Now you're in a new era where those threats are not quite as centrally localized and you need a more integrated system." Siewert said that, although the incoming Bush administration could reverse Clinton's decision, that looks doubtful since it is strongly supported by the CIA, the FBI and other agencies involved in counterintelligence matters. He said national security advisor Samuel R. "Sandy" Berger had briefed his anticipated successor, Condoleezza Rice. "They can undo it, but this is not a partisan issue," Siewert said. The organization will reside at CIA headquarters and will replace the CIA's National Counterintelligence Center, according to an administration official who discussed the matter in advance of the White House announcement. The center was created in 1994 after the arrest of Aldrich H. Ames, a longtime CIA officer convicted of spying for the former Soviet Union. The existing counterintelligence center at the CIA focuses on known, suspected or potential intelligence losses. The new organization will take a broader, more forward-looking approach. Siewert said it is unlikely Clinton will name the executive before he leaves office Jan. 20. Before the Ames case, which was one of the worst intelligence disasters in CIA history, the FBI and other government agencies had their own counterintelligence operations, but there was no central, government wide office in charge of protecting secrets. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2255 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:17am Subject: Philippines: 'Bugging' witness a no-show Philippines: 'Bugging' witness a no-show http://www.philstar.com/philstar/news200101060417030.htm 1/6/01 Senators suspended yesterday investigation on the alleged wiretapping and spying operations of the Presidential Anti-Organized Crime Task Force (PAOCTF) after a police official failed to appear at the hearing. Majority Floor Leader Francisco Tatad told reporters yesterday he had moved for a suspension of the investigation because the Senate had not heard from the unnamed police official, who had earlier promised to testify. "We had to suspend the investigation because next week our schedule will be full with the opening of the special session," Tatad said. Senate Secretary Lutgardo Barbo told reporters yesterday the police officer, who he identified only as "Mendoza," had sent feelers that he would like to testify to shed light to allegations that PAOCTF agents had bugged the phones of senators and other government officials. "I am not at liberty to give details but what I learned is that he was volunteered by somebody," he said. Yesterday, Chief Justice Hilario Davide Jr., impeachment court presiding officer, ordered to be make public the testimony of Lt. Col. Disocoro Reyes, PAOCTF chief technical officer, at an executive session of the court,, Earlier, Reyes told the impeachment court that PAOCTF has acquired P60 million worth of electronic surveillance equipment to monitor the operations of criminal syndicates. However, Reyes said that he can only testify about the details in an executive session because the matter is classified and involves national security. Tatad said he saw "nothing secret" about the documents presented by Reyes at the executive session because these contained details on a Kodak 200-mm. digital camera and other electronic surveillance equipment. Last Thursday, Senate President Aquilino Pimentel Jr. informed the impeachment court that a police officer is willing to testify that the senators had been placed under surveillance and that their telephones had been bugged. Pimentel told reporters he would not identify the witness until he had appeared before the Senate and revealed everything he knows about the alleged bugging operation. "I just told the court there is another police officer who is reportedly willing to testify openly that there was such a bugging of senators. If he is available tomorrow he will testify, if not maybe the following day," he said. ≠ Perseus Echeminada -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2256 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:23am Subject: TV Recorders Take Quantum Leap TV Recorders Take Quantum Leap by John Gartner 2:00 a.m. Jan. 6, 2001 PST http://www.wired.com/news/technology/0,1282,40493,00.html?tw=wn20010106 LAS VEGAS -- The second generation of personal video recorders (PVR) could give you a better view of football games than if you were on the 50-yard line. At this week's Consumer Electronics Show (CES), hard drive maker Quantum is demonstrating a video system that will enable set-top boxes, televisions, gaming consoles and satellite TVs to provide multiple camera angles, new instant replay features and even more programming. Personal video recording will be one of the many television-computing convergence technologies at CES, which runs through Tuesday. Quantum's (HDD) QuickView IEEE 1394 DVR Subsystem, which was announced earlier this week, extends the VCR-like programming and navigation features made popular by companies such as TiVo and ReplayTV by expanding the storage capacity and adding enhanced streaming video and file management technology. Quantum has added customized software for file management, which controls multiple real-time streams simultaneously and receives television programming schedules to its hard disk technology that was originally developed for PCs, according to Bentley Nelson, director of strategic marketing at Quantum. Nelson said broadcasters will develop new services that will distribute multiple audio- and videostreams in the background for later playback on Quickview-enabled recorders. For example, satellite TV broadcasters can send images from multiple camera angles during a live sporting event or concert into a buffer on their PVR. Fans will be able to select a variety of instant replay views, while the live feed continues to be received by the players. Nelson said that pay-per-view broadcasters could similarly stream multiple movies over a single channel, and customers would then choose any movie to playback at a time of their choosing. Quantum hard drives are used in the majority of PVR systems, including those from TiVo, ReplayTV and DirecTV. Panasonic is the first consumer electronics company to license the Quickview technology, and Nelson expects the first devices to hit store shelves within 6 months. Devices will likely include 40 gigabytes of storage, and Nelson expects that capacity to double within 14 months. Nelson said that PVRs are replacements for VCRs, CD changers, set-top boxes and satellite receivers, and the overall market could be twice that of PC hard disks. According to research firm IDC, the market for PVRs will continue will grow to 14 million units sold per year by the year 2004. Nelson said Quickview works with "5C Content Protection," a copyright technology used in encoding movies. Quickview also supports the 1394 Function Control Protocol that enables multiple devices to be daisy-chained to create an "unlimited" audio or video archive, Nelson said. Other top PVR competitors that will be showing off new products at CES will include Microsoft, TiVo, DirecTV and America Online. Microsoft chief Bill Gates will deliver the Opening Keynote address at CES on Saturday, when he is expected to unveil the much anticipated Xbox gaming console. He will likely demonstrate Microsoft's latest iteration of the WebTV platform, which like the Quantum system, creates an integrated media management platform that links to the TV. Thomson Multimedia has integrated WebTV's Ultimate PC service into its RCA-DIRECTV DWD490RE system, which will be unveiled at CES. The digital satellite TV receiver combines DIRECTV programming, digital video recording, interactive TV and Internet access with a hard disk-based recorder. The system has two digital tuners, enabling viewers to record two shows at the same time or watch one show while recording another. During his Monday morning keynote, Barry Schuler, president of America Online's (AOL) interactive services group, will talk about the company's AOLTV initiative that provides access to the their popular Internet services through set-tops and PVRs. Motorola (MOT) will unveil its Streamaster 5000T set-top box, which will be sold by telecommunications carriers and combines voice, video and data services through Digital Subscriber Line (DSL) connections. Blockbuster announced this week they will use the Streamaster boxes to deliver movies on demand in Portland, Oregon, and Salt Lake City. Other new product areas that will be featured at CES are Bluetooth wireless devices, advances in home networking and portable MP3 players, and components for the digital car such as satellite radios and telematics products. Copyright © 1994-2001 Wired Digital Inc. All rights reserved. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2257 From: Date: Sat Jan 6, 2001 6:48am Subject: Tour The Former NSA Site Pisgah Astro Research Institute Site Tour or http://www.pari.edu/ 2258 From: Edward J. Michaels Date: Sat Jan 6, 2001 8:59am Subject: New to the list My name is Ed Michaels and I am Director of Investigations for General Security Systems, Inc., surveillance & investigations division known as GSSI. We are a 26 year old licensed private detective agency in MD, NJ & PA with corporate offices in our own building located at 1339 Brandywine Street in Philadelphia, PA. We have branch offices located in St. Claire PA, Maplewood NJ, Woodbury NJ and Tinicum, MD. My own background includes over 30 years in private security and investigation as well as public law enforcement and safety. I am not a retiree from law enforcement or public safety as I do not play politics well. I have invested 8 years of my carrier to labor strife security and 13 to defense investigation, surveillance and counter surveillance for corporate America, attorneys, insurance carriers and self insurers. [Non-text portions of this message have been removed] 2259 From: Jason Miles Dibley Date: Sat Jan 6, 2001 0:00pm Subject: Re: New cameras focus on fuel bandits In answer to the question raised regarding the feasibility of a camera to read a tax disc attached to a vehicle. The simple answer is that it doesn't. The cameras in these systems reads the number plate of the vehicle, that acquired image of the number plate is then checked against a number of lists that are loaded into the computer onboard the number plate reading system. These lists will be vehicles wanted by police, customs, security services, etc. Included on this computer will be an current list of all unlicensed vehicles in that area. This list will have come from the Vehicle licensing agency in Swansea (wales). As the system reads the number plate, if it appears on anyone of the lists then an activation will occur alerting the operators what the interest in the vehicle is. They will then stop and approach the vehicle and deal with it accordingly. So it's not that clever really just a shuttered CCD camera that acquires an image illuminated by pulsed infra-red light (so it can operate in the dark), of the vehicle number plate. The ANPR (Automatic Number Plate Recognition) software will then work out what letters and numbers appear on the plate. Once this is done it simply checks the number against the lists that have been loaded into the system. If the plate appears on the system that the machine shouts at the operators. Who will take the appropriate action. I hope this answers your question. Signed J M Dibley QCC Interscan Ltd. ************************************************************** Please visit our associates Web site at http:\\www.qcc.co.uk You can view our digitally signed reports and other documents using Adobe Acrobat Version 4 or greater. You can obtain this for free from the following web site: http://www.adobe.co.uk/products/acrobat/readstep.html This message is intended only for the use of the person(s) to whom it is addressed. It may contain information which is privileged and confidential or material which is protected under attorney-client privilege. In addition, this message may not necessarily represent the views of QCC. Accordingly any unauthorised use is strictly prohibited. If you are not the Intended Recipient, please contact QCC Interscan Ltd as soon as possible or send mail to contact@q.... QCC Information Security Ltd. Registered in England and Wales No. 03773029 ----- Original Message ----- From: "Craig Snedden" To: Sent: Friday, January 05, 2001 2:36 PM Subject: Re: [TSCM-L] New cameras focus on fuel bandits > I can see that a recognition system would be able to pick up the pre-printed > portion of the tax disc and the colour (different colours for different > validity periods), which may catch out quite a number of defaulters, but in > my experience, only an inspection with the "mark one eyeball" will ascertain > if the handwritten portion (the vehicles details) has been tampered with or > not. > > It is a common method of alteration for a stolen tax disc to be treated with > a substance to fade or remove the pen ink, then fill in the details for the > car that it is going to be displayed on. Such alterations are easily > spotted by close visual inspection and touching the disc, but I can't see a > camera system being able to pick up on these. > > I'm sure the Government "boffins" will be looking at an RF device (passive > or active) embedded in the vehicle which will be validated by some means and > if invalid will send out a signal to static speed cameras, police cars etc. > > This raises questions of civil rights and freedom of movement....... > > Local authorities in the U.K. have just been given powers to raise revenue > from taxing vehicles entering certain areas, commonly city centres, > supposedly in a move to combat congestion. The U.K. has just recently > adopted the European Convention of Human Rights. Does the imposition of a > tax on my freedom of movement on the public highway, when there is no > alternative route to my destination, not impose on my Human Rights? > > I know our cousins in the US have been tackling these sorts of questions for > years now. Any comments? > > Sorry this got a bit off topic, but in a way it's still to do with > surveillance..... ;-) > > Craig > > ----- Original Message ----- > From: "Talisker" > To: "TSCM-L Mailing List" ; "James M. Atkinson, > Comm-Eng" > Sent: Thursday, January 04, 2001 6:22 PM > Subject: Re: [TSCM-L] New cameras focus on fuel bandits > > > I saw a TV programme on this recently, and know that the number plate > > reading is working well, however, I really can't see that reading the tax > > disc is feasible, in the UK the lettering is just over an inch tall and on > > top off hard to copy colouring making the letter outline difficult to > read, > > add to this that the disc is displayed inside the windscreen at a variety > of > > positions and angles. Also the disc is displayed in a portion of the > > windscreen outside the coverage of the wipers. > > > > Any opinions from the CCTV geeks out there? Oh and the range from camera > to > > windcreen is 10,s of metres > > > > Andy > > http://www.networkintrusion.co.uk > > Talisker's Network Security Tools List > > ''' > > (0 0) > > ----oOO----(_)---------- > > | The geek shall | > > | Inherit the earth | > > -----------------oOO---- > > |__|__| > > || || > > ooO Ooo > > talisker@n... > > > > The opinions contained within this transmission are entirely my own, and > do > > not necessarily reflect those of my employer. > > > > > > > > > > > > ----- Original Message ----- > > From: "James M. Atkinson, Comm-Eng" > > To: "TSCM-L Mailing List" > > Sent: Thursday, January 04, 2001 12:19 AM > > Subject: [TSCM-L] New cameras focus on fuel bandits > > > > > > > > New cameras focus on fuel bandits > > > > http://www.thisislondon.co.uk/dynamic/news/story.html?in_review_id=347661 > > > > by David Williams, > > Motoring Editor > > > > Twenty-four surveillance is being launched by police at London filling > > stations to combat a huge rise in the number of people stealing fuel - > > following a year of sharp petrol price rises. > > > > Up to £2 million worth of fuel is now being stolen from forecourts in the > > capital every month. Motorists are driving off with up to £60 of fuel at a > > time, although the average haul in London is £26. > > > > The boom in "drive-offs" has doubled since the problem was reported in the > > summer, when 1,200 garages within the M25 were losing between £750,000 and > > > £1 million every month. > > > > Then the British Oil Security Syndicate (Boss) said thousands of > drive-offs > > were occurring every four weeks. Nationally the crisis cost petrol > retailers > > at least £11.2 million last year. > > > > New Year figures, however, are expected to show a doubling in drive-offs > in > > the past eight months, and police say the crimewave is nationwide. > > > > Now the Met has begun fighting back by installing high-resolution spy > > cameras linked to a powerful mobile police computer, and arrests have > > already been made. The computer reads every car number plate entering a > > forecourt and checks them against lists of known offenders who have > > previously been reported to police following drive-offs. > > > > Police also programmed the computer to issue an alert if it spots vehicles > > involved in other crimes or with no valid tax disc. > > > > In most cases offenders are approached by plain-clothes officers before > they > > drive off. Backed by the oil industry, the operation was launched secretly > > at 30 south London forecourts and is expected to spread throughout London > > before going nationwide. Detective Inspector Larry Lawrence said: "The > > computer works in the blink of an eye and has proved very successful. > > > > "We are pleased to be working with Boss to tackle forecourt crime. The > > figures are quite high but this type of crime is preventable. > > > > "We believe the pattern we have found in south London reflects a > London-wide > > problem." > > > > Tom Sterling, Boss chief, said: "The habitual drive-off offender is the > tip > > of the iceberg as forecourt crime goes. People who do this normally engage > > in other crimes too." Earlier this year Boss reported that since 1998 > credit > > card fraud at filling stations across Britain leapt from £12.2 million to > > £19 million. > > > > Drivers claiming to have "forgotten their wallet" and driving off rose to > £5 > > million this year. > > > > Police also urged oil firms to install barriers at petrol station > > forecourts. They feel that with further rises in the cost of petrol, > > drive-offs will continue to soar. > > > > In January 2000 a litre of unleaded cost 72.9p a litre. Now it is around > > 77.9p. > > > > -- > > > > ======================================================================= > > Sed quis custodiet ipsos Custodes? > > "In a time of universal deceit, telling the > > truth is a revolutionary act" - George Orwell > > ======================================================================= > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 http://www.tscm.com/ > > Gloucester, MA 01931-8008 jmatk@tscm.com > > ======================================================================= > > The First, The Largest, The Most Popular, and The Most Complete TSCM, > > Technical Security, and Counterintelligence Site on the Internet. > > ======================================================================= > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2260 From: Jordan Ulery Date: Sat Jan 6, 2001 10:04pm Subject: Re: Digest Number 475 Florida has an extensive web site that may answer your question. You may also wish to direct the question to PI-Digest for comment from PIs from FL. Message: 3 > Date: Wed, 3 Jan 2001 21:34:36 -0500 > From: "Gerard P. Keenan" > Subject: FL licensing for security/Brad Robinson 2261 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 10:52pm Subject: Book Recommendation - Spooked: Espionage in Corporate America Good evening, Here is another book that I think list members will find really interesting as it is right on target as to what we are all about, and what we do to stop or at least neutralize technical espionage. It's also a good book to give to potential customers along with your business card, and a company brochure regarding your TSCM and bug detection services. One of the authors is actually a list member, and at least one list member is quoted in several cases. Spooked: Espionage in Corporate America Adam L. Penenberg Marc Barry Barnes and Noble Price: $20.80 (20% Discount) Retail Price: $26.00 In-Stock: Ships 2-3 days Format: Hardcover, 288 pp. ISBN: 0738202711 Publisher: Perseus Publishing Pub. Date: December 2000 You can order it directly on the Barnes and Noble website by clicking on the following link... and let me know what you think after you read it. http://barnesandnoble.bfast.com/booklink/click?sourceid=324303&bfpid=0738202711&bfmtype=BOOK -------------------------------------------------------------------- List members should also know that the classic eavesdropping movie "The Conversation" was recently released on DVD, and this movie is something every TSCM'er should have. It is rumored that the movie was actually based on the experiences of one of the members of this list. The Conversation Francis Ford Coppola, Gene Hackman, John Cazale, Allen Garfield http://service.bfast.com/bfast/click?bfmid=2181&sourceid=324303&bfpid=0097360230741&bfmtype=dvd Barnes and Noble Price: $24.99 (16.6% Discount) Format: Wide Screen / Dolby 5.1 / Surround Sound Region Code: 1 Original release date: 1974 Video/DVD Release Date: 12/12/2000 UPC: 97360230741 PARAMOUNT Includes: Production and Technical Notes: Aspect Ratio: 1.85.1 Presentation: Wide Screen Sound: Dolby Digital, Surround Sound Language: English, FranÁais Subtitles: English Time: 1 Hour 53 Minutes or if you prefer a VHS cassette version: http://service.bfast.com/bfast/click?bfmid=2181&sourceid=324303&bfpid=0097360230789&bfmtype=dvd Barnes and Noble Price: $12.99 (13.3% Discount) In Stock: 24 hours (Same Day) Original release date: 1974 UPC: 97360230789 PARAMOUNT -------------------------------------------------------------------- There was a recent variation of the above movie, which also had Gene Hackman in it (playing a character very similar to that he played in "The Conversation"), and it is a MUST HAVE for anybody in the TSCM or technical security professions. On an added note two list members were technical consultants to the movie. Enemy of the State Tony Scott, Will Smith, Gene Hackman, Jon Voight http://service.bfast.com/bfast/click?bfmid=2181&sourceid=324303&bfpid=0717951001634&bfmtype=dvd Barnes and Noble Price: $24.99 (16.6% Discount) In Stock: 24 hours (Same Day) Format: Wide Screen / Dolby 5.1 Region Code: 1 Rating: Original release date: 1998 Video/DVD Release Date: 6/15/1999 UPC: 717951001634 WALT DISNEY VIDEO Includes Production and Technical Notes: Aspect Ratio: 2.35:1 Presentation: Wide Screen Sound: Dolby Digital Features: Closed Caption, movie trailer, featurette, Language: English, FranÁais Time: 2 Hours 12 Minutes or if you prefer a VHS cassette version: http://service.bfast.com/bfast/click?bfmid=2181&sourceid=324303&bfpid=0786936091526&bfmtype=dvd Barnes and Noble Price: $12.99 (13.3% Discount) In Stock: 24 hours (Same Day) Original release date: 1998 Video/DVD Release Date: 11/2/1999 UPC: 786936091526 WALT DISNEY VIDEO -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2262 From: James M. Atkinson, Comm-Eng Date: Mon Jan 8, 2001 9:24am Subject: Pentagon Traffic Jam A Marine colonel, on his way home from work at the Pentagon, came to a dead halt in traffic and thought to himself, "Wow, this traffic seems worse than usual. Nothing's even moving." The colonel noticed a police officer walking back and forth between the lines of cars, so he rolled down his window and asked, "Officer what's the hold up?" The officer replied, "The President is just so depressed about the thought of moving with Hillary to New York that he stopped his motorcade in the middle of the Beltway and he's threatening to douse himself in gasoline and set himself on fire. He says his family hates him and he doesn't have the money to pay for the new house. We're taking up a collection for him." Oh really? How much do you have so far?" " About three hundred gallons, but a lot of folks are still siphoning." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2263 From: Elliott & Associates, Ltd. Date: Mon Jan 8, 2001 0:01pm Subject: The Conversation A couple of weeks back there was some discussion about the movie The Conversation with Gene Hackman. A comment was made to the effect that it was rumored that the movie was based on the life of a TSCM list member. The facts are that the movie was patterned after the life of Hal Lipset who was a PI in San Francisco for years. In fact Hal Lipset served as an advisor on the movie. Hal Lipset died a couple of years back, but was playing with recording/video devices up to the end. In the mid 60s Hal Lipset was one of several people who testified before Congress about eavesdropping devices, bugging, etec. Up to this point (60s) there had been no federal law prohibiting use of bugging devices. Hal got national attention because of his Martini Olive bug which was really a toy and good for 10 to 20 feet and that was if it hadn't been eaten The Martini Olive bug should not be confused with the Vagina transmitter designed by Winston Arrington. The Vagina transmitter will go 500 feet or better to a receiver. Just setting the record straight. Bill Elliott, CII ELLIOTT & ASSOCIATES, Ltd. (GMT -7) http://www.prvt-eye.com 2264 From: 1RCM <1RCM@M...> Date: Mon Jan 8, 2001 5:55pm Subject: Information Needed Hi List, I'm looking for any list member who might be located in the Boise, ID. area. I'm contemplating an equipment deal with an individual at that location and would be interested in any possible local reputation information and/or paying for someone's time to have them check the piece before I buy it. The items' cost isn't that extravagant but still is far more than I care to lose blindly. Please respond directly and off-list. Thanks, Bob 1RCM@M... 2265 From: Ray Fitgerald Date: Mon Jan 8, 2001 6:34pm Subject: Re: The Conversation One of my favorite movies.I have two copies. Your info is right on the mark. Another good one more up to date is "Sneakers" with Robt Redford.And "Enemy of the State" Raymond J. Fitzgerald Bureau Of Special Services bosspi@i... http://business.inc.com/bosspi 845-543-6487 --- 845-534-1060 FAX Licensed & Bonded Investigators in N.Y. since 1973 Member: NALI,ALDONYS,NAPPS,COIN,EPIC. " Truth Never Fears Detection " -----Original Message----- From: Elliott & Associates, Ltd. To: TSCM-L@egroups.com Date: Monday, January 08, 2001 1:03 PM Subject: [TSCM-L] The Conversation >A couple of weeks back there was some discussion about the movie The >Conversation with Gene Hackman. A comment was made to the effect that it was >rumored that the movie was based on the life of a TSCM list member. > >The facts are that the movie was patterned after the life of Hal Lipset who >was a PI in San Francisco for years. In fact Hal Lipset served as an >advisor on the movie. > >Hal Lipset died a couple of years back, but was playing with recording/video >devices up to the end. > >In the mid 60s Hal Lipset was one of several people who testified before >Congress about eavesdropping devices, bugging, etec. Up to this point >(60s) there had been no federal law prohibiting use of bugging devices. Hal >got national attention because of his Martini Olive bug which was really a >toy and good for 10 to 20 feet and that was if it hadn't been eaten > >The Martini Olive bug should not be confused with the Vagina transmitter >designed by Winston Arrington. The Vagina transmitter will go 500 feet or >better to a receiver. > >Just setting the record straight. > > >Bill Elliott, CII >ELLIOTT & ASSOCIATES, Ltd. (GMT -7) >http://www.prvt-eye.com > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > 2266 From: William Knowles Date: Mon Jan 8, 2001 8:58pm Subject: Documentary Examines NSA Role, History http://ap.tbo.com/ap/breaking/MGAY80WKNHC.html [I see this will be on again at 10:00pm C.S.T. -WK] By Eun-Kyung Kim Associated Press Writer Jan 6, 2001 - 12:11 PM WASHINGTON (AP) - The National Security Agency, the supersecret intelligence mission most Americans do not even know exists, gives some explanation in a television documentary for its tightlipped behavior. "It's really important that the American people understand what we do, that we are in fact a relatively powerful organization. And it's absolutely critical that they don't fear the power that we have," the agency's director, Lt. Gen. Michael V. Hayden, says in a rare interview. The History Channel program, airing Monday as part of the network's "History's Mysteries" series, seeks to explain the agency's mission and examines recent controversies. Considered the eavesdropping branch of the intelligence community, the NSA gathers information through satellites, telephone intercepts and other methods. Not much else is known about the NSA, which employees joke stands for "No Such Agency" Hayden offers little more. "We intercept communications of adversaries of the United States and attempt to turn that into wisdom for American policy-makers and commanders," he said, according to a transcript of the show. "By the same token, we attempt to prevent other nations from doing that to the United States of America. That's what we do." Congress recently resolved a budget battle over funds for the NSA when President Clinton signed legislation authorizing money for intelligence agencies, including the NSA and CIA. He had vetoed the original spending bill because of a provision that would have made the leaking of government secrets a felony offense. The exact budget figure included in the bill is classified. "If you were comparing NSA to a corporation in terms of dollars spent, floor space occupied and personnel employed, it would rank in the top 10 percent of the Fortune 500 companies," said Judith Emmel, a spokeswoman for the agency, which has its headquarters in Fort Meade, Md. Last year, the NSA defended itself against allegations it illegally snooped into e-mail messages and other communications between ordinary Americans. On the cable program, Hayden denied such action. "I'm here to tell you that we don't get close to the Fourth Amendment," he said, referring to the constitutional provision prohibiting unreasonable search and seizure. "We, for better or worse, stay comfortably away from that line." The program recounts the agency's history and the codes it has deciphered from Japanese, German, Vietnamese and other foreign governments during past conflicts. "The ability to do communications intelligence has saved lives. It has kept us out of war. It has shortened war when we've been in it," said David Hatch, NSA senior historian. The NSA had to revise its mission after the 1991 collapse of the Soviet Union. The agency soon shifted its focus to terrorists, drug traffickers and the threat of war over the Internet. "Cyberwar is a term that you hear today a lot. And the business we're in is to counter the effectiveness of cyberwarfare against our infrastructures," said Michael Jacobs, deputy director of information assurance. "We acquire information, we determine its value and we pass it on," said Maureen Baginski, who heads NSA's Office of the Director. "Really, what you have here is a bunch of Americans that are safeguarding Americans." -- On the Net: National Security Agency: http://www.nsa.gov History Channel: http://www.historychannel.com/ *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 2267 From: James M. Atkinson, Comm-Eng Date: Tue Jan 9, 2001 0:48am Subject: Shake-up could revive KGB Shake-up could revive KGB By Andrew Jack in Moscow http://news.ft.com/ft/gx.cgi/ftc?pagename=View&c=Article&cid=FT3PE8PLQHC&live=true&tagid=ZZZAFZAVA0C&subheading=europe Published: January 8 2001 20:35GMT Last Updated: January 8 2001 22:31GMT The Russian government is considering reorganising its special services organisations, triggering concerns from critics about the re-creation of the Soviet-era KGB. Quoted on Russian press agencies, Sergei Ivanov, secretary of the advisory Security Council, said that strengthening links between the special services was one of the priority issues for the coming six months. The agencies involved would include the FSB, responsible for intelligence gathering, the Border Guards, and Fapsi, the agency in charge of interception of communications. Mr Ivanov's statement sparked a warning from Sergei Yushenkov, deputy chairman of the Russian parliament's security committee, that in the wake of the restoration of the music of the Soviet-era national anthem, the KGB's name - meaning the committee for state security - could also be reintroduced. Mr Yushenkov said the recreation of a single agency might make the activities more efficient, but it would reduce the control of civil society over their operations. Since the appointment of Vladimir Putin, a former KGB agent and one-time head of the FSB, as president, there has been growing concern by liberal critics over the power of the security services. Former president Boris Yeltsin broke up the KGB after the 1991 coup against the ex-Soviet leader Mikhail Gorbachev, although he never fully disbanded its constituent parts. Mr Yushenkov said the government had proposed draft legislation in the parliament last November on the reunification of the special services, but it had triggered too much concern to be passed. Mr Ivanov, himself a former KGB agent and long-standing colleague of Mr Putin, has been tipped as a possible future defence minister, prime minister or head of the presidential administration. He has been active in building up the influence of the Security Council. The council has been instrumental in developing Russia's national security, military and information doctrines, and has expanded its role into the social sector, politics and other areas. The Russian daily newspaper Sevodnya, which is owned by Vladimir Gusinsky, the exiled media tycoon who has been critical of Mr Putin's administration, last week warned of the risk of a return of the KGB. However, Konstantin Preobrazhensky, a security analyst and former KGB agent who has become a strong critic of the organisation, said he doubted that the former special services would be formally reunited into a single organisation. He said that each division - including the SVR or foreign espionage network - had its own ministerial-level chief, all of whom would be reluctant to share information or give up their power in favour of a single head. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2268 From: Date: Mon Jan 8, 2001 1:47pm Subject: New Member - UK. ISDN I'm a well established P.I in the UK and looking for any info on the systems alternative use of ISDN lines. I'm told that this now has the same use as the old analogue Infinity Transmitter. I appreciate your all mostly from the States but any idea's ? 2269 From: James M. Atkinson, Comm-Eng Date: Tue Jan 9, 2001 6:42pm Subject: History Looks at the NSA History Looks at the NSA http://www.wired.com/news/politics/0,1283,41063,00.html by Declan McCullagh 2:00 a.m. Jan. 9, 2001 PST WASHINGTON -- As anyone who watched Enemy of the State knows, the National Security Agency is a rapacious beast with an appetite for data surpassed only by its disregard for Americans' privacy. Or is the opposite true, and the ex-No Such Agency staffed by ardent civil libertarians? To the NSA, of course, its devilish reputation is merely an unfortunate Hollywood fiction. Its director, Lt. Gen. Michael Hayden, has taken every opportunity to say so, most recently on a History Channel documentary that aired for the first time Monday evening. "It's absolutely critical that (Americans) don't fear the power that we have," Hayden said on the show. He dismissed concerns about eavesdropping over-eagerness and all but said the NSA, far from being one of the most feared agencies, has become one of the most handicapped. One reason, long cited by agency officials: Encryption. The show's producers obligingly included stock footage of Saddam Hussein, saying that the dictator-for-life has been spotted chatting on a 900-channel encrypted cell phone. That's no surprise. The NSA, as Steven Levy documents in his new Crypto book (which the documentary overlooks), has spent the last 30 years trying to suppress data-scrambling technology through export regulations, court battles, and even personal threats. Instead of exploring that controversial and timely subject that's tied to the ongoing debate over privacy online, "America's Most Secret Agency" instead spends the bulk of an hour on a history of cryptography starting in World War II. Most of the documentary could have aired two decades ago, and no critics are interviewed. One of the few surprises in the otherwise bland show is the NSA's new raison d'etre -- infowar. Since its inception in the dark days of the Cold War, the NSA has had two missions, protecting the government's communications while tunneling through the ciphers that guard the enemy's. (Occasionally the two have conflicted.) "The business we're in is to counter the effectiveness of cyberwar against our infrastructure," said Michael Jacobs, the NSA's deputy director for information systems security. Jacobs cited power grids, transportation, air traffic, energy and health services as examples of industries "which have information that is critical to some segment of our society" and must be protected from terrorists, criminals and hackers. In the agency's National Cryptologic Strategy for the 21st Century document, the NSA says it will "develop applications to leverage emerging technologies and sustain both our offensive and defensive information warfare capabilities." One part of the NSA, the Information Systems Security Organization, is devoted to just that. The group even has an outreach program to take advantage of the "talents of government and industry partners" in secure system design, evaluation, and testing. Another program (call 800-688-6115) even offers two-day training classes. If all this sounds like a tremendously geeky community college, the NSA doesn't seem to mind. "I'm here to tell you we don't get close to the Fourth Amendment," says the NSA's Lt. Gen. Hayden. The Fourth Amendment, as we learned in civics classes, explicitly prohibits "unreasonable" searches and seizures, and implicitly allows reasonable ones. What that means in practice is that the NSA is not permitted by law to spy on American citizens. But that broad prohibition, codified in the Foreign Intelligence Surveillance Act, hasn't stopped fears of NSA overzealousness, fueled by persistent reports of the Echelon data-reporting system. In early 2000, the House Intelligence committee held hearings after an outcry over a reported NSA global surveillance system called Echelon. Few legislators asked tough questions. In fact, the National Commission on Terrorism recommended last summer that Congress should give federal police more eavesdropping abilities and increase the budgets of spy agencies. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2270 From: James M. Atkinson, Comm-Eng Date: Tue Jan 9, 2001 6:45pm Subject: Nowhere to hide / A special report on privacy Nowhere to hide / A special report on privacy http://www.thestar.com/apps/AppLogic+FTContentServer?pagename=thestar/Layout/Article_Type1&c=Article&cid=978841852931&call_page=TS_@Biz&call_pageid=971794782442&call_pagepath=Business/@Biz As monitoring tools multiply, society weighs your privacy against profit, public interest in knowing Tyler Hamilton TECHNOLOGY REPORTER A SPECIAL REPORT ON PRIVACY Two astronauts hold a secret meeting in a tightly sealed space pod, detailing through whispers a plan to seize control of their computer-hijacked vessel. In the background, the hijacker - a malfunctioning supercomputer named HAL 9000 - silently observes the movement of their lips, processes the data and analyzes the meaning of their supposedly private conversation. It's a chilling scene. As filmmaker Stanley Kubrick demonstrated in his sci-fi movie classic, 2001: A Space Odyssey, it's virtually impossible to conceal one's privacy in an age where technology rules the day - and in many cases, runs amok. In the 33 years since Kubrick released his film, our technological odyssey has become more science than fiction. The year is 2001. We live in a highly connected digital society, one that's capable of peeking into our personal worlds, taking detailed snapshots and following the trail of electronic cookie crumbs we leave behind. The threat to individual privacy is more real than ever, as more consumer, financial and medical data is collected as fuel for our burgeoning electronic economy. Governments watch and track us in the name of health and welfare. Businesses monitor and study us to sell more goods and keep their employees honest. ---------------------------------------------------------------------------- `If there is no demonstrated need for the information, it should be gone.' - Bruce Phillips, Canada's former privacy commissioner `It's not like there's this evil intention. Part of (the fear) is that nobody actually follows the data trail.' - Valerie Steeves, Carlton University law professor ---------------------------------------------------------------------------- Sometimes we know it's happening. Sometimes we don't. Either way, privacy breaches are being felt and noticed. Consider the following: The U.S. Federal Bureau of Investigation has called ``identity theft'' - a form of fraud through impersonation - the fastest growing crime in North America, partly because of the ease with which personal data can be accessed through computer systems and the Internet; A perceived lack of privacy and security on the Internet continues to be cited in Canadian and U.S. studies as the leading factor holding back the growth of e-commerce. Meanwhile, a recent Canadian study found that half of commercial Web sites in Canada don't have policies aimed at protecting consumer privacy; According to Denver-based research firm The Privacy Foundation, workplace surveillance was the leading privacy concern in 2000, an issue that has lowered staff morale at many companies. Privacy advocates say the need to protect our lives from unwanted, unnecessary and malicious intrusions has come to a critical juncture. But where do we draw the line? And what are the rules for crossing that line? The answers will have profound social, economic and legal implications for businesses, governments, consumers and citizens. ``We have an enormous obligation to get it right,'' says Marc Rotenberg, executive director of the Electronic Privacy Information Center in Washington, D.C. ``Privacy has become a global issue. It has become a political issue. It has become a technological issue. It has become an issue for the courts.'' In the United States, more than two dozen companies have been sued for tracking online consumers without their consent, including Internet advertising firm DoubleClick Inc. and defunct e-tailer Toysmart.com. More than 65 privacy-related bills are currently pending in Congress. Meanwhile, the U.S. Federal Trade Commission has unofficially accepted a role as privacy watchdog. So far, it has taken action against nearly 200 companies. ``Yes, we actually pay people to surf the Net,'' says FTC commissioner Mozelle Thomson. ``This issue is on the front burner.'' In Canada, the legislators have been busier than the lawyers. Last week, a new federal law - formerly known as Bill C-6 - came into force that gives Canadian consumers more control over how their information is collected and used in the private sector. The new legislation, which complements the existing public sector Privacy Act, aims to promote electronic commerce by creating an online environment of trust and respect. But that's just the beginning of Canada's privacy odyssey. The provinces - except for Quebec, which already has private-sector legislation - will soon be jumping in with their own draft bills, laying the foundation for future laws to deal with health records, genetic testing and surveillance in the workplace. ---------------------------------------------------------------------------- `These are huge issues that as a society we have to confront. Privacy will be the defining issue of this new decade we're entering.' - George RadwanskI, Canada's privacy commissioner ---------------------------------------------------------------------------- ``These are huge issues that as a society we have to confront,'' says George Radwanski, the country's new federal privacy commissioner, whose policing powers now extend to the private sector. ``Privacy will be the defining issue of this new decade we're entering,'' he says. ``My role is to be the champion of Canadians in this regard and to make them aware of these issues.'' A fishbowl society Radwanski points out that privacy is not absolute. We reveal much about ourselves by simply opening up a bank account, handing in a rÈsumÈ for a job, or walking out our front door to pick up the daily newspaper. Still, he says privacy in the electronic age is deteriorating at an alarming rate. To make matters worse, it has become increasingly difficult to pinpoint just who's watching us and where our personal information is flowing. Stealth video cameras record us in parking lots, elevators and office buildings. Software keeps track of our keystrokes, e-mails and the Web sites we visit. Radio scanners frequently intercept our wireless phone calls, and satellite-tracking technologies can trace the location of vehicles, not to mention the fashionable ``smart'' devices we carry with us. In the United States, the FBI is using a technology called Carnivore that can target and randomly read e-mail as it passes through gateways to the Web. The software was designed to net criminals, but critics charge that it catches much more than it should. As the motto on one electronic surveillance Web site reads: ``In God we trust. All others we monitor.'' Biometric technologies have even made it possible for computers to spot us in crowds, recognize us through our own unique odours and identify us through the rhythm of our walk. About a year ago, a computer scientist at Carnegie Mellon University in Pittsburgh taught a computer to read lips - just like HAL. Sadly, real-time surveillance is just the tip of the iceberg. Below the surface lie large masses of personal databanks, increasingly organized and often unprotected from hackers, disgruntled employees and old-fashioned criminals. Governments, businesses and law enforcement agencies use powerful, memory-rich databases known as ``data warehouses'' to electronically store and analyze this information, creating a way to sketch eerily accurate profiles of our lives. ``This is all being linked together,'' says Austin Hill, president of Montreal-based Zero-Knowledge Systems Inc., a developer of software that lets people conceal their online identities. Hill says the Internet, helped by its multimedia cousin the World Wide Web, has made it easier than ever to collect, share, replicate, move and link this information. And it can do it at lightning speeds, thanks to advances in fibre-optic technologies that transport data as pulses of light. The Internet has essentially become a universal repository for personal data, easily accessible by a growing number of Web-enabled devices - from laptops and Palm organizers to ``smart'' phones and fridges. Michael Power, a privacy expert and partner with Canadian law firm Gowlings, likes to think of data as a liquid. ``Information flows like water,'' he explains. ``If it hits something it just finds another way to get around it.'' Still, the question remains: Why collect all this data in the first place? In the public sector, politicians argue that getting a better understanding of constituents allows them to do their jobs properly and keep the streets safer at night. Whether it's a gun registration database, a criminal DNA repository or the latest Statistics Canada census, the idea is to use this data to shape policy, improve government services and limit dangers to society. ``The policy-makers are very much into an efficiency mode of thinking,'' says Valerie Steeves, a law professor at Ottawa's Carleton University and a specialist in privacy policy. ``There's a real resistance to stopping the flow.'' In Ontario, the government is pushing through a plan to issue multi-purpose ``smart cards'' that would combine a person's photograph with health, driver's license, birth certificate and other information. A computer chip embedded within the card would keep updated records of an individual's interaction with hospitals, courts and traffic cops. The provincial government is also building a network that would integrate information flowing through the justice system, meaning lawyers, courts and police could access a common pool of data. A similar network is planned for health care. Nationally, the federal government has been no less active. Its Government On-Line initiative aims to provide electronic access to all federal programs and services by 2004, changing the way citizens file taxes or apply for passports. This spring, Ottawa will spend about $400 million and employ 40,000 staff to collect personal data for this year's Statscan census. Beginning May 15, more than 30 million Canadians will be asked intimate questions about their lives, and many will be legally required to divulge their income, ethnicity, disabilities - even sexual orientation. In exchange for the intrusive questionnaire, the government promises confidentiality. Where does the information end up? In a database where it undergoes statistical analysis, just like all census information from the past. And for the first time, Statscan will allow certain individuals to file their information over the Internet. ``It's not like there's this evil intention,'' says Steeves, referring to the many instances where governments collect sensitive personal information. ``Part of (the fear) is that nobody actually follows the data trail.'' That said, the Big Brother envisioned by George Orwell in his book 1984 doesn't look so threatening when measured against big business. The desire to monitor employees and the thirst for consumer data has grown to unprecedented levels in the corporate world. Video surveillance, keystroke monitoring, e-mail filtering and voice-mail recording are now common features in the workplace, where an increasing number of employers are asserting their right to audit the productivity of their staff and protect themselves from potential lawsuits. In the United States alone, two-thirds of corporations monitor their employees to some degree, according to the American Management Association. Meanwhile, the value of personal information as a well-focused marketing and advertising tool has soared in the Internet and computing age. Data mining and analysis software is helping online and off-line companies know their customers better, whether the goal is understanding buying behaviour, making note of product preferences or anticipating future purchases. Ultimately, advertising can be directed and personalized to build stronger customer relationships and sell more Gap jeans, Coke products or Trojan condoms. This explains why more than 85 per cent of all Web sites collect personal information from online visitors. For dot-coms such as DoubleClick and Amazon.com, this information is critical to their existence. For loyalty programs like Air Miles, such information is their existence. The threat Jason Catlett, a leading privacy guru south of the border and founder of advocacy firm Junkbusters Corp., says the detail and quality of information being collected is becoming more and more invasive, and it's doubling every two years. ``There's a real danger here of concentration of information, because it provides a single point of failure,'' says Catlett. ``If there's no one watching the shop, then the shoplifters are going to run amok.'' For many people, the response is: so what. How, they ask, can something as simple as data represent a threat or danger? The answer to this question goes far beyond the annoyance of spammers, junk mailers and telemarketers. Rather, it deals with the risks posed by stalkers, thieves, suspicious lovers, curious employers and overly snoopy insurance companies. Consider the following two cases: Last month, it was discovered that an outlaw biker gang had infiltrated Quebec's automobile-insurance board and, by accessing its computer systems, tracked down the addresses and phones numbers of rival gang members, police officers and journalists. Police suspect that confidential data was wrongfully obtained on Journal de Montreal reporter Michel Auger - who was shot five times on Sept. 13 in his newspaper's parking lot - and may have been passed along to his assailants, making it easier to track him. In 1997, a grandmother from Ohio received a letter from a prison inmate in Texas who knew intimate details about her life, such as how often she uses sleeping aids, deodorizers and hemorrhoid medication. The inmate, a convicted rapist, also offered in his letter to fulfill her sexual desires and fantasies when he was eventually released from prison. Needless to say, the woman suffered months of emotional and psychological torture. It was eventually discovered that the inmate bought the data from another prisoner. Apparently, the second inmate had a data entry job as part of a prison-labour program. The data in question was an elaborate consumer survey the woman had filled out earlier. ``Don't blame things like the Internet,'' says Catlett. ``Blame the increase in the amount of data, and the lack of controls in handling it.'' It's not that consumers never knowingly hand over their information. Generally, people don't hesitate to participate in online surveys or loyalty programs if it means discounts on merchandise or better, more personalized customer service. What many don't know is where their personal data could end up. The cases, unfortunately, are plentiful. In British Columbia in the mid-1990s, three staff at a Vancouver abortion clinic found out that their license plate numbers had been obtained through an RCMP computer system. It was later discovered that the officer who accessed the records had passed along the personal data to his mother - a worker with an anti-abortion group. David Flaherty, then privacy commissioner of British Columbia, used that case as part of a larger investigation into the abuses with motor vehicle databases. ``I've done some work more recently with abortion clinics,'' says Flaherty, who now works as a privacy consultant. ``Their staff literally have to look under their cars for bombs before they get into them.'' Flaherty - who considers privacy a human right - says there is a blind assumption among many individuals that safeguards for protecting personal information are being followed. He says most organizations have no interest in unnecessarily invading people's privacy, but mistakes do happen. ``I'm surprised at how many people work in some of these database-intensive industries with access to information,'' he says. ``Sure, they all have confidentiality agreements - big deal.'' Whether it's an innocent slip of the mouse, a case of taking kickbacks, or a security oversight that is sniffed out by hackers, employees that have access to computer systems within an organization are often the weakest link when it comes to protecting privacy. Network firewalls, biometric technologies, security passwords and encryption software can help, but only if processes and procedures are closely followed and audited. According to research firm IDC Canada Ltd., accidents and human error - not hackers - pose the biggest security threat to business computer networks and Web sites in Canada. When such systems hold vast amounts of personal data, a security risk instantly becomes a privacy risk. It's no wonder Bruce Phillips, Canada's former privacy commissioner, decided last spring to blow the whistle on a huge database system created by Human Resources Development Canada. The database, designed for no apparent purpose, carried detailed profiles on more than 33 million Canadians - information gathered without their knowledge or consent. ``If there is no demonstrated need for the information, it should be gone,'' says Phillips, explaining that purpose and consent are two basic principles to which organizations should adhere. HRDC tried to defend the database as a research tool, but two weeks later, under the weight of public criticism, it pulled the plug. Privacy risks grow even larger when such information is being gathered by profit-driven Web ventures that are far less stable than government. Take Toysmart.com, an online retailer that filed for bankruptcy in June. Despite assurances in its privacy policy that it would protect the personal information of its customers and never share that data with third parties, Toysmart decided to auction off its customer list to the highest bidder as a way to help pay off its debts. Last year, more than 210 ``dot-coms'' went belly up, according to San Francisco-based consulting firm Webmergers.com. The closures left 15,000 people out of work and hundreds of detailed customers lists at the mercy of disgruntled employees and anonymous buyers. ``There is an awful lot of data out there floating around with nobody willing to protect it,'' says Catlett, adding that the Toysmart.com case demonstrates what companies are willing to do when backed against a wall. ``You don't want some pervert calling up your kids pretending to be Ken and asking for Barbie. (The Toysmart customer list) deserves protection.'' But even genuine attempts at protection often fail: In January, 1999, a security oversight with the Airmiles.ca Web site exposed detailed personal information on tens of thousands of Canadians who had filled out a ``confidential'' survey for the popular rewards program. In all, 82 categories of information were open for view, including data about types of credit cards held, the number of cars owned and whether the person was a pet owner or mobile-phone user. Fortunately, credit card numbers and data on specific product purchases were not revealed; Last April, Toronto-based wireless service provider Look Communications also blamed human error for a security breach that left hundreds of customer files - including phone and credit card numbers - exposed on the Internet. Amazom.com, Microsoft Corp., Yahoo Inc., AT&T Corp. and Nissan Motor Co. Ltd. are among a list of well-known companies that have experienced similar goof-ups. Then there are the blatant attacks. Online auction site Egghead.com admitted last month that someone had breached their computer systems and possibly stolen up to 3.7 million credit card numbers and other customer information. The fact that so much data is floating around unguarded or under attack explains why identity theft - the use of another person's identity to commit fraud - has quickly become the fastest growing crime in North America. These days, crawling around in garbage dumpsters, picking pockets and raiding mailboxes has been replaced by Internet search engines, do-it-yourself hacker kits and online services that do all the dirty work for a nominal fee. ---------------------------------------------------------------------------- `As search engines become more powerful, they become a way to aggregate that information. That's how you create a profile on somebody.' - Michael Power, partner with Gowlings law firm ---------------------------------------------------------------------------- ``If it goes into a computer system, you never know where it's going to show up,'' explains Power, the partner with Gowlings. ``As search engines become more powerful, they become a way to aggregate that information. That's how you create a profile on somebody.'' Once that profile is created, it's easy for someone you've never met to impersonate you, make purchases under your name, access bank accounts and commit other crimes. Then one day, you get an unpleasant surprise: Your bank account is empty, your credit cards are run up, your credit record is shot and you've been wrongfully linked to a number of criminal offences. Clearing up that mess and trying to restore your reputation often creates emotional, psychological and economic suffering . In one high-profile case, Mari Frank, an attorney from Laguna Niguel, Calif., discovered that someone had purchased a sports car, spent more than $10,000 at Toys ``R'' Us Inc., damaged a rental car and accumulated $50,000 in debt using personal information that could have easily been found on the Internet. Many novice Internet users respond to unsolicited e-mails that promise rewards in exchange for detailed data about them. Others fill out information to gain access to certain sites on the Web. Where this information ends up is anyone's guess. In Canada, cases of identity theft have been harder to track because most law enforcement authorities here lump the crime under the umbrella of general fraud. ``There's no program to deal specifically with the issue of identity theft,'' says Sgt. Paul Marsh, spokesperson for the RCMP. ``Our current reporting does not break out fraud done online.'' Marsh says the offences of personation and fraud currently found in the Criminal Code have been considered adequate to address the question of identity theft, but he adds that the RCMP is examining ways of statistically distinguishing off-line and online fraud within its computer systems. Such statistics may be necessary to prepare for tomorrow. Many privacy advocates point out that the fears we exhibit today are largely related to the dangers that lie in the future if the privacy issue isn't adequately addressed. For example, the collection of health and medical information by governments, non-profit groups, pharmacies, doctors, hospitals and medical information Web sites raises the issue of how this information - if it's stolen, monitored, leaked, shared or sold - can be used to discriminate against people. ``It's particularly difficult with health care to guard against secondary uses, because the insurance and drug industries are so much a part of the medical sector,'' says Steeves, the Carleton University law professor. Steeves says the spectre of eugenics is very real in an age where animals have already been cloned and genetic defects can be easily recorded. In the workplace, drug tests that can also detect whether a woman has stopped taking the birth control pill could easily lead to dismissal in advance of maternity leave. Getting a job or life insurance could also become more difficult if a genetic flaw that ``may'' lead to future illness raises a red flag. A new dot-com in the United States called First Genetic Trust has created what it calls a ``genetic banking'' service. For a fee, the company collects, analyzes and maintains an individual's genetic data for confidential and secure storage, or use in ongoing clinical trials. The potential value of the service is compelling when applied to medical research, drug discovery and personalized diagnosis and treatment of genetically related illness. But what if the company goes bankrupt? It begs the question at a time when bankrupt companies like Toysmart.com are making headlines by trying to sell off customer lists. ``There's all sort of privacy rhetoric,'' says Steeves. ``But very little privacy protection.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2271 From: James M. Atkinson, Comm-Eng Date: Tue Jan 9, 2001 6:59pm Subject: Trial turns spotlight on US-Cuban espionage Trial turns spotlight on US-Cuban espionage http://www.boston.com/dailyglobe2/009/nation/Trial_turns_spotlight_on_US_Cuban_espionage+.shtml By Richard ChacÛn, Globe Staff, 1/9/2001 IAMI - One Cuban man pretended to be a Puerto Rican, memorizing a 30-page phony life story. Another landed a janitor's job at a US naval base in Key West, keeping an eye on military activity. And a third posed as a Cuban defector so that he could infiltrate Cuban-American exile groups and send information back to Havana. These are just some of the eyebrow-raising stories emerging from a federal trial here. The case, which resembles a John le Carre thriller, offers a rare glimpse into the modern world of US-Cuban espionage. The three men are among five accused of being Cuban spies - part of an espionage ring known to US intelligence officials as the Wasp Network. According to the US government, more than a dozen Cuban secret agents tried to infiltrate US exile groups and military bases in Florida through most of the last decade until law enforcement agents broke up the ring in 1998. Four of the suspects - including Juan Pablo Roque, who defected to Miami from Cuba amid much fanfare by exile leaders - have been indicted in absentia because they escaped to the island nation before being arrested. Five others, including two married couples, have pleaded guilty and are expected to testify against their former comrades. But it's the trial of the remaining five that is drawing the most attention now from leaders and curious intelligence spectators hoping to peer into the shadowy world of US and Cuban espionage operations. In testimony last week, Joseph Santos, an agent who confessed to authorities, said he and his wife received orders from an alleged ringleader, Gerardo Hernandez, to penetrate the US military's Southern Command headquarters in Miami. Santos said he also was assigned to study Federal Express, United Parcel Service, and the US Postal Service for mailing some of the information they gathered. Authorities and prosecutors are relying on thousands of pieces of evidence that were gathered from court-ordered apartment searches or through routine intelligence work, such as intercepting short-wave radio signals, computer messages, or coded phone conversations. Government attorneys have assembled several thick binders of transcripts of messages between the spies and their bosses in Havana. Some of the transmissions talk in flowery language about the importance of their work for Cuba's 41-year-old Communist revolution, while others deal with more mundane things, like what clothes they wore that day, where they shopped, or their constant need for more money from Havana. Prosecutors accuse the men of having prior knowledge of plans by Cuba to shoot down two planes belonging to the Miami-based exile group Brothers to the Rescue on Feb. 24, 1996. Hernandez, a Cuban who prosecutors say posed as a Puerto Rican to hide his true identity, is charged with conspiracy to murder in connection with that incident. The suspects admit they were working on orders from Havana but deny obtaining classified information from the exile community or from any US military facility. In an encrypted message shown in testimony last week, Cuban intelligence officials in Havana tell their workers in Miami to ''uncover plans for acts of aggression against Cuba'' by the United States by keeping an eye out for increased military training, the movement of personnel or an increase in flights from the US naval base in Boca Chica, Fla. The agents kept meticulous notes of their actions and expenses. Among the notes confiscated by authorities are envelopes and small scraps of paper carefully detailing money distributed to all of the ring's participants. Using a network that stretched from Mexico City to Miami and New York, agents were given specific instructions from Havana on where to meet other Cuban officials to pass information or collect money. According to government transcripts released this week, meetings were held in the frozen food section of a Queens supermarket, in a men's restroom at a Bronx diner and at a McDonald's restaurant in Miami. All of the agents tried hard to blend in into their American surroundings as much as possible, renting apartments in Hollywood, Fla., and in Miami; taking out memberships at local video stores; and, in some cases, finding girlfriends or getting married even if they had spouses back home in Cuba. The trial has also been a delicate matter for US officials, who worry about publicly divulging too much of their intelligence techniques. Over the years, FBI officials intercepted the group's calls and short-wave radio messages, conducted apartment searches, and confiscated about 1,000 encrypted computer disks. Questions have also been raised in local media over whether the FBI knew about plans to shoot down the exile plans and whether the incident could have been avoided. US authorities have denied withholding any information. The realization that Havana's spies worked and lived among them has stung the anti-Castro Cuban exile community here, which has suffered setbacks following the Elian Gonzalez saga last year and the death in 1997 of its most colorful leader, Jorge Mas Canosa, longtime president of the Cuban American National Foundation. ''There is a willingness in this community to give people from Cuba the benefit of the doubt and to welcome them,'' said Dennis Hays, vice president of the foundation, adding that Cuban-Americans may be more cautious of new arrivals. ''A case like this shows how cold-blooded people can be and creates a huge sense of betrayal and bewilderment.'' This story ran on page A08 of the Boston Globe on 1/9/2001. © Copyright 2001 Globe Newspaper Company. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2272 From: James M. Atkinson, Comm-Eng Date: Tue Jan 9, 2001 7:01pm Subject: Jailed Cuban spy identifies his `handlers' Jailed Cuban spy identifies his `handlers' Published Tuesday, January 9, 2001, in the Miami Herald http://www.miamiherald.com/content/today/news/dade/digdocs/067701.htm He said both directed him to get a job at the Southern Command's Miami headquarters. BY GAIL EPSTEIN NIEVES gepstein@h... A former Cuban intelligence agent on Monday identified two more defendants in the Cuban spy trial as his ``handlers'' and said both of them directed him to get a job at the Southern Command's Miami headquarters so he could snoop for the Cuban government. The testimony of acknowledged ex-agent Joseph Santos, 40, was the first to link accused spies RamÛn LavaniÒo and Fernando Gonz·lez with in-the-trenches intelligence activity. On Friday, Santos similarly implicated co-defendant Gerardo Hern·ndez. The trial's opening weeks focused on documentary and physical evidence against the five accused spies. With Santos, jurors are hearing firsthand accounts about the inner workings of Cuba's intelligence apparatus, from spy recruitment to training to work assignments. In the case of Santos and his wife, Amarylis -- also a Cuban agent -- their achievements were far less illustrious than their assignments, according to testimony. Santos said he successfully completed a research project on the Southern Command while its new headquarters were being built in Miami's Doral section in early 1997. He and his wife took photographs of all the surrounding buildings, between Northwest 87th and 99th avenues and 25th and 40th streets, ``to provide a pretty clear idea to anyone'' what the area looked like. Santos said he gave the report to his handler LavaniÒo, an ``illegal agent'' or ranking Cuban intelligence operative who also went by the name Luis Medina. But more importantly, LavaniÒo told the Santos couple that their ``supreme task'' was to get jobs at the Pentagon's SouthCom headquarters, which directs U.S. military operations in Latin America and the Caribbean. Accused spy Gonz·lez -- who also went by the name RubÈn Campa -- gave them the same task, Santos testified. ``Penetrating'' SouthCom was a high priority set by Cuba's intelligence chiefs, according to Havana-to-Miami directives seized by the FBI and read to jurors Monday. MISSION FAILED The Santos failed at that assignment. They were too busy trying to make a legitimate living and never found a place to apply for a job, Santos said. But on cross-examination, the defense attorney for accused spy Hern·ndez scoffed at the notion that Santos could have obtained anything important -- let alone national defense secrets, a key factor for proving espionage -- even if he had managed to get hired at SouthCom. Santos does not speak English. Before his arrest, he was working as a laborer at Goya Foods and the Miami Arena. Attorney Paul McKenna read jurors a report in which Hern·ndez directed Santos to obtain ``public information'' about SouthCom. ``In fact, none of your handlers ever tasked you with getting national security information, did they?'' McKenna asked Santos. Santos responded that it was implicit that he was supposed to get information that could not be obtained ``by conventional means.'' SERVING SENTENCES Santos and his wife are already serving prison sentences after pleading guilty to one count of conspiracy to act as a foreign agent. Their terms are likely to be cut short for their help testifying against Hern·ndez, who prosecutors say conspired with the Cuban military to murder four Brothers to the Rescue fliers in 1996. McKenna cross-examined Santos about the plea agreement for a long time in an apparent bid to undermine his credibility. Under sentencing guidelines, Santos faced 60 months but prosecutors recommended he serve 48. U.S. District Judge Joan Lenard agreed. ``So these people here,'' McKenna said, naming prosecutors Caroline Heck Miller, John Kastrenakes, David Buckner and FBI Agent Al Alonso -- ``are all your friends that are helping you, correct?'' ``They're not my friends,'' Santos responded through an interpreter. ``I met those people during the investigation of the case.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2273 From: James M. Atkinson, Comm-Eng Date: Tue Jan 9, 2001 9:03pm Subject: Man charged with making tape of patrons in athletic club Man charged with making tape of patrons in athletic club Associated Press, 01/09/01 BOSTON -- A Cambridge man has been charged with secretly taping men in the locker room of a Boston fitness club. Evans Mojica, 41, was arrested at about 6:30 p.m. Monday, after he was seen walking around the men's locker room at Boston Sports Clubs carrying a black toiletry bag, police said. Patrons of the athletic club had earlier complained about a man fitting Mojica's description who was believed to be videotaping in the locker room. The club's management approached him and found that he was videotaping people through a hole in the bag, said James Borghesani, spokesman for the Suffolk County District Attorney's office. He pleaded innocent Tuesday in Boston Municipal Court to a charge of recording oral information without consent, as well as charges of lewd and lascivious behavior and disorderly conduct. Authorities said the videotape included an audio recording. He was ordered held on $500 cash bail. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2274 From: James M. Atkinson, Comm-Eng Date: Wed Jan 10, 2001 10:51am Subject: 'Soprano' Tapes Sing - Mob snitch cripples Jersey crime family Thursday, December 16, 1999 'Soprano' Tapes Sing Mob snitch cripples Jersey crime family http://www.nydailynews.com/1999-12-16/News_and_Views/Crime_File/a-50555.asp By GREG SMITH Daily News Staff Writer They are the "Soprano" tapes ≠ hours of video and audio tapes revealing the inner workings of a New Jersey-based crime family that sees itself as the inspiration for one of TV's hottest shows. The recordings were key in bagging 41 reputed mobsters in a massive organized crime bust earlier this month, but they also give a rare glimpse into what the alleged criminal class likes to watch on television. http://www.nydailynews.com/1999-12-16/News_and_Views/Crime_File/soprano.jpg Members of the reputed DeCavalcante crime family believe they have a lot in common with the characters in 'The Sopranos, above. In this case, fact seems to follow fiction. "Hey, what's this f---ing thing, 'Sopranos'?" asks Joseph (Tin Ear) Sclafani, a reputed mob soldier with a hearing aid as he waits in a car March 3 for a sitdown with another mob family. "Is that supposed to be us?" "You're in there," responds reputed capo Anthony Rotondo, as both men erupt in laughter before going on to point out several characters on the show they believe were taken whole-cloth from their real-life crime family. "Every show you watch, more and more you pick up somebody," Rotondo says. "One week it was Corky. One week it was, well, from the beginning it was ... Albert G," he says, comparing fictional mobsters to apparent real ones. Sclafani and Rotondo might not have laughed so loud had they known another companion, identified only as Ralphie, was wearing an FBI recording device. Because of Ralphie's work as an informant, Rotondo, Sclafani and 39 other members and associates of the DeCavalcante crime family were charged Dec. 2 in four real-life racketeering indictments. On the HBO show "The Sopranos," Anthony Soprano, an aging Jersey mob capo with a paunch, suffers panic attacks because of the pressures of his work. He sees a shrink, confronts the price of betrayal, considers whether it's all worthwhile. He hangs out in a topless bar called Ba Da Bing! with his cronies, who are all in construction or carting businesses. On the "Soprano" tapes, the alleged capos are all middle-aged guys with paunches who spend hours betraying one another and discussing the intricacies of how to bury a body. They hang out in a restaurant called Sacco's, and all claim legitimate jobs in construction ≠ except at least one, who runs a casino boat. They love the HBO show ≠ "great acting," Rotondo comments ≠ and point out one similarity to their lives after another, such as a TV mobster who dies of cancer just as one did in real life. But the feds are quick to say that these tapes are not fiction, and they allege that people actually ended up dead. The most jarring recordings concern the life and death of Joseph (Joey O) Masella, a 49-year-old bookie who owed everybody ≠ the DeCavalcantes, the Colombos, the Gambinos. Masella borrowed hundreds of thousands from the three mob families, hoping to hit it big as a bookie, according to the tapes. He failed. "This guy is breaking my b---s," Masella told Ralphie in the summer of 1998, referring to one of his any mob pursuers. "All I need is just three thousand. He's calling me, and calling me and calling." That June, Masella approached acting DeCavalcante boss Vincent Palermo, claiming he simply could not pay his debts. "By all rights, by all the rules, I have to kill you," Palermo replied, according to court testimony. One afternoon, Masella got a call from Steve, an alleged debtor. Steve was going to hand Masella $10,000 in cash, which Masella would immediately turn over to his creditors. But Steve was really Westley Paloscio, Masella's bookmaking partner, who masked his voice, Assistant U.S. Attorney Maria Barton alleged in court last week. Paloscio told Masella to meet Steve at the Marine Park Golf Course parking lot in Brooklyn, prosecutors alleged. Masella pulled into the dark lot around 9:30 p.m. When a red two-door sedan pulled up, Masella bounded forth to meet Steve.. He saw a man with a mustache and dark hair at the wheel, and then several flashes from a gun. Motorists rushed to the scene as the red car sped away. Masella was alive, his body riddled with bullets. He described Steve and his car and gave up Paloscio's beeper number. He died four hours later. Paloscio learned Masella survived for a while, and he worried that the botched hit could result in his death. "Somebody's going to get shot," Paloscio told Ralphie. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2275 From: James M. Atkinson, Comm-Eng Date: Wed Jan 10, 2001 3:25pm Subject: Court Rejects Psychic Appeal Court Rejects Psychic Appeal http://abcnews.go.com/sections/us/DailyNews/scotus000118.html#psychic The Supreme Court today refused to revive a lawsuit in which 16 former employees of a California psychic hotline accused ABC television of unlawfully using a hidden camera to videotape them at work. The court, without comment, turned away the former employees' argument that they should be allowed to sue ABC under a federal eavesdropping law. The secret recordings were used by ABC's PrimeTime Live program for a 1993 expose on whether employees at the hotline believed in the service. An ABC reporter had gotten a job at the Psychic Marketing Group, which advertised telephone psychic advice for $3.95 a minute. The employees sued ABC under a federal eavesdropping law that lets people tape conversations in which they are a party, unless the taping is intended to help commit a crime or damage another person. Five of those who sued were shown in the broadcast, while the rest were videotaped but did not appear in the program. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2276 From: James M. Atkinson, Comm-Eng Date: Wed Jan 10, 2001 3:53pm Subject: Cordless Phones: Who's Listening? Cordless Phones: Who's Listening? http://abcsource.starwave.com/sections/2020/2020/diaz000322.html It is not so difficult - or uncommon - for others to listen to your calls on a wireless phone. According to the Privacy Rights Clearinghouse, here's how you can protect yourself. How Others Listen - And Is It Legal? Cordless phones operate like mini-radio stations. They send radio signals from the base unit to the handset and from the handset back to the base. The signal carrying your conversation can usually be transmitted and overheard a quarter of a mile away, and can sometimes travel up to two miles. Signals from cordless phones can be picked up by a number of other devices including radio scanners, baby monitors, radios and other cordless phones. Federal law prohibits the intentional eavesdropping of cordless and cellular telephone conversations and it is also illegal to use a radio scanner "knowingly and with the intent to defraud" to eavesdrop on wire or electronic communication. Penalties for the intentional interception of cordless and cellular telephones range from fines to imprisonment. Individual states also have varying laws about intercepting phone calls. What You Can Do In most cases, your cordless phone conversations are probably overheard only briefly and accidentally. But there are people who make it a hobby to listen to cordless and cellular phone calls, so here are some tips: Cordless phones with numerous channels (25 or more) and those that automatically switch between channels are not as easily monitored as the older one- or two-channel analog models. Be aware that anyone using a radio scanner can easily eavesdrop on conversations on older model cordless phones. The newest cordless phones give a high level of protection against eavesdropping. They are digital, use a higher frequency and spread-spectrum technology, and have as many as 40 channels. (They are also more expensive than analog wireless phones.) Since there is no inexpensive way to ensure privacy on either cordless or cellular phone calls, if you do not want to take the chance that others may be listening to your call, be sure both you and the person you are talking to are on standard wire phones. Avoid discussing financial or other sensitive personal information on a cordless or cellular phone. For example, if you buy something over the phone and give your credit card information, your cordless or cellular call could be monitored, leaving you the victim of credit card fraud. When shopping for a cordless or cellular phone, insist that the manufacturer or salesperson provide you with clear explanations of any privacy protection claimed for their products. Baby monitors, children's walkie-talkies and some home intercom systems may be overheard in the same manner as cordless phones. If you are concerned about being overheard on one of these devices, be sure to turn it off when it is not in use. You might want to consider purchasing a wired unit instead. Copyright © 2000 ABC News Internet Ventures -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2277 From: Ray Van Staden Date: Thu Jan 11, 2001 8:25am Subject: Fw: ARROGRANCE Transcript of an actual radio conversation which took place during October 1995 between a USN War Ship sailing off the coast of Newfoundland and the Canadian authorities. Transcript released by the Chief of Naval Operations RCN 10/10/95. Printed in "Rendezvous" December 1999. Canadians: "Please divert your course 15 degrees north to avoid collision". Americans: "Recommend you divert course 15 degrees north to avoid collision". Canadians: "Negative. You will have to divert your course 15 degrees north to avoid a collision". Americans: "This is the Captain of a US Navy ship. I say again, divert YOUR course!" Canadians: "No. I say again, you must divert your course". Americans: "This is the Aircraft Carrier USS Lincoln the second largest ship in the USN Atlantic Fleet. We are accompanied by three cruisers, three destroyers and numerous support vessels. I demand you change your course 15 degrees north. I say again that's 15 degrees north or countermeasures will be taken to ensure the safety of this ship". Canadians: "This is a lighthouse. Your call!!" --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 2278 From: Richard Thieme Date: Thu Jan 11, 2001 11:27am Subject: Re: Fw: ARROGRANCE - urban legend alert! this story has been around for a long time set in many locales. My suspicion is that the "transcript" is tongue in cheek. At 04:25 PM 01/11/2001 +0200, Ray Van Staden wrote: > >Transcript of an actual radio conversation which took place during >October 1995 between a USN War Ship sailing off the coast of >Newfoundland and the Canadian authorities. > >Transcript released by the Chief of Naval Operations RCN 10/10/95. > >Printed in "Rendezvous" December 1999. > >Canadians: "Please divert your course 15 degrees north to avoid collision". >Americans: "Recommend you divert course 15 degrees north to avoid collision". >Canadians: "Negative. You will have to divert your course 15 degrees north to avoid a collision". >Americans: "This is the Captain of a US Navy ship. I say again, divert YOUR course!" >Canadians: "No. I say again, you must divert your course". >Americans: "This is the Aircraft Carrier USS Lincoln the second largest ship in the USN Atlantic > Fleet. We are accompanied by three cruisers, three destroyers and numerous support > vessels. I demand you change your course 15 degrees north. I say again that's 15 degrees > north or countermeasures will be taken to ensure the safety of this ship". >Canadians: "This is a lighthouse. Your call!!" > > >--- > >>From the desk of Raymond van Staden >Van Staden and Associates cc > >P.O. Box 1150 >Amanzimtoti >4125 >South Africa > >Tel: +27 (0)31 916-1262 >Fax: +27 (0)31 916-1263 > >Email: raymond@v... >Internet: http://www.vanstaden.co.za > > > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > Richard Thieme ThiemeWorks ... professional speaking and business consulting: ThiemeWorks P. O. Box 170737 the impact of computer technology Milwaukee Wisconsin on people in organizations: 53217-8061 helping people stay flexible voice: 414.351.2321 and effective fax: 414.351.5779during times of accelerated change. cell: 414.704.4598 http://www.thiemeworks.com http://www.richardthieme.com - for information on Professional Speaking 2279 From: St. Clair, James Date: Thu Jan 11, 2001 10:33am Subject: RE: Fw: ARROGRANCE No -it's not. Every version of this story changes.. By the way, Lincoln has never sailed off of Newfoundland. J -----Original Message----- From: Ray Van Staden [mailto:secdep@v...] Sent: Thursday, January 11, 2001 9:25 AM To: TSCM-L Subject: [TSCM-L] Fw: ARROGRANCE Transcript of an actual radio conversation which took place during October 1995 between a USN War Ship sailing off the coast of Newfoundland and the Canadian authorities. Transcript released by the Chief of Naval Operations RCN 10/10/95. Printed in "Rendezvous" December 1999. Canadians: "Please divert your course 15 degrees north to avoid collision". Americans: "Recommend you divert course 15 degrees north to avoid collision". Canadians: "Negative. You will have to divert your course 15 degrees north to avoid a collision". Americans: "This is the Captain of a US Navy ship. I say again, divert YOUR course!" Canadians: "No. I say again, you must divert your course". Americans: "This is the Aircraft Carrier USS Lincoln the second largest ship in the USN Atlantic Fleet. We are accompanied by three cruisers, three destroyers and numerous support vessels. I demand you change your course 15 degrees north. I say again that's 15 degrees north or countermeasures will be taken to ensure the safety of this ship". Canadians: "This is a lighthouse. Your call!!" --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2280 From: Date: Thu Jan 11, 2001 7:27am Subject: Re: Fw: ARROGRANCE In a message dated 1/11/01 8:48:38 AM Pacific Standard Time, secdep@v... writes: << Transcript of an actual radio conversation which took place during October 1995 between a USN War Ship sailing off the coast of Newfoundland and the Canadian authorities. >> Sounds like an "urban legend" to me. 2281 From: 1RCM <1RCM@M...> Date: Thu Jan 11, 2001 5:18pm Subject: A Public Thank You Hi List, Last week I posted with a request to be contacted off-list by any list member in the Boise, Idaho area. To make a long story short, I had stumbled across a very good deal on a piece of TSCM test equipment but I was very hesitant to send the asking price for something unseen to someone unknown. I was contacted back by list member Mike Arnell. Mike was of great assistance in allowing me to close the deal in a manner that I felt quite comfortable with. And for that I would like to thank him very much. I chose to thank Mike publicly on the list as well as privately off-list for a reason. This list, like most others, sees its periods of negativity spawned by arguments, disgruntled posters, mis-information, etc., etc. But it also sees more than its fair share of that which I assume that it was originally founded for: the sharing of TSCM-related information, thoughts and ideas. I have no idea whether or not when the list was founded the moderator envisioned its usage for 'blind' business contacts or the requesting of 'professional favors'. But I for one found it very beneficial for just that purpose. And so, as long as the moderator does not disapprove, I would not hesitate to recommend to any list member that if he/she has a problem, concern or issue that another list member in a specific area might be able to help with - then simply put out the feeler. Of course remember to request the return contact and conduct your business off-list, but don't hesitate to give that first 'call for help' via a posting on the list a try! Bob Motzer From: James M. Atkinson Date: Tue Jan 8, 2002 9:54pm Subject: Re: Rent A sweep Bwwahh ha-ha-ha, ROTFLMAO -jma At 7:47 PM -0800 1/8/02, Hawkspirit wrote: >Check this one out, you can now rent sweep equipment for the techno >do-it-yourselfer! > >http://www.spyamericaonline.com/store/comersus_listcategoriesandproducts.asp?idCategory=12 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4474 From: Steve Uhrig Date: Wed Jan 9, 2002 9:59am Subject: Gingrich's intercepted cell phone call Hill Tape Dispute Allowed to Continue Appeals Court Clears GOP Member's Suit By Juliet Eilperin Washington Post Staff Writer Wednesday, January 9, 2002; Page A17 A 1996 phone call that inadvertently bounced to a Florida couple's scanner is still echoing in political and judicial chambers, feeding a long-running lawsuit between two members of Congress. A federal court panel recently ruled that Rep. John A. Boehner (R-Ohio) can amend and go forward with his complaint against Rep. Jim McDermott (D-Wash.). The lawsuit stems from the public release of a December 1996 phone conversation involving Boehner, then-House Speaker Newt Gingrich (R-Ga.) and other House GOP leaders discussing how best to respond to an ethics committee ruling against Gingrich. A Florida couple recorded the conversation off their scanner and gave it to McDermott, then the top Democrat on the House ethics panel. Accounts of the conversation soon appeared in news articles. ============================= ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4475 From: Steve Uhrig Date: Wed Jan 9, 2002 10:21am Subject: Re: NEW APCO 25 DIGITAL SCANNER Once upon a midnight dreary, James M. Atkinson pondered, weak and weary: > Title: UNIDEN DEBUTS NEW APCO 25 DIGITAL SCANNER MODELS It is an FCC mandate for all government and public safety users to shift over to to narrow band digital. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4476 From: Hawkspirit Date: Wed Jan 9, 2002 2:53pm Subject: Theory Could someone explain the theory of what this guy is saying? Roger COMSEC C3I Wiretap Detector The Latest High Tech Wiretap Detector. -Protect yourself from legal and illegal wiretaps http://www.spycompany.com/tapdet.htm The C3I is most effective at detecting wiretaps / eavesdropping at the beginning and ending of a telephone call. At the beginning of a telephone call when someone is calling you, watch for a remote extension drawn loop wiretap to seize the line between the cadence ringing, usually between the first and third ring, creating a connection reaction. At the conclusion of any telephone call, by observing the C3I and counting / timing the number of disconnection reactions on the telephone line. The C3I will detect illegal and legal wiretapping / eavesdropping on your telephone line by establishing either a normal signature pattern or an abnormal signature pattern. 4477 From: Hawkspirit Date: Wed Jan 9, 2002 3:08pm Subject: BridgeTaps What do you make of this comment? "Telcordia reports that a significant portion of the loop population (56 percent) has bridge taps" http://www.iec.org/online/tutorials/xdsl_test/topic06.html. 4478 From: Date: Wed Jan 9, 2002 9:57am Subject: Re: Theory In a message dated 1/9/02 11:55:19 AM Pacific Standard Time, hawkspirit@e... writes: << Could someone explain the theory of what this guy is saying? >> Carefully perusing the website, he's saying send me your money. It's a piece of junk packaged in a $30 box. I've seen the prototype in it's plastic packaging. It didn't work then and I'm sure it doesn't work now. 4479 From: Date: Wed Jan 9, 2002 9:59am Subject: Re: BridgeTaps In a message dated 1/9/02 12:08:50 PM Pacific Standard Time, hawkspirit@e... writes: << What do you make of this comment? "Telcordia reports that a significant portion of the loop population (56 percent) has bridge taps" >> I think it's way out of whack. I'd say less than 5% 4480 From: Steve Uhrig Date: Wed Jan 9, 2002 3:33pm Subject: Re: BridgeTaps Once upon a midnight dreary, MACCFound@a... pondered, weak and weary: > What do you make of this comment? "Telcordia reports that a > significant portion of the loop population (56 percent) has > bridge taps" 56% of the loop population has called the FBI saying they are tapped. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4481 From: Charles P Date: Wed Jan 9, 2002 7:51pm Subject: Re: Re: BridgeTaps Perhaps that should "56% of the 'loopy' population" Actually, they are not talking at all about illegal wiretaps. There are a large number of bridge taps on older cables out there, and many new cable plants too. In new residential neighborhoods I typically find the lines to a home are tapped into a 50 or 100 pair feeder that runs down the street popping up in the pedistals along the way. When someone has multiple lines and later cancels some, the pair is free to use for their neighbor's new 2nd line- yet still accessable from the home where the pair was used last year, the telco guys are happy to find an unused pair and don't care if it was tapped off somewhere else. They show up on TDR runs often. This can be true for business lines as well. It becomes a problem for the installation of dsl lines as it can reduce the bandwith available. Small taps don't make a big difference but longer ones can be a problem. This is what the original quote was refering to. Charles Global Communications Tarrytown, NY charles@t... www.telephonesecurity.com > > What do you make of this comment? "Telcordia reports that a > > significant portion of the loop population (56 percent) has > > bridge taps" > > 56% of the loop population has called the FBI saying they are > tapped. > > > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 4482 From: James M. Atkinson Date: Wed Jan 9, 2002 7:55pm Subject: Re: Theory At 12:53 PM -0800 1/9/02, Hawkspirit wrote: >Could someone explain the theory of what this guy is saying? Roger > >COMSEC C3I Wiretap Detector >The Latest High Tech Wiretap Detector. >-Protect yourself from legal and illegal wiretaps > >http://www.spycompany.com/tapdet.htm > >The C3I is most effective at detecting wiretaps / eavesdropping at the >beginning and ending of a telephone call. At the beginning of a telephone >call when someone is calling you, watch for a remote extension drawn loop >wiretap to seize the line between the cadence ringing, usually between the >first and third ring, creating a connection reaction. At the conclusion of >any telephone call, by observing the C3I and counting / timing the number >of disconnection reactions on the telephone line. The C3I will detect >illegal and legal wiretapping / eavesdropping on your telephone line by >establishing either a normal signature pattern or an abnormal signature >pattern. *** Private and Confidential *** You know the funny thing is that I spoke to the owner of the company who makes the thing a few months back as to how his product detect bugs, and he gave me one hell of a song and dance routine. He refused to discuss the technology in any way, shape, form, or manner, and tried to intimidate me by attempting to pull the "I worked for the phone company for umpteen years" crap, and the "I don't know who you think you are" game. I got the distinct impression that most of the people he deals with don't have a technical background, and when I started to ask even basic questions he started acting like an asshole and just completely stone-walled me (which made my bullshit detector go off). Sadly, instead of answering some basic questions he went on a rant about how I had to come to his offices to see the thing (for what I suspect was a controlled demo), and then he totally blew his credibility with me when he told me about the crackpot who had evaluated the thing (and was endorsing it "as an expert", bwahhh ha-ha-ha). I feel kind of sorry for the guy, and I tried to take him seriously, but from what he was describing it sounds like little more then just another blinky-box. I am more then happy to review any actually technical specifications or white papers the guy is willing to provide, but all he would provide me with was marketing hype, hyperbole, and similar crap (which of course kept making my bullshit detector go off ). The product may indeed do what they claim, hell it may even cure acne, wart, and baldness, but as an engineer I have to see technical stats on the thing, marketing hype means nothing to me. Lets see some credible stats and technical stuff. None of this marketing mumbo-jumbo foolishness, if it does what he claims then I am interested, plain and simple. The funny thing, is that the guy I talked to seemed obsessed with finding shoddy workmanship, an less considered with finding bugging devices. The "line signature box" seems like a good idea, but in reality it is actually of minimal value, and has been offered by dozens of other companies in the past (usually in the form of an impedance tester). Yes, such boxes will impress people with little or no experience under their belts, but a real TSCM professional will find it of minimal value, and usually a source of great amusement. There are even boxes that watch currently flow at the on-hook/off-hook transition point, but they are of minimal value for detecting anything other then sloppy workmanship (shucks, even simple cap meter will detect such things). You can actually buy a $20 box at Radio Shack that will detect remote extensions, so if that is all the box is doing it would explain why the guy got his panties in a bunch when I started asking questions. Your money would probably be better spent on a decent TDR, a giga-ohm test set, or even a rubber chicken.. However, I'll keep an open mind, and would encourage other to do the same; but before you part with any cash you had better ask some technical questions and get some second opinions. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4483 From: James M. Atkinson Date: Wed Jan 9, 2002 8:07pm Subject: Re: BridgeTaps At 1:08 PM -0800 1/9/02, Hawkspirit wrote: >What do you make of this comment? > >"Telcordia reports that a significant portion of the loop population (56 >percent) has bridge taps" > >http://www.iec.org/online/tutorials/xdsl_test/topic06.html. It is usually just a result of sloppy workmanship by outside plant folks. Sadly, most of them have no idea what a TDR is, let along actually use one. The percentage of "sloppy loops" varies widely. In older urban areas it may be 50-60%, but in newer suburban areas and industrial parks it may be completely zero. Any TSCM'er with a TDR can find the easily find the stuff. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4484 From: John McCain Date: Wed Jan 9, 2002 11:01am Subject: Re: Rent A sweep The really funny part is that this is apart of a NASDAQ listed company ( CGPN) selling for about 0.011 USD per share :). Cheers, JohnM At 10:54 PM 1/8/02 -0500, you wrote: >Bwwahh ha-ha-ha, > >ROTFLMAO > >-jma > > >At 7:47 PM -0800 1/8/02, Hawkspirit wrote: > >Check this one out, you can now rent sweep equipment for the techno > >do-it-yourselfer! > > > >http://www.spyamericaonline.com/store/comersus_listcategoriesandproducts. > asp?idCategory=12 > > >-- > >-------------------------------------------------------------------------------------------------- >The First, The Largest, The Most Popular, and The Most Complete TSCM, >Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. >-------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com >-------------------------------------------------------------------------------------------------- > People sleep peaceably in their beds at night only because rough > men stand ready to do violence on their behalf. - George Orwell > >-------------------------------------------------------------------------------------------------- > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-352-0350 807 Pioneer Web: http://www.dcbnet.com Champaign, IL. 61820 Email: Jmccain@d... 4485 From: kirk Date: Wed Jan 9, 2002 0:33pm Subject: Re: Rent A sweep I went to their website and enlarged the picture of the phone line sweeper. GUESS who makes it?.......... CCS, hahahaha. -w--------- Original Message ---------------------------------- From: "James M. Atkinson" Date: Tue, 8 Jan 2002 22:54:09 -0500 >Bwwahh ha-ha-ha, > >ROTFLMAO > >-jma > > >At 7:47 PM -0800 1/8/02, Hawkspirit wrote: >>Check this one out, you can now rent sweep equipment for the techno >>do-it-yourselfer! >> >>http://www.spyamericaonline.com/store/comersus_listcategoriesandproducts.asp?idCategory=12 > > >-- > >-------------------------------------------------------------------------------------------------- >The First, The Largest, The Most Popular, and The Most Complete TSCM, >Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. >-------------------------------------------------------------------------------------------------- > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com >-------------------------------------------------------------------------------------------------- > People sleep peaceably in their beds at night only because rough > men stand ready to do violence on their behalf. - George Orwell > -------------------------------------------------------------------------------------------------- > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > -- Kirk Adirim President TACTRONIX LLC Tactical Electronics for Critical Missions 8497 Sunset Boulevard #28 West Hollywood, CA 90069 USA E: kirk@t... T: 310-388-5886 F: 310-388-5886 W: www.tactronix.com -- 4486 From: James M. Atkinson Date: Wed Jan 9, 2002 8:22pm Subject: Re: Rent A sweep What is really funny is that if you know the TSCM business several "devices" on their website stand out as being eavesdropping toys sold/"made" by CCS. The entire "rental site" read just like a CCS catalog.down to the fantasy pricing. So just how many times do you have to see the Brooklyn Bridge get sold to a tourist before you realize that something just isn't right? -jma At 1:33 PM -0500 1/9/02, kirk wrote: >I went to their website and enlarged the picture of the phone line >sweeper. GUESS who makes it?.......... CCS, hahahaha. > > >-w--------- Original Message ---------------------------------- >From: "James M. Atkinson" >Date: Tue, 8 Jan 2002 22:54:09 -0500 > >>Bwwahh ha-ha-ha, >> >>ROTFLMAO >> >>-jma >> >> >>At 7:47 PM -0800 1/8/02, Hawkspirit wrote: >>>Check this one out, you can now rent sweep equipment for the techno >>>do-it-yourselfer! >>> > >>http://www.spyamericaonline.com/store/comersus_listcategoriesandproducts.asp?idCategory=12 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4487 From: Bug Sweeper Date: Thu Jan 10, 2002 0:51am Subject: DNR? Does anyone know of an inexpensive and simple DNR? Friend wants to keep tabs on outgoing calls while someone is housesitting over a weekend. Thanks, E. Leonard 4488 From: iDEN-Test Port-Marcelrf Date: Thu Jan 10, 2002 1:14am Subject: Re: DNR? Here is a cheap & dirty unit that interfaces to a PC. This easily installed kit logs information on all outgoing and incoming calls, as well as any tone, from either MS-DOS or Windows. This kit and provided software indicate on your computer screen the date and time of each outgoing call, the length of the call and the number dialed. Credit card numbers also are logged. For incoming calls, the device even shows how many times your phone rang. Connect this kit to a parallel port on your PC. This unit requires 12-18Vdc/200mA wall transformer or 10-12Vdc. (Includes: 3 1/2" disk, case and instruction manual. Size: 1 1/2x5x5 1/4" (HWD) http://www.radioshack.com/product.asp?catalog%5Fname=CTLG&category%5Fname=&product%5Fid=990%2D0080 Bug Sweeper wrote: > Does anyone know of an inexpensive and simple DNR? Friend wants to keep > tabs on outgoing calls while someone is housesitting over a weekend. > > Thanks, > > E. Leonard > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 4489 From: iDEN-Test Port-Marcelrf Date: Thu Jan 10, 2002 1:17am Subject: Re: DNR? Let me try this again: This easily installed kit logs information on all outgoing and incoming calls, as well as any tone, from either MS-DOS or Windows. This kit and provided software indicate on your computer screen the date and time of each outgoing call, the length of the call and the number dialed. Credit card numbers also are logged. For incoming calls, the device even shows how many times your phone rang. Connect this kit to a parallel port on your PC. This unit requires 12-18Vdc/200mA wall transformer or 10-12Vdc. (Includes: 3 1/2" disk, case and instruction manual. Size: 1 1/2x5x5 1/4" (HWD).) http://www.radioshack.com/product.asp?catalog%5Fname=CTLG&category%5Fname=&product%5Fid=990%2D0080 Bug Sweeper wrote: > Does anyone know of an inexpensive and simple DNR? Friend wants to keep > tabs on outgoing calls while someone is housesitting over a weekend. > > Thanks, > > E. Leonard -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 4490 From: greendots . Date: Wed Jan 9, 2002 9:03pm Subject: [HUMOR] - How to put up a tower antenna Apologies for wasting bandwidth with humor. --- Subject: Fw: How to put up a tower antenna I am writing in response to your request for additional information on my recent accident. In block No. 3 of the accident reporting form I put "poor planning" as the cause of the accident. You said in your letter that I should explain more fully and I trust that the following details will be sufficient. I am an amateur radio operator.. On the day of the accident, I was working alone on the top section of my new 80 foot antenna tower. When I had completed my work, I discovered that I had, over the course of several trips up the tower, brought up about 300 pounds of tools and spare hardware. Rather than carry the now unneeded tools and hardware down by hand, I decided to lower the items in a small barrel by using a pulley which, fortunately, was attached to the gin pole at the top of the tower. Securing the rope at the ground level, I went up to the top of the tower and loaded the tools and hardware into the barrel. Then I went back to the ground and untied the rope holding tightly to insure a slow descent of the 300 pounds of tools and hardware. You will note in block No. 11 of the accident form that I weigh 155 pounds. Due to my surprise at being jerked off the ground so suddenly, I lost my presence of mind and forgot to let go of the rope. Needless to say, I proceeded at a rather rapid rate up the side of the tower. In the vicinity of the 40 foot level, I met the barrel coming down. This explains my fractured skull and broken collarbone. Slowed only slightly, I continued my rapid ascent, not stopping until the fingers of my right hand were two knuckles deep into the pulley. Fortunately by this time I had regained my presence of mind and was able to hold tightly to the rope in spite of my pain. At approximately the same time, however, the barrel hit the ground and the bottom fell out of the barrel. Devoid of the weight of the tools and hardware, the barrel now weighed 20 pounds. I refer you again to my weight in block 11. As you might imagine, I began a rapid descent down the side of the tower. In the vicinity of the 40 foot level, I met the barrel coming up, This accounts for the two fractured ankles and lacerations of my legs and lower body. The encounter with the barrel slowed me enough to lessen my injuries when I fell onto the pile of tools and hardware and, fortunately, only three vertebras were cracked. I am sorry to report however that as I lay there on the tools and hardware, in pain, unable to stand, and watching the empty barrel 80 feet above me, I again lost my presence of mind, I let go of the rope. _________________________________________________________________ Join the worldís largest e-mail service with MSN Hotmail. http://www.hotmail.com 4491 From: Aimee Farr Date: Thu Jan 10, 2002 11:54am Subject: FW: Secrecy News -- 01/10/02 [A vote among my female cohorts suggested that 80% of us would voluntarily enroll in such a program. The other 20% indicated they qualify for involuntary commitment. ~Aimee] > BILL WOULD BAN SPACE-BASED MIND CONTROL WEAPONS > > Rep. Dennis Kucinich (D-OH) introduced a bill in the House of > Representatives late last year that would ban weapons in space. But > while there have been many similar legislative initiatives in the past, > Rep. Kucinich's bill is distinguished by its unusually expansive > definition of "weapons." > > Among the weapons that it would proscribe the new measure includes > "psychotronic" devices that are "directed at individual persons or > targeted populations for the purpose of ... mood management, or mind > control." > > No explanation for this peculiar proposal was immediately available. > But the text of "The Space Preservation Act of 2001" (H.R. 2977), > introduced on October 2, may be found here: > > http://www.fas.org/sgp/congress/2001/hr2977.html > > The Kucinich bill was hailed by Citizens Against Human Rights Abuse, one > of a number of organizations of people who say they are victims of > government experimentation involving electromagnetic and other > psychotronic weapons. See their web site here: > > http://www.dcn.davis.ca.us/~welsh/ 4492 From: Miguel Puchol Date: Thu Jan 10, 2002 1:12pm Subject: Re: Rent A sweep I sometimes feel like buying some of these things, so that when I retire I can get some extra income from my own "Worthless Pseudo-TSCM Junk Museum" - members of this list will get free entrance :-) Cheers, Mike ----- Original Message ----- From: "Hawkspirit" To: Sent: Wednesday, January 09, 2002 4:47 AM Subject: [TSCM-L] Rent A sweep > Check this one out, you can now rent sweep equipment for the techno > do-it-yourselfer! > > http://www.spyamericaonline.com/store/comersus_listcategoriesandproducts.asp ?idCategory=12 > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4493 From: James M. Atkinson Date: Thu Jan 10, 2002 4:29pm Subject: A Wiretap In Every Home http://www.washingtonpost.com/wp-dyn/articles/A22888-2002Jan9.html A Wiretap In Every Home By Richard Cohen Thursday, January 10, 2002; Page A19 If it is true that all trends start in California, then the rest of the country had better pay attention. Gray Davis has proposed that his state's police agencies be given the same authority to fight terrorism that Congress recently gave the feds. If this keeps up, there won't be an untapped phone in the nation. It's not that what Davis proposes is so awful. What he has in mind is a state version of the insultingly named USA Patriot Act, which among other things expanded wiretap authority at the federal level. It also permits the government to monitor e-mail and Internet sites. Uncle Sam is going to know if you've been bad or good -- so be good for goodness' sake. But you better watch out. Because already other states are asking for the same authority. All this is being done in the name of anti-terrorism, but the expanded powers could be used for any purpose approved by a court -- a state court at that. You need only peer back in history to wonder if we are going to be any safer or, maybe, much worse off. Here I must state a prejudice. Having once been a statehouse correspondent (Maryland), I am underwhelmed by the competence and professionalism of state government. Most legislators are part-time, but the lobbyists are not. Often, they lead the representatives around by the nose -- offering expertise, advice and, in a pinch, a free vacation to somewhere very nice. Similarly, state judges do not match the caliber of their federal counterparts. Unlike federal judges, who are appointed for life, state judges usually are elected. ... [...] So it is not surprising that in the past, various states have mimicked the federal government -- hunting reds, anarchists, syndicalists and, later, integrationists. States, even cities, had their own red squads, persecuting or, on rare occasion, prosecuting alleged subversives or mere dissidents. There was hardly a major city in the country that didn't have some palooka in a fedora following some bookworm in a beret. [...] Yes, I know. That was then and this is now. But even now police power can be awesome if unchecked. The power to tap phones, to accumulate damaging personal information, to track your Internet habits is the stuff of Orwell and Kafka. It was also the stuff of the late Richard Daley of Chicago and the equally late Gov. Ross Barnett of Mississippi. Police power needs to be rationed, to be monitored. ... ...The last thing we need is 50 FBIs, some of them effectively accountable to no one. Let the feds handle terrorism. That way, we'll all be safer. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4494 From: James M. Atkinson Date: Thu Jan 10, 2002 4:25pm Subject: Judge: Ohio Ban on Concealed Weapons Unconstitutional http://www.foxnews.com/story/0,2933,42654,00.html Judge: Ohio Ban on Concealed Weapons Unconstitutional Thursday, January 10, 2002 Respond to Editor Email this Article CINCINNATI - A fitness trainer, hairdresser and pizza shop owner are all breathing easier after a judge in Ohio ruled they have a right to carry concealed weapons to protect themselves. "There is no doubt that the very thought a potential victim might possess a firearm deters that element of our society that cares nothing about laws or human life but rather understands only one thing - brute force," Hamilton County Judge Robert Ruehlman wrote. The common pleas judge ruled that Ohio's law against carrying concealed weapons violates the state constitution. Lawyers for the city of Cincinnati, the county and state said they would appeal the ruling. The lawsuit was filed in July 2000 by a private investigator and four other workers who said their jobs required them to carry weapons for self-defense. The workers say the Ohio Constitution allows citizens to bear arms and doesn't say the weapons cannot be concealed. But Ohio allows only law enforcement officials or officers of the state and federal government to carry concealed weapons. The workers argued that the ban subjects people to arrest before they get a chance in court to clear themselves by arguing they had legitimate self-defense reasons to be armed. Lawyers for Cincinnati, Hamilton County and the state countered that the right to bear arms does not prevent the state from regulating how people may carry guns. They said concealed weapons pose a threat to police officers and others. "Amidst all of the baying from gun opponents is the irrefutable fact that there will always be people in our society who refuse to follow any rules and how can never been reasoned with or rehabilitated," Ruehlman wrote. "These people have no conscience and no qualms about doing harm to innocent persons. As a consequence, every law-abiding citizen of this state has the right to protect him or herself with a concealed firearm." Ruehlman defined law-abiding people as those not otherwise prohibited by federal, state or local law from possessing firearms. Ruehlman heard testimony over four days in December. After the trial, lawyers defending the state law asked the judge to remove himself from the case. They said he couldn't make a fair ruling because his wife and baby were kidnapped at gunpoint outside a strip-mall camera shop in 1989. Ruehlman's wife, Tia, said a gun probably wouldn't have helped her overcome her assailant. She said she believes that residents should be able to carry concealed weapons but had not discussed the case with her husband. Ruehlman declined to comment on the request. Anti-gun groups said they were worried about the concealed weapons case because of Ruehlman's past rulings. Those include his dismissal of Cincinnati's lawsuit against gun manufacturers two years ago. The Associated Press contributed to this report. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4495 From: John McCain Date: Thu Jan 10, 2002 2:59pm Subject: Theory (brought to mind by Comsec C3I discussion) JMA's thoughts on the Consec device brought to mind a few thoughts that we might discuss a bit on the list. It's been kinda quiet lately anyway, but if this is too far off topic for you, trash it. We, as techies and engineers, tend to think in the ways we learned the laws of elementary physics . We (ok, technically "I" instead of "we", but I'll assume others fit the pattern) have been conditioned over the years to focus on steady-state activity instead of transients; for example we usually see a series circuit in its steady-state conditions... not it's dynamic response. A good example would be closing a switch on a circuit with a battery, capacitor, and resistor. We (at least I) first think that ok, there's a fast transient, then no current flows (other than perhaps some minor leakage through the cap). But, I conceptualize the no-current state of this circuit as it's "normal" state... not the transient state. In reality, both the initial transients as well as the steady state are the "normal" states for this circuit. Only rarely do I conceptualize things in their transient, dynamic conditions. I think of an oscillator as always oscillating, a transmitter as always transmitting, receiver as always receiving, etc. I even think of office politics and inter-personal dynamics as a sort of steady-state dynamic... not a series of transient events. I rarely even consider the "steady state" of oscillators, receivers, even LEDs, etc. starting up or shutting down. Finally getting to the point! I suspect that we should consider the transient, dynamic responses in the things we analyze and pay more attention to those transients. Looking very carefully at what fast transients occur when a phone goes off hook is something I've never done. Using a TDR or SA, we look at transients (since the dynamic is their "steady state"), but do you carefully observe the first pulse of that TDR trace to see what effect the circuit under test has on the TDR instrument? Or, do you just adjust magnitude to make it look "normal" and start looking at returns? I suspect those transients are sometimes telling us things that we don't hear. Am I off base here. Do others not fall into this trap? Any thoughts? JohnM Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-352-0350 807 Pioneer Web: http://www.dcbnet.com Champaign, IL. 61820 Email: Jmccain@d... 4496 From: david_johnrobinson Date: Thu Jan 10, 2002 4:11pm Subject: The "Big " rental sweep debate Two things hit me regarding this listing; A) so what is new? this stuff has been out there advertised for years. B) Why does every one immediatly jump and say CCS? Let me put my cards on the table, I was the operations manager for CCS for a time here in London, and they realy do not deserve the bad mouthing they get from the group, OK so most of the stuff they provide is "crap" from a professional point of veiw, but to most of their clients it's exactly what they want (most of them are Mr and Mrs Joe schmo ) Any one wanting professional equipment would /should come to professional suppliers like our company Department Q who only deal with Government level bugs , covert equipment and GSM tracking. I don't think it is CCS for several reasons, Firstly they have exactly this type of thing on their already long established web site ; www.spyzone.com which for the genre has some very nice products. Secondly we are told by the group these are CCS type prices - wrong! when I worked there the prices were much higher - try 800% mark up and dollar prices quoted as pounds in UK, and lastly they only ask for $500 dealer price - a CCS licence costs $150.000 with no stock. So I think it's time the "farmer and the cowboy should be friends", get off CCS back , there prices and equipment will kill them and the other dinosores off soon enough. If you want to worry, and it seems you do , try talking to professional covert suppliers - if you call us a spy shop you had better duck, ask us what we can do with your GSM phone and why we have stopped telebanking and wap messaging. There will always be some one out there who wants Kiddy toys and some one who will supply them - so let them , they deserve each other. Thanks for letting me have a say, I'll sneak back into the shadows now and watch the sparks fly. Dr David J Robinson Department Q (international HQ) England +44 1903 787943 Over 25 years covert experience with British forces 4497 From: Thomas Conlon Date: Thu Jan 10, 2002 4:51pm Subject: Re: local CO Info DSLReports has the best CO info I've seen, but it relies on user input quite a bit. Are there any public resources to research a given CO for profitability and co-locations, for example, or the consumer could research like before they move? That would be sweet. -tc syseng@m... __________________________________________________ Do You Yahoo!? Send FREE video emails in Yahoo! Mail! http://promo.yahoo.com/videomail/ 4498 From: Date: Thu Jan 10, 2002 1:05pm Subject: Re: The "Big " rental sweep debate In a message dated 1/10/02 3:29:16 PM Pacific Standard Time, david_johnrobinson@h... writes: << Any one wanting professional equipment would /should come to professional suppliers like our company Department Q who only deal with Government level bugs , covert equipment and GSM tracking. >> Thank you for the ad. 4499 From: James M. Atkinson Date: Thu Jan 10, 2002 6:35pm Subject: Re: The "Big " rental sweep debate Well, OK, let's take an objective look at this. If I lay my copy of the CCS and G-Com's catalog down next to my monitor, and then pull up the pages in question the images and specs look exactly like those in the CCS listings. In fact pretty much everything on the site looks like it was lifted right off the CCS book (with a bad scanner) , and marked up 30% over confidential dealer cost. If we then review the "spyzone" website we see almost identical items being offered, but at much higher prices. If we further go to the TSCM database of eavesdropping threats (called "Raphael") we find that several very specific items being offered on the website in question are proprietary to CCS, and CCS dealers, and that all roads lead back to CCS (do you see where I am going?). In my professional opinion virtually everything on the site in question is CCS products. Well, OK... it is actually someone else product with a CSS logo on it, a fancy box, and a ridiculous price tag; but for all practical purposes it is CCS stuff. A CCS "franchise" can be had for as little as nothing, or $500, or $1500 depending on what mood strikes that day, and if you have a good cigar with you. If someone pays much more then a few grand for a "dealership" they should also be investing in several bridges and tunnels I am offering at a good price. Personally, I think it is more of a case of "Cowboy verses Cattle Rustler" -jma At 10:11 PM +0000 1/10/02, david_johnrobinson wrote: >Two things hit me regarding this listing; A) so what is new? this >stuff has been out there advertised for years. >B) Why does every one immediatly jump and say CCS? Let me put my >cards on the table, I was the operations manager for CCS for a time >here in London, and they realy do not deserve the bad mouthing they >get from the group, OK so most of the stuff they provide is "crap" >from a professional point of veiw, but to most of their clients it's >exactly what they want (most of them are Mr and Mrs Joe schmo ) >Any one wanting professional equipment would /should come to >professional suppliers like our company Department Q who only deal >with Government level bugs , covert equipment and GSM tracking. >I don't think it is CCS for several reasons, Firstly they have >exactly this type of thing on their already long established web >site ; www.spyzone.com which for the genre has some very nice >products. Secondly we are told by the group these are CCS type >prices - wrong! when I worked there the prices were much higher - try >800% mark up and dollar prices quoted as pounds in UK, and lastly >they only ask for $500 dealer price - a CCS licence costs $150.000 >with no stock. >So I think it's time the "farmer and the cowboy should be friends", >get off CCS back , there prices and equipment will kill them and the >other dinosores off soon enough. >If you want to worry, and it seems you do , try talking to >professional covert suppliers - if you call us a spy shop you had >better duck, ask us what we can do with your GSM phone and why we >have stopped telebanking and wap messaging. >There will always be some one out there who wants Kiddy toys and some >one who will supply them - so let them , they deserve each other. >Thanks for letting me have a say, I'll sneak back into the shadows >now and watch the sparks fly. >Dr David J Robinson >Department Q (international HQ) >England >+44 1903 787943 >Over 25 years covert experience with British forces -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4500 From: James M. Atkinson Date: Thu Jan 10, 2002 7:07pm Subject: Re: Theory (brought to mind by Comsec C3I discussion) One of the things I look for during a sweep of the phone lines is how the CO relay reacts to various levels of current. What I am in interested in the electrical behavior of a line during the loop relay seizing the line, and releasing it, and more specifically the "overshoot" areas of the signal. I am also interested in the frequencies that appear right at the moments of making, and then of breaking the line. Also, during this transition point you can usually bounce several TDR pulses down line and pick out mouse feces from miles away. If done properly the multi-mega ohm devices (typical LEO devices or slaves) stand out like a sore thumb, and you can see virtually anything of interest along the line. The key is to get a really good impedance match (for the transition point), and then only trigger the TDR during the transient or ringing, and preferably during the zero crossing. Remember, the phone line BORSCHT operates in milliseconds, but TDR operated in pico and nano seconds. For a millisecond or so you have a dry line, and if you can get two lines to "go dry" at the same time you can do some really wonderful thing to find bugs or other mischief. -jma At 2:59 PM -0600 1/10/02, John McCain wrote: >JMA's thoughts on the Consec device brought to mind a few thoughts that we >might discuss a bit on the list. It's been kinda quiet lately anyway, but >if this is too far off topic for you, trash it. > >We, as techies and engineers, tend to think in the ways we learned the laws >of elementary physics . We (ok, technically "I" instead of "we", but I'll >assume others fit the pattern) have been conditioned over the years to >focus on steady-state activity instead of transients; for example we >usually see a series circuit in its steady-state conditions... not it's >dynamic response. > >A good example would be closing a switch on a circuit with a battery, >capacitor, and resistor. We (at least I) first think that ok, there's a >fast transient, then no current flows (other than perhaps some minor >leakage through the cap). But, I conceptualize the no-current state of >this circuit as it's "normal" state... not the transient state. In >reality, both the initial transients as well as the steady state are the >"normal" states for this circuit. > >Only rarely do I conceptualize things in their transient, dynamic >conditions. I think of an oscillator as always oscillating, a transmitter >as always transmitting, receiver as always receiving, etc. I even think of >office politics and inter-personal dynamics as a sort of steady-state >dynamic... not a series of transient events. I rarely even consider the >"steady state" of oscillators, receivers, even LEDs, etc. starting up or >shutting down. > >Finally getting to the point! I suspect that we should consider the >transient, dynamic responses in the things we analyze and pay more >attention to those transients. Looking very carefully at what fast >transients occur when a phone goes off hook is something I've never done. > >Using a TDR or SA, we look at transients (since the dynamic is their >"steady state"), but do you carefully observe the first pulse of that TDR >trace to see what effect the circuit under test has on the TDR >instrument? Or, do you just adjust magnitude to make it look "normal" and >start looking at returns? I suspect those transients are sometimes >telling us things that we don't hear. > >Am I off base here. Do others not fall into this trap? Any thoughts? >JohnM > > > >Manager, Corporate Security Voice: 217-352-3207 >Data Comm for Business, Inc. Fax: 217-352-0350 >807 >Pioneer Web: >http://www.dcbnet.com >Champaign, IL. 61820 Email: >Jmccain@d... > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4501 From: James M. Atkinson Date: Thu Jan 10, 2002 7:40pm Subject: Spy hunt sparked by 'fight with wife' http://www.ananova.com/news/story/sm_491601.html?menu= Spy hunt sparked by 'fight with wife' A man who sparked a spy alert apparently to cheer himself up after a row with his wife may have to pay thousands in compensation. The Japan Coast Guard spent more than L52,000 dispatching 17 vessels, launching aircraft 10 times, and mobilising 380 personnel. The man had reported seeing suspicious people in wet suits landing on an island. Police plan to send the case to prosecutors and charge the unidentified man. The Japan Times says he told police he hatched the story in an attempt to cheer himself up after a quarrel with his wife. It is reported the 41-year-old claimed five or six people wearing what looked like wet suits had emerged from what appeared to be a miniature submarine and landed on Enoshima Island, in Kanagawa. The coast guard then searched the North Korean freighter Sonamu. Nothing out of the ordinary was found on the ship which was first seen anchored near Enoshima just after the man made the report. The incident followed the sinking in late December of an unidentified but suspected North Korean spy ship in the East China Sea after a brief firefight with Japanese authorities. Story filed: 09:32 Thursday 10th January 2002 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4502 From: Steve Uhrig Date: Thu Jan 10, 2002 8:49pm Subject: Re: Attacking CCS? Yes, exactly that Once upon a midnight dreary, david_johnrobinson pondered, weak and weary: > Two things hit me regarding this listing; A) so what is new? this > stuff has been out there advertised for years. B) Why does every > one immediatly jump and say CCS? Because some of us have been around a long time and have seen this stuff over and over and over. I'm talking longer than some of the players in this industry have been alive and longer than practically anyone in the industry has been in business. > Let me put my cards on the table, I was the operations > manager for CCS for a time here in London Then pardon me for being forthright, but either you were incredibly naive or you are a crook. > and they realy do not deserve the bad mouthing they get from > the group, See comment above. If you really believe this, I will go with naive. > OK so most of the stuff they provide is "crap" from a > professional point of veiw, but to most of their clients it's > exactly what they want One could make the same argument about illegal drugs or abortion. That doesn't justify it. > Any one wanting professional equipment would /should come to > professional suppliers like our company Department Q who only > deal with Government level bugs , covert equipment and GSM > tracking. Now I will change my opionion back to crook. If you only deal with 'Government level bugs', why are you inviting anyone to come to you. Do you claim to be supplying 'Government level bugs' to anyone? In the unlikely event you supply anything at all, I would expect it would be to anyone *other* than the government. Remember, there are a (very) few people around who actually work in these technologies, with government clients on a daily basis, and cannot be fooled. Most of them are smarter than me and keep their mouths shut. I speak my mind. > I don't think it is CCS for several reasons For all the reasons you mention, it absolutely fits the pattern of CCS. Lie to someone with money, schmooze them, pump up their egos and convince them they will make outrageous profits dealing with CCS. The ignorant fool (and ANYONE who deals with CCS/G-COM in ANY way is an ignorant fool) hands CCS five or six figures for the 'privilege' of acquiring their absolutely worthless but impressive boxes of nonfunctional bells and whistles. At that point the relationship, such as it was, is over unless CCS feels they can extract/extort even more money from the ignorant fool. In this case apparently, and I have seen it more times than I could count, the ignorant fool private labeled the crap because he wants the other ignorant fools who might buy it to think he manufactured it. CCS doesn't care. They got their money. They probably charged the guy extra for private labeling it, which in itself is funny because CCS was the original king of repackaging and slapping their name on standard products from other manufacturers and claiming it as their own. CCS cheated the guy pushing this private labeled crap, because he was an ignorant fool and had more money than he had brains. ANYONE who does any homework on CCS would never deal with them on any level. > a CCS licence costs $150.000 with no stock. A CCS 'license' or 'distributorship' or whatever they choose to call it costs precisely as much money as they can extract from the ignorant fool who gets involved with them. They (CCS) are very good at developing financial information on their victims, and this is how much they charge. Same with 'exclusive' rights to distribute CCS's vaporware in a particular country. I had the distinct pleasure at a trade show in New Delhi some years ago of introducing three 'exclusive distributors for all of India' to each other. Each had paid, as I recall, sums between the rupee equivalent of USD $50,000 and $200,000 for the alleged privilege of having an 'exclusive' representation for CCS in all of India. None received anything in return. Nada. If I called them tomorrow, I could purchase the exclusive rights to distribute their products in any country you could name, and I likely would be the 50th person to purchase the exclusive. You were a member of the den of thieves. You know how the game is played. You just have to pretend to defend them to justify stealing money from your victims. If you led the victim (ignorant fool) to believe something which was not true, either from a product representation standpoint or from an equipment performance standpoint, then you committed fraud. Whether you believe it or not, some day there will be a day of judgement, and you will have to provide an accounting, before man possibly and to God definitely, for your actions. You do have the opportunity to escape those penalties and erase the slate, and if you wish to discuss this issue only via PRIVATE email with me I will be glad to do so. > If you want to worry, and it seems you do , try talking to > professional covert suppliers - if you call us a spy shop you > had better duck You already provided substantial incontrovertible testimony that you are a crook, and your likely fictitious claims indicate you still are operating in the mode you learned from CCS. Therefore you fit this list's generic, and my personal, definition of a spy shop. This month is 30 years I have been manufacturing electronic surveillance and intelligence gathering products for government agencies. Do some research and you will find that is true. Manufacturing is starting with a blank CAD screen, component manufacturer's data books, designing a prototype, breadboarding and debugging a few, building the prototype, debugging it, putting a few beta test units into hands of professional users, getting their feedback and incorporating that into the design, refining the design, getting circuit boards etched and stuffed with components, firmware written, the incredibly difficult job of doing an effective job of packaging, documenting everything for small or medium scale production, writing instruction manuals, technical manuals, writing test procedures, setting up boxing and labeling and all the other tasks which exist between a wet dream and a workable effective product shipping to market. It is not taking some other company's product, repackaging it, and slapping your own name on it. Your claim of dealing in covert electronics is not the claim someone would make who genuinely does that work, but is the claim of someone who is playing the same CCS game of dealing in sensitive and restricted equipment as a sales tactic to make ignorant fools believe they are getting something they're not supposed to have. CCS caters to Walter Mittys, people who have more money than brains, and people who want to throw money at something and think they are going to get rich overnight. CCS sells dreams. They play on the mystique of dealing in sensitive and restricted technology. And ignorant fools fall for it, don't do any homework, and lose their investment. CCS plays a psychology game more than anything else. You know it and I know it and a good number of others know it. Denying it just digs your grave deeper. Some of us have been around for a while. All over the world, dealing with governments who have been cheated by CCS and seeing their tactics firsthand. I have visited most of CCS' shops around the world, played the game, flashed some cash and pretended to believe them just to see how bold they would get. I've witnessed and exposed phony government demos of theirs over and over, and some were impressingly cleverly staged. Don't forget that. There are others on this list who read your comments the same way I interpret them, who have similar backgrounds. They just, as mentioned above, have the discretion to just let you play your little spy groupie game and keep quiet. I don't often blatantly attack crooks, but you provided sufficient evidence to where a reasonable man who is familiar with this industry would believe you were and are a crook and a prevaricator (polite word for liar). I've made my comments, and of course you will have to jump in and whine and threaten and bluff and try to save face and convince all 1000+ of us who follow this excellent list that you are not a crook claiming to manufacture all sorts of secret squirrel devices but are just a bold groupie pretending to play a man's game and thinking you will fool us. You may fool some of us. You will not fool all of us. Maybe you're just mentally deficient. Maybe you are merely delusional. I don't know. More likely, you learned how to extract money from ignorant fools from your time at CCS, and are continuing to pretend, now that you have your own business card, letterhead and probably a combination phone and fax machine operating in some corner of your flat. Do you have full time employment somewhere else to earn enough money to pay the light bill and feed your fantasy of peddling vaporware to alleged government agencies? You're really only fooling yourself. You can reply however you wish, but I will not be baited and will say no more on the subject. The above represents 30 years of watching this industry and being intimately involved in the very issues I discussed, and knowing of whence I speak. The very best move you could make at this point would be to drop the issue and just back off and fade back into your 'lab' in the spare bedroom of your flat. I will work patiently for years mentoring someone who genuinely wants to start a business, pay his dues, build it on a firm foundation and, above all, be honest with everyone. I have done this with a number of members on this list, behind the scenes, for no reason other than I wanted to give something back to the younger fellows and help them get started along the right path. No one on the list knows it because I don't do it for money or to feed my ego. If someone wants to start an *honest* business and understands it takes years of work, I'm glad to share with them some of my experiences, mistakes and successes. But I give no quarter to the crooks in this industry. A former sales manager I had commented that this was the scummiest industry in which he ever had been involved. This message seems to confirm his observation. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: James M. Atkinson Date: Sat Jan 8, 2005 6:29pm Subject: Once more into the breach ACT III. SCENE I. France. Before Harfleur King Henry urging his men on at the siege of Harfleur. Once more unto the breach, dear friends, once more; Or close the wall up with our English dead. In peace there's nothing so becomes a man As modest stillness and humility; But when the blast of war blows in our ears, Then imitate the action of the tiger: Stiffen the sinews, summon up the blood, Disguise fair nature with hard-favour'd rage; Then lend the eye a terrible aspect; Let it pry through the portage of the head Like the brass cannon: let the brow o'erwhelm it As fearfully as doth a galled rock O'erhang and jutty his confounded base, Swill'd with the wild and wasteful ocean. Now set the teeth and stretch the nostril wide; Hold hard the breath, and bend up every spirit To his full height. On, on, you noblest English, Whose blood is fet from fathers of war-proof- Fathers that like so many Alexanders Have in these parts from morn till even fought, And sheath'd their swords for lack of argument. Dishonour not your mothers; now attest That those whom you call'd fathers did beget you. Be copy now to men of grosser blood, And teach them how to war. And you, good yeomen, Whose limbs were made in England, show us here The mettle of your pasture; let us swear That you are worth your breeding- which I doubt not; For there is none of you so mean and base That hath not noble lustre in your eyes. I see you stand like greyhounds in the slips, Straining upon the start. The game's afoot: Follow your spirit; and upon this charge Cry 'God for Harry, England, and Saint George!' ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10528 From: Hawkspirit Date: Sun Jan 9, 2005 0:31am Subject: E-bay Bug Sweep How about an e-bay bug sweep HYPERLINK "http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category=317&item=3865048754& rd=1&ssPageName=WDVW"http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category= 317&item=3865048754&rd=1&ssPageName=WDVW Electronic Surveillance - Counter Measures - Services Item number: 3865048754 You are signed in Highborne F. S. Inc. is a company specializing in Electronic Countermeasures to detect, locate, and eleminate unwanted and illegal wireless devices to protect your privacy. Hidden video and voice transmission devices can compromise your privacy through anything you say or do in the vacinity of a hidden microphone, camera , or other transmitting devices. We are not a company that sends a technician out with a little $100 or $200 hand held detector that in most cases will miss 90% of the hidden devices. We are backed with approximately $250,000.00 is test equipment to analyze buildings, boats, ships, aircraft, homes, and cars. The picture was taken at the last home contracted. Pricing will depend on the magnitude of the surveillance requirements. For example a "FULL SPECTRUM" analysis (covers billions of frequencies) for a 3 bedroom 2 bath home, with approximately 1800 sq ft, would require about 8 hours at $125.00 per hour. Accordingly the price shown as a 'Buy it Now' price represents one hour and travel / per diem is over and above the hourly rate on site. Counter measure surveillance can be conducted in one hour for all common hidden transmitter frequencies for a 800 sq ft area, however we strongly recommend a "Full Spectrum" analysis to ensure full coverage of the billions of frequency possibilities. A certified engineer with over 15 years plus experience will conduct the analysis and a report will be issued along with any immediate remedial actions required to eliminate discovered RF devices. In addition to this service, we can analyze any radio transmission device up to and including 40 Ghz for field strength, frequency, spurious radiation, bandwidth, stability etc. Contract with confidence to acquire the best in professional services! Call 918/688-3978 _____ --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.830 / Virus Database: 565 - Release Date: 1/6/2005 [Non-text portions of this message have been removed] 10529 From: Date: Sun Jan 9, 2005 5:46am Subject: TICSA Can anybody tell me what a TICSA is please, sounds like a nasty illness. David McGauley England [Non-text portions of this message have been removed] 10530 From: Date: Sun Jan 9, 2005 5:55am Subject: Re: Once more into the breach In a message dated 09/01/2005 00:44:05 GMT Standard Time, jmatk@tscm.com writes: ACT III. SCENE I. France. Before Harfleur King Henry urging his men on at the siege of Harfleur. Once more unto the breach, dear friends, once more; Or close the wall up with our English dead. In peace there's nothing so becomes a man As modest stillness and humility; But when the blast of war blows in our ears, Then imitate the action of the tiger: Stiffen the sinews, summon up the blood, Disguise fair nature with hard-favour'd rage; Then lend the eye a terrible aspect; Let it pry through the portage of the head Like the brass cannon: let the brow o'erwhelm it As fearfully as doth a galled rock O'erhang and jutty his confounded base, Swill'd with the wild and wasteful ocean. Now set the teeth and stretch the nostril wide; Hold hard the breath, and bend up every spirit To his full height. On, on, you noblest English, Whose blood is fet from fathers of war-proof- Fathers that like so many Alexanders Have in these parts from morn till even fought, And sheath'd their swords for lack of argument. Dishonour not your mothers; now attest That those whom you call'd fathers did beget you. Be copy now to men of grosser blood, And teach them how to war. And you, good yeomen, Whose limbs were made in England, show us here The mettle of your pasture; let us swear That you are worth your breeding- which I doubt not; For there is none of you so mean and base That hath not noble lustre in your eyes. I see you stand like greyhounds in the slips, Straining upon the start. The game's afoot: Follow your spirit; and upon this charge Cry 'God for Harry, England, and Saint George!' ------------------------------------------------------------------------------ ---------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ------------------------------------------------- --------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ------------------------------------------------------------------------------ ---------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ------------------------------------------------------------------------------ ---------------------- ------------------------ Yahoo! Groups Sponsor --------------------~--> Has someone you know been affected by illness or disease? Network for Good is THE place to support health awareness efforts! _Click Here!_ (http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links Well said Jim but there were Scots Welshmen and Irishmen there at the time so you may get a few complaints. I am seriously considering the AOR SR 2000 Surveillance Receiver due out early this year Its marketed as a cross bt the AR-ONE and the AR8600MK2 pretty much same spec as both I asked this question a few months ago nobody had an opinion so I am trying again I have no experience of AOR David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom designed covert electronic audio and video devices. Sweep Services - Professional physical and Electronic countermeasures utilising state of the art laboratory radio scanning and detection equipment. Note: Any fellow WAPI and UKPIN members welcome to phone or call in to discuss projects and applications or simply for free advice. Workshop located alongside M58 junc 3. [Non-text portions of this message have been removed] 10531 From: Andy Moore Date: Sun Jan 9, 2005 11:26am Subject: Re: Once more into the breach Dave, we had cause to look at the birdies within the AR5000+3 recently and there plenty of them - given that the 5000 is 'top of the range' it seems fair to conclude that all other AOR radios will harbour similar birdies thus you need to consider the possibility of missing some signals (for whatever purpose you might be using the receiver). Andy M PS No complaints about the Shakespeare quotation but I'm a bigger fan of the Corries' writings myself! ----- Original Message ----- From: To: Sent: Sunday, January 09, 2005 4:55 PM Subject: Re: [TSCM-L] Once more into the breach > > > > In a message dated 09/01/2005 00:44:05 GMT Standard Time, jmatk@tscm.com > writes: > > > > ACT III. > SCENE I. > France. Before Harfleur > King Henry urging his men on at the siege of Harfleur. > > Once more unto the breach, dear friends, once more; > Or close the wall up with our English dead. > In peace there's nothing so becomes a man > As modest stillness and humility; > But when the blast of war blows in our ears, > Then imitate the action of the tiger: > Stiffen the sinews, summon up the blood, > Disguise fair nature with hard-favour'd rage; > Then lend the eye a terrible aspect; > Let it pry through the portage of the head > Like the brass cannon: let the brow o'erwhelm it > As fearfully as doth a galled rock > O'erhang and jutty his confounded base, > Swill'd with the wild and wasteful ocean. > Now set the teeth and stretch the nostril wide; > Hold hard the breath, and bend up every spirit > To his full height. On, on, you noblest English, > Whose blood is fet from fathers of war-proof- > Fathers that like so many Alexanders > Have in these parts from morn till even fought, > And sheath'd their swords for lack of argument. > Dishonour not your mothers; now attest > That those whom you call'd fathers did beget you. > Be copy now to men of grosser blood, > And teach them how to war. And you, good yeomen, > Whose limbs were made in England, show us here > The mettle of your pasture; let us swear > That you are worth your breeding- which I doubt not; > For there is none of you so mean and base > That hath not noble lustre in your eyes. > I see you stand like greyhounds in the slips, > Straining upon the start. The game's afoot: > Follow your spirit; and upon this charge > Cry 'God for Harry, England, and Saint George!' > > > > > -------------------------------------------------------------------------- ---- > ---------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ------------------------------------------------- > --------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------------- ---- > ---------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------------- ---- > ---------------------- > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > > > Well said Jim but there were Scots Welshmen and Irishmen there at the time > so you may get a few complaints. > I am seriously considering the AOR SR 2000 Surveillance Receiver due out > early this year > Its marketed as a cross bt the AR-ONE and the AR8600MK2 pretty much same > spec as both > I asked this question a few months ago nobody had an opinion so I am trying > again > I have no experience of AOR > > > David McGauley > TSCM [Technical Surveillance and Countermeasures] > Electronic Surveillance and Sweep Specialist > Electrical/Electronics Engineer ex Police > Demtec House > Ormskirk > Lancs L390HF > UK > 01695558544 > 07866206112 > demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) > > The manufacture and installation of custom designed covert electronic audio > and video devices. > Sweep Services - Professional physical and Electronic countermeasures > utilising state of the art laboratory radio scanning and detection equipment. > Note: Any fellow WAPI and UKPIN members welcome to phone or call in to > discuss projects and applications or simply for free advice. > Workshop located alongside M58 junc 3. > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10532 From: G P Date: Sun Jan 9, 2005 0:50pm Subject: Re: vonage? Depends on who the threat is. If you're concerned about crusty lawyers and their linemen buddies from the local telco, then broadband is the way to go. If your opponent is more high tech and has access to a skilled hacker, then sniffing SIP is trivial, especially on shared layer-2 segments such as broadband cable. A Russian group disassembled the Motorola cable modem firmware a few years ago and discovered most cable modems are running a VXworks RTOS variant; after hacking the hardware, they released several new firmware images and a special cable (http://www.tcniso.net) which allows for sniffing of broadband network traffic from a cable modem (as well as a host of other features, such as unlimited bandwidth etc). Most providers don't have encryption turned on via DOCSIS, in addition if you aren't statically hardcoding the MAC address of your default route then any one of a number of tools can be used to redirect traffic on a broadband cable segment, to and from your PC, via ARP cache poisoning. Same thing on DSL segments, although it's a bit more complicated and depends on how the DSLAM is configured. VoIP via leased line circuit (T1 for example) would be the safest, especially if you are quashing or rewriting CLID on outbound VoIP calls so people can't track back the toll records tied to a specific phone number account. Do a Google for "Fox News" +AMDOCS, toll records are pretty easy to gain access to, and lots of foreign companies are handling the processing of telephone billing records. Our national comms are as porous as our physical borders. Asterisk to Asterisk (http://www.asterisk.org) gateways, with encrypted VPN links in the middle are very secure for interoffice comms, provided each branch network is secured from outside attack with a stateful inspection firewall. --- littledog wrote: > > > Hello, could anyone out the give me their insight on > the new broadband cable phone services? Are they > more or less secure and since it seems that > everything is controlled through a website (or is > it?) like customizing the service to a record of all > incoming and outgoing calls, are they vulnerable to > hackers? I'm new and still in the little red > schoolhouse..thanx > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > What would our lives be like without music, dance, > and theater? > Donate or volunteer in the arts today at Network for > Good! > http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10533 From: Tech Sec Lab Date: Sun Jan 9, 2005 2:19pm Subject: Comments... Anyone know anything about these people...? http://www.tscmnetwork.com/ TSCM Network Post Office Box 842 Millbrook, AL 36054, USA. 10534 From: Date: Sun Jan 9, 2005 10:17am Subject: Re: Comments... In a message dated 1/9/2005 12:20:26 PM Pacific Standard Time, tscmteam@o... writes: http://www.tscmnetwork.com/ website picture [Non-text portions of this message have been removed] 10535 From: John and Sheryl Date: Sun Jan 9, 2005 1:04am Subject: RE: E-bay Bug Sweep Now I have seen everything, just last week he was selling shoes, now sweep, next week.....to be continued... John -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: January 8, 2005 11:32 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] E-bay Bug Sweep How about an e-bay bug sweep HYPERLINK "http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category=317&item=3865048754& rd=1&ssPageName=WDVW"http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category= 317&item=3865048754&rd=1&ssPageName=WDVW Electronic Surveillance - Counter Measures - Services Item number: 3865048754 You are signed in Highborne F. S. Inc. is a company specializing in Electronic Countermeasures to detect, locate, and eleminate unwanted and illegal wireless devices to protect your privacy. Hidden video and voice transmission devices can compromise your privacy through anything you say or do in the vacinity of a hidden microphone, camera , or other transmitting devices. We are not a company that sends a technician out with a little $100 or $200 hand held detector that in most cases will miss 90% of the hidden devices. We are backed with approximately $250,000.00 is test equipment to analyze buildings, boats, ships, aircraft, homes, and cars. The picture was taken at the last home contracted. Pricing will depend on the magnitude of the surveillance requirements. For example a "FULL SPECTRUM" analysis (covers billions of frequencies) for a 3 bedroom 2 bath home, with approximately 1800 sq ft, would require about 8 hours at $125.00 per hour. Accordingly the price shown as a 'Buy it Now' price represents one hour and travel / per diem is over and above the hourly rate on site. Counter measure surveillance can be conducted in one hour for all common hidden transmitter frequencies for a 800 sq ft area, however we strongly recommend a "Full Spectrum" analysis to ensure full coverage of the billions of frequency possibilities. A certified engineer with over 15 years plus experience will conduct the analysis and a report will be issued along with any immediate remedial actions required to eliminate discovered RF devices. In addition to this service, we can analyze any radio transmission device up to and including 40 Ghz for field strength, frequency, spurious radiation, bandwidth, stability etc. Contract with confidence to acquire the best in professional services! Call 918/688-3978 _____ --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.830 / Virus Database: 565 - Release Date: 1/6/2005 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10536 From: mark de Boer Date: Sun Jan 9, 2005 3:14am Subject: Re: E-bay Bug Sweep Interesting company, and very inexpencive too, 125 dollar per our rate, how can they bring 250000 dollar in equipment and then stil make some money. M.de Boer RRB security Hawkspirit wrote: How about an e-bay bug sweep HYPERLINK "http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category=317&item=3865048754& rd=1&ssPageName=WDVW"http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category= 317&item=3865048754&rd=1&ssPageName=WDVW Electronic Surveillance - Counter Measures - Services Item number: 3865048754 You are signed in Highborne F. S. Inc. is a company specializing in Electronic Countermeasures to detect, locate, and eleminate unwanted and illegal wireless devices to protect your privacy. Hidden video and voice transmission devices can compromise your privacy through anything you say or do in the vacinity of a hidden microphone, camera , or other transmitting devices. We are not a company that sends a technician out with a little $100 or $200 hand held detector that in most cases will miss 90% of the hidden devices. We are backed with approximately $250,000.00 is test equipment to analyze buildings, boats, ships, aircraft, homes, and cars. The picture was taken at the last home contracted. Pricing will depend on the magnitude of the surveillance requirements. For example a "FULL SPECTRUM" analysis (covers billions of frequencies) for a 3 bedroom 2 bath home, with approximately 1800 sq ft, would require about 8 hours at $125.00 per hour. Accordingly the price shown as a 'Buy it Now' price represents one hour and travel / per diem is over and above the hourly rate on site. Counter measure surveillance can be conducted in one hour for all common hidden transmitter frequencies for a 800 sq ft area, however we strongly recommend a "Full Spectrum" analysis to ensure full coverage of the billions of frequency possibilities. A certified engineer with over 15 years plus experience will conduct the analysis and a report will be issued along with any immediate remedial actions required to eliminate discovered RF devices. In addition to this service, we can analyze any radio transmission device up to and including 40 Ghz for field strength, frequency, spurious radiation, bandwidth, stability etc. Contract with confidence to acquire the best in professional services! Call 918/688-3978 _____ --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.830 / Virus Database: 565 - Release Date: 1/6/2005 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- ALL-NEW Yahoo! Messenger - all new features - even more fun! [Non-text portions of this message have been removed] 10537 From: Ian Wraith Date: Sun Jan 9, 2005 11:26am Subject: Re: Once more into the breach Hello DEMTEC@A... wrote: > I am seriously considering the AOR SR 2000 Surveillance Receiver due out > early this year Its marketed as a cross bt the AR-ONE and the > AR8600MK2 pretty much same spec as both > I asked this question a few months ago nobody had an opinion so I am > trying again I have no experience of AOR I haven't used a SR-2000 and I don't think AOR had one at the Leicester show this year. I have used the AOR SDU-5000 at work and that is easy to use and understand if a little slow. However the SDU-5500 seems to have cured the speed problem. If the SR-2000 is what it appears to be (a SDU-5500 mated to a AOR-8600) then it will be a nice bit of kit. Obviously not as good as an Agilent analyser but a lot cheaper. As for AOR I am a big fan and the support here in the UK (provided by an office in Derby) is fantastic and they are always very helpful to users when other manufacturers just ignore you. I always recomend AOR receivers to customers who ask me which tracking receiver to use. Regards Ian 10538 From: Robin Hunter Date: Sun Jan 9, 2005 0:55pm Subject: Re- One more into the Breach Well spotted Dave McGauley, any reading of the history of the British Army will illustrate that the Scots Irish and Welsh played a disproportionate part in the building of 'Empire' and this continues today, for example the recent move of the Black Watch in Iraq and the subsequent announcement by President Blair's government of their proposed disbandment. For hundreds of years, wherever Britain has been involved in conflict the 'Jocks' have been in the frontline, I am pretty sure Shakespeare's military record is as distinguished as Tony Blair's. regards from Edinburgh, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. [Non-text portions of this message have been removed] 10539 From: cornolio Date: Sun Jan 9, 2005 2:56pm Subject: Best wishes and some info Hello List, First of all I would like to whish you all the best for 2005! I hope the list will keep up the high quality postings I have seen last year. I would like to point a few things that caught my attention lately. The first one is Tor: An anonymous Internet communication system. This is very promising, especially since here in Holland providers are (going to be) forced to keep huge traffic logs of all sites and URL's visited by their customers! I have TOR running here, and they are not going to snoop my web behavior , and keep the logs till the end of times :) TOR now sponsored by the EFF : http://tor.eff.org/ And together with my friend Rop I wrote a small whitepaper on a new lock vulnerability. With this technique you can open practically any pin tumbler lock, including some (very) high security ones, in seconds, without leaving (much of) a trace. What is needed is a prepared key, a hammer and little training. A video shot at the CCC congress in Berlin will be online soon, but in the meantime you might want to read the whitepaper and upgrade your locks! http://www.toool.nl/bumping.pdf (less then one Mb) Greetings, Barry Wels 10540 From: Samuel Hayes Date: Sun Jan 9, 2005 8:57pm Subject: Re: Re: Microphones This string of responses seems to have gotten away from the original question about the microphones, so to divert attention back to that I will attempt to answer as a TSCM neophyte. I would think that a microphone placed more then 20 ft from the subject would not be efficient due to the amount of ambient noise in the environment. It would probably take a professional sound engineer and alot of expensive CSI like doohickeys to filter out the surounding noise and gain access to the relevant audio...but I could be wrong. Just an educated guess ( i hope). --- secureoffice wrote: > > Jim > > It's not my place to comment on the relationship > between two people or > how they behave. I was simply pointing out the fact. > It was not meant > as a condemnation or opposite. As a list owner you > are perfectly > entitled to do what you see fit. However, it's not > my place to comment > on who was right or wrong, and I won't. > > I was simply letting Mr Garrett know that he should > contact Steve > directly should he require his specific response. > > I trust the matter requires no further explanation. > > Kindest regards > > -Ois > > > > > > > > > > --- In TSCM-L@yahoogroups.com, "James M. Atkinson" > wrote: > > > > Ois, > > > > The only time that I have ever banned or removed > someone from the > list is > > when that person becomes extremely disruptive and > rude or abusive to > the > > list membership, or if I catch them doing naughty, > naughty things. > > > > Steve was indeed banned from this group a few > months back, but only > after > > his repeat transgressions significantly exceeded > his welcome and my > > tolerance of his often offensive Prima Donna > behavior. tripped the > squelch > > circuit. He was given ample time to mend his > behavior for at least six > > month before his being banned. > > > > "sapiens timet et declinat malum stultus > transilit et confidit, > > Proverb14:16 > > > > The list needs good communications, and a place > where members can ask > > questions and discuss all levels of TSCM from the > beginner and > apprentice > > levels to the Technician and Engineering levels. > The list exists to > > improve the profession, and for no other purpose. > > > > Also, greetz to the list members who are going out > to the Little Red > School > > house for the first time, enjoy the daily commute > (you know who you > are). > > > > -jma > > > > > > > > At 02:26 PM 1/5/2005, secureoffice wrote: > > > > > > >Steve was banned from the group by the group > owner, you'll need to > > >email him directly if you want his opinion. > > > > > >Regards > > > > > >-Ois > > > > > > > > >--- In TSCM-L@yahoogroups.com, "DJ" > wrote: > > > > > > > > > > > > Steve you could probably answer this one. In > the movie Enemy of the > > > > State (steve did a great job here), I saw many > microphones used at > > > > long ranges to listen into the subjects > conversations. Does anyone > > > > have any whitepapers or any other information > on the availability of > > > > microphones that will work at a distance of > over 20 feet from the > > > > subject? > > > > > > > > Thanks, > > > > IT2 Garrett > > > > > > > ---------------------------------------------------------------------------------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, > and Real Wiretappers. > > > ---------------------------------------------------------------------------------------------------- > > James M. Atkinson > Phone: (978) 381-9111 > > Granite Island Group Fax: > > > 127 Eastern Avenue #291 > Web: > http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > > > ---------------------------------------------------------------------------------------------------- > > World Class, Professional, Ethical, and > Competent Bug Sweeps, and > > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > > > ---------------------------------------------------------------------------------------------------- > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - You care about security. So do we. http://promotions.yahoo.com/new_mail 10541 From: Date: Sun Jan 9, 2005 10:07pm Subject: Re: Once more into the breach In a message dated 09/01/2005 17:30:06 GMT Standard Time, ASMoore@A... writes: Dave, we had cause to look at the birdies within the AR5000+3 recently and there plenty of them - given that the 5000 is 'top of the range' it seems fair to conclude that all other AOR radios will harbour similar birdies thus you need to consider the possibility of missing some signals (for whatever purpose you might be using the receiver). Andy M PS No complaints about the Shakespeare quotation but I'm a bigger fan of the Corries' writings myself! ----- Original Message ----- From: To: Sent: Sunday, January 09, 2005 4:55 PM Subject: Re: [TSCM-L] Once more into the breach > > > > In a message dated 09/01/2005 00:44:05 GMT Standard Time, jmatk@tscm.com > writes: > > > > ACT III. > SCENE I. > France. Before Harfleur > King Henry urging his men on at the siege of Harfleur. > > Once more unto the breach, dear friends, once more; > Or close the wall up with our English dead. > In peace there's nothing so becomes a man > As modest stillness and humility; > But when the blast of war blows in our ears, > Then imitate the action of the tiger: > Stiffen the sinews, summon up the blood, > Disguise fair nature with hard-favour'd rage; > Then lend the eye a terrible aspect; > Let it pry through the portage of the head > Like the brass cannon: let the brow o'erwhelm it > As fearfully as doth a galled rock > O'erhang and jutty his confounded base, > Swill'd with the wild and wasteful ocean. > Now set the teeth and stretch the nostril wide; > Hold hard the breath, and bend up every spirit > To his full height. On, on, you noblest English, > Whose blood is fet from fathers of war-proof- > Fathers that like so many Alexanders > Have in these parts from morn till even fought, > And sheath'd their swords for lack of argument. > Dishonour not your mothers; now attest > That those whom you call'd fathers did beget you. > Be copy now to men of grosser blood, > And teach them how to war. And you, good yeomen, > Whose limbs were made in England, show us here > The mettle of your pasture; let us swear > That you are worth your breeding- which I doubt not; > For there is none of you so mean and base > That hath not noble lustre in your eyes. > I see you stand like greyhounds in the slips, > Straining upon the start. The game's afoot: > Follow your spirit; and upon this charge > Cry 'God for Harry, England, and Saint George!' > > > > > -------------------------------------------------------------------------- ---- > ---------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ------------------------------------------------- > --------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------------- ---- > ---------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------------- ---- > ---------------------- > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > > > Well said Jim but there were Scots Welshmen and Irishmen there at the time > so you may get a few complaints. > I am seriously considering the AOR SR 2000 Surveillance Receiver due out > early this year > Its marketed as a cross bt the AR-ONE and the AR8600MK2 pretty much same > spec as both > I asked this question a few months ago nobody had an opinion so I am trying > again > I have no experience of AOR > > > David McGauley > TSCM [Technical Surveillance and Countermeasures] > Electronic Surveillance and Sweep Specialist > Electrical/Electronics Engineer ex Police > Demtec House > Ormskirk > Lancs L390HF > UK > 01695558544 > 07866206112 > demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) > > The manufacture and installation of custom designed covert electronic audio > and video devices. > Sweep Services - Professional physical and Electronic countermeasures > utilising state of the art laboratory radio scanning and detection equipment. > Note: Any fellow WAPI and UKPIN members welcome to phone or call in to > discuss projects and applications or simply for free advice. > Workshop located alongside M58 junc 3. > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > ------------------------ Yahoo! Groups Sponsor --------------------~--> Has someone you know been affected by illness or disease? Network for Good is THE place to support health awareness efforts! _Click Here!_ (http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links Thanks for that Andy and noted Many thanks Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom designed covert electronic audio and video devices. Sweep Services - Professional physical and Electronic countermeasures utilising state of the art laboratory radio scanning and detection equipment. Note: Any fellow WAPI and UKPIN members welcome to phone or call in to discuss projects and applications or simply for free advice. Workshop located alongside M58 junc 3. [Non-text portions of this message have been removed] 10542 From: Date: Sun Jan 9, 2005 10:13pm Subject: Re: Once more into the breach In a message dated 10/01/2005 00:27:22 GMT Standard Time, i.wraith@s... writes: Hello DEMTEC@A... wrote: > I am seriously considering the AOR SR 2000 Surveillance Receiver due out > early this year Its marketed as a cross bt the AR-ONE and the > AR8600MK2 pretty much same spec as both > I asked this question a few months ago nobody had an opinion so I am > trying again I have no experience of AOR I haven't used a SR-2000 and I don't think AOR had one at the Leicester show this year. I have used the AOR SDU-5000 at work and that is easy to use and understand if a little slow. However the SDU-5500 seems to have cured the speed problem. If the SR-2000 is what it appears to be (a SDU-5500 mated to a AOR-8600) then it will be a nice bit of kit. Obviously not as good as an Agilent analyser but a lot cheaper. As for AOR I am a big fan and the support here in the UK (provided by an office in Derby) is fantastic and they are always very helpful to users when other manufacturers just ignore you. I always recomend AOR receivers to customers who ask me which tracking receiver to use. Regards Ian ------------------------ Yahoo! Groups Sponsor --------------------~--> Has someone you know been affected by illness or disease? Network for Good is THE place to support health awareness efforts! _Click Here!_ (http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links Thanks Ian Yes I also found the AOR agent here very friendly and helpful. I would not use this device to replace my Spectrum Analyser. I have not heard anything to put me off buying the SR2000 yet Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom designed covert electronic audio and video devices. Sweep Services - Professional physical and Electronic countermeasures utilising state of the art laboratory radio scanning and detection equipment. Note: Any fellow WAPI and UKPIN members welcome to phone or call in to discuss projects and applications or simply for free advice. Workshop located alongside M58 junc 3. [Non-text portions of this message have been removed] 10543 From: Date: Sun Jan 9, 2005 10:22pm Subject: AOR 2000 Photo In a message dated 10/01/2005 09:14:09 GMT Standard Time, DEMTEC@A... writes: In a message dated 10/01/2005 00:27:22 GMT Standard Time, i.wraith@s... writes: Hello DEMTEC@A... wrote: > I am seriously considering the AOR SR 2000 Surveillance Receiver due out > early this year Its marketed as a cross bt the AR-ONE and the > AR8600MK2 pretty much same spec as both > I asked this question a few months ago nobody had an opinion so I am > trying again I have no experience of AOR I haven't used a SR-2000 and I don't think AOR had one at the Leicester show this year. I have used the AOR SDU-5000 at work and that is easy to use and understand if a little slow. However the SDU-5500 seems to have cured the speed problem. If the SR-2000 is what it appears to be (a SDU-5500 mated to a AOR-8600) then it will be a nice bit of kit. Obviously not as good as an Agilent analyser but a lot cheaper. As for AOR I am a big fan and the support here in the UK (provided by an office in Derby) is fantastic and they are always very helpful to users when other manufacturers just ignore you. I always recomend AOR receivers to customers who ask me which tracking receiver to use. Regards Ian ------------------------ Yahoo! Groups Sponsor --------------------~--> Has someone you know been affected by illness or disease? Network for Good is THE place to support health awareness efforts! _Click Here!_ (http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links Thanks Ian Yes I also found the AOR agent here very friendly and helpful. I would not use this device to replace my Spectrum Analyser. I have not heard anything to put me off buying the SR2000 yet Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom designed covert electronic audio and video devices. Sweep Services - Professional physical and Electronic countermeasures utilising state of the art laboratory radio scanning and detection equipment. Note: Any fellow WAPI and UKPIN members welcome to phone or call in to discuss projects and applications or simply for free advice. Workshop located alongside M58 junc 3. [Non-text portions of this message have been removed] ------------------------ Yahoo! Groups Sponsor --------------------~--> In low income neighborhoods, 84% do not own computers. At Network for Good, help bridge the Digital Divide! _Click Here!_ (http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links I have a very good quality A4 sized picture of the SR2000 supplied by AOR UK if any body would like a copy please let me know Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom designed covert electronic audio and video devices. Sweep Services - Professional physical and Electronic countermeasures utilising state of the art laboratory radio scanning and detection equipment. Note: Any fellow WAPI and UKPIN members welcome to phone or call in to discuss projects and applications or simply for free advice. Workshop located alongside M58 junc 3. [Non-text portions of this message have been removed] 10544 From: Date: Mon Jan 10, 2005 8:38am Subject: Re: TICSA It stands for "TruSecure ICSA Certified Security Associate". It's a certification that complements the CISSP. More details are at: http://www.trusecure.com/knowledge/ticsa/index.shtml Note that TruSecure recently merged with Betrusted and now they go by the name Cybertrust, so the acronym may change to "CICSA" soon. 10545 From: Date: Mon Jan 10, 2005 9:19am Subject: Re: Vonage/VoIP Am I mistaken: I understood that Skype (another VoIP service) IS encrypted and thus much harder, if not impossible, to hack compared to Vonage or Pulver or... Sgt. Kirk Sewell Illinois State Police, Technical Investigations 500 Iles Park Place, Suite 300 Springfield, IL 62718 (217) 524-6079 office (217) 467-4211 pager (217) 836-0919 mobile 10546 From: Tech Sec Lab Date: Mon Jan 10, 2005 11:38am Subject: RE: One more into the Breach [OT] LOL, reminds me of Rowan Atkinson's line, something like: ...and look, the machine gunning of 20,000 young men in 20 seconds just so Field Marshall Hague can move his drinks cabinet 6 inches closer to Berlin.... -Ois ********************************** Message: 10 Date: Sun, 9 Jan 2005 18:55:03 -0000 From: "Robin Hunter" Subject: Re- One more into the Breach Well spotted Dave McGauley, any reading of the history of the British Army will illustrate that the Scots Irish and Welsh played a disproportionate part in the building of 'Empire' and this continues today, for example the recent move of the Black Watch in Iraq and the subsequent announcement by President Blair's government of their proposed disbandment. For hundreds of years, wherever Britain has been involved in conflict the 'Jocks' have been in the frontline, I am pretty sure Shakespeare's military record is as distinguished as Tony Blair's. regards from Edinburgh, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com 10547 From: Tech Sec Lab Date: Mon Jan 10, 2005 11:51am Subject: Boeing probe intensifies over secret Lockheed papers Boeing probe intensifies over secret Lockheed papers By David Bowermaster Seattle Times aerospace reporter When Boeing fired a 60-year-old engineer named Ken Branch in 1999, he was cited for possessing proprietary Lockheed Martin rocket data in violation of company policy. Boeing and Lockheed were rival contenders for an enormous Air Force rocket program that both considered key to their future military and space prospects. And Branch, who had previously worked for Lockheed, apparently brought the documents with him when he joined the competition. Despite the intense rivalry over the rocket program, Boeing promptly alerted Lockheed and the Air Force that it had found the documents in Branch's files - a total of seven pages. That disclosure seemed like an impressive act of corporate honesty - until three years later, when Boeing attorneys let slip that the document trove found in Branch's cubicle actually contained 3,000 pages of Lockheed papers. When the Air Force later asked Boeing for a complete accounting, the tally mushroomed to 25,000 pages. Troubled by Boeing's constantly changing story and the massive quantity of purloined Lockheed trade secrets unearthed by subsequent reviews - more than 66,000 pages to date, held by at least five different Boeing workers - the Justice Department and Lockheed are investigating exactly how Branch came to join Boeing, how much information he may have taken with him and how it was used. And because of the document scandal, the Pentagon in 2003 stripped Boeing of launches worth $1 billion and suspended its rocket division from bidding for new government business. But the worst may be yet to come. Ongoing criminal and civil inquiries have spread into many corners of Boeing's $27 billion Integrated Defense Systems unit. Current and former Boeing executives could face indictments, and Boeing could owe Lockheed billions of dollars in damages. Additionally, the probes have intersected with the ever-expanding investigations of Darleen Druyun, the former Air Force acquisitions officer who is serving a nine-month prison sentence for improperly negotiating a job with Boeing. Branch's story is an intriguing tale of corporate spies, whistle-blowers, big-dollar defense contracts and alleged cover-ups. Yet most of it might have remained secret had Boeing not chosen to fight a legal battle with Branch after firing him. High-stakes rivalry Acquisition of McDonnell Douglas keeps Boeing in the running Boeing's all-out effort to win the Air Force's massive new rocket program began as a four-way competition. The Air Force had started the so-called Evolved Expendable Launch Vehicle (EELV) program in 1995 to create a new generation of advanced yet affordable rockets. At the time, the government was racing to build new space-based defense and spy networks, and telecommunications providers were planning scores of commercial-satellite systems. Boeing's space and defense revenues in 1996 were $5.8 billion, small compared with its commercial aerospace sales of $16.9 billion. To capitalize on the massive growth opportunities it saw in space, Boeing had purchased the rocket divisions of Rocketdyne in 1996 and would acquire the satellite-making arm of Hughes in 2000. Anticipating a winner-take-all contract that the Air Force estimated would be worth more than $15 billion over 20 years, as well as a leg up in the commercial launch business, Boeing and its three rivals saw the EELV as a pivotal project. Boeing and one other contender were eliminated in the Air Force's first cut, on Dec. 20, 1996. But Boeing stayed in the game because five days earlier it had announced plans to merge with McDonnell Douglas, one of the two EELV finalists. Boeing formally inherited McDonnell's Delta IV rocket program when the merger closed in August 1997. At the same time the merger was being hammered out, another fateful decision was being made much lower in the ranks at McDonnell: the hiring of Ken Branch away from rival Lockheed. Nearly everyone involved in Branch's hiring and in the subsequent investigations and lawsuits declined to comment for this story, citing the litigation. But documents in the case show how Boeing's pursuit of the rocket contract may have led it beyond aggressive competition and into industrial espionage and deception. Roots of a scandal Job applicant hints he can bring Lockheed secrets with him Branch joined the Delta IV team in January 1997, not long after the Air Force selected the Delta IV and the rival Lockheed Atlas V as finalists for EELV. He was paid $77,220, a 7.5 percent raise over his salary at Lockheed. In his first job interview with future boss Bill Erskine, a manager on the Delta IV ground-operations crew, Branch displayed samples of proprietary Lockheed data and hinted he could provide more if he got a job, according to a deposition by Erskine in Branch's wrongful-termination suit. Ex-Lockheed workers were prized commodities at the time. It was not unusual for them to turn up at Boeing. With only a handful of rocket builders in the United States, job switchers often moved from one competitor to another. In March of that same year, Frank Slazer, director of Delta IV business development, instructed his staff to interview former Lockheed employees "regarding their thoughts and impressions of Lockheed Martin's probable approach" to the EELV program. He cautioned, though, that they should follow the company's ethical guidelines and not seek any proprietary information. "Whatever it took" Manager pumping for information had just completed ethics training Though Branch worked on the Delta IV ground operations crew in Titusville, Fla., he traveled 43 times to the project's headquarters in Huntington Beach, Calif., during the 18 months that Boeing was preparing its formal bid to the Air Force, according to Lockheed's civil suit. The purpose of the visits is not clear from the public record. Erskine's depositions indicate he believed Branch was being pumped for information by Boeing executives, including Larry Satchell, leader of the "capture team" tasked with gathering data about the rival Atlas V. "As far as getting competition information out of Mr. Branch, the folks in Huntington Beach were the kings," Erskine later told a Boeing lawyer during an internal investigation. In October 1998, the Air Force awarded portions of the EELV contract to both finalists. Lockheed was widely considered the superior rocket builder, but the Pentagon cited Boeing's lower prices and gave it the lion's share - 19 of the first 28 EELV launches to Lockheed's nine. The Lockheed documents in Branch's files remained a closely held secret, even within the Delta IV project, for another eight months. But in June 1999, Erskine allegedly told fellow Delta IV worker Steve Griffin about Branch's job interview, and his offer to bring the entire Lockheed rocket proposal with him if he were hired. Branch has denied any such quid pro quo. In a later deposition, Griffin said he was stunned by Erskine's story, especially since he and Erskine had just completed ethics training. But he said Erskine told him he was "hired to win" and "was going to do whatever it took." Griffin alerted Boeing's legal department. Boeing had to confront a troubling internal issue - and the likelihood of leaks: Griffin's wife, Bridget, worked for Lockheed, and Boeing feared she would tell her employer what her husband had learned. Boeing attorney Mark Rabe was dispatched to investigate. He quickly found documents marked "Lockheed proprietary" in both Branch's and Erskine's offices. That triggered the calls to Lockheed and the Air Force. Boeing attorney Gary Black informed Lockheed that Boeing had found seven pages of harmless data, and said no one except Branch or Erskine had seen or used it. Boeing Delta IV program manager Michael Kennedy called the Air Force to report the same thing. Those calls, however, vastly understated the proprietary data found in Rabe's original investigation. In a later deposition, Rabe said there was a "five- to six-inch stack" of Lockheed material on Branch's desk, and "approximately one additional box of Lockheed Martin marked information" found in subsequent searches. But an investigator for the Pentagon's Defense Criminal Investigative Service said later in a separate affidavit that Rabe's initial search turned up "approximately 3,000 pages of material and filled two document storage boxes." And when the Air Force investigated the document theft in summer 2003, it concluded that Rabe had found eight boxes containing 24,500 pages of Lockheed material. Seven pages? Or 25,000? Many documents were at first considered nonproprietary What exactly Rabe found, and when, are crucial issues as investigators try to answer a fundamental question: Did Boeing orchestrate a cover-up to deceive Lockheed and the Pentagon about the quantity of stolen data in its hands? Or, as Boeing claims, did the company innocently misclassify much of the information in Branch's cubicle as nonproprietary and thus insignificant? Five months after alerting Lockheed to the seven pages, Black called again in November 1999 to say an exhaustive investigation had revealed 197 more pages of proprietary Lockheed data at Boeing. Again, Black said no one outside of Branch or Erskine had seen or used it, and the documents were of little relevance. Boeing stuck to that story for two years. But when Boeing began fighting the wrongful-termination suit that Branch and Erskine filed over their 1999 firing, the company inadvertently revealed the full scale of the document theft. Specifically, two Florida lawyers hired to defend Boeing in March 2002 filed a "statement of undisputed facts" that acknowledged the full box of Lockheed data that Rabe had found. They notified Lockheed in November 2001 and sent it 2,700 additional pages of material beyond the 204 Black had returned in 1999. Suddenly alerted that Boeing had at least 10 times as much confidential Lockheed data as previously acknowledged, Lockheed asked for full disclosure from Black and Valerie Schurman, who was the lead lawyer for all Boeing space and communications businesses at the time. Although the two Boeing attorneys were privy to Rabe's findings from the start, they reiterated that Boeing had turned over everything it had found to Lockheed - about 3,000 pages, or 22,000 pages less than it would turn over in April 2003. Boeing explains these early discrepancies this way: It says attorney Black was aware of the roughly 3,000 pages of Lockheed material found in Branch's office in 1999. But he believed only 204 pages were truly proprietary, and those were the ones he returned to Lockheed in November 1999. Black never updated the Air Force that Boeing had found material beyond the original seven pages, but the company insists that was merely an oversight. "We've been very candid with the Air Force," said Boeing spokesman Dan Beck. "Mistakes were made, follow-ups were not done that ought to have been done." The Air Force, in April 2003, made a specific written request to see all Lockheed material found in the offices of Branch and Erskine. A new Boeing attorney handling the case then sent the Air Force and Lockheed 22,000 pages of data. This massive document dump prompted Air Force deputy general counsel Steven Shaw to conclude in an investigative report that Boeing hadn't been straight with the government from 1999 to 2003. "The information Boeing provided to [Lockheed] and the Air Force was false and misleading," he wrote. Boeing insists those thousands of pages beyond the initial 3,000 found by Rabe were not reported because they were innocently misplaced. In 1999, Rabe retrieved everything in Branch's office that he believed might be sensitive Lockheed material, said Boeing spokesman Beck. But around 15,000 pages of Lockheed material from Branch's office were deemed inconsequential, so a member of Boeing's security staff boxed them up and sent them to external Boeing lawyers for storage. An additional 7,000 pages of documents found in a technical library, and allegedly brought to Boeing by Branch, were sent to the same lawyers. There, they were ignored for more than three years. More to come "Substantial violations of federal law," Air Force undersecretary charges The Air Force came down hard on Boeing after the April 2003 disclosures. Within three months, Undersecretary of the Air Force Pete Teets stripped Boeing of seven launches worth $1 billion and reallocated them to Lockheed. He also suspended Boeing from bidding for new government launch business until the criminal investigation is complete and the Air Force is satisfied Boeing has changed its ways. That suspension has stretched for more than 19 months, and its endpoint is unknown. "Boeing has committed serious and substantial violations of federal law," Teets said at a news briefing in July 2003. The Air Force also referred the case to federal prosecutors. The U.S. Attorney in Los Angeles charged Branch and Erskine in 2003 with conspiracy to steal trade secrets. Satchell, chief of the "capture team," is a target of the probe and is likely to be charged as well, said his attorney in court papers. Branch and Erskine will be tried in March, and the criminal investigation remains active. Prosecutors have amassed more than 160,000 pages of evidence and at least nine current or former Boeing employees have testified before a federal grand jury, according to court filings last year. The same court papers revealed that Boeing acknowledged to the U.S. Attorney in 2003 that at least 10 of its workers were aware Branch possessed stolen Lockheed documents during his tenure at Boeing. Yet Boeing continues to insist that the papers were not used to determine the pricing it offered the Air Force in 1998. Meanwhile, Lockheed is pressing a civil racketeering suit that claims Branch's delivery of documents was part of a "pattern and practice by Boeing to engage in economic espionage" to win government contracts. By bringing its case under racketeering statutes, which are more often applied to organized-crime cases, Lockheed can seek triple damages if it wins. Lockheed has not specified any damages, though it claims simply developing the Atlas V cost $1 billion. A trial wouldn't begin before 2006. To prevail, Lockheed must show Boeing is a "corrupt organization" with a pattern of illegal behavior. Toward that end, Lockheed is seeking to demonstrate that Boeing has repeatedly used stolen trade secrets to win government contracts. Lockheed's civil suit cites other cases in which Boeing has been sanctioned by the government for possessing a competitor's trade secrets, most notably Raytheon documents related to a competition to build a missile that would destroy enemy warheads in flight. Boeing was forced to withdraw from the competition in December 1998 when the Air Force discovered that the company had improperly obtained and disseminated Raytheon data. And the Darleen Druyun scandal that erupted in December 2003 unexpectedly provided additional material for Lockheed investigators seeking to establish a pattern of Boeing improprieties. The former Air Force procurement official was hired by Boeing and then fired 11 months later, along with Boeing Chief Financial Officer Michael Sears. Both have pleaded guilty to holding improper job negotiations while Druyun was at the Air Force. Significantly for Lockheed's case, Druyun has admitted giving Boeing preferential treatment in the award of more than $5 billion of Air Force contracts in return for jobs for herself and members of her family. She also acknowledged that while negotiating Boeing's proposal to lease 100 767 refueling tankers to the Air Force, she gave Boeing "what at the time she considered to be proprietary pricing data supplied by another aircraft manufacturer," according to the Justice Department. Airbus, the European airplane maker, was bidding against Boeing on the tankers at the time. Lockheed made an even graver allegation in November when it asked the court in Florida to allow it to file evidence that it claims demonstrates Druyun gave Boeing Chairman Harry Stonecipher and IDS chief Jim Albaugh insights into the launch prices Lockheed had proposed during the 1998 EELV competition. Boeing has filed a that accuses Lockheed of overstating Branch's conduct. It calls the Lockheed suit "an opportunistic attempt to use the acknowledged facts surrounding the Branch incident to inflict reputational and competitive harm upon Boeing." And Boeing flatly denies that Druyun played any role in the company's EELV bidding. Battling perception Just engineers bringing samples of their work from job to job? When Stonecipher replaced Phil Condit as CEO in 2003 after the firings of Druyun and Sears, he said his top priority was "dealing with this perception that we're a bunch of crooks." That task is likely to remain on Stonecipher's "to-do" list for some time, because the outcomes of the various investigations triggered by Branch are a long way off. Since Lockheed filed its racketeering suit in 2003, Boeing has conducted several more searches for Lockheed data in its employees' files and computers. For instance, one ex-Lockheed engineer, Donald Deming, turned over more than 11,000 pages of Atlas V material he had brought with him when he joined Boeing. Another, Dean Farmer, had 24,000 pages dealing with Lockheed satellite programs. Boeing says the incidents are harmless cases of engineers innocently bringing their own work papers from one job to another. But Lockheed has used each of these incidents to expand the scope of its racketeering suit, and the U.S. Attorney is expected to investigate each Boeing worker who improperly held or used Lockheed data. A source close to the investigations indicated Lockheed believes the number could reach as high as 20 to 25 Boeing workers. David Bowermaster: dbowermaster@s... 10548 From: James M. Atkinson Date: Mon Jan 10, 2005 0:07pm Subject: Computer crime to cost exec $27,000 Computer crime to cost exec $27,000 Date: January 09, 2005 Source: NOLA.com http://www.nola.com/ By: Mary Swerczek A Luling man who was accused of digitally spying on his former company has been sentenced to home imprisonment and must pay $27,000 for breaking into the company's computer system, the U.S. attorney's office said. David W. Avgikos, 42, was sentenced Wednesday by U.S. District Judge Lance M. Africk to six months home detention with electronic monitoring and four years probation. Avgikos also must pay Turbo Squid Inc. $17,000, the amount it cost the company to secure its computer system. After Avgikos pays the restitution, he also must pay a $10,000 fine. He could not be reached for comment Friday. Avgikos had been an owner of Turbo Squid, a company that sells three-dimensional images and software online, and left after he had differences with others at the company, Assistant U.S. Attorney Tony Gordon Sanders said. While he was still at Turbo Squid, Avgikos created passwords to access the company's database and Turbo Squid's bank account maintained by Whitney National Bank, Sanders said. As head of Digimation, a company that also sells 3-D images over the Internet, Avgikos accessed those databases to spy on his former company's movements and their finances, Sanders said. The FBI began investigating after Turbo Squid found the security breech. Avgikos was indicted by a federal grand jury and pleaded guilty Sept. 22 of last year. Turbo Squid's CEO, Andy Wisdom, wouldn't comment Friday. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10549 From: James M. Atkinson Date: Mon Jan 10, 2005 5:01pm Subject: Little cloak, less dagger http://www.sptimes.com/2005/01/09/Perspective/Little_cloak__less_da.shtml Little cloak, less dagger An ex-CIA agent talks about the real life of a spy and why she left the agency. By BILL ADAIR, Times Washington Bureau Chief Published January 9, 2005 Lindsay Moran, 35, wrote about her experiences with the CIA in "Blowing My Cover: My Life as a CIA Spy." Lindsay Moran decided she wasn't cut out to be a spy. She was drawn to the CIA by the cloak-and-dagger image and a sense of patriotism. She survived grueling training at "the Farm," the agency's famous boot camp, and ended up in Macedonia as a case officer, recruiting foreign agents to spy for the United States. But she quit after five years, unhappy with the CIA's Cold War culture, its sluggish response to terrorism and the heavy demands on her personal life. Moran, 35, has written about her experiences in a surprisingly funny book called Blowing My Cover: My Life as a CIA Spy. She spoke last week with Times Washington Bureau chief Bill Adair. Here is an edited version of that interview: Adair: Your basic cover was that you were an American diplomat. But you also pretended to be a travel writer, right? Moran: Generally you are left to make up your own cover story, which I actually think is good. It enables you to form an alias that is comfortable to you. I had always been a writer of sorts and enjoyed writing, so (being a travel writer) felt comfortable to me. Was it hard to remember who you were at any given moment? Yes it was. That was the biggest stress for me. While I was traveling, I would repeat to myself what my name was, what my birthday was. What could you tell your friends and family about your job? The agency kind of leaves it up to you to make those decisions. Some people don't tell anyone. They don't even tell anyone in their immediate family. Other people tell everyone - and that can be a problem. My mother, my father, my brother knew that I was working at the agency . . . and that I was overseas ostensibly as a diplomat. Your training at the Farm made the job look so sexy. But when you finally got overseas, it didn't seem nearly as exciting. Why? We were all aware that training didn't have a lot of relevance on what our jobs would be. It was more of a confidence builder or an Outward Bound sort of thing. Actually being a spy is a lot more banal. You are not crashing your car through barriers; you are not jumping out of planes. You are basically preying on people you think have vulnerabilities. That means spending a lot of time with people you might think are losers. I tried to target people that I thought would be interested in working for the U.S. out of ideological inspiration. But the reality of espionage is that most people do it for the money. Your job reminded me of selling Amway. You were recruiting these people, trying to build your team, paying them and buttering them up. That's a great analogy. The agency is a little bit cultish. You have to believe in what you're selling. When I got to the point where I felt like I didn't really have confidence in what I was selling, it made it 10 times more difficult for me to go out and sell. I could see why people at the agency are very nostalgic for the Cold War. That was a time when everything was so clear-cut. We were the good guys, (the Soviets) were the bad guys, and everybody really did believe in what we were selling. What about the mission didn't you believe in? I am a very patriotic person and have always believed that, no matter the faults with the American system of government, it's still the absolute best that there is. But on a personal level, it was hard for me to make an argument to people that I was targeting (that they would benefit from spying for the United States). You said the job left you "desperately lonely." Why? I cut off most of my friendships outside the agency. A friendship is obviously affected when, on some fundamental level, you are lying all the time. And that's what I was doing in all my relationships. I became increasingly uncommunicative and insular. The agency does become your family in a way. Those are the only people who know what you're doing and those are the people that you can talk to. But by the same token, it's a paranoid and secretive environment and nobody really trusts anybody else. So it's a big family, but a dysfunctional family because everybody is sort of jockeying for their own position and you all know that the rest of you are all liars. You describe lots of waste and excess - handing out $100 bills to informants who give worthless or inaccurate information. Is the CIA spending our money wisely? I don't think so. One of my personal beefs, both as a former CIA employee but also as a citizen, is that the intelligence budget remains classified, and the agency claims that it's classified because to reveal that information would be some kind threat to national security. My feeling is the threat to national security is having an intelligence agency that is not accountable for the, perhaps, $40-billion that it gets a year. There is incredible waste at the agency. One friend who worked at the agency told me that, at the end of the year, everybody got a free Palm Pilot. The deal was that they had this money they hadn't used. But they wanted to use it so that the following year, they could still get the same amount of money. Stuff like that, I'm sure, happens everywhere, but in the wake of Sept. 11, which was such a devastating intelligence failure, you would think there would be a lot more scrutiny on how money was spent. Is it true that when you paid cash to a foreign agent, you had to get them to sign a receipt? Yeah. (She laughs.) It's kind of funny that you have to cross your t's and dot your i's in that way. But at the end of the day, it's still government funds and, even if they sign it Mickey Mouse, you've got to get some sort of receipt. Why did you ultimately leave? I was in Russian language training, and we started this buildup to go to war. I wasn't an Iraqi expert, I wasn't a WMD expert. But it seemed kind of crazy that we were going to war. (Then) I was taken out of language lessons right as the war was starting and put in Iraqi Operations - not in Iraq, because we didn't have anyone in Iraq then, but in Headquarters. I thought, this is good, because now I'm going to see why we're going to war. I was really astounded. The agency tends to be a really hawkish, conservative environment. But I couldn't find anyone there who was gunning for this war. Everybody who was in the agency knew we were already really spread thin by Afghanistan. We were sending every yahoo and his brother to Kabul. And all of a sudden, we were going to start this other initiative in Iraq. The agency didn't have the people. Even though I'm critical of the agency, I'm really protective of it in terms of being portrayed as having provided the president faulty intelligence. When we were first going into Baghdad and it wasn't a cakewalk, I said to one of the heads of Iraqi Operations, "Did we say this was going to be a cakewalk?" He said, "No, we were very explicit with the administration that this is a clan society, it's going to break down." It's not going to be easy to go in there and set up a democracy, as the administration seemed to be advocating. Having very conflicted feelings about the war - my brother was a fighter pilot in the war - what I saw was that I had joined this organization to serve my country. And over the course of the five years I was there, I realized that you end up serving the organization over your country. And once I realized that I didn't know who the CIA was serving I just decided I didn't want to be a part of it any more. It seemed like there was a personal side to your departure, too. When I met the man who became my husband, he was such an example to me of someone who lived by his own terms. It reminded me who I had been before I joined the agency. It was so refreshing and relaxing to actually just be myself. In the agency, I was very reticent to speak my mind - as almost everybody was - because people are so distrustful and ready to jump on you. Plus, I was virtually living like a double or triple life. You were required to submit your manuscript to the CIA before it could be published, to make sure it did not reveal classified information. Tell me about that. One of the persons on the review board put it to me this way. He said, if you want to write everyone at the CIA is a drunk, you can write that because it might be true or it might not be true. But it's not classified information. I think there is a misperception that a lot of people have that when you join the agency, you sign away your right to ever say anything. Certainly there is the secrecy agreement, which is a very serious thing. I took it seriously. But ultimately, unless they can prove that what you're writing is classified or is in some way a threat to national security, they can't keep you from expressing your opinion or telling about your experiences. Would you recommend the CIA as a career? You know, after all that's been said and done, I probably still would. If you can hack the lying and the leading a double life and all the sacrifices you make, it's not a bad life. You're living overseas, you're probably doing well financially and there's always that reassurance you have that you are doing something that very few people in the world will ever be able to do. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10550 From: G P Date: Mon Jan 10, 2005 11:02pm Subject: Re: Vonage/VoIP Skype is in fact heavily encrypted, and functions as a peer-to-peer VoIP system. It can't really be considered VoIP in the sense that it is not compatible with the other standards and protocols, such as SIP and Asterisk's IAX. Skype was initially designed as a P2P voice communications system, but now they are going to be offering Skype-to-landline calls in the immediate future, with support for lots of different PDAs and GPRS-enabled cellphones. Skype is a neat concept, although there have been some security flaws in the application itself (leading to system compromise via buffer overflow attacks on the local listening service). Skype could very well replace the conventional telco, the vocoder they use is very high quality (better than a regular landline), and they've partnered I think with Siemens to produce a low cost and simple USB gadget that turns your USB port into an RJ11 POTS line so you can plug a cordless phone or whatever into it. --- sewellr@i... wrote: > > > > > > > Am I mistaken: I understood that Skype (another VoIP > service) IS encrypted > and thus much harder, if not impossible, to hack > compared to Vonage or > Pulver or... > > Sgt. Kirk Sewell > Illinois State Police, Technical Investigations > 500 Iles Park Place, Suite 300 > Springfield, IL 62718 > (217) 524-6079 office > (217) 467-4211 pager > (217) 836-0919 mobile > > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > What would our lives be like without music, dance, > and theater? > Donate or volunteer in the arts today at Network for > Good! > http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10551 From: G P Date: Mon Jan 10, 2005 11:06pm Subject: Wackenhut founder dies http://www.washingtonpost.com/wp-dyn/articles/A54899-2005Jan6.html By Matt Schudel Washington Post Staff Writer January 7, 2005 George R. Wackenhut, the founder of a global security company that has guarded U.S. embassies, nuclear power plants and the trans-Alaska oil pipeline as well as neighborhood malls and countless private homes, died Dec. 31 of a heart ailment in Vero Beach, Fla. He was 85. A hard-nosed businessman who began his career as an FBI agent tracking down counterfeiters and check forgers, Mr. Wackenhut capitalized on the nation's growing concern about corporate and personal security as he expanded his Florida-based company from a four-man operation in 1954 to a multibillion-dollar corporation. In 1984, he launched a subsidiary to design and manage jails and detention centers for the burgeoning private prison market in the United States and abroad. In time, Wackenhut Corp. became the nation's second-largest private prison operator. When Mr. Wackenhut sold his company to a Danish firm in 2002, it operated in 54 countries and had $2.8 billion in revenue. Mr. Wackenhut was an outspoken political conservative with ties to powerful Republicans and high-ranking leaders of the military, FBI and CIA. His office, with chairs carved in the shape of elephants, reflected his political leanings. Frequent rumors that his company was in the employ of the CIA were never substantiated, but Mr. Wackenhut, who was obsessive about high-tech security gadgets in his private life, seemed to relish the suggestion. Several of his senior executives were, in fact, former CIA operatives, and his company's board of directors included former FBI director Clarence Kelly, former National Security Agency director Bobby R. Inman, and former Defense secretary and deputy CIA director Frank Carlucci. On rare occasions, his company's clandestine work did land in the headlines. In 1991, a U.S. House committee investigated charges that a Wackenhut executive, working for a consortium of oil companies, illegally spied on a whistleblower exposing environmental damage caused by the oil industry. The executive, who had also discussed trying to implicate a California congressman in his sting, resigned immediately after a meeting with Mr. Wackenhut. Wackenhut-operated prisons have had problems as well. In 1999, the company lost a $12 million annual contract to run a jail in Texas when several Wackenhut guards were indicted for having sex with female inmates. Nonetheless, Mr. Wackenhut cultivated an image of probity, toughness and precise military order. His teak-and-granite office was spotless, and he kept a barber's chair in his private bathroom to avoid leaving the office for a haircut. George Russell Wackenhut grew up in Upper Darby, Pa., outside Philadelphia. An outstanding athlete, he was a professional soccer goalie with the Philadelphia Nationals in his youth. He graduated from what is now West Chester University in Pennsylvania. Stationed in Hawaii with the Army Corps of Engineers, Mr. Wackenhut was present at the Japanese attack on Pearl Harbor on Dec. 7, 1941. He recalled that he was so close to a Japanese warplane that he could see the face of the pilot. After serving in the Pacific, he moved to Baltimore, where he received a master's degree in education from Johns Hopkins University and taught classes in physical education and health. In 1951, Mr. Wackenhut joined the FBI as a special agent in Indianapolis and Atlanta, resigning in 1954 to launch a company in Coral Gables, Fla., with three other former agents. At one point, they had to pass the hat to meet payroll, and the company's total assets amounted to $1.56. After early struggles -- including a fistfight between Mr. Wackenhut and one of his partners -- he took sole control of the company in 1958, naming it for himself. After working all day in the office, he sometimes worked as a security guard at night. By 1964, he had contracts to guard the Kennedy Space Center in Florida, as well as the Atomic Energy Commission's nuclear test site in Nevada. He branched out to include food service for prisons and to provide protection for companies going through labor strikes. The core of his business, though, was providing security guards to watch out for criminal activity. Ironically, his company moved from the Miami suburb of Coral Gables to Palm Beach Gardens, Fla., in part because Miami's high crime rate made it difficult to attract good workers. In 1994, an 800-page biography of Mr. Wackenhut, called "The Quiet American," [1] was published. When he sold his company for $570 million in 2002, he owned more than 50 percent of its stock. Even with a tight profit margin of 2.5 percent, the company's earnings allowed Mr. Wackenhut to live lavishly in homes scattered throughout the country. Until he moved to Vero Beach nine years ago, his primary residence was a $10 million turreted mansion near Miami decorated with firearms and medieval suits of armor. His house was wired with infrared and laser sensors, closed-circuit television monitors and photo-cell surveillance and had private radios for his family. Survivors include his wife of 61 years, Ruth Wackenhut of Vero Beach, who was the company's secretary for many years; two children, Janis Ward and Richard Wackenhut; seven grandchildren; and three great-grandchildren. 10552 From: fjansgmxnet Date: Tue Jan 11, 2005 4:14am Subject: Re: Digital Cell phone scanning > So I ask you guys... > How easy it is to listen to cell phone conversation and what is the level of the threat? Can the estranged husband be listening to his wife? Or is the tech needed place it in the expert mode? Well, the tricks changed. In the digital world the estranged husband or the engaged investigator has to place a conventional bug in the cell phone of his wife. The best type of bugs I have seen are very small transmitters hidden in the accumlator pack of the cell phone, which could switched into a sleep mode to save power: Very fast to install and the victim feeds the bug with power in regular intervals whereever it goes. On Contras website (www.tetrascanner.com) there was a video from the German BSI showing this type of bug for a Motorola gsm phone. But I don't remember the exact link. The equipment to monitor digital cell phones at the air interfaces is expensive. Therefore I would expect it only at the "agency" level, if the folks don't know the current phone number you are using. Regards, Frank 10553 From: Tech Sec Lab Date: Tue Jan 11, 2005 11:36am Subject: List Member Craig...YOUR FAMOUS!!! :D Congrats! -Ois ********************** HEADLINE: Walls do have ears in industry BYLINE: BATHGATE Adrian BODY: Recent accusations made about the SIS spying on citizens has thrown up the question of espionage, something most Kiwis think belongs in the shadowy world of cold war movies. ADRIAN BATHGATE takes a look at what companies can do about the threat of bugs in the boardroom. Shaken, but not stirred. According to the experts, this is the response of many executives on being told they have been bugged. It's a scenario that's played out more often than you might think as about 3 to 5 per cent of "bug sweeps" turn up listening devices. Bugs can be planted for several reasons, say de-buggers. It may be competitors looking to assess what a company is up to, or it could be a party to negotiations, wanting to see what the opposition is thinking. Sometimes companies will sweep for bugs after a senior executive leaves, to make sure no secrets leave with them. Or perhaps a business partnership has fallen apart acrimoniously. Most companies are aware they have sensitive information, but not all would think of bugging as risk to them, says Craig Meldrum, the managing director of bug detecting firm Communications Security. "It's not the way most people get attacked. The high risk areas are things like documents rubbish or people selling secrets to competitors." Meldrum says his company detects devices in "about 3%" of the checks they do. Increasingly diverse technology has made catching the bugs that little bit harder, says Steve Willetts, managing director of Confidential Security Services. Advanced camera phones and advances in electronics means listening devices can either be more secretive or more blatant. For instance "hopping bugs", with a transmitter and a receiver which will constantly change frequency to attempt to foil detection. Willetts estimates his company has about a 5% hit rate with discovering bugs. "The proper way to do a sweep is if you're going to do the office, it's good to also do the home. Today, everybody takes work home." Meldrum says 80% of his firm's business is "precautionary". Large companies and government departments will have their headquarters "swept" for bugs every six or 12 months. Most of his clients are larger firms or those in "high value industries", such as financial institutions or lawyers. The most common form of bugging is via audio devices, usually in the boardroom or office, Meldrum says. "You don't have to enter a building to bug it," Willetts says. One of his checks is to the phone line entering a building which can be easily tapped. Devices can be planted in several ways by several people. Possibly they could be left during a visit, or someone could disguise themselves as a tradesman or cleaner. It can be surprisingly easy to gain access to many corporate head offices in New Zealand, the professionals say. It can range from a bug stuck with Blu-tack and "palmed" onto the bottom of the boardroom table. Or at the other end of the spectrum, someone could hire a professional with sophisticated method and equipment. There is no doubt the threat from espionage has changed, Meldrum says. The rise of the internet means a lot of information theft comes in the form of "hacking". "It doesn't mean that threat's gone away, because a lot of things are said that won't get written down." The problem, says Willetts, is people who plant devices often return to retrieve them, so there can be no confirmation that an office has been previously bugged. "If they've got access to it, it'll be in, do what they want it to, and it'll be gone again." According to the web, starting prices for counter-surveillance sweeps start at $ 250 per hour. Meldrum declined to go into the specifics of pricing, but says an organisation with a boardroom and six to 12 executives could be charged between $ 2000 and $ 5000. Willetts says his company will charge from around $ 250 an office. Bug sweeping involves using hi-tech equipment to conduct a "spectrum analysis" which can detect any transmission from very low to very high frequencies. A device called a non- linear junction detector can detect the presence of an electronic circuit, even in the absence of electricity. This can detect devices planted behind walls or inside false ceilings. Besides this, looking in all the usual places is a factor, Meldrum says. "A large proportion is actually physical search, crawling around the place." Some of New Zealand's larger companies spoken to by the Dominion Post all indicated the threat of espionage is something they take seriously. They were also united by being reluctant to divulge details of steps they take to combat the threat of spying. A spokesman for Carter Holt Harvey said the company did not comment on security matters. Fonterra also were unable to comment. A Lion Nathan spokesman said the company was confident it had the measures in place to combat any such incidents. One corporate that did not want to be named said it frequently checks for surveillance devices but has yet to turn anything up. Telecom spokesman John Goulter said the company takes the issue of security of information very seriously. Goulter says Telecom has a risk management team who look at threats to the company across a broad range of issues. "We have a number of policies and practices in place and we audit them against international benchmarks," he said. Goulter says this is an ongoing process and has been the focus of more attention over time. The idea of using covert surveillance devices is by no means a new one. Recent publicity over the alleged activities of the Security Intelligence Service has prompted former Labour Cabinet Minister Richard Prebble to say that during the Lange era in the 1980s, Government ministers were instructed to use payphones for confidential conversations. Allegations of bugging go right to the top, with a former British Cabinet minister alleging earlier this year that eavesdropping on the Secretary- General of the United Nations was a "tradition". New Zealand was alleged to be among countries shown transcripts of current Secretary-General Kofi Annan's phone calls. Then there's Watergate, perhaps the most famous bugging incident of them all. In 1972 five men were caught breaking into and bugging the offices of the Democrat Party at the Watergate Hotel in Washington. Republican president Richard Nixon was forced to resign in 1974 after secret tapes brought to light by the Washington Post showed Nixon had known about attempts to cover up the break-in for two years. Meldrum has been in the business with Communications Security for 20 years. The early days of "frantic corporate activity" of the mid-1980s, and early 1990s was the busiest period, he says. Business for his company has declined over time, Meldrum says, which is a function of the changing nature of our economy. "There are so few major corporates left in New Zealand compared to 10 years ago. Everything's a branch office now." But he is confident his services will always be required, pointing to the fact that most major companies and Government departments will de-bug their offices at least once a year. While the idea of espionage may be somewhat romanticised, debugging experts agree the threat is real, and some awareness is there. While the companies with sophisticated search devices do their periodical checks the best defence against espionage is not in high tech electronics, but vigilance of staff. "If somebody wants a conversation bad enough, and it's important enough, they're going to find a way to get it," Willetts says. Maybe it's time to check out where your nearest phone box is. 10554 From: Tech Sec Lab Date: Tue Jan 11, 2005 1:51pm Subject: IR Risk Comments? LENGTH: 597 words HEADLINE: LIGATT Issues Computer Security Alert; Computer Infrared Ports Can Be Used to Hack Into Your Computer DATELINE: Sep. 14, 2004; LOS ANGELES, CA; MARKET WIRE BODY: Laptops have increased business productivity in countless ways. No longer does an employee sit on an airplane content to watch a movie or read or a book. Many professionals are increasingly using travel time to finalize presentations or write memos to staff members or catch up with email after a busy day of meetings. How could this be a security issue? The example below illustrates such an occurrence. While traveling to a job site a LIGATT security team member was finishing a presentation on a flight and all of a sudden an icon popped up which notified her that she was attached to another person's computer via the infrared port. "Sure enough, the person sitting in the aisle next to me was on his laptop. Another few minutes passed and his head popped up and he started glancing around -- he had also just realized that our computers were now connected and communicating," says LIGATT security team member Merike Kaeo. The good news is that Microsoft has been careful in deploying appropriate defaults so that it would not be easy for someone to maliciously send you a virus or worm. Amazingly enough, little attention is paid to the infrared port that comes standard with most laptops on the market. As a method of research LIGATT security team members walked into a Borders bookstore where students were studying and placed our PDA next to a laptop with infrared port. We wrote a script that would copy all of the files from the "My Documents" folder. Our PDA running Windows CE connected to the infrared port and began copying the files. After a period of time we were able to gain entry into two out of ten computers and started copying files. We then showed potential victims how to go into Windows and turn on security for infrared port. Once files are received on PDA the files can be emailed to another destination. This could be used in an industrial espionage situation. How do you protect yourself? The first step in the process is to make Windows aware of your computer's infrared port. If you're running Windows on a notebook PC with a built-in infrared port, then Windows will probably detect the port automatically. You can verify this by going into the Control Panel and double-clicking on the System icon. When you do, you'll see the System Properties sheet. Select the Hardware tab and click the Device Manager button. If Windows recognizes your infrared port, there will be a category within the Device Manager called Infrared Devices. If you expand the Infrared Devices category, you'll see the infrared port. 10555 From: Michael Puchol Date: Tue Jan 11, 2005 4:16pm Subject: Re: IR Risk Jeeez...this vulnerability has existed ever since IrDA was invented. They should have done some homework before issuing a "security alert". For starters, a lot of laptops nowadays don't even have IrDA ports, as WiFi and Bluetooth are taking over. Security-conscious admins will disable IrDA altoghether. Sync/data to cellphones can be done with serial and more commonly USB cables, so no need for IrDA. Also notice how IR is less and less common in cellphones, and some PDAs are dropping it too. In all, a well-trodden subject. Best regards, Mike Tech Sec Lab wrote: > Comments? > > > LENGTH: 597 words > > HEADLINE: LIGATT Issues Computer Security Alert; > Computer Infrared Ports Can Be Used to Hack Into Your Computer > > DATELINE: Sep. 14, 2004; LOS ANGELES, CA; MARKET WIRE > > BODY: > Laptops have increased business productivity in countless ways. No longer > does an employee sit on an airplane content to watch a movie or read or a > book. Many professionals are increasingly using travel time to finalize > presentations or write memos to staff members or catch up with email after a > busy day of meetings. > > How could this be a security issue? The example below illustrates such an > occurrence. > > While traveling to a job site a LIGATT security team member was finishing a > presentation on a flight and all of a sudden an icon popped up which > notified her that she was attached to another person's computer via the > infrared port. "Sure enough, the person sitting in the aisle next to me was > on his laptop. Another few minutes passed and his head popped up and he > started glancing around -- he had also just realized that our computers were > now connected and communicating," says LIGATT security team member Merike > Kaeo. > > The good news is that Microsoft has been careful in deploying appropriate > defaults so that it would not be easy for someone to maliciously send you a > virus or worm. Amazingly enough, little attention is paid to the infrared > port that comes standard with most laptops on the market. > > As a method of research LIGATT security team members walked into a Borders > bookstore where students were studying and placed our PDA next to a laptop > with infrared port. We wrote a script that would copy all of the files from > the "My Documents" folder. Our PDA running Windows CE connected to the > infrared port and began copying the files. After a period of time we were > able to gain entry into two out of ten computers and started copying files. > We then showed potential victims how to go into Windows and turn on security > for infrared port. Once files are received on PDA the files can be emailed > to another destination. This could be used in an industrial espionage > situation. > > How do you protect yourself? The first step in the process is to make > Windows aware of your computer's infrared port. If you're running Windows on > a notebook PC with a built-in infrared port, then Windows will probably > detect the port automatically. You can verify this by going into the Control > Panel and double-clicking on the System icon. When you do, you'll see the > System Properties sheet. Select the Hardware tab and click the Device > Manager button. If Windows recognizes your infrared port, there will be a > category within the Device Manager called Infrared Devices. If you expand > the Infrared Devices category, you'll see the infrared port. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > 10556 From: James M. Atkinson Date: Tue Jan 11, 2005 5:18pm Subject: Ruling gives cops leeway with GPS http://timesunion.com/AspStories/story.asp?storyID=322152 Ruling gives cops leeway with GPS Decision allows use of vehicle tracking device without a warrant By BRENDAN LYONS, Staff writer First published: Tuesday, January 11, 2005 In a decision that could dramatically affect criminal investigations nationwide, a federal judge has ruled police didn't need a warrant when they attached a satellite tracking device to the underbelly of a car being driven by a suspected Hells Angels operative. The ruling by U.S. District Judge David N. Hurd clears the way for a federal trial scheduled to begin next month in Utica in which seven alleged Hells Angels members and associates, including several from the Capital Region, face drug-trafficking charges. The use of satellite tracking devices has stirred controversy and Hurd's ruling differs from a decision last spring by a Nassau County Court judge, who decided police needed a warrant when they used the technology to follow a burglary suspect. The biker case broke open here last year with a series of raids and arrests across upstate New York. The case began in Utica, but was expanded to include an organized crime task force that spent more than a year building a methamphetamine-trafficking case against a group of alleged outlaw bikers from Troy to Arizona. During surveillance of the group, detectives attached a global positioning satellite device to a vehicle driven by Robert P. Moran Jr., an Oneida County attorney and Hells Angels associate with a law office in Rome. They put the device on Moran's car for two days in July 2003 after he returned from a one-day trip to Arizona, where police say he purchased a large quantity of methamphetamine. Over those two days, Moran drove across New York state and allegedly made drug deals with suspected Hells Angels members in places such as New York City and Troy, according to court records. Hurd opined that authorities wouldn't need a warrant had they decided to follow Moran, so using a GPS device was merely a simpler way to track his car "as it traveled on the public highways," he wrote. "Moran had no expectation of privacy in the whereabouts of his vehicle on a public roadway. Thus, there was no search or seizure and no Fourth Amendment implications in the use of the GPS device." Hurd's ruling follows a line of reasoning that's widely supported by many law enforcement agencies. Police contend using tracking devices is no different than if they followed a suspect's vehicle in their own cars or by using helicopters. Kevin Mulroy, Moran's attorney, said the issue, which has brought conflicting rulings across the nation, is unsettling. "I think it's something the Supreme Court of the United States is going to have to hear," said Mulroy, a Syracuse attorney who was formerly an Onondaga County Court judge and assistant prosecutor. "One would think that before the police could install devices on your property, to monitor your movements, they would need a court order." A similar controversy arose in Washington two years ago, when that state's Supreme Court determined police had the right to attach a satellite tracking device to a murder suspect's car, but only after obtaining a warrant. Detectives attached a GPS device to the man's car for almost three weeks. When they downloaded the data, it indicated he had driven to an isolated area north of Spokane. Police searched the area and found the body of the man's 9-year-old daughter. He later was convicted of her murder, and the verdict was upheld. GPS devices are increasingly becoming a tool for law enforcement. Still, their use has been controversial because police agencies are not routinely obtaining court orders to install the devices, which rely on orbiting satellites and cellular phone networks to pinpoint their target. In many states, law enforcement agencies also are using them for less surreptitious missions, such as tracking sex offenders and parolees who are enrolled in electronic monitoring programs. It's not clear what effect Hurd's decision will have on their use, but it's apparently the first federal ruling regarding GPS devices and the need for search warrants. Assistant U.S. Attorney David Grable, who is prosecuting Moran and the others, did not return a telephone call for comment. The use of GPS devices by police most recently made national news in the Laci Peterson case. Scott Peterson, the Modesto, Calif., woman's husband, was convicted of murdering her on Christmas Eve 2002. In that case, police obtained a court order to attach tracking devices to three vehicles driven by Peterson, who drove to a waterfront near where the bodies of his wife and the baby boy she was carrying were later found. While the GPS data was admitted in the Peterson case, courts across the country are tackling the issue as defense lawyers challenge their reliability and whether police have a right to install them without a warrant. Similar technology helps police track cellular telephones, which also are being used by police to find fugitives and others. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- From: James M. Atkinson Date: Thu Jan 10, 2002 9:42pm Subject: You Might Be A Redneck If (2002 Edition) You Might Be A Redneck If (2002 Edition) You take your dog for a walk and you both use the same tree. You can entertain yourself for more than an hour with a fly swatter. Your property has been mistaken for a recycling center. Your boat has not left the driveway in 15 years. You burn your yard rather than mow it. You think the Nutcracker is something you did off the high dive. The Salvation Army declines your mattress. Your entire family sat around waiting for a call from the governor to spare a loved one. You offer to give someone the shirt off your back and they don't want it. You have the local taxidermist on speed dial. You come back from the dump with more than you took. You keep a can of Raid on the kitchen table. Your wife can climb a tree faster than your cat. Your grandmother has "Ammo" on her Christmas list. You've been kicked out of the zoo for heckling the monkeys. You think a subdivision is part of a math problem. You've bathed with flea and tick soap. You've been involved in a custody fight over a hunting dog. Your kids take a siphon hose to show and tell. You think a hot tub is a stolen indoor plumbing fixture. You took a fishing pole to Sea World. You go to the stock car races and don't need a program. You know how many bales of hay your car will hold. You have a rag for a gas cap. Your father executes the "Pull my finger" trick during Christmas dinner. Your house doesn't have curtains but your truck does. You wonder how service stations keep their restrooms so clean. You can spit without opening your mouth. You consider your license plate personalized because your father made it. Your lifetime goal is to own a fireworks stand. You sit on your roof at Christmas time hoping to fill your deer quota. You have a complete set of salad bowls and they all say Cool Whip on the side. The biggest city you've ever been to is Wal-Mart. Your working TV sits on top of your non-working TV. You thought the Unibomber was a wrestler. You've used your ironing board as a buffet table. You think a quarter horse is that ride in front of K-Mart. Your neighbors think you're a detective because a cop always brings you home. A tornado hits your neighborhood and does a $100,000 worth of improvement. You've used a toilet brush as a back scratcher. You've asked the preacher "How's it hangin'?" You missed 5th grade graduation because you had jury duty. You think fast food is hitting a deer at 65 mph. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4504 From: Shawn Hughes Date: Thu Jan 10, 2002 11:58pm Subject: Re: CCS/D.Robinson&Steve You know, I was going to comment on what Mr. Robinson stated. Then, I read Mr. Uhrig's response (I'm on digest, sometimes it runs late.) I started in computers before pc's had hard drives. However, in the years of pine, elm, irc, and all these new listservs, I have NEVER read such a thorough, complete, and utterly resounding response. No stone left unturned, or flung. Not even room for a cogent response. However, to defend the radio shack of surveillance/cs (ccs), this Robinson fellow has got to be a trouble-starting troll. What other reason would he have to make the statements he made? Shawn 4505 From: David Alexander Date: Fri Jan 11, 2002 9:21am Subject: Re: attacking CCS Steve, I just read your comprehensive demolition of David Robinson. Very, very well said sir. I just wish I could figure out how to send you a standing ovation from a 70,000 seater stadium, because that's what you deserve for having the guts to say what most people were thinking. We need more people like you who can expose the charlatans and con artists to give the rest of us a chance. Very best wishes and have a good weekend. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4506 From: Hawkspirit Date: Fri Jan 11, 2002 11:04am Subject: Theory (brought to mind by Comsec C3I discussion From: John McCain Using a TDR or SA, we look at transients (since the dynamic is their "steady state"), but do you carefully observe the first pulse of that TDR trace to see what effect the circuit under test has on the TDR instrument? Or, do you just adjust magnitude to make it look "normal" and start looking at returns? I suspect those transients are sometimes telling us things that we don't hear. Am I off base here. Do others not fall into this trap? Any thoughts? JohnM John, The first large pulse is the sending pulse and it's wave form is not changed by the line parameters. At least to the best of my knowledge/experience. Transients are really important in the area of detecting frequency hopping and spread spectrum transmitters, On an aside, in 1968 I was designing recording studio equipment in Hollywood. The bandwidth of frequency response of professional audio in those days was about out to 18k. I designed equipment at that time with high speed opamps that would pass 60k square waves. When I presented my equipment at the audio engineering convention in New York all the engineers from other companies would come to my booth ask why bother having extended bandwidth if the human hearing goes only to 18k. The answer is that the human ear perceives high frequency transients as holes in the complex waves that it can perceive in the 30hz to 18khz hearing range. Within a year all professional audio equipment had bandwidths of at least 60k. Best, Roger 4507 From: Hawkspirit Date: Fri Jan 11, 2002 11:18am Subject: Re: Theory (brought to mind by Comsec C3I discussion) From: "James M. Atkinson" "What I am in interested in the electrical behavior of a line during the loop relay seizing the line, and releasing it, and more specifically the "overshoot" areas of the signal. I am also interested in the frequencies that appear right at the moments of making, and then of breaking the line." Jim, Could you amplify on this, what kind of line behavior, in what form of result, would indicate what form of intercept? Thanks, Roger 4508 From: Steve Uhrig Date: Fri Jan 11, 2002 11:20am Subject: Creative assistance needed Hi all, I'm asking here because this list is now approximately 1200 members strong, and this is somewhat of an appropriate place to pose a request. Beginning in May, I will be publishing a monthly column in Police & Security News Magazine with questions and answers on surveillance and related technical investigation technology, to include TSCM. Readers of the magazine will ask questions of me by email, and I will answer several selected questions each month and print the questions and answers in the magazine. Here's what I need: > A name for the column ! Unfortunately I cannot solicit subscriptions to the magazine as it is controlled distribution to law enforcement only. Please feel free (per Jim, owner of this list) to post suggestions here to the list. That may encourage other suggestions and avoid redundancy. I'll select one or two of my favorites from those submitted here, and run them by the editor of the magazine. If your name is selected, I'll compensate you in some way via my used equipment page or something similar. The only one I've thought of so far, and I am not creative, is 'Everything you wanted to know about surveillance technology, but didn't know who to ask'. Feel free to reply to me directly if you do not want your name to appear on the list. Otherwise, please post your reply to the list. Note to do that, you can't merely reply to this message or your reply will come to me, not to the list (this measure was instituted for security reasons some time back). Address any suggestions to TSCM-L@yahoogroups.com. Picking names for products is one of the more difficult tasks in engineering. Same thing with newsletters and columns. I do not have a creative bone in my body. Can't draw stick figures. Thanks all. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4509 From: William Knowles Date: Fri Jan 11, 2002 11:37am Subject: Re: Creative assistance needed On Fri, 11 Jan 2002, Steve Uhrig wrote: Hello Steve & All! I haven't had enough Red Bull yet, but off the top of my mind comes... Off The Wire! Cheers! William Knowles wk@c... > I'm asking here because this list is now approximately 1200 > members strong, and this is somewhat of an appropriate place to > pose a request. > > Beginning in May, I will be publishing a monthly column in > Police & Security News Magazine with questions and answers on > surveillance and related technical investigation technology, to > include TSCM. Readers of the magazine will ask questions of me > by email, and I will answer several selected questions each > month and print the questions and answers in the magazine. > > Here's what I need: > > > A name for the column ! > > Unfortunately I cannot solicit subscriptions to the magazine as > it is controlled distribution to law enforcement only. > > Please feel free (per Jim, owner of this list) to post > suggestions here to the list. That may encourage other > suggestions and avoid redundancy. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 4510 From: Steve Whitehead Date: Fri Jan 11, 2002 0:59pm Subject: France 'spied on food whistleblower' "A scientist who suggested that the French food industry was cashing in by over-salting products, claims he was spied on by France's security services. Pierre Meneton said in a report to the government that excessive use of salt could be blamed for 75,000 heart attacks each year, a third of which were fatal. Yet the food industry deliberately opposed cutting back on the salt as it benefited from the sale of soft drinks to parched customers, he alleged. The latest issue of Le Point magazine claims France's security agency put him under surveillance once the report was completed. It says spies from the agency placed bugs on his office phone, intercepted calls to his mobile phone and monitored his relatives, friends and colleagues. The report is denied by the French Interior Ministry, the security agency - the Renseignements Generaux (Central Directorate of General Information) - and the French police. 'Security threat' "I noticed that it was from the time that we wanted to hand the file to AFSSA (the French Food Safety Agency) in 2000 that we started to have problems," Mr Meneton told La Chaine Info television. "It is surprising for a researcher who works for a public research institute that public authorities would take such a measure when one tries to improve a public health problem." His report said that a 30% cut in food salting would hit water and soft drinks sales by $5.4bn a year. Le Point says the Interior Ministry classified him as a level-two threat to national security on a par with foreign spies and terrorists. Salt risk Mr Meneton's report to AFSSA was carried in Le Point in February 2001. A month later, AFSSA said it backed reductions on salt levels in food. Sodium is one of salt's major constituents and has been linked to high blood pressure, strokes and heart attacks. But companies say salt is used not only to help taste, but as a preservative and to improve texture" Full Story at http://news.bbc.co.uk/hi/english/world/europe/newsid_1753000/1753433.stm Steve Whitehead TSCM Services URL : http://www.tscm.co.za [Non-text portions of this message have been removed] 4511 From: Aimee Farr Date: Fri Jan 11, 2002 4:34pm Subject: Scum, etc. Many of your vendor gripes fall into deceptive advertising and deceptive trade practice territory -- state and federal. In five-stars. Other pressure groups have been extremely successful. ~Aimee http://www.newsbytes.com/news/02/173556.html FTC Taking 'Seriously' Request To Probe Firearms Sites By Robert MacMillan, Newsbytes WASHINGTON, D.C., U.S.A., 10 Jan 2002, 11:08 AM CST The Federal Trade Commission today acknowledged it has received a written request from a new gun-safety organization asking the agency to expand its post-Sept. 11 probe of false and misleading Web advertising claims to include firearms Web sites. The agency said today it is giving the matter "serious consideration." [...] 4512 From: James M. Atkinson Date: Fri Jan 11, 2002 5:07pm Subject: Re: Theory (brought to mind by Comsec C3I discussion) At 9:18 AM -0800 1/11/02, Hawkspirit wrote: >From: "James M. Atkinson" > >"What I am in interested in the electrical behavior of a line during >the loop relay seizing the line, and releasing it, and more >specifically the "overshoot" areas of the signal. >I am also interested in the frequencies that appear right at the >moments of making, and then of breaking the line." > >Jim, Could you amplify on this, what kind of line behavior, in what form of >result, would indicate what form of intercept? Thanks, Roger Sure, First I apply a slowly increasing resistance to the line until I seize the line. I repeat this several times until I have a fairly good calculation of the amount of current i need to get flowing to size the line, and the delay between the current draw and the seizure. I then sync my TDR to the circuit so that I start pounding the line with TDR pulse as I approach the seizing current. I then disregard the TDR pulses gathered just prior to the seize so that I am actually looking at TDR pulses during the zero crossing (when it should be really quiet). I can usually grab several hundred usable "pings" during the transition period, and have found it helpful for each "ping" to have a slightly offset rise/fall time or pulse width. The whole goal is to force a predictable zero crossing, and shoot pings into the line during the zero crossing. I start with a 5 pico second ping (using a high energy 90 volt tunnel diode), and slowly increase the rise time and/or pulse width to several milliseconds as I look down the line. I am not using a "sampling" circuit, but actually digitizing and capturing the TDR wave forms directly into a laptop in real time. This way I can see "mouse feces" laying against the wire, and can see any kind of resistive, inductive, or capacitive breach with some extreme resolution. The further down the line I am looking the less the resolution and the wider the pulses. If I can get two lines on the same cable I can ping on one line, and listen to the crosstalk of the signal on the other pair, I can also split the pairing and shoot them that way as well (while in transition). Either way the goal is to locate where the twisting of the pair has been compromised, and not just look for resistive faults. Most sweep methods are obsessed with finding resistive devices in series with the line, or some variation thereof. Sadly, the methods used to find resistive devices are worthless in finding something that is capacitively or inductively isolated (most professional eavesdropping devices are 10-40+ megaohms of impedance, or isolated in such a way that a regular TDR is worthless). The "virgin pair' vs "split pair" TDR will find any kind of inductive coupling on the line (of more then one loop), but you have to do it during the zero crossing. Inductive loading of less then one loop (such as in the case of a linear ferrite pickup) your going to have sweep more then the two wires your looking at (you need a total of four conductors, plus a good ground). Crosstalk analysis will detect any kind of separation or disturbance of the pairs of more then a mm, or even disturbance of the wire insulation (but you have to do it during the zero crossing). It's also helpful to "listen in" to the line with both an audio amp, AND a spectrum analyzer. After you have performed your regular non alerting phone sweep... disconnect the load (or phones), then "listen" to the line with a high impedance audio amp (like Kaisers 1059 or Alan's uAmp), then slowly tune something like the SCD-5 across the line. Next connect your AUDIO (100 Hz to about 10 kHz) spectrum analyzer to the line (though a transient limiter, impedance matching filter, and pre-amp) and look for any kind of control or command tones such as DTMF-C, 2100 Hz, etc (typically appearing as crosstalk). Then switch your your RF spectrum analyzer (though a transient limiter, impedance matching filter, and pre-amp) and look for any kind of RF present on the line. Hint: if someone attaches a transmitter to the line some of the RF will bleed back over the line and you will be able to see it.... however your going to have to "tune" the line to see it reliably. The determine how much current draw you need to seize the line card (remember the phone system works on current draw, not voltage) and bounce some TDR pulses down the line during the zero crossings to see what a regular wet line TDR might miss. The key in all of this is your ability to match the impedance of the line during the transition. This is not just a case of "cranking up the voltage", but one of "tuning up the TDR circuit" though a variable capacitor/varistor and resistor/inductor. You want a near perfect coupling between the TDR (or pulse generator) and the line. To look at it another way, consider that the line is an antenna, and you want a perfect impedance match between a radio, the feed line, and the antenna so you can maximize the signal your giving off or collecting. If you simply crank up your transmit power, but have a bad feed line all you will end of doing is heating up some wire. On the other hand if the feed line has a near perfect match to the radio, and the antenna has a near perfect mach to the feed line all kinds of wonderful things can be done. If you go one step further and fiddle with the antenna and use it at its precise resonant frequency you can work the world with just a small amount of power. Along the same lines if you filter out all the thunder-lizards, tune up your antenna, use good feed lines, and have a good LNA on the antenna you can hear extremely low poer things many thousands of miles away. Now, we take this and apply it to sweeping phone lines: First we find the "quietest time" on the line, which is during the transition point (the loop voltage and dial tone is our thunder lizard). Next we match the impedance of our TDR to the line impedance. Then we "tune" the line by bouncing TDR pulses down the line (with various pulse widths and rise times) while we tweak a capacitor/varactor for clean return (sort of like adjusting an SWR meter). The end result is a super precise series of pulses, clean TDR wave forms, and the exact position of anomalies along the line (including mouse feces touching the line). -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4513 From: James M. Atkinson Date: Fri Jan 11, 2002 4:00pm Subject: Re: Creative assistance needed How about these: "The Straight Poop" "Crow Whisperings" "Yoda Speaks" "Wizards Corner" "The Teachings of Obi Wan Uhrig" "Teachings of the Black Bag" ;-) -jma At 12:20 PM -0500 1/11/02, Steve Uhrig wrote: >Hi all, > >I'm asking here because this list is now approximately 1200 >members strong, and this is somewhat of an appropriate place to >pose a request. > >Beginning in May, I will be publishing a monthly column in >Police & Security News Magazine with questions and answers on >surveillance and related technical investigation technology, to >include TSCM. Readers of the magazine will ask questions of me >by email, and I will answer several selected questions each >month and print the questions and answers in the magazine. > >Here's what I need: > >> A name for the column ! > >Unfortunately I cannot solicit subscriptions to the magazine as >it is controlled distribution to law enforcement only. > >Please feel free (per Jim, owner of this list) to post >suggestions here to the list. That may encourage other >suggestions and avoid redundancy. > >I'll select one or two of my favorites from those submitted >here, and run them by the editor of the magazine. If your name >is selected, I'll compensate you in some way via my used >equipment page or something similar. > >The only one I've thought of so far, and I am not creative, is >'Everything you wanted to know about surveillance technology, >but didn't know who to ask'. > >Feel free to reply to me directly if you do not want your name >to appear on the list. Otherwise, please post your reply to the >list. Note to do that, you can't merely reply to this message or >your reply will come to me, not to the list (this measure was >instituted for security reasons some time back). > >Address any suggestions to TSCM-L@yahoogroups.com. > >Picking names for products is one of the more difficult tasks in >engineering. Same thing with newsletters and columns. I do not >have a creative bone in my body. Can't draw stick figures. > >Thanks all. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4514 From: James M. Atkinson Date: Fri Jan 11, 2002 11:43pm Subject: Boss hid spy camera http://www.theadvertiser.news.com.au/common/story_page/0,5936,3569734%255E421,00.html Boss hid spy camera By CHRISTINE CAULFIELD 11jan02 A FACTORY owner installed a video camera in female change rooms to spy on his staff for sexual gratification, a court heard yesterday. Peter Taylor, 50, set up the surveillance camera in a ceiling fan directly above the only female toilet in his car detailing shop. But defence counsel Nicola Gobbo told the Ballarat Magistrates' Court Mr Taylor suspected the staff at Southern Vehicle Enhancements, at Delacombe, were lazing around in the change room. She said Mr Taylor's intention was to monitor staff productivity, and to ensure none were using or dealing drugs on the premises. Magistrate Paul Grant said he could see no need to mount the camera above the toilet if Mr Taylor's aim was to check staff were working. Mr Grant said, on the evidence, it seemed more likely Mr Taylor derived some sexual pleasure from watching staff in the toilet. "It seems to me there is only one thing this person is trying to achieve, and that is to view people," Mr Grant said. In response to Ms Gobbo's claim that her client did not install the camera for some sinister sexual reasons, Mr Grant said: "It seems to me it was". Ms Gobbo said her client, who has also settled a civil suit over the matter, was anxious his staff did not have to give evidence in a criminal court. She said he did not want them to be subject to cross-examination, potentially causing them further distress. But Mr Grant said if Mr Taylor suspected the women were using or dealing drugs in the change room, they had a right to defend themselves. Mr Taylor, of Wiltshire Lane, Sebastopol, has been charged with installing and using a surveillance device and possessing an unregistered firearm, which was also found in the ceiling. The case has been adjourned to February 13. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4515 From: Steve Uhrig Date: Sat Jan 12, 2002 0:05am Subject: NSA Crypto museum reopening NSA MUSEUM OPEN AGAIN FOR VISITORS: The National Cryptologic Museum has opened to the public again on 13 December but for only on weekdays 9 to 4 as before: no Saturday hours. They are expecting to be open on Saturdays again this spring. Happy New Year! [Jack Ingram, NSA Curator] =========================== ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4516 From: Steve Uhrig Date: Sat Jan 12, 2002 0:13am Subject: Hi-res commercial satellite http://news.bbc.co.uk/hi/english/sci/tech/newsid_1755000/1755356. stm Worth a read. Impressive. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4517 From: Date: Sat Jan 12, 2002 5:23am Subject: Steve Uhrig Column Name. -----BEGIN PGP SIGNED MESSAGE----- My suggestion is: Www.swssec.com Hardware Intel. Counter-intel. Q and A Hosted by Steve Uhrig -----BEGIN PGP SIGNATURE----- Version: Hush 2.1 Note: This signature can be verified at https://www.hushtools.com wlwEARECABwFAjxAHFwVHGRhZW1vbjdAaHVzaG1haWwuY29tAAoJEIqGlhRaN0MTjHQA oINlJfqqrFe36CY1SeUsn8A2pselAJ9hge7ce7XSqEyRjOsnabN9az382Q== =OlJH -----END PGP SIGNATURE----- 4518 From: James M. Atkinson Date: Sat Jan 12, 2002 11:34am Subject: How Many Dogs Does It Take HOW MANY DOGS DOES IT TAKE TO CHANGE A LIGHT BULB? Golden Retriever: The sun is shining, the day is young, we've got our whole lives ahead of us, and you're inside worrying about a stupid burned out bulb? Border Collie: Just one. And then I'll replace any wiring that's not up to code. Dachshund: You know I can't reach that stupid lamp! Rottweiler: Make me. Lab: Oh, me, me!!!! Pleeeeeeze let me change the light bulb! Can I? Can I? Huh? Huh? Huh? Can I? Malamute: Let the Border Collie do it. You can feed me while he's busy. Jack Russell Terrier: I'll just pop it in while I'm bouncing off the walls and furniture. Poodle: I'll just blow in the Border Collie's ear and he'll do it. By the time he finishes rewiring the house, my nails will be dry. Cocker Spaniel: Why change it? I can still pee on the carpet in the dark. Doberman Pinscher: While it's dark, I'm going to sleep on the couch. Boxer: Who cares? I can still play with my squeaky toys in the dark. Mastiff: Mastiffs are NOT afraid of the dark. Chihuahua: Yo quiero Taco Bulb. Irish Wolfhound: Can somebody else do it? I've got this hangover. Pointer: I see it, there it is, there it is, right there. Greyhound: It isn't moving. Who cares? Australian Shepherd: First, I'll put all the light bulbs in a little circle.... Old English Sheep Dog: Light bulb? I'm sorry, but I don't see a light bulb. Hound Dog: ZZZZZZZZZzzzzzzzzz Cairn Terrier: I'll bet there's a light bulb in a hole in the back yard. I can get it, I can get it. Bichon Frise: Check the pedigree: "...Non-working breed" -- Now, fluff my pillow. Cat: Dogs do not change light bulbs. People change light bulbs. So the question is: how long will it be before I can expect light? -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4519 From: Miguel Puchol Date: Sat Jan 12, 2002 0:38pm Subject: Steve's column name Hi Steve, A few suggestions... "The Wired Guy" "1984" <= Maybe not all will get this one on the first issue... "Intel scene" All the best, Mike 4520 From: Jordan Ulery Date: Sat Jan 12, 2002 4:50pm Subject: Name Perhaps a little more formal under Order of the Court or Technical Surveillance Black Box [Non-text portions of this message have been removed] 4521 From: Information Date: Sat Jan 12, 2002 2:18pm Subject: Re: Steve's column name How about Now Hear This! Regards, Bill Elliott, CII ELLIOTT & ASSOCIATES, Ltd. (GMT -7) http://www.prvt-eye.com http://www.cybercrimeinternational.com 2002 SUPER CONFERENCE - ROYAL SONESTA HOTEL - NEW ORLEANS, LA - AUGUST 20-24, 2002 -http://www.intersurf.com/~nosuper/index.html ----- Original Message ----- From: "Miguel Puchol" To: Sent: Saturday, January 12, 2002 11:38 AM Subject: [TSCM-L] Steve's column name 4522 From: Hawkspirit Date: Sat Jan 12, 2002 10:23pm Subject: Equipment Interesting equipment website http://www.fuhs.de/en/products/fsc3000.asp 4523 From: Hawkspirit Date: Sat Jan 12, 2002 11:37pm Subject: Teddy Cam Watch out for Teddy for he be watch'n you! http://www.lacasadelespia.com/detalle.asp?det=93 4524 From: Hawkspirit Date: Sat Jan 12, 2002 11:40pm Subject: Cellular Scramblers Anyone know how effective these scramblers are? CELLULAR SCRAMBLER SPECIFICATIONS Circuit size: 50 mm ¥ 35 mm ¥ 5 mm Audio range: 300 up to 3000 Hz Telephone lines: Cellular Consumption: 5 Vdc, 80 mA of the battery Stand-by consumption: 5 Vdc, 80 mA of the battery Selling Price: $5800 Prod. Code: HS-7000 Security level: III ( High security) Hop rate: up to 150 times per second Purchase only on request The cellular scrambler offers a universal security solution for conversations carried out in cellular phones. The cellular scrambler comes in a Star Tac. The circuit inside the cell phone provides nivel III voice security. Level III, that uses the same frequency alteration principle than levels I and III, provides the highest security level, hopping from one code to the other 150 times per second, 9000 per minute. This high frequency hop rate offers protectiona against virtually all determined listeners. Each scrambler is installed in the Star Tac and the scrambler will function only in the case that the two devices that are communicating have the same scrambling system, which is called "Point to Point?. The scrambler adds negligible weight and no size to the phone and is activated when the user enters a code on the phone's keypad. A red LED indicator confirms that communication is secure. The PX40's low power consumption maximizes talk time on each portable phone. This scrambling system is used by top entities and companies, where nowadays information is the most valuable asset. These cellular scramblers are sold only by pairs. Features and benefits: Portable Security - provides much needed security to highly accessible portable phone conversations. The activated module offers a defense system against a variety of interested parties. ? Low Power Requirements - offers little additional drain upon the portable phone's battery; thus, allowing the phone to perform and operate at its optimum level. ? Internally Embedded - allows sophisticated voice security to be added without cumbersome external devices. ? Optional Security Levels - offer varying levels of security to meet the specific privacy needs of a variety of end users. ? Keypad Activation - allows the portable phone user to activate security by simply entering a code on the phone's keypad. A red LED indicator confirms that communication is secure. ? Voice Quality - delivers recovered audio which is clear and natural sounding, while providing coded audio which is virtually indecipherable by unwanted listeners. This is the best scrambler offered in the market and its purchase is only on request.For further information, see our product in: http://www.lacasadelespia.com/detalle.asp?det=137 4525 From: Hawkspirit Date: Sat Jan 12, 2002 11:44pm Subject: CELLULAR DETECTOR Another interesting product MICRO-CELLULAR DETECTOR Detection range: 5 Mhz - 2.6 Ghz Energy supply: A23 / 12 volts alkaline battery Antenna: flexible gel Duration: 20 hrs Stand by Selling Price: $420 Prod. Code: HS-7020 The Micro- Detector is an electronic device capable of detecting risky 5 mhz to 2.5 ghz radio frequencies within reach ( hidden transmissions of your conversations) created by your cellular telephone. This unit can be carried on the body or placed on the desk, always near the cellular phone, so that if the cellular phone emits a hidden transmission of your conversation, when it is in stand-by mode ( when it should not transmit data), the Micro- Detector will adopt the RF emitted by the cellular phone and will automatically start to vibrate silently. This is an equipment that can detect and alert you about the most simple to the most sofisticated tappings of cellular telephones as intruder microphones. NOTE: When the batteries of cellular telephones are removed during meetings, this is no guarantee that the conversation that is taking place is not being transmitted to a third party, since with today?s technology it is very easy to place a microphone that transmitts at a distance of up to 500 m. With the Micro- Detector you are able to confirm, after you have removed the batteries, that no cellular phone is transmitting a confidential conversation to another place that is not within the environment where the meeting is taking place; if this is the case, the device will start to vibrate on the table alerting the user that no confidential issues should be discussed in that meeting.For further information, see our product in: http://www.lacasadelespia.com/detalle.asp?det=73 4526 From: James M. Atkinson Date: Sun Jan 13, 2002 0:33am Subject: Re: Cellular Scramblers Virtually worthless, and for all practical purposes a scam. The people trying to market the bloody thing don't seem to realize that cell phones do not hot, and voice level encryption does not result in frequency hopping. -jma At 9:40 PM -0800 1/12/02, Hawkspirit wrote: >Anyone know how effective these scramblers are? > >CELLULAR SCRAMBLER > > > >SPECIFICATIONS >Circuit size: 50 mm ¥ 35 mm ¥ 5 mm >Audio range: 300 up to 3000 Hz >Telephone lines: Cellular >Consumption: 5 Vdc, 80 mA of the battery >Stand-by consumption: 5 Vdc, 80 mA of the battery > >Selling Price: $5800 >Prod. Code: HS-7000 > > > >Security level: III ( High security) >Hop rate: up to 150 times per second > >Purchase only on request > >The cellular scrambler offers a universal security solution for >conversations carried out in cellular phones. The cellular scrambler comes >in a Star Tac. >The circuit inside the cell phone provides nivel III voice security. Level >III, that uses the same frequency alteration principle than levels I and >III, provides the highest security level, hopping from one code to the >other 150 times per second, 9000 per minute. This high frequency hop rate >offers protectiona against virtually all determined listeners. >Each scrambler is installed in the Star Tac and the scrambler will function >only in the case that the two devices that are communicating have the same >scrambling system, which is called "Point to Point?. The scrambler adds >negligible weight and no size to the phone and is activated when the user >enters a code on the phone's keypad. A red LED indicator confirms that >communication is secure. The PX40's low power consumption maximizes talk >time on each portable phone. >This scrambling system is used by top entities and companies, where >nowadays information is the most valuable asset. > >These cellular scramblers are sold only by pairs. > >Features and benefits: >Portable Security - provides much needed security to highly accessible >portable phone conversations. The activated module offers a defense system >against a variety of interested parties. >? Low Power Requirements - offers little additional drain upon the portable >phone's battery; thus, allowing the phone to perform and operate at its >optimum level. >? Internally Embedded - allows sophisticated voice security to be added >without cumbersome external devices. >? Optional Security Levels - offer varying levels of security to meet the >specific privacy needs of a variety of end users. >? Keypad Activation - allows the portable phone user to activate security >by simply entering a code on the phone's keypad. A red LED indicator >confirms that communication is secure. >? Voice Quality - delivers recovered audio which is clear and natural >sounding, while providing coded audio which is virtually indecipherable by >unwanted listeners. >This is the best scrambler offered in the market and its purchase is only >on request.For further information, see our product in: >http://www.lacasadelespia.com/detalle.asp?det=137 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4527 From: Tom Lusk Date: Sat Jan 12, 2002 1:59pm Subject: RE: Creative assistance needed Mybe "Bugs and Thugs"? Cheers, Tom -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Friday, January 11, 2002 12:21 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Creative assistance needed Hi all, I'm asking here because this list is now approximately 1200 members strong, and this is somewhat of an appropriate place to pose a request. Beginning in May, I will be publishing a monthly column in Police & Security News Magazine with questions and answers on surveillance and related technical investigation technology, to include TSCM. Readers of the magazine will ask questions of me by email, and I will answer several selected questions each month and print the questions and answers in the magazine. Here's what I need: > A name for the column ! Unfortunately I cannot solicit subscriptions to the magazine as it is controlled distribution to law enforcement only. Please feel free (per Jim, owner of this list) to post suggestions here to the list. That may encourage other suggestions and avoid redundancy. I'll select one or two of my favorites from those submitted here, and run them by the editor of the magazine. If your name is selected, I'll compensate you in some way via my used equipment page or something similar. The only one I've thought of so far, and I am not creative, is 'Everything you wanted to know about surveillance technology, but didn't know who to ask'. Feel free to reply to me directly if you do not want your name to appear on the list. Otherwise, please post your reply to the list. Note to do that, you can't merely reply to this message or your reply will come to me, not to the list (this measure was instituted for security reasons some time back). Address any suggestions to TSCM-L@yahoogroups.com. Picking names for products is one of the more difficult tasks in engineering. Same thing with newsletters and columns. I do not have a creative bone in my body. Can't draw stick figures. Thanks all. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4528 From: Miguel Puchol Date: Sun Jan 13, 2002 3:54am Subject: Re: Creative assistance needed Well, don't laught too hard but.... > "The Teachings of Obi Wan Uhrig" In reference to this: http://www.thesmokinggun.com/archive/obiwan1.shtml Makes you wonder :-) Cheers, Mike 4529 From: Miguel Puchol Date: Sun Jan 13, 2002 4:05am Subject: Re: Cellular Scramblers Well, looks to me like an overpriced Transcrypt board, which true, does inversion scrambling with rapidly hopping patterns, which could be OK for your average listener - but don't bet your life on it. In any case, it is VERY expensive, the best Transcrypt board you can buy commercially will set you back less than $1000, and you'll need an end-user certificate to get it. I don't know the price of the DES board, but I don't imagine it running past the $1k mark too much. I like the "purchase on request" part, how could I purchase if it wasn't on request? They have mind readers that work over IP nets now? Ahem, just another spy shop.....same oppinion goes for your second message. For more info, http://www.transcryptsecure.com/products/lmr_security.html MHO, all the best, Mike ----- Original Message ----- From: "Hawkspirit" To: Sent: Sunday, January 13, 2002 6:40 AM Subject: [TSCM-L] Cellular Scramblers > Anyone know how effective these scramblers are? > > CELLULAR SCRAMBLER > > > > SPECIFICATIONS > Circuit size: 50 mm ¥ 35 mm ¥ 5 mm > Audio range: 300 up to 3000 Hz > Telephone lines: Cellular > Consumption: 5 Vdc, 80 mA of the battery > Stand-by consumption: 5 Vdc, 80 mA of the battery > > Selling Price: $5800 > Prod. Code: HS-7000 > > > > Security level: III ( High security) > Hop rate: up to 150 times per second > > Purchase only on request > > The cellular scrambler offers a universal security solution for > conversations carried out in cellular phones. The cellular scrambler comes > in a Star Tac. > The circuit inside the cell phone provides nivel III voice security. Level > III, that uses the same frequency alteration principle than levels I and > III, provides the highest security level, hopping from one code to the > other 150 times per second, 9000 per minute. This high frequency hop rate > offers protectiona against virtually all determined listeners. > Each scrambler is installed in the Star Tac and the scrambler will function > only in the case that the two devices that are communicating have the same > scrambling system, which is called "Point to Point?. The scrambler adds > negligible weight and no size to the phone and is activated when the user > enters a code on the phone's keypad. A red LED indicator confirms that > communication is secure. The PX40's low power consumption maximizes talk > time on each portable phone. > This scrambling system is used by top entities and companies, where > nowadays information is the most valuable asset. > > These cellular scramblers are sold only by pairs. > > Features and benefits: > Portable Security - provides much needed security to highly accessible > portable phone conversations. The activated module offers a defense system > against a variety of interested parties. > ? Low Power Requirements - offers little additional drain upon the portable > phone's battery; thus, allowing the phone to perform and operate at its > optimum level. > ? Internally Embedded - allows sophisticated voice security to be added > without cumbersome external devices. > ? Optional Security Levels - offer varying levels of security to meet the > specific privacy needs of a variety of end users. > ? Keypad Activation - allows the portable phone user to activate security > by simply entering a code on the phone's keypad. A red LED indicator > confirms that communication is secure. > ? Voice Quality - delivers recovered audio which is clear and natural > sounding, while providing coded audio which is virtually indecipherable by > unwanted listeners. > This is the best scrambler offered in the market and its purchase is only > on request.For further information, see our product in: > http://www.lacasadelespia.com/detalle.asp?det=137 > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4530 From: Steve Uhrig Date: Sun Jan 13, 2002 10:34am Subject: Re: Cellular Scramblers Once upon a midnight dreary, Hawkspirit pondered, weak and weary: > Anyone know how effective these scramblers are? Will only work on analog. It is extremely difficult to get any sort of privacy beyond simple inversion working on cellular. Go to CDMA and you're safe from virtually anything not covered by a Title III court order served on the service provider. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4531 From: A Grudko Date: Sun Jan 13, 2002 3:02am Subject: Re: Cellular Scramblers - Original Message - >> Anyone know how effective these scramblers are? I don't know the product but I don't know of any space inside a Motorolla Star-Tac, never mind 50 mm x 35 mm x 5 mm. Perhaps the US model is different to ours. The terminology used sounds like techno-babble, but if fairness, this can happen innocently. I used to be the agent here for Cony and I termed their instruction manuals 'Janglish' - Japanese English, translated litterally from a dictionary. I re-wrote some of their manuals for them. I would expect a large company offering a serious product to have a decently worded technical discription. That's also a heck of a price to pay - especially if in fact all it does is light an LED up! Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time "Richard Milhouse Nixon was the first US president whose name contains all the letters from the word "criminal." The second? William Jefferson Clinton" 4532 From: A Grudko Date: Sun Jan 13, 2002 3:24am Subject: Re: Creative assistance needed - Original Message - > The only one I've thought of so far, and I am not creative, is > 'Everything you wanted to know about surveillance technology, > but didn't know who to ask'. Mmmm - doesn't really roll off the tongue... I've had a few articles published and non technical people might read past 'TSCM 101' - using a layman's term like 'bug' will attract readers. Some of the tiles I've used include: A Plague of Bugs Who's Bugging You? To Bug or Not To Bug? (feel free to use them) or how about: The Sweeper The Sweeper Speaks Bugland Wired The Receiver Detection and Deception Or a bit more off the wall: Bug Off! Sex, Lies and Audio Tape Where's Mike's Mike? Mikes, Cameras, Action! Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom "Richard Milhouse Nixon was the first US president whose name contains all the letters from the word "criminal." The second? William Jefferson Clinton" From: James M. Atkinson, Comm-Eng Date: Thu Jan 11, 2001 5:59pm Subject: Re: A Public Thank You Bob (and other list members), All to often TSCM'ers tend to be isolated, and even between government TSCM'ers there was/is little or no communications between them outside of their own agency (sad, but true). The list was founded to help facilitate communications between TSCM people who tend to be scattered all over the world. So long as the subject related to TSCM, TSCM related news, TSCM equipment, the occasional quip of humor, and related information it is OK to post it to the list. If you have questions about doing business with a TSCM firm, or a firm selling/buying TSCM gear such queries are also OK for the list. Of course classified information needs to be kept off the list, but in reality only a very, very tiny portion or sliver of TSCM actually involves even remotely classified materials. -jma At 6:18 PM -0500 1/11/01, 1RCM wrote: >Hi List, > >Last week I posted with a request to be contacted off-list by any list >member in the Boise, Idaho area. To make a long story short, I had stumbled >across a very good deal on a piece of TSCM test equipment but I was very >hesitant to send the asking price for something unseen to someone unknown. I >was contacted back by list member Mike Arnell. Mike was of great assistance >in allowing me to close the deal in a manner that I felt quite comfortable >with. And for that I would like to thank him very much. > >I chose to thank Mike publicly on the list as well as privately off-list for >a reason. This list, like most others, sees its periods of negativity >spawned by arguments, disgruntled posters, mis-information, etc., etc. But >it also sees more than its fair share of that which I assume that it was >originally founded for: the sharing of TSCM-related information, thoughts >and ideas. I have no idea whether or not when the list was founded the >moderator envisioned its usage for 'blind' business contacts or the >requesting of 'professional favors'. But I for one found it very beneficial >for just that purpose. And so, as long as the moderator does not disapprove, >I would not hesitate to recommend to any list member that if he/she has a >problem, concern or issue that another list member in a specific area might >be able to help with - then simply put out the feeler. Of course remember to >request the return contact and conduct your business off-list, but don't >hesitate to give that first 'call for help' via a posting on the list a try! > >Bob Motzer -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2283 From: James M. Atkinson, Comm-Eng Date: Thu Jan 11, 2001 6:06pm Subject: Re: Fw: ARROGRANCE [ships passing in the night] At 1:27 PM -0500 1/11/01, MACCFound@a... wrote: > In a message dated 1/11/01 8:48:38 AM Pacific Standard Time, >secdep@v... writes: > > << Transcript of an actual radio conversation which took place during > October 1995 between a USN War Ship sailing off the coast of > Newfoundland and the Canadian authorities. >> > > > Sounds like an "urban legend" to me. Actually I think it falls under the header of [humor]... it's a story i have heard dozens of times, and in dozens of variations, but it is always funny and is worthy of re-telling periodically. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2284 From: James M. Atkinson, Comm-Eng Date: Thu Jan 11, 2001 6:42pm Subject: System of Signals Emission Classification WARC-79, the World Administrative Radio Conference that rewrote many of the world's radio regulations, adopted a new system of emission classification. The traditional A (Amplitude), F (Frequency), and P (Pulse) was intuitive, but limited and clumsy when dealing with new modes. The world's radio bodies, including the FCC, gradually phased in the new system until today it completely replaces the old one. The formula for the new designations, loosely from ITU radio regulations 264 through 273, and Appendix 6, Part A, is: [BBBB]MNI[DM], where [] means optional when writing emission specs. [BBBB] = Necessary Bandwidth (shown in FCC records, but is often omitted elsewhere) Uses a letter and three numbers. The letter goes where the decimal point should be placed, and denotes a magnitude: H Hz K kHz M MHz G GHz Some common bandwidths are: 400 Hz 400H 2.4 kHz 2K40 12.5 kHz 12K5 6 MHz 6M00 M = Modulation Type N None A AM (Amplitude Modulation), double sideband, full carrier H AM, single sideband, full carrier R AM, single sideband, reduced or controlled carrier J AM, single sideband, suppressed carrier B AM, independent sidebands C AM, vestigial sideband (commonly analog TV) F Angle-modulated, straight FM G Angle-modulated, phase modulation (common; sounds like FM) D Carrier is amplitude and angle modulated P Pulse, no modulation K Pulse, amplitude modulation (PAM, PSM) L Pulse, width modulation (PWM) M Pulse, phase or position modulation (PPM) Q Pulse, carrier also angle-modulated during pulse W Pulse, two or more modes used X All cases not covered above N = Nature of modulating signal 0 None 1 Digital, on-off or quantized, no modulation 2 Digital, with modulation 3 Single analog channel 7 Two or more digital channels 8 Two or more analog channels 9 Composite, one or more digital channel, one or more analog X All cases not covered above I = Information type N None A Aural telegraphy, for people (Morse code) B Telegraphy for machine copy (RTTY, fast Morse) C Analog fax D Data, telemetry, telecommand E Telephony, voice, sound broadcasting F Video, television W Combinations of the above X All cases not covered above [DM] = additional details, not used by FCC, optional elsewhere D = Detail RTTY/modems: A Two condition code, differing numbers or durations (Morse) B Two condition code, same number and duration, no error check C Two condition code, same num & dur, error check D Four condition code, 1 or more bits per condition E Multi condition code, 1 or more bits per condition F Multi condition code, conditions may combine Audio: G Broadcast quality (mono) H Broadcast quality (stereo/multichannel) J Commercial quality K Commercial quality, analog freq inversion or band scrambling L Commercial quality, FM pilot tone (i.e. Lincomprex) Video: M Monochrome N Color W Combination X All cases not covered above M = Multiplex type N None C Code division F Frequency division T Time division W Combination of above X All other types ----------------------------------------------------------------------- Converting Between Old & New Systems ----------------------------------------------------------------------- USE OLD NEW Pure carrier A0,F0 N0N Morse telegraphy (by ear) A1 A1A Modulated CW Morse A2 A2A AM voice A3 A3E SSB, suppressed carrier A3J J3E SSB, reduced carrier A3R R3E SSB, full carrier A3H H3E Television A5 C3F RTTY (F.S.K.) F1 F1B RTTY (A.F.S.K.) F2 F2B FM voice (Narrowband) F3 F3E, 20K0F3E Packet Data/Teleprinters with Audio Sub-Carrier 20F2 20K0F2B Data with Audio Sub-carrier 3F2 3K00F2D 6F2 6K00F2D 20F2 20K0F2D Analog Voice 20F3 20K0F3E Digital Voice 20F3Y 20K0F1E Digital Facsimile without Audio Sub-Carrier 20F4 20K0F1C Digital Facsimile with Audio Sub-Carrier 20F4 20K0F2C Analog Facsimile 20F4 20K0F3C Composite of Digital & Analog Information 3F9 3K00F9W 6F9 6K00F9W 20F9 20K0F9W Packet Data/Teleprinters without Audio Sub-Carrier 20F9Y 20K0F1B Digital Data 20F9Y 20K0F1D LAND MOBILE EMISSIONS MICROWAVE EMISSIONS old new old new old new A0 N0N P0 P0N F9 F8W (If bw is less than A1 A1A P9 P0N 50 convert to F2D) A3 A3E A2J J2B F9Y F7W (If bw is less than A3J J3E A3H H3E 50 convert to F2D) A7J J8W A9J J9W F3 F3E A9 A9W P1 P1D A9Y A7W A9Y A1D F2Y F2D A5 A3F F0 N0N A0H H0N A9 A8W F1 F1B A7 A8D A5C C3F F2 F2D F7 F8D F2 F2D F3 F3E F5 F3F F3Y F1E F4 F3C F9 F9W F9Y F1D A2H H2D A2 A2D ---------------------------------------------------------------------- And here is the relevant section of FCC rules: ---------------------------------------------------------------------- From General Docket No. 80-739 Section 2.201 Emission, modulation, and transmission characteristics. The following system of designating emission, modulation, and transmission characteristics shall be employed. (a) Emissions are designated according to their classification and their necessary bandwidth. (b) A minimum of three symbols are used to describe the basic characteristics of radio waves. Emissions are classified and symbolized according to the following characteristics: (1) First symbol - type of modulation of the main carrier; (2) Second Symbol - nature of signal(s) modulating the main carrier; (3) Third symbol - type of information to be transmitted. NOTE: A fourth and fifth symbol are provided for additional information and are shown in Appendix 6, Part A of the ITU Radio Regulations. Use of the fourth and fifth symbol is optional. Therefore, the symbols may be used as described in Appendix 6, but are not required by the Commission. (c) First Symbol - types of modulation of the main carrier: (1) Emission of an unmodulated carrier N (2) Emission in which the main carrier is amplitude- modulated (including cases where sub-carriers are angle modulated): - Double-sideband A - Single-sideband, full carrier H - Single-sideband, reduced or variable level carrier R - Single-sideband, suppressed carrier J - Independent sidebands B - Vestigial sideband C (3) Emission in which the main carrier is angle-modulated: - Frequency modulation F - Phase modulation G NOTE: Whenever frequency modulation "F" is indicated, Phase modulation "G" is also acceptable. (4) Emission in which the main carrier is amplitude and angle-modulated either simultaneously or in a pre- established sequence D (5) Emission of pulses:* - Sequence of unmodulated pulses P - A sequence of pulses: - Modulated in amplitude K - Modulated in width/duration L - Modulated in position/phase M - In which the carrier is angle-modulated during the period of the pulse Q - Which is a combination of the foregoing or is produced by other means V (6) Cases not covered above, in which an emission consists of the main carrier modulated, either simultaneously or in a pre-established sequence, a combination of two or more of the following modes: amplitude, angle, pulse W (7) Cases not otherwise covered X *Emissions where the main carrier is directly modulated by a signal which has been coded into quantizied form (e.g., pulse code modulation) should be designated under (2) or (3). (d) Second Symbol- nature of signal(s) modulating the main carrier: (1) No modulating signal 0 (2) A single channel containing quantized or digital information without the use of a modulating sub- carrier, excluding time-division multiplex 1 (3) A single channel containing quantized or digital information with the use of a modulating sub-carrier, excluding time-division multiplex 2 (4) A single channel containing analogue information 3 (5) Two or more channels containing quantized or digital information 7 (6) Two or more channels containing analogue information 8 (7) Composite system with one or more channels containing quantized or digital information, to-gether with one or more channels containing analogue information 9 (8) Cases not otherwise covered X (e) Third Symbol - type of information to be transmitted: (1) No information transmitted N (2) Telegraphy - for aural reception A (3) Telegraphy - for automatic reception B (4) Facsimile C (5) Data transmission, telemetry, telecommand D (6) Telephony (including sound broadcasting) E (7) Television (video) F (8) Combination of the above W (9) Cases not otherwise covered X (f) Type B emission: As an exception to the above principles, damped waves are symbolized in the Commission's rules and regulations as type B emission. The use of type B emissions is forbidden. (g) Whenever the full designation of an emission is necessary, the symbol for that emission, as given above, shall be preceded by the necessary bandwidth of the emission as indicated in Section 2.202 (b) (1). Section 2.202 Bandwidths. (b) Necessary bandwidths. (1) The necessary bandwidth shall be expressed by three numerals and one letter. The letter occupies the position of the decimal point and represents the unit of bandwidth. The first character shall be neither zero nor K, M or G. - -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2285 From: Shawn Hughes Date: Fri Jan 12, 2001 9:01am Subject: damped waves? >(f) Type B emission: As an exception to the above principles, damped waves >are symbolized in the Commission's rules and regulations as type B >emission. The use of type B emissions >is forbidden. kay, what is a 'damped wave'? Why would they want to forbid it? What would one look like on a spec an? Shawn [Non-text portions of this message have been removed] 2286 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 8:33am Subject: Lamaze Class The room was full of pregnant women and their partners, and the Lamaze class was in full swing. The instructor was teaching the women how to breathe properly, along with informing the men how to give the necessary assurances at this stage of the plan. The teacher then announced, "Ladies, exercise is good for you. Walking is especially beneficial. And, gentlemen, it wouldn't hurt you to take the time to go walking with your partner!" The room got quiet. Finally, a man in the middle of the group raised his hand. "Yes?" replied the teacher. "Is it all right if she carries a golf bag while we walk?" -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2287 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 8:36am Subject: Computer Terms for Southerners Computer Terms for Southerners "Keyboard" ----- Place to hang your truck keys. "Window" ----- Place in the truck to hang your guns. "Floppy" ----- When you run out of Polygrip. "Modem" ----- How you got rid of your dandelions. "ROM" ----- Delicious when you mix it with coca cola. "Byte" ----- First word in a kiss-off phrase. "Reboot" ----- What you do when the first pair gets covered with barnyard stuff. "Network" ----- Activity meant to provide bait for your trot line. "Mouse" ----- Fuzzy, soft thing you stuff in your beer bottle in order to get a free case. "LAN" ----- To borrow as in, "Hey Bubba! LAN me yore truck." "Cursor"----- What some guys do when they are mad at their wife and/or girlfriend. "Bit" ----- A wager as in, "I bit you can't spit that watermelon seed across the porch longways." "Digital Control" ----- What yore fingers do on the TV remote. "Packet"----- What you do to a suitcase or Wal-Mart bag before a trip. "Hard drive" ----- Trying to climb a steep, muddy hill with 3 flat tires and pulling a trailer load of fertilizer. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2288 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 8:39am Subject: Native New Yorkers What would you call it when a Native New Yorker has one arm shorter than the other? A speech impediment. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2289 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 8:44am Subject: Assorted Tidbit of Wisdom and Such THE INTERNET ~~~~~~~~~~~~ Customer: I'm trying to connect to the Internet with your CD, but it just doesn't work. What am I doing wrong? Tech Support: OK, you've got the CD in the CD drive, right? Customer: Yeah.... Tech Support: And what sort of computer are you using? Customer: Computer? Oh no, I haven't got a computer. It's in the CD player and all I get is weird noises. Listen..... Tech Support: Aaaarrrrgggghhhh!!! THE DOCTOR'S DAUGHTER ~~~~~~~~~~~~~~~~~~~~ On the way to preschool, the doctor had left her stethoscope on the car seat, and her little girl picked it up and began playing with it. "Be still, my heart," thought the doctor, "my daughter wants to follow in my footsteps!" Then the child spoke into the instrument, "Welcome to McDonald's. May I take your order?" COMPUTER CONFUSION ~~~~~~~~~~~~~~~~~~ Don was on duty in the main computer lab on a quiet afternoon. He noticed Putty Duh sitting in front of one of the workstations with his arms crossed across his chest, staring at the screen. After about 15 minutes he noticed that Putty was still in the same position, only now he was impatiently tapping his foot. Finally, Don approached Putty and asked if he needed help. He replied, "It's about time! I pressed the F1 button over twenty minutes ago!" HAIR LOSS ~~~~~~~~~ Sabra was eating breakfast one morning and got to thinking about things. "Mommy, mommy, why has daddy got so few hairs on his head?" she asked her mother. "He thinks a lot," replied her mother, pleased with herself for coming up with a good answer to her husband's baldness. Or she was until Sabra thought for a second and asked, "So why do you have so much hair?" TRUTHS ~~~~~~ * Raising teenagers is like nailing JELLO to a tree. * There is always a lot to be thankful for if you take time to look for it. For example, I am sitting here thinking how nice it is that wrinkles don't hurt. * The best way to keep kids at home is to make the home a pleasant atmosphere and let the air out of their tires. * Car sickness is the feeling you get when the monthly car payment is due. * Families are like fudge... mostly sweet with a few nuts. * Laughing helps. It's like jogging on the inside. * My mind not only wanders, sometimes it leaves completely. * If you can remain calm, you just don't have all the facts. WHY IS IT? ~~~~~~~~~~ Why is it that if someone tells you that there are 1 billion stars in the universe you will believe them, but if they tell you that a wall has wet paint you will have to touch it to be sure? -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2290 From: Date: Fri Jan 12, 2001 6:19am Subject: warrantless searches of computers for L.E. covered here http://www.cybercrime.gov/searchmanual.htm The U.S. Department of Justice this week published new guidelines for police and prosecutors in cases involving computer crimes. The 500 KB document includes a bevy of recent court cases and covers new topics such as encryption, PDAs and secret searches. It updates a 1994 manual, which the Electronic Privacy Information Center had to file a Freedom of Information Act request to obtain. No need to take such drastic steps this time: The Justice Department has placed the report on its cybercrime.gov site. 2291 From: Talisker Date: Fri Jan 12, 2001 11:18am Subject: Virus Alert - Humour I saw this and thought I'd pass it on :o) >you have just received the "Kansas Virus" As we ain't got no programming >experience, this virus works on the honor system. Please delete all the >files from your hard drive and manually forward this virus to everyone on >your mailing list. >Thanks for y'all for cooperating, >University of Kansas Computer Engineering Dept. No offence intended to anyone from Kansas Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo talisker@n... The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. 2292 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 11:44am Subject: Chicago Cops' Spying Curbs Eased Chicago Cops' Spying Curbs Eased http://www.guardianunlimited.co.uk/breakingnews/US/0,3560,667737,00.html Friday January 12, 2001 4:40 am CHICAGO (AP) - Police can more easily monitor criminals after a federal appeals court on Thursday lifted restrictions imposed on the Chicago force two decades ago to stop mistreatment of Communists and other suspected subversives. Among the changes under the ruling: police will be allowed to investigate people photographed near crime scenes, keep records of suspects' gang affiliations and keep files on known associates of organized crime figures. The city's ``Red Squad,'' established in the 1920s, was designed to keep tabs on radical groups then viewed as enemies of the state. But over 50 years it also began keeping files on critics of City Hall. A 1981 agreement with the federal government required the police department to stop interfering with freedom of expression and to stop several types of intelligence-gathering. Thursday's decision leaves intact prohibitions against police harassment or retaliation against freedom of expression. The department must conduct an audit to see that it is in compliance with the decree and a federal court will continue to have oversight under the decision. But the 7th U.S. Circuit Court of Appeals ruling said the restrictions should be lifted because police were no longer interested in harassing people who had unpopular views. ``The culture that created and nourished the Red Squad has evaporated,'' the court said. ``The city does not want to resurrect the Red Squad. It wants to be able to keep tabs on incipient terrorist groups.'' ``Every major city in the United States is allowed to collect this kind of intelligence data,'' said police Superintendent Terry Hillard. ``We will continue to respect First Amendment rights while using the investigative tools to responsibly fight crime.'' The American Civil Liberties Union expressed dismay that the restrictions were lifted. ``We respectfully disagree with the 7th Circuit that they hampered the Chicago police from conducting effective law enforcement,'' spokesman Edward Yohnka said. =================================== Court upends spying rules imposed on Chicago cops http://www.chicago.tribune.com/news/metro/chicago/article/0,2669,ART-49184,FF.html By Matt O'Connor and Gary Washburn Tribune Staff Writers January 12, 2001 Restrictions on Chicago police because of their infamous Red Squad that spied on political activists in the 1960s and 1970s have left police "helpless" to combat terrorist groups and should be eased, a federal appeals court ruled Thursday. Lawyers for the city and Police Department hailed the decision, saying it will allow officers to provide surveillance of hate groups, photograph and videotape public demonstrations and share information with police across the country in monitoring suspected terrorists. Under a federal consent decree in effect for the last two decades, the city said its efforts to investigate gangs, terrorism and demonstrations had been hampered by requirements it first must have a reasonable suspicion of criminal activity. In its ruling, a three-judge panel of the 7th Circuit U.S. Court of Appeals said the onerous decree "renders the police helpless to do anything to protect the public" against terrorism. "The decree impedes efforts by the police to cope with the problems of today because earlier generations of police coped improperly with the problems of yesterday," said the opinion, written by Richard A. Posner, until recently chief judge. Judges William J. Bauer and Frank H. Easterbrook concurred. The ruling overturns a decision for the decree by former U.S. District Judge Ann Williams, who now sits on the 7th Circuit bench. Richard Gutman, an attorney for the lead plaintiff, Alliance to End Repression, who has been involved in the litigation from its inception in 1974, fears a return to the police tactics of the Red Squad, the intelligence-gathering unit that spied on, infiltrated and harassed a variety of political groups as far back as the 1920s. In its heyday in the 1960s, the special police detail was set up to watch over possibly violent anti-Vietnam War activists, but it quickly expanded to include spying on church organizations, community activists and opponents of Mayor Richard J. Daley's administration. "For all practical purposes, it eliminates any restrictions on political spying and it would permit the city to re-create the Red Squad," Gutman said. "So far as I'm concerned, the consent decree is dead." The ACLU of Illinois, another plaintiff in the lawsuit, disagreed with the court's finding that the limitations "hampered the city's ability to engage in effective law enforcement," said spokesman Edwin Yohnka. The plaintiffs said they haven't decided if they would ask the court to reconsider its decision or appeal to the U.S. Supreme Court. Lawyers for the city and the Police Department as well as the court ruling emphasized that the consent decree is being modified, not eliminated. Audits of the department's conformance with the decree won't be altered, making it more difficult for constitutional violations to go undetected, the court said. Thomas Needham, the Police Department's chief of staff, said he has been instructed by Supt. Terry Hillard to meet with city attorneys and come up with written procedures on how to conduct these investigations. Hillard wants to take "a cautious, go-slow approach," Needham said. "He wants this studied carefully." Mara Georges, the city's corporation counsel, said the court decision simply "unties the hands of the Chicago Police Department and allows it to engage in the kind of routine police work that every other police department does." Deputy Corporation Counsel Lawrence Rosenthal, who led the fight to ease the restrictions, acknowledged "very serious misconduct gave rise" to the consent decree. But from the start, the decree was "extremely restrictive," he said. Citing a recent example of how it hamstrung police efforts, Rosenthal pointed to white supremacist Benjamin Smith, whose two-state shooting spree over the 4th of July weekend in 1999 killed two, including former Northwestern University basketball coach Ricky Byrdsong, and wounded nine. When Smith had passed out inflammatory leaflets, Rosenthal said, "we couldn't even keep the leaflets, much less gather intelligence about who this guy was and what he was up to." "If somebody paints a swastika in Rogers Park, we have no idea what hate groups are operating in Rogers Park," Rosenthal said. "That is why we almost never solve those crimes. If you don't have a notion of what people you ought to be interviewing, you are not going to solve the crime." The court perceived a greater threat if the police couldn't keep tabs on terrorist groups. "Until the group goes beyond the advocacy of violence and begins preparatory actions that might create reasonable suspicion of imminent criminal activity, the hands of the police are tied," the decision said. "And if the police have been forbidden to investigate until then, if the investigation cannot begin until the group is well on its way toward the commission of terrorist acts, the investigation may come too late to prevent the acts or to identify the perpetrators." Plaintiffs' lawyers pointed out that Williams and U.S. Magistrate Judge Edward Bobrick concluded the decree in no way restricted Chicago police from investigating criminal activity. Gutman said one Chicago police sergeant who was a veteran of 15 years on the Counter-Terrorism Task Force said in a deposition the consent decree never stopped him from pursuing what he wanted to pursue. Gutman said the city in court filings indicated it wanted to investigate the extremist beliefs of individuals who aren't suspected of criminal activity. "They're going to be defining who's extremist," he said. "They can spy on anybody they want." Mayor Richard M. Daley began a campaign to lift the restrictions more than a decade ago. His administration believed the court might lift the limits if the city demonstrated a solid record of compliance. The city abided by the terms of the decree even though it hamstrung police, city officials declared Thursday. The court also concluded that the limits had worked. "The culture that created and nourished the Red Squad has evaporated," the court found. "The consent decree has done its job." =================================== Police spying rules eased http://www.suntimes.com/output/news/red12.html January 12, 2001 BY FRAN SPIELMAN AND STEVE WARMBIR STAFF REPORTERS Chicago police should have more freedom to investigate terrorist and hate groups because threats from them are more pressing than past police spying abuses, a federal appeals court ruled Thursday. In a controversial decision, the 7th Circuit Court of Appeals agreed to the city's request to modify a 1981 consent decree that had reined in the Chicago Police Department's notorious Red Squad. The unit spied on, infiltrated and harassed political groups. Under the consent decree, police could not start spying on a group until they had a reasonable belief a crime was occurring. But with a terrorist or hate group, "if the investigation cannot begin until the group is well on its way toward the commission of terrorist acts, the investigation may come too late to prevent the acts or to identify the perpetrators," Appellate Court Judge Richard Posner wrote. "The decree impedes efforts by the police to cope with the problems of today because earlier generations of police coped improperly with the problems of yesterday." Police and city officials praised the decision, while civil rights groups said it gutted an important safeguard. "I think it's a significant setback for these guidelines that have been in place protecting the people of Chicago these many years," ACLU spokesman Ed Yohnka said. The ACLU is considering an appeal. Tom Needham, chief of staff for police Supt. Terry Hillard, called the decision "a tremendous victory for common sense." "Less than 5 percent of the people currently on the police department were on the job when the city entered into this consent decree," Needham said. "There's a whole new generation of younger, better-educated police officers who can't even understand why we have these restrictions that other law enforcement agencies don't have. It's a historical relic." The ruling was a resounding victory for Mayor Daley, who has spent four years trying to modify the consent decree, which he contends "ties the hands" of police. As recently as last fall, violence in the Middle East prompted a Rogers Park rabbi to come under gunfire and Jewish pedestrians to be victimized by a slingshot attack. Daley said it was an example of how the court order had hamstrung police attempts to combat hate crimes. The rabbi's attackers are still at large. Currently, the police department is prohibited from retaining intelligence files, but now it will be able to create comprehensive databases on terrorist and hate groups. Hillard has asked his staff to put together a committee to determine how internal orders and procedures should be rewritten. The modified consent decree is expected to be written by U.S. District Judge Joan Gottschall at the appellate court's direction. Gottschall recently rejected claims by protesters that police violated the consent decree by spying on them during the 1996 Democratic National Convention. Corporation Counsel Mara Georges stressed the decree is not being scrapped. Chicago police still won't be permitted to gather intelligence to harass, intimidate or prohibit activities protected by the First Amendment. And the police will still be subject to court-monitored annual audits. "It's an entirely different atmosphere now. The city has been able to show that, for two decades, police have not engaged in such conduct." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2293 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 4:54pm Subject: Cuba's spy network revealed Published Friday, January 12, 2001, in the Miami Herald Cuba's spy network revealed http://www.miamiherald.com/content/today/news/dade/digdocs/057047.htm BY GAIL EPSTEIN NIEVES gepstein@h... Cuba's foreign intelligence agency devotes an entire department to infiltrating exile groups and another department to getting inside the FBI, CIA, State Department and other U.S. governmental agencies, an expert in Cuban spy matters testified Thursday. Stuart Hoyt Jr., a retired FBI agent, unraveled the hierarchy of Cuba's intelligence services from ``Commander in Chief'' Fidel Castro on down. His testimony provided some context for jurors in the Cuban spy trial, who every day read or hear another acronym related to Cuban intelligence. None of the jurors is Cuban- American, so they probably would not be expected to know that the Directorate of Intelligence, or DI, is Cuba's main foreign espionage agency. Within the DI are eight departments, all of which start with the letter M followed by a Roman numeral, said Hoyt, who retired from the FBI in 1994 after 24 years of foreign counter-intelligence work, first against the Soviet Union and later against Cuba. Hoyt was assigned to field offices in New York, Boston, San Juan and Washington, D.C., and for three years he supervised the agency's anti-Cuba efforts. He still works under contract with the FBI. Hoyt named the intelligence departments as follows: MX is the office of the DI's chief, Brig. Gen. Eduardo Delgado Rodriguez. The indictment in this case used the code ``MX'' for the Havana chief who directed the accused spies to gather information that allegedly helped Cuban MiG warplanes shoot down and kill four Brothers to the Rescue pilots in 1996. MI is responsible for infiltrating U.S. government agencies. MIII collects and analyzes all information coming into the DI. MV supports ``illegal'' intelligence officers, or those who enter the U.S. illegally. ``Legal officers'' arrive legally and operate in official diplomatic missions, including M15, the Cuban mission to the United Nations in New York City; M2, the Cuban embassy in Mexico City; and M6, the Cuban embassy in Madrid. MIX is ``active measures,'' which refer to the use of disinformation, threats and violence to discredit enemies or otherwise influence someone's actions. MXI monitors phone calls and airplane radio communications. MXV handles communications between Havana and agents in the United States. MXIX infiltrates ``counter-revolutionary'' Cuban exile groups that oppose the Castro regime. Cuba has another group with a name similar to the DI but with a very different function. The Directorate of Counter Intelligence, called CI, works within Cuba handling ``internal control to ensure people don't speak out against the government,'' Hoyt said. Both the DI and the CI are part of the Ministry of the Interior, MINIT, one of the two most powerful ministries, or departments, in the Cuban government. The second is the Ministry of the Revolutionary Armed Forces, MINFAR, or the Cuban military, Hoyt said. The five men on trial are accused of spying for Cuba as part of La Red Avispa, the Wasp Network, whose members allegedly tried to penetrate U.S. military installations and Cuban exile groups. Hoyt said the network used typical spying techniques, including writing secrets on water-soluble paper that could quickly be destroyed. Jurors saw four such papers. The network also used ``compartmentalization,'' or limiting each person's knowledge, so that ``in case one is arrested, he will not be able to identify the other.'' The accused spies also communicated with beepers and pay phones, used counter-surveillance measures, post office boxes, fake documents and concealment devices, he said. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2294 From: St. Clair, James Date: Fri Jan 12, 2001 8:39am Subject: FW: CellPhone in luggage allegedly scrambles avionics CellPhone in luggage allegedly scrambles avionics: Mobile phone brings down Slovenian airplane By Kieren McCarthy, The Register, 01/11/2001 http://www.theregister.co.uk/content/5/15995.html According to Reuters, a Slovenian airplane had to make an emergency landing on Tuesday because a ringing mobile phone had corrupted an electronics system and caused a fire-on-board light to switch on. Adria Airways admitted the plane bound for Sarajevo turned back shortly after take-off and made an emergency landing in Ljubljana. The airline said it had been caused by a phone in the luggage compartment that had been left on. Now, we can take this one of three ways. Either we should be extremely grateful to airlines' anal rules that stop you using mobiles and loads of other electrical equipment (note that laptops are alright because business customers make airlines profitable), thereby making the flight even more depressing and uncomfortable. Or, we should be very, very concerned about getting onto an Adria Airways plane in the future. Or, we should stop using our mobile phones very soon because if they can disrupt electrical systems while in a suitcase while in a hold - just imagine what they're doing to your brain. Æ 2295 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 9:26pm Subject: Secrets and Lies January 12, 2001 Secrets and Lies http://thestandard.com/article/display/0,1151,21428,00.html Clinton recently appointed a national counterintelligence executive. But will protecting national secrets only create more leaks? By Richard Martin Two weeks ago, as one of his last acts in office, President Clinton created a position ñ "national counterintelligence executive" ñ with a broad mission to identify potential security threats and beef up protection for national secrets deemed vital to the security of the U.S. Coming after the bungled FBI investigation at the Los Alamos National Laboratory, this lame-duck maneuver is designed to combat a largely vaporous menace. It bears the fingerprints of FBI Director Louis Freeh, who as chairman of the proposed National Counterintelligence Board of Directors would select and oversee the secrecy czar. The directive also follows years of thwarted efforts by Congress to enact a law resembling Britain's notorious Official Secrets Act. Technology and business leaders should press the new Bush administration to reverse it forthwith. If there's one lesson that American companies have learned from the economic boom of the past decade it's that the free flow of information in any system ñ whether it's an internal network, a far-flung multinational corporation, a market or a government ñ benefits all parts of the system. Transparent markets function better than closed ones, as travel agents and stockbrokers are finding out. And transparent governments outlive secretive ones: "There seems to be no doubt," wrote former Sen. Daniel Patrick Moynihan in his foreword to the 1997 report from the Commission on Protecting and Reducing Government Secrecy, "that the Soviet Union deteriorated not least because the responsible actors rarely really knew what was going on." Unfortunately, the culture of secrecy that took hold in Washington after World War II did not evaporate with the end of the Cold War. Intelligence spending rose 120 percent between 1980 and 1996, a period when defense spending increased 40 percent. Today there are some 3 million people, inside and outside the federal government, with the authority to classify information as "Top Secret." But recent intelligence foul-ups, including the Los Alamos fiasco, prove that that expansion has not resulted in increased security. That's because of a paradox long understood by students of counterintelligence: The more secrets there are, the less secure they are. "Unless secrecy is reduced," wrote Moynihan, "it cannot be protected." Centralizing the government's counterintelligence efforts is a good idea. (One of the main recommendations of the 1997 secrecy commission was to rationalize procedures for classifying government information and to create a National Declassification Center.) Appointing a new secrecy czar to make the U.S. government more opaque, rather than less, is a lousy one. Ironically, in November, Clinton vetoed the Intelligence Authorization Act, which contained a provision to make any unauthorized disclosure of classified information a felony. Among other things, the law would have reversed the Supreme Court's historic decision in the Pentagon Papers case, which affirmed that freedom of the press and the public's right to know outweigh the specific crime of divulging government secrets. In vetoing the intelligence bill, Clinton quoted Justice Potter Stewart's opinion in that case: "The only effective restraint on executive policy in the areas of national defense and international affairs may lie in an enlightened citizenry." In other words, more secrecy only begets ignorance. And knowledge is always better than ignorance. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2296 From: Andre Holmes <1ach@g...> Date: Sat Jan 13, 2001 8:00am Subject: Re: FW: CellPhone in luggage allegedly scrambles avionics We should be very concerned about getting onto a Airways plane in the future. Lesson learned= after reading the post I could only conclude: 1 The Slovenian Airplane was rigged in such away that if there is any transmitting on board then it had better be from the transceiver in the cockpit. 2 There is a good likely hood that a frequency registering instrument was wired to the lights and or warning system of the airplane. 3 Electrical power to the airplane is generated from a generator which is mounted under the Jet Engines. All cables are shielded from heat,oil,water,vibration etc meaning nothing should be able to penetrate the shielding. The cables from the generator is routed to a box on the side of the Engine its a distribution center, from there the wire routes can go every where needed. 4 The airliner feels safer to turn the plane around to locate the source of the xmitter or bomb in the hopes of lowering liability. ----- Original Message ----- From: "St. Clair, James" To: Sent: Friday, January 12, 2001 9:39 AM Subject: [TSCM-L] FW: CellPhone in luggage allegedly scrambles avionics CellPhone in luggage allegedly scrambles avionics: Mobile phone brings down Slovenian airplane By Kieren McCarthy, The Register, 01/11/2001 http://www.theregister.co.uk/content/5/15995.html According to Reuters, a Slovenian airplane had to make an emergency landing on Tuesday because a ringing mobile phone had corrupted an electronics system and caused a fire-on-board light to switch on. Adria Airways admitted the plane bound for Sarajevo turned back shortly after take-off and made an emergency landing in Ljubljana. The airline said it had been caused by a phone in the luggage compartment that had been left on. Now, we can take this one of three ways. Either we should be extremely grateful to airlines' anal rules that stop you using mobiles and loads of other electrical equipment (note that laptops are alright because business customers make airlines profitable), thereby making the flight even more depressing and uncomfortable. Or, we should be very, very concerned about getting onto an Adria Airways plane in the future. Or, we should stop using our mobile phones very soon because if they can disrupt electrical systems while in a suitcase while in a hold - just imagine what they're doing to your brain. Æ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2297 From: Jonathan D. Alvord Jr. Date: Fri Jan 12, 2001 10:29pm Subject: pgp encryption Just something I thought worthy of discussion!! Anyone else know about this ?? heimdall58@h... Found this while surfing the web. [Note: there are many commercial programs available which may provide additional features not found in PGP 5.5, such as automatic encryption of an entire drive. A review of some of these programs for Windows 95 can be found in the cryptome. I have been advised that the Triple DES algorithm is probably the most secure.] For those who are not familiar with it, I would like to briefly describe encryption and how it works, and then suggest how the freeware program pgp could be used to encrypt an internet mailing list, so that third parties would not be able to decode and read messages broadcast within a private group. As far as I know, no one is using pgp to encrypt a mailing list at this time - but it's easy to do so, and a foolproof way to prevent big brother wannabies in spy agencies from sticking their noses where they don't belong -- politics. If this is beginning to sound like a conspiracy theory, then a few historical references are in order. The FBI performed over 10,000 illegal black bag jobs (break-ins to gather intelligence) during the cointelpro period of the sixties and seventies, and most of those were for political purposes. Fighting communism, fighting the Black Panthers and the American Indian Movement, the murders of Martin Luther King and Malcolm X -- there are many examples of the use of surveillance and counter- intelligence for political purposes, the shameful underside and shadow of twentieth century American politics. Today, with almost everyone going online, even ordinary people are taking great risks in their personal conversations, because email can be so easily intercepted and cataloged. And it's not just a rogue law enforcement officer we have to be afraid of; the APEC scandal provides a perfect example of the unethical use of our intelligence community for commercial purposes, and in that case, for the purpose of campaign finance. Well, if someone wants to read my email, they're going to have to get a warrant to steal my computer. Without the private key I keep on my hard drive (which itself is password protected), even an acre of cray computers at Fort Meade couldn't crack my code. That's how powerful this technology is. Louie the Freeh and other top cops have tried to make this illegal, but it is not illegal, at least in the U.S. [There may be countries where the use of unlimited strength crypto is illegal, however. These programs may be considered to be weapons of war, due to the historical importance of secret codes in wars.] You don't need to have any secrets to need encryption. One good reason to use encryption is the NSA database of private email (and etc), which can be searched for keywords, just like dejanews is used by regular folks, to search through public usenet posts. By keying in on your email address and name as keywords, anyone with access to their system could read all your incoming and outgoing email (all the mail, from day one) as well as all the emails in which someone else mentions your name. A search on your name would probably turn up things other people have said about you that you don't even know about. OK, let's discuss pgp. PGP, which stands for Pretty Good Privacy, is a freeware program available for IBM, Mac, and Unix computers at http://www.pgp.com/products/personal/products.cgi. Older versions and newer versions of pgp seem to be incompatible, and people with older versions need to update to version 5.5 to stay current. When the program installed itself on my Windows 95 machine, it generated a pair of keys. A key is a long sequence of characters generated by complex mathematical formulas. The two keys generated by the formulas have a mathematical relationship to each other, and pgp can tell that they are a pair by applying its equations - the puzzle is solved! One of the keys is public and the other is private. You give key away to your friends, and you keep the other one for yourself. The private key is never given to anyone else. Then the only way a third party would be able to decode messages encrypted to you would be to get a hold of your private key - and they would have to steal your computer for that. If this ever happens to you, remember to tell your lawyer about the Steve Jackson Games case, which set a precedent for the legal grounds required for a federal agency to confiscate a person's computer. The private key on your computer requires a password to use, which should be something you can remember and don't need to write down. If they have your computer, they can probably hack this password, but it would require serious effort. Some people encrypt everything on their computer and keep the key on a floppy disk. That would be the safest way to go. Then they would need to steal the floppy disk -- does this sound like James Bond yet? Let's say you want to send me an encrypted message. You will need to have my public key. You may have seen people who post on the internet with signatures like BEGIN PGP PUBLIC KEY BLOCK, then a lot of characters in a row, then END PGP PUBLIC KEY BLOCK. This public key is public information, and providers are beginning to archive them for their customers. A public key is used by other people to encrypt a message that only you can decode, using the private key that is the other half of the pair. Once someone encrypts a message to you, they can't decrypt it and read it afterwards, because they don't have the private key. That's how pgp works. Now, for me to send an encrypted reply to your message, I need your public key. I encrypt my message with your public key, paste it into an email message, and you will be able to decode it with your private key. We would use four keys to have this conversation. As I mentioned, they are automatically generated by the pgp program, and you just select "encrypt contents of clipboard" and "decrypt contents of clipboard" from a menu in pgp and select the proper keys from a list the program keeps, like a telephone directory. Apparantly, the way to crack encrypted messages is to use the formulas in pgp and try every combination to see if it works. But with this particular program (pgp), each key is so long that it would be an astronomical computer problem to try every combination. Many nonsense plaintext solutions are generated by shotgun type approaches, and a computer can't determine if it has a correct answer unless it can verify that the syntax of the message is gramatically correct; this is not easy, and even gramatically correct solutions could be found randomly, which have no relation to the real message. It's the same idea as a million monkeys (or more) with typewriters producing a Bible by accident. Imagine how many guesses an acre of cray computers could make in just one moment. Imagine the late Carl Sagan telling you how big the universe is - there must be a huge number of possible pgp keys. When they talk about unlimited strength crypto, they mean programs that can overpower supercomputers using trial and error methods, simply by using very long keys. Obviously, longer keys are harder to guess than shorter ones. Without getting any more technical, that is the basic idea of pgp. A numerical sequence is used to scramble your message, and a corresponding sequence, which is mathematically related to it, is used to unscramble it. The sequences used are too long to make guessing practical, even by the most powerful networks of computers. I have an idea for how to use pgp to encrypt a mailing list. Members of a mailing list all have to be able to read the messages on the list. In pgp terms, everyone needs to use the same public key to encrypt messages for the list, and everyone uses the same private key to read them. So everyone needs to have copies of the same "master keys" for the list. Here's how it would work. First, a group of people all download a copy of pgp and get it working on their machines. PGP is available for IBM, Mac, and Unix, and the members can have a mixture of these different operating systems. Each person will generate a pair of keys, public and private - that's part of the installation. After reading this story, you're now familiar with pgp, and your friends will undoubtedly expect you to take the lead as organizer of the mailing list. The first thing for you to do is to generate another pair of keys - these will be the master keys. Next, send copies of both of keys to everyone on the list, using your newfound encryption technology. Sending keys in the mail may sound like a dangerous idea, but because your friends all have their own sets of keys, you can *italics* use their personal public keys to encrypt the master keys for the list *end italics* and send the master keys securely to each of the members. Now everyone has an identical pair of master keys, and they've never even met face to face. These keys are in addition to their own personal keys, which they can use for personal encrypted mail. Emails sent to the mailing list are encrypted by the public master key and broadcast to the list members, who use the private master key to decode them. This is a perfect information security system, as long as no one's computer gets bagged. Our private communications are none of the government's business. Of course, the legality of using encryption depends upon what it is you're encrypting. This is a technology that can be used for all kinds of criminal purposes. But at the same time, it protects us from criminal acts by unethical people in positions of power in our government. That's a compromise I am willing to make. Paul Wolf _________________________________________________________________ Get your FREE download of MSN Explorer at http://explorer.msn.com 2298 From: Paolo Sfriso Date: Sat Jan 13, 2001 8:31am Subject: Re: Cellphone in lugagge allegedly scrambles avionics. In Italy (and I think in some other EU countries too) it is a criminal offence to keep your cellphone activated during a commercial flight. At take-off and landing a standard "cellphones off/on" warning is given over the plane's PA system. In fact, GSM cellphones do disturb (even when idle and give their "here I am" transmittion burst") a number of electronic systems. You can typically "hear" a call arriving on your GSM cellphone by the rasping noise that enters your phone, PC, stereo system, etc. I assisted on a case a couple of years ago where a GSM/GPS bug had been planted by the Carabinieri CID in a hold-up gang's car and one of the suspects says, after hearing the "hear I am " rasp interfere with the car's stereo, "Sh** I sure hope this noise comes from one of our cellphones and not some big planted in the car"...You can imagine the surveillance team's reaction... Analog cellphones (such as E-TACS) dont seem to disturb nearby electronics. Have a nice weekend. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 (0)335 5257308 paulsfriso@t... 2299 From: William Knowles Date: Sun Jan 14, 2001 2:48am Subject: Re: pgp encryption On Fri, 12 Jan 2001, Men in with black helicopters working with the Greys made Jonathan D. Alvord Jr. write: > Just something I thought worthy of discussion!! Anyone else know about this > ?? heimdall58@h... > > Found this while surfing the web. > > [Note: there are many commercial programs available which may > provide additional features not found in PGP 5.5, such as > automatic encryption of an entire drive. A review of some of > these programs for Windows 95 can be found in the cryptome. I > have been advised that the Triple DES algorithm is probably the > most secure.] Currently PGP 7.0 is the most recent commercial release of PGP. > For those who are not familiar with it, I would like to briefly > describe encryption and how it works, and then suggest how the > freeware program pgp could be used to encrypt an internet mailing > list, so that third parties would not be able to decode and read > messages broadcast within a private group. > > As far as I know, no one is using pgp to encrypt a mailing list at > this time - but it's easy to do so, and a foolproof way to prevent > big brother wannabies in spy agencies from sticking their noses > where they don't belong -- politics. If this is beginning to > sound like a conspiracy theory, then a few historical references > are in order. Actually there are quite a few lists using PGP for a mailing list, and you can install a program to make this eaiser. PGPdomo: pgpdomo is a set of replacement programs for Majordomo version 1.93 that allows you to perform PGP encrypted administration and distribution of encrypted messages on selected lists while still retaining (mostly) normal operation of your cleartext lists. Unless you're checking the backround of everyone signing up for your publically available mailing list, all PGP would do is keep curious onlookers of the mail in transit from looking at your messages, PGP won't stop a FBI agent from submitting a PGP key and signing onto your list. > Well, if someone wants to read my email, they're going to have to > get a warrant to steal my computer. Warrants? We don't need no STINKING WARRANTS! http://www.cybercrime.gov/searchmanual.htm > Without the private key I keep on my hard drive (which itself is > password protected), even an acre of cray computers at Fort Meade > couldn't crack my code. That's how powerful this technology is. Acre of Cray computers? Maybe less then 100 square feet of would crack your message, But if we have your computer whole, intact, and not blown in a million pieces from a chunk of RDX next to your harddrive, Then maybe a couple of Pentium class workstations because it all falls down to the quality of your passphrase, which for the most part are less than 8-10 characters long and usually in plaintext with no special cH@RaC73r$ to slow down the process of cracking the passphrase. > OK, let's discuss pgp. PGP, which stands for Pretty Good Privacy, > is a freeware program available for IBM, Mac, and Unix computers > at http://www.pgp.com/products/personal/products.cgi. I point people towards: http://www.pgpi.org/ for PGP and GPG information. > Older versions and newer versions of pgp seem to be incompatible, > and people with older versions need to update to version 5.5 to > stay current. PGP is available for many different platforms, including Unix, MS-DOS, Windows 3.x, 95, 98, & NT, 2000, BeOS, OS/2, Macintosh, Amiga, Newton, Atari Psion, and even Palm. I have one client that is so paranoid about PGP that he changes his PGP keys as often as he changes his underwear (1-2 times a day) and generates keys on a HP200LX. I tell people that PGP is secure enough for 95% of the world's prying eyes, That the other 5% is the world's various governments, intelligence agencies, and larger corporations that have the way and the means to find out what that encrypted message says in plaintext. Think I'm kidding? http://www.eff.org/descracker.html To prove the insecurity of DES, EFF built the first unclassified hardware for cracking messages encoded with it. On Wednesday, July 17, 1998 the EFF DES Cracker, which was built for less than $250,000, easily won RSA Laboratory's "DES Challenge II" contest and a $10,000 cash prize. It took the machine less than 3 days to complete the challenge, shattering the previous record of 39 days set by a massive network of tens of thousands of computers. The research results are fully documented in a book published this week by EFF and O'Reilly and Associates, entitled "Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design." Its a good rule of thumb not to trust any encryption program that wasn't written by someone that hasn't done years of cryptoanalysis, and Phil Zimmermann isn't one of those guys I really trust his software with my life, Zimmermann was an anti-war/nuclear protester. On the other hand, the NSA is having a hard time retaining their personal and losing quite a few to the private sector, and if I felt I needed an encryption program that strong, I would be recruiting around the Fort George G. Meade campus. :) Sorry to rail on about off this, I'm a little hungover from a night of sake and sushi, and I have to redo a Powerpoint presentation for a talk next week. :) Cheers! William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 2300 From: 1RCM <1RCM@M...> Date: Sun Jan 14, 2001 9:33am Subject: What would YOU do? Hi List, Let's see if we can't spawn some creative debate here. Many on this list have run across these type instances which fall right in that blurry area somewhere between standing on true ethics and paying the bills. What do YOU do?? Ah yes, before you consider both scenarios think back to all of the debate that has taken place on this list over the past year relating to professionals vs. charlatans; just what constitutes performing a proper sweep; enlightening a potential client; fees vs. services performed; etc., etc. Then respond honestly! Scenario #1 ..... You are contacted by a potential client who feels that he/she has reason to have a sweep done. During the discussion that follows you are convinced that a sweep is legitimately needed, but also that the potential client does not have the foggiest idea of what is involved. And so you do a bit of education before you quote a fee. At the end of the discussion the client states that he/she fully understands what you have explained but has reached this decision: "Instead of the 6 hours that you quoted I want you to do the best that you can in 2 hours with your fee being reduced accordingly. I understand what you have explained to me and I accept the fact that I will be receiving less than what you recommend - but as the client that's my decision to make". Now remember that the office copy machine needs repair and you could use those few extra $$$'s to buy that new piece of equipment you want - all to the tune of about what you would make doing this 'mini-sweep'; the location is only 15 minutes from your office; you are satisfied that the client is making an 'informed decision'; and you have absolutely nothing work-wise going on the next day. What would YOU do??? Scenario #2 ...... You are contacted by a PI firm regarding handling a referral job. After a discussion regarding your services, fees and recommendations they want you to do: " a check of a hotel meeting room for transmitters and a quick look-around with a flashlight - bring just your sp ectrum analyzer, your CPM-700, your Opto Xplorer, or what ever you told us you have that you want to use, and your flashlight - we want this done very low-keyed. And you will only have about an hour alone in the room". After explaining your feelings regarding doing 'proper' sweeps the PI that you are talking to states emphatically that it is he who has been retained to look after the best interests of the client; no, you may not speak with the client; he is making his request based upon an investigation that he is conducting for the client; and yes, it is his neck on the line and not yours as the client will not know who you are. However, at the end of this discussion you are not really sure whether or not the PI fully understands what you had attempted to explain to him regarding TSCM and you have this lingering feeling that he is to a high degree basing his request on what he is willing to pay out of his billable fee for your services. But still, he is offering a decent buck for the work that you will actually have to do. Same conditions exist for this one as for the scenario above. What do YOU do???? Respond or not; do it on or off list; included your name or be anonymous - your choice. I'm not trying to embarrass anyone or to pry. I have my own reasons for posing these questions. But I truly believe that the diverse answers - and accompanying debate - that hopefully will be generated can benefit us all. Bob Motzer 1RCM@M... 2301 From: James M. Atkinson, Comm-Eng Date: Sun Jan 14, 2001 10:46am Subject: Re: What would YOU do? At 10:33 AM -0500 1/14/01, 1RCM wrote: >Hi List, > >Let's see if we can't spawn some creative debate here. Many on this list >have run across these type instances which fall right in that blurry area >somewhere between standing on true ethics and paying the bills. What do YOU >do?? Ah yes, before you consider both scenarios think back to all of the >debate that has taken place on this list over the past year relating to >professionals vs. charlatans; just what constitutes performing a proper >sweep; enlightening a potential client; fees vs. services performed; etc., >etc. Then respond honestly! >Scenario #1 ..... You are contacted by a potential client who feels that >he/she has reason to have a sweep done. During the discussion that follows >you are convinced that a sweep is legitimately needed, but also that the >potential client does not have the foggiest idea of what is involved. And so >you do a bit of education before you quote a fee. At the end of the >discussion the client states that he/she fully understands what you have >explained but has reached this decision: "Instead of the 6 hours that you >quoted I want you to do the best that you can in 2 hours with your fee being >reduced accordingly. I understand what you have explained to me and I accept >the fact that I will be receiving less than what you recommend - but as the >client that's my decision to make". > >Now remember that the office copy machine needs repair and you could use >those few extra $$$'s to buy that new piece of equipment you want - all to >the tune of about what you would make doing this 'mini-sweep'; the location >is only 15 minutes from your office; you are satisfied that the client is >making an 'informed decision'; and you have absolutely nothing work-wise >going on the next day. What would YOU do??? I would politely explain to the client that he is wasting my time, and would tell him to call me when he is finished playing games and wants to deal with reality. While you may think this is shocking the potential client will actually be more impressed that you stuck with your guns. Sure you may not get THIS projects, but you will probably get future projects from him. I would tell him that it will take a minimum or 4 hours for any TSCM project, and that I can do the job in a minimum of hours or not at all. Two hours would give me just enough time to unload the truck, set up for the first test, and then reload it with no time to actually turn the equipment on. It is a case of the client just being too cheap, and trying to manipulate how you apply your skills. At no time has he indicated that your time on target is restricted, or that there is some legitimate reason why you can get such limited time. It is a very slippery slope when you bow in to the pressures and influence of HOW you perform your job. >Scenario #2 ...... You are contacted by a PI firm regarding handling a >referral job. After a discussion regarding your services, fees and >recommendations they want you to do: " a check of a hotel meeting room for >transmitters and a quick look-around with a flashlight - bring just your sp >ectrum analyzer, your CPM-700, your Opto Xplorer, or what ever you told us >you have that you want to use, and your flashlight - we want this done very >low-keyed. And you will only have about an hour alone in the room". After >explaining your feelings regarding doing 'proper' sweeps the PI that you are >talking to states emphatically that it is he who has been retained to look >after the best interests of the client; no, you may not speak with the >client; he is making his request based upon an investigation that he is >conducting for the client; and yes, it is his neck on the line and not yours >as the client will not know who you are. However, at the end of this >discussion you are not really sure whether or not the PI fully understands >what you had attempted to explain to him regarding TSCM and you have this >lingering feeling that he is to a high degree basing his request on what he >is willing to pay out of his billable fee for your services. But still, he >is offering a decent buck for the work that you will actually have to do. Simple... he pays for a minimum of four hours at the full base rate, but get only one on hour on target. If he is unwilling to pay for the four hours then you politely refuse to help him. If there is a legitimate reason why you can only get limited access to the area then you work with what you have, in the amount of time you have. I would however, encourage the PI to allow full access to the hotel room 4 hours in advance, encourage In-Place monitoring during the actual meeting, and would encourage him to obtain control of all nearby rooms for the duration of the meeting. The second situation is similar to the first, but you are more likely for the PI to relent and let you have the room for at least four full hours or more. If you only have an hour on target, then you only have an hour on target. But by adopting the "I don't leave my house for anything less then 4 billable hours" you will find the client will let you do your job in a professional manner, and on your terms. It's a bit like me telling my dentist how to perform a root canal, and requiring it to be finished in 120 seconds. >Same conditions exist for this one as for the scenario above. What do YOU >do???? It's not the same conditions, but close. If there is a legitimate reason that is one thing, but if it is a case of the client simply being to cheap then you should walk away. >Respond or not; do it on or off list; included your name or be anonymous - >your choice. I'm not trying to embarrass anyone or to pry. I have my own >reasons for posing these questions. But I truly believe that the diverse >answers - and accompanying debate - that hopefully will be generated can >benefit us all. > > >Bob Motzer >1RCM@M... -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2302 From: factfind Date: Sun Jan 14, 2001 11:34am Subject: Re: What would YOU do? It strikes me that this question requires an answer which may seem simplistic but I believe it reflects the approach taken by most people on this list. The practice of ethical business whether by TCSM practioners or PI's or Lawyers (no jokes now) should not be a matter of "situational ethics" You have invested time and money in your experience and training. No one knows better the value of your services than you. Price services and products accordingly. Do the right thing, both for yourself and our profession. Be fair, but then you knew that. Fraternally Dave ----- Original Message ----- From: "1RCM" <1RCM@M...> To: "TSCM List - Post" Sent: Sunday, January 14, 2001 10:33 AM Subject: [TSCM-L] What would YOU do? > Hi List, > > Let's see if we can't spawn some creative debate here. Many on this list > have run across these type instances which fall right in that blurry area > somewhere between standing on true ethics and paying the bills. What do YOU > do?? Ah yes, before you consider both scenarios think back to all of the > debate that has taken place on this list over the past year relating to > professionals vs. charlatans; just what constitutes performing a proper > sweep; enlightening a potential client; fees vs. services performed; etc., > etc. Then respond honestly! > > Scenario #1 ..... You are contacted by a potential client who feels that > he/she has reason to have a sweep done. During the discussion that follows > you are convinced that a sweep is legitimately needed, but also that the > potential client does not have the foggiest idea of what is involved. And so > you do a bit of education before you quote a fee. At the end of the > discussion the client states that he/she fully understands what you have > explained but has reached this decision: "Instead of the 6 hours that you > quoted I want you to do the best that you can in 2 hours with your fee being > reduced accordingly. I understand what you have explained to me and I accept > the fact that I will be receiving less than what you recommend - but as the > client that's my decision to make". > > Now remember that the office copy machine needs repair and you could use > those few extra $$$'s to buy that new piece of equipment you want - all to > the tune of about what you would make doing this 'mini-sweep'; the location > is only 15 minutes from your office; you are satisfied that the client is > making an 'informed decision'; and you have absolutely nothing work-wise > going on the next day. What would YOU do??? > > Scenario #2 ...... You are contacted by a PI firm regarding handling a > referral job. After a discussion regarding your services, fees and > recommendations they want you to do: " a check of a hotel meeting room for > transmitters and a quick look-around with a flashlight - bring just your sp > ectrum analyzer, your CPM-700, your Opto Xplorer, or what ever you told us > you have that you want to use, and your flashlight - we want this done very > low-keyed. And you will only have about an hour alone in the room". After > explaining your feelings regarding doing 'proper' sweeps the PI that you are > talking to states emphatically that it is he who has been retained to look > after the best interests of the client; no, you may not speak with the > client; he is making his request based upon an investigation that he is > conducting for the client; and yes, it is his neck on the line and not yours > as the client will not know who you are. However, at the end of this > discussion you are not really sure whether or not the PI fully understands > what you had attempted to explain to him regarding TSCM and you have this > lingering feeling that he is to a high degree basing his request on what he > is willing to pay out of his billable fee for your services. But still, he > is offering a decent buck for the work that you will actually have to do. > > Same conditions exist for this one as for the scenario above. What do YOU > do???? > > Respond or not; do it on or off list; included your name or be anonymous - > your choice. I'm not trying to embarrass anyone or to pry. I have my own > reasons for posing these questions. But I truly believe that the diverse > answers - and accompanying debate - that hopefully will be generated can > benefit us all. > > > Bob Motzer > 1RCM@M... > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2303 From: James M. Atkinson, Comm-Eng Date: Sun Jan 14, 2001 2:17pm Subject: Re: pgp encryption [snip] > > Without the private key I keep on my hard drive (which itself is >> password protected), even an acre of cray computers at Fort Meade >> couldn't crack my code. That's how powerful this technology is. > >Acre of Cray computers? Maybe less then 100 square feet of would crack >your message, But if we have your computer whole, intact, and not >blown in a million pieces from a chunk of RDX next to your harddrive, >Then maybe a couple of Pentium class workstations because it all falls >down to the quality of your passphrase, which for the most part are >less than 8-10 characters long and usually in plaintext with no >special cH@RaC73r$ to slow down the process of cracking the >passphrase. You really do not need a computer any larger then one of the cube "dorm" refrigerators about two foot cubical, but it depends on the size of the key that the target is using (the longer and more complex the key, the more horsepower you need). Also, if the investigator or espionage practitioner has any kind of physical access to the original computer the task or other "comprising fragments" the decrypt becomes several orders of magnitude simpler. [snip] >I have one client that is so paranoid about PGP that he changes his >PGP keys as often as he changes his underwear (1-2 times a day) and >generates keys on a HP200LX. [snip] If your client is serious about security he will not use PGP, any other other method of public key encryption, or any encryption methodology generally available to the public. >I tell people that PGP is secure enough for 95% of the world's prying >eyes, That the other 5% is the world's various governments, >intelligence agencies, and larger corporations that have the way and >the means to find out what that encrypted message says in plaintext. PGP is only appropriate when you want to protect the materials from someone who is an amateur, and is not at all appropriate for protecting materials where a professional spy may have an interest in obtaining. [snip] >Its a good rule of thumb not to trust any encryption program that >wasn't written by someone that hasn't done years of cryptoanalysis, >and Phil Zimmermann isn't one of those guys I really trust his >software with my life, Zimmermann was an anti-war/nuclear protester. [snip] Good point, but using strong encryption algorithms is only part of the security equation, and any weakness in ANY SEGMENT can render all other segments completely worthless. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2304 From: Steve Uhrig Date: Sun Jan 14, 2001 3:42pm Subject: Re: What would YOU do? Once upon a midnight dreary, 1RCM pondered, weak and weary: > Scenario #1 ..... You are contacted by a potential client who > feels that he/she has reason to have a sweep done. During the > discussion that follows you are convinced that a sweep is > legitimately needed, but also that the potential client does not > have the foggiest idea of what is involved. This is fairly common. > And so you do a bit of education before you quote a fee. At > the end of the discussion the client states that he/she fully > understands what you have explained but has reached this > decision: "Instead of the 6 hours that you quoted I want you > to do the best that you can in 2 hours with your fee being > reduced accordingly. My answer: "I quoted the time I expect it will take to do the job properly, and my fee to do it. If you cannot agree to both, I am sorry, I cannot help you." > but as the client that's my decision to make". And if you miss something which later comes back to bite you in the ass, can you hide behind this? The client will deny ever saying it. Sometimes you have to protect these people from themselves. > Now remember that the office copy machine needs repair and you > could use those few extra $$$'s to buy that new piece of > equipment you want - all to the tune of about what you would make > doing this 'mini-sweep'; the location is only 15 minutes from > your office; you are satisfied that the client is making an > 'informed decision'; and you have absolutely nothing work-wise > going on the next day. What would YOU do??? The client IS NOT making an informed decision. The client is making a decision based on fiscal considerations. As far as trying to make excuses for taking his or her money anyway, when you know you will not be doing the job properly, that makes you a whore and no different from the rest of the TSCM scum pretenders. Your financial situation should not make any difference in your ethics. If you have any. > Scenario #2 --- And you will only have about an hour alone in the > room". After explaining your feelings regarding doing 'proper' > sweeps the PI that you are talking to states emphatically that it > is he who has been retained to look after the best interests of > the client; no, you may not speak with the client; he is making > his request based upon an investigation that he is conducting for > the client; and yes, it is his neck on the line and not yours as > the client will not know who you are. Same answer as #1. I have quoted the time and cost it will take to do the job properly. I only accept work where I am able to do my job properly. If this is unacceptable, find yourself another sweeper. Then give them CCS' phone number. If I cannot speak with the client, I will not accept the assignment. Someone has something to hide. The PI will not have enough info for me to even know what I am facing technically. I have to talk to the client directly. That is one of my litmus tests. If that is a problem, find another sweeper. When I do talk to the client, I am perfectly willing to do so under the PI agencies' name. I do not have an identity problem like a lot of those guys do. I am not another PI and will not steal their client. If they can't trust me to speak to the client, they shouldn't be hiring me. Whose neck will be on the line if you miss something? I guarantee the PI will be the Teflon Don, and it will be you making excuses and trying to justify why you accepted a job you admitted you could not do properly. It is YOUR job to look out for the ultimate client's best interests. You need a certain amount of info to be able to do that. If something can go wrong, and things do, you can be sure you will be living in the valley and you'd better have your bases covered. All these PIs and clients can come and go. You have to live with yourself and whatever reputation you develop. You want to develop the reputation for being absolutely ethical and not willing to compromise your ethics, your fee or your (ultimate) client's best interests. Both scenarios you described would cause me to invite the PI or whomever to lose my phone number, if they are unwilling to let me do my job the way I know it needs to be done. I think you know this, and it does make for interesting discussion. First rule of sweeping is money up front. Second rule is always CYA (Cover Your Ass). You will be surprised how few friends and how many adversaries you will have if something goes wrong. Don't expect anyone else, like PI middlemen, to take a bullet for you. If I feel uncomfortable, even hold harmless agreements will not change that feeling. Just don't let situations develop where you have to compromise your ethics or your fees, or your the end user's best interests. And if you feel uncomfortable about a situation, trust your instincts and pass it by. Not worth it. Street smarts have kept a lot of us alive. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2305 From: Nick Robson Date: Sun Jan 14, 2001 4:08pm Subject: Re: What would you do. Here is another scenario for discussion. This happened to me. A very large multinational accounting firm asked me to write them a report stating that they were clean. They wanted no sweep done and were willing to pay reasonably for the report. -- ************************* The Security Centre Ltd ************************** *************Grand Cayman, Cayman Islands, British West Indies************** 2306 From: James M. Atkinson, Comm-Eng Date: Sun Jan 14, 2001 4:26pm Subject: Re: What would you do. At 5:08 PM -0500 1/14/01, Nick Robson wrote: >Here is another scenario for discussion. This happened to me. > >A very large multinational accounting firm asked me to write them a report >stating that they were clean. They wanted no sweep done and were willing to >pay reasonably for the report. Explain to the person at the large multinational accounting firm that you are not a whore, and that they should spend their money elsewhere. Additionally, you should document the incident, and write a "memo for record" that you have signed and notarized in case the guy tries anything cute in the future. If you have had previous contact with the company you may find it prudent to inform senior management and their legal department in writing of the incident. Such a request is obviously fraudulent, and as such is strictly taboo. Of course the person who made the request may simply be trying to test your ethics, or perhaps not... but watch it either way. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2307 From: Miguel Puchol Date: Sun Jan 14, 2001 5:12pm Subject: RV: What would YOU do? Bob & list, I will try to give an inbetween point here, although I agree more with what James has expressed in his message - if you know what you're doing is a waste of your time and your client's money, then better not take the job. Picture scenario #1, and after a couple of days, the costumer calls you to say that he has been bugged with a high grade bug that you didn't (and quite possibly couldn't given the time allowed) detect, and this has caused an important leak of information, etc. etc. Then, your costumer will start to tell anyone within hearing distance what a con you are, and so on, and news travel fast. Result: your reputation and good name tarnished. The inbetween point I wanted to make is: why not offer different 'grades' of sweep, depending on the level of the threat? If your costumer is willing to discuss the type of information he's protecting, you can estimate - approximately - the level of risk and likelyhood of advanced bugging techniques being used, and plan a sweep accordingly. Then, get your costumer to sign a document to the tune of 'I have been informed that, given the risk level assesed, a sweep lasting X hours using Z equipment is needed to minimize to a good extent the risk of interception of confidential information. I hereby state that I assume the risk of a sweep being performed which does not meet the required level, and understand the implications' etc. etc. (A lawyer may come in handy here) This is just an idea, it may not fall well with purists, and each one of us should set his own standards regarding this point. James states a minimum of 4 hours, and I understand that it's a very light sweep. In some countries, one hour or two may be enough, as eavesdropping is not so technologically advanced - given the same level of 'risk'. Well, that's my oppinion, and like everyone else, I have a nose too :-)) All the best, Mike > -----Mensaje original----- > De: 1RCM [mailto:1RCM@M...] > Enviado el: domingo, 14 de enero de 2001 16:34 > Para: TSCM List - Post > Asunto: [TSCM-L] What would YOU do? > > > Hi List, > > Let's see if we can't spawn some creative debate here. Many on this list > have run across these type instances which fall right in that blurry area > somewhere between standing on true ethics and paying the bills. > What do YOU > do?? Ah yes, before you consider both scenarios think back to all of the > debate that has taken place on this list over the past year relating to > professionals vs. charlatans; just what constitutes performing a proper > sweep; enlightening a potential client; fees vs. services performed; etc., > etc. Then respond honestly! 2308 From: Rick Hofmann - MICROSEARCH Date: Sun Jan 14, 2001 5:41pm Subject: E.S.I. telephone instruments During an inspection yesterday one of two telephone instruments was passing room audio while on hook. This is an E.S.I. telephone system. The instruments are model EKT-A, and the KSU is a model number IVX (letters, not roman numerals). The instrument was left in place with the idea of passing false information. When the instruments are eventually replaced I will examine them both in an attempt to locate any modifications. I will pass on the information to this list. In the mean time, any information about E.S.I. telephones would be appreciated. Very truly yours, R.C.Hofmann, CCO, CPP MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 PI16998 2309 From: Steve Uhrig Date: Sun Jan 14, 2001 6:18pm Subject: Re: What would you do? Once upon a midnight dreary, Nick Robson pondered, weak and weary: > Here is another scenario for discussion. This happened to me. > A very large multinational accounting firm asked me to write > them a report stating that they were clean. They wanted no > sweep done and were willing to pay reasonably for the report. What is there to discuss? You are an honest man, and as such would have denied their request. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2310 From: Hoffman Date: Sun Jan 14, 2001 8:03pm Subject: Re: What would YOU do? > > Ah yes, before you consider both scenarios think back to all > > of the debate that has taken place on this list over the past > > year relating to professionals vs. charlatans; just what > > constitutes performing a proper sweep; enlightening a > > potential client; fees vs. services performed; etc., > > etc. Then respond honestly! > > blurry area somewhere between standing on true ethics > > and paying the bills. What do ------------------------------- A. Hoffman replies: I don't believe "ethics", in the sense that I use the word, has much bearing on the matter. It's a pure business decision. (1) Is it economically profitable to perform the service for the client for such a trivial fee which borders on break-even? (2) Will it negatively impact your reputation? (3) How will it hurt your reputation; does this client have connections in the corporate community from whence you derive your work? (4) Is there a realistic liability which you may incur if it is found at a later time that the technician did not locate a threat? (5) Last on my list is my personal ethics regarding the matter. There's something to be said for having pride in ones work and being noble by trying to be the absolute best at what you do....but more often than not....such beliefs are purely a figment of ones own imagination; and it leads to extremely big ego complexes when people become overly self-righteous about their abilities and their so-called "reputation". I say, just bury the client in a half inch of paperwork; which if your a thorough businessman; thats probably what you should be doing already. You should have dozens of checklists; forms; summaries; client reports which fully detail every aspect of the sweep or other security services your may perform. Included on the forms should be the equipment you used, serial numbers, when your units were calibrated; what range of frequencies were swept; what telephones were analyzed, if any. In addition, there should be a half dozen standard forms which the client should be signing which fully explains that in no way is the customer entitled to "getting results" (as private investigators are always fond of saying "their being payed for their time, not based on undetermined outcomes or results..") Nothing wrong with pride in ones work; but the question is.... Who's interest are you REALLY serving best?... The clients, or your own ego? If a customer wants or NEEDS work done.... even if they want a half-assed job.. "IF" it pay's; and if you need the money; then why not do it? If you refuse to do the job; then your not really serving your customers needs. Yes, you might know better than them... and you might not be serving their "best interest", but in some cases, something is better than nothing; even a half-assed job. I speak in this matter as a businessman; a white collar worker; and a blue collar worker who has been involved in a half dozen unique fields of service work. Like the Rolling Stones song, "You can't always get what you want." Many times I have had to "swallow my pride", and do jobs for customers which I did not feel felt met my personal criteria.... I didn't particularly like what the customer suggest to me... but in the end; I realized I was there not exclusively to feed my own ego, but to serve the customers needs... and if they want it. Give it to them. It's money in your pocket. 2311 From: Steve Uhrig Date: Sun Jan 14, 2001 9:06pm Subject: Re: What would YOU do? Once upon a midnight dreary, Hoffman pondered, weak and weary: > I don't believe "ethics", in the sense that I use the word, > has much bearing on the matter. It's a pure business > decision. There unfortunately are a number of "TSCM practitioners" who feel the same way. > There's something to be said for having pride in ones work and > being noble by trying to be the absolute best at what you > do....but more often than not....such beliefs are purely a > figment of ones own imagination; They may be figments of *your* imagination. Having pride in one's work and trying to be the absolute best at what you do is a sign of a quality practitioner. Some of us strive for that constantly. What do you propose -- strive to be mediocre? > If a customer wants or NEEDS work done.... even if they want > a half-assed job.. "IF" it pay's; and if you need the money; > then why not do it? > if they want it. Give it to them. It's money in your pocket. Why is this not the definition of a whore? What does YOUR need for money have to do with whether you do an honest job or not? Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: J. Oquendo Date: Tue Jan 11, 2005 2:24pm Subject: RE: IR Risk I ran into this scenario a while back and offered it to a compsecurity list I am on. Here is the original message: /// http://securityfocus.com/archive/82/383110/2004-11-26/2004-12-02/1 Figured I would send this to the vuln-dev list after rambling on about it on a firewalls list, so apologies to those who see this as a cross-post dupe. [RECENTLY] I ran across what I believe is an irftp based worm. While cleaning two laptops one day (one connected to a secure VLAN the other not connected), I noticed the connected machine flash its irftp sensor and task manager showed it was running. Few seconds later the connected machine stopped beeping, the disconnected one started, and it too showed irftp sessions. After checking around the premises for infrared *anything*, I dug up all I could from both machines. The disconneted machine had already been cleaned, and the connected one was infected with all sorts of SDBOT worms, Spyware, *crapware*foo*. Something to think about if you're sitting in the park one day disconneted from any network and someone's infected machine sends you via IRFTP some crap. irftp C:\evil_at_script \\victim\C:\WINDOWS\run_me Where some at script would run something like: net user luzer something /ADD /FULLNAME:"Admin Account" /COMMENT:"Admin" /h I'm almost positive something like this is what happened. I believe its possible to have that machine run whatever you would want it to, and since IRFTP has no authentication (that I know of) what is needed to perform such nonsense. A machine name, share name, not that big of a deal. =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo GPG Key ID 0x51F9D78D Fingerprint 2A48 BA18 1851 4C99 CA22 0619 DB63 F2F7 51F9 D78D http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D sil @ politrix . org http://www.politrix.org sil @ infiltrated . net http://www.infiltrated.net "How a man plays the game shows something of his character - how he loses shows all" - Mr. Luckey 10558 From: James M. Atkinson Date: Tue Jan 11, 2005 5:54pm Subject: Moran: 'It's a dirty business' http://www.cnn.com/2005/US/01/11/spy.life/index.html Moran: 'It's a dirty business' (CNN) -- Lindsay Moran read "Harriet the Spy" as a girl and dreamed of growing up to join the CIA. After graduating from Harvard, she did just that. In her new book, "Blowing My Cover: My Life as a CIA Spy," Moran shows readers the real world of espionage is quite different from the Hollywood version. CNN national security correspondent David Ensor spoke with Moran about her career as a spy. ENSOR: What made you decide to apply to the CIA? MORAN: It had been a lifelong dream of mine. I grew up reading this series of books called "Harriet the Spy," and I just thought they were the neatest things and Harriet was the neatest little girl, and she had a spy kit and would spy on everybody. And I sort of modeled my early life after Harriet the Spy, and my fascination with espionage never really went away as I was a teenager and went to college -- it kind of always remained there in the back of my head. ENSOR: Tell us a little about the training. MORAN: We jumped out of planes and drove cars real fast. ... A lot of it essentially was training people to have social skills. We went down and lived at the CIA's facility, "the Farm" for several months, and we lived on this alternative reality with a fake country, a number of fake countries and fake heads of state, and we were expected to sort of embrace this alternative reality and live and breathe it as if it was true. ENSOR: Was the training useful for what you subsequently did as an officer? MORAN: Some aspects of the training were useful, and some aspects of the training that probably weren't useful to me were useful to other people. A lot of the training about detecting surveillance, being able to tell if you're being followed. ... And while it's not difficult, it does take a lot of practice to sort of become uber-aware of everything going on around you, and being able to take notes while you're driving, at the same time looking around. And also at the same time trying to appear natural, so that if you are being followed the person following you doesn't perceive that you know you're being followed. ENSOR: Hollywood presents the career you had as an enormously glamorous and dangerous profession. Is it? MORAN: It's not nearly as glamorous as it's portrayed in Hollywood -- the career of being a spy -- and that was kind of eye opening to realize. You know, certainly I didn't expect it to be James Bond to a T, but at the end of the day the CIA is a lot of people in sensible shoes sitting in cubicles, and that's kind of a reality that's probably a shock to a lot of people like me who come into the agency expecting something more glamorous. ... I've heard my book compared to the real-life "Alias" and I tend to think of it as the "anti-Alias." ENSOR: What's dirty about the business? MORAN: It's a dirty business because you're lying to people and you're using them, and that's what your job is. That's the reality of being a spy. You're not befriending people because you like them, or because you want to be friends with them, you think that they have some information that will be of value to the U.S. government. ENSOR: Do you think it's an organization that is broken? MORAN: I guess I do. I don't have the answers as to how the agency can adequately infiltrate terrorist networks or combat terrorism. I think that's an incredibly difficult question, but they certainly seem to be dragging their feet on addressing what is the most pressing issue for them as an organization and for us as a country, which is how do we get into these, how do we get information, how do we gather human intelligence on these terrorist networks. I feel that the agency has been incredibly slow to respond or change either its management style or its training or even the type of people that it recruits in order to combat that threat. ENSOR: Do you think Porter Goss might change it in a good way? MORAN: No. I would have been the first one to advocate changes at the agency on the heels of George Tenet's resignation. It doesn't seem to me -- and now I'm speaking obviously from an outsider's perspective -- that Porter Goss is taking the agency in a good direction. And from what I understand, he's sort of hunkering down, blaming a lot of leaks from within the agency to the press on problems the agency is having. I think what's going to occur is it will again become an organization that rather than trying to excise its warts will try to cover them up. ENSOR: What kind of an impact did having a secret career like this have on your personal life? MORAN: It's hard to lie to pretty much everybody who's important to you. My immediate family knew that I worked at the CIA but that was all they knew. They certainly had no idea what I was actually doing and probably would have been horrified if they did. So I ended up cutting off a lot of relationships with both friends and, to a certain extent, family members too as I became an increasingly insular person. ENSOR: Do you believe in espionage? MORAN: I still believe in the organization, I believe that it's necessary. Every country is going to have a spy service and ours should be the best. You know we're the last remaining superpower, we should have one of the best spy services there is and we don't. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10559 From: G P Date: Tue Jan 11, 2005 6:49pm Subject: Re: Ruling gives cops leeway with GPS Absolute insanity. > http://timesunion.com/AspStories/story.asp?storyID=322152 > > Ruling gives cops leeway with GPS > Decision allows use of vehicle tracking device > without a warrant > > By BRENDAN LYONS, Staff writer 10560 From: Greg Horton Date: Tue Jan 11, 2005 9:26pm Subject: Re: Ruling gives cops leeway with GPS G P wrote: > Absolute insanity. > I am not so sure about that. In California, you don't need a warrant to put a tracker on unless you hardwire it to the vehicle. So instead of fielding a six man surveillance team for thousands of dollars and maybe a helo or plane, you do the same thing for pennies. You are going to follow the suspect anyway, why not do it in a way that saves the taxpayer a heap o' money? Greg 10561 From: Agent Geiger Date: Wed Jan 12, 2005 0:40am Subject: Re: Ruling gives cops leeway with GPS Yeah, that freedom thing is so expensive these days. --- "James M. Atkinson" wrote: > > > http://timesunion.com/AspStories/story.asp?storyID=322152 > > Ruling gives cops leeway with GPS > Decision allows use of vehicle tracking device > without a warrant > > By BRENDAN LYONS, Staff writer > First published: Tuesday, January 11, 2005 > > In a decision that could dramatically affect > criminal investigations > nationwide, a federal judge has ruled police didn't > need a warrant when > they attached a satellite tracking device to the > underbelly of a car being > driven by a suspected Hells Angels operative. > > The ruling by U.S. District Judge David N. Hurd > clears the way for a > federal trial scheduled to begin next month in Utica > in which seven alleged > Hells Angels members and associates, including > several from the Capital > Region, face drug-trafficking charges. > > The use of satellite tracking devices has stirred > controversy and Hurd's > ruling differs from a decision last spring by a > Nassau County Court judge, > who decided police needed a warrant when they used > the technology to follow > a burglary suspect. > > The biker case broke open here last year with a > series of raids and arrests > across upstate New York. The case began in Utica, > but was expanded to > include an organized crime task force that spent > more than a year building > a methamphetamine-trafficking case against a group > of alleged outlaw bikers > from Troy to Arizona. > > During surveillance of the group, detectives > attached a global positioning > satellite device to a vehicle driven by Robert P. > Moran Jr., an Oneida > County attorney and Hells Angels associate with a > law office in Rome. They > put the device on Moran's car for two days in July > 2003 after he returned > from a one-day trip to Arizona, where police say he > purchased a large > quantity of methamphetamine. > > Over those two days, Moran drove across New York > state and allegedly made > drug deals with suspected Hells Angels members in > places such as New York > City and Troy, according to court records. > > Hurd opined that authorities wouldn't need a warrant > had they decided to > follow Moran, so using a GPS device was merely a > simpler way to track his > car "as it traveled on the public highways," he > wrote. "Moran had no > expectation of privacy in the whereabouts of his > vehicle on a public > roadway. Thus, there was no search or seizure and no > Fourth Amendment > implications in the use of the GPS device." > > Hurd's ruling follows a line of reasoning that's > widely supported by many > law enforcement agencies. Police contend using > tracking devices is no > different than if they followed a suspect's vehicle > in their own cars or by > using helicopters. > > Kevin Mulroy, Moran's attorney, said the issue, > which has brought > conflicting rulings across the nation, is > unsettling. > > "I think it's something the Supreme Court of the > United States is going to > have to hear," said Mulroy, a Syracuse attorney who > was formerly an > Onondaga County Court judge and assistant > prosecutor. "One would think that > before the police could install devices on your > property, to monitor your > movements, they would need a court order." > > A similar controversy arose in Washington two years > ago, when that state's > Supreme Court determined police had the right to > attach a satellite > tracking device to a murder suspect's car, but only > after obtaining a warrant. > > Detectives attached a GPS device to the man's car > for almost three weeks. > When they downloaded the data, it indicated he had > driven to an isolated > area north of Spokane. Police searched the area and > found the body of the > man's 9-year-old daughter. He later was convicted of > her murder, and the > verdict was upheld. > > GPS devices are increasingly becoming a tool for law > enforcement. Still, > their use has been controversial because police > agencies are not routinely > obtaining court orders to install the devices, which > rely on orbiting > satellites and cellular phone networks to pinpoint > their target. In many > states, law enforcement agencies also are using them > for less surreptitious > missions, such as tracking sex offenders and > parolees who are enrolled in > electronic monitoring programs. > > It's not clear what effect Hurd's decision will have > on their use, but it's > apparently the first federal ruling regarding GPS > devices and the need for > search warrants. > > Assistant U.S. Attorney David Grable, who is > prosecuting Moran and the > others, did not return a telephone call for comment. > > The use of GPS devices by police most recently made > national news in the > Laci Peterson case. Scott Peterson, the Modesto, > Calif., woman's husband, > was convicted of murdering her on Christmas Eve > 2002. In that case, police > obtained a court order to attach tracking devices to > three vehicles driven > by Peterson, who drove to a waterfront near where > the bodies of his wife > and the baby boy she was carrying were later found. > > While the GPS data was admitted in the Peterson > case, courts across the > country are tackling the issue as defense lawyers > challenge their > reliability and whether police have a right to > install them without a > warrant. Similar technology helps police track > cellular telephones, which > also are being used by police to find fugitives and > others. > > > > > > > ---------------------------------------------------------------------------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and > Real Wiretappers. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson > Phone: (978) 381-9111 > Granite Island Group Fax: > > 127 Eastern Avenue #291 > Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent > Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > > > __________________________________ Do you Yahoo!? The all-new My Yahoo! - What will yours do? http://my.yahoo.com 10562 From: G P Date: Wed Jan 12, 2005 6:16am Subject: Re: Ruling gives cops leeway with GPS Because anybody and everybody can now fix up your car with a GPS unit, without fear of civil or criminal prosecution. This court precedent puts very dangerous technology into the hands of the proletariat, without any form of checks and balances. Wait until somebody wires up your wife's car for sound, and you'll have a slightly different opinion about tracking technology. --- Greg Horton wrote: > > > G P wrote: > > > Absolute insanity. > > > I am not so sure about that. In California, you > don't need a warrant to > put a tracker on unless you hardwire it to the > vehicle. So instead of > fielding a six man surveillance team for thousands > of dollars and maybe > a helo or plane, you do the same thing for pennies. > You are going to > follow the suspect anyway, why not do it in a way > that saves the > taxpayer a heap o' money? > > Greg > > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > What would our lives be like without music, dance, > and theater? > Donate or volunteer in the arts today at Network for > Good! > http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10563 From: G P Date: Wed Jan 12, 2005 6:18am Subject: New Homeland Security Nomination http://seattletimes.nwsource.com/html/nationworld/2002148439_homeland12.html "Chertoff headed the Justice Department's criminal division at the time of the attacks, and helped develop the USA Patriot Act, which greatly expanded the government's surveillance and detention powers. His role in crafting that law, a measure that has become a flash point for civil libertarians, is expected to bring sharp questioning in Senate confirmation hearings. The American Civil Liberties Union said yesterday that as an architect of the act, Chertoff seemed to view the Bill of Rights 'as an obstacle to national security rather than a guidebook for how to do security properly.'" 10564 From: fjansgmxnet Date: Wed Jan 12, 2005 5:00am Subject: Re: Ruling gives cops leeway with GPS --- In TSCM-L@yahoogroups.com, Greg Horton wrote: > > G P wrote: > You are going to > follow the suspect anyway, why not do it in a way that saves the > taxpayer a heap o' money? That's the point. If it costs a heap of money, they will follow only the real suspects of mayor crime offences. If it costs pennies, they will track or follow inconvenient citizens. If they want to follow the real suspects of mayor crime offences, they will get a warrant everywhere. This is only a problem, if they haven't any substantial leads. But why should they follow then, because of their preconceptions? (I am sure that they will not public the events, if their preconceptions failed.) Regards, Frank 10565 From: littledog Date: Tue Jan 11, 2005 11:10pm Subject: Re: Ruling gives cops leeway with GPS What about when these registered confidential informers do all this tracking, bugging, eavesdropping, and knotholing for no other reason than personal ones, and have always done so?> -----Original Message----- > From: Greg Horton [mailto:sgtpelon@e...] > Sent: Tuesday, January 11, 2005, 8:13 PM > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] Ruling gives cops leeway with GPS > > > > G P wrote: > > > Absolute insanity. > > > I am not so sure about that. In California, you don't need a warrant to > put a tracker on unless you hardwire it to the vehicle. So instead of > fielding a six man surveillance team for thousands of dollars and maybe > a helo or plane, you do the same thing for pennies. You are going to > follow the suspect anyway, why not do it in a way that saves the > taxpayer a heap o' money? > > Greg > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10566 From: G P Date: Wed Jan 12, 2005 9:58am Subject: Quotable quote "The most powerful clique in these elitist groups have one objective in common - they want to bring about the surrender of the sovereignty and national independence of the United States. To achieve this new [international] federalism, the United States must submerge its national sovereignty to a new political order. In my view, [the CFR] represents a skillful, coordinated effort to seize control and consolidate the four centers of power - political, monetary, intellectual, and ecclesiastical." - Admiral Chester Ward, 16-year veteran of the Council on Foreign Relations 10567 From: Tech Sec Lab Date: Wed Jan 12, 2005 10:56am Subject: Boston Scientific denies espionage will hit Irish plant http://www.ocean-research.net/modules.php?name=News&file=print&sid=17 Who says nothing exciting happens in the west of Ireland! :D 10568 From: Date: Wed Jan 12, 2005 8:59am Subject: Re: Ruling gives cops leeway with GPS You still need a warrant to monitor the vehicle if it goes on private property; just don't need one (right now) to monitor while on public roads. Doesn't sound like a "freedom" issue to me! Sgt. Kirk Sewell Illinois State Police, Technical Investigations 500 Iles Park Place, Suite 300 Springfield, IL 62718 (217) 524-6079 office (217) 467-4211 pager (217) 836-0919 mobile 10569 From: Michael Hammer Date: Wed Jan 12, 2005 9:00am Subject: Re: Ruling gives cops leeway with GPS On Tue, 11 Jan 2005 19:26:56 -0800, Greg Horton wrote: > > > I am not so sure about that. In California, you don't need a warrant to > put a tracker on unless you hardwire it to the vehicle. So instead of > fielding a six man surveillance team for thousands of dollars and maybe > a helo or plane, you do the same thing for pennies. You are going to > follow the suspect anyway, why not do it in a way that saves the > taxpayer a heap o' money? > > Greg > By that logic, I should just be able to break into (and wipe out) an internet host that is being used to do bad things. We will get it shut down/confiscated anyways by going through the legal steps so why not just cut to the chase. As tempting as that may be, I understand the reasons we have limitations. Just because something can be done doesn't mean it should be done. Requiring a court order is a check/balance on the activities involved. Mike 10570 From: littledog Date: Wed Jan 12, 2005 10:32am Subject: Re: Re: Ruling gives cops leeway with GPS I agree with you completely Frank. I now know what I am, an inconvenient citizen..Littledog> -----Original Message----- > From: fjansgmxnet [mailto:fjans@g...] > Sent: Wednesday, January 12, 2005, 4:46 AM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Re: Ruling gives cops leeway with GPS > > > > > --- In TSCM-L@yahoogroups.com, Greg Horton wrote: > > > > G P wrote: > > You are going to > > follow the suspect anyway, why not do it in a way that saves the > > taxpayer a heap o' money? > > That's the point. If it costs a heap of money, they will follow only > the real suspects of mayor crime offences. If it costs pennies, they > will track or follow inconvenient citizens. > > If they want to follow the real suspects of mayor crime offences, > they will get a warrant everywhere. This is only a problem, if they > haven't any substantial leads. But why should they follow then, > because of their preconceptions? (I am sure that they will not public > the events, if their preconceptions failed.) > > Regards, > Frank > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10571 From: Craig Meldrum Date: Wed Jan 12, 2005 1:11pm Subject: Re: List Member Thanks Ois. As usual there is a flurry of media interest when some politician thinks they have been bugged and everyone jumps on the bandwagon for a day or two. I don't even know why they bothered to interview me, the article was almost a copy of one written 10 years ago after another such "scandal." Another minute to add to the accumulating 15 mins! Cheers Craig > Message: 2 > Date: Tue, 11 Jan 2005 17:36:21 -0000 > From: "Tech Sec Lab" > Subject: List Member > > Craig...YOUR FAMOUS!!! > > :D > > Congrats! > > -Ois 10572 From: Agent Geiger Date: Wed Jan 12, 2005 3:25pm Subject: Re: Ruling gives cops leeway with GPS Excuse me, but that is nonsense. OK, I will shut off the GPS while he cuts through that private drive. I just first have to run the coordinates through my GIS database then delete that info out before I use it in court. I am a commissior for my local government, and I see this trivial splitting of hairs thing done all the time. I wish LE and gov't officials would remember that little oath that we ALL took to uphold the Constitution from ALL enemies, foreign and DOMESTIC. I guess I need to keep a GPS jammer on me at all times, to block not only my cell phonem, but any potential LE from protecting me from myself. --- sewellr@i... wrote: > > > > > > You still need a warrant to monitor the vehicle if > it goes on private > property; just don't need one (right now) to monitor > while on public roads. > Doesn't sound like a "freedom" issue to me! > > Sgt. Kirk Sewell > Illinois State Police, Technical Investigations > 500 Iles Park Place, Suite 300 > Springfield, IL 62718 > (217) 524-6079 office > (217) 467-4211 pager > (217) 836-0919 mobile > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Find what you need with new enhanced search. http://info.mail.yahoo.com/mail_250 10573 From: G P Date: Wed Jan 12, 2005 6:11pm Subject: Re: Ruling gives cops leeway with GPS Bravo, it's hopeful to see that everyone hasn't gone completely mad just yet. --- Agent Geiger wrote: > > Excuse me, but that is nonsense. OK, I will shut > off > the GPS while he cuts through that private drive. I > just first have to run the coordinates through my > GIS database then delete that info out before I use > it in court. > > I am a commissior for my local government, and I see > this trivial splitting of hairs thing done all the > time. I wish LE and gov't officials would remember > that little oath that we ALL took to uphold the > Constitution from ALL enemies, foreign and DOMESTIC. > > I guess I need to keep a GPS jammer on me at all > times, to block not only my cell phonem, but any > potential LE from protecting me from myself. 10574 From: G P Date: Wed Jan 12, 2005 6:55pm Subject: speaking of GPS units Can the list members here that have experience with GPS trackers post some common installations that they've ran across? I would assume that unless using a unit with advanced correlation ability (such as reflected signals off of pavement etc), that the unit would have to be mounted with clear view of the sky and no obstructions. What are some common places for permanent installations, and where would you start looking first if you suspected a vehicle had a GPS tracking device installed? With this recent court ruling, would that also imply that cellular handsets planted in a vehicle would also be legal? With the Emergency 911 (E911) Act (no relation to Sept. 11, the bill was passed a year or so prior to the attacks), cellular telephones now must support geolocation capability up to a few meter resolution now. There would be no need for an elaborate GPS tracker if you could accomplish the same goal by wiring a cellphone into the vehicle (with the added benefit of a voice channel to listen in on conversations in the cockpit). Where would be the best place to mount one of them, and what would be the preferred technique for discovering one? Greg 10575 From: kondrak Date: Wed Jan 12, 2005 8:54pm Subject: Re: Ruling gives cops leeway with GPS Expect to see miscreant law-vultures, like divorce attys exploit this... At 07:16 1/12/2005, you wrote: >Because anybody and everybody can now fix up your car >with a GPS unit, without fear of civil or criminal >prosecution. This court precedent puts very dangerous >technology into the hands of the proletariat, without >any form of checks and balances. > >Wait until somebody wires up your wife's car for >sound, and you'll have a slightly different opinion >about tracking technology. > >--- Greg Horton wrote: > > > > > > > G P wrote: > > > > > Absolute insanity. > > > > > I am not so sure about that. In California, you > > don't need a warrant to > > put a tracker on unless you hardwire it to the > > vehicle. So instead of > > fielding a six man surveillance team for thousands > > of dollars and maybe > > a helo or plane, you do the same thing for pennies. > > You are going to > > follow the suspect anyway, why not do it in a way > > that saves the > > taxpayer a heap o' money? > > > > Greg > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > the hands acquire shaking, the shaking is a > > warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== > > TSKS > > Yahoo! Groups Links > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10576 From: Hawkspirit Date: Wed Jan 12, 2005 9:15pm Subject: Re: Digital Cell phone scanning Monitoring is quite complicated. You would have to monitor the forward set-up channel from the cell site that the mobile would receive and the reverse set up channel reply. After the base station and the mobile hand shake and authenticate then the forward control channel assigns downlink and uplink traffic channel frequencies. These will change every time the mobile is handed off to a new cell site. Roger Date: Tue, 11 Jan 2005 10:14:02 -0000 From: "fjansgmxnet" Subject: Re: Digital Cell phone scanning > So I ask you guys... > How easy it is to listen to cell phone conversation and what is the level of the threat? Can the estranged husband be listening to his wife? Or is the tech needed place it in the expert mode? Well, the tricks changed. In the digital world the estranged husband or the engaged investigator has to place a conventional bug in the cell phone of his wife. The best type of bugs I have seen are very small transmitters hidden in the accumlator pack of the cell phone, which could switched into a sleep mode to save power: Very fast to install and the victim feeds the bug with power in regular intervals whereever it goes. On Contras website (www.tetrascanner.com) there was a video from the German BSI showing this type of bug for a Motorola gsm phone. But I don't remember the exact link. The equipment to monitor digital cell phones at the air interfaces is expensive. Therefore I would expect it only at the "agency" level, if the folks don't know the current phone number you are using. Regards, Frank -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.6.10 - Release Date: 1/10/2005 [Non-text portions of this message have been removed] 10577 From: James M. Atkinson Date: Wed Jan 12, 2005 9:54pm Subject: Did you hear the one about the two guys arrested for telling lawyer jokes? http://www.cnn.com/2005/LAW/01/12/lawyer.jokes.arrest.ap/index.html Pair arrested for telling lawyer jokes Men at courthouse cited for disorderly conduct HEMPSTEAD, New York (AP) -- Did you hear the one about the two guys arrested for telling lawyer jokes? It happened this week to the founders of a group called Americans for Legal Reform, who were waiting in line to get into a Long Island courthouse. "How do you tell when a lawyer is lying?" Harvey Kash reportedly asked Carl Lanzisera. "His lips are moving," they said in unison. While some waiting to get into the courthouse giggled, a lawyer farther up the line Monday was not laughing. He told them to pipe down, and when they did not, the lawyer reported the pair to court personnel, who charged them with disorderly conduct, a misdemeanor. "They just can't take it," Kash said of lawyers in general. "This violates our First Amendment rights." Dan Bagnuola, a spokesman for the Nassau County courts, said the men were "being abusive and they were causing a disturbance." He said he did not have the name of the lawyer who complained. Americans for Legal Reform monitors the courts and uses confrontational tactics to push for greater access for the public. The pair said that for years they have stood outside courthouses on Long Island and mocked lawyers. On Monday, however, Kash said he was due in court to answer a drunken driving charge from a year and a half ago. The men are due back in court on the disorderly conduct charge next month. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10578 From: James M. Atkinson Date: Wed Jan 12, 2005 10:38pm Subject: Are the glory days of electronic spying over≠or just beginning? Listening In Are the glory days of electronic spying over≠or just beginning? By Stephen Cass Submarines prowl the ocean floor, while ships above carefully skirt the limits of international waters. On dry land, guards patrol high fences surrounding acres of huge golf ball-shaped radar domes. In the skies, airplanes knife through the stratosphere, while higher up orbiting electronic ears listen to whispers from the planet below. They're all trolling a vast sea of electromagnetic signals in hopes of catching a terrorist plot in the making, a shady arms deal, economic intelligence, or a rogue nation building a weapon of mass destruction. This so-called signals intelligence, or Sigint, has been vital to the United States and its allies for decades. But, in the wake of 9/11 and the failure to capture Osama bin Laden, the shortcomings of the world's biggest interception system are apparent. The ships, planes, antennas, and satellites are the result of a triumph of Cold War engineering, designed to keep tabs on the Soviet Union and its allies. The question now is: how useful is the system against terrorists who know not to trust their satellite phones? How effective can it be in an age when almost untappable fiber-optic lines carry information at stupefying rates and cheap, off-the-shelf encryption systems can stump the most powerful supercomputers on earth? Given the veil of secrecy drawn by nations around their intelligence operations, these questions might seem unanswerable, but even top-secret agencies have to operate in the real world, making it possible to draw some conclusions. Those findings paint an intriguing picture of modern Sigint, in which the best way past a tough problem can be to solve a different one. Rather than the creation of ever more sensitive receivers or code-breaking computers, the hot areas of cloak-and-dagger information gathering include tapping fiber-optic cables (even at the bottom of the sea); using tiny bugging devices and old fashioned bribery, blackmail, and burglary to get at data before it has been encrypted; exploiting software flaws and poorly configured communications systems to bypass data-security measures; and automatically winnowing the vast amounts of intercepted communications. Big brother or white elephant? The old workhorse surveillance system described above is run by the United States≠with the United Kingdom, Canada, Australia, and New Zealand as junior partners≠under the secret 1947 UKUSA agreement. Often referred to as Echelon in the popular press, some fear it as the ultimate Big Brother: listening in on every telephone conversation, reading every e-mail, tracking every Web surfer around the globe. But these fears are greatly exaggerated, explains Gerhard Schmid, vice president of the European Parliament and rapporteur of a 2001 report to the parliament on the UKUSA system. Schmid notes an obvious fact that many seem to forget: only those communications that the system has access to in some way can be intercepted. "There is no special magic physics for secret services....The rest is movie stories, rumors, and nonsense," says Schmid. In effect, whether or not the Sigint system is of value boils down to a technical question: in the face of a telecommunications explosion that has brought e-mail, cellphones, beepers, instant messaging, fiber-optic cables, faxes, videoconferencing, and the World Wide Web to every corner of the globe, can the UKUSA intelligence agencies attain enough access to know what's going on? Of course, some communications are easier to access than others. Wireless communications in particular offer two key advantages≠you can intercept them without physically tapping into the target's communications system, and there is no way to detect that they have been intercepted. "Microwave, radio, telephone, walkie-talkie≠communications that are in the air are all interceptible by some sort of antenna in the right place," says Jeffrey T. Richelson, author of The U.S. Intelligence Community (Westview Press, Boulder, Colo., 1999). Much of the UKUSA system's physical assets around the world and orbiting above it are devoted to making sure there is an antenna in the right place. Listening posts of varying scale dot the earth≠including on top of every U.S. embassy. Many are attached to military installations, while some are operated remotely. Others are mobile, on navy ships and submarines and on specially modified planes such as the EP-3 that crash-landed in China in 2001. For decades these eavesdroppers provided much of the intelligence community's Sigint. But, for tactical and technical reasons, the well began to dry up at the start of the 1990s. The biggest tactical problem was that the Soviet Union's collapse kicked the legs out from under a monitoring network built up over decades. "There were some easy things about the Soviet Union," says James Bamford, author of Body of Secrets: Anatomy of the Ultra-Secret National Security Agency (Doubleday, New York, 2001). "The first one was you always knew where it was. You could invest a lot of money in a big listening post in Japan near Vladivostok because the Soviet navy was always going to be there." Apart from being easily located on a map, the USSR also generated a steady stream of routine radio and microwave transmissions to provide grist for the intelligence wheel. "It's completely different when you're going after sporadic miniwars and terrorism," says Bamford. The technical issues arose from the Internet-driven telecommunications explosion, the most serious consequence of which is the ever increasing shift toward fiber-optic-based international communications. The shift was due to the commercially attractive fact that one fiber can carry 128 times as much digital traffic as a satellite transponder≠over 240 000 channels, each carrying 64 kb/s. Breaking into Davy Jones's locker Before the widespread use of fiber-optic cables, geosynchronous satellite constellations such as Intelsat and the Russian-sponsored Intersputnik carried much of the international communications traffic. Such links can be comprehensively monitored by placing a receiving station in each satellite's transmission footprint. And thanks to the global range of the territories belonging to the UKUSA countries, exactly such a collection of stations was built, from Pine Gap in central Australia to Morwenstow in England and Sugar Grove in Virginia [see map]. In contrast, cables have to be tapped directly. While this is easy enough to do if the cable makes landfall in a territory controlled by a UKUSA country, someone has to visit the cable clandestinely if it doesn't, typically in a submarine. Fiber-optic cables are the toughest to crack: fibers don't radiate helpful electromagnetic fields (as did the old metal cables) that can be detected with an inductively coupled pick-up collar. Eavesdroppers first solved this problem by targeting the signal-boosting repeater stations strung along the cables. Early repeaters had to convert the signal from light into electricity and back again in order to amplify it, and in its electronic stage, the signal could be tapped externally in much the same way as a metal cable. But the development of erbium-doped fiber amplifiers, in which the signal is boosted without ever being converted into electricity, called for a new approach. In theory, it's easy to find out what's being transmitted along a fiber. "All you have to do is put a little bit of a bend in the fiber and look at the light that comes off it," says Jim Hayes, president of the Fiber Optic Association, a professional society for the industry. The signal loss in the fiber would be just a few tenths of a decibel, making the tap undetectable. "But practically," he adds, "it's not so easy." The problem, Hayes explains, is that, in a typical cable, the fiber in question is one of a dozen hair-thin strands of glass, which are embedded inside a laser-welded, hermetically sealed, 3-mm-diameter stainless steel tube. This tube is in turn covered by a few centimeters of reinforcing steel wire and cables carrying 10 kV of dc power, all at a depth of a couple of thousand meters. "It's not impossible≠but it certainly pushes the definition of practical," Hayes notes. The easiest interception technique is to open up one of the repeaters to get at the fibers, but, Hayes cautions, "the whole issue of resealing it is quite difficult because you have to do it perfectly." Parts must either be sourced from the manufacturer or duplicated exactly. Despite these challenges, "the U.S. has been reconfiguring the submarine USS Jimmy Carter for [fiber-optic tapping]," says Richelson. The Jimmy Carter, one of a new Seawolf class, is being extensively modified for a range of covert missions by the introduction of a new hull section, which will facilitate the use of remotely operated vehicles, surveillance equipment, and the transport of Navy Seals, the U.S. Navy's special operations warfare specialists. The sub is also being fitted with an advanced communications mast, which will allow it both to eavesdrop on radio signals and transmit information back to base. The Jimmy Carter should be fully operational by mid-2005 [see illustration]. Bond, James Bond But a big remaining challenge, according to John Pike, a defense expert and founder of GlobalSecurity.org, are fiber-optic cables that stay on land. "I think that one of the things that [Navy Seals] spend a fair amount of time doing is [going] ashore...and walking to the nearest land line," says Pike. "They were doing that in Iraq a decade ago." Pike believes that this may also be how fiber-optic communications in North Korea and other countries are monitored: "It's cat and mouse, we try to see how many taps we can put on [chief of state Kim Jong II's] fiber-optic network, and the Dear Leader runs around and tries to catch them." Another, more aggressive approach to the land-line problem is to force an opponent onto the airwaves. "One of the things the United States has been doing since the middle of 2002 is systematically taking apart Iraq's land-line communications with air strikes, to force them to communicate via channels that are more readily compromised," says Pike. Indeed, this may be the reason why U.S. Secretary of State Colin Powell was able to present incriminating Iraqi telephone conversations to the United Nations last February. When a more subtle approach than aerial bombardment is called for, agencies like the U.S. National Security Agency (NSA) and the Central Intelligence Agency (CIA) can call upon organizations such as the Special Collection Service (SCS), a joint NSA-CIA covert group headquartered in Beltsville, Md. "What this group does is the more surreptitious black-bag operations," explains Wayne Madsen, who previously worked at the NSA and is now a senior fellow at the Electronic Privacy Information Center (Washington, D.C.). Black-bag operations can include breaking into embassies or facilities of communications providers and stealing information or installing bugs. -------------------------------------------------------------------------------- "It's been extremely difficult to break Russian ciphers" -------------------------------------------------------------------------------- By bugging a computer or communications system, information can be captured before it's sent through a fiber-optic cable, author Bamford observes. A tiny microphone dropped into a keyboard can pick up the sound made by the keys as they are struck and transmit the sounds to a nearby receiver. Different keys, according to Bamford, "sound different≠each has a specific signature." Those signatures can be used to reconstruct what was typed. The SCS also allows the Sigint community "to be proactive, to go after information rather than sit and wait," explains Bamford. Another important SCS mission is to recruit people who work for targeted governments, like cryptographic clerks or systems administrators, to ensure access to sensitive information, such as cipher keys. When successful, such activities also allow the NSA to avoid another steep hurdle: encryption. Say what? The NSA claims to be the world's largest single employer of mathematicians and has always projected an image of being a code-breaking outfit par excellence, in the mold of the legendary British Bletchley Park, which succeeded in breaking the German Enigma and other ciphers during World War II. But these days, there may be some misdirection in that image. The NSA has "covered up some quite spectacular successes at breaking into cipher systems...by pretending that they were simply better at mathematics and computer science, whereas what was usually happening was some form of sabotage, blackmail, theft, corruption, or whatever," says Ross Anderson, a reader in security engineering at the University of Cambridge and cryptographic systems expert. (When contacted by Spectrum for this article, a spokesperson for the NSA said that it does not comment on operational matters.) NSA's code-breaking efforts began to run into serious trouble relatively early in the Cold War. According to Bamford, immediately after World War II the NSA captured German code-breaking machines that allowed them to read advanced teleprinter ciphers that the Soviets were using at the time. But because of a suspected spy, the Russians found out and in 1948 changed all their ciphers overnight. The next day became known as Black Friday, reports Bamford. "From that date on, it's been extremely difficult to break Russian ciphers. Most of what the NSA got, they got from occasional busts." A bust is a mistake in the implementation or operation of a cipher system. "Sometimes they don't know they're making a mistake. A clerk is typing away and all of a sudden the crypto system disengages," explains Bamford. This can give a code-breaker enough of an opening to be able to go back and read the entire message. The solution was to go around the problem. To divine Soviet diplomatic plans, the UKUSA agencies might track a meeting between a third-world diplomat and the Kremlin. When the diplomat sent a coded report back to the home government, the spooks would go after this target's weaker encryption. "Big governments like the United States and Russia use home-brewed [cipher systems]. But they've learned through 50 years of experience to do that well," says Brian Gladman, a former deputy director of the NATO Shape Technical Center who has worked with Government Communications Headquarters (GCHQ), the British equivalent of the NSA. "Smaller countries don't have that experience, and [when they] build home-brewed ciphers, they don't do very well." Countries≠including Middle Eastern nations≠have also purchased commercial cryptographic machines, but may not have always operated them properly. (There are also rumors that the NSA obtained the default keys to some units prior to delivery.) In any case, the rise of ubiquitous computer communications has allowed the emergence of widely available strong cipher systems, such as public key cryptography, which rely on mathematical functions that would take the greatest supercomputer on earth millennia to break. Initially, this caused something of a panic in intelligence circles and sparked the so-called crypto wars of the 1990s, when the U.S. government arrested Phil Zimmerman, the creator of one popular public key program, Pretty Good Privacy, and attempted to impose stringent export controls on cryptographic software. But the underlying mathematics was already freely circulating. Non-U.S. companies threatened to take over the expanding market for online security products and the government eventually relented. But even with theoretically unbreakable encryption available to anyone with Internet access, all is not lost for the code-breakers; once again the solution is to go around the problem. Nowadays, "exploits against cipher systems involve failures in design and implementation rather than in the underlying cryptographic algorithms," as during World War II, explains Anderson. The same kind of flaws and foul-ups≠buggy software, poorly configured systems≠that allow computer worms to wreak havoc on the Internet, combined with SCS-style activities, give agencies like the NSA a continuing window of access to the activities of rogue nations and the businesses they deal with. Indeed, the adoption of new telecommunications technologies has not been all bad for the intelligence agencies. Actually, the widespread deployment of cellphones in countries with historically underdeveloped communications infrastructures has made surveillance easier, especially of nongovernment targets, like terrorists. "There's more and more cellphone coverage, even in places like Pakistan," says Madsen. Pike agrees: "Incomes rose faster than land lines could be put in....Since so much of the economic activity in these emerging economies was focused in a few primary cities, it was relatively easy to overlay a cellphone system." And it is exactly these cities that are likely to host an eavesdropping U.S. embassy or consulate. Cell- and satellite phones can also reveal a caller's location. In cooperative countries, such information may be extracted directly from the cellphone network, while in other regions the location may be determined if multiple listening stations (possibly including satellites) can pick up the phone's transmissions. It was by pinpointing the origin of a satellite phone call that the United States determined the coordinates for the 1998 cruise missile attack on one of Osama bin Laden's camps in Afghanistan. Drowning in data But these successes in keeping 21st century communications an open book have just compounded the biggest issue of all: volume. "It's hard to comprehend the enormous increase in communications in the last 15 years....You're talking two million pieces of communication an hour from one listening post," says Bamford. More and more of the NSA's vast computer resources are devoted to simply storing and cataloging the torrent of raw Sigint that pours into its Fort Meade, Md., headquarters. The agency's ultimate problem is that there are just too many people on earth to monitor everyone. The only solution is to throw away as much as possible of the information as soon as possible after it's been collected. "The electrical engineers and computer scientists at NSA spend a lot of their time developing [automatic] filter systems," says Bamford. Strategies like focusing on telephone calls from a particular installation, searching for specific words and phrases in e-mails, or using voice recognition techniques [see "Getting the Message"] are all deployed in the hope of picking up a terrorist giving orders rather than someone arguing with their significant other. While it is unlikely that any government, army, or terrorist group will ever again have its plans as comprehensively exposed as the Nazi war machine's, Sigint should still be effective against specific targets≠but, as 9/11 and the search for Osama bin Laden prove, only as part of an integrated intelligence strategy that prevents it from turning a deaf ear. -------------------------------------------------------------------------------- To Probe Further The European Parliament's report on the Echelon eavesdropping network can be found online at http://www.europarl.eu.int/tempcom/echelon/rrechelon_en.htm. The National Security Agency's Web site (http://www.nsa.gov/) has information on its history and outreach programs. An open-source public key encryption application, Gnu Privacy Guard, can be found at http://www.gnupg.org/. -------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10579 From: Gregory Hicks Date: Wed Jan 12, 2005 2:16pm Subject: [IP] No expectation of privacy in public? In a pig's eye! (was: Ruling gives cops leeway with GPS) From: Michael Hammer Date: Wed, 12 Jan 2005 10:00:57 -0500 > On Tue, 11 Jan 2005 19:26:56 -0800, Greg Horton > wrote: > > > > > > I am not so sure about that. In California, you don't need a warrant to > > put a tracker on unless you hardwire it to the vehicle. So instead of > > fielding a six man surveillance team for thousands of dollars and maybe > > a helo or plane, you do the same thing for pennies. You are going to > > follow the suspect anyway, why not do it in a way that saves the > > taxpayer a heap o' money? > > > > Greg > By that logic, I should just be able to break into (and wipe out) an > internet host that is being used to do bad things. We will get it > shut down/confiscated anyways by going through the legal steps so why > not just cut to the chase. As tempting as that may be, I understand the > reasons we have limitations. > > Just because something can be done doesn't mean it should be done. > Requiring a court order is a check/balance on the activities involved. > > Mike This is also being discussed on Dave Farber's IP list... See the message below - Just because we *CAN* do something, does not mean we *SHOULD* do it... Regards, Gregory Hicks ------------- Begin Forwarded Message ------------- Date: Wed, 12 Jan 2005 14:46:47 -0500 Subject: [IP] No expectation of privacy in public? In a pig's eye! From: David Farber To: Ip Orwell was an amateur djf ------ Forwarded Message From: Lauren Weinstein Date: Wed, 12 Jan 2005 11:38:28 -0800 To: Cc: Subject: No expectation of privacy in public? In a pig's eye! Dave, It's time to blow the lid off this "no expectation of privacy in public places" argument that judges and law enforcement now spout out like demented parrots in so many situations. Technology has rendered that argument meaningless -- unless we intend to permit a pervasive surveillance slave society to become our future -- which apparently is the goal among some parties. It is incredibly disingenuous to claim that cameras (increasingly tied to face recognition software) and GPS tracking devices (which could end up being standard in new vehicles as part of their instrumentation black boxes), etc. are no different than cops following suspects. Technology will effectively allow everyone to be followed all of the time. Unless society agrees that everything you do outside the confines of your home and office should be available to authorities on demand -- even retrospectively via archived images and data -- we are going down an incredibly dangerous hole. I use the "slimy guy in the raincoat" analogy. Let's say the government arranged for everyone to be followed at all times in public by slimy guys in raincoats. Each has a camera and clipboard, and wherever you go in public, they are your shadow. They keep snapping photos of where you go and where you look. They're constantly jotting down the details of your movements. When you go into your home, they wait outside, ready to start shadowing you again as soon as you step off your property. Every day, they report everything they've learned about you to a government database. Needless to say, most people would presumably feel incredibly violated by such a scenario, even though it's all taking place in that public space where we're told that we have no expectation of privacy. Technology is creating the largely invisible equivalent of that guy in the raincoat, ready to tail us all in perpetuity. If we don't control him, he will most assuredly control us. --Lauren-- Lauren Weinstein lauren@p... or lauren@v... or lauren@p... Tel: +1 (818) 225-2800 http://www.pfir.org/lauren Co-Founder, PFIR - People For Internet Responsibility - http://www.pfir.org Co-Founder, Fact Squad - http://www.factsquad.org Co-Founder, URIICA - Union for Representative International Internet Cooperation and Analysis - http://www.uriica.org Moderator, PRIVACY Forum - http://www.vortex.com Member, ACM Committee on Computers and Public Policy Lauren's Blog: http://lauren.vortex.com - - - > > ------ Forwarded Message > From: Gregory Hicks > Reply-To: Gregory Hicks > Date: Wed, 12 Jan 2005 09:42:03 -0800 (PST) > To: > Cc: > Subject: Ruling gives cops leeway with GPS > > Dave: > > For IP if you wish... > > http://timesunion.com/AspStories/storyprint.asp?StoryID=322152 > > Ruling gives cops leeway with GPS > Decision allows use of vehicle tracking device without a warrant > > By BRENDAN LYONS, Staff writer > First published: Tuesday, January 11, 2005 > > In a decision that could dramatically affect criminal investigations > nationwide, a federal judge has ruled police didn't need a warrant when > they attached a satellite tracking device to the underbelly of a car > being driven by a suspected Hells Angels operative. > > [...snip...] > > All Times Union materials copyright 1996-2005, Capital Newspapers > Division of The Hearst Corporation, Albany, N.Y. > > ------ End of Forwarded Message ------------------------------------- You are subscribed as ghicks@c... To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ------------- End Forwarded Message ------------- ------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 | Fax: 408.894.3400 San Jose, CA 95134 | Internet: ghicks@c... I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton 10580 From: Nalesnik, Matthew Date: Wed Jan 12, 2005 9:16am Subject: Psychic Antennas http://www.newsmax.com/archives/ic/2005/1/12/91524.shtml Wednesday, Jan. 12, 2005 9:07 a.m. EST Yelsin Protected by 'Psychic' KGB Claiming that "Americans have created radiators of modulated signals, which control people's behavior thousands of kilometers from afar," Pravda.ru reports that former Russian President Boris Yeltsin was protected by a KGB unit who defended against "psychic" attacks. Yuri Malin, a former KGB officer, tells Pravda that "there was a special department in the structure of Russian secret services to protect top officials from malicious intentions of scientists and extrasensory individuals, who could create devices that were capable of affecting human psychology." Malin worked as a consultant of Boris Yeltsin's Federal Security Service, the successor to the KGB. Malin says that Putin does not "take much" interest in the unit. "There were such people in Boris Yeltsin's team, though. There was a special department, which was dealing with unconventional technologies to manipulate the human mind," he claims. Malin says the unit was formed when someone found an eavesdropping device in the house of a Russian government official. "It was actually not a microphone, but a directional antenna. Specialists concluded that the antenna had been installed in the office to exert a psychological influence on the president," he said. Malin says that in the early 90s there were about 20 institutes which developed a variety of extrasensory devices used by the security forces and others. During the Yeltsin years, Malin says the Russian goverment spent 500 million rubles on such programs. Apparently Yeltsin was very much in favor of the efforts. Malin recalled that security agents "could not let a button of Yeltsin's shirt disappear: it was believed that extrasensory individuals could put the evil eye on the president with the help of any little thing that Yeltsin owned." 10581 From: Lou Novacheck Date: Wed Jan 12, 2005 4:57pm Subject: Re: Ruling gives cops leeway with GPS HEAR! HEAR! Or, depending which side you're on SIEG HEIL! Agent Geiger wrote: Excuse me, but that is nonsense. OK, I will shut off the GPS while he cuts through that private drive. I just first have to run the coordinates through my GIS database then delete that info out before I use it in court. I am a commissior for my local government, and I see this trivial splitting of hairs thing done all the time. I wish LE and gov't officials would remember that little oath that we ALL took to uphold the Constitution from ALL enemies, foreign and DOMESTIC. I guess I need to keep a GPS jammer on me at all times, to block not only my cell phonem, but any potential LE from protecting me from myself. --- sewellr@i... wrote: > > > > > > You still need a warrant to monitor the vehicle if > it goes on private > property; just don't need one (right now) to monitor > while on public roads. > Doesn't sound like a "freedom" issue to me! > > Sgt. Kirk Sewell > Illinois State Police, Technical Investigations > 500 Iles Park Place, Suite 300 > Springfield, IL 62718 > (217) 524-6079 office > (217) 467-4211 pager > (217) 836-0919 mobile > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Find what you need with new enhanced search. http://info.mail.yahoo.com/mail_250 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com [Non-text portions of this message have been removed] 10582 From: tali whacker Date: Wed Jan 12, 2005 5:21pm Subject: Re: Ruling gives cops leeway with GPS So when Mr. Smiths car drives onto Mr. Does driveway they'll record/use the data how? Will they say he traveled to on 01202004 Myfreedomsrgoinga Way but we deleted the data that reflect where his vehicle may have traveled after his last "legally" tracked position. Since 99% of roadways are public, what difference does it make if "You still need a warrant to monitor the vehicle if it goes on private property" since the "legally unwarranted" data collected would already pin the vehicle to a specific location. Just as the war on terrorism "renders obsolete Geneva's strict limitations on questioning of enemy prisoners and renders quaint some of its provisions.", the supposingly stringent process (put in place to preserve privacy rights and indiscriminate surveillance) to acquire warrants too I'm afraid will become increasingly "obsolete" more and more over time. On Wed, 12 Jan 2005 08:59:43 -0600, sewellr@i... wrote: > > > > > > You still need a warrant to monitor the vehicle if it goes on private > property; just don't need one (right now) to monitor while on public roads. > Doesn't sound like a "freedom" issue to me! > > Sgt. Kirk Sewell > Illinois State Police, Technical Investigations > 500 Iles Park Place, Suite 300 > Springfield, IL 62718 > (217) 524-6079 office > (217) 467-4211 pager > (217) 836-0919 mobile > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > ________________________________ > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 10583 From: Guy Urbina Date: Wed Jan 12, 2005 6:08pm Subject: GPS tracking system signal inhibitors Hi all, With all the recent chatter about GPS tracking, what are the legal ramifications of owning or selling a small GPS signal inhibitor? With the proliferation of GPS trackers seemingly ubiquitous, it seems like a good idea to prevent unauthorized people from tracking your movements in a vehicle. I've fabricated a few small devices that transmit a CW carrier under 50mw in the L1 frequency range. (1575.42Mhz) It effectively overdrives the front end of COTS GPS receivers.(Garmin, SIRF, Motorola etc.) (Most trackers use L1 receivers in their systems) Within a 10' radius, it effectively prevents a GPS receiver from locking on to get a position fix. Other than getting FCC type approval certification, Would these proposed devices be illegal to own or sell? Right now they are bench prototypes. I appreciate any constructive feedback. \R -Guy 10584 From: Bill & Tracy McDonnell Date: Wed Jan 12, 2005 8:05pm Subject: Re: speaking of GPS units Is the satellite they use to track GPS the Chameleon? By the way,I live in Ohio and the GPS they had on the SUV's trailer hitch was thrown out by the Appeals Court. We don't believe that the Ohio Supreme is going to touch it. The case thrown out is already a big deal in Constitutional Issues. Many blessings~~~ Bill & Tracy McDonnell Matthew 7:16 www.bigdaddydanes.com ----- Original Message ----- From: G P To: tscm-l@yahoogroups.com Sent: Wednesday, January 12, 2005 7:55 PM Subject: [TSCM-L] speaking of GPS units Can the list members here that have experience with GPS trackers post some common installations that they've ran across? I would assume that unless using a unit with advanced correlation ability (such as reflected signals off of pavement etc), that the unit would have to be mounted with clear view of the sky and no obstructions. What are some common places for permanent installations, and where would you start looking first if you suspected a vehicle had a GPS tracking device installed? With this recent court ruling, would that also imply that cellular handsets planted in a vehicle would also be legal? With the Emergency 911 (E911) Act (no relation to Sept. 11, the bill was passed a year or so prior to the attacks), cellular telephones now must support geolocation capability up to a few meter resolution now. There would be no need for an elaborate GPS tracker if you could accomplish the same goal by wiring a cellphone into the vehicle (with the added benefit of a voice channel to listen in on conversations in the cockpit). Where would be the best place to mount one of them, and what would be the preferred technique for discovering one? Greg ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10585 From: Greg Horton Date: Wed Jan 12, 2005 9:22pm Subject: Re: Re: Ruling gives cops leeway with GPS fjansgmxnet wrote: If it costs pennies, they will track or follow inconvenient citizens. I would like to see where you work, that your bean counters would let you track dozens of innocent citizens. Cops are always going to try to follow people that they think are involved in crime so they can stop the crime. We don't just pick out John Q Citizen and follow him because our bosses would probably put a boot up our rear for not doing anything productive. And as far as getting a warrant for everything we did, Frank we would never get anything done. If you investigate somebody, and nothing turns up, you close the investigation and move on. Many times it only takes an hour or so before you realize the information you received was probably false. And don't forget, the device that you put on the car only tells you where the individual has been, you still have to have eyes on him so you can see if the individual is actually involved in a crime. The tracking device is only a small tool to use in your investigation. Greg > > > --- In TSCM-L@yahoogroups.com, Greg Horton wrote: > > > > G P wrote: > > You are going to > > follow the suspect anyway, why not do it in a way that saves the > > taxpayer a heap o' money? > > That's the point. If it costs a heap of money, they will follow only > the real suspects of mayor crime offences. If it costs pennies, they > will track or follow inconvenient citizens. > > If they want to follow the real suspects of mayor crime offences, > they will get a warrant everywhere. This is only a problem, if they > haven't any substantial leads. But why should they follow then, > because of their preconceptions? (I am sure that they will not public > the events, if their preconceptions failed.) > > Regards, > Frank > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > ------------------------------------------------------------------------ > Yahoo! Groups Links > > * To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > * To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > > * Your use of Yahoo! Groups is subject to the Yahoo! Terms of > Service . > > [Non-text portions of this message have been removed] 10586 From: Greg Horton Date: Wed Jan 12, 2005 9:11pm Subject: Re: Ruling gives cops leeway with GPS Sorry Littledog, I was talking about the police. I agree with you that some CI's may abuse their relationship with the police. But then shame on the officers that let themselves get sucked into something like that without looking for some other indicators that would affirm or rebut what the CI told them. Greg littledog wrote: > > What about when these registered confidential informers do all this > tracking, bugging, eavesdropping, and knotholing for no other reason > than personal ones, and have always done so?> -----Original Message----- > > From: Greg Horton [mailto:sgtpelon@e...] > > Sent: Tuesday, January 11, 2005, 8:13 PM > > To: TSCM-L@yahoogroups.com > > Subject: Re: [TSCM-L] Ruling gives cops leeway with GPS > > > > > > > > G P wrote: > > > > > Absolute insanity. > > > > > I am not so sure about that. In California, you don't need a > warrant to > > put a tracker on unless you hardwire it to the vehicle. So instead of > > fielding a six man surveillance team for thousands of dollars and maybe > > a helo or plane, you do the same thing for pennies. You are going to > > follow the suspect anyway, why not do it in a way that saves the > > taxpayer a heap o' money? > > > > Greg > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > ------------------------------------------------------------------------ > Yahoo! Groups Links > > * To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > * To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > > * Your use of Yahoo! Groups is subject to the Yahoo! Terms of > Service . > > From: Greg Horton Date: Wed Jan 12, 2005 9:37pm Subject: Re: Ruling gives cops leeway with GPS Michael Hammer wrote: > By that logic, I should just be able to break into (and wipe out) an > internet host that is being used to do bad things. We will get it shut > down/confiscated anyways by going through the legal steps so why not > just cut to the chase. As tempting as that may be, I understand the > reasons we have limitations. > > Just because something can be done doesn't mean it should be done. > Requiring a court order is a check/balance on the activities involved. > > Mike > > Holy Smokes Mike, what a leap of logic you make. How on earth do you > make a connection between following someone on a public thoroughfare > and comitting a burglary and then committing an additional crime of > wiping the computer clean. Talk about a non sequitur. There is no > requirement for a court order and case law has reaffirmed this > technique by the police. If you are that concerned about this type of > operation, maybe you should spearhead a movement to pass appropriate > legislation. Greg > > 10588 From: Roger Date: Wed Jan 12, 2005 10:10pm Subject: identity theft is a major problem in America. Dear Member It's no secret that identity theft is a major problem in America. Think you're not at risk? Unfortunately you are. - Do you hand your credit card to servers at restaurants? - Do you sign your credit cards? - Do you supply personal information over the internet? - Do you keep your Social Security number in your wallet or purse? - Do you leave mail at your home or business for the postal carrier to collect? - Do you shred unwanted mail with personal information? What if you discovered that your identity had been stolen? - Call your bank and/or credit card company - Contact the three major credit repositories - Go through the helpful but extensive steps recommended by the Federal Trade Commission in its 30-page consumer support publication - Fill out and submit the affidavit form supplied by the FTC to dispute new, unauthorized accounts - Spend on average $1,500 in out-of-pocket expenses to resolve the many problems cause by identity thieves WITH THE IDENTITY THEFT SHIELD: Get REGULAR monitoring of your credit report and let the proven leaders in the identity restoration and legal services fields assist you. With no obligation, you can view a short presentation and learn more by visiting my website. See what Pre-Paid Legal can do for you at: http://www.prepaidlegal.com/idt/hollowaypi Thank you for your time and if you're interested or just have questions, I'll be happy to help. Please feel free to contact me at your convenience. Sincerely, Roger Holloway Independent Associate Pre-Paid Legal ServicesÆ, Inc. 940-592-7000 www.TexasDetective.com www.RogerHolloway.com 10589 From: Greg Horton Date: Wed Jan 12, 2005 9:29pm Subject: Re: Ruling gives cops leeway with GPS G P wrote: > Because anybody and everybody can now fix up your car > with a GPS unit, without fear of civil or criminal > prosecution. This court precedent puts very dangerous > technology into the hands of the proletariat, without > any form of checks and balances. > > Wait until somebody wires up your wife's car for > sound, and you'll have a slightly different opinion > about tracking technology. GP, What you are saying is not quite accurate. A private person cannot use the devices or he is in violation of both criminal and civil codes. We were talking about tracking devices that are self contained and attach to the vehicle without using the vehicle's battery or electrical system. We said nothing about wiring for audio. All police officers MUST have a signed warrant to attach any video or audio to a suspect's vehicle. There is no way around that. You must have enough probable cause to convince a judge. I know for a fact that if a person in California puts a listening device in a car, he is in a heap o' trouble. Greg > > --- Greg Horton wrote: > > > > > > > G P wrote: > > > > > Absolute insanity. > > > > > I am not so sure about that. In California, you > > don't need a warrant to > > put a tracker on unless you hardwire it to the > > vehicle. So instead of > > fielding a six man surveillance team for thousands > > of dollars and maybe > > a helo or plane, you do the same thing for pennies. > > You are going to > > follow the suspect anyway, why not do it in a way > > that saves the > > taxpayer a heap o' money? > > > > Greg > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > the hands acquire shaking, the shaking is a > > warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== > > TSKS > > Yahoo! Groups Links > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > ------------------------------------------------------------------------ > Yahoo! Groups Links > > * To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > * To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > > * Your use of Yahoo! Groups is subject to the Yahoo! Terms of > Service . > > [Non-text portions of this message have been removed] 10590 From: wiggyyy2000 Date: Wed Jan 12, 2005 11:07pm Subject: Thanks James.. I would like to thank Jim for inviting me to this group, it is very informative with good people thanks 10591 From: James M. Atkinson Date: Thu Jan 13, 2005 0:08am Subject: State Department/CIA Communications Annex and Special Collection Facilities (for publication to Cryptome) Consider for a moment the irony of having one of major the U.S. Governments espionage centers located between a road called "Ashcroft Drive" and one called "Entomology Road". The Beltsville Agricultural Research Center is world famous for the study of insects, but more than one kind of bug is grown at this location. The site has also been used as a base for spies and diplomats since the late 70's as a major communications center, and a wet-house where bugs of a more electronic nature are nurtured. In a forested area near Rt 295 there are two sister building set back from the road. On page 2 of the following FCC document we see that MCI Worldcom operates a satellite communications system from this location. http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-230090A1.pdf Application for Authority Class of Station: Fixed Earth Stations MCI WORLDCOM NETWORK SERVICES, INC. E030002 SES- LIC- 20030102- 00007 E Nature of Service: Domestic Fixed Satellite Service SITE ID: 1 LOCATION: 8101 Odell Rd, Montgomery, Beltsville, MD 39 ∞ 2 ' 48.40 " N LAT. 76 ∞ 51 ' 52.90 " W LONG. Universal Antennas 1 18.3 meters ANTENNA ID: 1183 0.00 dBW 3700.0000 - 4200.0000 MHz 44M2G7W 56.00 dBW PSK DATA 5925.0000 - 6425.0000 MHz 43K8G7W 71.60 dBW PSK DATA 5925.0000 - 6425.0000 MHz 44M2G7W 3700.0000 - 4200.0000 MHz 43K8G7W Points of Communication: 1 - ALSAT - (ALSAT) Note the listing on page 2, which reflects that MCI is operating the Satellite Dish on the East side of the State Department Communications Annex. ALSAT is a foreign based commercial communications satellite with surveillance capability, and the above frequency bands would allow this systems to handle a huge about of materials. Also, the bandwidth that they are using is enormous and they could move huge amounts of data through a system like this. http://dettifoss.fcc.gov/acweb/dettifoss/IBFS/IBFS_Ses_License.roi;16520?ViewDefault http://dettifoss.fcc.gov/acweb/dettifoss/Genmen_a/db_8/d_admin.roi;119?ViewDefault --------------------------------------------------------- Most State Department facilities have special phones lines that allow personnel to call their families while abroad via this systems at little or no cost, for example: http://foia.state.gov/MMS/postrpt/pr_view_all.asp?CntryID=159 Telephones and Telecommunications Last Updated: 7/12/2004 5:25 AM Local and international telephone service is available and reliable. International direct dial service is excellent. A one-minute call to the U.S. or other foreign country costs approximately $1. Direct calls from the U.S. can be received in Hanoi without cost. Residences of all USG personnel are equipped with telephones. Employees are responsible for paying the monthly residential telephone bill. Through the International Voice Gateway (IVG) Program, the Embassy has four IVG telephone trunks directly connecting the office with the State Department Telephone Switch at Beltsville, Maryland. This IVG connection was installed as both a cost-saving and morale-boosting program. Calls to the greater Washington area (703/202/301/410) are free. All 1-800 numbers are also free of charge to Embassy personnel. When placing personal calls, a commercial telephone calling card can be used for numbers outside the D.C. area. These personal calls will be billed to the employee as if the call originated from Beltsville, Maryland. Also, http://foia.state.gov/MMS/IVG_prefix/ivgprefix_start.asp IVG Usage Dial Prefix Codes The International Voice Gateway (IVG) switch is located in Beltsville, Maryland and provides interconnectivity from 135 overseas locations to all Department of State and government agencies located in the Washington, D.C. metropolitan area. Through the use of calling cards, it also enables users to access the FTS networks, GETS, WITS, as well as commercial numbers for international direct dialing at substantially reduced rates. Embassy to Off-Network Overseas Location: When calling from an Embassy to a different country, but not an IVG location, you must use your ID3 Calling Card. Off-Network Overseas Location to Department of State and/or U.S. Location: You must use your ID3 Calling Card. When calling from an off-network overseas location to an off-network location, you must use your ID3 Calling Card. and, http://foia.state.gov/masterdocs/05fah02/tel0640.pdf 5 FAH-2 H-640 INTERNATIONAL VOICE GATEWAY (TL:TEL-1; 07-01-1998) 5 FAH-2 H-641 DESCRIPTION (TL:TEL-1; 07-01-1998) (Uniform State/USAID/USIA) The International Voice Gateway (IVG) is an international telephone network directly linking foreign affairs agency headquarters with field offices abroad via dedicated voice circuitry. DTS-PO established the network to provide a cost-effective, U.S. Government-controlled and switched telephone service for foreign affairs agencies. Dial tone and switching for IVG trunks are provided by the central switch at the Network Control Center in Beltsville. DTS-PO manages the network and maintains the central switch and circuitry up to the PBX at destination points. 5 FAH-2 H-642 INTERCONNECTIVITY (TL:TEL-1; 07-01-1998) (Uniform State/USAID/USIA) IVG subscribers can connect to other U.S. Government networks by dialing special access codes. DTS-PO periodically sends telegraphic updates of IVG directories and detailed dialing instructions to all IVG subscribers. The other networks are described in greater detail below. 5 FAH-2 H-642.1 Department of State Metropolitan Area/Wide Area Network (MA/WAN) (Voice) (TL:TEL-1; 07-01-1998) (Uniform State/USAID/USIA) The Departmentís MA/WAN is a voice network connecting the IVG central switch at Beltsville to Department facilities at Main State, Washington area State annexes, and other facilities in Portsmouth, New Hampshire, Charleston, South Carolina and USUN New York. --------------------------------------------------------- Here is an article about MCI getting caught playing games with the system: http://www.computerweekly.com/Article123819.htm Note that MCI was illegally routing "sensitive calls" through Canada to save money. --------------------------------------------------------- The same 8101 Odell address is also listed as a GSA building at: http://www.iolp.gsa.gov/iolp/BuildingsList.asp?dID=2405 ALTERNATE COMM SITE 8101 ODELL RD BELTSVILLE , MD 20705-4110 PRINCE GEORGE'S COUNTY ------------------------------------------------------------- An index for State department Annex locations indicates that this location is part of the "Bureau of Information Resource Management ": http://foia.state.gov/MMS/Annexes/print_all_annex.asp State Annex - SA-26 SA-26 Beltsville 8108 O'Dell St. Beltsville, MD 20522 Major Office: IRM, AID ------------------------------------------------------ Here is a listing of some of the people at the facility, broken down by assignment/position: http://foia.state.gov/alphalisting/alpha_print.asp?Range=DD Alphabetical Listing of Employees Name Number Room Office Location Ortman, Edward 301-985-8318 102 Beltsville Kahney, Joseph 301-985-8100 154 SA-26 Ivan, Patricia 301-985-8006 BIMC SA-26 White, Robert H. 301-985-8100 143 SA-26 Bazemore, Lisa C. 301-985-8022 107 SA-26 Ivory, Cynthia Y. 301-985-8797 126 SA-26 Delisa, John 301-985-8064 GTS(BIMC) SA-26 Heiser, Richard E. 301-985-8019 BIMC SA-26 Scott, Betty Jean 301-985-8037 2nd Fl SA-26 Bowden, Alfred Jerome 301-985-8711 111A(GTS) SA-26 Crawford, Steadman C. 301-985-8016 126(GTS/EN SA-26 Chavis, Keith 301-985-8100 A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Clark, Sherry 301-926-5710 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Steen, Jon J. 301-985-8100 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Beckloff, Mark 301-985-8787 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Ortman, Edward 301-985-8318 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Bristol, Robert 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Jones, Jerry R. 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Pantos, Lillian 301-985-8004 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Thomas, Anthony 301-985-4738 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Wilson, Rima S. 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Harrell, Earl C. 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Johnson, Chad R. 301-985-8318 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Mangal, Aaron S. 301-985-8208 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Marbley, Troy G. 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Rice, William J. 301-985-8712 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Brown, Richard T. 301-985-8100 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Gonzalez, Jose F. 301-985-8512 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Ingram, Robert J. 301-985-8866 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Lippa, Michelle L. 301-985-8100 EMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Lippa, Michelle L. 301-985-8100 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Mooring, Odessa M. 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Rios, Kixxonmin G. 301-985-8866 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Burgman, Charles E. 301-985-8815 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Dejesus, Yesenia D. 301-985-8712 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 McDaniel, Tyrone G. 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Bruno-Nieves, Jorge L. 301-985-8100 109 A/DTSPO/GTS SA-26 Bryson, Cader A. 301-985-8945 A/OPR/FMS/RAM - Office of Facilities Management Services SA-26 Anderson, Michael G. 301-985-8946 B03E A/OPR/FMS/RAM - Office of Facilities Management Services SA-26 Palmer, Erica 301-985-8347 8th Fl DS/CIS/IST - Office of Information Security Technology SA-26 Hurt, Lolita M. 301-985-8347 DS/SI/AC SA-26 Perry, Gwenette C. 301-985-8347 DS/SI/AC SA-26 Washington, Shawnisa 301-985-8229 DS/SI/AC SA-26 D Elisa, John 301-985-8064 GTS IRM/NOC SA-26 Badra, Patrick M. 301-985-8433 IRM/NOC SA-26 Correll, Jacob A. 301-985-8008 GTS IRM/NOC SA-26 Bridgwood, Thomas F. 301-985-1717 GTS IRM/NOC SA-26 Carroll-Nickens, Mary 301-985-8371 117(GTS-NS IRM/OPS/ENM - Enterprise Network Management SA-26 Ballard, Paul E. 301-985-8217 Bsmt IRM/OPS/ENM/OPS/NA SA-26 Wardle, Shane C. 301-985-8250 Bsmt IRM/OPS/ENM/OPS/NA SA-26 Ross, Russell M. 301-985-8369 ENMOC IRM/OPS/ENM/OPS/NA SA-26 Williams, Sherman L. 301-985-8217 Bsmt IRM/OPS/ENM/OPS/NA SA-26 Webster, Tara Marsette 301-985-8460 ENMOC IRM/OPS/ENM/OPS/NA SA-26 Bullock-Bangoura, Wanda D. 301-985-8227 1269 IRM/OPS/ENM/OPS/NA SA-26 Beddingfield, Guthrie 301-985-8356 ABCD IRM/OPS/ENM/OPS/TC Beltsville Kumar, Ravindra 301-985-8462 Bsmt IRM/OPS/ENM/OPS/TC SA-26 Neal, Joseph C. 301-985-8217 Bsmt IRM/OPS/ENM/OPS/TC SA-26 Scott, Teresa D. 301-985-8806 140 IRM/OPS/ENM/OPS/TC SA-26 Rivera, Jose Antonio 301-985-8342 IRM/OPS/ENM/OPS/TC SA-26 Williams, Dorothea V. 301-985-8004 111 IRM/OPS/MSO - Messaging Systems Office Beltsville Premo, Rob 301-985-8516 IRM/OPS/MSO - Messaging Systems Office SA-26 Hedges, John S. 301-985-8004 IRM/OPS/MSO - Messaging Systems Office SA-26 Walker, Michael D. 301-985-8516 IRM/OPS/MSO - Messaging Systems Office SA-26 Cabral, John L. 301-985-8005 108 IRM/OPS/MSO/BMC - Beltsville Messaging Center Division Beltsville Bell, Anthony R. 301-985-8007 Vault IRM/OPS/MSO/BMC - Beltsville Messaging Center Division Beltsville Leger, David J. 301-985-8061 IRM/OPS/MSO/BMC - Beltsville Messaging Center Division SA-26 Glover, Henry A. 301-985-8319 105 IRM/OPS/MSO/BMC - Beltsville Messaging Center Division SA-26 Williamson, Darrell L. 301-985-8122 IRM/OPS/MSO/BMC - Beltsville Messaging Center Division SA-26 Hamilton, Lee 301-985-8866 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Harrell, Earl 301-985-8122 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Marbley, Troy 301-985-8122 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Childs, Albert 301-985-8039 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Morris, Ofelia 301-985-8004 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Haskins, Albert 301-985-8122 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Edwards, Anthony 301-985-8866 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 McDaniels, Tyrone 301-985-8122 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Williams, John A. 301-985-8866 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Mooring, Odessa M. 301-985-8516 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Jones, Frank R. 301-985-8122 IPC IRM/OPS/MSO/BMC/OPS - Operations Branch Beltsville Gomez, Bernabe Jesus 301-985-8122 1 IRM/OPS/MSO/BMC/OPS - Operations Branch Beltsville Hunt, Richard L. 301-985-8122 IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Manning, Felix 301-985-8122 111 IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Zayas, Orlando 301-926-5405 111 IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Champ, Renee C. 301-985-8296 108 IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Gibson, Mary E. 301-985-8105 104 IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Stephens, James 301-985-8866 111 IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Motes, Roger D. 301-985-8516 PRIMARY IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Barclay, James E. 301-985-8302 108 IRM/OPS/MSO/BMC/TS - Technical Services Branch Beltsville Battle, Ronald Nelson 301-926-5400 5420 IRM/OPS/MSO/BMC/TS - Technical Services Branch Beltsville Beechum, Michael E. 301-926-5405 IRM/OPS/MSO/BMC/TS - Technical Services Branch SA-26 Norton, Adrian L. 301-985-8124 112 IRM/OPS/MSO/BMC/TS - Technical Services Branch SA-26 Fleming, Carla M. 301-985-8032 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch Beltsville Hill, Bruce 301-985-8060 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Kodey, Mark 301-985-8060 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Lutes, Mike 301-985-8714 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Ledger, Dave 301-985-8060 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Mobeka, Rita 301-985-8505 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Garner, Cedric 301-985-8060 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Jackson, Larry 301-985-8061 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Knight, Gerald 301-985-8060 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Knieriem, Gerry 301-985-8060 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Spellane, Michael 301-985-8145 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Schneider, Paul C. 301-985-8123 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Hampton, Angel B. 301-985-8905 1986E IRM/OPS/SIO/APD/PAY - Payroll Applications Branch SA-26 Dormio, Debora L. 301-985-8900 117 IRM/OPS/SIO/MFS/CSO - Client/Server Operations Branch Beltsville Woodland, Marian G. 301-985-8293 130 IRM/OPS/SIO/MFS/CSO - Client/Server Operations Branch Beltsville Baia, Joseph L. 301-985-8738 139 IRM/OPS/SIO/MFS/CSO - Client/Server Operations Branch SA-26 McCree-Green, Carol E. 301-985-8902 136 IRM/OPS/SIO/MFS/CSO - Client/Server Operations Branch SA-26 Williamson, Johnnie R. 301-985-8727 139 IRM/OPS/SIO/MFS/CSO - Client/Server Operations Branch SA-26 Dumas, Jimmie J. 301-985-8721 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Chase, Mary L. 301-985-8312 135 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Day, Marcus R. 301-985-8406 130 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Cook, Tyrone W. 301-985-8292 130 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Brown, Elliott W. 301-985-8737 135 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Davis, Leonard W. 301-985-8739 135 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Cornelison, Jim X. 301-985-8290 130 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Jackson, Ramona D. 301-985-8793 130 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Johnson, Sheila D. 301-985-8295 130 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Raiford, Angela E. 301-985-8741 135 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Williams, Steve R. 301-985-8732 130 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Wilson, Barbara J. 301-985-8294 135 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Smith, Lawrence C. 301-985-8901 1921 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Wise, Pernell X. 301-985-8790 135 - A IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Alami, Michelle E. 301-985-8746 Bubble IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Douglas, Kirk 301-985-8901 117 IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Parker, Carlton 301-985-8743 OPS IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Sands, Vance H. 301-985-8795 135 IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Slater, Demetrius 301-985-8700 139 IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Stevens, Phillip H. 301-985-8731 135B IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Clough, Patricia A. 301-985-8700 1st Fl IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Weinberger, Jim C. 301-985-8792 IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Collins, Tony C. 301-985-8794 130 IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Richardson, Barbara A. 301-985-8700 130 IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 http://foia.state.gov/MMS/OrgDirectory/OrgDir.asp?ID=56 MESSAGING SYSTEMS (IRM/OPS/MSO) Director Susan Musser, Acting 5440 202-647-7787 Deputy Director Susan Musser 5440 202-647-7787 Management Analysis Staff Chief Patsy Butler 5440 202-647-7768 Messaging Systems Products Division Chief Edward Courlang 2288C SA34 703-912-8009 Special Messaging Operation Divisions Chief Frontis Wiggins 5440 202-647-7989 E-Mail Division Chief Larry McElroy 1921 202-736-4878 Main State Messaging Center Division Chief Margaret Johnson 5440 202-647-7795 Beltsville Messaging Center Division Chief John Cabral 117 SA26 301-985-8005 -------------------------------------------------------------------------------------------------------- The East side of the Odell Road facility has two large Parabolic dish antenna for satellite up-link and down link. On the South side of the building there is a very tall red/orange and white tower with a point-to-point microwave dish to another site in the area. Next to this is a much shorter mast, with a large log-periodic antenna that we often see on the roofs of embassies and diplomatic facilities across the globe. There is also a fiber optic cable between this facility, and the one just to the east of it (the Special Collection Service). ------------------------------------------------------------------------------------------------------------- http://www.fbodaily.com/cbd/archive/1999/06(June)/22-Jun-1999/70sol003.htm COMMERCE BUSINESS DAILY ISSUE OF JUNE 22,1999 PSA#2372 U.S. Agency for International Development, M/OP/B/HNE, Room 7.09-120, 1300 Pennsylvania Avenue, NW, Washington, DC 20523-7100 70 -- GENERAL PURPOSE AUTOMATED DATA PROCESSING EQUIPMENT SOL M/OP/HNE/P99-002 DUE 062599 POC POC Daisy Matthews: Purchasing Agent, M/OP/B/HNE, Fax (202) 216-3052, Tel: (202) 712-0512, Internet: dmatthews@u..., Contracting Officer, James A. Jeckell WEB: http://www.info.usaid.gov/procurements_bus_opp/procurement/announce/cb d, http://www.info.usaid.gov. E-MAIL: dmatthews@u..., http://www.info.usaid.gov. This is a combined synopsis/solicitation for commercial items prepared in accordance with the format in Federal Acquisition Regulations (FAR) subpart 12.6, as supplemented with additional information included in this notice. This announcement constitutes the only solicitation; quotes are being requested and A WRITTEN SOLICITATION WILL NOT BE ISSUED. This CBD notice can be viewed and downloaded using the Agency Web Site. The Worldwide web address is http://www.info.usaid.gov. Select Business and Procurement Opportunities from the home page, then "USAID Procurements." On the following screen, select "Download Available USAID Solicitations." The Solicitation Number for this Request For Quotations (RFQ) is M/OP/HNE/P99-002. The Government anticipates awarding a single purchase order. This procurement is for the following items: CLIN NO. 001, Part No. ALSM64-05AE, 64KB Airlink Wireless Modems,Input Power: 90-270 VAC 50/60 HZ Qty. 12 ea.; CLIN NO. 002, Part No. ALS128-05AB, 128KB Airlink Wireless Modems, Input Power: 90-270 VAC 50/60 HZ Qty. 6 ea.; CLIN NO. 003, Part No. ALS256-05AB, 256KB Airlink Wireless Modems, Input Power 90-270 VAC 50/60 HZ Qty. 12 ea.; CLIN NO. 004, Part No. YEA-24SP-NF, 24DBI Semiparabolic Antenna Qty. 30 ea.; CLIN NO, Part No. 005 YELA-24, Lighting Arrestor with Bracket/Female Connector Qty. 30 ea.; CLIN NO. 006, Part No. YEX-4UF-010M/M, Ultra-Flex RF Cable 10 foot N. Male Connector Qty. 4 ea.; CLIN NO. 007, Part No. YEC-4UF-020M/M Ultra, Flex RF Cable 20 Foot N. Cable Connector Qty. 4 ea.; CLIN NO.008, Part No. YEC-400-1000B, 1000 Foot Spool LMR Cable (Bulk Reel) Qty. 1, CLIN NO. 009, Part No. YE-73565, Type N. 50 OHM Solder/Clamp Connector Qty. 50 ea. F.O.B Point, 8101 Odell Drive, Beltsvile, Maryland,20705. Date of Delivery: No later than July 30, 1999. No partial quotes will be considered. Please acknowledge all requirements on quotations. Please indicate F.O.B point on quote. This procurement is set-aside for small business. The provision at FAR 52.212-1, Instructions to Offerors, applies to this acquisition. Evaluation is based on best value including cost and ability to meet service requirements. Offerors shall include a completed copy of the provision at FAR 52.212-3, Offeror Representations and Certifications-Commercial Items, with its offer. The clause at 52.212-4, Contract terms and Conditions-Commercial Items, applies to this acquisition. In addition to the guidance contained in FAR 52.212-4, contractors shall submit proof of delivery with their invoices. The receiving office or representative of USAID may in the form of a bill of lading or other shipping document sign proof of delivery. Invoices received without proof of delivery with their invoices will not be accepted. The clause at FAR 52.212-5, Contract Terms and Conditions Required to Implement Status or Executive Orders-Commercial Items, applies to this acquisition. Offers are due by close of business 07/25/99, and can be submitted by fax to (202) 216-3052 Attn: Daisy Matthews. Inquiries regarding this request will only beaccepted via Fax. Posted 06/18/99 (W-SN344815). (0169) COMMERCE BUSINESS DAILY ISSUE OF JULY 20,1999 PSA#2391 U.S. Agency for International Development, M/OP/B/HNE, Room 7.09-120, 1300 Pennsylvania Avenue, NW, Washington, DC 20523-7100 70 -- GENERAL PURPOSE AUTOMATED DATA PROCESSING EQUIPMENT SOL M/OP/HNE/P99-003 DUE 072399 POC POC Daisy Matthews: Purchasing Agent, M/OP/B/HNE, Fax: (202) 216-3052; Telephone: (202) 712-0512, Internet: dmatthews@u..., Contracting Officer: James A. Jeckell WEB: http://www.info.usaid.gov/procurement_bus_opp/procurement/announce/cbd, http://www.info.usaid.gov. E-MAIL: http://www.info.usaid.gov, dmatthews@u.... This is a combined synopsis/solicitation for commercial items prepared in accordance with the format in Federal Acquisition Regulations (FAR) subpart 12.6, as supplemented with additional information included in this notice. This announcement constitutes the only solicitation; quotes are being requested and A WRITTEN SOLICITATION WILL NOT BE ISSUED. This CBD notice can be viewed and downloaded using the Agency Web Site. The Worldwide web address is http://www.info.usaid.gov. Select Business and Procurement Opportunities from the home page, then "USAID Procurements." On the following screen, select "Download Available USAID Solicitations." The Solicitation Number for this Request For Quotations (RFQ) is M/OP/HNE/P99-003. The Government anticipates awarding a single purchase order. This procurement is for the following item: CLIN NO. 001, Part No. Radyne DD 2401L, Receive-Only Modem, with Cisco Cable Kit, Twenty (20) each. F.O.B Point, 8101 Odell Drive, Suite 110, Beltsvile, Maryland,20705. Date of Delivery: No later than August 20, 1999. No partial quotes will be considered. Please acknowledge all requirements on quotations. Please indicate F.O.B point on quote. This procurement is set-aside for small business. The provision at FAR 52.212-1, Instructions to Offerors, applies to this acquisition. Evaluation is based on best value including cost and ability to meet service requirements. Offerors shall include a completed copy of the provision at FAR 52.212-3, Offeror Representations and Certifications-Commercial Items, with its offer. The clause at 52.212-4, Contract terms and Conditions-Commercial Items, applies to this acquisition. In addition to the guidance contained in FAR 52.212-4, contractors shall submit proof of delivery with their invoices. The receiving office or representative of USAID may in the form of a bill of lading or other shipping document sign proof of delivery. Invoices received without proof of delivery with their invoices will not be accepted. The clause at FAR 52.212-5, Contract Termsand Conditions Required to Implement Status or Executive Orders-Commercial Items, applies to this acquisition. Offers are due by close of business 07/23/99, and can be submitted by fax to (202) 216-3052 Attn: Daisy Matthews. Inquiries regarding this request will only be accepted via Fax. Posted 07/16/99 (W-SN355185). (0197) Loren Data Corp. http://www.ld.com (SYN# 0398 19990720\70-0012.SOL --------------------------------------------------------------------------------------------------------------- http://216.33.118.202/EPSData/AID/Synopses/11471/M-OP-1787/PROPOSALINSTRUCTIONS.doc Courier services will cover the District of Columbia; Montgomery and Prince George's County, Maryland, Fairfax and Arlington Counties, and the Cities of Alexandria and Falls Church, Virginia. Approximately eighty (80) percent of service calls will originate or terminate at the Agency office located in the District of Columbia. Agency's offices are currently located: District of Columbia Ronald Reagon International Trade Building 1300 Pennsylvania Avenue, N. W. Washington, D.C. 20523 Maryland (1) USAID Mainframe Computer Center 8101 Odell Road Beltsville, MD 20705 Virginia (2) Tower Building (State Annex 14) 1100 Wilsong Boulevard Rosslyn, VA 22209 --------------------------------------------------------------------------------- http://md.allpages.com/beltsville/real-estate/real-estate-services/ Montage Inc 8101 Odell Road Beltsville, MD 20705-4110 Phone: (301) 210-4540 Business Types: Property Maintenance & Services ------------------------------------------------------------------------------------- http://www.globalsecurity.org/org/news/2002/020718-scs1.htm The Baltimore Sun July 18, 2002 Report faults decisions by intelligence agencies By Tom Bowman WASHINGTON - The nation's spy agencies failed to provide adequate warning of the Sept. 11 terrorist attacks due partly to a series of "questionable management decisions" about where to spend money and assign workers, according to a sharply worded congressional report released yesterday. The Central Intelligence Agency and the National Security Agency must do more to penetrate al-Qaida and other terrorist organizations, said the report by the House Intelligence Subcommittee on Terrorism and Homeland Security. It was the first congressional report on the subject since the attacks on the Pentagon and the World Trade Center. The CIA should hire more foreign agents, while the NSA must shift from being a passive listener to a "proactive hunter" of terrorist targets. At the same time, the FBI was faulted in the report for the reluctance of top officials to share counterintelligence information with other agencies. "This report contains constructive suggestions for what the intelligence community needs to do to strengthen our country's counterterrorism intelligence capabilities," said Rep. Porter J. Goss, the Florida Republican who chairs the committee and has joined with the Senate committee in an investigation into why America had no advance warning of the attacks on the World Trade Center and the Pentagon. The FBI had no immediate comment on the report, while the CIA and NSA said they were making progress in dealing with the terrorist threat. Though funding for counterterrorism has sharply increased, both intelligence agencies said they face budget constraints in pursuing terrorists and spies. The intelligence community, with an annual budget in excess of $30 billion, is expected to receive billions of dollars more in the coming years. The CIA has an estimated work force of 19,000 and the NSA is believed to have 25,000 employees at Fort Meade, although precise figures are classified. While the report repeated long-standing criticisms that the agencies must hire more linguists and analysts to fight terrorism, the report broke ground by focusing on management decisions it said were key factors in the agencies' inability to sound the alarm before Sept. 11. The CIA's human intelligence - such as that gathered by foreign spies in the agency's employ - steadily eroded in the early to mid-1990s because the CIA perceived a reduced terrorist threat, the report said. It said the NSA had failed to find a way to closely follow a target who switches from a land-line phone to a cell phone or an Internet address. A senior intelligence official, who requested anonymity, said the CIA had yet to completely review the 100-page classified report. A declassified, 10-page summary was publicly released. But the intelligence official defended the agency's efforts on counterterrorism. Beginning in 1997, Director George J. Tenet beefed up the agency's efforts against terrorism with new employees and more focused analysis. Counterterrorism funding grew by 50 percent between 1997 and 2001, while the number of case officers - those who recruit foreign spies - rose by the same percentage. The official laid part of the agency's difficulty at the feet of Congress and the White House: "We certainly ask the administration and Congress to reverse the trend of increasing intelligence funding after terrorist attacks and then dropping back to former inadequate levels after the smoke clears." Robert Baer, a CIA officer for 21 years who left in 1997 and wrote about his experiences in the recent book See No Evil, said the committee's criticisms jibe with his own. Too much money was spent on CIA headquarters staff, he said, and not enough on the critical and often risky intelligence work overseas. The committee report "is right on the mark," he said. NSA released a statement saying it is dedicated to meeting technological challenges and ensuring that it has the right skills mix in its work force. The statement also said that since the end of the Cold War, "NSA is one-third smaller in population and has one-third fewer resources at its disposal." John Pike, an intelligence analyst with globalsecurity.org, said that many of the criticisms were not new, and some of them amount to "Monday morning quarterbacking" by Congress. Still, Pike said he was intrigued that the committee is calling for NSA to become a hunter rather than a passive listener. He said that might mean the agency will be encouraged to start "placing more bugs" around the world through its Special Collection Service, a joint program it runs with CIA that operates out of a secret office building in Beltsville. ------------------------------------------- http://www.spectrum.ieee.org/WEBONLY/publicfeature/apr03/code.html Bond, James Bond But a big remaining challenge, according to John Pike, a defense expert and founder of GlobalSecurity.org, are fiber-optic cables that stay on land. "I think that one of the things that [Navy Seals] spend a fair amount of time doing is [going] ashore...and walking to the nearest land line," says Pike. "They were doing that in Iraq a decade ago." Pike believes that this may also be how fiber-optic communications in North Korea and other countries are monitored: "It's cat and mouse, we try to see how many taps we can put on [chief of state Kim Jong II's] fiber-optic network, and the Dear Leader runs around and tries to catch them." Another, more aggressive approach to the land-line problem is to force an opponent onto the airwaves. "One of the things the United States has been doing since the middle of 2002 is systematically taking apart Iraq's land-line communications with air strikes, to force them to communicate via channels that are more readily compromised," says Pike. Indeed, this may be the reason why U.S. Secretary of State Colin Powell was able to present incriminating Iraqi telephone conversations to the United Nations last February. When a more subtle approach than aerial bombardment is called for, agencies like the U.S. National Security Agency (NSA) and the Central Intelligence Agency (CIA) can call upon organizations such as the Special Collection Service (SCS), a joint NSA-CIA covert group headquartered in Beltsville, Md. "What this group does is the more surreptitious black-bag operations," explains Wayne Madsen, who previously worked at the NSA and is now a senior fellow at the Electronic Privacy Information Center (Washington, D.C.). Black-bag operations can include breaking into embassies or facilities of communications providers and stealing information or installing bugs. -------------------------------------------------------------------------------- "It's been extremely difficult to break Russian ciphers" -------------------------------------------------------------------------------- By bugging a computer or communications system, information can be captured before it's sent through a fiber-optic cable, author Bamford observes. A tiny microphone dropped into a keyboard can pick up the sound made by the keys as they are struck and transmit the sounds to a nearby receiver. Different keys, according to Bamford, "sound different≠each has a specific signature." Those signatures can be used to reconstruct what was typed. The SCS also allows the Sigint community "to be proactive, to go after information rather than sit and wait," explains Bamford. Another important SCS mission is to recruit people who work for targeted governments, like cryptographic clerks or systems administrators, to ensure access to sensitive information, such as cipher keys. When successful, such activities also allow the NSA to avoid another steep hurdle: encryption. --------------------------------------------------------------------------------------------------------------- http://www.long-intl.com/mbw.htm CIA OPERATIONS FACILITY - Provided master planning, scheduling, budgeting, and monthly monitoring services on this $17 million new construction project at Beltsville, Maryland. The project was a classified fast-track office/research facility. ----------------------------------------------------------------------------------------------------------------- ww.villagevoice.com/features/9908/vest_madsen.shtml February 24 - March 2, 1999 A Most Unusual Collection Agency How the U.S. undid UNSCOM through its empire of electronic ears By Jason Vest and Wayne Madsen When Saddam Hussein raised the possibility of attacking U.S. planes in Turkey last week, his threats illustrated what many in diplomatic circles regard as an international disgrace≠ the emasculation of the UN by the U.S. When UNSCOM, the UN's arms-inspection group for Iraq, was created in 1991, it drew on personnel who, despite their respective nationalities, would serve the UN. Whatever success UNSCOM achieved, however, was in spite of its multinational makeup. While a devoted group of UN staffers managed to set up an independent unit aimed at finding Saddam's weapons and ways of concealing them, other countries seeking to do business with sanctions-impaired Iraq≠ notably France and Russia≠ used inspectors as spies for their own ends. But what ultimately killed UNSCOM were revelations that the U.S. government had manipulated it by assuming control of its intelligence apparatus last spring (or perhaps even earlier by using the group to slip spies into Iraq) not so much to aid UNSCOM's mission, but to get information for use in future aerial bombardments. When stories to this effect broke last month, however, there was almost no consistency in descriptions of the agencies involved or techniques used. The New York Times, for example, said only one CIA spy had been sent into Baghdad last March to set up an automated eavesdropping device. Time had multiple Defense Intelligence Agency (DIA) operatives planting bugs around Baghdad throughout 1998. The Wall Street Journal referred to the use of one "device" from the National Security Agency (NSA) last year and "a series of espionage operations used by the U.S. [since] 1996 to monitor the communications" of Saddam and his elite. When probing the world of espionage, rarely does a clear picture emerge. But according to a handful of published sources, as well as assessments by independent experts and interviews with current and former intelligence officers, the U.S. government's prime mover in Iraqi electronic surveillance was most likely a super-secret organization run jointly by the the CIA and the NSA≠ the spy agency charged with gathering signals intelligence (known as SIGINT)≠ called the Special Collection Service. Further, there is evidence to suggest that the Baghdad operation was an example of the deployment of a highly classified, multinational SIGINT agreement≠ one that may have used Australians to help the U.S. listen in≠ months after the CIA failed to realize the U.S. objective of overthrowing Saddam Hussein through covert action. According to former UNSCOM chief inspector Scott Ritter, when the U.S. took over the group's intelligence last year, a caveat was added regarding staffing: only international personnel with U.S. clearances could participate. "This requirement," says Ritter, "really shows the kind of perversion of mission that went on. The U.S. was in control, but the way it operated from day one was, U.S. runs it, but it had to be a foreigner [with a clearance] operating the equipment." authors Andrew and Patrick Cockburn demonstrate in their just published book Out of the Ashes: The Resurrection of Saddam Hussein, were two of the most colossally bungled CIA covert operations since the Bay of Pigs. While details of one of the failed operations were widely reported, the Cockburns fleshed out details of an arguably worse coup attempt gone awry in June 1996. Iraqi counterintelligence had not only managed to finger most of the suspects in advance, but months before had even captured an encrypted mobile satellite communications device that the CIA gave the plotters. Adding insult to injury, the Cockburns report, Iraqi counterintelligence used the CIA's own device to notify them of their failure: "We have arrested all your people," the CIA team in Amman, Jordan, reportedly was told via their uplink. "You might as well pack up and go home." Some UNSCOM staffers≠ first under Russian Nikita Smidovich, later under American Scott Ritter≠ managed to create what amounted to a formidable micro- espionage unit devoted to fulfilling UNSCOM's mission. Between information passed on from various countries and use of unspecified but probably limited surveillance equipment, the inspectors were gathering a great deal. But in March 1998, according to Ritter, the U.S. told UNSCOM chair Richard Butler of Australia that it wanted to "coordinate" UNSCOM's intelligence gathering. Ritter insists that no U.S. spies under UNSCOM cover could have been operating in Baghdad without his knowledge prior to his resignation in August 1998. However, as veteran spies point out, if they were, Ritter probably wouldn't have known. A number of sources interviewed by the Voice believe it possible that Special Collection Service personnel may have been operating undercover in Baghdad. According to a former high-ranking intelligence official, SCS was formed in the late 1970s after competition between the NSA's embassy-based eavesdroppers and the CIA's globe-trotting bugging specialists from its Division D had become counterproductive. While sources differ on how SCS works≠ some claim its agents never leave their secret embassy warrens where they perform close- quarters electronic eavesdropping, while others say agents operate embassy- based equipment in addition to performing riskier "black-bag" jobs, or break- ins, for purposes of bugging≠ "there's a lot of pride taken in what SCS has accomplished," the former official says. Intriguingly, the only on-the-record account of the Special Collection Service has been provided not by an American but by a Canadian. Mike Frost, formerly of the Communications Security Establishment≠ Canada's NSA equivalent≠ served as deputy director of CSE's SCS counterpart and was trained by the SCS. In a 1994 memoir, Frost describes the complexities of mounting "special collection" operations≠ finding ways to transport sophisticated eavesdropping equipment in diplomatic pouches without arousing suspicion, surreptitiously assembling a device without arousing suspicion in his embassy, technically troubleshooting under less than ideal conditions≠ and also devotes considerable space to describing visits to SCS's old College Park headquarters. "It is not the usual sanitorium-clean atmosphere you would expect to find in a top-secret installation," writes Frost. "Wires everywhere, jerry-rigged gizmos everywhere, computers all over the place, some people buzzing around in three- piece suits, and others in jeans and t-shirts. [It was] the ultimate testing and engineering centre for any espionage equipment." Perhaps one of its most extraordinary areas was its "live room," a 30-foot-square area where NSA and CIA devices were put through dry runs, and where engineers simulated the electronic environment of cities where eavesdroppers are deployed. Several years ago, according to sources, SCS relocated to a new, 300-acre, three- building complex disguised as a corporate campus and shielded by a dense forest outside Beltsville, Maryland. Curious visitors to the site will find themselves stopped at a gate by a Department of Defense police officer who, if one lingers, will threaten arrest. There are good reasons, explains an old NSA hand, for havingelectronic ears on terra firma in addition to satellites. "If you're listening to something from thousands of miles up, the footprint to sort through is so huge, and finding what you are looking for is not a simple chore. If you know more or less specifically what you want, it's easier to get it in close proximity. And if it happens to be a low-powered signal, it may not travel far enough." According to two sources familiar with intelligence activity in Iraq, the U.S. may have been aided by information delivered either to UNSCOM or SCS from Ericsson, the Swedish telecommunications firm. It's not an unreasonable assumption; though Ericsson brushes off questions about it, in 1996 a Middle Eastern businessman filed suit against the company, claiming, among other things, that it had stiffed him on his commission for brokering a deal between the Iraqis and Ericsson for sensitive defense communications equipment, which, reportedly, included encrypted cell phones. Speaking on condition of anonymity, a veteran intelligence official confirmed that the NSA has "arrangements" with other communications firms that allow NSA to access supposedly secure communications, but cooperation from Ericsson would be "a breakthrough≠ despite our best efforts, they always kept their distance. But it's not beyond the realm of possibility." (This is not without precedent; though hardly covered in the American press, it has been reported that Switzerland's Crypto AG≠ long the supplier of cipher equipment to many of the world's neutral and "rogue" states≠ enjoyed such an "arrangement" with the NSA for decades. Crypto AG denies this.) There is, however, another possible scenario regarding participation by Ericsson in an intelligence venture. According to FAS analyst Pike, it's much more likely that anyone doing intelligence work in Iraq would want a schematic of Baghdad's telephone system≠ which Ericsson installed in the late '60s and has subsequently updated. "I would find it to be far more plausible that the U.S. intelligence community would be interested in acquiring, and Ericsson would be interested in supplying, the wiring diagram for Baghdad's telephone exchange than encryption algorithms for cell phones," he says. Also, he explains, finding ways to tap into a whole phone system or pull short-range signals out of the air without being obvious is clearly SCS's portfolio. "This type of risky close surveillance is what SCS was formed to do," he says. "When you think of NSA, you think satellites. When you think CIA, you think James Bond and microfilm. But you don't really think of an agency whose sole purpose is to get up real close and use the best technology there is to listen and transmit. That's SCS." Regarding any possible collaboration in Iraq with SCS or UNSCOM, Kathy Egan, Ericsson spokesperson, said she had no information on such an operation, but if there was one, "It would be classified and we would not be able to talk about it." It's also possible, according to Mike Frost, that cleverly disguised bugs might have been planted in Baghdad≠ SCS, he recalls, managed to listen in on secured facilities by bugging pigeons. But, says a retired CIA veteran, with UNSCOM effectively dead, bugging is now out of the question. "I hope the take from this op," he says, "was worth losing the only access the outside world's disarmament experts had to Iraq." ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 10592 From: Thomas Kellar Date: Thu Jan 13, 2005 8:34am Subject: Re: GPS tracking system signal inhibitors I would assume buying, selling and owning would probably not be a problem. Using it would be the problem. phrack.org has a design of a gps jammer on their web site. I am not sure if it works as advertised. On Wed, 12 Jan 2005, Guy Urbina wrote: > Would these proposed devices be illegal to own or sell? Right now they are > bench prototypes. -- w8twk Freelance Systems Programming http://www.fsp.com 10593 From: Michael Hammer Date: Thu Jan 13, 2005 9:21am Subject: Re: Ruling gives cops leeway with GPS The answer Greg, is that the issue is about where we as a society draw the lines (and who should draw them) rather than whether something is currently legal (or illegal) because of an administrative decision, a lower court decision, etc. I'm a lifelong Goldwater Republican (no Neocon here) and proud of it. Barry would be rolling over in his grave! As someone who handles computer security issues, I work with LEOs at various levels across a wide range of issues. Sometimes it's something I bring them and sometimes it's because they approach us (formally with a subpeona or search warrant and sometimes informally). Some of the hoops we all jump through for the legalities are just plain silly. Still, when all is said and done, as a citizen I would prefer to see some bad guys go free than trample on the privacy and rights of the average person by eliminating those hoops. I've lived and worked in countries where survelliance by the government is an everyday thing and it's not something I would like to see here. I give up a certain amount of personal privacy because of the nature of the work I do. That is a choice I make at an individual level. Your focus is on the technical nuances rather than the societal and ethical issues. Your job is to catch bad guys. Your preference is for things to be structured to make it easier for you to do your job. When you attach a GPS tracking device to something, it doesn't know the difference between publicly accessible places and private property. It's an idiot savant tool. Where you stand depends on where you sit. Some books which might help better frame the issues for you include: "World without Secrets" By Richard Hunter (Gartner Analyst, don't hold it against him ) A quick synopsis can be found at http://www.csoonline.com/analyst/report230.html You could also try reading some of Bruce Schneiers writings (If you ever have the chance to see Bruce present, he is an awesome mind) Some of his essays/op ed pieces can be found at: http://www.schneier.com/essays.html To put his writings in perspective, Bruce has a long track record in the security field, specifically in crypto. Mike On Wed, 12 Jan 2005 19:37:45 -0800, Greg Horton wrote: > > > Michael Hammer wrote: > > > By that logic, I should just be able to break into (and wipe out) an > > internet host that is being used to do bad things. We will get it shut > > down/confiscated anyways by going through the legal steps so why not > > just cut to the chase. As tempting as that may be, I understand the > > reasons we have limitations. > > > > Just because something can be done doesn't mean it should be done. > > Requiring a court order is a check/balance on the activities involved. > > > > Mike > > > > Holy Smokes Mike, what a leap of logic you make. How on earth do you > > make a connection between following someone on a public thoroughfare > > and comitting a burglary and then committing an additional crime of > > wiping the computer clean. Talk about a non sequitur. There is no > > requirement for a court order and case law has reaffirmed this > > technique by the police. If you are that concerned about this type of > > operation, maybe you should spearhead a movement to pass appropriate > > legislation. > > Greg > 10594 From: Hawkspirit Date: Thu Jan 13, 2005 11:43am Subject: Ruling gives cops leeway with GPS I think the ruling stinks but it is good for business as long as you are competent at sniffing out GPS units. And let me say, it is sometimes it is no easy task. Roger Tolces HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com Message: 1 Date: Wed, 12 Jan 2005 04:16:19 -0800 (PST) From: G P Subject: Re: Ruling gives cops leeway with GPS Because anybody and everybody can now fix up your car with a GPS unit, without fear of civil or criminal prosecution. This court precedent puts very dangerous technology into the hands of the proletariat, without any form of checks and balances. Wait until somebody wires up your wife's car for sound, and you'll have a slightly different opinion about tracking technology. --- Greg Horton wrote: > > -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.6.10 - Release Date: 1/10/2005 [Non-text portions of this message have been removed] 10595 From: Tech Sec Lab Date: Thu Jan 13, 2005 5:44pm Subject: Pentagon [OT] Well, I hadn't seen this until today. I can say this, it wasn't a 757. That's for sure. http://www.freedomunderground.org/memoryhole/pentagon.php Tragic that the truth will never be known. 10596 From: littledog Date: Thu Jan 13, 2005 3:10pm Subject: Re: Ruling gives cops leeway with GPS anybody, what was that website again that sells a small GPS blocker for your car? I accadently deleted that info. Thanx> -----Original Message----- > From: Hawkspirit [mailto:hawkspirit@e...] > Sent: Thursday, January 13, 2005, 9:43 AM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Ruling gives cops leeway with GPS > > > > > I think the ruling stinks but it is good for business as long as you are > competent at sniffing out GPS units. And let me say, it is sometimes it is > no easy task. > > > > Roger Tolces > > HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com > > > > Message: 1 > > Date: Wed, 12 Jan 2005 04:16:19 -0800 (PST) > > From: G P > > Subject: Re: Ruling gives cops leeway with GPS > > > > Because anybody and everybody can now fix up your car > > with a GPS unit, without fear of civil or criminal > > prosecution. This court precedent puts very dangerous > > technology into the hands of the proletariat, without > > any form of checks and balances. > > > > Wait until somebody wires up your wife's car for > > sound, and you'll have a slightly different opinion > > about tracking technology. > > > > --- Greg Horton wrote: > > > > > > > > > > > > > -- > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.6.10 - Release Date: 1/10/2005 > > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10597 From: Michael Puchol Date: Thu Jan 13, 2005 6:42pm Subject: Re: Pentagon [OT] I have to say I got sick and tired of footage of a 747 viewed from the ground being shown on the news as "the aircraft heading towards the Pentagon, seconds before impact". The big question after this presentation then is: where did Flight 77 go? The impact explosion footage appears to be of one petrolleum-fuelled, and I don't suppose the Pentagon stores large amounts of gas for internal use on their premises... Aircraft are made mainly of aluminium, which means that when one is completely driven into something, and it combusts, not much is left of it. The pictures of wreckage show are of crashes that had fire crews put out the flames and what is left, mainly struts and thicker structure. The engines tend to survive quite well too, as they are made from titanium, so they should have been in there somewhere. An engine travelling at a few hundred miles per hour can drive quite a distance into a building. If you notice in the Trade Center footage of the second plane hit, one of the engines completely crosses the building and shoots out the opposite end. The combustion is very similar to the one observed in the Pentagon. I'm not saying it's impossible that the whole truth hasn't come out, but I seriously doubt they drove a smaller plane (too much damage for that) or a land vehicle (ground marks?) into it. Regards, Mike Tech Sec Lab wrote: > Well, I hadn't seen this until today. > > I can say this, it wasn't a 757. That's for sure. > > http://www.freedomunderground.org/memoryhole/pentagon.php > > Tragic that the truth will never be known. > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > 10598 From: Agent Geiger Date: Thu Jan 13, 2005 6:46pm Subject: Re: Pentagon [OT] How about demo charges in the building already? --- Michael Puchol wrote: > I have to say I got sick and tired of footage of a > 747 viewed from the > ground being shown on the news as "the aircraft > heading towards the > Pentagon, seconds before impact". The big question > after this > presentation then is: where did Flight 77 go? The > impact explosion > footage appears to be of one petrolleum-fuelled, and > I don't suppose the > Pentagon stores large amounts of gas for internal > use on their premises... > > Aircraft are made mainly of aluminium, which means > that when one is > completely driven into something, and it combusts, > not much is left of > it. The pictures of wreckage show are of crashes > that had fire crews put > out the flames and what is left, mainly struts and > thicker structure. > The engines tend to survive quite well too, as they > are made from > titanium, so they should have been in there > somewhere. An engine > travelling at a few hundred miles per hour can drive > quite a distance > into a building. If you notice in the Trade Center > footage of the second > plane hit, one of the engines completely crosses the > building and shoots > out the opposite end. The combustion is very similar > to the one observed > in the Pentagon. > > I'm not saying it's impossible that the whole truth > hasn't come out, but > I seriously doubt they drove a smaller plane (too > much damage for that) > or a land vehicle (ground marks?) into it. > > Regards, > > Mike > > > Tech Sec Lab wrote: > > Well, I hadn't seen this until today. > > > > I can say this, it wasn't a 757. That's for sure. > > > > > http://www.freedomunderground.org/memoryhole/pentagon.php > > > > Tragic that the truth will never be known. > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > > > =================================================== > TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - now with 250MB free storage. Learn more. http://info.mail.yahoo.com/mail_250 10599 From: Greg Horton Date: Thu Jan 13, 2005 8:07pm Subject: Re: Ruling gives cops leeway with GPS Michael Hammer wrote: > > The answer Greg, is that the issue is about where we as a society draw > the lines (and who should draw them) rather than whether something is > currently legal (or illegal) because of an administrative decision, a > lower court decision, etc. > > I'm a lifelong Goldwater Republican (no Neocon here) and proud of it. > Barry would be rolling over in his grave! > > As someone who handles computer security issues, I work with LEOs at > various levels across a wide range of issues. Sometimes it's something > I bring them and sometimes it's because they approach us (formally > with a subpeona or search warrant and sometimes informally). Some of > the hoops we all jump through for the legalities are just plain silly. > Still, when all is said and done, as a citizen I would prefer to see > some bad guys go free than trample on the privacy and rights of the > average person by eliminating those hoops. I've lived and worked in > countries where survelliance by the government is an everyday thing > and it's not something I would like to see here. I give up a certain > amount of personal privacy because of the nature of the work I do. > That is a choice I make at an individual level. > > Your focus is on the technical nuances rather than the societal and > ethical issues. Your job is to catch bad guys. Your preference is for > things to be structured to make it easier for you to do your job. When > you attach a GPS tracking device to something, it doesn't know the > difference between publicly accessible places and private property. > It's an idiot savant tool. > > Where you stand depends on where you sit. Some books which might help > better frame the issues for you include: > > "World without Secrets" By Richard Hunter (Gartner Analyst, don't hold > it against him ) A quick synopsis can be found at > http://www.csoonline.com/analyst/report230.html > > You could also try reading some of Bruce Schneiers writings (If you > ever have the chance to see Bruce present, he is an awesome mind) Some > of his essays/op ed pieces can be found at: > http://www.schneier.com/essays.html To put his writings in > perspective, Bruce has a long track record in the security field, > specifically in crypto. > > Mike > > Good points Mike, but once again, it is a position that is framed by where you sit. I have been working in law enforcement for 30+ years and I think that the issues for me are framed clearly. You imply that we are all running out and randomly putting trackers on hundreds of people, mostly innocent. Once again, I would submit that even though the tracker is inexpensive to operate, It still does require money to purchase and monitor. But I also said that the tracker is only a very small part of the investigation, and can identify only patterns that the individuals may establish. If I see that Jack is going to the corner of Elm and Birch three times a day, I still have to put that location under surveillance and actually see if there is any crime involved. If a crime was observed, I would still need search warrants to search the car or any house I could establish was involved in the criminal act. Then arrest warrants would be in order, or maybe an arrest for a crime in progress. But to say that cops are wantonly placing placing devices on any Tom, Dick, or Harry is patently false. I read the article in the first website, and although it addresses surveillance issues, it doesn't really talk about putting trackers on cars. I also read "Curb electronic surveillance abuses." by Bruce Schneier and it was interesting and I can agree with his stressing that court issued warrants are a vital part of keeping our nation free. But I just don't think that it applies to the trackers put on vehicles in public places. Would you object to me putting a small IR beacon on the back of a car to follow at night with NVG's? That has been done before. Even Bruce Schneier says that It has always been possible for the police to tail a suspect, and wireless tracking is decades old. The only difference is that it's now much easier and cheaper to use the technology. And goes on to say that: Surveillance will continue to become cheaper and easier -- and less intrusive. (Quotes retrieved from: http://www.schneier.com/essay-043.html ) I think that the "less obtrusive" is the key here. Even though cops use trackers, the case doesn't solve itself and it still requires the use of good old fashioned police work to put a case together. Any way, that is my opinion. I want to thank you Mike for this excellent discussion and for you not engaging in the ad hominem attacks like others on this list. It is a pleasure to discuss very important issues with you. Greg [Non-text portions of this message have been removed] 10600 From: Date: Fri Jan 14, 2005 5:23am Subject: RE: GPS tracking system signal inhibitors Gentlemen, Obviously using such a device would be highly illegal. With a CW signal and 50 mW of RF power the jammer could be easily tracked within 1km using a conventional DF or even "fox hunt" handheld DF (By the way Cubic makes such DF with a similar application in mind). But more elegant jammers do exist. They use low power composite pulse signals. These jammers are practically not detectable from a distance more than 10 meters even with a dedicated equipment. For further technical details ask CIA or KGB. They have developed these devices for their respective diplomats. By the way even with CW signal you do not need 50 mW RF power to jam GPS receiver. For a SiRF and similar direct conversion receiver 50 microwatts would be enough. Even old Rockwell Navcore can be disabled with 5 mW. Well, this is not a "do it yourself" site as our moderator would say so I am closing down. Regards, A.W. Guy Urbina wrote: > > >Hi all, > >With all the recent chatter about GPS tracking, what are the legal >ramifications of owning or selling a small GPS signal inhibitor? > >With the proliferation of GPS trackers seemingly ubiquitous, it seems like >a good idea to prevent unauthorized people from tracking your movements in >a vehicle. > >I've fabricated a few small devices that transmit a CW carrier under 50mw >in the L1 frequency range. (1575.42Mhz) It effectively overdrives the front >end of COTS GPS receivers.(Garmin, SIRF, Motorola etc.) (Most trackers use >L1 receivers in their systems) > >Within a 10' radius, it effectively prevents a GPS receiver from locking on >to get a position fix. Other than getting FCC type approval certification, > >Would these proposed devices be illegal to own or sell? Right now they are >bench prototypes. > >I appreciate any constructive feedback. > >\R > >-Guy > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > __________________________________________________________________ Switch to Netscape Internet Service. As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register Netscape. Just the Net You Need. New! Netscape Toolbar for Internet Explorer Search from anywhere on the Web and block those annoying pop-ups. Download now at http://channels.netscape.com/ns/search/install.jsp 10601 From: Javier Villanueva Date: Fri Jan 14, 2005 8:05am Subject: Icom IC-R3 and R20 Hi List, I¥ve been trying unsuccesfully to buy this equipment Online. All of the shops i¥ve found replied they are "out of stock". If any of you sell these, offer "Special modified versions", or know where to find them, i¥ll be grateful. Payment by credit card and express delivery to Mexico a big plus. Most probably this will be just the first buy, with more to come. Thank you very much guys. ===== Javier Villanueva C. Vcorp & Asociados Contraespionaje ElectrÛnico y Seguridad Inform·tica Tel. 01 (33) 36 19 47 09 cel. 044 333 392 64 50 msm. javier_vc@h... __________________________________ Do you Yahoo!? Yahoo! Mail - now with 250MB free storage. Learn more. http://info.mail.yahoo.com/mail_250 10602 From: Javier Villanueva Date: Fri Jan 14, 2005 8:08am Subject: Icom ICR3 and ICR20, detail Sorry, on the previous mail i forgot to tell you i was referring to the "unblocked" or "Non-USA" version, without the cellular gap. Thanks again. ===== Javier Villanueva C. Vcorp & Asociados Contraespionaje ElectrÛnico y Seguridad Inform·tica Tel. 01 (33) 36 19 47 09 cel. 044 333 392 64 50 msm. javier_vc@h... __________________________________ Do you Yahoo!? Yahoo! Mail - Easier than ever with enhanced search. Learn more. http://info.mail.yahoo.com/mail_250 10603 From: delta Date: Fri Jan 14, 2005 8:57am Subject: question about border hello everybody do you know if it is legal to pass the border with some tscm equipment ( cpm700 oscor tdr etc ... ) or if we need a special authorisation to go outside our country ? may be the rules are different between some country ? many thanks david from paris 10604 From: contranl Date: Fri Jan 14, 2005 4:30pm Subject: Infrared Indicators ( credit card size) . Ran in to this manufacturer of credit card sized infrared indicators...maybe they are usefull for anything ? there's a short demo-video too. http://www.bromba.com/indicare.htm I suppose they need a fair bit of illumination Possibly usefull for : a) Detecting laserbeams ( i would say yes ...since they are concentrated beams with sufficient power left over at your end, best would be a card with as big as possible active area,) b) Detecting infrared illuminators for cameras ( i would say yes ...when you are close enough) c) Detecting infrared mics/bugs using infrared light to transport the audio/video ( you need to be very close to the bug to get enough level i guess) Kodak also makes similar cards and bigger sheets Infrared/Nightvision/Thermal-imagers would do too...probably better. Greets Tetrascanner 10605 From: contranl Date: Fri Jan 14, 2005 4:59pm Subject: Re: question about border . It depends on the local laws of the country you want to enter and the one you want to come back to. You might just ask/phone the customs office at the border. A rule of thumb could be that you consider your equipment as a radio-scanner (if it's a wideband receiver for example) In Belgium for example it is forbidden to have/possess/use a scanner therefore you could conclude that any equipment that could do the same could be forbidden too. In some countries they used to lock you up for bringing a satellite-phone...you had to ask special permission to bring that. To go one step further (overdoing it) you can't bring your NLJD to The Netherlands if it works (transmits)on a non-permitted frequency wich many do To go even one more step further...your equipment might be on the list of "strategic goods" usually that list refers to high level advanced stuff...for example a laser gyroscope or a wideband 100 watt jammer...not the regular TSCM equipment :) Many times they just care about the taxes being paid...so a piece of paper issued by your country's custom-tax-office could be sufficient just make shure you go in and out with the same amount of equipment. Anyway you can't ask this question in general because there is no general answer to it,it all depends on the local authorities and sometimes even on who's on service that day. The above is a little overstated and my advice again would be just ask them ! Tetrascanner 10606 From: Robin Hunter Date: Fri Jan 14, 2005 11:21am Subject: Re: question about border Hi David, depends where you are going, in Russia and a number of former Soviet Bloc countries Customs will impound your equipment and you will probably never see it again, similar problem in a number of African and Middle East countries.. Most western european countires - no problem. Regards from Scotland, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. ----- Original Message ----- From: "delta" To: Sent: Friday, January 14, 2005 2:57 PM Subject: [TSCM-L] question about border > > > hello everybody > do you know if it is legal to pass the border with some tscm equipment ( cpm700 oscor tdr etc ... ) or if we need a special > authorisation to go outside our country ? > may be the rules are different between some country ? > many thanks > david from paris > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 10607 From: Michael Hammer Date: Fri Jan 14, 2005 1:31pm Subject: Re: Ruling gives cops leeway with GPS On Thu, 13 Jan 2005 18:07:29 -0800, Greg Horton wrote: > > > > > Good points Mike, but once again, it is a position that is framed by > where you sit. I have been working in law enforcement for 30+ years and > I think that the issues for me are framed clearly. And that's my point exactly. The issues are framed for you because it impacts you both as a citizen but more importantly as a law enforcement professional. Someone from the Center for Democracy and Technology (www.cdt.org) would almost certainly be against the use of GPS trackers under almost any circumstance. >You imply that we > are all running out and randomly putting trackers on hundreds of people, > mostly innocent. Absolutely not. What I am explicitly stating is that the potential for abuse is there and checks and balances are appropriate as new technology is introduced. One need only read the Federalist papers to see that our founding fathers basically distrusted government power and structured things to limit government power. Who would have thought an Attorney General (John Mitchell) of the United States would go to prison for acts committed while in office? >Once again, I would submit that even though the > tracker is inexpensive to operate, It still does require money to > purchase and monitor. But I also said that the tracker is only a very > small part of the investigation, and can identify only patterns that the > individuals may establish. If I see that Jack is going to the corner of > Elm and Birch three times a day, I still have to put that location under > surveillance and actually see if there is any crime involved. If a > crime was observed, I would still need search warrants to search the car > or any house I could establish was involved in the criminal act. Then > arrest warrants would be in order, or maybe an arrest for a crime in > progress. But to say that cops are wantonly placing placing devices on > any Tom, Dick, or Harry is patently false. > Again, I'm not saying that they are.... I'm saying that there are enough documented cases of individuals trusted with law enforcement abusing capabilities they are entrusted with that this is an issue (both generally and in the specific case of GPS) that deserves a wider discussion and consensus as to where the boundaries should be. We will either get a clear (national) line if this and other cases make it up the food chain to the Supremes or if there is a legislative resolution (going forward). I would put the question to you.... if placing tracking devices on ALL vehicles makes your job easier, why would anyone object? After all, people that have nothing to hide shouldn't care. Clearly, people that have OnStar in their vehicles are willing to allow themselves to be tracked. > I read the article in the first website, and although it addresses > surveillance issues, it doesn't really talk about putting trackers on > cars. I also read "Curb electronic surveillance abuses." by Bruce > Schneier and it was interesting and I can agree with his stressing that > court issued warrants are a vital part of keeping our nation free. But > I just don't think that it applies to the trackers put on vehicles in > public places. Would you object to me putting a small IR beacon on the > back of a car to follow at night with NVG's? That has been done > before. Even Bruce Schneier says that > The article on the first site ( re World without Secrets) doesn't cover as much territory as the book. I highly recommend reading the book even though I disagree with many of his conclusions. It frames the discussion and issues fairly well. As far as a small ir beacon, I would have to think about that and possibly do some research to formulate a position on it. My first reaction would tend towards thinking this should require a court order on the basis that you are doing something to the individuals property in order to track them. This is one of those grey areas as far as I'm concerned. Take a step back and let's frame the issues in the broadest sense. What we (as a society) are really struggling with is how to deal with new capabilities arising from new technologies. What is appropriate and what is inappropriate? Why should we choose one dividing line vs another? On one level, I obviously don't care about personal privacy vis-a-vis the government because more than one government agency has detailed information about me including biometrics/dna....all given up as part of the employment process. As a LEO you would probably have a difficult time getting that data if you could find it at all. On another level I care very much about giving up personal data including surveillence. Just because someone can use a satellite to watch me sit by my lake naked doesn't mean it's a good thing (ugly thing that I am I'd probably crack the lense anyways). > It has always been possible for the police to tail a suspect, and > wireless tracking is decades old. The only difference is that it's now > much easier and cheaper to use the technology. > > And goes on to say that: > > Surveillance will continue to become cheaper and easier -- and less > intrusive. (Quotes retrieved from: > http://www.schneier.com/essay-043.html ) > > I think that the "less obtrusive" is the key here. Even though cops use > trackers, the case doesn't solve itself and it still requires the use of > good old fashioned police work to put a case together. Any way, that is > my opinion. I want to thank you Mike for this excellent discussion and > for you not engaging in the ad hominem attacks like others on this > list. The key quote from Bruces article is really his parting thought. "Much of the rhetoric on the "security" side of the debate cloaks one of its real aims: increasing law enforcement powers by decreasing its oversight and accountability. It's a very dangerous road to take, and one that will make us all less secure. The more surveillance technologies that require a warrant before use, the safer we all are." Here's another related issue for you Greg. Check out this link and tell me what you think (I have a feeling I know where you will come down on this).... http://www.capecodonline.com/cctimes/dnasweep6.htm This (DNA Sweep) deeply troubles me on a couple of levels, particularly the following quote: "Police say it's a voluntary thing, but they will take note of the dissenters. " So, once someone has given up their DNA sample for this specific case (let's assume voluntarily), what will be done with it once they are found not to be the person involved? Will the information be discarded? Absolutely not, that would be destruction of evidence and the defense attorney (assuming someone is brought to trial) would have a field day. So this will in essence become part of a government controlled database and subject to other uses. Do the people involved really know (perhaps they don't understand or care) the extent of the personal information they are giving up? >It is a pleasure to discuss very important issues with you. Likewise. Time to get some work done. Mike 10608 From: Michael Angelo Date: Fri Jan 14, 2005 2:27pm Subject: Re: question about border cowboy delta wrote: hello everybody do you know if it is legal to pass the border with some tscm equipment ( cpm700 oscor tdr etc ... ) or if we need a special authorisation to go outside our country ? may be the rules are different between some country ? many thanks david from paris ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? The all-new My Yahoo! ñ Get yours free! [Non-text portions of this message have been removed] 10609 From: Dragos Ruiu Date: Fri Jan 14, 2005 7:02pm Subject: Intersting doodad: Bumblebee Wireless spectrum analyzer.... Anyone used one of these and care to share any experience: http://www.bvsystems.com/Products/WLAN/BumbleBee/bumblebee.htm Looks like an interesting gadget, tough I haven't found out yet if they want a ridiculous amount of money for it. It would also be interesting to find out if they could produce a variant with a wider sweep range/more agile front end.... (I'm on a quest to find WLAN node directional locators... specifically to find out which out of a few hundred laptops in a big room has a particular mac address and is messing around to other's detriment...) thanks, --dr -- World Security Pros. Cutting Edge Training, Tools, and Techniques Vancouver, CanadaMay 4-6 2005 http://cansecwest.com pgpkey http://dragos.com/ kyxpgp 10610 From: Date: Fri Jan 14, 2005 4:53pm Subject: Re: question about border It's legal, but you might have trouble getting your equipment back in the US. Customs might think you just purchased it elsewhere. You need a customs form which shows you purchased it in the US , or had it already, and took it out of the country with you. You list mfgr, model number and serial number, etc. LARSEN and ASSOCIATES PRIVATE INVESTIGATIONS 18847 N. Alameda Drive Surprise, Arizona, 85387 ph/fax: 623-594-1783 [Non-text portions of this message have been removed] 10611 From: Hawkspirit Date: Fri Jan 14, 2005 10:36pm Subject: GPS Jammer HYPERLINK "http://www.phrack.org/phrack/60/p60-0x0d.txt"http://www.phrack.org/phrack/6 0/p60-0x0d.txt Does anyone know how to decode the schematic? Roger -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.6.12 - Release Date: 1/14/2005 [Non-text portions of this message have been removed] 10612 From: Charles Patterson Date: Fri Jan 14, 2005 10:47pm Subject: Re: Infrared Indicators ( credit card size) Radio Shack here in the US (do you have Radio Shack in the UK?) used to sell them (maybe they still do). If I recall, you had to "charge it up" by exposing it to a florescent light, then it would glow when ir shined on it. You did have to be pretty close to the source. Main purpose was to test your tv remote. Charles ----- Original Message ----- From: "contranl" To: Sent: Friday, January 14, 2005 5:30 PM Subject: [TSCM-L] Infrared Indicators ( credit card size) > > . > > Ran in to this manufacturer of credit card sized infrared > indicators...maybe they are usefull for anything ? > there's a short demo-video too. > > http://www.bromba.com/indicare.htm > > I suppose they need a fair bit of illumination > > Possibly usefull for : > > > a) > Detecting laserbeams ( i would say yes ...since they are > concentrated beams with sufficient power left over at your end, > best would be a card with as big as possible active area,) > > b) > Detecting infrared illuminators for cameras ( i would say > yes ...when you are close enough) > > c) > Detecting infrared mics/bugs using infrared light to transport the > audio/video ( you need to be very close to the bug to get enough > level i guess) > > > Kodak also makes similar cards and bigger sheets > > Infrared/Nightvision/Thermal-imagers would do too...probably better. > > > Greets > > Tetrascanner > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > > -------------------------------------------------------------------------------- > Yahoo! Groups Links > > a.. To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > b.. To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 10613 From: Andy Moore Date: Fri Jan 14, 2005 0:00pm Subject: Re: question about border David, at a guess, I'd imagine that there would be legal issues in crossing international borders with certain TSCM equipment. Many countries have regulations about possessing equipment which can receive frequencies other than broadcast and most will have rules relating to radio transmission equipment such as NLJDs. Standard ICT test equipment, such as multimeters and butt sets, probably wouldn't attract too much attention but spectrum analysers which reach into 10's of GHz might be subject to arms export regulations (!). All in all, you'd need to check with the countries into which you are importing the equipment - professional import/export handlers may be able to assist. In the face of these risks, you're unlikely to have any problems whatsoever travelling by road within the EU although airport x-rays may result in a detailed inspection by customs! Andy M ----- Original Message ----- From: "delta" To: Sent: Friday, January 14, 2005 2:57 PM Subject: [TSCM-L] question about border > > > hello everybody > do you know if it is legal to pass the border with some tscm equipment ( cpm700 oscor tdr etc ... ) or if we need a special > authorisation to go outside our country ? > may be the rules are different between some country ? > many thanks > david from paris > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10614 From: Andy Moore Date: Sat Jan 15, 2005 3:21am Subject: Fw: question about border > David, > at a guess, I'd imagine that there would be legal issues in crossing > international borders with certain TSCM equipment. Many countries have > regulations about possessing equipment which can receive frequencies other > than broadcast and most will have rules relating to radio transmission > equipment such as NLJDs. Standard ICT test equipment, such as multimeters > and butt sets, probably wouldn't attract too much attention but spectrum > analysers which reach into 10's of GHz might be subject to arms export > regulations (!). All in all, you'd need to check with the countries into > which you are importing the equipment - professional import/export handlers > may be able to assist. In the face of these risks, you're unlikely to have > any problems whatsoever travelling by road within the EU although airport > x-rays may result in a detailed inspection by customs! > > Andy M > > ----- Original Message ----- > From: "delta" > To: > Sent: Friday, January 14, 2005 2:57 PM > Subject: [TSCM-L] question about border > > > > > > > > hello everybody > > do you know if it is legal to pass the border with some tscm equipment ( > cpm700 oscor tdr etc ... ) or if we need a special > > authorisation to go outside our country ? > > may be the rules are different between some country ? > > many thanks > > david from paris > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > 10615 From: Michael Puchol Date: Sat Jan 15, 2005 5:03am Subject: Re: Intersting doodad: Bumblebee Wireless spectrum analyzer.... Hi, I've yet to either see one operating or know of someone that has one or has seen one operating. I believe this device to be more a stunt for the other products the company makes, than something tangible. The device is way too expensive (they charged twice the going price for the PDA alone, for example). If you need to do surveys like you mention, you can do with AirMagnet and a Cisco 350 card with MMCX antenna jacks - then you can connect a small 2.4GHz handheld yagi and attenuators to it, and do the hunting. AirMagnet costs some $2.5k last I looked, but it's quite an impressive little package, I have seen it operating and I have used it quite a few times myself. The BumbleBee does not demodulate data at all, which means that you cannot really tie a signal to a particular computer/MAC address without further manual inspection. With AirMagnet you can set a filter to capture only packets coming from a particular MAC address, and thus hunt for it in confidence. If you are not concerned about using commercial tools, you can flash an iPAQ with Linux and use the vast array of tools available for it. Regards, Mike Dragos Ruiu wrote: > > Anyone used one of these and care to share any experience: > > http://www.bvsystems.com/Products/WLAN/BumbleBee/bumblebee.htm > > Looks like an interesting gadget, tough I haven't found out > yet if they want a ridiculous amount of money for it. > > It would also be interesting to find out if they could produce a > variant with a wider sweep range/more agile front end.... > > (I'm on a quest to find WLAN node directional locators... > specifically to find out which out of a few hundred laptops > in a big room has a particular mac address and is messing > around to other's detriment...) > > thanks, > --dr > 10616 From: contranl Date: Sat Jan 15, 2005 5:34am Subject: Re: GPS Jammer . The complete and readable circuit and more other hot and iligal stuff used to be here: (i have seen it) http://www.dafh.org/gbppr/mil/gps/gps_jammer.png currently the're offline...maybe forever...(not necessarly when they were online it took a minute to see a page) Allthough i would'nt be surprised if they are really gone now The main page can still be found in google's cache: http://www.google.nl/search?q=cache:RiNkf9RKl- EJ:www.dafh.org/gbppr/mil/gps/+gps+jammer+png&hl=nl Maybe you can find it spending a few ours of research on the net possibly someone has copied it...try to put the properties of the links back in to google maybe it's cached somewhere Tetrascanner From: A Grudko Date: Sun Jan 13, 2002 4:11am Subject: Re: CELLULAR DETECTOR - Original Message - > MICRO-CELLULAR DETECTOR > Detection range: 5 Mhz - 2.6 Ghz Mmmm - more psudo technical "Janglish". Now I'm even more sceptical about the Star Tac scrambler. Sounds like a diode detector I had in the mid 80's, possibly crossed an RF cellphone ring detector. > ... risky 5 mhz to 2.5 ghz radio frequencies within reach ( hidden transmissions of > your conversations) created by your cellular telephone. I'd like to see a better explanation of the 'risk' before I fork out $480. > so that if the cellular phone emits a hidden hidden? > transmission of your > conversation, when it is in stand-by mode ( when it should not transmit > data) data? >, the Micro- Detector will adopt adopt? > the RF emitted by the cellular phone > This is an equipment that can detect and alert you about the most simple to > the most sofisticated tappings of cellular telephones as intruder microphones. Hey, jma, now you throw away most of those 2 tons of equipment > When the batteries of cellular telephones are removed during > meetings, this is no guarantee that the conversation that is taking place > is not being transmitted to a third party No battery? > since with today?s technology it > is very easy to place a microphone that transmitts at a distance of up to > 500 m. With the Micro- Detector you are able to confirm, after you have > removed the batteries, that no cellular phone is transmitting a > confidential conversation I think we can confirm that a cellphone with no power source is not transmitting without having to buy any toy. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4534 From: A Grudko Date: Sun Jan 13, 2002 11:56am Subject: Re: Re: Cellular Scramblers - Original Message - > Go to CDMA and you're safe from virtually anything not covered > by a Title III court order served on the service provider. More acronyms... Who or what are CDMA? Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time "Richard Milhouse Nixon was the first US president whose name contains all the letters from the word "criminal." The second? William Jefferson Clinton" 4535 From: Miguel Puchol Date: Sun Jan 13, 2002 2:45pm Subject: Re: Re: Cellular Scramblers Hi Andy, CDMA = Code Division Multiple Access. It's used in cellular systems in the U.S. Qualcomm is rumoured to have bought some of Dolphin's licenses for European TETRA, to install CDMA systems instead. They already use it in their GlobalStar satphone network - I think they designed it if my memory serves me right... Take a look at a simple comparison between TDMA (used by GSM for example) and CDMA at: http://home.san.rr.com/denbeste/cdmatdma.html All the best, Mike ----- Original Message ----- From: "A Grudko" To: Sent: Sunday, January 13, 2002 6:56 PM Subject: Re: [TSCM-L] Re: Cellular Scramblers > - Original Message - > > Go to CDMA and you're safe from virtually anything not covered > > by a Title III court order served on the service provider. > > More acronyms... Who or what are CDMA? > > Andy Grudko > D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 > International business intelligence and investigations - ICQ 146498943 > Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 > 0255 - 244 0256 (Fax) > SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom > When you need it done right - first time > "Richard Milhouse Nixon was the first US president whose name contains all > the letters from the word "criminal." The second? William Jefferson Clinton" > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4536 From: Justin T. Fanning Date: Sun Jan 13, 2002 3:44pm Subject: Re: Re: Cellular Scramblers I don't understand why the encryption isn't done in the phone's own software. Most modules offered by various companies approach from the analogue prospective, but when you consider the phone itself is a miniature computer, why aren't companies producing modified OS ROMs that encrypt after the speech encoding stage. It would take just a few extra CPU cycles to push the byte value of the encoded audio through a cypher. (Taken to the extreme, you could even have handsets exchanging keys at the beginning of each call!) Providing you didn't modify the GSM/CDMA packet structure only the packet payload, this would seem a far more secure & simplistic approach than external analogue hardware. JF 4537 From: James M. Atkinson Date: Sun Jan 13, 2002 11:19pm Subject: Re: Re: Cellular Scramblers The problem is two-fold. First of all, when you ENCRYPT a signal you are breaking it down into a digital form, then mixing in a "key" and in so doing profoundly changing both the nature and structure of the original signal. Then the encrypted data is converted back into it digital; form for transmission. The problem with encrypting the signal is that you loose bandwidth, and you can either take the performance hit, increase bandwidth, or perform some black magic to "fake out" the missing bandwidth. SCRAMBLING on the other hand does not profoundly change both the nature and structure of the original signal. Instead we add a signal, shift a signal, subtract a signal, sync a signal, or some variation thereof. In some cases of "advanced scrambling" we can chop up the signal in both the time and frequency domain, and then move the sequence around, but not actually change the structure of the content (just make it annoying to the eavesdropper). Now with cellular telephones simply swapping keys would do nothing more then amuse the eavesdropper. What you would have to do is preload each phone with a matching set of ciphering keys, then at the beginning of the call (and at several points during the call) the phones negotiate which keys they will use. Since no key is EVER transmitted over the air (only and index or key bank address number is used in the negotiation). Since the only two people or phones (we hope) have the matching key banks in the two phones, the two users should be a very high level of privacy. Next we need a strong ciphering algorithm (without backdoors), and a data stream randomizing engine just prior to, and just after the encryption engine. On top of these we need constantly refreshed ciphering keys issued by a trusted source, and kept under rigid security. All of this is expensive, complicated, and moderately time consuming. When people want secure communications they should go to their hardwired lines, and not use a phone with an antenna unless they have some wicked good ciphering (not SCRAMBLING... but ENCRYPTION). -jma At 9:44 PM +0000 1/13/02, Justin T. Fanning wrote: >I don't understand why the encryption isn't done in the phone's own >software. Most modules offered by various companies approach from the >analogue prospective, but when you consider the phone itself is a >miniature computer, why aren't companies producing modified OS ROMs >that encrypt after the speech encoding stage. It would take just a >few extra CPU cycles to push the byte value of the encoded audio >through a cypher. (Taken to the extreme, you could even have handsets >exchanging keys at the beginning of each call!) Providing you didn't >modify the GSM/CDMA packet structure only the packet payload, this >would seem a far more secure & simplistic approach than external >analogue hardware. > > >JF -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4538 From: A.Lizard Date: Sun Jan 13, 2002 4:32pm Subject: re: Cellular Scramblers At 08:44 PM 1/13/02 +0000, you wrote: >Message: 3 > Date: Sat, 12 Jan 2002 21:40:52 -0800 > From: Hawkspirit >Subject: Cellular Scramblers > >Anyone know how effective these scramblers are? > >CELLULAR SCRAMBLER > > > >SPECIFICATIONS >Circuit size: 50 mm ¥ 35 mm ¥ 5 mm >Audio range: 300 up to 3000 Hz >Telephone lines: Cellular >Consumption: 5 Vdc, 80 mA of the battery >Stand-by consumption: 5 Vdc, 80 mA of the battery > >Selling Price: $5800 >Prod. Code: HS-7000 > > > >Security level: III ( High security) >Hop rate: up to 150 times per second It would be more cost-effective for you to get a laptop, a cellular modem, and download a free copy of PGPfone from http://www.pgpi.org . You can decide for yourself whether or not the security level is better from the clear and explicit information presented there on how it works. The advice "don't bet your life on it" is appropriate in either the device you describe or the one I am suggesting you consider instead. Plus, of course, you can use the laptop to play Solitaire or run Excel or read this mailing list via modem connection from when you aren't transmitting SECRET messages. :-) A.Lizard ************************************************************************ new voicemail number,ask if you need it. Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 4539 From: William Knowles Date: Mon Jan 14, 2002 1:53am Subject: Re: Cellular Scramblers On Sat, 12 Jan 2002, Men in black helicopters forced Hawkspirit to write: > Anyone know how effective these scramblers are? > > CELLULAR SCRAMBLER > > SPECIFICATIONS > Circuit size: 50 mm ¥ 35 mm ¥ 5 mm > Audio range: 300 up to 3000 Hz > Telephone lines: Cellular > Consumption: 5 Vdc, 80 mA of the battery > Stand-by consumption: 5 Vdc, 80 mA of the battery > > Selling Price: $5800 > Prod. Code: HS-7000 > > This scrambling system is used by top entities and companies, > where nowadays information is the most valuable asset. > > These cellular scramblers are sold only by pairs. So effectively we're talking about $11,600? If you are going to pick two of these bad boys up, I have a friend selling airport concessions at Kandahar Airport. I hear rumblings that Afghanistan is supposed to be the next hot tourist destination! - WK *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 4540 From: David Alexander Date: Mon Jan 14, 2002 3:24am Subject: column titles for Steve How about "Is something bugging you ?" "Scope me in" "Don't sweep it under the carpet" "Sweep dreams" "News sweep" "For the recording" David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4541 From: Justin T. Fanning Date: Mon Jan 14, 2002 3:49am Subject: Re: re: Cellular Scramblers I was thinking along similar lines when I wrote my last post about modifying the on board software. It would be much simpler to wire a handheld/pocket PC running Windows CE (or similar) to a cell phone for use as an external (analogue) crypto device (and for a fraction of the cost of a dedicated unit). A cell phone & pocket PC would easily fit into the same pocket and used in conjunction with a personal hands free kit would look totally normal to any observer. Of course, if you are communicating only to known parties, you could dump the cell phone all together and get a PCMCIA cellular card (http://www.nokia.com/phones/cellularcard/index.html and http://www.nokia.com/phones/cardphone2_0/index.html) for your pocket PC and plug your personal hands free directly into the PC and simply establish GSM data calls between the pocket PC's using PGPfone or the voice over IP encryption software of your choice. I think it was commercially silly that Nokia didn't use an established OS in their 9110/9210 range of "communicator" phones, but instead went with a proprietary OS. I think it's only a matter of time until we see pocket pc's running Windows CE and other common OS's and cell phones merge, then strong mobile crypto will simply become the norm, making the whole concept of a cellular wiretap of limited use. You would still get the raw pen register & location data, but not the call audio. Once your already operating in the digital domain, adding a strong crypto engine is extremely easy and can of course all be done in software at little to no cost. Just before I finish, I note Nokia is about to release a phone with a built in digital camera, 640 x 480 still capture with store & forward capability the Nokia 7650 (http://www.nokia.com/phones/7650/index.html) I believe similar technology has been in use in Asia for some time, but this will be the first mainstream release of it in the west. I wonder if these will start turning up on sweeps concealed in other devices with modified lenses or used as the transport end of a remote camera setup... JF --- "A.Lizard" wrote: > > At 08:44 PM 1/13/02 +0000, you wrote: > >Message: 3 > > Date: Sat, 12 Jan 2002 21:40:52 -0800 > > From: Hawkspirit > >Subject: Cellular Scramblers > > > >Anyone know how effective these scramblers are? > > > >CELLULAR SCRAMBLER > > > > > > > >SPECIFICATIONS > >Circuit size: 50 mm ¥ 35 mm ¥ 5 mm > >Audio range: 300 up to 3000 Hz > >Telephone lines: Cellular > >Consumption: 5 Vdc, 80 mA of the battery > >Stand-by consumption: 5 Vdc, 80 mA of the battery > > > >Selling Price: $5800 > >Prod. Code: HS-7000 > > > > > > > >Security level: III ( High security) > >Hop rate: up to 150 times per second > It would be more cost-effective for you to get a laptop, a cellular modem, > and download a free copy of PGPfone from http://www.pgpi.org . You can > decide for yourself whether or not the security level is better from the > clear and explicit information presented there on how it works. The advice > "don't bet your life on it" is appropriate in either the device you > describe or the one I am suggesting you consider instead. > > Plus, of course, you can use the laptop to play Solitaire or run Excel or > read this mailing list via modem connection from when you aren't > transmitting SECRET messages. :-) > > A.Lizard > ************************************************************************ > new voicemail number,ask if you need it. > Personal Web site http://www.ecis.com/~alizard > Disaster prep info: http://www.ecis.com/~alizard/y2k.html > Littleton Killings: http://www.ecis.com/~alizard/littleto.html > backup address (if ALL else fails) alizard@o... > IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the > new version with the bug fixed is available NOW. > PGP 6.5.8 key available by request,keyserver,or on my Web site > For e-mail privacy, download PGP from http://www.pgpi.org > PGPfone v1.02 and v2.1 available for secure voice conferencing, get > your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ > ************************************************************************ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4542 From: Miguel Puchol Date: Mon Jan 14, 2002 10:23am Subject: Re: re: Cellular Scramblers Hi Justin, > Of course, if you are communicating only to known parties, you could > dump the cell phone all together and get a PCMCIA cellular card > (http://www.nokia.com/phones/cellularcard/index.html and > http://www.nokia.com/phones/cardphone2_0/index.html) for your > pocket PC and plug your personal hands free directly into the PC > and simply establish GSM data calls between the pocket PC's using > PGPfone or the voice over IP encryption software of your choice. That would be a nice setup - the problem I see is that PocketPCs (with the possible exception of the iPAQ) have rather limited processors and memory, and coding, scrambling, encrypting & sending audio via the network protocol stack (and viceversa) would probably make them spontaneously combust. In any case, the GSM encryption algorithm is reasonably secure for the average user, but as wisely pointed out, not against a court order (or unauthorised tap), or someone with enough resources. > I think it was commercially silly that Nokia didn't use an established > OS in their 9110/9210 range of "communicator" phones, but instead went > with a proprietary OS. I think it's only a matter of time until we > see pocket pc's running Windows CE and other common OS's and > cell phones merge, then strong mobile crypto will simply become the > norm, making the whole concept of a cellular wiretap of limited use. > You would still get the raw pen register & location data, but not the > call audio. Once your already operating in the digital domain, adding > a strong crypto engine is extremely easy and can of course all be done > in software at little to no cost. The Nokia 9210 uses a Crystal EPOC OS, which can be programmed via the free SDK provided by Nokia, which includes C++ and Java environments. Even so, this phone is also RAM and processor limited, so intensive tasks tend not to run too well. > Just before I finish, I note Nokia is about to release a phone with a > built in digital camera, 640 x 480 still capture with store & forward > capability the Nokia 7650 (http://www.nokia.com/phones/7650/index.html) > I believe similar technology has been in use in Asia for some time, > but this will be the first mainstream release of it in the west. I > wonder if these will start turning up on sweeps concealed in other > devices with modified lenses or used as the transport end of a remote > camera setup... Other solutions already exist for this, although more cumbersome. I expect any such unit found on a sweep will be a very nice and expensive gift :-) Cheers, Mike 4543 From: Hawkspirit Date: Mon Jan 14, 2002 11:39am Subject: Re: Theory (brought to mind by Comsec C3I discussion) Jim, As I have mentioned before I really don't care for digital test equipment for analog testing because of resolution losses due to quantizing. So my comment here are relative to my Tektronix 1503. It has been my experience with TDR, that the off hook steady state bias of 48 volts DC is the best case live line status for TDR measurement. At this time the 48 volts is a non interfering steady state DC bias. Inducing line current will not change the impedance parameters along the loop ( until it triggers the CO terminating card into off hook status) or improve TDR resolution. If you cross over into off hook status, then you have to deal with dial tone and source signals which is a problem. I don't know if taking fast time slice frames is really going to give you any resolution improvement. I currently don't have the capability to take triggered time slice measurements, but when I have used this technique it provided minimum resolution because of the shortness of interval. I prefer normal TDR real time renewal pulses and their averaging displays. As far as I know, termination card status will not radically effect the impedance vs distance line characteristic of the loop. A termination card is only a problem when it is sending back signals i.e. dial tone, voice, data. The only thing this technique (crossover measurement) might do is buy you better TDR resolution by limiting terminating card interference but I don't see how. You may shift the signal source impedance by activating the terminating card at the CO but once again, a TDR charts impedance at points of distance along the wire. Termination is but another impedance point to be described by its status at the time of measurement . Roger www.bugsweeps.com At 9:18 AM -0800 1/11/02, Hawkspirit wrote: >From: "James M. Atkinson" > >"What I am in interested in the electrical behavior of a line during >the loop relay seizing the line, and releasing it, and more >specifically the "overshoot" areas of the signal. >I am also interested in the frequencies that appear right at the >moments of making, and then of breaking the line." > >Jim, Could you amplify on this, what kind of line behavior, in what form of >result, would indicate what form of intercept? Thanks, Roger Sure, First I apply a slowly increasing resistance to the line until I seize the line. I repeat this several times until I have a fairly good calculation of the amount of current i need to get flowing to size the line, and the delay between the current draw and the seizure. I then sync my TDR to the circuit so that I start pounding the line with TDR pulse as I approach the seizing current. I then disregard the TDR pulses gathered just prior to the seize so that I am actually looking at TDR pulses during the zero crossing (when it should be really quiet). I can usually grab several hundred usable "pings" during the transition period, and have found it helpful for each "ping" to have a slightly offset rise/fall time or pulse width. The whole goal is to force a predictable zero crossing, and shoot pings into the line during the zero crossing. I start with a 5 pico second ping (using a high energy 90 volt tunnel diode), and slowly increase the rise time and/or pulse width to several milliseconds as I look down the line. I am not using a "sampling" circuit, but actually digitizing and capturing the TDR wave forms directly into a laptop in real time. This way I can see "mouse feces" laying against the wire, and can see any kind of resistive, inductive, or capacitive breach with some extreme resolution. The further down the line I am looking the less the resolution and the wider the pulses. If I can get two lines on the same cable I can ping on one line, and listen to the crosstalk of the signal on the other pair, I can also split the pairing and shoot them that way as well (while in transition). Either way the goal is to locate where the twisting of the pair has been compromised, and not just look for resistive faults. Most sweep methods are obsessed with finding resistive devices in series with the line, or some variation thereof. Sadly, the methods used to find resistive devices are worthless in finding something that is capacitively or inductively isolated (most professional eavesdropping devices are 10-40+ megaohms of impedance, or isolated in such a way that a regular TDR is worthless). The "virgin pair' vs "split pair" TDR will find any kind of inductive coupling on the line (of more then one loop), but you have to do it during the zero crossing. Inductive loading of less then one loop (such as in the case of a linear ferrite pickup) your going to have sweep more then the two wires your looking at (you need a total of four conductors, plus a good ground). Crosstalk analysis will detect any kind of separation or disturbance of the pairs of more then a mm, or even disturbance of the wire insulation (but you have to do it during the zero crossing). It's also helpful to "listen in" to the line with both an audio amp, AND a spectrum analyzer. After you have performed your regular non alerting phone sweep... disconnect the load (or phones), then "listen" to the line with a high impedance audio amp (like Kaisers 1059 or Alan's uAmp), then slowly tune something like the SCD-5 across the line. Next connect your AUDIO (100 Hz to about 10 kHz) spectrum analyzer to the line (though a transient limiter, impedance matching filter, and pre-amp) and look for any kind of control or command tones such as DTMF-C, 2100 Hz, etc (typically appearing as crosstalk). Then switch your your RF spectrum analyzer (though a transient limiter, impedance matching filter, and pre-amp) and look for any kind of RF present on the line. Hint: if someone attaches a transmitter to the line some of the RF will bleed back over the line and you will be able to see it.... however your going to have to "tune" the line to see it reliably. The determine how much current draw you need to seize the line card (remember the phone system works on current draw, not voltage) and bounce some TDR pulses down the line during the zero crossings to see what a regular wet line TDR might miss. The key in all of this is your ability to match the impedance of the line during the transition. This is not just a case of "cranking up the voltage", but one of "tuning up the TDR circuit" though a variable capacitor/varistor and resistor/inductor. You want a near perfect coupling between the TDR (or pulse generator) and the line. To look at it another way, consider that the line is an antenna, and you want a perfect impedance match between a radio, the feed line, and the antenna so you can maximize the signal your giving off or collecting. If you simply crank up your transmit power, but have a bad feed line all you will end of doing is heating up some wire. On the other hand if the feed line has a near perfect match to the radio, and the antenna has a near perfect mach to the feed line all kinds of wonderful things can be done. If you go one step further and fiddle with the antenna and use it at its precise resonant frequency you can work the world with just a small amount of power. Along the same lines if you filter out all the thunder-lizards, tune up your antenna, use good feed lines, and have a good LNA on the antenna you can hear extremely low poer things many thousands of miles away. Now, we take this and apply it to sweeping phone lines: First we find the "quietest time" on the line, which is during the transition point (the loop voltage and dial tone is our thunder lizard). Next we match the impedance of our TDR to the line impedance. Then we "tune" the line by bouncing TDR pulses down the line (with various pulse widths and rise times) while we tweak a capacitor/varactor for clean return (sort of like adjusting an SWR meter). The end result is a super precise series of pulses, clean TDR wave forms, and the exact position of anomalies along the line (including mouse feces touching the line). -jma 4544 From: James M. Atkinson Date: Mon Jan 14, 2002 1:38pm Subject: 2002 Darwin Awards It's that time again! The awards this year are classic. These awards are given each year to bestow upon (the remains of) that individual, who through single-minded self-sacrifice, has done the most to remove undesirable elements from the human gene pool. 5th RUNNER-UP Goes to a San Angelo, California man who died when he hit a lift tower at the Mammoth Mountain ski area while riding down the slope on a foam pad. The 22-year old David Hubal was pronounced dead at Central Mammoth Hospital. The accident occurred about 3a.m., the Mono County Sheriff's department said. Hubal and his friends apparently had hiked up a ski run called Stump Alley and undid some yellow foam protectors from lift towers, said Lt. Mike Donnelly of the Mammoth Lakes Police Department. The pads are used to protect skiers who might hit towers. The group apparently used the pads to slide down the ski slope and Hubal crashed into a tower. It has since been investigated and determined the tower he hit was the one with its pad removed. 4th RUNNER-UP Goes to Robert Puelo, 32, was apparently being disorderly in a St. Louis market. When the clerk threatened to call the police, Puelo grabbed a hot dog, shoved it into his mouth and walked out without paying. Police found him unconscious in front of the store. Paramedics removed the six-inch wiener from his throat where it had choked him to death. 3rd RUNNER-UP Goes to poacher Marino Malerba of Spain, who shot a stag standing above him on an overhanging rock and was killed instantly when it fell on him. 2nd RUNNER-UP "Man loses face at party." A man at a West Virginia party (probably related to the winner last year, a man in Arkansas who used the ..22 bullet to replace the fuse in his pickup truck) popped a blasting cap into his mouth and bit down, triggering an explosion that blew off his lips, teeth, and tongue. Jerry Stromyer, 24, of Kincaid, bit the blasting cap as a prank during the party late Tuesday night, said Cpl. M.D. Payne. "Another man had it in an aquarium hooked to a battery and was trying to explode it." "It wouldn't go off and this guy said I'll show you how to set it off." He put it into his mouth, bit down and it blew all his teeth out and his lips and tongue off, Payne said. Stromyer was listed in guarded condition Wednesday with extensive facial injuries, according to a spokesperson at Charleston Area Medical Division. "I just can't imagine anyone doing something like that," Payne said. 1st RUNNER-UP Doctors at Portland University Hospital said an Oregon man shot through the skull by a hunting arrow is lucky to be alive and will be released soon from the hospital. Tony Roberts, 25, lost his right eye last weekend during an initiation into a men's rafting club, Mountain Men Anonymous (probably known now as Stupid Mountain Men Anonymous) in Grant's Pass, Oregon. A friend tried to shoot a beer can off his head, but the arrow entered Robert's right eye. Doctors said that had the arrow gone 1 millimeter to the left, a major blood vessel would have been cut and Roberts would have died instantly. Neurosurgeon Doctor Johnny Delashaw at the University Hospital in Portland said the arrow went through 8 to 10 inches of brain with the tip protruding at the rear of his skull, yet somehow managed to miss all major blood vessels. Delashaw also said that had Roberts tried to pull the arrow out on his own he surely would have killed himself. Roberts admitted afterwards that he and his friends had been drinking that afternoon. Said Roberts, "I feel so dumb about this." No charges have been filed, but the Josephine County district attorney's office said the initiation stunt is under investigation. Now THIS YEAR'S WINNER. (The late) John Pernicky and his friend, (the late) Sal Hawkins, of th great State of Washington, decided to attend a local Metallica concert at the George Washington amphitheater. Having no tickets (but having had 18 beers between them), they thought it would be easy to "hop" over the nine foot fence and sneak into the show. They pulled their pickup truck over to the fence and the plan was for Mr. Pernicky, who was 100-pounds heavier than Mr. Hawkins) to hop the fence and then assist his friend over. Unfortunately for (the late) Mr. Pernicky, there was a 30-foot drop on the other side of the fence. Having heaved himself over, he found himself crashing through a tree. His fall was abruptly halted (and broken, along with his arm) by a large branch that snagged him by his shorts. Dangling from the tree with a broken arm, he looked down and saw some bushes below him. Possibly figuring the bushes would break his fall, he removed his pocket knife and proceeded to cut away his shorts to free himself from the tree. Finally free, Mr. Pernicky crashed into holly bushes. The sharp leaves scratched his ENTIRE body and now, without the protection of his shorts, a holly branch penetrated his rectum. To make matters worse, on landing, his pocket knife penetrated his thigh. Mr. Hawkins, seeing his friend in considerable pain and agony, threw him a rope. Intended pull him to safety by tying the rope to the pickup truck and slowly driving away. However, in his drunken haste/state, he put the truck into reverse and crashed through the fence landing on his friend and killing him. Police arrived to find the crashed pickup with its driver thrown 100 feet from the truck and dead at the scene from massive internal injuries. Upon moving the truck, they found John under it half-naked, scratches on his body, a holly stick in his rectum, a knife in his thigh, and his shorts dangling from a tree branch 25-feet in the air. ... Congratulations gentlemen, you win... -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4545 From: James M. Atkinson Date: Mon Jan 14, 2002 9:17pm Subject: Estimate Worksheet Updated For those list members who are interested in such things... I have just updated and uploaded our current "Estimate Worksheet" to the website, and would be happy to get comments and feedback from the list concerning it. It can be found at: http://www.tscm.com/estimate.html -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4546 From: Guy Urbina Date: Mon Jan 14, 2002 11:59am Subject: Steve's column name Hi Steve, Here's mine off the top of my head....... "Sigint suggestions" "Wired wisdom" best regards, -Guy 4547 From: tek492p Date: Mon Jan 14, 2002 11:13pm Subject: Re: attacking CCS To the group -- I agree 100% with Steve Uhrig. For more information about CCS, go to the top of the "Messages" page, and do a "search" on CCS. Jack 4548 From: Justin T. Fanning Date: Sat Jan 15, 2028 3:07am Subject: Re: Steve's column name Hi Steve, how about "Bugger off!" "Stop bugging me!" "The bug swatter" "Bug eyed" "Bug spray" "A Bug's life" Hope this helps ... JF 4549 From: Dave Emery Date: Tue Jan 15, 2002 1:36am Subject: Re: Re: Theory (brought to mind by Comsec C3I discussion) On Mon, Jan 14, 2002 at 09:39:14AM -0800, Hawkspirit wrote: > Jim, > activating the terminating card at the CO but once again, a TDR charts > impedance at points of distance along the wire. Termination is but another > impedance point to be described by its status at the time of measurement . > Roger > www.bugsweeps.com As an engineer with an academic interest in TSCM but no actual practical experiance in that business but with significant rf and measurement experiance in various other areas over the years including design of high speed digital PC boards and networking devices and EMI control, I have to say that what you have to say makes much more sense to me than what Jim says. I cannot see why the status of line card relays or their modern solid state equivalent at the end of a transmission line should make any difference at all in the echos bounced back from discontinuities in the line in response to a pulse that has not even reached the end of the wire at the time the echoes are measured and recorded. Simple physics and the speed of light suggest otherwise. I suppose, just as you say, that various AC signals on the line might contaminate the measurement with various sorts of noise (but most tones and signalling found on a phone line are very very low in frequency compared to the echoes seen on a TDR). But the presence or absence of a particular terminating network should make no difference. There is a technique that has seen increasing use with cabling in communications systems where there are frequency selective networks that make traditional unit impulse based TDR impractical - FFT based sweep probing. This operates by injecting a swept carrier and measuring the complex return signal precisely (eg amplitude and phase). From the actual return signal and known exciting signal it is actually possible to derive - using a FFT - much the same impedance versus distance chart as a classical radar like TDR yields. I suppose that for such slow sweeps of a line it would be helpful to have a well behaved termination or even no termination on the other end, but unless I am confused it seems to me that TSCM techs use classical unit impulse type TDR radars rather the swept CW techniques (which are more like SAR radar). But one of the reasons I read the TSCM list is to learn of the technology used by actual practitioners in the field and perhaps I miss some subtlety of Jim's technique and the theory behind it. -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 4550 From: Steve Uhrig Date: Tue Jan 15, 2002 8:45am Subject: Re: Theory - TDR Once upon a midnight dreary, Dave Emery pondered, weak and weary: > I cannot see why the status of line card relays or their modern > solid state equivalent at the end of a transmission line should > make any difference at all in the echos bounced back from > discontinuities in the line in response to a pulse that has not > even reached the end of the wire at the time the echoes are > measured and recorded. Simple physics and the speed of light > suggest otherwise. I haven't been following the thread, so if my response seems out in left field, it probably is. The ideal situation when using a TDR in TSCM is to have the TDR set to the impedance of the line under test (not many machines have the ability to set this parameter), then to see anything on the line you want an impedance mismatch --- of the fault or whatever you are looking for -- to be as miserable as possible. The most difficult thing to see on a TDR is a splice with perfect impedance match. The easiest thing to see is the grossest mismatch, like a short or an open. Zero impedance or infinite impedance. Re terminating at the CO -- seems a moot point since there is a lot of garbage, like loading coils, between the our end of the line and the CO, which we cannot read through. Speed of light -- in free space -- is different than in a conductor. You can't use the same formulas without introducing a correction factor called Velocity of Propogation (VOP), or velocity factor to the old buzzards. 1 is the speed of light. Speed in a conductor is something less than the speed of light, so you set the VOP on the TDR to whatever it is for the particular line under test, always a factor less than zero. 0.88, or 0.66 are typical for different types of coax, for example. Especially if you are trying to get a precise distance from the TDR to a fault, you need an accurate velocity factor. Some people leave the TDR set to a fixed value all the time, like .66 as a default for twisted pair phone line. It doesn't matter a whole lot in many cases, as the machine can measure a lot more accurately than you can. You can't precisely measure a line up a wall, down a hallway, between floors and all around, to where hundredths of a point of velocity factor matter. Velocity factor is different for each different type of cable. If you are running new cable, it will be listed in the manufacturer's spec sheet for the cable. I insist on marking it on the spools of all cable we have in stock, so I don't have to remember it or look it up later if all I want to do is see how much string is left on the spool. And once the cable leaves the factory and enters the real world, the velocity factor starts changing. Not by much, or quickly, but a 10 year old piece of coax running up the tower will read noticeably different than what the spec says it should be for Andrews Type XYZ hardline. If all this is completely irrelevant to the subject being discussed before I stuck my nose in, I apologize. Anyone who has the time -- there is a need for a good TDR tutorial specifically for TSCM, starting at the "see Spot Run" level. The few other people whpo have written books have gone down in history and helped many people. Glenn's stuff and Ted Swift's stuff are good examples. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4551 From: Date: Tue Jan 15, 2002 1:17pm Subject: re Steves column. " The Straight Line On Surveillance" " The Straight Line on Surveillance Technology" ,as in direct line from horse's mouth, ,as in " Don't cross this legal line,re do's and dont's' ,as in " line of privacy rights" ,as in phone line That's all i can come up with at this moment, although, i think the list members have some good ideas. Maybe ,a different title every week! That sounds interesting! HAVE A GREAT DAY !!! 4552 From: Rafail Kapustin Date: Tue Jan 15, 2002 0:43pm Subject: Re: Re: Attacking CCS? Yes, exactly that Hi everyone, I would like to thank Steve for very detailed reply regarding CCS equipment - it will save starters in a field like me from making a mistake. Thank you Rafail --- Steve Uhrig wrote: > Once upon a midnight dreary, david_johnrobinson > pondered, weak and weary: > > > Two things hit me regarding this listing; A) so > what is new? this > > stuff has been out there advertised for years. B) > Why does every > > one immediatly jump and say CCS? > > Because some of us have been around a long time and > have seen > this stuff over and over and over. I'm talking > longer than some > of the players in this industry have been alive and > longer than > practically anyone in the industry has been in > business. > > > Let me put my cards on the table, I was the > operations > > manager for CCS for a time here in London > > Then pardon me for being forthright, but either you > were > incredibly naive or you are a crook. > > > and they realy do not deserve the bad mouthing > they get from > > the group, > > See comment above. If you really believe this, I > will go with > naive. > > > OK so most of the stuff they provide is "crap" > from a > > professional point of veiw, but to most of their > clients it's > > exactly what they want > > One could make the same argument about illegal drugs > or > abortion. That doesn't justify it. > > > Any one wanting professional equipment would > /should come to > > professional suppliers like our company Department > Q who only > > deal with Government level bugs , covert equipment > and GSM > > tracking. > > Now I will change my opionion back to crook. > > If you only deal with 'Government level bugs', why > are you > inviting anyone to come to you. Do you claim to be > supplying > 'Government level bugs' to anyone? In the unlikely > event you > supply anything at all, I would expect it would be > to anyone > *other* than the government. > > Remember, there are a (very) few people around who > actually work > in these technologies, with government clients on a > daily basis, > and cannot be fooled. Most of them are smarter than > me and keep > their mouths shut. I speak my mind. > > > I don't think it is CCS for several reasons > > > > For all the reasons you mention, it absolutely fits > the pattern > of CCS. Lie to someone with money, schmooze them, > pump up their > egos and convince them they will make outrageous > profits dealing > with CCS. The ignorant fool (and ANYONE who deals > with CCS/G-COM > in ANY way is an ignorant fool) hands CCS five or > six figures > for the 'privilege' of acquiring their absolutely > worthless but > impressive boxes of nonfunctional bells and > whistles. At that > point the relationship, such as it was, is over > unless CCS feels > they can extract/extort even more money from the > ignorant fool. > > In this case apparently, and I have seen it more > times than I > could count, the ignorant fool private labeled the > crap because > he wants the other ignorant fools who might buy it > to think he > manufactured it. CCS doesn't care. They got their > money. They > probably charged the guy extra for private labeling > it, which in > itself is funny because CCS was the original king of > > repackaging and slapping their name on standard > products from > other manufacturers and claiming it as their own. > > CCS cheated the guy pushing this private labeled > crap, because > he was an ignorant fool and had more money than he > had brains. > ANYONE who does any homework on CCS would never deal > with them > on any level. > > > a CCS licence costs $150.000 with no stock. > > A CCS 'license' or 'distributorship' or whatever > they choose to > call it costs precisely as much money as they can > extract from > the ignorant fool who gets involved with them. They > (CCS) are > very good at developing financial information on > their victims, > and this is how much they charge. > > Same with 'exclusive' rights to distribute CCS's > vaporware in a > particular country. I had the distinct pleasure at a > trade show > in New Delhi some years ago of introducing three > 'exclusive > distributors for all of India' to each other. Each > had paid, as > I recall, sums between the rupee equivalent of USD > $50,000 and > $200,000 for the alleged privilege of having an > 'exclusive' > representation for CCS in all of India. None > received anything > in return. Nada. > > If I called them tomorrow, I could purchase the > exclusive rights > to distribute their products in any country you > could name, and > I likely would be the 50th person to purchase the > exclusive. > > You were a member of the den of thieves. You know > how the game > is played. You just have to pretend to defend them > to justify > stealing money from your victims. > > If you led the victim (ignorant fool) to believe > something which > was not true, either from a product representation > standpoint or > from an equipment performance standpoint, then you > committed > fraud. Whether you believe it or not, some day there > will be a > day of judgement, and you will have to provide an > accounting, > before man possibly and to God definitely, for your > actions. You > do have the opportunity to escape those penalties > and erase the > slate, and if you wish to discuss this issue only > via PRIVATE > email with me I will be glad to do so. > > > If you want to worry, and it seems you do , try > talking to > > professional covert suppliers - if you call us a > spy shop you > > had better duck > > You already provided substantial incontrovertible > testimony that > you are a crook, and your likely fictitious claims > indicate you > still are operating in the mode you learned from > CCS. Therefore > you fit this list's generic, and my personal, > definition of a > spy shop. > > This month is 30 years I have been manufacturing > electronic > surveillance and intelligence gathering products for > government > agencies. Do some research and you will find that is > true. > > === message truncated === __________________________________________________ Do You Yahoo!? Send FREE video emails in Yahoo! Mail! http://promo.yahoo.com/videomail/ 4553 From: James M. Atkinson Date: Tue Jan 15, 2002 10:41pm Subject: Face the Storms and Smile A little girl walked to and from school daily. Though the weather that morning was questionable and clouds were forming, she made the daily trek to the elementary school. As the afternoon progressed, the winds whipped up, along with thunder and lighting. The mother of the little girl felt concerned that her daughter would be frightened as she walked home from school and she herself feared that the electrical storm might harm her child. Following the roar of thunder, lightning, like a flaming sword, would cut through the sky. Full of concern, the mother quickly got into her car and drove along the route to her child's school. As she did so, she saw her little girl walking along, but at each flash of lightning, the child would stop, look up, and smile. Another and another were to follow quickly and with each, the little girl would look at the streak of light and smile. When the mother's car drew up beside the child she lowered the window and called to her, "What are you doing? Why do you keep stopping?" The child answered, "I am trying to look pretty. God keeps taking my picture." May God bless you today as you face the storms that come your way. And don't forget to smile. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4554 From: Date: Wed Jan 16, 2002 2:30am Subject: California's Wiretap Bill Scrapped California's Wiretap Bill Scrapped SACRAMENTO, Calif. (AP) - Gov. Gray Davis' proposal to expand state wiretapping laws has been dropped after state attorneys reviewing the plan said it exceeded federal law. The bill would have allowed state and local authorities to obtain wiretaps through state courts and permit them to conduct surveillance on e-mail and Internet communications. President Bush signed legislation late last year that broadened federal wiretapping activities but the law did not expand authority at the state level. Davis spokesman Steve Maviglio said the legislation was dropped Tuesday after lawmakers learned of the opinion by the Legislative Counsel's office. Maviglio said the Davis camp may try to reintroduce the bill later this year. Under state law, authorities need a court order to tap a phone line. The proposed legislation would have allowed ``roving'' wiretaps that can follow a person from one number to the next. The plan was the centerpiece of Davis' State of the State address last week. AP-NY-01-16-02 0706EST 4555 From: zack <10-33@c...> Date: Wed Jan 16, 2002 8:52pm Subject: Record device Due to experiences which have occurred within the past few days, I would like to enlist this list for some information. I am looking for a modest price recording device which would record phone conversations as soon as I pick up the phone, taking into account I also use the same line for Internet use. ( long play with time/date ). PS..... I live in a state with one party only knowledge as to recording. Thanks visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Our enemies have made the mistake that America's enemies always make. They saw liberty and thought they saw weakness. And now, they see defeat. " George W Bush President of the United States of America God Bless The USA http://www.copscops.com/blessusa.htm 4556 From: James M. Atkinson Date: Wed Jan 16, 2002 9:28pm Subject: Legal Office Sinks Davis' Wiretap Bill http://www.latimes.com/news/local/politics/cal/la-000004144jan16.story?coll=la%2Dnews%2Dpolitics%2Dcalifornia January 16, 2002 RESPONSE TO TERROR Legal Office Sinks Davis' Wiretap Bill Security: The proposal is dropped after legislative counsel finds 'roving' tracking of calls illegal. By MIGUEL BUSTILLO and NANCY VOGEL, TIMES STAFF WRITERS SACRAMENTO -- Gov. Gray Davis' proposal to let state and local police obtain roving wiretaps on suspected criminals was dropped from the legislation containing it Tuesday after the legislative counsel's office concluded that it was illegal. The proposal, a centerpiece of Davis' State of the State address last week, had been welcomed by some law enforcement leaders but criticized by civil libertarians and some liberals. Davis unveiled the idea at the outset of a reelection bid in which he faces challenges from three Republicans--former Los Angeles Mayor Richard Riordan, Secretary of State Bill Jones and investor Bill Simon Jr.--each vying for the GOP nomination to take on the Democratic incumbent. Asked to size up the chances of a roving-wiretap bill passing now, Assemblyman Fred Keeley (D-Boulder Creek) said: "I think none. There is no opportunity, because whether the Legislature has the will or not, our attorney is telling us it is moot because we lack the authority." Although aides to the governor challenged that interpretation, the legislative counsel said that a state law authorizing roving wiretaps for state and local prosecutors and police would exceed the authority federal wiretapping law gives states, and would thus be invalid. President Bush signed legislation in October that broadened federal wiretapping abilities to target suspected terrorists, but that law did not expand states' powers to allow roving wiretaps at the local level, the counsel concluded. Davis spokesman Steve Maviglio acknowledged that Assemblyman Carl Washington (D-Paramount) dropped roving wiretaps from his legislation Tuesday after hearing the legal opinion, but said the Davis administration would continue to work with the lawmaker, and may attempt to have it reinstated later this year. Maviglio said the Davis administration contacted local district attorneys and the Justice Department before making the proposal public, and was informed it was within the state's powers. George Vinson, Davis' security advisor, added that changes to federal law are still in flux, and that state lawmakers should eventually be able to pass legislation this year permitting roving wiretaps on suspected terrorists. With conventional wiretaps, police must obtain a judge's order authorizing them to listen in on a specific phone number. Roving wiretaps allow them to follow a suspect from number to number. Vinson said the administration may agree to back an alternative proposal that would would still require police to go to a judge any time they wanted to expand their wiretap authority but would speed up that process. Legal Questions Only One of Plan's Problems Some constitutional authorities joined with the legislative counsel in questioning Davis' approach. Erwin Chemerinsky, a USC professor of constitutional law, said Davis appeared to have acted without the benefit of careful legal analysis. The legal questions about Davis' wiretap proposal are only part of its difficulties. It also has been criticized by civil libertarians and some Democrats in the Assembly and Senate, who are wary of its proposed expansion of police power. As a result, some lawmakers on Tuesday predicted that the proposal is unlikely to become law. Assemblyman Washington, who was carrying the measure sponsored by Los Angeles County Sheriff Lee Baca and Dist. Atty. Steve Cooley, and whose bill Davis has seen as the best opportunity for expanded wiretap authority--had to pare back his bill just to get it out of the Public Safety Committee, which he chairs. Washington's bill, AB 74, initially would have allowed state and local authorities to obtain roving wiretaps through state courts, and also would have allowed them to conduct surveillance on e-mail and Internet communications. Law enforcement leaders argue that wiretap laws have failed to keep up with technology, and that criminals can now sidestep surveillance by switching mobile phones and using e-mail and Internet chat rooms to communicate. A roving wiretap would allow police to keep up with the times and the criminals, they say. Authorities must now obtain court orders to tap specific phone numbers, which they say puts them at a disadvantage in an age when criminals can buy cheap prepaid cell phones at convenience stores. "The world of terrorism in terms of criminal planning and strategizing has clearly shown law enforcement that these people are pretty clever," Baca said in an interview. "They will use one cell phone, turn it off, come back with another phone, turn that one off . . . conducting their transactions on dozens of mobile phones. Our current system prevents us from following that conversation without going back into court." Roving wiretaps and e-mail surveillance have come under fire, however, since Davis proposed them last week. It was because of that criticism that Washington requested the legal opinion from the legislative counsel. Once he received it, he announced that his bill would no longer authorize roving wiretaps. Several lawmakers also objected to the provisions of Washington's bill that would extend wiretapping to e-mail and the Internet, arguing that the privacy of countless innocent people would be infringed. Washington then scratched those sections from his measure as well. Assemblyman Keeley was among those who raised doubts about the idea of police and prosecutors screening e-mail. During a spirited committee hearing, he questioned the prosecutors and police who supported that proposal, and they conceded that they were still developing ways to screen e-mail without unduly intruding on personal privacy. "These are the types of scattershot investigative tools that result in the widespread loss of personal privacy," said Francisco Lobaco of the American Civil Liberties Union, which opposed the bill. Having pared back his legislation Tuesday, Washington's bill now would only slightly expand local wiretapping powers to target suspected terrorists planning to use anthrax or other "weapons of mass destruction." Its main purpose is to allow local police and prosecutors to continue to obtain wiretaps beyond next year, when their power to do so under state law is set to expire. Slight Expansion Is All Most Lawmakers Expect Such a law, several lawmakers said, is as strong as is likely to pass in the Capitol this year, particularly after the counsel's office opinion. Chemerinsky called the legislative counsel's analysis a "very strong opinion" showing that state and local governments cannot engage in wiretapping except as permitted by federal law. Chemerinsky and others have questioned the need for expanded state wiretapping powers, noting that local authorities can already partner with the federal government to conduct surveillance on suspected terrorists if needed. A recent report by the state Department of Justice showed that California law enforcement requested 88 wiretap orders in 2000. Judges granted every request. The wiretaps cost an average of $56,767 and resulted in the arrests of 271 people. Of those, 17 were convicted. Most were used in drug investigations and involved home phones, cellular phones and pagers. For information about reprinting this article, go to http://www.lats.com/rights -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4557 From: James M. Atkinson Date: Wed Jan 16, 2002 9:32pm Subject: Los Alamos Scientist Criticizes FBI in Book [(grumble, grumble)... Lee should still be in prison (grumble, grumble). See what happens when investigators gets caught lying trying to make a case? (grumble, grumble) -jma] http://www.washingtonpost.com/wp-dyn/articles/A52000-2002Jan15.html Los Alamos Scientist Criticizes FBI in Book Lee Calls Copied Tapes 'Crown Junk' By Walter Pincus Washington Post Staff Writer Wednesday, January 16, 2002; Page A08 Former Los Alamos scientist Wen Ho Lee maintains he was selected for prosecution because of his ethnic background and asserts that the computer tapes he downloaded, which were the basis of his guilty plea, were not the "crown jewels" of nuclear weapons building, but "largely the crown junk." In his newly published autobiography, "My Country Versus Me," written with the help of Helen Zia, Lee acknowledges that his downloading of computer tapes was a security violation. But he blames the multi-year FBI investigation of his activities and his jailing in solitary confinement for nine months on espionage charges partly on Washington hysteria and spineless bureaucrats. Most of all, the Taiwan-born Lee writes, "Had I not been Chinese, I never would have been accused of espionage and threatened with execution." Lee's book, however, does not totally explain why he downloaded computer codes associated with nuclear weapons designs in 1993-94, and again in 1997. In fact, he focuses his attention on the earlier download and not at all on those of 1997. As he did in earlier interviews, he said in his book that the downloading in the 1993-94 period was done "to protect my files, to make a backup copy." He adds, as he did just before his guilty plea to the surprise of his own lawyers, that he had "made more than one backup copy, actually." Why more than one backup? Because, he writes, "there were no lab rules against making copies -- most prudent people keep copies of their important documents." He also said he had "lost some important codes before, when the [Los Alamos computer] operating system changed, and I didn't want that to happen again." But, as Los Alamos senior scientists testified at Lee's trial, and another newly published book on the Lee case, "A Convenient Spy," repeats, Los Alamos scientists in the highly classified X Division where Lee worked were repeatedly offered opportunities to copy their own work in case of computer failure, "day by day, even computer stroke by computer stroke," one said recently. Reporters Dan Stober and Ian Hoffman provide another reason for Lee's downloading. He might have wanted to use the data in a future job, either with a Taiwan company called Asiatek, which has close ties to that country's defense ministry, or some other company. As for the computer codes themselves, called the "crown jewels" of the nuclear weapons business by one of the nuclear lab's senior scientists, Lee called them "the crown junk" and "the biggest nuclear weapons secret that [Los Alamos National Laboratory] and the government have to hide. "The cornerstone of nuclear deterrence," Lee writes, "is to scare the rest of the world into thinking that our weapons are bigger, stronger, faster, and far more destructive than theirs." And while saying that statement is true, Lee goes on to say, "the science of nuclear weapons hasn't progressed much" since the end of the Cold War and the test ban treaty. He says scientists like himself still at the U.S. weapons labs "spend their time figuring out what to do with rusty, old nuclear bombs." The stockpile stewardship program, "fixing old bombs and digging up old test data" in trying to keep U.S. nuclear weapons safe and reliable, is "like eating leftovers for dinner, [but] it's better than nothing." Much of the preliminary testimony and motions in court went Lee's way, particularly because of the work of his two lead lawyers, John Cline and Mark Holscher. But when the decision came before trial to accept an agreement that included pleading guilty to one count of mishandling classified information, Lee writes that Cline and Holscher told him he had a 95 percent chance of winning "if it goes to trial, but a five percent chance that we could lose. If we lose, you could face life in prison. Are you willing to take that risk?" Saying "it was not worth the risk of spending the rest of my life in prison," Lee said he agreed, since losing the right to vote, own a gun, run for public office or serve on a jury was "less of a sacrifice . . . than to risk a prison sentence." © 2002 The Washington Post Company -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4558 From: Steve Uhrig Date: Wed Jan 16, 2002 9:45pm Subject: Re: Record device Once upon a midnight dreary, zack pondered, weak and weary: > Due to experiences which have occurred within the past few > days, I would like to enlist this list for some information. I > am looking for a modest price recording device which would > record phone conversations as soon as I pick up the phone, > taking into account I also use the same line for Internet use. > ( long play with time/date ). PS..... I live in a state with > one party only knowledge as to recording. Very easy problem. Connect a tape recorder to your phone line via any standard method, and start the recorder manually when you make or receive a call you wish to record. Since you are in a one party consent state, you are OK as the one party, and it would only be your own calls you would be recording, so you merely can start the machine yourself when needed. That way, you won't fill the tape needlessly with Internet noise/data instead of voice. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4559 From: Hawkspirit Date: Wed Jan 16, 2002 10:18pm Subject: Electronic Harassment Sweepers http://www.siin.com/invres.html This is our most recommended service for clients who are serious about solving their EH problems permanently. This service while being the most expensive is the best and most cost effective. You will receive at least 2 experts. One will be a scientist with experience and understanding of electronic harassment, the science behind it and defensive measures. You will also receive an investigative research specialist, our IR Specialists have experience and training in many aspects such as surveillance, counter-surveillance, investigative sciences, law, psychology, undercover operations, and computer security. You will never receive an inexperienced team, we field train all of our staff and test them regularly. What you get essentially is two experts that will locate, eliminate, and document your situation to ultimately solve your problem. The initial portion of this service is conducted covertly. Due to the secure nature of our methods we do not publish how our covert activities are carried out. Rest assured that no one will know of our activities or our arrival. Once we announce our presence to the client, we begin a thorough and extensive test of your residence, you and appropriate individuals, vehicles, personal electronics, computers and appropriate areas. On the conclusion of the testing we will inform you of our findings. We take detailed case history, speculative and factual statements from appropriate parties. Once we determine the source of the Electronic Harassment, we will take appropriate countermeasures. You will also receive a report (including a CAD rendering of your residence) detailing our tests, findings and "hotspots". Using a combination of our state-of-the-art equipment, counter-surveillance techniques and hands-on approach we will detect almost any signal between DC to Infrared, this includes: ∑ DC ELF pulse ∑ AC ELF pulse ∑ Low Hz audio to Ultrasonic levels ∑ Microwave signals (1GHz to 20GHz) & >20GHz pulses ∑ LF to UHF RF signals (DC to 20GHz) (Linear or Digital) ∑ Laser, Infrared, visible light spectrum ∑ Soliton and Scalar waves ∑ EMP ∑ AM/FM transmissions ∑ High energy static fields ∑ High voltage ion fields ∑ Plasma radiation ∑ Nuclear radiation (includes X-rays, Gamma, Beta and Alpha) This also includes detection of tracking devices, bugs, wireless surveillance equipment, and other electronic radiation signal emitting devices. We can also detect metallic and semi-metallic devices. 4560 From: Ray Van Staden Date: Wed Jan 16, 2002 10:09pm Subject: Demonstration - Combat Terrorism The Leaders of the world are asking for your support to combat terrorism and we're encouraging to demonstrate against them next Friday, at 15:00. It is a well-known fact that the Taliban are against alcohol consumption and think it is sinful to look at a naked woman. Therefore, Friday at 15:00, women should run naked through the office while men chase them with a beer in their hands. This is the best way to show our disgust for the Taliban and will hopefully help us in detecting the terrorists among us (anybody who doesn't do as proposed will be deemed a terrorist and denounced to the World). Your efforts are much appreciated in the name of a free, democratic world. [Non-text portions of this message have been removed] 4561 From: Matthew Paulsen Date: Thu Jan 17, 2002 2:28am Subject: RE: Re: Record device Careful with this, in some states this may be illegal, check with your lawyer before proceeding. -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Wednesday, January 16, 2002 7:45 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Record device Once upon a midnight dreary, zack pondered, weak and weary: > Due to experiences which have occurred within the past few > days, I would like to enlist this list for some information. I > am looking for a modest price recording device which would > record phone conversations as soon as I pick up the phone, > taking into account I also use the same line for Internet use. > ( long play with time/date ). PS..... I live in a state with > one party only knowledge as to recording. Very easy problem. Connect a tape recorder to your phone line via any standard method, and start the recorder manually when you make or receive a call you wish to record. Since you are in a one party consent state, you are OK as the one party, and it would only be your own calls you would be recording, so you merely can start the machine yourself when needed. That way, you won't fill the tape needlessly with Internet noise/data instead of voice. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4562 From: Justin T. Fanning Date: Thu Jan 17, 2002 3:39am Subject: Re: Record device In the CCITT phone system (see See ITU-T G.165 etc.) all non voice calls are proceeded with a short burst of 2100 Hz to switch off the Line Echo Canceler. I don't believe the US Bell system uses such a standard, but you may find it's an option on your modem/fax, or the receivers modem/fax. This could then be incorporated into your recording device to not record calls preceded with 2100 Hz. Of course the other solution is to use DSL/Cable etc and segregate the data off the voice line & get higher speed always on to boot! JF --- zack wrote: > > Due to experiences which have occurred within the past few days, I would > like to enlist this list for some information. I am looking for a modest > price recording device which would record phone conversations as soon as I > pick up the phone, taking into account I also use the same line for > Internet use. ( long play with time/date ). PS..... I live in a state with > one party only knowledge as to recording. > > Thanks > > visit http://www.copscops.com > Washington DC Police Department http://mpdc.dc.gov/main.shtm > > "Our enemies have made the mistake that America's enemies always make. They > saw liberty and thought they saw weakness. And now, they see defeat. " > > George W Bush > President of the United States of America > > God Bless The USA > http://www.copscops.com/blessusa.htm > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ From: rockdriver Date: Mon Jan 13, 2003 9:38pm Subject: Antenna Shootout For educational purposes,I was wondering what type of antennas the list members preferred/owned antennas were for doing "business",and why, I use a discone for anything up to 1.2 gig with 2 small conical designed antennas for anything above 1.2.....and a loop antenna for vlf. Any input is welcome,thanx! MitchD 6754 From: Matt Paulsen Date: Mon Jan 13, 2003 11:06pm Subject: Marriott International goes WiFi with STSN! Get that WiFi card and sniffer out and hit one of over 400 hotels for your enjoyment while you eat in the dining room. If your organization travels, now would be a good time to consider mobile code security practices if you haven't. Or you may just find your next product release on the market... by your competitor. 6755 From: James M. Atkinson Date: Tue Jan 14, 2003 0:14pm Subject: Re: Antenna Shootout I prefer an wide-band array of 16 quarter wave GAM antenna's with base loading, and a varactor for remote tuning over a 6 foot wide by 12 foot long ground plane of heavy steel (vehicle mounter) . Each element of the array is cut and tuned to a specific frequency that is "hot with bugs", the varactor is used to tune up a specific frequency of interest. The varactor is remote controlled by the preselector which isolated all 16 signals (in parallel) by 40+ dB, before being amplifier by 32 dB. Four to six 2.4 GHz high gain panels (with filters and preamps). Two 5.8 GHz high gain panels Two to four 900 MHz high gain panels One omni directional TV antenna with LNA Two steerable 2.4 GHz high gain panels in an external Radome Two Bi-Conicals (20-300 MHz) on an 16 foot mast Two spiral logs (200-1 GHz) on an 16 foot mast Two Microwave Discones (400 MHz to 3 GHz) on a 12 foot mast). Two Wideband Discones (36 MHz to 1.5 GHz) on a 12 foot mast Several active loop antennas (for specific bug channels) broadband passive loop antenna's with remote band select, and tuning. Double loop (small loop) tunable with sense element for DF usable Several active rod antenna's with 24" ground plane 98 MHz close field probe (micro-loop) with swept comb circuit for FM band. Set of EMCO, Electrometrics, and HP close field probes. Really big, and really nasty dipole set (15 MHz to 1 GHz) A collection of standard gain antenna with ampls/mixers (900 MHz to 40 GHz) EMCO broadband quad ridges horns (1 GHz to 40 GHz) Microtel Microwave array "Pipe organ" (2 GHz to 125 GHz) Copious collapsible whip antenna Several high threat frequency specific Yagi's (ie: 398.605, 169.505) Several collapsible log periodic (200-420 MHz, 420-480, 800-890 MHz) ...and several others -jma At 3:38 AM +0000 1/14/03, rockdriver wrote: >For educational purposes,I was wondering what type of antennas the >list members preferred/owned antennas were for doing "business",and >why, > >I use a discone for anything up to 1.2 gig with 2 small conical >designed antennas for anything above 1.2.....and a loop antenna for >vlf. > >Any input is welcome,thanx! >MitchD -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6756 From: James M. Atkinson Date: Tue Jan 14, 2003 1:30pm Subject: Spyking/Frank Jones associates by the name of Terry Kawles Hello List Members, One of the Spyking/Frank Jones associates by the name of Terry Kawles is trying to force my ISP to shutdown my site in an attempt to blackmail me into taking down the public records I have concerning he and Frank Jones. Here are the latest round of documents, they just came in today : http://www.tscm.com/01-14-03AUPnotice.pdf http://www.tscm.com/01-13-03complaint.pdf Also, I have added a great deal of materials the the page concerning Jones, and you may find it of interests. http://www.tscm.com/FNJspyking.html The more they try to pursue all of this the more public document I will be adding... I would note that I have recently received threats of physical violence and harassment unless I remove the pages with the public documents on them. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6757 From: kondrak Date: Tue Jan 14, 2003 1:37pm Subject: Anti-Spam program.. Dont know if you've seen or used this program, but its helped control spam here. Mailwasher - http://mailwasher.net/ It operates on the simple principal of downloading the mail headers before you actually download the mail from the server. It compares headers against known spammer addresses in ORBS and spamcop, and a blacklist you maintain locally. You merely scan the titles, check obvious spam for the built in blacklist, and the spam will be bounced back to the sender, and future mail from that address (or expression in a header, like Viagara, or Morgage etc.) will cause the mail to be blacklisted. You then "process mail", and garbage is bounced, then your real email program is brought up. You then hit the "check mail" in your emailer and download the real email. This sounds complicated, but really isn't. A must do, however, is to turn of the auto-check in your email program, as if you dont, and its running in the background, it will download all the mail on the server before you can check it in mailwasher. Read more about it, its free, or pay, (paid removes ad banner) I'm down to perhaps one or two that slip by me (my bad, not its fault) per day now. Well worth a look...I have no interest in the company other than I like the product... At 10:04 1/13/03 -0500, you wrote: >Just wanted to see if I was able to get through. Because of SPAM I had to >change e-mail accounts. Thanks. 6758 From: Marcel Date: Tue Jan 14, 2003 3:48pm Subject: Re: Spyking/Frank Jones associates by the name of Terry Kawles Amazing simply amazing. I'm sure you have seen this......... http://212.100.234.54/content/55/24477.html http://212.100.234.54/content/55/24461.html http://212.100.234.54/content/55/24456.html http://212.100.234.54/content/55/24433.html http://212.100.234.54/content/archive/19480.html "James M. Atkinson" wrote: > Hello List Members, > > One of the Spyking/Frank Jones associates by the name of Terry Kawles > is trying to force my ISP to shutdown my site in an attempt to > blackmail me into taking down the public records I have concerning he > and Frank Jones. > > Here are the latest round of documents, they just came in today : > > http://www.tscm.com/01-14-03AUPnotice.pdf > > http://www.tscm.com/01-13-03complaint.pdf > > Also, I have added a great deal of materials the the page concerning > Jones, and you may find it of interests. > > http://www.tscm.com/FNJspyking.html > > The more they try to pursue all of this the more public document I > will be adding... > > I would note that I have recently received threats of physical > violence and harassment unless I remove the pages with the public > documents on them. > > -jma > > -- 6759 From: kondrak Date: Tue Jan 14, 2003 7:42pm Subject: Re: Spyking/Frank Jones associates by the name of Terry Kawles As an aside, we had a machine in that was allegedly infected with his software, and found several easily identified viruses, that's how stealthy his crap was. Machine was cleaned in an hour, and we sent it back out with a IDS system installed to see if there was any future attempts to access it. None ever returned. His crap used FTP to communicate, and it was easily defeated with proper fire-walling. At 16:48 1/14/03 -0500, you wrote: >Amazing simply amazing. > > >I'm sure you have seen this......... Yup... >http://212.100.234.54/content/55/24477.html > >http://212.100.234.54/content/55/24461.html > >http://212.100.234.54/content/55/24456.html > >http://212.100.234.54/content/55/24433.html > >http://212.100.234.54/content/archive/19480.html 6760 From: Marcel Date: Tue Jan 14, 2003 8:44pm Subject: Re: Spyking/Frank Jones associates by the name ofTerry Kawles I found it amazing that public safety would associated themselves with someone with such a questionable past. The documents presented by jma surely should raise some antennas. kondrak wrote: > As an aside, we had a machine in that was allegedly infected with his > software, and found several easily identified viruses, that's how stealthy > his crap was. Machine was cleaned in an hour, and we sent it back out with > a IDS system installed to see if there was any future attempts to access > it. None ever returned. > His crap used FTP to communicate, and it was easily defeated with proper > fire-walling. > > At 16:48 1/14/03 -0500, you wrote: > >Amazing simply amazing. > > > > > >I'm sure you have seen this......... > > Yup... > > >http://212.100.234.54/content/55/24477.html > > > >http://212.100.234.54/content/55/24461.html > > > >http://212.100.234.54/content/55/24456.html > > > >http://212.100.234.54/content/55/24433.html > > > >http://212.100.234.54/content/archive/19480.html -- "NEXTEL-1 IT'S NOT JUST NEXTEL" Note The New address Subscribe to Nextel-1: http://www.groups.yahoo.com/subscribe/NEXTEL-1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 6761 From: Matt Paulsen Date: Tue Jan 14, 2003 9:48pm Subject: RE: Spyking/Frank Jones associates by the name ofTerry Kawles I searched kazaa for pcphonehome and got 0 hits. Somewhat remarkable since the stats read at 3,786,197 users, sharing 752,969,031 files in 5,540,736 GB. So much for a widely used good app! ha! Tried these variants on it as well, same results. phonehome macphonehome Funny enough though, if you search for "Frank Jones" (without the "'s) you get "You're a mean one Mr Grinch" back. -----Original Message----- From: Marcel [mailto:Marcelrf@B...] Sent: Tuesday, January 14, 2003 6:44 PM To: kondrak Cc: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Spyking/Frank Jones associates by the name ofTerry Kawles I found it amazing that public safety would associated themselves with someone with such a questionable past. The documents presented by jma surely should raise some antennas. kondrak wrote: > As an aside, we had a machine in that was allegedly infected with his > software, and found several easily identified viruses, that's how stealthy > his crap was. Machine was cleaned in an hour, and we sent it back out with > a IDS system installed to see if there was any future attempts to access > it. None ever returned. > His crap used FTP to communicate, and it was easily defeated with proper > fire-walling. > > At 16:48 1/14/03 -0500, you wrote: > >Amazing simply amazing. > > > > > >I'm sure you have seen this......... > > Yup... > > >http://212.100.234.54/content/55/24477.html > > > >http://212.100.234.54/content/55/24461.html > > > >http://212.100.234.54/content/55/24456.html > > > >http://212.100.234.54/content/55/24433.html > > > >http://212.100.234.54/content/archive/19480.html -- "NEXTEL-1 IT'S NOT JUST NEXTEL" Note The New address Subscribe to Nextel-1: http://www.groups.yahoo.com/subscribe/NEXTEL-1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6762 From: John McCain Date: Tue Jan 14, 2003 11:19am Subject: Another antenna question Along the same line, I use a couple of "professional quality" amateur or "commercial" discones for vhf/uhf. Antennas that I've had for a couple of decades. I have little exposure to government or lab grade portable antennae, and wonder if anyone is aware of an economical (what an adjective :,) discone that is faster to deploy than having to screw 32 small rods into the center castings. I was thinking of simply cutting off the rods about a half inch from the center and slipping small springs over the cuts to make it "pop out" of a tubular transit case, but didn't like the though of brass or steel springs in the middle of my aluminum antenna. Anyone with experience trying this, or know of a similar antenna? Cheers, JohnM Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-897-6600 2949 CR 1000N Web: http://www.dcbnet.com Dewey, IL. 61840 Email: Jmccain@d... 6763 From: James M. Atkinson Date: Wed Jan 15, 2003 9:20am Subject: Re: Another antenna question First, exactly match the material content of the antenna to that of the spring (both should be steel. Second, be sure to trim off enough of the original element to compensate for the added length of the spring. Third, install a small tip or coating on the ends of the elements so that you don't put an eye out if it gets away from you. Fourth, Use a velcro strap to restrain the elements, and do not let them "pop out" as you risk physical injury You will get better performance if you DO NOT use the springs, and use a solid element Always use a decent low noise 25-30 dB amplifier with a broad band antenna such as a discone. Having a dozen of so cheap band pass filters in front of the amplifier will do you a world of good. -jma At 11:19 AM -0600 1/14/03, John McCain wrote: >Along the same line, I use a couple of "professional quality" amateur or >"commercial" discones for vhf/uhf. Antennas that I've had for a couple of >decades. > >I have little exposure to government or lab grade portable antennae, and >wonder if anyone is aware of an economical (what an adjective :,) discone >that is faster to deploy than having to screw 32 small rods into the center >castings. > >I was thinking of simply cutting off the rods about a half inch from the >center and slipping small springs over the cuts to make it "pop out" of a >tubular transit case, but didn't like the though of brass or steel springs >in the middle of my aluminum antenna. Anyone with experience trying >this, or know of a similar antenna? > >Cheers, >JohnM > > > > >Manager, Corporate Security Voice: 217-352-3207 >Data Comm for Business, Inc. Fax: 217-897-6600 >2949 CR >1000N Web: http://www.dcbnet.com >Dewey, IL. 61840 Email: >Jmccain@d... > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6764 From: kondrak Date: Wed Jan 15, 2003 9:49am Subject: Re: Another antenna question How about, putting banana jacks on the base, and plugs on the radials? I'd make the base out of say brass or something durable, and just drill holes to accommodate the banana plugs. I realize not everyone has access to a machine shop, but its a thought. >I was thinking of simply cutting off the rods about a half inch from the >center and slipping small springs over the cuts to make it "pop out" of a >tubular transit case, but didn't like the though of brass or steel springs >in the middle of my aluminum antenna. Anyone with experience trying >this, or know of a similar antenna? > >Cheers, >JohnM > > > > >Manager, Corporate Security Voice: 217-352-3207 >Data Comm for Business, Inc. Fax: 217-897-6600 >2949 CR >1000N Web: http://www.dcbnet.com >Dewey, IL. 61840 Email: >Jmccain@d... > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6765 From: Hawkspirit Date: Wed Jan 15, 2003 10:44am Subject: Cordless Phone Monitoring While doing a sweep yesterday for a client in a condo who had an opposing party in a litigation rent an apartment under him, I had an interesting result with his cordless phone (Sanyo CLT-957). After disconnecting the clients cordless phone base from the AC, every time I initiated the handset into transmission I had a return RF handshake at the exact same frequency and matching 913MHZ digital spread spectrum wave pattern. No dial tone but a matching wave pattern reply. Does anyone know the circuits in these units well enough to tell me how a covert specialized receiver would use this setup and handshake to adjust its receiving frequencies for monitoring. Roger Tolces Electronic Security www.bugsweeps.com 6766 From: Kirk Adirim Date: Thu Jan 16, 2003 0:05am Subject: Re: another antenna question If you place springs in line with the elements make sure you bypass them with copper braid soldered to each end of the elements. This prevents the spring from acting as a loading or phasing coil and will also short out any noise generated by the dissimilar metals in the spring. Any movement or corrosion between disimilar metals can act as a noise generating diode (PN junction). You could also replace your elements with flat 1/16th inch spring steel strips that are cut to the same length. Another solution would be to cut a skirt of brass mesh to wrap around your elements to the same length. Now remove all but 4 of the elements to hold the skirt in place. You'll have to devise a way to electrically secure and connect/disconnect the skirt to the 4 elements or collar. The mesh will replicate the 32 elements or cone. Now you only have 4 rods to install and the mesh skirt will roll up for easy transport. Kirk www.tactronix.com [Non-text portions of this message have been removed] 6767 From: Does it matter Date: Tue Jan 14, 2003 2:03pm Subject: info http://hot.ee/nuhk/tempest.html http://www.worldnetdaily.com/news/article.asp?ARTICLE_ID=14077 http://www.ebiz.co.za/L_SCRIPTS/Regular.ASP? pklRegularID=889&pklIssueID=294 Some more info about that Attorney. 6768 From: Date: Wed Jan 15, 2003 10:56am Subject: Rif: Re: Another antenna question > First, exactly match the material content of the antenna to that of > the spring (both should be steel. Does the material really matter, as long as it conduces electricity well, and has a reasonable dimensinal stability? I thought it was mainly the length of the rod that matters, as it must resonate at the appropriate frequency, and therefore must be one nth of the wavelength. Remo Cornali 6769 From: bc Date: Wed Jan 15, 2003 9:51pm Subject: fyi: ~e; Electromagnetic News & Views #10 a sample of a newsletter from the electronetwork.org which compiles news from various sectors/disciplines with electromagnetism as a common theme or context. it is part of an electromagnetic educational initiative- to find out more please visit http://www.electronetwork.org/ =================================================== Electromagnetic News & Views -- #10 =================================================== 01) Top Stories of Electromagnetism 02) Electromagnetic health & medicine 03) Electromagnetic trash & treasure 04) Electromagnetic security & surveillance 05) Electromagnetic power & energy 06) Electromagnetic current & human affairs 07) Electromagnetic transportation & communication 08) Electromagnetic matter & information 09) Electromagnetic trends & inventions 10) Electromagnetic weaponry & warfare 11) Electromagnetic business & economics 12) Electromagnetic art & artifacts =================================================== 01) --top stories-- --------------------------------------------------- Vatican warning on danger of 'online confession' "THE Vatican has warned Catholic bishops and priests not to use the internet to hear "online confessions" in case they are read by "ill-intentioned people such as hackers" for purposes such as blackmail." // you would FTP files or check e-mail from a wi-fi cafe? Expert: Alleged Wi-Fi Risks Are Nonsense By Mitch Wagner "The solution is not to limit Wi-Fi, but rather to install personal firewalls on each computer, and encrypt all traffic going over the network, Doctorow said." // waiting for ISPs and Webhosts to offer this service to // avoid liability issues for unsecured access/transit... How Secure Is Secure Shell? Despite its vulnerabilities, SSH is far better than its unsecure cousins, including Telnet, the "r" commands and FTP, which transmit usernames and passwords -- and everything else, for that matter -- as clear text. Stealth Antennae Try to Blend In "There are about 130,000 communications antennae in place across the United States, according to industry officials. Roughly 75 percent are standard antennae. The rest have been surreptitiously stashed in scenic simulations. "The next time you see a picturesque shot of rocks, a flagpole, a church steeple, cacti or trees, consider that there might be more there than meets the eye..." Phone Units Join in Effort for Seamless Wireless Net "Most Wi-Fi networks have focused on transfer of e-mail messages and other forms of data from laptop computers but the goal of the three companies is to offer seamless transitions to cellphone users as well." IBM's New PDA Provides a Measure of Security "Instead of swiping a badge through a reader, the employee places his or her thumb on the Paron's small fingerprint-recognition screen. A wirelessly connected server reads the fingerprint, makes an identification, and grants access if a match is found between the individual making the request and the stored data. Do told NewsFactor that the Paron features CDL's proprietary encryption processor, the CDL-82, enabling secure wireless transmission of sensitive voice calls and data. It also has a smart-card reader for ID cards." --------------------------------------------------- 02-- electromagnetic health & medicine --------------------------------------------------- When the Athlete's Heart Falters, a Monitor Dials for Help "Soon, machines may be able to do some of this emergency dialing on their own. Manufacturers are working on wearable heart monitors linked to cellphones that can sound an alert automatically, contacting a doctor, family member or Web site when trouble beckons." Chip Plants Take Heat for Toxics "A government health agency ordered Motorola and two other leading semiconductor makers to tighten up their handling of carcinogenic and toxic materials after a groundbreaking investigation uncovered holes in their safety procedures." Charting the hidden force at street corners "Havas is quick to point out there is no proof, as yet, that electromagnetic fields directly cause illnesses. But there is plenty of evidence showing they are associated with illnesses and can promote them. Her work on Main Street, Ontario, should be a wake-up call to public utilities and other businesses generating electromagnetic fields, such as banks and cellphone companies, which one day could face lawsuits from people claiming compensation for impaired health." --------------------------------------------------- 03-- electromagnetic trash & treasure --------------------------------------------------- What to Do With That Old, Slow PC Don't throw away your old computer. Some manufacturers offer trade-ins and rebate programs so you can recycle what you no longer want to use. By Kendra Mayfield. // will the 4-fold increase in e-waste be due to HDTVs? E-Waste: Dark Side of Digital Age U.S. computer makers are improving recycling programs, but they still lag behind Europe and Japan in managing toxic e-waste. Most U.S. manufacturers received failing grades in an annual Computer Report Card survey. By Kendra Mayfield. "The SVTC report card evaluated the firms based upon criteria gleaned from the companies' websites. Only one company, Fujitsu, received a passing grade. Fujitsu...developed technologies to eliminate toxic chemicals by developing lead-free products. "The leadership continues to be by and large the Japanese companies, and the U.S. companies tend to be far behind," Smith said." ... "The report also criticizes Dell's use of federal prison labor to recycle old computers, which it says exposes inmates to toxic chemicals without the same health and safety protections as workers at other facilities." Consumer Electronics Show Panel Addresses E-Waste For videocassettes, the end is near --------------------------------------------------- 04-- electromagnetic security & surveillance --------------------------------------------------- George Orwell, here we come By Declan McCullagh "But what could Poindexter and the Bush administration devise in five or 10 years, if they had the money, the power and the will? That's the real question, and therein lies the true threat. Even if all of our current elected representatives, appointed officials and unappointed bureaucrats are entirely trustworthy--and that's a pretty big assumption--what could a corrupt FBI, Secret Service or Homeland Security police force do with advanced technology by the end of the decade? What if there was another terrorist attack that prompted Congress to delete whatever remaining privacy laws shield Americans from surveillance?" What CIOs Need To Know About New Firewall Tech N.R.C. Excludes Terrorism as Licensing Consideration 'The Nuclear Regulatory Commission has ruled that the threat of terrorism cannot be considered when licensing reactors or other nuclear installations because the risk is too speculative. The commission also said discussing the issue in licensing hearings would give too much information to terrorists and might "unduly alarm the public."' // for those who can still sleep, this may be unwelcome // news. especially given the fact that a nuclear reactor // _was officially targeted by a hijacked airplane on 9/11... Nuclear Licenses Need Not Consider Terrorism Threat "The threat of terrorism is too nebulous to be considered when licensing nuclear reactors and other such facilities, the Nuclear Regulatory Commission (NRC) has concluded." U.K. school to use eye scanner for lunch fees IT Resists Mandatory Cyber-Security // absurdity // else, there is always the 'terrorism' weather map, // where hotspot zones are shown during TV newscasts... Officials consider faster ways to alert U.S. to terrorism "[The Commerce Dept.] would also explore new ways to disseminate the warnings through the Internet, cell phones and new technology to turn on TV sets. Specially equipped televisions, radios, pagers and other devices already exist to decode EAS messages, according to a fact sheet distributed by the Federal Communications Commission. Consumers can program these products to turn on automatically for the messages they want to receive." Top Vulnerabilities in Web Applications from the Open Web Application Security Project (OWASP) Nuclear Terrorism --- How To Prevent It "Less than 18 pounds of plutonium or 55 pounds of highly enriched uranium are sufficient to make a nuclear bomb, but these materials circulate in civilian nuclear commerce by the ton." Security cameras are getting smart -- and scary + Hong Kong gym pulls plug on camera cell phones + Tiny Cell Phone or Big Brother? --------------------------------------------------- 05-- electromagnetic power & energy --------------------------------------------------- White House Installs Solar Panels "The Bush administration has installed the first-ever solar electric system on the grounds of the White House." 'Fog City' Catches a Few Rays "A principal goal of the Vote Solar Initiative is to lower the cost of solar energy by increasing demand. More demand will lead to greater production capacity through the creation of new solar-power systems. While those systems initially represent an added cost, they will be paid off over time with savings from lower energy bills. And once that happens, consumers can end up spending less on electricity generated through solar power than other means." U.S. Senate Bill Would Cap Greenhouse Gas Emissions "WASHINGTON, DC, January 8, 2003 (ENS) - A bipartisan bill introduced in a U.S. Senate hearing today would attempt to curb global warming by establishing a market based trading system in greenhouse gas emissions. The bill, the first major piece of environmental legislation to be introduced in the 108th Congress, was met with rousing endorsements from the conservation community. Senators Joe Lieberman, a Connecticut Democrat, and John McCain, an Arizona Republican, said their bill would spur innovation by giving companies maximum flexibility in meeting national greenhouse gas emissions goals." Brazil wants to master all facets of nuclear technology ""Nuclear energy represents a wide field of knowledge and the nuclear bomb is just a fragment of that knowledge," spokeswoman Fernanda Melazo quoted Amaral as saying Tuesday. "We want to acquire this knowledge because of its applications in medicine, food production and in many other peaceful endeavors."" Ice storm danger melting away "...when ice storms strike as they did in Canada and the American north-east in 1998, power lines can become so encrusted with ice that they collapse, leaving millions without electricity. But Victor Petrenko, at Dartmouth College in New Hampshire, thinks he has a smarter idea - use the ice itself as the element. Working with a consortium of US and Canadian power companies, he has developed a system that sends high-frequency electrical signals along the cables to create a current in the ice build- up and melt it." OPEC Agrees to Increase Its Oil Production Quotas by 6.5% "Though the new quota is an increase from the 23 million level set only a month ago, analysts said the actual amount of additional oil that enters the market will be smaller, meaning that its effect on prices could be muted. "This isn't going to lead to any collapse in prices," said Raad Alkadiri, a consultant at PFC Energy in Washington." // another way of constituting the European Union... European Cross-Border Power Costs Halved in 12 Countries '"The agreement marks a further step in the construction of a single European market in electricity," said GRTN Chairman Salvatore Machi.' --------------------------------------------------- 06-- electromagnetic current & human affairs --------------------------------------------------- Study: Online Polls Skew to Right // Conservatives media In Italy, an SMS a Day Can Keep the Devil Away "Italy's largest mobile phone operator, TIM, has begun a service to offer clients SMS messages with "the prayer of the day," "saint of the day" or "gospel of the day."" TV Ads Say S.U.V. Owners Support Terrorists // oil addiction "Patterned after the commercials that try to discourage drug use by suggesting that profits from illegal drugs go to terrorists, the new commercials say that money for gas needed for S.U.V.'s goes to terrorists." // how much of this is social programming, from youngest // ages to college career paths? personal evidence in math // classes never indicated any difference in abilities. and // a young niece is fascinated and loves to learn about how // computers work, cables, printers, soon, circuitboards. if // young people were all given equal access to this knowledge, // a lot of it is simply fun, and at the same time, they can // gain confidence. especially if programming skills were to // be taught at an early age, before the complexities of real // life overwhelm the abstractions of computer programming... Where the Girls Aren't // inequalities in Computer Science... Fight with computer brings SWAT team No charges filed after misunderstanding cleared up "It turned out that the man was simply upset at his computer ≠ which he had called a "bitch" he "wanted to kill," police said ≠ and the gun was a plastic pellet gun, not the .45-caliber automatic handgun it was made to resemble." --------------------------------------------------- 07-- electromagnetic transportation & communication --------------------------------------------------- Is that "hot spot" hot or not? A group whose certification mark for wireless gear is considered essential by U.S. manufacturers has now developed a seal of approval for commercial wireless "hot spots," places where wireless Web access is available to the public for a fee. "To earn its new Wi-Fi Zone label, hot spots will have to use Wi-Fi certified products. They will also have to make it possible for someone to connect using a Virtual Private Network, which is used to secure the data over the air. The Alliance, however, isn't requiring hot spots to use any stronger forms of security, including Wi-Fi Protected Access , a security standard the Alliance proposed in October, Wi-Fi Alliance representative Brian Grimm said Thursday." A defining moment for TV. Mike Snider, USA TODAY "This could be digital television's year." Laos Online: Pedal for Its Mettle "...volunteer tech experts working with the Remote IT Village Project in rural Laos say that all it takes is some pedal-powered generators, a few wireless antennas and some rugged, Linux-powered computers." Plug Power Announces Agreement With Honda R&D to Jointly Develop Home ReFueling System "Plug Power will integrate one of its GenSys (TM) 5C stationary fuel cell systems with additional components necessary for the home refueling concept, which will be supplied by Plug Power and Honda R&D." Gentlemen, Start Hacking Your Engines "Engine control units first appeared in cars in the late 1970's. By regulating fuel injection, air and ignition far better than older systems that relied on carburetors and distributors, the E.C.U. resulted in better gas mileage and fewer emissions. These "black boxes" are now so ubiquitous and advanced that if your car has an engine problem, a mechanic can diagnose it by simply plugging the car into a computer." How Caching Works "Caching greatly increases the speed of data retrieval from your computer's memory. Know how? Find out why a little cache goes a really long way." More Cities Set Up Wireless Networks "Add urban renewal to the growing list of reasons to deploy wireless computing networks." Wi-Fi takes to the skies // from 500mph @ 30,000 feet... --------------------------------------------------- 08-- electromagnetic matter & information --------------------------------------------------- // excellent article, if interested in particle physics... In a Lab on Long Island, a Visit to the Big Bang "The time machine ≠ the Relativistic Heavy Ion Collider, known affectionately at the Brookhaven National Laboratory here on eastern Long Island as RHIC (pronounced rick) ≠ is designed to make a Little Bang, recreating a tiny dollop of the hot, mysterious soup of particles that scientists say existed a split second after the gargantuan blast that started it all. ... "Theory holds that less than a trillionth of a second after the Big Bang (and after a sudden growth spurt known as inflation), the early universe, about the size of a marble or a grapefruit, underwent a transition to a new state of matter, as water does in cooling to form ice. "In this new phase, the cooling particle soup consisted mainly of quarks, a species of subatomic particle, and force carriers known as gluons. This small universe, after expanding to about the size of this solar system, then underwent another transition, forming subatomic particles like the protons and neutrons of everyday matter." Nanotech Scientists Build Super-Small Circuit "Electrons will jump from the metal tip of an electrical source to a lever coated in nanoparticles made of gold, the researchers discovered. The jumping electrons pull the lever toward the tip, closing a simple circuit that may be the smallest ever devised." First speed of gravity measurement revealed "The speed of gravity has been measured for the first time. The landmark experiment shows that it travels at the speed of light, meaning that Einstein's general theory of relativity has passed another test with flying colours." Beyond the Blackboard "The board shows whatever a professor writes on it as well as anything -- text, charts, still and moving pictures -- stored in a computer plugged into it. With a remote mouse, teachers can edit and move the material around on the board, which has the touch sensitivity of an A.T.M. screen." Magnetars Some stars are magnetized so intensely that they emit huge bursts of magnetic energy and alter the very nature of the quantum vacuum Explaining the Moon's Ancient Magnetism Device demos terabit storage // ferroelectric vs. magnetic // also for dumb-terminals via fiberoptics and home servers..? Remote monitoring aids data access // sends video vs. data "The Sandia method doesn't transfer data at all, but instead transfers the video signal that normally carries image information from a computer to its monitor. "The video card is designed to put out a video signal to a local monitor... we extend the signal," said Eldridge." --------------------------------------------------- 09-- electromagnetic trends & inventions --------------------------------------------------- Physicist proposes deeper layer of reality New theory takes the chance out of quantum mechanics. "'t Hooft is not about to resurrect hidden variables. But neither is he convinced that quantum uncertainty has to be the final word. "Contrary to common belief," he says, "it is not difficult to construct deterministic models where quantum mechanics correctly describes stochastic behaviour, in precise accordance with the Copenhagen doctrine." ... The key, says 't Hooft, is information loss. At the smallest conceivable size scale - the Planck Scale, many trillions of times smaller than the nucleus of an atom - there exists complete information about the world." 'Gadget printer' promises industrial revolution "The idea of printing a light bulb may seem bizarre, but US engineers are now developing an ink-jet printing technology to do just that. The research at the University of California in Berkeley will allow fully assembled electric and electronic gadgets to be printed in one go." What Happened to 3G? // more confusing than ever... "The unhappy conclusion is that Europe, after the runaway success of Global System for Mobile Communications (GSM), may have got it very wrong with 3G and may now be five years behind the U.S." // when will Japan start exporting everything they make? Trendsetting Wireless Wares Interchangeable face plates, lighted keypads and flashy antennas make cell phones cool for trend-conscious users. Because teenagers are a large and growing segment of the wireless consumer market, customized looks likely will dominate accessory lines. The Honda Humanoid Robot: ASIMO // here is one way they are being imported... The Coolest Notebooks You Never Saw "Major Japanese computer companies such as Sony, Toshiba, Fujitsu, and Panasonic make some amazing notebooks that pack style and functionality into cases that weigh as little as 1.8 pounds. There's just one catch: They produce them for their home market and don't sell them in the United States." Massive Data Storage in Tiny Devices Redefining the PC INVENTOR THROWS CURVE AT SCREENS TO MAKE THEM MORE USER-FRIENDLY By Kristi Heim Mercury News Seattle Bureau "Starkweather's new prototype screen is 12 inches high, 44 inches wide and curved 90 degrees. He uses digital light projectors and telescope mirrors to remove the distortion caused by the curved screen. The screen is five times as bright as a standard cathode ray tube or liquid crystal display monitor, helping to reduce eye fatigue." Internet browser that quadruples surf speed wins Irish science prize "Adnan Osmani, 16, a student at Saint Finian's College in Mullingar, central Ireland spent 18 months writing 780,000 lines of computer code to develop the browser. Known as "XWEBS", the system works with an ordinary Internet connection using a 56K modem on a normal telephone line." Leapfrogging to Cellular // in Central and Eastern Europe... Wireless telephony is a prime example of technological leapfrogging. Faced with crumbling fixed line networks, years on waiting lists, frequent interruptions of service and a venal bureaucracy, subscribers opt to go cellular. Full-Length Movies Play on Palm-Size Computer // VCR quality Giant electromagnets to moor ships // remove metal jewelry... --------------------------------------------------- 10-- electromagnetic weaponry & warfare --------------------------------------------------- Scientists seek 'super-soldiers' formula "One of the agency's plans for keeping warriors awake is to "zap" their brains with electromagnetic energy. Much of the research is being conducted at Columbia University in New York, in the laboratories of the neurological science department. Researchers have identified a small area of the brain above the left ear that they would zap either before or during missions. "When he needed it, the pilot could just be zapped during operations," said one leading research scientist." Robots for the masses "Pasadena, Calif.-based Evolution Robotics said its technology that lets a robot determine its position relative to its environment is based on wheel sensors and a Webcam that cost less than $50. That's a fraction of the cost of current robot navigation systems relying on laser range finders, which can cost $5,000, the company said." N. Korea leaves nuclear weapons treaty "As it announced it would pull out of the treaty, a keystone to global nuclear nonproliferation, the North warned the United States not to take military action against it. Pyongyang said a "new Korean War will finally lead to the Third World War" and that the North could hold its own in a "fire-to-fire standoff." The comment was distributed by the official North Korean news agency in English." US Government Starts E-Mail Campaign to Key Iraqis "The U.S. military has begun an e-mail campaign urging military and civilian leaders in Iraq to turn away from President Saddam Hussein as the Pentagon builds forces for a possible invasion of the country, defense officials said on Saturday. Visitors to the Iraqi capital, Baghdad, confirmed the electronic mail campaign, part of a psychological war mounted by elite U.S. Special Operations who also have been broadcasting messages from planes over the past month." (and in related news...) Iraq pulls plug on e-mail "Iraq has blocked access to e-mail following an electronic campaign by the US urging key military and civilian figures to turn against President Saddam Hussein." // note: this sabotage is similar to that which killed an // opposition leader in the days preceding 9/11 via either // a gun/bomb disguised as a television camera. same locale. Tape-recorder bomb kills 2 in Afghanistan KABUL, Afghanistan (AP) -- An electronics repairman in northern Afghanistan and his friend were killed by a bomb in a tape recorder that exploded when batteries were inserted into the device, a regional military commander said Monday. ELECTRONIC BATTLEFIELD: The Laser Storm (Jan 14th) // hybrid-electric and fuel-cell vehicles in new .mil gear... Future Combat Systems (FCS) "For transportation, the FCS will rely on hybrid electric vehicles, which use less fuel and have the added advantage of being able to recharge batteries used for the other FCS electronic systems. Research is also being funded for the development of electricity- producing fuel cells for the same reasons. Some FCS vehicles will be robots whose job will be to scout ahead of the main force to test for nuclear, biological and chemical threats..." --------------------------------------------------- 11-- electromagnetic business & economics --------------------------------------------------- // this appears to be about commercial rents, not residential // yet the wildest story i heard about during the late 1990s // was a single-bedroom house (very very small) going for one // million US dollars, as the housing market was so competitive. // rents have been so high that lower-paid workers cannot find // housing in the area, too, which explains the freeway gridlock. Silicon Valley rent plunges Rent in Silicon Valley for high-tech commercial real estate fell almost 30 percent in 2002, extending a slide that began a year earlier, according to a new study. // of radio frequency identification (RFID) tags... R.I.P UPC? Major retailers to test "smart shelves" Two major retailers and a consumer products giant are teaming up to test a new "smart shelf" technology that allows for real-time tracking of inventory levels. & Gillette To Test MIT 'Smart Tags' MIT's Auto-ID Center developed the technology. Center executives claim it could revolutionize supply chain and inventory management and save businesses billions in losses from out-of stock, stolen or wasted products. & Tech riding on wave of cheap chips Consumer technology in the near future will be driven by low-cost microprocessors, says an industry trend-spotter "Embedded processor technologies that will lead to new applications include cheap sensors, such as those used in global positioning systems and video cameras, as well as radio frequency identification tags, Saffo said." Electronics Gives Chaos a Good Name Minimizing the amount of spray used in a manufacturing process can have other than fiscal benefits. For instance, zinc-based shielding materials used on computer terminals to eliminate electromagnetic interference are toxic in large doses. Schools' Internet Subsidies Are Called Fraud-Riddled New Respect for the Internet Bubble-Blowers Today's business models must be solid, even if the underlying e-commerce ideals are the same as those heralded during the dot-com heydey. "Indeed, even if they lose money, Web sites are increasingly key for any business..." Help for life-cycle assessments for electronic equipment // something WiFi is going on... Duracell batteries is // also cutting its base prices by a large percentage... Intel shaves mobile chip prices --------------------------------------------------- 12-- electromagnetic art & artifacts --------------------------------------------------- sonic light: composing light, articulating space // thanks H "The vision of a 'music for the eye' is centuries old and forms an important undercurrent in the recent history of art and the new media: from the construction of the first colour organs, light sculptures and the first use of coloured lighting in theatre, through abstract film animation and synthetic video images, to the design of interactive software to generate light and sound. The idea of a music and light art form to be presented in an environment specially designed for that purpose becomes topical every time a new visual medium appears on the horizon. Among the present generation of computer artists a new type of visual music is being created which can be performed live or made specially for the Internet. // related to EM media's predominance in copyright issues An Exhibition That Borrows Brazenly By CHRIS NELSON The rapper has long fought restrictions on sampling...Where does it stop?" he asked. "Does a lawn mower company copyright its sound? Does a Macintosh copyright its sound when you hit the keyboard? I don't think you can copyright sound. You can copyright compositions. But nobody invents a sound." How Electromagnets Work // maybe applicable to certain artists explorations... Grants Available for Environmental Education =================================================== * to subscribe to the electronetwork-list, send an e-mail to lists@o... with the following command in the body of the message: subscribe electronetwork-l * to unsubscribe: unsubscribe electronetwork-l * for more info contact human @ electronetwork.org --------------------------------------------------- please forward this to your friends and colleagues --------------------------------------------------- the electromagnetic internetwork-list electromagnetism / infrastructure / civilization archives.openflows.org/electronetwork-l http://www.electronetwork.org/ 6770 From: Matt Paulsen Date: Thu Jan 16, 2003 11:30am Subject: time source? cdma/gps device, suggestions? Looking for a time source that has very little flutter. Needs to be network attached to support NTP and also be able to support frame/t1/isdn etc timing. Plan is to put it on a roof with an omni up about 150' and down via fiber to IDF's/MDF's in the buildings. Have considered this. Anyone from Verizon, ATT, Qwest, etc lurking that can help? NetClock/GPS: Receives time signals from the Global Positioning System (GPS) satellites, and automatically sets its time to within 500 nanoseconds. The RS-232 and RS-485 ASCII time code outputs used for computer time setting are accurate to within 10 microseconds. This unit also provides an IRIG, 1PPS and 10-MHz outputs. TIA, Matt 6771 From: Steve Uhrig Date: Thu Jan 16, 2003 7:16pm Subject: Public input on hacker sentencing OFF WITH THEIR HEADS! ... Steve "Feds Seek Public Input on Hacker Sentencing" SecurityFocus Online (01/13/03); Poulsen, Kevin The United States Sentencing Commission (USSC) engaged the public for advice last week on whether prison or probation sentences for cybercriminals are adequate enough, or should be stronger. Michael O'Neill of George Mason University Law School says, "We want to know whether or not the relevant community...believes that serious penalties will deter people from engaging in that sort of conduct." The public can provide suggestions by accessing a formal "Issue for Comment" posted on the USSC Web site; the period for public comment will continue until Feb. 18. In addition to a general overview of the question of whether penalties for cyber miscreants are strong enough, the forum seeks advice on eight proposals to take additional factors into consideration when determining a sentence. One proposal suggests adding points--and thus extra jail time--to sentences if the hackers commit their crimes for financial gain, or to violate a person's privacy. For now, the sentencing guidelines for computer crimes are the same as those for larceny, embezzlement, and theft, in which the financial loss inflicted is the primary consideration. However, the Homeland Security Act and the congressional emphasis on cyberterrorism required the USSC to review its cyber crime sentencing guidelines so that they take into account "the serious nature of such offenses, the growing incidence of such offenses, and the need for an effective deterrent and appropriate punishment to prevent such offenses." The Homeland Security Act also authorized the creation of penalties for hackers whose activities result in a loss of human life. Orin Kerr of George Washington University Law School thinks that computer crime sentences are as harsh as normal sentences, if not harsher, according to some provisions. http://online.securityfocus.com/news/2028 ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6772 From: Matt Paulsen Date: Thu Jan 16, 2003 7:24pm Subject: RE: Public input on hacker sentencing Make them watch barney and elmo tapes.. constantly... -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Thursday, January 16, 2003 5:17 PM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Public input on hacker sentencing OFF WITH THEIR HEADS! ... Steve "Feds Seek Public Input on Hacker Sentencing" SecurityFocus Online (01/13/03); Poulsen, Kevin The United States Sentencing Commission (USSC) engaged the public for advice last week on whether prison or probation sentences for cybercriminals are adequate enough, or should be stronger. Michael O'Neill of George Mason University Law School says, "We want to know whether or not the relevant community...believes that serious penalties will deter people from engaging in that sort of conduct." The public can provide suggestions by accessing a formal "Issue for Comment" posted on the USSC Web site; the period for public comment will continue until Feb. 18. In addition to a general overview of the question of whether penalties for cyber miscreants are strong enough, the forum seeks advice on eight proposals to take additional factors into consideration when determining a sentence. One proposal suggests adding points--and thus extra jail time--to sentences if the hackers commit their crimes for financial gain, or to violate a person's privacy. For now, the sentencing guidelines for computer crimes are the same as those for larceny, embezzlement, and theft, in which the financial loss inflicted is the primary consideration. However, the Homeland Security Act and the congressional emphasis on cyberterrorism required the USSC to review its cyber crime sentencing guidelines so that they take into account "the serious nature of such offenses, the growing incidence of such offenses, and the need for an effective deterrent and appropriate punishment to prevent such offenses." The Homeland Security Act also authorized the creation of penalties for hackers whose activities result in a loss of human life. Orin Kerr of George Washington University Law School thinks that computer crime sentences are as harsh as normal sentences, if not harsher, according to some provisions. http://online.securityfocus.com/news/2028 ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6773 From: Ocean Group Date: Thu Jan 16, 2003 7:45pm Subject: CSE... -----BEGIN PGP SIGNED MESSAGE----- Hello, If there is anyone here from the CSE could you please contact me off list. Thank you, Kind regards Vance Deran Ocean Group, Technical Security Division, Ireland. -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 7.0.3 for non-commercial use mQINBD2ItiQBEADUGR+tkegYQJtSmiGVwUZW0xXtj9DeYXIFcVKywTNETPmqs1xf s6L/QP2DgoaJsxpy/Knr06QqDq8NbJdSH63cBtUcOM6TSmvei9KzaXvKTYdKyLrd kPOvXAZq+4YrwHXY5oH9tL0HdtouBnLxQjIy5OVUlohRcYBZQKusoIyeH8SQVqqZ yXTT9X7hYINYwfbEQG7rZG39QS3o7DrtKQ8zGOUlPIuSjyKVY0YU/IRm/shUOmzm FsKrtIx0+NuYZHiML+UN0XM+xX3n55i4lEiIAnCi7uCleeETJSEusQJ1FnEWFjN2 atYG6OQVWofWhzW4O3pcPfmH2vOICpG07lMe88rF2Q+JK0cTUwJbRV/LWSi5QCmU DSdL/v5/3wVnAzoZAzknsmmN09gJPT7kOpqnMdHqhwgyh4txL1MTPcOm36ncRTTv 9Wx4KanMLsyFCaLXfezwUr/sbG5qycsd1cxj/+QbaCCHcYuMg8CXh5tCUagKNwUj kQETM3qPI6hsw7fY1k9BrD3JAx0FDNektPAkoxUbl4s/bZ9+mJEit2PIIPNNnwOS infadjbkkt/7Z5ltMmgOxMFwyLjbjZJNalGUFGMD8i7HU9Anh/330H/Vd2ROiwIj DwBbclzlc3jyvUFdXsN0l2Kj4l9fXB6KQ6Qkdr2hWAMbLRvxr5/coUFQFQARAQAB tBtPY2VhbiBHcm91cCA8aW5lcnRpYUAwMi5pZT6JAi4EEAECABgFAj2ItiQICwMJ CAcCAQoCGQEFGwMAAAAACgkQDmqiVDJj1Od7Cw//YcIHVBei7u4imWX0/YpcaNlw brzNKe6Y2qXIKb4BH5HJjTNraZY47X3sWAYXXjUygztnkX9LPiRtTgGzZ5T/Hn1Q GS74SNp+0Qeuy/aMvAKZuZqiYvLIWbXLKZq3+dihoBUSQQDc19ap+H77xnfhv2DW kbfRn37MSz9Lw608NfGD3ZZmtlclI/v1hVphlaH057Imj4mh5Ycnig9kHwml6zwQ ZtAh1T6gddMuQGhvdfZVZwOTE3Xo2P3IlM2Ct2mj1FNY9No21NknaLBZs6zsAAbs VyXIdaMnfoq1zXGd1uPQjMsftX1YajPoAVPo8uBF6EASL+RkpJejzRzCVV2yh6Ro LD6jBVMeqXxzTt+ZV/f05UhyhjtECk7roYld2/S9vAecVDjHb2WLfAX8iLGXQhCo v2fwQ7QUqtc7pWqkOd3iP1mpRw41kQ/8imA9vUqLqQZQ+40QzCxDCFZ2tXGT2jHN bXqzEU2BAtulPcX0IbTLwv4GgUC7Kn++9aUBg/++lKTWkyLFP0jfaSONYKWb2mLy TZnhp4B1mEx9SDh4zBfOuagY6gpZ9DQ4vSUkRRF38YsNpqA5KibRC2But3kNssyW VTw8l6ShTg7XWvD3FNEawl2Ngo7BJOQ0D5YZPx06eje+JX5F6R2XVx+BiJ1trOuJ Y7UaLj6AtDBaSx6hXM25Ag0EPYi2qQEQAPIHSV9nSUsXnNWUFGKiSJ2+Yfbv5ibG m2DC9nXotMgRyZc/Pto0Xwr/77rgeASlMRKXlVbpCO6nwrLV5aVLib8tCg4qVQMK 3J+aX79nU1KXiFgCqos3M6eQolEjykDhtFNj3Wc2KqFy00JGgeXwj9R+OdT4mUNG aQF1w9hnzys+a9ix4eY9m4AtlUtmRG7+gCW3vWVnhJ/ABQOVOcUL2JyZZBTgpA+Q /hQiGMH24WbilwWE+XhwOkGQUE5KgKHthmCMa3tWOk+f06PEiCjVjwkv6Fc60RHW pa+5PMHdq5zKozfDQR6hQRlZ3k/7Adfsyiw/5fCLbVl2TPaFyuE/n+pJmekd4xH1 /hw2N4EMgzau7t8gIRUUVTICXLdlMeboVrxQ1kuNlK/ZOiC9pdZeO18e/jhSQemC cd+awTOUATw9qV95TD4n5l3JlzbdrZQ7Fb3oIld2cqh1jMPypM8diWPnpyGiampm bfqQbU1dloN3Ng4U+X21jPrqeafvpQT8cnURDALTNdWynDAR7ta4pivb5UjKNDk2 C9Oy7KqKYPgB5hWKSEZs7iQDfWsO9opy8bRXZlau9JQnEY9cZd9Ty0XzYQGYvc65 K1Bd6h7NB9/5URYNmQuM/13OHukVCjTbgnT5GJLvIou4qba2UczuUrSPknQPheoy j208HYitdwwpABEBAAGJAiIEGAECAAwFAj2ItqkFGwwAAAAACgkQDmqiVDJj1OfU 0RAAtdEvkcJVHH3s08uYiatNBAhJML32UIx7nQXDalqiPdM1zJ7AmQjFjWvlqke0 4Y0PS1HFVAsvy1XRWdRAChRqfRXZ2dk+eJxMzHC/KtgrQHahUtPqYozQcVwgjWRC obWh9LwgOrFcXrzvv93D0D4VrDgKLvNmiPOoxe3GW1hUWwaf412zZ3wsAI/EiTDP wol4WvB5Mxe4397HsAKzbLAXuMa1D1RQNlWaK93EgTjn/F5SUWgMVyz3L4HcNF6a qWRft48BgCy8Oj8v9zY0BopWUU7vezFtKmXpfhmxcorKjO0qnkoijFlEph/zTvJz XiKelN6japucGc1EMz5WXI1q9C6Y9Y7KQciA8ZfvXlfZo48vAnfFC8tCgEkYzDJv wO/IebYhIcb9pyFdoZzkAi6yBDZHWRx5rj83X1eAF8Xf9lTtSBWkt49spyn7Ix1q WWnx3aBCC410bQwqWTjrohDi26YltcPOf3qt8QnvL8vy1j5OQRNS3y82opoKqbbf UHyiXUxF4+WiRFJk53D9JCxvgTzQFEQU+QKnqpIXuqppxh3CjfCYtvID8LIsHc2k f0fWZiDYQ3Y86bW421LGGaHt1i4W6K3czwyZVI+I8lJtb5FiDkKnGtKEM2lUwBvU 1oq9e5ySDyaXjg1la2m0gXGVGny0kdPrTasTzJ/Jd0CH8Vw= =OyUh - -----END PGP PUBLIC KEY BLOCK----- -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 7.0.3 for non-commercial use iQIVAwUBPidgGw5qolQyY9TnAQELYA//YReWVtKxECpiS2GCScGTNu3xb9KfzZyW nCvoldUG7qLmYlHTLxVu0imTpvXc0wd01AXXG79SCjaaS+NfAIPPRN2f89QeVss4 BTJMDVJiVezRC3zcdl5k8WLConi/iVTngFHBGoabdeynv5WS0Gr6u3gKxo9beANP NNNtLwzsnexi0cG9bjfIVpM0wAkDM5csoJv5/iZeGpiSCwlNCxrsFrQD3X/cPtjq AQCAbpKFx4AWfMvkWOe0FSnlZJSlYBASmaQPWZxP6sxXkng7kw8Okk+qSvWmMH8u gBA4l+ZFYhvhqfA+HVXHWLp1iADJf5a3bTe/oeRtzGl1wVjCPgQmMmWFp8wzYENU yymBTJn+5n26bCL6JFQXxCSsh0j+1fWNLhEXY+cz7deAfQyIk+Ex+m6NwT0HhDtn mzFpUPnQ8TvYpxlisDhbYpIUqro9dRfdi7GVAb9CwlV2/vFSj7BWgb0Tg6gFmfN4 I3KtMpX+HiyqWCHKv0SbySRmfm144ztS/M7bpB8/Svvb3LwmGVHFLIRM1UtmEz18 o6SVnMKJu+bs7hMqtKTbyUetOyT/PvHFXC/6/PjUNAjdelpMn7iNvotMqRwG41Qc NfZqbFLn6eYdx9ZPI6sEwoXqCTGV46X1Bi2wGYZ3j24W7DtDEQpaTBMYzBIIa3TT OxATs1flK1g= =+2Wp -----END PGP SIGNATURE----- 6774 From: Ocean Group Date: Fri Jan 17, 2003 7:09am Subject: RE: Public input on hacker sentencing Well I guess that would be extremely funny... However I think the ol' capital punishment is slightly sadistic.... I'd favour something like giving something back to the community... Years of community service for poor, homeless and kids charities etc. If they're gonna take from the community then they should have to give back to it as punishment. Not sit in a prison doing nothing having working people pay for their meals. My opinion anyway, Vance. Message: 3 Date: Thu, 16 Jan 2003 17:24:05 -0800 From: "Matt Paulsen" Subject: RE: Public input on hacker sentencing Make them watch barney and elmo tapes.. constantly... 6775 From: Trey A Mujakporue Date: Fri Jan 17, 2003 10:26am Subject: RE: Public input on hacker sentencing Personally I think they should adopt the points option, currently as pointed out in the initial publication, the main consideration for sentencing is based on the financial loss inflicted by the attacker. How can you justify giving the same sentence to hacker A, that "came" in (notice I use the words "came in" and not "broke in" via a badly configured machine e.g Adrian Lamo Vs a hacker that actually launched exploit code and "broke into" machine? E.g Kevin Mitnick? Adrian Lamo Links http://212.100.234.54/content/archive/24240.html http://212.100.234.54/content/archive/23218.html http://212.100.234.54/content/archive/19279.html Don't get me wrong.. Hacking is hacking, and murder is murder, but why can murder sometimes be called pre-meditated and sometimes called manslaughter? jmtpw -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: 17 January 2003 01:17 To: tscm-l@yahoogroups.com Subject: [TSCM-L] Public input on hacker sentencing OFF WITH THEIR HEADS! ... Steve "Feds Seek Public Input on Hacker Sentencing" SecurityFocus Online (01/13/03); Poulsen, Kevin The United States Sentencing Commission (USSC) engaged the public for advice last week on whether prison or probation sentences for cybercriminals are adequate enough, or should be stronger. Michael O'Neill of George Mason University Law School says, "We want to know whether or not the relevant community...believes that serious penalties will deter people from engaging in that sort of conduct." The public can provide suggestions by accessing a formal "Issue for Comment" posted on the USSC Web site; the period for public comment will continue until Feb. 18. In addition to a general overview of the question of whether penalties for cyber miscreants are strong enough, the forum seeks advice on eight proposals to take additional factors into consideration when determining a sentence. One proposal suggests adding points--and thus extra jail time--to sentences if the hackers commit their crimes for financial gain, or to violate a person's privacy. For now, the sentencing guidelines for computer crimes are the same as those for larceny, embezzlement, and theft, in which the financial loss inflicted is the primary consideration. However, the Homeland Security Act and the congressional emphasis on cyberterrorism required the USSC to review its cyber crime sentencing guidelines so that they take into account "the serious nature of such offenses, the growing incidence of such offenses, and the need for an effective deterrent and appropriate punishment to prevent such offenses." The Homeland Security Act also authorized the creation of penalties for hackers whose activities result in a loss of human life. Orin Kerr of George Washington University Law School thinks that computer crime sentences are as harsh as normal sentences, if not harsher, according to some provisions. http://online.securityfocus.com/news/2028 ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6776 From: Steve Uhrig Date: Fri Jan 17, 2003 1:12pm Subject: This is already happening with some lunatics we know Officials consider faster ways to alert U.S. to terrorism By Audrey Hudson THE WASHINGTON TIMES Television sets suddenly turning on in the middle of the night, Internet messages or nontraditional telephone rings may be the next way Americans are alerted by the government they are under attack by terrorists. The Emergency Alert System (EAS) in 1997 replaced the Emergency Broadcast System that historically warned that "this is only a test," but lawmakers say new technology is needed to give Americans faster and more practical information. In announcing his candidacy for president, Sen. John Edwards, North Carolina Democrat, first proposed a telephone warning system for in the event a terrorist attack occurs while Americans are sleeping. "There are a lot of folks in this country who have no idea what they are supposed to do if an attack occurs," Mr. Edwards said. Mr. Edwards and Sen. Ernest F. Hollings, South Carolina Democrat and soon-to-be ranking member of the Commerce, Science and Transportation Committee, yesterday announced legislation to explore new alert systems. The bill would authorize the Homeland Security and Commerce departments to work with other government agencies and the media to set standards for warnings. The color-code warning system established by Tom Ridge, White House homeland security adviser, fails to give information on how to react to a terrorist attack, Mr. Edwards said. "We have to make sure effective warnings get to every American in times of danger, and we have to make sure those warnings tell folks just what they can do to protect themselves and their loved ones," Mr. Edwards said in a statement. The EAS is used daily on the local level to issue warnings of events that can endanger the public, including hazardous-material spills. The EAS is also used to transmit warnings from the AMBER (America's Missing Broadcast Emergency Response) alert system, which notifies the public about child abductions. AMBER was established on a state-by-state voluntary basis in 1996 in response to the abduction and slaying of 9-year-old Amber Hagerman in Dallas. It would be up to Congress to require the EAS to transmit terrorism warnings from a new alert system. The EAS has never been used for its primary function, which is to provide the president with a means to address the nation through all broadcast, cable and satellite systems in the event of a national emergency. It was not activated on September 11 because President Bush did not address the nation. The bill requires the Commerce Department to develop new technologies to issue warnings based on the National Weather Service system, which is decoded by EAS equipment at broadcast and cable stations and can be delivered almost immediately. Commerce would also explore new ways to disseminate the warnings through the Internet, cell phones and new technology to turn on TV sets. Specially equipped televisions, radios, pagers and other devices already exist to decode EAS messages, according to a fact sheet distributed by the Federal Communications Commission. Consumers can program these products to turn on automatically for the messages they want to receive. The Edwards-Hollings bill was based on recommendations from the Partnership for Public Warning. "National warning systems need significant improvement. They enable Americans at risk to save lives and reduce losses from natural and manmade disasters," said Peter Ward, partnership chairman. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6777 From: Does it matter Date: Fri Jan 17, 2003 0:29pm Subject: Re: Public input on hacker sentencing I believe that people charged with computer crimes should do community service and be placed in the community corrections system. We can learn far more from people who specialize in penetration tests, intrusion, etc. The good ones are taken by the government immediately anyway. Hacker is such a bad term anyway. A large majority of "hackers" break in and then report that they broke in and help overall network security. So there are a few bad ones out there which there will be with any groups. Don't put them in prison help them help others. Darren --- In TSCM-L@yahoogroups.com, "Steve Uhrig" wrote: > OFF WITH THEIR HEADS! > > ... Steve > > > > > "Feds Seek Public Input on Hacker Sentencing" > SecurityFocus Online (01/13/03); Poulsen, Kevin > > The United States Sentencing Commission (USSC) engaged the > public for advice last week on whether prison or probation > sentences for cybercriminals are adequate enough, or should > be stronger. Michael O'Neill of George Mason University Law > School says, "We want to know whether or not the relevant > community...believes that serious penalties will deter > people from engaging in that sort of conduct." The public > can provide suggestions by accessing a formal "Issue for > Comment" posted on the USSC Web site; the period for public > comment will continue until Feb. 18. In addition to a > general overview of the question of whether penalties for > cyber miscreants are strong enough, the forum seeks advice > on eight proposals to take additional factors into > consideration when determining a sentence. One proposal > suggests adding points--and thus extra jail time--to > sentences if the hackers commit their crimes for financial > gain, or to violate a person's privacy. For now, the > sentencing guidelines for computer crimes are the same as > those for larceny, embezzlement, and theft, in which the > financial loss inflicted is the primary consideration. > However, the Homeland Security Act and the congressional > emphasis on cyberterrorism required the USSC to review its > cyber crime sentencing guidelines so that they take into > account "the serious nature of such offenses, the growing > incidence of such offenses, and the need for an effective > deterrent and appropriate punishment to prevent such > offenses." The Homeland Security Act also authorized the > creation of penalties for hackers whose activities result in > a loss of human life. Orin Kerr of George Washington > University Law School thinks that computer crime sentences > are as harsh as normal sentences, if not harsher, according > to some provisions. > > http://online.securityfocus.com/news/2028 > > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* 6778 From: infospy Date: Fri Jan 17, 2003 4:51pm Subject: Re: Public input on hacker sentencing And at the same time they're loping heads, put the little !$%#^^$&%)^%(*$^#$^%$ that send out all the "SPAM" and write the spyware, in line. 6779 From: Hugo Drax Date: Sat Jan 18, 2003 0:52am Subject: Re: Marriott International goes WiFi with STSN! My laptop has no software except the VPN secureID software (Token) and on my diskonkey I have terminalserver client. I vpn to my homeoffice system and all my work takes place at a secured system. So if the laptop is stolen it has no Intellectual Property :) picture does not include the other items (IDS system,server etc..) http://www.draxindustries.com/pictures/homenet1.jpg ----- Original Message ----- From: Matt Paulsen To: TSCM-L@yahoogroups.com Sent: Tuesday, January 14, 2003 12:06 AM Subject: [TSCM-L] Marriott International goes WiFi with STSN! Get that WiFi card and sniffer out and hit one of over 400 hotels for your enjoyment while you eat in the dining room. If your organization travels, now would be a good time to consider mobile code security practices if you haven't. Or you may just find your next product release on the market... by your competitor. [Non-text portions of this message have been removed] 6780 From: Date: Sat Jan 18, 2003 0:04am Subject: From Dave at DEMTEC UK Hello All I am a new member and am based here in the UK on Merseyside near Liverpool. My partner and I are looking for a Non Linear Junction Detector [NLJD] SCOUT - SUPERBROOM-etc At this stage we cannot afford a new unit and are looking for used and will consider anything at the right price even a faulty system [we have the technology to repair] I have heard that some devices exist originating from ex Eastern Block/Soviet countries anybody have any suggestions as to a source of these units in the USA or Europe in particular a device that was considered a health risk originating from Russia, we have heard about. Regards to All David McGauley Demtec Electronic Surveillance and Counter Surveillance Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs 01695 558544 07866206112 demtec@a... The manufacture and installation of custom made covert electronic audio and video devices Professional physical and electronic counter surveillance [sweep] services. Note: any fellow UKPIN members welcome to call in to discuss applications. Workshop located alongside the M58 junc 3 [Non-text portions of this message have been removed] 6781 From: Matt Paulsen Date: Sat Jan 18, 2003 1:21pm Subject: RE: Marriott International goes WiFi with STSN! For a home office, you've certainly spent some cash. What is that a 2500-2600? A pix 506e? Can't really tell what the smaller devices are from the pic. Microswitches? 6-8 port? One off the pix, one off the 2x00? or do you bypass and expose 2 ip's? A few notes.... Even if you're setup as Hugo is, you're still not safe as there are a few other holes to review. All your traffic can be bridged using some of the most recent hacks on wifi, which means you're not in control of where your traffic goes, or even if you're getting a valid response back. Encryption comes in 2 levels on most systems - auth & session, you will expose your vpn ip at least once and may be exposing other details and not knowing it even before you get to encryption. For example, you may send SMBs out with your workstation idents and local administrator ID's for some service requests. TSC has bugs that allow interception, don't rely on it. A fob is an excellent addition and a must for mobile users. Add a biometric interface to the local GINA, ie: identix, etc. For mobile code, suggest a peek at thumbdrives, cheap and effective to a point: http://www.thumbdrive.com/prd_info.htm If you use MS's VPN, drop it and move up to something else.. CHAP was misnamed when they thought up the acronym, reminds me of WEP, HA! yea. right. Suggest some sort of encryption as well, ie: 168bit 3des, hmac md5 auth, etc. Last, enable a personal firewall - blackice, nai, etc. and local antivirus - symantec, nai, etc.. Don't use anything below nt 40 if you're mobile and on MS, and use ntfs and local policies on your profile, and do setup the system securely - winreg guide, poledit, security admin, etc. Worried about recovery, ghost your box at your office before you leave on a trip. Hugo, you may want to check packetyzer and netstumbler out on a 2nd system while your laptop is going to see what you find, you may discover more than you though you would. http://www.packetyzer.com/ http://www.netstumbler.com/ You can also download sniffer eval and review your lan connection info. www.mydocsonline.com/pub/snifferdemo/15Pro47 Matt -----Original Message----- From: Hugo Drax [mailto:hugodrax@d...] Sent: Friday, January 17, 2003 10:52 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Marriott International goes WiFi with STSN! My laptop has no software except the VPN secureID software (Token) and on my diskonkey I have terminalserver client. I vpn to my homeoffice system and all my work takes place at a secured system. So if the laptop is stolen it has no Intellectual Property :) picture does not include the other items (IDS system,server etc..) http://www.draxindustries.com/pictures/homenet1.jpg ----- Original Message ----- From: Matt Paulsen To: TSCM-L@yahoogroups.com Sent: Tuesday, January 14, 2003 12:06 AM Subject: [TSCM-L] Marriott International goes WiFi with STSN! Get that WiFi card and sniffer out and hit one of over 400 hotels for your enjoyment while you eat in the dining room. If your organization travels, now would be a good time to consider mobile code security practices if you haven't. Or you may just find your next product release on the market... by your competitor. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6782 From: Matt Paulsen Date: Sat Jan 18, 2003 1:37pm Subject: RE: RE: Public input on hacker sentencing Put em in prison I say... and bill them out at $85/hr. Make em work 120 months to buy a pair of nike's. ref: OSDOC's GIS group. When they get out, they can start a company if they like. After all, that's a working trend that seems to fit in the industry... as disturbing as it is. -----Original Message----- From: Ocean Group [mailto:inertia@o...] Sent: Friday, January 17, 2003 5:09 AM To: TSCM Group Subject: [TSCM-L] RE: Public input on hacker sentencing Well I guess that would be extremely funny... However I think the ol' capital punishment is slightly sadistic.... I'd favour something like giving something back to the community... Years of community service for poor, homeless and kids charities etc. If they're gonna take from the community then they should have to give back to it as punishment. Not sit in a prison doing nothing having working people pay for their meals. My opinion anyway, Vance. Message: 3 Date: Thu, 16 Jan 2003 17:24:05 -0800 From: "Matt Paulsen" Subject: RE: Public input on hacker sentencing Make them watch barney and elmo tapes.. constantly... ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS From: Charles P Date: Sun Jan 14, 2001 11:28pm Subject: Re: What would YOU do? I can give you one scenarios that is not exactly what you described but may be worth consideration. A potential client called wanting a sweep of his home office. He said he was not sure if there even was a need for a sweep but was just concerned about his privacy. He wanted to know if I could come out and do a "small sweep". I explained that there really is no such thing. Since he seemed sincerely concerned, just undecided, so I offered to meet with him on a consulting basis for a few hours at a much smaller fee. I would look over his situation, explain typical problems and where he seems to be most vulnerable. I would also explain in greater detail what a full sweep would be able to do for him. He was very pleased with that suggestion and immediately accepted. He has not contacted me for a full sweep, but I don't think he really needed one either. But he does have my name and appreciated my service. A "small sweep" is like putting an alarm on only the front door of your house, since the burglars in your neighbor hood are rather lazy and you think that's the simplest place for them to enter. Charles Charles Patterson charles@t... Global Communications Tarrytown, NY www.telephonesecurity.com ----- Original Message ----- From: "1RCM" <1RCM@M...> To: "TSCM List - Post" Sent: Sunday, January 14, 2001 10:33 AM Subject: [TSCM-L] What would YOU do? > Hi List, > > Let's see if we can't spawn some creative debate here. Many on this list > have run across these type instances which fall right in that blurry area > somewhere between standing on true ethics and paying the bills. What do YOU > do?? Ah yes, before you consider both scenarios think back to all of the > debate that has taken place on this list over the past year relating to > professionals vs. charlatans; just what constitutes performing a proper > sweep; enlightening a potential client; fees vs. services performed; etc., > etc. Then respond honestly! > > Scenario #1 ..... You are contacted by a potential client who feels that > he/she has reason to have a sweep done. During the discussion that follows > you are convinced that a sweep is legitimately needed, but also that the > potential client does not have the foggiest idea of what is involved. And so > you do a bit of education before you quote a fee. At the end of the > discussion the client states that he/she fully understands what you have > explained but has reached this decision: "Instead of the 6 hours that you > quoted I want you to do the best that you can in 2 hours with your fee being > reduced accordingly. I understand what you have explained to me and I accept > the fact that I will be receiving less than what you recommend - but as the > client that's my decision to make". > > Now remember that the office copy machine needs repair and you could use > those few extra $$$'s to buy that new piece of equipment you want - all to > the tune of about what you would make doing this 'mini-sweep'; the location > is only 15 minutes from your office; you are satisfied that the client is > making an 'informed decision'; and you have absolutely nothing work-wise > going on the next day. What would YOU do??? > > Scenario #2 ...... You are contacted by a PI firm regarding handling a > referral job. After a discussion regarding your services, fees and > recommendations they want you to do: " a check of a hotel meeting room for > transmitters and a quick look-around with a flashlight - bring just your sp > ectrum analyzer, your CPM-700, your Opto Xplorer, or what ever you told us > you have that you want to use, and your flashlight - we want this done very > low-keyed. And you will only have about an hour alone in the room". After > explaining your feelings regarding doing 'proper' sweeps the PI that you are > talking to states emphatically that it is he who has been retained to look > after the best interests of the client; no, you may not speak with the > client; he is making his request based upon an investigation that he is > conducting for the client; and yes, it is his neck on the line and not yours > as the client will not know who you are. However, at the end of this > discussion you are not really sure whether or not the PI fully understands > what you had attempted to explain to him regarding TSCM and you have this > lingering feeling that he is to a high degree basing his request on what he > is willing to pay out of his billable fee for your services. But still, he > is offering a decent buck for the work that you will actually have to do. > > Same conditions exist for this one as for the scenario above. What do YOU > do???? > > Respond or not; do it on or off list; included your name or be anonymous - > your choice. I'm not trying to embarrass anyone or to pry. I have my own > reasons for posing these questions. But I truly believe that the diverse > answers - and accompanying debate - that hopefully will be generated can > benefit us all. > > > Bob Motzer > 1RCM@M... > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2313 From: Craig Snedden Date: Mon Jan 15, 2001 4:13am Subject: Re: What would YOU do? Now now boys! I'd have to agree with Miguel and Hoffman to a broad degree. I'm also a great believer in pride in the job and ethics, but being too stuck up your own .... never paid any bills! What is ethically wrong in taking the job, but only after explaining to the "client" that a sweep comes with no guarantees (something you should do anyway) and that any reduction in your service will only serve his fiscal needs and lead to a false sense of security. If the client is willing to accept that, and you have the appropriate riders on paper, signed by him, then go ahead, take his money. By the way, where do we get off calling each other "whores"? "Providing a service in return for money" isn't that what we all do? Maybe there are too many out there who can afford to sit back and be picky about what work they do and don't? :-) [Non-text portions of this message have been removed] 2314 From: Hoffman Date: Mon Jan 15, 2001 0:14pm Subject: Re: Re: What would YOU do? ---------------------------------------------------------- SWS> Why is this not the definition of a whore? Yes, and also the alternative definition of capitalism and entrepreneurship. -------------------------------------------------------- SWS> What does YOUR need for money have to do SWS> with whether you do an honest job or not? The scenario which was described has nothing whatsoever to do with a so-called "honest job." Dishonesty is when you deceive people either intentionally, or sometimes it can apply when your involves in a trade which your not qualified for, and attempt to pass yourself off as qualified. There is absolutely no dishonesty in doing a "half-assed job" provided you have made it clear to the customer in both writing, and verbally that what they are requesting (i.e. the economy job for half price) has it's consequences and that you feel that performing the service in such a manner may lead to substandard results. Treat these clients like the adults that they are! It's pretty damned self righteous, patronizing, and outright insulting to me, that anyone feels as if need to "baby" these customers with the "I'm doing this for your own good" mentality. As customer, it's their decision, and your only obligation in terms of professional integrity is to be as accurate and straightforward as possible. I'm not implying that one needs to do a job every time some customers say's "Hey look, I'd like the $800.00 economy special sweep job." If it's not worth it to you; then dont do it. It's your call and your business. However, what perturbs me in regards to this particular discussion is there is a blurry line to be crossed when you use your influence to set up an arbitrary "code of ethics" for an entire industry. In my opinion, it is just as dishonest to "smear" otherwise honest security professionals just because some professionals choose not to treat their customers like children (much like our politicians think they can do... everytime they pass another regulation for our own good... because they know better.) -------------------------- SWS> Having pride in one's work and trying to be the SWS> absolute best at what you do is a sign of a quality SWS> practitioner. Some of us strive for that constantly. SWS> What do you propose -- strive to be mediocre? And of course... the ultimate point gets missed. Your in business no doubt for a variety of reasons. People in this particular field, usually love their work, so no doubt that there must go along with it a self satisfaction, and an arbitrary set of standards which one adheres to. You want to run a quality service, and be known as a quality guy. However, the flip side of the coin is the customers NEEDS. They called you because they either want or need a service. You are there to serve the customer. If you feel the customer is a scumbag; you just walk away; as is the case in any line of work. However, I think professional who claims that they are "helping their customer" by refusing to do a job simply because they cant get their way, that professional clearly has ulterior motives and is placing their real or imaginary reputation ahead of the immediate needs of the customers. If you want it that way; fine.... but dont impose that mentality on the entire profession. Most professionals in any industry realize that business is a compromise, and different customers have different economic means, and different job requirements. Not everyone needs the ultra-deluxe $5,000+ TSCM service. I see no dishonest in providing an appropriate service for the appropriate fee. The hypothetical question posed by the original poster as far as I am concerned, is open to great interpretation. I'm not implying that one should "wave the magic boxes around the room and declare the room is clean." Rather, I think it's perfectly honest simply to perform a "limited" service, where your just checking for a few specific threats, as opposed to an all-inclusive job where you drag out all the equipment. It should be made clear to the customer that a "limited service" has it's consequences, and not all potential threats can be detected. There is obviously a threshold where doing a job is clearly a waste of time (i.e. if the customer tells you to go sweep the place with a Radio Shack frequency counter; THAT is a waste of time...) but theres nothing dishonest about performing a limited service. Looking at this from a logical perspective, it is totally impossible to honestly claim that a clients premise is vulnerability and threat-free; regardless of how thorough your service is. Therefore, no matter how much equipment and manpower you decide to use on the job; there will never be a 100 percent certainty as to threats. Hence, that being the case... there is nothing wrong with doing "limited-sweeps" (i.e "economy sweeps") because in essence, all sweeps are limited in some manner. 2315 From: Bcrews Date: Mon Jan 15, 2001 2:49pm Subject: ECS vs. TSCM I was recently reading an article that made a distinction between ECS (electronic countermeasures) equipment versus TSCM (technical surveillance countermeasures) equipment. I am familar with the later but am unsure about the former. Comments? Bill C. 2316 From: Date: Sun Jan 14, 2001 6:14pm Subject: Re: The Football Check out the dcurrent edition of MAXIM--a men's magazine. They give a very complete breakdown of what is allegedly inside. Also, some nice phoographs of it. 2317 From: Miguel Puchol Date: Mon Jan 15, 2001 4:47pm Subject: RE: ECS vs. TSCM ECS, more commonly known as ECM, are used in military weapon systems, like combat aircraft. They range from passive target spoofing to active radar & communications jamming. You may check out Jane's for some examples of this equipment, like the ECM pods used in the F-16. Cheers, Mike > -----Mensaje original----- > De: Bcrews [mailto:bcrews@s...] > Enviado el: lunes, 15 de enero de 2001 21:49 > Para: TSCM-L@egroups.com > Asunto: [TSCM-L] ECS vs. TSCM > > > I was recently reading an article that made a distinction > between ECS (electronic countermeasures) equipment > versus TSCM (technical surveillance countermeasures) equipment. > I am familar with the later but am unsure about the former. > Comments? > > Bill C. > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2318 From: James M. Atkinson, Comm-Eng Date: Mon Jan 15, 2001 5:03pm Subject: Re: What would YOU do? At 12:28 AM -0500 1/15/01, Charles P wrote: >I can give you one scenarios that is not exactly what you described but may >be worth consideration. > >A potential client called wanting a sweep of his home office. He said he >was not sure if there even was a need for a sweep but was just concerned >about his privacy. He wanted to know if I could come out and do a "small >sweep". I explained that there really is no such thing. > >Since he seemed sincerely concerned, just undecided, so I offered to meet >with him on a consulting basis for a few hours at a much smaller fee. I >would look over his situation, explain typical problems and where he seems >to be most vulnerable. I would also explain in greater detail what a full >sweep would be able to do for him. > >He was very pleased with that suggestion and immediately accepted. He has >not contacted me for a full sweep, but I don't think he really needed one >either. But he does have my name and appreciated my service. > >A "small sweep" is like putting an alarm on only the front door of your >house, since the burglars in your neighbor hood are rather lazy and you >think that's the simplest place for them to enter. > >Charles > >Charles Patterson >charles@t... >Global Communications >Tarrytown, NY >www.telephonesecurity.com I usually tell such a client that the minimum amount of time that I charge for any work on site is four hours. In such cases it gives me just enough time to unpack a small amount of gear and check for anything obvious, with only a bare minimum of protection being offered. It doesn't matter to me if I have to drag out some equipment of not, I still charge the same four hour minimum any time I have to go somewhere, or do something away from the office. If the client only wants a one hour consultation fine, I'll do it over the phone where I bill in 15 minute blocks of time (but not in person). Personally, I prefer to have at least 12 hours on-site for any sweep work, and like to spend about half the time of any sweep just doing the radiated and conducted signals analysis. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2319 From: James M. Atkinson, Comm-Eng Date: Mon Jan 15, 2001 6:25pm Subject: Re: What would YOU do? Yes, it works out to be one person for 12 hours, and I would point out that for each person you add to the team you only get an productivity increase of about 30-35% and not an actual doubling. I only utilize extra people if the sweep will involve more then 36 hours of time (three sweep days) as the extra people tend to be much disruptive and much less covert. In cases where the time on target is limited, or when heavy furniture has to be moved I will use extra help (but no more then three or four extra people). I call it a "-3 dBnerd rule", which cuts the secrecy and security of the sweep in half for each extra nerd you involve in the sweep. I also have a "-6 dBclient rule" where each of the clients employees that are involved in the sweep drop the secrecy by a factor of four. When the client contacts me via his cell phone the "-40 dBcellular rule" kicks in, and if he is calling from a suspect phone or from within the suspect facility a "-110 dBdumbass rule" applies. -jma At 10:58 AM +1100 1/16/01, Mike Dever wrote: >Jim > >Is that 12 hours on site for one person? > >Typically our minimum would be four hours with a two or three man team which >equates to 8-12 man hours total on site. > >Regards >Mike Dever CPP > > >"James M. Atkinson, Comm-Eng" wrote: > >> At 12:28 AM -0500 1/15/01, Charles P wrote: >> >I can give you one scenarios that is not exactly what you described but may >> >be worth consideration. >> > >> >A potential client called wanting a sweep of his home office. He said he >> >was not sure if there even was a need for a sweep but was just concerned >> >about his privacy. He wanted to know if I could come out and do a "small >> >sweep". I explained that there really is no such thing. >> > >> >Since he seemed sincerely concerned, just undecided, so I offered to meet >> >with him on a consulting basis for a few hours at a much smaller fee. I >> >would look over his situation, explain typical problems and where he seems >> >to be most vulnerable. I would also explain in greater detail what a full >> >sweep would be able to do for him. >> > >> >He was very pleased with that suggestion and immediately accepted. He has >> >not contacted me for a full sweep, but I don't think he really needed one >> >either. But he does have my name and appreciated my service. >> > >> >A "small sweep" is like putting an alarm on only the front door of your >> >house, since the burglars in your neighbor hood are rather lazy and you >> >think that's the simplest place for them to enter. >> > >> >Charles >> > >> >Charles Patterson >> >charles@t... >> >Global Communications >> >Tarrytown, NY >> >www.telephonesecurity.com >> >> I usually tell such a client that the minimum amount of time that I >> charge for any work on site is four hours. In such cases it gives me >> just enough time to unpack a small amount of gear and check for >> anything obvious, with only a bare minimum of protection being >> offered. >> >> It doesn't matter to me if I have to drag out some equipment of not, >> I still charge the same four hour minimum any time I have to go >> somewhere, or do something away from the office. If the client only >> wants a one hour consultation fine, I'll do it over the phone where I >> bill in 15 minute blocks of time (but not in person). >> >> Personally, I prefer to have at least 12 hours on-site for any sweep >> work, and like to spend about half the time of any sweep just doing >> the radiated and conducted signals analysis. >> >> -jma >> >> -- >> >> ======================================================================= >> Sed quis custodiet ipsos Custodes? >> "In a time of universal deceit, telling the >> truth is a revolutionary act" - George Orwell >> ======================================================================= >> James M. Atkinson Phone: (978) 381-9111 >> Granite Island Group Fax: > > 127 Eastern Avenue #291 http://www.tscm.com/ >> Gloucester, MA 01931-8008 jmatk@tscm.com >> ======================================================================= >> The First, The Largest, The Most Popular, and The Most Complete TSCM, >> Technical Security, and Counterintelligence Site on the Internet. >> ======================================================================= >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.onelist.com/community/TSCM-L >> >> or email your subscription request to: >> subTSCM-L@t... >> =================================================== TSKS -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2320 From: James M. Atkinson, Comm-Eng Date: Mon Jan 15, 2001 6:47pm Subject: Re: What would YOU do? At 10:13 AM +0000 1/15/01, Craig Snedden wrote: >Now now boys! > >I'd have to agree with Miguel and Hoffman to a broad degree. I'm >also a great believer in pride in the job and ethics, but being too >stuck up your own .... never paid any bills! > >What is ethically wrong in taking the job, but only after explaining >to the "client" that a sweep comes with no guarantees (something you >should do anyway) and that any reduction in your service will only >serve his fiscal needs and lead to a false sense of security. If >the client is willing to accept that, and you have the appropriate >riders on paper, signed by him, then go ahead, take his money. > >By the way, where do we get off calling each other "whores"? > >"Providing a service in return for money" isn't that what we all do? >Maybe there are too many out there who can afford to sit back and be >picky about what work they do and don't? > >:-) That is a good subject for discussion... Let me ask the list how they view the following "Ethical Continuum", and how they relate it to TSCM services. How far would someone have to go before the action would escalate the action on the scale. How would padding your invoice rank, or planting a device only to find it. Would you rank the illegal possession of eavesdropping equipment, or planting a bug to catch a criminal. 1) Public Image or Client Perception 2) Job Pride or Private Image 3) Professional Ethics (as generally accepted by your associates) 4) Personal Ethics (can you look at yourself in the mirror) 5) Professional Integrity (Do you feel good about what you do for a living) 6) Personal Integrity (can you sleep at night?) 7) Willingness to "bend the rules" 8) Willingness to "bend the law" for a higher cause 9) Willingness to "bend the law" for profit or personal gain 10) Willingness to "break the law" for a higher cause 11) Willingness to "break the law" for profit or personal gain 12) Willingness to "break the law" just for fun 13) Willingness to do anything legal for money (assuming that the thing may be embarrassing or humiliating, and you are in a real hurt for the money) 14) Willingness to do anything legal, but unethical or immoral for money (assuming you are in a real hurt for the money) 14) Willingness to do anything illegal, but ethical or moral for money (assuming you are in a real hurt for the money) 15) Willingness to do anything illegal (assuming you will not get caught, and assuming you are in a real hurt for the money) -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2321 From: James M. Atkinson, Comm-Eng Date: Mon Jan 15, 2001 7:07pm Subject: Re: ECS vs. TSCM At 3:49 PM -0500 1/15/01, Bcrews wrote: >I was recently reading an article that made a distinction >between ECS (electronic countermeasures) equipment >versus TSCM (technical surveillance countermeasures) equipment. >I am familar with the later but am unsure about the former. >Comments? > >Bill C. ECS (electronic countermeasures) is used to JAM or otherwise interfere with a surveillance activity. For example if we pickup a 398 Mhz eavesdropping signal ECS activities would simply jam the signal in a rude, crude, and totally overt manner. TSCM (technical surveillance countermeasures) on the other hand is the careful and elegant procedures use for ferreting out of the eavesdropping device, and other hunting down the actual spy. A good example is when you pickup a 2.4 GHz video signal in ant are your check, and then DF on 480 MHz IF signal to locate who is operating the equipment on the receiving end. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2322 From: Steve Uhrig Date: Mon Jan 15, 2001 9:27pm Subject: Full coverage R8500 receivers for sale Hello list, I have come across a small supply of government trade in ICOM R8500 receivers, and am offering them for sale here first before posting them on my used equipment page. These generally sell very quickly once they are posted. Many are familiar with the R8500. This is ICOM's newest wideband HF/VHF/UHF receiver, quite common with sweepers. The problem is getting them with 800 megacycle coverage. All the ones sold commercially are cellular blocked, with no provision for TSCM practitioners to obtain unblocked ones legally. We do not want receivers with holes in the coverage. Here are some that don't have the holes. These are full coverage receivers originally purchased by the government, generally used for one weekend surveillance, then traded in. Basic specs are 100kc to 2 gigs, AM, Wide FM, Narrow FM, CW, SSB. This is a triple conversion tabletop receiver powered by 12VDC or 110VAC with included power supply. Can be used portable or mobile or fixed station. Go here for full specs and a photo: http://www.icomamerica.com/receivers/tabletop/icr8500.html This receiver is the best one ICOM has released to date, significantly better than the R9000, and a later model in the series of R7000/R7100. Remember this is a full coverage receiver, and covers from 100kc (0.1 megacycles) to 2 gigs (2000 megacycles). You do not need an additional receiver to cover the HF portion of the spectrum. When not sweeping, you will use this as a lab receiver on your test bench. There is an RS232 input port as part of this receiver, so you do not need the expensive external level converter to computer control it. There are a number of third party software packages available to remotely operate the receiver. Rather than one of the computer-controlled black box receivers, the R8500 can be computer controlled as well as it has a full featured front panel for standalone use. There may be times when you do not want to drag a laptop around just to run your receiver. One of the standard internal features will scan and store any signals found in a special memory bank for later review. ICOM just raised the price on these substantially, and that higher price will soon be reflected on dealers' pricing. Even then, you can't buy them full coverage without a government sponsor willing to give you a blessing. I only have a few of these, so don't wait if you need a portable, decent full coverage receiver. Price is $2000 shipped in the U.S. This is less than current retail for a blocked receiver. Anyone buying an R8500 receiver is eligible to purchase a wideband discone antenna for $75, which is a $50 discount off the normal price of $125. This antenna is ideal for this receiver, and is a good antenna for sweeping. Mount it on a tripod or microphone stand and move the antenna around the area you are sweeping. Antenna can be used for transmit also, from 25- 2000 megs. I take credit cards for payment. And I will consider trades for other pieces of high end TSCM equipment. Swap something you don't need for something you do. Also have a few full coverage R100s just came in if anyone needs one of them. Inquire. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2323 From: Craig Snedden Date: Tue Jan 16, 2001 3:36am Subject: Re: Re: What would YOU do? Good morning all, James Atkinson has given us some food for thought..... To answer all the questions that he poses truthfully, I probably come out as a conniving, sneaky, self-serving, two faced individual that you wouldn't touch with a 10 foot pole! (I'd be really upset if I thought anyone thought I was any of these things) My own standpoint on these issues are shades of grey. For the record, (before you get a really jaundiced view of me) I regularly decline to undertake work for potential clients, when I feel that they would be wasting my time and thier money. I quite often get people who are clearly mentally disturbed contacting me, saying that they are bugged. It usually doesn't take long to find out that they are already seeing a professional more suited to thier needs and it's not a TSCM operative! See answers below: Craig ----- Original Message ----- ---Cut as irrelevant----- > Let me ask the list how they view the following "Ethical Continuum", > and how they relate it to TSCM services. How far would someone have > to go before the action would escalate the action on the scale. > > How would padding your invoice rank, or planting a device only to > find it. Would you rank the illegal possession of eavesdropping > equipment, or planting a bug to catch a criminal. > > 1) Public Image or Client Perception 50/50 balance, but I wouldn't do a "risky" job just to keep a client happy. It's a delicate balancing act, because a poor public image will lead to a decline in clients, but dis-satisfied clients will also lead down that road. > > 2) Job Pride or Private Image again 50/50 > > 3) Professional Ethics (as generally accepted by your associates) 100% > > 4) Personal Ethics (can you look at yourself in the mirror) No problem > > 5) Professional Integrity (Do you feel good about what you do for a living) Sure 100% > > 6) Personal Integrity (can you sleep at night?) Yep! > > 7) Willingness to "bend the rules" Depends very much on the degree of "bending" and the "rule" to be bent, but generally no. > > 8) Willingness to "bend the law" for a higher cause As above, but to a lesser degree, I.m going to jail for no-one! However, it depends on the situation and whether I could justify my actions to a Court at a later date. > > 9) Willingness to "bend the law" for profit or personal gain No. > > 10) Willingness to "break the law" for a higher cause > No, again I'm going to jail for no-one. > 11) Willingness to "break the law" for profit or personal gain As above. > > 12) Willingness to "break the law" just for fun > Depends on the law and the possible outcome, but generally no. > 13) Willingness to do anything legal for money (assuming that the > thing may be embarrassing or humiliating, and you are in a real hurt > for the money) Maybe, depends on what I'm being asked to do, the hurt and the money on offer. Having said that, I do tend to shy away from situations that could lead to personal or professional embarrassment. I'd probably consider it for a few seconds, then decline. > > 14) Willingness to do anything legal, but unethical or immoral for > money (assuming you are in a real hurt for the money) Generally no. As above. > > 14) Willingness to do anything illegal, but ethical or moral for > money (assuming you are in a real hurt for the money) No > > 15) Willingness to do anything illegal (assuming you will not get > caught, and assuming you are in a real hurt for the money) No. > > > -jma > > > > > > > -- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 2324 From: Steve Uhrig Date: Tue Jan 16, 2001 10:40am Subject: Gordon Liddy again http://www.sunspot.net/content/cover/story?section=cover&pagename =story&storyid=1150540205511 Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2325 From: James M. Atkinson, Comm-Eng Date: Tue Jan 16, 2001 3:15pm Subject: The Lone Ranger and Tonto are camping in the desert... The Lone Ranger and Tonto are camping in the desert, set up their tent, and are asleep. Some hours later, The Lone Ranger wakes his faithful friend. "Tonto, look up at the sky and tell me what you see." Tonto replies, "Me see millions of stars." "What does that tell you?" ask The Lone Ranger. Tonto ponders for minute. "Astronomically speaking, it tells me that there are millions of galaxies and potentially billions of planets. Astrologically, it tells me that Saturn is in Leo. Time wise, it appears to be approximately a quarter past three. Theologically, it's evident the Lord is all powerful and we are small and insignificant. Meteorologically, it seems we will have a beautiful day tomorrow. What it tell you, Kemo Sabi?" The Lone Ranger is silent for a moment, then speaks: "Tonto, you Dumb Ass, someone has stolen our tent". -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2326 From: Larry Malmberg Date: Wed Jan 17, 2001 11:16am Subject: Interesting "stuff" Cut and paste from another group I am a member of. Larry > TRANSMISSION TROUBLE? > The Toronto Globe and Mail reported yesterday that the Eagles and > Minnesota Vikings, who visited the New York Giants in playoff games the > last two weekends, accused the Giants of intercepting the transmissions > between the wireless headsets of the coaches and quarterbacks. Then, the > report said, the Giants adjusted their defense by using hand signals. > That defense was dominant in both games, surrendering 10 points total, > including shutting out the combustible Vikings. > > Andy Reid yesterday denied knowing of any such accusation and did not > complain of any irregularities during his team's 20-10 loss at Giants Stadium. > http://inq.philly.com/content/daily_news/2001/01/17/sports/EAGL17.htm > (Contributed by Joe Canone.) > > --- > > There are serious suggestions in the National Football League that the > New York Giants have been cheating in the playoffs by intercepting radio transmissions. > > The matter was first brought to the attention of NFL commissioner Paul > Tagliabue after the Giants defeated the Philadelphia Eagles in their > playoff game two weekends ago. > > The Eagles said they have reason to believe the Giants were able to > listen to the plays being sent via radio from coaches to their > quarterback, Donovan McNab. All NFL quarterbacks have helmets equipped > with special radios. Once the Giants heard the plays, the Eagles are > claiming, they were able to set up their defense accordingly with hand signals. > > Yesterday, similar fears were being expressed by the Minnesota Vikings, > who were crushed 41-0 by the Giants in the National Football Conference > final on Sunday. > > The NFL is desperately is trying to keep the issue quiet, what with the > Giants having qualified for the Super Bowl. But, rest assured, you'll > hear more about this sinister stuff in the next few weeks. > http://archives.theglobeandmail.com/ > > --- > > Background Information... > One of the most amazing new devices being used in the NFL is the > radio-equipped helmet. Quarterbacks used to wear helmets just to protect > their heads. Not anymore! Now quarterbacks also use helmets to get plays > from their coaches. > > The radio-equipped helmets let coaches give plays to quarterbacks much > faster than they could when they used hand signals or brought plays in > through substitute players. To talk to a quarterback, a coach on the > sidelines presses a button on a box strapped to his waist. The button > activates a radio transmitter, which is something like a walkie-talkie. > When the coach speaks into his microphone, the transmitter sends the > message. A device in the quarterback's helmet picks up the signal. > > Are the two teams picking up each other's radio signals and stealing > plays? Nope-because each radio signal is scrambled, or encrypted, using > a secret electronic code. The quarterback's radio receiver unscrambles > the signal, so he can understand it. But if anyone else tried to listen > to the signal, all he or she would get is a high-pitched noise that > sounds like a bunch of squawking geese! -- Amin Bey (Weekly Reader) > > --- > > RADIOS IN HELMETS -- History 101 > > April 7, 1943 - The NFL made the wearing of helmets mandatory. > > October 18, 1956 - Football commissioner Bert Bell turned thumbs down on > the use of radio-equipped helmets by NFL quarterbacks. Bell had > received, um, a lot of static about the devices which were quite popular > with coach Paul Brown of Cleveland. Word was that severe whiplash was > possible with the long antennas used. > > 1995 - Quarterbacks may now receive communication from the bench via a > small radio transmitter in their helmets. This proposal was originally > run on a test basis last year during the pre-season, but was scrapped. > > The systems, provided by Control Dynamics Corp. of Ivyland, Pa., consist > of small circuit boards encased in silicon. The > device is about 2.5 inches by 1.25 inches. It allows the quarterback > only to hear signals, not to talk back to the sideline. > > 1998 - The NFL went wireless with Telex equipment. > > June 2, 2000 - The NFL is considering a plan to let its broadcasters put > miniature cameras inside helmets and wire its players with microphones > during exhibition games. Another possibility might be putting cameras on > the umpire. No final decision as yet. However... the World Wrestling > Federation announced that its new football league, the XFL, was planning > to use miniature cameras in helmets of some players and microphones in > huddles and on the sidelines. NBC plans to televise the XFL games, which > are to begin in February. > > 1999 - Motorola became the NFL official Wireless Communications Sponsor. > > 2000 - Trakus Inc., an MIT-affiliated technology company, hopes to put > radio tags in the helmets of every NFL player starting in the 2001 > season. The information received from these tags would be processed into > information that could completely change the way we watch TV sports and > could possibly revolutionize the sports themselves. > http://exn.ca/Stories/2000/01/21/53.cfm > > --- > > We don't know how this eavesdropping story will develop. It is our > understanding that the transmissions are encrypted. We will be looking > into this further. Larry Malmberg Investigations and Security 638 North D Street San Bernardino, CA 92401-1110 P.I. 15211, P.P.O. 12466 909-383-8565, 800-655-4549 Facsimile-909-383-8566 www.larrypi.com Not everything that counts can be counted and not everything that can be counted, counts. 2327 From: Tom Suess Date: Thu Jan 18, 2001 1:08am Subject: Telephone Line Questions Hi, Comments would be appreciated from list subscribers on the following telephone line balance/audio amp./line noise questions: Background * high rise apartment, no access to NID box * computer dial up connection fails ~ 80% on each of two different computers...a random group of alpha-numeric symbols appear in the log-in boxs on the computer screens after the telephone line is plugged into the computer modular jack, but only about 80% of the time. * ISP reports no problems at their end * TelCo is not interested... * all phone equipment unplugged, and line balance tested as per Ted Swifts book, "A Guide to Checking Telephone Lines", pages 48-54 * line balance measurements made with a Fluke 189 multimeter * both resisters match exactly @ 3013.8 Ohms, solder connection is good * the ring-to-earth-ground (table, A, page 53), voltage was fluctuating from -51.2 to -52 volts, regardless of multimeter range, and all connections were secure. The average (mean) reading was used * the tip-to-earth-ground reading (table, B, page 53) was also fluctuating * the series imbalance (table, H, page 53) is calculated to be 45.78 Ohms, but I do not have confidence in this number due to the phone line voltage fluctuation Additional Items * ongoing minor telephone harassment - crank/hang-up calls * phone displays "line-is-busy" after each crank phone call terminates. After unplugging and reconnecting the phone line, the "line-is-busy" warning disappears from the display * Some background voice and DTMF tones were audible during the test performed with the mini audio amplifier (Ted Swift book, p 40), but they were barely audible. Questions * Is it a normal TSCM experience to hear slight background voice and DTMF tones on the phone line during the amplifier check (the test amp. was the low cost RS model recommended by the book)? * What are the most likely causes of phone line noise? What sequence of test methods would identify intermittent phone line noise? * Is fluctuation in phone line voltage normal? If so, what is the average voltage fluctuation? If not, what are the possible causes? Thanks in advance for the help. 2328 From: St. Clair, James Date: Thu Jan 18, 2001 6:50am Subject: FW: Cellular telephone may have caused deadly Swiss air crash Cellular telephone may have caused deadly Swiss air crash Air Disaster.com, 01/17/2001 http://www.airdisaster.com/news/0101/12/news.html Swiss aviation investigators said yesterday that a mobile phone may have caused a Saab 340 to crash shortly after take-off from Zurich airport a year ago, killing all 10 passengers and crew on board. According to Chris Mason, a spokesman for the Civil Aviation Authority, it would be the first time a mobile phone had caused a crash. Studies have proved that radio waves from mobile phones while switched on can interfere with aircraft electronic and navigation systems and that the use of mobile phones aboard aircraft presents even greater safety risks. Jean Overney, leading investigations into the crash of Crossair flight LX 498 on January 10 last year, said tests with the same aircraft model had shown that the Saab 340's navigation system could be disrupted by a mobile phone. Mr Overney said: "We have asked mobile phone operators to check whether a call was made or a message sent just before the crash. These are recorded precisely to the second. We need a court order to give us access, but should have this data by the end of May." The use of mobile phones on board a plane is outlawed in most countries. But passengers often forget to switch off mobile phones, and in some cases have packed working phones in the aircraft hold. This has led to a series of alerts. This week, a Slovenian airliner made an emergency landing in Ljubljana after a mobile phone caused the electronics system to malfunction and falsely indicate an onboard fire. An investigation showed that the alarm had been caused by the mobile phone, which had been stowed in the luggage compartment and had not been switched off. Two years ago a Briton was sentenced to a year in jail by a Manchester court for "recklessly and negligently endangering" an international flight by refusing to switch off his phone. 2329 From: Charles P Date: Thu Jan 18, 2001 10:33am Subject: Re: Telephone Line Questions Tom, some questions: what type of telephone set? Since it has some kind of display that says "line in use", is it part of a phone system? Some high rise appartments have phone systems installed, but the voltage probably would not be 52v if that was the case. Voltage fluctuation of a small amount may be normal. Can you make normal phone calls on the line with no problem? i.e. does is sound clear for a normal conversation? If you are hearing voices and dtmf on the pair when the phone is not in use, it is probably crosstalk or possibly picking up rf on the wires or a combination. This is probably an old building with very old wiring that has been moved around and updated many times over the years, therefore the wire for that phone line may have poor connections or perhaps is twisted around other pairs in such a way that it picking up extraneous signals. This would also cause poor dial-up connection as well. You did not mention what software you were trying for dial up. If you are trying to log onto the Internet through the ISP, are you using Internet Explorer, Netscape, or AOL? If you are just using a terminal program to log in to another computer you frequently will get garbage on the screen if you have the wrong terminal settings or if you have a bad connection. You can try connecting the computer on a different phone line to see if it is working properly by itself. Note that these days, many people believe that they are being harrassed by hang up calls but it is actually a multitude of automatic dialers for telemarketers, auto fax dialers, and the like. (And I do mean _multitude_). Companies that have multiple lines with numbers in sequence (i.e. 555-1200, 1201, 1202, 1203, etc) often report hang up calls that they can see come on line 1 then 2 then 3 then 4... as the auto dialers make their rounds, it happens at my office fairly regularly. Someone else may have a more indepth analysis of the line balance, but the 45 ohms may just be some of the bad wiring in the building, with an extra loop stuck on it somewhere that could also help to create cross talk. A tdr would be useful to track it down. These are some of the "non-threatening" possibilities. Have fun! Charles Charles Patterson charles@t... Global Communications Tarrytown, NY www.avtele.com www.telephonesecurity.com ----- Original Message ----- From: "Tom Suess" To: Sent: Thursday, January 18, 2001 2:08 AM Subject: [TSCM-L] Telephone Line Questions > Hi, > > Comments would be appreciated from list subscribers on the following > telephone line balance/audio amp./line noise questions: > > Background > > * high rise apartment, no access to NID box > * computer dial up connection fails ~ 80% on each of two different > computers...a random group of alpha-numeric symbols appear in the > log-in boxs on the computer screens after the telephone line is > plugged into the computer modular jack, but only about 80% of the > time. > * ISP reports no problems at their end > * TelCo is not interested... > * all phone equipment unplugged, and line balance tested as per Ted > Swifts book, "A Guide to Checking Telephone Lines", pages 48-54 > * line balance measurements made with a Fluke 189 multimeter > * both resisters match exactly @ 3013.8 Ohms, solder connection is > good > * the ring-to-earth-ground (table, A, page 53), voltage was > fluctuating from -51.2 to -52 volts, regardless of multimeter > range, and all connections were secure. The average (mean) reading > was used > * the tip-to-earth-ground reading (table, B, page 53) was also > fluctuating > * the series imbalance (table, H, page 53) is calculated to be 45.78 > Ohms, but I do not have confidence in this number due to the phone > line voltage fluctuation > > Additional Items > > * ongoing minor telephone harassment - crank/hang-up calls > * phone displays "line-is-busy" after each crank phone call > terminates. After unplugging and reconnecting the phone line, the > "line-is-busy" warning disappears from the display > * Some background voice and DTMF tones were audible during the test > performed with the mini audio amplifier (Ted Swift book, p 40), but > they were barely audible. > > Questions > > * Is it a normal TSCM experience to hear slight background voice and > DTMF tones on the phone line during the amplifier check (the test > amp. was the low cost RS model recommended by the book)? > * What are the most likely causes of phone line noise? What sequence > of test methods would identify intermittent phone line noise? > * Is fluctuation in phone line voltage normal? If so, what is the > average voltage fluctuation? If not, what are the possible causes? > > Thanks in advance for the help. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2330 From: James M. Atkinson, Comm-Eng Date: Thu Jan 18, 2001 10:41am Subject: Re: Telephone Line Questions This is why it is critical to use a TDR when checking phone lines. The "balance line test" is of greatest value if the suspect device is series in nature, and is parasitic in it's power draw. Professional taping equipment is typically PARALLEL in nature, and does not draw current from the targeted line. When performing the audio check you need a very high impedance LOW NOISE audio amplifier, and you need to punch up the gain to at least 100 dB (over 110 dB is ideal). When you do this you will hear what is called "cross talk" and "line noise". This is normal, but the presence of stable tones (ie" DTMF "C") could indicate a slave located on the cable (but not on the current pair). My preference is to perform the high impedance audio checks, and then attach a buffer amplifier/transient limiter and route the output to a spectrum analyzer. This way I can SEE what is on the line, as opposed to trying to hear it. (of course all of this is done in a non-alerting fashion). Balanced line tests, Wet and Dry Time Domain Reflectometry, giga-ohm testing, milli-ohm testing, crosstalk analysis, capacitance testing, and so on are also important (and would not be used until you get to the alerting stages). A voltage variation means virtually nothing.... but it is nice to know. You HAVE TO LOCATE what is causing the voltage variation, and why. It could be completely normal, or maybe not... but you have to find out and not just assume its a bug because your volt meter twinkles. The Radio Shack audio amp is shit... complete and utter shit... buy a couple of Kaiser 1059's and you will be stunned at the difference. I notice that you didn't indicate how much loop current was being drawn to "draw tone", nor the resistance of the line and instrument.... these things are critical. Also, how much C-Message band noise was there, and where where the loading coils (if any). -jma At 11:08 PM -0800 1/17/01, Tom Suess wrote: >Hi, > >Comments would be appreciated from list subscribers on the following >telephone line balance/audio amp./line noise questions: > >Background > > * high rise apartment, no access to NID box > * computer dial up connection fails ~ 80% on each of two different > computers...a random group of alpha-numeric symbols appear in the > log-in boxs on the computer screens after the telephone line is > plugged into the computer modular jack, but only about 80% of the > time. > * ISP reports no problems at their end > * TelCo is not interested... > * all phone equipment unplugged, and line balance tested as per Ted > Swifts book, "A Guide to Checking Telephone Lines", pages 48-54 > * line balance measurements made with a Fluke 189 multimeter > * both resisters match exactly @ 3013.8 Ohms, solder connection is > good > * the ring-to-earth-ground (table, A, page 53), voltage was > fluctuating from -51.2 to -52 volts, regardless of multimeter > range, and all connections were secure. The average (mean) reading > was used > * the tip-to-earth-ground reading (table, B, page 53) was also > fluctuating > * the series imbalance (table, H, page 53) is calculated to be 45.78 > Ohms, but I do not have confidence in this number due to the phone > line voltage fluctuation > >Additional Items > > * ongoing minor telephone harassment - crank/hang-up calls > * phone displays "line-is-busy" after each crank phone call > terminates. After unplugging and reconnecting the phone line, the > "line-is-busy" warning disappears from the display > * Some background voice and DTMF tones were audible during the test > performed with the mini audio amplifier (Ted Swift book, p 40), but > they were barely audible. > >Questions > > * Is it a normal TSCM experience to hear slight background voice and > DTMF tones on the phone line during the amplifier check (the test > amp. was the low cost RS model recommended by the book)? > * What are the most likely causes of phone line noise? What sequence > of test methods would identify intermittent phone line noise? > * Is fluctuation in phone line voltage normal? If so, what is the > average voltage fluctuation? If not, what are the possible causes? > >Thanks in advance for the help. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2331 From: Robert G. Ferrell Date: Thu Jan 18, 2001 0:48pm Subject: Re: Telephone Line Questions > * computer dial up connection fails ~ 80% on each of two different > computers...a random group of alpha-numeric symbols appear in the > log-in boxs on the computer screens after the telephone line is > plugged into the computer modular jack, but only about 80% of the > time. Are you sure they're 'random?' Modem commands often appear to be 'random groups of alpha-numeric' characters. In the standard Hayes command set, for example, ATE0 Q0 V1 X1 is an initialization string that turns on command echoing and long result codes, and selects blind dialing (no dial tone confirmation). It would help to see one of these sets of random symbols... Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2332 From: James M. Atkinson, Comm-Eng Date: Thu Jan 18, 2001 3:02pm Subject: Two new FBI agents were in a parking lot... [humor] Two new FBI agents were in a parking lot trying to unlock the door of their car with a coat hanger. They tried and tried to get the door open, but they couldn't. The one with the coat hanger stopped for a moment to catch his breath, and fellow agent said anxiously, "Hurry up! It's starting to rain and the top is down." -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2333 From: Tom Suess Date: Thu Jan 18, 2001 0:08pm Subject: Re: Telephone Line Questions Reply to: Charles Patterson Thanks for the help. The answers to your questions are listed below: Date: Thu Jan 18, 2001 5:29pm Subject: Re: Telephone Line Questions Reply to: Robert Ferrell Thanks for the help. The replies are listed below: Date: Fri Jan 19, 2001 0:57am Subject: Freq hopper? I've isolated what appears to be a digital frequency hopping transmission near a client's office. The pulses are extremely fast, and follow each other on a wide bandwidth (across some 50 KHz) around 2.455 GHz. The signal is relatively powerful, and easily spotted with a whip antenna. Each pulse has very narrow deviation. Monitored over time, the pulses span the entire bandwidth. The office is somewhat shielded from L.A. area RF congestion by nature of its location. Am I missing something really obvious? Can't sleep well at night... -Eric Leonard 2336 From: Tom Suess Date: Thu Jan 18, 2001 5:40pm Subject: Re: Telephone Line Questions Reply to: James Atkinson Thanks for the help. The replies are listed below: Date: Fri Jan 19, 2001 9:57am Subject: How Electronic Tags Work to Foil Shoplifters Technology in Store How Electronic Tags Work to Foil Shoplifters By Todd Campbell Q U E S T I O N: How do those little sensor strips that are embedded in the cover of books in libraries and in products in the store work? A N S W E R: Welcome to the world of "loss protection," an entire industry dedicated to the art of preventing something called "shrinkage," better known to the rest of us as "shoplifting." How big a problem is shrinkage? Estimates of the dollar value vary widely, but here is a nice round number for the total value of goods that are secreted out of stores in the United States by nonpaying customers each year: $26 billion, according to a University of Florida study. That's a lot of shrinkage! So what's a store owner to do? Watching every customer - either in person or with a closed circuit video camera - isn't practical, and putting all of your goods in cases and behind counters isn't good for business. Electronic Tags Instead, a lot of stores (and libraries) use something called Electronic Article Surveillance, or EAS. All EAS systems have three components: labels or hard tags that are attached to the merchandise; detectors within the tag or label that trigger an alarm if you try to leave a store without paying for an item; and deactivators, which allow a sales person to turn off or remove a tag or label once you've paid for an item. There are four basic EAS systems used in stores today. The oldest type uses microwave technology. In these systems, the detector consists of two transmission antennas which send out two different signals: one is a high-frequency signal between 902 and 906 MHz, the second is a much lower frequency, around 111.5 kHz. The detector also includes a high-frequency receiver. The tags in these systems - which are usually those big hard plastic things that can make it a pain to try on an article of clothing - consist of a microwave diode and an antenna that can receive both the high and low frequency signals and also send a high frequency signal. If you are attempting a little "shrinkage" action with a piece of clothing sporting a microwave tag, when you walk by a detector the tag will read the two frequencies, combine them, and then retransmit them as a single signal. The detector then checks to make sure that the signal it is receiving is the right frequency (say, 903 MHz plus 111.5 kHz). If it is, the detector triggers the alarm. The only way to disarm this system is to remove the tag. Occasionally, someone forgets to remove it and the tag fails to trigger the alarm. That's one of life's more annoying retail moments: getting home with a spiffy new sweater only to realize you can't wear it because it still has that clunky tag on it. Actually, it happens more than occasionally: these systems fail about 20 percent of the time. But I did mention that this is an old technology? Radio Systems More common these days, especially in the United States, are radio frequency (RF) systems. Detectors in these systems use two pedestals which serve as gates that you pass between when you leave a store. One is a transmitter that sends out a signal (the normal range is 7.4 to 8.8 MHz). The other pedestal is a receiver. RF systems use small flat, usually square-shaped, labels that have an electronic circuit containing a capacitor and an inductor. When the label receives a signal from the detector, it energizes the capacitor and the inductor, which causes them to send energy back and forth at a specific frequency. The tag then transmits a signal that is picked up by the receiver. The receiver also picks up the signal sent by the transmitter in the other gate. It compares the two signals and if the difference is correct, the alarm goes off. When you pay for an item with an RF tag, the salesperson exposes the tag to a very strong RF pulse that burns out the components of the electronic circuit, rendering the tag incapable of transmitting a signal. In Europe, many stores use an electromagnetic (EM) system in which a low frequency electromagnetic field is generated between the two pedestals or gates. That field changes strength and polarity, switching back and forth from positive to negative. The labels in EM systems have a small embedded wire that changes magnetic state when it is exposed to the changing electromagnetic field. Each time the wire flips from positive to negative, it generates a signal which is picked up by a receiver in the detector. EM labels are easy to deactivate - exposing them to a magnet does the trick - and reactive, a feature that makes them ideal for use in libraries hoping to cut down on book shrinkage. AM Systems A fourth system, called acousto-magnetic, or AM for short, sends out a radio frequency signal (58 kHz is typical) in short bursts, transmitting anywhere from 50 to 90 pulses per second. AM system labels have a resonator and a magnetic strip. The radio frequency burst makes the resonator vibrate, initiating a signal that is tuned to match the original signal from the transmitter. The resonator works like a tuning fork, sending out a sustained signal and if the receiver continues to detect the proper radio frequency in between pulses, the alarm is triggered. The label can be turned off by demagnetizing it. Until recently, adding sensor tags and labels was left up to the store. The newest trend is called source tagging. With source tagging, a security label is added by the manufacturer, embedded in the packaging, say, or placed under a label, or even woven directly into an article of clothing. There is talk that these tags will eventually be used to help with inventory control as well as shoplifting. So how useful is "loss prevention" in reducing "shrinkage"? Industry estimates are that EA systems can reduce theft by up to 60 percent. EAS systems are such a strong disincentive to would-be shoplifters that some stores have taken to putting fake detector gates and fake tags on items, which provides at least some of the deterrence at a much reduced cost. Such dummy systems also increase the likelihood that you'll end up with a brand new article of clothing with a plastic tag still attached. I don't know about you, but I hate it when that happens. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2338 From: James M. Atkinson, Comm-Eng Date: Fri Jan 19, 2001 10:22am Subject: Re: Freq hopper? At 6:57 AM +0000 1/19/01, Eric wrote: >I've isolated what appears to be a digital frequency hopping >transmission near a client's office. The pulses are extremely fast, >and follow each other on a wide bandwidth (across some 50 KHz) around >2.455 GHz. The signal is relatively powerful, and easily spotted >with a whip antenna. Each pulse has very narrow deviation. >Monitored over time, the pulses span the entire bandwidth. > >The office is somewhat shielded from L.A. area RF congestion by >nature of its location. > >Am I missing something really obvious? Can't sleep well at night... > >-Eric Leonard It was probably a microwave oven. They use (or are supposed to use) a signal at 2.450 GHz, and use a "chopper circuit" which almost makes the signal look like a pulse modulated signal. The pulse repetition rate and pulse duration is what gives the psuedo-bandwidth. Try this, park your rock stable spectrum analyzer right at 2.450 GHz and use an IF BW of say 100 kHz, then drop into zero span. You should see a nice 60 Hz signal (of a harmonic/sub harmonic thereof) if a microwave oven is being used. Then use a direction antenna/waveguide to find what is actually causing the signal (and never just assume that it is a microwave oven). I would point out that it could also be an ISM devices, a network connection, a pulse modulated data stream, and any one of a hundred different eavesdropping signals... but only a very careful analysis will tell for sure. Following the below sequence and you will find it easier to hunt down such devices.. 1) Isolate in the FREQUENCY domain (using a spectrum analyzer or search receiver) 2) Isolate in the TIME domain (use an Oscilloscope, or Zero Span on your SA Always go back to #1 your not successful in isolating the signal in the time domain) 3) Isolate in the SPACE domain (use a directional antenna to find WHERE the signal is coming from, and WHAT is causing it. Always go back to #2 your not successful in isolating the signal in the space domain) 4) Isolate in the PHYSICAL domain (use various hand tools, Xray equipment, and so on to determine if the thing creating the signal is supposed to be creating the signal, and determine if it is hostile or not. Always go back to #3 your not successful in isolating the signal in the physical domain) -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2339 From: Dawn Star Date: Fri Jan 19, 2001 0:07pm Subject: Telephone Line Questions From: Tom Suess Subject: Telephone Line Questions Hi, Comments would be appreciated from list subscribers on the following telephone line balance/audio amp./line noise questions: This ones easy, if you are not using a TDR you should not be sweeping telephone lines for compensation. Roger [Non-text portions of this message have been removed] 2340 From: Dawn Star Date: Fri Jan 19, 2001 0:10pm Subject: Key to the puzzle "Professional taping equipment is typically PARALLEL in nature, and does not draw current from the targeted line." jma I give you a hint of a key to the puzzle " what is the impedance of the drop wire or wire extension to the loop?" Roger [Non-text portions of this message have been removed] 2341 From: Robert G. Ferrell Date: Fri Jan 19, 2001 0:13pm Subject: Re: Re: Telephone Line Questions >I will contact the ISP for the copy directions, and foreword >the symbols to you. FYI for the list, he did forward them, and they were truly random. Looks like the typical noise I used to see on analog lines. Generally that sort of manifestation was accompanied by audible static. If there are no spurious signals on the line itself, then perhaps the interference is being injected further downstream (i.e., at the modem or the PC com port)... Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== From: Tech Sec Lab Date: Sat Jan 15, 2005 7:37am Subject: RE: GPS tracking Check out the schematics on the Phrack newsletter, shows a basic jammer. http://www.phrack.org/show.php?p=60&a=13 Russian http://www.qsl.net/n9zia/wireless/gps_jam-pics.html As to AW's post, do you have any info on this composite pulse...links or research? Kind regards -Ois ********************* Message: 1 Date: Fri, 14 Jan 2005 06:23:58 -0500 From: Tensor66B@n... Subject: RE: GPS tracking system signal inhibitors Gentlemen, Obviously using such a device would be highly illegal. With a CW signal and 50 mW of RF power the jammer could be easily tracked within 1km using a conventional DF or even "fox hunt" handheld DF (By the way Cubic makes such DF with a similar application in mind). But more elegant jammers do exist. They use low power composite pulse signals. These jammers are practically not detectable from a distance more than 10 meters even with a dedicated equipment. For further technical details ask CIA or KGB. They have developed these devices for their respective diplomats. By the way even with CW signal you do not need 50 mW RF power to jam GPS receiver. For a SiRF and similar direct conversion receiver 50 microwatts would be enough. Even old Rockwell Navcore can be disabled with 5 mW. Well, this is not a "do it yourself" site as our moderator would say so I am closing down. Regards, A.W. 10618 From: Tech Sec Lab Date: Sat Jan 15, 2005 10:25am Subject: FW: Tech Sec Group For anyone interested, Regards -Ois -----Original Message----- Maybe you can pass this onto interested parties, There is a Technical Security Professional Group, open to active professionals. Details are here: http://ocean-research.net/mailman/listinfo/c4i-l_ocean-research.net Registration is subject to verification. Cheers Sarah 10619 From: A Grudko Date: Sat Jan 15, 2005 4:50pm Subject: RE: question about border -----Original Message----- > ...... legal issues in crossing international borders with certain TSCM equipment. David does not say what his country of origin is. He says 'our' borders but signs his post as 'david from 'paris' with a US .com address, so he might be from France or one of the 12 towns in the US. Nor does he name the country whose border he wishes to cross into. We also have a 'Paris' here in South Africa but it's spelled 'Parys'. So let's leave that out, but I frequently travel in 'back-hander' southern Africa with my TSCM equipment, sometimes for companies, sometimes for government departments, so if you are heading this way, here are some unofficial rules: Rule 1 : Find out the destination laws re. receivers, transmitters and technical equipment. There are always exceptions for specialists or government mandated companies but always have the correct written authority in your hand with certified copies at 'home'. Rule 2 : Make sure someone briefed and competent is at the end of a phone at home 24/7 in case a SNAFU is triggered by the awaiting customs officials Rule 3 : Have certified copies of proof of purchase for everything Rule 4 : If the airports customs you departed from offer to document technical/dutyable good before you leave, DO SO Rule 5 : Have a list of your destination contact's numbers so you can call them and they can explain to the airport officials why you are there and vouch for you Rule 6 : Have a lawyer fully briefed and on call. If you end up in a jail you want out ASAP under today's environment. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 [Non-text portions of this message have been removed] 10620 From: Gregory Hicks Date: Fri Jan 14, 2005 10:49pm Subject: Re: GPS Jammer > To: > From: "Hawkspirit" > Date: Fri, 14 Jan 2005 20:36:11 -0800 > Subject: [TSCM-L] GPS Jammer > > > > > HYPERLINK > "http://www.phrack.org/phrack/60/p60-0x0d.txt"http://www.phrack.org/phra ck/6 > 0/p60-0x0d.txt > > Does anyone know how to decode the schematic? Cut off the text down to the BEGIN line. Ensure that the END line is still attached. Save to a file. On a Unix box, do "uudecode > Roger > > > -- > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.6.12 - Release Date: 1/14/2005 > > > > > [Non-text portions of this message have been removed] > > > > ------------------------ Yahoo! Groups Sponsor > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > --------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 | Fax: 408.894.3479 San Jose, CA 95134 | Internet: ghicks@c... I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton [Non-text portions of this message have been removed] 10621 From: The Price's Date: Fri Jan 14, 2005 10:52pm Subject: RE: Icom IC-R3 and R20 I deal with a fellow named Pete Petola at www.bander.com he is out of the Netherlands. Both honest and fair. Shipping is quick and he likely has in stock the items you require. John -----Original Message----- From: Javier Villanueva [mailto:javier_vc1@y...] Sent: January 14, 2005 7:06 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Icom IC-R3 and R20 Hi List, I4ve been trying unsuccesfully to buy this equipment Online. All of the shops i4ve found replied they are "out of stock". If any of you sell these, offer "Special modified versions", or know where to find them, i4ll be grateful. Payment by credit card and express delivery to Mexico a big plus. Most probably this will be just the first buy, with more to come. Thank you very much guys. ===== Javier Villanueva C. Vcorp & Asociados Contraespionaje Electrsnico y Seguridad Informatica Tel. 01 (33) 36 19 47 09 cel. 044 333 392 64 50 msm. javier_vc@h... __________________________________ Do you Yahoo!? Yahoo! Mail - now with 250MB free storage. Learn more. http://info.mail.yahoo.com/mail_250 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10622 From: wiggyyy2000 Date: Sat Jan 15, 2005 10:18am Subject: Re: identity theft is a major problem in America. a freind of mine used to work at a place where they do points, in other words when you get points for using your air miles visa or amex and he told me he had all the info of peoples cc and ssn, it was scary and they are not monitored like at the cc companies, so be carful when you sign up for those " perks" --- In TSCM-L@yahoogroups.com, "Roger" wrote: > > > Dear Member > > It's no secret that identity theft is a major problem in America. > Think you're not at risk? Unfortunately you are. > > - Do you hand your credit card to servers at restaurants? > - Do you sign your credit cards? > - Do you supply personal information over the internet? > - Do you keep your Social Security number in your wallet or purse? > - Do you leave mail at your home or business for the postal carrier > to collect? > - Do you shred unwanted mail with personal information? > > > What if you discovered that your identity had been stolen? > - Call your bank and/or credit card company > - Contact the three major credit repositories > - Go through the helpful but extensive steps recommended by the > Federal Trade Commission in its 30-page consumer support publication > - Fill out and submit the affidavit form supplied by the FTC to > dispute new, unauthorized accounts > - Spend on average $1,500 in out-of-pocket expenses to resolve the > many problems cause by identity thieves > > WITH THE IDENTITY THEFT SHIELD: Get REGULAR monitoring of your credit > report and let the proven leaders in the identity restoration and > legal services fields assist you. > > With no obligation, you can view a short presentation and learn more > by visiting my website. See what Pre-Paid Legal can do for you at: > > http://www.prepaidlegal.com/idt/hollowaypi > > Thank you for your time and if you're interested or just have > questions, I'll be happy to help. Please feel free to contact me at > your convenience. > > > Sincerely, > > Roger Holloway > Independent Associate > Pre-Paid Legal ServicesÆ, Inc. > > 940-592-7000 > > www.TexasDetective.com > > www.RogerHolloway.com 10623 From: wiggyyy2000 Date: Sat Jan 15, 2005 10:23am Subject: Re: question about border i have personally crossed over an oscor from canada into the us and then back to canada...it was the new york plattsburgh border, sometimes they could give you a rough time but if paperwork is good, you will just slide by --- In TSCM-L@yahoogroups.com, "Andy Moore" wrote: > David, > at a guess, I'd imagine that there would be legal issues in crossing > international borders with certain TSCM equipment. Many countries have > regulations about possessing equipment which can receive frequencies other > than broadcast and most will have rules relating to radio transmission > equipment such as NLJDs. Standard ICT test equipment, such as multimeters > and butt sets, probably wouldn't attract too much attention but spectrum > analysers which reach into 10's of GHz might be subject to arms export > regulations (!). All in all, you'd need to check with the countries into > which you are importing the equipment - professional import/export handlers > may be able to assist. In the face of these risks, you're unlikely to have > any problems whatsoever travelling by road within the EU although airport > x-rays may result in a detailed inspection by customs! > > Andy M > > ----- Original Message ----- > From: "delta" > To: > Sent: Friday, January 14, 2005 2:57 PM > Subject: [TSCM-L] question about border > > > > > > > > hello everybody > > do you know if it is legal to pass the border with some tscm equipment ( > cpm700 oscor tdr etc ... ) or if we need a special > > authorisation to go outside our country ? > > may be the rules are different between some country ? > > many thanks > > david from paris > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > 10624 From: wizardtradingcompany Date: Sat Jan 15, 2005 11:07am Subject: Safecracking for the computer scientist Somebody mentioned Bruce Schneier & counterpane in a previous post. I didn't read it entirely, so this may be duplication. Anyway, here's what Schneier says about the paper below: It's a great paper, and it has completely pissed off the locksmithing community: 10625 From: James M. Atkinson Date: Sat Jan 15, 2005 9:02pm Subject: MI5 boss admits bugging Adams http://www.timesonline.co.uk/printFriendly/0,,1-523-1442540-523,00.html January 16, 2005 MI5 boss admits bugging Adams David Leppard THE head of MI5, Eliza Manningham-Buller, has admitted that British intelligence agents have been bugging Gerry Adams and other top Sinn Fein officials. Manningham-Buller told a closed meeting of the parliamentary intelligence and security committee before Christmas that MI5 had planted a sophisticated listening device at the head offices of Sinn Fein at Connolly House in Andersonstown, west Belfast. In the security serviceís first formal acknowledgment of the bugging operation, MI5ís director-general told the committee, which monitors Britainís intelligence services, ìthey [Sinn Fein officials] had to almost shred the office to find itî. The 5 ft device was found last September hidden in a floor joist at the headquarters of the party, which is the IRAís political wing. Sinn Fein said at the time that two live microphones were found, one pointed towards the upstairs office and the other at a downstairs conference room. When the bugging was disclosed, Downing Street and the Northern Ireland Office declined to discuss the matter. But the find embarrassed Tony Blair who only days later had to face Adams, the party president, and other Sinn Fein officials for talks. Adams described the bug as ìa serious act of bad faithî and ìa violation of human rightsî. He added: ìThe British make it very, very hard to make peace when this goes on . . . this is a violation of the peace process.î Manningham-Bullerís admission of the MI5 bugging operation comes as the peace process is under renewed threat because of the IRAís alleged involvement in the £26.5m robbery at the Northern Bank last month. Hugh Orde, the chief constable of Northern Ireland, has said that ìintelligenceî has linked IRA leaders to the crime. The Connolly House bug was the latest in a series to have been found in property used by senior Sinn Fein and IRA members. Just a week earlier, a listening device had been found at the home of Paula McManus, who works in Adamsís west Belfast constituency offices. She is not suspected of any wrongdoing but her home was targeted because of her friendship with Martin Lynch, the adjutant-general of the IRA. He in turn is said to have met Bobby Storey, the IRAís director of intelligence, at the flat. That bug consisted of a microphone, six battery packs and a transmitter. It was concealed in the beam in the loft of the flat, which could be accessed from a communal area at the front of the building. Adams and Martin McGuinness, the partyís chief negotiator, blamed Paul Murphy, the Northern Ireland secretary, for authorising the surveillance operation. In 1999, a sophisticated listening and tracking device worth £20,000 was found built into a car owned by Lynch. Adams and McGuinness said the car had been used to take them to meetings with the IRA leadership. The bugging occurred during the review of the Good Friday agreement by George Mitchell, the former US senator. The intelligence and security committee was set up by an act of parliament in 1994 as a watchdog for the intelligence services. It is chaired by Ann Taylor, the former Labour chief whip, and comprises senior MPs and one member of the House of Lords. It reports directly to the prime minister on the work of MI5, MI6 and GCHQ, the governmentís eavesdropping agency. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10626 From: James M. Atkinson Date: Sat Jan 15, 2005 9:06pm Subject: Inspector General Rebukes F.B.I. Over Espionage Case and Firing of Whistle-Blower http://www.nytimes.com/2005/01/15/national/15translate.html Inspector General Rebukes F.B.I. Over Espionage Case and Firing of Whistle-Blower By ERIC LICHTBLAU Published: January 15, 2005 ASHINGTON, Jan. 14 - The F.B.I. has failed to aggressively investigate accusations of espionage against a translator at the bureau and fired the translator's co-worker in large part for bringing the accusations, the Justice Department's inspector general concluded on Friday. In a long-awaited report that the Justice Department sought for months to keep classified, the inspector general issued a sharp rebuke to the F.B.I. over its handling of claims of espionage and ineptitude made by Sibel Edmonds, a bureau translator who was fired in 2002 after superiors deemed her conduct "disruptive." Ms. Edmonds, who translated material in Turkish, Persian and Azerbaijani, had complained about slipshod translations and management problems in the bureau's translation section and raised accusations of possible espionage against a fellow linguist. The report from the office of Glenn A. Fine, the Justice Department's inspector general, reached no conclusions about whether Ms. Edmonds's co-worker had actually engaged in espionage, and it did not give details about the espionage accusations because they remain classified. But officials have said Ms. Edmonds said the co-worker, a fellow Turkish linguist, had blocked the translation of material involving foreign acquaintances of hers who had come under suspicion. In general, Mr. Fine's investigation found that many of Ms. Edmonds's accusations "were supported, that the F.B.I. did not take them seriously enough and that her allegations were, in fact, the most significant factor in the F.B.I.'s decision to terminate her services." Ms. Edmonds's case has become a cause cÈlËbre for critics who accused the bureau of retaliating against her and other whistle-blowers who have sought to expose management problems related to the campaign against terrorism. The American Civil Liberties Union joined her cause earlier this week, asking an appellate court to reinstate a whistle-blower lawsuit she brought against the government. The suit was dismissed last year after Attorney General John Ashcroft, invoking a rarely used power, declared her case to be a matter of "state secret" privilege, and the Justice Department retroactively classified a 2002 Congressional briefing about it. Responding to the investigation's calls for improvements in the management of translation services, the F.B.I. said Friday that it had taken steps to reorganize the operation and instituted "competency models" for hiring and training translators. A broader review by the inspector general released in September had found systematic problems in the F.B.I.'s translation capabilities and large backlogs in its translation of terrorism-related material. The F.B.I. also said Friday that it was continuing to investigate Ms. Edmonds's claims and restated its commitment to ensuring that whistle-blowers "who raise good faith concerns" do not face retaliation. Ms. Edmonds, for her part, said she viewed the inspector general's report as "an absolute vindication." "After all the delays in getting this story out, I wasn't expecting a lot," she said in an interview. "This report is certainly more than I expected, and I'm actually pretty pleased." Senators Patrick J. Leahy of Vermont, a Democrat, and Charles E. Grassley of Iowa, a Republican, who have been two of the F.B.I.'s toughest critics, said the report underscored their broader concerns about the bureau's treatment of dissenters, particularly on critical matters involving terrorism and espionage. "This report confirms that the F.B.I. failed to treat this case as seriously as the situation demanded," Mr. Leahy said. "It is unacceptable, and it deeply concerns us, that in the wake of the Robert Hanssen spy case, and in the months following Sept. 11, the F.B.I. failed to vigorously investigate these grave allegations." ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10627 From: contranl Date: Sun Jan 16, 2005 0:26am Subject: Announcing a new Yahoo-group " Traffic-Cams " . Hi, I like to announce a new Yahoo group that i have started,It's called "Traffic-Cams" The group can be found here: http://groups.yahoo.com/group/traffic-cams/ It deals with all aspects related to traffic-cameras. There must be 10000's online,live and realtime on the net ! Check it out and visit the links-section where you find all traffic-cams in the world sorted by country or type (streaming-video / streaming-jpg's / stills) Learn about how video-signals are transported over the internet and how to embed video-cam screens on a webpage Check what the governments (departments of transportation) are looking at See how privacy is respected (or not) when they temporarely switch-off a camera when details or noticable. Or just take a virtual world-tour and visit some exotic countries like Hongkong,Brazil,Japan,Korea or just look at European or USA traffic-cams Some traffic-cam sytems just send dull non-moving pix ...with some javascript or html you can change those into dynamic movies (auto-refresh) Or combine a few traffic-cams with a local radio-scanner feed on 1 web-page to get the real feel of being in the control-room :) I have succeeded in embedding a web-page of my own inside the homepage of this Yahoo-group...so now you have live-video there ! Your welcome ! Greetings Tetrascanner Amsterdam The Netherlands W: www.tetrascanner.com 10628 From: Date: Sat Jan 15, 2005 10:58pm Subject: Microphone wire I am looking for a good source of ultra thin screened mic wire Preferably in Europe anybody have any suggestions please Thanks Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 _demtec@a..._ (mailto:demtec@a...) [Non-text portions of this message have been removed] 10629 From: contranl Date: Sun Jan 16, 2005 8:30am Subject: Re: Microphone wire . Maybe it's a good idea to use lets call it: "Differential Technique" Not shure if that is the right term but that will allow you to use non-screened wires just 2 wires ...any kind of wire ! the smallest that you could think of ! You take a mic...depending on the type you feed the audio to a circuit or a single chip made for that purpose. At the output you connect the 2 unscreened wires At the other end you feed it to a similar circuit wich reverses it back to non-differential. The resulting audio is the difference between the 2 wires, in other words you won't hear any interference from outside ...such as 50/60 hz hum or radiofrequent-interference since this interference reaches both wires there wont be a difference..the wanted audio will be heard ofcourse. This technique is also used to send video over unscreened wires ...over considerable distances ( miles !) It's also used in digital cellphones/GSM to avoid any interference (am-pulses)reaching the phone it's own audio-circuits. Therefore several specialised ic's are avialable to make "differential circuits" A condenser mic would need such a circuit on both ends A magnetic coil mic (little old fashioned :) ...only on the other end since it is already more or less "differential" but in that case you might need a impedance transformer...so better a condenser-mic with integrated amp (like most have) The point of all this is that you could use any wire that you want...no screen neccessary,it will allow you to use the smallest wire possible...maybe even conductive tape or paint ! You could even use any metal objects or constructions already available..like heating pipes or water-pipes...whatever, probably the 2 conductors should not be to far spaced from each other,cause that might introduce interference from a source not having the same distance to both wires. It's an interesting technique...i hope anyone can say something about it. Tetrascanner 10630 From: Date: Sun Jan 16, 2005 4:03am Subject: Re: Re: Microphone wire In a message dated 16/01/2005 14:31:13 GMT Standard Time, contranl@y... writes: . Maybe it's a good idea to use lets call it: "Differential Technique" Not shure if that is the right term but that will allow you to use non-screened wires just 2 wires ...any kind of wire ! the smallest that you could think of ! You take a mic...depending on the type you feed the audio to a circuit or a single chip made for that purpose. At the output you connect the 2 unscreened wires At the other end you feed it to a similar circuit wich reverses it back to non-differential. The resulting audio is the difference between the 2 wires, in other words you won't hear any interference from outside ...such as 50/60 hz hum or radiofrequent-interference since this interference reaches both wires there wont be a difference..the wanted audio will be heard ofcourse. This technique is also used to send video over unscreened wires ...over considerable distances ( miles !) It's also used in digital cellphones/GSM to avoid any interference (am-pulses)reaching the phone it's own audio-circuits. Therefore several specialised ic's are avialable to make "differential circuits" A condenser mic would need such a circuit on both ends A magnetic coil mic (little old fashioned :) ...only on the other end since it is already more or less "differential" but in that case you might need a impedance transformer...so better a condenser-mic with integrated amp (like most have) The point of all this is that you could use any wire that you want...no screen neccessary,it will allow you to use the smallest wire possible...maybe even conductive tape or paint ! You could even use any metal objects or constructions already available..like heating pipes or water-pipes...whatever, probably the 2 conductors should not be to far spaced from each other,cause that might introduce interference from a source not having the same distance to both wires. It's an interesting technique...i hope anyone can say something about it. Tetrascanner ------------------------ Yahoo! Groups Sponsor --------------------~--> What would our lives be like without music, dance, and theater? Donate or volunteer in the arts today at Network for Good! _Click Here!_ (http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links I spoke to an engineer years ago who tried this technique using fairly simple audio equipment and had very varying results I will try it out for myself and let you know how I get on many thanks for the info Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a... (http://www.demtec.co.uk/) [Non-text portions of this message have been removed] 10631 From: Gerald Date: Sun Jan 16, 2005 3:23am Subject: Just a matter of time. Few months ago I posted a note about how firewalls and Anti-virus and sweepers don't do the job. How webcams and headsets can be turned into bugs remotely. I took alot of heat for my article but every thing I said has been covered in the news since then. Even the FBI retires its Carnivore, to use other software available online. There are more than 2,500 software vulnerabilities found every year according to the Sans Instutite. There are rootkits, attack bots and automated exploit testers out there now. And its just a matter of time before they are combined. Which has implications for terrorism and criminals. Id theft runs around $10 billion dollars a year now. I view our security systems like a NET.It has to allow info in and you out to view web pages. Most people use just three nets,firewall, anti-virus and a sweeper, not that difficult to get through. We add 5 more nets and connect them. This makes it more probable that I will catch and stop an attack. Info here. http://cigars.bravepages.com/newbullet2.htm Gerald Chief Forensics Fraud Investigator (tracking & Research) 10632 From: delta Date: Sun Jan 16, 2005 3:28am Subject: answer about border hello to the group and many thanks to robin , oisin , contrant , andy , and other who joined me by private mail i work in paris capital (france) and i need to travel to switzerland but only with a cpm700 and tdr , nothing else for the moment . i m going to contact the border to obtain the rules about crossing with this equipment. i travel with a car or by train but not by airplane. of course when i travel i don t bring with me my scanner and when it is possible i left the spectrum analyseur hp 8560a at my office for andy ( and other on this list ) if you want to see my website but in french language you have to go here http://www.deltafrance.com many thanks to everybody for my question about the border david from paris france europe ... lol 10633 From: G P Date: Sun Jan 16, 2005 9:12pm Subject: Re: Intersting doodad: Bumblebee Wireless spectrum analyzer.... I own a Yellowjacket with the optional Stinger for DF, it's a very nice piece of equipment and the only thing out there (that I'm aware of) that will DF 802.11 gear based on the data link layer. It starts sniffing for wireless APs, then you can punch down into the AP you're interested in and DF it, the unit sounds like a Geiger counter with an on-screen display for signal strength and attenuation etc. Unlike most of the other handheld sniffers, the BV stuff is truly a separate piece of discrete logic, the IPAQ is only used for the GUI and associated interfacing and has nothing to do with the actual RF section and spectrum capture and analysis. The Bumblebee is supposed to be a lower-cost version of the Yellowjacket (sub $2500 without the IPAQ and Stinger DF), plus the Bumblebee can do all ISM (including 900 Mhz), Bluetooth, 802.11, and the 5 Ghz UNII band. I wanted the Bumblebee instead of the Yellowjacket, but at the time it was still 3-6 months before the Bumblebee was due to be released so I went with the Yellowjacket Stinger setup instead. Make sure you get the Stinger option if you buy it, the DF aspect of it is worth the extra $250 for the directional antenna array. Very very nice and high-quality gear, and Berkeley Viatronics is a great company to work with - well worth the price IMHO. --- Dragos Ruiu wrote: > > > Anyone used one of these and care to share any > experience: > > http://www.bvsystems.com/Products/WLAN/BumbleBee/bumblebee.htm > > Looks like an interesting gadget, tough I haven't > found out > yet if they want a ridiculous amount of money for > it. > > It would also be interesting to find out if they > could produce a > variant with a wider sweep range/more agile front > end.... > > (I'm on a quest to find WLAN node directional > locators... > specifically to find out which out of a few hundred > laptops > in a big room has a particular mac address and is > messing > around to other's detriment...) > > thanks, > --dr > > -- > World Security Pros. Cutting Edge Training, Tools, > and Techniques > Vancouver, CanadaMay 4-6 2005 > http://cansecwest.com > pgpkey http://dragos.com/ kyxpgp > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > Has someone you know been affected by illness or > disease? > Network for Good is THE place to support health > awareness efforts! > http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10634 From: G P Date: Sun Jan 16, 2005 9:15pm Subject: Re: Intersting doodad: Bumblebee Wireless spectrum analyzer.... Maybe you used an older version, the Yellowjacket can definitely inspect the data link layer on up, and home in on a signal for direction finding based on MAC and IP address. The Yellowjacket smokes AirMagnet for DF applications, no comparison - you have to have an array of AirMagnets to triangulate and the BV stuff does it all from one handheld device. --- Michael Puchol wrote: > > Hi, > > I've yet to either see one operating or know of > someone that has one or > has seen one operating. I believe this device to be > more a stunt for the > other products the company makes, than something > tangible. The device is > way too expensive (they charged twice the going > price for the PDA alone, > for example). If you need to do surveys like you > mention, you can do > with AirMagnet and a Cisco 350 card with MMCX > antenna jacks - then you > can connect a small 2.4GHz handheld yagi and > attenuators to it, and do > the hunting. AirMagnet costs some $2.5k last I > looked, but it's quite an > impressive little package, I have seen it operating > and I have used it > quite a few times myself. > > The BumbleBee does not demodulate data at all, which > means that you > cannot really tie a signal to a particular > computer/MAC address without > further manual inspection. With AirMagnet you can > set a filter to > capture only packets coming from a particular MAC > address, and thus hunt > for it in confidence. > > If you are not concerned about using commercial > tools, you can flash an > iPAQ with Linux and use the vast array of tools > available for it. > > Regards, > > Mike > > Dragos Ruiu wrote: > > > > Anyone used one of these and care to share any > experience: > > > > > http://www.bvsystems.com/Products/WLAN/BumbleBee/bumblebee.htm > > > > Looks like an interesting gadget, tough I haven't > found out > > yet if they want a ridiculous amount of money for > it. > > > > It would also be interesting to find out if they > could produce a > > variant with a wider sweep range/more agile front > end.... > > > > (I'm on a quest to find WLAN node directional > locators... > > specifically to find out which out of a few > hundred laptops > > in a big room has a particular mac address and is > messing > > around to other's detriment...) > > > > thanks, > > --dr > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > What would our lives be like without music, dance, > and theater? > Donate or volunteer in the arts today at Network for > Good! > http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10635 From: Michael Puchol Date: Mon Jan 17, 2005 2:58am Subject: Re: Intersting doodad: Bumblebee Wireless spectrum analyzer.... Hi, Great to hear it's a good product! As I mentioned, I know a couple of people who inquired a few years ago, and were given rather vague responses at the time, and since then I've not heard about the device. I have used a single AirMagnet + iPAQ to triangulate, basically in the old traditional way of aiming a directional antenna, attenuating, moving, repeat a few times. Not knowing the current prices, I can imagine that if they charge $1000 for an internal GPS receiver option (GPS boards now cost around $50), the prices for the whole kit will still be rather high. Thanks for the info, best regards, Mike G P wrote: > Maybe you used an older version, the Yellowjacket can > definitely inspect the data link layer on up, and home > in on a signal for direction finding based on MAC and > IP address. The Yellowjacket smokes AirMagnet for DF > applications, no comparison - you have to have an > array of AirMagnets to triangulate and the BV stuff > does it all from one handheld device. > > --- Michael Puchol wrote: > > >>Hi, >> >>I've yet to either see one operating or know of >>someone that has one or >>has seen one operating. I believe this device to be >>more a stunt for the 10636 From: Tech Sec Lab Date: Mon Jan 17, 2005 8:31am Subject: RE: Mic Wire David When I worked with satellite hardware design and we had to interface boards we always converted the cmos logic to differential voltage. Its standard practice for space applications where emi can piss around with levels. So if its good enough for that I'm sure it should work well with audio. However for surveillance you can forget about it usually because: You will need a converter at the mic end which will require the space of a pcb and power for it. So pointless if you're doing a covert mic. Fine if you need to use it as a repeater for ultra long runs. Regards -Ois ********************** I spoke to an engineer years ago who tried this technique using fairly simple audio equipment and had very varying results I will try it out for myself and let you know how I get on many thanks for the info Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a... (http://www.demtec.co.uk/) 10637 From: Date: Mon Jan 17, 2005 6:17am Subject: Re: Mic Wire In a message dated 17/01/2005 14:33:31 GMT Standard Time, tscmteam@o... writes: David When I worked with satellite hardware design and we had to interface boards we always converted the cmos logic to differential voltage. Its standard practice for space applications where emi can piss around with levels. So if its good enough for that I'm sure it should work well with audio. However for surveillance you can forget about it usually because: You will need a converter at the mic end which will require the space of a pcb and power for it. So pointless if you're doing a covert mic. Fine if you need to use it as a repeater for ultra long runs. Regards -Ois ********************** I spoke to an engineer years ago who tried this technique using fairly simple audio equipment and had very varying results I will try it out for myself and let you know how I get on many thanks for the info Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a... (http://www.demtec.co.uk/) ======================================================== Many Thanks for that I will go ahead and have a go anyway see what sort of results I get. Still no luck with the actual screened wire though Thanks again for taking the trouble to reply Best Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) [Non-text portions of this message have been removed] 10638 From: Tech Sec Lab Date: Mon Jan 17, 2005 0:42pm Subject: MI5 boss admits bugging Adams http://www.timesonline.co.uk/article/0,,2087-1442540,00.html Hmmm, I do recall quite a few people on the list, who shall remain nameless(archives...hehe).... Pretty much bet their lives in conviction that there was no way that the device was planted by the UK Gov. So, maybe, they would explain to me why the Gov would admit to doing something that they didn't actually do....? :) 10639 From: Daryl Adams, CISSP Date: Mon Jan 17, 2005 7:55am Subject: WFFF This may be of interest to some. More features in the pipe. Stay tuned. http://wififofum.org 10640 From: scott4957 Date: Mon Jan 17, 2005 10:53am Subject: Re: Just a matter of time. Gerald, Very true, I have experimented with many free programs that allow you to use someone's webcam or mic remotely over the internet without any sign they are being used. My best advice is to keep them disconnected when not in use. Simple software firewalls are much to easy to circumvent, they cannot be trusted. I'm surprised you took heat for saying such a thing, this type of software as been available to the public for many years, there is no doubt in my mind that much more advanced software exists. All this can be done remotely, imagine the possibilities with access to the host computer. RS --- In TSCM-L@yahoogroups.com, "Gerald" wrote: > > > Few months ago I posted a note about how firewalls and Anti-virus and sweepers don't do the job. How webcams and headsets can be turned into bugs remotely. I took alot of heat for my article but every thing I said has been covered in the news since then. Even the FBI retires its Carnivore, to use other software available online. There are more than 2,500 software vulnerabilities found every year according to the Sans Instutite. There are rootkits, attack bots and automated exploit testers out there now. And its just a matter of time before they are combined. Which has implications for terrorism and criminals. Id theft runs around $10 billion dollars a year now. I view our security systems like a NET.It has to allow info in and you out to view web pages. Most people use just three nets,firewall,anti-virus and a sweeper, not that difficult to get through. We add 5 more nets and connect them. This makes it more probable that I will catch and stop an attack. Info here. http://cigars.bravepages.com/newbullet2.htm Gerald Chief Forensics Fraud Investigator (tracking & Research) 10641 From: scott4957 Date: Mon Jan 17, 2005 11:12am Subject: Re: Icom IC-R3 and R20 Suncom Inc (786) 621-1304 Miami FL They used to sell Asian versions of the R20. RS --- In TSCM-L@yahoogroups.com, Javier Villanueva wrote: > > Hi List, > I¥ve been trying unsuccesfully to buy this equipment > Online. All of the shops i¥ve found replied they are > "out of stock". > > If any of you sell these, offer "Special modified > versions", or know where to find them, i¥ll be > grateful. > > Payment by credit card and express delivery to Mexico > a big plus. Most probably this will be just the first > buy, with more to come. > > > Thank you very much guys. > > ===== > Javier Villanueva C. > Vcorp & Asociados > Contraespionaje ElectrÛnico y > Seguridad Inform·tica > Tel. 01 (33) 36 19 47 09 > cel. 044 333 392 64 50 > msm. javier_vc@h... > > > > __________________________________ > Do you Yahoo!? > Yahoo! Mail - now with 250MB free storage. Learn more. > http://info.mail.yahoo.com/mail_250 10642 From: satcommunitfive Date: Mon Jan 17, 2005 7:27pm Subject: Re: Once more into the breach I have a AOR 8600 mark2 and it`s full of birdies ps new AOR looks intersting SR2000 link > http://uk.groups.yahoo.com/group/AOR-SR2000/files/sr2000-info-e.pdf bewell 10643 From: contranl Date: Mon Jan 17, 2005 8:33pm Subject: Re: Mic Wire . Demtec says: > You will need a converter at the mic end which will require the > space of a pcb and power for it. So pointless if you're doing a > covert mic A pc board would not be neccessary since the whole circuit would be no bigger than a 8 pin SMD IC wich is the size of a match-head. something like this ## maybe this you could glue that to the back of a 3-pin condenser-mic ...only addition would be a 0.1 uF capacitor wich you need to separate the audio from the power-supply wich is send over the 2 wire line too. Here is such an IC (Integrated Circuit) also available in SMD size look at the application circuits at the bottom of nthe pdf and see how practically no extra components are needed: http://www.analog.com/productSelection/pdf/ad830.pdf This one does up to 10 Mhz ...that could be 2 videocameras ! A Google search shows that they come with ranges over 200 mHz ! You could send the signals of a complete 10-camera-video-surveillance-network to the other side of the building or street...over just 2 practical invisible wires ! Or maybe you could get a little condenser-microphone with a built-in differential output !? don't know if they exist, maybe from a cellular phone ? Now that i think of it the smallest shielded microphone-cable that i have seen must be those that are used for small headphones like the ones used with portable cd-players/mp-3 players. Specially Sony uses a cable with 2 thin and shielded wires ...the funny thing is that they are not completly metallic, they use some kind of conducting rubber. Next problem ....how to get those in 20 meter lengths ? :( Don't know what length you need but one 15$ headphone will give you at least 2 x 1,5 meters Maybe you dont need the whole length like that but just there where the wires need to be "invisible" In addition ...here is a coax >> twisted-pair converter (balun) for video-signals wich could be used at both ends of a piece of cable that should be hidden or "invisible" The 2 boxes you could put in a convenient place out of sight. http://www.spytown.com/twpavitr.html To be honest i have no real-life experience with this "differential" bugging stuff...just theory :) Interested in the matter i spend an hour or so searching the internet for "thin shielded microphone cable" but that did'nt give any good results. Maybe "Farnell" (Europe) have such a cable ? Last idea: ...just try a piece of unshielded wire and a condenser-mic about the same length as you will use later,do some experiments (amplification or hum-filters ) maybe it that fine enough. Have fun ! Ps) By the way...the purpose of this would be to hide a microphone cable...as much as possible ? Tetrascanner 10644 From: G P Date: Tue Jan 18, 2005 0:09am Subject: Re: Intersting doodad: Bumblebee Wireless spectrum analyzer.... Yes the BV stuff is not cheap by any stretch of the imagination, the Yellowjacket setup with DF Stinger was more than $4K. The Bumblebee uses a different front end than the Yellowjacket, so the manufacturing process is supposed to be cheaper - although with the GPS option and Stinger, it's probably approaching $4K still. Great tool for detecting and locating rogue APs though, very relevant for site audits and WLAN security in general. --- Michael Puchol wrote: > > Hi, > > Great to hear it's a good product! As I mentioned, I > know a couple of > people who inquired a few years ago, and were given > rather vague > responses at the time, and since then I've not heard > about the device. > > I have used a single AirMagnet + iPAQ to > triangulate, basically in the > old traditional way of aiming a directional antenna, > attenuating, > moving, repeat a few times. > > Not knowing the current prices, I can imagine that > if they charge $1000 > for an internal GPS receiver option (GPS boards now > cost around $50), > the prices for the whole kit will still be rather > high. > > Thanks for the info, best regards, > > Mike 10645 From: Date: Tue Jan 18, 2005 4:52am Subject: Tetrascanner Advice Many Thanks again for your reply and some excellent ideas. Simple micro shielded wire does seem difficult to obtain. The best I can do here in the UK is 1.5mm o/d single screen grey fairly low quality from CPC [order number CBBR 4177]. Further to some recent discussions re RFID detection the ELEKTOR ELECTRONICS MAGAZINE Feb 2005 has printed an excellent article named RFID frenzy and a project RFID Detector for 13.56 Mhz.I have not had time to assimilate all the details but seems well worth a look. The mag has a website _www.elektor-electronics.co.uk_ (http://www.elektor-electronics.co.uk) Regards to all Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) [Non-text portions of this message have been removed] 10646 From: Cristian Date: Tue Jan 18, 2005 0:44pm Subject: second hand Any Oscor and Orion in second hand there? A friend of mine, with tight budget, wants them. Cristian From: Steve Uhrig Date: Thu Jan 17, 2002 8:37am Subject: Re: Electronic Harassment Sweepers Once upon a midnight dreary, Hawkspirit pondered, weak and weary: > http://www.siin.com/invres.html This guy is Ronald Rhodes. He tried to rip me off for a few hundred dollars in a business deal last year, and I had to get some letters to knock on his door to get him to make good. He has a felony theft record for stealing some laser components from a company and peddling them on ebay. He's in his twenties. He also runs two other websites, one selling vaporware kits and the other an anti government type site. Stay far away from this guy. I had looked into filing a complaint against him in California, claiming to be a PI when he is not, but did not pursue that when he made good on the deal after trying to rip me off. I'm sure the State's Attorney would be mildly interested in him. I believe I posted a warning about him last year around the time we knocked heads. That message should be in the archives if anyone cares. If anyone else has had, or tried to have, business deals with this guy and you got cheated, I will share my file with you. I have copies of his criminal records and a good bit of other stuff. Those of you out there who are PIs should be especially incensed by this sort of thing (meaning his website listed above) because this is what the public sees of your profession. Can't blame them if they read the site and judge the entire profession. He's a hotdog, answers all the messages on his bulletin boards pretending to be someone else and pumping up his products, and referring to himself in the third person. I don't know how many people see through him doing that. Steer clear of this guy. I am sure Roger was posting the info merely as a curiosity as to how far some people think they can go without ultimate sanctions. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4564 From: Date: Thu Jan 17, 2002 4:19am Subject: Re: Re: Electronic Harassment Sweepers In a message dated 1/17/02 6:47:28 AM Pacific Standard Time, steve@s... writes: << He also runs two other websites, one selling vaporware kits and the other an anti government type site. >> Would you please share these with the rest of the list? Thanks, M. 4565 From: Steve Uhrig Date: Thu Jan 17, 2002 9:45am Subject: Ripoff Artist Mikie asked: << He also runs two other websites, one selling vaporware kits and the other an anti government type site. >> > Would you please share these with the rest of the list? Ask and it shall be given unto you. www.plans-kits.com www.siin.com www.getexempt.com > Having stolen items nets sentence The San Diego Union - > Tribune; > San Diego, Calif.; Sep 7, 2000; Onell R. Soto; > Abstract: Ronald Rhoades, 25, pleaded no contest last month > to possessing lasers stolen from Melles Griot, a Carlsbad > manufacturer of industrial lasers, after company officials > noticed their products for sale on the Internet auction site > eBay. > Rhoades also pleaded no contest to possessing an illegally > shortened .22-caliber rifle and nunchakus, outlawed martial > arts weapons. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4566 From: Dr. Pepper Date: Thu Jan 17, 2002 9:59am Subject: RE: Re: Record device Radio Shack makes such a device for about 20 bucks. I've used it for years, and it works great. -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Wednesday, January 16, 2002 7:45 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Record device Once upon a midnight dreary, zack pondered, weak and weary: > Due to experiences which have occurred within the past few > days, I would like to enlist this list for some information. I > am looking for a modest price recording device which would > record phone conversations as soon as I pick up the phone, > taking into account I also use the same line for Internet use. > ( long play with time/date ). PS..... I live in a state with > one party only knowledge as to recording. Very easy problem. Connect a tape recorder to your phone line via any standard method, and start the recorder manually when you make or receive a call you wish to record. Since you are in a one party consent state, you are OK as the one party, and it would only be your own calls you would be recording, so you merely can start the machine yourself when needed. That way, you won't fill the tape needlessly with Internet noise/data instead of voice. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4567 From: Hawkspirit Date: Thu Jan 17, 2002 11:18am Subject: TSCM article Here is a pretty good article http://www.securitymanagement.com/library/000464.html 4568 From: A Grudko Date: Fri Jan 18, 2002 6:42am Subject: Bin Ladin rights Just a thought, reading another group's comments yesterday on the legal issues of audio serveillance in the US - a bit off the wall and not intended to give any support to OBL or any criminals... I'm thinking about the video tape which was 'found' about a month ago in Afghanistan where someone resembling OBL 'boasted' about 9/11 to another Saudi. News reports implied that this was a covert recording - done without OSL's knowledge, a roaming concealed camera on someone else's property recording a private meeting. The 'cameraman' or perhaps 'secret agent' is unknown so not available to testify to the circumstances of the event or authenticity of the tape. If this tape is used to try to prosicute someone, wouldn't a US criminal Court refuse to accept it as evidence under normal conditions? I do realise these are not 'normal' conditions and that governments can and do grant themselves powers which trample over people's rights in times of emergency. Before I get flamed; I do not support OBL's group or actions I'm not looking for a loophole for him to grovel to the caves through I'm not anti-American. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4569 From: Aimee Farr Date: Fri Jan 18, 2002 3:37pm Subject: CALEA decision http://laws.lp.findlaw.com/dc/005386.html U.S. DC Circuit Court of Appeals US TELECOM ASSN v FBI January 18, 2002 4570 From: James M. Atkinson Date: Fri Jan 18, 2002 3:46pm Subject: 4568 message on the Archive I just wanted to let the list know that we have an archive vailable of over 4500 list postings. http://groups.yahoo.com/group/TSCM-L/messages -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4571 From: William Knowles Date: Sat Jan 19, 2002 2:38am Subject: China Finds Bugs on Jet Refitted in U.S. http://www.washingtonpost.com/wp-dyn/articles/A5176-2002Jan18.html By John Pomfret Washington Post Foreign Service Saturday, January 19, 2002; Page A1 BEIJING, Jan. 18 - Somewhere on a military airfield north of Beijing, China's presidential aircraft, a new Boeing 767-300ER with all the trimmings, sits unused with parts of its innards torn out. Last October, days before its planned maiden voyage, Chinese military communications experts discovered numerous high-tech listening devices planted inside the plane, according to Chinese and Western sources, who said they had been told of this by Chinese military officers and aviation officials. The plane was grounded and has not been flown since it was delivered. Chinese aviation officials and military officers have charged that U.S. intelligence agencies planted the bugs aboard the plane while it was being refitted in the United States, the sources said. The U.S. Embassy declined to comment on the allegations. Analysts said the devices were highly sophisticated. A CIA spokesman, Bill Harlow, declined to comment on the report, saying, "We never comment on allegations like these, as a matter of policy." The story behind the immobile Boeing jet offers a tantalizing glimpse of modern spycraft. A Chinese source, with close ties to China's military intelligence services, said members of the Third Department of the General Staff Department of the People's Liberation Army discovered the devices. The Third Department deals in signals intelligence. The Chinese source said that, to date, 27 listening devices had been found, including devices in the presidential bathroom and in the headboard of the presidential bed. A Western executive and a Western diplomat said they had been told by Chinese aviation sources that the devices were highly sophisticated. The diplomat said they "had to be triggered by a satellite communication. In that sense, they were very advanced." U.S. sources have said the controversy over the plane is emerging as an issue in the summit meeting between President Bush and President Jiang Zemin scheduled for Feb. 21 in Beijing. Chinese analysts said the incident confirms their fears that the United States is an untrustworthy partner and continues to treat China as an enemy. After the listening devices were discovered, Western sources said, 20 Chinese air force officers and two officials from China Air Supply Import & Export Corp., which was involved in negotiations for the jet, were detained. Chinese sources said they were being investigated for negligence and for corruption ñ the American firms were paid about $10 million for the refitting job but China doled out $30 million. In addition, a senior air force officer is under a form of house arrest for his role in the affair. The officer has previously purchased planes for government officials through the auspices of China United Airlines, owned by the Chinese air force, which also had a piece of the transaction in question. A top officer of the Bodyguards Bureau of the General Staff Department of the People's Liberation Army, has also been criticized for tolerating the lax security, the sources said. The China Air Supply Import & Export Corp. and China United Airlines declined to comment on the situation. It is unclear how the episode could affect Boeing, which in September signed a $2 billion deal to sell planes to China. More broadly, Western diplomats said they believed Washington and Beijing would weather the dispute. "This kind of thing is to be expected," said a Chinese security expert, who noted that relations between Washington and Moscow were not seriously disrupted by disclosures in the 1980s that the Soviets had bugged the new U.S. Embassy. The expert added, "Even if our relations were excellent, we would still spy on each other." China purchased the Boeing 767-300ER in June 2000 for $120 million, a Chinese source said. An executive at Delta Airlines said the Chinese were so eager to obtain a top-of-the-line 767 that Delta allowed China to assume its contractual responsibilities for one plane about to come off Boeing's assembly line in Seattle. China's state-run media, which dubbed the plane Air Force One, reported the sale in August of that year. Several reports, including one that appeared in the Guangzhou Daily, a mass circulation newspaper in that southern metropolis, said the plane had already been brought to China for refitting. In fact, the plane had been sent to the San Antonio International Airport for refitting by several aircraft maintenance firms, including Dee Howard Aircraft Maintenance Lp, Gore Design Completions Ltd., Rockwell Collins Inc. and Avitra Aviation Services Ltd., a Singapore firm, according to companies that worked on the contract. The job was worth less than $10 million, an industry source said, and work continued during a very tense period in U.S.-Chinese relations following the April 1, 2001, collision between a U.S. reconnaissance aircraft and a Chinese jet off the coast of southern China. In a report about the refitting work published last September, the San Antonio Express-News quoted Earl Parker, a project manager for Avitra, as saying the plane was not a "plain Jane, like [U.S.] Air Force One." Parker told the newspaper the plane was refitted to accommodate about 100 people in beige leather chairs that could be converted into beds. Larger, one-hour oxygen canisters replaced the 20-minute type used on most aircraft. And the new presidential suite consisted of a bedroom, sitting room and a bath with a shower. The firms also added a 48-inch television set, satellite communications and advanced avionics. Chinese security guards provided round-the-clock security for the plane while it was being refitted, the newspaper said. How the listening devices got on board the plane is a mystery. Phil O'Connor, a vice president at Dee Howard Aircraft Maintenance of San Antonio, said today was the first time he he had heard of the allegations. Robert Sanchez, chief operations officer at Gore Design Completions, also of San Antonio, said he did not believe the allegations. "We had an excellent relationship with every Chinese official who worked on this project," he said. "We're not in the business of doing things like this." A Rockwell Collins spokeswoman said the company would have no comment. Work was completed on the plane in August and it was flown to China on Aug. 10, stopping in Honolulu. A group of American workers and their families accompanied the plane as guests of the Chinese government, Sanchez said. "The Chinese were very happy with the aircraft and with the work we did. They took the workers to the Great Wall and showed them around," said Sanchez. "Why would any of these corporations or workers consider that, if they knew anything about this?" Western diplomats and executives learned of the case in mid-October when Chinese officials they normally did business with did not appear for meetings. Chinese friends and colleagues informed them that the officials had been arrested, they said. The arrests occurred in China about the time that Jiang was supposed to take his maiden voyage in the jet to attend the summit of the Asia-Pacific Economic Cooperation forum in Shanghai. Jiang flew to the meeting on another airplane. Sanchez said Chinese government officials have not contacted his firm about the problems. He also said that Chinese aviation officials said they wanted Gore to work on three additional VIP aircraft. "We're technical, not political," Sanchez said. "This incident is not going to hurt the U.S. government; it's not going to hurt the government of China. It's only going to hurt the firms. " For years, China has worried that Western governments, using Western companies, would use high-tech products to compromise China's security. China spent millions of dollars protecting the new headquarters of the Foreign Affairs Ministry from listening devices that could potentially be mounted in office buildings nearby, a Chinese security source said. Last year, the People's Daily, the official Communist Party newspaper, carried an editorial in which it SAID the import of high-tech products from the West constituted a security risk because Western governments would place secret codes or technical Trojan horses inside the products to collect intelligence. Staff writer Thomas E. Ricks in Washington contributed to this report. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 4572 From: Richard Superman Date: Sat Jan 19, 2002 2:25am Subject: China says president's jet bugged http://money.iwon.com/jsp/nw/nwdt_rt.jsp?cat=USMARKET&src=201&feed=reu§ion=news&news_id=reu-l19285278&date=20020118&alias=/alias/money/cm/nw China says president's jet bugged-Financial Times Friday January 18, 8:39 PM EST LONDON, Jan 19 (Reuters) - China has said its intelligence officers found more than 20 spying devices in a Boeing 767 meant to become President Jiang Zemin's official plane after it was delivered from the U.S., the Financial Times said on Saturday. Citing Chinese officials, the newspaper said it was unclear when the aircraft was fitted with the bugs, said to be tiny and operated by satellite. The devices were detected after the plane emitted a strange static whine during test flights in China in September, shortly after it was delivered. One device was found in a lavatory and another in the headboard of the presidential bed. The discovery came ahead of a planned summit between U.S. President George W. Bush and Jiang in Beijing next month. The Chinese president was said to be furious about the find, the FT said. The aircraft was made at the Boeing factory in Seattle and then fitted with VIP equipment and upholstery by another company. The plane was under surveillance by Chinese officials throughout, the newspaper said. A Boeing spokesman declined to comment on the report. Chinese officials said the security forces had launched an investigation into possible negligence and some 20 air force officers had been held for questioning, the FT said. The U.S. and China clashed over espionage issues in April last year when a Chinese fighter jet and U.S. spy plane collided over the South China Sea, resulting in the death of the Chinese pilot and the grounding of the U.S. plane in China. ©2001 Reuters Limited. -- Sent through GMX FreeMail - http://www.gmx.net 4573 From: Shawn Hughes Date: Sat Jan 19, 2002 0:07pm Subject: Re: US Videdo Surveillance Andy, Naah. We (I) have videotaped people all the time without their knowledge or consent, State and Federal. There are several rules concerning it, but the safest one is to have a cooperating witness in the room (or frame). Think about it like this; basically, if you were required to garner the ok of any future felon before you could conduct visual and audio intercept ops, you'd just about never be doing them. Oh, and the rules are a lot less stringent when they are in a public setting. Shawn 4574 From: James M. Atkinson Date: Sat Jan 19, 2002 6:47pm Subject: Appeal - United States Telecom Association v. Federal Bureau of Investigation, et al. United States Court of Appeals FOR THE DISTRICT OF COLUMBIA CIRCUIT Argued October 12, 2001 Decided January 18, 2002 No. 00-5386 United States Telecom Association, Appellant v. Federal Bureau of Investigation, et al., Appellees Appeal from the United States District Court for the District of Columbia (No. 98cv02010) A. Stephen Hut Jr. argued the cause for appellant. With him on the briefs were John H. Harwood II, Samir C. Jain, Lawrence E. Sarjeant, Linda L. Kent and John W. Hunter. Anne Murphy, Attorney, U.S. Department of Justice, ar- gued the cause for appellees. With her on the brief were Kenneth L. Wainstein, U.S. Attorney, and Douglas N. Letter, Counsel, U.S. Department of Justice. Daniel L. Kaplan, Counsel, entered an appearance. Before: Ginsburg, Chief Judge, Henderson, Circuit Judge, and Williams, Senior Circuit Judge. Opinion for the Court filed by Senior Circuit Judge Williams. Williams, Senior Circuit Judge: Electronic eavesdropping has historically proceeded on a basis of cooperation between law enforcement authorities and telephone service providers. In 1970 Congress regularized the relationship somewhat by providing that a court order for electronic surveillance should, at the request of the officer applying for authority, direct the provider to furnish the applicant with the necessary "informa- tion, facilities and technical assistance." Act of July 29, 1970, Pub. L. No. 91-358, tit. II, s 211(b), 84 Stat. 654 (1970), codified at 18 U.S.C. ß 2518(4). Because of rapid technologi- cal development since then, Congress in 1994 added further structure with the Communications Assistance for Law En- forcement Act ("CALEA" or the "Act"), 47 U.S.C. ß 1001 et seq. (1994). (Each of the statute's sections has a number 899 lower than that of its codified equivalent in Title 47; for simplicity's sake we use only the latter.) The Act has re- quirements relating to both the "capability" of telephone service providers to intercept communications and their "ca- pacity" to do so. In United States Telecom Ass'n v. FCC, 227 F.3d 450 (D.C. Cir. 2000), we addressed "capability"; here we deal only with "capacity." In very simplified form, CALEA sets up the following regime as to capacity, involving three key phases: (1) The Attorney General issues "notices" of what capacity is needed. The Attorney General in fact has delegated his duties to the FBI, and we henceforth refer to it exclusively. (2) Each carrier responds with a "statement" of the modifications any of its systems or services will need to provide the required capacity. (3) A carrier is deemed in compliance with the FBI's capacity notices, without having made the specified modifications, until the FBI agrees to reimburse the carrier for those modifications. We spell out the scheme in more detail below. In 1998 the FBI issued a set of rules implementing the Act's capacity requirements. See Implementation of Section 104 [47 U.S.C. ß 1003] of CALEA, 63 Fed. Reg. 12218 (March 12, 1998) ("Final Notice"). United States Telecom Associa- tion ("USTA"), a trade association of about 1400 telephone companies, sought relief in district court against various provisions of the rules. First, it argued that the FBI had erroneously defined the class of "modifications" for which carriers might be eligible for reimbursement. Second, it said that the FBI's concept of the required "notices" misread the statute in a variety of ways, each increasing the carriers' burdens and their risks of being found noncompliant. In an unpublished opinion the district court granted summary judg- ment in favor of the FBI on all issues. Reviewing the grant of summary judgment de novo, see, e.g., Shields v. Eli Lilly & Co., 895 F.2d 1463, 1466 (D.C. Cir. 1990), we affirm the district court with respect to the reim- bursement scheme, finding that the FBI correctly defined the "modifications" required to be reimbursed. On the other hand, finding error on the part of the FBI on each of the disputes about its notices, we reverse on those issues, with instructions to the district court to remand the case, in one instance vacating the challenged feature of the rules, in the others not. * * * CALEA requires the FBI to issue a notice of both the "actual number" of interceptions and devices that it expects will be conducted and used "simultaneously" by October 25, 1998, ß 1003(a)(1)(A), and the "maximum capacity" required to accommodate the surveillance that enforcement agencies "may conduct and simultaneously use" after that date, s 1003(a)(1)(B). Subject to a qualification relating to reim- bursement of necessary modifications, service providers are required within three years after notice to have the capacity specified in ß 1003(a)(1)(A) and the ability "expeditiously" to expand to the "maximum capacity" specified in s 1003(a)(1)(B). See ßß 1003(b)(1), 1003(e). The FBI notice under ß 1003(a)(1)(A) is to state the actual number of communication interceptions, pen registers, and trap and trace devices, representing a portion of the maximum capacity set forth under sub- paragraph (B), that the [FBI] estimates that [law en- forcement authorities] may conduct and use simulta- neously. 47 U.S.C. ß 1003(a)(1)(A) (emphasis added). Pen registers are devices that record the telephone numbers dialed by the surveillance's subject; trap and trace devices record the telephone numbers of the subject's incoming calls. Each of the carriers is required to respond to the notice of capacity requirements with a "statement" of "systems or services that do not have the [necessary] capacity." s 1003(d). The FBI reviews these statements and "may" agree to reimburse the carrier "for costs associated directly with modifications to attain" the capacity requirements. s 1003(e). Until the FBI agrees to reimburse the necessary modifications specified by a carrier, the carrier is considered in compliance. Id. We address first the cost allocation issue, then the charac- ter of the notices to be issued by the FBI. * * * Cost Allocation. We start with the key statutory provi- sions. Section 1003(d) sets out the duty of the carrier to submit a statement responding to the FBI's notice, and s 1003(e) states the relationship between a carrier's compli- ance and the FBI's decision on what to reimburse: ß 1003(d) Carrier statement Within 180 days after the publication by the [FBI] of a notice of capacity requirements pursuant to subsection (a) or (c) of this section, a telecommunications carrier shall submit to the [FBI] a statement identifying any of its systems or services that do not have the capacity to accom- modate simultaneously the number of interceptions, pen registers, and trap and trace devices set forth in the notice under such subsection. ß 1003(e) Reimbursement required for compliance The [FBI] shall review the statements submitted under subsection (d) of this section and may, subject to the availability of appropriations, agree to reimburse a telecom- munications carrier for costs directly associated with modi- fications to attain such capacity requirement that are deter- mined to be reasonable in accordance with section 1008(e) of this title. Until the [FBI] agrees to reimburse such carrier for such modification, such carrier shall be consid- ered to be in compliance with the capacity notices under subsection (a) or (c) of this section. 47 U.S.C. ßß 1003(d), (e). The Final Notice provided for eligibility for reimbursement as follows: Capacity costs associated with any equipment, facilities or services deployed after the Carrier Statement period of 180 days following the effective date of this Final Notice of Capacity will not be eligible for reimbursement. Final Notice, 63 Fed. Reg. at 12220-21. But the language is concededly different from the thought the FBI intended to convey. In fact, government counsel assured us at oral argument (with the full assent of USTA's counsel), that this sentence should really be read as if it also contained the material added in boldface: Capacity costs associated with any equipment, facilities or services deployed after the Carrier Statement period of 180 days following the effective date of this Final Notice of Capacity will not be eligible for reimbursement, except costs for modifications the FBI has agreed to compensate under ß 1003(e). Thus, expenses incurred to add equipment--other than for modifications that the carrier specified in its "statement" and that the FBI in its discretion agreed to reimburse--are not reimbursable. USTA objects that under the FBI's reading of ß 1003(e), a carrier will have to pay for all capacity it adds in the future (except for the reimbursed "modifications"), even though the government will be able to help itself to part of the added capacity. As was developed at oral argument, this skews a carrier's incentives: rather than invest in capacity additions sized to accommodate not only its customers' prospective demand but also the government's future wishes, it will elect smaller expansions, anticipating that after the next FBI notice and carrier statement its equipment will require "modi- fication" and thus government reimbursement. USTA fur- ther argues that we should not defer to the FBI's reading of the Act under Chevron U.S.A. Inc. v. Natural Resources Defense Council, 467 U.S. 837 (1984), because the government has a sharp pecuniary interest in the outcome: under USTA's reading of the statute, the government would have to pay for its share of all new capacity that it uses. Of course the issue of Chevron deference arises only if the statute doesn't plainly settle the issue. Chevron, 467 U.S. at 842-43 (holding that if "Congress has directly spoken to the precise question at issue," the court "must give effect to the unambiguously expressed intent of Congress."). Here we find that the Act does so, and therefore need not resolve USTA's pecuniary-interest theory. The only costs for which the Act provides any compensa- tion are for "modifications" under ß 1003(e). These "modifi- cations" are necessarily to "systems or services" identified by the carrier in its ß 1003(d) statement as "not hav[ing] the capacity" to accommodate the needs set out in an FBI notice under ß 1003(a)(1). And those "systems and services" are necessarily systems and services extant at the time the carrier files its statement. In other words, eligibility for reimbursement extends only to modifications as needed to mend deficiencies set out in the carrier's ß 1003(d) statement. USTA claims to find support in the passage of ß 1003(e) that states: "Until the [FBI] agrees to reimburse [a] carrier for [reasonable] modifications, such carrier shall be consid- ered in compliance with the capacity notices." 47 U.S.C. s 1003(e). But the carrier's being "in compliance" appears to refer only to the modifications identified in the ß 1003(d) statement, and says nothing with respect to the government's uncompensated use of capacity that a provider may add, on its own, after submitting its ß 1003(d) statement. USTA also points to CALEA's enforcement provision, pro- hibiting a court from issuing any enforcement orders that "require a telecommunications carrier to meet the Govern- ment's demand for interception ... to any extent in excess of the capacity for which the [FBI] has agreed to reimburse such [a] carrier." 47 U.S.C. ß 1007(c)(1). But USTA's literal reading of this section is plainly unsound; even USTA does not think the section governs available capacity antedating the FBI's very first ß 1003(a)(1) notice. The FBI's reading of the section is that it reinforces the "safe harbor" provided by ß 1003(e)'s assurance to a carrier that it will not be out of compliance if law enforcement authorities demand capacity that the carrier's ß 1003(d) statement has said was needed (until the FBI funds the additional capacity). As appellant's construction of ß 1007(c)(1) is impossible on a literal basis and would require us to twist the meaning of ß 1003(e) itself, we find it unconvincing. USTA's remaining textual analysis contrasts the Act's lan- guage on capacity with its language on capability, which explicitly provides for compensation for modifications of equipment deployed before January 1, 1995 to accommodate law enforcement, ß 1008(d), and none for equipment deployed thereafter. We fail to see how the distinction helps USTA. The capability provisions plainly differ substantially from those for capacity, but the contrast sheds no light on the proper interpretation of ßß 1003(d) & (e). Finally, USTA makes reference to some legislative history it believes is supportive of its position. See Appellant's Br. at 20-21 (citing H.R. Rep No. 103-827, pt. 1, at 17, 20 (1994)). "But we do not resort to legislative history to cloud a statutory text that is clear." Ratzlaf v. United States, 510 U.S. 135, 147-48 (1994). See also Burlington Northern R.R. Co. v. Oklahoma Tax Comm'n, 481 U.S. 454, 461 (1987); In re Sinclair, 870 F.2d 1340, 1342-43 (7th Cir. 1989) (suggest- ing that legislative history should only be used to elucidate the meaning of the statutory text). Of course, legislative history may "shed new light on congressional intent, notwith- standing statutory language that appears superficially clear." Natural Resources Defense Council, Inc. v. Browner, 57 F.3d 1122, 1127 (D.C. Cir. 1995) (internal quotation marks and citation omitted). But in fact the force of appellant's claim turns on its selective quotation. The House Committee Re- port said: After the four year transition period, which may be extended an additional two years by order of the FCC, industry will bear the cost of ensuring that new equipment and services meet the legislated requirements, as defined by standards and specifications promulgated by the indus- try itself. However, to the extent that industry must install addi- tional capacity to meet law enforcement needs, the bill requires the government to pay all capacity costs from date of enactment, including all capacity costs incurred after the four year transition period.... H.R. Rep No. 103-827, pt. 1, at 16-17 (emphasis added). Appellant ignores the first sentence and quotes the second. In fact, properly read even the second sentence does not help appellant, for it describes the statute simply as calling on the government to pay for "additional capacity" that "industry must install ... to meet law enforcement needs." Just so. Government must pay for "modifications" that it agrees to reimburse as specified in ß 1003(e), but otherwise helps itself to capacity that is available. Accordingly, we affirm the district court's grant of sum- mary judgment for the government on USTA's cost recovery claim. * * * The remaining issues relate to provisions dealing with how the FBI "notices" are to specify capacity requirements. Again USTA argues that the FBI should not enjoy Chevron deference because of its pecuniary interest. Again we need not address the pecuniary-interest issue, though for a differ- ent reason from the one previously given. Even Chevron deference requires that the agency position be reasonable, Chevron, 467 U.S. at 843, and on none of the following issues is that standard met. "Expeditiously." Recall that the Act distinguishes be- tween the "actual numbers" of interceptions and equipment the FBI expects to be conducted and used simultaneously by October 25, 1998, ß 1003(a)(1)(A), and the "maximum capaci- ty" required to accommodate surveillance thereafter, s 1003(a)(1)(B). Section 1003(b) gives this distinction opera- tional significance. Section 1003(b)(1) requires carriers by a specified date to have the capacity [subject to ß 1003(e)] to accommodate the ß 1003(a)(1)(A) demands and the ability to "expand[ ]" to the subsection (B) "maximum capacity"; and s 1003(b)(2) requires each carrier to "ensure that it can accommodate expeditiously" an increase in demand up to the "maximum capacity." The Final Notice implements these provisions by reading "expeditiously" to allow only five business days. Final No- tice, 63 Fed. Reg. at 12219/1. The only rationale offered to support the five-day period is transparently off point. The FBI said the decision was "based on past practice as to the time typically involved under existing procedures used by law enforcement and telecommunications carriers to make techni- cal interception arrangements." Id. This statement about "past practice" relates only to provisioning individual wiretaps upon request--a task quite different from that of increasing total wiretapping capacity. Worse, unrebutted evidence in the record suggests that it would be impossible for carriers to install additional capacity in such a short time period. Unsurprisingly, ordering new hardware, securing its delivery, and then installing and test- ing it takes more than five days. See id. at 12235/1 (noting that seven commenters, including the trade association repre- senting telecommunications equipment manufacturers, have described this time frame as unrealistic). In effect, then, the FBI's interpretation of "expeditiously" de facto erases the statutory distinction between actual and maximum capacity, even though the statute plainly intends such a distinction and even specifies that "actual" capacity should be "a portion of the maximum capacity set forth under subparagraph (B)." ß 1003(a)(1)(A). We therefore find un- reasonable and vacate this aspect of the Final Notice. See RCA Global Communications, Inc. v. FCC, 758 F.2d 722, 733 (D.C. Cir. 1985) (rejecting agency's reading of a statute that "would deprive [the statutory provision] of all substantive effect"). "Capacity"/"Number of," and "Simultaneously." Recall that ß 1003(a)(1)(A) requires the FBI to give notice of the actual number of communication interceptions, pen registers, and trap and trace devices, representing a portion of the maximum capacity set forth under subpar- agraph (B), that the [FBI] estimates that [law enforce- ment authorities] may conduct and use simultaneously. 47 U.S.C. ß 1003(a)(1)(A) (emphasis added). Subsection (B) similarly requires notice of the "maximum capacity" required to accommodate such interceptions, etc., again "simultaneous- ly." The Final Notice insisted that these statements of "actual number" and "capacity" were properly in terms that drew no distinction between different types of interceptions (e.g., communications content versus mere pen registers), even though they differ heavily in their actual demands on capacity. Final Notice, 63 Fed. Reg. at 12235. And it treated interceptions as "simultaneous" if they occur on the same day, even though they may each only take moments and do not overlap in the least. Id. at 12225. USTA objects to both these decisions. And rightly so. As to "capacity," the FBI acknowledged that different interceptions impose different demands on capacity; content interceptions might require up to five delivery channels be- cause of multiple participants on a call, while others, such as pen registers and trap and trace devices, typically use only a single channel. See id. at 12218, 12232-33. By way of justification it said that the only historical data it had access to did not directly reveal the information the carriers were after: the available average national ratio of content intercep- tions to pen registers and trap and trace devices was not "in any way representative of any specific geographic region." Id. at 12235. It also said that, in any event, "law enforcement ... does not know the type(s) of surveillance that will be needed in the future." Id. at 12236. As to simultaneity, the FBI insisted that its choice "was logical from a law enforcement perspective" because court orders approving wiretapping activities are phrased in terms of days, and as a result such data was all that was available. Id. at 12225/3, 12235/2. The FBI's justifications of both decisions--ultimately claims of defects in existing data--render them unreasonable. See Fresno Mobile Radio, Inc. v. FCC, 165 F.3d 965, 969-70 (D.C. Cir. 1999). Such complete throwing up of hands is inconsistent with the Bureau's extensive use of statistical projections elsewhere in implementing CALEA. In fact, all the interception numbers that the FBI gave are estimates. For instance, to determine the actual and maximum capacity requirements themselves, the FBI undertook to establish a historic baseline, and then used statistical techniques to ex- trapolate the baseline into the future. Id. at 12224-25; see also id. at 12226/3 (stating that in determining "growth factors," which require prediction of future capacity require- ments, "statistical and analytical methods were applied to the historical interception information"). As to these portions of the Final Notice, we reverse the judgment of the district court, with instructions to remand the case to the agency for a more adequate explanation. Because it is not so clear as in the case of the Bureau's interpretation of "expeditiously" that there are no defensible grounds for its conclusions, however, the district court should not vacate the FBI's resolutions of the "number of/capacity" and "simultaneously" issues. Compare Allied-Signal, Inc. v. U.S. Nuclear Regulatory Comm., 988 F.2d 146, 150-51 (D.C. Cir. 1993) ("The decision whether to vacate depends on the 'seriousness of the order's deficiencies (and thus the extent of doubt whether the agency chose correctly) and the disruptive consequences of an interim change that may itself be changed.' "). * * * The judgment of the district court is affirmed and reversed as set forth above. So ordered. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4575 From: Hawkspirit Date: Sun Jan 20, 2002 10:01am Subject: Help on R.F. signal identification I'd like some help from the group in identifying an unknown R.F. signal. This signal was received while doing a sweep in the northern part of Los Angeles. The signal operates between 2.402GHZ and 2.468 GHZ. This transmission is some kind of pulsed microwave signal. The timing of the signal is as follows. The signal first bursts five separate simultaneous pulses. The wave form looks as if you hold your hand up in front of your face fingers pointed toward the ceiling. Each finger would be a separate pulse. They range in amplitude as you fingers appear a (bell curve). This burst lasts about one half second and then the carrier is clear of signals. Next a single pulse appears at the high side of the carrier (2.468) and starts to sweep down frequency. When it reaches about the fifty percent point of the carrier bandwidth the five finger burst array appears again for about one half second. Then the single pulse reappears at the fifty percent point and continues to sweep down frequency until it arrives at the lower frequency of the carrier (2.402GHZ) and disappears and the five finger pulse bursts again for a half second. This completes the cycle. The full cycle timing is about 3 seconds. I monitored this signal for about four hours and I did not detect any pattern variation. Any help appreciated Roger Tolces www.bugsweeps.com 4576 From: James M. Atkinson Date: Sun Jan 20, 2002 11:13am Subject: Re: Help on R.F. signal identification Roger, What was the bandwidth of the signals, and did you examine the signals in the time domain? I would suspect an 802.11 WLAN connection, but of course it has to be assumed a hostile signal until proven otherwise. Where did you trace the signal to? Was it originating INSIDE your clients facility? What kind of antenna where you using? -jma At 8:01 AM -0800 1/20/02, Hawkspirit wrote: >I'd like some help from the group in identifying an unknown R.F. signal. >This signal was received while doing a sweep in the northern part of Los >Angeles. >The signal operates between 2.402GHZ and 2.468 GHZ. This transmission is >some kind of pulsed microwave signal. The timing of the signal is as follows. > The signal first bursts five separate simultaneous pulses. The wave form >looks as if you hold your hand up in front of your face fingers pointed >toward the ceiling. Each finger would be a separate pulse. They range in >amplitude as you fingers appear a (bell curve). This burst lasts about one >half second and then the carrier is clear of signals. Next a single pulse >appears at the high side of the carrier (2.468) and starts to sweep down >frequency. When it reaches about the fifty percent point of the carrier >bandwidth the five finger burst array appears again for about one half >second. Then the single pulse reappears at the fifty percent point and >continues to sweep down frequency until it arrives at the lower frequency >of the carrier (2.402GHZ) and disappears and the five finger pulse bursts >again for a half second. This completes the cycle. The full cycle timing is >about 3 seconds. I monitored this signal for about four hours and I did not >detect any pattern variation. Any help appreciated > >Roger Tolces >www.bugsweeps.com -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4577 From: Matthew Paulsen Date: Sun Jan 20, 2002 1:11pm Subject: RE: Help on R.F. signal identification This could be a frequency hopping Bluetooth air interface for a basestation. Spectrum spread in the US is from 2.402 to 2.480. -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Sunday, January 20, 2002 8:01 AM To: TSCM-L@yahoogroups.com; bratkid@e... Subject: [TSCM-L] Help on R.F. signal identification I'd like some help from the group in identifying an unknown R.F. signal. This signal was received while doing a sweep in the northern part of Los Angeles. The signal operates between 2.402GHZ and 2.468 GHZ. This transmission is some kind of pulsed microwave signal. The timing of the signal is as follows. The signal first bursts five separate simultaneous pulses. The wave form looks as if you hold your hand up in front of your face fingers pointed toward the ceiling. Each finger would be a separate pulse. They range in amplitude as you fingers appear a (bell curve). This burst lasts about one half second and then the carrier is clear of signals. Next a single pulse appears at the high side of the carrier (2.468) and starts to sweep down frequency. When it reaches about the fifty percent point of the carrier bandwidth the five finger burst array appears again for about one half second. Then the single pulse reappears at the fifty percent point and continues to sweep down frequency until it arrives at the lower frequency of the carrier (2.402GHZ) and disappears and the five finger pulse bursts again for a half second. This completes the cycle. The full cycle timing is about 3 seconds. I monitored this signal for about four hours and I did not detect any pattern variation. Any help appreciated Roger Tolces www.bugsweeps.com Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4578 From: ki4je Date: Sun Jan 20, 2002 10:08am Subject: Re: Help on R.F. signal identification Could it be someones wireless LAN operating on the 802.1b standard? ----- Original Message ----- From: Hawkspirit To: TSCM-L@yahoogroups.com ; bratkid@e... Sent: Sunday, January 20, 2002 11:01 AM Subject: [TSCM-L] Help on R.F. signal identification I'd like some help from the group in identifying an unknown R.F. signal. This signal was received while doing a sweep in the northern part of Los Angeles. The signal operates between 2.402GHZ and 2.468 GHZ. This transmission is some kind of pulsed microwave signal. The timing of the signal is as follows. [Non-text portions of this message have been removed] 4579 From: MaxS Date: Sun Jan 20, 2002 10:45am Subject: Spying in China Dears: Who knows what about spying equipments in BOEING 767 for Chinese president ? I am not asking WHY but HOW. Martin KOCIAN PS I will ask WHY later. 4580 From: Michael Puchol Date: Sun Jan 20, 2002 5:51pm Subject: Re: Help on R.F. signal identification Hi Roger, Without looking at the spectrum itself, and considering you are right in one of the ISM bands, you may be looking at 802.11b WLAN. It occupies about 1MHz per channel, uses direct sequence spread-spectrum, and can change such 'channel' as needed - maybe explaining the jumps you see. Depending on your SA settings, the waveform would look as you point out. Have you tried running with peak hold on? You will see the whole spectrum used 'filling up'. Cheers, Mike > ----- Original Message ----- > From: "Hawkspirit" > To: ; > Sent: Sunday, January 20, 2002 5:01 PM > Subject: [TSCM-L] Help on R.F. signal identification > > > > I'd like some help from the group in identifying an unknown R.F. signal. > > This signal was received while doing a sweep in the northern part of Los > > Angeles. > > The signal operates between 2.402GHZ and 2.468 GHZ. This transmission is > > some kind of pulsed microwave signal. The timing of the signal is as > follows. 4581 From: MIKE F Date: Sun Jan 20, 2002 5:56pm Subject: RE: Spying in China It is reporrted that 767 sent here to US for updating & repairs thats how the equipment was put on plane. later4,mike f. -----Original Message----- From: MaxS [mailto:maxs@m...] Sent: Sunday, January 20, 2002 11:45 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Spying in China Dears: Who knows what about spying equipments in BOEING 767 for Chinese president ? I am not asking WHY but HOW. Martin KOCIAN PS I will ask WHY later. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ --- Incoming mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.314 / Virus Database: 175 - Release Date: 1/11/2002 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.314 / Virus Database: 175 - Release Date: 1/11/2002 4582 From: tek492p Date: Sun Jan 20, 2002 7:31pm Subject: Re: Steve's column name Steve -- Use your name in your column title. Like "Steve's xxxxxxxxxxx". Hey, why not promote your business? When readers think of Steve Uhrig, they will also think of SWS Security. Jack 4583 From: James M. Atkinson Date: Sun Jan 20, 2002 4:27pm Subject: Re: Spying in China At 5:45 PM +0100 1/20/02, MaxS wrote: > Dears: > > Who knows what about spying equipments in > BOEING 767 for Chinese president ? > > I am not asking WHY but HOW. > > Martin KOCIAN > > PS > I will ask WHY later. Simple, The Chinese intelligence service installed the devices to spy on their own president, but the presidential protective detail turned them up by accident... oops. Heaven forbid, that the US would actually bug the plane; I mean really, the work was done by a highly respected US defense contractor, guarded 7/24, and maintained in a super secure location, etc, etc, etc... Who ever installed the little toys had sloppy tradecraft, Tit-for-tat, Bwahhh, ha-ha-ha, -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4584 From: Matthew Paulsen Date: Sun Jan 20, 2002 10:08pm Subject: RE: Re: Steve's column name Steve.. How about "Uhrig's Vade Mecum"? [Non-text portions of this message have been removed] 4585 From: Wayne T Work Date: Sun Jan 20, 2002 6:17pm Subject: RE: Help on R.F. signal identification Sounds like one of the newer 2.4 gig Network receivers transmitters. They can be set to hop around to find open channels with in this range. They do a DSS on the sig strength and then settle on a freq. to use to establish the network communications. If WEP is enable then it to uses chanelized selection for an encrypted session. pretty common stuff. Also the newer video "snap shop" 2.4 gig cameras use similar technology. Got a scan capture of the info? NAI (network associates Inc) make a WAP/WEP sniffer. Might help with the analysis. -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Sunday, January 20, 2002 11:01 AM To: TSCM-L@yahoogroups.com; bratkid@e... Subject: [TSCM-L] Help on R.F. signal identification I'd like some help from the group in identifying an unknown R.F. signal. This signal was received while doing a sweep in the northern part of Los Angeles. The signal operates between 2.402GHZ and 2.468 GHZ. This transmission is some kind of pulsed microwave signal. The timing of the signal is as follows. The signal first bursts five separate simultaneous pulses. The wave form looks as if you hold your hand up in front of your face fingers pointed toward the ceiling. Each finger would be a separate pulse. They range in amplitude as you fingers appear a (bell curve). This burst lasts about one half second and then the carrier is clear of signals. Next a single pulse appears at the high side of the carrier (2.468) and starts to sweep down frequency. When it reaches about the fifty percent point of the carrier bandwidth the five finger burst array appears again for about one half second. Then the single pulse reappears at the fifty percent point and continues to sweep down frequency until it arrives at the lower frequency of the carrier (2.402GHZ) and disappears and the five finger pulse bursts again for a half second. This completes the cycle. The full cycle timing is about 3 seconds. I monitored this signal for about four hours and I did not detect any pattern variation. Any help appreciated Roger Tolces www.bugsweeps.com ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4586 From: James M. Atkinson Date: Mon Jan 21, 2002 8:23am Subject: China silent over spy devices found on its presidential plane http://straitstimes.asia1.com.sg/asia/story/0,1870,97989,00.html? China silent over spy devices found on its presidential plane Beijing wants to downplay the incident, say analysts, despite 27 bugs reportedly being discovered on the US-made aircraft BEIJING - China yesterday remained silent about reports that a refitted Boeing 767 intended for Chinese President Jiang Zemin was bugged, as Vice-President Hu Jintao told a delegation of former United States ambassadors and academics that Beijing wants good ties with Washington. This Boeing 767 being refitted for President Jiang in the US was reportedly bugged. -- AP A Chinese Foreign Ministry official said the ministry did not have a response to the reports by the Financial Times and the Washington Post this weekend that Chinese intelligence officers had found 27 spying devices hidden in a US-built Boeing 767 intended to become Mr Jiang's official plane. 'We're still trying to contact relevant departments on this matter,' she said. The story was not carried by any local media. Analysts said yesterday they saw the lack of response by Beijing so far as a sign that the Chinese leadership wanted to downplay the incident. 'The Chinese government has been cautious in handling this problem. It has issued no official protest, no criticism,' said Mr Zhu Feng, director of the international securities programme of the Beijing University School of International Studies. 'I think it is taking into consideration the development in China-US relations.' Meeting the former US ambassadors and professors from Harvard University on Saturday, Mr Hu said Sino-US relations 'now have opportunities for further development'. He said that bilateral relations 'have been developing constantly despite ups and downs' since China and the US re-established ties 30 years ago, and he said he wanted to push forward bilateral relations through further 'exchanges, understanding and cooperation'. Meanwhile, US Secretary of State Colin Powell said yesterday that Chinese officials had never raised with him the reported bugging of the jet. 'In all the conversations I've had with the Chinese authorities over the last several months, this has never been raised,' he said in an interview with ABC television. As well, Mr Powell, who refused to confirm or deny the reports, said he did not believe the alleged incident would affect President George W. Bush's visit to China next month. 'I don't expect anything to derail that trip,' he said in a separate interview with the Fox News Channel. --AFP, Xinhua -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4587 From: James M. Atkinson Date: Mon Jan 21, 2002 8:22am Subject: China never mentioned bugging of Jiang plane: Powell http://straitstimes.asia1.com.sg/breakingnews/story/0,1895,97908,00.html? China never mentioned bugging of Jiang plane: Powell TOKYO -- US Secretary of State Colin Powell said on Sunday that Chinese officials had never raised with him the reported bugging of an American jet built for Chinese President Jiang Zemin. In addition, General Powell, who refused to confirm or deny the report, said he did not believe the alleged incident would affect President George W. Bush's upcoming visit to China. 'In all the conversations I've had with Chinese authorities over the last several months this has never been raised,' Gen Powell said in an interview with ABC television. In a separate interview with the Fox News Channel, he expanded on his remarks, but still declined to comment on the veracity of the report that appeared in the Washington Post and Financial Times on Saturday. 'I'm not aware of any contacts between us and the Chinese government concerning this so-called matter that we read about in the newspapers yesterday,' he said. Although he refused to comment on the reports themselves, Gen Powell said he did not expect the furore raised by them to interfere with the Bush trip to China that is scheduled for next month. 'I don't expect anything to derail that trip,' he told Fox. Asked a similar question in the ABC interview he replied: 'I don't see any reason to think so. 'We've received acceptance, of course, from the Chinese of the presidential visit and I know they're looking forward to it, they're quite excited about it and so are we,' he said. Both Washington and Beijing have refused to comment on the reports which said that Chinese intelligence officers had found 27 spying devices hidden in the US-built Boeing 767 jet intended to be Mr Jiang's official plane. China had known the jet was bugged since September -- a month after the aircraft was delivered, according to the reports. -- AFP -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4588 From: MIKE F Date: Mon Jan 21, 2002 9:54am Subject: WATCH-OUT!!!!!======>Multiple windows file wiping utilities do not properly wipe data with NTFS This Should interest some that use BC-Wipe & or other supposedly assured WIPE CLEAN software programs. later4,mike f ---------------------------------------------------------------------------- ------------------------------------------------ Kurt Seifried Security Advisory 003 (KSSA-003) http://www.seifried.org/security/advisories/kssa-003.html, kurt@s... Title: Multiple windows file wiping utilities do not properly wipe data with NTFS file systems. Issue date: Jan 21, 2002 Who should read this advisory: Anyone using file wiping utilities such as PGP Wipe (from NAI), BCWipe (from Jetico) or East-Tec Eraser (from East-Tec) on a Windows system with an NTFS file system, such as Windows NT, Windows 2000 or Windows XP especially with features such as thumbnail pictures in explorer. This advisory affects virtually every Windows file wiping utility, none of the tested programs were found to be problem free. Author and contact info: This advisory is copyright 2002, Kurt Seifried, kurt@s..., http://www.seifried.org/ Overview: In the NTFS file system a facility exists to bind additional data to a file or directory, called an alternate data stream [url1][url2]. These alternate data streams cannot be be removed, unless the parent file or directory is destroyed. Unfortunately most file wiping utilities only deal with the primary data stream and do not wipe the alternate data streams, thus leaving data intact. Affected software: It is important to note that every single software package tested failed to erase single or multiple data streams (Eraser 5.3 erased multiple data streams in, however missed alternate data streams when only one was present in a file). Based on this I find it unlikely that any other secure deletion programs implement alternate data stream wiping properly, all secure deletion programs for Windows should be treated as suspect until proven innocent. If you are using secure deletion software please check immediately for files with alternate data streams, and after deleting them you are strongly advised to wipe all free space. BCWipe version 1.x and 2.x from Jetico - Confirmed in testing and from vendor. http://www.bcwipe.com/ Eraser 5.3 - Confirmed in testing and from vendor. http://www.tolvanen.com/eraser/ SecureClean v3 build-2.0 - Confirmed in testing and from vendor. http://www.accessdata.com/main_deleted_data.htm East-Tec Eraser 2000 - Confirmed in testing. http://www.east-tec.com/eraser/index.htm PGP 6.x freeware and commercial, 7.x, freeware and commercial - Confirmed in testing. http://www.pgp.com/, http://www.pgpi.org/ Numerous other packages are suspected to be vulnerable, it is strongly advised to use the workarounds listed below. Impact: If data is stored in an alternate data stream attached to a file (such as the thumbnail of an image) or directory when this file or directory is wiped the information contained within the alternate data stream will be left intact on the harddrive. No warning is given to the user at all by Windows or the wiping programs. For example if you use windows file explorer (the default file browser in Windows) and have thumbnails of pictures enabled (the default setting) then the thumbnail of the thumbnail image, once created (i.e. once the directory is viewed in Explorer) will not be deleted until you delete the file and wipe all free space. Alternate data streams also provide an ideal location to keep attack tools, snippets of virus code and so forth for attackers and viruses, in fact some virus scanners do not scan alternate data streams unless specifically configured to do so (often labeled as "scan all files" or similar). The good news is that floppy disks and most other removable media are not formatted as NTFS, thus it is unlikely that copied files will contain the alternate data streams. As well no all compression programs, such as WinZip copy the alternate data streams, while others such as WinRAR do copy the alternate data streams. While it is unlikely that files with alternate data streams will have made it to other systems with their alternate data streams intact it is possible, and any systems that have had sensitive data copied or moved to them should immediately have their free space wiped in order to ensure alternate data streams containing sensitive information are still present. Details: Create a file with an alternate data stream: echo "this is a text file" > C:\file.txt echo "this is the alternate data stream lkajhkl2" > C:\file.txt:alternate-data-stream If you use forensics software to examine the harddrive you will find the string of text "this is the alternate data stream lkajhkl2" present on the drive. Now using the file wiper of your choice (BCWipe, etc.) choose the file C:\file.txt and wipe it. Use any many passes as you want. Now examine the drive for the string "this is the alternate data stream lkajhkl2". You should be able to find it. To do this using Linux simply create an image file of the drive and examine it using grep or strings: dd if=/dev/hdb1 of=windows-disk.img grep "this is the alternate data stream lkajhkl2" windows-disk.img or strings windows-disk.img > windows-disk.strings grep "this is the alternate data stream lkajhkl2" windows-disk.strings As you will quickly discover the data is easily found. Alternate data streams are only available on NTFS file systems, making home users with older systems (Windows95, Windows98, WindowsME) immune to this problem, but newer systems based on WindowsXP are capable of using NTFS, thus potentially exposing customers to risk. NTFS is also available on most corporate systems such as WindowsNT, Windows2000 and WindowsXP. Another "feature" of alternate data streams is that they cannot be deleted. If you have an alternate data stream attached to a file you cannot delete it, you can write other data to the stream, however you cannot reliably delete it. To overwrite an alternate data stream simply place more data into it, for example: echo "this will overwrite existing data in the stream" > C:\file.txt:alternate-data-stream or type notepad.exe > C:\file.txt:alternate-data-stream *** Solutions and workarounds: Several workarounds exist, and several vendors are in the process of updating software so as to fix the problem. The first workaround is to avoid using alternate data streams to store sensitive information. Unless you have explicitly created alternate data streams it is unlikely that they exist. However to check for alternate data streams several free tools exist, one of the best of which is LADS [url3] from Frank Hayne Software (heysoft.de). Simply download lads.zip and unpack it, then run it from your root drives (e.g. C:\, D:\) and it should find and report any and all alternate data streams present. Because alternate data streams cannot be deleted tools to detect them are quite effective, once found you should securely delete the files and proceed to the next workaround, wiping free space, in order to ensure the alternate data streams are deleted. The second workaround is to immediately use the "wipe free space" feature present in most secure file deletion utilities. Since the parent file or directory that the alternate data streams were attached to have been deleted the data in the alternate data streams is now in "free space" on the harddrive, thus using "wipe free space" will overwrite it. The downside of this workaround of course is that wiping all the free space on a hard disk can take quite some time, especially on a modern disk that may have several tends of gigabytes of free space to wipe. One note on this: wiping free space may not be possible or effective on network shares using NTFS, it is recommended to encrypt truly sensitive data on NTFS network file systems. A third workaround is to encrypt sensitive data, Windows 2000 offers encrypted file system, or you can use programs such as PGP's PGPDisk [url4] or Jetico's BestCrypt [url5]. It is recommended to use encrypted disk partitions rather then encrypting single files, encrypted disk partitions are much easier to work with, type in a password and you have access, when you are done you do not need to worry about encrypting the file, as the data is kept in an encrypted state on the hard drive. Additionally temporary files stored in the same directory (such as opened word files) will also be kept in an encrypted state, reducing the need for you to wipe free space. Several vendors have announced new versions in light of this, see below for more information: BCWipe 1.x and 2.x "We confirm importance of the problem of wiping alternate data stream in files, created on NTFS disks. We would thank Mr. Seifried for writing us about the problem and are going to solve it in the next version 3 of BCWipe, which is planned to be released at April, 2002." SecureClean "We will be covering all those issues in the next release. We plan to be shipping the product in February. The new release will be posted at www.accessdata.com. The current SecureClean does not handle alternate data streams or the thumbnails. That is coming in February." East-Tec Eraser 2000 "EAST Technologies has acknowledged the possible problem concerning the wiping of the alternate data streams that may appear on NTFS disk drives and it will analyze this problem in the security product that it develops and the way this may compromise the user's personal security and privacy. EAST Technologies will also inform all its users and customers and in case it would be necessary, it will develop a fix." Additional information: Check your anti-virus software, several packages do not scan alternate data streams by default, it is recommended you enable scanning of all files and confirm by placing the eicar.com [url6] in an alternate data stream of a file and scanning to test. Backup programs should also be checked, attach an alternate data stream to a file, delete and then restore it, check for the alternate data stream. You can remove an alternate data stream either by copying the parent file onto non NTFS media or backing it up with a program that does not save the alternate data stream, or by using the "rm" utility present in MKS Software's "MKS Toolkit 8.0". An op-ed piece on this problem will be appearing at SearchSecurity [url7] later this week. References: [url1] http://www.microsoft.com/technet/treeview/default.asp?url=/TechNet/prodtechn ol/winxppro/reskit/prkc_fil_xurt.asp - Multiple data streams [url2] http://support.microsoft.com/default.aspx?scid=kb;EN-US;q286797 - Windows File Protection and Alternative Data Streams (Q286797) [url3] http://www.heysoft.de/nt/ep-lads.htm - List alternate data streams. [url4] http://www.pgp.com/products/desktop-privacy.asp - PGP's Desktop privacy (includes encrypted drive software PGPDisk) [url5] http://www.jetico.com/index.htm#/products.htm - Jetico's BestCrypt [url6] http://www.eicar.org/anti_virus_test_file.htm - Eicar.com test file (for testing anti virus software). [url7] http://searchsecurity.com/ - Op-Ed piece on this to appear later this week. Other acknowledgements / thanks / greetings / information: dd, grep and strings CanSecWest - http://www.cansecwest.com/ - See you there URL for advisory, signature and keys: http://www.seifried.org/security/advisories/kssa-003.html http://www.seifried.org/security/advisories/kssa-003.html.asc http://www.seifried.org/security/keys/ - -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 7.0.3 for non-commercial use mQGiBDsNcxcRBAD987JAFctBIHhuUNm5tqQgYi/CsFsx1afNI6QyHhbqPxJMF2Vs D5dymEKSNd8QSAP4GNTk9MwswwxXHuXIYJolp+U2HhD/UhQsp37WiEODMB+NX8Xc Xe5+BOUEUxaGo/du64tawslmiNw2KJDonKWaUSQBtp5ek1eQ0plTQbJ1DQCg//m4 wrYgtDl4iWdMk/76C4zbc/MD/ibshluW0pnWSDUxf00LrbMd3xAfQDPd9ACruY7z pXdbdSJctpGMgzjbC0B97uqJINmB2Uu9h62bK+eKb+eIlM+zJEth0r6PCrhr+Kj4 EpQWiiujVU8ijNbHVM9SqT2vcS9i2o2ZCjrf2bQDdI7jt1c88+DdaCvRW79BiN4P GsyCBADy8uewbArfRQl/erB6XeyVz2KDRvi5mNzM0xEWTtNkEV43pyHxXNtLzuD8 91GCHxsSL9f5JWEpcyiIiUhXNFdM3nZiGE/6/xfnKflDT7bsOdKXHXCvW1yN9aDx QoRhJhlc3mnZMyLx/xz4M6wXVj8ddOBtwgBmlFtdZjyiDHwNJLQpS3VydCBNLiBT ZWlmcmllZCAgPHNlaWZyaWVkQHNlaWZyaWVkLm9yZz6JAFQEEBECABQFAjsNcxcF CRAw7AAECwMCAQIZAQAKCRCtYwtOrVbldApoAJ9ZRUlW8cycj3/XlTVtQNx405GZ QgCg5zt7jGJ3v7FQguJgQloBGY1MACiJAEYEEBECAAYFAjsNcz8ACgkQ+7U3Ee+D x4wO6gCgnbSwZFOOiTPoYjLxu446qfvzAAoAni6CROE7jtzqZMdHJbEqDFXcreEn iQEcBBABAQAGBQI7DXNLAAoJECnUkEFIZQ2xALsH/13KyASmkFvyYCsj4hzD+UOV DMZ/3Vi8/dXqL2NpSdGbvaASNVRyGG4huJBBSh9ccjXo11IbAfOvICfjbUQmIb3w O/5mRQCiFIsakuPZWKhne5I9yVjL3ob78c4i2EvqSJ6VPFuqIrEdVCeMNU8DvjDw k8FkjF5osPoKdk2CndEnrLOXMz04Qyv6DB4O1qcmhEyVc842dqPd/eOnNGUA7qN7 axp4AiZRNRyf4/XbRt+KQzS0tItQy9LcNfQiIr2B0nYo4t+edyQbQSPBiuESYTzm TZhz0J3zxl4Tkea1GlTBxuJ6ulOFofZtDyAWABncZ9oEWgPADl15a+SCUNGvct+J AEYEEBECAAYFAjsNdHYACgkQUWd9bj7NcwaN6QCeIYLdy4G3XlFebtHiXSHc/K1/ Iw4AoNrGLQWSHat8rs74/uE8ojtzh79htCFLdXJ0IFNlaWZyaWVkIDxrdXJ0QHNl aWZyaWVkLm9yZz6JAEYEEBECAAYFAjuUYccACgkQrWMLTq1W5XRAugCfQyMVlXPs D7lYKvhYg08mv6U7AZcAn0feW5KeOLrmSCWKaHlNUsVHX3opuQINBDsNcxgQCAD2 Qle3CH8IF3KiutapQvMF6PlTETlPtvFuuUs4INoBp1ajFOmPQFXz0AfGy0OplK33 TGSGSfgMg71l6RfUodNQ+PVZX9x2Uk89PY3bzpnhV5JZzf24rnRPxfx2vIPFRzBh znzJZv8V+bv9kV7HAarTW56NoKVyOtQa8L9GAFgr5fSI/VhOSdvNILSd5JEHNmsz bDgNRR0PfIizHHxbLY7288kjwEPwpVsYjY67VYy4XTjTNP18F1dDox0YbN4zISy1 Kv884bEpQBgRjXyEpwpy1obEAxnIByl6ypUM2Zafq9AKUJsCRtMIPWakXUGfnHy9 iUsiGSa6q6Jew1XpMgs7AAICCAD1mLQv5THh1JfuQEN26KbdRXWtw5tJ2LiXri17 G1BGS4pz7CVgNIhmKxhm9xvTD7Yb0xI2RoA5yre04xG77OQ47k0IjawSHdfr+PBZ 8C7O03QS17vKHthrpKayKENOUqWKOK3jGd2fx50EgKMnt5o+n1szEuhwvmxh1lOp iV4l4EMc2QykM1W/weTgCmTvBVABfgm0OQoNswdkrKPyyY16Li2IBI9ebqo6Vnz8 NWiZ2Hzta0cKvuGak/mmNkLsZFXQ3oH/J6ubRb9LskqJ4o7SwUaCAHR1sjlq5LS/ JNVjwkG18Q+Jrr4X6NncRK1eCuHm8yD5dbvHPZi0VnltXHwsiQBMBBgRAgAMBQI7 DXMYBQkQMOwAAAoJEK1jC06tVuV0vHwAmwTOfoVT5RJqaluoEvXy7qpRjmzUAKCw 4DM73//OxJSRLTwVO5IVtq/WIQ== =azr0 - -----END PGP PUBLIC KEY BLOCK----- Permission is granted for copying and circulating this Bulletin to the Internet community for the purpose of alerting them to problems, if and only if, the bulletin is not edited or changed in any way, is attributed to Kurt Seifried kurt@s..., and provided such reproduction and/or distribution is performed for non-commercial purposes. Any other use of this information is prohibited. Kurt Seifried kurt@s... is not liable for any misuse of this information by any third party. Kurt Seifried, kurt@s... A15B BEE5 B391 B9AD B0EF AEB0 AD63 0B4E AD56 E574 http://www.seifried.org/security/ -----BEGIN PGP SIGNATURE----- Version: PGP 7.0.4 iQA/AwUBPEuH161jC06tVuV0EQJdaACg3i2aFcK4Rt6E9Ou9NNlt0sHJmxsAoM6b n4zlM+40Y8Em5NTqwQ+7r+yn =aYjp -----END PGP SIGNATURE----- ============================================================================ Delivery co-sponsored by VeriSign - The Internet Trust Company ============================================================================ FREE E-COMMERCE SECURITY INFRASTRUCTURE GUIDE When building an e-commerce site, you want to start with a strong, secure foundation. Learn how with VeriSign's FREE White Paper, "Building an E-Commerce Trust Infrastructure." See how you can authenticate your site to customers, use 128-Bit SSL encryption to secure your web servers, and accept secure payments online. Click here: http://www.verisign.com/cgi-bin/go.cgi?a=n116965650045000 ============================================================================ --- Incoming mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.314 / Virus Database: 175 - Release Date: 1/11/2002 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.314 / Virus Database: 175 - Release Date: 1/11/2002 4589 From: MIKE F Date: Mon Jan 21, 2002 10:17am Subject: WIN 2K ENCRYPTION On the Website near bottom the four articles posted on jan17 deal with Windows 2000 built in ecryption. later4,mike f ---------------------------------------------------------------------------- ----------------------------------------------- Added on Thursday, January 17, 2002 1) Keep Your Data Confidential A 2001 article from Windows & .NET magazine. 2) Step-by-Step Guide to EFS A technical reference provided by Microsoft. 3) Inside Encrypting File System Learn about Win2K's built-in encryption facility from this article from Windows & .NET magazine. 4) Encrypting File System Primer: Basics and Best Practices A 2001 article from the SANS Institute. The Above articles can be accessed from this web site: http://www.pcwebopedia.com/new_links.asp --------------------------- lATER4,Mike F ------------------------------------------ "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or Confidential. The information is intended for use only by the individual(s)or entity named/indicated above.If you are the identified/intended recipient, be aware that (Unless you seek Permission.) any disclosure, COPYING, DISTRIBUTION,& or use of the contents of this Message/Information is Prohibited! --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.314 / Virus Database: 175 - Release Date: 1/11/2002 4590 From: Hawkspirit Date: Mon Jan 21, 2002 11:08am Subject: Help on R.F. signal identification Mat, Anyplace on the Internet I can learn more about this? Roger From: "Matthew Paulsen" Subject: RE: Help on R.F. signal identification This could be a frequency hopping Bluetooth air interface for a basestation. Spectrum spread in the US is from 2.402 to 2.480. 4591 From: Hawkspirit Date: Mon Jan 21, 2002 11:33am Subject: Help on R.F. signal identification Thanks, Jim, The overall bandwidth is by the numbers 66MHZ, The individual pulses appeared to be about 5MHZ each. As far as the time domain, I was using my surveillance receiver so I could not do any kind of frame capture. What would be the best technique for measurement in the time domain? I could get a general direction on the signal but the sweep was started after dark so I could not see the surrounding area. It is a residential neighborhood. The antenna's I am using are various flavors of wire wound configurations. It appears I will need some kind of dish for this. Would this be your recommendation for better directional analysis? Thanks as always for your expert R.F.help. Roger Roger, What was the bandwidth of the signals, and did you examine the signals in the time domain? I would suspect an 802.11 WLAN connection, but of course it has to be assumed a hostile signal until proven otherwise. Where did you trace the signal to? Was it originating INSIDE your clients facility? What kind of antenna where you using? -jma 4592 From: James M. Atkinson Date: Mon Jan 21, 2002 11:41am Subject: Re: Help on R.F. signal identification Roger, I have a copy of the current Bluetooth specification available on my website so feel free to download it, but be aware that it is something like 10+ MB is size. http://www.tscm.com/BluetoothSpec.pdf (10 MB core file) http://www.tscm.com/Bluetoothprofiles.pdf (4.3 MB supplement) -jma At 8:01 AM -0800 1/20/02, Hawkspirit wrote: >I'd like some help from the group in identifying an unknown R.F. signal. >This signal was received while doing a sweep in the northern part of Los >Angeles. >The signal operates between 2.402GHZ and 2.468 GHZ. This transmission is >some kind of pulsed microwave signal. The timing of the signal is as follows. > The signal first bursts five separate simultaneous pulses. The wave form >looks as if you hold your hand up in front of your face fingers pointed >toward the ceiling. Each finger would be a separate pulse. They range in >amplitude as you fingers appear a (bell curve). This burst lasts about one >half second and then the carrier is clear of signals. Next a single pulse >appears at the high side of the carrier (2.468) and starts to sweep down >frequency. When it reaches about the fifty percent point of the carrier >bandwidth the five finger burst array appears again for about one half >second. Then the single pulse reappears at the fifty percent point and >continues to sweep down frequency until it arrives at the lower frequency >of the carrier (2.402GHZ) and disappears and the five finger pulse bursts >again for a half second. This completes the cycle. The full cycle timing is >about 3 seconds. I monitored this signal for about four hours and I did not >detect any pattern variation. Any help appreciated > >Roger Tolces >www.bugsweeps.com -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- From: Matt Paulsen Date: Sat Jan 18, 2003 1:28pm Subject: RE: Public input on hacker sentencing $$$ -m Don't get me wrong.. Hacking is hacking, and murder is murder, but why can murder sometimes be called pre-meditated and sometimes called manslaughter? jmtpw -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: 17 January 2003 01:17 To: tscm-l@yahoogroups.com Subject: [TSCM-L] Public input on hacker sentencing OFF WITH THEIR HEADS! ... Steve "Feds Seek Public Input on Hacker Sentencing" SecurityFocus Online (01/13/03); Poulsen, Kevin The United States Sentencing Commission (USSC) engaged the public for advice last week on whether prison or probation sentences for cybercriminals are adequate enough, or should be stronger. Michael O'Neill of George Mason University Law School says, "We want to know whether or not the relevant community...believes that serious penalties will deter people from engaging in that sort of conduct." The public can provide suggestions by accessing a formal "Issue for Comment" posted on the USSC Web site; the period for public comment will continue until Feb. 18. In addition to a general overview of the question of whether penalties for cyber miscreants are strong enough, the forum seeks advice on eight proposals to take additional factors into consideration when determining a sentence. One proposal suggests adding points--and thus extra jail time--to sentences if the hackers commit their crimes for financial gain, or to violate a person's privacy. For now, the sentencing guidelines for computer crimes are the same as those for larceny, embezzlement, and theft, in which the financial loss inflicted is the primary consideration. However, the Homeland Security Act and the congressional emphasis on cyberterrorism required the USSC to review its cyber crime sentencing guidelines so that they take into account "the serious nature of such offenses, the growing incidence of such offenses, and the need for an effective deterrent and appropriate punishment to prevent such offenses." The Homeland Security Act also authorized the creation of penalties for hackers whose activities result in a loss of human life. Orin Kerr of George Washington University Law School thinks that computer crime sentences are as harsh as normal sentences, if not harsher, according to some provisions. http://online.securityfocus.com/news/2028 ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6784 From: Matt Paulsen Date: Sat Jan 18, 2003 1:51pm Subject: RE: This is already happening with some lunatics we know imho these systems are placebo panacea's for the public. They provide none, to very little real value, except to the telco's if phones are going to be used, guess you should buy some stock... I had the 'pleasure' of working with the VA recently on their patient locator system and was less than impressed - modems, telco's and landlines, good god, have we learned nothing yet? Next I get to see FEMA's efforts. I'm not encouraged, and I see 2 hours a month in work time going down the drain from hereon. At least there are still ham operators around, albeit, a dying breed. That's where real info will come from (imho again), at least, those that remain after an actual disaster. Hey.. that's interesting, EAS just ran their weekly test while I typed this up... And my wife says to me while she cleans some dishes "I don't even think they used that when September 11th happened." Now isn't that interesting..... -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Friday, January 17, 2003 11:12 AM To: tscm-l@yahoogroups.com Subject: [TSCM-L] This is already happening with some lunatics we know Officials consider faster ways to alert U.S. to terrorism By Audrey Hudson THE WASHINGTON TIMES Television sets suddenly turning on in the middle of the night, Internet messages or nontraditional telephone rings may be the next way Americans are alerted by the government they are under attack by terrorists. The Emergency Alert System (EAS) in 1997 replaced the Emergency Broadcast System that historically warned that "this is only a test," but lawmakers say new technology is needed to give Americans faster and more practical information. In announcing his candidacy for president, Sen. John Edwards, North Carolina Democrat, first proposed a telephone warning system for in the event a terrorist attack occurs while Americans are sleeping. "There are a lot of folks in this country who have no idea what they are supposed to do if an attack occurs," Mr. Edwards said. Mr. Edwards and Sen. Ernest F. Hollings, South Carolina Democrat and soon-to-be ranking member of the Commerce, Science and Transportation Committee, yesterday announced legislation to explore new alert systems. The bill would authorize the Homeland Security and Commerce departments to work with other government agencies and the media to set standards for warnings. The color-code warning system established by Tom Ridge, White House homeland security adviser, fails to give information on how to react to a terrorist attack, Mr. Edwards said. "We have to make sure effective warnings get to every American in times of danger, and we have to make sure those warnings tell folks just what they can do to protect themselves and their loved ones," Mr. Edwards said in a statement. The EAS is used daily on the local level to issue warnings of events that can endanger the public, including hazardous-material spills. The EAS is also used to transmit warnings from the AMBER (America's Missing Broadcast Emergency Response) alert system, which notifies the public about child abductions. AMBER was established on a state-by-state voluntary basis in 1996 in response to the abduction and slaying of 9-year-old Amber Hagerman in Dallas. It would be up to Congress to require the EAS to transmit terrorism warnings from a new alert system. The EAS has never been used for its primary function, which is to provide the president with a means to address the nation through all broadcast, cable and satellite systems in the event of a national emergency. It was not activated on September 11 because President Bush did not address the nation. The bill requires the Commerce Department to develop new technologies to issue warnings based on the National Weather Service system, which is decoded by EAS equipment at broadcast and cable stations and can be delivered almost immediately. Commerce would also explore new ways to disseminate the warnings through the Internet, cell phones and new technology to turn on TV sets. Specially equipped televisions, radios, pagers and other devices already exist to decode EAS messages, according to a fact sheet distributed by the Federal Communications Commission. Consumers can program these products to turn on automatically for the messages they want to receive. The Edwards-Hollings bill was based on recommendations from the Partnership for Public Warning. "National warning systems need significant improvement. They enable Americans at risk to save lives and reduce losses from natural and manmade disasters," said Peter Ward, partnership chairman. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6785 From: Andre Holmes <1ach@g...> Date: Sat Jan 18, 2003 3:22pm Subject: EBAY Greetings I have found 2 items that may be of interest. Item number 2906323884 ANDRE [Non-text portions of this message have been removed] 6786 From: Mitch D Date: Sun Jan 19, 2003 3:47am Subject: Marriot WiFi (test report, off topic) I tested the wireless network at a marriot recently,for all of 10 minutes. After I got the access package from the front desk at a nameless Marriot,(card, instructions,driver cd)I set my laptop up with the 2.4 gig card and found it really difficult to maintain an acceptable signal by holding the laptop over my head, with the top of the card facing the top of the wall by the room entrance(which was where I got the highest useable signal level)I tried reflecting it,moving it and waving the whole setup all over the room to no avail.......no wonder they keep Pringles in the "Mini Bar" in guests rooms,as well as coat hangars in the closet.( I didnt but I thought about it) What sucks even worse is Marriot charges over 10 bucks a day for this "vaporful" wifi svc....Ended up using my dial-up anyhow......no overhead contortion neccessary...... __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6787 From: James M. Atkinson Date: Sun Jan 19, 2003 6:49am Subject: Re: Marriot WiFi (test report, off topic) If your going to use WiFi at a hotel bring along a small 16 dBi panel antenna and a really small palm sized tripod. Convert the connector on the antenna to an SMA and connect some premium grade coaxial cable (25-30 feet is good). I have found it helpful to have a right angle SMA connector on the cable where it connects to the antenna as it keeps things neat (remember to use a torque wrench on the connection). The 16 dBi panel antenna is roughly 10*10 inches square, and you can coil the cable around the back of the housing. Only use this antenna when you can't pick up a decent signal, otherwise you risk saturating the WiFi card in your computer. Also, if your room has a microwave oven you should use a gain antenna with caution. -jma At 1:47 AM -0800 1/19/03, Mitch D wrote: >I tested the wireless network at a marriot recently,for all of >10 minutes. >After I got the access package from the front desk at a >nameless Marriot,(card, instructions,driver cd)I set my laptop >up with the 2.4 gig card and found it really difficult to >maintain an acceptable signal by holding the laptop over my >head, with the top of the card facing the top of the wall by the >room entrance(which was where I got the highest useable signal >level)I tried reflecting it,moving it and waving the whole setup >all over the room to no avail.......no wonder they keep Pringles >in the "Mini Bar" in guests rooms,as well as coat hangars in the >closet.( I didnt but I thought about it) >What sucks even worse is Marriot charges over 10 bucks a day for >this "vaporful" wifi svc....Ended up using my dial-up >anyhow......no overhead contortion neccessary...... -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6788 From: Date: Sun Jan 19, 2003 8:28am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 6789 From: Date: Sun Jan 19, 2003 8:28am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6790 From: Steve Uhrig Date: Sun Jan 19, 2003 4:21pm Subject: Motorola HT-220 portables The other day, list member Charles Patterson and I were reminiscing over communications and got to discussing some of our early ham radio activities 30 years ago. Back then you didn't buy a radio. You built it. My first non-HF radio was a Motorola 80D converted from taxicab service on lowband, operating on 6 volts and using a dynamotor for TX high voltage and a vibrator for RX high voltage. If you were around back in those days, you might enjoy this page: http://www.batnet.com/mfwright/HT220.html While this was not my first portable radio, it was an early one. I had an amateur HT200 portable before the local police had one. Most two way radios used tubes in those days. Nothing to do with TSCM, just remembering good times from 30 years ago. Steve (WA3SWS) ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6791 From: Matt Paulsen Date: Mon Jan 20, 2003 1:08am Subject: multilayered security system, update A while back I posted on a requirements list for 3 levels of security for pc's. The one area that drew a blank was the locality activated ID system - mostly comments such as 'that can be done easily' were returned, but nothing concrete. After a few months of research, this was put together for all 3 levels... comments anyone? www.rfideas.com - proximity activation - note: the bonus here is that this integrates with the existing physical security badge access system. www.rsasecurity.com - 2 phase fob, 5 year battery www.identix.com - biometric interface 6792 From: Matt Paulsen Date: Mon Jan 20, 2003 8:06pm Subject: RE: Marriot WiFi (test report, off topic) http://www.cantenna.com/ -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Sunday, January 19, 2003 4:50 AM To: tscm-l@yahoogroups.com Subject: Re: [TSCM-L] Marriot WiFi (test report, off topic) If your going to use WiFi at a hotel bring along a small 16 dBi panel antenna and a really small palm sized tripod. Convert the connector on the antenna to an SMA and connect some premium grade coaxial cable (25-30 feet is good). I have found it helpful to have a right angle SMA connector on the cable where it connects to the antenna as it keeps things neat (remember to use a torque wrench on the connection). The 16 dBi panel antenna is roughly 10*10 inches square, and you can coil the cable around the back of the housing. Only use this antenna when you can't pick up a decent signal, otherwise you risk saturating the WiFi card in your computer. Also, if your room has a microwave oven you should use a gain antenna with caution. -jma At 1:47 AM -0800 1/19/03, Mitch D wrote: >I tested the wireless network at a marriot recently,for all of >10 minutes. >After I got the access package from the front desk at a >nameless Marriot,(card, instructions,driver cd)I set my laptop >up with the 2.4 gig card and found it really difficult to >maintain an acceptable signal by holding the laptop over my >head, with the top of the card facing the top of the wall by the >room entrance(which was where I got the highest useable signal >level)I tried reflecting it,moving it and waving the whole setup >all over the room to no avail.......no wonder they keep Pringles >in the "Mini Bar" in guests rooms,as well as coat hangars in the >closet.( I didnt but I thought about it) >What sucks even worse is Marriot charges over 10 bucks a day for >this "vaporful" wifi svc....Ended up using my dial-up >anyhow......no overhead contortion neccessary...... -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- Vocatus atque non vocatus deus aderit ---------------------------------------------------------------------------- ---------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6793 From: Romeo Mabasa Date: Mon Jan 20, 2003 3:56am Subject: TSCM Survey Information Database Hi guys, I'm currently designing a database to maintain the sweep information for scheduled tasks, incidence response, and ad-hoc tasks. So what I'd like to know is the kind of information/survey questions I need to ask for the following specialists - IT consultant (computer hardware, networks) - Telecomms consultant (telephone devices, fax machines) - Building services consultant (air ducts, aircons, etc) And what kind of output would I deal with? Your help in this regard would really be appreciated. P.S any interesting information on Scanlock M2 and Delta V? -- __________________________________________________________ Sign-up for your own FREE Personalized E-mail at Mail.com http://www.mail.com/?sr=signup Meet Singles http://corp.mail.com/lavalife 6794 From: Hawkspirit Date: Tue Jan 21, 2003 11:17am Subject: Double Sweep Last week I performed a sweep where the clients phone lines were compromised with two wiretaps. One a conventional bridge tap in the phone utility closet and the other a cordless phone intercept. At the end of the inspection, the client's lawyer decided that he would have me meet with telephone company security the next morning to verify and evidence the hardwire bridge tap. The next morning when I arrived, the client had on hand a second sweep team (separate independent company) to verify my results and have them do a complete inspection to further determine there own results. This is the first time in my thirty years of sweeping that I have had a "second team verification". It shows you how careful and accurate you must be in this business and have those results prepared and provable early on. Roger Tolces Electronic Security Co. www.bugsweeps.com 6795 From: Steve Uhrig Date: Tue Jan 21, 2003 0:03pm Subject: Re: Double Sweep On 21 Jan 2003 at 9:17, Hawkspirit wrote: > Last week I performed a sweep where the clients phone lines were > compromised with two wiretaps. And at this point you stopped, did your best to secure the scene and minimize every low level stupervisor from having to stick his nose in, and reported the find to law enforcement and remained on the scene until they arrived? Took some photos and kept everyone out of the area with their big muddy boots? Made a written record of everything from the moment you walked in the door up to and including a copy of the police report? Since you uncovered evidence of a felony? And any other action could lead to a conspiracy charge? > At the end of the inspection, the client's lawyer decided that he would > have me meet with telephone company security the next morning And this lawyer indemnified you in writing to hold up in court, promising to pay any and all legal bills you incur and to take a bullet for you if someone wants to make an issue of your actions in not immediately reporting a felony? Of course you had this in hand before beginning the job, and the client acknowledged in your contract any finds immediately would be reported to law enforcement as evidence of a crime? > The next morning when I arrived, the client had on hand a second sweep > team (separate independent company) to verify my results What a difference between coasts! Here my company is called to verify finds of Jim Ross and PI $500 sweepers. The only other group who has verified one of our finds was the FBI themselves, and I felt like a kindergarten teacher. Position yourself to where you're the one verifying other's work. You're the expert, not the lowball priced novice whose work needs vetting by someone else. You're the ultimate authority. > It shows you how careful and accurate you must be in this business and > have those results prepared and provable early on. And cover your ass legally if you do find something (which by the way is extremely unusual, for the novices on the list). Look out for #1 first. No one else will look out for you. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6796 From: Andre Holmes <1ach@g...> Date: Tue Jan 21, 2003 0:25pm Subject: Re: Double Sweep Hello It does not suprise me that a Second opinion was requested. There are Sweep companies that are missing or just not using the equipment correctly to ferret out the bug. Some client knows that the bug are gathering information but cannot find a good company to do the Sweep. I have been approach on the issue that there still is a bug there. I have witnessed a Large Sweep company inside a Sac box all service to customers were halted while they did there thing then they went down the line futher to install,inspect,or remove something. Phone service was restored they left. 1 They were not the phone company 2 I saw them there 3 My phone service was temp. down 4I know the name of the company who by the way they were convicted it made World news 2 guys own the company. 5 I cannot spell the name of the company begins with a A and ends with a F or a. maybe six letters. Andre Holmes ----- Original Message ----- From: "Hawkspirit" To: "TSCM" Sent: 21 January, 2003 12:17 PM Subject: [TSCM-L] Double Sweep > Last week I performed a sweep where the clients phone lines were > compromised with two wiretaps. One a conventional bridge tap in the phone > utility closet and the other a cordless phone intercept. > At the end of the inspection, the client's lawyer decided that he would > have me meet with telephone company security the next morning to verify and > evidence the hardwire bridge tap. > The next morning when I arrived, the client had on hand a second sweep > team (separate independent company) to verify my results and have them do a > complete inspection to further determine there own results. > This is the first time in my thirty years of sweeping that I have had a > "second team verification". It shows you how careful and accurate you must > be in this business and have those results prepared and provable early on. > > Roger Tolces > Electronic Security Co. > www.bugsweeps.com > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6797 From: Fernando Martins Date: Tue Jan 21, 2003 4:46pm Subject: Re: Re: Double Sweep I find here several things as the same kind of issues as in a IT security audit or penetration test, probably it's more like a zero knowledge pen-test. When Steve says "and at this point you stopped" it's kind of familiar :> Anyway ... one even being the best technician in the business, can step in some nasty legal problems, and the best way to avoid those is a very well made contract (=with a very good lawyer/law department at your side), that can clarify EVERY (and 10 more ....) possible grey issues. About the secound team ... also sometimes if one did his job well and found problems, sometimes a secound team that for sure will not find anything is needed ... yeah, such is life! the novice 20cents ;) FM ----- Original Message ----- From: "Steve Uhrig" To: Sent: Tuesday, January 21, 2003 6:03 PM Subject: [TSCM-L] Re: Double Sweep > On 21 Jan 2003 at 9:17, Hawkspirit wrote: > > > Last week I performed a sweep where the clients phone lines were > > compromised with two wiretaps. > > And at this point you stopped, did your best to secure the scene and > minimize every low level stupervisor from having to stick his nose > in, and reported the find to law enforcement and remained on the > scene until they arrived? Took some photos and kept everyone out of > the area with their big muddy boots? Made a written record of > everything from the moment you walked in the door up to and including > a copy of the police report? > > Since you uncovered evidence of a felony? > > And any other action could lead to a conspiracy charge? > > > At the end of the inspection, the client's lawyer decided that he would > > have me meet with telephone company security the next morning > > And this lawyer indemnified you in writing to hold up in court, > promising to pay any and all legal bills you incur and to take a > bullet for you if someone wants to make an issue of your actions in > not immediately reporting a felony? > > Of course you had this in hand before beginning the job, and the > client acknowledged in your contract any finds immediately would be > reported to law enforcement as evidence of a crime? > > > The next morning when I arrived, the client had on hand a second sweep > > team (separate independent company) to verify my results > > What a difference between coasts! > > Here my company is called to verify finds of Jim Ross and PI $500 > sweepers. The only other group who has verified one of our finds was > the FBI themselves, and I felt like a kindergarten teacher. > > Position yourself to where you're the one verifying other's work. > You're the expert, not the lowball priced novice whose work needs > vetting by someone else. You're the ultimate authority. > > > It shows you how careful and accurate you must be in this business and > > have those results prepared and provable early on. > > And cover your ass legally if you do find something (which by the way > is extremely unusual, for the novices on the list). Look out for #1 > first. No one else will look out for you. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6798 From: Matt Paulsen Date: Tue Jan 21, 2003 8:25pm Subject: RE: Re: Double Sweep The 2nd team should have been around from the beginning, and suggested by the 1st team as a 2ndary validation for independant verification. -----Original Message----- From: Fernando Martins [mailto:fernando.martins@e...] Sent: Tuesday, January 21, 2003 2:47 PM To: tscm-l@yahoogroups.com Subject: Re: [TSCM-L] Re: Double Sweep I find here several things as the same kind of issues as in a IT security audit or penetration test, probably it's more like a zero knowledge pen-test. When Steve says "and at this point you stopped" it's kind of familiar :> Anyway ... one even being the best technician in the business, can step in some nasty legal problems, and the best way to avoid those is a very well made contract (=with a very good lawyer/law department at your side), that can clarify EVERY (and 10 more ....) possible grey issues. About the secound team ... also sometimes if one did his job well and found problems, sometimes a secound team that for sure will not find anything is needed ... yeah, such is life! the novice 20cents ;) FM ----- Original Message ----- From: "Steve Uhrig" To: Sent: Tuesday, January 21, 2003 6:03 PM Subject: [TSCM-L] Re: Double Sweep > On 21 Jan 2003 at 9:17, Hawkspirit wrote: > > > Last week I performed a sweep where the clients phone lines were > > compromised with two wiretaps. > > And at this point you stopped, did your best to secure the scene and > minimize every low level stupervisor from having to stick his nose > in, and reported the find to law enforcement and remained on the > scene until they arrived? Took some photos and kept everyone out of > the area with their big muddy boots? Made a written record of > everything from the moment you walked in the door up to and including > a copy of the police report? > > Since you uncovered evidence of a felony? > > And any other action could lead to a conspiracy charge? > > > At the end of the inspection, the client's lawyer decided that he would > > have me meet with telephone company security the next morning > > And this lawyer indemnified you in writing to hold up in court, > promising to pay any and all legal bills you incur and to take a > bullet for you if someone wants to make an issue of your actions in > not immediately reporting a felony? > > Of course you had this in hand before beginning the job, and the > client acknowledged in your contract any finds immediately would be > reported to law enforcement as evidence of a crime? > > > The next morning when I arrived, the client had on hand a second sweep > > team (separate independent company) to verify my results > > What a difference between coasts! > > Here my company is called to verify finds of Jim Ross and PI $500 > sweepers. The only other group who has verified one of our finds was > the FBI themselves, and I felt like a kindergarten teacher. > > Position yourself to where you're the one verifying other's work. > You're the expert, not the lowball priced novice whose work needs > vetting by someone else. You're the ultimate authority. > > > It shows you how careful and accurate you must be in this business and > > have those results prepared and provable early on. > > And cover your ass legally if you do find something (which by the way > is extremely unusual, for the novices on the list). Look out for #1 > first. No one else will look out for you. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6799 From: Keith Ray Date: Tue Jan 21, 2003 10:54am Subject: RE: Rx powered when cell phone off Quoting George Shaw : > Out of curiosity tonight I took apart a Nokia 3210e (Orange) powered > down and took readings across the range on the Rx side of the circuits > and YES it is powered even when the "switch" is off. I am running > further tests now to see what exactly it is capable of receiving but all > indications are that it can indeed Rx when in "off" mode which really is > a standby mode I guess. I have several other phones here I can hack this > week. Now if Nokia are doing it I guess the others are as well, whether > its in the spec or not. I was going through some of the old TSCM-L archives and ran across this post from last May. Was there ever any more information regarding the ability of cell phones to be remotely programmed/operated even though in the off mode? -- Keith Ray -- OpenPGP Key: 0x79269A12 6800 From: kondrak Date: Wed Jan 22, 2003 0:42pm Subject: Re: RE: Rx powered when cell phone off Yes, sprint can do this here (US), and can make the cphone into a bug from remote. The obvious disadvantage is battery life. You turn on the transmitter, and battery life goes real fast. It takes a software load from the switch, and it can be done without any customer knowledge, no lights or any indication the phone transmitting. Readings on the contacts doesn't necessarily mean the phone is compromised. Most all phones show a small amount of current being drawn, even when off. Memories need to be held, dialing lists etc, which are almost always eprom stored. The only reliable method of securing the phone, IMHO is removal of the battery. At 10:54 1/21/03 -0600, you wrote: >Quoting George Shaw : > > > Out of curiosity tonight I took apart a Nokia 3210e (Orange) powered > > down and took readings across the range on the Rx side of the circuits > > and YES it is powered even when the "switch" is off. I am running > > further tests now to see what exactly it is capable of receiving but all > > indications are that it can indeed Rx when in "off" mode which really is > > a standby mode I guess. I have several other phones here I can hack this > > week. Now if Nokia are doing it I guess the others are as well, whether > > its in the spec or not. > >I was going through some of the old TSCM-L archives and ran across this post >from last May. Was there ever any more information regarding the ability of >cell phones to be remotely programmed/operated even though in the off mode? > > -- >Keith Ray -- OpenPGP Key: 0x79269A12 > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6801 From: James M. Atkinson Date: Wed Jan 22, 2003 7:24pm Subject: THEN and NOW THEN and NOW 1972: Long hair 2002: Longing for hair 1972: KEG 2002: EKG 1972: Acid rock 2002: Acid reflux 1972: Moving to California because it's cool 2002: Moving to California because it's warm 1972: Trying to look like Marlin Brando or Liz Taylor 2002: Trying NOT to look like Marlin Brando or Liz Taylor 1972: Hoping for a BMW 2002: Hoping for a BM 1972: The Grateful Dead 2002: Dr. Kevorkian 1972: Going to a new, hip joint 2002: Receiving a new hip joint 1972: Rolling Stones 2002: Kidney Stones 1972: Being called into the principal's office 2002: Calling the principal's office 1972: Screw the system 2002: Upgrade the system &! nbsp;1972: Disco 2002: Costco 1972: Parents begging you to get your hair cut 2002: Children begging you to get their heads shaved 1972: Passing the drivers' test 2002: Passing the vision test 1972: Whatever 2002: Depends Just in case you weren't feeling too old today, this will certainly change things: The people who are starting college this fall across the nation were born in 1983. They are too young to remember the space shuttle blowing up. Their lifetime has always included AIDS. Bottle caps have always been screw off and plastic. The CD was introduced the year they were born. They have always had an answering machine. They have always had cable. They cannot fathom not having a remote control. Jay Leno has always been on the Tonight Show. Popcorn has always been cooked in the microwave. They never took a swim and thought about Jaws. They can't imagine what hard contact lenses are. They don't know who Mork was or where he was from. They never heard: "Where's the Beef?", "I'd walk a mile for a Camel," or "de plane Boss, de plane." They do not care who shot J. R. and have no idea who J. R. even is. Michael Jackson has always been white. McDonald's never came in Styrofoam containers. They don't have a clue how to use a typewriter. Do you feel old yet? Pass this on to the other old fogies in your life. The statistics on sanity are that one out of every four is suffering from some form of mental illness. Think of your three best friends. If they're okay, then it's you. Have a good day! -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6802 From: Charles P. Date: Wed Jan 22, 2003 9:24pm Subject: Re: THEN and NOW Signs of age. A friend of mine who installs hi-end home theater systems asked me if I would help him set up and program the phone system at Paul Simon's new house in CT (the singer, not the politician). My 18 year old son came along to lend a hand. His question: "who's Paul Simon?" sigh Charles ----- Original Message ----- From: "James M. Atkinson" To: "TSCM-L Mailing List" Sent: Wednesday, January 22, 2003 8:24 PM Subject: [TSCM-L] THEN and NOW > > THEN and NOW > > 1972: Long hair > 2002: Longing for hair > > 1972: KEG > 2002: EKG > > 1972: Acid rock > 2002: Acid reflux > > 1972: Moving to California because it's cool > 2002: Moving to California because it's warm > > 1972: Trying to look like Marlin Brando or Liz Taylor > 2002: Trying NOT to look like Marlin Brando or Liz Taylor > > 1972: Hoping for a BMW > 2002: Hoping for a BM > > 1972: The Grateful Dead > 2002: Dr. Kevorkian > > 1972: Going to a new, hip joint > 2002: Receiving a new hip joint > > 1972: Rolling Stones > 2002: Kidney Stones > > 1972: Being called into the principal's office > 2002: Calling the principal's office > > 1972: Screw the system > 2002: Upgrade the system > > &! nbsp;1972: Disco > 2002: Costco > > 1972: Parents begging you to get your hair cut > 2002: Children begging you to get their heads shaved > > 1972: Passing the drivers' test > 2002: Passing the vision test > > 1972: Whatever > 2002: Depends > > Just in case you weren't feeling too old today, this will certainly > change things: > > The people who are starting college this fall across the nation were > born in 1983. > > They are too young to remember the space shuttle blowing up. > > Their lifetime has always included AIDS. > > Bottle caps have always been screw off and plastic. > > The CD was introduced the year they were born. > > They have always had an answering machine. > > They have always had cable. > > They cannot fathom not having a remote control. > > Jay Leno has always been on the Tonight Show. > > Popcorn has always been cooked in the microwave. > > They never took a swim and thought about Jaws. > > They can't imagine what hard contact lenses are. > > They don't know who Mork was or where he was from. > > They never heard: "Where's the Beef?", "I'd walk a mile for a > Camel," or "de plane > Boss, de plane." > > They do not care who shot J. R. and have no idea who J. R. even is. > > Michael Jackson has always been white. > > McDonald's never came in Styrofoam containers. > > They don't have a clue how to use a typewriter. > > Do you feel old yet? > Pass this on to the other old fogies in your life. > > The statistics on sanity are that one out of every four is suffering > from some form of > mental illness. > > Think of your three best friends. If they're okay, then it's you. > > Have a good day! > -- > > -------------------------------------------------------------------------- ------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------- ------------------------ > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > -------------------------------------------------------------------------- ------------------------ > Vocatus atque non vocatus deus aderit > -------------------------------------------------------------------------- ------------------------ > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 6803 From: Steve Uhrig Date: Wed Jan 22, 2003 10:03pm Subject: Growth of American Surveillance The sky apparently is falling. And has been for as long as I can remember. http://www.wired.com/news/politics/0,1283,57226,00.html http://zdnet.com.com/2100-1105-980964.html We're all doomed. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6804 From: Matt Paulsen Date: Wed Jan 22, 2003 10:42pm Subject: RE: THEN and NOW Here's one - About 10 years ago, a cub scout here in Portland didn't know how to use the rotary phone in the local church to call his mother to pick him up. He had to come back, get a 'grown up' to show him how to use it... no buttons... sigh... -----Original Message----- From: Charles P. [mailto:charles@t...] Sent: Wednesday, January 22, 2003 7:25 PM To: James M. Atkinson; TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] THEN and NOW Signs of age. A friend of mine who installs hi-end home theater systems asked me if I would help him set up and program the phone system at Paul Simon's new house in CT (the singer, not the politician). My 18 year old son came along to lend a hand. His question: "who's Paul Simon?" sigh Charles ----- Original Message ----- From: "James M. Atkinson" To: "TSCM-L Mailing List" Sent: Wednesday, January 22, 2003 8:24 PM Subject: [TSCM-L] THEN and NOW > > THEN and NOW > > 1972: Long hair > 2002: Longing for hair > > 1972: KEG > 2002: EKG > > 1972: Acid rock > 2002: Acid reflux > > 1972: Moving to California because it's cool > 2002: Moving to California because it's warm > > 1972: Trying to look like Marlin Brando or Liz Taylor > 2002: Trying NOT to look like Marlin Brando or Liz Taylor > > 1972: Hoping for a BMW > 2002: Hoping for a BM > > 1972: The Grateful Dead > 2002: Dr. Kevorkian > > 1972: Going to a new, hip joint > 2002: Receiving a new hip joint > > 1972: Rolling Stones > 2002: Kidney Stones > > 1972: Being called into the principal's office > 2002: Calling the principal's office > > 1972: Screw the system > 2002: Upgrade the system > > &! nbsp;1972: Disco > 2002: Costco > > 1972: Parents begging you to get your hair cut > 2002: Children begging you to get their heads shaved > > 1972: Passing the drivers' test > 2002: Passing the vision test > > 1972: Whatever > 2002: Depends > > Just in case you weren't feeling too old today, this will certainly > change things: > > The people who are starting college this fall across the nation were > born in 1983. > > They are too young to remember the space shuttle blowing up. > > Their lifetime has always included AIDS. > > Bottle caps have always been screw off and plastic. > > The CD was introduced the year they were born. > > They have always had an answering machine. > > They have always had cable. > > They cannot fathom not having a remote control. > > Jay Leno has always been on the Tonight Show. > > Popcorn has always been cooked in the microwave. > > They never took a swim and thought about Jaws. > > They can't imagine what hard contact lenses are. > > They don't know who Mork was or where he was from. > > They never heard: "Where's the Beef?", "I'd walk a mile for a > Camel," or "de plane > Boss, de plane." > > They do not care who shot J. R. and have no idea who J. R. even is. > > Michael Jackson has always been white. > > McDonald's never came in Styrofoam containers. > > They don't have a clue how to use a typewriter. > > Do you feel old yet? > Pass this on to the other old fogies in your life. > > The statistics on sanity are that one out of every four is suffering > from some form of > mental illness. > > Think of your three best friends. If they're okay, then it's you. > > Have a good day! > -- > > -------------------------------------------------------------------------- ------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------- ------------------------ > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > -------------------------------------------------------------------------- ------------------------ > Vocatus atque non vocatus deus aderit > -------------------------------------------------------------------------- ------------------------ > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6805 From: Matt Paulsen Date: Thu Jan 23, 2003 0:25am Subject: RE: Growth of American Surveillance Ask me again in 50 years Mr. Yakamoto. Agency: Department of the Air Force Office: Air Force Materiel Command Location: ESC - Electronic Systems Center Posted: January 22, 2003 Type: RFP Program Files Title: 63--Force Protection Integrated Base Defense Security System SOL: R485 Agency: Department of the Army Office: Army Contracting Activity, North Region Location: ACA, White Sands Missile Range Posted: January 21, 2003 Type: Synopsis Title: 35--SUBJECT: THE OFFICE OF NATIONAL DRUG CONTROL POLICY, COUNTERDRUG TECHNOLOGY ASSESSMENT CENTER IS SEEKING STATE-OF-THE-ART COUNTERDRUG EQUIPMENT FOR DISTRIBUTION TO STATE AND LOCAL LAW ENFORCEMENT AGENCIES. SOL: DABJ47-03-R-ONDCP Agency: Department of the Treasury Office: Bureau of Alcohol, Tobacco and Firearms (ATF) Location: Acquisition and Property Management Division Posted: January 16, 2003 Type: Synopsis Title: 58 -- Long Haul Video Systems SOL: Reference-Number-LHVideo1 January 08, 2003 Agency: Department of Commerce Office: National Institute of Standards and Technology (NIST) Location: Acquisition and Logistics Division Posted: January 08, 2003 Type: Synopsis Title: X -- Biometric Consortium SOL: Reference-Number-03-346-2027 November 05, 2002 Agency: Department of Justice Office: Immigration & Naturalization Service Location: Headquarter's Procurement Division Posted: November 05, 2002 Type: Modification 1 Title: 70 -- Entry Exit System SOL: COW-2-R-0056 June 20, 2002 Agency: Department of Transportation Office: Research and Special Programs Administration (RSPA) Location: Research and Special Programs Administration HQ Posted: June 20, 2002 Type: Synopsis Title: A -- Transportation Worker Identification Credential (TWIC) System SOL: DTRS56-02-BAA-0005 May 29, 2002 Agency: Department of Health and Human Services Office: National Institutes of Health Location: National Library of Medicine Posted: May 29, 2002 Type: Amendment Title: A -- Application of Advanced Network Infrastructure in Health and Disaster Management SOL: BAA-RFP-NLM-02-103-VMS April 03, 2002 Agency: Department of Health and Human Services Office: National Institutes of Health Location: National Library of Medicine Posted: April 03, 2002 Type: Solicitation Title: A -- Application of Advanced Network Infrastructure in Health and Disaster Management SOL: BAA-RFP-NLM-02-103-VMS March 21, 2002 Agency: Other Defense Agencies Office: Defense Advanced Research Projects Agency Location: Contracts Management Office Posted: March 21, 2002 Type: Solicitation Title: A -- INFORMATION AWARENESS SOL: BAA02-08 Posted: March 21, 2002 Type: Synopsis Title: A -- INFORMATION AWARENESS SOL: BAA02-08 March 08, 2002 Agency: Department of Health and Human Services Office: National Institutes of Health Location: National Library of Medicine Posted: March 08, 2002 Type: Synopsis Title: A -- Application of Advanced Network Infrastructure in Health and Disaster Management SOL: BAA-RFP-NLM-02-103-VMS August 09, 2001 Agency: Department of Justice Office: Drug Enforcement Administration Location: Office of Acquisition Management Posted: August 09, 2001 Type: Synopsis Title: A -- Live-scan ultrasound imaging system SOL: DEA-01-R-0004 October 24, 2000 Agency: Department of the Air Force Office: Air Force Materiel Command Location: ESC - Electronic Systems Center Posted: October 24, 2000 Type: Synopsis Title: 63--Alarm, Signal; Security Detection Equipment SOL: R122 Posted: October 24, 2000 Type: Other Files Title: 63--Alarm, Signal; Security Detection Equipment SOL: R122 -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Wednesday, January 22, 2003 8:04 PM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Growth of American Surveillance The sky apparently is falling. And has been for as long as I can remember. http://www.wired.com/news/politics/0,1283,57226,00.html http://zdnet.com.com/2100-1105-980964.html We're all doomed. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6806 From: Ocean Group Date: Wed Jan 22, 2003 9:13am Subject: 2nd Sweep et al..... > At the end of the inspection, the client's lawyer decided that he would > have me meet with telephone company security the next morning And this lawyer indemnified you in writing to hold up in court, promising to pay any and all legal bills you incur and to take a bullet for you if someone wants to make an issue of your actions in not immediately reporting a felony? ## Is it your duty of care to report it to the Police or the telephone company.....if your duty of care is to report it to the telephone company for verification then surely it would be the phone company's duty of care to report it to the police.....Am I right? Of course you had this in hand before beginning the job, and the client acknowledged in your contract any finds immediately would be reported to law enforcement as evidence of a crime? ## Surely if the client said that he/she would report the find then the court would accept that you made a fair assumption that he would unless there was evidence to show that you knew the client was acting in bad fate....???! Here my company is called to verify finds of Jim Ross and PI $500 sweepers. The only other group who has verified one of our finds was the FBI themselves, and I felt like a kindergarten teacher. ## Ross Engineering right? Wait aren't they supposed to be respected professionals....why would their work usually need to be verified....? Position yourself to where you're the one verifying other's work. You're the expert, not the lowball priced novice whose work needs vetting by someone else. You're the ultimate authority. ## Well either way...people are human....if you make a mistake you shouldn't be shot for it....I'm sure pro's miss things from time to time....it's ok for a client to get a 2nd opinion...people do it with doctors all the time....a decent thing to do would be to inform the first specialist that you will be automatically getting a second opinion....that way they know and won't feel untrusted. And cover your ass legally if you do find something (which by the way is extremely unusual, for the novices on the list). Look out for #1 first. No one else will look out for you. ## I was just curious about some of the legal points raised here(at least the american side)....Here if you find something for a corporate company(depending on who they are) they may just ask you to keep the find confidential.....legally I'm not sure what your duty of care is in the Irish courts....I'll ring a lawyer and find out and post it up later...however if your goverment contracted...well lets just say it's slightly different reaction.... However any PI that got into that situation would simply claim ignorance...."Your honour I didn't have a f**kin clue what that little box was...I thought it was a on hold music generator.....I swear.... What? Why did I tell the client I thought it was a bug?.....For the cash....Duh!" Note: Thats not a reflection of any PI's professionalism or integrity. Just in case anyone gets mad....its just that here the people that sweep are PI's. There are some guy's from the UK on the list so I'd be interested to know what the situation is in the UK courts....? Cheers Vance Deran Ocean Group, Technical Security Division, Ireland. 6807 From: Ocean Group Date: Wed Jan 22, 2003 2:21pm Subject: 2nd sweeper.... I had a chat with a lawyer friend and she informed me that the specialist would not be charged as an accessory because the planting of the bug was not a joint enterprise between the specialist and the 3rd party(the bugger,em shall we say the bug planter.). The specialist would also have no reason to suspect that the client was acting in bad fate(unless he did) etc etc and it does not make the specialist liable by assuming that the client would report it. However interesting enough, she said that should the client keep the bug and "use" it, for any incrimination, the information would be naturally enough inadmissable but the specialist could be very well charged for accessory to the fact. So the moral of the story is, if you find a bug, a- to not give it to the client unless he is totally trustworthy or b- disable etc take reasonable precautions etc..... This is the situation as regards the Irish courts however I'd assume it's a pretty standard issue. All the best, Vance Deran Ocean Group, Technical Security Division, Ireland. 6808 From: Craig Snedden Date: Thu Jan 23, 2003 9:52am Subject: RE: 2nd sweeper....Long Post. My apologies My apologies in advance for the length of this posting. Got carried away with myself. :~ (sheepish smile) To follow up Vance's post, I believe the situation in the UK criminal justice system would be different in as much as; 1. Ownership and possession of a transmitting device of any type is not a crime within mainland UK. Unauthorised transmission or reception of RF emissions is.... 2. The connection of any type of device (which would include a simple parallel connection to a "speaker") to the "private" side of a telecommunications system (PBX) (or single line) is not "normally" a criminal offence (however there are lots of potholes with the Data Protection Act which fall into place at this point - a minefield which for the purposes of this discussion I shall ignore.). The principal exception being any device which might be deemed to cause "damage or disruption to the public telephone system - i.e. the carrier network. This would be a point for the courts to decide. 3. The connection of any device to the "private" side of a PBX (or single line) can only be done with the knowledge and consent of the system owner (usually whoever pays the phonebill). So...... What does all that mean? Scenario 1. If a "stand alone" (mic & tx) transmitter was discovered on the premises of a client which had been planted by a third party then the client is not the person responsible for either the tx or rx of any signal. Is he/she expected to know if the person who planted it has the necessary licence? Likewise, is the specialist expected to know if the buggist has the necessary licence? In law, no: Therefore, no trouble to the client if he leaves the device in situ. If he left it in situ and later reported it to the authorities, only the buggist (or any person found to be listening to the tx freq) not having the required authority to tx/rx on that freq (emission type, power etc.) would face any criminal charge. Scenario 2. If the specialist discovers a device connected to the "private" side of the telephone system and brings it to the attention of the system owner, then the call is with the system owner to decide whether to advise any responsible authority. If the device is left and later found to be a "hazard" to the public network, then the system owner, being knowledgeable about it's presence, would possibly be liable, as would be the buggist if caught. Scenario 3. A device having been found on the public network side should be reported firstly to the network provider. (They will take a dim view of anyone, TSCM "professional" or not, being anywhere near thier equipment). Omission to report may result in someone being pursued for having "endangered the integrity of the network". However, who that someone might be is another question. Certainly the buggist if caught. Possibly the system owner if he sanctioned the device to remain in situ. (reason being that you are engaged by the client and are acting at his direction. So long as you make it clear (in writing) that your advice is to inform the network operator asap, then the courts would have to take the view that you are not acting "in concert" with any other person and therefore have no responsibility for breaking any applicable law).... Clear...? No I thought not. Interestingly, this follows from Vance's point that to leave the "bug" in situ and use it as corroboration then any material gained from it would be inadmissable as evidence since it was obtained from an illegal source. Here in the UK, that approach would really depend on whether the "bug" was deemed to be "illegal" in the first place...... Certainly the unlicensed rx of any signal tx by the device would be illegal. But, would the feeding of "chicken feed" into such a bug and seeing who reacted to it be classed as an illegal transmission...? It might be argued not, since I did not switch the transmitter on and cause it to actually tx (it was the buggist) ("A big boy did it and ran away..!!"). Another might argue that it is illegal, since they might argue that I should, as a TSCM "professional" be aware that the tx from such a device is likely to be illegal and should therefore have taken steps to switch it off..... My defence to that one being that I did not know if the device was legal or not and therefore left it on in an effort to trace it's ownership. It might have belonged to the Security Services for all I knew....... Anyone know any UK caselaw on this? I can't find any right now. In truth, reporting such an incident to the police here would most likely be met with a blank stare and little if no response. The telecomms would certainly respond (mostly by just removing the object from the network). :-) Craig -----Original Message----- From: Ocean Group [mailto:inertia@o...] Sent: 22 January 2003 20:21 To: TSCM Group Subject: [TSCM-L] 2nd sweeper.... I had a chat with a lawyer friend and she informed me that the specialist would not be charged as an accessory because the planting of the bug was not a joint enterprise between the specialist and the 3rd party(the bugger,em shall we say the bug planter.). The specialist would also have no reason to suspect that the client was acting in bad fate(unless he did) etc etc and it does not make the specialist liable by assuming that the client would report it. However interesting enough, she said that should the client keep the bug and "use" it, for any incrimination, the information would be naturally enough inadmissable but the specialist could be very well charged for accessory to the fact. So the moral of the story is, if you find a bug, a- to not give it to the client unless he is totally trustworthy or b- disable etc take reasonable precautions etc..... This is the situation as regards the Irish courts however I'd assume it's a pretty standard issue. All the best, Vance Deran Ocean Group, Technical Security Division, Ireland. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6809 From: James M. Atkinson Date: Thu Jan 23, 2003 0:42pm Subject: Re: 2nd sweeper.... Vance, It rather depends on the laws of the area you are in, and you should always seek legal advice from a competent and honest attorney (most are neither). I know that here in the United States if a sweeper finds a bug the only option is to immediately secure the scene, and document as much as he can prior to law enforcement arriving. Failure to do so can lead to the sweeper being charged as being an accessory to the crime, and of obstructing justice. Now if the detective (not a PI, a real cop) feels that it would be prudent to feed it false information and to draw the spy out then that's one thing, but neither the sweeper, or the client should try to do this by themselves. If you find a bug the proper thing to do is to, DOCUMENT, SECURE, NOTIFY, ASSIST. -jma At 8:21 PM +0000 1/22/03, Ocean Group wrote: >I had a chat with a lawyer friend and she informed me that the specialist >would not be charged as an accessory because the planting of the bug was not >a joint enterprise between the specialist and the 3rd party(the bugger,em >shall we say the bug planter.). The specialist would also have no reason to >suspect that the client was acting in bad fate(unless he did) etc etc and it >does not make the specialist liable by assuming that the client would report >it. > >However interesting enough, she said that should the client keep the bug and >"use" it, for any incrimination, the information would be naturally enough >inadmissable but the specialist could be very well charged for accessory to >the fact. So the moral of the story is, if you find a bug, a- to not give it >to the client unless he is totally trustworthy or b- disable etc take >reasonable precautions etc..... > > >This is the situation as regards the Irish courts however I'd assume it's a >pretty standard issue. > >All the best, > >Vance Deran > >Ocean Group, >Technical Security Division, >Ireland. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6810 From: James M. Atkinson Date: Thu Jan 23, 2003 3:49pm Subject: THE YEAR'S WORST [ACTUAL] HEADLINES OF 2002 THE YEAR'S WORST [ACTUAL] HEADLINES OF 2002 Something Went Wrong in Jet Crash, Expert Says Police Begin Campaign to Run Down Jaywalkers Iraqi Head Seeks Arms Is There a Ring of Debris around Uranus? Prostitutes Appeal to Pope Panda Mating Fails; Veterinarian Takes Over Teacher Strikes Idle Kids Miners Refuse to Work after Death Juvenile Court to Try Shooting Defendant War Dims Hope for Peace If Strike Isn't Settled Quickly, It May Last Awhile Cold Wave Linked to Temperatures Enfield (London) Couple Slain; Police Suspect Homicide Red Tape Holds Up New Bridges Typhoon Rips Through Cemetery; Hundreds Dead Man Struck By Lightning Faces Battery Charge New Study of Obesity Looks for Larger Test Group Astronaut Takes Blame for Gas in Spacecraft Kids Make Nutritious Snacks Chef Throws His Heart into Helping Feed Needy Local High School Dropouts Cut in Half Hospitals are Sued by 7 Foot Doctors -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6811 From: James M. Atkinson Date: Thu Jan 23, 2003 4:03pm Subject: SOUTHERNISMS Actually, these are country southernisms. City folk spoke differently, but knew the sayings anyway. SOUTHERNISMS 1.) Only a true Southerner knows the difference between a "hissie fit" and a "conniption", and that you don't "HAVE" them, -- you "PITCH" them. 2.) Only a true Southerner knows how many fish, collard greens, turnip greens, peas, beans, etc. make up "a mess." 3.) Only a true Southerner can show or point out to you the general direction of "yonder." 4.) Only a true Southerner knows exactly how long "directly" is - as in: "Going to town, be back directly." 5.) All true Southerners, even babies, know that "Gimme some sugar" is not a request for the white, granular sweet substance that sits in a pretty little bowl on the middle of the table. 6.) All true Southerners know exactly when "by and by" is. They might not use the term, but they know the concept well. 7.) Only a true Southerner knows instinctively that the best gesture of solace for a neighbor who's got trouble is a plate of hot fried chicken and a big bowl of cold potato salad. (If the neighbor's trouble is a real crisis, they also know to add a large banana puddin'!) 8.) Only true Southerners grow up knowing the difference between "right near" and "a right far piece." They also know that "just down the road" can be 1 mile or 20. 9.) Only a true Southerner both knows and understands the difference between a redneck, a good ol' boy, and po' white trash. 10.) No true Southerner would ever assume that the car with the flashing turn signal is actually going to make a turn. 11.) A true Southerner knows that "fixin'" can be used as a noun, a verb, or an adverb. 12.) Only a true Southerner knows that the term "booger" can be a resident of the nose, a descriptive, as in "that ol' booger," a first name or something that jumps out at you in the dark and scares you senseless. 13.) Only true Southerners make friends while standing in lines. We don't do "queues", we do "lines," and when we're "in line," we talk to everybody! 14.) Put 100 true Southerners in a room and half of them will discover they're related, even if only by marriage. 15.) True Southerners never refer to one person as "y'all." 16.) True Southerners know grits come from corn and how to eat them. 17.) Every true Southerner knows tomatoes with eggs, bacon, grits, and coffee are perfectly wonderful; that redeye gravy is also a breakfast food; and that fried green tomatoes are not a breakfast food. 18.) When you hear someone say, "Well, I caught myself lookin' .. , " you know you are in the presence of a genuine Southerner! 19.) Only true Southerners say "sweet tea" and "sweet milk." Sweet tea indicates the need for sugar and lots of it - we do not like our tea unsweetened. "Sweet milk" means you don't want buttermilk. 20.) And a true Southerner knows you don't scream obscenities at little old ladies who drive 30 MPH on the freeway. You just say, "Bless her heart" and go your own way -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6812 From: James M. Atkinson Date: Thu Jan 23, 2003 4:18pm Subject: Exciting Historical information you need to know about shipping Manure via Nick Baldwin: Exciting Historical information you need to know about shipping Manure: In the 16th and 17th centuries, everything had to be transported by ship. It was also before commercial fertilizer's invention, so large shipments of manure were common. It was shipped dry, because in dry form it weighed a lot less than when wet, but once water (at sea) hit it, it not only became heavier, but the process of fermentation began again, of which a by-product is methane gas. As the stuff was stored below decks in bundles you can see what could (and did) happen. Methane began to build up below decks and the first time someone came below at night with a lantern, BOOOOM! Several ships were destroyed in this manner before it was determined just what was happening. After that, the bundles of manure were always stamped with the term "Ship High In Transit" on them which meant for the sailors to stow it high enough off the lower decks so that any water that came into the hold would not touch this volatile cargo and start the production of methane. Thus evolved the term "S.H.I.T," which has come down through the centuries and is in use to this very day. You probably did not know the true history of this word. Neither did I. I always thought it was a golf term. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- From: James M. Atkinson Date: Sun Jan 18, 2004 0:39pm Subject: Taiwanese Businessmen Admit Spying In China - Report http://framehosting.dowjonesnews.com/sample/samplestory.asp?StoryID=2004011605300012&Take=1 16 Jan 2004 05:30 GMT DJ Taiwanese Businessmen Admit Spying In China - Report TAIPEI (AP)--Two Taiwanese businessmen arrested in China last month on espionage charges admitted in interviews Friday that they were spies for Taiwan, cable television stations reported. The suspects said that Taiwanese intelligence agents recruited them after their businesses in China began to fail, Taiwan's TVBS, ETTV and CTI stations reported. The men said agents paid them 40,000 New Taiwan dollars (US$1=NT$33.683) a month, the reports said. The men - identified as Chang Keng-huan and Wang Chang-yung - were on a list issued by China this week that included seven alleged Taiwanese spies arrested last month, the cable stations reported. The TV reports didn't say what kind of information the men allegedly collected. TVBS said the Chinese government arranged the interviews at the Fuzhou No. 2 Detention Center in the southeastern province of Fujian. Taiwanese officials didn't immediately comment on the reports. But they have denied that the two men were spies, and have demanded that China provide evidence. Even if the men were spies, it's unlikely that Taiwan would confirm their activities. Relations have been tense between Taiwan and China since they split during a civil war in 1949. The rivals frequently accuse each other of spying, and the two governments don't have official ties. Although China-Taiwan political relations are frosty, trade ties are booming. More than 500,000 Taiwanese are in China doing business. Many of them run factories that benefit from China's cheap labor. The spy suspects said they originally went to China to do business in Fujian, directly across from Taiwan, TVBS reported. CTI said the men were emotional and at one point began crying. ETTV said they were homesick and wanted to tell their families that they are fine and not to worry. -Edited by Nick vonKlock (END) Dow Jones Newswires January 16, 2004 00:30 ET (05:30 GMT) ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8165 From: James M. Atkinson Date: Sun Jan 18, 2004 1:07pm Subject: FBI gets new acting CIO from Justice http://www.gcn.com/vol1_no1/daily-updates/24650-1.html 01/16/04 FBI gets new acting CIO from Justice By Wilson P. Dizard III GCN Staff FBI director Robert S. Mueller III has appointed Zalmai Azmi as the bureau's acting CIO. Azmi succeeds Wilson Lowery, the bureau's executive assistant director for administration, who had been acting CIO until Mueller announced Azmi's appointment Dec. 30. Azmi formerly was CIO of the Executive Office for U.S. Attorneys in the Justice Department, a bureau spokesman confirmed. Mueller also appointed Stephen Schmidt, former chief of the FBI Cyberdivision's special technologies and applications section, as the bureau 's acting chief technology officer. Schmidt succeeds Justin Lindsey, who moved to Justice as chief technology officer. Azmi "will be responsible for the FBI's overall information technology efforts, including developing IT strategy and planning operating budgets," a spokesman said. His other responsibilities include developing and maintaining the FBI's technology assets and providing technical direction for re-engineering, the memo said. At Justice, Azmi was responsible for telecommunications as well as information systems and security for U.S. attorney offices at more than 250 sites. During his three years at Justice, Azmi led development of several IT projects including the Victim Notification System and the National Legal Information On-Line System, which acts in concert with the department's Enterprise Case Management System. Sources inside and outside the bureau noted that Mueller himself has been a U.S. attorney and likely knew Azmi well during his tenure at Justice. In addition, both Mueller and Azmi are Marine Corps veterans, though Azmi served from 1984 to 1990, long after Mueller's Vietnam-era hitch. "It is good news not to have these chairs empty," a bureau IT official said, adding that Azmi has not yet announced any sweeping changes. One of Azmi's early actions was to approve the start of the so-called Build Four of the department's Trilogy system for managing bureau data. Trilogy comprises five builds; Build Four involves deploying additional servers, routers and other hardware, the bureau official said. ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8166 From: James M. Atkinson Date: Sun Jan 18, 2004 1:13pm Subject: The FBI versus reality http://www.tricityherald.com/24hour/opinions/story/1121021p-7798050c.html DAN K. THOMASSON: The FBI versus reality This story was published Thursday, January 15th, 2004 Scripps Howard News Service (SH) - Clearly Hollywood hasn't caught up with the new FBI, and it may be adding to the public's perception that instead of practicing the highly refined art of counterintelligence, the bureau is doing business as usual - chasing the garden-variety bad person. And if that is the perception, FBI Director Robert Mueller told reporters, it is erroneous. After all, his much-maligned organization can't be blamed for the misconceptions of three current television shows depicting the bureau doing everything but hunting down al Qaeda and the rest of the terrorists who have disrupted life since 9/11. Almost 2-1/2 years out from that fateful day, Mueller says, nearly 50 percent of the FBI's 12,000-agent force has been refocused on those who follow Osama bin Laden and the like. The paradox, of course, is that the bureau and Hollywood have had a historic love affair that was fostered by J. Edgar Hoover as part of the FBI's vaunted publicity machine that through the years has brought it more and more public funds and more and more power. The three TV shows have agents chasing missing persons (outside of outright kidnapping, generally a province of local police); running undercover agents (something it has rarely done) and fighting organized crime (which it started doing only after Hoover's death). Mueller took over when confidence in the FBI had pretty much hit rock-bottom with critics, including some within the bureau itself, convinced that it muffed a big chance to have prevented the 9/11 attacks. It was a giant information collection agency without the ability to analyze what it had gleaned. From the start of his 10-year appointment, Mueller pledged to change things, to eliminate the John Dillinger mentality that shaped the bureau culture for most of its history, and to make it a sophisticated and sharing organization with global reach and analysis capability. He thinks this mission revamp is well on its way, with vastly improved information technology; the abolishing of notoriously tightfisted policies about sharing with sister agencies; improved cooperation with counterparts overseas; and expanded powers stemming from the Patriot Act, which he said the bureau is not abusing. The bureau is well on its way to making the nation safer, he says. The proof he cites is that there hasn't been any major terrorist act on U.S. soil since Sept. 11, 2001. Not that that couldn't occur, he is swift to acknowledge. And what about those critics in Congress who believe the bureau is really incapable of carrying out the intelligence mission and that a new agency should be created along the lines of Britain's MI5? Would it surprise you to know that he thinks that is a bad idea? He is careful in denouncing the plan, emphasizing that the British model is one that works much like that of combined FBI-CIA efforts, which taken together can do the job. That, of course, depends on the cooperation between the two agencies that was so elusive for more than 50 years. In fact, it didn't really exist. Does that now work, Mueller is asked. "Yes," he replies tersely. One could hardly expect different answers from the no-nonsense career public servant who became the sixth head of this vast federal law-enforcement agency since Hoover's death in 1972. In the meantime, the public perception that about 75 percent of bureau activities have nothing to do with terrorism is difficult to dispel given the barrage of news about FBI involvement in every crime from prostitution to street and motorcycle gangs and drugs and guns and anything else it sees as under its jurisdiction. It is difficult to read any crime story without finding the hand of the FBI, despite what the director says about cutting down on those things to concentrate on the big-time bomb throwers. Mueller says that the focus on terrorism has become a major part of the training given new agents. But at the same time there are reports that agent morale is low because of the often-mundane business of gathering and analyzing information that might provide a clue to the next terrorist act and that there is strong resistance in the field to breaking down the law-enforcement ethos. If the truth be known, Hollywood's latest vision of the FBI must suit most of its agents just fine. That's what a lot of them signed on to do. ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8167 From: James M. Atkinson Date: Mon Jan 19, 2004 3:28am Subject: Free TSCM Tool Kits As a few of you are aware, a few years (1991 era) back I designed a comprehensive set of tools, and cases specifically for TSCM. The tool case is large enough to pack all your tools in, plus quite of bit of manuals and test gear. It has a retractable handle, and casters to make it, very, very easy to move. These cases are packed solid with tools, and you will appreciate that this has rollers. There are over 175 basic tools and accessories in the kit, including screwdrivers, wrenches, probes flashlights, can tools, butt sets, etc... all premium tools. Also included is a Harris TS45 (premium line-mans sets), full set of punch tools (and case), modular adapters, and a very high end Fluke 190 Series DMM. The retail value on these kits are over $1200... but I am giving them away to any customer who spends $20,000 or more with me before the end of this month. If you spend at least $50,000 before the end of this month I will throw in a free Fluke 200 MHz Scopemeter ($3000 value) along with the free tool kit. All tools and equipment are new, unused, and unopened. I would like to clear out the tool kits by the end of the month. This does not apply to other specials. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8168 From: Date: Tue Jan 20, 2004 10:59am Subject: Bell Labs Develops Engine for Cell Users January 19, 2004 Bell Labs Develops Engine for Cell Users By THE ASSOCIATED PRESS Filed at 2:46 p.m. ET NEW YORK (AP) -- Now that wireless companies can track a mobile phone's location, customers will want to control exactly who knows where they are and when. Bell Labs says it has developed a network software engine that can let cell users be as picky as they choose about disclosing their whereabouts, a step that may help wireless companies introduce ``location-based services'' in a way customers will find handy rather than intrusive. In a presentation this week at an industry conference, researchers for the Bell Labs division of Lucent Technologies Inc. plan to describe how their technology copes with the conflicting demands of speed, privacy and personalization on a live telephone network -- enabling users to specify what location information is shared, when, with whom, how and under what circumstances. While one U.S. mobile phone operator, AT&T Wireless, already offers a ``Find Friends'' feature that's somewhat analogous to a buddy list in instant messaging, location-based services have mostly remained an unfulfilled promise. More recently, under a federal mandate requiring that cell carriers be able to pinpoint the whereabouts of any customer who calls 911 during an emergency, expensive network upgrades have made wireless companies more anxious to deploy services which can exploit these new capabilities for a profit. Examples of such services would typically include the ability for restaurants and other businesses to send a solicitation by text message to a cell phone when its owner wanders within range of those merchants. Other applications might include the ability to locate co-workers and customers. While many cell phone users might like to be notified of a nearby eatery or find it helpful to let others keep track of their movements, most would rather not expose themselves to round-the-clock, everywhere-they-go surveillance. However, given the real-time requirements of transmitting information over a telephone network, it can be difficult to program a wide-range of options for individuals to personalize preferences such as when, where and with whom to share location information. One solution is to hard-code a network database with an ``on-off'' switch that activates or deactivates a service, for instance, during a window of time with set hours such as peak and off-peak. Bell Labs said it used a ``rules-driven'' approach to programming that can take personalization to a less-rigid level without bogging down the computing power of a network. While not all users will want or need an elaborate level of personalization, wireless companies would prefer the flexibility to service a variety of customers on the same network. ``You may have a power user who's very concerned about being able to show his or her location to different types of customers and family,'' said Rick Hull, director of Network Data and Services Research at Bell Labs. ``There may be notions about important customers and less important customers, breaking deals,'' he said. ``Maybe for his wife he wants to give very accurate information about his location, but for someone else only wants to give his location within 15 miles. Maybe he doesn't want one customer to know that he's visiting another customer's site.'' Bell Labs said it is negotiating with wireless operators to conduct trials with the technology, which it hopes will be ready for commercial deployment next year. The research is being presented at the 2004 IEEE International Conference on Mobile Data Management in Berkeley, Calif. Copyright 2004 The Associated Press | Home | Privacy Policy | Search | Corrections | Help | Back to Top [Non-text portions of this message have been removed] 8169 From: David Alexander Date: Wed Jan 21, 2004 8:05am Subject: new snooping powers in the UK From the BBC news website: http://news.bbc.co.uk/1/hi/technology/3414531.stm Snooping powers given to more than 600 public bodies look set to create a small industry of private firms that will help process requests for information about who people call, the websites they visit and who they swap e-mail with. Some firms are already marketing their services to the agencies granted the snooping powers under the controversial Regulation of Investigatory Powers Act. One firm, called Singlepoint, has been specifically created to act as a middleman between the bodies that want access to data and the net service providers and phone operators that hold it. Civil liberty groups said they were worried about the emergence of such firms and said the government must police them closely to ensure that access to sensitive information was not abused. Watch the watchers The new snooping powers and the rules governing how they can be used came into force on 5 January and have prompted some firms to take advantage of the new demand for data requests. "We saw an opportunity for a business or a facility that could provide secure processing for the data requests that will come out of this legislation," said a Singlepoint spokesman. He said without Singlepoint it would be more difficult and costly for public authorities to request data as they would have to set up relationships with all of the UK's communication service providers. Instead, he said, Singlepoint was setting up a system that would automatically route requests for information to relevant net or phone firms. He added that this system would ensure that all requests were submitted properly and would help government watchdogs policing RIPA requests for data. "One of the advantages we can offer is transparency and auditability for them to check any part of the process at any time," he said. The Interception Commissioner is charged with making sure that RIPA powers are not abused. The Home Office estimates that up to 2m requests per year are made for information about who pays for a particular phone or web account. About 90% of these requests are for subscriber information. Most of these requests are made by the police but approximately 4% are made by the many public authorities that have had new powers granted under RIPA. A Home Office spokesman said that there were likely to be more companies like Singlepoint that set themselves up to act as middlemen. Training day Other firms are starting to set themselves up as trainers for people within public bodies involved with investigations. The act demands that public bodies appoint single points of contact that will co-ordinate all requests under RIPA. It is estimated that more than 3,000 people will be designated as these single points of contact and all must go through training programmes to ensure they understand RIPA rules. A spokesman for the Focus Group said its training materials were currently being evaluated by the Home Office and soon it hoped to be offering courses to public authorities. He said the Home Office was keen to get firms offering courses because the police did not have the resources to take on the training of these public body workers itself. Bodies granted snooping powers include the Serious Fraud Office, all local authorities and councils plus other organisations such as the Charity Commission and the Centre for Environment, Fisheries and Aquaculture Science. When proposals to grant these snooping powers were first aired in mid-2002 they were greeted with alarm by privacy advocates and civil liberty groups. A campaign co-ordinated by the FaxYourMP website prompted the government to withdraw its proposals. However, following a consultation exercise the proposals were resurrected and the powers granted in a series of statutory instruments issued in November 2003. Danny O'Brien, of net lobby group Stand, said it would prefer if the police were the only ones with powers to get data from phone and net service firms. "We definitely want some public oversight over how much power to look into private files these groups have," he said David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 8170 From: seleong Date: Tue Jan 13, 2004 1:00am Subject: Microtel PR-700B Documentation Hello! Curious if anyone has any technical documentation on the Micro-tel PR- 700B receiver? Anyone experience any power supply problems with this unit? Does anyone have the pinout for the 24VDC input on the rear panel? Thanks! Steve 8171 From: David Miller Date: Tue Jan 13, 2004 3:55am Subject: Nigerian scams We have all heard of the Nigerian scams that are so prevalent in our mail boxes. Here is a guy that is having some fun with it. You really need to read some of the letters to really appreciate this. They are hilarious! http://www.ebolamonkeyman.com/ 8172 From: wayne Macdonald Date: Wed Jan 14, 2004 0:39pm Subject: Plantronics CS50 wireless office headset system This week I carried out a full test with the Plantronics digital wireless headset. The company claims that it is a totally secure method of communication via telephone. To quote the company literature, "the headset provides ultimate sound quality and mobility for the office and crystal clean and secure conversations" The CS50 uses digital 900MHz technology to deliver calls that are clear, private and completely secure". During one of the tests, it was discovered, that when communicating with an analog telephone and portable phones , all digital security went out the window. (as expected). Another discovery was that the small headset mike is FM wireless and can transmit for about 100 feet. I arranged the small headset on a shelf in the conference room, dialed an old remote analog cellular and was able to monitor room conversations quite clearly. It can be an excellent bug. The mike is very directional and low powered, but I know many who can modify this and make it an excellent covert transmitter. My client was extremely happy with my report. Wayne Macdonald 8173 From: Steve Weinert Date: Fri Jan 16, 2004 9:10am Subject: RE: man flies Atlantic with 5 bullets in pocket > Date: Thu, 15 Jan 2004 16:24:58 -0000 > From: "David Alexander" > Subject: man flies Atlantic with 5 bullets in pocket > > The big news here in the UK this morning is that a man with a Sierra Leone > passport arrived at Heathrow Airport (London, England) with 5 rounds of > ammunition in his pocket. He arrived on a flight from the USA. > > I don't know if the US 'readers' of this list are aware of the > problems that > flights from the UK (and I suspect other countries too) have had. A lot of > flights have either been delayed or cancelled. A personal source in HMCS indicated that several of the UK delays were industrial actions by UK pilots & their unions. Having formerly had 450 unionized UK employees under my management and dealing first hand with the mechanisms their union put them up to, it would not be a surprising for this to have been part of the cause. > Also we are very > unhappy with > the (in our opinion) the high-handed way that the US security authorities > have been dealing with other countries. For example, the FBI and DHS are > insisting that European countries flout their own privacy laws and supply > data about passengers that should not be in the public domain. The net > result among most people I know is quite simple - we're not coming to > America as long as this is in force. We have zero confidence in > the security > authorities to keep the information safe and not misuse it. The data is not to be released into the public domain, but rather is cooperative governmental information. Was there a lot more than passenger lists and simple data for profiling (like methods of payment, citizenship/nationality, and such..) that was being shared? Much of that information was always available. I ended up being interviewed by Special Branch years ago for paying for tickets in cash, among other issues. The EU has dismantled their internal border systems to the point where after Canada & Mexico, the EU is a favored point for importing persons not desired in the USA. > > I'd just like to say that right now, we are laughing ourselves stupid. > > I know it's not you guys who read this list, please don't think > I'm having a > go at you personally, I'm not. Your postings show how dumba** you > think most > of this is and how ineffective it is on internal flights. Now you > know, it's > no better on the international ones either. > Airport security is (and in my estimation will always remain) marginally effective. The fellow had five rounds in his pocket. I've been in the secure areas of a commercial airport openly carrying ammo cans. Nobody asked me who, what or why. Having conducted numerous penetration inspections/exercises on supposedly secure facilities I've experienced a porosity of security that does not lead me to expect any "true security" in public facilities, like airports/airlines. > Considering how long your sea and land borders are I'm sure that, if I > wanted to, I could get a whole platoon of 'illegals' into the USA without > detection or going anywhere near a scheduled flight. The general step-up at other ingress points is noticeable. Whether it is REMS and UGS in border areas, the cutting back of foliage and the implimentation of modest security on other transpost crossings, there has been a change. Even at a sleepy Manitoba/USA crossing there were armed Military on site and the increase in other measures was noticeable. > I also think > that, with > the relatively low value of second-hand airliners at the moment, if I was > OBL and looking to repeat 9/11 I'd just buy a couple of old > soviet Aeroflot > transport aircraft and book them on 'one-way cargo runs' into the USA. > > My 2c. > > David Alexander > Dbi Consulting Ltd Valid issues. Expect that these types of vectors are a concern for any potential target country. Airborne & Seaborne infiltration of personnel & materials isn't all that hard, but there is no reason to make it as easy as a walk in the park. It is worth remembering that important aspects of physical security include deterring the wrong doers and providing a comfort to the secured peoples at a level that lets them get on with life, albeit hopefully not in a false sense of invincibility & immunity. As always your views from a UK vantage are enjoyed and appreciated. It does concern that you would consider not traveling over the issues. It does beg to wonder if the public demands for information sharing are only an acknowledgement of data long shared on a cooperative less public method. Steve W 8174 From: Does it matter Date: Fri Jan 16, 2004 5:33pm Subject: Question about antennas Hello, I have a wireless hot spot that I am setting up in my office for ppl in my office and then people down the street also. There is a company that makes a hotspot kit that allows people to log on enter cc information etc and this third party co. takes care of billing etc. Anyway to the point they are trying to sell me 1 of 2 antennas for 802.11b service (one directional or one omni directional) my question to you guys is realistically what is the range on these things. It would be mounted on a roof that is on a 2 story building and I would be trying to beam signal 1/10th to 1/5th of a mile away. Some of the places I want to try to reach are hotels so is it unrealistic to beam across the street into a hotel? Is the concrete and walls going to kill my signal? Thanks for your help. 8175 From: CP Date: Wed Jan 21, 2004 9:09pm Subject: Re: Plantronics CS50 wireless office headset system > Another discovery was that the small headset mike is FM wireless and can > transmit for about 100 feet. Are you saying that the headset was actually transmitting in FM, I would have expected it to be spread spectrum or possibly bluetooth? or was there just some extra modulated emissions that could be picked up? Charles Charles Patterson Global Communications Tarrytown, NY cp @ telephonesecurity.com ----- Original Message ----- From: "wayne Macdonald" To: Sent: Wednesday, January 14, 2004 1:39 PM Subject: [TSCM-L] Plantronics CS50 wireless office headset system > This week I carried out a full test with the Plantronics digital > wireless headset. The company claims that it is a totally secure method > of communication via telephone. To quote the company literature, "the > headset provides ultimate sound quality and mobility for the office and > crystal clean and secure conversations" The CS50 uses digital 900MHz > technology to deliver calls that are clear, private and completely > secure". During one of the tests, it was discovered, that when > communicating with an analog telephone and portable phones , all digital > security went out the window. (as expected). > > Another discovery was that the small headset mike is FM wireless and can > transmit for about 100 feet. I arranged the small headset on a shelf in > the conference room, dialed an old remote analog cellular and was able > to monitor room conversations quite clearly. It can be an excellent bug. > The mike is very directional and low powered, but I know many who can > modify this and make it an excellent covert transmitter. My client was > extremely happy with my report. > > Wayne Macdonald > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > > -------------------------------------------------------------------------- ------ > Yahoo! Groups Links > > a.. To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > b.. To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 8176 From: Steve Uhrig Date: Wed Jan 21, 2004 9:15pm Subject: Re: Question about antennas On 16 Jan 2004 at 23:33, Does it matter wrote: > Some of the places I want to try to reach are hotels so is it > unrealistic to beam across the street into a hotel? Is the concrete > and walls going to kill my signal? All bets are off if there's anything between the transmit and receive antennas other than atmosphere. Concrete will kill most legal 802.11x signals unless you happen to be very close to the access point. You want directional as much as possible everywhere practical, to pick up gain. Remember +6dB (anywhere in the system) effectively doubles your range, all other factors being equal. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8177 From: Date: Wed Jan 21, 2004 8:00pm Subject: Easing of Internet Regulations Challenges Surveillance Efforts January 22, 2004 New York Times Easing of Internet Regulations Challenges Surveillance Efforts By STEPHEN LABATON ASHINGTON, Jan. 21 -- The Federal Communications Commission's efforts to reduce regulations over some Internet services have come under intense criticism from officials at law enforcement agencies who say that their ability to monitor terrorists and other criminal suspects electronically is threatened. In a series of unpublicized meetings and heated correspondence in recent weeks, officials from the Justice Department, the Federal Bureau of Investigation and the Drug Enforcement Administration have repeatedly complained about the commission's decision in 2002 to classify high-speed Internet cable services under a looser regulatory regime than the phone system. The Justice Department recently tried to block the commission from appealing a decision by a federal appeals court two months ago that struck down major parts of its 2002 deregulatory order. Justice Department officials fear that the deregulatory order impedes its ability to enforce wiretapping orders. The department ultimately decided to permit the F.C.C. to appeal, but took the highly unusual step of withdrawing from the lawsuit, officials involved in the case said. As a result of the commission's actions, said John G. Malcolm, a deputy assistant attorney general who has played a lead role for the Justice Department, some telecommunications carriers have taken the position in court proceedings that they do not need to make their networks available to federal agents for court-approved wiretapping. "I am aware of instances in which law enforcement authorities have not been able to execute intercept orders because of this uncertainty," Mr. Malcolm said in an interview last Friday. He declined to provide further details. The clash between the commission and officials from the Justice Department and other law enforcement agencies pits two cherished policies of the Bush administration against each other. On one side stand those who support deregulation of major industries and the nurturing of emerging technologies; on the other are those who favor more aggressive law enforcement after the Sept. 11 terrorist attacks. The outcome of the debate has far- reaching consequences. Law enforcement officials say it will determine whether they can effectively monitor communications between suspects over new kinds of phone services that otherwise might allow them to escape detection. Also at stake is whether the government or industry will bear the considerable costs of developing the technology for such surveillance. By contrast, some F.C.C. officials and telephone industry executives say that if the commission buckles to the other agencies and forces the industry to take on a host of expensive obligations the development of promising new communications services may be stalled or squelched for years to come. The law enforcement officials have also raised concerns about recent statements by the commission's chairman, Michael K. Powell, that suggest he intends to propose rules soon that would place nascent Internet-based telephone services under a looser regulatory regime than the traditional phone system. Through a spokesman, Mr. Powell declined to discuss the subject. David Fiske, the commission's chief spokesman, said that he could not respond to Mr. Malcolm's statement that the F.C.C.'s interpretation of the rules was making it more difficult to execute surveillance orders. A senior official at the F.C.C. said the commission was not unsympathetic to the concerns of the law enforcement agencies. "We're an economic regulatory agency as well as a law enforcement agency and we have to look at the interests of everyone," the official said. Some industry experts say that their biggest worry is that law enforcement demands may reshape the technical specifications of the new Internet voice services, an accusation that officials at the Justice Department and the F.B.I. deny. "What's most scary for industry and perhaps some people at the F.C.C. is the notion that the architecture of the Internet will depend on the permission of the F.B.I.," said Stewart A. Baker, a former general counsel of the National Security Agency, which monitors foreign communications. Mr. Baker now represents a number of telecommunications companies as a partner at the law firm of Steptoe & Johnson. But law enforcement officials say they are not seeking uniform technical standards but requirements that the new companies offering so-called "voice over Internet" services build into their systems easy ways for agents to tap into conversations between suspects. In a strange-bedfellows twist, officials from the F.B.I. and other agencies have found themselves the unlikely allies of groups like the American Civil Liberties Union, which have also argued that the new Internet services offered by cable companies should be under a regulatory regime like the phone system -- but for different reasons. The A.C.L.U. prefers that approach because it would prohibit cable companies from discriminating against Internet service providers, and as such would assure a greater diversity of voices. The law enforcement officials have repeatedly complained about the direction the agency has been taking on the issues. Last month, officials from the Justice Department, the F.B.I. and the drug agency warned officials of the F.C.C. that the commission's regulatory rulings on high-speed Internet access through cable systems "suffers from statutory interpretation problems" and "directly threatens" the ability to apply the law permitting them to monitor suspects, according to a letter on file at the F.C.C. describing a meeting on the issue. The meeting at the F.C.C. included lawyers from the Justice Department's criminal division, civil appellate division, narcotics and dangerous drugs section and solicitor general's office, as well as officials from the F.B.I., and D.E.A. Shortly before that meeting, the Justice Department tried to block the F.C.C. from appealing a decision by a three-judge panel of the United States Court of Appeals for the Ninth Circuit, sitting in Seattle, because of the problems it could pose for law enforcement, officials said. The commission lost the case last October, when the panel issued a ruling that may force the cable companies to share their broadband networks with competing Internet service providers. The F.C.C. order, which was partly struck down, had classified cable broadband as an "information service" under the 1996 Telecommunications Act. In so doing, it threatened to undermine the ability of law enforcement agencies to use the Communications Assistance for Law Enforcement Act of 1994, a wiretapping law that applies to phone services but exempts information services. The Justice Department ultimately reached a compromise that permitted the commission to go forward and petition the entire Ninth Circuit to review the case, Brand X Internet Services v. Federal Communications Commission. But government lawyers removed the department from the case, rejecting the Justice Department's traditional role as the main legal advocate for the United States in nearly all cases before federal appeals courts. Law enforcement officials have also warned the F.C.C. that the approach that Mr. Powell has begun to articulate to have few regulations over the emerging technology that will permit consumers to use the Internet to send and receive phone calls could make it significantly more difficult for prosecutors and federal agents to monitor those calls. The F.B.I. and the Justice Department have told the commission that greater use of high speed Internet phone services "offers increasing opportunities for terrorists, spies, and criminals to evade lawful electronic surveillance," according to a document on file at the F.C.C. Classifying Internet-based phone services as "telecommunications" would allow law enforcement officials to require companies to provide them with access to contemporaneous conversations on their networks under the 1994 wiretapping law. But such a classification also imposes on the companies a host of onerous requirements under the 1996 act, including those intended to assure that telephones are universally available and that everyone has access to 911 emergency services. These obligations, purveyors of the new Internet telephone services say, are so expensive that they will deter their development. Government and industry lawyers say that the commission could try to define the new services as "telecommunications" under the 1994 surveillance law and "information" under the 1996 act. But taking that potentially conflicting approach could undermine the F.C.C. in court in the inevitable legal challenges that would follow its rulings. Mr. Powell, in a series of recent speeches and interviews, has suggested that the new technologies need to be classified as "information services" and thus be subjected to fewer regulations. "Don't shove the round Internet into a square regulatory hole," Mr. Powell said at a luncheon appearance last week before the National Press Club. "We cannot contort the character of the Internet to suit our familiar notions of regulation. Do not dumb down the genius of the Net to match the limited visions of the regulator. "To regulate the Internet in the image of a familiar phone service is to destroy its inherent character and potential," Mr. Powell said. Such new technologies empower people, "giving them more choice and control." "And I think as consumers do more, governments do less, because we don't regulate our citizens." In the same speech, Mr. Powell added, "We will need to ensure the legitimate concerns of public safety and law enforcement are addressed." [Non-text portions of this message have been removed] 8178 From: Eric Butler Date: Thu Jan 22, 2004 0:11am Subject: TEMPEST prevention fonts I was wondering about the effectivness of tempest prevention fonts. i have found a picture of the letters, but no workable font files. i would appreciate any feedback/links. thanks! 8179 From: kondrak Date: Thu Jan 22, 2004 6:39pm Subject: Re: TEMPEST prevention fonts Depends on what signal you're sniffing I'd imagine....if you're looking at the radiation from the monitor, then they might help, but if your sniffing at the rs-232 outputs, keyboard or serial then the font doesn't much matter.... Any font with smooth sloping characteristics is helpful, so i guess a script file would do.... This may make much of this moot however.....http://www.chiark.greenend.org.uk/pipermail/ukcrypto/1998-February/000946.html At 01:11 1/22/2004, you wrote: >I was wondering about the effectivness of tempest prevention fonts. i >have found a picture of the letters, but no workable font files. i >would appreciate any feedback/links. thanks! 8180 From: Date: Thu Jan 22, 2004 4:41pm Subject: FBI investigating if Albuquerque police captain's phone was wiretapped FBI investigating if Albuquerque police captain's phone was wiretapped The Albuquerque Police Department is investigating whether the work phone line of Captain Sonny Leeper was wiretapped at the Northeast Substation. Last Update: 01/22/2004 6:00:21 PM By: Todd Dukart The Albuquerque Police Department called in the Federal Bureau of Investigation to find out if someone unlawfully wiretapped an officer’s work phone inside a police substation. Eyewitness News 4 has learned from several sources that the captain at the Northeast Substation at Osuna and Wyoming NE says he found his phone line bugged. If true, it would seem to suggest an inside job. Captain Sonny Leeper says he found his phone tapped in January 2003. Albuquerque Police Chief Gil Gallegos confirmed that former deputy chief Ray Schultz looked in to the alleged wiretapping a year ago. But, he “apparently thought that it was not what it may be,” Gallegos said. Sources say there was a U.S. marshal in Leeper’s office when the captain received a call alerting him to the alleged wiretap. Sources tell Eyewitness News 4 the marshal had the master phone box inside the substation checked out and found a wiretapping device attached to Leeper’s phone line. Retired APD lieutenant Tim Kline currently sits on the police oversight commission. He says he received an anonymous call Wednesday telling him that Captain Leeper’s work phone had been tapped. Kline says he called Leeper to ask if the claim was true. “And I got from him that, yes, his phone had been tapped,” said Kline. Kline says he would refer the matter to the police oversight commission’s independent review officer Thursday for a possible investigation. If it turns out Leeper’s phone was tapped, Kline expects a lot of questions. “Why were they doing it? How were they doing it and for what reason? And whether now some federal laws may have been totally, completely violated,” said Kline. Eyewitness News 4 contacted Albuquerque Police Chief Gil Gallegos Wednesday night. He says he never authorized any wiretapping of Captain Leeper’s phone line. Gallegos said he didn’t hear about the allegations until six days ago, and called the FBI Wednesday, asking for a federal investigation. He said he doesn’t know why it apparently took a year for anyone to tell him that one of his captains claimed to have been wiretapped. Eyewitness News 4 attempted to contact Schultz, who is now a deputy chief in Scottsdale, Arizona, but the call has not been returned. [Non-text portions of this message have been removed] 8181 From: Date: Fri Jan 23, 2004 4:54am Subject: "If theywant to do a wiretap, they can do it the old-fashioned way" January 23, 2004, 8:40 a.m. The Awfulness of Wesley Clark The candidate for people who want a really bad candidate. By the end of the Democratic presidential debate on Thursday night, it was impossible to avoid the question: Was Wesley Clark trying to hurt himself? Or had the retired four-star general simply not considered the possibility that debate moderators would ask him, like, questions? Consider Clark's response to a query about the lobbying work he did in 2002 and 2003 for an Arkansas-based company called Acxiom. The software firm has developed a product called CAPPS II, which is an airline screening system that gathers information on passengers and color-codes them according to their potential terrorist risk (the name stands for Computer Assisted Passenger Prescreening System). Clark earned a reported $500,000 for pitching the product to the Transportation Department, the FBI, and the CIA. Some civil libertarian groups have strongly criticized the CAPPS II system on privacy grounds, and in recent days, the campaign of Sen. John Kerry has attacked Clark for his lobbying. The Los Angeles Times quoted a Kerry spokesman saying recently, "Wes Clark was a high-paid Republican Washington lobbyist who cashed in on his military record." So it was no surprise that Clark's lobbying came up in the debate. But when he was asked whether CAPPS II might "step over the line" of airline passengers' privacy, Clark seemed to have no idea what it was all about. "Well, I don't know about CAPPS II because I have not seen the program, and I don't think many of the people who are worried about it have," Clark said. "I was on the board of the company [Acxiom], and I did take them around and introduce them to various members of the United States government, the Defense Department and so forth, because their technology will improve our security." But was CAPPS II a threat to privacy? "Had I still been on that board when all this was going through, I would have insisted that the American Civil Liberties Union and others be brought in to pre-approve CAPPS II," Clark said. "Whether that was done or not, I have no idea." End of answer. Consider also Clark's response to questions about his embrace of the radical leftist filmmaker Michael Moore. Moore, who famously wondered why terrorists struck New York City on September 11 when there were so many Bush voters they could have targeted elsewhere in the country, endorsed Clark recently, and the two shared an on-stage love-fest. In his remarks at the time, Moore referred to George W. Bush as, among other things, a "deserter." ABC's Peter Jennings, who shared moderating duties at the debate with Fox News's Brit Hume, asked Clark, "That's a reckless charge not supported by the facts. And I was curious to know why you didn't contradict [Moore], and whether or not you think it would've been a better example of ethical behavior to have done so." "Well, I think Michael Moore has the right to say whatever he feels about this," Clark answered. "I don't know whether this is supported by the facts or not. I've never looked at it. I've seen this charge bandied about a lot." Clark then said, "This election is about the future, Peter, and what we have to do is pull this country together." Clark explained that he believes he can accomplish that with "the support of a man like Michael Moore, [and] of a great American leader like Sen. George McGovern." Still, Jennings did not accept Clark's claim to know nothing about the "deserter" charge. "Since this question and answer in which you and Mr. Moore were involved in, you've had a chance to look at the facts," Jennings followed up. "Do you still feel comfortable with the fact that someone should be standing up in your presence and calling the president of the United States a deserter?" "To be honest with you, I did not look at the facts, Peter. You know, that's Michael Moore's opinion. He's entitled to say that. I've seen — he's not the only person who's said that. I've not followed up on those facts. And frankly, it's not relevant to me and why I'm in this campaign." It turned out Clark didn't know any more about Michael Moore than he knew about CAPPS II, the product he had made half a million dollars selling. On other topics, Clark backed away from an earlier statement that if he is elected president, the United States will not suffer any more 9/11-style attacks. What he really meant to say, Clark explained, is that "President Bush must be held accountable." Clark also announced that he would "suspend all portions of the Patriot Act that have to do with search and seizure." He called for returning federal law enforcement to the days before cell phones changed the ways criminals (and terrorists) do business. "If they [investigators] want to do a wiretap, they can do it the old-fashioned way," Clark said. Finally, Clark struggled to explain a decidedly pro-war article he wrote for the Times of London last April, shortly after U.S. forces entered Baghdad (See "Wesley Clark's Pro-War Manifesto). Clark repeated his assertion that "I did not support this war," but explained that in the article he simply did not want to criticize U.S. policy in a foreign publication. "I'm not going to take U.S. policy and my differences with the administration directly into a foreign publication," he said. All in all, Clark's was the weakest performance in a presidential debate since, well, his performance in the early debates. And it could have been even worse; the general was lucky, for example, that no one brought up his embarrassing attempts to pull rank on his rival, Sen. John Kerry, who served as a lieutenant in Vietnam. It is impossible to see how Clark's performance Thursday night, as well as his performance in New Hampshire in general, will help his chances in the upcoming primary. As for the other candidates, Sen. John Edwards, who has so far failed to capitalize on his surprise strong showing in Iowa, also had a weak night, bobbling a question on the nature of Islam and, on another occasion, showing a fundamental misunderstanding of the Defense of Marriage Act. Sen. Kerry, the frontrunner who has capitalized on his Iowa showing, turned in a generally strong performance. And Howard Dean, the former frontrunner who has never been particularly strong in debates, did as well as he could be expected to do, given the pressure created by his red-faced "YAAAAAAAAAAAAAARRRRHHHHHH!!!!!!!!!" speech in Iowa. Dean began the debate by explaining that his voice was hoarse, "not because I was whooping and hollering at my third- place finish in Iowa," but because he had a cold. Falling back on his now-stock explanation of the Iowa outburst, he said, "We did have a little fun in Iowa. I thought I owed it to the 3,500 kids that came out and worked for us." Later, Dean returned to the subject, suggesting that unguarded moments like the Iowa speech are in fact evidence of his superior genuineness. "You know, I'm not a perfect person," Dean explained. "I think a lot of people have had a lot of fun at my expense over the Iowa hooting and hollering, and that's justified. But one thing I can tell you is that I'm not kidding about what I say." Dean's non-mea culpa, clearly practiced and tested with his advisers, didn't fare any better than his early explanations of his Iowa rant. "Don't be hard on yourself about hooting and hollering," Al Sharpton advised the former Vermont governor. "If I had spent the money you did and got 18 percent, I'd still be in Iowa hooting and hollering." http://www.nationalreview.com/york/york200401230840.asp [Non-text portions of this message have been removed] 8182 From: CP Date: Fri Jan 23, 2004 10:04pm Subject: ISA ETA-1 on ebay I have an older ISA ETA-1 telephone analyzer on ebay if anyone is interested. http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=3073220333 It's in good cosmetic condition with case (no manuals). --Charles 8183 From: Date: Sat Jan 24, 2004 6:41am Subject: Cold War Museum Cold War Museum Update 2004 Over the past eight years the Cold War Museum has made great strides in honoring Cold War Veterans and preserving Cold War history. However, the work has just begun and we need to continue our fundraising efforts in order to raise the millions of dollars necessary to build The Cold War Museum and Memorial. I am writing to provide you with a brief update on the Museum's activities and to ask that you consider making a year-end tax-deductible donation to the Cold War Museum's general fund. A donation to our general fund will allow us to develop architectural plans, conduct a site feasibility study, and prepare for our national fundraising campaign. If you know of any family members, friends, or colleagues that would like to assist with our efforts, please let them know that their support is welcomed. We are at a critical stage of our development. In January 2004, the Cold War Museum renewed its affiliation with the Smithsonian Institution. As a result we have pledges of support for artifact loans from Smithsonian Air and Space, American History, National Portrait, and US Postal Museum. The Cold War Museum has submitted a proposal to Fairfax County Park Authority to locate at the former Nike Missile Base in Lorton, Virginia. We are working with the Fort Meade Museum and the Historical Electronics Museum in Maryland, the International Spy Museum in Washington, DC, and the Florida International Museum to temporarily display artifacts from our collection. Annually, the Bulgaria, Estonian, Hungarian, Latvian, Lithuanian, Romanian, and Slovakian Embassies co-host a reception to promote The Museum to the International community in Washington, DC. The 2001 reception to commemorate the 10th Anniversary of the end of the Cold War was held at the Embassy of Slovakia. The 2002 reception was held at the Romanian Embassy. The 2003 event was held at the Embassy of Bulgaria on November 14, 2003. The Museum has acquired many important Eastern Bloc artifacts, including an East German admiral's uniform, a Checkpoint Charlie sign, a Stasi prison door and bed, and a piece of the "Iron Curtin" as a result of these receptions. The mobile exhibit on the U-2 Incident, the "Spies of Washington Tour," and our book signing receptions continue to generate interest and support. The mobile exhibit returned from a one-year display at the Florida International Museum in St. Petersburg, Florida and then began a one-year display at the EAA Museum in Oshkosh, WI. The exhibit opened to the public at the National Test Site Museum in Las Vegas, Nevada on October 2, 2003. The educational "Spies of Washington Tour" (www.spytour.com) now includes an optional stop at the International Spy Museum in Washington, DC. Our latest book signing reception took place at the National Archives and featured author John Fahey who wrote, "Licensed to Spy" about his involvement with the United States Military Liaison Mission (USMLM). As a result of our efforts, the Commonwealth of Virginia recently allocated a $28,000 matching grant for the Cold War Museum. We are grateful to the Springfield VFW (Post 7327) who in response to our matching grant campaign donated $20,000 to the Museum. Our Congressman, the Honorable Tom M. Davis, III (11th Virginia), is working to assist the museum at the Federal level. Once again the museum is part of the Combined Federal Campaign (CFC#7475), which allows for Federal government and military employees to donate to the museum through payroll deduction. Please consider making a donation to the Cold War Museum's general fund. Your gift will help us plan for the new year and the new physical location. Tax-deductible contributions and artifact donations to the Museum will ensure that future generations will remember Cold War events and personalities that forever altered our understanding of national security, international relations, and personal sacrifice for one's country. Please help spread the word about the Museum. Together we can make this vision a reality. If you should have any questions or want additional information, please contact: Francis Gary Powers, Jr. - Founder The Cold War Museum P.O. Box 178 - Fairfax, VA 22030 P-(703) 273-2381 / F-(703) 273-4903 www.coldwar.org / gpowersjr@c... [Non-text portions of this message have been removed] 8184 From: Andy Cuff Date: Thu Jan 22, 2004 3:05am Subject: Network Taps Copper and Fiber Hi I've created a new page http://www.securitywizardry.com/taps.htm providing salient details and a feature matrix for all the commercial vendors that supply network Taps, the page is aimed at those who wish to use the Taps for Intrusion Detection Systems but they can obviously also be used for more nefarious purposes. Additionally I have included a fiber Tap detection system that claims to get over the problem I used to have with level threshold detectors and false positives that occurred as the fibers degraded over time. What I'm looking for from TSCM is whether I'm missing any products that are out there either Taps or Tap detectors I'd also like details on any Gucci devices like vampire Taps for fiber or Taps that rely on refracting signal out of the fiber Any good home made DIY kit build instructions, I saw a nice Fiber Tap that used 3 media converters in various ways. If you can spare any time in responding to my query I'd really appreciate it, the site isn't a commercial one, and is vendor agnostic, though the banners allow me to break even on the running costs. In fact I've taken a days vacation to update some of the content take care -andy Talisker Security Tools Directory http://www.securitywizardry.com 8185 From: Andy Cuff Date: Thu Jan 22, 2004 9:09am Subject: Re: TEMPEST prevention fonts Hi Eric, In my experience they can be effective in making the reconstituted image more difficult to read but they don't really effect some of the more critical leading edges used to sync in with the original output. I produced a TEMPEST FAQ http://www.securitywizardry.com/tempest.htm a few years back, it was seriously edited for public consumption but I feel there are some interesting points that are still relevant today. For me the big thing to get across is that TEMPEST doesn't just apply to screens but any other repetitive processing that results in electromagnetic emanations; keyboards etc Hope it's of some use, though I do apologise for it's lameness -andy (former TEMPEST tester) Talisker Security Tools Directory http://www.securitywizardry.com ----- Original Message ----- From: "Eric Butler" To: Sent: Thursday, January 22, 2004 6:11 AM Subject: [TSCM-L] TEMPEST prevention fonts > I was wondering about the effectivness of tempest prevention fonts. i > have found a picture of the letters, but no workable font files. i > would appreciate any feedback/links. thanks! > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to: > http://docs.yahoo.com/info/terms/ > > 8186 From: Jeremy Funk Date: Thu Jan 22, 2004 1:25pm Subject: Farm Kid Joins The Marines LETTER FROM A FARM KID NOW AT THE MARINE CORPS RECRUIT DEPOT IN SAN DIEGO Dear Ma and Pa: I am well. Hope you are. Tell Brother Walt and Brother Elmer the Marine Corps beats working for old man Minch by a mile. Tell them to join up quick before maybe all of the places are filled. I was restless at first because you got to stay in bed till nearly 6 a.m., but am getting so I like to sleep late. Tell Walt and Elmer all you do before breakfast is smooth your cot and shine some things. No hogs to slop, feed to pitch, mash to mix, wood to split, fire to lay. Practically nothing. Men got to shave but it is not so bad, there's warm water. Breakfast is strong on trimmings like fruit juice, cereal, eggs, bacon, etc., but kind of weak on chops, potatoes, ham, steak, fried eggplant, pie and other regular food. But tell Walt and Elmer you can always sit by the two city boys that live on coffee. Their food plus yours holds you till noon when you get fed again. It's no wonder these city boys can't walk much. We go on "route" marches, which the Platoon Sergeant says are long walks to harden us. If he thinks so, it is not my place to tell him different. A route march" is about as far as to our mailbox at home. Then the city guys get sore feet and we all ride back in trucks. The country is nice, but awful flat. The Sergeant is like a schoolteacher. He nags some. The Captain is like the school board. Majors and Colonels just ride around and frown. They don't bother you none. This next will kill Walt and Elmer with laughing. I keep getting medals for shooting. I don't know why. The bulls-eye is near as big as a chipmunk head and don't move. And it ain't shooting at you, like the Higgett boys at home. All you got to do is lie there all comfortable and hit it. You don't even load your own cartridges. They come in boxes. Then we have what they call hand-to-hand combat training. You get to wrestle with them city boys. I have to be real careful though, they break real easy. It ain't like fighting with that ole bull at home. I'm about the best they got in this except for that Tug Jordan from over in Silver Lake. He joined up the same time as me. But I'm only 5'6" and 130 pounds and he's 6'8" and weighs near 300 pounds dry. Be sure to tell Walt and Elmer to hurry and join before other fellers get onto this setup and come stampeding in. Your loving daughter, Gail 8187 From: Does it matter Date: Thu Jan 22, 2004 6:25pm Subject: Washington computer break in I couldn't believe the guys name in this story William Pickle WASHINGTON -- Republican staff members of the US Senate Judiciary Commitee infiltrated opposition computer files for a year, monitoring secret strategy memos and periodically passing on copies to the media, Senate officials told The Globe. From the spring of 2002 until at least April 2003, members of the GOP committee staff exploited a computer glitch that allowed them to access restricted Democratic communications without a password. Trolling through hundreds of memos, they were able to read talking points and accounts of private meetings discussing which judicial nominees Democrats would fight -- and with what tactics. The office of Senate Sergeant-at-Arms William Pickle has already launched an investigation into how excerpts from 15 Democratic memos showed up in the pages of the conservative-leaning newspapers and were posted to a website last November. With the help of forensic computer experts from General Dynamics and the US Secret Service, his office has interviewed about 120 people to date and seized more than half a dozen computers -- including four Judiciary servers, one server from the office of Senate majority leader Bill Frist of Tennessee, and several desktop hard drives. But the scope of both the intrusions and the likely disclosures is now known to have been far more extensive than the November incident, staffers and others familiar with the investigation say. The revelation comes as the battle of judicial nominees is reaching a new level of intensity. Last week, President Bush used his recess power to appoint Judge Charles Pickering to the Fifth Circuit Court of Appeals, bypassing a Democratic filibuster that blocked a vote on his nomination for a year because of concerns over his civil rights record. Democrats now claim their private memos formed the basis for a February 2003 column by conservative pundit Robert Novak that revealed plans pushed by Senator Edward M. Kennedy, Democrat of Massachusetts, to filibuster certain judicial nominees. Novak is also at the center of an investigation into who leaked the identity of a CIA agent whose husband contradicted a Bush administration claim about Iraqi nuclear programs. Citing "internal Senate sources," Novak's column described closed- door Democratic meetings about how to handle nominees. Its details and direct quotes from Democrats -- characterizing former nominee Miguel Estrada as a "stealth right-wing zealot" and describing the GOP agenda as an "assembly line" for right-wing nominees -- are contained in talking points and meeting accounts from the Democratic files now known to have been compromised. Novak declined to confirm or deny whether his column was based on these files. "They're welcome to think anything they want," he said. "As has been demonstrated, I don't reveal my sources." As the extent to which Democratic communications were monitored came into sharper focus, Republicans yesterday offered a new defense. They said that in the summer of 2002, their computer technician informed his Democratic counterpart of the glitch, but Democrats did nothing to fix the problem. Other staffers, however, denied that the Democrats were told anything about it before November 2003. The emerging scope of the GOP surveillance of confidential Democratic files represents a major escalation in partisan warfare over judicial appointments. The bitter fight traces back to 1987, when Democrats torpedoed Robert Bork's nomination to the Supreme Court. In the 1990s, Republicans blocked many of President Clinton's nominees. Since President Bush took office, those roles have been reversed. Against that backdrop, both sides have something to gain and lose from the investigation into the computer files. For Democrats, the scandal highlights GOP dirty tricks that could result in ethics complaints to the Senate and the Washington Bar -- or even criminal charges under computer intrusion laws. "They had an obligation to tell each of the people whose files they were intruding upon -- assuming it was an accident -- that that was going on so those people could protect themselves," said one Senate staffer. "To keep on getting these files is just beyond the pale." But for Republicans, the scandal also keeps attention on the memo contents, which demonstrate the influence of liberal interest groups in choosing which nominees Democratic senators would filibuster. Other revelations from the memos include Democrats' race-based characterization of Estrada as "especially dangerous, because . . . he is Latino," which they feared would make him difficult to block from a later promotion to the Supreme Court. And, at the request of the NAACP, the Democrats delayed any hearings for the Sixth Circuit Court of Appeals until after it heard a landmark affirmative action case -- though a memo noted that staffers "are a little concerned about the propriety of scheduling hearings based on the resolution of a particular case." After the contents of those memos were made public in The Wall Street Journal editorial pages and The Washington Times, Judiciary Chairman Orrin Hatch, Republican of Utah, made a preliminary inquiry and described himself as "mortified that this improper, unethical and simply unacceptable breach of confidential files may have occurred on my watch." Hatch also confirmed that "at least one current member of the Judiciary Committee staff had improperly accessed at least some of the documents referenced in media reports." He did not name the staffer, who he said was being placed on leave and who sources said has since resigned, although he had apparently already announced plans to return to school later this year. Officials familiar with the investigation identified that person as a legislative staff assistant whose name was removed from a list of Judiciary Committee staff in the most recent update of a Capitol Hill directory. The staff member's home number has been disconnected and he could not be reached for comment. Hatch also said that a "former member of the Judiciary staff may have been involved." Many news reports have subsequently identified that person as Manuel Miranda, who formerly worked in the Judiciary Committee office and now is the chief judicial nominee adviser in the Senate majority leader's office. His computer hard drive name was stamped on an e-mail from the National Abortion and Reproductive Rights Action League that was posted along with the Democratic Senate staff communications. Reached at home, Miranda said he is on paternity leave; Frist's office said he is on leave "pending the results of the investigation" -- he denied that any of the handwritten comments on the memos were by his hand and said he did not distribute the memos to the media. He also argued that the only wrongdoing was on the part of the Democrats -- both for the content of their memos, and for their negligence in placing them where they could be seen. "There appears to have been no hacking, no stealing, and no violation of any Senate rule," Miranda said. "Stealing assumes a property right and there is no property right to a government document. . . . These documents are not covered under the Senate disclosure rule because they are not official business and, to the extent they were disclosed, they were disclosed inadvertently by negligent [Democratic] staff." Whether the memos are ultimately deemed to be official business will be a central issue in any criminal case that could result. Unauthorized access of such material could be punishable by up to a year in prison -- or, at the least, sanction under a Senate non- disclosure rule. The computer glitch dates to 2001, when Democrats took control of the Senate after the defection from the GOP of Senator Jim Jeffords, Independent of Vermont. A technician hired by the new judiciary chairman, Patrick Leahy, Democrat of Vermont, apparently made a mistake that allowed anyone to access newly created accounts on a Judiciary Committee server shared by both parties -- even though the accounts were supposed to restrict access only to those with the right password. 8188 From: Date: Mon Jan 26, 2004 4:02am Subject: Big Brother' brings peace of mind 'Big Brother' brings peace of mind By Malcolm Brown January 27, 2004 The death of student Mike Lee, whose body was found in a wheelie bin in Surry Hills on January 5, might have gone down as another of Sydney's unsolved murders, or at best, the unlawful disposal of a body. But it was not so, according to a security camera in Reservoir Street, Surry Hills. Lee had climbed into the wheelie bin on New Year's Eve. And Lyndsay van Blanken, found dead under units in the eastern suburbs on January 10, was filmed by a security camera at Bondi Junction railway station at 5.58pm the day she disappeared, November 24 last year. The low price, convenient storage and high definition of digital images has accelerated the boom in closed-circuit television (CCTV) in shops, offices, business districts, transport, car parks, streets and homes. While it has raised the spectre of Big Brother, particularly in the workplace, crimes have been solved. Terry Murphy, executive director of the Australian Security Industry Association, said: "As long as somebody is watching and making sure it cannot be used as a Big Brother, this industry does not have a problem." The association's commercial services manager, Bryan De Caires, said volume alone testified to the acceptance of the system. "Thousands and thousands" of cameras were being installed each year. The electronic security sector in Australia was worth just under $2 billion a year, including up to $200 million a year from CCTV. Steve Wheeler, the general manager, technology, for Chubb Security, said that its CCTV business in Australia was growing about 30 per cent a year. And Jeffrey Tonazzi, NSW regional manager for Vangren Technology, said that CCTV makes up to 50 per cent of its business in some markets. Mr Wheeler said the uncertain state of the world boosted the market, which might "taper off" if things settled down. Features are growing while prices fall. Glen Watkins, assistant CCTV manager for Ness Security Products, said a camera system that might have cost $20,000 three years ago now costs $7000. The market had been held back by cost and technical barriers, but now it was thriving. "You're looking at $500 for a good quality camera for a lunch shop or something like that," he said. "If you want an external camera you are looking at $1000 or $1200. But you can get a cheap one for $100. People are flocking to get them now." The NSW Electronic Surveillance Act covers the sector in this state. Security camera installers must be licensed, which entails a police check. Cameras must have signs saying they are there. Notices must accompany cameras at work stating their purpose, for example, assisting safety. And they cannot be used to see into private areas. Privacy NSW warned the State Government in a report that while surveillance cameras installed at work might initially be legitimate, they could over time be used for things such as spying. But the security industry warns that cameras do not guarantee security. Criminals can relocate their activities or use disguises. This story was found at: http://www.smh.com.au/articles/2004/01/26/1075087963249.html [Non-text portions of this message have been removed] 8189 From: Date: Mon Jan 26, 2004 1:08pm Subject: Wiretap capability January 26, 2004 09:05 AM US Eastern Timezone Messaging Expert Mirapoint Sharpens Its Email Security Appliance Product Line with RazorGate SUNNYVALE, Calif.--(BUSINESS WIRE)--Jan. 26, 2004-- Cutting-Edge RazorGate 100 & RazorGate 300 Appliances Provide Industrial-Strength Security Protection at the Network Edge to Stop Spam, Viruses, Hacker Attacks & More Building on its reputation as a customer-proven provider of airtight email security solutions, Mirapoint today announced the RazorGate(TM) appliances -- a new suite of email security solutions optimized to stop spam, viruses, hacker attacks, and other security threats that jeopardize today's mission-critical message networks. Deployed at the edge of a customer's network, the purpose-built RazorGate 100 and RazorGate 300 appliances are ideal email security solutions for small- to medium-sized businesses or for highly distributed organizations, and are designed to work with any existing email server. Oriented for sale through Mirapoint's reseller partners, the RazorGate solutions are faster to deploy, provide more complete protection, and offer lower total cost of ownership (TCO) when compared with competitive security products; including non-integrated "piece-meal" alternatives sourced from multiple vendors or inflexible filtering services provided by a hosting provider with limited customization and poor return on investment (ROI). Mirapoint's RazorGate appliances offer the industry's best and most complete email security protection available in convenient, easy-to-deploy form factors. Both RazorGate appliances employ Mirapoint's industry-recognized Full-Spectrum(TM) technology, which boasts the industry's "best accuracy for spam catch-rates with zero false positives" based on independent analysis by a leading trade magazine. Powerful, industry-leading anti-virus technology is also available pre-integrated with all RazorGate appliances, as well as additional security capabilities for advanced content filtering, policy enforcement, intrusion detection, and SMTP connection management. To meet the strong market demand for email security solutions, Mirapoint has partnered with over 50 worldwide resellers, including Paragon Systems, Secure Content Solutions, Newman Group, Intrinsic Networks, EZ Web Communications, Care Factor, KERNEL Networks, Drachenfels GmbH, and Inuit. Mirapoint will work with these and other channel partners to promote the RazorGate product family. "Spam, viruses, and other email-based attacks will all help to propel the email security market to strong growth over the next five years," said Robert Mahowald, research manager at IDC. "Mirapoint's new RazorGate solution joins the company's Message Server and Message Director products to form a comprehensive lineup of email security solutions for enterprise and service provider customers. Mirapoint's expertise in security for routing, storing, accessing, and managing email gives it insight into the security needs of customers of all sizes." The new RazorGate products complement Mirapoint's existing family of email security solutions. With high-end products like the Mirapoint Message Director, to the new cost-optimized RazorGate family, Mirapoint has the right solution to address the full range of needs for enterprise, service provider, education, or government customers. RazorGate 100 -- Fully Integrated Protection Against Spam, Virus, and Hacker Attacks The RazorGate 100 is a compact, 1U appliance designed for rapid deployment alongside any existing email server to provide protection against spam, viruses, and hacker attacks. Targeted at organizations with less than 1,500 users, the RazorGate 100 provides a more cost-effective, easy-to-manage solution than competitive software-only or service-based offerings. The RazorGate 100 includes the following key features: -- Mirapoint's Full-Spectrum email security technology -- Combines powerful spam analysis, identification, filtering, and management features, delivering industry's best catch-rates with zero false positives. -- DirectPath(TM) real-time scanning technology -- Provides in-line scanning of message traffic without the complexity of managing and backing-up the message queue. With DirectPath, no messages are ever stored in queues; and in the unlikely event of a system failure, there is no chance that mission-critical email messages get lost or deleted. -- Advanced content filtering -- Enables the filtering of messages based on keywords in message body, header, or attachments, including HTML, Word, Excel, or PowerPoint files. Administrators can also configure policies for managing incoming and outgoing email traffic to protect against harassment or other types of email abuse. "Small and mid-sized businesses are actively searching for highly effective yet affordable protection at the gateway against spam, viruses, and hacker attacks," said Vartan Ouzanian, president of Secure Content Solutions. "Mirapoint's new RazorGate appliances offer a customer-proven solution that addresses customers' end-to-end security needs. SCS is excited to offer the new RazorGate appliances to its customers and help boost the security and reliability of their message networks." RazorGate 300 -- Network-Hardened Multi-Layer Email Security for Larger Enterprises Designed for larger organizations of up to 5,000 users, the RazorGate 300 provides all of the features of the RazorGate 100, plus additional higher-end capabilities. The RazorGate 300 includes the following key features: -- Integrated LDAP routing and queue management capabilities -- Enables complex routing of email within an organization's message network or between multiple email servers. Integrated queue management tools provide granular control over incoming and outgoing message traffic, as well as quarantine queue capabilities for examining messages in transit. -- Wiretap capability -- Addresses emerging corporate liability, regulatory, or vertical industry requirements. Wiretap allows administrators to selectively and transparently monitor individual email. For example, if a message gets bounced, the end-user will not be notified in any way and the wiretap will not be compromised. -- Secure email access -- Provides a secure access proxy for existing web-based email applications, such as Microsoft Outlook Web Access, Lotus iNotes, or Mirapoint Webmail. -- Carrier-grade reliability -- Ensures 99.999% availability with redundant hardware components and battery backed-up redundant array of inexpensive disks (RAID) controllers. "Our government and business customers desire solutions that increase the reliability and security of their message networks, while driving down administrative overhead and TCO," said Gary Newgaard, president of Paragon Systems. "With Mirapoint's solutions, including the new RazorGate email security appliances, Paragon has a complete product offering to address any size organization -- from a few hundred users to tens of thousands -- to secure incoming and outgoing email against hackers, spam, and virus threats, or deliver more reliable, manageable email services." "With the addition of RazorGate, Mirapoint can offer protection against security threats to business of all sizes and requirements," said Johannes von Drachenfels, director of Drachenfels GmbH. "The RazorGate appliance is an ideal product for the channel because it is price optimized, can be deployed within minutes, and because its an appliance that companies don't have to worry about in dealing with multiple versions of software and integration." Go-to-Market Kit Empowers Channel Partners To simplify the sales and marketing of its new RazorGate appliances, Mirapoint will provide channel partners with a complete go-to-market kit. The kit includes data sheets, brochures, sales tools, customizable direct marketing and advertising materials, and comprehensive competitive information. Mirapoint will also provide funding of joint marketing efforts for the RazorGate appliances for qualified partners and programs. Pricing & Availability The RazorGate appliances are aggressively priced with a RazorGate 100 configuration for 300 users priced at $12,500 suggested U.S. list price. The RazorGate 100 is immediately available and the RazorGate 300 will be available in the first quarter of 2004. For more information or to purchase RazorGate appliances, please contact an authorized RazorGate reseller or Mirapoint directly at 1-800-937-8118 or info@m.... About Mirapoint Mirapoint(R) is a leader in solutions for message networks used by service provider, enterprise, education and government institutions. Customers use Mirapoint solutions to build message networks that intelligently and securely route, store, access and manage Internet messages, including email. Mirapoint is headquartered in Sunnyvale, Calif., with offices throughout North America, Europe For more information on Mirapoint, visit its Web site at www.mirapoint.com. Contacts Mirapoint, Inc. Jeff Brainard, 408-720-3861 jbrainard@m... or Engage PR Kristin Kiltz, 510-748-8200 ext. 204 kristin@e... [Non-text portions of this message have been removed] 8190 From: Date: Tue Jan 27, 2004 3:15am Subject: Citing Free Speech, Judge Voids Part of Antiterror Act January 27, 2004 New York Times Citing Free Speech, Judge Voids Part of Antiterror Act By ERIC LICHTBLAU ASHINGTON, Jan. 26 -- For the first time, a federal judge has struck down part of the sweeping antiterrorism law known as the USA Patriot Act, joining other courts that have challenged integral parts of the Bush administration's campaign against terrorism. In Los Angeles, the judge, Audrey B. Collins of Federal District Court, said in a decision made public on Monday that a provision in the law banning certain types of support for terrorist groups was so vague that it risked running afoul of the First Amendment. Civil liberties advocates hailed the decision as an important victory in efforts to rein in what they regard as legal abuses in the government's antiterrorism initiatives. The Justice Department defended the law as a crucial tool in the fight against terrorists and promised to review the Los Angeles ruling. At issue was a provision in the act, passed by Congress after the attacks of Sept. 11, 2001, that expanded previous antiterrorism law to prohibit anyone from providing "expert advice or assistance" to known terrorist groups. The measure was part of a broader set of prohibitions that the administration has relied heavily on in prosecuting people in Lackawanna, N.Y., Portland, Ore., Detroit and elsewhere accused of providing money, training, Internet services and other "material support" to terrorist groups. In Los Angeles, several humanitarian groups that work with Kurdish refugees in Turkey and Tamil residents of Sri Lanka had sued the government, arguing in a lawsuit that the antiterrorism act was so ill defined that they had stopped writing political material and helping organize peace conferences for fear that they would be prosecuted. Judge Collins agreed that the ban on providing advice and assistance to terrorists was "impermissibly vague" and blocked the Justice Department from enforcing it against the plaintiffs. "The USA Patriot Act places no limitation on the type of expert advice and assistance which is prohibited, and instead bans the provision of all expert advice and assistance regardless of its nature," Judge Collins wrote in a ruling issued late Friday. As a result, the law could be construed to include "unequivocally pure speech and advocacy protected by the First Amendment," wrote the judge, who was appointed to the bench by President Bill Clinton. At the same time, however, Judge Collins sided with the government in rejecting some of the plaintiffs' arguments, and she declined to grant a nationwide injunction against the Justice Department. Even so, lawyers for the humanitarian groups said they were heartened by the ruling. It came seven weeks after many of the same plaintiffs won a ruling in a separate but related case before a federal appeals court in San Francisco. That court, the United States Court of Appeals for the Ninth Circuit, found that a 1996 antiterrorism law prohibiting anyone from providing training or personnel for terrorist groups was too vague to pass constitutional muster. In recent months, other courts have also challenged the administration's designation of enemy combatants and other aspects of the campaign against terrorism, but the Los Angeles decision was the first by a federal judge to strike down any portion of the Patriot Act. "The critical thing here is that this is the first demonstration that courts will not allow Congress in the name of fighting terrorism to ignore our constitutional rights," said Nancy Chang, a senior lawyer with the Center for Constitutional Rights, the New York-based organization that brought the lawsuit against the Justice Department on behalf of the humanitarian groups. "By using a broad and vague definition of terrorism, that has a chilling effect on free speech." The Justice Department, which already sought a review of the related decision in San Francisco, also plans to review Judge Collins's ruling to decide whether it should be appealed, officials said. Administration officials have made clear that they consider the Patriot Act to be an integral part of their efforts to identify, track and disrupt terrorist activities. Indeed, President Bush < http://www.nytimes.com/top/news/washington/campaign2004/candidates/georgewbush/index.html> in his State of the Union message last week urged Congress to renew parts of the act that are scheduled to expire in 2005. But the administration may face a tough sell in Congress, with a growing number of lawmakers from both parties questioning whether the government's expanded powers in dozens of areas of law enforcement have infringed on civil liberties. In largely symbolic votes, more than 230 communities nationwide have raised formal objections to the law. Mark Corallo, a spokesman for the Justice Department, said in a statement on Monday that the language banning expert advice or assistance to terrorists represented only "a modest enhancement" of previous law. "By targeting those who provide material support by providing expert advice or assistance," Mr. Corallo said, "the law made clear that Americans are threatened as much by the person who teaches a terrorist to build a bomb as by the one who pushes the button." [Non-text portions of this message have been removed] 8191 From: Andy Cuff Date: Tue Jan 27, 2004 5:26am Subject: Re: Big Brother' brings peace of mind Hi Folks, Here in the UK you can hardly step outside your house without appearing on CCTV somewhere, have any surveys been conducted on a nation by nation basis comparing number of CCTV systems vs. populous? -andy Talisker Security Tools Directory http://www.securitywizardry.com ----- Original Message ----- From: To: Sent: Monday, January 26, 2004 3:02 PM Subject: [TSCM-L] Big Brother' brings peace of mind > 'Big Brother' brings peace of mind > By Malcolm Brown > January 27, 2004 > > The death of student Mike Lee, whose body was found in a wheelie bin in Surry > Hills on January 5, might have gone down as another of Sydney's unsolved > murders, or at best, the unlawful disposal of a body. > > But it was not so, according to a security camera in Reservoir Street, Surry > Hills. Lee had climbed into the wheelie bin on New Year's Eve. > > And Lyndsay van Blanken, found dead under units in the eastern suburbs on > January 10, was filmed by a security camera at Bondi Junction railway station at > 5.58pm the day she disappeared, November 24 last year. > > The low price, convenient storage and high definition of digital images has > accelerated the boom in closed-circuit television (CCTV) in shops, offices, > business districts, transport, car parks, streets and homes. > > While it has raised the spectre of Big Brother, particularly in the > workplace, crimes have been solved. Terry Murphy, executive director of the Australian > Security Industry Association, said: "As long as somebody is watching and > making sure it cannot be used as a Big Brother, this industry does not have a > problem." > > The association's commercial services manager, Bryan De Caires, said volume > alone testified to the acceptance of the system. "Thousands and thousands" of > cameras were being installed each year. > > The electronic security sector in Australia was worth just under $2 billion a > year, including up to $200 million a year from CCTV. > > Steve Wheeler, the general manager, technology, for Chubb Security, said that > its CCTV business in Australia was growing about 30 per cent a year. > > And Jeffrey Tonazzi, NSW regional manager for Vangren Technology, said that > CCTV makes up to 50 per cent of its business in some markets. > > Mr Wheeler said the uncertain state of the world boosted the market, which > might "taper off" if things settled down. > > Features are growing while prices fall. Glen Watkins, assistant CCTV manager > for Ness Security Products, said a camera system that might have cost $20,000 > three years ago now costs $7000. The market had been held back by cost and > technical barriers, but now it was thriving. > > "You're looking at $500 for a good quality camera for a lunch shop or > something like that," he said. > > "If you want an external camera you are looking at $1000 or $1200. But you > can get a cheap one for $100. People are flocking to get them now." > > The NSW Electronic Surveillance Act covers the sector in this state. Security > camera installers must be licensed, which entails a police check. Cameras > must have signs saying they are there. Notices must accompany cameras at work > stating their purpose, for example, assisting safety. And they cannot be used to > see into private areas. > > Privacy NSW warned the State Government in a report that while surveillance > cameras installed at work might initially be legitimate, they could over time > be used for things such as spying. But the security industry warns that cameras > do not guarantee security. Criminals can relocate their activities or use > disguises. > > This story was found at: > http://www.smh.com.au/articles/2004/01/26/1075087963249.html > > > > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to: > http://docs.yahoo.com/info/terms/ > > 8192 From: Fernando Martins Date: Wed Jan 28, 2004 1:30pm Subject: Re: Big Brother' brings peace of mind hi Andy The closest to the issue that I know of is this: http://www.privacyinternational.org/survey/phr2003/threats.htm#Video%20Surveillance But I think UK wins easy any survey ;> Regarding Big Brother issues, the news here is that, after cctv and access control databases, RF ID is now under the personal data protection law. FM ----- Original Message ----- From: "Andy Cuff" To: ; Sent: Tuesday, January 27, 2004 11:26 AM Subject: Re: [TSCM-L] Big Brother' brings peace of mind > Hi Folks, > Here in the UK you can hardly step outside your house without appearing on > CCTV somewhere, have any surveys been conducted on a nation by nation basis > comparing number of CCTV systems vs. populous? > > -andy > Talisker Security Tools Directory > http://www.securitywizardry.com 8193 From: Steve Uhrig Date: Wed Jan 28, 2004 8:14pm Subject: Riser Bond TDR recall Riser Bond, now known as Radiodetection Company, has issued a safety recall for their 6000 series TDRs. Most professional TSCMers use some form of TDR for checking phone lines, with the Riser Bond being by far the most popular. The specific models mentioned in the recall are 6000, 6000DSL, RD6000 (Standard, VF, DD) and 6000DT. There is a shock hazard, where under certain combinations of connection and operating conditions, the metallic parts of the connectors and case housing can become energized with potentially hazardous voltages. All units in this series are being taken out of service. Ultimately. the company will develop a mod for the unit to address the issues. That mod has not yet been released, so for now they're just recalling all units. Apparently they're taking this seriously, judging from the string of certified letters I've been receiving from them, seemingly one for every unit I've purchased. If you have one of the above, contact Mr. Chuck Morton of Radiodetection at 207-647-9495 x112 for instructions. Info on Riser Bond products can be found on their website www.riserbond.com. If anyone needs a TSCM industry standard 'yellow box' Riser Bond TDR (not the style being recalled), I have a number of used ones in stock for excellent prices, complete with documentation, accessories, fresh battery and recent calibration. Info here: http://www.swssec.com/part_one.html Other TSCM gear listed also. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: Cristian Date: Tue Jan 18, 2005 0:58pm Subject: second hand Any Oscor and Orion in second hand there? A friend of mine, with tight budget, wants them. Sorry for re-posting, I'm not sure about my bip@f... Please send a cc to cristianbip@y... Cristian 10648 From: A Grudko Date: Tue Jan 18, 2005 1:11pm Subject: RE: MI5 boss admits bugging Adams -----Original Message----- From: Tech Sec Lab [mailto:tscmteam@o...] > So, maybe, they would explain to me why the Gov would admit to doing something that they didn't actually do....? Diversion? --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 [Non-text portions of this message have been removed] 10649 From: James Greenwold Date: Tue Jan 18, 2005 5:43pm Subject: Re: Tetrascanner Advice I have a fine wire kit in the display case. Last used about 1962 in eastern Europe. No insulation but it becomes invisable. -- James Greenwold Bureau Of Techncial Services P.O. Box 191 Chippewa Falls, WI 54729 http://www.tacticalsurveillance.com jlg@t... voice 715-726-1400 Fax 715-726-2354 > From: DEMTEC@a... > Reply-To: TSCM-L@yahoogroups.com > Date: Tue, 18 Jan 2005 10:52:25 EST > To: tscm-l@yahoogroups.com > Subject: [TSCM-L] Tetrascanner Advice > > > Many Thanks again for your reply and some excellent ideas. > Simple micro shielded wire does seem difficult to obtain. The best I can do > here in the UK is 1.5mm o/d single screen grey fairly low quality from CPC > [order number CBBR 4177]. > Further to some recent discussions re RFID detection the ELEKTOR ELECTRONICS > MAGAZINE Feb 2005 has printed an excellent article named RFID frenzy and a > project RFID Detector for 13.56 Mhz.I have not had time to assimilate all the > details but seems well worth a look. > The mag has a website _www.elektor-electronics.co.uk_ > (http://www.elektor-electronics.co.uk) > Regards to all Dave > > David McGauley > TSCM [Technical Surveillance and Countermeasures] > Electronic Surveillance and Sweep Specialist > Electrical/Electronics Engineer ex Police > Demtec House > Ormskirk > Lancs L390HF > UK > 01695558544 > 07866206112 > demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) > > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10650 From: savanted1 Date: Tue Jan 18, 2005 9:56am Subject: Privacy Activists Brace for White House Push to Augment Privacy Activists Brace for White House Push to Augment Controversial Domestic Surveillance Powers According to former Republican congressman Bob Barr, now working as a speaker and consultant to organizations such as the American Civil Liberties Union, "The administration has made it clear that they do intend to continue their move to dramatically reduce privacy and constitutional protection for our citizens." He and other civil liberties advocates expect Patriot Act II provisions to resurface piecemeal, such as in the Anti-Terrorism Intelligence Tools Improvement Act of 2003 (HR3179). Bills trying to remedy some of the more invasive provisions of the Patriot Act, such as the Security and Freedom Ensured (SAFE) Act of 2003, are still stuck in the Senate and House respectively. A driver's license provision of the National Intelligence Reform and Terrorism Act, passed before the holiday recess, requires all drivers' licenses to include machine-readable, encoded data by the end of 2006, and gives the secretaries of Transportation and Homeland Security until mid-2006 to define the data. http://www.wired.com/news/print/0,1294,66242,00.html 10651 From: savanted1 Date: Tue Jan 18, 2005 9:57am Subject: Judge Rules Police Can Use GPS to Track Suspect Without Warrant A New York federal court judge, David Hurd, ruled that law enforcement agents who used a Global Positioning System (GPS) to bug a suspect's car without a court order, did not need a court warrant, noting the suspect "had no expectation of privacy in the whereabouts of his vehicle on a public roadway." There is a growing concern by privacy advocates, who are seeing more and more court rulings upholding the law enforcement practice of using GPS to secretly track vehicles without following judicial safeguards protecting privacy rights of an individual. Another concern is the court rulings legitimizing these law enforcement practices will influence the Supreme Court when it is called on to consider the legality of secret GPS tracking. http://news.com.com/Snooping+by+satellite/2100-1028_3-5533560.html 10652 From: G P Date: Wed Jan 19, 2005 0:12am Subject: Re: Privacy Activists Brace for White House Push to Augment This needs to be stopped immediately, they have more than enough power to do whatever they want with the original Patriot Act abomination that flushed the Constitution down the toilet. Bush et al are using their newfound powers to disrupt and destroy the credibility of U.S. citizens that would dare speak out against their corrupt regime and practice the hallowed right of public dissent. Pro se lawsuits directed against Administration officials is likely the only recourse at this point, it's apparent that the vast majority of Congress is being blackmailed at this point. --- savanted1 wrote: > > > > Privacy Activists Brace for White House Push to > Augment > Controversial Domestic Surveillance Powers > > > According to former Republican congressman Bob Barr, > now working as a > speaker and consultant to organizations such as the > American Civil > Liberties Union, "The administration has made it > clear that they do > intend to continue their move to dramatically reduce > privacy and > constitutional protection for our citizens." He and > other civil > liberties advocates expect Patriot Act II provisions > to resurface > piecemeal, such as in the Anti-Terrorism > Intelligence Tools > Improvement Act of 2003 (HR3179). Bills trying to > remedy some of the > more invasive provisions of the Patriot Act, such as > the Security and > Freedom Ensured (SAFE) Act of 2003, are still stuck > in the Senate and > House respectively. A driver's license provision of > the National > Intelligence Reform and Terrorism Act, passed before > the holiday > recess, requires all drivers' licenses to include > machine-readable, > encoded data by the end of 2006, and gives the > secretaries of > Transportation and Homeland Security until mid-2006 > to define the > data. > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > In low income neighborhoods, 84% do not own > computers. > At Network for Good, help bridge the Digital Divide! > http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10653 From: G P Date: Wed Jan 19, 2005 0:44am Subject: OT: EST/Landmark and NLP in the Bush Administration The Bush Administration is surrounded by EST/Landmark folks, using NLP and other cognitive sciences to manipulate popular opinion and the entire cabinet. The word "reality" and the phrase "creating new realities" is the earmark of Neuro-Linguistic Programming, and for some bizarre reason corporate NLP training is now being offered (at least in Europe and the Far East) in tandem with computer security training. Some links to EST and NLP at the end of this email, it's bad stuff and can easily "reprogram" individuals not educated in detecting the use of NLP in communications. Landmark Education Corporation is the main group that is pushing NLP and Eriksonian-based hypnotics into the mainstream. For example: "Steve Zaffron, Vice President of Development in the Landmark Education Corporation, defines a distinction as an idea which, 'opens a new way of relating to reality because reality is experienced differently for the person realising the distinction.' (Wruck and Eastley, 1997, p 8)." From an article by Ron Suskind in the New York Times: "In the summer of 2002, after I had written an article in Esquire that the White House didn't like about Bush's former communications director, Karen Hughes, I had a meeting with a senior adviser to Bush. He expressed the White House's displeasure, and then he told me something that at the time I didn't fully comprehend -- but which I now believe gets to the very heart of the Bush presidency. The aide said that guys like me were 'in what we call the reality-based community,' which he defined as people who 'believe that solutions emerge from your judicious study of discernible reality.' I nodded and murmured something about enlightenment principles and empiricism. He cut me off. 'That's not the way the world really works anymore,' he continued. 'We're an empire now, and when we act, we create our own reality. And while you're studying that reality -- judiciously, as you will -- we'll act again, creating other new realities, which you can study too, and that's how things will sort out. We're history's actors . . . and you, all of you, will be left to just study what we do.'" Some info on EST, NLP, and Bandler: http://skepdic.com/neurolin.html More about Bandler and the murder he was acquitted of: http://www.geocities.com/bandlertrial/bandler1.html Info on Landmark: http://www.transformations.net.nz/trancescript/purpose.html 10654 From: Tech Sec Lab Date: Wed Jan 19, 2005 6:34am Subject: RE: Mic Wire Dave In terms of wire quality you get what you pay for, therefore you should be looking at an ultra thin stranded copper cable if anything. If you are looking for ultra covert and the run is not too long you can get a single strand copper wire, bare, and then spray it with a non conductive paint, this means you get a medium that is no larger than a single strand of wire. But for long runs this is not practical. If you have to use long runs and need serious concealment I suggest you use a fibre optic mic. Regards -Ois ********************* Message: 1 Date: Tue, 18 Jan 2005 10:52:25 EST From: DEMTEC@A... Subject: Tetrascanner Advice Many Thanks again for your reply and some excellent ideas. Simple micro shielded wire does seem difficult to obtain. The best I can do here in the UK is 1.5mm o/d single screen grey fairly low quality from CPC [order number CBBR 4177]. Further to some recent discussions re RFID detection the ELEKTOR ELECTRONICS MAGAZINE Feb 2005 has printed an excellent article named RFID frenzy and a project RFID Detector for 13.56 Mhz.I have not had time to assimilate all the details but seems well worth a look. The mag has a website _www.elektor-electronics.co.uk_ (http://www.elektor-electronics.co.uk) Regards to all Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) 10655 From: Date: Wed Jan 19, 2005 5:46am Subject: Re: Mic Wire In a message dated 19/01/2005 12:37:12 GMT Standard Time, tscmteam@o... writes: Dave In terms of wire quality you get what you pay for, therefore you should be looking at an ultra thin stranded copper cable if anything. If you are looking for ultra covert and the run is not too long you can get a single strand copper wire, bare, and then spray it with a non conductive paint, this means you get a medium that is no larger than a single strand of wire. But for long runs this is not practical. If you have to use long runs and need serious concealment I suggest you use a fibre optic mic. Regards -Ois ********************* Message: 1 Date: Tue, 18 Jan 2005 10:52:25 EST From: DEMTEC@A... Subject: Tetrascanner Advice Many Thanks again for your reply and some excellent ideas. Simple micro shielded wire does seem difficult to obtain. The best I can do here in the UK is 1.5mm o/d single screen grey fairly low quality from CPC [order number CBBR 4177]. Further to some recent discussions re RFID detection the ELEKTOR ELECTRONICS MAGAZINE Feb 2005 has printed an excellent article named RFID frenzy and a project RFID Detector for 13.56 Mhz.I have not had time to assimilate all the details but seems well worth a look. The mag has a website _www.elektor-electronics.co.uk_ (http://www.elektor-electronics.co.uk) Regards to all Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) ------------------------ Yahoo! Groups Sponsor --------------------~--> In low income neighborhoods, 84% do not own computers. At Network for Good, help bridge the Digital Divide! _Click Here!_ (http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links Many Thanks for your reply Ois I have considered these various methods except the spray the wire option yes feasable for very short runs but still not screened Best Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom designed covert electronic audio and video devices. Sweep Services - Professional physical and Electronic countermeasures utilising state of the art laboratory radio scanning and detection equipment. Note: Any fellow WAPI and UKPIN members welcome to phone or call in to discuss projects and applications or simply for free advice. Workshop located alongside M58 junc 3. [Non-text portions of this message have been removed] 10656 From: kondrak Date: Wed Jan 19, 2005 11:07am Subject: Sidebar: Fill Your Jump Bag This is prob second nature to all of us, but nice to see it on another source... >http://www.computerworld.com/securitytopics/security/story/0,10801,98913,00.html > >By Dan Verton >JANUARY 17, 2005 >COMPUTERWORLD > >A "jump bag" is a collection of critical items you might need during >crisis response when an attacker invades your network. It should >contain these items: > >* Tape recorder or minidisk > >* Backup media > >* Binary backup software > >* CDs with statically linked binaries of critical OS executables > >* Forensic software > >* Windows NT and 2000 resource kits > >* Bootable CD-ROMs > >* USB token memory device > >* External hard drive > >* Small hub > >* Patch cables > >* Laptop with dual operating system capability > >* Call list and cell phone > >* Plastic baggies for handling evidence > >* Extra notebooks for taking notes > > > >_________________________________________ >Open Source Vulnerability Database (OSVDB) Everything is Vulnerable - >http://www.osvdb.org/ 10657 From: kondrak Date: Wed Jan 19, 2005 11:30am Subject: Re: Privacy Activists Brace for White House Push to Augment But the police-state marches on....if theres any impediment to it, they'll undoubtedly nuke some city to use more terror to make people give up their liberty. At 01:12 1/19/2005, you wrote: >This needs to be stopped immediately, they have more >than enough power to do whatever they want with the >original Patriot Act abomination that flushed the >Constitution down the toilet. > >Bush et al are using their newfound powers to disrupt >and destroy the credibility of U.S. citizens that >would dare speak out against their corrupt regime and >practice the hallowed right of public dissent. > >Pro se lawsuits directed against Administration >officials is likely the only recourse at this point, >it's apparent that the vast majority of Congress is >being blackmailed at this point. > >--- savanted1 wrote: > > > > > > > > > Privacy Activists Brace for White House Push to > > Augment > > Controversial Domestic Surveillance Powers > > > > > > According to former Republican congressman Bob Barr, > > now working as a > > speaker and consultant to organizations such as the > > American Civil > > Liberties Union, "The administration has made it > > clear that they do > > intend to continue their move to dramatically reduce > > privacy and > > constitutional protection for our citizens." He and > > other civil > > liberties advocates expect Patriot Act II provisions > > to resurface > > piecemeal, such as in the Anti-Terrorism > > Intelligence Tools > > Improvement Act of 2003 (HR3179). Bills trying to > > remedy some of the > > more invasive provisions of the Patriot Act, such as > > the Security and > > Freedom Ensured (SAFE) Act of 2003, are still stuck > > in the Senate and > > House respectively. A driver's license provision of > > the National > > Intelligence Reform and Terrorism Act, passed before > > the holiday > > recess, requires all drivers' licenses to include > > machine-readable, > > encoded data by the end of 2006, and gives the > > secretaries of > > Transportation and Homeland Security until mid-2006 > > to define the > > data. > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > the hands acquire shaking, the shaking is a > > warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== > > TSKS > > Yahoo! Groups Links > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10658 From: Agent Geiger Date: Wed Jan 19, 2005 0:20pm Subject: Re: Privacy Activists Brace for White House Push to Augment Pro Se lawsuits will only get you laughed out of courts and labeled a kook. If they actually got you somewhere, you'd be killed. --- kondrak wrote: > But the police-state marches on....if theres any > impediment to it, they'll > undoubtedly nuke some city to use more terror to > make people give up their > liberty. > > > At 01:12 1/19/2005, you wrote: > > >This needs to be stopped immediately, they have > more > >than enough power to do whatever they want with the > >original Patriot Act abomination that flushed the > >Constitution down the toilet. > > > >Bush et al are using their newfound powers to > disrupt > >and destroy the credibility of U.S. citizens that > >would dare speak out against their corrupt regime > and > >practice the hallowed right of public dissent. > > > >Pro se lawsuits directed against Administration > >officials is likely the only recourse at this > point, > >it's apparent that the vast majority of Congress is > >being blackmailed at this point. > > > >--- savanted1 wrote: > > > > > > > > > > > > > > Privacy Activists Brace for White House Push to > > > Augment > > > Controversial Domestic Surveillance Powers > > > > > > > > > According to former Republican congressman Bob > Barr, > > > now working as a > > > speaker and consultant to organizations such as > the > > > American Civil > > > Liberties Union, "The administration has made it > > > clear that they do > > > intend to continue their move to dramatically > reduce > > > privacy and > > > constitutional protection for our citizens." He > and > > > other civil > > > liberties advocates expect Patriot Act II > provisions > > > to resurface > > > piecemeal, such as in the Anti-Terrorism > > > Intelligence Tools > > > Improvement Act of 2003 (HR3179). Bills trying > to > > > remedy some of the > > > more invasive provisions of the Patriot Act, > such as > > > the Security and > > > Freedom Ensured (SAFE) Act of 2003, are still > stuck > > > in the Senate and > > > House respectively. A driver's license > provision of > > > the National > > > Intelligence Reform and Terrorism Act, passed > before > > > the holiday > > > recess, requires all drivers' licenses to > include > > > machine-readable, > > > encoded data by the end of 2006, and gives the > > > secretaries of > > > Transportation and Homeland Security until > mid-2006 > > > to define the > > > data. > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is > strength" > > > > > > To subscribe to the TSCM-L mailing list > visit: > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in > motion. > > > It is by the juice of Star Bucks that thoughts > > > acquire speed, > > > the hands acquire shaking, the shaking is a > > > warning. > > > It is by caffeine alone I set my mind in > motion. > > > > =================================================== > > > TSKS > > > Yahoo! Groups Links > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== > TSKS > >Yahoo! Groups Links > > > > > > > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - now with 250MB free storage. Learn more. http://info.mail.yahoo.com/mail_250 10659 From: G P Date: Wed Jan 19, 2005 2:50pm Subject: Re: Privacy Activists Brace for White House Push to Augment > Pro Se lawsuits will only get you laughed out of > courts and labeled a kook. Interesting opinion, as pro se litigants are held to a much lesser standard of legal review. Going pro se with a defense (or offense) is a significant advantage over professional counsel. >If they actually got you somewhere, you'd be killed. Very interesting. So by retaining professional legal counsel, one is immune to assassination...? Per that logic, we're going about this war in Iraq thing all wrong - we should be sending squadrons of laywers over there to defend our interests ;) The law is the law, period. 2752 people died in the September 11th attacks, but millions have been killed protecting that very same Constitution that has been trampled upon with the Patriot Act and upcoming Patriot Act II legislation. Our elected officials swore to uphold and defend the Constitution, not to rewrite history and laws to suit the military-industrial complex. Regards Greg > > --- kondrak wrote: > > > But the police-state marches on....if theres any > > impediment to it, they'll > > undoubtedly nuke some city to use more terror to > > make people give up their > > liberty. > > > > > > At 01:12 1/19/2005, you wrote: > > > > >This needs to be stopped immediately, they have > > more > > >than enough power to do whatever they want with > the > > >original Patriot Act abomination that flushed the > > >Constitution down the toilet. > > > > > >Bush et al are using their newfound powers to > > disrupt > > >and destroy the credibility of U.S. citizens that > > >would dare speak out against their corrupt regime > > and > > >practice the hallowed right of public dissent. > > > > > >Pro se lawsuits directed against Administration > > >officials is likely the only recourse at this > > point, > > >it's apparent that the vast majority of Congress > is > > >being blackmailed at this point. > > > > > >--- savanted1 wrote: > > > > > > > > > > > > > > > > > > > Privacy Activists Brace for White House Push > to > > > > Augment > > > > Controversial Domestic Surveillance > Powers > > > > > > > > > > > > According to former Republican congressman Bob > > Barr, > > > > now working as a > > > > speaker and consultant to organizations such > as > > the > > > > American Civil > > > > Liberties Union, "The administration has made > it > > > > clear that they do > > > > intend to continue their move to dramatically > > reduce > > > > privacy and > > > > constitutional protection for our citizens." > He > > and > > > > other civil > > > > liberties advocates expect Patriot Act II > > provisions > > > > to resurface > > > > piecemeal, such as in the Anti-Terrorism > > > > Intelligence Tools > > > > Improvement Act of 2003 (HR3179). Bills > trying > > to > > > > remedy some of the > > > > more invasive provisions of the Patriot Act, > > such as > > > > the Security and > > > > Freedom Ensured (SAFE) Act of 2003, are still > > stuck > > > > in the Senate and > > > > House respectively. A driver's license > > provision of > > > > the National > > > > Intelligence Reform and Terrorism Act, passed > > before > > > > the holiday > > > > recess, requires all drivers' licenses to > > include > > > > machine-readable, > > > > encoded data by the end of 2006, and gives the > > > > secretaries of > > > > Transportation and Homeland Security until > > mid-2006 > > > > to define the > > > > data. > > > > > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > > > > > > > > > > >======================================================== > > > > TSCM-L Technical Security Mailing > List > > > > "In a multitude of counselors there is > > strength" > > > > > > > > To subscribe to the TSCM-L mailing list > > visit: > > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > > > It is by caffeine alone I set my mind in > > motion. > > > > It is by the juice of Star Bucks that > thoughts > > > > acquire speed, > > > > the hands acquire shaking, the shaking is a > > > > warning. > > > > It is by caffeine alone I set my mind in > > motion. > > > > > > > =================================================== > > > > TSKS > > > > Yahoo! Groups Links > > > > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is > > strength" > > > > > > To subscribe to the TSCM-L mailing list > > visit: > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in > motion. > > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > > the hands acquire shaking, the shaking is a > > warning. > > > It is by caffeine alone I set my mind in > motion. > > > >=================================================== > > TSKS > > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > > > > __________________________________ > Do you Yahoo!? > Yahoo! Mail - now with 250MB free storage. Learn > more. > http://info.mail.yahoo.com/mail_250 > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > What would our lives be like without music, dance, > and theater? > Donate or volunteer in the arts today at Network for > Good! > http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM > === message truncated === 10660 From: Agent Geiger Date: Wed Jan 19, 2005 3:24pm Subject: Re: Privacy Activists Brace for White House Push to Augment You mistook my previous posting. I am not saying I do not agree with people bringing forth suits and defending themselves(I do it in small claims court all the time). My piont is, that if you try and take on the juggernaut in power, via constitional pro-se means, e.g., tax resisting, rescinding your drivers license and SSN, etc. You in the practical sense, will lose. the judges will either rule against you, or dismiss. All the time, you spend a lot of money, and get little true justice. However, the system remains intact. I am not saying it right. It is the fact. The deck is stacked all the way to the Supreme Court. How in the world can you win in "their" system, by playing by the rules they themselves do not play by? --- G P wrote: > > Pro Se lawsuits will only get you laughed out of > > courts and labeled a kook. > > Interesting opinion, as pro se litigants are held to > a > much lesser standard of legal review. Going pro se > with a defense (or offense) is a significant > advantage > over professional counsel. > > >If they actually got you somewhere, you'd be > killed. > > Very interesting. So by retaining professional > legal > counsel, one is immune to assassination...? Per > that > logic, we're going about this war in Iraq thing all > wrong - we should be sending squadrons of laywers > over > there to defend our interests ;) > > The law is the law, period. 2752 people died in the > September 11th attacks, but millions have been > killed > protecting that very same Constitution that has been > trampled upon with the Patriot Act and upcoming > Patriot Act II legislation. > > Our elected officials swore to uphold and defend the > Constitution, not to rewrite history and laws to > suit > the military-industrial complex. > > Regards > > Greg > > > > > --- kondrak wrote: > > > > > But the police-state marches on....if theres any > > > impediment to it, they'll > > > undoubtedly nuke some city to use more terror to > > > make people give up their > > > liberty. > > > > > > > > > At 01:12 1/19/2005, you wrote: > > > > > > >This needs to be stopped immediately, they have > > > more > > > >than enough power to do whatever they want with > > the > > > >original Patriot Act abomination that flushed > the > > > >Constitution down the toilet. > > > > > > > >Bush et al are using their newfound powers to > > > disrupt > > > >and destroy the credibility of U.S. citizens > that > > > >would dare speak out against their corrupt > regime > > > and > > > >practice the hallowed right of public dissent. > > > > > > > >Pro se lawsuits directed against Administration > > > >officials is likely the only recourse at this > > > point, > > > >it's apparent that the vast majority of > Congress > > is > > > >being blackmailed at this point. > > > > > > > >--- savanted1 wrote: > > > > > > > > > > > > > > > > > > > > > > > > Privacy Activists Brace for White House Push > > to > > > > > Augment > > > > > Controversial Domestic Surveillance > > Powers > > > > > > > > > > > > > > > According to former Republican congressman > Bob > > > Barr, > > > > > now working as a > > > > > speaker and consultant to organizations such > > as > > > the > > > > > American Civil > > > > > Liberties Union, "The administration has > made > > it > > > > > clear that they do > > > > > intend to continue their move to > dramatically > > > reduce > > > > > privacy and > > > > > constitutional protection for our citizens." > > > He > > > and > > > > > other civil > > > > > liberties advocates expect Patriot Act II > > > provisions > > > > > to resurface > > > > > piecemeal, such as in the Anti-Terrorism > > > > > Intelligence Tools > > > > > Improvement Act of 2003 (HR3179). Bills > > trying > > > to > > > > > remedy some of the > > > > > more invasive provisions of the Patriot Act, > > > such as > > > > > the Security and > > > > > Freedom Ensured (SAFE) Act of 2003, are > still > > > stuck > > > > > in the Senate and > > > > > House respectively. A driver's license > > > provision of > > > > > the National > > > > > Intelligence Reform and Terrorism Act, > passed > > > before > > > > > the holiday > > > > > recess, requires all drivers' licenses to > > > include > > > > > machine-readable, > > > > > encoded data by the end of 2006, and gives > the > > > > > secretaries of > > > > > Transportation and Homeland Security until > > > mid-2006 > > > > > to define the > > > > > data. > > > > > > > > > > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups > Sponsor > > > > > > > > > > > > > > > > > > > > > >======================================================== > > > > > TSCM-L Technical Security Mailing > > List > > > > > "In a multitude of counselors there is > > > strength" > > > > > > > > > > To subscribe to the TSCM-L mailing list > > > visit: > > > > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > > > > > It is by caffeine alone I set my mind in > > > motion. > > > > > It is by the juice of Star Bucks that > > thoughts > > > > > acquire speed, > > > > > the hands acquire shaking, the shaking is a > > > > > warning. > > > > > It is by caffeine alone I set my mind in > > > motion. > > > > > > > > > > > =================================================== > > > > > TSKS > > > > > Yahoo! Groups Links > > > > > > > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > === message truncated === __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10661 From: G P Date: Wed Jan 19, 2005 5:49pm Subject: Seriously OT: Privacy Activists Brace for White House Push to Augment --- Agent Geiger wrote: > You mistook my previous posting. > > I am not saying I do not agree with people bringing > forth suits and defending themselves(I do it in > small claims court all the time). My piont is, that > if you try and take on the juggernaut in power, via > constitional pro-se means, e.g., tax resisting, > rescinding your drivers license and SSN, etc. You > in the practical sense, will lose. You are confusing self-representation with the so-called "Common Law Court" movement. Pro se representation, or defense "In Pro Per" (latin translation of "for oneself) finds very strong protections from the 6th Amendment to the U.S. Constitution. The "Common Law Court" movement is what you are speaking of, and has no bearing on representing oneself in a civil or criminal proceeding. > the judges will either rule against you, or dismiss. That's what the appellate system is for. Any judge that openly defies the law, then is overturned on appeal loses serious credibility, especially if overturned by a pro se litigant. > All the time, you spend a lot of money, and get > little true justice. However, the system remains > intact. Your cost is your time. Filing a federal lawsuit costs $250 and the cost of serving the Complaint. > I am not saying it right. It is the fact. The deck > is stacked all the way to the Supreme Court. How in > the world can you win in "their" system, by playing > by the rules they themselves do not play by? Less than 2% of any case goes to trial, or is "litigated" in the common sense. Laws are laws are laws. If 50% of the U.S. was truly split over the recent election, then you can guarantee close to 50% of the judges on the bench right now are against the power grab exhibited by this Administration. A sympathetic judge is only an appeal or two away... Cheers Greg > > > --- G P wrote: > > > > Pro Se lawsuits will only get you laughed out of > > > courts and labeled a kook. > > > > Interesting opinion, as pro se litigants are held > to > > a > > much lesser standard of legal review. Going pro > se > > with a defense (or offense) is a significant > > advantage > > over professional counsel. > > > > >If they actually got you somewhere, you'd be > > killed. > > > > Very interesting. So by retaining professional > > legal > > counsel, one is immune to assassination...? Per > > that > > logic, we're going about this war in Iraq thing > all > > wrong - we should be sending squadrons of laywers > > over > > there to defend our interests ;) > > > > The law is the law, period. 2752 people died in > the > > September 11th attacks, but millions have been > > killed > > protecting that very same Constitution that has > been > > trampled upon with the Patriot Act and upcoming > > Patriot Act II legislation. > > > > Our elected officials swore to uphold and defend > the > > Constitution, not to rewrite history and laws to > > suit > > the military-industrial complex. > > > > Regards > > > > Greg > > > > > > > > --- kondrak wrote: > > > > > > > But the police-state marches on....if theres > any > > > > impediment to it, they'll > > > > undoubtedly nuke some city to use more terror > to > > > > make people give up their > > > > liberty. > > > > > > > > > > > > At 01:12 1/19/2005, you wrote: > > > > > > > > >This needs to be stopped immediately, they > have > > > > more > > > > >than enough power to do whatever they want > with > > > the > > > > >original Patriot Act abomination that flushed > > the > > > > >Constitution down the toilet. > > > > > > > > > >Bush et al are using their newfound powers to > > > > disrupt > > > > >and destroy the credibility of U.S. citizens > > that > > > > >would dare speak out against their corrupt > > regime > > > > and > > > > >practice the hallowed right of public > dissent. > > > > > > > > > >Pro se lawsuits directed against > Administration > > > > >officials is likely the only recourse at this > > > > point, > > > > >it's apparent that the vast majority of > > Congress > > > is > > > > >being blackmailed at this point. > > > > > > > > > >--- savanted1 wrote: > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Privacy Activists Brace for White House > Push > > > to > > > > > > Augment > > > > > > Controversial Domestic Surveillance > > > Powers > > > > > > > > > > > > > > > > > > According to former Republican congressman > > Bob > > > > Barr, > > > > > > now working as a > > > > > > speaker and consultant to organizations > such > > > as > > > > the > > > > > > American Civil > > > > > > Liberties Union, "The administration has > > made > > > it > > > > > > clear that they do > > > > > > intend to continue their move to > > dramatically > > > > reduce > > > > > > privacy and > > > > > > constitutional protection for our > citizens." > > > > > He > > > > and > > > > > > other civil > > > > > > liberties advocates expect Patriot Act II > > > > provisions > > > > > > to resurface > > > > > > piecemeal, such as in the Anti-Terrorism > > > > > > Intelligence Tools > > > > > > Improvement Act of 2003 (HR3179). Bills > > > trying > > > > to > > > > > > remedy some of the > > > > > > more invasive provisions of the Patriot > Act, > > > > such as > > > > > > the Security and > > > > > > Freedom Ensured (SAFE) Act of 2003, are > > still > > > > stuck > > > > > > in the Senate and > > > > > > House respectively. A driver's license > > > > provision of > > > > > > the National > > > > > > Intelligence Reform and Terrorism Act, > > passed > > > > before > > > > > > the holiday > > > > > > recess, requires all drivers' licenses to > > > > include > > > > > > machine-readable, > > > > > > encoded data by the end of 2006, and gives > > the > > > > > > secretaries of > > > > > > Transportation and Homeland Security until > > > > mid-2006 > > > > > > to define the > > > > > > data. > > > > > > > > > > > > > > > > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups > > Sponsor > > > > > > > === message truncated === 10662 From: Leanardo Date: Wed Jan 19, 2005 8:30am Subject: Off-topic Question re: Cellular system capacity Can anyone tell me what the "typical" call load of a single cellular base station? What I mean by call load is the total number of concurrent connections the base can handle at one time before a cellular user receives a network busy signal. I realize there are a number of variables, but I am just looking for a ball-park answer. Thanks, Bruce 10663 From: Nalesnik, Matthew Date: Wed Jan 19, 2005 0:15pm Subject: RE: Privacy Activists Brace for White House Push to Augment Does that mean you conspire to believe they crashed planes into the WTC and Pentagon, and PA, just to make provisions to take our liberties away? That's a strong accusation. If true, obviously it's time for revolution, and a new government (not that the current tax situation doesn't call for that anyway... different topic), but certainly NOT a Liberal one, cuz that's just a step towards Socialism, which is a step towards Communism, and if you think that your liberties are being trampled on now... But if it's not true - which I don't think it is - then we need to focus on real enemies... like the UN. -----Original Message----- From: kondrak [mailto:kondrak@s...] >>But the police-state marches on....if theres any impediment to it, they'll >>undoubtedly nuke some city to use more terror to make people give up their >>liberty. At 01:12 1/19/2005, you wrote: >This needs to be stopped immediately, they have more >than enough power to do whatever they want with the >original Patriot Act abomination that flushed the >Constitution down the toilet. > >Bush et al are using their newfound powers to disrupt >and destroy the credibility of U.S. citizens that >would dare speak out against their corrupt regime and >practice the hallowed right of public dissent. > >Pro se lawsuits directed against Administration >officials is likely the only recourse at this point, >it's apparent that the vast majority of Congress is >being blackmailed at this point. > >--- savanted1 wrote: > > > > > > > > > Privacy Activists Brace for White House Push to > > Augment > > Controversial Domestic Surveillance Powers > > > > > > According to former Republican congressman Bob Barr, > > now working as a > > speaker and consultant to organizations such as the > > American Civil > > Liberties Union, "The administration has made it > > clear that they do > > intend to continue their move to dramatically reduce > > privacy and > > constitutional protection for our citizens." He and > > other civil > > liberties advocates expect Patriot Act II provisions > > to resurface > > piecemeal, such as in the Anti-Terrorism > > Intelligence Tools > > Improvement Act of 2003 (HR3179). Bills trying to > > remedy some of the > > more invasive provisions of the Patriot Act, such as > > the Security and > > Freedom Ensured (SAFE) Act of 2003, are still stuck > > in the Senate and > > House respectively. A driver's license provision of > > the National > > Intelligence Reform and Terrorism Act, passed before > > the holiday > > recess, requires all drivers' licenses to include > > machine-readable, > > encoded data by the end of 2006, and gives the > > secretaries of > > Transportation and Homeland Security until mid-2006 > > to define the > > data. > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > the hands acquire shaking, the shaking is a > > warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== > > TSKS > > Yahoo! Groups Links > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10664 From: Bill & Tracy McDonnell Date: Wed Jan 19, 2005 6:33pm Subject: Re: Seriously OT: Privacy Activists Brace for White House Push to Augment It is very imprudent to deprive America of any of her privileges. If her commerce and friendship are of any importance to you, they are to be had on no other terms than leaving her in the full enjoyment of her rights." --Benjamin Franklin I found this and it fits perfectly with the Rights we have being taken away. I wrote an article not long ago about how we are no longer a Democracy. The U.S Reps. and Senators took it personal. They don't represent the constituents, they represent their investors, and the oil and pharmaceutical companies. You would be surprised the letters I received over the article! Bigdaddy www.bigdaddydanes.com ----- Original Message ----- From: G P To: TSCM-L@yahoogroups.com Sent: Wednesday, January 19, 2005 6:49 PM Subject: Seriously OT: [TSCM-L] Privacy Activists Brace for White House Push to Augment --- Agent Geiger wrote: > You mistook my previous posting. > > I am not saying I do not agree with people bringing > forth suits and defending themselves(I do it in > small claims court all the time). My piont is, that > if you try and take on the juggernaut in power, via > constitional pro-se means, e.g., tax resisting, > rescinding your drivers license and SSN, etc. You > in the practical sense, will lose. You are confusing self-representation with the so-called "Common Law Court" movement. Pro se representation, or defense "In Pro Per" (latin translation of "for oneself) finds very strong protections from the 6th Amendment to the U.S. Constitution. The "Common Law Court" movement is what you are speaking of, and has no bearing on representing oneself in a civil or criminal proceeding. > the judges will either rule against you, or dismiss. That's what the appellate system is for. Any judge that openly defies the law, then is overturned on appeal loses serious credibility, especially if overturned by a pro se litigant. > All the time, you spend a lot of money, and get > little true justice. However, the system remains > intact. Your cost is your time. Filing a federal lawsuit costs $250 and the cost of serving the Complaint. > I am not saying it right. It is the fact. The deck > is stacked all the way to the Supreme Court. How in > the world can you win in "their" system, by playing > by the rules they themselves do not play by? Less than 2% of any case goes to trial, or is "litigated" in the common sense. Laws are laws are laws. If 50% of the U.S. was truly split over the recent election, then you can guarantee close to 50% of the judges on the bench right now are against the power grab exhibited by this Administration. A sympathetic judge is only an appeal or two away... Cheers Greg > > > --- G P wrote: > > > > Pro Se lawsuits will only get you laughed out of > > > courts and labeled a kook. > > > > Interesting opinion, as pro se litigants are held > to > > a > > much lesser standard of legal review. Going pro > se > > with a defense (or offense) is a significant > > advantage > > over professional counsel. > > > > >If they actually got you somewhere, you'd be > > killed. > > > > Very interesting. So by retaining professional > > legal > > counsel, one is immune to assassination...? Per > > that > > logic, we're going about this war in Iraq thing > all > > wrong - we should be sending squadrons of laywers > > over > > there to defend our interests ;) > > > > The law is the law, period. 2752 people died in > the > > September 11th attacks, but millions have been > > killed > > protecting that very same Constitution that has > been > > trampled upon with the Patriot Act and upcoming > > Patriot Act II legislation. > > > > Our elected officials swore to uphold and defend > the > > Constitution, not to rewrite history and laws to > > suit > > the military-industrial complex. > > > > Regards > > > > Greg > > > > > > > > --- kondrak wrote: > > > > > > > But the police-state marches on....if theres > any > > > > impediment to it, they'll > > > > undoubtedly nuke some city to use more terror > to > > > > make people give up their > > > > liberty. > > > > > > > > > > > > At 01:12 1/19/2005, you wrote: > > > > > > > > >This needs to be stopped immediately, they > have > > > > more > > > > >than enough power to do whatever they want > with > > > the > > > > >original Patriot Act abomination that flushed > > the > > > > >Constitution down the toilet. > > > > > > > > > >Bush et al are using their newfound powers to > > > > disrupt > > > > >and destroy the credibility of U.S. citizens > > that > > > > >would dare speak out against their corrupt > > regime > > > > and > > > > >practice the hallowed right of public > dissent. > > > > > > > > > >Pro se lawsuits directed against > Administration > > > > >officials is likely the only recourse at this > > > > point, > > > > >it's apparent that the vast majority of > > Congress > > > is > > > > >being blackmailed at this point. > > > > > > > > > >--- savanted1 wrote: > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Privacy Activists Brace for White House > Push > > > to > > > > > > Augment > > > > > > Controversial Domestic Surveillance > > > Powers > > > > > > > > > > > > > > > > > > According to former Republican congressman > > Bob > > > > Barr, > > > > > > now working as a > > > > > > speaker and consultant to organizations > such > > > as > > > > the > > > > > > American Civil > > > > > > Liberties Union, "The administration has > > made > > > it > > > > > > clear that they do > > > > > > intend to continue their move to > > dramatically > > > > reduce > > > > > > privacy and > > > > > > constitutional protection for our > citizens." > > > > > He > > > > and > > > > > > other civil > > > > > > liberties advocates expect Patriot Act II > > > > provisions > > > > > > to resurface > > > > > > piecemeal, such as in the Anti-Terrorism > > > > > > Intelligence Tools > > > > > > Improvement Act of 2003 (HR3179). Bills > > > trying > > > > to > > > > > > remedy some of the > > > > > > more invasive provisions of the Patriot > Act, > > > > such as > > > > > > the Security and > > > > > > Freedom Ensured (SAFE) Act of 2003, are > > still > > > > stuck > > > > > > in the Senate and > > > > > > House respectively. A driver's license > > > > provision of > > > > > > the National > > > > > > Intelligence Reform and Terrorism Act, > > passed > > > > before > > > > > > the holiday > > > > > > recess, requires all drivers' licenses to > > > > include > > > > > > machine-readable, > > > > > > encoded data by the end of 2006, and gives > > the > > > > > > secretaries of > > > > > > Transportation and Homeland Security until > > > > mid-2006 > > > > > > to define the > > > > > > data. > > > > > > > > > > > > > > > > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups > > Sponsor > > > > > > > === message truncated === ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10665 From: Agent Geiger Date: Wed Jan 19, 2005 8:05pm Subject: RE: Privacy Activists Brace for White House Push to Augment I never said anything about planes did I? You are making incorrect inferences. --- "Nalesnik, Matthew" wrote: > > Does that mean you conspire to believe they crashed > planes into the WTC and Pentagon, and PA, just to > make provisions to take our liberties away? > That's a strong accusation. If true, obviously it's > time for revolution, and a new government (not that > the current tax situation doesn't call for that > anyway... different topic), but certainly NOT a > Liberal one, cuz that's just a step towards > Socialism, which is a step towards Communism, and if > you think that your liberties are being trampled on > now... > But if it's not true - which I don't think it is - > then we need to focus on real enemies... like the > UN. > > -----Original Message----- > From: kondrak [mailto:kondrak@s...] > > > >>But the police-state marches on....if theres any > impediment to it, they'll > >>undoubtedly nuke some city to use more terror to > make people give up their > >>liberty. > > > At 01:12 1/19/2005, you wrote: > > >This needs to be stopped immediately, they have > more > >than enough power to do whatever they want with the > >original Patriot Act abomination that flushed the > >Constitution down the toilet. > > > >Bush et al are using their newfound powers to > disrupt > >and destroy the credibility of U.S. citizens that > >would dare speak out against their corrupt regime > and > >practice the hallowed right of public dissent. > > > >Pro se lawsuits directed against Administration > >officials is likely the only recourse at this > point, > >it's apparent that the vast majority of Congress is > >being blackmailed at this point. > > > >--- savanted1 wrote: > > > > > > > > > > > > > > Privacy Activists Brace for White House Push to > > > Augment > > > Controversial Domestic Surveillance Powers > > > > > > > > > According to former Republican congressman Bob > Barr, > > > now working as a > > > speaker and consultant to organizations such as > the > > > American Civil > > > Liberties Union, "The administration has made it > > > clear that they do > > > intend to continue their move to dramatically > reduce > > > privacy and > > > constitutional protection for our citizens." He > and > > > other civil > > > liberties advocates expect Patriot Act II > provisions > > > to resurface > > > piecemeal, such as in the Anti-Terrorism > > > Intelligence Tools > > > Improvement Act of 2003 (HR3179). Bills trying > to > > > remedy some of the > > > more invasive provisions of the Patriot Act, > such as > > > the Security and > > > Freedom Ensured (SAFE) Act of 2003, are still > stuck > > > in the Senate and > > > House respectively. A driver's license > provision of > > > the National > > > Intelligence Reform and Terrorism Act, passed > before > > > the holiday > > > recess, requires all drivers' licenses to > include > > > machine-readable, > > > encoded data by the end of 2006, and gives the > > > secretaries of > > > Transportation and Homeland Security until > mid-2006 > > > to define the > > > data. > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is > strength" > > > > > > To subscribe to the TSCM-L mailing list > visit: > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in > motion. > > > It is by the juice of Star Bucks that thoughts > > > acquire speed, > > > the hands acquire shaking, the shaking is a > > > warning. > > > It is by caffeine alone I set my mind in > motion. > > > > =================================================== > > > TSKS > > > Yahoo! Groups Links > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== > TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > > > > > > Yahoo! Groups Sponsor > > > === message truncated === __________________________________ Do you Yahoo!? Yahoo! Mail - Find what you need with new enhanced search. http://info.mail.yahoo.com/mail_250 10666 From: G P Date: Wed Jan 19, 2005 9:54pm Subject: RE: Privacy Activists Brace for White House Push to Augment --- "Nalesnik, Matthew" wrote: > Does that mean you conspire to believe they crashed > planes into the WTC and Pentagon, and PA, just to > make provisions to take our liberties away? Doesn't take a rocket scientist to figure out that our interventionist foreign policy is to blame for the attacks. > then we need to focus on real enemies... like the > UN. Yep. This Iraq war is nothing but U.N. puppetry, and U.S. tax dollars have been enforcing U.N. mandates for decades. Bankruptcy is the preferred tactic for hostile takeover, insurmountable debt is the perfect leverage for a coup. Countries can be purposely bankrupted, just like companies routinely are. "...where the rule of law-governs the conduct of nations...in which a credible United Nations can use its peacekeeping role to fulfill the promise and vision of the UN's founders." -- George H. W. Bush, January 16, 1991, speech regarding hostilities with Iraq > > -----Original Message----- > From: kondrak [mailto:kondrak@s...] > > > >>But the police-state marches on....if theres any > impediment to it, they'll > >>undoubtedly nuke some city to use more terror to > make people give up their > >>liberty. > > > At 01:12 1/19/2005, you wrote: > > >This needs to be stopped immediately, they have > more > >than enough power to do whatever they want with the > >original Patriot Act abomination that flushed the > >Constitution down the toilet. > > > >Bush et al are using their newfound powers to > disrupt > >and destroy the credibility of U.S. citizens that > >would dare speak out against their corrupt regime > and > >practice the hallowed right of public dissent. > > > >Pro se lawsuits directed against Administration > >officials is likely the only recourse at this > point, > >it's apparent that the vast majority of Congress is > >being blackmailed at this point. > > > >--- savanted1 wrote: > > > > > > > > > > > > > > Privacy Activists Brace for White House Push to > > > Augment > > > Controversial Domestic Surveillance Powers > > > > > > > > > According to former Republican congressman Bob > Barr, > > > now working as a > > > speaker and consultant to organizations such as > the > > > American Civil > > > Liberties Union, "The administration has made it > > > clear that they do > > > intend to continue their move to dramatically > reduce > > > privacy and > > > constitutional protection for our citizens." He > and > > > other civil > > > liberties advocates expect Patriot Act II > provisions > > > to resurface > > > piecemeal, such as in the Anti-Terrorism > > > Intelligence Tools > > > Improvement Act of 2003 (HR3179). Bills trying > to > > > remedy some of the > > > more invasive provisions of the Patriot Act, > such as > > > the Security and > > > Freedom Ensured (SAFE) Act of 2003, are still > stuck > > > in the Senate and > > > House respectively. A driver's license > provision of > > > the National > > > Intelligence Reform and Terrorism Act, passed > before > > > the holiday > > > recess, requires all drivers' licenses to > include > > > machine-readable, > > > encoded data by the end of 2006, and gives the > > > secretaries of > > > Transportation and Homeland Security until > mid-2006 > > > to define the > > > data. > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is > strength" > > > > > > To subscribe to the TSCM-L mailing list > visit: > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in > motion. > > > It is by the juice of Star Bucks that thoughts > > > acquire speed, > > > the hands acquire shaking, the shaking is a > > > warning. > > > It is by caffeine alone I set my mind in > motion. > > > > =================================================== > > > TSKS > > > Yahoo! Groups Links > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== > TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > > > > > > Yahoo! Groups Sponsor > > === message truncated === 10667 From: G P Date: Wed Jan 19, 2005 10:00pm Subject: Re: Seriously OT: Privacy Activists Brace for White House Push to Augment Good for you! Where was the article published? The U.S. Reps and Senators SHOULD take it personally, they are guilty of high treason and have shredded the Constitution that they swore to uphold, respect, and protect. Rep. Ron Paul (R-TX) is one of the few honest members left. --- Bill & Tracy McDonnell wrote: > It is very imprudent to deprive America of any of > her privileges. If her commerce and friendship are > of any importance to you, they are to be had on no > other terms than leaving her in the full enjoyment > of her rights." --Benjamin Franklin > I found this and it fits perfectly with the Rights > we have being taken away. I wrote an article not > long ago about how we are no longer a Democracy. The > U.S Reps. and Senators took it personal. They don't > represent the constituents, they represent their > investors, and the oil and pharmaceutical companies. > You would be surprised the letters I received over > the article! > > Bigdaddy > www.bigdaddydanes.com 10668 From: Agent Geiger Date: Wed Jan 19, 2005 10:24pm Subject: RE: Privacy Activists Brace for White House Push to Augment --- G P wrote: > --- "Nalesnik, Matthew" > wrote: > > > Does that mean you conspire to believe they > crashed > > planes into the WTC and Pentagon, and PA, just to > > make provisions to take our liberties away? > > Doesn't take a rocket scientist to figure out that > our > interventionist foreign policy is to blame for the > attacks. > > > then we need to focus on real enemies... like the > > UN. > > Yep. This Iraq war is nothing but U.N. puppetry, > and > U.S. tax dollars have been enforcing U.N. mandates > for > decades. Bankruptcy is the preferred tactic for > hostile takeover, insurmountable debt is the perfect > leverage for a coup. Countries can be purposely > bankrupted, just like companies routinely are. What about all the U.N. resolutions against Israel? They have been breaking those for years, but the U.S. does not enforce them? > "...where the rule of law-governs the conduct of > nations...in which a credible United Nations can use > its peacekeeping role to fulfill the promise and > vision of the UN's founders." -- George H. W. Bush, > January 16, 1991, speech regarding hostilities with > Iraq > > > > > -----Original Message----- > > From: kondrak [mailto:kondrak@s...] > > > > > > >>But the police-state marches on....if theres any > > impediment to it, they'll > > >>undoubtedly nuke some city to use more terror to > > make people give up their > > >>liberty. > > > > > > At 01:12 1/19/2005, you wrote: > > > > >This needs to be stopped immediately, they have > > more > > >than enough power to do whatever they want with > the > > >original Patriot Act abomination that flushed the > > >Constitution down the toilet. > > > > > >Bush et al are using their newfound powers to > > disrupt > > >and destroy the credibility of U.S. citizens that > > >would dare speak out against their corrupt regime > > and > > >practice the hallowed right of public dissent. > > > > > >Pro se lawsuits directed against Administration > > >officials is likely the only recourse at this > > point, > > >it's apparent that the vast majority of Congress > is > > >being blackmailed at this point. > > > > > >--- savanted1 wrote: > > > > > > > > > > > > > > > > > > > Privacy Activists Brace for White House Push > to > > > > Augment > > > > Controversial Domestic Surveillance > Powers > > > > > > > > > > > > According to former Republican congressman Bob > > Barr, > > > > now working as a > > > > speaker and consultant to organizations such > as > > the > > > > American Civil > > > > Liberties Union, "The administration has made > it > > > > clear that they do > > > > intend to continue their move to dramatically > > reduce > > > > privacy and > > > > constitutional protection for our citizens." > He > > and > > > > other civil > > > > liberties advocates expect Patriot Act II > > provisions > > > > to resurface > > > > piecemeal, such as in the Anti-Terrorism > > > > Intelligence Tools > > > > Improvement Act of 2003 (HR3179). Bills > trying > > to > > > > remedy some of the > > > > more invasive provisions of the Patriot Act, > > such as > > > > the Security and > > > > Freedom Ensured (SAFE) Act of 2003, are still > > stuck > > > > in the Senate and > > > > House respectively. A driver's license > > provision of > > > > the National > > > > Intelligence Reform and Terrorism Act, passed > > before > > > > the holiday > > > > recess, requires all drivers' licenses to > > include > > > > machine-readable, > > > > encoded data by the end of 2006, and gives the > > > > secretaries of > > > > Transportation and Homeland Security until > > mid-2006 > > > > to define the > > > > data. > > > > > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > > > > > > > > > > >======================================================== > > > > TSCM-L Technical Security Mailing > List > > > > "In a multitude of counselors there is > > strength" > > > > > > > > To subscribe to the TSCM-L mailing list > > visit: > > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > > > It is by caffeine alone I set my mind in > > motion. > > > > It is by the juice of Star Bucks that > thoughts > > > > acquire speed, > > > > the hands acquire shaking, the shaking is a > > > > warning. > > > > It is by caffeine alone I set my mind in > > motion. > > > > > > > =================================================== > > > > TSKS > > > > Yahoo! Groups Links > > > > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is > > strength" > > > > > > To subscribe to the TSCM-L mailing list > > visit: > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in > motion. > > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > > the hands acquire shaking, the shaking is a > > warning. > > > It is by caffeine alone I set my mind in > motion. > === message truncated === __________________________________ Do you Yahoo!? Yahoo! Mail - Find what you need with new enhanced search. http://info.mail.yahoo.com/mail_250 10669 From: A Grudko Date: Thu Jan 20, 2005 3:24am Subject: RE: Privacy Activists Brace for White House Push to Augment -----Original Message----- From: Nalesnik, Matthew [mailto:matthew.nalesnik@t...] > If true, obviously it's time for revolution, and a new government (not that the current tax situation doesn't call for that anyway... different topic), but certainly NOT a Liberal one, cuz that's just a step towards Socialism, which is a step towards Communism, and if you think that your liberties are being trampled on now. But if it's not true - which I don't think it is - then we need to focus on real enemies... like the UN. Can we stay away from political grandstanding and stick to TSCM issues? There are plenty of other places on the net to rant about conspiracies and the evils of politics. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 [Non-text portions of this message have been removed] 10670 From: Tech Sec Lab Date: Thu Jan 20, 2005 7:30am Subject: RE: Cellular system capacity Well its more on topic than the rest of the posts at the mo. It depends on the cell system. GSM which uses FDMA/TDMA can usually cope with a thousand ish. This is divided up into various providers, ie maybe 3 or so, o2, Vodafone and Orange. CDMA can cope with more. It also depends on what freq bands the cell runs on. For GSM if it runs on 1800 and 1900 the you push capacity to whichever frequency band is light. In GSM-900 there is 124 channels, each divided into 8 timeslots. Time-slot number 0 is usually used to communicate control information, this gives the possibility to have 868 calls at the same time. Regards -Ois *************************** Message: 9 Date: Wed, 19 Jan 2005 14:30:36 -0000 From: "Leanardo" Subject: Off-topic Question re: Cellular system capacity Can anyone tell me what the "typical" call load of a single cellular base station? What I mean by call load is the total number of concurrent connections the base can handle at one time before a cellular user receives a network busy signal. I realize there are a number of variables, but I am just looking for a ball-park answer. Thanks, Bruce 10671 From: James M. Atkinson Date: Thu Jan 20, 2005 9:48am Subject: McDonald's in Boca to offer glimpse into world of espionage By Luis F. Perez Staff Writer January 14, 2005 Boca Raton ∑ He's an international man of intrigue who's bringing some of the old trade secrets from the espionage world to, well, a McDonald's. It's not just any McDonald's restaurant, however. H. Keith Melton -- an intelligence historian, author of several spy history books and businessman -- today opens the McDonald's Spy CafÈ at the tony Shoppes at Boca Center on Military Trail. The exhibit is a small sampling of the more than 7,000 artifacts Melton has collected from intelligence agencies all over the world. "These are real spy gadgets, not James Bond," Melton said. "James Bond is about assassinations and seduction, which is the antithesis of real espionage. In the real world, espionage is about information and communication." So the sizzle at the restaurant won't be between the sheets, but on the grill, and in the exhibit that includes a World War II-vintage Enigma cipher machine, one of the few remaining in the world, Mata Hari's bra and a Maxwell Smart-like spy shoe. Melton, who lives in the city, a crew of workers and Vladimir Alexeenko, who says he is a former KGB agent, on Thursday put the finishing touches on the exhibit. In 1994, the old spy met the spy historian in Moscow while Melton worked on a television documentary. Alexeenko, who said his father and grandfather before him also were spies, has since collaborated with Melton on several projects as a consultant on KGB history. While working for the Soviet Union, Alexeenko helped protect Soviet embassies and trade missions. He learned how to use different spy devices and became a member of the team that searched for bugs in new buildings, Alexeenko said. "I left the KGB in 1992," Alexeenko said in a heavy Russian accent. After his spy days, he started a security business. So aside from helping with Melton's exhibit, he also installed the restaurant's security cameras. On Thursday, Alexeenko worked at a laptop computer in a corner of the restaurant, putting on a gray trench coat with the collar turned up when the machine-cooled air became too cold. This isn't Alexeenko's first visit to Boca Raton. He traveled here in 1998 to work on Melton's private collection called The Spy Museum, which is one of a kind. "He has many, many absolutely unique items," said Peter Earnest, executive director of the International Spy Museum in Washington D.C. Many of those items are specific to spies and individuals, and the artifacts are "very well cared for," he said. "I think he has the largest private collection in the world," Earnest said. Melton serves on the board of the International Spy Museum, which opened in April 2002, and was a major contributor to getting it started. He advised on the content and where to procure the items, Earnest said. Melton's collection also has fed other major spy exhibits. More than 500 of his devices are on display at the U.S. Central Intelligence Agency's Cold War Museum. And he also contributed a major portion of his collection documenting the agency that preceded the CIA -- the Office of Strategic Services -- to an internal agency museum. Melton owns 24 McDonald's restaurants in Broward and Palm Beach counties. He opened his first themed McDonald's in 1998 focusing on motorcycles. Others soon followed, featuring rock 'n' roll and movie monster memorabilia. He said he plans on converting all of them to a theme in the next three years. But it's the spy cafÈ that matches Melton's double life as an expert on espionage history and McDonald's owner. Patrons can share that expertise while munching on a Big Mac. They can sit next to the Enigma, which Germans used during the war for their most secret communications without knowing Allied forces eventually broke the code. Those fries can come with a lesson about Dutch-born dancer Margaretha Zelle, who used the stage name Mata Hari. She took up spying on her influential lovers for the Germans, but was caught and executed in 1918. And Maxwell Smart would be proud to eat near the shoes ordered by the U.S. ambassador in Czechoslovakia in the 1960s. The Czech intelligence service intercepted them to plant an eavesdropping system in the heel. "This is the real world of espionage," Melton said. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10672 From: kondrak Date: Thu Jan 20, 2005 11:21am Subject: Fwd: Wow! (OT) Nuther candidate for the bad radio people.....know theres radio ppl here, just A FYI >Read down to the narrative and the negative comments this guy got !! > > > >http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category=1502&item=5745431636&rd=1&ssPageName=WDVW > [Non-text portions of this message have been removed] 10673 From: kondrak Date: Thu Jan 20, 2005 11:27am Subject: Re: Off-topic Question re: Cellular system capacity Varies, by number of actual TX/RX units and the modulation scheme. At 09:30 1/19/2005, you wrote: >Can anyone tell me what the "typical" call load of a single cellular >base station? What I mean by call load is the total number of >concurrent connections the base can handle at one time before a >cellular user receives a network busy signal. I realize there are a >number of variables, but I am just looking for a ball-park answer. > >Thanks, Bruce > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10674 From: kondrak Date: Thu Jan 20, 2005 11:32am Subject: RE: Privacy Activists Brace for White House Push to Augment "I" don't, I'd never do that to my fellow citizens, but the possibility "someone" has, or will exists....theres certainly been enough conspiracies that are being covered up, all marching twords the same result, a totalitarian state replacing ours. Look at the recent cover-ups, OKC stands out. Especially under a socialist like Clinton's, (and her husband) watch. The DHS hires Primikov of the Ex-KGB to design "Internal passports" for US citizens, what conclusions should one draw? Im not liking what Im seeing.... At 13:15 1/19/2005, you wrote: >Does that mean you conspire to believe they crashed planes into the WTC >and Pentagon, and PA, just to make provisions to take our liberties away? >That's a strong accusation. If true, obviously it's time for revolution, >and a new government (not that the current tax situation doesn't call for >that anyway... different topic), but certainly NOT a Liberal one, cuz >that's just a step towards Socialism, which is a step towards Communism, >and if you think that your liberties are being trampled on now... >But if it's not true - which I don't think it is - then we need to focus >on real enemies... like the UN. > >-----Original Message----- >From: kondrak [mailto:kondrak@s...] > > > >>But the police-state marches on....if theres any impediment to it, they'll > >>undoubtedly nuke some city to use more terror to make people give up their > >>liberty. > > >At 01:12 1/19/2005, you wrote: > > >This needs to be stopped immediately, they have more > >than enough power to do whatever they want with the > >original Patriot Act abomination that flushed the > >Constitution down the toilet. > > > >Bush et al are using their newfound powers to disrupt > >and destroy the credibility of U.S. citizens that > >would dare speak out against their corrupt regime and > >practice the hallowed right of public dissent. > > > >Pro se lawsuits directed against Administration > >officials is likely the only recourse at this point, > >it's apparent that the vast majority of Congress is > >being blackmailed at this point. > > > >--- savanted1 wrote: > > > > > > > > > > > > > > Privacy Activists Brace for White House Push to > > > Augment > > > Controversial Domestic Surveillance Powers > > > > > > > > > According to former Republican congressman Bob Barr, > > > now working as a > > > speaker and consultant to organizations such as the > > > American Civil > > > Liberties Union, "The administration has made it > > > clear that they do > > > intend to continue their move to dramatically reduce > > > privacy and > > > constitutional protection for our citizens." He and > > > other civil > > > liberties advocates expect Patriot Act II provisions > > > to resurface > > > piecemeal, such as in the Anti-Terrorism > > > Intelligence Tools > > > Improvement Act of 2003 (HR3179). Bills trying to > > > remedy some of the > > > more invasive provisions of the Patriot Act, such as > > > the Security and > > > Freedom Ensured (SAFE) Act of 2003, are still stuck > > > in the Senate and > > > House respectively. A driver's license provision of > > > the National > > > Intelligence Reform and Terrorism Act, passed before > > > the holiday > > > recess, requires all drivers' licenses to include > > > machine-readable, > > > encoded data by the end of 2006, and gives the > > > secretaries of > > > Transportation and Homeland Security until mid-2006 > > > to define the > > > data. > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts > > > acquire speed, > > > the hands acquire shaking, the shaking is a > > > warning. > > > It is by caffeine alone I set my mind in motion. > > > =================================================== > > > TSKS > > > Yahoo! Groups Links > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > >It is by caffeine alone I set my mind in motion. >It is by the juice of Star Bucks that thoughts acquire speed, >the hands acquire shaking, the shaking is a warning. >It is by caffeine alone I set my mind in motion. >=================================================== TSKS > > > > > >Yahoo! Groups Sponsor > > >ADVERTISEMENT > > > > > > > > > > > _____ > >Yahoo! Groups Links >* To visit your group on the web, go to: >http://groups.yahoo.com/group/TSCM-L/ > >* To unsubscribe from this group, send an email to: >TSCM-L-unsubscribe@yahoogroups.com > > >* Your use of Yahoo! Groups is subject to the Yahoo! Terms of >Service . > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10675 From: kondrak Date: Thu Jan 20, 2005 11:33am Subject: Re: Seriously OT: Privacy Activists Brace for White House Push to Augment Got that right, I've always admired Ron Paul... At 23:00 1/19/2005, you wrote: >Good for you! Where was the article published? > >The U.S. Reps and Senators SHOULD take it personally, >they are guilty of high treason and have shredded the >Constitution that they swore to uphold, respect, and >protect. > >Rep. Ron Paul (R-TX) is one of the few honest members >left. > >--- Bill & Tracy McDonnell >wrote: > > > It is very imprudent to deprive America of any of > > her privileges. If her commerce and friendship are > > of any importance to you, they are to be had on no > > other terms than leaving her in the full enjoyment > > of her rights." --Benjamin Franklin > > I found this and it fits perfectly with the Rights > > we have being taken away. I wrote an article not > > long ago about how we are no longer a Democracy. The > > U.S Reps. and Senators took it personal. They don't > > represent the constituents, they represent their > > investors, and the oil and pharmaceutical companies. > > You would be surprised the letters I received over > > the article! > > > > Bigdaddy > > www.bigdaddydanes.com > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10676 From: Greg Horton Date: Wed Jan 19, 2005 10:47pm Subject: UN Resolutions? (Off Topic) What about all the U.N. resolutions against Israel? They have been breaking those for years, but the U.S. does not enforce them? Could you please be specific. Which resolutions are you talking about? I am not a real fan of Israel, but I don't remember a lot of resolutions that were brought forth unless it was the Muslim block of countries that proposed them. Greg From: James M. Atkinson, Comm-Eng Date: Fri Jan 19, 2001 0:24pm Subject: Re: Telephone Line Questions At 10:07 AM -0800 1/19/01, Dawn Star wrote: >From: Tom Suess >Subject: Telephone Line Questions > >Hi, > >Comments would be appreciated from list subscribers on the following >telephone line balance/audio amp./line noise questions: > >This ones easy, if you are not using a TDR you should not be >sweeping telephone lines for compensation. Roger > I have to agree with Roger. A good TDR and/or PINGer box is critical any any check of a phone line. In fact I feel that there are several "must have" instruments for performing any kind of legitimate telephone TSCM services (where someone is actually paying you for services). 1) A very high impedance low noise audio amplifier (ie 1059, uAmp, PicoDAC, etc) 2) A premium digital volt meter (Fluke 89, etc) 3) A decent hand held or similar small oscilloscope with bandwidth of 250 MHz of better, and a sensitivity down to at least 5mV (a 30-40 dB pre-amp may be handy here as well) 4) A dedicate TDR or PINGER box for the above mentioned oscilloscope. Personally I prefer a two line unit with a sync output 5) An interface so that the phone line can be tied into a search receiver or spectrum analyzer without blowing out either when the ring voltage comes down the wire. 6) Spectrum analyzer and/or Search Receiver from below 9 kHz up to at least 250 MHz and a DANL/Noise floor of at least -135 dBm. 7) Various craft tools and lesser instruments (tone generators, butt-in sets, inductive probes) Of course if you are only performing a cursory check of the lines then you have to limit your equipment and tests to a bare minimum. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2343 From: James M. Atkinson, Comm-Eng Date: Fri Jan 19, 2001 0:38pm Subject: Re: Telephone Line Questions At 3:40 PM -0800 1/18/01, Tom Suess wrote: >Reply to: James Atkinson > >Thanks for the help. The replies are listed below: > > > * line - 38.397 mA > * please explain "draw tone" The phone has to place a resistance across the line to create current flow. This current flow is detected at the central office/PBX where the line is seized. In days-of-old and in some modern systems the line actually runs though the coil of a relay which caused the relay to seize the line as the current started to flow. Determining how much current draw is required to "draw tone" is helpful to the TSCM'er as it flags potential mischief on the line. > > * line - infinity or no path > * instrument - 7.186 M Ohms You were not using the right DVM... the line resistance should be over 30 Mega ohms when battery is lifted. > > * no test instrument. James, could you list the methods for checking > 60 Hz to 5.0 kHz? Do you graph and overlay the frequency response, > or only look at several frequencies? What parameters are > considered normal/abnormal? Use a DVM specially designed for telcom work as they have a setting for C-Message noise, and one for broadband noise. If you have access to both ends of the wire you can use a sweep generator (with a loop voltage bias) and a spectrum analyzer. If you only have access to one end of the line they you can use a low frequency spectrum analyzer and check out the noise using the narrowest filters in the instrument. > > * no loading coils found...called and e-mailed TelCo for local office > field trip and they have not responded yet -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2344 From: Ray Fitgerald Date: Sat Jan 20, 2001 0:24am Subject: Re: Two new FBI agents were in a parking lot... [humor] They must have been blond female agents... -----Original Message----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Date: Thursday, January 18, 2001 4:33 PM Subject: [TSCM-L] Two new FBI agents were in a parking lot... [humor] > >Two new FBI agents were in a parking lot trying to unlock the door of >their car with a coat hanger. > >They tried and tried to get the door open, but they couldn't. > >The one with the coat hanger stopped for a moment to catch his >breath, and fellow agent said anxiously, "Hurry up! It's starting to >rain and the top is down." > >-jma >-- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > 2345 From: Rob Muessel Date: Fri Jan 19, 2001 0:47pm Subject: So much for digital phone security Take a look at this product's website, http://www.capturecalls.com/. and that of their parent company, http://www.mck.com . They are offering a recording interface compatible with many of the PBX protocols that are common in offices today. For under $400. Guess we'll have to work a little harder now. -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 2346 From: Dawn Star Date: Fri Jan 19, 2001 1:36pm Subject: Cover Your Ass "Second rule is always CYA (Cover Your Ass). You will be surprised how few friends and how many adversaries you will have if something goes wrong. Don't expect anyone else, like PI middlemen, to take a bullet for you. If I feel uncomfortable, even hold harmless agreements will not change that feeling." Steve Uhrig This is absolutely true, some years ago I had to leave Los Angeles and hide in the Desert for a month after one of those "everything goes wrong jobs" took place. It eventually got straightened out. Their was some confusion and until it was settled it was quite intense. Roger [Non-text portions of this message have been removed] 2347 From: Lesya Dyk Date: Fri Jan 19, 2001 4:21pm Subject: Re: So much for digital phone security Rob, This has been around for many years, at least for Nortel systems (I am a Canadian). Check out Nice Systems www.nice.com . They have a full line of digital monitoring gear originally designed for trading floors, dispatch, military etc. At the bottom end of their product line, they have a compact self contained unit that intercepts 4 channels of traffic transparently and has an easy to use analog audio output right on it (one per channel). It does however leave big tracks on your TDR display... > Take a look at this product's website, http://www.capturecalls.com/. > and that of their parent company, http://www.mck.com . > > They are offering a recording interface compatible with many of the PBX > protocols that are common in offices today. For under $400. > > Guess we'll have to work a little harder now. cheers, dyk@c... Robert Dyk Worldwide Security Ltd. Mississauga, Ontario Canada [Non-text portions of this message have been removed] 2348 From: Date: Fri Jan 19, 2001 1:36pm Subject: Linda Tripp Fired From Pentagon Job Linda Tripp Fired From Pentagon Job By DAVID PACE .c The Associated Press WASHINGTON (AP) - Linda Tripp, whose secret tape recordings spurred the impeachment of President Clinton, was fired Friday after she refused to resign like other political appointees. Her lawyers, who pleaded with the government to keep her in her job, portrayed the move as ``vindictive, mean-spirited and wrong.'' But administration officials said the termination letter she received was routine. They said she had to lose her job like nearly all other political appointees at the end of a presidential term. White House press secretary Jake Siewert said Tripp was treated as any other employee in her ``Schedule C'' classification. ``Most Schedule C employees were - virtually all were asked to submit their resignations, and if they didn't do so, they were terminated,'' said Siewert. Tripp's lawyers issued their statement just as Clinton reached a deal to settle the remaining legal issues from the Monica Lewinsky affair. It was Tripp's recordings of her conversations with the former White House intern that led to the scandal. Tripp, who earned $100,000 a year, was asked in recent days along with all other political appointees to resign in preparation for the change in administrations. On advice of her attorneys, she refused to do so, in a letter sent Thursday, addressed to Clinton. A Pentagon spokesman, Navy Rear Adm. Craig Quigley, said ``it really doesn't matter'' that Tripp did not resign. He said Tripp was notified, as a matter of routine, that her appointment ended Friday. ``All political appointees' term of service ends at the end of an administration,'' Quigley said. ``That's how it works.'' Stephen Kohn, a Tripp lawyer, blamed Clinton for the dismissal on the ground that the ultimate responsibility for firing political appointees rests solely with the president. ``She was asked to voluntarily submit her resignation, and she was not threatened with dismissal if she failed to submit it,'' Kohn said. Tripp was out of the country Friday and unavailable for comment. A 20-year government employee, Tripp began working in the White House in a civil service job under former President Bush. She stayed on after Clinton took office, receiving a political appointment, pay raise and a new job at the Pentagon in 1994. Tripp is suing the government, alleging the Clinton administration illegally released to The New Yorker magazine her statement on a security clearance form that she had never been arrested, when she had. She was arrested for grand larceny when she was a teen-ager, and the charge was later reduced to loitering. The Justice Department investigated the release of information but did not prosecute. ``She only became a political appointee after being fired by the White House,'' Kohn said. ``Her employer assisted in a smear campaign that renders her unemployable.'' Tripp was a public affairs specialist at the Defense Department's Defense Manpower Data Center in Arlington, Va. The tape recordings Tripp gave to Independent Counsel Kenneth Starr led to the perjury and obstruction of justice probe of Clinton, his impeachment by the House and a Senate trial that acquitted him. Tripp's tapes also led to her indictment on state wiretapping charges in Maryland, where a judge's ruling forced prosecutors to abandon their criminal case. AP-NY-01-19-01 1855EST 2349 From: Rob Muessel Date: Fri Jan 19, 2001 8:33pm Subject: Re: Linda Tripp Fired From Pentagon Job At least they didn't have her drawn and quartered. Might have been more appropriate. -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 2350 From: Mike Date: Fri Jan 19, 2001 0:11pm Subject: Micro pan-tilt devices I've been researching "Nitinol" properties lately with the thought of makeing VERY small pan-tilt devices that can be used with tiny CCD cameras or other small devices. Nitinol is a combination of 2 metals, usually about 55% nickle and the rest mostly Titanium. It has a few unique properties. A .003 " wire can exert 12 grams of force. (Nitinol can be bent to any shape and returns to its original shape when a small current is applied.) A larger diameter wire will exert more force if needed. When current is applied, Nitinol also contracts about 5% with a lot of force. This 5% contraction could easily be used in a simple ratcheting configuration that's spring biased thus allowing pan/tilt with few moving parts, no motors, ultra small sizes and "Remote" due to the low current required. (possible even mobile pan/tilt bugs/cameras in sizes smaller than a golf ball!) Very small robots using Nitinol in one way or another to provide remote mobility without motors already exist. Imagine one with a pan/tilt camera/bug being directed down a home or office air duct that can turn, climb, stop awhile then move if it spots someone sweeping? smiles... and with NO motors! I currently have one of the biggest producers on Nitinol making up a quote for a small simple pan/tilt device including a prototype and cost estimates for a large production run. Anyone interested in getting involved on a partnership basis? (X10 alone might buy thousands for their cheap remote cameras!) The possibilities for evolved and custom designs for the Gov or large companies or the Security Industry should be extrordinary. To do this right, I need more than just myself. Just too many money making pan/tilt devices can be made simply, at extremely low cost, with sizes from micro to mega. Reliability is far greater than motors driven units. Would like to hear from those that may be interested in Launching a product line form the beginning? (It will be fun designing these for various purposes!) Would also like to hear from any of you that may be able to sell "quantity" once things start going? Mostly, I'm hoping for some input? Do you think this is a viable product that will be succeed? Any ideas about designs/uses? (sure could use input here! smiles..) Nuff Said- Bootleg PS Nitinol is being used for many types of actuators and valves in recent inventions. Could have a "Lot" of Security uses as alarm actuators, pan/tilt, valves, Security robotics, auto trigger for cameras or even firearms, time delay, Gov applications and a million other things. (yes-that walking roach bug is easily possible and with a micro pan/tilt ccd camera built in!) What about a bug that can climb up your sinks drain and listen/view? Air ducts-piece of cake! Add small magnets or adhesive to its feet and the roach can go verticle or upside down on or in a metal surface. (Think what a Mouse size device packed with HE, BIO or Chem agents could do? Direct it through a companies/hotels air vent or even up the toilets drain to wait and watch until the target sits down?!! lol ) How about a roach that could sneak past guards or be guided to attach itself to a vehicle, then drop off or move to another location? How about a pan tilt ccd in a pager, cell phone, laptop, cars interior light dome, a baseball cap, pack of cigs, heel of a boot, etc., etc. Since a Nitinol pan/tilt device would basically have only a couple short nitinol wires, a bias spring and a small plastic ratcheting gear, it would weigh zip and could be very small in various configurations. If one used a short twisted Nitinol ribbon, one could apply current and the Nitinol ribbon would start untwisting and thus be another good pan/tilt device with only one moving part for each axis, the wire! WoW! Talk about making a small micro device? Nano/Millimeter applications/devices/robotics? Don't know yet! Centimeter or two? looks likely. IR, RF, laser, DC to Light or hard wired Remote Control? No Problemo [Non-text portions of this message have been removed] 2351 From: Tom Suess Date: Fri Jan 19, 2001 3:49pm Subject: Re: Telephone Line Questions Reply to: Roger Thanks for the help. The reply is listed below: < ...if you are not using a TDR you should not be sweeping telephone lines for compensation. * no compensation... I initiated the telephone troubleshooting question off list to a member, who suggested posting to this list for additional technical feedback. * I would never "sweep" for compensation without adequate instrumentation Regards, Tom Suess 2352 From: James M. Atkinson, Comm-Eng Date: Sat Jan 20, 2001 0:51am Subject: Last year I upgraded... Dear Tech Support: Last year I upgraded from Boyfriend 5.0 to Husband 1.0 and noticed that the new program began making unexpected changes to the accounting modules, limiting access to flower and jewelry applications that had operated flawlessly under Boyfriend 5.0. In addition, Husband 1.0 uninstalled many other valuable programs, such as Romance 9.9 but installed undesirable programs such as NFL 5.0 and NBA 3.0. Conversation 8.0 no longer runs and Housecleaning 2.6 simply crashes the system. I've tried running Nagging 5.3 to fix these problems, but to no avail. --Desperate *** Dear Desperate: Keep in mind, Boyfriend 5.0 is an entertainment package, while Husband 1.0 is an operating system. Try to enter the command: C:/ I THOUGHT YOU LOVED ME and install Tears 6.2. Husband 1.0 should then automatically run the applications: Guilty 3.0 and Flowers 7.0. But remember, overuse can cause Husband 1.0 to default to GrumpySilence 2.5, Happyhour 7.0 or Beer 6.1. Beer 6.1 is a very bad program that will create "Snoring Loudly" wave files. DO NOT install MotherInLaw 1.0 or reinstall another Boyfriend program. These are not supported applications and will crash Husband 1.0. In summary, Husband 1.0 is a great program, but it does have limited memory and cannot learn new applications quickly. Consider buying additional software to improve performance. I personally recommend HotFood 3.0 WildSex 6.9 and Lingerie 5.3. Tech Support -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2353 From: Date: Sat Jan 20, 2001 6:39am Subject: links include a guide to common bugs and wiretaps http://www.spy-nexus.com/ or Bug Detectors & Counter-Surveillance Equipment seems to be a site for Great Southern Security. The above link looks interesting. 2354 From: Ed Naylor Date: Sat Jan 20, 2001 1:51pm Subject: Re: links include a guide to common bugs and wiretaps >http://www.spy-nexus.com/ >Bug >Detectors & Counter-Surveillance Equipment > >seems to be a site for Great Southern Security. The above link looks >interesting. ================================= OPPORTUNITIES in YOUR OWN 'DE-BUGGING' BUSINESS! Learn how individuals without experience earn more than $200 per hour conducting sweeps! ================================= jma, I had no idea this was such a lucrative business for people with no experience. Ed 2355 From: Miguel Puchol Date: Sat Jan 20, 2001 6:48pm Subject: RE: links include a guide to common bugs and wiretaps Best jokes site I've seen this week !!! I really think the CSD-18 is used by the U.N., probably for listening to the Cosby Show.... Enough said! Have a good weekend, Mike > -----Mensaje original----- > De: Ed Naylor [mailto:ednaylor@p...] > Enviado el: sabado, 20 de enero de 2001 20:52 > Para: TSCM-L@egroups.com > Asunto: Re: [TSCM-L] links include a guide to common bugs and wiretaps > > > > >http://www.spy-nexus.com/ >Bug > >Detectors & Counter-Surveillance Equipment > > > >seems to be a site for Great Southern Security. The above link looks > >interesting. > ================================= > OPPORTUNITIES in YOUR OWN 'DE-BUGGING' BUSINESS! > Learn how individuals without > experience earn more than $200 per hour > conducting sweeps! > ================================= > jma, > > I had no idea this was such a lucrative business for people with > no experience. > > Ed > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2356 From: Gregory Horton Date: Sat Jan 20, 2001 10:13pm Subject: Bogus Endorsement First, I went to the spy-nexus list and had a good laugh. Let me state to the list that, unless things have radically changed since I left the LAPD, they do not endorse any products. Especially the small group of technicians that make up our varied electronics groups. As far as I remember, it is against the policy to endorse anything. Second, I just landed a job as an investigator with the local DA's office and am getting out of the business. I wish to thank all the members of the list for increasing my knowledge tenfold and the professionalism that exudes from every pore of this group. I don't think that any other group of individuals can claim a greater degree of expertise than the incredible knowledge base that makes up this list. Thank you Jim for running such a class act and I hate to leave but it is time to move on. Thanks to you all. Greg Horton 2357 From: James M. Atkinson, Comm-Eng Date: Sun Jan 21, 2001 3:13am Subject: Re: Bogus Endorsement At 8:13 PM -0800 1/20/01, Gregory Horton wrote: >First, I went to the spy-nexus list and had a good laugh. Let me state >to the list that, unless things have radically changed since I left the >LAPD, they do not endorse any products. Especially the small group of >technicians that make up our varied electronics groups. As far as I >remember, it is against the policy to endorse anything. > >Second, I just landed a job as an investigator with the local DA's >office and am getting out of the business. I wish to thank all the >members of the list for increasing my knowledge tenfold and the >professionalism that exudes from every pore of this group. I don't >think that any other group of individuals can claim a greater degree of >expertise than the incredible knowledge base that makes up this list. >Thank you Jim for running such a class act and I hate to leave but it is >time to move on. > >Thanks to you all. >Greg Horton Greg, Thank you for your kind words, they are greatly appreciated. Good luck in your new position, and feel free keep in touch as you never know when a TSCM'er may come in handy. The spy-nexus site really tickled me, but if someone if foolish enough to buy one of their products they will not last very long in this business. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2358 From: Jim Date: Mon Jan 22, 2001 8:31am Subject: SECURITY NOTICE > > The following is provided for your information. This is only one of many > types of disguised firearms. It is sometimes frustrating to wait during > security screening at our facilities and certain prohibitions on various > types of equipment may be difficult to understand. The existence of > weapons like this require a thorough, professional and sometimes lengthy > search. > > > Deadly Decoys Cell Phone Guns Discovered > > > > <<...OLE_Obj...>> > > Hitting the 5, 6, 7 and 8 buttons on the phone gun fires four .22 caliber > rounds in quick succession. (U.S. Customs Service) > > At first sight it looks like a regular cell phone - same size, same shape, > same overall appearance. But beneath the digital face lies a .22 caliber > pistol - a phone gun capable of firing four rounds in quick succession > with a touch of the otherwise standard keypad. > > European law enforcement officials - stunned by the discovery of these > deadly decoys - say phone guns are changing the rules of engagement in > Europe. "We find it very, very alarming," says Wolfgang Dicke of the > German Police union. "It means police will have to draw their weapons > whenever a person being checked reaches for their mobile phone." > > Although cell phone guns have not hit America yet, the FBI, the Bureau of > Alcohol, Tobacco and Firearms, and the U.S. Customs Service say they've > been briefed on the new weapons. "This criminal invention represents a > potentially serious threat to law enforcement and the public," said U.S. > Customs Service Commissioner Raymond W. Kelly. "We received word about > these guns last month. We have since alerted our field personnel to be on > the lookout for "cell phone guns" at U.S. ports of entry." > > Guns on the Move These new covert guns were first discovered in October > when Dutch police stumbled on a cache during a drug raid in Amsterdam. In > another recent incident a Croatian gun dealer was caught attempting to > smuggle a shipment through Slovenia into Western Europe. Police say both > shipments are believed to have originated in Yugoslavia. INTERPOL sent > out a warning to law enforcement agencies around the world. European > border police and customs officers are at a heightened state of alert at > all ports, airports and border crossings. > > Realistic Appearance 'If you didn't know they were guns, you wouldn't > suspect anything," said Ari Zandbergen, spokesman for the Amsterdam > police. "Only when you have one in your hand do you realize that they are > heavier," says Birgit Heib of the German Federal Criminal Investigation > Agency. The guns are loaded by twisting the phone in half, the .22 > caliber rounds fit into the top of the phone under the screen. The lower > half, under the keyboard, holds the firing pins. The bullets fire through > the antenna by pressing the keypad from numbers five to eight. > > Amsterdam police says they are very sophisticated machines constructed > inside gutted cell phones which do not light up or operate as real phones. > "These are very difficult to make. We believe experts are involved," says > Zandbergen. > > America on Alert > U.S. authorities, including the FBI, ATF, Federal Aviation Administration > and the U.S. Customs Service Authority have been supplied detailed > information and pictures of these new weapons. "They've been given a heads > up," said Jim Crandall, ATF spokesman. To date no phone guns have been > discovered either in the United States or in the process of being smuggled > in, authorities say. But they know it's only a matter of time. FAA > spokeswoman Rebecca Trexler said airport security officers had been > trained to deal with this new threat. "We don't want to tell the bad guys > exactly what we're looking for," she says, "We are trying to stay one step > ahead." > > Will Affect Travelers > Airport authorities across Europe are implementing systems to X-ray all > cell phones, those procedures will likely be followed by airports around > the world. "This is just one more item that we need to pay special > attention to because nowadays, of course just about every passenger > carries a mobile phone," says the spokesman for Frankfurt airport > security. Customs officials in the U.S. say their safety procedure has > normally been to require travelers to turn their phones on, however that > may no longer be enough. Cell phone users will have to be made aware that > reaching for their phones in some circumstances could be misinterpreted as > a threat by authorities. [Non-text portions of this message have been removed] 2359 From: Steve Whitehead Date: Mon Jan 22, 2001 8:11am Subject: T Swift List Members I noticed in the past that T Swift, author of Checking Telephone Lines took part in discussions on this list. I would appreciate it if someone could assist me with his e-mail address or if he could contact me with his address. Regards Steve Whitehead Managing Member TSCM Services cc Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) URL http://www.tscm.co.za E-mail sceptre@m... P O Box 16063, Lyttelton, 0140, Centurion, South Africa [Non-text portions of this message have been removed] 2360 From: Craig Snedden Date: Mon Jan 22, 2001 8:24am Subject: Re: links include a guide to common bugs and wiretaps ...Fell about the floor laughing...! I'm sure I made something that looked like the CSD18 in high school! Craig ----- Original Message ----- From: "Miguel Puchol" To: Sent: Sunday, January 21, 2001 12:48 AM Subject: RE: [TSCM-L] links include a guide to common bugs and wiretaps > Best jokes site I've seen this week !!! > > I really think the CSD-18 is used by the U.N., probably for listening to the > Cosby Show.... > > Enough said! > > Have a good weekend, > > Mike > > > > -----Mensaje original----- > > De: Ed Naylor [mailto:ednaylor@p...] > > Enviado el: sabado, 20 de enero de 2001 20:52 > > Para: TSCM-L@egroups.com > > Asunto: Re: [TSCM-L] links include a guide to common bugs and wiretaps > > > > > > > > >http://www.spy-nexus.com/ >Bug > > >Detectors & Counter-Surveillance Equipment > > > > > >seems to be a site for Great Southern Security. The above link looks > > >interesting. > > ================================= > > OPPORTUNITIES in YOUR OWN 'DE-BUGGING' BUSINESS! > > Learn how individuals without > > experience earn more than $200 per hour > > conducting sweeps! > > ================================= > > jma, > > > > I had no idea this was such a lucrative business for people with > > no experience. > > > > Ed > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 2361 From: Steve Uhrig Date: Mon Jan 22, 2001 4:25pm Subject: Re: T Swift Once upon a midnight dreary, Steve Whitehead pondered, weak and weary: > I noticed in the past that T Swift, author of Checking Telephone > Lines took part in discussions on this list. I would appreciate > it if someone could assist me with his e-mail address or if he > could contact me with his address. Ted Swift's website, with description of his excellent book on telephone wiretap detection: http://www.angelfire.com/biz/investigator/index.html You can email him through the site. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2362 From: James M. Atkinson, Comm-Eng Date: Mon Jan 22, 2001 5:12pm Subject: Re: Unfortunately there is way to much hype over this thing, and members of the law enforcement are going in complete hysterics without actually obtaining real information on the thing. It is not near the threat that people are claiming, is cumbersome to use, has very limited range, and would require the user to pretty much be in contact distance. If a suspect POINTS ANYTHING at you it should be considered a threat (not just a cell phone), but then you would be foolish to respond with lethal force when the guy was just trying to hand you a cell phone. Don't get all hysterical over such things... there are in effect firearms built into cell phone and pagers... but then you can also pack several grams of PETN into a cell phone an blow up a car with it. Be careful, be knowledgeable... but not hysterical... -jma At 9:31 AM -0500 1/22/01, Jim wrote: >SECURITY NOTICE >> >> The following is provided for your information. This is only one of many >> types of disguised firearms. It is sometimes frustrating to wait during >> security screening at our facilities and certain prohibitions on various >> types of equipment may be difficult to understand. The existence of >> weapons like this require a thorough, professional and sometimes lengthy >> search. >> >> >> Deadly Decoys Cell Phone Guns Discovered >> >> >> >> <<...OLE_Obj...>> >> >> Hitting the 5, 6, 7 and 8 buttons on the phone gun fires four .22 caliber >> rounds in quick succession. (U.S. Customs Service) >> >> At first sight it looks like a regular cell phone - same size, same shape, >> same overall appearance. But beneath the digital face lies a .22 caliber >> pistol - a phone gun capable of firing four rounds in quick succession >> with a touch of the otherwise standard keypad. >> >> European law enforcement officials - stunned by the discovery of these >> deadly decoys - say phone guns are changing the rules of engagement in >> Europe. "We find it very, very alarming," says Wolfgang Dicke of the >> German Police union. "It means police will have to draw their weapons >> whenever a person being checked reaches for their mobile phone." >> >> Although cell phone guns have not hit America yet, the FBI, the Bureau of >> Alcohol, Tobacco and Firearms, and the U.S. Customs Service say they've >> been briefed on the new weapons. "This criminal invention represents a >> potentially serious threat to law enforcement and the public," said U.S. >> Customs Service Commissioner Raymond W. Kelly. "We received word about >> these guns last month. We have since alerted our field personnel to be on >> the lookout for "cell phone guns" at U.S. ports of entry." >> >> Guns on the Move These new covert guns were first discovered in October >> when Dutch police stumbled on a cache during a drug raid in Amsterdam. In >> another recent incident a Croatian gun dealer was caught attempting to >> smuggle a shipment through Slovenia into Western Europe. Police say both >> shipments are believed to have originated in Yugoslavia. INTERPOL sent >> out a warning to law enforcement agencies around the world. European >> border police and customs officers are at a heightened state of alert at >> all ports, airports and border crossings. >> >> Realistic Appearance 'If you didn't know they were guns, you wouldn't >> suspect anything," said Ari Zandbergen, spokesman for the Amsterdam >> police. "Only when you have one in your hand do you realize that they are >> heavier," says Birgit Heib of the German Federal Criminal Investigation >> Agency. The guns are loaded by twisting the phone in half, the .22 >> caliber rounds fit into the top of the phone under the screen. The lower >> half, under the keyboard, holds the firing pins. The bullets fire through >> the antenna by pressing the keypad from numbers five to eight. >> >> Amsterdam police says they are very sophisticated machines constructed >> inside gutted cell phones which do not light up or operate as real phones. >> "These are very difficult to make. We believe experts are involved," says > > Zandbergen. >> >> America on Alert >> U.S. authorities, including the FBI, ATF, Federal Aviation Administration >> and the U.S. Customs Service Authority have been supplied detailed >> information and pictures of these new weapons. "They've been given a heads >> up," said Jim Crandall, ATF spokesman. To date no phone guns have been >> discovered either in the United States or in the process of being smuggled >> in, authorities say. But they know it's only a matter of time. FAA >> spokeswoman Rebecca Trexler said airport security officers had been >> trained to deal with this new threat. "We don't want to tell the bad guys >> exactly what we're looking for," she says, "We are trying to stay one step >> ahead." >> >> Will Affect Travelers >> Airport authorities across Europe are implementing systems to X-ray all >> cell phones, those procedures will likely be followed by airports around >> the world. "This is just one more item that we need to pay special >> attention to because nowadays, of course just about every passenger >> carries a mobile phone," says the spokesman for Frankfurt airport >> security. Customs officials in the U.S. say their safety procedure has >> normally been to require travelers to turn their phones on, however that >> may no longer be enough. Cell phone users will have to be made aware that >> reaching for their phones in some circumstances could be misinterpreted as > > a threat by authorities. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2363 From: James M. Atkinson, Comm-Eng Date: Mon Jan 22, 2001 5:03pm Subject: Re: links include a guide to common bugs and wiretaps All you really need is a cheap volt meter, a diode, a couple of cheap general purpose RF transistors, and several resistors for biasing with a coat hanger used for the antenna. Broadband diode detection systems actually do have a place in TSCM, but the TSCM'er has to be careful not to put too much faith in them, and always supplement them with a tuned system such as a spectrum analyzer, etc. Personally I prefer the REI CPM-700, and the Kaiser 2044 for broadband diode detection. IMHO, both instruments work very well, and seriously outperform the CSD and similar spy shop crap. -jma At 2:24 PM +0000 1/22/01, Craig Snedden wrote: >...Fell about the floor laughing...! > >I'm sure I made something that looked like the CSD18 in high school! > >Craig >----- Original Message ----- >From: "Miguel Puchol" >To: >Sent: Sunday, January 21, 2001 12:48 AM >Subject: RE: [TSCM-L] links include a guide to common bugs and wiretaps > > >> Best jokes site I've seen this week !!! >> >> I really think the CSD-18 is used by the U.N., probably for listening to >the >> Cosby Show.... >> >> Enough said! >> >> Have a good weekend, >> >> Mike >> >> >> > -----Mensaje original----- >> > De: Ed Naylor [mailto:ednaylor@p...] >> > Enviado el: sabado, 20 de enero de 2001 20:52 >> > Para: TSCM-L@egroups.com >> > Asunto: Re: [TSCM-L] links include a guide to common bugs and wiretaps >> > >> > >> > >> > >http://www.spy-nexus.com/ >Bug >> > >Detectors & Counter-Surveillance Equipment >> > > >> > >seems to be a site for Great Southern Security. The above link looks >> > >interesting. >> > ================================= >> > OPPORTUNITIES in YOUR OWN 'DE-BUGGING' BUSINESS! >> > Learn how individuals without >> > experience earn more than $200 per hour >> > conducting sweeps! >> > ================================= >> > jma, >> > >> > I had no idea this was such a lucrative business for people with >> > no experience. >> > > > > Ed -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2364 From: Dragos Ruiu Date: Mon Jan 22, 2001 2:54pm Subject: CanSecWest/core01 Conference Announcement I apologize in advance for the commercial content of this message, and I don't know the list policy about such matters, but I thought the subject material could be of interest to the readers. (And it's usually easier to get forgiveness than permission. :-) Some information for all of you regarding the CanSecWest/core01 Network Security Training Conference: The dates for this year's conference are March 28-30. It will be held again in downtown Vancouver, B.C. Canada. The current conference speaker lineup includes: Renaud Deraison - Author of Nessus, speaking about the Nessus attack scanner, giving an overview of scanner operations and a tutorial on Nessus Attack Scripting Language. [http://www.nessus.org] Martin Roesch - Author of the popular Snort Intrusion Detection System (IDS), speaking about new developments in IDSes. [http://www.snort.org] Ron Gula of Enterasys - VP of IDS products, Speaking about evading IDS systems. [http://www.network-defense.com] Dug Song of Arbor Networks - Author of many famous networking tools. Speaking about monkey in the middle attacks on encrypted protocols such as SSH and SSL. :-) [http://www.monkey.org/~dugsong/] Rain Forest Puppy - Will be speaking about assessing the web, with demonstrations of several new (previously unreleased) rfp.labs web tools including the release of Whisker 2.0 and other surprises in his inimitable style. [http://www.wiretrip.net] Mixter of 2XS Ltd. (Israel) - Author of several widely used distributed tools and some popular security whitepapers will give a talk about "The future of distributed applications" explaining the key elements of peer-to-peer networks, discussing a few examples/possibilities of distributed technology, and related security problems in distributed networks. [http://mixter.void.ru] K2 of w00w00 - Will present his new ADMutate, a multi-platform, polymorphic shell-code toolkit and libraries for detection evasion. [http://www.ktwo.ca] (Early reviews say it's scary good. --dr) Matthew Franz of Cisco - Author of Trinux, A Linux Security Toolkit, will give a presentation about rigorous product security testing, as implemented at Cisco. [http://www.trinux.org] Lance Spitzner of Sun - Will present more of the HoneyNet group's honeypot findings, including watching Romanian hackers on their own web cam while they were hacking one of his honeypots for their botnet. [http://project.honeynet.org] Theo DeRaadt of OpenBSD - Paper Title TBA [http://www.openbsd.org] Fyodor of insecure.org - Author of the popular nmap network scanner, will talk about new mapping and scanning tools and techniques. [http://www.insecure.org] Frank Heidt of @Stake - Paper Title TBA [http://www.atstake.com] HD Moore of Digital Defense- WIll give a surely popular talk about his more esoteric NT penetration test tricks in apresentation called "Making NT bleed." where he will cover some of the procedures he as had to develop during the course of cracking multiple systems for customers daily. [http://www.digitaldefense.net] Jay Beale of MandrakeSoft - Author the the Linux Bastille scripts and Security Team Director at MandrakeSoft, will talk about securing Linux. [http://www.bastille-linux.org] Kurt Seifried of SecurityPortal.com - Will moderate a panel debate about cryptography... a "two edged sword" including PKI, SSH and SSL. [http://www.securityportal.com] And some other excellent papers TBA. Schedule: ------- Afternoon (1-6), Wed Mar 28. All Day (10-6:30) (and night :-), Thurs Mar 29, Morning (10-2) Fri 30. There will be some Birds of a Feather sessions held at 6:30 on Thursday - these will be announced at the conference. -- The venue will be the Pacific Palisades Hotel Conference Center on Robson Street. The hotel web site can be found at www.pacificpallisadeshotel.com We have negotiated discounted rates for the CanSecWest conference with the hotel at $150/night regular, and $200/night suite for attendees. I'm told that some (but not all) suites now feature in room high speed network access. Attendees need to tell the reservations desk they are attending the CanSecWest conference. The conference this year will be held in the hotel itself in their meeting facility, and will feature a catering room, as well as a a vendor display area and a place to set up your computer to check e-mail. There will be a wireless 802.11 network and a "Capture The Flag" contest over the wireless net, on-going throughout the presentations. If you are bringing a PC with a wireless card, please ensure your firewalls are in good working order, as we assume no liability for what kind of traffic may be seen. (:-) This year, we will have a permanent coffee stand (after feedback from last year's sessions). Seating is limited and the venue is slightly smaller than last year so please book early to ensure a spot. How to register: -In the month of January, you may register by either sending PGP encrypted e-mail to dr@d... (gpg/pgp key on file at wwwkeys.pgp.net) with the following information: Your name Your company Your company address Visa card number/expiry Visa Billing Name and Address Your contact phone number. Your preferred e-mail address for conference mailings. (I'm sorry we still accept only VISA at this time and Mastercard or AmEx is not an option. We also accept pre-payment by couriered cheque or wire transfer of USD or CAD equivalents. Registrations are reserved upon receipt of cheque - please email dr@k... for further details about this payment method.) -Alternatively you can phone Dragos Ruiu at +1 (604) 722-3993 with the above information and he will process the VISA transaction manually. Please try to phone between 10:00AM-8:00PM PST, but an occasional odd hour phonecall from wierd timezones will be tolerated if it _absolutely_ cannot be avoided. If you prefer we can also reserve a hotel room on your credit card, if you specify dates. (We have been told that our block booking will have priority for the rooms with networking). In January the registration fee will be: USD$895 - for past attendees. USD$980 - for all others up until Jan 31. In February, an on-line booking system will be up at www.dursec.com and the registration fees for all will be USD$1120. In March, the registration fee will be USD$1350. Due to the slightly smaller venue we expect that registrations at the door will be extremely limited and potentially unavailable, at a cost of USD$1595. Vendor sponsorships are available at USD$2500, which as well as sponsoring a display table for the vendor also gives the vendor up to five attendee registrations at USD$580. The cut-off date for vendor sponsorships is March 15. Registration fees include catered lunches and coffee breaks. Thanks for your continuing support, and I hope we'll have a conference that will surpass the positive experiences of last years conference. I'm eager to see and hear the fascinating papers planned, and this year, we will be bringing back the popular technical book(s) (title TBD) that will be given to attendees, as well as having another conference CD-ROM full of goodies and some previously unreleased tools and information. I'm looking forward to seeing you ladies and gentlemen there. Thank You, --dr -- Dragos Ruiu dursec.com ltd. / kyx.net - we're from the future gpg/pgp key on file at wwwkeys.pgp.net 2365 From: Date: Tue Jan 23, 2001 3:27am Subject: Dashboard Double Agent Personal TechnologyTen O'clock Tech: Dashboard Double Agent Arik Hesseldahl, Forbes.com, 01.22.01, 10:00 AM ET NEW YORK - Possibly one of the most annoying aspects of business travel is keeping track of reimbursable expenses. From meals to travel expenses, entertainment and mileage, keeping track of it all is complicated, time-consuming and rarely fully accurate. So far, using computers has only made our final expense reports look neater when they're printed out. There's not much you can do to automate tracking the expenses you rack up. Or is there? TravelEyes2: Traveling tattletale A gadget announced last week called TravelEyes2 uses Global Positioning System (GPS) navigation satellites launched by the U.S. Department of Defense to help you keep track of where you've been. TravelEyes2's manufacturer, Advanced Tracking Technologies of Houston, has not released information about price or availability. It's basically a GPS receiver that remembers where you've been, how long you were on the road and all the stops you've made. It can then help produce reports based on the data it stores. Plus, when hitched to a laptop computer, which is optional, it can help you plan a trip, navigate your way from one place to another and keep you on course and on time. Powered by a cigarette lighter in the car, it can sit on the dashboard, constantly taking readings from the constellation of GPS satellites that circle the Earth, bombarding it with radio signals that can be used to pinpoint your precise location on the globe. When you get back to the office you can link it up to a desktop PC to produce a report. It can store data for up to 50 hours of driving time before needing to download to a computer. It collects data only while the car is moving. But it can also be used for tracking someone using the car without them knowing. Its manufacturer has gone a long way to making this device easy to conceal so that drivers may not know their movements are being tracked. Companies that mistrust their employees on company business may like this feature. So will some parents with teenage drivers who are prone to mischief or expensive speeding tickets. It can track routes traveled and vehicle speeds. TravelEyes2 is only about the size of the deck of cards. It also comes with an external antenna less than three inches square for picking up GPS signals from nearly anywhere in the car. Since GPS signals are generally weak and easily blocked (no typical GPS reader works in doors, for example), using a GPS receiver in the car usually requires having it sit on the dashboard so it can "see" the satellites. 2366 From: Dawn Star Date: Tue Jan 23, 2001 10:44am Subject: Broadband "Broadband diode detection systems actually do have a place in TSCM, but the TSCM'er has to be careful not to put too much faith in them, and always supplement them with a tuned system such as a spectrum analyzer, etc." jma They sure do! When the incompetents use them and get readings all over the place the pros get to redo the job, their good for business! Roger [Non-text portions of this message have been removed] 2367 From: James M. Atkinson, Comm-Eng Date: Tue Jan 23, 2001 11:34am Subject: Re: Broadband Diode Bovine Feces Detector At 8:44 AM -0800 1/23/01, Dawn Star wrote: >"Broadband diode detection systems actually do have a place in TSCM, >but the TSCM'er has to be careful not to put too much faith in them, >and always supplement them with a tuned system such as a spectrum >analyzer, etc." > jma > >They sure do! When the incompetents use them and get readings all >over the place the pros get to redo the job, their good for >business! Roger Good point, What really tickles are the guys who run out and buys a cheap broadband diode detection system with visions of instantly making millions of dollars a year as a bug sweeper, and then starts finding "signals from bugs" on every sweep. Of course he doesn't actually FIND the bug, but does lock onto the signals and classifies it as a "FBI, DEA, or CIA classified surveillance device" and goes on to tell his clients that the "feds are spying on him". The same thing happens when some green-horn TSCM'er gets their hands on a TDR... they see it as a magic box, and detect a bug behind every impedance bump out there (when there actually is no bug at all). Just because they see a -4 dB drop in a TDR trace does not near there is a parasitic device installed 1500 feet down the wire. All the equipment in the world is worthless unless the user has some real-world technical background (and not theoretical bovine feces) to put behind it. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2368 From: Steve Uhrig Date: Tue Jan 23, 2001 1:09pm Subject: Used equipment list updated Hello all, We have updated our used equipment page: http://www.swssec.com/used.html The page lists surveillance, countersurveillance, communications and other miscellaneous equipment for sale. We take credit cards and ship worldwide. Also updated is a similar page listing Minox submini cameras and accessories for sale: http://www.swssec.com/minox.html I buy used electronics and Minox items. Please contact me if you have anything available to sell. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2369 From: Dawn Star Date: Tue Jan 23, 2001 9:43pm Subject: Pole Climber "The same thing happens when some green-horn TSCM'er gets their hands on a TDR... they see it as a magic box, and detect a bug behind every impedance bump out there (when there actually is no bug at all). Just because they see a -4 dB drop in a TDR trace does not near there is a parasitic device installed 1500 feet down the wire." jma That's why if your not a pole climber, find another line of work Roger [Non-text portions of this message have been removed] 2370 From: A Grudko Date: Wed Jan 24, 2001 3:39am Subject: Climbing poles Our phone 'company' is owned by the State and they can get nasty if a non-employee goes up a pole, but I used to do it on all sweeps anyway, thanks to a 4 section folding ladder which was small enough to even fit in my Corvette. I used to be a hoby climber so I kept my harness, slings, Carabiners etc. in the car too for those really high cables, as well as a set of lock-picks, skeleton keys and lug keys to get into cable rooms and cupboards. But one fine morning I managed to loose both my 'vette and my left arm in one fell swoop, and now I have a legitimate reason to say I don't 'do' poles! Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2371 From: Dawn Star Date: Wed Jan 24, 2001 7:05pm Subject: LoJack System Does anyone on the list know the typical location in the vehicle of a LoJack auto theft transmitter, its general appearance and antenna configuration? Thanks, Roger [Non-text portions of this message have been removed] From: Nalesnik, Matthew Date: Thu Jan 20, 2005 7:59am Subject: RE: Privacy Activists Brace for White House Push to Augment Then what basis or precedent, besides a weak conspiracy theory, would you base this statement on "But the police-state marches on....if theres any impediment to it, they'll undoubtedly nuke some city to use *MORE* terror to make people give up their liberty"? (caps on 'MORE' mine) ? You've basically switched nukes for planes, and I may be mistaken, of course, but your implication is that the terror attacks that already happened were used to make people give up their liberty, and that the Bush administration would use *MORE* terror attacks (albeit nukes, or planes, or whatever) to take more liberties away. Would you like to clarify, or did I hit it on the head? -----Original Message----- From: Agent Geiger [mailto:agentgeiger@y...] Sent: Wednesday, January 19, 2005 9:06 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Privacy Activists Brace for White House Push to Augment I never said anything about planes did I? You are making incorrect inferences. --- "Nalesnik, Matthew" wrote: > > Does that mean you conspire to believe they crashed > planes into the WTC and Pentagon, and PA, just to > make provisions to take our liberties away? > That's a strong accusation. If true, obviously it's > time for revolution, and a new government (not that > the current tax situation doesn't call for that > anyway... different topic), but certainly NOT a > Liberal one, cuz that's just a step towards > Socialism, which is a step towards Communism, and if > you think that your liberties are being trampled on > now... > But if it's not true - which I don't think it is - > then we need to focus on real enemies... like the > UN. > > -----Original Message----- > From: kondrak [mailto:kondrak@s...] > > > >>But the police-state marches on....if theres any > impediment to it, they'll > >>undoubtedly nuke some city to use more terror to > make people give up their > >>liberty. > > > At 01:12 1/19/2005, you wrote: > > >This needs to be stopped immediately, they have > more > >than enough power to do whatever they want with the > >original Patriot Act abomination that flushed the > >Constitution down the toilet. > > > >Bush et al are using their newfound powers to > disrupt > >and destroy the credibility of U.S. citizens that > >would dare speak out against their corrupt regime > and > >practice the hallowed right of public dissent. > > > >Pro se lawsuits directed against Administration > >officials is likely the only recourse at this > point, > >it's apparent that the vast majority of Congress is > >being blackmailed at this point. > > > >--- savanted1 wrote: > > > > > > > > > > > > > > Privacy Activists Brace for White House Push to > > > Augment > > > Controversial Domestic Surveillance Powers > > > > > > > > > According to former Republican congressman Bob > Barr, > > > now working as a > > > speaker and consultant to organizations such as > the > > > American Civil > > > Liberties Union, "The administration has made it > > > clear that they do > > > intend to continue their move to dramatically > reduce > > > privacy and > > > constitutional protection for our citizens." He > and > > > other civil > > > liberties advocates expect Patriot Act II > provisions > > > to resurface > > > piecemeal, such as in the Anti-Terrorism > > > Intelligence Tools > > > Improvement Act of 2003 (HR3179). Bills trying > to > > > remedy some of the > > > more invasive provisions of the Patriot Act, > such as > > > the Security and > > > Freedom Ensured (SAFE) Act of 2003, are still > stuck > > > in the Senate and > > > House respectively. A driver's license > provision of > > > the National > > > Intelligence Reform and Terrorism Act, passed > before > > > the holiday > > > recess, requires all drivers' licenses to > include > > > machine-readable, > > > encoded data by the end of 2006, and gives the > > > secretaries of > > > Transportation and Homeland Security until > mid-2006 > > > to define the > > > data. > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Find what you need with new enhanced search. http://info.mail.yahoo.com/mail_250 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10678 From: Ian Wraith Date: Thu Jan 20, 2005 7:39am Subject: Re: Off-topic Question re: Cellular system capacity Hello Leanardo wrote: > Can anyone tell me what the "typical" call load of a single cellular > base station? What I mean by call load is the total number of > concurrent connections the base can handle at one time before a > cellular user receives a network busy signal. I realize there are a > number of variables, but I am just looking for a ball-park answer. Sadly I don't think there is anything like a typical base station ! With GSM (I don't know a lot about UMTS I'm afraid) there are some base stations that consist of a single carrier. As it is TDMA that would have 8 timeslots of which 7 could be used for calls. Then there are multi-sector sites transmitting multiple carriers with a capability of handling 100's of calls. Plus there are all sizes of base stations in-between. You also have to remember that in most urban environments a mobile can hear multiple base stations and if the strongest is totally saturated will use another. So I'm afraid there isn't an easy answer to your question. Regards Ian 10679 From: Nalesnik, Matthew Date: Thu Jan 20, 2005 8:01am Subject: RE: Privacy Activists Brace for White House Push to Augment True, and I even complained about that before, when the elections were near. That makes me a hypocrite, and I apologize... I never could resist an argument/debate, though - especially when it comes to something so close to my heart. -----Original Message----- From: A Grudko [mailto:agrudko@i...] Sent: Thursday, January 20, 2005 4:24 AM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Privacy Activists Brace for White House Push to Augment -----Original Message----- From: Nalesnik, Matthew [mailto:matthew.nalesnik@t...] > If true, obviously it's time for revolution, and a new government (not that the current tax situation doesn't call for that anyway... different topic), but certainly NOT a Liberal one, cuz that's just a step towards Socialism, which is a step towards Communism, and if you think that your liberties are being trampled on now. But if it's not true - which I don't think it is - then we need to focus on real enemies... like the UN. Can we stay away from political grandstanding and stick to TSCM issues? There are plenty of other places on the net to rant about conspiracies and the evils of politics. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system ( http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10680 From: Kohlenberg, Toby Date: Thu Jan 20, 2005 0:24am Subject: RE: Privacy Activists Brace for White House Push to Augment can we please please please get back to TSCM instead of strange rants that range from one political extreme to the other? >-----Original Message----- >From: Agent Geiger [mailto:agentgeiger@y...] >Sent: Wednesday, January 19, 2005 6:06 PM >To: TSCM-L@yahoogroups.com >Subject: RE: [TSCM-L] Privacy Activists Brace for White House >Push to Augment > > >I never said anything about planes did I? You are >making incorrect inferences. > >--- "Nalesnik, Matthew" > wrote: > >> >> Does that mean you conspire to believe they crashed >> planes into the WTC and Pentagon, and PA, just to >> make provisions to take our liberties away? >> That's a strong accusation. If true, obviously it's >> time for revolution, and a new government (not that >> the current tax situation doesn't call for that >> anyway... different topic), but certainly NOT a >> Liberal one, cuz that's just a step towards >> Socialism, which is a step towards Communism, and if >> you think that your liberties are being trampled on >> now... >> But if it's not true - which I don't think it is - >> then we need to focus on real enemies... like the >> UN. >> >> -----Original Message----- >> From: kondrak [mailto:kondrak@s...] >> >> >> >>But the police-state marches on....if theres any >> impediment to it, they'll >> >>undoubtedly nuke some city to use more terror to >> make people give up their >> >>liberty. >> >> >> At 01:12 1/19/2005, you wrote: >> >> >This needs to be stopped immediately, they have >> more >> >than enough power to do whatever they want with the >> >original Patriot Act abomination that flushed the >> >Constitution down the toilet. >> > >> >Bush et al are using their newfound powers to >> disrupt >> >and destroy the credibility of U.S. citizens that >> >would dare speak out against their corrupt regime >> and >> >practice the hallowed right of public dissent. >> > >> >Pro se lawsuits directed against Administration >> >officials is likely the only recourse at this >> point, >> >it's apparent that the vast majority of Congress is >> >being blackmailed at this point. >> > >> >--- savanted1 wrote: >> > >> > > >> > > >> > > >> > > Privacy Activists Brace for White House Push to >> > > Augment >> > > Controversial Domestic Surveillance Powers >> > > >> > > >> > > According to former Republican congressman Bob >> Barr, >> > > now working as a >> > > speaker and consultant to organizations such as >> the >> > > American Civil >> > > Liberties Union, "The administration has made it >> > > clear that they do >> > > intend to continue their move to dramatically >> reduce >> > > privacy and >> > > constitutional protection for our citizens." He >> and >> > > other civil >> > > liberties advocates expect Patriot Act II >> provisions >> > > to resurface >> > > piecemeal, such as in the Anti-Terrorism >> > > Intelligence Tools >> > > Improvement Act of 2003 (HR3179). Bills trying >> to >> > > remedy some of the >> > > more invasive provisions of the Patriot Act, >> such as >> > > the Security and >> > > Freedom Ensured (SAFE) Act of 2003, are still >> stuck >> > > in the Senate and >> > > House respectively. A driver's license >> provision of >> > > the National >> > > Intelligence Reform and Terrorism Act, passed >> before >> > > the holiday >> > > recess, requires all drivers' licenses to >> include >> > > machine-readable, >> > > encoded data by the end of 2006, and gives the >> > > secretaries of >> > > Transportation and Homeland Security until >> mid-2006 >> > > to define the >> > > data. >> > > >> > > >> http://www.wired.com/news/print/0,1294,66242,00.html >> > > >> > > >> > > >> > > >> > > >> > > >> > > >> > > >> > > >> > > ------------------------ Yahoo! Groups Sponsor >> > > >> > > >> > > >> >>======================================================== >> > > TSCM-L Technical Security Mailing List >> > > "In a multitude of counselors there is >> strength" >> > > >> > > To subscribe to the TSCM-L mailing list >> visit: >> > > >> http://www.yahoogroups.com/community/TSCM-L >> > > >> > > It is by caffeine alone I set my mind in >> motion. >> > > It is by the juice of Star Bucks that thoughts >> > > acquire speed, >> > > the hands acquire shaking, the shaking is a >> > > warning. >> > > It is by caffeine alone I set my mind in >> motion. >> > > >> =================================================== >> > > TSKS >> > > Yahoo! Groups Links >> > > >> > > >> > > TSCM-L-unsubscribe@yahoogroups.com >> > > >> > > >> > > >> > > >> > > >> > > >> > >> > >> > >> > >> >>======================================================== >> > TSCM-L Technical Security Mailing List >> > "In a multitude of counselors there is >> strength" >> > >> > To subscribe to the TSCM-L mailing list >> visit: >> > >> http://www.yahoogroups.com/community/TSCM-L >> > >> > It is by caffeine alone I set my mind in motion. >> > It is by the juice of Star Bucks that thoughts >> acquire speed, >> > the hands acquire shaking, the shaking is a >> warning. >> > It is by caffeine alone I set my mind in motion. >> >=================================================== >> TSKS >> >Yahoo! Groups Links >> > >> > >> > >> > >> >> >> >> >> >======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts >> acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== >> TSKS >> >> >> >> >> >> Yahoo! Groups Sponsor >> >> >> >=== message truncated === > > > > >__________________________________ >Do you Yahoo!? >Yahoo! Mail - Find what you need with new enhanced search. >http://info.mail.yahoo.com/mail_250 > > >------------------------ Yahoo! Groups Sponsor >--------------------~--> >In low income neighborhoods, 84% do not own computers. >At Network for Good, help bridge the Digital Divide! >http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM >--------------------------------------------------------------- >-----~-> > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > 10681 From: Nalesnik, Matthew Date: Thu Jan 20, 2005 7:53am Subject: RE: Privacy Activists Brace for White House Push to Augment > Doesn't take a rocket scientist to figure out that our > interventionist foreign policy is to blame for the > attacks. We don't have diplomats in the country of "Al Qaeda"...? If our interventionist foreign policy is to blame, who did we "intervene" against to cause terrorists, with no home country, to kill Americans, on American soil? -----Original Message----- From: G P [mailto:telos888@y...] Sent: Wednesday, January 19, 2005 10:54 PM --- "Nalesnik, Matthew" wrote: > Does that mean you conspire to believe they crashed > planes into the WTC and Pentagon, and PA, just to > make provisions to take our liberties away? Doesn't take a rocket scientist to figure out that our interventionist foreign policy is to blame for the attacks. > then we need to focus on real enemies... like the > UN. Yep. This Iraq war is nothing but U.N. puppetry, and U.S. tax dollars have been enforcing U.N. mandates for decades. Bankruptcy is the preferred tactic for hostile takeover, insurmountable debt is the perfect leverage for a coup. Countries can be purposely bankrupted, just like companies routinely are. "...where the rule of law-governs the conduct of nations...in which a credible United Nations can use its peacekeeping role to fulfill the promise and vision of the UN's founders." -- George H. W. Bush, January 16, 1991, speech regarding hostilities with Iraq > > -----Original Message----- > From: kondrak [mailto:kondrak@s...] > > > >>But the police-state marches on....if theres any > impediment to it, they'll > >>undoubtedly nuke some city to use more terror to > make people give up their > >>liberty. > > > At 01:12 1/19/2005, you wrote: > > >This needs to be stopped immediately, they have > more > >than enough power to do whatever they want with the > >original Patriot Act abomination that flushed the > >Constitution down the toilet. > > > >Bush et al are using their newfound powers to > disrupt > >and destroy the credibility of U.S. citizens that > >would dare speak out against their corrupt regime > and > >practice the hallowed right of public dissent. > > > >Pro se lawsuits directed against Administration > >officials is likely the only recourse at this > point, > >it's apparent that the vast majority of Congress is > >being blackmailed at this point. > > > >--- savanted1 wrote: > > > > > > > > > > > > > > Privacy Activists Brace for White House Push to > > > Augment > > > Controversial Domestic Surveillance Powers > > > > > > > > > According to former Republican congressman Bob > Barr, > > > now working as a > > > speaker and consultant to organizations such as > the > > > American Civil > > > Liberties Union, "The administration has made it > > > clear that they do > > > intend to continue their move to dramatically > reduce > > > privacy and > > > constitutional protection for our citizens." He > and > > > other civil > > > liberties advocates expect Patriot Act II > provisions > > > to resurface > > > piecemeal, such as in the Anti-Terrorism > > > Intelligence Tools > > > Improvement Act of 2003 (HR3179). Bills trying > to > > > remedy some of the > > > more invasive provisions of the Patriot Act, > such as > > > the Security and > > > Freedom Ensured (SAFE) Act of 2003, are still > stuck > > > in the Senate and > > > House respectively. A driver's license > provision of > > > the National > > > Intelligence Reform and Terrorism Act, passed > before > > > the holiday > > > recess, requires all drivers' licenses to > include > > > machine-readable, > > > encoded data by the end of 2006, and gives the > > > secretaries of > > > Transportation and Homeland Security until > mid-2006 > > > to define the > > > data. > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is > strength" > > > > > > To subscribe to the TSCM-L mailing list > visit: > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in > motion. > > > It is by the juice of Star Bucks that thoughts > > > acquire speed, > > > the hands acquire shaking, the shaking is a > > > warning. > > > It is by caffeine alone I set my mind in > motion. > > > > =================================================== > > > TSKS > > > Yahoo! Groups Links > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== > TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > > > > > > Yahoo! Groups Sponsor > > === message truncated === ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10682 From: Riskbiz Date: Thu Jan 20, 2005 9:20am Subject: RE: Privacy Activists Brace for White House Push to Augment I subscribed to this list to learn and educate myself about TSCM and asso fields, not listen to a bunch of psychotic/hysterical social/political commentary. Please stick to the topic or post elsewhere and stop filling my inbox with this crap. DK -----Original Message----- From: Agent Geiger [mailto:agentgeiger@y...] Sent: Wednesday, January 19, 2005 11:24 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Privacy Activists Brace for White House Push to Augment You mistook my previous posting. I am not saying I do not agree with people bringing forth suits and defending themselves(I do it in small claims court all the time). My piont is, that if you try and take on the juggernaut in power, via constitional pro-se means, e.g., tax resisting, rescinding your drivers license and SSN, etc. You in the practical sense, will lose. the judges will either rule against you, or dismiss. All the time, you spend a lot of money, and get little true justice. However, the system remains intact. I am not saying it right. It is the fact. The deck is stacked all the way to the Supreme Court. How in the world can you win in "their" system, by playing by the rules they themselves do not play by? --- G P wrote: > > Pro Se lawsuits will only get you laughed out of courts and labeled > > a kook. > > Interesting opinion, as pro se litigants are held to a much lesser > standard of legal review. Going pro se with a defense (or offense) is > a significant advantage over professional counsel. > > >If they actually got you somewhere, you'd be > killed. > > Very interesting. So by retaining professional legal counsel, one is > immune to assassination...? Per that logic, we're going about this > war in Iraq thing all wrong - we should be sending squadrons of > laywers over there to defend our interests ;) > > The law is the law, period. 2752 people died in the September 11th > attacks, but millions have been killed protecting that very same > Constitution that has been trampled upon with the Patriot Act and > upcoming Patriot Act II legislation. > > Our elected officials swore to uphold and defend the Constitution, not > to rewrite history and laws to suit the military-industrial complex. > > Regards > > Greg > > > > > --- kondrak wrote: > > > > > But the police-state marches on....if theres any impediment to it, > > > they'll undoubtedly nuke some city to use more terror to make > > > people give up their liberty. > > > > > > > > > At 01:12 1/19/2005, you wrote: > > > > > > >This needs to be stopped immediately, they have > > > more > > > >than enough power to do whatever they want with > > the > > > >original Patriot Act abomination that flushed > the > > > >Constitution down the toilet. > > > > > > > >Bush et al are using their newfound powers to > > > disrupt > > > >and destroy the credibility of U.S. citizens > that > > > >would dare speak out against their corrupt > regime > > > and > > > >practice the hallowed right of public dissent. > > > > > > > >Pro se lawsuits directed against Administration officials is > > > >likely the only recourse at this > > > point, > > > >it's apparent that the vast majority of > Congress > > is > > > >being blackmailed at this point. > > > > > > > >--- savanted1 wrote: > > > > > > > > > > > > > > > > > > > > > > > > Privacy Activists Brace for White House Push > > to > > > > > Augment > > > > > Controversial Domestic Surveillance > > Powers > > > > > > > > > > > > > > > According to former Republican congressman > Bob > > > Barr, > > > > > now working as a > > > > > speaker and consultant to organizations such > > as > > > the > > > > > American Civil > > > > > Liberties Union, "The administration has > made > > it > > > > > clear that they do > > > > > intend to continue their move to > dramatically > > > reduce > > > > > privacy and > > > > > constitutional protection for our citizens." > > > He > > > and > > > > > other civil > > > > > liberties advocates expect Patriot Act II > > > provisions > > > > > to resurface > > > > > piecemeal, such as in the Anti-Terrorism Intelligence Tools > > > > > Improvement Act of 2003 (HR3179). Bills > > trying > > > to > > > > > remedy some of the > > > > > more invasive provisions of the Patriot Act, > > > such as > > > > > the Security and > > > > > Freedom Ensured (SAFE) Act of 2003, are > still > > > stuck > > > > > in the Senate and > > > > > House respectively. A driver's license > > > provision of > > > > > the National > > > > > Intelligence Reform and Terrorism Act, > passed > > > before > > > > > the holiday > > > > > recess, requires all drivers' licenses to > > > include > > > > > machine-readable, > > > > > encoded data by the end of 2006, and gives > the > > > > > secretaries of > > > > > Transportation and Homeland Security until > > > mid-2006 > > > > > to define the > > > > > data. > > > > > > > > > > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups > Sponsor > > > > > > > > > > > > > > > > > > > > > >=======================================================> > > > > TSCM-L Technical Security Mailing > > List > > > > > "In a multitude of counselors there is > > > strength" > > > > > > > > > > To subscribe to the TSCM-L mailing list > > > visit: > > > > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > > > > > It is by caffeine alone I set my mind in > > > motion. > > > > > It is by the juice of Star Bucks that > > thoughts > > > > > acquire speed, > > > > > the hands acquire shaking, the shaking is a > > > > > warning. > > > > > It is by caffeine alone I set my mind in > > > motion. > > > > > > > > > > > ==================================================> > > > > TSKS > > > > > Yahoo! Groups Links > > > > > > > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > === message truncated == __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com ======================================================= TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10683 From: G P Date: Thu Jan 20, 2005 0:03pm Subject: RE: Privacy Activists Brace for White House Push to Augment Sounds like DK needs a hug. --- Riskbiz wrote: > I subscribed to this list to learn and educate > myself about TSCM and asso > fields, not listen to a bunch of > psychotic/hysterical social/political > commentary. Please stick to the topic or post > elsewhere and stop filling my > inbox with this crap. > > DK > 10684 From: Agent Geiger Date: Thu Jan 20, 2005 0:21pm Subject: RE: Privacy Activists Brace for White House Push to Augment Nope, you have me mistaken with someone else. --- "Nalesnik, Matthew" wrote: > > Then what basis or precedent, besides a weak > conspiracy theory, would you base this statement on > "But the police-state marches on....if theres any > impediment to it, they'll undoubtedly nuke some > city to use *MORE* terror to make people give up > their liberty"? (caps on 'MORE' mine) ? > You've basically switched nukes for planes, and I > may be mistaken, of course, but your implication is > that the terror attacks that already happened were > used to make people give up their liberty, and that > the Bush administration would use *MORE* terror > attacks (albeit nukes, or planes, or whatever) to > take more liberties away. > Would you like to clarify, or did I hit it on the > head? > > -----Original Message----- > From: Agent Geiger [mailto:agentgeiger@y...] > Sent: Wednesday, January 19, 2005 9:06 PM > To: TSCM-L@yahoogroups.com > Subject: RE: [TSCM-L] Privacy Activists Brace for > White House Push to Augment > > I never said anything about planes did I? You are > making incorrect inferences. > > --- "Nalesnik, Matthew" > wrote: > > > > > Does that mean you conspire to believe they > crashed > > planes into the WTC and Pentagon, and PA, just to > > make provisions to take our liberties away? > > That's a strong accusation. If true, obviously > it's > > time for revolution, and a new government (not > that > > the current tax situation doesn't call for that > > anyway... different topic), but certainly NOT a > > Liberal one, cuz that's just a step towards > > Socialism, which is a step towards Communism, and > if > > you think that your liberties are being trampled > on > > now... > > But if it's not true - which I don't think it is - > > then we need to focus on real enemies... like the > > UN. > > > > -----Original Message----- > > From: kondrak [mailto:kondrak@s...] > > > > > > >>But the police-state marches on....if theres any > > impediment to it, they'll > > >>undoubtedly nuke some city to use more terror to > > make people give up their > > >>liberty. > > > > > > At 01:12 1/19/2005, you wrote: > > > > >This needs to be stopped immediately, they have > > more > > >than enough power to do whatever they want with > the > > >original Patriot Act abomination that flushed the > > >Constitution down the toilet. > > > > > >Bush et al are using their newfound powers to > > disrupt > > >and destroy the credibility of U.S. citizens that > > >would dare speak out against their corrupt regime > > and > > >practice the hallowed right of public dissent. > > > > > >Pro se lawsuits directed against Administration > > >officials is likely the only recourse at this > > point, > > >it's apparent that the vast majority of Congress > is > > >being blackmailed at this point. > > > > > >--- savanted1 wrote: > > > > > > > > > > > > > > > > > > > Privacy Activists Brace for White House Push > to > > > > Augment > > > > Controversial Domestic Surveillance > Powers > > > > > > > > > > > > According to former Republican congressman Bob > > Barr, > > > > now working as a > > > > speaker and consultant to organizations such > as > > the > > > > American Civil > > > > Liberties Union, "The administration has made > it > > > > clear that they do > > > > intend to continue their move to dramatically > > reduce > > > > privacy and > > > > constitutional protection for our citizens." > He > > and > > > > other civil > > > > liberties advocates expect Patriot Act II > > provisions > > > > to resurface > > > > piecemeal, such as in the Anti-Terrorism > > > > Intelligence Tools > > > > Improvement Act of 2003 (HR3179). Bills > trying > > to > > > > remedy some of the > > > > more invasive provisions of the Patriot Act, > > such as > > > > the Security and > > > > Freedom Ensured (SAFE) Act of 2003, are still > > stuck > > > > in the Senate and > > > > House respectively. A driver's license > > provision of > > > > the National > > > > Intelligence Reform and Terrorism Act, passed > > before > > > > the holiday > > > > recess, requires all drivers' licenses to > > include > > > > machine-readable, > > > > encoded data by the end of 2006, and gives the > > > > secretaries of > > > > Transportation and Homeland Security until > > mid-2006 > > > > to define the > > > > data. > > > > > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > __________________________________ > Do you Yahoo!? > Yahoo! Mail - Find what you need with new enhanced > search. > http://info.mail.yahoo.com/mail_250 > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > > > > _____ > > Yahoo! Groups Links > * To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > * To unsubscribe from this group, send an > email to: > TSCM-L-unsubscribe@yahoogroups.com > > > > * Your use of Yahoo! Groups is subject to > the Yahoo! Terms of Service > . > > > > > > [Non-text portions of this message have been > removed] > > > === message truncated === __________________________________ Do you Yahoo!? The all-new My Yahoo! - What will yours do? http://my.yahoo.com 10685 From: Agent Geiger Date: Thu Jan 20, 2005 0:22pm Subject: RE: Privacy Activists Brace for White House Push to Augment Sure --- "Kohlenberg, Toby" wrote: > > can we please please please get back to TSCM instead > of strange > rants that range from one political extreme to the > other? > > >-----Original Message----- > >From: Agent Geiger [mailto:agentgeiger@y...] > >Sent: Wednesday, January 19, 2005 6:06 PM > >To: TSCM-L@yahoogroups.com > >Subject: RE: [TSCM-L] Privacy Activists Brace for > White House > >Push to Augment > > > > > >I never said anything about planes did I? You are > >making incorrect inferences. > > > >--- "Nalesnik, Matthew" > > wrote: > > > >> > >> Does that mean you conspire to believe they > crashed > >> planes into the WTC and Pentagon, and PA, just to > >> make provisions to take our liberties away? > >> That's a strong accusation. If true, obviously > it's > >> time for revolution, and a new government (not > that > >> the current tax situation doesn't call for that > >> anyway... different topic), but certainly NOT a > >> Liberal one, cuz that's just a step towards > >> Socialism, which is a step towards Communism, and > if > >> you think that your liberties are being trampled > on > >> now... > >> But if it's not true - which I don't think it is > - > >> then we need to focus on real enemies... like the > >> UN. > >> > >> -----Original Message----- > >> From: kondrak [mailto:kondrak@s...] > >> > >> > >> >>But the police-state marches on....if theres > any > >> impediment to it, they'll > >> >>undoubtedly nuke some city to use more terror > to > >> make people give up their > >> >>liberty. > >> > >> > >> At 01:12 1/19/2005, you wrote: > >> > >> >This needs to be stopped immediately, they have > >> more > >> >than enough power to do whatever they want with > the > >> >original Patriot Act abomination that flushed > the > >> >Constitution down the toilet. > >> > > >> >Bush et al are using their newfound powers to > >> disrupt > >> >and destroy the credibility of U.S. citizens > that > >> >would dare speak out against their corrupt > regime > >> and > >> >practice the hallowed right of public dissent. > >> > > >> >Pro se lawsuits directed against Administration > >> >officials is likely the only recourse at this > >> point, > >> >it's apparent that the vast majority of Congress > is > >> >being blackmailed at this point. > >> > > >> >--- savanted1 wrote: > >> > > >> > > > >> > > > >> > > > >> > > Privacy Activists Brace for White House Push > to > >> > > Augment > >> > > Controversial Domestic Surveillance > Powers > >> > > > >> > > > >> > > According to former Republican congressman > Bob > >> Barr, > >> > > now working as a > >> > > speaker and consultant to organizations such > as > >> the > >> > > American Civil > >> > > Liberties Union, "The administration has made > it > >> > > clear that they do > >> > > intend to continue their move to dramatically > >> reduce > >> > > privacy and > >> > > constitutional protection for our citizens." > He > >> and > >> > > other civil > >> > > liberties advocates expect Patriot Act II > >> provisions > >> > > to resurface > >> > > piecemeal, such as in the Anti-Terrorism > >> > > Intelligence Tools > >> > > Improvement Act of 2003 (HR3179). Bills > trying > >> to > >> > > remedy some of the > >> > > more invasive provisions of the Patriot Act, > >> such as > >> > > the Security and > >> > > Freedom Ensured (SAFE) Act of 2003, are still > >> stuck > >> > > in the Senate and > >> > > House respectively. A driver's license > >> provision of > >> > > the National > >> > > Intelligence Reform and Terrorism Act, passed > >> before > >> > > the holiday > >> > > recess, requires all drivers' licenses to > >> include > >> > > machine-readable, > >> > > encoded data by the end of 2006, and gives > the > >> > > secretaries of > >> > > Transportation and Homeland Security until > >> mid-2006 > >> > > to define the > >> > > data. > >> > > > >> > > > >> > http://www.wired.com/news/print/0,1294,66242,00.html > >> > > > >> > > > >> > > > >> > > > >> > > > >> > > > >> > > > >> > > > >> > > > >> > > ------------------------ Yahoo! Groups > Sponsor > >> > > > >> > > > >> > > > >> > >>======================================================== > >> > > TSCM-L Technical Security Mailing > List > >> > > "In a multitude of counselors there is > >> strength" > >> > > > >> > > To subscribe to the TSCM-L mailing list > >> visit: > >> > > > >> http://www.yahoogroups.com/community/TSCM-L > >> > > > >> > > It is by caffeine alone I set my mind in > >> motion. > >> > > It is by the juice of Star Bucks that > thoughts > >> > > acquire speed, > >> > > the hands acquire shaking, the shaking is a > >> > > warning. > >> > > It is by caffeine alone I set my mind in > >> motion. > >> > > > >> > =================================================== > >> > > TSKS > >> > > Yahoo! Groups Links > >> > > > >> > > > >> > > TSCM-L-unsubscribe@yahoogroups.com > >> > > > >> > > > >> > > > >> > > > >> > > > >> > > > >> > > >> > > >> > > >> > > >> > === message truncated === __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail 10686 From: G P Date: Thu Jan 20, 2005 0:45pm Subject: RE: Privacy Activists Brace for White House Push to Augment Well let's see. We could start with the CIA-sponsored coup in Iran, where we tossed out the democratically-elected Mohammed Mosedegh in 1956 and replaced him with the Shah to insure access to Iran's oilfields (as Mosedegh was nationalizing Anglo-Iranian Oil, which later became British Petroleum under the Shah's reign). That single act, which the Sept. 11 attacks can be traced back directly to, then lead to the anti-American sentiment of the Ayatollah when he overthrew the Shah by way of the Islamic Revolution. Then we decided that we had to "balance the region" by providing weapons to Saddam Hussein (Rumsfeld and Cheney were directly involved in that one). On to arming and training the Islamic Fundamentalist Mujahedeen in Afganistan, as they were fighting the Soviet-backed Northern Alliance. Osama bin Laden visited the U.S. (and is rumored to have visited the White House under the moniker "Tim Osman"), and the CIA set up those same training camps that we're trying to bomb back to the dark ages. (I could mention the fact that several of Osama bin Laden's top generals are now working in very high positions of authority in the U.S. government, but I won't name any names.) Now it's back to sponsoring the Northern Alliance based on intelligence that we will have access to oil fields in Turkmenistan and Kazakstan, the list goes on and on and on and on. Same players, same companies, proletariat caught in the middle as cannon fodder. Cheers! Greg --- "Nalesnik, Matthew" wrote: > We don't have diplomats in the country of "Al > Qaeda"...? If our interventionist foreign policy is > to blame, who did we "intervene" against to cause > terrorists, with no home country, to kill Americans, > on American soil? 10687 From: Nalesnik, Matthew Date: Thu Jan 20, 2005 0:06pm Subject: RE: Privacy Activists Brace for White House Push to Augment Don't we go through this about once a month or so? D K - it will play itself out. Strong opinions are hard to keep contained. Especially when articles sent out are related to TSCM, but also personal freedom, and that sorta off-topic thing. Then it goes to a tangent! - Matt -----Original Message----- From: G P [mailto:telos888@y...] Sent: Thursday, January 20, 2005 1:04 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Privacy Activists Brace for White House Push to Augment Sounds like DK needs a hug. --- Riskbiz wrote: > I subscribed to this list to learn and educate > myself about TSCM and asso > fields, not listen to a bunch of > psychotic/hysterical social/political > commentary. Please stick to the topic or post > elsewhere and stop filling my > inbox with this crap. > > DK > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10688 From: Nalesnik, Matthew Date: Thu Jan 20, 2005 11:46am Subject: RE: Privacy Activists Brace for White House Push to Augment I agree with you to some point - there have always been conspiracies, and total power is the aim. There's always the talk of the "shadow government", and that the government in place really doesn't have any power... alas, it's too much. I believe that there's enough good people left in our great country to stop any such state of totalitarianism from taking over. When the 2nd amendment is trampled on, that truly is a problem as well - because that takes a key power away from us, the power to defend ourselves. That's not to disregard all the other rights we hold as free citizens, regarding free speech, and one close to my heart, freedom of religion. But those are intangibles, and can't actually be taken away by force (except from the fainthearted). The 2nd Amendment: "A well regulated militia, being necessary to the security of a free state, the right of the people to keep and bear arms, shall not be infringed." - - now that IS something that can physically be taken away - and people take that lightly, citing "safety" as an excuse. I hold true as an idealist at heart that, "Once people have tasted freedom they don't easily give it up." I know that will stand in our country until... at least until Armageddon and the end of the world as we know it is here. Until then, I guess we have to carry n as normal - otherwise we'd die from stress. -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: Thursday, January 20, 2005 12:33 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Privacy Activists Brace for White House Push to Augment "I" don't, I'd never do that to my fellow citizens, but the possibility "someone" has, or will exists....theres certainly been enough conspiracies that are being covered up, all marching twords the same result, a totalitarian state replacing ours. Look at the recent cover-ups, OKC stands out. Especially under a socialist like Clinton's, (and her husband) watch. The DHS hires Primikov of the Ex-KGB to design "Internal passports" for US citizens, what conclusions should one draw? Im not liking what Im seeing.... At 13:15 1/19/2005, you wrote: >Does that mean you conspire to believe they crashed planes into the WTC >and Pentagon, and PA, just to make provisions to take our liberties away? >That's a strong accusation. If true, obviously it's time for revolution, >and a new government (not that the current tax situation doesn't call for >that anyway... different topic), but certainly NOT a Liberal one, cuz >that's just a step towards Socialism, which is a step towards Communism, >and if you think that your liberties are being trampled on now... >But if it's not true - which I don't think it is - then we need to focus >on real enemies... like the UN. > >-----Original Message----- >From: kondrak [mailto:kondrak@s...] > > > >>But the police-state marches on....if theres any impediment to it, they'll > >>undoubtedly nuke some city to use more terror to make people give up their > >>liberty. > > >At 01:12 1/19/2005, you wrote: > > >This needs to be stopped immediately, they have more > >than enough power to do whatever they want with the > >original Patriot Act abomination that flushed the > >Constitution down the toilet. > > > >Bush et al are using their newfound powers to disrupt > >and destroy the credibility of U.S. citizens that > >would dare speak out against their corrupt regime and > >practice the hallowed right of public dissent. > > > >Pro se lawsuits directed against Administration > >officials is likely the only recourse at this point, > >it's apparent that the vast majority of Congress is > >being blackmailed at this point. > > > >--- savanted1 wrote: > > > > > > > > > > > > > > Privacy Activists Brace for White House Push to > > > Augment > > > Controversial Domestic Surveillance Powers > > > > > > > > > According to former Republican congressman Bob Barr, > > > now working as a > > > speaker and consultant to organizations such as the > > > American Civil > > > Liberties Union, "The administration has made it > > > clear that they do > > > intend to continue their move to dramatically reduce > > > privacy and > > > constitutional protection for our citizens." He and > > > other civil > > > liberties advocates expect Patriot Act II provisions > > > to resurface > > > piecemeal, such as in the Anti-Terrorism > > > Intelligence Tools > > > Improvement Act of 2003 (HR3179). Bills trying to > > > remedy some of the > > > more invasive provisions of the Patriot Act, such as > > > the Security and > > > Freedom Ensured (SAFE) Act of 2003, are still stuck > > > in the Senate and > > > House respectively. A driver's license provision of > > > the National > > > Intelligence Reform and Terrorism Act, passed before > > > the holiday > > > recess, requires all drivers' licenses to include > > > machine-readable, > > > encoded data by the end of 2006, and gives the > > > secretaries of > > > Transportation and Homeland Security until mid-2006 > > > to define the > > > data. > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts > > > acquire speed, > > > the hands acquire shaking, the shaking is a > > > warning. > > > It is by caffeine alone I set my mind in motion. > > > =================================================== > > > TSKS > > > Yahoo! Groups Links > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > >It is by caffeine alone I set my mind in motion. >It is by the juice of Star Bucks that thoughts acquire speed, >the hands acquire shaking, the shaking is a warning. >It is by caffeine alone I set my mind in motion. >=================================================== TSKS > > > > > >Yahoo! Groups Sponsor > > >ADVERTISEMENT > > > >< http://us.ard.yahoo.com/SIG=129uob3ev/M=298184.5639630.6699735.3001176/D=groups/S=1707216980:HM/EXP=1106242263/A=2532114/R=2/SIG=12kelmonn/*http://clk.atdmt.com/NFX/go/yhxxxnfx0020000014nfx/direct/01/ &time=1106155863563133> > > > >< http://us.adserver.yahoo.com/l?M=298184.5639630.6699735.3001176/D=groups/S=:HM/A=2532114/rand=371423117> > > > _____ > >Yahoo! Groups Links >* To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > >* To unsubscribe from this group, send an email to: >TSCM-L-unsubscribe@yahoogroups.com > > >* Your use of Yahoo! Groups is subject to the Yahoo! Terms of >Service < http://docs.yahoo.com/info/terms/> . > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10689 From: G P Date: Thu Jan 20, 2005 1:04pm Subject: RE: Privacy Activists Brace for White House Push to Augment > Then we decided that we had to "balance the region" > by providing weapons to Saddam Hussein (Rumsfeld and > Cheney were directly involved in that one). Golly gee I keep forgetting to mention that both Rumsfeld and Cheney are members of the Council on Foreign Relations, as was George H. W. Bush. Where there's a coup, there's a CFR member nearby. ;) Cheers! Greg PS: Bush Administration appointees that are members of the Council on Foreign Relations: Richard Cheney Vice President Condoleezza Rice National Security Advisor Franklin C. Miller Special Assistant to the President and Senior Director for Defense Policy and Arms Control Jendayi E. Frazer Special Assistant to the President and Senior Director for African Affairs at the National Security Council George J. Tenet CIA Director Anne O. Krueger Member of the Council of Economic Advisors James L. Connaughton Chairman, Presidentís Council on Environmental Quality Torkel L. Patterson Special Assistant to the President and Senior Director for Asian Affairs, National Security Council staff John B. Bellinger III Senior Associate Counsel to the President and Legal Adviser to the National Security Council Marcia E. Miller Member, Commission on Presidential Scholars Fr. Theodore Hesburgh Member, Commission on Presidential Scholars Zalmay Khalilzad Special Assistant to the President and Senior Director for Gulf, Southwest Asia and Other Regional Issues, National Security Council. Charles Blahous III Member of the National Economic Council, Executive Director of the Presidentís Commission to Strengthen Social Security Donald Rumsfeld Secretary of Defense Paul D. Wolfowitz Deputy Secretary of Defense Douglas Jay Feith Under Secretary of Defense for Policy James G. Roche Secretary of the Air Force Dov S. Zakheim Under Secretary of Defense (Comptroller) Leo S. Mackay Jr. Deputy Secretary of Veterans Affairs Peter W. Rodman Assistant Secretary of Defense Alberto Jose Mora General Counsel of the Department of the Navy Christine Todd Whitman EPA Administrator Elaine Chao Secretary of Labor Kenneth I. Juster Under Secretary of Commerce for Export Administration Faryar Shirzad Assistant Secretary of Commerce Kathleen B. Cooper Under Secretary of Commerce for Economic Affairs Peter S. Watson President of the Overseas Private Investment Corporation Kenneth W. Dam Deputy Secretary of the Treasury Peter R. Fisher Under Secretary of the Treasury for Domestic Finance Viet D. Dinh Assistant Attorney General Henrietta Holsman Fore Director of the U.S. Mint Jon M. Huntsman Jr. Deputy United States Trade Representative Robert B. Zoellick U.S. Trade Representative Colin L. Powell Secretary of State William J. Burns Assistant Secretary of State for Near Eastern Affairs Lorne W. Craner Assistant Secretary of State for Democracy, Human Rights, and Labor Walter H. Kansteiner Assistant Secretary of State for African Affairs C. David Welch Ambassador to Egypt Howard H. Baker Jr. Ambassador to Japan Paula J. Dobriansky Under Secretary of State for Global Affairs Richard Nathan Haass Director, State Department Policy Planning Staff William H. Taft IV Legal Adviser of the Department of State John Robert Bolton Under Secretary of State for Arms Control and International Security Charles A. Heimbold Jr. Ambassador to Sweden John D. Negroponte U.S. Representative to the United Nations Shirin R. Tahir-Kheli Head of the U.S. Delegation to the United Nations Commission on Human Rights Franklin L. Lavin Ambassador to Singapore Michael E. Guest Ambassador to Romania Alexander R. Vershbow Ambassador to the Russian Federation Daniel Charles Kurtzer Ambassador to Israel John Price Ambassador to Mauritius Carole L. Brookins Executive Director of the International Bank for Reconstruction and Development (a part of the World Bank) From: http://www.stoptheftaa.org/artman/publish/article_73.shtml 10690 From: James M. Atkinson Date: Thu Jan 20, 2005 1:02pm Subject: Inauguration Video Let it load, even though it is 6 MB long http://movies.yahoo.com/movies/feature/jibjabinaugural.html ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10691 From: James M. Atkinson Date: Thu Jan 20, 2005 5:09pm Subject: Inaugural Pictures Here is one of those secret Skull and Bones ceremonies http://conservativelife.com/blog/media/bushzipper.jpg Can anybody come up with an appropiate caption, or shall we just let the picture speak for itself. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10692 From: Michael Dever Date: Thu Jan 20, 2005 5:13pm Subject: Re: Inaugural Pictures Captions: "Keep looking, you'll find it!" "Looking for my weapon of mass destruction, heh heh heh!" On 21 Jan 2005, at 10:09, James M. Atkinson wrote: > > > Here is one of those secret Skull and Bones ceremonies > > http://conservativelife.com/blog/media/bushzipper.jpg > > Can anybody come up with an appropiate caption, or shall we just let > the > picture speak for itself. > > -jma > > > > > ----------------------------------------------------------------------- > ----------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ----------------------------------------------------------------------- > ----------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: > http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ----------------------------------------------------------------------- > ----------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ----------------------------------------------------------------------- > ----------------------------- > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 10693 From: kondrak Date: Thu Jan 20, 2005 6:20pm Subject: Wireless Security (OT but interesting) > > > January 20, 2005 New York Times > >WHAT'S NEXT > > > Cargo Containers' Electronic Sensor Says 'Do Not Disturb' > >By ANNE EISENBERG > >MILLIONS of cargo containers full of toys, TV's and other consumer >products stream into United States ports each year. But security experts >fear the metal boxes could also be used to transport dangerous freight: >terrorist weapons. > >Researchers are working on modifications to the rugged containers, >adding electronic monitoring that can keep track of intrusions once the >boxes are sealed at a factory and on their way by train, truck and ship. > >General Electric > > >is testing a palm-size security device with a built-in microprocessor >and radio. The device, which has been tried out on a handful of >containers traveling between China and California, generates a magnetic >field. > >If the doors of the container move, the field changes, and the >microprocessor keeps track of the disturbance. At a port or loading >dock, the containers can be queried by radio, delivering a record of any >intrusions. > >"The microprocessor is always monitoring the sensor," said James >Petrizzi, a vice president for engineering in General Electric's >security business, who helped develop and test the wireless system. > >In trials, the device communicated with fixed dockside readers, as well >as with hand-held readers that could communicate wirelessly. "The system >creates a large wireless network where we can interrogate the security >device on the container," Mr. Petrizzi said. The reader notes the time >and date of any incursions since the container was sealed. The >communication between the security device and the reader is encrypted. > >A major manufacturer of containers, the China International Marine >Containers Group, incorporated the sensor in 18 of its containers as >prototypes to use for the General Electric trials. > >"We did the trials to make sure that the container and the electronic >pack would not be damaged or give false alarms," said David Wong, chief >technical officer at the company, which is based in Shenzhen, near Hong >Kong. "It can be operated under the most severe conditions in adverse >environments." > >The security devices were originally developed by All Set Marine >Security, based in Bromma, Sweden, near Stockholm. All Set is licensing >the technology to G.E. In the future, two versions of the monitoring >device will be available, ones built into the doors of new containers >and ones that can be retrofitted on an interior door post of old >containers, said Walt Dixon, project leader for port and cargo security >at the General Electric Global Research Center in Niskayuna, N.Y. > >Stephen E. Flynn, a senior fellow at the Council on Foreign Relations >and an expert on cargo security, said devices like G.E.'s were essential >if containers were to be made smarter. Dr. Flynn is a retired commander >in the United States Coast Guard. > >There are millions of containers in circulation, he said, any one of >which could be used by terrorists as a Trojan horse. "But if I knew a >particular container had been tampered with," he said, "I could >intercept it without causing problems for everyone else." A suspect >container could be identified and isolated for inspection without >interrupting regular cargo operations. > >Smart containers would also be important in the aftermath of an attack, >he said, for forensic investigation. "If we had an Al Qaeda-style attack >at two ports at the same time," he said, "it would create uncertainty >about all containers," possibly bringing trade to a standstill. "But if >you could go back into the data and find where the boxes came from, you >could narrow down the set of problems," he said, without having to close >down the whole system. > >General Electric tested the system in the laboratory and at sea. "The >freight can be subject to enormous forces," Mr. Dixon said, for example, >if the containers are stacked up to eight high on deck and rolling >through 40-foot seas. The group tried a number of approaches to sensing >whether the container doors were open at sea, including a pressure >sensor. But in one storm the container flexed so much that the pressure >between the door and the door frame went to zero. > >"So we decided pressure was not a good sensor," he said. "The zero >reading would give us a false alarm in heavy seas." > >Instead, the device senses magnetic flux density between the frame and >the door of the container, said Russell Mortenson, chairman of All Set >Marine Security. "When the door moves, the magnetic field changes," he >said, "and we can determine the distance between the door and the door >frame quite accurately." > >The device is built to last for the life of the container, typically 10 >years, he said. > >To interrogate the sensor, the G.E. group built wireless readers with a >100-foot range at dockside and prototypes of hand-held readers with a >30-foot range. "In the future," Mr. Petrizzi said, "we'd like a >hand-held device the size of a flashlight to allow people to arm and >read the status of the device." > >Unisys > > >paid for some of the tests for the new system. "It was an opportunity to >look at the competing types of technology," said Greg J. Baroni, who is >president of the global public sector of Unisys. "This one is relatively >inexpensive compared to the alternatives," he said. One alternative is >Global Positioning System-based systems with satellite communication to >keep track of goods on route. > >David Schrier, lead author of a report on container security by ABI >Research of Oyster Bay, N.Y., said there would eventually be >government-mandated rules for smart containers. His company estimated >that more than seven million containers enter the United States annually. > >"Once that government mandate comes," he said, "the market will lose its >apprehension about the costs of smart containers" and start providing >minimum protection. "That may well be simple devices to tell if the >container has been opened or not." > >Dr. Flynn said money spent on ensuring the integrity of cargo shipments >was justified. "The costs to improve the odds of preventing an attack, >and, in the worst case, to prevent shutting the whole system down, are a >good payment to make." > >E-mail: Eisenberg@n... 10694 From: Leanardo Date: Thu Jan 20, 2005 5:18pm Subject: Re: Inaugural Pictures I dont know which one bothers me more, the guy in thr front or the more "joyful" individual in the back... Bruce : ) --- In TSCM-L@yahoogroups.com, Michael Dever wrote: > Captions: > > "Keep looking, you'll find it!" > > "Looking for my weapon of mass destruction, heh heh heh!" > > > On 21 Jan 2005, at 10:09, James M. Atkinson wrote: > > > > > > > Here is one of those secret Skull and Bones ceremonies > > > > http://conservativelife.com/blog/media/bushzipper.jpg > > > > Can anybody come up with an appropiate caption, or shall we just let > > the > > picture speak for itself. > > > > -jma > > > > > > > > > > ------------------------------------------------------------------ ----- > > ----------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > > ------------------------------------------------------------------ ----- > > ----------------------------- > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 Web: > > http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > > ------------------------------------------------------------------ ----- > > ----------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > > ------------------------------------------------------------------ ----- > > ----------------------------- > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > Michael J. Dever CPP > Dever Clark & Associates > GPO Box 1163 > Canberra ACT 2601 > Australia > Voice: +612 6254 5337 > Email: dca@b... > ********************************************************************** ** > ***** > This message is sent in strict confidence for the addressee only. > It may contain legally privileged information. The contents are not to > be disclosed to anyone other than the addressee. Unauthorised > recipients are requested to preserve this confidentiality and to advise > the sender immediately of any error in transmission. > > > > [Non-text portions of this message have been removed] 10695 From: Date: Thu Jan 20, 2005 1:15pm Subject: Re: Inaugural Pictures Yeap. Make sure it don't free-fall like Bill's Whooa there big fella ... Ted will take care of that end. [Non-text portions of this message have been removed] 10696 From: kondrak Date: Thu Jan 20, 2005 6:25pm Subject: RE: Privacy Activists Brace for White House Push to Augment Yes, hasn't been a lot of TSCM stuff, so its a break from watching an empty mailbox.... At 13:06 1/20/2005, you wrote: >Don't we go through this about once a month or so? D K - it will play >itself out. >Strong opinions are hard to keep contained. Especially when articles sent >out are related to TSCM, but also personal freedom, and that sorta >off-topic thing. Then it goes to a tangent! > >- Matt > >-----Original Message----- >From: G P [mailto:telos888@y...] >Sent: Thursday, January 20, 2005 1:04 PM >To: TSCM-L@yahoogroups.com >Subject: RE: [TSCM-L] Privacy Activists Brace for White House Push to Augment > >Sounds like DK needs a hug. > >--- Riskbiz wrote: > > > I subscribed to this list to learn and educate > > myself about TSCM and asso > > fields, not listen to a bunch of > > psychotic/hysterical social/political > > commentary. Please stick to the topic or post > > elsewhere and stop filling my > > inbox with this crap. > > > > DK > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > >It is by caffeine alone I set my mind in motion. >It is by the juice of Star Bucks that thoughts acquire speed, >the hands acquire shaking, the shaking is a warning. >It is by caffeine alone I set my mind in motion. >=================================================== TSKS > > > > _____ > >Yahoo! Groups Links >* To visit your group on the web, go to: >http://groups.yahoo.com/group/TSCM-L/ > >* To unsubscribe from this group, send an email to: >TSCM-L-unsubscribe@yahoogroups.com > > >* Your use of Yahoo! Groups is subject to the Yahoo! Terms of >Service . > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10697 From: kondrak Date: Thu Jan 20, 2005 6:28pm Subject: RE: Privacy Activists Brace for White House Push to Augment Wholeheartedly agreed Matt, When they come for the 2nd Amendment, that's the trigger, and we all know it. Its the incrementalisim I worry about, the frog in the boiling water thing... At 12:46 1/20/2005, you wrote: >I agree with you to some point - there have always been conspiracies, and >total power is the aim. There's always the talk of the "shadow >government", and that the government in place really doesn't have any >power... alas, it's too much. >I believe that there's enough good people left in our great country to >stop any such state of totalitarianism from taking over. When the 2nd >amendment is trampled on, that truly is a problem as well - because that >takes a key power away from us, the power to defend ourselves. That's not >to disregard all the other rights we hold as free citizens, regarding free >speech, and one close to my heart, freedom of religion. But those are >intangibles, and can't actually be taken away by force (except from the >fainthearted). >The 2nd Amendment: "A well regulated militia, being necessary to the >security of a free state, the right of the people to keep and bear arms, >shall not be infringed." - - now that IS something that can physically be >taken away - and people take that lightly, citing "safety" as an excuse. > >I hold true as an idealist at heart that, "Once people have tasted freedom >they don't easily give it up." I know that will stand in our country >until... at least until Armageddon and the end of the world as we know it >is here. >Until then, I guess we have to carry n as normal - otherwise we'd die from >stress. 10698 From: kondrak Date: Thu Jan 20, 2005 6:31pm Subject: Re: Inauguration Video Ha!! Great! At 14:02 1/20/2005, you wrote: >Let it load, even though it is 6 MB long > >http://movies.yahoo.com/movies/feature/jibjabinaugural.html > > > >---------------------------------------------------------------------------------------------------- >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >---------------------------------------------------------------------------------------------------- > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10699 From: G P Date: Thu Jan 20, 2005 6:49pm Subject: Analysis of the Skype Protocol From ./ today: http://www.cs.columbia.edu/~library/TR-repository/reports/reports-2004/cucs-039-04.pdf Looks like Skype is utilizing a STUN-variant, with RSA 1536-2048 bit encryption for the key material, and AES-256 for the transport layer. Heavy duty crypto. 10700 From: G P Date: Thu Jan 20, 2005 6:52pm Subject: Re: Analysis of the Skype Protocol > From ./ today: /. rather (http://www.slashdot.org) 10701 From: Hawkspirit Date: Thu Jan 20, 2005 9:57pm Subject: US bugs in the UN Does anyone have confirming information on this? Roger I was wondering if you were aware of the story that appeared in the German media, but was censored from the American News, about Condelezza Rice having had the CIA bug the offices of the UN Security Counsel members during the hearings on Iraq? She admitted it to Der Speigel reporters, but nothing was ever mentioned in this country. The bugs were found during a routine search by British MI6 and were quickly identified as being CIA. The CIA said that they were ordered by Rice to place the bugs. Rice's reply was "yeah, so what!" It never went any further. -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.0 - Release Date: 1/17/2005 10702 From: G P Date: Thu Jan 20, 2005 10:15pm Subject: Re: US bugs in the UN Hey maybe Condi's not so bad after all ;) Why the heck would MI6 drop a dime on finding them, if this story is accurate? --- Hawkspirit wrote: > Does anyone have confirming information on this? > Roger > > I was wondering if you were aware of the story that > appeared in the > German media, but was censored from the American > News, about Condelezza > Rice having had the CIA bug the offices of the UN > Security Counsel > members during the hearings on Iraq? She admitted > it to Der Speigel > reporters, but nothing was ever mentioned in this > country. The bugs were > found during a routine search by British MI6 and > were quickly identified > as being CIA. The CIA said that they were ordered > by Rice to place the > bugs. Rice's reply was "yeah, so what!" It never > went any further. > > > > -- > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.7.0 - Release > Date: 1/17/2005 > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > What would our lives be like without music, dance, > and theater? > Donate or volunteer in the arts today at Network for > Good! > http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10703 From: Ramon Date: Thu Jan 20, 2005 6:53pm Subject: FBI abandons Carnivore wiretap software FBI abandons Carnivore wiretap software Commercial program, 3rd-party wiretaps now usedThe Associated Press Updated: 9:55 p.m. ET Jan. 18, 2005WASHINGTON - The FBI has effectively abandoned its custom-built Internet surveillance technology, once known as Carnivore, designed to read e-mails and other online communications among suspected criminals, terrorists and spies, according to bureau oversight reports submitted to Congress. Instead, the FBI said it has switched to unspecified commercial software to eavesdrop on computer traffic during such investigations and has increasingly asked Internet providers to conduct wiretaps on targeted customers on the government's behalf, reimbursing companies for their costs. The FBI performed only eight Internet wiretaps in fiscal 2003 and five in fiscal 2002; none used the software initially called Carnivore and later renamed the DCS-1000, according to FBI documents submitted to Senate and House oversight committees. The FBI, which once said Carnivore was "far better" than commercial products, said previously it had used the technology about 25 times between 1998 and 2000. 'We're using [commercially available software] more now and we're asking the Internet service providers that have the capabilities to collect data in compliance with court orders.' - Paul Bresson FBI spokesman The FBI said it could not disclose how much it spent to produce the surveillance software it no longer uses, saying part of its budget was classified. Outside experts said the government probably spent between $6 million and $15 million. The congressional oversight reports were obtained last week under the U.S. Freedom of Information Act by the Washington-based Electronic Privacy Information Center, a civil liberties group that criticized the surveillance software after it was first disclosed in 2000. Commercial alternatives FBI spokesman Paul Bresson said the bureau moved to popular commercial wiretap software because it was less expensive and had improved in its ability to copy e-mails and other communications of a targeted Internet account without affecting other subscribers. "We see the value in the commercially available software; we're using it more now and we're asking the Internet service providers that have the capabilities to collect data in compliance with court orders," Bresson said. The FBI said last week it was sending back to the drawing board its $170 million computer overhaul, which was intended to give agents and analysts an instantaneous and paperless way to manage criminal and terrorism cases. Related stories FBI may have to scrap new computer program From 2001: FBI software cracks encryption wall Experts said the life span of roughly four years for the bureau's homegrown surveillance technology was similar to the shelf life of cutting-edge products in private industry. "It's hard to criticize the FBI trying to keep pace with technology," said James Dempsey of the Washington-based Center for Democracy and Technology. "There is just a huge amount of innovation and development going on in the private sector." Henry H. Perritt Jr., who led an oversight study of Carnivore in 2000 for the Justice Department, said the FBI originally built its own surveillance system because commercial tools were inadequate. Perritt, a professor at the Chicago-Kent College of Law, said he was unaware of any commercial wiretap software that includes audit features robust enough to convince a federal judge that e-mails from innocent Internet users weren't captured by mistake. "You'd like to have a package that supervisors within a field office and in Washington could do an audit and make sure they're using the tools compliant with the court order," Perritt said. The FBI laboratory division, which produced Carnivore, was headed by Donald M. Kerr, who left the FBI in August 2001 to become the CIA's chief gadget-maker as head of its science and technology directorate. Kerr told lawmakers in 2000 that Carnivore was "far better than any commercially-available sniffer." http://www.msnbc.msn.com/id/6841403/ 10704 From: Gregory Hicks Date: Thu Jan 20, 2005 11:16pm Subject: Re: US bugs in the UN > To: > From: "Hawkspirit" > Date: Thu, 20 Jan 2005 19:57:55 -0800 > > Does anyone have confirming information on this? Roger > > I was wondering if you were aware of the story that appeared in the > German media, but was censored from the American News, about Condelezza > Rice having had the CIA bug the offices of the UN Security Counsel > members during the hearings on Iraq? She admitted it to Der Speigel > reporters, but nothing was ever mentioned in this country. The bugs were > found during a routine search by British MI6 and were quickly identified > as being CIA. The CIA said that they were ordered by Rice to place the > bugs. Rice's reply was "yeah, so what!" It never went any further. Actually, this is not 100% accurate. The story was on the front pages of the papers on the west coast, on the nightly news, and a few other news type places. The UN was apparently bugged but... It was quite a story for about 4 days. This was late last year... --------------------------------------------------------------------- I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton 10705 From: A Grudko Date: Fri Jan 21, 2005 4:26am Subject: RE: McDonald's in Boca to offer glimpse into world of espionage -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] > Boca Raton ∑ He's an international man of intrigue who's bringing some of the old trade secrets from the espionage world to, well, a McDonald's. Now if he could just put up a poster revealing what REALLY goes into 'The Colonel's 14 Secret Herbs and Spices' and the fabled Coca Cola recipe which it is rumoured even the KGB could not get (in a failed 70's attempt to copy the US brand into the Eastern block - they should have left the vodka out). Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" [Non-text portions of this message have been removed] 10706 From: A Grudko Date: Fri Jan 21, 2005 4:27am Subject: wi-Fi ? clones LONDON, England -- "Evil twins" are the latest menace to threaten the security of Internet users, experts in the UK are warning. An "evil twin" is a bogus base station that latches on to someone using new "Wi-Fi" wireless technology. Victims think their laptops or mobile phones are connected to bona fide wireless internet connections. They may then transmit valuable bank details or other personal information, not suspecting that they are being intercepted by cybercriminals. Professor Brian Collins, from the Royal Military College of Science, Cranfield University, a former chief scientist at GCHQ -- the Government's secret eavesdropping station -- said: "Users need to be wary of not using their Wi-Fi enabled laptops or other portable devices in order to conduct financial transactions or anything that is of a sensitive personal nature, for fear of having disclosed this information to an unauthorised third party." Wireless devices link to the Internet via "hotspots" - nearby connection points that they lock on to. But these hotspots can act like an open door to thieves. Anyone with suitable equipment can locate a hotspot and take its place, substituting their own "evil twin." Dr. Phil Nobles, a wireless Internet and cybercrime expert at Cranfield University, said: "So-called 'evil twin' hotspots present a hidden danger for Web users. "In essence, users think they've logged on to a wireless hotspot connection when in fact they've been tricked to connect to the attacker's unauthorised base station. "The latter jams the connection to a legitimate base station by sending a stronger signal within close proximity to the wireless client -- thereby turning itself into an 'evil twin.' "Cybercriminals don't have to be that clever to carry out such an attack. Because wireless networks are based on radio signals they can be easily detected by unauthorised users tuning into the same channel hopping group. Unwitting web users are invited to log into the attacker's server with bogus login prompts, tempting them to give away sensitive information such as user names and passwords. Often users are unaware the have been duped until well after the incident has occurred. Dr. Nobles spelled out the warning at a wireless crime event held at the Dana Centre, the Science Museum's forum for discussing controversial science, in London. Lisa Jamieson, Head of Programmes at the Dana Centre, said: "Half of all business wireless networks in this country have inadequate security controls in place, making their information vulnerable to attack." --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 From: Hawkspirit Date: Mon Jan 21, 2002 11:51am Subject: Wireless LAN Test Gear Anyone have any experience with this test gear and software? Roger A handful of test equipment companies are currently developing advanced site survey tools - Berkeley Varitronics Systems (Metuchen, New Jersey) and Softbit (Oulu, Finland) now have products on the market. Softbit's TriCycle. is software that installs on a laptop equipped with a radio card and provides a very useful display of nearby access points, association status, signal levels, and has the ability to display coverage areas. This product doesn't get you away from lugging a laptop around, but it certainly has features that decrease the time and increase the accuracy of performing site surveys. Berkeley Varitronics Systems' Grasshopper. has fewer graphical features, but it is a small handheld device weighing only 3 lbs. http://www.80211-planet.com/tutorials/article/0,4000,10724_953661,00.html 4594 From: James M. Atkinson Date: Mon Jan 21, 2002 0:12pm Subject: Re: Help on R.F. signal identification You really don't need a dish, but you will need either a yagi or a horn. A dish tends to be a little too high of a gain antenna to use indoors, mostly due to the reflections of the signals. However, a small dish if really helpful as your outside and dealing with wide open spaces. Log periodic units are OK, but they are too broadband for this kind of situation, and don't have don't have sufficient gain to be of much value in cases like this. My personal preference would be a 16 dBi standard gain horn fed into an LNA with a filter on the front end. I prefer a 30-43+ dB LNA with a really sharp bandpass filter. When digging around in the 2.4 GHz ISM band you have to fight with PCS phones down below 1.9 GHz, and deal with MMDS and Aero Radar close to the band as well (many a sweeper has confused 2.7-2.9 GHz radar scatter with a burst transmission). You can get away with about 12 dB of antenna gain, but it is important to filter, then amplify. If your using something like a MSR-904 or SPECTRE then you have to fight with 20+ dB of system noise as well, so that filtered LNA is an absolute must. Figure the standard gain horn gives you a moderately directional signal (about a 20-30 degree pattern), but that the LNA actually cleans it up and isolates it so the receiver can hear it. On an MSR-904 you want to punch up the signals of interest by about 30 dB (plus the noise figure of the amplifier), and mount the LNA/Filter DIRECTLY on the horn. When you buy the horn get it with an SMA connector and attach the LNA directly to this (using an SMA to SMA L connector). If you are unable to find an LNA with the filter internal in the amp then buy an external and put it (or them) between the horn and the amplifier. The goal is to knock down the 1.8 PCS band by at least 60 dB, and preferably kill everything below 2 GHz by at least 40 dB. If your working near an airport you will also have to filter everything above 2.7 GHz. To measure the time domain crank the bandwidth of your receiver to about 50 MHz and dump the detected signal into a logarithmic amplifier and then to your scope. Set the trigger to be slightly above the noise floor of the incoming signal and document how it behaves. It is far more important to use the equipment to TRACE the source of the signal, then it is to try to figure out the mystery from a distance using passive techniques. -jma At 9:33 AM -0800 1/21/02, Hawkspirit wrote: >Thanks, Jim, > >The overall bandwidth is by the numbers 66MHZ, The individual pulses >appeared to be about 5MHZ each. As far as the time domain, I was using my >surveillance receiver so I could not do any kind of frame capture. >What would be the best technique for measurement in the time domain? >I could get a general direction on the signal but the sweep was started >after dark so I could not see the surrounding area. It is a residential >neighborhood. >The antenna's I am using are various flavors of wire wound configurations. >It appears I will need some kind of dish for this. Would this be your >recommendation for better directional analysis? >Thanks as always for your expert R.F.help. Roger > > >Roger, >What was the bandwidth of the signals, and did you examine the >signals in the time domain? >I would suspect an 802.11 WLAN connection, but of course it has to be >assumed a hostile signal until proven otherwise. >Where did you trace the signal to? >Was it originating INSIDE your clients facility? >What kind of antenna where you using? >-jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4595 From: Hawkspirit Date: Mon Jan 21, 2002 0:28pm Subject: Help on R.F. signal Identification From looking at these two articles, it sure seems that this describes my signal. Roger Part 4: the Frequency Hopping Spread Spectrum PHY (Naftali Chayat, BreezeCom) Part 5: the Direct Sequence Spread Spectrum PHY (Jan Boer, Lucent Technologies) http://grouper.ieee.org/groups/802/11/main.html 4596 From: James M. Atkinson Date: Mon Jan 21, 2002 0:59pm Subject: Re: Help on R.F. signal Identification OK, But you still have to find out where the signal is coming from. Bluetooth is quite capable of being used for voice eavesdropping, and as such you have to hunt down where the signals are coming from. For example, an eavesdropper can plant microphones all over someone office and then wire them into the companies LAN. Then extended the LAN "off premises" with Bluetooth so the eavesdropper can backdoor into the network and download the audio from the microphones. With some fairly cheap consumer technology the eavesdropper can have a VOX type voice recorder with a USB interface (like some of the 22 hour units) tied into a small controller that sits on the network. Every week of so the eavesdropper simply drives by the building and downloads a half dozen of these audio files from the controller in just a matter of minutes. A sophisticated eavesdropper could also have obtains a Bluetooth eavesdropping device, and what your picking up on is actually a signal a hostile device. Trace down where the signal is coming from, then trace the network connected to it. Suspect it is hostile until you can prove otherwise. -jma At 10:28 AM -0800 1/21/02, Hawkspirit wrote: > From looking at these two articles, it sure seems that this describes my >signal. Roger > >Part 4: the Frequency Hopping Spread Spectrum PHY (Naftali Chayat, BreezeCom) >Part 5: the Direct Sequence Spread Spectrum PHY (Jan Boer, Lucent >Technologies) > >http://grouper.ieee.org/groups/802/11/main.html > -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4597 From: Aimee Farr Date: Mon Jan 21, 2002 0:59pm Subject: RE: China silent over spy devices found on its presidential plane > The story was not carried by any local media. Analysts said yesterday they > saw the lack of response by Beijing so far as a sign that the Chinese > leadership wanted to downplay the incident. Downplay...The Washington Post immediately jumps to mind, doesn't it? Pht. ~Aimee ''When the mass support is sufficiently good to block the leakage of news, it is often possible by various ruses to succeed in leading the enemy into a morass of wrong judgments and actions so that he loses his superiority and the initiative. The saying, "There can never be too much deception in war", means precisely this. What does "being caught unawares" mean? It means being unprepared. Without preparedness superiority is not real superiority and there can be no initiative either. Having grasped this point, a force which is inferior but prepared can often defeat a superior enemy by surprise attack. We say an enemy on the move is easy to attack precisely because he is then off guard, that is, unprepared.'' -- MAO 4598 From: James M. Atkinson Date: Mon Jan 21, 2002 1:09pm Subject: ONLY IN AMERICA ONLY IN AMERICA 1. Only in America...can a pizza get to your house faster than an ambulance. 2. Only in America...are there handicap parking places in front of a skating rink. 3. Only in America...do drugstores make the sick walk all the way to the back of the store to get their prescriptions while healthy people can buy cigarettes at the front. 4. Only in America...do people order double cheese burgers, large fries, and a diet coke. 5. Only in America...do banks leave safe doors open and then chain the pens to the counters. 6. Only in America...do we leave cars worth thousands of dollars in the driveway and put our useless junk in the garage. 7. Only in America...do we use answering machines to screen calls and then have call waiting so we won't miss a call from someone we didn't want to talk to in the first place. 8. Only in America...do we buy hot dogs in packages of ten and buns in packages of eight. 9. Only in America...do we use the word "politics" to describe the process so well: "Poli" in Latin meaning "many" and "tics" meaning "bloodsucking creatures." 10. Only in America...do they have drive-up ATM machines with Braille lettering -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4599 From: James M. Atkinson Date: Mon Jan 21, 2002 2:56pm Subject: Me want beer Indian walks into a bar with a shotgun in one hand and a bucket of Buffalo manure in the other. He says to the bartender: "Me want beer." The bartender says: "Sure Chief, coming right up." He gets the Indian a tall draft beer and the Indian drinks it down in one gulp, picks up the bucket, throws the manure into the air and blasts it with the shotgun, then he walks out. Four days later the Indian returns. He has his shotgun in one hand and another bucket of manure in the other. He walks up to the bar and says to the bartender: "Me want beer." The bartender says: "Whoa, Tonto, we're still cleaning up from the last time you were in here. What was that all about, anyway? "The Indian says, "Me in training for job as federal employee; drink beer, shoot the shit, and disappear for a few days." -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4600 From: gvp Date: Mon Jan 21, 2002 2:13pm Subject: [jmatk@tscm.com: Re: Help on R.F. signal Identification] Bluetooth probably isn't the culprit (although it operates in the 2.4 gig ISM band), as the range for Bluetooth and other Personal Area Networks is about 10 - 15 meters. One of the 802.11 variants is more likely. ----- Forwarded message from "James M. Atkinson" ----- Delivered-To: 25th.com-gvp@2... X-eGroups-Return: sentto-49964-5064-1011639627-gvp=25th.com@r... X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L@yahoogroups.com X-Sender: spook8@p... In-Reply-To: <5.1.0.14.0.20020121102529.00a3b020@1...> To: TSCM-L@yahoogroups.com From: "James M. Atkinson" X-Yahoo-Profile: graniteislandgroup Mailing-List: list TSCM-L@yahoogroups.com; contact TSCM-L-owner@yahoogroups.com Delivered-To: mailing list TSCM-L@yahoogroups.com Precedence: bulk List-Unsubscribe: Date: Mon, 21 Jan 2002 13:59:36 -0500 Subject: Re: [TSCM-L] Help on R.F. signal Identification OK, But you still have to find out where the signal is coming from. Bluetooth is quite capable of being used for voice eavesdropping, and as such you have to hunt down where the signals are coming from. For example, an eavesdropper can plant microphones all over someone office and then wire them into the companies LAN. Then extended the LAN "off premises" with Bluetooth so the eavesdropper can backdoor into the network and download the audio from the microphones. With some fairly cheap consumer technology the eavesdropper can have a VOX type voice recorder with a USB interface (like some of the 22 hour units) tied into a small controller that sits on the network. Every week of so the eavesdropper simply drives by the building and downloads a half dozen of these audio files from the controller in just a matter of minutes. A sophisticated eavesdropper could also have obtains a Bluetooth eavesdropping device, and what your picking up on is actually a signal a hostile device. Trace down where the signal is coming from, then trace the network connected to it. Suspect it is hostile until you can prove otherwise. -jma At 10:28 AM -0800 1/21/02, Hawkspirit wrote: > From looking at these two articles, it sure seems that this describes my >signal. Roger > >Part 4: the Frequency Hopping Spread Spectrum PHY (Naftali Chayat, BreezeCom) >Part 5: the Direct Sequence Spread Spectrum PHY (Jan Boer, Lucent >Technologies) > >http://grouper.ieee.org/groups/802/11/main.html > -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ----- End forwarded message ----- 4601 From: James M. Atkinson Date: Mon Jan 21, 2002 6:45pm Subject: The cat walked by and broke wind... Good Evening, I just had a little chat with some salesmen who called and tried to hustle me into becoming an "exclusive dealer" for some highly sophisticated counter-surveillance which I can sell in my "store" (like I have time to run a storefront). I decided to entertain the call for a few minutes, and played the "gosh, what is a bug detector" game; which cause the sales weenie to explain how sophisticated the equipment was. I asked if they made the equipment themselves, and he proudly answered in the affirmative. He kept pushing me to visit his website, which I did (I am not going to give out the link on the off chance one of our membership is foolish enough to buy the gear). He explains to me that the pricing on their website is for dealers only, and that I can markup the prices by at least 800% or more. I of course feigned getting excited about all the money that could be made selling his equipment. I let him go through his little sales script, then I started lobbing "clueless questions" about "gee, what kinds of wiretaps will it detect", then asked him to explain what they meant by series and parallel, etc. Then, I dropped a bomb on the poor guy and asked him if it would detect "high impedance wiretaps" and he walked right into it. "Oh, Sure" he tells me after consulting with someone on his end, "but you have to get our Advanced System". He then went on to tell me that the engineers on his end have spent the last 15 years designing this equipment, etc... etc... The CIA buys is, the NSA certified it, the FBI is trying to force them out of business, and so on. I then explained that he can "insert and rotate" his little spy shop toys, that his descriptions are fraudulent, that his products are crap, and are being offered in violation of the law. Sheesh, it is really unbelievable the crap some of these people are trying to foist on the public. The sad part is that I have actually seen some of their equipment in the hands of neophytes (who paid the 800%). While it didn't detect any covert eavesdropping equipment it did blink when the cat walked by and broke wind... other then that it was a worthless paperweight. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4602 From: Matthew Paulsen Date: Mon Jan 21, 2002 7:58pm Subject: RE: The cat walked by and broke wind... hehe.. Reminds me of a buddy of mine that has one that goes off when you put it up to your head. Best $100 toy I've seen in years. -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Monday, January 21, 2002 4:46 PM To: TSCM-L Mailing List Subject: [TSCM-L] The cat walked by and broke wind... Good Evening, I just had a little chat with some salesmen who called and tried to hustle me into becoming an "exclusive dealer" for some highly sophisticated counter-surveillance which I can sell in my "store" (like I have time to run a storefront). I decided to entertain the call for a few minutes, and played the "gosh, what is a bug detector" game; which cause the sales weenie to explain how sophisticated the equipment was. I asked if they made the equipment themselves, and he proudly answered in the affirmative. He kept pushing me to visit his website, which I did (I am not going to give out the link on the off chance one of our membership is foolish enough to buy the gear). He explains to me that the pricing on their website is for dealers only, and that I can markup the prices by at least 800% or more. I of course feigned getting excited about all the money that could be made selling his equipment. I let him go through his little sales script, then I started lobbing "clueless questions" about "gee, what kinds of wiretaps will it detect", then asked him to explain what they meant by series and parallel, etc. Then, I dropped a bomb on the poor guy and asked him if it would detect "high impedance wiretaps" and he walked right into it. "Oh, Sure" he tells me after consulting with someone on his end, "but you have to get our Advanced System". He then went on to tell me that the engineers on his end have spent the last 15 years designing this equipment, etc... etc... The CIA buys is, the NSA certified it, the FBI is trying to force them out of business, and so on. I then explained that he can "insert and rotate" his little spy shop toys, that his descriptions are fraudulent, that his products are crap, and are being offered in violation of the law. Sheesh, it is really unbelievable the crap some of these people are trying to foist on the public. The sad part is that I have actually seen some of their equipment in the hands of neophytes (who paid the 800%). While it didn't detect any covert eavesdropping equipment it did blink when the cat walked by and broke wind... other then that it was a worthless paperweight. -jma -- -------------------------------------------------------------------------- ------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------- ------------------------ James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com -------------------------------------------------------------------------- ------------------------ People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell ------------------------------------------------------------------------ -------------------------- Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4603 From: Aimee Farr Date: Mon Jan 21, 2002 9:40pm Subject: RE: The cat walked by and broke wind... I bet Jim makes for colorful testimony. Deceptive advertising and deceptive trade practice seem to run rampant in your industry on all sides. In many states, the deceptive trade practice statutes might offer assistance (goods and services), but only if people are knowledgeable enough to seek relief through counsel, and view it as worth the trouble. You've also got AGs and the FTC (federal deceptive trade practices and deceptive advertising). Lobbying for special provisions might offer extra bite. The Texas deceptive trade practice statute has special provisions for secondhand watches, kosher foods and Indian artifacts. (One would think that if the 'secondhand watch people' can get legislation....) Because of the unique natures of the goods and services in this area, I think it warrants a special deceptive trade practice provision, or a separate statute. Elected officials see a personal stake in many of these issues, they might be more receptive than you think. ~Aimee 4604 From: A Grudko Date: Tue Jan 22, 2002 10:23am Subject: The cat walked by and broke wind... - Original Message - From: James M. Atkinson I have an advantage in that I was born with a cat fart detector in the middle of my face - sorry I don't know the frequency it works on or any other tech specs.. > I let him go through his little sales script, then I started lobbing > "clueless questions" about "gee, what kinds of wiretaps will it > detect", then asked him to explain what they meant by series and > parallel, etc. I had a guy working for me who could not tell wire from 4x4 timber who now offers TSCM services. > Then, I dropped a bomb on the poor guy and asked him if it would > detect "high impedance wiretaps" and he walked right into it. "Oh, > Sure" he tells me after consulting with someone on his end, "but you > have to get our Advanced System". 60M ohm, 0.1 pf parallel, invisible to all but the best. > He then went on to tell me that the engineers on his end have spent > the last 15 years designing this equipment, etc... etc... The CIA > buys is, the NSA certified it, the FBI is trying to force them out of > business, and so on. Yada yada.... > > I then explained that he can "insert and rotate" his little spy shop > toys, that his descriptions are fraudulent, that his products are > crap Such mild language jma? Perhaps buy some under bcontroled conditons do a media exposure. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4605 From: Shawn Hughes Date: Tue Jan 22, 2002 11:32pm Subject: computer question I'm sitting here watching a show on cable ( I know). They are discussing the encroachment of surveillance by the gov against citizens. One detail they gave was on the Ames case. They stated that the FBI was remotely powering on Ames home computer, then subsequently removed data from, and powered it back down via the residential power lines. I am a little skeptical, unless they put a black box inside his pc. For instance, what kept ALL pc's on that transformer circuit from waking up? But, I am low on the knowledge base totem pole. What say ye, experts? Thanks! Shawn 4606 From: Matthew Paulsen Date: Wed Jan 23, 2002 3:16am Subject: RE: computer question The Ames case goes back to February, 1994 with Aldrich Ames, a counterintelligence officer with the CIA. In February, 1997 Ames plead guilt to committing espionage for Russia. From what I've been exposed to, various government and private groups have been developing alternative measure to pass information through alternate methods such as power lines and water, such as IC/SS PLC/SS circuits. IE:Intel, Itron, National Semi, Rockwell, Motorola, Cyplex, Daewoo, Now defunct Enron (and subsidiaries and subcontractors), etc. Power line theory for transmission of information for intercommunication between generating stations, substations and control rooms holds that this sort of espionage is feasible at lower levels down to the receiving devices - such as remote espionage of consumer television sets, etc. Further, this could be used for non-compliant networks which are operating antiquated systems - C64, Altos, TSR 80's, etc. Remote power switches are available commerically, so it is conceivable that one was used, but it would have to be planted and integrated into a LAN/WAN connection or remote dialup/LAN connection to work, or chips / circuits (ie: a board is installed in the PC, station, remote manager, etc). Baud rates vary depending on who you talk to as well as data transmission distances - I've seen 300bps to 1gb/s at distances of a few hundred yards to worldwide, and phy being water, fiber, cable, PL, etc. Outside this range, there are microchip capable devices that are available with no power supply source that are attachable, injected, injested, that can be worn, carried, etc, but this would not provide the scope of services that you are describing, and they are only for intermittent use, but are capable of being interfaced via RF and then to LAN/WAN for public transmission through PPTP / HTTP, etc over IP, IPX, whatever, for global communication. I've worked on some systems that have provided PL monitoring from centralize base stations for power utilities for automated billing and other services - downtimes, line failures, etc, which can be automated to interoperate with MRP/ERP systems and other systems, so it's not a hard feat to take that integration and migrate it from consumer/commerical applications to industrial and government espionage services. Minature digital transceivers based on these technologies are under development, and in use by some organizations, federal and otherwise. Normally though, it's easier to plant a trojan to access the system and manage remote booting, kslogging, etc, microphones, and any cameras if present. Guess it comes down to... It's easier, cheaper, and more reliable - "engineers viewpoint - It's not broken, so lets add more to it, vs 'normal' person viewpoint - it's not broken, so don't fix it" being a reasonable assumption. But, in the world of unlimited budgets without justification for expenses... who knows. Probably not much of an answer, but it's a start. If anyone else has other information, I'd be happy to find out what others have used/seen beyond what I have. -----Original Message----- From: Shawn Hughes [mailto:srh@e...] Sent: Tuesday, January 22, 2002 9:32 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] computer question I'm sitting here watching a show on cable ( I know). They are discussing the encroachment of surveillance by the gov against citizens. One detail they gave was on the Ames case. They stated that the FBI was remotely powering on Ames home computer, then subsequently removed data from, and powered it back down via the residential power lines. I am a little skeptical, unless they put a black box inside his pc. For instance, what kept ALL pc's on that transformer circuit from waking up? But, I am low on the knowledge base totem pole. What say ye, experts? Thanks! Shawn Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4607 From: Michael Puchol Date: Wed Jan 23, 2002 4:57am Subject: Re: computer question Matthew, You are right - the technology is there. A friend of mine has a patent for implementing an automated electricity meter reading system (by tapping into the integrator), which sends the consumption totals every so often to the nearest substation, which in turn forwards it to the billing computer, all done via your standard power lines. There are kits available that provide a standard LAN interface to computers, but that use your home's electrical wiring to send the data between these 'access points'. So, I presume it would be easy to implement such a concept. The way I'd do it, I would insert a custom PCB inside the power supply of the target computer, connected to the PC's wake-on-LAN port (most computers provide this function, or at least a wake-on-ring from a modem). That way, I could send a message to my 'bug' to turn on or off the computer at will, as it would also control the power supply. Getting it to send data afterwards is a different matter, but there are ways around that too. I guess your custom PCB could tap into the keyboard port, and send you the keystrokes logged. In any case, sufficient time and physical access to the target computer are needed, and certainly these functions are not built-in into any computer I know of. All the best, Mike ----- Original Message ----- From: "Matthew Paulsen" To: Sent: Wednesday, January 23, 2002 10:16 AM Subject: RE: [TSCM-L] computer question > The Ames case goes back to February, 1994 with Aldrich Ames, a > counterintelligence officer with the CIA. In February, 1997 Ames plead guilt > to committing espionage for Russia. From what I've been exposed to, various > government and private groups have been developing alternative measure to > pass information through alternate methods such as power lines and water, > such as IC/SS PLC/SS circuits. IE:Intel, Itron, National Semi, Rockwell, > Motorola, Cyplex, Daewoo, Now defunct Enron (and subsidiaries and 4608 From: Matthew Paulsen Date: Wed Jan 23, 2002 0:29pm Subject: RE: computer question I totally forgot about WOL and other techs. I worked at Intel to help develop portions of the technology in 1995/96. The network adapter is fed constant power through a secondary interface from the power supply in the system - the power supply maintains current to the NIC when the rest of the system is turned off. Another system we had at Intel was codenamed hammerhead, now part of LANDesk, that allowed you to access systems through WOL and rebuild the entire system from scratch. These two systems together were designed to allow large corporations to hire untrained techs to roll out tens of thousands of systems on a LAN, or to allow the end user to install their system and have centralized IT blast the image down over the wire - simply plug in the system into the lan, setup kb/mouse, power cord, etc, and we'll turn it on via a WOL wakeup token, rebuild it to corporate standard and reboot it and leave it at a login prompt, all remotely. HP & Compaq & others have integrated remote management adapters for their servers. -----Original Message----- From: Michael Puchol [mailto:mpuchol@s...] Sent: Wednesday, January 23, 2002 2:57 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] computer question Matthew, You are right - the technology is there. A friend of mine has a patent for implementing an automated electricity meter reading system (by tapping into the integrator), which sends the consumption totals every so often to the nearest substation, which in turn forwards it to the billing computer, all done via your standard power lines. There are kits available that provide a standard LAN interface to computers, but that use your home's electrical wiring to send the data between these 'access points'. So, I presume it would be easy to implement such a concept. The way I'd do it, I would insert a custom PCB inside the power supply of the target computer, connected to the PC's wake-on-LAN port (most computers provide this function, or at least a wake-on-ring from a modem). That way, I could send a message to my 'bug' to turn on or off the computer at will, as it would also control the power supply. Getting it to send data afterwards is a different matter, but there are ways around that too. I guess your custom PCB could tap into the keyboard port, and send you the keystrokes logged. In any case, sufficient time and physical access to the target computer are needed, and certainly these functions are not built-in into any computer I know of. All the best, Mike ----- Original Message ----- From: "Matthew Paulsen" To: Sent: Wednesday, January 23, 2002 10:16 AM Subject: RE: [TSCM-L] computer question > The Ames case goes back to February, 1994 with Aldrich Ames, a > counterintelligence officer with the CIA. In February, 1997 Ames plead guilt > to committing espionage for Russia. From what I've been exposed to, various > government and private groups have been developing alternative measure to > pass information through alternate methods such as power lines and water, > such as IC/SS PLC/SS circuits. IE:Intel, Itron, National Semi, Rockwell, > Motorola, Cyplex, Daewoo, Now defunct Enron (and subsidiaries and Yahoo! Groups Sponsor ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4609 From: James M. Atkinson Date: Wed Jan 23, 2002 3:00pm Subject: Re: computer question - Dangling the Dongle Shawn, It's really no big mystery. Most computers have a specific key on the keyboard (or motherboard) that when pressed allows the computer to wake up and go through a boot. This function can be remotely controlled by installing a "remote boot dongle" inside the keyboard, or inside the computer so an eavesdropper can turn the computer on or off remotely. The dongle either turns the machine on/off at a preset time, waits until a certain period of non usage has occurred, or wakes up in response to a remote command. The remote activation command can come in via any variety of conductors (phone line, power line, Cable TV, LAN, etc) or though a wireless connection. Once the computer is up and booted the eavesdropper can then access the OS remotely, and depending on which software they are using they perform any number of tasks. Occasionally, you will come across such goodies on larger corporate sweeps, and most often on servers, remote machines, or problem children where the sys admin doesn't want to keep running to remote parts of the campus to tweak software. Such a system allows the sys admin to remotely wake-up or boot the machine in question and "do those things which admins do so well". Usually on the corporate sweeps the 'wake up" signal goes out though the LAN as a wake-up packet addressed to the dongle, and more recently though a 802.11 network. If the bug the FBI used on Ames utilized the power lines, then the listening post would have to be fairly close to the Ames home as you lose quite a bit of your signal at the distribution transformer. In all probability they where camped out in a home nearby and simply brought up the OS, and then issued basic DOS commands (from their end) to browse through the hard drive and suck down files. After they where done it would have been quite simple to shut the machine down. -jma PS: Ames was a putz, and didn't follow good tradecraft Technical Counterintelligence Rule #374 Agent shall always turn of his/her computer when not in immediate use, and shall remove the power cord from the wall and/or disengaged the breaker on the individual UPS when the machine will not be in use for more then two hours. In the event the agent does not have a positive 7/24 security force in place the computer will also be powered down and locked into an approved security container (such as a safe) and physically disconnected from both the telephone circuits, LAN circuits, and all other conductive or radiated paths. At 12:32 AM -0500 1/23/02, Shawn Hughes wrote: >I'm sitting here watching a show on cable ( I know). They are discussing >the encroachment of surveillance by the gov against citizens. > >One detail they gave was on the Ames case. They stated that the FBI was >remotely powering on Ames home computer, then subsequently removed data >from, and powered it back down via the residential power lines. > >I am a little skeptical, unless they put a black box inside his pc. For >instance, what kept ALL pc's on that transformer circuit from waking up? > >But, I am low on the knowledge base totem pole. What say ye, experts? > >Thanks! > >Shawn -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4610 From: James M. Atkinson Date: Wed Jan 23, 2002 4:24pm Subject: China plane bugs Sloppy U.S. spying or untrue? http://famulus.msnbc.com/FamulusIntl/reuters01-22-174254.asp?reg=PACRIM China plane bugs Sloppy U.S. spying or untrue? WASHINGTON, Jan. 22 - Either U.S. spy agencies were incredibly sloppy by planting so many eavesdropping devices in a Chinese presidential plane that detection was almost certain, or it was not their work, U.S. intelligence experts said on Tuesday. The experts expressed skepticism that American spies had a hand in what newspaper reports said were more than two dozen bugs found inside a plane to be used by Chinese President Jiang Zemin, including in the bathroom and the headboard of the bed. On one hand, the CIA, National Security Agency and FBI have a strong national security interest in collecting intelligence on China. But on the other hand, the intelligence experts questioned whether the spy agencies would have been so slipshod to have planted more than two dozen bugs, increasing the risk of discovery, in a plane they knew would be carefully swept for just such items. Weekend reports in The Washington Post and the Financial Times, citing Chinese officials, raised the specter of American spies at work because the Boeing 767 spent close to a year in Texas being refurbished before it was sent to China last August. Official Washington from the White House to the CIA has simply declined to comment, leaving the issue murky without a firm denial. And Beijing offered a similar lack of comment, saying China had no knowledge of such an incident. The reports of possible espionage uncovered came at a delicate moment, with President George W. Bush due to visit China next month. But the methods outlined in the media raised questions for some U.S. experts. 'FAIR GAME' ''I'm skeptical,'' one intelligence expert said. ''It seems an odd way to go about it if it is true.'' The CIA, which is generally not allowed to spy on Americans, could bug equipment heading for key targets such as Iran, North Korea or China. ''It's fair game,'' a former intelligence official said on condition of anonymity. But on putting two dozen bugs into plane upholstery that could be easily detected, he said: ''It would be surprising, and increase risk of discovery.'' One version of the story circulating in Beijing, according to a New York Times report on Tuesday, suggested the bugs were placed by the Chinese Air Force, which was guarding the plane during its construction in the United States. Intelligence experts also said it would be difficult to conduct such an operation without informing the American firm. Philip O'Connor, a vice president at Dee Howard Aircraft Maintenance, said the San Antonio, Texas, firm that provided the space and security for refitting the plane had no knowledge of any listening devices planted. ''We were surprised because there is no way we would jeopardize this company,'' he told Reuters in a telephone interview. ''We've done so many heads-of-state aircraft and never had a complaint about anything like that.'' The company has worked previously on aircraft belonging to the king of Saudi Arabia, the sultan of Oman and the sultan of Brunei, among others, he said. ''There is no way that we would get involved with that. We don't build our integrity and reputation on that kind of stuff,'' O'Connor said. Asked whether the U.S. government would have had to notify the firm for such a mission, O'Connor replied: ''I don't know. I don't have a clue how that works. I don't know what these covert actions are like.'' He said the company had not heard about any bugging incident from either the Chinese or American governments. O'Connor said a six-foot (two-meter) fence had surrounded the plane while the work was going on, with a single entrance that was monitored around the clock. The company was gathering all its daily reports on who had access to the plane in the event they were needed, he said. Also, about 20 Chinese security guards monitored security over three shifts a day, seven days a week, O'Connor added. Copyright 2002 Reuters Limited. All rights reserved. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4611 From: Hawkspirit Date: Thu Jan 24, 2002 6:43am Subject: Pricey? Are these rates a bit pricey or is it just that I work a lot harder for less? Roger Tolces www.bugsweeps.com ∑ Each average size office area , or conference room .................$ 1,275.00 ∑ Each telephone instrument ......................................................$ ...280.00 ∑ Each telephone trunk line .......................................................$ ...300.00 ∑ Each telephone Main Frame Room , including PBX or KSU ..$ ...750.00 ∑ Each intermediate Frame Room .............................................$ ...300.00 ∑ Each outside pedestal box or overhead junction box ..............$ ...300.00 http://www.segnow.com/SWEEP%20BROUCHERE.htm 4612 From: Hawkspirit Date: Thu Jan 24, 2002 6:50am Subject: Your Gonna love this one! The Truth: For years, counter surveillance technicians have used sophisticated heavy equipment, such as Time Domain Reflectometers, Oscilloscopes, Signal Generators, Frequency Counters and even Volt Meters. All of this equipment is ACTUALLY GOOD. From being a seasoned company, we have used all of these types of equipment to find Telephone Intrusions by doing physical sweeps. But through literally years of research and time, we have come up with a practical solution to REPLACE this equipment.. It almost seems unbelievable. Most Counter Surveillance technicians even find it hard to believe until they have used our products. . http://www.antispy.com/telephone.html 4613 From: James M. Atkinson Date: Thu Jan 24, 2002 7:03am Subject: Re: Pricey? At 4:43 AM -0800 1/24/02, Hawkspirit wrote: >Are these rates a bit pricey or is it just that I work a lot harder for less? >Roger Tolces >www.bugsweeps.com > > > >∑ Each average size office area , or conference room >.................$ 1,275.00 >∑ Each telephone instrument >......................................................$ ...280.00 >∑ Each telephone trunk line >.......................................................$ ...300.00 >∑ Each telephone Main Frame Room , including PBX or KSU ..$ ...750.00 >∑ Each intermediate Frame Room >.............................................$ ...300.00 >∑ Each outside pedestal box or overhead junction box ..............$ >...300.00 > >http://www.segnow.com/SWEEP%20BROUCHERE.htm Personally, I think the way they have their pricing broken down is unrealistic. You can't charge "by the room" unless you know how big the rooms are, and how they are appointed. For example, is it a storage room? a conference room? an executive office? or a computer room... each takes a drastically varying amount of time for a sweep. I was quite tickled to see that they are charging almost nothing for private planes, but 400 dollars for at least 4 days of work doesn't seem like much. Oh well, if their client are paying it, and their are getting a fair service, then I guess they can pretty much charge whatever they like. I have my own estimate worksheet at: http://www.tscm.com/estimate.html My terms and conditions can be found at: http://www.tscm.com/howcost.html -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4614 From: James M. Atkinson Date: Thu Jan 24, 2002 7:08am Subject: Re: Your Gonna love this one! At 4:50 AM -0800 1/24/02, Hawkspirit wrote: >The Truth: >For years, counter surveillance technicians have used sophisticated heavy >equipment, such as Time Domain Reflectometers, Oscilloscopes, Signal >Generators, Frequency Counters and even Volt Meters. All of this equipment >is ACTUALLY GOOD. > From being a seasoned company, we have used all of these types of >equipment to find Telephone Intrusions by doing physical sweeps. But >through literally years of research and time, we have come up with a >practical solution to REPLACE this equipment.. It almost seems >unbelievable. Most Counter Surveillance technicians even find it hard to >believe until they have used our products. . > >http://www.antispy.com/telephone.html > The product being offered would appear to be a hoax, and they are making seriously unrealistic claims. Looks like just another spyshop toy. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4615 From: Steve Uhrig Date: Thu Jan 24, 2002 8:08am Subject: Re: Pricey? Once upon a midnight dreary, Hawkspirit pondered, weak and weary: > Are these rates a bit pricey or is it just that I work a lot > harder for less? > http://www.segnow.com/SWEEP%20BROUCHERE.htm This is a well known spy shop and spy groupie in the Northern VA/DC area. He has no professional equipment and zero experience, and is a laughing stock. He is also a crook. I personally witnessed him deliver, in Mexico City, kit bugs and kit 'tracking transmitters' claiming them as his own top of the line stuff, for several thousand dollars. He's holding a little circuit board half the size of a pack of matches and claiming 20 mile range. I'm sitting there with a professional beacon the size of a chalkboard eraser having just told the client the range would be 1 to 2 miles at most in their environment, and my price was the same as his. He's a Jim Ross acolyte, so that should tell the story. He has never and will never do a sweep for real, let alone for the prices listed. They are purely eyewash to lend credibility to his spy shop. In no way can they be used as references. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4616 From: Johnston, Richard Date: Thu Jan 24, 2002 8:08am Subject: RE: Your Gonna love this one! Just as they predicted! "It almost seems unbelievable. Most Counter Surveillance technicians even find it hard to believe until they have used our products." After you have used it please tell us about your "conversion," your immediate change of heart or (dare I say it?) your epiphany. 8>) Rico -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Thursday, January 24, 2002 6:09 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Your Gonna love this one! At 4:50 AM -0800 1/24/02, Hawkspirit wrote: >The Truth: >For years, counter surveillance technicians have used sophisticated heavy >equipment, such as Time Domain Reflectometers, Oscilloscopes, Signal >Generators, Frequency Counters and even Volt Meters. All of this equipment >is ACTUALLY GOOD. > From being a seasoned company, we have used all of these types of >equipment to find Telephone Intrusions by doing physical sweeps. But >through literally years of research and time, we have come up with a >practical solution to REPLACE this equipment.. It almost seems >unbelievable. Most Counter Surveillance technicians even find it hard to >believe until they have used our products. . > > http://www.antispy.com/telephone.html > The product being offered would appear to be a hoax, and they are making seriously unrealistic claims. Looks like just another spyshop toy. -jma -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell ---------------------------------------------------------------------------- ---------------------- Yahoo! Groups Sponsor [] _____ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 4617 From: Date: Thu Jan 24, 2002 3:59am Subject: Re: Pricey? In a message dated 1/24/02 4:47:21 AM Pacific Standard Time, hawkspirit@e... writes: << Are these rates a bit pricey or is it just that I work a lot harder for less? >> A visit to his web site was revealing. It appears that he copied a copyrighted sweep estimate form from one of the oldest and established TSCM practitioners. It does appear that he's using top of the line equipment from one of the oldest established TSCM equipment manufacturers. Perhaps a visit to the state licensing board for a perusal of his application is the next step. M. 4618 From: James M. Atkinson Date: Thu Jan 24, 2002 8:48am Subject: Farmer Joe Farmer Joe decided his injuries from his recent accident were serious enough to take the trucking company responsible for the accident to court. In court, the trucking company's fancy lawyer was questioning farmer Joe. "Didn't you say, at the scene of the accident, that you were fine?" ''Well, I'll tell you what happened. I had just loaded my favorite mule Bessie into the--" ''I didn't ask for any details,'' the lawyer interrupted. ''Just answer the question. Did you not say, at the scene of the accident, that you were fine?" ''Well I had just got Bessie into the trailer and was driving down the road--'' ''Judge, I am trying to establish the fact that, at the scene of the accident, this man told the Highway Patrolman on the scene that he was just fine. Now several weeks after the accident he is trying to sue my client. I believe he is a fraud. Please tell him to simply answer the question.'' By this time the Judge was fairly interested in Farmer Joe's answer and told the lawyer so. ''Well," said the farmer, "as I was saying, I had just loaded Bessie, my favorite mule, into the trailer and was driving her down the highway when this huge semi-truck and trailer ran the stop sign and smacked my truck right in the side. I was thrown into one ditch and Bessie was thrown into the other. I was hurting real bad and didn't want to move. However, I could hear ol' Bessie moaning and groaning. I knew she was in terrible shape just by her groans. Shortly after the accident a Highway Patrolman came on the scene. He could hear Bessie moaning and groaning so he went over to her. After he looked at her he took out his gun and shot her between the eyes. Then the Patrolman came across the road with his gun in his hand and looked at me. He said, 'Your mule was in such bad shape I had to shoot her. How are you feeling?'" -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4619 From: David Alexander Date: Thu Jan 24, 2002 10:47am Subject: re: computer question This is my area of expertise. I'm a computer security/Information Warfare geek, not a 'bug-hunter' (no offence intended or implied). I'll give you the short answer: Yes, there is a system that allows LAN awakening and control of a PC. This system normally depends on a special cable from the Network card to a connector on the motherboard that awakens the PC. Any self-respecting company removes this cable to disable the facility as the very first thing they do when the PC arrives as it is a massive security hole and should never, ever be allowed to be active. Half of me wants to say that any company that does not deserves everything they get, but that is counter to the philosophy of this group. If your outfit has these cables in place, get them removed ASAP, they are a hackers dream. On Windows 2000 and Windows XP (TM acknowledged) there is another way of taking over a PC through the Netmeeting utility. Great for remote support and software installations. The remote install function via network wake-up is not needed due to something called Remote Install Server. I won't bore you with the details here. If anyone has more questions I'd be happy to take them offline direct to my e-mail address unless JMA thinks the info is of interest to all (your call) regards _____________________________ David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc Tel: +44 (0) 1235 837823 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1235 837201 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4620 From: David Alexander Date: Thu Jan 24, 2002 10:52am Subject: computer question parts 2 There is a much simpler way that Ames could have been monitored - TEMPEST emissions In case some of you are unaware, with a decent yagi and some software you can see what someone's' PC is doing real-time while they are doing it. Fibre-glass bodied van with aerial inside and you can sit some distance away and see what's happening without entering premises and leaving a bug to be found or anything to recover afterwards. Any surveillance team could do this...if they are not putz's (with acknowledgement to the previous poster) _____________________________ David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc Tel: +44 (0) 1235 837823 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1235 837201 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4621 From: Hawkspirit Date: Thu Jan 24, 2002 11:29am Subject: Jim Ross From: "Steve Uhrig" "He's a Jim Ross acolyte, so that should tell the story." Steve I never have heard your take on Jim Ross, I don't know whether you heard my rather public debate with Ross in the early 1980's about TDR when he continually insisted they were worthless for TSCM. Roger 4622 From: Steve Uhrig Date: Thu Jan 24, 2002 1:23pm Subject: Re: computer question parts 2 Once upon a midnight dreary, David Alexander pondered, weak and weary: > There is a much simpler way that Ames could have been monitored - > TEMPEST emissions > In case some of you are unaware, with a decent yagi and some > software you can see what someone's' PC is doing real-time while > they are doing it. > Fibre-glass bodied van with aerial inside and you can sit some > distance away and see what's happening without entering premises > and leaving a bug to be found or anything to recover afterwards. > Any surveillance team could do this...if they are not putz's > (with acknowledgement to the previous poster) Don't believe everything you read in the spy books. Or everything Frank Jones says either. Sorry to dump on your guru. It would be a waste of bandwidth to go into all the reasons why the above statements are ludicrous. Surveillance technology is advancing in leaps and bounds, but do you see anyone advertising or any government specifying Tempest- shielded equipment anymore? Why? Other than a staged highly controlled demo by the FBI during a security briefing almost 20 years ago, I've never seen a demo or real world application of an intercept of this sort. Maybe we're all just putzes. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: A Grudko Date: Fri Jan 21, 2005 4:27am Subject: RE: Privacy Activists Brace for White House Push to Augment -----Original Message----- From: G P [mailto:telos888@y...] > Golly gee I keep forgetting to mention that both Rumsfeld and Cheney are members of the Council on Foreign Relations, as was George H. W. Bush. Where there's a coup, there's a CFR member nearby. ;) And John F Kerry and Bill Clinton according to the CFR's 1992 Membership Roster. Relevance to the TSCM list and it's intelligence theme - very limited. Oh, since we are off topic anyway, my caption for the Inauguration photo JMA posted is "Monica, I love what ya've done with your hair" Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 10708 From: Andy Moore Date: Thu Jan 20, 2005 1:51pm Subject: Mains Mover/Current Carrier A firm called Devolo, based in Germany, is now marketing a device which modulates stereo, high bandwidth audio onto the power cabling in order to distribute music etc around households - it's not hard to see other uses for such a device! It en/decodes audio, at 44KHz CD quality, onto OFDM carriers, across the HF band, on to cabling for subsequent conversion a couple of hundred metres away. Probably quite obvious on a SA but also very easy to deploy.... http://www.devolo.com/co_EN/produkte/dlan/mldlanaudio.html Andy M 10709 From: kondrak Date: Fri Jan 21, 2005 11:01am Subject: Re: Analysis of the Skype Protocol Good! At 19:49 1/20/2005, you wrote: > From ./ today: > >http://www.cs.columbia.edu/~library/TR-repository/reports/reports-2004/cucs-039-04.pdf > >Looks like Skype is utilizing a STUN-variant, with RSA >1536-2048 bit encryption for the key material, and >AES-256 for the transport layer. Heavy duty crypto. > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10710 From: kondrak Date: Fri Jan 21, 2005 11:02am Subject: Re: US bugs in the UN I cant think of a better bunch of commies to bug...specially since they have a liking for OUR money to line their pockets with. At 22:57 1/20/2005, you wrote: >Does anyone have confirming information on this? Roger > > > >I was wondering if you were aware of the story that appeared in the >German media, but was censored from the American News, about Condelezza >Rice having had the CIA bug the offices of the UN Security Counsel >members during the hearings on Iraq? She admitted it to Der Speigel >reporters, but nothing was ever mentioned in this country. The bugs were >found during a routine search by British MI6 and were quickly identified >as being CIA. The CIA said that they were ordered by Rice to place the >bugs. Rice's reply was "yeah, so what!" It never went any further. > > > >-- >No virus found in this outgoing message. >Checked by AVG Anti-Virus. >Version: 7.0.300 / Virus Database: 265.7.0 - Release Date: 1/17/2005 > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10711 From: kondrak Date: Fri Jan 21, 2005 11:03am Subject: Re: US bugs in the UN Professional jealousy.... At 23:15 1/20/2005, you wrote: >Hey maybe Condi's not so bad after all ;) > >Why the heck would MI6 drop a dime on finding them, if >this story is accurate? 10712 From: kondrak Date: Fri Jan 21, 2005 11:03am Subject: Re: FBI abandons Carnivore wiretap software Oh SURE they have..uh huh...... At 19:53 1/20/2005, you wrote: >FBI abandons Carnivore wiretap software >Commercial program, 3rd-party wiretaps now usedThe Associated Press >Updated: 9:55 p.m. ET Jan. 18, 2005WASHINGTON - The FBI has >effectively >abandoned its custom-built Internet surveillance technology, once >known as >Carnivore, designed to read e-mails and other online communications >among >suspected criminals, terrorists and spies, according to bureau >oversight >reports submitted to Congress. >Instead, the FBI said it has switched to unspecified commercial >software to >eavesdrop on computer traffic during such investigations and has >increasingly asked Internet providers to conduct wiretaps on targeted >customers on the government's behalf, reimbursing companies for >their costs. >The FBI performed only eight Internet wiretaps in fiscal 2003 and >five in >fiscal 2002; none used the software initially called Carnivore and >later >renamed the DCS-1000, according to FBI documents submitted to Senate >and >House oversight committees. The FBI, which once said Carnivore >was "far >better" than commercial products, said previously it had used the >technology >about 25 times between 1998 and 2000. >'We're using [commercially available software] more now and we're >asking the >Internet service providers that have the capabilities to collect >data in >compliance with court orders.' > >- Paul Bresson >FBI spokesman > >The FBI said it could not disclose how much it spent to produce the >surveillance software it no longer uses, saying part of its budget >was >classified. Outside experts said the government probably spent >between $6 >million and $15 million. >The congressional oversight reports were obtained last week under >the U.S. >Freedom of Information Act by the Washington-based Electronic Privacy >Information Center, a civil liberties group that criticized the >surveillance >software after it was first disclosed in 2000. >Commercial alternatives >FBI spokesman Paul Bresson said the bureau moved to popular >commercial >wiretap software because it was less expensive and had improved in >its >ability to copy e-mails and other communications of a targeted >Internet >account without affecting other subscribers. >"We see the value in the commercially available software; we're >using it >more now and we're asking the Internet service providers that have >the >capabilities to collect data in compliance with court orders," >Bresson said. >The FBI said last week it was sending back to the drawing board its >$170 >million computer overhaul, which was intended to give agents and >analysts an >instantaneous and paperless way to manage criminal and terrorism >cases. > >Related stories >FBI may have to scrap new computer program > From 2001: FBI software cracks encryption wall >Experts said the life span of roughly four years for the bureau's >homegrown >surveillance technology was similar to the shelf life of cutting-edge >products in private industry. >"It's hard to criticize the FBI trying to keep pace with >technology," said >James Dempsey of the Washington-based Center for Democracy and >Technology. >"There is just a huge amount of innovation and development going on >in the >private sector." >Henry H. Perritt Jr., who led an oversight study of Carnivore in >2000 for >the Justice Department, said the FBI originally built its own >surveillance >system because commercial tools were inadequate. Perritt, a >professor at the >Chicago-Kent College of Law, said he was unaware of any commercial >wiretap >software that includes audit features robust enough to convince a >federal >judge that e-mails from innocent Internet users weren't captured by >mistake. >"You'd like to have a package that supervisors within a field office >and in >Washington could do an audit and make sure they're using the tools >compliant >with the court order," Perritt said. >The FBI laboratory division, which produced Carnivore, was headed by >Donald >M. Kerr, who left the FBI in August 2001 to become the CIA's chief >gadget-maker as head of its science and technology directorate. Kerr >told >lawmakers in 2000 that Carnivore was "far better than any >commercially-available sniffer." > >http://www.msnbc.msn.com/id/6841403/ > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10713 From: Nalesnik, Matthew Date: Fri Jan 21, 2005 0:01pm Subject: RE: US bugs in the UN Amen! -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: Friday, January 21, 2005 12:03 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] US bugs in the UN I cant think of a better bunch of commies to bug...specially since they have a liking for OUR money to line their pockets with. At 22:57 1/20/2005, you wrote: >Does anyone have confirming information on this? Roger > > > >I was wondering if you were aware of the story that appeared in the >German media, but was censored from the American News, about Condelezza >Rice having had the CIA bug the offices of the UN Security Counsel >members during the hearings on Iraq? She admitted it to Der Speigel >reporters, but nothing was ever mentioned in this country. The bugs were >found during a routine search by British MI6 and were quickly identified >as being CIA. The CIA said that they were ordered by Rice to place the >bugs. Rice's reply was "yeah, so what!" It never went any further. > > > >-- >No virus found in this outgoing message. >Checked by AVG Anti-Virus. >Version: 7.0.300 / Virus Database: 265.7.0 - Release Date: 1/17/2005 > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10714 From: littledog Date: Fri Jan 21, 2005 1:00pm Subject: Re: Mains Mover/Current Carrier I have 2 tv's bought new (4 yrs. ago) from wal-mart that came with carrier current bugs already installed they appeared to be after factory instalations, I also have an answering machine (purchased 3 yrs. ago) from radio shack that came with a rather sophisticated infinity bug and a call forwarding device already installed..any comments? should I sue? what's up with this, anyone else experience such things?> -----Original Message----- > From: Andy Moore [mailto:ASMoore@A...] > Sent: Friday, January 21, 2005, 3:36 AM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Mains Mover/Current Carrier > > > A firm called Devolo, based in Germany, is now marketing a device which > modulates stereo, high bandwidth audio onto the power cabling in order to > distribute music etc around households - it's not hard to see other uses for > such a device! It en/decodes audio, at 44KHz CD quality, onto OFDM > carriers, across the HF band, on to cabling for subsequent conversion a > couple of hundred metres away. Probably quite obvious on a SA but also very > easy to deploy.... > > http://www.devolo.com/co_EN/produkte/dlan/mldlanaudio.html > > Andy M > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10715 From: Ramon Date: Fri Jan 21, 2005 1:40pm Subject: China to launch communication satellite China will send a communication satellite owned by a Hong Kong company into space during the first half of this year. China National Space Administration says the European-made satellite is expected to orbit for 13 years and will be responsible for transmitting radio and television signals for China, East Asia, Australia and Hawaii. Meanwhile, a multi-purpose small satellite developed by China, Pakistan, Thailand, Bangladesh, Mongolia, South Korea, and Iran will be launched in 2006. It will be used to carry out scientific experiments and environmental observations for countries in the Asia-Pacific region. http://english.people.com.cn/200501/21/eng20050121_171494.html 10716 From: James M. Atkinson Date: Fri Jan 21, 2005 5:26pm Subject: US, Is the FBI covering up its spies? http://www.keralanext.com/news/indexread.asp?id=95631 US, Is the FBI covering up its spies? Wednesday, January 19, 2005 [US News]: Was the case of former FBI agent Robert Hanssen turned Russian informant just a blip or one of many? The FBI is currently going through a major investigation following the complaints of a former translator; who insists that there is espionage going on from within the bureau. According to Sibel Edmond she was fired from her position only after she had made complaints to senior officials in the FBI and put forward an official memo stating so. She has since sued for un lawful dismissal and asked for compensation only for her case to be thrown out by the presiding judge following the intervention of then Attorney General John Ashcroft who said her claims might expose government secrets and be damaging toÖnational security. The case concerning Edmonds has been handed to the U.S. Justice Department's senior oversight official whose report states that her allegations regarding shoddy work and possible espionage from within the bureau's translator program were never properly investigated. Former translator Sibel Edmond's allegations were backed up by evidence and witnesses but the FBI's response to her complaints was "significantly flawed" said Inspector General Glenn Fine. Moreover, Edmond's claims "raised substantial questions and were supported by various pieces of evidence." Edmonds has continuously stated that she was only fired after she had made complaints to FBI managers about poor wiretap translations and that one interpreter who had a relative at a foreign embassy, may have compromised national security by blocking certain translations and notifying the targets of FBI surveillance. The FBI has claimed that it is still investigating Edmond's claims. The report also revealed that Edmonds was fired for using her home computer in which she wrote the memorandum detailing her suspicions; the FBI had deemed the actions as a security violation. However, the translator had held "Top Secret" clearance and was given the permission to work on her memo from home by an FBI supervisor. So having been given the permission to work from home, and submitted an official memorandum stating that espionage is being carried out from within the FBI, claims for which she had substantial evidence to back up why did senior officials not follow up? In the wake of the scandal involving Robert Hanssen, the FBI agent, who'd been a Russian agent for more than a decade, the lack of review by the FBI into Edmond's allegations has provoked a strong rebuke from several senators. Senator Patrick Leahy, who also sits on the Senate Judiciary Committee, said "The bureau has reflexively ignored and punished its whistleblowers, to the detriment of the bureau's effectiveness and sometimes to the detriment of the public's safety." ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10717 From: Tech Sec Lab Date: Sat Jan 22, 2005 9:08pm Subject: RE: US bugs in the UN Really, what bunch of commies would that be Kindrak? Would it be the commies in Russia? Or the Nazi commies? Or the US secret commies? Or the alien commies? Or the nice people that live next door to you but who have different outlooks "on the world" commies? Please take your pick....your contribution to TSCM is truly enlighting.... Please don't stop now, you're on a role..... **************************** Message: 2 Date: Fri, 21 Jan 2005 12:02:34 -0500 From: kondrak Subject: Re: US bugs in the UN I cant think of a better bunch of commies to bug...specially since they have a liking for OUR money to line their pockets with. At 22:57 1/20/2005, you wrote: 10718 From: James M. Atkinson Date: Sat Jan 22, 2005 10:30pm Subject: Russian Republic Charges Topographer With Selling State Secrets http://www.fas.org/irp/news/2005/01/tass011905.html Russian Republic Charges Topographer With Selling State Secrets ITAR-TASS Wednesday, January 19, 2005 Yoshkar-Ola, 19 January: The Federal Security Service (FSB) directorate for the Republic of Mari El has instituted criminal proceedings for divulging state secrets. The charge has been levelled against a principal specialist in the topographic department of the Mari Trust for Survey and Construction Work. He faces up to four years in prison for the offence. The head of the press service of the FSB directorate for Mari El, Dmitriy Izotov, told an ITAR-TASS correspondent that the accused, who has not yet been named, sold secret documents to somebody without access to state secrets, namely a catalogue of coordinates of all geodesic points in the republic. The suspect had access to secret information and, therefore, realized he was committing a crime. When investigators searched his flat, they found another 250 documents, half of which, according to experts, are secret. Investigators are trying to establish what damage has been done, as a result, to the state. This is the first criminal case in the republic's history to be instituted under Article 283 of the Criminal Code of the Russian Federation, which deals with the divulging of state secrets. (Description of Source: Moscow ITAR-TASS in Russian -- main government information agency) ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10719 From: mpaulsen6 Date: Sun Jan 23, 2005 0:36am Subject: Re: Mains Mover/Current Carrier Hey.. I think I know what you're talking about.. my computer came with this onboard 'category 5 cable attachment' thingy. Looks kinda like a phone plug but larger and the phone company guy came out and hooked up my CABLE TV!?! line to it with this little gray box. And it was 'preloaded' with this 'software' from this company called 'microsoft' that made me 'accept' these 'license agreement's before I could use it. You don't think that they could be spying on me do you? Should I sue this strange 'microsoft'. Can anyone tell me how? Maybe I should hire someone to investigate them. I'm really concerned. Really. --- In TSCM-L@yahoogroups.com, littledog wrote: > > I have 2 tv's bought new (4 yrs. ago) from wal-mart that came with carrier current bugs already installed they appeared to be after factory instalations, I also have an answering machine (purchased 3 yrs. ago) from radio shack that came with a rather sophisticated infinity bug and a call forwarding device already installed..any comments? should I sue? what's up with this, anyone else experience such things?> -----Original Message----- > > From: Andy Moore [mailto:ASMoore@A...] > > Sent: Friday, January 21, 2005, 3:36 AM > > To: TSCM-L@yahoogroups.com > > Subject: [TSCM-L] Mains Mover/Current Carrier > > > > > > A firm called Devolo, based in Germany, is now marketing a device which > > modulates stereo, high bandwidth audio onto the power cabling in order to > > distribute music etc around households - it's not hard to see other uses for > > such a device! It en/decodes audio, at 44KHz CD quality, onto OFDM > > carriers, across the HF band, on to cabling for subsequent conversion a > > couple of hundred metres away. Probably quite obvious on a SA but also very > > easy to deploy.... > > > > http://www.devolo.com/co_EN/produkte/dlan/mldlanaudio.html > > > > Andy M > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > 10720 From: mpaulsen6 Date: Sun Jan 23, 2005 0:38am Subject: Re: FBI abandons Carnivore wiretap software Yea.. maybe they found out about etheral.. wow.. $110 million saved. Guess they should revamp their voicemail next. --- In TSCM-L@yahoogroups.com, kondrak wrote: > Oh SURE they have..uh huh...... > > > At 19:53 1/20/2005, you wrote: > > > > >FBI abandons Carnivore wiretap software > >Commercial program, 3rd-party wiretaps now usedThe Associated Press > >Updated: 9:55 p.m. ET Jan. 18, 2005WASHINGTON - The FBI has > >effectively > >abandoned its custom-built Internet surveillance technology, once > >known as > >Carnivore, designed to read e-mails and other online communications > >among > >suspected criminals, terrorists and spies, according to bureau > >oversight > >reports submitted to Congress. > >Instead, the FBI said it has switched to unspecified commercial > >software to > >eavesdrop on computer traffic during such investigations and has > >increasingly asked Internet providers to conduct wiretaps on targeted > >customers on the government's behalf, reimbursing companies for > >their costs. > >The FBI performed only eight Internet wiretaps in fiscal 2003 and > >five in > >fiscal 2002; none used the software initially called Carnivore and > >later > >renamed the DCS-1000, according to FBI documents submitted to Senate > >and > >House oversight committees. The FBI, which once said Carnivore > >was "far > >better" than commercial products, said previously it had used the > >technology > >about 25 times between 1998 and 2000. > >'We're using [commercially available software] more now and we're > >asking the > >Internet service providers that have the capabilities to collect > >data in > >compliance with court orders.' > > > >- Paul Bresson > >FBI spokesman > > > >The FBI said it could not disclose how much it spent to produce the > >surveillance software it no longer uses, saying part of its budget > >was > >classified. Outside experts said the government probably spent > >between $6 > >million and $15 million. > >The congressional oversight reports were obtained last week under > >the U.S. > >Freedom of Information Act by the Washington-based Electronic Privacy > >Information Center, a civil liberties group that criticized the > >surveillance > >software after it was first disclosed in 2000. > >Commercial alternatives > >FBI spokesman Paul Bresson said the bureau moved to popular > >commercial > >wiretap software because it was less expensive and had improved in > >its > >ability to copy e-mails and other communications of a targeted > >Internet > >account without affecting other subscribers. > >"We see the value in the commercially available software; we're > >using it > >more now and we're asking the Internet service providers that have > >the > >capabilities to collect data in compliance with court orders," > >Bresson said. > >The FBI said last week it was sending back to the drawing board its > >$170 > >million computer overhaul, which was intended to give agents and > >analysts an > >instantaneous and paperless way to manage criminal and terrorism > >cases. > > > >Related stories > >FBI may have to scrap new computer program > > From 2001: FBI software cracks encryption wall > >Experts said the life span of roughly four years for the bureau's > >homegrown > >surveillance technology was similar to the shelf life of cutting- edge > >products in private industry. > >"It's hard to criticize the FBI trying to keep pace with > >technology," said > >James Dempsey of the Washington-based Center for Democracy and > >Technology. > >"There is just a huge amount of innovation and development going on > >in the > >private sector." > >Henry H. Perritt Jr., who led an oversight study of Carnivore in > >2000 for > >the Justice Department, said the FBI originally built its own > >surveillance > >system because commercial tools were inadequate. Perritt, a > >professor at the > >Chicago-Kent College of Law, said he was unaware of any commercial > >wiretap > >software that includes audit features robust enough to convince a > >federal > >judge that e-mails from innocent Internet users weren't captured by > >mistake. > >"You'd like to have a package that supervisors within a field office > >and in > >Washington could do an audit and make sure they're using the tools > >compliant > >with the court order," Perritt said. > >The FBI laboratory division, which produced Carnivore, was headed by > >Donald > >M. Kerr, who left the FBI in August 2001 to become the CIA's chief > >gadget-maker as head of its science and technology directorate. Kerr > >told > >lawmakers in 2000 that Carnivore was "far better than any > >commercially-available sniffer." > > > >http://www.msnbc.msn.com/id/6841403/ > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > 10721 From: mpaulsen6 Date: Sun Jan 23, 2005 0:42am Subject: Re: Inaugural Pictures "Sir, they'll never guess the microtransmitter is here." "I feel like I'm back in Texas. Steers and..." well you know.. --- In TSCM-L@yahoogroups.com, Michael Dever wrote: > Captions: > > "Keep looking, you'll find it!" > > "Looking for my weapon of mass destruction, heh heh heh!" > > > On 21 Jan 2005, at 10:09, James M. Atkinson wrote: > > > > > > > Here is one of those secret Skull and Bones ceremonies > > > > http://conservativelife.com/blog/media/bushzipper.jpg > > > > Can anybody come up with an appropiate caption, or shall we just let > > the > > picture speak for itself. > > > > -jma > > > > > > > > > > ----------------------------------------------------------------- ------ > > ----------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > > ----------------------------------------------------------------- ------ > > ----------------------------- > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 Web: > > http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > > ----------------------------------------------------------------- ------ > > ----------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > > ----------------------------------------------------------------- ------ > > ----------------------------- > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > Michael J. Dever CPP > Dever Clark & Associates > GPO Box 1163 > Canberra ACT 2601 > Australia > Voice: +612 6254 5337 > Email: dca@b... > ********************************************************************* *** > ***** > This message is sent in strict confidence for the addressee only. > It may contain legally privileged information. The contents are not to > be disclosed to anyone other than the addressee. Unauthorised > recipients are requested to preserve this confidentiality and to advise > the sender immediately of any error in transmission. > > > > [Non-text portions of this message have been removed] 10722 From: mpaulsen6 Date: Sun Jan 23, 2005 0:43am Subject: Re: Inaugural Pictures I thought Dick had that end.. Ha.. I kill me.. --- In TSCM-L@yahoogroups.com, PGibson957@a... wrote: > > Yeap. Make sure it don't free-fall like Bill's > > Whooa there big fella ... Ted will take care of that end. > > > [Non-text portions of this message have been removed] 10723 From: mpaulsen6 Date: Sun Jan 23, 2005 0:45am Subject: Re: US bugs in the UN So, is the subject line of this thread the joke or the leadin? --- In TSCM-L@yahoogroups.com, "Tech Sec Lab" wrote: > Really, what bunch of commies would that be Kindrak? > > Would it be the commies in Russia? > > Or the Nazi commies? > > Or the US secret commies? > > Or the alien commies? > > Or the nice people that live next door to you but who have different > outlooks "on the world" commies? > > Please take your pick....your contribution to TSCM is truly enlighting.... > > > Please don't stop now, you're on a role..... > > > > > **************************** > > > Message: 2 > Date: Fri, 21 Jan 2005 12:02:34 -0500 > From: kondrak > Subject: Re: US bugs in the UN > > I cant think of a better bunch of commies to bug...specially since they have > a liking for OUR money to line their pockets with. > > At 22:57 1/20/2005, you wrote: 10724 From: mpaulsen6 Date: Sun Jan 23, 2005 0:46am Subject: Re: Russian Republic Charges Topographer With Selling State Secrets Russian Republic Charges Topographer... I bet he never pays the bill.. Just ask IBM. --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > http://www.fas.org/irp/news/2005/01/tass011905.html > > Russian Republic Charges Topographer With Selling State Secrets > ITAR-TASS > Wednesday, January 19, 2005 > > > Yoshkar-Ola, 19 January: The Federal Security Service (FSB) directorate for > the Republic of Mari El > has instituted criminal proceedings for divulging state secrets. The charge > has been levelled > against a principal specialist in the topographic department of the Mari > Trust for Survey and > Construction Work. He faces up to four years in prison for the offence. > > > The head of the press service of the FSB directorate for Mari El, Dmitriy > Izotov, told an ITAR-TASS > correspondent that the accused, who has not yet been named, sold secret > documents to somebody > without access to state secrets, namely a catalogue of coordinates of all > geodesic points in the > republic. The suspect had access to secret information and, therefore, > realized he was committing a > crime. When investigators searched his flat, they found another 250 > documents, half of which, > according to experts, are secret. Investigators are trying to establish > what damage has been done, > as a result, to the state. > > > This is the first criminal case in the republic's history to be instituted > under Article 283 of the > Criminal Code of the Russian Federation, which deals with the divulging of > state secrets. > > > (Description of Source: Moscow ITAR-TASS in Russian -- main government > information agency) > > > > > > ------------------------------------------------------------------- --------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ------------------------------------------------------------------- --------------------------------- > James M. Atkinson Phone: (978) 546- 3803 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ------------------------------------------------------------------- --------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ------------------------------------------------------------------- --------------------------------- 10725 From: mpaulsen6 Date: Sun Jan 23, 2005 0:46am Subject: Re: wi-Fi ? clones oh.. hullo? UH? This again.. Damn, didn't we cover this in.. what 2002? --- In TSCM-L@yahoogroups.com, "A Grudko" wrote: > > > LONDON, England -- "Evil twins" are the latest menace to threaten the > security of Internet users, experts in the UK are warning. > > An "evil twin" is a bogus base station that latches on to someone using new > "Wi-Fi" wireless technology. > > Victims think their laptops or mobile phones are connected to bona fide > wireless internet connections. > > They may then transmit valuable bank details or other personal information, > not suspecting that they are being intercepted by cybercriminals. > > Professor Brian Collins, from the Royal Military College of Science, > Cranfield University, a former chief scientist at GCHQ -- the Government's > secret eavesdropping station -- said: "Users need to be wary of not using > their Wi-Fi enabled laptops or other portable devices in order to conduct > financial transactions or anything that is of a sensitive personal nature, > for fear of having disclosed this information to an unauthorised third > party." > > Wireless devices link to the Internet via "hotspots" - nearby connection > points that they lock on to. But these hotspots can act like an open door to > thieves. > > Anyone with suitable equipment can locate a hotspot and take its place, > substituting their own "evil twin." > > Dr. Phil Nobles, a wireless Internet and cybercrime expert at Cranfield > University, said: "So-called 'evil twin' hotspots present a hidden danger > for Web users. > > "In essence, users think they've logged on to a wireless hotspot connection > when in fact they've been tricked to connect to the attacker's unauthorised > base station. > > "The latter jams the connection to a legitimate base station by sending a > stronger signal within close proximity to the wireless client -- thereby > turning itself into an 'evil twin.' > > "Cybercriminals don't have to be that clever to carry out such an attack. > Because wireless networks are based on radio signals they can be easily > detected by unauthorised users tuning into the same channel hopping group. > > Unwitting web users are invited to log into the attacker's server with bogus > login prompts, tempting them to give away sensitive information such as user > names and passwords. > > Often users are unaware the have been duped until well after the incident > has occurred. > > Dr. Nobles spelled out the warning at a wireless crime event held at the > Dana Centre, the Science Museum's forum for discussing controversial > science, in London. > > Lisa Jamieson, Head of Programmes at the Dana Centre, said: "Half of all > business wireless networks in this country have inadequate security controls > in place, making their information vulnerable to attack." > > > --- > Outgoing mail is certified Virus Free. > Checked by AVG anti-virus system (http://www.grisoft.com). > Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 > > > [Non-text portions of this message have been removed] 10726 From: mpaulsen6 Date: Sun Jan 23, 2005 0:49am Subject: Re: US, Is the FBI covering up its spies? for using her home > computer in which she wrote the memorandum detailing her suspicions; > the FBI had deemed the actions as a security violation. See = proves to work for the Secret Service! --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > > > http://www.keralanext.com/news/indexread.asp?id=95631 > > > US, Is the FBI covering up its spies? > Wednesday, January 19, 2005 > > > > [US News]: Was the case of former FBI agent Robert Hanssen turned > Russian informant just a blip or one of many? > > > The FBI is currently going through a major investigation following the > complaints of a former translator; who insists that there is espionage > going on from within the bureau. > > > According to Sibel Edmond she was fired from her position only after > she had made complaints to senior officials in the FBI and put forward > an official memo stating so. > > > She has since sued for un lawful dismissal and asked for compensation > only for her case to be thrown out by the presiding judge following > the intervention of then Attorney General John Ashcroft who said her > claims might expose government secrets and be damaging toÖnational > security. > > > > The case concerning Edmonds has been handed to the U.S. Justice > Department's senior oversight official whose report states that her > allegations regarding shoddy work and possible espionage from within > the bureau's translator program were never properly investigated. > > > Former translator Sibel Edmond's allegations were backed up by > evidence and witnesses but the FBI's response to her complaints was > "significantly flawed" said Inspector General Glenn Fine. Moreover, > Edmond's claims "raised substantial questions and were supported by > various pieces of evidence." > > > Edmonds has continuously stated that she was only fired after she had > made complaints to FBI managers about poor wiretap translations and > that one interpreter who had a relative at a foreign embassy, may have > compromised national security by blocking certain translations and > notifying the targets of FBI surveillance. > > > The FBI has claimed that it is still investigating Edmond's claims. > The report also revealed that Edmonds was fired for using her home > computer in which she wrote the memorandum detailing her suspicions; > the FBI had deemed the actions as a security violation. However, the > translator had held "Top Secret" clearance and was given the > permission to work on her memo from home by an FBI supervisor. > > > So having been given the permission to work from home, and submitted > an official memorandum stating that espionage is being carried out > from within the FBI, claims for which she had substantial evidence to > back up why did senior officials not follow up? > > > In the wake of the scandal involving Robert Hanssen, the FBI agent, > who'd been a Russian agent for more than a decade, the lack of review > by the FBI into Edmond's allegations has provoked a strong rebuke from > several senators. Senator Patrick Leahy, who also sits on the Senate > Judiciary Committee, said "The bureau has reflexively ignored and > punished its whistleblowers, to the detriment of the bureau's > effectiveness and sometimes to the detriment of the public's safety." > > > > > ------------------------------------------------------------------- --------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ------------------------------------------------------------------- --------------------------------- > James M. Atkinson Phone: (978) 546- 3803 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ------------------------------------------------------------------- --------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ------------------------------------------------------------------- --------------------------------- 10727 From: mpaulsen6 Date: Sun Jan 23, 2005 0:51am Subject: Re: China to launch communication satellite Oh no.. More public access channels with strange soaps! To the freezer foil role! --- In TSCM-L@yahoogroups.com, "Ramon" wrote: > > > China will send a communication satellite owned by a Hong Kong > company > into space during the first half of this year. > China National Space Administration says the European-made satellite > is > expected to orbit for 13 years and will be responsible for > transmitting > radio and television signals for China, East Asia, Australia and > Hawaii. > Meanwhile, a multi-purpose small satellite developed by China, > Pakistan, > Thailand, Bangladesh, Mongolia, South Korea, and Iran will be > launched > in 2006. > It will be used to carry out scientific experiments and environmental > observations for countries in the Asia-Pacific region. > > http://english.people.com.cn/200501/21/eng20050121_171494.html 10728 From: mpaulsen6 Date: Sun Jan 23, 2005 0:53am Subject: Re: McDonald's in Boca to offer glimpse into world of espionage Maybe he'll get on a wifi basestation at a McDonalds and get hacked :) --- In TSCM-L@yahoogroups.com, "A Grudko" wrote: > > -----Original Message----- > From: James M. Atkinson [mailto:jmatk@tscm.com] > > > Boca Raton ∑ He's an international man of intrigue who's bringing > some of the old trade secrets from the espionage world to, well, a > McDonald's. > > Now if he could just put up a poster revealing what REALLY goes into 'The > Colonel's 14 Secret Herbs and Spices' and the fabled Coca Cola recipe which > it is rumoured even the KGB could not get (in a failed 70's attempt to copy > the US brand into the Eastern block - they should have left the vodka out). > > Andy Grudko (British), DPM, Grad IS (South Africa) > MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 > www.grudko.com , agrudko@i... > Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > Mid Rand (+27 11) 318 1451 - 318 6846(Fax) > Cellular (+27) 82 778 6355 - ICQ 146498943 > SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. > "When you need it done right - first time" > > > > [Non-text portions of this message have been removed] 10729 From: mpaulsen6 Date: Sun Jan 23, 2005 0:54am Subject: Re: Analysis of the Skype Protocol I wonder if that goes to a pron site. --- In TSCM-L@yahoogroups.com, G P wrote: > > From ./ today: > > /. rather (http://www.slashdot.org) 10730 From: mpaulsen6 Date: Sun Jan 23, 2005 0:57am Subject: Suspects copy 'Wire' Ok.. so here's something that's o/t... Suspects copy 'Wire' NEW YORK (AP) -- David Simon's HBO series "The Wire" -- a fictional account of a police investigation of Baltimore drug dealers -- allegedly had some real-life dealers taking notes. While announcing a crackdown on Friday of a cocaine ring, police said their investigation was hampered by the suspects' habit of switching cell phones -- a technique for evading electronic eavesdropping they picked up from TV. "Believe it or not, these guys copied 'The Wire,' " one of the investigators, Sgt. Felipe Rodriguez, said at a news conference. "They were constantly dumping their phones. It made our job so much harder." Police relied largely on wiretaps to infiltrate the gang, which made up to $15 million a year. The result: 12 arrests and seizure of 43 kilograms of cocaine, 18 handguns, $500,000 cash and five luxury vehicles. While doing business by cell phone, the suspects often spoke to each other about "The Wire" after it aired on Sunday nights, Rodriguez said. Some of the officers listening to them also were fans. "If we missed anything, we got it from them Monday morning," the sergeant said of the television show. 10731 From: Steve Whitehead Date: Sun Jan 23, 2005 1:44am Subject: Re: Re: McDonald's in Boca to offer glimpse into world of espionage Dear Mr Paulsen Do you have to comment on everything. Who cares what you think!!!!!!!!!!! This List has become very boring and a big waste of time. When I joined a few years ago the members really contributed value. I do not have time for this rubbish anymore. This List no longer makes any contribution to TSCM. I will unsubscribe myself. Bye! Steve Whitehead ----- Original Message ----- From: "mpaulsen6" To: Sent: Sunday, January 23, 2005 8:53 AM Subject: [TSCM-L] Re: McDonald's in Boca to offer glimpse into world of espionage Maybe he'll get on a wifi basestation at a McDonalds and get hacked :) --- In TSCM-L@yahoogroups.com, "A Grudko" wrote: > > -----Original Message----- > From: James M. Atkinson [mailto:jmatk@tscm.com] > > > Boca Raton ∑ He's an international man of intrigue who's bringing > some of the old trade secrets from the espionage world to, well, a > McDonald's. > > Now if he could just put up a poster revealing what REALLY goes into 'The > Colonel's 14 Secret Herbs and Spices' and the fabled Coca Cola recipe which > it is rumoured even the KGB could not get (in a failed 70's attempt to copy > the US brand into the Eastern block - they should have left the vodka out). > > Andy Grudko (British), DPM, Grad IS (South Africa) > MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 > www.grudko.com , agrudko@i... > Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > Mid Rand (+27 11) 318 1451 - 318 6846(Fax) > Cellular (+27) 82 778 6355 - ICQ 146498943 > SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. > "When you need it done right - first time" > > > > [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10732 From: littledog Date: Sun Jan 23, 2005 2:46am Subject: Re: Re: Mains Mover/Current Carrier yea mr. paulson your a real wit, I think I've seen your work on other lists too..'till now I've really enjoyed this list.> -----Original Message----- > From: mpaulsen6 [mailto:mpaulsen6@a...] > Sent: Saturday, January 22, 2005, 10:34 PM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Re: Mains Mover/Current Carrier > > > > Hey.. I think I know what you're talking about.. my computer came > with this onboard 'category 5 cable attachment' thingy. Looks kinda > like a phone plug but larger and the phone company guy came out and > hooked up my CABLE TV!?! line to it with this little gray box. And > it was 'preloaded' with this 'software' from this company > called 'microsoft' that made me 'accept' these 'license agreement's > before I could use it. You don't think that they could be spying on > me do you? Should I sue this strange 'microsoft'. Can anyone tell > me how? Maybe I should hire someone to investigate them. I'm > really concerned. Really. > --- In TSCM-L@yahoogroups.com, littledog wrote: > > > > I have 2 tv's bought new (4 yrs. ago) from wal-mart that came with > carrier current bugs already installed they appeared to be after > factory instalations, I also have an answering machine (purchased 3 > yrs. ago) from radio shack that came with a rather sophisticated > infinity bug and a call forwarding device already installed..any > comments? should I sue? what's up with this, anyone else experience > such things?> -----Original Message----- > > > From: Andy Moore [mailto:ASMoore@A...] > > > Sent: Friday, January 21, 2005, 3:36 AM > > > To: TSCM-L@yahoogroups.com > > > Subject: [TSCM-L] Mains Mover/Current Carrier > > > > > > > > > A firm called Devolo, based in Germany, is now marketing a > device which > > > modulates stereo, high bandwidth audio onto the power cabling in > order to > > > distribute music etc around households - it's not hard to see > other uses for > > > such a device! It en/decodes audio, at 44KHz CD quality, onto > OFDM > > > carriers, across the HF band, on to cabling for subsequent > conversion a > > > couple of hundred metres away. Probably quite obvious on a SA > but also very > > > easy to deploy.... > > > > > > http://www.devolo.com/co_EN/produkte/dlan/mldlanaudio.html > > > > > > Andy M > > > > > > > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > the hands acquire shaking, the shaking is a warning. > > > It is by caffeine alone I set my mind in motion. > > > =================================================== TSKS > > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10733 From: littledog Date: Sun Jan 23, 2005 3:03am Subject: to moderator hello, this guy at mpaulsen6@a... who has been insulting every single member is doing it from a fake address. Thought you might want to check on this. littledog...enjoy the list. 10734 From: Tech Sec Lab Date: Sun Jan 23, 2005 7:57am Subject: RE: TSCM list It's a shame this list has gone the way it has... If anyone is interested in being part of an active professionals only list that stays focused on the topic rather than what has become a free for all, please feel free to sign up, http://ocean-research.net/mailman/listinfo/c4i-l_ocean-research.net Regards -Ois *********************** Date: Sun, 23 Jan 2005 09:44:23 +0200 From: "Steve Whitehead" Subject: Re: Re: McDonald's in Boca to offer glimpse into world of espionage Dear Mr Paulsen Do you have to comment on everything. Who cares what you think!!!!!!!!!!! This List has become very boring and a big waste of time. When I joined a few years ago the members really contributed value. I do not have time for this rubbish anymore. This List no longer makes any contribution to TSCM. I will unsubscribe myself. Bye! Steve Whitehead 10735 From: Thomas Shaddack Date: Sun Jan 23, 2005 8:46am Subject: Re: Re: Mains Mover/Current Carrier I suggest to not bother much about it and if he makes problems, just plonk[1] him in accordance with the ages old Usenet tradition. Most of email clients allow moving messages to folders or deleting them at the moment of receiving, according to a set of user-defined rules. Implementation of a killfile in that way is pretty simple. [1] http://catb.org/~esr/jargon/html/P/plonk.html On Sun, 23 Jan 2005, littledog wrote: > > > yea mr. paulson your a real wit, I think I've seen your work on other lists too..'till now I've really enjoyed this list.> -----Original Message----- > > From: mpaulsen6 [mailto:mpaulsen6@a...] > > Sent: Saturday, January 22, 2005, 10:34 PM > > To: TSCM-L@yahoogroups.com > > Subject: [TSCM-L] Re: Mains Mover/Current Carrier > > > > > > > > Hey.. I think I know what you're talking about.. my computer came > > with this onboard 'category 5 cable attachment' thingy. Looks kinda > > like a phone plug but larger and the phone company guy came out and > > hooked up my CABLE TV!?! line to it with this little gray box. And > > it was 'preloaded' with this 'software' from this company > > called 'microsoft' that made me 'accept' these 'license agreement's > > before I could use it. You don't think that they could be spying on > > me do you? Should I sue this strange 'microsoft'. Can anyone tell > > me how? Maybe I should hire someone to investigate them. I'm > > really concerned. Really. > > --- In TSCM-L@yahoogroups.com, littledog wrote: > > > > > > I have 2 tv's bought new (4 yrs. ago) from wal-mart that came with > > carrier current bugs already installed they appeared to be after > > factory instalations, I also have an answering machine (purchased 3 > > yrs. ago) from radio shack that came with a rather sophisticated > > infinity bug and a call forwarding device already installed..any > > comments? should I sue? what's up with this, anyone else experience > > such things?> -----Original Message----- > > > > From: Andy Moore [mailto:ASMoore@A...] > > > > Sent: Friday, January 21, 2005, 3:36 AM > > > > To: TSCM-L@yahoogroups.com > > > > Subject: [TSCM-L] Mains Mover/Current Carrier > > > > > > > > > > > > A firm called Devolo, based in Germany, is now marketing a > > device which > > > > modulates stereo, high bandwidth audio onto the power cabling in > > order to > > > > distribute music etc around households - it's not hard to see > > other uses for > > > > such a device! It en/decodes audio, at 44KHz CD quality, onto > > OFDM > > > > carriers, across the HF band, on to cabling for subsequent > > conversion a > > > > couple of hundred metres away. Probably quite obvious on a SA > > but also very > > > > easy to deploy.... > > > > > > > > http://www.devolo.com/co_EN/produkte/dlan/mldlanaudio.html > > > > > > > > Andy M > > > > > > > > > > > > > > > > > > > > > > > > ======================================================== > > > > TSCM-L Technical Security Mailing List > > > > "In a multitude of counselors there is strength" > > > > > > > > To subscribe to the TSCM-L mailing list visit: > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > > > It is by caffeine alone I set my mind in motion. > > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > > the hands acquire shaking, the shaking is a warning. > > > > It is by caffeine alone I set my mind in motion. > > > > =================================================== TSKS > > > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10736 From: A Grudko Date: Sun Jan 23, 2005 10:23am Subject: RE: Suspects copy 'Wire' -----Original Message----- From: mpaulsen6 [mailto:mpaulsen6@a...] > While announcing a crackdown on Friday of a cocaine ring, police said their investigation was hampered by the suspects' habit of switching cell phones -- a technique for evading electronic eavesdropping they picked up from TV. "Believe it or not, these guys copied 'The Wire,' " one of the (NY) investigators, Sgt. Felipe Rodriguez, said... If this is correct I guess our criminals are wayyyy ahead of New York's crooks and cops. I had clients nearly a decade ago, who I strongly suspected of being organised crime figures but they were charged but never convicted, who swoped SIM cards and phones daily - to the extent that they set up a cellphone trade-in business at the back of a garage in Pretoria mainly to get hold of other peoples' phones to avoid 'spoopers'. Andy G South Africa From: kondrak Date: Thu Jan 23, 2003 7:33pm Subject: WE WIN ONE!~ http://www.washingtonpost.com/wp-dyn/articles/A34837-2003Jan23.html Senate Blocks Funding for Pentagon Database WASHINGTON (Reuters) - Saying they feared government snooping against ordinary Americans, U.S. senators voted on Thursday to block funding for a Pentagon computer project that would scour databases for terrorist threats. By a voice vote, the Senate voted to ban funding for the Total Information Awareness program, under former national security adviser John Poindexter, until the Pentagon explains the program and assesses its impact on civil liberties. The measure, introduced by Sen. Ron Wyden, an Oregon Democrat, also said the computer dragnet being developed could not be deployed without congressional approval, although it allowed exceptions for national security. It was tacked onto a spending package in the Senate, but it is not yet law. It is now expected to go to House and Senate negotiators. If the negotiators keep the provision in the spending package, it will advance to the House and Senate for final passage before going to the president for signing into law. "This makes it clear that Congress wants to make sure there is no snooping on law-abiding Americans," Wyden told Reuters after the vote. He said the electronic data dragnet as proposed was "the most far-reaching government surveillance program in history." The Defense Department says the aim of the Total Information Awareness project, which is still in its infancy, is to seek patterns in transactions data like credit card bills and travel records to stop terrorist plots. Wyden and other Democrats announced last week they would try to block funding for it, citing concerns that it will amount to electronic surveillance of personal data of all Americans by the government and trample privacy rights. Senior Republican senators worked with Wyden on the wording of the Senate measure, including Sen. Charles Grassley of Iowa. He said he was worried the lines were getting blurred between domestic law enforcement and military security efforts. CONCERNS ABOUT POINDEXTER Critics of the project also have expressed concern that the project is being directed by Poindexter, a retired admiral who was convicted of deceiving Congress in the Iran-Contra scandal. His conviction was set aside on the grounds his immunized congressional testimony had been used against him. A Pentagon spokeswoman defended the program after the Senate vote on Thursday, saying officials continued to believe that the research and development planned was important. "TIA will develop innovative information technology tools that will give the Department of Defense's intelligence, counter-intelligence and counter-terrorism communities important capabilities to prevent terrorist attacks against the U.S.," the Pentagon spokeswoman said. The Senate measure requires the Pentagon to report to Congress on the goals of the program within 60 days of the bill's final passage, including recommendations from the Attorney General on minimizing the impact on civil liberties. The measure also would keep the Pentagon from deploying the program or transferring it to another department, such as the FBI or the new Homeland Security department, without congressional authorization. But these limitations would not apply if the deployment or transfer of technology was being made for lawful foreign intelligence activities or U.S. military operations outside the United States. Wyden said there had to be exceptions for national security. "There has got to be congressional approval to deploy these technologies, so this information doesn't get circulated indiscriminately all over government," he said. "But in striking the balance, when talking about matters of national security, those matters can go forward," he said. 6814 From: James M. Atkinson Date: Thu Jan 23, 2003 9:50pm Subject: USAF 4 Star Speaks Out USAF 4 Star Speaks Out For those of you who don't know who General Hawley is, he is a newly-retired 4-star General who commanded the U.S. Air Force Air Combat Command. He recently delivered this speech, now that he's retired and no longer restricted to being politically correct, at the Air Force Association Annual Meeting: "Since the attack, I have seen, heard, and read thoughts of such incredible and surpassing stupidity that they must be addressed. You've heard them too. Here they are: 1) "We're not good, they're not evil, everything is relative." Listen carefully: We're good, they're evil, nothing is relative. Say it with me now and free yourselves. You see, folks, saying "We're good" doesn't mean, "We're perfect." Okay? The only perfect being is the bearded guy on the ceiling of the Sistine Chapel. The plain fact is that our country has, with all our mistakes and blunders, always been and always will be the greatest beacon of freedom, charity, opportunity, and affection in history. If you need proof, open all the borders on Earth and see what happens. In about half a day, the entire world would be a ghost town, and the United States would look like one giant line to see "The Producers. 2) "Violence only leads to more violence." This one is so stupid you usually have to be the president of an Ivy League university to say it. Here's the truth, which you know in your heads and hearts already: Ineffective, unfocused violence leads to more violence. Limp, panicky, half-measures lead to more violence. However, complete, fully thought-through, professional, well-executed violence never leads to more violence because, you see, afterwards, the other guys are all dead. That's right, dead. Not "on trial," not "reeducated," not "nurtured back into the bosom of love." DEAD. D-E --Well, you get the idea. 3) "The CIA and the rest of our intelligence community has failed us." For 25 years we have chained our spies like dogs to a stake in the ground, and now that the house has been robbed, we yell at them for not protecting us. Starting in the late seventies, under Carter appointee Stansfield Turner, the giant brains who get these giant ideas decided that the best way to gather international intelligence was to use spy satellites. "After all," they reasoned, "you can see a license plate from 200 miles away." This is very helpful if you've been attacked by a license plate. Unfortunately, we were attacked by humans. Finding humans is not possible with satellites. You have to use other humans. When we bought all our satellites, we fired all our humans, and here's the really stupid part. It takes years, decades to infiltrate new humans into the worst places of the world. You can't just have a guy who looks like Gary Busey in a Spring Break'93 sweatshirt plop himself down in a coffee shop in Kabul and say "Hiya, boys. Gee, I sure would like to meet that bin Laden fella. "Well, you can, but all you'd be doing is giving the bad guys a story they'l be telling for years. 4) "These people are poor and helpless, and that's why they're angry at us." Uh-huh, and Jeffrey Dahmer's frozen head collection was just a desperate cry for help. The terrorists and their backers are richer than Elton John and, ironically, a good deal less annoying. The poor helpless people, you see, are the villagers they tortured and murdered to stay in power. Mohammed Atta, one of the evil scumbags who steered those planes into the killing grounds (I'm sorry, one of the "alleged hijackers," according to CNN-they stopped using the word "terrorist," you know), is the son of a Cairo surgeon. But you knew this, too. In the sixties and seventies, all the pinheads marching against the war were upper-middle-class college kids who grabbed any cause they could think of to get out of their final papers and spend more time drinking. At least, that was my excuse. It's the same today. Take the Anti-Global-Warming (or is it World Trade? Oh-who-knows-what-the-hell -they-want demonstrators) They all charged their black outfits and plane tickets on dad's credit card before driving to the airport in their SUV's. 5) "Any profiling is racial profiling." Who's killing us here, the Norwegians? Just days after the attack, the New York Times had an article saying dozens of extended members of the gazillionaire bin Laden family living in America were afraid of reprisals and left in a huff, never to return to studying at Harvard and using too much Drakkar. I'm crushed. I think we're all crushed. Please come back. With a cherry on top? Why don't they just change their names, anyway? It's happened in the past. Think about it. How many Adolfs do you run into these days? Shortly after that, I remember watching TV with my jaw on the floor as a government official actually said, "That little old grandmother from Sioux City could be carrying something." Okay, how about this: No, she couldn't. It would never be the grandmother from Sioux City. Is it even possible? What are the odds? Winning a hundred Powerball lotteries in a row? A thousand? A million? And now a Secret Service guy has been tossed off a plane and we're all supposed to cry about it because he's an Arab? Didn't it have the tiniest bit to do with the fact that he filled out his forms incorrectly- - three times? And then left an Arab history book on his seat as he strolled off the plane? And came back? Armed? Let's please all stop singing "We Are the World" for a minute and think practically. I don't want to be sitting on the floor in the back of a plane four seconds away from hitting Mt. Rushmore and turn, grinning, to the guy next to me to say, "Well, at least we didn't offend them." SO HERE'S what I resolve for the New Year: Never to forget our murdered brothers and sisters. Never to let the relativists and bleeding-heart liberals get away with their immoral thinking. After all, no matter what your daughter's political science professor says, we didn't start this. Have you seen that bumper sticker that says, "No More Hiroshimas"? I wish I had one that says, "You First. No More Pearl Harbors." Dick Hawley -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6815 From: Matt Paulsen Date: Thu Jan 23, 2003 9:52pm Subject: spectrum analyzer A while ago I posted that I was looking for a spectrum analyzer up to around 6ghz. Anyone use these? HP/Agilent E4404B I need something portable that will take a beating, be in rain, wind, snow, jounced around cars, etc...What is the general cost for the above? 6816 From: Matt Paulsen Date: Thu Jan 23, 2003 10:57pm Subject: RE: USAF 4 Star Speaks Out There is a piece zooming around the internet that attributes some pretty forceful statements to me, Dick Hawley - one time fighter pilot, General, thoughtful consultant, neophyte strategist, master of the artful compromise. The words did not flow from my pen, but if the e-mails mean anything, those words are now indelibly linked to my name. So do me a favor - if you receive this, please send it on to the same people to whom you forwarded the one that I did not write. It's not that I don't share many, if not most, of the sentiments attributed to me, but the piece is just not my style. Here's what I would have said if I'd been asked to comment on those five important issues. 1) Goodness, Evil and Relativity: There are some really good people in this world. They volunteer to help those who need it, and ask nothing in return. There are also some really bad people in this world. They exploit those who need help, or who have less wit or "charisma", and motivate them to join in committing unspeakable acts of cruelty against people they don't even know. Then there are the rest of us. Average people who try each day to do no harm, to provide for their families, to do an occasional act of kindness. The evil that was perpetrated against our land on 9/11 was the product of Mullahs who see our prosperity and power as a threat to their control over the uneducated Muslim masses on whose shoulders they ride through life. And so they preach hate. They are evil. 2) Violence begets violence: It's true. Violence does beget violence. But sometimes there is no alternative but to confront those who would perpetrate evil acts against us. This is one of those times. We are blessed to have courageous men and women willing to put their lives on the line to track down and annihilate those who have been so imbued with evil as to be beyond redemption. But violence is not a strategy. It is a necessary and fully justified reaction to an unimaginable threat. But it is not a strategy. If we are to win this war, we must defeat the Mullahs. And to defeat the Mullahs, we must find ways to separate them from their uneducated flocks. We cannot kill all those who have been taught to hate us, nor should we wish to. Far better to change their minds than to change their state of being. 3) The intelligence community let us down: Well, maybe just a little. Lots of senior and not so senior intelligence people became just as enamored of high tech gadgets as their political masters. The protests over our evisceration of the human intelligence component of the agency were not very loud or forceful. Keeping spies on the ground is a high risk and often dirty business, and it wasn't just liberal politicians who didn't have much stomach for it. 4) Poverty is the breeding ground for terrorists: No, it isn't; but religious extremism is. The Mullahs fear our wealth and power because it shows that a secular society with democratic institutions and a free market economy can do a better job of taking care of its peoples' needs, both spiritual and physical, than the oppressive Islamic regimes that they aspire to lead. The Mullahs are the problem, not poverty, but poverty does make it easier for the Mullahs to spread their evil - as do governments that tolerate and even reinforce their hateful message. 5) Profiling: We are at war here! We are not talking about traffic stops. If we were at war with Iceland, I would expect those charged with our defense to pay very close attention to any Icelander who ventured near our shores. In this war I expect them to pay very close attention to Muslims with ties to the places that spew hatred against us. Random checks when there are no such obvious targets available are a good way to keep the evil ones guessing, but let's not make small children and grandmothers take their shoes off while we watch far more likely candidates walk aboard unchecked. 6) Resolutions: a. Never forget that what happened on September the 11th of 2001 was an act of war. b. Never sit silently by while someone tries to justify what happened on that day as an understandable reaction to U.S. policies in the Middle East or elsewhere. c. Fly our nation's flag proudly - it represents this world's greatest hope to move beyond the pain and suffering that inflict so many across the globe. Richard E. Hawley General, USAF, Retired Former Commander, Air Combat Command 6817 From: Matt Paulsen Date: Thu Jan 23, 2003 10:55pm Subject: RE: USAF 4 Star Speaks Out Claim: Former USAF General Dick Hawley delivered a caustic speech about "thoughts of such surpassing stupidity that they must be addressed." Status: False. Origins: Yes, Gen. Richard E. Hawley is a real person, a United States Air Force general who served as commander of the USAF's Air Combat Command until his retirement in 1999, but no, he didn't write or deliver the speech quoted above. This "speech" is actually a column by humorist Larry Miller which appeared in The Daily Standard on 14 January 2002; the version circulating on the Internet omits the opening and closing paragraphs.. continued... http://www.snopes2.com/rumors/hawley.htm -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Thursday, January 23, 2003 7:51 PM To: TSCM-L Mailing List Subject: [TSCM-L] USAF 4 Star Speaks Out USAF 4 Star Speaks Out For those of you who don't know who General Hawley is, he is a newly-retired 4-star General who commanded the U.S. Air Force Air Combat Command. He recently delivered this speech, now that he's retired and no longer restricted to being politically correct, at the Air Force Association Annual Meeting: "Since the attack, I have seen, heard, and read thoughts of such incredible and surpassing stupidity that they must be addressed. You've heard them too. Here they are: 1) "We're not good, they're not evil, everything is relative." Listen carefully: We're good, they're evil, nothing is relative. Say it with me now and free yourselves. You see, folks, saying "We're good" doesn't mean, "We're perfect." Okay? The only perfect being is the bearded guy on the ceiling of the Sistine Chapel. The plain fact is that our country has, with all our mistakes and blunders, always been and always will be the greatest beacon of freedom, charity, opportunity, and affection in history. If you need proof, open all the borders on Earth and see what happens. In about half a day, the entire world would be a ghost town, and the United States would look like one giant line to see "The Producers. 2) "Violence only leads to more violence." This one is so stupid you usually have to be the president of an Ivy League university to say it. Here's the truth, which you know in your heads and hearts already: Ineffective, unfocused violence leads to more violence. Limp, panicky, half-measures lead to more violence. However, complete, fully thought-through, professional, well-executed violence never leads to more violence because, you see, afterwards, the other guys are all dead. That's right, dead. Not "on trial," not "reeducated," not "nurtured back into the bosom of love." DEAD. D-E --Well, you get the idea. 3) "The CIA and the rest of our intelligence community has failed us." For 25 years we have chained our spies like dogs to a stake in the ground, and now that the house has been robbed, we yell at them for not protecting us. Starting in the late seventies, under Carter appointee Stansfield Turner, the giant brains who get these giant ideas decided that the best way to gather international intelligence was to use spy satellites. "After all," they reasoned, "you can see a license plate from 200 miles away." This is very helpful if you've been attacked by a license plate. Unfortunately, we were attacked by humans. Finding humans is not possible with satellites. You have to use other humans. When we bought all our satellites, we fired all our humans, and here's the really stupid part. It takes years, decades to infiltrate new humans into the worst places of the world. You can't just have a guy who looks like Gary Busey in a Spring Break'93 sweatshirt plop himself down in a coffee shop in Kabul and say "Hiya, boys. Gee, I sure would like to meet that bin Laden fella. "Well, you can, but all you'd be doing is giving the bad guys a story they'l be telling for years. 4) "These people are poor and helpless, and that's why they're angry at us." Uh-huh, and Jeffrey Dahmer's frozen head collection was just a desperate cry for help. The terrorists and their backers are richer than Elton John and, ironically, a good deal less annoying. The poor helpless people, you see, are the villagers they tortured and murdered to stay in power. Mohammed Atta, one of the evil scumbags who steered those planes into the killing grounds (I'm sorry, one of the "alleged hijackers," according to CNN-they stopped using the word "terrorist," you know), is the son of a Cairo surgeon. But you knew this, too. In the sixties and seventies, all the pinheads marching against the war were upper-middle-class college kids who grabbed any cause they could think of to get out of their final papers and spend more time drinking. At least, that was my excuse. It's the same today. Take the Anti-Global-Warming (or is it World Trade? Oh-who-knows-what-the-hell -they-want demonstrators) They all charged their black outfits and plane tickets on dad's credit card before driving to the airport in their SUV's. 5) "Any profiling is racial profiling." Who's killing us here, the Norwegians? Just days after the attack, the New York Times had an article saying dozens of extended members of the gazillionaire bin Laden family living in America were afraid of reprisals and left in a huff, never to return to studying at Harvard and using too much Drakkar. I'm crushed. I think we're all crushed. Please come back. With a cherry on top? Why don't they just change their names, anyway? It's happened in the past. Think about it. How many Adolfs do you run into these days? Shortly after that, I remember watching TV with my jaw on the floor as a government official actually said, "That little old grandmother from Sioux City could be carrying something." Okay, how about this: No, she couldn't. It would never be the grandmother from Sioux City. Is it even possible? What are the odds? Winning a hundred Powerball lotteries in a row? A thousand? A million? And now a Secret Service guy has been tossed off a plane and we're all supposed to cry about it because he's an Arab? Didn't it have the tiniest bit to do with the fact that he filled out his forms incorrectly- - three times? And then left an Arab history book on his seat as he strolled off the plane? And came back? Armed? Let's please all stop singing "We Are the World" for a minute and think practically. I don't want to be sitting on the floor in the back of a plane four seconds away from hitting Mt. Rushmore and turn, grinning, to the guy next to me to say, "Well, at least we didn't offend them." SO HERE'S what I resolve for the New Year: Never to forget our murdered brothers and sisters. Never to let the relativists and bleeding-heart liberals get away with their immoral thinking. After all, no matter what your daughter's political science professor says, we didn't start this. Have you seen that bumper sticker that says, "No More Hiroshimas"? I wish I had one that says, "You First. No More Pearl Harbors." Dick Hawley -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- Vocatus atque non vocatus deus aderit ---------------------------------------------------------------------------- ---------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6818 From: Robert Motzer <1RCM@M...> Date: Fri Jan 24, 2003 8:49am Subject: Sometimes Honesty Really Doesn't Pay! Hi List, I thought I'd share a local saga of a dumb cop, a polygraph and "wiretapping laws": http://www.pottsmerc.com/site/news.cfm newsid=6802795&BRD=1674&PAG=461&dept_id=18041&rfi=6 And a quick 'my two cents' aside here as well: For years this list has had a debate going on regarding a TSCM'ers obligation to notify Law Enforcement of a "find". I won't extend this any farther than Pennsylvania, but I can say conclusively that locally many of our County District Attorneys now have some real authority (and thus new-found interest) over the legal employment of "wiretapping" as well as the interpretation and prosecution of any mis-applications. As such they have begun to guard what they see as 'their turf' jealously and with fervor. So if they go after 'one of their own' with such vigor do you think they'd lose any sleep in going after someone, who for the most part they consider nothing more than a 'James Bond wanna-be' anyway, for their failure to report a witnessed felony? Think about it as it just may apply to your locale as well. Just Another Bob _________________________________________________________________ Protect your PC - get McAfee.com VirusScan Online http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963 6819 From: James M. Atkinson Date: Fri Jan 24, 2003 9:49am Subject: Re: Sometimes Honesty Really Doesn't Pay! The correct link is: http://www.pottsmerc.com/site/news.cfm?newsid=6802795&BRD=1674&PAG=461&dept_id=18041&rfi=6 Sex tape trips up Norco officer Jason McKee, jmckee@p...January 24, 2003 PHOENIXVILLE -- The truth shall set you free, but sometimes it gets you arrested. North Coventry Police Officer Bruce Hetrick was smart enough to be honest when filling out a job application for the state police last September. After all, aspiring troopers are thoroughly screened. If they lie on the written application, it's bound to come out in the polygraph exam. So when Hetrick, who has since left the police force, was asked if had ever recorded someone without the person's consent, he said yes, according to court records. "Sex with my ex-girlfriend," Hetrick wrote on the application. "But I did tell her afterwards, and showed her (the tape)." Police said the ex-girlfriend wasn't the only woman Hetrick secretly videotaped in his Phoenixville apartment, but only one woman was named in the criminal complaint. The exact date of the taping is not known, but occurred between 1998 and March 2001, court records state. Recording someone with video or audio equipment without their knowledge is a felony. Felons are not permitted to work in law enforcement. Why Hetrick, who was working as a patrolman in the North Coventry Police Department at the time of his interview with state police, allegedly admitted to committing a felony, is not clear. Hetrick, who lives in Exton, has an unlisted telephone number and could not be reached for comment. Police said Hetrick was given a polygraph Oct. 17, several weeks after the initial interview, and repeated the incriminating answers he had written on the job application. But after the interview, Hetrick must have realized the troopers were not impressed with his honesty. According to court records, Hetrick contacted his ex-girlfriend after taking the lie detector test and told her to tell the cops she knew she was in one of his films. "No victim, no crime," he allegedly told the woman. That is true, but the victim did not cooperate. She said Hetrick showed her the videotape last January. According to police, the woman was not happy about it. "He admitted that he knew she was upset about the filming," court records state. North Coventry Police Chief Robert Schurr said he contacted the Chester County District Attorney's office when he found out about Hetrick's criminal honesty. "He was put on administrative leave immediately," Schurr said. "And he resigned in December." The charges were filed Jan. 2. In addition to the wiretap violation, Hetrick is also facing felony insurance fraud and misdemeanor invasion of privacy charges. The insurance fraud charge comes from another admission of guilt Hetrick generously provided on his job application. Hetrick said four years ago he filed a fraudulent insurance claim to cover a broken windshield on his car, court records state. Hetrick received $257 from a trucking company to cover the cost of a windshield they did not break, according to police. Schurr said the incident has marred the reputation of his department. "We had a bad apple," he said. "It's a black eye for the police department and law enforcement in general." ©The Mercury 2003 At 9:49 AM -0500 1/24/03, Robert Motzer wrote: >Hi List, > >I thought I'd share a local saga of a dumb cop, a polygraph and "wiretapping >laws": > >http://www.pottsmerc.com/site/news.cfm >newsid=6802795&BRD=1674&PAG=461&dept_id=18041&rfi=6 > >And a quick 'my two cents' aside here as well: For years this list has had a >debate going on regarding a TSCM'ers obligation to notify Law Enforcement of >a "find". I won't extend this any farther than Pennsylvania, but I can say >conclusively that locally many of our County District Attorneys now have >some real authority (and thus new-found interest) over the legal employment >of "wiretapping" as well as the interpretation and prosecution of any >mis-applications. As such they have begun to guard what they see as 'their >turf' jealously and with fervor. So if they go after 'one of their own' with >such vigor do you think they'd lose any sleep in going after someone, who >for the most part they consider nothing more than a 'James Bond wanna-be' >anyway, for their failure to report a witnessed felony? Think about it as it >just may apply to your locale as well. > >Just Another Bob > > > > > >_________________________________________________________________ >Protect your PC - get McAfee.com VirusScan Online >http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963 > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6820 From: ed Date: Fri Jan 24, 2003 10:49am Subject: Suspected car bomb turns out to be tracking device http://www.theitem.com/CityDesk/030118a_news.cfm Date Posted: January 18, 2003 False Alarm Suspected car bomb turns out to be tracking device By BRADEN BUNCH Item Staff Writer A device that appeared to be a bomb on a vehicle parked outside Simpson's Hardware and Sports on Wesmark Boulevard kept local and state authorities busy for nearly four hours Friday before the object was found to be a tracking system placed on the car by the driver's wife. Sumter Police Chief Patty Patterson said police were called at 3:23 p.m. when a sales representative for Simpson's Sales Co., who was delivering an order of Browning firearms, spotted a suspicious package on the undercarriage of his Chevrolet Suburban as he came out of the store. After a preliminary inspection indicated to authorities that the device could be an explosive, surrounding businesses were ordered closed and authorities evacuated the area within a mile of the vehicle. Described as a "very professional-looking device," the object was thought to be several sticks of dynamite with a remote detonation transmitter attached. The entire device, authorities said, was attached to the vehicle with duct tape. Hours later, Patterson said, authorities learned from a call by the Florence man's wife that she had placed the tracking device on the car so she could keep tabs on her husband. Soon after the initial 911 call, local police were joined by several dozen safety workers from Shaw Air Force Base, the State Law Enforcement Division, Sumter Fire Department, Sumter County Emergency Medical Services and the Sumter County Department of Public Safety. Wesmark Boulevard was shut down from Broad Street to Alice Drive and traffic was temporarily rerouted along Broad Street into the Sumter Mall parking lot. After determining there was no danger to vehicles on Broad Street, authorities reopened the road. Patterson, who was attending an event at Shaw, arrived shortly afterward and a command center was set up across the street from Simpson's in the Alltel parking lot. At 5:53 p.m., with both the Shaw Air Force Base Explosive Ordnance Disposal Unit and the SLED bomb squad in place, authorities detonated the apparent transmitter of the device using a RONS (Remote Ordnance Neutralization System), a remote-controlled robot equipped with cameras and detonation devices. Fearing a large explosion, all public safety workers at the scene were ordered to take cover before the detonation. Authorities had been working on this for about an hour when the call came in that the package was a tracking device. Despite the nearly four hours spent on the call, Patterson said both the man reporting the bomb and all the officers responding to the scene acted appropriately. We can't stress enough that it appeared to look like a bomb, both to local officers and to the bomb squads," Patterson said. The police chief also stressed the evacuation and road closures were appropriate measures. "Especially in these times, it's important to act with diligence, she said. Sumter Writer Braden Bunch can be called at 803-774-1222 or e-mailed at bradenb@t... 6821 From: Ocean Group Date: Fri Jan 24, 2003 11:45am Subject: USAF 4 Star Speaks Out While this is certainly an interesting read... I would like to say this, at least on a personal level...if this stuff is posted then I'd like the right to react. "b. Never sit silently by while someone tries to justify what happened on that day as an understandable reaction to U.S. policies in the Middle East or elsewhere." There is no justification is taking life. It is wrong. Let me get this straight, the general is saying that anyone who tries to tell the USA why they were attacked shouldn't be allowed to voice their opinions. They should be silenced. Right? Or is he saying that the attack is not "understandable"... I understand the attack. I understand why they did it. So do millions. Why can't the USA(or in this case a USAF general) understand. I know they are capable of understanding. There are bright, intelligent, caring Americans so why is it they are not able to understand? Is it because they are not being presented with the facts to allow them to understand? Is it because the government is afraid of the way it might make their country look? Would it show the government in a bad light...? Why is it that they say..."The first casualty of war is truth..." "c. Fly our nation's flag proudly - it represents this world's greatest hope to move beyond the pain and suffering that inflict so many across the globe." The USA flag does not represent the worlds greatest hope at moving beyond pain and suffering. At the moment it represents the infliction of pain and suffering . It also represents war. In many people it brings up a deep hatred. How did this hatred get instilled in so many people...? And before anyone says this again, I am not anti-American. I have American family. Why is it when I turn on the TV at night, and I mean almost every night I see a picture of someone burning a US flag. I have to laugh, the guy that makes these things must be raking it in! Your flag represents a greedy self interested country to many people. A country who's fight abroad is disease ridden with insinuations of money and oil and weapons. I think I almost burst into tears of laughter when they reported on TV that the USA would kindly and selflessly hold the Iraqi oil "in trust" for the Iraqi people when they get rid of Saddam. That is going to make alot of people question the US's intentions. I cannot name one other country in the world who's flag gets burned so much! And I know what people will say, but that's because we are the worlds greatest superpower, we can't please everybody. But in the words of Denis Leary, that's "...because we got the bomb, two words, nuclear f**kin weapons...". With great power comes great responsibility, so why is it then that power corrupts and absolute power corrupts absolutely? This is an old argument, and quite frankly a tiring one. I do know that if I wanted to represent a hope for the end of pain and suffering I wouldn't need to look at a country's flag, and especially not the US one. No long established country has no blood on their hands. But at the moment the US is at the forefront. I'm sure you guys have heard of that guy from Michigan called Michael Moore. I went to see his movie called Bowling for Columbine. It was very interesting and very eye opening. A colleague in Australia recently pointed me towards his website, www.michaelmoore.com . When people see this kind of stuff it makes them think that your government is controlled my money and corporations...can you understand that? Then they see this war and they think you are wrong, not only are you wrong but then you start killing people, then people have as much respect for American life as did those hijackers. Is that what the US wants? It thought me one thing, the problem does lie with the USA. Not only that but the country is spawning violence. It's sickening. I just hope that things get better before it gets worse. In the movie it lays alot of questions on arms makers and the media's role in brain washing people. Not surprising really, in the UK the media are already meeting with the government to decide what they can and cannot publish regarding the upcoming war. Anyway the list goes on, I know we can argue about this all day, I know I'll get someone emailing me telling me how much of a disgrace I am and giving out for me questioning this stuff. But this isn't what we are here for, we're here to share and learn something about TSCM as people, hopefully something most of us enjoy doing, and I want to discuss and learn things from you, if you want to post this kind of stuff do it somewhere else, please. All the best Vance PS. Ship high in transit...is that really the origin?? :) 6822 From: Shawn Hughes Date: Fri Jan 24, 2003 6:44pm Subject: vegas casinos >Vegas' High-Stakes Surveillance Lab; >In using sophisticated systems and software to pinpoint cheats, casinos are >providing valuable lessons for law enforcement > >Copyright 2003 The McGraw-Hill Companies, Inc. All Rights Reserved >Business Week Online...01/23/2003 > >Jane Black > >For high rollers, the Bellagio Hotel & Casino in Las Vegas is paradise on >earth. Amid the gilt ceilings and sumptuous, florid surroundings, patrons >focus on one thing: Gambling. The casino even pumps in extra oxygen to keep >the customers awake and alert. > >All the while, the Bellagio is watching -- especially if you start winning >big -- with 1,900 security cameras. Every gambling table has one above it, >while hundreds more tilt, pan, and zoom in on any suspicious activity from >strategic locations throughout the facility. Upstairs, in a location the >Bellagio won't disclose, half a dozen surveillance experts watch and record >patrons' moves. If they see someone suspicious, they capture the face and >plug it into a facial-recognition program, which will quickly check to see >if it matches any known cheats. > >DEMANDING RESULTS. Privacy advocates don't protest the spy technology, which >is used in most casinos. After all, when you enter one, you give up your >right to privacy. And because these are profit-driven establishments, >executives aren't lured by fancy systems that don't deliver results. The >upshot: The Vegas Strip has become a testing ground for what does and >doesn't work in the field of surveillance. The idea is to catch crooks -- >and keep honest people honest. > >In some ways, surveillance in Vegas is much like the world of computer >network security. As quickly as casinos upgrade their system protections, >crooks find a new hole in them. Witness a recent "cooler deck" scam that >robbed one of Las Vegas' most famous casinos of $ 250,000. It worked like >this: A gang of fraudsters, which included a crooked dealer and a security >guard, managed to get hold of six official decks of cards. They put the >cards in these decks in a specific order and sneaked them into the casino. >Then they did some surveillance of their own, waiting for the camera above >their table to be momentarily turned off while a new tape was inserted into >the VCR. > >At that point, the crooks switched the real deck for their ordered one. >Because they knew which cards would be dealt when, they won every hand. And >since no camera was taping, the casino couldn't prove that they had cheated. >(That's why this casino doesn't want to be named.) > >DIGITAL ADVANTAGES. In Vegas, crooks' innovation invariably leads to >improvements by the casinos. Incidents such as the one described here >explain why the outfits are now moving from analog-tape surveillance to >digital, which requires no tape changing that would allow crooks to act >unrecorded. Besides, digital images don't get lost or degrade over time. The >information will be stored on massive hard drives or optical storage systems. > >Digital setups also allow for easier access to crucial information. If, for >example, a casino using tape is robbed, surveillance experts have to watch >hours of recordings -- sometimes days of it -- in search of evidence. With >digital recordings, staff can simply request that the computer system show >every time that a cash drawer was opened. Then security can zoom in on each >instance, with time and date, immediately. > >In the past, "by the time you reviewed seven days of tapes and figure out >what happened, the crooks were already on their way to Bermuda," says Scott >Bartlett, CEO of Southwest Surveillance Systems, a Las Vegas technology >provider. "Digital helps you ID the problem in minutes and catch the bad >guys before they get away." > >PLAYING CATCH-UP. Here's another scam executed in South Africa last year >that has led to innovation in surveillance. The crooks knew the cameras were >never turned off -- unless a patron had a dispute with the house. So five >scamsters sat down at a blackjack table, and one of them kept staging >arguments with the dealer about the amount he had bet. Finally, the angry >gambler demanded to see the tape. The security team obliged and stopped >taping what was going on at the table. Meanwhile, the crooks lifted tens of >thousands of dollars while the blackjack dealer and security officials were >distracted. > >Many casinos have now installed backup systems that ensure every moment is >captured on camera. "We're always one step behind them," admits Patricia >Fischer, Bellagio's surveillance director. "But we always catch up." As the >technology in Vegas proves its worth, similar precautions may soon appear in >airports and other high-risk areas. > >Vegas' latest spy toy is facial-recognition software. In the old days, >security guys memorized books of mug shots, then peered down on gamblers >through binoculars from the catwalks. Now they use this software to match >known criminals' facial characteristics with those of gamblers in the casino. > >"NOT THERE YET." The use of such technology in public areas (as opposed to >inside a casino) has drawn the ire of privacy rights groups, who say it >doesn't work as advertised and is a needless intrusion on privacy. Indeed, >initial testing in Vegas has had mixed results. On the one hand, >facial-recognition software can save surveillance experts time by comparing >a suspicious face to tens of thousands of known cheats. But it can't yet >pick out crooks in a crowd on its own. "At some point, the software will be >good enough to just run in the background and alert you when it finds a >match. But it's not there yet," says Fischer. > >Experts in Vegas say the key lesson that terrorist-hunting feds can learn >from the casinos is to rely on smart, properly trained people, not the >latest gizmos. Determined crooks, after all, will always find a way to >circumvent technology. > >"The technology is only as good as the people behind it," says George Lewis, >director of surveillance training at the University of Nevada Las Vegas >International Gaming Institute and the author of The Eye that Never Blinks. >"You have to think like a crook to catch a crook." The intelligence >community would be wise to remember that. > Shawn Hughes ---------------------------------------------------------------------------- ----------------------------------------------- Mistakes have been made. Others will be blamed......... 6823 From: Steve Uhrig Date: Sun Jan 26, 2003 2:38pm Subject: Decent lead acid battery info This site: http://www.uuhome.de/william.darden/ has very decent info on lead acid batteries such as are used in automobiles. The info is not directly pertinent to TSCM, but good to know the characteristics. Much TSCM gear, like the OSCOR, is powered by lead acid batteries, called SLA, for Sealed Lead Acid. The same info pertains to lead acid in test equipment. Many Riser Bond TDRs also have lead acid. The main thing is to keep them charged. The site is worth some time. Read it and you'll know more about lead acid batteries than practically anyone you'll meet. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6824 From: Steve Weinert at Excel.Net Date: Sat Jan 25, 2003 11:43am Subject: Re: Please take your own advice ( WAS: USAF 4 Star Speaks Out) Please take your own advice. You were spot on in your observation that isn't the forum for your diatribute. Thanks, Steve W > Anyway the list goes on, I know we can argue about this all day, I know I'll > get someone emailing me telling me how much of a disgrace I am and giving > out for me questioning this stuff. But this isn't what we are here for, > we're here to share and learn something about TSCM as people, hopefully > something most of us enjoy doing, and I want to discuss and learn things > from you, if you want to post this kind of stuff do it somewhere else, > please. > > All the best > Vance 6825 From: Date: Sat Jan 25, 2003 10:15pm Subject: INTEL threat (high potential) about to blossom Imagine if you will.... You wake up and drive into the C3I complex. A package is awaiting you. You have been expecting it and are looking forward to the bug fixes for the servers you take care of. The shrink wrap is intact on the package. You get through your checkpoint, authorize your presence, the package is cleared and go into the NOC. You install the software on a few test servers, (never on production equip first) and analyze them for 48 hrs or more. Things seemed good so it's planned and deployed to the production network. Congratulations! You just installed Sleeperware v.2.1!!!! And got a FIS past the checkpoints! Yes the holograms are real, the signatures are valid. The source code was compromised. Other scenario. You notice (maybe you don't notice it) activity on your systems. The anti virus and CERT teams show nothing unusual. What's up? Congratulations! You've just become the target of a Foreign Intelligence Service (or private). They know the complete core guts of the OS you run. And are attacking a previously unknown weakness in the OS. Okay, reality check here. Why the drama above? To get your mid thinking in certain directions. Yes the scenarios are not perfect, they are flawed, but the principle is solid. Why do I write this and take up these bytes of data saying all this? Be very afraid: http://www.cnn.com/2003/TECH/biztech/01/21/russia.microsoft.reut/index.html The risk is obvious to those who are aware that it's not Dr. No on the other side out there. Not to mention the containment of the info will undoubtedly leak. There's more to say but it's mostly obvious to those on this list. Or it should be :-) $0.02 -James Let me know if you have comments. 6826 From: Matt Paulsen Date: Sun Jan 26, 2003 8:04pm Subject: RE: INTEL threat (high potential) about to blossom ..."Microsoft has said it will make its source code mainly available to them over the Internet and for free, provided they do not disclose it. "... hahahahahaha -----Original Message----- From: jamesworld@i... [mailto:jamesworld@i...] Sent: Saturday, January 25, 2003 8:16 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] INTEL threat (high potential) about to blossom Imagine if you will.... You wake up and drive into the C3I complex. A package is awaiting you. You have been expecting it and are looking forward to the bug fixes for the servers you take care of. The shrink wrap is intact on the package. You get through your checkpoint, authorize your presence, the package is cleared and go into the NOC. You install the software on a few test servers, (never on production equip first) and analyze them for 48 hrs or more. Things seemed good so it's planned and deployed to the production network. Congratulations! You just installed Sleeperware v.2.1!!!! And got a FIS past the checkpoints! Yes the holograms are real, the signatures are valid. The source code was compromised. Other scenario. You notice (maybe you don't notice it) activity on your systems. The anti virus and CERT teams show nothing unusual. What's up? Congratulations! You've just become the target of a Foreign Intelligence Service (or private). They know the complete core guts of the OS you run. And are attacking a previously unknown weakness in the OS. Okay, reality check here. Why the drama above? To get your mid thinking in certain directions. Yes the scenarios are not perfect, they are flawed, but the principle is solid. Why do I write this and take up these bytes of data saying all this? Be very afraid: http://www.cnn.com/2003/TECH/biztech/01/21/russia.microsoft.reut/index.html The risk is obvious to those who are aware that it's not Dr. No on the other side out there. Not to mention the containment of the info will undoubtedly leak. There's more to say but it's mostly obvious to those on this list. Or it should be :-) $0.02 -James Let me know if you have comments. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6827 From: Trey A Mujakporue Date: Mon Jan 27, 2003 4:58am Subject: RE: INTEL threat (high potential) about to blossom There is nothing new about what you are saying.. Its just that given the distribution of microsoft products, we will now be more exposed to greater privacy invasion than ever before. Take for instace the following.. http://cryptome.unicast.org/cryptome022401/msnsa-law.htm paragraph 39 to do with Swiss company CryptoAG and the NSA... Sounds crazy but is true..and shooting from the hip, I'll say that that was just the tip of the Ice-berg... For those who use microsoft windows 2000, did you know that in order to install the latest service pack,.. You must agree to Bill gates having admin rights on your computer... Hmmm.. Really now I hear you ask.. Check it out!! http://212.100.234.54/content/4/25956.html or if you don't have time.. Check out a windows 2000 service pack 3 EULA near you! Ps... In the cryptome article Svenska Dagbalet is the equivalent of the NY times... I wouldn't say the email im responding to is a whole heap of FUD but it was near enough! :) -----Original Message----- From: jamesworld@i... [mailto:jamesworld@i...] Sent: 26 January 2003 04:16 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] INTEL threat (high potential) about to blossom Imagine if you will.... You wake up and drive into the C3I complex. A package is awaiting you. You have been expecting it and are looking forward to the bug fixes for the servers you take care of. The shrink wrap is intact on the package. You get through your checkpoint, authorize your presence, the package is cleared and go into the NOC. You install the software on a few test servers, (never on production equip first) and analyze them for 48 hrs or more. Things seemed good so it's planned and deployed to the production network. Congratulations! You just installed Sleeperware v.2.1!!!! And got a FIS past the checkpoints! Yes the holograms are real, the signatures are valid. The source code was compromised. Other scenario. You notice (maybe you don't notice it) activity on your systems. The anti virus and CERT teams show nothing unusual. What's up? Congratulations! You've just become the target of a Foreign Intelligence Service (or private). They know the complete core guts of the OS you run. And are attacking a previously unknown weakness in the OS. Okay, reality check here. Why the drama above? To get your mid thinking in certain directions. Yes the scenarios are not perfect, they are flawed, but the principle is solid. Why do I write this and take up these bytes of data saying all this? Be very afraid: http://www.cnn.com/2003/TECH/biztech/01/21/russia.microsoft.reut/index.h tml The risk is obvious to those who are aware that it's not Dr. No on the other side out there. Not to mention the containment of the info will undoubtedly leak. There's more to say but it's mostly obvious to those on this list. Or it should be :-) $0.02 -James Let me know if you have comments. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6828 From: David Vine Date: Mon Jan 27, 2003 9:06pm Subject: SC (USA) Salesperson W/Law Enf. Background Needed I operate a seminar and publishing business in Aiken, SC selling to law enforcement and corporate security markets. We are looking for a sales person with a background in that or related areas (former intel or military, etc.) to work from our office or possibly your home. Compensation for a real producer could easily exceed $50,000 the first year. We have several seminars in various stages of development and you would have a marketing budget to make it happen. Please take a look at www.investigativetechnology.net to see what we're doing right now. If you are qualified and highly motivated, please contact me directly via email. David Vine 6829 From: Steve Uhrig Date: Tue Jan 28, 2003 8:41am Subject: Reorganization of ATF (USA) Effective Friday, January 24, 2003, the Bureau of Alcohol, Tobacco and Firearms (ATF) officially transfers from the Department of the Treasury to the Department of Justice, retaining its bureau status. 6830 From: frost_bitten_ca Date: Tue Jan 28, 2003 0:08pm Subject: Court rejects infrared drug search POSTED AT 2:07 AM EST Tuesday, January 28 Court rejects infrared drug search By KIRK MAKIN From Tuesday's Globe and Mail Your home is your castle ≠ right down to the heat that leaks out of it. The Ontario Court of Appeal extended the right of privacy to intrusive technological advances Monday, acquitting a man whose hydroponic marijuana operation was detected by police who flew overhead with infrared equipment. "The nature of the intrusiveness is subtle, but almost Orwellian in its theoretical capacity," the court said in a 3-0 ruling. It said police must henceforth obtain search warrants for these flyovers, since the heat they measure may emanate from other private activities that generate surges of energy. "Some perfectly innocent internal activities in the home can create the external emanations detected and measured by forward looking infrared aerial cameras," Madam Justice Rosalie Abella wrote. "Many of them, such as taking a bath or using lights at unusual hours, are intensely personal." There is a clear distinction between the kind of observation police make using the naked eye or binoculars and more threatening forms of intrusion that are the product of technology, she said. The ruling erased an 18-month sentence imposed against a Windsor, Ont., handyman, Walter Tessling, whose home contained enough marijuana plants to yield many kilograms of the narcotic. The court noted that in view of an evolving "public, judicial and political" recognition that marijuana is a less serious narcotic than it was once seen to be, it was preferable to exclude the ill-gotten evidence. Writing on behalf of Mr. Justice Dennis O'Connor and Mr. Justice Robert Sharpe, Judge Abella said Mr. Tessling must also be acquitted of possessing several unlicensed handguns. RCMP conducted the aerial surveillance in 1999, after getting a tip from an informant who was unfamiliar to them that Mr. Tessling and a friend were producing and trafficking marijuana. Defence counsel Frank Miller said Monday's ruling under the Charter of Rights signals that courts are aware of the threat future technology poses to vital civil liberties. "As far as I'm concerned, this is the essence of freedom," he said in an interview. "Why should the police know whether someone is taking a sauna, firing a kiln, growing orchids or growing marijuana?" He said infra-red surveillance will be subject to the same laws that exist for obtaining warrants to conduct a raid, plant a listening device or intercept phone calls. "What is novel is that this case involves what is known as 'off-the- wall technology' ≠ where inferences can be drawn about what is going on in your home without the police going anywhere near it," Mr. Miller said. Police in the Tessling case were told by Ontario Hydro officials that there was no unusual hydro usage at his home. Still suspicious, they flew over using equipment. Crown counsel James Leising and Moiz Rahman defended the evidence on the basis that any violation of Mr. Tessling's privacy interest was trivial. They said individuals have no reasonable expectation of privacy about the heat emitted from their homes, and nor does it reveal intimate details about their activities. However, the court said that Mr. Tessling clearly had a reasonable expectation of privacy, and that it was unreasonably violated. "While I accept that technically what is being scrutinized is heat from the surface of a home, it is impossible to ignore the fact that those surface emanations have a direct relationship to what is taking place inside the home," it said. http://www.globeandmail.com/servlet/ArticleNews/front/RTGAM/20030128/w xgrow0128/Front/homeBN/breakingnews 6831 From: Mitch D Date: Tue Jan 28, 2003 7:32pm Subject: Re: Court rejects infrared drug search Not advocating an idiot growing pot plants but;Glad someone in a courtroom still understands "Curtilage".......... __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6832 From: Matt Paulsen Date: Tue Jan 28, 2003 8:06pm Subject: tscming a lan Hi there... Have read http://www.tscm.com/fluke785.html a bit. Given a fluke, sniffer, scope and 0-2ghz spectrum analyzer, I am interested in the nuts & bolts of determining what is 'normal' vs 'not normal' within the context of a network being abused by 'real life' non-software based devices used to eavesdrop using network infrastructure vs. phone infrastructure. Not interested in software intrusions/surveillance/etc. Utilization runs around .5-1.5% on a bad day and broadcast/multicasts are here and there, mostly between the HSRP routing switches at the core. Traffic is around 40%ipx, 55%ip, 5% other... 65 subnets, 1000+ devices... Backbone is fiber down to ether, some token, co/twinax, decnet, and other things..... Mostly cisco, 4908's using HSRP down to 3508's (all fiber), from there to more 3508's and/or 2950's using mdics/gbics (can't remember which acronym goes where...) out to 10/100 switches/hubs, mostly cat 5/5e/6, some 3 here and there. VLAN'd and using spanning tree... . Routers are a smattering of 4000's, 3600's, 4500's, 25xx's, 17xx's, 3000's, etc on private t1's, vpn's, frames, ds0's, ds1's, wifi, and more.. IE: a lot of pipe.. not a lot of use.. mostly bursty traffic and dead air... so it's hard to say who a 'top dog' sender is in this, unless you put 50 sniffers on the lan at once, especially since vlan's are everywhere and blocking traffic... snooping would be nice.... but papa's checkbook isn't that big. I guess the obvious points would be to sniff the subnet where the internet access is, as well as the servers, which is already being done, but since the servers tend to drown out a client here or there and client traffic looks like routers at the core, it's harder to say than find it. Almost makes me want to run a cisco switch report. Almost. To break down the page a bit and ask some questions... At this point the physical wiring will be checked for any eavesdropping device, or anomaly. - Any suggestion on what types of anomalies to look for with the tools above or are you talking about cable dragging it in the ceiling here? near-end/far-end cross talk analysis will be performed to locate inductive or capacitor isolated devices - what would this look like on a fluke? mostly next/fext is a pretty basic yes/no, like when doing a wire map.. it either is or isn't there/is or isn't paired up right. Anything specific to look for? Should I run specific wire tests that aren't the norm or look for specific characteristics? Be sure to check all conductor combinations, and all references to ground, and structural components for signal paths. --- Most LAN's are dead runs from LAN access device to patch panel to port, not grounded... unless you're counting the grounding of the LAN access device. It's been a long long time since I've seen a distributed fault on a network. What are you referencing here? When checking UTP wiring be sure to check all four cable pairs, and check the voice cabling at the same time (easy to do when four Smart Remotes are being used), but ensure that all cabling is "dry" (has no signal on it) before performing any tests. -- I have 6 remotes, but don't know what you mean by this. Mine are just numbered 1 -6 and ring out on the display and I can test 2 out at a time on my fluke ie: 2 full cables... am I misinterpreting something here or are you talking about something different entirely? It may also be beneficial to also perform a Sweep Analysis of the cabling (with a Spectrum Analyzer and Sweep Generator) to identify any frequency response related anomalies. - Can you give me a manufacturer/model sweep generator suggestion? HP 8601A or is there one better for field work? What range and resolution should I look for? What RF ranges should I disregard as normal when doing the spectrum analysis and the oscope tests for cat5/5e/6? 100MHz.. and? Lastly, what are some things to consider given fiber is prevalant in the ethernet environment (disregarding other media types for a moment), as well as media bridges pretty much all over the place? How would physical eavesdropping devices cope with this sort of briding? Thanks, Matt 6833 From: kondrak Date: Tue Jan 28, 2003 10:47pm Subject: Reorganization of ATF (USA) > > >The A.T.F has split into two groups, one keeping its present name and >moving to the Department of Justice. The other department is changing its >name to The Alcohol and Tobacco Tax Bureau (TTB) however, that one is >still under the control of the Treasury Department. > >http://www.ttb.gov/ [Non-text portions of this message have been removed] 6834 From: Hawkspirit Date: Wed Jan 29, 2003 8:43am Subject: tscming a lan Matt, I have been doing a lot of research in this area in the last year. I have several T-spans set up in my lab and I have purchased every major CSU/DSU and so far eight bit error rate detectors and framing generators. Your most accurate way to secure wire is still the use of TDR which means your resolution will be so much better if you shut down the data flow during the test. You will still have the problem of repeaters and routers every mile or so. Remote loop back testing is the way to go to identify those units and their location on the span. The biggest threat may be monitoring ports on those devices. Roger Tolces Electronic Security www.bugsweeps.com Date: Tue, 28 Jan 2003 18:06:08 -0800 From: "Matt Paulsen" Subject: tscming a lan Hi there... Have read http://www.tscm.com/fluke785.html a bit. Given a fluke, sniffer, scope and 0-2ghz spectrum analyzer, I am interested in the nuts & bolts of determining what is 'normal' vs 'not normal' within the context of a network being abused by 'real life' non-software based devices used to eavesdrop using network infrastructure vs. phone infrastructure. Not interested in software intrusions/surveillance/etc. Utilization runs around .5-1.5% on a bad day and broadcast/multicasts are here and there, mostly between the HSRP routing switches at the core. Traffic is around 40%ipx, 55%ip, 5% other... 65 subnets, 1000+ devices... Backbone is fiber down to ether, some token, co/twinax, decnet, and other things..... Mostly cisco, 4908's using HSRP down to 3508's (all fiber), from there to more 3508's and/or 2950's using mdics/gbics (can't remember which acronym goes where...) out to 10/100 switches/hubs, mostly cat 5/5e/6, some 3 here and there. VLAN'd and using spanning tree... . Routers are a smattering of 4000's, 3600's, 4500's, 25xx's, 17xx's, 3000's, etc on private t1's, vpn's, frames, ds0's, ds1's, wifi, and more.. IE: a lot of pipe.. not a lot of use.. mostly bursty traffic and dead air... so it's hard to say who a 'top dog' sender is in this, unless you put 50 sniffers on the lan at once, especially since vlan's are everywhere and blocking traffic... snooping would be nice.... but papa's checkbook isn't that big. I guess the obvious points would be to sniff the subnet where the internet access is, as well as the servers, which is already being done, but since the servers tend to drown out a client here or there and client traffic looks like routers at the core, it's harder to say than find it. Almost makes me want to run a cisco switch report. Almost. To break down the page a bit and ask some questions... At this point the physical wiring will be checked for any eavesdropping device, or anomaly. - Any suggestion on what types of anomalies to look for with the tools above or are you talking about cable dragging it in the ceiling here? near-end/far-end cross talk analysis will be performed to locate inductive or capacitor isolated devices - what would this look like on a fluke? mostly next/fext is a pretty basic yes/no, like when doing a wire map.. it either is or isn't there/is or isn't paired up right. Anything specific to look for? Should I run specific wire tests that aren't the norm or look for specific characteristics? Be sure to check all conductor combinations, and all references to ground, and structural components for signal paths. --- Most LAN's are dead runs from LAN access device to patch panel to port, not grounded... unless you're counting the grounding of the LAN access device. It's been a long long time since I've seen a distributed fault on a network. What are you referencing here? When checking UTP wiring be sure to check all four cable pairs, and check the voice cabling at the same time (easy to do when four Smart Remotes are being used), but ensure that all cabling is "dry" (has no signal on it) before performing any tests. -- I have 6 remotes, but don't know what you mean by this. Mine are just numbered 1 -6 and ring out on the display and I can test 2 out at a time on my fluke ie: 2 full cables... am I misinterpreting something here or are you talking about something different entirely? It may also be beneficial to also perform a Sweep Analysis of the cabling (with a Spectrum Analyzer and Sweep Generator) to identify any frequency response related anomalies. - Can you give me a manufacturer/model sweep generator suggestion? HP 8601A or is there one better for field work? What range and resolution should I look for? What RF ranges should I disregard as normal when doing the spectrum analysis and the oscope tests for cat5/5e/6? 100MHz.. and? Lastly, what are some things to consider given fiber is prevalant in the ethernet environment (disregarding other media types for a moment), as well as media bridges pretty much all over the place? How would physical eavesdropping devices cope with this sort of briding? Thanks, Matt 6835 From: MailExp Date: Tue Jan 28, 2003 8:42pm Subject: RE: Court rejects infrared drug search Not advocating either, BUT - how is it an intrusion when you don't know, feel or suffer the presence of an observation that you did not know was taking place from 1000' above your head? AND, since when is "the area common to or surrounding a house" consisting of the airspace above? It does not for any other right or law. It would be nicer to see someone in a courtroom apply common sense and logic, instead of wasting time making people file more papers just to do their job. Just another viewpoint from the peanut gallery... -----Original Message----- From: Mitch D [mailto:rockdriver@y...] Sent: Tuesday, January 28, 2003 8:33 PM To: tscm-l@yahoogroups.com Subject: Re: [TSCM-L] Court rejects infrared drug search Not advocating an idiot growing pot plants but;Glad someone in a courtroom still understands "Curtilage".......... __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 6836 From: Hugo Drax Date: Wed Jan 29, 2003 0:45am Subject: Re: tscming a lan If your customer has sensitive data it should sit behind a secured isolated server in a tamper-resistant cabinet include tamper evidence seals with a firewall protecting the device, IDS/logging system residing in the cabinet for alerting and only permit timed access to the server via VPN with SecureID tokens(fobs). Physical security is a must. Anyways get ready for a manual verification every cable and have fun :) all the questions you ask would require a book to answer them all in the world of Data I have seen it all and then some :) ----- Original Message ----- From: "Matt Paulsen" To: "'TSCM submissions'" Sent: Tuesday, January 28, 2003 9:06 PM Subject: [TSCM-L] tscming a lan > Hi there... > > Have read http://www.tscm.com/fluke785.html a bit. Given a fluke, sniffer, > scope and 0-2ghz spectrum analyzer, I am interested in the nuts & bolts of > determining what is 'normal' vs 'not normal' within the context of a network > being abused by 'real life' non-software based devices used to eavesdrop > using network infrastructure vs. phone infrastructure. Not interested in > software intrusions/surveillance/etc. > > Utilization runs around .5-1.5% on a bad day and broadcast/multicasts are > here and there, mostly between the HSRP routing switches at the core. > Traffic is around 40%ipx, 55%ip, 5% other... 65 subnets, 1000+ devices... > > Backbone is fiber down to ether, some token, co/twinax, decnet, and other > things..... Mostly cisco, 4908's using HSRP down to 3508's (all fiber), from > there to more 3508's and/or 2950's using mdics/gbics (can't remember which > acronym goes where...) out to 10/100 switches/hubs, mostly cat 5/5e/6, some > 3 here and there. VLAN'd and using spanning tree... . Routers are a > smattering of 4000's, 3600's, 4500's, 25xx's, 17xx's, 3000's, etc on private > t1's, vpn's, frames, ds0's, ds1's, wifi, and more.. > > IE: a lot of pipe.. not a lot of use.. mostly bursty traffic and dead air... > so it's hard to say who a 'top dog' sender is in this, unless you put 50 > sniffers on the lan at once, especially since vlan's are everywhere and > blocking traffic... snooping would be nice.... but papa's checkbook isn't > that big. I guess the obvious points would be to sniff the subnet where the > internet access is, as well as the servers, which is already being done, but > since the servers tend to drown out a client here or there and client > traffic looks like routers at the core, it's harder to say than find it. > Almost makes me want to run a cisco switch report. Almost. > > To break down the page a bit and ask some questions... > > At this point the physical wiring will be checked for any eavesdropping > device, or anomaly. - Any suggestion on what types of anomalies to look for > with the tools above or are you talking about cable dragging it in the > ceiling here? > > near-end/far-end cross talk analysis will be performed to locate inductive > or capacitor isolated devices - what would this look like on a fluke? mostly > next/fext is a pretty basic yes/no, like when doing a wire map.. it either > is or isn't there/is or isn't paired up right. Anything specific to look > for? Should I run specific wire tests that aren't the norm or look for > specific characteristics? > > Be sure to check all conductor combinations, and all references to ground, > and structural components for signal paths. --- Most LAN's are dead runs > from LAN access device to patch panel to port, not grounded... unless you're > counting the grounding of the LAN access device. It's been a long long time > since I've seen a distributed fault on a network. What are you referencing > here? > > When checking UTP wiring be sure to check all four cable pairs, and check > the voice cabling at the same time (easy to do when four Smart Remotes are > being used), but ensure that all cabling is "dry" (has no signal on it) > before performing any tests. -- I have 6 remotes, but don't know what you > mean by this. Mine are just numbered 1 -6 and ring out on the display and I > can test 2 out at a time on my fluke ie: 2 full cables... am I > misinterpreting something here or are you talking about something different > entirely? > > It may also be beneficial to also perform a Sweep Analysis of the cabling > (with a Spectrum Analyzer and Sweep Generator) to identify any frequency > response related anomalies. - Can you give me a manufacturer/model sweep > generator suggestion? HP 8601A or is there one better for field work? What > range and resolution should I look for? > > What RF ranges should I disregard as normal when doing the spectrum analysis > and the oscope tests for cat5/5e/6? 100MHz.. and? > > Lastly, what are some things to consider given fiber is prevalant in the > ethernet environment (disregarding other media types for a moment), as well > as media bridges pretty much all over the place? How would physical > eavesdropping devices cope with this sort of briding? > > > Thanks, > > Matt > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6837 From: Mitch D Date: Wed Jan 29, 2003 3:17pm Subject: RE: Court rejects infrared drug search(slightly off topic) --- MailExp wrote: > Not advocating either, BUT - how is it an intrusion when you > don't know, > feel or suffer the presence of an observation that you did not > know was > taking place from 1000' above your head? AND, since when is > "the area > common to or surrounding a house" consisting of the airspace > above? It > does not for any other right or law. It would be nicer to see > someone > in a courtroom apply common sense and logic, instead of > wasting time > making people file more papers just to do their job. > > Just another viewpoint from the peanut gallery... Seems like the bottom line in the case presented, is what one can see, or gather, from an area that is accessible to the general public(sidewalk, street), versus utilizing a device to gain view of an area of concern.(helicopter,ladder,thermal gear) ie; if one could see illegal plants from the street,sidewalk through a window, that has the blinds open,and the stuff is in plain view,identifiable with ease, theres grounds for a warrant,versus using a ladder to look through a window upstairs or in this case using FLIR gear,from anyplace air or ground may fall within the guidelines of curtilage.....which is what seems the ruling judge in the case decided.... I read a 5 page curtilage report from a LEA,(US)that was published to discuss removal of trash from a trash can from someones home. Cliff note version: If the trash was placed on the street for collection,the contents were allowed to be used as evidence in a subject case whereas if it was behind the house,in an area that does not allow the trash collectors to have access to it,it would be deemed unallowable to be used in court. With todays laws, a lot has changed in regards to this due to the types of investigation that more or less have,less "guidelines",or borders to be adhered to based on what type of wrongdoing is being checked out..... I do think the judge had a tough decision to make..... __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6838 From: R. Snyder Date: Wed Jan 29, 2003 4:02pm Subject: Parasitic illumination of passive radiators? Since the Soviets remotely illuminated the "Great Seal" resonant cavity, there seems to be a tacit presumption that passive radiators require illumination from a remote source. However, how much of a threat would local sources, such as the microwave motion detectors for burglar alarms, pose in the context of illumination of a correspondingly tuned microphonic resonant cavity? It seems that the majority of the microwave motion detectors are X-band, although I'm aware of a few Ku-band ones. Their input power appears to be typically a few hundred milliwatts, so their output power would be a fraction of that (especially if some of the power is being used by a PIR sensor in a PIR + microwave detector). Other potential microwave sources include 2.4 GHz and 5.8 GHz wireless data, cordless phones, etc., although I suspect the bursty nature of some of these sources (as well as their correspondingly larger cavities) might make them less of a threat. Any thoughts on illicit modulation of pre-existing RF as a TSCM threat? __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6839 From: gratefuldeadbolt Date: Wed Jan 29, 2003 10:51pm Subject: New member...with question.... Hi, what a great group this is... I hope to get to all of you a lot more... I am currently working as a Security/Alarm Technician right now and have done a fair amount of Locksmithing in the past... Two things I am wondering about... First, does anyone know of training/schooling/opportunities in Canada in the TSCM field? Second, Does anyone care to expand upon the THREAT ANALYSIS MODEL that one would use when talking to a client... I know that some of you have met some REALLY interesting folks (good for another post), and forwarded them to some very interesting sights like www.? the one for the foil caps to protect ones brain from microwave transmissions... Well not all of them are so easy to laugh away... Take for example a client that thinks they have been followed in a car... more than one occansion... and not by just any traffic, by someone that "seemed" to go out of their way to stay 'Line of sight' (and this was not someone they 'cut off the road while merging') so road rage can be ruled out! Are there any books, sights info that is recommended for a customer to look up to improve their evasive driving technique as to better "Make" sure they are NOT being followed... or in this occasion to "Make" sure they ARE being followed instead of just "thinking" they are being followed? Btw... Driving in circles in a parking lot is not an option for this customer. How would you handle this... P.s. the customer also thinks they are being bugged, and can't prove it...probably related to the paranoia of being followed. Now if we can only solve this 'following' enigma, the 'bugs' would be less an issue. Mabey this is better answered by a P.I. group with knowledge of 'traking and surveillance" but I thougt I'd ask here first because I am sure you have all dealt with customers that think they are being 'bugged' but only because this is justified by the feeling of being 'tracked' or 'WATCHED'! I guess I am really wondering the ethics of customer service vs the almighty "$" It would be easy for some to say "Yes, SIR, THEY are on to you now!!! we need to get going on the BUG sweep ASAP... I even need to borrow your satellite reciever for "TESTING" Ok... That will be $900/hr for the sweep..." and their are some that will send this customer to the FOIL CAP web sight before listening to thier story. I need to know the best way to serve this customer, and is there common ground? Thanks in advance... -ALWAYS GRATEFUL- Dave 6840 From: Kirk Adirim Date: Thu Jan 30, 2003 0:11am Subject: RE: Parasitic illumination of passive radiators? It takes a LOT of energy (watts) to illuminate a passive radiator so that it will reflect a decent signal. The energies generated from unfocused part 15 type devices are not great enough to re-radiate a passive reflector any useable distance. However, if you were to use focused energy say from a radar gun, you could use this on a resonant cavity. Some of the other techniques used today are beaming a signal onto tuned schottky diodes, then using the detected energy to power a microwatt audio transmitter. This is the same technology used on some of the RFID tags on toll roads. As I understand it, the Great Seal was operated at 300 mhz not microwave. If you really want to take passive radiators to the extreme, imagine using the naturally occurring RF pulses that bombard our planet from the cosmos, and using that energy as a passive stealth RADAR system to track foreign aircraft and ships etc. Sort of like radio astronomy..... Kirk www.tactronix.com -----Original Message----- From: R. Snyder [mailto:rds_6@y...] Sent: Wednesday, January 29, 2003 2:03 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Parasitic illumination of passive radiators? Since the Soviets remotely illuminated the "Great Seal" resonant cavity, there seems to be a tacit presumption that passive radiators require illumination from a remote source. However, how much of a threat would local sources, such as the microwave motion detectors for burglar alarms, pose in the context of illumination of a correspondingly tuned microphonic resonant cavity? It seems that the majority of the microwave motion detectors are X-band, although I'm aware of a few Ku-band ones. Their input power appears to be typically a few hundred milliwatts, so their output power would be a fraction of that (especially if some of the power is being used by a PIR sensor in a PIR + microwave detector). Other potential microwave sources include 2.4 GHz and 5.8 GHz wireless data, cordless phones, etc., although I suspect the bursty nature of some of these sources (as well as their correspondingly larger cavities) might make them less of a threat. Any thoughts on illicit modulation of pre-existing RF as a TSCM threat? __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6841 From: Matt Paulsen Date: Wed Jan 29, 2003 11:47pm Subject: RE: tscming a lan Hi Roger, Thanks for the information. Most of what you're discussing looks wan based voice/data - t1's, ds0's, opx's, etc. If we're still back to using a TDR (dry not wet, correct?), why should I bother with the other equipment I have? Does it provide any value to TSCM a lan in the context as I've laid it out? If you're saying that we have to break the lan to test, that's not very easy to do in a life systems level network where if you break the lan you endanger lives and set off physical security systems and impact engineering systems - chillers, electrical, etc. Or do I place that under this is a ISO issue, talk to the CEO if you've got an issue with it. Second, I'm still trying to understand how a TDR fits into the larger context of a fiber rich network with single & multimode cable all over the place. Third, I'm looking for surreptitious testing before breaking the lan. RE: CSU/DSU's, I've done from network loop back, 0x's, 1's, etc., as well as from the CO down to the CSU. Mostly I get 'it's all ok' from my testing. I tend to find that the telco's are braindead for the most part unless you get a senior engineer involved that realizes that there's this thing called a switch, and it runs on this other thing called software at their end. -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Wednesday, January 29, 2003 6:44 AM To: TSCM Subject: [TSCM-L] tscming a lan Matt, I have been doing a lot of research in this area in the last year. I have several T-spans set up in my lab and I have purchased every major CSU/DSU and so far eight bit error rate detectors and framing generators. Your most accurate way to secure wire is still the use of TDR which means your resolution will be so much better if you shut down the data flow during the test. You will still have the problem of repeaters and routers every mile or so. Remote loop back testing is the way to go to identify those units and their location on the span. The biggest threat may be monitoring ports on those devices. Roger Tolces Electronic Security www.bugsweeps.com Date: Tue, 28 Jan 2003 18:06:08 -0800 From: "Matt Paulsen" Subject: tscming a lan Hi there... Have read http://www.tscm.com/fluke785.html a bit. Given a fluke, sniffer, scope and 0-2ghz spectrum analyzer, I am interested in the nuts & bolts of determining what is 'normal' vs 'not normal' within the context of a network being abused by 'real life' non-software based devices used to eavesdrop using network infrastructure vs. phone infrastructure. Not interested in software intrusions/surveillance/etc. Utilization runs around .5-1.5% on a bad day and broadcast/multicasts are here and there, mostly between the HSRP routing switches at the core. Traffic is around 40%ipx, 55%ip, 5% other... 65 subnets, 1000+ devices... Backbone is fiber down to ether, some token, co/twinax, decnet, and other things..... Mostly cisco, 4908's using HSRP down to 3508's (all fiber), from there to more 3508's and/or 2950's using mdics/gbics (can't remember which acronym goes where...) out to 10/100 switches/hubs, mostly cat 5/5e/6, some 3 here and there. VLAN'd and using spanning tree... . Routers are a smattering of 4000's, 3600's, 4500's, 25xx's, 17xx's, 3000's, etc on private t1's, vpn's, frames, ds0's, ds1's, wifi, and more.. IE: a lot of pipe.. not a lot of use.. mostly bursty traffic and dead air... so it's hard to say who a 'top dog' sender is in this, unless you put 50 sniffers on the lan at once, especially since vlan's are everywhere and blocking traffic... snooping would be nice.... but papa's checkbook isn't that big. I guess the obvious points would be to sniff the subnet where the internet access is, as well as the servers, which is already being done, but since the servers tend to drown out a client here or there and client traffic looks like routers at the core, it's harder to say than find it. Almost makes me want to run a cisco switch report. Almost. To break down the page a bit and ask some questions... At this point the physical wiring will be checked for any eavesdropping device, or anomaly. - Any suggestion on what types of anomalies to look for with the tools above or are you talking about cable dragging it in the ceiling here? near-end/far-end cross talk analysis will be performed to locate inductive or capacitor isolated devices - what would this look like on a fluke? mostly next/fext is a pretty basic yes/no, like when doing a wire map.. it either is or isn't there/is or isn't paired up right. Anything specific to look for? Should I run specific wire tests that aren't the norm or look for specific characteristics? Be sure to check all conductor combinations, and all references to ground, and structural components for signal paths. --- Most LAN's are dead runs from LAN access device to patch panel to port, not grounded... unless you're counting the grounding of the LAN access device. It's been a long long time since I've seen a distributed fault on a network. What are you referencing here? When checking UTP wiring be sure to check all four cable pairs, and check the voice cabling at the same time (easy to do when four Smart Remotes are being used), but ensure that all cabling is "dry" (has no signal on it) before performing any tests. -- I have 6 remotes, but don't know what you mean by this. Mine are just numbered 1 -6 and ring out on the display and I can test 2 out at a time on my fluke ie: 2 full cables... am I misinterpreting something here or are you talking about something different entirely? It may also be beneficial to also perform a Sweep Analysis of the cabling (with a Spectrum Analyzer and Sweep Generator) to identify any frequency response related anomalies. - Can you give me a manufacturer/model sweep generator suggestion? HP 8601A or is there one better for field work? What range and resolution should I look for? What RF ranges should I disregard as normal when doing the spectrum analysis and the oscope tests for cat5/5e/6? 100MHz.. and? Lastly, what are some things to consider given fiber is prevalant in the ethernet environment (disregarding other media types for a moment), as well as media bridges pretty much all over the place? How would physical eavesdropping devices cope with this sort of briding? Thanks, Matt ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6842 From: Matt Paulsen Date: Wed Jan 29, 2003 11:50pm Subject: RE: tscming a lan Hi Hugo, Thanks for the input. Most of what you've laid out is already done. If the questions I've asked require a book to answer, I'll buy it. Any suggestions? Thanks, Matt -----Original Message----- From: Hugo Drax [mailto:hugodrax@d...] Sent: Tuesday, January 28, 2003 10:46 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] tscming a lan If your customer has sensitive data it should sit behind a secured isolated server in a tamper-resistant cabinet include tamper evidence seals with a firewall protecting the device, IDS/logging system residing in the cabinet for alerting and only permit timed access to the server via VPN with SecureID tokens(fobs). Physical security is a must. Anyways get ready for a manual verification every cable and have fun :) all the questions you ask would require a book to answer them all in the world of Data I have seen it all and then some :) ----- Original Message ----- From: "Matt Paulsen" To: "'TSCM submissions'" Sent: Tuesday, January 28, 2003 9:06 PM Subject: [TSCM-L] tscming a lan > Hi there... > > Have read http://www.tscm.com/fluke785.html a bit. Given a fluke, sniffer, > scope and 0-2ghz spectrum analyzer, I am interested in the nuts & bolts of > determining what is 'normal' vs 'not normal' within the context of a network > being abused by 'real life' non-software based devices used to eavesdrop > using network infrastructure vs. phone infrastructure. Not interested in > software intrusions/surveillance/etc. > > Utilization runs around .5-1.5% on a bad day and broadcast/multicasts are > here and there, mostly between the HSRP routing switches at the core. > Traffic is around 40%ipx, 55%ip, 5% other... 65 subnets, 1000+ devices... > > Backbone is fiber down to ether, some token, co/twinax, decnet, and other > things..... Mostly cisco, 4908's using HSRP down to 3508's (all fiber), from > there to more 3508's and/or 2950's using mdics/gbics (can't remember which > acronym goes where...) out to 10/100 switches/hubs, mostly cat 5/5e/6, some > 3 here and there. VLAN'd and using spanning tree... . Routers are a > smattering of 4000's, 3600's, 4500's, 25xx's, 17xx's, 3000's, etc on private > t1's, vpn's, frames, ds0's, ds1's, wifi, and more.. > > IE: a lot of pipe.. not a lot of use.. mostly bursty traffic and dead air... > so it's hard to say who a 'top dog' sender is in this, unless you put 50 > sniffers on the lan at once, especially since vlan's are everywhere and > blocking traffic... snooping would be nice.... but papa's checkbook isn't > that big. I guess the obvious points would be to sniff the subnet where the > internet access is, as well as the servers, which is already being done, but > since the servers tend to drown out a client here or there and client > traffic looks like routers at the core, it's harder to say than find it. > Almost makes me want to run a cisco switch report. Almost. > > To break down the page a bit and ask some questions... > > At this point the physical wiring will be checked for any eavesdropping > device, or anomaly. - Any suggestion on what types of anomalies to look for > with the tools above or are you talking about cable dragging it in the > ceiling here? > > near-end/far-end cross talk analysis will be performed to locate inductive > or capacitor isolated devices - what would this look like on a fluke? mostly > next/fext is a pretty basic yes/no, like when doing a wire map.. it either > is or isn't there/is or isn't paired up right. Anything specific to look > for? Should I run specific wire tests that aren't the norm or look for > specific characteristics? > > Be sure to check all conductor combinations, and all references to ground, > and structural components for signal paths. --- Most LAN's are dead runs > from LAN access device to patch panel to port, not grounded... unless you're > counting the grounding of the LAN access device. It's been a long long time > since I've seen a distributed fault on a network. What are you referencing > here? > > When checking UTP wiring be sure to check all four cable pairs, and check > the voice cabling at the same time (easy to do when four Smart Remotes are > being used), but ensure that all cabling is "dry" (has no signal on it) > before performing any tests. -- I have 6 remotes, but don't know what you > mean by this. Mine are just numbered 1 -6 and ring out on the display and I > can test 2 out at a time on my fluke ie: 2 full cables... am I > misinterpreting something here or are you talking about something different > entirely? > > It may also be beneficial to also perform a Sweep Analysis of the cabling > (with a Spectrum Analyzer and Sweep Generator) to identify any frequency > response related anomalies. - Can you give me a manufacturer/model sweep > generator suggestion? HP 8601A or is there one better for field work? What > range and resolution should I look for? > > What RF ranges should I disregard as normal when doing the spectrum analysis > and the oscope tests for cat5/5e/6? 100MHz.. and? > > Lastly, what are some things to consider given fiber is prevalant in the > ethernet environment (disregarding other media types for a moment), as well > as media bridges pretty much all over the place? How would physical > eavesdropping devices cope with this sort of briding? > > > Thanks, > > Matt > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS From: mpaulsen6 Date: Sun Jan 23, 2005 3:45pm Subject: Re: Suspects copy 'Wire' It's correct as far as CNN is concerned. As you said, it's old news. It's more amazing to me that people are purchasing contracts still and not purchasing throwaways and encrypting their conversations using PGP with a laptop and coupler. They should just purchase a vendor visa at a Fred Meyer, get a throwaway, use it for a few hours, get another and move on to a new one. All cash transactions, no names, just numbers and no localization issues, just streamed garbage. A simple PGP keyset hand exchanged and life is grand. Have another pizza... As it is.. criminals get caught because their stupid. Thanks for PGPfone Phil, we miss it. :) --- In TSCM-L@yahoogroups.com, "A Grudko" wrote: > > -----Original Message----- > From: mpaulsen6 [mailto:mpaulsen6@a...] > > > While announcing a crackdown on Friday of a cocaine ring, police > said their investigation was hampered by the suspects' habit of > switching cell phones -- a technique for evading electronic > eavesdropping they picked up from TV. > "Believe it or not, these guys copied 'The Wire,' " one of the (NY) > investigators, Sgt. Felipe Rodriguez, said... > > If this is correct I guess our criminals are wayyyy ahead of New York's > crooks and cops. I had clients nearly a decade ago, who I strongly suspected > of being organised crime figures but they were charged but never convicted, > who swoped SIM cards and phones daily - to the extent that they set up a > cellphone trade-in business at the back of a garage in Pretoria mainly to > get hold of other peoples' phones to avoid 'spoopers'. > > Andy G > South Africa > > > [Non-text portions of this message have been removed] 10738 From: mpaulsen6 Date: Sun Jan 23, 2005 3:47pm Subject: Re: to moderator James can call my office desk if he likes, he has the number. --- In TSCM-L@yahoogroups.com, littledog wrote: > > hello, this guy at mpaulsen6@a... who has been insulting every single member is doing it from a fake address. Thought you might want to check on this. littledog...enjoy the list. 10739 From: mpaulsen6 Date: Sun Jan 23, 2005 3:59pm Subject: Re: TSCM list I checked the page you mentioned. Here's some feedback that you should consider. 1: I'd rather not have a username / password on a system that is overseas and owned by a corporation I know nothing about. 2: Yahoo has a good system, and I don't really see any reason why anyone would join a 'private' list server such as you're offering. 3: Anyone that knows anything about this list knows that JMA and others have a private by invite only list that they use to discuss items of that nature and they don't use anyone elses already, so you've recreated the wheel. Good luck with your list, I do hope it does well, I just have a feeling it won't just as others haven't for the same reasons. I know it takes a lot of initiate and effort to get a list going and maintained so best to you. But don't try to use your list promotion efforts as a diatribe against me as you know nothing about me. --- In TSCM-L@yahoogroups.com, "Tech Sec Lab" wrote: > It's a shame this list has gone the way it has... > > If anyone is interested in being part of an active professionals only list > that stays focused on the topic rather than what has become a free for all, > please feel free to sign up, > > http://ocean-research.net/mailman/listinfo/c4i-l_ocean-research.net > > Regards > > -Ois > > > *********************** > > > > > Date: Sun, 23 Jan 2005 09:44:23 +0200 > From: "Steve Whitehead" > Subject: Re: Re: McDonald's in Boca to offer glimpse into world of espionage > > Dear Mr Paulsen > > Do you have to comment on everything. Who cares what you think!!!!!!!!!!! > > This List has become very boring and a big waste of time. > > When I joined a few years ago the members really contributed value. > > I do not have time for this rubbish anymore. > > This List no longer makes any contribution to TSCM. > > I will unsubscribe myself. > > Bye! > > Steve Whitehead 10740 From: James M. Atkinson Date: Sun Jan 23, 2005 6:20pm Subject: Gentle Reminder I would like to remind list members to be polite, considerate, and respectful to other list members. We have well over 1200 subscribers, so everybody needs to make an effort to be nice or I will have to step in and remove problems in a rather unpleasant manner. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10741 From: mpaulsen6 Date: Sun Jan 23, 2005 9:04pm Subject: want to purchase. quotes please Purchasing in mar/apr timeline, need quotes in by end of feb. Please contact me offline with final quotes, 1 time only bid attempts please, so bid your best. Terms are net 30, gov/ed pricing - buying for a 501c(3). 1: fluke otdr for fiber scope 850 1300nm, single and multimode 62.5/125 primarily 2: fluke 635 quickbert-t1 tester 3: fluke dtx-1800 4: fluke fiberinspector pro video microscope 5: gold support on items listed above 5a: renewal on gold for an existing fluke onetouch series II 6: wildpackets omni3 v2 with 2x quad copper gac's (8 total for 4x full duplex), omnipeek and peek dnx engine - 3 consoles needed - 2 desktops, 1 laptop to be used. 7: 1x hp ml350 g4 rackmount kitted w/512mb ram upgrade to 1gb total and 2x10k rpm hot swap 72gb hdd's Thanks, Matt 10742 From: Andre Holmes <1ach@g...> Date: Sun Jan 23, 2005 9:18pm Subject: Foreign Tech. While surfing after brushing up on my reading material I ran across this site thought some of you might find this benificial. Andre Holmes Neptune Enterprise Security http://www.nes-ets-usa.com 1ach@G... The message is ready to be sent with the following file or link attachments: Shortcut to: http://www.alarm.de/security/pd-231463241.htm?categoryId=1 Note: To protect against computer viruses, e-mail programs may prevent sending or receiving certain types of file attachments. Check your e-mail security settings to determine how attachments are handled. [Non-text portions of this message have been removed] 10743 From: mpaulsen6 Date: Sun Jan 23, 2005 9:30pm Subject: a good spectrum analyzer between 2 and 6ghz Any suggestions? I have one already that does 1hz step to 2ghz, but I need to go up to 6. 10744 From: Agent Geiger Date: Sun Jan 23, 2005 10:54pm Subject: Wraase WSD-690RX Does anyone know anything about a Wraase WSD-690RX weather satellite receiver, or at least where I could find some info on it? I know it's a German company, but their website has little infomation. Thanks, AG __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10745 From: Blake Bowers Date: Sun Jan 23, 2005 6:31pm Subject: Re: Gentle Reminder By being a dicator and deleting people with more knowledge and experience than you from the list? ----- Original Message ----- From: "James M. Atkinson" To: "TSCM-L" Sent: Sunday, January 23, 2005 6:20 PM Subject: [TSCM-L] Gentle Reminder > > > I would like to remind list members to be polite, considerate, and > respectful to other list members. We have well over 1200 subscribers, so > everybody needs to make an effort to be nice or I will have to step in and > remove problems in a rather unpleasant manner. > > -jma > > > > ---------------------------------------------------------------------------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: > http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > 10746 From: A Grudko Date: Mon Jan 24, 2005 2:27am Subject: c4i TSCM list -----Original Message----- From: Tech Sec Lab [mailto:tscmteam@o...] > If anyone is interested in being part of an active professionals only list that stays focused on the topic rather than what has become a free for all, please feel free to sign up, http://ocean-research.net/mailman/listinfo/c4i-l_ocean-research.net Yesterday I was involuntarily subscribed to this new TSCM list, presumably by the owner as I had not applied to sign up. A poor start for a group that claims to be for 'professionals only' as this is highly unprofessional spamming. So I immediately asked the owner to unsubscribe me - I'm not spending my time and money to unsubscribe myself. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 [Non-text portions of this message have been removed] 10747 From: contranl Date: Mon Jan 24, 2005 6:54am Subject: Re: c4i TSCM list . I don't agree to much in having 1000 groups on the same subject that will divert and spread all knowledge. Also it is not good ethics to ask members in one group to come to another group because you feel the current group is no good Maybe you are right but you can't do that...how would you feel if someone came to your group saying "leave this group and come to mine" you can't do that it's not correct behaviour...if you want members to join your group you gonna have to do that in a different way. ofcourse that involves some work and effort...but that's the way it is. I agree that political issues should not be discussed to much here allthough bugging occurs many times for political reasons.so it is somewhhat related,also the owner of this group is obviously interested in politics ...there is not much you can do about that..i guess we have to live with that. So OK if you complain but don't "steal" members...be creative and do it in a different way. Greetings Tetrascanner 10748 From: A Grudko Date: Mon Jan 24, 2005 7:49am Subject: An apology I owe Oisin of Tech Sec Labs a public apology over my comments this morning re the c4i list. Contrary to what I wrote this morning I did subscribe to the c4i group on the 16th of this month. The reasons for my mistake are 3-fold; 1) When I replied to Oisin's offer to join it was to Tech Sec Lab so I was not aware that the new group was going to be called c4i 2) Unfortunately Osin's offer to TSCM members to join c4i group after all the off topic noise came on the 23rd and on the 24th I was informed that I had joined c41. I incorrectly linked these 2 events and did not link my acceptance of the 24th to c4i to my application on the 16th to the new Tech Sec Labs group 3) Like mpaulsen6, I (erroneously) though that the c4i membership invitation was an opportunistic one due to the 'noise' on TSCM-list. I apologise to Oisin, Tech Sec Lab and the c4i group for my error. My harsh reaction resulted from having been previously 'subscribed' to groups I had not applied to join by unscrupulous list owners and having to waste much time in unsubscribing. This was obviously NOT the case here. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 10749 From: Tech Sec Lab Date: Mon Jan 24, 2005 8:08am Subject: RE: An apology To whom it may concern: I am concerned by a couple of emails I received, in summary, accusing that the list had been established by Ocean Group as a front to derive technical security intelligence to use against US assets, in the form of espionage. I am dismayed. The list was not created by the company, it was solely my idea and it simply resides on the company server with their kind permission. It is not here to derive espionage against US assets! Ireland's biggest corporate investor is US companies, who we work very closely with, and many as clients. Secondly, we co operate and work very closely with many US security organisations on a repeated basis because of this fact. Any assertion to the contrary is sheer nonsense. Thank you for your time. > -----Original Message----- > From: A Grudko [mailto:agrudko@i...] > Sent: 24 January 2005 13:49 > To: Tech Sec Lab > Cc: TSCM-L@yahoogroups.com > Subject: An apology > > I owe Oisin of Tech Sec Labs a public apology over my > comments this morning re the c4i list. > > Contrary to what I wrote this morning I did subscribe to the > c4i group on the 16th of this month. > > The reasons for my mistake are 3-fold; > > 1) When I replied to Oisin's offer to join it was to Tech Sec > Lab so I was not aware that the new group was going to be called c4i > > 2) Unfortunately Osin's offer to TSCM members to join c4i > group after all the off topic noise came on the 23rd and on > the 24th I was informed that I had joined c41. I incorrectly > linked these 2 events and did not link my acceptance of the > 24th to c4i to my application on the 16th to the new Tech Sec > Labs group > > 3) Like mpaulsen6, I (erroneously) though that the c4i > membership invitation was an opportunistic one due to the > 'noise' on TSCM-list. > > I apologise to Oisin, Tech Sec Lab and the c4i group for my > error. My harsh reaction resulted from having been previously > 'subscribed' to groups I had not applied to join by > unscrupulous list owners and having to waste much time in > unsubscribing. This was obviously NOT the case here. > > Andy Grudko (British), DPM, Grad IS (South Africa) > MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 > www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 > 0255 - 244 0256 (Fax) Branches: > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) > 82 778 6355 - ICQ 146498943 > SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. > "When you need it done right - first time" > > > --- > Outgoing mail is certified Virus Free. > Checked by AVG anti-virus system (http://www.grisoft.com). > Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 > > > > 10750 From: James M. Atkinson Date: Mon Jan 24, 2005 11:20am Subject: Re: a good spectrum analyzer between 2 and 6ghz You might want to consider the R&S hand-held units. The units are easy to use, very inexpensive, but you will need to use an external pre-amplifier. -jma At 10:30 PM 1/23/2005, mpaulsen6 wrote: >Any suggestions? > >I have one already that does 1hz step to 2ghz, but I need to go up to >6. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10752 From: Robert Motzer <1RCM@M...> Date: Mon Jan 24, 2005 2:12pm Subject: Re: Gentle Reminder Any idea who he's talking about????? >From: "James M. Atkinson" >Reply-To: TSCM-L@yahoogroups.com >To: TSCM-L@yahoogroups.com >Subject: Re: [TSCM-L] Gentle Reminder >Date: Mon, 24 Jan 2005 12:44:51 -0500 > [Non-text portions of this message have been removed] 10753 From: L. F. Elia Date: Mon Jan 24, 2005 2:18pm Subject: Re: FBI abandons Carnivore wiretap software Carnivore was a commercial product, a sniffer with plugins. I forget the name. --- Ramon wrote: ===== Solaris/LINUX/Windows administration Internet consulting & Web site design ------------------------------------- lfelia@y..., Virginia Beach VA, 23462 __________________________________ Do you Yahoo!? The all-new My Yahoo! - What will yours do? http://my.yahoo.com 10754 From: savanted1 Date: Mon Jan 24, 2005 2:45pm Subject: Editorial: Anatomy of a bank fraud WHEN DATES DON'T MATCH Anatomy of a bank fraud WHEN DATES DON'T MATCH By James E. Muir, CFE, CPA FRAUD Magazine Vol. 19, No. 1 January/February 2005 Editorial: Introduction This article by Mr. Muir expounds on an actual audit of a mortagage company and exposes an act of fraud. The fraud occurs from a transaction that is used in banking in particular a demand deposit account (DDA). The act of fraud is found by tracing a financial institutions transactions with the actual borrower and loan officer. The tracing process actually points out that the banking institution had poor internal controls meaning the debit transactions were not properly documented showing the financial transactions that were needed by the actual auditors. This already tedious process was prolonged by the poor documentation process that was discovered by the auditors. The discrepancy noted was that the bank would post the checks to the debit side of its ledgers and would post the credit portion of the check at a later date. This would be sometimes be days or weeks before these transactions would be posted to the actual credit side of the ledgers. The tracing process which was the most intricately time consuming part of the audit revealed to the auditors that the deposits were used improperly and used against other borrowers loans. These transactions were subsequently hidden by the loan officer to hide the fraudulent activity. In summary, this example of poor internal controls demonstrate the actual need for a periodic audit. This particular type of fraud may have not been noticed for quite sometime if it had not been for the bank's audit. This article I found very interesting and informative due to its ability to demonstrate some of the roles that may be encountered by a fraud examiner in particukar a Certified Fraud Examiner (CFE). Mr. Muir does a great job of illustration to the reader by explaining the process of the investiagtion by the auditor. He also does an excellent job of explaining the resolution to this form of weakness in an internal control. I enjoyed this article because of its brief but clear and concise methodology that explained some things that a fraud examiner may look for while investigating a financial institution. I will say this the author could have briefly covered the Graham-Leach Bliley Act of 2002 a tad bit and incorporated it the article. Overall I will give Mr. Muir a grade of "A" due to the fact that he informed the populace how and where to look for some weak inernal controls. Very Respectfully Mr. Garrett Hord 10755 From: wiggyyy2000 Date: Mon Jan 24, 2005 8:26pm Subject: Re: Gentle Reminder i have a pretty good idea... --- In TSCM-L@yahoogroups.com, "Robert Motzer" <1RCM@M...> wrote: > Any idea who he's talking about????? > > > > >From: "James M. Atkinson" > >Reply-To: TSCM-L@yahoogroups.com > >To: TSCM-L@yahoogroups.com > >Subject: Re: [TSCM-L] Gentle Reminder > >Date: Mon, 24 Jan 2005 12:44:51 -0500 > > > > > > [Non-text portions of this message have been removed] 10756 From: J. Coote Date: Mon Jan 24, 2005 10:59pm Subject: WTD: Tek 492 Cover I'm looking for sources for a cover for a Tek 492 spectrum analyzer. Jay 10757 From: Date: Tue Jan 25, 2005 0:32am Subject: Reminder - Counterintelligence Awareness Briefing We would like to remind you of this upcoming event. Counterintelligence Awareness Briefing Date: Friday, January 28, 2005 Time: 8:30AM - 12:30PM EET (GMT+02:00) TSCM Services is hosting a corporate counterinteligence awareness briefing for decision-makers and security professionals at the Centurion Lake Hotel, Pretoria, South Africa. To register or for additional information, please visit the 'Events' page on www.tscm.co.za 10758 From: savanted1© Date: Tue Jan 25, 2005 9:19am Subject: TSCM News Teen Monitoring Goes High-Tech According to Sean Dodds, owner of Spy Depot in Toronto, "High-tech surveillance is the next best thing to being there" if parents are looking for a way to monitor their teenagers. Several new small mini cams that can be hidden throughout the house, software programs that monitor everything a teenager does on the computer, as well as a Global Position Satellite (GPS) Vehicle Logger that stores vehicle tracks and can be downloaded to a PC, are now available to parents. However, Dodds, who has his own teenagers, notes that while surveillance equipment is an excellent way to find out what is going on, the bottom line is that parents need to talk to their children about what they discovered and do everything possible to keep the lines of communication open. http://www.thestar.com/NASApp/cs/ContentServer?pagename=thestar/Layout/Article_Type1&c=Article&cid=1106047095257&call_pageid=970599119419 ========================================================================== Virginia Traffic Photo Bills Pass Senate Despite "Big Brother" Arguments Virginia State Senator Kenneth Cuccinelli (R-Fairfax County) led the opposition against three bills expanding or extending use of cameras to capture license plates of drivers running red lights. Cuccinelli argued, "A simple engineering change at the intersections [longer yellow lights] solves the problem without issuing citations, without any of the Big Brother arguments." However, all three bills won final passage in the Virginia Senate. http://www.wavy.com/Global/story.asp?S=2833695&nav=23iiVP3G ====================================================================== Parliamentarians Can Talk Freely Without Fear of Wiretapping A proposal introduced to the Knesset by Uri Yehuda Ariel (National Union), which would give parliamentarians immunity from wiretapping unless the Supreme Court justice granted permission, was approved by a majority vote of 15-0. http://www.haaretz.com/hasen/spages/528963.html Related Article: Wiretapping Immunity Bill Advances http://www.jpost.com/servlet/Satellite?pagename=JPost/JPArticle/ShowFull&cid=1106018362157 Savanted1Æ Mr. Garrett Hord __|__ -@--@--(_)--@--X-- savanted1@y... savanted1@h... savanted1@n... Group home page: http://groups.yahoo.com/group/TICSAStudy Group email address: TICSAStudy@yahoogroups.com Innovations At The Speed Of A ThoughtÆ You Cannot Do Today's Work With Yesterday's SkillsÆ It Is Wise To Educate A Child Than To Raise An AdultÆ ================================================== This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. --------------------------------- Do you Yahoo!? Yahoo! Search presents - Jib Jab's 'Second Term' [Non-text portions of this message have been removed] 10759 From: Gerald Date: Tue Jan 25, 2005 10:37am Subject: RFID I have noted the reduced number of kidnappings in Iraq. Could RFID beused to trace victims if imbedded in their skin, or wouldn't it have the range? GW 10760 From: dj Date: Tue Jan 25, 2005 10:10am Subject: Looking for a used ICOM PCR1000 Anyone want to sell a ICOM PCR1000 or equiv. set with all freq open? Also looking for a parabolic reflector.. not mic... just the reflector (20-24 inches) acrylic or fiber v/r, IT2 --------------------------------- Do you Yahoo!? Yahoo! Search presents - Jib Jab's 'Second Term' [Non-text portions of this message have been removed] 10761 From: Hawkspirit Date: Tue Jan 25, 2005 0:01pm Subject: Sweep needed Residential sweep needed in Cartersville, GA. Roger Tolces 760-329-4404 -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.3 - Release Date: 1/24/2005 [Non-text portions of this message have been removed] 10762 From: Hawkspirit Date: Tue Jan 25, 2005 0:07pm Subject: Sweep needed Residential sweep needed in WHEELING,WV. Roger Tolces Electronic Security Co. HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com 760-329-4404 -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.3 - Release Date: 1/24/2005 [Non-text portions of this message have been removed] 10763 From: James M. Atkinson Date: Tue Jan 25, 2005 0:50pm Subject: Police probe Nicole Kidman 'bug' http://www.cnn.com/2005/WORLD/asiapcf/01/25/aus.kidman.reut/index.html Police probe Nicole Kidman 'bug' SYDNEY, Australia (Reuters) -- Police were investigating a possible bugging attempt on Australian actress Nicole Kidman after a listening device was found across the road from her Sydney harborside home. "At the time this device was found there were media paparazzi, if I may use that term, in the street," police inspector Grant Taylor told reporters Tuesday. Police had notified the Oscar-winning Hollywood star of the discovery of the device, Taylor said. "She is undoubtedly concerned in regards to why this device may have been placed there and if she is the potential target of this device," he said. The Daily Telegraph newspaper reported that security footage shot from Kidman's home showed a man planting the listening device on Sunday, shortly after she returned home to prepare for a new film, "Eucalyptus," based on an Australian novel of that name. "We have conclusive evidence that it was planted and this has been captured on video," Noel McMaster, director of Kidman's personal security agency, told the newspaper. "There is no doubt that any information that we were transmitting would have been heard," he said. Police said the listening device was commonly available in electronics stores and was being examined by police. It was not the first time Kidman has been at the center of a bugging scandal. In 1999, a freelance journalist was convicted in the United States of illegally taping an intercepted telephone call from Kidman to her then husband, actor Tom Cruise, and selling the tape to a tabloid newspaper. The tabloid newspaper said a woman's voice on the tape could be heard telling a man that their marriage was "hanging by a thread." The couple's 10-year marriage ended in 2001. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10764 From: James Greenwold Date: Tue Jan 25, 2005 4:47pm Subject: Re: Police probe Nicole Kidman 'bug' Imagine probing Nicole Kidman > From: "James M. Atkinson" > Reply-To: TSCM-L@yahoogroups.com > Date: Tue, 25 Jan 2005 13:50:32 -0500 > To: TSCM-L > Subject: [TSCM-L] Police probe Nicole Kidman 'bug' > > > > http://www.cnn.com/2005/WORLD/asiapcf/01/25/aus.kidman.reut/index.html > > Police probe Nicole Kidman 'bug' > > SYDNEY, Australia (Reuters) -- Police were investigating a possible bugging > attempt on Australian actress Nicole Kidman after a listening device was > found across the road from her Sydney harborside home. > > "At the time this device was found there were media paparazzi, if I may use > that term, in the street," police inspector Grant Taylor told reporters > Tuesday. > > Police had notified the Oscar-winning Hollywood star of the discovery of > the device, Taylor said. > > "She is undoubtedly concerned in regards to why this device may have been > placed there and if she is the potential target of this device," he said. > > The Daily Telegraph newspaper reported that security footage shot from > Kidman's home showed a man planting the listening device on Sunday, shortly > after she returned home to prepare for a new film, "Eucalyptus," based on > an Australian novel of that name. > > "We have conclusive evidence that it was planted and this has been captured > on video," Noel McMaster, director of Kidman's personal security agency, > told the newspaper. > > "There is no doubt that any information that we were transmitting would > have been heard," he said. > > Police said the listening device was commonly available in electronics > stores and was being examined by police. > > It was not the first time Kidman has been at the center of a bugging scandal. > > In 1999, a freelance journalist was convicted in the United States of > illegally taping an intercepted telephone call from Kidman to her then > husband, actor Tom Cruise, and selling the tape to a tabloid newspaper. > > The tabloid newspaper said a woman's voice on the tape could be heard > telling a man that their marriage was "hanging by a thread." The couple's > 10-year marriage ended in 2001. > > > > > > > > ------------------------------------------------------------------------------ > ---------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ------------------------------------------------------------------------------ > ---------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ------------------------------------------------------------------------------ > ---------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ------------------------------------------------------------------------------ > ---------------------- > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10765 From: James M. Atkinson Date: Tue Jan 25, 2005 5:00pm Subject: Signs of the Times Signs of the Times Actual signs seen in England: Sign in a Launderette: AUTOMATIC WASHING MACHINES: PLEASE REMOVE ALL YOUR CLOTHES WHEN THE LIGHT GOES OUT. Sign in a London department store: BARGAIN BASEMENT UPSTAIRS. In an office: WOULD THE PERSON WHO TOOK THE STEP LADDER YESTERDAY PLEASE BRING IT BACK OR FURTHER STEPS WILL BE TAKEN. Outside a farm: HORSE MANURE 50p PER PRE-PACKED BAG 20p DO-IT-YOURSELF. In an office: AFTER TEA BREAK STAFF SHOULD EMPTY THE TEAPOT AND STAND UPSIDE DOWN ON THE DRAINING BOARD. On a church door: THIS IS THE GATE OF HEAVEN. ENTER YE ALL BY THIS DOOR. (THIS DOOR IS KEPT LOCKED BECAUSE OF THE DRAUGHT. PLEASE USE SIDE DOOR.) Outside a secondhand shop: WE EXCHANGE ANYTHING - BICYCLES, WASHING MACHINES ETC. WHY NOT BRING YOUR WIFE ALONG AND GET A WONDERFUL BARGAIN. Sign outside a new town hall which was to be opened by the Prince of Wales: THE TOWN HALL IS CLOSED UNTIL OPENING. IT WILL REMAIN CLOSED AFTER BEING OPENED. OPEN TOMORROW. Outside a photographer's studio: OUT TO LUNCH: IF NOT BACK BY FIVE, OUT FOR DINNER ALSO. Seen at the side of a Sussex road: SLOW CATTLE CROSSING. NO OVERTAKING FOR THE NEXT 100 YRS. Outside a disco: SMARTS IS THE MOST EXCLUSIVE DISCO IN TOWN. EVERYONE WELCOME. Sign warning of quicksand: QUICKSAND. ANY PERSON PASSING THIS POINT WILL BE DROWNED. BY ORDER OF THE DISTRICT COUNCIL. Notice sent to residents of a Wiltshire parish: DUE TO INCREASING PROBLEMS WITH LETTER LOUTS AND VANDALS WE MUST ASK ANYONE WITH RELATIVES BURIED IN THE GRAVEYARD TO DO THEIR BEST TO KEEP THEM IN ORDER. Notice in a dry-cleaner's window: ANYONE LEAVING THEIR GARMENTS HERE FOR MORE THAN 30 DAYS WILL BE DISPOSED OF. Sign on motorway garage: PLEASE DO NOT SMOKE NEAR OUR PETROL PUMPS. YOUR LIFE MAY NOT BE WORTH MUCH BUT OUR PETROL IS. Notice in health food shop window: CLOSED DUE TO ILLNESS. Spotted in a safari park: ELEPHANTS PLEASE STAY IN YOUR CAR. Seen during a conference: FOR ANYONE WHO HAS CHILDREN AND DOESN'T KNOW IT, THERE IS A DAY CARE ON THE FIRST FLOOR. Notice in a field: THE FARMER ALLOWS WALKERS TO CROSS THE FIELD FOR FREE, BUT THE BULL CHARGES. Message on a leaflet: IF YOU CANNOT READ, THIS LEAFLET WILL TELL YOU HOW TO GET LESSONS. Sign on a repair shop door: WE CAN REPAIR ANYTHING. (PLEASE KNOCK HARD ON THE DOOR - THE BELL DOESN'T WORK) Sign at Norfolk farm gate: BEWARE! I SHOOT EVERY TENTH TRESPASSER AND THE NINTH ONE HAS JUST LEFT. Spotted in a toilet in a London office block: TOILET OUT OF ORDER. PLEASE USE FLOOR BELOW ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10766 From: J.A. Terranson Date: Tue Jan 25, 2005 11:32am Subject: Re: RFID On Tue, 25 Jan 2005, Gerald wrote: > I have noted the reduced number of kidnappings in Iraq. > Could RFID beused to trace victims if imbedded in their skin, or > wouldn't it have the range? AFAIK, depending on the specific RFID technology used, range goes as far as ~30 feet today, using COTS or near COTS equipment. I have heard theoretical discussions which insist that 100feet *may* be feasible soon, but it is unclear if "feasible" would necessarily equate to "available" in a reasonable time frame. Besides, I doubt a 100foot range would prove to be of much use. -- Yours, J.A. Terranson sysadmin@m... 0xBD4A95BF Civilization is in a tailspin - everything is backwards, everything is upside down- doctors destroy health, psychiatrists destroy minds, lawyers destroy justice, the major media destroy information, governments destroy freedom and religions destroy spirituality - yet it is claimed to be healthy, just, informed, free and spiritual. We live in a social system whose community, wealth, love and life is derived from alienation, poverty, self-hate and medical murder - yet we tell ourselves that it is biologically and ecologically sustainable. The Bush plan to screen whole US population for mental illness clearly indicates that mental illness starts at the top. Rev Dr Michael Ellner 10767 From: J. Oquendo Date: Tue Jan 25, 2005 8:24pm Subject: CCTV Questions Hey all, sorry for throwing something in a little bit offtopic but I figured someone here might have a little more information you'd be willing to share on your experiences with CCTV systems. I know this isn't necessarily the forum for it, but again, I'm hoping someone can perhaps contact me offlist even on this subject. So here goes... Soon I will be looking for a CCTV systems with about 6 cameras per location, with about 5 locations. Small offices to be exact. Can anyone recommend a starting point with a product you have used, and its curves (learning, operation, OS, etc.) I would need to set up a centralized mechanism to monitor the other offices remotely from one focal point. Any pointers would help. Yes, before someone flames this message take note, I am currently on Google searching as well, but figured someone might have come across somehting particularly good to use. James: On another note, please contact me off-list for some questions personally for you. Would have called the MA number but am sort of tied up with work. Perhaps some email exchanges before I call would do some justice. Thanks. =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo GPG Key ID 0x51F9D78D Fingerprint 2A48 BA18 1851 4C99 CA22 0619 DB63 F2F7 51F9 D78D http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D sil @ politrix . org http://www.politrix.org sil @ infiltrated . net http://www.infiltrated.net "How a man plays the game shows something of his character - how he loses shows all" - Mr. Luckey From: James M. Atkinson, Comm-Eng Date: Wed Jan 24, 2001 8:03pm Subject: Re: LoJack System At 5:05 PM -0800 1/24/01, Dawn Star wrote: >Does anyone on the list know the typical location in the vehicle of >a LoJack auto theft transmitter, its general appearance and antenna >configuration? Thanks, Roger It usually interfaces though the AM/FM radio antenna, but the actual command module can be in any of 50 or more hidden locations. The fastest way to find one is to TDR the antenna (I use a 1502 with an impedance matching network), or use a SA connected to the vehicle antenna and look for IF/RF bleed. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2373 From: Kohlenberg, Toby Date: Wed Jan 24, 2001 7:16pm Subject: Signal capturing for Wireless LAN protocol 802.11b Does anyone have experience with 802.11b wireless networks? I am looking for data on maximum distance from source that the signal can be picked up and/or transmitted from; How far away can you be and listen in AND How far away can you be and connect? Thanks, Toby All opinions stated are my own and in no way reflect the views of my employer Toby Kohlenberg, CISSP Intel Corporate Information Security STAT Team Information Security Specialist 503-264-9783 Office & Voicemail 877-497-1696 Pager "Just because you're paranoid, doesn't mean they're not after you." PGP Fingerprint: 92E2 E2FC BB8B 98CD 88FA 01A1 6E09 B5BA 9E84 9E70 2374 From: Andre Holmes <1ach@g...> Date: Wed Jan 24, 2001 10:21pm Subject: Bugging, spying and privacy - analysis by Dr Patrick Dixon, Global Change Ltd http://www.globalchange.com/bug.htm [Non-text portions of this message have been removed] 2375 From: Miguel Puchol Date: Thu Jan 25, 2001 3:05am Subject: RE: Signal capturing for Wireless LAN protocol 802.11b Toby, Your questions depend, at the receiving side, on the sensitivity of the equipment used. Good directional antennas and good hardware will allow someone to receive the signals from much greater distances. Also take into account that buildings and other obstructions can block the signal and cause multipath interference which would thwart reception. With these type of wireless networks, the location of the hub's antenna is the determining factor. I've seen a network cover a large factory with a couple of well placed antennas. How far you can connect from will depend on the location of the hub's antenna, and your equipment's characteristics. A PC-Card interface has a poor performance antenna, and you can expect distances of around 100 to 150 meters in optimum conditions. PCI based cards with external antennas can achieve much greater distances, as the antenna can be located in an optimal position. I hope it helps, all the best, Mike > -----Mensaje original----- > De: Kohlenberg, Toby [mailto:toby.kohlenberg@i...] > Enviado el: jueves, 25 de enero de 2001 2:16 > Para: TSCM-L@egroups.com > Asunto: [TSCM-L] Signal capturing for Wireless LAN protocol 802.11b > > > Does anyone have experience with 802.11b wireless > networks? I am looking for data on maximum distance > from source that the signal can be picked up and/or > transmitted from; > How far away can you be and listen in > AND > How far away can you be and connect? > > Thanks, > Toby > > All opinions stated are my own and in no way reflect the views of my > employer > > Toby Kohlenberg, CISSP > Intel Corporate Information Security > STAT Team > Information Security Specialist > 503-264-9783 Office & Voicemail > 877-497-1696 Pager > "Just because you're paranoid, doesn't mean they're not after you." > > PGP Fingerprint: > 92E2 E2FC BB8B 98CD 88FA 01A1 6E09 B5BA 9E84 9E70 > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2376 From: William Knowles Date: Thu Jan 25, 2001 3:45am Subject: Re: Signal capturing for Wireless LAN protocol 802.11b On Wed, 24 Jan 2001, Kohlenberg, Toby wrote: Toby, If this is an area of continuing interest for you and your organization, You might want to jump on a few of the wireless mailing lists, One I highly recommend is the one site run by Brewster Kahle. Its an absolute goldmine of information on IEEE 802.11 networks. http://www.sflan.com Cheers! William Knowles wk@c... > Does anyone have experience with 802.11b wireless networks? I am > looking for data on maximum distance from source that the signal > can be picked up and/or transmitted from; > > How far away can you be and listen in > AND > How far away can you be and connect? *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 2377 From: Dragos Ruiu Date: Thu Jan 25, 2001 6:29am Subject: Re: Signal capturing for Wireless LAN protocol 802.11b On Thu, 25 Jan 2001, William Knowles wrote: > If this is an area of continuing interest for you and your > organization, You might want to jump on a few of the wireless mailing > lists, One I highly recommend is the one site run by Brewster Kahle. > Its an absolute goldmine of information on IEEE 802.11 networks. > http://www.sflan.com The original question was how far away you have to be to connect. As related to me by others who have done the testing in urban environments rather than my own first hand measurements, the physical distance is highly dependent on the signal reflective surfaces and local environment. Walk around with your laptop and play with its orientation, by receiving the appropriate multipath reflected signal you can achieve connections that would otherwise not seem feasible. The snide answer to the original distance question: Your mileage may vary. Some good 802.11 sites are also: http://www.palowireless.com/i802_11/ http://www.wireless-nets.com/whitepaper_overview_80211.htm url: http://www.niksula.cs.hut.fi/~mkomu/docs/wirelesslansec.html http://isds.bus.lsu.edu/fall98/7520/WirelessLANs/audit.htm http://www.tml.hut.fi/Studies/Tik-110.300/1999/Wireless/vulnerability_4.html cheers, --dr P.s. I've heard it said that in many city cores you can get some to some pretty interesting things just by walking around with a laptop and a Wavelan card. :-) -- Dragos Ruiu dursec.com ltd. / kyx.net - we're from the future gpg/pgp key on file at wwwkeys.pgp.net Email dr@k... for info about CanSecWest/core01 March 28-30, Vancouver B.C. Speakers: Renaud Deraison/Nessus Attack Scanner, Martin Roesch/Snort//Advanced IDS, Ron Gula/Enterasys/IDS Evasion, Dug Song/Arbor Networks/Monkey in the Middle, RFP/Whisker2.0 and other fun, Mixter/2XS/Distributed Apps, Theo DeRaadt/OpenBSD, K2/w00w00/ADMutate, HD Moore/Digital Defense/Making NT Bleed, Frank Heidt/@Stake, Matthew Franz/Cisco/Trinux/Security Models, Fyodor/insecure.org/Network Mapping, Lance Spitzner/Sun/Honeynet Fun, Robert Graham/NetworkICE/IDS Technology Demo, Kurt Seifried/SecurityPortal/Crypto: 2-Edged Sword, Dave Dittrich/UW/Forensics, Sebastien Lacoste-Seris/COLT Telecom AG/securite.org/Kerberized SSH Deployment, Jay Beale/MandrakeSoft/Bastille-Linux/Securing Linux 2378 From: Paolo Sfriso Date: Thu Jan 25, 2001 2:17am Subject: NLJD Use in EOD Dear Collegues. I'm looking for material and opinions in the use of a NLJD in EOD inspections. Basically, what are the possibilities that the transmitted signial could trigger the device ? Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 (0)335 5257308 paulsfriso@t... www.grupposit.com [Non-text portions of this message have been removed] 2379 From: Dawn Star Date: Thu Jan 25, 2001 10:10am Subject: LoJack System The fastest way to find one is to TDR the antenna (I use a 1502 with an impedance matching network), or use a SA connected to the vehicle antenna and look for IF/RF bleed. -jma They only transmit when activated so there would be no emission in its normal sleeping status right? Roger [Non-text portions of this message have been removed] 2380 From: Rob Muessel Date: Thu Jan 25, 2001 10:09am Subject: Re: NLJD Use in EOD Dear Paolo, et al: I'm not aware of any published data on using an NLJD for EOD or IED activities, but I spent many years with Information Security Associates (ISA), the manufacturers of the Boomerang model and have some first-hand experience. There has been a fair amount of interest in using NLJDs for this type of activity. One of the US military branches that does lots of research into EOD evaluated ISA's NJD-5 and found it to be very effective. Various agencies within the government of India have also evaluated the product and found it to be very satisfactory for both EOD and IED use. Your question regarding the transmitted is one of the great concerns of any EOD technician. Most NLJDs on the market today have too much power, according to the evaluations. Audiotel's SuperBroom Plus has 3 watts. REI's Orion has at least 1 watt (besides not being rugged enough for this type of application), and several made in Russia have up to 25 watts. All triggered devices during testing. ISA's NJD-5 has 500 milliwatts (maximum). This power level was found to be low enough to not cause triggering. In evaluating NLJDs for this application, the critical specification is not the power output, but the sensitivity of the receiver. Unfortunately, it is the hardest specification to define and to verify. With IED detection, the detected device might be a timer circuit or a radio receiver for remote activation. With EOD, the target is likely to be the triggering mechanism itself. In either case, the stronger the transmitted signal, the more likely it is that the IED's receiver could become saturated and trigger or enough current could be induced in the trigger to cause it to fire. The EOD evaluations showed that the ISA NJD-5 with the lowest power output had the greatest detection distance. I don't mean this to be a sales pitch, I'm only relating what the test results show. Do not rely on published specifications. Field testing is the only way to conclusively determine which products work best. Good luck with your project. -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 2381 From: James M. Atkinson, Comm-Eng Date: Thu Jan 25, 2001 11:35am Subject: Re: NLJD Use in EOD At 11:09 AM -0500 1/25/01, Rob Muessel wrote: >Dear Paolo, et al: > >I'm not aware of any published data on using an NLJD for EOD or IED >activities, but I spent many years with Information Security Associates >(ISA), the manufacturers of the Boomerang model and have some first-hand >experience. I understand that ATF has done a great deal of research on the matter, and has several advisories/techniques on the matter. Also, the NATO humanitarian folks (de-mining folks) have published several items regarding finding "plastic mines" using the Superscout, Locator and ORION. The biggest problem to-date is that NLJD were designed to be used in officer environment, and not taken out into the field. Somebody needs to come out with a more rugged design. >There has been a fair amount of interest in using NLJDs for this type of >activity. One of the US military branches that does lots of research >into EOD evaluated ISA's NJD-5 and found it to be very effective. >Various agencies within the government of India have also evaluated the >product and found it to be very satisfactory for both EOD and IED use. I know of several dozen government agencies worldwide who have been grabbing up NLJD's over the past couple of years just for EOD, IED, and mine location. >Your question regarding the transmitted is one of the great concerns of >any EOD technician. Most NLJDs on the market today have too much power, >according to the evaluations. Audiotel's SuperBroom Plus has 3 watts. >REI's Orion has at least 1 watt (besides not being rugged enough for >this type of application), and several made in Russia have up to 25 >watts. All triggered devices during testing. I have personally seen, handled, and examined a Chinese unit that applied over 300 watts to the head, and Soviet unit that applied over 100 watts to the head. I did some experiments a few years back where I exposed unshielded electrical matches with an un-terminated 12 inch or less pigtail to various levels of RF energy used by the more popular NLJD's. The results were most illuminating (no pun intended) when the pigtail was trimmed for resonance relative to the NLJD illumination frequency (a loud noise was created). Once you generate anything more then a few hundred milli-watts off the head you highly risk detonating the suspect device. The only problems I have had with the ORION was with the *&*## contacts oxidizing, but I prefer it over the other units I own or have used. The ORION is OK due to the adjustable power levels, but I would wants to push anything higher then the 14mW setting when check for devices (of course in TSCM you would normally start at the lowest settings and work your way up with over lapping coverage). >ISA's NJD-5 has 500 milliwatts (maximum). This power level was found to >be low enough to not cause triggering. Er... OK, but only if the blasting cap is shielded...Since most improvised explosive devices lack shielding (as in low metal content amatuer devices) they would be very vulnerable to detonation (or deflagration if a high order explosive was not used) > >In evaluating NLJDs for this application, the critical specification is >not the power output, but the sensitivity of the receiver. >Unfortunately, it is the hardest specification to define and to verify. >With IED detection, the detected device might be a timer circuit or a >radio receiver for remote activation. With EOD, the target is likely to >be the triggering mechanism itself. In either case, the stronger the >transmitted signal, the more likely it is that the IED's receiver could >become saturated and trigger or enough current could be induced in the >trigger to cause it to fire. Which is why is is very beneficial for an EOD team to have a spectrum analyser, several wave-guides, and some close field probes (and a good LNA). If the bomb has some electronic content (ie: a timing mechanism) you should be able to pickup on the electrical and magnetic fields it emits once you or the robot gets close to the device.. You right on target about the secret being in the receiver circuits, and that power levels must be a secondary priority. > The EOD evaluations showed that the ISA NJD-5 with the lowest power >output had the greatest detection distance. I don't mean this to be a >sales pitch, I'm only relating what the test results show. Do not rely >on published specifications. Field testing is the only way to >conclusively determine which products work best. I agree, the ISA NJD-5 is a good unit, and that field testing is the best way to go. >Good luck with your project. > >-- >Rob Muessel, Director email: rmuessel@t... >TSCM Technical Services Phone: 203-354-9040 >11 Bayberry Lane Fax: 203-354-9041 >Norwalk, CT 06851 >USA -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2382 From: James M. Atkinson, Comm-Eng Date: Thu Jan 25, 2001 11:44am Subject: Re: LoJack System At 8:10 AM -0800 1/25/01, Dawn Star wrote: >The fastest way to find one is to TDR the antenna (I use a 1502 with >an impedance matching network), or use a SA connected to the vehicle >antenna and look for IF/RF bleed. > >-jma > >They only transmit when activated so there would be no emission in >its normal sleeping status right? Roger No, you are poking around looking for the connection into the antenna wiring. Also, even if the unit is "sleeping" there will be a small amount of detectable emissions. The secret to finding a Lo-Jack beacon is knowing WHERE to physically look in the vehicle, what frequencies to watch, and the electrical anomalies it creates in the vehicle wiring. But then of course we are in the business of finding bugs, not pinching cars. The beacons tend to be installed into three major "zones" in the vehicle, and any TSCM project will turn up these little puppies with no problem as these 'zones" are always checked in detail during any vehicle sweep. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2383 From: Kohlenberg, Toby Date: Thu Jan 25, 2001 10:03am Subject: RE: Signal capturing for Wireless LAN protocol 802.11b Thanks all for the responses. I am thinking more in terms of using non-standard equipment to take advantage of poor signal control and listen in or connect from a long distance. I figure the people doing this will not be using standard WLAN cards. t > -----Original Message----- > From: Dragos Ruiu [mailto:dr@k...] > Sent: Thursday, January 25, 2001 4:29 AM > To: William Knowles; Kohlenberg, Toby > Cc: TSCM-L@egroups.com > Subject: Re: [TSCM-L] Signal capturing for Wireless LAN > protocol 802.11b > > > On Thu, 25 Jan 2001, William Knowles wrote: > > If this is an area of continuing interest for you and your > > organization, You might want to jump on a few of the > wireless mailing > > lists, One I highly recommend is the one site run by Brewster Kahle. > > Its an absolute goldmine of information on IEEE 802.11 networks. > > http://www.sflan.com > > > The original question was how far away you have to be to connect. > As related to me by others who have done the testing in urban > environments > rather than my own first hand measurements, the physical > distance is highly > dependent on the signal reflective surfaces and local environment. > > Walk around with your laptop and play with its orientation, > by receiving the > appropriate multipath reflected signal you can achieve > connections that > would otherwise not seem feasible. The snide answer to the > original distance > question: Your mileage may vary. > > Some good 802.11 sites are also: > > http://www.palowireless.com/i802_11/ > > http://www.wireless-nets.com/whitepaper_overview_80211.htm > > url: http://www.niksula.cs.hut.fi/~mkomu/docs/wirelesslansec.html > > http://isds.bus.lsu.edu/fall98/7520/WirelessLANs/audit.htm > > http://www.tml.hut.fi/Studies/Tik-110.300/1999/Wireless/vulner ability_4.html cheers, --dr P.s. I've heard it said that in many city cores you can get some to some pretty interesting things just by walking around with a laptop and a Wavelan card. :-) -- Dragos Ruiu dursec.com ltd. / kyx.net - we're from the future gpg/pgp key on file at wwwkeys.pgp.net Email dr@k... for info about CanSecWest/core01 March 28-30, Vancouver B.C. Speakers: Renaud Deraison/Nessus Attack Scanner, Martin Roesch/Snort//Advanced IDS, Ron Gula/Enterasys/IDS Evasion, Dug Song/Arbor Networks/Monkey in the Middle, RFP/Whisker2.0 and other fun, Mixter/2XS/Distributed Apps, Theo DeRaadt/OpenBSD, K2/w00w00/ADMutate, HD Moore/Digital Defense/Making NT Bleed, Frank Heidt/@Stake, Matthew Franz/Cisco/Trinux/Security Models, Fyodor/insecure.org/Network Mapping, Lance Spitzner/Sun/Honeynet Fun, Robert Graham/NetworkICE/IDS Technology Demo, Kurt Seifried/SecurityPortal/Crypto: 2-Edged Sword, Dave Dittrich/UW/Forensics, Sebastien Lacoste-Seris/COLT Telecom AG/securite.org/Kerberized SSH Deplonet Jay Beale/MandrakeSoft/Bastille-Linux/Securing Linux 2384 From: Thomas H. Jones Date: Thu Jan 25, 2001 5:30pm Subject: RE: Digest Number 492 Dear Rob Muessel, I know that this is not the place for marketing and I will appologize up front. But I feel the need to respond when our equipment is slandered. >Your question regarding the transmitted is one of the great concerns of >any EOD technician. Most NLJDs on the market today have too much power, >according to the evaluations. Audiotel's SuperBroom Plus has 3 watts. >REI's Orion has at least 1 watt (besides not being rugged enough for >this type of application), and several made in Russia have up to 25 >watts. All triggered devices during testing. We are not aware of any testing that has ever been done inwhich the ORION has caused a detonation. The Government of India did some testing last October, and the rumor is that the Audiotel unit caused an explosion, but I only heard this from our agent in India. The documented results of this test are considered classified by the government of India, and I have no documented results. But, I do know that the ORION was not part of the testing, but the Russian unit (NR-900 at 150 watts) was included. I am very curious as to where Rob Meusal got his data. Also, it should be noted that building equipment to look like it was manufactured in the 50's does not necessarily make it more rugged. Other then the slip ring contacts mentioned below and adding a plastic cover on the antenna head for people that like to "sand" the wall, we have not had the need to make any further modifications for ruggedness. But we have had many customers tell us how effective their sweeps have become because they were able to use their NLJD for longer than 15 minutes without becoming exhausted. Another important issue that should be considered is the ERP peak and the ERP average. Except for the ORION and the Russian units, most NLJD's are CW in nature providing continuous power. The ORION is a pulsed unit with a very low duty cycle so that the average power is much less than the ISA Boomerang average power and below the FCC legal limit. This is why the ORION is so much smaller then the Boomarang. Also, the ORION output power is fully adjustable from 14mwatts to 1.4 watts peak power. Our friends in India tell us that this is a very positive aspect of the design when using a unit for EOD. Furthermore, the ORION has a more sensitive receiver and has a built-in DSP function to increase sensitivity beyond the technology of the receiver. >The only problems I have had with the ORION was with the *&*## >contacts oxidizing, but I prefer it over the other units I own or >have used. I am sorry for your oxidizing problem. We have made a modification on the contact and slip-ring assembly. If you are still having any problem, please send us the unit and we will upgrade it free of charge. Regards, Tom Jones REI General Manager 2385 From: James M. Atkinson, Comm-Eng Date: Thu Jan 25, 2001 9:12pm Subject: RE: Digest Number 492 - NLJD Issues At 5:30 PM -0600 1/25/01, Thomas H. Jones wrote: >Dear Rob Muessel, > >I know that this is not the place for marketing and I will appologize up >front. But I feel the need to respond when our equipment is slandered. [Moderator Steps Up on His Soapbox] If the subject involves TSCM equipment, TSCM methods, TSCM issues and related subjects that it is completely appropriate for this forum. I found the materials posted by both Rob and Tom to be quite appropriate, and wish more list members would post similar materials. Occasional marketing is ok, and occasional product announcements are encouraged but temper it with good judgement and lets keep it technical. -jma [Moderator Shuts Up] -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2386 From: Rob Muessel Date: Fri Jan 26, 2001 8:29am Subject: Re: Digest Number 492 - NLJD Issues Ah, the voice of reason. Jim, you are entirely correct. I was responding as one who had been involved with assisting in the evaluation of NJDs for this application. Having been present at some of the testing and evaluation overseas and in Maryland, I was detailing what I had seen and what results had been communicated to me. Let me state that I have no connection to or relationship with any equipment manufacturer, so I don't need to need to push anyone's product. I'm only relating professional experience. If there is any offense created, it is unintentional and I do apologize for it. In closing, regardless of which NJD might be used for EOD applications, there is no way I'd want to be the guy who is holding onto the antenna. At least not without my earplugs. -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 2387 From: James M. Atkinson, Comm-Eng Date: Fri Jan 26, 2001 9:32am Subject: Fire authorities in California.... Fire authorities in California found a corpse in a burned out section of forest while assessing the damage done by a forest fire..The deceased male was dressed in a full wet suit, complete with SCUBA tanks on his back, flippers, and face mask. A post-mortem revealed that the person died not from burns, but from massive internal injuries. Dental records provided a positive identification. Investigators then set about to determine how a fully clad diver ended up in the middle of a forest fire.. It was revealed that, on the day of the fire, the person went for a diving trip off the coast some 20 miles away from the forest. The firefighters, seeking to control the fire as quickly as possible, called in a fleet of helicopters with very large dip buckets. Water was dipped from the ocean then flown to the forest fire and emptied..You guessed it. One minute our diver was making like Flipper in the Pacific, the next he was doing the breast stroke in a fire dip bucket 300 feet in the air. Apparently he extinguished exactly 5'-10" of the fire. Some days it just doesn't pay to get out of bed! This article was taken from the California Examiner, March 20, 1998 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2388 From: James M. Atkinson, Comm-Eng Date: Fri Jan 26, 2001 9:44am Subject: In-Flight Safety Lecture Occasionally, airline attendants make an effort to make the "in-flight safety lecture" and their other announcements a bit more entertaining. Here are some real examples that have been heard or reported: After landing: "Thank you for flying Delta Business Express. We hope you enjoyed giving us the business as much as we enjoyed taking you for a ride." As the plane landed and was coming to a stop at Washington National, a lone voice came over the loudspeaker: "Whoa, big fella. WHOA!" In the event of a sudden loss of cabin pressure, margarine cups will descend from the ceiling. Stop screaming, grab the mask, and pull it over your face. If you have a small child traveling with you, secure your mask before assisting with theirs. If you are traveling with more than one small child ...pick your favorite. Weather at our destination is 50 degrees with some broken clouds, but we'll try to have them fixed before we arrive. Thank you, and remember, nobody loves you, or your money, more than Southwest Airlines." "Your seat cushions can be used for flotation, and in the event of an emergency water landing, please paddle to shore and take them with our compliments." "As you exit the plane, make sure to gather all of your belongings. Anything left behind will be distributed evenly among the flight attendants. Please do not leave children or spouses." Another flight attendant's comment on a less than perfect landing: "We ask you to please remain seated as Captain Kangaroo bounces us to the terminal." Part of a flight attendant's arrival announcement: "We'd like to thank you folks for flying with us today. And, the next time you get the urge to go blasting through the skies in a pressurized metal tube, we hope you'll think of us here at US Airways." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2389 From: James M. Atkinson, Comm-Eng Date: Fri Jan 26, 2001 10:07am Subject: REAL MASTER SERGEANTS: REAL MASTER SERGEANTS: 1. Can cuss for ten minutes without ever repeating a word. 2. Have a spine. 3. Can play a cherry Lieutenant like a finely tuned instrument. 4. Can see in the Dark. 5. Have eyes in the back of their heads. 6. Still don't trust the Russians or Germans 7. Still hate the French. 8. Don't know or care how to be politically correct. 9. Don't give a damn about being politically correct. 10. Think that "politically correct" should fall under S### in the UCMJ. 11. Love deployments because there is less paperwork and more"real work." 12. Can run 5 miles with a hangover. 13. Do not fear women in the military. 14. Would like to date G. I. Jane. 15. Still know how to use a floor buffer. 16. Can tell you anything you want to know about an M1911A1 although they are no longer in the inventory. 17. Believe that they do have a rendezvous with destiny. 18. Believe that " Nuts" wasn't all that Brigadier General McAuliffe said to the Germans at Bastogne. 19. Don't know how to use a "stress card". 20. Idolize John Wayne. 21. Don't believe that AAFES really needs a"commander". 22. Would have paid money to see Custer getting his clock cleaned. 24. Know how to properly construct a field latrine. 25. Might admire the Germans, but still realize they got their butts kicked. Twice. 26. Aren't afraid of the Chinese, who probably don't have enough rowboats to invade Taiwan. 27. Would rather be OPFOR than MOPP 4. 28. Don't believe a darn thing the Iraqis say. 29. Don't need a GPS to find themselves. 30. Have enough BDU's in their closet to start a surplus store. 31. Think that MRE's taste good (with a little hot sauce). 32. Are convinced that "wall-to-wall"counseling really works. 33. Have more time on the front-line than most others have in the chow line. 34. Know how to make coffee when the measuring scoop goes missing. 35. Know that it's not good coffee when you can see through it. 36. Don't blame poor marksmanship on their M-16. 37. Know that inept leaders will always say they have inept soldiers. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2390 From: Andre Holmes <1ach@g...> Date: Fri Jan 26, 2001 0:02pm Subject: Fw: History of a SPY ----- Original Message ----- From: Andre Holmes To: TSCM-L@egroups Sent: Friday, January 26, 2001 12:59 PM Subject: History of a SPY Greetings I found this web site http://www.Tomlinson.ru while surfing the latest news from around the world. The book is banned in several countries including the USA. [Non-text portions of this message have been removed] 2391 From: Kevin D. Murray Date: Fri Jan 26, 2001 0:19pm Subject: Re: Fw: History of a SPY $30 at Amazon http://www.amazon.com/exec/obidos/ASIN/0970554788/counterespionage Andre Holmes wrote: > ----- Original Message ----- > From: Andre Holmes > To: TSCM-L@egroups > Sent: Friday, January 26, 2001 12:59 PM > Subject: History of a SPY > > Greetings > > I found this web site http://www.Tomlinson.ru while surfing the > latest news from around the world. > > The book is banned in several countries including the USA. 2392 From: James M. Atkinson, Comm-Eng Date: Fri Jan 26, 2001 2:29pm Subject: DARWIN AWARDS DARWIN AWARDS HONOR THE REMAINS of those who gave their lives in a single-minded effort to improve our gene pool. This month we have a few short Darwins and a bundle of Honorable Mentions and Personal Accounts. Enjoy! "A 27-year-old FBI agent fell to his death when he accidentally piloted a powerful speedboat over 165-foot high dam in Arkansas. "A woman chasing a rat with a lit roll of paper set her bed ablaze and narrowly escaped from her smoke-filled apartment with her life at the Royal Beechnut Apartments in Houston." ABC13 and KTRK, Texas "An off-duty Los Angeles police officer accidentally shot himself while cleaning his gun, and was treated for a groin injury at a nearby hospital." "People injured or killed in the Michigan firearms deer season include a Bay City man shot in the leg while trying to photograph his dog holding a rifle, which accidentally went off." 28 November 2000, Michigan Live WEST VIRGINIA ALIBI -- Honorable Mention Confirmed True A Charleston bank robber's alibi for the crime placed him in hot water when he claimed to be buying heroin in another state at the time of the robbery. He gave them a hotel receipt and police searched the room to find 84 packets of heroin. Police decline to comment on Donald's fate. MEDIEVAL STORY -- 2001 Urban Legend As related by Tamas Polgar, who says, "During the late medieval years in Hungary, one of the oldest legends in our country took place. It may even be true." The city Paks (pronounced pa:ksh) was a little village in the 1600s and today is a small city boasting Hungary's single nuclear plant. In the past, the village had trouble with a neighboring village. They kept sending their cows to graze on Paks land, and vice-versa, knowing my ancestors. Once a foreigner attacked the Paks herdsman, beat him badly, and confiscated his cows. But this was not just any herdsman, it was the son of the mayor! The people of Paks took up arms - or rather, work tools they could wield as arms. The result was a small battle between the two villages, in which dozens of peasants bit the dust. The brave Paks army retreated in defeat. The mayor of Paks, undaunted, ordered his men to fabricate a cannon to blast the enemy to smithereens. It was easier to order it than to do so, as they did not have the necessary tools and materials to build a cannon. "No matter," said the wise mayor, "Chop a tree down, and create the cannon from its trunk!" During the night the people of Paks created the first wooden cannon in history, ready for deployment. They towed it up a nearby hill, and the entire village gathered around to watch the victory. The Gunmaster loaded the cannon with gunpowder, put a large rock projectile in the barrel, pointed the weapon towards the enemy village and fired it... KABOOMM!! Twenty people near the cannon died, and many others were seriously wounded. However the mayor survived, and immediately issued a victory message for his people, saying: "If we have so many dead, how many can there be of the enemy?" -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2393 From: Robert G. Ferrell Date: Fri Jan 26, 2001 3:19pm Subject: Have Ion Trail, Will Bounce This phenomenon used to irritate me when I was doing radio wave propagation stuff for science fairs in junior high school. I had no idea it was so commercial... ;-) http://www.starcomwireless.com/technology/articlereader.asp?tf=StarCom_Technology.txt Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2394 From: Miguel Puchol Date: Fri Jan 26, 2001 4:06pm Subject: RE: DARWIN AWARDS Is there a web site for the Darwin Awards? > -----Mensaje original----- > De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] > Enviado el: viernes, 26 de enero de 2001 21:30 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] DARWIN AWARDS > 2395 From: James M. Atkinson, Comm-Eng Date: Fri Jan 26, 2001 4:12pm Subject: RE: DARWIN AWARDS At 11:06 PM +0100 1/26/01, Miguel Puchol wrote: >Is there a web site for the Darwin Awards? yes.... http://www.nipc.gov/ -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2396 From: Miguel Puchol Date: Fri Jan 26, 2001 4:19pm Subject: RE: Fire authorities in California.... That's no joke! A few years back, we had a similar case, but involving a seaplane, more exactly a Canadair CL-215, operated then by the Spanish AF, now by a private company. They have to pick up water on the move, by lowering a scoop into the sea or lake while flying about 2-3 feet above it, loading some 3.000 liters (about 750 gallons, don't ask wether US or UK) each go, and in one of the passes over the coastline, an extra diver. This one also had full SCUBA gear on. This fire was close to home, so I was involved with the local FD in the effort to control the fire, and we heard the report over the radio when they found the guy. I would also propose the theory that SCUBA divers are a rather poor way to extinguish forest fires, based on these two examples. Never mind, try with lawyers (sorry, couldn't help it!) Cheers, Mike > -----Mensaje original----- > De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] > Enviado el: viernes, 26 de enero de 2001 16:33 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] Fire authorities in California.... > > > > Fire authorities in California found a corpse in a burned out section of > forest while assessing the damage done by a forest fire..The deceased male > was dressed in a full wet suit, complete with SCUBA tanks on his back, > flippers, and face mask. A post-mortem revealed that the person died not > from burns, but from massive internal injuries. Dental records provided a > positive identification. Investigators then set about to determine how a > fully clad diver ended up in the middle of a forest fire.. > It was revealed that, on the day of the fire, the person went for a diving > trip off the coast some 20 miles away from the forest. The firefighters, > seeking to control the fire as quickly as possible, called in a fleet of > helicopters with very large dip buckets. > Water was dipped from the ocean then flown to the forest fire and > emptied..You guessed it. One minute our diver was making like Flipper in > the Pacific, the next he was doing the breast stroke in a fire dip bucket > 300 feet in the air. Apparently he extinguished exactly 5'-10" > of the fire. > Some days it just doesn't pay to get out of bed! > > This article was taken from the California Examiner, March 20, 1998 > -- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2397 From: Steve Whitehead Date: Fri Jan 26, 2001 11:51am Subject: TSCM Practitioners in Ohio Hi A Captain Bruce Contos from Jerusalem Ohio is retiring soon from Law Enforcement and is considering starting a debugging business. He asked for advice and we gave him some pros and cons, recommending that he get to know the professional TSCM service providers in OHIO. His e-mail address is (dustybrandy@1...) TSCM practitioners in that part of the US can mail him with their details. Best Regards Steve Whitehead Managing Member TSCM Services cc Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) URL http://www.tscm.co.za E-mail sceptre@m... P O Box 16063, Lyttelton, 0140, Centurion, South Africa [Non-text portions of this message have been removed] 2398 From: Shawn Hughes Date: Fri Jan 26, 2001 3:36pm Subject: EOD uses for NLJD I've been reading the posts on this subject with great interest. As a practicing bomb technician here in the US, I try to keep abreast of anything that might be of use to us. I recall some testing done by Sandia and NAVSCHOLEOD at Indian Head on the NLJD, but I believe that the consensus was that the price per unit versus actual applicability made them a poor choice. I know some Fed PSBT units that have them, but what they do with their end-of-FY money's their business! The problem is twofold: the search for bombs strongly parallels the search for surveillance devices. The chief difference lies in that while both use similar searching techniques and manpower, a bomb search always is time - constrained. Having been attached to two VIPPSA's, even though it appears there are a multitude of personnel, the truth is that the Secret Service runs light. This means that precious time might be squandered on the NLJD, which will not detect the majority of IED's which are of the MT (mechanical timed) variety. This is also why very little TSCM gear is used. A lot of high - end units carry near - field receivers and wide - spectrum jammers, but that's about the extent. The other problem is that the majority of ET devices use timers similar to a digital watch. This means that it would take very little radiated RF to potentially cause a premature functioning of the device. Which is good, because you accomplish your mission ( no dead VIP), but it's also bad ( you're dead). Mr. Atkinson is dead on about RF and blasting caps. However, caps are usually more sensitive to RF than matches, making them that much more susceptible. ( A good try - it - yourself test is to substitute a grain of wheat lamp for the cap. Even a child's walkie talkie can illuminate the lamp with correctly tuned leg wires!) However, using TSCM on a robot really doesn't work. The units I have used (REMOTEC, Wheelbarrows) emit too much spurious RF from the control box and motors to allow the receiver to catch anything. If you have that kind of money to invest, I suggest something like the EGIS, or the ICAM. However, apparently they are making leaps and bounds with zero field nuclear magnetic resonance imaging, as a hand held unit is scheduled to arrive in four years. If you need more info, I can sanitize some stuff I have and send it to you. Good luck! Meanwhile, it's still pretty much a flashlight and screwdriver world........... Shawn Hughes 2399 From: James M. Atkinson, Comm-Eng Date: Fri Jan 26, 2001 5:40pm Subject: Re: EOD uses for NLJD At 1:36 PM -0800 1/26/01, Shawn Hughes wrote: >I've been reading the posts on this subject with great interest. As a >practicing bomb technician here in the US, I try to keep abreast of >anything that might be of use to us. I recall some testing done by Sandia >and NAVSCHOLEOD at Indian Head on the NLJD, but I believe that the >consensus was that the price per unit versus actual applicability made them >a poor choice. I know some Fed PSBT units that have them, but what they do >with their end-of-FY money's their business! > [snip] >Mr. Atkinson is dead on about RF and blasting caps. However, caps are >usually more sensitive to RF than matches, making them that much more >susceptible. ( A good try - it - yourself test is to substitute a grain of >wheat lamp for the cap. Even a child's walkie talkie can illuminate the >lamp with correctly tuned leg wires!) However, using TSCM on a robot really [snip] Cut the match leads to be resonant to the NLJD illumination signal and most of the time you will hear a loud noise when you pass the NLJD over the leads. Since caps normally tend to be jacketed the effect isn't as easy to demonstrate (with caps), but then again it is most unwise to touch off a blasting cap at a close distance (personally I don't like using tweezers to pick little bits of cap shrapnel out of my skin). If I remember the tech manual correctly the minimum safe distance between an electric blasting cap (or wiring involving a blasting cap) for a 1 - 5 watt ERP RF device below 1 GHz is 10 feet. There is also the "155 foot away from power lines" rule from twenty years back. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2400 From: James M. Atkinson, Comm-Eng Date: Sat Jan 27, 2001 0:20pm Subject: Doctor Hid Camera in Nurses Bathroom SATURDAY JANUARY 27 2001 Doctor Hid Camera in Nurses Bathroom http://www.thetimes.co.uk/article/0,,2-74728,00.html BY DAVID CHARTER, HEALTH CORRESPONDENT A HOSPITAL doctor was under suspension last night after nurses found a camera hidden in a shampoo bottle overlooking their bath. Michael Shiew, a senior house officer, is now the subject of a hospital and police inquiry into the incident in the nursesí shared bathroom at Brighton General Hospital. Dr Shiew, 27, was arrested after a nurse found a miniature recording device concealed in a large bottle of Head & Shoulders overlooking a bath tub. The container was left in the bathroom used by a dozen mostly female nurses who live on the same corridor of an accommodation block at the hospital. One of the nurses picked it up before stepping into the bath and found that it contained a camera and transmitter. Police later removed a bag of videotapes and technical equipment from a room in the block. One of the female nurses living there said: "When I saw this device in the bottle, my first reaction was that this was a joke. Then we figured out it was a camera with an antenna which sends out a signal and I realized this was much more serious. Dr Shiew, who was attending a three-day course at the Brighton hospital, was suspended from his job as a senior house officer in the anaesthetics department of St George's Hospital in Tooting, southwest London, pending an investigation. Police said that a car and a house had been searched and that they had removed a number of videotapes and computer disks for analysis. They were called to the first floor of the nurses' quarters late last Thursday after alarmed residents summoned hospital security guards. The device was found by Joe Cidoni, a male nurse at Brighton's accident and emergency department, after his Norwegian wife had run him a bath. The couple live in a room a short walk down the corridor from the shared bathroom. Mr Cidoni, 40, said: "It was a really big bottle and when I first saw it, I admit I thought Great, free shampoo so I picked it up. But it just didn't feel right and then it clicked. "Shampoo doesn't normally click, so I gave the top a pull to see if it would come off. To my disbelief, I found it was full of wiring. In the side of the top of the bottle was a pinhole. I thought someone was playing a trick or that I had stumbled into a police investigation. A female nurse who did not want to be named said: "There is a lock on the bathroom door and a lock on the outer door of the corridor. You think you are secure here. I could not believe this would happen to me in a place like this. Mr Cidoni, an American who joined Brighton General Hospital this month, added: "My wife is extremely upset about what happened. I came here to learn things I could not learn in my previous post but I never expected to be embroiled in something like this. Brighton police confirmed that a 27-year-old man had been arrested at the hospital last Thursday night. A spokeswoman said: "He was arrested on suspicion of taking indecent photos and the equipment recovered was a covert video camera concealed in a shampoo bottle and other digital equipment and videos. Apparently unsure of the grounds on which to make an arrest they fear that the recording device may have captured images of the children of nursesí guests who also use the communal bathroom. The police spokeswoman added: "We searched the man's car and his house. Videotape and computer disks were removed from the address and the car. A spokesman for Brighton General Hospital said: "An arrest was made of a doctor who was accused of spying on staff in the nursesí accommodation. He was not an employee of this trust. He was here because our postgraduate medical centre runs courses for medical staff throughout the country and he was here for three days. "This has obviously been upsetting for the staff who live there and we have given them assurances that we have checked for any untoward devices. He added: "There are single males, single females and couples who live there. We have a very limited amount of accommodation which we offer not just to nurses but to doctors and there is no policy to segregate between the sexes. St George's Healthcare NHS Trust has promised a full inquiry. A spokesman said: "The trust is continuing with its investigation into allegations that recording equipment had been discovered there (Brighton General Hospital). Dr Shiew, who has not been charged with any offence but remains on police bail, refused to comment last night on the allegations. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2401 From: Chris Childs Date: Sat Jan 27, 2001 0:25pm Subject: Re: Fire authorities in California.... This sounds like an urban legend to me. First off, I couldn't find a paper called the "California Examiner". Second I found this web site: http://www.urbanlegends.com/death/scuba_forest_fire.html James M. Atkinson, Comm-Eng" wrote, > > >Fire authorities in California found a corpse in a burned out section of >forest while assessing the damage done by a forest fire..The deceased male >was dressed in a full wet suit, complete with SCUBA tanks on his back, >flippers, and face mask. A post-mortem revealed that the person died not >from burns, but from massive internal injuries. Dental records provided a >positive identification. Investigators then set about to determine how a >fully clad diver ended up in the middle of a forest fire.. >It was revealed that, on the day of the fire, the person went for a diving >trip off the coast some 20 miles away from the forest. The firefighters, >seeking to control the fire as quickly as possible, called in a fleet of >helicopters with very large dip buckets. >Water was dipped from the ocean then flown to the forest fire and >emptied..You guessed it. One minute our diver was making like Flipper in >the Pacific, the next he was doing the breast stroke in a fire dip bucket >300 feet in the air. Apparently he extinguished exactly 5'-10" of the >fire. >Some days it just doesn't pay to get out of bed! > >This article was taken from the California Examiner, March 20, 1998 >-- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > _________________________________________________________________________ Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com. From: Shawn Hughes Date: Thu Jan 24, 2002 0:12pm Subject: Ames' computer Ok, Thanks to everyone who replied on and off board. So, the results seem to be that a tech guy has to initially manipulate the computer and install something (extra card, WLAN, dongle, etc.) in order for this exploit to work. I was afraid there was some kinda backdoor weakness in all computers that allowed them to be woken up (a'la the wake key) by a signal superimposed on the mains. I feel better now. And I agree on Ames. What really burns me is that as sloppy as he apparently was, you still have to jump through all the PRP hoops that you do. It's all a joke. I guess it would cost too much to revamp, though. Thanks again, guys!! Shawn 4624 From: A Grudko Date: Thu Jan 24, 2002 11:18am Subject: Re: China plane bugs Sloppy U.S. spying or untrue? - Quote - > The experts expressed skepticism that American spies had a hand in > what newspaper reports said were more than two dozen bugs found inside a > plane to be used by Chinese President Jiang Zemin, including in the bathroom > and the headboard of the bed. Perhaps his wife planted them? ;-) Andy G - Jo'burg 4625 From: James M. Atkinson Date: Thu Jan 24, 2002 8:39pm Subject: WANTED: 900 New FBI Special Agents http://www.pittsburghfirst.com/rc/news/docs/1740845l.htm Posted: 05:31 PM EST Wednesday, January 23, 2002. WANTED: 900 New FBI Special Agents WASHINGTON (Reuters) - The FBI has a new ``most wanted'' list -- 900 new special agents. The FBI said on Wednesday it is launching one of its most aggressive hiring campaigns in recent years as it seeks to hire about 900 people over the next eight months to become special agents. ``The events on, and subsequent to, Sept. 11, 2001, have resulted in a realignment of the FBI's resources to enhance its ability to address terrorism and homeland security,'' the statement said. As a result, the FBI plans to focus on identifying candidates with certain skills to become special agents. People who have a background in computer sciences, engineering and physical sciences are needed, as are candidates who know languages like Arabic, Farsi, Urdu, Chinese or Japanese. Other skills of interest include foreign counter-intelligence and counter-terrorism work, and people who have a background in military intelligence or a fixed-wing pilot's license. The FBI said applicants must be U.S. citizens between the ages of 23 and 36, be available for assignment anywhere within the FBI's jurisdiction and possess a valid driver's license. A spokesman said the bureau hires substantially fewer than 900 special agents during a typical year, and added that as of Dec. 1 there were just over 11,000 special agents on the force. Copyright © 2002 Reuters Limited. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4626 From: Hawkspirit Date: Thu Jan 24, 2002 9:48pm Subject: Books on terrorism these books may be of interest to anyone is the anti-terrorist field. http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=1504288978 4627 From: James M. Atkinson Date: Thu Jan 24, 2002 9:45pm Subject: A spy's remorse - students should think twice about joining 'The Agency' http://www.woza.co.za/jan02/cia24.htm A spy's remorse - students should think twice about joining 'The Agency' by Bob Beyers, Pacific News Service As thousands of American college students rush to join the Central Intelligence Agency, they might listen to a few cold warriors' tales before signing on the dotted line. One comes from a man we'll call Fred. We met in a cancer clinic, where my wife was a patient. Fred was terminal, and knew it. But he didn't look that way at all. Part of the Greatest Generation, he had good color, walked briskly, sat down with ease and waited for his drugs. "Are you retired?" I asked. "Yes." "What did you do?" "Worked for the government." "What area?" "Can't say..." "Oh, the Agency," I guessed. "Can't say." I told Fred I had been supported financially by the CIA in the 1950s, but didn't know about it until much later. At the U.S. National Student Association, I'd been among a handful of staffers whose leaders successfully challenged the communist-influenced International Union of Students. All the challengers did was say that student groups should be run by people in their 20s, not by old Party hacks. As staffers, we were told that any international expenses should be charged to the Foundation for Youth and Student Affairs. "It was a front funded by the CIA," I explained. Fred relaxed a little. "A lot of bright young people were attracted to government back then," he said. "I still remember my interview (at the Agency). Very hush-hush. I was pledged to secrecy." He didn't even tell his family his true profession. Years ago, I told Fred, a friend who had served with the Office of Strategic Services (the CIA's predecessor) in Vienna confirmed that the United States had forced about 2 million anti-communist Russian refugees back into the Soviet Union. Stalin had them slaughtered or sent back to Siberia. A Soviet double agent in the CIA was key to FDR's complicity. "I worked in Europe. I'm ashamed about a lot that happened," Fred said. Fred regretted much of the Agency's domestic work, too. He knew that the CIA helped introduce LSD to the United States, hoping to use it as a truth serum. Two of my colleagues, I told him, were involved in private experiments secretly funded by the CIA in the early 1960s. One later blew his brains out. "The Summer of Love in San Francisco (in 1967) was a social experiment gone wild..." Fred volunteered. "It turns out my shrink sees several others with severe remorse about what happened, what they did." And with that, he received his ration of drugs and left. In his book "The Secret History of the CIA," journalist Joseph J. Trento interviews the CIA's legendary James Angleton, a smoker with terminal lung cancer "dying in total emotional isolation." "You know how I got to be in charge of counter-intelligence (for the Agency)?" Angleton asks. "I agreed not to polygraph or require detailed background checks on (CIA Director) Allen Dulles and 60 of his closest friends. "They were afraid that their own business dealings with Hitler's pals would come out. They were too arrogant to believe that the Russians would discover it all." Which the Russians did. The real problem, Angleton told Trento, was that "there was no accountability. And without real accountability everything turned to s---." "You know, the CIA got tens of thousands of brave people killed," Angleton said. "We played with lives as if we owned them. We gave false hope. We -- I -- so misjudged what happened." While Soviet agents penetrated both the CIA and FBI at extraordinarily high levels, their regime eventually crumbled in the face of more open, dynamic democracies. Now, in the wake of Sept. 11, a new generation of would-be recruits flocks to the Agency. Politicians scramble to provide it sweeping new domestic investigating authority. Legal and financial constraints are swept away. It's a great time to grab power and cloak it in secrecy. Who cares about old spies' remorse? Those in Congress who dare seek accountability for past intelligence failures are portrayed as aiding the terrorists. Beat the crowd. Sign up now. from Misanet/PNS info@w... © WOZA Internet (Pty) Ltd -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4628 From: James M. Atkinson Date: Thu Jan 24, 2002 10:04pm Subject: Which number applies to you? 1. There's always a lot to be thankful for if you take time to look for it. For example, I am sitting here thinking how nice it is that wrinkles don't hurt. 2. When I'm feeling down, I like to whistle. It makes the neighbor's dog that barks all the time run to the end of his chain and gag himself. 3. If you can't be kind, at least have the decency to be vague. 4. A penny saved is a government oversight. 5. The older you get, the tougher it is to lose weight, because by then your body and your fat are really good friends. 6. The easiest way to find something lost around the house is to buy a replacement. 7. He who hesitates is probably right. 8. If you can smile when things go wrong, you have someone in mind to blame. 9. The sole purpose of a child's middle name is so he can tell when he's really in trouble. 10. How long a minute is depends on what side of the bathroom door you're on. 11. If ignorance is bliss, why aren't more people happy? 12. Most of us go to our grave with our music still inside of us. 13. If Wal-Mart is lowering prices every day, how come nothing is free yet? 14. You may be only one person in the world, but you may also be the world to one person. 15. Some mistakes are too much fun to only make once. 16. Don't cry because it's over: smile because it happened. 17. We could learn a lot from crayons: some are sharp, some are pretty, some are dull, some have weird names, and all are different colors.. but they all have to learn to live in the same box. 18. Everything should be made as simple as possible, but no simpler. 19. A truly happy person is one who can enjoy the scenery on a detour. 20. Happiness comes through doors you didn't even know you left open. 21. Once over the hill, you pick up speed. 22. I love cooking with wine. Sometimes I even put it in the food. 23. If not for STRESS I'd have no energy at all. 24. Whatever hits the fan will not be evenly distributed. 25. Everyone has a photographic memory. Some just don't have film. 26. I know God won't give me more than I can handle. I just wish He didn't trust me so much. 27. You don't stop laughing because you grow old. You grow old because you stop laughing. 28. Dogs have owners. Cats have staff. 29. We cannot change the direction of the wind... but we can adjust our sails. 30. If the shoe fits......buy it in every color. 31. Have an awesome day, and know that someone has thought about you -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4629 From: James M. Atkinson Date: Thu Jan 24, 2002 10:34pm Subject: re: computer question David, Feel free to post information related the TSCM, but try to stay on topic. I would also point out that "secured" machine will also have their microphones and web cams deactivated and removed as well. -jma At 4:47 PM +0000 1/24/02, David Alexander wrote: >This is my area of expertise. I'm a computer security/Information Warfare >geek, not a 'bug-hunter' (no offence intended or implied). > >I'll give you the short answer: > >Yes, there is a system that allows LAN awakening and control of a PC. >This system normally depends on a special cable from the Network card to a >connector on the motherboard that awakens the PC. > >Any self-respecting company removes this cable to disable the facility as >the very first thing they do when the PC arrives as it is a massive security >hole and should never, ever be allowed to be active. Half of me wants to say >that any company that does not deserves everything they get, but that is >counter to the philosophy of this group. If your outfit has these cables in >place, get them removed ASAP, they are a hackers dream. > >On Windows 2000 and Windows XP (TM acknowledged) there is another way of >taking over a PC through the Netmeeting utility. Great for remote support >and software installations. The remote install function via network wake-up >is not needed due to something called Remote Install Server. I won't bore >you with the details here. > >If anyone has more questions I'd be happy to take them offline direct to my >e-mail address unless JMA thinks the info is of interest to all (your call) > >regards > >_____________________________ >David Alexander M.INSTIS >Global Client-Server, Communications >& Infrastructure Director > >Bookham Technology plc >Tel: +44 (0) 1235 837823 >Mobile: +44 (0) 7799 881284 >Fax: +44 (0) 1235 837201 >http://www.bookham.com -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4630 From: Paul Timmins Date: Thu Jan 24, 2002 11:31am Subject: Re: computer question parts 2 Last I knew, you needed line of sight to do this. So people don't notice suspicious vehicles (i.e. vans with no logos and no windows, not belonging to a neighbor) parked across the street in their neighborhoods? Plus last I knew, this was not something that is very trivial to do... -Paul At 11:52 AM 1/24/2002, you wrote: >Fibre-glass bodied van with aerial inside and you can sit some distance away >and see what's happening without entering premises and leaving a bug to be >found or anything to recover afterwards. > >Any surveillance team could do this...if they are not putz's (with >acknowledgement to the previous poster) 4631 From: enemyatthegate007 Date: Thu Jan 24, 2002 10:51pm Subject: not to knowledable what does wakening of the pc mean?im sory im sure its very basic but im trying to get my feet wet.this field is huge in knowledge and my hat is off to the operators in this field.im an executive protection specialist(bodyguard) and i stay keyed in a lot of areas(anti/counter terrorism)especially.but this field is very impressive.so once again if you here a lot of basic questions from me sorry trying to learn a little. james jones EPS chief of operations www.bodyguardinc.com 4632 From: James M. Atkinson Date: Thu Jan 24, 2002 11:04pm Subject: Re: computer question parts 2 Ah David, No offense, and I really hate to have to tell you tell this this, but let's just say that you may be experiencing a moment of dental distress caused by elements of your own footwear being lodged therein. Given the dimensions of a Yagi needed to efficiently intercept a baseband rasterized signal coming off a monitor the eavesdroppers would have be be less then 12 feet away, or use an antenna about 68 feet wide and 84 feet long. Also, while a Yagi is less directional then a small loop is does give use a more favorable usable angle but is wider band. The biggest problem with using a Yagi for something like this is the size and the relatively low frequencies involved, which you bet best handled by an equiangular antenna. It is a rather academic question: What frequencies does the monitor normally emit for radiated signals, and what is their wavelength... given this, consider the antenna parameters just to squeeze 20-24 dB over an isotropic out of the Yagi. Sure, we can stack Yagi's, but your going to have to use at least four units to make a appreciable difference. If you work out the timing signals from a monitor you will see that the majority of the raster is fairly limited and that a free space interception is tough unless you use a secondary carrier. Attempting to exploit the radiated emissions of a monitor, computer, laser printer, or other kind of digital device would strictly be used as a last result. It is far more effective to simply break in to the subjects home, plant some device which uses the power lines for the backdoor, and exit to a nearby listening post. You might want to visit the following link and brush up of some TEMPEST info: http://www.tscm.com/TSCM101tempest.html Only a surveillance team consisting of putz's would attempt an interception of this nature, but then DOJ is not well known for their ability to design and launch rockets. -jma At 4:52 PM +0000 1/24/02, David Alexander wrote: >There is a much simpler way that Ames could have been monitored - TEMPEST >emissions > >In case some of you are unaware, with a decent yagi and some software you >can see what someone's' PC is doing real-time while they are doing it. > >Fibre-glass bodied van with aerial inside and you can sit some distance away >and see what's happening without entering premises and leaving a bug to be >found or anything to recover afterwards. > >Any surveillance team could do this...if they are not putz's (with >acknowledgement to the previous poster) > >_____________________________ >David Alexander M.INSTIS >Global Client-Server, Communications >& Infrastructure Director > >Bookham Technology plc >Tel: +44 (0) 1235 837823 >Mobile: +44 (0) 7799 881284 >Fax: +44 (0) 1235 837201 >http://www.bookham.com -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4633 From: enemyatthegate007 Date: Thu Jan 24, 2002 11:15pm Subject: CIA remorse how does the cia find agents?i have read and seen documents but are they true?i know its a hush hush agency and i know they employ engineers,chemist,bio etc..and have a huge web site but what about other agents like espionage or other agents that just do spying.just wondering. james jones EPS www.bodyguardinc.com 4634 From: Ray Van Staden Date: Fri Jan 25, 2002 0:23am Subject: City's surveillance given international thumbs-up http://www.cbn.co.za/issue/1240202.htm City's surveillance given international thumbs-up CAPE TOWN's Strategic Surveillance Unit, which provides the closed-circuit TV monitors in the City centre and other locations, has been granted ISO 9001 accreditation by the International Standards Organisation in Switzerland. The Unit becomes the first law enforcement agency in South Africa to receive ISO 9001 accreditation, which gives global recognition of achievement of international standard. The Strategic Surveillance Unit is owned by the City of Cape Town and run and managed by City traffic and law enforcement officers. ISO 9001 accreditation is granted in recognition of the service rendered by the Unit having complied with internal standards both in the documentation of its procedures and in the observance and implementation of these, based on audits conducted by officials of the South African Bureau of Standards which is the accredited agent of ISO in the Republic. The presentation of ISO 9001 certification to the City will be made by Mr Tom Gash, Western Cape regional director of the SABS. The recipient, on behalf of the City, will be Councillor Ian Neilson, the City Council's Executive Committee member for Health and Safety. Councillor Neilson said today that the CCTV multiple camera system in Cape Town's central business district had proved its worth in the detection of crime-in-progress and had led to many arrests and prosecutions and a marked reduction in crime. The system had been expanded to camera surveillance of public places and roads in high-crime areas of the Cape Flats. More recently the Vanguard Drive surveillance system of Sun West had become incorporated in the system. The ISO 9001 accreditation came at a time when the City was changing the focus of camera surveillance from traditional crime-prevention pursuits, to the broader usage of the monitoring systems for the benefit of communities. The network provided visual information for use by the Council traffic and road branches in freeway management and the detection of traffic offenders. The cameras also provided information on informal traders, protest marches , advertising billboards and fire hazards. The City was constantly developing partnerships in this regard and the new status of the Strategic Surveillance Unit in terms of its ISO 9001 ranking would augur well for development in this regard and indirectly contribute to the process of developing Cape Town as a model city in global terms. --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 4635 From: A Grudko Date: Fri Jan 25, 2002 1:35am Subject: Siemens equip Sweeping a private residence yesterday I came across something new to me involving 2 Siemens Gigaset 1000s and one Gigaset 3000 Comfort cordless phones. I'd appreciate a private chat with anyone who is familiar with this equipment's normal operation. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4636 From: Brad Hayes Date: Fri Jan 25, 2002 7:02am Subject: Un-identified problem Dear Group, This is not a TSCM question per se but, with having a panel of electronic,electrical experts on this list I though some one may have an answer to this particular situation. Here goes. I have a client who beleives she may have a former employee stalking her, following her or conducting surveillance on her home. Prior to moving a couple of months ago, someone was ringing her doorbell early in the morning on a fairly consistent basis. She moves to the opposite side of town and the very next morning, her doorbell rings, again early in the morning.(6:00 a.m) I install two coverts cameras for her, one that has a commanding view covering the front of the home and the second that is disguised as a peephole so I can obtain video of the front door. A couple of days ago,she contacts me and says her doorbell rang on Sunday morning (8:00 a.m.) but nobody is at the door. Upon reviewing the tape, I see a vehicle pull up in front of her house at 5:00 a.m. and another vehicle enter the cul-de-sac around 8:00 a.m. Both vehicles stay momentarily and leave. My question is this. Is there any possible way that electrical or RF interference could trigger this doorbell? I examined both the doorbell and the unit mounted on the wall inside the condo. Being a condo, her neighbor is on the opposite end and therefor I want to rule out the neighbors doorbell reverberating thru the walls. Am I missing something here? This gal lives alone and was visibly spooked by the car in front of her house at 5:00 a.m. By the way, upon reviewing both tapes, no one gets out of the car and/or approaches the door. Thank you in advance for any insight on this matter. Brad American Investigation Group (317) 823-2677 ===== Brad Hayes American Investigation Group Investigations/Executive Protection Indianapolis, Indiana (317) 823-2677 __________________________________________________ Do You Yahoo!? Great stuff seeking new owners in Yahoo! Auctions! http://auctions.yahoo.com 4637 From: Hawkspirit Date: Fri Jan 25, 2002 9:09am Subject: Evaluation Form http://www.sci.ky/evalu.html 4638 From: James M. Atkinson Date: Fri Jan 25, 2002 9:03am Subject: Re: Un-identified problem I take it that her doorbell system is a wireless variety that is rather cheap in quality? If so, then it is likely that the front end of the receiver was simply being overloaded by strong RF fields operating on frequencies near that used by the door bell. Installing a hardwired doorbell sysetm may clear up the problem, but also make sure that the wiring for it is twisted pair. -jma At 5:02 AM -0800 1/25/02, Brad Hayes wrote: >Dear Group, >This is not a TSCM question per se but, with having a >panel of electronic,electrical experts on this list I >though some one may have an answer to this particular >situation. Here goes. I have a client who beleives she >may have a former employee stalking her, following her >or conducting surveillance on her home. Prior to >moving a couple of months ago, someone was ringing her >doorbell early in the morning on a fairly consistent >basis. She moves to the opposite side of town and the >very next morning, her doorbell rings, again early in >the morning.(6:00 a.m) I install two coverts cameras >for her, one that has a commanding view covering the >front of the home and the second that is disguised as >a peephole so I can obtain video of the front door. A >couple of days ago,she contacts me and says her >doorbell rang on Sunday morning (8:00 a.m.) but nobody >is at the door. Upon reviewing the tape, I see a >vehicle pull up in front of her house at 5:00 a.m. and >another vehicle enter the cul-de-sac around 8:00 a.m. >Both vehicles stay momentarily and leave. My question >is this. Is there any possible way that electrical or >RF interference could trigger this doorbell? I >examined both the doorbell and the unit mounted on the >wall inside the condo. Being a condo, her neighbor is >on the opposite end and therefor I want to rule out >the neighbors doorbell reverberating thru the walls. >Am I missing something here? This gal lives alone and >was visibly spooked by the car in front of her house >at 5:00 a.m. By the way, upon reviewing both tapes, no >one gets out of the car and/or approaches the door. >Thank you in advance for any insight on this matter. >Brad >American Investigation Group >(317) 823-2677 > > >===== >Brad Hayes >American Investigation Group >Investigations/Executive Protection >Indianapolis, Indiana >(317) 823-2677 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4639 From: Hawkspirit Date: Fri Jan 25, 2002 9:45am Subject: Masking products Any one have experience with these masking products? Roger http://www.streetsavvywares.com/BD_acoustic_generators.htm 4640 From: Hawkspirit Date: Fri Jan 25, 2002 10:00am Subject: Lets get educated! http://www.ipg-protect.com/doc021.htm Technical Security Specialist (TSS) - Advanced Level * (Tuition $1,575.00) TSCM Professional Services TSCM Documentation Counter Intelligence Survey TSCM Antenna Management Device Detection / Identification / Location PC Based Detection / Monitoring / Analysis / Documentation Panoramic RF Spectrum Analysis Broadband RF Near Field Receivers Very Low Frequency (VLF) Infrared (IR) / Laser Detection Non-Linear Junction Detectors Telephone Network / Equipment Inspection Computer Network Analysis Acoustical Leakage Inspection Time Domain Reflectometer (TDR) Radio Direction Finding Found Device Protocol Reports and Evidence Documentation * Topics and sub-topics are subject to on-going amendment and continued program development. Some topics and sub-topics are not indicated in the above outline. 4641 From: Hawkspirit Date: Fri Jan 25, 2002 10:05am Subject: Statistics http://www.ipg-protect.com/doc094.htm Our TSCM statistics last updated - October 2001 In 19% of these investigations, one or more actual functioning electronic devices were discovered and removed by our technicians, or we were able to verify a non-electronic compromise of confidential proprietary information. Of these investigations, 6% were of a domestic nature, and 12% were related to business interests or corporate affairs, and 1% were related to vehicle tracking technology or Emergency Locator Transmitters (ELT) and Emergency Position Indicating Radio Beacon (EPIRB). ∑ In 22% of the investigations, positive proof was discovered to indicate a device was present or had been removed prior to the investigation, or strong evidence suggested that a real compromise had indeed taken place. ∑ In 23% of the investigations the loss of information appeared real, however no specific evidence was discovered to confirm that a compromise had actually taken place. In 5% of these cases the client indicated making the call to our office from a area of compromise or discussing his / her suspicions with others. ∑ In 22% of the investigations conducted, no compromise could be proven and no evidence was discovered to confirm any compromise had taken place, however, in 16% of these inspections, the investigation was initiated by the client as a preventative measure, usually without any specific reason for initiating the investigation. ∑ In 14% of all investigations conducted, it appeared that the client's suspicions were unfounded, or as the result of a paranoid mind. In our best estimation, it would also appear that in approximately 65% of the TSCM services preformed by our technical personnel, the client was not totally forthcoming as to the real reason for contracting our services, and therefore the actual risk could not be established. Covert surveillance may be electronic in nature or by a wide range of intelligence gathering techniques. In fact, both of these methods are widely used in domestic spying, stalking incidents, gaining a business competitive advantage, labour disputes, or dissatisfied or disgruntled employees hoping to gain an edge within the work place environment. It is strongly recommended that all business environments regardless of size or perceived risk, consider an annual TSCM inspection and sweep as part of a long term due diligence with respect to the identification of technical security concerns. In fact, when proprietary information or research and development is a factor, various insurance policies require such inspections to be conducted in order to remain in force. 4642 From: Greg H. Walker, Attorney At Law Date: Fri Jan 25, 2002 9:58am Subject: Damage To Electronic Equipment I apologize if this has been posted before, however, I received this info today from a Project Manager at NASA who is a friend. Subject: Be careful shipping electronic parts through the mail At the JEDEC meeting it was mentioned several times that at least one company had lost functionality of some populated printed circuit boards sent through the U.S. mail. It seems that the post office is now E-beam irradiating all mail sent through area codes that feed mail into Washington DC to kill any potential "nasty bugs". That process can/will destroy active electronic devices. The word is: BUYER BEWARE WHEN SHIPPING ELECTRONIC PARTS THROUGH THE U.S. MAIL. Rather use Federal Express or another similar shipper. The JEDEC web page (www.jedec.org) provides more detail and in fact names a number of items that may be subject to damage. GREG -- Greg H. Walker Attorney At Law President RisKontroL -- Risk Management, Security Consulting & Investigations Houston, Texas (713) 850-0061 WARNING NOTICE BY GHW: Greg H. Walker's comments are not intended to be and should absolutely not be taken as legal advice. Unless you have entered into a specific written agreement with him for legal services, signed by both you and him, and paid him a retainer in good funds, then he is not your Attorney, does not intend to be your Attorney and you should not act nor refrain from acting based, in whole or in part, on his comments. 4643 From: Dr. Pepper Date: Fri Jan 25, 2002 10:04am Subject: RE: Un-identified problem jma, you are making unsubstantiated assumptions. And then taking off in that direction. A TDR would tell you about the door bell wiring. If it actually IS a wireless doorbell, then jma may be correct. Even if it is a hard wired bell, it could STILL be actuated by a ham radio or CB, however it is unlikely. The tip about checking the neighbors doorbell wiring might shed some light on the subject. -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ======================================== -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Friday, January 25, 2002 7:04 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Un-identified problem I take it that her doorbell system is a wireless variety that is rather cheap in quality? If so, then it is likely that the front end of the receiver was simply being overloaded by strong RF fields operating on frequencies near that used by the door bell. Installing a hardwired doorbell sysetm may clear up the problem, but also make sure that the wiring for it is twisted pair. -jma At 5:02 AM -0800 1/25/02, Brad Hayes wrote: >Dear Group, >This is not a TSCM question per se but, with having a >panel of electronic,electrical experts on this list I >though some one may have an answer to this particular >situation. Here goes. I have a client who beleives she >may have a former employee stalking her, following her >or conducting surveillance on her home. Prior to >moving a couple of months ago, someone was ringing her >doorbell early in the morning on a fairly consistent >basis. She moves to the opposite side of town and the >very next morning, her doorbell rings, again early in >the morning.(6:00 a.m) I install two coverts cameras >for her, one that has a commanding view covering the >front of the home and the second that is disguised as >a peephole so I can obtain video of the front door. A >couple of days ago,she contacts me and says her >doorbell rang on Sunday morning (8:00 a.m.) but nobody >is at the door. Upon reviewing the tape, I see a >vehicle pull up in front of her house at 5:00 a.m. and >another vehicle enter the cul-de-sac around 8:00 a.m. >Both vehicles stay momentarily and leave. My question >is this. Is there any possible way that electrical or >RF interference could trigger this doorbell? I >examined both the doorbell and the unit mounted on the >wall inside the condo. Being a condo, her neighbor is >on the opposite end and therefor I want to rule out >the neighbors doorbell reverberating thru the walls. >Am I missing something here? This gal lives alone and >was visibly spooked by the car in front of her house >at 5:00 a.m. By the way, upon reviewing both tapes, no >one gets out of the car and/or approaches the door. >Thank you in advance for any insight on this matter. >Brad >American Investigation Group >(317) 823-2677 > > >===== >Brad Hayes >American Investigation Group >Investigations/Executive Protection >Indianapolis, Indiana >(317) 823-2677 -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------- ------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4644 From: Hawkspirit Date: Fri Jan 25, 2002 10:15am Subject: Back in the USSR http://www.tradeport.org/ts/countries/russia/isa/isar0025.html 4645 From: Bryan Date: Fri Jan 25, 2002 8:32am Subject: Re: computer question - Dangling the Dongle On Wed, 23 Jan 2002, James M. Atkinson wrote: > Shawn, > > It's really no big mystery. > > Most computers have a specific key on the keyboard (or motherboard) > that when pressed allows the computer to wake up and go through a > boot. > > This function can be remotely controlled by installing a "remote boot > dongle" inside the keyboard, or inside the computer so an > eavesdropper can turn the computer on or off remotely. > > The dongle either turns the machine on/off at a preset time, waits > until a certain period of non usage has occurred, or wakes up in > response to a remote command. The remote activation command can come > in via any variety of conductors (phone line, power line, Cable TV, > LAN, etc) or though a wireless connection. A few novice questions about this: How is this device reached? What protocols does it use? With standard internet communication I understand that any machine(device) on the network must be bound by an IP address. That is how deviceA knows how to get to deviceB. If this device uses the computers power souce, would it not require the PC to alredy be on? Unless of course it had it's own power supply, but that would mean a much larger device, yes? > > Once the computer is up and booted the eavesdropper can then access > the OS remotely, and depending on which software they are using they > perform any number of tasks. OK, so we have a device that can power up the box....we still need an account on the box or the username/passwd. So given we installed a keylogger on the device, wait, no, we couldn't do that until we actually had access to the already booted and logged in machine/account. So far, to me, it seems we would have to gain physical access to the box while it is already running and with the user we want to monitor already logged in...or a root/admin account...which seems rather unlikely. Especially if they are hiding something or even just *slightly* security concious. Depending on the mission, it may be easier to just take a disk imager to the location and image the drive. Take it back to the lab and break it down there and perform forensics, etc... As you can see, I am a virgin to the TSCM world, so know very little about what is available and what can/cannot be done. But I am very curious! I apologize for the juvenile questions that probably could have been answered by doing a bit more research on my own. Thanks, Bryan > > Occasionally, you will come across such goodies on larger corporate > sweeps, and most often on servers, remote machines, or problem > children where the sys admin doesn't want to keep running to remote > parts of the campus to tweak software. Such a system allows the sys > admin to remotely wake-up or boot the machine in question and "do > those things which admins do so well". Usually on the corporate > sweeps the 'wake up" signal goes out though the LAN as a wake-up > packet addressed to the dongle, and more recently though a 802.11 > network. > > If the bug the FBI used on Ames utilized the power lines, then the > listening post would have to be fairly close to the Ames home as you > lose quite a bit of your signal at the distribution transformer. In > all probability they where camped out in a home nearby and simply > brought up the OS, and then issued basic DOS commands (from their > end) to browse through the hard drive and suck down files. After they > where done it would have been quite simple to shut the machine down. > > > -jma > > > PS: Ames was a putz, and didn't follow good tradecraft > > Technical Counterintelligence Rule #374 > Agent shall always turn of his/her computer when not in immediate > use, and shall remove the power cord from the wall and/or disengaged > the breaker on the individual UPS when the machine will not be in use > for more then two hours. In the event the agent does not have a > positive 7/24 security force in place the computer will also be > powered down and locked into an approved security container (such as > a safe) and physically disconnected from both the telephone circuits, > LAN circuits, and all other conductive or radiated paths. > > > > > > > At 12:32 AM -0500 1/23/02, Shawn Hughes wrote: > >I'm sitting here watching a show on cable ( I know). They are discussing > >the encroachment of surveillance by the gov against citizens. > > > >One detail they gave was on the Ames case. They stated that the FBI was > >remotely powering on Ames home computer, then subsequently removed data > >from, and powered it back down via the residential power lines. > > > >I am a little skeptical, unless they put a black box inside his pc. For > >instance, what kept ALL pc's on that transformer circuit from waking up? > > > >But, I am low on the knowledge base totem pole. What say ye, experts? > > > >Thanks! > > > >Shawn > > -- ------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell ------------------------------------------------------------------------- 4646 From: Date: Fri Jan 25, 2002 6:20am Subject: Re: Statistics In a message dated 1/25/02 8:02:50 AM Pacific Standard Time, hawkspirit@e... writes: << http://www.ipg-protect.com/doc094.htm Our TSCM statistics last updated - October 2001 In 19% of these investigations, one or more actual functioning electronic devices were discovered and removed by our technicians, or we were able to verify a non-electronic compromise of confidential proprietary information. >> Interesting statistics. 4647 From: Aimee Farr Date: Fri Jan 25, 2002 0:00pm Subject: RE: A spy's remorse - students should think twice about joining 'The Agency' > http://www.woza.co.za/jan02/cia24.htm > > A spy's remorse - students should think twice about joining 'The Agency' Anti-intelligence propaganda seems to be a hot item lately. Recent juror poll on surveillance and faith/trust in institutions: "Some 67 percent of those polled say they favor increased wiretap and Internet surveillance powers. Support on the issue broke down by age group, with 54 percent of potential jurors older than 65 supporting broader powers as compared to only 24 percent support among jurors between the ages of 18 and 24." FYI, in 1965, 61 percent of the American people approved Vietnam and only 24 percent were opposed. (The domestic scene went to Hell shortly thereafter.) At age 10, 60s radicals were watching the Mouseketeers. At age 10, the youth cohort mentioned above was playing a game called "Mortal Kombat." Polling on faith in federal institutions: http://pollingreport.com/institut.htm#Federal The unpredictability of our environment makes these statistics somewhat concerning. ~Aimee "You never beat us on the battlefield." "That may be so. But it's also irrelevant." 4648 From: Steve Uhrig Date: Fri Jan 25, 2002 1:13pm Subject: Re: Un-identified problem Once upon a midnight dreary, Brad Hayes pondered, weak and weary: > Prior to moving a couple of months ago, someone was ringing > her doorbell early in the morning on a fairly consistent > basis. She moves to the opposite side of town and the very > next morning, her doorbell rings, again early in the > morning.(6:00 a.m). A couple of days ago,she contacts me and > says her doorbell rang on Sunday morning (8:00 a.m.) but > nobody is at the door. Since it is unlikely she would move her doorbell from one house to the other, it seems highly unlikely any technical problems relating to the doorbell hardware would be the cause. Falsing a doorbell is extremely unlikely to start with. For it to happen in two different locations is practically beyond statistical probability. And since your video did not reveal anyone pushing the doorbell, this would indicate the problem is between her ears. Has anyone other than your client heard the doorbell ring at both locations at these weird hours? Almost certainly the answer is no. If you wanted to pursue it, you could put a min/max recording DVM (recent Fluke 87-III with time/date stamp) across the doorbell to see if any power is applied when it allegedly rang. The only possibility I can see is if the woman lives with someone hostile who is causing the bell to ring from inside the house, or possibly from outside with a short range radio link. Even though she moved and the very next morning heard the bell ring, how long might someone (son, husband) have had access to the new place before she moved in, to wire it. There was one instance of something vaguely related where the son wanted to have the mother committed for some reason or another. But situations like this are extremely rare, where mysterious phenomenon actually are manmade occurrences. Far more often, the problem is not physical in nature, but psychological. Many of us have had this sort of call, and beyond a certain point, that point being when signs point to the problem being in the client's head, you have to question whether you are acting ethically in continuing to work on the case and, especially, taking money for doing so. If you can calm her fears and give her the warm fuzzies in a kind manner, this likely is the best course of action. In any case, it probably would be wise to discontinue any involvement. People like this can be real energy soaks, and that is not the way to earn a living. Also, keep in mind, lunatics many times eventually get the attention of the authorities by wearing them down until they assign someone to research the matter so they can justify closing the case. You do not want to develop the local reputation with authorities of taking advantage of the lunatic by accepting money from him/her/it when signs seem pretty clear the person is a nut case. When I do mercy sweeps (one where the client is insisting on spending money, so I do the work just to make sure they get the real thing and are not totally ripped off), I charge a token amount. If I would do it for free, I would not be respected. If I charge a token amount, my conscience as well as my legal exposure is clear. When the lunatic goes to the authorities and mentions you swept them, you don't want the authorities asking you why you took advantage of the obvious lunatic by taking their money. It has happened to me, more than once. My reply is: Look. here are some recent (sanitized) invoices for the identical work showing I charge X thousands of dollars for similar work. I charged Miss Lunatic 5% of that amount. Is that taking advantage? Cover your six, always, in matters like this. Once I was accused of murder for not finding a bug which the lunatic was certain was there, therefore the stress created by being bugged which caused the father of Miss Lunatic to have a stroke was my fault. I was obviously incompetent because I didn't find the bug, so I get sued. Good thing I was able to demonstrate I was competent in TSCM and charged only a token amount, or I could have wasted a ton of money fighting crap like this. My contract now covers things like this without directly mentioning lunatics. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4649 From: Steve Uhrig Date: Fri Jan 25, 2002 3:12pm Subject: Excellent Frequency Allocation Chart Hi all, Here: http://www.ntia.doc.gov/osmhome/allochrt.pdf is an excellent, color, frequency allocation chart. Extremely detailed. A product of our tax dollars. If you have a color printer, it would be most useful. I am not sure how it would look printed in B&W. It would be a good thing to print and keep in one of the accessory pouches in one of your pieces of sweep gear. Or if you carry a laptop on sweeps, you could merely save the file to your local drive and call it up on the screen when needed. The chart likely would have some small (or large) differences in countries other than the U.S. It is in Adobe, so you will need that reader installed to open the file. i encourage anyone with earlier versions of Adobe Acrobat reader used for viewing PDF files ( versions prior to V5.00) to upgrade. The latest version of the free reader includes some nice features not available in earlier versions. www.adobe.com. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4650 From: Guy Urbina Date: Fri Jan 25, 2002 0:23pm Subject: Re: Un-identified problem Hi Brad, What type of doorbell system does the young woman have? Some wireless units can be falsely triggered. I had an idea that you could possibly gather some data by triggering your cameras whenever the doorbell rings. Or time stamp the doorbell and look for the event on video. Another idea, if you have the equipment, is to capture an event by monitoring the spectrum when the doorbell rings and look for spikes. Of course, this is to determine whether the actual culprit is the stalker and not some transient RF anomaly. best regards, -Guy 4651 From: enemyatthegate007 Date: Thu Jan 24, 2002 10:32pm Subject: hello my name is james jones an im new to the group.id like to say thanxs to the host for allowing me to be here.im so impressed by the survalliance field.its huge in knowledge and education.my hats off a thousand times to the operators in this field.im trying to get my feet wet but i cant fathom the education of it(huge).im an executive protection specialist(bodyguard) and i try to stay knowledgable in a lot of fields.if anyone has any tips please let me know. sincerely, james jones EPS www.bodyguardinc.com 4652 From: Steve Uhrig Date: Fri Jan 25, 2002 10:27pm Subject: Re: Damage To Electronic Equipment Once upon a midnight dreary, Greg H. Walker, Attorney At Law pondered, weak and weary: > I apologize if this has been posted before, however, I received > this info today from a Project Manager at NASA who is a friend. > Subject: Be careful shipping electronic parts through the mail Here is info sent to contractors of the FBI: ====================== The U.S. Postal Service (USPS) advised that certain types of incoming U.S. Government mail in zip code range 202-205 will continue to be for the foreseeable future irradiated in Lima, Ohio. As you are aware, FBIHQ's Zip Code is 20535, which falls in the category of mail being targeted for irradiation. The USPS advised that mail being irradiated include letters, flats, express and priority mail with stamps for postage, as well as other packages with stamps for postage. Mail from known mailers is not being irradiated, which includes USPS Express mail with meter strips or corporate accounts, priority mail with meter strips or permit indicia, all registered mail and bulk quantity mail such as catalogs and magazines. Because of the effects of irradiation, the USPS recommends that the following items should not be irradiated: Magnetic media (credit card, floppy disk, CD-ROM, etc); Plastics sensitive to heat and radiation warping that is a component of a device or instrument; Bacterial growth media for research and industry; Chemical and biochemical compounds for research and for industrial use; Electronics (to be evaluated); Organic clothing: silk, cotton, wool (need further analysis); Prescription or non-prescription pharmaceuticals; Vitamins; Baby formula; Photographic film (exposed and unexposed); Photosensitive film and paper; Consumer electronics; Clinical laboratory samples (biomedical) for analysis; Forensic evidence for analysis; Germinative matter (seeds, cuttings); Heat sensitive materials to include colorimetric heat tabs; Legitimate bacterial, viral, yeast (baking industry) and other cultures for medical, research and industrial use; Living matter, either plant or animal; Luminous material; Medical diagnostic kits and reagents; and Urine samples for drug analysis. Should you need to send correspondence or other items to U.S. Government facilities located in the above zip codes, you are to seek another method of shipment. Alternatives include USPS express mail with meter strips or corporate accounts, priority mail with meter strips or permit indicia, registered mail or private shipping companies such as FedEx, UPS, DHL, and Airborne. Significant backlogs are occurring at the USPS as a result of the irradiation process. These backlogs will continue for the foreseeable future until an additional irradiation facility is tested and opened in Bridgeport, New Jersey. =============== Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: SEAL Date: Fri Jan 25, 2002 5:48pm Subject: CIA enemyatthegate007 wrote: >how does the cia find agents?i have read and seen documents but are >they true?i know its a hush hush agency and i know they employ >engineers,chemist,bio etc..and have a huge web site but what about >other agents like espionage or other agents that just do spying.just >wondering. > > james jones > EPS www.bodyguardinc.com On the same path I am also curious regarding employment of Assets. I have always wanted to work for the Company as an agent but my Filipino citizenship forbids me. As I have no interest in p.i. work and law enforcement and operations in counterterrorism, drugtrade and criminal investigation/apprehension so my options are quite limited. However the CIA's sacrificial attitude in the use of assets is also a great cause of concern. Any thoughts on how to get into the "espionage" biz? What other intelligence services could be more "foreigner-friendly"? Another track I could take is to get a greencard by marriage and take up an intelligence related course or any course for that matter in a U.S. university then apply at the CIA. I am now 25 and working on my MBA thesis but I doubt if my Philippine Undergrad/Graduate degree would be given credit, hence the need to acquire a US degree which is required of all clandestine services applicants(?) Given the fact that I still have 10 years (35) to execute my plans, I am still looking for alternatives which I hope are "simpler" --------------------------------- Do You Yahoo!? Yahoo! Auctions Great stuff seeking new owners! Bid now! [Non-text portions of this message have been removed] 4654 From: Steve Uhrig Date: Fri Jan 25, 2002 10:43pm Subject: Re: CIA Once upon a midnight dreary, SEAL pondered, weak and weary: > On the same path I am also curious regarding employment of > Assets. I have always wanted to work for the Company as an agent > but my Filipino citizenship forbids me. If you have a skill or some sort of capability they need, they will find a way to put you on. Criminal records, drug addiction, questionable loyalty and a lot of other things don't get in the way of them employing someone who has something they want. You may not go on the official payroll with a full slate of formal bennies, but they can do it if they want to. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4655 From: William Knowles Date: Fri Jan 25, 2002 8:45pm Subject: Re: CIA remorse On Fri, 25 Jan 2002, Men in black helicopters forced enemyatthegate007 to write: > how does the cia find agents?i have read and seen documents but > are they true?i know its a hush hush agency and i know they employ > engineers,chemist,bio etc..and have a huge web site but what about > other agents like espionage or other agents that just do > spying.just wondering. The CIA agent John Spann that was killed was a U.S.M.C. Captain before becoming a field operative. Try CIA the website... http://www.odci.gov/cia/employment/ciaeindex.htm While you're at it, you can try some of the rest of the U.S. intelligence community. National Security Agency http://www.nsa.gov/programs/employ/ Defense Intelligence Agency http://www.dia.mil/Careers/index.html Federal Bureau of Investigation http://www.fbijobs.com National Imagery and Mapping Agency http://www.nima.mil/poc/employ.html U.S. Department of State http://www.state.gov/employment/ - WK *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 4656 From: Matthew Paulsen Date: Sat Jan 26, 2002 0:50am Subject: RE: Re: CIA [Steve Uhrig] You may not go on the official payroll with a full slate of formal bennies, but they can do it if they want to. [Matthew Paulsen] Sometimes this is as easy as being employed by a corp that is contracted with another corp that is contracted with them. I've had this exposure more than once to various agencies at various levels - eg: OSDOC, state, DISA/DITCO & DSS mil (under DoD). Still the same work, you just don't get the shiny tin star but there are less tangible benefits to this sort of employment and you tend to make really good money really fast since the budgets are extraordinarily high with very little accountability for what you're doing. Example - One place blew $125,000+ on 2 compaq 6000 servers for 7 developers (+ dev time, my team, infrastructure, transportation, etc.). Total waste of cash for what they were doing, but at $960/hr, I'm hard pressed to make a complaint with the accountant about the purchasing practices of the government. 4657 From: Dr. Pepper Date: Sat Jan 26, 2002 9:46am Subject: RE: Re: CIA In another life, , , , , , , , , , , In 1961, I was returning to the States from the Panama Canal Zone, and on a stopover at Guatemala City, I met an American guy at the Airport bar, and during the conversation, I mentioned that I had recently got out of the USAF, He asked me what my specialty was, and when I told him that I was a crew chief and flight engineer on B-26 aircraft, he offered me a job right on the spot. The Pay was $1000 per month, and since that was BiiiiiG money back then, and I was unemployed, I took him up on it. I spent a month living in tents in the bush at a mud airfield, living with snakes and very big spiders. I rapidly tired of this life, and took the supply truck back to G city on the next payday, and gave it up. The following day, The Guardia Nationale raided the camp and put everyone in jail. I missed that by a day. I didn't find out till much later that this was a CIA operation supporting the Bay of Pigs raid. I got my thousand bucks, but that's all. Oh well, such is life, , , , , , , Ron C. ====================================== -----Original Message----- From: Matthew Paulsen [mailto:mpaulsen6@a...] Sent: Friday, January 25, 2002 10:50 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Re: CIA [Steve Uhrig] You may not go on the official payroll with a full slate of formal bennies, but they can do it if they want to. [Matthew Paulsen] Sometimes this is as easy as being employed by a corp that is contracted with another corp that is contracted with them. I've had this exposure more than once to various agencies at various levels - eg: OSDOC, state, DISA/DITCO & DSS mil (under DoD). Still the same work, you just don't get the shiny tin star but there are less tangible benefits to this sort of employment and you tend to make really good money really fast since the budgets are extraordinarily high with very little accountability for what you're doing. Example - One place blew $125,000+ on 2 compaq 6000 servers for 7 developers (+ dev time, my team, infrastructure, transportation, etc.). Total waste of cash for what they were doing, but at $960/hr, I'm hard pressed to make a complaint with the accountant about the purchasing practices of the government. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4658 From: Hawkspirit Date: Sat Jan 26, 2002 11:12am Subject: Re: Un-identified problem From: "Steve Uhrig" Subject: Re: Un-identified problem Once upon a midnight dreary, Brad Hayes pondered, weak and weary: > Prior to moving a couple of months ago, someone was ringing > her doorbell early in the morning on a fairly consistent > basis. She moves to the opposite side of town and the very > next morning, her doorbell rings, again early in the > morning.(6:00 a.m). A couple of days ago,she contacts me and > says her doorbell rang on Sunday morning (8:00 a.m.) but > nobody is at the door. Since it is unlikely she would move her doorbell from one house to the other, it seems highly unlikely any technical problems relating to the doorbell hardware would be the cause. Since you are already running video tape in association with the video cameras, also run a microphone to the vicinity of the doorbell so the ring, if it happens gets on the audio. You may not want to tell the client and just do it. Then when you get the ring report and it is not on the audio track the gig is up. An in between the ear maintenance check is next. Roger 4659 From: ki4je Date: Sat Jan 26, 2002 6:50am Subject: Re: Un-identified problem Could either car have been a news paper delivery? Chucking the paper out of the window or just dropping a heavy Sunday paper in the driveway? 4660 From: Date: Sat Jan 26, 2002 1:35pm Subject: Re; Unidentified problem Once my aunts,who lived alone, apartment manager was sneaking into her residence at 5am in the morning and stealing things. He would look through the mail slot in the front door for an all clear ,while my aunt slept in the back room. All the relatives thought she was imagining things, or just misplacing items, "Poor Aunt Emma is losing it!". That is,until i happened to sleep overnite at her place , while she was in the hospital, to keep an eye on things and give her moral support. Sure enough, a little after 5 the mail slot opened and so did my eyes ,as i was sleeping on the couch. The manager denied everything, but after a short chase , the mystery was solved and my aunt was given a clean bill of healthy mind! Moral ; If they pay the fee, give the complainer,the benefit of the doubt,for free ! Either that or make them a nice aluminum foil conical hat ,to stop mind control radio waves! :>) HAVE A GREAT DAY !!! Please Note: No trees were destroyed in the sending of this contaminant free message We do concede, a significant number of electrons may have been inconvenienced. : >) 4661 From: Aimee Farr Date: Sat Jan 26, 2002 3:22pm Subject: RE: Re: CIA > living with snakes and very big > spiders. Fears The Harris Poll. July 15-20, 1999. N=1,015 adults nationwide. MoE ± 3 (total sample). THESE RESPONSES INDICATE PEOPLE THAT ARE VERY AFRAID (ALL Men Women) snakes 36 22 49 looking down from a great height 23 13 32 flying on an airplane 14 7 20 being alone in a forest 13 4 22 spiders and insects 12 4 19 mice 10 2 18 thunder and lightning 5 2 7 being alone in your home at night 3 1 5 being alone in an elevator 3 1 5 being in a big crowd of people 3 2 3 dogs 2 1 4 going out of your home at night 2 1 3 This why the snake is a good metaphor for treason, and why it's in those NCIX posters. No. 1-2 in most polls is the fear of public speaking, which is a fear with relevance to the recent loon discussions. You deal with people that seem "paranoid." This is a fear of normalcy. It's the technological equivalent of the fear of public speaking -- the fear of exposure, working off shame (the most powerful human emotion). _People are monitored_ at their worksites and everywhere they go. It's a sensitizing experience. Securing your services can be a sign of mental health, because these people are actually willing to take risk to address their fears. Also, the power of human perception is great. It could be that something is wrong somewhere, and they picking up signals in their environment, and translating it into a fear of surreptitious surveillance. They just need you to help them look in the right place. People use these metaphors in sales pitches to frame emotion, and as embedded commands to affect decision-making. If you give somebody the impression they are crawling with vipers, 36% of people will pay any amount to have you take care of the problem. Same thing with public speaking, which triggers fears of exposure. "They hide in the grass." (snake sublim) "Let's step back, and take a long look down at the problem." (fear of heights) "We certainly don't want your desk turned into a podium for a daily public address, do we?" (exposure) I realize this is snarky and ill-framed. But you get my point. Fear sales tactics are dangerous. Most of you come from tech-sci backgrounds, so you're very logical. Logic never got anybody to do a damn thing. People misperceive risk. "Showing" the risk, does not work. Logic does not overcome resistance, it enhances it. The immediate reaction of people to an argument or pressure is to prepare counterarguments. The more time they have to prepare, the more resistance you face. (This is one reason some reception rooms have distraction ploys.) Security practitioners that can use these tactics can better effect change and influence decision-makers. ~Aimee Embedded: "deal with people," "need to look," "take care of the problem," "you're very logical," "you face high resistance," ...."effect change and influence decision-makers." 4662 From: Agent Lovato Date: Sat Jan 26, 2002 1:33pm Subject: RE: computer question As far as remotely powering on/off a computer in anyones house it is a relatively simple task by default. By default, for years now computers have been shipping from the manufacturer with the bios set to, "wake on ring". So, if this were the case with the Ames computer all one needs to know is the phone # of the jack the computers modem is plugged in. Then just hack away to gain entrance. The other computers in the house were most likely not networked at the time and he most likely used this computer to telecommute and email etc.. It may have been more complicated but I doubt it. Although, the technology mentioned by Matthew Paulsen does exist and has been being worked on since at least the 1960's that I am aware of. Transmission of data over a carrier wave is not much different than the concept of shortwave radio with its side band frequencies. anyway, thats me 3cents. Matthew Paulsen wrote: The Ames case goes back to February, 1994 with Aldrich Ames, a counterintelligence officer with the CIA. In February, 1997 Ames plead guilt to committing espionage for Russia. From what I've been exposed to, various government and private groups have been developing alternative measure to pass information through alternate methods such as power lines and water, such as IC/SS PLC/SS circuits. IE:Intel, Itron, National Semi, Rockwell, Motorola, Cyplex, Daewoo, Now defunct Enron (and subsidiaries and subcontractors), etc. Power line theory for transmission of information for intercommunication between generating stations, substations and control rooms holds that this sort of espionage is feasible at lower levels down to the receiving devices - such as remote espionage of consumer television sets, etc. Further, this could be used for non-compliant networks which are operating antiquated systems - C64, Altos, TSR 80's, etc. Remote power switches are available commerically, so it is conceivable that one was used, but it would have to be planted and integrated into a LAN/WAN connection or remote dialup/LAN connection to work, or chips / circuits (ie: a board is installed in the PC, station, remote manager, etc). Baud rates vary depending on who you talk to as well as data transmission distances - I've seen 300bps to 1gb/s at distances of a few hundred yards to worldwide, and phy being water, fiber, cable, PL, etc. Outside this range, there are microchip capable devices that are available with no power supply source that are attachable, injected, injested, that can be worn, carried, etc, but this would not provide the scope of services that you are describing, and they are only for intermittent use, but are capable of being interfaced via RF and then to LAN/WAN for public transmission through PPTP / HTTP, etc over IP, IPX, whatever, for global communication. I've worked on some systems that have provided PL monitoring from centralize base stations for power utilities for automated billing and other services - downtimes, line failures, etc, which can be automated to interoperate with MRP/ERP systems and other systems, so it's not a hard feat to take that integration and migrate it from consumer/commerical applications to industrial and government espionage services. Minature digital transceivers based on these technologies are under development, and in use by some organizations, federal and otherwise. Normally though, it's easier to plant a trojan to access the system and manage remote booting, kslogging, etc, microphones, and any cameras if present. Guess it comes down to... It's easier, cheaper, and more reliable - "engineers viewpoint - It's not broken, so lets add more to it, vs 'normal' person viewpoint - it's not broken, so don't fix it" being a reasonable assumption. But, in the world of unlimited budgets without justification for expenses... who knows. Probably not much of an answer, but it's a start. If anyone else has other information, I'd be happy to find out what others have used/seen beyond what I have. -----Original Message----- From: Shawn Hughes [mailto:srh@e...] Sent: Tuesday, January 22, 2002 9:32 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] computer question I'm sitting here watching a show on cable ( I know). They are discussing the encroachment of surveillance by the gov against citizens. One detail they gave was on the Ames case. They stated that the FBI was remotely powering on Ames home computer, then subsequently removed data from, and powered it back down via the residential power lines. I am a little skeptical, unless they put a black box inside his pc. For instance, what kept ALL pc's on that transformer circuit from waking up? But, I am low on the knowledge base totem pole. What say ye, experts? Thanks! Shawn Yahoo! Groups Sponsor ADVERTISEMENT --------------------------------- Do You Yahoo!? Yahoo! Auctions Great stuff seeking new owners! Bid now! [Non-text portions of this message have been removed] 4663 From: James M. Atkinson Date: Sat Jan 26, 2002 4:46pm Subject: A spy thriller may be unfolding in New Jersey. http://www.nypost.com/business/38198.htm FBI RAIDS N.J. HIGH-TECH FIRM By CHRISTOPHER BYRON January 26, 2002 -- EXCLUSIVE A spy thriller may be unfolding in New Jersey. In a startling pre-dawn sweep of homes and offices yesterday morning, agents of the FBI fanned out through South Plainfield and surrounding towns to serve grand jury subpoenas on an estimated 20 different employees and officials of a Chinese-linked high-tech company named Multiplex, Inc. The subpoenas are thought to be related to a civil suit filed last August against Multiplex, Inc. by Agere Systems, Inc., the chip-making giant that is now in the process of being spun off from Lucent Technologies, Inc. Agere charged in the suit that Multiplex, Inc. had stolen various chips and related property from it as well as infringed on four of its patents. Several phone calls seeking comment from Multiplex, Inc. were not returned. But sources at the company said Multiplex has grown rapidly in the last year, and at least one of the company's top-selling items - something known as an EML Laser - is based on chips and technology that may have been improperly obtained from Agere. The devices are said to be manufactured at a sprawling 261,000 square foot complex of buildings in South Plainfield, the newest of which was opened only late in 2001. The Multiplex source said that one of the company's biggest customers was, until recently, JDS Uniphase, the once-high-flying fiber optics company. The source said Multiplex also has a contract with the U.S. Government. One subpoena summoned the recipient to appear before a federal grand jury in Newark, N.J. in the second week of February. Multiplex, Inc. was founded in 1997 by a former official at Bell Labs named Won T. Tsang, who had headed Bell's Semiconductor Photonics Department. Bell Labs, a unit of AT&T, was divested by the phone giant as part of its 1996 spin-off of Lucent Technologies. Lucent, in turn, is now spinning off its semiconductor operations under the Agere name. Multiplex's co-founder, Tawee Tanbun-Ek, hails from Thailand and Japan, and also was previous employed by Bell Labs and thereafter, Lucent. Other top officials at Multiplex include Liang Tzeng, another Bell Labs veteran. The company maintains an "office of new business development" in Xian Dai City, Beijing, China, but it is unclear exactly what business is conducted through that office. The company's board of directors include individuals from the Philippines and Taiwan. Multiplex, Inc. appears to have had very limited sources of identifiable funding prior to May of 2001. In May, however, the company raised $105 million in capital via Credit Suisse First Boston Co. and several investment funds. The company currently lists an individual named Bruce Bartlett, who manages several investment portfolios for the Oppenheimer Funds, Inc., as being a member of Multiplex's board of directors. Bartlett would not return calls regarding Multiplex, Inc., and an Oppenheimer spokesman answered "no comment" as to whether Bartlett had received a grand jury subpoena. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4664 From: Agent Lovato Date: Sat Jan 26, 2002 2:13pm Subject: RE: computer question As far as remotely powering on/off a computer in anyones house it is a relatively simple task by default. By default, for years now computers have been shipping from the manufacturer with the bios set to, "wake on ring". So, if this were the case with the Ames computer all one needs to know is the phone # of the jack the computers modem is plugged in. Then just hack away to gain entrance. The other computers in the house were most likely not networked at the time and he most likely used this computer to telecommute and email etc.. It may have been more complicated but I doubt it. Although, the technology mentioned by Matthew Paulsen does exist and has been being worked on since at least the 1960's that I am aware of. Transmission of data over a carrier wave is not much different than the concept of shortwave radio with its side band frequencies. anyway, thats me 3cents. Matthew Paulsen wrote: The Ames case goes back to February, 1994 with Aldrich Ames, a counterintelligence officer with the CIA. In February, 1997 Ames plead guilt to committing espionage for Russia. From what I've been exposed to, various government and private groups have been developing alternative measure to pass information through alternate methods such as power lines and water, such as IC/SS PLC/SS circuits. IE:Intel, Itron, National Semi, Rockwell, Motorola, Cyplex, Daewoo, Now defunct Enron (and subsidiaries and subcontractors), etc. Power line theory for transmission of information for intercommunication between generating stations, substations and control rooms holds that this sort of espionage is feasible at lower levels down to the receiving devices - such as remote espionage of consumer television sets, etc. Further, this could be used for non-compliant networks which are operating antiquated systems - C64, Altos, TSR 80's, etc. Remote power switches are available commerically, so it is conceivable that one was used, but it would have to be planted and integrated into a LAN/WAN connection or remote dialup/LAN connection to work, or chips / circuits (ie: a board is installed in the PC, station, remote manager, etc). Baud rates vary depending on who you talk to as well as data transmission distances - I've seen 300bps to 1gb/s at distances of a few hundred yards to worldwide, and phy being water, fiber, cable, PL, etc. Outside this range, there are microchip capable devices that are available with no power supply source that are attachable, injected, injested, that can be worn, carried, etc, but this would not provide the scope of services that you are describing, and they are only for intermittent use, but are capable of being interfaced via RF and then to LAN/WAN for public transmission through PPTP / HTTP, etc over IP, IPX, whatever, for global communication. I've worked on some systems that have provided PL monitoring from centralize base stations for power utilities for automated billing and other services - downtimes, line failures, etc, which can be automated to interoperate with MRP/ERP systems and other systems, so it's not a hard feat to take that integration and migrate it from consumer/commerical applications to industrial and government espionage services. Minature digital transceivers based on these technologies are under development, and in use by some organizations, federal and otherwise. Normally though, it's easier to plant a trojan to access the system and manage remote booting, kslogging, etc, microphones, and any cameras if present. Guess it comes down to... It's easier, cheaper, and more reliable - "engineers viewpoint - It's not broken, so lets add more to it, vs 'normal' person viewpoint - it's not broken, so don't fix it" being a reasonable assumption. But, in the world of unlimited budgets without justification for expenses... who knows. Probably not much of an answer, but it's a start. If anyone else has other information, I'd be happy to find out what others have used/seen beyond what I have. -----Original Message----- From: Shawn Hughes [mailto:srh@e...] Sent: Tuesday, January 22, 2002 9:32 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] computer question I'm sitting here watching a show on cable ( I know). They are discussing the encroachment of surveillance by the gov against citizens. One detail they gave was on the Ames case. They stated that the FBI was remotely powering on Ames home computer, then subsequently removed data from, and powered it back down via the residential power lines. I am a little skeptical, unless they put a black box inside his pc. For instance, what kept ALL pc's on that transformer circuit from waking up? But, I am low on the knowledge base totem pole. What say ye, experts? Thanks! Shawn Yahoo! Groups Sponsor ADVERTISEMENT --------------------------------- Do You Yahoo!? Yahoo! Auctions Great stuff seeking new owners! Bid now! [Non-text portions of this message have been removed] 4665 From: James M. Atkinson Date: Sat Jan 26, 2002 5:06pm Subject: Re: Masking products At 7:45 AM -0800 1/25/02, Hawkspirit wrote: >Any one have experience with these masking products? Roger > >http://www.streetsavvywares.com/BD_acoustic_generators.htm > The equipment is blatantly and grossly misrepresented, and there is good reason to belive they are thieves, con artists, and liars. Just for the record, the fools actually tried to steal from me, so beware. They appear to be able to toss around various buzzwords, but seem clueless about what is really going on. Really just another a disreputable Spy shop run by more money grabbing dirtbags in New York. Any other questions? -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4666 From: Shawn Hughes Date: Sat Jan 26, 2002 5:52pm Subject: ghost rings I still haven't heard if the lady's doorbell was wireless or not. If so, I would definately blame the doorbell. I think Steve hit a point when he said that the odds of it randomly happening in two places were remote. Well, I have used wireless doorbells on several temporary facilities, and had 'ghost rings'. Turned out a piece of equipment was putting out RF at a harmonic of the 'bells frequency, and would agitate the bell when it went through the warm or cooling off cycle. Did you ever check out the stalking ex employee angle? Shawn 4667 From: Date: Sat Jan 26, 2002 5:25pm Subject: Fwd: ghost rings A possible source, but less probable than the expert type opinions given concerning the noise, is that she could have moved the noise with her - that it is coming from an object other than doorbell but is being misintrepreted as doorbell - such as an alarm clock, a watch with an alarm, an appliance with timer or something like that? Al Reed [Non-text portions of this message have been removed] 4668 From: zack <10-33@c...> Date: Sat Jan 26, 2002 11:10pm Subject: Re: Doorbell I must be missing something. You of course have sound capacities on the cameras and have heard the doorbell ring ?? And the device is not wireless ??? Do you have motion sensors in addition........... if you have heard the doorbell, of course. At 07:19 AM 1/26/2002 +0000, you wrote: >Prior to > >moving a couple of months ago, someone was ringing her > >doorbell early in the morning on a fairly consistent > >basis. She moves to the opposite side of town and the > >very next morning, her doorbell rings, again early in > >the morning.(6:00 a.m) I install two coverts cameras > >for her, one that has a commanding view covering the > >front of the home and the second that is disguised as > >a peephole so I can obtain video of the front door. A > >couple of days ago,she contacts me and says her > >doorbell rang on Sunday morning (8:00 a.m.) but nobody visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." George W Bush President of the United States of America God Bless The USA .. NEVER forget 9-11-01 http://www.copscops.com/blessusa.htm [Non-text portions of this message have been removed] 4669 From: Steve Uhrig Date: Sun Jan 27, 2002 9:16am Subject: Latest on Nigerian Scams Hi all, The latest twist on the Nigerian scams is targeting security companies. Just like CCS, these clowns target the naive hopeful wanting to get involved in international affairs without paying their dues. Use your DELETE key if you get something like the following: ====================== Dear Sir, Our company, Pro-Development Konsult, handles consultancy services for private individuals, corporate organisations and government agencies, in Nigeria - where we are based - and from other parts of the African continent. The Attorney-General and Minister of Justice of Nigeria, Chief Bola Ige, was murdered in his bedroom in the night of December 23, 2001 -visit www.nigeria.com. The assassinated federal law officer who fought for the enthronement of democracy in Nigeria is one of the best politicians that Nigeria has ever produced since her independence in 1960. In order to forestall this dastardly act, the government has decided to improve the security within the homes and offices of all the members of the lower and upper houses of parliament, as well as in the homes and offices of other senior government functionaries. Our company has therefore been nominated, along with other consulting and brokerage firms, to invite tenders from experts on security and surveillance matters. Such experts and suppliers will be required: ======================= They will string you along, pump your ego, claim to want to wire you a retainer, and request your bank information. Then things slide into the regular M.O. of these scams from there on. The above message, or anything like it, is completely phony and should be disregarded. Headers are forged, which in itself should raise red flags. The above originated from outblaze.com. If it sounds too good to be true, it is. Obviously enough people don't realize this or these Nigeriam scams would have died fifteen years ago when they started. Instead, with the advent of email, they're able to hit more and more people cheaper and quicker. A few years ago, I had a legitimate order from the Nigerian government. I put the poor guy through the wringer so many times and in 19 different directions, but he patiently cooperated because he knew the reputation which preceded him. We ended up being friends, and when I apologized months later for giving him the Spanish Inquisition, he said he understood and was embarrassed so many of his countrymen were involved in these scams. But most of them are scams, and the likelihood of running into a genuine requirement and an honest deal are practically nonexistent. If you think a rare opportunity to make easy money has found you, you're probably wrong. Even God says it in the Bible, 'By the sweat of thy brow thy shall earn thy bread'. Remember that when any of these get rich quick schemes come along. That applies to lottery tickets too, BTW. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4670 From: James M. Atkinson Date: Sun Jan 27, 2002 9:51am Subject: CIA helps museum open door on spying http://www.portal.telegraph.co.uk/news/main.jhtml?xml=/news/2002/01/27/wspy27.xml&sSheet=/portal/2002/01/27/por_right.html CIA helps museum open door on spying By David Wastell in Washington (Filed: 27/01/2002) THE long shadows of some of the world's most notorious spies and double-agents, from Anthony Blunt to Aldrich Ames, will be cast over Washington in June with the opening of the world's largest museum dedicated to the history of espionage. Former members of the KGB and CIA have been recruited to give advice on exhibits ranging from special "escape boots" designed for British pilots in the Second World War to a concealed camera used to monitor East German hotel bedrooms. In a city that has seen more than its fair share of spies and is still, presumably, home to hundreds of them, the museum will acknowledge the work done by the world's secret agents and by America's much-maligned L21 billion-a-year intelligence effort. "Intelligence officers do not usually want or seek banner headlines," said Peter Earnest, a former career CIA officer who spent 20 years running clandestine networks behind the Iron Curtain. "The Cold War was an intelligence war, and it was intelligence that stopped it from becoming a hot war, but there were no parades of intelligence officers at the end of it. "People often talk about intelligence failures but they don't hear about many of the successes - embassies that have not been bombed, airports that have not been attacked - and one of our aims is to get people thinking about the role that intelligence has played in history." Officially, the CIA has no view on the museum, which will be housed in a group of 100-year-old buildings in what was once the bustling heart of Washington. Unofficially, the agency, whose headquarters are a few miles up the Potomac River in Langley, Virginia, has been encouraging it. As well as Mr Earnest, who is the museum's executive director, members of its advisory board include Judge William Webster, the former director of the FBI and CIA, Antonio Mendez, who was the CIA's chief of disguise, and a string of other intelligence experts. For balance, there is one Briton, Christopher Andrew, the spy historian, and a Russian who defected: Oleg Kalugin, a former KGB major-general who ran the Soviets' counter-intelligence wing. The museum is being financed by Milton Maltz, a wealthy broadcasting executive and businessman of Cleveland, Ohio, who once worked in America's National Security Agency. Many more spies and former spies, including some still in prison, have been interviewed on video to provide realistic accounts of their operations. The museum will acknowledge British and American traitors, including Blunt, who was stripped of his knighthood when revealed as a double-agent, and Ames, regarded as the most damaging CIA turncoat for his betrayal to the Russians of dozens of American agents, many of whom were executed. It will also examine the spycraft of the traitor Robert Hanssen, who overlooked the site of the new museum from his fourth-floor office at FBI headquarters until he was arrested, last February, for selling secrets to Moscow for 15 years. Hanssen used what Mr Earnest described as "classic techniques" to pass information to his KGB contacts, such as secret "dead drops" for leaving documents in parks and public places in the Washington area. Artefacts on display will include a "Kiss of Death" KGB lipstick tube, designed to fire a single bullet when twisted, an Enigma code-breaking machine and a range of fake warts used to smuggle microdots of secret information. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4671 From: Brad Hayes Date: Sun Jan 27, 2002 8:48am Subject: Doorbell rings Dear Group, I wanted to take a moment to thank you for all of the expert input on my recent "doorbell" situation. I received many good suggestions. Just for the record, this is a hardwired doorbell. I didn't think this situation was plausible, but then again, I had to eliminate any chance of a remotely triggered device. I am now thinking there may be "other" possibilites to take under consideration. Second, I've noticed that Riser-Bond produces a couple of small portable TDR's cased in a vinyl pouch. Are these acceptable for TSCM or would you reccommend one of their larger units? I used the larger unit in a Texas A&M telephone class and was impressed with its accuracy. Having sold my gear acouple of years ago, I am reconsidering putting a basic package together as the funds become available. Also interested in which model of fluke multimeter the guys in the field are using. Thank you all again for your expertise. With respect, Brad Hayes ===== Brad Hayes American Investigation Group Investigations/Executive Protection Indianapolis, Indiana (317) 823-2677 __________________________________________________ Do You Yahoo!? Great stuff seeking new owners in Yahoo! Auctions! http://auctions.yahoo.com 4672 From: John Savage Date: Sun Jan 27, 2002 1:52pm Subject: MLPIA Swap Meet PRESS RELEASE: MLPIA 2002 GENERAL MEETING & P.I. SWAP MEET The Maine Licensed Private Investigators Association (MLPIA), Maine's premiere association of private investigation professionals, wishes to announce their first annual, never before, really big, huge and overblown. MLPIA 2002 P.I. SWAP MEET TO BE HELD ON FRIDAY, FEBRUARY 8, 2002 BEGINNING AT 5:00 TIL 8:??pm AT THE ELKS CLUB OUTBOUND CIVIC CENTER DRIVE AUGUSTA, MAINE RSVP: MLPIA@A... OR MLPIA, PO BOX 1645, PORTLAND, MAINE 04104-1645 Get your old "stuff" outta the back room and trade, swap, donate or whatever that piece of equipment, book, camera, cassette, phone system, etc., etc., etc. There will be more goodies then you ever thought possible and, for only a nominal service charge of $10.50, all this can be yours including a buffet, product demos, door prizes, raffles and much, much, more. Our membership drive will be kicked of by this monumental event, so you can't miss this one! Meet new friends, say hello to friends you haven't seen for a while and, most importantly, find that something you really want. (or get rid of it) BUY IT SELL IT, TRADE IT, DONATE IT OR AUCTION IT OFF FOR A GOOD CAUSE! PUSH IT, TOW IT OR JUST BRING IT. PS- ANY REAL OR IMAGINED REFERENCE TO JOLLY JOHN IS PURELY FICTIONAL! --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.317 / Virus Database: 176 - Release Date: 1/21/02 4673 From: Date: Sun Jan 27, 2002 7:01am Subject: TEL "RING" QUESTION During any given 24 hr period...the following occurs: --incoming phone call--caller ID always blocked--phone answered--NOT a sound. This occurs approx 12 plus times w/the majority of "incoming" during the 0700-1700 hr period. Rarely 1700-0700. BUT, it does occur during those hours as well. --*68 nothing --phone co security can't(?) ID the prob..or answer the why? question --different issue--random faxes coming in on "home" line--(prob solicitation)--immediately fwd to fax line with no capture-receive. Initially, we thought that the telco was doing some routine line cks..but this has been going on for several YEARS! Any thoughts or fixes? Bill Schneid, Ph.D. Criminologist Director of Special Operations GLOBAL PROJECTS, LTD. Investigative Research Analysts "tempus omnia revelat" Marina del Rey, California http://globalprojectsltd.com 4674 From: James M. Atkinson Date: Sun Jan 27, 2002 2:40pm Subject: I wish you enough I was not the author of the following, but it is my honor to post it to this list. -jma I WISH YOU ENOUGH At an airport I overheard a father and daughter in their last moments together. They had announced her plane's departure and standing near the security gate, they hugged and he said, "I love you. I wish you enough." She said, "Daddy, our life together has been more than enough. Your love is all I ever needed. I wish you enough, too, Daddy." They kissed good-bye and she left. He walked over toward the window where I was seated. Standing there I could see he wanted and needed to cry. I tried not to intrude on his privacy, but he welcomed me in by asking, "Did you ever say good-bye to someone knowing it would be forever?" "Yes, I have," I replied. Saying that brought back memories I had of expressing my love and appreciation for all my Dad had done for me. Recognizing that his days were limited, I took the time to tell him face to face how much he meant to me. So I knew what this man was experiencing. "Forgive me for asking, but why is this a forever good- bye?" I asked. "I am old and she lives much too far away. I have challenges ahead and the reality is, her next trip back will be for my funeral, " he said. "When you were saying good-bye I heard you say, 'I wish you enough." May I ask what that means?" He began to smile. "That's a wish that has been handed down from other generations. My parents used to say it to everyone." He paused for a moment and looking up as if trying to remember it in detail, he smiled even more. "When we said 'I wish you enough,' we were wanting the other person to have a life filled with enough good things to sustain them," he continued and then turning toward me he shared the following as if he were reciting it from memory. "I wish you enough sun to keep your attitude bright. I wish you enough rain to appreciate the sun more. I wish you enough happiness to keep your spirit alive. I wish you enough pain so that the smallest joys in life appear much bigger. I wish you enough gain to satisfy your wanting. I wish you enough loss to appreciate all that you possess. I wish enough "Hello's" to get you through the final "Good-bye." He then began to sob and walked away. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4675 From: Date: Sun Jan 27, 2002 11:00am Subject: Re: TEL "RING" QUESTION In a message dated 1/27/02 12:34:52 PM Pacific Standard Time, sleuthone@a... writes: << During any given 24 hr period...the following occurs: >> What's the name of the Telco? M. 4676 From: Steve Uhrig Date: Sun Jan 27, 2002 10:27pm Subject: Re: TDRs available to the list Once upon a midnight dreary, Brad Hayes pondered, weak and weary: > Second, I've noticed that Riser-Bond produces a couple of > small portable TDR's cased in a vinyl pouch. Are these > acceptable for TSCM or would you reccommend one of their > larger units? The vinyl pouch ones are not suitable. The 2401B+ (padded case) is an adequate ping box for simple TSCM. The fancier Riser Bond with the integral display are nicer, but more expensive. The major difference is you can set different pulse rates, different impedances, and can store traces digitally and dump them into a computer or print them later back at the office. I have plenty of all models of Riser Bond TDRs used in excellent condition if anyone is interested in a decent TDR. All have new or recent batteries, have passed calibration, have manuals and usually cable sets, and guarantees. Contact me for info. I take credit cards. > I used the larger unit in a Texas A&M telephone class and was > impressed with its accuracy. Even the little ones are accurate and adequate for most TSCM. The larger ones are nicer if you can afford them, but many thousands of sweeps have been done properly with the small 2401B. > Also interested in which model of fluke multimeter the guys in > the field are using. The Fluke 87-IV is the industry standard. Actually, any of the Fluke 87s are OK, but the newer ones have time/date stamping of min/max, a better warranty and wider ranges. If you can find any Fluke 87 used, of any iteration, it will serve you well. To continue the commercial message, I also have two Fluke 87 original models available, one well used but perfect, other practically unused, both with manuals, leads and pouches. Have one CPM-700 practically new with accessories not listed on the page. Also have unblocked ICOM R100 and R8500 receivers (meaning they cover the 800-900 megacycle range where cellular lives which is blocked in most receivers). Other used TSCM and related equipment is on my used equipment page: http://www.swssec.com/used.html Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4677 From: David Miller Date: Mon Jan 28, 2002 0:21am Subject: (off topic) you are in.... You're on the West Coast when . . . You make over $250,000 and still can't afford to buy your own house. The high school quarterback calls a time-out to answer his cell phone. The fastest part of your commute is going down your driveway. You know how to eat an artichoke. You drive to your neighborhood block party. ================================ You're in New York when . . . You say "the city" and expect everyone to know you mean Manhattan. You have never been to the Statue of Liberty or the Empire State Building. You can get into a four-hour argument about how to get from Columbus Circle to Battery Park, but can't find Wisconsin on a map. You think Central Park is "nature." You believe that being able to swear at people in their own language makes you multi-lingual. You've ever worn out a car horn. You think eye contact is an act of aggression. ================================= You're in Alaska when . . . You only have four spices: salt, pepper, ketchup and Tabasco. Halloween costumes fit over parkas. You have more than one recipe for moose. Sexy lingerie is anything flannel with less than eight buttons. The four seasons are: almost winter, winter, still winter, and construction. ================================= You're in the South when . . . You get a movie and bait in the same store. "Y'all" is singular and "all y'all" is plural. After a year you still hear, "You ain't from 'round here, are ya?" "he needed killin' " is a valid defense. ================================ You're in Colorado when . . . You carry your $3,000 mountain bike atop your $500 car. You tell your husband to pick up Granola on his way home and he stops at the day care. A pass does not involve a football or dating. The top of your head is bald, but you still have a ponytail. Your bridal registry is at REI. =============================== You're in the Midwest when . . . You've never met any celebrities, but the mayor knows your name. Your idea of a traffic jam is ten cars waiting to pass a tractor. You have had to switch from "heat" to "A/C" on the same day. You end sentences with a preposition: "Where's my coat at?" or "If you go to the mall, I wanna go with.." Your first job was detasseling. When asked how your trip was to any exotic place, you say, "It was different." 4678 From: James M. Atkinson Date: Mon Jan 28, 2002 6:45am Subject: Telephone tapping and mail-opening figures 1937-2000 (Compiled by Statewatch) http://www.statewatch.org/news/DOCS/Teltap1.htm Telephone tapping and mail-opening figures 1937-2000 (Compiled by Statewatch) ------------------------------------------------------------------------ The total figure for warrants issued for telephone tapping and mail-opening in the year 2000 for England and Wales was 1,608. This represents a slight drop on the previous year (1,734) but the 2000 figures are the third highest total in peacetime. In Scotland the total figure was 292 warrants, the highest ever.(Source: Regulation of Investigatory Powers Act 2000, Report of the Interception of Communications Commissioner, October 2001, Cm 5296) The chart below gives the figures for the number of warrants issued for telephone tapping and mail-opening issued by the Home Secretary for the period 1937-2000 in England and Wales; the warrants issued by the Secretary of State for Scotland between 1967-2000; and the number issued by the Foreign Secretary between 1980-1984. Some general observations can be made: 1) 1955 was the first year that the number of warrants issued for telephone-tapping was greater than those for mail-opening; 2) The record number of warrants issued in 1940 a total of 1,682 was exceeded for the first time in 1998 with 1,763 warrants being issued; 3) The high number of warrants between 1939-1941 is clearly attributable to the beginning of the Second World War; the rise in 1948 to the beginning of the Cold War and strikes, the post-war low point of 238 total warrants was in 1958 with the rise between 1971-1975 being due to industrial action combined with Cold War paranoia. 4) The total number of warrants was pretty steady in the 400's from 1976 until 1991. Thereafter the number of warrants has risen significantly. ENGLAND & WALES: YearTelephone tapping warrantsMail opening warrantsTotal 193717556573 193820710730 1939299731,002 19401251,5571,682 19411808621,042 1942164514678 1943126329455 1944102213315 19455690146 194673139212 1947110190300 1948103870973 1949133641774 1950179356535 1951177486663 1952173462635 1953202459661 1954222227449 1955241205446 1956159183342 1957n/an/an/a 1958129109238 1959159101260 1960195110305 196118375258 196224296338 1963270128398 1964253120373 196529993392 [1] 1966318139457 196730792399 196833383416 196937793470 1970395104499 197141886504 197241395508 197342473497 197443693529 197546893561 197641062472 197740784491 197842844472 197941152463 198041439453 [2] 198140246448 198237954433 198337253415 198435239391 198540340443 198657395668 [3] 198743834472 198841248460 198942731458 199047342515 199167062732 1992756118874 1993893105998 199487176947 199591087997 19961,073691,142 19971.391651,456 19981,6461171,763 19991,645891,734 20001,559491,608 [1] This figure is wrongly given as 382 in Cmnd. 7873 [2] Cmnd 9438 states in the figures between 1980-1984 excludes warrants issued under the 1920 Official Secrets Act. [3] The Report of the Commissioner for 1998 states in para.6 that the high figure for this year "is explained by the need to replace all the outstanding non-statutory warrants when the new Act came into force". SCOTLAND: Year Telephone tapping warrants Mail-opening warrants Total warrants issued for the year 19673-3 196810-10 19698-8 197014-14 197110212 197215-15 197320-20 197433538 197541-41 197641-41 197752355 197842-42 197956-56 198050-50 198149-49 198279281 198353154 198471475 198559968 198684488 [1] 198754357 198854559 198963164 199066266 199181182 199287592 199311210122 19949010100 19951371138 19962280228 19972560256 19982671268 1999288-288 2000292-292 [1] The Report of the Commissioner for 1998 states in para.6 that the high figure for this year "is explained by the need to replace all the outstanding non-statutory warrants when the new Act came into force". [2] It is noticeable that several of the rises in Scotland, especially for warrants to open letters, occurs during years when strikes played an important role, e.g. 1971, 1974, 1977, 1984 and 1985. It is also apparent that the overall figures for Scotland rose significantly during the 1980s (over the 1970s). Foreign Secretary:Year [1][2]Telephone tapping warrants Mail-opening warrantsTotal 1980136-136 1981101-101 198292-92 1983109-109 1984115-115 [1] Figures for warrants issued by the Foreign Secretary have not been issued since 1984. [2] The Report of the Commissioner for 1990 it states that it would be against the public interest to publish the number of warrants issued by the Foreign Secretary and the Secretary of State for Northern Ireland. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4679 From: James M. Atkinson Date: Mon Jan 28, 2002 6:57am Subject: China swept jet for bugs while in San Antonio, Texas [I would point out that the plane was likely bugged while on the ground in the US, but that the "traveling" Chinese TSCM folks are unable to find anything but the most primitive bugs and would not be able to properly sweep the plane until it got back to China. This is a good example as to why bug sweeps should be left to competent TSCM professionals. ] http://news.mysanantonio.com/story.cfm?xla=saen&xlc=585284 China swept jet for bugs while in S.A. By Sig Christenson EN Military Writer Web Posted : 01/21/2002 12:00 AM © 2002 San Antonio Express-News Chinese security experts armed with debugging equipment swept a Boeing 767-300ER three times before it left San Antonio for Beijing, where it was to be used by President Jiang Zemin, the San Antonio Express-News has learned. Security crews entered the plane each time it landed at San Antonio International Airport following shakedown flights last August, said Andy Kidd, who led a Dee Howard maintenance crew that helped put the plane back in the air after 10 months in an Alamo City hangar. During one sweep, Kidd took a call from a telephone outside the airplane and was later questioned about it by a Chinese agent who insinuated the conversation had been picked up. "I was totally shocked," Kidd, a senior aircraft mechanic with 20 years in the business, said Sunday. "I mean, it was an invasion of my privacy." Revelations that the plane was debugged while in San Antonio marked a new twist in the story and confirmed a recent report, made by a project insider, that electronics experts had gone over the jet before it was delivered to Beijing in mid-August. But Kidd's comments deepened the mystery of how, when or even if electronic listening devices were put on the wide-bodied jet, and who might have been behind the action. It raised more questions, too, about the arrests of 23 people - 21 of them from China's air force - in the wake of the reported bugging. "It's not out of the question that those listening devices could have been planted in China," said former Tennessee senator and U.S. Ambassador to China James Sasser. "But that doesn't necessarily mean they would have been planted by Chinese, he said, explaining that the Russians put transmitters on Beijing's planes years ago. "It could have been other groups doing it." Dee Howard and Gore Design Completions modified the jet at San Antonio International Airport last year. It was flown to an airfield near Beijing, where Chinese communications experts found 27 high-tech listening devices on board last October, the Washington Post reported last week. Those devices included transmitters in the presidential bathroom, the Post said, and in the headboard of Jiang's bed. Beijing has not protested to Washington or to officials with Gore Design and Dee Howard. The Chinese Embassy in Washington did not comment Sunday, and the White House failed to return a phone call. Two top administration officials, Secretary of State Colin Powell and Defense Secretary Donald Rumsfeld, said they knew nothing of U.S. involvement but didn't elaborate. Powell, appearing on ABC's "This Week," said the subject had "never been raised" in talks he's had with Chinese officials in recent months. Kidd, a 38-year-old father of two young girls, said he contacted the Express-News because he was tired of seeing Dee Howard "get bashed" in the media. "There's 400 people left there in that place that are trying to hang on for their jobs," he said. Dee Howard's Phil O'Connor, who has been designated by the firm to talk with the media, was ill and could not be reached. Gore Design President Jerry Gore said he was unaware of the debugging effort, but conceded it could have occurred. He also said transmitters might have been installed by the Chinese, and noted there were times when Chinese army troops were the only ones around the presidential plane. "There are competing factions within the Chinese military and government. It is very possible that they could have been the ones who did this," Gore said. "Theoretically it's possible that U.S. intelligence recruited people within the Chinese government to help," speculated James Bamford, author of two best sellers on the secretive National Security Agency. "That's what the CIA's job is to do." Kidd, a senior aircraft mechanic, saw the debugging crews at the end of a monthlong restoration of the plane he led. As he and two others got the plane ready to fly after nearly a year in storage, Kidd said he was under constant Chinese scrutiny. "Without a doubt I felt like (I was) being watched," Kidd said. "Any panel or door or anything we opened on the aircraft, any operational checks I performed on the aircraft, I had a PLA official over my shoulder." Security was a top priority. A 6-foot tall chain-link fence was erected around the jet the day it arrived in San Antonio - July 5, 2000. Kidd said that was the first time in his four years with Dee Howard that the company had put up a fence around such an aircraft. Chinese troops flew with the plane after it left a Boeing plant in Everett, Wash., for South Texas, and remained until it left here Aug. 10. About 25 Chinese troops wearing civilian clothes were posted to the hangar on an around-the-clock basis. Those working on the plane wore color-coded badges. Anyone entering or leaving the jet had to sign a logbook at a security checkpoint. Dee Howard security guards worked elsewhere at the facility while airport police patrolled the area outside. Workers signing the logbook had to check off a "yes/no" box indicating if they were taking tools on board, Kidd said. Visitors to the hangar had to be cleared by Dee Howard security and the Chinese, and workers were not allowed to take cameras, radios or tape players into the airplane. The Chinese were "worried about possible sabotage acts," Kidd said, adding that he and other workers were cautioned "to maintain a professional attitude, basically make no terroristic comments, so to speak." Kidd said he was part of a ground crew that tested the plane before its first flight out of the hangar. Three test flights ran from Aug. 6-10, with the Boeing 767 returning to San Antonio International each time. Once the plane was down, he continued, three to five Chinese men in plain clothes would board it, taking a briefcase-sized black box with them. They finished 20 to 30 minutes later. Echoing his bosses and Gore Design executives, Kidd said there was no way the plane could have been bugged while in San Antonio - unless the Chinese themselves were doing it. "I don't think it was an American agency that did it," he said. "If anyone had more access to the aircraft, it was the Chinese. I would point my finger at the PLA people that were involved in the project." sigc@e... 01/21/2002 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4680 From: Date: Mon Jan 28, 2002 5:51pm Subject: 900 - 2.6 Yagi I may be behind the curve on this one, but it may be of interest to someone. I picked up a small Yagi log periodic antenna (on a circuit board) over the net. Cut for 900-2.6. Thing's about 8" square. I put a rubber pistol grip (for SLR camera) on it and connected it to my Tek 492. Put a small 9v 2.4 Ghz transmitter on the other side of the house and tried it out. Had to attenuate the signal down quite a lot, but finally got good, usable signal. Was amazed at the sensitivity. Was like moving a compass around true north. I literally could draw a straight line from the tip of the antenna to the transmitter. The slightest movement away from the transmitter would effect the amplitude, whether left, right, up or down. Like aiming a pistol. Very impressed (of course I'm still impressed with hard drives over 20 meg's). Don't want to make this a commercial message, but anyone interested in the page cite, let me know. Cost a princely $40. Martin Brown Brown & Sikes, Inc. Dallas 4681 From: Paolo Sfriso Date: Tue Jan 29, 2002 3:18am Subject: Bug Photos Wanted Dear Colleagues. I am developing a website www.microspia.org (microspia is the Italian word for bug, literally micro-spy) where I would like to place a photographic display of found bugs of any sort: from the radio-shack viarity to the more esoteric kind. I would be extremely gratefull if fellow listmembers could send me a couple of JPEG photos of traced or experimental bugs with a brief description. The site will be in Italian and proper credit will be given to all contributors. Thanks. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... 4682 From: Steve Uhrig Date: Tue Jan 29, 2002 7:39am Subject: Re: Bug Photos Wanted Once upon a midnight dreary, Paolo Sfriso pondered, weak and weary: > I am developing a website www.microspia.org (microspia is the > Italian word for bug, literally micro-spy) where I would like to > place a photographic display of found bugs of any sort: from the > radio-shack viarity to the more esoteric kind. > I would be extremely gratefull if fellow listmembers could send > me a couple of JPEG photos of traced or experimental bugs with a > brief description. Hi Paul, Since mere possession of audio and certain other types of surveillance devices in the U.S. is a felony, you're obviously asking for these inputs from our members outside the U.S. No one in the US. would want to admit to committing a felony by acknowledging possession of sensitive devices. 18USC 2511 and 2512 (Title 18 is the Criminal Code in the U.S., and section 2511 and 2512 specifically discusses possession, advertising of, use by, etc. surveillance devices by other than government agencies or persons directly under contract to supply these devices to the government) is the applicable section of code. Practically anyone involved in TSCM or surveillance in the U.S. knows this section of code by heart, since we live and quite literally can rot in jail by it. Jim Atkinson, the owner and operator of this list, maintains a copy of this information on his website here: http://www.tscm.com/USC18_119.html Perhaps list members from countries where the law is not so restrictive can assist you. You also may be able, with permission, to copy certain photos from various websites showing pictures of these devices. Be aware, however, that I have never seen a photo on a website of a truly professional surveillance device. They all are low end, homemade type devices, or the mass produced garbage from the Pacific Rim. Any images shown on U.S. websites either are illegal or are of deactivated devices (usually mockups). Good luck with your site. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: The Price's Date: Tue Jan 25, 2005 9:36pm Subject: RE: Marty Kaiser I sent a email to Marty Kaiser about a week ago and so far no response, I would like to make a purchase of one of the items he indicates he still manufactures a 2050CA and a 1059 countermeasures amp. Does anyone have any info on Marty, should I try giving him a phone call. Also I am interested in purchasing a second CPM-700 REI unit only, I have all the probes, two of most and want to purchase just the receiver, if someone has a used unit let me know. John 10769 From: Mildred Young Date: Tue Jan 25, 2005 9:44pm Subject: Re: RFID Rev Dr Michael Ellner, Please tell me more of the Bush plan to screen the whole US population for mental illness. I have not heard anything about that! MY ----- Original Message ----- From: "J.A. Terranson" To: Sent: Tuesday, January 25, 2005 10:32 AM Subject: Re: [TSCM-L] RFID > > > > On Tue, 25 Jan 2005, Gerald wrote: > >> I have noted the reduced number of kidnappings in Iraq. >> Could RFID beused to trace victims if imbedded in their skin, or >> wouldn't it have the range? > > AFAIK, depending on the specific RFID technology used, range goes as far > as ~30 feet today, using COTS or near COTS equipment. I have heard > theoretical discussions which insist that 100feet *may* be feasible soon, > but it is unclear if "feasible" would necessarily equate to "available" in > a reasonable time frame. Besides, I doubt a 100foot range would prove to > be of much use. > > -- > Yours, > > J.A. Terranson > sysadmin@m... > 0xBD4A95BF > > Civilization is in a tailspin - everything is backwards, everything is > upside down- doctors destroy health, psychiatrists destroy minds, lawyers > destroy justice, the major media destroy information, governments destroy > freedom and religions destroy spirituality - yet it is claimed to be > healthy, just, informed, free and spiritual. We live in a social system > whose community, wealth, love and life is derived from alienation, > poverty, self-hate and medical murder - yet we tell ourselves that it is > biologically and ecologically sustainable. > > The Bush plan to screen whole US population for mental illness clearly > indicates that mental illness starts at the top. > > Rev Dr Michael Ellner > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 10770 From: dj Date: Tue Jan 25, 2005 11:02pm Subject: Need equipment In need of a Sony 8mm deck/ mini or possibly a sharp 8mm deck/mini vcr with screen Anyone have one for sale under 100.00? --------------------------------- Do you Yahoo!? Yahoo! Search presents - Jib Jab's 'Second Term' [Non-text portions of this message have been removed] 10771 From: James M. Atkinson Date: Wed Jan 26, 2005 1:42am Subject: Fire closes New York subway line Does anybody else on the list find it ironic that a homeless guy with a shopping cart was able to accidently take out a chunk of the infrastructure of New York? If they are not capable of stopping something as simple as a shopping cart how are they going to stop an actual terrorist attack. -jma http://www.cnn.com/2005/US/01/25/train.fire.ap/index.html Fire closes New York subway line Should be running again in 3-6 months, agency says NEW YORK (AP) -- A subway line shut down by a tunnel fire that authorities believe was set by a homeless person should be running again within three to six months, not the five years previously feared, the New York City Transit agency said Tuesday. The Sunday fire, which began in a shopping cart stuffed with clothing and wood, ignited overhead cables near the Chambers Street station in lower Manhattan. The blaze spread to a room of switching and signal equipment critical to operating the C line, said NYC Transit's parent agency, the Metropolitan Transportation Authority. No suspect in the fire had been arrested. The C line, which carries some 110,000 daily riders in Manhattan and Brooklyn, was suspended indefinitely. The MTA also cut back service on the A line, which runs parallel to the C for part of its route, carrying some 470,000 passengers a day. Before Tuesday's announcement that service could be resumed within six months, NYC Transit President Lawrence Reuter had said it could take "several millions of dollars and several years" to rebuild the equipment. He also had said the fire caused the most serious damage to the subway's infrastructure since the September 11, 2001, terrorist attacks, which destroyed tracks and stations underneath the World Trade Center. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10772 From: James M. Atkinson Date: Wed Jan 26, 2005 1:50am Subject: Government Admits Terrorist Threat Warning was Bogus (again) Once again, DHS falls flat on their face, and whips up hysteria about a bogus terror threat which just conveniently coincided with the inauguration. -jma Authorities debate whether to make terror threats public By Associated Press Tuesday, January 25, 2005 BOSTON - A call from an anonymous tipster that 16 people were planning a terror attack on Boston prompted officials to warn the public and step up security. Patrols were increased at Logan International Airport and on the city's transit system. Vehicles were searched in underground parking garages. Gov. Mitt Romney [related, bio] skipped President George W. Bush's inauguration in Washington to return to Boston. All this for what authorities now say may have been an act of revenge by a human smuggler trying to get back at people who failed to pay him. The tipster has since been detained and was being questioned by authorities trying to get to the bottom of his motivation. The idea of reporting people to the government to exact revenge is nothing new. But with the heightened fear of terrorism, authorities have to decide when to warn the public and when to investigate quietly without making the threat public. ``Every day there comes to the various agencies within the U.S. government hundreds - thousands - of reports of everything from Martians having landed in Nevada to someone who just had a conversation with Elvis to terrorists coming with a nuclear bomb to Boston,'' said Graham T. Allison, an assistant defense secretary in the first Clinton administration. ``It's one of those situations where you're kind of damned if you do and damned if you don't,'' said Allison, now a professor of government at the John F. Kennedy School of Government at Harvard University. Most recently, a tipster called into the California Highway Patrol on Jan. 17, claiming that four Chinese nationals - two men and two women - and two Iraqi nationals entered the United States from Mexico and were awaiting a shipment of nuclear material that would follow them to Boston. The implication was that the group was plotting to detonate a radioactive ``dirty bomb'' that spews hazardous material and can sicken or kill people. The list of possible terror suspects later grew to 16, and authorities have said they are investigating whether the tip was a false one by a caller with a grudge after smuggling them across the border. U.S. Attorney Michael Sullivan said that the vast majority of anonymous tips received by authorities are not made public in an attempt to prevent panic. But authorities sometimes go public with a threat, he said, out of a concern for public safety or if they believe the public could help in the investigation. Sullivan told The Associated Press that authorities still have found no evidence of terror motives and nothing to corroborate the tipster's claims. He said the investigation is still ongoing and the smuggling scenario ``is within the range of possibilities.'' Matthew Evangelista, a professor of international relations at Cornell University, said the idea of turning people in as suspects out of revenge goes back to long before terrorism became a major concern. He said warning the public about a threat before it is thoroughly investigated can cause undue panic and may even cause people to be desensitized about the threat of terrorism. ``I think it breeds a kind of cynicism on the part of the public. ... People become maybe less willing to believe the threats when they are actually real,'' Evangelista said. ``The other risk it creates is a climate of suspicion, especially if people are identified by racial or ethnic characteristics. I think that's a danger officials need to think about when they issue these kinds of alerts.'' In the alleged terror threat against Boston, federal authorities went public after state and local law enforcement agencies took steps to increase security, and reports about the threat were leaked to the media. The FBI released the photographs of the four Chinese nationals and later released the names, some passport numbers and possible birth dates for nine other Chinese and one Hispanic man they said were wanted for questioning. No information has been released about the two Iraqis who were said to have been involved. ``It became apparent that the information was already in the public domain and there was significant risk that without making some kind of public statement, there was considerable risk of this being blown out of proportion and causing panic,'' Sullivan said. This past weekend, the FBI said one of the 16 people sought for questioning has been in U.S. custody for more than two months and has no terrorist connection. Sullivan noted that authorities emphasized from the beginning that they had been unable to corroborate the claims of the tipster. ``It's a constant challenge of the part of law enforcement because they have to respond as if each of these are potential real threats even though you recognize that the vast majority of them are going to be washed out,'' he said. ``The biggest fear you have if you didn't address it as a real threat is that you're going to miss an opportunity to prevent (something) from happening.'' ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10773 From: Agent Geiger Date: Wed Jan 26, 2005 8:50am Subject: Re: RFID Here are some articles: http://www.worldnetdaily.com/news/article.asp?ARTICLE_ID=39078 http://www.whitehouse.gov/infocus/newfreedom/toc-2004.html --- Mildred Young wrote: > > Rev Dr Michael Ellner, > Please tell me more of the Bush plan to screen > the whole US population > for mental illness. I have not heard anything about > that! > MY > ----- Original Message ----- > From: "J.A. Terranson" > To: > Sent: Tuesday, January 25, 2005 10:32 AM > Subject: Re: [TSCM-L] RFID > > > > > > > > > > On Tue, 25 Jan 2005, Gerald wrote: > > > >> I have noted the reduced number of kidnappings in > Iraq. > >> Could RFID beused to trace victims if imbedded in > their skin, or > >> wouldn't it have the range? > > > > AFAIK, depending on the specific RFID technology > used, range goes as far > > as ~30 feet today, using COTS or near COTS > equipment. I have heard > > theoretical discussions which insist that 100feet > *may* be feasible soon, > > but it is unclear if "feasible" would necessarily > equate to "available" in > > a reasonable time frame. Besides, I doubt a > 100foot range would prove to > > be of much use. > > > > -- > > Yours, > > > > J.A. Terranson > > sysadmin@m... > > 0xBD4A95BF > > > > Civilization is in a tailspin - everything is > backwards, everything is > > upside down- doctors destroy health, psychiatrists > destroy minds, lawyers > > destroy justice, the major media destroy > information, governments destroy > > freedom and religions destroy spirituality - yet > it is claimed to be > > healthy, just, informed, free and spiritual. We > live in a social system > > whose community, wealth, love and life is derived > from alienation, > > poverty, self-hate and medical murder - yet we > tell ourselves that it is > > biologically and ecologically sustainable. > > > > The Bush plan to screen whole US population for > mental illness clearly > > indicates that mental illness starts at the top. > > > > Rev Dr Michael Ellner > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > > > =================================================== > TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10774 From: kondrak Date: Wed Jan 26, 2005 11:17am Subject: Re: RFID Think it has more to do with our troops wiping out over 1200 of hard-core Jihadi's in Faluja. The best RFID implants ive seen are good for less than 100'. At 12:32 1/25/2005, you wrote: >On Tue, 25 Jan 2005, Gerald wrote: > > > I have noted the reduced number of kidnappings in Iraq. > > Could RFID beused to trace victims if imbedded in their skin, or > > wouldn't it have the range? > >AFAIK, depending on the specific RFID technology used, range goes as far >as ~30 feet today, using COTS or near COTS equipment. I have heard >theoretical discussions which insist that 100feet *may* be feasible soon, >but it is unclear if "feasible" would necessarily equate to "available" in >a reasonable time frame. Besides, I doubt a 100foot range would prove to >be of much use. > >-- >Yours, > >J.A. Terranson >sysadmin@m... >0xBD4A95BF > > Civilization is in a tailspin - everything is backwards, everything is >upside down- doctors destroy health, psychiatrists destroy minds, lawyers >destroy justice, the major media destroy information, governments destroy >freedom and religions destroy spirituality - yet it is claimed to be >healthy, just, informed, free and spiritual. We live in a social system >whose community, wealth, love and life is derived from alienation, >poverty, self-hate and medical murder - yet we tell ourselves that it is >biologically and ecologically sustainable. > >The Bush plan to screen whole US population for mental illness clearly >indicates that mental illness starts at the top. > >Rev Dr Michael Ellner > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10775 From: kondrak Date: Wed Jan 26, 2005 11:26am Subject: Re: Fire closes New York subway line Yes and no. Yes, in that the NYC subway is SO badly maintained, and in need of repairs that a small fire could easily spread and cause that level of damage. Also security is so poor that anyone, anytime could have access to critical infrastructure. ..and No, the tramps down there prob just wanted to stay warm, and with the amount of grease, debris and other flammables, (I cant envision one hauling a shopping cart of wood in, undiscovered) available due to lack of maintenance, I can see this being an accident waiting to happen. What "I" find amazing is the horrendous amount of time they speced for repairs. Of course, the mob, thug, union people don't work until they are paid off to do so, (with overtime, and bribes to their thug hierarchy) so three years might be realistic. this is typical for NYC and other places where the mob's are in control. I could buy 3-6 months....not three years....there will be heads rolling if 800,000 commuters are put out three years.... At 02:42 1/26/2005, you wrote: >Does anybody else on the list find it ironic that a homeless guy with a >shopping cart was able to accidently take out a chunk of the infrastructure >of New York? > >If they are not capable of stopping something as simple as a shopping cart >how are they going to stop an actual terrorist attack. > >-jma > > > > > >http://www.cnn.com/2005/US/01/25/train.fire.ap/index.html > > >Fire closes New York subway line >Should be running again in 3-6 months, agency says > >NEW YORK (AP) -- A subway line shut down by a tunnel fire that authorities >believe was set by a homeless person should be running again within three >to six months, not the five years previously feared, the New York City >Transit agency said Tuesday. > >The Sunday fire, which began in a shopping cart stuffed with clothing and >wood, ignited overhead cables near the Chambers Street station in lower >Manhattan. The blaze spread to a room of switching and signal equipment >critical to operating the C line, said NYC Transit's parent agency, the >Metropolitan Transportation Authority. > >No suspect in the fire had been arrested. > >The C line, which carries some 110,000 daily riders in Manhattan and >Brooklyn, was suspended indefinitely. The MTA also cut back service on the >A line, which runs parallel to the C for part of its route, carrying some >470,000 passengers a day. > >Before Tuesday's announcement that service could be resumed within six >months, NYC Transit President Lawrence Reuter had said it could take >"several millions of dollars and several years" to rebuild the equipment. > >He also had said the fire caused the most serious damage to the subway's >infrastructure since the September 11, 2001, terrorist attacks, which >destroyed tracks and stations underneath the World Trade Center. > > > > >---------------------------------------------------------------------------------------------------- >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >---------------------------------------------------------------------------------------------------- > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10776 From: J.A. Terranson Date: Wed Jan 26, 2005 2:02am Subject: [OFF TOPIC] Re: RFID On Tue, 25 Jan 2005, Mildred Young wrote: > Rev Dr Michael Ellner, > Please tell me more of the Bush plan to screen the whole US population > for mental illness. I have not heard anything about that! > MY "Rev. Ellner" was the source of the quote, not of the email it was acting as a .sig for. Nevertheless, below is a reprint of the article from which it came. I know Jeanne Lenzer, and this is no "supermarket rag story": check double and triple checks her work. Note that this originally appeared in the British Medical Journal (IIRC). -------------------------------------------------------------------------- http://www.worldnetdaily.com/news/article.asp?ARTICLE_ID=39078 Bush plans to screen whole U.S. population for mental illness Sweeping initiative links diagnoses to treatment with specific drugs Posted: June 21, 2004 5:00 p.m. Eastern By Jeanne Lenzer 2004 Jeanne Lenzer A sweeping mental health initiative will be unveiled by President George W Bush in July. The plan promises to integrate mentally ill patients fully into the community by providing "services in the community, rather than institutions," according to a March 2004 progress report entitled New Freedom Initiative (www.whitehouse.gov/infocus/newfreedom/toc-2004.html). While some praise the plan's goals, others say it protects the profits of drug companies at the expense of the public. Bush established the New Freedom Commission on Mental Health in April 2002 to conduct a "comprehensive study of the United States mental health service delivery system." The commission issued its recommendations in July 2003. Bush instructed more than 25 federal agencies to develop an implementation plan based on those recommendations. The president's commission found that "despite their prevalence, mental disorders often go undiagnosed" and recommended comprehensive mental health screening for "consumers of all ages," including preschool children. According to the commission, "Each year, young children are expelled from preschools and childcare facilities for severely disruptive behaviours and emotional disorders." Schools, wrote the commission, are in a "key position" to screen the 52 million students and 6 million adults who work at the schools. The commission also recommended "Linkage [of screening] with treatment and supports" including "state-of-the-art treatments" using "specific medications for specific conditions." The commission commended the Texas Medication Algorithm Project (TMAP) as a "model" medication treatment plan that "illustrates an evidence-based practice that results in better consumer outcomes." Dr Darrel Regier, director of research at the American Psychiatric Association (APA), lauded the president's initiative and the Texas project model saying, "What's nice about TMAP is that this is a logical plan based on efficacy data from clinical trials." He said the association has called for increased funding for implementation of the overall plan. But the Texas project, which promotes the use of newer, more expensive antidepressants and antipsychotic drugs, sparked off controversy when Allen Jones, an employee of the Pennsylvania Office of the Inspector General, revealed that key officials with influence over the medication plan in his state received money and perks from drug companies with a stake in the medication algorithm (15 May, p1153). He was sacked this week for speaking to the BMJ and the New York Times. The Texas project started in 1995 as an alliance of individuals from the pharmaceutical industry, the University of Texas, and the mental health and corrections systems of Texas. The project was funded by a Robert Wood Johnson grant . and by several drug companies. Mr Jones told the BMJ that the same "political/pharmaceutical alliance" that generated the Texas project was behind the recommendations of the New Freedom Commission, which, according to his whistleblower report, were "poised to consolidate the TMAP effort into a comprehensive national policy to treat mental illness with expensive, patented medications of questionable benefit and deadly side effects, and to force private insurers to pick up more of the tab" (http://psychrights.org/Drugs/ AllenJonesTMAPJanuary20.pdf). Larry D Sasich, research associate with Public Citizen in Washington, DC, told the BMJ that studies in both the United States and Great Britain suggest that "using the older drugs first makes sense. There's nothing in the labeling of the newer atypical antipsychotic drugs that suggests they are superior in efficacy to haloperidol [an older "typical" antipsychotic]. There has to be an enormous amount of unnecessary expenditures for the newer drugs." Olanzapine (trade name Zyprexa), one of the atypical antipsychotic drugs recommended as a first line drug in the Texas algorithm, grossed $4.28bn (2.35bn) worldwide in 2003 and is Eli Lilly's top selling drug. A 2003 New York Times article by Gardiner Harris reported that 70 percent of olanzapine sales are paid for by government agencies, such as Medicare and Medicaid. Eli Lilly, manufacturer of olanzapine, has multiple ties to the Bush administration. George Bush Sr. was a member of Lilly's board of directors and Bush Jr. appointed Lilly's chief executive officer, Sidney Taurel, to a seat on the Homeland Security Council. Lilly made $1.6m in political contributions in 2000 . 82 percent of which went to Bush and the Republican Party. Jones points out that the companies that helped to start up the Texas project have been, and still are, big contributors to the election funds of George W Bush. In addition, some members of the New Freedom Commission have served on advisory boards for these same companies, while others have direct ties to the Texas Medication Algorithm Project. Bush was the governor of Texas during the development of the Texas project, and, during his 2000 presidential campaign, he boasted of his support for the project and the fact that the legislation he passed expanded Medicaid coverage of psychotropic drugs. Bush is the clear front runner when it comes to drug company contributions. According to the Center for Responsive Politics (CRP), manufacturers of drugs and health products have contributed $764 274 to the 2004 Bush campaign through their political action committees and employees . far outstripping the $149 400 given to his chief rival, John Kerry, by 26 April. Drug companies have fared exceedingly well under the Bush administration, according to the centre's spokesperson, Steven Weiss. The commission's recommendation for increased screening has also been questioned. Robert Whitaker, journalist and author of Mad in America, says that while increased screening "may seem defensible," it could also be seen as "fishing for customers," and that exorbitant spending on new drugs "robs from other forms of care such as job training and shelter programmes." But Dr Graham Emslie, who helped develop the Texas project, defends screening: "There are good data showing that if you identify kids at an earlier age who are aggressive, you can intervene... and change their trajectory." First published by the BMJ Publishing Group Ltd in the BMJ -- volume 328, 19 June 2004, page 1458. 10777 From: J. Oquendo Date: Wed Jan 26, 2005 2:07am Subject: Re: Fire closes New York subway line > If they are not capable of stopping something as simple as a shopping > cart how are they going to stop an actual terrorist attack. The answer to this is simple. The United States simply needs another neatly acronymed agency to carry out the dangerous, perilous, devious duties of stopping Homeless Persons of Mass Destruction. It would be in the interest of everyone to stop these evil tunnel dwellers hell-bent on taking over civil liberties and freedoms from us Patriotic citizens. I hereby vote to establish "People Of Real Koncern Battling Against Really Radical Enemy Losers" or PORK BARREL for short. If only the government would allocate say two percent of social security programs, and other non necessary programs like Medicaid (we all know old people don't really need meds anyway), we could stop another attack on our good old nation's infrastructure. Where is Kerik when we needed him most out here? How dare he run around doing the hanky panky. He has hisself some tErrorists to stop. =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo GPG Key ID 0x51F9D78D Fingerprint 2A48 BA18 1851 4C99 CA22 0619 DB63 F2F7 51F9 D78D http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D sil @ politrix . org http://www.politrix.org sil @ infiltrated . net http://www.infiltrated.net "How a man plays the game shows something of his character - how he loses shows all" - Mr. Luckey 10778 From: E. Charles Sterling Date: Wed Jan 26, 2005 11:42am Subject: RE: [tscm] Government Admits Terrorist Threat Warning was Bogus (again) Clearly this is not on target with TSCM business yet it has been global business for a week or so there is additional data and hopefully also the end of a bad rumor. As "a proud member of the InfraGard" the nature of this type of bogus report (one for revenge) is one that is too common and one that plays directly into the hands of actual terrorists. There are too many issues with false or customized reports getting into the mainstream press w/o something as vain as revenge fueling the situation. This issue was started by ONE individual and at every step of the way has been identified as not having facts associated to this group of Chinese nationals much less anything to do with terrorism. One thing to keep in mind, regarding the nature of feeding such propaganda, this is how the terrorist will, can and have caused the world great grief and expense - the simple spreading of rumor. Due to today's internet technology this situation can span the globe in minutes and take weeks to bring to some closure. I've been watching the text on this issue all week and I'm glad to say that it now seems to be reaching an end. From my view point, the person that started this issue should be spending time in the Cross Bars Motel (feed by the FBI) for enacting such public deceit. cheers, charles sterling -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Wednesday, January 26, 2005 1:51 AM To: TSCM-L Subject: [tscm] [TSCM-L] Government Admits Terrorist Threat Warning was Bogus (again) Once again, DHS falls flat on their face, and whips up hysteria about a bogus terror threat which just conveniently coincided with the inauguration. -jma Authorities debate whether to make terror threats public By Associated Press Tuesday, January 25, 2005 BOSTON - A call from an anonymous tipster that 16 people were planning a terror attack on Boston prompted officials to warn the public and step up security. Patrols were increased at Logan International Airport and on the city's transit system. Vehicles were searched in underground parking garages. Gov. Mitt Romney [related, bio] skipped President George W. Bush's inauguration in Washington to return to Boston. All this for what authorities now say may have been an act of revenge by a human smuggler trying to get back at people who failed to pay him. The tipster has since been detained and was being questioned by authorities trying to get to the bottom of his motivation. The idea of reporting people to the government to exact revenge is nothing new. But with the heightened fear of terrorism, authorities have to decide when to warn the public and when to investigate quietly without making the threat public. ``Every day there comes to the various agencies within the U.S. government hundreds - thousands - of reports of everything from Martians having landed in Nevada to someone who just had a conversation with Elvis to terrorists coming with a nuclear bomb to Boston,'' said Graham T. Allison, an assistant defense secretary in the first Clinton administration. ``It's one of those situations where you're kind of damned if you do and damned if you don't,'' said Allison, now a professor of government at the John F. Kennedy School of Government at Harvard University. Most recently, a tipster called into the California Highway Patrol on Jan. 17, claiming that four Chinese nationals - two men and two women - and two Iraqi nationals entered the United States from Mexico and were awaiting a shipment of nuclear material that would follow them to Boston. The implication was that the group was plotting to detonate a radioactive ``dirty bomb'' that spews hazardous material and can sicken or kill people. The list of possible terror suspects later grew to 16, and authorities have said they are investigating whether the tip was a false one by a caller with a grudge after smuggling them across the border. U.S. Attorney Michael Sullivan said that the vast majority of anonymous tips received by authorities are not made public in an attempt to prevent panic. But authorities sometimes go public with a threat, he said, out of a concern for public safety or if they believe the public could help in the investigation. Sullivan told The Associated Press that authorities still have found no evidence of terror motives and nothing to corroborate the tipster's claims. He said the investigation is still ongoing and the smuggling scenario ``is within the range of possibilities.'' Matthew Evangelista, a professor of international relations at Cornell University, said the idea of turning people in as suspects out of revenge goes back to long before terrorism became a major concern. He said warning the public about a threat before it is thoroughly investigated can cause undue panic and may even cause people to be desensitized about the threat of terrorism. ``I think it breeds a kind of cynicism on the part of the public. ... People become maybe less willing to believe the threats when they are actually real,'' Evangelista said. ``The other risk it creates is a climate of suspicion, especially if people are identified by racial or ethnic characteristics. I think that's a danger officials need to think about when they issue these kinds of alerts.'' In the alleged terror threat against Boston, federal authorities went public after state and local law enforcement agencies took steps to increase security, and reports about the threat were leaked to the media. The FBI released the photographs of the four Chinese nationals and later released the names, some passport numbers and possible birth dates for nine other Chinese and one Hispanic man they said were wanted for questioning. No information has been released about the two Iraqis who were said to have been involved. ``It became apparent that the information was already in the public domain and there was significant risk that without making some kind of public statement, there was considerable risk of this being blown out of proportion and causing panic,'' Sullivan said. This past weekend, the FBI said one of the 16 people sought for questioning has been in U.S. custody for more than two months and has no terrorist connection. Sullivan noted that authorities emphasized from the beginning that they had been unable to corroborate the claims of the tipster. ``It's a constant challenge of the part of law enforcement because they have to respond as if each of these are potential real threats even though you recognize that the vast majority of them are going to be washed out,'' he said. ``The biggest fear you have if you didn't address it as a real threat is that you're going to miss an opportunity to prevent (something) from happening.'' -------------------------------------------------------------------------- -------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. -------------------------------------------------------------------------- -------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com -------------------------------------------------------------------------- -------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -------------------------------------------------------------------------- -------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10779 From: kondrak Date: Wed Jan 26, 2005 3:41pm Subject: Re: Re: Fire closes New York subway line Dont forget all the lavish $500,000 parties the DHS (or whatever obscure acronym agency this will be called) people can scam off all that cash flowing by....and of course, the Carlyles and Haliburton's will be so much better off allow bigger bribes. At 03:07 1/26/2005, you wrote: > > If they are not capable of stopping something as simple as a shopping > > cart how are they going to stop an actual terrorist attack. > > >The answer to this is simple. The United States simply needs another >neatly acronymed agency to carry out the dangerous, perilous, devious >duties of stopping Homeless Persons of Mass Destruction. > >It would be in the interest of everyone to stop these evil tunnel dwellers >hell-bent on taking over civil liberties and freedoms from us Patriotic >citizens. I hereby vote to establish "People Of Real Koncern Battling >Against Really Radical Enemy Losers" or PORK BARREL for short. If only the >government would allocate say two percent of social security programs, and >other non necessary programs like Medicaid (we all know old people don't >really need meds anyway), we could stop another attack on our good old >nation's infrastructure. > >Where is Kerik when we needed him most out here? How dare he run around >doing the hanky panky. He has hisself some tErrorists to stop. > > >=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ >J. Oquendo >GPG Key ID 0x51F9D78D >Fingerprint 2A48 BA18 1851 4C99 > >CA22 0619 DB63 F2F7 51F9 D78D >http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D > >sil @ politrix . org http://www.politrix.org >sil @ infiltrated . net http://www.infiltrated.net > >"How a man plays the game shows something of his >character - how he loses shows all" - Mr. Luckey > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10780 From: kondrak Date: Wed Jan 26, 2005 3:43pm Subject: RE: [tscm] Government Admits Terrorist Threat Warning was Bogus (again) problem IS, realistically, each and every single threat of this type MUST be analyzed. Them wascally terrorists don't bother to file their plans beforehand, so some times you actually gotta leave the office and go on a road trip. At 12:42 1/26/2005, you wrote: >Clearly this is not on target with TSCM business yet it has been global >business for a week or so there is additional data and hopefully also the >end of a bad rumor. > > >As "a proud member of the InfraGard" the nature of this type of bogus report >(one for revenge) is one that is too common and one that plays directly into >the hands of actual terrorists. > >There are too many issues with false or customized reports getting into the >mainstream press w/o something as vain as revenge fueling the situation. >This issue was started by ONE individual and at every step of the way has >been identified as not having facts associated to this group of Chinese >nationals much less anything to do with terrorism. > >One thing to keep in mind, regarding the nature of feeding such propaganda, >this is how the terrorist will, can and have caused the world great grief >and expense - the simple spreading of rumor. > >Due to today's internet technology this situation can span the globe in >minutes and take weeks to bring to some closure. I've been watching the >text on this issue all week and I'm glad to say that it now seems to be >reaching an end. > > From my view point, the person that started this issue should be spending >time in the Cross Bars Motel (feed by the FBI) for enacting such public >deceit. > >cheers, >charles sterling > > > -----Original Message----- > From: James M. Atkinson [mailto:jmatk@tscm.com] > Sent: Wednesday, January 26, 2005 1:51 AM > To: TSCM-L > Subject: [tscm] [TSCM-L] Government Admits Terrorist Threat Warning was >Bogus (again) > > > > Once again, DHS falls flat on their face, and whips up hysteria about a > bogus terror threat which just conveniently coincided with the >inauguration. > > -jma > > > > Authorities debate whether to make terror threats public > By Associated Press > Tuesday, January 25, 2005 > > BOSTON - A call from an anonymous tipster that 16 people were planning a > terror attack on Boston prompted officials to warn the public and step up > security. > > Patrols were increased at Logan International Airport and on the > city's transit system. Vehicles were searched in underground parking > garages. Gov. Mitt Romney [related, bio] skipped President George W. >Bush's > inauguration in Washington to return to Boston. > > All this for what authorities now say may have been an act of > revenge by a human smuggler trying to get back at people who failed to pay > him. The tipster has since been detained and was being questioned by > authorities trying to get to the bottom of his motivation. > > The idea of reporting people to the government to exact revenge is > nothing new. But with the heightened fear of terrorism, authorities have >to > decide when to warn the public and when to investigate quietly without > making the threat public. > > ``Every day there comes to the various agencies within the U.S. > government hundreds - thousands - of reports of everything from Martians > having landed in Nevada to someone who just had a conversation with Elvis > to terrorists coming with a nuclear bomb to Boston,'' said Graham T. > Allison, an assistant defense secretary in the first Clinton >administration. > > ``It's one of those situations where you're kind of damned if you >do > and damned if you don't,'' said Allison, now a professor of government at > the John F. Kennedy School of Government at Harvard University. > > Most recently, a tipster called into the California Highway Patrol > on Jan. 17, claiming that four Chinese nationals - two men and two women - > and two Iraqi nationals entered the United States from Mexico and were > awaiting a shipment of nuclear material that would follow them to Boston. > The implication was that the group was plotting to detonate a radioactive > ``dirty bomb'' that spews hazardous material and can sicken or kill >people. > > The list of possible terror suspects later grew to 16, and > authorities have said they are investigating whether the tip was a false > one by a caller with a grudge after smuggling them across the border. > > U.S. Attorney Michael Sullivan said that the vast majority of > anonymous tips received by authorities are not made public in an attempt >to > prevent panic. But authorities sometimes go public with a threat, he said, > out of a concern for public safety or if they believe the public could >help > in the investigation. > > Sullivan told The Associated Press that authorities still have >found > no evidence of terror motives and nothing to corroborate the tipster's > claims. He said the investigation is still ongoing and the smuggling > scenario ``is within the range of possibilities.'' > > Matthew Evangelista, a professor of international relations at > Cornell University, said the idea of turning people in as suspects out of > revenge goes back to long before terrorism became a major concern. He said > warning the public about a threat before it is thoroughly investigated can > cause undue panic and may even cause people to be desensitized about the > threat of terrorism. > > ``I think it breeds a kind of cynicism on the part of the public. > ... People become maybe less willing to believe the threats when they are > actually real,'' Evangelista said. ``The other risk it creates is a >climate > of suspicion, especially if people are identified by racial or ethnic > characteristics. I think that's a danger officials need to think about >when > they issue these kinds of alerts.'' > > In the alleged terror threat against Boston, federal authorities > went public after state and local law enforcement agencies took steps to > increase security, and reports about the threat were leaked to the media. > > The FBI released the photographs of the four Chinese nationals and > later released the names, some passport numbers and possible birth dates > for nine other Chinese and one Hispanic man they said were wanted for > questioning. No information has been released about the two Iraqis who >were > said to have been involved. > > ``It became apparent that the information was already in the public > domain and there was significant risk that without making some kind of > public statement, there was considerable risk of this being blown out of > proportion and causing panic,'' Sullivan said. > > This past weekend, the FBI said one of the 16 people sought for > questioning has been in U.S. custody for more than two months and has no > terrorist connection. > > Sullivan noted that authorities emphasized from the beginning that > they had been unable to corroborate the claims of the tipster. > > ``It's a constant challenge of the part of law enforcement because > they have to respond as if each of these are potential real threats even > though you recognize that the vast majority of them are going to be washed > out,'' he said. > > ``The biggest fear you have if you didn't address it as a real > threat is that you're going to miss an opportunity to prevent (something) > from happening.'' > > > > > > -------------------------------------------------------------------------- >-------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > -------------------------------------------------------------------------- >-------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: >http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------------- >-------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------------- >-------------------------- > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > >---------------------------------------------------------------------------- >-- > Yahoo! Groups Links > > a.. To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > b.. To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10781 From: kondrak Date: Wed Jan 26, 2005 3:47pm Subject: Hellova way to run a railroad... Has anyone else drawn the dots between the not so subtile warnings of attacks on the rail infrastructure, a bum burning down the NYC subway, a botched suicide derailing commuter trains in Ca. to the tune of 10 dead? Whats next? greyhounds driving off bridges? Or should I have sold my stock in the Reading railroad and Short Line sooner? 10782 From: A Grudko Date: Wed Jan 26, 2005 4:26pm Subject: RE: Fire closes New York subway line -----Original Message----- From: kondrak [mailto:kondrak@s...] > Of course, the mob, thug, union people don't work until they are paid off to do so, (with overtime, and bribes to their thug hierarchy) so three years might be realistic. this is typical for NYC and other places where the mob's are in control. How about when the Marines get back from Iraq they implement regime change in NYC and other places where the mob are in control by wiping out the hard-core union people. -----Original Message----- From: kondrak [mailto:kondrak@s...] > Think it has more to do with our troops wiping out over 1200 of hard-core Jihadi's in Faluja. You know of course that all the homeless people received a coded warning signal to clear the subway just before the fire. And that the guy that they suspect started it was 'fired' from the CIA just after 9/11 and that his family were secretly flown out of there to a secret underground soup kitchen in Florida. Transit police recovered a singed map of the NY subway system and a partially burned trench coat of the type seen in spy movies, which according to a highly paid former general now consulting for the city 'could be used to hide things under'. Andy G ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 [Non-text portions of this message have been removed] 10783 From: Tim Johnson Date: Wed Jan 26, 2005 3:24pm Subject: New to the list I wish to say hello and introduce myself to the list. I am Tim Johnson, located in the Atlanta, GA area and have just finished my fifth TSCM sweep. I think I'm now considered an expert. Let me know if i can help in any way. tim Actually, I've been around TSCM since 1972. -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. 10784 From: A Grudko Date: Wed Jan 26, 2005 5:22pm Subject: Humour Re: Fire closes New York subway line -----Original Message----- From: J. Oquendo [mailto:sil@p...] > The answer to this is simple. The United States simply needs another neatly acronymed agency to carry out the dangerous, perilous, devious duties of stopping Homeless Persons of Mass Destruction. After an all-night session at Crawford Ranch President Bush has announced the establishment of a new agency to fight crime and terror on US subways. The Federal Underground Constabulary will follow the template of the FBI from the administrative top down to specially trained paramilitary officers who will be on stand-by to storm trains, tunnel and stations, equipped with HKMP5 submachine guns, Glock pistols and black body armour emblazoned with the letters FUC. In the event of accidents they will be supported by FUC Emergency Rescue Specialists. The President said that the motto of the new agency is yet to be decided on but 'Don't mess with us' was an early suggestion by Condi Rice. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 [Non-text portions of this message have been removed] 10785 From: James M. Atkinson Date: Wed Jan 26, 2005 5:45pm Subject: Prince Nawaf Fingered as CIA Asset in Saudi The story is just developing, but it looks like Prince Nawaf was fingered this week as a major CIA asset in Saudi Arabia much to the chagrin of the Saudi Royal Family. He was immediately removed from his position pending results of the internal investigation and stripped of all of his access, and it does not look good for him. If initial reports are The House of Saud is recalling a ton of diplomatic folks from the New York and Washington area, and a number of "cousins" studying abroad have taken missing in the past few days. Sixteen feet of blue plastic will be laid down as a result and heads will be rolling in the public square or car park next Friday. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10786 From: satcommunitfive Date: Wed Jan 26, 2005 6:45pm Subject: Re: Police probe Nicole Kidman 'bug' great a FM bug listening to worms in the grass -and probably wind real useful ! and they said hi tech on the telly ! --- In TSCM-L@yahoogroups.com, James Greenwold wrote: > Imagine probing Nicole Kidman > > > From: "James M. Atkinson" > > Reply-To: TSCM-L@yahoogroups.com > > Date: Tue, 25 Jan 2005 13:50:32 -0500 > > To: TSCM-L > > Subject: [TSCM-L] Police probe Nicole Kidman 'bug' > > > > > > > > http://www.cnn.com/2005/WORLD/asiapcf/01/25/aus.kidman.reut/index.htm l > > > > Police probe Nicole Kidman 'bug' > > > > SYDNEY, Australia (Reuters) -- Police were investigating a possible bugging > > attempt on Australian actress Nicole Kidman after a listening device was > > found across the road from her Sydney harborside home. > > > > "At the time this device was found there were media paparazzi, if I may use > > that term, in the street," police inspector Grant Taylor told reporters > > Tuesday. > > > > Police had notified the Oscar-winning Hollywood star of the discovery of > > the device, Taylor said. > > > > "She is undoubtedly concerned in regards to why this device may have been > > placed there and if she is the potential target of this device," he said. > > > > The Daily Telegraph newspaper reported that security footage shot from > > Kidman's home showed a man planting the listening device on Sunday, shortly > > after she returned home to prepare for a new film, "Eucalyptus," based on > > an Australian novel of that name. > > > > "We have conclusive evidence that it was planted and this has been captured > > on video," Noel McMaster, director of Kidman's personal security agency, > > told the newspaper. > > > > "There is no doubt that any information that we were transmitting would > > have been heard," he said. > > > > Police said the listening device was commonly available in electronics > > stores and was being examined by police. > > > > It was not the first time Kidman has been at the center of a bugging scandal. > > > > In 1999, a freelance journalist was convicted in the United States of > > illegally taping an intercepted telephone call from Kidman to her then > > husband, actor Tom Cruise, and selling the tape to a tabloid newspaper. > > > > The tabloid newspaper said a woman's voice on the tape could be heard > > telling a man that their marriage was "hanging by a thread." The couple's > > 10-year marriage ended in 2001. > > > > > > > > > > > > > > > > ----------------------------------------------------------------- ------------- > > ---------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > > ----------------------------------------------------------------- ------------- > > ---------------------- > > James M. Atkinson Phone: (978) 546- 3803 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > > ----------------------------------------------------------------- ------------- > > ---------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > > ----------------------------------------------------------------- ------------- > > ---------------------- > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > 10787 From: contranl Date: Wed Jan 26, 2005 8:57pm Subject: Adaptive beamforming demo ( electronic directional mic ) . Here is another demo of "adaptive beamforming" used to electronically steer a microphone's direction In radio this is called "phased array" http://www.plansys.com/Content/ContentGroups/Products1/Sensors1/HAB1/ HAB_Audio_Demonstration.htm Others make specialised units that use up to 99 mics these units could be used in "covert investigations" One of them is called "Spotmic" By the way the above company also produces the so called "Gunshot-Detector" wich is hooked up to a (wireless)network and processed at a control-center where the location of shootings can be calculated using what they call "time of arrival techniques" After thinking very hard of how they do that...i realise that this is not really "Time Of Arrival" as we know it in radio... but instead every unit sends a timestamp with the signal i guess that must be derived from a GPS receiver. They also come hidden in traffic lights. Those traffic lights also contain a steerable video-camera The traffic-lights are made with LED's and the light beam can be electronically steered also ! (again with adaptive beamforming...i did'nt know you could do that with light also !) Very sophisticated stuff with a combination of different techniques ...imagine that they need a lot of them to make it work. They can also be used as car-accident-sound-detectors ...is what they say...they don't work as "Big Brother mics" :) :) ... :( :( ? Tetrascanner www.tetrascanner.com 10788 From: kondrak Date: Wed Jan 26, 2005 9:16pm Subject: Re: New to the list Welcome to the list Tim... At 16:24 1/26/2005, you wrote: >I wish to say hello and introduce myself to the list. > >I am Tim Johnson, located in the Atlanta, GA area and have just >finished my fifth TSCM sweep. I think I'm now considered an expert. > > >Let me know if i can help in any way. > >tim >Actually, I've been around TSCM since 1972. >-- > >Tim Johnson > >Technical Security Consultants Inc. >PO Box 1295 >Carrollton, GA 30112 >770-836-4898 >770-712-2164 Cell > >What you say in private is your business. Keeping it private is ours. > >Georgia License # PDC 002074 Technical Security Consultants Inc. >Member INTELNET > Espionage Research Institute > Association of Former Office of Special Investigations >Special Agents-Technical Agent >http://www.dbugman.com > >This e-mail is intended for the use of the addressee(s) only and may >contain privileged confidential, or proprietary information that is >exempt from disclosure under law. If you have received this message >in error, please inform us promptly by reply e-mail, then delete the >e-mail and destroy any printed copy. > >Neither this information block, the typed name of the sender, or >anything else in this message is intended to constitute an electronic >signature for purposes of the Uniform Electronic Transactions Act or >the Electronic Signatures in Global and National Commerce Act >(E-Sign) unless a specific statement to the contrary is included in >this message. > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10789 From: kondrak Date: Wed Jan 26, 2005 9:22pm Subject: RE: Fire closes New York subway line Well, as long as the Republicans are still in power, that stands a chance. However, the mobsters will in all likelyhood be replaced with people from foreign lands who dont bathe and smell like patchouli oil, for they will work for 1/10th what Americans will work for. Never mind the trains wind up on the bottom of the East river due to their incompetence, look at all the money we are saving. At 17:26 1/26/2005, you wrote: > -----Original Message----- > From: kondrak [mailto:kondrak@s...] > > > Of course, the mob, thug, union people don't work until they are > paid off to do so, (with overtime, and bribes to their thug hierarchy) so > three years might be realistic. this is typical for NYC and other places > where the mob's are in control. > > How about when the Marines get back from Iraq they implement regime change >in NYC and other places where the mob are in control by wiping out the >hard-core union people. 10790 From: contranl Date: Wed Jan 26, 2005 10:07pm Subject: "Sound of Voices" ?????? . Here's the manufacturer of previous traffic-cams with "gunshot-detectors" talking in this video: http://www.optisoftinc.com/wmv11.asx ??? Do i hear what i hear ???? Is the man saying " THE SOUND OF VOICES " what voices...who's voices ? storing ? Now you probably say "he's saying the SOUND of" ...wich is not the contents...in other words not what actually is being said. I like to know what that is for ...why you want to "detect" voices in the middle of a roadcrossing? In other reports they said it can't (wont ?) be used for that ... why the man says that now ? not very clever if you don't want to raise suspect. Tetrascanner 10791 From: wiggyyy2000 Date: Thu Jan 27, 2005 7:23am Subject: Re: New to the list welcome and have a great time --- In TSCM-L@yahoogroups.com, Tim Johnson wrote: > > I wish to say hello and introduce myself to the list. > > I am Tim Johnson, located in the Atlanta, GA area and have just > finished my fifth TSCM sweep. I think I'm now considered an expert. > > > Let me know if i can help in any way. > > tim > Actually, I've been around TSCM since 1972. > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it private is ours. > > Georgia License # PDC 002074 Technical Security Consultants Inc. > Member INTELNET > Espionage Research Institute > Association of Former Office of Special Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the addressee(s) only and may > contain privileged confidential, or proprietary information that is > exempt from disclosure under law. If you have received this message > in error, please inform us promptly by reply e-mail, then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of the sender, or > anything else in this message is intended to constitute an electronic > signature for purposes of the Uniform Electronic Transactions Act or > the Electronic Signatures in Global and National Commerce Act > (E-Sign) unless a specific statement to the contrary is included in > this message. 10792 From: Nalesnik, Matthew Date: Thu Jan 27, 2005 7:53am Subject: RE: Fire closes New York subway line Getting rid of useless, socialist unions!! -----Original Message----- From: A Grudko [mailto:agrudko@i...] Sent: Wednesday, January 26, 2005 5:27 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Fire closes New York subway line -----Original Message----- From: kondrak [mailto:kondrak@s...] > Of course, the mob, thug, union people don't work until they are paid off to do so, (with overtime, and bribes to their thug hierarchy) so three years might be realistic. this is typical for NYC and other places where the mob's are in control. How about when the Marines get back from Iraq they implement regime change in NYC and other places where the mob are in control by wiping out the hard-core union people. -----Original Message----- From: kondrak [mailto:kondrak@s...] > Think it has more to do with our troops wiping out over 1200 of hard-core Jihadi's in Faluja. You know of course that all the homeless people received a coded warning signal to clear the subway just before the fire. And that the guy that they suspect started it was 'fired' from the CIA just after 9/11 and that his family were secretly flown out of there to a secret underground soup kitchen in Florida. Transit police recovered a singed map of the NY subway system and a partially burned trench coat of the type seen in spy movies, which according to a highly paid former general now consulting for the city 'could be used to hide things under'. Andy G ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10793 From: Nalesnik, Matthew Date: Thu Jan 27, 2005 8:29am Subject: RE: Humour Re: Fire closes New York subway line Isn't it typical of us Americans to be so cynical sometimes, and whine like a bunch of little toddler girls instead of ever doing anything to actually make a change for the better? It's even better when it's not an American doing it, but that's a whole 'nother topic, I suppose... You're just jealous cuz our country's better than yours. Thank God above for the First Amendment, for without it, we'd never know some of the exemplary ideas that exist to make our country even better, and safer, and more efficient - at least, according to our opine, anyway. And dare anyone try and seize that right to Free Speech from us? Well, we'll just whine you to death! "Take that... 'Tis but a flesh wound... I've had worse!" (to paraphrase...) In lieu of the following short article, have we hit apathy yet? - - - BEGIN - - - In 1787 when our original 13 colonies were still part of England, Professor Alexander Tyler (a Scottish history professor at the University of Edinburgh) wrote about the fall of the Athenian republic over 2,000 years prior. "A democracy cannot exist as a permanent form of government. It can only exist until the voters discover that they can vote themselves money from the public treasure. From that moment on the majority always votes for the candidates promising the most money from the public treasury, with the result that a democracy always collapses over loose fiscal policy followed by a dictatorship. The average age of the world's great civilizations has been 200 years. These nations have progressed through the following sequence: From bondage to spiritual faith; from spiritual faith to great courage; from courage to liberty; from liberty to abundance; from abundance to selfishness; from selfishness to complacency; from complacency to apathy; from apathy to dependence; from dependence back into bondage. - - - END - - - No, we're not technically a "Democracy", we're a Constitutional Republic, but the preceding text still holds true. And it will see itself self-evident as long as we have more whiners than doers. If it's broke, then fix it - you as an American citizen actually do have that power. And fortunately for most, you also have the power to whine just enough to not really be heard, but at least you can piss off the people who don't agree with you. God Bless. -----Original Message----- From: A Grudko [mailto:agrudko@i...] Sent: Wednesday, January 26, 2005 6:22 PM -----Original Message----- From: J. Oquendo [mailto:sil@p...] > The answer to this is simple. The United States simply needs another neatly acronymed agency to carry out the dangerous, perilous, devious duties of stopping Homeless Persons of Mass Destruction. After an all-night session at Crawford Ranch President Bush has announced the establishment of a new agency to fight crime and terror on US subways. The Federal Underground Constabulary will follow the template of the FBI from the administrative top down to specially trained paramilitary officers who will be on stand-by to storm trains, tunnel and stations, equipped with HKMP5 submachine guns, Glock pistols and black body armour emblazoned with the letters FUC. In the event of accidents they will be supported by FUC Emergency Rescue Specialists. The President said that the motto of the new agency is yet to be decided on but 'Don't mess with us' was an early suggestion by Condi Rice. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" ---------- [Non-text portions of this message have been removed] 10794 From: Loy Chapman Date: Thu Jan 27, 2005 8:40am Subject: Re: "Sound of Voices" ?????? We cannot smoke in the USA and now one cannot smoke in in the pubs in Ireland. As personal freedoms slowly go away it is only a matter of time before we have no rights to privacy. The manufacturer is getting prepared for that day when the government can and will follow a citizen's every move. Orwell's "1984" just took a little longer. LDC --- contranl wrote: > > . > > > Here's the manufacturer of previous traffic-cams > with > "gunshot-detectors" talking in this video: > > > http://www.optisoftinc.com/wmv11.asx > > > ??? Do i hear what i hear ???? > > Is the man saying " THE SOUND OF VOICES " > > what voices...who's voices ? > storing ? > > > Now you probably say "he's saying the SOUND of" > ...wich is not the > contents...in other words not what actually is being > said. > > I like to know what that is for ...why you want to > "detect" voices > in the middle of a roadcrossing? > > In other reports they said it can't (wont ?) be used > for that ... > why the man says that now ? not very clever if you > don't want to > raise suspect. > > Tetrascanner > > > > > > > __________________________________ Do you Yahoo!? The all-new My Yahoo! - What will yours do? http://my.yahoo.com 10795 From: Mildred Young Date: Thu Jan 27, 2005 10:05am Subject: Counter-Surveillance? I have video surveillance cameras installed, however it seems that I am still being vandalized without capturing it on my Lorex system....any suggestions? The police think I am nuts, I need help! I don't want to continue to be a victim in Phoenix, AZ Thanks [Non-text portions of this message have been removed] 10796 From: G P Date: Thu Jan 27, 2005 10:20am Subject: Re: "Sound of Voices" ?????? Speaking of traffic control devices in Ireland, it's interesting how they've outfitted each of the walk signs with auditory cues as well (that loud "hurry up and walk across the street" sound). Seems that the Irish were a bit harder to colonialize than most. With the FBI's recent move to decommission Carnivore/DCS-1000, it's very apparent what's happening - corporations are now empowered with surveillance capabilities, and are being encouraged by the feds to collect and disseminate information on their customers - state sponsored corporatism. --- Loy Chapman wrote: > We cannot smoke in the USA and now one cannot smoke > in > in the pubs in Ireland. As personal freedoms slowly > go away it is only a matter of time before we have > no > rights to privacy. The manufacturer is getting > prepared for that day when the government can and > will > follow a citizen's every move. Orwell's "1984" just > took a little longer. > > LDC > --- contranl wrote: > > > > > . > > > > > > Here's the manufacturer of previous traffic-cams > > with > > "gunshot-detectors" talking in this video: > > > > > > http://www.optisoftinc.com/wmv11.asx > > > > > > ??? Do i hear what i hear ???? > > > > Is the man saying " THE SOUND OF VOICES " > > > > what voices...who's voices ? > > storing ? > > > > > > Now you probably say "he's saying the SOUND of" > > ...wich is not the > > contents...in other words not what actually is > being > > said. > > > > I like to know what that is for ...why you want to > > "detect" voices > > in the middle of a roadcrossing? > > > > In other reports they said it can't (wont ?) be > used > > for that ... > > why the man says that now ? not very clever if > you > > don't want to > > raise suspect. > > > > Tetrascanner > > > > > > > > > > > > > > > > > > > __________________________________ > Do you Yahoo!? > The all-new My Yahoo! - What will yours do? > http://my.yahoo.com > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > In low income neighborhoods, 84% do not own > computers. > At Network for Good, help bridge the Digital Divide! > http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10797 From: taylortscm@y... Date: Thu Jan 27, 2005 11:05am Subject: RE: Marty Kaiser john if you will look at marty's site you will see he no longer sells any equipment. if your interested I have a 2050ca w/frequency extender and antenna (2050log) good to 20+ ghz that I will part with for $2500.00 in like new condition. dan taylor group The Price's wrote: I sent a email to Marty Kaiser about a week ago and so far no response, I would like to make a purchase of one of the items he indicates he still manufactures a 2050CA and a 1059 countermeasures amp. Does anyone have any info on Marty, should I try giving him a phone call. Also I am interested in purchasing a second CPM-700 REI unit only, I have all the probes, two of most and want to purchase just the receiver, if someone has a used unit let me know. John ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. From: Miguel Puchol Date: Sat Jan 27, 2001 2:46pm Subject: RE: Fire authorities in California.... We had a case here in Spain, to which I was testimony. I think though that it's more possible that something like this happen with a seaplane, than with a helicopter. Choppers pick up about 1.000 liters of water, with a standard scoop, and usually sound a horn when near the surface to warn possible bystanders. In this case, the diver should have been in shallow water, a bit deaf, and not very agile, as he could have grabbed onto the basket to avoid getting dropped onto the fire... Cheers, Mike > -----Mensaje original----- > De: Chris Childs [mailto:childschris@h...] > Enviado el: sabado, 27 de enero de 2001 19:26 > Para: TSCM-L@yahoogroups.com > Asunto: Re: [TSCM-L] Fire authorities in California.... > > > This sounds like an urban legend to me. First off, I couldn't > find a paper > called the "California Examiner". Second I found this web site: > > http://www.urbanlegends.com/death/scuba_forest_fire.html > > James M. Atkinson, Comm-Eng" wrote, > > > > > > >Fire authorities in California found a corpse in a burned out section of > >forest while assessing the damage done by a forest fire..The > deceased male > >was dressed in a full wet suit, complete with SCUBA tanks on his back, > >flippers, and face mask. A post-mortem revealed that the person died not > >from burns, but from massive internal injuries. Dental records > provided a > >positive identification. Investigators then set about to determine how a > >fully clad diver ended up in the middle of a forest fire.. > >It was revealed that, on the day of the fire, the person went > for a diving > >trip off the coast some 20 miles away from the forest. The firefighters, > >seeking to control the fire as quickly as possible, called in a fleet of > >helicopters with very large dip buckets. > >Water was dipped from the ocean then flown to the forest fire and > >emptied..You guessed it. One minute our diver was making like Flipper in > >the Pacific, the next he was doing the breast stroke in a fire dip bucket > >300 feet in the air. Apparently he extinguished exactly 5'-10" of the > >fire. > >Some days it just doesn't pay to get out of bed! > > > >This article was taken from the California Examiner, March 20, 1998 > >-- > > > > > ======================================================================= > > Sed quis custodiet ipsos Custodes? > > "In a time of universal deceit, telling the > > truth is a revolutionary act" - George Orwell > > > ======================================================================= > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 http://www.tscm.com/ > > Gloucester, MA 01931-8008 jmatk@tscm.com > > > ======================================================================= > > The First, The Largest, The Most Popular, and The Most Complete TSCM, > > Technical Security, and Counterintelligence Site on the Internet. > > > ======================================================================= > > > > _________________________________________________________________________ > Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2403 From: James M. Atkinson, Comm-Eng Date: Mon Jan 29, 2001 5:06am Subject: Nurses' spy camera fears Nurses' spy camera fears http://www.thisisbrighton.co.uk/brighton__hove/news/NEWS0.html by David Wells A nurse is demanding to know whether she was filmed naked by a camera found hidden in a shampoo bottle in a shared bathroom. She and her colleagues have not been told if images of them undressing for a bath were recorded by the camera, discovered in nurses' lodgings at Brighton General Hospital. Their greatest fear is that intimate pictures could be passed on to others or even put on the internet. A doctor employed by another hospital, who was staying in Brighton while attending a conference, is under police investigation after a device was found hidden in a large bottle of Head and Shoulders in a bathroom shared by up to 22 male and female nurses. Accident and emergency nurse Joe Cidoni, 40, discovered the device when he tried to use some of the shampoo and heard the bottle give a clicking noise. He spotted a pinhole in a side of the bottle and inside found a wireless miniature camera. Police searched the block, owned by Brighton Health Care NHS Trust, and found videotapes and technical equipment in a nearby room. One of Mr Cidoni's colleagues, who also lives in the hospital block in Elm Grove, Brighton, yesterday complained neither Brighton Healthcare NHS Trust nor the police had told them what was captured on the film. The 23-year-old, who did not wish to be named, said she was sickened by the thought someone could have spied on her as she undressed. She and many other nurses of both sexes in the housing block were demanding to know what was on the film and who had access to it. She said: "There has been no communication from the trust or the police. No one has come back to us to tell us what is going on or what has been filmed, if anything. "We got letters pushed through our doors the day after from occupational health offering us counselling but we just wanted to know what was going on. Everyone is feeling unnerved and paranoid. We all talking about what the camera might have filmed and what happened after that. "Was there any access to the internet? Could it have been sent round the world? "You just worry that you are going to appear in some porn film or something like that. You just keep thinking 'Was the bottle in there when I was in there?' "We all recall seeing a Head and Shoulders bottle, but maybe that is just because once the idea is in your head you convince yourself you have seen it. "Everybody is still checking the bathrooms for bottles. If anybody leaves anything in there now like shampoo it just gets thrown away." A spokesman for the trust said: "The thought that people have been into the bathroom and filmed whilst naked, something quite understandably private, is very upsetting for them. "This is particularly upsetting if you come from a different culture - there are all kinds of religious issues. "Some are young and perhaps away from home for the first time. It is offensive to them. "We are offering access to counselling. They have all been sent an individual letter." He said security at the hospital was repeatedly reviewed but no amount of security would be able to prevent someone taking their own camera into the block. No officers dealing with the investigation were available for comment but Detective Sergeant Baz Bazyluk, at Brighton police, said: "We always try to keep victims up to date as a matter of policy. Of course we will inform them of any developments in due course." Sussex Police have launched an investigation into the incident. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2404 From: Robert G. Ferrell Date: Mon Jan 29, 2001 7:36am Subject: RE: DARWIN AWARDS >Is there a web site for the Darwin Awards? >http://www.nipc.gov/ Heh. You might also take a look at http://www.darwinawards.com and http://www.officialdarwinawards.com Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2405 From: Thomas H. Jones Date: Mon Jan 29, 2001 9:33am Subject: NLJD and EOD > Date: Fri, 26 Jan 2001 09:29:52 -0500 > From: Rob Muessel >Subject: Re: Digest Number 492 - NLJD Issues >In closing, regardless of which NJD might be used for EOD applications, >there is no way I'd want to be the guy who is holding onto the antenna. >att least not without my earplugs. I greatly appreciate your comments and agree. About two years ago, Dean La Vey from the UK wrote an article in the magazine INTERSEC about using NLJD's for EOD. He basically said this is not a good idea, and this is the only published article I have ever seen on the subject. Having no experience in EOD, we tend to have the same opinion regarding EOD. Whereas most NLJD manufacturers advertise their NLJD for EOD, you will never find any advertising material from REI suggesting that the ORION be used for EOD. We, of course believe that our unit is the best in the world, but I don't have access to all types of landmines and if I did, we still would not be conducting the tests. I don't know how other small manufacturers can make these claims in advertising without documented tests results. My product liability insurance is already expensive enough. Have you ever tried to explain to an insurance company what an NLJD is? Nontheless, I do know that some countries use NLJD technology just for EOD, and they have been doing it for years with success. NLJD's are also used for inspecing parcels and as a quick means of deciding whether or not to X-ray. My only hope is that the countries that use NLJD's for EOD will conduct extensive testing prior to using the device, and that they will thoroughly understand all the technical aspects and risks. My experience and fear is that they will not. Regards, Tom 2406 From: Date: Mon Jan 29, 2001 10:47am Subject: Re: Digest Number 493 Manufacturers involved in Government NLJD trials are bound by a Confidentiality Clause, I suppose those who fail to pre-qualify have nothing to lose by spreading false rumours. Unwarranted criticism of competitors equipment, by any manufacturer, does little to convince potential users that your kit is any good! I can confirm that the only explosion caused by Superbroom was a massive surge in Audiotel's order book. All NLJDs, particularly pulsed systems, will potentially activate certain types of target, as will mobile phones, transceivers etc. Adrian Hickey Audiotel International Ltd 2407 From: Bill Hensley Date: Mon Jan 29, 2001 1:18pm Subject: RE: Fire authorities in California.... This is a hoary urban legend. See the URL below for discussion. http://www.snopes.com/horrors/freakish/scuba.htm Cheers, Bill Bill.Hensley@t... 405.869.6170 (vox) 405.737.2043 (fax) ----------------------------------------------- >Fire authorities in California found a corpse in a burned out section of >forest while assessing the damage done by a forest fire..The deceased male >was dressed in a full wet suit, complete with SCUBA tanks on his back, [...rest removed} 2408 From: Rick Hofmann - MICROSEARCH Date: Mon Jan 29, 2001 4:57pm Subject: Icom IC-R3 The February, 2001 edition of QST magazine has a review of the Icom IC-R3 hand held receiver. It sounds like a decent piece of amateur radio equipment. My question to the groups is, has anyone tried to use the IC-R3 to view any 2.4 GHz video? Additionally, I am curious to see if anyone has any intel on the future of the IC-R3 (ie, upgrades). Very truly yours, R.C.Hofmann, CCO, CPP MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 PI16998 [Non-text portions of this message have been removed] 2409 From: James M. Atkinson, Comm-Eng Date: Mon Jan 29, 2001 5:23pm Subject: Re: Icom IC-R3 At 2:57 PM -0800 1/29/01, Rick Hofmann - MICROSEARCH wrote: >The February, 2001 edition of QST magazine has a review of the Icom IC-R3 >hand held receiver. It sounds like a decent piece of amateur radio >equipment. My question to the groups is, has anyone tried to use the IC-R3 >to view any 2.4 GHz video? Additionally, I am curious to see if anyone has >any intel on the future of the IC-R3 (ie, upgrades). > >Very truly yours, > >R.C.Hofmann, CCO, CPP >MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage >Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: >714-209-0037 >PI16998 Rick, I personally own and use several R-3's but would suggest that you use a VBA-2400 as the sensitivity is fairly bad above 1.1 GHz on the R-3 (too much conversion loss, and not enough preamp). Using the VBA I can reliable lock onto a 30-50 mW Wavecom transmitter concealed inside a building (assuming of course that your within about 10 MHz of the channel). I also like the fact the you can invert the video signal and move the subcarriers around depending on your needs. The R-3 also does a great job of 433 and 900 MHz covert video as well. I like the fact that it presents the modulated audio and video to a connector for external display/recording. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2410 From: Gordon Mitchell Date: Mon Jan 29, 2001 5:39pm Subject: Re: Icom IC-R3 Don't count on too much from the R3. You can use it across the room from a Wavecom -- really poor sensitivity. Also, it only covers half of the 2.4 TV band. In case you thought you could beat this by hooking it to your spectrum analyzer IF output... they have disabled the FM TV function at that frequency. It is really not worth buying. Rick Hofmann - MICROSEARCH wrote: > > The February, 2001 edition of QST magazine has a review of the Icom IC-R3 > hand held receiver. It sounds like a decent piece of amateur radio > equipment. My question to the groups is, has anyone tried to use the IC-R3 > to view any 2.4 GHz video? Additionally, I am curious to see if anyone has > any intel on the future of the IC-R3 (ie, upgrades). > > Very truly yours, > > R.C.Hofmann, CCO, CPP > MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage > Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: > 714-209-0037 > PI16998 > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS [Non-text portions of this message have been removed] 2411 From: James M. Atkinson, Comm-Eng Date: Mon Jan 29, 2001 6:07pm Subject: Re: Icom IC-R3 I still prefer hunting for and viewing 2.4 GHz signals with a spectrum analyzer (and a SPECTRE), but you can conceal the R-3 in your briefcase, and spin the dial though the high threat bands for a quick check before you bring out the heavy iron (ie: a 50+ pound spectrum analyzer with all the trimmings). The R3 is for a "quick and dirty" check... nothing more... nothing less... I have also found the R3 to have really bad sensitivity unless you use an amplified and highly directional antenna. -jma At 3:39 PM -0800 1/29/01, Gordon Mitchell wrote: >Don't count on too much from the R3. You can use it across the room >from a Wavecom -- really poor sensitivity. Also, it only covers >half of the 2.4 TV band. In case you thought you could beat this by >hooking it to your spectrum analyzer IF output... they have disabled >the FM TV function at that frequency. > >It is really not worth buying. > >Rick Hofmann - MICROSEARCH wrote: >> >> The February, 2001 edition of QST magazine has a review of the Icom IC-R3 >> hand held receiver. It sounds like a decent piece of amateur radio >> equipment. My question to the groups is, has anyone tried to use the IC-R3 >> to view any 2.4 GHz video? Additionally, I am curious to see if anyone has >> any intel on the future of the IC-R3 (ie, upgrades). >> >> Very truly yours, >> >> R.C.Hofmann, CCO, CPP >> MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage >> Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: >> 714-209-0037 > > PI16998 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2412 From: Steve Uhrig Date: Mon Jan 29, 2001 9:05pm Subject: Re: Icom IC-R3 Once upon a midnight dreary, Rick Hofmann - MICROSEARCH pondered, weak and weary: > My question to the groups is, has anyone tried to use the > IC-R3 to view any 2.4 GHz video? Additionally, I am curious > to see if anyone has any intel on the future of the IC-R3 (ie, > upgrades). Having sold several thousand ICOM receivers in almost 17 years of being a (former) ICOM dealer, I will mention it generally is not a good idea to get a low serial number anything from ICOM. Every single receiver they have introduced, without exception, has been significantly redesigned after the first 5000 or so guinea pig buyers beta tested the things for them. And ICOM has a well known history of not making good on design defects. The R7100 is a good example. It has so many problems they just dropped it from the line. It would be best to wait 9-12 months after any new ICOM anything hits the street before buying. The best time to buy is in March. ICOM's fiscal year ends the end of March and their most aggressive sales and dealer promotions are during the latter part of Feb and all of March. Come April 1st, that's it, all deals expire. I had an early production R3 here. It stunk. The front end overloaded easily from adjacent channel signals a substantial distance away. Much of the UHF land mobile band was corrupted by the fifteen or so 460 county repeaters six miles airline from my place. In Baltimore City in the truck, whenever a VHF paging system keyed up the receiver would lose sensitivity. I don't know where the paging system was since I didn't have a spectrum analyzer, but I expect in the low 150s, and I was trying to listen to some amateur channels in 146-147. Even watching AM broadcast video on VHF when I was almost literally in sight of the antenna in Baltimore City would show an intermittent herringbone when some other unknown signal keyed up. I was probably putting many millivolts of proper freq RF down the throat of the R3 and the AGC should have been pumped way up. Something still was killing it. You sacrifice a lot of performance for the small package. Sensitivity is cheap, and that is the only spec most people (not you Rick of course) know how to compare. Selectivity is much more important and few know how to interpret those specs. Selectivity means filters, and filters means real estate on the circuit board. There just plain isn't room for decent filtering in these tiny receivers, so they suffer severely from adjacent channel interference. I live in a remote country area and I could tell the performance was miserable. Some people confuse an overloaded receiver and adjacent channel interference pumping up the AGC with poor receiver sensitivity or a weak signal and insist on hanging larger antennas on the poor thing. This only crams more signal down the throat of the receiver and makes the problem worse. More people would be served better by attenuators than preamps. ICOM's R10, another handheld receiver with wide freq coverage, had practically nonexistent HF performance. ICOM's service bulletin advised users to connect an external HF antenna to the thing if they wanted to listen to low frequencies. Anyone able to do that would not choose a shirt pocket receiver to listen to HF, of course. A toy AM broadcast radio worked better at AM broadcast than the expensive R10. That doesn't answer the question. The R3 is a poor performer at 2.4. Antennas are a big factor up here. A 1/4 wave unity stick antenna, or some multiband wide coverage coil loaded abortion like the stock factory rubber antenna, is not effective at 2.4. Remember up here gain antennas are used to get any realistic performance, and gain antennas must by nature be directional. If you are not in the path, you will not hear well with anything. Even Wavecoms and that inexpensive class of mass produced systems have a typically 2-3 dB patch antenna. Some systems are circularly polarized which is another complicated issue. There is significant loss going from circular polarized to linear polarized. All the 2.4 systems we manufacture use circular polarized antennas, more to let me isolate separate systems by mixing right hand and left hand than for any other reason. Linear receives neither well. I do not know offhand the loss. Gordon certainly would. If you wanted to sniff 2.4, an effective cheap way is with the repackaged Wavecom using a 6dB patch antenna mounted on a pingpong paddle as I have written up and demonstrated. The good sensitivity (cheap) coupled with the poor selectivity of the Wavecom receivers (expensive) means that on one of the four channels you will see anything within the band and quite a distance outside either edge. Rich Wells has an excellent website reviewing many types of receivers. I believe he is at www.strongsignals.net. He is honest and competent. The R3 also eats batteries by the way. Impractical to use it on batteries with the video active. You will carry a lot of spare batteries and become intimate with either your charger or your battery salesman. Long answer to a short question. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2413 From: James M. Atkinson, Comm-Eng Date: Tue Jan 30, 2001 7:26am Subject: Re: Icom IC-R3 At 10:05 PM -0500 1/29/01, Steve Uhrig wrote: >Once upon a midnight dreary, Rick Hofmann - MICROSEARCH pondered, >weak and weary: > >> My question to the groups is, has anyone tried to use the >> IC-R3 to view any 2.4 GHz video? Additionally, I am curious >> to see if anyone has any intel on the future of the IC-R3 (ie, >> upgrades). > >Having sold several thousand ICOM receivers in almost 17 years >of being a (former) ICOM dealer, I will mention it generally is >not a good idea to get a low serial number anything from ICOM. >Every single receiver they have introduced, without exception, >has been significantly redesigned after the first 5000 or so >guinea pig buyers beta tested the things for them. And ICOM has >a well known history of not making good on design defects. The >R7100 is a good example. It has so many problems they just >dropped it from the line. Same problem with the R-9000, even after 10 years in production it is STILL screwed up. Since Icom sells only a limited number of them they simply will not fix several design issues. >It would be best to wait 9-12 months after any new ICOM anything >hits the street before buying. Ah, but that is good advice for just about any piece of equipment. But with TSCM we have to stay on the bleeding edge of technology and (IMHO) grab any tool or pieces of equipment that will assist in achieving our goal of finding bugs and wiretaps. >The best time to buy is in March. ICOM's fiscal year ends the >end of March and their most aggressive sales and dealer >promotions are during the latter part of Feb and all of March. >Come April 1st, that's it, all deals expire. > >I had an early production R3 here. It stunk. The front end >overloaded easily from adjacent channel signals a substantial >distance away. Much of the UHF land mobile band was corrupted by >the fifteen or so 460 county repeaters six miles airline from my >place. In Baltimore City in the truck, whenever a VHF paging >system keyed up the receiver would lose sensitivity. I don't >know where the paging system was since I didn't have a spectrum >analyzer, but I expect in the low 150s, and I was trying to >listen to some amateur channels in 146-147. The current production units are just as bad. I have several R-3's including one of the very first ones, and several fairly recent ones and all of them have poor selectivity. >Even watching AM broadcast video on VHF when I was almost >literally in sight of the antenna in Baltimore City would show >an intermittent herringbone when some other unknown signal keyed >up. I was probably putting many millivolts of proper freq RF >down the throat of the R3 and the AGC should have been pumped >way up. Something still was killing it. > >You sacrifice a lot of performance for the small package. >Sensitivity is cheap, and that is the only spec most people (not >you Rick of course) know how to compare. Selectivity is much >more important and few know how to interpret those specs. > >Selectivity means filters, and filters means real estate on the >circuit board. There just plain isn't room for decent filtering >in these tiny receivers, so they suffer severely from adjacent >channel interference. I live in a remote country area and I >could tell the performance was miserable. The R-3 uses a large number of really small surface mount filters each of which just barely larger then a grain of wheat which hardly does the job. IMHO, selectivity is of primary concern to an eavesdropping concern, and unsaturated sensitivity is of primary concern to a bug detection concern. >Some people confuse an overloaded receiver and adjacent channel >interference pumping up the AGC with poor receiver sensitivity >or a weak signal and insist on hanging larger antennas on the >poor thing. This only crams more signal down the throat of the >receiver and makes the problem worse. More people would be >served better by attenuators than preamps. ... or a pre-selected directional antenna and THEN an amplifier (which is what the VBA-2400 does for us). >ICOM's R10, another handheld receiver with wide freq coverage, >had practically nonexistent HF performance. ICOM's service >bulletin advised users to connect an external HF antenna to the >thing if they wanted to listen to low frequencies. Anyone able >to do that would not choose a shirt pocket receiver to listen to >HF, of course. A toy AM broadcast radio worked better at AM >broadcast than the expensive R10. Bah... ICOM has to cobble things together to make the HF in most of their wide-band receivers work. If you want to tune in HF, then us an HF radio, if you want VHF/UHF then use a higher band unit. Look at the HF performance of the R-8500 (wide-band) versus the R-75 (dedicated HF). >That doesn't answer the question. > >The R3 is a poor performer at 2.4. Antennas are a big factor up >here. A 1/4 wave unity stick antenna, or some multiband wide >coverage coil loaded abortion like the stock factory rubber >antenna, is not effective at 2.4. Remember up here gain antennas >are used to get any realistic performance, and gain antennas >must by nature be directional. If you are not in the path, you >will not hear well with anything. Even Wavecoms and that >inexpensive class of mass produced systems have a typically 2-3 >dB patch antenna. Some systems are circularly polarized which is >another complicated issue. There is significant loss going from >circular polarized to linear polarized. All the 2.4 systems we >manufacture use circular polarized antennas, more to let me >isolate separate systems by mixing right hand and left hand than >for any other reason. Linear receives neither well. I do not >know offhand the loss. Gordon certainly would. I have found that once we get over 900 MHz it becomes critical to use a very highly directional antenna to reliably hunt down bugs or low power tranmsitter. >If you wanted to sniff 2.4, an effective cheap way is with the >repackaged Wavecom using a 6dB patch antenna mounted on a >pingpong paddle as I have written up and demonstrated. The good >sensitivity (cheap) coupled with the poor selectivity of the >Wavecom receivers (expensive) means that on one of the four >channels you will see anything within the band and quite a >distance outside either edge. Ah, but the secret to the Wavecoms are the cascaded AGC blocks they use on the IF, the multiple band-pass filters, and preselection just before the INA microwave amplifier on the front end. IMHO, the VBA work better then a patch antenna, but your right on target about the Wavcoms being really helpful. Just add a polarity switch so you can invert the video, and a pot so you can shift the black level. An unmodified Wavecom tends to perform very poorly when the signal is above 2.45 GHz or below 2.3 GHz, and some simple mods to the VCO will help expand the coverage. >Rich Wells has an excellent website reviewing many types of >receivers. I believe he is at www.strongsignals.net. He is >honest and competent. > >The R3 also eats batteries by the way. Impractical to use it on >batteries with the video active. You will carry a lot of spare >batteries and become intimate with either your charger or your >battery salesman. I have had good luck with the using several of the rechargeable battery packs as then are easy to change (I usually run 2-3 rechargeable per radio, plus a wall wart, a charger, and a vehicle adapter) >Long answer to a short question. > >Steve -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2414 From: James M. Atkinson, Comm-Eng Date: Tue Jan 30, 2001 8:24am Subject: MI5 foils plot to bug Prince William MI5 foils plot to bug Prince William http://www.excite.co.uk/news/story/UKOnlineReportTopNews/IIMFFH37839_2001-01-30_01-36-29_B522220 PRINCE WILLIAM BUGGING PLOT FOILED http://www1.sky.com/news/uk/story13.htm ================================== MI5 foils plot to bug Prince William http://www.excite.co.uk/news/story/UKOnlineReportTopNews/IIMFFH37839_2001-01-30_01-36-29_B522220 30/01/01 01:36 LONDON (Reuters) - Intelligence officers have uncovered a plot to bug Prince William at his Scottish university, newspapers reported. MI5 officers discovered electronic surveillance equipment during sweeps in the university town of St Andrews, the papers said. Unnamed intelligence sources were quoted as saying the equipment was set to tap into the prince's telephone calls and e-mails. It was programmed with word recognition triggers which would be activated when the prince was using the telephone or computer. Buckingham Palace has not commented on the bugging report. William, eldest son of Prince Charles and the late Princess Diana, will begin a four-year art history degree at St Andrews University in September. The principal of St Andrews University has warned students and staff of severe consequences if they leak stories about Prince William to the media. Both of William's parents have fallen victim to bugging devices and suffered the embarrassment of having their most private phone conversations made public. Prince Charles was taped having an intimate conversation with his mistress, Camilla Parker Bowles while the tapes of Diana's conversations with friend James Gilbey became known as "Squidgygate". William is currently enjoying a year off from studying after leaving Eton College, west of London, last summer. He recently took part in a Raleigh International character-building mission to Chile where he taught English to local school children, cleaned lavatories and cooked for his fellow volunteers. ================================== PRINCE WILLIAM BUGGING PLOT FOILED http://www1.sky.com/news/uk/story13.htm MI5 has reportedly seized electronic bugging equipment intended to monitor Prince William when he attends university this autumn. The claim comes amid growing concern over his security and privacy during his studies at St Andrews. The prince, who will be studying History of Art, was believed to have been targeted by devices that would have allowed snoopers to monitor his phone calls, e-mails and internet use. It is not yet known where the equipment was concealed but it was believed to have been found just before Christmas, according to the Daily Express. Warned Meanwhile it has emerged students who sell stories about Prince Williamís university life could be expelled. The principal of St Andrews has warned students if they try to cash in on the universityís most famous recent addition they may have to find themselves a new college. William is due to begin a four-year art history degree at the Scottish university in October. But there are fears hard-up students may be lured into taking snatch photographs of the Prince in the university bar or of revealing all about Williamís private life to the newspapers. Police state Dr Brian Lang told the university newspaper The Saint students would be given their marching orders if the Princeís privacy was infringed. And staff would be disciplined if details of Williamís academic performance were revealed. He said: "I would take a very dim view of information of an inappropriate nature about any member of the university being passed on. "At worst, a perpetrator might find him or herself having to find another university." The Studentsí Association stressed to Sky News Online those who pass on "tittle tattle" to journalists at the union bar were unlikely to be ordered out. Only "extreme" examples where students go out of their way to sell stories ñ or academic records ñ would lead to expulsion. "This is not a police state," said president Marcus Booth. "Everyoneís got a right to freedom of speech and comment but not to profit from selling details. If a journalist gets a few students drunk at the bar and they talk about student life and they say ëheís a great guyí then thatís fair game," "But if someone smuggles in a member of the European paparazzi and they take a photograph of William changing, thatís different." Strong feelings Mr Booth said most students accepted the universityís line. "The students Ií ve spoken to feel very strongly about this, as do the staff,î he said. University spokesman Claire Grainger said the rules were no different to those applied to other students. Applications to the university soared by 44 per cent last week ñ a rise put down to the "William factor". Dr Lang, a former chief executive of the British Library, has agreed to give up his official residence to allow the history of art department to be housed under one roof. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2415 From: A Grudko Date: Tue Jan 30, 2001 8:52am Subject: Re: Icom IC-R3 Quote- > I personally own and use several R-3's but would suggest that you use > a VBA-2400 as the sensitivity is fairly bad above 1.1 GHz on the R-3 > (too much conversion loss, and not enough preamp). JMA, who makes the VBA? I'm not familiar with it. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2416 From: James M. Atkinson, Comm-Eng Date: Tue Jan 30, 2001 11:36am Subject: Re: Icom IC-R3 At 4:52 PM +0200 1/30/01, A Grudko wrote: >Quote- >> I personally own and use several R-3's but would suggest that you use >> a VBA-2400 as the sensitivity is fairly bad above 1.1 GHz on the R-3 >> (too much conversion loss, and not enough preamp). > >JMA, who makes the VBA? I'm not familiar with it. > Research Electronics makes it, and we would be happy to provide it to you. The cost $ 495.00 USD, and it consists of a high gain, highly directional log periodic antenna with a built in low noise amplifier. It is powered by an 9 volt battery, but has a power jack for use with an appropriate wall-wart or external power supply. Also included is a small tripod suitable to setting it up on a table top. Personally, I have found it helpful to epoxy a laser pointer to the bottom of the antenna just below the amplifier module. If you are a list member, and ask nicely when you place your order with us; we will pay all the shipping charges via Federal Express (anywhere in the world) for your order. On a side note.... if any list member is interested in OSCOR's. ORIONS, CPM-700, VBA, Kaiser, EMCO antennas, AVCOM, WJ/Condor, Rockwell, Riser Bond, Lucent, Macom, or any other TSCM related equipment let me know as we provide real world, highly sophisticated equipment at very attractive pricing, and with very favorable conditions..... We provide good solid equipment, at a very fair price, with no games, and no bullshit. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2417 From: James M. Atkinson, Comm-Eng Date: Tue Jan 30, 2001 11:41am Subject: Re: Digest Number 493 At 4:47 PM +0000 1/29/01, Adrian@a... wrote: >Manufacturers involved in Government NLJD trials are bound by a >Confidentiality Clause, I suppose those who fail to pre-qualify have >nothing to lose by spreading false rumours. Unwarranted criticism of >competitors equipment, by any manufacturer, does little to convince >potential users that your kit is any good! > >I can confirm that the only explosion caused by Superbroom was a massive >surge in Audiotel's order book. > >All NLJDs, particularly pulsed systems, will potentially activate certain >types of target, as will mobile phones, transceivers etc. > >Adrian Hickey >Audiotel International Ltd That's funny because I have personally been able to touch off an electric match (from a blasting cap) with an Audiotel Broom, a Locator, a Superscout, an ORION, and several other NLJD's. I don't think it's an issue of whose equipment is better, more of a case of why you should not bring ANY RF transmitter close to a electric match, blasting cap, or electrically controlled or detonated device. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2418 From: JANVIER SEBASTIEN Date: Tue Jan 30, 2001 8:26am Subject: INTELLIGENCE INTELLIGENCE ISSN 1245-2122 N. 378, 22 January 2001 Every Two to Three Weeks Next Issue on 5 February 2001 Publishing since 1980 Editor Olivier Schmidt (email adi@u...; web http://www.blythe.org/Intelligence; tel/fax 33 1 40 51 85 19; post ADI, 16 rue des Ecoles, 75005 Paris, France) SÈbastien JANVIER (intelligence6@y...) web www.dgse.org post 3 square FranÁis Carco 78190 Trappes tel: 06.08.31.21.18 Copyright ADI 2001, reproduction in any form forbidden without explicit authorization from the ADI. A one year subscription (18 issues with full index) is US $315. TABLE OF CONTENTS, N. 378, 22 January 2001 FRONT PAGE WORLD-WIDE - CIA 2015 & THE COMING REAL WORLD p.1 TECHNOLOGY AND TECHNIQUES US NIJ SNIFFER GUIDE & BRITISH DEVICE p.2 THE FINE ART OF GARBAGEOLOGY p.3 DERA'S DEDICATED "THERMOBARIC" GRENADE p.4 GARBLED INPUT FOR BRIT CRIMINAL RECORDS p.5 COMPUTERS - Saddam's Explosive PlayStation. p.6 PEOPLE GREAT BRITAIN - SIR MICHAEL HANLEY p.7 NORTHERN IRELAND - NEIL MULHOLLAND p.8 RUSSIA - VIKTOR MAKAROV p.9 AGENDA COMING EVENTS THROUGH 1 MARCH 2001 p.10 INTELLIGENCE AROUND THE WORLD USA - OIL & BRITS POOR MIX ON WEST COAST p.11 - CIA'S OVERBEARING SECRECY GETS IT IN TROUBLE p.12 - Holiday Season at the CIA. p.13 - FBI & CIA GET A NEW JOINT CI-21 p.14 - FBI GOING AFTER LEE & CUBANS p.15 - FBI's Disaster Squad. p.16 - New Books on the FBI. p.17 - Pope Affair Leaves Canada Holding the Bag. p.18 GREAT BRITAIN - NEW CHINOOK CRASH THEORY, SAME OLD COVER-UP p.19 - MAXIMUM EMBARRASSMENT FOR MI6 p.20 - NEW YEAR HONOURS ROLE FOR SPIES p.21 - THE "HARD REALITY" OF POLICE CORRUPTION p.22 - EX-SPOOK TACKLES DOLE SCROUNGERS p.23 FRANCE - COMPARATIVE INTERNAL SECURITY & OTHER BOOKS p.24 GERMANY - FALSE "SPY FLAP" WITH BELGIUM p.25 ITALY - THE BRUTAL DEATH OF ROBERTO CALVI p.26 CYPRUS/SINGAPORE - BRITAIN'S SECRET NUCLEAR ARMS SITES p.27 BALKANS - Poor Depeleted Uranium "Takes the Rap". p.28 RUSSIA - OBUKHOV VERDICT OVERTURNED p.29 ZIMBABWE - WHO'S AFRAID OF THE CIO? p.30 SOUTHERN AFRICA - INTELLIGENCE SHAKEDOWNS & MIX UPS p.31 MIDDLE EAST - BIN LADEN AS A LOUSY EMPLOYER p.32 NEW ZEALAND - "SOLDIER FIVE" PUBLICATION POSTPONED p.33 --------------------------------------------- FRONT PAGE Intelligence, N. 378, 22 January 2001, p. 1 WORLD-WIDE THE CIA'S 2015 & THE COMING REAL WORLD The CIA recently released its "Global Trends 2015 - A Dialogue About the Future With Nongovernment Experts" (NIC 2000-02, December 2000; http://www.odci.gov/cia/publications/ globaltrends2015/), stating that: "This paper was approved for publication by the National Foreign Intelligence Board under the authority of the Director of Central Intelligence. Prepared under the direction of the National Intelligence Council. Its table of contents is the following: Contents; Note on Process; Overview; The Drivers and Trends; Key Uncertainties - Technology Will Alter Outcomes; Key Challenges to Governance - People Will Decide; Discussion; Population Trends (Divergent Aging Patterns, Movement of People, Health, Natural Resources and Environment, Food, Water, Energy, Environment); Science and Technology (Information Technology, Biotechnology, Other Technologies); The Global Economy (Dynamism and Growth, Unequal Growth Prospects and Distribution, Economic Crises and Resilience); National and International Governance (Nonstate Actors, Criminal Organizations and Networks, Changing Communal Identities and Networks, Overall Impacts on States, International Cooperation); Future Conflict (Internal Conflicts, Transnational Terrorism, Interstate Conflicts, Reacting to US Military Superiority); Major Regions (East and Southeast Asia, South Asia, Russia and Eurasia, Middle East and North Africa, Sub-Saharan Africa, Europe, Canada, Latin America); Appendix; Four Alternative Global Futures. The "Note on Process" provides a good description of the publication: "In undertaking this comprehensive analysis, the NIC worked actively with a range of nongovernmental institutions and experts. We began the analysis with two workshops focusing on drivers and alternative futures, as the appendix describes. Subsequently, numerous specialists from academia and the private sector contributed to every aspect of the study, from demographics to developments in science and technology, from the global arms market to implications for the United States. Many of the judgments in this paper derive from our efforts to distill the diverse views expressed at these conferences or related workshops." "Major conferences cosponsored by the NIC with other government and private centers in support of Global Trends 2015 included: Foreign Reactions to the Revolution in Military Affairs (Georgetown University); Evolution of the Nation-State (University of Maryland); Trends in Democratization (CIA and academic experts); American Economic Power (Industry & Trade Strategies, San Francisco, CA); Transformation of Defense Industries (International Institute for Strategic Studies, London, UK); Alternative Futures in War and Conflict (Defense Intelligence Agency and Naval War College, Newport, RI, and CIA); Out of the Box and Into the Future - A Dialogue Between Warfighters and Scientists on Far Future Warfare (Potomac Institute, Arlington, VA); Future Threat Technologies Symposium (MITRE Corporation, McLean, VA); The Global Course of the Information Revolution - Technological Trends (RAND Corporation, Santa Monica, CA); The Global Course of the Information Revolution - Political, Economic, and Social Consequences (RAND Corporation, Santa Monica, CA); The Middle East - The Media, Information Technology, and the Internet (The National Defense University, Fort McNair, Washington, DC); Global Migration Trends and Their Implications for the United States (Carnegie Endowment for International Peace, Washington, DC); Alternative Global Futures - 2000-2015 (Department of State/Bureau of Intelligence and Research and CIA's Global Futures Project)." "In October 2000, the draft report was discussed with outside experts, including Richard Cooper and Joseph Nye (Harvard University), Richard Haass (Brookings Institution), James Steinberg (Markle Foundation), and Jessica Mathews (Carnegie Endowment for International Peace). Their comments and suggestions are incorporated in the report. Daniel Yergin (Cambridge Energy Research Associates) reviewed and commented on the final draft." Below, we reprint the "Overview" and the "Appendix - Four Alternative Global Futures". "Overview - Global Trends 2015: A Dialogue About the Future With Nongovernment Experts Over the past 15 months, the National Intelligence Council (NIC), in close collaboration with US Government specialists and a wide range of experts outside the government, has worked to identify major drivers and trends that will shape the world of 2015. The key drivers identified are: (l) Demographics; (2) Natural resources and environment; (3) Science and technology; (4) The global economy and globalization; (5) National and international governance; (6) Future conflict; (7) The role of the United States." "In examining these drivers, several points should be kept in mind: No single driver or trend will dominate the global future in 2015. Each driver will have varying impacts in different regions and countries. The drivers are not necessarily mutually reinforcing; in some cases, they will work at cross-purposes. Taken together, these drivers and trends intersect to create an integrated picture of the world of 2015, about which we can make projections with varying degrees of confidence and identify some troubling uncertainties of strategic importance to the United States." "The Methodology - Global Trends 2015 provides a flexible framework to discuss and debate the future. The methodology is useful for our purposes, although admittedly inexact for the social scientist. Our purpose is to rise above short-term, tactical considerations and provide a longer-term, strategic perspective. Judgments about demographic and natural resource trends are based primarily on informed extrapolation of existing trends. In contrast, many judgments about science and technology, economic growth, globalization, governance, and the nature of conflict represent a distillation of views of experts inside and outside the United States Government. The former are projections about natural phenomena, about which we can have fairly high confidence; the latter are more speculative because they are contingent upon the decisions that societies and governments will make." "The drivers we emphasize will have staying power. Some of the trends will persist; others will be less enduring and may change course over the time frame we consider. The major contribution of the National Intelligence Council (NIC), assisted by experts from the Intelligence Community, has been to harness US Government and nongovernmental specialists to identify drivers, to determine which ones matter most, to highlight key uncertainties, and to integrate analysis of these trends into a national security context. The result identifies issues for more rigorous analysis and quantification." "Revisiting Global Trends 2010: How Our Assessments Have Changed Over the past four years. We have tested the judgments made in the predecessor, 'Global Trends 2010', published in 1997. 'Global Trends 2010' was the centerpiece of numerous briefings, conferences, and public addresses. Various audiences were energetic in challenging, modifying or confirming our judgments. The lively debate that ensued has expanded our treatment of drivers, altered some projections we made in 1997, and matured our thinking overall -- which was the essential purpose of this exercise." "'Global Trends 2015' amplifies several drivers identified previously, and links them more closely to the trends we now project over the next 15 years. Some of the key changes include: Globalization has emerged as a more powerful driver. GT 2015 sees international economic dynamics -- including developments in the World Trade Organization -- and the spread of information technology as having much greater influence than portrayed in GT 2010. GT 2015 assigns more significance to the importance of governance, notably the ability of states to deal with nonstate actors, both good and bad. GT 2015 pays attention both to the opportunities for cooperation between governments and private organizations and to the growing reach of international criminal and terrorist networks. GT 2015 includes a more careful examination of the likely role of science and technology as a driver of global developments. In addition to the growing significance of information technology, biotechnology and other technologies carry much more weight in the present assessment." "The effect of the United States as the preponderant power is introduced in GT 2015. The US role as a global driver has emerged more clearly over the past four years, particularly as many countries debate the impact of 'US hegemony' on their domestic and foreign policies. GT 2015 provides a more complete discussion of natural resources including food, water, energy, and the environment. It discusses, for example, the over three billion individuals who will be living in water-stressed regions from North China to Africa and the implications for conflict. The linkage between energy availability, price, and distribution is more thoroughly explored. GT 2015 emphasizes interactions among the drivers. For example, we discuss the relationship between S&T, military developments, and the potential for conflict." "In the regional sections, GT 2015 makes projections about the impact of the spread of information, the growing power of China, and the declining power of Russia. Events and trends in key states and regions over the last four years have led us to revise some projections substantially in GT 2015. GT 2010 did not foresee the global financial crisis of 1997-98; GT 2015 takes account of obstacles to economic development in East Asia, though the overall projections remain fairly optimistic. As described in GT 2010, there is still substantial uncertainty regarding whether China can cope with internal political and economic trends. GT 2015 highlights even greater uncertainty over the direction of Beijing's regional policies." "Many of the global trends continue to remain negative for the societies and regimes in the Middle East. GT 2015 projects at best a 'cold peace' between Israel and its adversaries and sees prospects for potentially destabilizing social changes due to adverse effects of globalization and insufficient attention to reform. The spike in oil revenues reinforces the assessment of GT 2010 about the rising demand for OPEC oil; these revenues are not likely to be directed primarily at core human resources and social needs. Projections for Sub-Saharan Africa are even more dire than in GT 2010 because of the spread of AIDS and the continuing prospects for humanitarian crises, political instability, and military conflicts." ... "Appendix - Four Alternative Global Futures. In September- October 1999, the NIC initiated work on 'Global Trends 2015' by cosponsoring with Department of State/INR and CIA's Global Futures Project two unclassified workshops on Alternative Global Futures: 2000-2015. The workshops brought together several dozen government and nongovernment specialists in a wide range of fields. The first workshop identified major factors and events that would drive global change through 2015. It focused on demography, natural resources, science and technology, the global economy, governance, social/cultural identities, and conflict and identified main trends and regional variations. These analyses became the basis for subsequent elaboration in Global Trends 2015. The second workshop developed four alternative global futures in which these drivers would interact in different ways through 2015. Each scenario was intended to construct a plausible, policy- relevant story of how this future might evolve: highlighting key uncertainties, discontinuities, and unlikely or 'wild card' events, and identifying important policy and intelligence challenges." "Scenario One - Inclusive Globalization: A virtuous circle develops among technology, economic growth, demographic factors, and effective governance, which enables a majority of the world's people to benefit from globalization. Technological development and diffusion -- in some cases triggered by severe environmental or health crises -- are utilized to grapple effectively with some problems of the developing world. Robust global economic growth -- spurred by a strong policy consensus on economic liberalization -- diffuses wealth widely and mitigates many demographic and resource problems. Governance is effective at both the national and international levels. In many countries, the state's role shrinks, as its functions are privatized or performed by public-private partnerships, while global cooperation intensifies on many issues through a variety of international arrangements. Conflict is minimal within and among states benefiting from globalization. A minority of the world's people -- in Sub-Saharan Africa, the Middle East, Central and South Asia, and the Andean region -- do not benefit from these positive changes, and internal conflicts persist in and around those countries left behind." "Scenario Two - Pernicious Globalization: Global elites thrive, but the majority of the world's population fails to benefit from globalization. Population growth and resource scarcities place heavy burdens on many developing countries, and migration becomes a major source of interstate tension. Technologies not only fail to address the problems of developing countries but also are exploited by negative and illicit networks and incorporated into destabilizing weapons. The global economy splits into three: growth continues in developed countries; many developing countries experience low or negative per capita growth, resulting in a growing gap with the developed world; and the illicit economy grows dramatically. Governance and political leadership are weak at both the national and international levels. Internal conflicts increase, fueled by frustrated expectations, inequities, and heightened communal tensions; WMD proliferate and are used in at least one internal conflict." "Scenario Three - Regional Competition: Regional identities sharpen in Europe, Asia, and the Americas, driven by growing political resistance in Europe and East Asia to US global preponderance and US-driven globalization and each region's increasing preoccupation with its own economic and political priorities. There is an uneven diffusion of technologies, reflecting differing regional concepts of intellectual property and attitudes towards biotechnology. Regional economic integration in trade and finance increases, resulting in both fairly high levels of economic growth and rising regional competition. Both the state and institutions of regional governance thrive in major developed and emerging market countries, as governments recognize the need to resolve pressing regional problems and shift responsibilities from global to regional institutions. Given the preoccupation of the three major regions with their own concerns, countries outside these regions in Sub-Saharan Africa, the Middle East, and Central and South Asia have few places to turn for resources or political support. Military conflict among and within the three major regions does not materialize, but internal conflicts increase in and around other countries left behind." "Scenario Four - Post-Polar World: US domestic preoccupation increases as the US economy slows, then stagnates. Economic and political tensions with Europe grow, the US-European alliance deteriorates as the United States withdraws its troops, and Europe turns inward, relying on its own regional institutions. At the same time, national governance crises create instability in Latin America, particularly in Colombia, Cuba, Mexico, and Panama, forcing the United States to concentrate on the region. Indonesia also faces internal crisis and risks disintegration, prompting China to provide the bulk of an ad hoc peacekeeping force. Otherwise, Asia is generally prosperous and stable, permitting the United States to focus elsewhere. Korea's normalization and de facto unification proceed, China and Japan provide the bulk of external financial support for Korean unification, and the United States begins withdrawing its troops from Korea and Japan. Over time, these geostrategic shifts ignite longstanding national rivalries among the Asian powers, triggering increased military preparations and hitherto dormant or covert WMD programs. Regional and global institutions prove irrelevant to the evolving conflict situation in Asia, as China issues an ultimatum to Japan to dismantle its nuclear program and Japan -- invoking its bilateral treaty with the US -- calls for US reengagement in Asia under adverse circumstances at the brink of a major war. Given the priorities of Asia, the Americas, and Europe, countries outside these regions are marginalized, with virtually no sources of political or financial support." "Generalizations Across the Scenarios: The four scenarios can be grouped in two pairs: the first pair contrasting the 'positive' and 'negative' effects of globalization; the second pair contrasting intensely competitive but not conflictual regionalism and the descent into regional military conflict. In all but the first scenario, globalization does not create widespread global cooperation. Rather, in the second scenario, globalization's negative effects promote extensive dislocation and conflict, while in the third and fourth, they spur regionalism. In all four scenarios, countries negatively affected by population growth, resource scarcities and bad governance, fail to benefit from globalization, are prone to internal conflicts, and risk state failure. In all four scenarios, the effectiveness of national, regional, and international governance and at least moderate but steady economic growth are crucial. In all four scenarios, US global influence wanes." COMMENT -- It should be noted that the CIA study is very heavily based on the concept of "globalization" which is still lacking a universally accepted definition. One social scientist studying the term has stated that "globalization" has simply replaced the over-used term, "development", which, in turn, replaced the worn-out term, "progress". It would be helpful to replace all occurrences of "globalization" in the CIA report with an unknown value, "X", that has to be defined each time it is used. Although the report tends to recognize that "US global influence wanes", it does not seem to take into account that "domestic" developments in the US -- the Jewish lobby, the Old China crowd, the Christian fundamentalists, Black Americans, Mexican Americans -- are not going to "ride out events" in any rational or neutral manner. The current right-wing fanatic reaction against China and the scandalous treatment of US nuclear scientist, Wen Ho Lee, provide a clear example of how "domestic" events can easily influence -- even determine -- international developments, a process the report conveniently sidelines. The "domestic" political backing of the US alliance with Israel is another example of a major conflict whose evolution is not being determined on the international scene but inside the United States. Not factoring in "domestic" US developments and only looking abroad is the chief weakness of the CIA report. Indeed, many foreign specialists see one of the near future's major problems and source of conflict as the increasing gap between rich and poor in the US and other "domestic" US instabilities. But then, that's the FBI's problem and not the CIA's. This lack of perspective is also manifest in the use of terms such as "forcing the United States to concentrate on the region". The US has been "concentrating" on China, Israel- Palestine, Colombia, Indonesia, and things aren't getting any better. Other "drivers" that certain specialists feel should be given more emphasis are Russia (the CIA missed predicting its collapse and may now miss its renaissance), the increasing role of joint international (military) intervention in the internal affairs of other countries (some suggest that the UN monitor the next US presidential election), and the bipolar world the euro and the dollar are creating. Those outside intelligence tend to forget that French francs cover most of Western Africa and Deutsch marks are used all the way from Poland to the Caucasues, while the US dollar is now the official money of several Latin American countries. It looks like countries are going to have to choose between the "American way of life" (death penalties and ghettos included) and "old Europe" (slow, inefficient but humane). There are plenty of unanticipated conflicts the CIA is going to have to deal with, but it should be congratulated for its outstanding effort at laying out its methodology and presenting its results. Now all it has to do is listen to its critics and assimilate their contributions. --------------------------------------------- TECHNOLOGY AND TECHNIQUES Intelligence, N. 378, 22 January 2001, p. 2 US NIJ SNIFFER GUIDE & BRITISH DEVICE The US National Institute of Justice (NIJ) just published a "Guide for the Selection of Drug Detectors for Law Enforcement Applications" (NIJ Guide 601-00) which surveys the field of contraband drug detection methods. It includes background information on the problem of contraband drugs in the United States, the various applications of drug detection, and a discussion of considerations that are important in choosing a drug detection system. It examines four major types of drug detection: trace detection technologies (mechanical "sniffers"), canine detection, bulk detection technologies (e.g., x-ray and other imaging techniques), and manual search techniques. Also included: a list of Web sites for companies making trace and bulk detection systems, basic information on common drugs of abuse, and a glossary of terms. It is available on the NCJRS Web site at http://www.ncjrs.org/pdffiles1/nij/183260.pdf. A new British drug detection device, developed by Middlesex University, will begin "field tests" next month, and should help "stem the illicit trade" of drug trafficking in the UK, according to the British government's drug czar, Keith Hellawell, in a speech to academics and teachers at an International Conference for the Association of Science Education, held at Sussex University on 3 January. The equipment sniffs the air for particles of Class A drugs such as heroin and cocaine, similar to the hand-held carbon dioxide detection devices used by UK Customs and Excise and cross- channel ferry companies to examine vehicles suspected of illegal immigration trafficking. Apart from the introduction of new technology, Mr. Hellawell told delegates that experts from UK police forces and the National Criminal Intelligence Service (NCIS) had been seconded to Turkey, and to eastern European countries, to help target and identify traffickers. However, his speech was not without controversy and he was criticized for referring specifically to the British Turk community as a "key link" in the heroin trade, claiming the system worked through Turkish families and associates with legitimate businesses in Britain "which facilitate money laundering in London and other major cities". He qualified his remarks by stating "we don't want to tarnish all Turkish people, or people from eastern Europe as potential criminals ... but these linkages are something that we look at". --------------------------------------------- Intelligence, N. 378, 22 January 2001, p. 3 THE FINE ART OF GARBAGEOLOGY On 26 November, the "Sunday Times" published a leaked memo written by Jonathan Powell, British Prime Minister Tony Blair's top aide -- effectively his "chief of staff" -- containing a series of more-or-less decipherable jottings on a variety of subjects. The emergence of the memo, claimed the "Sunday Times", was indicative of a high-level "mole" inside Downing Street -- something widely touted in the media during the last few months. This disingenuous story belied what the "Sunday Times" knew very well: that the memo had -- with cat food and nappy contents thoughtfully scraped off -- been recovered from Powell's domestic rubbish. "Garbageology", also known in the US as "dumpster diving", is a traditional pursuit of intelligence services throughout the world. In the UK, there is also a small but thriving private sector which operates a lucrative practice selling the contents of office and household rubbish to newspapers. It is also a speciality of the computer hacking fraternity. The doyen of professional rubbish collectors in the British private sector is Benjamin Pell -- known as "Benji the Binman" -- who makes a decent living from raiding the rubbish of the rich and famous and, equally importantly, their lawyers and accountants. His most recent major coup was to supply the "Sunday Times" with documents showing that the millionaire Labour Party fundraiser and heavyweight fixer, Lord Levy, had only paid oe35,000 in income tax during 1998/99. The source was rubbish thrown out by Levy's accountants. On that occasion, Pell had been "commissioned" by the "Sunday Times" to acquire any material on Levy or another senior Blair adviser, Philip Gould. Murdoch-owned papers make regular use of the Binman's services: a number of invoices recovered by police during a search of his house in November 1999 revealed that over the previous six months he had been paid nearly oe36,000 for material concerning Jonathan Aitken, James Hewitt (sometime paramour of Princess Diana), and a case of alleged corruption in local government. Musicians Elton John, Mick Jagger and Paul McCartney, comedian Rik Mayall, "Spice Girl" Geri Halliwell and tycoon Mohammed al-Fayed have also been subject to his particular attentions. Invoices from the Mirror group, publishers of the tabloid "Daily Mirror" and "Sunday Mirror", were also found by police. The Binman's career was thought to have been brought to an end in November last year when he was successfully prosecuted and convicted of five counts of "stealing documentary waste" from a law firm (whose clients included Aitken and Hewitt). The police, who had searched his home, found 200,000 documents in a garden shed. In mitigation, Benji explained that he suffers from an "obsessive compulsive disorder", a psychiatric condition which takes the form of a collection mania. Though convicted, he avoided a jail sentence. Unfortunately, his notoriety is now such that he is invariably blamed whenever compromising material is recovered from somebody's rubbish. MI5 is not shy of doing its own bin-raiding on occasion but tend to be more discreet. Some evidence of their modus operandi comes from the diaries of Tony Benn, the veteran left-wing Labour MP. He recounts an occasion when -- suspecting that he was under MI5 surveillance -- he arranged for a wire 2419 From: Steve Uhrig Date: Tue Jan 30, 2001 3:00pm Subject: Sniffing video at 2.4 -- Hints & Kinks Once upon a midnight dreary, Rick Hofmann - MICROSEARCH pondered, weak and weary: > The Avcom video demodulator I've been using would probably > work better with a different antenna. It's all in the antennas. > I'm using a discone most of the time, and the best I seem to > be able to get is a rolling image. Once you get above about a gig you need specialty antennas. And don't forget feedline losses at 2.4. Only a few feet of low loss coax is best. Forget the 25 and 50 foot jumpers. They are open circuits at 2.4. The rolling is due to sync compression in nonlinear PA stages in the transmitter. Most amplifier stages used in video transmitters, especially bastardized Wavecoms and add on/outboard amps, are not linear and compress the sync. Under the best of conditions many wireless video systems barely sync up. Some receivers, yours maybe, needs a louder sync than a purpose-built video receiver. Better grade transmitters like the ones we manufacture incorporate a sync stretcher circuit to essentially pre-emphasize the sync, so when it gets squashed in the power output stages there is enough left to lock up the monitor. Here is a tip to solve the problem for next to no cost. You can compensate for rolling/weak sync by going into your monitor and wrapping a few turns of wire around the flyback transformer in your monitor (CRT types only of course). Ground one side of the winding and run the other through maybe a 50K pot. Grab the wiper of the pot and apply that to the AGC stage of the receiver. The receiver can be part of the monitor or a separate unit. What this will do is grab the pulse off the flyback about when the receiver/monitor is expecting the sync pulse, and drive the AGC gain way up only for that sync period. When the compressed sync pulse arrives in the receiver, the gain is cranked way up and it amplifies the sync pulse back to normal levels, but only when the receiver is expecting sync. Tune the pot for the proper level applied to the AGC for best lock. The most you might have to do is make sure your pulse is driving the AGC gain up, not down, at the proper time. A scope will show you the pulse you pick up off the flyback which will match the timing of the incoming sync pulse. Above concept and implementation (c) Steve circa 1985! > One thing that does work is to put a flashing strobe light in > view of the camera. If nothing else, you can see the flash. Cheaper is an inexpensive hardware store bimetal flasher you put in series with whatever table or desk lamp you can borrow. No wiring required as the flasher goes between the plug and the wall outlet. Thank Marty for this one, which works beautifully. If you see a flash on your monitor, you start sweeping the walls with a flashlight to find the camera. Most practically sized antennas will not be directional enough to where aiming is that critical. If you can hold and transport the thing, it is not going to have enough gain to where the pattern is that sharp. The 6dB patch antenna I use is plenty adequate. Fits on a pingpong paddle and has about a 60 degree beamwidth. Even the high gain antennas will still be something like 20 degrees horizontal (to the 3 dB down point). Not critical. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2420 From: James M. Atkinson, Comm-Eng Date: Tue Jan 30, 2001 6:10pm Subject: Re: Sniffing video at 2.4 -- Hints & Kinks At 4:00 PM -0500 1/30/01, Steve Uhrig wrote: >Once upon a midnight dreary, Rick Hofmann - MICROSEARCH pondered, >weak and weary: > >> The Avcom video demodulator I've been using would probably >> work better with a different antenna. > >It's all in the antennas. > >> I'm using a discone most of the time, and the best I seem to >> be able to get is a rolling image. > >Once you get above about a gig you need specialty antennas. And >don't forget feedline losses at 2.4. Only a few feet of low loss >coax is best. Forget the 25 and 50 foot jumpers. They are open >circuits at 2.4. > >The rolling is due to sync compression in nonlinear PA stages in >the transmitter. Most amplifier stages used in video >transmitters, especially bastardized Wavecoms and add >on/outboard amps, are not linear and compress the sync. Under >the best of conditions many wireless video systems barely sync >up. Some receivers, yours maybe, needs a louder sync than a >purpose-built video receiver. Better grade transmitters like the >ones we manufacture incorporate a sync stretcher circuit to >essentially pre-emphasize the sync, so when it gets squashed in >the power output stages there is enough left to lock up the >monitor. [snip] [cough-cough] if I might be so bold.... The "rolling" or tearing is also caused by an ***inverted*** sync pulse which is common on the X10 units, and various non-Wavecom versions. Also rolling/tearing is also an indication of a 15 kHz horizontal PAL/SECAM signal instead of a 15.734 NTSC kHz signal. I have personal knowledge of specific U.S. eavesdroppers using PAL/SECAM video in the US, and specific spy shops in the US selling PAL/SECAM covert video equipment. What better way to throw off a U.S. based TSCM person then to use a non US video signal. I have also examined video transmission equipment (for ENG and surveillance usage) where the equipment did not emit any kind of sync pulse or similar signal but was instead locked onto a timing standard broadcast from the listening post/studio (which provided genlock to the remote cameras). Also, most normal cables and connectors (ie: Radio Shack Grade RG58) are fairly worthless above 1 GHz, and as a result you have to keep your cables as short as possible ***AND*** use ultra-high grade cables and connectors. Personally, I prefer RG-214 cables and N Type connectors for the microwave lower frequencies, and SMA with RG-400 at higher frequencies (mm signals are an entirely different thing). -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2421 From: Steve Uhrig Date: Tue Jan 30, 2001 7:19pm Subject: Mangled sync? Once upon a midnight dreary, James M. Atkinson, Comm-Eng pondered, weak and weary: > The "rolling" or tearing is also caused by an ***inverted*** sync > pulse which is common on the X10 units, and various non-Wavecom > versions. Also rolling/tearing is also an indication of a 15 kHz > horizontal PAL/SECAM signal instead of a 15.734 NTSC kHz signal. I personally have never seen "inverted" sync pulses and I have been around video some. I have seen, many many times, low sync levels, particularly on wireless video. > I have personal knowledge of specific U.S. eavesdroppers using > PAL/SECAM video in the US, and specific spy shops in the US > selling PAL/SECAM covert video equipment. What better way to > throw off a U.S. based TSCM person then to use a non US video > signal. PAL into an NTSC monitor generally is easily readable, but with a large black band across the bottom of the screen. It's not pretty but perfectly copyable. I have a fair amount of PAL gear here. The differences are not all that much. You won't get broadcast quality but you will get a usable image. I would presume anyone experiencing rolling would first try to stop it with the vertical adjustment, which changes the frequency and/or level of the sync. If that doesn't stop it, my suggestion will work. I have done it, several times. in several countries. I also manufacture NTSC to PAL converters so I have a pretty fair idea of the differences in the formats. The chances of seeing compressed sync in the field are far greater than seeing the wrong format. Transmitting PAL in an attempt to prevent interception would not be effective and a complete waste of time and money. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2422 From: James M. Atkinson, Comm-Eng Date: Tue Jan 30, 2001 8:19pm Subject: REI VBA-2400 (2.4 GHz Video Booster Antenna) Here is some additional information on the VBA... The units I have examined have had a center frequency of 2.380 GHz, with a bandwidth of roughly 200 MHz. The internal preselection filter frequency coverage is roughly 2.33 to 2.53 GHz, (between the -3 dB drop points, as actually measured by myself on a several production units). On the lower skirt the filter drops to -12 dB at 2.30 GHz, and the upper skirt drops down to -12 dB at 2.575 GHz. The unit uses a preamplifier circuit with roughly 22 dB of gain, but after we take into account the insertion loss of the preselection filters, and nF (noise factor) of the VBA the effective actual gain is about 15 dB (as measured on a production unit with a microwave network analyzer). The actual geometry of the log periodic antenna provides a gain of about 8-12 dB (but Tom feel free to correct me on this). The end result is that the signal is punched up about 22-28 dB which is one heck of a boost over a 3 to 6 dB patch antennas. If your using a broadband discone with RG-58 coax or rubber ducky antenna currently, you will be stunned at the massive difference the VBA makes. The VBA is roughly 8 inches long, 3 inches wide, and three quarters inch thick (not including the sturdy fold-up antenna that is provided). The only thing I don't like about it is that I feel the bandwidth should be wider, and cover 2.00 to 2.700 GHz (700 MHz bandwidth), the ripple is a little too high on the lower skirt. (cough-cough) I hope Tom and Bruce see this, perhaps they could come out with a Wide band version (cough-cough) If you would like something small like the VBA-2400 (under a grand) and don't mind using PayPal you can buy and pay for the VBA though the following link. The total price is $495.00 (494.99 + .01 S&H) as PayPal insists that I charge something for shipping): https://secure.paypal.com/xclick/business=jmatk%40tscm.com&undefined_quantity=1&item_name=2.4+GHz+Video+Booster+Antenna&item_number=VBA-2400&amount=494.99&shipping=.01&return=http%3A//www.tscm.com/ PayPal will let you write an eCheck and pull the funds directly out of your checking account, or charge the purchase against all major credit cards. Alternately you an just send a company check, money order, etc. but I only accept plastic though PayPal. As a courtesy we ship via Federal Express, and pay the shipping charges for you (so you get free courier shipping) -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2423 From: A Grudko Date: Wed Jan 31, 2001 6:01am Subject: Re: Sniffing video at 2.4 -- Hints & Kinks Jeepers, this switch to yahoogroops has caused some headaches - anyway.... ----- Original Message ----- Snipped--------- > Once you get above about a gig you need specialty antennas. I have a 'corner' antenna, made by a local company, which works great although it's big and heavy (I thought things gor smaller as frequency went up!). It is said to be 10db gain at 1 gig, 16 db at 3 gigs. I link it to my receiver/SA with less than a metre of Belden 9114 coax. The reflector is made from powder coated 1.6 mm steel plate (in 2 pieces which bolt together to facilitate transporting) about 14" high and a bit wider, forming a 90 degree 'wing'. Mounted at the focus is a triangular, horizontally polarised element, about 3" at the base and 4" long It works well and is very directional - I'd guess 20 degrees or better. > The rolling is due to sync compression in nonlinear PA stages in > the transmitter. I have a portable sync generator built by a ham buddy which I put in line and it works great - if anyone needs one let me know privatly and I'll get the circuit diagram out of him!! Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2424 From: Date: Wed Jan 31, 2001 4:17am Subject: This is not why I get the big bucks.... In a message dated 1/31/01 5:57:58 AM Pacific Standard Time, agrudko@i... writes: << Jeepers, this switch to yahoogroops has caused some headaches - anyway.... >> http://au.egroups.com/mygroups It's the same good old systems of eGroups. And it works great for us Yanks. You won't be disappointed. You'll have the same id and password. Also, you can try these. Ausralia http://au.egroups.com/mygroups Canada http://www.egroups.ca/ UK http://www.egroups.co.uk/ China http://cn.egroups.com/ HK http://www.egroups.com.hk/ India http://in.egroups.com/ Japan: http://www.egroups.co.jp/ Korea http://kr.egroups.com/ Taiwan http://tw.egroups.com/ Fra nce http://www.egroups.fr/ Germany http://www.egroups.de/ Italy http://it.egroups.com/ 2425 From: Date: Wed Jan 31, 2001 5:03am Subject: Survivor - humor Plans are already in the making for a third "Survivor" show. It will be staged in Texas, which is obviously larger than Australia. 10 people will each drive from San Antonio to Amarillo in a Volkswagen bus painted with peace signs and a huge banner that reads: I AM A QUEER, DEMOCRAT, VEGETARIAN AND I AM COMING TO TAKE AWAY YOUR GUNS! Whoever survives will be the winner...... 2426 From: Robert G. Ferrell Date: Wed Jan 31, 2001 10:41am Subject: Re: Survivor - humor >Plans are already in the making for a third "Survivor" show. It will be >staged in Texas, which is obviously larger than Australia. > >10 people will each drive from San Antonio to Amarillo in a Volkswagen bus >painted with peace signs and a huge banner that reads: > >I AM A QUEER, DEMOCRAT, VEGETARIAN AND I AM COMING TO TAKE AWAY YOUR GUNS! > >Whoever survives will be the winner...... This is a really cool example of the evolution of an Internet story. This joke originated several years ago without the "Survivor" reference. I added the "Volkswagen Bus" part to it about a year ago and sent it on. Now someone's made it topical by linking it to "Survivor." Fascinating, Captain... RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2427 From: Date: Wed Jan 31, 2001 3:08pm Subject: Fingerprints for food Technology allows some students to leave lunch money at home Students at Welsh Valley Middle School, in Penn Valley, Pa., are part of a fingerprinting program that lets pupils pay for tater-tots and other cafeteria delicacies without ever carrying cash. ASSOCIATED PRESS PENN VALLEY, Pa., Jan. 24 ≠ The tiny ridges on a student's index finger could soon make school lunch money and lunch-line bullies a thing of the past. A fingerprint identification program used in three Pennsylvania school districts allows pupils to pay for chicken nuggets, sloppy Joes, pizza and other cafeteria delicacies without ever carrying cash. Food Service Solutions Penn Cambria School District Sagem Morpho "IT'S CERTAINLY a lot faster," said Linda Kelly, cafeteria manager at Welsh Valley Middle School in this Philadelphia suburb. Students place their index fingers on small scanners, and a template matches them with their electronic print. The program plots 27 points on a grid that correspond with the fingerprint's ridges. The fingerprint image is discarded, and the points are assigned numbers. According to the system's manufacturers, only the numbers are retained and those cannot be reinterpreted into a fingerprint image. "Both parents and students can rest assured that the fingerprint images cannot be used by law enforcement for identification purposes," says the Web site of Food Service Solutions Inc., the Altoona company that installed the system. "Only a mathematical algorithm remains in the system after registration ≠ not fingerprint images." But the American Civil Liberties Union fears the technology ≠ known as biometrics ≠ could hasten the end of privacy rights. Biometrics uses unalterable physical characteristics to verify a person's identity. On the Frontier ï Intel introduces energy-saving chipsï How to up radio signal data capacityï Too cool! Shrinking portable devicesï IBM building Linux supercomputerï Honey, I shrunk the scientistï Voice recognition improves "It's a sign of things to come," said Barry Steinhardt, associate director of the ACLU. "We will be able to be identified with biometrics in virtually every situation. The use of the digital fingerprint is just one example of that." Biometric devices that identify people by physical characteristics ≠ such as eye patterns, voice tones and handprints ≠ have been the stuff of cinema for decades. Until recently, costs had restricted their use mainly to government offices and military bases. A WAY AROUND SLOW LINES Welsh Valley, about 10 miles west of Philadelphia, began testing the program in the fall to deal with slow lunch lines. "You don't have to bring lunch money. So, somebody can't take it," said Tawanda Worthy, 13. Only a few of Welsh Valley's 700 children have declined to be fingerprinted. "They think the FBI's going to get them or something," said Kelly, the cafeteria manager. The corporation that supplies Food Service Solutions with the system ≠ Sagem Morpho Inc. of Tacoma, Wash. ≠ lists as its clients more than two dozen law enforcement groups in 13 states, as well as the FBI and Secret Service. "We are on the cusp of a surveillance society," said Steinhardt, of the ACLU. Officials at Food Service Solutions, Sagem Morpho and the ACLU said they didn't know of any other state where fingerprints were being used in lunch lines. NO MORE LOST CARDS Penn Cambria School District, about 75 miles east of Pittsburgh, began the program in August 1999 at its high school and plans to use it in all five of its schools by next year. Technology and Society ï Using cell phones to stop smokingï McDonald's offers interactive kiosksï NAPOLI: Super Bowl is dot-com Super Bustï Digital gender gapï High-tech inaugural protestsï NAPOLI: Don't blame Internet for adoption brouhaha "The other benefits? One, no lost cards. Two, no one can access another person's account with a lost PIN number. Three, it's good for the parents. The money is in the account and they know that the money is only being spent on school lunches," said Milton Miller, Penn Cambria's director of food services. Also, those who receive free and reduced-price lunches aren't embarrassed by having their names checked off a list. "That's one of the biggest benefits," said David Magill, superintendent of the Lower Merion School District, which includes Welsh Valley. "They won't be stigmatized." Mitch Johns, president of Food Service Solutions, said the program will cost between $4,000 and $5,000 per lunch lane. It was developed to help schools comply with federal law that prohibits schools from overtly identifying those receiving free and reduced price lunches, he said. Because the program is in the testing phase, the Lower Merion district is not paying for it. The Penn Cambria district is getting the system free because it was the first to test it. The Tussy Mountain School District in central Pennsylvania is paying. Tools and Toys ï Is Dreamcast finally dead?ï Nortel unveils tracking technologyï Sega announces new gaming systemï Movies, video games seen mergingï RealNetworks to offer NBA contentï Microsoft to help convert Javaï Gaming industry gets good gradesï AMD finds backers for mobile chip Within the next year, mobile phones and personal computers will have fingerprint scanners as optional equipment, providing convenience as well as increased security. Government benefits such as welfare payments are increasingly being secured with biometrics. The Immigration and Naturalization Service relies on handprint scans to help some 45,000 frequent international travelers re-enter the country without a passport check. "Right now you have databases full of information that can be hacked," said Richard Norton, executive director of the International Biometrics Association in Washington, D.C. "You can't take a look at a biometric, which is a string of ones and zeros, and figure out who somebody is." © 2001 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. IBM backs Linux software system Nortel unveils tracking software Sega kills Dreamcast to focus on software KRAKOW: Microportable video projectors Qualcomm aims for wireless standard MSNBC Cover Page HAVE A GREAT DAY !!! ---------- http://www.msnbc.com/news/521005.asp [Non-text portions of this message have been removed] 2428 From: Thomas H. Jones Date: Wed Jan 31, 2001 2:30pm Subject: RE: Digest Number 495 >Manufacturers involved in Government NLJD trials are bound by a >Confidentiality Clause, I suppose those who fail to pre-qualify have >nothing to lose by spreading false rumors. Unwarranted criticism of >competitors equipment, by any manufacturer, does little to convince >potential users that your kit is any good! >All NLJDs, particularly pulsed systems, will potentially activate certain >types of target, as will mobile phones, transceivers etc. >Adrian Hickey >Audiotel International Ltd Ouch! I certainly have no intention of propagating any false rumors and you can be assured that false rumors would never be generated by anyone at REI. The only intent was to clarify the operation of the ORION. I apologize and should not have included the information that I passed from agents in India without first verification. Thank you for your succinct clarification. The ORION was not included in the India government trials for EOD because we refused to market and recommend the product for EOD because of the unknown risk. But, to further clarify and to my knowledge, the ORION is the only NLJD that has multiple modes of operation and can operate in a CW mode or in a pulsed mode. As previously stated, we do not pretend to be EOD experts, but if you are, please tell me the best approach. If you believe pulsing to be a bad idea, put the ORION in the CW mode with low output power and use the DSP to achieve superior sensitivity. If you believe CW power to be a bad idea, put the ORION in the pulsing mode to have a very low average power and use the DSP to also have superior sensitivity. I am hoping that some experts will clarify the best approach. I will comment no further to this list regarding NLJD and EOD because I believe the thread to be exhausted. But, I do feel that the comment from Adrian Hickey about "Unwarranted criticism" seems a bit ironic. Tom Jones REI General Manager 2429 From: Charles P Date: Wed Jan 31, 2001 5:32pm Subject: Re: Fingerprints for food >"That's one of the biggest benefits," said David Magill, >superintendent of the Lower Merion School District Hey, my alma mater ! (always on the cutting edge... at least that's what they told us back in '73) charles ----- Original Message ----- From: To: Sent: Wednesday, January 31, 2001 4:08 PM Subject: [TSCM-L] Fingerprints for food > Technology allows some students to leave lunch money at home Students > at Welsh Valley Middle School, in Penn Valley, Pa., are part of a > fingerprinting program that lets pupils pay for tater-tots and other > cafeteria delicacies without ever carrying cash. > ASSOCIATED PRESS > PENN VALLEY, Pa., Jan. 24 - The tiny ridges on a student's index > finger could soon make school lunch money and lunch-line bullies a thing > of the past. A fingerprint identification program used in three > Pennsylvania school districts allows pupils to pay for chicken nuggets, > sloppy Joes, pizza and other cafeteria delicacies without ever carrying > cash. > > > Food Service Solutions > Penn Cambria School District > Sagem Morpho > > > "IT'S CERTAINLY a lot faster," said Linda Kelly, > cafeteria manager at Welsh Valley Middle School in this Philadelphia > suburb. > Students place their index fingers on small scanners, and > a template matches them with their electronic print. The program plots > 27 points on a grid that correspond with the fingerprint's ridges. > The fingerprint image is discarded, and the points are > assigned numbers. According to the system's manufacturers, only the > numbers are retained and those cannot be reinterpreted into a > fingerprint image. > "Both parents and students can rest assured that the > fingerprint images cannot be used by law enforcement for identification > purposes," says the Web site of Food Service Solutions Inc., the Altoona > company that installed the system. "Only a mathematical algorithm > remains in the system after registration - not fingerprint images." > But the American Civil Liberties Union fears the > technology - known as biometrics - could hasten the end of privacy > rights. Biometrics uses unalterable physical characteristics to verify a > person's identity. > On the Frontier > . Intel introduces energy-saving chips. How to up radio signal > data capacity. Too cool! Shrinking portable devices. IBM > building Linux supercomputer. Honey, I shrunk the > scientist. Voice recognition improves > "It's a sign of things to come," said Barry Steinhardt, > associate director of the ACLU. "We will be able to be identified with > biometrics in virtually every situation. The use of the digital > fingerprint is just one example of that." > Biometric devices that identify people by physical > characteristics - such as eye patterns, voice tones and handprints - > have been the stuff of cinema for decades. Until recently, costs had > restricted their use mainly to government offices and military bases. > > A WAY AROUND SLOW LINES > Welsh Valley, about 10 miles west of Philadelphia, began > testing the program in the fall to deal with slow lunch lines. > "You don't have to bring lunch money. So, somebody can't > take it," said Tawanda Worthy, 13. > Only a few of Welsh Valley's 700 children have declined > to be fingerprinted. "They think the FBI's going to get them or > something," said Kelly, the cafeteria manager. > The corporation that supplies Food Service Solutions with > the system - Sagem Morpho Inc. of Tacoma, Wash. - lists as its > clients more than two dozen law enforcement groups in 13 states, as well > as the FBI and Secret Service. > "We are on the cusp of a surveillance society," said > Steinhardt, of the ACLU. > Officials at Food Service Solutions, Sagem Morpho and the > ACLU said they didn't know of any other state where fingerprints were > being used in lunch lines. > > NO MORE LOST CARDS > Penn Cambria School District, about 75 miles east of > Pittsburgh, began the program in August 1999 at its high school and > plans to use it in all five of its schools by next year. > Technology and Society > . Using cell phones to stop smoking. McDonald's offers > interactive kiosks. NAPOLI: Super Bowl is dot-com Super > Bust. Digital gender gap. High-tech inaugural > protests. NAPOLI: Don't blame Internet for adoption brouhaha > "The other benefits? One, no lost cards. Two, no one can > access another person's account with a lost PIN number. Three, it's good > for the parents. The money is in the account and they know that the > money is only being spent on school lunches," said Milton Miller, Penn > Cambria's director of food services. > Also, those who receive free and reduced-price lunches > aren't embarrassed by having their names checked off a list. > "That's one of the biggest benefits," said David Magill, > superintendent of the Lower Merion School District, which includes Welsh > Valley. "They won't be stigmatized." > Mitch Johns, president of Food Service Solutions, said > the program will cost between $4,000 and $5,000 per lunch lane. It was > developed to help schools comply with federal law that prohibits schools > from overtly identifying those receiving free and reduced price lunches, > he said. > Because the program is in the testing phase, the Lower > Merion district is not paying for it. The Penn Cambria district is > getting the system free because it was the first to test it. The Tussy > Mountain School District in central Pennsylvania is paying. > Tools and Toys > . Is Dreamcast finally dead?. Nortel unveils tracking > technology. Sega announces new gaming system. Movies, video > games seen merging. RealNetworks to offer NBA content. Microsoft > to help convert Java. Gaming industry gets good grades. AMD > finds backers for mobile chip > Within the next year, mobile phones and personal > computers will have fingerprint scanners as optional equipment, > providing convenience as well as increased security. > Government benefits such as welfare payments are > increasingly being secured with biometrics. The Immigration and > Naturalization Service relies on handprint scans to help some 45,000 > frequent international travelers re-enter the country without a passport > check. > "Right now you have databases full of information that > can be hacked," said Richard Norton, executive director of the > International Biometrics Association in Washington, D.C. "You can't take > a look at a biometric, which is a string of ones and zeros, and figure > out who somebody is." > > © 2001 Associated Press. All rights reserved. This > material may not be published, broadcast, rewritten or redistributed. > > > IBM backs Linux software system Nortel unveils tracking > software Sega kills Dreamcast to focus on software KRAKOW: > Microportable video projectors Qualcomm aims for wireless > standard MSNBC Cover Page > > > > > > > > > > HAVE A GREAT DAY !!! > > > > > > > > > > > > > > > ---------- > > http://www.msnbc.com/news/521005.asp > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2430 From: Charles P Date: Wed Jan 31, 2001 5:36pm Subject: Darwin-ian last words I suppose this could be added to the list of famous last words: "Sure, I've use my NLJD for EOD many times!" :) 2431 From: James M. Atkinson, Comm-Eng Date: Wed Jan 31, 2001 6:12pm Subject: Re: Darwin-ian last words At 6:36 PM -0500 1/31/01, Charles P wrote: >I suppose this could be added to the list of famous last words: > >"Sure, I've use my NLJD for EOD many times!" > >:) My offer has always been that if a salesman for a NLJD manufacture will hold a live blasting cap in his teeth I would be happy to pass a live NLJD over it several times. It's funny that U.S. Army TM 5-25, page 2-7 mandates a 30 meter "minimum safe distance" from any RF transmitter antenna (more if the RF is over 3 watts), and yet a NLJD is a transmitter that people will foolishly pass over a land mine or improvised explosive device. Using a NLJD for EOD work is like looking for a gas leak with a lit match. If you have thousands of "disposable" bomb techs (like India, Pakistan, and a few other countries) then the loss of a person here in there is just a minor annoyance to their governments. If you really, really feel the need to use a fairly strong RF transmitter to test bombs, then at least wear a full bomb suit, and use a proverbial 10 foot stick. Just to make myself clear: I do not in any way advocate the use of a NLJD in EOD or bomb disposal applications, nor will I encourage others to create an RF field in the presence of or within the stand-off zone at or around an explosive device. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From: Hawkspirit Date: Thu Jan 27, 2005 0:25pm Subject: Sweep Needed Still need someone to handle the Wheeling WV. Residential Sweep. Roger Tolces HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com 760-329-4404 -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 1/25/2005 [Non-text portions of this message have been removed] 10799 From: contranl Date: Thu Jan 27, 2005 0:36pm Subject: Re: "Sound of Voices" ?????? . I have played that video over and over again...and the man is clearly suggesting that it can detect the sound of voices. Now this does not mean that they actuallly have implemented that but chances are that some have or will...since the manufacturer obviously offers that feature he might say to his customers: "The price is 3450 US $ do you want the voice detection option also? that will cost you only 400 US $ extra when purchased now" The customer ( using available homeland security funds) will probably say "i want the full package" Even if they are in doubt and don't purchase that feature right now they could always add that on later...probably this is just a little piece of added software for the integrated DSP chips,chances are that this software can be remotely uploaded ...wich means that it won't take less then 15 minutes to add such a big brother feature for a whole city. Also what is there to filter if you want to detect all if this : gunshots + car-accidents + human voices that covers the whole audio-range ! all of that under non-ideal circumstances (traffic-noise) Still i don't get what they want the voice detection for..and actually i don't believe it...in my vision when the man says voice detection he actually means "switching on the mic" to hear whatever is going on. Probably that can't be done with the standalone "gunshot-detectors" since they only send data-packets containing only information about when and where a gunshot was detected..but the traffic-lights is different since they already have a direct video + data connection to a control-center it would be a piece of cake to add audio. I don't think there are much interesting conversations to listen to on roadcrossings, but a practical example could be recording every sound close to such a traffic-light and use such a recording later on in for example the reconstruction of an accident where analysys of the sound could clear up things...in practice that means that every sound is pre-recorded and stored all the time ! That it's the beginning of the end..the government using 4000 remote controlled microphones in every city ! They probably also hook it up to the "Total Awareness Program" Worst of all is that the public is obviously so influenced by the government convincing them that they are in danger...that they don't even care anymore...where are the protests ? Your(state-controlled) TV-stations broadcast these things like they are normal part of life ...without any concerns or comments. One more 9/11 kind of happening will be enough for the population to allow video-cameras in their bedrooms...so all that will be left of their privacy are their dreams. All of this as part of the "New World Order" as wanted by George Doubleyou and his sponsors. Don't worry it's not only America but everywhere in the world like for example my country The Netherlands where they have since the beginning of this month a new law that tells you to have identification on you at all times...what bullshit ! when just around every corner you can buy your mariuana and hashish in any quantity you like...having everybody smoking pot on a daily basis does not contribute to a sucessfull society ... but it helps getting funds for controlling the population...Whe have had 15 Mafia-style murders over the last few years...NOT ONE has been solved ! Recently a Politician (Pim Fortuyn)who had different ideas and would have made it as president of our country was killed by some animal-rights activist, turns out now the politician was already bugged in his house and car...by the secret service. I could go on for hours ...but i am getting off-topic here. Surveillance.Radio and Electronics are a big part of my life. but they way things are going now make me sick. Tetrascanner 10800 From: Hawkspirit Date: Thu Jan 27, 2005 1:01pm Subject: Star Sweeping Hey donít laugh too hard at this, I have made serious money over the years sweeping homes of movie and rock stars that have paparazzi fears. Excellent clients. Roger Tolces HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com Date: Thu, 27 Jan 2005 00:45:03 -0000 From: "satcommunitfive" Subject: Re: Police probe Nicole Kidman 'bug' great a FM bug listening to worms in the grass -and probably wind real useful ! and they said hi tech on the telly ! -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.1 - Release Date: 1/27/2005 [Non-text portions of this message have been removed] 10801 From: James M. Atkinson Date: Thu Jan 27, 2005 1:10pm Subject: Free-speech suit filed against Japan http://smh.com.au/articles/2005/01/27/1106415700622.html Free-speech suit filed against Japan Tokyo January 27, 2005 - 10:20AM A US computer consultant says he has sued the Japanese government for the cancellation of his speech after he uncovered flaws in a controversial database of Japanese citizens' personal data. An official admitted the government had "concerns" about the speech by Ejovi Nuwere, a Boston-based consultant, which was scheduled at an international security symposium in Tokyo last November. Nuwere filed a civil case alleging violation of freedom of expression. He accused the internal affairs ministry of pressuring conference organisers to cancel his speech. "It was my impression that they felt if I said 'This is how we can improve the system', that means that the system needs to be improved. And they refused to admit that," Nuwere told a press conference. Nuwere was due to speak about Juki-Net, a computer network launched in 2002 in which municipalities assign identification codes to residents to let government agencies track people by name, gender, address and date of birth. said he had discovered "several fundamental flaws" in the system but had not planned to detail them in his speech. He had been under contract to work with the central prefecture of Nagano, which opposed Juki-Net. Many mayors, computer experts and privacy activists wanted to stop Juki-Net, saying personal data could be leaked due to technical glitches or computer illiteracy by local officials. The internal affairs ministry runs the project and was an official supporter of the symposium. "There were concerns that the planned speech would lead to disclosure of particular vulnerabilities of particular systems, like talking about how to open locks on certain doors," a ministry official in charge of information security said. He said the ministry spoke to symposium leaders but denied that it tried to suppress freedom of speech. "We welcome all sorts of opinions being expressed about Juki-Net. That's not a problem. But a person who penetrated certain systems was going to talk about his experience at the symposium. We had concerns," he said. AFP ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10802 From: Tech Sec Lab Date: Thu Jan 27, 2005 2:17pm Subject: Cryptome Well, it seems the DHS got their way in the end. Cryptome has been closed down. For the moment anyway. http://www.homelandsecurityus.com/jan05.asp Shame. 10803 From: contranl Date: Thu Jan 27, 2005 2:28pm Subject: Dutch police catch shoplifters using RFID-jammers . Dutch police have catched East-European shoplifters who were using RFID jammers to avoid the triggering of the shops RF-tag alarm sytems. A shop security officer saw them leaving with expensive parfums without having payed for them. When police arrived they discovered small boxes with electronics to defeat the tag alarm system Police say the shoplifters had choosen parfums because they are small and expensive. The Dutch newspaper "De Telegaaf" of today shows a picture of such a unit wich consist of 2 small boxes about the size of a pack of cigarettes...nicely packed in what looks like a little leather bag with a hook to easely clip them somewhere under their clothes. source: http://www.telegraaf.nl/ Funny that i predicted 2 months ago that the first they where going to catch with this would probably be East Europeans. Interesting how East Europeans are always the first(in Europe) to use electronics for low-level crime. A few of these typical East-European tricks: Copying magnetic bank/creditcards at tellermachines including video transmitters to see the pin-codes Emptying parking payment posts (drilling holes close to the locks and jamming their wireless alarms) RFID jammers Tetrascanner 10804 From: Michael Dever Date: Thu Jan 27, 2005 2:36pm Subject: Re: Dutch police catch shoplifters using RFID-jammers Is there an English language reference for this? Regards Mike On 28 Jan 2005, at 07:28, contranl wrote: > Dutch police have catched East-European shoplifters > who were using RFID jammers to avoid the triggering > of the shops RF-tag alarm sytems. > > A shop security officer saw them leaving with expensive parfums > without having payed for them. > > When police arrived they discovered small boxes with electronics > to defeat the tag alarm system > > Police say the shoplifters had choosen parfums because they are small > and expensive. > > The Dutch newspaper "De Telegaaf" of today shows a picture of > such a unit wich consist of 2 small boxes about the size of a > pack of cigarettes...nicely packed in what looks like a little > leather bag with a hook to easely clip them somewhere under their > clothes. > > source: http://www.telegraaf.nl/ > > Funny that i predicted 2 months ago that the first they where > going to catch with this would probably be East Europeans. > > Interesting how East Europeans are always the first(in Europe) > to use electronics for low-level crime. > > A few of these typical East-European tricks: > > > Copying magnetic bank/creditcards at tellermachines > including video transmitters to see the pin-codes > > Emptying parking payment posts (drilling holes close to the locks > and jamming their wireless alarms) > > RFID jammers > > Tetrascanner Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Voice: (02) 6254 5337 Email: dca@b... This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 10805 From: contranl Date: Thu Jan 27, 2005 2:47pm Subject: Re: Dutch police catch shoplifters using RFID-jammers I dont know Mike, I guess that my translation tells it all I could'nt find it on the newspapers internet version (wich differs from the printed) If you insist i could scan the original article with picture but that could take a while since i do'nt have a scanner myself the picture does not reveal anything. Lets wait till tomorrow to see if other internet sources have picked up the story...i'll let you know. Greets Tetrascanner 10806 From: G P Date: Thu Jan 27, 2005 2:52pm Subject: Re: Re: "Sound of Voices" ?????? Hmm, maybe not even dreams, especially when entering into deep REM. I bet the boys over at SKUNKWORKS have been dabbling in that type of technology, remote EEG sampling in conjunction with DSP correlation. Those wild and crazy LMCO SKUNKWORKS fellows, spooky spookersons indeed! --- contranl wrote: > ...so all that > will be left of > their privacy are their dreams. 10807 From: G P Date: Thu Jan 27, 2005 2:57pm Subject: 6 GHz Anyone ever run across a 6 Ghz signal in TSCM sweeps, specifically 6.11 Ghz? 10808 From: Michael Dever Date: Thu Jan 27, 2005 3:06pm Subject: Re: Re: Dutch police catch shoplifters using RFID-jammers Thanks! No need to scan at this stage. Maybe some other news services will pick this story up. We will wait. Regards Mike On 28 Jan 2005, at 07:47, contranl wrote: > > I dont know Mike, > > I guess that my translation tells it all > I could'nt find it on the newspapers internet version > (wich differs from the printed) > > If you insist i could scan the original article with picture > but that could take a while since i do'nt have a scanner myself > the picture does not reveal anything. > > Lets wait till tomorrow to see if other internet sources > have picked up the story...i'll let you know. > > Greets > > Tetrascanner > > Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 10809 From: Michael Dever Date: Thu Jan 27, 2005 3:28pm Subject: Re: a good spectrum analyzer between 2 and 6ghz Jim What brand/model of preamplifier(s) would you suggest for the R&S hand held SA. Regards Mike On 25 Jan 2005, at 04:20, James M. Atkinson wrote: > > You might want to consider the R&S hand-held units. > > The units are easy to use, very inexpensive, but you will need to use > an > external pre-amplifier. > > -jma > > Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 10810 From: contranl Date: Thu Jan 27, 2005 3:57pm Subject: Re: Dutch police catch shoplifters using RFID-jammers I found the original story (a litle less then than the newspaper one) it's here: http://www.telegraaf.nl/binnenland/article17585881.ece if you need it copy it cause they might remove it tomorrow to translate that go to babelfish: http://babelfish.altavista.com/babelfish/tr and select translate a website page frome Dutch to English then you get a fairly redicioulous translation but you get the point :) In addition to what i said before it turns out that all police- districts were warned and that this is not a single case but the whole country is overflown with East-European gangs exersizing this trick. Let me describe the box again...it is not 2 but just 1 cigarette- pack-size white colored plastic box ,with 1 switch and an earplug type connector that holds a plug with a piece of wire (antenna) There is a small blue-colored pouch made of soft material with a strap/belt to hang it around your neck or waist...i'm not shure but it looks like the strap is also part of the antenna. In that case i estimate the total length of the antenna around 1 meter. They say they are already working on a way to counter it. Tetrascanner 10811 From: Tim Johnson Date: Thu Jan 27, 2005 11:13am Subject: Re: "Sound of Voices" ?????? I've only been on the list a day or so, but so far nothing has been posted relating to TSCM. I have a problem relating smoking bans to TSCM. Then again, I'm a former smoker and don't miss the smell when I'm eating, walking up to a building or actually in an office. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10812 From: L. F. Elia Date: Thu Jan 27, 2005 1:25pm Subject: Re: Fire closes New York subway line Kinda sad if you ask me. Just like in information assurance, where most of the threat comes from ineptitude rather than malice. --- "James M. Atkinson" wrote: > > Does anybody else on the list find it ironic that a > homeless guy with a > shopping cart was able to accidently take out a > chunk of the infrastructure > of New York? ===== Solaris/LINUX/Windows administration Internet consulting & Web site design ------------------------------------- lfelia@y..., Virginia Beach VA, 23462 __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10813 From: Robert G. Ferrell Date: Thu Jan 27, 2005 2:20pm Subject: Re: Cryptome At 02:17 PM 1/27/2005, Tech Sec Lab wrote: >Well, it seems the DHS got their way in the end. > >Cryptome has been closed down. For the moment anyway. > >http://www.homelandsecurityus.com/jan05.asp No, it hasn't. Go look for yourself. RGF 10814 From: Tim Johnson Date: Thu Jan 27, 2005 1:02pm Subject: Re: Star Sweeping Roger, Sometimes those who laugh haven't listened to what you can actually get from the el cheapo FM wireless mics. tj -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. 10815 From: Thomas Kellar Date: Thu Jan 27, 2005 2:38pm Subject: Re: Cryptome Did you go to the site to confirm this? I get to http://cryptome.org just fine. On Thu, 27 Jan 2005, Tech Sec Lab wrote: > Well, it seems the DHS got their way in the end. > > Cryptome has been closed down. For the moment anyway. > > http://www.homelandsecurityus.com/jan05.asp > > Shame. > 10816 From: Thomas Kellar Date: Thu Jan 27, 2005 2:09pm Subject: Re: Star Sweeping This is probably priledged knowledge but I will ask anyway: What if you sweep a client and declare them to be free of bugs or other similar covert surveillance devices but it turns out your client's enemies (paparzzzi?) are bouncing laser beams off your clients windows and are listening in that way. Consequently the enemy gains some knowledge that they use. Can your client come back and sue you for malfeasence? I.e., what if 1. There is a bug you did not find 2. The bad guys are using means you do not check for I suppose that the client would have to prove that the knowledge was gained due to your alleged negligence and that probably would be difficult. I frequently am asked to check friends and relative's computers for spyware and viruses and when I am done, I always declare that to the best of my knowledge they are free of such but I never claim absolutely that they are. Is there a similarity there? Thanks for your time, Thomas On Thu, 27 Jan 2005, Hawkspirit wrote: > Hey donít laugh too hard at this, I have made serious money over the years > sweeping homes of movie and rock stars that have paparazzi fears. Excellent > clients. > Roger Tolces > > HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com > Date: Thu, 27 Jan 2005 00:45:03 -0000 > > From: "satcommunitfive" > > Subject: Re: Police probe Nicole Kidman 'bug' > great a FM bug listening to worms in the grass -and probably wind > > real useful ! > and they said hi tech on the telly ! -- w8twk Freelance Systems Programming http://www.fsp.com 10817 From: J.A. Terranson Date: Thu Jan 27, 2005 2:39pm Subject: Re: Cryptome On Thu, 27 Jan 2005, Tech Sec Lab wrote: > Well, it seems the DHS got their way in the end. > > Cryptome has been closed down. For the moment anyway. Wrong: reread, and then go to John's site, http://www.cryptome.org. Still very much alive. > http://www.homelandsecurityus.com/jan05.asp > > Shame. Don't belive everything you read. -- Yours, J.A. Terranson sysadmin@m... 0xBD4A95BF Civilization is in a tailspin - everything is backwards, everything is upside down- doctors destroy health, psychiatrists destroy minds, lawyers destroy justice, the major media destroy information, governments destroy freedom and religions destroy spirituality - yet it is claimed to be healthy, just, informed, free and spiritual. We live in a social system whose community, wealth, love and life is derived from alienation, poverty, self-hate and medical murder - yet we tell ourselves that it is biologically and ecologically sustainable. The Bush plan to screen whole US population for mental illness clearly indicates that mental illness starts at the top. Rev Dr Michael Ellner 10818 From: Gregory Hicks Date: Thu Jan 27, 2005 2:43pm Subject: Re: Cryptome > To: > From: "Tech Sec Lab" > Date: Thu, 27 Jan 2005 20:17:17 -0000 > Subject: [TSCM-L] Cryptome > > > Well, it seems the DHS got their way in the end. > > Cryptome has been closed down. For the moment anyway. > > http://www.homelandsecurityus.com/jan05.asp Seems to be back up. I just went to www.cryptome.org and got a nice page that looks like it was recently updated... Regards, Gregory Hicks ------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 | Fax: 408.894.3400 San Jose, CA 95134 | Internet: ghicks@c... I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton 10819 From: L. F. Elia Date: Thu Jan 27, 2005 2:47pm Subject: Re: Cryptome Um no not as far as I can tell and I was just on it. --- Tech Sec Lab wrote: > Well, it seems the DHS got their way in the end. > > Cryptome has been closed down. For the moment > anyway. > > http://www.homelandsecurityus.com/jan05.asp > > Shame. > > ===== Solaris/LINUX/Windows administration Internet consulting & Web site design ------------------------------------- lfelia@y..., Virginia Beach VA, 23462 __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail 10820 From: John Young Date: Thu Jan 27, 2005 7:32pm Subject: Re: Cryptome Cryptome was not closed. The report author misunderstood the NPR account which said a DoE site had been closed apparently because it had offered some of the DHS Morning Briefs published on Cryptome. The mistaken author has since posted a correction stating that unnamed Cryptome was not closed. Closing the DoE site for sharing public information is a shame. It is likely DoE saw nothing worth withholding in the briefs. (Recall that Tom Ridge recently said that there was not really any danger behind the threats DHS warned about just prior to the presidential election.) Still, an opportunistic contractor who runs intelligence conferences is claiming the release of the morning briefs was a grave security breach which warrants heavy attendance at an upcoming conference, sign up now! http://biz.yahoo.com/prne ws/050126/law016_1.html Press Release [Begin excerpt] On Friday, January 21, there was a major security flaw in a large Federal Government Agency's computers which leaked five months of classified documents issued by the DHS. The leak involved dozens of "Morning Briefs," documents which are circulated by the DHS Operations Center to the White House, CIA, FBI and other federal and state law enforcement officials. This is just the type of problem that will be on the minds of attendees at the National Intelligence Conference next month in Arlington, Virginia. The Conference, known as INTELCON (www.INTELCON.US), is a major national security event aimed at helping the American intelligence community work together. [End excerpt] 10821 From: contranl Date: Thu Jan 27, 2005 4:51pm Subject: Re: Dutch police catch shoplifters ( PICTURE ! ) . It's fun to try find something difficult and even better when you finally find it !... a good picture of the RFID-jammer http://www.politie.nl/haaglanden/nieuws/landelijk_26_04_detectiepoort jes_worden_uitgeschakeld.asp At the police website in The Hague,Netherlands The text is about the same ...with one addition wich is that police say they have tried the box lots of times and every time it worked and effectively disabled de tag alarm sytem. Tetrascanner 10822 From: Hawkspirit Date: Thu Jan 27, 2005 6:32pm Subject: 6 GhZ Cordless phone base stations at 5.8GHZ Message: 17 Date: Thu, 27 Jan 2005 12:57:49 -0800 (PST) From: G P Subject: 6 GHz Anyone ever run across a 6 Ghz signal in TSCM sweeps, specifically 6.11 Ghz? -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.1 - Release Date: 1/27/2005 [Non-text portions of this message have been removed] 10823 From: J.A. Terranson Date: Thu Jan 27, 2005 4:35pm Subject: Re: Star Sweeping On Thu, 27 Jan 2005, Thomas Kellar wrote: > What if you sweep a client and declare them to be free of > bugs or other similar covert surveillance devices but > it turns out your client's enemies (paparzzzi?) are > bouncing laser beams off your clients windows and are > listening in that way. Consequently the enemy gains > some knowledge that they use. Can your client come > back and sue you for malfeasence? Two points: (1) Bouncing laser beams off windows is a LOT harder than you might think, and works a lot worse than you've heard. Been there, tried that (in a lab environment no less), fed up with it :-) (2) I think you are confusing the term "malfeasence" with "error". They are not the same, nor even related. > I.e., what if > > 1. There is a bug you did not find > 2. The bad guys are using means you do not check for > > I suppose that the client would have to prove that the > knowledge was gained due to your alleged negligence and > that probably would be difficult. You are describing an "Errors and Omissions" issue. If you are doing work which may result in E&O liability (TSCM certainly falls into this classification), you better be carrying E&O insurance. Everyone I know carries at least a million in E&O, many carry a lot more (ten is not uncommon, but *wow* is it expensive!). > I frequently am asked to check friends and relative's > computers for spyware and viruses and when I am done, I > always declare that to the best of my knowledge they > are free of such but I never claim absolutely that they > are. Is there a similarity there? I would make this assertion in writing, and have them sign a copy for *your* records, just to be safe. Still, this antivirus thing is a *long* way from a TSCM sweep: discussing them in the same context makes the discussion a non-seqitor. > Thanks for your time, > > Thomas All the best, -- Yours, J.A. Terranson sysadmin@m... 0xBD4A95BF Civilization is in a tailspin - everything is backwards, everything is upside down- doctors destroy health, psychiatrists destroy minds, lawyers destroy justice, the major media destroy information, governments destroy freedom and religions destroy spirituality - yet it is claimed to be healthy, just, informed, free and spiritual. We live in a social system whose community, wealth, love and life is derived from alienation, poverty, self-hate and medical murder - yet we tell ourselves that it is biologically and ecologically sustainable. The Bush plan to screen whole US population for mental illness clearly indicates that mental illness starts at the top. Rev Dr Michael Ellner 10824 From: wiggyyy2000 Date: Thu Jan 27, 2005 5:30pm Subject: Re: 6 GHz yes but the one i saw was at about 6.02Ghz approx.... --- In TSCM-L@yahoogroups.com, G P wrote: > Anyone ever run across a 6 Ghz signal in TSCM sweeps, > specifically 6.11 Ghz? 10825 From: joe joe Date: Thu Jan 27, 2005 6:31pm Subject: Re: 6 GhZ ya sometimes they go into the 5.9 to very close to 6Ghz --- Hawkspirit wrote: > > > Cordless phone base stations at 5.8GHZ > > > > > > > > Message: 17 > > Date: Thu, 27 Jan 2005 12:57:49 -0800 (PST) > > From: G P > > Subject: 6 GHz > > > > Anyone ever run across a 6 Ghz signal in TSCM > sweeps, > > specifically 6.11 Ghz? > > > > > -- > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.8.1 - Release > Date: 1/27/2005 > > > > > [Non-text portions of this message have been > removed] > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10826 From: Tim Johnson Date: Thu Jan 27, 2005 6:26pm Subject: Re: Star Sweeping My reports contains the following information as something of a protection for myself and my company. tim OPINION The technical surveillance countermeasures examination was conducted consistent with the standards and practices of technical surveillance countermeasures examinations. In the course of our examination, no devices were discovered in the designated area that were either installed or modified for the express purpose of listening to private conversations, telephonically or otherwise. Further, there was no physical evidence observed during the examination which would indicate that any electronic eavesdropping devices were installed and removed prior to our inspection; however, we cannot definitely preclude that possibility. LIMITATIONS AND OPINIONS The technical surveillance countermeasures examination performed was intended to draw conclusions only pertaining to the services performed and cannot be relied upon to disclose procedural irregularities or illegal acts committed by persons authorized or having access to the serviced areas. The overall effectiveness of the examinations performed may be impacted by the existing technical limitations imposed by the equipment, time constraints and the degree of confidentiality afforded by you. WARNING Electronic Countermeasures examinations of the type conducted indicates the status of the area at the conclusion of the examination. The high degree of security achieved by this examination may be compromised by any of the following: (1) entry of unauthorized persons to the examined area, (2) failure to maintain continuous effective control of the examined areas, (3) allowing repairs or alterations within the examined areas without the supervision of security or management personnel, or (4) the introduction of new furnishings and electronic equipment into the examined areas. -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10827 From: Michael Dever Date: Thu Jan 27, 2005 8:02pm Subject: Re: Star Sweeping Tim On 28 Jan 2005, at 11:26, Tim Johnson wrote: > > > My reports contains the following information as something of a > protection for myself and my company. > > tim > > > OPINION > > The technical surveillance countermeasures examination was conducted > consistent with the standards and practices of technical surveillance > countermeasures examinations. Whose standards? We always include a copy of our 'standards' with our proposals so that the client knows exactly what service we are performing. > In the course of our examination, no > devices were discovered in the designated area that were either > installed or modified for the express purpose of listening to private > conversations, telephonically or otherwise. Further, there was no > physical evidence observed during the examination which would > indicate that any electronic eavesdropping devices were installed and > removed prior to our inspection; however, we cannot definitely > preclude that possibility. > > LIMITATIONS AND OPINIONS > > The technical surveillance countermeasures examination performed was > intended to draw conclusions only pertaining to the services > performed and cannot be relied upon to disclose procedural > irregularities or illegal acts committed by persons authorized or > having access to the serviced areas. The overall effectiveness of > the examinations performed may be impacted by the existing technical > limitations imposed by the equipment, time constraints and the degree > of confidentiality afforded by you. > > WARNING > > Electronic Countermeasures examinations of the type conducted > indicates the status of the area at the conclusion of the > examination. The high degree of security achieved by this examination > may be compromised by any of the following: (1) entry of > unauthorized persons to the examined area, (2) failure to maintain > continuous effective control of the examined areas, (3) allowing > repairs or alterations within the examined areas without the > supervision of security or management personnel, or (4) the > introduction of new furnishings and electronic equipment into the > examined areas. > > -- > > Tim Johnson Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] From: Paul Curtis Date: Thu Jan 27, 2005 10:38pm Subject: RE: Fire closes New York subway line Just remember, There is no possibility on the face of the earth that all of the robbers, murderers, rapists, muggers and burglars could ever hope to do as much damage as the incompetent people we encounter every day! Paul Curtis _____ From: L. F. Elia [mailto:lfelia@y...] Sent: Thursday, January 27, 2005 11:26 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Fire closes New York subway line Kinda sad if you ask me. Just like in information assurance, where most of the threat comes from ineptitude rather than malice. --- "James M. Atkinson" wrote: > > Does anybody else on the list find it ironic that a > homeless guy with a > shopping cart was able to accidently take out a > chunk of the infrastructure > of New York? ===== Solaris/LINUX/Windows administration Internet consulting & Web site design ------------------------------------- lfelia@y..., Virginia Beach VA, 23462 __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links *To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ *To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com *Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10829 From: Paul Curtis Date: Thu Jan 27, 2005 11:18pm Subject: RE: Star Sweeping One more thing to consider. When you make your assertion that the place is bug free it is only bug free at the exact point in time when you made the sweep. Further, if there are quiet devices or there is no active system in operation at the time you make the sweep, you can hardly be expected to have discovered such, particularly if it was off premises. I second the comments regarding laser beams as listening devices - 80 percent fantasy - 20 percent reality (if that much). Paul Curtis _____ From: J.A. Terranson [mailto:measl@m...] Sent: Thursday, January 27, 2005 14:36 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Star Sweeping On Thu, 27 Jan 2005, Thomas Kellar wrote: > What if you sweep a client and declare them to be free of > bugs or other similar covert surveillance devices but > it turns out your client's enemies (paparzzzi?) are > bouncing laser beams off your clients windows and are > listening in that way. Consequently the enemy gains > some knowledge that they use. Can your client come > back and sue you for malfeasence? Two points: (1) Bouncing laser beams off windows is a LOT harder than you might think, and works a lot worse than you've heard. Been there, tried that (in a lab environment no less), fed up with it :-) (2) I think you are confusing the term "malfeasence" with "error". They are not the same, nor even related. > I.e., what if > > 1. There is a bug you did not find > 2. The bad guys are using means you do not check for > > I suppose that the client would have to prove that the > knowledge was gained due to your alleged negligence and > that probably would be difficult. You are describing an "Errors and Omissions" issue. If you are doing work which may result in E&O liability (TSCM certainly falls into this classification), you better be carrying E&O insurance. Everyone I know carries at least a million in E&O, many carry a lot more (ten is not uncommon, but *wow* is it expensive!). > I frequently am asked to check friends and relative's > computers for spyware and viruses and when I am done, I > always declare that to the best of my knowledge they > are free of such but I never claim absolutely that they > are. Is there a similarity there? I would make this assertion in writing, and have them sign a copy for *your* records, just to be safe. Still, this antivirus thing is a *long* way from a TSCM sweep: discussing them in the same context makes the discussion a non-seqitor. > Thanks for your time, > > Thomas All the best, -- Yours, J.A. Terranson sysadmin@m... 0xBD4A95BF Civilization is in a tailspin - everything is backwards, everything is upside down- doctors destroy health, psychiatrists destroy minds, lawyers destroy justice, the major media destroy information, governments destroy freedom and religions destroy spirituality - yet it is claimed to be healthy, just, informed, free and spiritual. We live in a social system whose community, wealth, love and life is derived from alienation, poverty, self-hate and medical murder - yet we tell ourselves that it is biologically and ecologically sustainable. The Bush plan to screen whole US population for mental illness clearly indicates that mental illness starts at the top. Rev Dr Michael Ellner ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links *To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ *To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com *Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10830 From: Charles Patterson Date: Thu Jan 27, 2005 11:40pm Subject: Re: Star Sweeping > > What if you sweep a client and declare them to be free of > bugs or other similar covert surveillance devices but Declaring someone to be completely free of surveillance devices seems to be a pretty big assumption. I will state that we did not find any working devices in the areas specified... and some things like Tim says. And we will tell them many of the other ways that surveillance could be taking place- employees, documents, trash, air ducts, poor physical security, etc. Also we state that our results are for the time period of the sweep. If there was a device removed before we got there, or placed after we left (such as if they don't follow security recommendations) we have no control over that. You do need to word your contracts and reports carefully. Charles > it turns out your client's enemies (paparzzzi?) are > bouncing laser beams off your clients windows and are > listening in that way. Consequently the enemy gains > some knowledge that they use. Can your client come > back and sue you for malfeasence? > > I.e., what if > > 1. There is a bug you did not find > 2. The bad guys are using means you do not check for > > I suppose that the client would have to prove that the > knowledge was gained due to your alleged negligence and > that probably would be difficult. > > I frequently am asked to check friends and relative's > computers for spyware and viruses and when I am done, I > always declare that to the best of my knowledge they > are free of such but I never claim absolutely that they > are. Is there a similarity there? > > Thanks for your time, > > Thomas > > > On Thu, 27 Jan 2005, Hawkspirit wrote: >> Hey donít laugh too hard at this, I have made serious money over the >> years >> sweeping homes of movie and rock stars that have paparazzi fears. >> Excellent >> clients. >> Roger Tolces >> >> HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com >> Date: Thu, 27 Jan 2005 00:45:03 -0000 >> >> From: "satcommunitfive" >> >> Subject: Re: Police probe Nicole Kidman 'bug' >> great a FM bug listening to worms in the grass -and probably wind >> >> real useful ! >> and they said hi tech on the telly ! > > > -- > w8twk Freelance Systems Programming http://www.fsp.com > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > 10831 From: A Grudko Date: Fri Jan 28, 2005 3:05am Subject: RE: Kidman/Star Sweeping >Date: Thu, 27 Jan 2005 00:45:03 -0000 >From: "satcommunitfive" >Subject: Re: Police probe Nicole Kidman 'bug' >great a FM bug listening to worms in the grass -and probably wind >real useful ! An old PI trick is to place a cheap FM bug next to an observant subject's gate or garage door, then sit out of sight with the car radio tuned into the worms and wind. When the PI hears the gate/door opening he slowly cruises into the road so that as the subject emerges the PI vehicle looks mike just another motorist. > and they said hi tech on the telly ! We can to some degree excuse the journos for getting technical details wrong (also they may have been given disinformation), but Noel McMaster (director of Kidman's personal security agency) really told the newspaper. "There is no doubt that any information that we were transmitting would have been heard,", then it might not have been a simple FM bug. One has to wonder what kind of "information" Ms Kidman might have been "transmitting" and how? Perhaps what they mean is that there was a low power room/phone bug in her apartment and the device found outside was either a receiver/recorder or a repeater. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.1 - Release Date: 1/27/2005 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links -- No virus found in this incoming message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 10832 From: A Grudko Date: Fri Jan 28, 2005 4:41am Subject: RE: 6 GHz -----Original Message----- From: G P [mailto:telos888@y...] > Anyone ever run across a 6 Ghz signal in TSCM sweeps, specifically 6.11 Ghz? On a sweep within a few Km of Johannesburg's main airport I once detected a continuous carrier over a 2 hour period on about 6.13 GHz. The signal strength was almost constant throughout the building, indicating it was not coming from that location and it DF'd towards the airport. There was no modulation on it that I could detect. I suspected it was some kind of RF link and probably not any threat to the client. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 [Non-text portions of this message have been removed] 10833 From: J. Coote Date: Thu Jan 27, 2005 10:24pm Subject: RE: Star Sweeping Thomas, This is not legal advice, but a good report is a part of the service provided by a professional sweeper. The report may describe the site while protecting client information and will include what was done, what it was done with, how it was done, when the sweep began, when the sweep ended.... And if nothing was found, a report might say that during the date and time of the sweep, XX:xx to XX:xx hours, using the equipment and practices outlined in the report, no nasties were found. Some uninformed clients may get nudgy and try and pin you down; using jargon learned from TV such as "Is it CLEAN or not?" The sweeper has to be clear and concise in their client education before the sweep, and afterward in their report writing. Jay Los Angeles -----Original Message----- From: Thomas Kellar [mailto:tkellar@f...] Sent: Thursday, January 27, 2005 12:09 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Star Sweeping This is probably priledged knowledge but I will ask anyway: What if you sweep a client and declare them to be free of bugs or other similar covert surveillance devices but it turns out your client's enemies (paparzzzi?) are bouncing laser beams off your clients windows and are listening in that way. Consequently the enemy gains some knowledge that they use. Can your client come back and sue you for malfeasence? I.e., what if 1. There is a bug you did not find 2. The bad guys are using means you do not check for I suppose that the client would have to prove that the knowledge was gained due to your alleged negligence and that probably would be difficult. I frequently am asked to check friends and relative's computers for spyware and viruses and when I am done, I always declare that to the best of my knowledge they are free of such but I never claim absolutely that they are. Is there a similarity there? Thanks for your time, Thomas 10834 From: Riskbiz Date: Fri Jan 28, 2005 3:23am Subject: RE: "Sound of Voices" ?????? Tim, Get used to it. The list is apparently populated to a large degree by people who wear cranial tin foil most of the time. You'll see a real TSCM related piece on about a 1:20 ratio (that's what it has been in my short time on the list). But it's still a great place to hear extreme views on everything from smoking to big brother to politics...and get a laugh a couple of times a day. DK -----Original Message----- From: Tim Johnson [mailto:dbugman@d...] Sent: Thursday, January 27, 2005 7:14 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] "Sound of Voices" ?????? I've only been on the list a day or so, but so far nothing has been posted relating to TSCM. I have a problem relating smoking bans to TSCM. Then again, I'm a former smoker and don't miss the smell when I'm eating, walking up to a building or actually in an office. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] ------------------------ Yahoo! Groups Sponsor --------------------~--> In low income neighborhoods, 84% do not own computers. At Network for Good, help bridge the Digital Divide! http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10835 From: Tim Johnson Date: Thu Jan 27, 2005 10:58pm Subject: Re: Star Sweeping Michael wrote: Whose standards? We always include a copy of our 'standards' with our proposals so that the client knows exactly what service we are performing. To get the rest of what is contained in my report, you're going to have to hire me. But the report also includes a description of the area(s) examined, RF analysis, Telephone analysis and Physical Examination, as well as a findings and recommendations page(s). Tim (Personal to Michael......Scott and Julian, down in your part of the world, know me if you want to check with them. You'll have to wait for Julian: he and Shirley are vacationing in HK, England and France at the moment (He is supposed to hook up with Alain-Pierre once AP gets back from the States on Sunday). And Scott is probably busy with his boats. ) -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10836 From: contranl Date: Fri Jan 28, 2005 6:57am Subject: Re: 6 GHz . It would help if you describe the signal a little more then just it's frequency. How wide was it ? Was it analog or digital ? Any typical type of modulation ? (AM/FM/PULSE) What did it sound or look like ? What was it's power ? (range/receivable distance) Duration or period of the signal ? Did you receive it on just one piece of equipment and what equipment was that ? If you include those things you might get a better answer instead of many guesses. It could have been: A wireless phone. A video camera. A datalink. Some piece of malfunctioning equipment. Or even something that is not on that frequency at all but an harmonic or mix from another frequency. In the worse case it could have been from a source inside your used equipment itself. When you ask for help in identifying signals you should include as much information as possible Mentioning all these details is a good exercise and it forces you to analyse and eliminate ...wich might eventually give you the wanted answers...like this i have many times found some answers myself even while i was writing down the question. Tetrascanner 10837 From: kondrak Date: Fri Jan 28, 2005 10:33am Subject: RE: 6 GHz That of course, could also indicate it wasn't sending anything as well, like the audio was off, no activity in the area, etc. IE: the motion detector shut the audio stages down, either to conserve battery, or to thwart it's purpose if somone listened to it. I always try to hunt the emitter down as precise if possible. At 05:41 1/28/2005, you wrote: > -----Original Message----- > From: G P [mailto:telos888@y...] > > > Anyone ever run across a 6 Ghz signal in TSCM sweeps, > specifically 6.11 Ghz? > > On a sweep within a few Km of Johannesburg's main airport I once detected >a continuous carrier over a 2 hour period on about 6.13 GHz. The signal >strength was almost constant throughout the building, indicating it was not >coming from that location and it DF'd towards the airport. There was no >modulation on it that I could detect. > > I suspected it was some kind of RF link and probably not any threat to the >client. > > Andy Grudko (British), DPM, Grad IS (South Africa) > MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 > www.grudko.com , agrudko@i... > Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > Mid Rand (+27 11) 318 1451 - 318 6846(Fax) > Cellular (+27) 82 778 6355 - ICQ 146498943 > SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. > "When you need it done right - first time" > > > > > > ---------- > >No virus found in this outgoing message. >Checked by AVG Anti-Virus. >Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10838 From: kondrak Date: Fri Jan 28, 2005 10:38am Subject: Re: Cryptome Just worked for me too....I would say if and when it goes down, expect the worst. At 15:47 1/27/2005, you wrote: >Um no >not as far as I can tell and I was just on it. > > >--- Tech Sec Lab wrote: > > > Well, it seems the DHS got their way in the end. > > > > Cryptome has been closed down. For the moment > > anyway. > > > > http://www.homelandsecurityus.com/jan05.asp > > > > Shame. > > > > > > >===== >Solaris/LINUX/Windows administration >Internet consulting & Web site design >------------------------------------- >lfelia@y..., Virginia Beach VA, 23462 > > > >__________________________________ >Do you Yahoo!? >Yahoo! Mail - Helps protect you from nasty viruses. >http://promotions.yahoo.com/new_mail > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10839 From: kondrak Date: Fri Jan 28, 2005 10:52am Subject: Re: "Sound of Voices" ?????? Yup! Seig Heil big brother... >We cannot smoke in the USA and now one cannot smoke in >in the pubs in Ireland. As personal freedoms slowly >go away it is only a matter of time before we have no >rights to privacy. The manufacturer is getting >prepared for that day when the government can and will >follow a citizen's every move. Orwell's "1984" just >took a little longer. 10840 From: kondrak Date: Fri Jan 28, 2005 11:00am Subject: Re: "Sound of Voices" ?????? it varies from day to day, we post about a lot of things, both from a technical and a political view. The topics grow broader, but there will be plenty techie stuff as well. Some people just aren't concerned 24/7 with the noise floor of their super-whiz-band-do preamp signal sniffer. We get into computer security, wireless, RFID, gooberment intrusions, and all sorts of stuff. Its worth the ride... At 12:13 1/27/2005, you wrote: >I've only been on the list a day or so, but so far nothing has been >posted relating to TSCM. I have a problem relating smoking bans to >TSCM. Then again, I'm a former smoker and don't miss the smell when >I'm eating, walking up to a building or actually in an office. > >tim >-- > >Tim Johnson > >Technical Security Consultants Inc. >PO Box 1295 >Carrollton, GA 30112 >770-836-4898 >770-712-2164 Cell > >What you say in private is your business. Keeping it private is ours. > >Georgia License # PDC 002074 Technical Security Consultants Inc. >Member INTELNET > Espionage Research Institute > Association of Former Office of Special Investigations >Special Agents-Technical Agent >http://www.dbugman.com > >This e-mail is intended for the use of the addressee(s) only and may >contain privileged confidential, or proprietary information that is >exempt from disclosure under law. If you have received this message >in error, please inform us promptly by reply e-mail, then delete the >e-mail and destroy any printed copy. > >Neither this information block, the typed name of the sender, or >anything else in this message is intended to constitute an electronic >signature for purposes of the Uniform Electronic Transactions Act or >the Electronic Signatures in Global and National Commerce Act >(E-Sign) unless a specific statement to the contrary is included in >this message. > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10841 From: kondrak Date: Fri Jan 28, 2005 11:06am Subject: RE: Humour Re: Fire closes New York subway line True, The founders gave us two main tools to effect change in government. We have elections, and we have the second amendment. The election thing is almost worthless to pursue any more, for the process is corrupted and whored. Elections are stolen, the vote is corrupted, and soon, when unverified electronic voting becomes the norm, the outcomes will be known by the corruptors weeks before any election. It will put the criminality of previous notable gangs like "Tammany hall" to shame. At that point, the only remaining choice will be to fight, or sink into the serfdom of a socialist police-state. > >No, we're not technically a "Democracy", we're a Constitutional Republic, >but the preceding text still holds true. And it will see itself >self-evident as long as we have more whiners than doers. If it's broke, >then fix it - you as an American citizen actually do have that power. And >fortunately for most, you also have the power to whine just enough to not >really be heard, but at least you can piss off the people who don't agree >with you. 10842 From: Hawkspirit Date: Fri Jan 28, 2005 11:50am Subject: Sweep Contract What are the terms of agreement in your contract with your client? Roger Date: Thu, 27 Jan 2005 15:09:02 -0500 (EST) From: Thomas Kellar Subject: Re: Star Sweeping This is probably priledged knowledge but I will ask anyway: What if you sweep a client and declare them to be free of bugs or other similar covert surveillance devices but it turns out your client's enemies (paparzzzi?) are bouncing laser beams off your clients windows and are listening in that way. Consequently the enemy gains some knowledge that they use. Can your client come back and sue you for malfeasence? I.e., what if 1. There is a bug you did not find 2. The bad guys are using means you do not check for I suppose that the client would have to prove that the knowledge was gained due to your alleged negligence and that probably would be difficult. I frequently am asked to check friends and relative's computers for spyware and viruses and when I am done, I always declare that to the best of my knowledge they are free of such but I never claim absolutely that they are. Is there a similarity there? Thanks for your time, Thomas -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.1 - Release Date: 1/27/2005 [Non-text portions of this message have been removed] 10843 From: Hawkspirit Date: Fri Jan 28, 2005 11:52am Subject: 6 GHZ On what piece of gear did you make the measurement and when was it last calibrated? Roger From: "wiggyyy2000" Subject: Re: 6 GHz yes but the one i saw was at about 6.02Ghz approx.... --- In TSCM-L@yahoogroups.com, G P wrote: > Anyone ever run across a 6 Ghz signal in TSCM sweeps, > specifically 6.11 Ghz? -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.1 - Release Date: 1/27/2005 [Non-text portions of this message have been removed] 10844 From: Hawkspirit Date: Fri Jan 28, 2005 0:04pm Subject: "Sound of Voices" ?????? It is interesting to note that if you wrap a standard cell phone in good quality aluminum foil and call it will not operate/ring. Roger Date: Fri, 28 Jan 2005 11:23:06 +0200 From: "Riskbiz" Subject: RE: "Sound of Voices" ?????? Tim, Get used to it. The list is apparently populated to a large degree by people who wear cranial tin foil most of the time. You'll see a real TSCM related piece on about a 1:20 ratio (that's what it has been in my short time on the list). But it's still a great place to hear extreme views on everything from smoking to big brother to politics...and get a laugh a couple of times a day. DK -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.1 - Release Date: 1/27/2005 [Non-text portions of this message have been removed] 10845 From: contranl Date: Fri Jan 28, 2005 2:01pm Subject: Re: "Sound of Voices" ?????? . Hey....stop spoiling "my" thread :) or i will have to activate the traffic-light in front of your house. I was deadly serious ! Tetrascanner http://www.tetrascanner.com When bored ...check out my groups: http://groups.yahoo.com/group/gsm-scanner http://groups.yahoo.com/group/traffic-cams 10846 From: A Grudko Date: Fri Jan 28, 2005 2:16pm Subject: RE: 6 GHz -----Original Message----- From: kondrak [mailto:kondrak@s...] > That of course, could also indicate it wasn't sending anything as well, like the audio was off, no activity in the area, etc. IE: the motion detector shut the audio stages down, either to conserve battery, or to thwart it's purpose if somone listened to it. I always try to hunt the emitter down as precise if possible. If you suspect the emission comes from the area under examination, sure, but not if it is obviously from a distant external source. I had one like this Thursday. Not on 6 GHz but 6.095 MEGS!!!, at a house I had swept at least 5 times before. The BBC were blasting in on 6.190 Megs, S9 plus all round the suburb, but just around the house was a blank carrier on house 6.095 Megs. No modulation until I put on the Scanlock audio search signal, on that specific RF freq, and turned the volume up high. In 4 rooms it became intermittent, a sign that there was a 'mike' transmitting in the room. The client had recently supplemented the existing (10 year old?) 5 point intercom with a flat screen CCTV system and linked to a Philips iPronto wireless/IR remote control/internet access system. The 6.095 Megs was RF strongest and required the least audio output to become 'microphonic' in the master bedroom. Turned off the iPronto CPU and the 6.095 Megs signal disappeared. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 [Non-text portions of this message have been removed] 10847 From: Michael Puchol Date: Sat Jan 29, 2005 4:06am Subject: Re: Counter-Surveillance? Maybe point the cameras at the places where damage is actually being done. Make sure the lens cap is off. Make sure the recording device has capacity to capture enough video to cover the period when the damage occurs. Other than that, I cannot think of any particular reason (other than ghosts or vampires, which don't show up on film, maybe). Mildred Young wrote: > > I have video surveillance cameras installed, however it seems that I am still being vandalized without capturing it on my Lorex system....any suggestions? The police think I am nuts, I need help! > I don't want to continue to be a victim in Phoenix, AZ > Thanks > > [Non-text portions of this message have been removed] > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > 10848 From: contranl Date: Sat Jan 29, 2005 4:50am Subject: Re: Counter-Surveillance? . Mount the cameras on a house on the OTHER SIDE of the street ! on or inside a house of the neighbours that live in front or near you. Your attackers have probably figured out that you are watching them you could use wireless cams to get the signals back to you. Think about if you leave or remove the cams on your own house depending on the situation you could leave them where they are to not alert them ...or to scare-off possible other burglars. If you don't want to trouble the neighbours or if they don't cooperate...put them in a car or van...parked across the street...not exactly in front of your house. Instead of wireless you could also use a videorecorder inside the car To solve "run out of tape problems" you could use a: Time lapse recorder Timer switch Motion-detector Digital recorder (now availbale for less then 800 $ at 40 hours) Another solution could be to use a "infrared fence" 4 posts on every corner around the house. Each of them containing infrared light beams,similar to those used in standard alarm systems...mounted at 60 cm's height to avoid triggering by animals...you would have to hide them inside existing or natural looking objects...such a system you could make with less then 700 $ worth of components. 200 other solutions are available. Tetrascanner http://www.tetrascanner.com http://groups.yahoo.com/group/traffic-cams http://groups.yahoo.com/group/gsm-scanner 10849 From: contranl Date: Sat Jan 29, 2005 8:19am Subject: Police sharing wiretapping files at Kazaa !! . It doesn't get any better then this: A Dutch military police officer has been sharing his files of an important international "humans-smuggling" case with millions of Kazaa users ! Among the files were 1000's of: Phonetap-records, Covert-operations details Cellular short message intercepts Gps tracking operations Adresses,and phonenumbers of suspects All of this during a period of at least 3 months from november till januari...even after the justice-department was alarmed the files where still available for some more time. The Justice-department calls the man a stupid. Just 2 months ago there was another case of ignorance when a Justice department attorny had put his complete PC on the sidewalk to go with garbage...it contained full hardisks with similair (non-erased) information. The department says it's not allowed to take files home. source: most todays Dutch newspapers I have no other words for this...what stupid ignorants :) :) :) Kazaa is a very popular filesharing-program used by at least 30 million,mainly for exchanging music(mp3)files,free of charge. In this fairly simple piece of software (Kazaa-client)you have to mark the files that you want to share. what you share is always visible in a so called "shared-folder-tree" some idiots never look at this and share their complete C,D,E...whole alfabet drives. I have played a lot with Kazaa sometime ago...in a curious mood i told it to look for textfiles containing the word "police" ...if you believe it or not it did return some results coming from computers owned by real police officers. Tetrascanner 10850 From: A Grudko Date: Sat Jan 29, 2005 3:56pm Subject: Graduate Cryptographers Unlock Code of 'Thiefproof' Car Key Graduate Cryptographers Unlock Code of 'Thiefproof' Car Key By JOHN SCHWARTZ January 29, 2005 BALTIMORE - Matthew Green starts his 2005 Ford Escape with a duplicate key he had made at Lowe's. Nothing unusual about that, except that the automobile industry has spent millions of dollars to keep him from being able to do it. Mr. Green, a graduate student at Johns Hopkins University, is part of a team that plans to announce on Jan. 29 that it has cracked the security behind "immobilizer" systems from Texas Instruments Inc. The systems reduce car theft, because vehicles will not start unless the system recognizes a tiny chip in the authorized key. They are used in millions of Fords, Toyotas and Nissans. All that would be required to steal a car, the researchers said, is a moment next to the car owner to extract data from the key, less than an hour of computing, and a few minutes to break in, feed the key code to the car and hot-wire it. An executive with the Texas Instruments division that makes the systems did not dispute that the Hopkins team had cracked its code, but said there was much more to stealing a car than that. The devices, said the executive, Tony Sabetti, "have been fraud-free and are likely to remain fraud-free." The implications of the Hopkins finding go beyond stealing cars. ... http://www.nytimes.com/2005/01/29/national/29key.html?ex=1264741200&en=cc110 4501a87d6d1&ei=5090 ---------- No virus found in this incoming message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 [Non-text portions of this message have been removed] 10851 From: contranl Date: Sun Jan 30, 2005 8:53am Subject: Declassified document ( FBI on foreign intelligence act ) . For those interested: http://www.epic.org/privacy/terrorism/fisa/fisa-recipe.pdf Tetrascanner 10852 From: G P Date: Sun Jan 30, 2005 4:23pm Subject: Re: Declassified document ( FBI on foreign intelligence act ) That's a great find Tetra, lots of very relevant legal cites and authorities. Thanks. --- contranl wrote: > For those interested: > > http://www.epic.org/privacy/terrorism/fisa/fisa-recipe.pdf > > > Tetrascanner 10853 From: moellerthy <1ach@g...> Date: Sun Jan 30, 2005 9:14pm Subject: Re: Counter-Surveillance? --- In TSCM-L@yahoogroups.com, "Mildred Young" wrote: > Hello Mildred Young I had the same problem with ADT camera's fed into a switcher. I know someone was getting in but the intruder was not on the tape, so I purchased Pelco camer's and 21 inch monitors and 16 channel Multiplexers IR auto iris lens near and far field color and B/W camera's ups systems then I caught the intruder the police have the tapes as I write this turned out to be a neighbor how she got by the security alarm and 4 camera's well a ADT rouge employee had rewired the panel to cancel out two seperate codes so that one code would shut down the whole alarm system still have not figured out how the 4 camera switcher would not record the intruder but in captured me . You can buy some equipment on ebay other wise it will be very costly just to get a Multiplexer. I have back up systems in place just in case one system gets compromised. Buy a pelco Multiplexer should solve the problem. Andre Holmes Neptune Enterprise Security http://www.nes-ets-usa.com 1ach@G... > I have video surveillance cameras installed, however it seems that I am still being vandalized without capturing it on my Lorex system....any suggestions? The police think I am nuts, I need help! > I don't want to continue to be a victim in Phoenix, AZ > Thanks > > [Non-text portions of this message have been removed] 10854 From: Tim Johnson Date: Fri Jan 28, 2005 1:40pm Subject: Re: "Sound of Voices" ?????? No problem. I was just afraid I had signed up for another one of the groups that discusses things totally unrelated to their "charter". I've whittled myself down to about 4 of them now, as the unrelated topics took over the original intent. As for the things you listed. I'm most certainly interested in all of those.....they relate to the work TSCM tech wieners do or are concerned about. tj -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10855 From: Mildred Young Date: Fri Jan 28, 2005 10:28am Subject: Re: "Sound of Voices" ?????? Hey, in my defense of one of those who think they may need "cranial tin foil"....this list has enlighten me of the seriousness of a sick percentage of people who actual create a need for TSCM experts. I am just learning information about an area, that I never thought would be remotely applying to me. I am just an average type who goes about their day in la-la land. I am experiencing something that I shouldn't, so keep educating the innocent and let it be part of your contribution to life. When you do find out you are being bugged, what are the legal rights I would have? Or what do I do next? Thank you for your patience. ----- Original Message ----- From: "Riskbiz" To: Sent: Friday, January 28, 2005 2:23 AM Subject: RE: [TSCM-L] "Sound of Voices" ?????? > > > Tim, > > Get used to it. The list is apparently populated to a large degree by > people who wear cranial tin foil most of the time. > > You'll see a real TSCM related piece on about a 1:20 ratio (that's what it > has been in my short time on the list). > > But it's still a great place to hear extreme views on everything from > smoking to big brother to politics...and get a laugh a couple of times a > day. > > DK > > -----Original Message----- > From: Tim Johnson [mailto:dbugman@d...] > Sent: Thursday, January 27, 2005 7:14 PM > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] "Sound of Voices" ?????? > > > > I've only been on the list a day or so, but so far nothing has been posted > relating to TSCM. I have a problem relating smoking bans to TSCM. Then > again, I'm a former smoker and don't miss the smell when I'm eating, > walking > up to a building or actually in an office. > > tim > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it private is ours. > > Georgia License # PDC 002074 Technical Security Consultants Inc. > Member INTELNET > Espionage Research Institute > Association of Former Office of Special Investigations Special > Agents-Technical Agent http://www.dbugman.com > > This e-mail is intended for the use of the addressee(s) only and may > contain > privileged confidential, or proprietary information that is exempt from > disclosure under law. If you have received this message in error, please > inform us promptly by reply e-mail, then delete the e-mail and destroy any > printed copy. > > Neither this information block, the typed name of the sender, or anything > else in this message is intended to constitute an electronic signature for > purposes of the Uniform Electronic Transactions Act or the Electronic > Signatures in Global and National Commerce Act > (E-Sign) unless a specific statement to the contrary is included in this > message. > > > [Non-text portions of this message have been removed] > > > > > > > ------------------------ Yahoo! Groups Sponsor --------------------~--> In > low income neighborhoods, 84% do not own computers. > At Network for Good, help bridge the Digital Divide! > http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, the hands > acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS Yahoo! Groups > Links > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 10856 From: Nalesnik, Matthew Date: Fri Jan 28, 2005 11:22am Subject: RE: Humour Re: Fire closes New York subway line I completely agree. Thank you. -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: Friday, January 28, 2005 12:06 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Humour Re: Fire closes New York subway line True, The founders gave us two main tools to effect change in government. We have elections, and we have the second amendment. The election thing is almost worthless to pursue any more, for the process is corrupted and whored. Elections are stolen, the vote is corrupted, and soon, when unverified electronic voting becomes the norm, the outcomes will be known by the corruptors weeks before any election. It will put the criminality of previous notable gangs like "Tammany hall" to shame. At that point, the only remaining choice will be to fight, or sink into the serfdom of a socialist police-state. > >No, we're not technically a "Democracy", we're a Constitutional Republic, >but the preceding text still holds true. And it will see itself >self-evident as long as we have more whiners than doers. If it's broke, >then fix it - you as an American citizen actually do have that power. And >fortunately for most, you also have the power to whine just enough to not >really be heard, but at least you can piss off the people who don't agree >with you. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10857 From: Tim Johnson Date: Fri Jan 28, 2005 7:07am Subject: RE: "Sound of Voices" ?????? Thanks. I've had a fews good giggles already and even a couple of semi precious stones were sighted. It was just that I was surprised to find so much unrelated info on a professional type site. I'll keep reading and gleaning. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] From: joe joe Date: Fri Jan 28, 2005 6:22pm Subject: Re: 6 GHZ it was with an mdc..dont worry i found out what it was..:) --- Hawkspirit wrote: > > > On what piece of gear did you make the measurement > and when was it last > calibrated? Roger > > > > From: "wiggyyy2000" > > Subject: Re: 6 GHz > > > > > > > > > yes but the one i saw was at about 6.02Ghz > approx.... > > > > --- In TSCM-L@yahoogroups.com, G P > wrote: > > > Anyone ever run across a 6 Ghz signal in TSCM > sweeps, > > > specifically 6.11 Ghz? > > > > > -- > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.8.1 - Release > Date: 1/27/2005 > > > > > [Non-text portions of this message have been > removed] > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10859 From: Riskbiz Date: Sat Jan 29, 2005 8:49am Subject: RE: "Sound of Voices" ?????? Should we change this thread title to RF shielding? LOL DK -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Friday, January 28, 2005 8:04 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] "Sound of Voices" ?????? It is interesting to note that if you wrap a standard cell phone in good quality aluminum foil and call it will not operate/ring. Roger Date: Fri, 28 Jan 2005 11:23:06 +0200 From: "Riskbiz" Subject: RE: "Sound of Voices" ?????? Tim, Get used to it. The list is apparently populated to a large degree by people who wear cranial tin foil most of the time. You'll see a real TSCM related piece on about a 1:20 ratio (that's what it has been in my short time on the list). But it's still a great place to hear extreme views on everything from smoking to big brother to politics...and get a laugh a couple of times a day. DK -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.1 - Release Date: 1/27/2005 [Non-text portions of this message have been removed] ------------------------ Yahoo! Groups Sponsor --------------------~--> Has someone you know been affected by illness or disease? Network for Good is THE place to support health awareness efforts! http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10860 From: Riskbiz Date: Sat Jan 29, 2005 8:52am Subject: RE: Re: Counter-Surveillance? What exactly is being vandalized? I live and work in Phx, and will be back in the country on Monday. Let me know and I'll give you a call. DK -----Original Message----- From: contranl [mailto:contranl@y...] Sent: Saturday, January 29, 2005 12:51 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Counter-Surveillance? . Mount the cameras on a house on the OTHER SIDE of the street ! on or inside a house of the neighbours that live in front or near you. Your attackers have probably figured out that you are watching them you could use wireless cams to get the signals back to you. Think about if you leave or remove the cams on your own house depending on the situation you could leave them where they are to not alert them ...or to scare-off possible other burglars. If you don't want to trouble the neighbours or if they don't cooperate...put them in a car or van...parked across the street...not exactly in front of your house. Instead of wireless you could also use a videorecorder inside the car To solve "run out of tape problems" you could use a: Time lapse recorder Timer switch Motion-detector Digital recorder (now availbale for less then 800 $ at 40 hours) Another solution could be to use a "infrared fence" 4 posts on every corner around the house. Each of them containing infrared light beams,similar to those used in standard alarm systems...mounted at 60 cm's height to avoid triggering by animals...you would have to hide them inside existing or natural looking objects...such a system you could make with less then 700 $ worth of components. 200 other solutions are available. Tetrascanner http://www.tetrascanner.com http://groups.yahoo.com/group/traffic-cams http://groups.yahoo.com/group/gsm-scanner ------------------------ Yahoo! Groups Sponsor --------------------~--> Has someone you know been affected by illness or disease? Network for Good is THE place to support health awareness efforts! http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10861 From: Thomas Kellar Date: Fri Jan 28, 2005 2:46pm Subject: Re: Sweep Contract Roger, If you are addressing me with this note, I am writing in an amateur capacity with an interest. I interested in others due-diligence efforts being an ISSO (Informations Systems Security Officer) for a medium sized company. Being an employee gives you certain benefits a contractor does not have (Being a contractor for 9 years prior to my present job also enlightens me as to the benefits of being a a contractor) such as protections against being sued. What company is going to sue their own employee? Generally, the worse they can do is fire you. My example was just that - an example. When I do work for friends or relatives, there is no contract - just maybe an assumption that they give me food or let me marry their daughter or such. Thanks Thomas On Fri, 28 Jan 2005, Hawkspirit wrote: > > What are the terms of agreement in your contract with your client? Roger > > Date: Thu, 27 Jan 2005 15:09:02 -0500 (EST) > > From: Thomas Kellar > > Subject: Re: Star Sweeping ... ... 10862 From: Mildred Young Date: Sat Jan 29, 2005 11:28am Subject: Re: Counter-Surveillance? Actually, I have found there is a device to block recording. I am now exploring options. I am dealing with some body much more deviate than I can think. Thank you. ----- Original Message ----- From: "Michael Puchol" To: Sent: Saturday, January 29, 2005 3:06 AM Subject: Re: [TSCM-L] Counter-Surveillance? > > Maybe point the cameras at the places where damage is actually being > done. Make sure the lens cap is off. Make sure the recording device has > capacity to capture enough video to cover the period when the damage > occurs. Other than that, I cannot think of any particular reason (other > than ghosts or vampires, which don't show up on film, maybe). > > > > Mildred Young wrote: >> >> I have video surveillance cameras installed, however it seems that I am >> still being vandalized without capturing it on my Lorex system....any >> suggestions? The police think I am nuts, I need help! >> I don't want to continue to be a victim in Phoenix, AZ >> Thanks >> >> [Non-text portions of this message have been removed] >> >> >> >> >> >> >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== TSKS >> Yahoo! Groups Links >> >> >> >> >> >> >> >> >> > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 10863 From: Riskbiz Date: Sat Jan 29, 2005 1:37pm Subject: Graduate Cryptographers Unlock Code of 'Thiefproof' Car Key The New York Times January 29, 2005 Graduate Cryptographers Unlock Code of 'Thiefproof' Car Key By JOHN SCHWARTZ BALTIMORE - Matthew Green starts his 2005 Ford Escape with a duplicate key he had made at Lowe's. Nothing unusual about that, except that the automobile industry has spent millions of dollars to keep him from being able to do it. Mr. Green, a graduate student at Johns Hopkins University, is part of a team that plans to announce on Jan. 29 that it has cracked the security behind "immobilizer" systems from Texas Instruments Inc. The systems reduce car theft, because vehicles will not start unless the system recognizes a tiny chip in the authorized key. They are used in millions of Fords, Toyotas and Nissans. All that would be required to steal a car, the researchers said, is a moment next to the car owner to extract data from the key, less than an hour of computing, and a few minutes to break in, feed the key code to the car and hot-wire it. An executive with the Texas Instruments division that makes the systems did not dispute that the Hopkins team had cracked its code, but said there was much more to stealing a car than that. The devices, said the executive, Tony Sabetti, "have been fraud-free and are likely to remain fraud-free." The implications of the Hopkins finding go beyond stealing cars. Variations on the technology used in the chips, known as RFID for radio frequency identification, are widely used. Similar systems deduct highway tolls from drivers' accounts and restrict access to workplaces. Wal-Mart is using the technology to track inventory, the Food and Drug Administration is considering it to foil drug counterfeiting, and the medical school at the University of California, Los Angeles, plans to implant chips in cadavers to curtail unauthorized sale of body parts. The Johns Hopkins researchers say that if other radio frequency ID systems are vulnerable, the new field could offer far less security than its proponents promise. The computer scientists are not doing R.&D. for the Mafia. Aviel D. Rubin, a professor of computer science who led the team, said his three graduate students did what security experts often do: showed the lack of robust security in important devices that people use every day. "What we find time and time again is the security is overlooked and not done right," said Dr. Rubin, who has exposed flaws in electronic voting systems and wireless computer networks. David Wagner, an assistant professor of computer science at the University of California, Berkeley, who reviewed a draft of a paper by the Hopkins team, called it "great research," adding, "I see it as an early warning" for all radio frequency ID systems. The "immobilizer" technology used in the keys has been an enormous success. Texas Instruments alone has its chips in an estimated 150 million keys. Replacing the key on newer cars can cost hundreds of dollars, but the technology is credited with greatly reducing auto theft. - Early versions of in-key chips were relatively easy to clone, but the Texas Instruments chips are considered to be among the best. Still, the amount of computing the chip can do is restricted by the fact that it has no power of its own; it builds a slight charge from an electromagnetic field from the car's transmitter. Cracking the system took the graduate students three months, Dr. Rubin said. "There was a lot of trial and error work with, every once in a while, a little 'Aha!' " The Hopkins researchers got unexpected help from Texas Instruments itself. They were able to buy a tag reader directly from the company, which sells kits for $280 on its Web site. They also found a general diagram on the Internet, from a technical presentation by the company's German division. The researchers wrote in the paper describing their work that the diagram provided "a useful foothold" into the system. (The Hopkins paper, which is online at www.rfidanalysis.org, does not provide information that might allow its work to be duplicated. The researchers discovered a critically important fact: the encryption algorithm used by the chip to scramble the challenge uses a relatively short code, known as a key. The longer the code key, which is measured in bits, the harder it is to crack any encryption system. "If you were to tell a cryptographer that this system uses 40-bit keys, you'd immediately conclude that the system is weak and that you'd be able to break it," said Ari Juels, a scientist with the research arm of RSA Security, which financed the team and collaborated with it. The team wrote software that mimics the system, which works through a pattern of challenge and response. The researchers took each chip they were trying to clone and fed it challenges, and then tried to duplicate the response by testing all 1,099,511,627,776 possible encryption keys. Once they had the right key, they could answer future challenges correctly. Mr. Sabetti of Texas Instruments argues that grabbing the code from a key would be very difficult, because the chips have a very short broadcast range. The greatest distance that his company's engineers have managed in the laboratory is 12 inches, and then only with large antennas that require a power source. Dr. Rubin acknowledged that his team had been able to read the keys just a few inches from a reader, but said many situations could put an attacker and a target in close proximity, including crowded elevators. The researchers used several thousand dollars of off-the-shelf computer equipment to crack the code, and had to fill a back seat of Mr. Green's S.U.V. with computers and other equipment to successfully imitate a key. But the cost of equipment could be brought down to several hundred dollars, Dr. Rubin said, and Adam Stubblefield, one of the Hopkins graduate students, said, "We think the entire attack could be done with a device the size of an iPod." The Texas Instruments chips are also used in millions of the Speedpass tags that drivers use to buy gasoline at ExxonMobil stations without pulling out a credit card, and the researchers have shown that they can buy gas with a cracked code. A spokeswoman for ExxonMobil, Prem Nair, said the company used additional antifraud measures, including restrictions that only allow two gas purchases per day. "We strongly believe that the Speedpass devices and the checks that we have in place are much more secure than those using credit cards with magnetic stripes," she said. The team discussed its research with Texas Instruments before making the paper public. Matthew Buckley, a spokesman for RSA Security, said his company, which offers security consulting services and is developing radio frequency ID tags that resist unauthorized eavesdropping, had offered to work with Texas Instruments free of charge to address the security issues. Dr. Wagner said that what graduate students could do, organized crime could also do. "The white hats don't have a monopoly on cryptographic expertise," he said. Dr. Rubin said that if criminals did eventually duplicate his students' work, people could block eavesdroppers by keeping the key or Speedpass token in a tinfoil sheath when not in use. But Mr. Sabetti, the Texas Instruments executive, said such precautions were unnecessary. "It's a solution to a problem that doesn't exist," he said. Dan Bedore, a spokesman for Ford, said the company had confidence in the technology. "No security device is foolproof," he said, but "it's a very, very effective deterrent" to drive-away theft. "Flatbed trucks are a bigger threat," he said, "and a lot lower tech." 10864 From: clive michaels Date: Sat Jan 29, 2005 1:21pm Subject: Technical Sweeps As a former counter surveillance operative working for a UK corporate investigative company, I have recently been asked to undertake some Technical Sweeps. I am now retired and on a pension. Being a little out of date, and only having somewhat old fashioned equipment - which, however is still usable to over 3 Ghz - I am interested in looking for the possible puchase of some more up to date equipment (in the event I am asked to undertake more work in this field). There are so many products on the market today that it is difficult to decide what to look at, let alone purchase; prices vary from the moderate to the ridiculous - also bugging equipment has come a long way since the 70s. Any assistance you can give would be appreciated Regards Michael Calvert __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com [Non-text portions of this message have been removed] 10865 From: LD C Date: Mon Jan 31, 2005 9:08am Subject: RE: "Sound of Voices" ?????? Smoking bans are an example of civil liberty being taken away. To relate to TSCM and microphones in traffic lights; the following may be of interest. Taken from www.epcglobalinc.com RFID (radio frequency identification) is a technology that has existed for decades. At a simple level, it is a technology that involves tags that emit radio signals and devices called readers that pick up the signal. The Electronic Product Codeô (EPC) is the next generation of product identification. The EPC is a simple, compact ìlicense plateî that uniquely identifies objects (items, cases, pallets, locations, etc.) in the supply chain. The EPC is built around a basic hierarchical idea that can be used to express a wide variety of different, existing numbering systems, like the EAN.UCC System Keys, UID, VIN, and other numbering systems. Like many current numbering schemes used in commerce, the EPC is divided into numbers that identify the manufacturer and product type. But, the EPC uses an extra set of digits, a serial number, to identify unique items. An EPC number contains: 1. Header, which identifies the length, type, structure, version and generation of EPC 2. Manager Number, which identifies the company or company entity 3. Object Class, similar to a stock keeping unit or SKU 4. Serial Number, which is the specific instance of the Object Class being tagged Additional fields may also be used to observe movement. Mate this technology with the "manditory identification that citizens must have with them at all times." So now we have the basic fountation in place. ----- Original Message ----- From: Riskbiz To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] "Sound of Voices" ?????? Date: Fri, 28 Jan 2 005 11:23:06 +0200 > > > Tim, > > Get used to it. The list is apparently populated to a large degree by > people who wear cranial tin foil most of the time. > > You'll see a real TSCM related piece on about a 1:20 ratio (that's what it > has been in my short time on the list). > > But it's still a great place to hear extreme views on everything from > smoking to big brother to politics...and get a laugh a couple of times a > day. > > DK > > -----Original Message----- > From: Tim Johnson [mailto:dbugman@d...] > Sent: Thursday, January 27, 2005 7:14 PM > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] "Sound of Voices" ?????? > > > > I've only been on the list a day or so, but so far nothing has been posted > relating to TSCM. I have a problem relating smoking bans to TSCM. Then > again, I'm a former smoker and don't miss the smell when I'm eating, walking > up to a building or actually in an office. > > tim > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it private is ours. > > Georgia License # PDC 002074 Technical Security Consultants Inc. > MemberINTELNET > Espionage Research Institute > Association of Former Office of Special Investigations Special > Agents-Technical Agent http://www.dbugman.com > > This e-mail is intended for the use of the addressee(s) only and may contain > privileged confidential, or proprietary information that is exempt from > disclosure under law. If you have received this message in error, please > inform us promptly by reply e-mail, then delete the e-mail and destroy any > printed copy. > > Neither this information block, the typed name of the sender, or anything > else in this message is intended to constitute an electronic signature for > purposes of the Uniform Electronic Transactions Act or the Electronic > Signatures in Global and National Commerce Act > (E-Sign) unless a specific statement to the contrary is included in this > message. > > > [Non-text portions of this message have been removed] > > > > > > > ------------------------ Yahoo! Groups Sponsor --------------------~--> In > low income neighborhoods, 84% do not own computers. > At Network for Good, help bridge the Digital Divide! > http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, the hands > acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS Yahoo! Groups Links > > > > -- _______________________________________________ Find what you are looking for with the Lycos Yellow Pages http://r.lycos.com/r/yp_emailfooter/http://yellowpages.lycos.com/default.asp?SRC=lycos10 10868 From: A Grudko Date: Mon Jan 31, 2005 10:59pm Subject: RE: "Sound of Voices" ?????? -----Original Message----- From: LD C [mailto:ldc_esq@l...] > Smoking bans are an example of civil liberty being taken away. They are equally an example of civil abuse being taken away. Additional fields may also be used to observe movement. Mate this technology with the "manditory identification that citizens must have with them at all times." All citizens already carry mandatory identification with them at all times. It's called DNA. Andy G Africa ---------- Internal Virus Database is out-of-date. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 [Non-text portions of this message have been removed] 10869 From: Date: Tue Feb 1, 2005 6:26am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 10870 From: srhayes3 Date: Tue Feb 1, 2005 11:24am Subject: List mission purpose I have grown weary of the recent climate of the exchanges taking place on the list. We seem to be getting further and further away from discussions of TSCM and technical security and spending more time on bickering and list politics. I had the pleasure of making Jims acquaintance via telephone back in 1996 and I have found him to be a wealth of VERIFIABLE information. I emphasize verifiable because there have been other list members I have spoken to who either wouldnt share info or blew smoke so far up my ass that my breath smells like cigaretts. Jim has been consistent and knowledgable on all fronts and one of the few (and there have been MANY)list members who will share his knowledge unselfishly. If he chooses to ban someone from the list then so be it. Unless that person is a close personal relative or in some way generates income for you then mind your business or at least keep it out of the list. I'm here to learn about TSCM. I could give a frogs flying fat ass who likes who or who thinks what is unfair. If you do not approve of the way the list is moderated go start your own or join another. Samuel R Hayes III 10872 From: James M. Atkinson Date: Tue Feb 1, 2005 0:17pm Subject: Re: List mission purpose Sam, Thank you for your kind comments, they are appreciated. I will do what I can to keep the list focused on the topic of TSCM. -jma At 12:24 PM 2/1/2005, srhayes3 wrote: >I have grown weary of the recent climate of the exchanges taking >place on the list. We seem to be getting further and further away >from discussions of TSCM and technical security and spending more >time on bickering and list politics. I had the pleasure of making >Jims acquaintance via telephone back in 1996 and I have found him to >be a wealth of VERIFIABLE information. I emphasize verifiable >because there have been other list members I have spoken to who >either wouldnt share info or blew smoke so far up my ass that my >breath smells like cigaretts. Jim has been consistent and >knowledgable on all fronts and one of the few (and there have been >MANY)list members who will share his knowledge unselfishly. If he >chooses to ban someone from the list then so be it. Unless that >person is a close personal relative or in some way generates income >for you then mind your business or at least keep it out of the list. >I'm here to learn about TSCM. I could give a frogs flying fat ass >who likes who or who thinks what is unfair. If you do not approve of >the way the list is moderated go start your own or join another. >Samuel R Hayes III ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10873 From: Date: Tue Feb 1, 2005 1:54am Subject: Man convicted of stalking using GPS in CA _USATODAY.com - Californian gets 16 months for stalking by satellite_ (http://www.usatoday.com/tech/news/surveillance/2005-01-29-gps-stalking_x.htm) Thank you, Robert Pac Private Investigator InterTrace Investigations Group Specialist in Surveillance & Computer Spyware Detection PO Box 508 Southampton, MA 01073 Phone (413) 527-6990 www.InterTraceInvestigations.com MA License # P-1029 "CONFIDENTIALITY NOTICE: This e-mail transmission and any document that may be accompanying this e-mail transmission may contain confidential and proprietary information intended only for use by the recipient named and is covered by the Electronic Communications and Privacy Act, 18 USC Sections 2510-2521. If you are not the intended recipient or the employee or agency authorized to deliver this e-mail to the intended recipient, you are hereby notified that any unauthorized disclosure, copying, distribution, or action taken in reliance on this e-mail is strictly prohibited. If you received this e-mail in error, Please delete all copies of this e-mail from your hard drive, all storage devices and destroy all hard copies. Please notify the person named above immediately by e-mail or telephone." [Non-text portions of this message have been removed] 10874 From: ratlater69 Date: Tue Feb 1, 2005 3:11am Subject: "Breaking-In" to technical security So I've been thinking for a while about how one would "break in" to the technical security business, with little or no directly relevant experience. The obvious answer is military service, which is where I suspect a substantial number of people "cut their teeth"; is this consistent with the perception of most people, or do you expect to see new people coming from the private sector? I personally have a fairly strong background in computer & network security and physics, with a decent understanding of basic electronics, and have always been interested in technical security but have never quite been able to push through. I'm under the impression that most people in the techsec sector share at least some of these qualifications, though I'm unsure if that is completely accurate. 10875 From: LD C Date: Tue Feb 1, 2005 7:26am Subject: RE: "Sound of Voices" ?????? Where does one find a remote "DNA Tracker"? ----- Original Message ----- From: "A Grudko" To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] "Sound of Voices" ?????? Date: Tue, 1 Feb 2005 06:59:31 +0200 > > > -----Original Message----- > From: LD C [mailto:ldc_esq@l...] > > Smoking bans are an example of civil liberty being taken away. > > They are equally an example of civil abuse being taken away. > > Additional fields may also be used to observe movement. Mate this > technology with the "manditory identification that citizens must have with > them at all times." > > All citizens already carry mandatory identification with them at all > times. It's called DNA. > > Andy G > Africa > > ---------- > > Internal Virus Database is out-of-date. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 > > > [Non-text portions of this message have been removed] -- _______________________________________________ Find what you are looking for with the Lycos Yellow Pages http://r.lycos.com/r/yp_emailfooter/http://yellowpages.lycos.com/default.asp?SRC=lycos10 10876 From: Date: Tue Feb 1, 2005 8:21am Subject: Re: List mission purpose In a message dated 01/02/2005 18:43:18 GMT Standard Time, jmatk@tscm.com writes: Sam, Thank you for your kind comments, they are appreciated. I will do what I can to keep the list focused on the topic of TSCM. -jma At 12:24 PM 2/1/2005, srhayes3 wrote: >I have grown weary of the recent climate of the exchanges taking >place on the list. We seem to be getting further and further away >from discussions of TSCM and technical security and spending more >time on bickering and list politics. I had the pleasure of making >Jims acquaintance via telephone back in 1996 and I have found him to >be a wealth of VERIFIABLE information. I emphasize verifiable >because there have been other list members I have spoken to who >either wouldnt share info or blew smoke so far up my ass that my >breath smells like cigaretts. Jim has been consistent and >knowledgable on all fronts and one of the few (and there have been >MANY)list members who will share his knowledge unselfishly. If he >chooses to ban someone from the list then so be it. Unless that >person is a close personal relative or in some way generates income >for you then mind your business or at least keep it out of the list. >I'm here to learn about TSCM. I could give a frogs flying fat ass >who likes who or who thinks what is unfair. If you do not approve of >the way the list is moderated go start your own or join another. >Samuel R Hayes III ------------------------------------------------------------------------------ ---------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ------------------------------------------------------------------------------ ---------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ------------------------------------------------------------------------------ ---------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ------------------------------------------------------------------------------ ---------------------- ------------------------ Yahoo! Groups Sponsor --------------------~--> Has someone you know been affected by illness or disease? Network for Good is THE place to support health awareness efforts! _Click Here!_ (http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links Sam a very good point but for the benefit of non US members such as myself [English] what does having smoke blown up your ass mean exactly, [a wonderful turn of phrase though] Best Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) [Non-text portions of this message have been removed] 10877 From: James M. Atkinson Date: Tue Feb 1, 2005 1:23pm Subject: Bug Frequencies One of the lesser known hard core areas of my website is the bug frequency listings (they only get a few thousand "hits" a day.) They list a huge number of frequencies that when copy and pasted into a scanner, spectrum analyzer, or piece of (cough) proper TSCM equipment will let you keep an eye of some of the higher risk chunks of the RF spectrum. In fact most of the frequencies can be monitored with a cheap $ 90 scanner from Radio Shack, a cheap Icom radio, or a very fancy, and very expensive nano/micro/mini Cepter. I would lean towards something like a newer Bearcat scanner where can link banks of channels together to have an more than a few hundred frequencies to look at at once. This is important as many scanner will let you set up a single bank with 50-100 channels in that single bank, but you can not link banks together, which in effect gives you the limitation of only monitoring 100 channels at a time. You can just copy and paste the frequency list into the software package, and then use the software package that comes with the scanner to transfer the frequency list into the scanner where you can run through 1000 channels in 10-20 seconds. I would encourage you to divide the list between multiple scanners, so that each high threat band (ie: 350-425 MHz) has it's own receiver, but also so that when you are doing a larger area you can locate the radios some distance apart (all running the same banks) and significantly increase the probability of catching a bug while it is on the air. I also have a page that discusses the really popular spy shop frequencies, and the percentage and numbers used on what frequencies, that page can be found at: http://www.tscm.com/bugfreq.html Here is the main page of frequencies, use it in good health, and of course... your mileage may vary: http://www.tscm.com/TSCM101bugfreq.html Also, I will post some of my favorite sections in a few posting(s) that follow this one. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10878 From: James M. Atkinson Date: Tue Feb 1, 2005 1:59pm Subject: Bug Frequency Table Download the following frequencies into an inexpensive scanner (cough, radio shack or Bearcat) and you will be extremely surprised what you find of an entomologic nature: The most recent, and complete version of the list can be found at: http://www.tscm.com/tscm101bugfreq.html magnus frater spectat te Happy hunting -jma 49.1520 49.5000 49.8300 - very hostile 49.8400 49.8550 - extremely hostile 49.8600 49.8900 - extremely hostile 49.8920 49.9000 49.9500 135.0000 135.3000 135.4127 136.0000 136.0227 137.0000 138.0000 138.2400 138.2912 139.0000 139.6000 - extremely hostile 139.6023 139.8000 139.9500 140.0000 - extremely hostile 140.8500 - extremely hostile 141.0000 141.3800 141.5520 142.0000 143.0000 143.1818 143.5000 - extremely hostile 143.7696 143.7762 143.7800 144.0000 144.0008 144.0028 144.0047 144.8200 145.0000 145.1520 146.0000 146.3130 146.5350 - extremely hostile 146.5356 - extremely hostile 146.7614 146.9350 146.9400 147.0000 147.4560 148.0000 148.0050 - extremely hostile 149.0000 149.5800 149.9500 149.9900 150.0000 150.3409 150.4500 150.9000 151.0500 151.3500 151.8000 151.8600 152.0000 152.2500 152.5704 152.7000 152.7200 153.0000 153.1500 153.2288 153.6000 153.9205 154.0500 154.3600 154.5000 154.9500 155.0000 155.4000 155.5200 155.8500 156.0000 156.3000 156.7500 156.7800 157.2000 157.2864 157.5000 157.6500 158.1000 158.5500 159.0000 159.6103 159.9500 160.0000 161.0795 161.2800 161.6500 162.0000 162.2016 162.4000 162.4750 162.5000 162.5500 163.8400 164.4625 - red 164.6591 164.8625 - green 165.0000 165.7500 165.8880 166.0000 166.6380 166.6625 - bulldog 1 166.8625 - bulldog 2 167.0000 167.4610 167.7722 168.0000 168.2386 169.0000 169.3300 169.4450 - extremely hostile 169.5050 - extremely hostile 169.9320 169.9500 169.9904 170.0000 170.1000 - violet 170.2400 170.2450 - extremely hostile 170.3000 170.3050 - extremely hostile 170.4875 - lime 170.6000 170.9750 - extremely hostile 171.0450 - extremely hostile 171.0500 171.1050 - extremely hostile 171.1100 171.4500 - bug 1 171.6000 - bug 2 171.8182 171.8250 - bug 3 171.8450 - extremely hostile 171.9000 171.9050 - extremely hostile 172.0000 - bug 4 172.2000 - bug 5 172.8875 - gold 172.8875 - yellow 173.2250 173.2375 173.2450 173.3125 173.3500 - extremely hostile 173.3875 173.4625 173.5375 173.6125 173.6875 173.7625 173.8375 173.9125 173.9875 174.0000 174.0625 174.1375 174.2000 174.2125 174.2875 174.3625 174.6000 175.0000 175.0200 - extremely hostile 175.3977 175.8000 176.0000 176.2800 176.7360 176.9472 177.0000 177.3200 177.3447 177.6000 177.8000 178.0750 178.4000 178.4500 178.9773 179.0000 179.3500 179.4000 179.6480 179.6750 180.0000 180.6000 180.6750 180.8000 181.0000 181.2000 181.5750 181.6000 181.9500 182.5568 182.9000 183.0000 183.3950 183.6000 183.8000 184.3200 184.3718 184.4000 184.8500 - extremely hostile 185.0000 185.2771 185.3750 186.1000 186.1364 186.6000 186.6500 186.6667 187.0000 187.1500 187.8000 188.0380 188.8610 188.8750 189.0000 189.7159 189.8000 190.0000 190.4000 190.6000 - extremely hostile 190.9100 191.3000 191.6928 191.7016 191.7750 192.0000 192.0037 192.0063 192.1000 192.2500 192.6000 193.0500 193.2954 193.5360 195.0000 195.0840 195.2750 195.3808 195.6000 195.8000 196.6000 196.6080 196.6300 196.8750 197.0000 198.0000 198.1000 198.2750 198.6000 198.9500 199.0000 199.0656 199.6000 199.8800 199.9500 200.0000 200.4545 200.5000 201.0400 201.2500 201.6000 201.8000 202.1064 202.2000 202.7520 203.0000 - extremely hostile 203.0932 203.1000 203.6000 204.0341 204.1000 204.6000 204.7950 204.8000 204.8750 205.0000 205.7718 206.3800 206.6771 207.1000 207.3600 207.4000 207.6136 208.0000 208.2000 208.4000 208.4500 208.6000 209.2500 209.7250 210.0000 210.1000 210.3400 210.3800 210.8000 211.0000 211.1932 211.2000 211.5072 211.7250 211.9500 212.0000 212.3280 212.4750 212.5500 212.8137 213.0000 213.2000 213.3333 213.7500 213.8000 214.0000 214.7727 214.7750 215.0000 215.2500 215.3000 215.5000 215.7500 215.9750 216.0000 216.0013 216.1300 216.2500 216.2688 216.5000 216.7500 217.0000 217.2500 217.5000 217.7500 218.0000 218.2500 218.3523 218.5000 218.6850 218.7500 219.0000 219.2500 219.3100 219.5000 219.7500 219.8394 220.0000 220.9093 221.1840 221.5000 - extremely hostile 221.9318 222.0000 222.4400 223.5064 224.0000 224.4000 224.4932 224.5000 - extremely hostile 224.7000 225.0000 225.5114 226.5750 227.5000 228.0032 229.0909 230.0000 231.0000 231.6000 232.0000 232.6705 234.2600 235.0400 235.2000 235.4000 235.9296 236.2500 236.3300 237.5732 238.0000 238.7254 238.8050 239.6160 239.8295 240.0000 240.0850 241.2394 241.9200 242.3093 243.0000 243.4091 243.9500 245.0000 245.2944 245.7600 246.0000 246.1500 246.9886 248.4500 249.0000 249.9500 250.0000 250.4000 250.5682 252.0000 253.0000 253.5000 253.9750 254.0000 254.1477 254.4000 254.5000 254.8980 255.0000 255.3080 255.5904 256.0000 256.0050 256.5415 257.7272 257.7300 258.0000 258.9732 260.0000 260.1120 261.3068 262.1440 264.0000 264.8864 265.0000 265.4208 266.0000 266.6670 268.4659 270.0000 270.2800 271.3750 272.0455 273.0408 274.0000 274.3576 275.0000 275.3750 275.6250 276.0000 276.7080 279.2045 280.0000 281.7500 282.0000 282.7841 283.1040 283.7516 285.0000 285.1250 285.1325 286.0000 286.1500 286.3636 287.9950 288.0000 288.0017 289.9432 290.0000 292.0000 292.5000 292.6260 293.0000 293.1250 293.1750 293.5227 293.6500 294.0000 294.9120 295.0000 296.0000 297.0000 297.1023 297.5000 298.0000 299.0000 299.1000 299.1600 299.5000 299.6000 299.9000 299.9500 299.9750 300.0000 300.1000 300.5000 300.6000 300.6818 300.7000 301.0000 301.1000 301.1800 301.3000 301.4000 301.4600 301.5000 301.6000 301.8000 302.0000 302.1000 302.3000 302.5000 302.7000 302.9000 303.0000 303.2000 303.3250 303.4000 303.5000 303.5200 303.5430 303.5750 303.6150 - confirmed hostile 303.6250 303.7000 303.7500 303.7900 303.8000 303.8150 303.8250 - extremely hostile 303.8400 303.8500 303.8600 303.8700 303.8750 303.8950 303.9000 303.9100 303.9250 303.9500 304.0000 304.2450 - confirmed hostile 304.2614 - confirmed hostile (sim-saw) 304.3000 304.5000 304.6000 304.6600 304.7000 304.8000 305.0000 305.5000 305.7000 305.8250 306.0000 306.4000 307.0000 307.2000 307.3000 307.5700 307.8000 307.8409 307.9000 308.0000 308.2000 308.5000 308.6000 308.7000 308.8000 309.0000 309.1000 309.5000 309.6000 309.6700 309.7000 309.8000 309.9000 310.0000 - extremely hostile 310.2000 310.3000 310.4000 310.4200 310.5000 310.6840 310.7000 310.8000 310.9820 311.0000 311.0630 311.2000 311.2300 311.4000 311.4205 311.5000 311.6000 311.8000 311.9000 312.0000 312.0470 312.2500 312.3300 312.5000 312.8000 313.0000 313.5000 313.8000 314.0000 314.2000 314.3000 314.3500 314.3750 - confirmed hostile 314.4000 314.5000 314.5728 314.5750 314.6000 314.6400 314.7500 314.8000 314.8500 - extremely hostile 314.9000 314.9500 314.9875 315.0000 - extremely hostile 315.0500 315.5000 315.6000 315.6250 315.8000 315.9500 316.0000 316.0250 316.4000 316.5000 316.9000 317.0000 317.2608 317.5000 317.7000 317.7500 317.9000 318.0000 318.0250 318.5000 318.5795 318.6000 319.0000 319.4000 319.5000 319.9000 320.0000 320.3900 321.9850 - confirmed hostile 322.1591 324.0000 325.0000 325.0500 325.7000 325.7386 328.0000 329.0000 329.1000 329.3182 330.0000 332.8977 333.0000 334.0000 335.5443 336.0000 336.4773 337.2800 338.0000 339.5000 339.6000 339.8640 340.0000 340.0568 342.0048 343.6363 344.0000 345.0000 345.7280 346.1500 347.0000 347.2159 347.3000 347.7500 348.0000 348.8000 349.0000 349.7000 349.9500 350.0000 350.7955 352.0000 353.8944 354.0000 354.3750 354.5000 355.0000 355.7000 357.0000 357.9545 359.0000 359.9500 360.0000 361.0000 361.5341 362.2500 362.3400 362.8800 364.0000 365.0000 365.1136 366.0000 368.0000 368.6400 368.6932 369.0000 369.5000 370.0000 372.0000 372.2727 372.5000 374.0000 375.0000 375.8523 377.0000 377.4720 378.0000 379.0000 379.4318 379.5000 379.9500 380.0000 381.0000 381.8000 382.0000 383.0000 383.0114 384.0000 384.0022 384.3000 384.7500 384.7900 385.0000 386.0000 386.5909 388.0000 389.0000 390.0000 390.1680 390.1705 390.3000 391.2050 - extremely hostile 392.0000 392.7280 - extremely hostile 393.0000 393.2160 393.2660 393.3000 393.7500 395.0000 396.0000 397.0000 397.3295 398.0000 398.6050 - extremely hostile 398.7000 399.0000 399.0300 - extremely hostile 399.4550 - extremely hostile 399.9500 400.0000 400.9091 402.0000 402.0800 402.8000 403.0000 403.5500 403.9660 404.0000 404.4886 406.0000 407.0000 407.3000 407.3500 408.0000 408.0682 409.0000 409.5000 409.6000 410.0000 410.7000 411.5000 411.6477 411.6500 411.8000 412.0000 412.6100 413.0000 414.0000 414.5000 414.8000 414.9800 - extremely hostile 415.0000 415.2273 416.0000 416.2500 - extremely hostile 416.8450 - extremely hostile 417.0000 417.5000 417.8000 417.9000 418.0000 - extremely hostile 418.1000 418.4000 418.6500 418.8068 419.0000 420.0000 420.0150 420.5440 - confirmed hostile 421.0000 422.0000 422.3864 422.5000 423.0000 423.0144 423.1250 - hostile 423.2000 423.2200 424.0000 424.9760 425.0000 425.9659 426.0000 427.0000 427.1250 - extremely hostile 427.4750 - extremely hostile 427.8250 - extremely hostile 428.0000 428.6350 - extremely hostile 429.0000 429.2500 429.5050 - extremely hostile 429.5454 429.5455 429.9500 430.0000 432.0000 432.5000 432.9200 433.0000 433.0150 433.1250 433.2000 433.4000 433.4200 433.5000 433.6000 433.7000 433.8000 433.8700 433.9000 433.9200 - extremely hostile 433.9250 433.9500 433.9700 434.0000 434.0100 435.0000 436.0000 436.7045 438.0000 439.2500 - extremely hostile 439.5000 440.0000 440.2841 441.8400 442.2000 442.3680 443.0000 443.8636 445.0000 445.9000 447.0000 447.2250 447.4432 447.7250 448.0000 448.7400 449.0000 449.1200 449.1900 450.0000 451.0000 451.0227 453.0000 453.1520 453.8500 454.6023 455.0000 456.0064 456.7125 457.0000 457.7625 458.1818 458.6500 458.8500 459.0000 459.1500 460.0000 460.6630 460.8000 461.0000 461.1380 461.7614 462.0000 462.5000 462.5600 462.5625 462.5875 462.6125 462.6375 462.6625 462.6875 462.7125 463.0000 464.0000 464.4300 465.0000 465.3409 466.0000 466.6667 466.6670 467.5625 467.5875 467.6125 467.6375 467.6625 467.6875 467.7125 467.7600 467.7750 468.9205 470.0000 471.8300 472.5000 475.0000 476.0795 479.2540 479.5000 479.6591 480.0000 480.0157 480.1750 480.5000 483.2386 483.8400 485.0000 486.0000 486.8182 488.4520 489.0000 490.0000 490.3977 491.5200 492.0000 493.9773 495.0000 497.5568 499.0000 499.9700 - hostile 499.9750 - hostile If you want the full list you will have to download it from: http://www.tscm.com/tscm101bugfreq.html vah! denuone latine loquebar? me ineptum. interdum modo elabitur. 10879 From: A Grudko Date: Tue Feb 1, 2005 2:15pm Subject: RE: Bug Frequencies -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] > They list a huge number of frequencies that when copy and pasted into a scanner, spectrum analyzer, or piece of (cough) proper TSCM equipment will let you keep an eye of some of the higher risk chunks of the RF spectrum. One of my standard sweep procedures is to have an ancient hand-held scanner with about 200 locally used bug freqs running unattended as I do my sweeps. Connected to it is a VOX operated mini-recorder and once I complete my sweep I check the recording (there's often innocent noise) to see if in my procedures (picking up phones, switching on lights, flushing urinals) I have triggered any Spy Shop devices. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" ---------- Internal Virus Database is out-of-date. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 [Non-text portions of this message have been removed] 10880 From: contranl Date: Tue Feb 1, 2005 5:10pm Subject: Justice Department refuses to stop unlawfull tapping of lawyers . Department of justice refuses to stop unlawfull phonetapping of lawyers (The Netherlands) In a Dutch national tv broadcast today it became clear that the justice department in The Netherlands is unwillingly to stop the unlawful tapping of phonecalls between lawyers and their clients. Dutch Law says you can't tap phonecalls between lawyers and their clients. When asked about that in a previous show a department spo(o)kesman had said: "It is technically not possible to filter those calls coming from or going to lawyers offices" Today a technician who designed the tapping-rooms of the Amsterdam police declares: "It is very well possible and simple to do...all you would have to do is make a database wich contains the numbers that you don't want to be tapped...when there is a call coming or going to such a number you could immidiatly end the tapping-procedure...the system always knows who is calling trough the use of caller-id signals" A spokesman for the lawyers society is furious and says they are being fooled by the department. The department refuses to give any comments on camera but replies in an email: "We don't want to create any black zones where we can't tap any phones" The department now faces a problem wich is that they don't obey there own laws wich will certainly be held against them in the next phonetapping-case that involves lawyers. It is obvious that you can't use any evidence gathered by ilegal means... I estimate that they will solve it like this: The(lawyer-tap)evidence is not used and not presented in a court of law...they will still tap lawyers and use the gathered information to gather other evidence wich in turn they can use...they probably "launder" the origin. Soap-opera to be continued :) Tetrascanner 10881 From: James M. Atkinson Date: Tue Feb 1, 2005 6:28pm Subject: Frequency List Oops, I made a typo on one of the two pages of bug frequency lists, the correct links are as follows: The first link is: http://www.tscm.com/TSCM101bugfreq.html The second is: http://www.tscm.com/bugfreq.html Sorry about the error, my bad... -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10882 From: satcommunitfive Date: Tue Feb 1, 2005 7:55pm Subject: how to stop tempest http://www.serversunderthesun.com/tin/ from >http://zapatopi.net/afdb.html bewell 10883 From: James M. Atkinson Date: Tue Feb 1, 2005 7:48pm Subject: Re: List mission purpose "Blowing Smoke" refers to the old shamanic ritual of lighting tobacco, inhaling it, and then exhaling it over a warrior undergoing a ritual of empowerment before going into battle. In some traditions the Shaman actually blows the smoke into the mouth of the warrior, who in turn inhales it into the lungs as another means of magically protecting themselves. I don't know where who first coined the phrase or used it in reference to the termination point of the colon, but I am sure that it is amusing. To "blow smoke" or to "smoke blow", can also refer to the igniting and inhaling of coca based narcotics such as cocaine, crack, and variations thereof. Further "Blowing Smoke" refers to the lies that a con artist tells his victim to deceive them, or weave an extended falsehood to cheat someone. To "blow smoke up somones ass" to indicate that the person "blowing the smoke" is lying to another person or group of people and more specially it refers to the con man or trickster who weaves a detailed series of lies, falsehoods, and deceptions to build up a long term confidence game. -jma >Sam a very good point but for the benefit of non US members such as myself >[English] what does having smoke blown up your ass mean exactly, >[a wonderful >turn of phrase though] >Best Regards Dave > >David McGauley >TSCM [Technical Surveillance and Countermeasures] >Electronic Surveillance and Sweep Specialist >Electrical/Electronics Engineer ex Police >Demtec House >Ormskirk >Lancs L390HF >UK >01695558544 >07866206112 >demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10884 From: Nalesnik, Matthew Date: Tue Feb 1, 2005 0:46pm Subject: RE: Man convicted of stalking using GPS in CA "Authorities contended that Gabrielyan attached a cell phone to the woman's car on Aug. 16 with a motion switch that turned on when the car moved, transmitting a signal each minute to a satellite. Information was then sent to a Web site that allowed Gabrielyan to monitor the woman's location. " Oh, okay... So it's okay for the cops to do it, but not an illegal immigrant?! What HAS this country come to? Where are this poor illegal alien's rights? Okay, I'm kidding... But seriously, --- OPEN CAN OF WORMS HERE --- If a cop does the same thing, and places a similar device on the car of someone they're tailing, without having to get a court order (which has been the precedent set thus far), isn't THAT an invasion of rights and subject to "stalking" prosecution as well? --- CLOSE CAN OF WORMS --- yes, I know the answer. That's bull$hit. -----Original Message----- From: RPacPI@a... [mailto:RPacPI@a...] Sent: Tuesday, February 01, 2005 7:55 AM _USATODAY.com - Californian gets 16 months for stalking by satellite_ ( http://www.usatoday.com/tech/news/surveillance/2005-01-29-gps-stalking_x.htm) Thank you, Robert Pac Private Investigator InterTrace Investigations Group Specialist in Surveillance & Computer Spyware Detection PO Box 508 Southampton, MA 01073 Phone (413) 527-6990 www.InterTraceInvestigations.com MA License # P-1029 "CONFIDENTIALITY NOTICE: This e-mail transmission and any document that may be accompanying this e-mail transmission may contain confidential and proprietary information intended only for use by the recipient named and is covered by the Electronic Communications and Privacy Act, 18 USC Sections 2510-2521. If you are not the intended recipient or the employee or agency authorized to deliver this e-mail to the intended recipient, you are hereby notified that any unauthorized disclosure, copying, distribution, or action taken in reliance on this e-mail is strictly prohibited. If you received this e-mail in error, Please delete all copies of this e-mail from your hard drive, all storage devices and destroy all hard copies. Please notify the person named above immediately by e-mail or telephone." [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10885 From: Tim Johnson Date: Tue Feb 1, 2005 1:33pm Subject: Re: "Breaking-In" to technical security For the most part, you are correct. Most of the people with the greatest level of experience in the TSCM field did come from the government sector, either military or one of the alphabet agencies. That's not to say that all of them did or that those who did come from the government are any better qualified than many of the PI's doing the work. If you are interested in this area, you should first try to attach yourself with someone who is doing the work in your area....explain to them you are wanting to learn and that you intend taking the appropriate courses as they become available. To determine the good ones, ask around on this group or of others presently doing the service. Plan on a long hard road trying to break into the field unless you have a pretty substantial checkbook that can carry you while you learn and but the appropriate equipment. I'd strongly suggest you wait to buy equipment until you have a bit of experience behind you as what is good for one person may not be the cats meow for another. With that said, good luck in your endeavors. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10886 From: Riskbiz Date: Tue Feb 1, 2005 8:32pm Subject: RE: "Sound of Voices" ?????? You can also find this info on www.IWearTinFoil.com -----Original Message----- From: LD C [mailto:ldc_esq@l...] Sent: Monday, January 31, 2005 8:09 AM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] "Sound of Voices" ?????? Smoking bans are an example of civil liberty being taken away. To relate to TSCM and microphones in traffic lights; the following may be of interest. Taken from www.epcglobalinc.com RFID (radio frequency identification) is a technology that has existed for decades. At a simple level, it is a technology that involves tags that emit radio signals and devices called readers that pick up the signal. The Electronic Product CodeT (EPC) is the next generation of product identification. The EPC is a simple, compact "license plate" that uniquely identifies objects (items, cases, pallets, locations, etc.) in the supply chain. The EPC is built around a basic hierarchical idea that can be used to express a wide variety of different, existing numbering systems, like the EAN.UCC System Keys, UID, VIN, and other numbering systems. Like many current numbering schemes used in commerce, the EPC is divided into numbers that identify the manufacturer and product type. But, the EPC uses an extra set of digits, a serial number, to identify unique items. An EPC number contains: 1. Header, which identifies the length, type, structure, version and generation of EPC 2. Manager Number, which identifies the company or company entity 3. Object Class, similar to a stock keeping unit or SKU 4. Serial Number, which is the specific instance of the Object Class being tagged Additional fields may also be used to observe movement. Mate this technology with the "manditory identification that citizens must have with them at all times." So now we have the basic fountation in place. ----- Original Message ----- From: Riskbiz To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] "Sound of Voices" ?????? Date: Fri, 28 Jan 2 005 11:23:06 +0200 > > > Tim, > > Get used to it. The list is apparently populated to a large degree by > people who wear cranial tin foil most of the time. > > You'll see a real TSCM related piece on about a 1:20 ratio (that's > what it has been in my short time on the list). > > But it's still a great place to hear extreme views on everything from > smoking to big brother to politics...and get a laugh a couple of times > a day. > > DK > > -----Original Message----- > From: Tim Johnson [mailto:dbugman@d...] > Sent: Thursday, January 27, 2005 7:14 PM > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] "Sound of Voices" ?????? > > > > I've only been on the list a day or so, but so far nothing has been > posted relating to TSCM. I have a problem relating smoking bans to > TSCM. Then again, I'm a former smoker and don't miss the smell when > I'm eating, walking up to a building or actually in an office. > > tim > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it private is ours. > > Georgia License # PDC 002074 Technical Security Consultants Inc. > MemberINTELNET > Espionage Research Institute > Association of Former Office of Special Investigations Special > Agents-Technical Agent http://www.dbugman.com > > This e-mail is intended for the use of the addressee(s) only and may > contain privileged confidential, or proprietary information that is > exempt from disclosure under law. If you have received this message in > error, please inform us promptly by reply e-mail, then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of the sender, or > anything else in this message is intended to constitute an electronic > signature for purposes of the Uniform Electronic Transactions Act or > the Electronic Signatures in Global and National Commerce Act > (E-Sign) unless a specific statement to the contrary is included in > this message. > > > [Non-text portions of this message have been removed] > > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> In low income neighborhoods, 84% do not own computers. > At Network for Good, help bridge the Digital Divide! > http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~- > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, the > hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS Yahoo! Groups > Links > > > > -- _______________________________________________ Find what you are looking for with the Lycos Yellow Pages http://r.lycos.com/r/yp_emailfooter/http://yellowpages.lycos.com/default.asp ?SRC=lycos10 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10887 From: delta Date: Wed Feb 2, 2005 2:45am Subject: opto interceptor hello to the group a friend of mine give me an optoelectronics interceptor to play with it during a sweep i was surprise about the possibilities not so bad to have a fast view of the spectrum this device is able to lock on the strongest signal between 30mhz to 2 ghz the audio is very good also but of course it is just a toy , not a professionnal model to sweep david from paris 10888 From: A Grudko Date: Wed Feb 2, 2005 6:21am Subject: RE: "Sound of Voices" ?????? -----Original Message----- From: LD C [mailto:ldc_esq@l...] > Where does one find a remote "DNA Tracker"? I don't think there is such an item yet, except at the top of the 'Technology Wish-List' of all the usual 3 letter agencies A Grudko ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.4 - Release Date: 2005/02/01 [Non-text portions of this message have been removed] 10889 From: contranl Date: Wed Feb 2, 2005 9:05am Subject: Opto-scout/explorer vs BC246T ( nearfield receivers ) . Nearfield receivers could be of (limited) use in countersurveillance,allthough they do have a lot of shortcomings they are nice toys to play with while on the move. There's a new scanner by Bearcat called BC246T (3 months out now) wich contains a nearfield receiver mode..called "close call" Here's a user with a first impression: http://www.scanmassachusetts.net/misc/bc246t.htm And here's a Yahoogroup for this new scanner http://groups.yahoo.com/group/BC246T/ Tetrascanner 10890 From: joe joe Date: Wed Feb 2, 2005 6:33am Subject: Re: "Breaking-In" to technical security yes Tim while i agree with most of what you wrote I do NOT believe that PI's would be a good place to learn..their business is to investigate things like whos' cheating on who or nanny's which is where most of their business comes from, he should find a person who does tscm and security work or goto a few schools and learn the proper procedures to do a tscm sweep...I say this because as I am sure you know many PI's pretend to do the work(mostly with sub standard equipment) and then place their own bugs to make themselves look better..not a good way to learn the trade.. --- Tim Johnson wrote: > > For the most part, you are correct. Most of the > people with the > greatest level of experience in the TSCM field did > come from the > government sector, either military or one of the > alphabet agencies. > That's not to say that all of them did or that those > who did come > from the government are any better qualified than > many of the PI's > doing the work. > > If you are interested in this area, you should first > try to attach > yourself with someone who is doing the work in your > area....explain > to them you are wanting to learn and that you intend > taking the > appropriate courses as they become available. To > determine the good > ones, ask around on this group or of others > presently doing the > service. > > Plan on a long hard road trying to break into the > field unless you > have a pretty substantial checkbook that can carry > you while you > learn and but the appropriate equipment. I'd > strongly suggest you > wait to buy equipment until you have a bit of > experience behind you > as what is good for one person may not be the cats > meow for another. > > With that said, good luck in your endeavors. > > tim > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > MemberINTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > [Non-text portions of this message have been > removed] > > > > > __________________________________ Do you Yahoo!? Meet the all-new My Yahoo! - Try it today! http://my.yahoo.com From: James M. Atkinson Date: Tue Jan 29, 2002 8:16am Subject: Re: 900 - 2.6 Yagi At 5:51 PM -0600 1/28/02, brnsike@s... wrote: >I may be behind the curve on this one, but it may be of interest to >someone. I picked up a small Yagi log periodic antenna (on a circuit >board) over the net. Cut for 900-2.6. Thing's about 8" square. I put >a rubber pistol grip (for SLR camera) on it and connected it to my Tek >492. Put a small 9v 2.4 Ghz transmitter on the other side of the house >and tried it out. Had to attenuate the signal down quite a lot, but >finally got good, usable signal. Was amazed at the sensitivity. Was >like moving a compass around true north. I literally could draw a >straight line from the tip of the antenna to the transmitter. The >slightest movement away from the transmitter would effect the amplitude, >whether left, right, up or down. Like aiming a pistol. Very impressed >(of course I'm still impressed with hard drives over 20 meg's). Don't >want to make this a commercial message, but anyone interested in the >page cite, let me know. Cost a princely $40. > >Martin Brown >Brown & Sikes, Inc. >Dallas Martin, I suspect that you are referring to the Ramsey antenna, and if so be careful using the thing above about 1.5 GHz.. Ramsey also has a pre-amplified Discone the list may find of interest, but keep in mind it's designed for hobby use. You may find it helpful to remove the BNC connector and cable provided (they are crap), and replace it with a SMA that goes right into an LNA and then into your 492. If you like the performance of the Ramsey unit, try to lay your hands on a equiangular antenna to check out, and a spiral log periodic. Attached a decent LNA (using only SMA connectors) and I promise you will be stunned with the performance. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4684 From: James M. Atkinson Date: Tue Jan 29, 2002 8:50am Subject: Do you have E-mail address? An unemployed man goes to apply for a job with Microsoft as a janitor. The manager there arranges for him to take an aptitude test (Section: Floors, sweeping and cleaning). After the test, the manager says, "You will be employed at minimum wage, $5.15 an hour. Let me have your e-mail address, so that I can send you a form to complete and tell you where to report for work on your first day. Taken aback, the man protests that he has neither a computer nor an e-mail address. To this the MS manager replies, "Well, then, that means that you virtually don't exist and can therefore hardly expect to be employed. Stunned, the man leaves. Not knowing where to turn and having only $10 in his wallet, he decides to buy a 25 LB flat of tomatoes at the supermarket. Within less than 2 hours, he sells all the tomatoes individually at 100% profit. Repeating the process several times more that day, he ends up with almost $100 before going to sleep that night. And thus it dawns on him that he could quite easily make a living selling tomatoes. Getting up early every day and going to bed late, he multiplies his profits quickly. After a short time he acquires a cart to transport several dozen boxes of tomatoes, only to have to trade it in again so that he can buy a pickup truck to support his expanding business. By the end of the second year, he is the owner of a fleet of pickup trucks and manages a staff of a hundred former unemployed people, all selling tomatoes. Planning for the future of his wife and children, he decides to buy some life insurance. Consulting with an insurance adviser, he picks an insurance plan to fit his new circumstances. At the end of the telephone conversation, the adviser asks him for his e-mail address in order to send the final documents electronically. When the man replies that he has no e-mail, the adviser is stunned, "What, you don't have e-mail? How on earth have you managed to amass such wealth without the Internet, e-mail and e-commerce? Just imagine where you would be now, if you had been connected to the Internet from the very start!" After a moment of thought, the tomato millionaire replied, "Why, of course! I would be a floor cleaner at Microsoft!" Moral of this story 1.The Internet, e-mail and e-commerce do not need to rule your life. 2.If you don't have e-mail, but work hard, you can still become a millionaire. 3.Since you got this story via e-mail, you're probably closer to becoming a janitor than you are to becoming a millionaire. 4.If you do have a computer and e-mail, you have already been taken to the cleaners by Microsoft. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4685 From: Matthew Paulsen Date: Tue Jan 29, 2002 10:17am Subject: RE: Re: Bug Photos Wanted Paul you meant schematics / drawings, right? -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Tuesday, January 29, 2002 5:40 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Bug Photos Wanted Once upon a midnight dreary, Paolo Sfriso pondered, weak and weary: > I am developing a website www.microspia.org (microspia is the > Italian word for bug, literally micro-spy) where I would like to > place a photographic display of found bugs of any sort: from the > radio-shack viarity to the more esoteric kind. > I would be extremely gratefull if fellow listmembers could send > me a couple of JPEG photos of traced or experimental bugs with a > brief description. Hi Paul, Since mere possession of audio and certain other types of surveillance devices in the U.S. is a felony, you're obviously asking for these inputs from our members outside the U.S. No one in the US. would want to admit to committing a felony by acknowledging possession of sensitive devices. 18USC 2511 and 2512 (Title 18 is the Criminal Code in the U.S., and section 2511 and 2512 specifically discusses possession, advertising of, use by, etc. surveillance devices by other than government agencies or persons directly under contract to supply these devices to the government) is the applicable section of code. Practically anyone involved in TSCM or surveillance in the U.S. knows this section of code by heart, since we live and quite literally can rot in jail by it. Jim Atkinson, the owner and operator of this list, maintains a copy of this information on his website here: http://www.tscm.com/USC18_119.html Perhaps list members from countries where the law is not so restrictive can assist you. You also may be able, with permission, to copy certain photos from various websites showing pictures of these devices. Be aware, however, that I have never seen a photo on a website of a truly professional surveillance device. They all are low end, homemade type devices, or the mass produced garbage from the Pacific Rim. Any images shown on U.S. websites either are illegal or are of deactivated devices (usually mockups). Good luck with your site. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4686 From: Shawn Hughes Date: Tue Jan 29, 2002 10:33am Subject: Re: Digest Number 843 At 04:06 AM 1/29/02 , you wrote: >......three to five Chinese men in plain clothes would board it, taking a >briefcase-sized black box with them. They finished 20 to 30 minutes later. Ok, I might just be an idiot cop, but if this intel is correct, they basically swept an entire aircraft with a scanlock or OSCOR (or worse). Doing bomb training, I've gotten to pop panels off of commercial aircraft. You literally could hide gear the size of a Volkswagen in there and not find it for a day. I mean, theres literally MILES of wiring and piping. You can't disassemble that stuff to even peek into junction boxes(so says the FAA) unless you are certified. We were told we (EOD) could in an emergency, but that the planes airworthiness cert would be invalidated. So, say one of you guys were the team leader on that project. How would you keep a high probability of sureness that the aircraft wasn't compromised? Shawn 4687 From: Shawn Hughes Date: Tue Jan 29, 2002 10:39am Subject: And you thought the static hazard was bad! >======================================= >Chips Pack Charge - Explosive Possibilities for Silicon > > >Among the most promising applications of the reaction, researcher Sailor >said, is propulsion of dust-sized >robots and devices built on chips. > > >Thanks to a classic case of accidental discovery, researchers at the >University of California, San Diego >(UCSD) have found that silicon -- the material used to make computer chips >-- has explosive properties >when combined with the right elements and ignited by an electrical charge. > > >This finding is the root of a running joke among researchers: "This is going >to make your cell phone blow >up," head researcher Michael Sailor told NewsFactor. > > >Sailor, a UCSD professor of chemistry and biochemistry in the school's >material science program, said real >applications of the ability to blow up a chip include destruction of >military weapons that fall into enemy >hands and elimination of sensitive data and access to it by programming >chips to self-destruct. > > >However, Sailor said "more relevant" applications include the propulsion of >tiny chips, such as micro- >electrical mechanical systems (MEMS), using miniature silicon explosives and >the ability to carry a small >flame test for sensing chemicals, which now requires a laboratory. > > >High-Tech Gunpowder > > >The researchers at the Sailor Group, who provided technical details of >futuristic applications in the January >issue of German scientific journal "Advanced Materials," discovered >accidentally about a year ago that >silicon had explosive properties similar to those of gunpowder -- a mix of >carbon, potassium nitrate and >sulfur, Sailor said. > > >When researcher Frederic Mikulec tried to cleave a silicon wafer with a >diamond scribe, it blew up in his >face, as the story goes. > > >"It was a little pop. It was just a small explosion, like a cap going off in >a cap gun," Sailor said. "We >worked with this stuff for 10 years, and it never blew up." > > >Sailor said the discovery does not mean that computer chips used today could >blow up. He added that the >reaction only works with super-fine silicon that is machined down to very >small particles through an >electrochemical process. > > >Fueling UAVs > > >The researchers found that combining a very fine form of silicon called >"nanocrystals" with gadolinium >nitrate produced the small, gunpowder-like explosion. > > >Among the most promising applications of the reaction, according to Sailor, >is propulsion of dust-sized >robots and devices built on chips. > > >"We can cause chips to fly around the room and make grasshoppers out of >them," he said, referring to such >uses as sniffing out nuclear weapons or locating and checking shipments. > > >Sailor said silicon explosions also could be used to fuel "micro unmanned >aerial vehicles," which are robots >the size of mosquitoes. > > >Hot Handheld > > >Another prime application of the explosive silicon process is a portable >device that could perform rapid >chemical analysis of toxic metals and other elements in the field. Such a >device would be ideal for >investigation of industrial accidents, according to researchers. > > >Sailor said the silicon- and gadolinium-based explosive burns extremely hot >and is devoid of chemical >impurities, making it ideal for a portable flame test, which is similar to a >litmus test. > > >"It's a hot, portable flame that can be placed on a chip," Sailor said. > > >Self-Destruct Silicon > > >Still, the most intriguing aspect of the research is the ability to blow up >the same material that powers >computers and other devices using a small electrical charge. > > >"Now, you can program a chip to self-destruct," Sailor said. "There's no >firing pin, just a little current that >runs through the part of the chip that has the explosive in it." > > >Sailor, who said researchers tested the electronic ignition with a 9-volt >battery, told NewsFactor that he is >amazed by the interest from people and businesses, including cell phone >makers and companies involved in >data security. However, the UCSD professor said he doubts that the >researchers' joke ever will become a >reality. > > >"I just don't see people putting it in cell phones to make them blow up," he >said. 4688 From: James M. Atkinson Date: Tue Jan 29, 2002 0:03pm Subject: Re: Digest Number 843 At 11:33 AM -0500 1/29/02, Shawn Hughes wrote: >At 04:06 AM 1/29/02 , you wrote: > > >>......three to five Chinese men in plain clothes would board it, taking a >>briefcase-sized black box with them. They finished 20 to 30 minutes later. > > >Ok, I might just be an idiot cop, but if this intel is correct, they >basically swept an entire aircraft with a scanlock or OSCOR (or worse). > >Doing bomb training, I've gotten to pop panels off of commercial aircraft. >You literally could hide gear the size of a Volkswagen in there and not >find it for a day. > >I mean, theres literally MILES of wiring and piping. You can't disassemble >that stuff to even peek into junction boxes(so says the FAA) unless you are >certified. We were told we (EOD) could in an emergency, but that the planes >airworthiness cert would be invalidated. > > >So, say one of you guys were the team leader on that project. How would you >keep a high probability of sureness that the aircraft wasn't compromised? > >Shawn Create a sterile isolation zone 1000 feet around the hangar in all directions, and zone it off with TWO 12 foot high fences topped with razor wire. Between the two fences have a "no man zone" with multiple layers of razor wire. All of the above will of course be alarmed, resulting in an immediate response of armed security personnel. You will need a "central control" person, and four teams of two people, which means you have at least five people on duty 7/24. There will be an area outside the isolation fence of at least 1000-1500 additional feet where all foliage has been cut back, and all buildings are under the control of the security detail (or can be 100% vouched for). the goal is to totally control who has access the the area just outside the isolation zone The area between the isolation fence and the hangar where the plane is kept will be extremely well lit 7/24, and ancillary lighting will be used to illuminate the area outside the fence as required by the CCTV system being used. A primary CCTV system will provide 100% coverage of all areas outside the isolation fence out to 1000 feet. The cameras will be INSIDE the fence, and controllable (and powered) the primary security station inside the fence. This is basically to documents anybody approaching the isolation fence from the outside world. Next we install a ring of camera above the isolation area that peer down into the "no-mans land" but also including the area about 10-15 on each side of the fence (these go to the poles which provide lighting the area outside of the isolation zone. Inside the isolation zone we install a series of thousands of overt and covert, live and dummy EB-141 with a magnum charges to mechanically raise an alarm if any of the electrician systems are compromised or someone covertly penetrates the fence line. This "alarm field" should begin about 15-20 foot inside the isolation zone and be about 300 foot wide. However, the width of the alarm ring should not exceed one third the range of the security responses weapons range with scoped carbines (ie: M-16, MP-5, etc). Note that there is a "travel ring" on both sides of the isolation fence for maintenance and response purposes. Inside the "alarm ring" there will a single wall or embankment to keep personal or equipment from straying into the alarm zone, but also to provide moderate cover in the event of an forcible engagement (Jersey barriers work well). This should provide a 500-700 foot sterile zone around the hanger, with a minimum of 5 people on duty at any given time just to protect the outer perimeter. The sterile zone then has an entirely separate security detail which are on duty only when there is some kind of activity in, on, or around the hangar. This security force greets people arriving, clears them, and escorts them though the sally ports and into the sterile zone (two escorts per person, or piece of equipment). A third group of security personnel will be responsible for pre-clearing all visitors (at least 2000 feet away from the hanger), and will escort the "initially cleared" people to a secondary area where they will be separated from all personal effects, tools, clothes electronics, etc and given a thin cotton bunny suit to change in to change into (for modesty). Visitor will then be scanned for metal, RF, or any chemical residue, and if necessary searched by hand (and allowed to shower). Only those personal effects absolutely required inside the sterile zone will be returned (ie: clothes, shoes, etc). Ideally the security force should provide a brightly covered uniform, with each color changing on a random basis. Inside the hangar there will be the "hangar security detail" (yes a fourth group) who solely are responsible for protecting the area starting at the hangar doors/walls and moving inward to the actual skin of the aircraft, but not the aircraft itself. They ensure that nothing and no one comes into the hangar unless it is absolutely required, carefully inspected, and its movements carefully documented. The aircraft itself must have it own protective detail (yep, a fifth group of people), and every person working on the airplane will have two observers (security people) with them at all times who will maintain positive eye contact on the persons hands at all times (basically one security guy watches the hands, and the other supervises and acts as relief). This makes for five levels of hard security, and at least three inspections of everything that can get within 1000 feet of the hangar. Every inch of the protected area is heavily covered with video cameras, and the plane itself contains overt and covert video (installed by and controlled by the security detail). Each security detail (all five+ of them) has its own command center, it's own shift leader, and procedures which overlap. Basically, the outer perimeter folks, protect the inner folks, which protect the hangar folks, and so on. Ensure the security force is well paid, well disciplined, well lead, and well equipped, and you will have no problems. On a related note; quarter the security force in dorms just outside the facility (but within 2000 feet, and do not allow then to leave the compound for short times except with two minders/escorts per person. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4689 From: Fernando Martins Date: Tue Jan 29, 2002 8:37am Subject: RE: Bug Photos Wanted Hi2all Paolo, you just have to go to www.google.com and in the 'images' area play a little with words, like spy or bug. Here are some examples: http://images.google.com/images?q=micro-spy http://images.google.com/images?q=bug http://images.google.com/images?hl=pt&q=micro-bug http://images.google.com/images?hl=pt&q=spybug Be aware of copywrite rights and other legal stuff related to this pictures. I'm not sending any descriptions as you asked, but you can search for them on the related sites. I didn't make those bugs nor have any of them. Sometimes in some electronics magazines there may be some pictures ... I'm only remembering Elektor (uk) or Electronique Pratique (fr), that I used to buy some years ago. Simple homemade stuff like a microphone inside a pen. And since this is my first mail to the list, I want to congratulate people for some very interesting mails I already read here, and say that I work as security consultant (phisycal, electronic and IT), and my interest here is to learn solutions for protection against intrusion of facilities and personal privacy. I'm more from the IT area, I'm upgrading my knowledge about electronics and specially protection tools and techniques, to what I'm a newbie. In the Army I had some experience with telephony (old analogic PBX stuff) and radio (Racal, PRC/425, AVP-1, stuff like that) but that was long time ago. Any other magazine like Signal from AFCEA (www.afcea.org/signal) that somebody here can advice? I had access to this one (on paper version) because I worked in a member company, but now i'm not there anymore and just can follow the web version. Any other tips, URL's for reference and lecture are wellcome. Regards FM ª -----Original Message----- ª From: Paolo Sfriso [mailto:paulsfriso@t...] ª Sent: terÁa-feira, 29 de Janeiro de 2002 9:19 ª To: TSCM-L@yahoogroups.com ª Subject: [TSCM-L] Bug Photos Wanted ª ª ª ª Dear Colleagues. ª ª I am developing a website www.microspia.org (microspia is the ª Italian word for bug, literally micro-spy) where I would like ª to place a photographic display of found bugs of any sort: ª from the radio-shack viarity to the more esoteric kind. ª ª I would be extremely gratefull if fellow listmembers could ª send me a couple of JPEG photos of traced or experimental ª bugs with a brief description. ª ª The site will be in Italian and proper credit will be given ª to all contributors. ª ª Thanks. ª ª Paul Sfriso ª Director ª GRUPPO S.I.T. ª Security, Investigations & Technology ª Quarto d'Altino, Venice ª ITALY ª ª phone +39 0422 828517 ª fax +39 0422 823224 ª 24hr GSM cellphone +39 335 5257308 ª www.grupposit.com ª paulsfriso@t... ª ª ª ª ª ª ------------------------ Yahoo! Groups Sponsor ª ---------------------~--> Sponsored by VeriSign - The Value ª of Trust Pinpoint the right security solution for your ª company - FREE Guide from industry leader VeriSign gives you ª all the facts. ª http://us.click.yahoo.com/pCuuSA/WdiDAA/yigFAAª /kgFolB/TM ª ª ª -------------------------------------------------------------- ª -------~-> ª ª ======================================================== ª TSCM-L Technical Security Mailing List ª "In a multitude of counselors there is strength" ª ª To subscribe to the TSCM-L mailing list visit: ª http://www.yahoogroups.com/community/TSCM-L ª ª It is by caffeine alone I set my mind in motion. ª It is by the juice of Star Bucks that thoughts acquire ª speed, the hands acquire shaking, the shaking is a warning. ª It is by caffeine alone I set my mind in motion. ª =================================================== TSKS ª ª Your use of Yahoo! Groups is subject to ª http://docs.yahoo.com/info/terms/ ª ª ª 4690 From: kirk Date: Tue Jan 29, 2002 11:52am Subject: Re: Bug Photos Wanted I understood Pauls request for photos of found bugs, meaning just that, when you "find a bug on sweep" you usually photograph it in place for documentation purposes. Nothing he mentioned was related to personal possesion of illegal devices or schematics. Or maybe I'm just missing something here? Good luck Paul, I'll see what I can dig up for you. Kirk ---------- Original Message ---------------------------------- From: "Paolo Sfriso" Date: Tue, 29 Jan 2002 10:18:56 +0100 > >Dear Colleagues. > >I am developing a website www.microspia.org (microspia is the Italian word >for bug, literally micro-spy) where I would like to place a photographic >display of found bugs of any sort: from the radio-shack viarity to the more >esoteric kind. > >I would be extremely gratefull if fellow listmembers could send me a couple >of JPEG photos of traced or experimental bugs with a brief description. > >The site will be in Italian and proper credit will be given to all >contributors. > >Thanks. > >Paul Sfriso >Director >GRUPPO S.I.T. >Security, Investigations & Technology >Quarto d'Altino, Venice >ITALY > >phone +39 0422 828517 >fax +39 0422 823224 >24hr GSM cellphone +39 335 5257308 >www.grupposit.com >paulsfriso@t... > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > -- Kirk Adirim President TACTRONIX Tactical Electronics for Critical Missions 8497 Sunset Boulevard #28 West Hollywood, CA 90069 USA E: kirk@t... T: 323-650-2880 F: 310-388-5886 W: www.tactronix.com -- 4691 From: Aimee Farr Date: Tue Jan 29, 2002 7:16pm Subject: RE: Re: Bug Photos Wanted > No one in the US. would want to admit to committing a felony by > acknowledging possession of sensitive devices. 18USC 2511 and > 2512 (Title 18 is the Criminal Code in the U.S., and section > 2511 and 2512 specifically discusses possession, advertising of, > use by, etc. surveillance devices by other than government > agencies or persons directly under contract to supply these > devices to the government) is the applicable section of code. > Practically anyone involved in TSCM or surveillance in the U.S. > knows this section of code by heart, since we live and quite > literally can rot in jail by it. I have a good deal of the congressional record(s). I don't think congress contemplated your services, or this environment. As proposed, Title III was seen as a law enforcement issue. I know some here testified at the '75 hearings, but I think this issue needs to be revisited. Putting security professionals at cross-purposes or conflicts with both their clients and law enforcement/agencies is not in our best interests. I would think an exception could be structured so as to be in the best interests of all stakeholders... What is the problem? ~Aimee 4692 From: Steve Uhrig Date: Tue Jan 29, 2002 7:50pm Subject: Re: Bug Photos Wanted Once upon a midnight dreary, Aimee Farr pondered, weak and weary: > As proposed, Title III was seen as a law enforcement issue. I > know some here testified at the '75 hearings, but I think this > issue needs to be revisited. Putting security professionals at > cross-purposes or conflicts with both their clients and law > enforcement/agencies is not in our best interests. > I would think an exception could be structured so as to be in > the best interests of all stakeholders... What is the problem? The problem is 18USC 2511 and 2512 specifically prohibit possession, use, advertising of, etc, of electronic surveillance equipment except by government agencies or those under contract with a government agency to supply such equipment. And people are violating those laws. That is the problem. Unless you propose to change them by jury nullification, you know the proper way for the proper branch of government to change them. They're not going to be changed at the judicial level, and that is the point where most violators will bump into the law. The stuff has no place in the hands of lids, kids or space cadets, many of whom already think the law does not apply to them as evidenced by the numerous spy shops advertising illegal products. The spy shops ARE NOT under contract to supply the stuff to law enforcement merely by including some useless disclaimer on their website. 'Under contract' means having a purchase order in house already to supply the devices, before they even are obtained. That virtually never is the case with the spy shops, although they all claim to 'sell to police'. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4693 From: Matthew Paulsen Date: Tue Jan 29, 2002 8:01pm Subject: RE: Bug Photos Wanted Just try lookup at www.ditto.com FYI to all I've gotten 2 viruses on this list since I started getting messages here. If you don't have an antivirus scanner, get one. Here's one off my site that is free from Computer Associates, Inc. http://mpconsulting.home.attbi.com/prods/IPESetup.exe Hopefully I don't have a download restriction. We'll see. Matt -----Original Message----- From: Fernando Martins [mailto:fernando.martins@e...] Sent: Tuesday, January 29, 2002 6:37 AM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Bug Photos Wanted Hi2all Paolo, you just have to go to www.google.com and in the 'images' area play a little with words, like spy or bug. Here are some examples: http://images.google.com/images?q=micro-spy http://images.google.com/images?q=bug http://images.google.com/images?hl=pt&q=micro-bug http://images.google.com/images?hl=pt&q=spybug Be aware of copywrite rights and other legal stuff related to this pictures. I'm not sending any descriptions as you asked, but you can search for them on the related sites. I didn't make those bugs nor have any of them. Sometimes in some electronics magazines there may be some pictures ... I'm only remembering Elektor (uk) or Electronique Pratique (fr), that I used to buy some years ago. Simple homemade stuff like a microphone inside a pen. And since this is my first mail to the list, I want to congratulate people for some very interesting mails I already read here, and say that I work as security consultant (phisycal, electronic and IT), and my interest here is to learn solutions for protection against intrusion of facilities and personal privacy. I'm more from the IT area, I'm upgrading my knowledge about electronics and specially protection tools and techniques, to what I'm a newbie. In the Army I had some experience with telephony (old analogic PBX stuff) and radio (Racal, PRC/425, AVP-1, stuff like that) but that was long time ago. Any other magazine like Signal from AFCEA (www.afcea.org/signal) that somebody here can advice? I had access to this one (on paper version) because I worked in a member company, but now i'm not there anymore and just can follow the web version. Any other tips, URL's for reference and lecture are wellcome. Regards FM ª -----Original Message----- ª From: Paolo Sfriso [mailto:paulsfriso@t...] ª Sent: terÁa-feira, 29 de Janeiro de 2002 9:19 ª To: TSCM-L@yahoogroups.com ª Subject: [TSCM-L] Bug Photos Wanted ª ª ª ª Dear Colleagues. ª ª I am developing a website www.microspia.org (microspia is the ª Italian word for bug, literally micro-spy) where I would like ª to place a photographic display of found bugs of any sort: ª from the radio-shack viarity to the more esoteric kind. ª ª I would be extremely gratefull if fellow listmembers could ª send me a couple of JPEG photos of traced or experimental ª bugs with a brief description. ª ª The site will be in Italian and proper credit will be given ª to all contributors. ª ª Thanks. ª ª Paul Sfriso ª Director ª GRUPPO S.I.T. ª Security, Investigations & Technology ª Quarto d'Altino, Venice ª ITALY ª ª phone +39 0422 828517 ª fax +39 0422 823224 ª 24hr GSM cellphone +39 335 5257308 ª www.grupposit.com ª paulsfriso@t... ª ª ª ª ª ª ------------------------ Yahoo! Groups Sponsor ª ---------------------~--> Sponsored by VeriSign - The Value ª of Trust Pinpoint the right security solution for your ª company - FREE Guide from industry leader VeriSign gives you ª all the facts. ª http://us.click.yahoo.com/pCuuSA/WdiDAA/yigFAAª /kgFolB/TM ª ª ª -------------------------------------------------------------- ª -------~-> ª ª ======================================================== ª TSCM-L Technical Security Mailing List ª "In a multitude of counselors there is strength" ª ª To subscribe to the TSCM-L mailing list visit: ª http://www.yahoogroups.com/community/TSCM-L ª ª It is by caffeine alone I set my mind in motion. ª It is by the juice of Star Bucks that thoughts acquire ª speed, the hands acquire shaking, the shaking is a warning. ª It is by caffeine alone I set my mind in motion. ª =================================================== TSKS ª ª Your use of Yahoo! Groups is subject to ª http://docs.yahoo.com/info/terms/ ª ª ª Yahoo! Groups Sponsor ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4694 From: Aimee Farr Date: Tue Jan 29, 2002 8:07pm Subject: RE: Re: Bug Photos Wanted Mr. Uhrig said: > The problem is 18USC 2511 and 2512 specifically prohibit > possession, use, advertising of, etc, of electronic surveillance > equipment except by government agencies or those under contract > with a government agency to supply such equipment. > > And people are violating those laws. > > That is the problem. Doh! *laughter* I mean, is there not an exception which could be carved to better service the interests of all stakeholders? Is there not a sphere of legitimate research, investigation, etc. that needs to be enabled? > Unless you propose to change them by jury nullification, you > know the proper way for the proper branch of government to > change them. They're not going to be changed at the judicial > level, and that is the point where most violators will bump into > the law. I get that. > The stuff has no place in the hands of lids, kids or space > cadets, many of whom already think the law does not apply to > them Well, officially, "space cadets" might lie outside of our jurisdiction. > as evidenced by the numerous spy shops advertising illegal > products. The spy shops ARE NOT under contract to supply the > stuff to law enforcement merely by including some useless > disclaimer on their website. 'Under contract' means having a > purchase order in house already to supply the devices, before > they even are obtained. That virtually never is the case with > the spy shops, although they all claim to 'sell to police'. I know, Steve. (I realize you are trying to be educational for everybody, I'm not dissin' ya.) I'm not proposing a blanket loophole, but this seems stifling for everybody. I'm just asking where there are conflicts, if creative means couldn't reconcile them. The protective interest in Title III for the private sector was privacy, but truly it was a law enforcement enabler -- private sector interests have not been wholly addressed. Inhibiting your services does not service that interest. I also wonder if -- given the way things work -- we could encourage better information sharing and enable enforcement through legislative changes. I'm just trying to ponder on some possible answers. I won't do it again. ;) ~Aimee 4695 From: Aimee Farr Date: Tue Jan 29, 2002 10:03pm Subject: Surveillactivism [Due to my research interests, I stumbled across this "list" on Amazon.com. This guy might have placed equal emphasis on "gear," if Amazon had more offerings. I thought this was insightful in terms of how surveillance has mainstreamed into the activist toolkit. ~Aimee] Johnny Crow's Listmania Lists create your own list Books and Products for the Revolutionary & Activist at heart by Johnny Crow, Individualist & Revolutionary A People's History of the United States : 1492 to Present by Howard Zinn List Price: $18.00 Our Price: $12.60 You Save: $5.40 (30%) Usually ships in 24 hours Johnny Crow's comments: One of the Best and most Informative books on American History. Must Read ---------------------------------------------------------------------------- ---- The Activist's Handbook: A Primer Updated Edition with a New Preface by Randy Shaw List Price: $18.95 Our Price: $13.26 You Save: $5.69 (30%) Usually ships in 24 hours Johnny Crow's comments: Insightful book, a must read for all who wish to do more! ---------------------------------------------------------------------------- ---- Organizing for Social Change : Midwest Academy : Manual for Activists by Kim Bobo, et al List Price: $23.95 Our Price: $16.76 You Save: $7.19 (30%) Usually ships in 2 to 3 days Johnny Crow's comments: Want to organize a socail change, or become involved in activism, this is for you. ---------------------------------------------------------------------------- ---- Minolta Maxxum STsi QD Panorama 35mm SLR Camera with 35-80mm,70-210mm Silver Zoom Lens List Price: $499.99 Our Price: $399.99 Usually ships in 24 hours Johnny Crow's comments: Always Needed to Capture those moments for history, and lend credit to your storys. ---------------------------------------------------------------------------- ---- Night Owl Camera Adapter Our Price: $39.99 Limited Availability Johnny Crow's comments: Use this to take night time photos, for all those "special" missions in the name of activism ---------------------------------------------------------------------------- ---- Manufacturing Consent : The Political Economy of the Mass Media by Edward S. Herman, Noam Chomsky List Price: $18.95 Our Price: $18.95 Usually ships in 24 hours Johnny Crow's comments: Must Read. ---------------------------------------------------------------------------- ---- Guerrilla Warfare : Che Guevara by Ernesto Guevara, Marc Becker (Introduction) List Price: $8.89 Our Price: $8.89 Usually ships in 24 hours Johnny Crow's comments: Absolute must read for those who wish to understand the truth about Revoltions, and Guerilla Activism 4696 From: enemyatthegate007 Date: Tue Jan 29, 2002 8:53pm Subject: history channel i know i im very very unknowledgable in this field and im trying to learn but im watching the history channel and it about james bond gadgets.there is a spy shop on there showing his toys,hes from beverly hills.i do know there is a lot of spy scans out there.i wonder if he is bogus.they didnt say his shops name.hum i wonder. james jones EPS,CPP chief of operations www.bodyguardinc.com 4697 From: Steve Uhrig Date: Wed Jan 30, 2002 9:06am Subject: Re: Surveillactivism Once upon a midnight dreary, Aimee Farr pondered, weak and weary: > Night Owl Camera Adapter > Our Price: $39.99 > Limited Availability > Johnny Crow's comments: Use this to take night time photos, > for all those "special" missions in the name of activism This would sell more if listed together with 'The Secret Life of Walter Mitty' by James Thurber. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4698 From: DrPepper Date: Wed Jan 30, 2002 10:25am Subject: Re: Re: Bug Photos Wanted Interestingly enough, I watched the TV program "Boys Toys" on DishTV channel 120 last night, and they had a piece on Spy gear. The guy showed a "bug", and some other stuff. It was an outfit in Hollywood, somewhere, and they also provide this stuff to the movie industry as well as selling it across the counter. Ron C. ==================================== Aimee Farr wrote: > Mr. Uhrig said: > > > The problem is 18USC 2511 and 2512 specifically prohibit > > possession, use, advertising of, etc, of electronic surveillance > > equipment except by government agencies or those under contract > > with a government agency to supply such equipment. > > > > And people are violating those laws. > > > > That is the problem. > > Doh! *laughter* > > I mean, is there not an exception which could be carved to better service > the interests of all stakeholders? Is there not a sphere of legitimate > research, investigation, etc. that needs to be enabled? > > > Unless you propose to change them by jury nullification, you > > know the proper way for the proper branch of government to > > change them. They're not going to be changed at the judicial > > level, and that is the point where most violators will bump into > > the law. > > I get that. > > > The stuff has no place in the hands of lids, kids or space > > cadets, many of whom already think the law does not apply to > > them > > Well, officially, "space cadets" might lie outside of our jurisdiction. > > > as evidenced by the numerous spy shops advertising illegal > > products. The spy shops ARE NOT under contract to supply the > > stuff to law enforcement merely by including some useless > > disclaimer on their website. 'Under contract' means having a > > purchase order in house already to supply the devices, before > > they even are obtained. That virtually never is the case with > > the spy shops, although they all claim to 'sell to police'. > > I know, Steve. (I realize you are trying to be educational for everybody, > I'm not dissin' ya.) I'm not proposing a blanket loophole, but this seems > stifling for everybody. I'm just asking where there are conflicts, if > creative means couldn't reconcile them. > > The protective interest in Title III for the private sector was privacy, but > truly it was a law enforcement enabler -- private sector interests have not > been wholly addressed. Inhibiting your services does not service that > interest. I also wonder if -- given the way things work -- we could > encourage better information sharing and enable enforcement through > legislative changes. I'm just trying to ponder on some possible answers. > > I won't do it again. ;) > > ~Aimee > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 4699 From: Aimee Farr Date: Wed Jan 30, 2002 1:13pm Subject: RE: Re: Surveillactivism > Once upon a midnight dreary, Aimee Farr pondered, weak and weary: > > > Night Owl Camera Adapter > > Our Price: $39.99 > > > Limited Availability > > > Johnny Crow's comments: Use this to take night time photos, > > for all those "special" missions in the name of activism > > This would sell more if listed together with 'The Secret Life of > Walter Mitty' by James Thurber. > > Steve [referencing list on Amazon by one "Johnny Crow."] True, activists aren't sophisticated, but they are advanced in other ways (human assets, resolve, ideological ploys, walk-ins by animus, etc.). They are "noisy and networked." Political/reputational information is often given the least protection, even though it can cause the most damage. I have a "spy antagonist," I call you guys. Activist antagonists... o oppositional research/profiling o conflict management/intervention o image management o investigation o on-site security o web scouring service o bridge consultants (people who know that group and can frame the conflict) o crisis/strategic communications o legal/PR/security/management/mid- and low-tier employees.... o and so on. You attack him, you attack THEM -- triggering the activist pack mentality and escalating the conflict. A "Saul Alinsky" in 2002 is so empowered by communication and networks he can just about cut any corporate throat he wants to. You either intervene/resolve, or neutralize/deflect -- or you are looking at the cost of a political campaign relative to the stake of the company. These guys don't just use reputational attacks, they use indirect warfare and guerrilla strategies. They purposely do things to cause you to spend money on useless defensive measures. Often, there is no negotiating position -- they just hate what the company does, is, or represents. ("Extremists" are non-negotiable.) With activists, you can't judge the army by the antagonist -- or even the army -- their strength is often in their alliances. Lots of lawyers run to file on this guy or use aggressive tactics, then find out, in effect, they just PO'd 50,000 people with convergent interests. ...Whoop$. 60 Minutes won't give a damn about the tradecraft. But, yes, he looks harmless from your professional perspective, and I wouldn't be surprised if your psych was 100% on. ~Aimee 4700 From: Paolo Sfriso Date: Wed Jan 30, 2002 8:01am Subject: Re: Re: Bug Photos Wanted Hi Steve. Sorry, I didnt realise that in the U.S. mere possession of a bug is considered a criminal offence. Over here they can be legally sold and/or possessed but not used (6 months to 4 years or 1 to 5 hears of committed by a PI or a public servant without a warrant). The legal approach over here is the same one would have to a kitchen knife: it can be nothing more than a utensil or an extremely dangerous instrument. All depends on its use. Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... Hi Paul, Since mere possession of audio and certain other types of surveillance devices in the U.S. is a felony, you're obviously asking for these inputs from our members outside the U.S. No one in the US. would want to admit to committing a felony by acknowledging possession of sensitive devices. 18USC 2511 and 2512 (Title 18 is the Criminal Code in the U.S., and section 2511 and 2512 specifically discusses possession, advertising of, use by, etc. surveillance devices by other than government agencies or persons directly under contract to supply these devices to the government) is the applicable section of code. Practically anyone involved in TSCM or surveillance in the U.S. knows this section of code by heart, since we live and quite literally can rot in jail by it. Jim Atkinson, the owner and operator of this list, maintains a copy of this information on his website here: 4701 From: Johnston, Richard Date: Wed Jan 30, 2002 2:24pm Subject: RE: Re: Bug Photos Wanted Now that is a job I would like -- Designing "bugs" for the movie industry! They don't have to work (We'll dub in the sound later.) they just have to look cool. -----Original Message----- From: DrPepper [mailto:DrPepper@i...] Sent: Wednesday, January 30, 2002 9:25 AM To: aimee.farr@p... Cc: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Re: Bug Photos Wanted Interestingly enough, I watched the TV program "Boys Toys" on DishTV channel 120 last night, and they had a piece on Spy gear. The guy showed a "bug", and some other stuff. It was an outfit in Hollywood, somewhere, and they also provide this stuff to the movie industry as well as selling it across the counter. Ron C. ==================================== Aimee Farr wrote: > Mr. Uhrig said: > > > The problem is 18USC 2511 and 2512 specifically prohibit > > possession, use, advertising of, etc, of electronic surveillance > > equipment except by government agencies or those under contract > > with a government agency to supply such equipment. > > > > And people are violating those laws. > > > > That is the problem. > > Doh! *laughter* > > I mean, is there not an exception which could be carved to better service > the interests of all stakeholders? Is there not a sphere of legitimate > research, investigation, etc. that needs to be enabled? > > > Unless you propose to change them by jury nullification, you > > know the proper way for the proper branch of government to > > change them. They're not going to be changed at the judicial > > level, and that is the point where most violators will bump into > > the law. > > I get that. > > > The stuff has no place in the hands of lids, kids or space > > cadets, many of whom already think the law does not apply to > > them > > Well, officially, "space cadets" might lie outside of our jurisdiction. > > > as evidenced by the numerous spy shops advertising illegal > > products. The spy shops ARE NOT under contract to supply the > > stuff to law enforcement merely by including some useless > > disclaimer on their website. 'Under contract' means having a > > purchase order in house already to supply the devices, before > > they even are obtained. That virtually never is the case with > > the spy shops, although they all claim to 'sell to police'. > > I know, Steve. (I realize you are trying to be educational for everybody, > I'm not dissin' ya.) I'm not proposing a blanket loophole, but this seems > stifling for everybody. I'm just asking where there are conflicts, if > creative means couldn't reconcile them. > > The protective interest in Title III for the private sector was privacy, but > truly it was a law enforcement enabler -- private sector interests have not > been wholly addressed. Inhibiting your services does not service that > interest. I also wonder if -- given the way things work -- we could > encourage better information sharing and enable enforcement through > legislative changes. I'm just trying to ponder on some possible answers. > > I won't do it again. ;) > > ~Aimee > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 4702 From: tek492p Date: Wed Jan 30, 2002 8:51pm Subject: Re: history channel James -- The "Spy Shop" in Beverly Hills showing the James Bond type gadgets is CCS. To learn more about CCS, and "Spy Shops" in general, read the following two messages posted by Steve Uhrig..... Message #3888, Re: vendor needed, Fri, 10/12/2001 Message #4502, Re: Attacking CCS? Yes, exactly that, Thu, 1/10/2002 Jack 4703 From: tek492p Date: Wed Jan 30, 2002 8:45pm Subject: Re: history channel James -- The "Spy Shop" in Beverly Hills showing the James Bond type gadgets is CCS. To learn more about CCS, and "Spy Shops" in general, read the following two messages posted by Steve Uhrig..... Message #3888, Re: vendor needed, Fri, 10/12/2001 Message #4502, Re: Attacking CCS? Yes, exactly that, Thu, 1/10/2002 Jack 4704 From: tek492p Date: Wed Jan 30, 2002 9:05pm Subject: Re: TEL "RING" QUESTION Bill -- In reference to the telephone ring with the Caller ID blocked and the *68 (do you mean *69?), does the telephone line local number have an incoming 800 number? 1. You cannot *69 (call back) an incoming 800 number. 2. If the call is from a business with multiple out-going lines, and the caller is calling from an inside extension, most Caller ID's will show a Name: Unknown & Number: Unknown. Jack 4705 From: Charles P Date: Wed Jan 30, 2002 9:42pm Subject: Re: TEL "RING" QUESTION Questions: Does this mean about 12 times per day? When you say cid was "blocked" does it say "blocked" or "private" or does it just not have any display, or say "out of area" Elaborate on the faxes forwarding to the fax line, are you forwarding them manually? There are so many machines dialing numbers these days, that seems most likely. But you said it's been going on for years... any strong electrical signals in the area? Is there a home phone system or just standard Pots lines? I found a pbx that interpreted electrical interference as dial pulses. The person at extension 111 was going crazy with "hangup" calls. charles >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> During any given 24 hr period...the following occurs: --incoming phone call--caller ID always blocked--phone answered--NOT a sound. This occurs approx 12 plus times w/the majority of "incoming" during the 0700-1700 hr period. Rarely 1700-0700. BUT, it does occur during those hours as well. --*68 nothing --phone co security can't(?) ID the prob..or answer the why? question --different issue--random faxes coming in on "home" line--(prob solicitation)--immediately fwd to fax line with no capture-receive. Initially, we thought that the telco was doing some routine line cks..but this has been going on for several YEARS! Any thoughts or fixes? 4706 From: sdonnell Date: Thu Jan 31, 2002 1:37am Subject: Re: Re: Bug Photos Wanted "Johnston, Richard" wrote: > Now that is a job I would like -- Designing "bugs" for the movie > industry! > They don't have to work (We'll dub in the sound later.) they just have > to > look cool. Hi, That wouldnt be too difficult; It could be something as simple as an infamous "black cube" or part of a circuit brd from something like a cordless phone. Just add a couple of "dongle" wires, if you really want to get fancy, spiral wind them or add gator clips. If you really want to be in contension for that tech-catagory Oscar, consider something w/ a real "radio" appearance like an old pager such as a Moto Spirit or Pageboy2, or even a Bravo receiver brd. I wonder if anyone has ever built something like this, and planted it as a type of "training aid", just to see how long it would take for anyone to notice/find it? Steve [Non-text portions of this message have been removed] 4707 From: James M. Atkinson Date: Thu Jan 31, 2002 9:11am Subject: Re: Re: Bug Photos Wanted Regarding training aids suitable for discovery during the physical search consider the following. 1) Take one or more sugar cubes, tie an jumper wire with alligator clips to it, wrap it in duct tape strips, and dip it in black liquid plastic. 2) Take a ball point pen, remove half the ink reserve tube, fill the open area with a combination of 5-6 small transistors, lead shot, and epoxy, and drill a small where a microphone would typically be located. 3) Open up a small pocket calculator, add 2-3 ounces of NLJ/lead shot/epoxy, drill two small holes (one for simulated control switch, one for microphone). 4) My favorite... is to go to a local gambling supply business and buy several thousand really thick weighted plastic poker chips and have your business name and phone number molded/printed on one side. Then on the other side have "covert eavesdropping devices are no larger then this, are you really secure?", drill a small hole in it (to simulate a microphone), epoxy two of them together, and duct tape them in place under desks and furniture during penetration tests. If your really feeling cute, you can epoxy a CR series lithium cell and several dozen SMT transistors as a wafer between the chips. -jma At 2:37 AM -0500 1/31/02, sdonnell wrote: >"Johnston, Richard" wrote: > >> Now that is a job I would like -- Designing "bugs" for the movie >> industry! >> They don't have to work (We'll dub in the sound later.) they just have >> to >> look cool. > >Hi, That wouldnt be too difficult; It could be something as simple as an >infamous "black cube" or part of a circuit brd from something like a >cordless phone. Just add a couple of "dongle" wires, if you really want >to get fancy, spiral wind them or add gator clips. If you really want to >be in contension for that tech-catagory Oscar, consider something w/ a >real "radio" appearance like an old pager such as a Moto Spirit or >Pageboy2, or even a Bravo receiver brd. > >I wonder if anyone has ever built something like this, and planted it as >a type of "training aid", just to see how long it would take for anyone >to notice/find it? > >Steve -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4708 From: Date: Thu Jan 31, 2002 5:58am Subject: Electronic Surveillance in Florida Nursing Homes FMDA Issues Statement Against Attorney General-AHCA Report on Electronic Surveillance in Florida Nursing Homes WEST PALM BEACH, Fla., Jan. 31 /PRNewswire/ -- The joint Attorney General- Agency for Health Care Administration report released last week, recommended that video surveillance cameras be allowed in the bedrooms and bathrooms of nursing home patients. FMDA's major concerns with this include: * Privacy/Dignity: The physician and nurse practitioner members of FMDA feel strongly that video surveillance cameras undermine the privacy and dignity of nursing home patients and their doctors, nurse practitioners, caregivers and visitors. The most personal type of care is often provided at a patient's bedside. Nurse practitioner members specifically view this as a breech of confidentiality as well as demeaning, demoralizing, and disruptive to the care of these frail, incapacitated human beings. * Staffing: The use of video surveillance cameras will have a negative impact on the facility's ability to recruit and retain staff at the very time when there is a real shortage of nurses and certified nursing assistants. The surveillance cameras will also disrupt the positive, trusting relationship between a patient and caregiver that may have the potential to interfere with their therapeutic relationship as well. Another major impact will be the downward spiral of staff moral. * Insurance: According to insurance liability carriers, video cameras will have a severely negative impact on a facility's ability to secure coverage. * Medical Directors: With medical directors already facing insurance liability coverage cancellation, non-renewal and huge premium increases, this recommendation comes at a time when we need to encourage more physician participation in long-term care. Video surveillance has the potential to create a serious shortage of physicians acting as medical directors or attending physicians. * Litigation: Approval of video surveillance in nursing homes will increase the potential for increased litigation which drives up costs. Resources that would otherwise go into patient care will have to be diverted to defend frivolous lawsuits. * Proper Use: There are many unanswered issues about resident privacy, the appropriate use of video tapes, video equipment maintenance, and the integrity of the tapes. * Interpretation: FMDA believes that the contents of tapes will be easily misinterpreted or misrepresented and used against staff, physicians and the nursing facility. * Family Involvement: Close family involvement in the day-to-day care of their loved one in the nursing home is one of the fundamental principles of good care for patients. Having video cameras may reduce family involvement and decrease patient-family interactions that are so essential to the welfare of both. "Video surveillance cameras will do nothing but harm the relationship between patient and caregiver and they should not be allowed in patient bedrooms. Add to that the fact that they will be the tool of eager trial attorneys and you have a prescription for disaster," said Morris Kutner, MD, CMD, immediate past-president, Florida Medical Directors Association. The Florida Medical Directors Association represents more than 350 medical directors, attending physicians, physician assistants, and advanced registered nurse practitioners in long-term care facilities in Florida. The mission of FMDA is to promote the highest quality care in nursing homes by providing leadership, professional education and advocacy. MAKE YOUR OPINION COUNT - Click Here http://tbutton.prnewswire.com/prn/11690X22202077 SOURCE Florida Medical Directors Association CO: Florida Medical Directors Association ST: Florida IN: HEA SU: 01/31/2002 09:47 EST http://www.prnewswire.com 4709 From: Jordan Ulery Date: Thu Jan 31, 2002 5:08pm Subject: Freedom of Information? EDITORIALS On the Public's Right to Know The day Ashcroft censored Freedom of Information Ruth Rosen, Editorial writer and columnist San Francisco Chronicle Sunday, January 6, 2002 THE PRESIDENT DIDN'T ask the networks for television time . The attorney general didn't hold a press conference. The media didn't report any dramatic change in governmental policy. As a result, most Americans had no idea that one of their most precious freedoms disappeared on Oct. 12. Yet it happened. In a memo that slipped beneath the political radar, U.S. Attorney General John Ashcroft vigorously urged federal agencies to resist most Freedom of Information Act requests made by American citizens. Passed in 1974 in the wake of the Watergate scandal, the Freedom of Information Act has been hailed as one of our greatest democratic reforms. It allows ordinary citizens to hold the government accountable by requesting and scrutinizing public documents and records. Without it, journalists, newspapers, historians and watchdog groups would never be able to keep the government honest. It was our post-Watergate reward, the act that allows us to know what our elected officials do, rather than what they say. It is our national sunshine law, legislation that forces agencies to disclose their public records and documents. Yet without fanfare, the attorney general simply quashed theFOIA. The Department of Justice did not respond to numerous calls from The Chronicle to comment on the memo. So, rather than asking federal officials to pay special attention when the public's right to know might collide with the government's need to safeguard our security, Ashcroft instead asked them to consider whether "institutional, commercial and personal privacy interests could be implicated by disclosure of the information." Even more disturbing, he wrote: "When you carefully consider FOIA requests and decide to withhold records, in whole or in part, you can be assured that the Department of Justice will defend your decisions unless they lack a sound legal basis or present an unwarranted risk of adverse impact on the ability of other agencies to protect other important records." Somehow, this memo never surfaced. When coupled with President Bush's Nov. 1 executive order that allows him to seal all presidential records since 1980, the effect is positively chilling. In the aftermath of Sept. 11, we have witnessed a flurry of federal orders designed to beef up the nation's security. Many anti-terrorist measures have carefully balanced the public's right to know with the government's responsibility to protect its citizens. Who, for example, would argue against taking detailed plans of nuclear reactors, oil refineries or reservoirs off the Web? No one. Almost all Americans agree that the nation's security is our highest priority. Yet half the country is also worried that the government might use the fear of terrorism as a pretext for protecting officials from public scrutiny. Now we know that they have good reason to worry. For more than a quarter of a century, the Freedom of Information Act has ratified the public's right to know what the government, its agencies and its officials have done. It has substituted transparency for secrecy and we, as a democracy, have benefited from the truths that been extracted from public records. Consider, for example, just a few of the recent revelations -- obtained through FOIA requests -- that newspapers and nonprofit watchdog groups have been able to publicize during the last few months: -- The Washington-based Environmental Working Group, a nonprofit organization, has been able to publish lists of recipients who have received billions of dollars in federal farm subsidies. Their Web site, www.ewg.org < http://www.ewg.org , has not only embarrassed the agricultural industry, but also allowed the public to realize that federal money -- intended to support small family farmers -- has mostly enhanced the profits of large agricultural corporations. -- The Charlotte Observer has been able to reveal how the Duke Power Co., an electric utility, cooked its books so that it avoided exceeding its profit limits. This creative accounting scheme prevented the utility from giving lower rates to 2 millioncustomers in NorthCarolina and South Carolina. -- USA Today was able to uncover and publicize a widespread pattern of misconduct among the National Guard's upper echelon that has continued for more than a decade. Among the abuses documented in public records are the inflation of troop strength, the misuse of taxpayer money, incidents of sexual harassment and the theft of life-insurance payments intended for the widows and children of Guardsmen. -- The National Security Archive, a private Washington-based research group, has been able to obtain records that document an unpublicized event in our history. It turns out that in 1975, President Gerald Ford and Secretary of State Henry Kissinger gave Indonesian strongman Suharto the green light to invade East Timor, an incursion that left 200,000 people dead. -- By examining tens of thousands of public records, the Associated Press has been able to substantiate the long-held African American allegation that white people -- through threats of violence, even murder -- cheated them out of their land. In many cases, government officials simply approved the transfer of property deeds. Valued at tens of million of dollars, some 24,000 acres of farm and timber lands, once the property of 406 black families, are now owned by whites or corporations. These are but a sample of the revelations made possible by recent FOIA requests. None of them endanger the national security. It is important to remember that all classified documents are protected from FOIA requests and unavailable to the public. Yet these secrets have exposed all kinds of official skullduggery, some of which even violated the law. True, such revelations may disgrace public officials or even result in criminal charges, but that is the consequence -- or shall we say, the punishment -- for violating the public trust. No one disputes that we must safeguard our national security. All of us want to protect our nation from further acts of terrorism. But we must never allow the public's right to know, enshrined in the Freedom of Information Act, to be suppressed for the sake of official convenience. --------------------------- Ruth Rosen Editorial writer and columnist San Francisco Chronicle 901 Mission Street San Francisco, CA 94103 Phone: 415-536-3093 Fax: 415-543-7708 rrosen@s... [Non-text portions of this message have been removed] 4710 From: A Grudko Date: Thu Jan 31, 2002 4:25pm Subject: Re: Re: Re: Bug Photos Wanted - Original Message - > Sorry, I didnt realise that in the U.S. mere possession of a bug is considered a criminal offence. Hello Paolo + If so then under US law I'm a criminal. I have my first located bug encapsulated in resin on my desk. Thankfully that's not the case under our laws. We have photos of a few bugs and ancillary connections/equipment that we have found over the decades. We're happy to freely share this amongst colleagues for commercial distribution as long as we get acknowledgement. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4711 From: Grey Operator Date: Thu Jan 31, 2002 4:53pm Subject: Police Bugging stir up hornets nest in UK A couple of links for the list to peruse:- Tuesday, 29th January 2002 Murder case over due to Police bugging http://news.bbc.co.uk/hi/english/uk/scotland/newsid_1790000/1790183.stm Wednesday, 30th January 2002 Police suspended over bugging http://news.bbc.co.uk/hi/english/uk/england/newsid_1791000/1791735.stm Five freed as judge condemns Police http://www.thetimes.co.uk/article/0,,2-2002047642,00.html Officers caught by Judges diligence http://www.thetimes.co.uk/article/0,,2-2002047811,00.html Lawyers claim Police bugging is widespread http://www.thetimes.co.uk/article/0,,2-2002047147,00.html Thursday,31st January 2002 Second trial in doubt as officers suspended http://www.thetimes.co.uk/article/0,,2-2002050750,00.html I sit on both sides of the fence with this, as I deal with TSCM, & Covert Surveillance in my current law enforcement work. IMHO these guys deserve everything they get for being so professionally incompetent & ethically and morally bankrupt. Some many of us in the community are working so hard to educate & prevent against this sort of incompetent abuse.It deeply saddens me that I and many of my colleagues will suffer as a result of this. It is something we have tried so hard to prevent and educate against in recent years. Only the bad guys win........... TTFN Mick [Non-text portions of this message have been removed] 4712 From: Date: Fri Feb 1, 2002 2:48pm Subject: Confiscated PC Reveals Terrorist Focus On Water Supply "Better break Out the Perrier!" Confiscated PC Reveals Terrorist Focus On Water Supply The FBI's National Infrastructure Protection Center (NIPC) said it has uncovered evidence that terrorists may have planned attacks on water supply systems in the United States and abroad. According to a bulletin issued by the NIPC Tuesday and labelled as of "high" importance, a computer, owned by an individual with indirect links to Osama bin Laden, was found to contain several software programs used for structural engineering of "dams and other water-retaining structures." The presence of the programs demonstrates "terrorist interest" in water supply systems, the bulletin said. The bulletin did not identify the individual who owned the computer nor provide more details about how the device was obtained by law enforcement. NIPC officials were not immediately available for comment. The NIPC said the programs included CATIGE, which stands for computer-aided teaching in geotechnical engineering; and Microstran, a structural engineering system. Both are developed in Australia, according to their Web sites. Also installed on the PC were AutoDesk's AutoCAD 2000 computer-assisted design and drafting program, as well as the Beam stress analysis software package from ORAND Systems, according to the NIPC. The computer also contained programs used to identify and classify soils, the bulletin said. EOM HAVE A GREAT DAY !!! Please Note: No trees were destroyed in the sending of this contaminant free message We do concede, a significant number of electrons may have been inconvenienced. : >) ---------- http://www.intelligentx.com/newsletters/technology/articles/story_tech1_020102.html [Non-text portions of this message have been removed] From: Matt Paulsen Date: Wed Jan 29, 2003 11:56pm Subject: RE: Court rejects infrared drug search " AND, since when is "the area common to or surrounding a house" consisting of the airspace above? Or below.... " The crystal ball shows aquifers and sinkholes in your future. Another peanut in the gallery added... -----Original Message----- From: MailExp [mailto:mailexp@o...] Sent: Tuesday, January 28, 2003 6:43 PM To: tscm-l@yahoogroups.com Subject: RE: [TSCM-L] Court rejects infrared drug search Not advocating either, BUT - how is it an intrusion when you don't know, feel or suffer the presence of an observation that you did not know was taking place from 1000' above your head? AND, since when is "the area common to or surrounding a house" consisting of the airspace above? It does not for any other right or law. It would be nicer to see someone in a courtroom apply common sense and logic, instead of wasting time making people file more papers just to do their job. Just another viewpoint from the peanut gallery... -----Original Message----- From: Mitch D [mailto:rockdriver@y...] Sent: Tuesday, January 28, 2003 8:33 PM To: tscm-l@yahoogroups.com Subject: Re: [TSCM-L] Court rejects infrared drug search Not advocating an idiot growing pot plants but;Glad someone in a courtroom still understands "Curtilage".......... __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6844 From: MailExp Date: Thu Jan 30, 2003 8:16am Subject: RE: Court rejects infrared drug search Canadian law is obviously different than US, although I don't know that this has been successfully challenged in the US. Anyone? More facts are arguably needed here for this discussion. Air space above a property has no intellectual value; and does not belong to the property owner. Therefore, use of it and the surrounding information that results, should be fair game. If the ONLY basis for his conviction was this, then I could see issues. However, it does not seem to be in this case. Hopefully this was only the start of the constable's PC and it progressed from there. We are missing part of the story. I am surprised to see Canada having issue with this though. From a country that grants applications for our Title III equivalent on an enormous basis (over a thousand a day, yes that is correct) I see though only thing coming from this is paperwork, with a standard approval. It seems as though they want court involvement on everything, which in the end only helps the LEA. I threw away my crystal ball a long time ago. Ed -----Original Message----- From: Matt Paulsen [mailto:mpaulsen6@a...] Sent: Thursday, January 30, 2003 12:56 AM To: tscm-l@yahoogroups.com Subject: RE: [TSCM-L] Court rejects infrared drug search " AND, since when is "the area common to or surrounding a house" consisting of the airspace above? Or below.... " The crystal ball shows aquifers and sinkholes in your future. Another peanut in the gallery added... -----Original Message----- From: MailExp [mailto:mailexp@o...] Sent: Tuesday, January 28, 2003 6:43 PM To: tscm-l@yahoogroups.com Subject: RE: [TSCM-L] Court rejects infrared drug search Not advocating either, BUT - how is it an intrusion when you don't know, feel or suffer the presence of an observation that you did not know was taking place from 1000' above your head? AND, since when is "the area common to or surrounding a house" consisting of the airspace above? It does not for any other right or law. It would be nicer to see someone in a courtroom apply common sense and logic, instead of wasting time making people file more papers just to do their job. Just another viewpoint from the peanut gallery... -----Original Message----- From: Mitch D [mailto:rockdriver@y...] Sent: Tuesday, January 28, 2003 8:33 PM To: tscm-l@yahoogroups.com Subject: Re: [TSCM-L] Court rejects infrared drug search Not advocating an idiot growing pot plants but;Glad someone in a courtroom still understands "Curtilage".......... __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 6845 From: Craig Snedden Date: Thu Jan 30, 2003 8:33am Subject: RE: 2nd sweeper....Long Post. My apologies Hi Andy, Thanks for the feedback. Only one problem.... The Theft Act 1968 is not a UK wide act. Here in Scotland we have no codified legislation covering theft. It is a common law crime..... (Which is what makes my life such fun..!) I hadn't thought of it in relation to the question, as I was thinking about the Telco's position on "permitted equipment", some of which you will know can be used as a type of physical tap. In my experience Telco's take no heed to any "permitted equipment" installed by an end user after the network connection into the building (what I call the "private side"). But I concede the point that if anyone were to be charged with an offence then this would be a possible route and my thanks for pointing it out. However, in pondering this one further, I can see (and have experience of dealing with) theft of electricity offences as being relatively easily provable, but with telecommunications you are not paying for the volume of electrons you use, but by a tariff set on time of day, distance involved and duration of the call made. A physical tap could therefore be looked upon as another "extension" on the line, only connected when the master instrument (the target) is in use. So long as the device is is not being used to make surreptitious calls unbeknown to the billpayer. I think it would therefore be difficult to prove any material loss of revenue by the telco or cost to the billpayer (meaning no additional charges appearing on the phonebill as a result of the device being connected)..... Comments? Do you (or anyone else on the list) know of any reference cases (British) that can be quoted? As far as the Data Protection Act goes, it is also an offence to obtain or attempt to obtain information subject to the act which you (i.e. the "attacker") know (or should reasonably know) you are not entitled to. (Ignorance of what you are and are not entitled to being no defence...!!!). As I said, a minefield which for the purposes of this discussion I was going to ignore. :-) Oh happy days! Best regards Craig -----Original Message----- From: Andy M [mailto:asmoore@a...] Sent: 25 January 2003 11:15 To: Craig Snedden Subject: Re: [TSCM-L] 2nd sweeper....Long Post. My apologies Craig, I think that you'll find that a physical tap to phone lines in the UK constitutes theft (Theft Act 1968) as 'absrtacting electricity'. You're right with regards the RF devices. I'd suggest that the Data Protection Act is more applicable to the information 'defender', as oposed to the 'attacker' as the 'defender' is expected to conduct risk analysis and implement such measures "as are reasonable" to maintain the confidentiality of sensitive data. The UK's sadly lacking in legislation to protect proprietry data (as the US has) so we're wide open as regards industrial/economic esopioage...... Andy M ----- Original Message ----- From: "Craig Snedden" To: Sent: Thursday, January 23, 2003 3:52 PM Subject: RE: [TSCM-L] 2nd sweeper....Long Post. My apologies > My apologies in advance for the length of this posting. Got carried away > with myself. > > :~ (sheepish smile) > > > To follow up Vance's post, I believe the situation in the UK criminal > justice system would be different in as much as; > > 1. > > Ownership and possession of a transmitting device of any type is not a crime > within mainland UK. Unauthorised transmission or reception of RF emissions > is.... > > 2. > > The connection of any type of device (which would include a simple parallel > connection to a "speaker") to the "private" side of a telecommunications > system (PBX) (or single line) is not "normally" a criminal offence (however > there are lots of potholes with the Data Protection Act which fall into > place at this point - a minefield which for the purposes of this discussion > I shall ignore.). > > The principal exception being any device which might be deemed to cause > "damage or disruption to the public telephone system - i.e. the carrier > network. This would be a point for the courts to decide. > > 3. > > The connection of any device to the "private" side of a PBX (or single line) > can only be done with the knowledge and consent of the system owner (usually > whoever pays the phonebill). > > > So...... What does all that mean? > > > Scenario 1. > > If a "stand alone" (mic & tx) transmitter was discovered on the premises of > a client which had been planted by a third party then the client is not the > person responsible for either the tx or rx of any signal. Is he/she expected > to know if the person who planted it has the necessary licence? Likewise, is > the specialist expected to know if the buggist has the necessary licence? In > law, no: Therefore, no trouble to the client if he leaves the device in > situ. If he left it in situ and later reported it to the authorities, only > the buggist (or any person found to be listening to the tx freq) not having > the required authority to tx/rx on that freq (emission type, power etc.) > would face any criminal charge. > > > Scenario 2. > > If the specialist discovers a device connected to the "private" side of the > telephone system and brings it to the attention of the system owner, then > the call is with the system owner to decide whether to advise any > responsible authority. If the device is left and later found to be a > "hazard" to the public network, then the system owner, being knowledgeable > about it's presence, would possibly be liable, as would be the buggist if > caught. > > > Scenario 3. > > A device having been found on the public network side should be reported > firstly to the network provider. (They will take a dim view of anyone, TSCM > "professional" or not, being anywhere near thier equipment). Omission to > report may result in someone being pursued for having "endangered the > integrity of the network". However, who that someone might be is another > question. Certainly the buggist if caught. Possibly the system owner if he > sanctioned the device to remain in situ. (reason being that you are engaged > by the client and are acting at his direction. So long as you make it clear > (in writing) that your advice is to inform the network operator asap, then > the courts would have to take the view that you are not acting "in concert" > with any other person and therefore have no responsibility for breaking any > applicable law).... > > Clear...? No I thought not. > > Interestingly, this follows from Vance's point that to leave the "bug" in > situ and use it as corroboration then any material gained from it would be > inadmissable as evidence since it was obtained from an illegal source. Here > in the UK, that approach would really depend on whether the "bug" was deemed > to be "illegal" in the first place...... > > Certainly the unlicensed rx of any signal tx by the device would be illegal. > But, would the feeding of "chicken feed" into such a bug and seeing who > reacted to it be classed as an illegal transmission...? > > It might be argued not, since I did not switch the transmitter on and cause > it to actually tx (it was the buggist) ("A big boy did it and ran > away..!!"). > > Another might argue that it is illegal, since they might argue that I > should, as a TSCM "professional" be aware that the tx from such a device is > likely to be illegal and should therefore have taken steps to switch it > off..... My defence to that one being that I did not know if the device was > legal or not and therefore left it on in an effort to trace it's ownership. > It might have belonged to the Security Services for all I knew....... > > > Anyone know any UK caselaw on this? I can't find any right now. > > > In truth, reporting such an incident to the police here would most likely be > met with a blank stare and little if no response. The telecomms would > certainly respond (mostly by just removing the object from the network). > > :-) > > Craig > > > > -----Original Message----- > From: Ocean Group [mailto:inertia@o...] > Sent: 22 January 2003 20:21 > To: TSCM Group > Subject: [TSCM-L] 2nd sweeper.... > > > I had a chat with a lawyer friend and she informed me that the specialist > would not be charged as an accessory because the planting of the bug was not > a joint enterprise between the specialist and the 3rd party(the bugger,em > shall we say the bug planter.). The specialist would also have no reason to > suspect that the client was acting in bad fate(unless he did) etc etc and it > does not make the specialist liable by assuming that the client would report > it. > > However interesting enough, she said that should the client keep the bug and > "use" it, for any incrimination, the information would be naturally enough > inadmissable but the specialist could be very well charged for accessory to > the fact. So the moral of the story is, if you find a bug, a- to not give it > to the client unless he is totally trustworthy or b- disable etc take > reasonable precautions etc..... > > > This is the situation as regards the Irish courts however I'd assume it's a > pretty standard issue. > > All the best, > > Vance Deran > > Ocean Group, > Technical Security Division, > Ireland. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > --- Incoming mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.445 / Virus Database: 250 - Release Date: 21/01/2003 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.445 / Virus Database: 250 - Release Date: 21/01/2003 6846 From: Izaac Date: Thu Jan 30, 2003 3:33pm Subject: Re: tscming a lan On Wed, Jan 29, 2003 at 01:45:32AM -0500, Hugo Drax wrote: > firewall protecting the device, IDS/logging system residing in the cabinet ... produces it output /on paper./ -- ___ ___ . . ___ \ / |\ |\ \ _\_ /__ |-\ |-\ \__ 6847 From: A Grudko Date: Fri Jan 31, 2003 4:24am Subject: Re: Court rejects infrared drug search - Original Message - From: MailExp > Air space above a property has no intellectual value; and does not belong to the property owner. Therefore, use of it and the surrounding information that results, should be fair game. I'm not so sure. Are you happy to have Admiral Poindexter and Gerry Springer's TV crew in a black helicopter with various 'black boxes' hovering over your bedroom? Andy Grudko (British), Grad I.S, South Africa SIRA investigators Reg. No. 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 6848 From: infospy Date: Fri Jan 31, 2003 8:21am Subject: Re: Court rejects infrared drug search If I point a Microphone (or one of the other toys you gentlemen play with) at your home or office from my home or office next door, and record anything I can. Is this legal? It's air space. Just wondering Howard Phillips N.E.W. Security Service Background and Insurance Investigations Serving North Eastern Wisconsin WI license 6165-063 902-559-1200 ----- Original Message ----- From: "MailExp" To: Sent: Thursday, January 30, 2003 8:16 AM Subject: RE: [TSCM-L] Court rejects infrared drug search > Canadian law is obviously different than US, although I don't know that > this has been successfully challenged in the US. Anyone? More facts > are arguably needed here for this discussion. Air space above a > property has no intellectual value; and does not belong to the property > owner. Therefore, use of it and the surrounding information that > results, should be fair game. If the ONLY basis for his conviction was > this, then I could see issues. However, it does not seem to be in this > case. Hopefully this was only the start of the constable's PC and it > progressed from there. We are missing part of the story. I am > surprised to see Canada having issue with this though. From a country > that grants applications for our Title III equivalent on an enormous > basis (over a thousand a day, yes that is correct) I see though only > thing coming from this is paperwork, with a standard approval. It seems > as though they want court involvement on everything, which in the end > only helps the LEA. > > I threw away my crystal ball a long time ago. > > Ed > > -----Original Message----- > From: Matt Paulsen [mailto:mpaulsen6@a...] > Sent: Thursday, January 30, 2003 12:56 AM > To: tscm-l@yahoogroups.com > Subject: RE: [TSCM-L] Court rejects infrared drug search > > > " > AND, since when is "the area > common to or surrounding a house" consisting of the airspace above? Or > below.... > " > The crystal ball shows aquifers and sinkholes in your future. > > Another peanut in the gallery added... > > -----Original Message----- > From: MailExp [mailto:mailexp@o...] > Sent: Tuesday, January 28, 2003 6:43 PM > To: tscm-l@yahoogroups.com > Subject: RE: [TSCM-L] Court rejects infrared drug search > > > Not advocating either, BUT - how is it an intrusion when you don't know, > feel or suffer the presence of an observation that you did not know was > taking place from 1000' above your head? AND, since when is "the area > common to or surrounding a house" consisting of the airspace above? It > does not for any other right or law. It would be nicer to see someone > in a courtroom apply common sense and logic, instead of wasting time > making people file more papers just to do their job. > > Just another viewpoint from the peanut gallery... > > -----Original Message----- > From: Mitch D [mailto:rockdriver@y...] > Sent: Tuesday, January 28, 2003 8:33 PM > To: tscm-l@yahoogroups.com > Subject: Re: [TSCM-L] Court rejects infrared drug search > > > Not advocating an idiot growing pot plants but;Glad someone in a > courtroom still understands "Curtilage".......... > > __________________________________________________ > Do you Yahoo!? > Yahoo! Mail Plus - Powerful. Affordable. Sign up now. > http://mailplus.yahoo.com > > > Yahoo! Groups Sponsor > > ADVERTISEMENT > > 007140:HM/A=1414307/R=0/*https://www.clearcredit.com/registration/defaul > t.asp?n=b&cpID=c01888p1379&ckID=gen14628> > > pmail/S=:HM/A=1414307/rand=786786542> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service > . > > > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > > > Yahoo! Groups Sponsor > > ADVERTISEMENT > > 007140:HM/A=1414307/R=0/*https://www.clearcredit.com/registration/defaul > t.asp?n=b&cpID=c01888p1379&ckID=gen14628> > > pmail/S=:HM/A=1414307/rand=235220143> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service > . > > > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6849 From: Mitch D Date: Fri Jan 31, 2003 10:53am Subject: Re: Court rejects infrared drug search --- infospy wrote: > If I point a Microphone (or one of the other toys you > gentlemen play with) > at your home or office from my home or office next door, and > record anything > I can. Is this legal? It's air space. > > Just wondering If you're in my neighborhood,you may consider reading this: Tenn. Code Ann. ß 39-13-601 (1999): A person who is a party to a wire, oral or electronic communication, or who has obtained the consent of at least one party, can lawfully record a communication and divulge the contents of the recorded communication unless he has a criminal or tortious purpose for doing so. Violations are punishable as felonies with jail sentences of between two and 12 years and fines not exceeding $5,000. Tenn. Code Ann. ß 39-13-602, 40-35-111 (1999). Anyone whose communications have been unlawfully intercepted can sue to recover the greater of actual damages, $100 per day of violation or $10,000, along with punitive damages, attorney fees and litigation costs. Tenn. Code Ann. ß 39-13-603 (1999). Recording or disseminating a communication carried out through a cellular or cordless telephone, or disseminating the contents with knowledge of their illegal origin, without the consent of at least one party can be punished as a felony with a potential prison sentence of between one and six years and a fine not to exceed $3,000. Tenn. Code Ann. ß 39-13-604, 40-35-111 (1999). Viewing a person or using a hidden camera in a place where there is a reasonable expectation of privacy, when the viewing or recording "would offend or embarrass an ordinary person," is a misdemeanor. Tenn. Code Ann. ß 39-13-605. __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6850 From: Rick Hofmann - MICROSEARCH Date: Fri Jan 31, 2003 11:25am Subject: Telecom question A lawyer called with the following scenario: The lawyer's client has been charged with placing annoying phone calls. The client claims he does not know the victim, and denies placing any calls to the victim's number. The PD has (or claims to have) evidence obtained from a telephone company trap that the client's number has been placing the offending calls. My questions is, can phone company traps be "spoofed"? I suppose it is also possible that a person could have clipped on to the client's line using a butt set at his TNI. I was curious about other explanations members of this list might conjure up. Thanks in advance for any ideas. Very truly yours, Rick Hofmann, CCO, CPP, PI16998 MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 http://home.earthlink.net/~microsearch 6851 From: Michael Puchol Date: Fri Jan 31, 2003 5:44pm Subject: Re: Court rejects infrared drug search Thanks for that information Mitch, so... ----- Original Message ----- From: "Mitch D" To: Sent: Friday, January 31, 2003 5:53 PM Subject: Re: [TSCM-L] Court rejects infrared drug search > Viewing a person or using a hidden camera in a place where there > is a reasonable expectation of privacy, when the viewing or > recording "would offend or embarrass an ordinary person," is a > misdemeanor. Tenn. Code Ann. ß 39-13-605. ...if I am home, in my bedroom, with the window blinds closed, and generating heat during normal marital activities, and someone flies over my house with a thermal camera and records the "action", wouldn't ALL of the above apply? I really don't see how this form of surveillance shouldn't be subjected to the same laws and regulations as wiretaps or conventional surveillance. In my own home I have an expectation of privacy, the recordings would definitely offend and emarrass me, so it is a blatant invasion of privacy. Period. If the Canadian agents had a probable cause, suspicion, tip, etc. they could have applied for surveillance authorisation, THEN flown over his house and recorded his plant-o-phile activities. On the other hand, it was quite an ingenious way to look for hydroponic plantations! Regards, Mike 6852 From: James M. Atkinson Date: Fri Jan 31, 2003 5:50pm Subject: Re: Court rejects infrared drug search The federal courts have already ruled that if the person uses anything to assist their normal hearing then it is considered to be "assisted eavesdropping". The item being used could be a sophisticated eavesdropping device, a spy shop toy, a child's toy, or even an empty cup held against the wall. The rule of thumb is that if you can her it with the naked, un-assisted ear then it is fair game... but assist that hearing and it becomes eavesdropping. -jma At 8:21 AM -0600 1/31/03, infospy wrote: >If I point a Microphone (or one of the other toys you gentlemen play with) >at your home or office from my home or office next door, and record anything >I can. Is this legal? It's air space. > >Just wondering > > > > >Howard Phillips >N.E.W. Security Service >Background and Insurance Investigations >Serving North Eastern Wisconsin >WI license 6165-063 >902-559-1200 >----- Original Message ----- >From: "MailExp" >To: >Sent: Thursday, January 30, 2003 8:16 AM >Subject: RE: [TSCM-L] Court rejects infrared drug search > > >> Canadian law is obviously different than US, although I don't know that >> this has been successfully challenged in the US. Anyone? More facts >> are arguably needed here for this discussion. Air space above a >> property has no intellectual value; and does not belong to the property >> owner. Therefore, use of it and the surrounding information that >> results, should be fair game. If the ONLY basis for his conviction was >> this, then I could see issues. However, it does not seem to be in this >> case. Hopefully this was only the start of the constable's PC and it >> progressed from there. We are missing part of the story. I am >> surprised to see Canada having issue with this though. From a country >> that grants applications for our Title III equivalent on an enormous >> basis (over a thousand a day, yes that is correct) I see though only >> thing coming from this is paperwork, with a standard approval. It seems >> as though they want court involvement on everything, which in the end >> only helps the LEA. >> >> I threw away my crystal ball a long time ago. >> >> Ed >> >> -----Original Message----- >> From: Matt Paulsen [mailto:mpaulsen6@a...] >> Sent: Thursday, January 30, 2003 12:56 AM >> To: tscm-l@yahoogroups.com >> Subject: RE: [TSCM-L] Court rejects infrared drug search >> >> >> " >> AND, since when is "the area >> common to or surrounding a house" consisting of the airspace above? Or >> below.... >> " >> The crystal ball shows aquifers and sinkholes in your future. >> >> Another peanut in the gallery added... >> >> -----Original Message----- >> From: MailExp [mailto:mailexp@o...] >> Sent: Tuesday, January 28, 2003 6:43 PM >> To: tscm-l@yahoogroups.com >> Subject: RE: [TSCM-L] Court rejects infrared drug search >> >> >> Not advocating either, BUT - how is it an intrusion when you don't know, >> feel or suffer the presence of an observation that you did not know was >> taking place from 1000' above your head? AND, since when is "the area >> common to or surrounding a house" consisting of the airspace above? It >> does not for any other right or law. It would be nicer to see someone >> in a courtroom apply common sense and logic, instead of wasting time >> making people file more papers just to do their job. >> >> Just another viewpoint from the peanut gallery... >> >> -----Original Message----- >> From: Mitch D [mailto:rockdriver@y...] >> Sent: Tuesday, January 28, 2003 8:33 PM >> To: tscm-l@yahoogroups.com >> Subject: Re: [TSCM-L] Court rejects infrared drug search >> >> >> Not advocating an idiot growing pot plants but;Glad someone in a >> courtroom still understands "Curtilage".......... >> >> __________________________________________________ >> Do you Yahoo!? >> Yahoo! Mail Plus - Powerful. Affordable. Sign up now. >> http://mailplus.yahoo.com >> >> >> Yahoo! Groups Sponsor >> >> ADVERTISEMENT >> >> > 007140:HM/A=1414307/R=0/*https://www.clearcredit.com/registration/defaul >> t.asp?n=b&cpID=c01888p1379&ckID=gen14628> >> >> > pmail/S=:HM/A=1414307/rand=786786542> >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== TSKS >> >> Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service >> . >> >> >> >> >> [Non-text portions of this message have been removed] >> >> >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== TSKS >> >> Your use of Yahoo! Groups is subject to >> http://docs.yahoo.com/info/terms/ >> >> >> >> >> Yahoo! Groups Sponsor >> >> ADVERTISEMENT >> >> > 007140:HM/A=1414307/R=0/*https://www.clearcredit.com/registration/defaul >> t.asp?n=b&cpID=c01888p1379&ckID=gen14628> >> >> > pmail/S=:HM/A=1414307/rand=235220143> >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== TSKS >> >> Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service >> . >> >> >> >> >> [Non-text portions of this message have been removed] >> >> >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== TSKS >> >> Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ >> >> >> > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6853 From: James M. Atkinson Date: Fri Jan 31, 2003 6:00pm Subject: Re: Telecom question The lawyers client should plea bargain, and hope for mercy. Seriously though, The police or prosecutor is going to have to prove that it was THIS guy who made the call, and if he has done a good job of keep his mouth shut it will be almost for anyone to prove he did it. Of course if the police have an audio recording of this guy (from the harassing calls), or he had made previous threats, was sending harassing messages, and so on then the the guy is screwed. -jma At 9:25 AM -0800 1/31/03, Rick Hofmann - MICROSEARCH wrote: > A lawyer called with the following scenario: > > The lawyer's client has been charged with placing annoying phone >calls. The client claims he does not know the victim, and denies placing >any calls to the victim's number. The PD has (or claims to have) evidence >obtained from a telephone company trap that the client's number has been >placing the offending calls. > > My questions is, can phone company traps be "spoofed"? I suppose it is >also possible that a person could have clipped on to the client's line >using a butt set at his TNI. I was curious about other explanations >members of this list might conjure up. Thanks in advance for any ideas. > >Very truly yours, > >Rick Hofmann, CCO, CPP, PI16998 > >MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage >Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: >714-209-0037 >http://home.earthlink.net/~microsearch -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6854 From: Steve Uhrig Date: Fri Jan 31, 2003 8:46pm Subject: Riser Bond TDR FS Hi all, If anyone needs a high end TDR, I recently got in a Riser Bond 1205T- OSP. I've now gone over it and it's perfect, ready to sell. This is a twisted pair TDR, and it will read two pairs at once, so you can see the difference between pairs and note any differences on one which may indicate a tap or anomaly. It has two inputs, two sets of leads, and displays two traces on the backlit LCD screen which can be superimposed. The unit is in near new condition, new battery, all accessories, manual, two sets of test leads, new canvas accessory carry pouch, and I even put a brand new yellow Pelican case with shoulder strap on it when I calibrated it. This TDR can be used on telephone lines, LAN wiring, or any metallic cable. It has digital storage and can internally store a number of waveforms to print later, or download to a computer when you generate your report for the client. No additional hardware is needed. It's all built in, simple memory storage button on the front panel. I even include the RS-232 computer interface cable. You can print in realtime or store TDR readings to print later, or download into a computer for storage or further analysis. The latest software is available for free download from www.riserbond.com. They update it periodically so I don't bother to include the software. Info on this TDR is there also, as well as tutorials on using it. The dual line capability, two traces at once to compare on the screen, is a superb benefit for TSCM work. In the past, I've had two separate TDRs on two lines to compare. This unit does it all in one. The 1205T-OSP is a current product. The -OSP suffix means OutSide Plant, meaning it is extra rugged for field use. The closed case is totally waterproof. It has one button testing, meaning you clip on the leads to the line under test, push one button, and the unit sets itself up automatically adjusting to the line parameters, and displays a usable waveform all within 10 seconds or so. You can merely jump from line to line using the automatic function, or override anything manually to disassemble the line electronically to whatever extent necessary. Automatic filters switch in to null out noise, 60 cycles or other garbage, and it's like magic. You can manually disable the filters if you wish to do so. Every function has a button. No complicated menus. Set velocity factor, cable impedance, pulse width and much more. A laminated cheat sheet is attached to the case with velocity factors of most common cables. The manual, which stores in the lid, goes into even more detail. Here's a super easy to use, versatile, powerful TDR for the most discriminating user. Current new price, never discounted, is $3195 in the 2002 catalog. The 2003 catalogs are not out yet, but the new price certainly will be higher. My price, as new, calibrated, all accessories, new battery, my warranty, is $2200. Save a thousand bucks. That's not chump change. I take credit cards and ship internationally. Overnight shipping available if need is immediate. If you are outside the U.S. and your mains power is 220VAC, please be sure to mention this when you order so I can include the proper charger. I've only had two others of this model, and both sold quickly. If you don't have a TDR, you're not able to sweep phone lines as effectively as you might. If you have an older one, a tired ragged out Tek or just want the latest greatest, here it is. Email if interested. Feel free to ask for references from me or the dozens on this list who have purchased TDRs from me before. Other Riser Bond TDRs are available also, including 1205CX, 1205CXA, 1270, all with new batteries, all accessories, calibrated, in excellent condition with my warranty. Some were used for only one week on a large install. They're at all different price levels starting at $500. Inquire for details if you'd like one different from the 1205T-OSP described above. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6855 From: Mitch D Date: Fri Jan 31, 2003 10:10pm Subject: Re: Court rejects infrared drug search --- Michael Puchol wrote: > Thanks for that information Mitch, so... > > ----- Original Message ----- > From: "Mitch D" > To: > Sent: Friday, January 31, 2003 5:53 PM > Subject: Re: [TSCM-L] Court rejects infrared drug search > > > > > Viewing a person or using a hidden camera in a place where > there > > is a reasonable expectation of privacy, when the viewing or > > recording "would offend or embarrass an ordinary person," is > a > > misdemeanor. Tenn. Code Ann. ß 39-13-605. > > ...if I am home, in my bedroom, with the window blinds closed, > and > generating heat during normal marital activities, and someone > flies over my > house with a thermal camera and records the "action", wouldn't > ALL of the > above apply? I really don't see how this form of surveillance > shouldn't be > subjected to the same laws and regulations as wiretaps or > conventional > surveillance. In my own home I have an expectation of privacy, > the > recordings would definitely offend and emarrass me, so it is a > blatant > invasion of privacy. Period. If the Canadian agents had a > probable cause, > suspicion, tip, etc. they could have applied for surveillance > authorisation, > THEN flown over his house and recorded his plant-o-phile > activities. On the > other hand, it was quite an ingenious way to look for > hydroponic > plantations! > > Regards, > > Mike The hidden camera law was implemented to deter video recording that would be used for criminal/tortious,or perverted purposes( so I've been told by a local "low yer").Weather this applies to LEA's is another whole discussion,but I understand where youre coming from........ __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6856 From: MailExp Date: Fri Jan 31, 2003 3:32pm Subject: RE: Court rejects infrared drug search Not the same issue at all. When you are speaking, especially in your own home, you have an inherent right to privacy. Especially in the confines of your own home. Heat waves that emanate beyond the walls should not be protected. In the same way, if you chose to have a conversation inside your home with the use of a loudspeaker, your expectation of privacy would be lost. Wonder no more. -----Original Message----- From: Mitch D [mailto:rockdriver@y...] Sent: Friday, January 31, 2003 11:53 AM To: tscm-l@yahoogroups.com Subject: Re: [TSCM-L] Court rejects infrared drug search --- infospy wrote: > If I point a Microphone (or one of the other toys you gentlemen play > with) at your home or office from my home or office next door, and > record anything > I can. Is this legal? It's air space. > > Just wondering If you're in my neighborhood,you may consider reading this: Tenn. Code Ann. ß 39-13-601 (1999): A person who is a party to a wire, oral or electronic communication, or who has obtained the consent of at least one party, can lawfully record a communication and divulge the contents of the recorded communication unless he has a criminal or tortious purpose for doing so. Violations are punishable as felonies with jail sentences of between two and 12 years and fines not exceeding $5,000. Tenn. Code Ann. ß 39-13-602, 40-35-111 (1999). Anyone whose communications have been unlawfully intercepted can sue to recover the greater of actual damages, $100 per day of violation or $10,000, along with punitive damages, attorney fees and litigation costs. Tenn. Code Ann. ß 39-13-603 (1999). Recording or disseminating a communication carried out through a cellular or cordless telephone, or disseminating the contents with knowledge of their illegal origin, without the consent of at least one party can be punished as a felony with a potential prison sentence of between one and six years and a fine not to exceed $3,000. Tenn. Code Ann. ß 39-13-604, 40-35-111 (1999). Viewing a person or using a hidden camera in a place where there is a reasonable expectation of privacy, when the viewing or recording "would offend or embarrass an ordinary person," is a misdemeanor. Tenn. Code Ann. ß 39-13-605. __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6857 From: Ocean Group Date: Sat Feb 1, 2003 2:00pm Subject: Spare a moment... We should all spare a moment to share in the grief of the lost souls on the NASA shuttle Columbia and their families as well as their friends and team mates in mission control. The shuttle never made it through re-entry and all contact was lost. May the lord have mercy on their souls. 6858 From: Hawkspirit Date: Sun Feb 2, 2003 6:09am Subject: tscming a lan What I think we are talking about here is not the cable on the customers premises under the customers control. We are talking about the part of the networks traveling through out the city. Typical of a t1 span between the customer and the telephone central office which could be over five miles. Roger From: "Hugo Drax" Subject: Re: tscming a lan If your customer has sensitive data it should sit behind a secured isolated server in a tamper-resistant cabinet include tamper evidence seals with a firewall protecting the device, IDS/logging system residing in the cabinet for alerting and only permit timed access to the server via VPN with SecureID tokens(fobs). Physical security is a must. 6859 From: Hawkspirit Date: Sun Feb 2, 2003 6:18am Subject: tscming a lan TDR's are really limited in resolution if data is on the span that you are testing so shutting down the data is a must. No other machine will give you the detail or comparative information that a TDR will on cable splits and bridges. This is why we work a lot at night and on weekends. On the optical cables use an optical TDR. Use BERT's and loop back tests to locate repeaters and routers and physically inspect them for attacks on their monitoring ports. Roger From: "Matt Paulsen" Subject: RE: tscming a lan Hi Roger, Thanks for the information. Most of what you're discussing looks wan based voice/data - t1's, ds0's, opx's, etc. If we're still back to using a TDR (dry not wet, correct?), why should I bother with the other equipment I have? Does it provide any value to TSCM a lan in the context as I've laid it out? If you're saying that we have to break the lan to test, that's not very easy to do in a life systems level network where if you break the lan you endanger lives and set off physical security systems and impact engineering systems - chillers, electrical, etc. Or do I place that under this is a ISO issue, talk to the CEO if you've got an issue with it. Second, I'm still trying to understand how a TDR fits into the larger context of a fiber rich network with single & multimode cable all over the place. Third, I'm looking for surreptitious testing before breaking the lan. RE: CSU/DSU's, I've done from network loop back, 0x's, 1's, etc., as well as from the CO down to the CSU. Mostly I get 'it's all ok' from my testing. I tend to find that the telco's are braindead for the most part unless you get a senior engineer involved that realizes that there's this thing called a switch, and it runs on this other thing called software at their end. 6860 From: Hawkspirit Date: Sun Feb 2, 2003 6:28am Subject: tscming a lan Try this book "T1 A Survival Guide" by Matthew Gast O'Reilly is the publisher. Roger From: "Matt Paulsen" Subject: RE: tscming a lan Hi Hugo, Thanks for the input. Most of what you've laid out is already done. If the questions I've asked require a book to answer, I'll buy it. Any suggestions? Thanks, Matt 6861 From: Date: Sun Feb 2, 2003 7:07am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 6862 From: Date: Sun Feb 2, 2003 7:07am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6863 From: Fernando Martins Date: Sun Feb 2, 2003 11:26am Subject: irc question ... I wonder if there is any known irc channels@network about tscm or electronic security (like about cctv, access control, ...)? FM 6864 From: Gregory Horton Date: Mon Feb 3, 2003 0:02am Subject: Stop telemarketers Received this e-mail from a pal. Is this on the up and up? Subject: No Telemarket K. Alan Carlton, Professional Home & Building Inspection Consultant, Fort Worth, Texas 817 572-3300 Amateur Radio Operator N5GKY YES, YOU CAN STOP TELEMARKETERS ' annoying calls, or at least slow them down: Those 3 familiar tones courtesy of Ma-Bell will do the trick. Most Telemarketers use what is called Predictive Dialers, which are PCs with software that dials ever number in a phone exchange until it gets lucky. Now you can use their own technology against them, and it's legal. Here is how their system works: the dialer calls your number, you answer, and you have probably notice the line appears dead after you said, "Hello". What their computer is doing is listening for a short burst of audio, your "HELLO", followed by a period of silence. With this heard, it will log your phone number as valid and transfer the call to an available telemarketer, the reason for the delay before someone comes on line. Now, if their computer receives a long audio burst (an answering machine) " Hello, this is Alan Carlton", then it will disconnect, but it will log you phone number as valid, for a later call-back. Oh Lovely! Some are even capable of detecting Fax tones and will even transmit a fax trying to sell selling something you're probably are not interested in. However, do not answer, or when you do answer the phone, or if fax tones are detected, or if it detects an answering machine, in all four (4) cases IT LOGS YOUR NUMBER AS A GOOD PHONE NUMBER FOR FUTURE CALL- BACK --- PLUS THE COMPANY IS ALSO SELLING THESE VERIFIED VALID NUMBERS LIST TO OTHER TELEMARKETERS. A SIMPLE WAY TO STAY OFF THE LIST IS TO USE THEIR OWN TECHNOLOGY AGAINST THEM. The predictive dialer's software also looks for NON-valid phone numbers, and there is a simple way you can make your phone number appear invalid to the telemarketers' computers, thus they do not call back and accumulate no database, at least with your number, to sell other Telemarketers. Here is how to do it: If you call a number that has been disconnected or is no longer in service you will hear 3 short tones, "doo...dah...dee", thanks to Ma-Bell. Each time you Refresh this page you should hear, "doo...dah...dee". The actual frequency of these tones are 985.2 Hz, 1370.6 Hz, and 1776.7 Hz. Guess what the telemarketers' software does when it detects these 3 tones at the beginning of your outgoing message? It thinks it has reached a line that is disconnected or is no longer in service. So, it disconnects and does not log your phone number as a working number. BINGO! NOW record these onto you outgoing message or voice mail announcement, and start exterminating telemarketers. Try this example, but use your own name, "doo...dah...dee, Hello, This is Alan Carlton". It must be at the beginning of your announcement to work. You may have to explain it to you friends, but they will soon have it on theirs' too. [Non-text portions of this message have been removed] 6865 From: Steve Uhrig Date: Mon Feb 3, 2003 10:45am Subject: Very interesting US Army weapons procurement http://acquisition.army.mil/svs/output/DABJ3503T0056.html Items they are buying are all the way at the bottom. The rest is boilerplate. Quantity 13. Have we come full circle? Tom Clancy's comment: " The difference between fiction and reality is that fiction has to make sense. " Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6866 From: Fernando Martins Date: Tue Feb 4, 2003 3:05am Subject: cctv Any good or bad experiences with Philips cctv/observation equipment/systems? http://www.philipscsi.com/ FM 6867 From: Romeo Mabasa Date: Mon Feb 3, 2003 4:09am Subject: TSCM strategy, evaluation & contrtol Hi guys, We're currently developing the above mentioned things and need your input. We were given a budget and we need ways to improve on it. So nay help will be appreciated. -- __________________________________________________________ Sign-up for your own FREE Personalized E-mail at Mail.com http://www.mail.com/?sr=signup 6868 From: Date: Mon Feb 3, 2003 8:56am Subject: Re: Stop telemarketers The main thing I see that is wrong with those tones is that our DTMF tones are two frequencies per tone, not one (thus Dual Tone Multi-Frequency designation). Do you know the second tone for the three tones you mentioned? Sgt. Kirk Sewell Illinois State Police, Technical Investigations 500 Iles Park Place, Suite 300 Springfield, IL 62718 (217)524-6079 6869 From: Date: Mon Feb 3, 2003 9:35am Subject: Stop telemarketers Yes, this seems to work. The idea is fresh from the last issue of 2600 magazine... (Embedded image moved to file: pic06729.pcx) ----- Forwarded by Cory Bys/First Bank on 02/03/2003 09:29 AM ----- |---------+----------------------------> | | Gregory Horton | | | | | | | | | 02/03/2003 12:02 | | | AM | | | | |---------+----------------------------> >--------------------------------------------------------------------------------------------------------------| | | | To: TSCM-L@yahoogroups.com | | cc: | | Subject: [TSCM-L] Stop telemarketers | >--------------------------------------------------------------------------------------------------------------| Received this e-mail from a pal. Is this on the up and up? Subject: No Telemarket K. Alan Carlton, Professional Home & Building Inspection Consultant, Fort Worth, Texas 817 572-3300 Amateur Radio Operator N5GKY YES, YOU CAN STOP TELEMARKETERS ' annoying calls, or at least slow them down: Those 3 familiar tones courtesy of Ma-Bell will do the trick. Most Telemarketers use what is called Predictive Dialers, which are PCs with software that dials ever number in a phone exchange until it gets lucky. Now you can use their own technology against them, and it's legal. Here is how their system works: the dialer calls your number, you answer, and you have probably notice the line appears dead after you said, "Hello". What their computer is doing is listening for a short burst of audio, your "HELLO", followed by a period of silence. With this heard, it will log your phone number as valid and transfer the call to an available telemarketer, the reason for the delay before someone comes on line. Now, if their computer receives a long audio burst (an answering machine) " Hello, this is Alan Carlton", then it will disconnect, but it will log you phone number as valid, for a later call-back. Oh Lovely! Some are even capable of detecting Fax tones and will even transmit a fax trying to sell selling something you're probably are not interested in. However, do not answer, or when you do answer the phone, or if fax tones are detected, or if it detects an answering machine, in all four (4) cases IT LOGS YOUR NUMBER AS A GOOD PHONE NUMBER FOR FUTURE CALL- BACK --- PLUS THE COMPANY IS ALSO SELLING THESE VERIFIED VALID NUMBERS LIST TO OTHER TELEMARKETERS. A SIMPLE WAY TO STAY OFF THE LIST IS TO USE THEIR OWN TECHNOLOGY AGAINST THEM. The predictive dialer's software also looks for NON-valid phone numbers, and there is a simple way you can make your phone number appear invalid to the telemarketers' computers, thus they do not call back and accumulate no database, at least with your number, to sell other Telemarketers. Here is how to do it: If you call a number that has been disconnected or is no longer in service you will hear 3 short tones, "doo...dah...dee", thanks to Ma-Bell. Each time you Refresh this page you should hear, "doo...dah...dee". The actual frequency of these tones are 985.2 Hz, 1370.6 Hz, and 1776.7 Hz. Guess what the telemarketers' software does when it detects these 3 tones at the beginning of your outgoing message? It thinks it has reached a line that is disconnected or is no longer in service. So, it disconnects and does not log your phone number as a working number. BINGO! NOW record these onto you outgoing message or voice mail announcement, and start exterminating telemarketers. Try this example, but use your own name, "doo...dah...dee, Hello, This is Alan Carlton". It must be at the beginning of your announcement to work. You may have to explain it to you friends, but they will soon have it on theirs' too. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ********************************** N O T E ***************************************** All e-mail sent to and from this address will be received or otherwise recorded by the First Banks corporate e-mail system and is subject to archival, monitoring or review by, and/or disclosure to, someone other than the recipient. *********************************************************************************************** ********************************** N O T E ***************************************** All e-mail sent to and from this address will be received or otherwise recorded by the First Banks corporate e-mail system and is subject to archival, monitoring or review by, and/or disclosure to, someone other than the recipient. *********************************************************************************************** [Non-text portions of this message have been removed] 6870 From: T. Beachler Date: Mon Feb 3, 2003 2:22pm Subject: Re: Digest Number 1181 I'd like a follow up on this as well. TSCM-L@yahoogroups.------------------------------------------------------------------------ Message: 7 Date: Sun, 02 Feb 2003 22:02:57 -0800 From: Gregory Horton Subject: Stop telemarketers Received this e-mail from a pal. Is this on the up and up? Subject: No Telemarket K. Alan Carlton, Professional Home & Building Inspection Consultant, Fort Worth, Texas 817 572-3300 Amateur Radio Operator N5GKY YES, YOU CAN STOP TELEMARKETERS ' annoying calls, or at least slow them down: Those 3 familiar tones courtesy of Ma-Bell will do the trick. Most Telemarketers use what is called Predictive Dialers, which are PCs with software that dials ever number in a phone exchange until it gets lucky. Now you can use their own technology against them, and it's legal. Here is how their system works: the dialer calls your number, you answer, and you have probably notice the line appears dead after you said, "Hello". What their computer is doing is listening for a short burst of audio, your "HELLO", followed by a period of silence. With this heard, it will log your phone number as valid and transfer the call to an available telemarketer, the reason for the delay before someone comes on line. Now, if their computer receives a long audio burst (an answering machine) " Hello, this is Alan Carlton", then it will disconnect, but it will log you phone number as valid, for a later call-back. Oh Lovely! Some are even capable of detecting Fax tones and will even transmit a fax trying to sell selling something you're probably are not interested in. However, do not answer, or when you do answer the phone, or if fax tones are detected, or if it detects an answering machine, in all four (4) cases IT LOGS YOUR NUMBER AS A GOOD PHONE NUMBER FOR FUTURE CALL- BACK --- PLUS THE COMPANY IS ALSO SELLING THESE VERIFIED VALID NUMBERS LIST TO OTHER TELEMARKETERS. A SIMPLE WAY TO STAY OFF THE LIST IS TO USE THEIR OWN TECHNOLOGY AGAINST THEM. The predictive dialer's software also looks for NON-valid phone numbers, and there is a simple way you can make your phone number appear invalid to the telemarketers' computers, thus they do not call back and accumulate no database, at least with your number, to sell other Telemarketers. Here is how to do it: If you call a number that has been disconnected or is no longer in service you will hear 3 short tones, "doo...dah...dee", thanks to Ma-Bell. Each time you Refresh this page you should hear, "doo...dah...dee". The actual frequency of these tones are 985.2 Hz, 1370.6 Hz, and 1776.7 Hz. Guess what the telemarketers' software does when it detects these 3 tones at the beginning of your outgoing message? It thinks it has reached a line that is disconnected or is no longer in service. So, it disconnects and does not log your phone number as a working number. BINGO! NOW record these onto you outgoing message or voice mail announcement, and start exterminating telemarketers. Try this example, but use your own name, "doo...dah...dee, Hello, This is Alan Carlton". It must be at the beginning of your announcement to work. You may have to explain it to you friends, but they will soon have it on theirs' too. --------------------------------- Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now [Non-text portions of this message have been removed] 6871 From: Date: Mon Feb 3, 2003 0:04pm Subject: Forensics Used to Rate bin Laden Tape Forensics Used to Rate bin Laden Tape by Steve Harvey (Jan. 20, 2003) -- A recorded message purportedly made by Osama bin Laden that aired on Arab satellite television network Al-Jazeera in mid-November brought the field of audio forensics to the fore as investigators scrambled to verify that the world's most wanted terrorist was still alive. If genuine, the recording, in which the speaker specifically refers to recent events such as the Oct. 12 Bali bombing, would be the first concrete evidence that the al Qaeda leader survived the U.S.-led bombing of Afghanistan. Renowned forensic consultant Tom Owen of Owl Investigations was contacted by a number of news organizations for his opinion regarding the veracity of the Nov. 12 tape. Owen, who formerly worked at New York's Lincoln Center Archives as chief engineer for 11 years, currently serves as chairman of the AES Standards Group WG-12 on Forensic Audio and is the chairman of the American Board of Recorded Evidence. He maintains a fully equipped laboratory that offers analog and digital audio-video signal processing and voice identification at his New Jersey facility. The CIA and National Security Agency were quick to verify that the new tape was genuine. But a statement from a Swiss laboratory at the end of November suggesting that the speaker was an imposter-though the tests were inconclusive due to insufficient data, lab officials said-demonstrated the difficulties involved with voice identification. The process of verification is relatively simple, Owen explains. "Basically, it's a comparison analysis between a known and an unknown." But the problem with a figure such as bin Laden, of course, lies with the reliability of the "known" samples. The ideal "known" source is verbatim exemplars, states Owen. According to the 1998 standard laid down by the American Board of Recorded Evidence, verbatim exemplars should consist of prepared statements recorded by the subject under controlled circumstances. "Which is never going to happen," says Owen of bin Laden. There are only a few top certified voice analysts in the country, according to Owen, including such well-known independent consultants as Anthony Pellicano and former FBI experts Bruce Koenig and Steve Cain. "What differentiates me from the others," says Owen, "is that I used the only person-to-person interview that [bin Laden] has done, which was in 1998 with John Miller from ABC-TV. You see him on camera, so you know that's him, and you know that's him talking." As luck would have it, when the new recording arrived, Owen was in the middle of voice-identification training with three Saudi intelligence agents who were able to isolate words common to the known and unknown recordings. "They translated everything for me. We had five or six words, such as allah, and we looked at those. The unknown message had already been translated by the State Department, but they were taking some liberties with the translation, at least in the opinion of the Arabic-speaking people." Owen continues, "Most males speak at a pitch of about 130 Hz, fundamental frequency, so you're looking for a pitch analysis that's going to be somewhat reliable. On the interview with Miller, it's fairly reliable because it's network-quality audio. On the new message, there's a lot of noise-it has a 5 kHz radio band. Even when you try to clean it up, there are still problems. They probably did that on purpose." One simple verification method, Owen says, is to "make a short-term memory tape of the unknown/known, back and forth. You try to use phrases that have a similar breath pattern and a similar rate of speech." Of the new bin Laden tape, he opines, "When you look at the rate of speech, mannerisms-if you look for dialects and accents, that doesn't change. The syllable coupling-I don't detect any pathology like a cleft palate or a physical problem." More sophisticated analysis is performed with either an aural spectrogram machine or biometric algorithms, which the Swiss used. "The problem with biometrics is that it assumes perfect samples. That's its biggest downfall, because the voice is dynamic." Owen instead relies on analog Voice Identification and digital Kay Elemetrics sound spectrographs. But while the pixelization of the screen limits the efficacy of the digital system, he observes, on the analog printouts "the resolution in terms of the formants of the voice-meaning the time, energy and frequency of the voice-is very clear." Of the latest tape comparison, Owen concludes, "When you look at the visual cues on the spectrogram, either on the computer or the analog machine, you see the same distribution, the same transition between the consonants and the vowels, the trajectory of the formants on the same words. They matched very well. My opinion was that it was probably [bin Laden], but not positive." www.medialinenews.com [Non-text portions of this message have been removed] 6872 From: John M Date: Mon Feb 3, 2003 10:44pm Subject: Stop telemarketers I've had these tones on the lead-in of my answering machine greeting for the last year or so. Hard to say absolutely how much of an effect it's had, since I don't have any before/after study or census of unsolicited sales calls. My rough feeling though is that it may have reduced the number of telemarketing calls a fair amount. Doesn't completely eliminate them, but it seems to help. You can download the tones from here: http://www.sandman.com/sounds/sit.wav Or just do a Google search for "SIT" or "special information tone". Doing this yourself is a heck of alot cheaper then forking out $45 for a Telezapper too. -------- Message: 7 Date: Sun, 02 Feb 2003 22:02:57 -0800 From: Gregory Horton Subject: Stop telemarketers Received this e-mail from a pal. Is this on the up and up? Subject: No Telemarket K. Alan Carlton, Professional Home & Building Inspection Consultant, Fort Worth, Texas 817 572-3300 Amateur Radio Operator N5GKY YES, YOU CAN STOP TELEMARKETERS ' annoying calls, or at least slow them down: Those 3 familiar tones courtesy of Ma-Bell will do the trick. __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com From: David Alexander Date: Thu Jan 29, 2004 6:06am Subject: RE: man flies Atlantic with 5 bullets in pocket > Date: Thu, 15 Jan 2004 16:24:58 -0000 > From:"David Alexander" > Subject:man flies Atlantic with 5 bullets in pocket > > The big news here in the UK this morning is that a man with a Sierra Leone > passport arrived at Heathrow Airport (London, England) with 5 rounds of > ammunition in his pocket. He arrived on a flight from the USA. > > I don't know if the US 'readers' of this list are aware of the > problems that > flights from the UK (and I suspect other countries too) have had. A lot of > flights have either been delayed or cancelled. A personal source in HMCS indicated that several of the UK delays were industrial actions by UK pilots & their unions. Having formerly had 450 unionized UK employees under my management and dealing first hand with the mechanisms their union put them up to, it would not be a surprising for this to have been part of the cause. You are right that a small part of the disruption has been down to the Airline Pilots, but over 80% of the problem is down to the US not giving the flights clearance. > Also we are very > unhappy with > the (in our opinion) the high-handed way that the US security authorities > have been dealing with other countries. For example, the FBI and DHS are > insisting that European countries flout their own privacy laws and supply > data about passengers that should not be in the public domain. The net > result among most people I know is quite simple - we're not coming to > America as long as this is in force. We have zero confidence in > the security > authorities to keep the information safe and not misuse it. The data is not to be released into the public domain, but rather is cooperative governmental information. We know that's what US Govt says it for, and I'm sure they mean it. Unfortunately we don't trust them to get it right. Their various agencies do not have a good track record- and once it's out there you can't get it back again. Was there a lot more than passenger lists and simple data for profiling (like methods of payment, citizenship/nationality, and such..) that was being shared? Yes, full biometric data from passports Much of that information was always available. I ended up being interviewed by Special Branch years ago for paying for tickets in cash, among other issues. The EU has dismantled their internal border systems to the point where after Canada & Mexico, the EU is a favored point for importing persons not desired in the USA. > > I'd just like to say that right now, we are laughing ourselves stupid. > > I know it's not you guys who read this list, please don't think > I'm having a > go at you personally, I'm not. Your postings show how dumba** you > think most > of this is and how ineffective it is on internal flights. Now you > know, it's > no better on the international ones either. > Airport security is (and in my estimation will always remain) marginally effective. The fellow had five rounds in his pocket. I've been in the secure areas of a commercial airport openly carrying ammo cans. Nobody asked me who, what or why. Having conducted numerous penetration inspections/exercises on supposedly secure facilities I've experienced a porosity of security that does not lead me to expect any "true security" in public facilities, like airports/airlines. Agreed, so why make it even more inconvenient and more hassle than it's worth. I'll do it for business trips (but not to the USA) but d*mned if I'll do it for a holiday. > Considering how long your sea and land borders are I'm sure that, if I > wanted to, I could get a whole platoon of 'illegals' into the USA without > detection or going anywhere near a scheduled flight. The general step-up at other ingress points is noticeable. Whether it is REMS and UGS in border areas, the cutting back of foliage and the implimentation of modest security on other transpost crossings, there has been a change. Even at a sleepy Manitoba/USA crossing there were armed Military on site and the increase in other measures was noticeable. I meant from a small boat into a sandy cove, or through the woods. I'm sure that the bad guys have no intention of sticking to 'comfortable', easy, routes. > I also think > that, with > the relatively low value of second-hand airliners at the moment, if I was > OBL and looking to repeat 9/11 I'd just buy a couple of old > soviet Aeroflot > transport aircraft and book them on 'one-way cargo runs' into the USA. > > My 2c. > > David Alexander > Dbi Consulting Ltd Valid issues. Expect that these types of vectors are a concern for any potential target country. Airborne & Seaborne infiltration of personnel & materials isn't all that hard, but there is no reason to make it as easy as a walk in the park. There's no reason to make it unacceptably harsh for me, or to risk my personal data either. The aggravation factor has gone up, but I don't think the level of security has, in real terms, increased by much. Certainly not enough to justify where it stands now. IMHO this is another example of the US authorities trying to use a sledgehammer to crack a nut which would be better opened by the use of lateral thought. It is worth remembering that important aspects of physical security include deterring the wrong doers and providing a comfort to the secured peoples at a level that lets them get on with life, albeit hopefully not in a false sense of invincibility & immunity. That's just the point - it's reached a level of discomfort for those of us who understand these issues As always your views from a UK vantage are enjoyed and appreciated. It does concern that you would consider not traveling over the issues. It does beg to wonder if the public demands for information sharing are only an acknowledgement of data long shared on a cooperative less public method. This kind of information sharing was not happening before - our European laws forbid it. Identity theft is a tiny fraction of the problem here in Europe that it is in the US because we have good laws to control data and privacy. Individuals have control and unequivocal redress against abusers. There has always been good co-operation for law enforcement and between the intelligence agencies on either side of the 'pond', but the transfer of full data about those who give no cause for suspicion is currently unacceptable. IMHO the main issue is that the US system needs fixing so it works properly - technology, procedures and people. Once that happens I will be happy to trust them with my data, but not until then. I will give you an example. A 66 year old Caucasian English man spent about 10 days in a South African jail because he was held by them after a request from the US authorities. The reason - his name was similar to the name of a terrorist suspect (who was black and in his twenties). It took the US 10 days to check the facts and say it wasn't the man they wanted, even though the South Africans sent pictures, fingerprints, etc immediately after they took the man into custody. I know how I would feel if that happened to me or my loved ones. Sorry if this seems like a rant, but I do feel very strongly about this subject. Steve W David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 8195 From: Date: Thu Jan 29, 2004 6:57am Subject: Ashcroft Thinks Patriot Act Will Stand Ashcroft Thinks Patriot Act Will Stand By CURT ANDERSON .c The Associated Press WASHINGTON (AP) - The Bush administration issued a veto threat Thursday against legislation introduced in Congress that would scale back key parts of the anti-terrorism Patriot Act. In a letter to Senate leaders, Attorney General John Ashcroft said the changes contemplated by the Security and Freedom Ensured Act, or SAFE, would ``undermine our ongoing campaign to detect and prevent catastrophic terrorist attacks.'' If the bill reaches President Bush's desk in its current form, Ashcroft said, ``the president's senior advisers will recommend that it be vetoed.'' The threat comes a week after Bush, in his State of the Union address, called for Congress to reauthorize the Patriot Act before it expires in 2005. The law, passed shortly after the 2001 terror attacks, expanded the government's wiretap and other surveillance authority, removed barriers between FBI and CIA information-sharing, and provided more tools for terror finance investigations. Civil liberties groups and some lawmakers, including Republicans, believe the act goes too far and endangers the privacy of innocent citizens. The SAFE Act, which has not yet had a hearing in either the House or Senate, was introduced last fall by Sens. Larry Craig, R-Idaho; Dick Durbin, D-Ill.; and other lawmakers of both parties. In a statement at the time, Craig said the bill was a ``measured'' response to concerns that the Patriot Act threatens civil liberties and privacy rights. ``This legislation intends to ensure the liberties of law-abiding individuals are protected in our nation's fight against terrorism, without in any way impeding that fight,'' Craig said. The bill would modify so-called ``sneak and peek'' search warrants that allow for delayed notification of the target of the search. In addition, warrants for roving wiretaps used to monitor a suspect's multiple cell phones would have to make sure the target was present at the site being wiretapped before information could be collected. The legislation also would reinstate standards in place prior to passage of the Patriot Act regarding library records by forcing the FBI to show it has reason to believe the person involved is a suspected terrorist or spy. In addition, the bill would impose expiration dates on nationwide search warrants and other Patriot Act provisions, providing for congressional review. Ashcroft, who last year embarked on a national speaking tour in support of the Patriot Act, said the legislation would ``make it even more difficult to mount an effective anti-terror campaign than it was before the Patriot Act was passed.'' The bill is S. 1709. On the Net: Congress: http://thomas.loc.gov Justice Department: http://www.usdoj.gov 01/29/04 12:42 EST [Non-text portions of this message have been removed] 8196 From: Steve Uhrig Date: Wed Jan 28, 2004 0:15pm Subject: Riser Bond TDR recall Hi all, Riser Bond, now known as Radiodetection Company, has issued a safety recall for their 6000 series TDRs. The specific models mentioned in the recall are 6000, 6000DSL, RD6000 (Standard, VF, DD) and 6000DT. There is a shock hazard, where under certain combinations of connection and operating conditions, the metallic parts of the connectors and case housing can become energized with potentially hazardous voltages. All units in this series are being taken out of service. Ultimately. the company will develop a mod for the unit to address the issues. That mod has not yet been released, so for now they're just recalling all units. Apparently they're taking this seriously, judging from the string of certified letters I've been receiving from them, seemingly one for every unit I've purchased. If you have one of the above, contact Mr. Chuck Morton of Radiodetection at 207-647-9495 x112 for instructions. Do NOT contact me. I am only the messenger. If you need a time tested and proven yellow box Riser Bond TDR (not the series mentioned above), I have several used units in stock at substantial discounts off the new price. All are in perfect condition, with accessories, documentation and new batteries. Info on Riser Bond products can be found on their website www.riserbond.com. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8197 From: Date: Thu Jan 29, 2004 7:51am Subject: Tracking kids 24/7 Tracking kids 24/7 Using high-tech products, parents can instantly find out where a child is or what he's doing on the computer. But what does this do to the parent-child relationship? By Jennifer Wolcott | Staff writer of The Christian Science Monitor In this high-tech era, when new electronic gizmos are unveiled almost every day, the term "parental controls" is taking on a whole new meaning. Besides limiting children's access to certain websites, parents can now keep tabs on the Internet sites they surf, read the instant messages and e-mails they send, and even delegate the task of monitoring screen time with a device they install in Junior's computer. But that's not all. The growing business of child surveillance now extends into the offline world, thanks to new GPS devices - including cellphones, wristwatches, and even a surgically implanted chip - that enable adults to track down kids almost anywhere. Adults who use these tools insist they provide a sense of security in today's world of Amber alerts, terrorist warnings, and online predators. Some even go so far as to say it would be neglectful not to use them. But many people warn that tracking devices can create big problems by eroding trust between parents and children. They ask, Are the benefits worth the risk? "What we are doing [with these tools] is diminishing our anxiety but increasing the odds that kids will want to do the wrong thing because they deeply resent their parents' mistrust," says family therapist Alvin Rosenfeld. As for the safety argument, Dr. Rosenfeld doesn't buy it. "It's astonishing the amount of anxiety in our society. Most abductions are by relatives, and online predators really don't come along that often. But when these things happen, the media focus on it so much that parents become terrified." The first to object to such child-surveillance devices, as one would assume, are often those being watched. Recently, one 10-year-old girl fired off this e-mail to spy-software consultant Joshua Finer: "I came across your website, and I think you are a freak! You're breaking the rules of privacy!" But most kids haven't a clue. According to Mr. Finer, the majority of parents who use spy software do it in stealth mode. Of the 20 million American children who access the Internet, about 50 percent of them are "being protected by Internet safety software," he says. Of those, 75 percent have filtering software and 25 percent spy software. C.T. O'Donnell is one parent who favors the use of these products. The father of two teens and president of KidsPeace, a national children's crisis charity, he feels strongly about parents informing their children they are looking over their shoulders and telling them why: "It's my job as a parent to protect you." If parents are going to keep track of a child's whereabouts and activities, it's best to be open about it, child therapists agree. Even then, they say, the use of spy software and other such devices can weaken the parent-child bond. "It all comes down to respect and trust," says Rosenfeld. If a child has done nothing to challenge a parent's trust in him, there's little reason to use the products, he feels. "If children prove themselves unworthy of being trusted, that's different." For his own kids, Rosenfeld believes in using what now seems almost old- fashioned: cellphones. His daughter is a new driver, so having a cellphone enables her to let her parents know when she's about to get on the road and when they can expect her home. A study by the Yankee Group of Boston found that among 11- to 18-year-olds, 56 percent own or use a cellphone. Also, 55 percent of parents say cellphones provide an added layer of security in case of an emergency. But Rosenfeld isn't about to plunk down extra cash for a cellphone that includes a GPS locator so he can track his daughter's whereabouts at all times. Others find this extra feature invaluable - for younger teens anyway. When Nicky Pratt, a stay-at-home mom in Garden City, N.Y., got GPS phones for her kids, the oldest - her 17-year-old son - refused to use it. And she didn't push it. "I can't blame him," she says. "I wouldn't have wanted that at his age. But he does have to check in with me." His younger siblings, on the other hand, thought the phones were cool. Now when they drop by a friend's home after school, they don't have to phone home since Mom can check her own GPS phone to see exactly where they are. "My 13-year-old son never was great at remembering to call," Ms. Pratt says, "so this keeps me from worrying. "Let's face it," she adds, "the world we live in is not the nicest of places." In his research on kid-locating devices, her husband, Tom, came across the wristwatches that feature not only a built-in GPS device but also buttons for calling home or the police. "They seemed bulky to me, and it was too easy to call 911," he says. "Besides, I liked the idea of putting everyone in the family on the same network." Those watches, marketed for kids ages 4 to 12, are locked onto children's wrists with a key, which parents keep. "It's like they're criminals," says Rosenfeld. Also controversial among parenting pros is spy software. Depending how much they want to know about what their children are up to online, parents can choose from among a wide variety of programs. They include IamBigBrother, which specializes in recording all incoming and outgoing instant messages; SpyAgent, which records all correspondence, whether it be instant messages, e-mails, or chat-room exchanges; and eBlaster, one of the most sophisticated and aggressive, which immediately forwards incoming and outgoing e-mails to a parent as they are sent. Xanovia also offers the ability to spy on webcam activity as well as to capture and compress screen shots. Instead of installing such intrusive programs, many parents opt for filtering software, which may deny access to unwanted websites, block pop-up or pop-under windows, and shut out many unwanted e-mails. And then there are those timers that can be installed in computers. Rick Cohen, inventor of EyeTimer, says parents are drawn to his product because it "takes them out of the role of being the bad guy." Instead of Mom or Dad shouting "time's up," the computer does it for them with 10-, five- and one-minute warnings before shutdown. "I realize it's not a substitute for being a good parent," says Mary Rable, a mother of three, "but you have to pick your battles, and this is one that's been eliminated for me." She allows her 10-year-old son and 7-year-old daughter to spend 45 minutes each on the computer per day, and she relies on EyeTimer to enforce that rule. Keeping kids from zoning out for hours in front of a computer is one of parents' greatest concerns today, says Mr. Cohen. Studies show that children spend an average of 35 hours per week in front of a screen, whether it be a computer or a TV. But some quibble with the idea of delegating important negotiations to an electronic device. Others go beyond that, questioning the long-term effects of all of this virtual parenting. "I'm concerned," says Wendy Simonds, an assistant sociology professor at Georgia State University, "that subsequent generations are going to take all this surveillance for granted and stop thinking about all the technology that surrou nds them and what it means. "Adults don't want to micromanage kids' lives," she adds, "but I understand the temptation to do that because this technology exists." It all goes back to the need for community, says Robert Butterworth, a Los Angeles therapist who studies families and technology. "When I was growing up, neighbors were always watching us, and we didn't want to mess up because somebody might tell [our parents]. That sense of community no longer exists because no one wants to get involved, so parents are forced to use technology." Full HTML version of this story which may include photos, graphics, and related links www.csmonitor.com | Copyright © 2004 The Christian Science Monitor. All rights reserved. For permission to reprint/republish this article, please email copyright@c... from the January 28, 2004 edition - http://www.csmonitor.com/2004/0128/p13s02-lifp.html [Non-text portions of this message have been removed] 8198 From: Date: Thu Jan 29, 2004 4:44pm Subject: Lawmakers kill eavesdropping bill Lawmakers kill eavesdropping bill By JUSTIN BERGMAN Associated Press Writer January 26 2004 RICHMOND, Va. -- A Senate committee Monday killed legislation that would have made it illegal to record a conversation without first getting the other person's consent. Sen. R. Creigh Deeds, D-Bath County, said his bill was in response to the Republican eavesdropping scandal of 2002, in which former state GOP executive director Edmund A. Matricardi III admitted he illegally listened in on and taped two Democratic Party conference calls. Matricardi pleaded guilty to a federal felony count of unlawful interception of a wire communication and was sentenced last July to three years of probation and fined $5,000. "Politicians are the ones that don't have this figured out," Deeds said. "It's happened too often in the past. It'll probably reappear." However, Republicans called the law unnecessary, saying Deeds was engaging in "political posturing." Sen. Kenneth W. Stolle, Senate Courts of Justice Committee chairman, said what Matricardi did was illegal, whether he recorded the conversation or not. "The factual scenarios don't have anything to do with one another," said Stolle, R-Virginia Beach. "What Matricardi got convicted of has always been illegal in Virginia. ... There's absolutely no excuse for doing what the party did in those circumstances. But what (Deeds') bill did had nothing to do with that." The bill would have made it a Class 1 misdemeanor not to obtain consent from every party on a conference call or other electronic communication before recording it. Law enforcement personnel would have been exempted. Claudia Tucker, chief of staff to former House speaker S. Vance Wilkins Jr., also pleaded guilty to a misdemeanor for listening in on one of the Democratic conference calls. She was fined $1,000 for one count of unauthorized publication of a wire communication. Stolle said it was "asinine" to create a huge expectation of privacy where it wasn't necessary. "I think it's political posturing," he said. "I don't know if he's trying to make a statement, what he's trying to do." The Courts of Justice Committee defeated the bill 7-4. The bill is SB250 On the Net: http://leg1.state.va.us/ Copyright © 2004, Daily Press [Non-text portions of this message have been removed] 8199 From: Date: Thu Jan 29, 2004 4:48pm Subject: 'Warspying' San Francisco 'Warspying' San Francisco Hobbyists explore the City by the Bay, as seen though its wireless cameras. By Kevin Poulsen, SecurityFocus Jan 28 2004 4:45PM Striding through San Francisco's busy financial district after dusk, 20-year-old Jake Appelbaum is an odd sight. His left hand is clutching the handle of a two-foot-long fiberglass pole wrapped in a metal spiral, which he holds high like a lance. The device is a directional antenna: a thin cable hangs between it and what looks like a handheld TV in Appelbaum's other hand. As he walks, Appelbaum studies the fluttering static on the receiver's LCD screen while rapidly thumb-clicking a button below it, occasionally glancing up to avoid slamming into other pedestrians on the sidewalk -- most of whom stare as he passes. "You get the Playboy Channel on that?," one asks. He doesn't. But at the corner of Mason and Post a clear black-and-white image flickers onto the 2.5 inch screen. It's the interior of an office: a clock and a piece of art can be seen above a desk cluttered with stacks of books. The view is angled sidewise and up towards a drop ceiling, and is partly obscured, giving the video feed a decidedly covert look. Watching the display, Appelbaum sweeps the antenna slowly, left to right, up and down, dowsing for the source of the signal, which seems to be emanating from an upper floor of a hotel. "That's a hidden camera right there," he says, with perhaps more confidence than is due. Applebaum is part of an informal three-person "warspying" expedition out to peek in on San Francisco's wireless cameras, and the image of the empty office is one of the more interesting finds of the evening. 'We kind of look at this as useless, recreational fun.' -- MWD A 2002 New York Times article first brought to light how easily outsiders could intercept the video from the inexpensive cameras sold by Seattle-based X10 Wireless Technology (once very familiar to netizens from a steady barrage of pop-up ads around the Web) using nothing more than the receivers sold with the cameras. Later that year, a how-to in 2600 magazine coined the phrase "warspying" to describe the sport of driving or walking around to sniff out wireless video signals from X10s and other cameras that share the unlicensed 2.4GHz band. The sport generally involves hacking up a standard 2.4GHz video receiver, equipping it with an external antenna connector, a long-lasting power supply and possibly an amplifier to boost its range. Hobbyists with more cash than soldering skills can spring for a $400 Icom IC-R3 scanner, capable of picking up wireless video signals and displaying them on a built-in two-inch LCD screen. "Experimenting with wireless video opens a whole new world for monitoring, whether for fun or security," reads the Icom webpage. "I have no doubt that there's people out there doing it right now," says Simon Byers, a researcher at AT&T Labs. "It's so easy, and it's highly entertaining. Just look at the amount of people being arrested for being peeping Toms each year, and all the psuedeo-voyeur type porn out there. I have no doubt that it's going on to a certain degree." But just what are the video sniffers picking up? If the San Francisco expedition late last week is any indication, the answer is, not all that much. The outing was organized by a 60-year-old techie and ham radio operator who asked to be identified only by his online moniker, "Massive White Dude." MWD first went warspying (he prefers the neutral term "warviewing") a year ago, and he experimented with a couple of different receivers and antennas to discover what he says is the best combination for the job. His receiver of choice is the Action ACN-53292, a sleek handheld unit sold as part of a system designed to let you retransmit your favorite cable TV shows and watch from anywhere in the house. The Action receiver doesn't scan through the video channels automatically (hence the need for vigorous button-pushing), but it sports a color LCD display, accepts an external antenna, and through an undocumented feature can tap four extra video channels that a standard X10 receiver misses. MWD found it in an airline catalog. "We kind of look at this as useless, recreational fun," he says, demonstrating the gear near a video hotspot he's already charted in the Potrero Hill district. There, images from two cameras fighting over the same frequency are grainy and dark. He gets better results a few blocks away, where he taps the signal from a pole-mounted freeway cam pointed at the San Francisco skyline. From near the highway he can see what the camera sees, in color, on his little Action receiver. Geek Appeal Once the expedition moves into uncharted territory, though, results become more rare. With Applebaum and another young hacker handling the equipment in the backseat, it takes half-an-hour of driving around in MWD's Volvo before the crew gets another hit near a city hospital. The screen shows a car pulling into a parking lot, the driver in a close-up reaching out to pluck a ticket from the dispenser. Out of the Volvo and on foot with the directional antenna, MWD and his apprentices zero in on the camera: it's at the entrance to the hospital's visitor lot -- a sign beneath the tinted dome warns that the area is under video surveillance. Thumbing though the other channels, the trio finds a view from a second camera, peering down from the ceiling of the parking attendant's booth. On screen, the attendant organizes some papers, steps to the other side of the booth and leans to the window to speak with a driver-unaware, presumably, that the ragtag clutch of strangers huddled across the street have a bird's-eye view of him. This kind of snooping doesn't violate federal wiretap laws, which generally protect audio communication, but not video, says Joseph Metcalf, an assistant professor at the University of Oregon law school. Moreover, the law keeps it legal to monitor radio transmissions that aren't encrypted or scrambled in any way, unless they're in a band specifically protected by statute, like analog cell phone signals. "If a communication is readily accessible to the general public, that communication is not protected by the federal Wiretap Act," says Metcalf. But MWD doesn't relish trying to explain that to the San Francisco Police Department. Even when he's not warviewing, he keeps a police scanner running in his car, to "keep an ear on the pulse on the city," and tonight it provides some comfort by not squawking out calls about strange men carrying alien-looking ray gun equipment, or driving slowly and suspiciously though the city's varied neighborhoods in an ominous black '64 Volvo. After the hospital parking lot, San Francisco's airwaves yield nothing through nearly two hours of driving and button-pushing. A cruise through family-friendly Noe Valley fails to produce a single wireless nanny-cam. The county jail, city hall, the library-- zip. Finally, in a gritty neighborhood of warehouses and adult video stores, MWD's gang starts sniffing out cameras again: finding signals from the car, then parking and closing in on foot. At a small grocery store, a tiny black X10 is mounted atop a hanging florescent light and pointed at the door. Outside an apartment building, a color image from a security camera shows an empty hall. A few other cameras pop up, but nothing exciting -- until the financial district, where on the same block as the office cam, MWD's receiver picks up the very freeway camera that marked the start of the expedition. The camera is more than two miles away, while most wireless video cameras have trouble reaching the curb. The appearance of the signal so far from its source energizes the team. "That's definitely the catch of the night there," says MWD. With a little detective work, MWD will eventually discover that the signal is a directional transmission from the camera to a local TV station that features the feed on its website and in its nightly newscast. His satisfaction at the discovery hints at the real nature of warspying: at least for MWD, the appeal isn't voyeuristic at all -- it's pure geek. The stroll through the financial district ends when Appelbaum notices a police car driving by a little too slowly as he waves the giant antenna around. The gang piles into the Volvo and heads out. "The problem is, if the cops take an interest in you while you're doing something like this, the only way to get out of the situation is to admit that you're a dork," says MWD. "I'd almost rather be taken back to the station." Copyright © 1999-2004 SecurityFocus NEWS < http://www.securityfocus.com/news/7931 > [Non-text portions of this message have been removed] 8200 From: James M. Atkinson Date: Fri Jan 30, 2004 0:34am Subject: NEW CPM-700 and Inexpensive 12 GHz Microwave Probe OK Folks, here it is. The CPM-700 is a great tool for any sweep team, in fact a sweep team should have at least 2 or 3 of this systems, and protective details should have one for each member of the detail. While it has always suffered from poor performance above 2 GHz (and was essentially deaf above 3 GHz) a new probe to boost this coverage from 2 to 12 GHz is now available, and I have uploaded an updated page on it to: http://www.tscm.com/cpm700a.html If you need TSCM gear then please consider buying it from Granite Island Group, our prices are very attractive, order turn around is fast, and we take all major credit cards, wire transfer, etc. When others are selling a Basic CPM-700 system for $2995 or more, we sell for only $2195... when they charge you $4395 for a system with the extra probes, we only charge $2752... sort of makes you scratch your head think for a minute. Check it out, and when you need sweep gear give us a call or email... you will not regret it. http://www.tscm.com/cpm700a.html -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8201 From: David Alexander Date: Fri Jan 30, 2004 4:28am Subject: US organisations irresponsible with customer data - now we have proof Further to my posting yesterday, here is the proof that my concerns are valid: Electronic Privacy Information Center (EPIC), Washington, D.C. http://www.epic.org/alert/EPIC_Alert_11.02.html ====================================================================== [1] EPIC FOIA Docs: Northwest Gave NASA Info on Millions of Passengers ====================================================================== EPIC has obtained documents through the Freedom of Information Act (FOIA) revealing that Northwest Airlines provided the National Aeronautics and Space Administration (NASA) with three months of passenger information for research purposes. Confirmation of the disclosure came after a two-year effort by EPIC to obtain information about the government's post-9/11 development of air travel security measures. In July 2002, EPIC received documents from the Transportation Security Administration showing that NASA met with Northwest officials in December 2001 to discuss NASA research, including the development of "non-invasive neuro-logic sensors" as well as passenger screening technology. Days later, NASA asked that Northwest provide "system-wide Northwest Airlines passenger data from July, August and September 2001" for use in NASA's "research and development work." In September 2003, it was reported that JetBlue Airways turned over passenger information to a Defense Department contractor for use in a data mining and passenger profiling study. At the time, a Northwest official told the New York Times, "we do not provide that type of information to anyone." In the wake of the JetBlue incident, EPIC submitted a FOIA request to NASA asking for records related to negotiations for passenger information with Northwest or other airlines. In response, NASA provided EPIC documents confirming that Northwest gave NASA three months of passenger information for use in a data mining and passenger profiling study. The documents show that in September 2003 NASA returned to Northwest the CDs on which the passenger data were provided, after retaining the data for nearly two years. In an e-mail message to Northwest, a NASA researcher noted, "you may have heard about the problems that JetBlue is now having after providing passenger data for a project similar to ours." David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 8202 From: James M. Atkinson Date: Fri Jan 30, 2004 1:32pm Subject: X10 Files... for Chapter 11 X10 files for Chapter 11 By Paul Festa Staff Writer, CNET News.com http://news.com.com/2100-1014-5095260.html Story last modified October 22, 2003, 3:16 PM PDT The company that only last year billed itself as the world's largest online advertiser has filed for Chapter 11 bankruptcy protection. X10 Wireless Technology, which marketed its Net cameras through a vast campaign of Web pop-under advertisements, made the filing on Tuesday in the U.S. Bankruptcy Court for the Western District of Washington. The filing came one day before the company faced a hearing in Orange County Superior Court for punitive damages following its loss to a tiny ad start-up called Advertisement Banners.com, based in Anaheim, Calif. That company had alleged that X10 had stolen its method of serving pop-under ads, or ads that show up beneath a Web page and remain on the screen once the window is closed. On Oct. 7, the jury in the case awarded Advertisement Banners $4.3 million in compensatory damages, according to court records. The judge issued a gag order Tuesday in the case that will last until the jury is dismissed. X10 and its bankruptcy attorney did not return calls. Attorneys for Advertisement Banners cited the gag order in declining to comment. Under Chapter 11 bankruptcy protection, a company typically continues to operate, shielded from creditors, while it reorganizes its finances. Court documents revealed that at Wednesday's punitive damages hearing, X10 told the court it had filed for bankruptcy protection, and the court put off the punitive damages hearing until Nov. 18. The filing reveals some financial details of a company that had made itself known throughout the Web for its ubiquitous pop-under campaign and yet remained secretive about its operations. The privately held firm, based in Kent, Wash., estimated its assets at between $1 million and $10 million, and its debts at between $10 million and $50 million. Advertisement Banners is by far the company's largest creditor, to the tune of $3.9 million, according to the filing. X10 owes Los Angeles law firm Sheppard Mullin Richter Ham $667,412; Microsoft $459,264; Yahoo $346,128; Google $69,984; and America Online $55,413. It also owes $95,047 to Overture Services, which was recently acquired by Yahoo. X10 filed what the bankruptcy court termed a "deficient" filing, meaning that it lacked a statement of its financial affairs. The court set a 15-day deadline for the completion of the filing, or X10 risks a dismissal. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8203 From: contranl Date: Fri Jan 30, 2004 8:40am Subject: Video-scanners . . Why do i keep on reading that the icom ic-r3 is such a handy device to receive wireless video-cameras in the 2,4 ghz band ???? I like to point out that : IT DOES NOT WORK ! Sensitivity is absolutely zero and of no use. The first 4 channel home-video receiver (2,4 ghz link) that you can buy on every corner of the street is a 1000 times better. Shure...Icom has made some nice products...but this one is a failure I can only conclude that any company selling and advertising the ic- r3 is making a fool of it self and prooving at the sametime that they have no experience in this area. On top of that the frequency range is to limited and does not cover all used channels. I do make a good receiver myself that does work good and is specially designed for the purpose of discovering unknown video- transmissions. It covers 2200~2600 mhz and 1000~1400 mhz at the same time (2 receivers parallel). Monitor will switch on automatically and a alarm will sound when a valid video signal is received.(sync-detectors) Search speed is high enough to use it even while driving at a reasonable speed without missing a signal. It will also alert you to other signals such as microwave/radar/wlan/ spreadspectrum/freq-hopping signals by showing the typical patterns on the built-in lcd videoscreen Check it out at: www.tetrascanner.com in the "other projects section" Thanks Tetrascanner Amsterdam The Netherlands . 8204 From: Steve Weinert Date: Thu Jan 29, 2004 0:24pm Subject: RE: man flies Atlantic with 5 bullets in pocket (Note - I've tried to repair the "> "to make sense of who typed which statements! > -----Original Message----- > Date: Thu, 29 Jan 2004 12:06:40 -0000 > From: "David Alexander" > Subject: RE: man flies Atlantic with 5 bullets in pocket > > > Date: Thu, 15 Jan 2004 16:24:58 -0000 > > From:"David Alexander" > > Subject:man flies Atlantic with 5 bullets in pocket > > ...... > > The data is not to be released into the public domain, but rather is > > cooperative governmental information. > We know that's what US Govt says it for, and I'm sure they mean it. > Unfortunately we don't trust them to get it right. Their various > agencies do > not have a good track record- and once it's out there you can't > get it back > again. I think as valid as your concerns are, they are concerns you should extend to include both the UK Gov & the "crown". A couple visits to Cheltenham might be enlightening.... You are right to be concerned. > > > > Was there a lot more than passenger lists and simple data for profiling > > (like methods of payment, citizenship/nationality, and such..) that was > > being shared? > > Yes, full biometric data from passports Only the newest even have this information, which the EU requires as part of the priviledge of gaining use of an EU passport. > > > > > I'd just like to say that right now, we are laughing ourselves stupid. > > > > I know it's not you guys who read this list, please don't think > > I'm having a > > go at you personally, I'm not. Your postings show how dumba** you > > think most > > of this is and how ineffective it is on internal flights. Now you > > know, it's > > no better on the international ones either. > > > > > Airport security is (and in my estimation will always remain) marginally > > effective. The fellow had five rounds in his pocket. I've been in the > > secure areas of a commercial airport openly carrying ammo cans. Nobody > > asked me who, what or why. > > Having conducted numerous penetration inspections/exercises on supposedly > > secure facilities I've experienced a porosity of security that > > does not lead > > me to expect any "true security" in public facilities, like > > airports/airlines. > Agreed, so why make it even more inconvenient and more hassle than it's > worth. I'll do it for business trips (but not to the USA) but > d*mned if I'll > do it for a holiday. The inconvience? Peeved is more likely. On a broader view of this, it is amazing how much information is actually out there. Financial, the wee things like changes in your deliveries and phone use records, that are only "sort" of private. The UK's intensive use of Big Brother technology (cameras mostly) amazes the man on the street from the USA point of view. It is an interesting world, eh?! > > > Considering how long your sea and land borders are I'm sure that, if I > > wanted to, I could get a whole platoon of 'illegals' into the > USA without > > detection or going anywhere near a scheduled flight. > > > The general step-up at other ingress points is noticeable. Whether it is > > REMS and UGS in border areas, the cutting back of foliage and the > > implimentation of modest security on other transpost crossings, there has > > been a change. Even at a sleepy Manitoba/USA crossing there were armed > > Military on site and the increase in other measures was noticeable. > > I meant from a small boat into a sandy cove, or through the > woods. I'm sure > that the bad guys have no intention of sticking to 'comfortable', easy, > routes. > REMS & UGS ..... (remote electronic monitoring systems & unattended ground surveilance)... I was surprised to be quizzed after boating across the border to clear some reefs in an extremely remote local, as we never landed on the other side. Borders are very "holely" - in the pre-EU Europe I got myself in a smidge of a bind as I had ended up in Switzerland and wanted to exit to Germany but couldn't show how I got there (I had taken my car in through France while, let's say, "sightseeing" at an unmarked, umonitored crossing). The EU's external borders are considered very open - with much of the same logistics issues in security as the USA has. > > > Valid issues. Expect that these types of vectors are a concern for any > > potential target country. Airborne & Seaborne infiltration of personnel & > > materials isn't all that hard, but there is no reason to make it > > as easy as > > a walk in the park. > > There's no reason to make it unacceptably harsh for me, I've somehow missed how it is difficult or "harsh". Over a beer I'd love to chat about some of the interviews I was at the receiving end of in the UK with Customs and such.... Harsh is three trips to Ringway trying to fly out, but being kept off the flight because the UK Gov wasn't sure who was who and basically didn't seem ready to let the travel begin. > or to risk my > personal data either. The aggravation factor has gone up, but I > don't think > the level of security has, in real terms, increased by much. Certainly not > enough to justify where it stands now. IMHO this is another example of the > US authorities trying to use a sledgehammer to crack a nut which would be > better opened by the use of lateral thought. Suggestions for a better way? The UK Gov & the "crown" collected a huge amount of information when my visa was done and updated to other statuses. Invasionary? Maybe... but then they had something I needed, so I considered it a trade. > > > It is worth remembering that important aspects of physical > > security include > > deterring the wrong doers and providing a comfort to the secured > > peoples at > > a level that lets them get on with life, albeit hopefully not in a false > > sense of invincibility & immunity. > > That's just the point - it's reached a level of discomfort for those of us > who understand these issues > > > As always your views from a UK vantage are enjoyed and > > appreciated. It does > > concern that you would consider not traveling over the issues. > > It does beg > > to wonder if the public demands for information sharing are only an > > acknowledgement of data long shared on a cooperative less public method. > > This kind of information sharing was not happening before - our European > laws forbid it. Identity theft is a tiny fraction of the problem here in > Europe that it is in the US because we have good laws to control data and > privacy. Individuals have control and unequivocal redress against abusers. > There has always been good co-operation for law enforcement and > between the > intelligence agencies on either side of the 'pond', but the > transfer of full > data about those who give no cause for suspicion is currently > unacceptable. Having worked hand in hand with several European outfits, including Police/CID types, I'm much less optomistic that the EU laws have kept your identity data private or even privvy to only government. > IMHO the main issue is that the US system needs fixing so it works > properly - technology, procedures and people. Once that happens I will be > happy to trust them with my data, but not until then. > I will give you an example. A 66 year old Caucasian English man > spent about > 10 days in a South African jail because he was held by them after > a request > from the US authorities. The reason - his name was similar to the > name of a > terrorist suspect (who was black and in his twenties). It took the US 10 > days to check the facts and say it wasn't the man they wanted, even though > the South Africans sent pictures, fingerprints, etc immediately after they > took the man into custody. I know how I would feel if that > happened to me or > my loved ones. This was in the news and at face value sounded to be a hugely bungled event. The media seemed to have dropped all coverage once he was freed and the problem(s) were never outted. > Sorry if this seems like a rant, but I do feel very strongly about this > subject. > > David Alexander As I said, your views are greatly appreciated and with sympathy. Almost makes one want to get a Sealand Passport and disappear off the radar screen in that way. Do hope you change your mind and "risk" the adventure of popping across the pond. With the weak dollar it is a great value for UK based travelers! First beer is on me! Steve W 8205 From: Date: Mon Feb 2, 2004 9:18am Subject: New Camcorders Put Tape on Notice New Camcorders Put Tape on Notice By Daniel Greenberg Special to The Washington Post Sunday, February 1, 2004; Page F07 If videotape is not quite dead yet, it sure feels antique: We no longer mess with loops of tape to listen to music or watch movies, so why do we have to bother with it to make them? Manufacturers, however, are finally catching up to the times. Two new, absurdly small camcorders, Panasonic's D-Snap SV-AV100 and the Fisher FVD-C1 CameraCorder, can untie you from tape, instead using postage-stamp-size SD Cards to record video. The tiny memory cards allow these camcorders to weigh only six ounces each and fit neatly into a hand, purse or pocket -- unobtrusive enough to feel like a spy camera, and far smaller than even the most compact DVD-R camcorder, until now the only way to go tapeless. And the speed of flash memory means both models can upload movies to a computer far faster than any tape-based camcorder. The price for such portability and convenience? About a thousand dollars, and then some. The Fisher camcorder runs $900, the Panasonic $1,000. Each includes a capacious 512-megabyte SD Card -- but even that won't hold more than 30 minutes of video at close-to-DVD quality settings (640 by 480 video at 30 frames per second). If you opt for the Panasonic's 704-by-480 higher-quality mode, your recording time drops to just 10 minutes. You can switch to lower-quality settings -- for example, 320 by 240 pixels, on par with VHS, and 176 by 144, closer to Web video -- but they look grainy in comparison. Just buying a bigger card isn't quite practical yet; only one vendor, SanDisk, even makes a one-gigabyte SD Card, and it's only available at "select retailers" for a list price of $500. If you can discipline your use -- or if you don't mind carrying around a holsterful of 512GB SD Cards -- what do you get with each gadget? Both exhibit the same basic design, with flip-up color LCD screens that can be pivoted into a variety of useful and flexible positions. (The Panasonic's display is larger, but not as sharp.) Both camcorders have optical zoom lenses, but the Panasonic's works faster and goes further -- 10x to the Fisher's 5.8x zoom. Both come with small remote controls, USB 2.0 cables (not the usual FireWire connection) for fast file transfers, rechargeable batteries and docking cradles for easy recharging and picture transfer. Enthusiasts will find a variety of manual settings to play with, such as white balance and manual focus. The Fisher wins the overall ergonomic competition with its more comfortable shape and a sensible button layout that puts all the essential controls right under the thumb. The Panasonic camcorder feels more cluttered -- the all-important navigation cursor is hidden under the flip-out LCD screen and arranged at an odd angle. Fisher also beats Panasonic with its software bundle, which includes Ulead's PhotoExplorer 8 and VideoStudio 7. Panasonic's basic MediaStage software was good only for organization, not editing. And the company's installer routine shows such signs of sloppiness as poorly translated prompts ("Do you make the shortcut of Media Stage in the desktop computer?") and driver software that hadn't passed Microsoft compatibility testing. Both of these camcorders can double as digital still cameras, but only the Fisher includes a flash and a choice of resolutions -- two and three megapixel modes in addition to the appallingly low 640-by-480 resolution the Panasonic is stuck at. It also lets you shoot a still photo while filming, a very convenient option in practice. These two cameras are more notable for what they suggest about the future than what they can do now. Imagine, in particular, if you could combine the Panasonic's higher-quality video modes with the Fisher's ease of use. And if the results didn't cost double or triple the going rate for a tape-based digital camcorder. Until then, digital videotape such as MiniDV, for all its bulk, weight and overall inconvenience, remains the affordable, practical solution. [Non-text portions of this message have been removed] 8206 From: James M. Atkinson Date: Mon Feb 2, 2004 10:15pm Subject: Road Bomb 'Jammers' Being Used in Iraq washingtonpost.com Road Bomb 'Jammers' Being Used in Iraq By JOHN J. LUMPKIN The Associated Press Friday, January 30, 2004; 4:30 PM WASHINGTON - U.S. soldiers riding in convoys in Iraq are relying on electronic "jammers" to help protect against the roadside bombs insurgents have used to deadly effect. The anti-bomb technology isn't perfect, however. In some cases it only delays a bomb from detonating, so it can still explode and kill bystanders. It's unclear how widely the jammers - the same technology that saved Pakistan's leader from a recent assassination attempt - are being used in Iraq. Gen. Peter J. Schoomaker, the Army's chief of staff, acknowledged their use in testimony this week before the House Armed Services Committee, but he declined to discuss the bomb defenses in detail. The military does not want to provide useful information to Iraqi insurgents, officials say. Rep. Gene Taylor, D-Miss., suggested few are being used. "The Iraqis have figured out if they hit that detonator enough times, they're going to kill a vehicle that does not have a jammer," Taylor told Schoomaker. "The percentage of vehicles that have some form of electronic jammer - it is minuscule, and I know it, you know it, and the Iraq insurgents know it." But Schoomaker said protection doesn't depend on universal use. "Every vehicle doesn't have to be equipped," he said. "You have to have groups of vehicles that have that kind of capability, under an umbrella." The jammers work by preventing a remotely transmitted signal - say, rigged from a cell phone - from detonating an explosive when the bomber presses the button. Depending on the distance, power and design of the jammer, some might prevent the bomb from going off. Others might instead set it off before or after the convoy passes - potentially wreaking havoc on bystanders. Roadside bombs have been primary killers of U.S. troops in Iraq. Many go off under passing convoys, killing or injuring the occupants of one of the vehicles. But in some cases, they have gone off only after a convoy has passed. That can be a sign that a jammer on one of the vehicles did its job, said James Atkinson, head of the Granite Island Group, a Gloucester, Mass.-based security and counterespionage firm. Anti-bomb jammers have been in use since the early 1980s, Atkinson said. Military aircraft have used them for decades, and versions of anti-jamming technology are advertised on the Internet. It's unclear if those versions are effective, however. Depending on their sophistication, jammers can cost from hundreds to millions of dollars. Most can be powered by a car engine. Some work by transmitting on frequencies that bombers are known to use. Guerrillas frequently rig remote-controlled detonators out of garage door openers, car alarm remotes or cellular phones, Atkinson said. Others, called barrage jammers, put out signals on a wide range of frequencies, he said. These will knock cellular phones and CB radios off the air in a given area. Both kinds can cause a premature or late detonation of a bomb, or prevent it from going off entirely. "When you see a car bomb that goes off several blocks away from its intended target, it's usually a dead giveaway it was jammed," Atkinson said. Jamming devices carried in the motorcade of Pakistan's President Pervez Musharraf delayed the detonation of a huge bomb that exploded moments after his limousine passed over a bridge near the capital Dec. 14, Pakistani intelligence has said. Since then, Pakistan has imported more jamming devices for security of VIPs, a senior government official told The Associated Press on the condition of anonymity Thursday. He refused to give further details, including where the devices were imported from, citing security reasons. In Israel, a special unit in the Ministry of Defense developed jamming technology in the early 1990s and used it extensively in southern Lebanon in the mid- to late 1990s in an effort to neutralize roadside charges placed by Hezbollah. It is unclear what defenses exist against other kinds of bombs, such as those that rely on timers or are hard-wired to a switch. Pakistani officials claimed their jamming devices also interrupted a timer. In Iraq, employing the jammers is one of a number of steps the military is taking to protect vehicles and soldiers. Others include deploying a more heavily armored Humvee and giving soldiers improved body armor. "We've taken some major moves there that are paying off, in my view." Schoomaker said. In Baghdad, a military official said the Iraqi bombs have varied widely in sophistication. "Our soldiers have become ... very adept at noticing, observing," said Brig. Gen. Vincent Boles, commander of the 3rd Corps Support Command. "We're discovering more than are exploding." © 2004 The Associated Press ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 8207 From: Date: Tue Feb 3, 2004 9:29am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 8208 From: James M. Atkinson Date: Tue Feb 3, 2004 6:20pm Subject: New 2047 U/C For Sale I am offering for sale another NEW 2047 U/C Ultrasonic Stethoscope. You can read about this model at: http://www.tscm.com/mlk2047.html I am asking $1145, and I can take all major credit cards. The first person to pony up payment gets the item. Only offered for sale in the US, and will only be shipped to a US address. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8209 From: Patrick Ryals Date: Tue Feb 3, 2004 1:54pm Subject: RE: New Camcorders Put Tape on Notice Unfortunately for the vast majority of investigative/evidence related purposes of our industry - you can't afford to leave a $200 to $500 SD card lying around as "evidence". Until a non-tape alternative arrives that meets the low cost of tape - we're stuck with it. Sincerely, Patrick Ryals Nexus Investigations, Inc. LA CA#22920 Message: 1 Date: Mon, 2 Feb 2004 15:18:38 EST From: MACCFound@a... Subject: New Camcorders Put Tape on Notice New Camcorders Put Tape on Notice By Daniel Greenberg Special to The Washington Post Sunday, February 1, 2004; Page F07 If videotape is not quite dead yet, it sure feels antique: We no longer mess with loops of tape to listen to music or watch movies, so why do we have to bother with it to make them? Manufacturers, however, are finally catching up to the times. Two new, absurdly small camcorders, Panasonic's D-Snap SV-AV100 and the Fisher FVD-C1 CameraCorder, can untie you from tape, instead using postage-stamp-size SD Cards to record video. The tiny memory cards allow these camcorders to weigh only six ounces each and fit neatly into a hand, purse or pocket -- unobtrusive enough to feel like a spy camera, and far smaller than even the most compact DVD-R camcorder, until now the only way to go tapeless. And the speed of flash memory means both models can upload movies to a computer far faster than any tape-based camcorder. The price for such portability and convenience? About a thousand dollars, and then some. The Fisher camcorder runs $900, the Panasonic $1,000. Each includes a capacious 512-megabyte SD Card -- but even that won't hold more than 30 minutes of video at close-to-DVD quality settings (640 by 480 video at 30 frames per second). If you opt for the Panasonic's 704-by-480 higher-quality mode, your recording time drops to just 10 minutes. You can switch to lower-quality settings -- for example, 320 by 240 pixels, on par with VHS, and 176 by 144, closer to Web video -- but they look grainy in comparison. Just buying a bigger card isn't quite practical yet; only one vendor, SanDisk, even makes a one-gigabyte SD Card, and it's only available at "select retailers" for a list price of $500. If you can discipline your use -- or if you don't mind carrying around a holsterful of 512GB SD Cards -- what do you get with each gadget? Both exhibit the same basic design, with flip-up color LCD screens that can be pivoted into a variety of useful and flexible positions. (The Panasonic's display is larger, but not as sharp.) Both camcorders have optical zoom lenses, but the Panasonic's works faster and goes further -- 10x to the Fisher's 5.8x zoom. Both come with small remote controls, USB 2.0 cables (not the usual FireWire connection) for fast file transfers, rechargeable batteries and docking cradles for easy recharging and picture transfer. Enthusiasts will find a variety of manual settings to play with, such as white balance and manual focus. The Fisher wins the overall ergonomic competition with its more comfortable shape and a sensible button layout that puts all the essential controls right under the thumb. The Panasonic camcorder feels more cluttered -- the all-important navigation cursor is hidden under the flip-out LCD screen and arranged at an odd angle. Fisher also beats Panasonic with its software bundle, which includes Ulead's PhotoExplorer 8 and VideoStudio 7. Panasonic's basic MediaStage software was good only for organization, not editing. And the company's installer routine shows such signs of sloppiness as poorly translated prompts ("Do you make the shortcut of Media Stage in the desktop computer?") and driver software that hadn't passed Microsoft compatibility testing. Both of these camcorders can double as digital still cameras, but only the Fisher includes a flash and a choice of resolutions -- two and three megapixel modes in addition to the appallingly low 640-by-480 resolution the Panasonic is stuck at. It also lets you shoot a still photo while filming, a very convenient option in practice. These two cameras are more notable for what they suggest about the future than what they can do now. Imagine, in particular, if you could combine the Panasonic's higher-quality video modes with the Fisher's ease of use. And if the results didn't cost double or triple the going rate for a tape-based digital camcorder. Until then, digital videotape such as MiniDV, for all its bulk, weight and overall inconvenience, remains the affordable, practical solution. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ------------------------------------------------------------------------ Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ ------------------------------------------------------------------------ 8210 From: savanted1 Date: Fri Feb 6, 2004 2:05pm Subject: Justice Department asks FCC to address VoIP wiretapping In a letter to the Federal Communications Commission (FCC), written on behalf of the FBI, the Drug Enforcement Administration and the US Justice Department, FBI Deputy General Counsel Patrick W. Kelley urges federal communications regulators to delay setting rules for Voice-over-Internet Protocol (VoIP) systems until law enforcement and national security concerns can be addressed. Law enforcement agencies worry that it may be difficult to place wiretaps on VoIP systems in the same way as surveillance is possible for 'regular' telephones. VoIP allows voice calls to be placed digitally over broadband Internet connections. Communications companies would like the FCC to clarify VoIP rules. Opponents of regulation fear that measures to allow monitoring of conversations would be costly, could stifle innovation and jeopardize privacy. http://www.siliconvalley.com/mld/siliconvalley/news/editorial/7884914 .htm 8211 From: Date: Sat Feb 7, 2004 0:33am Subject: Ears added to electronic eyes to secure Athens Olympics Ears added to electronic eyes to secure Athens Olympics Microphones that will listen to street noise during the Olympic Games are being added to surveillance cameras around the city to improve security, Greece's public order minister said Thursday. "If there is an explosion, we must be able to hear sound in real time. We can't wait for someone to make a phone call," Giorgos Floridis said. The decision could add to protests against a giant surveillance system being installed around the capital. Several public demonstrations against Olympic security are being planned for this month. In January, the mayor of an Athens suburb hosting the Olympic weightlifting event ordered municipal works to spray paint three cameras after residents complained about their right to privacy. During the Olympics, stationary cameras around Athens will operate from 1,250 concrete columns 12 meters tall. Hundreds of cameras will also be installed at venues and other points around the city in addition to surveillance equipment on helicopters and a blimp. Floridis insisted cameras will be vital for security during the Aug. 13-29 Games and flatly denied that the cone-shaped microphones will be used to monitor conversations or broadcast instructions to bystanders. http://english.eastday.com/epublish/gb/paper1/1170/class000100002 /hwz180541.htm [Non-text portions of this message have been removed] 8212 From: Spook Date: Sat Feb 7, 2004 5:27pm Subject: More Bomb Technician/EOD Ultrasonic Stethoscopes for Sale I have two more 2047 U/C Ultrasonic Stethoscopes for sale. These are primarily use by bomb technicians and EOD specialists, and are commonly used to detect certain types of low level sounds emitted by clock mechanisms, timing devices, and so on. These are also very useful in finding hidden tape recorders and video recorders as it allows the TSCM specialist to listen to the ultrasonic noise which is otherwise inaudible to the human ear. The first unit I am offering is used, but in excellent condition with both the contact microphone, and the ultrasonic probes. Also it included the under-the-chin headphones, and leather case and everything is in almost as new condition. I an asking $800 dollars for this first unit. The second unit is also in good condition, but does not include the ultrasonic probe, or the leather case. This second unit is in used condition, but has not been abused in anyway and is fully operational and includes the contact microphone. I am asking $500 for this second unit. You can read about this model at: http://www.tscm.com/mlk2047.html I can take all major credit cards, but the equipment is only being offered for sale in the US, and will only be shipped to a US address. Please email if your interested. -jma 8213 From: James M. Atkinson Date: Sun Feb 8, 2004 2:29am Subject: Re: More Bomb Technician/EOD Ultrasonic Stethoscopes for Sale Oops, I also forgot to mention that I also accept funds via PayPal under the user name of "jmatk@tscm.com"(of course if you just feel like sending donations you can use the same PayPal account -jma At 06:27 PM 2/7/2004, Spook wrote: >I have two more 2047 U/C Ultrasonic Stethoscopes for sale. These are >primarily use by bomb technicians and EOD specialists, and are commonly >used to detect certain types of low level sounds emitted by clock >mechanisms, timing devices, and so on. These are also very useful in >finding hidden tape recorders and video recorders as it allows the TSCM >specialist to listen to the ultrasonic noise which is otherwise inaudible >to the human ear. > >The first unit I am offering is used, but in excellent condition with both >the contact microphone, and the ultrasonic probes. Also it included the >under-the-chin headphones, and leather case and everything is in almost as >new condition. I an asking $800 dollars for this first unit. > >The second unit is also in good condition, but does not include the >ultrasonic probe, or the leather case. This second unit is in used >condition, but has not been abused in anyway and is fully operational and >includes the contact microphone. I am asking $500 for this second unit. > >You can read about this model at: http://www.tscm.com/mlk2047.html > > I can take all major credit cards, but the equipment is only being >offered for sale in the US, and will only be shipped to a US address. > >Please email if your interested. > >-jma > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8214 From: Date: Sun Feb 8, 2004 3:40am Subject: Probe taps city, piece by piece Posted on Sun, Feb. 08, 2004 Probe taps city, piece by piece By Emilie Lounsberry and Nancy Phillips Inquirer Staff Writers Follow the bugs. First, the FBI tapped the phones of a Muslim cleric and businessman operating out of a rundown building in Mount Airy. Then, they tapped the phone at the plush Center City office of √ºber-lawyer Ronald A. White, a wealthy power broker obscure to the public but well-known to the politicians who coveted his campaign cash. Next, federal authorities tapped the city's treasurer, an eager young acolyte of White's who helped dole out lucrative city bond work. Finally came the big leap: a bug in the mayor's office. In textbook fashion, federal investigators have taken ever bolder steps as they ratchet up their investigation into municipal corruption in Philadelphia. They have mounted what Mayor Street recently described as a "wider and wider-range probe, kind of all over the place." By the time the bug was pulled out of the ceiling of the mayor's office four months ago, the FBI already had reams of evidence: spools of tape from at least eight phone taps and three office bugs, for starters. Now, federal authorities are nearing the final phase before indictments. Prosecutors are reviewing tapes, calling witnesses before the grand jury, and squeezing anyone they believe committed a crime. Their message: Cooperate, turn on others, or risk a long prison sentence. Textbook. As the investigation unfolds, voters cynical about City Hall have had plenty of cause to grow more so. What has come to light amid the flood of subpoenas - at least six city agencies, two members of the mayor's staff, and more than 50 firms have been hit - is not savory. Money managers paid a cool $1 million for "introductions" to the pension board. Airport concessions granted to "disadvantaged" entrepreneurs rolling in money. Contracts renewed despite warnings that no work was being done. Debt collectors, developers, airport bars and newsstands, construction companies, money managers, banks, printers, law firms, consultants, investment houses, car-rental firms - all have come under FBI scrutiny. While the probe has awakened public attention to Philadelphia's entrenched pay-to-play tradition, federal authorities also are pursuing something much more clear-cut and unambiguously illegal: extortion, mail fraud, wire fraud and racketeering. Investigators have seized computers and confiscated e-mail. They have taken the mayor's BlackBerry handheld devices. They have subpoenaed his financial records from Commerce Bank, along with those of his wife and his son. And they have combed through his campaign-finance reports. But the most extraordinary move - the placement of the bug inside the mayor's office - yielded nothing. No conversations were recorded during the two weeks the bug was in place, according to federal documents. The mayor has said he has done nothing wrong. FBI and IRS agents are following the flow of money that drives city business in an investigation that has spanned more than two years. Although all kinds of city contracts are under review, it is clear that the FBI and U.S. Attorney's Office have been examining the city's affirmative-action agenda. The picture is not pretty. Programs to give a leg up, a city contract, to the disenfranchised have been manipulated to help the wealthy or well-connected, or both. The losers have been the hundreds of struggling minority firms with no political juice. Predictably, perhaps, this has stirred a backlash. Resentment at the probe helped fuel Street's reelection. African Americans are not the only ones wondering why the the murky linkage between city contracts and campaign contributions was suddenly being scrutinized when blacks began benefiting from it. In time, transcripts of conversations secretly recorded by the FBI will provide a clearer picture of what may be a municipal corruption investigation of unprecedented scope in Philadelphia. Indictments are on the way, court system sources say. "They really want to take it to City Hall," said one lawyer with knowledge of the investigation. "A lot will depend on what they have on tape." In City Hall, meanwhile, a gallows humor prevails. One joke making the rounds among Street aides: What do we call the time when we fielded questions about a Molotov cocktail tossed at the office of the mayor's opponent? The good old days. ‚Ä¢ Who is on the tapes? Who is cooperating? How far up will it go? Politicians, business people and the public are bracing for the answers to those questions. The answers will likely have much to do with two men: Ronald A. White and Imam Shamsud-din Ali, a pair with some striking differences and similarities. White, 54, is big. He carries perhaps 250 pounds on his short, strong frame. He is ebullient, a lover of the good life. Ali, 64, is the spiritual one. He is slender and soft-spoken. Both have made much of themselves from tough beginnings. White grew up in the Richard Allen Homes projects, fatherless, but went on to earn a law degree from the University of Pennsylvania. Ali, born Clarence Fowler, spent five years in prison in the 1970s on a murder conviction before the courts overturned the case. He is now one of the city's leading Muslim clerics. The two are friends; White represented Ali in his 1992 divorce. The pair have something more in common. They have been important political allies of Mayor Street's. And they have been cut in on city business. When it comes to that, White has been far the more successful. A lawyer who raised hundreds of thousands of dollars for two political-action committees, White has been paid more than $1.6 million since 1996 for legal work for the city, its employee pension fund, and other agencies. White has a connection to virtually every area investigators are known to be scrutinizing. At the Philadelphia Housing Authority, where federal investigators have requested records of about 30 individuals and companies, White has done legal work and bond work. At the city Redevelopment Authority, where records also are being sought, White helped represent the authority on all but one of its bond issues from November 2000 through June 2003. At Philadelphia International Airport, federal prosecutors have subpoenaed records of two companies owned by White's wife that have shares in several newsstands and restaurants. Nine days after the discovery of the bug in the mayor's office, FBI agents seized more than 50 boxes of documents from White's Center City office, including boxes with markings that read: PHA, Tasker Homes and Bonds 2002. In city political circles, White was viewed as an unofficial member of Street's administration whose support was vital to people who wanted to do business with the city. "Every prize that could be gotten, you had to go through White," said one person familiar with some aspects of the investigation. White and his lawyer, Creed C. Black Jr., have declined to talk about the ongoing inquiry. Ali, meanwhile, is a longtime supporter of the mayor's who has rallied support for him in the Muslim community. He also emerged quickly as a focus of investigators. The day after the investigation burst into public view with the discovery of the bug, the FBI raided the office of Ali's debt-collection firm, Keystone Information & Financial Services. They also raided his Cheltenham Township home and the offices of his accountant. Federal investigators are scrutinizing a no-bid contract under which Keystone was to collect delinquent city taxes. The firm was paid a $60,000 commission to collect a massive delinquent debt owed by a Chestnut Hill firm that reached a settlement with the city. Investigators also are examining Keystone's role as a partner in a contract to manage the wireless telephone system at Philadelphia International Airport. And federal authorities are investigating Sister Clara Muhammad School, where Ali is director, for allegedly failing to provide adult-literacy classes and GED courses after being paid to do so under a contract with Community College of Philadelphia. Federal investigators have subpoenaed documents related to a charter school that Ali's wife, Faridah, wanted to open on Sister Clara's West Philadelphia campus. Ali and his lawyer, Tariq El-Shabazz, have declined to comment on the investigation. Federal investigators and prosecutors aren't talking. Strict grand-jury secrecy rules prevent them from saying what has unfolded behind the closed doors of the federal courtroom, where they have been sketching the early outlines of their case. Several City Hall staffers have been called before the panel, including the mayor's chief of staff, Joyce Wilkerson, and John Christmas, a deputy chief of staff. Lawyers familiar with parts of the investigation, meanwhile, say they are struck by the wide use of electronic surveillance in the case. The listening devices were in place for months at a time, capturing conversations that could provide key evidence for prosecutors. While the wiretaps were operating, the mayor and others in his office placed at least 21 calls to White's office and cell phone, according to city phone records obtained by The Inquirer. Of those, eight calls were made on Street's phone line. All were brief, lasting no longer than five minutes. The phone records examined by The Inquirer covered the time from June of last year until October, when the bug was discovered in the ceiling above the mayor's desk at City Hall. The taps on White's phones were in place from January of last year until October. With at least eight wiretaps and three bugs, the inquiry marks the most extensive use of electronic surveillance in Philadelphia since the Abscam scandal of the 1980s. "I don't think you get this number of wiretaps approved without some very persuasive evidence," former U.S. Attorney David Marston said. "Anytime you have a major federal investigation into big-city corruption, it's a very serious time for that city." Contact staff writer Emilie Lounsberry at 215-854-4828 or elounsberry@p... or Nancy Phillips at 215-854-2254 or nphillips@p.... Inquirer staff writers Angela Couloumbis, Cynthia Burton, Joseph Tanfani and Marcia Gelbart contributed to this article. ¬© 2004 Philadelphia Inquirer and wire service sources. All Rights Reserved. http://www.philly.com [Non-text portions of this message have been removed] 8215 From: Date: Sun Feb 8, 2004 3:44am Subject: Taped threat to Street aide reported Posted on Sat, Feb. 07, 2004 Taped threat to Street aide reported The FBI warned George R. Burrell about allegedly menacing words from Imam Shamsud-din Ali, sources say. By Leonard N. Fleming Inquirer Staff Writer Imam Shamsud-din Ali, a longtime supporter of Mayor Street, was picked up on FBI wiretaps making threats about top mayoral aide George R. Burrell and another man who is not a city official, several sources with knowledge of the investigation say. The FBI warned Burrell, the city's secretary of external affairs and a onetime mayoral candidate, that Ali was heard saying to an unidentified person that Burrell should watch himself because Ali believed that Burrell had been talking with federal investigators, sources say. There has been no indication that Burrell has assumed the role of a cooperating witness with the federal government in its widespread investigation of alleged municipal corruption in City Hall that came into public view and scrutiny with the Oct. 7 discovery of a bug hidden in the ceiling of the mayor's office. The agents warned Burrell and the other man last year, several weeks after the bug was found, the sources said. Tariq El-Shabazz, Ali's attorney, strongly denied that his client had threatened anyone. Ali, 64, a leader of Philadelphia's largest mosque, has been identified as a focus of the investigation. Federal agents raided Ali's home and business, Keystone Information & Financial Services, the day after the listening device was found. Federal authorities began intercepting calls from Ali's office phone in July 2001. Officials later tapped his cellular and home phones. The taps ceased in 2002. FBI spokeswoman Linda Vizi yesterday declined to say whether agents contacted Burrell, but she did say it was standard policy to contact someone who has been threatened. Burrell declined to comment. He holds a key role in the administration, serving as Street's liaison with other politicians, and makes decisions about who gets city contracts. Barbara A. Grant, the mayor's spokeswoman, also declined comment. El-Shabazz said he was not privy to the federal government wiretaps because his client had not been charged with anything. "Our position is and has been, and always will be, that there has been no threat to George Burrell or anyone else," he said. Known in recent years as a gentle, politically astute cleric and influential leader, Ali was once named Clarence Fowler and was believed to be a leader of the Black Mafia. In 1970, he was convicted of killing a North Philadelphia minister. After he served 51/2 years in prison, Ali's conviction was overturned by the state Supreme Court in 1976. Contact staff writer Leonard N. Fleming at 215-854-4330 or lfleming@p.... Inquirer staff writer Emilie Lounsberry contributed to this article. © 2004 Philadelphia Inquirer and wire service sources. All Rights Reserved. http://www.philly.com [Non-text portions of this message have been removed] 8216 From: James M. Atkinson Date: Tue Feb 10, 2004 2:42am Subject: Receiver Page being updated I am in the process of updating the pages I have concerning TSCM receivers, and radios, etc that is helpful to our profession. Please feel free to send me your thoughts on which radios should be listed, commentary on each, observations, etc. It is going to be a really, really awesome page. Please let me know your thoughts. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8217 From: James M. Atkinson Date: Tue Feb 10, 2004 3:12pm Subject: Canberra and Jakarta deny embassy bugs Canberra and Jakarta deny embassy bugs By Mark Baker, Herald Correspondent in Nusa Dua, Bali February 5, 2004 Indonesian and Australian officials yesterday hosed down claims Australia's spy agencies had been caught bugging the Indonesian embassy in Canberra. Allegations that listening devices had been found in the embassy threatened to overshadow a regional anti-terrorism conference in Bali discussing intelligence sharing. But claims by several Indonesian MPs, backed by an intelligence official in Jakarta, that electronic bugs had been found in both the embassy chancery and ambassador's residence, drew strong rebuttals. The allegations were published in Jakarta newspapers yesterday, including Koran Tempo, which ran a front page story and cartoon showing a kangaroo with a stethoscope outside an embassy door. "There was a microphone inside the alarm in the meeting room of the embassy. That is an act of bugging," MP Djoko Susilo told the paper after he and several other legislators met Major-General Nachrowi Ramli, head of the Indonesian agency which controls official communications codes. The general was quoted as saying that he believed Australia was spying on the embassy, but that in 20 years Indonesia's diplomatic codes had never been broken. "Bugging is normal . . . because strategic information can certainly be detected by the host countries," he told the Jakarta Post. Indonesian Foreign Ministry spokesman Marty Natalegawa confirmed yesterday that a team of security experts had been sent to Canberra last year to investigate "suspicions that our communications system was being compromised" by embassy security equipment installed by the Australian Federal Police in the wake of the Bali bombings. He said investigators found the problem was created by "criss-crossing" frequencies between the embassy's communications and Canberra television transmitters. This story was found at: http://www.smh.com.au/articles/2004/02/04/1075853939461.html ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8218 From: Date: Wed Feb 11, 2004 5:49am Subject: office swept -- for listening devices, at a cost of $16,500. Fawell fixed contract, feds charge February 11, 2004 BY STEVE WARMBIR, TIM NOVAK AND DAVE NEWBART Staff Reporters Scott Fawell, a former top aide to George Ryan, could feel the breath of federal investigators on his neck, so he decided to do a little cleaning and redecorating at his government office at Navy Pier. Fawell had his office and others swept -- for listening devices, at a cost of $16,500. He rented out a special spy clock for his office for $400 a month, one that could alert him if a visitor was wearing a bug and working for the FBI. That's what prosecutors alleged Tuesday in new indictments. Even as the investigation swirled around him, Fawell still put the fix in on a $11.5 million public contract for a consulting firm that was a client of his close pal Al Ronan, the powerhouse Chicago lobbyist, federal prosecutors alleged Tuesday in a fresh indictment of Fawell, a onetime political golden boy. Fawell, 46, is already serving a 61/2 year prison sentence at Yankton, S.D., for political corruption while he worked as a top aide to Ryan, first when Ryan was secretary of state, then when he was governor. Now, Fawell could see his prison time increase substantially for the contract he allegedly fixed while heading McPier, the city-state agency that runs Navy Pier and McCormick Place. Fawell's former boss, Ryan, faces political corruption charges, while Fawell's onetime girlfriend and aide at McPier, Alexandra Coutretsis, began cooperating extensively with federal investigators after getting slapped with perjury charges. Fawell's friend Ronan, while not indicted Tuesday, seems clearly in the crosshairs of federal prosecutors. They charged Ronan's lobbying firm, Ronan Potts LLC, with taking part in the fixed contract at McPier. Also charged in the case by prosecutors Patrick Collins and Scott Levine was Ronan's onetime top aide, Julie Starsiak, 56, of Chicago, a former vice president at the firm. She lied to investigators, prosecutors allege. Ronan was not referred to by name in the indictment by prosecutors but was called "Fawell Associate 1. "Ronan allegedly paid for meals, golf, entertainment and vacations for Fawell while Fawell ran McPier, the indictment alleges. Ronan also is accused of chipping in for Fawell's legal defense fund. Fawell, in turn, had McPier hire people referred by Ronan. McPier also awarded contracts to Ronan clients at Fawell's request, the feds allege. Fawell used McPier money to pay for rooms at the McCormick Place Hyatt for himself, Ronan and Coutretsis. From another favored McPier vendor, Fawell allegedly got a satellite dish at his home, plus free installation. By charging Ronan's firm criminally, federal prosecutors have effectively crippled it, lobbying experts said. Since 1997, Ronan Potts has given at least $295,000 to dozens of Illinois politicians. Ronan, a former state lawmaker, was considered a top money-raiser for Gov. Blagojevich and is close to the governor's budget director John Filan. An attorney for Ronan's firm, James Cutrone, shifted the blame Tuesday to former employee Starsiak, who left the firm last year to start her own. "The fault lies here in the hands exclusively with Ms. Starsiak," Cutrone said. "It does not extend beyond her to other employees of the firm. "The charges center on a prime contract bid out in 2001 for a consulting firm to manage an $800 million expansion of McCormick Place. Seven teams bid on the contract. At first, Fawell allegedly cut a deal with another consulting firm in which he would get a job after he left McPier, among other benefits, for steering the contract the firm's way. But that deal fell apart when the heat from the ongoing federal investigation of Fawell got too hot. Instead, Fawell allegedly decided to help his friend Ronan and Ronan's client, Jacobs Facilities Inc., based in St. Louis. With Fawell's approval, his aide Coutretsis passed along inside information on the consulting contract to Starsiak, who funneled it to two officials at Jacobs, prosecutors say. The former Jacobs employees, James Nagel, 41, of Glen Ellyn, and Elizabeth Koski, 35, of Elmhurst have been charged in the case. McPier sources said they expected the agency's board to fire Jacobs. The consulting firm has been paid $2.66 million so far. A Jacobs spokeswoman declined to comment Tuesday on the charges but said the firm has cooperated with federal investigators. [Non-text portions of this message have been removed] 8219 From: Robert Dyk Date: Wed Feb 11, 2004 9:21pm Subject: Surveillance Periscope (Vehicle mounted) This item was just listed for any active surveillance types out there... Surveillance Periscope http://cgi.ebay.ca/ws/eBayISAPI.dll?ViewItem&item=3077869038 Thanks for your time, Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. 8220 From: Date: Wed Feb 11, 2004 7:05pm Subject: Defense objects to use of GPS technology to follow Scott Peterson Defense objects to use of GPS technology to follow Scott Peterson 06:33 PM PST on Wednesday, February 11, 2004 By KIM CURTIS / The Associated Press REDWOOD CITY - Scott Peterson's defense lawyer pressed a prosecution expert Wednesday to concede that satellite technology used to track the murder suspect before his arrest was error prone and effectively useless. A judge must decide whether to accept evidence gathered from global positioning system devices that police secretly put on vehicles Peterson drove in the weeks after his pregnant wife's disappearance. The GPS technology has yet to be qualified as acceptable evidence in a criminal trial in California. The hearing that began Wednesday will determine whether the Peterson case changes that. Modesto police used GPS to track Peterson last year from early January through late April, when he was arrested near San Diego days after the bodies of his wife, Laci, and unborn son surfaced in San Francisco Bay. Defense lawyer Mark Geragos wants a judge to prohibit all GPS-related evidence at Peterson's double-murder trial. Police installed the devices in vehicles Scott Peterson owned, borrowed and rented after Laci Peterson disappeared on Christmas Eve 2002 electronic surveillance that trailed him to San Francisco Bay at least once in January. Bound by gag orders, neither side has discussed what evidence would be lost or gained from information the tracking devices gathered. Because GPS technology has yet to be tested in California's criminal courts, prosecutors first must establish its reliability using qualified experts and then demonstrate the technology was used correctly. Only then can GPS-related evidence be introduced at trial. That process began Wednesday when Judge Alfred A. Delucchi heard the testimony of prosecution expert Peter Van Wyck Loomis, whose Silicon Valley company made the GPS technology in the device that followed Peterson. During the hearing, Geragos seized on instances when the GPS devices appeared to fail, including once when it showed Peterson taking an impossible route. That error lasted for several minutes before the device corrected itself. Geragos pressed Loomis to say the devices were unreliable because of how police hid them on Peterson's vehicles. Loomis rejected those claims, saying the devices were accurate though he did say that Modesto police had used older, less expensive models. "It's accepted commercial technology," Loomis told Geragos. The military developed the satellite-based radio navigation system, which can pinpoint a user's location within feet at any time, in all weather, anywhere in the world. The decades-old technology is now used by everyone from airline pilots to wildlife management officials, and weekend hikers to Sunday drivers. Geragos pressed Loomis, who said he had little experience with the devices used in this case. Loomis said he had seen a photograph of one of them but had never used it himself, tested it or seen evidence of testing. Geragos said Modesto police had tested their own devices, and they failed an assertion prosecutor David Harris denied. The GPS hearing will likely continue next Tuesday, when Geragos may call his own expert to question how police used the devices to track Peterson. Also Wednesday, Laci Peterson's family spoke to the media. Her stepfather, Ron Grantski, said the family has discussed how they should be celebrating the first birthday of the Petersons' unborn son, Conner, whose due date was Feb. 10 of last year. "We shouldn't be going to court," Grantski said. "I should be teasing Laci about Conner keeping her up." Also Wednesday, prosecutors filed their opposition to Geragos's request to sequester jurors and to have separate juries for the trial and penalty phases of the case. [Non-text portions of this message have been removed] 8221 From: Robert Dyk Date: Thu Feb 12, 2004 6:41am Subject: Surveillance Periscope This item was just listed for any active surveillance types out there... Surveillance Periscope http://cgi.ebay.ca/ws/eBayISAPI.dll?ViewItem&item=3077869038 Thanks for your time, Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. 8222 From: Date: Thu Feb 12, 2004 11:24am Subject: Smart Software Gives Surveillance Eyes a 'Brain' Smart Software Gives Surveillance Eyes a 'Brain' Date: Thursday, February 12 @ 15:26:03 EST Topic: Computers and Electronics In these days of heightened security and precautions, surveillance cameras watching over us as we cross darkened parking lots or looking over our shoulders at airports may seem reassuring, but they're only of use if someone is watching them. Researchers have found a way to give these cameras a rudimentary brain to keep an eye out, and the research is already been licensed to a New York company with an aim toward homeland security. From the University of Rochester: Smart Software Gives Surveillance Eyes a 'Brain' In these days of heightened security and precautions, surveillance cameras watching over us as we cross darkened parking lots or looking over our shoulders at airports may seem reassuring, but they're only of use if someone is watching them. Researchers at the University of Rochester's computer science laboratories have found a way to give these cameras a rudimentary brain to keep an eye out for us, and the research is already been licensed to a Rochester company with an aim toward homeland security. "Compared to paying a human, computer time is cheap and getting cheaper," says Randal Nelson, associate professor of computer science and creator of the software "brain". "If we can get intelligent machines to stand in for people in observation tasks, we can achieve knowledge about our environment that would otherwise be unaffordable." Far from being an electronic "Big Brother," the software would only focus on things for which it was trained to look‚Äîlike a gun in an airport, or the absence of a piece of equipment in a lab. Nelson has even created a prototype system that helps a person find things around the house, such as where reading glasses were left. Nelson set about experimenting with how to differentiate various objects in a simple black-and-white video image like that used in a typical surveillance camera. The software initially looks for changes that happen within the image, such as someone placing a cola can on a desk. The change in the image is immediately highlighted as the software begins trying to figure out if the change in the image is a new object in the scene, or the absence of an object that was there before. Using numerous methods, such as matching up background lines that were broken when the new object was set in front of them, the prototype system is accurate most of the time. It then takes an inventory of all the colors of the object so that an operator can ask the software to "zoom in on that red thing" and the software will comply, even though the soda can in question may be red and silver and overlaid with shadows. The next step, however, is where Nelson's software really shines. Nelson has been working for years on ways to get a computer to recognize an object on sight. He began this line of research over a decade ago as he wrote software to help a robot "shop"‚Äîpicking out a single item, like a box of cereal, from several similar items. One of the tasks he recently gave his students was to set up a game where teams tried to "steal" objects from one another's table while the tables were monitored by smart cameras. The students would find new ways to defeat the software, and consequently develop new upgrades to the system so it couldn't be fooled again. Though a six-month-old baby can distinguish different objects from different angles, getting a computer to do it is a Herculean task of processing, and more complicated still is identifying a simple object in a complicated natural setting like a room bustling with activity. Unlike the baby, the software needs to be told a lot about an object before it's able to discern it. Depending on how complex an object is, the software may need anywhere from one to 100 photos of the object from different angles. Something very simple, like a piece of paper, can be "grasped" by the program with a single picture; a soda can may take half a dozen, while a complex object like an ornate lamp may need many photographs taken from different angles to capture all its facets. With those images in mind, the software matches the new object it sees with its database of object to determine what the new object is. The technology for this 'smart camera' has already been licensed to the local company PL E-Communications, LLC., which has plans to develop the technology to control video cameras for security applications. For instance, CEO Paul Simpson is looking into using linked cameras covering a wide area to exchange information about certain objects, be they suspicious packages in an airport or a suspicious truck driving through a city under military control. Even unmanned aerial reconnaissance drones like the Predator that made headlines during the current Iraqi war can use the technology to keep an eye on an area for days at a time, noting when and where objects move. "We're hoping to make this technology do things that were long thought impossible‚Äîmaking things more secure without the need to have a human operator on hand every second." says Simpson. Nelson and PL E-Communications were connected through the Center for Electronic Imaging Systems (CEIS), a NYSTAR-sponsored Center for Advanced Technology (CATs) devoted to promoting economic development in the greater Rochester region and New York State. CEIS develops and transfers technology from local universities to industry for commercialization, and by educating the next generation of leaders in the fields of electronic imaging and microelectronics design. This article comes from Science Blog http://www.scienceblog.com/community The URL for this story is: http://www.scienceblog.com/community/modules.php?name=News&file=article& sid=2306 [Non-text portions of this message have been removed] 8223 From: Date: Thu Feb 12, 2004 9:09am Subject: Re: Digest Number 1487 Hello SOCIETY What about this topic ? 1. Quote of the Month: Interpreting God's Intentions --------------------------------------------------- "Both speeches had the quality of sermons. Both leaders invoked God, and neither had any doubt about whose side God was on. And both interpreted God's intentions." -- Brian Michael Jenkins, RAND terrorism expert, writing in a Los Angeles Times commentary that compared recent speeches by President Bush and Osama bin Laden >> http://www.rand.org/rnbrd/commentary/020104LAT.html Sincerely Martin KO CIA N ----- P¯ipojte se p¯es RazDva a vyberte si jednu z nov˝ch cen v Bonus Clubu. VÌce na http://club.razdva.cz. From: James M. Atkinson, Comm-Eng Date: Wed Jan 31, 2001 6:18pm Subject: McDonald's Fast Food Job Application McDonald's Fast Food Job Application: This is an actual job application someone submitted at a McDonald's fast-food establishment. NAME: Greg DESIRED POSITION: Reclining. HA But seriously, whatever's available. If I was in a position to be picky, I wouldn't be applying here in the first place. DESIRED SALARY: $185,000 a year plus stock options and a Michael Ovitz style severance package. If that's not possible make an offer and we can haggle. EDUCATION: Yes. LAST POSITION HELD: Target for middle management hostility. SALARY: Less than I'm worth. MOST NOTABLE ACHIEVEMENT: My incredible collection of stolen pens and post-it notes. REASON FOR LEAVING: It sucked. HOURS AVAILABLE TO WORK: Any. PREFERRED HOURS: 1:30-3:30 p.m., Monday, Tuesday, and Thursday. DO YOU HAVE ANY SPECIAL SKILLS?: Yes, but they're better suited to a more intimate environment. MAY WE CONTACT YOUR CURRENT EMPLOYER?: If I had one, would I be here? DO YOU HAVE ANY PHYSICAL CONDITIONS THAT WOULD PROHIBIT YOU FROM LIFTING UP TO 50 LBS?: Of what? DO YOU HAVE A CAR?: I think the more appropriate question here would be "Do you have a car that runs?" HAVE YOU RECEIVED ANY SPECIAL AWARDS OR RECOGNITION?: I may already be a winner of the Publishers Clearinghouse Sweepstakes. DO YOU SMOKE?: Only when set on fire. WHAT WOULD YOU LIKE TO BE DOING IN FIVE YEARS?: Living in the Bahamas with a fabulously wealthy super model who thinks I'm the greatest thing since sliced bread. Actually, I'd like to be doing that now. DO YOU CERTIFY THAT THE ABOVE IS TRUE AND COMPLETE TO THE BEST OF YOUR KNOWLEDGE?: No, but I dare you to prove otherwise. SIGN HERE: Scorpio with Libra rising. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2433 From: Date: Wed Jan 31, 2001 3:14pm Subject: This is not why I get the big bucks.... In a message dated 1/31/01 5:57:58 AM Pacific Standard Time, agrudko@i... writes: << Jeepers, this switch to yahoogroops has caused some headaches - anyway.... >> http://au.egroups.com/mygroups It's the same good old systems of eGroups. And it works great for us Yanks. You won't be disappointed. You'll have the same id and password. Also, you can try these. Australia http://au.egroups.com/mygroups Canada http://www.egroups.ca/ UK http://www.egroups.co.uk/ China http://cn.egroups.com/ HK http://www.egroups.com.hk/ India http://in.egroups.com/ Japan: http://www.egroups.co.jp/ Korea http://kr.egroups.com/ Taiwan http://tw.egroups.com/ Fra nce http://www.egroups.fr/ Germany http://www.egroups.de/ Italy http://it.egroups.com/ 2434 From: Steve Uhrig Date: Thu Feb 1, 2001 8:22am Subject: Surveillance at Super Bowl http://www.viisage.com/january_29_2001.htm Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2435 From: A Grudko Date: Thu Feb 1, 2001 10:06am Subject: Re: This is not why I get the big bucks.... ----- Original Message ----- From: > agrudko@i... writes: > Jeepers, this switch to yahoogroops has caused some headaches -> > http://au.egroups.com/mygroups> It's the same good old systems of eGroups. > And it works great for us Yanks. You won't be disappointed. You'll have the same id and password. Howdy Mac.... Why do they call you Yanks anyway? Maybe we should not go there....:-) Well, so far I've had 2 members of our South African PI list which I moderate accuse me of censorship 'cos their messages kept bouncing, another getting all messages twice, and I've been refused access to another list which I moderate!!! My feelings about Yahoo: as NYPD Sgt John McLean would say, 'Yippie kiay........' Andy Grudko Johannesburg 2436 From: James M. Atkinson, Comm-Eng Date: Thu Feb 1, 2001 4:40pm Subject: Blonde Handyman A blonde, wanting to earn some money, decided to hire herself out as a handyman-type person and started canvassing a well-to-do neighborhood. She went to the front door of the first house and asked the owner if he had any jobs for her to do. "Well, you can paint my porch. How much will you charge?" The blonde said "How about 50 dollars?" The man agreed and told her that the paint and other materials that she might need were in the garage. The man's wife, inside the house, heard the conversation and said to her husband, "Does she realize that the porch goes all the way around the house?" The man replied, "She should, she was standing on it." A short time later the blonde came to the door to collect money. "You're finished already?" he asked. "Yes," the blonde answered, "and I had paint left over, so I gave it two coats." Impressed, the man reached in his pocket for the $50. "And by the way," the blonde added, "it's not a Porch, it's a Lexus." -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2437 From: James M. Atkinson, Comm-Eng Date: Thu Feb 1, 2001 8:13pm Subject: Hot Cup of Coffee The young clerk's responsibilities included bringing the judge a hot cup of coffee at the start of every day. Each morning the judge was enraged that the coffee cup arrived two-thirds full. The clerk explained that he had to rush to get the coffee delivered while it was still hot, which caused him to spill much of it along the way. None of the judge's yelling and insults produced a full cup of coffee, until he finally threatened to cut the clerk's pay by one-third if he continued to produce one-third less than the judge wanted. The next morning he was greeted with a cup of coffee that was full to the brim, and the next morning and the morning after that. The judge couldn't resist gloating over his success and smugly complimented the clerk on his new technique. "Oh, there's not much to it," admitted the clerk happily, "I take some coffee in my mouth right outside the coffee room, and spit it back in when I get outside your office." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2438 From: Thomas H. Jones Date: Fri Feb 2, 2001 3:11pm Subject: RE: 2.4 GHz VBA >The VBA is roughly 8 inches long, 3 inches wide, and three quarters >inch thick (not including the sturdy fold-up antenna that is >provided). > >The only thing I don't like about it is that I feel the bandwidth >should be wider, and cover 2.00 to 2.700 GHz (700 MHz bandwidth), the >ripple is a little too high on the lower skirt. (cough-cough) I hope >Tom and Bruce see this, perhaps they could come out with a Wide band >version (cough-cough) To Jim and All, Thank you for the comments on the VBA. We have planned for some time to come out with a new wider band version of the VBA at the same price. It will go into production in the next few weeks. We had planned to replace the VBA with this model, but if the interest remains for the narrow-band version, we will certainly keep it. The new product will be called the LAA-1530 (Log-Periodic Active Antenna), and the frequency range will be from 1.5 to 3GHz. This will be identical to the current VBA with roughly the same total system gain. However, the noise floor of the unit will certainly be increased because of the wider frequency range. The size and packaging will change slightly due to variation in the antenna, but the total length will be about the same. Jim has pointed out to me that PCS phone systems at 1.8GHz may have a tendency to de-sensitize (overload) the pre-amp. It is a fair comment, but the design is basically finished and we will not modify it unless this proves to be a real problem. We will have to let you guys in field try it to see if this is a real problem. I would not expect it to be a problem unless you are pointing at a transmitter within 30 or 40 ft, so you must know your environment. Also, if you do overload the pre-amp, you will certainly know it, and this is the purpose of the device to detect transmitters. Regards, REI 2439 From: James M. Atkinson, Comm-Eng Date: Fri Feb 2, 2001 3:46pm Subject: RE: 2.4 GHz VBA At 3:11 PM -0600 2/2/01, Thomas H. Jones wrote: > >The VBA is roughly 8 inches long, 3 inches wide, and three quarters >>inch thick (not including the sturdy fold-up antenna that is >>provided). >> >>The only thing I don't like about it is that I feel the bandwidth >>should be wider, and cover 2.00 to 2.700 GHz (700 MHz bandwidth), the >>ripple is a little too high on the lower skirt. (cough-cough) I hope >>Tom and Bruce see this, perhaps they could come out with a Wide band >>version (cough-cough) > >To Jim and All, >Thank you for the comments on the VBA. We have planned for some time to >come out with a new wider band version of the VBA at the same price. It >will go into production in the next few weeks. We had planned to replace >the VBA with this model, but if the interest remains for the narrow-band >version, we will certainly keep it. The new product will be called the >LAA-1530 (Log-Periodic Active Antenna), and the frequency range will be >from 1.5 to 3GHz. This will be identical to the current VBA with roughly >the same total system gain. However, the noise floor of the unit will >certainly be increased because of the wider frequency range. The size and >packaging will change slightly due to variation in the antenna, but the >total length will be about the same. Jim has pointed out to me that PCS >phone systems at 1.8GHz may have a tendency to de-sensitize (overload) the >pre-amp. It is a fair comment, but the design is basically finished and we >will not modify it unless this proves to be a real problem. We will have to >let you guys in field try it to see if this is a real problem. I would not >expect it to be a problem unless you are pointing at a transmitter within >30 or 40 ft, so you must know your environment. Also, if you do overload >the pre-amp, you will certainly know it, and this is the purpose of the >device to detect transmitters. >Regards, >REI Tom, Bruce (and the rest of the list), I would applaud adding a new active antenna to the product line but would strongly suggest that you keep the VBA specific for 2.4 coverage, and would even go so encourage you to punch up the gain a bit more. A wider band version is good, but your right about the noise issues related in increasing bandwidth. I personally would prefer a higher gain active antenna as opposed to a wider bandwidth unit (or perhaps one with a logarithmic amplifier) Also, I would like to see (and would pay good money for) a 902-928 MHz version of the VBA (perhaps an 806 to 1700 MHz version with a switchable band reject filter for the cellular and Inmarsat bands). Good job Tom, I look forward to obtaining one of the new LAA-1530 units. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2440 From: Charles P Date: Fri Feb 2, 2001 5:00pm Subject: Want to bug someone? -humor For a cute interlude, try: http://www.send4fun.com/buggedp.htm charles charles@t... www.telephonesecurity.com [Non-text portions of this message have been removed] 2441 From: James M. Atkinson, Comm-Eng Date: Fri Feb 2, 2001 8:41pm Subject: Video Camera on Microwave Oven Frequency Just came across a Chinese made covert video transmitter and integral camera locked right on the 2.450 GHz microwave oven frequency with no means to change frequency. Typical FM modulated video (16-8 MHz wide) with two audio channels, and judging by the current draw (and a spectrum analyzer measurement) I estimate power output to be at least 135 mW. Typical consumer grade trash, and worthless is someone fires up a microwave oven nearby. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2442 From: Date: Fri Feb 2, 2001 10:58pm Subject: The Art of War: Contents HAVE A GREAT DAY !!! ---------- http://www.zedz.net/suntzu/index.html [Non-text portions of this message have been removed] 2443 From: Andre Holmes <1ach@g...> Date: Sat Feb 3, 2001 9:48am Subject: FCC delays TV-band spectrum sale Computerworld News & Features Story FCC delays TV-band spectrum sale | Computerworld News & Features Story Network Search Sites Services ITcareers Search Advanced Search | Contacts News & Features | Resources/Research | Careers | Communities | Subscriptions | Media Center Headlines | Biz Stories | Tech Stories | Emerging Companies | QuickStudy | Columnists | This Week in Print | CW Minute News & Features NEWS Latest Headlines . Browse by Date . Browse by Topic Business Headlines Tech Headlines This Week in Print CW Audio Minute FEATURES Field Reports Emerging Companies QuickStudies Executive Technology OPINIONS Latest Columns All Columnists Forums Letters Shark Tank PUBLICATIONS White Papers Surveys & Reports QUICKPOLL Take Latest poll Archives FCC delays TV-band spectrum sale By BOB BREWIN (February 01, 2001) The Federal Communications Commission decided to give cellular telephone companies already tapped out by last week's $17 billion spectrum auction a breather before starting the next multibillion-dollar airwaves sale. Yesterday, the FCC decided to push back an auction for spectrum currently occupied by television channels 60 to 69 from March 6 to Sept. 12. The FCC delayed the new sale after considering a request from nationwide carrier Verizon Wireless. The short time between the 1,900-MHz auction, which ended Friday (see story), and the March start date of the 700-MHz spectrum currently occupied by the TV broadcasters "would not allow companies enough time to accurately assess the interest in acquiring additional spectrum," said John Scott, vice president and general deputy counsel at Verizon, in a Jan. 18 letter to the FCC. Scott said a delay would be prudent because the FCC hadn't yet come up with a plan to quickly move broadcasters off that band and onto new digital-TV channels. Under FCC rules, the broadcasters can continue to occupy that band until 2006, even though carriers have paid billions of dollars this year for the right to use it. The FCC also received several comments from other major carriers in support of Verizon. Craig Mathias, an analyst at Far Point Group in Ashland, Mass., agreed that carriers "need some breathing room before the next auction." In his view, the carriers need time to figure out how much they want to spend for additional spectrum, since last week's auction "sucked a lot of money out of the digital economy." The customer, Mathias added, will ultimately pay the bill for the additional spectrum because carriers will pass their airwaves costs along to end users. But the Rural Telecommunications Group, which represents rural telephone companies, sharply disagreed about the need for a postponement. Caressa Bennet, an attorney at Bennet and Bennet in Washington, which represents the rural carriers, said in a letter to the FCC last week that Verizon's request for a delay was "merely for Verizon's business convenience. The commission should reject this invitation to fashion its auction process to meet Verizon's needs. Verizon's call for delay reflects the narrowest of self-interest masked as a general concern." Verizon, Bennet said in her letter, is engaged in a delaying game designed to "serve the interests of large carriers." She added that the FCC has already postponed the 700 MHz auction a number of times. Several companies also supported the rural group in its comments sent to the FCC. Other recent stories by Bob Brewin Send feedback Printer friendly E-mail this page Request a reprint ADVERTISEMENT MORE ON THIS TOPIC E-Commerce Chronicles: Wireless Wanderings FCC postpones March wireless auction Norwood demos Bluetooth office network On the Road Again Time to Catch Computing's 'Third Wave' Alaska Air Launches Wireless Check-in SAS Plans In-flight Wireless Web Access Building Broadband Into Business News Briefs Briefs at Deadline Help Desk | Site Guide | Send Us E-mail | Privacy Policy | Subscription Help Copyright © 2001 Computerworld, Inc. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of Computerworld, Inc. is prohibited. Computerworld and @Computerworld and the respective logos are trademarks of International Data Group, Inc. [Non-text portions of this message have been removed] 2444 From: Andre Holmes <1ach@g...> Date: Sat Feb 3, 2001 9:58am Subject: EQUIPMENT SOURCE http://www.jensentools.com [Non-text portions of this message have been removed] 2445 From: Andre Holmes <1ach@g...> Date: Sat Feb 3, 2001 11:36am Subject: CUMPUTER NEWS http://www.cwrld.com/nl/sub.asp [Non-text portions of this message have been removed] 2446 From: Steve Uhrig Date: Sat Feb 3, 2001 9:23pm Subject: Unblocked receivers still available I still have a few of these if anyone still wants one. ------------------- I have come across a small supply of government trade in ICOM R8500 receivers, and am offering them for sale here first before posting them on my used equipment page. These generally sell very quickly once they are posted. Many are familiar with the R8500. This is ICOM's newest wideband HF/VHF/UHF receiver, quite common with sweepers. The problem is getting them with 800 megacycle coverage. All the ones sold commercially are cellular blocked, with no provision for TSCM practitioners to obtain unblocked ones legally. We do not want receivers with holes in the coverage. Here are some that don't have the holes. Recently to some members of this group I demonstrated a high end surveillance transmitter which operates on these blocked frequencies where the receivers have holes. These are full coverage receivers originally purchased by the government, generally used for one weekend surveillance, then traded in. Basic specs are 100kc to 2 gigs, AM, Wide FM, Narrow FM, CW, SSB. This is a triple conversion tabletop receiver powered by 12VDC or 110VAC with included power supply. Can be used portable or mobile or fixed station. Go here for full specs and a photo: http://www.icomamerica.com/receivers/tabletop/icr8500.html This receiver is the best one ICOM has released to date, significantly better than the R9000, and a later model in the series of R7000/R7100. Remember this is a full coverage receiver, and covers from 100kc (0.1 megacycles) to 2 gigs (2000 megacycles). You do not need an additional receiver to cover the HF portion of the spectrum. When not sweeping, you will use this as a lab receiver on your test bench. The receiver has an IF output and a discriminator output already available at jacks on the rear panel. There is an RS232 input port as part of this receiver, so you do not need the expensive external level converter to computer control it. There are a number of third party software packages available to remotely operate the receiver. Rather than one of the computer-controlled black box receivers, the R8500 can be computer controlled as well as it has a full featured front panel for standalone use. There may be times when you do not want to drag a laptop around just to run your receiver. One of the standard internal features will scan and store any signals found in a special memory bank for later review. ICOM just raised the price on these substantially, and that higher price will soon be reflected on dealers' pricing. Even then, you can't buy them full coverage without a government sponsor willing to give you a blessing. Importing one from England or Canada will cost you more than my price and you have the very real risk of Customs seizing the thing at the border. I only have a few of these, so don't wait if you need a portable, decent full coverage receiver. Price is $2000 shipped in the U.S. (we pay the shipping and insurance fees totalling $58). This is less than current retail for a blocked receiver. Anyone buying an R8500 receiver is eligible to purchase a wideband discone antenna for $75, which is a $50 discount off the normal price of $125. This antenna is ideal for this receiver, and is a good antenna for sweeping. Mount it on a tripod or microphone stand and move the antenna around the area you are sweeping. Antenna can be used for transmit also, from 25- 2000 megs. The antenna is shipped separately in a sturdy tube which can be reused for a carrying case. I take credit cards for payment. And I will consider trades for other pieces of high end TSCM equipment. Swap something you don't need for something you do. Also have a few full coverage R100s if anyone needs one of them. Inquire. More equipment like this is on our used equipment page: http://www.swssec.com/used.html Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2447 From: mike f Date: Mon Feb 5, 2001 10:14am Subject: <<<<>>>> A Few of You Know how much I am Interested Forensics As I Mentioned some of U Know how much I like Forensics,....... Nicholas Short & Company has down a good job. AFTER REVEIWING and checking out 23+ Forensic Web sites that Mr.Short & company have Organised,by category, & or crime,I have to be honest. They Have not Done a Good Job.......Nope They Have Done An XXX-Cell-Ant Job WAY MORE THAN 23+ FORENSIC SITES! As an Example Check out this page here that is Crime Scene Forensics http://www.insurancefraud.com/nparsed/for_scene.htm MAIN PAGE http://www.insurancefraud.com/nparsed/forensic_index.htm http://www.insurancefraud.com/nparsed/for_drugs.htm http://www.insurancefraud.com/nparsed/for_database.htm <====good sites here!!! Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 2448 From: Dragos Ruiu Date: Mon Feb 5, 2001 3:33pm Subject: Fwd: kyxspam: 802.11b wep attacks ---------- Forwarded Message ---------- Subject: kyxspam: 802.11b wep attacks Date: Mon, 5 Feb 2001 09:56:57 -0800 From: Dragos Ruiu url: http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html Security of the WEP algorithm This is some information about our analysis of the Wired Equivalent Privacy (WEP) algorithm, which is part of the 802.11 standard. This work was performed jointly by Nikita Borisov, Ian Goldberg, and David Wagner. If you have any questions, please contact us at wep@i.... Executive Summary We have discovered a number of flaws in the WEP algorithm, which seriously undermine the security claims of the system. In particular, we found the following types of attacks: Passive attacks to decrypt traffic based on statistical analysis. Active attack to inject new traffic from unauthorized mobile stations, based on known plaintext. Active attacks to decrypt traffic, based on tricking the access point. Dictionary-building attack that, after analysis of about a day's worth of traffic, allows real-time automated decryption of all traffic. Our analysis suggests that all of these attacks are practical to mount using only inexpensive off-the-shelf equipment. We recommend that anyone using an 802.11 wireless network not rely on WEP for security, and employ other security measures to protect their wireless network. WEP setup The 802.11 standard describes the communication that occurs in wireless local area networks (LANs). The Wired Equivalent Privacy (WEP) algorithm is used to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network; this function is not an explicit goal in the 802.11 standard, but it is frequently considered to be a feature of WEP. WEP relies on a secret key that is shared between a mobile station (eg. a laptop with a wireless ethernet card) and an access point (ie. a base station). The secret key is used to encrypt packets before they are transmitted, and an integrity check is used to ensure that packets are not modified in transit. The standard does not discuss how the shared key is established. In practice, most installations use a single key that is shared between all mobile stations and access points. More sophisticated key management techniques can be used to help defend from the attacks we descibe; however, no commercial system we are aware of has mechanisms to support such techniques. The following two sections describe the problems in the algorithm and the technical details of our attacks; they assume some background understanding of cryptographic protocols. You may wish to skip to the following section, which discusses the practicality of the attacks. Problems WEP uses the RC4 encryption algorithm, which is known as a stream cipher. A stream cipher operates by expanding a short key into an infinite pseudo-random key stream. The sender XORs the key stream with the plaintext to produce ciphertext. The receiver has a copy of the same key, and uses it to generate identical key stream. XORing the key stream with the ciphertext yields the original plaintext. This mode of operation makes stream ciphers vulnerable to several attacks. If an attacker flips a bit in the ciphertext, then upon decryption, the corresponding bit in the plaintext will be flipped. Also, if an eavesdropper intercepts two ciphertexts encrypted with the same key stream, it is possible to obtain the XOR of the two plaintexts. Knowledge of this XOR can enable statistical attacks to recover the plaintexts. The statistical attacks become increasingly practical as more ciphertexts that use the same key stream are known. Once one of the plaintexts becomes known, it is trivial to recover all of the others. WEP has defences against both of these attacks. To ensure that a packet has not been modified in transit, it uses an Integrity Check (IC) field in the packet. To avoid encrypting two ciphertexts with the same key stream, an Initialization Vector (IV) is used to augment the shared secret key and produce a different RC4 key for each packet. The IV is also included in the packet. However, both of these measures are implemented incorrectly, resulting in poor security. The integrity check field is implemented as a CRC-32 checksum, which is part of the encrypted payload of the packet. However, CRC-32 is linear, which means that it is possible to compute the bit difference of two CRCs based on the bit difference of the messages over which they are taken. In other words, flipping bit n in the message results in a deterministic set of bits in the CRC that must be flipped to produce a correct checksum on the modified message. Because flipping bits carries through after an RC4 decryption, this allows the attacker to flip arbitrary bits in an encrypted message and correctly adjust the checksum so that the resulting message appears valid. The initialization vector in WEP is a 24-bit field, which is sent in the cleartext part of a message. Such a small space of initialization vectors guarantees the reuse of the same key stream. A busy access point, which constantly sends 1500 byte packets at 11Mbps, will exhaust the space of IVs after 1500*8/(11*10^6)*2^24 = ~18000 seconds, or 5 hours. (The amount of time may be even smaller, since many packets are smaller than 1500 bytes.) This allows an attacker to collect two ciphertexts that are encrypted with the same key stream and perform statistical attacks to recover the plaintext. Worse, when the same key is used by all mobile stations, there are even more chances of IV collision. For example, a common wireless card from Lucent resets the IV to 0 each time a card is initialized, and increments the IV by 1 with each packet. This means that two cards inserted at roughly the same will provide an abundance of IV collisions for an attacker. (Worse still, the 802.11 standard specifies that changing the IV with each packet is optional!) Attacks Passive Attack to Decrypt Traffic The first attack follows directly from the above observation. A passive eavesdropper can intercept all wireless traffic, until an IV collision occurs. By XORing two packets that use the same IV, the attacker obatins the XOR of the two plaintext messages. The resulting XOR can be used to infer data about the contents of the two messages. IP traffic is often very predictable and includes a lot of redundancy. This redundancy can be used to eliminate many possibilities for the contents of messages. Further educated guesses about the contents of one or both of the messages can be used to statistically reduce the space of possible messages, and in some cases it is possible to determine the exact contents. When such statistical analysis is inconclusive based on only two messages, the attacker can look for more collisions ofthe same IV. With only a small factor in the amount of time necessary, it is possible to recover a modest number of messages encrypted with the same key stream, and the success rate of statistical analysis grows quickly. Once it is possible to recover the entire plaintext for one of the messages, the plaintext for all other messages with the same IV follows directly, since all the pairwise XORs are known. An extension to this attack uses a host somewhere on the Internet to send traffic from the outside to a host on the wireless network installation. The contents of such traffic will be known to the attacker, yielding known plaintext. When the attacker intercepts the encrypted version of his message sent over 802.11, he will be able to decrypt all packets that use the same initialization vector. Active Attack to Inject Traffic The following attack is also a direct consequence of the problems described in the previous section. Suppose an attacker knows the exact plaintext for one encrypted message. He can use this knowledge to construct correct encrypted packets. The procedure involves constructing a new message, calculating the CRC-32, and performing bit flips on the original encrypted message to change the plaintext to the new message. The basic property is that RC4(X) xor X xor Y = RC4(Y). This packet can now be sent to the acces point or mobile station, and it will be accepted as a valid packet. A slight modification to this attack makes it much more insiduous. Even without complete knowledge of the packet, it is possible to flip selected bits in a message and successfully adjust the encrypted CRC (as described in the previous section), to obtain a correct encrypted version of a modified packet. If the attacker has partial knowledge of the contents of a packet, he can intercept it and perform selective modification on it. For example, it is possible to alter commands that are sent to the shell over a telnet session, or interactions with a file server. Active Attack from Both Ends The previous attack can be extended further to decrypt arbitrary traffic. In this case, the attacker makes a guess about not the contents, but rather the headers of a packet. This information is usually quite easy to obtain or guess; in particular, all that is necessary to guess is the destination IP address. Armed with this knowledge, the attacker can flip appropriate bits to transform the destination IP address to send the packet to a machine he controls, somewhere in the Internet, and transmit it using a rogue mobile station. Most wireless installations have Internet connectivity; the packet will be successfully decrypted by the access point and forwarded unencrypted through appropriate gateways and routers to the attacker's machine, revealing the plaintext. If a guess can be made about the TCP headers of the packet, it may even be possible to change the destination port on the packet to be port 80, which will allow it to be forwarded through most firewalls. Table-based Attack The small space of possible initialization vectors allows an attacker to build a decryption table. Once he learns the plaintext for some packet, he can compute the RC4 key stream generated by the IV used. This key stream can be used to decrypt all other packets that use the same IV. Over time, perhaps using the techniques above, the attacker can build up a table of IVs and corresponding key streams. This table requires a fairly small amount of storage (~15GB); once it is built, the attacker can decrypt every packet that is sent over the wireless link. Monitoring Despite the difficulty of decoding a 2.4GHz digital signal, hardware to listen to 802.11 transmissions is readily available to attackers in the form of consumer 802.11 products. The products possess all the necessary monitoring capabilities, and all that remains for attackers is to convince it to work for them. Although most 802.11 equipment is designed to disregard encrypted content for which it does not have the key, we have been able to successfully intercept WEP-encrypted transmissions by changing the configuration of the drivers. We were able to confuse the firmware enough that the ciphertext (encrypted form) of unrecognized packets was returned to us for further examination and analysis. Active attacks (those requiring transmission, not just monitoring) appear to be more difficult, yet not impossible. Many 802.11 products come with programmable firmware, which can be reverse-engineered and modified to provide the ability to inject traffic to attackers. Granted, such reverse-engineering is a significant time investment (we have not done this ourselves), but it's important to note that it's a one time cost. A competent group of people can invest this effort and then distribute the rogue firmware through underground circles, or sell it to parties interested in corporate espionage. The latter is a highly profitable business, so the time investment is easily recovered. Conclusions Wired Equivalent Privacy (WEP) isn't. The protocol's problems is a result of misunderstanding of some cryptographic primitives and therefore combining them in insecure ways. These attacks point to the improtance of inviting public review from people with expertise in cryptographic protocol design; had this been done, the problems stated here would have surely been avoided. Other Materials Slides from Nikita's talk at the Mac Crypto Workshop (January 30, 2001). A DRAFT of a paper describing the attacks. wep@i... -- Dragos Ruiu dursec.com ltd. / kyx.net - we're from the future gpg/pgp key on file at wwwkeys.pgp.net or at http://dursec.com/drkey.asc CanSecWest/core01: March 28-30, Vancouver B.C. Speakers: a whole bunch of cool guys and the massive sig was a pain.... see http://dursec.com 2449 From: sebastien rittner Date: Tue Feb 6, 2001 9:43am Subject: T1 checking Hi all, How do you guys check a T1 trunk. Not that everybody can eavesdrop such a thing but I think that would be wise to sweep from A to Z. Best regards, Sebastien. ===== email : sebastien@t... web : www.tscm-technician.net voicemail : 510-903-0188 ext 7363 ___________________________________________________________ Do You Yahoo!? -- Pour dialoguer en direct avec vos amis, Yahoo! Messenger : http://fr.messenger.yahoo.com 2450 From: James M. Atkinson, Comm-Eng Date: Tue Feb 6, 2001 6:48pm Subject: Re: T1 checking At 4:43 PM +0100 2/6/01, sebastien rittner wrote: >Hi all, >How do you guys check a T1 trunk. >Not that everybody can eavesdrop such a thing but I >think that would be wise to sweep from A to Z. > >Best regards, Sebastien. > > >===== >email : sebastien@t... >web : www.tscm-technician.net >voicemail : 510-903-0188 ext 7363 Have the CO patch for a pure analog loop, or generate a loop back tone, then use a TDR to sniff the entire loop, open both pair and re-shoot from both end again with a TDR. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2451 From: James M. Atkinson, Comm-Eng Date: Tue Feb 6, 2001 6:51pm Subject: Surveillance remains controversial Surveillance remains controversial http://www.irishnews.com/current/news13.html By Kieran McDaid This is not the first time Jeffrey Donaldson has alleged his phone has been bugged. Last September, Mr Donaldson claimed his phone was tapped on the orders of the British government because of his opposition to the Good Friday agreement. At the time, he accused the government of ìstooping to any levelî to undermine opposition to the peace deal. In a BBC programme last year, former Secretary of State Mo Mowlam admitted she had sanctioned the bugging of a car used by senior Sinn Fein members during 1999 talks. In March last year, two men hunting near Blackwatertown, Co Armagh discovered fully operational surveillance equipment. Sinn Fein claimed the equipment was directed towards St Jarlathís church. Last January, the Republicís then Foreign Minister David Andrews met with British Foreign Secretary Robin Cook at an EU summit in Brussels. The two men discussed claims made in a Channel 4 programme that the British government had bugged telephone callsfrom Ireland over a long period. In 1997, it was claimed that military intelligence had placed a tracking device in a car used by Gerry Adams to trace his movements during secret discussions with British officials. The uncovering of military ëspy-postsí in vacant flats and deserted farmhouses has been a regular occurrence. Fears over the health implications of surveillance equipment have also emerged. Research in 1994 claimed those living in the south Armagh village of Crossmaglen were three times more likely to suffer brain haemorrhages than the rest of the population in the north. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2452 From: Mike Date: Tue Feb 6, 2001 8:55pm Subject: Polygraphs I can get 10 Grass Valley Polygraph units DIRT CHEAP. These units are about 20 years old and are supposedly in great condition. Anyone know if there is still a market for them and if so how much? (They are rack mounted with the paper graph. Each unit weighs about 100lbs or more. ) They are in the Chicago area and i'll give someone 2 of them if they are willing to box and ship (and pay for shipping) for the other 8 units to Astoria, OR 97103 The owner says they were used by a hospital for animal testing and cost about 20K each when new. Will sell all 10 - any offers? Mike [Non-text portions of this message have been removed] 2453 From: James M. Atkinson, Comm-Eng Date: Wed Feb 7, 2001 1:46pm Subject: The Consultant [humor] A shepherd was herding his flocks in a remote pasture when suddenly a brand new Jeep Grand Cherokee advanced out of a dust cloud towards him. The driver, a young man in a Brioni suit, Gucci shoes, Ray Ban sunglasses and a YSL tie, leaned out of the window and asked our shepherd: "If I can tell you exactly how many sheep you have in your flock, will you give me one?" The shepherd looks at the yuppie, then at his peacefully grazing flock and calmly answers "sure!" The yuppie parks the car, whips out his notebook, connects it to a cell-phone, surfs to a NASA page on the Internet where he calls up a GPS satellite navigation system, scans the area, opens up a database and some 60 Excel spreadsheets with complex formulas. Finally he prints out a 150 page report on his hi-tech miniaturized printer, turns round to our shepherd and says: "you have here exactly 1586 sheep!" "This is correct. As agreed, you can take one of the sheep," says the shepherd. He watches the young man make a selection and bundle it in his Jeep. Then he says: "If I can tell you exactly what your business is, will you give me my sheep back?" "Okay, why not" answers the young man. "You are a consultant," says the shepherd. "This is correct," says the yuppie, "How did you guess that?" "Easy" answers the shepherd. "You turn up here although nobody called you. You want to be paid for the answer to a question I already knew the solution to. And you don't know anything about my business because you took my dog." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2454 From: Date: Wed Feb 7, 2001 0:26pm Subject: e-bug from Dick Seward By Jennifer Beauprez Denver Post Feb. 6, 2001 - Watch out, an e-bug might bite you. That's the word from the Denver-based Privacy Foundation, which has discovered an e-mail technology that lets people spy on your conversations by sending your forwarded comments back to the e-mail's original sender. "There is wide potential for abuse here," said David Martin, a University of Denver professor. He and Privacy Foundation chief technologist Richard Smith recently learned of the so-called "e-mail bug" and are now demonstrating how it works. For instance, a person could attach the e-bug to an electronic version of a rÈsumÈ to an employer and then read what was said about it as the e-mail was forwarded to other office workers. Business deals, too, could be fixed if negotiations were conducted via e-mail and one side learned inside information as the proposal was discussed through the potential customer's internal e-mail system. It could even be used to note off-color remarks from governmental officials, to gather e-mail addresses for companies that send out spam or by a boss to find out what you're saying about him. "The technology is not comparable to the ILOVEYOU virus, which deleted hard drives, shut down Web sites and was extremely destructive," Martin said. "But it could cost companies hundreds of millions of dollars." The spying technique doesn't take advantage of any security flaw in e-mail software. Rather, secret programming code is inserted into a computer language called JavaScript, which is used on Web sites to create pop-up windows and navigational aids. When the e-mail is forwarded, the implant secretly sends the text of those messages to the original sender. At risk are those who use Microsoft Outlook, Outlook Express and Netscape 6 Mail. Such HTML e-mail programs let users send and receive e-mail messages that look and act like Web pages and have JavaScript turned on by default. Earlier versions of Netscape are not affected because they do not support all the features of the JavaScript. HotMail, Yahoo! and AOL 6.0 are also immune to the wiretap. Martin said people can protect themselves by disabling the JavaScript on their e-mail program. They may learn how to do so by logging onto the Privacy Foundation's Web site, at http://www.privacyfoundation.org. Denver entrepreneur Peter Barton, along with FirstData Corp., the Denver Foundation and DU, formed the foundation in July to research and educate the public on issues. JavaScript isn't critical to most e-mail messages, Martin said: "There's not much downside to turning it off." But simply turning off JavaScript on your own e-mail doesn't debug the message entirely. The wiretap can still be carried with the e-mail. So if you forward it on to someone whose e-mail is JavaScript-enabled and that person forwards the message or sends a reply, then the contents of the e-mail will still bounce back to the original sender. A number of offshore companies provide the e-mail bugging technology free to online users. But deploying such bugs is illegal in the United States, said Philip A. Gordon, a fellow at the Privacy Foundation and an attorney with Horowitz & Wake in Denver. He said the sneaky computer code violates federal wiretapping laws, since it's equivalent to listening in on a conversation without consent. "This is as close as you can get to a telephone wiretap in the electronic environment," Gordon said. If the victims discover they've been e-bugged, they could file a civil lawsuit or press criminal charges punishable by up to five years in prison and $500,000 in fines, he said. Enforcing those laws is tricky, Martin said, because the identity of the sender is often difficult to trace. Spies can route their mail through third-party Internet services and keep the sender's identity from being divulged. "It can be extremely difficult to trace," said Martin. "You would have to bribe someone or break the law. A government would have to issue a warrant. That's rarely done - it would have to be a matter of national security." "Dick Seward "THE BUG HUNTER" 23 yrs. debugging. FCC & CCW lisenced. CALI Affiliated. Great prices & lots of experience. (949-770-8384)" The Privacy Foundation is calling for the major makers of e-mail programs to address the problem. Microsoft spokesman Ryan James said the newest downloadable update to Outlook Express, version 5.5, is not affected because JavaScript is off by default. Netscape spokeswoman Catherine Corre said the company is working on a patch, which will be available within the next few days, to stop the wiretaps. Meanwhile, Corre said, Netscape users should disable JavaScript in the Messenger program. The Associated Press contributed to this report. Copyright 2001 The Denver Post. All rights reserved. ________________________________________________________________ GET INTERNET ACCESS FROM JUNO! Juno offers FREE or PREMIUM Internet access for less! Join Juno today! For your FREE software, visit: http://dl.www.juno.com/get/tagj. 2455 From: James M. Atkinson, Comm-Eng Date: Thu Feb 8, 2001 8:23am Subject: Re: Polygraphs At 6:55 PM -0800 2/6/01, Mike wrote: >I can get 10 Grass Valley Polygraph units DIRT CHEAP. >These units are about 20 years old and are supposedly in >great condition. Anyone know if there is still a market for them and >if so how much? (They are rack mounted with the paper graph. Each unit >weighs about 100lbs or more. ) They are in the Chicago area and i'll give >someone 2 of them if they are willing to box and ship (and pay for shipping) >for the other 8 units to Astoria, OR 97103 > The owner says they were used by a hospital for animal testing and cost >about >20K each when new. Will sell all 10 - any offers? >Mike Mike, Are you sure that they are poly's (with the transducers), or could they just be the strip chart strip chart recorder. The reason I mention this is that poly's are of minimal value unless you have the entire system. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2456 From: Paolo Sfriso Date: Thu Feb 8, 2001 3:32am Subject: Cellphone use on aircraft Fwg is a free translation of a news item published by ANSA on February "nd and republished today by CNN-Italy: Saudi Army Captain is condemned to 70 whip lashes. According to the Saudi newspaper "Al-qtissadiya" an un-named Saudi Army Captain was condemned to 70 whip lashes "for having put aircraft passenger's life in serious danger" by the court of Tabuk (in NW Saudi Arabia). The Army Captain insisted on using his cellphone onboard an internal Saudi flight after having been warned by the aircraft crew. Your Italian Connection. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 (0)335 5257308 paulsfriso@t... www.grupposit.com 2457 From: Jones, Billy R Date: Thu Feb 8, 2001 8:39am Subject: A e-mail bug was discovered October 5, 1998 by Carl Voth, this exploit uses features of Microsoft Dynamic HTML to surreptitiously intercept text added to email messages after they have been forwarded to secondary recipients. The exploit assumes that the original exploit message will eventually be forwarded to others with HTML-enabled mail browsers. The exploit takes advantage of DHTML functionality in Internet Explorer 4.0 which is used by Outlook 98. Outlook Express has not been tested but is presumed to be equally vulnerable. Any other email clients that use Internet Explorer as their HTML engine (eg. Eudora?) are likely vulnerable as well. For further information, please see http://www.cen.uiuc.edu/~ejk/browser-security.html\ http://www.geocities.com/ResearchTriangle/Facility/8332/reaper-exploit-relea se.html Jim, Can you kill my name and address - Since Aramco is the US subsidary of the Saudi National Oil Company, we like to stay a little quiet (politics and all). Best Regards, Billy R. Jones Electronic Security Technician Aramco Services Company 9009 West Loop South, MS-109 Houston, Texas 77096 713-432-4737 voice 713-432-4382 FAX 713-503-7940 (Cellular) bjones@a... http://www.aramcoservices.com 2458 From: Miguel Puchol Date: Thu Feb 8, 2001 10:09am Subject: RV: Email exploit HTML e-mail is like killing flies with a cannon. To send the same information you use up to 10 times more bandwidth. I always respond to HTML formatted messages with plain text ones. It's just a waste of space, and as it turns out, a big source of trouble, as if we hadn't enough with viruses and malicious scripts... Cheers all, and watch out! Mike > -----Mensaje original----- > De: Jones, Billy R [mailto:bjones@a...] > Enviado el: jueves, 08 de febrero de 2001 15:40 > Para: 'TSCM-L@yahoogroups.com' > Asunto: [TSCM-L] > > > A e-mail bug was discovered October 5, 1998 by Carl Voth, this > exploit uses > features of Microsoft Dynamic HTML to surreptitiously intercept text added > to email messages after they have been forwarded to secondary recipients. > The exploit assumes that the original exploit message will eventually be > forwarded to others with HTML-enabled mail browsers. > The exploit takes advantage of DHTML functionality in Internet > Explorer 4.0 > which is used by Outlook 98. Outlook Express has not been tested but is > presumed to be equally vulnerable. Any other email clients that > use Internet > Explorer as their HTML engine (eg. Eudora?) are likely vulnerable > as well. > > For further information, please see > http://www.cen.uiuc.edu/~ejk/browser-security.html\ > > http://www.geocities.com/ResearchTriangle/Facility/8332/reaper-exp > loit-relea > se.html > > > > Jim, > Can you kill my name and address - Since Aramco is the US subsidary of the > Saudi National Oil Company, we like to stay a little quiet (politics and > all). > Best Regards, > Billy R. Jones > Electronic Security Technician > Aramco Services Company > 9009 West Loop South, MS-109 > Houston, Texas 77096 > 713-432-4737 voice > 713-432-4382 FAX > 713-503-7940 (Cellular) > bjones@a... > http://www.aramcoservices.com > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2459 From: James M. Atkinson, Comm-Eng Date: Thu Feb 8, 2001 1:19pm Subject: Re: e-bug from Dick Seward At 10:26 AM -0800 2/7/01, dseward2@j... wrote: >By Jennifer Beauprez Denver Post >Feb. 6, 2001 - Watch out, an e-bug might bite you. >That's the word from the Denver-based Privacy Foundation, which has >discovered an e-mail technology that lets people spy on your >conversations Ok, but it sound like a lot of hype, and they didn't really "discover" anything that most of use were not already aware of. Also, it's not exactly a "e-mail technology: but is a scripting protocol that some Email programs recognize. >by sending your forwarded comments back to the e-mail's original sender. >"There is wide potential for abuse here," said David Martin, a University >of >Denver professor. He and Privacy Foundation chief technologist Richard >Smith >recently learned of the so-called "e-mail bug" and are now demonstrating >how >it works. For instance, a person could attach the e-bug to an electronic >version of a rÈsumÈ to an employer and then read what was said about it >as >the e-mail was forwarded to other office workers. Ah, no.... his description is way out of touch with reality >Business deals, too, could be fixed if negotiations were conducted via >e-mail and one side learned inside information as the proposal was >discussed >through the potential customer's internal e-mail system. It could even be >used to note off-color remarks from governmental officials, to gather >e-mail >addresses for companies that send out spam or by a boss to find out what >you're saying about him. No.... while it is possible to imbed malicious elements inside an email message it really is not a practical method of eavesdropping. For example I can squirt an email to someone that will sample room audio for a few minutes and send back the audio file, or I can launch a script that can (and will) snap a picture of what is in the field of view of the camera (if they have a USB based camera on their computer). But neither is a practical method of eavesdropping. >"The technology is not comparable to the ILOVEYOU virus, which deleted >hard >drives, shut down Web sites and was extremely destructive," Martin said. >"But it could cost companies hundreds of millions of dollars." Listening to clueless pundits is also costing companies hundreds of millions of dollars >The spying technique doesn't take advantage of any security flaw in >e-mail >software. Rather, secret programming code is inserted into a computer >language called JavaScript, which is used on Web sites to create pop-up >windows and navigational aids. When the e-mail is forwarded, the implant >secretly sends the text of those messages to the original sender. JavaScript is not any kind of a "secret programming code" any more then Visual Basic >At risk are those who use Microsoft Outlook, Outlook Express and Netscape >6 >Mail. Such HTML e-mail programs let users send and receive e-mail >messages >that look and act like Web pages and have JavaScript turned on by >default. Yeah, so? Which is also why security use Email programs instead of "integrated packages" to read, write, and send email. >Earlier versions of Netscape are not affected because they do not support >all the features of the JavaScript. HotMail, Yahoo! and AOL 6.0 are also >immune to the wiretap. AOL 6.0 is actually vulnerable to other types of mischief. >Martin said people can protect themselves by disabling the JavaScript on >their e-mail program. They may learn how to do so by logging onto the >Privacy Foundation's Web site, at http://www.privacyfoundation.org. >Denver >entrepreneur Peter Barton, along with FirstData Corp., the Denver >Foundation >and DU, formed the foundation in July to research and educate the public >on >issues. Ah-ha.... so what is really going on here is a publicity stunt to drive people to the Privacy Foundations website. >JavaScript isn't critical to most e-mail messages, Martin said: "There's >not >much downside to turning it off." >But simply turning off JavaScript on your own e-mail doesn't debug the >message entirely. The wiretap can still be carried with the e-mail. So if >you forward it on to someone whose e-mail is JavaScript-enabled and that >person forwards the message or sends a reply, then the contents of the >e-mail will still bounce back to the original sender. OK, but it still does not make it a realistic threat. >A number of offshore companies provide the e-mail bugging technology free >to >online users. But deploying such bugs is illegal in the United States, >said >Philip A. Gordon, a fellow at the Privacy Foundation and an attorney with >Horowitz & Wake in Denver. He said the sneaky computer code violates >federal >wiretapping laws, since it's equivalent to listening in on a conversation >without consent. They are correct about it being contraband in the United States, but the comments about off shore companies is way off base. >"This is as close as you can get to a telephone wiretap in the electronic >environment," Gordon said. If the victims discover they've been e-bugged, >they could file a civil lawsuit or press criminal charges punishable by >up >to five years in prison and $500,000 in fines, he said. Yes, the use of bugs, wiretaps, and other kinds of e-mischief can seriously open up a user to serious legal problems. >Enforcing those laws is tricky, Martin said, because the identity of the >sender is often difficult to trace. Spies can route their mail through >third-party Internet services and keep the sender's identity from being >divulged. No, the sender of the email is easy to find, as is the recipient of the collected intelligence (especially if it is being done be someone inside the company). >"It can be extremely difficult to trace," said Martin. "You would have to >bribe someone or break the law. A government would have to issue a >warrant. But not if it is being done be someone inside the company, it would be fairly simple to find. >That's rarely done - it would have to be a matter of national security." > >"Dick Seward "THE BUG HUNTER" 23 yrs. debugging. FCC & CCW lisenced. CALI >Affiliated. Great prices & lots of experience. (949-770-8384)" Er... since when did the FCC start licensing TSCM people? >The Privacy Foundation is calling for the major makers of e-mail programs >to >address the problem. OK, but while their at it why not call for me to hit the lotto as well. "Calling for" this and that is just and old publicity stunt. >Microsoft spokesman Ryan James said the newest downloadable update to >Outlook Express, version 5.5, is not affected because JavaScript is off >by >default. ... and one should hope so. >Netscape spokeswoman Catherine Corre said the company is working on a >patch, >which will be available within the next few days, to stop the wiretaps. >Meanwhile, Corre said, Netscape users should disable JavaScript in the >Messenger program. >The Associated Press contributed to this report. >Copyright 2001 The Denver Post. All rights reserved. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2460 From: Charles P Date: Thu Feb 8, 2001 9:44pm Subject: FCC licensing made easy >>"THE BUG HUNTER" 23 yrs. debugging. FCC & CCW lisenced. CALI >>Affiliated. Great prices & lots of experience. " >Er... since when did the FCC start licensing TSCM people? I've been FCC licensed sinced 1967: N2AXO, formerly WA3IOB so I guess I could put "FCC Licensed" on my shingle too! :-) perhaps a CB license would work too, but they don't give those out anymore, do they? cp 2461 From: Robert G. Ferrell Date: Fri Feb 9, 2001 10:54am Subject: Re: e-bug from Dick Seward >X-eGroups-Return: sentto-49964-2922-981660032-rferrell=rgfsparc.cr.usgs.gov@returns.onelist.com >X-Sender: jmatk@tscm.com >X-Apparently-To: TSCM-L@yahoogroups.com >X-Sender: spook@c... >To: TSCM-L@yahoogroups.com >From: "James M. Atkinson, Comm-Eng" >MIME-Version: 1.0 >Mailing-List: list TSCM-L@yahoogroups.com; contact TSCM-L-owner@yahoogroups.com >Delivered-To: mailing list TSCM-L@yahoogroups.com >>Feb. 6, 2001 - Watch out, an e-bug might bite you. >>That's the word from the Denver-based Privacy Foundation, which has >>discovered an e-mail technology that lets people spy on your >>conversations There's an absurdly simple "fix" for this "e-bug." It's called RFC 822: "Messages consist of lines of text. No special provisions are made for encoding drawings, facsimile, speech, or structured text." SMTP != HTML. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== From: Justin T. Fanning Date: Fri Feb 1, 2002 3:39pm Subject: Bluetooth/802.11b as a audio medium? (long but good!) I was looking through a catalogue today and noticed a HP product they are calling a "Bluetooth printer adapter" (I realise other companies like 3com make them also but HP is really pushing Bluetooth at the moment). See a picture here: http://www.shopping.hp.com/cgi-bin/hpdirect/shopping/scripts/product_detail/product_detail_view.jsp?product_code=MPIPA330&script_name=product.cgi It's basically a small box about the size of a soft cigarette pack with a centronics parallel (printer port) connector on one side. The box draws it's power from the PC and contains a complete 2.4 Ghz transceiver (with antenna) and all the necessary hardware/software to control the Bluetooth spec. (Does the world really need another wireless spec? Brings to mind the saying ... The wonderful thing about standards is that there are so many to choose from!) (If your having trouble sleeping and feel like reading the 1,084 page Bluetooth spec. you can find it here:) http://www.bluetooth.com/pdf/Bluetooth_11_Specifications_Book.pdf The one minute version goes something like this: spread spectrum, frequency hopping, full-duplex signal at up to 1600 hops/sec. The signal hops among 79 frequencies at 1 MHz intervals i.e. 2.402 Ghz + K Mhz (k=0 to 78), Pmin 0dBm (1mW), Pmax 20 dBm (100mW). Bluetooth has a data bandwidth of 1 Mb (base) with a usable throughput of ~ 700 k/sec. Built in proprietary encryption algorithm and key exchange, with key size 8 - 128 bits, usable distance is quoted as 10 Meters (34 feet). OK, now the question ... If a hostile Bluetooth printer adapter (or 802.11b for that matter) was added to a corporate/government network as a hostile transport layer would it be discovered? Most people on this list could easily locate a Bluetooth or 802.11b RF signal with relative ease (level 1 - 2 threat), but this is only the transport layer base band. In a corporation that legitimately uses wireless, how do you distinguish between legitimate traffic or hostile traffic originating from the clients own resources? Think of it this way, why would a corporate or government attempt a risky placement of an RF device that may only have a lifetime of days (not to mention risking their own freedom in the placement) when a package can be Emailed (or hacked) onto the existing network and the data traffic simply delivered over the existing wireless infrastructure to the car park, across the road etc. (In fact driving around town with an 802.11b equipped portable seems to be the new elite geek sport in most major cities). The data could of course also be room audio as almost all notebooks and a lot of high end PC's now also have built in microphones. While I know its JMA's (and many other's) policy to give such devices swift justice, I've never actually seen a PC or notebook where the mic has been hardware deactivated and I've seen a _lot_ of corporate setups. Does anyone go down to the packet addressing layer, even the packet "payload" (content) layer? What if the content was encrypted? How many TSCM'ers sweep for unknown 802.11b MAC address's or Bluetooth device address's? Is this the future of TSCM? Regards, Justin 4714 From: Michael Puchol Date: Fri Feb 1, 2002 4:35pm Subject: Re: Bluetooth/802.11b as a audio medium? (long but good!) Justin, > If a hostile Bluetooth printer adapter (or 802.11b for that matter) > was added to a corporate/government network as a hostile transport > layer would it be discovered? First, you would do an inventory of 'legal' RF devices, such as 802.11b access points, Bluetooth devices, etc. present in the organisation. Then, an RF survey of the area surrounding the company, to detect other such devices. Then, an RF survey of the actual building, to discover 'rogue' or planted devices. Sometimes employees install wireless devices without consulting with their IT department, which can cause HUGE security problems. Finding these 'rogue' devices is a must. > Most people on this list could easily locate a Bluetooth or 802.11b > RF signal with relative ease (level 1 - 2 threat), but this is only > the transport layer base band. In a corporation that legitimately > uses wireless, how do you distinguish between legitimate traffic or > hostile traffic originating from the clients own resources? That's a tough one with just a SA or other RF survey tool. You would need to go into the transport layer itself, by using a sniffer. For wireless 802.11b, I recommend AiroPeek, which lets you sniff a wireless network without actually attaching to it. If you can get a wire into the LAN, a standard sniffer would show all active nodes. NAI's Network Inspector is wonderful as it gives you a full catalogue of network devices, subnets, etc. Make sure you sniff all sides of switches and routers - you may miss network segments otherwise, and all available subnets. To be thorough, I'd leave a sniffer running for 2-4 days on each segment, then do a statistical analysis on the data. You can then determine which nodes are most active, and what traffic they are sending - you may find strange IPs sending data to outside networks, etc. A really nice audit tool is eEye's Iris, which catalogues sniffed traffic according to connection type, and it even lets you reconstruct web browsing & email sessions - of course the usual filtering tools are available. > Think of it this way, why would a corporate or government attempt a > risky placement of an RF device that may only have a lifetime of days > (not to mention risking their own freedom in the placement) when a > package can be Emailed (or hacked) onto the existing network and the > data traffic simply delivered over the existing wireless > infrastructure to the car park, across the road etc. (In fact > driving around town with an 802.11b equipped portable seems to be > the new elite geek sport in most major cities). Well, Network Stumbler seems to be gaining adepts every day! I have done audits & penetration tests on companies that had wireless APs in place, with absolutely no protection, not even WEP. The execs were dumbstruck when evidence was presented that ALL of their network data, passwords, servers, even printers were accessible to anyone with a laptop, a WLAN card, and a few hours to spare. In one case, a costumer wouldn't believe his network was unsecure, so his IT man told him, so we printed out the report on his Xerox DocuPrint from the car park. Remember, you must have a written contract with your client to do all these tests, and a NDA to show you won't tell anyone of what you found is also helpful. > The data could of course also be room audio as almost all notebooks > and a lot of high end PC's now also have built in microphones. While > I know its JMA's (and many other's) policy to give such devices > swift justice, I've never actually seen a PC or notebook where the > mic has been hardware deactivated and I've seen a _lot_ of corporate > setups. With a standard 802.11b, effective throughput 5Mbps at best, you could be sending out some 150 sepparate audio feeds with the right compression. However such traffic would be WAY visible to a sniffer or IDS. > Does anyone go down to the packet addressing layer, even the packet > "payload" (content) layer? What if the content was encrypted? > How many TSCM'ers sweep for unknown 802.11b MAC address's or > Bluetooth device address's? Is this the future of TSCM? It certainly is a 'clear and present danger' to quote a movie title, so you must really watch out for these devices. Looking at the actual data being sent around is really useful in identifying problems or misuse/abuse - plus you get to learn about network protocols! All the best, Mike 4715 From: Date: Fri Feb 1, 2002 0:24pm Subject: Judge Rules on Wiretap Evidence Judge Rules on Wiretap Evidence By PAUL NOWELL .c The Associated Press CHARLOTTE, N.C. (AP) - A federal judge ruled Friday that wiretap evidence collected by Canadian intelligence agents can be used in the trial of a man accused of helping the militant group Hezbollah. Said Mohamad Harb, 31, a Lebanon-born naturalized U.S. citizen, and three Middle Eastern co-defendants were charged last year with planning to provide Hezbollah with cash and supplies, including stun guns, blasting equipment, night vision goggles and mine detection equipment. Harb's trial, scheduled for April, will be one of the first prosecutions under a 1996 law that forbids providing material support to a known terrorist organization. Harb, who has been held without bail, could get up to 60 years in prison if convicted. U.S. Magistrate Judge Brent McKnight's ruling means prosecutors may call the Canadian Security Intelligence Service agents to testify about the summaries of telephone wiretaps made in 1999 and 2000. Harb's defense lawyers challenged the use of the testimony and the transcripts without the tapes, which have been destroyed. At a hearing last year, they said admitting such evidence would violate Harb's rights. McKnight said the evidence can be admitted under the ``past recollection exception to the hearsay rule.'' ``Although this exception was accorded the least discussion by both parties, it is clearly the most relevant since the witnesses who authored the summaries will testify at trial,'' he wrote. Messages left late Friday for defense attorney Chris Fialko were not immediately returned. The Canadian Security Intelligence Service says it intercepted Harb's phone conversations during the normal course of business and later shared the information with U.S. intelligence and the FBI. CSIS produced 113 pages of transcripts but said it was standard procedure to destroy the tapes. Initially, Harb was among 18 people charged with smuggling millions of dollars worth of cheap cigarettes out of North Carolina to resell in states where higher taxes push the price up. A superseding indictment in March levied the more serious accusations - that Harb and eight others are part of a Charlotte-based cell of Hezbollah. The North Carolina case was brought long before the Sept. 11 terrorist attacks. AP-NY-02-01-02 1815EST 4716 From: Andre Holmes <1ach@v...> Date: Thu Jan 31, 2002 11:42pm Subject: RWonline - Industry Resources Heres a wealth of information. ANDRE http://www.rwonline.com/pandsdir/index.shtml# [Non-text portions of this message have been removed] 4717 From: Matthew Paulsen Date: Sat Feb 2, 2002 5:11am Subject: Oops Dave - Hey Bob - got the ax? Bob - ... Dave - Bob? Hey Bob... Bob - ... Dave - Bob, you're not looking too good. Are you ok? http://news.bbc.co.uk/hi/english/world/europe/newsid_1795000/1795792.stm [Non-text portions of this message have been removed] 4718 From: tek492p Date: Sun Feb 3, 2002 7:34pm Subject: INTERTECT: Introduction Hello to the group -- INTERTECT, which provides TSCM services to the southern California and west coast (USA) areas, has recently up-graded its equipment package to include the following new equipment: Tektronix 492 Spectrum Analyzer, (50 kHz to 21 GHz). Riser-Bond 1220 Time Domain Reflectometer. Technical Services Agency (TSA) CCR-3 Carrier Current Receiver. Alinco DJ-X10 Hand-Held Scanning Receiver, (100 kHz to 2 GHz). For more information about our company and services, please contact us at the following: Intertect P. O. Box 7873 Northridge, CA 91327 (USA) Telephone: (818) 831-0515 Jack Lindauer, President/CEO Electronic Surveillance Countermeasures 4719 From: Date: Sun Feb 3, 2002 2:48am Subject: Electronic Telephone Systems What methods or equipment are available to examine electronic telephone systems such as ROLM or MERIDIAN? I know the instrument can be physically examined and tested using one of many telephone analyzers (What manufacturer is considered the best?), the frame rooms can be examined, the telephone instrument programming can be examined via the telephone system computer and the telephone lines can be checked with a TDR. Are there any other recommended procedures? Douglas Jones, Sgt. Miami-Dade Police Department 4720 From: jim33060 Date: Sun Feb 3, 2002 3:07pm Subject: Travel Insurance for overseas trip I will be soon traveling to S.E. Asia for a two-week assignment. Would like some advice on Insuring my Kit, Oscor, Orion, etc. I'm Gun Shy about my homeowners, can't afford to be cancelled like most will do nowadays if god forbid you need them to cover a loss. Any real life suggestions? 4721 From: James M. Atkinson Date: Mon Feb 4, 2002 9:32am Subject: 11 years for 'Bond spy fantasist' http://www.thisislondon.co.uk/dynamic/news/top_story.html?in_review_id=495008&in_review_text_id=454985 11 years for 'Bond spy fantasist' by Martin McGlown A security guard inspired by James Bond was jailed for 11 years today for trying to sell defence secrets to the Russians. Raphael Bravo hoped to receive thousands of pounds for the files he stole from British Aerospace in Stanmore. They contained information "useful to the enemy" and "prejudicial to the safety or interest of the state", the Old Bailey heard. The files dealt with the self-defence radar system of the Harrier jet, warfare surveillance systems for Army helicopters and even the capabilities of foreign countries, including Iraq, to detect British missiles. Bravo, 30, described as an "unsociable loner", was arrested by Special Branch officers outside a central London hotel last August after agreeing to meet a man he believed to be a Russian agent. In fact, the "agent" worked for MI5. He told police he got the idea to trade secrets from "reading spy novels and watching TV and James Bond movies." Bravo pleaded guilty to nine charges of theft and offences under the Official Secrets Act. He asked for two more offences to be considered. Sentencing him today, Recorder of London Michael Hyam said: "Anyone who has put at risk the security of this country must accept that he will receive a long prison sentence. "In cases of this sort emphasis must be placed on the deterrent factor of the sentence. Despite what you intended, there is no evidence that allied or UK interests were in fact prejudiced by what you did. There is no evidence that you acted with anyone else. Your only motive was financial gain." The court heard how Bravo, who worked nights for the Crusader security firm, stole the secret documents while carrying out his patrols. He had access to safes which required combinations or keys. After he posted one document to the Russian Embassy in London, MI5 received a tipoff from a source not specified in court. Days later Bravo was phoned at his Harlesden home by the MI5 "agent". A meeting was arranged at the White House hotel in Euston. Officers swooped on Bravo after he arrived on a motorcycle and delivered the documents in a carrier bag, said Aftab Jafferjee, prosecuting. Bravo told the agent: "I could go to prison for this." Asked what he wanted in return for the 200 pages of files, he replied: "Money, as much as I can get." He added that he could obtain more files on a "regular basis". He later confessed to police: "I expected to be paid a few thousand pounds, which is cheaper for the Russians than having to spend several million for that type of information." Mr Jafferjee said security at BAe Systems had been reviewed since the case. Defending Bravo, Rock Tansey described him as a "naive" man whose family are "shocked and devastated". It was even a mystery to the defendant himself why he should have committed these offences. "As he saw it, the Russians were not the enemy of this country any more. The Cold War was over and the relationship between the UK and Russia was changing," said Mr Tansey. "There was no way he would have sold that sort of material to Libya, North Korea, Iraq or China because he realised these were the real enemies of this country. "He is genuinely remorseful for what he has done. No planning went into the question of which document he took. He knew he would not be able to understand. They were very technical. The most top secret documents had red spines and these were the ones he looked for." Mr Tansey said Bravo needed money and was depressed by the repetitive nature of his job. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4722 From: James M. Atkinson Date: Mon Feb 4, 2002 9:43am Subject: Spying homes in on Chinese snoring http://seattlepi.nwsource.com/opinion/56133_hoagland27.shtml Spying homes in on Chinese snoring Tuesday, January 29, 2002 By JIM HOAGLAND SYNDICATED COLUMNIST WASHINGTON -- The spies who allegedly bugged the headboard of the Chinese president's airborne bed must have expected to gather more than the scoop on Jiang Zemin's snoring patterns. What reward would justify the high risk of discovery this exploit entailed? Bugging a presidential jetliner of another nation is tricky business. But it can be argued that the potential payoff is worth it. Final, decisive conversations on strategy are often held at 30,000 feet as a visiting potentate wings toward a summit where he hopes to outmaneuver his host nabob. The potentate knows that on the ground his every word will be picked up by the nabob's omnipresent listening devices. Sensitive in-flight strategy sessions may become extinct as the spy story expertly spun by Chinese officials last week spreads around the globe. Other leaders who have ordered their versions of Air Force One outfitted in the United States now must worry that their Boeing-made walls may have ears too. It is improbable that Washington developed a special covert audio program for flying heads and targeted only one. That is not how it works in the spy world. Shutting up will be easier than shutting down: Secret services abroad would have to tear apart the upholstery, fittings and, yes, headboards of their nation's flying presidential offices to see if Washington is listening to the Great One's every word and snore. To debug the $120-million Boeing 767-300ER model China purchased in June 2000, the plane would have had to be gutted beyond repair, say people with experience in different phases of this business. They warn that "sacrificing the plane," as Chinese officials say they did, is the only sure way to find highly sophisticated satellite-driven bugs. An electronic sweep would not have picked them up. Unnamed Chinese military officials told reporters for The Washington Post and The Financial Times last week that 27 listening devices had been ripped out of Jiang's airliner, which was delivered from the United States in August. The devices were supposedly discovered in October after they emitted a static whine on test flights -- a proposition that U.S. sources say is technically unlikely. The Chinese seem to be covering their tracks on how and, perhaps more importantly, when they actually found the devices. That is one of the many mysteries about this story, which the U.S. government will not confirm, deny or discuss. Only this is obvious: Chinese officials chose to surface their detailed allegations one month before President Bush makes his first trip to Beijing. My guess is the Chinese are seeking tactical advantage from the leaks. They may expect to put Bush on the defensive and to make him more conciliatory by disclosing the incident, which Jiang almost certainly will not mention himself. That is not the sort of thing presidents do to each other in their world. China's official spokesmen, while doing nothing to cast doubt on the story, won't take responsibility for confirming it, either. These new allegations serve another, unintended purpose: They underscore that the highly active espionage bureaucracies of the two countries dominate the Chinese-American relationship more thoroughly than do the diplomats, politicians or businessmen. Relations have still not fully recovered from the 1999 U.S. bombing of the Chinese embassy in Belgrade because of a CIA error. In December 2000, a senior colonel from China's most sensitive military intelligence branch defected while visiting New York, triggering a witch hunt for American agents in the command of the People's Liberation Army. Last April the two nations engaged in a tense confrontation over the forcing down of a U.S. reconnaissance plane on Hainan Island. Bush will have to handle the fallout of the bugging charges, even though his administration was almost certainly not responsible for a decision to bug Jiang's airliner. That would have been the work of spymasters of the Clinton administration. The Boeing air frame was originally sold to Delta Airlines and then repurchased by China's military in mid-2000 and sent to a "modification house" (in San Antonio apparently) for a super deluxe outfitting that seems to have included an electronic bonus the Chinese were not expecting. Like investment bankers, spies work on a risk-to-reward ratio. They would have assured policy-makers who must sign off on their operations that the risk of detection was "minimal," and cited previous successes that went off without detection, says one who has been at such sessions. Wasn't that worth capturing Jiang's every word, burp or sneeze? Amazingly, somebody at the upper reaches of government agreed, and launched a boomerang that has now spun back at Washington from China. Jim Hoagland is associate editor/senior foreign correspondent for The Washington Post. Copyright 2002 Washington Post Writers Group. E-mail: hoaglandj@w... -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4723 From: James M. Atkinson Date: Mon Feb 4, 2002 9:41am Subject: FBI Director Juggles Espionage Unit http://www.guardian.co.uk/uslatest/story/0,1282,-1484280,00.html FBI Director Juggles Espionage Unit Wednesday January 30, 2002 11:10 PM WASHINGTON (AP) - The FBI director has reassigned the acting head of his national security division, one of the bureau's highest-ranking women, after losing confidence in her investigation into whether China tried to recruit a U.S. spy, according to people familiar with the move. FBI Director Robert S. Mueller made the decision about a week ago to replace Sheila Horan. During 1998, Horan headed the investigation into the bombings of two U.S. embassies in Africa, which led investigators to al-Qaida followers of Osama bin Laden. Mueller notified Senate oversight committee members, and on Tuesday personally explained his decision during a closed-door Senate briefing. Horan was reassigned to an administrative position. Sources familiar with the meeting said Mueller told senators he had serious concerns within the division, which investigates reports of spying in the United States, and he outlined the changes he has made. The New York Times, which first reported Horan's reassignment, said Mueller was dissatisfied with her investigation of suspicions that China tried to recruit a spy against the United States. The Times, citing anonymous officials, said few details were available and that the identity of the subject of the investigation was unknown. The newspaper said these officials did not say whether any spying had occurred. The FBI declined to comment Wednesday about Horan or her future at the bureau. A person answering calls at her home referred calls to her office at FBI headquarters, where she could not be reached immediately. An FBI spokesman, Bill Carter, said the director's decision was an administrative matter and that Horan would not speak with reporters. The Times reported that she was expected to leave the FBI. Horan took over as acting director of the national security division after the retirement of Neil Gallagher in November, who left the bureau after a tumultuous period. The FBI's espionage division suffered a setback in February with veteran counterintelligence agent Robert Hanssen's arrest on spying charges. Hanssen pleaded guilty to spying for the Soviet Union, then Russia, over at least 15 years. Gallagher was involved in the investigation of scientist Wen Ho Lee. Government watchdogs accused Gallagher of misleading Congress about the investigation. Gallagher told Senate committees in June 1999 that he had full confidence in an early Energy Department inquiry into the national weapons laboratory at Los Alamos, N.M., saying the investigation made a compelling case to focus on Lee. The Taiwan-born naturalized American was accused of leaking nuclear secrets to China. The General Accounting Office, Congress' investigative arm, said the statement was misleading because the FBI's Albuquerque, N.M., office had expressed serious misgivings about the inquiry that Gallagher should have known about. Gallagher told GAO investigators the mistake was inadvertent and said he did not intentionally mislead lawmakers. Guardian Unlimited © Guardian Newspapers Limited 2002 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4724 From: James M. Atkinson Date: Mon Feb 4, 2002 9:39am Subject: Senior FBI National Security Division chief demoted over spy probe http://www.cnn.com/2002/LAW/01/30/fbi.demotion/index.html Senior FBI National Security Division chief demoted over spy probe January 30, 2002 Posted: 3:10 PM EST (2010 GMT) WASHINGTON (CNN) -- One of the FBI's senior national security officials has been demoted over the handling of an investigation into possible Chinese espionage. According to bureau officials, Sheila Horan has been removed from her job as deputy assistant director for counterintelligence in the National Security Division, and has been moved to the Administrative Services Division. The action was ordered by FBI Director Robert Mueller. Bureau officials say the espionage investigation deals with the possible attempt by China to recruit a spy against the United States. No details were provided about the status of that investigation. Bureau officials told CNN Horan did not pursue the probe aggressively enough to satisfy Mueller, and he felt she was slow to inform him of details of the investigation. The counterintelligence unit has been embarrassed within the last few years by various scandals, including the discovery that one of the bureau's own --now-convicted veteran FBI agent Robert Hanssen -- had been spying for Russia for years. The FBI was also red-faced after its intensive investigation of nuclear scientist Wen Ho-Lee, suspected of spying for China, largely fell apart. He pleaded guilty to one count of mishandling classified material and has now published a book accusing the FBI of treating him unfairly because of his Chinese heritage. The case Horan was looking into is said to be unrelated to the discovery of listening devices -- bugs -- found aboard a Boeing 767 delivered to China recently for use by the Chinese government. Horan, 54, joined the FBI in 1973. She is one of the bureau's highest ranking women. She has worked counterintelligence since 1975. In August 1997, she was named special agent in charge of the FBI's National Security Division in the bureau's Washington field office. In December 1998 she was promoted to deputy assistant director for counterintelligence at headquarters. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4725 From: James M. Atkinson Date: Mon Feb 4, 2002 9:31am Subject: CIA helps museum open door on spying http://www.portal.telegraph.co.uk/news/main.jhtml?xml=/news/2002/01/27/wspy27.xml&sSheet=/portal/2002/01/27/por_right.html CIA helps museum open door on spying By David Wastell in Washington (Filed: 27/01/2002) THE long shadows of some of the world's most notorious spies and double-agents, from Anthony Blunt to Aldrich Ames, will be cast over Washington in June with the opening of the world's largest museum dedicated to the history of espionage. Former members of the KGB and CIA have been recruited to give advice on exhibits ranging from special "escape boots" designed for British pilots in the Second World War to a concealed camera used to monitor East German hotel bedrooms. In a city that has seen more than its fair share of spies and is still, presumably, home to hundreds of them, the museum will acknowledge the work done by the world's secret agents and by America's much-maligned L21 billion-a-year intelligence effort. "Intelligence officers do not usually want or seek banner headlines," said Peter Earnest, a former career CIA officer who spent 20 years running clandestine networks behind the Iron Curtain. "The Cold War was an intelligence war, and it was intelligence that stopped it from becoming a hot war, but there were no parades of intelligence officers at the end of it. "People often talk about intelligence failures but they don't hear about many of the successes - embassies that have not been bombed, airports that have not been attacked - and one of our aims is to get people thinking about the role that intelligence has played in history." Officially, the CIA has no view on the museum, which will be housed in a group of 100-year-old buildings in what was once the bustling heart of Washington. Unofficially, the agency, whose headquarters are a few miles up the Potomac River in Langley, Virginia, has been encouraging it. As well as Mr Earnest, who is the museum's executive director, members of its advisory board include Judge William Webster, the former director of the FBI and CIA, Antonio Mendez, who was the CIA's chief of disguise, and a string of other intelligence experts. For balance, there is one Briton, Christopher Andrew, the spy historian, and a Russian who defected: Oleg Kalugin, a former KGB major-general who ran the Soviets' counter-intelligence wing. The museum is being financed by Milton Maltz, a wealthy broadcasting executive and businessman of Cleveland, Ohio, who once worked in America's National Security Agency. Many more spies and former spies, including some still in prison, have been interviewed on video to provide realistic accounts of their operations. The museum will acknowledge British and American traitors, including Blunt, who was stripped of his knighthood when revealed as a double-agent, and Ames, regarded as the most damaging CIA turncoat for his betrayal to the Russians of dozens of American agents, many of whom were executed. It will also examine the spycraft of the traitor Robert Hanssen, who overlooked the site of the new museum from his fourth-floor office at FBI headquarters until he was arrested, last February, for selling secrets to Moscow for 15 years. Hanssen used what Mr Earnest described as "classic techniques" to pass information to his KGB contacts, such as secret "dead drops" for leaving documents in parks and public places in the Washington area. Artefacts on display will include a "Kiss of Death" KGB lipstick tube, designed to fire a single bullet when twisted, an Enigma code-breaking machine and a range of fake warts used to smuggle microdots of secret information. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4726 From: James M. Atkinson Date: Mon Feb 4, 2002 9:45am Subject: Judge Rules On Wiretap Evidence http://www.guardian.co.uk/uslatest/story/0,1282,-1489453,00.html Judge Rules On Wiretap Evidence Friday February 1, 2002 11:20 PM CHARLOTTE, N.C. (AP) - A federal judge ruled Friday that wiretap evidence collected by Canadian intelligence agents can be used in the trial of a man accused of helping the militant group Hezbollah. Said Mohamad Harb, 31, a Lebanon-born naturalized U.S. citizen, and three Middle Eastern co-defendants were charged last year with planning to provide Hezbollah with cash and supplies, including stun guns, blasting equipment, night vision goggles and mine detection equipment. Harb's trial, scheduled for April, will be one of the first prosecutions under a 1996 law that forbids providing material support to a known terrorist organization. Harb, who has been held without bail, could get up to 60 years in prison if convicted. U.S. Magistrate Judge Brent McKnight's ruling means prosecutors may call the Canadian Security Intelligence Service agents to testify about the summaries of telephone wiretaps made in 1999 and 2000. Harb's defense lawyers challenged the use of the testimony and the transcripts without the tapes, which have been destroyed. At a hearing last year, they said admitting such evidence would violate Harb's rights. McKnight said the evidence can be admitted under the ``past recollection exception to the hearsay rule.'' ``Although this exception was accorded the least discussion by both parties, it is clearly the most relevant since the witnesses who authored the summaries will testify at trial,'' he wrote. Messages left late Friday for defense attorney Chris Fialko were not immediately returned. The Canadian Security Intelligence Service says it intercepted Harb's phone conversations during the normal course of business and later shared the information with U.S. intelligence and the FBI. CSIS produced 113 pages of transcripts but said it was standard procedure to destroy the tapes. Initially, Harb was among 18 people charged with smuggling millions of dollars worth of cheap cigarettes out of North Carolina to resell in states where higher taxes push the price up. A superseding indictment in March levied the more serious accusations - that Harb and eight others are part of a Charlotte-based cell of Hezbollah. The North Carolina case was brought long before the Sept. 11 terrorist attacks. Guardian Unlimited © Guardian Newspapers Limited 2002 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4727 From: James M. Atkinson Date: Mon Feb 4, 2002 9:50am Subject: Would-be spy jailed for eight years http://www.thescotsman.co.uk/index.cfm?id=125082002 Would-be spy jailed for eight years Dan McDougall Crime Correspondent A BRITISH Aerospace security guard who stole top secret military documents and tried to sell them to the Russian secret service was last night jailed for eleven years. Raphael Bravo, 30, who admitted his knowledge of espionage amounted to the James Bond films, snatched the highly confidential material, including designs for Royal Navy anti-radar equipment, while on night shift patrol at BAe's HQ in Stanmore, London an Old Bailey jury heard. The stolen papers which also included top secret information on protection systems for Royal Navy ships and the defence systems of hostile countries like Iraq, were said by the prosecution to pose a "substantial threat to the safety of the state". But the Crown admitted there was no evidence Bravo had a political motive and had purely been driven by greed. Bravo, described to the court as a loner, took the red-spined secret documents when he patrolled at the British Aerospace HQ in west London in June and July last year. He worked from 7pm to 7am, but colleagues noted he was unhappy in his job, and it emerged in court that he had even spoken to them of selling documents to the Russians. Aftab Jafferjee, prosecuting said: "Mr Bravo abused his position and trust by stealing the documents and endeavoured to sell the secrets to a foreign power, that is Russia. Any document labelled secret means that the compromising of such information would be likely to threaten life directly or cause serious damage to the operational effectiveness of the security of the UK or allied forces." The court heard that after removing the files from the base last year Bravo tried to sell on the documents to the Russians for "as much money as he could get", first phoning the embassy and then sending them a sample paper with his pager number attached. But MI5 were instantly on the married Londoner's trial. The security guard was caught when he tried to hand over the documents to a man he believed was a Russian agent, turned out to be working for MI5. Bravo of Willesden, north west London, admitted at an earlier hearing that he took documents relating to front-line defence systems. He pleaded guilty to nine offences and asked for two others to be taken into consideration. Seven charges were under the Official Secrets Act and four were theft. Bravo expected to be paid a few thousand pounds for the secrets. He said after his arrest that he had telephoned the Russian embassy after getting the number from the phone directory, but found that there was only an answering machine. He then decided to post the documents to the embassy with a note saying if they were interested in more documents to contact him. The guard who worked for Crusader security under contract to BAe Systems said he decided to take advantage whenever a cabinet containing secret documents was left open. He later pleaded guilty to the crimes, but said his sole knowledge of espionage came from "newspapers, spy novels and James Bond". Sentencing Bravo, Judge Michael Hyam said: "Despite what you intended there is no evidence that national or allied interests were in fact prejudiced by what you did. "But had you succeeded there is no doubt whatever that the interests of this country and its allies would have been substantially prejudiced." Bravo's arrest resulted from a combined operation between MI5 and Special Branch. After the trial Commander Roger Pearce, the Metropolitan Police's director of intelligence, said Bravo's sentence reflected the severity of this crime. He said: "This man abused his position of trust and his actions could potentially have put lives at risk. "The arrest of Raphael Bravo was a result of an intelligence-led operation involving Special Branch and a number of other agencies working closely together and we are satisfied with the outcome." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4728 From: James M. Atkinson Date: Mon Feb 4, 2002 9:45am Subject: Security guard spy jailed after MI-5 traps him http://www.thetimes.co.uk/article/0,,2-2002054451,00.html SATURDAY FEBRUARY 02 2002 Security guard spy jailed after MI-5 traps him BY SAM LISTER A SECURITY guard who tried to sell military secrets to the Russians was jailed for 11 years at the Old Bailey yesterday. Rafael Bravo, 30, could have threatened lives and caused serious damage to the security of Britain and its allies had he succeeded in selling files he stole while working night shifts at British Aerospace, the court was told. The documents, marked "UK eyes only" and "Nato secret", detailed frontline defence systems for British Apache helicopters, Harrier jump-jets, warships and radar surveillance. Soon after the thefts, between July and August last year, Bravo was trapped by a classic MI5 "sting" when he passed the papers to British agents, believing they were Russians. Sentencing Bravo, the Recorder of London, Judge Michael Hyam, said that, although he accepted that the guard had been motivated only by financial gain, he was compelled to impose a lengthy jail term to deter others. "Despite what you intended there is no evidence that national or allied interest were in fact prejudiced by what you did. But had you succeeded there is no doubt whatever that the interests of this country and its allies would have been substantially prejudiced," he said. "Anyone who has put at risk his country's security must expect to receive long sentences." Bravo, described as a loner and typical opportunist spy, pleaded guilty to six offences under the Official Secrets Act and five under the Theft Act after admitting to taking the files from desks and cabinets around the BAe headquarters in Stanmore, north London. The court heard that the scheme was so ill thought-out and unsophisticated that it appeared inspired by little more than spy novels and James Bond films. The theft set off a major security alert. Bravo, a British national of Spanish descent, was phoned at his bedsit in Willesden, north London, by an MI5 man pretending to be Russian. He was arrested after a meeting at which he agreed to show the files and asked for "as much money as I can get". Although he is known to have asked for less than L1million for the documents, experts said they would have been worth many millions more to foreign powers. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4729 From: Date: Mon Feb 4, 2002 7:37am Subject: Re: INTERTECT: Introduction In a message dated 2/3/02 5:35:50 PM Pacific Standard Time, tek492p@y... writes: << Hello to the group -- >> Nice equipment! Where did you and/or your staff get it's training? 4730 From: Hawkspirit Date: Mon Feb 4, 2002 0:39pm Subject: Packet Sniffers Justin T. Fanning" Subject: Bluetooth/802.11b as a audio medium? (long but good!) Does anyone go down to the packet addressing layer, even the packet "payload" (content) layer? What if the content was encrypted? How many TSCM'ers sweep for unknown 802.11b MAC address's or Bluetooth device address's? Is this the future of TSCM? Regards, Justin I agree Justin, TSCM is definitely going in the direction of packet sniffing. I don't know if you followed my discussion of T1 multiplexed CO lines a few months ago. Securing these type of phone communications is the new challenge on the horizon. Packet sniffers maybe a mandatory and key piece of the sweep gear real soon. I personally am saturating on them now. I like to stay up with the leaders of the race at all times. Roger Tolces www.bugsweeps.com 4731 From: Allen Sedenka Date: Mon Feb 4, 2002 7:47am Subject: CODING ON AIRLINE TICKET On a trip to Chicago last week, I noticed that during the boarding process at the gate instead of row numbers being called for boarding, Group 1 & Group 2 ticket holders (these designations were printed above the seat #) were allowed to board first. Those not holding this designation on their tickets were asked to step aside for additional screening prior to boarding. Does anyone know what these designations are or how they are assigned, etc? I had a Group 1 designation. --------------------------------- Do You Yahoo!? Yahoo! Auctions Great stuff seeking new owners! Bid now! [Non-text portions of this message have been removed] 4732 From: Gordon Mitchell Date: Mon Feb 4, 2002 3:37pm Subject: Re: Packet Sniffers There are lots of opportunities to move toward network security. They range from the obvious (moving the mouse to see if someone left their computer logged in) to analysis of the link layer. In all of the sweeps that we do we check for 802.11 at 2.4 GHz, soon at 5. This sort of thing is fundamental. Use a professional tool like Wildpackets Airopeek on a laptop equipped with a wireless lan card. This provides great detail on really bad problems like computers offering NetBios ports, etc. Avoid hacker tools that are used for wardriving -- they will do bad things to your credibility if you end up in an expert witness situation. Bluetooth is growing slowly and is worth tracking. When it becomes more common it will be worth monitoring also. Gordon phone +1 (425) 489-0446 or toll free (888) 284-5457 Electronic eavesdropping detection Bug-Killer.com Finding clues in computers eSleuth.com Hawkspirit wrote: > > Justin T. Fanning" > Subject: Bluetooth/802.11b as a audio medium? (long but good!) > > Does anyone go down to the packet addressing layer, even the packet > "payload" (content) layer? What if the content was encrypted? > How many TSCM'ers sweep for unknown 802.11b MAC address's or > Bluetooth device address's? Is this the future of TSCM? > Regards, > > Justin > > I agree Justin, TSCM is definitely going in the direction of packet > sniffing. I don't know if you followed my discussion of T1 multiplexed CO > lines a few months ago. Securing these type of phone communications is the > new challenge on the horizon. Packet sniffers maybe a mandatory and key > piece of the sweep gear real soon. I personally am saturating on them now. > I like to stay up with the leaders of the race at all times. > > Roger Tolces > www.bugsweeps.com > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- 4733 From: Michael Puchol Date: Mon Feb 4, 2002 4:14pm Subject: Fw: Packet Sniffers Aaaargh! Hit 'Reply to sender' only again! Here goes again, Hi Gordon, > > Avoid hacker tools that are used for wardriving -- they will do bad things > to > > your credibility if you end up in an expert witness situation. I have to disagree here - some of these 'hacker' tools do stuff you couldn't do with commercially available software, and obviously a cracker is going to be using precisely these tools. You are probably referring to NetStumbler, a piece of software that displays nearby WLAN access points that will respond to broadcast requests with an SSID set to 'ANY'. Some APs now don't respond to these. In any case, it is an extremely useful tool to identify APs within a certain area without having to do an extensive (and expensive) RF survey with spectrum analyzers and the like. Within a couple of seconds you'll have a list of APs that you can format appropiately (I'm not saying you go to court or to your costumer with a screen dump of NS!), and show to whoever is responsible of network security - if they're slightly competent, they'll identify roge APs straight away. Some organisations are not looking for high-tech bugs, but for dumb employees placing security hazards in their networks (proxy software, conferencing, chat, wireless LAN, etc.) so you don't really need a full-blown TSCM inspection. Another such 'hacker' tool is L0phtCrack, which again is a double-edged sword. It will capture SMB logons in Windows NT networks, and attempt dictionary-based and brute-force attacks on the LM hash. With such tool, you can present a report to a client showing him a) how easy it would be for your average school kid to get most of his organisation's passwords, and b) how necessary it is to implement strong password policies. Without this tool, it is not possible to know how secure your network really is. I admit that this program has moved onto a commercial enterprise, but there is still a freeware version available, with source code, which basically does the same, only slower. I see nothing wrong in using software like this for legitimate purposes, just like you can buy a kitchen knife to cut tomatos - you can also kill your neighbour with it. My point is that if you are not familiar with the tools that attackers will use, then you're not really going to be doing your clients any favours. Then, if they are still not convinced about the lack of security they may have, you can run a demo! Before you cut in, yes, you need to have consent from the owners of the network before you run such tests. Just my ‚Ǩ0.02's worth Mike 4734 From: James M. Atkinson Date: Mon Feb 4, 2002 6:03pm Subject: Alliance of Concerned Shamans From: Alliance of Concerned Shamans To:Chief Who Sits on Big Rock and has Mighty Club Subject: Fire. Fire bad. Maybe fire good, but no one know. Since no one know, best not to make fire. That way, we not find out, which is good. Fire anger gods. Angry gods mean bad hunts and no babies. We no want no babies. Repeat: Fire bad. People make fire too fast. Only five year ago, no fire. Last year, sparks. Now, fire. No one consult us first. No one ask gods. People just bang rocks, make sparks. We upset. We know gods upset, because gods talk to us -- not to people. So no more make fire! Fire bad. People burned. What if someone make big-big fire, burn down woods? Then animals die, we no eat animals, we die. Fire bad. Some say fire good. They stupid. If fire good, gods would have given us fire. Gods no give us fire, so, fire bad. D'uh! Stupid people who say fire good should be burned with fire! Hah! That will teach them. We shamans all say:Fire bad. You mess with fire, you make gods angry. Fire bad for women and babies and cute little bunnies. So, Chief, please: Hit people who mess with fire with big club. Thank you. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4735 From: Date: Tue Feb 5, 2002 10:26am Subject: Bush Eyeballs Heavy Tech Spending Bush Eyeballs Heavy Tech Spending By Declan McCullagh 2:00 a.m. Feb. 5, 2002 PST WASHINGTON -- President Bush is asking Congress to grant federal police hundreds of millions of dollars for surveillance, information-sharing and computer upgrades. In his proposed 2003 budget sent to Capitol Hill on Monday, Bush proposed an unprecedented increase on spending for anti-terrorism efforts, saying that doing so "recognizes the new realities confronting our nation, and funds the war against terrorism and the defense of our homeland." Because the complex document is merely a proposal, Congress will spend much of this year wrangling over what form the final budget will take for the fiscal year beginning Oct. 1, 2002. Bush proposes spending $2.13 trillion for the 2003 fiscal year, a 3.7 percent overall increase from this year's spending. But if you don't count mandatory programs like Social Security, discretionary spending jumps $124 billion, or 19 percent. One of the biggest winners would be the Justice Department, which includes the FBI, the Drug Enforcement Agency and the thousands of DOJ attorneys in the criminal, civil and other divisions. The DOJ would get a budget increase of $1.8 billion to a total of $30.2 billion, not counting $539.2 million it already received as part of an emergency spending bill enacted after Sept. 11. The FBI would receive $61.8 million and 201 more employees or contractors to support the agency's "surveillance capabilities to collect evidence and intelligence," the DOJ said in a statement on Monday afternoon. That would allow the FBI to devote more resources than ever to controversial spy technologies like Carnivore, keyboard logging devices, and Magic Lantern. Included in that figure is: $5.6 million to expand an unnamed FBI "data collection facility," $32 million and 194 positions devoted to intelligence and information gathering, $10.9 million for expanded electronic surveillance, $11.3 million for an "Electronic Surveillance Data Management System," and $2 million for the Special Operations Group's intelligence and surveillance operations. In addition, the FBI would receive $157.6 million to upgrade and enhance its computer systems. The FBI's National Infrastructure Protection and Computer Intrusion Program would get $21 million and 138 new hires, including 81 agents. The purpose: To respond to "cyber-attacks" and investigate electronic intrusions. To handle the expected increase in wiretaps, especially ones approved by the shadowy Foreign Intelligence Surveillance Act court, the Department of Justice itself would get a boost. The budget anticipates hiring another 10 wiretap-specialist attorneys at a cost of $2 million. On Capitol Hill, initial reaction to the budget was cautious and followed party lines. "The President's budget is a good first step in what is sure to be one of the most challenging budget seasons we've seen in quite some time. The biggest challenge will be to control spending while meeting all of our priorities," said House Budget committee chairman Jim Nussle (R-Iowa). House Minority Leader Richard Gephardt said: "While President Bush should be commended for his commitment to defense and homeland security in his budget released today, he should seriously reconsider his fiscal priorities for our future economic growth." To cover in part the budget increases, Bush has proposed cutting highway spending and environmental projects. Other agencies include: Patent and Trademark Office: The PTO would receive a remarkable 21.2 percent budget increase. James Rogan, Undersecretary of Commerce for Intellectual Property, said on Monday that the cash would let him hire 950 more patent examiners. General Services Administration: It may be best known for the humble task of maintaining government buildings, but the GSA is also responsible for providing "one-stop access to federal services via the Internet or telephone." Bush proposes $45 million for an "e-gov" fund to be handled by a new "Office of Citizen Services," a jump from last year's request of $20 million. National Commission on Libraries and Information Science: President Bush proposes to eliminate this minor bureaucracy, saying its $1 million budget could be better spent by the Institute of Museum and Library Services. That institute would receive $211 million, $16 million than last year. National Archives and Records Administration: Digital signatures, designed to be impossible to forge, finally will make their way into the venerable Federal Register, the voluminous record of new government regulations. NARA will also receive $2.3 million to spend on its Electronic Records Management project. 4736 From: James M. Atkinson Date: Tue Feb 5, 2002 9:39pm Subject: The 10 Commandments of Counterintelligence The 10 Commandments of Counterintelligence BY James M. Olson This article appeared in Studies of Intelligence, Unclassified Edition, Fall-Winter 2001, No.11, published by the CIA's Center for the Study of Intelligence. The Center seeks to promote study, debate, and understanding of the role of intelligence in the American system of government. Mr. Olson served in the Central Intelligence Agency's Directorate of Operations and is presently on the faculty of the George Bush School of Government and Public Service at Texas A&M University. "O that thou hadst hearkened to my commandments! Then had thy peace been as a river, and thy righteousness as the waves of the sea." Isaiah 48:18 The need for counterintelligence (CI) has not gone away, nor is it likely to. The end of the Cold War has not even meant an end to the CI threat from the former Soviet Union. The foreign intelligence service of the new democratic Russia, the Sluzhba Vneshney Razvedki Rossii (SVRR), has remained active against us. It was the SVRR that took over the handling of Aldrich Ames from its predecessor, the KGB, in 1991. It was the SVRR that ran CIA officer Harold James Nicholson against us from 1994 to 1996. It was the SVRR that was handling FBI special agent Earl Pitts when he was arrested for espionage in 1996. It was the SVRR that planted a listening device in a conference room of the State Department in Washington in the summer of 1999. And it was the SVRR that was handling FBI special agent Robert Hanssen when he was arrested on charges of espionage in February 2001. The Russians are not alone. There have been serious, well-publicized concerns about Chinese espionage in the United States. The Department of Energy significantly increased security at its national laboratories in response to allegations that China had stolen US nuclear weapons secrets. Paul Redmond, the former Associate Deputy Director of Operations for Counterintelligence at the CIA, told the House Permanent Select Committee on Intelligence in early 2000 that a total of at least 41 countries are trying to spy on the United States. Besides mentioning Russia, China, and Cuba, he also cited several "friends," including France, Greece, Indonesia, Israel, the Philippines, South Korea, and Taiwan. He warned of a pervasive CI threat to the United States. The United States, as the world's only remaining superpower, will be the constant target of jealousies, resentments, rivalries, and challenges to its economic well-being, security, and leadership in the world. This inevitably means that the United States will be the target of large-scale foreign espionage. A Choice Assignment When I joined the CIA, one of my first interim assignments was with the old CI Staff. I found it fascinating. I was assigned to write a history of the Rote Kapelle, the Soviet espionage network in Nazi-occupied Western Europe during World War II. With its expanded computer power, NSA was breaking out the actual messages sent between the NKVD center in Moscow and the clandestine radios of the various cells in Western Europe. Incredibly, these messages came to me. There I was, a brand new junior officer, literally the first person in the CIA to see the day-to-day traffic from these life-and-death operations. I was deeply affected by the fear, heroism, and drama in these messages. Above all, I felt privileged to have been given such an opportunity. Building on an earlier study of the Rote Kapelle by the CI Staff, I completed a draft several months later that incorporated the new material. To my great surprise, this study was well received by my immediate superiors, and I was told that I was to be rewarded with a personal interview and congratulations from James Jesus Angleton, the legendary head of the CI Staff from 1954 to 1974. Angleton's office was on the second floor of the Original Headquarters Building. I was first ushered into an outer office, where Angleton's aides briefed me on how to conduct myself. And then I went alone into the inner sanctum. The room was dark, the curtains were drawn, and there was just one small lamp on Angleton's desk. I later heard that Angleton had eye trouble and that the light hurt his eyes, but I was convinced the real reason for the semidarkness was to add to his mystique. It certainly worked on me! I nervously briefed Angleton on my study, and he listened without interrupting, just nodding from time to time. When I finished, he methodically attacked every one of my conclusions. Didn't I know the traffic was a deception? Hadn't it occurred to me that Leopold Trepper, the leader of the Rote Kapelle, was a German double? He went on and on, getting further and further out. Even I, as a brand new officer, could tell that this great mind, this CI genius, had lost it. I thought he was around the bend. It was one of the most bizarre experiences of my career. When the meeting was over, I was glad to get out of there, and I vowed to myself that I would never go anywhere near CI again. I did not keep that vow. In my overseas assignments with the Agency, I found myself drawn toward Soviet CI operations. Nothing seemed to quicken my pulse more, and I was delighted when I was called back to Headquarters in 1989 to join the new Counterintelligence Center (CIC) as Ted Price's deputy. When Ted moved upstairs in early 1991 to become the Associate Deputy Director for Operations, I was named chief of the Center. Today, many years after that initial disagreeable encounter with CI, I find it hard to believe that it is actually my picture on the wall of the CIC conference room at CIA Headquarters, where the photos of all former CIA counterintelligence chiefs are displayed. There I am, number seven in a row that begins with Angleton. So, after a career that ended up being far more CI-oriented than I could ever have imagined, I would like to offer some personal observations in the form of "The 10 Commandments of Counterintelligence." I have chosen the form of commandments because I believe the basic rules of CI are immutable and should be scrupulously followed. In my view, it makes little difference whether the adversary is the Russians, the Cubans, the East Germans, the Chinese, or someone else. It likewise makes little difference whether we are talking about good CI practices in 1985 or in 2005. Unfortunately, as I watch US CI today, I am increasingly concerned that the principles I consider fundamental to effective CI are not being followed as carefully and consistently as they should be. These commandments were not handed down to me from a mountaintop, and I make no claim that they are inspired or even definitive. They are simply the culmination, for what they are worth, of my experience. They are intended primarily for my fellow practitioners in CI today, but also for any younger officers in the Intelligence Community (IC) who might someday want to join us. The First Commandment: Be Offensive CI that is passive and defensive will fail. We cannot hunker down in a defensive mode and wait for things to happen. I believe we are spending far too much money on fences, safes, alarms, and other purely defensive measures to protect our secrets. That is not how we have been hurt in recent years. Spies have hurt us. Our CI mindset should be relentlessly offensive. We need to go after our CI adversaries. Aggressive double agent (DA) operations are essential to any CI program, but not the predictable, hackneyed kind we have so often pursued. We need to push our bright and imaginative people to produce clever new scenarios for controlled operations, and we need more of them. The opposition services should be kept constantly off guard so that they never suspect that we have actually controlled the operations they believe they initiated from the beginning. When the requirements, modus operandi, and personality objectives of the DA operation have been achieved, we should in a greater number of cases pitch the opposition case officer. If only one out of 10 or 20 of these recruitments takes, it is worth it. And CI professionals, of course, should not rely exclusively on their own efforts. They should constantly prod their HUMINT colleagues to identify, target, and recruit officers from the opposition intelligence services. The key to CI success is penetration. For every American spy, there are several members of the opposition service who know who he or she is. No matter what it takes, we have to have penetrations. We should operate aggressively against the nontraditional as well as the traditional adversaries. How many examples do we need of operations against Americans by so-called friendly countries to convince us that the old intelligence adage is correct: there are friendly nations, but no friendly intelligence services? If we suspect for whatever reason that the operatives of a foreign intelligence service, friend or foe, are operating against us, we should test them. We should dress up an enticing morsel, made to order for that specific target, and send it by them. If they take it, we have learned something we needed to know, and we have an operation. If they reject it, as true friends should, we have learned something, too. In either event, because we are testing a "friend," plausible deniability has to be strictly preserved. Every foreign service is a potential nontraditional adversary; no service should get a lifetime pass from US offensive CI operations. The Second Commandment: Honor Your Professionals It has been true for years, to varying degrees throughout the IC, that CI professionals have not been favored, to the extent they deserved, with promotions, assignments, awards, praise, esteem, or other recognition. The truth is that CI officers are not popular. They are not always welcome when they walk in. They usually bring bad news. They are easy marks to criticize when things go wrong. Their successes are their failures. If they catch a spy, they are roasted for having taken so long. If they are not catching anyone, why not? What have they done with all that money they spent on CI? It is no-win. For much of my career, many of our best people avoided becoming CI specialists. CI was not prestigious. It had a bad reputation. It was not fast track. It did not lead to promotions or good assignments. Angleton left a distasteful legacy that for years discredited the CI profession. Ted Price did more than anyone else in the Agency to reverse that trend and to rehabilitate CI as a respected professional discipline. Nevertheless, that battle is still not completely won. We have to do more to get our CI people promoted, recognized, and respected so that our best young officers will be attracted to follow us into what we know is a noble profession and where the need is so great. The Third Commandment: Own the Street This is so fundamental to CI, but it is probably the least followed of the commandments. Any CI program worthy of the name has to be able to engage the opposition on the street, the field of play for espionage. And when we do go to the street, we have to be the best service there. If we are beaten on the street, it is worse than not having been there at all. For years, we virtually conceded the streets of the world's capitals, including the major espionage centers, to the KGB, the GRU, and the East European services because we either did not know how to do it or we were not willing to pay the price for a thoroughly professional, reliable, full-time, local surveillance capability. Opposition intelligence officers have to be watched, known meeting areas have to be observed, and, when an operation goes down-often on short notice- undetectable surveillance has to cover it, identify the participants, and obtain evidence. This capability is expensive-selection, training, vehicles, photo gear, video, radios, safe apartments, observation posts, and on and on-but, if we do not have it, we will be a second-rate CI service and will not break the major cases. The Fourth Commandment: Know Your History I am very discouraged when I talk to young CI officers today to find how little they know about the history of American CI. CI is a difficult and dangerous discipline. Many good, well-meaning CI people have gone wrong and made horrendous mistakes. Their failures in most cases are well documented, but the lessons are lost if our officers do not read the CI literature. I find it inconceivable that any CI practitioner today could ply his or her trade without an in-depth knowledge of the Angleton era. Have our officers read Mangold? Have they read Legend and Wilderness of Mirrors? Do they know the Loginov case, HONETOL, MHCHAOS, Nosenko, Pollard, and Shadrin? Are they familiar with Aspillaga and the Cuban DA debacle? Have they examined our mistakes in the Ames and Howard cases? Are they staying current with recent releases like The Mitrokhin Archive and The Haunted Wood? I believe it is an indispensable part of the formation of any American CI officer-and certainly a professional obligation-to study the CI failures of the past, to reflect on them, and to make sure they are not repeated. The many CI courses being offered now are a positive step, but there will never be a substitute for a personal commitment on the part of our CI professionals to read their history, usually on their own time at home. The Fifth Commandment: Do Not Ignore Analysis Analysis has too often been the stepchild of CI. Throughout the CI community, we have fairly consistently understaffed it. We have sometimes tried to make it up as we go along. We have tried to do it on the cheap. Generally speaking, operators make bad analysts. We are different kinds of people. Operators are actors, doers, movers and shakers; we are quick, maybe a little impulsive, maybe a little "cowboy." Our best times are away from our desks. We love the street. Research and analysis is really not our thing-and when we have tried to do it, we have not been good at it. True analysts are different. They love it. They are more cerebral, patient, and sedentary. They find things we could not. They write better. A lot of CI programs in the past have tried to make operators double as their own analysts. As a result, in the United States, CI analysis historically has been the weakest part of the business. Professional CI analysts have been undervalued and under appreciated. A good CI program will recruit and train true analysts in sizable numbers. I do not think it would be excessive as a rule of thumb in a top notch CI service to be evenly divided between operators and analysts. Very few of our US CI agencies come anywhere close to that ratio. Wonderful things happen when good analysts in sufficient numbers pore over our DA reports, presence lists, SIGINT, audio and teltap transcripts, maps, travel data, and surveillance reports. They find the clues, make the connections, and focus our efforts in the areas that will be most productive. Many parts of the US CI community have gotten the message and have incorporated trained analysts into their operations, but others have not. Across the board, we still have serious shortfalls in good, solid CI analysis. The Sixth Commandment: Do Not Be Parochial More harm probably has been done to US CI over the years by interagency sniping and obstruction than by our enemies. I remember when the CIA and the FBI did not even talk to each other-and both had disdain for the military services. It is no wonder that CI was a shambles and that some incredibly damaging spies went uncovered for so long. Occasionally in my career, I encountered instances of sarcasm or outright bad mouthing of other US Government agencies by my officers. That kind of attitude and cynicism infected our junior officers and got in the way of cooperation. These comments often were intended to flaunt our supposed "superiority" by demeaning the capabilities of the other organizations. I dealt with these situations by telling the officers to "knock it off," and I would encourage other CI supervisors around the community to do the same. CI is so difficult, even in the best of circumstances, that the only way to do it is together. We should not let personalities, or jealousies, or turf battles get in the way of our common mission. Our colleagues in our sister services are as dedicated, professional, hardworking, and patriotic as we are, and they deserve our respect and cooperation. The best people I have known in my career have been CI people, regardless of their organizational affiliation. So let's be collegial. The Seventh Commandment: Train Your People CI is a distinct discipline and an acquired skill. It is not automatically infused in us when we get our wings as case officers. It is not just a matter of applying logic and common sense to operations, but is instead a highly specialized way of seeing things and analyzing them. CI has to be learned. I do not know how many times in my career I have heard, "No, we do not really need a separate CI section. We are all CI officers; we'll do our own CI." That is a recipe for compromise and failure. There is no substitute for a professional CI officer, and only extensive, regular, and specialized CI training can produce them. Such training is expensive, so whenever possible we should do it on a community basis to avoid duplication and to ensure quality. CI is a conglomerate of several disciplines and skills. A typical operation, for example, might include analysts, surveillance specialists, case officers, technical experts, and DA specialists. Each area requires its own specialized training curriculum. It takes a long time to develop CI specialists, and that means a sustained investment in CI training. We are getting better, but we are not there yet. The Eighth Commandment: Do Not Be Shoved Aside There are people in the intelligence business and other groups in the US Government who do not particularly like CI officers. CI officers have a mixed reputation. We see problems everywhere. We can be overzealous. We get in the way of operations. We cause headaches. We are the original "black hatters." Case officers want their operations to be bona fide. Senior operations managers do not want to believe that their operations are controlled or penetrated by the opposition. There is a natural human tendency on the part of both case officers and senior operations managers to resist outside CI scrutiny. They believe that they are practicing good CI themselves and do not welcome being second-guessed or told how to run their operations by so-called CI specialists who are not directly involved in the operations. I have seen far more examples or this in my CI career than I care to remember. By the same token, defense and intelligence contractors and bureaucrats running sensitive US Government programs have too often tended to minimize CI threats and to resist professional CI intervention. CI officers, in their view, stir up problems and overreact to them. Their "successes" in preventing CI problems are invisible and impossible to measure, but their whistle blowing when problems are uncovered generate tremendous heat. It is not surprising that they are often viewed as a net nuisance. When necessary, a CI service has to impose itself on the organizations and groups it is assigned to protect. A CI professional who is locked out or invited in only when it is convenient to the host cannot do his job. My advice to my CI colleagues has always been this: "If you are blocked by some senior, obtuse, anti-CI officer, go around him or through him by going to higher management. And document all instances of denied access, lack of cooperation, or other obstruction to carrying out your CI mission. If not, when something goes wrong, as it likely will in that kind of situation, you in CI will take the blame." The Ninth Commandment: Do Not Stay Too Long CI is a hazardous profession. There should be warning signs on the walls: "A steady diet of CI can be dangerous to your health." I do not believe anyone should make an entire, uninterrupted career of CI. We all who work in CI have seen it: the old CI hand who has gotten a bit spooky. It is hard to immerse oneself daily in the arcane and twisted world of CI without falling pray eventually to creeping paranoia, distortion, warping, and overzealousness in one's thinking. It is precisely these traits that led to some of the worst CI disasters in our history. Angleton and his coterie sadly succumbed, with devastating results. Others in the CIA and elsewhere have as well. The danger is always there. My wife, who was working at the CIA when I met her, was well acquainted with this reputation of CI and the stories about its practitioners. When I was serving overseas and received the cable offering me the position as Ted Price's deputy in the new Counterintelligence Center, I discussed it with her that evening at home. Her response, I thought was right on the mark: "Okay, but do not stay too long." Sensible and productive CI needs lots of ventilation and fresh thinking. There should be constant flowthrough. Non-CI officers should be brought in regularly on rotational tours. I also believe it is imperative that a good CI service build in rotational assignments periodically outside CI for its CI specialists. They should go spend two or three years with the operators or with the other groups they are charged to protect. They will come back refreshed, smarter, and less likely to fall into the nether world of professional CI: the school of doublethink, the us-against-them mindset, the nothing-is-what-it-seems syndrome, the wilderness of mirrors. The Tenth Commandment: Never Give Up The tenth and last commandment is the most important. What if the Ames mole hunters had quit after eight years instead of going into the ninth? What if, in my own experience, we had discontinued a certain surveillance operation after five months instead of continuing into the sixth? CI history is full of such examples. The FBI is making cases against Americans today that involved espionage committed in the 1960s and 1970s. The Army's Foreign Counterintelligence Activity is doing the same. The name of the game in CI is persistence. CI officers who are not patient need not apply. There is no statute of limitations for espionage, and we should not create one by our own inaction. Traitors should know that they will never be safe and will never have a peaceful night's sleep. I applauded my CI colleagues in the FBI when I read not long ago of their arrest in Florida of a former US Army Reserve colonel for alleged espionage against the United States many years earlier. They obviously never gave up. If we keep a CI investigation alive and stay on it, the next defector, the next penetration, the next tip, the next surveillance, or the next clue will break it for us. If there were ever to be a mascot for US counterintelligence, it should be the pit bull. In Conclusion These are my 10 commandments of CI. Other CI professionals will have their own priorities and exhortations and will disagree with mine. That is as it should be, because as a country and as an Intelligence Community we need a vigorous debate on the future direction of US CI. Not everyone will agree with the specifics, or even the priorities. What we should agree on, however, is that strong CI has to be a national priority. Recent news reports from Los Alamos, Washington, and elsewhere have again underscored the continuing need for CI vigilance. 01/31/2002 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4737 From: tek492p Date: Wed Feb 6, 2002 1:49am Subject: Re: INTERTECT: Introduction --- In TSCM-L@y..., MACCFound@a... wrote: > > Nice equipment! Where did you and/or your staff get it's training? ===================== "training??? or Experience!!! I still have (in my museum) the R. B. Clifton "Hound Dog" Field Strength Meter that I purchased NEW back in 1970. This was the "in vogue" instrument of choice in the private sector for detecting hidden transmitters before the advent of the spectrum analyzer. And, of course I still have my dog-eared-with-pages-falling-out original copy of the back-then Bible of all electronic surveillance books, "The Electronic Invasion" by Robert M. Brown, copyright 1967 (red cover edition). I have been an amateur (ham) radio operator since 1970; in the United States Air Force for nine years in Electronics and Telecommunications (radio, telephone, teletype, Top Secret security clearance, NSA crypto); and worked at two television stations in the Engineering department in a "major market" (Los Angeles). (Yes, each television station had spectrum analyzers for the microwave links from the news vans and news helicopters). So.....Have I sat in a classroom for two weeks with pencil & paper learning TSCM? The answer is no. For me that would be like repeating high school electronics class. For anyone that has an EXTENSIVE electronics background, TSCM is not difficult to learn. Just be sure and do all your homework. As for my "staff"; they are not full-time employees, but work as "independent contractors". Some have military electronics experience, others work for the phone company. And, they all know "Ohm's Law". Jack Lindauer Intertect Electronic Surveillance Countermeasures Los Angeles, California (818) 831-0515 4738 From: Date: Tue Feb 5, 2002 8:57pm Subject: Re: Re: INTERTECT: Introduction In a message dated 2/5/02 11:50:39 PM Pacific Standard Time, tek492p@y... writes: << For anyone that has an EXTENSIVE electronics background, TSCM is not difficult to learn >> Thank you for sharing. 4739 From: James M. Atkinson Date: Wed Feb 6, 2002 0:00pm Subject: Microsoft's Really Hidden Files: A New Look At Forensics (v2.6) Microsoft's Really Hidden Files: A New Look At Forensics (v2.6) By The Riddler November 3, 2001 (v2.0 finished May 16, 2001; v1.0 finished June 11, 2000) Written with Windows 9x in mind, but not limited to. DISCLAIMER: I will not be liable for any damage or lost information, whether due to reader's error, or any other reason. SUMMARY: There are folders on your computer that Microsoft has tried hard to keep secret. Within these folders you will find two major things: Microsoft Internet Explorer has not been clearing your browsing history after you have instructed it to do so, and Microsoft's Outlook Express has not been deleting your e-mail correspondence after you've erased them from your Deleted Items bin. (This also includes all incoming and outgoing file attachments.) And believe me, that's not even the half of it. When I say these files are hidden well, I really mean it. If you don't have any knowledge of DOS then don't plan on finding these files on your own. I say this because these files/folders won't be displayed in Windows Explorer at all -- only DOS. (Even after you have enabled Windows Explorer to "show all files.") And to top it off, the only way to find them in DOS is if you knew the exact location of them. Basically, what I'm saying is if you didn't know the files existed then the chances of you running across them is slim to slimmer. It's interesting to note that Microsoft does not explain this behavior adequately at all. Just try searching on microsoft.com. FORWARD: I know there are some people out there that are already aware of some of the things I mention. I also know that most people are not. The purpose of this tutorial is teach people what is really going on with Microsoft's products and how to take control of their privacy again. This tutorial was written by me, so if you see a mistake somewhere then it is my mistake, and I apologize. Thanks for reading. INDEX: 1) DEFINITIONS 1.1) Ancronyms 2) SEEING IS BELEIVING 3) HOW TO ERASE THE FILES ASAP 3.1) If You Have Ever Used Microsoft Internet Explorer 3.2) Clearing Your Registry 3.3) Slack files 3.4) Keeping Microsoft's Products 4) STEP-BY-STEP GUIDE THROUGH YOUR HIDDEN FILES (For the savvy.) 5) HOW MICROSOFT DOES IT 6) +S MEANS [S]ECRET NOT [S]YSTEM. 7) A LOOK AT OUTLOOK 8) THE TRUTH ABOUT FIND FAST 8.1) Removing Find Fast 9) CONTACT INFORMATION AND PGP BLOCKS 9.1) Recommended reading 10) SPECIAL THANKS 11) REFERENCES Coming in version 3.0: ˘ pstores.exe ˘ Related Windows Tricks. ˘ Looking back on the NSA-Key. ˘ Researching the [Microsoft Update] button. ˘ Why the temp folders aren't intended to be temporary at all. ˘ What's with Outlook Express's .dbx database files? ˘ Win2K support. 1.0. DEFINITIONS I) A "really hidden" file/folder is one that cannot be seen in Windows Explorer after enabling it to "show all files," and cannot be seen in MS-DOS after receiving a proper directory listing from root. a) There is at least one loophole to enable Windows Explorer to see them. b) There is at least one loophole to enable MS-DOS to see them. II) Distinguishes "really hidden" file/folders from just plain +h[idden] ones, such as your "MSDOS.SYS" or "Sysbckup" folder. III) Distinguishes from certain "other" intended hidden files, such as a file with a name with high ascii characters (eg, "YÎÔ®o"). (Interesting to note that Microsoft has disabled the "Find: Files or Folders" from searching through one of these folders.) 1.1. ANCRONYMS DOS = Disk Operating System aka MS-DOS MSIE = Microsoft Internet Explorer TIF = Temporary Internet Files (folder) HD = Hard Drive OS = Operating System FYI = For Your Information 2. SEEING IS BELEIVING No. Enabling Windows Explorer to "show all files" does not show the files in mention. No. DOS does not list the files after receiving a proper directory listing from root. And yes. Microsoft intentionally disabled the "Find" utility from searching through one of the folders. Oh, but that's not all. Just from one of these files I would be able to tell you which web sites you previously visited, what types of things you search for in search engines, and probably gather your ethnicity, religion, and sexual preference. Needless to say one can build quite a profile on you from these files. It has the potential to expose and humiliate -- putting your marriage, friendship, and corporation at risk. Here's one good example of the forensic capabilities.. "I've been reading your article as I have a problem with an employee of mine. He has been using the works pc for the internet and using it to chat and look at porn sites. He was then deleting the cookies and history in order to cover his tracks. A friend of mine pointed me in the direction of this site and your article. I have found it to be incredibly useful,..." --Concerned Boss, 8/24/01 One more thing. They contain your browsing history at ALL times. Even after you have instructed Microsoft Internet Explorer to clear your history/cache. And so the saying goes, "seeing is believing..." To see for yourself simply do as you would normally do to clear your browsing history. Go to Internet Options under your Control Panel. Click on the [Clear History] and [Delete Files] buttons. (Make sure to include all offline content.) So, has your browsing history been cleared? One would think so... Skipping the to chase here. These are the names and locations of the "really hidden files:" c:\windows\history\history.ie5\index.dat c:\windows\tempor~1\content.ie5\index.dat If you have upgraded MSIE several times, they might have alternative names of mm256.dat and mm2048.dat, and may also be located here: c:\windows\tempor~1\ c:\windows\history\ Not to mention the other alternative locations under: c:\windows\profiles\%user%\... c:\windows\application data\... c:\windows\local settings\... c:\windows\temp\... c:\temp\... FYI, there are a couple other index.dat files that get hidden as well, but they are seemingly not very important. 3.0. HOW TO ERASE THE FILES ASAP Step by step information on how to erase these files as soon as possible. This section is recommended for the non-savvy. Further explanation can be found in Section 4.0. Please note that following these next steps will erase all your internet cache and cookies files. If you use the offline content feature with MSIE, it will remove this as well. It will not erase your bookmarks. 3.1. IF YOU HAVE EVER USED MICROSOFT INTERNET EXPLORER 1) Shut your computer down, and turn it back on. 2) While your computer is booting keep pressing the [F8] key until you are given an option screen. 3) Choose "Command Prompt Only." This will take you to real DOS mode. ME users must use a bootdisk to get into real DOS mode. 4) When your computer is done booting, you will have a C:\> followed by a blinking cursor. Type in this hitting enter after each line (sans parenthesis): C:\WINDOWS\SMARTDRV (Loads smartdrive to speed things up.) CD\ DELTREE/Y TEMP (This line removes temporary files.) CD WINDOWS DELTREE/Y COOKIES (This line removes cookies.) DELTREE/Y TEMP (This removes temporary files.) DELTREE/Y HISTORY (This line removes your browsing history.) DELTREE/Y TEMPOR~1 (This line removes your internet cache.) (If this last line doesn't work then type this:) CD\WINDOWS\APPLIC~1 DELTREE/Y TEMPOR~1 (If this doesn't work then type this:) CD\WINDOWS\LOCALS~1 DELTREE/Y TEMPOR~1 (If this still does not work, and you are sure you are using MSIE 5.x, then feel free to e-mail me. If you have profiles turned on, then it is likely located under \windows\profiles\%user%\, while older versions of MSIE keep them under \windows\content\.) This last one will take a ridiculous amount of time to process. The reason it takes so incredibly long is because there is a TON of useless cache stored on your HD. 5) Immediately stop using Microsoft Internet Explorer and go with any of the alternative browsers out there. Netscape 4.7x from netscape.net, mozilla from mozilla.org, or opera from opera.com. FYI, Windows re-creates the index.dat files automatically when you reboot your machine so don't be surprised when you see them again. They should at least be cleared of your browsing history. 3.2. CLEARING YOUR REGISTRY It was once believed that the registry is the central database of Windows that stores and maintains the OS configuration information. Well, this is wrong. Apparently it also maintains a bunch of other information that has absolutely nothing to do with the configuration. I won't get into the other stuff but for one, your Typed URLs are stored in the registry. HKEY_USERS/Default/Software/Microsoft/Internet Explorer/TypedURLs/ HKEY_CURRENT_USER/Software/Microsoft/Internet Explorer/TypedURLs/ These "Typed URLs" come from MSIE's autocomplete feature. It records all URLs that you've typed in manually in order to save you some time filling out the address field. By typing "ama" the autocomplete feature might bring up "amazon.com" for you. Although, I find it annoying, some people prefer this feature. One thing is for sure however -- it's an obvious privacy risk. You wouldn't want a guest to type "ama" and have it autocomplete to "amaturemudwrestlers.com" now would you? You can clear your Typed URLs out of your registry by doing going to your Control Panel > Internet Options > Content > [AutoComplete] > and finally [Clear Forms]. If you feel the AutoComplete feature is a privacy risk, then uncheck the appropriate boxes here. FYI, this section has nothing to do with "really hidden files." It was added so people can completely clear their browsing history before having to ditch Microsoft Internet Explorer. 3.3. SLACK FILES As you may already know, deleting files only deletes the references to them. They are in fact still sitting there on your HD and can still be recovered by a very motivated person. ˘ BCWipe is a nice program that will clear these files. (www.bcwipe.com). ˘ For you DOS buffs, there's a freeware file wiper on simtel.net that I use. (www.simtel.net/pub/dl/45631.shtml). ˘ If you are using PGP then there is a "Freespace Wipe" option under PGPtools. ˘ The newer versions of Norton Utilities has a nice filewiping utility. ˘ You might want to check out Evidence Eliminator's 30 day trial. This is probably the best program as far as your privacy goes. (www.evidence-eliminator.com) 3.4. KEEPING MICROSOFT'S PRODUCTS If your work environment forces you to use Microsoft Internet Explorer then I strongly recommend that you talk your boss into checking out one of these programs: ˘ PurgeIE (www.aandrc.com/purgeie) ˘ Cache and Cookie Cleaner for IE (www.webroot.com/washie.htm) ˘ Anonymizer Window Washer (www.anonymizer.com/anonwash) These programs automate the process for you, and is far better then having to ad 'deltree/y' lines to your autoexec. AND if your work environment forces you to use Outlook or Outlook Express then you should get in the habit of compacting your mailboxes. You can do this by going to File > Folder > Compact All if you have Outlook Express. or Tools > Options > Other tab > [Auto Archive] if you have Outlook. Make sure to set things up here. 4.0. STEP-BY-STEP GUIDE THROUGH YOUR HIDDEN FILES This next section is intended for the savvy user. The most important files to be paying attention to are your "index.dat" files. These are database files that reference your history, cache and cookies. The first thing you should know is that the index.dat files is that they don't exist in less you know they do. They second thing you should know about them is that some will *not* get cleared after deleting your history and cache. The result: A log of your browsing history hidden away on your computer after you thought you cleared it. To view these files, follow these steps: In MSIE 5.x, you can skip this first step by opening MSIE and going to Tools > Internet Options > [Settings] > [View Files]. Now write down the names of your alphanumeric folders on a piece of paper. If you can't see any alphanumeric folders then start with step 1 here: 1) First, drop to a DOS box and type this at prompt (in all lower-case) to bring up Windows Explorer under the correct directory... c:\windows\explorer /e,c:\windows\tempor~1\content.ie5\ You see all those alphanumeric names listed under "content.ie5?" (left-hand side.) That's Microsoft's idea of making this project as hard as possible. Actually, these are your alphanumeric folders that was created to keep your cache. Write these names down on a piece of paper. (They should look something like this: 6YQ2GSWF, QRM7KL3F, U7YHQKI4, 7YMZ516U, etc...) If you click on any of the alphanumeric folders then nothing will be displayed. Not because there aren't any files here, but because Windows Explorer has lied to you. If you want to view the contents of these alphanumeric folders you will have to do so in DOS. (Actually, this is not always true. *Sometimes* Windows Explorer will display the contents of the alphanumeric folders -- but mostly it won't. I can't explain this.) 2) Then you must restart in MS-DOS mode. (Start > Shutdown > Restart in MS-DOS mode. ME users use a bootdisk.) Note that you must restart to DOS because windows has locked down some of the files and they can only be accessed in real DOS mode. 3) Type this in at prompt: CD\WINDOWS\TEMPOR~1\CONTENT.IE5 CD %alphanumeric% (replace the "%alphanumeric%" with the first name that you just wrote down) DIR/P The cache files you are now looking at are directly responsible for the mysterious erosion of HD space you may have been noticing. One thing particularly interesting is the ability to view some your old e-mail if you happen to have a hotmail account. (Oddly, I've only been able to retreive hotmail e-mail, and not e-mail from my other web-based e-mail accounts. Send me your experiences with this.) To see them for yourself you must first copy them into another directory and THEN open them with your browser. Don't ask me why this works. A note about these files: These are your cache files that help speed up your internet browsing. It is quite normal to use this cache system, as every major browser does. On the other hand. It isn't normal for some cache files to be left behind after you have instructed your browser to erase it. 5) Type this in: CD\WINDOWS\TEMPOR~1\CONTENT.IE5 EDIT /75 INDEX.DAT You will be brought to a blue screen with a bunch of binary. 6) Press and hold the [Page Down] button until you start seeing lists of URLs. These are all the sites that you've ever visited as well as a brief description of each. You'll notice it records everything you've searched for in a search engine in plain text, in addition to the URL. 7) When you get done searching around you can go to File > Exit. If you don't have mouse support in DOS then use the [ALT] and [Arrow] keys. 8) Next you'll probably want to erase these files by typing this: C:\WINDOWS\SMARTDRV CD\WINDOWS DELTREE/Y TEMPOR~1 (replace "cd\windows" with the location of your TIF folder if different.) This will take a seriously long time to process. Even with smartdrive loaded. 9) Then check out the contents of your History folder by typing this: CD\WINDOWS\HISTORY\HISTORY.IE5 EDIT /75 INDEX.DAT You will be brought to a blue screen with more binary. 10) Press and hold the [Page Down] button until you start seeing lists of URLS again. This is another database of the sites you've visited. 11) And if you're still with me type this: CD\WINDOWS\HISTORY 12) If you see any mmXXXX.dat files here then check them out (and delete them.) Then... CD\WINDOWS\HISTORY\HISTORY.IE5 CD MSHIST~1 EDIT /75 INDEX.DAT More URLs from your internet history. Note, there are probably other mshist~x folders here so you can repeat these steps for every occurence if you please. 13) By now you'll probably want to type in this: CD\WINDOWS DELTREE/Y HISTORY 5.0. HOW MICROSOFT DOES IT How does Microsoft make these folders/files invisible to DOS? The only thing Microsoft had to do to make the folders/files invisible to a directory listing is to set them +s[ystem]. That's it. As soon as the dir/s command hits a system folder, it renders the command useless (unlike normal folders.) A more detailed explanation is given in Section 6. So how does Microsoft make these folders/files invisible to Windows Explorer? The "desktop.ini" is a standard text file that can be added to any folder to customize certain aspects of the folder's behavior. In these cases, Microsoft utilized the desktop.ini file to make these files invisible. Invisible to Windows Explorer and even to the "Find: Files or Folders" utility (so you wouldn't be able to perform searches in these folders!) All that Microsoft had to do was create a desktop.ini file with certain CLSID tags and the folders would disappear like magic. To show you exactly what's going on: Found in the c:\windows\temporary internet files\desktop.ini and the c:\windows\temporary internet files\content.ie5\desktop.ini contains this text: [.ShellClassInfo] UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933} Found in the c:\windows\history\desktop.ini and the c:\windows\history\history.ie5\desktop.ini contains this text: [.ShellClassInfo] UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933} CLSID={FF393560-C2A7-11CF-BFF4-444553540000} The UICLSID line cloaks the folder in Windows Explorer. The CLSID line disables the "Find" utility from searching through the folder. (Additionally, it gives a folder the appearance of the "History" folder.) To see for yourself, you can simply erase the desktop.ini files. You'll see that it will instantly give Windows Explorer proper viewing functionality again, and the "Find" utility proper searching capabilities again. Problem solved right? Actually, no. As it turns out, the desktop.ini files get reconstructed every single time you restart your computer. Nice one, Slick. Luckily there is a loophole which will keep Windows from hiding these folders. You can manually edit the desktop.ini's and remove everything except for the "[.ShellClassInfo]" line. This will trick windows into thinking they have still covered their tracks, and wininet won't think to reconstruct them. I can't stress how ridiculous it is that Windows actually makes sure the files are hidden on every single boot. No other files or folders get this kind of special treatment. So what's the agenda here? 6.0. +S MEANS [S]ECRET NOT [S]YSTEM Executing the "dir/a/s" command from root *should* be the correct command to display all files in all subdirectories in DOS. However, doing so will not display the index.dat files. This is because when DOS tries to get a list of the subdirectories of any +s[ystem] directory it hits a brick wall. No files or folders will be listed within any system directory. Not only does this defeat the whole purpose of the "/s" switch in the first place, but I'd say it looks like Microsoft took extra precautions to keep people from finding the files. Remember. The only thing you need to do to obscure a file in DOS is to mark the parent directory +s[ystem]. I was told by a few people that this was due to a very old DOS bug that dates back many years. Fine. I can accept that. A bug it is. But, would you consider your Temporary Internet Files to be "system files?" It would seem that your TIF folder appears to be marked +s[ystem] for no good reason at all. Just because. Same with your history folder. You may not agree, but I tend to think that Microsoft marked the folders as +s[ystem] solely to hide any directory recursal from DOS. In case you didn't understand, here's a small experiment that will show you what I mean... Since the content.ie5 and history.ie5 subfolders are both located within a +s[ystem] folder, we will run the experiment with them. The proper command to locate them *should* be this: CD\ DIR *.IE5 /as/s The problem is that you will receive a "No files found" error message. Since we already know there is a content.ie5 subfolder located here, why is it giving me the "no files found" message? But there is a way to get around this brick wall. That is, once you are inside the system directory, then it no longer has an effect on the dir listings. For example, if you enter the system folder first, and THEN try to find any +s[ystem] directories you can see them just fine: CD\WINDOWS\TEMPOR~1 DIR *.IE5 /as/s 1 folder(s) found. Now you will get a "1 folder(s) found." message. (But only after you knew the exact location.) In other words, if you didn't know the files existed then finding them would be almost impossible. And, by the way. To see the "bug" in progress... CD\ DIR *.IE5 /a/s It will echo "no files found." Now, just take away the system attributes from the parent directory... CD\WINDOWS ATTRIB -S TEMPOR~1 And retry the test... CD\ DIR *.IE5 /a/s It will echo "1 folder(s) found." 7.0. A LOOK AT OUTLOOK EXPRESS Would you think twice about what you said if you knew it was being recorded? E-mail correspondence leaves a permanent record of everything you've said -- even after you've told Outlook Express to erase it. You are given a false sense of security sense you've erased it twice, so surely it must be gone. The first time Outlook simply moves it to your "Deleted Items" folder. The second time you erase it Outlook simply "pretends" it is gone. The truth is your messages are still being retained in the database files on your HD. (As with your e-mail attachments.) For earlier versions of Outlook Express, they will be located in either of the following folder: c:\program files\internet mail and news\%user%\mail\*.mbx c:\windows\application data\microsoft\outlook\mail\*.mbx At this point you have two choices. a) Get in the habit of compacting your folders all the time. b) Backup, print-out, or import the data into another e-mail client such as Eudora and then delete the mbx files (and thus all your e-mail correspondence) by typing this: cd\progra~1\intern~1\%user%\mail deltree/y mail or cd\windows\applic~1\micros~1\outloo~1\ deltree/y mail *Typing in the above commands will kill all your e-mail correspondence. Do not follow those steps in less you have already exported your e-mail and address book! If you have a newer version of Outlook or Outlook Express the databases are located elsewhere. Look for .dbx and .pst file extensions. These databases are five times as creepy, and I strongly recommend you take at the files. Just from my outbox.dbx file I was able to view some of my old browsing history, bring up previously-visited websites in html format, and even read ancient e-mail from my Eudora client (read: EUDORA). Again, don't take my word for it. See for yourself and THEN tell me what you think Slick Willy is up to here. 8.0. THE TRUTH ABOUT FIND FAST Have you ever wondered what that "Find Fast" program was under your control panel? Here's a hint: It has absolutely nothing to do with the "Find" utility located under the [Start] menu. Just to clear up any confusion before going on, Oblivion adequately explains Find Fast here: "In any version of Word after 95, choose File Open and you'll get the Office App Open dialog. Instead of just a space for the file name, there are text boxes for file name, files of type, text or property & last modified. These are search criteria you can use to find one or more files. There is also an "Advanced" button that opens a dedicated search dialog with more options. When you use either of these dialogs to perform a search, that search process uses the indexes built by Find Fast." --Oblivion But what would you say if I told you that Find Fast was scanning every single file on your hard drive? Did you know that in Office 95, the Find Fast Indexer had an "exclusion list" comprised of .exe, .swp, .dll and other extensions, but the feature was eliminated? If you were a programmer would you program Find Fast to index every single file, or just the ones with Office extensions? FYI, If you have ever had problems with scandisk or defrag restarting due to disk writes, it is because Find Fast was indexing your hard drive in the background. It loads every time you start your computer up. Now here is a good example of the lengths Microsoft has gone through to keep people from finding out Find Fast is constantly scanning and indexing their hard drives. (Always good to have an alibi.) Here's a snippet taken from microsoft.com: "When you specify the type of documents to index in the Create Index dialog box, Find Fast includes the document types that are listed in the following table. Document type File name extension ------------- ------------------- MS Office and Web Documents All the Microsoft Excel, Microsoft PowerPoint, Microsoft Project, and Microsoft Word document types listed in this table. Microsoft Binder (.odb, .obt) and Microsoft Access (.mdb) files. Note that in .mdb files, only document properties are indexed. Word documents .doc (document), .dot (template), .ht* (Hypertext Markup Language document), .txt (text file), .rtf (Rich Text Format) files, Excel workbooks .xl* files PowerPoint .ppt (presentation), .pot (template), .pps (auto-running presentation) files Microsoft Project files .mpp, .mpw, .mpt, .mpx, .mpd files All files *.* files" Did you get that last part? "All files?" Find Fast indexes Office Documents, Web documents, Word Documents, Power Point files, Project files, and (oh I forgot) EVERY SINGLE other file on your computer. Actually, the good news is that this isn't necessarily true. In another statement Microsoft claims that if Find Fast deems the file "unreadable" then the file will not be included in the index. For example, your command.com probably wouldn't get indexed because it doesn't have a lot of plain text -- mostly binary. But, back to the bad news. Every single file that has legible text is going to be included in the Find Fast database. Do you understand the implication here? ALL TEXT SAVED TO YOUR HARD DRIVE IS INDEXED. The forensic capabilities are enormous, folks. Don't forget "all text" also means previously-visited webpages from your cache. See for yourself... 1) Open up a DOS window and type... 2) CD\ 3) DIR FF*.* /AH (This will bring up a list of the find fast databases.) 4) EDIT /75 %ff% (insert %ff% with any of the names that were listed.) Notice the incredible amount of disk accesses to your cache and history folders? Why do we need two indexes? 8.1. REMOVING THE FIND FAST PROGRAM You can remove Find Fast using your Office CD, but I recommend you do it manually... 1) Reboot your computer in MS-DOS Mode. 2) Delete the findfast.cpl file from c:\windows\system\. 3) Delete the shortcut (.lnk) under c:\windows\start menu\programs\startup\. 4) Delete the findfast.exe file from c:\progra~1\micros~1\office\. 5) Important to delete the find fast databases (c:\ff*.*). 6) You can also safely delete FFNT.exe, FFSetup.dll, FFService.dll, and FFast_bb.dll if you have them. Feel free to check out the ffastlog.txt (which is the Find Fast error log). It's a +h[idden] file under c:\windows\system\. 9. CONTACT INFO AND PGP BLOCKS This tutorial is being updated all the time. If you have any useful input, or if you see a mistake somewhere, then please e-mail me so I can compile it into future versions. You will be able to find the most recent version of this tutorial at fuckmicrosoft.com. I am not affiliated with the site. My e-mail address is located at the end of this note. Please let me know where you heard about this tutorial in your message. If you have something important to say to me, then please use encryption. My public key blocks are located below. Be suspicious if you send me an encrypted message but never get a reply. Thanks for reading, -- The Riddler theriddler@f... My 2.6.2 block is no longer valid because my secring was nuked. When I created another keyring with another version of PGP, it read my "SET PGPPATH=" line and copied a new ring over my old one. No backups were made. Moral of the story: Backup your keys. My PGP 2.6.3 Block: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.3a Comment: Compatible with PGP 2.6.x mQCNAzvVzqgAAAEEANT+lnfVk79zr/eYkLHs+euTg/JBSQXmUWB5dMxv4Vvv4Xes CnaNrv5Udi3hfABKb1tq41N6kPJ/n/Qz/vSW52Z4wg+Q+ZGGoITIJ1p8bDOceb2Q EsMsY7kzCHqkBF0N53TuVt+ywhVncN+CqecVvhuQ4RXUOVUvru7gGcd76OVxAAUR tAt0aGUgcmlkZGxlcokAlQMFEDvVzqju4BnHe+jlcQEBC14EAM3Th47aEChB0GAf 5xGlLPQnrj6zyf5uovj12PEFnCOwcEhDDAuq4Ito7Keb22DqwlJDNChIM7xLx8bZ d9VaMpkirFzgvFmGu5eNGp18rR9EyIVY/tTdWlRcsUL/nw2XNXxw51tHE7M/O1fp Un4qIcG0CfAQ1QCUfqOwTWbFH/Wy =muLu -----END PGP PUBLIC KEY BLOCK----- My GPG 1.0.6 Block: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.0.6 (MingW32) mQGhBDu3TSERBACO0Fx9pjMULe6qLQwOgfvdnQconLOMyftZdp9+ZX6t29ebJ/Z5 qQOJ9ce9Xr6Lj4u+M9VDx1FK5ueoD45bUAy0HAvYDV/HEu2vCRimpbreDky/U88a XL59Pe8qwnmfUzYc/LnH86VCr4lPmpbz6/adXj44xE6EwkhFcq6BD4isCwCg8zZO Hk9+KEKOyPHIFWq7TUA/JdUD/jWtNrGZ0tfSAS0WDiBifsBr1HW7n2IMDFX1anqC DN0ToM5IFWGDkOh1NUvP0RvyrnNuBOP/oWxkPLR0nVvifETF0iG9o+kfitC9NmJn QP/iw4WhCoHRCc5wqnAAXQC9j8JdodQ8E5VnfnNGkttgWz7mNzBongrIoTdfVdtf o5NwA/d/lwMhGE0HNXnXOgRBcPjGD0LsR8pFoSP/HJ9Hu3zms2cbQqN2O/f99H2G s9mXR7uvicu9SbKoTwFkptLVbOQIhvBnw0fTlZGrUsaiw4vzt99PffTKq1FPIpQe K7HcnUK2+ZSVs5PxGiDckobJEjBssSw9Lg5RSNMy9H7s9jv3tAt0aGUgcmlkZGxl cohXBBMRAgAXBQI7t00iBQsHCgMEAxUDAgMWAgECF4AACgkQ/bqXDRMV1MxyMgCc CH2uO/f46JgQ0pspQxi7IBv0yNQAn11ebXHbZGuADwuBun1EnQCJb8VIuQINBDu3 UOAQCADKG2mf/FW3kuSAGoFmIMBm4l6m0O7denwUIpZP2jxeNTLmLW6ntGglHP++ wEQpHjKTJfXoSHZH0euuXVZ9hOVdf1+PuRNy0DzrDDiKX7fdQ6eSbw+heSWc0kOF AB1j3pcovG4K2+bK66039kQLIT3kNUZgh9DdMZjIFzBg90aQnaEm5LLMkv1FNVZP YehZm3RRIpLAX5vkJJbUA/VVh/FXDG5f21iAGDHgSdKsLW2JNDAWe6/rY0GV5dgx C0gsqBn1rxNNDyG+z6nFCQtohL/x5zdTzedLQBjIlao91mSWhBsyxiX8mjhvGO97 o6zVUG5KHBKGmvWMqlyOsGY9VSbDAAMGCADIaFAcE+ADY3ku9Fy0NIlJhbj578YY xpsE6KvZI1OqbHSoBnN06A3Mpxp4QRBXlr9eRRl+zMTQl1VcVWkahZYNapOqq6L3 wHBmf9psggCBxqQdI9n5zxnlkphb50J7G9UevB/IGzlW2fe7WMWjo2GegIvGHVWr qeZgyaNf/CyMtihAX3O86rpqakq//nJvQ9MPcp/Brr9KT2NxBlpBm6xWY35IL5FG dZ2hpHaO1TC6bdmWUPhvzmSVtD9f0AnnJEgVc03vBz7xJrc1IEa1DeRdfFNvkoch +mNjc+fBAIQrVMCQ33u+yP/DWSdThrhxz1tAGWV7SlwxVyg6JPRQJ+moiEYEGBEC AAYFAju3UOAACgkQ/bqXDRMV1MwVnACfaGrJRv2lgWHQbQWwv55t2cT+QWEAnA/n ckswjlC9aNcBkcFl7X1SX8JX =pFTK -----END PGP PUBLIC KEY BLOCK----- 9.1. RECOMMENDED READING http://www.theregister.co.uk/content/4/18002.html http://www.findarticles.com/m0CGN/3741/55695355/p1/article.jhtml http://www.mobtown.org/news/archive/msg00492.html http://194.159.40.109/05069801.htm http://www.yarbles.demon.co.uk/mssniff.html http://www.macintouch.com/o98security.html http://www.theregister.co.uk/content/archive/3079.html http://www.fsm.nl/ward/ http://slashdot.org http://www.peacefire.org http://stopcarnivore.org http://nomorefakenews.com http://grc.com/steve.htm#project-x 10. SPECIAL THANKS (and no thanks) This version I want to give special thanks to Concerned Boss, Oblivion, and the F-Prot virus scanner. I also want to take this time to show my dissatisfaction to the New Zealand Herald. Although partly flattering, it was more disgusting to see a newspaper try to take credit for my work. 11. REFERENCES http://support.microsoft.com/support/kb/articles/Q137/1/13.asp http://support.microsoft.com/support/kb/articles/Q136/3/86.asp http://support.microsoft.com/support/kb/articles/Q169/5/31.ASP http://support.microsoft.com/support/kb/articles/Q141/0/12.asp http://support.microsoft.com/support/kb/articles/Q205/2/89.ASP http://support.microsoft.com/support/kb/articles/Q166/3/02.ASP http://www.insecure.org/sploits/Internet.explorer.web.usage.logs.html http://www.parascope.com/cgi-bin/psforum.pl/topic=matrix&disc=514&mmark=all http://www.hackers.com/bulletin/ http://slashdot.org/articles/00/05/11/173257.shtml http://peacefire.org COPYRIGHT INFORMATION This article has been under the protection of copyright laws the moment it was fixed in a tangible form. In less otherwise agreed, this article may only be distributed as a whole and without modification. Thank you. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4740 From: Marty Kaiser Date: Wed Feb 6, 2002 9:55am Subject: Fw: History in the making Hi Gang HISTORY IN THE MAKING IMMEDIATELY download and save this file... then read it. http://www.martykaiser.com/fbi1~1.htm Marty [Non-text portions of this message have been removed] 4741 From: Steve Whitehead Date: Wed Feb 6, 2002 3:05pm Subject: Fw: Steve, The COMSEC C3I Story Received this on my e-mail tonight. I think the list discussed this device a while back. Steve Whitehead E-mail : sceptre@m... TSCM Services URL : http://www.tscm.co.za ----- Original Message ----- From: "COMSEC" To: Sent: Wednesday, February 06, 2002 6:48 PM Subject: Steve, The COMSEC C3I Story > INVENT A PRODUCT, Change a Industry, Shake up the World! > How the Hunted Became the Hunter > > The story HOW I invented and patented the COMSEC C3I TM > United States Patent #5,142,560, a telecommunications > security device that detects wiretapping, surveillance, > espionage previously undetectable. > > The Chicago Commodities Exchanges were the target of a US > Government undercover investigation during 1988-1989. I was > a Foreign Exchange Floor Trader at the Chicago Mercantile > Exchange during that time. I had a gut instinct that my > telephones were being wiretapped. I was right, you just > can't say enough about gut instinct. > > I have friends and acquaintances that are top tier criminal > defense attorneys. I went to these friends to ask what they > thought the likelihood was that my telephones could be > wiretapped. They pretty much all agreed that unless there > was millions of dollars involved, sensational newspaper > headlines and coverage or unless I was dealing with the > wrong people, the likelihood of my telephones being > wiretapped were extremely unlikely. > > The Attorney General of the United States came to > Chicago, IL 3 months later to announce the indictments of > 47 commodities traders for various offenses. The 2 year > undercover government investigation of the Chicago > commodities markets happened to include the trading pit I > traded in. > > Furthermore, the FBI had an undercover agent working in the > trading pit I traded in. There were millions of dollars > involved. On the day the Government decided to announce the > indictments there was a huge news media circus with > accompanied news headlines about the 47 indicted commodity > traders. > > The day the indictments were announced everything came > together. At this point I knew I was on to something. > I called the people who teach the government how to wiretap > and how to detect wiretapping. They all told me it was > impossible to detect these wiretaps because of the way they > are engineered. They told me these wiretaps are > "electronically isolated" to prevent detection. I was told > that "it wasn't possible to detect these wiretaps." > > Next, I went to the Chicago Library Patent Depository. > I read and researched all I could find on wiretapping. I > read all the patents on wiretapping equipment and > wiretapping detection equipment. I found what I thought was > the possible means to detect undetectable wiretapping and > started to construct a device to detect these wiretaps. > > Success > > I could now detect and confirm the governments > "undetectable" wiretapping/surveillance. The government was > not amused. At this point the government decided to flex > its muscle. The Government assigned a federal agent to an > electronic parts store where I bought components for the new > invention. > > For a period of 3 weeks I couldn't buy a newspaper without > a boy scout coming up to the counter to document how I > bought anything. I was wiretapped, followed, photographed > and now the government decided to set up physical > surveillance at a electronics part store where I purchased > parts for the prototype of the new invention. > > I was now ready to complete my Patent Application to be > filed with the Department of Commerce Commissioner of > Patents and Trademarks. I warned a Patent Attorney I was > working with at the time that there could be some blow back. > He assured me he had been through this before and that > there wasn't anything to be concerned about. > > During this period of around the clock physical surveillance > I went to the Patent Attorney's home unannounced. When I got > there he was leaving with my Patent Application in hand. > He didn't look well. He told me that "he had to go to a > meeting." The next day he returned my Patent Application, > and he told me he couldn't help me anymore and never charged > me for his work up to that time. > > There is much more to the story, how I determined there was > an undercover Government Agent, listening in on his > communications over a cordless telephone with a scanner, > running his work car's license plates through Illinois > Department of Motor Vehicles to find out his car was > registered to a Chicago Bear's Football player, etc. > > I completed my Patent Application in September 1990 and was > awarded Patent #5,142,560 in September 1992. > > On December 17,2001 FOX News reported that the US Government > has been wiretapped by Foreign Intelligence and others using > the US National Wiretapping System. There is currently a > on-going National Security investigation across the United > States concerning the US National Wiretapping System being > used against the United States by Foreign Intelligence and > others. > > "The problem: according to classified law enforcement > documents obtained by Fox News, the bad guys had the cops' > beepers, cell phones, even home phones under surveillance. > Some who did get caught admitted to having hundreds of > numbers and using them to avoid arrest. > > "This compromised law enforcement communications between > LAPD detectives and other assigned law enforcement officers > working various aspects of the case. The organization > discovered communications between organized crime > intelligence division detectives, the FBI and the Secret > Service." > > Shock spread from the DEA to the FBI in Washington, and then > the CIA. An investigation of the problem, according to law > enforcement documents, concluded, "The organization has > apparent extensive access to database systems to identify > pertinent personal and biographical information." > > When investigators tried to find out where the information > might have come from, they looked at Amdocs, a publicly > traded firm based in Israel. Amdocs generates billing data > for virtually every call in America, and they do credit > checks. The company denies any leaks, but investigators > still fear that the firm's data is getting into the wrong > hands. > > When investigators checked their own wiretapping system for > leaks, they grew concerned about potential vulnerabilities > in the computers that intercept, record and store the > wiretapped calls." [FOX News Carl Cameron Investigates] > > "The worst penetrations are believed to be in the State > Department. But others say the supposedly secure telephone > systems in the White House, Defense Department and Justice > Department may have been compromised as well. The problem > for FBI agents in the famed Division 5, however, isn't just > what they have uncovered, which is substantial, but what > they don't know yet." [Insight] > > Email me to request a collection of news reports about the > hottest Federal Government investigation in Washington, DC > today. A unbelievable look inside Government wiretapping > and how it will impact you. > > > The COMSEC C3I detects legal and illegal wiretapping > previously undetectable. Full background and product > reviews are available on our web site: > > > We are registered with the Department of Defense and the > General Services Agency Information Technology Service. > > To receive additional information and Special Offers for > Subscribers Only reply to this email with "Subscribe" in the > Subject Line. > > PRIVACY STATEMENT: We will not distribute your address to > anyone. Period. > > Reach me at the following address. > > > Mark J. Neer > President > Communications Security > Tel: 281.586.2034 > Fax: 281.754.4047 > Email: > Internet: > 4742 From: Marty Kaiser Date: Wed Feb 6, 2002 10:33am Subject: Fw: History in the making Hi Gang HISTORY IN THE MAKING IMMEDIATELY download and save this file... then read it. http://www.martykaiser.com/fbi1~1.htm Marty [Non-text portions of this message have been removed] 1 From: Bernard Tyers Date: Wed Feb 2, 2000 0:40pm Subject: TEST. NO BODY ----- rgrds, ...bernard.. [Bernard Tyers*btyers@s...*snet.wit.ie/bbt] "Men are from Macs, and women are from VMS" 2 From: James M. Atkinson, Comm-Eng Date: Wed Feb 2, 2000 5:23pm Subject: DTV Signals Mask Radiated Emissions DTV Signals Mask Radiated Emissions Digital TV broadcast signals add yet another ambient signal to the mix. [original author unknown] If you live in a major metropolitan area, then your local TV stations have already begun broadcasting in digital format. As of November, 100 DTV stations were on the air, and by 2006, all TV broadcasts in the US will be digital. While viewers may enjoy the digital television picture, EMI test engineers find DTV to be just one more aggravation that impedes their work. Both the VHF and UHF bands are within the range of microprocessor clocks, so EMI test engineers already account for local analog TV signals when they are performing radiated emissions testing in an open-area test site (OATS). The DTV broadcasts, which currently operate in the 470 MHz to 806 MHz UHF band, add yet another set of ambient signals to the electromagnetic spectrum. What makes DTV broadcast signals different from conventional TV? Plenty. Although both occupy a 6-MHz bandwidth, the analog TV signal has three distinct narrowband peaks-video subcarrier, color subcarrier, and audio subcarrier (from left to right). In contrast, the DTV spectrum is flat across the entire channel's bandwidth, so it masks more radiated EMI than do the narrow peaks of analog signals. So what can you do about radiated EMI measurements in the presence of ambient DTV broadcast signals? The obvious way around OATS testing in the presence of DTV signals is to leave the OATS-perform your testing in a semianechoic chamber. Unfortunately, few test labs have chambers large enough to perform EMI measurements at 10 m. For OATS measurements, you have a few options. First, you should find out if you have any DTV broadcasters in your area. In the US, you can check the Web sites of the FCC (www.fcc.gov/mmb/vsd/ files/dtvonair.html) or the National Association of Broadcasters (www.nab.org/ PressRel/Dtvstations.asp). I suggest you also check the local DTV broadcaster's Web site to see which programs are broadcast in DTV format and plan your tests around those programs. (Right now, many stations are broadcasting in digital format during evening prime time hours only, but that will gradually change as stations add more programs to their DTV schedules.) You can also check the FCC Web site (www.fcc.gov/oet/dtv/tvchfreq.html) for channel frequency allocations. For precompliance tests, you can detect EMI by narrowing the resolution bandwidth of your spectrum analyzer or EMI receiver to, say, 1 kHz. The narrow bandwidth will effectively reduce the wideband DTV signal within that bandwidth. You can't narrow the bandwidth for actual compliance tests, because FCC Part 151 and CISPR 22:19972 require you to set the resolution bandwidth of your receiver to 120 kHz, says Roland Gubisch, chief engineer for EMC and telecom at Intertek Testing Services (Boxborough, MA). Yet, by reducing the resolution bandwidth for precompliance testing, you can determine whether your product is likely to pass compliance tests. You can also try reducing the distance between your EUT and receiving antenna to boost EUT signals relative to the DTV background. Standards require testing at 3 m or 10 m for compliance tests, but you can-in limited cases-reduce the distance to 1 m or 2 m for precompliance testing of 3-m measurements. A scale factor of 1/d relates emission limits and distance, but you can't apply it at low frequencies (those less than 30 MHz) or for large EUTs (see FCC Part 15 section 15.31(f) for details). The same scale factor applies to CISPR 22 measurements referenced to 10 m, but you can use the scale factor for Class B equipment only (see clause 10.2.1 of CISPR 22:1997). If you do not have access to a semianechoic chamber and if the scaling of distance and bandwidth still does not yield the information you need, you do have another alternative: noise cancellation. This alternative requires two antennas, one near the EUT and another at a greater distance. The near-EUT antenna receives emissions at amplitudes high enough to detect them over the ambient signals. Then, you can measure the power of the emissions at the second antenna's distance and use the result to perform a calculation to cancel the ambient signals. FOOTNOTES 1. Title 47 of the Code of Federal Regulations, Chapter I, Subchapter A (General), Part 15, Radio Frequency Devices, Federal Communications Commission, Washington, DC, www.fcc.gov/oet/info/rules/. Test methods for Part 15 can be found in ANSI C63.4-1992, IEEE Methods of Measurement of Radio-Noise Emissions from Low-Voltage Electrical and Electronic Equipment in the Range of 9 kHz to 40 GHz, ANSI, New York, NY, www.ansi.org. 2. CISPR 22:1997 (EN55022:1998), Limits and methods of measurement of radio disturbance: characteristics of information technology equipment, CENELEC, Brussels, Belgium, www.cenelec.be. Also see CISPR 16-1:1993 (latest edition: 1999), Specification for radio disturbance and immunity measuring apparatus and methods - Part 1. Radio disturbance and immunity measuring apparatus. =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 3 From: James M. Atkinson, Comm-Eng Date: Thu Feb 3, 2000 10:25pm Subject: The Transistor The Transistor The transistor was invented on Christmas Day, 1948, by Emily Gerund, a high school teacher of English from Boston, Massachusetts, who was serving a 20 years-to-life sentence in the state penitentiary for throwing her husband's coat under a speeding truck. The judge was rather severe with her because her husband was still in the coat at the time. The Governor of the state owned an electronics firm and so was able to provide surplus vacuum tubes to the prisoners so that they could decorate their Christmas trees. Now Emily had an extremely tiny tree, much too small for a string of SV6s or even for a single QL4. But she just happened to find some germanium crystals lying around. She stuck three wires in each one and used them to decorate her tree. She was quite surprised when after she completed the tree, it started picking up the Jack Benny Show. The Governor, upon learning about this and realizing its implications, immediately rushed to the prison and offered the English teacher a full pardon in exchange for the manufacturing rights to her invention. "Of course, Governor," she replied. ... "In this case, I'll be glad to let you end a sentence with a proposition." -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 4 From: James M. Atkinson, Comm-Eng Date: Fri Feb 4, 2000 11:20am Subject: Old NASA Joke [Humour] When NASA was preparing for the Apollo project, they did some astronaut training on a Navajo Indian reservation. One day, a Navajo elder and his son were herding sheep and came across the space crew. The old man, who spoke only Navajo, asked a question which his son translated. "What are these guys in the big suits doing?" A member of the crew said they were hired by the government as astronauts, practicing for their trip to the moon. The old man got all excited and asked if he could send a message to the moon with the astronauts. Recognizing a promotional opportunity for the spin-doctors, the NASA folks found a tape recorder. After the old man recorded his message, they asked the son to translate it. He refused. So the NASA reps brought the tape to the reservation where the rest of the tribe listened and laughed but they also refused to translate the elder's message to the moon. Finally, the NASA crew called in an official government Navajo translator from the CIA. He reported that the moon message said, "Watch out for these guys; they have come to steal your land." -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 5 From: Steve Uhrig Date: Mon Feb 7, 2000 7:17pm Subject: X Ray machine for sale Hello list, I have for sale two demo Clear View portable X ray machines from Security Defense Systems in NJ. These are the latest models and were used for sales demos only. They are essentially new and carry the full original manufacturer's warranty. These are designed for many security uses and are a primary tool for serious TSCM'ers, especially those who use NLJDs. You can X ray telephone handsets, desk and office artifacts, and similar. You also can X ray your own or someone else's limbs. Although not sold or suggested for that purpose, an X ray machine is the ultimate sweep gadget for impressing customers. Everyone has an OSCOR now. How many have an X ray? How do you inspect 40 telephone handsets on a large sweep? With the X ray, you can do them in fifteen seconds each, and nothing will hide. How else can you do them? See inside lamps, office equipment and other items capable of concealing electronic eavesdropping devices. Viewing area is 50mm (2 inches). Will accept objects to 175mm in size (just under seven inches). Weighs 6.6 pounds. Ships in padded aluminum briefcase. X ray intensity within BRH guidelines, but be responsible. These are the high resolution, high intensity models, in current manufacture. Power is internal rechargeable battery (new battery included) for 20 minutes on time, or external12 VDC or external 110/220 VAC for continuous operation anywhere in the world. Unit is suitable for lab or field use. Secondary applications are veterinary, sports (X ray suspected bone fractures right on the ballfield), EMT/ambulance, EOD to inspect suspect letters/parcels for explosives, narcotics/contraband, materials inspection/failure analysis, even X raying children's candy at Halloween. The factory new price is $7950, and they sell to qualified users only. My price is $5250 each, which is well below any price anyone will pay elsewhere. Best trade price is $6750. Stocking dealer is $6000. Two units available. Can take credit cards for payment. Units are at factory now for inspection and will be ready to ship next week. Warranty starts on receipt of unit. Remember, these are basically new units, not tired old used, "refurbished" or "overhauled" pieces with low resolution, low brightness and low penetration. The last time these were offered they sold in one day, and they were refurbished units. Holler if interested. Also see information on Minox "spy" cameras at http://www.swssec.com/minox.html Regards .... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6 From: Date: Mon Feb 7, 2000 7:26pm Subject: Re: X Ray machine for sale In a message dated 2/7/00 7:52:55 PM Pacific Standard Time, Steve@s... writes: << These are the latest models and were used for sales demos only. They are essentially new and carry the full original manufacturer's warranty. >> these must be the Arpege model 7 From: William L. McCrory Date: Mon Feb 7, 2000 2:49pm Subject: Re: X Ray machine for sale The use of an x-ray machine (fluoroscope) is something that needs to be done carefully and responsibly. Both are the source of ionizing radiation that can have serious health side effects. The statement, "You also can X ray your own or someone else's limbs," is unprofessional and suggests that the writer has little familiarity with radiation safety. No one should routinely use a portable fluoroscope without first being put on a radiation health safety program that systematically monitors one's blood for the telltale signs of excessive gamma radiation exposure. Neither should anyone purchase a portable fluoroscope without understanding that good practice will require that it be examined at least annually by a qualified safety examiner. Because of the handling that portable equipment gets, the otherwise sealed seams will sometimes open up and expose the user to radiation. I am unfamiliar with the equipment mentioned in this message, however the implication is that the user may be looking back through leaded glass at the radiation source. There are other units on the market that do not require the user to stand in the path of the radiation source. They are safer choices. Image interpretation training is a close second behind radiation health safety in choosing to use a portable fluoroscope. A portable fluoroscope is a good diagnostic tool, however as anyone who has ever had a briefcase of electronic equipment pass through an airport fluoroscope without being thoroughly physically inspected can attest, the absence of recurring training makes them a much less effective tool. They are not magic wands. They cannot find bombs and they cannot find "bugs." They can only highlight objects which, to the well-trained observer, indicate that further close physical or instrumental examination is necessary. Before buying this or any other used fluoroscopic equipment, insist that it first be examined by a qualified inspector who will not only provide a written inspection report that certifies compliance with federal health standards, but he/she will also help guide you to a radiation safety program. 8 From: James M. Atkinson, Comm-Eng Date: Tue Feb 8, 2000 7:59am Subject: Helpful Tips To Make Life Simpler Martha Stewart's Helpful Tips To Make Life Simpler Old telephone books make ideal personal address books. Simply cross out the names and addresses of people you don't know. Fool other drivers into thinking you have an expensive car phone by holding an old TV or video remote control up to your ear and occasionally swerving across the road and jumping the curb. Lose weight quickly by eating raw pork and rancid tuna. I found that this enabled me to lose 12 pounds in only 2 days. Avoid parking tickets by leaving your windscreen wipers turned to fast wipe whenever you leave your car parked illegally. No time for a bath? Wrap yourself in masking tape and remove the dirt by simply peeling it off. Apply red nail polish to your nails before clipping them. The red nails will be much easier to spot on your bathroom carpet. (Unless you have a red carpet, in which case a contrasting polish should be selected.) If a person is choking on an ice cube, don't panic. Simply pour a jug of boiling water down their throat and presto! The blockage is almost instantly removed. Save on booze by drinking cold tea instead of whiskey. The following morning you can create the effects of hangover by drinking a thimble full of dish washing liquid and banging your head repeatedly on the wall. Give a man a fish and he will eat for a day. Teach a man to fish and he will sit in a boat drinking beer all day. =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 9 From: Gordon Mitchell Date: Tue Feb 8, 2000 8:54am Subject: Re: X Ray machine for sale It's actually not that complicated. Because low energy (typically 50 KeV) systems present less risk than the ones used to inspect more dense items they can be adequately monitored by a ring/control combination that is cycled through a radiation health firm every few months. Drawing blood is necessary in atomic bomb facilities (and when clients fail to pay). Getting a machine inspected when it is purchased is a good idea but again not that complicated. Just take it to the licensing facility for your region. You likely will have to take it to them because these machines present such a small radiation risk that they will not come to you. Measurements on our C-arm x-ray machine indicate that if we work day and night in the sweep business (hope, hope...) that we might accumulate 10% of normal background radiation by using the fluoroscope. After using one for the last 5 years I can testify that they don't promote hair growth but certainly do help with inspections. How else can you check the memorabilia in the president's office for electronics without risking disaster or taking hours? Gordon Mitchell, PhD Future Focus, Inc Woodinville, WA Electronic eavesdropping detection & finding clues in computers (425) 489-0446 "William L. McCrory" wrote: > From: "William L. McCrory" > > The use of an x-ray machine (fluoroscope) is something that needs to be > done carefully and responsibly. Both are the source of ionizing > radiation that can have serious health side effects. The statement, > "You also can X ray your own or someone else's limbs," is unprofessional > and suggests that the writer has little familiarity with radiation > safety. > > No one should routinely use a portable fluoroscope without first being > put on a radiation health safety program that systematically monitors > one's blood for the telltale signs of excessive gamma radiation > exposure. Neither should anyone purchase a portable fluoroscope without > understanding that good practice will require that it be examined at > least annually by a qualified safety examiner. Because of the handling > that portable equipment gets, the otherwise sealed seams will sometimes > open up and expose the user to radiation. I am unfamiliar with the > equipment mentioned in this message, however the implication is that the > user may be looking back through leaded glass at the radiation source. > There are other units on the market that do not require the user to > stand in the path of the radiation source. They are safer choices. > > Image interpretation training is a close second behind radiation health > safety in choosing to use a portable fluoroscope. A portable > fluoroscope is a good diagnostic tool, however as anyone who has ever > had a briefcase of electronic equipment pass through an airport > fluoroscope without being thoroughly physically inspected can attest, > the absence of recurring training makes them a much less effective > tool. They are not magic wands. They cannot find bombs and they cannot > find "bugs." They can only highlight objects which, to the well-trained > observer, indicate that further close physical or instrumental > examination is necessary. > > Before buying this or any other used fluoroscopic equipment, insist that > it first be examined by a qualified inspector who will not only provide > a written inspection report that certifies compliance with federal > health standards, but he/she will also help guide you to a radiation > safety program. > > --------------------------- ONElist Sponsor ---------------------------- > > Shop for your Valentine at eGroups. > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 10 From: James M. Atkinson, Comm-Eng Date: Tue Feb 8, 2000 10:09am Subject: Whiz Away As many of us have at one time or another worked in one of these...enjoy ----- An American tourist in Moscow found himself needing to take a leak very badly. After a long search he just couldn't find anyplace to relieve himself. So he just went down one of the side streets to take care of business. Before he could even get unzipped a Moscow police officer said, "Hey you, what are you doing?" "I gotta go, man," replied the tourist. "You can't go here. Look, follow me," the policeman offered. The police officer led him to a beautiful garden with lots of grass, pretty flowers, and manicured hedges. "Here," said the cop, "whiz away." The American shrugs, turns, unzips, and starts right on the flowers. "Ahhh. Whew. Thanks. This is very nice of you. Is this Russian courtesy?" asked the tourist. "No. This is the American Embassy." =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 11 From: Jay Coote Date: Fri Feb 4, 2005 3:36pm Subject: Teletrac & Other AVL Systems? I had a few questions regarding Teletrac and other vehicle tracking systems: The Teletrac transmitter may be set to fire off at a given rate, or "dormant" if the computer operator set it that way. Would removing vehicle power (battery leads) re-boot the Teletrac and cause it to transmit again- at least one transmission? I would also appreciate info on other vehicle tracking systems, such as whether remote or PC-controlled, concelability, transmitter repetition rate, band. Thanks (Please excuse the missing date... it is a Micro$oft problem and will be resolved when I get a real computer and a real browser) Jay Coote, W6CJ Licensed Private Investigator -TSCM specialist Los Angeles 12 From: Jay Coote Date: Fri Feb 4, 2005 3:36pm Subject: Receivers with Video Demodulators? Does Icom or anyone else have a new allmode/GC receiver with a video demodulator? I am looking for 0.010-2000 MHz or beyond and without gaps in coverage. Suggestions/Caveats appreciated. (Please excuse the missing date... it is a Micro$oft problem and will be resolved when I get a real computer and a real browser) Jay Coote, W6CJ Licensed Private Investigator -TSCM specialist Los Angeles 13 From: Trace Carpenter Date: Wed Feb 9, 2000 1:28pm Subject: Re: Teletrac & Other AVL Systems? Jay: The Teletrac unit is never programmed to "fire" at a given interval. The unit lies dormant in constant receive mode until it is queried by the system. When it receives a signal that says "where are you?" it replies with "here I am." The "preprogramming" you are referring to is actually done in the tracking computer. At preprogrammed intervals it will dial into the tracking system and query the unit to reply with it's location. Pulling the battery and reconnecting will not cause it to send a locate. Additionally, many private investigators place the units on vehicles with their own battery packs. Jay Coote wrote: > From: "Jay Coote" > > I had a few questions regarding Teletrac and other vehicle tracking systems: > > The Teletrac transmitter may be set to fire off at a given rate, or "dormant" if > the computer operator set it that way. Would removing vehicle power (battery leads) re-boot the Teletrac and cause it to transmit again- at least one transmission? > > I would also appreciate info on other vehicle tracking systems, such as whether remote or PC-controlled, concelability, transmitter repetition rate, band. > > Thanks > (Please excuse the missing date... it is a Micro$oft problem and will > be resolved when I get a real computer and a real browser) > > Jay Coote, W6CJ > Licensed Private Investigator -TSCM specialist > Los Angeles > > --------------------------- ONElist Sponsor ---------------------------- > > $10 Savings on Pet Valentine Gifts. > Looking for that pet-perfect Valentineís Day gift? > Click here for $10 off purchases of $25 or more. > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- *Trace Carpenter *2926 Maple Ave., Ste. 200 *Dallas, Texas 75201 *214.828.4520; 214.740-0112 Facsimile *Because the fly on the wall might not be the only bug in the room.ô 14 From: Steve Uhrig Date: Tue Feb 8, 2000 2:02pm Subject: Re: X Ray machine for sale Once upon a midnight dreary, William L. McCrory pondered, weak and weary: > The statement, "You also can X ray your own or someone else's > limbs," is unprofessional and suggests that the writer has little > familiarity with radiation safety. The statement, essentially, is directly from the manufacturer's literature. One *primary* application advertised for the device is realtime use in sports, to X ray a player directly on the ball field. The EMT profession is a major consumer of this precise model machine. > No one should routinely use a portable fluoroscope In TSCM one might use it a grand total of 60 minutes a year, in 15 second increments. > They are not magic wands. They cannot find bombs and they > cannot find "bugs." They can only highlight objects which, to > the well-trained observer, indicate that further close > physical or instrumental examination is necessary. Don't we all say this to each other about every piece of sweep equipment, with my soapbox showing quite a bit more wear than most? > Before buying this or any other used fluoroscopic equipment, > insist that it first be examined by a qualified inspector I *said* the things were at the factory for checkout and would not ship until blessed by them. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 15 From: Jay Coote Date: Fri Feb 4, 2005 3:36pm Subject: Re: Teletrac & Other AVL Systems? Trace; Thanks for the help. I've had some Teletrac dealing, but could not remember if the unit could fire on the battery power being rebooted. It was, after all, 4 years ago ;-) The teletracs then used a flat "pyramid" antenna and a rectangular metal box which could be removed from a larger plastic box for ease of concealment.. Yep, all shapes and sizes of homemade D battery packs.... Jay ---------- > From: Trace Carpenter > > Jay: > > The Teletrac unit is never programmed to "fire" at a given interval. The unit > lies dormant in constant receive mode until it is queried by the system. When > it > receives a signal that says "where are you?" it replies with "here I am." > The "preprogramming" you are referring to is actually done in the tracking > computer. At > preprogrammed intervals it will dial into the tracking system and query the > unit to reply with it's location. Pulling the battery and reconnecting will > not cause it to > send a locate. Additionally, many private investigators place the units on > vehicles with their own battery packs. > > Jay Coote wrote: > > > From: "Jay Coote" > > > > I had a few questions regarding Teletrac and other vehicle tracking systems: > > > > The Teletrac transmitter may be set to fire off at a given rate, or > "dormant" if > > the computer operator set it that way. Would removing vehicle power > (battery leads) re-boot the Teletrac and cause it to transmit again- at least > one transmission? > > > > I would also appreciate info on other vehicle tracking systems, such as > whether remote or PC-controlled, concelability, transmitter repetition rate, > band. > > > > Thanks > > (Please excuse the missing date... it is a Micro$oft problem and will > > be resolved when I get a real computer and a real browser) > > > > Jay Coote, W6CJ > > Licensed Private Investigator -TSCM specialist > > Los Angeles > > > > --------------------------- ONElist Sponsor ---------------------------- > > > > $10 Savings on Pet Valentine Gifts. > > Looking for that pet-perfect Valentineís Day gift? > > Click here for $10 off purchases of $25 or more. > > Click Here > > > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > -- > *Trace Carpenter > *2926 Maple Ave., Ste. 200 > *Dallas, Texas 75201 > *214.828.4520; 214.740-0112 Facsimile > *Because the fly on the wall might not be the only bug in the room.ô > > > > --------------------------- ONElist Sponsor ---------------------------- > > Free Valentineís Day Delivery from Petopia.com. > Looking for that pet-perfect Valentineís Day gift? > Click here for free delivery with purchases of $25 or more. > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 16 From: Hoffman Date: Sat Feb 12, 2000 11:09am Subject: Book Review - Glenn Whidden I like to write amateur book reviews and I thought that I might share several of my book reviews with this TSCM-L mailing list. You see alot of books on countermeasures, and you wonder if it is worth ponying up large sums of cash for a book of questionable content. Some of Mr. Whiddens publications are a perfect example of overpriced books. In his defense though, I will say that Whidden is one of the best educational writers I have ever seen out of the thousands of books in my personal library. In his publication, "The Ear" (grossly overpriced), he has the amazing ability to take a moderately complex topic (to a laymen) and write it so that anyone can understand it. Anyway.. I'll post some of my reviews at random within the next week. ------------------------------------- A GUIDEBOOK FOR THE BEGINNING SWEEPER ------------------------------------- A Guidebook for the Beginning Sweeper is an extremely useful and insightful book written by Glenn H. Whidden and published by his company Technical Services Agency (TSA). This 219 page manual represents just one of the many fine publications authored by Whidden. Other titles include, The Axnan Attack, The Russian Evasdropping Threat, The Ear, and the TSCM Threat Book series (volume I and II). Of the many books I have read and reviewed which deal with the topic of electronic countermeasure services, I conclude this book to be the most usefull from the business standpoint. This book is low on "fluff" and high on technical content. Although, it is likely not the most interesting book you will read, it acts as indespensable reference for anyone interested in the business aspects of security. The book opens with a brief and 'to the point' chapter written for individuals who have pondered the possibilities of offering countersurveillance services. Whidden then offers a brief explanation of the many elements of an eavesdroppping defense; explaining that an effective sweeper should have a proper mindset and should follow ceartain rules of the game in order to be effective in plying ones trade. These aforementioned rules, which Whidden dubs- "The Moscow Rules", comprise an entire chapter of the book. The remainder of the book is dedicated to the business and procedural aspects of countermeasures and security. Although this book does not directly contain information on the technical details of countermeasures (ie: what equipment to use for a "sweep" and how to implement such devices), it does deal thoroughly (yet simplisticly) with the most common eavesdropping threats and outlines common vulnerabilities. Mr Whidden then proceeds to walk the reader step-by-step through the process of performing countermeasures services. Topics covered include; initial client contact, what to say and what not to say. The necessity of using photography when planning sweeps. Different methods to calculate costs for your TSCM services. What to do if you find a clandestine device (both legal and moral issues may arise). A fairly extensive glossary of terms also serves to form the basis of a well-rounded book. Perhaps the most usefull aspect of the book are the extensive (approximately 90 pages) checklists, and sample reports which the security technician can utilize to fulfill his duties of properly informing the client of the thoroughness of the search. The sample reports alone are worth the price of the book. I conclude this review by saying that this is a "must read" book that should be on the reference shelf of anyone who is interested in the field of security. This book is not just for countermeasure technicians but rather is equally usefull for anyone in an administrative capacity. Price: $36 * TSA * 10903 Indian Head Highway, Suite 304 * Ft Washington, MD 20744-4018 * USA * PHONE 1.301.292.6430 17 From: Hoffman Date: Sat Feb 12, 2000 11:17am Subject: Book Review - Udovich, Taylor TELEPHONE EAVESDROPPING AND DETECTION ------------------------------------- ($189.00 plus $10.00 domestic shipping; direct order from publisher.) Telephone Eavesdropping and Detection is the premiere reference manual on the subject of telephone wiretap detection. There simply has never been a more comprehensive and well written book written on the subject. It is published by Taylor Hill, and written by Richard J. Udovich and Charles L. Taylor who are men of well respected credentials. The textbook was published in 1990, so most of the information is current and applicable. The opening credits give the reader an indication of just how well planned this books was, as it lists some of the most well known professionals in various fields ranging from telecommications experts from AT&T, and Bell Research, to well known surveillance and security industry experts. This textbook is formatted in a fairly intuitive manner designed as a teaching aid, and all topics and subtopics are clearly labled to help the student learn and take notes. Although personally, I felt that many chapters were clearly out of order; but a slight nitpick. The best way to review this book is to let the contents speak for themselves. Here is a greatly simplified sample of the topics which are dealt with in this 500+ page manual. The book has 4 main chapters divided into 25 subsections. A useful appendix and glossary is also included. In addition, an evaluation test at the end of each section serves to to verify that the reader understands the contents. -------------- Chapter 1 - Introduction to Basic Electronics Basic Physics Basic Electrical Theory Basic Circuits Electronic Components Sound and Microphones Chapter 2- The Telephone System, Basic Design and Operation Telephone Exchange and Cable Distribution System (Outside Plant) Building Telephone Cable Distribution (Customer Premise) Electro-Mechanical Key Systems Electronic Key Systems (EKSU) Private Branch Exchanges (PBX) Chapter 3- Telephone Wiretaps and Detection Telephone Taps- Operation and Electrical Characteristics Common Wiretap Methods Telephone Wiretap Detection Equipment Wiretap Detection Procedures For A Residence Wiretap Detection Procedures For Outside Plant Cables Wiretap Detection Procedures For Electro-Mechanical Key Systems Wiretap Detection Procedures For Electronic Key Systems Wiretap Detection Procedures For PABX Systems With EKSU Chapter 4- Telephone Instruments and Hookswitch Bypass The 500 Telephone Instrument- Operation, Construction, & Circuit Analysis Hookswitch Bypasses and Electro-Mechanical Telephone Instruments Electronic Telephone Systems- Hookswitch Bypass Analysis Hookswitch Bypass Detection Procedures And Equipment Appendices- Common Audio Pair Conductor Resistance in Loop Ohms Interpreting The Resistor Color Code Summary of Important Terms Line Balance Test Schematics Symbols Feeder And Distribution Service Areas Outside Plant Facilities Test Locations For A Typical Key System Test Locations For A Typical Neighborhood Manufacturers and Distributors Evaulation Test Answers (for all 25 sections) Glossary Index -------------- Telephone Eavesdropping and Detection will be particularly useful to the reader who is looking for a "hands-on" type of books. Within the textbook, there are literally hundreds of diagrams which help to illustrate the lessons in the text. In addition, the manual demonstrates pictorially where the phone taps, and the electronic test equipment (voltmeters, time domain reflectometers, line tracers, TSCM amplifiers etc..) are to be placed, as well as step-by-step instructions on how to perform various tests to detect the myriad of wiretapping threats. I was somewhat dissapointed that the book did not delve more deeply into explaining the intracacies of the telephone system; particularly with respect the the complexities of PBX and electronic telephone systems which are found in most office buildings. However, as the author stated at the beginning of the book, that simply would not be possible, because it's just too much data for one book. So if you want to sink your money into this book, might I also suggest you purchase a few supplemental books on telephone systems (ABC Teletraining has the absolute best series of telephone training books published), or you might want to get some books on basic electronics as well (depending wherein your knowledge is lacking). In closing, I feel the need to mention the price of this book. Indeed it is excessively expensive, as are many books of an esoteric nature which were written specifically for professionals. However, if you are either a professional in the field of surveillance countermeasures, telephone security, or a corporate information security and intellectual property rights practitioner, or even a curious and dedicated hobbyist, this book is worth every penny. There are literally hundreds of books written on countermeasures, as well as several books specifically dealing with wiretap detection. Why buy all those other books, when you can simply purchase this one book which has what all the other books have combined (almost, anyway)? Taylor Hill Publishing P.O. Box 1815 Bay City, Texas 77404 USA (Phone) 1.409.224.4920 http://www.bugsweep.com (authors corporate web site) http://www.bugsweep.com/book.html (information on this book) NOTE: The authors at the web site listed above do not directly sell the book. It must be ordered either from the publisher, or you can go to your local major bookstore and have them order it (with an added mark-up, of course). ISBN#: 0-9625466-0-7 18 From: Kevin D. Murray Date: Fri Feb 18, 2000 5:24pm Subject: Re: Book Review - Glenn Whidden As a regular reader of the list, and a full-time practitioner in this field, I would like to comment on the book reviews posted today. First... Anyone who has written a book review appreciates the time and effort it takes to do it. To whoever posted these unsigned pieces, your efforts are acknowledged. The following is not meant to discourage you. They reflect what I would like to see in future pieces, and some critical personal opinion... Ô Consider attaching the customary "about the author" paragraph to your future book reviews. Without this, readers do not know how much credibility to give to your writings. (For all anyone knows, a writer's expertise could be in a totally unrelated field, like running.) Ô On your comment... "You see alot of books on countermeasures, and you wonder if it is worth ponying up large sums of cash for a book of questionable content. Some of Mr. Whiddens publications are a perfect example of overpriced books. In his defense though... " Mr. Whidden does not need you (or any of us) to defend him. He is probably the best known, and most respected expert in our field. His credo could be "If anyone speaks ill of you, let your life be such that no one will believe him." In his case, it works. (Just an aside... You should be aware that people who know him would be pleased to wear your anal sphincter for a pinkie ring over those comments.) I have purchased, read (and re-read) _all_ of his books and publications. I can say - without reservation - all of them are well worth every penny spent, several times over. Glenn Whidden has a lifetime of experience and knowledge which he is sharing at nominal cost. Let's put this into perspective. Total the cost of all his writings. Could you hire an ex-CIA technical specialist (with patents to his credit) to consult with you for two hours? Not at that price. Even if you paid more... Could you ask all the right questions, invent a business model, and take notes fast enough to walk away with the knowledge in his written works? Of course not. Ô Please spell check before you post your book reviews. Ô May I suggest you review some other publications to add balance, perspective and depth to your review of The Guidebook for the Beginning Sweeper. How about doing a side by side comparison with... A Countermeasures Cookbook on Conducting Professional TSCM Services: The Ultimate Guide to Testing and Checking for Bugs and Illegal Wiretaps, by Ralph Thomas? (For list readers who can't wait... an excellent review of this book appears in the January issue of Security Management magazine (page 140). (Note: It is the review that I am calling excellent, not the book being reviewed.)) Ô When commenting on book costs, why not show a comparison to... something. Peruse the catalogues of the major security / technical / legal book publishers for guidance. (Butterworth, Clark Boardman, West, CRC, Elsevier, Wiley, Prentice Hall, Addison Wesley Longman, McGraw-Hill, etc.) This will give your readers a concrete basis for comparison. It may also inspire you reevaluate the sophomoric comment, "Some of Mr. Whiddens publications are a perfect example of overpriced books." Thank you for considering these requests, and my personal opinions. Kevin Kevin D. Murray CPP, CFE, CCO, BCFE Murray Associates Counterespionage Consultants to Business & Government Eavesdropping Detection Specialists www.spybusters.com 19 From: Jay Coote Date: Fri Feb 4, 2005 3:36pm Subject: 4, 6, 8-conductor phone breakout box ? Thanks for reading. I'd like to build a small breakout box with several rotary switches which would allow me to to the following: *Quickly plug into a standard 4, or 6 conductor wall jack, or 8-conductor wall jack. *Select any wire combinations for TDR, DVM, receiver-analyzer or audio amp. *Switch or reverse combinations for balance, resistance and capacitance tests. I don't want to shell out a zillion dollars- Can someone give me a table of pinouts for female RJ 8-conductor connectors as they correspond to the wiring color code? I may want this black box to have through connections, and it must handle connection to 4, 6 and 8-wire phones. Has anyone already built one of these who would care to discuss or share a schematic? (Please excuse the missing or wrong date on my email... it is a Micro$oft problem and will be resolved when I get a real computer and a real browser) Jay Coote, W6CJ Licensed Private Investigator -TSCM specialist Los Angeles 20 From: Charles Patterson Date: Wed Feb 16, 2000 9:20pm Subject: Re: 4, 6, 8-conductor phone breakout box ? Hi Jay, I just returned from ye ol' Radio Shack with a new box to transfer my breakout box into. (My old box was built in a hurry, and it shows a bit too much wear). There are many different wiring schemes, particularly for the 8 conductor jacks but you shouldn't have to worry about that too much since you will need to check all pairs anyway. The middle two conductors are almost always the main pair, at least in a single line phone, the next outer pair could be a second line. In the case of an electronic pbx or key system, the middle pair often carries the analog audio and the outer pair carries the power and signaling. If it is a fully digital system, only one pair is needed for everything. Some use the middle pair (Toshiba, Panasonic DBS) while some use the second pair (Panasonic KXTD) and can still use the middle pair for an analog signal. The third pair (spreading out from the middle) was often used in some system to allow for "off hook call anounce". This was to allow paging through the speaker of a phone while the phone is still in use. Some phones will have that third pair wired right to the speaker in the phone set, perfect to use for listening in. To see the usually coloring try: http://www.ablecomm.com/learnpg.htm When wiring a jack the middle pair is usually numbered 4 and 5, second pair is 6,3. It would be good to at least note these positions as starting points on the rotary switches. In my new box I will have two banana type binding posts wired to the center contact of the rotary switches (one to each switch). I will also wire a mini jack in parallel with the banana posts for easy connection to my amplifier. Then take eight positions of each switch and wire each of them in parallel to the eight positions of an 8c jack. Now you will have each switch able to connect one output banana post to every contact of the jack. Note that this way there will also be a short across the output posts if the two switches are set at the same setting- don't let it fool you if you're spinning the knobs doing a resistance check. On the jack side, I plan to have two 8c jacks wired in parallel and keep a mod jumper cable handy. this way I can use it as a feed through and run the phone set live while testing. I may add a handset size jack just for convenience. 4 conductor line plugs will usually fit fine in an 8c jacks but handset plugs tend to wobble too much. You can use two R/S 275-1385 rotary switches to give you twelve switching positions, you only need 8 positions, I'm still trying to figure out something fun to do with the other 4 positions (my balanced line tester is in a separate box, it was a bit more complicated). I hope this makes sense charles Charles Patterson communications@c... Global Communications Tarrytown, NY http://www.telephonesecurity.com ----- Original Message ----- From: Jay Coote To: Sent: Wednesday, February 16, 2000 8:36 PM Subject: [TSCM-L] 4, 6, 8-conductor phone breakout box ? > > From: "Jay Coote" > > Thanks for reading. > > I'd like to build a small breakout box with several rotary switches which would allow me to to the following: > *Quickly plug into a standard 4, or 6 conductor wall jack, or 8-conductor wall jack. > *Select any wire combinations for TDR, DVM, receiver-analyzer or audio amp. > *Switch or reverse combinations for balance, resistance and capacitance tests. > > I don't want to shell out a zillion dollars- Can someone give me a table of > pinouts for female RJ 8-conductor connectors as they correspond to the > wiring color code? I may want this black box to have through connections, > and it must handle connection to 4, 6 and 8-wire phones. > > Has anyone already built one of these who would care to discuss or share a schematic? > > (Please excuse the missing or wrong date on my email... it is a Micro$oft problem and will > be resolved when I get a real computer and a real browser) > > Jay Coote, W6CJ > Licensed Private Investigator -TSCM specialist > Los Angeles > > > --------------------------- ONElist Sponsor ---------------------------- > > Get what you deserve with NextCard Visa. Rates as low as 2.9 percent > Intro or 9.9 percent Fixed APR, online balance transfers, Rewards > Points, no hidden fees, and much more. Get NextCard today and get the > credit you deserve. Apply now. Get your NextCard Visa at > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 21 From: Charles Patterson Date: Wed Feb 16, 2000 9:29pm Subject: phone wire color codes The better reference page for color codes is actually: http://www.ablecomm.com/colorcodes.htm scroll down to the modular jacks cp ----- Original Message ----- From: Jay Coote To: Sent: Wednesday, February 16, 2000 8:36 PM Subject: [TSCM-L] 4, 6, 8-conductor phone breakout box ? > > From: "Jay Coote" > > Thanks for reading. > > I'd like to build a small breakout box with several rotary switches which would allow me to to the following: > *Quickly plug into a standard 4, or 6 conductor wall jack, or 8-conductor wall jack. > *Select any wire combinations for TDR, DVM, receiver-analyzer or audio amp. > *Switch or reverse combinations for balance, resistance and capacitance tests. > > I don't want to shell out a zillion dollars- Can someone give me a table of > pinouts for female RJ 8-conductor connectors as they correspond to the > wiring color code? I may want this black box to have through connections, > and it must handle connection to 4, 6 and 8-wire phones. > > Has anyone already built one of these who would care to discuss or share a schematic? > > (Please excuse the missing or wrong date on my email... it is a Micro$oft problem and will > be resolved when I get a real computer and a real browser) > > Jay Coote, W6CJ > Licensed Private Investigator -TSCM specialist > Los Angeles > > > --------------------------- ONElist Sponsor ---------------------------- > > Get what you deserve with NextCard Visa. Rates as low as 2.9 percent > Intro or 9.9 percent Fixed APR, online balance transfers, Rewards > Points, no hidden fees, and much more. Get NextCard today and get the > credit you deserve. Apply now. Get your NextCard Visa at > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 22 From: Jay Coote Date: Fri Feb 4, 2005 3:36pm Subject: Re: Book Review - Udovich, Taylor (Original book review below) I am in the middle of this book, and I also highly recommend it. A good TSCM-ist never stops being a student and this book is good for newcomer as well as the veteran. Just a small critique; if this book needs anything more it might be some organization of the sweep procedures described- arranged in the order that the procedures would be performed in a residence or business. (Please excuse the missing or wrong date on my email... it is a Micro$oft problem and will be resolved when I get a real computer and a real browser) Jay Coote, W6CJ Licensed Private Investigator -TSCM specialist Los Angeles ---------- > From: "Hoffman" > > TELEPHONE EAVESDROPPING AND DETECTION > ------------------------------------- > > ($189.00 plus $10.00 domestic shipping; direct order from publisher.) > > Telephone Eavesdropping and Detection is the premiere reference manual > on the subject of telephone wiretap detection. There simply has never been > a more comprehensive and well written book written on the subject. It is > published by Taylor Hill, and written by Richard J. Udovich and Charles L. > Taylor who are men of well respected credentials. The textbook was > published in 1990, so most of the information is current and applicable. > > The opening credits give the reader an indication of just how well > planned this books was, as it lists some of the most well known > professionals in various fields ranging from telecommications experts from > AT&T, and Bell Research, to well known surveillance and security industry > experts. > > This textbook is formatted in a fairly intuitive manner designed > as a teaching aid, and all topics and subtopics are clearly labled > to help the student learn and take notes. Although personally, I felt > that many chapters were clearly out of order; but a slight nitpick. > > The best way to review this book is to let the contents speak > for themselves. Here is a greatly simplified sample of the topics > which are dealt with in this 500+ page manual. The book has 4 main > chapters divided into 25 subsections. A useful appendix and glossary > is also included. In addition, an evaluation test at the end of each > section serves to to verify that the reader understands the contents. > > -------------- > > Chapter 1 - Introduction to Basic Electronics > Basic Physics > Basic Electrical Theory > Basic Circuits > Electronic Components > Sound and Microphones > > > Chapter 2- The Telephone System, Basic Design and Operation > Telephone Exchange and Cable Distribution System (Outside Plant) > Building Telephone Cable Distribution (Customer Premise) > Electro-Mechanical Key Systems > Electronic Key Systems (EKSU) > Private Branch Exchanges (PBX) > > > Chapter 3- Telephone Wiretaps and Detection > Telephone Taps- Operation and Electrical Characteristics > Common Wiretap Methods > Telephone Wiretap Detection Equipment > Wiretap Detection Procedures For A Residence > Wiretap Detection Procedures For Outside Plant Cables > Wiretap Detection Procedures For Electro-Mechanical Key Systems > Wiretap Detection Procedures For Electronic Key Systems > Wiretap Detection Procedures For PABX Systems With EKSU > > > Chapter 4- Telephone Instruments and Hookswitch Bypass > The 500 Telephone Instrument- Operation, Construction, & Circuit > Analysis > Hookswitch Bypasses and Electro-Mechanical Telephone Instruments > Electronic Telephone Systems- Hookswitch Bypass Analysis > Hookswitch Bypass Detection Procedures And Equipment > > > Appendices- > Common Audio Pair > Conductor Resistance in Loop Ohms > Interpreting The Resistor Color Code > Summary of Important Terms > Line Balance Test > Schematics Symbols > Feeder And Distribution Service Areas > Outside Plant Facilities > Test Locations For A Typical Key System > Test Locations For A Typical Neighborhood > Manufacturers and Distributors > > > Evaulation Test Answers (for all 25 sections) > Glossary > Index > > -------------- > > Telephone Eavesdropping and Detection will be particularly useful > to the reader who is looking for a "hands-on" type of books. Within > the textbook, there are literally hundreds of diagrams which help > to illustrate the lessons in the text. In addition, the manual > demonstrates pictorially where the phone taps, and the electronic > test equipment (voltmeters, time domain reflectometers, line tracers, > TSCM amplifiers etc..) are to be placed, as well as step-by-step > instructions on how to perform various tests to detect the myriad > of wiretapping threats. > > I was somewhat dissapointed that the book did not delve more > deeply into explaining the intracacies of the telephone system; > particularly with respect the the complexities of PBX and electronic > telephone systems which are found in most office buildings. However, > as the author stated at the beginning of the book, that simply would > not be possible, because it's just too much data for one book. > So if you want to sink your money into this book, might I also suggest > you purchase a few supplemental books on telephone systems > (ABC Teletraining has the absolute best series of telephone training > books published), or you might want to get some books on basic > electronics as well (depending wherein your knowledge is lacking). > > In closing, I feel the need to mention the price of this book. > Indeed it is excessively expensive, as are many books of an esoteric > nature which were written specifically for professionals. However, > if you are either a professional in the field of surveillance > countermeasures, telephone security, or a corporate information > security and intellectual property rights practitioner, or even > a curious and dedicated hobbyist, this book is worth every penny. > There are literally hundreds of books written on countermeasures, > as well as several books specifically dealing with wiretap > detection. Why buy all those other books, when you can simply > purchase this one book which has what all the other books have > combined (almost, anyway)? > > > Taylor Hill Publishing > P.O. Box 1815 > Bay City, Texas 77404 > USA > (Phone) 1.409.224.4920 > > > http://www.bugsweep.com (authors corporate web site) > http://www.bugsweep.com/book.html (information on this book) > > NOTE: The authors at the web site listed above do not directly > sell the book. It must be ordered either from the publisher, or > you can go to your local major bookstore and have them order it > (with an added mark-up, of course). > ISBN#: 0-9625466-0-7 > > > > --------------------------- ONElist Sponsor ---------------------------- > > Get what you deserve with NextCard Visa. Rates as low as 2.9 percent > Intro or 9.9 percent Fixed APR, online balance transfers, Rewards > Points, no hidden fees, and much more! Get NextCard today and get the > credit you deserve! Apply now! Get your NextCard Visa at > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 23 From: Jay Coote Date: Fri Feb 4, 2005 3:36pm Subject: Re: 4, 6, 8-conductor phone breakout box ? Charles, Thanks for the information. I began on this box about 1 year ago and had a lot of projects in the meantime- a 911 commcenter for my "other" fulltime job, and so on. Now there's more time to organize my TSCM tools. Good! I was concerned about the use of female 8C jacks on my box; more accurately that something may get reversed or fouled up in the through connection, should I connect some types of phones through the box while testing. I'll just have to watch those shorts so I won't have to leave the job site at 01:30 in the attempt to buy a fuse for the phone system ;-) I hope I may pick your brain on this box project and on what you did to speed up balance tests with your box..... One TSCM book suggested a pair of matched 2700 ohm resistors for the balance test. Thanks, (Please excuse the missing or wrong date on my email... it is a Micro$oft problem and will be resolved when I get a real computer and a real browser) Jay Coote, W6CJ Licensed Private Investigator -TSCM specialist Los Angeles ---------- > From: "Charles Patterson" > > Hi Jay, > > I just returned from ye ol' Radio Shack with a new box to transfer my > breakout box into. > (My old box was built in a hurry, and it shows a bit too much wear). > > There are many different wiring schemes, particularly for the 8 conductor > jacks but you shouldn't have to worry about that too much since you will > need to check all pairs anyway. > The middle two conductors are almost always the main pair, at least in a > single line phone, the next outer pair could be a second line. In the case > of an electronic pbx or key system, the middle pair often carries the analog > audio and the outer pair carries the power and signaling. If it is a fully > digital system, only one pair is needed for everything. Some use the middle > pair (Toshiba, Panasonic DBS) while some use the second pair (Panasonic > KXTD) and can still use the middle pair for an analog signal. > > The third pair (spreading out from the middle) was often used in some system > to allow for "off hook call anounce". This was to allow paging through the > speaker of a phone while the phone is still in use. Some phones will have > that third pair wired right to the speaker in the phone set, perfect to use > for listening in. > > To see the usually coloring try: http://www.ablecomm.com/learnpg.htm > > When wiring a jack the middle pair is usually numbered 4 and 5, second pair > is 6,3. It would be good to at least note these positions as starting > points on the rotary switches. > > In my new box I will have two banana type binding posts wired to the center > contact of the rotary switches (one to each switch). I will also wire a mini > jack in parallel with the banana posts for easy connection to my amplifier. > > Then take eight positions of each switch and wire each of them in parallel > to the eight positions of an 8c jack. Now you will have each switch able to > connect one output banana post to every contact of the jack. Note that this > way there will also be a short across the output posts if the two switches > are set at the same setting- don't let it fool you if you're spinning the > knobs doing a resistance check. > > On the jack side, I plan to have two 8c jacks wired in parallel and keep a > mod jumper cable handy. this way I can use it as a feed through and run the > phone set live while testing. I may add a handset size jack just for > convenience. 4 conductor line plugs will usually fit fine in an 8c jacks but > handset plugs tend to wobble too much. > > You can use two R/S 275-1385 rotary switches to give you twelve switching > positions, you only need 8 positions, I'm still trying to figure out > something fun to do with the other 4 positions (my balanced line tester is > in a separate box, it was a bit more complicated). > > I hope this makes sense > charles > > Charles Patterson > communications@c... > Global Communications > Tarrytown, NY > http://www.telephonesecurity.com > > ----- Original Message ----- > From: Jay Coote > To: > Sent: Wednesday, February 16, 2000 8:36 PM > Subject: [TSCM-L] 4, 6, 8-conductor phone breakout box ? > > > > > > From: "Jay Coote" > > > > Thanks for reading. > > > > I'd like to build a small breakout box with several rotary switches which > would allow me to to the following: > > *Quickly plug into a standard 4, or 6 conductor wall jack, or 8-conductor > wall jack. > > *Select any wire combinations for TDR, DVM, receiver-analyzer or audio > amp. > > *Switch or reverse combinations for balance, resistance and capacitance > tests. > > > > I don't want to shell out a zillion dollars- Can someone give me a table > of > > pinouts for female RJ 8-conductor connectors as they correspond to the > > wiring color code? I may want this black box to have through connections, > > and it must handle connection to 4, 6 and 8-wire phones. > > > > Has anyone already built one of these who would care to discuss or share a > schematic? > > > > (Please excuse the missing or wrong date on my email... it is a Micro$oft > problem and will > > be resolved when I get a real computer and a real browser) > > > > Jay Coote, W6CJ > > Licensed Private Investigator -TSCM specialist > > Los Angeles > > > > > > --------------------------- ONElist Sponsor ---------------------------- > > > > Get what you deserve with NextCard Visa. Rates as low as 2.9 percent > > Intro or 9.9 percent Fixed APR, online balance transfers, Rewards > > Points, no hidden fees, and much more. Get NextCard today and get the > > credit you deserve. Apply now. Get your NextCard Visa at > > Click > Here > > > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > --------------------------- ONElist Sponsor ---------------------------- > > Get what you deserve with NextCard Visa. Rates as low as 2.9 percent > Intro or 9.9 percent Fixed APR, online balance transfers, Rewards > Points, no hidden fees, and much more. Get NextCard today and get the > credit you deserve. Apply now. Get your NextCard Visa at > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 24 From: MICROSEARCH Date: Thu Feb 17, 2000 6:52am Subject: Book review clarification The book reviews submitted yesterday on Guidebook for the Beginning Sweeper and Telephone Eavesdropping and Detection came from someone named Hoffman. I would like to insure all readers of this list that I, Rick Hofmann, am NOT the author of the reviews. In my opinion, both books are essential for TSCM professionals and students alike. Best regards, Rick Hofmann, CCO, CPP PI16998 MICROSEARCH - Technical Surveillance Countermeasures - Counterespionage P.O.Box 2084 - Cypress, Ca. 90630 714-952-3812 Fax:714-209-0037 [Non-text portions of this message have been removed] 25 From: A.Lizard Date: Thu Feb 17, 2000 0:12pm Subject: video surveillance how-to guide from the Feds Saw this on the politech mailing list. The guide referred to is downloadable. A.Lizard US DOJ JUSTINFO ( electronic newsletter) February 15, 2000, Volume 6, Number 4 <*> NATIONAL INSTITUTE OF JUSTICE (NIJ) * Video Surveillance Equipment Selection and Application Guide (NIJ Guide 201-99) Law enforcement and corrections personnel often find selecting and using video surveillance systems a challenge, given the number of choices, sales pressures, and budget constraints. This publication is designed to assist law enforcement and procurement officials choose video equipment that will satisfy their needs. Topics include video cameras, self-contained camcorders, video recorders/players, video display systems, and special purpose video equipment. Appendices offer detailed experimental methods and results that are summarized in the text. "Video Surveillance Equipment Selection and Application Guide (NIJ Guide 201-99)" is available on the NCJRS World Wide Web site (http://www.ncjrs.org/resdocs.htm#179545) and by mail. See "Ordering Directions" and "NCJRS Online Access" ................................... **** O R D E R I N G D I R E C T I O N S **** FOR ALL AGENCIES To order or access news, information, services, and publications offered in JUSTINFO, use one of these methods. NOTE: Occasionally, you will be given special instructions. By phone: 8:30 a.m. to 7 p.m., e.t., Monday through Friday NIJ: 1-800-851-3420 BJS: 1-800-732-3277 OJJDP: 1-800-638-8736 BJA: 1-800-688-4252 OVC: 1-800-627-6872 ONDCP: 1-800-666-3332 TTY (toll free): 1-877-712-9279 (local): 301-947-8374 International: 301-519-5500 In writing, for all agencies: - E-mail: puborder@n... - Mail: P.O. Box 6000, Rockville, MD 20849-6000 ************************************************************ **** NCJRS O N L I N E A C C E S S **** This issue of JUSTINFO is available on the World Wide Web (http://www.ncjrs.org/justinfo/feb1500.htm). Go to the online version to take advantage of live links to all the publication and World Wide Web site addresses featured in this issue. <*> NCJRS Justice Information Center on the World Wide Web: http://www.ncjrs.org ................................... <*> Ask NCJRS! E-mail your questions to: askncjrs@n... ************************************************************************ Personal Web site http://www.ecis.com/~alizard Disaster prep & y2k computer fixes: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... PGP 6.5.1 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 26 From: Jay Coote Date: Fri Feb 4, 2005 3:36pm Subject: Sound Deadening? Though this is not strictly related to TSCM but for a client residence, I thought I would ask any sound experts on the list. The problem is I want to deaden sounds, entering the building from outside (in the 300-5000 Hz range). The structure is older, single-story, stucco over woodframe with drywall inside. There is no heat or sound insulation inside the walls, just air space between the outer stucco and inner drywall. Are there safe (no chemical outgassing) expanding foam substances which can be injected between the walls? Other suggestions? Thanks (Please excuse the missing or wrong date on my email... it is a Micro$oft problem and will be resolved when I get a real computer and a real browser) Jay Coote, W6CJ Licensed Private Investigator -TSCM specialist Los Angeles 27 From: James M. Atkinson, Comm-Eng Date: Fri Feb 18, 2000 7:59pm Subject: Re: Sound Deadening? At 8:55 PM -0500 2/18/00, Jay Coote wrote: >From: "Jay Coote" > >Though this is not strictly related to TSCM but for a client residence, I >thought I would ask any sound experts on the list. The problem is I want >to deaden sounds, entering the building from outside (in the 300-5000 Hz >range). The structure is older, single-story, stucco over woodframe with >drywall inside. There is no heat or sound insulation inside the walls, >just air space between the outer stucco and inner drywall. > >Are there safe (no chemical outgassing) expanding foam substances which >can be injected between the walls? Other suggestions? > >Thanks > >(Please excuse the missing or wrong date on my email... it is a Micro$oft >problem and will >be resolved when I get a real computer and a real browser) > >Jay Coote, W6CJ >Licensed Private Investigator -TSCM specialist >Los Angeles Ouch, Foam would simply be a serious waste of money. About the only things you can do is to build "acoustical mass" and "acoustic isolation" as part of a retrofit. Your client should talk to someone who specializes in acoustic engineering, and tell them that you need to provide a STC45 rating or better. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 28 From: Dutch Hill Tower Antenna Systems, Inc. Date: Fri Feb 18, 2000 8:12pm Subject: RE: Sound Deadening? Or you could find some one to do a phase cancellation job, audio intercepted from outside, processed and re-constructed to cancel the intercepted noise. Can be made as quite as a mouse, just have him bring money. DAS -----Original Message----- From: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] Sent: Friday, February 18, 2000 8:59 PM To: TSCM-L@onelist.com Subject: Re: [TSCM-L] Sound Deadening? From: "James M. Atkinson, Comm-Eng" At 8:55 PM -0500 2/18/00, Jay Coote wrote: >From: "Jay Coote" > >Though this is not strictly related to TSCM but for a client residence, I >thought I would ask any sound experts on the list. The problem is I want >to deaden sounds, entering the building from outside (in the 300-5000 Hz >range). The structure is older, single-story, stucco over woodframe with >drywall inside. There is no heat or sound insulation inside the walls, >just air space between the outer stucco and inner drywall. > >Are there safe (no chemical outgassing) expanding foam substances which >can be injected between the walls? Other suggestions? > >Thanks > >(Please excuse the missing or wrong date on my email... it is a Micro$oft >problem and will >be resolved when I get a real computer and a real browser) > >Jay Coote, W6CJ >Licensed Private Investigator -TSCM specialist >Los Angeles Ouch, Foam would simply be a serious waste of money. About the only things you can do is to build "acoustical mass" and "acoustic isolation" as part of a retrofit. Your client should talk to someone who specializes in acoustic engineering, and tell them that you need to provide a STC45 rating or better. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved --------------------------- ONElist Sponsor ---------------------------- Get what you deserve with NextCard Visa. Rates as low as 2.9 percent Intro or 9.9 percent Fixed APR, online balance transfers, Rewards Points, no hidden fees, and much more. Get NextCard today and get the credit you deserve. Apply now. Get your NextCard Visa at Click Here ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 29 From: Jordan Ulery Date: Sat Feb 19, 2000 4:26pm Subject: Re: Sound Deadening? I don't have the exact answer, but a source to contact. Airports around the nation are modifying homes in areas where airports are expanding. One of the techniques used to keep local residents content, if not happy, is sound abatement. Contact your local airport public relations man and they can point you in the right direction, sure I am. I know that Logan in Boston and Manchester in Manchester, NH have been doing this sort of work for years. Jay Coote wrote: > From: "Jay Coote" > > Though this is not strictly related to TSCM but for a client residence, I thought I would ask any sound experts on the list. The problem is I want to deaden sounds, entering the building from outside (in the 300-5000 Hz range). The structure is older, single-story, stucco over woodframe with drywall inside. There is no heat or sound insulation inside the walls, just air space between the outer stucco and inner drywall. > > Are there safe (no chemical outgassing) expanding foam substances which can be injected between the walls? Other suggestions? > > Thanks > > (Please excuse the missing or wrong date on my email... it is a Micro$oft problem and will > be resolved when I get a real computer and a real browser) > > Jay Coote, W6CJ > Licensed Private Investigator -TSCM specialist > Los Angeles > > --------------------------- ONElist Sponsor ---------------------------- > > Get what you deserve with NextCard Visa. ZERO. Rates as low as 0.0 > percent Intro APR, online balance transfers, Rewards Points, no hidden > fees, and much more. Get NextCard today and get the credit you deserve. > Apply now! Get your NextCard Visa at > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 30 From: Charles Patterson Date: Thu Feb 17, 2000 7:54pm Subject: Re: 4, 6, 8-conductor phone breakout box ? I believe I used the 2700 ohm resistors too If you have two jacks wired really in parallel, then it can work as a feed through without any worries. That shorting thing is not a problem for the phones, the two terminals will not be shorting out the jack. Its just that if you set both switches to the same pin, it will look like a short to a dmm, you will actually be reading only one conductor, and might fool your readings. My new box is turning out pretty good (if I dare say so myself!)! good luck Charles ----- Original Message ----- From: Jay Coote To: Sent: Thursday, February 17, 2000 9:25 AM Subject: Re: [TSCM-L] 4, 6, 8-conductor phone breakout box ? > > From: "Jay Coote" > > Charles, > > Thanks for the information. > I began on this box about 1 year ago and had a lot of projects in the meantime- a 911 commcenter for my "other" fulltime job, and so on. Now there's more time to organize my TSCM tools. > > Good! I was concerned about the use of female 8C jacks on my box; more accurately that something may get reversed or fouled up in the through connection, should I connect some types of phones through the box while testing. I'll just have to watch those shorts so I won't have to leave the job site at 01:30 in the attempt to buy a fuse for the phone system ;-) > > I hope I may pick your brain on this box project and on what you did to speed up balance tests with your box..... One TSCM book suggested a pair of matched 2700 ohm resistors for the balance test. > > Thanks, > > (Please excuse the missing or wrong date on my email... it is a Micro$oft problem and will > be resolved when I get a real computer and a real browser) > > Jay Coote, W6CJ > Licensed Private Investigator -TSCM specialist > Los Angeles > > > ---------- > > From: "Charles Patterson" > > > > Hi Jay, > > > > I just returned from ye ol' Radio Shack with a new box to transfer my > > breakout box into. > > (My old box was built in a hurry, and it shows a bit too much wear). > > > > There are many different wiring schemes, particularly for the 8 conductor > > jacks but you shouldn't have to worry about that too much since you will > > need to check all pairs anyway. > > The middle two conductors are almost always the main pair, at least in a > > single line phone, the next outer pair could be a second line. In the case > > of an electronic pbx or key system, the middle pair often carries the analog > > audio and the outer pair carries the power and signaling. If it is a fully > > digital system, only one pair is needed for everything. Some use the middle > > pair (Toshiba, Panasonic DBS) while some use the second pair (Panasonic > > KXTD) and can still use the middle pair for an analog signal. > > > > The third pair (spreading out from the middle) was often used in some system > > to allow for "off hook call anounce". This was to allow paging through the > > speaker of a phone while the phone is still in use. Some phones will have > > that third pair wired right to the speaker in the phone set, perfect to use > > for listening in. > > > > To see the usually coloring try: http://www.ablecomm.com/learnpg.htm > > > > When wiring a jack the middle pair is usually numbered 4 and 5, second pair > > is 6,3. It would be good to at least note these positions as starting > > points on the rotary switches. > > > > In my new box I will have two banana type binding posts wired to the center > > contact of the rotary switches (one to each switch). I will also wire a mini > > jack in parallel with the banana posts for easy connection to my amplifier. > > > > Then take eight positions of each switch and wire each of them in parallel > > to the eight positions of an 8c jack. Now you will have each switch able to > > connect one output banana post to every contact of the jack. Note that this > > way there will also be a short across the output posts if the two switches > > are set at the same setting- don't let it fool you if you're spinning the > > knobs doing a resistance check. > > > > On the jack side, I plan to have two 8c jacks wired in parallel and keep a > > mod jumper cable handy. this way I can use it as a feed through and run the > > phone set live while testing. I may add a handset size jack just for > > convenience. 4 conductor line plugs will usually fit fine in an 8c jacks but > > handset plugs tend to wobble too much. > > > > You can use two R/S 275-1385 rotary switches to give you twelve switching > > positions, you only need 8 positions, I'm still trying to figure out > > something fun to do with the other 4 positions (my balanced line tester is > > in a separate box, it was a bit more complicated). > > > > I hope this makes sense > > charles > > > > Charles Patterson > > communications@c... > > Global Communications > > Tarrytown, NY > > http://www.telephonesecurity.com > > > > ----- Original Message ----- > > From: Jay Coote > > To: > > Sent: Wednesday, February 16, 2000 8:36 PM > > Subject: [TSCM-L] 4, 6, 8-conductor phone breakout box ? > > > > > > > > > > From: "Jay Coote" > > > > > > Thanks for reading. > > > > > > I'd like to build a small breakout box with several rotary switches which > > would allow me to to the following: > > > *Quickly plug into a standard 4, or 6 conductor wall jack, or 8-conductor > > wall jack. > > > *Select any wire combinations for TDR, DVM, receiver-analyzer or audio > > amp. > > > *Switch or reverse combinations for balance, resistance and capacitance > > tests. > > > > > > I don't want to shell out a zillion dollars- Can someone give me a table > > of > > > pinouts for female RJ 8-conductor connectors as they correspond to the > > > wiring color code? I may want this black box to have through connections, > > > and it must handle connection to 4, 6 and 8-wire phones. > > > > > > Has anyone already built one of these who would care to discuss or share a > > schematic? > > > > > > (Please excuse the missing or wrong date on my email... it is a Micro$oft > > problem and will > > > be resolved when I get a real computer and a real browser) > > > > > > Jay Coote, W6CJ > > > Licensed Private Investigator -TSCM specialist > > > Los Angeles > > > > > > > > > --------------------------- ONElist Sponsor ---------------------------- > > > > > > Get what you deserve with NextCard Visa. Rates as low as 2.9 percent > > > Intro or 9.9 percent Fixed APR, online balance transfers, Rewards > > > Points, no hidden fees, and much more. Get NextCard today and get the > > > credit you deserve. Apply now. Get your NextCard Visa at > > > Click > > Here > > > > > > ------------------------------------------------------------------------ > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > > > > --------------------------- ONElist Sponsor ---------------------------- > > > > Get what you deserve with NextCard Visa. Rates as low as 2.9 percent > > Intro or 9.9 percent Fixed APR, online balance transfers, Rewards > > Points, no hidden fees, and much more. Get NextCard today and get the > > credit you deserve. Apply now. Get your NextCard Visa at > > Click Here > > > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > --------------------------- ONElist Sponsor ---------------------------- > > GET A NEXTCARD VISA, in 30 seconds. Get rates as low as 0.0 percent > Intro or 9.9 percent Fixed APR and no hidden fees. Apply NOW. > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS From: mooty Date: Wed Feb 2, 2005 6:36am Subject: Re: "Sound of Voices" ?????? O there out there...one must know where to find "them" Wes Mooty 501-247-6405 ----- Original Message ----- From: "A Grudko" To: Sent: Wednesday, February 02, 2005 6:21 AM Subject: RE: [TSCM-L] "Sound of Voices" ?????? > > > -----Original Message----- > From: LD C [mailto:ldc_esq@l...] > > Where does one find a remote "DNA Tracker"? > > I don't think there is such an item yet, except at the top of the > 'Technology Wish-List' of all the usual 3 letter agencies > > A Grudko > > > ---------- > > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.8.4 - Release Date: 2005/02/01 > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 10892 From: Tim Johnson Date: Wed Feb 2, 2005 7:15am Subject: Re: opto interceptor Dave, I wish to beg your pardon. Nothing that serves the purpose of expediting a sweep is a toy. You have to make use of everything you have available when doing a sweep. Your toy may be the only thing that picks up a signal if your prime equipment happens to be placed in a location that just happens to be a "dead" spot for the signal generated by a covert transmitter. Tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10893 From: taylortscm@y... Date: Wed Feb 2, 2005 11:35am Subject: Re: opto interceptor david: opto/interceptor is a nice little unit when connected to opto aps104 will give surprising results. dan taylor group delta wrote: hello to the group a friend of mine give me an optoelectronics interceptor to play with it during a sweep i was surprise about the possibilities not so bad to have a fast view of the spectrum this device is able to lock on the strongest signal between 30mhz to 2 ghz the audio is very good also but of course it is just a toy , not a professionnal model to sweep david from paris ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? Yahoo! Search presents - Jib Jab's 'Second Term' [Non-text portions of this message have been removed] 10894 From: kondrak Date: Wed Feb 2, 2005 11:36am Subject: Re: opto interceptor Couldn't agree more....ANY thing that serves a purpose is a tool. Its just some tools have more utility than others... At 08:15 2/2/2005, you wrote: >Dave, I wish to beg your pardon. Nothing that serves the purpose of >expediting a sweep is a toy. You have to make use of everything you >have available when doing a sweep. Your toy may be the only thing >that picks up a signal if your prime equipment happens to be placed >in a location that just happens to be a "dead" spot for the signal >generated by a covert transmitter. > >Tim >-- > >Tim Johnson > >Technical Security Consultants Inc. >PO Box 1295 >Carrollton, GA 30112 >770-836-4898 >770-712-2164 Cell > >What you say in private is your business. Keeping it private is ours. > >Georgia License # PDC 002074 Technical Security Consultants Inc. >Member INTELNET > Espionage Research Institute > Association of Former Office of Special Investigations >Special Agents-Technical Agent >http://www.dbugman.com > >This e-mail is intended for the use of the addressee(s) only and may >contain privileged confidential, or proprietary information that is >exempt from disclosure under law. If you have received this message >in error, please inform us promptly by reply e-mail, then delete the >e-mail and destroy any printed copy. > >Neither this information block, the typed name of the sender, or >anything else in this message is intended to constitute an electronic >signature for purposes of the Uniform Electronic Transactions Act or >the Electronic Signatures in Global and National Commerce Act >(E-Sign) unless a specific statement to the contrary is included in >this message. > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10895 From: James M. Atkinson Date: Wed Feb 2, 2005 0:15pm Subject: Re: "Breaking-In" to technical security One very good way to "cut your teeth" is to work for a company that runs cables in buildings, installs phone system, and data networks for 2-3 years. You need to rull several hundred thousand feet of cables yourself, program thousands of phones, and be able to eat, drink, and sleep data networks on the physical layer. You must be comfortable on a ladder, and know the difference between Plenum, Riser, and PVC jacketed cable, be able to punch 66, bix, 110, or related blocks, and now how to fire stop a cable. It is also important to learn how to lay up screw studs and how to stud-up a wall, how to properly hang rock, and how to how to sling drywall mug. You will also need to learn which side of a batt of insulation goes which way, and why the grain on a ceiling tile is so important. Big plus is you can work with the brotherhood (IBEW) and learn to wire a breaker panel, cut romex, and how to properly wire a dimmer switch or fluorescent light in a board room. Extra points if you learn to lay down carpet, and hone your painting and wallpaper hanging skills. After that work for a large multi-billion dollar company for 3-4 years maintaining their data and telecom systems and immersing yourself in the day-to-day problems and issues that corporate telcom folk deal with on a regular basis. Notice that I have not said anything about working in the security department, or working with a PI to learn TSCM. Start with an extremely strong technical background, fill in strong tradesmen skills, and get some exposure to corporate communications systems. A hard core TSCM professional spends more time at Home Depot, Graybar, and Lowes then that do the local SpyShop, Ham Radio Store, Computer Outlet, or Radio Shack. Often a good ladder and flashlight will reveal a bug or security problem that TSCM equipment will not detect... but if you do not know what to expect in a plenum or wall cavity then you will not know when something does not belong. Break into the construction and technical trades before you try to break into the TSCM business. -jma At 04:11 AM 2/1/2005, ratlater69 wrote: >So I've been thinking for a while about how one would "break in" to >the technical security business, with little or no directly relevant >experience. The obvious answer is military service, which is where I >suspect a substantial number of people "cut their teeth"; is this >consistent with the perception of most people, or do you expect to see >new people coming from the private sector? > > I personally have a fairly strong background in computer & network >security and physics, with a decent understanding of basic >electronics, and have always been interested in technical security but >have never quite been able to push through. I'm under the impression >that most people in the techsec sector share at least some of these >qualifications, though I'm unsure if that is completely accurate. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10896 From: James M. Atkinson Date: Wed Feb 2, 2005 0:21pm Subject: Sweep Needed in Granada Hills, CA If anybody on the list is interesting in doing a residential sweep in Granada Hills, California 91344 please let me know via a private message. The house is less than 3000 sq ft. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10897 From: A Grudko Date: Wed Feb 2, 2005 2:13pm Subject: RE: "Breaking-In" to technical security -----Original Message----- From: joe joe [mailto:wiggyyy2000@y...] > PIs.. business is to investigate things like whos' cheating on who or nanny's which is where most of their business comes from, Dear joe joe wiggyyy2000 What do you base this assessment of PI's business on? " I say this because as I am sure you know many PI's pretend to do the work(mostly with sub standard equipment) and then place their own bugs to make themselves look better.." Is there a study this is based on? Some verifiable facts please. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.4 - Release Date: 2005/02/01 [Non-text portions of this message have been removed] 10898 From: savanted1© Date: Wed Feb 2, 2005 1:41pm Subject: TSCM News Identity Theft, Net Scams Rose in '04-FTC According to figures released February 1, 2005 by the UK Office of Fair Trading (OFT), British consumers lose an estimated £1 billion per year on scams. The OFT has launched a month-long campaign warning consumers about the most common scams and educating them on how to protect themselves. One of the most common scams is so-called 419 Nigerian fraud, where consumers receive an e-mail seeking upfront cash to aid in releasing large amounts of cash, which the will be split with the victim. Christine Wade, director of consumer regulation enforcement at the OFT, said scammers are resourceful, enterprising, and manipulative, and damage legitimate businesses by using the same marketing routes. http://www.theregister.co.uk/2005/02/01/oft_targets_scammers ===================================================================== Phishing morphs into pharming A new form of Internet fraud, called pharming, is potentially more dangerous than phishing because it does not require users to respond to spam. The new form of attacks can also be executed over a broader front, possibly misdirecting all e-mail and web traffic away from its victims. Gerhard Eschelbeck, chief technology officer at security firm Qualys, says the recent ISP hijacking of Panix typifies the type of threat that may develop, and pharming is considered by some experts the next-generation version of phishing. Pharming is actually a new exploitation of existing browser vulnerabilities and loopholes, and could be addressed by improved browser security. http://www.theregister.co.uk/2005/01/31/pharming Savanted1Æ Mr. Garrett Hord __|__ -@--@--(_)--@--X-- savanted1@y... savanted1@h... savanted1@n... Group home page: http://groups.yahoo.com/group/TICSAStudy Group email address: TICSAStudy@yahoogroups.com Innovations At The Speed Of A ThoughtÆ You Cannot Do Today's Work With Yesterday's SkillsÆ It Is Wise To Educate A Child Than To Raise An AdultÆ ================================================== This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. --------------------------------- Do you Yahoo!? Yahoo! Search presents - Jib Jab's 'Second Term' [Non-text portions of this message have been removed] 10899 From: Mike Di Feo Date: Wed Feb 2, 2005 1:06pm Subject: RE: "Breaking-In" to technical security Very well said. TSCM is a technical field. Some people relate it to security. However, the sweep phase of it is extremely technical when done correctly. Through my last 10 years in the TSCM field, I have met many so called technicians previously employed for government that did not have a clue. I am sure that we have competent TSCM technicians at government level and I am positive that those technicians are highly trained electronic experts. Therefore, James is correct you must first learn the equipment, the tools to repair the equipment and place yourself in a situation where you can put to practice the theory. Just remember theory knowledge with out putting it to use is useless and practical experience without theory knowledge is also useless and sometimes dangerous. My background is commercial and non-government. However, I can use any spectrum analyzer, cellular diagnostic unit, scopes, DVM's and any other type equipment that may be needed to repair cellular phone two way radios and many more electronic components. Furthermore, I ran my own repair shop for 23 years. If you can accomplish that then TSCM is almost another repair application. Good luck in your endeavors. Mike Di Feo at Walsh Associate -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Wednesday, February 02, 2005 10:15 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] "Breaking-In" to technical security One very good way to "cut your teeth" is to work for a company that runs cables in buildings, installs phone system, and data networks for 2-3 years. You need to rull several hundred thousand feet of cables yourself, program thousands of phones, and be able to eat, drink, and sleep data networks on the physical layer. You must be comfortable on a ladder, and know the difference between Plenum, Riser, and PVC jacketed cable, be able to punch 66, bix, 110, or related blocks, and now how to fire stop a cable. It is also important to learn how to lay up screw studs and how to stud-up a wall, how to properly hang rock, and how to how to sling drywall mug. You will also need to learn which side of a batt of insulation goes which way, and why the grain on a ceiling tile is so important. Big plus is you can work with the brotherhood (IBEW) and learn to wire a breaker panel, cut romex, and how to properly wire a dimmer switch or fluorescent light in a board room. Extra points if you learn to lay down carpet, and hone your painting and wallpaper hanging skills. After that work for a large multi-billion dollar company for 3-4 years maintaining their data and telecom systems and immersing yourself in the day-to-day problems and issues that corporate telcom folk deal with on a regular basis. Notice that I have not said anything about working in the security department, or working with a PI to learn TSCM. Start with an extremely strong technical background, fill in strong tradesmen skills, and get some exposure to corporate communications systems. A hard core TSCM professional spends more time at Home Depot, Graybar, and Lowes then that do the local SpyShop, Ham Radio Store, Computer Outlet, or Radio Shack. Often a good ladder and flashlight will reveal a bug or security problem that TSCM equipment will not detect... but if you do not know what to expect in a plenum or wall cavity then you will not know when something does not belong. Break into the construction and technical trades before you try to break into the TSCM business. -jma At 04:11 AM 2/1/2005, ratlater69 wrote: >So I've been thinking for a while about how one would "break in" to >the technical security business, with little or no directly relevant >experience. The obvious answer is military service, which is where I >suspect a substantial number of people "cut their teeth"; is this >consistent with the perception of most people, or do you expect to see >new people coming from the private sector? > > I personally have a fairly strong background in computer & network >security and physics, with a decent understanding of basic >electronics, and have always been interested in technical security but >have never quite been able to push through. I'm under the impression >that most people in the techsec sector share at least some of these >qualifications, though I'm unsure if that is completely accurate. ---------------------------------------------------------------------------- ------------------------ We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------ James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------ World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links *To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ *To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com *Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10900 From: Jeremy Funk Date: Wed Feb 2, 2005 1:52pm Subject: RE: "Breaking-In" to technical security A quick comment here- I have found my experience in construction, cable running and network design invaluable in opening doors. These qualifications give you a real edge on the nickel-plated EEs running around out there. Don't get me wrong, you need the education, (working on more myself) but do what I did and get through school by slinging cable and building boxes. It's amazing how much it helps you "out there". My two cents. -Jeremy Funk -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Wednesday, February 02, 2005 1:15 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] "Breaking-In" to technical security One very good way to "cut your teeth" is to work for a company that runs cables in buildings, installs phone system, and data networks for 2-3 years. You need to rull several hundred thousand feet of cables yourself, program thousands of phones, and be able to eat, drink, and sleep data networks on the physical layer. You must be comfortable on a ladder, and know the difference between Plenum, Riser, and PVC jacketed cable, be able to punch 66, bix, 110, or related blocks, and now how to fire stop a cable. It is also important to learn how to lay up screw studs and how to stud-up a wall, how to properly hang rock, and how to how to sling drywall mug. You will also need to learn which side of a batt of insulation goes which way, and why the grain on a ceiling tile is so important. Big plus is you can work with the brotherhood (IBEW) and learn to wire a breaker panel, cut romex, and how to properly wire a dimmer switch or fluorescent light in a board room. Extra points if you learn to lay down carpet, and hone your painting and wallpaper hanging skills. After that work for a large multi-billion dollar company for 3-4 years maintaining their data and telecom systems and immersing yourself in the day-to-day problems and issues that corporate telcom folk deal with on a regular basis. Notice that I have not said anything about working in the security department, or working with a PI to learn TSCM. Start with an extremely strong technical background, fill in strong tradesmen skills, and get some exposure to corporate communications systems. A hard core TSCM professional spends more time at Home Depot, Graybar, and Lowes then that do the local SpyShop, Ham Radio Store, Computer Outlet, or Radio Shack. Often a good ladder and flashlight will reveal a bug or security problem that TSCM equipment will not detect... but if you do not know what to expect in a plenum or wall cavity then you will not know when something does not belong. Break into the construction and technical trades before you try to break into the TSCM business. -jma At 04:11 AM 2/1/2005, ratlater69 wrote: >So I've been thinking for a while about how one would "break in" to >the technical security business, with little or no directly relevant >experience. The obvious answer is military service, which is where I >suspect a substantial number of people "cut their teeth"; is this >consistent with the perception of most people, or do you expect to see >new people coming from the private sector? > > I personally have a fairly strong background in computer & network >security and physics, with a decent understanding of basic >electronics, and have always been interested in technical security but >have never quite been able to push through. I'm under the impression >that most people in the techsec sector share at least some of these >qualifications, though I'm unsure if that is completely accurate. -------------------------------------------------------------------------- -------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. -------------------------------------------------------------------------- -------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com -------------------------------------------------------------------------- -------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -------------------------------------------------------------------------- -------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links [Non-text portions of this message have been removed] 10901 From: wiggyyy2000 Date: Wed Feb 2, 2005 2:49pm Subject: Re: "Breaking-In" to technical security ok first off go on many PI's websites and the first thing they go on is cheaters or annys..i am sure that is not all they are good for but that is where the majority of money comes from these days...as to the fact of many PI groups using sub standard equipment and they themselves planting their own bugs ,you are asking me to name names and I will NOT do that..it is a known fact that quite a few have that practice and I have personally heard a very reliable person that has been in the tscm feild tell me about a scam concerning a PI --- In TSCM-L@yahoogroups.com, "A Grudko" wrote: > > -----Original Message----- > From: joe joe [mailto:wiggyyy2000@y...] > > > PIs.. business is to investigate things like > whos' cheating on who or nanny's which is where most > of their business comes from, > > Dear joe joe wiggyyy2000 > > What do you base this assessment of PI's business on? > > " I say this because as I am sure you know many PI's > pretend to do the work(mostly with sub standard > equipment) and then place their own bugs to make > themselves look better.." > > Is there a study this is based on? > > Some verifiable facts please. > > Andy Grudko (British), DPM, Grad IS (South Africa) > MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 > www.grudko.com , agrudko@i... > Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > Mid Rand (+27 11) 318 1451 - 318 6846(Fax) > Cellular (+27) 82 778 6355 - ICQ 146498943 > SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. > "When you need it done right - first time" > > > > > > > > ---------- > > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.8.4 - Release Date: 2005/02/01 > > > [Non-text portions of this message have been removed] 10902 From: Tim Johnson Date: Wed Feb 2, 2005 2:31pm Subject: Re: "Breaking-In" to technical security I didn't necessarily mean that you would learn from PI's. But, you do need a place to get started and not many of people who were from the government sector are going to bring you into their fold as they have a "standard set by the private sector" that they have to maintain. As a result, they will typically only consider someone from the government sector as an employee. They at least know what their training was and are able to qualify their qualifications and credibility. Starting off in the private sector.....I'd probably lean more toward trying to get hired into a major corporations security department and then let them know your desires to do TSCM work. I've trained a number of people for a number of private sector organizations over the years. In fact, some of the people trained have gone on in later years and entered the private sector on their own. As for the last part of your comment....it is sad, but true that there are some who prey on paranoia and will "find" devices they have hidden in order to generate repeat business. One that comes to mind is a company located in the southwest U. S. When I lived there, they had a reputation for finding the same type device on about 20 to 25 % of their sweeps. In real life the percentage is 1 to 2 % of the time. Tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10903 From: Tim Johnson Date: Wed Feb 2, 2005 2:39pm Subject: Re: "Breaking-In" to technical security Inj my seminars and presentations I present the following as indicative of the minimum things a TSCM specialist needs to be aware of. And, it isn't learned in the government or private sector schools. Tim What must a TSCM specialist know to properly perform a sweep? Radio and Electronics Investigations Interrogations Locks Alarms Physical Security Systems Analysis Carpentry / Building construction and codes Electricity Telephones Cellular phones Threat assessment Threat evaluation Management and personnel Finance Salesmanship Computers Fax Video and emanations Photography Access Control Etc.. Why? To be able to effectively evaluate an area or facility and to make recommendations to provide the best and most economical means of protecting information and personnel. Performing a sweep is only one aspect of the service a client should receive. -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10904 From: joe joe Date: Wed Feb 2, 2005 4:17pm Subject: Re: "Breaking-In" to technical security yes i agree with you on many of those aspects Tim..:) --- Tim Johnson wrote: > > Inj my seminars and presentations I present the > following as > indicative of the minimum things a TSCM specialist > needs to be aware > of. And, it isn't learned in the government or > private sector schools. > > Tim > > What must a TSCM specialist know to properly perform > a sweep? > > Radio and Electronics > Investigations > Interrogations > Locks > Alarms > Physical Security > Systems Analysis > Carpentry / Building construction and codes > Electricity > Telephones > Cellular phones > Threat assessment > Threat evaluation > Management and personnel > Finance > Salesmanship > Computers > Fax > Video and emanations > Photography > Access Control > Etc.. > > Why? > > To be able to effectively evaluate an area or > facility and to make > recommendations to provide the best and most > economical means of > protecting information and personnel. > > Performing a sweep is only one aspect of the service > a client should receive. > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > MemberINTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > [Non-text portions of this message have been > removed] > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail 10905 From: James M. Atkinson Date: Wed Feb 2, 2005 6:28pm Subject: Department of Homeland Security to unveil new procedures (AP) Washington, D.C. - Department of Homeland Security to unveil new procedures to protect action figures. Tuesday, February 2, 2005. Posted 5:31 PM EST (2231 GMT) In the wake of the kidnapping and threatened beheading by Islamic terrorists of an "action figure" named Cody, the Department of Homeland Security (DHS) has declassified and made public their plans for protecting other action figures and dolls. "What is more American than Barbie and Ken?" said I. Emma Mourahn, a DHS spokesperson. Ms. Mourahn revealed that DHS has already spent over $37 million on the protection of "miniaturized iconic assets" (MIA), including such ideas as the implantation of radio frequency ID chips, "dollometric" identification systems, tracking of plastics suppliers, and registration of all MIA designs with DHS icon specialists. "We are proposing $127 million for universities and other industry partners to research new ways to protect dolls and other miniature representations of America's heroes." When asked how they obtained the $127 million figure, Ms. Mourahn said, "We used Greenwald's First Law: 87.65% of all statistics are made up. It works quite well for us on Capitol Hill." Democratic congressperson Charles Rangle, who recently introduced a bill to create conscription (which was overwhelmingly defeated) said, "Okay, so the Bush administration is worried about Barbie and Ken. Everyone is. But what about African-American dolls? Have they even been considered?" The Reverend Jesse Jackson was not available for comment, but a spokesperson for him said, "Dr. Jackson considers this a very important issue and will soon have a statement about the discrimination in white-dominated society of non-white dolls, which historically have suffered the brunt of all doll hate crime, not to mention outright slavery. It is a travesty that in the twenty-first century dolls can be owned like animals." There was no reply from a PETA spokesperson, except to briefly opposed the exploitation of "animal figurines." President Bush was not available for comment, but a source inside the White House revealed that the president is "thinking about this quite a lot. It is constantly on his mind and not a day goes by when he doesn't not think about this issue. The fate of these dolls might bother him so much that he probably prays almost every day for a peaceful resolution to this problem while sort of balancing the need to protect U.S. civilian dolls from the forces of what might be characterized as evil, and by that he does not mean the Democratic party." Pressed further, the source mentioned a new faith-based initiative dating back to the Clinton administration that will ensure that dolls and other plasticized Americans will have a decent quality of life. "It's not fair to blame all this faith-based stuff on Bush," said the source. "It all started in the Clinton administration you know." Al Jazeera recently broadcast an al Quaida video that said, in part, "We view imperialist dog plastic fiends as legitimate targets for jihad. They have no souls. They are created by Jews exploiting oil stolen from the peaceful Islamic people who are having foul democracy forced upon them against their will by these Zionist pigs. They will die like dogs. Islam is a religion of peace, and we urge all Moslems to play with plastic geometric forms instead of these unholy miniature Zionist oppressor figures." The CIA has stated that they think it is 87.65% probable that the video is really from al Quaida, based upon voice analysis. Meanwhile, the TSA has announced that magnifying glasses will no longer be allowed as carry-on items on airliners. "We all know that a magnifying glass can be used to concentrate the rays of the sun and melt these poor little things in 87.65% of the simulated trials we ran," said a TSA insider on condition of anonymity. "It is important from the standpoint of professional goonery to not allow such potential terror weapons on civilian airplanes. We feel certain passengers will not mind giving up their eyeglasses. Besides, we have a study that shows that 87.65% of the 9/11 terrorists were readers of Tom Clancy novels, so this fits in nicely with our plans to ban reading at airports and on airplanes via confiscating books, newspapers, and pens and pencils. If anyone is bored they can watch or listen to the TSA approved entertainment we are developing in order to glamorize goonery as a career choice." The ACLU has filed suit in a federal court in Alexandria, Virginia to force DHS to reveal their plans, as well as to end all discrimination against the dolls. "It is wrong to even refer to these poor things as 'dolls' or 'action figures,'" said ACLU spokesperson K. Neejerque. "We prefer the term 'miniature-disabled' and we also strongly discourage their exploitation by the toy industry. Frankly, the toy industry should be more responsible and provide better role models than Barbie and Ken, not to mention scary military figures who merely incite violence in 87.65% of children according to a study we are currently making up." The Reverend Pat Robertson expressed his outrage at the ACLU, saying, "I am praying for their filthy atheistic souls since they are going to burn in Hell forever, but Jesus does love them. It is high time they realized that boys shouldn't play with dolls since that is currently the leading cause of boys choosing the homosexuality lifestyle. We are also against women playing with dolls, because it clearly says in the 10 Commandments that graven images are evil. This idolatrous industry must be subjected to a boycott immediately." When asked for an example, Reverend Robertson immediately referenced the 1970's doll, "Gay Bob" and said, "It is wrong to produce and let children play with miniature rubberized homo-replicas. We oppose this liberal pro-homosexual agenda." A press release from the American Medical Association stated, "This is absolutely deplorable on the part of the toy industry. It is well known that we have been trying to increase people's height for over 50 years in an attempt to cure obesity, ever since those height-weight charts you see in every doctor's office came out. Since we now know it is virtually impossible for most people to lose weight and keep it off, it is much better for 87.65% of people to merely increase their height by stretching while they keep their weight constant. But these dolls make being short fashionable, which we consider a contributing factor to a very serious health epidemic among those under 25. By the way, ignore all that stuff we used to say about eating high trans-fat margarine instead of butter, avoiding low-calorie eggs, eating diets high in carbohydrate, and so forth since we've changed out minds yet again. So we say to the terrorists: if you absolute must kill your victims, then do so by shooting or stabbing them since that is more healthy and also since glamorizing beheading provides unrealistic expectations for young people to be short. And don't eat fresh vegetables anymore since they cause tail cancer in genetically engineered mice." There was no immediate comment from the American Mannequin ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10906 From: Thomas Shaddack Date: Wed Feb 2, 2005 6:59pm Subject: 2.4 GHz detector ring http://neil.moon-beam.com/users/kris/index.htm No actual schematics nor microcode. :( Only a photograph. Uses a diode detector, and an Atmel microcontroller with integrated ADC (which detects a voltage raise on the detector output and starts flashing a LED). Very crude, very small. Could be made even smaller, using SMD parts. (A variant on this theme could work as a detector of RFID readers.) They are promising next versions that will identify more details about the access point, but I am skeptical here, as commercial electronics for receiving and analyzing the 802.11x packets themselves is too big for a ring. A bracelet or a wristwatch, maybe... 10907 From: SEAN WALSH Date: Wed Feb 2, 2005 5:30pm Subject: Re: Sweep Needed in Granada Hills, CA I believe Granada Hills is in Southern, CA. I would suggest Rick Hoffman of Microsearch. He is located in Southern, CA. (Spectrum analyzers, lab standard test equipment, training and ethics.) He is located in Cypress, CA. 714-952-3812 Sean J. Walsh, C.P.I., C.C.V. Walsh & Associates (415)899-9660, Fax (415)898-5500 www.tscm.net PI 18345 10908 From: ratlater69 Date: Wed Feb 2, 2005 7:10pm Subject: Re: "Breaking-In" to technical security Interesting to know- this makes alot of sense. Also makes the process seem somewhat more interesting. Thanks for the reply :) --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > One very good way to "cut your teeth" is to work for a company that runs > cables in buildings, installs phone system, and data networks for 2-3 > years. You need to rull several hundred thousand feet of cables yourself, > program thousands of phones, and be able to eat, drink, and sleep data > networks on the physical layer. You must be comfortable on a ladder, and > know the difference between Plenum, Riser, and PVC jacketed cable, be able > to punch 66, bix, 110, or related blocks, and now how to fire stop a cable. > > It is also important to learn how to lay up screw studs and how to stud-up > a wall, how to properly hang rock, and how to how to sling drywall mug. You > will also need to learn which side of a batt of insulation goes which way, > and why the grain on a ceiling tile is so important. Big plus is you can > work with the brotherhood (IBEW) and learn to wire a breaker panel, cut > romex, and how to properly wire a dimmer switch or fluorescent light in a > board room. Extra points if you learn to lay down carpet, and hone your > painting and wallpaper hanging skills. > > After that work for a large multi-billion dollar company for 3-4 years > maintaining their data and telecom systems and immersing yourself in the > day-to-day problems and issues that corporate telcom folk deal with on a > regular basis. > > Notice that I have not said anything about working in the security > department, or working with a PI to learn TSCM. > > Start with an extremely strong technical background, fill in strong > tradesmen skills, and get some exposure to corporate communications systems. > > A hard core TSCM professional spends more time at Home Depot, Graybar, and > Lowes then that do the local SpyShop, Ham Radio Store, Computer Outlet, or > Radio Shack. > > Often a good ladder and flashlight will reveal a bug or security problem > that TSCM equipment will not detect... but if you do not know what to > expect in a plenum or wall cavity then you will not know when something > does not belong. > > Break into the construction and technical trades before you try to break > into the TSCM business. > > -jma > > > > > At 04:11 AM 2/1/2005, ratlater69 wrote: > > >So I've been thinking for a while about how one would "break in" to > >the technical security business, with little or no directly relevant > >experience. The obvious answer is military service, which is where I > >suspect a substantial number of people "cut their teeth"; is this > >consistent with the perception of most people, or do you expect to see > >new people coming from the private sector? > > > > I personally have a fairly strong background in computer & network > >security and physics, with a decent understanding of basic > >electronics, and have always been interested in technical security but > >have never quite been able to push through. I'm under the impression > >that most people in the techsec sector share at least some of these > >qualifications, though I'm unsure if that is completely accurate. > > > ---------------------------------------------------------------------------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- 10909 From: Michael Dever Date: Wed Feb 2, 2005 8:35pm Subject: RF PREAMPLIFIERS Would anyone on the list care to recommend a manufacturer who can supply small battery operated (or battery capable) RF pre-amplifiers for the bands from say 10MHz up to say 6GHz? I want to attach them to or at least carry them with a handheld SA. Thanks in advance. Regards Mike Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 10910 From: mpaulsen6 Date: Wed Feb 2, 2005 11:21pm Subject: hardware logger not a felony for this kid from: http://www.chron.com/cs/CDA/ssistory.mpl/metropolitan/3020344 Feb. 2, 2005, 7:34AM Answers costly for high-tech cheater Teen charged with misdemeanor after his teacher's computer is rigged By ROBERT CROWE Copyright 2005 Houston Chronicle A high school student flunked out in his scheme to steal test answers by plugging high-tech equipment into a teacher's computer, Fort Bend school officials said Tuesday. ADVERTISEMENT The 16-year-old sophomore at Clements High in Sugar Land was charged with a misdemeanor that could bring jail time and a stiff fine, authorities said. The boy admitted rigging a keystroke-recording device onto the computer after Fort Bend Independent School District police confronted him, said district spokeswoman Mary Ann Simpson. She said the scheme was uncovered after authorities learned that the boy had attempted to sell the answers. The device was installed for four days in the middle of November, He installed it when the teacher was not looking. Simpson said. In mid-December, school district police received a tip from students that the boy was trying to sell answers to final exams. "He was cooperative and admitted he had done this," Simpson said, adding that police confiscated the device, which plugged into a keyboard port in the back of a computer tower. Simpson said she did not know the subject of the class in which the device was used. Campus police referred the case to the Fort Bend County District Attorney's Office, which has charged the teen with breach of computer information, a Class B misdemeanor punishable by a fine of up to $2,000 and up to 180 days in jail. The student will spend the rest of the school year at an alternative campus. Had he been charged with a felony, he probably would have been expelled, Simpson said. The student was able to find test answers after he took the device off the teacher's computer, then plugged it into his own machine to search for key words, authorities said. Fort Bend ISD police sent out e-mails warning campus administrators and other school districts to beware of such schemes. "We want teachers to be familiar with what's hooked up to their computers," Simpson said. "Be aware that this could be done." Keystroke detectors, also called loggers, come in a variety of shapes and forms. The Fort Bend student used a device, about the size of a pen cap, that plugs into a keyboard cable, then into a computer keyboard port. The devices sell on the Internet for $70 to $150. robert.crowe@c... 10911 From: satcommunitfive Date: Thu Feb 3, 2005 0:12am Subject: Re: opto interceptor I have most of the opto gear and they are only really good for narrowband stuff, and really need an antenna to suit what freq your looking for. most 2.4Ghz video senders are invisible to them great for grabbing comms freqs at shows etc tho ! my 2c --- In TSCM-L@yahoogroups.com, kondrak wrote: > Couldn't agree more....ANY thing that serves a purpose is a tool. Its just > some tools have more utility than others... > > At 08:15 2/2/2005, you wrote: > > > >Dave, I wish to beg your pardon. Nothing that serves the purpose of > >expediting a sweep is a toy. You have to make use of everything you > >have available when doing a sweep. Your toy may be the only thing > >that picks up a signal if your prime equipment happens to be placed > >in a location that just happens to be a "dead" spot for the signal > >generated by a covert transmitter. > > > >Tim > >-- > > > >Tim Johnson > > > >Technical Security Consultants Inc. > >PO Box 1295 > >Carrollton, GA 30112 > >770-836-4898 > >770-712-2164 Cell > > > >What you say in private is your business. Keeping it private is ours. > > > >Georgia License # PDC 002074 Technical Security Consultants Inc. > >Member INTELNET > > Espionage Research Institute > > Association of Former Office of Special Investigations > >Special Agents-Technical Agent > >http://www.dbugman.com > > > >This e-mail is intended for the use of the addressee(s) only and may > >contain privileged confidential, or proprietary information that is > >exempt from disclosure under law. If you have received this message > >in error, please inform us promptly by reply e-mail, then delete the > >e-mail and destroy any printed copy. > > > >Neither this information block, the typed name of the sender, or > >anything else in this message is intended to constitute an electronic > >signature for purposes of the Uniform Electronic Transactions Act or > >the Electronic Signatures in Global and National Commerce Act > >(E-Sign) unless a specific statement to the contrary is included in > >this message. > > > > > >[Non-text portions of this message have been removed] > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > 10912 From: Michael Puchol Date: Thu Feb 3, 2005 2:06am Subject: Re: RF PREAMPLIFIERS Hi Michael, I've had good experiences with Down East Microwave (http://www.downeastmicrowave.com) who made a few preamps with external power feed (you can also get them coax fed) to my specs. Best regards, Mike Michael Dever wrote: > Would anyone on the list care to recommend a manufacturer who can > supply small battery operated (or battery capable) RF pre-amplifiers > for the bands from say 10MHz up to say 6GHz? > > I want to attach them to or at least carry them with a handheld SA. > > Thanks in advance. > > Regards > Mike > > Michael J. Dever CPP > Dever Clark & Associates > GPO Box 1163 > Canberra ACT 2601 > Australia > Voice: +612 6254 5337 > Email: dca@b... > ************************************************************************ > ***** > This message is sent in strict confidence for the addressee only. > It may contain legally privileged information. The contents are not to > be disclosed to anyone other than the addressee. Unauthorised > recipients are requested to preserve this confidentiality and to advise > the sender immediately of any error in transmission. > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > 10913 From: Date: Thu Feb 3, 2005 0:11am Subject: Re: RF PREAMPLIFIERS In a message dated 03/02/2005 02:38:32 GMT Standard Time, dca@b... writes: Would anyone on the list care to recommend a manufacturer who can supply small battery operated (or battery capable) RF pre-amplifiers for the bands from say 10MHz up to say 6GHz? I want to attach them to or at least carry them with a handheld SA. Thanks in advance. Regards Mike Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] ------------------------ Yahoo! Groups Sponsor --------------------~--> What would our lives be like without music, dance, and theater? Donate or volunteer in the arts today at Network for Good! _Click Here!_ (http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links Mike a few years back I had the same requirement.I eventually built my own using a fairly easily obtainable chip from Mini-Circuits a US company,but available in surface mount only so you would need a steady hand with the soldering iron.My needs were up to 6 Ghz but was able to settle for 3Ghz for this particular application.The final product by necessity utilised double sided copper board and and with all the grounding and bonding was a bit of a work of art it worked well and was rated kHz to 1 Gig with a 24 db gain [usable to 3 gig].If you want to build your own I am sure I can dig out all the details. Meanwhile a number of companies supply them ready made I noticed an Anritsu model on ebay recently and Watson make a fairly limited device to 1.2Ghz Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) [Non-text portions of this message have been removed] 10914 From: contranl Date: Thu Feb 3, 2005 7:50am Subject: Re: RF PREAMPLIFIERS . I also recommend Minicircuits http://www.minicircuits.com/ represented in Australia by: http://www.clarke.com.au/ They have all the right parts to make such filters lowpass,highpass,when combined they become bandpass or bandblocks. If you dont use additional amplifiers you may have a loss of 1~3dB's in the wanted range but without the need for power supply. One of the advantages of using filters at the input of receivers is that you could apply some extra amplification without overloading that receiver. so you may consider using some extra amplification. Minicircuits have some very tiny amplifiers they are what they call "unconditionally stable" wich means that they are not to sensitive to hobby-style manufacturing ...you don't need very complicated calculations or special equipment to make for example a 3 Ghz amplifier. Have a look at their very tiny amps (MAR/ERA)...all battery operatable. (3/5/7 Volts) Best of all they are VERY cheap. A good idea would be to have a universal filter-bank-box housing various filters for different frequencies. with the help of switches or small cables you could configure such a box to filter or block those ranges that you want. (allthough above 2 ghz it would be better to have separate filters) I have made some of these filter-boxes and could make more on demand. Tetrascanner 10915 From: nunimeyer Date: Thu Feb 3, 2005 9:53am Subject: oscor opc software....ughhhhh!! Ok guys I have kept my mouth shut about this for a while now and I just have to tell people the real deal about this. The sw is basically a database for keeping signals and traces you have collected on previous sweeps( when it doesn't crash your pc and lose everything anyway!)...thats where it ends!!! Don't believe their hype about the sw can do this and that..IT can NOT!..one thing it will do is crash your pc a few times and you gotta uninstall and reinstall it a few times,lol.. I am sure I am not the only one who feels this way about it, but I guess I am the first one to openly say it. When you prompt the sw to show diff between peak and freindly the sw just shows a blank screen about 7 out of 10 times..real reason is because the sw has major bugs..but if you call REI they will say its the pc's fault..hmm whatever you say..from what I hear the sw has bugs on their pc's as well so it basically boils down to REI shipping something that totally doesn't work...hey guys wake up and fix the problem!..BOTTOM LINE REI IS A GOOD COMPANY WITH SOME GOOD PRODUCTS BUT THEY DROPPED THE BALL ON THE OPC SW. 10916 From: Tim Johnson Date: Thu Feb 3, 2005 7:59am Subject: iPods and Ilisten Aren't those iPod's by Apple just about the neatest thing that's come along in years. Anywhere from 4 to multi bunch of gig of memory for storing thousands and thousands of your favorite tunes. It would take you from now till way past then to listen to all of them, even if you did nothing but listen full time, were you to max it out with tunes. I, personally, don't think I have thousands of favorite tunes, but how would I know unless I listened. Something that MIGHT be worth listening to would be what goes on in places I'm not normally privy to, such as rest rooms, break rooms, locker rooms, board rooms, offices, conference rooms or anywhere else I can't get to whenever i want to be there. How would I do that???? I'd probably buy an iPod and the ITalk attachment (for $39.95) and do the hide thingy. That would give you thousands of hours of conversation. They're small and powerful (and getting smaller and more powerful). Almost everyone has them. They're not questioned like cell phones, cameras and audio recorders are (after all, they are just playback units for music, aren't they?). You see them in offices, attached to speakers so that the occupant can listen, and listen, and listen while he/she works (I haven't seen them in meeting or board rooms yet, but it is just a matter of time before they replace the CD player that is already there. So, the next time you see one, think about where it is going or where it has been. Did I mention that with PodLock by Micromat, Inc. you can even create a secret drive that keeps sensitive data (surreptitious recordings, maybe?) away from prying eyes. And it is all right out in plain view. Just lay it on a desk or table, along with the headphones and almost no one is going to question it. Just something to think about. Tim Apologies for any cross postings. -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. 10917 From: contranl Date: Thu Feb 3, 2005 11:31am Subject: Elektor this month features lots of wireless stuff. . Elektor (magazine) this month is a special on wireless they have articles on: RFID-detector, a complete circuit with discription how to build it,this one works on the most popular freq of 13.56 mhz Transmitter-modules that don't need batteries but use electricity from piezo-crystals or solar-panels. A (simple) frequency-spectrum chart with some details on who and what is where. Wireless connectivity (ism.wlan.wman.bluetooth etc) Construct a dipole antenna for DVBT (digital video at 800 mhz) Construct a wireless mic /module at ISM-band frequencies (860 mhz) Vhf antenna-amplifier (FM-broadcast band) Wifi-detectors (thos keyhangers that will detect 2.4 ghz data sigs) Not very shocking but not bad either ...for one if the biggest electronics magazines in the world ...never have they paid so much attention to wireless, i hope they will continue like this. Tetrascanner 10918 From: joe joe Date: Thu Feb 3, 2005 11:33am Subject: Re: oscor opc software....ughhhhh!! very well said, rei come on dudes fix your stuff, you guys have made some fine products so continue on --- nunimeyer wrote: > > > Ok guys I have kept my mouth shut about this for a > while now and I > just have to tell people the real deal about this. > The sw is > basically a database for keeping signals and traces > you have > collected on previous sweeps( when it doesn't crash > your pc and lose > everything anyway!)...thats where it ends!!! Don't > believe their > hype about the sw can do this and that..IT can > NOT!..one thing it > will do is crash your pc a few times and you gotta > uninstall and > reinstall it a few times,lol.. I am sure I am not > the only one who > feels this way about it, but I guess I am the first > one to openly > say it. When you prompt the sw to show diff between > peak and > freindly the sw just shows a blank screen about 7 > out of 10 > times..real reason is because the sw has major > bugs..but if you call > REI they will say its the pc's fault..hmm whatever > you say..from > what I hear the sw has bugs on their pc's as well so > it basically > boils down to REI shipping something that totally > doesn't work...hey > guys wake up and fix the problem!..BOTTOM LINE REI > IS A GOOD COMPANY > WITH SOME GOOD PRODUCTS BUT THEY DROPPED THE BALL ON > THE OPC SW. > > > > > > > __________________________________ Do you Yahoo!? The all-new My Yahoo! - What will yours do? http://my.yahoo.com 10919 From: Tim Johnson Date: Thu Feb 3, 2005 11:23am Subject: Bugging This is a one time post to all my lists, etc as there is some pretty interesting information pertaining to eavesdropping. If you'd like to be on the list permanently, let me know. Kiwi computer spy-gear may be used by Australian police Stuff.co.nz - New Zealand ... Australia has made changes to state and federal laws expanding covert police surveillance, particularly computer and electronic eavesdropping. ... Ex-FX Exec Sentenced in Wiretapping Case Multichannel News (subscription) - New York,NY,USA Former Fox Cable Networks Group publicity executive Randolph Steven Webster has been sentenced to three years of probation and ordered to pay $22,607 in ... Ex-Sonera CEO charged with bugging phones: report Investor's Business Daily (subscription) - USA By Madeleine Acey. LONDON (CBS.MW) - The former chief executive of Finnish telecoms carrier Sonera is to be charged with illegally ... House ethics panel to probe complaint about McDermott Seattle Times - Seattle,WA,USA ... against McDermott. Boehner sued McDermott, charging that the eight-term lawmaker had violated state and federal wiretapping laws. In ... Ambrosia's new WireTap Pro records any audio on a Mac Graphic Exchange News - Toronto,ON,Canada WireTap Pro, which features a simple, appliance-like user interface, allows users to record audio from any running application, as well as from any microphone ... Wire Tap, Ambrosia for sound Macworld UK - UK By Macworld staff. Ambrosia Software has released WireTap Pro, a well-featured solution that lets Mac users record audio from almost any source. ... Snoop Mommy is proud to spy on her kids Fort Worth Star Telegram (subscription) - Fort Worth,TX,USA ... And in this era where lax parenting is a common complaint, how can a parent govern a child when wiretap laws reign supreme and a court's reach creeps into the ... Mom's eavesdropping violated Privacy Act, state Supreme Court ... Seattle Times - Seattle,WA,USA The state Supreme Court has ruled that the Privacy Act prohibits a parent from eavesdropping on a child's phone conversations. The ... Sen. Roach seeks to shield parents from privacy rule King County Journal Newspapers - King County,WA,USA ... The ACLU is considering submitting legislation of its own, Hoenig said, ``to make clear parents shouldn't get in trouble for eavesdropping.''. ... Michigan wi-fi hacker jailed for nine years The Register - London,England,UK ... they modified a proprietary piece of software called "tcpcredit" that Lowe's uses to process credit card transactions, building in a virtual wiretap that would ... Families are easy prey for internet snoopers Telegraph.co.uk - London,England,UK ... Some families are so vulnerable to electronic eavesdropping that anyone parked in the street could read every e-mail sent or received. ... New bugging device found in UN offices CBC News - Canada The "sophisticated" bugging device, which experts believe was made in Russia or Eastern Europe about three or four years ago, was planted in a room next to a ... United Nations failed to find who planted listening device KTRE - Lufkin,TX,USA ... could've been overheard. They say top officials have security that includes electromagnetic waves to thwart eavesdropping systems. Mitterrand's phone bugging trial begins Washington Times - Washington,DC,USA Paris, France, Nov. 15 (UPI) -- France focused Monday on the opening of a trial of 12 of the late President Francois Mitterand's aides for phone-tapping. ... Man sues county over jail eavesdropping on talks with lawyer Access North Georgia - Gainesville,GA,USA ... filed suit Thursday against Athens-Clarke County and several county officials, claiming his constitutional rights were violated by eavesdropping on jailhouse ... Printed ads defend Kroll Miami Herald (subscription) - Miami,FL,USA ... Police investigating Kroll seized computers, documents and electronic eavesdropping equipment in five cities in raids they named ''Operation Jackal.'' Five ... -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10920 From: Date: Thu Feb 3, 2005 2:40pm Subject: Re: oscor opc software....ughhhhh!! Genlemen, It seems to me that OSCOR software was developed for Windows 3.0 and was never redesigned since then. Apart from software some other features either do not work as claimed or useleless in today¥s environment, e.g. AM video reception. Who ever saw a surveillance video running AM last 20 years? OSCOR cannot FM (I tried myself). Probably it was not a bad system for the 80s albeit not better than swiss made 1974 model XY-Mini-Spy-Detector (bench made but 100% based on top quality CEI and Watkins Johnson modules this system also used AF correlation method BEFORE REI revolutionary reinvented it). But irony is that for all practical purposes there is no competition to OSCOR today. A professional TSCM specialist does not need OSCOR: even a cheap hobby class receiver and an analog spectrum analyzer will help much more. But there a maybe a few professionals in this business, overwhelming majority are PIs (best case) or amateurs. Look at theit "credentials" on their websites: their "education" is limited to some 2hours to 2days course or apprenticeship. Some of them have B.Sc or evem M.Sc but not in Electronics or related fiels. They need OSCOR. And for this purpose it is good enough. And be I on REI board I would hesitate with redesign of the system: it could be a zero return investment. Regards, A.W. joe joe wrote: > > >very well said, rei come on dudes fix your stuff, you >guys have made some fine products so continue on >--- nunimeyer wrote: > >> >> >> Ok guys I have kept my mouth shut about this for a >> while now and I >> just have to tell people the real deal about this. >> The sw is >> basically a database for keeping signals and traces >> you have >> collected on previous sweeps( when it doesn't crash >> your pc and lose >> everything anyway!)...thats where it ends!!! Don't >> believe their >> hype about the sw can do this and that..IT can >> NOT!..one thing it >> will do is crash your pc a few times and you gotta >> uninstall and >> reinstall it a few times,lol.. I am sure I am not >> the only one who >> feels this way about it, but I guess I am the first >> one to openly >> say it. When you prompt the sw to show diff between >> peak and >> freindly the sw just shows a blank screen about 7 >> out of 10 >> times..real reason is because the sw has major >> bugs..but if you call >> REI they will say its the pc's fault..hmm whatever >> you say..from >> what I hear the sw has bugs on their pc's as well so >> it basically >> boils down to REI shipping something that totally >> doesn't work...hey >> guys wake up and fix the problem!..BOTTOM LINE REI >> IS A GOOD COMPANY >> WITH SOME GOOD PRODUCTS BUT THEY DROPPED THE BALL ON >> THE OPC SW. >> >> >> >> >> >> >> > > > > >__________________________________ >Do you Yahoo!? >The all-new My Yahoo! - What will yours do? >http://my.yahoo.com > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > __________________________________________________________________ Switch to Netscape Internet Service. As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register Netscape. Just the Net You Need. New! Netscape Toolbar for Internet Explorer Search from anywhere on the Web and block those annoying pop-ups. Download now at http://channels.netscape.com/ns/search/install.jsp From: Tim Johnson Date: Thu Feb 3, 2005 8:27pm Subject: Job announcement TSCM/Physical Security I was asked to give this broad dissemination. If you know of someone who fits the qualifications, please pass it on. thanks, Tim Tim, Just wanted to advise you and your group of a USAJOBS announcement out for TSCM (Physical Security types). The positions (2) are located in Arlington ,VA for DEA. The jobs are a good mix of tech, physical security design, and project management among other things. Worldwide mission and 7-10 days month travel required. The positions are Physical Security Specailist, 0080-GS 13/14 and are located on http://jobsearch.usajobs.opm.gov/jobsearch.asp?q=TSCM&lid=&jbf571=&salmin=&salmax=&paygrademin=&paygrademax=&FedEmp=Y&sort=rv&vw=d&brd=3876&ss=0&FedPub=Y&SUBMIT1.x=80&SUBMIT1.y=18 They close on 02/16/2005. I would very much appreciate if you would pass this item along to your readers. They are a very talented bunch whom we may be interested in hiring. Thanks alot Tim, Good Luck. Mike Doherty, Acting Unit Chief, DEA Security Programs -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. 10922 From: Thomas Jones Date: Fri Feb 4, 2005 9:26am Subject: REI comments on OPC Software Gentleman, Before I discuss the issues, I want to apologize for any frustrations that customers may have experienced using OPC 5.0 BETA. The situation is this, the new 5.0 OPC software was developed with the main goal of providing a new methodology using trace analysis to better address sophisticated transmitters such as Burst and Hoppers. This required many changes to both hardware and software, but to summarize: 1. Increasing communication bandwidth to allow 120,000 data points of trace data to be almost transparently transferred to the PC for trace analysis. (Previous versions transferred 256 data points through a serial port and only displayed resolution equivalent the OSCOR display.) 2. Completely new development of software methodology and graphics displays to address this new data. 3. Significantly decreasing OSCOR sweep time to address time varying threats. This resulted in a completely new re-write of the OPC software. In our excitement to get these new capabilities out, as a company we made a large mistake in releasing this software as a BETA version. But the biggest mistake is that we released it too early in the BETA process. Again, we are sorry for any customers that have been frustrated by this mistake. However, to make the assumption that this is the end of the story is completely wrong. I don't know who nunimeyer@y... is, and I can only apologize that you saw a very early version. We have been working diligently to fix the early bugs and have already added valuable additional features recommended by our customers. We have already released the production version of the software, and we will be releasing an update to our production version in two weeks. Furthermore, on the comments posted by "Tensor66B@n...". The modern OPC 5.0 is developed for all modern PC operating systems. The Modern OSCOR can certainly demodulate FM video. The very first version of OSCOR with video demodulation only did standard NTSC, PAL, and SECAM. However, this was replaced years ago with an upgraded video TFT monitor and demodulation circuitry that allows control of video AM or FM, Positive or Negative synch pulse, and of course NTSC, PAL, and SECAM format. The final point, is that we are always improving our equipment to address the modern threat. If you have a concern about a function or feature, please contact us. We will continue to work hard to keep the OSCOR current. I hope that the customers above that made comment will contact us immediately so that we can update your equipment and software. Regards, Tom Jones REI General Manager 10923 From: joe joe Date: Fri Feb 4, 2005 9:37am Subject: Re: REI comments on OPC Software well i seen the software about 2 weeks ago, did a new version come out since then? --- Thomas Jones wrote: > > Gentleman, > > Before I discuss the issues, I want to apologize for > any frustrations > that customers may have experienced using OPC 5.0 > BETA. > > The situation is this, the new 5.0 OPC software was > developed with the > main goal of providing a new methodology using trace > analysis to better > address sophisticated transmitters such as Burst and > Hoppers. This > required many changes to both hardware and software, > but to summarize: > 1. Increasing communication bandwidth to allow > 120,000 data points of > trace data to be almost transparently transferred to > the PC for trace > analysis. (Previous versions transferred 256 data > points through a > serial port and only displayed resolution equivalent > the OSCOR display.) > 2. Completely new development of software > methodology and graphics > displays to address this new data. > 3. Significantly decreasing OSCOR sweep time to > address time varying > threats. > This resulted in a completely new re-write of the > OPC software. > > In our excitement to get these new capabilities out, > as a company we > made a large mistake in releasing this software as a > BETA version. But > the biggest mistake is that we released it too early > in the BETA > process. Again, we are sorry for any customers that > have been frustrated > by this mistake. > > However, to make the assumption that this is the end > of the story is > completely wrong. I don't know who > nunimeyer@y... is, and I can > only apologize that you saw a very early version. We > have been working > diligently to fix the early bugs and have already > added valuable > additional features recommended by our customers. We > have already > released the production version of the software, and > we will be > releasing an update to our production version in two > weeks. > > Furthermore, on the comments posted by > "Tensor66B@n...". The > modern OPC 5.0 is developed for all modern PC > operating systems. The > Modern OSCOR can certainly demodulate FM video. The > very first version > of OSCOR with video demodulation only did standard > NTSC, PAL, and SECAM. > However, this was replaced years ago with an > upgraded video TFT monitor > and demodulation circuitry that allows control of > video AM or FM, > Positive or Negative synch pulse, and of course > NTSC, PAL, and SECAM > format. > > The final point, is that we are always improving our > equipment to > address the modern threat. If you have a concern > about a function or > feature, please contact us. We will continue to work > hard to keep the > OSCOR current. I hope that the customers above that > made comment will > contact us immediately so that we can update your > equipment and > software. > > Regards, > Tom Jones > REI General Manager > > > > > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10924 From: Nalesnik, Matthew Date: Fri Feb 4, 2005 9:39am Subject: RE: REI comments on OPC Software Now that's what I'm talkin' about... someone who tries to 'square up'! A lot of companies would just blow you off, or as JMA so eloquently elaborated upon the other day, "blow smoke up your ass". Cheers to you, Tom Jones, if you hold true to your word. -----Original Message----- From: Thomas Jones [mailto:Tom@r...] Sent: Friday, February 04, 2005 10:26 AM Subject: [TSCM-L] REI comments on OPC Software Gentleman, Before I discuss the issues, I want to apologize for any frustrations that customers may have experienced using OPC 5.0 BETA. The situation is this, the new 5.0 OPC software was developed with the main goal of providing a new methodology using trace analysis to better address sophisticated transmitters such as Burst and Hoppers. This required many changes to both hardware and software, but to summarize: 1. Increasing communication bandwidth to allow 120,000 data points of trace data to be almost transparently transferred to the PC for trace analysis. (Previous versions transferred 256 data points through a serial port and only displayed resolution equivalent the OSCOR display.) 2. Completely new development of software methodology and graphics displays to address this new data. 3. Significantly decreasing OSCOR sweep time to address time varying threats. This resulted in a completely new re-write of the OPC software. In our excitement to get these new capabilities out, as a company we made a large mistake in releasing this software as a BETA version. But the biggest mistake is that we released it too early in the BETA process. Again, we are sorry for any customers that have been frustrated by this mistake. However, to make the assumption that this is the end of the story is completely wrong. I don't know who nunimeyer@y... is, and I can only apologize that you saw a very early version. We have been working diligently to fix the early bugs and have already added valuable additional features recommended by our customers. We have already released the production version of the software, and we will be releasing an update to our production version in two weeks. Furthermore, on the comments posted by "Tensor66B@n...". The modern OPC 5.0 is developed for all modern PC operating systems. The Modern OSCOR can certainly demodulate FM video. The very first version of OSCOR with video demodulation only did standard NTSC, PAL, and SECAM. However, this was replaced years ago with an upgraded video TFT monitor and demodulation circuitry that allows control of video AM or FM, Positive or Negative synch pulse, and of course NTSC, PAL, and SECAM format. The final point, is that we are always improving our equipment to address the modern threat. If you have a concern about a function or feature, please contact us. We will continue to work hard to keep the OSCOR current. I hope that the customers above that made comment will contact us immediately so that we can update your equipment and software. Regards, Tom Jones REI General Manager ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10925 From: contranl Date: Fri Feb 4, 2005 0:36pm Subject: Parallel wire data-pick-up technique ? . There seems to be a technique where you run a cable in parallel with a "victim" cable, you would then be able to pick up whatever data is running through this victim-cable. Although similar...this is not the famous "Van Eck" trick wich targets radiation from CRT-monitors...and restores the screen by adding newly generated sync-signals. It's similar to picking up sound on a wire Obviously you would be able to inductively or capacitively pick up radiation from any cable...you would then need somekind of circuit wich converts this back to data...next you would need some software wich formats the resulting datastream to something readable..i could imagine that standard software could do that,for example fax-spying software could be used to read any fax-messages going over such a cable... It seems all very simple,so why have i never read about this ? all i've ever seen is very small piece of video: http://www.tetrascanner.com/gsm-scanners.html under imsi-catcher there's a video describing some research work by the BSI (German in government institute for security in IT) At the beginning they show (very shortly) this "parallel technique" A complete network could be compromised like this. Anyone now more about this ? How long piece of wire would you need ? Screened cables (most of them) no problem ? What would be the minimum distance between radiating and pick-up cable and would it be possible to use this with a wall in between ? What would be needed as a "front end" before it goes into a (decoding)computer? Possibly data could be stored on a little data-logging device instead of feeding it directly to a PC ...such a logger could be empty-ed every once in a while (wireless,dial-up..etc) or send all data live. Tetrascanner 10926 From: James M. Atkinson Date: Fri Feb 4, 2005 1:07pm Subject: More Posts Dissappearing A review of the moderator logs today, reflect that someone at Yahoo is quietly deleting posts from the archive again. Looks like three more posts were deleted in the past few days, but two of these posts were ones that someone had gotten Yahoo to delete a few days before, and were reposts. The third missing message simply indicated that two messages were missing. It seems that someone is really upset by the postings, and is doing back flips to not only remove the original postings, but the reposts, and then to delete any messages concerning the deletion of the messages that were deleted. Oh well, it should be interesting to see how long it takes them to have THIS message deleted from the archives. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10927 From: Date: Fri Feb 4, 2005 3:05pm Subject: Re: REI comments on OPC Software The Group; I am just going to give you my reflection and use of the OPC software that has been mentioned in a few of the messages on the list. In November of 2004 I updated my Oscar to the latest OPC update 5 from REI at their Algood Tennessee location. The ability to save traces and use the overlapping capabilities with different colors for archival usage sounded good for me. I put this to use in early December and again on a six inspection for a client that closes down for the holiday period. The program worked as advertised and maybe I was lucky but my sony vaio pentium III kept operating all the the six day sweep and two overnight runs without locking up on me. It is also loaded on a new HP laptop and so far has been working well with no glitches. The ability to be able to save and also to export to a printer has been a great addition to my wanting to have a hard copy of the frequencies, traces with all peaks for future comparison is good. As I said this is how the software has been operating for me and I hope it continues to do so. Also my relationship with the people at REI has been a good one. In the past I have had questions, and a few glitches in either the Oscar or one of my CPM700 units they are always quick to respond and have been able to either diagnose the problem or perform a quick turn around if a fix is needed. I believe we as TSCM professionals have a friend in Tom Jones and REI, They are known world wide for their expertise in this field. Their staff from Tom on down take our problems very seriously. If there is a problem I am certain that REI will step up to the plate and will find an answer. That is all I have, just my two cents worth.. Bill Rhoads In a message dated 2/4/2005 10:37:11 AM Eastern Standard Time, joe joe writes: > > >well i seen the software about 2 weeks ago, did a new >version come out since then? >--- Thomas Jones wrote: > >> >> Gentleman, >> >> Before I discuss the issues, I want to apologize for >> any frustrations >> that customers may have experienced using OPC 5.0 >> BETA. >> >> The situation is this, the new 5.0 OPC software was >> developed with the >> main goal of providing a new methodology using trace >> analysis to better >> address sophisticated transmitters such as Burst and >> Hoppers. This >> required many changes to both hardware and software, >> but to summarize: >> 1. Increasing communication bandwidth to allow >> 120,000 data points of >> trace data to be almost transparently transferred to >> the PC for trace >> analysis. (Previous versions transferred 256 data >> points through a >> serial port and only displayed resolution equivalent >> the OSCOR display.) >> 2. Completely new development of software >> methodology and graphics >> displays to address this new data. >> 3. Significantly decreasing OSCOR sweep time to >> address time varying >> threats. >> This resulted in a completely new re-write of the >> OPC software. >> >> In our excitement to get these new capabilities out, >> as a company we >> made a large mistake in releasing this software as a >> BETA version. But >> the biggest mistake is that we released it too early >> in the BETA >> process. Again, we are sorry for any customers that >> have been frustrated >> by this mistake. >> >> However, to make the assumption that this is the end >> of the story is >> completely wrong. I don't know who >> nunimeyer@y... is, and I can >> only apologize that you saw a very early version. We >> have been working >> diligently to fix the early bugs and have already >> added valuable >> additional features recommended by our customers. We >> have already >> released the production version of the software, and >> we will be >> releasing an update to our production version in two >> weeks. >> >> Furthermore, on the comments posted by >> "Tensor66B@n...". The >> modern OPC 5.0 is developed for all modern PC >> operating systems. The >> Modern OSCOR can certainly demodulate FM video. The >> very first version >> of OSCOR with video demodulation only did standard >> NTSC, PAL, and SECAM. >> However, this was replaced years ago with an >> upgraded video TFT monitor >> and demodulation circuitry that allows control of >> video AM or FM, >> Positive or Negative synch pulse, and of course >> NTSC, PAL, and SECAM >> format. >> >> The final point, is that we are always improving our >> equipment to >> address the modern threat. If you have a concern >> about a function or >> feature, please contact us. We will continue to work >> hard to keep the >> OSCOR current. I hope that the customers above that >> made comment will >> contact us immediately so that we can update your >> equipment and >> software. >> >> Regards, >> Tom Jones >> REI General Manager >> >> >> >> >> >> > > >__________________________________________________ >Do You Yahoo!? >Tired of spam? Yahoo! Mail has the best spam protection around >http://mail.yahoo.com > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > 10928 From: kondrak Date: Fri Feb 4, 2005 4:09pm Subject: Re: More Posts Dissappearing Be advised this msg will be spread far and wide, to alert others of the actions... At 14:07 2/4/2005, you wrote: >A review of the moderator logs today, reflect that someone at Yahoo is >quietly deleting posts from the archive again. > >Looks like three more posts were deleted in the past few days, but two of >these posts were ones that someone had gotten Yahoo to delete a few days >before, and were reposts. The third missing message simply indicated that >two messages were missing. > >It seems that someone is really upset by the postings, and is doing back >flips to not only remove the original postings, but the reposts, and then >to delete any messages concerning the deletion of the messages that were >deleted. > >Oh well, it should be interesting to see how long it takes them to have >THIS message deleted from the archives. > >-jma > > > >---------------------------------------------------------------------------------------------------- >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >---------------------------------------------------------------------------------------------------- > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10929 From: Hawkspirit Date: Fri Feb 4, 2005 5:56pm Subject: Oscor I did a sweep in the past few years in which I detected a burst bug sending out short duration pulse bursts. After the client saw my results he hired a second sweep team to come in and confirm my findings. They brought an Oscor and it would not receive and display this short pulse wave transmission. Missed the boat completely! Roger HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com Date: Thu, 03 Feb 2005 15:40:48 -0500 From: Tensor66B@n... Subject: Re: oscor opc software....ughhhhh!! Genlemen, It seems to me that OSCOR software was developed for Windows 3.0 and was never redesigned since then. Apart from software some other features either do not work as claimed or useleless in today¥s environment, e.g. AM video reception. Who ever saw a surveillance video running AM last 20 years? OSCOR cannot FM (I tried myself). Probably it was not a bad system for the 80s albeit not better than swiss made 1974 model XY-Mini-Spy-Detector (bench made but 100% based on top quality CEI and Watkins Johnson modules this system also used AF correlation method BEFORE REI revolutionary reinvented it). But irony is that for all practical purposes there is no competition to OSCOR today. A professional TSCM specialist does not need OSCOR: even a cheap hobby class receiver and an analog spectrum analyzer will help much more. But there a maybe a few professionals in this business, overwhelming majority are PIs (best case) or amateurs. Look at theit "credentials" on their websites: their "education" is limited to some 2hours to 2days course or apprenticeship. Some of them have B.Sc or evem M.Sc but not in Electronics or related fiels. They need OSCOR. And for this purpose it is good enough. And be I on REI board I would hesitate with redesign of the system: it could be a zero return investment. Regards, A.W. -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.5 - Release Date: 2/3/2005 [Non-text portions of this message have been removed] 10930 From: joe joe Date: Fri Feb 4, 2005 8:10pm Subject: Re: Oscor i did a test with the oscor and a spectrum analyzer and both catch burst trans...as long as you do a long enough sweep the oscor works very well, i don't knock their equipment , all i spoke of was their opc software --- Hawkspirit wrote: > > > I did a sweep in the past few years in which I > detected a burst bug sending > out short duration pulse bursts. After the client > saw my results he hired a > second sweep team to come in and confirm my > findings. They brought an Oscor > and it would not receive and display this short > pulse wave transmission. > Missed the boat completely! > > Roger > > HYPERLINK > "http://www.bugsweeps.com/"www.bugsweeps.com > > > > Date: Thu, 03 Feb 2005 15:40:48 -0500 > > From: Tensor66B@n... > > Subject: Re: oscor opc software....ughhhhh!! > > > > > > Genlemen, > > > > It seems to me that OSCOR software was developed for > Windows 3.0 > > and was never redesigned since then. Apart from > software some other > > features either do not work as claimed or useleless > in today¥s > > environment, e.g. AM video reception. Who ever saw a > surveillance > > video running AM last 20 years? OSCOR cannot FM (I > tried myself). > > Probably it was not a bad system for the 80s albeit > not better > > than swiss made 1974 model XY-Mini-Spy-Detector > (bench made but 100% based > > on top quality CEI and Watkins Johnson modules this > system also > > used AF correlation method BEFORE REI revolutionary > reinvented it). > > > > But irony is that for all practical purposes there > is no competition > > to OSCOR today. A professional TSCM specialist does > not need > > OSCOR: even a cheap hobby class receiver and an > analog spectrum analyzer > > will help much more. But there a maybe a few > professionals in this > > business, overwhelming majority are PIs (best case) > or amateurs. > > Look at theit "credentials" on their websites: their > "education" > > is limited to some 2hours to 2days course or > apprenticeship. Some of > > them have B.Sc or evem M.Sc but not in Electronics > or related > > fiels. > > > > They need OSCOR. And for this purpose it is good > enough. And be I on REI > board I would hesitate with redesign of the system: > it could be a zero > > return investment. > > > > Regards, > > A.W. > > > > > > > -- > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.8.5 - Release > Date: 2/3/2005 > > > > > [Non-text portions of this message have been > removed] > > __________________________________ Do you Yahoo!? Yahoo! Mail - Easier than ever with enhanced search. Learn more. http://info.mail.yahoo.com/mail_250 10931 From: joe joe Date: Fri Feb 4, 2005 8:12pm Subject: Re: REI comments on OPC Software BGR that is fine..i do agree that they do have good products..i never said they didn't but, on the opc software they have a problem..i have spoken to a few people from the REI classes and they have told me the same, i am glad it is working out for you, but as they say they are in beta mode so they DO know there are flaws in it, that is all i was stating, when there is an update and it WORKS i will gladly say they did a great job on it,truth is truth --- BGR101@a... wrote: > The Group; > > I am just going to give you my reflection and use of > the OPC software that has been mentioned in a few of > the messages on the list. > > In November of 2004 I updated my Oscar to the latest > OPC update 5 from REI at their Algood Tennessee > location. The ability to save traces and use the > overlapping capabilities with different colors for > archival usage sounded good for me. > > I put this to use in early December and again on a > six inspection for a client that closes down for the > holiday period. The program worked as advertised > and maybe I was lucky but my sony vaio pentium III > kept operating all the the six day sweep and two > overnight runs without locking up on me. It is also > loaded on a new HP laptop and so far has been > working well with no glitches. > > The ability to be able to save and also to export to > a printer has been a great addition to my wanting to > have a hard copy of the frequencies, traces with all > peaks for future comparison is good. > > As I said this is how the software has been > operating for me and I hope it continues to do so. > Also my relationship with the people at REI has been > a good one. In the past I have had questions, and a > few glitches in either the Oscar or one of my CPM700 > units they are always quick to respond and have been > able to either diagnose the problem or perform a > quick turn around if a fix is needed. > > I believe we as TSCM professionals have a friend in > Tom Jones and REI, They are known world wide for > their expertise in this field. Their staff from Tom > on down take our problems very seriously. If there > is a problem I am certain that REI will step up to > the plate and will find an answer. > > That is all I have, just my two cents worth.. > > Bill Rhoads > > > > In a message dated 2/4/2005 10:37:11 AM Eastern > Standard Time, joe joe > writes: > > > > > > >well i seen the software about 2 weeks ago, did a > new > >version come out since then? > >--- Thomas Jones > wrote: > > > >> > >> Gentleman, > >> > >> Before I discuss the issues, I want to apologize > for > >> any frustrations > >> that customers may have experienced using OPC 5.0 > >> BETA. > >> > >> The situation is this, the new 5.0 OPC software > was > >> developed with the > >> main goal of providing a new methodology using > trace > >> analysis to better > >> address sophisticated transmitters such as Burst > and > >> Hoppers. This > >> required many changes to both hardware and > software, > >> but to summarize: > >> 1. Increasing communication bandwidth to allow > >> 120,000 data points of > >> trace data to be almost transparently transferred > to > >> the PC for trace > >> analysis. (Previous versions transferred 256 data > >> points through a > >> serial port and only displayed resolution > equivalent > >> the OSCOR display.) > >> 2. Completely new development of software > >> methodology and graphics > >> displays to address this new data. > >> 3. Significantly decreasing OSCOR sweep time to > >> address time varying > >> threats. > >> This resulted in a completely new re-write of the > >> OPC software. > >> > >> In our excitement to get these new capabilities > out, > >> as a company we > >> made a large mistake in releasing this software > as a > >> BETA version. But > >> the biggest mistake is that we released it too > early > >> in the BETA > >> process. Again, we are sorry for any customers > that > >> have been frustrated > >> by this mistake. > >> > >> However, to make the assumption that this is the > end > >> of the story is > >> completely wrong. I don't know who > >> nunimeyer@y... is, and I can > >> only apologize that you saw a very early version. > We > >> have been working > >> diligently to fix the early bugs and have already > >> added valuable > >> additional features recommended by our customers. > We > >> have already > >> released the production version of the software, > and > >> we will be > >> releasing an update to our production version in > two > >> weeks. > >> > >> Furthermore, on the comments posted by > >> "Tensor66B@n...". The > >> modern OPC 5.0 is developed for all modern PC > >> operating systems. The > >> Modern OSCOR can certainly demodulate FM video. > The > >> very first version > >> of OSCOR with video demodulation only did > standard > >> NTSC, PAL, and SECAM. > >> However, this was replaced years ago with an > >> upgraded video TFT monitor > >> and demodulation circuitry that allows control of > >> video AM or FM, > >> Positive or Negative synch pulse, and of course > >> NTSC, PAL, and SECAM > >> format. > >> > >> The final point, is that we are always improving > our > >> equipment to > >> address the modern threat. If you have a concern > >> about a function or > >> feature, please contact us. We will continue to > work > >> hard to keep the > >> OSCOR current. I hope that the customers above > that > >> made comment will > >> contact us immediately so that we can update your > >> equipment and > >> software. > >> > >> Regards, > >> Tom Jones > >> REI General Manager > >> > >> > >> > >> > >> > >> > > > > > >__________________________________________________ > >Do You Yahoo!? > >Tired of spam? Yahoo! Mail has the best spam > protection around > >http://mail.yahoo.com > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > === message truncated === __________________________________ Do you Yahoo!? The all-new My Yahoo! - What will yours do? http://my.yahoo.com 10932 From: Gregory Hicks Date: Fri Feb 4, 2005 1:13pm Subject: Re: More Posts Dissappearing Jim: Just out of curiousity, what are the messages that are disappearing? Is there anyone at Yahoo you could complain to? That is *not* supposed to happen... Just a different thought: Are list members allowed to modify the archives? If so, you might want to change that... Oh well. Sorry! Regards, Gregory Hicks > To: TSCM-L > From: "James M. Atkinson" > Date: Fri, 04 Feb 2005 14:07:49 -0500 > Subject: [TSCM-L] More Posts Dissappearing > > > > A review of the moderator logs today, reflect that someone at Yahoo is > quietly deleting posts from the archive again. > > Looks like three more posts were deleted in the past few days, but two of > these posts were ones that someone had gotten Yahoo to delete a few days > before, and were reposts. The third missing message simply indicated that > two messages were missing. > > It seems that someone is really upset by the postings, and is doing back > flips to not only remove the original postings, but the reposts, and then > to delete any messages concerning the deletion of the messages that were > deleted. > > Oh well, it should be interesting to see how long it takes them to have > THIS message deleted from the archives. > > -jma > > > > -------------------------------------------------------------------------------- -------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > -------------------------------------------------------------------------------- -------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------------------- -------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------------------- -------------------- > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > ------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 | Fax: 408.894.3400 San Jose, CA 95134 | Internet: ghicks@c... I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton 10933 From: Agent Carrion Date: Fri Feb 4, 2005 3:22pm Subject: Re: Parallel wire data-pick-up technique ? This is such an interesting post! This is why I joined this group! ;-) --- contranl wrote: > > . > > There seems to be a technique where you run a cable > in parallel > with a "victim" cable, you would then be able to > pick up whatever > data is running through this victim-cable. > > Although similar...this is not the famous "Van Eck" > trick wich > targets radiation from CRT-monitors...and restores > the screen by > adding newly generated sync-signals. > > It's similar to picking up sound on a wire > > Obviously you would be able to inductively or > capacitively pick up > radiation from any cable...you would then need > somekind of circuit > wich converts this back to data...next you would > need some software > wich formats the resulting datastream to something > readable..i could > imagine that standard software could do that,for > example fax-spying > software could be used to read any fax-messages > going over such a > cable... > > It seems all very simple,so why have i never read > about this ? > all i've ever seen is very small piece of video: > > http://www.tetrascanner.com/gsm-scanners.html > > under imsi-catcher there's a video describing some > research work by > the BSI (German in government institute for security > in IT) > At the beginning they show (very shortly) this > "parallel technique" > > A complete network could be compromised like this. > > Anyone now more about this ? > How long piece of wire would you need ? > Screened cables (most of them) no problem ? > What would be the minimum distance between radiating > and pick-up > cable and would it be possible to use this with a > wall in between ? > > What would be needed as a "front end" before it goes > into a > (decoding)computer? > > Possibly data could be stored on a little > data-logging device instead > of feeding it directly to a PC ...such a logger > could be empty-ed > every once in a while (wireless,dial-up..etc) or > send all data live. > > > Tetrascanner > > > > __________________________________ Do you Yahoo!? The all-new My Yahoo! - Get yours free! http://my.yahoo.com 10934 From: savanted1© Date: Fri Feb 4, 2005 0:22pm Subject: TSCM News The 2005 Identity Fraud Survey Report has been release by the Better Business Bureau, and it contains some interesting findings. "Computer crimes accounted for just 11.6 percent of all known-cause identity fraud in 2004; and half of these digitally-driven crimes stem from spyware, software the computer user unknowingly installs to make ads pop-up when the consumer is online. Consumers can protect their financial data by using updated spyware, virus and firewall protection software and not responding to bogus "phishing" emails that request personal data." http://www.bbb.org/alerts/article.asp?ID=565 Savanted1Æ Mr. Garrett Hord __|__ -@--@--(_)--@--X-- savanted1@y... savanted1@h... savanted1@n... Group home page: http://groups.yahoo.com/group/TICSAStudy Group email address: TICSAStudy@yahoogroups.com Innovations At The Speed Of A ThoughtÆ You Cannot Do Today's Work With Yesterday's SkillsÆ It Is Wise To Educate A Child Than To Raise An AdultÆ ================================================== This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. --------------------------------- Do you Yahoo!? Yahoo! Search presents - Jib Jab's 'Second Term' [Non-text portions of this message have been removed] 10935 From: J.Evert Date: Fri Feb 4, 2005 6:15pm Subject: Re: oscor opc software I upgraded my Oscor to the 5.0 in June and have been using the software since late July when the test version came out. I have been completely satisfied with the software and the new 5.0 Oscor. The initial version had some small bugs, and I expected this as it was a beta version and I was asked by rei to report any problems so they could fix any discovered bugs in the software. I never had any problems with my computer crashing, and I have been using the software repeatedly for over five months now. I believe the current software version is the 3rd release, each release fixing small problems of previous versions. From my personal experience with rei, they have been extremely professional and courteous, and willing to do more than any other company I have dealt with to satisfy their customers. I find it hard to believe that they would simply blame it on your computer unless your computer was truly the problem. Although you may not have signed your post for other reasons, by not signing it you raise credibility issues when you are complaining about a companies product in a public manner. If I know REI, I would bet that they have been trying to contact you since you posted your initial complaint in order to assist you, Please let us know how the situation turns out. Jeff Evert Arizona Technical Security 10936 From: Michael Jordan Date: Fri Feb 4, 2005 11:44am Subject: Re: iPods and Ilisten Hey Bubba Timbo! Only an Apple stevejobber salesman would hype the ipod. They represent the biggest consumer scam since head cheese. The PC market has many more devices which are smaller and less expensive with comparable storage capability. Creative, Rio, PNY etc. with more in the market every day. If you want to bug public bathrooms why not just hang out in the stalls with the door shut? Interesting that you use the term 'privy' which in Georgia means the outhouse. I find it hard to believe that you get paid for hanging out in bathrooms, of course there is the train station privy in Plains where Zell Miller gets his choicest intelligence. On Thu, 3 Feb 2005 08:59:56 -0500, Tim Johnson wrote: > > Aren't those iPod's by Apple just about the neatest thing that's come > along in years. Anywhere from 4 to multi bunch of gig of memory for > storing thousands and thousands of your favorite tunes. It would take > you from now till way past then to listen to all of them, even if you > did nothing but listen full time, were you to max it out with tunes. > > I, personally, don't think I have thousands of favorite tunes, but > how would I know unless I listened. > > Something that MIGHT be worth listening to would be what goes on in > places I'm not normally privy to, such as rest rooms, break rooms, > locker rooms, board rooms, offices, conference rooms or anywhere else > I can't get to whenever i want to be there. > > How would I do that???? > > I'd probably buy an iPod and the ITalk attachment (for $39.95) and do > the hide thingy. That would give you thousands of hours of > conversation. They're small and powerful (and getting smaller and > more powerful). Almost everyone has them. They're not questioned like > cell phones, cameras and audio recorders are (after all, they are > just playback units for music, aren't they?). > > You see them in offices, attached to speakers so that the occupant > can listen, and listen, and listen while he/she works (I haven't seen > them in meeting or board rooms yet, but it is just a matter of time > before they replace the CD player that is already there. > > So, the next time you see one, think about where it is going or where > it has been. > > Did I mention that with PodLock by Micromat, Inc. you can even create > a secret drive that keeps sensitive data (surreptitious recordings, > maybe?) away from prying eyes. > > And it is all right out in plain view. Just lay it on a desk or > table, along with the headphones and almost no one is going to > question it. > > Just something to think about. > > Tim > > Apologies for any cross postings. > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it private is ours. > > Georgia License # PDC 002074 Technical Security Consultants Inc. > Member INTELNET > Espionage Research Institute > Association of Former Office of Special Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the addressee(s) only and may > contain privileged confidential, or proprietary information that is > exempt from disclosure under law. If you have received this message > in error, please inform us promptly by reply e-mail, then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of the sender, or > anything else in this message is intended to constitute an electronic > signature for purposes of the Uniform Electronic Transactions Act or > the Electronic Signatures in Global and National Commerce Act > (E-Sign) unless a specific statement to the contrary is included in > this message. > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > ________________________________ > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. -- Michael Jordan apollotomorrow@g... http://www.transbay.net/~ballgame/ http://apollotomorrow.blogspot.com http://starjockey.blogspot.com http://joshuaproject.blogspot.com 10937 From: joe joe Date: Fri Feb 4, 2005 11:13pm Subject: Re: Re: oscor opc software look,REI has admitted it has a problem, so i think some people should stop making excuses for it and saying how wonderful it is, i spoke with someone that was at the school a few weeks ago and he confirmed to me that AT THE SCHOOL it was bugging out,THE PC AT THE SCHOOL CRASHED TOO,( are you calling him a liar thomas?) so please enough of the excuses or saying how great it is for you, thomas i personally could care less because i don't use the software but don't proclaim it to be so great when it is not, like i said when it is fixed and when enough people i know that use it say it is good, i will do a total retraction --- "J.Evert" wrote: > > > I upgraded my Oscor to the 5.0 in June and have been > using the > software since late July when the test version came > out. I have > been completely satisfied with the software and the > new 5.0 Oscor. > The initial version had some small bugs, and I > expected this as it > was a beta version and I was asked by rei to report > any problems so > they could fix any discovered bugs in the software. > I never had > any problems with my computer crashing, and I have > been using the > software repeatedly for over five months now. I > believe the current > software version is the 3rd release, each release > fixing small > problems of previous versions. > > From my personal experience with rei, they have been > extremely > professional and courteous, and willing to do more > than any other > company I have dealt with to satisfy their > customers. I find it > hard to believe that they would simply blame it on > your computer > unless your computer was truly the problem. > > Although you may not have signed your post for other > reasons, by not > signing it you raise credibility issues when you are > complaining > about a companies product in a public manner. > > If I know REI, I would bet that they have been > trying to contact you > since you posted your initial complaint in order to > assist you, > Please let us know how the situation turns out. > > > Jeff Evert > Arizona Technical Security > > > > > > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10938 From: Tim Johnson Date: Fri Feb 4, 2005 11:58pm Subject: Re: iPods and Ilisten Michael, If you'll read it carefully you won't find an endorsement of the iPod. Some would call my initial comments "tongue-in-cheek". The rest of the comment had to do with places those who have been around the business for any length of time have found devices. Yes!! in restrooms, break rooms, and etc. What i was tryinjg to do (and apparently it went WAAAAAY over your head) was to point out the iPod could be used for something other than what it was designed for. Something the professional TSCMers needed to be made aware of so that their clients can be briefed as to the threat. In fact, if it still escapes you as to what the post was made for, I'll be glad to take your call and explain it is smaller words than i used in the post. Or, I'm sure, any of the others who do TSCM for a profession will be glad to do it for me. That's what we are here for.....to educate and explain and exchange ideas. As for privy, having been raised in Georgia (probably a long time before you was born) I am intimate with the word. but, it is also the term used to describe what used to be a very influential group of people who were advisors to the British Sovereign, known as Her Majesty's Most Honorable Privy Council. So, you see, it has at least three different meanings, two of which aren't associated with a** holes or defecation. Beyond that, if you need any additional education in eavesdropping, intelligence gathering or snooping, let us know on the forum. We'll do our best to educate you, even with your learning disability. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10939 From: Date: Fri Feb 4, 2005 10:28pm Subject: Re: Oscor In a message dated 04/02/2005 23:59:37 GMT Standard Time, hawkspirit@e... writes: I did a sweep in the past few years in which I detected a burst bug sending out short duration pulse bursts. After the client saw my results he hired a second sweep team to come in and confirm my findings. They brought an Oscor and it would not receive and display this short pulse wave transmission. Missed the boat completely! Roger HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com Roger I take it that you used a Spectrum Analyser on your original sweep when you detected the Burst device Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) [Non-text portions of this message have been removed] 10941 From: Michael Dever Date: Sat Feb 5, 2005 5:56am Subject: Re: Oscor Speaking of 'burst bugs' - what level of threat do you believe they belong at? That is; professional/amateur, etc. Regards Mike On 05 Feb 2005, at 20:28, DEMTEC@A... wrote: > > > > In a message dated 04/02/2005 23:59:37 GMT Standard Time, > hawkspirit@e... writes: > > > > > I did a sweep in the past few years in which I detected a burst bug > sending > out short duration pulse bursts. After the client saw my results he > hired a > second sweep team to come in and confirm my findings. They brought an > Oscor > and it would not receive and display this short pulse wave > transmission. > Missed the boat completely! > > Roger > > HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com > > > > > > > Roger I take it that you used a Spectrum Analyser on your original > sweep > when you detected the Burst device > Regards Dave > > David McGauley > TSCM [Technical Surveillance and Countermeasures] > Electronic Surveillance and Sweep Specialist > Electrical/Electronics Engineer ex Police > Demtec House > Ormskirk > Lancs L390HF > UK > 01695558544 > 07866206112 > demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) > > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 10942 From: joe joe Date: Sat Feb 5, 2005 5:59am Subject: Re: Oscor right now my personal opinion is that an amateur with some ham radio experience can do the job pretty good --- Michael Dever wrote: > Speaking of 'burst bugs' - what level of threat do > you believe they > belong at? > > That is; professional/amateur, etc. > > Regards > Mike > > On 05 Feb 2005, at 20:28, DEMTEC@A... wrote: > > > > > > > > > In a message dated 04/02/2005 23:59:37 GMT > Standard Time, > > hawkspirit@e... writes: > > > > > > > > > > I did a sweep in the past few years in which I > detected a burst bug > > sending > > out short duration pulse bursts. After the client > saw my results he > > hired a > > second sweep team to come in and confirm my > findings. They brought an > > Oscor > > and it would not receive and display this short > pulse wave > > transmission. > > Missed the boat completely! > > > > Roger > > > > HYPERLINK > "http://www.bugsweeps.com/"www.bugsweeps.com > > > > > > > > > > > > > > Roger I take it that you used a Spectrum Analyser > on your original > > sweep > > when you detected the Burst device > > Regards Dave > > > > David McGauley > > TSCM [Technical Surveillance and Countermeasures] > > Electronic Surveillance and Sweep Specialist > > Electrical/Electronics Engineer ex Police > > Demtec House > > Ormskirk > > Lancs L390HF > > UK > > 01695558544 > > 07866206112 > > demtec@a..._ www.demtec.co.uk_ > (http://www.demtec.co.uk/) > > > > > > > > > > [Non-text portions of this message have been > removed] > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > > > =================================================== > TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > Michael J. Dever CPP > Dever Clark & Associates > GPO Box 1163 > Canberra ACT 2601 > Australia > Voice: +612 6254 5337 > Email: dca@b... > ************************************************************************ > > ***** > This message is sent in strict confidence for the > addressee only. > It may contain legally privileged information. The > contents are not to > be disclosed to anyone other than the addressee. > Unauthorised > recipients are requested to preserve this > confidentiality and to advise > the sender immediately of any error in transmission. > > > > [Non-text portions of this message have been > removed] > > __________________________________ Do you Yahoo!? Take Yahoo! Mail with you! Get it on your mobile phone. http://mobile.yahoo.com/maildemo 10943 From: Agent Geiger Date: Sat Feb 5, 2005 10:45am Subject: Re: More Posts Dissappearing What is the content of the messages? --- Gregory Hicks wrote: > > Jim: > > Just out of curiousity, what are the messages that > are disappearing? > > Is there anyone at Yahoo you could complain to? > That is *not* supposed > to happen... > > Just a different thought: Are list members allowed > to modify the > archives? If so, you might want to change that... > > Oh well. Sorry! > > Regards, > Gregory Hicks > > > To: TSCM-L > > From: "James M. Atkinson" > > Date: Fri, 04 Feb 2005 14:07:49 -0500 > > Subject: [TSCM-L] More Posts Dissappearing > > > > > > > > A review of the moderator logs today, reflect that > someone at Yahoo is > > quietly deleting posts from the archive again. > > > > Looks like three more posts were deleted in the > past few days, but two of > > these posts were ones that someone had gotten > Yahoo to delete a few days > > before, and were reposts. The third missing > message simply indicated that > > two messages were missing. > > > > It seems that someone is really upset by the > postings, and is doing back > > flips to not only remove the original postings, > but the reposts, and then > > to delete any messages concerning the deletion of > the messages that were > > deleted. > > > > Oh well, it should be interesting to see how long > it takes them to have > > THIS message deleted from the archives. > > > > -jma > > > > > > > > > -------------------------------------------------------------------------------- > -------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, > and Real Wiretappers. > > > -------------------------------------------------------------------------------- > -------------------- > > James M. Atkinson > Phone: (978) 381-9111 > > Granite Island Group Fax: > > > 127 Eastern Avenue #291 > Web: http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > > > -------------------------------------------------------------------------------- > -------------------- > > World Class, Professional, Ethical, and > Competent Bug Sweeps, and > > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > > > -------------------------------------------------------------------------------- > -------------------- > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > > > =================================================== > TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > ------------------------------------------------------------------- > Gregory Hicks | Principal > Systems Engineer > Cadence Design Systems | Direct: > 408.576.3609 > 555 River Oaks Pkwy M/S 6B1 | Fax: > 408.894.3400 > San Jose, CA 95134 | Internet: > ghicks@c... > > I am perfectly capable of learning from my mistakes. > I will surely > learn a great deal today. > > "A democracy is a sheep and two wolves deciding on > what to have for > lunch. Freedom is a well armed sheep contesting the > results of the > decision." - Benjamin Franklin > > "The best we can hope for concerning the people at > large is that they > be properly armed." --Alexander Hamilton > > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail 10944 From: G P Date: Sat Feb 5, 2005 10:50am Subject: Re: Parallel wire data-pick-up technique ? Hi Tetra There is a decent amount of public research pertaining to TEMPEST out there, although not from the U.S. Best place to get started is the unofficial TEMPEST Information page: http://www.eskimo.com/~joelm/tempest.html Markus Kuhn's paper is a great resource, as are the Turkish National Institute of of Electronics and Cryptology papers ("Information Extraction from the Radiation of VDUs by Pattern Recognition Methods", and "Signal Processing Applications for Information Extraction from the Radiation of VDUs"). For sniffing serial links for ambient comms, dig around for an older document called "TEMPEST in a Teapot". It talks about sniffing serial links in the fashion you described circa 1993, and includes some excellent resources for shielding and the like. Processor noise can also be used for picking up interesting tidbits like key material used in crypto processors, the process is referred to as side channel cryptanalysis and has been used for a wide variety of attacks, including timing attacks against smart cards and other neato things like watching the power rail on embedded devices for spikes to determine key information. To demodulate up to 2400 bps modem traffic, grab an older US Robotics Courier HST modem, it has an undocumented test mode that turns off the transmit carrier and allows you to throw it inline with any modem connection (or decent quality recording of a modem connection), up to 2400 bps speeds - ATO is used to demodulate the originating tones, ATA for the receiving side once the modem is in that special test mode. Greg --- contranl wrote: > > > . > > There seems to be a technique where you run a cable > in parallel > with a "victim" cable, you would then be able to > pick up whatever > data is running through this victim-cable. > > Although similar...this is not the famous "Van Eck" > trick wich > targets radiation from CRT-monitors...and restores > the screen by > adding newly generated sync-signals. > > It's similar to picking up sound on a wire > > Obviously you would be able to inductively or > capacitively pick up > radiation from any cable...you would then need > somekind of circuit > wich converts this back to data...next you would > need some software > wich formats the resulting datastream to something > readable..i could > imagine that standard software could do that,for > example fax-spying > software could be used to read any fax-messages > going over such a > cable... > > It seems all very simple,so why have i never read > about this ? > all i've ever seen is very small piece of video: > > http://www.tetrascanner.com/gsm-scanners.html > > under imsi-catcher there's a video describing some > research work by > the BSI (German in government institute for security > in IT) > At the beginning they show (very shortly) this > "parallel technique" > > A complete network could be compromised like this. > > Anyone now more about this ? > How long piece of wire would you need ? > Screened cables (most of them) no problem ? > What would be the minimum distance between radiating > and pick-up > cable and would it be possible to use this with a > wall in between ? > > What would be needed as a "front end" before it goes > into a > (decoding)computer? > > Possibly data could be stored on a little > data-logging device instead > of feeding it directly to a PC ...such a logger > could be empty-ed > every once in a while (wireless,dial-up..etc) or > send all data live. > > > Tetrascanner > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > Has someone you know been affected by illness or > disease? > Network for Good is THE place to support health > awareness efforts! > http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10945 From: contranl Date: Sat Feb 5, 2005 2:05pm Subject: Re: More Posts Dissappearing . Those that can remove messages(archive),links,files,photos are: 1) The moderator(s) 2) The writer of the message (if he's still member) 3) Yahoo 4) Someone else who has stolen 1 of above identities or has managed to become a member again (using the same id) I have some groups myself..sometime ago all links and files and messages were gone...but back again after my complaint...to my question of what happened i never got a personal answer,just some prefabricated general apologies. You have to insist in asking Yahoo if they removed the message or not i suppose in the end they will give you an answer...depending on what they say you can start to think about what else might be going on. I know you can add things to a Yahoo-group wich they not intended. (inserting HTML-code where you should put plain text) As far as i know this can only be done by the moderators because they only have acess to those fields where you could do this. I just removed my previous last (unimportant)message on this group to see what happens...as expected i could remove it and now there is 1 number(10940)missing from the ordered row. (useless experiment..sorry) Tetrascanner 10946 From: Brian Varine Date: Sat Feb 5, 2005 9:28am Subject: 0wn3d by an iPod For those wondering what other nefarious uses an iPod could be used for, I suggest attending CanSecWest, they are going to have a breifing on hacking with iPods and other Firewire utilities. Firewire/i.Link is well known as a way for connecting video devices or external hard-disks to computers. One little known fact is that the Firewire protocol also allows to read and write physical memory on connected machines without further software support. This can be leveraged to escalate privileges or to spy on connected machines. We will present some fun software using FireWire to do things to computers which shouldn't happen. 0wn3d by an iPod: http://www.cansecwest.com/speakers.html 10947 From: Tim Johnson Date: Sat Feb 5, 2005 3:47pm Subject: Regarding the hoopla about the OSCOR Software Being a lowly Mac user, we don't have near the problems with crashing that PC users do.....but it happens occasionally. to reduce even further the possibility of it happening, I periodically run Norton Disk Doctor and Norton Utilities to De-fragment the disk. When I do have an incompatibility, I will run Conflict Catcher and determine which program is causing the problem. With all that said, and knowing Jeff Evert, I'd say that he is using a computer that is pretty much dedicated to running the OSCOR program and for handling his TSCM related activity, and nothing else. By keeping the unnecessary programs off his computer, her doesn't have the problems of conflicts between one program causing another to crash or hangup. What it boils down to is.....maybe it isn't just the OSCOR software's problem; As for the problems at the school, has that been verified by actually speaking with someone who attended the school and had it happen to them.....or is it a case of he said she said he said it happened. Try getting the after the sale service they provide from any other equipment sales organization. Never happen. But then again, they are interested in customer satisfaction, at least for this customer they have been. Regarding the software, I'll be able to speak from experience in a month or so as I'm scheduled for the basic REI class later on this month. While there, I'm going to have them install the program on my brand new Dell Laptop that will be dedicated to nothing but TSCM , OSCOR and a couple of other programs for operating and setting up TSCM related equipment and have them educate me on how to use it properly. Being somewhat limited in my knowledge of TSCM and computers, they may have to take an extra day or two to pound it into my head. And finally, shame on REI for releasing BETA programs in an effort to help people who have purchased their equipment and want to use it to it's maximum capabilities. You give some people something for free and they will complain about the time it takes to download it and set it up. (Do it right the first time and you won't have to do it again). Ooooops, one other "and finally" ..... wouldn't it be great if they wrote a program for Mac users. But then, they'd never know if it was working or not as they'd never hear from us again. Tim Johnson -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. 10948 From: joe joe Date: Sat Feb 5, 2005 7:01pm Subject: Re: Regarding the hoopla about the OSCOR Software Tim i have heard of you and i do respect what you have to say but if you read my post carfully i said that a freind of mine was at the school a few weeks ago and he himself told me personally he doesn't think too much of the software because of the reasons stated( it crashed on their own pc not his laptop), also from what i understand the software is not free you pay for it when you upgrade to version 5.0, so yes they should be ashamed of giving a BETA version, as i have said before, and i have also posted that if Thomas says it is not true( that it crashed and had problems) he is calling one of the people that was in HIS company's class a liar, like i have posted numerous times my freind said all the products are great just the software that needs help --- Tim Johnson wrote: > > Being a lowly Mac user, we don't have near the > problems with crashing > that PC users do.....but it happens occasionally. to > reduce even > further the possibility of it happening, I > periodically run Norton > Disk Doctor and Norton Utilities to De-fragment the > disk. When I do > have an incompatibility, I will run Conflict Catcher > and determine > which program is causing the problem. > > With all that said, and knowing Jeff Evert, I'd say > that he is using > a computer that is pretty much dedicated to running > the OSCOR program > and for handling his TSCM related activity, and > nothing else. By > keeping the unnecessary programs off his computer, > her doesn't have > the problems of conflicts between one program > causing another to > crash or hangup. What it boils down to is.....maybe > it isn't just the > OSCOR software's problem; > > As for the problems at the school, has that been > verified by actually > speaking with someone who attended the school and > had it happen to > them.....or is it a case of he said she said he said > it happened. Try > getting the after the sale service they provide from > any other > equipment sales organization. Never happen. But then > again, they are > interested in customer satisfaction, at least for > this customer they > have been. > > Regarding the software, I'll be able to speak from > experience in a > month or so as I'm scheduled for the basic REI class > later on this > month. While there, I'm going to have them install > the program on my > brand new Dell Laptop that will be dedicated to > nothing but TSCM , > OSCOR and a couple of other programs for operating > and setting up > TSCM related equipment and have them educate me on > how to use it > properly. Being somewhat limited in my knowledge of > TSCM and > computers, they may have to take an extra day or two > to pound it into > my head. > > And finally, shame on REI for releasing BETA > programs in an effort to > help people who have purchased their equipment and > want to use it to > it's maximum capabilities. You give some people > something for free > and they will complain about the time it takes to > download it and set > it up. (Do it right the first time and you won't > have to do it again). > > Ooooops, one other "and finally" ..... wouldn't it > be great if they > wrote a program for Mac users. But then, they'd > never know if it was > working or not as they'd never hear from us again. > > > Tim Johnson > > > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > Member INTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > > > __________________________________ Do you Yahoo!? All your favorites on one personal page ñ Try My Yahoo! http://my.yahoo.com 10949 From: Tim Johnson Date: Sat Feb 5, 2005 7:34pm Subject: Re: 0wn3d by an iPod Brian, Don't you know you are going to get into trouble by praising iPod's. But, now that you've done it, thanks for the heads up. Once a bucket of worms is turned over, it usually takes a bigger bucket to get them back into. All kinds of things the iPod can be used for when folks start talking about them. Anyone else have any good ideas. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10950 From: Tim Johnson Date: Sat Feb 5, 2005 8:11pm Subject: Re: Regarding the hoopla about the OSCOR Software I didn't have you post in front of me. i had deleted it and was responding from memory....something that gets evasive when you become a senior citizen. I was only trying to come up with some reasons why the program might have crashed. I'm sure that if there are serious problems, the Beta system would not have been released. As for the REI computer crashing, was it all of them, or just one. A computer person will probably explain it much better than i can, but each computer operates slightly differently than it's brethren. Heck, I can't even get it to work on my computer at all, but that's because I'm trying to run it with Virtual PC. I still think that I will eventually get to operate on my Macintosh, but i want to be sure I understand how it works first. I could already be using it, but then, I'd probably have to unlearn some nasty procedures. Seldom can you get something to work properly by using just the manual provided. As for paying, I believe it is available on the REI web site as a free download. i may be wrong, and if so, someone please correct me. I downloaded it shortly after I received my brand new Dell PC Laptop a week or two ago. But, like I said, that may not be the entire program. At any rate, I'll find out at the end of the month. And, rest assured that if I have any problems with the program crashing, etc., once I have been educated top it's use, I'll most definitely pass the word on. Heck, If i DON"T have any problems, I'll let you folks know. In the meantime, give the folks at REI feedback so they know what problems you are experiencing. It's good for the liver to vent here, but if you don't explain in detail to the engineers and technicians what problems you are experiencing, they aren't going to get fixed. As an example, I was having a problem with my OSCOR not saving data when I set it on AUTO. I'd have to unseat the program chip, reseat it and restart to get it to work. I let them know and I received new chips for both my OSCOR's about two days later. Apparently, there was a problem with the one chip. I saved it and am going to give it to them to run some tests on when I go up. Was it their fault it didn't work? YES. But was it intentional. NO. That particular chip decided to be a renegade. All the rest apparently worked exactly as they were programmed to do. Maybe the same thing happened to the computer? Maybe? As for the rest of your post, you should use some care in your choice of words. I doubt seriously that Tom actually called anyone a liar. I think that passion has clouded judgement and possibly caused different interpretations of statements. If, in fact, there was a failure, Tom may not be fully aware of the circumstances. If your friend who had a problem had contacted Tom, I think the results would have been different. BTW, if your friend is having problems with the software, he can operate the equipment without it until the problems have been fixed. It would be interesting to have input from other users of the OSCOR and the associated software to find out how many are experiencing problems and how many are satisfied with the Beta product. Tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. 10951 From: joe joe Date: Sat Feb 5, 2005 11:52pm Subject: Re: Regarding the hoopla about the OSCOR Software my freind won't come here and post about anything, he is not into that but he has left REI with many comments when he was there, THOMAS knows there are problems, so maybe he should just stop making excuses since he knew there were problems and just fix them, oh and by the way my buddy told me that a it wasn't an isolated case with his pc problem either --- Tim Johnson wrote: > > I didn't have you post in front of me. i had deleted > it and was > responding from memory....something that gets > evasive when you become > a senior citizen. I was only trying to come up with > some reasons why > the program might have crashed. I'm sure that if > there are serious > problems, the Beta system would not have been > released. As for the > REI computer crashing, was it all of them, or just > one. A computer > person will probably explain it much better than i > can, but each > computer operates slightly differently than it's > brethren. > > Heck, I can't even get it to work on my computer at > all, but that's > because I'm trying to run it with Virtual PC. > I still think > that I will eventually get to operate on my > Macintosh, but i want to > be sure I understand how it works first. I could > already be using it, > but then, I'd probably have to unlearn some nasty > procedures. Seldom > can you get something to work properly by using just > the manual > provided. > > As for paying, I believe it is available on the REI > web site as a > free download. i may be wrong, and if so, someone > please correct me. > I downloaded it shortly after I received my brand > new Dell PC Laptop > a week or two ago. But, like I said, that may not be > the entire > program. At any rate, I'll find out at the end of > the month. > > And, rest assured that if I have any problems with > the program > crashing, etc., once I have been educated top it's > use, I'll most > definitely pass the word on. Heck, If i DON"T have > any problems, I'll > let you folks know. > > In the meantime, give the folks at REI feedback so > they know what > problems you are experiencing. It's good for the > liver to vent here, > but if you don't explain in detail to the engineers > and technicians > what problems you are experiencing, they aren't > going to get fixed. > > As an example, I was having a problem with my OSCOR > not saving data > when I set it on AUTO. I'd have to unseat the > program chip, reseat it > and restart to get it to work. I let them know and I > received new > chips for both my OSCOR's about two days later. > Apparently, there was > a problem with the one chip. I saved it and am going > to give it to > them to run some tests on when I go up. Was it their > fault it didn't > work? YES. But was it intentional. NO. That > particular chip decided > to be a renegade. All the rest apparently worked > exactly as they were > programmed to do. Maybe the same thing happened to > the computer? > Maybe? > > As for the rest of your post, you should use some > care in your choice > of words. I doubt seriously that Tom actually called > anyone a liar. I > think that passion has clouded judgement and > possibly caused > different interpretations of statements. If, in > fact, there was a > failure, Tom may not be fully aware of the > circumstances. If your > friend who had a problem had contacted Tom, I think > the results would > have been different. > > BTW, if your friend is having problems with the > software, he can > operate the equipment without it until the problems > have been fixed. > It would be interesting to have input from other > users of the OSCOR > and the associated software to find out how many are > experiencing > problems and how many are satisfied with the Beta > product. > > Tim > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > Member INTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > > > From: L A Date: Tue Feb 4, 2003 1:05pm Subject: Delta Squad's prosecutor sues; http://webpublisher.lexisnexis.com/index.asp?layout=story&gid=790000479&cid=1410002341&did=47V1-CXK0-00D6-K3MR-00000-00&b=s Delta Squad's prosecutor sues; The sheriff and two workers are accused of using a restricted database to; gather personal information. Copyright 2003 Sarasota Herald-Tribune Co. Sarasota Herald-Tribune...02/01/2003 KELLY CRAMER, kelly.cramer@h... The U.S. attorney who prosecuted six members of the Manatee County Sheriff's Office is suing Sheriff Charlie Wells and two of his employees, claiming they used a restricted state database to gather personal information about him. Federal prosecutor Jeffrey Del Fuoco filed the lawsuit Friday in U.S. District Court. Del Fuoco led a corruption investigation into the sheriff's Delta Squad, an anti-drug unit. In the end, five members of the squad and another former deputy were sent to federal prison. In his lawsuit, Del Fuoco accuses employees at the Sheriff's Office of getting information such as his address and Social Security number in order to retaliate against him for putting their colleagues in prison. Del Fuoco's lawyer, Craig Huffman, said the prosecutor suspects deputies may have been planning to plant drugs in Del Fuoco's home or car. "This was the modus operandi of the Delta Squad," Huffman said. "They carried insurance and their insurance was crack cocaine." Lola Foy, an crime analyst with the Sheriff's Office, pulled Del Fuoco's license plate and driver's license information two days after the last former deputy was sentenced June 4, 2001. Del Fuoco said in the lawsuit that he never drove his personal car in Manatee County. Nothing ever happened to Del Fuoco, but he wants to send a message that prosecutors who go after corrupt cops won't be intimidated, Huffman said. Sheriff's Office spokesman Dave Bristow said Del Fuoco's theory is outrageous. Sheriff Wells could not be reached for comment Friday. The Florida Department of Law Enforcement discovered Foy's search in November as part of a routine check agents sometimes perform on federal prosecutors. FDLE agents and the sheriff's investigators interviewed Foy in November and December, and she told them she couldn't remember who, if anyone, asked her to do the search, according to a sheriff's report. "I would only utilize any information I have obtained from any source in a lawful matter," Foy said in a written statement. The burden is on the Sheriff's Office to prove that, Huffman said. Huffman said the U.S. attorney's office as well as the FDLE may be conducting criminal investigations into Foy's research. Congress passed a law in 1994 that criminalized obtaining driver's license information for personal use after Rebecca Schaeffer, an actress on the sitcom "My Sister Sam," was killed by a stalker in 1989. The stalker got her home address from driver's license information. The investigation into the Delta Squad was never officially closed. Del Fuoco said in 2001 that he would be looking into how far up the ranks the corruption went. There has been no public activity on the case since. Del Fuoco would not prosecute any new charges in the case because he no longer works in the public corruption unit. He moved to the major crimes division last year. Steve Cole, spokesman for the U.S. Attorney's Office, told the Tampa Tribune he couldn't comment on Del Fuoco's lawsuit. Wells designed the Delta unit to stop crack cocaine dealing. The Delta agents' tactics, which included planting evidence and stealing money during traffic stops, forced local prosecutors to drop more than 100 Delta drug cases involving 67 defendants. Michael Fetcher of the Tampa Tribune contributed to this report. ===== L. Altman Caliber Investigation Agency (NYC) cia1.bravepages.com cia@i... Ph# 1-718-318-2214 Fax 1-718-318-2866 Newsletters: http://cia1.bravepages.com/nwsltr/Archives.html __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6874 From: wes mooty Date: Tue Feb 4, 2003 9:13pm Subject: g.p.s. hideing places could anyone offer any advice where on a truck or car a g.p.s. tracking device mite be hidden.....preferable a 2001 f 150 ford pick up....or how to test and see if one mite be attached to ones truck...thanks in advance.. 6875 From: Carl A. Clauson Date: Mon Feb 3, 2003 4:38am Subject: Institute for Security Technology Studies Here is a request for help. If any of you are able to provide assistance, I will leave it up to you. Carl Clauson Editor PISA News! Come visit at: www.pisa.gen.va.us ************************************************************** Institute for Security Technology Studies Gap Analysis Project Request for Input ************************************************************** The following is a request from Kevin O'Shea of the Institute for Security Technology Studies at Dartmouth. For more information, please contact Mr. O'Shea at: Kevin O'Shea Technical Analysis Group Cyber Attack Investigative Tools: Gap Analysis Project Institute for Security Technology Studies 45 Lyme Road Hanover, NH 03755 gapanalysis2003@i... 603-646-0700 -------------------------------------------------------------- My name is Kevin O'Shea and I am a researcher with the Technical Analysis Group at the Institute for Security Technology Studies at Dartmouth College. We are looking for assistance from you and your organization in identifying existing tools and technologies for investigating cyber attacks for our Gap Analysis project. The Institute for Security Technology Studies was created in early 2000 with the mission to serve as a center for counter terrorism technology research, development, and evaluation, with a particular focus on cyber-security and critical information infrastructure. Additional information can be found at http://www.ists.dartmouth.edu The Technical Analysis Group is developing a research and development agenda for law enforcement tools and technologies for investigating cyber attacks. We recently finished the first step of the project; a national Needs Assessment where we asked law enforcement about the technological impediments they face when responding to and investigating cyber attacks. The findings have been published and can be downloaded at: http://www.ists.dartmouth.edu/TAG/lena.htm We are now moving onto the next phase of the project, the Gap Analysis, where we will gather and catalog the available tools, and match them up against the perceived needs of the cyber attack investigators. The results will illustrate where additional research and development should be conducted. Additional information regarding the Gap Analysis project can be found at: http://www.ists.dartmouth.edu/TAG/gap_analysis.htm Submit a Solution ----------------- If you have developed or used a tool which assists in the investigation of cyber attacks, we ask that you visit our "Submit a Solution" page to provide a detailed description of the functionality of the tool and which Law Enforcement specific impediment(s) the tool addresses. The "Submit a Solution" page can be found at the following URL: http://www.ists.dartmouth.edu/TAG/subtool/register.htm The Investigative Research for Infrastructure Assurance group here at ISTS has initiated a project to examine training programs for cyber attack investigators. Details on the project and contact information on how to become involved can be found at: http://www.ists.dartmouth.edu/IRIA/projects/d_letraining.htm Please feel free to forward this email to anyone you believe would have information to contribute to the project. We thank you for helping us with this national effort, and we look forward to working together in the future. Sincerely, Kevin O'Shea -------------------------------------------------------------- The JUSTNETNews Mailing List is maintained by the National Law Enforcement and Corrections Technology Center. Regular postings include the weekly Law Enforcement and Corrections Technology News Summary and announcements from NLECTC and the National Institute of Justice Office of Science and Technology (NIJ/OS&T). To SUBSCRIBE, use the online form at: http://www.nlectc.org/justnetnews/nlectc_subscribe.asp OR send a plain-text email containing only the message "join JUSTNETNews firstname lastname" (without quotes) to the address listmanager@n.... 6876 From: kondrak Date: Wed Feb 5, 2003 6:29pm Subject: Re: Stop telemarketers They are not Dual-Tone freqs. The be-boo-be tones are discreete. Look at them on a scope. At 08:56 2/3/03 -0600, you wrote: >The main thing I see that is wrong with those tones is that our DTMF tones >are two frequencies per tone, not one (thus Dual Tone Multi-Frequency >designation). Do you know the second tone for the three tones you >mentioned? > >Sgt. Kirk Sewell >Illinois State Police, Technical Investigations >500 Iles Park Place, Suite 300 >Springfield, IL 62718 >(217)524-6079 > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6877 From: Steve Uhrig Date: Wed Feb 5, 2003 7:32pm Subject: Re: TSCM strategy, evaluation & contrtol On 3 Feb 2003 at 5:09, Romeo Mabasa wrote: > We're currently developing the above mentioned things and need your > input. We were given a budget and we need ways to improve on it. You're asking for work product from a small number of competent people who have spent entire careers and thousands of hours developing their skills. The proper thing to do is to hire a consultant and pay his rate to advise you and work with you to develop your plans. That will, by far, be the best use of your budget. You're not likely to get a good reception asking people to give away their work product. There may be as many as 15 or 20 people on this list who would qualify to consult with you. Ask for references. Reword your request, acknowledging you are willing to pay for the fruits of a man's labor, which he uses to feed his family, and you may get a few responses. Not everything on the web is free. What is free is usually worth what you pay for it, if that. Persons on this list are responsible for millions of dollars' worth of information security. That is not freebies. Try again with a differently worded request and you may get some offers. This is a valid place to seek such services. Many of us provide them, but as a cost. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6878 From: Charles P. Date: Wed Feb 5, 2003 11:44pm Subject: Re: Stop telemarketers The three tones are often known as SIT tones (Special Information Tones). They are used by the phone company to indicated a line that is not in service or some other line situations (Vacant Code/ Intercept/ Reorder/ and No Circuit). Some telemarketing computer systems are sensitive to the tones and will knock your number off of their list when they hear it. A friend of mine in NJ said it made a big difference in the number of telemarketing calls at his residence. But it depends on the equipment used by the caller. The units have been available for a number of years but have seen a recent increase in popularity due partly to the p.i.t.a. telemarketers and partly to marketing by Radio Shack and others. Charles Charles Patterson Global Communications Tarrytown, NY charles@t... ----- Original Message ----- From: "Gregory Horton" To: Sent: Monday, February 03, 2003 1:02 AM Subject: [TSCM-L] Stop telemarketers > Received this e-mail from a pal. Is this on the up and up? > > Subject: No Telemarket > > > > K. Alan Carlton, Professional Home & Building Inspection Consultant, > Fort Worth, Texas 817 572-3300 > Amateur Radio Operator N5GKY > > YES, YOU CAN STOP TELEMARKETERS ' annoying calls, or at least slow them > down: Those 3 familiar tones courtesy of Ma-Bell will do the trick. > > Most Telemarketers use what is called Predictive Dialers, which are PCs > with software that dials ever number in a phone exchange until it gets > lucky. Now you can use their own technology against them, and it's > legal. Here is how their system works: the dialer calls your number, > you answer, and you have probably notice the line appears dead after you > said, "Hello". What their computer is doing is listening for a short > burst of audio, your "HELLO", followed by a period of silence. With > this heard, it will log your phone number as valid and transfer the call > to an available telemarketer, the reason for the delay before someone > comes on line. > > Now, if their computer receives a long audio burst (an answering > machine) " Hello, this is Alan Carlton", then it will disconnect, but it > will log you phone number as valid, for a later call-back. Oh Lovely! > Some are even capable of detecting Fax tones and will even transmit a > fax trying to sell selling something you're probably are not interested > in. However, do not answer, or when you do answer the phone, or if fax > tones are detected, or if it detects an answering machine, in all four > (4) cases IT LOGS YOUR NUMBER AS A GOOD PHONE NUMBER FOR FUTURE CALL- > BACK --- PLUS THE COMPANY IS ALSO SELLING THESE VERIFIED VALID NUMBERS > LIST TO OTHER TELEMARKETERS. > > A SIMPLE WAY TO STAY OFF THE LIST IS TO USE THEIR OWN TECHNOLOGY AGAINST > THEM. > > The predictive dialer's software also looks for NON-valid phone numbers, > and there is a simple way you can make your phone number appear invalid > to the telemarketers' computers, thus they do not call back and > accumulate no database, at least with your number, to sell other > Telemarketers. > > Here is how to do it: If you call a number that has been disconnected > or is no longer in service you will hear 3 short tones, > "doo...dah...dee", thanks to Ma-Bell. Each time you Refresh this page > you should hear, "doo...dah...dee". The actual frequency of these > tones are 985.2 Hz, 1370.6 Hz, and 1776.7 Hz. Guess what the > telemarketers' software does when it detects these 3 tones at the > beginning of your outgoing message? It thinks it has reached a line > that is disconnected or is no longer in service. So, it disconnects and > does not log your phone number as a working number. BINGO! > > NOW record these onto you outgoing message or voice mail announcement, > and start exterminating telemarketers. Try this example, but use your > own name, "doo...dah...dee, Hello, This is Alan Carlton". It must be at > the beginning of your announcement to work. You may have to explain it > to you friends, but they will soon have it on theirs' too. > > > > > [Non-text portions of this message have been removed] > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 6879 From: Date: Wed Feb 5, 2003 7:22pm Subject: Re: Re: TSCM strategy, evaluation & contrtol In a message dated 2/5/2003 5:34:24 PM Pacific Standard Time, steve@s... writes: > Persons on this list are responsible for millions of dollars' worth > of information security. You meant many Billions didn't you. …minence grise, Being an ex in this business is like being an ex-marine, ex-biker, ex-Mafia member, or an ex-homosexual. [Non-text portions of this message have been removed] 6880 From: Andrus Aaslaid Date: Thu Feb 6, 2003 2:20am Subject: GSM vehicle tracking Hello All! I have been following this list for several years and although have not had much opportunity to contribute back (mostly because of feeling small and unimportant after reading the posts from number of gentelman here :)), I do enjoy a lot the skills and proffessionalism found here! After being envolved as owner and member of the board for five years in electronics design company (www.artecdesign.ee), I am now happy to announce my envolvement with another company, more relevant to this list - Oskando O‹. The sole business of Oskando is GSM-based vehicle tracking and remote telemetry systems, as well as other GSM-based industrial devices. If any information is needed, please visit http://www.oskando.ee/eng Best Regards, Andrus. -- Andrus Aaslaid O‹ Oskando Phone: +372 673 7300 Fax: +372 673 7301 Direct: +372 50 28018 andrus.aaslaid@o... http://www.oskando.ee 6881 From: Times Enemy Date: Wed Feb 5, 2003 2:25pm Subject: Re: g.p.s. hideing places greets. > could anyone offer any advice where on a truck or car a g.p.s. > tracking device mite be hidden.....preferable a 2001 f 150 ford pick > up....or how to test and see if one mite be attached to ones > truck...thanks in advance.. Kind of an interesting question. But then, if a surge of 2001 F150 trucks start to vanish in your area ... well ... Phrack (Volume 0x0b, Issue 0x3c, Phile #0x0d of 0x10) had a nice article on a nifty device for making an alleged GPS jammer. I'm including this, along with a portion of the text .... Also, in this text are various frequencies and such which could prove useful if you were to do some scanning or such of a vehicle. --- included snippet ---[ 2 - Why? The onslaught of cheap GPS based navigation (or hidden tracking devices) over the past few years has made it necessary for the typical citizen to take up the fine art of electronic warfare. Several companies[2] now sell "hidden" GPS based tracking devices which mount inside or underneath your vehicle. Some transmit the coordinates, via cellular phone, of your vehicle's present and/or past locations for weeks at a time without battery changes or court orders! Vehicle rental companies have been known to use GPS tracking devices to verify you don't speed or abuse their rental vehicles. The unsuspecting renter is often faced with these hidden abuse "fees" after returning the rental vehicle. --- z end of z snippet ciao .times enemy 6882 From: Date: Wed Feb 5, 2003 11:17am Subject: Stop Telemarketers with S.I.T. Tone (Special Information Tone) Disconnet You can get the SIT Tone off of www.sandman.com/tmstop.html and record it in front of your outgoing message on your answering system, I did this last year and it worked to some extent and then I ended up buying their device because I was still getting telemarketing calls, so now when I pick up the phone it plays the SIT and the predictive dialing computer thinks that it has reached a disconnected telephone line and removes my phone number from their data base. Also available at Radio Shack. ¬ ¬ ¬ ¬ ¬ ¬ > > Telemarketer Stopper!‚Ñ¢ IMPORTANT NOTICE:The FBI has developed new technology to fight the Taliban and find Bin Ladin, using telecommunications...CLICK HERE FOR MORE INFORMATIONfrom Sector Eight¬ ¬ ¬ ¬ ¬ ¬ ¬ ¬ ¬ ¬ ¬ ¬ from Mike Sandman...Chicago's Telecom Expert The Telemarketer Stopper!‚Ñ¢ MakesTelemarketers & Bill Collectors ThinkYour Phone Line Doesn't Exist! Within a week, you'll be able to sit down and eat dinner, without being disturbed by Telemarketers!Click here to hear a SIT tone. (45K)Put it in front of one or all your phones (and your answering machine), and it will play a SIT (Special Information Tone) whenever you or your answering machine answers your line. The SIT tone is the short "doo-doo-doo" sound you hear when you dial a disconnected number - before the recording says the line is disconnected.Telemarketers and Bill Collectors often use Predictive Dialers to dial outgoing calls. These are computers that keep dialing phone numbers on a list until they reach a live person. The Predictive Dialer then transfers that call to the first live operator. That's why you hear silence for a while before someone gets on the line, when you answer the phone sometimes. Some of them are bold enough to play a little recording asking you to "Please hold on for an important call!" Right.Telemarketers and Bill Collectors don't want to pay their operators to dial the phone and listen to busy signals and answering machines, so they have a computer do it for them. The Predictive Dialer is programmed to hang up if it hears a SIT tone, since it knows the line is disconnected. It doesn't listen to what's said after the SIT tone, since it doesn't understand words. The Telemarketer or Bill Collector often takes that number out of their database too, so it won't be called again!The Telemarketer Stopper!‚Ñ¢ plays the SIT tone when you answer the phone. If it's a Predictive Dialer - the line will go dead. If it's a human, they'll hear the SIT tone and then hear you say "Hello" to answer the phone. Generally speaking, humans will ask you what that tone was, but they won't hang up. If you have an answering machine, delay your message for about 1.5 seconds to give the SIT tone time to play before you say "Hi, this is xxx..." The SIT tone will only be heard when you answer phones that are hooked up after the Telemarketer Stopper!‚Ñ¢ There's an "IN" and an "OUT" jack - and it's line powered. If you want it to do play the SIT tone automatically when you answer any phone in the house or business, it needs to be connected where the line comes in before any phones or the phone system.Our customers keep calling us with the same remarkable stories...""It took about a week, but nobody's calling us at dinner time anymore!""We had a bill collector calling us every day for something we didn't owe (it was the phone company). We put the Telemarketer Stopper!‚Ñ¢ on the line, and the calls stopped after only one day! Then the calls started coming in on our other line (we don't even give out that number). We got another Telemarketer Stopper!‚Ñ¢ and put it on that line, and the calls stopped in one day again! It's amazing!"It worked in our own house! Donna was on every suckers list there is. We couldn't sit down at dinner time without the phone ringing like crazy. We couldn't sleep late on Saturdays. I finally put one in front of our phone system at the house, and after a week - the calls totally stopped! Get your own Telemarketer Stopper!‚Ñ¢ Today! Only $34.95! 30 Day Moneyback GuaranteeDealer Pricing Available IMPORTANT NEWS... Sorry, this version of the Telemarketer Stopper!‚Ñ¢ has been discontinued due to a Patent dispute. A new version should be ready soon, but it'll be a little more expensive - and will require programming to avoid any legal trouble.It will start life as a programmable speed dialer, and will require some simple programming from a DTMF phone to make it generate a SIT tone (or any other tone you want) when the line is answered (or at any other time). That will get around the Patent claims, but it will require a little more effort on your part to install it.We've found that when our customer decides to buy the Telemarketer Stopper!‚Ñ¢, they're upset enough to do whatever it takes to get rid of the jerks that are bothering them, so we're going to make this new device.Check with our office at 630-980-7710, to see if it's available now.Part Number: CID6D¬ ¬ ¬ CallSaver: Disconnects a Phone Line that's Left Off Hook!If your child or pet has ever knocked a phone off the hook, and nobody could call you all day, CallSaver will hang up the phone for you!If your modem locked up and nobody could call you all day, CallSaver will hang up the phone for you!If your mother or grandmother has ever knocked their phone off the hook, and you couldn't call them all day, CallSaver will hang up the phone for them! It's like having someone checking your phone line for you, all the time! CallSaver disconnects the line when it hears the loud beep-beep-beep that the phone company uses to tell you to hang up your phone when you've left it off hook (called a "Howler"). The built-in ringer will alert you if you have a call while your phone has been automatically disconnected. When you finally hang up your phone, the CallSaver reconnects it automatically, and waits for the next time! CallSaver installs easily in front of a single phone, or you can install it in front of all of the phones or a phone system in the home or office (just make sure you can hear the built-in ringer which reminds you to hang up the line).Also works in front of phone systems, when the phone company doesn't provide a CPC Signal (Calling party Control) to release the call from hold or drop the voice mail when the outside party hangs up. CallSaver disconnects the line, which will cause the phone system to drop the line so it's ready for the next call (all happens automatically). Complete with A/C Adapter and Built-in Ringer Part Number: WAL3R¬ ¬ ¬ Price: $29.95¬ ¬ 630-980-7710 Copyright ¬© 2001 Mike Sandman Enterprises [Non-text portions of this message have been removed] 6883 From: info gathering Date: Wed Feb 5, 2003 10:21am Subject: RE: g.p.s. hideing places Hello Wes, A possible good hiding place might be right under the dashboard and close to your front windshield. Make sure that you place the antenna close to the top of the dashboard so that there is very little plastic between your antenna and the outside of the dashboard, as well make sure that the area your antenna is under is exposed to as much of your front windshield as possible in order to get a signal. The GPS signal can travel through the windshield no problem but the thickness of the plastic dashboard may hinder the signal. You'll have to test it due to different antennas being more sensative to the GPS signal than others. Try it and let me know if it works. Thanks Thorsten Kemper Electronic Engineering Consultant www.spaceleaf.com ---------- Original Message ---------------------------------- From: "wes mooty " Date: Wed, 05 Feb 2003 03:13:18 -0000 >could anyone offer any advice where on a truck or car a g.p.s. >tracking device mite be hidden.....preferable a 2001 f 150 ford pick >up....or how to test and see if one mite be attached to ones >truck...thanks in advance.. > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6884 From: Steve Uhrig Date: Thu Feb 6, 2003 4:52pm Subject: Butt set to test POTS/ASDL without knocking out the ASDL portion of the circuit. Worth the read for the technical info if nothing else. Anyone wanting one can get it through me if you don't have an account with Tessco. http://www.tessco.com/knowledgetools/twj/new/news_88 Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6885 From: Date: Thu Feb 6, 2003 4:05am Subject: stalking by satellite worries experts MILWAUKEE (Feb. 6) - Connie Adams found it impossible to escape her ex-boyfriend. He would follow her as she drove to work or ran errands. He would inexplicably pull up next to her at stoplights and once tried to run her off the highway, authorities said. When he showed up at a bar she was visiting for the first time, on a date, Adams began to suspect Paul Seidler wasn't operating on instinct alone. He wasn't - Seidler had installed a satellite tracking device in Adams' car, according to police in Kenosha, Wis., 30 miles south of Milwaukee. ''He told me no matter where I went or what I did, he would know where I was,'' Adams testified at a recent court hearing. Police say Adams' case and several others across the country herald an incipient danger - high-tech stalking. Just as the global satellite positioning system can help save lives, so can its abuse endanger them, advocates of stalking victims say. ''As technology advances, it's going to be almost impossible for victims to flee and get to safety,'' said Cindy Southworth, director of technology at the National Network to End Domestic Violence in Washington. In the Adams case, Seidler pleaded innocent last month to felony counts of stalking, recklessly endangering safety, burglary and a misdemeanor count of disorderly conduct. His trial is pending. Adams does not want to speak to reporters about the case, said Susan Karaskiewicz, a Kenosha County prosecutor. Police say Seidler put a global positioning tracking device between the radiator and grill of Adams' car. Such gadgets use a constellation of Defense Department satellites to pinpoint location and can send their coordinates via cellular networks to wireless handsets or computers. Trucking companies use GPS systems to track of hazardous cargo and monitor drivers. Corrections authorities use them to monitor sex offenders. Hikers, boaters and motorists use GPS devices to keep from getting lost. GPS technology is also being built into cell phones to help emergency dispatchers find 911 callers. They're also being used to prevent car theft. Southworth trains victims advocates, law enforcement and prosecutors on stalkers' use of the technology, which she says is only just beginning to be abused. The Stalking Resource Center at the National Center for Victims of Crime has found at least one other case of a GPS system being used to stalk a victim. In it, a Colorado appeals court in July upheld Robert Sullivan's conviction for stalking his ex-wife and installing a GPS device in her car to track her movements. GPS is not the first technology to be misused by stalkers, who have also employed the Internet, microchip-sized cameras and even caller identification, said Southworth, though it is the most dangerous to date. Just as she once taught victims how to block caller ID when they use the phone, Southworth now suggests victims occasionally check under their car's hood. Police are also finding GPS devices useful. Marla Wagner, sales manager at L.A.S. Systems, the same McHenry, Ill.-based company that made Seidler's device, said the company has sold GPS systems to about 10 police departments during the last year. The Kenosha Police Department is also buying a system from L.A.S. Systems. Tracy Bahm, the Stalking Resource Center's director, said some states are working to update their stalking statutes to include the high-tech variety. The center typically advises states to keep their statutes broad enough to include technologies that don't yet exist. ''As society and technology evolve, stalkers will always find new ways to harass their victims,'' Bahm said. AP-NY-02-06-03 0202EST [Non-text portions of this message have been removed] 6886 From: Ocean Group Date: Thu Feb 6, 2003 11:04am Subject: Shuttle Article...Interesting... PRAVDA 18:12 2003-02-05 Authoritative Opinion: NASA Specialists Watched Columbia Start and Made Mistakes Editorial office of PRAVDA.Ru appealed to Senior Research Fellow at the U.S. Air Force Base (Eglin, Florida), former NASA member and former Soviet scientist Alexander Bolonkin for comments on the Columbia shuttle tragedy. - The death of seven astronauts (Husband, McCool, Ramon, Brown, Anderson, Clark and Chawla) shocked not only America. National mourning was also declared in Israel, as one of the perished was the first Israeli astronaut in the space crew. The catastrophe is also a tragedy for India, as an astronaut American of Indian origin, Chawla, was member of the crew as well. As soon as the demise of the shuttle was reported, several versions of the tragedy immediately arose, including the suggestion of a diversion, as Texas residents said they saw explosion of the shuttle. At present, when we know that temperature in the shuttle's left wing, and then inside the craft, suddenly rose several minutes before the catastrophe, the main version of the tragedy says that a thermal protection tile of the rocket's fuel tank was lost during liftoff, then it hit the nose of the left-wing heat-resisting covering and destroyed it. This was observed at the liftoff moment, but NASA specialists decided that the damage was insignificant and couldn't hamper return of the shuttle. Butt they were mistaken. As my experience shows, majority of NASA employees are engineers working there right after graduation from institutes or under the patronage of some influential persons. What is more, NASA's success is achieved not due to the greatness of the personnel, but because of US's large-scale financing of space explorations (it is 30 times more than total financing of the rest countries of the world spent on space exploration). But what could they do? It is impossible to repair a spaceship in the space. The flight program provides for no going out into the space and for no equipment necessary for repairing. The only thing that the astronauts realized was that the damage was considerable and they would be inevitably burnt down at approaching the Earth. Could any attempts be made to turn the spaceship back during the liftoff? But it took time to get information concerning damages on the shuttle and to analyze it; within this period of time the rocket already passed through the dense atmospheric bed, and the spaceship would have inevitably heated up during its return. By the way, contrary to the narrow-minded opinion introduced by journalists, spaceships get warm not because of friction on the air, but because they compress the air in front of them and the air may reach the temperature of about 2000 degrees. The tragedy occurred basically through the fault of the company Lockheed Martin, the producer of the thermal protection coating. Companies usually employ lower-paid uneducated emigrants for simple operations, it is frequent that technology compliance is neglected at that. Five Shuttles performed 113 space flights since the moment their exploitation started (April 1981), the Columbia shuttle made over 30 flights and it was the first spaceship of this series. Many defects were discovered over the exploitation period. But catastrophes never occurred when the shuttle got back from the space. The shuttle of Challenger also blew up during its liftoff in January 1986 and killed seven astronauts. Subcontractor of the Lockheed Martin company, Thiokol, was declared one of the party at fault of the catastrophe. Unlike Americans, all Soviet cosmonauts (Komarov on April 23, 1967; Dobrovolsky, Volkov and Patsayev on June 30, 1971) died when they were getting back to the Earth. The Communist party central committee was guilty of Komarov's death, as it categorically demanded that a space flight must be performed by May 1, the International Labour Day, although the spaceship was unfinished. The other three astronauts probably died because of the imperfection of the spaceship construction and the demand of the Communist party central committee to place three cosmonauts into a cockpit designed for one man. The shuttle has a thermal coating consisting of 24192 tiles and 3254 flexible isolation mats. The coating protects the shuttle from aerodynamic heating at orbiting and during descending. This coating is different on different areas and depends upon the thermal load of each sector. A composite of carbon and graphite with the heat resistance of up to 1650 degrees is the most heat-resistant material, it is used in the shuttle's fore body and in the front edge of wings. Fiber glass tiles protect the flank surfaces where the temperature may reach 650 degrees. Quartz fiber mats and felt mats guarantee thermal insulation of the shuttle from red-hot and vaporable tiles. The tiles are replaced after every flight. Probably, bad junction resulted in detachment of the tiles during the liftoff and during vibration. The fragment that crashed to the left wing of the shuttle at the 80th second of the flight weighed about one kilogram. Breaking of the fuel tank isolation occurred with this shuttle even earlier, in 1992. But damages were insignificant that time, that is why no tragedy occurred. What a pity that NASA didn't pay special attention to the problem! Many facts prove the version saying that the catastrophe occurred because of damages in the thermal insulation. Sensors of the hydraulic system burnt down in the shuttle's left wing several minutes before the catastrophe, pressure transducers burnt down in the chassis, then the temperature in the middle trunk suddenly increased. It is highly likely that hot gases penetrated there. The shuttle started losing its path and the airborne computer attempted to adjust the path. But the high temperature didn't reach the crew immediately, as the astronauts reported no temperature increase. The shuttle was destroyed instantly. The demises of the two shuttles of the five ones (Challenger and Columbia) will seriously undermine the US Space Exploration program and especially the program of the International Space Station. Supply of the International Space Station with essential goods and saving of the astronauts in emergency situations are to become a real problem because of this loss. I worked in NASA when a life-saving craft X-33 was developed and I observed its tests. However, this program is not completed yet, and it is not clear when it will be finished. Some time ago NASA budget was curtailed. The NASA leadership fired five members of the Aerospace Security Council and two consultants for their criticism. One more employee left the service himself as he disagreed with the NASA leadership's position. Unfortunately, the practice of persecution of people criticizing the agency's programs and policy is widely used in NASA. Space exploration inevitably entails victims. Such is the way of any progress, and humanity must pay this price if we want to become masters of the nature and live better and longer. And this price is insignificant as compared with human losses in wars, or as a result of diseases, crimes and terrorism. The knowledge we obtain, science, new technologies have radically changed our life and turned us into masters of the Earth. It is actually very important to learn the lessons of every catastrophe, try to avoid making the same mistakes, to reduce the number of human victims; we must always remember those heroes who sacrificed their lives for the sake of new knowledge and for progress of humanity. I am sure that Americans will never forget the heroes of the space, take care of their families and children. It's a pity that Russia, former Soviet republics never commemorate anniversaries of astronauts' deaths. When cosmonauts were officially spoken about, only the dates of their flights are mentioned, but nobody ever says how the flights ended. The above mentioned Soviet cosmonauts died because of the Communist party central committee that pursued new records. Twenty one cosmonauts tragically died over the whole period of the space era. In order to reduce the death probability among cosmonauts, I offer to equip shuttles with a small thermal protection cockpit with a parachute so that astronauts could take shelter there in emergency situations. The size and weight of shuttles allow to build in such cockpits. Picture: Alexander Bolonkin Alexander Bolonkin Doctor of Technical Science, Former NASA senior research fellow Special to PRAVDA.Ru USA Translated by Maria Gousseva 6887 From: Thomas Habets Date: Fri Feb 7, 2003 9:08am Subject: Re: Shuttle Article...Interesting... -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 This is the worst article on the subject I've seen yet. See comments below. (there are other minor flaws I chose not to comment on) On Thursday 06 February 2003 18:04, Ocean Group wrote: > the main > version of the tragedy says that a thermal protection tile of the rocket's > fuel tank was lost during liftoff, then it hit the nose of the left-wing > heat-resisting covering and destroyed it. The NASA version is that FOAM came off and smashed against the wing. A thermal protection tile would NEVER break apart like in the video seen on CNN and such (would it? I'm not a rocket scientist. But they did say it was foam). > This was observed at the liftoff > moment, but NASA specialists decided that the damage was insignificant and > couldn't hamper return of the shuttle. Butt they were mistaken. How does this person know this? NASA *still* says this wasn't the cause. - ------ Shuttle program manager Ronald Dittemore told reporters today they were, in effect, mistaken if they assumed from previous briefings the Columbia disaster investigation was focused primarily on the possibility foam debris from the ship's external tank triggered the orbiter's destruction during entry Saturday [... ] "As I mentioned before, we're trying to find the missing link and as you focus your attention on the debris, we're focusing our attention on what we didn't see. We believe there's something else. And that's why we're doing a fault tree analysis and that's why we're investigating every area. Right now, it just doesn't make sense to us that a piece of (foam) debris could be the root cause of the loss of Columbia and its crew. It's got to be another reason." [...] "So it's something else. It's something else." - ------- http://www.spaceflightnow.com/shuttle/sts107/030205foam/ http://www.spaceflightnow.com/shuttle/sts107/status.html > As my > experience shows, majority of NASA employees are engineers working there > right after graduation from institutes or under the patronage of some > influential persons. This is just nasty. If I remember correctly about 80% of the people working on the Apollo program were under 30, and all three Apollo 11 astronauts were exactly 30. As a man under 30 myself, I take offense to this comment. Yes, It'd be great if they all were thousand-year-old wisards, but this is insulting. I don't know, maybe I'm reading too much into this. > What is more, NASA's success is achieved not due to > the greatness of the personnel, but because of US's large-scale financing > of space explorations (it is 30 times more than total financing of the rest > countries of the world spent on space exploration). Now money sends people into space? Bah. > The only thing that the astronauts > realized was that the damage was considerable and they would be inevitably > burnt down at approaching the Earth. Uhm... then why was everyone so surprised? > The tragedy occurred basically through the fault of the company Lockheed > Martin, Thank you. Now everyone can drop their investigations. This person obviously knows what caused the accident. Shut down NASA too, this person can probably send people to Mars as well. What is it with the tradition of first finding someone to blame, and then finding out what happened? > Breaking of > the fuel tank isolation occurred with this shuttle even earlier, in 1992. > But damages were insignificant that time, that is why no tragedy occurred. > What a pity that NASA didn't pay special attention to the problem! I'm sure they ignored it. They sure paid attention to it when foam came off the fuel tank last time, which was two trips ago for Columbia. - --------- typedef struct me_s { char name[] = { "Thomas Habets" }; char email[] = { "thomas@h..." }; char kernel[] = { "Linux 2.4" }; char *pgpKey[] = { "http://www.habets.pp.se/pubkey.txt" }; char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; } me_t; -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE+Q8vnKGrpCq1I6FQRArEnAKDEPuaBs3CzeVeKXl6EDnx7OWVWMACgz7/O CiJGbTPdjZyRH2FYe0wz51I= =jAYM -----END PGP SIGNATURE----- 6888 From: Matt Paulsen Date: Fri Feb 7, 2003 9:10pm Subject: RE: Shuttle Article...Interesting... FUD. Just factor in who's agenda you're reading from. ------ >This is the worst article on the subject I've seen yet. See comments below. >(there are other minor flaws I chose not to comment on) 6889 From: Matt Paulsen Date: Fri Feb 7, 2003 9:28pm Subject: new pacific northwest group to begin meeting and emailing There is a new group forming for Pacific Northwest area medical services to discuss infosec/warfare, bioterrorism/counterterrorism response/avoidance, etc. technical services/attacks/defenses/etc. Region of coverage is OR, WA, ID, northern CA. Currently there are 16 area organizations and the list is growing quickly. Most likely this group will begin presentations at the local infragard chapters and other appropriate locations when things start drumming up as well as applying these results nationally, regionally and locally through various federal/state/local authorities along with coordinated efforts with private and public commercial and/or non-profit organizations. If you have an interest in understanding/attending and directing these non-strategic meetings to discuss tactical implementations of applied technologies please contact me offline and I will review and forward to appropriate contacts to talk about it with you. You must be a full time employee for a state/federal/regional government relating to disaster service - planning/avoidance/etc. - ie: VA, FBI, DoE, DoD, etc., commercial or non-profit organization that relates to medical services - hospitals that service critical care/emergency care, patient transit services - ambulatory, flight, JHACO employees, etc. and/or emergency response services - fire & rescue/police/etc., or national disaster planning / avoidance - DoD, VA, homeland security, etc, and actively work as a chief security officer, network supervisor/security supervisor, disaster planning coordinator or other appropriately termed title, and control the direction of technology within your organization, not just implement it. Thanks for your time. Matt 6890 From: Date: Fri Feb 7, 2003 7:07pm Subject: Re: Shuttle Article...Interesting... are you Swedish? (re: your email addy)... that might explain your willingness to believe what the government tells us. if the government is found to be at fault, the cause will likely be classified and sealed. they will prepare something false to tell the media. of course, the media is the worse source for reliable information. this Russian scientist is in a good position to tell his opinion - he worked at NASA, knows the politics and government coverups, plus he is a Russian in Russia, not likely to be thrown in a US jail for exposing a coverup. he has a very strong nation behind him as well. i know the Lockheed part about hiring imigrants for cheap pay is true. see: http://www.lockheedmartin.com/spotlight/minority_employer.html hee hee, they make slavery sound like a virtue :) On Fri, 7 Feb 2003 4:08pm, Thomas Habets wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > > This is the worst article on the subject I've seen yet. See comments > below. > (there are other minor flaws I chose not to comment on) > > On Thursday 06 February 2003 18:04, Ocean Group wrote: > > > the main > > version of the tragedy says that a thermal protection tile of the > rocket's > > fuel tank was lost during liftoff, then it hit the nose of the > left-wing > > heat-resisting covering and destroyed it. > > The NASA version is that FOAM came off and smashed against the wing. > A thermal protection tile would NEVER break apart like in the video seen > on > CNN and such (would it? I'm not a rocket scientist. But they did say it > was > foam). > > > This was observed at the liftoff > > moment, but NASA specialists decided that the damage was insignificant > and > > couldn't hamper return of the shuttle. Butt they were mistaken. > > How does this person know this? NASA *still* says this wasn't the cause. > - ------ > Shuttle program manager Ronald Dittemore told reporters today they were, > in > effect, mistaken if they assumed from previous briefings the Columbia > disaster investigation was focused primarily on the possibility foam > debris > from the ship's external tank triggered the orbiter's destruction during > entry Saturday [... ] > "As I mentioned before, we're trying to find the missing link and as you > focus your attention on the debris, we're focusing our attention on what > we > didn't see. We believe there's something else. And that's why we're doing > a > fault tree analysis and that's why we're investigating every area. Right > now, > it just doesn't make sense to us that a piece of (foam) debris could be > the > root cause of the loss of Columbia and its crew. It's got to be another > reason." > [...] > "So it's something else. It's something else." > - ------- > http://www.spaceflightnow.com/shuttle/sts107/030205foam/ > http://www.spaceflightnow.com/shuttle/sts107/status.html > > > As my > > experience shows, majority of NASA employees are engineers working > there > > right after graduation from institutes or under the patronage of some > > influential persons. > > This is just nasty. If I remember correctly about 80% of the people > working > on the Apollo program were under 30, and all three Apollo 11 astronauts > were > exactly 30. As a man under 30 myself, I take offense to this comment. > Yes, > It'd be great if they all were thousand-year-old wisards, but this is > insulting. I don't know, maybe I'm reading too much into this. > > > What is more, NASA's success is achieved not due to > > the greatness of the personnel, but because of US's large-scale > financing > > of space explorations (it is 30 times more than total financing of the > rest > > countries of the world spent on space exploration). > > Now money sends people into space? Bah. > > > The only thing that the astronauts > > realized was that the damage was considerable and they would be > inevitably > > burnt down at approaching the Earth. > > Uhm... then why was everyone so surprised? > > > The tragedy occurred basically through the fault of the company > Lockheed > > Martin, > > Thank you. Now everyone can drop their investigations. This person > obviously > knows what caused the accident. Shut down NASA too, this person can > probably > send people to Mars as well. > > What is it with the tradition of first finding someone to blame, and then > finding out what happened? > > > Breaking of > > the fuel tank isolation occurred with this shuttle even earlier, in > 1992. > > But damages were insignificant that time, that is why no tragedy > occurred. > > What a pity that NASA didn't pay special attention to the problem! > > I'm sure they ignored it. > They sure paid attention to it when foam came off the fuel tank last > time, > which was two trips ago for Columbia. > > - --------- > typedef struct me_s { > char name[] = { "Thomas Habets" }; > char email[] = { "thomas@h..." }; > char kernel[] = { "Linux 2.4" }; > char *pgpKey[] = { "http://www.habets.pp.se/pubkey.txt" }; > char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; > char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; > } me_t; > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.6 (GNU/Linux) > Comment: For info see http://www.gnupg.org > > iD8DBQE+Q8vnKGrpCq1I6FQRArEnAKDEPuaBs3CzeVeKXl6EDnx7OWVWMACgz7/O > CiJGbTPdjZyRH2FYe0wz51I= > =jAYM > -----END PGP SIGNATURE----- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > 6891 From: infospy Date: Sat Feb 8, 2003 8:20am Subject: Re: Shuttle Article...Interesting... Anyone that watched the first news conference from NASA, and then listened to the news casters, had to wonder if they were at the same meeting. \ JMHO ----- Original Message ----- From: "Thomas Habets" To: "Ocean Group" ; "TSCM Group" Sent: Friday, February 07, 2003 9:08 AM Subject: Re: [TSCM-L] Shuttle Article...Interesting... > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > > This is the worst article on the subject I've seen yet. See comments below. > (there are other minor flaws I chose not to comment on) > > On Thursday 06 February 2003 18:04, Ocean Group wrote: > > > the main > > version of the tragedy says that a thermal protection tile of the rocket's > > fuel tank was lost during liftoff, then it hit the nose of the left-wing > > heat-resisting covering and destroyed it. > > The NASA version is that FOAM came off and smashed against the wing. > A thermal protection tile would NEVER break apart like in the video seen on > CNN and such (would it? I'm not a rocket scientist. But they did say it was > foam). > > > This was observed at the liftoff > > moment, but NASA specialists decided that the damage was insignificant and > > couldn't hamper return of the shuttle. Butt they were mistaken. > > How does this person know this? NASA *still* says this wasn't the cause. > - ------ > Shuttle program manager Ronald Dittemore told reporters today they were, in > effect, mistaken if they assumed from previous briefings the Columbia > disaster investigation was focused primarily on the possibility foam debris > from the ship's external tank triggered the orbiter's destruction during > entry Saturday [... ] > "As I mentioned before, we're trying to find the missing link and as you > focus your attention on the debris, we're focusing our attention on what we > didn't see. We believe there's something else. And that's why we're doing a > fault tree analysis and that's why we're investigating every area. Right now, > it just doesn't make sense to us that a piece of (foam) debris could be the > root cause of the loss of Columbia and its crew. It's got to be another > reason." > [...] > "So it's something else. It's something else." > - ------- > http://www.spaceflightnow.com/shuttle/sts107/030205foam/ > http://www.spaceflightnow.com/shuttle/sts107/status.html > > > As my > > experience shows, majority of NASA employees are engineers working there > > right after graduation from institutes or under the patronage of some > > influential persons. > > This is just nasty. If I remember correctly about 80% of the people working > on the Apollo program were under 30, and all three Apollo 11 astronauts were > exactly 30. As a man under 30 myself, I take offense to this comment. Yes, > It'd be great if they all were thousand-year-old wisards, but this is > insulting. I don't know, maybe I'm reading too much into this. > > > What is more, NASA's success is achieved not due to > > the greatness of the personnel, but because of US's large-scale financing > > of space explorations (it is 30 times more than total financing of the rest > > countries of the world spent on space exploration). > > Now money sends people into space? Bah. > > > The only thing that the astronauts > > realized was that the damage was considerable and they would be inevitably > > burnt down at approaching the Earth. > > Uhm... then why was everyone so surprised? > > > The tragedy occurred basically through the fault of the company Lockheed > > Martin, > > Thank you. Now everyone can drop their investigations. This person obviously > knows what caused the accident. Shut down NASA too, this person can probably > send people to Mars as well. > > What is it with the tradition of first finding someone to blame, and then > finding out what happened? > > > Breaking of > > the fuel tank isolation occurred with this shuttle even earlier, in 1992. > > But damages were insignificant that time, that is why no tragedy occurred. > > What a pity that NASA didn't pay special attention to the problem! > > I'm sure they ignored it. > They sure paid attention to it when foam came off the fuel tank last time, > which was two trips ago for Columbia. > > - --------- > typedef struct me_s { > char name[] = { "Thomas Habets" }; > char email[] = { "thomas@h..." }; > char kernel[] = { "Linux 2.4" }; > char *pgpKey[] = { "http://www.habets.pp.se/pubkey.txt" }; > char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; > char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; > } me_t; > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.6 (GNU/Linux) > Comment: For info see http://www.gnupg.org > > iD8DBQE+Q8vnKGrpCq1I6FQRArEnAKDEPuaBs3CzeVeKXl6EDnx7OWVWMACgz7/O > CiJGbTPdjZyRH2FYe0wz51I= > =jAYM > -----END PGP SIGNATURE----- > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6892 From: Ocean Group Date: Sat Feb 8, 2003 8:29am Subject: RE: Shuttle Article...Interesting... Good point...to be honest I think I'd rather wait for the official NASA explanation. The article was also translated so some liberties could have been taken. But there's too many technical inaccuracies in the article for the author that maintains he knows something about it all. Regards Vance Deran Ocean Group, Technical Security Division, Ireland. ____________________________________________________________________ Message: 2 Date: Fri, 7 Feb 2003 19:10:22 -0800 From: "Matt Paulsen" Subject: RE: Shuttle Article...Interesting... FUD. Just factor in who's agenda you're reading from. ------ >This is the worst article on the subject I've seen yet. See comments below. >(there are other minor flaws I chose not to comment on) ________________________________________________________________________ 6893 From: A.Lizard Date: Sat Feb 8, 2003 3:18pm Subject: YOU may have an affected computer Note: for the kind of info most of us will be most interested in, google for the Gary Headlee site referenced in the article. While I generally wouldn't post a computer story to this list, any of us might have an affected computer and the great majority of us are capable of doing the indicated repair, if this is done before the motherboard power filter caps blow up. Also note that some motherboard manufacturers are trying to handle this problem via legal threats made against anyone who discusses their defective products. I'd like to know who those manufacturers are so that I will NEVER buy any of their products. A.Lizard http://www.spectrum.ieee.org/WEBONLY/resource/feb03/ncap.html Thu 06 Feb 03 17:52 1600 GMT Home >>News & Analysis FAULTS & FAILURES Leaking Capacitors Muck up Motherboards Finger-pointing and fury as manufacturers try to dodge blame It has all the elements of a good thriller: a stolen secret formula, bungled corporate espionage, untraceable goods, and lone wolves saving the little guy from the misdeeds of multinational corporations. In this case, a mistake in the stolen formulation of the electrolyte in a capacitor has wrecked hundreds of PCs and may wreck still more in what is an industrywide problem. Aluminum electrolytic capacitors with a low equivalent series resistance (ESR) are high-capacitance components that generally serve to smooth out the power supply to chips. Throughout 2002, they have been breaking open and failing in certain desktop PCs. Motherboard and PC makers contacted by IEEE Spectrum have stopped using the faulty parts, but because the parts can fail over a period of several months, more such failures are expected. So far, the only motherboard maker to admit to the problem is ABIT Computer Corp. (Taipei), and the only major PC maker to acknowledge being affected is IBM Corp. But the problem is likely to be more widespread. Indeed, those who have repaired the damaged boards say that they have encountered crippled motherboards from Micro-Star International, ASUSTek Computer, Gigabyte Technology, and others. For Gary Headlee, who repairs electronics in Midvale, Utah, the trouble surfaced at the end of 2001, when users of PCs with ABIT motherboards began to complain of leaking capacitors. Headlee's solution was to replace all the low-ESR aluminum electrolytic capacitors of 1000 microfarads or over. By last summer he was receiving as many as 10 broken boards through the mail every day, and he estimates he has fixed 1200 boards so far. At about the same time, Carey Holzman, who builds and sells custom PCs, noticed the identical problem in non-ABIT computers he had sold and others he was asked to repair [see photo]. In 12 years of PC repair, "I've never seen anything like it," says Holzman, owner of Computer Performance Specialists (Glendale, Ariz.). It is clear now that a faulty electrolyte is to blame for the burst capacitors. The mystery is: where did it come from and which manufacturers used it? Citing Japanese sources, initial reports claimed that major Taiwanese capacitor firms, including the island's market leaders, Lelon Electronics Corp. and Luxon Electronics Corp., had turned out faulty products. But both companies have denied the accusations. Most of the leaking capacitors pulled from bad boards in the United States, according to repair people, were labeled Tayeh, not a brand affiliated with known capacitor makers. Many others were unmarked. Some, however, did bear the trademarks of Taiwanese passive components firms such as Jackcon Capacitor Electronics Co. (Taipei). Jackcon claims that it has been out of the motherboard market for two years but received some complaints from U.S. consumers in 2002. John Ko, its managing director, blames the motherboard design and remains confident in the quality of Jackcon products. According to Ko, the company's low-ESR capacitors passed quality tests at the Industrial Technology Research Institute (Hsinchu, Taiwan), a nonprofit R&D organization partly funded by the Ministry of Economic Affairs (Taipei), which is also often the source of Taiwanese firms' electrolyte formulas. What happened? The origins of the motherboard malaise seem a lesson in how not to commit corporate espionage. A well-placed source in Taiwan, who did not wish to be identified, largely confirmed for Spectrum accounts published in the United States that were based on sources in the Japanese electronics industry. According to the source, a scientist stole the formula for an electrolyte from his employer in Japan and began using it himself at the Chinese branch of a Taiwanese electrolyte manufacturer. He or his colleagues then sold the formula to an electrolyte maker in Taiwan, which began producing it for Taiwanese and possibly other capacitor firms. Unfortunately, the formula as sold was incomplete. "It didn't have the right additives," says Dennis Zogbi, publisher of Passive Component Industry magazine (Cary, N.C.), which broke the story last fall. According to Zogbi's sources, the capacitors made from the formula become unstable when charged, generating hydrogen gas, bursting, and letting the electrolyte leak onto the circuit board. Zogbi cites tests by Japanese manufacturers that indicate the capacitor's lifetimes are half or less of the 4000 hours of continuous ripple current they are rated for. Electronics makers are ordinarily very careful about capacitor quality. "The large volumes of passive content in any electronic device means that you have that many more chances for a product to fail," says Zogbi, who also runs The Paumanok Group (Cary, N.C.), a market analysis firm focused on the passive components industry. Electronics firms generally supply their manufacturers with a list of parts and materials they can use from suppliers whose quality they trust. Zogbi suspects that, in an effort to cut costs, contract manufacturers used dodgy component sources that were not on the approved list. Major Taiwanese capacitor makers have vigorously denied having made any bad components, but the crisis has had a chilling effect on the island's whole industry, which produces 30 percent of the world's aluminum electrolytic capacitors. "Many buyers refused to maintain their relationship with Taiwanese firms," says Francis Tsai, spokesman for Luxon Electronics (Taipei), the second-largest aluminum electrolytic capacitor maker in Taiwan. ABIT, which is arguably the hardest hit, now is going to Japan for its capacitors. Exploding capacitors blow the lid off a case of intellectual property theft in the electronics industry The effect on Lien Yan (Taichung, Taiwan), the company accused of buying the stolen formula and selling the faulty electrolyte, has been just as devastating. The firm has vehemently denied the accusations, but it has lost 30 percent of its orders since the problems came to light, says C.H. Lee, a manager at Lien Yan. The company normally produces more than 60 tons of electrolyte monthly for customers in Taiwan, China, and Japan. Currently, Lee says, orders are only from small local firms. Lien Yan and Taiwanese capacitor makers claim they are the victims of a smear campaign by Japanese competitors who are saying that all Taiwanese capacitor makers are tainted. The price ratio of Japanese products to Taiwanese was about four to one, according to Lee, and Japanese firms may be trying to win back lost market share. Lien Yan's Lee says that Japanese customers who stopped buying from his company even showed the firm internal documents written in Japanese that state that any relationship with Lien Yan would lead to boycotts on the part of the Japanese firm's customers. (The notices often misspelled Lien Yan as "Lein Yan" or "Lenyan.") "After checking all names of [capacitor] companies accused by Japanese companies, we discovered that almost all had never purchased our products," Lien Yan said in a statement. Soldering in silence While Taiwanese passives makers are trying to shore up relations with their customers, some of the computer firms affected are doing the same. ABIT says it will replace or fix defective boards its customers send it. IBM says it alerted those customers it believes are most likely to be affected and is handling repairs under warranty. Other manufacturers have been less helpful. As Gary Headlee's capacitor replacement side business grew, he began receiving damaged boards built by other companies besides ABIT. But when he posted the list of other boards on his Web site, he received letters from lawyers representing two manufacturers, prompting him to pull the posting. Carey Holzman, as a builder of custom PCs, has been trying to raise awareness about the defects since last spring. He thinks manufacturers should be more public about the problem and issue a recall. "Main board replacement is a big job. It's a huge amount of downtime for the user," he says. Failures can also occur after the warranty has expired, he points out. "The manufacturers should do the right thing." ≠Yu-Tzu Chiu (Taipei) & Samuel K. Moore PHOTO: CAREY HOLZMAN Home | Search | Table of Contents | IEEE Job Site | Advertising | Top Copyright | Terms & Conditions | Privacy & Security | Subscription Problems | Contact URL: http://www.spectrum.ieee.org (Modified: 31 January 2003) ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "They who would give up an essential liberty for temporary security, deserve neither liberty or security." Benjamin Franklin Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... PGP 7.0.3 key available by request,keyserver,or on my Web site Download PGP from http://www.pgpi.org for e-mail privacy. PGPfone v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ Disaster prep info: http://www.ecis.com/~alizard/y2k.html ************************************************************************ 6894 From: infospy Date: Fri Feb 7, 2003 9:12pm Subject: Re: Shuttle Article...Interesting... I'm not any kind of specialist in this field. However "Thiokol," was not "declared one of the party at fault of the catastrophe". Thiokol manufactured the product. Thiokol notified NASA before the liftoff that it was out of bounds. >the main version of the tragedy says that a thermal protection tile of the >rocket's fuel tank was lost during liftoff, then it hit the nose of the left->wing heat-resisting covering and destroyed it. I do not believe the fuel tank has any tiles on it. It's covered with a Styrofoam type material. Other things in this report don't ring right with me. If it had not been authored by person with such a background I would look at as "trolling" on some news group. I'll wait for the report form them that know (?) before I decide. Howard Phillips N.E.W. Security Service ----- Original Message ----- From: "Thomas Habets" To: "Ocean Group" ; "TSCM Group" Sent: Friday, February 07, 2003 9:08 AM Subject: Re: [TSCM-L] Shuttle Article...Interesting... > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > > This is the worst article on the subject I've seen yet. See comments below. > (there are other minor flaws I chose not to comment on) > > On Thursday 06 February 2003 18:04, Ocean Group wrote: > > > the main > > version of the tragedy says that a thermal protection tile of the rocket's > > fuel tank was lost during liftoff, then it hit the nose of the left-wing > > heat-resisting covering and destroyed it. > > The NASA version is that FOAM came off and smashed against the wing. > A thermal protection tile would NEVER break apart like in the video seen on > CNN and such (would it? I'm not a rocket scientist. But they did say it was > foam). > > > This was observed at the liftoff > > moment, but NASA specialists decided that the damage was insignificant and > > couldn't hamper return of the shuttle. Butt they were mistaken. > > How does this person know this? NASA *still* says this wasn't the cause. > - ------ > Shuttle program manager Ronald Dittemore told reporters today they were, in > effect, mistaken if they assumed from previous briefings the Columbia > disaster investigation was focused primarily on the possibility foam debris > from the ship's external tank triggered the orbiter's destruction during > entry Saturday [... ] > "As I mentioned before, we're trying to find the missing link and as you > focus your attention on the debris, we're focusing our attention on what we > didn't see. We believe there's something else. And that's why we're doing a > fault tree analysis and that's why we're investigating every area. Right now, > it just doesn't make sense to us that a piece of (foam) debris could be the > root cause of the loss of Columbia and its crew. It's got to be another > reason." > [...] > "So it's something else. It's something else." > - ------- > http://www.spaceflightnow.com/shuttle/sts107/030205foam/ > http://www.spaceflightnow.com/shuttle/sts107/status.html > > > As my > > experience shows, majority of NASA employees are engineers working there > > right after graduation from institutes or under the patronage of some > > influential persons. > > This is just nasty. If I remember correctly about 80% of the people working > on the Apollo program were under 30, and all three Apollo 11 astronauts were > exactly 30. As a man under 30 myself, I take offense to this comment. Yes, > It'd be great if they all were thousand-year-old wisards, but this is > insulting. I don't know, maybe I'm reading too much into this. > > > What is more, NASA's success is achieved not due to > > the greatness of the personnel, but because of US's large-scale financing > > of space explorations (it is 30 times more than total financing of the rest > > countries of the world spent on space exploration). > > Now money sends people into space? Bah. > > > The only thing that the astronauts > > realized was that the damage was considerable and they would be inevitably > > burnt down at approaching the Earth. > > Uhm... then why was everyone so surprised? > > > The tragedy occurred basically through the fault of the company Lockheed > > Martin, > > Thank you. Now everyone can drop their investigations. This person obviously > knows what caused the accident. Shut down NASA too, this person can probably > send people to Mars as well. > > What is it with the tradition of first finding someone to blame, and then > finding out what happened? > > > Breaking of > > the fuel tank isolation occurred with this shuttle even earlier, in 1992. > > But damages were insignificant that time, that is why no tragedy occurred. > > What a pity that NASA didn't pay special attention to the problem! > > I'm sure they ignored it. > They sure paid attention to it when foam came off the fuel tank last time, > which was two trips ago for Columbia. > > - --------- > typedef struct me_s { > char name[] = { "Thomas Habets" }; > char email[] = { "thomas@h..." }; > char kernel[] = { "Linux 2.4" }; > char *pgpKey[] = { "http://www.habets.pp.se/pubkey.txt" }; > char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; > char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; > } me_t; > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.6 (GNU/Linux) > Comment: For info see http://www.gnupg.org > > iD8DBQE+Q8vnKGrpCq1I6FQRArEnAKDEPuaBs3CzeVeKXl6EDnx7OWVWMACgz7/O > CiJGbTPdjZyRH2FYe0wz51I= > =jAYM > -----END PGP SIGNATURE----- > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6895 From: A.Lizard Date: Sat Feb 8, 2003 4:35pm Subject: Re: Shuttle Article...Interesting... At 11:19 AM 2/8/03 +0000, you wrote: Personally, I prefer the Pravda piece to the tribute articles that talk about the bravery of the astronauts and not the failure of will at a national level that put them into an ancient deathtrap to begin with. At least they're willing to suggest that there may be an organizational / management problems. There is NOTHING sacred about NASA. The most important question to ask about the shuttle disaster is: WHY are we putting people into space in a Shuttle older than the average public transit bus? If the politicians and the public aren't willing to spend the cash to buy safer replacements based on current technology, the government has no right to ask people, no matter how brave, dedicated, and willing to spend their lives to make up the difference. If we aren't ready to build better space transportation than a shuttle designed around the best 1970s technology, the manned space program should be shut down and nations willing to spend the money to buy the talent needed to make a manned space program work right should take over the lead. However, the competition is already at work, China's already planning a manned space venture. It may well be that when you can buy tickets at your local travel agency for a vacation or your next job somewhere up there, the tickets will be printed in Chinese. Or in Indian. Or maybe the European Union will get its act together. While there are *no* safe forms of transportation, we've been putting people into orbit for over 40 years. How long was it between the Wright Brothers' first flight and the DC-3? Technology has moved a lot faster between 1960 and 2000 than it did between 1963 and 2003. A ride into earth orbit should be comparable in safety to a commercial airliner ride. Perhaps if NASA were using vehicles based on 40 years experience with orbital transportation and not 10, orbital flights would in fact be safe and routine. The place for the present Shuttle fleet is in the National Air & Space Museum, not in the air. Kids should see the shuttles besides Mercury and Gemini and Apollo and wonder at the bravery of people who actually would climb into those things and fly them into space. BTW, space.com says that the Feds are planning to keep the Shuttle fleet in use until 2025. So we can look forward to either our astronauts returning to earth in carbonized chunks or the public shutting down the space program. Allegations of NASA program mismanagement from ex-insiders: Dian Hardison http://www.counterpunch.org/hardison02012003.html Don Nelson http://www.observer.co.uk/international/story/0,6903,887236,00.html An interesting upper atmosphere electrical discharge phenomena that's the dark horse candidate for proximate cause of shuttle destruction: http://sfgate.com/cgi-bin/article.cgi?file=/c/a/2003/02/07/MN200326.DTL While the investigation should certainly continue to improve the safety of aviation (the Shuttle broke up in the upper atmosphere), I think we *all* know the primary cause and who's to blame. A.Lizard >Message: 1 > Date: Fri, 7 Feb 2003 16:08:16 +0100 > From: Thomas Habets >Subject: Re: Shuttle Article...Interesting... > >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > > >This is the worst article on the subject I've seen yet. See comments below. >(there are other minor flaws I chose not to comment on) > >On Thursday 06 February 2003 18:04, Ocean Group wrote: > > > the main > > version of the tragedy says that a thermal protection tile of the rocket's > > fuel tank was lost during liftoff, then it hit the nose of the left-wing > > heat-resisting covering and destroyed it. > >The NASA version is that FOAM came off and smashed against the wing. >A thermal protection tile would NEVER break apart like in the video seen on >CNN and such (would it? I'm not a rocket scientist. But they did say it was >foam). > > > This was observed at the liftoff > > moment, but NASA specialists decided that the damage was insignificant and > > couldn't hamper return of the shuttle. Butt they were mistaken. > >How does this person know this? NASA *still* says this wasn't the cause. >- ------ >Shuttle program manager Ronald Dittemore told reporters today they were, in >effect, mistaken if they assumed from previous briefings the Columbia >disaster investigation was focused primarily on the possibility foam debris >from the ship's external tank triggered the orbiter's destruction during >entry Saturday [... ] >"As I mentioned before, we're trying to find the missing link and as you >focus your attention on the debris, we're focusing our attention on what we >didn't see. We believe there's something else. And that's why we're doing a >fault tree analysis and that's why we're investigating every area. Right now, >it just doesn't make sense to us that a piece of (foam) debris could be the >root cause of the loss of Columbia and its crew. It's got to be another >reason." >[...] >"So it's something else. It's something else." >- ------- >http://www.spaceflightnow.com/shuttle/sts107/030205foam/ >http://www.spaceflightnow.com/shuttle/sts107/status.html > > > As my > > experience shows, majority of NASA employees are engineers working there > > right after graduation from institutes or under the patronage of some > > influential persons. > >This is just nasty. If I remember correctly about 80% of the people working >on the Apollo program were under 30, and all three Apollo 11 astronauts were >exactly 30. As a man under 30 myself, I take offense to this comment. Yes, >It'd be great if they all were thousand-year-old wisards, but this is >insulting. I don't know, maybe I'm reading too much into this. > > > What is more, NASA's success is achieved not due to > > the greatness of the personnel, but because of US's large-scale financing > > of space explorations (it is 30 times more than total financing of the rest > > countries of the world spent on space exploration). > >Now money sends people into space? Bah. > > > The only thing that the astronauts > > realized was that the damage was considerable and they would be inevitably > > burnt down at approaching the Earth. > >Uhm... then why was everyone so surprised? > > > The tragedy occurred basically through the fault of the company Lockheed > > Martin, > >Thank you. Now everyone can drop their investigations. This person obviously >knows what caused the accident. Shut down NASA too, this person can probably >send people to Mars as well. > >What is it with the tradition of first finding someone to blame, and then >finding out what happened? > > > Breaking of > > the fuel tank isolation occurred with this shuttle even earlier, in 1992. > > But damages were insignificant that time, that is why no tragedy occurred. > > What a pity that NASA didn't pay special attention to the problem! > >I'm sure they ignored it. >They sure paid attention to it when foam came off the fuel tank last time, >which was two trips ago for Columbia. > >- --------- >typedef struct me_s { > char name[] = { "Thomas Habets" }; > char email[] = { "thomas@h..." }; > char kernel[] = { "Linux 2.4" }; > char *pgpKey[] = { "http://www.habets.pp.se/pubkey.txt" }; > char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; > char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; >} me_t; > >-----BEGIN PGP SIGNATURE----- >Version: GnuPG v1.0.6 (GNU/Linux) >Comment: For info see http://www.gnupg.org > >iD8DBQE+Q8vnKGrpCq1I6FQRArEnAKDEPuaBs3CzeVeKXl6EDnx7OWVWMACgz7/O >CiJGbTPdjZyRH2FYe0wz51I= >=jAYM >-----END PGP SIGNATURE----- > ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "They who would give up an essential liberty for temporary security, deserve neither liberty or security." Benjamin Franklin Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... PGP 7.0.3 key available by request,keyserver,or on my Web site Download PGP from http://www.pgpi.org for e-mail privacy. PGPfone v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ Disaster prep info: http://www.ecis.com/~alizard/y2k.html ************************************************************************ 6896 From: Andre Holmes <1ach@g...> Date: Sun Feb 9, 2003 11:04am Subject: Carolines Modulation Curves! - Ross Revenge Greetings I was tuning my SA and ran across some modulations that I never seen before, so I started surveying some mod-schemes heres a start of my search. ANDRE HOLMES http://www.rossrevenge.co.uk/tx/scope.htm [Non-text portions of this message have been removed] 6897 From: Mitch D Date: Sat Feb 8, 2003 0:01pm Subject: Organic Antenna Interesting site about research done by a "HAM" on using a tree for a vhf/uhf antenna. http://www.qsl.net/kf4bwg/ __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6898 From: Michael Puchol Date: Mon Feb 10, 2003 1:38am Subject: Re: Shuttle Article...Interesting... (off-topic) I recommend to those interested reading these two documents: http://www.nasa.gov/formedia/MP_risk_tiles_1994.pdf and http://spaceflight.nasa.gov/shuttle/investigation/tps_safety.pdf which cover the risk and risk management in the ceramic tiles which protect the shuttle from reentry heat. In my oppinion, the piece of foam (carbon reinforced, bear this in mind - this is not just simple styrofoam like we get in takeaway coffees) was large enough to cause one or more tiles to detach from the wing. The point of maximum aerodynamic stress for the shuttle during launch is at 60 seconds, and the piece of foam hit at 80 seconds, meaning that the shuttle was accelerating at an enormous rate. Not knowing the weight of the debris I can't calculate the impact force it would have hit with (although NASA stated that their engineers calculated that it wasn't enough to cause serious damage), but it would be an enourmous force in any case. Since the ceramic tiles are hard but extremely brittle (try it with a normal ceramic tile like the ones used to pave homes, they don't differ that much in strenght as those in the shuttle, a very light impact will crack them), I cannot see how they still refuse to see the obvious. The Columbia (and other shuttles) have suffered from total or partial ceramic tile failure in past flight. It isn't so uncommon to be hit by debris, and not only coming from the shuttle, but space debris, for example. Another test you can do at home to see the difference in impact-bearing capacity by a structure under stress or not, is to grab a small lenght of thin plastic like from a rubbish bag or similar, hold each end in one hand, and leave it lax. Get someone to (gently) stab at it with a pointy object, like a screwdriver - it won't be easy to cut or break. Now, try applying tension to the plastic, pulling your hands away from each other - it will be cut in two by a gentle prod of the sharp object. The shuttle's surfaces 80 seconds after launch were in similar stress conditions as the tensed plastic. During reentry, it's not only heat but extreme aerodynamic forces that affect the shuttle, thus if we couple a few missing tiles with extreme heat capable of melting the underlying aluminium alloys, plus forces high enough to crush a damaged structure, a catastrophic failure doesn't seem too impossible under the circumstances. I do believe however that the mission profile was such that it didn't allow for a different course of action, such as travelling to the ISS to use as a lifeboat, or arranging for a spacewalk to fix the tiles (they didn't have either a MMS or spares and tools), which meant that they could only hope nothing happened. But it did. Spaceflight is risky, the extremes encountered in any mission are only overcome by excellent engineering, and better manufacturing processes - the best that can be done is analyze the problem, determine it's cause, and fix it, finger pointing and told-you-so won't acomplish anything. Regards, and sorry about the off-topic. Mike ----- Original Message ----- From: "infospy" To: "TSCM Group" Sent: Saturday, February 08, 2003 4:12 AM Subject: Re: [TSCM-L] Shuttle Article...Interesting... > I'm not any kind of specialist in this field. However "Thiokol," was not > "declared one of the party at fault of the catastrophe". Thiokol > manufactured the product. Thiokol notified NASA before the liftoff that it > was out of bounds. > > >the main version of the tragedy says that a thermal protection tile of the > >rocket's fuel tank was lost during liftoff, then it hit the nose of the > left->wing heat-resisting covering and destroyed it. > > I do not believe the fuel tank has any tiles on it. It's covered with a > Styrofoam type material. > > Other things in this report don't ring right with me. If it had not been > authored by person with such a background I would look at as "trolling" on > some news group. > > I'll wait for the report form them that know (?) before I decide. > > Howard Phillips > N.E.W. Security Service > > > ----- Original Message ----- > From: "Thomas Habets" > To: "Ocean Group" ; "TSCM Group" > Sent: Friday, February 07, 2003 9:08 AM > Subject: Re: [TSCM-L] Shuttle Article...Interesting... > > > > -----BEGIN PGP SIGNED MESSAGE----- > > Hash: SHA1 > > > > > > This is the worst article on the subject I've seen yet. See comments > below. > > (there are other minor flaws I chose not to comment on) > > > > On Thursday 06 February 2003 18:04, Ocean Group wrote: > > > > > the main > > > version of the tragedy says that a thermal protection tile of the > rocket's > > > fuel tank was lost during liftoff, then it hit the nose of the left-wing > > > heat-resisting covering and destroyed it. > > > > The NASA version is that FOAM came off and smashed against the wing. > > A thermal protection tile would NEVER break apart like in the video seen > on > > CNN and such (would it? I'm not a rocket scientist. But they did say it > was > > foam). > > > > > This was observed at the liftoff > > > moment, but NASA specialists decided that the damage was insignificant > and > > > couldn't hamper return of the shuttle. Butt they were mistaken. > > > > How does this person know this? NASA *still* says this wasn't the cause. > > - ------ > > Shuttle program manager Ronald Dittemore told reporters today they were, > in > > effect, mistaken if they assumed from previous briefings the Columbia > > disaster investigation was focused primarily on the possibility foam > debris > > from the ship's external tank triggered the orbiter's destruction during > > entry Saturday [... ] > > "As I mentioned before, we're trying to find the missing link and as you > > focus your attention on the debris, we're focusing our attention on what > we > > didn't see. We believe there's something else. And that's why we're doing > a > > fault tree analysis and that's why we're investigating every area. Right > now, > > it just doesn't make sense to us that a piece of (foam) debris could be > the > > root cause of the loss of Columbia and its crew. It's got to be another > > reason." > > [...] > > "So it's something else. It's something else." > > - ------- > > http://www.spaceflightnow.com/shuttle/sts107/030205foam/ > > http://www.spaceflightnow.com/shuttle/sts107/status.html > > > > > As my > > > experience shows, majority of NASA employees are engineers working there > > > right after graduation from institutes or under the patronage of some > > > influential persons. > > > > This is just nasty. If I remember correctly about 80% of the people > working > > on the Apollo program were under 30, and all three Apollo 11 astronauts > were > > exactly 30. As a man under 30 myself, I take offense to this comment. Yes, > > It'd be great if they all were thousand-year-old wisards, but this is > > insulting. I don't know, maybe I'm reading too much into this. > > > > > What is more, NASA's success is achieved not due to > > > the greatness of the personnel, but because of US's large-scale > financing > > > of space explorations (it is 30 times more than total financing of the > rest > > > countries of the world spent on space exploration). > > > > Now money sends people into space? Bah. > > > > > The only thing that the astronauts > > > realized was that the damage was considerable and they would be > inevitably > > > burnt down at approaching the Earth. > > > > Uhm... then why was everyone so surprised? > > > > > The tragedy occurred basically through the fault of the company Lockheed > > > Martin, > > > > Thank you. Now everyone can drop their investigations. This person > obviously > > knows what caused the accident. Shut down NASA too, this person can > probably > > send people to Mars as well. > > > > What is it with the tradition of first finding someone to blame, and then > > finding out what happened? > > > > > Breaking of > > > the fuel tank isolation occurred with this shuttle even earlier, in > 1992. > > > But damages were insignificant that time, that is why no tragedy > occurred. > > > What a pity that NASA didn't pay special attention to the problem! > > > > I'm sure they ignored it. > > They sure paid attention to it when foam came off the fuel tank last time, > > which was two trips ago for Columbia. > > > > - --------- > > typedef struct me_s { > > char name[] = { "Thomas Habets" }; > > char email[] = { "thomas@h..." }; > > char kernel[] = { "Linux 2.4" }; > > char *pgpKey[] = { "http://www.habets.pp.se/pubkey.txt" }; > > char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; > > char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; > > } me_t; > > > > -----BEGIN PGP SIGNATURE----- > > Version: GnuPG v1.0.6 (GNU/Linux) > > Comment: For info see http://www.gnupg.org > > > > iD8DBQE+Q8vnKGrpCq1I6FQRArEnAKDEPuaBs3CzeVeKXl6EDnx7OWVWMACgz7/O > > CiJGbTPdjZyRH2FYe0wz51I= > > =jAYM > > -----END PGP SIGNATURE----- > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 6899 From: Steve Uhrig Date: Mon Feb 10, 2003 9:59am Subject: Re: Unknown modulation On 9 Feb 2003 at 12:04, Andre Holmes wrote: > I was tuning my SA and ran across some modulations that I never seen > before, so I started surveying some mod-schemes heres a start of my > search. Do you live near: 1)An AM radio broadcast station? 2)A ham radio operator (within a block or two?). You frequently can identify them by towers and large directional antennas. 3)A CB operator maybe running illegal high power? Or within a few hundred feet of one running legal power? What you have described from the other website is signals from a pure textbook AM transmitter. I listed above the most likely sources, but there can be others. Do you hear anything when you try to demodulate the signal? That will tell you for sure what it is. If it sounds like Donald Duck, it's single sideband which most likely would be CB or amateur (ham). What you are seeing is the 'modulation envelope'. Straight out of the textbook. Extremely unlikely to be hostile transmissions. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6900 From: Steve Uhrig Date: Mon Feb 10, 2003 11:23am Subject: Lunatic on this list - AONN Back in late December, the following lunatic posted the below message to this list: =========== AccessOneNetworkNorthwest AONNRecords Date: Thu Dec 26, 2002 1:12 pm Subject: Op We have formed a new multiagency CT task force which is currently open only to active U.S. government personnel. If you are qualified and would like to get involved please call 206.666.8070. There is always someone in our office 247, therefore you may call at any time. Also, the TSCM moderator has been contacted and provided the Congressional summary in .pdf format for those interested. I can't guarantee that the file will be provided to you by the list owner, as we simply thought that we would at least try to make it available in that way. This project involves the highest conceivable level of what the TSCM group exercises. =========== This person, who falsely claimed to be a government agent and representing a government agency, had called my office asking for some information I perceived as sensitive, and he didn't seem legit. Neither did his website. I made a contact report to the local FBI field office near him, and he was quietly taken down. Here are some details: http://news.com.com/2100-1023-983384.html This gentleman still is trying to pry sensitive information out of certain members of this list. Those members tend to be among the more savvy, and are not being fooled. If Robert Taylor or anyone claiming to represent DSIN or AONN contacts you, be aware the person and agency is fraudulent. It would not be wise to discuss anything of substance with him. Mr. Taylor has been removed from this list, but he may have changed his profile and resubscribed. We don't know and don't care. He's been exposed as a con artist. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6901 From: William Knowles Date: Mon Feb 10, 2003 11:51am Subject: AONN, R.L. Taylor III bio and photo Hello all! The new site for AONN since their .gov was pulled is this... http://www.dsispecialaccess.net/ I understand that any time someone had a question about AONN, they would shoot off a 122 page .PDF file, I would love a copy if anyone recieved this from them. Robert L. Taylor or R.L. Taylor is quite a character, with a bio the reads like its off the cDc's webpage... http://www.flash.net/~manniac/corp2.htm [...] What many folks don't realize is this is the same kid who in 1977 was in a special program for 2 year olds to learn Franklin computer architecture at Everett High School and similar programs at other institutions of academia. This is the same kid who subsequently began to design supercomputers at age 2 and a half, had his whole school curriculum and grading system faked, and whose father is a sociologist, military investigations retired, and mother a communications intelligence officer retired supposedly. This kid is no geek. This is the same track star, gymnast, marksman, video game champion who confidential sources indicate was somehow granted an assassination clearance. This is the same kid who when everyone else seemed to be sleeping, predicted within two weeks prior to September 11, 2001, that an attack would soon take place; the same kid who in a recent press release, expressed to the Bush Administration as well as reporters... [...] There's also a brief bio that's a little more tamer than above with a picture at: http://www.pcnetexpress.com/PCNE_HR/robertt_p.html Additional links on Robert L. Taylor III http://www.manhunt.com/features/html/89.shtml http://www.infoworld.com/article/03/02/07/HNmysterysite_1.html You have to wonder how long he thought he could have pulled this caper off before getting caught. Cheers! William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 6902 From: kondrak Date: Mon Feb 10, 2003 4:21pm Subject: Re: Re: Unknown modulation I believe the tipoff is the 135% negative modulation. Its broadcast AM. Ot someone trying awfully hard to sound broadcast, er.."quality".. At 10:59 2/10/03 -0500, you wrote: >On 9 Feb 2003 at 12:04, Andre Holmes wrote: > > > I was tuning my SA and ran across some modulations that I never seen > > before, so I started surveying some mod-schemes heres a start of my > > search. > >Do you live near: > >1) An AM radio broadcast station? > >2) A ham radio operator (within a block or two?). You frequently can >identify them by towers and large directional antennas. > >3) A CB operator maybe running illegal high power? Or within a few >hundred feet of one running legal power? > >What you have described from the other website is signals from a pure >textbook AM transmitter. I listed above the most likely sources, but >there can be others. > >Do you hear anything when you try to demodulate the signal? That will >tell you for sure what it is. If it sounds like Donald Duck, it's >single sideband which most likely would be CB or amateur (ham). > >What you are seeing is the 'modulation envelope'. Straight out of the >textbook. > >Extremely unlikely to be hostile transmissions. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS From: Marty Kaiser Date: Wed Feb 6, 2002 10:35am Subject: Fw: History in the making Hi Gang HISTORY IN THE MAKING IMMEDIATELY download and save this file... then read it. http://www.martykaiser.com/fbi1~1.htm Marty [Non-text portions of this message have been removed] 4744 From: Aimee Farr Date: Wed Feb 6, 2002 5:35pm Subject: "electricity effects on satellites" [Uhm, can anybody tell me what they mean by "study electricity effects on satellites?" ~Aimee] 2002-02-06 18:07 MSK - COURT TURNS SPY CASE BACK MOSCOW - The trial of a Siberian physicist accused of spying for China was adjourned Wednesday and the case returned to the prosecution to allow them to conduct further investigations, his lawyer said. Prosecutors made the request last week, saying the move was an attempt to avoid "judicial mistakes" in their case against Valentin Danilov. But Danilov's lawyer, Yelena Yevmenova, claimed the request was merely an attempt by prosecutors to drag out the case. Danilov, who worked at Krasnoyarsk Technical University, has already spent a year in jail facing charges of selling secrets to a Chinese company and of misappropriating money. The charges involve a contract the university signed with the company for constructing a test platform to study electricity effects on satellites. The scientist contends he did not violate any laws because the information he provided was no longer considered classified and had already been published in scientific journals. He also dismisses the charges of misappropriating money. Danilov was not in court Wednesday when the decision to hand the case back to prosecutors was announced. The trial had been put on hold Tuesday when Danilov's jailers said they could not bring the 53-year-old to court because he was suffering a high fever and flu-like symptoms. The court reconvened Wednesday despite Danilov's absence, Yevmenova said. Human rights advocates say the case is part of a wave of spy trials intended to discourage Russian researchers from working with foreigners. - AP 4745 From: Al Arango Date: Wed Feb 6, 2002 4:11pm Subject: Re: Fw: Steve, The COMSEC C3I Story -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Here is the filing: http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/netahtml/srchnum.htm&r=1&f=G&l=50&s1='5,142,560'.WKU.&OS=PN/5,142,560&RS=PN/5,142,560 At 11:05 PM 2/6/2002 +0200, Steve Whitehead wrote: >Received this on my e-mail tonight. I think the list discussed this device a >while back. > >Steve Whitehead >E-mail : sceptre@m... >TSCM Services URL : http://www.tscm.co.za > >----- Original Message ----- >From: "COMSEC" >To: >Sent: Wednesday, February 06, 2002 6:48 PM >Subject: Steve, The COMSEC C3I Story > > > > INVENT A PRODUCT, Change a Industry, Shake up the World! > > How the Hunted Became the Hunter > > > > The story HOW I invented and patented the COMSEC C3I TM > > United States Patent #5,142,560, a telecommunications > > security device that detects wiretapping, surveillance, > > espionage previously undetectable. > > > > The Chicago Commodities Exchanges were the target of a US > > Government undercover investigation during 1988-1989. I was > > a Foreign Exchange Floor Trader at the Chicago Mercantile > > Exchange during that time. I had a gut instinct that my > > telephones were being wiretapped. I was right, you just > > can't say enough about gut instinct. > > > > I have friends and acquaintances that are top tier criminal > > defense attorneys. I went to these friends to ask what they > > thought the likelihood was that my telephones could be > > wiretapped. They pretty much all agreed that unless there > > was millions of dollars involved, sensational newspaper > > headlines and coverage or unless I was dealing with the > > wrong people, the likelihood of my telephones being > > wiretapped were extremely unlikely. > > > > The Attorney General of the United States came to > > Chicago, IL 3 months later to announce the indictments of > > 47 commodities traders for various offenses. The 2 year > > undercover government investigation of the Chicago > > commodities markets happened to include the trading pit I > > traded in. > > > > Furthermore, the FBI had an undercover agent working in the > > trading pit I traded in. There were millions of dollars > > involved. On the day the Government decided to announce the > > indictments there was a huge news media circus with > > accompanied news headlines about the 47 indicted commodity > > traders. > > > > The day the indictments were announced everything came > > together. At this point I knew I was on to something. > > I called the people who teach the government how to wiretap > > and how to detect wiretapping. They all told me it was > > impossible to detect these wiretaps because of the way they > > are engineered. They told me these wiretaps are > > "electronically isolated" to prevent detection. I was told > > that "it wasn't possible to detect these wiretaps." > > > > Next, I went to the Chicago Library Patent Depository. > > I read and researched all I could find on wiretapping. I > > read all the patents on wiretapping equipment and > > wiretapping detection equipment. I found what I thought was > > the possible means to detect undetectable wiretapping and > > started to construct a device to detect these wiretaps. > > > > Success > > > > I could now detect and confirm the governments > > "undetectable" wiretapping/surveillance. The government was > > not amused. At this point the government decided to flex > > its muscle. The Government assigned a federal agent to an > > electronic parts store where I bought components for the new > > invention. > > > > For a period of 3 weeks I couldn't buy a newspaper without > > a boy scout coming up to the counter to document how I > > bought anything. I was wiretapped, followed, photographed > > and now the government decided to set up physical > > surveillance at a electronics part store where I purchased > > parts for the prototype of the new invention. > > > > I was now ready to complete my Patent Application to be > > filed with the Department of Commerce Commissioner of > > Patents and Trademarks. I warned a Patent Attorney I was > > working with at the time that there could be some blow back. > > He assured me he had been through this before and that > > there wasn't anything to be concerned about. > > > > During this period of around the clock physical surveillance > > I went to the Patent Attorney's home unannounced. When I got > > there he was leaving with my Patent Application in hand. > > He didn't look well. He told me that "he had to go to a > > meeting." The next day he returned my Patent Application, > > and he told me he couldn't help me anymore and never charged > > me for his work up to that time. > > > > There is much more to the story, how I determined there was > > an undercover Government Agent, listening in on his > > communications over a cordless telephone with a scanner, > > running his work car's license plates through Illinois > > Department of Motor Vehicles to find out his car was > > registered to a Chicago Bear's Football player, etc. > > > > I completed my Patent Application in September 1990 and was > > awarded Patent #5,142,560 in September 1992. > > > > On December 17,2001 FOX News reported that the US Government > > has been wiretapped by Foreign Intelligence and others using > > the US National Wiretapping System. There is currently a > > on-going National Security investigation across the United > > States concerning the US National Wiretapping System being > > used against the United States by Foreign Intelligence and > > others. > > > > "The problem: according to classified law enforcement > > documents obtained by Fox News, the bad guys had the cops' > > beepers, cell phones, even home phones under surveillance. > > Some who did get caught admitted to having hundreds of > > numbers and using them to avoid arrest. > > > > "This compromised law enforcement communications between > > LAPD detectives and other assigned law enforcement officers > > working various aspects of the case. The organization > > discovered communications between organized crime > > intelligence division detectives, the FBI and the Secret > > Service." > > > > Shock spread from the DEA to the FBI in Washington, and then > > the CIA. An investigation of the problem, according to law > > enforcement documents, concluded, "The organization has > > apparent extensive access to database systems to identify > > pertinent personal and biographical information." > > > > When investigators tried to find out where the information > > might have come from, they looked at Amdocs, a publicly > > traded firm based in Israel. Amdocs generates billing data > > for virtually every call in America, and they do credit > > checks. The company denies any leaks, but investigators > > still fear that the firm's data is getting into the wrong > > hands. > > > > When investigators checked their own wiretapping system for > > leaks, they grew concerned about potential vulnerabilities > > in the computers that intercept, record and store the > > wiretapped calls." [FOX News Carl Cameron Investigates] > > > > "The worst penetrations are believed to be in the State > > Department. But others say the supposedly secure telephone > > systems in the White House, Defense Department and Justice > > Department may have been compromised as well. The problem > > for FBI agents in the famed Division 5, however, isn't just > > what they have uncovered, which is substantial, but what > > they don't know yet." [Insight] > > > > Email me to request a collection of news reports about the > > hottest Federal Government investigation in Washington, DC > > today. A unbelievable look inside Government wiretapping > > and how it will impact you. > > > > > > The COMSEC C3I detects legal and illegal wiretapping > > previously undetectable. Full background and product > > reviews are available on our web site: > > > > > > We are registered with the Department of Defense and the > > General Services Agency Information Technology Service. > > > > To receive additional information and Special Offers for > > Subscribers Only reply to this email with "Subscribe" in the > > Subject Line. > > > > PRIVACY STATEMENT: We will not distribute your address to > > anyone. Period. > > > > Reach me at the following address. > > > > > > Mark J. Neer > > President > > Communications Security > > Tel: 281.586.2034 > > Fax: 281.754.4047 > > Email: > > Internet: > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -----BEGIN PGP SIGNATURE----- Version: PGP Personal Privacy 6.5.3 iQA/AwUBPGGp+1AWwP1+SxuBEQImuwCfeftFVzMg/lTijJcKWe8lJcrJCDcAoOy4 t5AkBJZOz42PxUMG7VXQAod9 =aGDg -----END PGP SIGNATURE----- 4746 From: James M. Atkinson Date: Wed Feb 6, 2002 8:19pm Subject: Re: Fw: Steve, The COMSEC C3I Story The funny thing is that this "method of detecting eavesdropping devices" has been around since the 1950's. It was inappropriate for the patent office to award any kind of patent on this issue as the method was, and is common knowledge. Once you get past of the hype, hyperbole, marketing spin, and bovine feces all the product seems to due is monitor impedance changes in a line, which as we know is something you can do with a five dollar circuit and a cheap oscilloscope. A decent Time Domain Reflectometer and FXT/NXT Cross Talk Analyzer would be far more appropriate, but then snake oil is probably far more profitable. The way the guy rambles on about grand government conspiracies is a potential indicator that perhaps the poor fellow should be spending his money on medical intervention or aluminium foil hats. Professional eavesdropper lean toward high impedance devices, and as such the methods claimed in the patent would be virtually useless for finding such devices. What next, a 1-900 line where you call call Ms. Cleo so she can read tarot card to tell if your line is tapped? Sad, really sad, -jma >>------------------------------------------------------------------------ >>United States Patent5,142,560 >>NeerAugust 25, 1992 >>------------------------------------------------------------------------ >>Wiretap detector and telephone loop monitor >>Abstract >> >>A novel method and improved system for the continuous detection >>monitoring of authorized/unauthorized connections/disconnections >>including loop bridging wiretapping equipment capable of monitoring >>recording voice and/or data communications on the subscriber's >>local telephone loop. In operation the detector monitor displays >>electrical changes in impedance condition and characteristics on >>the subscriber's local telephone loop to detect and monitor >>signaling, switching equipment and telephone lines >>connecting/disconnecting anywhere on the loop including the central >>exchange before, during and after the completion of a telephone >>call continuously. >>------------------------------------------------------------------------ >>Inventors:Neer; Mark J. (835 Locust, Winnetka, IL 60093) >>Appl. No.:587413 >>Filed:September 25, 1990 >> >>Current U.S. Class:379/7; 379/21; 379/30 >>Intern'l Class:H04M 001/68 >>Field of Search:379/7,21,29,30,39,35 >>------------------------------------------------------------------------ >>References Cited [Referenced By] >>------------------------------------------------------------------------ >>U.S. Patent Documents >>1834992Dec., 1931Almquist379/21. >>4658099Apr., 1987Frazer379/7. >>4680783Jul., 1987Boeckmann379/7. >>4760592Jul., 1988Hensley379/7. >>Foreign Patent Documents >>58-143659Aug., 1983JP379/7. >>Primary Examiner: Schreyer; Stafford D. >>------------------------------------------------------------------------ >>Claims >>------------------------------------------------------------------------ >> >>I claim: >>1. An apparatus for detecting the connecting and the disconnecting >>of an additional telephone line onto the subscriber's telephone >>loop for the purpose of listening and/or recording, the telephone >>loop connecting a subscriber with at least one telephone to a >>central exchange and having a generally constant electrical >>impedance, comprising: >>(a) a capacitive element for detecting changes to said generally >>constant electrical impedance; >>(b) display means cooperating with and connected to said capacitive >>element for visually showing that a change has been detected by >>said capacitive element; and >>(c) means for connecting the apparatus to the telephone loop. >>2. The apparatus of claim 1, wherein said capacitive element is a >>capacitor connected in series to the telephone loop. >>3. The apparatus of claim 1, wherein said display means is a LED. >>4. The apparatus of claim 1, wherein said means to connect >>comprises a quick connect/disconnect line and jack. >>5. An apparatus for continuously monitoring changes in impedance >>caused by the connecting or the disconnecting of an additional >>impedance source to a telephone loop connecting a subscriber with >>at least one telephone to a central exchange and having a generally >>constant electrical impedance, comprising: >>(a) a capacitive element for detecting changes to the generally >>constant electrical impedance; >>(b) an isolation transformer having primary and secondary windings, >>said primary windings being connected to said capacitive element; >>(c) display means connected to said secondary windings for visually >>showing that a change has been detected by said capacitive element; >>and >>(d) means for connecting the apparatus to the telephone loop. >>6. The apparatus of claim 5, wherein said capacitive element is a >>capacitor connected in series to the telephone loop. >>7. The apparatus of claim 5, wherein said display means is a LED. >>8. The apparatus of claim 5, wherein said means to connect >>comprises a quick connect/disconnect line and jack. >>9. The apparatus of claim 1 wherein said means for connecting the >>apparatus to the telephone loop additionally includes a switching >>mechanism connected in series with said capacitive element to the >>telephone loop. >>10. The apparatus of claim 9, wherein said display means comprises >>an easily removable/replaceable LED mounted in a socket assembly. >>11. The apparatus of claim 5 wherein said means for connecting the >>apparatus to the telephone loop additionally includes a switching >>mechanism connected in series with said capacitive element to the >>telephone loop. >>12. The apparatus of claim 11, wherein said display means comprises >>an easily removable/replaceable LED mounted in a socket assembly. >>------------------------------------------------------------------------ >>Description >>------------------------------------------------------------------------ >> >>BACKGROUND >>1. Field of Invention >>This invention relates to the detection monitoring of >>authorized/unauthorized connections/disconnections including loop >>bridging wiretapping equipment on the subscriber's local telephone >>loops where electrical changes in loop impedance condition and >>characteristics occur because of the connections/disconnections of >>the briding equipment. >>2. Description of Prior Art >>There are many devices available that have been developed for both >>legal and illegal wiretapping of telephone communications. A very >>common type of wiretapping consists of a bridging device that >>creates a remote extension or drawn loop by connecting an >>additional telephone line on the subscriber's telephone loop and >>routing it to an observation monitoring location. This loop >>bridging wiretapping technique will cause a change in loop >>impedance condition and characteristics depending on how the >>tapping is completed. >>In the prior art, wiretap detectors exist that utilize >>microcomputers and processors, various meters, signal generators, >>tone generators, etc., that detect wiretapping equipment connected >>to a telephone line but are either simple voltage meters that are >>ineffective, limited, detachable and defeatable, too expensive >>and/or complicated equipment that is burdensome and obtrusive to >>use on a continuous basis or must be installed on a clean line only. >>OBJECTS AND ADVANTAGES >>This invention presents a new device, method and system that >>displays connections and disconnections anywhere on the >>subscriber's local telephone loop including the central exchange of >>the telephone company before, during and after the completion of a >>call on a continuous basis. Each telephone call produces a >>signature or pattern of connections and disconnections. This >>invention present the first continuous display of normal/abnormal >>telephone loop electrical changes in impedance condition and >>characterization activity resulting from signaling, switching and >>wiretapping monitoring equipment connecting/disconnecting. >>The present invention is easy to use, highly reliable, >>undetectable, small, portable, and discreet which presents a novel >>method and an improved system for detecting monitoring >>authorized/unauthorized connections/disconnections including >>wiretapping monitoring recording equipment which overcome all of >>the above mentioned disadvantages of the previously known devices. >>It is the object of this invention to show how >>authorized/unauthorized connections/disconnections including loop >>bridging wiretapping equipment can be detected and monitored on the >>subscriber's loop by subscriber's telephone terminal(s) equipped >>with said invention. >>DRAWING FIGURES >>FIG. 1 is a diagram of a local telephone system. >>FIG. 2 is a diagram of the wiretap detector and telephone loop >>monitor in alternate forms, in accordance with the present >>invention. >>FIG. 3 is a diagram of the preferred assembled invention in >>accordance with the present invention. >>FIG. 4 is a diagram of the detector monitor display socket assembly. >>REFERENCE NUMERALS IN DRAWINGS >>10 local telephone central exchange >>20 subscriber's local telephone loop >>30 subscriber's residence telephone terminal(s) >>40 capacitive element >>50 detector monitor display assembly >>60 isolation transformer >>70 switching mechanism >>80 modular telephone line >>90 modular telephone line jack >>100 modular telephone interface housing >>DESCRIPTION OF INVENTION >>This invention presents a novel method and improved system that >>detects and monitors authorized/unauthorized >>connections/disconnections including loop bridging wiretapping >>equipment that causes electrical changes in impedance condition and >>characteristics on the subscriber's local telephone loop to detect >>signaling, switching equipment and telephone lines >>connecting/disconnecting anywhere on the loop including the central >>exchange continuously. >>By continuously monitoring the subscriber's telephone loop >>impedance condition and characteristics, it is possible to detect >>normal as well as abnormal connections and disconnections. >>Connections and disconnections effect changes in impedance >>characteristics on the subscriber's telephone loop and are the >>indication of wiretapping monitoring equipment connecting/ >>disconnecting. By detecting connections/disconnections it is >>possible to determine authorized/unauthorized >>connections/disconnections including wiretapping equipment on the >>loop. The proposed method and system comprises of monitoring the >>device's display to establish a normal signature or pattern of >>telephone loop characteristics from an abnormal signature or >>pattern resulting from additional extensions, either at the >>subscriber's residence or remotely connecting/disconnecting on the >>telephone loop. >>OPERATION OF THE PREFERRED EMBODIMENT >>Further objects and advantages of said invention will become >>apparent from a consideration of the drawings and ensuing operation >>of it. Each of the elements included therein can assume several >>different forms, all of which would be well known to those skilled >>in the art, and it only be required that they perform the functions >>set forth herein after. >>Referring first to the diagram of FIG. 1, it should be noted that >>FIG. 1 details a local telephone system. As seen in FIG. 1, a local >>telephone system comprising of the telephone company's central >>exchange 10 a subscriber's local telephone loop 20 and a >>subscriber's residence telephone terminal(s) 30. >>Referring to FIG. 2, there are four presented embodiments of said >>invention, embodiment 2 is the preferred embodiment. As seen in >>FIG. 2, embodiment 1 comprising capacitive element 40 detector >>monitor display assembly 50. >>As seen in FIG. 2, preferred embodiment 2 comprising capacitive >>element 40 isolation transformer 60 display assembly 50. >>As seen in FIG. 2, embodiment 3 comprising capacitive element 40 >>display element 50 switching mechanism 70. >>As seen in FIG. 2, embodiment 4 comprising capacitive element 40 >>isolation transformer 60 display assembly 50 switching mechanism 70. >>As seen in preferred embodiment 2, side one of the capacitive >>element 40 is connected to either the Tip or Ring side of the >>subscriber's telephone loop 20. Side two of the capacitive element >>40 is connected in series to the isolation transformer 60 primary's >>side one. The isolation transformer 60 primary's side two is then >>connected to the alternate side of the subscriber's telephone loop >>20. The isolation transformer 60 secondary is connected to the >>display assembly 50. >>Once the detector monitor is connected to the loop 20 the device >>continuously detects and monitors electrical changes in impedance >>condition and characteristics on the loop 20 reporting each >>authorized/unauthorized connections/disconnections, as well as >>tampering and changes in loop signature pattern characteristics. >>SUMMARY, RAMIFICATIONS, AND SCOPE >>Each connection and disconnection on the subscriber's local >>telephone loop creates electrical changes in loop impedance >>condition and characteristics. Each telephone call creates a series >>of normal connections and disconnections on the loop, the device's >>display creates a signature or pattern. The system comprises of >>monitoring the device's display to each cell. By detecting >>electrical changes on the loop it is possible to establish a normal >>pattern of loop activity from an abnormal one. >>The preferred method and system comprises of connecting and >>monitoring the display assembly to establish a normal signature or >>pattern of loop impedance conditions and characteristics from an >>abnormal one resulting from additional connections/disconnections >>and tampering on the loop. >>The device detects and monitors authorized/unauthorized connections >>and disconnections before, during and after the completion of a >>call on a continuous basis. >>It would be obvious to those skilled in the art that numerous >>identifications could be made to the method and system of the >>present invention without departing from the spirit of the >>invention, which shall be limited only by the scope of the claims >>appended hereto. >>* * * * * >>------------------------------------------------------------------------ At 11:05 PM +0200 2/6/02, Steve Whitehead wrote: >Received this on my e-mail tonight. I think the list discussed this device a >while back. > >Steve Whitehead >E-mail : sceptre@m... >TSCM Services URL : http://www.tscm.co.za > >----- Original Message ----- >From: "COMSEC" >To: >Sent: Wednesday, February 06, 2002 6:48 PM >Subject: Steve, The COMSEC C3I Story > > >> INVENT A PRODUCT, Change a Industry, Shake up the World! >> How the Hunted Became the Hunter >> >> The story HOW I invented and patented the COMSEC C3I TM > > United States Patent #5,142,560, a telecommunications >> security device that detects wiretapping, surveillance, >> espionage previously undetectable. >> >> The Chicago Commodities Exchanges were the target of a US >> Government undercover investigation during 1988-1989. I was >> a Foreign Exchange Floor Trader at the Chicago Mercantile >> Exchange during that time. I had a gut instinct that my >> telephones were being wiretapped. I was right, you just >> can't say enough about gut instinct. >> >> I have friends and acquaintances that are top tier criminal >> defense attorneys. I went to these friends to ask what they >> thought the likelihood was that my telephones could be >> wiretapped. They pretty much all agreed that unless there >> was millions of dollars involved, sensational newspaper >> headlines and coverage or unless I was dealing with the >> wrong people, the likelihood of my telephones being >> wiretapped were extremely unlikely. >> >> The Attorney General of the United States came to >> Chicago, IL 3 months later to announce the indictments of >> 47 commodities traders for various offenses. The 2 year >> undercover government investigation of the Chicago >> commodities markets happened to include the trading pit I >> traded in. >> >> Furthermore, the FBI had an undercover agent working in the >> trading pit I traded in. There were millions of dollars >> involved. On the day the Government decided to announce the >> indictments there was a huge news media circus with >> accompanied news headlines about the 47 indicted commodity >> traders. >> >> The day the indictments were announced everything came >> together. At this point I knew I was on to something. >> I called the people who teach the government how to wiretap >> and how to detect wiretapping. They all told me it was >> impossible to detect these wiretaps because of the way they >> are engineered. They told me these wiretaps are >> "electronically isolated" to prevent detection. I was told >> that "it wasn't possible to detect these wiretaps." >> >> Next, I went to the Chicago Library Patent Depository. >> I read and researched all I could find on wiretapping. I >> read all the patents on wiretapping equipment and >> wiretapping detection equipment. I found what I thought was > > the possible means to detect undetectable wiretapping and >> started to construct a device to detect these wiretaps. >> >> Success >> >> I could now detect and confirm the governments >> "undetectable" wiretapping/surveillance. The government was >> not amused. At this point the government decided to flex >> its muscle. The Government assigned a federal agent to an >> electronic parts store where I bought components for the new >> invention. >> >> For a period of 3 weeks I couldn't buy a newspaper without >> a boy scout coming up to the counter to document how I >> bought anything. I was wiretapped, followed, photographed >> and now the government decided to set up physical >> surveillance at a electronics part store where I purchased >> parts for the prototype of the new invention. > > >> I was now ready to complete my Patent Application to be >> filed with the Department of Commerce Commissioner of >> Patents and Trademarks. I warned a Patent Attorney I was >> working with at the time that there could be some blow back. >> He assured me he had been through this before and that >> there wasn't anything to be concerned about. >> >> During this period of around the clock physical surveillance >> I went to the Patent Attorney's home unannounced. When I got >> there he was leaving with my Patent Application in hand. >> He didn't look well. He told me that "he had to go to a >> meeting." The next day he returned my Patent Application, >> and he told me he couldn't help me anymore and never charged >> me for his work up to that time. >> >> There is much more to the story, how I determined there was >> an undercover Government Agent, listening in on his >> communications over a cordless telephone with a scanner, >> running his work car's license plates through Illinois >> Department of Motor Vehicles to find out his car was >> registered to a Chicago Bear's Football player, etc. >> >> I completed my Patent Application in September 1990 and was >> awarded Patent #5,142,560 in September 1992. >> >> On December 17,2001 FOX News reported that the US Government >> has been wiretapped by Foreign Intelligence and others using >> the US National Wiretapping System. There is currently a >> on-going National Security investigation across the United >> States concerning the US National Wiretapping System being >> used against the United States by Foreign Intelligence and >> others. >> >> "The problem: according to classified law enforcement >> documents obtained by Fox News, the bad guys had the cops' >> beepers, cell phones, even home phones under surveillance. >> Some who did get caught admitted to having hundreds of >> numbers and using them to avoid arrest. >> >> "This compromised law enforcement communications between >> LAPD detectives and other assigned law enforcement officers >> working various aspects of the case. The organization >> discovered communications between organized crime >> intelligence division detectives, the FBI and the Secret >> Service." >> >> Shock spread from the DEA to the FBI in Washington, and then >> the CIA. An investigation of the problem, according to law >> enforcement documents, concluded, "The organization has >> apparent extensive access to database systems to identify >> pertinent personal and biographical information." >> >> When investigators tried to find out where the information >> might have come from, they looked at Amdocs, a publicly >> traded firm based in Israel. Amdocs generates billing data >> for virtually every call in America, and they do credit >> checks. The company denies any leaks, but investigators >> still fear that the firm's data is getting into the wrong >> hands. >> >> When investigators checked their own wiretapping system for >> leaks, they grew concerned about potential vulnerabilities >> in the computers that intercept, record and store the >> wiretapped calls." [FOX News Carl Cameron Investigates] >> >> "The worst penetrations are believed to be in the State >> Department. But others say the supposedly secure telephone >> systems in the White House, Defense Department and Justice >> Department may have been compromised as well. The problem >> for FBI agents in the famed Division 5, however, isn't just > > what they have uncovered, which is substantial, but what >> they don't know yet." [Insight] >> >> Email me to request a collection of news reports about the >> hottest Federal Government investigation in Washington, DC >> today. A unbelievable look inside Government wiretapping >> and how it will impact you. >> >> >> The COMSEC C3I detects legal and illegal wiretapping >> previously undetectable. Full background and product >> reviews are available on our web site: >> >> >> We are registered with the Department of Defense and the >> General Services Agency Information Technology Service. >> >> To receive additional information and Special Offers for >> Subscribers Only reply to this email with "Subscribe" in the > > Subject Line. >> >> PRIVACY STATEMENT: We will not distribute your address to >> anyone. Period. >> >> Reach me at the following address. >> >> >> Mark J. Neer >> President >> Communications Security >> Tel: 281.586.2034 >> Fax: 281.754.4047 >> Email: >> Internet: >> > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4747 From: William Knowles Date: Wed Feb 6, 2002 8:43pm Subject: Re: Fw: Steve, The COMSEC C3I Story On Wed, 6 Feb 2002, James M. Atkinson wrote: Ssssshhhhhhh! > What next, a 1-900 line where you call call Ms. Cleo so she can read > tarot card to tell if your line is tapped? You just described my next .com idea that I was going to IPO! I think I need a Chicago area TSCM professional to sweep my office. - WK *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 4748 From: Kevin D. Murray Date: Wed Feb 6, 2002 8:50pm Subject: The COMSEC C3I Story Gentlemen/women, It is time to put this to rest. This is not worth your valuable time and efforts. The C3I is a simple circuit with a few basic parts which essentially indicates voltage reversals on a telephone line. The unit I tested in 1992 is still here. If anyone would like photos or a schematic please contact me privately. If anyone would like to buy it, it comes with the Brooklyn Bridge at no extra charge. Kevin -- Kevin D. Murray - CPP, CFE, BCFE MURRAY ASSOCIATES Counterespionage Consultants to Business & Government Eavesdropping Detection Specialists www.spybusters.com "James M. Atkinson" wrote: > The funny thing is that this "method of detecting eavesdropping > devices" has been around since the 1950's. It was inappropriate for > the patent office to award any kind of patent on this issue as the > method was, and is common knowledge. > > Once you get past of the hype, hyperbole, marketing spin, and bovine > feces all the product seems to due is monitor impedance changes in a > line, which as we know is something you can do with a five dollar > circuit and a cheap oscilloscope. > > A decent Time Domain Reflectometer and FXT/NXT Cross Talk Analyzer > would be far more appropriate, but then snake oil is probably far > more profitable. > > The way the guy rambles on about grand government conspiracies is a > potential indicator that perhaps the poor fellow should be spending > his money on medical intervention or aluminium foil hats. > > Professional eavesdropper lean toward high impedance devices, and as > such the methods claimed in the patent would be virtually useless for > finding such devices. > > What next, a 1-900 line where you call call Ms. Cleo so she can read > tarot card to tell if your line is tapped? > > Sad, really sad, > > -jma > > >>-- > --------------------------------------------------------------------- > >>United States Patent 5,142,560 > >>Neer August 25, 1992 > >>--------------------- > -------------------------------------------------- > >>Wiretap detector and telephone loop monitor > >>Abstract > >> > >>A novel method and improved system for the continuous detection > >>monitoring of authorized/unauthorized connections/disconnections > >>including loop bridging wiretapping equipment capable of monitoring > >>recording voice and/or data communications on the subscriber's > >>local telephone loop. In operation the detector monitor displays > >>electrical changes in impedance condition and characteristics on > >>the subscriber's local telephone loop to detect and monitor > >>signaling, switching equipment and telephone lines > >>connecting/disconnecting anywhere on the loop including the central > >>exchange before, during and after the completion of a telephone > >>call continuously. > >>------------------ > ----------------------------------------------------- > >>Inventors: Neer; Mark J. (835 Locust, Winnetka, IL 60093) > >>Appl. No.: 587413 > >>Filed: September 25, 1990 > >> > >>Current U.S. Class: 379/7; 379/21; 379/30 > >>Intern'l Class: H04M 001/68 > >>Field of Search: 379/7,21,29,30,39,35 > >>------------------------------------------ > ----------------------------- > >>References Cited [Referenced By] > >>-------------------------------- > --------------------------------------- > >>U.S. Patent Documents > >>1834992 Dec., 1931 Almquist 379/21. > >>4658099 Apr., 1987 Frazer 379/7. > >>4680783 Jul., 1987 Boeckmann 379/7. > >>4760592 Jul., 1988 Hensley 379/7. > >>Foreign Patent Documents > >>58-143659 Aug., 1983 JP 379/7. > >>Primary Examiner: Schreyer; Stafford D. > >>--------------------------------------- > -------------------------------- > >>Claims > >>------ > ----------------------------------------------------------------- > >> > >>I claim: > >>1. An apparatus for detecting the connecting and the disconnecting > >>of an additional telephone line onto the subscriber's telephone > >>loop for the purpose of listening and/or recording, the telephone > >>loop connecting a subscriber with at least one telephone to a > >>central exchange and having a generally constant electrical > >>impedance, comprising: > >>(a) a capacitive element for detecting changes to said generally > >>constant electrical impedance; > >>(b) display means cooperating with and connected to said capacitive > >>element for visually showing that a change has been detected by > >>said capacitive element; and > >>(c) means for connecting the apparatus to the telephone loop. > >>2. The apparatus of claim 1, wherein said capacitive element is a > >>capacitor connected in series to the telephone loop. > >>3. The apparatus of claim 1, wherein said display means is a LED. > >>4. The apparatus of claim 1, wherein said means to connect > >>comprises a quick connect/disconnect line and jack. > >>5. An apparatus for continuously monitoring changes in impedance > >>caused by the connecting or the disconnecting of an additional > >>impedance source to a telephone loop connecting a subscriber with > >>at least one telephone to a central exchange and having a generally > >>constant electrical impedance, comprising: > >>(a) a capacitive element for detecting changes to the generally > >>constant electrical impedance; > >>(b) an isolation transformer having primary and secondary windings, > >>said primary windings being connected to said capacitive element; > >>(c) display means connected to said secondary windings for visually > >>showing that a change has been detected by said capacitive element; > >>and > >>(d) means for connecting the apparatus to the telephone loop. > >>6. The apparatus of claim 5, wherein said capacitive element is a > >>capacitor connected in series to the telephone loop. > >>7. The apparatus of claim 5, wherein said display means is a LED. > >>8. The apparatus of claim 5, wherein said means to connect > >>comprises a quick connect/disconnect line and jack. > >>9. The apparatus of claim 1 wherein said means for connecting the > >>apparatus to the telephone loop additionally includes a switching > >>mechanism connected in series with said capacitive element to the > >>telephone loop. > >>10. The apparatus of claim 9, wherein said display means comprises > >>an easily removable/replaceable LED mounted in a socket assembly. > >>11. The apparatus of claim 5 wherein said means for connecting the > >>apparatus to the telephone loop additionally includes a switching > >>mechanism connected in series with said capacitive element to the > >>telephone loop. > >>12. The apparatus of claim 11, wherein said display means comprises > >>an easily removable/replaceable LED mounted in a socket assembly. > >>----------------------------------------------------------------- > ------ > >>Description > >>----------- > ------------------------------------------------------------ > >> > >>BACKGROUND > >>1. Field of Invention > >>This invention relates to the detection monitoring of > >>authorized/unauthorized connections/disconnections including loop > >>bridging wiretapping equipment on the subscriber's local telephone > >>loops where electrical changes in loop impedance condition and > >>characteristics occur because of the connections/disconnections of > >>the briding equipment. > >>2. Description of Prior Art > >>There are many devices available that have been developed for both > >>legal and illegal wiretapping of telephone communications. A very > >>common type of wiretapping consists of a bridging device that > >>creates a remote extension or drawn loop by connecting an > >>additional telephone line on the subscriber's telephone loop and > >>routing it to an observation monitoring location. This loop > >>bridging wiretapping technique will cause a change in loop > >>impedance condition and characteristics depending on how the > >>tapping is completed. > >>In the prior art, wiretap detectors exist that utilize > >>microcomputers and processors, various meters, signal generators, > >>tone generators, etc., that detect wiretapping equipment connected > >>to a telephone line but are either simple voltage meters that are > >>ineffective, limited, detachable and defeatable, too expensive > >>and/or complicated equipment that is burdensome and obtrusive to > >>use on a continuous basis or must be installed on a clean line only. > > >>OBJECTS AND ADVANTAGES > >>This invention presents a new device, method and system that > >>displays connections and disconnections anywhere on the > >>subscriber's local telephone loop including the central exchange of > >>the telephone company before, during and after the completion of a > >>call on a continuous basis. Each telephone call produces a > >>signature or pattern of connections and disconnections. This > >>invention present the first continuous display of normal/abnormal > >>telephone loop electrical changes in impedance condition and > >>characterization activity resulting from signaling, switching and > >>wiretapping monitoring equipment connecting/disconnecting. > >>The present invention is easy to use, highly reliable, > >>undetectable, small, portable, and discreet which presents a novel > >>method and an improved system for detecting monitoring > >>authorized/unauthorized connections/disconnections including > >>wiretapping monitoring recording equipment which overcome all of > >>the above mentioned disadvantages of the previously known devices. > >>It is the object of this invention to show how > >>authorized/unauthorized connections/disconnections including loop > >>bridging wiretapping equipment can be detected and monitored on the > >>subscriber's loop by subscriber's telephone terminal(s) equipped > >>with said invention. > >>DRAWING FIGURES > >>FIG. 1 is a diagram of a local telephone system. > >>FIG. 2 is a diagram of the wiretap detector and telephone loop > >>monitor in alternate forms, in accordance with the present > >>invention. > >>FIG. 3 is a diagram of the preferred assembled invention in > >>accordance with the present invention. > >>FIG. 4 is a diagram of the detector monitor display socket assembly. > > >>REFERENCE NUMERALS IN DRAWINGS > >>10 local telephone central exchange > >>20 subscriber's local telephone loop > >>30 subscriber's residence telephone terminal(s) > >>40 capacitive element > >>50 detector monitor display assembly > >>60 isolation transformer > >>70 switching mechanism > >>80 modular telephone line > >>90 modular telephone line jack > >>100 modular telephone interface housing > >>DESCRIPTION OF INVENTION > >>This invention presents a novel method and improved system that > >>detects and monitors authorized/unauthorized > >>connections/disconnections including loop bridging wiretapping > >>equipment that causes electrical changes in impedance condition and > >>characteristics on the subscriber's local telephone loop to detect > >>signaling, switching equipment and telephone lines > >>connecting/disconnecting anywhere on the loop including the central > >>exchange continuously. > >>By continuously monitoring the subscriber's telephone loop > >>impedance condition and characteristics, it is possible to detect > >>normal as well as abnormal connections and disconnections. > >>Connections and disconnections effect changes in impedance > >>characteristics on the subscriber's telephone loop and are the > >>indication of wiretapping monitoring equipment connecting/ > >>disconnecting. By detecting connections/disconnections it is > >>possible to determine authorized/unauthorized > >>connections/disconnections including wiretapping equipment on the > >>loop. The proposed method and system comprises of monitoring the > >>device's display to establish a normal signature or pattern of > >>telephone loop characteristics from an abnormal signature or > >>pattern resulting from additional extensions, either at the > >>subscriber's residence or remotely connecting/disconnecting on the > >>telephone loop. > >>OPERATION OF THE PREFERRED EMBODIMENT > >>Further objects and advantages of said invention will become > >>apparent from a consideration of the drawings and ensuing operation > >>of it. Each of the elements included therein can assume several > >>different forms, all of which would be well known to those skilled > >>in the art, and it only be required that they perform the functions > >>set forth herein after. > >>Referring first to the diagram of FIG. 1, it should be noted that > >>FIG. 1 details a local telephone system. As seen in FIG. 1, a local > >>telephone system comprising of the telephone company's central > >>exchange 10 a subscriber's local telephone loop 20 and a > >>subscriber's residence telephone terminal(s) 30. > >>Referring to FIG. 2, there are four presented embodiments of said > >>invention, embodiment 2 is the preferred embodiment. As seen in > >>FIG. 2, embodiment 1 comprising capacitive element 40 detector > >>monitor display assembly 50. > >>As seen in FIG. 2, preferred embodiment 2 comprising capacitive > >>element 40 isolation transformer 60 display assembly 50. > >>As seen in FIG. 2, embodiment 3 comprising capacitive element 40 > >>display element 50 switching mechanism 70. > >>As seen in FIG. 2, embodiment 4 comprising capacitive element 40 > >>isolation transformer 60 display assembly 50 switching mechanism 70. > > >>As seen in preferred embodiment 2, side one of the capacitive > >>element 40 is connected to either the Tip or Ring side of the > >>subscriber's telephone loop 20. Side two of the capacitive element > >>40 is connected in series to the isolation transformer 60 primary's > >>side one. The isolation transformer 60 primary's side two is then > >>connected to the alternate side of the subscriber's telephone loop > >>20. The isolation transformer 60 secondary is connected to the > >>display assembly 50. > >>Once the detector monitor is connected to the loop 20 the device > >>continuously detects and monitors electrical changes in impedance > >>condition and characteristics on the loop 20 reporting each > >>authorized/unauthorized connections/disconnections, as well as > >>tampering and changes in loop signature pattern characteristics. > >>SUMMARY, RAMIFICATIONS, AND SCOPE > >>Each connection and disconnection on the subscriber's local > >>telephone loop creates electrical changes in loop impedance > >>condition and characteristics. Each telephone call creates a series > >>of normal connections and disconnections on the loop, the device's > >>display creates a signature or pattern. The system comprises of > >>monitoring the device's display to each cell. By detecting > >>electrical changes on the loop it is possible to establish a normal > >>pattern of loop activity from an abnormal one. > >>The preferred method and system comprises of connecting and > >>monitoring the display assembly to establish a normal signature or > >>pattern of loop impedance conditions and characteristics from an > >>abnormal one resulting from additional connections/disconnections > >>and tampering on the loop. > >>The device detects and monitors authorized/unauthorized connections > >>and disconnections before, during and after the completion of a > >>call on a continuous basis. > >>It would be obvious to those skilled in the art that numerous > >>identifications could be made to the method and system of the > >>present invention without departing from the spirit of the > >>invention, which shall be limited only by the scope of the claims > >>appended hereto. > >>* * * * * > >>--------- > -------------------------------------------------------------- > > At 11:05 PM +0200 2/6/02, Steve Whitehead wrote: > >Received this on my e-mail tonight. I think the list discussed this > device a > >while back. > > > >Steve Whitehead > >E-mail : sceptre@m... > >TSCM Services URL : http://www.tscm.co.za > > > >----- Original Message ----- > >From: "COMSEC" > >To: > >Sent: Wednesday, February 06, 2002 6:48 PM > >Subject: Steve, The COMSEC C3I Story > > > > > >> INVENT A PRODUCT, Change a Industry, Shake up the World! > >> How the Hunted Became the Hunter > >> > >> The story HOW I invented and patented the COMSEC C3I TM > > > United States Patent #5,142,560, a telecommunications > >> security device that detects wiretapping, surveillance, > >> espionage previously undetectable. > >> > >> The Chicago Commodities Exchanges were the target of a US > >> Government undercover investigation during 1988-1989. I was > >> a Foreign Exchange Floor Trader at the Chicago Mercantile > >> Exchange during that time. I had a gut instinct that my > >> telephones were being wiretapped. I was right, you just > >> can't say enough about gut instinct. > >> > >> I have friends and acquaintances that are top tier criminal > >> defense attorneys. I went to these friends to ask what they > >> thought the likelihood was that my telephones could be > >> wiretapped. They pretty much all agreed that unless there > >> was millions of dollars involved, sensational newspaper > >> headlines and coverage or unless I was dealing with the > >> wrong people, the likelihood of my telephones being > >> wiretapped were extremely unlikely. > >> > >> The Attorney General of the United States came to > >> Chicago, IL 3 months later to announce the indictments of > >> 47 commodities traders for various offenses. The 2 year > >> undercover government investigation of the Chicago > >> commodities markets happened to include the trading pit I > >> traded in. > >> > >> Furthermore, the FBI had an undercover agent working in the > >> trading pit I traded in. There were millions of dollars > >> involved. On the day the Government decided to announce the > >> indictments there was a huge news media circus with > >> accompanied news headlines about the 47 indicted commodity > >> traders. > >> > >> The day the indictments were announced everything came > >> together. At this point I knew I was on to something. > >> I called the people who teach the government how to wiretap > >> and how to detect wiretapping. They all told me it was > >> impossible to detect these wiretaps because of the way they > >> are engineered. They told me these wiretaps are > >> "electronically isolated" to prevent detection. I was told > >> that "it wasn't possible to detect these wiretaps." > >> > >> Next, I went to the Chicago Library Patent Depository. > >> I read and researched all I could find on wiretapping. I > >> read all the patents on wiretapping equipment and > >> wiretapping detection equipment. I found what I thought was > > > the possible means to detect undetectable wiretapping and > >> started to construct a device to detect these wiretaps. > >> > >> Success > >> > >> I could now detect and confirm the governments > >> "undetectable" wiretapping/surveillance. The government was > >> not amused. At this point the government decided to flex > >> its muscle. The Government assigned a federal agent to an > >> electronic parts store where I bought components for the new > >> invention. > >> > >> For a period of 3 weeks I couldn't buy a newspaper without > >> a boy scout coming up to the counter to document how I > >> bought anything. I was wiretapped, followed, photographed > >> and now the government decided to set up physical > >> surveillance at a electronics part store where I purchased > >> parts for the prototype of the new invention. > > > > >> I was now ready to complete my Patent Application to be > >> filed with the Department of Commerce Commissioner of > >> Patents and Trademarks. I warned a Patent Attorney I was > >> working with at the time that there could be some blow back. > >> He assured me he had been through this before and that > >> there wasn't anything to be concerned about. > >> > >> During this period of around the clock physical surveillance > >> I went to the Patent Attorney's home unannounced. When I got > >> there he was leaving with my Patent Application in hand. > >> He didn't look well. He told me that "he had to go to a > >> meeting." The next day he returned my Patent Application, > >> and he told me he couldn't help me anymore and never charged > >> me for his work up to that time. > >> > >> There is much more to the story, how I determined there was > >> an undercover Government Agent, listening in on his > >> communications over a cordless telephone with a scanner, > >> running his work car's license plates through Illinois > >> Department of Motor Vehicles to find out his car was > >> registered to a Chicago Bear's Football player, etc. > >> > >> I completed my Patent Application in September 1990 and was > >> awarded Patent #5,142,560 in September 1992. > >> > >> On December 17,2001 FOX News reported that the US Government > >> has been wiretapped by Foreign Intelligence and others using > >> the US National Wiretapping System. There is currently a > >> on-going National Security investigation across the United > >> States concerning the US National Wiretapping System being > >> used against the United States by Foreign Intelligence and > >> others. > >> > >> "The problem: according to classified law enforcement > >> documents obtained by Fox News, the bad guys had the cops' > >> beepers, cell phones, even home phones under surveillance. > >> Some who did get caught admitted to having hundreds of > >> numbers and using them to avoid arrest. > >> > >> "This compromised law enforcement communications between > >> LAPD detectives and other assigned law enforcement officers > >> working various aspects of the case. The organization > >> discovered communications between organized crime > >> intelligence division detectives, the FBI and the Secret > >> Service." > >> > >> Shock spread from the DEA to the FBI in Washington, and then > >> the CIA. An investigation of the problem, according to law > >> enforcement documents, concluded, "The organization has > >> apparent extensive access to database systems to identify > >> pertinent personal and biographical information." > >> > >> When investigators tried to find out where the information > >> might have come from, they looked at Amdocs, a publicly > >> traded firm based in Israel. Amdocs generates billing data > >> for virtually every call in America, and they do credit > >> checks. The company denies any leaks, but investigators > >> still fear that the firm's data is getting into the wrong > >> hands. > >> > >> When investigators checked their own wiretapping system for > >> leaks, they grew concerned about potential vulnerabilities > >> in the computers that intercept, record and store the > >> wiretapped calls." [FOX News Carl Cameron Investigates] > >> > >> "The worst penetrations are believed to be in the State > >> Department. But others say the supposedly secure telephone > >> systems in the White House, Defense Department and Justice > >> Department may have been compromised as well. The problem > >> for FBI agents in the famed Division 5, however, isn't just > > > what they have uncovered, which is substantial, but what > >> they don't know yet." [Insight] > >> > >> Email me to request a collection of news reports about the > >> hottest Federal Government investigation in Washington, DC > >> today. A unbelievable look inside Government wiretapping > >> and how it will impact you. > >> > >> > >> The COMSEC C3I detects legal and illegal wiretapping > >> previously undetectable. Full background and product > >> reviews are available on our web site: > >> > >> > >> We are registered with the Department of Defense and the > >> General Services Agency Information Technology Service. > >> > >> To receive additional information and Special Offers for > >> Subscribers Only reply to this email with "Subscribe" in the > > > Subject Line. > >> > >> PRIVACY STATEMENT: We will not distribute your address to > >> anyone. Period. > >> > >> Reach me at the following address. > >> > >> > >> Mark J. Neer > >> President > >> Communications Security > >> Tel: 281.586.2034 > >> Fax: 281.754.4047 > >> Email: > >> Internet: > >> > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > > > >Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > -- > > -- > ----------------------------------------------------------------------------------------------- > > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > --------------------------------------------------------------------- > ---------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > > ------------------------------------------------------------------------------------------------- > > People sleep peaceably in their beds at night only because rough > men stand ready to do violence on their behalf. - George Orwell > > -------------------------------------------------------------------------------------------------- > > ------------------------ Yahoo! Groups Sponsor > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ 4749 From: Dora Furlong Date: Wed Feb 6, 2002 8:51pm Subject: Re: Microsoft's Really Hidden Files: A New Look At Forensics (v2.6) For those interested in this and what is going on with their computers, or a particular program take a look at FileMon from sysinternals. http://www.sysinternals.com/ntw2k/source/filemon.shtml Company's description: Filemon monitors and displays file system activity on a system in real-time. Its advanced capabilities make it a powerful tool for exploring the way Windows works, seeing how applications use the files and DLLs, or tracking down problems in system or application file configurations. Filemon's timestamping feature will show you precisely when every open, read, write or delete, happens, and its status column tells you the outcome. Filemon is so easy to use that you'll be an expert within minutes. It begins monitoring when you start it, and its output window can be saved to a file for off-line viewing. It has full search capability, and if you find that you're getting information overload, simply set up one or more filters. Filemon works on NT 4.0, Windows 2000, Windows XP, Windows XP 64-bit Edition, Windows 95, Windows 98 and Windows ME. Sysinternals also has a version of Filemon for Linux. -->Dora Furlong On Wed, 6 Feb 2002, James M. Atkinson wrote: > > Microsoft's Really Hidden Files: A New Look At Forensics (v2.6) > By The Riddler > November 3, 2001 > (v2.0 finished May 16, 2001; v1.0 finished June 11, 2000) > > Written with Windows 9x in mind, but not limited to. > > DISCLAIMER: > > I will not be liable for any damage or lost information, whether due to > reader's error, or any other reason. > > SUMMARY: > > There are folders on your computer that Microsoft has tried hard to keep > secret. Within these folders you will find two major things: Microsoft > Internet Explorer has not been clearing your browsing history after you have > instructed it to do so, and Microsoft's Outlook Express has not been deleting > your e-mail correspondence after you've erased them from your Deleted Items > bin. (This also includes all incoming and outgoing file attachments.) And > believe me, that's not even the half of it. > > When I say these files are hidden well, I really mean it. If you don't have > any knowledge of DOS then don't plan on finding these files on your own. I > say this because these files/folders won't be displayed in Windows Explorer at > all -- only DOS. (Even after you have enabled Windows Explorer to "show all > files.") And to top it off, the only way to find them in DOS is if you knew > the exact location of them. Basically, what I'm saying is if you didn't know > the files existed then the chances of you running across them is slim to > slimmer. > > It's interesting to note that Microsoft does not explain this behavior > adequately at all. Just try searching on microsoft.com. > > FORWARD: > > I know there are some people out there that are already aware of some of the > things I mention. I also know that most people are not. The purpose of this > tutorial is teach people what is really going on with Microsoft's products and > how to take control of their privacy again. This tutorial was written by me, > so if you see a mistake somewhere then it is my mistake, and I apologize. > > Thanks for reading. > > INDEX: > > 1) DEFINITIONS > 1.1) Ancronyms > 2) SEEING IS BELEIVING > 3) HOW TO ERASE THE FILES ASAP > 3.1) If You Have Ever Used Microsoft Internet Explorer > 3.2) Clearing Your Registry > 3.3) Slack files > 3.4) Keeping Microsoft's Products > 4) STEP-BY-STEP GUIDE THROUGH YOUR HIDDEN FILES (For the savvy.) > 5) HOW MICROSOFT DOES IT > 6) +S MEANS [S]ECRET NOT [S]YSTEM. > 7) A LOOK AT OUTLOOK > 8) THE TRUTH ABOUT FIND FAST > 8.1) Removing Find Fast > 9) CONTACT INFORMATION AND PGP BLOCKS > 9.1) Recommended reading > 10) SPECIAL THANKS > 11) REFERENCES > > Coming in version 3.0: > > ˘ pstores.exe > ˘ Related Windows Tricks. > ˘ Looking back on the NSA-Key. > ˘ Researching the [Microsoft Update] button. > ˘ Why the temp folders aren't intended to be temporary at all. > ˘ What's with Outlook Express's .dbx database files? > ˘ Win2K support. > > > 1.0. DEFINITIONS > > I) A "really hidden" file/folder is one that cannot be seen in Windows > Explorer after enabling it to "show all files," and cannot be seen in MS-DOS > after receiving a proper directory listing from root. > > a) There is at least one loophole to enable Windows Explorer to see them. > b) There is at least one loophole to enable MS-DOS to see them. > > II) Distinguishes "really hidden" file/folders from just plain +h[idden] ones, > such as your "MSDOS.SYS" or "Sysbckup" folder. > > III) Distinguishes from certain "other" intended hidden files, such as a file > with a name with high ascii characters (eg, "YÎÔ®o"). > > (Interesting to note that Microsoft has disabled the "Find: Files or Folders" > from searching through one of these folders.) > > > 1.1. ANCRONYMS > > DOS = Disk Operating System aka MS-DOS > MSIE = Microsoft Internet Explorer > TIF = Temporary Internet Files (folder) > HD = Hard Drive > OS = Operating System > FYI = For Your Information > > > 2. SEEING IS BELEIVING > > No. Enabling Windows Explorer to "show all files" does not show the files in > mention. No. DOS does not list the files after receiving a proper directory > listing from root. And yes. Microsoft intentionally disabled the "Find" > utility from searching through one of the folders. > > Oh, but that's not all. > > Just from one of these files I would be able to tell you which web sites you > previously visited, what types of things you search for in search engines, and > probably gather your ethnicity, religion, and sexual preference. Needless to > say one can build quite a profile on you from these files. It has the > potential to expose and humiliate -- putting your marriage, friendship, and > corporation at risk. Here's one good example of the forensic capabilities.. > > "I've been reading your article as I have a problem with an employee of mine. > He has been using the works pc for the internet and using it to chat and look > at porn sites. He was then deleting the cookies and history in order to cover > his tracks. A friend of mine pointed me in the direction of this site and > your article. I have found it to be incredibly useful,..." > > --Concerned Boss, 8/24/01 > > One more thing. They contain your browsing history at ALL times. Even after > you have instructed Microsoft Internet Explorer to clear your history/cache. > And so the saying goes, "seeing is believing..." > > To see for yourself simply do as you would normally do to clear your browsing > history. Go to Internet Options under your Control Panel. Click on the > [Clear History] and [Delete Files] buttons. (Make sure to include all offline > content.) > > So, has your browsing history been cleared? One would think so... > > Skipping the to chase here. These are the names and locations of the "really > hidden files:" > > c:\windows\history\history.ie5\index.dat > c:\windows\tempor~1\content.ie5\index.dat > > If you have upgraded MSIE several times, they might have alternative names of > mm256.dat and mm2048.dat, and may also be located here: > > c:\windows\tempor~1\ > c:\windows\history\ > > Not to mention the other alternative locations under: > > c:\windows\profiles\%user%\... > c:\windows\application data\... > c:\windows\local settings\... > c:\windows\temp\... > c:\temp\... > > FYI, there are a couple other index.dat files that get hidden as well, but > they are seemingly not very important. > > > 3.0. HOW TO ERASE THE FILES ASAP > > Step by step information on how to erase these files as soon as possible. > This section is recommended for the non-savvy. Further explanation can be > found in Section 4.0. Please note that following these next steps will erase > all your internet cache and cookies files. If you use the offline content > feature with MSIE, it will remove this as well. It will not erase your > bookmarks. > > > 3.1. IF YOU HAVE EVER USED MICROSOFT INTERNET EXPLORER > > 1) Shut your computer down, and turn it back on. > 2) While your computer is booting keep pressing the [F8] key until you are > given an option screen. > 3) Choose "Command Prompt Only." This will take you to real DOS mode. ME > users must use a bootdisk to get into real DOS mode. > 4) When your computer is done booting, you will have a C:\> followed by a > blinking cursor. Type in this hitting enter after each line (sans > parenthesis): > > C:\WINDOWS\SMARTDRV (Loads smartdrive to speed things up.) > CD\ > DELTREE/Y TEMP (This line removes temporary files.) > CD WINDOWS > DELTREE/Y COOKIES (This line removes cookies.) > DELTREE/Y TEMP (This removes temporary files.) > DELTREE/Y HISTORY (This line removes your browsing history.) > DELTREE/Y TEMPOR~1 (This line removes your internet cache.) > > (If this last line doesn't work then type this:) > > CD\WINDOWS\APPLIC~1 > DELTREE/Y TEMPOR~1 > > (If this doesn't work then type this:) > > CD\WINDOWS\LOCALS~1 > DELTREE/Y TEMPOR~1 > > (If this still does not work, and you are sure you are using MSIE 5.x, then > feel free to e-mail me. If you have profiles turned on, then it is likely > located under \windows\profiles\%user%\, while older versions of MSIE keep > them under \windows\content\.) > > This last one will take a ridiculous amount of time to process. The reason it > takes so incredibly long is because there is a TON of useless cache stored > on your HD. > > 5) Immediately stop using Microsoft Internet Explorer and go with any of the > alternative browsers out there. Netscape 4.7x from netscape.net, mozilla from > mozilla.org, or opera from opera.com. > > FYI, Windows re-creates the index.dat files automatically when you reboot your > machine so don't be surprised when you see them again. They should at least > be cleared of your browsing history. > > > 3.2. CLEARING YOUR REGISTRY > > It was once believed that the registry is the central database of Windows that > stores and maintains the OS configuration information. Well, this is wrong. > Apparently it also maintains a bunch of other information that has absolutely > nothing to do with the configuration. I won't get into the other stuff but > for one, your Typed URLs are stored in the registry. > > HKEY_USERS/Default/Software/Microsoft/Internet Explorer/TypedURLs/ > HKEY_CURRENT_USER/Software/Microsoft/Internet Explorer/TypedURLs/ > > These "Typed URLs" come from MSIE's autocomplete feature. It records all URLs > that you've typed in manually in order to save you some time filling out the > address field. By typing "ama" the autocomplete feature might bring up > "amazon.com" for you. Although, I find it annoying, some people prefer this > feature. One thing is for sure however -- it's an obvious privacy risk. You > wouldn't want a guest to type "ama" and have it autocomplete to > "amaturemudwrestlers.com" now would you? > > You can clear your Typed URLs out of your registry by doing going to your > Control Panel > Internet Options > Content > [AutoComplete] > and finally > [Clear Forms]. If you feel the AutoComplete feature is a privacy risk, then > uncheck the appropriate boxes here. > > FYI, this section has nothing to do with "really hidden files." It was added > so people can completely clear their browsing history before having to ditch > Microsoft Internet Explorer. > > > 3.3. SLACK FILES > > As you may already know, deleting files only deletes the references to them. > They are in fact still sitting there on your HD and can still be recovered by > a very motivated person. > > ˘ BCWipe is a nice program that will clear these files. (www.bcwipe.com). > ˘ For you DOS buffs, there's a freeware file wiper on simtel.net that I use. > (www.simtel.net/pub/dl/45631.shtml). > ˘ If you are using PGP then there is a "Freespace Wipe" option under PGPtools. > ˘ The newer versions of Norton Utilities has a nice filewiping utility. > ˘ You might want to check out Evidence Eliminator's 30 day trial. This is > probably the best program as far as your privacy goes. > (www.evidence-eliminator.com) > > > 3.4. KEEPING MICROSOFT'S PRODUCTS > > If your work environment forces you to use Microsoft Internet Explorer then I > strongly recommend that you talk your boss into checking out one of these > programs: > > ˘ PurgeIE (www.aandrc.com/purgeie) > ˘ Cache and Cookie Cleaner for IE (www.webroot.com/washie.htm) > ˘ Anonymizer Window Washer (www.anonymizer.com/anonwash) > > These programs automate the process for you, and is far better then having to > ad 'deltree/y' lines to your autoexec. > > AND if your work environment forces you to use Outlook or Outlook Express then > you should get in the habit of compacting your mailboxes. > > You can do this by going to File > Folder > Compact All if you have Outlook > Express. > > or > > Tools > Options > Other tab > [Auto Archive] if you have Outlook. Make sure > to set things up here. > > > 4.0. STEP-BY-STEP GUIDE THROUGH YOUR HIDDEN FILES > > This next section is intended for the savvy user. > > The most important files to be paying attention to are your "index.dat" files. > These are database files that reference your history, cache and cookies. The > first thing you should know is that the index.dat files is that they don't > exist in less you know they do. They second thing you should know about them > is that some will *not* get cleared after deleting your history and cache. > > The result: > > A log of your browsing history hidden away on your computer after you thought > you cleared it. > > To view these files, follow these steps: > > In MSIE 5.x, you can skip this first step by opening MSIE and going to Tools > > Internet Options > [Settings] > [View Files]. Now write down the names of > your alphanumeric folders on a piece of paper. If you can't see any > alphanumeric folders then start with step 1 here: > > 1) First, drop to a DOS box and type this at prompt (in all lower-case) to > bring up Windows Explorer under the correct directory... > > c:\windows\explorer /e,c:\windows\tempor~1\content.ie5\ > > You see all those alphanumeric names listed under "content.ie5?" (left-hand > side.) That's Microsoft's idea of making this project as hard as possible. > Actually, these are your alphanumeric folders that was created to keep your > cache. Write these names down on a piece of paper. (They should look > something like this: 6YQ2GSWF, QRM7KL3F, U7YHQKI4, 7YMZ516U, etc...) If you > click on any of the alphanumeric folders then nothing will be displayed. Not > because there aren't any files here, but because Windows Explorer has lied to > you. If you want to view the contents of these alphanumeric folders you will > have to do so in DOS. (Actually, this is not always true. *Sometimes* > Windows Explorer will display the contents of the alphanumeric folders -- but > mostly it won't. I can't explain this.) > > 2) Then you must restart in MS-DOS mode. (Start > Shutdown > Restart in > MS-DOS mode. ME users use a bootdisk.) > > Note that you must restart to DOS because windows has locked down some of the > files and they can only be accessed in real DOS mode. > > 3) Type this in at prompt: > > CD\WINDOWS\TEMPOR~1\CONTENT.IE5 > CD %alphanumeric% > (replace the "%alphanumeric%" with the first name that you just wrote down) > > DIR/P > > The cache files you are now looking at are directly responsible for the > mysterious erosion of HD space you may have been noticing. One thing > particularly interesting is the ability to view some your old e-mail if you > happen to have a hotmail account. (Oddly, I've only been able to retreive > hotmail e-mail, and not e-mail from my other web-based e-mail accounts. Send > me your experiences with this.) To see them for yourself you must first copy > them into another directory and THEN open them with your browser. Don't ask > me why this works. > > A note about these files: These are your cache files that help speed up > your internet browsing. It is quite normal to use this cache system, as every > major browser does. On the other hand. It isn't normal for some cache files > to be left behind after you have instructed your browser to erase it. > > 5) Type this in: > > CD\WINDOWS\TEMPOR~1\CONTENT.IE5 > EDIT /75 INDEX.DAT > > You will be brought to a blue screen with a bunch of binary. > > 6) Press and hold the [Page Down] button until you start seeing lists of URLs. > These are all the sites that you've ever visited as well as a brief > description of each. You'll notice it records everything you've searched for > in a search engine in plain text, in addition to the URL. > > 7) When you get done searching around you can go to File > Exit. If you don't > have mouse support in DOS then use the [ALT] and [Arrow] keys. > > 8) Next you'll probably want to erase these files by typing this: > > C:\WINDOWS\SMARTDRV > CD\WINDOWS > DELTREE/Y TEMPOR~1 > > (replace "cd\windows" with the location of your TIF folder if different.) > > This will take a seriously long time to process. Even with smartdrive loaded. > > 9) Then check out the contents of your History folder by typing this: > > CD\WINDOWS\HISTORY\HISTORY.IE5 > EDIT /75 INDEX.DAT > > You will be brought to a blue screen with more binary. > > 10) Press and hold the [Page Down] button until you start seeing lists of URLS > again. > > This is another database of the sites you've visited. > > 11) And if you're still with me type this: > > CD\WINDOWS\HISTORY > > 12) If you see any mmXXXX.dat files here then check them out (and delete > them.) Then... > > CD\WINDOWS\HISTORY\HISTORY.IE5 > CD MSHIST~1 > EDIT /75 INDEX.DAT > > More URLs from your internet history. Note, there are probably other mshist~x > folders here so you can repeat these steps for every occurence if you please. > > 13) By now you'll probably want to type in this: > > CD\WINDOWS > DELTREE/Y HISTORY > > > 5.0. HOW MICROSOFT DOES IT > > How does Microsoft make these folders/files invisible to DOS? > > The only thing Microsoft had to do to make the folders/files invisible to a > directory listing is to set them +s[ystem]. That's it. As soon as the dir/s > command hits a system folder, it renders the command useless (unlike normal > folders.) A more detailed explanation is given in Section 6. > > So how does Microsoft make these folders/files invisible to Windows Explorer? > > The "desktop.ini" is a standard text file that can be added to any folder to > customize certain aspects of the folder's behavior. In these cases, Microsoft > utilized the desktop.ini file to make these files invisible. Invisible to > Windows Explorer and even to the "Find: Files or Folders" utility (so you > wouldn't be able to perform searches in these folders!) All that Microsoft > had to do was create a desktop.ini file with certain CLSID tags and the > folders would disappear like magic. > > To show you exactly what's going on: > > Found in the c:\windows\temporary internet files\desktop.ini and the > c:\windows\temporary internet files\content.ie5\desktop.ini contains this > text: > > [.ShellClassInfo] > UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933} > > Found in the c:\windows\history\desktop.ini and the > c:\windows\history\history.ie5\desktop.ini contains this text: > > [.ShellClassInfo] > UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933} > CLSID={FF393560-C2A7-11CF-BFF4-444553540000} > > The UICLSID line cloaks the folder in Windows Explorer. The CLSID line > disables the "Find" utility from searching through the folder. (Additionally, > it gives a folder the appearance of the "History" folder.) > > To see for yourself, you can simply erase the desktop.ini files. You'll see > that it will instantly give Windows Explorer proper viewing functionality > again, and the "Find" utility proper searching capabilities again. Problem > solved right? Actually, no. As it turns out, the desktop.ini files get > reconstructed every single time you restart your computer. Nice one, Slick. > > Luckily there is a loophole which will keep Windows from hiding these folders. > You can manually edit the desktop.ini's and remove everything except for the > "[.ShellClassInfo]" line. This will trick windows into thinking they have > still covered their tracks, and wininet won't think to reconstruct them. > > I can't stress how ridiculous it is that Windows actually makes sure the files > are hidden on every single boot. No other files or folders get this kind of > special treatment. So what's the agenda here? > > > 6.0. +S MEANS [S]ECRET NOT [S]YSTEM > > Executing the "dir/a/s" command from root *should* be the correct command to > display all files in all subdirectories in DOS. However, doing so will not > display the index.dat files. This is because when DOS tries to get a list of > the subdirectories of any +s[ystem] directory it hits a brick wall. No files > or folders will be listed within any system directory. Not only does this > defeat the whole purpose of the "/s" switch in the first place, but I'd say it > looks like Microsoft took extra precautions to keep people from finding the > files. Remember. The only thing you need to do to obscure a file in DOS is > to mark the parent directory +s[ystem]. > > I was told by a few people that this was due to a very old DOS bug that dates > back many years. Fine. I can accept that. A bug it is. > > But, would you consider your Temporary Internet Files to be "system files?" > It would seem that your TIF folder appears to be marked +s[ystem] for no good > reason at all. Just because. Same with your history folder. You may not > agree, but I tend to think that Microsoft marked the folders as +s[ystem] > solely to hide any directory recursal from DOS. > > In case you didn't understand, here's a small experiment that will show you > what I mean... > > Since the content.ie5 and history.ie5 subfolders are both located within a > +s[ystem] folder, we will run the experiment with them. The proper command to > locate them *should* be this: > > CD\ > DIR *.IE5 /as/s > > The problem is that you will receive a "No files found" error message. > > Since we already know there is a content.ie5 subfolder located here, why is > it giving me the "no files found" message? > > But there is a way to get around this brick wall. That is, once you are > inside the system directory, then it no longer has an effect on the dir > listings. For example, if you enter the system folder first, and THEN try to > find any +s[ystem] directories you can see them just fine: > > CD\WINDOWS\TEMPOR~1 > DIR *.IE5 /as/s > > 1 folder(s) found. > > Now you will get a "1 folder(s) found." message. (But only after you knew the > exact location.) > > In other words, if you didn't know the files existed then finding them would > be almost impossible. > > And, by the way. To see the "bug" in progress... > > CD\ > DIR *.IE5 /a/s > > It will echo "no files found." > > Now, just take away the system attributes from the parent directory... > > CD\WINDOWS > ATTRIB -S TEMPOR~1 > > And retry the test... > > CD\ > DIR *.IE5 /a/s > > It will echo "1 folder(s) found." > > > 7.0. A LOOK AT OUTLOOK EXPRESS > > Would you think twice about what you said if you knew it was being recorded? > E-mail correspondence leaves a permanent record of everything you've said -- > even after you've told Outlook Express to erase it. You are given a false > sense of security sense you've erased it twice, so surely it must be gone. > The first time Outlook simply moves it to your "Deleted Items" folder. The > second time you erase it Outlook simply "pretends" it is gone. The truth is > your messages are still being retained in the database files on your HD. > (As with your e-mail attachments.) > > For earlier versions of Outlook Express, they will be located in either of > the following folder: > > c:\program files\internet mail and news\%user%\mail\*.mbx > c:\windows\application data\microsoft\outlook\mail\*.mbx > > At this point you have two choices. > > a) Get in the habit of compacting your folders all the time. > b) Backup, print-out, or import the data into another e-mail client such as > Eudora and then delete the mbx files (and thus all your e-mail correspondence) > by typing this: > > cd\progra~1\intern~1\%user%\mail > deltree/y mail > > or > > cd\windows\applic~1\micros~1\outloo~1\ > deltree/y mail > > *Typing in the above commands will kill all your e-mail correspondence. Do > not follow those steps in less you have already exported your e-mail and > address book! > > If you have a newer version of Outlook or Outlook Express the databases are > located elsewhere. Look for .dbx and .pst file extensions. These databases > are five times as creepy, and I strongly recommend you take at the files. > > Just from my outbox.dbx file I was able to view some of my old browsing > history, bring up previously-visited websites in html format, and even read > ancient e-mail from my Eudora client (read: EUDORA). > > Again, don't take my word for it. See for yourself and THEN tell me what you > think Slick Willy is up to here. > > > 8.0. THE TRUTH ABOUT FIND FAST > > Have you ever wondered what that "Find Fast" program was under your control > panel? Here's a hint: It has absolutely nothing to do with the "Find" > utility located under the [Start] menu. Just to clear up any confusion before > going on, Oblivion adequately explains Find Fast here: > > "In any version of Word after 95, choose File Open and you'll get the Office > App Open dialog. Instead of just a space for the file name, there are text > boxes for file name, files of type, text or property & last modified. These > are search criteria you can use to find one or more files. There is also an > "Advanced" button that opens a dedicated search dialog with more options. > When you use either of these dialogs to perform a search, that search process > uses the indexes built by Find Fast." > > --Oblivion > > But what would you say if I told you that Find Fast was scanning every single > file on your hard drive? Did you know that in Office 95, the Find Fast > Indexer had an "exclusion list" comprised of .exe, .swp, .dll and other > extensions, but the feature was eliminated? If you were a programmer would > you program Find Fast to index every single file, or just the ones with Office > extensions? > > FYI, If you have ever had problems with scandisk or defrag restarting due to > disk writes, it is because Find Fast was indexing your hard drive in the > background. It loads every time you start your computer up. > > Now here is a good example of the lengths Microsoft has gone through to keep > people from finding out Find Fast is constantly scanning and indexing their > hard drives. (Always good to have an alibi.) Here's a snippet taken from > microsoft.com: > > "When you specify the type of documents to index in the Create Index dialog > box, Find Fast includes the document types that are listed in the following > table. > > Document type File name extension > ------------- ------------------- > > MS Office and Web Documents All the Microsoft Excel, Microsoft > PowerPoint, Microsoft > Project, and Microsoft Word document types > listed in this table. Microsoft Binder > (.odb, .obt) and Microsoft Access (.mdb) > files. Note that in .mdb files, only > document properties are indexed. > > Word documents .doc (document), > .dot (template), .ht* (Hypertext Markup > Language document), .txt (text file), .rtf > (Rich Text Format) files, Excel workbooks > .xl* files > > PowerPoint .ppt (presentation), .pot (template), .pps > (auto-running presentation) files > > Microsoft Project files .mpp, .mpw, .mpt, .mpx, .mpd files > > All files *.* files" > > > Did you get that last part? "All files?" Find Fast indexes Office Documents, > Web documents, Word Documents, Power Point files, Project files, and (oh I > forgot) EVERY SINGLE other file on your computer. > > Actually, the good news is that this isn't necessarily true. In another > statement Microsoft claims that if Find Fast deems the file "unreadable" then > the file will not be included in the index. For example, your command.com > probably wouldn't get indexed because it doesn't have a lot of plain text -- > mostly binary. > > But, back to the bad news. Every single file that has legible text is going > to be included in the Find Fast database. Do you understand the implication > here? ALL TEXT SAVED TO YOUR HARD DRIVE IS INDEXED. The forensic > capabilities are enormous, folks. Don't forget "all text" also means > previously-visited webpages from your cache. See for yourself... > > 1) Open up a DOS window and type... > 2) CD\ > 3) DIR FF*.* /AH (This will bring up a list of the find fast databases.) > 4) EDIT /75 %ff% (insert %ff% with any of the names that were listed.) > > Notice the incredible amount of disk accesses to your cache and history > folders? Why do we need two indexes? > > > 8.1. REMOVING THE FIND FAST PROGRAM > > You can remove Find Fast using your Office CD, but I recommend you do it > manually... > > 1) Reboot your computer in MS-DOS Mode. > 2) Delete the findfast.cpl file from c:\windows\system\. > 3) Delete the shortcut (.lnk) under c:\windows\start menu\programs\startup\. > 4) Delete the findfast.exe file from c:\progra~1\micros~1\office\. > 5) Important to delete the find fast databases (c:\ff*.*). > 6) You can also safely delete FFNT.exe, FFSetup.dll, FFService.dll, and > FFast_bb.dll if you have them. > > Feel free to check out the ffastlog.txt (which is the Find Fast error log). > It's a +h[idden] file under c:\windows\system\. > > > 9. CONTACT INFO AND PGP BLOCKS > > This tutorial is being updated all the time. If you have any useful input, or > if you see a mistake somewhere, then please e-mail me so I can compile it into > future versions. You will be able to find the most recent version of this > tutorial at fuckmicrosoft.com. I am not affiliated with the site. > > My e-mail address is located at the end of this note. Please let me know > where you heard about this tutorial in your message. If you have something > important to say to me, then please use encryption. My public key blocks are > located below. Be suspicious if you send me an encrypted message but never > get a reply. > > Thanks for reading, > > -- The Riddler > theriddler@f... > > My 2.6.2 block is no longer valid because my secring was nuked. When I > created another keyring with another version of PGP, it read my "SET PGPPATH=" > line and copied a new ring over my old one. No backups were made. Moral of > the story: Backup your keys. > > My PGP 2.6.3 Block: > > -----BEGIN PGP PUBLIC KEY BLOCK----- > Version: 2.6.3a > Comment: Compatible with PGP 2.6.x > > mQCNAzvVzqgAAAEEANT+lnfVk79zr/eYkLHs+euTg/JBSQXmUWB5dMxv4Vvv4Xes > CnaNrv5Udi3hfABKb1tq41N6kPJ/n/Qz/vSW52Z4wg+Q+ZGGoITIJ1p8bDOceb2Q > EsMsY7kzCHqkBF0N53TuVt+ywhVncN+CqecVvhuQ4RXUOVUvru7gGcd76OVxAAUR > tAt0aGUgcmlkZGxlcokAlQMFEDvVzqju4BnHe+jlcQEBC14EAM3Th47aEChB0GAf > 5xGlLPQnrj6zyf5uovj12PEFnCOwcEhDDAuq4Ito7Keb22DqwlJDNChIM7xLx8bZ > d9VaMpkirFzgvFmGu5eNGp18rR9EyIVY/tTdWlRcsUL/nw2XNXxw51tHE7M/O1fp > Un4qIcG0CfAQ1QCUfqOwTWbFH/Wy > =muLu > -----END PGP PUBLIC KEY BLOCK----- > > My GPG 1.0.6 Block: > > -----BEGIN PGP PUBLIC KEY BLOCK----- > Version: GnuPG v1.0.6 (MingW32) > > mQGhBDu3TSERBACO0Fx9pjMULe6qLQwOgfvdnQconLOMyftZdp9+ZX6t29ebJ/Z5 > qQOJ9ce9Xr6Lj4u+M9VDx1FK5ueoD45bUAy0HAvYDV/HEu2vCRimpbreDky/U88a > XL59Pe8qwnmfUzYc/LnH86VCr4lPmpbz6/adXj44xE6EwkhFcq6BD4isCwCg8zZO > Hk9+KEKOyPHIFWq7TUA/JdUD/jWtNrGZ0tfSAS0WDiBifsBr1HW7n2IMDFX1anqC > DN0ToM5IFWGDkOh1NUvP0RvyrnNuBOP/oWxkPLR0nVvifETF0iG9o+kfitC9NmJn > QP/iw4WhCoHRCc5wqnAAXQC9j8JdodQ8E5VnfnNGkttgWz7mNzBongrIoTdfVdtf > o5NwA/d/lwMhGE0HNXnXOgRBcPjGD0LsR8pFoSP/HJ9Hu3zms2cbQqN2O/f99H2G > s9mXR7uvicu9SbKoTwFkptLVbOQIhvBnw0fTlZGrUsaiw4vzt99PffTKq1FPIpQe > K7HcnUK2+ZSVs5PxGiDckobJEjBssSw9Lg5RSNMy9H7s9jv3tAt0aGUgcmlkZGxl > cohXBBMRAgAXBQI7t00iBQsHCgMEAxUDAgMWAgECF4AACgkQ/bqXDRMV1MxyMgCc > CH2uO/f46JgQ0pspQxi7IBv0yNQAn11ebXHbZGuADwuBun1EnQCJb8VIuQINBDu3 > UOAQCADKG2mf/FW3kuSAGoFmIMBm4l6m0O7denwUIpZP2jxeNTLmLW6ntGglHP++ > wEQpHjKTJfXoSHZH0euuXVZ9hOVdf1+PuRNy0DzrDDiKX7fdQ6eSbw+heSWc0kOF > AB1j3pcovG4K2+bK66039kQLIT3kNUZgh9DdMZjIFzBg90aQnaEm5LLMkv1FNVZP > YehZm3RRIpLAX5vkJJbUA/VVh/FXDG5f21iAGDHgSdKsLW2JNDAWe6/rY0GV5dgx > C0gsqBn1rxNNDyG+z6nFCQtohL/x5zdTzedLQBjIlao91mSWhBsyxiX8mjhvGO97 > o6zVUG5KHBKGmvWMqlyOsGY9VSbDAAMGCADIaFAcE+ADY3ku9Fy0NIlJhbj578YY > xpsE6KvZI1OqbHSoBnN06A3Mpxp4QRBXlr9eRRl+zMTQl1VcVWkahZYNapOqq6L3 > wHBmf9psggCBxqQdI9n5zxnlkphb50J7G9UevB/IGzlW2fe7WMWjo2GegIvGHVWr > qeZgyaNf/CyMtihAX3O86rpqakq//nJvQ9MPcp/Brr9KT2NxBlpBm6xWY35IL5FG > dZ2hpHaO1TC6bdmWUPhvzmSVtD9f0AnnJEgVc03vBz7xJrc1IEa1DeRdfFNvkoch > +mNjc+fBAIQrVMCQ33u+yP/DWSdThrhxz1tAGWV7SlwxVyg6JPRQJ+moiEYEGBEC > AAYFAju3UOAACgkQ/bqXDRMV1MwVnACfaGrJRv2lgWHQbQWwv55t2cT+QWEAnA/n > ckswjlC9aNcBkcFl7X1SX8JX > =pFTK > -----END PGP PUBLIC KEY BLOCK----- > > > 9.1. RECOMMENDED READING > > http://www.theregister.co.uk/content/4/18002.html > http://www.findarticles.com/m0CGN/3741/55695355/p1/article.jhtml > http://www.mobtown.org/news/archive/msg00492.html > http://194.159.40.109/05069801.htm > http://www.yarbles.demon.co.uk/mssniff.html > http://www.macintouch.com/o98security.html > http://www.theregister.co.uk/content/archive/3079.html > http://www.fsm.nl/ward/ > http://slashdot.org > http://www.peacefire.org > http://stopcarnivore.org > http://nomorefakenews.com > http://grc.com/steve.htm#project-x > > > 10. SPECIAL THANKS (and no thanks) > > This version I want to give special thanks to Concerned Boss, Oblivion, and > the F-Prot virus scanner. > > I also want to take this time to show my dissatisfaction to the New Zealand > Herald. Although partly flattering, it was more disgusting to see a newspaper > try to take credit for my work. > > > 11. REFERENCES > > http://support.microsoft.com/support/kb/articles/Q137/1/13.asp > http://support.microsoft.com/support/kb/articles/Q136/3/86.asp > http://support.microsoft.com/support/kb/articles/Q169/5/31.ASP > http://support.microsoft.com/support/kb/articles/Q141/0/12.asp > http://support.microsoft.com/support/kb/articles/Q205/2/89.ASP > http://support.microsoft.com/support/kb/articles/Q166/3/02.ASP > http://www.insecure.org/sploits/Internet.explorer.web.usage.logs.html > http://www.parascope.com/cgi-bin/psforum.pl/topic=matrix&disc=514&mmark=all > http://www.hackers.com/bulletin/ > http://slashdot.org/articles/00/05/11/173257.shtml > http://peacefire.org > > COPYRIGHT INFORMATION > > This article has been under the protection of copyright laws the moment it was > fixed in a tangible form. In less otherwise agreed, this article may only be > distributed as a whole and without modification. Thank you. > -- > > -------------------------------------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------------------------------- > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com > -------------------------------------------------------------------------------------------------- > People sleep peaceably in their beds at night only because rough > men stand ready to do violence on their behalf. - George Orwell > -------------------------------------------------------------------------------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > "The universe is full of magical things patiently waiting for our wits to grow sharper." Eden Phillpotts 4750 From: Larry Malmberg Date: Thu Feb 7, 2002 9:27am Subject: Computer Key Stroke Anti Logging This is not an endorsement, just FYI. http://www.anti-keyloggers.com/ Larry Larry Malmberg Investigations and Security 638 North "D" Street San Bernardino, CA 92401-1110 800-655-4549 or 909-383-8565 FAX 909-383-8566 P.I. 15211, P.P.O. 12466 www.larrypi.com Just because you are paranoid doesn't mean someone is not following you! 4751 From: James M. Atkinson Date: Thu Feb 7, 2002 10:05am Subject: Subscriber Update - We Now have 1205 Subscribers I just thought the list membership would like to know that we now have 1205 solid subscribers to this forum. Our actual numbers are a little bit higher as at any particular moment a dozen or so subscribers are in bounce status (in reality, right now we have 1223 subscribers). The list grows by about 25+ people per month, with roughly 35-45 people joining, and 10-15 people leaving each month. The list is dedicated to TSCM, is completely free, has no dues, has open membership, and exists for the sole purpose of improving the industry and "raising the bar". For the most part the list has been good at staying on relevant topics, but I invite the membership to periodically post humor to give us a chuckle, or pearl of wisdom to help us all think. News articles relative to espionage or counter-espionage is also welcome as list postings, as are white papers, technical materials, etc. For Sale, and "Looking to Buy" notices are also welcome; but tread carefully as I take a dim view of people trying to SPAM via the list. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4752 From: A Grudko Date: Thu Feb 7, 2002 10:58am Subject: Anti-keylogger In my mail today Spy vs Spy vs Spy (?) I'm more than dubious of any device that claims to be able to detect "UNKNOWN" threats. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time - Original Message - The Anti-keylogger is the FIRST product of its kind in the world that can > provide every computer with virtual protection against all types of > unauthorized keystroke monitoring programs, both KNOWN and UNKNOWN. > Product includes powerful intellectual analyzer, which allows to > detect and deactivate all keystroke monitoring programs probably > running on your system. > > http://www.anti-keyloggers.com 4753 From: Date: Thu Feb 7, 2002 8:16am Subject: Re: Anti-keylogger In a message dated 2/7/02 11:02:26 AM Pacific Standard Time, agrudko@i... writes: << I'm more than dubious of any device that claims to be able to detect "UNKNOWN" threats. >> we have unknown threats on this list 4754 From: James M. Atkinson Date: Thu Feb 7, 2002 1:07pm Subject: Ms. Cleo's Bug Sweeping 900 Hotline That's not a bad idea. How about simply pulling the caller ID record available when you call a 900 number, feeding it to a PC that in turn calls the 800# for the MLT (Metallic Loop Test) facility, which in turn strobes the line with a TDR and reads back the phone number, cable number, pair number, address, distances, voltages, etc to the caller. This way the caller could check their lines daily for any kind of voltage, current, impedance, or length related issues. The computer (at the 900 #) could store the results of all of their tests and let them know that everything was the same as previous checks. It could make someone an overnight millionaire (until they got indicted). The biggest problem is that it would miss 85-90% of actual eavesdropping devices. -jma At 10:50 AM -0600 2/7/02, John McCain wrote: >I know..... Jim, you just hit upon the REAL moneymaker. We'll let >you (but share the profits with the list:-) set up a 900 line with >a voice response voltmeter on it. When they call (after being on >hold for about 5 minutes loor so istening to how great the system >is, it reads back the line voltage (of your line naturally). The >voltages will vary a little, so they get different numbers most of >the time. Then, the recording tells them that this is a normal line >voltage, so there is probably not a tap on the line. Of course, it >follows that with an announcement that they need to call back weekly >to insure that no one has installed a tap on the line THIS week. >Invite them to call from Pay phones, friend's phones, etc. to make >sure that they can talk to them without being worried about taps >there. > >Might be more profitable than Ms. Cleo! >Cheers, >JohnM -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4755 From: James M. Atkinson Date: Thu Feb 7, 2002 5:39pm Subject: How Do These people Survive [Note: This came in from another list member, a bit of urban legends, but funny -jma] -jma Recently, when I went to McDonald's I saw on the menu that you could have an order of 6, 9 or 12 Chicken McNuggets. I asked for a half dozen nuggets. "We don't have half dozen nuggets", said the teenager at the counter. "You don't?" I replied. "We only have six, nine, or twelve," was the reply. "So I can't order a half-dozen nuggets, but I can order six?" "That's right." So I shook my head and ordered six McNuggets. The paragraph above doesn't amaze me because of what happened couple of months ago: I was checking out at the local Foodland with just a few items and the lady behind me put her things on the belt close to mine. I picked up one of those "Dividers" that they keep by the cash register and placed it between our things so they wouldn't get mixed. After the girl had scanned all of my items, she picked up the "Divider" looking it all over for the bar code so she could scan it. Not finding the bar code she said to me "Do you know how much this is?" and I said to her "I've changed my mind, I don't think I'll buy that today". She said "OK" and I paid her for the things and left. She had no clue to what had just happened.... A lady at work was seen putting a credit card into her floppy drive and pulling it out very quickly. When inquired as to what she was doing. She said she was shopping on the Internet and they kept asking for a credit card number, so she was using the ATM "thingy". I recently saw a distraught young lady weeping beside her car. Do you need some help?" I asked. She replied, "I knew I should have replaced the battery to this remote door unlocker. Now I can't get into my car. Do you think they (pointing to a distant convenient store) would have a battery to fit this?" "Hmmm, I dunno. Do you have an alarm too?" I asked. "No, just this remote thingy," she answered, handing it and the car keys to me. As I took the key and manually unlocked the door, I replied, "Why don't you drive over there and check about the batteries it's a long walk. Several years ago, we had an intern who was none too swift. One day she was typing and turned to a secretary and said, "I'm almost out of typing paper. What do I do?" "Just use copier machine paper," the secretary told her. With that, the intern took her last remaining blank piece of paper, put it on the photocopier and proceeded to make five blank"copies. I was in a car dealership a while ago, when a large motor home was towed into the garage. The front of the vehicle was in dire need of repair and the whole thing generally looked like an extra in "Twister". I asked the manager what had happened. He told me that the driver had set the "cruise control" and then went in the back to make a sandwich. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4756 From: Andre Holmes <1ach@v...> Date: Thu Feb 7, 2002 11:44am Subject: Optoelectronics Hi listies I have come across so information that maybe important to owners of such equipment. The Optoelectronics 3000A is no longer available do to parts shortage also the Micro line was infected as well. Andre Holmes [Non-text portions of this message have been removed] 4757 From: MaxS Date: Thu Feb 7, 2002 10:50am Subject: RE: Bible citation in Digest Number 851 Dear community member: Allow one comment from past East Block to this interesting topic: "The 10 Commandments of Counterintelligence" It'll be begin with >> in text. ">> Yes, but US president" I think that usage of BIBLE in politics and business should be or must be discussed with experts. Any piece of information without context is irrelevant. If it would support only some argument it must be precise, not some "half-random" work. I think lots of Universities in US are prepared enough to consult BIBLE usage. Especially for politics and Intelligence. What about or http://www.metanexus.net or some proved by AGENCIES ... . Sincerely, Martin KOCIAN Czech Republic Message: 2 Date: Tue, 5 Feb 2002 22:39:22 -0500 From: "James M. Atkinson" Subject: The 10 Commandments of Counterintelligence The 10 Commandments of Counterintelligence BY James M. Olson This article appeared in Studies of Intelligence, Unclassified Edition, Fall-Winter 2001, No.11, published by the CIA's Center for the Study of Intelligence. The Center seeks to promote study, debate, and understanding of the role of intelligence in the American system of government. Mr. Olson served in the Central Intelligence Agency's Directorate of Operations and is presently on the faculty of the George Bush School of Government and Public Service at Texas A&M University. "O that thou hadst hearkened to my commandments! Then had thy peace been as a river, and thy righteousness as the waves of the sea." Isaiah 48:18 >> Yes,but US president has made oath on BIBLE with Headline "One Nation" >> and also announced/declared in his state-of-the-union speech >> to Congress on Jan 29th "an axis of evil" threatens the peace. >> So, you should use Isaiah 49:26 to go in line with Mr.Bush and >> according BIBLE suggestion in Isaiah 48:18. "And I will make those maltreating you eat their own flesh; and as with the sweet wine they will become drunk with their own blood. ...." Isaiah 49:26 >> End of comment The need for counterintelligence (CI) has not gone away, nor is it likely to. The end of the Cold War has not even meant an end to the CI threat from the former Soviet Union. The foreign intelligence service of the new democratic Russia, the Sluzhba Vneshney Razvedki Rossii (SVRR), has remained active against us. It was the SVRR that took over the handling of Aldrich Ames from its predecessor, the KGB, in 1991. It was the SVRR that ran CIA officer Harold James Nicholson against us from 1994 to 1996. It was the SVRR that was handling FBI special agent Earl Pitts when he was arrested for espionage in 1996. It was the SVRR that planted a listening device in a conference room of the State Department in Washington in the summer of 1999. And it was the SVRR that was handling FBI special agent Robert Hanssen when he was arrested on charges of espionage in February 2001. The Russians are not alone. There have been serious, well-publicized concerns about Chinese espionage in the United States. The Department of Energy significantly increased security at its national laboratories in response to allegations that China had stolen US nuclear weapons secrets. Paul Redmond, the former Associate Deputy Director of Operations for Counterintelligence at the CIA, told the House Permanent Select Committee on Intelligence in early 2000 that a total of at least 41 countries are trying to spy on the United States. Besides mentioning Russia, China, and Cuba, he also cited several "friends," including France, Greece, Indonesia, Israel, the Philippines, South Korea, and Taiwan. He warned of a pervasive CI threat to the United States. The United States, as the world's only remaining superpower, will be the constant target of jealousies, resentments, rivalries, and challenges to its economic well-being, security, and leadership in the world. This inevitably means that the United States will be the target of large-scale foreign espionage. A Choice Assignment When I joined the CIA, one of my first interim assignments was with the old CI Staff. I found it fascinating. I was assigned to write a history of the Rote Kapelle, the Soviet espionage network in Nazi-occupied Western Europe during World War II. With its expanded computer power, NSA was breaking out the actual messages sent between the NKVD center in Moscow and the clandestine radios of the various cells in Western Europe. Incredibly, these messages came to me. There I was, a brand new junior officer, literally the first person in the CIA to see the day-to-day traffic from these life-and-death operations. I was deeply affected by the fear, heroism, and drama in these messages. Above all, I felt privileged to have been given such an opportunity. Building on an earlier study of the Rote Kapelle by the CI Staff, I completed a draft several months later that incorporated the new material. To my great surprise, this study was well received by my immediate superiors, and I was told that I was to be rewarded with a personal interview and congratulations from James Jesus Angleton, the legendary head of the CI Staff from 1954 to 1974. Angleton's office was on the second floor of the Original Headquarters Building. I was first ushered into an outer office, where Angleton's aides briefed me on how to conduct myself. And then I went alone into the inner sanctum. The room was dark, the curtains were drawn, and there was just one small lamp on Angleton's desk. I later heard that Angleton had eye trouble and that the light hurt his eyes, but I was convinced the real reason for the semidarkness was to add to his mystique. It certainly worked on me! I nervously briefed Angleton on my study, and he listened without interrupting, just nodding from time to time. When I finished, he methodically attacked every one of my conclusions. Didn't I know the traffic was a deception? Hadn't it occurred to me that Leopold Trepper, the leader of the Rote Kapelle, was a German double? He went on and on, getting further and further out. Even I, as a brand new officer, could tell that this great mind, this CI genius, had lost it. I thought he was around the bend. It was one of the most bizarre experiences of my career. When the meeting was over, I was glad to get out of there, and I vowed to myself that I would never go anywhere near CI again. I did not keep that vow. In my overseas assignments with the Agency, I found myself drawn toward Soviet CI operations. Nothing seemed to quicken my pulse more, and I was delighted when I was called back to Headquarters in 1989 to join the new Counterintelligence Center (CIC) as Ted Price's deputy. When Ted moved upstairs in early 1991 to become the Associate Deputy Director for Operations, I was named chief of the Center. Today, many years after that initial disagreeable encounter with CI, I find it hard to believe that it is actually my picture on the wall of the CIC conference room at CIA Headquarters, where the photos of all former CIA counterintelligence chiefs are displayed. There I am, number seven in a row that begins with Angleton. So, after a career that ended up being far more CI-oriented than I could ever have imagined, I would like to offer some personal observations in the form of "The 10 Commandments of Counterintelligence." I have chosen the form of commandments because I believe the basic rules of CI are immutable and should be scrupulously followed. In my view, it makes little difference whether the adversary is the Russians, the Cubans, the East Germans, the Chinese, or someone else. It likewise makes little difference whether we are talking about good CI practices in 1985 or in 2005. Unfortunately, as I watch US CI today, I am increasingly concerned that the principles I consider fundamental to effective CI are not being followed as carefully and consistently as they should be. These commandments were not handed down to me from a mountaintop, and I make no claim that they are inspired or even definitive. They are simply the culmination, for what they are worth, of my experience. They are intended primarily for my fellow practitioners in CI today, but also for any younger officers in the Intelligence Community (IC) who might someday want to join us. The First Commandment: Be Offensive CI that is passive and defensive will fail. We cannot hunker down in a defensive mode and wait for things to happen. I believe we are spending far too much money on fences, safes, alarms, and other purely defensive measures to protect our secrets. That is not how we have been hurt in recent years. Spies have hurt us. Our CI mindset should be relentlessly offensive. We need to go after our CI adversaries. Aggressive double agent (DA) operations are essential to any CI program, but not the predictable, hackneyed kind we have so often pursued. We need to push our bright and imaginative people to produce clever new scenarios for controlled operations, and we need more of them. The opposition services should be kept constantly off guard so that they never suspect that we have actually controlled the operations they believe they initiated from the beginning. When the requirements, modus operandi, and personality objectives of the DA operation have been achieved, we should in a greater number of cases pitch the opposition case officer. If only one out of 10 or 20 of these recruitments takes, it is worth it. And CI professionals, of course, should not rely exclusively on their own efforts. They should constantly prod their HUMINT colleagues to identify, target, and recruit officers from the opposition intelligence services. The key to CI success is penetration. For every American spy, there are several members of the opposition service who know who he or she is. No matter what it takes, we have to have penetrations. We should operate aggressively against the nontraditional as well as the traditional adversaries. How many examples do we need of operations against Americans by so-called friendly countries to convince us that the old intelligence adage is correct: there are friendly nations, but no friendly intelligence services? If we suspect for whatever reason that the operatives of a foreign intelligence service, friend or foe, are operating against us, we should test them. We should dress up an enticing morsel, made to order for that specific target, and send it by them. If they take it, we have learned something we needed to know, and we have an operation. If they reject it, as true friends should, we have learned something, too. In either event, because we are testing a "friend," plausible deniability has to be strictly preserved. Every foreign service is a potential nontraditional adversary; no service should get a lifetime pass from US offensive CI operations. The Second Commandment: Honor Your Professionals It has been true for years, to varying degrees throughout the IC, that CI professionals have not been favored, to the extent they deserved, with promotions, assignments, awards, praise, esteem, or other recognition. The truth is that CI officers are not popular. They are not always welcome when they walk in. They usually bring bad news. They are easy marks to criticize when things go wrong. Their successes are their failures. If they catch a spy, they are roasted for having taken so long. If they are not catching anyone, why not? What have they done with all that money they spent on CI? It is no-win. For much of my career, many of our best people avoided becoming CI specialists. CI was not prestigious. It had a bad reputation. It was not fast track. It did not lead to promotions or good assignments. Angleton left a distasteful legacy that for years discredited the CI profession. Ted Price did more than anyone else in the Agency to reverse that trend and to rehabilitate CI as a respected professional discipline. Nevertheless, that battle is still not completely won. We have to do more to get our CI people promoted, recognized, and respected so that our best young officers will be attracted to follow us into what we know is a noble profession and where the need is so great. The Third Commandment: Own the Street This is so fundamental to CI, but it is probably the least followed of the commandments. Any CI program worthy of the name has to be able to engage the opposition on the street, the field of play for espionage. And when we do go to the street, we have to be the best service there. If we are beaten on the street, it is worse than not having been there at all. For years, we virtually conceded the streets of the world's capitals, including the major espionage centers, to the KGB, the GRU, and the East European services because we either did not know how to do it or we were not willing to pay the price for a thoroughly professional, reliable, full-time, local surveillance capability. Opposition intelligence officers have to be watched, known meeting areas have to be observed, and, when an operation goes down-often on short notice- undetectable surveillance has to cover it, identify the participants, and obtain evidence. This capability is expensive-selection, training, vehicles, photo gear, video, radios, safe apartments, observation posts, and on and on-but, if we do not have it, we will be a second-rate CI service and will not break the major cases. The Fourth Commandment: Know Your History I am very discouraged when I talk to young CI officers today to find how little they know about the history of American CI. CI is a difficult and dangerous discipline. Many good, well-meaning CI people have gone wrong and made horrendous mistakes. Their failures in most cases are well documented, but the lessons are lost if our officers do not read the CI literature. I find it inconceivable that any CI practitioner today could ply his or her trade without an in-depth knowledge of the Angleton era. Have our officers read Mangold? Have they read Legend and Wilderness of Mirrors? Do they know the Loginov case, HONETOL, MHCHAOS, Nosenko, Pollard, and Shadrin? Are they familiar with Aspillaga and the Cuban DA debacle? Have they examined our mistakes in the Ames and Howard cases? Are they staying current with recent releases like The Mitrokhin Archive and The Haunted Wood? I believe it is an indispensable part of the formation of any American CI officer-and certainly a professional obligation-to study the CI failures of the past, to reflect on them, and to make sure they are not repeated. The many CI courses being offered now are a positive step, but there will never be a substitute for a personal commitment on the part of our CI professionals to read their history, usually on their own time at home. The Fifth Commandment: Do Not Ignore Analysis Analysis has too often been the stepchild of CI. Throughout the CI community, we have fairly consistently understaffed it. We have sometimes tried to make it up as we go along. We have tried to do it on the cheap. Generally speaking, operators make bad analysts. We are different kinds of people. Operators are actors, doers, movers and shakers; we are quick, maybe a little impulsive, maybe a little "cowboy." Our best times are away from our desks. We love the street. Research and analysis is really not our thing-and when we have tried to do it, we have not been good at it. True analysts are different. They love it. They are more cerebral, patient, and sedentary. They find things we could not. They write better. A lot of CI programs in the past have tried to make operators double as their own analysts. As a result, in the United States, CI analysis historically has been the weakest part of the business. Professional CI analysts have been undervalued and under appreciated. A good CI program will recruit and train true analysts in sizable numbers. I do not think it would be excessive as a rule of thumb in a top notch CI service to be evenly divided between operators and analysts. Very few of our US CI agencies come anywhere close to that ratio. Wonderful things happen when good analysts in sufficient numbers pore over our DA reports, presence lists, SIGINT, audio and teltap transcripts, maps, travel data, and surveillance reports. They find the clues, make the connections, and focus our efforts in the areas that will be most productive. Many parts of the US CI community have gotten the message and have incorporated trained analysts into their operations, but others have not. Across the board, we still have serious shortfalls in good, solid CI analysis. The Sixth Commandment: Do Not Be Parochial More harm probably has been done to US CI over the years by interagency sniping and obstruction than by our enemies. I remember when the CIA and the FBI did not even talk to each other-and both had disdain for the military services. It is no wonder that CI was a shambles and that some incredibly damaging spies went uncovered for so long. Occasionally in my career, I encountered instances of sarcasm or outright bad mouthing of other US Government agencies by my officers. That kind of attitude and cynicism infected our junior officers and got in the way of cooperation. These comments often were intended to flaunt our supposed "superiority" by demeaning the capabilities of the other organizations. I dealt with these situations by telling the officers to "knock it off," and I would encourage other CI supervisors around the community to do the same. CI is so difficult, even in the best of circumstances, that the only way to do it is together. We should not let personalities, or jealousies, or turf battles get in the way of our common mission. Our colleagues in our sister services are as dedicated, professional, hardworking, and patriotic as we are, and they deserve our respect and cooperation. The best people I have known in my career have been CI people, regardless of their organizational affiliation. So let's be collegial. The Seventh Commandment: Train Your People CI is a distinct discipline and an acquired skill. It is not automatically infused in us when we get our wings as case officers. It is not just a matter of applying logic and common sense to operations, but is instead a highly specialized way of seeing things and analyzing them. CI has to be learned. I do not know how many times in my career I have heard, "No, we do not really need a separate CI section. We are all CI officers; we'll do our own CI." That is a recipe for compromise and failure. There is no substitute for a professional CI officer, and only extensive, regular, and specialized CI training can produce them. Such training is expensive, so whenever possible we should do it on a community basis to avoid duplication and to ensure quality. CI is a conglomerate of several disciplines and skills. A typical operation, for example, might include analysts, surveillance specialists, case officers, technical experts, and DA specialists. Each area requires its own specialized training curriculum. It takes a long time to develop CI specialists, and that means a sustained investment in CI training. We are getting better, but we are not there yet. The Eighth Commandment: Do Not Be Shoved Aside There are people in the intelligence business and other groups in the US Government who do not particularly like CI officers. CI officers have a mixed reputation. We see problems everywhere. We can be overzealous. We get in the way of operations. We cause headaches. We are the original "black hatters." Case officers want their operations to be bona fide. Senior operations managers do not want to believe that their operations are controlled or penetrated by the opposition. There is a natural human tendency on the part of both case officers and senior operations managers to resist outside CI scrutiny. They believe that they are practicing good CI themselves and do not welcome being second-guessed or told how to run their operations by so-called CI specialists who are not directly involved in the operations. I have seen far more examples or this in my CI career than I care to remember. By the same token, defense and intelligence contractors and bureaucrats running sensitive US Government programs have too often tended to minimize CI threats and to resist professional CI intervention. CI officers, in their view, stir up problems and overreact to them. Their "successes" in preventing CI problems are invisible and impossible to measure, but their whistle blowing when problems are uncovered generate tremendous heat. It is not surprising that they are often viewed as a net nuisance. When necessary, a CI service has to impose itself on the organizations and groups it is assigned to protect. A CI professional who is locked out or invited in only when it is convenient to the host cannot do his job. My advice to my CI colleagues has always been this: "If you are blocked by some senior, obtuse, anti-CI officer, go around him or through him by going to higher management. And document all instances of denied access, lack of cooperation, or other obstruction to carrying out your CI mission. If not, when something goes wrong, as it likely will in that kind of situation, you in CI will take the blame." The Ninth Commandment: Do Not Stay Too Long CI is a hazardous profession. There should be warning signs on the walls: "A steady diet of CI can be dangerous to your health." I do not believe anyone should make an entire, uninterrupted career of CI. We all who work in CI have seen it: the old CI hand who has gotten a bit spooky. It is hard to immerse oneself daily in the arcane and twisted world of CI without falling pray eventually to creeping paranoia, distortion, warping, and overzealousness in one's thinking. It is precisely these traits that led to some of the worst CI disasters in our history. Angleton and his coterie sadly succumbed, with devastating results. Others in the CIA and elsewhere have as well. The danger is always there. My wife, who was working at the CIA when I met her, was well acquainted with this reputation of CI and the stories about its practitioners. When I was serving overseas and received the cable offering me the position as Ted Price's deputy in the new Counterintelligence Center, I discussed it with her that evening at home. Her response, I thought was right on the mark: "Okay, but do not stay too long." Sensible and productive CI needs lots of ventilation and fresh thinking. There should be constant flowthrough. Non-CI officers should be brought in regularly on rotational tours. I also believe it is imperative that a good CI service build in rotational assignments periodically outside CI for its CI specialists. They should go spend two or three years with the operators or with the other groups they are charged to protect. They will come back refreshed, smarter, and less likely to fall into the nether world of professional CI: the school of doublethink, the us-against-them mindset, the nothing-is-what-it-seems syndrome, the wilderness of mirrors. The Tenth Commandment: Never Give Up The tenth and last commandment is the most important. What if the Ames mole hunters had quit after eight years instead of going into the ninth? What if, in my own experience, we had discontinued a certain surveillance operation after five months instead of continuing into the sixth? CI history is full of such examples. The FBI is making cases against Americans today that involved espionage committed in the 1960s and 1970s. The Army's Foreign Counterintelligence Activity is doing the same. The name of the game in CI is persistence. CI officers who are not patient need not apply. There is no statute of limitations for espionage, and we should not create one by our own inaction. Traitors should know that they will never be safe and will never have a peaceful night's sleep. I applauded my CI colleagues in the FBI when I read not long ago of their arrest in Florida of a former US Army Reserve colonel for alleged espionage against the United States many years earlier. They obviously never gave up. If we keep a CI investigation alive and stay on it, the next defector, the next penetration, the next tip, the next surveillance, or the next clue will break it for us. If there were ever to be a mascot for US counterintelligence, it should be the pit bull. In Conclusion These are my 10 commandments of CI. Other CI professionals will have their own priorities and exhortations and will disagree with mine. That is as it should be, because as a country and as an Intelligence Community we need a vigorous debate on the future direction of US CI. Not everyone will agree with the specifics, or even the priorities. What we should agree on, however, is that strong CI has to be a national priority. Recent news reports from Los Alamos, Washington, and elsewhere have again underscored the continuing need for CI vigilance. 01/31/2002 -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------- ------------------------ ________________________________________________________________________ ________________________________________________________________________ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4758 From: Dragos Ruiu Date: Thu Feb 7, 2002 11:02am Subject: Re: "electricity effects on satellites" On Wed, 6 Feb 2002 17:35:54 -0600 "Aimee Farr" wrote: > [Uhm, can anybody tell me what they mean by "study electricity effects on > satellites?" ~Aimee] > From my limited understanding, electrical circuits on a satellite are quite complex due to the lack of a ground plane. The Space Station is apparently encountering difficulties in this area and the need for some erm... sophisticated systems to deal with solar panel driven power, the need not to fry humans inside etc... :) Proper management of charged particles in space is more complicated than on big, friendly, electron sink planets. --dr -- Requisite Commercial Content and Disclaimers: http://cansecwest.com CanSecWest Network Security Training Conference - Vancouver B.C. - May 1-3 2002 OpenSnort IDS Sensors: http://www.sourcefire.com 4759 From: DrPepper Date: Fri Feb 8, 2002 9:16am Subject: Re: Optoelectronics Please tell us just HOW the line was "infected"? Andre Holmes wrote: > Hi listies > > . > > The Optoelectronics 3000A is no longer available do to parts shortage also the Micro line was infected as well. > > Andre Holmes 4760 From: A Grudko Date: Fri Feb 8, 2002 10:41am Subject: Re: Anti-keylogger - Original Message - From: > << I'm more than dubious of any device that claims to be able to detect >>> "UNKNOWN" threats. >> > > we have unknown threats on this list Ah, but can this miracle program detect them? Looks like Cyber Snake Oil to me. Friday evening here on the lake, the sun about to dip below the mountains, a chilled glass of wine in hand as the temperature drops to 24C in the shack. Hell, it's good to be a TSCMer in Africa. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4761 From: Matthew Paulsen Date: Fri Feb 8, 2002 1:22pm Subject: RE: Optoelectronics Perhaps he meant affected. His english may be limited (ESL) as others are on this list. -----Original Message----- From: DrPepper [mailto:DrPepper@i...] Sent: Friday, February 08, 2002 7:16 AM To: Andre Holmes Cc: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Optoelectronics Please tell us just HOW the line was "infected"? Andre Holmes wrote: > Hi listies > > . > > The Optoelectronics 3000A is no longer available do to parts shortage also the Micro line was infected as well. > > Andre Holmes Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4762 From: kirk Date: Fri Feb 8, 2002 11:29am Subject: Re: Optoelectronics I think Mr. Holmes meant affected, not "infected". Makes more sense that way. ---------- Original Message ---------------------------------- From: DrPepper Date: Fri, 08 Feb 2002 07:16:01 -0800 >Please tell us just HOW the line was "infected"? > >Andre Holmes wrote: > >> Hi listies >> >> . >> >> The Optoelectronics 3000A is no longer available do to parts shortage also the Micro line was infected as well. >> >> Andre Holmes > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > -- Kirk Adirim President TACTRONIX Tactical Electronics for Critical Missions 8497 Sunset Boulevard #28 West Hollywood, CA 90069 USA E: kirk@t... T: 323-650-2880 F: 310-388-5886 W: www.tactronix.com -- 4763 From: tek492p Date: Sat Feb 9, 2002 1:34am Subject: Re: Fw: Steve, The COMSEC C3I Story --- In TSCM-L@y..., "Steve Whitehead" wrote: > Received this on my e-mail tonight. I think the list discussed this device a > while back. > > > > > The story HOW I invented and patented the COMSEC C3I TM > > United States Patent #5,142,560, a telecommunications > > security device that detects wiretapping, surveillance, > > espionage previously undetectable. > > I have seen this device in Spy Shop catalogs. Jack Lindauer Intertect TSCM services Los Angeles, California (818) 831-0515 4764 From: Hawkspirit Date: Sat Feb 9, 2002 10:49am Subject: Change an Industry INVENT A PRODUCT, Change a Industry, Shake up the World! > How the Hunted Became the Hunter > > The story HOW I invented and patented the COMSEC C3I TM > United States Patent #5,142,560, a telecommunications > security device that detects wiretapping, surveillance, > espionage previously undetectable. How did I manage to miss a "change a industry" of this magnitude? Could someone explain this change for me? Man! Here I thought I was staying on top of things. Roger Tolces www.bugsweeps.com 4765 From: A Grudko Date: Sat Feb 9, 2002 3:10am Subject: Re: Fw: History in the making - Original Message - From: Marty Kaiser > HISTORY IN THE MAKING > IMMEDIATELY download and save this file... then read it. I read Marty's piece with great interest. None of what he describes surprises me. I was gratified to see that his work bench looks like mine :-) . Hang in there Marty. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4766 From: Aimee Farr Date: Sat Feb 9, 2002 0:14pm Subject: "LIVE from...." [For those of you that counsel celebs/execs/politicios. Note: "Broadcast live on cable news networks." From yahoo news, I lost the link. ~Aimee] Taiwan Charges Ex-Mayor in Sex Video Scandal Thu Feb 7, 5:30 AM ET By Alice Hung TAIPEI (Reuters) - Taiwan prosecutors Thursday charged a former mayor with invading his estranged girlfriend's privacy by secretly filming her making love in the island's most gripping sex scandal. Prosecutors indicted Tsai Jen-chien, 49, former mayor of the northern high-tech city of Hsinchu, and recommended a one-year sentence on charges of violating the island's privacy law. Chu Mei-feng, 35, a TV reporter-turned politician, became one of the best known women in the Chinese speaking world after a tabloid magazine gave away video discs showing her having sex with a married man at her home. Chu's close friend, Kuo Yu-ling, 44, a spiritual teacher, installed the hidden camera with Tsai's help, prosecutor Chen Hon-da told a news conference, which was broadcast live by several cable news networks. The prosecutor said an envious Kuo needed money to send her daughter to school abroad and sold the footage to a tabloid magazine, which mass-produced the sex videos and gave away them free to readers. Kuo was charged with violating the privacy law, undermining public morality, theft and forgery and Scoop magazine president Shen Yeh was charged with violating the privacy law. Prosecutors sought a four-year sentence for Kuo, who is in court custody, and 26 months for Shen. His magazine has defended itself, arguing that the people have the right to know. "Kuo Yu-ling and Tsai Jen-chien were (Chu's) most trusted friend and lover. But they monitored her most private love life after their relations soured," the prosecutor said. "It's the most serious offence against privacy," Chen said. OFFICE, CAR BUGGED Prosecutors also found eavesdropping devices and surveillance cameras in Chu's car and office. Tsai had appointed Chu director of Hsinchu's municipal department of cultural affairs. Tsai, who had been questioned by prosecutors but not detained, and the magazine publisher could not be reached for comment. In Taiwan, defendants are not necessarily taken into custody until after a judge delivers a guilty verdict. Tsai, a member of President Chen Shui-bian's independence-leaning Democratic Progressive Party, lost a re-election bid in last December's mayoral elections. His affair with Chu, of the tiny pro-reunification New Party, had been the talk of town. The couple was once touted as the "golden boy and jade girl" of Taiwan politics. The scandal has sparked a heated debate on morality and fears of Taiwan becoming an Orwellian society with big brother watching you all the time, especially among celebrities. The cabinet's Government Information Office seized thousands of copies of the magazine and accompanying VCDs. The Chinese-language weekly has called the seizure "preposterous" and said the discs were not pornography but a move to "restore the face of the truth." Despite the seizure, pirated VCDs have been widely circulated in Taiwan, China and the United States. Chu did not deny she was the woman in the VCDs and has apologized to the public. She was not available for comment after the indictment, but told reporters late Wednesday after a vacation in Thailand that she wanted to do more good in the future. "If the society will accept me again, I want to do more good deeds," the Central News Agency quoted Chu as saying. Chu's new book revealing her relationships with several men, including Tsai, will soon hit local bookshelves. 4767 From: James M. Atkinson Date: Sat Feb 9, 2002 6:03pm Subject: Axis of "Somewhat Evil" "In Speech, Bush Calls Iraq, Iran and North Korea 'Axis of Evil" -- N.Y. Times, 1/30/02 Angered by snubbing, Libya, China, Syria form axis of "just as evil"; Cuba, Sudan, Serbia Form Axis of "Somewhat Evil"; other nations start similar clubs Beijing (SatireWire.com) - Bitter after being snubbed for membership in the "Axis of Evil," Libya, China, and Syria today announced they had formed the "Axis of Just as Evil," which they said would be way eviler than that stupid Iran-Iraq-North Korea axis President Bush warned of his State of the Union address. Axis of Evil members, however, immediately dismissed the new axis as having, for starters, a really dumb name. "Right. They are Just as Evil... in their dreams!" declared North Korean leader Kim Jong-il. "Everybody knows we're the best evils... best at being evil... we're the best." Diplomats from Syria denied they were jealous over being excluded, although they conceded they did ask if they could join the Axis of Evil. "They told us it was full," said Syrian President Bashar al-Assad. "An Axis can't have more than three countries," explained Iraqi President Saddam Hussein. "This is not my rule, it's tradition. In World War II you had Germany, Italy, and Japan in the evil Axis. So you can only have three. And a secret handshake. Ours is wicked cool." THE AXIS PANDEMIC International reaction to Bush's Axis of Evil declaration was swift, as within minutes, France surrendered. Elsewhere, peer-conscious nations rushed to gain triumvirate status in what became a game of geopolitical chairs. Cuba, Sudan, and Serbia said they had formed the Axis of Somewhat Evil, forcing Somalia to join with Uganda and Myanmar in the Axis of Occasionally Evil, while Bulgaria, Indonesia and Russia established the Axis of Not So Much Evil Really As Just Generally Disagreeable. With the criteria suddenly expanded and all the desirable clubs filling up, Sierra Leone, El Salvador, and Rwanda applied to be called the Axis of Countries That Aren't the Worst But Certainly Won't Be Asked to Host the Olympics; Canada, Mexico, and Australia formed the Axis of Nations That Are Actually Quite Nice But Secretly Have Nasty Thoughts About America, while Spain, Scotland, and New Zealand established the Axis of Countries That Be Allowed to Ask Sheep to Wear Lipstick. "That's not a threat, really, just something we like to do," said Scottish Executive First Minister Jack McConnell. While wondering if the other nations of the world weren't perhaps making fun of him, a cautious Bush granted approval for most axes, although he rejected the establishment of the Axis of Countries Whose Names End in "Guay," accusing one of its members of filing a false application. Officials from Paraguay, Uruguay, and Chadguay denied the charges. Israel, meanwhile, insisted it didn't want to join any Axis, but privately, world leaders said that's only because no one asked them. Copyright © 2002, SatireWire. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4768 From: James M. Atkinson Date: Sat Feb 9, 2002 6:14pm Subject: Re: Change an Industry At 8:49 AM -0800 2/9/02, Hawkspirit wrote: >INVENT A PRODUCT, Change a Industry, Shake up the World! > > How the Hunted Became the Hunter > > > > The story HOW I invented and patented the COMSEC C3I TM > > United States Patent #5,142,560, a telecommunications > > security device that detects wiretapping, surveillance, > > espionage previously undetectable. > >How did I manage to miss a "change a industry" of this magnitude? Could >someone explain this change for me? Man! Here I thought I was staying on >top of things. > >Roger Tolces >www.bugsweeps.com Har, Personally I thought the article should have more appropriately been called "How the Hunted Became a Delusionary Paranoid." -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4769 From: John Savage Date: Sun Feb 10, 2002 9:03am Subject: MLPIA (Maine Licensed Private Investigators Association) Good Morning: I do not apologize for sending this invitation to all the groups simultaneously.Why? Because we want to attract all you professionals to the new PI group"The MLPIA Network." We want to make history up here in Maine, and we believe that we are well on our way. We are on our way to becoming the mostinformative and respected PI group in the industry. The "MLPIA Network," along with the mother group "MLPIA" represents Maine's professional, licensed and bonded Private Investigators and Private Investigator Assistants. The MLPIA Network also was formed by professional investigators in Maine for the advancement, education, networking and representation of Maine's best! We are bonded, insured professionals. Many in our group have FBI, LEO, Military and related private industry experience. Included in this new and exciting PI group are the likes of John Grogan, "The Investigators Little Black Book" author Robert Scott, NHLI and NECOSIA president John Healy, Kelly Riddle, and the soon-to-be member and publisher of PI Magazine Bob Mackowiak. This is just the beginning! You won't believe the people that are showing great interest in making this the ultimate sourceof information! In Maine, Private Investigators and Private Investigator Assistants are licensed by the Maine Department of Public Safety and overseen directly by the Maine State Police. We are the only licensed entity to enjoy that level of scrutiny, We would not have it any other way. We serve our clients with the highest level of professionalism. Our members subscribe to a strict code of ethics. The MLPIA Network offers timely educational seminars and takes a strong, proactive role in legislative issues affecting our members, clients and fellow professionals. Everybody's knowledge and experience would be a tremendous addition to the MLPIA Network, and we hope that we would be a tremendous addition to your networking capabilities also. The members of the MLPI Network are as professionalas you'll find anywhere. Many of you are on a list of invitations that haven't been sent out yet. Why? This isbecause "Yahoo Groups" only allows 100 invites per day, so this list willtake acouple weeks to form. I thought I would get this unilateral invitation out to the individualsthat want to get on this group as soon as possible. "First come...firstserve." But no need to worry, those of you that are qualified will make it into the group. In conclusion, many of you that subscribe now, will receive another invitation in your mailbox to join our group. Just delete it if you know you already are a MLPIA group member. Once youhave subscribed, please introduce yourself to the group including your signature line. Any additional questions that you would like answered, please direct your questions to either Allan Goodman, President of the MLPIA at Aeglis@a... or if he can't get right back to you, email me...John Savage at iseeu@m... and I'll direct you to thesource of the information you need. SUBSCRIBE BELOW... Sincerely and Respectfully, John Lee Savage P.O. Box 634 Old Orchard Beach, ME 04064 TEL: 207-286-3945 FAX: 781-723-2551 ******************************************* Licensed by the Maine Department of Public Safety (Lic #373) ******************************************* Maine Notary Public ******************************************* National Association of Investigative Specialists (NAIS) ******************************************* Maine Licensed Private Investigators Association (MLPIA) www.mlpia.org ******************************************* MLPIA Internet Committee ******************************************* Assistant to Allan Goodman ******************************************* Subscribe: http://groups.yahoo.com/group/MLPIA-Network/ The Officers and Directors of the MLPIA 2002 are: Alan Goodman - President Paul Benjamin - Vice-president Kathy Metcalf - Treasurer Howard Leavitt - Sgt. At Arms Doug Calderbank - Director Myron Bradbury - Director Mark Metcalf - Director Corey Emmons - Director Roland Jandreau - Director Joe LaLiberte - Director Rose Mary Cyr - past President Distinguished Members: Gordon McCleary - Editor of the Maine P.I. View Cheryl Culbert - Legislative Liaison Ray Peters - Ethics Committee Chairman John Sullivan - Advisory Committee John Savage - Internet Committee --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.323 / Virus Database: 180 - Release Date: 2/8/02 4770 From: Ray Van Staden Date: Sat Feb 10, 2001 11:49am Subject: TSCM ZIMBABWE Is any group member aware of someone with TSCM equipment in Zimbabwe? Please contact me privately at raymond@v... or on the numbers below. Raymond --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 31 916-1262 Fax: +27 31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 4771 From: Date: Sun Feb 10, 2002 9:59am Subject: U.S. & China Resume Large-Scale Intelligence Sharing Newsweek: U.S. & China Resume Large-Scale Intelligence-Sharing Not Seen Since Cold War Cooperation Chinese Move Two Secret 'Listening Posts' From Coast Near Taiwan to Afghan Border to Intercept Al Qaeda Communication NEW YORK, Feb. 10 /PRNewswire/ -- China and the U.S. have resumed intelligence cooperation on a scale not seen since they joined hands against the Soviets during the Cold War, sources tell Newsweek in the February 18 issue (on newsstands Monday, February 11). After the terrorist attacks on September 11, Chinese authorities moved two of their secret electronic "listening posts" from the coast near Taiwan to the northwest China-Afghan border region, ostensibly to share the resulting intelligence with the U.S., reports Beijing Bureau Chief Melinda Liu. The stations are designed to intercept microwave and radio communications from possible Al Qaeda extremists within range of the border area. (Photo: http://www.newscom.com/cgi-bin/prnh/20020210/HSSU001 ) Since Sept. 11, relations with China have been on the upswing, Liu reports. Chinese President Jiang Zemin was one of the first foreign leaders to phone President George W. Bush offering condolences. And all this comes only 10 months after Beijing's leaders were denouncing the American "bully" and following the American EP-3 surveillance plane that was clipped by a Chinese jet over Hainan Island. President Bush has also reached out to Jiang, initiating phone calls to the Chinese leader on at least four occasions since Sept. 11. One call came right before Washington announced that it was abrogating the anti-ballistic missile treaty. China was not at all happy about the move, but Jiang was pleased, at least, that Bush had conferred with him ahead of time. "Some Americans used to say China was their enemy," says a senior Chinese Foreign Ministry official. "But now they know ... the real enemy is terrorism." (Article below. Read Newsweek's news releases at http://www.Newsweek.MSNBC.com. Click "Pressroom.") Beijing's Latest Look China is making nice ahead of a Bush visit this month. A glimpse behind the charm offensive. By Melinda Liu Some Americans know Li Zhao-Xing, Beijing's former ambassador to Washington, for his stern lectures on Chinese sovereignty. But Li -- now deputy foreign minister -- has, in his own way, found religion. In Washington last week, before a lunch gathering of the U.S.-China Business Council, Li recalled how he had come across a Bible in his hotel room and began reading it. He noted a passage quoting Jesus: ``I am the Alpha and the Omega, the first and the last.'' As forks halted midbite and quizzical looks darted around the room, Li quipped: ``I am not the Alpha or Omega, but something in between.'' Why is a staunch communist like Li quoting from the Christian holy book? Chinese authorities believe that President George W. Bush, due to visit China on Feb. 21 and 22, has a bit of an obsession with Bibles. When the American crew of a downed EP-3 reconnaissance plane was detained in China in April, Bush worried about whether the detained American personnel had access to Scripture. And this month the U.S. Embassy protested the three-year prison sentence given to a Chinese Christian for smuggling Bibles. So if it takes a few Biblical quotes to make nice, so be it. ``It's part of Beijing's charm offensive,'' said James Lilley, former U.S. ambassador to Beijing. ``The hectoring and lecturing are gone. Relations are on an upswing.'' Only 10 months ago, Beijing's leaders were denouncing the American ``bully.'' Tensions ran especially high after a Chinese jet clipped the EP-3 over Hainan Island. So what has changed? September 11 -- and the American military response -- must have had a sobering effect. Jiang Zemin was one of the first foreign lead-ers to phone Bush offering condolences. And Bush has reached out to Jiang, initiating phone calls to the Chinese leader on at least four occasions since 9-11. One call came right before Washington announced that it was abrogating its antiballistic-missile treaty with Russia. China was not happy with the decision, but Jiang was pleased, at least, that Bush conferred with him. ``Some Americans used to say China was their enemy,'' says a senior Chinese Foreign Ministry official. ``But now they know ... the real enemy is terrorism.'' Beijing and Washington have resumed intelligence cooperation on a scale not seen since they joined hands against the Soviets during the cold war, sources close to the administration tell Newsweek. After September 11, Chinese authorities moved two of their secret electronic ``listening posts'' from the coast near Taiwan to the northwestern China-Afghan border region, ostensibly to share the resulting intelligence with the United States, Newsweek has learned. The stations are designed to intercept microwave and radio communications, and could pick up Qaeda extremists chattering within range of the border area. (The facilities could also be used to conduct electronic surveillance on American aircraft dropping smart bombs over Afghanistan.) Even before 9-11, Beijing was on a pro-Western course, winning its bid for the 2008 Olympics and fighting for acceptance in the WTO (which it finally joined in December). In both cases, China has to perform well and make good impressions to reap real benefits. If the Chinese leadership turns xenophobic now, an Olympic flop or a hemorrhage of foreign investment could cripple the economy and even threaten the regime. But it's taking a different tack: China has embraced Afghan interim leader Hamid Karzai, for instance. One of Karzai's first foreign trips was to Beijing. None of the warming signs means that Sino-U.S. differences have melted away. In particular, China's ambiguous stand on weapons proliferation - especially its export of sensitive technologies to countries such as Pakistan and Iran -- has emerged as ``a make-or-break issue'' in bilateral relations, says U.S. Ambassador to China Clark Randt. One Sinologist likens the Sino-U.S. relationship to a stream flowing over large rocks. ``The stones are fundamental disagreements, such as Taiwan, proliferation and human rights,'' he says. ``After September 11, the water level rose to cover the rocks. Eventually, the water will recede again.'' And Biblical diplomacy alone cannot prevent that. With Paul Mooney in Beijing SOURCE Newsweek CO: Newsweek ST: New York, China IN: PUB MAG SU: 02/10/2002 11:45 EST http://www.prnewswire.com 4772 From: James M. Atkinson Date: Sun Feb 10, 2002 5:07pm Subject: New U.S. Government Agency *****Government Agencies***** Almost 150 years ago, President Lincoln found it necessary to hire a private investigator, Mr. Alan Pinkerton. He was actually the beginning of the Secret Service. Since that time federal police authority has grown to a large number of agencies - FBI, CIA, INS, IRS, DEA, BATF, SS, ATF, etc. Now Congress is considering a proposal for another agency: the "Federal Air Transportation Airport Security Service." Can't you see it now, the new service in their black outfits with their initials in large white letters across their backs? F.A.T.A.S.S. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- From: Tim Johnson Date: Sun Feb 6, 2005 8:21am Subject: Re: Regarding the hoopla about the OSCOR Software Maybe your friend should step forward and make his case himself. Or stop complaining. Secondhand information is hearsay at best and is questionable when one is trying to gather information for any purpose, whether it be for a criminal investigation or a civil problem. At this point, it is an uncivil problem.....you are able to cast your friends stones and he/she is protected by a veil of secrecy. Reading between the lines, I'd venture to say that your friend is relatively new in the business and attended the school in an effort to learn how to operate the equipment and to brush up on the basics. If it were important, I could probably find out his/her name with little problem as i had a friend attend the most recent class and probably had an acquaintance attend the class before that (another friend attended the advanced class back in the summer). I'm sure they would remember anyone who had a computer problem as it would have disrupted the teaching process. Then again, if your friend doesn't want to identify himself/herself here, then he/she probably went in as James Bond by using an alias. Does he/she have the background that would make operating, and most importantly, understanding what is going on with the equipment? I have about a dozen sweeps behind me now and am still learning something every time i go out. But, I go out with the attitude that I'm going to learn something new on each job. At least, when I stay awake, I do. When I feel that I've learned all there is to know about TSCM, I'll be ready to retire. After all Those who can do. Those who can't teach. Those who can do neither administrate. At this point your friend sounds very much like a soft mouthed administrator. Before you jump down my throat, I'm just a bystander trying to find out what might have caused a problem. But unless your friend comes out of the closet and personally states his case, I'm considering the subject closed and will only post to factual comments from this point on. As I'm sure most of the other TSCMers will probably do. And, I'd look closely at my friendship if I was you; a real friend doesn't subject a friend to possible ridicule or use them to bitch about something; they thank their friend for supporting them in their publicly stated problem. Remember the words of Albert Camus....Those who write clearly have readers, those who write obscurely have commentators. So far, we have only been able to comment on your writings (in the stead of your "friend"). Tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10953 From: joe joe Date: Sun Feb 6, 2005 9:18am Subject: Re: Regarding the hoopla about the OSCOR Software uhh first off Tim my freind is not a newcomer and was familiar with the equipment( it is funny because you said you will be attending a class soon, are you a newcomer?), secondly i belive he has told REI when he was there, and third of all i believe he will email Thomas, either today or tomorrow , maybe you should stop hanging off the nuts of REI..it doesn't suit anyone to be a nuthugger!..if you continue responding to this i will continue, so squash it now --- Tim Johnson wrote: > Maybe your friend should step forward and make his > case himself. Or > stop complaining. Secondhand information is hearsay > at best and is > questionable when one is trying to gather > information for any > purpose, whether it be for a criminal investigation > or a civil > problem. At this point, it is an uncivil > problem.....you are able to > cast your friends stones and he/she is protected by > a veil of secrecy. > > Reading between the lines, I'd venture to say that > your friend is > relatively new in the business and attended the > school in an effort > to learn how to operate the equipment and to brush > up on the basics. > If it were important, I could probably find out > his/her name with > little problem as i had a friend attend the most > recent class and > probably had an acquaintance attend the class before > that (another > friend attended the advanced class back in the > summer). I'm sure they > would remember anyone who had a computer problem as > it would have > disrupted the teaching process. Then again, if your > friend doesn't > want to identify himself/herself here, then he/she > probably went in > as James Bond by using an alias. Does he/she have > the background > that would make operating, and most importantly, > understanding what > is going on with the equipment? I have about a dozen > sweeps behind me > now and am still learning something every time i go > out. But, I go > out with the attitude that I'm going to learn > something new on each > job. At least, when I stay awake, I do. When > I feel that I've > learned all there is to know about TSCM, I'll be > ready to retire. > After all > Those who can do. > Those who can't teach. > Those who can do neither administrate. > > At this point your friend sounds very much like a > soft mouthed administrator. > > Before you jump down my throat, I'm just a bystander > trying to find > out what might have caused a problem. But unless > your friend comes > out of the closet and personally states his case, > I'm considering the > subject closed and will only post to factual > comments from this point > on. As I'm sure most of the other TSCMers will > probably do. > > And, I'd look closely at my friendship if I was you; > a real friend > doesn't subject a friend to possible ridicule or use > them to bitch > about something; they thank their friend for > supporting them in their > publicly stated problem. Remember the words of > Albert Camus....Those > who write clearly have readers, those who write > obscurely have > commentators. So far, we have only been able to > comment on your > writings (in the stead of your "friend"). > > Tim > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > MemberINTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > [Non-text portions of this message have been > removed] > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10954 From: Tim Johnson Date: Sun Feb 6, 2005 9:57am Subject: Re: Regarding the hoopla about the OSCOR Software MY, My. Such language. But, you should look carefully at what you wrote. I don't think I have touted REI in any way; nothing about their equipment being superior to, or inferior to others. I have only suggested there is a lack of communication on the part of your friend. As for the "nuthugging", stand back and look at what you are doing. Your friend is totally protected by you from any effort to educate him or to assist him with his problem. He's letting you take my small amount of input while everyone else is reading our missives and chuckling about one of us being only partially armed (could be me, hmmmm). I'm just doing what you are doing, responding from a point of ignorance to a possible problem. If I knew more perhaps i could respond to problems rather than to your and your "friends" mudslinging. Step up, state the problem and ask for assistance; even with the animosity your friend has probably generated within REI, I doubt that they are the kind to hold it against him. They're professionals; professionals seek assistance to a problem. I'm trying to help find a solution to a problem (as I'm sure REI will do). You and your "friend" are hiding the problem. But, maybe my responses have had the desired effect. Your friend should have taken the problem to the source in the beginning rather than having you act as his mouthpiece. If your friend has a problem it can't be fixed until he addresses it in such a way as to have it looked at step by step. It is better that he contact REI directly than to cry in the dark. Maybe now, something can be done about it. And yes, I'm a relative newcomer. I try to get as much training as I can as i know my limitations. And, I'll be attending their advanced classes if i can sneak a rubber check in on them when they aren't looking. My attitude is that once I stop learning, I'm of no use to anyone anymore. I hope I never reach the point of a lot of people I know in this business that feel they have seen it all and there is nothing more to learn. And, if I run into a problem I've found it is better to address it with the people involved rather than run around crying about something they aren't aware of. I'm unhappy; they're unaware and everyone else has to listen to complaining. Speaking of newcomers, are you a debugger or just a mouthpiece? So far, you haven't been speaking from a position of experience (at least, from my limited point of view) , just relaying hearsay from your "friend". Do you have the experience with computers, software and the OSCOR to be able to discuss the problem with him and try to find out what the problem is? What you (he/she) should be doing is posting the problems encountered, step by step, and asking those on the TSCM-L list if they have had the same problem and what, if anything, they did to clear it up. With that said, be careful with your response. People no longer have any doubts as to whether I'm a fool or not. They know it for a fact. You may still have them wondering. Tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10955 From: joe joe Date: Sun Feb 6, 2005 10:08am Subject: Re: Regarding the hoopla about the OSCOR Software hey Tim you attacked the kind of freinds i keep, that was a low blow so i reacted, yes i do protect my freinds if needed but this is not the case you attacked me, so just stop, as for REI they DO know there are problems and it is up to them to fix them, not for you to come here and judge the kinds of freinds people keep, my buddy will contact REI like i said, and if you do know some people that were in the class in the last few weeks ask them they might have been there when those problems arose at their facility and then all speculation of " is the software bugged or not" could be laid to rest, until you get that info from your aquintances that were there stop it, REI are giving out a software that is basically in beta testing because it has software flaws to it, and this is MY opinion NOT my freinds , although he may say worse thanks --- Tim Johnson wrote: > MY, My. Such language. But, you should look > carefully at what you > wrote. I don't think I have touted REI in any way; > nothing about > their equipment being superior to, or inferior to > others. I have only > suggested there is a lack of communication on the > part of your > friend. As for the "nuthugging", stand back and look > at what you are > doing. Your friend is totally protected by you from > any effort to > educate him or to assist him with his problem. He's > letting you take > my small amount of input while everyone else is > reading our missives > and chuckling about one of us being only partially > armed (could be > me, hmmmm). I'm just doing what you are doing, > responding from a > point of ignorance to a possible problem. If I knew > more perhaps i > could respond to problems rather than to your and > your "friends" > mudslinging. Step up, state the problem and ask for > assistance; even > with the animosity your friend has probably > generated within REI, I > doubt that they are the kind to hold it against him. > They're > professionals; professionals seek assistance to a > problem. I'm trying > to help find a solution to a problem (as I'm sure > REI will do). You > and your "friend" are hiding the problem. > > But, maybe my responses have had the desired effect. > Your friend > should have taken the problem to the source in the > beginning rather > than having you act as his mouthpiece. If your > friend has a problem > it can't be fixed until he addresses it in such a > way as to have it > looked at step by step. It is better that he contact > REI directly > than to cry in the dark. Maybe now, something can be > done about it. > > And yes, I'm a relative newcomer. I try to get as > much training as I > can as i know my limitations. And, I'll be attending > their advanced > classes if i can sneak a rubber check in on them > when they aren't > looking. My attitude is that once I stop learning, > I'm of no use to > anyone anymore. I hope I never reach the point of a > lot of people I > know in this business that feel they have seen it > all and there is > nothing more to learn. > > And, if I run into a problem I've found it is better > to address it > with the people involved rather than run around > crying about > something they aren't aware of. I'm unhappy; they're > unaware and > everyone else has to listen to complaining. > > Speaking of newcomers, are you a debugger or just a > mouthpiece? So > far, you haven't been speaking from a position of > experience (at > least, from my limited point of view) , just > relaying hearsay from > your "friend". Do you have the experience with > computers, software > and the OSCOR to be able to discuss the problem with > him and try to > find out what the problem is? What you (he/she) > should be doing is > posting the problems encountered, step by step, and > asking those on > the TSCM-L list if they have had the same problem > and what, if > anything, they did to clear it up. > > With that said, be careful with your response. > People no longer have > any doubts as to whether I'm a fool or not. They > know it for a fact. > You may still have them wondering. > > Tim > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > MemberINTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > [Non-text portions of this message have been > removed] > > __________________________________ Do you Yahoo!? Yahoo! Mail - You care about security. So do we. http://promotions.yahoo.com/new_mail 10956 From: Tim Johnson Date: Sun Feb 6, 2005 11:30am Subject: Re: Regarding the hoopla about the OSCOR Software JOE JOE, You are letting your emotions get in the way of objectivity. You have to decide who your friends are. What you do for them is your business. My friend who attended the class responded very quickly to my inquiry. As there were two classes, which did your friend attend? There didn't seem to be any complaints in the first three day session consisting of about 15 people from across the globe. Mainly, the equipment was demonstrated on the last day and if there were concerns they were voiced one on one. In the 5 day session, there were fewer attendees. There was problems with the software on some of the computers. From my understanding, Chris called the software developer into the classroom and he took notes regarding the problems. I believe he told the attendees that the software was Beta, that they were experiencing problems with stability, and that REI is addressing the problems little by little as they arise and fixes are made. Apparently, discussions were very polite and REI's attitude was very correct and polite. One reason for your friends attitude may be one of communication. If your friend was an American, he may have an attitude problem; if he was from one of the foreign countries he might not have understood what was going on. And with that I'll go back to one of my original premises....if your friend doesn't like the software all the has to do it turn the computer off and wait patiently for a more stable version to come along. If his arm isn't in a sling i doubt that they forced him to download it or continue to use it. I've learned that if something works, even if it is only partially effective, it is better than the alternative of not having it at all. I'm sure REI is working to correct the problems. After all, they have a very good reputation that I'm sure they don't want to have tarnished. Heck, if your friend is unhappy with the 5.0 version, I'm sure REI would be glad to return him to his previous version. He has a choice, all he has to do is voice it. Now, joe joe, read the following very carefully: Beta program. Beta program. Free Beta program. Free Beta program. Betas testing. Beta testing. What that means is it is there for you to try out and to provide feedback on. It is in the development stage. Development means it probably has problems and the developers want to know what those are from the Beta testers. Beta testing is a good thing if you are willing to share any problems you encounter. Beta testing is a bad thing if you hide your candle (problems) under a bushel basked and cry in the dark. Share. Always share. I have known the people at REI for a good long time. I have always had the highest respect for their integrity and desire to make a product that is both useful, easy to operate and not a checkbook buster and to continually refine or improve on them. My only real complaint over the years I have been familiar with the OSCOR has been one in which the signal is presented digitally rather than in an analog mode. It is a point that we joke about when we run across each other and it wouldn't surprise me to have them one day contact me and say, We listened. We'd like for you to Beta test our analog display. I also consider some of them to be more than business acquaintances, but not quite closest of friends. We're still in the touchy-feel area. But, we are still working on it. Professionally, we support each other by me making comments on their equipment and them by listening and implementing my suggestions (if they aren't stupid to the point of being absurd). Anyhow, I'm glad your friend is going to approach the problem from a face-to-face point of view rather than having you sling arrows for him. If I can be of any little assistance in the future, (Nothing to do with computers or software) don't hesitate to contact me. And finally, your opinion has absolutely no weight in the matter unless you want to address the problem from a personal perspective. You have an opinion, as do I. And we both have a** holes, but they don't necessarily need to be made public. But, for what it is worth, I have enjoyed debating the problem with you. I hope you will take the time to re-read our correspondences and try to understand I haven't been attacking you specifically. It was your mysterious friend for not having the intestinal fortitude to personally voice his concerns. Most of the people on groups like this are there to try to help others when they are experiencing a problem. Well, most of them are. Some are just wanna-bee's, like me. Tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10957 From: Date: Sun Feb 6, 2005 11:06am Subject: Re: Oscor Gentlemen, I appreciate a prompt comment of REI concerning OSCOR. In some respect we are fortunate enough of hearing direct from the vendor. It could never happen be Siemens, Rockwel, Honeywell, Rohde&Schwarz etc. etc. involved. Their ignorance is well documented. However some REI statements are surprising. 1. They released beta version of software... THEY SOLD A PRODUCT WITH FAULT FUNCTIONALITY. That is. No matter what language we speak. 2. REI claims that OSCOR was designed for Burst transmission TSCM.... THE OSCOR IS NOT CAPABLE OF CATCHING BURST TRANSMISSIONS. As every serial sweep type receiver. Try to make a full sweep and note how long the receiver needs to complete it. In this regard OSCOR is not worse than, say Rockwell 95S1A or R&S EB200 or Cubic 3400 or any other serial sweep receiver. Probably OSCOR could catch a 15 minutes burst but not a 300 milliseconds as it would be the case with a hardware keystroke logger. Catching burst transmissions requires time domain receiver in combination with a powerful FFT analyzer, a system like Scenario Flex. 3. Regarding video. Video with 150 KHz bandwidth? Most probably REI engineers has forgotten Nyquist Theorem. I know Oscor was not designed to watching movies, but I also know that the receiver¥s bandwidth is not wide enough to lock into Frequency modulated video synchro signal. I am speaking of Oscor produced in 2004, not 1995. I could go further, but it is not my intention to insult REI, or OSCOR owners and Oscor lovers. The overall system performance is good for its price. If someone has $400,000.00 to invest in a different system, Oscor is not an option. But Oscor is worth its price and undoubtedly can help in TSCM work. No system can everything. Oscor is not an exeption. Regards, A.W. DEMTEC@A... wrote: > > > In a message dated 04/02/2005 23:59:37 GMT Standard Time, >hawkspirit@e... writes: > > > > >I did a sweep in the past few years in which I detected a burst bug sending >out short duration pulse bursts. After the client saw my results he hired a >second sweep team to come in and confirm my findings. They brought an Oscor >and it would not receive and display this short pulse wave transmission. >Missed the boat completely! > >Roger > >HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com > > > > > > >Roger I take it that you used a Spectrum Analyser on your original sweep >when you detected the Burst device >Regards Dave > >David McGauley >TSCM [Technical Surveillance and Countermeasures] >Electronic Surveillance and Sweep Specialist >Electrical/Electronics Engineer ex Police >Demtec House >Ormskirk >Lancs L390HF >UK >01695558544 >07866206112 >demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) > > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > __________________________________________________________________ Switch to Netscape Internet Service. As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register Netscape. Just the Net You Need. New! Netscape Toolbar for Internet Explorer Search from anywhere on the Web and block those annoying pop-ups. Download now at http://channels.netscape.com/ns/search/install.jsp 10958 From: joe joe Date: Sun Feb 6, 2005 11:44am Subject: Re: Regarding the hoopla about the OSCOR Software hey Tim i told you stop it because YOU are making this bigger than it is..my freind is an american but does NOT have an attitude, there you go again judging the people i have contact with, and yes my opinion counts in this matter because i do believe that it is not a good peice of software, again my opinion, if you don't like it you could object to it and that is fine but opinions is what makes america a wonderful place, we don't live in a communist country, like i said he will contact TOM so you could stop your ranting about freinds or anything else because it is getting rather childish, also i am glad that your freind that was in the second class told you there were problems, obviously he was honest( gee only you could have great freinds, haha) also if it is a beta than they shouldn't be selling it, end of story, don't say it is free because it is just added to the price of the upgrade, Tim again stop this bickering and i hope that my buddy and Tom fix this , so you really don't have to go out of your way to prove if the software has bugs or not, IT HAS BE PROVEN THERE ARE SO EVERYTHING CAN END RIGHT HERE! --- Tim Johnson wrote: > JOE JOE, > > You are letting your emotions get in the way of > objectivity. You have > to decide who your friends are. What you do for them > is your business. > > My friend who attended the class responded very > quickly to my > inquiry. As there were two classes, which did your > friend attend? > There didn't seem to be any complaints in the first > three day session > consisting of about 15 people from across the globe. > Mainly, the > equipment was demonstrated on the last day and if > there were concerns > they were voiced one on one. > > In the 5 day session, there were fewer attendees. > There was problems > with the software on some of the computers. From my > understanding, > Chris called the software developer into the > classroom and he took > notes regarding the problems. I believe he told the > attendees that > the software was Beta, that they were experiencing > problems with > stability, and that REI is addressing the problems > little by little > as they arise and fixes are made. Apparently, > discussions were very > polite and REI's attitude was very correct and > polite. > > One reason for your friends attitude may be one of > communication. If > your friend was an American, he may have an attitude > problem; if he > was from one of the foreign countries he might not > have understood > what was going on. > > And with that I'll go back to one of my original > premises....if your > friend doesn't like the software all the has to do > it turn the > computer off and wait patiently for a more stable > version to come > along. If his arm isn't in a sling i doubt that they > forced him to > download it or continue to use it. I've learned > that if something > works, even if it is only partially effective, it is > better than the > alternative of not having it at all. I'm sure REI > is working to > correct the problems. After all, they have a very > good reputation > that I'm sure they don't want to have tarnished. > > Heck, if your friend is unhappy with the 5.0 > version, I'm sure REI > would be glad to return him to his previous version. > He has a choice, > all he has to do is voice it. > > Now, joe joe, read the following very carefully: > > Beta program. Beta program. > Free Beta program. Free Beta program. > Betas testing. Beta testing. > > What that means is it is there for you to try out > and to provide > feedback on. It is in the development stage. > Development means it > probably has problems and the developers want to > know what those are > from the Beta testers. Beta testing is a good thing > if you are > willing to share any problems you encounter. Beta > testing is a bad > thing if you hide your > candle (problems) under a bushel basked and cry in > the dark. > > Share. Always share. > > I have known the people at REI for a good long time. > I have always > had the highest respect for their integrity and > desire to make a > product that is both useful, easy to operate and not > a checkbook > buster and to continually refine or improve on them. > My only real > complaint over the years I have been familiar with > the OSCOR has been > one in which the signal is presented digitally > rather than in an > analog mode. It is a point that we joke about when > we run across each > other and it wouldn't surprise me to have them one > day contact me and > say, We listened. We'd like for you to Beta test our > analog display. > I also consider some of them to be more than > business acquaintances, > but not quite closest of friends. We're still in the > touchy-feel > area. But, we are still working on it. > Professionally, we support > each other by me making comments on their equipment > and them by > listening and implementing my suggestions (if they > aren't stupid to > the point of being absurd). > > Anyhow, I'm glad your friend is going to approach > the problem from a > face-to-face point of view rather than having you > sling arrows for > him. If I can be of any little assistance in the > future, (Nothing to > do with computers or software) don't hesitate to > contact me. > > And finally, your opinion has absolutely no weight > in the matter > unless you want to address the problem from a > personal perspective. > You have an opinion, as do I. And we both have a** > holes, but they > don't necessarily need to be made public. But, for > what it is worth, > I have enjoyed debating the problem with you. I hope > you will take > the time to re-read our correspondences and try to > understand I > haven't been attacking you specifically. It was your > mysterious > friend for not having the intestinal fortitude to > personally voice > his concerns. Most of the people on groups like this > are there to try > to help others when they are experiencing a problem. > Well, most of > them are. Some are just wanna-bee's, like me. > > Tim > > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > MemberINTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > [Non-text portions of this message have been > removed] > > === message truncated === __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail 10959 From: joe joe Date: Sun Feb 6, 2005 11:50am Subject: Re: Oscor i do agree with you on certain aspects but as with any piece of hardware , when doing a sweep we must stay as long as possible to catch every signal and threat we can, example if you only stay 10 hours and the burst signal didn't fire then any peice of hardware wouldn't catch it( although other hardware could find it ex: non-lin, thermal, x-ray if you could paint all walls and objects, lol ), but if you stay 24 hours your chances would be much greater, including with the oscor --- Tensor66B@n... wrote: > > Gentlemen, > > I appreciate a prompt comment of REI concerning > OSCOR. In some respect we are fortunate enough of > hearing direct from the vendor. It could never > happen be Siemens, Rockwel, Honeywell, Rohde&Schwarz > etc. etc. involved. Their ignorance is well > documented. > > However some REI statements are surprising. > > 1. They released beta version of software... THEY > SOLD A PRODUCT WITH > FAULT FUNCTIONALITY. That is. No matter what > language we speak. > > 2. REI claims that OSCOR was designed for Burst > transmission TSCM.... > THE OSCOR IS NOT CAPABLE OF CATCHING BURST > TRANSMISSIONS. As every serial sweep type receiver. > Try to make a full sweep and note how long the > receiver needs to complete it. In this regard OSCOR > is not worse than, say Rockwell 95S1A or R&S EB200 > or Cubic 3400 or any other serial sweep receiver. > Probably OSCOR could catch a 15 minutes burst but > not a 300 milliseconds as it would be the case with > a hardware keystroke logger. Catching burst > transmissions requires time domain receiver in > combination with a powerful FFT analyzer, a system > like Scenario Flex. > > 3. Regarding video. Video with 150 KHz bandwidth? > Most probably > REI engineers has forgotten Nyquist Theorem. I know > Oscor was not designed to watching movies, but I > also know that the receiver¥s bandwidth is not > wide enough to lock into Frequency modulated video > synchro signal. > I am speaking of Oscor produced in 2004, not 1995. > > I could go further, but it is not my intention to > insult REI, or OSCOR > owners and Oscor lovers. The overall system > performance is good for > its price. If someone has $400,000.00 to invest in a > different system, > Oscor is not an option. But Oscor is worth its price > and > undoubtedly can help in TSCM work. No system can > everything. Oscor > is not an exeption. > > Regards, > A.W. > > > > DEMTEC@A... wrote: > > > > > > > > In a message dated 04/02/2005 23:59:37 GMT Standard > Time, > >hawkspirit@e... writes: > > > > > > > > > >I did a sweep in the past few years in which I > detected a burst bug sending > >out short duration pulse bursts. After the client > saw my results he hired a > >second sweep team to come in and confirm my > findings. They brought an Oscor > >and it would not receive and display this short > pulse wave transmission. > >Missed the boat completely! > > > >Roger > > > >HYPERLINK > "http://www.bugsweeps.com/"www.bugsweeps.com > > > > > > > > > > > > > >Roger I take it that you used a Spectrum Analyser > on your original sweep > >when you detected the Burst device > >Regards Dave > > > >David McGauley > >TSCM [Technical Surveillance and Countermeasures] > >Electronic Surveillance and Sweep Specialist > >Electrical/Electronics Engineer ex Police > >Demtec House > >Ormskirk > >Lancs L390HF > >UK > >01695558544 > >07866206112 > >demtec@a..._ www.demtec.co.uk_ > (http://www.demtec.co.uk/) > > > > > > > > > >[Non-text portions of this message have been > removed] > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== > TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > __________________________________________________________________ > Switch to Netscape Internet Service. > As low as $9.95 a month -- Sign up today at > http://isp.netscape.com/register > > Netscape. Just the Net You Need. > > New! Netscape Toolbar for Internet Explorer > Search from anywhere on the Web and block those > annoying pop-ups. > Download now at > http://channels.netscape.com/ns/search/install.jsp > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Easier than ever with enhanced search. Learn more. http://info.mail.yahoo.com/mail_250 10960 From: James M. Atkinson Date: Sun Feb 6, 2005 1:13pm Subject: List Statistics List membership has stabilized over 1230 active subscribers and due to it's size I really don't keep track of who is behind which Yahoo, Hotmail, AOL, or related accounts. The actual list membership is closer to 1300 members, but at any given moment at least 50-75 list members are bouncing for a variety of reasons, but half of these clear in 24-48 hours (1230 + 75/2 = 1268). Additionally, I know that a number of the list addresses are actually "exploders" where a post sent to that addresses is copied or exploded out to a number of additional (hidden) email addresses. One such exploder account has 130+ additional subscribers behind one such account, another exploder has 25+ subscribers behind another one in England, and so on. As close as I can tell we have at least a number or such accounts where the list goes to 300 exploded additional accounts (this gives use a subscriber base of something close to 1600 or so). Quite a few list members forward copies of the daily digest to others in their organizations via a hard copy format instead of an email version, and a number of subscribers include the daily posts in their in-house daily or weekly security briefings. As a rule a newsletter, magazine, or any piece of material is actually read by many times the actual number of subscribers, and very often it is said that this number is 3.5 to 4 times higher than the subscriber base. I know of a least 1300+ active and confirmed subscribers, but the actual number is much, much higher... and I suspect the list initially gets immediate distribution to closer to 2000 or more, but anyway you look at it the TSCM-L is the largest forum in the world for discussing TSCM, bug sweeping, wiretap detection, and related topics. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10961 From: James M. Atkinson Date: Sun Feb 6, 2005 1:50pm Subject: Re: Re: More Posts Dissappearing Yes, you are correct, the moderator can delete a posting from the archives, the original poster can delete a message, and Yahoo can delete a message, but this seems to be a case of someone contacting Yahoo, and then Yahoo deleting the message in a knee-jerk reaction instead of actually reading the message. Here is some details on the messages that have been deleted in the past month, they all involve one, single subject matter. The "customersupport " identity means they someone at cusotmer support ay Yahoo manually removed the message. 1/28/2005 11:00 am customersupport Deleted message #10505 1/28/2005 11:00 am customersupport Deleted message #10751 2/2/2005 7:01 pm customersupport Deleted message #10866 #10867 #10871 The funny part is that one of the messages that was deleted on 2/2/2005 was nothing more than a message that stated that several messages had been deleted, so not only is someone trying to get the original messages deleted, but they are try to cover their tracks by having messages about the deletion deleted, and then deleting those deletion of their deletions in hopes that they might be deleted (I have a headache). Suffice to say, all they are doing is drawing more attention to themselves and they are doing little more then continuing their prima donna games and abusive behavior that got them tossed off the list in the first place. Message 10505 was posted on 1/5 and you can clearly see the missing gap in the sequence. 10503 Re: looking for a tdr delta agenceadi Wed 1/5/2005 10504 Re: Digital Cell phone scanning James Greenwold Wed 1/5/2005 10506 Re: looking for a tdr J. Coote Thu 1/6/2005 10507 Re: Digital Cell phone scanning Ian Wraith ian_wraith Thu 1/6/2005 10508 Sweeps needed Hawkspirit dawn_star_7 Thu 1/6/2005 Message 10751 was posted on 1/24, and like the previous message there is a gap in the sequence 10749 Re: An apology Tech Sec Lab secureoffice Mon 1/24/2005 10750 Re: a good spectrum analyzer between 2 and 6ghz James M. Atkinson graniteislandgroup Mon 1/24/2005 10752 Re: Gentle Reminder Robert Motzer rcm7740 Mon 1/24/2005 10753 Re: FBI abandons Carnivore wiretap software L. F. Elia lfelia Mon 1/24/2005 10754 Editorial: Anatomy of a bank fraud WHEN DATES DON'T MATCH savanted1 savanted1 Mon 1/24/2005 Message 10866 was posted on 1/3 and there is a noticeable gap in the message sequence in this and the other missing posts in the archive. 10864 Technical Sweeps clive michaels ekim0332 Mon 1/31/2005 10865 Re: "Sound of Voices" ?????? LD C silkfreelander Mon 1/31/2005 10868 Re: "Sound of Voices" ?????? A Grudko damstuff2000 Tue 2/1/2005 10869 File - mission.txt TSCM-L@yahoogroups.com Tue 2/1/2005 At 03:05 PM 2/5/2005, contranl wrote: >. > >Those that can remove messages(archive),links,files,photos are: > >1) The moderator(s) >2) The writer of the message (if he's still member) >3) Yahoo >4) Someone else who has stolen 1 of above identities or has managed > to become a member again (using the same id) > >I have some groups myself..sometime ago all links and files and >messages were gone...but back again after my complaint...to my >question of what happened i never got a personal answer,just some >prefabricated general apologies. > >You have to insist in asking Yahoo if they removed the message or not >i suppose in the end they will give you an answer...depending on >what they say you can start to think about what else might be going >on. > >I know you can add things to a Yahoo-group wich they not intended. >(inserting HTML-code where you should put plain text) >As far as i know this can only be done by the moderators because >they only have acess to those fields where you could do this. > >I just removed my previous last (unimportant)message on this group >to see what happens...as expected i could remove it and now there is >1 number(10940)missing from the ordered row. >(useless experiment..sorry) > > >Tetrascanner ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 10962 From: James M. Atkinson Date: Sun Feb 6, 2005 2:44pm Subject: Stolen Equipment Alert A large quantity of TSCM equipment was stolen from someone a short time back, and it looks like it is starting to show up on E-Bay and other places. Looks like the thief sat on it for a while to let it cool off, but is trying to now trying to sell it off. The equipment includes a bunch of Kaiser phone equipment, audio amps, Scanlocks, spectrum analyzer, and some Riser Bond TDR's. If anybody offers to sell you this kind of equipment, you see it listed on E-Bay, or you see it being advertised for sale on a website somewhere please let me know privately and I will ensure the appropriate authorities are notified, and that you are put in touch with the victim so you can return their property. If you have recently purchased any ***Used*** gear, TDR's, or Scanlocks on E-Bay or through other sources you should hold onto your receipt, and start asking awkward questions as to where the equipment actually came from (the gear may be in the batch that was stolen). This is not a problem with new equipment, just with the used gear, or gear that was claimed to be "demo gear", refurbished, repaired, etc. Ask for serial numbers BEFORE you pay for the equipment, and ask questions as to whom the previous owner was... you may find that the equipment is indeed hot. If you buy any equipment be sure to use PayPal to send funds, or use a credit card but be sure not to sign any kind of "waiver" so that you can dispute the charge if the equipment ends up being stolen. Make sure that you get some kind of hard copy invoice for the equipment BEFORE you pay for it, and that you keep careful records. Please call or email me if you need any details, Please be careful folks, -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10963 From: contranl Date: Sun Feb 6, 2005 3:57pm Subject: Re: More Posts Dissappearing . Jim...to make a long story short Do you get a respons from Yahoo when you ask about this ? Tetrascanner 10964 From: James M. Atkinson Date: Sun Feb 6, 2005 4:11pm Subject: Re: Re: More Posts Dissappearing Yahoo claims that someone who identified themselves as a federal law enforcement officer contacted them and requested that the posts be removed. -jma At 04:57 PM 2/6/2005, contranl wrote: >Jim...to make a long story short > >Do you get a respons from Yahoo when you ask about this ? > > >Tetrascanner ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10965 From: A Grudko Date: Sun Feb 6, 2005 4:46pm Subject: RE: More Posts Dissappearing -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] > A review of the moderator logs today, reflect that someone at Yahoo is quietly deleting posts from the archive again. James, PLEASE send me copies of the 2 posts that someone wants to see them go the way of Kenny Boy's Enron documents :-) Andy G South Africa ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.4 - Release Date: 2005/02/01 [Non-text portions of this message have been removed] 10966 From: A Grudko Date: Sun Feb 6, 2005 4:46pm Subject: RE: Re: "Breaking-In" to technical security -----Original Message----- From: wiggyyy2000 [mailto:wiggyyy2000@y...] > go on many PI's websites and the first thing they go on is cheaters or annys.. On websites maybe, but not in my experience. I've been a PI for 24 years and a long term member of various professional associations. I've also been President of the South African Council of Investigators for 10 of the past 12 years, which includes advising the SA government on the laws that now regulate the industry in this country. In addition I also belong to a number of serious US and UK PI yahoogroups and matrimonial work is probably not even 5% of of the discussion content. 'Cheaters' is regarded as a bad image presented by a tiny minority of PIs. I don't know what 'annys' is but I assume you mean 'Anny's'. > i am sure that is not all they are good for but that is where the majority of money comes from these days... I doubt that very much, but admit I have not seen any studies on it. I only get a handful of such enquiries a year, but circumstances may differ between countries. Contrary to what you appear to think, matrimonial assignments are the lowest paid type of PI work, with a few exceptions where large dollar settlements or disputes may arise. The few investigators that start off doing matrimonial work tend to be the less qualified ones and get out and into insurance, corporate and/or criminal work as quickly as possible. More experienced investigators, such as ex-police officers or intelligence staff usually bypass the keyhole peeping stage and go straight into the more serious arenas. > as to the fact of many PI groups using sub standard equipment and they themselves planting their own bugs I don't accept it as a fact as it is the opposite of my experience. > you are asking me to name names and I will NOT do that.. No, I am not and I doubt that you know any. > it is a known fact that quite a few have that practice and I have personally heard a very reliable person that has been in the tscm feild tell me about a scam concerning a PI [planting a bug] It is not a known fact to me. I carry out an average of 70 sweeps a year and always discuss my client's concerns in detail before the job and give a full written report afterwards. In 24 years I have only heard one first hand account of a PI being caught and named planting a bug during a sweep. On the other hand I have had a number of sceptical clients plant bugs prior to a sweep to test my abilities. My opinion is based on reality, not reality TV or urban legends. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.4 - Release Date: 2005/02/01 [Non-text portions of this message have been removed] 10967 From: Maury Siskel Date: Sun Feb 6, 2005 4:44pm Subject: Added mystery -- Re: Re: More Posts Dissappearing Jim, when I tried to view a couple of your links to the deleted emails, Yahoo would not recognize my Yahoo password nor would it recognize me as a member of TSCM-L. Just an interesting further complication. I've used Yahoo email for years. Cheers, Maury James M. Atkinson wrote: >Yahoo claims that someone who identified themselves as a federal law enforcement officer contacted them and requested that the posts be removed. > >-jma > > >At 04:57 PM 2/6/2005, contranl wrote: > >--------- snipped -------- > 10968 From: Date: Sun Feb 6, 2005 11:16am Subject: Re: Re: More Posts Dissappearing Can you say BS! Guess Carnavor is up and working. [Non-text portions of this message have been removed] 10969 From: James M. Atkinson Date: Sun Feb 6, 2005 5:36pm Subject: Fallacious Arguments http://c2.com/cgi/wiki?FallaciousArguments Fallacious Argument: An argument that sometimes fools human reasoning, but is not logically valid. It is crucial to remember that reasoning from definitions and facts to conclusions is fundamentally different from reasoning about definitions. Before you can scientifically establish whether or not Foo is a Bar, you have to establish the meaning of the label Bar. A given term is associated with one or more definitions and one or more concepts. A definition is correct when it accurately represents a chosen concept. Definitions can be more or less formal, the more formal the better. Concepts are not correct or incorrect, but merely useful. Formal Fallacies (incorrectly constructed logical syllogisms) AntecedentAssumedFallacy (A is true because of B, but B is true because of A) [similar to CircularReasoning] ArgumentByAnalogy (A is like B; A has property P; therefore, B has property P) [similar to UndistributedMiddle? or CompositionFallacy?] BeggingTheQuestion (A hidden assumption supports the "proof" in process) CircularReasoning (A is because of B, which is because of C, which is because of A) PostHocErgoPropterHoc (A follows B so B causes A) CorrelationImpliesCausation (There is a demonstrated correlation between A and B, therefore A implies B) [same as PostHocErgoPropterHoc] NonSequitur? (Conclusion does not follow from the premises) FalseDichotomy is on the list below; DeleteWhenCooked Informal Fallacies (well-known) (These are fallacies you are likely to find in textbooks) AdHominem (The person saying P is biased or otherwise flawed, so P is false) AdVerecundiam (P is true because person/entity X has said so) ArgumentFromAuthority (quote someone famous) [equivalent to AdVerecundiam] ArgumentumAdBaculum (Argument from fear; "If you believe P, you'll suffer for it") ArgumentByTheMasses (aka ArgumentumAdPopulum; A is true because "everybody knows it is true") EquivocationFallacy (using a term with multiple definitions as if the definitions were equivalent when they are not) NoTrueScotsman (Assert that A conforms to B - redefine the identity of A until it does) RedHerring (A is true because of totally irrelevant B) StrawMan (a weak argument specifically put forth to be knocked down) ArgumentumAdInfinitum (aka ArgumentumAdNauseum?; A argues longer/more eloquently than B, so A's proposition must be true) ArgumentumAdIgnorantiam (if A can't imagine P to be true, it can't be true) DisproofByFallacy (aka AdLogicam; Argument has been made at some point for A through error X, therefore A must be false) ComplexQuestion? (A question contains an assertion assumed to be true, e.g. "Have you stopped beating your wife?") FalseDichotomy (aka BifurcationFallacy, ThisOrThatFallacy, ExcludedMiddle, FalseDilemma?; e.g. "You're either with us or you're with the terrorists.") Informal Fallacies (colloquial) (Most of these are variants of other fallacies or otherwise suggested by contributors) ArgumentFromIntimidation (see also ImmaturityArgument) [not the same as ArgumentumAdBaculum] AbsenceOfEvidenceIsNotEvidenceOfAbsence (We have never observed a proton decay, therefore it can never happen) AnonymousChoir (there are people out there who agree with me) ArgumentByGibberish (utter things that turn on the lower third) ArgumentByRepeatedAssertion (use "Saddam" and "Al Qaeda" together in the same sentence often enough and eventually they'll believe it, evidence or not) ArgumentFromSilence () AssumedAgreementFallacy (So-and-so agrees with me on X, so he probably agrees with me on Y too). AssumedScalabilityFallacy. (A works well as a small system; therefore it will work well as a large system. Or vice versa) AvoidingTheQuestion (The response to a question does not actually answer it). ConceptsOutOfContext (B pertains to A when B makes no sense in the context of this A) ConfusingTheoryAndPractice (practice of A > practice of B implies theory of A > theory of B or vice versa) DesertIslandFallacy (New technology B should be abandoned in favor of old technology A, because B will fail if you're ever stranded on a desert island) DisagreeByDistorting (assume an example would be, You want the government to assume restricted responsibility X, therefore you must be a totalitarian socialist) DogmaticFallacy evidence against some X is excluded by the UniverseOfDiscourse DuelingCredentials (I know more about X than you do, so I win) EveryoneHasHisOpinion (the opinion of a layperson is as good as that of an authority) EvidenceByBestCaseScenario (best case example may distract from problem domain) EvilOrStupid (If you don't agree with me, which one are you?) ExcerptionNotAbstraction (dogs are animals with four legs, so what about amputated dogs?) FailureToElucidate (Using terms more obscure than the primary point at issue) GordianReasoning (A is because of B, which is because of C, which is because of D... which is because of Y, which is because of Z, which is because of A) GrandConspiracy (asserting that the world is being manipulated by a cabal of some sort) IdontSufferFoolsLikeYou (Asserting that the opponent is unworthy of debate) IfItAintBrokeDontFixIt (Arguing that older things are better than the newer ones) IfItAintScottishItsCrap (The merits of X can be determined by some superficial attribute of X) IfItsWorseThanMineItsGarbage (If A some instance of B, so A > B) ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10970 From: taylortscm@y... Date: Sun Feb 6, 2005 7:36pm Subject: Re: Stolen Equipment Alert jim: thanx for this post as I do purchase about 200k in equipment every year . if you have serial#'s or any info such as area that theft occurred in and care to to let me know please reply privately dan taylor group ps watch some of the pi lists recently there was a post concerning several kaiser pieces including telephone analyzers and 1059's "James M. Atkinson" wrote: A large quantity of TSCM equipment was stolen from someone a short time back, and it looks like it is starting to show up on E-Bay and other places. Looks like the thief sat on it for a while to let it cool off, but is trying to now trying to sell it off. The equipment includes a bunch of Kaiser phone equipment, audio amps, Scanlocks, spectrum analyzer, and some Riser Bond TDR's. If anybody offers to sell you this kind of equipment, you see it listed on E-Bay, or you see it being advertised for sale on a website somewhere please let me know privately and I will ensure the appropriate authorities are notified, and that you are put in touch with the victim so you can return their property. If you have recently purchased any ***Used*** gear, TDR's, or Scanlocks on E-Bay or through other sources you should hold onto your receipt, and start asking awkward questions as to where the equipment actually came from (the gear may be in the batch that was stolen). This is not a problem with new equipment, just with the used gear, or gear that was claimed to be "demo gear", refurbished, repaired, etc. Ask for serial numbers BEFORE you pay for the equipment, and ask questions as to whom the previous owner was... you may find that the equipment is indeed hot. If you buy any equipment be sure to use PayPal to send funds, or use a credit card but be sure not to sign any kind of "waiver" so that you can dispute the charge if the equipment ends up being stolen. Make sure that you get some kind of hard copy invoice for the equipment BEFORE you pay for it, and that you keep careful records. Please call or email me if you need any details, Please be careful folks, -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? Yahoo! Search presents - Jib Jab's 'Second Term' [Non-text portions of this message have been removed] 10971 From: littledog Date: Sun Feb 6, 2005 5:49pm Subject: Re: Added mystery -- Re: Re: More Posts Dissappearing I also have had a couple of my posts censured, these so called fed law enforcers have no respect for any of our rights and to speak the truth concerning their petty stupid abuses invites more than censure..littledog> -----Original Message----- > From: Maury Siskel [mailto:maurysis@e...] > Sent: Sunday, February 06, 2005, 3:25 PM > To: TSCM-L@yahoogroups.com > Subject: Added mystery -- Re: [TSCM-L] Re: More Posts Dissappearing > > > > Jim, when I tried to view a couple of your links to the deleted emails, > Yahoo would not recognize my Yahoo password nor would it recognize me as > a member of TSCM-L. Just an interesting further complication. I've used > Yahoo email for years. > Cheers, > Maury > > James M. Atkinson wrote: > > >Yahoo claims that someone who identified themselves as a federal law > enforcement officer contacted them and requested that the posts be removed. > > > >-jma > > > > > >At 04:57 PM 2/6/2005, contranl wrote: > > > >--------- snipped -------- > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10972 From: Riskbiz Date: Sun Feb 6, 2005 9:35pm Subject: RE: List Statistics Congratulations James. DK -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Sunday, February 06, 2005 12:13 PM To: TSCM-L Subject: [TSCM-L] List Statistics List membership has stabilized over 1230 active subscribers and due to it's size I really don't keep track of who is behind which Yahoo, Hotmail, AOL, or related accounts. The actual list membership is closer to 1300 members, but at any given moment at least 50-75 list members are bouncing for a variety of reasons, but half of these clear in 24-48 hours (1230 + 75/2 = 1268). Additionally, I know that a number of the list addresses are actually "exploders" where a post sent to that addresses is copied or exploded out to a number of additional (hidden) email addresses. One such exploder account has 130+ additional subscribers behind one such account, another exploder has 25+ subscribers behind another one in England, and so on. As close as I can tell we have at least a number or such accounts where the list goes to 300 exploded additional accounts (this gives use a subscriber base of something close to 1600 or so). Quite a few list members forward copies of the daily digest to others in their organizations via a hard copy format instead of an email version, and a number of subscribers include the daily posts in their in-house daily or weekly security briefings. As a rule a newsletter, magazine, or any piece of material is actually read by many times the actual number of subscribers, and very often it is said that this number is 3.5 to 4 times higher than the subscriber base. I know of a least 1300+ active and confirmed subscribers, but the actual number is much, much higher... and I suspect the list initially gets immediate distribution to closer to 2000 or more, but anyway you look at it the TSCM-L is the largest forum in the world for discussing TSCM, bug sweeping, wiretap detection, and related topics. -jma ---------------------------------------------------------------------------- ------------------------ We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------ James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------ World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------ ------------------------ Yahoo! Groups Sponsor --------------------~--> What would our lives be like without music, dance, and theater? Donate or volunteer in the arts today at Network for Good! http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10973 From: The Price's Date: Sun Feb 6, 2005 10:27pm Subject: RE: Stolen Equipment Alert Hi JMA, Can you provide a bit more detail as I do not want to purchase anything stolen, and would like to assist the rightful owner if I come across these items. John -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: February 6, 2005 1:45 PM To: TSCM-L Subject: [TSCM-L] Stolen Equipment Alert A large quantity of TSCM equipment was stolen from someone a short time back, and it looks like it is starting to show up on E-Bay and other places. Looks like the thief sat on it for a while to let it cool off, but is trying to now trying to sell it off. The equipment includes a bunch of Kaiser phone equipment, audio amps, Scanlocks, spectrum analyzer, and some Riser Bond TDR's. If anybody offers to sell you this kind of equipment, you see it listed on E-Bay, or you see it being advertised for sale on a website somewhere please let me know privately and I will ensure the appropriate authorities are notified, and that you are put in touch with the victim so you can return their property. If you have recently purchased any ***Used*** gear, TDR's, or Scanlocks on E-Bay or through other sources you should hold onto your receipt, and start asking awkward questions as to where the equipment actually came from (the gear may be in the batch that was stolen). This is not a problem with new equipment, just with the used gear, or gear that was claimed to be "demo gear", refurbished, repaired, etc. Ask for serial numbers BEFORE you pay for the equipment, and ask questions as to whom the previous owner was... you may find that the equipment is indeed hot. If you buy any equipment be sure to use PayPal to send funds, or use a credit card but be sure not to sign any kind of "waiver" so that you can dispute the charge if the equipment ends up being stolen. Make sure that you get some kind of hard copy invoice for the equipment BEFORE you pay for it, and that you keep careful records. Please call or email me if you need any details, Please be careful folks, -jma -------------------------------------------------------------------------- -------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. -------------------------------------------------------------------------- -------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com -------------------------------------------------------------------------- -------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -------------------------------------------------------------------------- -------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10974 From: James M. Atkinson Date: Mon Feb 7, 2005 7:13am Subject: IBM, Sony, Toshiba to unveil 'Cell' chip [This chip has some interesting applications in the area of TSCM equipment, and Signals Instelligence. -jma] IBM, Sony, Toshiba to unveil 'Cell' chip Seen competing with Intel, the 'supercomputer on a chip' will power small devices like the PS3. February 7, 2005: 7:10 AM EST SAN FRANCISCO (Reuters) - The highly anticipated microchip that will power the Sony PlayStation 3 video game system will be described in detail for the first time Monday by its developers, IBM, Sony Corp. and Toshiba Corp. Dubbed a "supercomputer on a chip," the Cell microprocessor has until now been long on ambition but short on specifics. At a technical conference here, the three electronics giants say they plan to disclose the inner workings of the chip, which is designed to run portable electronics, home entertainment devices and powerful computers. Aimed squarely at the "digital home" market highly sought-after by Intel Corp. (Research), the Cell initiative, which has been in development for more than three years, is viewed by some as a formidable, if fledgling, competitor to the world's largest chip maker. The Cell chip will appear in the PlayStation 3, the follow-on to Sony's (Research) successful video game console that is expected to be released next year. Cell will likely also be marketed as an ideal technology for televisions and supercomputers, and everything in between, said Kevin Krewell, the editor in chief of Microprocessor Report. Cell "promises to be a very exciting challenge to mainstream processors," Krewell wrote in a recent issue, naming it the best chip technology of 2004, remarkable if only for the fact that no one has actually seen the chip in action. According to released details, Cell is based on the core of IBM's (Research) existing Power processor line, which is used in desktop PCs made by Apple Computer Inc. (Research) Cell contains multiple cores, allowing it to perform like many chips in one. It is capable of "massive floating point processing, optimized for compute-intensive workloads and broadband rich media applications, including computer entertainment, movies and other forms of digital content," according to an earlier statement from the companies. Sony and IBM have called Cell a strong technology for high-powered workstations and supercomputers, with multiple Cell chips able to work as a cluster. "The supercomputer-like processing and performance of the Cell processor-based workstation is just the beginning of what we expect will be a wide range of powerful next-generation solutions resulting from our joint development efforts," Colin Parris, an IBM vice president, said in a November statement. If history is any lesson, Cell is by no means guaranteed to encroach on the most successful microprocessor technology to date, the so-called x86 architecture that is the mainstay of the PC world and the profit center for both Intel and Advanced Micro Devices Inc. (Research) Intel itself once aimed at pushing the x86 technology to the margins with a chip called Itanium it developed at great cost with Hewlett-Packard Co. (Research) After a cool market reception, the Itanium project drifted away from those grand expectations. Today, Itanium remains a niche product marketed primarily at the relatively limited segment of supercomputers and high-end servers. Find this article at: http://money.cnn.com/2005/02/07/technology/cell_chip.reut/index.htm?cnn=yes ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10975 From: James M. Atkinson Date: Mon Feb 7, 2005 7:51am Subject: Policing Video Voyeurs http://www.msnbc.msn.com/id/6919996/site/newsweek/ Policing Video Voyeurs The Feds join the battle against perverts with cameras By Kathryn Williams Newsweek Feb. 14 issue - In the summer of 2001, Jolene Jang was enjoying an outdoor festival in Seattle when she felt a creepy guy standing close behind her. He was reaching into her backpack. When she confronted him, the man started to run away, but Jang's boyfriend tackled him and held him until the police arrived. She figured that was the end of it. A few months later, a prosecutor called with unsettling news. The man wasn't just a pickpocket. He had been using a small digital video camera to take pictures up her skirt. Jang's assailant might have only wanted the pictures he took for himself. But those shots could have ended up on one of a growing number of voyeur Web sites that invite perverts to submit their secretly captured pictures of women in public bathrooms and locker rooms. A popular subgenre: "upskirt" shots of women getting out of cars or climbing stairs. Tiny cell phones with built-in digital cameras make it that much easier. "There's definitely a lot of people who think that upskirting≠'Oh, big deal'," Jang says. "People who don't understand the depths of it should think about their wives or their kids." Jang was especially upset because the man who photographed her wound up serving only 38 days. He was convicted under Washington state's voyeurism law, but the state Supreme Court overturned the verdict, ruling that because Jang was out in public when it happened, she had no reasonable expectation of privacy. Furious, Jang became an outspoken activist, and eventually the state rewrote the law to make the space under a person's clothes private even in a public place. Currently 44 states have some kind of statute that make video voyeurism a crime. But vague wording and First Amendment issues≠preserving legitimate surveillance activities, say, while banning prurient peeping≠make them difficult to enforce. A just-passed federal law could help sort out the problem. The statute makes it a crime to secretly photograph someone on federal property or military bases. The law itself won't do much to protect anyone but federal workers and soldiers, but the hope is that state lawmakers across the country will copy it. Video voyeurism first gained national attention back in 1998, when Susan Wilson discovered that her neighbor had been secretly videotaping her with cameras hidden in her Louisiana home. At the time, there were no laws to fit the crime. "When I found out that it wasn't against the law, I felt even more violated," she says. Wilson's case partly inspired the federal law, called the Video Voyeurism Prevention Act of 2004. Now Congress and statehouses nationwide are grappling with a larger dilemma: how to make a law that extends into tough-to-police cyberspace. Thinking of getting back at your ex-wife by posting those "intimate" pics she once let you take? Rep. Mark Green of Wisconsin will soon introduce a bill to make that a crime unless the person consents. That's welcome news to women like Susan Wilson and Jolene Jang, who say they're always on the lookout for prying electronic eyes. "I'm still wearing skirts," Jang says. "But I make sure that they're on the longer side." ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10976 From: Tim Johnson Date: Mon Feb 7, 2005 8:13am Subject: IRISYS Thermal Imager Some of you may have heard of the Thermal Imager developed and sold by IRISYS (see http://www.irisys.co.uk/ for more information). I saw one demonstrated at a recent TSCM professional conference and it looked like a very inexpensive alternative to the $25,000.00 units (They are being sold on e-bay for around $2,000.00 by a representative here in the U.S). Before rushing out to buy one you should be aware that it is only supported by the older laptops with the serial interface. Many, if not most, of the newer laptops are not equipped with serial interface capabilities and it doesn't seem to work with the PCMCIA cards. If you are interested in this capability you can use a handheld "Palm Pilot" type display unit. I have been in contact with the dealer in the States and he contacted the company in the UK and the response was: I would not count on this capability any time soon. Best regards I'll keep trying and see if i can get my Palm Pilot i705 to recognize it.....no luck so far, but it might be because I'm trying to install it like I would software on a Mac. Mostly, I wanted to give you a heads up in the event you are looking at it. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. 10977 From: Rob Muessel Date: Mon Feb 7, 2005 9:36am Subject: RE: IRISYS Thermal Imager TSCM application of thermal imaging is quite useful, but it must be done properly with proper equipment. The IRIS IRI1011 is not the tool to use. There are several specs that matter in thermal imaging and two critical ones are the size of the detector in pixels and the size of the image created by the device. The IRI1011 has a 16 x 16 pixel detector array yeilding 256 pixels. Its display is 96 x 96. This is not anywhere near the resolution required to detect the things we need to see. As an example of an adequate imager, look at the specs from Monroe Infrared Technologies HFIR http://www.monroeinfrared.com/ProdFiles/95_HFIR%20specs.pdf. Its detector, a microbolometer, is an array of 320x 240, creating 76,800 pixels. The display is a color video monitor. I've tested low res thermal imagers. They're fun to play with, but they don't do the job. -- -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 www.tscmtech.com USA -----Original Message----- From: Tim Johnson [mailto:dbugman@d...] Sent: Monday, February 07, 2005 9:13 AM To: Recipient List Suppressed: Cc: bob@t... Subject: [TSCM-L] IRISYS Thermal Imager Some of you may have heard of the Thermal Imager developed and sold by IRISYS (see http://www.irisys.co.uk/ for more information). I saw one demonstrated at a recent TSCM professional conference and it looked like a very inexpensive alternative to the $25,000.00 units (They are being sold on e-bay for around $2,000.00 by a representative here in the U.S). Before rushing out to buy one you should be aware that it is only supported by the older laptops with the serial interface. Many, if not most, of the newer laptops are not equipped with serial interface capabilities and it doesn't seem to work with the PCMCIA cards. If you are interested in this capability you can use a handheld "Palm Pilot" type display unit. I have been in contact with the dealer in the States and he contacted the company in the UK and the response was: I would not count on this capability any time soon. Best regards I'll keep trying and see if i can get my Palm Pilot i705 to recognize it.....no luck so far, but it might be because I'm trying to install it like I would software on a Mac. Mostly, I wanted to give you a heads up in the event you are looking at it. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" VAH! DENUONE LATINE LOQUEBAR? ME INEPTUM. INTERDUM MODO ELABITUR. =================================================== TSKS ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10978 From: contranl Date: Mon Feb 7, 2005 10:48am Subject: Re: IRISYS Thermal Imager . Rob/Tim...just to be shure...you are saying that the Irisys units are not usable in TSCM. (since the price is right i like to know for shure) Lets for example look at the possibility to detect cameras, the idea is to see the temperature-difference between the camera-housing) or lens-opening and the surrounding surface/objects. When i understand it well this one will do that if there is a temperature-difference of at least 0.5 degrees (Celcius) (not shure if that is the between sensor-pixels) Since this unit does not have a lot of pixels,both in the sensor and display,it probably does not give you enough resolution for detecting cameras at big distances, for example when you would stand in the middle of a large room and scan the walls and ceilings. What if you get a little closer (for example 3 meters or less ) that would give you a little more work...still not usable ? lets say an average spy-camera housing would be 3 x 3 cm's, a standard lens opening 7 mm's,and a pinhole lens opening 2 mm's, As i understand a pinhole camera hidden in a plastic clock and looking trough a 2 mm hole ,would give a bigger "warmer" area then just the 2 mm hole.it would also warm up the surrounding area. Question 1) How close would you have to be to see them with this low-cost Irisys unit ? Question 2) Some time ago we discussed some units here that were based on optical reflection. (using a laserbeam-reflection to detect optical lenses) Seems to me that this low-cost IR-device is a better choice (for this kind of money) ? For your reference have a look at: http://www.spybusters.com/Infrared.html As you can see the IR-spots visible are not that small and i am not convinced that they would not show up on a Irisys Ok...a more expensive unit would be nice but not neccessary ? Thanks. Tetrascanner http://www.tetrascanner.com http://groups.yahoo.com/group/gsm-scanner http://groups.yahoo.com/group/traffic-cams 10979 From: contranl Date: Mon Feb 7, 2005 10:59am Subject: Anyone know this new Yahoo-group (Email-tracer) . Just got note of this new Yahoo group called Email-tracer http://groups.yahoo.com/group/emailtracer/ This is is what it's about: "This group is being set up for professional private investigators who trace Emails for clients or want to learn how to do it. I know you will like this resource" I have not checked it good yet ...anyone knows if they are OK and usefull ? Thanks Tetrascanner 10980 From: Tim Johnson Date: Mon Feb 7, 2005 11:03am Subject: Re: IRISYS Thermal Imager I'm going to see if i can get a USB to Serial cable to work with this. If not, I'll have my son configure it for my Palm Pilot when he comes in this weekend (he's the computer geek in the family, not me. I'm a Mac user) Once I get it operating, I'll do some evaluating and let you know what the results are. I got it mostly to play around with and also to see if it had any applications for TSCM. I didn't know it would only work on the Serial connector (which the new computers are being built without). tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10981 From: contranl Date: Mon Feb 7, 2005 2:28pm Subject: Re: Anyone know this new Yahoo-group (Email-tracer) . Funny they exist only one day...and already have 592 members...i am shure that is not possible. (unless they use some tricks as Jim mentioned before) So probably these are they good guys to talk to since they are "cheating" even before they've started :) Tetrascanner From: James M. Atkinson Date: Mon Feb 7, 2005 3:10pm Subject: TRADEMARKS OF A FOOL http://www.liberty.edu/Media/1214/Trademarks%20of%20a%20Fool.doc TRADEMARKS OF A FOOL The Book of Proverbs deals with many different topics that relate to every day life. It is clear from the very beginning that Solomon wants his son to be a wise son. In sharp contrast, he does not want his son to be a fool. A fool may be some who is intellectually bright, but when it comes to spiritual things they are very dull. When the word "fool" is used in Proverbs it usually means one that is empty headed, void of understanding, thick-headed and obstinate. The fool does not have a head problem as much as he has a heart problem. To help his son understand the ways of a fool, Solomon will throughout the book of Proverbs share insights about the life and the actions of a fool. Let's notice first how a fool lives. These are "10 TRADEMARKS of FOOL" 1. The fool rejects to the point of resisting instructions. Pr. 1:7 "The fear of the Lord is the beginning of knowledge, but fools despise wisdom and instruction" Prov. 18:2 says, "A fool has no delight in understanding, but in expressing his own heart." This rejection or attitude toward instruction is displayed toward the parents of a fool. Prov. 15:5 - "A fool despises his father's instructions." A child that is hardheaded has started down the path to being a fool. Furthermore this attitude of rejecting instruction is displayed when someone tries to correct the fool. Prov. 23:9 says, "Do not speak in the hearing of a fool. For he will despise the wisdom of your words." 2. The fool believes he is always right. Fools are very prideful. Prov. 12:15 says, "The way of a fool is right in his own eyes, but he who heeds counsel is wise." Fools are know -it - alls. You can't teach them a thing, much less try to tell them anything. They reject the counsel of others in favor of their own counsel. The fool needs to take notice of the advice given in Prov. 28:25 - 26. "He who is of a proud heart stirs up strife. But he who trusts in the Lord will be prospered. He who trusts in his own heart is a fool. But whoever walks wisely will be delivered." 3. Fools are rebellious and they rejoice in and about sins. Prov. 10:23 reveals that a fool loves to practice sin. "To do evil is like a sport to a fool. But a man of understanding has wisdom." Prov. 15:14 tells us that the fool feeds on foolishness. And they not only rejoice in sin, they mock at the guilt from sin. Prov. 14:9 says, "Fools mock at sin (guilt). Fools believe so strongly in practicing evil that Solomon tells us in Prov. 13:19, "it is an abomination to fools to depart from sin." They are good at saying evil is good and good is evil. Sin is just one big joke to the fool. 4. Fools are quick to run their mouth. Prov. 14:3 says, "In the mouth of a fool is a rod of pride, but the lips of the wise will preserve them." A fool is so conceited that he cannot hold his tongue. He is not only a know-it-all, he is a tell-it-all. To his own shame he will be quick to answer even before he hears the whole situation. See Prov. 18:13. Prov. 15:2 "The tongue of the wise uses knowledge rightly, but the mouth of fools pour forth foolishness." Twice in chapter 10 Solomon let's the fool know that his excessive talking is going to cause him to fall. Prov. 10:8,10 says, a prating, (talkative) fool will fall (or brought down to ruin) When it comes to controlling their tongue, the fool should pay close attention to Prov. 17:28 which says, "Even a fool is counted wise when he holds his peace. When he shuts his lips, he is considered perceptive." And all of us should take heed to Prov. 10:19 which says, "In the multitude of words sin is not lacking." 5. A fool is NOT someone to be trusted with responsibilities as they are very unreliable. Prov. 26:6 says, "He who sends a message by the hand of a fool cuts off his own feet and drinks violence." Prov. 26:8 says, "Like one who binds a stone in a sling is one who give honor to a fool." 6. A fool has a hard time controlling their rage. He is hot-tempered. Prov. 12:16 says, "A fool's wrath is known at once, but a prudent man covers his shame." Prov. 14:16-17a says, "A wise man fears and departs from evil. But a fool rages and is self-confident. A quick-tempered man acts foolishly. Prov. 14:29 says, "He who is slow to wrath has great understanding. But he who is impulsive exalts folly." Prov. 29:11 says, "A fool vents his feelings, but a wise man holds them back." You are going to know what is on a fool's mind, whether you want to or not. He will give you a piece of his mind even when he does not have any to spare. Has your temper every gotten you in trouble? 7. Fools resist correction. And like the scoffer, may retaliate with hatred toward you. Prov. 17:10 says, "Rebuke is more effective for a wise man than an hundred blows on a fool." Prov. 27:22 says, "Though you grind a fool in a mortar, grinding him like grain with a pestle you will not remove his folly from him." Because fools are so set in their ways, discipline that usually would change a person's behavior has very little effect on the fool. Prov. 9:7-9 says, "He who corrects a scoffer gets shame for himself. Do not correct a scoffer, lest he hate you; Rebuke a wise person and he will love you. Give instructions to a wise person and he will be still wiser. Teach a just man and he will increase in learning." You can tell a lot about your character by the way you respond to a rebuke or correction. 8. A fool will repeat his mistakes and return to his sins. Prov. 26:11 says, "As a dog returns to his own vomit, so a fool repeats his folly." The fool so despises instruction and is so stubborn that he fails to learn from his own mistakes. He returns and does the same thing over and over, getting the same results. 9. Fools are reckless with riches and possessions. Prov. 21:20 says, " In the house of the wise are stores of choice food and oil, but a foolish man devours all that he has. (NIV) Prov. 14:24 tells us, "The crown of the wise is their riches, but the foolishness of fools is (yields) folly." No wonder Prov. 19:10 says, "luxury is not fitting for a fool." 10. A fool's folly ruins his life. Prov. 19:3 says, "A man's own folly ruins his life, yet his heart rages against the Lord." (NIV) And not only does he ruin his own life, he ruins his parents life. Prov. 19:13 says, "A foolish son is the ruin of his father." Prov. 17:21 says, "He that has a scoffer for a son does so to his own sorrow, and the father of a fool has no joy." It does not get better it gets worse: Prov. 10:21 "The lips of the righteous feed many, but fool's die for lack of wisdom." Prov. 3:35 tells us that "the wise shall inherit glory, but shame shall be the legacy of fools." Prov. 11:29 says, "He who troubles his own house will inherit the wind. And the fool will be the servant to the wise of heart." Prov. 16:22 (NIV) teaches us that "Understanding is a fountain of life to those who have it, but folly brings punishment to fools." Prov. 19:29 (KJV) "Judgments are prepared for scorners and stripes for the back of fools." ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10983 From: James M. Atkinson Date: Mon Feb 7, 2005 3:47pm Subject: Re: IRISYS Thermal Imager Tim, The image resolution of the IRISYS systems is fine for figuring out which bus bar of a circuit break is overheating, or what part of a motor is overheating, but it lacks the sensitivity for TSCM work, and the resolution is so low that your going to end up spending hours chasing ghost readings, but even more dangerously such a system will create a certain level of blindness where you will not be able to find the slight anomalies you are looking for. An inexpensive hand-held infrared digital thermometer used at point-blank range will do just a good a job, but without the fancy color display. The bolometer of any thermal camera or imaging system is where all the money goes to in a thermal system with a typical "cheap" having a matrix that is 320*240, with a quarter degree resolution. An "expensive" imaging system can have a bolometer that is 640*480, and have a resolution of better than a tenth of a degree. A "premium" or high performance system bolometer can be 800*600, or even better but you have to watch out for units that interlace a 320*240 matrix to fake a higher resolution. A cheap, throw away $5 flashlight will find more bugs than a $5000 thermal imaging system. Thermal systems are expensive, and are very finicky little instruments that can really cause some headaches. -jma At 09:13 AM 2/7/2005, Tim Johnson wrote: >Some of you may have heard of the Thermal Imager developed and sold >by IRISYS (see http://www.irisys.co.uk/ for more information). I saw >one demonstrated at a recent TSCM professional conference and it >looked like a very inexpensive alternative to the $25,000.00 units >(They are being sold on e-bay for around $2,000.00 by a >representative here in the U.S). > >Before rushing out to buy one you should be aware that it is only >supported by the older laptops with the serial interface. Many, if >not most, of the newer laptops are not equipped with serial interface >capabilities and it doesn't seem to work with the PCMCIA cards. If >you are interested in this capability you can use a handheld "Palm >Pilot" type display unit. > >I have been in contact with the dealer in the States and he contacted >the company in the UK and the response was: > > >I would not count on this capability any time soon. > >Best regards > > >I'll keep trying and see if i can get my Palm Pilot i705 to recognize >it.....no luck so far, but it might be because I'm trying to install >it like I would software on a Mac. > >Mostly, I wanted to give you a heads up in the event you are looking at it. > >tim >-- > >Tim Johnson > >Technical Security Consultants Inc. >PO Box 1295 >Carrollton, GA 30112 >770-836-4898 >770-712-2164 Cell > >What you say in private is your business. Keeping it private is ours. > >Georgia License # PDC 002074 Technical Security Consultants Inc. >Member INTELNET > Espionage Research Institute > Association of Former Office of Special Investigations >Special Agents-Technical Agent >http://www.dbugman.com > >This e-mail is intended for the use of the addressee(s) only and may >contain privileged confidential, or proprietary information that is >exempt from disclosure under law. If you have received this message >in error, please inform us promptly by reply e-mail, then delete the >e-mail and destroy any printed copy. > >Neither this information block, the typed name of the sender, or >anything else in this message is intended to constitute an electronic >signature for purposes of the Uniform Electronic Transactions Act or >the Electronic Signatures in Global and National Commerce Act >(E-Sign) unless a specific statement to the contrary is included in >this message. > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > VAH! DENUONE LATINE LOQUEBAR? > ME INEPTUM. INTERDUM MODO ELABITUR. >=================================================== TSKS >Yahoo! Groups Links > > > > ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10984 From: Tim Johnson Date: Mon Feb 7, 2005 4:12pm Subject: Re: TRADEMARKS OF A FOOL James, It's your group and you can post whatever you want, but why not start another Yahoo group for the religious articles. This wasn't the forum for it. Tim Johnson Born a Baptist, raised a Protestant, married to a Catholic and my religious beliefs are my own ands personal. I would hope that you would keep your beliefs to yourself. Hopefully, I won't get bounced for my comment and view. Tim Johnson -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10985 From: Tim Johnson Date: Mon Feb 7, 2005 4:21pm Subject: Re: IRISYS Thermal Imager Thanks for the info. I bought it just to play around with and to see what its capabilities are. It was interesting to see someone place their palm on a table for 2 seconds and to then have the image displayed (we didn't try for time, just for the image, so I have no idea how long it would have been visible. Once (IF) I get it to interface with the Dell PC (without a serial port) I'll do some testing and let the folks on TSCM-L know what the results are. Tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10986 From: Tim Johnson Date: Mon Feb 7, 2005 4:25pm Subject: Another question on Thermal Imagers I received the following from a member of my private e-mail list and was wondering if any of you have any info you would like to share. tim I'd be interested to know if anyone on your list has tried the MX-1 mini thermal imager. It sells new for about $7,000 and a couple models have sold on Ebay for about $5,000. It appears to be very small, moderately ruggedized (sold to the military), and best of all runs for 7 hours on 2 lithium AA's. What I'd like to know though is how good is the picture? Is it sufficient for TSCM work and able to focus in close range or is it only satisfactory for surveillance and outdoor applications? For those that aren't familiar with this model, here's a link: http://www.nvec-night-vision.com/products/pdf/mx1.pdf -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10987 From: Rob Muessel Date: Mon Feb 7, 2005 4:31pm Subject: RE: Re: IRISYS Thermal Imager If you want to try to detect chip cameras, it might work, but the resolution is so poor that you may not discern the camera from the background if it is placed close to another warm object. Personaly, I'd save my money. I can't see investing in equipment that only does a part of the job and may really give you a false sense of security. Strikes me as a waste. Used Raytheon PalmIR units come on the market once in a while. They should be priced in the US$6-8000 range and will out perform these low-res units by an exponential factor. -- -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 www.tscmtech.com USA -----Original Message----- From: contranl [mailto:contranl@y...] Sent: Monday, February 07, 2005 11:48 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: IRISYS Thermal Imager . Rob/Tim...just to be shure...you are saying that the Irisys units are not usable in TSCM. (since the price is right i like to know for shure) Lets for example look at the possibility to detect cameras, the idea is to see the temperature-difference between the camera-housing) or lens-opening and the surrounding surface/objects. When i understand it well this one will do that if there is a temperature-difference of at least 0.5 degrees (Celcius) (not shure if that is the between sensor-pixels) Since this unit does not have a lot of pixels,both in the sensor and display,it probably does not give you enough resolution for detecting cameras at big distances, for example when you would stand in the middle of a large room and scan the walls and ceilings. What if you get a little closer (for example 3 meters or less ) that would give you a little more work...still not usable ? lets say an average spy-camera housing would be 3 x 3 cm's, a standard lens opening 7 mm's,and a pinhole lens opening 2 mm's, As i understand a pinhole camera hidden in a plastic clock and looking trough a 2 mm hole ,would give a bigger "warmer" area then just the 2 mm hole.it would also warm up the surrounding area. Question 1) How close would you have to be to see them with this low-cost Irisys unit ? Question 2) Some time ago we discussed some units here that were based on optical reflection. (using a laserbeam-reflection to detect optical lenses) Seems to me that this low-cost IR-device is a better choice (for this kind of money) ? For your reference have a look at: http://www.spybusters.com/Infrared.html As you can see the IR-spots visible are not that small and i am not convinced that they would not show up on a Irisys Ok...a more expensive unit would be nice but not neccessary ? Thanks. Tetrascanner http://www.tetrascanner.com http://groups.yahoo.com/group/gsm-scanner http://groups.yahoo.com/group/traffic-cams ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" VAH! DENUONE LATINE LOQUEBAR? ME INEPTUM. INTERDUM MODO ELABITUR. =================================================== TSKS ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10988 From: joe joe Date: Mon Feb 7, 2005 4:34pm Subject: Re: Another question on Thermal Imagers always look for thermal resolution 0.1 degrees celsius or better at 30 degrees celsius object tempurature on the specs of a camera and then you could have something useful for tscm --- Tim Johnson wrote: > I received the following from a member of my private > e-mail list and > was wondering if any of you have any info you would > like to share. > > tim > > > > I'd be interested to know if anyone on your list > has tried the MX-1 > mini thermal imager. It sells new for about $7,000 > and a couple > models have sold on Ebay for about $5,000. It > appears to be very > small, moderately ruggedized (sold to the military), > and best of all > runs for 7 hours on 2 lithium AA's. What I'd like to > know though is > how good is the picture? Is it sufficient for TSCM > work and able to > focus in close range or is it only satisfactory for > surveillance and > outdoor applications? > > For those that aren't familiar with this model, > here's a link: > > http://www.nvec-night-vision.com/products/pdf/mx1.pdf > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > MemberINTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > [Non-text portions of this message have been > removed] > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10989 From: joe joe Date: Mon Feb 7, 2005 4:36pm Subject: RE: Re: IRISYS Thermal Imager yes and the flir 470 is good also --- Rob Muessel wrote: > If you want to try to detect chip cameras, it might > work, but the resolution > is so poor that you may not discern the camera from > the background if it is > placed close to another warm object. > > Personaly, I'd save my money. I can't see investing > in equipment that only > does a part of the job and may really give you a > false sense of security. > Strikes me as a waste. Used Raytheon PalmIR units > come on the market once > in a while. They should be priced in the US$6-8000 > range and will out > perform these low-res units by an exponential > factor. > > -- -- > Rob Muessel, Director email: > rmuessel@t... > TSCM Technical Services Phone: 203-354-9040 > 11 Bayberry Lane Fax: 203-354-9041 > Norwalk, CT 06851 www.tscmtech.com > USA > > > -----Original Message----- > From: contranl [mailto:contranl@y...] > Sent: Monday, February 07, 2005 11:48 AM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Re: IRISYS Thermal Imager > > > > . > > Rob/Tim...just to be shure...you are saying that > the Irisys units > are not usable in TSCM. > (since the price is right i like to know for > shure) > > Lets for example look at the possibility to detect > cameras, > the idea is to see the temperature-difference > between the > camera-housing) or lens-opening and the > surrounding surface/objects. > When i understand it well this one will do that if > there is a > temperature-difference of at least 0.5 degrees > (Celcius) > (not shure if that is the between sensor-pixels) > > Since this unit does not have a lot of pixels,both > in the sensor and > display,it probably does not give you enough > resolution for detecting > cameras at big distances, for example when you > would stand in the > middle of a large room and scan the walls and > ceilings. > > What if you get a little closer (for example 3 > meters or less ) > that would give you a little more work...still not > usable ? lets say > an average spy-camera housing would be 3 x 3 cm's, > a standard lens opening 7 mm's,and a pinhole lens > opening 2 mm's, > > As i understand a pinhole camera hidden in a > plastic clock and > looking trough a 2 mm hole ,would give a bigger > "warmer" area then > just the 2 mm hole.it would also warm up the > surrounding area. > > > Question 1) > > How close would you have to be to see them with > this low-cost > Irisys unit ? > > > Question 2) > > Some time ago we discussed some units here that > were based on > optical reflection. > (using a laserbeam-reflection to detect optical > lenses) > Seems to me that this low-cost IR-device is a > better choice (for > this kind of money) ? > > > For your reference have a look at: > > http://www.spybusters.com/Infrared.html > > As you can see the IR-spots visible are not that > small and > i am not convinced that they would not show up on > a Irisys > Ok...a more expensive unit would be nice but not > neccessary ? > > > > Thanks. > > Tetrascanner > > http://www.tetrascanner.com > http://groups.yahoo.com/group/gsm-scanner > http://groups.yahoo.com/group/traffic-cams > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is > strength" > > VAH! DENUONE LATINE LOQUEBAR? > ME INEPTUM. INTERDUM MODO ELABITUR. > > =================================================== > TSKS > > > > ---------------------------------------------------------------------------- > -- > Yahoo! Groups Links > > a.. To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > b.. To unsubscribe from this group, send an > email to: > TSCM-L-unsubscribe@yahoogroups.com > > c.. Your use of Yahoo! Groups is subject to the > Yahoo! Terms of Service. > > > > [Non-text portions of this message have been > removed] > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10990 From: Date: Mon Feb 7, 2005 11:53am Subject: Re: TRADEMARKS OF A FOOL Dropping the reference to Proverbs, There is some very good stuff there, especially considering the postings over the last several months. I've read some very foolish stuff. These are "10 TRADEMARKS of FOOL" 1. The fool rejects to the point of resisting instructions. 2. The fool believes he is always right. Fools are very prideful. 3. Fools are rebellious and they rejoice in and about sins. 4. Fools are quick to run their mouth. 5. A fool is NOT someone to be trusted with responsibilities as they are very unreliable. 6. A fool has a hard time controlling their rage. He is hot-tempered. 7. Fools resist correction. And like the scoffer, may retaliate with hatred toward you. 8. A fool will repeat his mistakes and return to his sins. 9. Fools are reckless with riches and possessions. 10. A fool's folly ruins his life. [Non-text portions of this message have been removed] 10991 From: Tim Johnson Date: Mon Feb 7, 2005 4:42pm Subject: Re: Another question on Thermal Imagers Sorry, Joe Joe. You didn't address the question. He was asking about a specific piece of equipment and if anyone had any personal knowledge of it. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10992 From: Guy Urbina Date: Mon Feb 7, 2005 4:21pm Subject: Re: TRADEMARKS OF A FOOL James, I for one enjoyed the article and found it enlightening and full of common sense. It has applications for the people I work with and for people on this list. \R -Guy ____________________________________________________________ Guy Urbina Defense Sciences Engineering Division Electronics Engineering Lawrence Livermore National Laboratory 7000 East Avenue, Mail Stop L-369 Livermore, CA 94551 USA Voice - (925) 422-6460 Fax - (925) 422-2118 email - urbina1@l... _____________________________________________________________ At 05:12 PM 2/7/2005 -0500, you wrote: >James, > >It's your group and you can post whatever you want, but why not start >another Yahoo group for the religious articles. This wasn't the forum >for it. > >Tim Johnson >Born a Baptist, raised a Protestant, married to a Catholic and my >religious beliefs are my own ands personal. I would hope that you >would keep your beliefs to yourself. > >Hopefully, I won't get bounced for my comment and view. > >Tim Johnson >-- 10993 From: wiseguypi Date: Mon Feb 7, 2005 4:37pm Subject: 2005 Cybercrime Summit Slightly off topic, but the Atlanta Chapter of the HTCIA is again hosting the 2005 Southeast Cybercrime Summit in metro Atlanta. www.atlccs.com. The Summit is a 4 day conference covering computer security, and other computer forensic related issues. Over 70 speakers are presenting this year. It would be a challenge to find this many topics covered in one conference, and impossible to find it open to everyone for such a low price. Price is $249.00 for the 4 days. Hope to see some of you there. Steven Wisenburg 10994 From: Thomas Jones Date: Mon Feb 7, 2005 5:26pm Subject: OSCOR comments from REI I try hard to honor the intent of this list and not use it as a marketing forum, but in monitoring the list, there were some comments from "tensor66B" about the OSCOR that I felt need to be clarified. 1. Our selling policy on the OSCOR has changed. For many years, the OPC software was an option that had to be purchased separately. However, in our new 5.0 version, the OSCOR hardware was upgraded for faster sweep times (to help address burst transmitters), the price was increased on the OSCOR, and the OPC software is now free. All of the password protection and licensing has removed from the OPC 5.0 software. But, it can only be used with OSCOR hardware that is upgraded to 5.0 level. 2. Please understand that our trace analysis methodology is a different approach than relying on expensive Time Domain analysis. OSCOR CAN capture evidence of burst transmissions for a very wide range of burst characteristics. It cannot demodulate, decode, or decrypt the burst information (even very expensive systems will have difficulty with this), and it is certainly not expected to capture every transmission event. It is not the intent to capture every event but to capture enough to use trace analysis to simply display the evidence that the event occurred and identify the frequency of transmission. One device that we have tested extensively has burst times between 30msec and 231msec. Using trace analysis, it takes about 30 minutes for good reliability to find this device while sweeping from 500KHz to 21GHz. Also, we use High-End Signal Generators to simulate other user defined burst characteristics so that it is easy to learn the capabilities and limitations of the OSCOR system. If you would like to learn more about how the OSCOR can do this, please attend our training courses or simply arrange a time for a visit. I would personally be happy to explain and demonstrate burst detection. It does work, and it does not even require the FREE OPC software to do this. 3. On the video demodulation, you are simply miss-informed. The maximum audio bandwidth is 250KHz, but the VIDEO bandwidth for demodulation is 6MHz. It is misleading to some people because the user selectable bandwidths for audio do not include the video bandwidth. The video bandwidth is automatically used when video demodulation is turned on. There has been a lot of assumption and misunderstanding about our products on this list. If you have questions, I hope that you will contact us directly for clarification. I cannot promise that I will personally address everyone, but we will work hard to ensure that you understand the products. If you would like subscribe to our newsletter in which some of the above issues have previously been discussed and published, please contact REI at "newsletter@r...". 10995 From: joe joe Date: Mon Feb 7, 2005 6:16pm Subject: Re: Another question on Thermal Imagers yes i did maybe you should reread what i wrote..i said check the specs and i gave which specs are good for tscm work..on that particular thermal, if you do check the specs i beleive you could know if its good or not --- Tim Johnson wrote: > Sorry, Joe Joe. You didn't address the question. > > He was asking about a specific piece of equipment > and if anyone had > any personal knowledge of it. > > tim > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > MemberINTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > [Non-text portions of this message have been > removed] > > __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail 10996 From: James M. Atkinson Date: Mon Feb 7, 2005 6:28pm Subject: Re: IRISYS Thermal Imager Tim, You might also want to pickup a Sony Nightshot/0 lux camcorder. No, really... I am serious. The Nightshot series of camcorders can be modified to force the unit into full time IR mode, and with removal of the hot filter that is in front of the CCD element you can have a fairly decent performance thermal or at least near thermal imaging system. It may not be a quarter of a degree of resolution, but it does provide something usable. Yes, it is primary designed to be an infrared camera, but the hot filter is actually a thermal low pass filter that when removed can be used for a wicked cheap thermal camera as you get to open up the CCD element to higher frequency light. You can also enhance the effect by illuminating the area that you are inspecting with a I/R spotlight with a 900 nm high pass filter. A small board camera hidden in a ceiling tile, or a pinhole microphone concealed in a wall will be quite obvious with this kind of system, and the results will be in a monochrome and not fancy color, but on the plus side you can put together a system for less than a few hundred bucks. Also, when using a thermal camera use a ***BIG*** display and not the cheesy little 2 or 3 inch micro-monitors they typically include. Set up something that is at least a 10 inch display or larger and don't be bashful about using a 15-17 inch LCD panel or video projector. You can even run the monitor in black-and-white mode and add in a small video amplifier to tweak up the contrast so that you can better see the slight anomalies. Don't expect to use a thermal system from more than 6-8 feet away from the thing that you are inspecting, and try to be within four feet or less. You will find it easier to find nasty goodies if you can rapidly drop the room temperature while you keep the wall or ceiling you are inspecting warmer. The ideal thermal system to use is one that is used to observe biological functions and not one used for mechanical systems and those used by electricians to examine transformers, motors, and breaker panels. Our primary interest is typically between 60 or 70 and 90 or 110 degree's F, and we typically would like to be able to detect a difference of a tenth of a degree or better. We want a system that can see the heat difference caused by a breath being exhaled, and then watch the eddies and currents are the heat curls though the air. The industrial units are fine if you are looking for a bug hidden in a molten pool of steel at the bottom of a blast furnace, or if you are trying to measure a the heat produced by a light bulb. -jma At 05:21 PM 2/7/2005, Tim Johnson wrote: >Thanks for the info. > >I bought it just to play around with and to see what its capabilities >are. It was interesting to see someone place their palm on a table >for 2 seconds and to then have the image displayed (we didn't try for >time, just for the image, so I have no idea how long it would have >been visible. > >Once (IF) I get it to interface with the Dell PC (without a serial >port) I'll do some testing and let the folks on TSCM-L know what the >results are. > >Tim >-- > >Tim Johnson > >Technical Security Consultants Inc. >PO Box 1295 >Carrollton, GA 30112 >770-836-4898 >770-712-2164 Cell ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10997 From: joe joe Date: Mon Feb 7, 2005 6:48pm Subject: Re: IRISYS Thermal Imager hello james this was your quote," Our primary interest is typically between 60 or 70 and 90 or 110 degree's F, and we typically would like to be able to detect a difference of a tenth of a degree or better."..hmmmm sounds exactly like what i said huh?...you like to steal ideas from me,lol just kidding --- "James M. Atkinson" wrote: > Tim, > > You might also want to pickup a Sony Nightshot/0 lux > camcorder. > > No, really... I am serious. > > The Nightshot series of camcorders can be modified > to force the unit into > full time IR mode, and with removal of the hot > filter that is in front of > the CCD element you can have a fairly decent > performance thermal or at > least near thermal imaging system. It may not be a > quarter of a degree of > resolution, but it does provide something usable. > > Yes, it is primary designed to be an infrared > camera, but the hot filter is > actually a thermal low pass filter that when removed > can be used for a > wicked cheap thermal camera as you get to open up > the CCD element to higher > frequency light. You can also enhance the effect by > illuminating the area > that you are inspecting with a I/R spotlight with a > 900 nm high pass > filter. A small board camera hidden in a ceiling > tile, or a pinhole > microphone concealed in a wall will be quite obvious > with this kind of > system, and the results will be in a monochrome and > not fancy color, but on > the plus side you can put together a system for less > than a few hundred bucks. > > Also, when using a thermal camera use a ***BIG*** > display and not the > cheesy little 2 or 3 inch micro-monitors they > typically include. Set up > something that is at least a 10 inch display or > larger and don't be bashful > about using a 15-17 inch LCD panel or video > projector. You can even run the > monitor in black-and-white mode and add in a small > video amplifier to tweak > up the contrast so that you can better see the > slight anomalies. > > Don't expect to use a thermal system from more than > 6-8 feet away from the > thing that you are inspecting, and try to be within > four feet or less. You > will find it easier to find nasty goodies if you can > rapidly drop the room > temperature while you keep the wall or ceiling you > are inspecting warmer. > > The ideal thermal system to use is one that is used > to observe biological > functions and not one used for mechanical systems > and those used by > electricians to examine transformers, motors, and > breaker panels. Our > primary interest is typically between 60 or 70 and > 90 or 110 degree's F, > and we typically would like to be able to detect a > difference of a tenth of > a degree or better. We want a system that can see > the heat difference > caused by a breath being exhaled, and then watch the > eddies and currents > are the heat curls though the air. > > The industrial units are fine if you are looking for > a bug hidden in a > molten pool of steel at the bottom of a blast > furnace, or if you are trying > to measure a the heat produced by a light bulb. > > -jma > > > > > > At 05:21 PM 2/7/2005, Tim Johnson wrote: > > >Thanks for the info. > > > >I bought it just to play around with and to see > what its capabilities > >are. It was interesting to see someone place their > palm on a table > >for 2 seconds and to then have the image displayed > (we didn't try for > >time, just for the image, so I have no idea how > long it would have > >been visible. > > > >Once (IF) I get it to interface with the Dell PC > (without a serial > >port) I'll do some testing and let the folks on > TSCM-L know what the > >results are. > > > >Tim > >-- > > > >Tim Johnson > > > >Technical Security Consultants Inc. > >PO Box 1295 > >Carrollton, GA 30112 > >770-836-4898 > >770-712-2164 Cell > > > ---------------------------------------------------------------------------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and > Real Wiretappers. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson > Phone: (978) 381-9111 > Granite Island Group Fax: > > 127 Eastern Avenue #291 > Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent > Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10998 From: Tim Johnson Date: Mon Feb 7, 2005 7:03pm Subject: Re: Another question on Thermal Imagers Joe Joe, He asked three specific questions. 1. Do you have personal knowledge of the equipment? 2. How good is the picture? 3. Is it sufficient for TSCM work and able to focus in close range or is it only satisfactory for surveillance and outdoor applications? If I was familiar with that Imager, I would have answered the questions he posed. At any rate, i passed on your comment for him to look at. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10999 From: Michael Dever Date: Mon Feb 7, 2005 7:07pm Subject: SONY 0LUX CAMCORDER Jim, You mentioned in your last post: "The Nightshot series of camcorders can be modified to force the unit into full time IR mode, and with removal of the hot filter that is in front of the CCD element you can have a fairly decent performance thermal or at least near thermal imaging system..." I am aware of how to remove an IR filter but are the other modifications you speak of electronic? If so are they published anywhere or is the information proprietary? Regards Mike Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 11000 From: Tim Johnson Date: Mon Feb 7, 2005 7:36pm Subject: Re: IRISYS Thermal Imager Thanks again for the input. That is the reason I'm trying to get the Dell PC Laptop to work with it; it has the 15 inch display. I think I have a USB to Serial Connector and will try again this weekend when the computer geek comes home. I have a Palm Pilot I could use, but am intimately familiar with the lack of resolution with a small display. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 11001 From: James M. Atkinson Date: Mon Feb 7, 2005 7:34pm Subject: Re: TRADEMARKS OF A FOOL Tim, I appreciate your thoughts on the subject matter, and you do not ever have to worry about getting bounced off the list expressing your view or for adding a comment to a subject matter. My posting from Proverbs was more of philosophical nature and a bit of wisdom as opposed to a discussion on the finer point of transubstantiation as opposed to consubstantiation or an analysis on the number of angel that can dance on the head of a pin. So as not to offend were are a few more pearls of wisdom from a variety of other sources: ------------------------------------------------ George Washington Quotes "Government is not reason. It is not eloquence. It is a force, like fire: a dangerous servant and a terrible master". "A free people ought...to be armed..." "Can it be that Providence has not connected the permanent felicity of a nation with its virtue? " "There is nothing which can better deserve our patronage than the promotion of science and literature. Knowledge is in every country the surest basis of public happiness." "Liberty, when it begins to take root, is a plant of rapid growth." "The aggregate happiness of the society, which is best promoted by the practice of a virtuous policy, is, or ought to be, the end of all government . . . ." "Human rights can only be assured among a virtuous people. The general government . . . can never be in danger of degenerating into a monarchy, an oligarchy, an aristocracy, or any despotic or oppressive form so long as there is any virtue in the body of the people." "Of all the dispositions and habits, which lead to political prosperity, Religion and Morality are indispensable supports. In vain would that man claim the tribute of Patriotism, who should labor to subvert these great pillars of human happiness, these firmest props of the duties of Men and Citizens. The mere Politician, equally with the pious man, ought to respect and to cherish them." "A volume could not trace all their connexions with private and public felicity. Let it simply be asked, Where is the security for property, for reputation, for life, if the sense of religious obligation desert the oaths, which are the instruments of investigation in Courts of Justice? And let us with caution indulge the supposition, that morality can be maintained without religion. Whatever may be conceded to the influence of refined education on minds of peculiar structure, reason and experience both forbid us to expect, that national morality can prevail in exclusion of religious principle." "The very atmosphere of firearms anywhere and everywhere restrains evil interference -- they deserve a place of honor with all that is good." "Government is not reason, it is not eloquence -- it is force!" "It is substantially true that virtue or morality is a necessary spring of popular government." "It is impossible to account for the creation of the universe without the agency of a Supreme Being. It is impossible to govern the universe without the aid of a Supreme Being. It is impossible to reason without arriving at a Supreme Being. Religion is as necessary to reason as reason is to religion. The one cannot exist without the other. A reasoning being would lose his reason in attempting to account for the great phenomena of nature, had he not a Supreme Being to refer to; and will has it been said, that if there had been no God, mankind would have been obliged to imagine one." "I never mean, unless some particular circumstances should compel it, to possess another slave by purchase, it being among my first wishes to see some plan adopted, by which slavery in this country may be abolished by law." "No people can be bound to acknowledge and adore the invisible hand which conducts the affairs of men more than the people of the United States. Every step by which they have advanced to the character of an independent nation seems to have been distinguished by some token of providential agency." "Ninety-nine percent of the failures come from people who have the habit of making excuses." Albert Einstein Quotes "The important thing is to not stop questioning. " "Imagination is more important than knowledge. " "Great spirits have always encountered violent opposition from mediocre minds" "It is enough for me to contemplate the mystery of conscious life, perpetuating itself through all eternity; to reflect upon the marvelous structure of the Universe; and to try humbly to comprehend even an infinitesimal part of the intelligence manifested in nature." "Only a life lived for others is worth living." "I am enough of an artist to draw freely upon my imagination. Imagination is more important than knowledge. Knowledge is limited. Imagination encircles the world." "Sometimes one pays most for the things one gets for nothing. " "If A equals success, then the formula is: A = X+Y+Z. X is work. Y is play. Z is keep your mouth shut." "There are only two ways to live your life. One is as though nothing is a miracle. The other is as though everything is a miracle." "I do not know with what weapons World War 3 will be fought, but World War 4 will be fought with sticks and stones." "Science without religion is lame, religion without science is blind." "God does not play dice with the universe." "Problems cannot be solved at the same level of awareness that created them." "Few are those who see with their own eyes and feel with their own hearts." "Peace cannot be achieved through violence, it can only be attained through understanding." "When the solution is simple, God is answering." "Where the world ceases to be the scene of our personal hopes and wishes, where we face it as free beings admiring, asking and observing, there we enter the realm of Art and Science" "Watch the stars, and from them learn. "Gravitation can not be held responsible for people falling in love" "In the middle of difficulty lies opportunity." Ben Franklin Quotes "If you'd know the power of money, go and borrow some." "To be intimate with a foolish friend is like going to bed to a razor." "No nation was ever ruined by trade." "Drive thy Business, or it will drive thee." "In this world nothing is certain but death and taxes." "He that falls in love with himself will have no rivals." "Let thy discontent be they secrets; if the world know them 't will despise thee and increase them." "There is no little enemy." "Setting too good an example is a kind of slander seldom forgiven." "Experience keeps a dear school, yet fools will learn in no other." "Avarice and happiness never saw each other, how then should they become acquainted." "Human felicity is produced not so much by great pieces of good fortune that seldom happen, as by little advantages that occur every day." "Where there is Marriage without Love, there will be Love without Marriage." "Write with the learned, pronounce with the vulgar." "Laws too gentle are seldom obeyed; too severe, seldom executed." "God heals, and the doctors take the fee." "A penny saved, is a penny earned." "Necessity never made a good bargain." "Let thy Child's first Lesson be Obedience, and the second will be what thou wilt." "Three may keep a secret, if two of them are dead." "Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety." "If you'd have it done; Go: if not, Send." "Dost thou love life? Then do not squander time; for that's the stuff life is made of." "We must all hang together, or assuredly we shall hang separately." "There never was a good war or a bad peace." "If you Riches are yours, why don't you take them with you to t'other World?" "Be slow in choosing a friend, slower in changing." "There is no little enemy." "Three can keep a secret, if two of them be dead." "Early to bed and early to rise, makes a man healthy wealthy and wise." "Don't throw stones at your neighbors if your own windows are glass." "The cat in gloves catches no mice." "Lost time is never found again." "Necessity never made a good bargain." "The definition of insanity is doing the same thing over and over and expecting different results." "Well done is better than well said." "Better slip with foot than with tongue." "Hide not your talents, they for use were made. What's a sundial in the shade?" Who hath deceived thee so often as thyself? "The heart of the fool is in his mouth, but the mouth of the wise man is in his heart." "The Constitution only gives people the right to pursue happiness. You have to catch it yourself." "Remember, that time is money." "At twenty years of age, the ill reigns; at thirty, the wit; and at forty, the judgement." "Does thou love life? Then do not squander time, for that's the stuff life is made of." "Only a virtuous people are capable of freedom. As nations become more corrupt and vicious, they have more need of masters." "Whatever is begun in anger ends in shame." "I haven't failed, I've found 10,000 ways that don't work." "Energy and persistence conquer all thing. " "Genius without education is like silver in the mine. " "I think vital religion has always suffered when orthodoxy is more regarded than virtue. The scriptures assure me that at the last day we shall not be examined on what we thought but what we did." "I wish it (Christianity) were more productive of good works ... I mean real good works ... not holy-day keeping, sermon-hearing ... or making long prayers, filled with flatteries and compliments despised by wise men, and much less capable of pleasing the Deity." "If you would persuade, you must appeal to interest rather than intellect." "They that will not be counseled, cannot be helped. If you do not hear reason she will rap you on the knuckles." "He that blows the coals in quarrels that he has nothing to do with, has no right to complain if the sparks fly in his face." "Any fool can criticize, condemn and complain and most fools do." "To be thrown upon one's own resources, is to be cast into the very lap of fortune; for our faculties then undergo a development and display an energy of which they were previously unsusceptible." "Hide not your talents. They for use were made. What's a sundial in the shade." "Sloth makes all things difficult, but industry, all things easy. He that rises late must trot all day, and shall scarce overtake his business at night, while laziness travels so slowly that poverty soon overtakes him." "Having been poor is no shame, but being ashamed of it, is." Another wise leader observed the following in the sermo cotidianus: "Vocatus atque non vocatus, Deus aderit", but a few year later another great military leader made a similar comment, "...ego vero, et domus mea colemus Jehovam", and while I agree with both, the later is something I have adopted as my motto. -jma At 05:12 PM 2/7/2005, Tim Johnson wrote: >James, > >It's your group and you can post whatever you want, but why not start >another Yahoo group for the religious articles. This wasn't the forum >for it. > >Tim Johnson >Born a Baptist, raised a Protestant, married to a Catholic and my >religious beliefs are my own ands personal. I would hope that you >would keep your beliefs to yourself. > >Hopefully, I won't get bounced for my comment and view. > >Tim Johnson ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 11002 From: Tim Johnson Date: Mon Feb 7, 2005 7:51pm Subject: Re: TRADEMARKS OF A FOOL Now, quotes i can handle. I have a software program of nothing but quotes, as well as Bartlett's book of quotes and etc. I find them educational, informative and fun to drop into responses. Breaks the monotony and confuses the reader as to whether i actually know what I'm talking about. I particularly like the one by Scatman Cruthers; Don't look back; something may be gaining on you. Tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 11003 From: James M. Atkinson Date: Mon Feb 7, 2005 8:13pm Subject: and a light unto my feet The following product line has been brought up a number of times in the past, and I think that it is time to talk about it again. One of the simplest, and most overlooked tools or instruments in a TSCM'er set of equipment is the humble flashlight, or as out British brethren like to called them "Torches". The flashlight will turn up more bugs and/or eavesdropping devices than any other piece of equipment, and is the tool used to confirm the findings of a one of the fancy pieces of laboratory grade test equipment. The powerful, white light Xenon lights works really well, but the batteries tend not to last, they do not suffer abuse well and really run hot which makes then unpleasant to use in tight places. A tungsten bulb flashlight is pretty much out of the question as the red cast obscures details, and saturates the eye (white or green light is better). An LED type of flashlight works amazingly well, but lack the wide spectral response of a Xenon bulb flashlight. On the other hand an LED flashlight will run for extended periods on batteries, the lamps are quite small, they take a lot of abuse before breaking, and you can get them in a wide variety of colors (more on this later). A company called Emissive Energy makes a product line called "Inova" which is a good series of flashlights, and they have a website at: http://www.inovalight.com/ The X0 is a large unit suitable to general purpose illumination as it is about as close to a "white" light as you can get in an LED flashlight. It take CR123 lithium batteries and is small enough so that you can fit several in your pants pocket. The beam is highly focused and concentrated with a nice crisp penumbra. The X1 is much smaller, and runs on only a single AA alkaline battery. One of the great benefits of the X1 is the significantly smaller size which when used with a dental or small inspection mirror let's you get into some really tight spots. The X5 is an interesting product that is similar to the first two models, but it has five LED's in an array and while the white light version less desirable than the X0 or X1 it comes into its own with the UV model that really does a great job. The X1's are available in various colors including White, Blue, Green, and UV and you can buy several in each color for only a few dollars each. The Green unit will give you the greatest resolution and detail but a lot of people find it awkward at first to "see green" until they realize the little things they had previously missed. It is the same situation for using the X5's in UV where you will be amazed by what had previously been invisible to you. I recommend that you buy at least 2 or 3 ea of the X0's in White, 2 ea X5's in UV, 2 ea X1's in each of the following colors available. They can all be obtained via multiple vendors on E-Bay for very little money (in TSCM terms). I would caution you that the UV LED's will seriously harm you unless you take certain safety measures is they as very bright. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 11004 From: secretsquirrel_2 Date: Mon Feb 7, 2005 6:51pm Subject: Re: IRISYS Thermal Imager Hi JMA, I'd be interested in seeing any images you may have of the below concept in motion. Theoretically it makes sense, however, would the images produced genuinely be of use for TSCM operations? Also, have you an exact model of the SONY you have done this to, or would any CDD low lux camera do the job? If it really does work, then there are thousands of dollars to save! Thank you! SS --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > Tim, > > You might also want to pickup a Sony Nightshot/0 lux camcorder. > > No, really... I am serious. > > The Nightshot series of camcorders can be modified to force the unit into > full time IR mode, and with removal of the hot filter that is in front of > the CCD element you can have a fairly decent performance thermal or at > least near thermal imaging system. It may not be a quarter of a degree of > resolution, but it does provide something usable. > > Yes, it is primary designed to be an infrared camera, but the hot filter is > actually a thermal low pass filter that when removed can be used for a > wicked cheap thermal camera as you get to open up the CCD element to higher > frequency light. You can also enhance the effect by illuminating the area > that you are inspecting with a I/R spotlight with a 900 nm high pass > filter. A small board camera hidden in a ceiling tile, or a pinhole > microphone concealed in a wall will be quite obvious with this kind of > system, and the results will be in a monochrome and not fancy color, but on > the plus side you can put together a system for less than a few hundred bucks. > > Also, when using a thermal camera use a ***BIG*** display and not the > cheesy little 2 or 3 inch micro-monitors they typically include. Set up > something that is at least a 10 inch display or larger and don't be bashful > about using a 15-17 inch LCD panel or video projector. You can even run the > monitor in black-and-white mode and add in a small video amplifier to tweak > up the contrast so that you can better see the slight anomalies. > > Don't expect to use a thermal system from more than 6-8 feet away from the > thing that you are inspecting, and try to be within four feet or less. You > will find it easier to find nasty goodies if you can rapidly drop the room > temperature while you keep the wall or ceiling you are inspecting warmer. > > The ideal thermal system to use is one that is used to observe biological > functions and not one used for mechanical systems and those used by > electricians to examine transformers, motors, and breaker panels. Our > primary interest is typically between 60 or 70 and 90 or 110 degree's F, > and we typically would like to be able to detect a difference of a tenth of > a degree or better. We want a system that can see the heat difference > caused by a breath being exhaled, and then watch the eddies and currents > are the heat curls though the air. > > The industrial units are fine if you are looking for a bug hidden in a > molten pool of steel at the bottom of a blast furnace, or if you are trying > to measure a the heat produced by a light bulb. > > -jma > > > > > > At 05:21 PM 2/7/2005, Tim Johnson wrote: > > >Thanks for the info. > > > >I bought it just to play around with and to see what its capabilities > >are. It was interesting to see someone place their palm on a table > >for 2 seconds and to then have the image displayed (we didn't try for > >time, just for the image, so I have no idea how long it would have > >been visible. > > > >Once (IF) I get it to interface with the Dell PC (without a serial > >port) I'll do some testing and let the folks on TSCM-L know what the > >results are. > > > >Tim > >-- > > > >Tim Johnson > > > >Technical Security Consultants Inc. > >PO Box 1295 > >Carrollton, GA 30112 > >770-836-4898 > >770-712-2164 Cell > > > -------------------------------------------------------------------- -------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > -------------------------------------------------------------------- -------------------------------- > James M. Atkinson Phone: (978) 546- 3803 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------- -------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------- -------------------------------- 11005 From: Charles Patterson Date: Tue Feb 8, 2005 0:00am Subject: Re: Re: Anyone know this new Yahoo-group (Email-tracer) That's a Ralph Thomas group. He's got a gizillion PI news groups and other pi related web sites. Easy for him to get 592 members in one day. Charles ----- Original Message ----- From: "contranl" To: Sent: Monday, February 07, 2005 3:28 PM Subject: [TSCM-L] Re: Anyone know this new Yahoo-group (Email-tracer) > > . > > Funny they exist only one day...and already have 592 members...i am > shure that is not possible. > (unless they use some tricks as Jim mentioned before) > > So probably these are they good guys to talk to since they > are "cheating" even before they've started :) > > > Tetrascanner > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > VAH! DENUONE LATINE LOQUEBAR? > ME INEPTUM. INTERDUM MODO ELABITUR. > =================================================== TSKS > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > > -------------------------------------------------------------------------------- > Yahoo! Groups Links > > a.. To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > b.. To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 11006 From: Intercept Investigations Date: Mon Feb 7, 2005 11:23pm Subject: Re: Anyone know this new Yahoo-group (Email-tracer) From past experience with this so called 'professional organization', I'd have to say that since it's operated by 'NAIS', then it's only purpose is to bombard you with their advertising in an effort to sell you something - usually books and/or training certificates (read a book, get a 'certificate of completion'), etc. -- Steven W. Gudin, Director Intercept Investigations 700 NW Gilman Blvd. # 463 Issaquah (Seattle), WA 98027 Tel: (425) 313-1776 Fax: (425) 313-1875 Web: www.InterceptInvestigations.com Email: mail@I... Nevada License # 847 California License # (pending) Washington License # 602225499 NATIONWIDE & INTERNATIONAL INVESTIGATION SERVICES 11007 From: A Grudko Date: Tue Feb 8, 2005 1:14am Subject: RE: TRADEMARKS OF A FOOL -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] > The Book of Proverbs deals with many different topics that relate to every day life. Author? Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" ---------- Internal Virus Database is out-of-date. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.4 - Release Date: 2005/02/01 [Non-text portions of this message have been removed] 11008 From: Date: Tue Feb 8, 2005 5:13am Subject: Re: IRISYS Thermal Imager Tim and all, I have been using the IRISYS since around Oct of last year and it was the one we looked at at the conference in November. It is again like the Oscar and Spectrum analyzer's, good old mark one eyeball, a tool for the professional. I was disapointed with the capabilities of the IRISYS for possible use as a TSCM tool. But it is useful in determining hot spots for electrical wiring or circuit breakers which I think it was originally designed for. After seeing other units such as FLIR, Raython units and the palm IR, the IRISYS falls short of those capabilities. We did some tests witht the unit at the november conference and it jsut did not measure up to the quality of the other units but again its specs also tell you that. I was not up to IR requirments and took the chance and purchased the unit. I am now utilizing it with an master electrician for other uses such as determinging possible problems with older panels and alike, it does wellin some of those cases. I feel if they (IRISYS) would do a bit more such as making the lens capable of adjustment and get the sensitivity to an appreciable leverl for us to use it as a tool for TSCM it will be a good product but I am sure the cost would go up to. Bill Rhoads 11009 From: joe joe Date: Tue Feb 8, 2005 6:42am Subject: Re: Re: IRISYS Thermal Imager what james stated about the mod to the sony will work but it will almost be like using the irisys, it really falls short of a thermo for tscm use, unless the eavesdropper wants to use a car battery with a transmitter hidden somewhere then yes it will probably find it --- secretsquirrel_2 wrote: > > > Hi JMA, > > I'd be interested in seeing any images you may have > of the below > concept in motion. Theoretically it makes sense, > however, would the > images produced genuinely be of use for TSCM > operations? > > Also, have you an exact model of the SONY you have > done this to, or > would any CDD low lux camera do the job? > > If it really does work, then there are thousands of > dollars to save! > > Thank you! > > SS > > > --- In TSCM-L@yahoogroups.com, "James M. Atkinson" > wrote: > > Tim, > > > > You might also want to pickup a Sony Nightshot/0 > lux camcorder. > > > > No, really... I am serious. > > > > The Nightshot series of camcorders can be modified > to force the > unit into > > full time IR mode, and with removal of the hot > filter that is in > front of > > the CCD element you can have a fairly decent > performance thermal or > at > > least near thermal imaging system. It may not be a > quarter of a > degree of > > resolution, but it does provide something usable. > > > > Yes, it is primary designed to be an infrared > camera, but the hot > filter is > > actually a thermal low pass filter that when > removed can be used > for a > > wicked cheap thermal camera as you get to open up > the CCD element > to higher > > frequency light. You can also enhance the effect > by illuminating > the area > > that you are inspecting with a I/R spotlight with > a 900 nm high > pass > > filter. A small board camera hidden in a ceiling > tile, or a pinhole > > microphone concealed in a wall will be quite > obvious with this kind > of > > system, and the results will be in a monochrome > and not fancy > color, but on > > the plus side you can put together a system for > less than a few > hundred bucks. > > > > Also, when using a thermal camera use a ***BIG*** > display and not > the > > cheesy little 2 or 3 inch micro-monitors they > typically include. > Set up > > something that is at least a 10 inch display or > larger and don't be > bashful > > about using a 15-17 inch LCD panel or video > projector. You can even > run the > > monitor in black-and-white mode and add in a small > video amplifier > to tweak > > up the contrast so that you can better see the > slight anomalies. > > > > Don't expect to use a thermal system from more > than 6-8 feet away > from the > > thing that you are inspecting, and try to be > within four feet or > less. You > > will find it easier to find nasty goodies if you > can rapidly drop > the room > > temperature while you keep the wall or ceiling you > are inspecting > warmer. > > > > The ideal thermal system to use is one that is > used to observe > biological > > functions and not one used for mechanical systems > and those used by > > electricians to examine transformers, motors, and > breaker panels. > Our > > primary interest is typically between 60 or 70 and > 90 or 110 > degree's F, > > and we typically would like to be able to detect a > difference of a > tenth of > > a degree or better. We want a system that can see > the heat > difference > > caused by a breath being exhaled, and then watch > the eddies and > currents > > are the heat curls though the air. > > > > The industrial units are fine if you are looking > for a bug hidden > in a > > molten pool of steel at the bottom of a blast > furnace, or if you > are trying > > to measure a the heat produced by a light bulb. > > > > -jma > > > > > > > > > > > > At 05:21 PM 2/7/2005, Tim Johnson wrote: > > > > >Thanks for the info. > > > > > >I bought it just to play around with and to see > what its > capabilities > > >are. It was interesting to see someone place > their palm on a table > > >for 2 seconds and to then have the image > displayed (we didn't try > for > > >time, just for the image, so I have no idea how > long it would have > > >been visible. > > > > > >Once (IF) I get it to interface with the Dell PC > (without a serial > > >port) I'll do some testing and let the folks on > TSCM-L know what > the > > >results are. > > > > > >Tim > > >-- > > > > > >Tim Johnson > > > > > >Technical Security Consultants Inc. > > >PO Box 1295 > > >Carrollton, GA 30112 > > >770-836-4898 > > >770-712-2164 Cell > > > > > > > -------------------------------------------------------------------- > -------------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, > and Real > Wiretappers. > > > -------------------------------------------------------------------- > -------------------------------- > > James M. Atkinson > Phone: (978) 546- > 3803 > > Granite Island Group Fax: > > > 127 Eastern Avenue #291 > Web: > http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > > > -------------------------------------------------------------------- > -------------------------------- > > World Class, Professional, Ethical, and > Competent Bug Sweeps, and > > Wiretap Detection using Sophisticated Laboratory > Grade Test > === message truncated === __________________________________ Do you Yahoo!? Yahoo! Mail - now with 250MB free storage. Learn more. http://info.mail.yahoo.com/mail_250 11010 From: G P Date: Tue Feb 8, 2005 7:02am Subject: RE: TRADEMARKS OF A FOOL Solomon, Son of David? --- A Grudko wrote: > -----Original Message----- > From: James M. Atkinson [mailto:jmatk@tscm.com] > >> The Book of Proverbs deals with many different >> topics that relate to every day life. > > Author? > > Andy Grudko (British), DPM, Grad IS (South Africa) 11011 From: jtowler Date: Tue Feb 8, 2005 6:22am Subject: RE: and a light unto my feet James, An interesting post, but can you write a little more on the subject please: Q: What might you see using UV, in a TSCM context, that you might not otherwise? Q: Same question, but for green, which you say offers finer detail? Q: More details please on the "take certain safety measures" re the bright UV leds? Etc, and so on, for any additional comments you might wish to add re using light, and different colours (Sorry: colors :-). Regards, Jim Towler -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Tuesday, 8 February 2005 3:14 p.m. To: TSCM-L Subject: [TSCM-L] and a light unto my feet The following product line has been brought up a number of times in the past, and I think that it is time to talk about it again. One of the simplest, and most overlooked tools or instruments in a TSCM'er set of equipment is the humble flashlight, or as out British brethren like to called them "Torches". The flashlight will turn up more bugs and/or eavesdropping devices than any other piece of equipment, and is the tool used to confirm the findings of a one of the fancy pieces of laboratory grade test equipment. The powerful, white light Xenon lights works really well, but the batteries tend not to last, they do not suffer abuse well and really run hot which makes then unpleasant to use in tight places. A tungsten bulb flashlight is pretty much out of the question as the red cast obscures details, and saturates the eye (white or green light is better). An LED type of flashlight works amazingly well, but lack the wide spectral response of a Xenon bulb flashlight. On the other hand an LED flashlight will run for extended periods on batteries, the lamps are quite small, they take a lot of abuse before breaking, and you can get them in a wide variety of colors (more on this later). A company called Emissive Energy makes a product line called "Inova" which is a good series of flashlights, and they have a website at: http://www.inovalight.com/ The X0 is a large unit suitable to general purpose illumination as it is about as close to a "white" light as you can get in an LED flashlight. It take CR123 lithium batteries and is small enough so that you can fit several in your pants pocket. The beam is highly focused and concentrated with a nice crisp penumbra. The X1 is much smaller, and runs on only a single AA alkaline battery. One of the great benefits of the X1 is the significantly smaller size which when used with a dental or small inspection mirror let's you get into some really tight spots. The X5 is an interesting product that is similar to the first two models, but it has five LED's in an array and while the white light version less desirable than the X0 or X1 it comes into its own with the UV model that really does a great job. The X1's are available in various colors including White, Blue, Green, and UV and you can buy several in each color for only a few dollars each. The Green unit will give you the greatest resolution and detail but a lot of people find it awkward at first to "see green" until they realize the little things they had previously missed. It is the same situation for using the X5's in UV where you will be amazed by what had previously been invisible to you. I recommend that you buy at least 2 or 3 ea of the X0's in White, 2 ea X5's in UV, 2 ea X1's in each of the following colors available. They can all be obtained via multiple vendors on E-Bay for very little money (in TSCM terms). I would caution you that the UV LED's will seriously harm you unless you take certain safety measures is they as very bright. -jma ---------------------------------------------------------------------------- ------------------------ We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------ James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------ World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" VAH! DENUONE LATINE LOQUEBAR? ME INEPTUM. INTERDUM MODO ELABITUR. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT _____ Yahoo! Groups Links *To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ *To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com *Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . From: jtowler Date: Tue Feb 8, 2005 7:13am Subject: RE: TRADEMARKS OF A FOOL Comment below ... -----Original Message----- From: A Grudko [mailto:agrudko@i...] Sent: Tuesday, 8 February 2005 8:14 p.m. To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] TRADEMARKS OF A FOOL -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] > The Book of Proverbs deals with many different topics that relate to every day life. Author? Assuming a genuine question, the book of Proverbs is one of the books in the Old Testament of the Bible. In its own words, from the first line, it is the "... Proverbs of Solomon, the son of David, King of Israel". Authors: "Solomon is generally credited with writing a large number of the Proverbs. It is probable that even these were not all original with him. Chapters 30 and 31 are the words of Agur and Lemuel." - Notes on the book of Proverbs, The Thompson Chain-Reference Bible (TCR). (c) NIV, 1983. Solomon lived approx 1015 to 975 BC according to notes in the Thompson Chain-Reference, who seems to be quoting "Ussher" for some of the older dates. His dad, David, lived 1055 to 1015 BC per the same source. An alternative source I have, gives dates for David as c. (circa/about) 1000-960 BC and Solomon as c. 970-930 BC. Is is considered that Solomon turned from his wisdom in his later years. His son Rehoboam, even more so, and ... became a foolish and evil ruler. - TCR. However, there is much wisdom contained in the writings and can even be "fun" to read parts of it. Example: "Gold there is, and rubies in abundance, but lips that speak knowledge are a rare jewel." Consider that when you read things on the internet or in your emails, or maybe the replies to this post if people don't opt to ignore or accept this answer in the good faith it is offered with. Regards, Jim Towler Wellington New Zealand. [Non-text portions of this message have been removed] 11013 From: Nalesnik, Matthew Date: Tue Feb 8, 2005 7:42am Subject: RE: TRADEMARKS OF A FOOL I second that. Would love another posting such as that, James. Thanks. -----Original Message----- From: Guy Urbina [mailto:urbina1@l...] Sent: Monday, February 07, 2005 5:21 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] TRADEMARKS OF A FOOL James, I for one enjoyed the article and found it enlightening and full of common sense. It has applications for the people I work with and for people on this list. \R -Guy ____________________________________________________________ Guy Urbina Defense Sciences Engineering Division Electronics Engineering Lawrence Livermore National Laboratory 7000 East Avenue, Mail Stop L-369 Livermore, CA 94551 USA Voice - (925) 422-6460 Fax - (925) 422-2118 email - urbina1@l... _____________________________________________________________ At 05:12 PM 2/7/2005 -0500, you wrote: >James, > >It's your group and you can post whatever you want, but why not start >another Yahoo group for the religious articles. This wasn't the forum >for it. > >Tim Johnson >Born a Baptist, raised a Protestant, married to a Catholic and my >religious beliefs are my own ands personal. I would hope that you >would keep your beliefs to yourself. > >Hopefully, I won't get bounced for my comment and view. > >Tim Johnson >-- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" VAH! DENUONE LATINE LOQUEBAR? ME INEPTUM. INTERDUM MODO ELABITUR. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 11014 From: Nalesnik, Matthew Date: Tue Feb 8, 2005 7:47am Subject: RE: Another question on Thermal Imagers How about Tim Johnson and Joe Joe take their little fight offline/private? It's been quite a number of postings since anyone else jumped in to agree with either of them, therefore, that makes it a private discussion, and one that I'm sure the majority of people don't want to be involved in. I think they're going to have to coin a new term, "email-rage". -----Original Message----- From: Tim Johnson [mailto:dbugman@d...] Sent: Monday, February 07, 2005 8:04 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Another question on Thermal Imagers Joe Joe, He asked three specific questions. 1. Do you have personal knowledge of the equipment? 2. How good is the picture? 3. Is it sufficient for TSCM work and able to focus in close range or is it only satisfactory for surveillance and outdoor applications? If I was familiar with that Imager, I would have answered the questions he posed. At any rate, i passed on your comment for him to look at. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" VAH! DENUONE LATINE LOQUEBAR? ME INEPTUM. INTERDUM MODO ELABITUR. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 11015 From: SEAN WALSH Date: Tue Feb 8, 2005 10:36am Subject: Re: Re: Anyone know this new Yahoo-group (Email-tracer) Charles, essentially it is a marketing pitch for his sales organization. He is one of the best marketers in the PI industry.... Sean J. Walsh, C.P.I., C.C.V. Walsh & Associates (415)899-9660, Fax (415)898-5500 www.tscm.net PI 18345 11016 From: SEAN WALSH Date: Tue Feb 8, 2005 10:49am Subject: Re: IRISYS Thermal Imager We have been using Thermal cameras on sweeps for awhile now. The Palm IR unit is convenient and passable. We also have an older Hughes/FLIR system that is for medical use. It is bulky and uses Argon gas canisters for cooling. Resolution is incredible and it has it's own CPU/controller and high resolution CRT monitor. The unit is excellent for larger sweeps, but takes time to set-up and another period of time to allow the Argon gas to cool the chip until stabilized. There is an engineer retired from Hughes in Southern CA who still repairs them and has parts as well. Argon gas (medical grade for less H20 content) is required and is stored at 6000 psi. These units pop up on the web occasionally but are probably overkill. Sean J. Walsh, C.P.I., C.C.V. Walsh & Associates (415)899-9660, Fax (415) 480-3198 www.tscm.net PI 18345 11017 From: joe joe Date: Tue Feb 8, 2005 11:05am Subject: RE: Another question on Thermal Imagers lol..actually i am not fighting..believe that :) --- "Nalesnik, Matthew" wrote: > > How about Tim Johnson and Joe Joe take their little > fight offline/private? It's been quite a number of > postings since anyone else jumped in to agree with > either of them, therefore, that makes it a private > discussion, and one that I'm sure the majority of > people don't want to be involved in. > I think they're going to have to coin a new term, > "email-rage". > > -----Original Message----- > From: Tim Johnson [mailto:dbugman@d...] > Sent: Monday, February 07, 2005 8:04 PM > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] Another question on Thermal > Imagers > > Joe Joe, > > He asked three specific questions. > > 1. Do you have personal knowledge of the equipment? > > 2. How good is the picture? > > 3. Is it sufficient for TSCM work and able to focus > in close range or > is it only satisfactory for surveillance and outdoor > applications? > > If I was familiar with that Imager, I would have > answered the > questions he posed. > > At any rate, i passed on your comment for him to > look at. > > tim > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > Member INTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > [Non-text portions of this message have been > removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > VAH! DENUONE LATINE LOQUEBAR? > ME INEPTUM. INTERDUM MODO ELABITUR. > =================================================== > TSKS > > > > > > Yahoo! Groups Sponsor > > > ADVERTISEMENT > > > > > > > > > > > _____ > > Yahoo! Groups Links > * To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > * To unsubscribe from this group, send an > email to: > TSCM-L-unsubscribe@yahoogroups.com > > > > * Your use of Yahoo! Groups is subject to > the Yahoo! Terms of Service > . > > > [Non-text portions of this message have been > removed] > > > > > __________________________________ Do you Yahoo!? The all-new My Yahoo! - Get yours free! http://my.yahoo.com 11018 From: joe joe Date: Tue Feb 8, 2005 11:09am Subject: Re: IRISYS Thermal Imager an you post his contact info please? thanks --- SEAN WALSH wrote: > > We have been using Thermal cameras on sweeps for > awhile now. The Palm IR > unit is convenient and passable. We also have an > older Hughes/FLIR system > that is for medical use. It is bulky and uses Argon > gas canisters for > cooling. Resolution is incredible and it has it's > own CPU/controller and > high resolution CRT monitor. The unit is excellent > for larger sweeps, but > takes time to set-up and another period of time to > allow the Argon gas to > cool the chip until stabilized. There is an > engineer retired from Hughes in > Southern CA who still repairs them and has parts as > well. Argon gas > (medical grade for less H20 content) is required and > is stored at 6000 psi. > These units pop up on the web occasionally but are > probably overkill. > > Sean J. Walsh, C.P.I., C.C.V. > Walsh & Associates > (415)899-9660, Fax (415) 480-3198 > www.tscm.net > PI 18345 > > > > > __________________________________ Do you Yahoo!? Take Yahoo! Mail with you! Get it on your mobile phone. http://mobile.yahoo.com/maildemo 11019 From: Scott Malcolm Date: Tue Feb 8, 2005 1:02pm Subject: Re: TRADEMARKS OF A FOOL Tim, When it comes to religious beliefs try to remember, "You don't have to be the birthday boy to come to the party" Regards, Scott Malcolm Malcolm & Associates, Inc. Serving the State of Wisconsin http://www.malcolm-associates.com Office 262 965 4426 Fax 262 965 4629 _________________________________________________ : Message: 11 : Date: Mon, 7 Feb 2005 17:12:44 -0500 : From: Tim Johnson : Subject: Re: TRADEMARKS OF A FOOL : : James, : : It's your group and you can post whatever you want, but why not start : another Yahoo group for the religious articles. This wasn't the forum : for it. : : Tim Johnson : Born a Baptist, raised a Protestant, married to a Catholic and my : religious beliefs are my own ands personal. I would hope that you : would keep your beliefs to yourself. : : Hopefully, I won't get bounced for my comment and view. : : Tim Johnson 11020 From: fromagebubble Date: Tue Feb 8, 2005 1:13pm Subject: Re: Stolen Equipment Alert --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > A large quantity of TSCM equipment was stolen from someone a short time Sounds like an inside job, or a person that knows this someone and took their gear? It's not likely the common street hood would know about or appreciate these things. > please let me know privately and I will ensure the appropriate authorities > are notified, and that you are put in touch with the victim so you can > return their property. Are you handling the case? I recently contacted a guy in Washington (State) about a "WiNRADiO" product I am interested in for sweeping RF in our data center. He is selling model WR-3500 for $500, it has a list of $2500 I think. It seems like an outlandish deal! Thanks, Mel 11021 From: Tim Johnson Date: Tue Feb 8, 2005 4:03pm Subject: An apology to the TSCM-L group members I apologize to the list for my recent interaction with Joe Joe. I probably shouldn't have wasted my time or yours in trying to explain something that should have been evident either time. But, I took the extra time because (and I may be wrong) it came across that his native language isn't English and i was concerned he didn't understand what I was trying to say. I haven't been a member of this group long enough to be able to recognize the TSCM professionals and the others who are there to try to pick up information and learn more about the profession. Regardless of whether he is a native English speaker or from another country, I will restrain myself in the future and let him read into a post whatever he wants. I, personally, feel that it is a disservice to anyone who posts a comment or question to ignore them. I have always gone out of my way to educate and/or enlighten those seeking information or posting what is probably erroneous information. But in this instance, based on the comment of other list members, I'll make an exception. For what it is worth, I believe Joe Joe contacted me several weeks or so ago via e-mail (his e-mail address looks familiar and information he posted to this group sounds like something I provided him in confidence) asking where he could get TSCM training and (I think) gathering information on becoming a PI. I think I answered his questions then, but haven't heard anything back. My only desire is to contribute to a list on which there are TSCM specialists and learn what I can, when I can. If anyone has a problem, comment or complaints, feel free to contact me direct.. Tim Johnson -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. 11022 From: joe joe Date: Tue Feb 8, 2005 4:21pm Subject: Re: An apology to the TSCM-L group members ok tim,lol :) --- Tim Johnson wrote: > I apologize to the list for my recent interaction > with Joe Joe. I > probably shouldn't have wasted my time or yours in > trying to explain > something that should have been evident either time. > But, I took the > extra time because (and I may be wrong) it came > across that his > native language isn't English and i was concerned he > didn't > understand what I was trying to say. I haven't been > a member of this > group long enough to be able to recognize the TSCM > professionals and > the others who are there to try to pick up > information and learn more > about the profession. > > Regardless of whether he is a native English speaker > or from another > country, I will restrain myself in the future and > let him read into a > post whatever he wants. I, personally, feel that it > is a disservice > to anyone who posts a comment or question to ignore > them. I have > always gone out of my way to educate and/or > enlighten those seeking > information or posting what is probably erroneous > information. But in > this instance, based on the comment of other list > members, I'll make > an exception. > > For what it is worth, I believe Joe Joe contacted me > several weeks or > so ago via e-mail (his e-mail address looks familiar > and information > he posted to this group sounds like something I > provided him in > confidence) asking where he could get TSCM training > and (I think) > gathering information on becoming a PI. I think I > answered his > questions then, but haven't heard anything back. > > My only desire is to contribute to a list on which > there are TSCM > specialists and learn what I can, when I can. If > anyone has a > problem, comment or complaints, feel free to contact > me direct.. > > Tim Johnson > > > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > Member INTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > __________________________________ Do you Yahoo!? Read only the mail you want - Yahoo! Mail SpamGuard. http://promotions.yahoo.com/new_mail 11023 From: moellerthy <1ach@g...> Date: Tue Feb 8, 2005 4:47pm Subject: Re: Stolen Equipment Alert --- In TSCM-L@yahoogroups.com, "fromagebubble" wrote: > > > --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > > > A large quantity of TSCM equipment was stolen from someone a short > time > > Sounds like an inside job, or a person that knows this someone and > took their gear? It's not likely the common street hood would know > about or appreciate these things. > I think you are wrong at least in Ohio the druggies are knowledgable of TSCM procedures and many own sweep detection equipment to protect themselfs from body worn mic's. Know your enemy Andre Holmes 1ach@G... > > > please let me know privately and I will ensure the appropriate > authorities > > are notified, and that you are put in touch with the victim so you > can > > return their property. > > Are you handling the case? > > I recently contacted a guy in Washington (State) about a "WiNRADiO" > product I am interested in for sweeping RF in our data center. He is > selling model WR-3500 for $500, it has a list of $2500 I think. It > seems like an outlandish deal! > > Thanks, Mel 11024 From: Hawkspirit Date: Tue Feb 8, 2005 6:15pm Subject: Oscor Yes it was an analog spectrum analyzer. I use an analog analyzer because there is no sampling rate that can interfere with reading pulsed signal sources. I will use a digital analyzer as well for precision measurements. Roger I take it that you used a Spectrum Analyser on your original sweep when you detected the Burst device Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (HYPERLINK "http://www.demtec.co.uk/"http://www.demtec.co.uk/) -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.5 - Release Date: 2/3/2005 -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.6 - Release Date: 2/7/2005 [Non-text portions of this message have been removed] 11025 From: Hawkspirit Date: Tue Feb 8, 2005 6:15pm Subject: Oscor What would your excuse be to the client if you did not identify one that was present at the tested location? They are out there, I have seen them. Roger. Date: Sat, 5 Feb 2005 22:56:40 +1100 From: Michael Dever Subject: Re: Oscor Speaking of 'burst bugs' - what level of threat do you believe they belong at? That is; professional/amateur, etc. Regards Mike -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.5 - Release Date: 2/3/2005 -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.6 - Release Date: 2/7/2005 [Non-text portions of this message have been removed] 11026 From: Hawkspirit Date: Tue Feb 8, 2005 6:16pm Subject: Lie detector Police in Radnor, PA interrogated a suspect by placing a metal colander on his head and connecting it with wires to a photocopy machine. The message, "He's lying" was placed in the copier and police pressed the copy button each time they thought the suspect wasn't telling the truth. Believing the "lie detector" was working, the suspect confessed. -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.5 - Release Date: 2/3/2005 -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.6 - Release Date: 2/7/2005 [Non-text portions of this message have been removed] 11027 From: Tim Johnson Date: Tue Feb 8, 2005 6:23pm Subject: Re: Oscor Roger, I thought I was the only dinosaur that appreciated the analog displays when doing TSCM. Glad to see at leas one other one out there. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 11028 From: Michael Dever Date: Tue Feb 8, 2005 7:35pm Subject: Re: Oscor Roger With respect (please don't get offended), I think you missed the point of my question. I know they exist and we do have protocols for finding them. What I was interested in was: what are the capabilities of potential adversaries who might use a burst bug. This will assist greatly in conducting a threat assessment. I don't know about elsewhere, but here in Australia you won't find burst bugs being sold over the counter, so where do they come from? Yes I know the magic Internet. But seriously, what level of technical expertise do you think is required to design and construct a burst bug? Amateur, amateur radio operator, electronics engineer?? Regards Mike On 09 Feb 2005, at 11:15, Hawkspirit wrote: > What would your excuse be to the client if you did not identify one > that was > present at the tested location? > > They are out there, I have seen them. > > Roger. > Date: Sat, 5 Feb 2005 22:56:40 +1100 > > From: Michael Dever > > Subject: Re: Oscor > Speaking of 'burst bugs' - what level of threat do you believe they > > belong at? > That is; professional/amateur, etc. > Regards > > Mike > Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 11029 From: Hawkspirit Date: Tue Feb 8, 2005 7:55pm Subject: Sweep needed Residential sweep needed in South St. Paul Minnesota. Roger Tolces HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com 760-861-7595 -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.6 - Release Date: 2/7/2005 [Non-text portions of this message have been removed] 11030 From: James M. Atkinson Date: Tue Feb 8, 2005 7:48pm Subject: Terk HDTVi Antenna Here is an antenna that you may want to pick up to evaluate for a very inexpensive, but effective antenna for use during sweeps. http://www.terk.com/HDTVi.html It is a 75 ohm passive antenna, but the UHF log periodic element can be unplugged and used by itself and can be directly plugged into a low noise amplifier by using a long F style connector or even a short cable. I am not impressed with the stand or the VHF section of the antenna, but for 20-30 bucks I was very impressed with the UHF element. Buy the antenna, keep the top log periodic element and throw the rest away. An inexpensive 30-40 dB amplifier will make a big difference when looking for UHF wireless microphones and bugs, and you should be able to connect the output of the amplifier to the 50 ohm input of your spectrum analyzer but you will have to make a modest adjustment to your amplitude measurements if your SA only has a 50 ohm input. The antenna is spec'd from 470 to 894 MHz, but givent he geometry you should be able to use it from 350 to 950 MHz with no problem. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 11031 From: Charles Patterson Date: Tue Feb 8, 2005 9:48pm Subject: Re: Lie detector Cute story Roger, but perhaps not new, may date back to the 60's. see: http://www.snopes.com/legal/colander.htm Perhaps we can use the same technique to help sweep those who are hearing the voices? Carry a small printer and laptop, print out a file that says "Clean". :) Charles ----- Original Message ----- From: "Hawkspirit" To: Sent: Tuesday, February 08, 2005 7:16 PM Subject: [TSCM-L] Lie detector > > > > > Police in Radnor, PA interrogated a suspect by placing a metal colander on > his head and connecting it with wires to a photocopy machine. The > message, > "He's lying" was placed in the copier and police pressed the copy button > each time they thought the suspect wasn't telling the truth. Believing > the > "lie detector" was working, the suspect confessed. > > > > > > > -- > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.8.5 - Release Date: 2/3/2005 > > > > -- > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.8.6 - Release Date: 2/7/2005 > > > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > VAH! DENUONE LATINE LOQUEBAR? > ME INEPTUM. INTERDUM MODO ELABITUR. > =================================================== TSKS > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > > -------------------------------------------------------------------------------- > Yahoo! Groups Links > > a.. To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > b.. To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 11032 From: James M. Atkinson Date: Wed Feb 9, 2005 1:54am Subject: Further Wisdom of the Ages Next time someone implies that something that is part of your future vision is impossible, improbable or even impractical, remember this list. (And perhaps quote them a favorite selection!) Enjoy the "wisdom of the ages". ************************************************* "Computers in the future may weigh no more than 15 tons." --"Popular Mechanics," forecasting the relentless march of science, 1949. ---------------------------------------------------- "I think there is a world market for maybe five computers." --Thomas Watson, chairman of IBM, 1943. ---------------------------------------------------- "I have traveled the length and breadth of this country... and talked with the best people, and I can assure you that data processing is a fad that won't last out the year." --The editor in charge of business books for Prentice Hall, 1957. ------------------------------------------------------ "But what...is it good for ?" -- Engineer at the Advanced Computing Systems Division of IBM commenting on the microchip, 1968. ------------------------------------------------------ "There is no reason anyone would want a computer in their home." --Ken Olson, president, chairman and founder of Digital Equipment Corp., 1977 --------------------------------------------------- "This 'telephone' has too many shortcomings to be seriously considered as a means of communication. The device is inherently of no value to us." -- Western Union internal memo, 1876. ----------------------------------------------------- "The wireless music box has no imaginable commercial value. Who would pay for a message sent to nobody in particular ?" -- David Sarnoff's associates (NBC) in response to his urgings for investment in the radio in the 1920s. --------------------------------------------------- "The concept is interesting and well-formed, but in order to earn better than a 'C,' the idea must be feasible." -- A Yale University management professor in response to Fred Smith's paper proposing reliable overnight delivery service. (Smith went on to found Federal Express Corp.) ----------------------------------------------------- "Who the hell wants to hear actors talk ?" -- Harry M. Warner, Warner Brothers, 1927. ------------------------------------------------------- "I'm just glad it'll be Clark Gable who's falling on his face and not Gary Cooper." --Gary Cooper on his decision not to take the leading role in "Gone with the Wind." ------------------------------------------------------- "A cookie store is a bad idea. Besides, the market research reports say America likes crispy cookies, not soft and chewy cookies like you make." -- Response to Debbi Fields' idea of starting her company, Mrs. Fields' Cookies. ---------------------------------------------------- "We don't like their sound, and guitar music is on the way out." -- Decca Recording Co. rejecting the Beatles, 1962. ------------------------------------------------------ "Heavier-than-air flying machines are impossible." --Lord Kelvin, president, Royal Society, 1895. ----------------------------------------------------- "If I had thought about it, I wouldn't have done the experiment. The literature was full of examples that said you can't do this." -- Spencer Silver, on the work that led to nthe unique adhesives on 3-M "Post-It" Notepads. --------------------------------------------------------- "So we went to Atari and said, 'Hey, we've got this amazing thing, even built with some of your parts, and what do you think about funding us ? Or we'll give it to you. We just want to do it. Pay our salary, we'll come work for you.' And they said, 'No.' So then we went to Hewlett- Packard, and they said, 'Hey, we don't need you; you haven't got through college yet.'" --Apple Computer Inc. founder Steve Jobs on attempts to get Atari and H-P interested in his and Steve Wozniak's personal computer. ------------------------------------------------------- "Professor Goddard does not know the relation between action and reaction... and the need to have something better than a vacuum against which to react. He seems to lack the basic knowledge ladled out daily in high schools." -- New York Times editorial about Robert Goddard's revolutionary rocket work, 1921. ------------------------------------------------------ "You want to have consistent and uniform muscle development across all of your muscles ? It can't be done. It's just a fact of life. You just have to accept inconsistent muscle development as an unalterable condition of weight training." -- Response to Arthur Jones, who solved the "unsolvable" problem by inventing Nautilus. ------------------------------------------------------- "Drill for oil ? You mean drill into the ground to try and find oil ? You're crazy." -- Drillers who Edwin L. Drake tried to enlist to his project to drill for oil in 1859. ------------------------------------------------------ "Stocks have reached what looks like a permanently high plateau." -- Irving Fisher, Professor of Economics, Yale University, 1929. --------------------------------------------------------- "Airplanes are interesting toys but of no military value." -- Marechal Ferdinand Foch, Professor of Strategy, Ecole Superieure de Guerre. -------------------------------------------------------- "Everything that can be invented has been invented." -- Charles H. Duell, Commissioner, U.S. Office of Patents, 1899. ------------------------------------------------------ "Louis Pasteur's theory of germs is ridiculous fiction." --Pierre Pachet, Professor of Physiology at Toulouse, 1872. --------------------------------------------------------- "The abdomen, the chest and the brain will forever be shut from the intrusion of the wise and humane surgeon." --Sir John Eric Ericksen, British surgeon, appointed Surgeon-Extraordinary to Queen Victoria, 1873. --------------------------------------------------------- "640k ought to be enough for anybody." -- Bill Gates, 1981 --------------------------------------------------------- ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 11033 From: Tim Johnson Date: Wed Feb 9, 2005 8:28am Subject: More iPod uses I just posted the following to my personal e-mail list and thought it might be of interest to the TSCM-L group. Tim ================ I have over 11 gig of information from my laptop I back up to my 40 gig iPod weekly thru a 2.0 USB cable available form Apple for $19.95. It is the cheapest source of a large file back up I found. I take my iPod as I travel for speeches that use power point presentations and etc. Most all speech places now have a laptop and projector..This also keeps your information safer than loading it to the local available laptop. No need to carry a laptop thru the airport anymore!. ================= For those wondering what other nefarious uses an iPod could be used for, I suggest attending CanSecWest, they are going to have a briefing on hacking with iPods and other Firewire utilities. Firewire/i.Link is well known as a way for connecting video devices or external hard-disks to computers. One little known fact is that the Firewire protocol also allows to read and write physical memory on connected machines without further software support. This can be leveraged to escalate privileges or to spy on connected machines. We will present some fun software using FireWire to do things to computers which shouldn't happen. 0wn3d by an iPod: http://www.cansecwest.com/speakers.html -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 11034 From: John Young Date: Wed Feb 9, 2005 11:36am Subject: Olney Jim, I'm not sure of the Olney facility location. Could you look at this sat photo on Terraserver to see if this is the facility? http://www.terraserver-usa.com/image.aspx?T=1&S=11&Z=18&X=794&Y=10851&W=3&q s=%7claytonsville%7cmd%7c Somebody wrote the facility is on Riggs Rd, which the photo shows as adjoining this place. If this is the right location I've got a couple of more recent sat photos from Globe Explorer. Thanks very much, John 11035 From: Dragos Ruiu Date: Wed Feb 9, 2005 7:19pm Subject: Re: More iPod uses On February 9, 2005 06:28 am, Tim Johnson wrote: > For those wondering what other nefarious uses an iPod could be used for, I > suggest attending CanSecWest, they are going to have a briefing on hacking > with iPods and other Firewire utilities. > > Firewire/i.Link is well known as a way for connecting video devices or > external hard-disks to computers. One little known fact is that the > Firewire protocol also allows to read and write physical memory on > connected machines without further software support. This can be leveraged > to escalate privileges or to spy on connected machines. We will present > some fun software using FireWire to do things to computers which shouldn't > happen. > > 0wn3d by an iPod: > http://www.cansecwest.com/speakers >.html The same class of vulnerability applies in many areas... and has some suprising applications, both beneficial and malicious. There are actually two presentations in that area this year... those are among the ones that have already been announced. (some announcements still remain) cheers, --dr -- World Security Pros. Cutting Edge Training, Tools, and Techniques Vancouver, CanadaMay 4-6 2005 http://cansecwest.com pgpkey http://dragos.com/ kyxpgp 11036 From: David C Williams Date: Wed Feb 9, 2005 0:57pm Subject: Need Forensic Alarm expert for a commercial theft- California I am posting this request for another pi so please email him only (not me) so I can forward the responses on to him. Greg Barker at gbarker@l... with a telephone number of (800)371-3171 looking for a forensic alarm specialist. One of their clients clients who is located in Northern California had a commercial theft over the weekend. Apparently the alarm was breached. They need someone to examine the alarm equipment and make a feasibility study of what happened. There client is requesting the alarm specialist. Please contact Greg Barker only(and not me) at either his email of office phone. Thanks. David C. Williams DCW & Associates 7400 Center Avenue, Suite 209 Huntington Beach, CA 92647 (714)892-0442 Fax (714)892-3543 CA PI License # PI 12300 Website: www.dcwpi.com Email: dwilliams@d... Driver Record/Vehicle Registration/Automated Name Index Information for California Serving Southern California's Investigative, Process Service and Computer Security Needs [Non-text portions of this message have been removed] 11037 From: James M. Atkinson Date: Wed Feb 9, 2005 11:01pm Subject: Ad Majorem Dei Gloriam I would like to give away more free copies of the movie "The Passion of the Christ" to those members of theTSCM-L list who would like a copy, AND who will promise to watch it. No sales gimmicks, no games, no kidding, no fooling, no tie ins, no strings, no payday, no gratuity, no favors, no preaching, nadda. All I ask is that you watch the movie, nothing more. Please email me your address privately if you would like a free copy, but I have to ask that you only request one copy, and that the address to which it ships be limited to either the U.S. or Canada (the DVD will not play outside of those regions). This is my gift to members of the list, and I expect nothing in return. Ad Majorem Dei Gloriam -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 11038 From: Mitch D Date: Wed Feb 9, 2005 11:37pm Subject: Re: Anyone know this new Yahoo-group (Email-tracer) another waste of bandwith from the pi spyshop --- contranl wrote > Just got note of this new Yahoo group called Email-tracer > > http://groups.yahoo.com/group/emailtracer/ > > This is is what it's about: > > "This group is being set up for professional private > investigators > who trace Emails for clients or want to learn how to do it. I > know > you will like this resource" ===== Mitch Davis TSCM/Special Operations Group Inc. Nashville,TN.USA MitchD@t... site:www.tscmusa.com. Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 __________________________________ Do you Yahoo!? Yahoo! Mail - Easier than ever with enhanced search. Learn more. http://info.mail.yahoo.com/mail_250 11039 From: Mark W. Kiefner Date: Thu Feb 10, 2005 9:42am Subject: RE: Ad Majorem Dei Gloriam Thanks, kiefnem@c... -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Thursday, February 10, 2005 12:01 AM To: TSCM-L Subject: [TSCM-L] Ad Majorem Dei Gloriam I would like to give away more free copies of the movie "The Passion of the Christ" to those members of theTSCM-L list who would like a copy, AND who will promise to watch it. No sales gimmicks, no games, no kidding, no fooling, no tie ins, no strings, no payday, no gratuity, no favors, no preaching, nadda. All I ask is that you watch the movie, nothing more. Please email me your address privately if you would like a free copy, but I have to ask that you only request one copy, and that the address to which it ships be limited to either the U.S. or Canada (the DVD will not play outside of those regions). This is my gift to members of the list, and I expect nothing in return. Ad Majorem Dei Gloriam -jma ---------------------------------------------------------------------------- ------------------------ We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------ James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------ World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" VAH! DENUONE LATINE LOQUEBAR? ME INEPTUM. INTERDUM MODO ELABITUR. =================================================== TSKS Yahoo! Groups Links 11040 From: Thomas Kellar Date: Thu Feb 10, 2005 11:38am Subject: Re: Ad Majorem Dei Gloriam Sorry, that is anti-semitic crap. Goodbye. On Thu, 10 Feb 2005, James M. Atkinson wrote: > I would like to give away more free copies of the movie "The Passion of the > Christ" to those members of theTSCM-L list who would like a copy, AND who > will promise to watch it. > > No sales gimmicks, no games, no kidding, no fooling, no tie ins, no > strings, no payday, no gratuity, no favors, no preaching, nadda. All I ask > is that you watch the movie, nothing more. > > Please email me your address privately if you would like a free copy, but I > have to ask that you only request one copy, and that the address to which > it ships be limited to either the U.S. or Canada (the DVD will not play > outside of those regions). > > This is my gift to members of the list, and I expect nothing in return. > > Ad Majorem Dei Gloriam > > -jma > > > > > ---------------------------------------------------------------------------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > VAH! DENUONE LATINE LOQUEBAR? > ME INEPTUM. INTERDUM MODO ELABITUR. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > From: Steve Uhrig Date: Sun Feb 10, 2002 10:22pm Subject: AID Bird Dog manual needed Hello all, I thought I'd take a chance here. Would anyone have a copy of the operating manual for the AID Model 300 Bird Dog vehicle tracking system? This is one of the original ones from about 20 years ago. Any info would be appreciated and will be compensated. I need actual printed documentation, please, not speculation or reminiscing. The main thing I need is the part number for the red bulbs on the DF control head which indicate left or right. And any details on what appears to be a complicated pulse train coming out of the motion sensing transmitter. Thanks ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4774 From: Steve Uhrig Date: Sun Feb 10, 2002 10:45pm Subject: TDRs for sale Hello all, If you are serious about sweeping phone lines and do not have a TDR, you need one. Don't fool yourself. I've got several available, all Riser Bond, most current production, all working perfectly with new or very recent batteries, chargers, manuals, carrinyg cases etc. Info on using them as well as specific product info can be found on Riser Bond's excellent website http://www.riserbond.com. Available are quite a number of each of the following models: 2401B+ (little ping box with digital readout; possibly one of the most common TDRs used in TSCM. Must be used with an external oscilloscope with at least 100 Megacycle frequency response. Nicad powered. 1205C -- has large LCD display built in, auto setting, very simple front panel, variable pulse widths, variable velocity factor, variable impedance. Backlit screen. Battery gauge. Automatically calculates and displays fault on the screen as well as distance to the fault and dB loss through the fault. Very nice unit, one of the Cadillacs of TDRs. Digital storage of traces can be downloaded to a computer or printer later. Very easy to use. Connect the line to test, turn it on, and it does it all automatically. Has automatic noise filters which switch in automatically to give you the cleanest trace. Waterproof Pelican case. 1205CX - fancier model than 1205C, not many major differences. 1205CXA -- now uses nickel metal battery instead of lead acid like in the 1205 and 1205C and 1205CX series, for lighter weight, longer life per charge. Has sub nanosecond pulse for finding intermittents or very quick happenings on digital lines. The absolute Cadillac of TDRs. Current model; see Riser Bond's website for details. 1300 -- Latest design, smaller, more compact, probably not quite as rugged packaging but made for someone who uses the thing extensively and wants an executive quality instrument to carry around. Designed especially for twisted pair, and can read through loading coils and a lot of other garbage. Seems to be the same specs and menu as 1205CXA, just in different packaging. See website. Contact me if you have an interest in picking up a top quality TDR that will last the rest of your career. Now is the best time since I have more in house now than I have had in years. Call me with your needs or to discuss where you are, and I will recommend the best one for your level of experience, your budget and your personal capabilities. A TDR is easy to use, can read rat piss on the lines, and separates the men from the boys. You'll need one eventually. Here's your chance to save a lot of money and probably buy a better unit than you will be able to afford in the future. Practice some with these things, get confident in it, and you will be a major reckoning force in the industry. Few professional sweepers have TDRs as nice as are described on this page. Most also come with leads, all come with manuals and chargers. All come with a padded carrying case OR a Pelican waterproof case (depending on model). I can take credit cards and ship overnight if necessary. Call if interested in breaking through the equipment barrier from novice to journeyman. Are you going to play games all your life on telephone lines where the majority of the threats target, or are you going to equip yourself and learn to use the same silver bullet professionals use but like to keep quiet? Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4775 From: Steve Uhrig Date: Sun Feb 10, 2002 10:56pm Subject: RF TSCM gear available - REI Hello again people, I have several pieces of REI gear available if anyone is interested. First is a CPM-700 with audio leakage probe and ballistic nylon carrying case. Used once. Perfect condition. $2200. Not a bad little receiver, especially for the price. See: http://www.research-electronics.com/cgi- bin/main.cgi?action=viewprod&ct=products&num=CPM-700 for specs. Also have a special OSCOR 5000, which has a number of REI factory installed enhancements to improve performance. These enhancements are not included in production units and you cannot request them installed in yours. Unit is fully configured with latest firmware, maximum memory, recent battery, all manuals, perfect condition, used several times but handled gently and packed as new. Will include all paperwork, correspondence, etc,, whatever is in the file on this particular unit. This OSCOR is equipped with the Deluxe Package Upgrade as well as the 10.7 I.F. out. And don't overlook the other mods which are not in any other unit as far as I know. Comes with a case of chart paper, too. I have had this OSCOR since it was new, do not use it and would like to pass it along to someone who could make use of it. Remember, this unit has every option except the optional computer software. It has the optional I.F. out, dual color video monitors, max memory, latest firmware, etc. Looks unused. The major value in this piece is its impressive appearance. See: http://www.research-electronics.com/cgi- bin/main.cgi?action=viewprod&ct=products&pct=OSCOR&num=OSC-5000 for specs and pictures. I *strongly* recommend factory training to get the maximum performance out of this unit. If you can't afford or justify a few days in Tennessee for training on this unit, you can't afford it. Repeat -- do NOT consider buying this unit unless you will receive professional training or you consider yourself astute enough not to need it. I went to the factory for training, if that tells you anything. Price is in the $12,000 region. The special enhancements make this a better deal than a new unit, whatever they cost nowadays. Can take credit cards. Contact me if interested. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4776 From: Matthew Paulsen Date: Sun Feb 10, 2002 11:39pm Subject: RE: Anti-keylogger Cryptome posted an anti-keylogger report. Summary - snakeoil - see below. http://cryptome.org/anti-keylogger.htm 8 February 2002 ---------------------------------------------------------------------------- ---- Cryptome purchased a copy of Anti-Keylogger yesterday (thanks to AG), installed it on a couple of machines and ran the program. It runs on Windows 9X, not W2K or NT. One machine, a laptop running ME, was reported clean: System scanning is started ------------------------------------------------------------ [2/8/2002 5:38:15 PM] Running keystroke monitoring programs are not found on your system. A desktop running Windows 98 got this report: System scanning is started ------------------------------------------------------------ [2/8/2002 5:37:13 PM] The following LOG-files are detected: - c:\windows\cookies\index.dat - c:\windows\network~2\blackice\log0007.enc - c:\windows\history\history.ie5\index.dat - c:\windows\tempor~1\content.ie5\index.dat LOG-files selected for detection: - c:\windows\cookies\index.dat - c:\windows\network~2\blackice\log0007.enc - c:\windows\history\history.ie5\index.dat - c:\windows\tempor~1\content.ie5\index.dat None of these appear to be keylogging files, though they show logs of machine monitoring by BlackIce, a firewall program, and IE.5, Internet Explorer. The laptop had neither BlackIce or IE installed. Nothing in Anti-Keylogger documentation describes how to tell the difference between its suggestion of keylogging detection and simply examining overt system and usage monitoring logs. Nor any justification for the use of the term "anti-keylogging" as anything more than a sly bait and switch marketing gimmick. The program is capable of pointing to easily spotted logging files, and might point to concealed logs if there were any, but more likely it is up to the user to figure out what to do about any concealed keyloggings, including those neatly concealed by "anti-keylogging" programs. Certainly IE's obnoxious log of surfing should be dumped, perhaps IE too, and beyond that Microsoft itself. See Microsft's Hidden Files: http://www.astalavista.com/library/os/win95-98/mshidden.txt Cryptome's evaluation: Anti-Keylogger is rancid snakeoil. The cost of this futile anti-FBI investigation was $59.95. Futile for us, but Anti-Keylogger may now be monitoring our machines and forwarding data to its deeper customers. We're in Anti-Keylogger's database for selling to the FBI, though the FBI is could be running Anti-Keylogger as a honeypot sting. It smells like Elcomsoft, famous supplier to the USG of encryption cracking (and worse) programs. If Anti-Keylogger wants to correct this thumbs-down, refund $59.95, plus $1 million for our needy honeypot, and prove it can out the FBI's Scarfo DIRT. ---------------------------------------------------------------------------- ---- From Anti-Keylogger's parent company Raytown's website: "In God we trust. All others we monitor." NSA motto Do you need to track employees and monitor workstations at all times? Do you need to know what your child is doing on the computer? Do you want to see how others are using your PC while you are away? Do you want to find out if your wife/husband is having an online affair? Our general-purpose monitoring software for Windows 95/98/ME/NT/2000 is your solution. Because it records every keystroke on your computers invisibly and stores the keystrokes in a file that ONLY YOU can see. ONLY YOU will know exactly what was going on. Monitoring software track and report all activity on your PC (including DOS sessions). ________________________ Raytown Corporation was founded in 1999. The main specialization is developing monitoring and anti-monitoring software. We are independent security software developers corporation with more than 10 years of experience. We are proud of our achievements and excellent customer support. Today our products and custom solutions may be found in more then 70 countries all over the world including a large number of Fortune 500 companies, law enforcement, government and military agencies. Our international team consists of people from USA, Israel, Ukraine, Russia and other countries. Our high-tech computer security technologies are utilized by both individuals and organizations worldwide. Our software is a nice example of our ability to combine software development skills with a deep understanding of the security solutions needing to all contemporary organizations all around the world. We provide all our customers with the highest quality service. All activities are handled discreetly, with strict confidentiality. Please let us know what services might be of interest to you or your Company. If you need any further information regarding our activities please do not hesitate to contact us. ---------------------------------------------------------------------------- ---- -----Original Message----- From: MACCFound@a... [mailto:MACCFound@a...] Sent: Thursday, February 07, 2002 11:17 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Anti-keylogger In a message dated 2/7/02 11:02:26 AM Pacific Standard Time, agrudko@i... writes: << I'm more than dubious of any device that claims to be able to detect "UNKNOWN" threats. >> we have unknown threats on this list Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4777 From: Matthew Paulsen Date: Sun Feb 10, 2002 11:45pm Subject: more from cryptome. Perhaps of more interest to the group: 10 February 2002 View Submitted Comments For Member vote ETSI Document Number: ETSI ES 201 671 V2.1.1 (2001-07) http://cryptome.org/espy/ES201-671-Cmem-vote.htm (70K) 10 February 2002 Telekom Austriaës Position to the final draft ETSI ES 201 671 v2.1.1(2001-07) Telecommunications security; Lawful interception (LI); Handover interface for the lawful interception of telecommunications traffic http://cryptome.org/espy/ES201-671-Tele-AT.doc (52K) 10 February 2002 ETSI TS 101 331 V1.1.1 (2001-08) Technical Specification Telecommunications security; Lawful Interception (LI); Requirements of Law Enforcement Agencies http://cryptome.org/espy/TS101-331-v111-Req-LEAs.pdf (127K) 4778 From: Prokop Communications Date: Sun Feb 10, 2002 7:01pm Subject: Night Vision Equipment Night Vision Equipment Company (NVEC) manufactured a scope-Model NVEC 500 sometime back. Does anyone recall the pricing on this item, i.e. retail, wholesale, GSA, etc? Any comments as to present value? Rick Prokop -W9MLW Prokop Communications TSCM-ITC Certified Video Concealments Seattle, Washington (206) 378-5560 Seattle, WA [Non-text portions of this message have been removed] 4779 From: Hawkspirit Date: Mon Feb 11, 2002 6:13pm Subject: Hearing Voices? Over the past few months I have seen list members forward inquiries from some desperate individuals who claim that because of microwave radiation they hear voices and other auditory phenomena. Most comments from the list members are that these people need psychiatric help and most are skeptical of their claims. It is apparent that the U.S. patent office is not quite as skeptical as our members. Have a look at: United States Patent 4,858,612 Stocklin August 22, 1989 Hearing device Abstract A method and apparatus for simulation of hearing in mammals by introduction of a plurality of microwaves into the region of the auditory cortex is shown and described. A microphone is used to transform sound signals into electrical signals which are in turn analyzed and processed to provide controls for generating a plurality of microwave signals at different frequencies. The multi frequency microwaves are then applied to the brain in the region of the auditory cortex. By this method sounds are perceived by the mammal which are representative of the original sound received by the microphone. Roger Tolces www.bugsweeps.com 4780 From: Steve Uhrig Date: Mon Feb 11, 2002 10:16pm Subject: Re: Night Vision Equipment Once upon a midnight dreary, Prokop Communications pondered, weak and weary: > Night Vision Equipment Company (NVEC) manufactured a scope-Model NVEC 500 > sometime back. Does anyone recall the pricing on this item, i.e. retail, > wholesale, GSA, etc? Any comments as to present value? http://www.nvec-night-vision.com/ Contact them yourself. They have a long standing reputation for integrity, quality and customer service. Remember an eternity has passed in night vision in the last several years. Stuff police departments would fight over 10 or 15 years ago now is surplus and sold by the pound by the same agencies. Sounds like an earlier 2nd gen commercial handheld scope. If so, current value is probably less than the freight it cost to ship the product. There are some white papers on our website Articles section about selecting, operating, maintaining and using night vision, Keep in mind the articles are dated, and we no longer can endorse in good conscience some of the companies mentioned in those articles. Go to our website Articles section, read the several articles on night vision there, and you will know more about night vision than most of the places selling it or in the cases of spy shops, claiming to 'manufacture' it. The Russian garbage killed the U.S. law enforcement night vision market. The U.S. market was close to saturated anyway. Litton and ITT are the two primary U.,S. military suppliers now, and those two companies represent 95% plus of the domestic market share for military acquisitions of night vision equipment. My personal preference is to ITT, but Litton is OK also. I would avoid ALL Russian products, no name U.S. basement assemblies from surplus components, B.E. Meyers/Dark Invader series toys and anything other than Litton or ITT products purchased from an official distributor. 3rd gen is the choice if you are able to specify. Don't overlook 35mm film camera and video camera interfaces which are discussed in the white papers on our website. And, of course, no spy shops for night vision. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4781 From: Matthew Paulsen Date: Mon Feb 11, 2002 10:49pm Subject: RE: Re: Night Vision Equipment Not an endorsement, just a website that carrys ITT and Litton scopes. Easy navigation, specs and simple instructions. http://www.morovision.com/ -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Monday, February 11, 2002 8:16 PM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Re: Night Vision Equipment Once upon a midnight dreary, Prokop Communications pondered, weak and weary: > Night Vision Equipment Company (NVEC) manufactured a scope-Model NVEC 500 > sometime back. Does anyone recall the pricing on this item, i.e. retail, > wholesale, GSA, etc? Any comments as to present value? http://www.nvec-night-vision.com/ Contact them yourself. They have a long standing reputation for integrity, quality and customer service. Remember an eternity has passed in night vision in the last several years. Stuff police departments would fight over 10 or 15 years ago now is surplus and sold by the pound by the same agencies. Sounds like an earlier 2nd gen commercial handheld scope. If so, current value is probably less than the freight it cost to ship the product. There are some white papers on our website Articles section about selecting, operating, maintaining and using night vision, Keep in mind the articles are dated, and we no longer can endorse in good conscience some of the companies mentioned in those articles. Go to our website Articles section, read the several articles on night vision there, and you will know more about night vision than most of the places selling it or in the cases of spy shops, claiming to 'manufacture' it. The Russian garbage killed the U.S. law enforcement night vision market. The U.S. market was close to saturated anyway. Litton and ITT are the two primary U.,S. military suppliers now, and those two companies represent 95% plus of the domestic market share for military acquisitions of night vision equipment. My personal preference is to ITT, but Litton is OK also. I would avoid ALL Russian products, no name U.S. basement assemblies from surplus components, B.E. Meyers/Dark Invader series toys and anything other than Litton or ITT products purchased from an official distributor. 3rd gen is the choice if you are able to specify. Don't overlook 35mm film camera and video camera interfaces which are discussed in the white papers on our website. And, of course, no spy shops for night vision. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4782 From: sdonnell Date: Tue Feb 12, 2002 1:00am Subject: Caller ID repeater(?) Hi, Perhaps one of the telecom experts can answer this one: I have a friend that operates a small business, which requires him to spend much of his time out of the office. In order to stay in touch, he currently uses a device which will answer is office phone, and after several unanswered rings, the call is forwarded to his cellphone number via a different line. One serious limitation to this is that none of the forwarded calls contain the Caller ID from whoever has called into his office number. Is there some type device that can also forward the CID of the original call when it is forwarded to the cellphone(or other number)?? I wouldnt normally think it would be posible to regenerate a CID, but I recall some mention here a month or so back of how it was posible for a phreaker to send a "fake" CID down most lines. If that is the case, then I would think there might be some way to regenerate/repeat a legit CID. The local carrier here is Verizon. thanks Steve 4783 From: mwel10 Date: Tue Feb 12, 2002 8:09am Subject: Hidden area on harddisks Dear All, Although a bit off-topic, I found this link on the forensics@s... mailinglist. If someone would like to know more about forensic IT research they can contact me off-list. BXDR A DOS based application that simply lists the Geometry of any attached hard disk drives using standard BIOS calls, Extended BIOS calls and Direct Disk access (ATA) calls. One of the more interesting features of BXDR and Direct Access calls is that it is possible to set the maximum addressable sector to an arbitary value. Future reads of the disk will then report the maximum sector to be the new value. This command can be (and via BXDR is) non- volatile - i.e. the limit will remain until reset with a subsequent command. From a forensic viewpoint this command can defeat most modern imaging systems. To test it I performed the following test. I took an 80GB hard disk drive and using BXDR set the max addressable sector to 999999 (1,000,000 sectors) approx 5GB. (BXDR 128 /s999999) Removed the hard disk drive and placed it into a second machine Attempted to image with SafeBack (using BIOS, XBIOS and Direct Access) and with Encase (DOS and FastBloc). Both SafeBack and Encase reported the drive as a 5GB device. I then ran BXDR to reset the max addressible sector to the maximum native addressable sector (BXDR 128 /r) SafeBack and Encase could subsequently see the full drive. http://www.sandersonforensics.co.uk/html/bxdr.html Yours sincerely, Matthijs van der Wel Project Manager Fox-IT Forensic IT Experts B.V. Oude Delft 47 2611 BC Delft The Netherlands ________________________________________________________ http://www.fox-it.com/engels/index.shtml ________________________________________________________ Phonenumber (general): +31 - 15 - 21 91 111 Phonenumber (direct): +31 - 15 - 21 91 124 Faxnumber: +31 - 15 - 21 91 100 ________________________________________________________ E-Mail Disclaimer This email may contain confidential information. If this message is not addressed to you, you may not retain or use the information in it for any purpose. If you have received it in error, please notify the sender and delete this message. We try to screen out viruses but take no responsibility if this email contains a virus. 4784 From: Date: Tue Feb 12, 2002 0:00pm Subject: Re: Hearing Voices? 30 Psycho-Acoustic Projector, Patent 3,566,347, US Patent Office, 23 February 1971 31 32 31 Method and System for Altering Consciousness, Patent 5,289,438, U.S. Patent Office 22 February 1994 33 Method and System for Altering Consciousness, Patent 5,123,899, dated 23 June 1992 35 Silent Subliminal Presentation, Patent 5,159,703, U.S. Patent Office, 27 October 1992 google +EEG +entrainment google +EEG +ELF google +HAARP google +Schumann +resonance google +PANDORA google +'Synthesised Brainwave' google +'directed energy' Quoting Hawkspirit : > Over the past few months I have seen list members forward inquiries from > some desperate individuals who claim that because of microwave radiation > they hear voices and other auditory phenomena. Most comments from the list > > members are that these people need psychiatric help and most are skeptical > of their claims. It is apparent that the U.S. patent office is not quite as > > skeptical as our members. Have a look at: > > United States Patent 4,858,612 > Stocklin August 22, 1989 > > Hearing device > > Abstract > A method and apparatus for simulation of hearing in mammals by introduction > > of a plurality of microwaves into the region of the auditory cortex is > shown and described. A microphone is used to transform sound signals into > electrical signals which are in turn analyzed and processed to provide > controls for generating a plurality of microwave signals at different > frequencies. The multi frequency microwaves are then applied to the brain > in the region of the auditory cortex. By this method sounds are perceived > by the mammal which are representative of the original sound received by > the microphone. > > Roger Tolces > www.bugsweeps.com > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > ------------------------------------------------- This message may contain confidential and/or privileged information belonging to Cadre Engineering, LLC. It is intended solely for the addressee and access to the e-mail by anyone else is unauthorized. If you are not the intended recipient, you are hereby notified that any unauthorized disclosure, copying, distribution and/or any action, which relies on the contents of this message, is strictly prohibited. Any comments or opinions expressed are those of the originator, and not of Cadre Engineering, LLC. If you have received this message in error, please notify the sender by return e-mail and delete it from your system. If you require any assistance, please contact postmaster@c.... 4785 From: James M. Atkinson Date: Tue Feb 12, 2002 10:09pm Subject: Spy watchdog to probe Tampa phone taps http://www.thewest.com.au/20020212/news/latest/tw-news-latest-home-sto44099.html Spy watchdog to probe Tampa phone taps CANBERRA THE nation's intelligence agency watchdog is set to investigate claims that defence electronic eavesdroppers listened in on satellite phone conversations during the Tampa crisis. In a departure from the traditional no comment on intelligence matters policy, the Government today denied any wrongdoing. Defence Minister Robert Hill said the director of the Defence Signals Directorate confirmed it had not targeted communications of the Maritime Union of Australia (MUA) or the International Transportation Federation. "More specifically the director has advised that DSD did not provide any reporting to the Government on communications from the MUA or ITF," he said. It was reported today that DSD monitored satellite phone conversations from the Tampa following its rescue of 438 boat people near Christmas Island last August. It cited a senior Government source who claimed transcripts of MUA and ITF conversations were used to help formulate a political response to the crisis. Senator Hill said he had asked the Inspector General of Intelligence and Security Bill Blick to review his records from this period to provide further public reassurance. But he did not deny DSD had a role in the Tampa crisis. "The capacity to intercept and report on communications exists to protect national interests," he said. "The protection of Australia's borders is obviously a matter of national importance." Australian Council for Civil Liberties president Terry O'Gorman lodged a formal complaint with Mr Blick urging him to examine whether DSD really did spy on Australians during the Tampa crisis. The Democrats and Labor have both proposed inquiries into the allegations. -AAP -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4786 From: William Knowles Date: Tue Feb 12, 2002 11:15pm Subject: FC: BARTEC, eavesdropping, and "open source" wiretap software ---------- Forwarded message ---------- Date: Tue, 12 Feb 2002 22:49:01 -0500 From: Declan McCullagh To: politech@c... Subject: FC: BARTEC, eavesdropping, and "open source" wiretap software BARTEC is an interesting company. It describes itself as being the best choice for police "telephone surveillance equipment." BARTEC's product line is extensive, featuring "the intelligent choice for all your telephone surveillance investigations - pen register, audio wiretap or PCS/cellular." (http://www.bartec.com/products.html) BARTEC products include: * DLP-14/400 WIRELESS INTELLIGENT TRANSMITTER, described as a "PCS/cellular intercept device designed for use by both law enforcement and wireless companies for telephone surveillance investigations." (http://www.bartec.com/content/wit.html) * D A R E / DIGITAL AUDIO RECORDING ENVIRONMENT, described as a tool for "streamlining and simplifying wiretap operations. This is accomplished by taking advantage of the latest in digital audio recording technology which automatically places both voice and data together on CD-ROM." (http://www.bartec.com/content/whatshotDARE.html) * C O P S / CALEA OPERATIONS, the recommended way for BARTEC customers to perform surveillance under the controversial Communications Assistance for Law Enforcement Act (CALEA), aka Digital Telephony law. To summarize: COPS essentially links the telephone company with police. COPS includes a dedicated PC, an 8-port Cisco router / modem pool, and a 100 base T Hub. The protocol used to share info is called J-025. (http://www.bartec.com/content/whatshotCOPS.html) J-025 is more properly called J-STD-025, and was jointly developed by the Telecommunications Industry Association and the Alliance for Telecommunications Industry Solutions. It came out in December 1997 and soon became the focus of litigation, with privacy groups and some industry groups saying it went beyond what Congress intended. The DC Circuit agreed in part (http://www.epic.org/calea/dc_cir_decision.html). For more background, consider a report by a Telecommunications Industry Association working group dated May 2000 that arose after a meeting at the Excalibur hotel in Las Vegas. The document is here: http://www.tiaonline.org/standards/CALEA_JEM/CJEM503-105.pdf What's interesting is that the report, authored by Mark A. Montz, a product architect at Compaq, talks up the benefits of open source softwware as a way to keep the Feds honest -- in much the same way that some of us have recommended the release of Carnivore's source code. Excerpt: >The connection point may also allow access to data packets not >authorized for surveillance to be collected as well as the ones >covered by a subpoena. Also, while the PC/hard disk system above >substitutes for a tape recorder, there is nothing currently equivalent >to a "pen trace device". Indeed, one of the major concerns with the >industry suggestion of delivering all the information to law >enforcement agencies was that the agencies could not be trusted to >discard data they were not authorized to receive. A novel solution to >this problem may be possible by the success of a new concept: Open >Source... A neutral organization such as UL Labs or some other agency >would be responsible for downloading the software into the computer, >and the delivering it to the law enforcement agency... Politech archive on CALEA: http://www.politechbot.com/cgi-bin/politech.cgi?name=calea -Declan --- http://www.bartec.com/content/whatshotCOPS.html C O P S "CALEA OPERATIONS" ______________________________________________________________________ BARTEC's simple, affordable, intelligent solution for CALEA intercepts! Click here for COPS diagram Click here for a diagram of a typical COPS configuration. What Is COPS? CALEA Operations (COPS) is BARTEC's solution for the Communications Assistance for Law Enforcement Act (CALEA) which will begin implementation on June 1, 2000. COPS serves as the primary interface for delivery of J-025 standard messages from the Telecommunications Service Provider (TSP) to the law enforcement agency (LEA), as defined in CALEA legislation. A COPS workstation consists of: BARTEC COPS Software PC (configured for COPS specs) 8 Port Cisco Router / Modem Pool 100 base T Hub How Does COPS Work? A COPS workstation supports three critical tasks in the CALEA pen register intercept environment, as follows: 1. CALEA "D" and "E" Interface CALEA legislation defines "D" and "E" interfaces for telephone surveillance. The "D" interface is located in the TSP switch or regional facility. The "E" interface is located at the LEA. The "D" interface will require a TCP/IP wide area network (WAN) to be established between the TSP and the LEA. The WAN may be on a dial-up or dedicated private lease line (PVC) that is defined by the TSP or LEA. To meet interface requirements, the COPS workstation includes a Cisco router with eight modem ports. Modem ports one to seven are dedicated for "E" interface - one for each TSP. Modem port eight is reserved for communication with existing BARTEC devices for analog pen register intercepts. Remote command and control and automatic downloads for BARTEC's Micro DNR, SSL-12 Smart Slave and DLP-14/400 Wireless Intelligent Transmitter will be accessible via port eight. This feature is not available on any other CALEA intercept system, and will prove important and useful as telephone surveillance makes the transition from analog to digital over the next several years. 2. Data Compilation In a CALEA pen register intercept environment, TSPs will deliver J-025 standard messages, as defined in the CALEA legislation, over a call data channel (CDC). Each of the modem ports on the Cisco router supports CDC delivery of data in a number of formats. Analog data received on port will be in ASCII format. COPS assembles and converts all data in all formats for compatibility with many different analytical software packages. 3. Creation of Files and Distribution of Collected Data Once data is assembled and converted, it is compiled into files. Once files are created at the COPS workstation, data can be distributed for analysis or other CALEA functions. Distribution can take place via the LEA network to a secure server, on a daily or periodic basis. Data may be loaded manually or on demand to the server by the LEA network administrator. Analysis software typically resides on the server. In a CALEA wiretap intercept environment, COPS will test J-025 messages received from the TSP to determine if immediate distribution is required. Messages are routed through the LEA network to the appropriate BARTEC Digital Audio Recording Environment (DARE) workstation. At the DARE workstation, analog voice and data will be assembled by the COPS Micro DNR for real time access by the DNR. Why Buy COPS? COPS offers multiple CALEA intercept capability and supports both pen register and wiretap configurations COPS can interface with BARTEC analog pen registers/remote devices as telephone surveillance transitions to CALEA COPS offers future expansion to accommodate additional CALEA interfaces COPS is affordably priced, allowing even small law enforcement agencies to perform CALEA intercepts ______________________________________________________________________ ------------------------------------------------------------------------- POLITECH -- Declan McCullagh's politics and technology mailing list You may redistribute this message freely if you include this notice. Declan McCullagh's photographs are at http://www.mccullagh.org/ To subscribe to Politech: http://www.politechbot.com/info/subscribe.html This message is archived at http://www.politechbot.com/ ------------------------------------------------------------------------- 4787 From: James M. Atkinson Date: Wed Feb 13, 2002 7:17am Subject: Franklin High students adjusting to surveillance http://www.tennessean.com/local/archives/02/02/13655685.shtml?Element_ID=13655685 Tuesday, 02/12/02 Franklin High students adjusting to surveillance MICHELLE LORD / STAFF http://www.tennessean.com/local/archives/02/02/13657055.jpg Assistant Principal Todd Campbell views footage on the new security camera system at Franklin High School. By KNIGHT STIVENDER Staff Writer FRANKLIN - Say a Franklin High student forgets to put her expensive biology textbook into her backpack and leaves it sitting on top of her locker all day long. In the afternoon, she realizes where she left it, but it's no longer there. Because of a new security camera system at the school, someone in the office can quickly search video footage of that row of lockers to see when and how the book disappeared. ''It's pretty cool,'' said Tim McNeese, information services director for the county school system. Franklin High is the first school in the county to use such technology, which has cost taxpayers roughly $45,000. District officials want to bring the system to other schools as money becomes available. They've asked for $60,000 to wire up Page High next year with even more cameras. While some students initially were wary of cameras rolling in every corner, Franklin parents seem pleased with the experiment. ''I don't think it's meant to be a Big Brother, spy situation. I think they're more to protect the school during the time when the students are not present,'' said PTO President Pat Anderson. A year ago, the school system heard proposals from several security companies seeking to install the camera system. Eventually, school system leaders decided they could get more for their money if they did it themselves. Bob Spong, maintenance director for the school system, estimates that the county saved $15,000 to $20,000 on the Franklin system by using in-house expertise. The result at Franklin High is a remote camera system that allows school administrators to select one of 32 different cameras and search for any activity during any time period. Several cameras keep track of activity outside, all of them programmed to record any motion 24 hours a day. Since the cameras only record when there's motion, the disk space used up by recorded images isn't overwhelming. In the hypothetical biology book situation, the student could tell an assistant principal she left the book on the locker after second period and discovered it missing after fourth. Using his desktop computer, the assistant principal could command the system to replay any movement around that particular area of lockers in the time frame given by the student. It's a system that, earlier this year, came in handy when some money was stolen at a wrestling tournament. The culprits, from outside Williamson County, admitted to the theft once they were told they had been captured on camera. ''We've created a safer learning environment for everyone,'' Spong said. McNeese said it would cost about $14,000 to add 32 more cameras at Franklin High, bringing the total to a number the school system thinks would be ideal. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4788 From: Marty Kaiser Date: Wed Feb 13, 2002 7:47am Subject: Better way to get this to you FBI Vendetta Against Martin L. Kaiser III -------------------------------------------------------------------------------- Initially this page consisted of a compilation of news magazine and newspaper articles. I was under the impression that since I did not write these articles they would withstand the test of time. I was wrong. Not too long ago I received a direct threat from a well known U.S. intelligence agency ordering me to remove their three initials from these articles. Pointing out that asking me to remove their initials was essentially changing history didn't phase them... somewhere in my argument I mentioned Adolph Hitler. In the past I have purposely avoided making any personal observations and/or comments about these events and the stories surrounding them. The time is now right to make those observations and comments. The enormous damage caused to my family and me cannot be forgiven. These events are an insult to all my friends and associates... an insult to the United States of America... and an insult to the world community. Read on... Marty -------------------------------------------------------------------------------- First some comments on format. All my personal observations will be in BLUE while public records and direct quotations will be in BLACK. Names will be mentioned, where harmless, but where mentioning them may cause problems I shall simply put either initials or XX. -------------------------------------------------------------------------------- Deciding where to start was the most difficult part of this story. I decided to start at the beginning. Born in 1935, my family and I lived in the the hard coal region of northeastern Pennsylvania. We were surrounded by families from Czechoslovakia, Poland, Lithuania, Hungary and many other coal miner producing countries. Having the Kaiser name didn't help me much while these countries were being torn to shreds before and during World War II. The hatred expressed towards me by neighborhood children was enormous. As a child I had no idea that their animosity was anything other than the norm. My childhood obviously played a MAJOR role in what I became... there also were some shameful events that hardened me in ways few will understand... so I'll move on. During my pre-teen and early teen years I was fascinated by U control model airplanes and had a large collection of them. As radio controlled airplanes began to appear I found electronics more interesting. Shortly after the end of WW2 I received my amateur radio license W3VCG and still hold those call letters today. I can't say my school years were a shining beacon but at least I got through them. In prep school XX became my co-dependent good buddy. He was born without eyes but in spite of this I was able to get him involved in ham radio too. I took the glass out of the meters of an old rig and XX was able to tune it by the pressure the pointer exerted. He taught me how the loss of one sense is compensated for by the others. We had lots of fun together with this incident being the funniest. I had my Mom's hand-me-down 51 Caddy and would drive it to a long riverside park on the other side of the river from Wilkes-Barre. Then I would allow XX to take the wheel and speed up and down the park usually with his left arm out of the window banging wildly on the side of the car while grinning from ear to ear. In 1957, I was hired as a Research Technician by RCA Laboratories in Princeton, New Jersey. A group of 12 established scientists were my "bosses." Dr. Morton, co-inventor of television as we know it today... Dr. Rudy, inventor of many image conversion devices... one of our image intensifiers took the first pictures of the bottom of the polar ice cap and one took the picture of a single photon (one particle of light)... Dr. Forge, co-inventor of the vidicon and other TV conversion tubes... Dr. Sommers, inventor of the Iconoscope, the image conversion tube that made real time video possible... Dr. Kleitman, inventor of many high efficiency phosphors... Dr. Ching, inventor of many helical microwave amplifier tubes... Dr. Nergard, one of the people instrumental in the development of the Klystron oscillator that made radar possible... Dr. Klensch (Dick), (most of the work I did was for him) did basic engineering on a variety of projects... and many other truly brilliant minds. My job was to be their "hands." I designed and built much of the circuitry that permitted all of these men to continue with serious development. In our group I remember four other technicians, each with their own expertise. We worked well together as a team and although I was always sticking my nose (comments) into many, many projects other than mine it gave me the opportunity to be part of some incredibly interesting projects... the end results of which became technology and products we take for granted today. Obviously, I turned my amateur radio interests towards amateur television. I wrote extensively for technical journals, RCA in-house technical publications and radio amateur magazines and had my own ham TV station on the air. Another amateur television enthusiast, William Haldane (Bill), and I became close friends. He was part of RCA Service Company, a group that put our ideas into the field for further trials. At that time, Dr. Klensch and others, including me, were developing several schemes involving VVLF technology... below 10HZ... we used to call them "cycles" back then. Since we were all pretty much playing it "by ear" we had more fun than anyone should have in one lifetime. Here is a good example. Several hundred yards behind the main building was a small pond. A bridge crossed the pond and in the middle of the bridge was a small house for test equipment. A hydrophone was lowered from the house into the pond. Two hundred yards away a 10 foot long by four inch diameter rod was driven flush with the ground. Next to it lay a small loudspeaker connected to a microphone in the pond house. My job was to drop a 10 pound cannon ball onto the stake when Klensch yelled "go" and he, in turn, would measure the shock wave. So there I was in the middle of a field repeatedly dropping a cannon ball on the ground. Someone inside the main building noticed me and called authorities. Soon an ambulance was fast approaching across the field. My explanation caused all concerned side splitting laughter. After the ambulance left Klensch and I continued with the cannon ball dropping experiment. One day Bill approached me and asked if I'd like to go to Trinidad. Neither he nor I knew where that was but it sounded interesting. When I got home I grabbed the Encyclopedia and found out. After discussing it with with my wife I returned with a firm "YES." A month or two later Bill again approached me and advised that Trinidad would not accept our presence and asked if I would like to go to Antiqua. I didn't know where that was either but again said yes. A month or two later he told me that Antigua wouldn't accept our presence. He mentioned RCA had decided to set up the project on Barbados where there was a small U.S. Navy base and they simply would not tell the Barbadian government about the project. He asked if I would go there and I responded in the affirmative even thought I had no idea what the "Project" was all about. Finally I was given a briefing about a new high frequency (1 to 30 MHz) "Over the Horizon Radar" an RCA technician/ham had conceived. My job was to see if it would work. I later learned that the two islands had turned us down because it was during the Cuban missile crisis and they did not want to antagonize their friend, Cuba. I was transferred to RCA Service Company and sent to Burlington, Massachusetts to check out the hardware. When I got to Burlington, to my astonishment, NOTHING relating to the project was there! Within three months I appropriated or stole (allocated but not yet delivered... midnight raids, you know) and assembled all of the equipment needed in two 40 foot trailers. Finally the two trailers were ready to put on ships headed towards Barbados and Jamaica. My wife and I closed up the house and along with our 3 and 5 year old children flew, on probably one of the first 707's to take to the air, to Barbados. As soon as we got settled I went to the Navy base to announce my presence. The Captain of the base responded with total surprise. No one had informed him of our intention to set up on "his" base (north coast)! It turned out that the four RCA advance men never left Bridgetown (south coast), the capital city of Barbados, but instead spent their time enjoying the wonderful Barbadian rum and the strikingly beautiful Barbadian women! I was truly on my own. After some serious negotiating, the Captain gave me a few hundred square feet of space on which to set up my project. The trailer finally arrived and, you guessed it, there was no tractor on the island with which to pull it. Several trips to the junk yard solved that problem. The tractor also had no brake release compressor so I constructed a small gasoline powered compressor to do just that. The trailer was then towed, without brakes, over mountainous terrain! My caravan consisted of myself in a 1958 VW waving a very large red flag out of the window followed by the tractor/trailer. As I passed through villages many Barbadians ran out to the street clapping their hands and jumping wildly in joy thinking the island had been or was going to be taken over by Communist! After the trailer was in place I began installing four HUGE log periodic antennas. Two were 150 foot long 1 to 30 MHz vertical log periodic curtains and two were huge, and very heavy, 3 to 30 MHz horizontal log periodic beams mounted on the 100 foot towers that supported the curtain. They were to be supported by 1/2 inch nylon rope. Nearly every night Barbadian fishermen would "liberate" some of my beautiful rope. To solve that problem I made several meaningless medallions that my workmen had to hang around their necks while working at the antenna site otherwise they would become impotent. When word got out about that, the thefts stopped IMMEDIATELY! To see the antennas and trailers go to my NOSTALGIA page. My family and I settled into the wonderful Barbadian life but the peace didn't last long. One day while working on the antennas I heard the drone of a four engine airplane. Looking up I saw a Russian bomber at about 1,000 feet with its bomb bay doors open and a large camera sticking out. Others obviously saw the plane too because it wasn't long before the American Ambassador was banging on my door. Since my wife is the politician of the two of us I let her handle the incident. Sure enough, after a few of her special cherry-cheesecake pies we were back on track. Those pies seemed to be the magical answer to the many other situations that would arrive. In record breaking time I had the equipment up and running. All of the equipment worked fine and we were ready for the next step. That phase was up to someone else. A couple of years ago my copy of Microwave magazine arrived and lo and behold my project is STILL in operation. Again see the NOSTALGIA page for that article. On my return to the U.S. I approached RCA Laboratories to change my title from Senior Technician to Associate Engineer in view of the fact that I had, under very difficult conditions and circumstances, acted as international diplomat and single handedly managed, designed, built, refined and operated a major project. They essentially said that since I did not have an engineering degree I was a "certifiable dummy" and my title could not be changed. That was the end of my career with RCA. For a brief period I worked at Telerad Manufacturing, a division of the Lionel Corporation (toy trains), where I developed and oversaw the manufacturing of, among other products, the command receiver for the Atlas missile. Petrovend Corporation asked me to develop possibly the worlds first dollar bill changer. They wanted to put the changer into all of their gas pumps. The unit worked great but soon credit cards made the scene. Petrovend dropped the project in favor of credit cards. I returned to college to receive my degree in Business Administration. Most likely with RCA's comment in mind along with being more mature, I totally surprised my wife and myself by spending all remaining semesters on the Deans List. While at college I took up flying and on graduation looked for a job in the field of avionics. Narco Aviation Products hired me to work at their marine facility in Cockeysville, Maryland. The company, Enac Triton, was essentially a one man show. I eventually thought, if he can do it, so can I! That job lasted about three months. One day, in 1964, I announced to my wife that I was starting my own company. Naturally, she went into a panic. Not knowing exactly how to start a company, I picked up the telephone book and called the maintenance department of the first industry listed... Armco Steel. They agreed to give me a try and handed me an inoperative Curtis Immerscope. An Immerscope is a device that ultrasonically looks through a steel ingot to find flaws or air bubbles. I took it home in my 57 Chevy, cleaned it up and replaced all high voltage wiring. The maintenance manager was ecstatic and told me to "sit" while he called his equivalent in other companies to tell them he had finally found the man they had been looking for. Within weeks I had over fifty industrial customers within easy driving distance. Initially, I was uncertain about how much to charge my customers. One day at 2:00 AM I received an emergency call from Armco. Their vacuum degassing furnace had been damaged by some molten steel in the wrong place. This furnace was thirty feet in diameter and forty feet deep. Its load cell system (scale) was accurate to within less than one pound at 100,000 pounds! I climbed down inside the furnace and found the burned wiring. A few quick repairs had it up and running in no time. I billed them $200.00. A few days later the maintenance manager called and asked me to stop by... I did. He told me that Armco would have lost roughly $2,000,000.00 (1965 $s) if the steel awaiting the degassing furnace had hardened were it not for my timely and prompt repairs. He handed the invoice back to me and told me to add another zero! I WAS ON MY WAY!!! Obviously, I was wrong in charging only an hourly rate for my time when I should be charging for the value of the service from the customers prospective. My customers included steel mills, copper refineries, bottling companies, plastic companies, ice cream cone manufacturers, plastic and paper cup manufacturers, canning companies, veneer manufacturers, breweries and nearly 100 more. My 57 Chevy was a blue streak Earl Scheib Special (that was a "paint your whole car including the tires for $19.95" company... just kidding about the tires)! When called by my first brewery I learned very quickly that the "new" beer comes down the pipes very early in the morning and it is was mandatory for all employees, including me, to drink as much beer as possible while the machinery cooled down. I was on a first name basis with many famous cockroaches. In a brewery it impossible to get rid of those little critters even with soapy superheated steam. It was after one of those brewery trips that I got lost in downtown Baltimore (I can't imagine why!). I passed a gate that said "U S Army Intelligence, Fort Holabird." Hey, perhaps they too had something to fix. I drove around the property until I found a door that said "Supplies." A simple knock on that door put me into the "intelligence business." After repairing shelf upon shelf of equipment and noticing the allocation tag on each showing the value (price), I approached the powers to be and asked if they would consider my manufacturing for them exactly what they wanted... and at a greatly reduced price. My offer was immediately accepted and I was now in the intelligence equipment manufacturing business starting with the UAA-1 and 1059. Miniature transmitters (eavesdropping/bugging devices) intrigued me and I manufactured a wide variety of them. It didn't take long after I got into the bug building business for me to see the potential danger of those little devices so I decided I'd better get busy and start manufacturing bug detectors or countermeasure equipment to find them. Marketing my products was a snap since I could walk into virtually every intelligence agency in the Baltimore/Washington/Virginia area. I also began teaching courses on bugging and bug detection at Fort Holabird and that gave me access to other good marketplaces. By the mid-70's I had close to 200 customers (I know this because I put a list of them together for my trial). They included corporations large and small and foreign, federal, state and local governments. I did many high level sweeps that got lots of good press. Once firmly established in the intelligence equipment manufacturing business several magazine, news magazine and newspaper articles appeared about my company. It was a VERY satisfying time but it invited many people who were mildly crazy and some who were totally insane. For those I contacted their spouses or relatives suggesting they be hospitalized... and many were. One character turned out to be a professional litigant who was seeking affidavits to incriminate the Baltimore City Police Department. He left by air route. I later learned that the City of Baltimore settled out of court with him for $33,000.00. One sad fellow was convinced the Martians were following him. I built a Martian Ray Detector for him hoping that might ease his paranoia. He returned to my shop several times... each in a more depressed state. Finally, in desperation, he used a pair of ordinary gas pliers to pull out one of his molars thinking that was the homing device the Martians were using. He wrapped it in aluminum foil so the Martians couldn't track it and brought it to my shop. Out of curiosity I had my dentist X-ray the tooth and that revealed only a pin (antenna?). His wife joined him on his next visit and she and I decided on the obvious next step... the hospital. In the early 70's a disheveled man wearing mismatched jacket and pant and tennis shoes showed up at my door. Thinking he was just another unbalanced person I told him I had some sensitive material on my desk and asked if he would return in an hour. I used that time trying to figure out what to do with him. It was Edwin Duncan (now deceased) owner and President/Chairman of Northwestern Bank headquartered in North Wilkesboro, North Carolina. He told me he was having security problems at his bank and was afraid the IRS was bugging him. I agreed to train his security office, Jerry Starr (also now deceased), who in turn purchased a quantity of countermeasure equipment. Jerry eventually called me from the bank's home base in North Wilkesboro and asked if I would come to the bank and go through a sweep with him. He instructed me to go to the Baltimore/Washington International (BWI) airport and a company plane would pick me up and take me to North Carolina. I was impressed. Sure enough a twin engine turboprop showed up and ferried me to North Carolina. On landing at their home airport in North Wilkesboro I noticed the pilot push a button on the instrument panel and the doors of the very LARGE hanger ahead slid open. Inside the hanger were at least six, and probably more, beautiful white airplanes each with the Northwestern Bank logo on the tail. They ranged in size from a four engine Fairchild turboprop down to a classic Twin Beech. I was very, very impressed but wondered... what is a small North Carolina country bank doing with all these airplanes? Jerry later revealed that one of them had been set aside for North Carolina Senator Sam Irvin of Watergate fame. We performed an extensive sweep of all buildings and did indeed locate a device in the locked office of the Comptroller. I left finding the actual device to Jerry and returned to Baltimore in the same airplane. As years went by I learned a great deal about Duncan. He turned out to be a super patriot and used the banks enormous resources to fund various special operations conducted in foreign country's (most likely that is why he kept the IRS at bay). For example, in 1972, while visiting a friend with the Dade County (Miami) Bomb Squad I passed through the airport concourse and noticed a banner saying "Fly to the Cayman Islands... $62.00 round trip." Noting that I could get there and back in one day, I grabbed a flight. On landing in Cayman I knew that this is where I wanted to be. On my return trip I began scuba diving with XX. In time, I switched to a new company run by one of his dive masters. Several years later I again switched to a new dive operation that had a dive boat more to my liking. The dive master and I became very close friends. One day we got into a conversation about my work and he revealed that when he was a youngster he and several of his friends were snorkeling in a small lake located on the inland side of the main road across from where Laguna del Mar Condominiums now stands and they stumbled upon a huge underwater cache of weapons. He, and each of his friends, put a machine gun on each shoulder and marched into town. Word of the incident swiftly reached Jim Bodden, the father of the Cayman Islands, and he knew exactly who to contact to solve the problem, Duncan. Duncan grabbed plans for one of his existing banks, filled in the lake with marle (crushed limestone) and stuck one of his banks on it. SOME CORK! The bank was put up with such speed there was no time to change the design and it wound up with the drive-in-window on the wrong side (they drive on the left in Cayman). Feeling particularly spry one day I called FBI Director J. Edgar Hoover and told him I manufactured products that might be of interest to him. He promptly invited me to visit him at headquarters. Walking into his office I immediately noticed that his desk was on a four inch pedestal and the legs on the sofa had been sawed off. I sat on the arm of the sofa and looked at him eye to eye. I think he liked that. He passed me on to their intelligence support office where I met XX. XX took me to the U.S. Recording Company and explained how to do business with the FBI through that company. Business went along fine until the Omnibus Crime Bill (Title III) was passed in 1968. Upon reading it, I immediately saw that I could not deal with apparent commercial concerns such as U.S. Recording. The FBI gave me a rubber stamp that essentially said "This order complies with the provisions of the Omnibus Crime Bill." Seeing real problems with that arrangement, any equipment ordered through U.S. Recording was delivered DIRECTLY to the FBI with the invoice going to U.S. Recording. During one of my many visits to the FBI technical section I noticed one of my invoices sitting on XX's desk and it was marked up a substantial percentage. I thought that was strange but paid no further attention to it. In 1972 a company called Audio Intelligence Deices (AID) made its appearance. Their catalog claimed they could make "off the shelf" delivery... an apparent violation of Title III (Omnibus Crime Bill... it is illegal to manufacture, assemble, possess or offer for sale any device primarily designed for surreptitious interception of oral communications UNLESS you are under contract with a federal, state or local government). I had been warned on numerous occasions that I could not manufacture any device unless I had the contract in hand first so immediately brought this apparent conflict to the attention of the U.S. Attorney General. Many, many letters followed. Eventually he commented... You do what you think is correct and if you're wrong we will arrest you! Built into the Omnibus Crime Bill (Title III) was an automatic five year review period. In early 1975 I was contacted by investigators XX and XX of the U.S. House Select Committee on Intelligence. They asked that I prepare a statement detailing my observations of the effectiveness of the Omnibus Crime Bill. During our conversation I mentioned how I was dealing with the FBI through U.S. Recording, the rubber stamp and the incident about the marked up invoice. I prepared a statement primarily asking why AID was permitted to inventory and market "off the shelf" equipment while I could not. After my statement was prepared I contacted the CIA and FBI to see if there were any problems with my appearing before the Committee. The CIA asked for a days delay (a huge snowstorm saw to that) and then gave me the O.K. The statement was turned over to the investigators and a day was set for my appearance before the Committee. Upon taking a seat to read my prepared statement, to my astonishment, it had been completely rewritten! The new statement attacked the FBI and made no mention whatsoever of AID. I immediately told XX that I was NOT going to read that statement. He instructed me to go to an ante room and repair it where ever I felt it was needed. Not anticipating this level of deception I had not brought a copy of my original statement. If I had, I most certainly would have read that instead. Given little time to repair a non-repairable statement, I did the best I could. When I read the revised statement all of the Congressmen looked at each other, me and the paper in front of them, wondering what was happening. To this day I do not know which of the three statements was read into the Congressional Record and... quite frankly, I don't give a damn. On returning to my office I telephoned FBI Director Kelly and requested a meeting with him. Two other high level FBI officials were present. I later read the internal FBI communications about that meeting. One of the men wanted to seriously deal with the U.S. Recording problem while the other wanted to execute me on the spot! Shortly afterwards two FBI agents showed up at my plant and tried to get me to withdraw my testimony. Every half hour one agent would leave the room to go to the "bathroom" i.e. change the tape in his recorder. He didn't even have the common sense to flush the toilet, that was on the other side of the wall from my office, to cover his activities. They tried to force me to sign their statement. I initially refused but later agreed to sign it with the statement "I have partially prepared the above statement." That got them out the door. Shortly after that incident a "private detective" called and asked if I would show him how to three wire a telephone. We met in a conference room at a local motel in Towson. He handed me a screwdriver and I handed it right back to him and told him if he wanted to learn the process HE would have to do the work. About that time I noticed the toes of a pair of wing-tipped shoes at the bottom of the curtain that separated the room. Finally that person entered the room and, along with the other, tried to force me to make the modifications. I declined and departed. What a bunch of nonsense. In a few weeks just about every common criminal in the Baltimore area began showing up at my plant. None got in the door. The FBI must have covertly informed these scum bags they were being wiretapped by the FBI and Kaiser could fix their problems. This type of nonsense went on for years. Within months of my testimony before the House Select Committee on Intelligence my business of manufacturing eavesdropping and countermeasure equipment fell to ZERO! Fortunately, I had ability to shift into the manufacture of bomb detection and disposal equipment, a marketplace the intelligence community couldn't and wouldn't dare try to control. Heh, heh... was I wrong... again! -------------------------------------------------------------------------------- Even though it is slightly out of place time wise, I'm putting the Lou Panos Evening Sun article next. Events from roughly 1975 onward attach to the FBI criminal case and I'll pick up there. The Evening Sun Baltimore, MD Monday, October 25, 1976 Witness's Business Suddenly Drops When the House Select Committee on Intelligence invited Marty L. Kaiser to testify at its hearings on illegal wiretapping by government agencies, he did the statesmen a favor and accepted the invitation. Now they can return it by helping him answer a question: Why is it that he averaged about $200,000 annual in business from these agencies before he testified just one year ago and has averaged zilch since then? That's what has happened to Martin Kaiser since he went to Washington last October and startled the intelligence community. He offered evidence that prices for equipment he had sold to an FBI front had apparently been marked up by about 30 per cent before delivery from the front to the FBI. Word later came that Edward H. Levi, Attorney General, ordered an investigation of links between several top echelon FBI officials and the head of the firm serving as the original recipient of the equipment. Citizen Kaiser is the slightly stout little fellow from Timonium who has been called "the Michelangelo of electronics" because of his uncanny talent for making things out of juiced up wires and finding such things made by others to bug their fellow man. There was a time when his marvelous little devices - all assembled by his nimble brain and nimble fingers in a small block building next to Brooks Robinson's sporting goods shop - were the rage of the FBI, Secret Service, armed forces and private customers in the world of the super-duper snoop and counter-snoop. His developments in electronic eavesdropping for law enforcement and government intelligence had made him one of the most widely publicized and sought after specialists in the field. His equipment and techniques led to the discovery that bugs had been placed on telephones in the offices of Governor Mandel, at least four other governors, and Milton A. Allen, the Supreme Bench judge who was then state's attorney for Baltimore. The big, red car in his driveway is known as his "President Sadat Cadillac" because he bought it after a lucrative service performed for the Egyptian chief, training his aides in electronic counterintelligence. Such foreign work and private assignments like countering industrial espionage, says Marty Kaiser, have enabled his company to survive the withdrawal of government business. "I'm still busy, but most of my business comes from other sources," he says. "I've tried to find out why I was dropped so suddenly. After all, I didn't ask to talk to the committee. They invited me and made it clear that I'd be subpoenaed if I didn't accept the invitation. "I even went over and talked to (FBI Director) Clarence Kelley about it for an hour. I was only doing my duty, which is something the FBI certainly ought to understand, and he certainly seemed to understand. At one point Citizen Kaiser brought suit against officials of several intelligent and military agencies under the Freedom of information Act in an attempt to get an official reason for his freeze-out. "About the only thing I got out of that was word from the Army that they have no file on me. I told that they must have, became I was in the Army once. I even gave- them my Trial number, but they said my file must have burned up in a fire at the records center. For Martin Kaiser, who is more at home in the microcosmic world of transistors and printed circuits than the mystical world of Washington politics, there is something familiar about it all. Shortly before establishing his Timonium business 12 years ago, he helped develop a missile detection system heralded in 1964 by President Johnson using the bending beam principle in a device "seeing" beyond the horizon. At the time, he says, he was making about $6,300 a year for Radio Corporation of America after starting at $3,900 about six years earlier. For his sterling work, he was rewarded with an assignment as manager of the anti-missile project when it was moved from Burlington, Mass., to Barbados, West Indies. But one day, be recalls, an Air Force officer asked him to compare RCA's efforts with Raytheon in similar work. "After evaluating their work against RCA, I really felt they were doing a better job, really outstanding. I said so, and the and the next thing we knew was that Raytheon had the project. "I wasn't fired, because that wasn't the way they operate instead, they offered me a promotion - in Australia. "I said it was okay if they'd pay to move my wife and kids, too, but they said no, I'd have to pay. I calculated the costs and they came to roughly $14,000. So I didn't take the promotion." There is something faintly similar between the Australia to which Martin Kaiser was to be assigned in 1964 for his compulsive candor with an Air Force officer and the Siberia of the intelligence world to which he has been relegated for speaking out before the House Select Committee on Intelligence in 1975. For a man whose equipment may form the heart of the nation's defense and counterintelligence system, he seems to be getting short shrift. The least the committee owes him in return for his service is a little help in determining why. Obviously, I did NOT have a huge intelligence organization at my disposal so I did the best I could to uncover those who were liabling and slandering me. My success was limited and it wasn't until after my criminal trial that I uncovered one of the documents that provided the driving source for the incessant anger against me. As a Christian I found it difficult to believe that some individuals would continue a vendetta for such a long period of time... yet, it was true. Here is Attorney General Levi's report on the U.S. Recording scandal that Mr. Panos and I are referring to. Read it and weep. STATEMENT BY ATTORNEY GENERAL GRIFFIN B. BELL ON THE RELEASE OF THE U.S. RECORDING REPORT I am today releasing a report on an investigation of allegations that certain individuals misused their official positions while employed by the Federal Bureau of Investigation. After careful consideration, I decided to issue a full public report. When reporting on disciplinary actions taken against government employees, federal agencies have traditionally made public the administrative action taken and the nature of the conduct which caused the action to be taken, but have not always identified the particular individuals involved. There are, however, certain instances of employee misconduct which call into question the integrity of the institution itself. If the agency's mission is particularly sensitive, the misconduct serious, or the officials of high rank, then the public interest is best served by more extensive disclosure. It is this kind of wrongdoing which is described in the report I am releasing. In cases such as this one, personal privacy considerations must give way to the legitimate interest of the American public in knowing how its government operates and how high-ranking officials have abused their official positions and neglected their official responsibilities. High-ranking officials entrusted with public office simply cannot expect the same measure of privacy about the way they perform their official duties or use their offices as they could expect if they were private citizens. Moreover, the public has a legitimate interest in knowing and being able to evaluate how the heads of Executive agencies deal with official misconduct and take corrective action to ensure that similar, abuses of power and position do not recur. In this particular instance, it is my judgment that the public is entitled to know which officials engaged in the misconduct and which officials did not. The misconduct summarized here, and reports in the news media about these allegations, have cast a shadow over a great institution and over those of its officials who engaged in no wrongdoing whatsoever. I am vitally interested in restoring public confidence in the Federal Bureau of Investigation. This report will confirm that very few individuals engaged in improper conduct. We should bear in mind that this small number of individuals in no way represents the thousands of FBI employees who are dedicated, honest public servants and whose personal and professional integrity is beyond reproach. Today I asked Director Kelley to issue a bulletin to all Bureau officials in which it will be made clear that neither the Department of Justice nor the FBI as institutions, nor I, as Attorney General, will tolerate the kind of misuse of office or abuse of authority described in this report. I am pleased to note that Director Kelley has made the following structural reforms to prevent the recurrence of the kind of improper practices described in this report: 1. Reorganized the Inspection Division and renamed it the Planning and Inspection Division;' created the Office of Professional Responsibility, an Office of Inspections, and an Office of Planning and Evaluation; established within the Office of Inspections a separate Audit Unit, responsible for auditing all FBI funds and financial transactions; and organized the Division so that it reports directly to him, as Director. 2. Removed the Property Procurement and Management Section from the Division with budget responsibility, the Finance and Personnel Division, thereby making one Division head responsible for procurement and another responsible for the FBI budget and funds. Director Kelley has placed a Special Agent Accountant, a Certified Public Accountant, as Section Chief of the Property Procurement and Management Section. 3. Discontinued the use of the U. S. Recording Company as a "cover" or "cut-out" for confidential purposes and established controls to ensure that all purchases are made in accordance with government regulations. 4. Restructured the FBI inventory system, to provide built-in controls and audit trails, and initiated automation of the inventory system to provide better accountability. 5. Discontinued the FBI Laboratory and Exhibits Sections' practice of providing personal services to FBI officials. Director Kelley also has discontinued the use of the unauthorized cash fund once maintained in the Exhibits Section. 6. Reorganized the management and handling of the FBI Recreation Association (FBIRA) and its funds, so that FBIRA officers are aware of their responsibilities to prevent unauthorized expenditures. A new Treasurer of the FBIRA has taken office and is not responsible for any other FBI fund. 7. Replaced the FBI Confidential Fund with the Field Support Account, an imprest fund approved by the Treasury Department. 8. Developed and improved the FBI career development program for Special Agents to ensure that the best qualified individuals are selected for administrative advancement, substantially reducing the possibility that one person or group can control the selection of such candidates. In addition, Director Kelley assures me that the FBI has taken other steps to prevent the kind of misconduct described here. The Bureau has increased legal instruction within its training curriculum; held training sessions on the FBI guidelines for career agents; and issued detailed instructions to the field on legal questions concerning the legality and propriety of investigative techniques. In connection with the latter step, the FBI is seeking advice from the Department's Office of Legal Counsel with increasing frequency. I have asked Director Kelley to bring to my attention any improper attempts to have FBI agents conduct investigations or undertake activities which are not within the Bureau's authorized jurisdiction. I have directed all Bureau personnel to bring reports of misconduct to the attention of appropriate Bureau officials and, when necessary, the Office of Professional Responsibility at the Bureau and Office of Professional Responsibility here at the Justice Department. Recognizing the concern of Bureau personnel about threatened civil litigation., we have submitted legislation to the Congress which would protect FBI personnel against civil suits by substituting the government as defendant. I believe this approach will protect the rights of citizens without unfairly penalizing individual agents. The release of this summary report is intended to assure the nation that the Justice Department can investigate and police itself. It will also put all officials of this Department on notice that they will be held accountable to the American people for the manner in which they discharge their official responsibilities while employed as servants of the American people. # # # THE DEPARTMENT OF JUSTICE REPORT ON THE RELATIONSHIP BETWEEN UNITED STATES RECORDING COMPANY AND THE FEDERAL BUREAU OF INVESTIGATION AND CERTAIN OTHER MATTERS PERTAINING TO THE F.B.I. JANUARY, 1978 -------------------------------------------------------------------------------- THE DEPARTMENT OF JUSTICE REPORT ON THE RELATIONSHIP BETWEEN UNITED STATES RECORDING COMPANY AND THE FEDERAL BUREAU OF INVESTIGATION, AND CERTAIN OTHER MATTERS PERTAINING TO THE F.B.I. This is a report on a Department of Justice investigation of alleged misconduct by certain past and present officials of the Federal Bureau of Investigation. In the Fall of 1975, the House Select Committee on Intelligence provided the Department with information that certain officials of the F.B.I. were allegedly profiting from the Bureau's business transactions with its exclusive electronics equipment supplier, the United States Recording Company of Washington, D.C. On November 3, 1975, Attorney General Edward H. Levi requested F.B.I. Director Clarence M. Kelley to investigate these allegations. Director Kelley appointed an Ad Hoc Committee to oversee an inquiry by the F.B.I.'s Inspection Division, the Bureau unit ordinarily responsible for internal investigations. Attorney General Levi found the report of the Inspection Division and the Ad Hoc Committee to be incomplete and unsatisfactory. On January 2, 1976, he directed the office of Professional Responsibility and the Criminal Division to review the Inspection Division Report and conduct an independent investigation. The Deputy Attorney General requested two Criminal Division attorneys to work with the office of Professional Responsibility in supervising a special team of F.B.I. investigators, who were carefully selected from Bureau field offices for their ability and experience. I.R.S. agents were also selected to investigate the tax implications of the allegations. Hundreds of past and present F.B.I. officials were interviewed. Agent-accountants examined vast quantities of documents and records to determine the nature of the F.B.I. U.S.R.C. relationship and the FBI's procedures for purchasing electronic equipment. As the investigation proceeded and possible criminal violations emerged, a Federal Grand Jury in the District of Columbia, raided by the Criminal Division attorneys, began to review the findings of the Department's investigators. The investigation was completed on November 11, 1976. The findings went beyond the original allegations into other areas of misconduct uncovered by the investigation. The Criminal Division investigative report examined the use of Government material and personnel services by F.B.I. officials for their personal benefit; the administrative mishandling and misapplication of appropriated funds; the misuse of funds of the FBI Recreation Association -- a private association of FBI employees; and improprieties in the FBI's dealings with contractors other than USRC. PART 1 A. The Relationship Between the United States Recording Company and the Federal Bureau of Investigation -------------------------------------------------------------------------------- Joseph Tait has been owner and manager of the United States Recording Company (USRC) since 1938. Incorporated in 1969 in the District of Columbia, USRC sells and distributes electronic equipment, principally to the Federal Government. Mr. Tait started doing business with the Government in 1943, when Army Intelligence asked the Bureau's Laboratory Division, then interested in purchasing two Army microphones, to use USRC as a middleman. in the late 1940's, USRC contracted with the Bureau to service amplifiers, recorders and other technical equipment used by the Laboratory Division. From 1963 to 1975, USRC was virtually the sole supplier of electronic equipment to the FBI, and bureau purchase orders were frequently directed to USRC without open bidding as required by Government procurement statutes and regulations. _1/ FBI officials justified the exclusive relationship under a specific exemption for purchases that require confidentiality for security reasons. _2/ The following facts do not support this explanation, however. For instance, from 1971 to 1975, the Bureau made $500,000 worth of exclusive purchases from USRC which were not marked as confidential. Much of the equipment, including transmitters, receivers, and microphones, clearly fell into the "sensitive" category, but it was not clear why other "nonsensitive" equipment was purchased exclusively from USRC. Also, the Bureau took few precautions to insure the security and confidentiality of the FBI-USRC relationship. A number of electronic equipment manufacturers and suppliers were aware that the FBI used USRC as a middleman. The Bureau often purchased equipment directly from the manufacturer, but always paid its bills through USRC. USRC employees did not receive security clearances. The firm was broken into on at least two occasions. USRC made equipment deliveries to the FBI during working hours in a panel truck plainly marked "U.S. Recording Company." Moreover, the FBI failed to follow proper procedures for such "confidential" purchases. Section 252(c)(12) of Title 41 of the United States Code requires an agency head to make a determination that the purchase of certain equipment should not be publicly disclosed before public advertising and open bidding regulations can be suspended. ado evidence was found that either the Attorney General or the FBI Director ever made such a formal determination. The procurement regulations were also evaded, and the scrutiny of the Department of Justice avoided, by the "splitting" of orders to USRC so that no single order exceeded $2,500, the limit above which all purchase orders had to be advertised for open bid. _3/ From 1961 to 1973, the Bureau purchased large quantities of tape recorders, playback units, closed circuit television systems, video tape machines, laboratory test equipment and FM radio equipment under confidential contract with USRC to the virtual exclusion of all other contractors. The costs to the Government of this special relationship were considerable. From Fiscal Year 1971 through 1975, 60 percent of USRC's total sales were made to the Bureau. Department investigators examined 1,339 USRC sales invoices, compared the cost of each item, where available, to USRC to the price USRC charged the Bureau, and found an average markup of 23.8 percent from Fiscal Year 1969 through 1975. Individual markups varied widely and were as high as 40 to 70 percent. In addition to high markups, by using USRC as a middleman, the Bureau was not able to purchase equipment at discount prices offered by manufacturers for direct sales on large orders. For example, in 1971 the Bureau paid USRC $147,261.50 for burglar alarm equipment which could have been purchased from a New York supplier for $81,357.00. USRC asserted that its overhead costs amounted to 15 to 16 percent over the price it paid to the manufacturer. Department investigators found no objective evidence supporting a figure this high. These findings essentially confirmed allegations made by a Special Agent of the FBI's Radio Engineering Section in 1973. He reported that the FBI paid too much for USRC equipment, that USRC markups were too high, that FBI employees were forced to buy inexpensive items from USRC when they were available elsewhere, and that the FBI-USRC relationship was not confidential. An Inspection Division inquiry was made into those allegations, but this investigation found that during that inquiry key witnesses were not interviewed. One Bureau official, now retired, provided Inspection Division investigators with palpably inaccurate information. The committees which reviewed the inquiry recommended the continued use of USRC as a "cutout" (i.e. a middleman used to conceal the Bureau's identity from outsiders) for confidential procurement without any sound basis for the conclusion. The agent who made the complaint was denied promotion and then transferred to the Tampa Field office, where the Special Agent-in-Charge was told the agent was not a good "team" player and did not get along with other employees. The officials chiefly responsible for the proper implementation of procurement requirements and procedures were John P. Mohr, Assistant to the Director for Administrative Affairs; Nicholas P. Callahan, Assistant Director, Administrative Division; and G. Speights McMichael, Chief Procurement Officer. The investigation clearly established that these officials knowingly failed to apply required procurement procedures to purchases from USRC. Two possible motives were found for their actions. No evidence of cash kickbacks or bribes was discovered. Rather, a pattern of social contacts and minor gratuities was revealed between Mr. Tait and various FBI officials, including Messrs. Mohr, Callahan and Mc-Michael. In the 1960's, Mr. Tait and a number of high Bureau officials would get together at the Blue Ridge Rod and Gun Club (Blue Ridge Club)_4/ to play poker. The poker parties would begin on Friday evening and continue until Saturday noon. (Each participant paid the host, a Bureau official, for the cost of food and lodging.) Mr. Tait also entertained FBI officials on occasion at the Bethesda Country Club, Billy Martin's Carriage House in Georgetown, and the Rotunda Restaurant on Capitol Hill. There was no evidence of excessive drinking, associating with the opposite sex, payoffs, big winners or losers. Nor was there evidence that official FBI files were destroyed, as alleged, at the Blue Ridge Club. Mr. Tait often gave Laboratory Division employees small gifts at Christmas time, such as tie clasps, wallets, manicure sets, and desk calendars. In 1971, Mr. Tait gave one FBI employee a stereo playback unit for his car after he retired from the Bureau. A former USRC employee stated that in 1969 Mr. Tait purchased and paid for the installation of an eight track tape player with two speakers in John P. Mohr's Cadillac at a total cost of $172.12. There was no other evidence of any personal benefit to any other FBI official. The investigation also disclosed another possible reason for the Bureau's special relationship with Mr. Tait and USRC. Over the years, Bureau officials came to trust. Tait's willingness to keep the FBI-USRC relationship confidential, and especially, to keep Congress in the dark about FBI eavesdropping practices. In a March 14, 1963, memorandum to Laboratory Assistant Director, Ivan W. Conrad, M. Mohr ordered that: ...no recorders are to be purchased by the Bureau outside of USRC. The reason for this is because Mr. Tait of the USRC will protect the Bureau in the event questions are asked by a Congressional committee concerning the purchase of recorders by the FBI. Other companies will not do this for the Bureau. On May 22, 1964, after learning that Mr. Tait had been invited to testify before the Senate Subcommittee on Administrative Practice and Procedure, Mr. Mohr wrote in a memorandum: ...Mr. Tait told me he does not know at this point just what he is going to do with the letter but he does not intend to furnish the Subcommittee with any specific information. It should be noted that the Bureau purchases virtually all of its electronic eavesdropping devices from the U.S. Recording Company. Over the years bite. Tait has been an excellent friend of the Bureau and would go to any lengths to protect our interests from any sources. He is a personal friend of mine and he told me that he would most certainly furnish us with any response that he makes to the Subcommittee's letter before submitting it to the Subcommittee._5/ According to past and present employees of the Radio Engineering Section, Mr. Mohr's March 1963 order initiated the Bureau's exclusive relationship with USRC. The Department concluded that FBI officials showed an improper favoritism to Mr. Tait and USRC in violation of specific conflict of interest regulations of the Department of Justice._6/ However, no evidence was found indicating a fraudulent intent sufficient to make out a crime under Federal bribery or fraud statutes. B. Tax Investigation Mr. Tait was tried and, on June 20, 1977, acquitted of all tax evasion charges under Title 26, United States Code, Section 7201, for the years 1971, 1972 and 1973. The Department found no evidence that Mr. Mohr violated any federal tax laws. C. Conversion of Electronic Equipment Ivan W. Conrad, former Assistant Director of the FBI Laboratory Division, was found to have taken a large quantity of FBI electronic equipment to his home, principally, between 1964 and 1966. Conrad liked to tinker with electronic equipment and was a "ham" radio operator. The equipment included voltmeters, watt meters, battery testers, stereo amplifiers, consoles, speakers, microphones, cables, sidewinders, mixers, tape recorders, transformers, and other sorts of electronic gadgetry. This equipment was evidently delivered directly from USRC to Mr. Conrad's office at FBI headquarters and he took the equipment home. No record was made on FBI inventory files that Mr. Conrad had possession of the equipment. In late December 1975, after being questioned by investigators from the 1975 Inspection Division inquiry about unaccounted for equipment and after denying knowledge of it, Mr. Conrad, with Mr. Tait's assistance, shipped twenty-nine packages of electronic recording "ham" radio equipment and a large recording console from his home to the USRC warehouse in Southeast Washington. This included the equipment about which he had been questioned. A USRC employee made the delivery in a USRC truck. As much as eighty percent of the equipment had never been used and was in excellent condition. This equipment was subsequently recovered for the Bureau by this investigation. Purchasing documents revealed an acquisition cost of over $20,000. Mr. Conrad, who retired in July 1973, was interviewed four times during this investigation. He admitted that the equipment once belonged to the FBI. While head of the Laboratory Division, he ordered the equipment from USRC and then used it on "special projects" for Director Hoover, he said. He serviced the Director's television, hi-fi sets, short-wave radio, and designed a portable recording system for him. The console recorder was delivered directly to his home by Mr. Tait, and he took the other equipment home after USRC delivered it to the Bureau. He said that most of the equipment was obtained between 1964 and 1966. Mr. Conrad asserted that he never intended to convert this equipment to his own use. After Director Hoover died in 1972, he wanted either to buy the equipment from USRC or return it to the company. He said he was "tardy" in not returning it to Mr. Tait until late December 1975. In August 1976, in response to inquiries from this investigation, he delivered another shipment of electronic equipment to the FBI. He had signed this out of FBI Laboratory stocks in the early 1960's. Auto radios, control cables, heads, speakers, antennas, assorted accessory equipment, a stereo receiver, tape recorders, microphones, and a sound recording set were included in this shipment. It is believed that all FBI equipment that was in Mr. Conrad's possession has now been recovered. D. Goods and Services of the FBI's Exhibits Section The Department also investigated the allegation that FBI employees were required to provide goods and services to their superiors. The Exhibits Section of the FBI is staffed with accomplished craftsmen and artisans. Their official task is to design and construct exhibits for use in Department litigation and displays, furniture, and other exhibits for internal FBI use. The Radio Engineering Section is responsible for maintaining and servicing FBI electronic equipment. Interviews with past and present employees of those sections and an examination of photographs and personal logs maintained by some of them revealed that services were provided to FBI officials during official duty hours and that goods were produced for FBI officials with Government property and equipment._7/ This constituted a misuse of Government time and materials, contrary to federal law and regulations. 18 U.S.C. 641; 28 C.F.R.ß45.735-16. Prosecutions, where otherwise possible, are barred by the statute of limitations as virtually all of the following misconduct occurred more than five years ago. 18 U.S.C. 3282. 1. Director J. Edgar Hoover Exhibits Section employees painted Director Hoover's house each year when he visited California during the summer. They built a front portico onto his house and dug a fish pond, equipping it with water pump and outdoor lights. They constructed shelves, telephone stands, and an oriental fruitbowl. Home appliances, air conditioners, stereo equipment, tape recorders, and television sets, and electric wiring were serviced and repaired by Radio Engineering. Section employees. Exhibits Section employees serviced his lawn mower and snowblower, maintained his yard, replaced sod twice a year, installed artificial turf, and planted and moved shrubbery. The Exhibits Section built a deck in the rear of his house, a redwood garden fence, a flagstone court and sidewalks. A power window with sliding glass doors was also designed and constructed. Clocks were reset, metal polished, wallpaper retouched, firewood provided, and furniture rearranged. Employees were on call night and day for this work. Mr. Hoover employed one grade 15 Bureau accountant to give him tax advice, maintain his tax records, and prepare his annual Federal tax return. His secretary or two associates would generally make the work requests. Exhibits Section employees were called upon to build gifts for Director Hoover every year for Christmas, his service anniversary and other special occasions. These gifts included furniture such as tables, display cases, cabinets, a bar and valets. Assistant Directors chipped in to pay for cost of materials. Employee labor, however, was not compensated. FBI employees called upon to perform these services did not think them proper, but felt compelled to follow orders for fear of losing their jobs, or of arbitrary transfers or promotion delays. 2. John P. Mohr Mr. Mohr had car radios repaired, the body of his son's MG repaired and repainted, and an elaborate dental exhibit constructed for his son, a dentist. At his home, Exhibits Section employees shaved doors to accommodate new carpeting, and Radio Engineering Section employees repaired his television numerous times, and installed phones, stereo hi-fi speakers (Mr. Mohr's property) and a burglar alarm system which required frequent servicing after installation (FBI property). They repaired his stereo and purchased and installed a new FM radio tuner in an existing cabinet which was modified by Exhibits Section employees. Mr. Mohr also received certain gifts made by the Exhibits Section, including a coat of arms, a dresser top valet, and an oak portable liquor cabinet in the shape of a wine case. Exhibits Section employees painted a desk and made a drawing board for Mr. Mohr. They made, at his direction, a walnut cigar box, a walnut tape-cartridge rack, a walnut wine rack cabinet whose value has been estimated at $2,000, and two walnut gun cases with glass front doors. Mr. Mohr had employees mount snow tires, wash, and transport his personal automobile to commercial garages for repairs. A battery was installed in his car and a turn signal lamp was replaced by Exhibits Section employees. Mr. Mohr also received tapes of record albums which were copied and distributed by Radio Engineering Section employees at the direction of former Assistant to the Director Cartha D. DeLoach. Mr. Mohr received services even after he retired in June 1972. Radio Engineering Section employees were sent to his home, at his request, to repair electrical switches, televisions, and the burglar alarm system which had been . installed earlier. Mr. Mohr also asked a Radio Engineering Section employee to repair his electric blood pressure machine. At Mr. Mohr's request to former Exhibits Section Chief John P. Dunphy, the Exhibits Section built a birdhouse according to plans he provided. 3. Nicholas P. Callahan For Mr. Callahan, Exhibits Section employees silk screened a felt cloth used for table games, cut doors at his house to accommodate new carpeting, printed maps showing the location of his beach home and finished styrofoam nautical objects to decorate it. They made walnut fishing rod racks for his beach home, assembled a lathe fence to prevent sand erosion at his beach home, and built a picket fence for his residence._8/ He had walnut shelves cut by section employees during official hours (he supplied the material), had a piece of plywood covered with weatherproof material for a shed roof, had Exhibits Section employees make a sign for his daughter and son-in-law with their name, and had former Exhibits Section Chief Leo J. Gauthier make a fuse box cover for the basement recreation room in his home. At his request, the exhibits section cast a desk memento in plastic for him to give to a friend and make him a set of stack tables which duplicated a set which had been made for Director Kelley (see below). Radio Engineering Section employees diagnosed troubles with his televisions and Exhibits Section employees framed his personal photographs. Mr. Callahan also received various gifts. He received a framed plaque which recited an Irish prayer, a plaque bearing his coat of arms, a dresser top valet, a portable oak liquor cabinet in the shape of a wine cask, a decorative Christmas tree ball and a gold medallion and chain for Mrs. Callahan into which a gold-disc with the FBI seal was set by the Exhibits Section (Mr. Callahan bought the medallion and chain). The valet and liquor cabinet were duplicates of gifts given to Director Hoover, Mr. Mohr and Mr. Dunphy. Mr. Callahan also received considerable services to his automobile. Employees test drove his personal car, did diagnostic work on it, took it out for washes, fill-ups, snow tire mounting, and servicing at garages and muffler shops. Scratches on his car were touched up. (Some employees, however, recalled that the whole trunk lid on Mr. Callahan's car was painted.) Mr. Callahan states that Mr. McMichael provided him with a Polaroid camera which he used for personal photographs.Film for the camera was also provided at FBI expense. He has since returned the camera.____9/ 4. John P. Dunphy On August 13, 1976, Mr. Dunphy pleaded guilty to a misdemeanor charge under Section 641, Title 18, United States Code, as part of an agreement with the United States as a result of which he voluntarily tendered his resignation from his position as Chief of the Exhibits Section and cooperated with this investigation.__10/ 5. Director Clarence M. Kelley on directions from Mr. Callahan shortly after Director Kelley and his wife moved to Washington, two sets of valances were made and installed in Director Kelley's apartment by the Exhibits Section and two television sets were purchased and installed by the Radio Engineering Section. After this investigation began, Director Kelley paid for the estimated cost of the valances. Director Kelley admitted he knew, after the job was done, that the Exhibits Section installed the first set of valances. when they proved unsatisfactory, he requested a second set to be built and installed. This set was also built and installed by Exhibits Section employees. The television sets were ordered returned by Director Kelley after this investigation revealed their source. Although Mr. Callahan said he directed that the televisions be loaned to Director Kelley, the sets were not entered on FBI equipment inventory until after their return from Director Kelley's apartment on February 19, 1976. The Exhibits Section also built a walnut table, a set of stack tables, and a jewelry box which were given to Director Kelley as gifts from the Executive Conference. He was unaware that the Exhibits Section made the gifts, he said. The Conference, by donations from its members, paid for the materials used in these gifts. Director Kelley's personal automobile received occasional servicing by FBI employees and his FBI-provided chauffeur performed personal errands for him. Section employees repaired a broken cabinet for Director Kelley, and mounted the FBI seal on a gold disc as a charm for the Director's wife. 6. Miscellaneous The practice of providing FBI goods and services to high Bureau officials was not limited to the above individuals. Clyde Tolson, long-time Associate Director under Hoover, had FBI employees develop several patented devices during official hours. These included a reusable bottle cap and a power window opener. These patents were assigned to the FBI. There was no evidence that Mr. Tolson personally benefited from the development of these devices. one of the power windows was installed for President Johnson in the White House. A second unit, designed and intended for President Johnson's ranch, was never completed. E. Imprest Fund There was evidence that an FBI official received reimbursement from the FBI Imprest Fund (petty cash fund) for personal purchases. G. Speights McMichael, Chief Procurement officer, denied that Imprest Funds were used for the personal purchases of Bureau officials. He stated that he did not check to see whether the purchases were proper. Under Federal law he was required, as the Bureau's chief procurement officer, to certify that each disbursement was proper and correct. Each voucher reads, in part: "I certify that the disbursements claimed herein are correct and proper..." Many of the personal purchases could have been used by the Exhibits Section and, therefore, could have escaped Mr. McMichael's attention. He admitted being derelict in his responsibilities as the Imprest Fund's cashier, disbursing and certifying officer. F. Confidential Fund Part of the FBI's annual appropriation is specified "not to exceed $70,000 to meet unforeseen emergencies of a confidential character to be expended under the direction of the Attorney General and to be accounted for solely on his certificate." The most common use is for payments to informants. Contrary to the appropriation language and to Federal regulations, this money was drawn from the Treasury by travel vouchers that failed to reflect the actual expenditures. Top FBI administrative officers were, therefore, able to maintain in cash form these monies over which they exercised custody and control. Field offices were given separate funds for payment of informants which were maintained in separate accounts in addition to the so-called "Confidential Fund" which was kept at headquarters. Also contrary to Federal regulations, the unspent portion of the yearly appropriation was accumulated. By 1974, the headquarters "Confidential Fund" totalled $34,000. Nicholas P. Callahan controlled the Fund from 1946, when he was Number One man to the Assistant Director of the Administrative Division, until July 1973, when he became Associate Director. John P. Mohr, Clyde Tolson, and Director Hoover could also authorize disbursements. A 1974 inspection of the Fund concluded that "no written guidelines exist pertaining to the utilization of this fund" and that separate records for this fund were kept by FBI administrative units apart from the FBI's normal accounting system and were not subject to Treasury Department audit. This investigation revealed uses of the "Confidential Fund" maintained at headquarters by FBI administrative officers that were not within the scope of the appropriation. _l2/ This investigation revealed that between August 1956 and May 1973 the Bureau purchased over $75,000 worth of electronic equipment with money from the Confidential Fund. No memoranda, purchase orders, requisitions, vouchers or similar documentation were located indicating why the equipment was purchased or who requested it. Mr. Callahan acknowledged that Mr. Mohr and he decided to use Confidential Fund monies to purchase electronic equipment. This was not done to disguise the nature of the equipment, he said, but to expedite large purchases of equipment. The Confidential Fund was also used to pay for public relations expenses. Between 1961 and 1975, $23,399.15 of Confidential Funds were spent on room rentals, food, drink and gifts for the liaison officers of foreign and domestic law enforcement and intelligence gathering organizations. Mr. Callahan approved disbursements for liaison functions. There was also evidence that Mr. Mohr, and, to a far lesser extent, Assistant Director Eugene W. Walsh, and Deputy Associate Director Thomas J. Jenkins also authorized such disbursements. Director Kelley recalled such an authorization by himself on one occasion. One of these officials stated that any expenditure which in any way aids "the detection and prosecution of crimes against the United States," including liaison functions, is justified under the FBI's total appropriation and that the Confidential Fund was used only to expedite reimbursement. He admitted, however, that the Confidential Fund had been obtained on the representation to Treasury that they would be used for "unforeseen emergencies of a confidential character." Congress had not been informed that the Bureau was incurring public relations and liaison expenses and paying them out of the Confidential Fund. The Bureau had never submitted a formal request to Congress or the Office of Management and Budget for the proper budget authority to make these Confidential Fund expenditures. Title 31, United States Code, Section 551, which prohibits the use of appropriated funds for lodging, feeding, or providing transportation to an assemblage, can be interpreted specifically to prohibit the use of the Confidential Fund for public relations and liaison purposes. This investigation also revealed that FBI officials used the Confidential Fund to cash personal checks. This practice was stopped after Mr. Welsh was questioned about the practice on May 21, 1976. No evidence was found indicating that any senior official applied these appropriated funds to his own use. G. The FBI Recreation Association The FBI Recreation Association (FBIRA) was founded in 1931 for the purpose of promoting and encouraging athletic, social and welfare activities among its members. The FBIRA is an independent and tax exempt organization whose membership is voluntary. The Association's funds were spent on athletic and social functions, group travel, clubs, hobbies, art shows, and publication of The Investigator, a monthly magazine reporting on FBIRA activities. Its constitution and bylaws provide for the election of officers and a five-member Board of Directors. This investigation revealed that between September 1951 and June 1972, Nicholas P. Callahan obtained $39,590.98 from the FBIRA designated for the "Library Fund." The Association's records contain no explanation or authorization for these disbursements. No disbursement requests or vouchers were found. Mr. Callahan was the Library Fund's only recipient and maintained the only records of its expenditures. Mr. Mohr periodically reviewed the records. Shortly after Mr. Hoover died, Mr. Callahan and Mr. Mohr discontinued the Fund and destroyed its records. Neither of the two FBIRA treasurers who served during this period knew why the fund was named the Library Fund in the FBIRA Disbursements Journal. The treasurers understood that these "Library Fund" disbursements were for Director Hoover's public relations expenses, such as office flowers, condolence telegrams, and for unspecified office expenses, such as books and newspapers. Only Messrs. Hoover, Tolson, Callahan, Mohr, and the treasurers knew about the "Library Fund" and disbursements were made to the Fund without the authorization of FBI-RA officers whose approval is required under the FBIRA charter. Mr. Callahan asserted that the disbursements were for official public relations and liaison functions for which appropriated funds are unavailable under law and that they were proper under a broad interpretation of the FBIRA constitution's "general welfare" clause because money spent promoting the FBI's general welfare is in the best interest of its employees. The investigation also revealed that $55,849.77 of FBIRA funds were expended on receptions for National Academy students and guests between April 8, 1958, and June 20, 1972. The National Academy is an FBI operated training and education facility for local law enforcement personnel around the country. The receptions were not FBIRA activities and they were not open to FBIRA members. About half the cost of the receptions was borne by those attending the receptions so that net cost to the FBIRA after offset by these donations was $29,443.67. The FBIRA constitution and bylaws do not provide for expenditures for such functions as National Academy receptions. From July 1952 to December 1975, another $12,219.90 of FBIRA funds were spent on miscellaneous or liaison expenses and on receptions, luncheons, retirement parties, and gifts for foreign law enforcement liaison officers, and senior FBI officials. The funds also covered the cost of FBI press receptions and other public relations expenses. Director Hoover, Mr. Callahan, Mr. Mohr, Mr. DeLoach, and Mr. Walsh, not the FBIRA Board of Directors, approved these disbursements, according to the records. The above facts established that, from 1951 to 1975, high officials of the FBI obtained funds from the FBIRA for public relations and other uses not authorized by its charter and without obtaining the approval of its Board of Directors. There is no evidence that these Bureau officials converted the money to their own use and, therefore, no evidence of criminal intent as required under Title 18, United States Code, Section 654. H. Special Agents Mutual Benefit Association (SAMBA) SAMBA is an unincorporated association designed to provide life and health insurance to FBI employee members. The Prudential Insurance Company has been SAMBA's underwriter since SAMBA was founded in 1948. SAMBA is independent of the FBI, with private offices at 1325 G Street, N.W., Washington, D.C. This investigation uncovered questionable expenses from SAMBA books and records. The amount of $635.21 was withdrawn from the SAMBA account to pay for a retirement party and gift for Mr. Mohr. $310.22 of this withdrawal covered the price of a Sears Roebuck fishing boat, which was delivered to Mr. Mohr by FBI employees. One SAMBA officer admitted that SAMBA funds were used, in disregard of its charter, to pay for retirement parties, luncheons, and gifts for outgoing SAMBA officials and Directors. Other questionable expenses included two professional football season tickets for the use of a SAr4BA official, Saturday work charges, wedding and anniversary gifts, and annual Christmas parties. Director Kelley and his wife, along with Mr. and Mrs. Mohr, Mr. and Mrs. Thomas Jenkins, and SAMBA President Thomas J. Feeney, Jr., and his wife, attended a weekend meeting in New York City with officials of Prudential Life Insurance Company, which underwrites the SAMBA policy. Director Kelley's travel from Kansas City, Missouri, to New York and return to Washington, D.C., was by Government Travel Request (GTR). Travel for Mrs. Kelley and the others was paid by SAMBA. Prudential paid all other expenses. Director Kelley subsequently reimbursed Prudential for these expenses. I. FBI Officials' Relations with Firearms Suppliers The Remington Arms Company, which bids on arms and ammunition contracts with the FBI, maintains a 300-acre working farm and game preserve in Chestertown, Maryland, called Remington Farms. On January 3 and 4, 1972, Remington hosted three FBI officials at Remington Farms and paid for their room, board, hunting licenses and stamps at a cost of $203.50. Twelve other FBI officials were hosted at the Remington Farm on three subsequent occasions, costing the arms dealer an additional $1,168 in room and board. Remington also paid for liquor, ammunition, guides and game shot on these four weekends. Although a breakdown by individual is not available for these costs, Remington spent a total of $2,013.96 for forty seven individuals for the four weekends. Fifteen of the forty seven guests were then active FBI officials. FBI records show that the Remington Firearms Company has not been awarded a firearms contract since 1971. The hunting weekends mentioned above all occurred after 1971. Six ammunition (not firearms) contracts have been awarded to Remington since fiscal year 1971, but each of these contracts was solicited and awarded after open bidding by the Justice Department. Although several of the FBI officials who attended the hunting weekends were in a position to influence the awarding of arms contracts, no arms contracts were awarded to Remington during the 1970's. Nor were arms contracts awarded during this time to Winchester Firearms Company which hosted a hunting weekend for three Bureau officials in 1973. The Federal illegal gratuities statute, Title 18, United States Code, Sections 201 (f) and (g), requires that the gratuity shall be "for or because of" an official act. This investigation found no evidence that the recipients of the gratuities did anything for Remington or Winchester, and therefore, there was no evidence warranting prosecution under this statute. The evidence does indicate that the Departmental regulation prohibiting the accepting of gifts or entertainment from those having or seeking a contractual relationship with the United States was violated. 28 C.F.R. ß45.735-14(a). Moreover, the evidence shows that these employees also violated the general Departmental prohibition against conduct creating the appearance of impropriety. 28 C.F.R. ß45.735-2. The Attorney General has referred this matter to the FBI Director with instructions to take appropriate administrative action against these employees. J. Miscellaneous Allegations 1. Financial Dealings Between Joseph C. Palumbo and John P. Mohr This investigation received information from the House Select Committee on Intelligence that John P. Mohr and Joseph C. Palumbo of Charlottesville, Virginia had had improper financial dealings. Mr. Palumbo and Mr. Mohr entered a financial arrangement in late 1972, after Mr. Mohr had retired from the FBI. The transaction was entirely lawful and at arms length and no evidence was found that Mr. Palumbo ever discussed the FBI or its activities with Mr. Mohr. 2. Official and Confidential Files During 1975, an investigation was conducted into the disposition of the "official and confidential files" of J. Edgar Hoover following his death in May 1972. The inquiry determined that the files were turned over to Assistant Director W. Mark Felt by Miss Helen W. Gandy, Executive Assistant to Mr. Hoover, on May 4, 1972, and now are located at FBI headquarters. No evidence was found that official FBI files of any kind were removed to Mr. Hoover's home following his death. A. PART II Summary and Actions Taken Against Principal Subjects 1. John P. Mohr (a) Mr. Mohr was Assistant Director for the Administrative Division of the FBI and the Assistant to the Director. He was primarily responsible for using USRC as an exclusive supplier of electronics equipment to the FBI. His conduct towardß,USRC violated 28 C.F.R. 045.735-2(b) and (c)(2) (prohibiting employees from giving preferential treatment to any person outside the Department). He received a few gratuities (tape deck, Christmas gifts) from Mr. Tait. No evidence was found that he was bribed, but he violated 945.735-14(a)(1), which prohibits employees from accepting gifts from those doing business with the Department. (b) FBI employees provided goods and services to him as described above. This arguably violated 18 U.S.C. 641 (conversion of government property to his own use), (prosecution barred by the statute of limitations), and 28 C.F.R. ß45.735-16 (misuse of federal property). (c) Mr. Mohr was also responsible, along with Mr. Callahan, for using FBI Recreation Association and Confidential Fund monies for unauthorized public relations purposes. This matter has been referred to the Department's office of Management and Finance for appropriate action (see footnote 12 above). In 1972, he attended an expense paid hunting weekend at Remington Farms, an FBI arms supplier. This is a violation of the Department prohibition against accepting gifts from those doing business with the Department, 28 C.F.R. ß45.735-14(a)(1). (d) No action has been taken against Mr. Mohr. He retired on June 30, 1972. Criminal action under all of the above federal provisions is barred by the five year statute of limitations. 2. Nicholas P. Callahan Mr. Callahan was Assistant Director for the FBI's Administrative Division and later Associate Director. In 1976, pursuant to Attorney General Levi's order, he was asked to resign as a result of this investigation. He did resign. (a) Mr. Callahan was responsible for improperly diverting thousands of dollars of FBIRA and Confidential Fund monies to official FBI public relations activities. The funds were not authorized or appropriated for public relations activities. There was no evidence that he converted these funds to his personal use, and therefore, no evidence warranting prosecution. This matter has been referred to the Department's Office of Management and Finance for appropriate action. (See footnote 12 above.) (b) Mr. Callahan admitted receiving FBI goods and services. FBI employees decorated his beach house, built a fence, walnut shelves, and other furniture for his residence. The statute of limitations bars prosecution of Mr. Callahan for receiving government property in violation of 18 U.S.C. 641. (c) No evidence was found that Mr. Callahan was bribed or that he received illegal gratuities. (d) No further action has been taken against Mr. Callahan. 3. Ivan W. Conrad Mr. Conrad was employed by the FBI Laboratory in many positions from 1934 to 1973. He retired on July 12, 1973, as Assistant Director of the Laboratory. (a) Mr. Conrad took many pieces of electronic recording and amplifying equipment home with him and used them for his own benefit. Mr. Conrad asserted he had the equipment for legitimate purposes. The Department recovered all equipment, and Mr. Conrad tendered a $1,500 cashier's check to pay for his use of the equipment. (b) No further action has been taken against Mr. Conrad. Prosecution was barred, in the judgement of the Criminal Division, by the statute of limitations and because of the lack of evidence showing criminal intent on the part of Mr. Conrad. 4. Clarence M. Kelley Director Kelley received the limited amount of goods and services described above. He was not involved in any of the other matters which are the subject of this report. Attorney General Levi and Deputy Attorney General Tyler determined that no disciplinary action was called for, but that Director Kelley should reimburse the Bureau for the goods and services he received. That has been done and no further action against him has been taken. Director Kelley should be given credit for putting an end to the improper practices described in the report. His cooperation greatly assisted Departmental investigators in uncovering the facts. His cooperation made this report possible. It should also be noted that Director Kelley was primarily responsible for bringing about the internal reforms set forth in the final section of this report. 5. G. Speights McMichael Mr. McMichael is no longer in charge of, but continues to work in, the FBI's Property Procurement and Management Section. He is no longer cashier of the Imprest Fund, a petty cash reimbursement fund. (a) Mr. McMichael clearly neglected his responsibilities in managing the Imprest Fund. There is some evidence that he permitted violations of procurement procedures to favor USRC in the purchase of electronic equipment. 41 U.S.C. 252(c)(12). There is no evidence of bribery. (b) While serving as the FBI's chief procurement officer, he attended an expense paid hunting weekend at Remington Farms. This is a probable violation of the Department regulation prohibiting the receipt of gifts from those doing business with the Department. 28 C.F.R. ß45.735 14 (a) (1) . (c) The evidence that Mr. McMichael knowingly approved Imprest Fund reimbursement for the personal purchases of an FBI employee is not substantial. There is no evidence that he converted government money to his own use. 18 U.S.C. 641 and 643. (d) McMichael clearly failed to meet his responsibilities as the FBI's Chief Procurement officer and probably violated 28 C.F.R. 945.735-13 (misuse of official position) and 945.735-16 (misuse of federal property). His attendance at Remington Farms probably violated ß45.735-14 (gifts from Department contractors). He failed to assist Department investigators. The statute of limitations bars criminal action against Mr. McMichael. These matters have, however, been referred to the Director with instructions to institute appropriate administrative action against him. 6. Joseph X. Tait (a) On June 20, 1977, a jury acquitted Mr. Tait of. charges that he understated his income in 1971, 1972 and 1973, in violation of 26 U.S.C. 7201. (b) A jury acquitted Mr. Tait on all counts of charges that he violated 18 U.S.C. 287 (false claims on the United States), 371 (conspiracy to defraud), and 1341 (mail fraud). (c) Further comment regarding Mr. Tait is considered inappropriate because, unlike the other subjects of this report, he is not a government official. B. Possible Civil Actions 1. U.S. Recording Company The Department is considering taking civil action to invalidate USRC contracts and recover the excess profits obtained from the Bureau. The basis of such a suit would be the clear breach of applicable government procurement regulations. The Civil Division is now evaluating the relevant facts to determine whether the Department should institute a civil recovery action against the United States Recording Company or its president. 2. Conversion of Government Property by Bureau Officials Civil actions may not be instituted because: the actual amounts involved are small compared to the expense of litigation; there would be substantial difficulty in fixing the government's loss with any appreciable accuracy; and, much of the government's property has already been returned. In addition, civil action may be barred by the statute of limitations. 3. Imprest Fund Approximately, $1,700 was diverted from that fund for clearly improper purposes. The property obtained with Imprest Fund monies has been returned to the Bureau. This matter has been referred to the Department's Office of Management and Finance to review the facts, and to take necessary administrative action. 4. Confidential Fund Approximately, $75,000 was spent to purchase electronic equipment and $23,000 was spent over a fifteen year period on public relations type matter. This matter has also been referred to the Department's Office of Management and Finance for appropriate administrative action. 5. FBI Recreation Association Monies from the FBI Recreation Association were improperly diverted. According to the Civil Division, the Government lacks standing to initiate any civil action, except under a somewhat strained theory of parens patriae. Accordingly, no civil action will be instituted regarding this matter. C. Action Taken to Prevent Recurrence Within the last fifteen months, Director Kelley has taken the following corrective measures to prevent the recurrence of the improper practices described in this report.He has: 1. Reorganized the Inspection Division and renamed it the Planning and Inspection Division; created the office of Professional Responsibility, an office of Inspections, and an office of Planning and Evaluation;' established within the office of Inspections a separate Audit Unit, responsible for auditing all FBI funds and financial transactions; and organized the Division so that it reports directly to him, as Director. 2. Removed the Property Procurement and Management Section from the Division with budget responsibility, the Finance and Personnel Division, thereby making one Division head responsible for procurement and another responsible for the FBI budget and funds. Director Kelley has placed a Special Agent Accountant, a Certified Public Accountant, as Section Chief of the Property Procurement and Management Section. 3. Discontinued the use of the U.S. Recording Company as a "cover" or "cut-out" for confidential purposes and established controls to ensure that all purchases are made in accordance with government regulations. 4. Restructured the FBI inventory system, to provide built-in controls and audit trails, and initiated automation of the inventory system to provide better accountability. 5. Discontinued the FBI Laboratory and Exhibits Sections' practice of providing personal services to FBI officials. Director Kelley also has discontinued the use of the unauthorized cash fund once maintained in the Exhibits Section. 6. Reorganized the management and handling of the FBI Recreation Association (FBIRA) and its funds, so that FBIRA officers are aware of their responsibilities to prevent unauthorized expenditures. A new treasurer of the FBIRA has taken office and is not responsible for any other FBI fund. 7. Replaced the FBI Confidential Fund with the Field Support Account, an imprest fund approved by the Treasury Department and administered in accordance with Treasury and Justice Department regulations. 8. Developed and improved the FBI career development program for Special Agents to ensure that the best qualified individuals are selected for administrative advancement, substantially reducing the possibility that one person or group can control the selection of such candidates. In addition to these administrative measures, the FBI has increased legal instruction within its training curriculum; held training sessions on the FBI guidelines for career agents; and issued detailed instructions to the field on legal questions concerning the legality and propriety of investigative techniques. The FBI is also posing such questions to the Department's Office of Legal Counsel with increasing frequency. On January 3, 1978, the Attorney General referred the entire U.S. Recording Company matter to the FBI and instructed the Director to initiate administrative proceedings against G. Speights McMichael and other FBI employees whom the Director considers to be appropriate, subjects for administrative action. The Attorney General requested the Director to keep him advised by informing the Department's Counsel on Professional Responsibility of all administrative action taken. Finally, the Attorney General has asked Director Kelley to bring to the Attorney General's attention any improper attempts to have FBI agents conduct investigations or undertake activities which are not within the Bureau's authorized jurisdiction. The Attorney General has also directed all Bureau personnel to bring reports of misconduct to the attention of appropriate Bureau officials, and when necessary, the office of Professional Responsibility at the Bureau and at the Department of Justice. _1/ 41 U.S.C. 252 (c) and regulations promulgated thereunder. _2/ 41 U.S.C. 252 (c) (12) . _3/ The limit was raised to $10,000 by statutory amendment in 1974. _4/ The Blue Ridge Club burned down on November 23, 1975, just before House Select Committee investigators were scheduled to interview Club employees. This investigation revealed that an eight-year-old child caused the fire while playing with matches. The child "confessed" to Department investigators. The testimony of other witnesses corroborates the confession. _5/ A search of the transcripts of committee hearings revealed no evidence that Mr. Tait actually testified before the referenced subcommittee or any other subcommittee. _6/ 28 C.F.R. ß45.735-2(b) and (c) prohibit the giving of favored treatment or advantage to any member of the public and any action which might result in, or create the appearance of: preferential treatment, the use of public office for private gain, or an adverse effect on public confidence in the integrity of the Government. 28 C.F.R. X45.735-14(a)(1) prohibits the acceptance by public officials of gifts or gratuities from those doing business with the Department of Justice. _7/ No official documents, memoranda, or work orders were found which account for the work performed, the materials used, or the goods produced by Exhibits Section employees for the personal benefit of Bureau officials. _8/ Contrary to the evidence obtained from Exhibits Section employees, Mr. Callahan stated that he paid for the material for the fences and installed them himself on personal time. _9/ Mr. Callahan testified that agents are allowed to take home cameras for personal use to maintain their proficiency with them. Agents assigned to this investigation verified that this is the case, but indicated that the practice is intended to maintain familiarity with cameras more complex than the Polaroid. _10/ A further term of the agreement was that he make restitution for the goods he received in an amount to be determined later between his attorney and attorneys for the United States. On September 28, 1976, Dunphy was fined $500 and placed on probation. He returned all government materials to the Bureau, in accordance with the plea agreement. There was no footnote _11/ _12/ Title 31 U.S.C. 628, a noncriminal statute, prohibits the use of appropriated funds for a purpose not specified in the appropriation. The Counsel on Professional Responsibility has requested the Department's Office of Management and Finance to review these facts, to take necessary administrative action to prevent the recurrence of this conduct, and if appropriate, to refer the matter to the Comptroller General for possible recovery actions against responsible disbursing officers. DOJ-1978-M 02/02 -------------------------------------------------------------------------------- There are four more chapters to this story and they will be up loaded as soon as I can write them. They are... Bugging the FBI... The criminal case... The civil case... Repercussions... -------------------------------------------------------------------------------- The following newspaper articles were part of the original upload. The new chapters mentioned above will fill in and expand around these articles with true events. Journal Tuesday, February 21, 1978 Jury May Get Case Today, Is Kaiser Object of FBI Vendetta? Twelve jurors probably will begin deliberations today to decide whether Martin L. Kaiser is guilty of conspiracy and illegally bugging FBI agents while they investigated Northwestern Bank last year. One thing the jury must decide is whether the FBI is carrying out a vendetta against Kaiser, one of the, country's foremost wiretap and bugging experts. Kaiser, a manufacturer of surveillance devices - from Maryland, was once a major supplier of the FBI's surveillance equipment But his dealings with the FBI stopped when he publicly identified an FBI front company used to buy his products and resell them to government agencies at substantially higher prices. Today, Kaiser no longer works with the FBI, but his clients include the ..., the Army, and Air Force, several foreign countries and more than 200 police departments. Martin Kaiser is still one of the most respected makers of bugging equipment in the world - among his character references is the head of the CIA's procurement division. Kaiser still supplies the ... with a great deal of surveillance gear' and he still holds an agency rating of secret. But Kaiser says that the FBI wants revenge on him. He alleges that the FBI seeks revenge because of his testimony before the presidentially appointed National Wiretap Commission and the House Select Committee on Intelligence in 1975. In his testimony before the panels Kaiser revealed links between the FBI and U.S. Recording Co., an electronic equipment purchasing company. Kaiser told the committee that the recording company was actually an FBI front - an apparently legitimate private business. Which was in fact operated by high ranking FBI officials. Kaiser had done a considerable amount of business with the FBI, he said, but his business began to suffer greatly after he was instructed in 1969 to sell his equipment to U.S. Recording instead of directly to the FBI. Kaiser testified that he first assured that the procedure was merely a security measure, - but he later discovered that the electronic devices he sold to U.S. Recording were being duplicated and resold at substantial markups. Kaiser had sold the FBI many surveillance devices - among them the bug detection kit used to find the listening devices Kaiser is charged with installing at Northwestern's headquarters in Wilkesboro. After his testimony an investigation by the General Accounting Office revealed that the FBI front company had marked up the prices of Kaiser's gear from 12 percent to 280 percent. Kaiser testified that the FBI was not the only group buying his products through U.S. Recording. In addition to federal agencies, Kaiser told the congressional committee foreign governments, including Canada and Iran bought the marked-up goods. Kaiser now says that most - of his federal contracts were severed after he brought the front company to public attention. An affidavit Kaiser filed in federal court claims that his sales plummeted from $200,000 annually before his testimony to $450 afterward. His allegations of a vendetta go beyond the U.S. Recording Co. payment scheme, though. Kaiser said that Thomas J. Brereton, the FBI agent in charge of the Northwestern investigation illegally attended grand jury proceedings while Kaiser was testifying. Kaiser's allegations resulted in a special hearing called by Judge Hiram H. Ward in U.S. Middle District Court here last month. Ward ruled that Brereton had not improperly attended the grand jury hearings and that "a mistake had been made, honest or otherwise." Brereton testified that he had been in the U S. attorneys law library during Kaiser's grand jury appearance. Friction between Kaiser and Brereton seemed to continue throughout the seven days of testimony in the bugging trial. Kaiser's attorneys repeatedly asked Ward to admonish Brereton for speaking with Assistant U.S. Attorney Benjamin White during cross examination. Brereton consulted with White before many questions were put to defense witnesses, and Kaiser's attorneys objected that the jury could overhear Brereton's comment's. Several times, Ward instructed Brereton to lower his voice when he spoke with the prosecutor. A part of Kaiser's affidavit on the FBI vendetta matter said that two special FBI agents visited him in December 1975 to interview him on his U S. Recording Co. testimony. Kaiser said the two "literally held me for several hours hostage... to elicit a statement which repudiated my earlier congressional testimony and absolved the Bureau and U.S. Recording Co. of their wrongdoing." The U.S. attorney's office filed a motion in federal court to deny Kaiser's allegations of a vendetta. Kaiser's trial will continue at 9:30 a.m. today, with final arguments and instructions to the jury scheduled. -------------------------------------------------------------------------------- Winston-Salem Journal Wednesday - February 22, 1978 Martin L. Kaiser has been found not guilty of bugging FBI agents, conspiracy and illegal transporting listening devices. The verdict was returned by a jury of eight women and four men after 2.5 hours of deliberation yesterday afternoon in U.S. Federal District Court here. Kaiser, an electronic surveillance expert from Cockeysville, MD, had been charged with helping Edwin Duncan Jr. and Gwen E. Bowers bug FBI agents who were investigating Northwestern Bank last year. Duncan, former bank board chairman, and Bowers, a former bank vice president, pleaded guilty to similar charges last November. The bugging took place between April and July 1977 in an office in the bank's headquarters in Wilkesboro. "In all honesty," Kaiser said after the verdict was announced, "it's what we expected. Needless to say I'm satisfied." Throughout the eight day trial Kaiser admitted installing bugging equipment in a bank office used by the FBI agents but denied knowing that Duncan and Bowers would use the equipment illegally. The government case contended that Kaiser was fully aware that bank employees would use the bugging system to illegally monitor the FBI investigation. "What this case is really about is human rights - the right to human privacy," said Assistant U.S. attorney Benjamin White in his final argument yesterday morning. "There is nothing illegal about him installing these devices - many attorneys have them in their offices, many businessmen have them in their offices," said John Morrow, ore of Kaiser's attorneys. Much of Kaiser's trial was marked by controversy over his past business dealings with the FBI. Kaiser, who is a major manufacturer of surveillance equipment for government agencies, filed a pretrial affidavit protesting that the FBI was seeking revenge against him. Kaiser said the FBI wanted vengeance because of testimony he gave before congressional panels on surveillance matters. He had identified an FBI front company that bought his equipment and resold it to the FBI and other government agencies at marked-up prices. Most of the defense witnesses were from law enforcement agencies, and most testified that Kaiser is reputable and trustworthy. Kaiser testified that at he Sells bugging equipment and bomb detection gear to more than 200 law enforcement groups. His clients, he said, include the ..., the Army and Air Force and several foreign governments. In his closing remarks, White questioned the nature of Kaiser's relations with his clients. After saying that Kaiser had once had the trust of law enforcement groups. White said, "Mr. Kaiser sold that trust, ladies and gentlemen, for $3,500 (Kaisers fee - for the Northwestern Bank bugging)." Shortly after the end of the trial, one of Kaiser's attorneys told reporters that Northwestern has never paid Kaiser's fee. "We hope we don't have to sue them to get it - they're a big bank," said Bernard Fensterwald, a Washington lawyer who once defended James McCord, one of the Watergate burglars. Kaiser said he plans to visit his daughter in Florida and then return to work. "I've really been out of business since July 29 (the date of his indictment)," he said. "I'm really looking forward to getting back to it." -------------------------------------------------------------------------------- The Sentinel Winston-Salem, NC Saturday, February 5, 1983 Defendants Claim Agents Abused Process GREENSBORO, NC - Two FBI agents abused the criminal process to strengthen their position in a $22 million lawsuit stemming from the 1977 investigation and bugging at Northwestern Bank lawyers for defendants in the suit charged in federal court yesterday. One defendant in the civil case also accused the FBI of tampering with evidence. In an affidavit, defendant Martin L. Kaiser, an Electronics expert from Cockeysville, MD., said bureau agents or, employees altered two tape recordings and switched tape recorders. He also claimed that one agent removed documents from FBI files which have never been recovered. The allegations were made during three hours of argument In U.S. Middle District Court Federal Judge Frank W. Bullock Jr. held a hearing on numerous motions pending in the case which began almost five years ago. In July 1978, FBI agents Thomas J. Brereton and Zachary T. Lowe filed suit alleging that their civil rights were violated and their privacy was invaded when their conversations were electronically recorded during their investigation of Northwestern Bank from April to July 1977. Brereton and Lowe charged that Edwin Duncan Jr., then Northwestern Bank chairman, and Gwen E. Bowers, then bank vice president, conspired to intercept the agents oral and telephone communications. They also claimed that Kaiser agreed to help Duncan and Bowers by possessing, selling, transporting, and installing electronic surveillance equipment or bugs to help them accomplish their sinister conspiratorial scheme." Northwestern Bank and Northwestern Financial Corp., the bank's holding company, also are defendants in the lawsuit. The agents discovered they were being recorded while they were investigating financial irregularities at the North Wilkesboro-based bank. Duncan was convicted of misapplying bank funds and recording conversations of IRS agents who were reviewing bank records in October 1977, and in November 1977, he pleaded guilty to the bugging conspiracy against the FBI. Bowers pleaded guilty to the conspiracy to record the FBI agents' conversations and to the actual bugging. However, Kaiser pleaded not guilty to charges related to the bugging and he was acquitted in federal court in Winston-Salem in February 1978. Since Brereton and Lowe's suit was filed, it has become one of the most complicated civil cases ever in the U.S. Middle District. Three Greensboro attorneys - Bynum N. Hunter, Michael R. Abel, and Ben F. Tennille, have been released as defendants, and the remaining defendants and the plaintiffs have filed pages and pages of motions' affidavits and cross claims. There also is a similar case filed by former FBI agent Donald G. Wilson for $5.5 million in damages from Duncan, Bowers, Northwestern Bank and Northwestern Financial. Lawyers for Duncan and Kaiser yesterday said Brereton and Lowe used the criminal investigation of their clients to prepare for their multi-million-dollar civil suit. "They were given access and power of the federal government they should not have been given," Stephen Spring, a Louisiana attorney representing Kaiser said. Duncan's attorney, Ted G. West, claimed that the former bank chairman Agreed to plead guilty to the bugging conspiracy during a meeting with Brereton and a former U.S. attorney. "We contend that Mr. Brereton and Mr. Lowe abused the process," West said. "That's what it boils down to in instigating a guilty plea from Mr. Duncan so they could have something to hang their hat on in this civil case." He also said, "This court must and should look closely at a situation where investigators of the U.S. government pursue their investigation knowing during the entire course of the investigation that they have a civil suit in mind". But Mike Bailey, one of Brereton's and Lowe's lawyers, said the agents were only fulfilling their obligations by investigating and helping prosecute the cases. Kaiser filed a $720,000 counterclaim against Brereton and Lowe in 1978 and last year he asked to add the FBI to his suit. He is seeking $10.7 million from the FBI. Kaiser claimed the bureau "actually assisted and enabled... Brereton and Lowe to gain access to Information and records while on bureau time and through bureau resources of information directly bearing to the outcome of the civil action." Duncan also has asked the court to allow him to add the FBI, a former U. S. attorney and a former assistant U.S. attorney to his cross-claim against Brereton and Lowe. However, Bullock questioned whether the statutory limitation on adding to the cross-claims has run out. Kaiser made other allegations against the FBI in his affidavit. He accused the bureau of fraudulently concealing and manufacturing evidence. The Panasonic tape recorder presented at his criminal trial played at one-third normal speed, Kaiser said, but he said the recorder being used as evidence in the civil case operated at one-fourth normal speed. He also said tests showed that two tape recordings of Brereton and Lowe were not made on the tape recorder provided to Northwestern Bank in 1977 and that the two tapes were made on two different recorders, he said. Kaiser said, "It is my belief based upon a review of tests that these modifications or manufacturing of evidence was performed by agents and/or employees of the Federal Bureau of Investigation as part of a conspiracy wherein the FBI acted in concert with plaintiffs Brereton and Lowe by attempting to convict me of a crime I did not commit ... and instituting the present civil suit as a retaliatory measure designed to drain me of funds necessarily spent in my defense." Kaiser further charged that Brereton took documents out of the FBI files and that the bureau claims those papers are lost. He also said Brereton made misrepresentations to a grand jury which led to Kaiser's indictment on charges related to the buggings Brereton did that Kaiser said, so he could use the criminal trial to gather evidence for the civil case. Duncan and Kaiser have filed motions for summary judgment and have asked for dismissal of the actions against them. Yesterday, attorneys for Northwestern Bank and Northwestern Financial Corp. also argued for summary judgment and dismissal. "The bank was the one who was losing from this illegal activity" not just the customers, The bank," Richard Vanore, Northwestern attorney, said. "Because (Duncan) benefited is not sufficient to say the bank benefited and should be held responsible for his action." He also charged that Brereton and Lowe are "seeking monetary damages as the real fruit of their criminal investigation" -------------------------------------------------------------------------------- The Sentinel Winston-Salem, NC Bugging Expert Adds FBI To His Suit Against Agents GREENSBORO, NC - A Maryland electronics expert is asking for more than $10 million in damages from the FBI, claiming that the agency as assisted two of its agents who were planning a lawsuit against him. Martin L. Kaiser specializes in electronic surveillance (bugging), counter-surveillance and bomb detection equipment says in a document filed in federal court here that agents Thomas J. Brereton and Zachary T. Lowe were contemplating a lawsuit against him while they were involved in prosecuting him on criminal charges. The FBI "actually assisted and enabled... Brereton and Lowe to gain access to information and records while on bureau time and through bureau resources of information directly bearing to the outcome of their proposed civil action", Kaiser claims. He says in the document which is an amendment to an earlier counterclaims against the agents, that the FBI's action represents a "malicious motive for the institution and prosecution" of the criminal case against him "in violation of federal statutes which require federal agents with a conflict of interest to excuse themselves from such investigation". Brereton and Lowe sued Kaiser in U. S. Middle District Court in July 1978, five months after he was found not guilty of charges of bugging them while they were conducting an investigation at Northwestern Bank in Wilkesboro in 1977. The agents also sued the bank and its former president Edwin Duncan Jr., claiming that their right to privacy was violated by the bugging of the room they were using at the bank head quarters. The agents claim a total of $22 million in damages. Several months later Kaiser filed a counterclaim against the agents claiming they abused the criminal process against him and asking for $720,000 in damages. The agents responded by denying that they had acted improperly in the criminal investigation and they asked for a dismissal of the counterclaim. Kaiser's addition to the counterclaims filed this week asks that the United States be brought into the suit to represent the FBI, and he asks for an additional $10.7 million in damages. U. S. Attorney Kenneth W. McAllister said this morning that "I certainly wouldn't comment on any pending civil actions". Duncan and the bank have filed motions for dismissal of the agents' suit, and Duncan has asked the court for permission to file his own counterclaim against the government and prosecutors in a 1977 criminal case against him. Duncan pleaded guilty to charges of conspiring to bug the agents. He spent several months in prison as the result of convictions on other charges stemming from the agents investigation. No trial dates have been set in the lawsuit, which has become one of the most complex civil cases now pending in the district. -------------------------------------------------------------------------------- The Daily Telegraph London, England Bugged FBI Men with Hemorrhoids Sue for 11 Million A telephone tapping expert who supplied the Federal Bureau of Investigation with electronic eavesdropping devices is being sued for alleged "bugging of two FBI agents." The agents, Thomas Brereton and Zachary Lowe, are claiming eleven million pounds compensation They say their right as private citizens were "grossly violated" and they are suing Mr. Martin Kaiser and a bank in North Carolina. They were investigating the bank's affairs after allegations that an executive was misusing funds, and according to Mr. Kaiser a vice president of the bank sought his assistance, wanting recorders installed to tape conversations and interviews in the bank involving the officers. Devices were provided, Mr. Kaiser said, on the understanding that the equipment would be used legally with the consent of the agents. The FBI men have now named him together with the bank in a lawsuit filed at Greensboro, North Carolina. In a court deposition Mr. Brereton tells of finding five bugging devices, including special transmitters and amplifiers, in the building. He recalled: "That night there was tremendous anger and frustration". He remembered one of the bank's executives sitting "smirking at me when he pulled all the mikes out of the wall. He went on: "You wouldn't believe the anger that took place in here that night when I found out... you go home and all you do is think about it." "You know you've been bugged... It keeps playing on your mind". As a result he was humiliated and embarrassed as a special agent and suffered, he said, increased hypertension and cysts in his eyes. His colleague said in his deposition that after the incident his hemorrhoid condition worsened. FBI AXIOM If you lie in a court of law and get away with it, it is called "JUSTICE." If you lie in a court of law and get caught, it is called "PERJURY." -------------------------------------------------------------------------------- Martin L. Kaiser in His Lab -------------------------------------------------------------------------------- Note: In certain government circles it is "understood" that Martin L. Kaiser inspired Francis Ford Coppola to write the manuscript for "The Conversation" back in the early seventies. Some of Marty's FBI Story formed the basis for the new Jerry Bruckheimer/Tony Scott film "Enemy of the State" starring Gene Hackman, Will Smith, John Voit and Regina King. -------------------------------------------------------------------------------- HOME [Non-text portions of this message have been removed] 4789 From: James M. Atkinson Date: Wed Feb 13, 2002 4:23pm Subject: Microsoft Settlement Decision Keeps Redmond from Monopolizing Massive Microsoft Patch Industry Redmond, Wash. (SatireWire.com) - In a surprise settlement today with nine U.S. states, Microsoft agreed to be split into two independent companies - one that will continue to make Microsoft operating systems, browsers, and server software, and another, potentially larger company that will make patches for Microsoft operating systems, browsers, and server software. Critics immediately charged that the settlement - which overrides a previous agreement with the U.S. Department of Justice - does nothing to diminish Microsoft's standing as the world's most powerful software company. But industry analysts argued that providing patches for security holes in Microsoft programs is a major, untapped growth industry, and applauded the states for not allowing Redmond to control it. "Just consider, Microsoft can make an operating system, such as Windows XP, and sell 200 million copies, but each one of those copies is going to need at least five patches to fix security holes, so that's 1 billion patches," said Gartner Group analyst Mitch Fershing. "That is an enormous, undeveloped market." Microsoft employees seem to agree, as sources in Redmond described a "mad scramble" among staffers to position themselves for spots at the new company, called Patchsoft. Asked why people would want to leave Microsoft for a startup, the source said the answer was "really quite simple." "Everyone here is asking themselves, 'Do I want to be part of the problem, or part of the solution?'" he said. But J.P. Morgan analyst Sherill Walk suspects another motive. "Considering the sheer number of patches we're talking about, I think the new company will become another monopoly, and I believe the people who've jumped ship very well know that." "Nonsense. It's really all about consumer choice," responded Patchsoft's new co-CEOs, Bill Gates and Steve Ballmer. But how will Patchsoft make money? Currently, Microsoft issues free patches for problems in Windows XP, SQL Server, Internet Explorer, Outlook, Windows 2000, Flight Simulator, Front Page, Windows Me, Media Player, Passport, NT Server, Windows 98, LAN Manager (for a complete list of MS software needing patches, see www.support.microsoft.com). Under the agreement, Microsoft will no longer issue patches, which Gates said explains the recent five-day outage at Microsoft's upgrade site. "That was planned," he said. "It was a test of the Microsoft No Patch Access system. Went perfectly. No one was able to download anything." At a press conference to outline the settlement, Connecticut Attorney General Richard Blumenthal pledged to keep a close eye on Patchsoft to ensure it would not overcharge for its services. He also expressed hope that other firms would soon become Certified Microsoft Patch Developers (CMPDs) and challenge the spin-off. Asked if Patchsoft, with so many former Microsoft employees, will have an advantage over potential competitors in the Microsoft patch market, Blumenthal said the settlement prohibits collaboration. "Patchsoft developers will not have any foreknowledge of bugs or security holes before software is released. They'll just have to be surprised," he said. "So it will be just like it was when they were at Microsoft," he added. One Reuters reporter, meanwhile, questioned the long-term viability of Patchsoft. "This seems like a logical split right now, but what if Microsoft's products improve to the extent that patches are needed less frequently, or perhaps not at all?" she asked. "I'm sorry, I can only respond to serious questions," Blumenthal answered. Copyright © 1999-2002, SatireWire. http://www.satirewire.com/news/jan02/patchsoft.shtml -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4790 From: James M. Atkinson Date: Wed Feb 13, 2002 5:58pm Subject: Comcast Admits To Spying on Customers http://www.osopinion.com/perl/story/16316.html Comcast Admits To Spying on Customers By Tim McDonald www.NewsFactor.com, Part of the NewsFactor Network February 13, 2002 Stored data can be subpoenaed by law enforcement officials or by lawyers in civil cases - and it can be stolen. Cable Internet giant Comcast (Nasdaq: CMCSK) reportedly has begun tracking the Web browsing habits of its customers, keeping records of every Web page they visit. The company has roughly 1 million high-speed Internet customers. The third largest cable TV company behind AT&T Cable and AOL Time Warner (NYSE: AOL), Comcast admitted that it stores the Internet Protocol (IP) addresses -- unique numeric Internet addresses assigned to subscribers -- along with the Internet address of every Web page subscribers visit. Jeffrey Chester of the Washington, D.C.-based Center for Digital Democracy, a nonprofit watchdog group, called the tracking "incredibly aggressive." "It's not a surprise they are tracking what people are doing, it's just the tip of the iceberg," Chester told NewsFactor. "The next generation of broadband services provided by Comcast and others allows for this kind of tracking. The whole business model moving forward for cable and the television industry generally is one which emulates the deeply personalized e-commerce strategies." Sensitive Information Comcast also said it stores sensitive information, such as credit card numbers and passwords, in a database managed by network infrastructure specialist Inktomi (Nasdaq: INKT). Stored data can be subpoenaed by law enforcement officials or lawyers in civil cases -- and, as has been proven several times, it can be stolen. For example, last week, a database with thousands of records involving potential Comcast Business Communication Internet customers was found exposed on the Web. Comcast said the snooping was part of a technological overhaul launched to save money, according to wire service reports. However, Inktomi, which sold the technology to Comcast, asserted that Comcast was collecting more information than was absolutely necessary for technological enhancements. Leading Role Comcast claimed the tracking is permitted in its service agreement with subscribers and said it does not intend to infringe on the privacy of its customers. The company would not say how long the information it collected was stored. A company spokesperson said that customers' Web browsing is being recorded in Detroit, Michigan, and parts of Delaware and Virginia, and that such tracking will spread across the United States by the end of this week. "Personalized television is really the cornerstone of the plan Comcast and others have for the convergence of television with the Internet in the broadband online medium," Chester said. "So, technologies are being deployed, strategies are being developed, investments are being made in hardware and software and applications all across the board -- and Comcast is playing the leading role in that regard." Excuse for Privacy Erosion? Some civil libertarian groups have openly expressed concern about the erosion of online privacy in the aftermath of the September 11th terrorist strikes. The FBI has been particularly aggressive in rooting out online evidence, serving ISPs with warrants under a 1978 antiterrorism law. "The privacy debate has been placed on the back burner, conveniently for companies like Comcast, because of the concern over security since September 11th," Chester said. "As this and other incidents will undoubtedly show, we need strong consumer safeguards when it comes to cable broadband." More Cities 'Digitized' Comcast announced a fourth-quarter net loss of US$321 million, due mainly to its costly effort to migrate customers from @Home, the broadband Internet service provider that recently filed for bankruptcy. The company has said it plans to add more high-speed Internet customers and is planning to spend $1.3 billion to get more cities "digitized." Comcast made a winning bid of $72 billion for AT&T Broadband in December. If the deal is approved by shareholders, the Federal Trade Commission and the Federal Communications Commission, it will result in the largest cable ISP in the United States, with 2.2 million high-speed Internet customers. The combined company would be called AT&T Comcast Corp. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4791 From: Aimee Farr Date: Thu Feb 14, 2002 9:28am Subject: Released "Dead Man's Stop" - Marty Marty wrote: > To this day I do not know which of the three > statements was read into the Congressional Record and... I do. But I'll take the "don't give a damn" as you don't want to know. I have a collection of the 70's Greatest Congressional Hits. It was the only way I could understand the law here, as lawyers often end up resorting to the congressional record for intent and meaning -- even though they rarely find it. ~Aimee 4792 From: James M. Atkinson Date: Thu Feb 14, 2002 0:09pm Subject: 1.5 to 18 GHz High Gain Horn Antenna I would encourage list members to check out the following product for use during the the microwave signals analysis segment of the sweep. While it's not a standard gain horn with a nice flat response curve, it should fit in well for those quick checks, and it blows away the dual ridged EMCO broadband horns. I would suggest having the factory fit the unit with an SMA connector and a dielectric bracket/cradle so you can put it on top of a tripod. Once you get the unit you can epoxy your own bore bore sites to the corners, and add a broadband LNA and power supply yourself. Also, when your at their site take a look at the standard gain products horns they offer... very inexpensive when compared to some to the $$ horns available in the US. -jma > >http://www.q-par.co.uk/pages/Broadband_Horns_high_gain.htm > > >1.5 to 18 GHz High Gain Horn Antenna > >This high gain high performance ridged waveguide horn, Model Number >6878/24H is ideal for EMI/RFI testing, EMC measurements, wide-band >spectrum surveillance or materials evaluation etc. The horn covers >frequencies used for PCN, PCS, GSM, GPS, direct to home satellite >broadcasting, and many others. It is especially useful for receiving >very low level signals or transmitting moderate power levels. The >horn can be used where a parabolic reflector antenna may have been >previously used to increase the gain, or where it is not practical >to install a wide band standard reflector antenna. This horn is >cheaper than an equivalent feed and reflector antenna assembly. > >Special techniques have been incorporated to prevent higher order >waveguide modes. The construction is a aluminium/plastic composite. >The horn comes with a specially designed weatherproof radome that >provides good protection against the elements but has very little >loss across the frequency band. > >A mounting bracket is shown that provides a useful way to set the >antenna in either Horizontal or Vertical polarisation. > > >Specification: > >Model >Number > 6878/24H > >Frequency1.5 to 18 GHz >Nominal GainVaries from 6 to 22 dB across the band >Nominal >Beamwidth >'H' plane varies from 46 - 6.5 degrees >'E' Plane varies from 40 - 9.5 degrees > >VSWR< 2:1 across the band >Constructionaluminium/plastic composite >Dimensions >620 x 160 x 160 mm approx. >i.e. 24.5 " x 6.3" x 6.3" > >Power50 Watts (c.w.) >ConnectorSMA or Type N (others available) >Weight2.6 kg (5.7 lbs) >Temperature-40 ∞C to +70 ∞C > > -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4793 From: John Savage Date: Thu Feb 14, 2002 2:21pm Subject: Homemade GPS Tracking System? Good Afternoon: I had a question asked to me awhile ago this afternoon and was wondering if anybody could lend their opinion. First of all, let me begin by saying that about a week ago, I saw the below information posted on another group... BUILD YOUR OWN GPS TRACKER !!!!! Here's a list of the necessary items to build one hell of a great system that beats all the rest. 1). Garman Etrex (as your receiver $80.00) 2). Etrex cigarette/power supply 9 pin cable $$15 - $27.00 depending on where you buy it. 3). Galls Uniform Supply JOTO DESK, $160.00 (for the computer stand in your car.) 4). Any standard laptop computer. 5). Power converter (best buy, Jensen, $80.00, two plug.) 6). Microsoft Streets and Trips 2002 $40.00 After this initial investment, it's free from now on and better than any over the counter system on the market. Simply plug in the waypoints (addresses) and hit the "Optimize" & "Route" buttons on Streets and Trips and the software routes you from where you are to where you want to be and all points in between as they fall closest to each other (cheapest and shortest.) Then I received the question below... I am interested in acquiring a GPS Tracking System and I have a laptop and a Garmin III GPS. I am wondering if it would be better to construct my own unit or to purchase one outright. I would appreciate any information you may have about it. Thanks and if you ever need anything, don't hesitate. (Also, I appreciate the time you've spent and currently spend on compiling information-it's been a help to me many times). Now , I too was wondering if it would be better to construct my own unit or to purchase one outright? What are the pros and cons in making your own GPS Tracking System? Thanks! John Lee Savage (LPIA) P.O. Box 634 Old Orchard Beach, ME 04064 TEL: 207-286-3945 FAX: 781-723-2551 ******************************************* Licensed by the Maine Department of Public Safety (Lic #373) ******************************************* Maine Notary Public ******************************************* National Association of Investigative Specialists (NAIS) ******************************************* Maine Licensed Private Investigators Association (MLPIA) www.mlpia.org ******************************************* MLPIA Internet Committee ******************************************* Moderator of the "MLPIA Network" ******************************************* --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.323 / Virus Database: 180 - Release Date: 2/8/02 4794 From: Steve Uhrig Date: Thu Feb 14, 2002 3:08pm Subject: Re: Homemade GPS Tracking System? Once upon a midnight dreary, John Savage pondered, weak and weary: > Now , I too was wondering if it would be better to construct my own unit > or to purchase one outright? What are the pros and cons in making your own > GPS Tracking System? If you mean a device to assist you in determining the location of a vehicle under surveillance, I can't believe this is a serious question. The cons are, they don't work. After that, the pros don't matter. There is a place for electronics as a hobby, then there is a place for leaving things to professionals. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4795 From: Hawkspirit Date: Thu Feb 14, 2002 6:54pm Subject: Photo Radar Countermeasures Anyone know about these photo radar countermeasure products? http://www.specterguard.com/ http://www.jamradar.com/ 4796 From: Justin T. Fanning Date: Thu Feb 14, 2002 7:01pm Subject: Re: Photo Radar Countermeasures Since the inception of photo enforcement products I have been hearing crazy stories like bake your licence plates in an oven and it reduces their reflactiveness etc. Almost without exception, most of the products in this field are snake oil. The UK police did several tests with the licence plate covers and also with the "special" licence plates themselves (in the UK you make your own licence plates, the state only supplies you the plate details, then you have to privately arrange to have the plate made). The UK police using a real GATSO photo radar setup, found them all to be snake oil. I'll try and dig up the web site for you. The active RF jammers would be more effective, but totally illegal and a sinch to detect even using a primative tool like a radar detector. Active laser jamming is still legal in most countries from a technical prospective, but could be argued as interfering with police operations. I've heard varying reports of it's effectiveness. Personally the thought of cars driving around with high power laser light spewing out into the eyes of oncoming traffic quite disturbing. The most effective product I have seen is also the simplest, a slave flash repeater. The flash on the camera is very powerful as it's designed to light under a truck's tray, or in the case of a red light camera, designed to light a whole intersection. A slave flash repeater is a professional photography tool used to trigger multiple flash units to light a subject from many angles at once. The flash units are trigged by the light from the master flash. As you would imagine, in a traffic situation, the enforcement camera flashes the car, the car simultaneously flashes the enforcement camera. You can find real GATSO photo radar images of this kind of thing if you search hard enough. Even this is now being worked around by the use of IR film and digital camera's that can rapidly adjust to the incoming light and other conditions. I've heard a rumour of an LCD style plate cover also, when it see's a flash it was said to go all dark momentarily, I've never actually seen one so can't comment. Hope this helps, be careful your _deep_ into snake oil country! JF --- Hawkspirit wrote: > > Anyone know about these photo radar countermeasure products? > > http://www.specterguard.com/ > > http://www.jamradar.com/ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4797 From: James M. Atkinson Date: Thu Feb 14, 2002 7:38pm Subject: Re: Photo Radar Countermeasures At 4:54 PM -0800 2/14/02, Hawkspirit wrote: >Anyone know about these photo radar countermeasure products? > >http://www.specterguard.com/ > >http://www.jamradar.com/ The foolproof countermeasure is simply not to speed. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4798 From: Steve Uhrig Date: Thu Feb 14, 2002 11:39pm Subject: A new record A new record has been set. This week I referred seven people to the following website in lieu of using my services: http://zapatopi.net/afdb.html We should start a new group effort, charting calls from lunatics with the phase of the moon. I bet we'd eventually see a pattern once we had a large enough database. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4799 From: David Alexander Date: Fri Feb 15, 2002 4:53am Subject: re: Microsoft settlement Jim It gets better than that: Most of this lifted from an article in Infoworld - all rights acknowledged. If you check the fine print in Microsoft's new licensing agreement it permits access to your computer at will The clause is contained in the Product Use Rights (PUR) document that can be found at www.microsoft.com/licensing/resources. As the PUR document is part of most customers' volume license agreements and is subject to periodic change, in theory Microsoft customers should check it regularly to see what rights Microsoft has decided to grant or take away. Fortunately, one Microsoft customer did review the PUR document recently and noticed a change. In the section on Windows XP Professional, he found the "Internet-Based Services Components" paragraph that said in part, "You acknowledge and agree that Microsoft may automatically check the version of the Product and/or its components that you are utilizing and may provide upgrades or fixes to the Product that will be automatically downloaded to your Workstation Computer." By changing that term in the PUR, Microsoft has found a creative way to obtain authorization from users to access their workstations at will. The sucker punch is that all the risk for the security and privacy violations due to this are neatly put on the customer's shoulders, not Microsoft's." The most obvious concern is the damage the most benign of automatic OS upgrades could cause in a corporate environment, or that someone could hack the system and upload a backdoor monitoring tool - either of data or to activate the microphone on the PC. As an IT person, the idea that Microsoft can change software without notifying anyone is totally unacceptable. Fortunately I don't think this is enforceable in Europe, due to our privacy laws. But is suspect that this 'right to access' to computers would force some companies into non-compliance with government security guidelines and various privacy laws. This concern was exacerbated by additional PUR language in the same Windows XP section. In terms of "Security Updates," users grant Microsoft the right to download updates to Microsoft's DRM (Digital Rights Management) technology to protect the intellectual property rights of "Secured Content" providers. It says Microsoft may "download onto your computer such security updates that a secure content owner has requested that MS, Microsoft Corporation, or their subsidiaries distribute." In other words, it would seem Microsoft's idea of a security update is one that protects the property rights of vendors, not the security of customers' systems. It is possible (I suggest mandatory) to turn off Windows Auto-Update. If it is indeed Microsoft's intent to continue giving users the right to decline downloads, why has the company written its XP agreements to force users to explicitly surrender that right? Are customers supposed to ignore what the licenses say and just hope Microsoft won't ever do what the terms say it can do? That's not a concept that will make anyone other than Bill Gates feel very secure. _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4800 From: Michael Puchol Date: Fri Feb 15, 2002 3:11am Subject: Re: Photo Radar Countermeasures Very well said. In Spain, until last week, police had to pull you over after taking your picture with a radar trap, to positively identify you and give you the ticket - this meant only about 10% of pics taken were notified. Now, the laws have been changed, allowing a picture alone to prove you were speeding, thus allowing instalation of fixed speed traps. In the first day of the new law's life, on a particular stretch of road, some 1600 pictures were taken.... Of course, installation of any kind of device which has a primary function of avoiding speed traps is prohibited, punished with heavy fines - that would include any sort of laser detector or jammer, counter-reflective flash, weird license plates (which are State-made anyway), etc. In my particular experience a few years back, which included testing a few of these radar detectors with a local manufacturer of speed trap radar systems, most (to be gentle) of them were totally ineffective. They rely on reflections from traffic signals (large ones), trucks, cars, etc. On an open road, with no signs or traffic, you are not going to detect the signal in time. Some time after this, on another mailing list a heated debate sprang up regarding the detectability of such detectors by the radar operator (pardon the redundance). The theory was that most of these detectors generate a large amount of reflected RF, which could be detected by a radar system equipped to do so - has anyone any insights into this, and wether it is being applied? Cheers, Mike ----- Original Message ----- From: "James M. Atkinson" To: Sent: Friday, February 15, 2002 2:38 AM Subject: Re: [TSCM-L] Photo Radar Countermeasures > At 4:54 PM -0800 2/14/02, Hawkspirit wrote: > >Anyone know about these photo radar countermeasure products? > > > >http://www.specterguard.com/ > > > >http://www.jamradar.com/ > > > The foolproof countermeasure is simply not to speed. > > -jma > -- > > -------------------------------------------------------------------------- ------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------- ------------------------ > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > -------------------------------------------------------------------------- ------------------------ > People sleep peaceably in their beds at night only because rough > men stand ready to do violence on their behalf. - George Orwell > ------------------------------------------------------------------------ -------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 4801 From: Fernando Martins Date: Fri Feb 15, 2002 1:15am Subject: RE: Photo Radar Countermeasures The only crazy story I know about photo radar contermeasures is the one related to Nokia cellphone. I didn't find a link in english, so here's the short version, if I still remember this well ... In GSM cellphones from Nokia using ... Definitions -> Security Definitions -> Restrict Group -> Active -> 00000 -> OK ... A little symbol will appear on the screen. Configuring the phone like this, when one is near a radar the phone acts as it is receiving a call, and that was the alarm to not cross the speed limit. The supposed explanation is that it got to do with Nokia radars that somehow were sensitive to Nokia cellphones. What I can say is that about 2/3 years ago when this was on the news here in Portugal, I had 2 Nokias at the time (GSM 1800) 8210 and 6215 if I can remember right, and it seems that there was also some Nokia radars around the country. People said that sometimes the phones rings. Personaly I don't remember if after receiving a call a radar (or a police car with one) was near, anyway I don't drive too fast and always in the limit of what the car can handle in safety :> FM > -----Original Message----- > From: Justin T. Fanning [mailto:Justin@f...] > Sent: sexta-feira, 15 de Fevereiro de 2002 1:01 > To: Hawkspirit > Cc: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] Photo Radar Countermeasures > > > > Since the inception of photo enforcement products I have been > hearing crazy stories like bake your licence plates in an > oven and it reduces their reflactiveness etc. > > Almost without exception, most of the products in this field > are snake oil. The UK police did several tests with the > licence plate covers and also with the "special" licence > plates themselves (in the UK you make your own licence > plates, the state only supplies you the plate details, then > you have to privately arrange to have the plate made). The > UK police using a real GATSO photo radar setup, found them > all to be snake oil. I'll try and dig up the web site for you. > > The active RF jammers would be more effective, but totally > illegal and a sinch to detect even using a primative tool > like a radar detector. Active laser jamming is still legal in > most countries from a technical prospective, but could be > argued as interfering with police operations. I've heard > varying reports of it's effectiveness. Personally the > thought of cars driving around with high power laser light > spewing out into the eyes of oncoming traffic quite disturbing. > > The most effective product I have seen is also the simplest, > a slave flash repeater. The flash on the camera is very > powerful as it's designed to light under a truck's tray, or > in the case of a red light camera, designed to light a whole > intersection. A slave flash repeater is a professional > photography tool used to trigger multiple flash units to > light a subject from many angles at once. The flash units > are trigged by the light from the master flash. As you would > imagine, in a traffic situation, the enforcement camera > flashes the car, the car simultaneously flashes the > enforcement camera. You can find real GATSO photo radar > images of this kind of thing if you search hard enough. Even > this is now being worked around by the use of IR film and > digital camera's that can rapidly adjust to the incoming > light and other conditions. I've heard a rumour of an LCD > style plate cover also, when it see's a flash it was said to > go all dark momentarily, I've never actually seen one so > can't comment. > > Hope this helps, be careful your _deep_ into snake oil country! > > > JF > > --- > > Hawkspirit wrote: > > > > Anyone know about these photo radar countermeasure products? > > > > http://www.specterguard.com/ > > > > http://www.jamradar.com/ > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, the > > hands acquire shaking, the shaking is a warning. It is by caffeine > > alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to > > http://docs.yahoo.com/info/terms/ > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> Sponsored by VeriSign - The Value > of Trust Pinpoint the right security solution for your > company - FREE Guide from industry leader VeriSign gives you > all the facts. > http://us.click.yahoo.com/lWSNbC/WdiDAA/yigFAA> /kgFolB/TM > > > -------------------------------------------------------------- > -------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire > speed, the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > 4802 From: James M. Atkinson Date: Fri Feb 15, 2002 8:29am Subject: Spy Charges for Air Force Retiree Spy Charges for Air Force Retiree By TED BRIDIS Associated Press Writer Arizona Republic February 15, 2002 WASHINGTON (AP) - A retired Air Force sergeant with thousands of dollars in debts sought $13 million from Iraqi President Saddam Hussein in exchange for sensitive U.S. military secrets, and also offered to spy for Libya and China, the government says. Bitter over ``the small pension I will receive for all of the years of service,'' Brian Patrick Regan allegedly wrote to Saddam that the payment demand was a ``small price to pay,'' the government said Thursday as it lodged new criminal charges in the government's latest espionage case. Regan, 39, could face the death penalty. A grand jury in Alexandria, Va., indicted him Thursday on three counts of attempted espionage and one of gathering national defense information. He was previously indicted in October on a single espionage charge, although it did not specify whom authorities suspected him of spying for. Regan previously pleaded innocent to the charge in federal court, and he was scheduled to be arraigned Friday on the latest charges. Deputy U.S. Attorney General Larry Thompson declined to say whether Regan turned over any secret or otherwise classified information to foreign governments. Thompson also declined to say whether Regan actually delivered the letter he is accused of writing to Saddam. But the indictment indicated that Regan in June flew to Berlin and possibly Munich before returning to Washington seven days later, and the trip was ``not in connection with any official duties.'' Prosecutors said Regan wrote personally to Saddam sometime between 1999 and 2001 and asked for $13 million in Swiss currency to provide information about U.S. satellites and other military secrets. Prosecutors said he offered to send a sample of secrets for $1 million, and offered additional information afterward for $3 million and $5 million payments. ``There are many people from movie stars to (athletes) in the U.S. who are receiving tens of millions of dollars a year for their trivial contributions,'' Regan allegedly wrote, falsely describing himself as a CIA officer near retirement. ``If I am going to risk my life and the future of my family, I am going to get paid a fair price.'' Court records indicated that Regan carried debts of at least $53,000 earlier this year, and he told a federal judge in November that he could not afford to hire a lawyer. Regan allegedly described the demand to Iraq for $13 million as ``a small price to pay to have someone within the heart of (a) U.S. intelligence agency providing you with vital secrets.'' The letter said the information being offered was worth ``billions'' and ``worth many times what I am requesting.'' Thursday's indictment also accused Regan of writing a nearly identical letter to Libyan leader Moammar Gadhafi between August 2000 and August 2001, but it apparently did not include demands for payment. That letter offered Gadhafi ``top secret'' information about satellites, early warning systems and overall U.S. defense strategies, prosecutors said. It wasn't immediately clear how investigators found the letters that Regan allegedly wrote, though court records said computer files were recovered at his home in Bowie, Md., where he lived with his wife and children, on the day of his arrest Aug. 23. U.S. officials have said Regan worked at the National Reconnaissance Office in Chantilly, Va., a U.S. intelligence agency that designs, builds and operates the nation's vast network of spy satellites. He worked at the NRO from July 1995 until his arrest - first in the Air Force, then as a defense contractor for TRW Inc. beginning in October 2000. Prosecutors said that shortly after he returned from Germany in July, he began repeatedly logging into the government's classified ``Intelink'' computer network and searching for information - including satellite photos - of military facilities in Iraq, Iran, Libya and China, even though those countries were not related to his official duties at TRW. From Aug. 6 to his arrest, officials said he logged into the system every day, Monday through Thursday, when he was in the office. But FBI spy-catchers, alerted by then to what they described as his suspicious behavior, were watching Regan on secret video cameras during some of the times he used Intelink, officials said. Wary of falling into an FBI counterespionage trap, prosecutors said, Regan also demanded that Iraq subtly alter its official Web site on computers run by the United Nations - and place an ad in The Washington Post for a 1996 Acura sports car - as proof that Iraqi officials were cooperating. That is similar to the case involving Robert Hanssen, the FBI agent arrested last February and convicted of spying for the Russians from 1985 to 2001. Court records said Hanssen instructed the Russians to place an ad in The Washington Times in July 1986 for a 1971 Dodge Diplomat as a signal of readiness to exchange secrets. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- From: Steve Uhrig Date: Mon Feb 10, 2003 4:33pm Subject: Re: Unknown modulation On 10 Feb 2003 at 17:21, kondrak wrote: > I believe the tipoff is the 135% negative modulation. Its broadcast > AM. Ot someone trying awfully hard to sound broadcast, er.."quality".. Good call. I totally overlooked that. The latter makes more sense, maybe a good buddy. I would think commercial stations would have competent engineers, test equipment and requirements for spectral purity. Demodulating it would tell the story. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6904 From: Kirk Adirim Date: Tue Feb 11, 2003 3:28am Subject: re: Unknown modulation No mystery here as to what kind of modulation, the first sentence in the first paragraph tells you it's a commercial A.M. station. Quote "The waveforms taken on this page were all taken from the outputs of one or other of the two modulators fitted to Radio Carolines BTA-50H Ampliphase transmitter". Anybody in the broadcasting industry, SWL, european and over 35, or knows anything about pirate radio or "black broadcasting" knows Radio Caroline. Radio Caroline is an A.M. broadcast transmitter in England, used to be a pirate radio station back in the 60's. The author included a Banner Ad that links you to the Radio Caroline site and it's A.M. broadcasting history. Pretty clear to me. [Non-text portions of this message have been removed] 6905 From: Andre Holmes <1ach@g...> Date: Tue Feb 11, 2003 6:05am Subject: Re: Re: Unknown modulation Greetings I plucked a signal at 32 Mhz it was modulated AC sine wave but was extremely bunched up on other occasions the AC sine wave is spread. I could not get audio and did not try any other receivers. The Carrier is a first for this area I always keep tabs on everything around the Cincinnati Ohio area. There are CBers out here communicating outside of protocol, they use no handle and they surveil peoples directions in travel at 23 Mhz. I picked them up using a Kaiser 2044 Mobil. There is CB antenna on every other house out here. I have read somewhere that the FBI is using a public band 0-50 Mhz. That could have been there transmittion. I did pick a transmittion up once but its rare to see the 30 Mhz range in use out here and there. Sorry I could not get to you sooner you know work and all. ANDRE HOLMES. ----- Original Message ----- From: "Steve Uhrig" To: Sent: Monday, February 10, 2003 10:59 AM Subject: [TSCM-L] Re: Unknown modulation > On 9 Feb 2003 at 12:04, Andre Holmes wrote: > > > I was tuning my SA and ran across some modulations that I never seen > > before, so I started surveying some mod-schemes heres a start of my > > search. > > Do you live near: > > 1) An AM radio broadcast station? > > 2) A ham radio operator (within a block or two?). You frequently can > identify them by towers and large directional antennas. > > 3) A CB operator maybe running illegal high power? Or within a few > hundred feet of one running legal power? > > What you have described from the other website is signals from a pure > textbook AM transmitter. I listed above the most likely sources, but > there can be others. > > Do you hear anything when you try to demodulate the signal? That will > tell you for sure what it is. If it sounds like Donald Duck, it's > single sideband which most likely would be CB or amateur (ham). > > What you are seeing is the 'modulation envelope'. Straight out of the > textbook. > > Extremely unlikely to be hostile transmissions. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 6906 From: Hawkspirit Date: Tue Feb 11, 2003 11:03am Subject: Sweep needed Residential sweep needed near Milwaukee Wisconsin, please contact me off list Roger Tolces Electronic Securtity 6907 From: Hawkspirit Date: Tue Feb 11, 2003 11:07am Subject: Sweep Needed Automobile sweep needed in Atlanta, please contact me off list. Roger Tolces Electronic Security 6908 From: kondrak Date: Tue Feb 11, 2003 0:45pm Subject: Re: Re: Unknown modulation Well, IF its a CB'er, he's got a 'precisely' proper negative modulation component. I find this type of equipment (CB and outbander) to be far from precise, as they're usually cobbled together by someone with the intent of a whomping signal, and little regard for modulation quality. On the other hand, a broadcast station makes careful adjustments to achieve around a 130-135% negative modulation for a tradeoff between audio power and "prescence" and spectral purity requirements. Sure, the guy might of hit it right, but I seriously doubt it... And Yes, I concur, get a sample on a modulation analyzer and a SA and see what it says.... At 17:33 2/10/03 -0500, you wrote: >On 10 Feb 2003 at 17:21, kondrak wrote: > > > I believe the tipoff is the 135% negative modulation. Its broadcast > > AM. Ot someone trying awfully hard to sound broadcast, er.."quality".. > >Good call. I totally overlooked that. > >The latter makes more sense, maybe a good buddy. I would think >commercial stations would have competent engineers, test equipment >and requirements for spectral purity. > >Demodulating it would tell the story. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6909 From: kondrak Date: Tue Feb 11, 2003 1:25pm Subject: Fwd: [ISN] Taking byte from Baghdad > > >http://www.gomemphis.com/mca/opinion_columnists/article/0,1426,MCA_539_1726690,00.html > >Gary Pounder >February 9, 2003 > >Although President Bush hasn't made a final decision about going to >war with Iraq, preparations for that potential conflict are almost >complete. Thousands of American troops have been deployed to the >Middle East in recent weeks, along with dozens of warships and >hundreds of combat aircraft. > >These preparations have been highly publicized, with daily pictures of >departing aircraft, naval vessels and military personnel, all designed >to convey a final warning to Saddam Hussein. But preparations for war >also are under way in less-visible areas. > >If Bush gives the order to attack Iraq, U.S. forces will initiate >information operations (IO) as part of their overall military >strategy. Aimed at disrupting Iraqi information systems, the expected >"information war" may represent the ultimate technology weapon in what >will be a high-tech campaign. > >Details of this war are almost nonexistent. Although the Pentagon has >spent billions of dollars on IO since the early 1990s, it has said >little about its capabilities in this area. > >What is known is that this investment has fostered the development of >highly specialized IO units, doctrine and tactics. Gen. Tommy Franks, >commander of U.S. forces in the Persian Gulf region, has his own team >of IO specialists. > >Although IO is sometimes described in terms of computer attack or >cyber-warfare, it covers a variety of functions related to the use and >protection of information and information systems. The rationale >behind IO is simple: deny the enemy use of the information spectrum, >while protecting our own information assets. > >IO includes several disciplines that are almost as old as warfare >itself: intelligence collection, deception, psychological operations. >It also incorporates newer technologies, exploiting advances from the >information revolution of the past 20 years. > >Cyber-attack is one of the most intriguing and useful new tools of >information warfare. Because of the explosion of computer networks and >the Internet, it is now possible to gain access to information systems >that support an enemy's economy or military forces. Disrupting these >systems can wreak havoc with an adversary's war machine, potentially >shortening the war and reducing the number of allied casualties. > >The United States displayed the benefits of a computer war in the 1991 >Gulf War, when it conducted its first cyber-attack on Iraq's air >defense system. The highly automated system (nicknamed KARI) linked >Iraqi surface-to-air missiles and anti-aircraft guns in a computerized >command-and-control network. > >The KARI system could withstand air attacks reliably and still provide >critical information to Iraqi air defense commanders. Neutralizing >KARI was deemed essential to the allied air campaign. > >IO experts decided to attack KARI internally and externally. Allied >electronic warfare aircraft would jam and bomb KARI components, while >specially designed computer viruses would infect the system from >within. Agents inserted the virus in a printer shipped to an Iraqi air >defense site. > >The virus also was introduced via a fiber optic cable that connected >air defense nodes. A Special Forces unit infiltrated Iraq, dug up the >cable and inserted the virus. It remained dormant until the opening >moments of the air war, when it went active and crippled KARI. The >Iraqi air defense system never recovered, and allied losses in the air >campaign were minimal. > >Since the Gulf War, IO tacticians have added to their target lists >economic and infrastructure systems that support an enemy's ability to >fight: power grids, water supplies, banking networks. There are >unconfirmed reports that cyber-attacks helped shut down the Serb power >grid during the 1999 Balkans War. Information operations also have >been used in the war on terrorism to ferret out al-Qaida bank >accounts, trace financial transactions and identify potential >operatives. > >Officially, the Pentagon won't say what level of IO planning and >preparation is under way, but there are vague hints about what might >be in store for Baghdad. Several media outlets reported last month >that the United States was sending E-mail messages to Iraqi military >commanders, urging them not to fight if war breaks out. > >In a police state such as Iraq, E-mail directories are classified >material, off limits to anyone outside the military and security >establishment. Our ability to send E-mail to Iraqi generals suggest IO >teams have identified key computer networks, earmarking them for >potential disruption or destruction. > >There is a good chance the cyber-battle will spread beyond Iraqi >information systems. If the United States launches military action >against Baghdad, we can expect a vicious "war" between Middle Eastern >and western computer hackers. > >Remember the 2001 "spy plane" incident between the United States and >China? That relatively minor episode prompted a month-long >confrontation between American and Chinese hackers that resulted in >the defacement of thousands of Web sites around the world. > >A hacker war emerging from a new conflict with Iraq would be even more >intense, likely unleashing new computer viruses, denial-of-service >attacks aimed primarily at Internet providers and Web site >defacements. The potential cost of such a war could be staggering. > >The United States is not alone in developing information operations as >a tool of war. Although Iraq's IO capabilities in this area are >rudimentary, other potential adversaries - notably China - are >investing heavily in information warfare. More-sophisticated enemies >would have no qualms about mounting an IO campaign against us. > >As the most "wired" nation on Earth, the United States has the >greatest vulnerability to information attack. Although our government >and private companies have invested heavily in computer security, the >recent virus that disabled thousands of automated teller machines >illustrates the potential impact of even small-scale cyber-attacks. >The forces about to be unleashed on Saddam Hussein may be used against >us in the future. > > >Guest columnist Gary Pounder is a retired U.S. Air Force intelligence >officer who lives in Oxford, Miss. 6910 From: Steve Uhrig Date: Tue Feb 11, 2003 1:33pm Subject: Taking byte from Baghdad On 11 Feb 2003 at 14:25, kondrak wrote: > >Although President Bush hasn't made a final decision about going to > >war with Iraq, preparations for that potential conflict are almost > >complete. Thousands of American troops have been deployed to the > >Middle East in recent weeks, along with dozens of warships and > >hundreds of combat aircraft. Lot of US Mil traffic on 11.175 USB including some relays from UHF aircraft AM. All in the clear. Relatively weak and sporadic, but perfectly copyable here in MD with a decent tuned wire outside antenna and kit receiver. Periodically interesting. That is the primary interagency coordination channel. You're likely to hear almost anything there. May go hours with no traffic, then bursts of activity for an hour. Freq picked to be OK worldwide both daytime and night time. Reception depends a bit on the day's propogation. We're currently just coming down off the peak of an 11 year sunspot cycle, so HF worldwide is possible with excellent signals and low power. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6911 From: Fernando Martins Date: Tue Feb 11, 2003 2:42pm Subject: Re: Taking byte from Baghdad That issue remind me other ... COIAS - Converge Internet-ATM-Satellite If anyone is aware, was this just a study or it became used in aeronautical communications? FM ----- Original Message ----- From: "Steve Uhrig" To: Sent: Tuesday, February 11, 2003 7:33 PM Subject: [TSCM-L] Taking byte from Baghdad > On 11 Feb 2003 at 14:25, kondrak wrote: > > > >Although President Bush hasn't made a final decision about going to > > >war with Iraq, preparations for that potential conflict are almost > > >complete. Thousands of American troops have been deployed to the > > >Middle East in recent weeks, along with dozens of warships and > > >hundreds of combat aircraft. > > Lot of US Mil traffic on 11.175 USB including some relays from UHF > aircraft AM. All in the clear. Relatively weak and sporadic, but > perfectly copyable here in MD with a decent tuned wire outside > antenna and kit receiver. Periodically interesting. That is the > primary interagency coordination channel. You're likely to hear > almost anything there. May go hours with no traffic, then bursts of > activity for an hour. Freq picked to be OK worldwide both daytime and > night time. Reception depends a bit on the day's propogation. We're > currently just coming down off the peak of an 11 year sunspot cycle, > so HF worldwide is possible with excellent signals and low power. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6912 From: Paolo Sfriso Date: Wed Feb 12, 2003 4:45am Subject: Microtel Surveillance Recievers Dear Colleagues. I have recently seen for sale a MICROTEL MSR-904A Surveillance Receiver. Does anybody have experience with this piece of equipment and what are your opinions on its use for TSCM (particularly in the 2-18 GHz band). Kind Regards. Your Italian Connection. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... info@g... [Non-text portions of this message have been removed] 6913 From: James M. Atkinson Date: Wed Feb 12, 2003 5:48am Subject: Re: Microtel Surveillance Recievers They are nice units, but are way, way out of date. Virtually impossible to obtain parts, very high noise figure (so you lose you signal), and most units lack the dual Sub Carrier mod, and the video module. -jma At 11:45 AM +0100 2/12/03, Paolo Sfriso wrote: >Dear Colleagues. > >I have recently seen for sale a MICROTEL MSR-904A Surveillance Receiver. > >Does anybody have experience with this piece of equipment and what >are your opinions on its use for TSCM (particularly in the 2-18 GHz >band). > >Kind Regards. > >Your Italian Connection. > >Paul Sfriso >Director >GRUPPO S.I.T. >Security, Investigations & Technology >Quarto d'Altino, Venice >ITALY > >phone +39 0422 828517 >fax +39 0422 823224 >24hr GSM cellphone +39 335 5257308 >www.grupposit.com >paulsfriso@t... >info@g... > > > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6914 From: A Grudko Date: Wed Feb 12, 2003 10:41am Subject: Re: Taking byte from Baghdad - Original Message - From: Steve Uhrig > Lot of US Mil traffic on 11.175 USB including some relays from UHF > aircraft AM. All in the clear. Relatively weak and sporadic, but > perfectly copyable here in MD with a decent tuned wire outside > antenna and kit receiver. Thanks for that - I'm getting a usable signal here on the southern tip of Africa. But the unsociable buggers don't answer me even if I put on an American accent and use the callsign Airforce One... Just kidding - I'm listening on about 10 metres of untuned wire. Andy Grudko (British), Grad I.S, South Africa SIRA investigators Reg. No. 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 6915 From: Hawkspirit Date: Thu Feb 13, 2003 10:19am Subject: Re: Digest Number 1189 Parts are available from the manufacturer or should I say the company who took over Microtel, also the service manual lists oem sources on parts, anyone needing that info let me know and I will look it up. Also this unit runs circles around the newer digital units for resolution and seeing short duration R.F. spiked transmissions (burst bugs). Roger Tolces Electronic Security Co www.bugsweeps.com At 11:29 AM 2/13/03 +0000, you wrote: > Date: Wed, 12 Feb 2003 06:48:07 -0500 > From: "James M. Atkinson" >Subject: Re: Microtel Surveillance Recievers > >They are nice units, but are way, way out of date. > >Virtually impossible to obtain parts, very high noise figure (so you >lose you signal), and most units lack the dual Sub Carrier mod, and >the video module. > >-jma > > 6916 From: Paolo Sfriso Date: Fri Feb 14, 2003 5:01am Subject: New editions of the CODE MANUAL and the INTELLIGENCE AND SECRET SERVI Dear Colleagues. Following Email was received today from Klingenfuss: ----- Original Message ----- From: "Joerg Klingenfuss" To: Sent: Friday, February 14, 2003 11:46 AM Subject: New editions of the CODE MANUAL and the INTELLIGENCE AND SECRET SERVI Dear friends, we will soon publish a new edition of our famous RADIO DATA CODE MANUAL. The handbook will have more than 600 pages with 265 fascinating new screenshots and details on --- state-of-the-art digital data transmission systems such as ACARS ALE ALF-RDS ALIS ALIS-2 ARQ-E ARQ-E3 ARQ-M ASCII BULG-ASCII Chirp Sounders CIS-36 MFSK Clover Clover-2 Clover-2000 CODAN Coquelet DGPS DSC DUP-ARQ DUP-ARQ-2 DUP-FEC-2 FAX FEC-A G-TOR GW-CLOVER GW-PACTOR HFDL ICAO-SELCAL ITA2 MFSK-8 MFSK-16 MSI NAVTEX Packet Radio PACTOR PACTOR-2 PACTOR-2-FEC PACTOR-3 Piccolo POL-ARQ PSK-31 PSK-63F PSK-125F RUM-FEC SITOR SP-14 T-PLEX TWINPLEX; --- Military modem standards MIL-STD-188-110A MIL-STD-188-110B (Appendix B) MIL-STD-188-110B (Appendix C) MIL-STD-188-110B (Appendix F) MIL-STD-188-141A MIL-STD-188-141B (Appendix C) MIL-STD-188-203A-1 MIL-STD-188-203-3 MIL-STD-188-212 STANAG 4198 STANAG 4285 STANAG 4415 STANAG 4481 STANAG 4529 STANAG 4538 STANAG 4539 STANAG 4591 STANAG 5031 STANAG 5035 STANAG 5066 TADIL-A TADIL-B TADIL-C; --- teleprinter alphabets Arabic ATU-Arabic Chinese Cyrillic Latin Third-shift Cyrillic --- Unicode tables for Arabic Armenian Assamese Azerbaijani Bengali Bopomofo Burmese Chinese Cyrillic Ethiopic Farsi Georgian Greek Gujarati Gurmukhi Hebrew Hindi Japanese Kannada Khmer Korean Lao Latin Malayalam Mongolian Oriya Punjabi Sinhalese Tamil Telugu Thai Tibetan Vietnamese; --- latest versions of major meteorological codes AIREP AMDAR ARFOR BATHY METAR SPECI PILOT PILOT MOBIL PILOT SHIP ROFOR SHIP SYNOP SYNOP MOBIL TAF TEMP TEMP DROP TEMP MOBIL TEMP SHIP TESAC TRACKOB WINTEM; --- thousands of new WMO index numbers of observing stations particularly in Antarctic Argentina Armenia Australia Austria Brazil Canada China France Indonesia Kazakhstan Korea Oman Pakistan Romania Saudi Arabia Sweden Thailand Timor United Kingdom. This list is much more correct than the original WMO list that has many writing errors and omissions; --- thousands of new ICAO location indicators particularly in Albania Antarctic Austria Chile China Cuba El Salvador Germany Greenland Korea Mongolia Namibia New Zealand Norway Papua New Guinea Philippines Serbia Solomon Islands South Africa Spain Sweden Switzerland Tanzania Timor Uganda Ukraine United Kingdom Uruguay. This list is much more correct than the original ICAO list that has many writing errors and omissions; --- solar and geophysical data; --- dozens of new Internet addresses; --- hundreds of new screenshots from our continuous radio monitoring; --- cryptology, intelligence and radio: the terrorism threat. If you're interested in the fascinating subject of HF e-mail and terrorist radio networks, please have a look at http://www.klingenfuss.org/terror.htm The new 17th edition will be published in March 2003. Price is 45 EUR including worldwide surface mail postage. If you would like to be among the first readers of the new book, you can place an advance order right now. ----------------------------------------------- A new edition of the superb ENCYCLOPEDIA OF INTELLIGENCE AND SECRET SERVICES has been published in January 2003. It has been considerably enlarged to 770 pages (!) and is, again, the most up-to-date international handbook on the current methods, techniques, and organization of secret services all over the world. On page 44 it even notes the new Kommando Strategische Aufklaerung created on 17 JAN 2002! The author is a noted expert from the Swiss military. This unique book is now available from us for 50 EUR including worldwide surface mail postage. Attention: this handbook is in French - there is NO English edition. I SAY AGAIN: THERE IS NO ENGLISH EDITION! The new edition can be ordered right now for immediate delivery. ----------------------------------------------- Save with our new package price for the RADIO DATA CODE MANUAL and the ENCYCLOPEDIA OF INTELLIGENCE AND SECRET SERVICES: 90 EUR including worldwide surface mail postage! ----------------------------------------------- Due to excessive new so-called "service charges" and really absurd new authorization procedures, we can't accept Visa card payments any longer. The whole story behind that - and convenient alternatives for Visa card holders - can be found at http://www.klingenfuss.org/visa.htm ----------------------------------------------- A new edition of our bestseller GUIDE TO WORLDWIDE WEATHER SERVICES will be published later this year. If you live outside Europe, could you please check the worldwide NAVTEX schedule, as listed on pages 459-468 of our 2003 GUIDE TO UTILITY RADIO STATIONS. Please contact us for amendments and corrections in your region, and advise if you refer to the standard NAVTEX frequency of 518 kHz, or to the new additional frequencies 424 or 490 kHz. Proud users of WAVECOM Digital Data Decoder Cards are invited to send us their most interesting .w40 .w41 .w51 data files continuously - not only for NAVTEX ;-) Thank you for your cooperation. ----------------------------------------------- The WAVECOM W40PC DSP Digital Data Decoder Card now cracks MIL-STD 188-141A ALE. The next version of the superb software will include HFDL = ACARS-HF and further improvements. For recent reviews of WAVECOM Digital Data Decoders by happy customers and independent experts see http://www.klingenfuss.org/reviews.htm. Says Lee Reynolds in Monitoring Times, United States of America - January 2003: " If you're in the market for a high-end decoder, I can definitely recommend the WAVECOM line of products. One big plus for this device is that software updates are reasonably regular and, importantly, free! This compares extremely favourably with a competitor's offering of a 3.5" diskette with the latest software upgrade for their hardware for a mere USD 400. I may be crazy enough to be a digital utility monitor but I'm not crazy enough to pay that kind of money for a merely incremental software upgrade as well!" ----------------------------------------------- The WAVECOM W51PC DSP Digital Data Decoder Card for the PCI bus, and the WAVECOM W41USB DSP Digital Data Decoder Box for high portability and quick computer changes with the Universal Serial Bus (USB) system, are simply the very best professional data decoders available worldwide - at a reasonable price. Unfortunately, because these units decode certain paging modes, they are not legal for consumer sales in the US, but can only be sold to qualifying agencies. Please contact us if you have problems buying a WAVECOM decoder. We can name the decoder a "digital data interface PC card" or something similar if you ask us to do so (actually IT IS a "digital data interface PC card ;-)) and UPS will settle the customs clearing procedure for you - that's their job and they really know it! We ship worldwide by fully insured UPS express airfreight at original WAVECOM prices without additional costs or profit, and we throw in free Klingenfuss publications as well (at a value of 120 EUR) - you need them anyway to make full use of these worldwide leading decoders: 2003 Guide to Utility Radio Stations, the brandnew Radio Data Code Manual, 2003 Super Frequency List on CD-ROM, and Radiotelex Messages. ----------------------------------------------- Please note our new e-mail address info@k.... Recently, communication via e-mail has become more and more unreliable, and in the case of cyber attacks will crash completely. If you send us an e-mail message and don't get a reply within one or two days, we did not receive your message and you should contact us by other means. (But please note we're closed for a few weeks between April and September each year.) Good old telefax is still the safest and fastest way of communication, particularly for orders with payment by credit card. Forget that so-called SSL et al - it's latest versions have been perfectly hacked! ----------------------------------------------- Best wishes, Joerg Klingenfuss Klingenfuss Publications Hagenloher Str. 14 D-72070 Tuebingen Germany Phone ++49 7071 62830 Fax ++49 7071 600849 E-Mail info@k... Internet http://www.klingenfuss.org ----------------------------------------------- Latest references (for the full list please click http://www.klingenfuss.org/ref.htm) Mike Richards G4WNC, Decode editor of Shortwave Magazine, United Kingdom - February 2003: "Despithe the rapidly increasing use of the Internet, the 2003 Guide to Utility Radio Stations remains the most usable reference for most listeners. The 2003 Super Frequency List on CD-ROM continues to improve with every edition. This latest version is lightning fast. The most powerful is the word search. This is an incredibly fast and powerful search system that really allows you to make the most of the 10,000+ frequency list." Nils Schiffhauer DK8OK, editor of Funk, Germany - February 2003: "Der Meister hatte wieder einmal recht, wenn er einen steigenden Anteil privater Funkdienste, Milit‰rfunk und die Kurzwelle als kostenlosen E-Mail-Ersatz prophezeite. Der 2003er-Jahrgang dokumentiert den Wahrheitsgehalt von Jˆrgs fundierten Vorhersagen auf eindrucksvolle Weise. 34 Jahre Erfahrung flieflen auch in der 21. Auflage des Guide to Utility Radio Stations zusammen. Auch sein 2003er-Guide ist wiederum unverzichtbar f¸r jeden, dessen HF-Horizont nicht beim Bayerischen Rundfunk endet. Er sollte zudem Pflichtlekt¸re f¸r jeden Funkamateur sein, der daran sehen kann, wie dank neuer digitaler Betriebsarten der ƒther brennt wie selten zuvor." Anker Petersen, Chairman of Danish Shortwave Clubs International, in Shortwave News - February 2003: "I found the following details essential for the DXer during his listening and identification of the transmitter and broadcast: station name, exact language, scheduled broadcast time, exact frequency and transmitter site. For identification purposes, it is necessary that all the essential details are readily available in the handbook. This was found to be the case in 68% of the checks in the WRTH, and 74% in 2003 Shortwave Frequency Guide." Bob Padula, Australia, in Electronic DX Press - 31 January 2003: "2003 Super Frequency List on CD-ROM ... Particularly neat is the "concurrent search" program, which when sued in combination with the incremental search represents a very powerful tool. A search for all broadcasters using the Al Dhabayya relay centre in Abu Dhabi gave us 131 results, in 1 millisecond. Program listeners may use the disk to obtain details of an almost infinite number of permutations, such as "all broadcasts in Arabic at 0615 UTC". I met with Joerg at his home some three years ago when I visited Germany, and was impressed with his dedication and superb attention to detail and topicality of all products and services he offers." David Fleming NS8S, United States of America - 23 January 2003: "Enjoy your website too! Fantastic!" John Kench G8JTQ, United Kingdom - 16 January 2003: "Have been looking at your website - absolutely magic! Saving up for a WAVECOM!!" Radio Nederland's Real Radio Booklist Review - 09 January 2003: "2003 Super Frequency List on CD-ROM ... an extremely comprehensive and accurate list ..." Giuseppe Gianotti, President of Associazione Italiana Radioascolto, Italy - 21 December 2002: "2003 Guide to Utility Radio Stations ... 2003 Super Frequency List on CD-ROM ... 2003 Shortwave Frequency Guide ... ringrazio sentitamente per queste stupende opere che sono una vera pietra migliare del radioascolto." Richard D'Angelo, Executive Director, North American Shortwave Association - 13 December 2002: "2003 Shortwave Frequency Guide... Mailed monday, and arrived today, Thursday ... very fast! ... another excellent edition of this very valuable resource." Radio Monitoring Station, Station Manager, Greenock, Scotland, United Kingdom - 12 December 2002: "2003 Guide to Utility Radio Stations ... 2003 Super Frequency List on CD-ROM ... Thank you again for your wonderful products." Kind Regards. Your Italian Connection. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... info@g... 6917 From: Andre Holmes <1ach@g...> Date: Sat Feb 15, 2003 2:19pm Subject: Re: Taking byte from Baghdad Hello all After reading Steves reply I would like to add that I heard a broadcast from a foreign country at around 12MHz it was a woman and the language barrier was in effect I could not piece together what she was saying, but a over broadcast of hers was present and I did here the words AMERICANS at least twice it was a male talking in a language I could not interpret. My message is that the enemys will communicate by simply over broadcasting a broadcast station. ANDRE HOLMES ----- Original Message ----- From: "Steve Uhrig" To: Sent: 11 February, 2003 02:33 PM Subject: [TSCM-L] Taking byte from Baghdad > On 11 Feb 2003 at 14:25, kondrak wrote: > > > >Although President Bush hasn't made a final decision about going to > > >war with Iraq, preparations for that potential conflict are almost > > >complete. Thousands of American troops have been deployed to the > > >Middle East in recent weeks, along with dozens of warships and > > >hundreds of combat aircraft. > > Lot of US Mil traffic on 11.175 USB including some relays from UHF > aircraft AM. All in the clear. Relatively weak and sporadic, but > perfectly copyable here in MD with a decent tuned wire outside > antenna and kit receiver. Periodically interesting. That is the > primary interagency coordination channel. You're likely to hear > almost anything there. May go hours with no traffic, then bursts of > activity for an hour. Freq picked to be OK worldwide both daytime and > night time. Reception depends a bit on the day's propogation. We're > currently just coming down off the peak of an 11 year sunspot cycle, > so HF worldwide is possible with excellent signals and low power. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 6918 From: kondrak Date: Sat Feb 15, 2003 4:07pm Subject: Re: Taking byte from Baghdad Wouldn't surprise me at all, 12 mhz is the 25 meter International shortwave band. Actually, it's 11.650-12.050 mhz. Nice chart of allocations: http://www.pacificsites.com/~brooke/FA.shtml Its primarily in usage in Euro/Asia, so hearing a foreign story mentioning Americans isn't unusual. At 15:19 2/15/03 -0500, you wrote: >Hello all > >After reading Steves reply I would like to add that I heard a broadcast from >a foreign country at around 12MHz it was a woman and the language barrier >was in effect I could not piece together what she was saying, but a over >broadcast of hers was present and I did here the words AMERICANS at least >twice it was a male talking in a language I could not interpret. >My message is that the enemys will communicate by simply over broadcasting a >broadcast station. ANDRE HOLMES 6919 From: Date: Sun Feb 16, 2003 6:25am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 6920 From: Date: Sun Feb 16, 2003 6:25am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6921 From: Ocean Group - MU TSD Date: Wed Feb 12, 2003 8:39pm Subject: Laser countermeasures... http://www.beltronics.com/lp904.html We have been considering sticking one if these units on one of our vans to see if they really do work. We're going to import one from the US and I reckon it should be a standard wavelenght for the European LIDAR but wasn't sure. (904nm?) Does anyone have any experience of these gizmo's? I'm told they are not illegal in the US as there is no FCC restriction on laser?? Here in Ireland there is no precedence so it's pretty much free reign however you might be snatched on an obstructing justice rule...I've checked with the DOE here in Ireland and they said they had no ruling on it so technically you can use them, however the DOJ said that should they catch you interfering with one of their speed units they would drag you out of your car and beat you with a stick! This is of course is for purely educational purposes, a learning experiment for laser countermeasures.... :) Thanking you, Oisin Ocean Group, Technical Security Division, Ireland. 6922 From: Bergstrom, Dennis Date: Wed Feb 12, 2003 8:21am Subject: RE: Fwd: [ISN] Taking byte from Baghdad Hi guys (girls?), I must admit that I seldom, if never!, have contributed to this list before, apart from introducing myself quite some time ago, but this I just *have* to comment on... :o) For those of you that don't know me (that should be most of you actually...(!)) my name is Dennis Bergstrom and I work as a Security Consultant for the company Cap Gemini Ernst & Young (One of the largest consulting companies in Europe btw) in Stockholm, Sweden. In my line of work I have among various other security related things performed Penetration Tests, Secured different systems to prevent breakins, done forensic cases etc. When I read the column "Takin Byte from Bagdad" I note that the columnist - Mr. Gary Pounder - for some reason mentions a couple of things that probably aren't true, or if they - against all odds! - are, the probablility that it happened the way it is described in the column are slim to none. Let me show you what I mean: "...Because of the explosion of computer networks and the Internet, it is now possible to gain access to information systems that support an enemy's economy or military forces. Disrupting these systems can wreak havoc with an adversary's war machine, potentially shortening the war and reducing the number of allied casualties..." Comments: Probably untrue to say the least. I have a hard time believing anyone would connect critical military systems to be accessable for anyone from the Internet. Those times you hear that someone "hacked NASA" or "hacked the US. Military" often this is just defacing of websites, or poor security on the public part of an organisation. Often Intelligence services (at least in Europe, probably elsewhere too) and military have separated networks for critical vs. non-critical systems. --- "...IO experts decided to attack KARI internally and externally. Allied electronic warfare aircraft would jam and bomb KARI components, while specially designed computer viruses would infect the system from within. Agents inserted the virus in a printer shipped to an Iraqi air defense site..." Comments: Probably not true. Very often - if not always!- a virus is written specifically for a certain platform, be it Microsoft based, *Nix or Mac. A Microsoft based virus does not infect a Mac and so on. For Mr. Pounder to be right several things must be true: * The IO Experts (whoever they are..) must know the structure and operating system of the KARI defence system to be able to develop a virus that works. * You really can infect a printer... and frankly, you can't. And if there for some reason - unknown to me and the rest of humanity - could be done, how would the virus in the printer infect the O/S of the defence system? Belive me, this is disinformation big time! The case itself *could* of course be true, but the virus was introduced into the KARI system by some other means than a printer... --- "...The virus also was introduced via a fiber optic cable that connected air defense nodes. A Special Forces unit infiltrated Iraq, dug up the cable and inserted the virus..." Comment: Probably untrue also. You don't just dig up optic cables and "insert a virus". The same as above applies. An optic cable is just a communication link between 2 nodes. If we speculate that the KARI system used TCP/IP (probably) this is the same as you or me trying to infect our office neighbors boxes by just pushing virus code through the NIC. Well, if KARI was based on SQL Server or IIS (evil grin) I *could* buy this, but probably a defence system would be custom build, wouldn't you agree? And while they were busy digging up optic cables, why not just break them so the communication was disrupted? ---- Thanks for bearing with me this far. This was my 50 cents on IT-warfare and security. Best Regards, Dennis in Stockholm, Sweden, Europe. -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: den 11 februari 2003 20:25 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Fwd: [ISN] Taking byte from Baghdad > > >http://www.gomemphis.com/mca/opinion_columnists/article/0,1426,MCA_539_1726 690,00.html > >Gary Pounder >February 9, 2003 > >Although President Bush hasn't made a final decision about going to >war with Iraq, preparations for that potential conflict are almost >complete. Thousands of American troops have been deployed to the >Middle East in recent weeks, along with dozens of warships and >hundreds of combat aircraft. > >These preparations have been highly publicized, with daily pictures of >departing aircraft, naval vessels and military personnel, all designed >to convey a final warning to Saddam Hussein. But preparations for war >also are under way in less-visible areas. > >If Bush gives the order to attack Iraq, U.S. forces will initiate >information operations (IO) as part of their overall military >strategy. Aimed at disrupting Iraqi information systems, the expected >"information war" may represent the ultimate technology weapon in what >will be a high-tech campaign. > >Details of this war are almost nonexistent. Although the Pentagon has >spent billions of dollars on IO since the early 1990s, it has said >little about its capabilities in this area. > >What is known is that this investment has fostered the development of >highly specialized IO units, doctrine and tactics. Gen. Tommy Franks, >commander of U.S. forces in the Persian Gulf region, has his own team >of IO specialists. > >Although IO is sometimes described in terms of computer attack or >cyber-warfare, it covers a variety of functions related to the use and >protection of information and information systems. The rationale >behind IO is simple: deny the enemy use of the information spectrum, >while protecting our own information assets. > >IO includes several disciplines that are almost as old as warfare >itself: intelligence collection, deception, psychological operations. >It also incorporates newer technologies, exploiting advances from the >information revolution of the past 20 years. > >Cyber-attack is one of the most intriguing and useful new tools of >information warfare. Because of the explosion of computer networks and >the Internet, it is now possible to gain access to information systems >that support an enemy's economy or military forces. Disrupting these >systems can wreak havoc with an adversary's war machine, potentially >shortening the war and reducing the number of allied casualties. > >The United States displayed the benefits of a computer war in the 1991 >Gulf War, when it conducted its first cyber-attack on Iraq's air >defense system. The highly automated system (nicknamed KARI) linked >Iraqi surface-to-air missiles and anti-aircraft guns in a computerized >command-and-control network. > >The KARI system could withstand air attacks reliably and still provide >critical information to Iraqi air defense commanders. Neutralizing >KARI was deemed essential to the allied air campaign. > >IO experts decided to attack KARI internally and externally. Allied >electronic warfare aircraft would jam and bomb KARI components, while >specially designed computer viruses would infect the system from >within. Agents inserted the virus in a printer shipped to an Iraqi air >defense site. > >The virus also was introduced via a fiber optic cable that connected >air defense nodes. A Special Forces unit infiltrated Iraq, dug up the >cable and inserted the virus. It remained dormant until the opening >moments of the air war, when it went active and crippled KARI. The >Iraqi air defense system never recovered, and allied losses in the air >campaign were minimal. > >Since the Gulf War, IO tacticians have added to their target lists >economic and infrastructure systems that support an enemy's ability to >fight: power grids, water supplies, banking networks. There are >unconfirmed reports that cyber-attacks helped shut down the Serb power >grid during the 1999 Balkans War. Information operations also have >been used in the war on terrorism to ferret out al-Qaida bank >accounts, trace financial transactions and identify potential >operatives. > >Officially, the Pentagon won't say what level of IO planning and >preparation is under way, but there are vague hints about what might >be in store for Baghdad. Several media outlets reported last month >that the United States was sending E-mail messages to Iraqi military >commanders, urging them not to fight if war breaks out. > >In a police state such as Iraq, E-mail directories are classified >material, off limits to anyone outside the military and security >establishment. Our ability to send E-mail to Iraqi generals suggest IO >teams have identified key computer networks, earmarking them for >potential disruption or destruction. > >There is a good chance the cyber-battle will spread beyond Iraqi >information systems. If the United States launches military action >against Baghdad, we can expect a vicious "war" between Middle Eastern >and western computer hackers. > >Remember the 2001 "spy plane" incident between the United States and >China? That relatively minor episode prompted a month-long >confrontation between American and Chinese hackers that resulted in >the defacement of thousands of Web sites around the world. > >A hacker war emerging from a new conflict with Iraq would be even more >intense, likely unleashing new computer viruses, denial-of-service >attacks aimed primarily at Internet providers and Web site >defacements. The potential cost of such a war could be staggering. > >The United States is not alone in developing information operations as >a tool of war. Although Iraq's IO capabilities in this area are >rudimentary, other potential adversaries - notably China - are >investing heavily in information warfare. More-sophisticated enemies >would have no qualms about mounting an IO campaign against us. > >As the most "wired" nation on Earth, the United States has the >greatest vulnerability to information attack. Although our government >and private companies have invested heavily in computer security, the >recent virus that disabled thousands of automated teller machines >illustrates the potential impact of even small-scale cyber-attacks. >The forces about to be unleashed on Saddam Hussein may be used against >us in the future. > > >Guest columnist Gary Pounder is a retired U.S. Air Force intelligence >officer who lives in Oxford, Miss. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ This message contains information that may be privileged or confidential and is the property of the Cap Gemini Ernst & Young Group. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain, copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. 6923 From: David Vine Date: Thu Feb 13, 2003 7:26am Subject: Re: Digest Number 1189 There has been some discussion about "Microtel" receivers. I recently became a dealer for Alinco scanner radios which are very affordable and have unique features that make them useful for basic RF sweeps. They cover broadcast to gHz ranges and have "transweeper" function (listening for unit-generated audio on RF as unit sweeps) and frequency counter built-in. In essence, they are roughly equivalent to an AOR with Optoelectronics unit but priced from about $250 to $500. If anyone is interested in more detail let me know. David Vine ===== www.investigativetechnology.net __________________________________________________ Do you Yahoo!? Yahoo! Shopping - Send Flowers for Valentine's Day http://shopping.yahoo.com 6924 From: Julie Burger Date: Thu Feb 13, 2003 3:49pm Subject: Interesting Link: Web Controlled Shortwave Receivers http://www.ralabs.com/webradio/ _________________________________________________________________ Add photos to your messages with MSN 8. Get 2 months FREE*. http://join.msn.com/?page=features/featuredemail 6925 From: Ocean Group - MU TSD Date: Fri Feb 14, 2003 5:38am Subject: Laser countermeasures... http://www.beltronics.com/lp904.html We have been considering sticking one if these units on one of our vans to see if they really do work?? We're going to import one from the US and I reckon it should be a standard wavelenght for the European LIDAR but wasn't sure. (904nm?) Does anyone have any experience of these gizmo's? I'm told they are not illegal in the US as there is no FCC restriction on laser?? Here in Ireland there is no precedence so it's pretty much free reign however you might be snatched on an obstructing justice rule...I've checked with the DOE here in Ireland and they said they had no ruling on it so technically you can use them, however the DOJ said that should they catch you interfering with one of their speed units they would drag you out of your car and beat you with a stick! This is of course is for purely educational purposes, a learning experiment for laser countermeasures.... :) Thanking you, Oisin Ocean Group, Technical Security Division, Ireland. 6926 From: George Shaw Date: Sun Feb 16, 2003 9:38am Subject: CCTV line monitoring OK not directly a case of tracking a monitored line but more a quest to understand how it could be accomplished. Situation: I have a client that has around 55 RG59 coax cables in a bundle running through the building. None are marked as to which camera they are coming from or which terminal on the multiplex they are connected to. The multiplex has 32 + 16 inputs (48) and a selector for 48 cameras. If I can not access the coax ends (at the multiplex) how can I test for 1. The presence of a video feed in the coax without breaking the coax and testing for signal? Say from a point within the building but NOT at either end, the test has to be as un-intrusive as possible; (no cutting the coax and rejoining) like a clamp meter for current would do. 2. The detection of a live cable i.e. one that is being used as opposed to a dead coax. Like above no/little intrusion of the coax possible. -- George Shaw MI3GTO " Any Sufficiently Advanced Technology is Indistinguishable from Magic" ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... 6927 From: Ben Pasco Date: Sun Feb 16, 2003 6:26am Subject: Your Email Hello and thank you for your email. I shall be out of my office from the 17th-28th Feb and will be out of normal email contact. If you need to contact PGI then please email my business partner, David Rule at davidr@p... who will be happy to respond. Thanks again, Ben Pasco 6928 From: George Shaw Date: Sun Feb 16, 2003 1:06pm Subject: CCTV Line Monitoring OK not directly a case of tracking a monitored line but more a quest to understand how it could be accomplished. Situation: I have a client that has around 55 RG59 coax cables in a bundle running through the building. None are marked as to which camera they are coming from or which terminal on the multiplex they are connected to. The multiplex has 32 + 16 inputs (48) and a selector for 48 cameras. If I can not access the coax ends (at the multiplex) how can I test for 1. The presence of a video feed in the coax without breaking the coax and testing for signal? Say from a point within the building but NOT at either end, the test has to be as un-intrusive as possible; (no cutting the coax and rejoining) like a clamp meter for current would do. 2. The detection of a live cable i.e. one that is being used as opposed to a dead coax. Like above no/little intrusion of the coax possible. If it is not possable to demodulate the video signal, what could you monitor as to line activity? If you were to try and detect such a "tap" how could you? You may be able to get at the end to attach a TDR but would that show you given a no-intrusive attachment? -- George Shaw MI3GTO " Any Sufficiently Advanced Technology is Indistinguishable from Magic" ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... 6929 From: Kirk Adirim Date: Wed Feb 19, 2003 2:04am Subject: RE: CCTV line monitoring Hi George, You make a TINY slit or nick in the coax with a razor knife, then seperate the braided shielding and foil (if any), expose the dielectric material. Using a homemade needle probe jig, you penetrate the dielectric and make contact with the center conductor while avoiding any shorts to the shield. Another needle is woven slightly into the exposed braided shield to give you your ground. Both needle probes are terminated onto a piece of RG174/U or similar coax and run to your hand held video monitor or other test equipment. In lieu of slitting the coax, you could obtain one of the circular punches from a leather belt hole punch. By chucking it into a handle you can cut out a circular plug of insulation from the side of the coax. Using liquid tape or neoprene glue, you can reseal your intrusion from moisture. Hope this helps, Kirk www.tactronix.com -----Original Message----- From: George Shaw [mailto:george.shaw@u...] Sent: Sunday, February 16, 2003 7:39 AM To: tscm-l@yahoogroups.com Subject: [TSCM-L] CCTV line monitoring OK not directly a case of tracking a monitored line but more a quest to understand how it could be accomplished. Situation: I have a client that has around 55 RG59 coax cables in a bundle running through the building. None are marked as to which camera they are coming from or which terminal on the multiplex they are connected to. The multiplex has 32 + 16 inputs (48) and a selector for 48 cameras. If I can not access the coax ends (at the multiplex) how can I test for 1. The presence of a video feed in the coax without breaking the coax and testing for signal? Say from a point within the building but NOT at either end, the test has to be as un-intrusive as possible; (no cutting the coax and rejoining) like a clamp meter for current would do. 2. The detection of a live cable i.e. one that is being used as opposed to a dead coax. Like above no/little intrusion of the coax possible. -- George Shaw MI3GTO " Any Sufficiently Advanced Technology is Indistinguishable from Magic" ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6930 From: Matt Paulsen Date: Wed Feb 19, 2003 9:17am Subject: RE: Your Email Everyone, this is what not to do with email. Hello and thank you for your email. I shall be out of my office from the 17th-28th Feb so please by all means come rob me. In fact, here's my home address and do please feed the cats while you're there.... -----Original Message----- From: Ben Pasco [mailto:benp@p...] Sent: Sunday, February 16, 2003 4:26 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Your Email Hello and thank you for your email. I shall be out of my office from the 17th-28th Feb and will be out of normal email contact. If you need to contact PGI then please email my business partner, David Rule at davidr@p... who will be happy to respond. Thanks again, Ben Pasco ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6931 From: Hawkspirit Date: Wed Feb 19, 2003 7:06pm Subject: CCTV line monitoring Ok, I am not getting this, please define the nature of the threat and the object of the threat. Roger At 11:43 AM 2/19/03 +0000, you wrote: >Date: Sun, 16 Feb 2003 15:38:30 -0000 > From: "George Shaw" >Subject: CCTV line monitoring > >OK not directly a case of tracking a monitored line but more a quest to >understand how it could be accomplished. > >Situation: I have a client that has around 55 RG59 coax cables in a >bundle running through the building. None are marked as to which camera >they are coming from or which terminal on the multiplex they are >connected to. The multiplex has 32 + 16 inputs (48) and a selector for >48 cameras. > >If I can not access the coax ends (at the multiplex) how can I test for > >1. The presence of a video feed in the coax without breaking the coax >and testing for signal? Say from a point within the building but NOT at >either end, the test has to be as un-intrusive as possible; (no cutting >the coax and rejoining) like a clamp meter for current would do. > >2. The detection of a live cable i.e. one that is being used as opposed >to a dead coax. Like above no/little intrusion of the coax possible. > > 6932 From: Kutlin, Josh Date: Wed Feb 19, 2003 6:54am Subject: RE: Taking byte from Baghdad Ok ...thanks to this thread I went out and bought my first shortwave (DX-399) this past weekend for $30 on closeout. The first thing I realized is that I need a better antenna. Did some reading (and rigging) and I realized that the 25 feet of co-ax (its all I had and the snow closed radio shack) is just not cutting it. My question is and I apologize if it is off topic for this group, but does any one know where I could find plans to make a cheap active antenna? Thanks Josh -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: Saturday, February 15, 2003 5:08 PM To: Andre Holmes Cc: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Taking byte from Baghdad Wouldn't surprise me at all, 12 mhz is the 25 meter International shortwave band. Actually, it's 11.650-12.050 mhz. Nice chart of allocations: http://www.pacificsites.com/~brooke/FA.shtml Its primarily in usage in Euro/Asia, so hearing a foreign story mentioning Americans isn't unusual. At 15:19 2/15/03 -0500, you wrote: >Hello all > >After reading Steves reply I would like to add that I heard a broadcast from >a foreign country at around 12MHz it was a woman and the language barrier >was in effect I could not piece together what she was saying, but a over >broadcast of hers was present and I did here the words AMERICANS at least >twice it was a male talking in a language I could not interpret. >My message is that the enemys will communicate by simply over broadcasting a >broadcast station. ANDRE HOLMES ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS From: Date: Sun Feb 11, 2001 7:50am Subject: In Tapping Net, F.B.I. Insists Privacy Is Not a Victim In Tapping Net, F.B.I. Insists Privacy Is Not a Victim February 8, 2001 By JOHN SCHWARTZ QUANTICO, Va. -- AS long as there have been law enforcement agents, they have tried to listen in on what the bad guys are planning. In early times, that meant standing next to a window in the evesdrope, the place where water from the eaves drips, to overhear conversations. As communications went electronic, eavesdropping did, too: Gen. Jeb Stuart hired a tapper to intercept telegraph messages in the Civil War. And by the 1890's, two decades after Alexander Graham Bell's first call to Watson, the first known telephone wiretaps by the police were in place. The Internet, in turn, has provided new frontiers for law enforcement tappers. At first, surveillance of Internet traffic was useful only in hacking cases ‚Äî after all, only geeks were online. But as the world has gone digital, criminals have as well, and Internet taps are requested in a growing number of cases. According to documents obtained by the Electronic Privacy Information Center, an advocacy group based in Washington, requests from field offices for help with "data interception operations" rose more than 18-fold between fiscal years 1997 and 1999. In Congressional testimony in July, the assistant director of the Federal Bureau of Investigation's laboratory division, Donald M. Kerr, painted a stark portrait of the dangers of the online world. "The use of computers and the Internet is growing rapidly, paralleled by exploitation of computers, networks and databases to commit crimes and to harm the safety, security and privacy of others," he said. All manner of crimes ‚Äî child pornography, fraud, identity theft, even terrorism ‚Äî are being perpetrated using the Internet as a tool, he said. But one device developed by the F.B.I. to deal with this new world of crime has drawn it squarely into a debate over the proper limits of government surveillance: an Internet wiretapping system called Carnivore. The Carnivore effort, which came to light last June, met with resistance from groups as diverse as the American Civil Liberties Union and the Republican leadership of the House of Representatives. The F.B.I. says it has already used the device in dozens of investigations. But critics are concerned that Carnivore, much more than telephone wiretaps, can cast an investigative net that captures the communications of bystanders along with those of a suspect. The House majority leader, Dick Armey of Texas, has said the technology raises "strong concerns" that the government "is infringing on Americans' basic constitutional protection against unwarranted search and seizure." "Until these concerns are addressed," he said, "Carnivore should be shut down." The name, to be sure, has not helped the F.B.I.'s salesmanship. It was derived from an earlier system, called Omnivore, that captured most of the Internet traffic coursing through a network. "As the tool developed and became more discerning" ‚Äî able to get at the meat of an investigation ‚Äî "it was named Carnivore," an official said. ("If they called it Device 374," he explained, "nobody could remember what Device 374 is.") The F.B.I. says the real value of Carnivore, by any name, is that it can do much less than its predecessors. It says agents can fine-tune the system to yield only the sources and recipients of the suspect's e- mail traffic, providing Internet versions of the phone-tapping tools that record the numbers dialed by a suspect and the numbers of those calling in. Those tools, known respectively as pen registers and "trap and trace" devices, are valuable building blocks of any preliminary investigation. "Trap and trace is vital," said Marcus C. Thomas, who heads the bureau's cybertechnology section, "to try to understand criminal organizations, who's communicating with who." Moreover, a full federal wiretap ‚Äî whether of a suspect's phone or of Internet traffic ‚Äî requires extensive evidence of criminal activity and approval from high Justice Department officials and a judge. Court approval to monitor the origins and destinations, not the content, requires only a pledge from the investigators that the information would be relevant. Law enforcement officials say the goal of Carnivore is to protect privacy. Under most wiretaps, they reason, investigators have to review all the material that comes in over the wire and discard any material that they are not entitled to review under the terms of the warrant ‚Äî say, a conversation with the suspect's grandmother. Because the path of online data is harder to isolate than a telephone line, Carnivore may capture communications unrelated to the suspect. But because it then filters out whatever investigators are not entitled to see, officials say, privacy is enhanced. To understand why the F.B.I. hungers for Carnivore, behold its ancestor: a hulking stainless steel box the size of an old Kelvinator in the building in Quantico where the bureau designs what it calls interception systems. The $80,000 behemoth can monitor data traffic on three phone lines simultaneously and translate the squeal of modems into the e-mail and Web pages that a criminal suspect sees. But it can monitor only a standard modem. If a criminal suspect has, like millions of other Americans, decided to trade up to high-speed Internet access through a cable modem or the telephone service known as D.S.L., "it's worthless," Mr. Thomas said. In contrast to that middle-tech dinosaur, Carnivore is a sleek and speedy mammal, a black box of a PC built to work with the vast amounts of high-speed data that course through the Internet. The machine can tap communications for almost all of the ways that people get online. It costs a tenth of what the bureau pays for each of the older machines, and it can do far more: it can sift through all the communications of an Internet service provider, perhaps including tens of thousands of users, and pull out the e-mail and Web travels of the suspect. And although doing so would raise deep constitutional issues, the system can even be programmed to monitor the use of particular words and phrases used in messages by anyone on the network. When law enforcement agents get permission to install Carnivore, they send their own technicians to the office of an Internet service provider. The system itself, once programmed with the details of a search, can easily be installed on the same racks that the company uses for its own network equipment, and is tied in to the flow of data. For all its power, however, Carnivore cannot digest all that it eats: if law enforcement officials intercept a message that has been encrypted, they will get a featureless fuzz of ones and zeroes. The furor over the technology caught the F.B.I. by surprise. "What would you have us do?" Mr. Thomas asked in frustration. "Stop enforcing laws because it's on the Internet?" Paul Bresson, an F.B.I. spokesman, added, "The public should be concerned about the criminals out there abusing this stuff, and not the good guys." The two men discussed the system in Mr. Thomas's office at the bureau's research center at Quantico, home of the F.B.I. training academy. From the outside, the center is so unremarkable that it could be a college classroom building in a witness-protection program. But the array of dishes and antennas along the roofline suggest that something more interesting is going on inside. This is where three F.B.I. engineers took pieces of commercial software and modified them in an effort to allow the kind of selective data retrieval that the law requires, and where they have worked to upgrade the system in response to the criticism of Carnivore. The engineers have added auditing features, for example, that the bureau says will help insure that investigators will not tamper with the system or try to gather more information than authorized. But the F.B.I. is not depending on Carnivore alone for the future of online surveillance. According to budget documents obtained by the Electronic Privacy Information Center under a Freedom of Information Act request, the bureau's plans include developing ways to listen in on the growing medium of voice telephone calls conducted over the Internet and to monitor the live online discussion system known as Internet Relay Chat, as well as other network technologies that were identified in the original document but were blacked out in the copies provided to the group. Some alternatives are already in use, including one that reportedly figured in an investigation of Nicodemo S. Scarfo Jr., an accused bookmaker whose imprisoned father is the former head of the Philadelphia crime organization. In 1999, The Philadelphia Inquirer reported recently, agents planted a tap in Mr. Scarfo's computer keyboard that stored everything the suspect typed ‚Äî including the password for the encryption software used to protect files on his hard drive. Mr. Thomas was unwilling to discuss new techology methods in detail, but said he knew of only two cases in which such devices had been used. A former federal prosecutor, Mark Rasch, says still more methods of Internet wiretap could be on the way. Mr. Rasch, vice president for cyberlaw at Predictive Systems, an Internet consulting company, noted that hacker groups had developed malicious computer programs with names like Back Orifice 2000 that when planted in a target computer give full remote access of the target machine to the hacker. Mr. Rasch suggested that such remote-control programs could reduce the risk of break-ins for the agency and might already be in use. "I would be shocked," he said, if such software were not being used in intelligence investigations, which provide government agents with more leeway than in criminal investigations of American citizens. But Marc J. Zwillinger, a former Justice Department lawyer, said law enforcement agents were unlikely to take such a risky course, because "it would be difficult to control, and if it did get out of control, there would be a backlash against the agency." In the meantime, as the Congressional debate over Carnivore continues, the future of the system is uncertain. [The new attorney general, John Ashcroft, has not addressed Carnivore directly, but he has taken a tough stand in the past against what he sees as high-tech government intrusions into privacy.] Members of Congress and civil libertarians argue that the analogies to telephone taps are flawed and that the Carnivore technology violates constitutional protections against unreasonable searches. "The whole controversy is over intercepting thousands of conversations simultaneously," regardless of the filtering then applied, said Richard Diamond, a spokesman for Mr. Armey, the House majority leader. Some critics have suggested imposing the same strict authorization rules on Carnivore that prevail for full-scale telephone wiretaps, with stiff penalties for any abuse of the system. Still, many of those who oppose Carnivore have concluded that it is here to stay. "You can't outlaw this technology," said James X. Dempsey, deputy director of the Center for Democracy and Technology, a high-tech policy group in Washington. "All you can do is set strict legal standards." http://www.nytimes.com/2001/02/08/technology/08CARN.html?ex=982836325&ei=1&en= 5f0395420440e48e /-----------------------------------------------------------------\ Visit NYTimes.com for complete access to the most authoritative news coverage on the Web, updated throughout the day. Become a member today! It's free! http://www.nytimes.com?eta 2463 From: Date: Mon Feb 12, 2001 9:25am Subject: PRO-2006 for sale I have a PRO-2006 that is un blocked for sale for $400. "Dick Seward "THE BUG HUNTER" 23 yrs. debugging. FCC & CCW licensed. CALI Affiliated. Great prices & lots of experience. (949-770-8384)" ________________________________________________________________ GET INTERNET ACCESS FROM JUNO! Juno offers FREE or PREMIUM Internet access for less! Join Juno today! For your FREE software, visit: http://dl.www.juno.com/get/tagj. 2464 From: none none Date: Mon Feb 12, 2001 10:45am Subject: Greetings Greetings, I would like to reiterate my appreciation to Jim and all the listmembers for maintaining and contributing to this list. I find it informative and amusing. 'Short and Sweet.' Erik. == Those that travel long distances in isolation will defend themselves with strange arts. Shin shin, shin gan. _____________________________________________________________ Yourname@i...
When you want them to remember!
http://burn.inhell.com 2465 From: mike f Date: Mon Feb 12, 2001 6:19pm Subject: anac disconnected Toll Free ANAC 'Automatic Number Announcement Circuit' It happenned sometime last week wednesday or thursday. The ANAC 1-800-346-0153 has been disconnected. "ANOTHER ONE BITES THE DUST" later4,mike f. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 2466 From: Charles P Date: Mon Feb 12, 2001 7:26pm Subject: Re: anac disconnected yes, I was using 800 346 0152, it's gone too. too bad ----- Original Message ----- From: "mike f" To: ; "TSCM-L" Sent: Monday, February 12, 2001 7:19 PM Subject: [TSCM-L] anac disconnected | Toll Free ANAC 'Automatic Number Announcement Circuit' | It happenned sometime last week wednesday or thursday. | The ANAC 1-800-346-0153 has been disconnected. | "ANOTHER ONE BITES THE DUST" | | later4,mike f. | | | | | | Michael T. Fiorentino | Syracuse,NY 13206 | "CONFIDENTIALITY WARNING" | This electronic message contains information which may be privileged and/or | confidential. The information is intended for use only by the | individual(s) | or entity named/indicated above. If you are not the identified/intended | recipient, be aware that | any disclosure, copying, distribution, or use of the contents of this | message/information is prohibited. If you are not the indicated recipient | or | have | received this message in error contact our offices immediately for | instructions." | | | | ======================================================== | TSCM-L Technical Security Mailing List | "In a multitude of counselors there is strength" | | To subscribe to the TSCM-L mailing list visit: | http://www.onelist.com/community/TSCM-L | | or email your subscription request to: | subTSCM-L@t... | =================================================== TSKS | | | 2467 From: Robert Dyk Date: Tue Feb 13, 2001 0:06pm Subject: ANAC With the disappearance of most local ANACs in my area, I have started using 888 837-8274. This is a combination ANAC + ringback/loopback. If it works in your area, beware, after ringback, your line will be dead for about 30 seconds. Hope this helps. Robert Dyk Worldwide Security Ltd. Mississauga, Ontario, Canada (888) 4-COVERT 2468 From: Mike Date: Tue Feb 13, 2001 0:34pm Subject: Pinhole Just got a few Military Surplus covert pinhole lenses. These cost the gov over $800. Will sell for $200 each. Email me for pics/info. bootleg@p... Mike [Non-text portions of this message have been removed] 2469 From: Index Date: Tue Feb 13, 2001 4:27pm Subject: Questions? Greetings Everyone: I have a client who used her cellular telephone(analogue) to phone her daughter. The client was approximately 8 km. from her home. her daughter who does not live with her, was 12 km. from clients house. The conversation lasted approximately 45 seconds. When the client returned home, she noticed recorded on her Bell Telephone, Call Answer(voicemail), the 45 sec. conversation that took place on her cellular telephone that day. She also noticed heavy breathing on the call answer recording, which was not heard during the conversation on her cellular telephone. She advises that she has never call forwarded the cell to the residence, nor the residence to the cellular telephone. She did note that the conversation stopped being recorded when her passenger got out, and closed the car door. Her concern is whether this is some type of possible wiretapping scenario, that developed into a temporary glitch? She would like some type of hypothesis, before allowing us to conduct a sweep of her house, and/or motor vehicle. I can't think of any way that this can possibly happen. Thank you for your help in advance. Regards, Bob Panczenko President/CEO, License #000394 Index Investigation & Security Service Inc.(Ontario, Canada) P.O. Box 214 Station D Toronto, Ontario Canada M9A 4X2 Voice: (416) 604-4690 Fax: (416) 604-8993 E-Mail: index@s... http://www.indexinvestigation.com [Non-text portions of this message have been removed] 2470 From: Charles P Date: Tue Feb 13, 2001 8:32pm Subject: Re: Questions? A fairly common occurance these days, is when someone hits the "talk" or "send" button by accident, basically re-dialing the last number called (often their own office voicemail). The cell phone then records the local conversations onto the voicemail or answering machine called. In this scenario, what could have happened, is that the passenger in the car with the client had their own cellphone, they could have accidentally dialed the clients home by bumping their cell phone button. When they got out of the car, the phone was no longer picking up any noise and the answering machine may have stopped, or the phone could have been turned off. The same thing could have been done intentionally by the passenger, but there is no sane reason why someone would do that. This happens far more frequently than people would like to admit, and then they can start imagining a diabolical harassment conspiracy. charles Charles Patterson charles@t... Global Communications Tarrytown, NY www.telephonesecurity.com www.avtele.com ----- Original Message ----- From: "Index" To: Sent: Tuesday, February 13, 2001 5:27 PM Subject: [TSCM-L] Questions? | Greetings Everyone: | | I have a client who used her cellular telephone(analogue) to phone her daughter. The client was approximately 8 km. from her home. her daughter who does not live with her, was 12 km. from clients house. The conversation lasted approximately 45 seconds. | | When the client returned home, she noticed recorded on her Bell Telephone, Call Answer(voicemail), the 45 sec. conversation that took place on her cellular telephone that day. She also noticed heavy breathing on the call answer recording, which was not heard during the conversation on her cellular telephone. She advises that she has never call forwarded the cell to the residence, nor the residence to the cellular telephone. She did note that the conversation stopped being recorded when her passenger got out, and closed the car door. | | Her concern is whether this is some type of possible wiretapping scenario, that developed into a temporary glitch? She would like some type of hypothesis, before allowing us to conduct a sweep of her house, and/or motor vehicle. | | I can't think of any way that this can possibly happen. | | Thank you for your help in advance. | | Regards, | | Bob Panczenko | President/CEO, License #000394 | Index Investigation & Security Service Inc.(Ontario, Canada) | P.O. Box 214 Station D | Toronto, Ontario | Canada | M9A 4X2 | Voice: (416) 604-4690 | Fax: (416) 604-8993 | E-Mail: index@s... | http://www.indexinvestigation.com | | | | [Non-text portions of this message have been removed] | | | | | ======================================================== | TSCM-L Technical Security Mailing List | "In a multitude of counselors there is strength" | | To subscribe to the TSCM-L mailing list visit: | http://www.onelist.com/community/TSCM-L | | or email your subscription request to: | subTSCM-L@t... | =================================================== TSKS | | | 2471 From: Craig Snedden Date: Wed Feb 14, 2001 6:42am Subject: Re: Questions? Hi, I'm afraid I don't have the answer, but a similar scenario happened about 5 or 6 years ago to a colleague of mine in the UK, using an analogue BT CELLNET phone: The colleague switched off (power down) the mobile phone when he went into a meeting and verified that it was off. When he came out of the meeting he switched the phone back on (power up). The battery remained connected to the phone whilst in the meeting. A short time later his daughter telephoned the mobile to ask if he had just called her by accident and proceeded to relate the content of the meeting he had just attended. Apparently her landline telephone had rung and she had been able to hear the meeting being picked up by the mobile phone mic. He reported the matter to CELLNET who advised that this scenario had happened to a number of persons using the same type of phone, I beleive a NOKIA 1510 or similar vintage. They advised him to dump the phone. He was supplied with a new phone and has never experienced the same again. We took the phone apart, and had it checked over, but couldn't find anything by way of physical tampering, or tampering with the firmware which may have caused this to happen. CELLNET clearly were aware of this happening, but could not or would not provide a suggested answer as to what had caused it. I've made enquiries and only ever heard of this happening on BT CELLNET analogue. Regards, Craig Snedden ----- Original Message ----- From: "Index" To: Sent: Tuesday, February 13, 2001 10:27 PM Subject: [TSCM-L] Questions? > Greetings Everyone: > > I have a client who used her cellular telephone(analogue) to phone her daughter. The client was approximately 8 km. from her home. her daughter who does not live with her, was 12 km. from clients house. The conversation lasted approximately 45 seconds. > > When the client returned home, she noticed recorded on her Bell Telephone, Call Answer(voicemail), the 45 sec. conversation that took place on her cellular telephone that day. She also noticed heavy breathing on the call answer recording, which was not heard during the conversation on her cellular telephone. She advises that she has never call forwarded the cell to the residence, nor the residence to the cellular telephone. She did note that the conversation stopped being recorded when her passenger got out, and closed the car door. > > Her concern is whether this is some type of possible wiretapping scenario, that developed into a temporary glitch? She would like some type of hypothesis, before allowing us to conduct a sweep of her house, and/or motor vehicle. > > I can't think of any way that this can possibly happen. > > Thank you for your help in advance. > > Regards, > > Bob Panczenko > President/CEO, License #000394 > Index Investigation & Security Service Inc.(Ontario, Canada) > P.O. Box 214 Station D > Toronto, Ontario > Canada > M9A 4X2 > Voice: (416) 604-4690 > Fax: (416) 604-8993 > E-Mail: index@s... > http://www.indexinvestigation.com > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 2472 From: Greg H. Walker, Attorney At Law Date: Wed Feb 14, 2001 2:45pm Subject: Questions --- Cell Phones Craig Snedden wrote: > I'm afraid I don't have the answer, but a similar scenario happened about 5 or 6 years ago to a colleague of mine in the UK, using an analogue BT CELLNET phone: Greg Replies: I normally don't post on this list because, to be honest, you all are way above my electronic skills and I don't do TSCM, I refer it to folks like you who are true professionals, but this is finally something I can comment on. I have had this happen on several occasions with my NOKIA 6160 either recording to my cellular voice mailbox or to my office voice mailbox. It has occured when my last call had been to one or the other. I believe that I either hit my send button or a speed dial button -- none of the calls have ever recorded anything important, but normally just picks up my car radio, or on really bad days me singing in the car :) I notice that this does not happen if the phone is not clipped to my belt holder and only happens if I am in the sitting position, that's why I believe it is caused by either clothing or something else accidently pushing a button. Thanks for all of the great info you all put on this list, it is very educational. GREG -- Greg H. Walker Attorney At Law President RisKontroL -- Risk Management, Security Consulting & Investigations Houston, Texas (713) 850-0061 2473 From: James M. Atkinson, Comm-Eng Date: Wed Feb 14, 2001 4:08pm Subject: Good old Big Brother - All over the place Good old Big Brother - All over the place http://www.dawn.com/2001/02/13/op.htm#4 By Omar Kureishi THE story is apocryphal but it's instructive in a humorous sort of way. Emperor Bokassa sent off Pierre Cardin and wanted a uniform designed. He wanted purple trousers, a red shirt, plush yellow jacket and a hat with ostrich feathers. "Is it for you, your Majesty?" the French designer asked. "No" said the Emperor, "it's for my secret service." Before Ayub shifted the capital from Karachi to Rawalpindi, the embassies were the focal point of social activities and there was a dress-code for the receptions which was usually black tie. These functions provided an ideal listening post for sleuths of various intelligence agencies who would eaves-drop on the conversations as well as observe who was talking with whom. In the meanwhile lesser functionaries were duly noting car number plates particularly if the reception was hosted by the embassy of a country not deemed friendly. The problem was that those of them attending the function were a dead give away because they were not observing the dress-code and, in this context, wearing 'civvies' The DIB chief happened to be a friend of mine and I mentioned this to him. He got the point. He had them kitted in white, shark-skin sherwanis. This made them even more conspicuous for they were the only ones wearing white, shark-skin sherwanis. The secret service, by definition, is meant to be secret and officially one is not supposed to acknowledge that it exists but if it is meant to be secret, it must be the worst kept secret in the world. The CIA and KGB are brand names as well known and familiar as McDonald's and Pepsi-Cola and one imagines that they probably have their own public relations divisions. Many years ago, I read a book called The Invisible Government. The book purported to blow the lid off the CIA but, in fact, catalogued the achievements of the CIA, about the covert operations, of how a particular government was destabilised. It showed the CIA, about the covert operations, of how a particular government was destabilized. It showed the CIA as being all-powerful. Many held the view that the book had been written at the behest of the CIA and had been sponsored by it, yet another example of a covert operation. I am sure that the KGB had its own version of such book, they too like to flex their muscles and are disinclined to do good deeds and dump them in the river. The British who had operated with characteristic secretiveness decided to go for broke with James Bond, Special Agent 007. Not only did the secret service cease to be secret, it achieved the celebrity of a pop star. Their mystique was gone. This brings me to our own efforts, better known for monitoring ourselves than outsiders on the theory that charity begins at home and Big Brother, therefore, keeps a watchful eye (and ear) on his own family. The latest example of which is The Sunday Times disclosure of taped conversations between a judge and high government functionaries, the masala having been provided by a Deputy-Director of the Intelligence Bureau. I don't know whether the audio-tapes are genuine or not or whether they have been edited. Not surprisingly, there have been denials and repudiations but these have lacked conviction and so far, we have been spared the boast that legal action is being considered against The Sunday Times. In the past, such legal action has not materialised. And the general opinion is that a newspaper of the calibre of The Sunday Times which is a respectable broadsheet as opposed to a sensation-mongering tabloid would have done its homework and would not have gone half-cock. The contents of the taped conversations have an importance of their own but not the same importance as the fact that the telephone of a judge of a higher court was being taped. The question that arises is who is the ultimate authority that decides whose telephones should be tapped? Is there a procedure for it or is it a catch-as-catch can? What happens to the privacy of individuals? And how widespread is telephone tapping? In other countries, at least in some of them, the United States and Britain for example, a court order is necessary to keep a telephone under surveillance and some justification has to be provided for doing so. Not that this precaution is necessarily observed. Herbert Hoover of the FBI was a law unto himself and would routinely (and illegally) have telephones taped of people like Martin Luther King and rumour has it, of John F. Kennedy when he was the president of the United States. The most celebrated case is, of course, of Richard Nixon who bugged his own office and was, metaphorically speaking, strangulated by his own tapes. Electronic surveillance has now become so sophisticated that the old-fashioned telephone tapping is the equivalent of the bullock-cart in this age of supersonic aircraft. One would have imagined that some other system would be used for listening to telephone calls if some sort of incriminating evidence was being sought. Yet for some reason (an exaggerated sense of self-importance) many believe that their telephones are bugged and those who live in five-star hotels, especially in Islamabad, are certain that all the telephones are bugged. It is not unusual to find a guest switching on the television set at a high volume while talking on the telephone. There is no doubt that there is this eerie feeling of being watched. My own guess would be that master spies, being master, would not be so stupid as to carry out their cloak-and-dagger activities in broad daylight. But the tapes involving a judge, a federal minister and the chairman of the Ehtesab Bureau would seem to suggest that the higher the position one holds, the more one becomes vulnerable, a sort of reverse of the perks of the job, the downside. In normal circumstances, it would be scandalous. But we have got used to Big Brother watching over us. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2474 From: James M. Atkinson, Comm-Eng Date: Wed Feb 14, 2001 5:32pm Subject: Re: Good old Big Brother - All over the place At 5:08 PM -0500 2/14/01, James M. Atkinson, Comm-Eng wrote: >Good old Big Brother - All over the place > >http://www.dawn.com/2001/02/13/op.htm#4 > >By Omar Kureishi [snip} >Yet for some reason (an exaggerated sense of self-importance) many believe >that their telephones are bugged and those who live in five-star hotels, >especially in Islamabad, are certain that all the telephones are bugged. > >It is not unusual to find a guest switching on the television set at a high >volume while talking on the telephone. There is no doubt that there is this >eerie feeling of being watched. > [snip] The "exaggerated sense of self-importance" results in a lot of people who have ego problems or suffering from mental illness inventing antagonists and fabricating harassment just to get attention. This in turn becomes them reaching out to a TSCM person and requesting a bug sweep... not because they have a credible threat, but because they want to be made to feel important. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2475 From: James M. Atkinson, Comm-Eng Date: Wed Feb 14, 2001 8:16pm Subject: Canadian Humor CANADIAN JOKE #1 A Canadian is walking down the street with a case of beer under his arm. is friend Doug stops him and asks, "Hey Bob! Whacha get the case of beer for?" "I got it for my wife, eh." answers Bob. "Oh!" exclaims Doug, "Good trade." =============================== CANADIAN JOKE #2 An Ontarian wanted to become a Newfie (ie. a Newfoundlander). He went to the neurosurgeon and asked "Is there anything you can do to me that would make me into a Newfie?" "Sure it's easy." replied the neurosurgeon. "All I have to do is cut out 1/3 of your brain, and you'll be a Newfie." The Ontarian was very pleased, and immediately underwent the operation. However, the neurosurgeon's knife slipped, and instead of cutting 1/3 of the patient's brain, the surgeon accidentally cut out 2/3 of the patient's brain. He was terribly remorseful, and waited impatiently beside the patient's bed as the patient recovered from the anesthetic. As soon as the patient was conscious, the neurosurgeon said to him "I'm terribly sorry, but there was a ghastly accident. Instead of cutting out 1/3 of your brain, I accidentally cut out 2/3 of your brain." The patient replied "Qu'est-ce que vous avez dit, monsieur?" =============================== CANADIAN JOKE #3 Did you hear about the war between Newfoundland and Nova Scotia? The Newfies were lobbing hand grenades; the Nova Scotians were pulling the pins and throwing them back. =============================== CANADIAN JOKE #4 In Canada we have two seasons......six months of winter and six months of poor snowmobiling. =============================== CANADIAN JOKE #5 One day an Englishman, an American, and a Canadian walked into a pub together. They proceeded to each buy a pint of beer. Just as they were about to enjoy their beverages, three flies landed in each of their pints. The Englishman pushed his beer away from himself in disgust. The American fished the offending fly out of his beer and continued drinking it as if nothing happened. The Canadian picked the fly out of his drink and started shaking it over the pint, yelling, "SPIT IT OUT, SPIT IT OUT, YOU BASTARD!!!" =============================== CANADIAN JOKE #6 A Quebecer, staying in a hotel in Edmonton phoned room service for some pepper. "Black pepper, or white pepper?" asked the concierge. "Toilette pepper!" yelled the Quebecer. =============================== CANADIAN JOKE #7 An American, a Scot and a Canadian were in a terrible car accident. They were all brought to the same emergency room, but all three of them died before they arrived. Just as they were about to put the toe tag on the American, he stirred and opened his eyes. Astonished, the doctors and nurses present asked him what happened. "Well," said the American, "I remember the crash, and then there was a beautiful light, and then the Canadian and the Scot and I were standing at the gates of heaven. St. Peter approached us and said that we were all too young to die, and said that for a donation of $50,we could return to earth. So of course pulled out my wallet and gave him the $50, and the next thing I knew I was back here." "That's amazing!" said the one of the doctors, "But what happened to the other two?" "Last I saw them," replied the American, "the Scot was haggling over the price and the Canadian was waiting for the government to pay his". -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2476 From: James M. Atkinson, Comm-Eng Date: Wed Feb 14, 2001 9:01pm Subject: Question for the list A list member who wishes to remain anonymous asked me to post this to the list for discussion: -jma > Question: > > "As a client, which would you prefer? A TSCM person with good knowledge, > experience and older equipment, or a person with just enough knowledge and > training to turn buttons/knobs on the latest and greates available equipment?" > > END OF MESSAGE -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2477 From: William Knowles Date: Thu Feb 15, 2001 1:37am Subject: Re: Question for the list On Wed, 14 Feb 2001, James M. Atkinson, Comm-Eng wrote: > A list member who wishes to remain anonymous asked me to post this > to the list for discussion: > > > Question: > > > > "As a client, which would you prefer? A TSCM person with > > good knowledge, experience and older equipment, or a person > > with just enough knowledge and training to turn buttons/knobs > > on the latest and greates available equipment?" > > > > END OF MESSAGE Lately I have been consulting groups that having a sysadmin with security experience is not the same thing as having a full-time security admin. That it basically follows the old Bell helmets advertisement of "Putting a $10 helmet on a $10 head" I would prefer a TCSM person with good knowledge and older equipment over the person with just enough knowledge to sqeak through. The TCSM professional would know their equipment, and know how to take it to 11. :) If TCSM was easy, Sally Struthers would probably be selling classes on TV for it along with gun repair and vetrinary assistant. William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 2478 From: Robert G. Ferrell Date: Thu Feb 15, 2001 7:31am Subject: Re: Question for the list >> "As a client, which would you prefer? A TSCM person with good knowledge, >> experience and older equipment, or a person with just enough knowledge and >> training to turn buttons/knobs on the latest and greates available >equipment?" The answer to this question is really the same for all fields where human senses are enhanced by technological innovations. The equipment merely serves as an extension to the sensory capabilities of the person operating it. Without a seasoned, reasoning human mind to interpret the data it generates, the most sophisticated piece of technology is little better than a paperweight. Choose veteran, battle-hardened personnel over blinking lights every time. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2479 From: Mike Date: Thu Feb 15, 2001 5:30am Subject: Re: Question for the list Who would you bet your bippy on? A point man with 2 full combat tours and a 12 gauge in the bush or a fresh Marine with night vision goggles and a full auto Car15? A pretty hooker that's been working 10 years or a youngster with a stopwatch? An old loyal junkyard dog or a "Newly Trained young shepard with electronic collar"? A guide that lived his territory all his life or a new one with GPS? A trusted handshake and a mans word or a 40 page legal contract with fine print? Finally- an old and experienced friend or a NEW aquaintance with all the toys? Just WHO would YOU bet your bippy on? Need I say more? Nuff Said- Bootleg ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Sent: Wednesday, February 14, 2001 7:01 PM Subject: [TSCM-L] Question for the list > A list member who wishes to remain anonymous asked me to post this to > the list for discussion: > > -jma > > > > Question: > > > > "As a client, which would you prefer? A TSCM person with good knowledge, > > experience and older equipment, or a person with just enough knowledge and > > training to turn buttons/knobs on the latest and greates available > equipment?" > > > > END OF MESSAGE > > > > -- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2480 From: Rob Muessel Date: Thu Feb 15, 2001 8:36am Subject: Re: Question for the list I hate to say it, but clients, for the most part, aren't qualified to make the determination as to the ability of the service provider and the technical capability of the equipment used during the sweep. If it were different, we would not have any significant competition from guys with DARs, CPMs, Great Southern Security gizmos, and all the other spy shop junk. Experience has shown me that clients are impressed with bells and whistles, even if the bells and whistles don't add much to the effectiveness of the sweep. I use a computer controlled spectrum analyzer now. I used to use a manual spectrum analyzer. I remember the first time I set up the notebook PC to run the analyzer on a job. Usually during the sweep, the client watched the RF portion for about 5 minutes before finding something more important to do. It's not very exciting to watch someone turn knobs and push switches. But, with the PC doing the work and with an interesting user interface, the RF sweep drew a crowd. Go figure. The results were not any different, but the equipment was more interesting. For my dollar the guy with the experience will always do a better job than the new guy with the latest equipment. I'd trust an old A-3C in the hands of a well trained technician to give me more accurate results than any of the new stuff that has been designed to do it all for you. It may be more time consuming and not as nicely packaged, but the job will be properly done. There is a lot of subtlety, nuance, and insight to a sweep. It can't be recreated in hardware. -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 2481 From: James M. Atkinson, Comm-Eng Date: Thu Feb 15, 2001 9:35am Subject: Re: Question for the list At 10:01 PM -0500 2/14/01, James M. Atkinson, Comm-Eng wrote: >A list member who wishes to remain anonymous asked me to post this to >the list for discussion: > >-jma > > >> Question: >> >> "As a client, which would you prefer? A TSCM person with good knowledge, >> experience and older equipment, or a person with just enough knowledge and >> training to turn buttons/knobs on the latest and greates available >equipment?" >> > > END OF MESSAGE My opinion is that customers want a mix of both. Compare it to a group of people who go to see a concert at symphony hall performed by seasoned professionals with top grade musical instruments, verses a group of parents who visit a local grade school to hear their children in a school band mangling every pieces of music. On the one hand we have seasoned and well trained professionals with strictly the finest instruments, and on the other hand we have rank amateurs who are just trying to do their best. When it really comes down to the wire customers want go with the seasoned veteran with older (but not obsolete) equipment. The "older (but not obsolete)" part is really important. Customers will not be amused by an experienced TSCM specialist if all of their equipment is of 50's, 60's, and 70's vintage and still uses vacuum tubes. Nor, will they be amused with the enthusiastic newbie who shows up with cardboard boxes brimming with hobbyist toys. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2482 From: James M. Atkinson, Comm-Eng Date: Thu Feb 15, 2001 0:08pm Subject: The Top 25 Alabama Country Songs of All Time The Top 25 Alabama Country Songs of All Time..... 25. Get Your Tongue Outta My Mouth 'Cause I'm Kissing You Goodbye 24. Her Teeth Was Stained, But Her Heart Was Pure 23. How Can I Miss You If You Won't Go Away? 22. I Don't Know Whether To Kill Myself Or Go Bowling 21. I Bought A Car From A Guy Who Stole My Girl, But It Don't Run, So We're Even 20. I Keep Forgettin' I Forgot About You 19. I Liked You Better Before I Knew You So Well 18. I Still Miss You, Baby, But My Aim's Getting Better 17. I Wouldn't Take Her To A Dog Fight, Cause I'm Afraid She'd Win 16. I'll Marry You Tomorrow But Lets Honeymoon Tonight 15. I'm So Miserable Without You, It's Like Having You Here 14. I've Got Tears In My Ears From Lyin' On My Back and Cryin' Over You 13. If I Can't Be Number One In Your Life, Then Number Two On You 12. I Haven't Gone To Bed With Any Ugly Women, But I've Sure Woken Up With a Few 11. Mama Get A Hammer (There's A Fly On Papa's Head) 10. My Head Hurts, My Feet Stink, And I Don't Love You 9. My Wife Ran Off With My Best Friend, And I Sure Do Miss Him. 8. Please Bypass This Heart 7. She Got The Ring And I Got The Finger 6. You Done Tore Out My Heart And Stomped That Sucker Flat 5. You're The Reason Our Kids Are So Ugly 4. If The Phone Don't Ring, You'll Know It's Me 3. She's Actin' Single and I'm Drinkin' Double 2. She's Looking Better After Every Beer And the number 1 Alabama Country song of all time is 1. If I Had Shot You When I Wanted To, I'd Be Out By Now -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2483 From: James M. Atkinson, Comm-Eng Date: Fri Feb 16, 2001 7:29am Subject: Is Phone Interference Phony? Is Phone Interference Phony? http://www.wired.com/news/business/0,1367,41273,00.html by Elisa Batista 2:00 a.m. Feb. 15, 2001 PST If a passenger were to ask anyone in the aviation industry why mobile phone use is not permitted in flight, the likely response would be that cell phones "may interfere with the communication and navigation systems of the plane." In fact, most airlines issue such warnings before takeoff. However, what the industry doesn't tell passengers is that there is no scientific proof to support these claims. What also isn't widely known is that pilots have blamed portable voice recorders, heart pacemakers, electric shavers and hearing aids for interfering with their cockpit controls, yet there are no restrictions on their use during flights. The industry's evidence of cell phone-caused interference is purely anecdotal -- instances engineers have tried but failed to duplicate under "controlled conditions." "We've never been able to replicate it, so we can't verify that (portable electronic devices) do interfere," Boeing spokeswoman Mary Jean Olsen said. "We go along with the RTCA recommendation that portable electronic devices should be restricted in critical aspects of the flight, which is takeoff and landing." In three studies -- none more recent than 1996 -- aeronautic adviser RTCA concluded portable electronic devices have the potential to interfere with critical aircraft instruments such as the altimeter. The study also said the likelihood of interference is low. RTCA engineers could not replicate on the ground or in the air any alleged interference. "We would get a fairly detailed and credible report of an interference event," said John Sheehan, who headed the RTCA's last study and now owns his own aviation consulting firm. "We would try to replicate that in the same aircraft and same airplane seat and couldn't do it." "Interference" is not only the garbling of communication. It can include false warnings of unsafe conditions or noise in the flight crew's headphones. In a recent incident, a Slovenian airplane en route to Sarajevo made an emergency landing after a cell phone accidentally left on in the luggage compartment triggered an erroneous fire warning aboard the aircraft. Boeing once purchased a passenger's laptop after claims that the computer caused interference during a flight from London to Paris; the pilot said turning the laptop on and off triggered autopilot error. Boeing then flew that same laptop on the same route in the same seat and was unable to duplicate the interference. But it doesn't mean the interference never occurred, Sheehan said. Engineers say replicating interference is tricky because they can't duplicate the exact environment of the plane, which at the time of the interference could have been bombarded with other microwave emitters like radio towers and satellite transmissions. "Whether the airplane receives interference or not is dependent on the electromagnetic environment, like the airport," Sheehan said. "The air is saturated with microwaves ñ- the 'electromagnetic soup' around the airport. It's the environment that airplanes would operate under which would promote or retard (the source of interference). That is difficult to replicate." Although there is no clear evidence that PEDs interfere with onboard instruments, the RTCA recommends against the use of PEDs during the "critical phases of flight" -- taking off and landing -- when the plane is most likely to be bombarded by signals from other sources, like industrial heaters, cable TV networks and FM broadcast stations. "I guess we should all feel a little nervous during takeoff and landing," Sheehan said. Interestingly, laptop computers, and not cell phones, are the leading cause of in-flight interference. Still, laptop use is only restricted during takeoff and landing, while cell phones are prohibited as soon as the plane's doors are shut. The International Air Transport Association found laptops responsible for 16 of the 40 reported incidents (40 percent) of interference through last summer. Also, the FAA specifically excludes portable voice recorders, heart pacemakers, electric shavers and hearing aids from its rules, although pilots have blamed at least one of these devices for interference. A pilot reported to NASA that during an October 1998 flight from Seattle to Cincinnati, his aircraft experienced a loss of all three of its autopilot systems because a man was wearing a headset that was part of a hearing aid. The passenger was allowed to use the device, but was moved forward several seats, at which point the plane regained full operational capabilities. The RTCA, which concluded in three studies that PEDs could interfere with onboard instruments, said its latest study in 1996 did not include electric shavers, heart pacemakers, portable voice recorders and hearing aids. An RTCA spokesman would not verify whether these devices were included in earlier studies, conducted in 1963 and 1988. The RTCA never studied "intentional transmitting devices" like cell phones and two-way pagers. But it recommended the prohibition of the use of these devices in all aspects of flight until "exhaustive testing" deemed them safe. The airlines themselves have never conducted tests. The Civil Aviation Authority, the British equivalent of the FAA, studied the effect of cell phones on aircraft and reinforced the RTCA's recommendations a year ago. The CAA measured the strength of simulated cell phone transmissions in various parts of the fuselage of two different Boeing aircraft at London's Gatwick Airport last year. The agency found that cell-phone emissions could theoretically exceed the susceptibility levels of aircraft equipment, so it recommended the continuation of the cell-phone ban on commercial airlines. It even recommended an onboard detector for cell phone use. But the CAA, like the RTCA, was unable to duplicate the interference, even under controlled conditions. Cell phones operate on different frequencies from onboard instruments, which may be why there are so few reported incidents of interference. However, if multiple devices were operating simultaneously, even FAA-approved airplane-installed phones could theoretically cause interference, said Tim Brown, an engineering professor at the University of Colorado in Boulder. "It is conceivable if you had a plane full of devices working, they could interfere with the most sensitive instruments," Brown said. "Just because they are in separate bands doesn't mean some energy isn't spilling over into these other bands." Even though it's not certain that cell phones have ever caused interference, the FAA defends the ban, arguing that safety comes first. "Those (interference anecdotes) are fact-based and apparently cannot be attributed to something else," FAA spokesman Jerry Snyder said. "The FAA believes (any reported interference) is not an acceptable number of incidents affecting aircraft." Yet, despite its safety-conscious tone, the FAA has not followed the CAA's recommendation to implement a detector. Due to "budgetary restraints," the FAA a year ago declined to fund a device by Megawave that could detect illegal PED use. The implementation of the device would have made it possible for passengers to use any PED as long as it didn't interfere with the plane's systems. The device is also capable of detecting would-be terrorists trying to jam the airplane's instruments with global positioning system devices, according to Megawave's chairman, Marshall Cross. At the very least, Cross said the device could determine whether or not PEDs actually cause interference. "There is an ultimate problem here," Cross said. "We have no (clinical) information now (on causes of interference) from in flight. It's all anecdotal, so no one knows whether it's a problem or not." Still, even if the FAA eased its cell-phone use restriction, passengers would have a difficult time convincing the FCC to lift its cell phone ban. The FCC has never conducted tests to prove cell phones could interfere with signals on the ground, because it considers it "common sense" that cell towers are for terrestrial use. "I don't know how you could do that," said Dale Hatfield, a former FCC engineer who is now a professor of telecommunications at the University of Colorado. "It doesn't make sense to an engineer like me to use ordinary cell phones at 30,000 feet." When told of instances in which passengers have used their cell phones on private jets against FCC regulations and not caused interference, Hatfield responded, "How do they know? They could affect people (on the ground) and not know it." Because the FCC and FAA don't have much evidence to support their ban, their reasons for the prohibition remain clouded. In fact, Rep. Peter DeFazio (D-Ore.) called the FAA's studies in a July congressional hearing "dispositive" because they haven't been replicated. He called the airplane-installed phone service -- a passenger's only option to communicate with someone on the ground -- "a crummy service at an extraordinary price." "(Rep. DeFazio) wouldn't want to contribute to any unsafe circumstances or issues, if there is definite evidence that using cell phones and laptops cause problems on airplanes," DeFazio spokeswoman Kristie Greco said. "The main focus would be to improve and reduce the cost of air phone service if that's our only option." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2484 From: Robert G. Ferrell Date: Fri Feb 16, 2001 10:12am Subject: Re: Is Phone Interference Phony? >However, what the industry doesn't tell passengers is that there is no >scientific proof to support these claims. If there were even a 0.0001% chance that it would make my airplane trip safer, I would stand on my head and hum the Star Spangled Banner while gargling with balsamic vinegar. People use their #$#@! cell phones waaaay too much as it is. If you can't go a few hours without being wired directly to the home office or the spouse, don't leave home. And stop using your stupid phone while you're driving. Not a day goes by that I don't observe some moron swerving all over the friggin' road while gabbing into one of those infernal contraptions. I'm all for making use of a cell phone while driving a public whipping offense. Not that I have a strong opinion or anything. ;-) Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2485 From: Robert G. Ferrell Date: Fri Feb 16, 2001 10:18am Subject: RE: Fw: ARROGRANCE >No -it's not. Every version of this story changes.. > >By the way, Lincoln has never sailed off of Newfoundland. I became fascinated by this urban legend a few years ago and spent too much time researching it. The first version I've been able to find intact dates to the World War II era, but there are rumors that it can be traced to as far back as the 19th century, except of course that the communications were by flag or lantern, not voice... It seems that sailors, or perhaps harried journalists in search of a piece of good filler, update the story every so often with modern ship names and contemporary political references. Quite an interesting phenomenon. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2486 From: James M. Atkinson, Comm-Eng Date: Fri Feb 16, 2001 0:52pm Subject: Re: Is Phone Interference Phony? Curious... I have found that the older I get the less I use my cell phone, and it is rare for me to use it for more then 20-30 minutes a month with most calls lasting less then 3 minutes. Of course I always carry a phone, but it is rare for me to even turn it on except to make a call, and turn it back off. About he only thing I use my cell phone for is calling for directions, letting someone know I am running late for a meeting, calling 911 at an accident scene, or calling for a cab when I travel,. I always turn off cell phone when I go out to perform any kind of sweep work (inside five miles of the target), but keep a phone nearby in case of emergency (with the local PD on speed dial). There is virtually nothing you can do to make a cellular phone secure, so why would a TSCM'er use one any more then absolutely necessary. -jma At 10:12 AM -0600 2/16/01, Robert G. Ferrell wrote: > >However, what the industry doesn't tell passengers is that there is no >>scientific proof to support these claims. > >If there were even a 0.0001% chance that it would make my airplane trip >safer, I would stand on my head and hum the Star Spangled Banner >while gargling with balsamic vinegar. People use their #$#@! cell >phones waaaay too much as it is. If you can't go a few hours without >being wired directly to the home office or the spouse, don't leave home. >And stop using your stupid phone while you're driving. Not a day goes >by that I don't observe some moron swerving all over the friggin' road >while gabbing into one of those infernal contraptions. I'm all for >making use of a cell phone while driving a public whipping offense. > >Not that I have a strong opinion or anything. > >;-) > >Cheers, > >RGF > >Robert G. Ferrell, CISSP >Information Systems Security Officer >National Business Center >U. S. Dept. of the Interior >Robert_G_Ferrell@n... -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2487 From: Dick Dillman Date: Fri Feb 16, 2001 0:53pm Subject: Re: Is Phone Interference Phony? On 16 Feb 01, at 10:12, Robert G. Ferrell wrote: > If there were even a 0.0001% chance that it would make my airplane trip > safer, I would stand on my head and hum the Star Spangled Banner > while gargling with balsamic vinegar. We have that to look forward to, RGF. However aside from the issue of interference to flight instruments there is another problem associated with using cellular phones from aircraft. A cellular phone transmitting from high altitudes and especially the altitudes used by transport aircraft will be received by many cellular receiving sites on the ground. This in turn causes interference to cellular phone service over a large region. That's one reason why the telephone equipment certified for use in aircraft operates through dedicated ground stations designed for this purpose. And of course these systems have been proven to not cause interference to aircraft navigation or communications systems. But on the issue of passenger use of cellular phones on aircraft I recently had an interesting experience on American Airlines. The cabin attendant announced that the captain had a cockpit indication that someone on board was using a cellular phone and requested that it be turned off. This was before the aircraft left the gate. Is it possible that the airlines have really installed sensors to detect on- board cellular transmissions? Regards, Dick ============================= Dick Dillman [Special Services] Greenpeace San Francisco Direct Phone: +1 415-512-7137 Fax: +1 415-512-8699 ICQ: 4785730 ============================= 2488 From: Gerard P. Keenan Date: Fri Feb 16, 2001 10:53am Subject: Re: Is Phone Interference Phony? Just FYI, I live in Suffolk County, NY, and as of 01JAN01 talking on your cell phone while is a moving violation -- points and $150.00 fine throughout the County. Really upset a lot of folks out here. We have the largest population of celebrities in the country, outside of Hollywood. Some of my 'neighbors' include Billy Joel, Steven Spielberg, all the Baldwins (well, we all have our crosses to bear!), Maria Carey, Eric and Julia Roberts, and a whole list of others. Imagine their chargrin at this law when it went through the County legislature like doo-doo through a goose with very few dissenting votes!! Jerry Keenan GPKeenan Co., Int'l Security Services West Islip, NY 11795-2503 ----- Original Message ----- From: "Robert G. Ferrell" To: Sent: Friday, February 16, 2001 11:12 AM Subject: Re: [TSCM-L] Is Phone Interference Phony? > >However, what the industry doesn't tell passengers is that there is no > >scientific proof to support these claims. > > If there were even a 0.0001% chance that it would make my airplane trip > safer, I would stand on my head and hum the Star Spangled Banner > while gargling with balsamic vinegar. People use their #$#@! cell > phones waaaay too much as it is. If you can't go a few hours without > being wired directly to the home office or the spouse, don't leave home. > And stop using your stupid phone while you're driving. Not a day goes > by that I don't observe some moron swerving all over the friggin' road > while gabbing into one of those infernal contraptions. I'm all for > making use of a cell phone while driving a public whipping offense. > > Not that I have a strong opinion or anything. > > ;-) > > Cheers, > > RGF > > Robert G. Ferrell, CISSP > Information Systems Security Officer > National Business Center > U. S. Dept. of the Interior > Robert_G_Ferrell@n... > ======================================== > Who goeth without humor goeth unarmed. > ======================================== > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 2489 From: James M. Atkinson, Comm-Eng Date: Fri Feb 16, 2001 3:39pm Subject: Skirt train spy 'watched live on his laptop' Skirt train spy 'watched live on his laptop' http://www.ananova.com/news/story/sm_210832.html?menu= A US man has been arrested for using a spy camera to film up a woman's skirt and watch live on his laptop. He was detained by detectives as he was allegedly caught filming on a rush-hour commuter train, in Boston. The 47-year-old computer company worker has been charged with lewd and lascivious behaviour. He is scheduled to appear before a Boston court. Police allege he concealed the camera between his knees, reports the Boston Herald. Joe Pesaturo, a spokesman for Massachussetts Bay Transportation Authority, said: "Police will seek a search warrant to examine the computer's files to see if more charges are warranted." The victim, who was seated opposite, was "startled" by the discovery, said Mr Pesaturo. He added: "It was a rush-hour train. It was not short of passengers." Last updated: 19:36 Friday 16th February 2001 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2490 From: Miguel Puchol Date: Fri Feb 16, 2001 8:15pm Subject: RE: Is Phone Interference Phony? Dick, Some airlines have indeed installed detectors. They are based on two receiving antennas, which can give a good estimate on the location of the offending phone along the aircraft. All you are looking for is RF in the uplink (sorry if I use sat terms) frequency band, above a certain level, and you consider that to be an emanation from within the aircraft. I believe BA has some of these already installed. All the best, Mike > -----Mensaje original----- > De: Dick Dillman [mailto:ddillman@s...] > Enviado el: viernes, 16 de febrero de 2001 19:54 > Para: TSCM-L@yahoogroups.com > Asunto: Re: [TSCM-L] Is Phone Interference Phony? > > > On 16 Feb 01, at 10:12, Robert G. Ferrell wrote: > > > If there were even a 0.0001% chance that it would make my airplane trip > > safer, I would stand on my head and hum the Star Spangled Banner > > while gargling with balsamic vinegar. > > We have that to look forward to, RGF. However aside from the > issue of interference to flight instruments there is another problem > associated with using cellular phones from aircraft. A cellular phone > transmitting from high altitudes and especially the altitudes used by > transport aircraft will be received by many cellular receiving sites on > the ground. This in turn causes interference to cellular phone > service over a large region. That's one reason why the telephone > equipment certified for use in aircraft operates through dedicated > ground stations designed for this purpose. And of course these > systems have been proven to not cause interference to aircraft > navigation or communications systems. > > But on the issue of passenger use of cellular phones on aircraft I > recently had an interesting experience on American Airlines. The > cabin attendant announced that the captain had a cockpit indication > that someone on board was using a cellular phone and requested > that it be turned off. This was before the aircraft left the > gate. Is it > possible that the airlines have really installed sensors to detect on- > board cellular transmissions? > > Regards, > > Dick > > ============================= > Dick Dillman > [Special Services] > Greenpeace San Francisco > Direct Phone: +1 415-512-7137 > Fax: +1 415-512-8699 > ICQ: 4785730 > ============================= > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2491 From: none none Date: Fri Feb 16, 2001 4:01pm Subject: I thought the responce fron Mr. Ferrel was beautifully eloquent. >The answer to this question is really the same for all fields >where human senses are enhanced by technological innovations. >The equipment merely serves as an extension to the sensory >capabilities of the person operating it. Without a seasoned, >reasoning human mind to interpret the data it generates, the most >sophisticated piece of technology is little better than >a paperweight. > >Choose veteran, battle-hardened personnel over blinking lights every time. > Erik. == Those that travel long distances in isolation will defend themselves with strange arts. Shin shin, shin gan. _____________________________________________________________ Yourname@i...
When you want them to remember!
http://burn.inhell.com From: Gregory Horton Date: Fri Feb 13, 2004 11:41am Subject: Re: Digest Number 1487 You know, I read the entire article and I didn't notice anything about TSCM. Take it to a different thread. maxs@m... wrote: >Hello SOCIETY > >What about this topic ? > >1. Quote of the Month: Interpreting God's Intentions >--------------------------------------------------- >"Both speeches had the quality of sermons. Both leaders invoked God, and neither had any doubt about whose side God was on. And both interpreted God's intentions." >-- Brian Michael Jenkins, RAND terrorism expert, writing in a Los Angeles Times commentary that compared recent speeches by President Bush and Osama bin Laden > > >>>http://www.rand.org/rnbrd/commentary/020104LAT.html >>> >>> > >Sincerely > >Martin KO CIA N > > > > >----- >P¯ipojte se p¯es RazDva a vyberte si jednu z nov˝ch cen v Bonus Clubu. VÌce na http://club.razdva.cz. > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > [Non-text portions of this message have been removed] 8225 From: James M. Atkinson Date: Fri Feb 13, 2004 11:23am Subject: To change a light bulb... alone... in the rain... How many group posters does it take to change a light bulb? 1 to change the light bulb and to post that the light bulb has been changed 14 to share similar experiences of changing light bulbs and how the light bulb could have been changed differently 7 to caution about the dangers of changing light bulbs 27 to point out spelling/grammar errors in posts about changing light bulbs 53 to flame the spell checkers 41 to correct spelling/grammar flames 6 to argue over whether it's "lightbulb" or "light bulb" ... another 6 to condemn those 6 as anal-retentive 2 industry professionals to inform the group that the proper term is "lamp" 15 know-it-alls who claim *they* were in the industry, and that "light bulb" is perfectly correct 156 to email the participant's ISPs complaining that they are in violation of their "acceptable use policy" 109 to post that this group is not about light bulbs and to please take this discussion to a lightbulb group 203 to demand that cross posting to hardware forum, off-topic forum, and lightbulb group about changing light bulbs be stopped 111 to defend the posting to this group saying that we all use light bulbs and therefore the posts *are* relevant to this group 306 to debate which method of changing light bulbs is superior, where to buy the best light bulbs, what brand of light bulbs work best for this technique and what brands are faulty 27 to post URL's where one can see examples of different light bulbs 14 to post that the URL's were posted incorrectly and then post the corrected URL's 3 to post about links they found from the URL's that are relevant to this group which makes light bulbs relevant to this group 33 to link all posts to date, quote them in their entirety including all headers and signatures, and add "Me too" 12 to post to the group that they will no longer post because they cannot handle the light bulb controversy 19 to quote the "Me too's" to say "Me three" 4 to suggest that posters request the light bulb FAQ 44 to ask what is a "FAQ" 4 to say "didn't we go through this already a short time ago?" 143 to say "do a Google search on light bulbs before posting questions about light bulbs" 1 forum lurker to respond to the original post 6 months from now and start it all over again.... Happy Friday the 13th ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8226 From: James M. Atkinson Date: Sat Feb 14, 2004 9:28am Subject: Taiwanese couple held in China for spying http://straitstimes.asia1.com.sg/asia/story/0,4386,235147,00.html Taiwanese couple held in China for spying BEIJING - China has detained a Taiwanese couple for spying, making them the third in a string of espionage-related arrests on the mainland, state media said yesterday. Chang Hsu-min, 27, and his girlfriend Yu Shi-ping, 24, were arrested on Jan 13 for collecting missile intelligence in south-eastern Fujian province which faces Taiwan, the Global Times reported. The latest case came a month after the arrest of 24 other Taiwanese accused by the Chinese of being agents, along with 19 mainlanders. Chang and Yu, described as agents of the Taiwanese Military Intelligence Bureau, were in Taiwan at the time of the December arrests. They were there to report to their superiors, according to the paper. Despite the increased danger, they were sent back to the mainland via Hong Kong and were detained after just two days, it said. 'It's outrageous that the Taiwan intelligence service simply slipped them into the opponent's pocket,' the paper commented. It published pictures of the couple with their eyes blacked out. News of the duo's detention followed reports in Taiwan media last week that three other Taiwanese had been arrested in the mainland on suspicions of spying on military installations, including Chinese missiles pointing in the direction of Taiwan. Reports have said the Chinese were able to track down the intelligence operations after Taiwan President Chen Shui-bian gave the exact number of missiles aimed at the island. -- AFP, Reuters ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8227 From: Robert Dyk Date: Sat Feb 14, 2004 2:18pm Subject: Surveillance Periscope This item was just listed for any active surveillance types out there... Surveillance Periscope http://cgi.ebay.ca/ws/eBayISAPI.dll?ViewItem&item=3077869038 Thanks for your time, Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. 8228 From: contranl Date: Fri Feb 13, 2004 6:53pm Subject: New electronic trick to steal money from ATM's . Dutch police are trying to catch a gang that uses advanced electronic equipment to empty bankaccounts from people that use magnetic credit cards on automatic money machines. This is how it works: The gang searches for a money dispenser in a shopping street preferably one that is not placed in the wall of a bank...they do that because these ones do'nt have built-in security cameras that could later identify them. The criminals have made a perfect copy of a part of the machine it's the part where you insert your magnetic-stripe card This is placed over the original area where the card should be inserted...not being an expert you wo'nt recognize it as a fake. Inside the fake part is a simple and very small card reader that collects the data from the stripe while it is passing trough on it's way to the real reader below...the gathered data is then transmitted on to a van on the other side of the street. This is not enough...they need the 4 digit pin-code as well...so a small camera with transmitter is placed...hidden in a object that seems to belong there...the video signal is also received in the van Immidiatly when they have all data collected the gang members start to make a copy of the card...this takes them 30 seconds When nobody is looking they take the fake card to the money machine punch in the pin-code and completely empty the account. ............ I estimate the following stuff is used to do this: A card reader is simple to make...all you need is a magnetic head like those used in tape-recorders...some simple circuit to convert the pulses to a FSK-signal and a simple low power transmitter All this would fit in a matchbox In the van you need a a receiver and a fsk-decoder like the software based ones used by radioamateurs...the data can be stored on a laptop A card encoder is widely available for less then 200 US$ This card encoder is also hooked up to the same laptop..the received data is then passed from the stored data file to the file used to encode the credit card ...thats all. The video camera is probably a very small one (1,5 x 1,5 cm's) wihth a pinhole lens..the camera is connected to a 10 mw videotransmitter probably working in the 2.4 Ghz band Since this is a short time operation the battery can be very small too. A second variation is where the reader is placed next to or inside the original reader that is used to open a door that gives acess to the room where the money-machine is placed. I "designed" this trick myself about 8 years ago...and i am surprised that it took so long before some criminals figured it out too. You are warned ! Tetrascanner www.tetrascanner.com . 8229 From: contranl Date: Fri Feb 13, 2004 7:12pm Subject: Screening your house against unhealthy radiation from Tetra-base-stations . There is a lot of fuzz going on about the new digital radio-networks based on the "Tetra" standard, These networks are now operational in 50 countries The unhealthy effects have not been proven...but the contrary neither Tetra uses the 380~400 Mhz band and the modulation is TDMA The carrier is switched on and of at a rate of around 17 hz Similair to GSM-cellphones (217) this causes a lot of interference The power levels in Tetra are higher then with Gsm,the switching frequency of 17 hz is more dangerous then that of Gsm because it's in the range of "human" frequencies Specially in the UK action-groups exist that want to ban the antenna-masts at all Now i read this article: http://www.iwcp.co.uk/ViewArticle2.aspxSectionID=1252&ArticleID=73998 I have no opinion about the possible health effects...but screening only your windows and not the whole house including walls wont help much i guess ? if it helps at all ... in the worse case small pieces of non-grounded shields might even worsen the case ? (re-radiating/reflecting/concentrating) Any comments ? Tnx Tetrascanner www.tetrascanner.com . 8230 From: contranl Date: Fri Feb 13, 2004 7:28pm Subject: Van Eijck receiver (radiation of crt monitors) . About 10 years ago a researcher from a laboratory owned by the Dutch PTT(former state telephone company similair to AT&T) invented a receiver that could pick up radiation from crt based monitors. Not shure if the man his name was "Van Eijck" or "Van Eck" Distance was up to 400 meters...they even made a unit available at about 3500 US $...all this was done to market a chip made by plessey that would scramble the tv-lines...the lines would be written in a different order then normal...so anyone who would try to receive anything would not be able to restore the original picture... The person watching the original screen would still see the whole picture in a correct way caused by the delay effect of the crt screen Does anyone know where to find information about this? how to make such a receiver...or does anyone manufacutere such a receiver ? Yes i know That it does'nt work on LCD screens Thanks . 8232 From: Steve Uhrig Date: Sat Feb 14, 2004 8:53pm Subject: Re: Screening your house On 14 Feb 2004 at 1:12, contranl wrote: > There is a lot of fuzz going on about the new digital radio-networks > based on the "Tetra" standard, > The unhealthy effects have not been proven...but the contrary neither You can't prove a negative. > Tetra uses the 380~400 Mhz band and the modulation is TDMA > The carrier is switched on and of at a rate of around 17 hz > Similair to GSM-cellphones (217) this causes a lot of interference The > power levels in Tetra are higher then with Gsm,the switching frequency > of 17 hz is more dangerous then that of Gsm because it's in the range > of "human" frequencies The U.S. FCC has guidelines for human exposure to RF radiation. There are formulae and charts for frequency, ERP, distance, field strength, etc. Amateur radio operators are supposed to know this. I don't. The type of modulation is not mentioned and I do not believe it would make a difference overall. There may be some consideration for duty cycles of stuff like SSB with an intermittent duty cycle and lower average power versus continual key down data. Do some web searching and you'll turn up the data and the studies used to derive it. I don't recall seeing any credible information on 'human' frequencies. I have seen a lot of lunatic fringe stuff on them. That doesn't mean there isn't anything to it, but I haven't seen anything credible. Shielding and screening can work if done properly. It rarely is done properly and probably never at a consumer level. Research screen rooms and you'll see why. You may want to research the archives of this list on yahoogroups.com. Every question you asked in your various messages has been discussed and debated to death on this list in previous years. Here is a good site for Van Eck info: http://www.eskimo.com/~joelm/tempest.html Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8235 From: James M. Atkinson Date: Sat Feb 14, 2004 9:20pm Subject: Re: Van Eijck receiver (radiation of crt monitors) I have an extended write up of this subject at: http://www.tscm.com/TSCM101tempest.html -jma At 08:28 PM 2/13/2004, contranl wrote: >. > > >About 10 years ago a researcher from a laboratory owned by the Dutch >PTT(former state telephone company similair to AT&T) invented a >receiver that could pick up radiation from crt based monitors. >Not shure if the man his name was "Van Eijck" or "Van Eck" > >Distance was up to 400 meters...they even made a unit available at >about 3500 US $...all this was done to market a chip made by plessey >that would scramble the tv-lines...the lines would be written in a >different order then normal...so anyone who would try to receive >anything would not be able to restore the original picture... >The person watching the original screen would still see the whole >picture in a correct way caused by the delay effect of the crt screen > >Does anyone know where to find information about this? how to make >such a receiver...or does anyone manufacutere such a receiver ? > >Yes i know That it does'nt work on LCD screens > >Thanks ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8236 From: Date: Sun Feb 15, 2004 1:41pm Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 8237 From: James M. Atkinson Date: Sun Feb 15, 2004 11:04pm Subject: GOP has asked British SS to bug phones of American political candidates http://www.freerepublic.com/focus/f-news/1078599/posts Explosive Story: GOP has asked British SS to bug phones of American political candidates! Posted on 02/15/2004 8:36:43 AM PST by Hillary's Lovely Legs FOX NEWS 11:25am EST 2-15-2004 Fox news is interviewing John Loftus, Formers Justice Department Prosectutor who states that he has an inside scoop that "the Republican Party has asked the British Secret Service to bug phones of American political Candidates. " FOX NEWS Eric Shawn: "It's a very serious and very shocking story." JOHN LOFTUS: "That allegation seems very strong of that is the case. Why would any political party want to bug someone else? It's a juicy way of running a smear campaign behind the works. We have been doing that for about 50 years and it started with president Roosevelt. He had signed a secret treaty with Britain in 1943 that let them each set up listening posts on each other's soil with no search warrants. It's a great little scheme. " "So the British can use American computers to bug American politicians, and the Americans can use British computers to bug British politicians and each side can truthfully say that they aren't spying on their own citizens. They are just trading information under the table." ERIC: How widespread is this. Members of the Security Council admitted to me that they are being bugged and that it wasn't surprising, they expected that. JOHN: "What congress doesn't realize is that this is meant to favor one party only. In 1978 Carter tried to ban taping without a court order. So the bill is that the NSA cannot target American citizens, but not other countries from doing it. " ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8238 From: James M. Atkinson Date: Sun Feb 15, 2004 11:07pm Subject: British spy op wrecked peace move http://www.guardian.co.uk/Iraq/Story/0,2763,1148623,00.html British spy op wrecked peace move Martin Bright, Peter Beaumont and Jo Tuckman in Mexico Sunday February 15, 2004 The Observer A joint British and American spying operation at the United Nations scuppered a last-ditch initiative to avert the invasion of Iraq, The Observer can reveal. Senior UN diplomats from Mexico and Chile provided new evidence last week that their missions were spied on, in direct contravention of international law. The former Mexican ambassador to the UN, Adolfo Aguilar Zinser, told The Observer that US officials intervened last March, just days before the war against Saddam was launched, to halt secret negotiations for a compromise resolution to give weapons inspectors more time to complete their work. Aguilar Zinser claimed that the intervention could only have come as a result of surveillance of a closed diplomatic meeting where the compromise was being hammered out. He said it was clear the Americans knew about the confidential discussions in advance. 'When they [the US] found out, they said, "You should know that we don't like the idea and we don't like you to promote it."' The revelations follow claims by Chile's former ambassador to the UN, Juan Valdes, that he found hard evidence of bugging at his mission in New York last March. The new claims emerged as The Observer has discovered that Government officials seriously considered dropping the prosecution against Katharine Gun, the translator at the GCHQ surveillance centre who first disclosed details of the espionage operation last March. According to Whitehall sources, officials feared the prosecution would leave the Government and the intelligence services open to embarrassing disclosures. They were known to be concerned that the 29-year-old Chinese language specialist would be seen as a patriotic young woman acting out of principle to reveal an illegal operation rather than as someone who betrayed her country's secrets. They are also known to be worried that any trial would force the disclosure of Government legal advice on intervention in Iraq, described by one source as 'at best ambiguous'. Gun has attracted high profile support, particularly in the US, where her case has been taken up by Hollywood stars, civil rights campaigners and members of Congress. Yesterday, Oscar nominee, Sean Penn, told The Observer that Gun was 'a hero of the human spirit'. Aguilar Zinser also paid tribute: 'She is serving a noble cause by denouncing what could be illegal acts,' he said. The operation by the US National Security Agency and GCHQ was revealed by The Observer last March, after a leaked memo showed US spies had begun an intelligence 'surge' on members of the UN security council in which they needed British help. Liberal Democrat Foreign Affairs spokesman Menzies Campbell last night called on Foreign Secretary Jack Straw to clarify Britain's role: 'If the allegations that these operations had ministerial authority are well-founded, then it could hardly be more serious for the Government. There will be understandable uproar at the UN. On the other hand, if the eavesdropping took place without Ministers knowing, then the question is, who was in charge?' The Mexican government confirmed last week that diplomatic letters were sent to Straw last December asking him to clarify whether GCHQ was involved in spying on its UN allies. They have yet to receive a response. The Foreign Office refused to comment on the new allegations. But the revelations of the former Mexican ambassador will not go away as he is planning a book about his experiences at the United Nations. Aguilar Zinser told The Observer that the meeting of diplomats from six nations took place about a week before the decision not to put the resolution to the vote. They were working on a draft document of a compromise solution when the American intervened. 'We had yet to get our capitals to go along with it, it was at a very early stage. Only the people in the room knew what the document said. The surprising thing was the very rapid flow of information to [US] quarters. 'The meeting was in the evening and they call us in the morning before the meeting of the Security Council and they say, 'We appreciate you trying to find ideas, but this is not a good idea." I say, "Thanks, that's good to know." We were looking for a compromise and they [the US] say, "Do not attempt it."' ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8239 From: Jim Conrad Date: Mon Feb 16, 2004 0:19am Subject: Re: Van Eijck receiver (radiation of crt monitors) The real thing ??? :-) http://www.oceanviewcom.com/ebay/021504/van_eijck_box.jpg At 10:20 PM 2/14/2004, James M. Atkinson wrote: >I have an extended write up of this subject at: >http://www.tscm.com/TSCM101tempest.html > >-jma > > > >At 08:28 PM 2/13/2004, contranl wrote: > >. > > > > > >About 10 years ago a researcher from a laboratory owned by the Dutch > >PTT(former state telephone company similair to AT&T) invented a > >receiver that could pick up radiation from crt based monitors. > >Not shure if the man his name was "Van Eijck" or "Van Eck" > > > >Distance was up to 400 meters...they even made a unit available at > >about 3500 US $...all this was done to market a chip made by plessey > >that would scramble the tv-lines...the lines would be written in a > >different order then normal...so anyone who would try to receive > >anything would not be able to restore the original picture... > >The person watching the original screen would still see the whole > >picture in a correct way caused by the delay effect of the crt screen > > > >Does anyone know where to find information about this? how to make > >such a receiver...or does anyone manufacutere such a receiver ? > > > >Yes i know That it does'nt work on LCD screens > > > >Thanks <:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:> Jim Conrad - jjc@o... or jimc1790@a... (backup) 757-560-5970 Office/Voicemail/Pager - 757-587-8251 Fax CAGE 0UD60 - http://www.oceanviewcom.com/ 8242 From: contranl Date: Sun Feb 15, 2004 1:09pm Subject: Laser Microphones , Gps receiver-detector. . Last questions for today : 1) What is the current state of development and availability of so called "laser microphones" where a leaser beam is being directed at a window and then reflected back...the reflected beam is then converted to an electrical signal using a photo electric cell I have seen demonstrations on this by a German company (PK Electronics)many years ago, and later i made one myself...results were not to good but i succeeded in listening to a closed telephone booth with windows...from a 50 meters distance. such a phonebooth is probably the easiest way to use this technique on ,since it is very small and has big windows therefore the sound pressure on these windows is very high...but what about less convinient situations ? Are there any developments on this...a serious manufacturer that has one available maybe ? ........................ 2) Does any one have experience with this fairly new equipment: "Signet" and "Signet-mobile" they are manufactured by the UK based company called "Audiotel" http://www.audiotel-int.com I know they have been around for a long time and have manufactured some good detection equipment. But these new devices...i do'nt know...they seem to me like simple wideband AM-detectors..in a nice hightek casing. ........................... 3) Detection of Gps receivers Has anyone ever thought of the possibility to make a "GPS receiver-detector" Gps receivers are used in many applications... i would be interested in obtaining ore making such a detector...the application would be the detection of car-trackers (passive or active) specially the so called "loggers" that just receive and do'nt cummunicate Such a detector could be based on the principle of detecting either the: Local oscillator frequency (LO) or Microprocessor quartz frequency chances are very high that most of these gps-receivers use some common frequencies...a list of used frequencies would be very small i guess...so they could be scanned fast using a dedicated receiver or possibly a standard radio-scanner anyone ? Thanks Tetrascanner www.tetrascanner.com . 8243 From: Spook Date: Mon Feb 16, 2004 2:23am Subject: Re: Van Eijck receiver (radiation of crt monitors) Nope, -jma At 01:19 AM 2/16/2004, Jim Conrad wrote: >The real thing ??? :-) > >http://www.oceanviewcom.com/ebay/021504/van_eijck_box.jpg > > > >At 10:20 PM 2/14/2004, James M. Atkinson wrote: > >>I have an extended write up of this subject at: >>http://www.tscm.com/TSCM101tempest.html >> >>-jma >> >> >> >>At 08:28 PM 2/13/2004, contranl wrote: >> >. >> > >> > >> >About 10 years ago a researcher from a laboratory owned by the Dutch >> >PTT(former state telephone company similair to AT&T) invented a >> >receiver that could pick up radiation from crt based monitors. >> >Not shure if the man his name was "Van Eijck" or "Van Eck" >> > >> >Distance was up to 400 meters...they even made a unit available at >> >about 3500 US $...all this was done to market a chip made by plessey >> >that would scramble the tv-lines...the lines would be written in a >> >different order then normal...so anyone who would try to receive >> >anything would not be able to restore the original picture... >> >The person watching the original screen would still see the whole >> >picture in a correct way caused by the delay effect of the crt screen >> > >> >Does anyone know where to find information about this? how to make >> >such a receiver...or does anyone manufacutere such a receiver ? >> > >> >Yes i know That it does'nt work on LCD screens >> > >> >Thanks > > ><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:> > Jim Conrad - jjc@o... or jimc1790@a... (backup) > 757-560-5970 Office/Voicemail/Pager - 757-587-8251 Fax > CAGE 0UD60 - http://www.oceanviewcom.com/ 8246 From: Steve Uhrig Date: Mon Feb 16, 2004 1:13pm Subject: Re: Laser Microphones , Gps receiver-detector. On 15 Feb 2004 at 19:09, contranl wrote: > What is the current state of development and availability > of so called "laser microphones" where a leaser beam is being > directed at a window and then reflected back...the reflected beam is > then converted to an electrical signal using a photo electric cell Laboratory science only. Impractical in the real world. Again, check the archives. I bet you'll find fifty messages discussing this in detail. There is some non-hype factual info on www.spybusters.com. > I have seen demonstrations on this by a German company (PK > Electronics)many years ago PK is well known for staging phony demos. I've personally seen them. Don't use shysters as a reference. Or any spy shop. The concept is valid, and the spy shops have capitalized on it. However, environmental noises are much greater intensity than the human voice, not to mention the near-impossibility of finding the reflected laser beam. People like to throw around the buzzwords of angle of incidence equals the angle of reflection. You'd have to hit the surface off which you're reflecting at precisely 90 degrees to have the beam bounce back to you, and that's presuming the reflecting surface is perfect, which glass or other things are not. I don't know if retroreflectors would address this problem or not. > Detection of Gps receivers > Such a detector could be based on the principle of detecting either > the: > Local oscillator frequency (LO) Possible. Probably not practical, especially if the receiver is in a metal box. > or > Microprocessor quartz frequency > chances are very high that most of these gps-receivers use some > common frequencies...a list of used frequencies would be very small i > guess...so they could be scanned fast using a dedicated receiver or > possibly a standard radio-scanner How many microprocessors do you think are in a modern automobile? If you get close enough to sniff a pipsqueek oscillator, you'd be close enough to see the thing physically I expect. You're talking a very weak signal, with the SMD leads being an inefficient antenna, probably inside a grounded metal box acting as a shield, in an environment with hundreds of microprocessors all happily radiating away and infinite nonlinear junctions in the vicinity to give you 2nd and 3rd and Nth order products of all these signals mixing. It'd be fun finding one signal out of the mass of noise across the spectrum. Certainly it could be done by experienced people knowing precisely what they were looking for, using the proper equipment, and having a blank check. But what is possible is very different from what is practical. A physical search would be much more practical. Keep thinking though. That's a good thing. And keep asking questions. You don't learn by talking nearly as much as you learn by listening. I commend you on your open and inquisitive mind. Don't forget the archives. Over a thousand people have been discussing every topic under the sun for years. There's a lot of info in the archives. Go to www.yahoogroups.com and log in using your username and password, then go to TSCM-L under My Groups, and you'll see the links for searching the list archives. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8247 From: Michael Puchol Date: Mon Feb 16, 2004 1:05pm Subject: Re: Re: Screening your house Hi, I happen to work with a TETRA network as part of my volunteer firefighter work - we have a regional TETRA network in the 380-400MHz band. Indeed, since this is a TDMA network, with logical carriers (slots) on each physical carrier, with 25kHz bandwidth, there is switching - however, this switching is only done by the mobile stations (hand portable and vehicle mount). The base stations transmit a full-time carrier, and so they do not switch or alternate the RF patterns at all - in your SA it will look exactly the same as any other UHF RF carrier of similar characteristics, but in the analog domain. I've had one of these stations about 700 meters from my house, where I receive a -60dBm signal, for over three years, and I've not grown green tentacles or anything of the like. These stations transmit an EIRP of 10W, handheld transceivers between 1W and 3W, and mobiles a maximum of 10W. I can understand concerns about the RF characteristics of TETRA, but only by the professionals that use the terminals - they are the ones subjected to the switching RF......but so is anyone using a digital phone, and I think we'd be seeing an epidemic pattern by now if it had such bad effects. GSM has been widely used in Europe for some 10 years, time enough for sensitive people to develop RF-augmented diseases. Best regards, Mike ----- Original Message ----- From: "Steve Uhrig" To: Sent: Sunday, February 15, 2004 3:53 AM Subject: [TSCM-L] Re: Screening your house > On 14 Feb 2004 at 1:12, contranl wrote: > > > There is a lot of fuzz going on about the new digital radio-networks > > based on the "Tetra" standard, > > > The unhealthy effects have not been proven...but the contrary neither > > You can't prove a negative. > > > Tetra uses the 380~400 Mhz band and the modulation is TDMA > > The carrier is switched on and of at a rate of around 17 hz > > > Similair to GSM-cellphones (217) this causes a lot of interference The > > power levels in Tetra are higher then with Gsm,the switching frequency > > of 17 hz is more dangerous then that of Gsm because it's in the range > > of "human" frequencies > > The U.S. FCC has guidelines for human exposure to RF radiation. There > are formulae and charts for frequency, ERP, distance, field strength, > etc. Amateur radio operators are supposed to know this. I don't. > > The type of modulation is not mentioned and I do not believe it would > make a difference overall. There may be some consideration for duty > cycles of stuff like SSB with an intermittent duty cycle and lower > average power versus continual key down data. > > Do some web searching and you'll turn up the data and the studies > used to derive it. > > I don't recall seeing any credible information on 'human' > frequencies. I have seen a lot of lunatic fringe stuff on them. That > doesn't mean there isn't anything to it, but I haven't seen anything > credible. > > Shielding and screening can work if done properly. It rarely is done > properly and probably never at a consumer level. Research screen > rooms and you'll see why. > > You may want to research the archives of this list on > yahoogroups.com. Every question you asked in your various messages > has been discussed and debated to death on this list in previous > years. > > Here is a good site for Van Eck info: > > http://www.eskimo.com/~joelm/tempest.html > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > 8251 From: jimbo Date: Tue Feb 17, 2004 3:26am Subject: Intercepted video signal leads to arrest in suspected abuse http://www.jsonline.com/news/metro/feb04/208097.asp Intercepted video signal leads to arrest in suspected abuse By JOHN DIEDRICH jdiedrich@j... Posted: Feb. 16, 2004 As William Brookins surveyed the images on a monitor from his home security cameras Sunday night, two young girls with their hands overhead flickered onto the screen. Milwaukee Surveillance Camera A video, which Milwaukee resident William Brookins said he picked up on his security system, shows two youngsters and a woman apparently striking one of them. A woman was later arrested. Surveillance Camera Related Coverage Video: TMJ4 report The 57-year-old snowplow driver realized he was intercepting images from another camera. He called neighbors trying to figure out whose home he was watching. All the while, the kids kept their hands high. After 25 minutes, the 2-year-old's arms began to sag. A woman charged into the picture and hit the toddler in the abdomen and then the face, knocking her to the floor. As the woman gestured, the girl scrambled back to her feet and again put her arms overhead. That was enough for Brookins. "I said, 'I got to call the police. This isn't right,' " he said. Detectives scoured the neighborhood and early Monday arrested Theresa Smith, a foster mother who lives in the 3200 block of N. 41st St. The girls in the video were foster children. Smith, 39, was arrested on suspicion of physical abuse of a child, according to the police jail log. The district attorney was reviewing the case. Six children lived in the home: the 2- and 4-year-old girls and a 5-month-old boy, all in foster care, plus Smith's own children, ages 14, 12 and 10, police said. Investigators did not find signs of abuse on the infant or older children. The younger children went to different foster homes. Child welfare workers took custody of Smith's children. Smith doesn't have a criminal record, and there were no other allegations of neglect against her during her three years as a licensed foster care parent, said Denise Revels Robinson, executive director of the state-run Bureau of Milwaukee Child Welfare, which oversees the foster care system. The bureau put a hold on Smith's status as a foster mother, meaning no children can be placed at her home while an outside agency conducts an investigation that could take 60 days, said Revels Robinson. Revels Robinson said it was "totally intolerable" that children who were sent to a foster home to escape neglect or abuse may have faced the same treatment in what was supposed to be a safe place. "I am very appalled," she said. "This is very much the exception, but one child is too many." In 2003, the bureau received 465 allegations of abuse by foster parents, 49 of which were substantiated, Revels Robinson said. The bureau supervises 1,600 foster homes in Milwaukee County where 3,900 children live, she said. Police and social workers alike said Monday that they had never heard of alleged abuse being captured by an intercepted video signal. Home security cameras operate in a relatively narrow frequency band, and it makes sense that one signal could pop onto another system, said Don Larson, who runs Security Electronics Inc., Muskego. "That is bizarre, but it's definitely possible," he said. Brookins bought the cameras off the Internet a couple of years ago to keep an eye on his snowplows. Each night, he flips among several cameras, videotaping the action off the monitor. At 9 p.m. Sunday, the other picture crept onto Brookins' screen. He compared it to having a call cut in on a wireless phone. After watching the girls stand with their hands overhead for a while, Brookins called friends who take care of children to see if they thought that was abuse. Making young children do that for so long was wrong, they said. The girls stood for 90 minutes with the arms up before they were allowed to go to bed at 10:40 p.m., he said. "That is too long for anyone," Brookins said. "I couldn't do it." Besides striking the 2-year-old, the woman in the video hit the 4-year-old on the head with what looked like a stick, Brookins said. Police officers arrived and were initially stumped about how to find the suspect. Detectives Sean Lips, a technology buff, called the camera maker and figured out that the other camera must be within 300 feet. Brookins gave police a tape of the abuse and went to bed. He woke at 4:18 a.m. to find his system still receiving the other camera's picture. He was shocked to see the 4-year-old girl again standing with her hands up. She stayed that way for more than two hours, until 6:30 a.m., when police arrived. Brookins saw the woman take the girls from the room and then a police officer came on his screen. Monday night, Brookins was back to watching his cameras for burglars. "They work well for me, and in this case they stopped some abuse," he said. From the Feb. 17, 2004 editions of the Milwaukee Journal Sentinel 8253 From: John Papaleo Date: Tue Feb 17, 2004 10:26am Subject: RE: File - mission.txt this is a test only -----Original Message----- From: TSCM-L@yahoogroups.com [mailto:TSCM-L@yahoogroups.com] Sent: Sunday, February 15, 2004 2:41 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8255 From: contranl Date: Tue Feb 17, 2004 0:47pm Subject: To the moderator of this group . Dear Moderator, I see that one of the messages posted by my a few days ago (i guess i sent them on subday)has not shown up, The message concerned was about if anyone did have any experience with some new devices made by "audiotel UK"..i also stated that this company has been around for a long time and usually makes very good equipment.in my view the message was on topic and not against any of the rules of this group it did'nt insult the mentioned company either I do agree with somekind of moderation however...allthough i do'nt allways understand your criteria,specially the current gsm-jammer issue is not really very professional,i do understand your sometimes difficult position. Ofcourse you would have the right to keep this group the way you want it to be... Since i am a new member to this group it could be that i have written something that you would consider unfit. I am certainly not planning to spoil my membership here,i do appriciate this group very much and i have already sent several postings that were certainly of interest and on topic. i am not planning to lose my membership and will certainly keep to the rules Could you advice me what happened to my posting ? in the worst case something went wrong and the posting did'nt arrive..if that is the case please consider this message as not being written and i apologize beforehand. Thanks Yours sincerely Tetrascanner Amsterdam The Netherlands . 8256 From: contranl Date: Wed Feb 18, 2004 0:16pm Subject: Re: Lasermics and Gps receiver detector . A Little confused how it can happen that replies to messages come back to my yahoo mailadress saying that "they failed to be delivered"..while the where send and accepted in this group.....lucky enough the original message was included so here they are again: ................................................................. Thanks for the reply Steve, > Laboratory science only. Impractical in the real world. I am not shure on that...since i made one my self 10 or more years ago...you would have to agree that things have changed a little in 10 years...also i did not have access to all technology then (i still do'nt :) i used a simple and lowcost (noisy) laser and a lowcost photocell (noisy) the receiver was built in a old reflex camera and i succeeded doing 50 meters. i imagine that there's a lot of better components around today > I have seen demonstrations on this by a German company (PK > Electronics)many years ago > PK is well known for staging phony demos. I've personally seen > them. Don't use shysters as a reference. Or any spy shop. Could be but i was very sceptical..maybe they could fool someone else...i am technician enough to understand all the tricks they could use, thats why i made one myself > The concept is valid, and the spy shops have capitalized on it. I dont think they did that to a great extend ... the Germans asked something like 20.000 US$ for it... allthough i remember something about someone disappearing around that time..it had something to do with delivery of nightvision stuff to the middle east (that's what they said)it was either PK or Micro-electronics (both from Germany) > However, environmental noises are much greater intensity than the > human voice, true but since then DSP-filtering,Phasearray,Correlation and other techniques have come around. >not to mention the near-impossibility of finding the >reflected laser beam. you know more or less where it comes back...using a switchable dual beam (infrared+visible) solves that, it can be made visible using cards(kodak) that light up when "touched" by laser > You'd have to hit > the surface off which you're reflecting at precisely 90 degrees to > have the beam bounce back to you, That is when your transmitter and receiver are in the same place wich is not necessary. > surface is perfect, which glass or other things are not. I don't > know if retroreflectors would address this problem or not. I have heard of a slightly different approach where you do'nt actually have to catch back the reflected beam...they simply measure the size of the spot on the surface...this spot varies in size according to the movement of the surface...if this is possible then you could be anywhere and look at the spot from any angle...ofcourse maximum variation would still be at 90 degrees...allthough i think that these variations could be to small to measure.it's an interesting thought. My idea is that this lasermic technique could have been much improved since i made one myself(using low cost parts) 10 years ago, so it might be around...i always look at countersurveillance equipment available to know if the other side (the surveillance) exists...and specific laser counter stuff is around...shure..you could sell anti UFO stuff if somebody want's it. So i am not shure if better lasermics do'nt exist...the fact that you do'nt see them advertised does'nt mean anything. Allthough one other thing is that these days there are lots of other things around that would be easier and cheaper to use instead of lasermics > > Detection of Gps receivers > Possible. Probably not practical, especially if the receiver is in > a metal box. Agree allthough there maybe some radation over antenna cables or power supply cables > How many microprocessors do you think are in a modern automobile? If you remove the main cable to the battery all microprocessors will be off (unless backupped ofcourse wich in practice would be only alarmsystems maybe) ,self generated signals would be known > If you get close enough to sniff a pipsqueek oscillator, you'd be > close enough to see the thing physically I expect. You're talking > a very weak signal, with the SMD leads being an inefficient > antenna, I personally have detected pagers from 100 meters distance the interesting thing there was that the received LO was slightly modulated with the actual data being received by the pager !! This trick would allow you to actually receive the contents of messages being send to a closeby pager...such a message will also contain the RIC code of that pager...meaning that once the RIC code has been intercepted you won't have to stay close to that pager, you could go home and monitor the pager there using widely available pocsag software or a "cloned" pager (thie effect is probably caused by the fact that the LO gets slightly pulled off frequency in the same rythm as what is being received...pagers are very basic receivers and the data send is many times not a fsk signal modulated onto a fm carrier...but the carrier itself is switched (keyed) in the rythm of the data. antennas in pagers are very minimal but since the LO is not that far away from the antenna(not physical and not electronical)it might get reradiated. > Certainly it could be done by experienced people knowing precisely > what they were looking for, using the proper equipment, and having > a > blank check. But what is possible is very different from what is > practical. A physical search would be much more practical. I was actually thinking of a system that would be built in car so the cars owner would be warned of such a gps-tracking device so you wo'nt need to do a physical inspection all the time,or a small portable and simple to use device I agree that a physical inspection would be a good way since such a gps device could not just be placed anywhere..because it will always at least have to "see" a part of the sky...allthough a new correlation technique now makes it possible to even get correct readings with the intenna inside a closed trunk !!! This technique is now being implemented in cellphones there location is now known even when the phones are inside 20 floor high buildings !! i am shure it is now coming to cartrackers too I nice video demo you will find below where a gps receiver is actually put inside a microwave oven wich in turn is inside a building...later on there is a demo showing a gps receiver inside a car's trunk....in both cases it still finds it's position. http://www.globallocate.com/demos_main.shtml# If "they" are using this new technique in a cartracker this means it could be anywhere...then your job to find it might mean that you will have to dismantle the car completely ! Somebody knowledgeable did some research on how many different frequencies (LO and uP)are being used in various brands of gps receivers and he said they were allmost all the same i was amazed ...and he said that was because they all used the same kind of frontend tuned to the same frequency and using the same LO i will verify that by looking up some specs > Keep thinking though. That's a good thing. And keep asking > questions. > You don't learn by talking nearly as much as you learn by > listening. > I commend you on your open and inquisitive mind. Thanks for the compliments and your appriciated answers i am happy to get some good respons ! Tetrascanner www.tetrascanner.com . 8257 From: contranl Date: Wed Feb 18, 2004 0:38pm Subject: Re: Screening your house . This message was posted and accepted too...but it did not appear and also came back to me trough the mail so here it is again....sorry for the confusion...do'nt know how to solve that or what causes this) .................................................................... Thanks for your reply, Here in your Europe there are currently much more networks based on TDMA techniques(comparable with PCM) then in the USA Some of these are GSM and TETRA. The type of modulation is certainly of influence on the (unwanted) effects to health (in fact it is the main point) and radiofrequency interference (RFI) ...it's the pulsing that causes the problems and more specific the waveform...specially the risetime..the shorter risetime or the more the more rfi and the more unwanted detection takes place. The order of modulation types that cause unwanted RFI is something like this (min) WFM..NFM..........AM...SSB..................TDMA (max) TDMA is a modulation type where the carrier is (hard) switched on and off The rf carrier frequency itself is off less importance allthough the 380~400 mhz band has a ideal wavelength for penetrating human made structures (wavelength = about 80 cm) Remark: the max power might be 10 watts.(per channel)..but do'nt forget that in most cases there is not 1 rf carrier but 3 or 5 (in my country)one antenna can have that many carriers ...so the total fieldstrength would be higher (not shure about how to add that up since they do'nt have the same frequencies and contents) I have read about 25 reports on this ...you may find some of them on my website here: http://www.tetrascanner.com/gsm-tetra-detector.html With "human frequencies" i mean those frequencies that are in the same range as the frequencies that the human bodies uses or generates to regulate it's functions Those frequencies are exactly the ones that are being measured using medical equipment in hospitals ..since the Tetra equipment (specially the mobile handhelds) pulse exactly in this range (17 hz) they may cause problems like unwanted detection (AM components) and this could lead to the malfunction of such equipment...screening and filtering inputs does help...but is a little difficult because the wanted frequencies are in the same range as the unwanted...i am not talking about "beta" , "Alfa" or any other "occult" type of waves just plane and well known electrical signals The health problem is still in research by various respectable laboratories their reports do not all point in the same direction..at least they don't all conclude that the Tetra system is 100% safe ...specially the long term effects are not known...the general public is not convinced. In the USA there might be less problems since most systems use CDMA modulation (APCO and Cellphone) CDMA does no pulse since it is a digital signal modulated on a steady NFM-carrier it does not cause strong RFI. Here is the latest Tetra-mast removal (yesterday): http://news.bbc.co.uk/1/hi/wales/mid/3473207.stm Thanks Tetrascanner www.tetrascanner.com . 8258 From: contranl Date: Wed Feb 18, 2004 0:47pm Subject: Re: Screening your house . The last one that also came back as not delivered ................................................. It's the correct link to the article that started this thread: www.iwcp.co.uk/ViewArticle2.aspx?SectionID=1252&ArticleID=739918 copy and paste that in your browser...if that does'nt work put http:// in front of that. Specially the picture is interesting showing a older and very tired couple screening there windows...typically what you would expect. Tetrascanner . 8259 From: Shawn Hughes Date: Thu Feb 19, 2004 10:40am Subject: Re:the ENTIRE Digest Number 1494 Contranl, Couple of things..... 1) Instead of flooding my mailbox with all these bounced posts, couldn't you have simply emailed jma about your situation? 2) Since Steve Uhrig is too modest to really introduce himself, allow me. He is one of the best and brightest we have on this list. Saying that, unlike many 'personalities' in this business, he really, really does take time to help and guide newbies. 3) You are taking advantage of Steve with these questions you ask. You are mistaking genuine interest in your posts for people gently helping you, but trying to get you to read the archives, where you'll find LASER mikes and GPS have been beaten to death. (PS, many phones don't use GPS. GPRS and GPS aren't the same). 4) Then, after these guys take a sec to try to point out what the rest of us know, you respond with: "I am not shure on that...since i made one my self 10 or more years ago." So? So did many, many other children in the US for science fairs. Steve makes real gear for real people FOR A LIVING. This isn't his hobby; it's his livelihood. Do you REALLY think there's a technology that's completely escaped his attention? Not saying he is infallable, but, if he says it, he's putting his rep on the line behind his statement, so I tend to listen. 5) You state " SU - However, environmental noises are much greater intensity than the human voice, YOU-true but since then DSP-filtering,Phasearray,Correlation and other techniques have come around." This gives me a good approximation where you are in your study of this field. Also, one can learn a lot about you by looking at your webpage. In closing, welcome to the board, but please give some consideration to what I had to also learn. Regards, -Shawn Shawn Hughes Lead Instructor, Tactical Response, Inc. USA 8260 From: Date: Thu Feb 19, 2004 6:55am Subject: U.S. to Keep Key Data On Infrastructure Secret 02/19/04 Washington Post U.S. to Keep Key Data On Infrastructure Secret Firms Encouraged to Report Security Gaps By John Mintz Washington Post Staff Writer Thursday, February 19, 2004; Page A21 Starting tomorrow, chemical companies, railroads, electric utilities and other parts of the nation's critical infrastructure can begin submitting sensitive information to the Department of Homeland Security about their vulnerabilities to terrorist attacks with assurances that their proprietary data would be safe from public disclosure. Under the Homeland Security Act of 2002, the department can deem data voluntarily provided by businesses that help the government stave off possible disruptions by terrorists as secret and unavailable to outsiders. The law's supporters view it as a way for U.S. officials to help map security plans for critical U.S. infrastructure, 85 percent of which is in private hands. But some advocates for environmental protection and open-records laws say unscrupulous firms might manipulate the rules as part of an attempt to evade federal enforcement of health or safety rules. Sean Moulton, a senior policy analyst with OMB Watch, a nonprofit group that opposes government secrecy, said that during the drafting of the law and the rules being released this week, key industries successfully lobbied for procedures ensuring that any information they share with Homeland Security would remain secret and would not be usable by other agencies in civil enforcement actions. "The government agreed that 'we'll keep secret this information you give to Homeland Security, and we won't do anything with it,' " other than for counterterrorist purposes, Moulton said. "It's naive to think we won't have bad actors in industry" misusing the protections, he said. Federal officials said they will strive to prevent the rules from allowing firms to avoid accountability for wrongdoing by including data about, for example, pollution at a chemical plant in a confidential report to the Homeland Security Department about security gaps. Robert Liscouski, the department's chief of infrastructure protection, said his staff will strive to ensure that the law is "not providing a safe haven" for corporate wrongdoers. Companies can be charged with felonies if they mislead the department into believing that the information they provide is not related to any enforcement matters being considered by other agencies, officials said. U.S. officials have no power under the Homeland Security Act to compel industries to provide data about their security gaps, so any corporate cooperation would be voluntary. Safeguarding nuclear plants, telecommunications nodes and thousands of other critical networks was one of the main reasons for the formation of the Homeland Security Department last year. It is an arena in which it is critical that U.S. officials synchronize their efforts with private industry, officials said. U.S. officials found soon after the Sept. 11, 2001, attacks that many industries were reluctant to share information about their operations and their security vulnerabilities because of fears of legal liability and concern that the information would be unearthed by outsiders using the federal Freedom of Information Act. "These industries weren't comfortable giving sensitive information" to the federal government, said Jamie Conrad, a lawyer who specializes in security issues for the American Chemistry Council, which represents large chemical companies. "There wasn't a high degree of confidence the Department of Homeland Security could keep it confidential." The industries' reluctance stifled progress in tightening security at many sites, officials said. That was what prompted Congress to extend secrecy guarantees to voluntary corporate declarations. Liscouski said yesterday that while some infrastructure industries are eager to discuss security issues with the government, others are dragging their feet for fear of prompting later government requirements that they spend money to protect their networks. The motivation of companies giving the information to his department, Liscouski said, is "doing public good in protecting the country." [Non-text portions of this message have been removed] 8261 From: A Grudko Date: Thu Feb 19, 2004 11:10pm Subject: Re: To the moderator of this group >-Original Message- > >From: contranl <> >I see that one of the messages posted by my a few days ago (i guess >i sent them on subday)has not shown up,..... >I do agree with somekind of moderation however...allthough i do'nt >allways understand your criteria,specially the current gsm-jammer >issue is not really very professional,i do understand your sometimes >difficult position. Although this message was addressed to the moderator I'd like to point out that this message certainly did get posted to the group and I would have replied to the Audiotel question if I had had time and as I am a fan of thier equipment but have not used the particular unit he was enquiring about. Pointing out that offering certain equipment for sale is illegal in certain areas seems very professional to me. If JMA erred it was perhaps by ommission, by not including 'in the USA' but this is a common oversight by American contributors to Internet groups. Andy Grudko (British), DPM, Grad IS (South Africa) Consulting Investigator, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , andy@g... Pretoria (+27 12) 244 0255 - 244 0256 (Fax) Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" 8262 From: Steve Uhrig Date: Fri Feb 20, 2004 0:50pm Subject: Yahoo privacy problems Yahoo is using 'Web Beacons' to track Yahoo Group users around the net and see what they're doing and where they are going - much like cookies. Yahoo's Privacy Statement has been updated: http://privacy.yahoo.com/privacy/us/pixels/details.html In the section 'Outside the Yahoo! Network' (3rd bullet down), you'll see a little 'click here' link that will let you opt-out of their new method of snooping. I strongly recommend you do this. Once you have clicked that link, you are opted out. Notice the 'Success' message the top the next page after you opt-out. Be careful because on that page there is a 'Cancel Opt-out' button that, if clicked, will *undo* the opt-out. Very misleading if you don't read before clicking (or not clicking) This situation affects everyone reading this message. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8263 From: Ocean Group Date: Fri Feb 20, 2004 1:48pm Subject: Brilliant Minds... Alright folks! With all this faffin' about I thought I would try and get all these brilliant minds on the list to stop messin' and see if they could use their technical greatness to other ends... I was wondering if anyone had any ideas on how to best detect the new Ultra Wide Band transmitters coming onto the market at the moment. The tx's are already available on the hardware developers market and I can see them being quickly incorporated into exisiting audio/video hardware. From what I gather the UWB allocated frequencies are at 2.5ghz and 5.8ghz and will probably operate at a centered frequency band of about 1500Mhz per channel.... With the bandwidth of UWB being so high it makes it ideal for high res video, and since UWB does not show up above the noise floor of most standard RF receivers I'd interested to hear if anyone has any ideas on what type of equipment to use or better yet how to adapt standard equipment to at least give some sort of indication of a UWB tx. I look forward to hearing any input... Oisin 8264 From: cismic Date: Fri Feb 20, 2004 1:16pm Subject: Re: Yahoo privacy problems Hi Steve, This technology has been around a long time. It used to be called spy-bots. When you setup a web page most servers will log and acknowledge that you have visited a web page. ie, *.gif, *.jpg, *.html, *.asp, *.php etc are some of the common extentions that appear when you visit a web page in that web servers log. So, now, when an email is created that has a link back to some web page via a graphic in an html email. http://www.somesite.com/emailopendpixel.gif then that will show up in the web log that the email was either read or opened. I don't like all the pretty email anyway. I mean formated html in email can allow virsuses to enter your system because it is just html like visiting a web page and scripting can be ran from email. I read all email as text that way the graphics or "web beacons", won't appear in any log of sites whose email I decide to read. I also completely clear out all cache every day. Joseph ----- Original Message ----- From: "Steve Uhrig" To: Sent: Friday, February 20, 2004 10:50 AM Subject: [TSCM-L] Yahoo privacy problems Yahoo is using 'Web Beacons' to track Yahoo Group users around the net and see what they're doing and where they are going - much like cookies. Yahoo's Privacy Statement has been updated: http://privacy.yahoo.com/privacy/us/pixels/details.html In the section 'Outside the Yahoo! Network' (3rd bullet down), you'll see a little 'click here' link that will let you opt-out of their new method of snooping. I strongly recommend you do this. Once you have clicked that link, you are opted out. Notice the 'Success' message the top the next page after you opt-out. Be careful because on that page there is a 'Cancel Opt-out' button that, if clicked, will *undo* the opt-out. Very misleading if you don't read before clicking (or not clicking) This situation affects everyone reading this message. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8265 From: Date: Sat Feb 21, 2004 4:40pm Subject: Interesting site for gain antennas http://www.directivesystems.com/ [Non-text portions of this message have been removed] From: DrPepper Date: Fri Feb 15, 2002 10:15am Subject: Re: Photo Radar Countermeasures Actually, Spain is the most dangerous place to drive an automobile in the world. The seem to have no sense of danger out on the highways, and lethal accidents are very common They really need SOMETHING to slow people down. But then again, ignorance can be cured but stupidity is forever ========================================= Michael Puchol wrote: > Very well said. In Spain, until last week, police had to pull you over after > taking your picture with a radar trap, to positively identify you and give > you the ticket - this meant only about 10% of pics taken were notified. > ==================snippy de deee=================== -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 4804 From: Craig Snedden Date: Fri Feb 15, 2002 2:17pm Subject: RE: Photo Radar Countermeasures Nope, disagree. Cyprus is pretty hairy. Traffic lights: Green - Go very fast, Amber - Go Faster, Red - Put your foot down...... -----Original Message----- From: DrPepper [mailto:DrPepper@i...] Sent: 15 February 2002 16:15 To: Michael Puchol Cc: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Photo Radar Countermeasures Actually, Spain is the most dangerous place to drive an automobile in the world. The seem to have no sense of danger out on the highways, and lethal accidents are very common They really need SOMETHING to slow people down. But then again, ignorance can be cured but stupidity is forever ========================================= Michael Puchol wrote: > Very well said. In Spain, until last week, police had to pull you over after > taking your picture with a radar trap, to positively identify you and give > you the ticket - this meant only about 10% of pics taken were notified. > ==================snippy de deee=================== -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4805 From: gkeenan Date: Fri Feb 15, 2002 3:53pm Subject: Re: Photo Radar Countermeasures Ever try driving in Egypt? Cairo or Alexandria? Or better yet, take the "lovely" trip down the road alongside the Nile between the two cities! Lights? What Lights? We don't need no stinking lights!" What yellow line? I thought you only signed on a dotted line! I sure had lots of fun there!! Jerry Keenan GPKeenan Co., Int'l Security Services West Islip, NY ----- Original Message ----- From: "Craig Snedden" To: Sent: Friday, February 15, 2002 3:17 PM Subject: RE: [TSCM-L] Photo Radar Countermeasures > Nope, disagree. > > Cyprus is pretty hairy. Traffic lights: Green - Go very fast, Amber - Go > Faster, Red - Put your foot down...... > > > > 4806 From: Justin T. Fanning Date: Fri Feb 15, 2002 9:01pm Subject: NY Times: How to Fake a Passport (10-Feb-2002) I'm not normally taken to posting news stories on mailing lists, but this is such an exceptional piece I really think all the law enforcement types will enjoy. JMA: No more off topic posts I promise ;) JF --- http://www.nytimes.com/2002/02/10/magazine/10PASSPORT.html?pagewanted=all New York Times February 10, 2002 How to Fake a Passport By JEFF GOODELL Alain Boucar flips open a passport and holds it under an ultraviolet light. A background image of Belgium's royal palace, faintly printed on the page, vanishes. ''See that?'' he says. He holds another Belgian passport under the spooky purple light. The image on this one is printed in a special reactive ink. It glows brightly. ''The first one's a complete counterfeit,'' he announces. Boucar is the director of the antifraud unit for the Belgian federal police. A genial 44-year-old, he works in a small, plain office in Brussels that is strewn with dozens of passports. It's only 10 a.m., but it has already been a busy day -- there has been an urgent call from an Interpol agent in Berlin, and another from a security officer on a Dutch cruise ship. Each wanted information from Boucar about suspicious Belgian passports. Every few minutes, a uniformed cop wanders through with a question about a suspect document. ''No good,'' he says with disgust upon being handed an Italian ID card. Lousy fakes annoy Boucar; they are not worthy of his connoisseur's eye. Boucar's colleague Thierry Descamps steps into his office. He is holding a fax. Descamps nods to the phone and mentions the name of a Belgian police officer on the antiterrorism task force. Boucar grabs the phone and his face becomes suddenly serious -- the inner cop emerges. While Boucar listens on the phone, he turns to his computer and calls up a database nicknamed Braingate, which is the Belgian police's repository of 1.4 million stolen and fraudulent documents from all over the world. The antiterrorism cop is calling about two Sri Lankans, Nicolas Sebastianpillai and Varunalingam Arudthevan, who were arrested in Faro, Portugal, on Sept. 12, en route to New York. They were traveling on Belgian passports -- stolen ones, that is. (Portuguese security detected a fake stamp on their passports and contacted the Belgian police, who found the passport numbers in Braingate.) Interpol investigators soon began aggressively pursuing suspected links between the men and the Tamil Tigers, the violent Sri Lankan terrorist group. Now the antiterrorism cop wants to know how they got their hands on these Belgian passports. Boucar punches in the numbers of the passports confiscated by the police in Portugal: EC 503103 and EC 503104. Boucar learns that these two passports were stolen in March, in transit from Belgium to Madagascar: a batch of 25 blank passports was lifted out of a supposedly secure diplomatic pouch. Of all forms of passport fraud, this is one of the most frightening. Only the very best counterfeits make it past airport security. But authentic blank passports, when filled out correctly, are extremely difficult to detect. Virtually the only way to trip up a person traveling on an authentic passport is if he makes an error filling it out or if the passport number turns up in a database of stolen documents. That's why Braingate is so invaluable; without it, the Sri Lankans might well have made it all the way to New York. Boucar searches Braingate for more information. He tells the cop on the other end of the line that he can find no evidence that the other 23 passports stolen in the same batch have been used by terrorists -- or anyone else, for that matter. Of course, that doesn't mean they haven't been, Boucar tells me. It just means nobody has been caught yet trying to use them. In fact, they have almost surely been sold on the black market, providing two dozen fresh opportunities for terrorists to sneak across international borders. These 23 passports, Boucar admits, are hardly the only Belgian passports circulating on the black market. In fact, his country has quietly become the global capital of identity fraud. According to the Belgian police, 19,050 blank Belgian passports have been stolen since 1990. This is probably some kind of record, although other problem countries, like Italy, Argentina and South Africa, refuse to confirm numbers. All these Belgian passports were not stolen in a few grand heists. Rather, small stashes were grabbed from various town halls, embassies, consulates and honorary consulates. Sold on the black market for as much as $7,500, they have subsequently been used by human traffickers, sex traffickers, gun runners and drug dealers, not to mention terrorists. Indeed, for terrorists making excursions outside the Middle East, Belgian passports are often the document of choice. Ahmed Ressam, the Algerian convicted of plotting to blow up Los Angeles International Airport in 1999, trafficked in a number of false passports, at least one of which was linked to a theft from a town hall in Belgium. And the two members of a Qaeda cell who assassinated the Northern Alliance leader Ahmed Shah Massoud just before Sept. 11 traveled from Brussels to London to Karachi on stolen Belgian passports. Until this fall, Belgium's passport troubles were little noticed. The Massoud murder, however, exposed the country's problem to the world. It was a huge embarrassment for a small, chronically insecure country that has been working hard to cast itself as one of the economic and political capitals of the New Europe. After Sept. 11, Belgian investigators immediately began tracking down clues. The passports used by the Massoud assassins, Boucar discovered, were stolen in two separate break-ins: one at the Belgian consulate in Strasbourg, France, on June 26, 1999, when 45 passports were stolen, and another a few months later, on Nov. 11, 1999, when 20 were stolen from the Belgian Embassy in The Hague. The Belgian police are now desperately trying to tighten up security. But even if they succeed, Boucar will be busy for years to come. Terrorists are too determined and the desire for fake passports is too great. Moreover, thousands of stolen Belgian documents remain circulating around the world. Boucar looks up from his computer and gives me a weary look. ''Since Sept. 11,'' he says, ''it has been chaos around here.'' Belgium is, at first glance, a most unlikely spot for chaos. But its longstanding reputation as a sleepy gateway between France and Northern Europe is precisely what has made it attractive to criminals. ''Brussels is at the crossroads of Europe, and an enormous amount of human traffic passes through it,'' says Jonathan M. Winer, a former State Department official and an international-crime expert. ''As a result, Belgium is the place where all sorts of crime seems to settle: drugs, human trafficking, prostitution and identity fraud.'' To get a feeling for this criminal nexus, all you have to do is take a walk along the gritty boulevards around the Gare du Midi in Brussels. The neighborhood's main thoroughfare, Boulevard Maurice Lemonnier, is known to locals as Kandahar Lane. Spits of glistening meat turn in the windows of restaurants, and Middle Eastern music blares from CD shops. The whole neighborhood feels wired to another world: cabins du telephone offer cheap, untraceable communications; Internet cafes let you surf the Web anonymously for two euros an hour; travel shops advertise weekly bus-and-ferry service to Tangier. According to investigators, it was here at the Dar Salaam hotel that Richard Reid, the accused ''shoe bomber,'' recently spent 10 days plotting to blow up an American Airlines jet. (As if to underscore Belgium's reputation as the back office of terrorism, when Reid was arrested, a map of Brussels was found in his jacket pocket.) The Dar Salaam is more flophouse than hotel, with lots of old linoleum and chipped paint and a cafe on the ground floor that is jammed with Arab men smoking and drinking tea. A few steps away is Marrakech, an Internet cafe where Reid apparently made arrangements to pick up explosives. On the same block is another terrorist landmark: Le Nil, the restaurant where, on Sept. 19, Belgian police officers found chemicals that had supposedly been stored there by members of a Tunisian network linked to Al Qaeda. Investigators suspect that the chemicals -- 220 pounds of sulfur and 16 gallons of acetone -- were going to be used to build a bomb to blow up the United States Embassy in Paris. Just across another boulevard from the Dar Salaam is a row of shadowy bars and hotels that face the southern side of the train station. This is the end of Arab turf and, according to the Belgian police, the beginning of a neighborhood controlled by the Albanian mob. The bars and hotels here all have a forsaken look and all seem to be populated by desperate Eastern European men. Here the games are human trafficking, sex trafficking and false documents. ''If you want a passport, this is where you begin to make inquiries,'' says Herman Lefief, a Belgian investigator. The process is never quick, especially if you are a foreigner or unknown to the sellers. Luk Alloo, a Dutch television journalist who recently purchased a middling-quality counterfeit Belgian passport for $1,500 as part of an undercover investigation, spent three months working similar mob-controlled bars in Antwerp before he found anyone who trusted him enough to get him a passport. ''They never keep anything on the premises,'' Alloo says. ''They have connections, who have connections, who have connections. It's an elaborate operation.'' Until recently, many of those connections eventually led to a little bar about two miles away on the Chausee de Ninove in the Anderlecht district of Brussels. Anderlecht is a gritty landscape of warehouses, falafel joints and muffler shops, but the bar itself is a cheerful enough place; there's a pool table in the center of the room, and video machines blink quietly against one wall. But according to the Belgian police, this bar was -- and may still be -- the base of operations for an Albanian mobster whom Belgian cops refer to as ''M.'' (For legal reasons, they will not allow his name to be published.) From his bar stool, M. ran what investigators say was one of the largest organized stolen-passport rings in Europe. M. bought and sold thousands of blanks on the black market. His prices ranged from a few hundred dollars for an easy-to-get Albanian passport to $5,000 or more for a newly stolen Belgian or French passport. Investigators have also linked M. to dozens of break-ins at embassies and consulates in Germany, the Netherlands and France. According to the Belgian police, M.'s network is typical of the complex link between organized crime, passport fraud and terrorism in Belgium. One afternoon in the lounge of the Belgian federal police building, an investigator named Daniel Traweels draws me a picture to help me visualize how it works. He sketches four circles across the top of the page, labeling them P for prostitution, H for human trafficking, D for drugs and T for terrorism. Below, Traweels draws four more circles, identifying them as Romanians, Albanians and other Eastern Europeans who specialize in burglary and document manipulation. In the middle, he draws another circle and connects the circles above and below to the center; he labels it M. ''It's a network,'' Traweels explains. ''He is the middleman. The circles on the top, the buyers, they are of every race: Chinese, Russian, Arab. We have Jewish mobsters who work with Arabs, Arabs who work with Albanians, North Africans who deal with Jews. There is no prejudice in this business.'' But there is specialization, Traweels explains. The Africans are mostly involved in money laundering. The Moroccans are involved in car-jackings, robberies. The Eastern Europeans, especially the Albanians, are expert burglars and safecrackers. These patterns rarely vary. Arabs don't get involved in burglary, nor do terrorist cells attempt large-scale passport theft. ''They leave the dirty work to the experts,'' Traweels says. Belgium's troubles with stolen blank passports really began only in 1995. At the time, Europe was in the midst of a push toward the creation of a unified state -- the European Union. As part of this transformation, European leaders decided to do away with almost all border controls within Western Europe. In theory, this was meant to simplify travel and, like the introduction of the euro currency, promote the idea of Europe as a coherent economic power. In practice, the lack of borders has also benefited criminals. A network of Albanians, many of them fleeing the war in the Balkans, found that Belgium was an ideal place to set up shop. Many of them got involved in importing human beings, especially young girls they could force into prostitution. For that, they needed passports. Although counterfeit documents were readily available in Bangkok -- one large counterfeiting operation was run by an ex-K.G.B. agent in Thailand -- the quality was often poor. Eventually, many of these Albanian outlaws, including M., discovered that instead of counterfeiting passports, it was much easier (and more profitable) to steal blanks. The Belgians made it particularly easy for them. The country's long history of provincial rule -- it didn't become an independent nation until 1831 -- meant that the mayors of tiny communities enjoyed enormous power. One of their perks of office was the ability to distribute passports; for decades, blank Belgian passports were stored in the 600 or so town halls around the country. Often, security amounted to nothing more elaborate than a locked door. In 1996 alone, 3,600 blank passports were stolen, bit by bit. In some cases, the thieves had to drill their way into a heavy safe to get to the passports -- and if they couldn't crack it, they ripped the safe right out of the wall and carted the whole thing off. In other cases, like a break-in at a town hall in Tongeren, the thieves simply helped themselves to a safe key that had thoughtlessly been left in a desk drawer. Usually there were no witnesses; the burglars left their tools behind, but little else, making the crime difficult to solve -- especially by the local cops, who, as one Belgian federal police officer put it, ''were not terribly worried about the loss of a hundred passports -- they just ordered more.'' Ultimately, it was pressure from the United States that finally persuaded the Belgians to crack down. Back in 1991, Belgium had been admitted to the United States visa-waiver program, which allows citizens from 29 friendly countries to enter this country without applying for a visa. But the fact that blank Belgian passports were being carted off by the truckload alarmed officials in the States. (The United States does not have a problem with passport theft; fewer than 50 blanks issued since 1990 remain unaccounted for.) By 1997, Belgium's troubles with stolen blanks had gotten so out of hand that United States officials threatened to kick the country out of the visa-waiver program. In 1998, Belgian officials began removing blank passports from town halls and storing them in an ultrasecure building in downtown Brussels. Passports are now distributed by courier, in a system similar to America's. But that didn't end Belgium's problems. Criminals like M. simply shifted their operations to Belgian consulates and embassies, which were equally insecure, and where hundreds of blanks continued to be stored. The old Belgian Embassy in The Hague, where one of the Massoud passports was stolen, was a typical case. By 18th-century standards, the charming brick town house is solid and secure. By 21st-century standards, it's a joke: there are no bars on the front windows, and the locks look as if they could be jimmied with a screwdriver. Belgium has 110 embassies and consulates worldwide, some more secure than others. It's no wonder that burglars find them so inviting. Last year, the Belgian Embassy in The Hague was finally moved to a secure building across the street from a police station. As for the stolen passports, they quickly vanish into the criminal underground. The 506 Belgian passports that were stolen from the consulate in Cologne in August 1999 have been found all over the world -- Madrid, Istanbul, Rotterdam, Lagos, Bangkok, Islamabad -- and have been used in a wide variety of crimes, from drug dealing to human trafficking. (Belgian authorities won't say if any ended up in the hands of terrorists.) The passports stolen in Strasbourg and The Hague were used for illegal entry into Congo, China and Morocco; another was found in a house in Rotterdam where three men suspected to have links with Al Qaeda were arrested after Sept. 11. In the case of M., the cops got lucky. Last January, while executing a search warrant in Brussels on an unrelated case involving a 31-year-old Romanian, they turned up a trove of passport-trafficking goods: typewriters, scanners, immigration stamps for 56 countries, various identity documents (including a Spanish ID card, sans photo, filled out in the name of Bill Clinton) and some 150 stolen blanks -- including 43 Belgian, as well as others from Sweden, Greece and Germany. Most important, however, they found documents and phone records suggesting that the Romanian was one of the main passport suppliers for M. Investigators staked out the bar where M. conducted business. They logged his arrivals and exits; they tapped his cellphone. They concluded that his network included 50 to 60 people in Belgium, France and the Netherlands. But ultimately M. was too slick for them. After four months of surveillance, 140 Belgian cops moved in last April to bust his operation. They hoped to nail not only M. but also several notorious passport thieves and safecrackers. It didn't happen. Stashes of cash were found, but the police failed to uncover any major cache of forged or stolen documents. M. himself was clean; searches of his apartment and car turned up nothing more damning than a gun and a bulletproof vest. M. was held in custody for two months, and he bragged to investigators that he had 30 million Belgian francs hidden in an overseas account that they could never find. And they couldn't. In the end, M. was charged with nothing more serious than consorting with a known criminal organization. Given the almost imperceptible speed of the Belgian courts, he will stand trial in two or three years. Until then, M. is back on the street and, presumably, back in business. Alain Boucar is extraordinarily proud of Belgium's new high-tech passport. Flipping through one and pointing out its many security features, he's as giddy as a new father showing off his child: ''It's a very beautiful design, don't you think?'' he says, holding it up to the light. Indeed it is. Thanks largely to this new passport, which Boucar helped design and which was introduced last March, M.'s business probably isn't quite as breezy today as it was last year. By all accounts, it's one of the most secure passports in the world. On the first page there's a graphic illustrating five key security features, including a laser-cut pinhole image of the passport holder, a watermark of King Albert II and an optically variable image of Belgium (which changes from green to blue depending on the viewing angle). ''Most border-control officers have one minute or less to look at a passport and determine if it is genuine,'' Boucar says. ''With this, at least they know what they're looking for.'' This new passport is a triumph for Belgium and a sign that it is taking its problems with passport fraud seriously. Even if characters like M. get their hands on blank versions of this passport, because of features like a digitized photo they will be much more difficult to fill in convincingly. Other countries, including the United States, are similarly upgrading their passports. Still, it will be years before these new passports make it into wide circulation. Until then, we're stuck with the old documents. As an example, I show Boucar my United States passport. ''How easy would it be for you to put someone else's picture in here?'' Boucar examines it. It's a standard United States passport, issued eight years ago, with a laminated photo page. ''Five minutes.'' He sticks his thumbnail into a corner of the laminate, showing me how you can peel it back. (You can loosen the laminate by sticking it in the freezer or a microwave oven -- it depends on the type of laminate -- or, better yet, by dissolving the adhesive with Undu, a product that is easily ordered on the Internet.) Boucar then points to the little blue emblem, called a guilloche, that overlaps the photo and the passport page and is supposed to make the photo difficult to remove. ''You might see a little line here. But if I do a good job, you would not notice.'' Of course, that person would have to be around the same age, height and weight as me, but Boucar's point is well taken: doing a passable job of doctoring a typical passport is not very hard. Boucar then explains the tricks criminals use to fill in stolen blanks: how they feed passports into laser printers, for example. Or how they can create a perfectly good dry stamp -- an inkless stamp that leaves an embossed image on paper and is used to authenticate the passports of many countries -- by placing an old vinyl record over a passport marked with a real seal, then heating the record with an iron; the record is then pressed onto a fresh passport. Candle wax also works. As for ink stamps, they pose no challenge at all. Years ago, forgers would cut a fresh potato in half and use it to transfer a stamp from one passport to another. Today ''you just scan the page of a passport into a computer, print it out, then take it to a copy shop,'' Boucar says. ''They'll make you a rubber stamp in two minutes.'' Boucar is something of a heretic in law enforcement circles, in which open discussion of such techniques is frowned upon, lest forgers get any new ideas. Boucar says that's nonsense. ''The forgers already know everything,'' he says. ''It's the rest of the world that we must educate.'' Indeed, bearers of false documents often seem to know more about their business than many border guards. They know what kinds of questions will be asked by consular officers (for example, ''Who is the prime minister of Belgium?'') and what suspicious mannerisms to avoid. And experienced border-hoppers are experts at finding the weak link in the system. If Portugal is cracking down, they'll try entering Europe through Greece; later, they'll move on to Spain. They send patsies through first to test security. They know to carry bank statements (forged ones) and other supporting documents. Still, even the best make stupid mistakes. They print out a blank stolen passport in the wrong typeface. Or they misspell a word. One of the biggest arrests connected with the Sept. 11 attacks came in Dubai, when a passport official noticed some sloppy forgery on the French passport of Djamel Beghal. Beghal was arrested and interrogated; information he provided led to the breakup of a large European terrorist cell, including the arrest in Brussels of Nizar Trabelsi, a Tunisian whom Beghal identified as the leader in a plot to bomb the United States Embassy in Paris. In a perfect world, every traveler at every port of entry would get similarly close scrutiny. In the real world, however, that's impossible. The sheer volume of humans crossing borders every day -- some 30 million foreigners cross the United States' each month -- suggests that even where strict border controls are in place, not every traveler is going to get a careful look. What's more, immigration officers, like airline security personnel, tend to be underpaid and underprepared for the complexity of their job. There are 16 different versions of the United States passport alone in circulation. It takes a genuine passport scholar like Boucar to be able to detect the difference between a real and a fake passport from, say, Uzbekistan, not to mention whether every entry and exit stamp is authentic. As border traffic grows, then, often the only thing standing between a terrorist and downtown Manhattan is a database. The State Department and the I.N.S. share a vast system that contains, among other things, basic biographical information, like date of birth, of United States passport and visa holders. It also tracks blank stolen passports reported around the world as well as information about known terrorists and other high-level criminals. Every time a person enters the United States at one of the major ports of entry, his passport number is checked by the database. (At least it's supposed to be.) The I.N.S. also has a separate database called the Lookout system, which is its own record of stolen passports and intelligence information. These databases are useful tools, but they're still not foolproof. ''What you have to keep in mind,'' cautions Tom Furey, consul general at the United States Embassy in London, ''is the massive information overload.'' London is as good a place to see the strengths and weakness of this system as anywhere. The embassy there is one of the busiest in the world, issuing about 175,000 nonimmigrant visas a year to travelers from 188 different countries. It also issues 25,000 passports a year, mostly to United States citizens whose passports have been lost or stolen. I recently spent an afternoon in London watching the consular officers interview visa applicants, and I learned that the State Department's database is pretty good when it comes to basic information -- detecting, for example, whether an applicant's birth date matches his name, or determining if someone is lying about whether he has ever visited the United States before. Also, if he is traveling on a passport that was stolen, say, six months ago in a country that the United States has good relations with, he will probably be caught. But I also learned that there is a whole lot this database won't reveal. If a person has been convicted of a serious crime in another country, for example, it probably won't show up in the database. I watched one consular officer turn away a man who wanted to visit the United States after learning that the man had recently been convicted in England of sexually molesting his 8-year-old stepdaughter. The only reason the consular officer knew about it, however, was that the man brazenly told him about it when he was asked if he had ever been convicted of any crimes. Zacarias Moussaoui, the so-called 20th hijacker, recently indicted on six counts of conspiracy, was on a terrorist-watch list in France but was nonetheless able to enter the United States without question. When it comes to stolen passports, the situation gets even more complex. To begin with, not every country shares information about stolen passports with us. And even when they are reported, there is a time lag between when the passports are stolen and when they are reported stolen. In the Massoud case, Belgian authorities sent out a fax on the break-in in The Hague six days after the burglary; the alert about the Strasbourg theft didn't go out until almost six weeks after the break-in. In theory, the passport numbers should have been entered into databases immediately -- most people sophisticated enough to travel on a blank stolen passport know it needs to be used quickly. However, one antifraud investigator in the State Department says he was not aware of these stolen-passport numbers until ''the middle of the summer'' -- nearly a year after the passports were stolen. The closer you look, the scarier it gets. One example: Alain Boucar says that his database lists the numbers of 24,851 blank stolen Italian passports. Jim Hesse, a chief intelligence officer for the I.N.S., says that the United States Lookout system lists about 6,000. Why the discrepancy? Are there 18,000 stolen blank Italian passports drifting around out there that the United States doesn't know about? Or is Boucar's database wrong? Boucar insists that his numbers are accurate; Hesse trusts his. The only people who really know for sure are the Italians. ''We do not discuss stolen passports,'' a spokesman at the Italian Embassy in Washington says. Given these discrepancies, it's no surprise that the United States visa-waiver program has come under fire since Sept. 11. At a Senate hearing in October, a Justice Department official testified that during a review of a random sample of 1,067 passports stolen from visa-waiver countries, the Justice Department found that almost 10 percent had been used to enter the United States successfully. More than half of the stolen passports were not listed in the I.N.S.'s Lookout database. Of course, that's our problem, not Belgium's. It's easy to forget that when it comes right down to it, even a country like Belgium, with which the United States has a long and amicable relationship, sees this issue through an entirely different lens. Politically, Belgium now takes passport fraud seriously because it reeks of political corruption and bumbling bureaucracy -- not exactly the image the country wants to project. But practically, the loss of a few hundred passports here and there is hardly a matter of grave concern. After all, the people who usually use these passports are not coming into Belgium to wreak havoc there. Their crimes, whatever they are, are usually committed elsewhere. Like terrorism. It's chilling how often it is pointed out to me in Brussels that although terrorists may be passing through Belgium -- or using Belgium as a base of operations, or assuming Belgian identities to slip into other countries -- they aren't killing people or blowing up buildings in Belgium. ''Strictly speaking,'' boasts Glenn Audenaert, the plain-spoken chief of the Belgian federal police, ''Belgium does not have a problem with terrorism. You have a problem with terrorism.'' Jeff Goodell is the author of ''Sunnyvale: The Rise and Fall of a Silicon Valley Family.'' 4807 From: McIntyre Date: Fri Feb 15, 2002 6:08pm Subject: Black Hat Briefings (Vegas) Call for Papers Well folks, it's about that time. Papers and presentations are now being accepted for the Black Hat Briefings 2002 conference. The conference is held from July 31-August 1, 2002 at the Caesars Palace Hotel and Resort in Las Vegas, NV, USA. Papers and requests to speak will be received and reviewed until May 1, 2002. IPlease read the full announcement at: http://www.blackhat.com/html/bh-usa-02/bh-usa-02-cfp.html 4808 From: James M. Atkinson Date: Fri Feb 15, 2002 11:49pm Subject: NEW PUBLIC SAFETY APPLICATIONS AND BROADBAND INTERNET ACCESS AMONG USES ENVISIONED BY FCC AUTHORIZATION OF ULTRA-WIDEBAND TECHNOLOGY http://www.fcc.gov/Bureaus/Engineering_Technology/News_Releases/2002/nret0203.html Federal Communications Commission 445 12th Street, S.W. Washington, D.C. 20554News media information 202 / 418-0500 TTY: 1-888-835-5322 Internet: http://www.fcc.gov ftp.fcc.gov ------------------------------------------------------------------------ This is an unofficial announcement of Commission action. Release of the full text of a Commission order constitutes official action. See MCI v. FCC. 515 F 2d 385 (D.C. Circ 1974). ------------------------------------------------------------------------ FOR IMMEDIATE RELEASE February 14, 2002NEWS MEDIA CONTACT: David Fiske at (202) 418-0513 NEW PUBLIC SAFETY APPLICATIONS AND BROADBAND INTERNET ACCESS AMONG USES ENVISIONED BY FCC AUTHORIZATION OF ULTRA-WIDEBAND TECHNOLOGY Washington, D.C. - The Federal Communication Commission (FCC) adopted today a First Report and Order that permits the marketing and operation of certain types of new products incorporating ultra-wideband ("UWB") technology. UWB technology holds great promise for a vast array of new applications that have the potential to provide significant benefits for public safety, businesses and consumers in a variety of applications such as radar imaging of objects buried under the ground or behind walls and short-range, high-speed data transmissions. UWB devices operate by employing very narrow or short duration pulses that result in very large or wideband transmission bandwidths. With appropriate technical standards, UWB devices can operate using spectrum occupied by existing radio services without causing interference, thereby permitting scarce spectrum resources to be used more efficiently. This First Report and Order ("Order") includes standards designed to ensure that existing and planned radio services, particularly safety services, are adequately protected. The FCC will act vigorously to enforce the rules and act quickly on any reports of interference. The standards adopted today represent a cautious first step with UWB technology. These standards are based in large measure on standards that the National Telecommunications and Information Administration ("NTIA") believes are necessary to protect against interference to vital federal government operations. Since there is no production UWB equipment available and there is little operational experience with the impact of UWB on other radio services, the Commission chose in this First Report and Order to err on the side of conservatism in setting emission limits when there were unresolved interference issues. The Commission intends within the next six to twelve months to review the standards for UWB devices and issue a further notice of proposed rule making to explore more flexible standards and address the operation of additional types of UWB operations and technology. *Imaging Systems: Provides for the operation of GPRs and other imaging devices under Part 15 of the Commission's rules subject to certain frequency and power limitations. The operators of imaging devices must be eligible for licensing under Part 90 of our rules, except that medical imaging devices may be operated by a licensed health care practitioner. At the request of NTIA, the FCC will notify or coordinate with NTIA prior to the operation of all imaging systems. Imaging systems include: *Ground Penetrating Radar Systems: GPRs must be operated below 960 MHz or in the frequency band 3.1-10.6 GHz. GPRs operate only when in contact with or within close proximity of, the ground for the purpose of detecting or obtaining the images of buried objects. The energy from the GPR is intentionally directed down into the ground for this purpose. Operation is restricted to law enforcement, fire and rescue organizations, to scientific research institutions, to commercial mining companies, and to construction companies. *Wall Imaging Systems: Wall-imaging systems must be operated below 960 MHz or in the frequency band 3.1-10.6 GHz. Wall-imaging systems are designed to detect the location of objects contained within a "wall," such as a concrete structure, the side of a bridge, or the wall of a mine. Operation is restricted to law enforcement, fire and rescue organizations, to scientific research institutions, to commercial mining companies, and to construction companies. *Through-wall Imaging Systems: These systems must be operated below 960 MHz or in the frequency band 1.99-10.6 GHz. Through-wall imaging systems detect the location or movement of persons or objects that are located on the other side of a structure such as a wall. Operation is limited to law enforcement, fire and rescue organizations. *Medical Systems: These devices must be operated in the frequency band 3.1-10.6 GHz. A medical imaging system may be used for a variety of health applications to "see" inside the body of a person or animal. Operation must be at the direction of, or under the supervision of, a licensed health care practitioner. *Surveillance Systems: Although technically these devices are not imaging systems, for regulatory purposes they will be treated in the same way as through-wall imaging and will be permitted to operate in the frequency band 1.99-10.6 GHz. Surveillance systems operate as "security fences" by establishing a stationary RF perimeter field and detecting the intrusion of persons or objects in that field. Operation is limited to law enforcement, fire and rescue organizations, to public utilities and to industrial entities. *Vehicular Radar Systems: Provides for the operation of vehicular radar systems in the 24 GHz band using directional antennas on terrestrial transportation vehicles provided the center frequency of the emission and the frequency at which the highest radiated emission occurs are greater than 24.075 GHz. These devices are able to detect the location and movement of objects near a vehicle, enabling features such as near collision avoidance, improved airbag activation, and suspension systems that better respond to road conditions. *Communications and Measurement Systems: Provides for use of a wide variety of other UWB devices, such as high-speed home and business networking devices as well as storage tank measurement devices under Part 15 of the Commission's rules subject to certain frequency and power limitations. The devices must operate in the frequency band 3.1-10.6 GHz. The equipment must be designed to ensure that operation can only occur indoors or it must consist of hand-held devices that may be employed for such activities as peer-to-peer operation. Action by the Commission February 14, 2002, by First Report and Order (FCC 02-48). Chairman Powell, Commissioners Abernathy, Copps and Martin, with Commissioners Abernathy, Copps and Martin issuing separate statements. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4809 From: Steve Uhrig Date: Sat Feb 16, 2002 0:03am Subject: Security? Huh! This is something I posted to a Minox list when we got off on a security tangent. LX = the model of Minox camera I carry always. If anyone attempts to do penetration studies like this, make CERTAIN the person who hired you is instantly available by telephone, AND you carry the original of a dated and signed authorization specifically detailing why you are there and that you are authorized to do anything or possess anything in fulfillment of your contract. You do not want to spend a day in the local lockup while you wait for your lawyer to track down your client. I can promise you no one else will care nor will the system care in the slightest about contacting your client or taking care of medical needs or anything like that. ==================== I did a penetration study of a government facility within the last several days (no clues when or where). They knew it was going down on that day, but not by whom. I had not been in the building in months. They made a big show of checking my boot heels for the metal taps which of course tripped the metal detector, my largish belt buckle, X-rayed my aluminum cane, completely missed my black LX as I wrapped it in what looked like a well used handkerchief in their little wicker basket and none of them would lower themselves to inspect it. That LX could have been my Case pocket knife or, God forbid, a box cutter or nail file. I had an empty leather holster for a small revolver plainly visible on my belt. They didn't make a single comment on it. If I see an empty holster on someone, I damn well want to know where the weapon is (and in my opinion the safest place for it generally is in the holster). I was going to tell them I had left it in my truck to avoid problems and see if they would admit they had no security in the parking garage nor ID of particular cars. Neither did anyone think to question my carry permit, none of which are valid in DC. After passing these heavy layers of security without incident, I went into the men's room on the first floor and lowered down through the window some string I had previously wrapped around my upper forearm. I had a confederate outside the building tie a pistol-shaped TV remote control to the line and I pulled it back up into the men's room. Previously I had placed a paper label on the remote saying 'this could have been a weapon'. I left it on the CSO's (Cognizant Security Officer's) desk. And I'm not even clever, neither was I slipping Fatimah a hundred bucks to conceal something for me. As an experiment, I did shaving cream several video cameras along my route, and in the hour or so I was in the building, no one bothered to inspect them. The shaving cream was very visible and the facility was in full swing. I dragged a trash can over and stood on it to shaving cream the one camera. Later in my after action report, the cameras merely had been written up to be checked the next day for proper operation by the technicians. I carried the can of shaving cream in my briefcase, and no one questioned that, which is suspicious considering I have a full beard. If I had really been trying to impress the place, I would have read the frequencies of their small area coverage (radio) repeater, and programmed a potent mobile radio in my van to jam coverage of their commo system. I am positive they had no backup, and the only frequency they had other than the repeater was talkaround on the repeater output, and in that building talkaround had no range. I also could have put out a decoy call of some sort and diverted the majority of security to the other end of the facility. I knew it would work and frankly it was not necessary to prove it. The door to the telephone closet was unlocked. I walked in and stole the SMDR report from the printer. I could, in seconds, have disabled all internal and external phone communications into and out of the facility. With a bit more effort I could have jammed their cell phones. It's all eyewash. Security is nonexistent. It's a bank vault door on a grass hut. Although I am not willing to do it as a pure experiment to prove a point, I am virtually certain I could arrange to gain access to a handgun inside the secured area of any public airport in the country. Federalizing security is a BIG mistake. Name one thing the government does properly and efficiently. There may be a few things where they are reasonably effective, like Secret Service dignitary protection, but certainly not efficient. Pay the contractors so they can afford to hire decent people, rework procurement so 250,000 hour a year contracts are not won and lost on a nickel an hour, mandate some training standards, equipment standards, and work out something like bonuses to the officers who have the minimum number of sick days in a quarter or a year, a substantial cash award to the shift with the lowest vehicle expenses. give the Captain on each shift a bunch of signed $50 checks he could hand out at his discretion to officers showing some pride in their appearance, attentiveness to their work and courtesy to visitors, etc. I could write a program like this on contract, we'd have reasonable security and it would be FAR cheaper than the federal government could pull it off. I could go on and on. But you don't want to hear it. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4810 From: A Grudko Date: Sat Feb 16, 2002 3:35am Subject: Photo Radar Countermeasures * Serious stuff first then some related weekend black humour: 1) We had a product on sale here for a few months which actually defeated the dreaded speed camera. First, I'm not a speed devotee on public roads. Even before my car accident (caused by a speeder on the wrong side of the road) I was a fairly conservative driver. Secondly, as a former LEO and Porsche Club weekend race driver there are clearly times when it is appropriate to drive fast - if you have the skill. So I do not promote speeding. As jma said, the best defence is to not break the law. This being said, the product was a (approx) 5mm thick number plate cover made of a clear material with (I guess) micron thin black vertical stripes through the thickness, spaced about 5mm apart. Viewed from 0 degrees (i.e. directly behind) on you could clearly read the licence number, but as you moved left or right the vertical stripes occluded the plate until you got to 45 degrees, when it blacked out. As the roadside cameras photograph at an angle these plate covers worked. 2) To my knowledge radar/laser detectors are not illegal here in SA and they are openly on sale. I don't use one but I did test one about 5 years ago. This model gave off frequent false alarms which I concluded were caused by the microwave links between GSM cell phone masts. - Original Message - > Actually, Spain is the most dangerous place to drive an automobile in the world. I'd challenge that :-) . I've driven in Spain and felt perfectly safe compared to Johannesburg. Not only do we have horrendous accidents (over 10 000 people killed a year on the roads) , we have a phenomenon known as the 'Kombi Taxi'. This creature is a mutated 9 seater mini bus which somehow seats up to 22 people. * It does not require brakes, mirrors, licence plates, a silencer (muffler), lights or a qualified driver. Windows and body panels are optional. * It can operate continually for 18 hours a day and never needs a service. * Repairs are done at the roadside by mechanics who qualified in a prison workshop and who know how to make a Toyota part work on any other make. * The tyres do not require any tread and the spare was traded for a tank of petrol. * The only required controls are the accelerator and the horn. This amazing vehicle can drive on sidewalks and in emergency lanes, reverse at high speed out of a traffic jam, cross fields, drive through roadside fences, go the wrong way down a one way street. But there is a more serious side to our taxi industry. In Spain, do you have taxi drivers carrying unlicensed AK47s & 9mmps? We do - and they use them! So called taxi wars flare up between rival groups/companies which result in dozens of dead passengers and bystanders every year. A terrible testimony to man's greed and inhumanity. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time a 4811 From: A Grudko Date: Sat Feb 16, 2002 5:56am Subject: Re: Security? Huh! - Original Message - > If anyone attempts to do penetration studies like this, make CERTAIN the > person who hired you is instantly available by telephone ABSOLUTLY - '97 I was tasked with obtaining possible evidence from a Johannesburg hotel room occupied by my client's employee at their cost, so we had legal right of access to the room given reasonable expectations of privacy etc. 3 days in a row I gained access with no problem, but the evidence was not there. Day 4 a security guard caught me. There was no way I'd assault a guard so we went to the security manager, who did not buy my story. I phoned but the client was in a meeting! I got through to my wife and told her to penetrate the corporate veil - fast ! Meanwhile the police appeared, cautioned me, took my firearm (which I had volunteered). Ten minutes later the client 'phoned and it was all sorted out and I was released. >> You do not want to spend a day in the local lockup while you wait for your lawyer to track down your client. Been there twice, luckilly a 'private suite' both times (I don't want toshare a cell with a Mike Tyson clone). On occasion 2, in 1990, I told the jailer I was carrying a handgun. His answer, 'You won't do anything stupid will you?'. I spent 1.5 hours in Krugersdorp lockup with a loaded 15 shot 9mm on my hip!! > ...could have been ... God forbid, a box cutter or nail file. Coming soon - worldwide registration of Martial Arts practitioners. If you have trained in Judo, Karatie, etc, Wrestling or Boxing you will not be allowed to fly unless you are a member of the WWF, 'cos then we know you're a fake and no threat to national security in Lesotho (small African country). > I had an empty leather holster for a small revolver plainly visible on my > belt. They didn't make a single comment on it. If I see an empty holster > on someone, I damn well want to know where the weapon is... So now you expect logic from airport security? Oy Vey! About 4 years ago singer Michael Jackson arrived at Johannesburg International Airport.As he got off the plane dozens of creaming teenage girls appeared, having somehow penetrated security. If teenage girls can do it who else can? (Things may have improved since we worked at JIA) Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time > And I'm not even clever, neither was I slipping Fatimah a hundred bucks > to conceal something for me. > > As an experiment, I did shaving cream several video cameras along my > route, and in the hour or so I was in the building, no one bothered to > inspect them. The shaving cream was very visible and the facility was in > full swing. I dragged a trash can over and stood on it to shaving cream > the one camera. Later in my after action report, the cameras merely had > been written up to be checked the next day for proper operation by the > technicians. I carried the can of shaving cream in my briefcase, and no > one questioned that, which is suspicious considering I have a full beard. > > If I had really been trying to impress the place, I would have read the > frequencies of their small area coverage (radio) repeater, and programmed > a potent mobile radio in my van to jam coverage of their commo system. I > am positive they had no backup, and the only frequency they had other > than the repeater was talkaround on the repeater output, and in that > building talkaround had no range. I also could have put out a decoy call > of some sort and diverted the majority of security to the other end of > the facility. I knew it would work and frankly it was not necessary to > prove it. > > The door to the telephone closet was unlocked. I walked in and stole the > SMDR report from the printer. I could, in seconds, have disabled all > internal and external phone communications into and out of the facility. > With a bit more effort I could have jammed their cell phones. > > It's all eyewash. Security is nonexistent. It's a bank vault door on a > grass hut. > > Although I am not willing to do it as a pure experiment to prove a point, > I am virtually certain I could arrange to > gain access to a handgun inside the secured area of any public airport in > the country. > > Federalizing security is a BIG mistake. Name one thing the government > does properly and efficiently. There > may be a few things where they are reasonably effective, like Secret > Service dignitary protection, but certainly > not efficient. Pay the contractors so they can afford to hire decent > people, rework procurement so 250,000 hour > a year contracts are not won and lost on a nickel an hour, mandate some > training standards, equipment > standards, and work out something like bonuses to the officers who have > the minimum number of sick days in > a quarter or a year, a substantial cash award to the shift with the > lowest vehicle expenses. give the Captain on > each shift a bunch of signed $50 checks he could hand out at his > discretion to officers showing some pride in > their appearance, attentiveness to their work and courtesy to visitors, > etc. I could write a program like this on contract, we'd have reasonable > security and it would be FAR cheaper than the federal government could > pull it off. > > I could go on and on. But you don't want to hear it. > > Steve > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 4812 From: A Grudko Date: Sat Feb 16, 2002 4:43am Subject: Re: NY Times: How to Fake a Passport (10-Feb-2002) - Original Message - From: Justin T. Fanning > How to Fake a Passport >> This is probably some kind of record, although other problem > countries, like Italy, Argentina and South Africa, refuse to confirm > numbers. In the mid 90s we investigated fake IDs and passports used to get contracts for our emerging cellphone business. Corrupt government officials were issuing totally genuine, usable documents (someone else's name, your photo) for: SA ID - SAR 50 ($9 then) SA Passport - SAR 500 ($90 then) And it goes on today. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4813 From: Shawn Hughes Date: Sat Feb 16, 2002 11:24am Subject: Re: Digest Number 861 Mike, The ability to detect RADAR detectors does exist in the United States. Jurisdictions that forbid the use of detectors, and commercial vehicle enforcement guys have them. I forget the actual name brand, (I think Decatur Electronics is one) but my understanding is that it picks up the signature from the, uh, I want to say tank circuit, but I think it may actually be a mixer oscillator circuit. [ Been a while since I studied transmitter theory. Sorry. :O( ] Anyway, it's sensitive to those emissions like the detectors that can pick up the bias oscillator in a fancy tape recorder. Never used one in the field, suppose it has very mixed results. Something else, too; I don't know if it's been mentioned, even if the items did work, FCC says that anything that intentionally intereferes with an authorized transmission (e.g., RADAR / LIDAR) is illegal, and could get you in trouble for possessing. Shawn 4814 From: Justin T. Fanning Date: Sat Feb 16, 2002 7:14pm Subject: WSJ: The spy next door (Told you my next posting would be more on track... JF) http://www.news-observer.com/monday/business/rtp_nc/Story/909513p-907182c.html The spy next door By BROOKS BARNES, February 11, 2002 The Wall Street Journal Most days, Cindy Sciacca spends her free time at home baking, canning vegetables and finger-painting with her daughter. So why is this mild-mannered Mom buying a miniature video camera to install inside her mailbox? "If there's a terrorist living on my block," says the accountant assistant in Ukiah, Calif., "I'm sure not going to wait to hear about it on the news." Close the curtains: Americans are taking surveillance to a whole new level. Driven by newfound suspicions after Sept. 11, a small but quickly growing number of freelance spies are installing gadgets that were unheard of in the home even a year or so ago -- and whose prices are surprisingly low. Those tiny earphones that Secret Service members use? They're on sale for about $60. Other companies are selling transmitters that track the whereabouts of the family car, gadgets that detect phone taps and video cameras thin enough to slide under doors. One company even offers a lie detector for the home. In all, sales are up 30 percent to 60 percent since last year at spy-gear stores across the country, helping turn security and surveillance into a $5 billion industry. Los Angeles' Bolide International says it has sold 3,200 Spycams in the past two months -- double the number at this time last year. Counter Spy Shops -- a chain that sells everything from $800 sew-on tracking devices to that $4,900 "portable truth machine" --saw orders triple this fall. And SpyWorld, in Carson City, Nev., says sales of counterspy products -- they help you figure out if someone's watching you -- are up 20 percent since September. Of course, all of these gadgets have strong detractors among private citizens and privacy experts. And while there are legal uses for these products, some also have applications that are against the law in many states. On a more practical level, some would-be James Bonds have discovered that the devices either don't work well, or that it's really not worth snooping in the first place. (That camera in Sciacca's mailbox that was supposed to flush out terrorists? It caught the neighbor's black Lab digging in her yard.) Still, a growing number of buyers are giving these devices a try, if only because the drumbeat of upsetting news, from terrorism and anthrax to war, has heightened fears. "The paranoia levels right now are absolutely staggering," says Andrew Moe, owner of Spycam Surveillance Equipment in San Diego. In the past, people couldn't have responded this way; spy cameras, tiny recorders and night-vision goggles either hadn't been developed for home use or were prohibitively expensive. Now they're being snapped up by everyone from security-minded homeowners to mistrusting spouses. Parents are taking to them as much as any group to make sure their children are safe -- or at least doing what they're told. Among the hot sellers: a tiny $800 chip that slips into a backpack and transmits junior's whereabouts to a hand-held device back home. There's also The Ghost, a finger-size microphone that catches conversations clearly, even from inside a shirt pocket. And for the ultimate 007 experience, a company called Armortek International will outfit your car to lay down tacks, tear gas or oil slicks, or shock whoever touches the door. "We sell about 20 or 30 cars with all the bells and whistles each year," says Armortek owner Clint Murphy. (Most go to South America, he says, but a handful stay in the United States.) Mike O'Bannon's spy arsenal was far more modest. The Bakersfield, Calif., software salesman used KeyKatcher, a $59 device that tracks activity on a computer keyboard, to find out that his teenage son Matt was skipping school. (Matt had e-mailed a friend about his plans to spend second period in a city park.) "My son was a little surprised to see me at the park, too," O'Bannon says. "He still has no idea how I busted him." Is all of this legal? Surprisingly, the government doesn't provide as much protection as you might think: Parents can track minor children, and videotaping in your own home, property or business is almost always legal -- even without the subject's knowledge, says Los Angeles privacy lawyer Scott Feldmann. How about recording phone conversations? Everyday folks can do it in 41 states -- as long as one of the parties knows the call is being recorded. (The strictest state: Massachusetts, where secretly recording a conversation can come with a $10,000 fine and a five-year prison term.) Before the terrorist attacks, many states were working to beef up spying laws, but busy lawmakers have put much of that legislation on the back burner. For now, average citizens who dabble in covert surveillance are more likely to face civil lawsuits on other charges -- privacy violations, trespassing or even burglary. In one closely watched case a landlord in Bay Shore, N.Y., was arrested in November for allegedly planting a camera disguised as a smoke detector in a female tenant's bedroom. The charge: burglary. The landlord's lawyer denies any wrongdoing on his client's part. As far as the busy spy shops are concerned, virtually every retailer has a policy that boils down to: We just sell the stuff. "Macy's sells knives," says Arielle Jamil, a general manager for Counter Spy Shops. "But you can't sue Macy's if somebody stabs you with it." Using surveillance devices without breaking the law, she says, is "the customer's responsibility." Legal issues aside, sometimes the results are disappointing. Motion detectors can be set off by a rogue tricycle. Lie-detector experts say at-home tests are easy to fool. And you better hope your husband doesn't go to have his oil changed if you have a tracking device installed under his car. While most spy-gadget retailers and manufacturers concede that some devices require careful use, they defend their products. Besides, says Howard Goldman, whose company makes and sells under-the-car tracking systems, most mechanics "aren't observant enough to notice" the transmitters. And of course, critics ranging from psychiatrists to privacy advocates say routine use of surveillance devices is paranoid, unhealthy and generally creepy. "It's not anywhere close to acceptable behavior in a civilized society," says Jeffrey Rosen, author of "The Unwanted Gaze" and a constitutional-law professor at George Washington University. "This orgy of voyeurism is hardly justified by fears about security." So what do you do if you're afraid of being spied on? Well, there's always counterspying. Dwight Des Rosiers, a helicopter pilot in Anchorage, Alaska, bought a $35 software program that helps him scour government-agency databases for his name. "These days," he says, "the government is spying on us all." And then there's Thomas Crowley, a bartender at New York's Bar 89 restaurant. He recently discovered that, with advancing technology making these devices cheaper and easier to hide, almost anything's possible in the spy game. There are even video cameras in neckties, like the one Crowley recently went shopping for ($500, in paisley). What will he do with it? "Wouldn't you like to know?" he says. 4815 From: Fernando Martins Date: Sun Feb 17, 2002 8:12am Subject: Sicur 2002 http://www.sicur.ifema.es/default_i.html Anyone going to Madrid, 26 February - 1 March? SICUR 2002 - The 13th edition of the International Security, Safety and Fire Exhibition will take place at the Juan Carlos I Exhibition Centre between 26th February and 1st March. SECTORS . Security against intrusion, robbery and aggression . Fire Prevention, detection and extinction . Safety and hygiene at work. . Traffic and Transport security and safety . Natural risk control services and equipment . Nuclear safety and Security. . Security in Information Systems. . Institutions and Agencies . Specialized literature FM 4816 From: Fernando Martins Date: Sun Feb 17, 2002 7:17am Subject: RE: NEW PUBLIC SAFETY APPLICATIONS AND BROADBAND INTERNET ACCESS AMONG USES ENVISIONED BY FCC AUTHORIZATION OF ULTRA-WIDEBAND TECHNOLOGY I have some questions about this ... My interest is in the use of UWB for surveillance systems. a) Where can I get more technical details about UWB? b) What most likely vendors will have this kind of new products sooner? c) What kind of technics an intruder may use against this defense? d) What complementary defenses should be applied? Thanks in advance for any answers FM 4817 From: James M. Atkinson Date: Sun Feb 17, 2002 8:03pm Subject: CIA Showcases Array Of Spy Gadgets http://www.guardian.co.uk/uslatest/story/0,1282,-1525936,00.html CIA Showcases Array Of Spy Gadgets Sunday February 17, 2002 7:40 PM SIMI VALLEY, Calif. (AP) - For the first time, the public is getting a large scale view of the CIA's and KGB's real-life James Bond gadgets, from a replica of the Russians' deadly poison-dart umbrella to some of the Amercians' most ingeniously concealed cameras. The exhibit, which opened to the public Sunday at the Ronald Reagan Presidential Library, includes dozens of items borrowed from the CIA's collection in Langley, Va., many of them never before shown to the public. ``Questions have been asked about why we invest so much money in the intelligence community,'' said Lloyd Salvetti, director of the CIA's Center for the Study of Intelligence. ``We thought we should team with the president's library to get out our message about why we exist.'' The exhibit also includes items from private collector Keith Melton, and features some fictitious materials, as well. There's the shoe-phone Don Adams, as secret agent Maxwell Smart, wore in the 1960s television comedy series ``Get Smart,'' and the Dr. Evil ring Mike Myers wore in the film ``Austin Powers International Man of Mystery.'' Also on display is a pair of Diana Rigg's leather pants from the hit British TV spy series ``The Avengers.'' The real spy equipment dates as far back as the Revolutionary War. Among the cameras on display is one from 1885 that could be concealed on a person's body. Others, from World War I, were mounted on carrier pigeons. A popular Cold War version slipped into the back of a leather glove. The world's first microdot, a document shrunken down to a tiny point, is also on display. It dates back to 1852. >From the early days of the CIA's predecessor, the Office of Strategic Services, there are tire spikes, bombs and ``liberator pistols.'' The latter were mass produced for $1.72 each and dropped to resistance fighters during World War II. ``Some of the very same techniques used during World War II are being used in Afghanistan today,'' said Toni Hiley, curator of the exhibit and of the CIA museum at Langley, though she declined to elaborate. Spy gadgets from the other side are on display as well, including a replica of a large wooden seal of the United States that was a gift from the Soviet Union to Moscow's U.S. Embassy in 1945. It hung over the ambassador's desk for seven years before the listening device was discovered. Many of the gadgets used by the Soviet Union and the United States look remarkably similar. But one device CIA officials say they never had was a version of the KGB's deadly umbrella that was used by an unknown assailant to kill Bulgarian dissident Georgi Markov in London in 1978. A model of the umbrella is part of the display. The pinnacle of the display, Salvetti said, is the leather binder in which the president receives his daily intelligence reports. Until the early 1990s, the very existence of such briefings was classified. The empty binder is on loan from the White House for the length of the exhibit, which runs until July 14. ^--- On the Net: Reagan Library: http://www.reaganlibrary.net/ CIA: http://www.cia.gov/ Guardian Unlimited © Guardian Newspapers Limited 2002 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4818 From: David Alexander Date: Mon Feb 18, 2002 2:52am Subject: dangerous drivers >From: DrPepper >Subject: Re: Photo Radar Countermeasures > >Actually, Spain is the most dangerous place to >drive an automobile in the world. >The seem to have no sense of danger out on >the highways, and lethal accidents are very common > Try Rome, I wouldn't set out into that traffic in anything less well protected than a Main Battle Tank. Oh, and a lot of Prozac... _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4819 From: David Alexander Date: Mon Feb 18, 2002 3:23am Subject: re: radar detectors It doesn't matter how good your detector is, they will still get you... This is a true story: About 12 years ago I was talking to an American drag-racer friend of mine who boasted that the cops couldn't get him for speeding. He said he had a police radio scanner, another on the helicopter frequency, a radar detector and a CB. That would warn him of anything. A few months later I saw him again and he told me "The b*stards got me in New Mexico with a stopwatch and I lost my licence" I would be lying if I said I had not laughed till I cried. _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4820 From: Michael Puchol Date: Mon Feb 18, 2002 8:23am Subject: Re: Photo Radar Countermeasures > Actually, Spain is the most dangerous place to > drive an automobile in the world. > The seem to have no sense of danger out on > the highways, and lethal accidents are very common I'd actually say it's Portugal, aswell as a good number of African countries. In Portugal the method seems to be that if you drive slow, you do so half-side of your car into the curb - thus leaving a 'virtual' third lane where fast traffic can overtake, even in bends with NO visibility. This way they can fit three cars in the space meant for two.... Another interesting thing I've observed is that, having spent several years in the UK, and having seen that the driving there is a LOT more sensible than in Spain, you really must see English tourists with rented cars in the Balearic islands - they are even more reckless than the locals (also applies to tourists from other countries, not just the UK). Logic dictates either that: a) The air in Spain has something that turns calm and law-abiding drivers into complete maniacs. b) The laws in the UK and other EU countries are much more strict AND they are enforced. I'd go for b) - in Spain it's very easy to get away with traffic violations. Most people just don't pay fines, and as the system is really slow, they end up forgotten. Until the new law came in effect a couple of weeks ago, if you killed someone with a car while driving recklessly, you'd get at the most a six-month suspension of your license - which is pathetic. All the best, Mike 4821 From: Ed Naylor Date: Mon Feb 18, 2002 11:31am Subject: ULTRA WIDEBAND UPDATE /5/ ZDNet http://zdnet.com.com/2100-1105-839310.html Ultrawideband: Rescuers left in the lurch? Ben Charny February 15, 2002 Firefighters and law enforcement agencies are likely the losers from this week's Federal Communications Commission decision allowing the sale of products based on ultrawideband, a superfast wireless signal. When the FCC on Thursday decided to make ultrawideband (UWB) available commercially, it set a limit on how powerful the signal can be. The FCC explained the limitations were to help allay fears that UWB's powerful signals would interfere with military operations or broadcasts from television and radio stations. As a result, companies like Florian Wireless and Time Domain say the UWB equipment they are each developing for rescue workers, with some already in trials, won't be powerful enough to be of much use. [[part of item deleted]] An FCC spokesman could not be reached for comment Friday. Some FCC sources acknowledge the new rules might weaken the signal's strength, but they are unsure if companies have conducted appropriate tests. UWB technology provides a faster and more secure way of sending wireless transmissions. Automakers could use the technology to build collision avoidance systems or improve airbags. Consumer products, from laptops to personal digital assistants, could use the equipment to send and receive video or audio. One of its other proposed uses was for fire and rescue personnel. The powerful UWB signal can chew through flames, smoke and building materials to provide the firefighter's three-dimensional location at all times, and it can be used to help map the inside of a burning building. It also sends back the firefighter's heart rate, and the temperature around him, which can be used to decide firefighting tactics. Houston rescue workers have been using UWB technology in trials, and Time Domain was granted a waiver by the FCC in 2000 to sell 2,500 of its "Radar Vision" equipment to law enforcement agencies. "Radar Vision" uses UWB signals to spot motion behind walls, giving an edge to officers confronting a hostage situation, for instance. A handful of police agencies are testing UWB equipment now, with the aim of possibly using it in the future. But "the products they have now won't be legal to operate under these rules," Ross said. The company doubts that the equipment they've been developing will be as effective under the FCC's new rules, Ross said. UWB wireless networks now won't be able to pinpoint someone's location as effectively, Florian Wireless Chief Executive Brian Valania said. [[part of item deleted]] Houston rescue workers were expected to start using this equipment from Florian Wireless by May or June of this year, he said. He doesn't know if the deal will go forward. © 2002 (ZDNet) CNET Networks, Inc. -- -- -- -- -- 4822 From: Michael Puchol Date: Mon Feb 18, 2002 4:21pm Subject: Re: Sicur 2002 Well, for anyone that is going, there should be a demo of the vehicle tracking system I developed in the Kenwood stand - a good friend & colleague of mine will be at the stand, as I will be busy having my first baby boy (well, my wife will be having it, I will be fainting around the room I guess) - scheduled arrival on the 28th of Feb :-)) Cheers all, Mike ----- Original Message ----- From: "Fernando Martins" To: Sent: Sunday, February 17, 2002 3:12 PM Subject: [TSCM-L] Sicur 2002 > > http://www.sicur.ifema.es/default_i.html > > Anyone going to Madrid, 26 February - 1 March? > > SICUR 2002 - The 13th edition of the International Security, Safety and > Fire Exhibition will take place at the Juan Carlos I Exhibition Centre > between 26th February and 1st March. > SECTORS > . Security against intrusion, robbery and aggression > . Fire Prevention, detection and extinction > . Safety and hygiene at work. > . Traffic and Transport security and safety > . Natural risk control services and equipment > . Nuclear safety and Security. > . Security in Information Systems. > . Institutions and Agencies > . Specialized literature > > FM > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 4823 From: Date: Mon Feb 18, 2002 5:30am Subject: Driving I would nominate Saudi Arabia as the worst with children driving high power cars. And a total disregard of speed limits, etc. Whatever Allah wills is the norm, if he wants you to have an accident you will. As far as tourists go the adage only 2 cars can go anywhere, A Range Rover and a hire car. Brian [Non-text portions of this message have been removed] 4824 From: Date: Mon Feb 18, 2002 3:39am Subject: Re: Photo Radar Countermeasures > Actually, Spain is the most dangerous place to > drive an automobile in the world. > The seem to have no sense of danger out on > the highways, and lethal accidents are very common If there was one place to avoid, I would say it's Egypt. I believe their drivers test is to drive 15 feet forward, 15 feet in reverse. I think I read it in the Guinness Book of Records as the easiest drivers test. Robert Pickett Pickett Investigative Agency 503-589-0268 or 866-589-4 A PI (4274) http://www.pickettinvestigativeagency.com We accept PayPal! 4825 From: James M. Atkinson Date: Mon Feb 18, 2002 6:33pm Subject: Focus-Spy tech goes on show http://uk.news.yahoo.com/020218/80/cshc6.html Monday February 18, 01:11 PM Focus-Spy tech goes on show By Kevin Krolicki LOS ANGELES (Reuters) - Hollywood loves a good spy and the feeling is mutual -- now the studios and "The Company," as the CIA is sometimes known, are marking more than a half-century of mutual fascination with the largest public display ever of spy gadgets, both real and imagined. The exhibit, which opened at the Ronald Reagan Presidential Library near Los Angeles on Saturday, ranges from the whimsical to the deadly, everything from the shoe phone made famous by Don Adams in the TV show "Get Smart" to a KGB umbrella used to shoot poison-tipped darts of a kind once used to assassinate a Bulgarian dissident in London. The show, "Secrets from the CIA, KGB and Hollywood," also includes the tarantula that threatened James Bond in "Dr. No," Emma Peal's leather pants from "The Avengers," and a 19th century spy camera designed to be strapped to a pigeon. The blend of fact and fiction is fitting, given the way that the Cold War clandestine productions sometimes followed the lead of the celluloid spooks and sometimes anticipated them in ways that their Hollywood creators never imagined. THE SPY WHO CAME IN FROM THE MOVIES "Many of the people who work for the CIA grew up on these spy shows just like I did," said Danny Biederman, a screenwriter, whose lifelong fascination with the genre prompted the collection of more than 4,000 props and gizmos on partial display. Biederman loaned his souvenirs to the CIA two years ago for an eyes-only exhibit at the agency's headquarters in Virginia. Now, the CIA museum (motto: "The Best Museum You've Never Seen") has taken that show to the public at the Reagan Library, along with a sampling of spy artifacts from the National Archives and the private collection of Keith Melton. The real-world spy gear on display ranges from a hollowed-out bullet used during the America Revolution to hide secret messages to a replica of an elaborate carved seal presented by the Soviet Union to the U.S. Ambassador shortly after the Second World War, complete with hidden listening device. "There's a progression here of the development of the technology of espionage," said Lloyd Salveti, the director of the CIA's Center for the Study of Intelligence, on hand for the exhibit opening in Simi Valley, California. The CIA's purpose in sponsoring the exhibit is to stress the role the intelligence service has played in presidential decision-making, Salvetti said. To that end, one of the binders used for President George W. Bush's daily CIA briefings is on hand, emptied of course of its sensitive contents. But the bigger question raised by the exhibit may be how much the Hollywood spy genre borrowed from events and where it anticipated or shaped the way the spy game has been played. British author Ian Fleming, who created the archetypal spy in James Bond, had also been a British naval intelligence officer, an important precedent in blurring the lines between modern spy fact and fiction, Biederman said. Or consider that the CIA's real-life Office of Technical Services, where covers are created and a new generation of spy gadgets made, has a creative motto that would make any movie studio proud: "Imagine what is possible -- then prepare to be amazed." CLOAK AND DAGGERS Spies have even played movie people, most famously in 1979 when Iranian militants stormed the U.S. Embassy in Tehran and held some 50 hostages. As the incident unfolded, six U.S. diplomats managed to find refuge in the nearby Canadian Embassy, prompting a successful CIA-directed plan to smuggle them out by sending agents into Iran disguised as a film crew. "This would not have been possible without the close cooperation of the patriotic people of Hollywood," said Salvetti. Biederman, who lives in Los Angeles with his wife and three children Ilya, Moriah Flint and Bond all named for fictional spies, said some in the agency also shared his love for TV classics like "The Man from U.N.C.L.E." Some CIA agents told him that in the 1960s, "they would be watching 'Mission Impossible' and saying 'Why can't we come up with something like this?'" -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4826 From: Robert Dyk Date: Mon Feb 18, 2002 9:08pm Subject: ISDN Polytel System While out this evening I discovered a bridge tap set up on a PolyTel video conferencing system. The bridge was built out in a telephone closet from the 3 ISDN lines that were connected to the video conferencing system. The bridges were terminated on a BIX RJ11 adapter block with three phone cords (one per line) still connected. No other hardware was present. The original patch from the vertical system to the horizontal cabling was intact with the secondary loops punched over top of the original patch, (not allowed on a BIX setup). I can only think of illegitimate reasons to do this. Is anyone on the list familiar with the Polytel and or what is required to compromise the video conference on this triple bonded ISDN setup. Thanks in advance for any input. Robert Dyk dyk@c... 4827 From: tek492p Date: Mon Feb 18, 2002 11:05pm Subject: Re: ISDN Polytel System --- In TSCM-L@y..., "Robert Dyk" wrote: The > bridges were terminated on a BIX RJ11 adapter block with three phone cords > (one per line) still connected. No other hardware was present. Could this (RJ11 adapter block) be used for testing purposes, and not an actual bridge tap? Jack Lindauer Intertect TSCM services Los Angeles (818) 831-0515 4828 From: Date: Mon Feb 18, 2002 7:03pm Subject: counter countre measures From a NMA member, REPOSTING This is a warning for all radar detector users. The NMA recently learned that there is a new wave of radar detector detectors on the market. These devices actually exceed the capabilities of the previous VG-2 detector. This new technology is enabling law enforcement to detect your radar detector. We realize this may not be a problem to most drivers. However, this can be a big problem for commercial truck drivers (who are prohibited by federal law to utilize radar detectors) and to anyone traveling in Virginia, Washington DC, and some parts of Canada. These areas prohibit the use of radar detectors and with this new technology, the police will know if you have one or not. While this is not earth shattering news, the NMA hopes that this will help drivers avoid the citations in areas where detectors are prohibited. Eric Skrum Communications Director National Motorists Association 608/849-6000 nma@m... www.motorists.org Advocating, Protecting, and Representing the Rights of North American Motorists 4829 From: Steve Uhrig Date: Tue Feb 19, 2002 0:14am Subject: Absolutely outrageous The security industry has some of the most incredibly ignorant morons imaginable. I happened to notice this in the wire services a few minutes ago. I am literally speechless. Maybe for the first time in my life. Has the industry come to this? The following was on the tail end of an article about some guy who got caught with some firecracker type pyros at LAX (Los Angeles International). ==================== "In an unrelated incident at New York's La Guardia Airport, a flight that had left for Cleveland was forced to return after it was discovered a passenger was not properly screened. A concourse was evacuated and everyone was screened again." ==================== Whomever is in charge of Security at La Guardia ought to work the rest of his live in irons to pay for the waste of money, time, and most of all the inconvenience to the passengers on this flight. Make me emperor and I'd have him in a pillory 24 hours a day in the main terminal. And there'd be an ample supply of baskets full of rotten fruit. Maybe I'd put him in a cage in series with the septic system. If I had the money, I'd start an airline where I'd issue weapons to passengers who wanted them. Since we'd be off the ground and out of their jurisdictions, I would thumb my nose at any government comments. And my airline would be the safest one in the world. A CONCOURSE was evacuated? The idiot who made that decision could get the same warm wet feeling by wetting his pants. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4830 From: Lt. Aaron D. Osgood Date: Tue Feb 19, 2002 7:28am Subject: Polytel Could be that the in house "Phone Guy" doesn't understand ISDN and went looking for dial tone in the wrong places. Aaron D. Osgood Omega Services ? Wired & Wireless Telecommunications Consulting ? Telco Vendor Relations Management 67 Field Road Falmouth, ME 04105 TEL: 207-781-7441 FAX: 207-781-8067 E Page: 2078315829@m... AlphaPage: 888-413-3030 PIN 19589# OzCom@m... 4831 From: James M. Atkinson Date: Tue Feb 19, 2002 8:00am Subject: British marines invade Spain by mistake British marines invade Spain by mistake Story filed: 14:27 Monday 18th February 2002 Press Association/Ananova Defence chiefs have apologised after a detachment of British commandos accidentally "invaded" Spain. The 20 Royal Marines, based near Arbroath, roared up a beach in their amphibious landing craft and leapt ashore brandishing assault rifles and mortars. Bemused Spanish fishermen in the town of La Linea de la Concepcion watched as 45 Commando began deploying tactically in the sand. In the end, two local policemen took it upon themselves to point out to the marines that Gibraltar - the intended target of their seaborne landing exercise - was actually a little further on down the coast. There was apparently a brief flurry of apologies from the red-faced commandos before the men jumped back into their craft and motored further south. The gaffe comes at a time of delicate negotiations over the future of Gibraltar, which was taken by Britain in 1704. Nine years later The Rock was ceded to Britain for ever under the Treaty of Utrecht. A Ministry of Defence spokesman said the "regrettable" incident happened during an exercise by Royal Marines travelling on HMS Ocean, the Royal Navy's helicopter and commando carrier. "In the course of the exercise, a landing craft meant to land in Gibraltar, but made it a few yards down the beach, on the Spanish side," he said. "There is much embarrassment, the error is regretted and lessons have been learned. They were informed of their error by local policemen and spent only about five minutes on the beach." He added: "We were not trying to take Spain and have no plans to do so." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4832 From: Robert Dyk Date: Tue Feb 19, 2002 8:07am Subject: RE: Absolutely outrageous Steve, Thank you for being the voice of reason in a sea of ignorant paranoia. If you form the airline, I'll buy the first ticket... Robert Dyk dyk@c... From: John McCain Date: Fri Feb 16, 2001 4:09pm Subject: RE: Cell phones (Getting off topic..) Yep, I think it's straying a bit from TSCM, but hate to see the discussion end before I have MY say :) 1. I think auto drivers who are distracted with cell phones should be charged with reckless driving... which is what they are actually doing; not with talking on a cell phone. 2. In the real world, I'm not an "executive"or even a "big shot". Hell, I rarely even wear a suit any more, but many times I'm the one charged with making technical decisions. And, I'm sometimes the only person with the tidbit of technical information that's needed. I've often been on an airplane or business trip when being in contact could save someone an additional over-night out of town, or in some cases save someone from flying across the country to solve a problem. Having use of the cell phone when flying commercial would be an economical, appropriate use of technology for our business needs. 3. I often wish there was a penalty for "uncivil or impolite use of a cell phone in public areas", especially theaters and restaurants. I haven't seen a cell phone that you couldn't get a vibrating ringer for, yet so few people are considerate enough to use them. 4. My complaint about the flight restrictions of PEDs is that I'd sure like to use my R10 when flying. It'd make a dull flight much more interesting for me. And, if RF from these devices interfered with the pilots instrumentation, I'm not sure I really want to be on that plane. We know how dense the RF is around airports. OK, thanks for listening. Cheers, JohnM Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-352-0350 807 Pioneer Web: http://www.dcbnet.com Champaign, IL. 61820 Email: Jmccain@d... 2493 From: minerva close-protection Date: Fri Feb 16, 2001 5:44pm Subject: RE: Fw: ARROGRANCE James and Group, A question for the group. Have any of you guys ever worked on TSCM assignments in Ireland? I will risk an outburst of Irish jokes, as this is a serious question. The sitrep here is that any TSCM or any form of covert assignment is taken with due regard to the possibility of the TSCM/ Covert surevillance team encountering subversives ect. during their tasks. I would be interested in hearing the views of anyone who has worked here. We are an Irish company with offices in the UK and Dublin and our experience on the ground shows very little activity by non Irish/UK firms in evidence in Ireland. Any comments would be most welcome as we would like to establish a link with any firm operating in Ireland from the US. or Europe. I enjoy the discussions and humor of the group, well done to all concerned! Regards to all, Paul de Cogan MD The Minerva Group. >From: "Robert G. Ferrell" >Reply-To: "Robert G. Ferrell" >To: TSCM-L@yahoogroups.com >Subject: RE: [TSCM-L] Fw: ARROGRANCE >Date: Fri, 16 Feb 2001 10:18:45 -0600 (CST) > > >No -it's not. Every version of this story changes.. > > > >By the way, Lincoln has never sailed off of Newfoundland. > >I became fascinated by this urban legend a few years ago and spent too much >time researching it. The first version I've been able to find intact >dates to the World War II era, but there are rumors that it can be traced >to >as far back as the 19th century, except of course that the communications >were by flag or lantern, not voice... > >It seems that sailors, or perhaps harried journalists in search of a >piece of good filler, update the story every so often with modern ship >names and contemporary political references. Quite an interesting >phenomenon. > >Cheers, > >RGF > >Robert G. Ferrell, CISSP >Information Systems Security Officer >National Business Center >U. S. Dept. of the Interior >Robert_G_Ferrell@n... >======================================== > Who goeth without humor goeth unarmed. >======================================== > _________________________________________________________________________ Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com. 2494 From: James M. Atkinson, Comm-Eng Date: Sat Feb 17, 2001 10:54am Subject: Adam and Eve [Humor] Adam was walking around the garden of Eden feeling very lonely, so God asked him, "What is wrong with you?" Adam said he didn't have anyone to talk to. God said that He was going to make Adam a companion and that it would be a woman. He said, "This person will gather food for you, cook for you, and when you discover clothing she'll wash it for you. She will always agree with every decision you make. She will bear your children and never ask you to get up in the middle of the night to take care of them. She will not nag you and will always be the first to admit she was wrong when you've had a disagreement. She will never have a headache and will freely give you love and passion whenever you need it." Adam asked God, "What will a woman like this cost?" God replied, "An arm and a leg." Then Adam asked, "What can I get for a rib?" The rest is history.... -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2495 From: Andre Holmes <1ach@g...> Date: Sat Feb 17, 2001 6:52pm Subject: COMPUTER PROTECTION Greetings to the List I was alerted at 5.03am to a Trojan attack. It was a Netbus trojan IP 211.59.180.71 Port 12345 PING(211.59.180.71):16 data bytes 24 bytes from 211.59.180.71: icmp_seq=0 ttl=111 time=249.1ms 24 bytes from 211.59.180.71: icmp_ seq=1ttl=111 time=260.7ms 24 bytes from 211.59.180.71: icmp_ seq=2 ttl=111 time=239.7ms 3 packets transmitted.3 packets received.0% packet loss round-trip min/avg/max = 239.7/249.8/260.7 ms Address assigned to Asia-Pacific users. APNIC database. Im sending these to you for reference incase you get hit. [Non-text portions of this message have been removed] 2496 From: Andre Holmes <1ach@g...> Date: Sat Feb 17, 2001 8:10pm Subject: Trojan Horse Ports List Trojan Horse Ports List NiteRyders Reference Desk Trojan Horse Ports Well Known Trojans Default ports used by some known trojan horses: And now links to desriptions of the trojans and fixes for them: port 21 - Back Construction, Blade Runner, Doly Trojan, Fore, FTP trojan, Invisible FTP, Larva, WebEx, WinCrash port 25 - Ajan, Antigen, Email Password Sender, Haebu Coceda (= Naebi), Happy 99, Kuang2, ProMail trojan, Shtrilitz, Stealth, Tapiras, Terminator, WinPC, WinSpy port 31 - Agent 31, Hackers Paradise, Masters Paradise port 41 - DeepThroat 1.0 - 3.1 + Mod (Foreplay) port 48 - DRAT v1.0 - 3.0b port 50 - DRAT port 59 - DMSetup port 79 - Firehotcker port 80 - Executor, RingZero port 99 - Hidden Port port 110 - ProMail trojan port 113 - Kazimas port 119 - Happy 99 port 121 - JammerKillah port 137 - NetBios Name(DoS attack) port 138 - NetBios Datagram(DoS attack) port 139 - (TCP) Netbios session (DoS attacks) port 139 - (UDP) Netbios session (DoS attacks) port 146 - (TCP) Infector 1.3 port 421 - TCP Wrappers port 456 - (TCP) - Hackers Paradise port 531 - (TCP) - Rasmin port 555 - (UDP) - Ini-Killer, NeTAdmin, Phase Zero, Stealth Spy port 555 - (TCP) - Phase Zero port 666 - (UDP) - Attack FTP, Back Construction, Cain & Abel, Satanz Backdoor, ServeU, Shadow Phyre port 911 - Dark Shadow port 999 - DeepThroat, WinSatan port 1001 - (UDP) - Silencer, WebEx port 1010 - Doly Trojan 1.1 - 1.7 (SE) port 1011 - Doly Trojan port 1012 - Doly Trojan port 1015 - Doly Trojan port 1024 - NetSpy 1.0 - 2.0 port 1042 - (TCP) - Bla 1.0 - 2.0 port 1045 - (TCP) - Rasmin port 1090 - (TCP) - Xtreme port 1170 - (TCP) - Psyber Stream Server, Streaming Audio trojan, Voice port 1234 - (UDP) - Ultors Trojan port 1243 - (TCP) - BackDoor-G, SubSeven, SubSeven Apocalypse port 1245 - (UDP) - VooDoo Doll port 1269 - (TCP) - Mavericks Matrix port 1349 - (UDP) - BO DLL port 1492 - (TCP) - FTP99CMP port 1509 - (TCP) - Psyber Streaming Server port 1600 - (TCP) - Shivka-Burka port 1807 - (UDP) - Spy-Sender port 1981 - (TCP) - Shockrave port 1999 - BackDoor 2.00 - 2.03 port 1999 - (TCP) - TransScout port 2000 - TransScout port 2001 - (TCP) - Trojan Cow 1.0 port 2001 - TransScout Transmission Scout v1.1 - 1.2 port 2001 - Der Spaeher 3 Der Spaeher v3.0 port 2002 - TransScout port 2003 - TransScout port 2004 - TransScout port 2005 - TransScout port 2023 - (TCP) - Ripper port 2086 - (TCP) - Netscape/Corba exploit port 2115 - (UDP) - Bugs port 2140 - (UDP) - Deep Throat v1.3 server port 2140 - (TCP) - The Invasor, Deep throat v2.0 port 2140 - (UDP) - Deep Throat 1.3 KeyLogger port 2155 - (TCP) - Illusion Mailer port 2283 - (TCP) - HVL Rat 5.30 port 2400 - PortD port 2565 - (TCP) - Striker port 2583 - (TCP) - WinCrash2 port 2600 - Digital RootBeer port 2801 - (TCP) - Phineas Phucker port 2989 - (UDP) - RAT port 3024 - (UDP) - WinCrash 1.03 port 3128 - RingZero port 3129 - Masters Paradise 9.x port 3150 - (UDP) - Deep Throat, The Invasor port 3459 - Eclipse 2000 port 3700 - (UDP) - Portal of Doom port 3791 - (TCP) - Total Eclypse port 3801 - (UDP) - Eclypse 1.0 port 4092 - (UDP) - WinCrash-alt port 4321 - BoBo 1.0 - 2.0 port 4567 - (TCP) - File Nail port 4590 - (TCP) - ICQ-Trojan port 5000 - (UDP) - Bubbel, Back Door Setup, Sockets de Troie/socket23 port 5001 - (UDP) - Back Door Setup, Sockets de Troie/socket23 port 5011 - (TCP) - One of the Last Trojans (OOTLT) port 5031 - (TCP) - Net Metropolitan port 5321 - (UDP) - Firehotcker port 5400 - (UDP) - Blade Runner, Back Construction port 5401 - (UDP) - Blade Runner, Back Construction port 5402 - (UDP) - Blade Runner, Back Construction port 5550 - (TCP) - Xtcp 2.0 - 2.1 port 5521 - (TCP) - Illusion Mailer port 5550 - (TCP) - X-Tcp Trojan port 5555 - (TCP) - ServeMe port 5556 - (TCP) - BO Facil port 5557 - (TCP) - BO Facil port 5569 - (TCP) - Robo-Hack port 5742 - (UDP) - WinCrash port 6400 - (TCP) - The Thing port 6669 - (TCP) - Vampire 1.0 - 1.2 port 6670 - (TCP) - DeepThroat port 6771 - (TCP) - DeepThroat port 6776 - (TCP) - BackDoor-G, SubSeven port 6838 - (UDP) - Mstream (Attacker to handler) port 6683 - (UDP) DeltaSource v0.5 - 0.7 port 6912 - Shit Heep (not port 69123!) port 6939 - (TCP) - Indoctrination 0.1 - 0.11 port 6969 - GateCrasher, Priority, IRC 3 port 6970 - GateCrasher 1.0 - 1.2 port 7000 - (UDP) - Remote Grab, Kazimas port 7300 - (UDP) - NetMonitor port 7301 - (UDP) - NetMonitor port 7302 - (UDP) - NetMonitor port 7303 - (UDP) - NetMonitor port 7304 - (UDP) - NetMonitor port 7305 - (UDP) - NetMonitor port 7306 - (UDP) - NetMonitor port 7307 - (UDP) - NetMonitor port 7308 - (UDP) - NetMonitor port 7789 - (UDP) - Back Door Setup, ICKiller port 8080 - RingZero port 8989 - Recon, recon2, xcon port 9090 - Tst2, telnet server port 9400 - InCommand 1.0 - 1.4 port 9872 - (TCP) - Portal of Doom port 9873 - Portal of Doom port 9874 - Portal of Doom port 9875 - Portal of Doom port 9876 - Cyber Attacker port 9878 - TransScout port 9989 - (TCP) - iNi-Killer 2.0 - 3.0 port 9999 - (TCP) - theprayer1 port 10067 - (UDP) - Portal of Doom port 10101 - BrainSpy Vbeta port 10167 - (UDP) - Portal of Doom port 10520 - Acid Shivers + LMacid port 10607 - (TCP) - Coma 1.09 port 10666 - (TCP) - ambush port 11000 - (TCP) - Senna Spy port 11223 - (TCP) - Progenic trojan 1.0 - 1.3 port 12076 - (TCP) - Gjammer port 12223 - (UDP) - Hack 99 KeyLogger port 12223 - (TCP) - Hack 99 port 12345 - (UDP) - GabanBus, NetBus, Pie Bill Gates, X-bill port 12346 - (TCP) - GabanBus, NetBus, X-bill port 12361 - (TCP) - Whack-a-mole port 12362 - (TCP) - Whack-a-mole port 12631 - WhackJob port 13000 - Senna Spy port 16660 - (TCP) - stacheldraht port 16969 - (TCP) - Priority (Beta) port 17300 - (TCP) - Kuang2 The Virus port 20000 - (UDP) - Millennium 1.0 - 2.0 port 20001 - (UDP) - Millennium port 20034 - (TCP) - NetBus 2 Pro port 20203 - (TCP) - Logged, chupacabra port 21544 - (TCP) - GirlFriend 1.3x (Including Patch 1 and 2) port 22222 - (TCP) - Prosiak port 23456 - (TCP) - Evil FTP, Ugly FTP, Whack Job port 23476 - Donald Dick 1.52 - 1.55 port 23477 - Donald Dick port 26274 - (UDP) - Delta Source port 27444 - (UDP) - trinoo port 27665 - (TCP) - trinoo port 29891 - (UDP) - The Unexplained port 30029 - AOL Trojan port 30100 - (TCP) - NetSphere 1.0 - 1.31337 port 30101 - (TCP) - NetSphere port 30102 - (TCP) - NetSphere port 30133 - (TCP) - NetSphere final port 30303 - Sockets de Troi = socket23 port 30999 - (TCP0 - Kuang2 port 31335 - (UDP) - trinoo port 31336 - Bo Whack port 31337 - (TCP) - Baron Night, BO client, BO2, Bo Facil port 31337 - (UDP) - BackFire, Back Orifice, DeepBO port 31338 - (UDP) - Back Orifice, DeepBO port 31339 - (TCP) - Netspy port 31339 - (UDP) - NetSpy DK port 31554 - (TCP) - Schwindler is from portugal port 31666 - (UDP) - BOWhack port 31785 - (TCP) - Hack 'a' Tack 1.0 - 2000 port 31787 - (TCP) - Hack 'a' Tack port 31788 - (TCP) - Hack 'a' Tack port 31789 - (UDP) - Hack 'a' Tack port 31791 - (UDP) - Hack 'a' Tack port 31792 - (UDP) - Hack 'a' Tack port 32418 - Acid Battery v1.0 port 33333 - Blakharaz, Prosiak port 33577 - PsychWard port 33777 - PsychWard port 33911 - (TCP) - Spirit 2001a port 34324 - (TCP) - BigGluck, TN port 40412 - (TCP) - The Spy port 40421 - (UDP) - Agent 40421, Masters Paradise port 40422 - (UDP) - Masters Paradise port 40423 - (UDP) - Masters Paradise port 40426 - (UDP) - Masters Paradise port 47262 - (UDP) - Delta Source port 50505 - (UDP) - Sockets de Troie = socket23 port 50766 - (UDP) - Schwindler 1.82 port 53001 - (TCP) - Remote Windows Shutdown port 54320 - Back Orifice 2000 port 54321 - (TCP) - School Bus port 54321 - (UDP) - Back Orifice 2000 port 57341 - (TCP) - netraider 0.0 port 58339 - ButtFunnel port 60000 - Deep Throat port 60068 - Xzip 6000068 port 61348 - (TCP) - Bunker-Hill Trojan port 61466 - (TCP) - Telecommando port 61603 - (TCP) - Bunker-Hill Trojan port 63485 - (TCP) - Bunker-Hill Trojan port 65000 - (UDP) - Devil v1.3 port 65000 - (TCP) - Devil port 65000 - (TCP) - stacheldraht port 65432 - The Traitor port 65432 - (UDP) - The Traitor port 65535 - RC, ICE [Non-text portions of this message have been removed] 2497 From: James M. Atkinson, Comm-Eng Date: Sat Feb 17, 2001 8:26pm Subject: Re: COMPUTER PROTECTION At 7:52 PM -0500 2/17/01, Andre Holmes wrote: >Greetings to the List > >I was alerted at 5.03am to a Trojan attack. > >It was a Netbus trojan > >IP 211.59.180.71 > >Port 12345 > >PING(211.59.180.71):16 data bytes >24 bytes from 211.59.180.71: icmp_seq=0 ttl=111 time=249.1ms >24 bytes from 211.59.180.71: icmp_ seq=1ttl=111 time=260.7ms >24 bytes from 211.59.180.71: icmp_ seq=2 ttl=111 time=239.7ms > >3 packets transmitted.3 packets received.0% packet loss >round-trip min/avg/max = 239.7/249.8/260.7 ms > >Address assigned to Asia-Pacific users. >APNIC database. > >Im sending these to you for reference incase you get hit. Andre, When you send an IP address ALWAYS remember to include the DNS name associated with the IP address you are reporting, plus a trace route session with either the suspect address or related upstream information otherwise the report is of minimal use). -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2498 From: James M. Atkinson, Comm-Eng Date: Sat Feb 17, 2001 8:29pm Subject: Re: Trojan Horse Ports List At 9:10 PM -0500 2/17/01, Andre Holmes wrote: >Trojan Horse Ports List > > > NiteRyders Reference Desk > >Trojan Horse Ports > > Well Known Trojans > Default ports used by some known trojan horses: > And now links to desriptions of the trojans and fixes for them: > > port 21 - Back Construction, Blade Runner, Doly Trojan, Fore, >FTP trojan, Invisible FTP, Larva, WebEx, WinCrash [snip] Er... Just because your computer alerted on activity on a port does not mean that port was being used to pass a virus or trojan. Monitor the activity and see what is actually going on. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2499 From: James M. Atkinson, Comm-Eng Date: Sat Feb 17, 2001 8:40pm Subject: Man accused of spying on boys Man accused of spying on boys http://www.ananova.com/news/story/sm_211279.html?menu= A US man has been arrested for allegedly spying on two boys using a surveillance system. The 42-year-old has been charged with burglary, theft, trespassing and eavesdropping in the state of New York. Police say he installed listening equipment to eavesdrop on the teenage boys and videotaped them from his home, near Albany. Last updated: 21:34 Saturday 17th February 2001 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2500 From: Talisker Date: Sun Feb 18, 2001 7:11am Subject: Re: COMPUTER PROTECTION Andre I suspect that rather than being under an attack, you being being scanned to see whether you had been trojaned. An analogy I often use is that of a car thief walking down the street looking in car windows to see if the car is unlocked. Yes it's annoying, but unless your car is unlocked there's nothing really to worry about. If the probing is persistant then check it out, but in my experience most ISPs will not react if you alert them to one of their users scanning you. In reality if the ISP were to cut the user off, they would just log straight back on under another fictious username. The best defence for home PCs is to: 1. Never, open any email attachments unless you are expecting them, even then quarantine them and virus check them before use. 2. Keep your virus checker up to date, there are many such as CAI's that are free for personal use, including updates http://antivirus.cai.com 3. Use a personal firewall, again there are many that are free, Tiny and ZoneAlarm are my favourites for Windows. just my 2 cents Take Care Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List Security Tools Notification http://groups.yahoo.com/group/security-tools/join ----- Original Message ----- From: "Andre Holmes" <1ach@g...> To: Sent: Sunday, February 18, 2001 12:52 AM Subject: [TSCM-L] COMPUTER PROTECTION > Greetings to the List > > I was alerted at 5.03am to a Trojan attack. > > It was a Netbus trojan > > IP 211.59.180.71 > > Port 12345 > > PING(211.59.180.71):16 data bytes > 24 bytes from 211.59.180.71: icmp_seq=0 ttl=111 time=249.1ms > 24 bytes from 211.59.180.71: icmp_ seq=1ttl=111 time=260.7ms > 24 bytes from 211.59.180.71: icmp_ seq=2 ttl=111 time=239.7ms > > 3 packets transmitted.3 packets received.0% packet loss > round-trip min/avg/max = 239.7/249.8/260.7 ms > > Address assigned to Asia-Pacific users. > APNIC database. > > Im sending these to you for reference incase you get hit. > > > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2501 From: James M. Atkinson, Comm-Eng Date: Sun Feb 18, 2001 1:11pm Subject: BEFORE and AFTER MARRIAGE BEFORE and AFTER MARRIAGE Before - You take my breath away. After - I feel like I'm suffocating. Before - Twice a night. After - Twice a month. Before - She loves the way I take control of a Situation. After - She called me a controlling, manipulative, egomaniac. Before - Ricky & Lucy. After - Fred & Ethel. Before - Saturday Night Live. After - Monday Night Football. Before - He makes me feel like a million dollars. After - If I had a dime for every stupid thing he's done... Before - Don't Stop. After - Don't Start. Before - The Sound of Music. After - The Sound of Silence. Before - Is that all you are eating? After - Maybe you should just have a salad, honey. Before - Wheel of Fortune. After - Jeopardy. Before - It's like living a dream. After - It's a nightmare. Before - $60/dozen. After - $1.50/stem. Before - Turbocharged. After - Needs a jump-start Before - We agree on everything! After - Doesn't she have a mind of her own? Before - Victoria's Secret. After - Fruit of the Loom. Before - Feathers & handcuffs. After - Ball and chain. Before - Idol. After - Idle. Before - He's lost without me. After - Why can't he ask for directions? Before - When together, time stands still. After - This relationship is going nowhere. Before - Croissant and cappuccino. After - Bagels and instant coffee. Before - Oysters. After - Fishsticks. Before - I can hardly believe we found each other. After - How the hell did I end up with someone like you? Before - Romeo and Juliet. After - Bill and Hillary.. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2502 From: James M. Atkinson, Comm-Eng Date: Sun Feb 18, 2001 1:15pm Subject: MI5 and police ordered illegal break-ins at mosques MI5 and police ordered illegal break-ins at mosques Jason Burke, chief reporter Sunday February 18, 2001 The Observer http://www.observer.co.uk/uk_news/story/0,6903,439636,00.html British security services ordered illegal burglaries in Muslim places of worship to gather information on alleged Islamic militants, a key MI5 and police informer has told The Observer . In one of the most detailed descriptions of secret operations on the British mainland, Reda Hassaine, an Algerian former journalist, has revealed how he infiltrated the tight-knit community of Islamic militants in the UK for MI5 and the Special Branch, the police squad with responsibility for gathering information on suspected terrorists. Hassaine, an asylum-seeker, disclosed how officers blackmailed him into carrying out the burglaries by threatening him with expulsion if he refused. They also advised him on how to defraud the British welfare system to enhance his meagre earnings from them. The revelations will deeply embarrass the security services and lead to further accusations of incompetence as yet another operative tells his story. It will also raise serious questions about the services' dealings with vulnerable groups like asylum-seekers. 'Any suggestion that asylum applications could be contingent on "co-operating" with the UK security services raises the most serious concerns,' a spokesman for Amnesty, the human rights group, said. During two years as an informer, Hassaine was asked to steal scores of documents from senior preachers at mosques in north London. Some were communiquÈs from extremist groups overseas; others were seemingly innocuous. Hassaine, 37, even told his handlers about a dirty tricks campaign against Muslim militants in London being run by the French intelligence service, the DGSE. Though it too involved burglaries of mosques and Islamic groups' premises as well as the funding of a newspaper supporting the terrorist Osama bin Laden, Hassaine was advised to help the French. Though Hassaine has been badly beaten by Muslim hardliners and now faces almost daily death threats, the Home Office has refused his asylum application. Guardian Unlimited © Guardian Newspapers Limited 2001 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2503 From: James M. Atkinson, Comm-Eng Date: Sun Feb 18, 2001 1:21pm Subject: EVEN ESPIONAGE IS AN ATTRACTION IN D.C. I SPY... http://www.chicagotribune.com/leisure/travel/printedition/article/0,2669,SAV-0102180079,FF.html EVEN ESPIONAGE IS AN ATTRACTION IN D.C. By Vernon Loeb The Washington Post February 18, 2001 WASHINGTON -- Seven blocks on R Street in Georgetown are all that separate the rise and the fall of American intelligence, from the mansion of World War II spy master William "Wild Bill" Donovan to the mailbox where CIA traitor Aldrich Ames left signals in chalk for his Soviet handlers. David Major calls it "Spy Street," and it's one of the attractions on the "SpyDrive," a tour of 30 Washington espionage sites that twists and turns through most of the major spy cases of the past 50 years, with running commentary by Major and his sidekick, Oleg Kalugin. Major spent a career chasing foreign spies for the FBI, ultimately becoming counterintelligence adviser at the Reagan White House. Kalugin was a Soviet spy in Washington--the youngest major general in KGB history. "What we're going to show you is buildings and monuments," Major says. But "you're going to see it through the eyes of a counterintelligence officer and an intelligence collector." The SpyDrive is a commercial spinoff of a tour Major started running several years ago for corporate executives and U.S. government personnel to make the point that the nation's capital has long been a major playground for all manner of foreign spies--and still is. "Since this is the most important city in the world, it is a very, very viable target," says Major, a stout, bearded man in a black leather jacket. "This is not something stuck in the past. It faces every single one of us in the future." What he's trying to tell his busload of spy tourists, many of whom have a certain law enforcement look, is that a little paranoia isn't necessarily a bad thing, especially if you're an executive steeped in trade secrets or a government official with a security clearance. If you think you're being followed on the streets of Washington, maybe you are. "Russian espionage is now on the rise," says the small, dapper Kalugin, now a permanent resident alien who works as an instructor at Major's training firm in suburban Alexandria, Va., the Centre for Counterintelligence and Security Studies. "The U.S. used to be Enemy No. 1. Now it is Priority No. 1." There is, of course, no more famous monument to espionage in Washington than the old Soviet Embassy on 16th Street, now the Russian ambassador's residence. Kalugin calls it "the hub of intelligence operations in this country." Major points to the front door that three of the most damaging American spies--Ames, Navy warrant officer John Walker and National Security Agency employee Ronald Pelton--walked through to begin their careers in treason. Then he directs attention down an alley north of the embassy at the back door, where the Soviets spirited Walker and Pelton out of the building to avoid detection by an FBI surveillance team. On K Street in Georgetown, famous espionage terrain, the tour passes Chadwick's, the pub where Ames handed over seven pounds of top-secret material to his KGB handler, including the names of 20 CIA assets in the Soviet bloc, 10 of whom were subsequently executed. Then there's Martin's Tavern on Wisconsin Avenue, where Vassar graduate and Soviet courier Elizabeth Bentley operated in the '30s and '40s. Just a block up Wisconsin, there's Au Pied de Cochon, the French bistro where KGB defector Vitaly Yurchenko bolted from his CIA handlers in 1985, walked to the new Soviet Embassy at the top of the hill and un-defected--a route retraced by the SpyDrive bus. There's debate to this day about whether Yurchenko was a legitimate defector or a KGB plant. But Kalugin--who debriefed Yurchenko upon his return to Moscow--says the KGB believed he was a genuine defector who simply grew disenchanted as a ward of the CIA. Kalugin worked for 12 years as a spy in Washington before returning home to run the KGB's foreign counterintelligence program. He was elected to the Russian parliament in 1990 after the fall of the Soviet Union before returning to the United States as part of a joint venture with AT&T. "Now I am back to the old trade that I never thought I would resume again," says Kalugin, who is still a Russian citizen. "But old habits never die." On R Street--"one of the spy streets in Washington," Major says--the bus slows in front of the former home of "Wild Bill" Donovan, director of the Office of Strategic Services, forerunner of the CIA, during World War II. Just up the street is Dumbarton Oaks, the 19th Century mansion and surrounding gardens described on some tours as an important research library in Byzantine and medieval studies. On the SpyDrive, it's the place where Navy analyst and convicted spy Jonathan Pollard met his Israeli handler. Farther down, at 37th and R, is the famous blue mailbox: Ames' "signal site." The CIA malcontent, who started spying in 1985, would mark the box with chalk so the KGB would know to check a prearranged "dead drop" for a new cache of top-secret reports. It's just a plain blue mailbox now. What makes the SpyDrive an intriguing jaunt through town is its mix of buildings like Alger Hiss' row house at 2905 P St. NW, and monuments like a spot on Sheridan Circle--"right where that red car is right now," Major says--where a car bomb planted by Gen. Augusto Pinochet's intelligence service in 1976 killed former Chilean diplomat Orlando Letelier and his American colleague Ronni Moffitt. There's Mitchell Park, where fired CIA officer Edward Lee Howard sat for hours in October 1983, pondering whether to betray his country, before walking to the nearby Soviet Trade Mission and formally becoming a spy. And at 2800 Wisconsin Ave. is what Major calls the "Jennifer Miles tryst apartment," named after the South African intelligence officer who spied in Washington for the Cubans in the late 1960s before the FBI caught her and expelled her. The tour passes the embassies of Hungary and the Czech Republic on the edge of Rock Creek Park, which Major says presented a particularly difficult surveillance problem for the FBI during the Cold War. Isolated in a wooded ravine, he says, there was no place to park a surveillance van and eavesdrop on the two aggressive communist spy services. The solution: the quaint, charming old stone building called the Art Barn by the park, where local and emerging artists exhibited their work. During the Cold War, Major explains, the Art Barn's attic was a major intercept station, full of antennas and other sophisticated listening devices. As the bus heads back downtown, Kalugin ranks the former Soviet bloc spy agencies, rating the East Germans as the most efficient, the Bulgarians as the most obedient and the Hungarians as the least effective. But the more things change, he says, the more they stay the same. "The Cold War is over," Kalugin says at tour's end. "Some of the old practices of the Cold War are no longer with us. On the other hand, it would be naive to believe that since the collapse of the U.S.S.R., espionage has stopped. In fact, espionage will go on as long as national interest exists. This is a never-ending story, and you have heard only part of it." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2504 From: minerva close-protection Date: Fri Feb 16, 2001 5:43pm Subject: RE: Fw: ARROGRANCE James and Group, A question for the group. Have any of you guys ever worked on TSCM assignments in Ireland? I will risk an outburst of Irish jokes, as this is a serious question. The sitrep here is that any TSCM or any form of covert assignment is taken with due regard to the possibility of the TSCM/ Covert surevillance team encountering subversives ect. during their tasks. I would be interested in hearing the views of anyone who has worked here. We are an Irish company with offices in the UK and Dublin and our experience on the ground shows very little activity by non Irish/UK firms in evidence in Ireland. Any comments would be most welcome as we would like to establish a link with any firm operating in Ireland from the US. or Europe. I enjoy the discussions and humor of the group, weel done to all concerned! Regards to all, Paul de Cogan MD The Minerva Group. >From: "Robert G. Ferrell" >Reply-To: "Robert G. Ferrell" >To: TSCM-L@yahoogroups.com >Subject: RE: [TSCM-L] Fw: ARROGRANCE >Date: Fri, 16 Feb 2001 10:18:45 -0600 (CST) > > >No -it's not. Every version of this story changes.. > > > >By the way, Lincoln has never sailed off of Newfoundland. > >I became fascinated by this urban legend a few years ago and spent too much >time researching it. The first version I've been able to find intact >dates to the World War II era, but there are rumors that it can be traced >to >as far back as the 19th century, except of course that the communications >were by flag or lantern, not voice... > >It seems that sailors, or perhaps harried journalists in search of a >piece of good filler, update the story every so often with modern ship >names and contemporary political references. Quite an interesting >phenomenon. > >Cheers, > >RGF > >Robert G. Ferrell, CISSP >Information Systems Security Officer >National Business Center >U. S. Dept. of the Interior >Robert_G_Ferrell@n... >======================================== > Who goeth without humor goeth unarmed. >======================================== > _________________________________________________________________________ Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com. 2505 From: David Alexander Date: Mon Feb 19, 2001 4:47am Subject: humour - 3 stages of married life The 3 stages of married life: Tri-weekly Try weekly Try weakly David Alexander Bookham Technology plc DDI: 01235 837823 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 2506 From: David Alexander Date: Mon Feb 19, 2001 3:06am Subject: re: Is Phone Interference Phony? I read the submission on airborne interference allegedly caused by electronic interference, such as cellphones & laptops. There are a couple of points that have not been mentioned: Modern aircraft are very complex electronic systems (I speak as an ex RAF fighter pilot). The author is right to say it is difficult to reliably reproduce symptoms. In the meantime I don't want any airline or anyone else playing fast-and-loose with my life while I'm sitting in the back. It is a risk that is manageable by saying 'don't use them' until such time as we do have proof, one way or the other. It also strikes me that, with a legal system so ludicrously out of control as the American one (and I'm quoting several American friends there - not just the opinion of an 'd*mn foreigner') - if anything untoward were to happen that could even possibly be blamed on there not being such a policy, there would be more lawyers/attorneys/whatever descend on that airline than they could imagine in their worst nightmares. just my 2c. David Alexander Bookham Technology plc DDI: 01235 837823 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 2507 From: Robert G. Ferrell Date: Tue Feb 20, 2001 8:12am Subject: Re: Trojan Horse Ports List >Trojan Horse Ports List If you'd like a more comprehensive mapping of both legitimate services and trojans to ports, see my searchable ports database at http://rgfsparc.cr.usgs.gov:8090/sysadmin/ports.html Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2508 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 10:47am Subject: FBI Agent Robert Philip Hanssen Arraigned on Espionage Charges FBI agent arraigned on spy charges Authorities say Hanssen did "extreme" damage to the United States during the past 10 years, passing secrets to Russia, NBC News' Pete Williams reports. NBC NEWS AND WIRE REPORTS WASHINGTON, Feb. 20 - A senior FBI counterintelligence expert appeared in court Tuesday to face charges that he spied for Moscow for more than a decade. Agent Robert Philip Hanssen - just the third FBI agent ever arrested on espionage charges - slipped secrets to the Russians while he was assigned to spy on Moscow's U.S. Embassy and other Russian outposts, sources told NBC News. HANSSEN, A 27-year agency veteran who spent most of his career as a counterspy, was arrested Sunday night at his home in Vienna, Va., shortly after leaving a package of classified material at a nearby park, sources said. He appeared Tuesday in federal court in Alexandria, Va., for arraignment on espionage charges. Attorney General John Ashcroft, FBI Director Louis Freeh and CIA Director George Tenet scheduled an early afternoon news conference to discuss the arrest. The sources told NBC News, which broke the story of Hanssen's arrest early Tuesday, that Hanssen had done "extreme damage" to the United States. They also said agency officials had been aware of the spying for the past several months. SUSPECT ASSIGNED TO SURVEILLANCE Hanssen, 56, was a senior agent assigned to surveillance of the Russian Embassy in Washington and other Moscow missions to the United States, including one in New York. Officials said among the secrets Hanssen allegedly disclosed include methods the United States uses to conduct electronic surveillance. Officials said Hanssen, who also worked for the U.S. State Department in Washington before returning to the FBI, may have confirmed for the Russians information originally given to them by CIA spy Aldrich Ames about the identity of U.S. intelligence sources overseas, some of whom were then executed. Russian officials in Moscow had no immediate comment on the arrest. "As of now, we do not have information about this," said Foreign Ministry spokesman Vladimir Oshurkov. White House spokesman Ari Fleischer said President Bush considers the allegations "disturbing." Officials said Hanssen's senior status in counterspying put him in an ideal position to uncover information and to make sure his tracks were covered. The sources said investigators believe Hanssen, who is married and has six children, kept his identity secret from his Russian handlers. The four contacts identified in the Washington area knew him only by code name, and recently acquired KGB documents indicate that even senior Russian intelligence officials knew him that way, too, the sources said. CONNECTION TO BUGGING CASE? Intelligence sources told NBC News that they believe Hanssen also had a "tangential connection" to the planting of an electronic eavesdropping device discovered in late 1999 in a State Department conference room. Agents searched Hanssen's suburban home in Virginia after his arrest late Sunday. Federal officials indicated they have not been able to determine whether Hanssen acted for political reasons or for personal gain. They say the Russians were paying him, but that he had no obvious debts and hadn't been on any spending sprees. Underscoring the gravity of the case, former FBI Director William Webster has been named to lead a blue-ribbon panel that will assess the impact of the alleged espionage, an FBI source told The Associated Press. Nancy Cullen, a neighbor, described Hanssen's neighborhood as being in shock with news of the arrest. "They go to church every Sunday - if that means anything - loading all six kids into the van." She said the Hanssens were regulars at the Memorial Day block party and called Hanssen "very attractive ... not overly gregarious." Hanssen is only the third FBI agent ever accused of spying. In 1997, Earl Pitts, who was stationed at the FBI Academy in Quantico, Va., was sentenced to 27 years in prison after admitting he spied for Moscow during and after the Cold War. The only other FBI agent ever caught spying was Richard W. Miller, a Los Angeles agent who was arrested in 1984 and later sentenced to 20 years in prison. Last year, a former Army officer was accused of spying for the Soviet Union and Russia for 25 years. Prosecutors said retired Army Reserve Col. George Trofimoff, who was a civilian intelligence employee, was captured on one tape putting his hand to his heart and telling an undercover agent posing as a Russian agent: "I'm not American in here." NBC News Correspondent Pete Williams and NBC News Producer Robert Windrem, MSNBC.com's Mike Brunker and The Associated Press contributed to this report. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2509 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 1:15pm Subject: 27-year FBI veteran accused of spying - Suspect charged with passing information, identifying double agents 27-year FBI veteran accused of spying Suspect charged with passing information, identifying double agents February 20, 2001 Web posted at: 1:44 p.m. EST (1844 GMT) WASHINGTON (CNN) -- Veteran FBI agent Robert Philip Hanssen was charged Tuesday with passing classified documents to Russia and with identifying for Russian intelligence three KGB agents who were working for the United States as double agents. The 27-year FBI veteran, appearing before U.S. District Court Judge Theresa Buchanan in Alexandria to hear the charges against him two days after his arrest, was ordered held without bond until he appears again in court on March 5. A spokesman for the Russian Embassy in Washington had no comment on the allegations. "Individuals who commit treasonous acts against the United States will be held fully accountable," Attorney General John Ashcroft said at a Tuesday afternoon news conference. "I will devote whatever resources are necessary within the department to ensure that justice is done in this case and any other case like it," he added. Ashcroft said attempts by other governments to obtain U.S. secrets "are as intense today as they have ever been." "The FBI entrusted him with some of its most sensitive matters. And the U.S. government relied upon him for his service and his integrity. He, as charged, abused and betrayed that trust. The crimes alleged are an affront not only to his fellow FBI employees, but to the American people," said FBI Director Louis Freeh. Freeh said the bureau has not yet determined how badly U.S. interests were damaged by the espionage Hanssen is suspected of carrying out. In addition, former FBI and CIA chief William Webster will lead a comprehensive review of U.S. counterintelligence procedures and security in the wake of Hanssen's arrest, Ashcroft said. Hanssen was charged with passing top-secret documents to Soviet agents on March 20, 1989, as part of "a conspiracy to cause injury to the United States and an advantage to a foreign government, namely the USSR." Hanssen, a 56-year-old father of six, was charged with fingering the three double agents on October 1, 1985. Court documents also alleged that he was paid $1.4 million from 1985 until his arrest on Sunday. Hanssen's attorney, Plato Cacheris, described his client as "quite upset" and "very emotional" and said he was not guilty of the charges against him. If convicted, Hanssen could face life imprisonment or -- under special circumstances -- the death penalty. Steep fines could also be imposed. Attorney represented convicted CIA spy Hanssen spent most of his career in counter-intelligence operations designed to catch spies. His most recent assignment was with the State Department, where his job was to help ferret out Russian spies. Hanssen's high security clearance and sensitive job assignments gave him access to details of U.S. security operations, including methods the United States used to conduct electronic surveillance. Sources told CNN that Hanssen would have been in position to warn the Russians if the United States suspected anyone of spying. FBI officials said Hanssen may have also allowed the Russians to cross-check and confirm the names of U.S. intelligence agents supplied to them by Aldrich Ames, a CIA employee arrested in 1997 and convicted of spying for the Russians. At least 10 of the agents fingered by Ames were executed. Cacheris, Hanssen's attorney, also represented Ames. Four-month surveillance The charges filed against Hanssen were based on a 110-page affidavit outlining his alleged activities. One source told CNN that the FBI obtained documents from the KGB, the Russian intelligence service, that pointed to Hanssen as a mole inside the FBI. Agents kept Hanssen under surveillance for at least four months before arresting him Sunday at a park in Vienna, Virginia, after he allegedly dropped classified documents into a "dead box" where they could be picked up by Russian agents. An FBI official said the Russians paid Hanssen "substantial amounts" for his information. Former Deputy Attorney General George Terwilliger told CNN that "no case like this would be brought unless it was very, very strong." Bush orders inquiry Because of Hanssen's position and high security clearance, U.S. officials moved quickly to determine the extent of damage his alleged activities may have caused. Aides to President George W. Bush said the damage may be "considerable, potentially quite serious," and that the president had approved the recommendation for an independent review involving the CIA, State and Justice Departments. Plans for that operation were to be announced later on Tuesday. William Webster, a former head of both the CIA and FBI, was expected to be appointed to head the blue-ribbon panel to conduct the review. CNN Correspondents Jeanne Meserve, Steve Harrigan, Eileen O'Connor, David Ensor and Kelli Arena contributed to this report. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2510 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 1:21pm Subject: FBI Press Release On the Arrest of FBI Special Agent Robert Philip Hanssen For Immediate Release February 20, 2001 Washington D.C. FBI National Press Office Attorney General John Ashcroft, FBI Director Louis J. Freeh and United States Attorney Helen Fahey announced today that a veteran FBI counterintelligence Agent was arrested Sunday by the FBI and charged with committing espionage by providing highly classified national security information to Russia and the former Soviet Union. At the time of the arrest at a park in Vienna, Virginia, Robert Philip Hanssen, age 56, was clandestinely placing a package containing highly classified information at a pre-arranged, or "dead drop," site for pick-up by his Russian handlers. Hanssen had previously received substantial sums of money from the Russians for the information he disclosed to them. FBI Director Louis J. Freeh expressed both outrage and sadness. He said the charges, if proven, represent "the most serious violations of law -- and threat to national security." "A betrayal of trust by an FBI Agent, who is not only sworn to enforce the law but specifically to help protect our nation's security, is particularly abhorrent. This kind of criminal conduct represents the most traitorous action imaginable against a country governed by the Rule of Law. It also strikes at the heart of everything the FBI represents -- the commitment of over 28,000 honest and dedicated men and women in the FBI who work diligently to earn the trust and confidence of the American people every day." "These kinds of cases are the most difficult, sensitive and sophisticated imaginable. I am immensely proud of the men and women of the FBI who conducted this investigation. Their actions represent counterintelligence at its very best, reflecting dedication to both principle and mission. It is not an easy assignment to investigate a colleague, but they did so unhesitatingly, quietly and securely." Hanssen was charged in a criminal complaint filed in Federal court in Alexandria, Virginia, with espionage and conspiracy to commit espionage, violations that carry a possible punishment of life in prison, and under certain circumstances, the death penalty. Following the arrest, FBI Agents began searching Hanssen's residence, automobiles and workspace for additional evidence. A detailed affidavit, filed in support of the criminal complaint and search warrants, provides a troubling account of how Hanssen first volunteered to furnish highly sensitive documents to KGB intelligence officers assigned to the Soviet embassy in Washington, D.C. The affidavit chronicles the systematic transfer of highly classified national security and counterintelligence information by Hanssen in exchange for diamonds and cash worth more than $600,000. Hanssen's activities also have links to other, earlier espionage and national security investigations including the Aldrich Ames and Felix Bloch cases, according to the affidavit. The affidavit alleges that on over 20 separate occasions, Hanssen clandestinely left packages for the KGB, and its successor agency, the SVR, at dead drop sites in the Washington area. He also provided over two dozen computer diskettes containing additional disclosures of information. Overall, Hanssen gave the KGB/SVR more than 6,000 pages of valuable documentary material, according to the affidavit. The affidavit alleges that Hanssen compromised numerous human sources of the U.S. Intelligence Community, dozens of classified U.S. Government documents, including "Top Secret" and "codeword" documents, and technical operations of extraordinary importance and value. It also alleges that Hanssen compromised FBI counterintelligence investigative techniques, sources, methods and operations, and disclosed to the KGB the FBI's secret investigation of Felix Bloch, a foreign service officer, for espionage. Freeh said that although no formal damage assessment could be conducted before the arrest without jeopardizing the investigation, it is believed that the damage will be exceptionally grave. During the time of his alleged illegal activities, Hanssen was assigned to New York and Washington, D.C., where he held key counterintelligence positions. As a result of his assignments, Hanssen had direct and legitimate access to voluminous information about sensitive programs and operations. As the complaint alleges, Hanssen effectively used his training, expertise and experience as a counterintelligence Agent to avoid detection, to include keeping his identity and place of employment from his Russian handlers and avoiding all the customary "tradecraft" and travel usually associated with espionage. The turning point in this investigation came when the FBI was able to secure original Russian documentation of an American spy who appeared to the FBI to be Hanssen, which subsequent investigation confirmed. Freeh said the investigation that led to the charges is a direct result of the combined and continuing FBI/CIA effort ongoing for many years to identify additional foreign penetrations of the U.S. intelligence community. The investigation of Hanssen was conducted by the FBI with direct assistance from the CIA, Department of State and the Justice Department, and represents an aggressive and creative effort which led to this counterintelligence success. Freeh said, "We appreciate the unhesitating leadership and support of Attorney General John Ashcroft from the moment he took office." Freeh also expressed his gratitude to Helen Fahey, United States Attorney for the Eastern District of Virginia, Assistant United States Attorney Randy Bellows, and senior Justice Department officials Robert Mueller, Frances Fragos Townsend, John Dion and Laura Ingersoll for their contributions to the case. United States Attorney Fahey said, "In the past decade, it has been our unfortunate duty to prosecute a number of espionage cases -- Ames, Pitts, Nicholson, Squillacote, Kim, Boone, and others. With each case, we hope it will be the last. Today, however with the arrest of Robert Hanssen, we begin again the process of bringing to justice a U.S. Government official charged with the most egregious violations of the public trust. The full resources of the Department of Justice will be devoted to ensuring that those persons who would betray their country and the people of the United States are prosecuted and severely punished." "I want to express my appreciation for the outstanding work done by the National Security Division and the Washington Field Office of the FBI in this investigation. Their superlative work in this extraordinarily sensitive and important investigation is testament to their professionalism and dedication. We also express our deep appreciation for the outstanding assistance provided by the Internal Security Section of the Criminal Division of the Department of Justice." Freeh and CIA Director George Tenet kept the Intelligence Committees of Congress, because of the clear national security and foreign policy implications, informed about the case. As a result of Hanssen's actions, Freeh has ordered a comprehensive review of information and personnel security programs in the FBI. Former FBI Director and Director of Central Intelligence William H. Webster will lead the review. Webster, currently in private law practice, brings a "unique experience and background in government management and counterintelligence," Freeh said. "Moreover, the respect he enjoys throughout the intelligence community and elsewhere in government is second to none. Judge Webster will have complete access and whatever resources that are necessary to complete the task and will report directly to Attorney General Ashcroft and me. I will share his report with the National Security Council and then Congress as well," Freeh said. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2511 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 1:21pm Subject: Statement of FBI Director Louis J. Freeh On the Arrest of FBI Special Agent Robert Philip Hanssen For Immediate Release February 20, 2001 Washington D.C. FBI National Press Office Statement of FBI Director Louis J. Freeh On the Arrest of FBI Special Agent Robert Philip Hanssen Sunday night the FBI arrested Robert Philip Hanssen who has been charged with committing espionage. Hanssen is a Special Agent of the FBI with a long career in counterintelligence. The investigation that led to these charges is the direct result of the longstanding FBI/CIA efforts, ongoing since the Aldrich Ames case, to identify additional foreign penetrations of the United States Intelligence Community. The investigation of Hanssen was conducted by the FBI in partnership with the CIA, the Department of State, and, of course, the Justice Department. The complaint alleges that Hanssen conspired to and did commit espionage for Russia and the former Soviet Union. The actions alleged date back as far as 1985 and, with the possible exception of several years in the 1990s, continued until his arrest on Sunday. He was arrested while in the process of using a "dead drop" to clandestinely provide numerous classified documents to his Russian handler. It is alleged that Hanssen provided to the former Soviet Union and subsequently to Russia substantial volumes of highly classified information that he acquired during the course of his job responsibilities in counterintelligence. In return, he received large sums of money and other remuneration. The complaint alleges that he received over $600,000. The full extent of the damage done is yet unknown because no accurate damage assessment could be conducted without jeopardizing the investigation. We believe it was exceptionally grave. The criminal conduct alleged represents the most traitorous actions imaginable against a country governed by the Rule of Law. As difficult as this moment is for the FBI and for the country, I am immensely proud of the men and women who conducted this investigation. Their actions represent counterintelligence at its very best and under the most difficult and sensitive of circumstances. Literally, Hanssen's colleagues and coworkers at the FBI conducted this investigation and did so quietly, securely and without hesitation. Much of what these men and women did remains undisclosed but their success and that of their CIA counterparts represents unparalleled expertise and dedication to both principle and mission. The complaint alleges that Hanssen, using the code name "Ramon," engaged in espionage by providing highly classified information to the KGB and its successor agency, the SVR, using encrypted communications, dead drops, and other clandestine techniques. The information he is alleged to have provided compromised numerous human sources, technical operations, counterintelligence techniques, sources and methods, and investigations, including the Felix Bloch investigation. The affidavit alleges that Hanssen voluntarily became an agent of the KGB in 1985 while assigned to the intelligence division at the FBI field office in New York City as supervisor of a foreign counterintelligence squad. Hanssen allegedly began spying for the Soviets in 1985 when, in his first letter to the KGB, he volunteered information that compromised several sensitive techniques. He also independently disclosed the identity of two KGB officials who, first compromised by Aldrich Ames, had been recruited by the U.S. Government to serve as "agents in place" at the Soviet Embassy in Washington. When these two KGB officials returned to Moscow, they were tried and convicted on espionage charges and executed. Hanssen subsequently was assigned to a variety of national security posts that legitimately provided him access to classified information relating to the former Soviet Union and Russia. As a result of these assignments within the FBI, Hanssen gained access to some of the most sensitive and highly classified information in the United States Government. To be very clear on this issue, at no time was he authorized to communicate information to agents of the KGB/SVR. Nor can there be any doubt that he was keenly aware of the gravity of his traitorous actions. He later wrote to his KGB handler, speaking about the severity with which U.S. laws punishes his alleged actions, and acknowledging "...I know far better than most what minefields are laid and the risks." Hanssen was detailed to the Office of Foreign Missions at the Department of State from 1995 to 2000. The complaint, however, does not allege any compromises by him at the State Department. In one letter to his Russian handlers, Hanssen complains about lost opportunities to alert them that the FBI had discovered the microphone hidden at the State Department, known then by the FBI but apparently not by Hanssen as being monitored by a Russian intelligence officer. In this assignment, however, Hanssen did continue to have access to sensitive FBI information as he remained assigned to the FBI's National Security Division and routinely dealt with sensitive and classified matters. For many years, the CIA and FBI have been aggressively engaged in a sustained analytical effort to identify foreign penetrations of the Intelligence Community. That effort is complemented by substantial FBI proactive investigation of foreign service intelligence officers here and by the critical work done by the CIA. Because of these coordinated efforts, the FBI was able to secure original Russian documentation of an American spy who appeared to the FBI to be Hanssen -- a premise that was soon to be confirmed when Hanssen was identified by the FBI as having clandestinely communicated with Russian intelligence officers. As alleged in the complaint, computer forensic analysis, substantial covert surveillance, court authorized searches and other sensitive techniques revealed that Hanssen has routinely accessed FBI records and clandestinely provided those records and other classified information to Russian intelligence officers. As alleged, he did so using a variety of sophisticated means of communication, encryption, and dead drops. Further, the complaint alleges that Hanssen, using his training and experience to protect himself from discovery by the FBI, never met face-to-face with his Russian handlers, never revealed to them his true identity or where he worked, constantly checked FBI records for signs he and the drop sites he was using were being investigated, refused any foreign travel to meet with the Russians, and even declined to accept any "trade craft." Hanssen never displayed outward signs that he was receiving large amounts of unexplained cash. He was, after all, a trained counterintelligence specialist. For these reasons, the FBI learned of his true identity before the Russians; they are learning of it only now. Even without knowing who he was or where he worked, Hanssen's value to the Russians was clear both by the substantial sums of money paid and the prestigious awards given to their own agents for Hanssen's operation. While this arrest represents a counterintelligence investigative success, the complaint alleges that Hanssen located and removed undetected from the FBI substantial quantities of information that he was able to access as a result of his assignments. None of the internal information or personnel security measures in place alerted those charged with internal security to his activities. In short, the trusted insider betrayed his trust without detection. While the risk that an employee of the United States Government will betray his country can never be eliminated, there must be more that the FBI can do to protect itself from such an occurrence. I have asked Judge William H. Webster, and he has graciously agreed, to examine thoroughly the internal security functions and procedures of the FBI and recommend improvements. Judge Webster is uniquely qualified as a former FBI Director, CIA Director and Director of Central Intelligence to undertake this review. This is particularly timely as we move to the next generation of automation to support the FBI's information infrastructure. Judge Webster and anyone he selects to assist him will have complete access and whatever resources are necessary to complete this task. He will report directly to the Attorney General and me and we will share his report with the National Security Council and Congress. I intend to act swiftly on his recommendations. Before concluding, I would like to take this opportunity to thank Director of Central Intelligence George Tenet for the cooperation and assistance of his agency in this investigation. Through our cooperative efforts, the FBI and CIA were able to learn the true identity of "Ramon" and the FBI was able to conduct a solid investigation. Our joint efforts over the last several years and specifically in this case should give pause to those contemplating betrayal of the Nation's trust. Without the current unprecedented level of trust and cooperation between the CIA and FBI, making this case would not have been possible. Nor would many other intelligence and counterintelligence accomplishments that routinely but quietly contribute to the security of this Nation. Through Attorney General John Ashcroft, I would like to thank the Department of Justice and the U.S. Attorney's Office for the Eastern District of Virginia. The level of support and expertise from Acting Deputy Attorney General Robert Mueller, Counsel for Intelligence Policy Frances Fragos Townsend, U.S. Attorney Helen Fahey and Assistant United States Attorney Randy Bellows is superb. We particularly appreciate the unhesitating leadership and support of Attorney General Ashcroft from the moment he took office. Director Tenet and I have briefed the intelligence committees of Congress because of the clear national security implications. As Director of the FBI, I am proud of the courageous men and women of the FBI who each day make enormous sacrifices in serving their country. They have committed their lives to public service and to upholding the high standards of the FBI. Since becoming Director over seven years ago, I have administered the FBI oath to each graduating class of Special Agents at the FBI Academy. Each time, I share the pride and sanctity of those words when new agents swear to "support and defend the Constitution of the United States against all enemies, foreign and domestic" and to "bear true faith and allegiance to the same." Regrettably, I stand here today both saddened and outraged. An FBI Agent who raised his right hand and spoke those words over 25 years ago has been charged today with violating that oath in the most egregious and reprehensible manner imaginable. The FBI entrusted him with some of the most sensitive secrets of the United States Government and instead of being humbled by this honor, Hanssen has allegedly abused and betrayed that trust. The crimes alleged are an affront not only to his fellow FBI employees but to the American people, not to mention the pain and suffering he has brought upon his family. Our hearts go out to them. I take solace and satisfaction, however, that the FBI succeeded in this investigation. As an agency, we lived up to our responsibility, regardless of how painful it might be. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2512 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 1:24pm Subject: Another Spy suspect is arrested - This one is in Sweden Spy suspect is arrested February 20, 2001 Web posted at: 1:34 PM EST (1834 GMT) STOCKHOLM, Sweden -- Security police have arrested a man suspected of espionage, a spokesperson for Sweden's security police, Sapo, has confirmed to CNN Sweden. According to the tabloid Expressen, the man is believed to have been spying for Russia, although the Swedish Defence Ministry said the affair did not involve the Swedish military or the military industry. The report comes at a sensitive time for Sweden, a month before Russian President Vladimir Putin visits for the first time. The alleged spy worked for Swedish-Swiss industrial giant ABB (Asea Brown Boveri). Charlie Nordblom, senior information manager at ABB in Sweden told CNN: "We have been informed by prosecutors that an employee at ABB has been arrested suspected of espionage. "We assisted the Swedish security police ahead of the arrest." He declined to say what post the arrested person held. Likewise, Swedish security police have declined to give any details on his identity, the time period in question, what the espionage was directed against or how the suspect¥s activities were disclosed. Christian Democrat leader Alf Svensson said Tuesday that the affair would affect Swedish-Russian relations. ABB is one of the largest industrial, energy and automation companies in the world. The ABB Group employs about 160,000 people in more than 100 countries and serves customers in power transmission and distribution; automation; oil, gas, and petrochemicals; building technologies; financial services and IT applications. Threats against Sweden from spies have in recent years been redirected from military issues to commercial, technological and industrial interests. The case is the first in Sweden involving Russia or the Soviet Union in more than two decades, and the fifth since the end of World War II. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2513 From: Mike F Date: Tue Feb 20, 2001 5:57pm Subject: NSA's Security Enhanced Since I finally do have Linux on my computer, this Version of Linux sounds Interesting. http://www.nsa.gov/selinux/ later4,mike f [Non-text portions of this message have been removed] 2514 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 6:20pm Subject: FBI Says Suspect Agent Well Trained FBI Says Suspect Agent Well Trained http://www.worldnews.com/?action=display&article=5844221&template=worldnews/search.txt&index=recent The Associated Press, Tue 20 Feb 2001 WASHINGTON (AP) ≠ Robert Philip Hanssen was supposed to be a spy of sorts in his own country, keeping tabs on the comings and goings of foreign diplomats. The veteran FBI agent was trained all too well. The very professionalism the Chicago native brought to the task helped him operate without detection for more than a decade as a spy for Moscow, the FBI says. A father of six living in a middle-class Virginia suburb, Hanssen knew how to hide his identity even from his handlers and how to watch the FBI to see if it was watching him, authorities said after charging him with espionage. He was aware, too, of how severe the treatment can be for caught spies. ``I know far better than most what mine fields are laid and the risks,'' Hanssen wrote to a KGB handler, according to correspondence quoted by FBI Director Louis Freeh. For all his anger, Freeh paid what sounded like grudging compliments to techniques the former Chicago police officer and 25-year FBI veteran ≠ a student of Russian in college ≠ is alleged to have used. ``In short, the trusted insider betrayed his trust without detection,'' Freeh said. For Hanssen, an FBI career that began with his taking the agency's oath ended in a Virginia park Sunday night, where colleagues read him his Miranda rights. Nothing special set him apart in his Vienna, Va., neighborhood, say the neighbors, although one complained that he let his dog roam and create a nuisance. Hanssen, 56, made a home for himself, his wife and their children in a $300,000 split-level, brick-and-cedar house with a one-car garage, a Ford Taurus and that other symbol of suburban living ≠ a minivan. A basketball hoop is in the driveway. Hanssen's wife, Bernadette, teaches religion part-time at a local Catholic high school, and the family came regularly to block parties, such as the one every Memorial Day. ``Not overly gregarious,'' Nancy Cullen said of him. She lives several doors down from the Hanssens in a cul-de-sac she describes as ``our town hall.'' When neighbor called neighbor to share the news of his arrest, the reaction was, ``No way,'' Cullen said. ``I've been in his house. I've never seen any Soviet flags or anything like that, if that's what you're asking,'' said Matt Bennett, who lives across the street. The government says Hanssen had a long relationship with the Soviet Union and the Russians, dating back to 1985, while assigned to the intelligence division of the FBI field office in New York City. Operating under the code name ``Ramon,'' Hanssen kept his real identity a secret even from his Russian handlers, who did not find out his name or who employed him until his arrest was disclosed, Freeh said. Hanssen also checked his agency's own security systems to see whether authorities had any suspicions about him ≠ which they apparently did not until late last year. ``He was, after all, a trained counterintelligence specialist,'' Freeh said. From February 1995 until January, Hanssen was the FBI's senior representative to the State Department's Office of Foreign Missions, where he oversaw an interagency counterintelligence group. He was returned to FBI headquarters last month in a newly created position designed so that the bureau could monitor his daily activities without alerting him to its investigation. Hanssen apparently contemplated several careers before settling on one in law enforcement. He earned a bachelor's degree in chemistry from Knox College in Galesburg, Ill., in 1966, according to the government's information. He then studied dentistry at Northwestern until 1968 before receiving a master's in accounting from the university in 1971. He became a certified public accountant in 1973. He worked as a junior accountant at a Chicago firm from 1971 to 1972, when he joined the city police department as an investigator in the financial section of its inspection division. Hanssen joined the FBI in January 1976, and served initially in Indiana before assignments that took him back and forth between offices in New York and the Washington headquarters. ≠≠≠ Associated Press writer Matt Barakat in northern Virginia contributed to this report. Copyright 2001 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2515 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 6:22pm Subject: FBI Russia spy caused "grave" damage [Note: The use of the work "Grave" indicates that he was passing Top Secret information to his handlers.] FBI Russia spy caused "grave" damage http://uk.news.yahoo.com/010220/80/b4fs8.html By Sue Pleming WASHINGTON (Reuters) - An FBI counter-intelligence expert was charged on Tuesday with betraying Soviet double agents and of selling secrets to Moscow in what experts called one of the worst espionage cases in recent U.S. history. Robert Philip Hanssen was arrested on Sunday after FBI agents watched him drop off a package of classified information at a park near his northern Virginia home, which was to be picked up by his Russian handlers. FBI director Louis Freeh said Hanssen, a 25-year FBI veteran, had access to some of the "most sensitive and highly classified information" in the U.S. government. Hanssen, 56, who has six children, was alleged to have been paid $1.4 million (970,000 pounds) by the Russians in cash and diamonds. Prosecutors said he could face a possible death sentence for each of two formal charges laid against him. Formal charges filed against him at a federal court in Arlington, Virginia on Tuesday related to two incidents toward the end of the Cold War. One claimed Hanssen made available classified documents to the KGB in March, 1989 and the other said that in October 1985 he betrayed three Russian KGB agents who were also working for the United States. Freeh said Hanssen's spying continued until his arrest on Sunday with a break in the 1990s. "The criminal conduct alleged represents the most traitorous actions imaginable against a country governed by the rule of law," Freeh said. No full damage assessment had yet been made, to avoid jeopardising the investigation, Freeh said, but added: "We believe it was exceptionally grave." Freeh displayed photographs of various drop-off locations used by Hanssen as well as a photograph Freeh said showed a package containing $50,000 in cash which had been waiting for the agent at a pick-up point in a park in Arlington. SHOCKED AND SURPRISE Agents who arrested him said he seemed "shocked and surprised" when he was caught because he thought he had been so careful, Freeh said. Using the code name "Ramon," Freeh said Hanssen provided highly classified information to the KGB and its successor agency, the SVR, using encrypted communication, dead drops and other clandestine techniques. He said Hanssen independently disclosed the identity of two KGB officials who, first compromised by convicted CIA spy Aldrich Ames, had been recruited by the U.S. government at the Soviet embassy in Washington. "When these two KGB officials returned to Moscow, they were tried and convicted on espionage charges and executed," Freeh said. President George W. Bush said he was deeply disturbed by what he described as "extremely serious" allegations. On a visit to St Louis, Bush said: "This has been a difficult day for those who love our country and especially for those who serve our country in law enforcement and the intelligence community." Bush said he had the "utmost confidence" in Freeh, contrasting with a lukewarm backing by former President Bill Clinton. Freeh, who said he was "saddened and outraged" by the case, praised his staff for tracking down Hanssen. He announced that former CIA and FBI Director William Webster would conduct a full review to see where security had been breached. SILENT AND SOLEMN At his arraignment in federal court, Hanssen, dressed in a black turtle neck, black shirt and grey slacks and looking weary, was silent and solemn as the two charges were read out. Defence lawyer Plato Cacheris said he planned at this stage to plead not guilty, adding that his client was "emotional" and quite "upset" by the case against him. Attorney General John Ashcroft said the arrest of Hanssen should remind every American that their country was an "international target in a dangerous world." "In fact espionage operations designed to steal vital secrets of the United States are as intense today as they ever have been," Ashcroft told a news conference. In Moscow, spokesmen for both the Ministry of Foreign Affairs and Foreign Intelligence Service said they had no details on the case and they did not comment on matters of this type. Freeh said an internal FBI investigation began late last year after an internal intelligence audit revealed the presence of a mole in the agency. The United States then secretly obtained Russian documents that led them to suspect Hanssen. Hanssen's most recent job has been working out of FBI headquarters in Washington. His previous posts included performing surveillance on Russian government missions to the United States. He was also assigned to helping the State Department resolve a string of recent security problems, including the discovery of a listening device in a conference room that was monitored by a Russian agent in his car nearby. Freeh said the complaint against Hanssen did not allege any compromises by him at the State Department. The FBI veteran had, in fact, complained of "lost opportunities" to alert his Russian handlers that the FBI found the listening device. Hanssen is the third FBI agent in history to be arrested on charges of spying for the Russians. The others were Richard Miller, in the mid-1980s, and Earl Pitts, a lawyer who was convicted in the late 1990s. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2516 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 6:23pm Subject: FBI Spy Case Like Life Imitating Art FBI Spy Case Like Life Imitating Art http://www.guardianunlimited.co.uk/breakingnews/US/0,3560,745450,00.html Tuesday February 20, 2001 10:40 pm WASHINGTON (AP) - The government's case against FBI agent Robert Philip Hanssen seems like reality imitating art, spy novel material that includes executed double-agents, package drops along park footbridges and payments in diamonds. All going on for 15 years. Hanssen, 56, only the third FBI agent ever accused of spying, was accused Tuesday of espionage and conspiracy to commit espionage. In one of many letters quoted in an FBI affidavit, Hanssen was alleged to have written to his Russian handlers on Nov. 17, 2000, of his possible fate if caught: ``Recent changes in U.S. law now attach the death penalty to my help to you as you know, so I do take some risk.'' The allegations of a Hanssen relationship with the Soviet KGB intelligence agency and its successor, the SVR, included both bizarre and lighter moments. There was contact through use of a newspaper ad purporting to sell a 1971 Dodge that ``needs engine work,'' the FBI affidavit said. When the KGB asked how Hanssen would explain the diamonds he received, the agent was ready to tell everyone they came from his grandmother, it said. In a Dec. 25 message from the Russians, the American was offered ``Christmas greetings from the KGB,'' according to the documents. And to show appreciation in another instance, the Russians were said to have quoted poetry: ``What's our life, if full of care. You have no time to stop and stare?'' ``You've managed to slow down the speed of your running life to send us a message. And we appreciate it,'' the Russians were quoted as saying in the affidavit. They also commended Hanssen for ``your superb sense of humor and your sharp-as-a-razor mind,'' it said. According to the FBI, Hanssen's spying began with an Oct. 1, 1985, letter to a KGB official in the United States. ``Soon I will send a box of documents. ... They are from certain of the most sensitive and highly compartmented projects of the U.S. intelligence community,'' wrote the man the Russians knew as ``B.'' ``I believe they are sufficient to justify a $100,000 payment to me,'' Hanssen allegedly said in the letter included in the affidavit. The letter said the KGB had ``recently suffered some setbacks'' and warned that three Russian agents ``have been recruited by our 'special services,''' the affidavit said, adding that Hanssen identified the three, and two eventually were executed. Mostly using footbridges at parks in Washington's Virginia suburbs, the FBI alleged, Hanssen would signal the Russians of a package drop with a vertical white adhesive tape, and the Russians would respond with a piece of horizontal adhesive tape. On March 3, 1986, it said, Hanssen wrote the Russians that money wasn't always the best form of payment. ``As far as the funds are concerned, I have little need for more than the $100,000. It merely provides a difficulty since I cannot spend it, store it or invest it easily without triping (sic) 'drug money' warning bells,'' the letter said. ``Perhaps some diamonds as security to my children and some good will'' would be better, it said. On June 30, 1986, authorities said, Hanssen wrote: ``If you wish to continue our discussions, please have someone run an advertisement in the Washington Times'' saying: ``Dodge Diplomat, 1971, needs engine work, $1,000.'' According to the affidavit, Hanssen said he would respond: ``I will say, 'Hello, my name is Ramon. I am calling about the car you offered for sale in the Times.' You will respond, 'I m sorry, but the man with the car is not here, can I get your number?''' Several weeks later, an angry Hanssen allegedly wrote his contacts after a missed package exchange: ``I found the site empty. Empty bothers me.'' The FBI said it was Hanssen who ruined an investigation of a U.S. foreign service officer, Felix Bloch, by disclosing the probe to the Russians. Bloch then received a call saying his Soviet contact ``cannot see you in the near future'' because ``he is sick'' and ``a contagious disease is suspected,'' the affidavit said. ``The FBI was unable further to develop its investigation of Bloch,'' it said. All this was playing well in Moscow, where in 1989 the KGB officers involved in the operation allegedly involving Hanssen won the highly coveted Order of the Red Banner, Order of the Red Star and the Medal for Excellent Service. But the FBI said that by last March, a Hanssen letter to the Russians showed a man in despair. ``I have come about as close as I ever want to come to sacrificing myself to help you and I get silence,'' Hanssen allegedly wrote. ``I hate silence. ... Conclusion: One might propose that I am either insanely brave or quite insane. I'd answer neither. I'd say, insanely loyal.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2517 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 6:25pm Subject: FBI Agent Accused of Russia Spying FBI Agent Accused of Russia Spying http://newsroom.compuserve.com/nr/editorial.asp?floc=NT-SL1-FBISPY&idq=/cp/news/cntopics/slot2/slot2.asp&PageView=POL&CoView=&BTM=H By KAREN GULLO Associated Press Writer WASHINGTON (AP) -- A veteran FBI agent has been arrested on an espionage charge, accused of spying for Russia, the FBI said Tuesday. The agent, Robert Philip Hanssen, was arrested at his home in Vienna, Va., Sunday night, said FBI spokesman Bill Carter. He was to be arraigned later Tuesday in U.S. District Court in Alexandria, Va. Attorney General John Ashcroft and CIA Director George Tenet scheduled an early afternoon news conference to discuss the arrest. Although the FBI refused to provide details immediately, NBC News and CNN said Hanssen has been an FBI agent 27 years and had worked for a major part of his career in counterintelligence -- spying on Russian government outposts in the United States. He worked out of the FBI's Washington headquarters and also had been assigned to the State Department. NBC said Hanssen was arrested shortly after FBI agents saw him deposit a package of classified information at a "dead drop'' in a Virginia park. The network quoted FBI officials as saying that among secrets disclosed by Hanssen included U.S. methods for conducting electronic surveillance. He also may have confirmed for the Russians information originally supplied to them by convicted CIA spy Aldrich Ames. NBC said Hanssen is accused of causing extreme damage to U.S. security. Nancy Cullen, a neighbor, described Hanssen's neighborhood as being in shock with news of the arrest. "They go to church every Sunday -- if that means anything -- loading all six kids into the van.'' She said the Hanssens were regulars at the Memorial Day block party and called Hanssen "very attractive ... not overly gregarious.'' Last year a former Army officer was accused of spying for the Soviet Union and Russia for 25 years. Prosecutors said retired Army Reserve Col. George Trofimoff, who was a civilian intelligence employee, was captured on one tape putting his hand to his heart and telling an undercover agent posing as a Russian agent: "I'm not American in here.'' 20-Feb-01 08:22 EST -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2518 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 6:25pm Subject: F.B.I. Arrests Veteran Agent for Suspicion of Espionage February 20, 2001 F.B.I. Arrests Veteran Agent for Suspicion of Espionage http://www.nytimes.com/reuters/national/20WIRE-SPY.html By REUTERS WASHINGTON - A 27-year veteran of the Federal Bureau of Investigation has been arrested on suspicion of spying for Russia for the past 15 years, the FBI said Tuesday. FBI spokeswoman Jill Stillman said FBI agent Robert Philip Hanssen was arrested Sunday at his home outside Washington after he allegedly dropped off a package of classified information at a park in northern Virginia. "He was arrested for espionage," Stillman told Reuters, adding that Hanssen was due to appear in federal court at 11 a.m. EST in Alexandria, Virginia. Money motivated Hanssen to spy for Russia, FBI officials said. "The damage is significant," one U.S. official said on condition of anonymity. "The kinds of things he compromised involved documents, sources, operations." Among the secrets Hanssen, a counter-terrorism expert, allegedly disclosed were methods the United States uses to conduct electronic surveillance, the FBI said. Neighbors of Hanssen in Vienna, Virginia, described him as a composed, dedicated, hard-working man who went to church every Sunday with his wife and six children. FBI chief Louis Freeh was due to give a news conference at 12:45 p.m. Tuesday to provide details about the arrest and Hanssen's alleged spying activities. In Moscow, spokesmen for both the Ministry of Foreign Affairs and Foreign Intelligence Service said they had no details on the case and that they did not comment on matters of this type. PREVIOUS AGENT'S INFORMATION The FBI said Hanssen also may have confirmed for the Russians information originally given to them by convicted American super spy Aldrich Ames, a veteran officer for the Central Intelligence Agency who betrayed many U.S. agents in the former Soviet Union. Hanssen was initially suspected of being a spy for Russia several months ago after an internal intelligence audit revealed the presence of a mole in the FBI. The United States then secretly obtained Russian documents that led them to suspect Hanssen, the FBI said. Hanssen's most recent job has been working out of FBI headquarters in Washington. His previous posts included performing surveillance on Russian government missions to the United States. He was also assigned to helping the State Department resolve a string of recent security problems, including the discovery of a listening device in a conference room that was monitored by a Russian agent in his car nearby. It is unclear whether Hanssen was involved in any of the security breaches at the State Department. He becomes the third FBI agent in history to be arrested on charges of spying for the Russians. The others were Richard Miller, in the mid-1980s, and Earl Pitts, a lawyer who was convicted in the late 1990s. Hanssen's neighbor, Nancy Cullen, said she was surprised by the arrest and had never suspected he was anything but a "dedicated, hard-working guy". "We are all in shock this morning," said Cullen. "They are just the best of neighbors," she said in an interview with CNN. Cullen said the Hanssens did not appear to have any financial problems and did not live beyond their means. "None of our houses are very fabulous ... They've had the same van for 10 or 12 years. I said "Bonnie get yourself a new van'," said Cullen of her conversation recently with Hanssen's wife Bonnie. Cullen described the couple's children as very polite, well-schooled people. "It's just all so sad," she said. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2519 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 7:51pm Subject: The allegations against Hanssen The allegations against Hanssen ------------------------------------------------------------------------ The following are excerpts of the allegations from the affidavit, as transcribed by The Associated Press: --- SUMMARY OF INVESTIGATION -The results of this investigation to date indicate that there is probable cause to believe that, beginning in 1985 and continuing to the present, Robert Philip Hanssen (hereinafter "Hanssen"), a United States citizen, has conspired with officers and agents of the Union of Soviet Socialist Republics (hereinafter "USSR" or "Soviet Union") and with its principal successor state, the Russian Federation (hereinafter "Russia") to commit espionage against the United States on behalf of a foreign government, specifically the Soviet Union or Russia, and has in fact engaged in such espionage. -The evidence establishes that between 1985 and the present, Hanssen - who the KGB/SVR referred to as "B" - has engaged in the following conduct in violation of (federal laws) 18 U.S.C. 794 (a) and (c): --- -(a) He compromised numerous human sources of the United States Intelligence Community. Three of these sources were compromised by both Hanssen and former CIA officer Aldrich Ames, resulting in their arrest, imprisonment and, as to two individuals, execution. Hanssen compromised these three individuals expressly in order to enhance his own security and enable him to continue spying against the United States. -(b) He compromised dozens of United States Government classified documents, including documents concerning the National MASINT (Measurement and Signature Intelligence) Program (classified TOP SECRET/SCI), the United States Double Agent Program (classified SECRET), the FBI Double Agent Program (classified TOP SECRET), the United States Intelligence Community's Comprehensive Compendium of Future Intelligence Requirements (classified TOP SECRET), a study concerning KGB recruitment operations against the CIA (classified SECRET), an assessment of the KGB's effort to gather information concerning certain United States nuclear programs (classified TOP SECRET), a CIA analysis of the KGB's First Chief Directorate (classified SECRET), a highly classified and tightly restricted analysis of the foreign threat to a specific named highly compartmented classified United States Government program (classified TOP SECRET/SCI), and other classified documents of exceptional sensitivity. --- -(c) He compromised United States Intelligence Community technical operations of extraordinary importance and value. This included specific electronic surveillance and monitoring techniques and precise targets of the United States Intelligence Community. In one case, he compromised an entire technical program of enormous value, expense and importance to the United States Government. In several other cases, he compromised the United States Intelligence Community's specific communications intelligence capabilities, as well as several specific targets. -(d) He compromised numerous FBI counterintelligence investigative techniques, sources, methods and operations, and FBI operational practices and activities targeted against the KGB/SVR. He also advised the KGB/SVR as to specific methods of operation that were secure from FBI surveillance and warned the KGB/SVR as to certain methods of operation which were subject to FBI surveillance. --- -(e) He disclosed to the KGB the FBI's secret investigation of Felix Bloch, a Foreign Service Officer, for espionage, which led the KGB to warn Bloch that he was under investigation, and completely compromise the investigation. --- -(f) Hanssen's conspiratorial activities continue to the present. Hanssen continues to monitor a particular SVR signal site, doing so on numerous occasions in December 2000, January 2001 and February 2001. A recent search of Hanssen's personal vehicle, pursuant to court authorization, disclosed a number of classified secret documents, entries in a personal journal concerning matters relating to the instant investigation, and items typically used to mark signal sites. It has also been determined that HANSSEN continues to attempt to ascertain whether he has become the subject of FBI investigative interest, including checking FBI records to determine whether there have been recent entries as to his own name, his home address or the signal site. --- -(g) Over the course of Hanssen's espionage activities, he communicated on numerous occasions with KGB/SVR personnel. This Affidavit cites 27 letters he sent to the KGB/SVR, and it describes 33 packages the KGB/SVR left for Hanssen at secret locations, and 22 packages Hanssen left for the KGB/SVR at secret locations. The Affidavit also describes two telephone conversations Hanssen had with KGB personnel. The Affidavit describes 26 computer diskettes that Hanssen passed to the KGB/SVR, containing additional disclosures of information, and 12 diskettes that the KGB/SVR passed to "B." Hanssen provided the KGB/SVR more than 6,000 pages of documentary material. -(h) For his services to the KGB/SVR, Hanssen was paid over $600,000 in cash and diamonds. In addition, the KGB/SVR placed funds in escrow in a Moscow bank on Hanssen's behalf. Some time in the last two years, the KGB/SVR informed Hanssen that the escrowed funds are now worth at least $800,000. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2520 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 7:51pm Subject: FBI Agent Accused of Spying FBI Agent Accused of Spying http://www.guardianunlimited.co.uk/breakingnews/US/0,3560,745621,00.html Wednesday February 21, 2001 12:10 am WASHINGTON (AP) - A veteran FBI agent was accused Tuesday of spying for Russia for more than 15 years, betraying three Russian undercover agents to Moscow and disclosing volumes of U.S. secrets in return for diamonds and up to $1.4 million. The FBI director called the case ``the most traitorous actions imaginable.'' Robert Philip Hanssen, 56, the father of six, was only the third FBI agent ever accused of espionage. President Bush called it ``a difficult day,'' particularly for the law enforcement and intelligence communities. Hanssen, a 25-year FBI agent, was arrested Sunday night at a park in suburban Virginia after dropping a package of documents for his Russian contacts, authorities said. FBI agents confiscated $50,000 hidden for him at a nearby drop site. Hanssen provided Moscow with the identities of two KGB officials who had been recruited by the U.S. government to serve as agents in-place at the Soviet Embassy in Washington, FBI Director Louis Freeh said. The agents, whose names were first compromised by Aldrich Ames, were tried on espionage charges on their return to Moscow and executed. A third KGB official identified by Hanssen was imprisoned but ultimately released, Freeh said. Ames pleaded guilty to spying for the Soviet Union in 1994. Operating under the codename Ramon, Hanssen kept his identity and occupation secret from the Russians, Freeh said. He said Hanssen frequently ran his name, address and his drop sites through FBI computers to see if they had raised any alarms. Sen. Richard Shelby, R-Ala., who said he was briefed on the case a week to 10 days ago as chairman of the Senate Select Committee on Intelligence, said Hanssen may have caused grave harm. ``This could be a very, very, very serious case of espionage,'' Shelby said in a telephone interview from Alabama. ``Here's an agent who is a veteran of the FBI, who's been doing counterintelligence for a long time. He knows a lot. He could have given them a lot.'' Hanssen provided the KGB and its successor agency, SVR, with information since 1985 on top secret U.S. intelligence and counterintelligence activities, including investigative techniques, sources, technical operations, double agents and targets of U.S. intelligence, according to a 100-page FBI affidavit He also tipped off the KGB to the FBI's secret investigation of Felix Bloch, a foreign service agent suspected of spying for Moscow in 1989, the FBI said. The KGB was then able to warn Bloch, the agency said. Justice Department prosecutors were never able to find key evidence that Bloch passed secret documents. Freeh said the extent of damage, while still being assessed, looked to be ``exceptionally grave.'' He added, ``The criminal conduct alleged represents the most traitorous actions imaginable against a country.'' Bush, in a statement that he read to reporters on Air Force One, said that even in the post-Cold War era, espionage is a serious threat to U.S. national security. ``Allegations of espionage are a reminder that we live in a dangerous world, a world that sometimes does not share American values,'' said Bush. ``To anyone who would betray its trust, I warn you, we'll find you and we'll bring you to justice.'' Attorney General John Ashcroft echoed the warning, saying, ``The espionage operations designed to steal vital secrets of the United States are as intense today as they have ever been.'' There's always a risk that an agent with access to top secret information and knowledge of internal security procedures can breach the system, but Freeh said security measures need to be tightened and ordered an internal review, to be headed by former FBI and CIA Director William Webster. ``We don't say, at this stage ... that we have a system that can prevent this type of conduct,'' said Freeh. Hanssen had been spying since 1985, the FBI alleged. It began investigating him at the end of last year, Freeh said. According to the affidavit, Hanssen became an agent of the KGB while he was assigned to the intelligence division of the FBI field office in New York City as supervisor of a foreign counterintelligence squad. The FBI director said agents on Sunday covertly intercepted $50,000 in cash left for Hanssen to pick up. Overall, Freeh said, Hanssen had received more than $650,000 in cash, as well as diamonds, and an additional $800,000 had been set aside for him in an overseas escrow account. ``This was his bread and butter for many, many years,'' said Freeh. Hanssen kept his identity a secret even from the Russians, who did not learn his name or his employer until his arrest, Freeh said. He apparently came under FBI suspicion only late last year. ``The trusted insider betrayed his trust without detection,'' Freeh said. Freeh credited the government for catching Hanssen ``red-handed'' in turning over secret documents but could not explain how an agent was able to work for the Russians undetected for 15 years. Some of Hanssen's contacts have been identified, said Freeh. Hanssen was charged with espionage and conspiracy to commit espionage after an investigation conducted by the FBI, the CIA, the State Department and the Justice Department. Assistant U.S. Attorney Randy Bellows said Hanssen could face the death penalty if convicted and could be fined up to $2.8 million - twice his alleged personal gain from the activities of which he is accused. The FBI agent was charged with passing classified documents to agents for the KGB on March 20, 1989, with the intent of injuring the United States. The charges contended that Hanssen had been spying since October 1985. A hearing was set for March 5. Plato Cacheris, Hanssen's attorney, said he believes federal authorities ``always talk like they have a great case, but we'll see.'' Asked how Hanssen would plead, Cacheris said ``at this point not guilty,'' but he added ``it's very embryonic.'' Cacheris, asked if Hanssen's case was related to that of Ames, replied: ``There's not a connection but there is some relevant material.'' Nancy Cullen, a neighbor, described Hanssen's neighborhood as being in shock with news of the arrest. ``They go to church every Sunday - if that means anything.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2521 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 7:52pm Subject: The FBI spy inspired by Kim Philby The FBI spy inspired by Kim Philby http://www.excite.co.uk/news/story/UKOnlineReportTopNews/IIMFFH54301_2001-02-20_23-30-10_B186379 20/02/01 23:30 By Deborah Zabarenko WASHINGTON (Reuters) - Motivated by an adolescent brush with the story of British double agent Kim Philby, Robert Philip Hanssen allegedly spent much of his FBI career in cloak-and-dagger spying for the Soviet Union and Russia. >From the start, Hanssen was obsessed with security, according to an affidavit supporting federal espionage charges against him. He was arraigned on Tuesday, with a preliminary hearing set for March 5. "My identity and actual position in the community must be left unstated to ensure my security," Hanssen wrote in a note to a Soviet official based in Washington in October 1985. "I must warn of certain risks to my security of which you may not be aware." In that earliest listed contact in the document, Hanssen said Soviet intelligence had "suffered some setbacks," and provided the names of three KGB agents he said had been recruited by the United States, the affidavit said. Two of these agents were later executed. Promising more information in this typed note, which was sent through the U.S. mail, Hanssen asked for $100,000 and set up a coded system to conceal the scheduling of communications: "I will add six (you subtract six) from stated months, days and times in both directions of future communications." Under this system, February 20 would become August 26, and 6 p.m. would become midnight. Later that month, Hanssen allegedly offered signals using white adhesive tape on a signpost near his home in northern Virginia just outside Washington. A horizontal line of tape would mean he was ready to get a KGB package; a vertical piece of tape would mean the drop had occurred; a subsequent horizontal piece of tape would mean the package was received. Such dead drops -- in which the two sides never saw each other -- were the norm during his 15 years working with Soviet and Russian intelligence, the affidavit alleged, and documents said the Russians never knew who their contact was. He initially signed off simply as "B," but later used the aliases "Ramon Garcia," "Jim Baker" and "G. Robertson." He sometimes hinted at changes in his life, such as promotions or travel or family obligations. But he never used his real name. Cash payments of tens of thousands of dollars were sometimes included in the KGB drops, the affidavit said, and while Hanssen found these welcome, he was wary. SUGGESTED PAYMENT IN DIAMONDS "I have little need or utility for more than the 100,000 (dollars)," he allegedly wrote. "It merely provides a difficulty since I cannot spend it, store it or invest it easily without tripping 'drug warning' bells. Perhaps some diamonds as security to my children and some good will so that when the time comes, you will accept my senior services as a guest lecturer. Eventually, I would appreciate an escape plan. Nothing lasts forever." He eventually received $600,000 in cash and diamonds from the Soviets and Russians, the affidavit said; in addition, an escrow account was opened for him in Moscow that eventually was valued at more than $800,000, making his total gain $1.4 million. Under U.S. law, his fine could be double that if convicted; he could also be imprisoned for life or executed. Trained as an accountant, with experience as an investigator in the financial section of the Chicago Police Department, the 56-year-old father of six took his oath of office with the FBI in 1976. But he told his Russian "friends" that he was moved to embark on his course as a double agent as a teenager. "I decided on this course when I was 14 years old," he wrote, according to the affidavit. British turncoat Philby defected to the Soviet Union in 1963 just before being exposed as a spy who had not only damaged Britain but also the United States. "I'd read Philby's book," Hanssen wrote. "Now that is insane, eh! My only hesitations were my security concerns under uncertainty. I hate uncertainty." Using dead drops, Hanssen provided details of defence information, national security information and other matters. What had begun with the homespun signals of tape on signposts, and eventually moved on to such simple signals as different coloured thumbtacks that were visible from slowly moving vehicles also included encrypted computer diskettes. Hanssen, an expert in computer technology, suggested last year that they move on to coded communications through personal digital assistants: "I have a Palm III, which is actually a fairly capable computer. The VII version comes with wireless internet capability built in ... Such a device might even serve for rapid transmittal of substantial material in digital form." His worries about security prompted him to reject any meetings abroad because, according to writings cited in the affidavit, "I must answer too many questions from family, friends and government, plus it is a cardinal sign of a spy." He had disparaging words for the FBI -- "Generally speaking you overestimate the FBI's capacity to interdict you" -- and for the United States in general. "The U.S. can be errantly likened to a powerfully built but retarded child, potentially dangerous, but young, immature and easily manipulated," he wrote, according to the affidavit. "But don't be fooled by that appearance. It is also one which can turn ingenious quickly, like an idiot savant, once convinced of a goal." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From: Robert C. Motzer <1RCM@e...> Date: Thu Feb 17, 2000 9:34am Subject: Re: Digest Number 186 I also would like to reply to the book reports posted in Digest #186. In doing so I will try to avoid any 'defending of his honor' writings like that which I am sure many others on this list who know Glenn Whidden most certainly must be contemplating. Instead I will simply offer my own personal 'book review' of "The Ear" in an attempt to give those on the list who do not know of Glenn and his writings an opposing view to consider. And to Kevin Murray - Amen to all of your comments, you saved me quite a bit of typing! I too own and have read all of the books referenced by the reviewer. With "The Ear" series I think that one needs to keep in mind the original purpose of that particular three volume set of books. As the reviewer himself stated, "...he has the amazing ability to take a moderately complex topic and write it so that anyone can understand it". Therein lies the key to any fair evaluation of "The Ear" series of books themselves - cost and content included. For it is my understanding that this series of books was originally produced to be used within Glenn's TSCM training courses. Those courses are open to both the 'novice' who is 'just starting to learn' TSCM as well as to the 'pro' who is simply seeking to 'broaden or refresh' his already-established knowledge base. The series was then only later also offered as a 'stand alone' venue simply to honor the many requests for it from those who for various reasons could not take Glenn's course in person. Having taken the course myself I will admit to a certain bit of bios here. However, for the sake of objectivity one only needs to take a look at the prices of some other 'course materials' that are able to be obtained without one actually 'taking' the applicable course itself (and admittedly it is rather tough to find very many of these at all within any discipline, let alone TSCM ). When one does so I believe that for the most part it becomes very clear that the price of Glenn's books often pale in comparison. And please keep in mind that with the preceding statement I am talking about real courses that take a considerable amount of hours and effort for one to complete - not one or two day seminars. Several years ago I was fortunate enough to have been afforded some most excellent TSCM training by my employer. But what I had lacked after completing that training was any kind of 'diploma' to show perspective clients as a testament to my bona fides when soliciting business for my 'night job'. And so that is precisely why I took Glenn's course and had to 'buy' the books referenced in the first place. To me having a diploma with Glenn's name on it was well worth the cost of the books that accompanied the course. What I thought that I was going to wind up learning from those books was secondary. However, after I finished the course (and had read all three books from cover to cover more than a few times) I came to realize that I had in fact learned quite a number of things that my employer's training had failed to teach me. But then again I also had freely availed myself of the give and take 'learning experience' that Glenn offers in support of all of his books - whether it be via e-mail, telephone or however else one chooses to correspond with him. And so perhaps along with the other 'book review criteria' that Kevin mentioned we should also add something like 'personal value to the reviewer' to the list. For in the end isn't that really the true measure of the cost vs. return factor for any book one buys? To me personally all of Glenn's books ("The Ear" most especially) were quite reasonable in price when I consider overall what I got out of them. But on the other hand I have purchased several other TSCM-related books, some for as little as $20, that in my opinion were in of themselves extremely 'overpriced'. To each his own. And as for the Taylor, Udovich book: without a doubt it is a very informative, well written, fact-filled, extremely educational, etc., etc. TEXTBOOK / REFERENCE BOOK. And to that end it is exactly the same as most other books in that broad category - whether they be for TSCM 'education' purposes or for a pre-med biology class ..... much higher-priced then one would like and thinks that they should be, but purchased none-the-less at that inflated price simply because of their very nature. So in essence doesn't that make the Taylor, Udovich book absolutely the same as the reviewer has declared Glenn Whidden's "The Ear" series to be. But then again - that's just my opinion ... thanks for considering it. Just another "Bob" 32 From: Eddy Payne Date: Fri Feb 18, 2000 8:10am Subject: INTRODUCTION Hello Gentlemen, Myself (Eddy Payne) and Chris Claypole would like to thank Mr James M Atkinson for allowing us to join the TSCM community. Whilst we appreciate that this community is aimed at TSCM operation in America and we are UK based, we are truly an international company with clients both at home and overseas. Therefore the cross fertilisation of ideas and working practices will I hope, be of benefit to us all. Chris is our Operations Manager and I am our Research and Development Manager. Between us we have over sixty years of experience in military and government departments. Our background has been with Special Forces, special operations, communications and special projects throughout the world. Our Company, Labyrinth International, is still yet in its infancy having only been formed since the beginning of 1999 and whilst our core business is TSCM, our Company ethos is ìTechnical Solutions for Technical Problemsî. Thank you for taking the time to read this, our introduction to the group. Eddy Payne EJPayne@e... Chris Claypole cclaypole@t... 33 From: Dawn Star Date: Fri Feb 18, 2000 5:53pm Subject: switch software manipulation Dear Charles Patterson, I read your breakout box posting, I remember back in 1973 I purchased a MLJ 101 which was a sequencer built in a suitcase, in those days we had to sort out all combinations of the 25 pairs which were then fed to a vector scope . I still have that unit but have not needed to use it in the last ten years. Electronic phone systems are simpler in the sense of less pairs but more dangerous in that the on site switch can be manipulated in software. In many cases you must dump the software and compare it for covert modifications This is no easy task being so many switches and software, but this is a business for the meticulous...unless you are prepared to hear your words on tape " Yes Mr.Gotti we tested your lines and they're clean...no problem" Best, Roger [Non-text portions of this message have been removed] 34 From: Paul de Cogan Date: Sun Feb 20, 2000 1:35pm Subject: Re: INTRODUCTION Dear Edie & Chris, Best of luck and cotiuing sucess to your ventures , From the Minerva (TSCM Team ) Group. Paul de Cogan. >From: "Eddy Payne" >Reply-To: TSCM-L@onelist.com >To: "TSCM-L" >CC: "Tim Graham" >Subject: [TSCM-L] INTRODUCTION >Date: Fri, 18 Feb 2000 14:10:04 -0000 > >Hello Gentlemen, > >Myself (Eddy Payne) and Chris Claypole would like to thank Mr James M >Atkinson for allowing us to join the TSCM community. Whilst we appreciate >that this community is aimed at TSCM operation in America and we are UK >based, we are truly an international company with clients both at home and >overseas. Therefore the cross fertilisation of ideas and working practices >will I hope, be of benefit to us all. Chris is our Operations Manager and >I >am our Research and Development Manager. Between us we have over sixty >years >of experience in military and government departments. Our background has >been with Special Forces, special operations, communications and special >projects throughout the world. > >Our Company, Labyrinth International, is still yet in its infancy having >only been formed since the beginning of 1999 and whilst our core business >is >TSCM, our Company ethos is ìTechnical Solutions for Technical Problemsî. > >Thank you for taking the time to read this, our introduction to the group. > >Eddy Payne EJPayne@e... >Chris Claypole cclaypole@t... > > > > > > > > > ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com 35 From: Charles Patterson Date: Sun Feb 20, 2000 2:42pm Subject: Re: switch software manipulation Another problem with some of the more poorly designed electronic switches is that you can mess 'em up if you short out the wrong pair. In the small office variety, the Intertel GMX will blow it's master fuse if you short an extension pair, a Panasonic analog system can drop all co calls if a data pair is shorted! as you say, a job for the meticulous. charles ----- Original Message ----- From: Dawn Star To: Sent: Friday, February 18, 2000 6:53 PM Subject: [TSCM-L] switch software manipulation > > From: "Dawn Star" > > Dear Charles Patterson, I read your breakout box posting, I remember back in 1973 I purchased a MLJ 101 which was a sequencer built in a suitcase, in those days we had to sort out all combinations of the 25 pairs which were then fed to a vector scope . I still have that unit but have not needed to use it in the last ten years. Electronic phone systems are simpler in the sense of less pairs but more dangerous in that the on site switch can be manipulated in software. In many cases you must dump the software and compare it for covert modifications This is no easy task being so many switches and software, but this is a business for the meticulous...unless you are prepared to hear your words on tape " Yes Mr.Gotti we tested your lines and they're clean...no problem" > Best, Roger > > > [Non-text portions of this message have been removed] > > > ------------------------------------------------------------------------ > Shop the web for great deals. Save on Computers, > electronics, Home furnishings and more. > http://click.egroups.com/1/1559/1/_/_/_/951025472/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 36 From: Jay Coote Date: Fri Feb 4, 2005 3:39pm Subject: Re: switch software manipulation Not that this would ever happen to be, but I know of a fellow who performed a sweep in the corporate offices of a company at "oh-dark-thirty" in the morning. The hapless and tired sweeper blew a fuse in the client's ESU, and I am certain he had that sinking feeling as he realized the time and the unusual type of the fuse. Fortunately, a thoughtful telephone technician left some spares. Jay Coote ---------- > From: "Charles Patterson" > > Another problem with some of the more poorly designed electronic switches is > that you can mess 'em up if you short out the wrong pair. In the small > office variety, the Intertel GMX will blow it's master fuse if you short an > extension pair, a Panasonic analog system can drop all co calls if a data > pair is shorted! > > as you say, a job for the meticulous. > > charles > > > ----- Original Message ----- > From: Dawn Star > To: > Sent: Friday, February 18, 2000 6:53 PM > Subject: [TSCM-L] switch software manipulation > > > > > > From: "Dawn Star" > > > > Dear Charles Patterson, I read your breakout box posting, I remember back > in 1973 I purchased a MLJ 101 which was a sequencer built in a suitcase, in > those days we had to sort out all combinations of the 25 pairs which were > then fed to a vector scope . I still have that unit but have not needed to > use it in the last ten years. Electronic phone systems are simpler in the > sense of less pairs but more dangerous in that the on site switch can be > manipulated in software. In many cases you must dump the software and > compare it for covert modifications This is no easy task being so many > switches and software, but this is a business for the meticulous...unless > you are prepared to hear your words on tape " Yes Mr.Gotti we tested your > lines and they're clean...no problem" > > Best, Roger > > > > > > [Non-text portions of this message have been removed] > > > > > > ------------------------------------------------------------------------ > > Shop the web for great deals. Save on Computers, > > electronics, Home furnishings and more. > > http://click.egroups.com/1/1559/1/_/_/_/951025472/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > ------------------------------------------------------------------------ > You have a voice mail message waiting for you at iHello.com: > http://click.egroups.com/1/1381/1/_/_/_/951080721/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 37 From: Trace Carpenter Date: Mon Feb 21, 2000 0:12pm Subject: Re: switch software manipulation I haven't been in the office much lately, so I haven't followed this tread very closely. Therefore I apologize if this is redundant, however if monitoring the wire pair for audio passage is the problem, you can build a fantastic little interface out of a 1:1 transformer and a non polarized capacitor. Both available at your local RadShk for a couple of bucks. You can even use a three pair RJ surface jack as a project box for the interface. We use them all the time when we're bringing audio from one source to another to keep from getting that nasty hum that you'll often get from dissimilar grounds. In fact we came up with it for use in an East Texas radio station that was having that hum problem with their equipment that they used to put callers on the air. They're cheap, easy and the nice thing is that since the transformer is a 1:1 and the cap is non polarized, there is no wrong way to hook it up and your equipment is totally isolated from the wire pairs. Like I said, I haven't been able to follow this tread lately so if this answer doesn't fit the original question, please accept my apologies. Jay Coote wrote: > From: "Jay Coote" > > Not that this would ever happen to be, but I know of a fellow who performed a > sweep in the corporate offices of a company at "oh-dark-thirty" in the morning. > The hapless and tired sweeper blew a fuse in the client's ESU, and I am > certain he had that sinking feeling as he realized the time and the unusual type > of the fuse. Fortunately, a thoughtful telephone technician left some spares. > > Jay Coote > > ---------- > > From: "Charles Patterson" > > > > Another problem with some of the more poorly designed electronic switches is > > that you can mess 'em up if you short out the wrong pair. In the small > > office variety, the Intertel GMX will blow it's master fuse if you short an > > extension pair, a Panasonic analog system can drop all co calls if a data > > pair is shorted! > > > > as you say, a job for the meticulous. > > > > charles > > > > > > ----- Original Message ----- > > From: Dawn Star > > To: > > Sent: Friday, February 18, 2000 6:53 PM > > Subject: [TSCM-L] switch software manipulation > > > > > > > > > > From: "Dawn Star" > > > > > > Dear Charles Patterson, I read your breakout box posting, I remember back > > in 1973 I purchased a MLJ 101 which was a sequencer built in a suitcase, in > > those days we had to sort out all combinations of the 25 pairs which were > > then fed to a vector scope . I still have that unit but have not needed to > > use it in the last ten years. Electronic phone systems are simpler in the > > sense of less pairs but more dangerous in that the on site switch can be > > manipulated in software. In many cases you must dump the software and > > compare it for covert modifications This is no easy task being so many > > switches and software, but this is a business for the meticulous...unless > > you are prepared to hear your words on tape " Yes Mr.Gotti we tested your > > lines and they're clean...no problem" > > > Best, Roger > > > > > > > > > [Non-text portions of this message have been removed] > > > > > > > > > ------------------------------------------------------------------------ > > > Shop the web for great deals. Save on Computers, > > > electronics, Home furnishings and more. > > > http://click.egroups.com/1/1559/1/_/_/_/951025472/ > > > ------------------------------------------------------------------------ > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > > > > ------------------------------------------------------------------------ > > You have a voice mail message waiting for you at iHello.com: > > http://click.egroups.com/1/1381/1/_/_/_/951080721/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > ------------------------------------------------------------------------ > Get what you deserve with NextCard Visa! ZERO! Rates as low as > 0.0% Intro APR, online balance transfers, Rewards Points, no > hidden fees, and much more! Get NextCard today and get the credit > you deserve! Apply now! Get your NextCard Visa at: > http://click.egroups.com/1/966/1/_/_/_/951152904/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- *Trace Carpenter *2926 Maple Ave., Ste. 200 *Dallas, Texas 75201 *214.828.4520; 214.740-0112 Facsimile *Because the fly on the wall might not be the only bug in the room.ô 38 From: Hoffman Date: Mon Feb 21, 2000 8:48am Subject: Government intruding on security industry; again. Here is a miscellanous piece of information which I picked up while reading this months issue of "Security" magazine [1]. I'm following up on the details and will post more if If I find out anything relevant. (Incidentally, this article just gives me an excuse to discuss something which I've wanted to talk about for a while. I feel it is a gross injustice to free trade in this country. Also, I think the majority has a really lopsided view about so-called privacy in this country.. People have become so accustomed to video camers in this country that we no longer view them as "privacy invasive"; yet somehow people have a problem with audio.) It appears that once again, some individuals within the government are taking it upon themselves to interfere with the free trade of lawful business. This time US DoJ is reported to be conducting investigations of CCTV manufacturers (or more likely resellers, aka "the little guy") who sell units with USC 18, 119 capabilities (aka "Title III"; although I dont know why people keep using that phrase, as it does not seem to apply anymore.) Anyone who knows security products well and follows the industry closely, knows that these CCTV units with audio capability are quite popular, and have become moreso in the last few years. We're not talking "under the table dealings" by some tiny manufacturer in his secret spy laboratory. Major CCTV manufacturers are making these units and have been selling them for what I view as very legitimate security uses. And we're not just talking "intercoms" here. We know what people are using this stuff for. The hypocrisy in this country just reeks in my opinion. We've got a whole lot of really dumb people in my opinion who have absolutely no problem with the fact that virtually no CCTV laws exist (not on the federal level; and even on the state level, such laws are scarce). People seem to have no problem whatsoever with the fact that CCTV can (and has been) installed in bathrooms, dressing rooms, etc.. as long as it is business that is doing the snooping for "legitimate security concerns".. Yet, as soon as we talk audio capability, all of a sudden the nutcases come out of the woodwork and complain about "privacy violations"; gimme a break. Talk about double-standards. Anyway, so we'll just sit back and wait to see who gets arrested. My bet is that as usual; the government will pick the easiest targets; aka "the little guy". The govt won't go after the manufacturers, as they rarely do, such is the case when the govt has bullied little "spy shops", but refuse to go after the manufacturers of audio intercept equipment who are selling this eqpt to the spy shops (and dont tell me that only Japanese companies are making this stuff because thats bullshit. I know virtually every company that makes Title III goods, and only a modest fraction of it is from Japan or Europe.) Right now, the DoJ (who is coordinating US Customs) claim they will only go after manufacturers of equipment who's products clearly violate 2515 (i.e. products where it is clear that the unit is intended to covertly intercept audio... as opposed to cameras that have intercom capabilities. ) [1] Security, page 25, February 2000. http://www.securitymagazine.com - Alan Hoffman 39 From: Steve Uhrig Date: Mon Feb 21, 2000 9:00am Subject: Used surveillance, TSCM, commo equip FS Hello list, We have updated our list of used equipment for sale. http://www.swssec.com/used.html Latest listing of used surveillance, countersurveillance, communication, X-ray, direction finding/tracking, full coverage receivers, a 3D 35mm camera, UV stuff, covert transmitters, super high powered video transmitters, surveillance van stuff. And a high voltage transformer for making really big sparks. http://www.swssec.com/used.html Credit cards accepted. Also looking to buy used equipment similar to above. Please search through your inventory and email me a list of anything related you have to sell. Tks .... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 40 From: Perry Myers Date: Mon Feb 21, 2000 11:16am Subject: RE: switch software manipulation I too have had such embarrassing moments and have scrambled to Radio Shack in an effort to find a fuse replacement. I now warn my clients ahead of time that this is a potential issue and to make sure that if the phone system uses fuses, to have some extras on hand. Even if they don't, they can't say you did not warn them! Perry D. Myers, CFE Myers Service, Inc. Investigations email: perry@d... For information on investigative services visit our web site: www.detectiveservices.com This e-mail is strictly confidential. If you receive this email in error, please forward to info@d.... -----Original Message----- From: Jay Coote [mailto:TSCM@j...] Sent: None To: TSCM-L@onelist.com; TSCM-L@onelist.com Subject: Re: [TSCM-L] switch software manipulation From: "Jay Coote" Not that this would ever happen to be, but I know of a fellow who performed a sweep in the corporate offices of a company at "oh-dark-thirty" in the morning. The hapless and tired sweeper blew a fuse in the client's ESU, and I am certain he had that sinking feeling as he realized the time and the unusual type of the fuse. Fortunately, a thoughtful telephone technician left some spares. Jay Coote ---------- > From: "Charles Patterson" > > Another problem with some of the more poorly designed electronic switches is > that you can mess 'em up if you short out the wrong pair. In the small > office variety, the Intertel GMX will blow it's master fuse if you short an > extension pair, a Panasonic analog system can drop all co calls if a data > pair is shorted! > > as you say, a job for the meticulous. > > charles > > > ----- Original Message ----- > From: Dawn Star > To: > Sent: Friday, February 18, 2000 6:53 PM > Subject: [TSCM-L] switch software manipulation > > > > > > From: "Dawn Star" > > > > Dear Charles Patterson, I read your breakout box posting, I remember back > in 1973 I purchased a MLJ 101 which was a sequencer built in a suitcase, in > those days we had to sort out all combinations of the 25 pairs which were > then fed to a vector scope . I still have that unit but have not needed to > use it in the last ten years. Electronic phone systems are simpler in the > sense of less pairs but more dangerous in that the on site switch can be > manipulated in software. In many cases you must dump the software and > compare it for covert modifications This is no easy task being so many > switches and software, but this is a business for the meticulous...unless > you are prepared to hear your words on tape " Yes Mr.Gotti we tested your > lines and they're clean...no problem" > > Best, Roger > > > > > > [Non-text portions of this message have been removed] > > > > > > ------------------------------------------------------------------------ > > Shop the web for great deals. Save on Computers, > > electronics, Home furnishings and more. > > http://click.egroups.com/1/1559/1/_/_/_/951025472/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > ------------------------------------------------------------------------ > You have a voice mail message waiting for you at iHello.com: > http://click.egroups.com/1/1381/1/_/_/_/951080721/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > ------------------------------------------------------------------------ Get what you deserve with NextCard Visa! ZERO! Rates as low as 0.0% Intro APR, online balance transfers, Rewards Points, no hidden fees, and much more! Get NextCard today and get the credit you deserve! Apply now! Get your NextCard Visa at: http://click.egroups.com/1/966/1/_/_/_/951152904/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 41 From: Dawn Star Date: Mon Feb 21, 2000 0:33pm Subject: renegade taps Back in the eighties I busted some of these taps, http://pd.co.la.ca.us/index.htm what does the TSCM community have to say about these activities. Do the targets have fourth and fifth amendment rights, is every citizen entitled to TSCM services as a matter of right? What say you? Roger [Non-text portions of this message have been removed] 42 From: Rocco Rosano Date: Mon Feb 21, 2000 0:48pm Subject: Re: switch software manipulation Et Al: Jay is correct. The "Isolation Box" has been in use for over 40 years. I have seen several different versions of it; but I believe Jay's description is very accurate. There are a number of ways to "pick-off" information from cable bundles and pairs, depending on the kind of physical access you have and, most importantly, how good your amplifiers are in terms of signal-to-noise and low frequency filtering. In the old days, a Zetron Amp was extremely good, but there where some applications that the Dektor Amp was superior. I, on more than one occasion, used a Dektor and a magnetic probe to detect audio frequencies carrying intelligence classified information to the outside world. No direct connection to the line was necessary. This same technique is not possible with a Zetron, which cost much more, because of a design characteristic. Rocco Rosano Reynoldsburg, Ohio mailto:roccorosano@a... Trace Carpenter wrote: > From: Trace Carpenter > > I haven't been in the office much lately, so I haven't followed this tread very > closely. Therefore I apologize if this is redundant, however if monitoring the wire > pair for audio passage is the problem, you can build a fantastic little interface > out of a 1:1 transformer and a non polarized capacitor. Both available at your > local RadShk for a couple of bucks. You can even use a three pair RJ surface jack > as a project box for the interface. > > We use them all the time when we're bringing audio from one source to another to > keep from getting that nasty hum that you'll often get from dissimilar grounds. In > fact we came up with it for use in an East Texas radio station that was having that > hum problem with their equipment that they used to put callers on the air. They're > cheap, easy and the nice thing is that since the transformer is a 1:1 and the cap is > non polarized, there is no wrong way to hook it up and your equipment is totally > isolated from the wire pairs. > > Like I said, I haven't been able to follow this tread lately so if this answer > doesn't fit the original question, please accept my apologies. > > Jay Coote wrote: > > > From: "Jay Coote" > > > > Not that this would ever happen to be, but I know of a fellow who performed a > > sweep in the corporate offices of a company at "oh-dark-thirty" in the morning. > > The hapless and tired sweeper blew a fuse in the client's ESU, and I am > > certain he had that sinking feeling as he realized the time and the unusual type > > of the fuse. Fortunately, a thoughtful telephone technician left some spares. > > > > Jay Coote > > > > ---------- > > > From: "Charles Patterson" > > > > > > Another problem with some of the more poorly designed electronic switches is > > > that you can mess 'em up if you short out the wrong pair. In the small > > > office variety, the Intertel GMX will blow it's master fuse if you short an > > > extension pair, a Panasonic analog system can drop all co calls if a data > > > pair is shorted! > > > > > > as you say, a job for the meticulous. > > > > > > charles > > > > > > > > > ----- Original Message ----- > > > From: Dawn Star > > > To: > > > Sent: Friday, February 18, 2000 6:53 PM > > > Subject: [TSCM-L] switch software manipulation > > > > > > > > > > > > > > From: "Dawn Star" > > > > > > > > Dear Charles Patterson, I read your breakout box posting, I remember back > > > in 1973 I purchased a MLJ 101 which was a sequencer built in a suitcase, in > > > those days we had to sort out all combinations of the 25 pairs which were > > > then fed to a vector scope . I still have that unit but have not needed to > > > use it in the last ten years. Electronic phone systems are simpler in the > > > sense of less pairs but more dangerous in that the on site switch can be > > > manipulated in software. In many cases you must dump the software and > > > compare it for covert modifications This is no easy task being so many > > > switches and software, but this is a business for the meticulous...unless > > > you are prepared to hear your words on tape " Yes Mr.Gotti we tested your > > > lines and they're clean...no problem" > > > > Best, Roger > > > > > > > > > > > > [Non-text portions of this message have been removed] > > > > > > > > > > > > ------------------------------------------------------------------------ > > > > Shop the web for great deals. Save on Computers, > > > > electronics, Home furnishings and more. > > > > http://click.egroups.com/1/1559/1/_/_/_/951025472/ > > > > ------------------------------------------------------------------------ > > > > > > > > ======================================================== > > > > TSCM-L Technical Security Mailing List > > > > "In a multitude of counselors there is strength" > > > > > > > > To subscribe to the TSCM-L mailing list visit: > > > > http://www.onelist.com/community/TSCM-L > > > > > > > > or email your subscription request to: > > > > subTSCM-L@t... > > > > =================================================== TSKS > > > > > > > > > > > > > ------------------------------------------------------------------------ > > > You have a voice mail message waiting for you at iHello.com: > > > http://click.egroups.com/1/1381/1/_/_/_/951080721/ > > > ------------------------------------------------------------------------ > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > > > > > ------------------------------------------------------------------------ > > Get what you deserve with NextCard Visa! ZERO! Rates as low as > > 0.0% Intro APR, online balance transfers, Rewards Points, no > > hidden fees, and much more! Get NextCard today and get the credit > > you deserve! Apply now! Get your NextCard Visa at: > > http://click.egroups.com/1/966/1/_/_/_/951152904/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > -- > *Trace Carpenter > *2926 Maple Ave., Ste. 200 > *Dallas, Texas 75201 > *214.828.4520; 214.740-0112 Facsimile > *Because the fly on the wall might not be the only bug in the room.ô > > ------------------------------------------------------------------------ > Promote Health & Earn Extra Income! Join the Rainbow Light Affiliate > Program. Sell leading brands of premium nutritionals. Earn 15% > commission + 33% on commissions of those you refer to us. > http://click.egroups.com/1/1634/1/_/_/_/951156738/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 43 From: Robert C. Motzer <1RCM@M...> Date: Mon Feb 21, 2000 5:04am Subject: Re: Digest Number 188 I just thought that I'd offer-up an idea to the breakout box project of Charles and Jay. A few months ago I also built such a box utilizing the Radio Shack 12 position rotary switches (no other reason than they were just simply easier to get). I wired-up the first 8 'clicks' (and labeled them 1-8) to dual 8 pin jacks in parallel so that pair testing can be done on this set-up for both 8 and 6 pin cords. As for the remaining 4 'clicks' - well I simply wired them up to dual standard 4 pin jacks (also paralleled) and labeled them A-D. I use this side when I'm testing POTS basic residential stuff. You'd be surprised how quickly the amount of extra knob turns saved mounts up! Just another 'Bob'. 44 From: Rocco Rosano Date: Mon Feb 21, 2000 7:10pm Subject: Re: renegade taps Dawn Star, Et Al: A security service is just like anything else; a service for hire. All security services are assumed to have some legal basis, that is, they must operate within the law. Just as a criminal element of society is entitled to legal council, so every one is permitted to have security services; to the extent that they can afford those extraordinary services which are over and above that provided to the general public. Privacy issues are probably one of the most unusual set of rights that American law has ever attempted to address. TSCM can be used in the public good, or as a service to defeat public services (law enforcement). As can any other legal oriented service you can imagine. To date, I know of no special ethics applied to the TSCM service programs. TSCM is not nearly as sophisticated and integrated into the social fabric of America as one might think. Rocco Rosano Reynoldsburg, Ohio mailto:roccorosano@a... Dawn Star wrote: > From: "Dawn Star" > > Back in the eighties I busted some of these taps, http://pd.co.la.ca.us/index.htm what does the TSCM community have to say about these activities. Do the targets have fourth and fifth amendment rights, is every citizen entitled to TSCM services as a matter of right? What say you? > > Roger > > [Non-text portions of this message have been removed] > > ------------------------------------------------------------------------ > GET A NEXTCARD VISA, in 30 seconds! Get rates as low as 0.0% > Intro or 9.9% Fixed APR and no hidden fees. Apply NOW! > http://click.egroups.com/1/911/1/_/_/_/951175653/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 45 From: Date: Mon Feb 21, 2000 8:12pm Subject: Re: Mailing List Please remove us from your mailing list. Thnk you W A. 46 From: Date: Mon Feb 21, 2000 8:14pm Subject: Mailing List Please remove us from your mailing list. Thak you, W.A. 47 From: Date: Mon Feb 21, 2000 8:18pm Subject: Mailing List Please remove us from your mailing list. Thank you, W.A. 48 From: Date: Mon Feb 21, 2000 8:20pm Subject: Mailing List Please remove us from your mailing list. Thank you. W.A. 49 From: Date: Mon Feb 21, 2000 8:22pm Subject: Mailing list Please remove us from your mailing list. Tank you, W.A. 50 From: Date: Mon Feb 21, 2000 8:30pm Subject: Mailing LIst Please remove us from your mailing list. Thank you, W.A. 51 From: James M. Atkinson, Comm-Eng Date: Mon Feb 21, 2000 8:48pm Subject: Re: Book Review - Glenn Whidden At 12:09 PM -0500 2/12/00, Hoffman wrote: >From: "Hoffman" > > I like to write amateur book reviews and I thought >that I might share several of my book reviews with >this TSCM-L mailing list. What an outstanding idea, I would encourage your reviews > You see alot of books on countermeasures, and you >wonder if it is worth ponying up large sums of cash for >a book of questionable content. Some of Mr. Whiddens >publications are a perfect example of overpriced books. >In his defense though, I will say that Whidden is >one of the best educational writers I have ever >seen out of the thousands of books in my personal >library. In his publication, "The Ear" (grossly overpriced), >he has the amazing ability to take a moderately complex >topic (to a laymen) and write it so that anyone can >understand it. Anyway.. I'll post some of my reviews >at random within the next week. I have all of Glenns books, and I would like to point out that I feel that they are very fairly price, and very well written. Keep in mind that Glenns books are HIGHLY specialized, and as such he is entitled to sell them at a fair price. Also, I would love to see Glenn publish other titles, and cover more advanced topics. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 52 From: James M. Atkinson, Comm-Eng Date: Mon Feb 21, 2000 9:09pm Subject: Re: Digest Number 188 At 6:04 AM -0500 2/21/00, Robert C. Motzer wrote: >From: "Robert C. Motzer" <1RCM@M...> > > I just thought that I'd offer-up an idea to the breakout box project of >Charles and Jay. A few months ago I also built such a box utilizing the >Radio Shack 12 position rotary switches (no other reason than they were just >simply easier to get). I wired-up the first 8 'clicks' (and labeled them >1-8) to dual 8 pin jacks in parallel so that pair testing can be done on >this set-up for both 8 and 6 pin cords. As for the remaining 4 'clicks' - >well I simply wired them up to dual standard 4 pin jacks (also paralleled) >and labeled them A-D. I use this side when I'm testing POTS basic >residential stuff. You'd be surprised how quickly the amount of extra knob >turns saved mounts up! > >Just another 'Bob'. If I might suggest that you wire that 9th position for an earth ground, and the 10th for electrical ground. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 53 From: Jay Coote Date: Fri Feb 4, 2005 3:39pm Subject: VLF Upconvertor Query Anyone using a VLF upconvertor ahead of their 0.100-2000 MHz receiver, for carrier currents? What model are you using and are you doing anything to protect the U/C, such as a back-to-back diodes on the input....? A U/C will let you receive below the 100-Khz bottom limit of many receivers and it will also help some receivers which have less sensitivity below 1.6 MHz by design. I've been using a Ralph Burhans U/C design from Popular Communications, which appeared in the mid to late 1980's. Originally designed to allow VLF listening in a 4.0-4.5 MHz receiver for hobbyists.... Jay Coote TSCM@j... 54 From: James M. Atkinson, Comm-Eng Date: Mon Feb 21, 2000 9:45pm Subject: Re: Used surveillance, TSCM, commo equip FS At 10:00 AM -0500 2/21/00, Steve Uhrig wrote: >From: "Steve Uhrig" > >Hello list, > >We have updated our list of used equipment for sale. > >http://www.swssec.com/used.html > >Latest listing of used surveillance, countersurveillance, >communication, X-ray, direction finding/tracking, full coverage >receivers, a 3D 35mm camera, UV stuff, covert transmitters, >super high powered video transmitters, surveillance van stuff. > >And a high voltage transformer for making really big sparks. > >http://www.swssec.com/used.html > >Credit cards accepted. Also looking to buy used equipment >similar to above. Please search through your inventory and email >me a list of anything related you have to sell. > >Tks .... Steve I would encourage list members to visit the used equipment page on Steves website. His prices are really good, and he has an excellent reputation for a fair deal. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 55 From: Charles Patterson Date: Mon Feb 21, 2000 10:35pm Subject: Re: VLF Upconvertor Query Jay, what's at the heart of the upconvertor circuit you use? (or better yet, do you still have a schematic around?) I have a Radio Shack portable scanning shortwave radio that has a bottom limit of 150 kHz. It out performed Marty Kaiser's carrier current detector as long as the source had strong harmonics above 150. It also works at detecting the "PhoneJack" carrier current phone extensions, one I tested puts out a signal around 2.3 mHz. I was surprised to find it that high. You could also see it on the spectrum analyzer but it's a little harder to carry around. Charles cp@t... ----- Original Message ----- From: Jay Coote To: Sent: Monday, February 21, 2000 10:35 PM Subject: [TSCM-L] VLF Upconvertor Query > > From: "Jay Coote" > > Anyone using a VLF upconvertor ahead of their 0.100-2000 MHz receiver, > for carrier currents? What model are you using and are you doing anything > to protect the U/C, such as a back-to-back diodes on the input....? > > A U/C will let you receive below the 100-Khz bottom limit of many receivers and > it will also help some receivers which have less sensitivity below 1.6 MHz by design. > > I've been using a Ralph Burhans U/C design from Popular Communications, which appeared in the mid to late 1980's. Originally designed to allow VLF listening in a 4.0-4.5 MHz receiver for hobbyists.... > > Jay Coote > TSCM@j... > > > ------------------------------------------------------------------------ > Get what you deserve with NextCard Visa! ZERO! Rates as low as 0.0% > Intro or 9.9% Fixed APR, online balance transfers, Rewards Points, > no hidden fees, and much more! Get NextCard today and get the credit > you deserve! Apply now! Get your NextCard Visa at: > http://click.egroups.com/1/914/1/_/_/_/951190521/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 56 From: James M. Atkinson, Comm-Eng Date: Mon Feb 21, 2000 11:36pm Subject: Re: VLF Upconvertor Query At 10:38 PM -0500 2/21/00, Jay Coote wrote: >From: "Jay Coote" > >Anyone using a VLF upconvertor ahead of their 0.100-2000 MHz receiver, >for carrier currents? What model are you using and are you doing anything >to protect the U/C, such as a back-to-back diodes on the input....? > >A U/C will let you receive below the 100-Khz bottom limit of many >receivers and >it will also help some receivers which have less sensitivity below 1.6 MHz >by design. > >I've been using a Ralph Burhans U/C design from Popular Communications, >which appeared in the mid to late 1980's. Originally designed to allow >VLF listening in a 4.0-4.5 MHz receiver for hobbyists.... > >Jay Coote >TSCM@j... Two caps in series with incoming fused lines (up to 600 volts), then into a five pole high pass filter (110 dB+ attenuation at 60 Hz), then an MOV, and crossed (field replaceable) diodes. Signal then passed though an optional (external) 32 dB LNA, and run into a switched four port splitter. First port is band passed for audio from 100 Hz up to 15 kHz with a series of fifth order eliptic filters to further kill off 50/60 Hz and 2nd/3rd harmonics. tunable quad channel comb filter, followed by an AGC 0-22 dB circuit. The first port allows audio to be plucked off of a 120, 220, 240, or 600 volt AC circuit (single or dual phase). Recently added dual inputs for a reference signal which can be adjusted for phase and delay. Dumped into either an O'scope and/or Spectrum analyser. This first port may also be used as a simple TSCM audio amplifier. The second port passes 5 kHz to 500 kHz, and has a 15.734/15 kHz switched comb filter, and a dual channel tunable comb filter. Two reference signals from remote magnetic loops may be subtracted from signal under analysis which can be adjust for phase and delay. Signal then boosted by a 0-22 dB AGC circuit and dumped into either an O'scope and/or Spectrum analyser. Third port is RF above 500 kHz to 50 MHz. Six passive bandpass filters may be applied (or bypassed). Dumped directly into SA Fourth port is RF from 50 MHz to 1 GHz (practical to about 450 MHz). Six passive bandpass filters may be applied (or bypassed). Dumped directly into SA Entire contraption is handheld, with an optional external LNA. I currently prefer to use a spectrum analyser instead of a receiver for carrier current analysis, but it's a matter of personal preference. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 57 From: Jordan Ulery Date: Tue Feb 22, 2000 8:18am Subject: Re: renegade taps From reading the releases on this line and those of NCISS, it appears that privacy is the "hot button" issue of the next decade. TSCM may not have to deal directly with the effect of 'you can't do that it violates my privacy' complaints as much as skip tracers and PIs do, but it is a problem. I can only urge each of you to join with the local and regional PI associations and even consider joining NCISS, to keep informed. Also, do not hesitate to write, email or call your federal reps and senators to let them know that in a free society, public actions are public and that is what keeps us free. Legal and ethic behavior will go a long way to defuse the allegations that we are spies and out to get people. We may 'spy' but for legitimate and legal reasons. We are part of the business, legal and insurance communities and as such serve society at may levels. PI Magazine recently ran their annual PI Day with the theme, "Its TIme for the Truth." They are correct, its time the general population knew what we all do, in one field or another. It is either an open society, or a closed society. I, for one, like a free, open and accessible society, even if I must surrender some of my personal rights for the commonweal. Steve says we ponder weak and weary. Weary we may be, but not weak if we all work together, despite our specialty, to prevent the trampling of individual rights under the banner of 'privacy.' In the world of privacy the only thing with any rights is the government and that is wrong. Just an opinion, thank you for your consideration. Rocco Rosano wrote: > From: Rocco Rosano > > Dawn Star, Et Al: > > A security service is just like anything else; a service for hire. All security services > are assumed to have some legal basis, that is, they must operate within the law. > Just as a criminal element of society is entitled to legal council, so every one is > permitted to have security services; to the extent that they can afford those > extraordinary services which are over and above that provided to the general public. > > Privacy issues are probably one of the most unusual set of rights that American law > has ever attempted to address. TSCM can be used in the public good, or as a > service to defeat public services (law enforcement). As can any other legal oriented > service you can imagine. > > To date, I know of no special ethics applied to the TSCM service programs. > TSCM is not nearly as sophisticated and integrated into the social fabric of America > as one might think. > > Rocco Rosano > Reynoldsburg, Ohio > mailto:roccorosano@a... > > Dawn Star wrote: > > > From: "Dawn Star" > > > > Back in the eighties I busted some of these taps, http://pd.co.la.ca.us/index.htm what does the TSCM community have to say about these activities. Do the targets have fourth and fifth amendment rights, is every citizen entitled to TSCM services as a matter of right? What say you? > > > > Roger > > > > [Non-text portions of this message have been removed] > > > > ------------------------------------------------------------------------ > > GET A NEXTCARD VISA, in 30 seconds! Get rates as low as 0.0% > > Intro or 9.9% Fixed APR and no hidden fees. Apply NOW! > > http://click.egroups.com/1/911/1/_/_/_/951175653/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > ------------------------------------------------------------------------ > GET A NEXTCARD VISA, in 30 seconds! Get rates > as low as 0.0% Intro APR and no hidden fees. > Apply NOW! > http://click.egroups.com/1/967/1/_/_/_/951182691/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS [Non-text portions of this message have been removed] 58 From: MICROSEARCH Date: Tue Feb 22, 2000 9:06am Subject: Re: VLF Upconvertor Query Jay, I tried a VLF converter from Palomar Engineering. They always have ads in QST magazine, but I will look up the information for you if you want me to. I've used the converter with my Avcom spec analyzer, and it works very well. I prefer to use a Kaiser SCD5 because of the size and weight considerations. Glenn Whidden also make a carrier current receiver which is supposed to be outstanding. I may purchase one this year. Best regards, Rick Hofmann, CCO, CPP PI16998 MICROSEARCH - Technical Surveillance Countermeasures - Counterespionage P.O.Box 2084 - Cypress, Ca. 90630 714-952-3812 Fax:714-209-0037 ----- Original Message ----- From: Jay Coote To: Sent: February 21, 2000 9:35 PM Subject: [TSCM-L] VLF Upconvertor Query > From: "Jay Coote" > > Anyone using a VLF upconvertor ahead of their 0.100-2000 MHz receiver, > for carrier currents? What model are you using and are you doing anything > to protect the U/C, such as a back-to-back diodes on the input....? > > A U/C will let you receive below the 100-Khz bottom limit of many receivers and > it will also help some receivers which have less sensitivity below 1.6 MHz by design. > > I've been using a Ralph Burhans U/C design from Popular Communications, which appeared in the mid to late 1980's. Originally designed to allow VLF listening in a 4.0-4.5 MHz receiver for hobbyists.... > > Jay Coote > TSCM@j... > > > ------------------------------------------------------------------------ > Get what you deserve with NextCard Visa! ZERO! Rates as low as 0.0% > Intro or 9.9% Fixed APR, online balance transfers, Rewards Points, > no hidden fees, and much more! Get NextCard today and get the credit > you deserve! Apply now! Get your NextCard Visa at: > http://click.egroups.com/1/914/1/_/_/_/951190521/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 59 From: Dawn Star Date: Tue Feb 22, 2000 11:25am Subject: fuses The problem is not so much fuses but input cards shut down in some switches for the slightest voltage changes and many require software reset to bring them back up. Roger Jay Coote wrote: > From: "Jay Coote" > > Not that this would ever happen to be, but I know of a fellow who performed a > sweep in the corporate offices of a company at "oh-dark-thirty" in the morning. > The hapless and tired sweeper blew a fuse in the client's ESU, and I am > certain he had that sinking feeling as he realized the time and the unusual type > of the fuse. Fortunately, a thoughtful telephone technician left some spares. > > Jay Coote > > ---------- > > From: "Charles Patterson" > > > > Another problem with some of the more poorly designed electronic switches is > > that you can mess 'em up if you short out the wrong pair. In the small > > office variety, the Intertel GMX will blow it's master fuse if you short an > > extension pair, a Panasonic analog system can drop all co calls if a data > > pair is shorted! > > > > as you say, a job for the meticulous. > > > > charles [Non-text portions of this message have been removed] 60 From: Jay Coote Date: Fri Feb 4, 2005 3:39pm Subject: Re: VLF Upconvertor Query Charles & the List; Hope I still have my schematics and notes! The VLF UC was in Popular Communications in the mid- or late 1980's; by Ralph Burhans. It used an FET and IC with 4 MHz IF... (I think).... I'll have to find the specifics. Jay Coote TSCM@j... ---------- > From: "Charles Patterson" > > Jay, > > what's at the heart of the upconvertor circuit you use? (or better yet, do > you still have a schematic around?) > > I have a Radio Shack portable scanning shortwave radio that has a bottom > limit of 150 kHz. It out performed Marty Kaiser's carrier current detector > as long as the source had strong harmonics above 150. It also works at > detecting the "PhoneJack" carrier current phone extensions, one I tested > puts out a signal around 2.3 mHz. I was surprised to find it that high. > You could also see it on the spectrum analyzer but it's a little harder to > carry around. > > Charles > > cp@t... > > ----- Original Message ----- > From: Jay Coote > To: > Sent: Monday, February 21, 2000 10:35 PM > Subject: [TSCM-L] VLF Upconvertor Query > > > > > > From: "Jay Coote" > > > > Anyone using a VLF upconvertor ahead of their 0.100-2000 MHz receiver, > > for carrier currents? What model are you using and are you doing anything > > to protect the U/C, such as a back-to-back diodes on the input....? > > > > A U/C will let you receive below the 100-Khz bottom limit of many > receivers and > > it will also help some receivers which have less sensitivity below 1.6 MHz > by design. > > > > I've been using a Ralph Burhans U/C design from Popular Communications, > which appeared in the mid to late 1980's. Originally designed to allow VLF > listening in a 4.0-4.5 MHz receiver for hobbyists.... > > > > Jay Coote > > TSCM@j... > > > > > > ------------------------------------------------------------------------ > > Get what you deserve with NextCard Visa! ZERO! Rates as low as 0.0% > > Intro or 9.9% Fixed APR, online balance transfers, Rewards Points, > > no hidden fees, and much more! Get NextCard today and get the credit > > you deserve! Apply now! Get your NextCard Visa at: > > http://click.egroups.com/1/914/1/_/_/_/951190521/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > ------------------------------------------------------------------------ > Get what you deserve with NextCard Visa! Rates as low as 2.9% > Intro or 9.9% Fixed APR, online balance transfers, Rewards Points, > no hidden fees, and much more! Get NextCard today and get the > credit you deserve! Apply now! Get your NextCard Visa at: > http://click.egroups.com/1/913/1/_/_/_/951192478/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > From: Date: Tue Feb 19, 2002 9:14am Subject: Re: ISDN Polytel System Hi Robert, Interesting question. Let me start with a big disclaimer. I am familiar with Polycom and PictureTel video teleconferencing equipment, but have not heard of PolyTel. Also, I was not able to understand what you meant here... > The original patch from the vertical system to the horizontal cabling was intact with the secondary loops punched over top of the original patch, (not allowed on a BIX setup). > Given all that, and the fact that 3-ISDN line systems are similar, here is a guess... Ask the client if this is a new installation, or if they have upgraded from an older system. Here's why... Older systems had their ISDN terminal adapters (TA) separate from the video teleconferencing equipment. The TAs were usually stored in the telephone closets. In the latest generation of teleconferencing equipment TAs are incorporated into the equipment. What you came across might be remnants of a previous generation hook-up. If the client never had a previous system, we're back to square one. Please let me know what you find out. Thank you, Kevin -- Kevin D. Murray - CPP, CFE, BCFE [Murray Associates] Counterespionage Consultants to Business & Government Eavesdropping Detection Specialists www.spybusters.com Robert Dyk wrote: > While out this evening I discovered a bridge tap set up on a PolyTel video > conferencing system. The bridge was built out in a telephone closet from > the 3 ISDN lines that were connected to the video conferencing system. The > bridges were terminated on a BIX RJ11 adapter block with three phone cords > (one per line) still connected. No other hardware was present. The > original patch from the vertical system to the horizontal cabling was intact > with the secondary loops punched over top of the original patch, (not > allowed on a BIX setup). I can only think of illegitimate reasons to do > this. Is anyone on the list familiar with the Polytel and or what is > required to compromise the video conference on this triple bonded ISDN > setup. > > Thanks in advance for any input. > > Robert Dyk > dyk@c... 4834 From: Hawkspirit Date: Tue Feb 19, 2002 10:28am Subject: win what where What is the best procedure to locate this software in a suspect computer? Roger http://www.winwhatwhere.com/w3i4/index.htm New Software Alarms Privacy Advocates Posted - February 17, 2002 7:08pm www.katv.com Seattle, Wash. (AP) - Right now, your boss, your spouse or the government could secretly be reading all your typed words - even the ones you deleted - while surreptitiously snapping your picture. Sound alarming? The man who makes it possible is the first to agree. "It's horrifying!" said Richard Eaton, who develops, markets and even answers the technical help line for WinWhatWhere Corp. software. "I'm Mr. Guard-My-Privacy, so it's kind of ironic," said Eaton, a lanky 48-year-old with a diamond stud earring. "Every time I add a feature into it, usually it's something that I've fought for a long time." His qualms haven't stopped him from selling the product, though - more than 200,000 copies of it, to everyone from suspicious spouses to the FBI. And Eaton is building ever-more-detailed monitoring tricks into his Investigator software. The latest version, released this month, can snap pictures from a WebCam, save screen shots and read keystrokes in multiple languages. Investigator already can read every e-mail, instant message and document you send and receive, even if you delete - or never even saved - what you typed. The $99 downloadable program runs "hidden in plain sight." It changes names every so often, and files containing the information it gathers are given arbitrary old dates to make them difficult to find. The monitor can choose to have a user's every move sent to an e-mail address, or the program can be instructed to look for keywords like "boss," "pornography" or "terrorist" and only send records when it finds those prompts. Software like Investigator was virtually unknown two years ago. Now it's become a lucrative niche market, attracting plenty of competitors and at least one product that aims to track down the snooping software itself. Federal investigators in Seattle used Investigator to snag suspected Russian computer hackers, one of whom was recently convicted on 20 counts including conspiracy, various computer crimes and fraud. Another, similar product was used in the FBI's investigation of alleged mobster Nicodemo Scarfo Jr. A Maywood, N.J., security firm called Corporate Defense Strategies used Investigator at an import/export firm to snare two employees who were selling company merchandise and pocketing the cash. CDS President Jeff Prusan has since used it to help clients catch employees who send out resumes, download pornography or spend their shifts playing games. "It's unfortunate that it has come to this, but I've always believed that it's better to know what's going on than not," Prusan said. Miki Compson, a computer consultant and mother of four in Severn, Md., used Investigator to track computer correspondence from a suspicious person who she said ended up stalking her daughter. She's recommended it to other parents whose kids were corresponding with adults and defends the practice as a safety measure. Eaton says he wouldn't likely use it on his own two children - "I'd talk to them!" - but he also doesn't feel comfortable telling people what to do with his invention. And although he hates to hear tales of deception in the fast-growing market of spouse tracking online, he wouldn't tell people not to do it. "I'm selling a hammer," he said. "They can beat nails with it, or their dog." If someone calls with proof the software is being used nefariously, Eaton said he'll show the person how to remove it. Ari Schwartz, associate director for the Center for Democracy and Technology, said there are legitimate uses for the product, such as catching employees engaging in fraud or child pornography. But Schwartz recommends that employers inform their staffs if monitoring for certain activities is occurring. He also urges spouses and parents to think about the repercussions before using such software at home. "If your relationship is at the point where you feel that you need to spy on your spouse, is this the best way to repair your relationship or perhaps (should) you be going to therapy?" he said. In most cases, Schwartz said, snooping software is not illegal. But "we think morally there are some very large issues with (employers) tracking the personal habits of their employees." A self-taught programmer who says he barely graduated from high school, Eaton stumbled on the idea for Investigator when he wrote a tracker program to help him find and repair software bugs. He started selling it as a snooper product around 1997. Eaton still runs the company much like he did five years ago - from his home in the eastern Washington town of Kennewick. His wife handles the bookkeeping while he burns the CDs, answers the help line and runs the Web site. Occasionally, Eaton also checks his own Investigator logs - and is always disturbed by the amount of time he spends online. "When I look at my logs during the day, I think I need to fire myself," he said. 4835 From: David Alexander Date: Tue Feb 19, 2002 10:48am Subject: re: British marines 'invade' Spain >"There is much embarrassment, the error is regretted and lessons have been >learned. They were informed of their error by local policemen and spent >only about five minutes on the beach." > >He added: "We were not trying to take Spain and have no plans to do so." 1. Disclaimer: That's not to say we couldn't if we wanted to 2. Have you any idea how much beer that will cost those marines ? ______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4836 From: Steve Uhrig Date: Tue Feb 19, 2002 10:32am Subject: Re: win what where Once upon a midnight dreary, Hawkspirit pondered, weak and weary: > What is the best procedure to locate this software in a suspect computer? > New Software Alarms Privacy Advocates Ad-Aware works extremely well according to reports, and I use it personally. Shareware too. www.lavasoftusa.com. I mentioned this on another list, and about fifteen (of the 600+/-) members found something on their machines. John Dvorak reviewed it in PC Magazine last month, and HE found 26 hidden nasty programs on his machine using Ad-Aware AFTER he had tried several commercially available packages he had purchased for review. It WILL detect keystroke loggers. The thing also is like a virus detection package in that the authors update it regularly as new threats are discovered. And it is shareware, so free to try. NOT free to use indefinitely. Highly recommended. And don't forget something like Zone Alarm firewall if you have DSL, cable modem or otherwise always connected. Even dial up users need a firewall. If you use ICS you need the paid professional version, otherwise the free Zone Alarm is OK. Any search engine, and practically zero learning curve. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4837 From: James M. Atkinson Date: Tue Feb 19, 2002 11:28am Subject: Re: win what where Simple, Perform an audit to identify all processes running (or potentially running) on the machine, Then run Norton Disk Doctor to find (but not repair) file fragments, Then screen the system software for any kind of executable code that can not be accounted for. You can also use a number of freeware packages that target and ferret out the executables, and in some cases good virus detection software will flag it as a Trojan. If you are on your toes you can simply look for the cache file that this software creates and just search for the invisible or hidden files by name. The only wrinkle is that the mere possession of this software is a federal felony as the Justice Department considers it a violation of Title 18. It would not at all surprise me to hear (after a few months) that DOJ rolled up a few hundred PI's who used the SW in a nation wide sting operation. [cough-cough] -jma At 8:28 AM -0800 2/19/02, Hawkspirit wrote: >What is the best procedure to locate this software in a suspect >computer? Roger > >http://www.winwhatwhere.com/w3i4/index.htm > >New Software Alarms Privacy Advocates >Posted - February 17, 2002 7:08pm >www.katv.com > >Seattle, Wash. (AP) - Right now, your boss, your spouse or the government >could secretly be reading all your typed words - even the ones you deleted >- while surreptitiously snapping your picture. > >Sound alarming? The man who makes it possible is the first to agree. > >"It's horrifying!" said Richard Eaton, who develops, markets and even >answers the technical help line for WinWhatWhere Corp. software. > >"I'm Mr. Guard-My-Privacy, so it's kind of ironic," said Eaton, a lanky >48-year-old with a diamond stud earring. "Every time I add a feature into >it, usually it's something that I've fought for a long time." > >His qualms haven't stopped him from selling the product, though - more than >200,000 copies of it, to everyone from suspicious spouses to the FBI. > >And Eaton is building ever-more-detailed monitoring tricks into his >Investigator software. The latest version, released this month, can snap >pictures from a WebCam, save screen shots and read keystrokes in multiple >languages. > >Investigator already can read every e-mail, instant message and document >you send and receive, even if you delete - or never even saved - what you >typed. > >The $99 downloadable program runs "hidden in plain sight." It changes names >every so often, and files containing the information it gathers are given >arbitrary old dates to make them difficult to find. > >The monitor can choose to have a user's every move sent to an e-mail >address, or the program can be instructed to look for keywords like "boss," >"pornography" or "terrorist" and only send records when it finds those >prompts. > >Software like Investigator was virtually unknown two years ago. Now it's >become a lucrative niche market, attracting plenty of competitors and at >least one product that aims to track down the snooping software itself. > >Federal investigators in Seattle used Investigator to snag suspected >Russian computer hackers, one of whom was recently convicted on 20 counts >including conspiracy, various computer crimes and fraud. > >Another, similar product was used in the FBI's investigation of alleged >mobster Nicodemo Scarfo Jr. > >A Maywood, N.J., security firm called Corporate Defense Strategies used >Investigator at an import/export firm to snare two employees who were >selling company merchandise and pocketing the cash. > >CDS President Jeff Prusan has since used it to help clients catch employees >who send out resumes, download pornography or spend their shifts playing >games. > >"It's unfortunate that it has come to this, but I've always believed that >it's better to know what's going on than not," Prusan said. > >Miki Compson, a computer consultant and mother of four in Severn, Md., used >Investigator to track computer correspondence from a suspicious person who >she said ended up stalking her daughter. > >She's recommended it to other parents whose kids were corresponding with >adults and defends the practice as a safety measure. > >Eaton says he wouldn't likely use it on his own two children - "I'd talk to >them!" - but he also doesn't feel comfortable telling people what to do >with his invention. > >And although he hates to hear tales of deception in the fast-growing market >of spouse tracking online, he wouldn't tell people not to do it. > >"I'm selling a hammer," he said. "They can beat nails with it, or their dog." > >If someone calls with proof the software is being used nefariously, Eaton >said he'll show the person how to remove it. > >Ari Schwartz, associate director for the Center for Democracy and >Technology, said there are legitimate uses for the product, such as >catching employees engaging in fraud or child pornography. > >But Schwartz recommends that employers inform their staffs if monitoring >for certain activities is occurring. He also urges spouses and parents to >think about the repercussions before using such software at home. > >"If your relationship is at the point where you feel that you need to spy >on your spouse, is this the best way to repair your relationship or perhaps >(should) you be going to therapy?" he said. > >In most cases, Schwartz said, snooping software is not illegal. But "we >think morally there are some very large issues with (employers) tracking >the personal habits of their employees." > >A self-taught programmer who says he barely graduated from high school, >Eaton stumbled on the idea for Investigator when he wrote a tracker program >to help him find and repair software bugs. > >He started selling it as a snooper product around 1997. > >Eaton still runs the company much like he did five years ago - from his >home in the eastern Washington town of Kennewick. His wife handles the >bookkeeping while he burns the CDs, answers the help line and runs the Web >site. > >Occasionally, Eaton also checks his own Investigator logs - and is always >disturbed by the amount of time he spends online. > >"When I look at my logs during the day, I think I need to fire myself," he >said. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4838 From: A.Lizard Date: Tue Feb 19, 2002 0:25pm Subject: Wisconsin bugs to become protected species? Paging Aimee. . . what does this proposed law *really* mean? A.Lizard Date: Mon, 18 Feb 2002 16:03:16 -0600 From: Ben Masel Subject: (Wisconsin) AB 435 Tampering with a security device or surveillance device and providing penalties Assembly Criminal Justice Commitee hearing Wed 1 PM Room 417 N State Capitol Analysis from Legislative Reference Bureau "Current law provides various penalties for damaging or misappropriating the property of another. This bill prohibits a person from tampering with a security device or surveillance device that is owned by another by disconnecting, altering, dismantling, damaging, covering up, removing, or destroying the device without the consent of the owner and with the intent either to cause the device to become inoperative or to interfere with or circumvent the operation of the device. A person who violates the prohibition created in the bill may be fined not more than $500 or imprisoned for not more than 30 days or both, except that a person may be fined not more than $10,000 or imprisoned for not more than five years or both if the person violates the prohibition with the intent to make it less likely that another felony will be detected or that a person who commits another felony will be identified with the felony. The bill also provides that a person charged with violating the prohibition created in the bill has a defense to the charge if he or she tampered with a surveillance device that is installed or used with the intent to observe any nude or partially nude person without the consent of the person observed." _____________________________________ Full text: http://folio.legis.state.wi.us/cgi-bin/om_isapi.dll?clientID=88503&infobase=billhist.nfo&j1=AB435&jump=AB435 So it would seem there is no Defence if the surveillance device is installed for any other illegal purpose. Are these guys as dumb as they look? Criminal Justice Committee members: Representatives Suder, chairperson, Gundrum, vice chairperson, Bies, J. Fitzgerald, Jeskewitz, F. Lasee, Loeffelholz, Owens, Staskunas, Wood, Young, ColÛn, Sherman, and Boyle. ________________________________________ ben I am not currently Licensed to Practice in this State. ________________________________________ X-Sender: declan@m... X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Tue, 19 Feb 2002 10:13:45 -0500 To: politech@p... From: Declan McCullagh Subject: FC: John Gilmore and others on Wisconsin's proposed pro-spycam law Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Sender: owner-politech@p... Precedence: bulk Reply-To: declan@w... X-URL: Politech is at http://www.politechbot.com/ X-Author: Declan McCullagh is at http://www.mccullagh.org/ X-News-Site: Cluebot is at http://www.cluebot.com/ Status: Previous Politech message: "Wisconsin may ban disabling spycams -- except for hidden sexcams" http://www.politechbot.com/p-03154.html --- To: mann@e..., declan@w..., gnu@t... Subject: FC: Wisconsin may ban disabling spycams Date: Tue, 19 Feb 2002 01:48:02 -0800 From: John Gilmore Why do they want to pass the new law? Because current law only makes it a crime to *damage* or *misappropriate* a camera. If you merely put a piece of cardboard in front of it, or some duct tape over it, or unplug it, that isn't a crime today. But tomorrow it could get you five years in prison. SHEEP, WAKE UP! The police state is coming; it's already here if you act like the cops have all the rights and you have none. Like all of you people being herded into the pens at all the airports, with nary a bleat. The only real security is in the grave -- and the totalitarian control that the Bush team is hastily assembling, while you are silent, will assist your entry into that blissful state. The only useful part about this proposed law is that it should protect citizens who are using cameras to record the illegal activities of law enforcement officials. Any cop who seizes, breaks, or disables a protester's camera would go to prison for five years -- assuming that any DA would indict any cop for everyday activities, which is a hollow fantasy 99.9% of the time. If you publish this, the cops will make sure to write an exception into the law for themselves anyway. Note that the "intent" of the camera is what matters; if they put it into a bathroom "for security" then disabling it is a crime, while if they put it into a bathroom "to ogle you" then disabling it is legal (after they arrest you and try you for it). The 9/11 attack has certainly brought out all the scum of the earth, with their "put US in control of YOU" schemes to improve the world. you would think that while fighting against the Taliban's tight control of its populace, we wouldn't be imposing similar controls on our own population. But the irony seems to be lost on the sheeple. John --- Date: Tue, 19 Feb 2002 03:08:18 -0800 To: declan@w..., Ben Masel From: Bill Stewart Subject: Re: FC: Wisconsin may ban disabling spycams and audio bugs -- except for hidden sexcams Cc: politech@p... Declan - the best reason for a new law here is to not only ban *damaging* spycams, audio bugs, location trackers, etc., which they say is already banned, but to also ban *disabling* them or otherwise tampering with legitimately installed surveillance devices, and also to create a large penalty for disabling them with intent to not evade being identified or caught when committing future felonies. But it has more serious problems than that. Ben - We know you're a man with nothing to hide [...quasi-insider reference:-)...] I'm also not a lawyer, but I have played a politician on TV. The proposed law is written in classic "Amend State Code section 324-21384 by adding the following words after paragraph 3" style, and the web links don't make it easy to follow, but a couple of things jump out: 1 - The language is overbroad (though the law isn't as broad as the summary.) It not only covers physical devices (the clear intent), but also software, e.g. surveillance applications on computers, whether installed by the user, another owner, malware such as viruses, and possibly even the FBI keyloggers recently used against the Mafia. And it appears to change the balance of laws restricting and supporting use of surveillance cameras and audio surveillance, with very little examination of the impacts, beyond the obvious exemption for disabling voyeur cameras. 2 - It may be worth looking up s. 942.08 (2), to see if that's just an anti-peeping-tom law (the legislative analysis about looking at nude people), or if it's about something more general like use of surveillance cameras. And just because that's the only exemption to the proposed law referenced in the legislative analysis, that doesn't mean it's your only defense - it means that's a nearly-guaranteed defense, but otherwise you may need to argue a case in court, with whatever legal representation you can afford, to convince a judge or jury that your action was reasonable, and you may be unsuccessful. 3 - The proposal doesn't say *anything* about the owner of the property where the camera or audio or other bug is *located* - just the owner of the bug. The probable goal of the law is to cover spycams and bugs that people plant on their own property or in businesses for which they work (e.g. low-level manager planting spycams to look at his underlings), but that's not the only case. *** If somebody plants a spycam or audio bug in *your* house or car, this bill appears to forbid you to disable it because you don't own it. That probably wasn't the intent of the law, but it's the effect, even though it's clearly unreasonable. That includes bugs planted by criminals other than peeping toms, such as burglars who want to know when you're not home, wiretaps on your phones, whether planted by criminals, police with warrants, police operating illegally without warrants, obsessive ex- boyfriends, or detectives hired by your suspicious not-yet-ex-spouse (if the bug belongs to the detective, not the spouse), peeping toms who only want to *listen* to you have sex (because they can see in your back window without a camera), nosy neighbors, your kids' friends, stalkers, and so on. 4 - There are a whole variety of workplace environment issues that this law impinges on that may be affected by other law, but which this proposed law doesn't address or coordinate with. For instance, an employer trying to prevent employee theft usually has a legitimate reason to install spycams at work, as well as obvious cameras to deter non-employee robbers and burglars, but there may be federal or state regulations limiting an employer's right to use spycams or audio bugs for other reasons, and installation of spycams and audio bugs by low-level managers without the authorization from the business's owner or corporate officers may have legal restrictions. In unionized businesses, there are almost certainly union contract issues, and even non-union businesses can be covered by specific workplace privacy laws and expectations of privacy. This proposed law ignores all of thee issues. 5 - Employer/employee privacy issues extend beyond the workplace, and some employers have in the past attempted to control or discover employee behavior outside their offices. While standard surveillance cameras aren't usually relevant, and traditional audio bugs aren't often used in employees' cars or briefcases, the cost and size have reduced substantially as technology has advanced, and for employees who carry laptops home or use desktop home computers to work from home, audio surveillance is just another software application, like a word processor or voice dictation software. If your employer installs bugging software on your laptop, it appears that this law forbids you to uninstall it or even to turn off the microphone when you're not at the office. And many new laptops come with video cameras built in. Video cameras on computers are becoming common and cheap - a $29 camera is good enough for simple videoconferences, so businesses are often buying them for office use, instead of or in addition to better cameras that cost thousands of dollars, and employees who work from home often have them for personal use as well as occasional work use. Just as microphones on laptops can be audio bugs, depending on software, a camera on a PC can be a surveillance camera depending on who turns it on. If you shut down your computer at night, is that a misdemeanor? *** 6 - This proposed law also forbids disabling bugs or spycams when you don't know who the owner is. This is especially an issue for bugs and cameras discovered at the workplace - obviously the camera mounted on the wall is official, but was the camera in the light fixture or the audio wiretap software you found on your PC put there by your competitor trying to steal your next chip design, or by an email virus that said it would play a fun game, like that animated Christmas tree that said it was from Melissa, or was your employer trying to find who's leaking the chip design to your competitor? You could ask your boss, and maybe he'd tell you, but maybe the marketing department installed it because they don't trust your boss either. Are you allowed to remove it? How can you tell if that would be illegal? 7 - The proposed law also doesn't include exemptions for government offices - including police stations as well as defense contractors or universities working on sensitive material. While authors such as David Brin ("The Transparent Society") make strong arguments about the need for government activities to be carried out in public to prevent abuses, there are balances that need to be made between an arrestee's need for privacy when talking to his lawyer in a police station and the Internal Affairs department spying on potentially bad cops. 8 - This proposed law doesn't address locations such as hotels or other places that have a strong expectation of privacy. A security camera in a hotel or bank lobby to deter theft isn't a problem - but a camera in the ceiling of a hotel room is, and even though a reasonable person would expect that such a camera was installed by a voyeur and subject to the law's exemptions, it's not clear that it's legal to cover it up without proof. In most cases, someone who covered up such a camera wouldn't be charged, but if police are investigating potential prostitution at a hotel, someone who covered up a camera might be charged with violating this proposed law even though such actions were perfectly reasonable. The proposed law may seem reasonable on its face, but it needs a lot of work before it's something that's ready for a legislature to adopt. Bill Stewart, San Francisco, CA. --- Date: Tue, 19 Feb 2002 07:44:56 -0500 To: declan@w... From: "J.D. Abolins" Subject: Re: FC: Wisconsin may ban disabling spycams -- except for hidden sexcams Cc: grayson Barber At 10:52 PM 2/18/02 -0500, you wrote: > [Of course if "current law" really does provide > "various penalties for damaging or misappropriating" > someone else's property, why -- except to pad the > resumes of legislators -- do we need *new* laws? > --Declan] Ah, there are people who'll say we need to send the message that surveillance is paramount to security and the new law is needed to get the message out. I'll have to look at the exact text of the law but I already see a big problem with its wording. >"Current law provides various penalties for damaging or misappropriating > the property of another. This bill prohibits a person from tampering > with a security device or surveillance device that is owned by another > by disconnecting, altering, dismantling, damaging, covering up, > removing, or destroying the device without the consent of the owner and > with the intent either to cause the device to become inoperative or to > interfere with or circumvent the operation of the device. "...interfere with or circumvent the operation of the device." leaves a wide opening for surprising results. At first glance, it could look like the interference/circumvention only entails direct action to the spycam and its supporting systems. But if the "operation" of the device is interpreted to mean the successful capture of the intended "imagescape" then indirect acts could be covered. If, for example, a person wears a mask, puts up a blocking screen, or --if the spycam looks into your home-- closing the curtains. it would interfere/circumvent the operation of the spycam in this interpretation. (Somewhere in between would be the "blinding of some types of cameras by shining bright lights at it. Shine that MAG Light at a spycam, get fined or go to jail.) Sounds far fetched that any court or government body would hold such an interpretation? Several year ago, the Wall Street Journal gave an example of interference/circumvention interpretations in regards to the Endangered Species Act. An inventor developed a coyote repellent sheep dip. Looked like a great help for ranchers and, by lessening an incentive for wiping out the beasties, for the coyotes. The USEPA determined that the coyote repellent violated the ESA. How? It interferes with predatory behavior of animals. One of the interesting things in the exclusions for the spycam protection law is an apparent lack of consideration for the scope of view of the camera. The assumptions seems to be that the cams view the premises associated with the spycam's use. But some cams can view more than those premises. A parking lot cam might pick up other properties. If the spycam's owners have property protection for the cam, the other property owners have the option of circumventing the gaze of the spycam into their properties. (This could be interesting if the law results in the abrogation of other property owners rights in the name of protecting surveillence as a principle.) J.D. Abolins (not an attorney) --- ------------------------------------------------------------------------- POLITECH -- Declan McCullagh's politics and technology mailing list You may redistribute this message freely if you include this notice. Declan McCullagh's photographs are at http://www.mccullagh.org/ To subscribe to Politech: http://www.politechbot.com/info/subscribe.html This message is archived at http://www.politechbot.com/ ------------------------------------------------------------------------- ************************************************************************ new voicemail number,ask if you need it. Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 4839 From: Michael Puchol Date: Tue Feb 19, 2002 2:40pm Subject: Re: win what where The answers already given are quite correct - if you want to go a bit further, you can use tools such as WinHex to inspect disks, RAM, etc. It is widely used in computer forensics, I've found it really useful in many ocasions. One sure way to detect keystroke loggers is to have a debugger like SoftIce, and set memory traps on windows calls to disk access - basically the debugger will let you know when a particular word you type is put to hard disk by ANY software running. This can trigger false alarms, but if you manage it carefully it can be very powerful. The best way to set this up on a suspect computer is to get the debugger to watch for disk access containing a particular string, which you can then simply type in Notepad - instantly revealing if there is anything funny going on. Cheers, Mike ----- Original Message ----- From: "Hawkspirit" To: Sent: Tuesday, February 19, 2002 5:28 PM Subject: [TSCM-L] win what where > What is the best procedure to locate this software in a suspect computer? Roger > > http://www.winwhatwhere.com/w3i4/index.htm > > New Software Alarms Privacy Advocates > Posted - February 17, 2002 7:08pm > www.katv.com > > Seattle, Wash. (AP) - Right now, your boss, your spouse or the government > could secretly be reading all your typed words - even the ones you deleted > - while surreptitiously snapping your picture. > > Sound alarming? The man who makes it possible is the first to agree. > > "It's horrifying!" said Richard Eaton, who develops, markets and even > answers the technical help line for WinWhatWhere Corp. software. > > "I'm Mr. Guard-My-Privacy, so it's kind of ironic," said Eaton, a lanky > 48-year-old with a diamond stud earring. "Every time I add a feature into > it, usually it's something that I've fought for a long time." > > His qualms haven't stopped him from selling the product, though - more than > 200,000 copies of it, to everyone from suspicious spouses to the FBI. > > And Eaton is building ever-more-detailed monitoring tricks into his > Investigator software. The latest version, released this month, can snap > pictures from a WebCam, save screen shots and read keystrokes in multiple > languages. > > Investigator already can read every e-mail, instant message and document > you send and receive, even if you delete - or never even saved - what you > typed. > > The $99 downloadable program runs "hidden in plain sight." It changes names > every so often, and files containing the information it gathers are given > arbitrary old dates to make them difficult to find. > > The monitor can choose to have a user's every move sent to an e-mail > address, or the program can be instructed to look for keywords like "boss," > "pornography" or "terrorist" and only send records when it finds those > prompts. > > Software like Investigator was virtually unknown two years ago. Now it's > become a lucrative niche market, attracting plenty of competitors and at > least one product that aims to track down the snooping software itself. > > Federal investigators in Seattle used Investigator to snag suspected > Russian computer hackers, one of whom was recently convicted on 20 counts > including conspiracy, various computer crimes and fraud. > > Another, similar product was used in the FBI's investigation of alleged > mobster Nicodemo Scarfo Jr. > > A Maywood, N.J., security firm called Corporate Defense Strategies used > Investigator at an import/export firm to snare two employees who were > selling company merchandise and pocketing the cash. > > CDS President Jeff Prusan has since used it to help clients catch employees > who send out resumes, download pornography or spend their shifts playing > games. > > "It's unfortunate that it has come to this, but I've always believed that > it's better to know what's going on than not," Prusan said. > > Miki Compson, a computer consultant and mother of four in Severn, Md., used > Investigator to track computer correspondence from a suspicious person who > she said ended up stalking her daughter. > > She's recommended it to other parents whose kids were corresponding with > adults and defends the practice as a safety measure. > > Eaton says he wouldn't likely use it on his own two children - "I'd talk to > them!" - but he also doesn't feel comfortable telling people what to do > with his invention. > > And although he hates to hear tales of deception in the fast-growing market > of spouse tracking online, he wouldn't tell people not to do it. > > "I'm selling a hammer," he said. "They can beat nails with it, or their dog." > > If someone calls with proof the software is being used nefariously, Eaton > said he'll show the person how to remove it. > > Ari Schwartz, associate director for the Center for Democracy and > Technology, said there are legitimate uses for the product, such as > catching employees engaging in fraud or child pornography. > > But Schwartz recommends that employers inform their staffs if monitoring > for certain activities is occurring. He also urges spouses and parents to > think about the repercussions before using such software at home. > > "If your relationship is at the point where you feel that you need to spy > on your spouse, is this the best way to repair your relationship or perhaps > (should) you be going to therapy?" he said. > > In most cases, Schwartz said, snooping software is not illegal. But "we > think morally there are some very large issues with (employers) tracking > the personal habits of their employees." > > A self-taught programmer who says he barely graduated from high school, > Eaton stumbled on the idea for Investigator when he wrote a tracker program > to help him find and repair software bugs. > > He started selling it as a snooper product around 1997. > > Eaton still runs the company much like he did five years ago - from his > home in the eastern Washington town of Kennewick. His wife handles the > bookkeeping while he burns the CDs, answers the help line and runs the Web > site. > > Occasionally, Eaton also checks his own Investigator logs - and is always > disturbed by the amount of time he spends online. > > "When I look at my logs during the day, I think I need to fire myself," he > said. > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 4840 From: Perry Myers Date: Tue Feb 19, 2002 11:39am Subject: RE: Re: win what where I use Ad-Aware 5.62 and it does NOT find the Spector or E-Blaster Products. -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Tuesday, February 19, 2002 10:32 AM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Re: win what where Once upon a midnight dreary, Hawkspirit pondered, weak and weary: > What is the best procedure to locate this software in a suspect computer? > New Software Alarms Privacy Advocates Ad-Aware works extremely well according to reports, and I use it personally. Shareware too. www.lavasoftusa.com. I mentioned this on another list, and about fifteen (of the 600+/-) members found something on their machines. John Dvorak reviewed it in PC Magazine last month, and HE found 26 hidden nasty programs on his machine using Ad-Aware AFTER he had tried several commercially available packages he had purchased for review. It WILL detect keystroke loggers. The thing also is like a virus detection package in that the authors update it regularly as new threats are discovered. And it is shareware, so free to try. NOT free to use indefinitely. Highly recommended. And don't forget something like Zone Alarm firewall if you have DSL, cable modem or otherwise always connected. Even dial up users need a firewall. If you use ICS you need the paid professional version, otherwise the free Zone Alarm is OK. Any search engine, and practically zero learning curve. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4841 From: Date: Tue Feb 19, 2002 4:21pm Subject: Humor - Signs You Have BeenDrinking TooMch Cofee! Signs that you've been drinking too much java... Juan Valdez names his donkey after you. You ski uphill. You get a speeding ticket even when you're parked. You have a bumper sticker that says: "Coffee drinkers are good in the sack." You answer the door before people knock. You just completed another sweater and you don't know how to knit. You grind your coffee beans in your mouth. You have to watch videos in fast-forward. You can take a picture of yourself from ten feet away without using the timer. You lick your coffeepot clean. You spend every vacation visiting "Maxwell House." You're the employee of the month at the local coffeehouse and you don't even work there. The nurse needs a scientific calculator to take your pulse. Your T-shirt says, "Decaffeinated coffee is the devil's coffee." You're so jittery that people use your hands to blend their margaritas. You can type sixty words per minute with your feet. You can jump-start your car without cables. Cocaine is a downer. All your kids are named "Joe." Your only source of nutrition comes from "Sweet & Low." You go to AA meetings just for the free coffee. Starbucks owns the mortgage on your house. HAVE A GREAT DAY !!! Please Note: No trees were destroyed in the sending of this contaminant free message We do concede, a significant number of electrons may have been inconvenienced. : >) 4842 From: Perry Myers Date: Tue Feb 19, 2002 10:37am Subject: RE: win what where I don't know about this particular program but E-Blaster can only be found by one of two ways that I am aware of: 1 - hit the hot keys that were assigned in default to bring up the password screen. If the hot keys were changed as they can easily be, then this will not work. 2 - Start the installation process using a copy of the software. If in the first two or three installation screens, there appears a check box that asks if you wish to remove a previous installation. If this doesn't appear, it is not installed. You can abort the installation at this point. With Spector, it can be discovered as follows: Upon installation of Spector 2.2, if already installed, it will bring you to the password box, which you must enter to gain program access. You can also check to see if Spector is still saved to the default location on the hard drive: windows>systems>ieext. Not sure if these programs work the same way but if they do, locating them may be a similar process. You just need to carry all the different spy softwares in the CM kit. Perry D. Myers, CFE President & CEO E-mail: perry@d... MSI Detective Services Myers Service, Inc. Corporate Headquarters 2076 N. Elston Ave. Suite 200 Chicago, IL. 60614-3940 Phone 773-342-8300 Facsimile 773-486-4430 Professional Investigators Since 1959 Investigations Nationwide 24 Hour Availability www.detectiveservices.com -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Tuesday, February 19, 2002 10:28 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] win what where What is the best procedure to locate this software in a suspect computer? Roger http://www.winwhatwhere.com/w3i4/index.htm New Software Alarms Privacy Advocates Posted - February 17, 2002 7:08pm www.katv.com Seattle, Wash. (AP) - Right now, your boss, your spouse or the government could secretly be reading all your typed words - even the ones you deleted - while surreptitiously snapping your picture. Sound alarming? The man who makes it possible is the first to agree. "It's horrifying!" said Richard Eaton, who develops, markets and even answers the technical help line for WinWhatWhere Corp. software. "I'm Mr. Guard-My-Privacy, so it's kind of ironic," said Eaton, a lanky 48-year-old with a diamond stud earring. "Every time I add a feature into it, usually it's something that I've fought for a long time." His qualms haven't stopped him from selling the product, though - more than 200,000 copies of it, to everyone from suspicious spouses to the FBI. And Eaton is building ever-more-detailed monitoring tricks into his Investigator software. The latest version, released this month, can snap pictures from a WebCam, save screen shots and read keystrokes in multiple languages. Investigator already can read every e-mail, instant message and document you send and receive, even if you delete - or never even saved - what you typed. The $99 downloadable program runs "hidden in plain sight." It changes names every so often, and files containing the information it gathers are given arbitrary old dates to make them difficult to find. The monitor can choose to have a user's every move sent to an e-mail address, or the program can be instructed to look for keywords like "boss," "pornography" or "terrorist" and only send records when it finds those prompts. Software like Investigator was virtually unknown two years ago. Now it's become a lucrative niche market, attracting plenty of competitors and at least one product that aims to track down the snooping software itself. Federal investigators in Seattle used Investigator to snag suspected Russian computer hackers, one of whom was recently convicted on 20 counts including conspiracy, various computer crimes and fraud. Another, similar product was used in the FBI's investigation of alleged mobster Nicodemo Scarfo Jr. A Maywood, N.J., security firm called Corporate Defense Strategies used Investigator at an import/export firm to snare two employees who were selling company merchandise and pocketing the cash. CDS President Jeff Prusan has since used it to help clients catch employees who send out resumes, download pornography or spend their shifts playing games. "It's unfortunate that it has come to this, but I've always believed that it's better to know what's going on than not," Prusan said. Miki Compson, a computer consultant and mother of four in Severn, Md., used Investigator to track computer correspondence from a suspicious person who she said ended up stalking her daughter. She's recommended it to other parents whose kids were corresponding with adults and defends the practice as a safety measure. Eaton says he wouldn't likely use it on his own two children - "I'd talk to them!" - but he also doesn't feel comfortable telling people what to do with his invention. And although he hates to hear tales of deception in the fast-growing market of spouse tracking online, he wouldn't tell people not to do it. "I'm selling a hammer," he said. "They can beat nails with it, or their dog." If someone calls with proof the software is being used nefariously, Eaton said he'll show the person how to remove it. Ari Schwartz, associate director for the Center for Democracy and Technology, said there are legitimate uses for the product, such as catching employees engaging in fraud or child pornography. But Schwartz recommends that employers inform their staffs if monitoring for certain activities is occurring. He also urges spouses and parents to think about the repercussions before using such software at home. "If your relationship is at the point where you feel that you need to spy on your spouse, is this the best way to repair your relationship or perhaps (should) you be going to therapy?" he said. In most cases, Schwartz said, snooping software is not illegal. But "we think morally there are some very large issues with (employers) tracking the personal habits of their employees." A self-taught programmer who says he barely graduated from high school, Eaton stumbled on the idea for Investigator when he wrote a tracker program to help him find and repair software bugs. He started selling it as a snooper product around 1997. Eaton still runs the company much like he did five years ago - from his home in the eastern Washington town of Kennewick. His wife handles the bookkeeping while he burns the CDs, answers the help line and runs the Web site. Occasionally, Eaton also checks his own Investigator logs - and is always disturbed by the amount of time he spends online. "When I look at my logs during the day, I think I need to fire myself," he said. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4843 From: Fernando Martins Date: Tue Feb 19, 2002 3:47pm Subject: RE: re: British marines 'invade' Spain I beleive the marines already knew the cost of those beers, since only drunk they can miss what is rock (and a huge as you may know) from what is sand (wich the close they have is in Andaluzia)... Probably they just looked for a soft place to jump, and at the time a rock was not such a place. I have a theory that they were surfing in Tarifa, and didn't came from Gibraltar, but from that beautiful bay ... I saw that amateur movie with them, and the look on their faces was more like "*uck!! this is not the rock yet!!" :> Anyway, as for invaders, I was once inside their base at the top of the rock ... Drunk after visiting the monkeys and nobody did nothing ... Or they just understood well my problem, as I can guees from their last experience LOL FM ª -----Original Message----- ª From: David Alexander [mailto:david.alexander@b...] ª Sent: terÁa-feira, 19 de Fevereiro de 2002 16:49 ª To: 'TSCM submissions' ª Subject: [TSCM-L] re: British marines 'invade' Spain ª ª ª >"There is much embarrassment, the error is regretted and ª lessons have ª >been learned. They were informed of their error by local ª policemen and ª >spent only about five minutes on the beach." ª > ª >He added: "We were not trying to take Spain and have no plans to do ª >so." ª ª 1. Disclaimer: That's not to say we couldn't if we wanted to ª 2. Have you any idea how much beer that will cost ª those marines ? ______________________________ David ª Alexander M.INSTIS Global Infrastructure Director Bookham ª Technology plc ª Tel: +44 (0) 1327 356264 ª Mobile: +44 (0) 7799 881284 ª Fax: +44 (0) 1327 356775 ª http://www.bookham.com ª ª ª ª ============================================================== ª ========= ª This e-mail is intended for the person it is addressed to ª only. The information contained in it may be confidential ª and/or protected by law. If you are not the intended ª recipient of this message, you must not make any use of this ª information, or copy or show it to any person. Please contact ª us immediately to tell us that you have received this e-mail, ª and return the original to us. Any use, forwarding, printing ª or copying of this message is strictly prohibited. ª ª No part of this message can be considered a request for goods ª or services. ª ============================================================== ª ========= ª Any questions about Bookham's E-Mail service should be ª directed to postmaster@b.... ª ª ª ------------------------ Yahoo! Groups Sponsor ª ---------------------~--> Sponsored by VeriSign - The Value ª of Trust When building an e-commerce site, you want to start ª with a secure foundation. Learn how with VeriSign's FREE ª Guide. http://us.click.yahoo.com/kWSNbC/XdiDAA/yigFAA/kgFolB/TM ª -------------------------------------------------------------- ª -------~-> ª ª ======================================================== ª TSCM-L Technical Security Mailing List ª "In a multitude of counselors there is strength" ª ª To subscribe to the TSCM-L mailing list visit: ª http://www.yahoogroups.com/community/TSCM-L ª ª It is by caffeine alone I set my mind in motion. ª It is by the juice of Star Bucks that thoughts acquire ª speed, the hands acquire shaking, the shaking is a warning. ª It is by caffeine alone I set my mind in motion. ª =================================================== TSKS ª ª Your use of Yahoo! Groups is subject to ª http://docs.yahoo.com/info/terms/ ª ª ª 4844 From: tek492p Date: Tue Feb 19, 2002 8:00pm Subject: Re: Absolutely outrageous --- In TSCM-L@y..., "Steve Uhrig" wrote: > The security industry has some of the most incredibly ignorant morons > imaginable. > > I am literally speechless. Maybe for the first time in my life. > A concourse was evacuated and > everyone was screened again." > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* There is some sort of security breach everyday at some airport somewhere in the United States. Some stories make it to the news media, some do not. As long as we have the same minimum wage employees (making them federal employees does NOT increase their I.Q.) this problem will continue. Jack Lindauer Intertect TSCM services Los Angeles (818) 831-0515 4845 From: Aimee Farr Date: Tue Feb 19, 2002 10:09pm Subject: "Tampering with a security device." > Paging Aimee. . . what does this proposed law *really* mean? > A.Lizard Hm. A question for the courts. Non-legally -- this law would do more damage to security interests than anything they could possibly dream up. Simply "passing a law" is not a solution to people intent on B&E, etc. I'm of the opinion this could be aimed at something else, possibly dissent populations and "surveillance saboteurs," or ..."surveillance subversion" -- whatever the buzzword will be. If so, these people don't understand the nature of political dissent or workforce sabotage. I think it could be better-drafted so as to protect legitimate interests. I would like to know what interest drafted this bill. ~Aimee 4846 From: Aimee Farr Date: Tue Feb 19, 2002 10:59pm Subject: "TSCM SURVIVOR" WHEN: When you least expect it. WHERE: 600 sq. mi. remote island. WHAT: 100 of us, attending a conference on a remote urban island, in a small strip hotel. The island is suddenly invaded by a heretofore unknown enemy. We retreat to the hotel to decide what to do, as the entire island goes dark. Our laptops: struck dumb. Electronics: all fried. SIT: I look at all of you, and scream hysterically, "SAVE ME, PEOPLE!" Urhrig slaps me, not so much to bring me to my senses, but because he's always wanted to. Standing behind me: 100 beautiful, bikini-clad natives, with looks of desperation on their faces, and tears in their doe-like eyes. They would speak, but they're mute. You recognize that your chances of survival are slim, hearing explosions in the distance. And, the truth is, we all lied about where we were going, because the hotel doubles as an exotic retreat in the off-season, and we wanted cheap rates. Suddenly, a handsome, mysterious man (you can't be mysterious and not handsome -- if you are, we call you something else) in a dark suit rises in the back of the hotel bar. He says, "I have a cache of weapons, and a five hideouts in the jungle." Atkinson jumps up, and declares war on the enemy. With his handy bag of tricks, he slithers around to check out the situation. After we drag him back inside, we learn he eyeballed enemy forces...he says, "maybe 15,000." He directs the native women to oil their bodies, so they can pose on the beach as a distraction, allowing us to make our escape into the jungle on foot, following a power utility path that runs the length of the island. We initial plan is to disperse, heading out for the five primitive jungle hideouts. Zig-zag between the five jungle hideouts is about 100 miles, through heavy jungle, crawling with really icky stuff, including one nudist colony of questionable allegiance. What we've got: 1. your BASIC travel kits. 2. typical strip hotel stuff. 3. one small, bare-essentials convenience store. 4. guns and ammunition, if we can get to them. 5. 1 native guide. 6. not much time. Just some of what we don't have: 1. a way to communicate between the 5 jungle hideouts. I run to my room screaming. I'm viewed under the crack of the door tying a bedsheet to a curtain rod, about to wave the flag of surrender, and reveal our location.....unless I hear some good ideas about _what to grab_ and _what to do_! YOU have been elected leader of one of the 5 groups. Your orders? *tick-tock, tick-tock* 4847 From: James M. Atkinson Date: Tue Feb 19, 2002 10:31pm Subject: Re: "Tampering with a security device." At 10:09 PM -0600 2/19/02, Aimee Farr wrote: > > Paging Aimee. . . what does this proposed law *really* mean? >> A.Lizard > >Hm. A question for the courts. > >Non-legally -- this law would do more damage to security interests than >anything they could possibly dream up. Simply "passing a law" is not a >solution to people intent on B&E, etc. I'm of the opinion this could be >aimed at something else, possibly dissent populations and "surveillance >saboteurs," or ..."surveillance subversion" -- whatever the buzzword will >be. If so, these people don't understand the nature of political dissent or >workforce sabotage. > >I think it could be better-drafted so as to protect legitimate interests. > >I would like to know what interest drafted this bill. > >~Aimee The intention of the statute is to stop shoplifter from tampering with "Inventory Control Tags" and the related support systems. I does not appear to have anything to do with bugs and wiretaps. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4848 From: William Knowles Date: Wed Feb 20, 2002 0:53am Subject: Re: A new record On Fri, 15 Feb 2002, Steve Uhrig wrote: > A new record has been set. > > This week I referred seven people to the following website in lieu of > using my services: > > http://zapatopi.net/afdb.html For the more technically savvy kooks, you should also recommend that if they use M$ for an OS to yank out that hard drive, buy a new hard drive, and install Tinfoil Hat Linux. :) http://tinfoilhat.cultists.net/ - WK *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 4849 From: Matthew Paulsen Date: Wed Feb 20, 2002 2:51am Subject: RE: Re: Absolutely outrageous From http://www.avsec.com Cronology of airport / airline reports from Airwatch page of ASI day/month/year/location/info formatted. This timeline covers less than a month below. Their website goes back to 9/99 listings. 04/10/2001 NEW DELHI An Alliance Air flight landed in New Delhi with both passengers and crew believing the flight had been hijacked. Air traffic control advised the crew that they had received reports that a hijack was in progress. The problem started with a hoax call but was exacerbated by miscommunication. 04/10/2001BLACK SEA A Siberian Airlines Tu-154 en route from Tel Aviv to Novosibirsk in Siberia exploded over the Black Sea. At the time this issue of ASI went to print it is believed that all 76 passengers and crew were killed, 51 of whom were Israelis. Whilst there is speculation that this was a terrorist act, most believe that a stray missile fired by the Ukranian military during a training exercise was the actual cause. 29/09/2001PARIS Air France suspended all flights in and out of Paris-Orly airport following anonymous threats. The terminals were evacuated until police established the threat was a hoax 29/09/2001MONTPELLIER The airport was closed following a bomb threat. 27/09/2001LOS ANGELES Shortly after Air Canada flight AC 792 departed for Toronto, Javid Naghani, an Iranian citizen resident in the US, was apprehended smoking in the toilet. The passenger became verbally abusive and uttered an anti-American threat, causing the aircraft to return to Los Angeles under escort by the US Air Force. 27/09/2001MOSCOW According to Russia's Interfax news agency, 9 tons of explosives and 594 detonators were found, in Moscow, on a cargo plane bound for Kazakhstan from Vienna, Austria. The cargo was allegedly sent by Spain's Union Espanol to the Kazakhstan Corporation 26/09/2001SEOUL A passenger sent a friend a joke text message on his mobile phone indicating that he was on a hijacked Japan Airlines flight en route to Seoul from Kansai. The friend, believing the message, contacted the authorities who met the man off the flight in Seoul 25/09/2001NAIROBI A Kenya Airways plane, en route to Dar es Salaam, returned to Nairobi following a telephone bomb threa 22/09/2001LOS ANGELES An American Airlines flight bound for Mexico City was turned back to Los Angeles International Airport after the FBI received a threat 19/09/2001DUBAI A British passenger aboard a Cathay Pacific flight en route to Hong Kong via Kuwait was arrested following a threat he made, when refused additional alcohol based on his intoxicated state, that a bomb was on board the aircraft 17/09/2001GOOSE BAY A Virgin Airlines flight en route from Heathrow to New York diverted to Newfoundland following a bomb threat. 4 Canadian jet fighters escorted the aircraft to Goose Bay, Canada 16/09/2001FRANKFURT A Singapore Airlines flight returned to Frankfurt following the discovery of a note in the toilets warning that a bomb was on board 16/09/2001TORONTO A 21-year-old Australian, Sinan Safett Acar, travelling to Paris on Air France was arrested in Toronto after joking he had a bomb in his suitcase. He was later given a 60 day gaol sentence. 16/09/2001SRI LANKA 20 explosive-laden boats with suicidal Tamil Tiger guerillas on board attacked a ship, carrying 1,200 Sri Lankan soldiers, off the coast in Trincomalee, northeast of Colombo. 6 guerillas were killed and 40 soldiers were wounded 15/09/2001HOUSTON Constantinos Carpis, aged 36, was arrested having told American Airlines ticket agents at Houston that he had a nuclear bomb in his baggage. He was travelling to his home in Australia. 14/09/2001AUCKLAND A 55-year old employee of New Zealand's prison service was arrested as he boarded a flight at Auckland for Palmerston North. He had allegedly joked with a friend about having a bomb in his bag 14/09/2001NEWCASTLE A man was arrested at Teeside International airport, having claimed that he had Semtex explosives in his pockets. He was travelling to Tenerife 13/09/2001ORLANDO Orlando International Airport was evacuated following a bomb threat. The fire department's bomb squad examined bags left in the terminal and determined there was no bomb 12/09/2001SINGAPORE A Singapore Airlines flight routed to Johannesburg from Singapore was delayed following the receipt of a hoax bomb threat. The threat was allegedly sent by e-mail from a New Zealander employed by IBM -----Original Message----- From: tek492p [mailto:tek492p@y...] Sent: Tuesday, February 19, 2002 6:00 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Absolutely outrageous --- In TSCM-L@y..., "Steve Uhrig" wrote: > The security industry has some of the most incredibly ignorant morons > imaginable. > > I am literally speechless. Maybe for the first time in my life. > A concourse was evacuated and > everyone was screened again." > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* There is some sort of security breach everyday at some airport somewhere in the United States. Some stories make it to the news media, some do not. As long as we have the same minimum wage employees (making them federal employees does NOT increase their I.Q.) this problem will continue. Jack Lindauer Intertect TSCM services Los Angeles (818) 831-0515 Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 4850 From: Robert Dyk Date: Wed Feb 20, 2002 8:10am Subject: RE: "TSCM SURVIVOR" Is this relevant to the common cause ? Robert Dyk dyk@c... 4851 From: greendots . Date: Tue Feb 19, 2002 9:44pm Subject: symmetrical time Tomorrow, Wednesday, 20 February 2002, will be a historic moment in time. When the 24 hour clock ticks on 8:02 p.m. on Wednesday, 20 February 2002, then time, day, month, and year will read in perfect symmetry: 2002, 2002, 2002. To be more precise - 20:02, 20/02, 2002. A symmetrical pattern has only happened once in the past, a little over a thousand years ago. The exact moment was 10:01 a.m. on 10 January 1001. A balanced pattern will never occur again. _________________________________________________________________ Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp. 4852 From: James M. Atkinson Date: Wed Feb 20, 2002 8:43am Subject: Polygraph Screening in Light of the Robert Hanssen Espionage Investigation http://antipolygraph.org/documents/richardson-memo-02-2001.shtml ------------------------------------------------------------------------ About a week after the 18 February 2001 arrest of FBI agent Robert P. Hanssen on espionage charges, the FBI's then senior scientific expert on polygraphy, Dr. Drew C. Richardson, sent the following memo to FBI Director Louis Freeh, the Deputy Director, the Assistant Director in Charge of the Laboratory Division, and two Section Chiefs within the Laboratory Division. He received no written or other reply. See also Dr. Richardson's 27 September 1997 opening statement on polygraph screening before the U.S. Senate Committee on the Judiciary's Subcommittee on Administrative Oversight and the Courts, his 17 October 2001 presentation before the National Academy of Sciences' Study to Review the Scientific Evidence on the Polygraph, and his 28 January 2002 polygraph countermeasure challenge to the polygraph community. ------------------------------------------------------------------------ "Polygraph Screening in Light of the Robert Hanssen Espionage Investigation" Over the last week, the world has learned of the Robert Hanssen Espionage investigation. I, as is the case for most of the lay public and for most employees of the FBI, do not know Mr. Hanssen nor have I had any connection to or knowledge of the investigation that led to his arrest. Before I directly address the subject of this note, I would like to comment on a few peripheral issues so as to alleviate any confusion about what my thoughts are on these subjects or motivation for putting these present thoughts into writing. If the allegations are proven to be true, they represent a heinous betrayal of trust and an unbelievable criminal action on the part of one of our own with profound national security implications for our country. Admittedly, even the retelling of this story is shocking, even prior to its having been formally proved in a judicial setting. Two questions recently asked in the aftermath by the lay press are "How could this have occurred over fifteen plus years and go undetected through the vast majority of that time?" and "What steps should the FBI take to substantially reduce the likelihood of this happening again?" Contained within the context of the last question are frequently occurring references to polygraph screening of Bureau employees and whether or not the FBI is out of step with others in the Intelligence Community with regard to its current polygraph policies. I very strongly believe that the last question and answer are completely irrelevant and that the only meaningful question seeks to address whether the members of the "community" are in line with reason and logic, not with each other. With an appropriately crafted question in mind, it may well be that the answer would have the majority conforming to the practices of the minority, and not the reverse. The rhetoric of recent days has suggested that the "problem" lies within "the culture" of the Bureau, which has traditionally been reluctant to impose polygraph screening programs on its employees. In spite of the recent espionage debacle, I believe this area concerns what "is right" and not that which "is a problem" within the Bureau and that furthermore this has nothing to do with "the culture" of the FBI, but its collective intelligence and discernment which has properly led to it having resisted imposing polygraph screening programs on its employees. In the balance of this note, I will attempt to present the viewpoint of myself and others who are deeply concerned with national security and believe that answers to the aforementioned questions need to be provided, but strongly believe that it is critically important that logic prevail in this time of shock and dismay. There no doubt exists pressure from various sources to "do something" and to quickly take some action, albeit, perhaps even an irrational action. If one is to examine the lay press and editorial accounts of the past week, this pressure has already begun in earnest. The situation reminds one of the relevant temptation as described by and attributed to Salman Rushdie: "When thinking becomes excessively painful, action yields the fastest remedy." It is the sincere hope of this author that this note will support those who have refused to take such action in the past and are resolute in opposing it in the future. The question has frequently arisen as to whether Mr. Hanssen was administered polygraph exams during the period of alleged espionage and/or during his FBI career. This question is then followed with suggested analysis about what effect his having been given a polygraph exam(s) would have had on the course of this investigation and whether any of this demonstrates a need to change the present Bureau policy of not routinely administering polygraph exams to its employees. Again, as with most other questions regarding Mr. Hanssen, I do not have personal or other knowledge as to whether he has been given polygraph exams. The logic of the issue does not require that I do. Either he was or he was not. If he was, then he like so many other traitors was allowed to continue his activities following having been found non-deceptive on an exam(s). If he was not administered an exam(s), in a rather perverse sort of (lack of) logic, it has been suggested that this demonstrates that Bureau employees should be given them in the future. Should the latter situation exist, i.e., that Hanssen had not been polygraphed, I suggest it be viewed in the context of he, likewise, was most likely not subjected to astrological chart readings, palm readings, tea leaf readings, or the readings of entrails as practiced by the ancient Romans. There now exists no more compelling reason to institute a program of wide spread polygraphy than there does implementation of any of these other divining activities. Aside from and in addition to there being no cause for such precipitous action, I strongly believe (as I have stated before in the case of FBI applicants) that there is NO evidence whatsoever that polygraph screening has any validity as a diagnostic tool. In addition to the general considerations and relevant scientific community opinion(s) I have raised before in connection with applicant screening, I believe a detailed analysis of the issues of polygraph sensitivity and specificity through the principles of Bayesian statistics and receiver operator curves (admittedly, well beyond the scope of this note and its form) will completely debunk the notion that this tool has any validity. For reasons that I have previously provided, I further feel that any notions of a deterrent effect and utility in obtaining confessions/admissions for polygraph screening are at best, far overstated. On a final note regarding validity, a very prestigious panel assembled by the National Academy of Sciences has just undertaken (for the US Government) an analysis of the validity of polygraph screening. Whether this panel ultimately concludes (as I believe it likely will), as do I about polygraph validity, I think it will be considered premature (if not presumptuous and ultimately embarrassing to the Bureau) for a new polygraph screening program to be instituted before this group has hardly begun its work. In the analysis of the merits of a given program, it is logical that the cost/benefit ratio of that program be examined. Such is true for a polygraph screening program as well. If as I and others claim, polygraph screening has no validity has a diagnostic tool, then its benefit will be exceedingly low and the costs associated with such a program would also have to be exceedingly low to make the cost/benefit ratio acceptable and a basis for instituting or continuing such a program. In fact the potential costs are quite the opposite---very high. The aforementioned statistical analysis that I referred to would indicate that with assumptions made most favorable to polygraphy, that one could expect to have roughly 50 to 100 times as many false positive determinations (i.e., an innocent employee wrongly found to be deceptive on a polygraph examination) as true positives (e.g., a spy found to be deceptive and therefore identified). Although one can reduce the number of false positives (i.e., increase specificity), it is impossible to do this without reducing the sensitivity of the test, making it almost virtually impossible that under such conditions a spy will be identified as a result of a polygraph exam. At the very least any false positive results will invariably lead to careers being sidelined, but will most likely lead to some careers and lives being ruined. I would call to your attention the case of Mr. Mark Mallah, a former special agent of the FBI who claims to have been wrongly accused of activities related to espionage. This investigation stemmed from what may well have been false positive polygraph results. In addition to other materials available to you, I would refer you to Mr. Mallah's personal account of these matters (http://www.antipolygraph.org/statements/statement-002.shtml). Although I suspect that every effort would be expended to reduce the number of false positives (with the aforementioned and necessary accompanying loss of sensitivity), false positives will occur and some of our employees will be victimized. I will say as strongly as I possibly can that a reasonable cost to benefit ratio analysis of polygraph screening will indicate that such a program is altogether unviable. But on a hypothetical plane, I would pose the question to you: "Even if polygraph had a high benefit (ability to catch spies, which I adamantly claim it does not), and ergo a more acceptable cost to benefit ratio, how many spies would we have to catch to justify the ruining of one employee's (and his family's) life? Or conversely, how many lives would we be willing to ruin to catch one spy? These are ethical decisions, not scientific considerations, but ones that would have to be made and taken responsibility for. The good news is that the moral dilemma I pose for you is really not one at all. The necessary benefit (test sensitivity) to require such an ethical choice is not real or present, leaving you, the Director, and other executives not having to face this excruciating choice. I would like to close on a personal note. I intend to retire from the FBI in the next several months. Amongst many other things, I plan to become engaged in both the scientific inquiry and public discourse surrounding polygraph screening. As such, I suppose it could be said that I do not have a personal stake in whether polygraph screening is implemented or not in the Bureau and that I could easily and perhaps wisely save my commentary for my post Bureau life. Although I suppose it is tempting to do so, I believe that because decisions will/are being made imminently and because the welfare of those I care for and will leave behind with my retirement is at stake, I cannot in good conscience remain silent on this issue. Although I don't expect my views to be singularly compelling (nor should they be) in the overall decision-making process you are undertaking, I do appreciate any consideration you might give this viewpoint. Sincerely yours, Dr. Drew C. Richardson Supervisory Special Agent FBI Laboratory -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4853 From: Marty Kaiser Date: Wed Feb 20, 2002 4:01am Subject: Fw: [INTELNET-L] Interesting In case you are interested, below is the affidavit for arrest and search of Robert Hanssen, FBI traitor. http://www.fas.org/irp/ops/ci/hanssen_affidavit.html http://www.fas.org/irp/ops/ci/hanssen_affidavit2.htmlGet more from the Web. 4854 From: Richard Thieme Date: Wed Feb 20, 2002 9:54am Subject: Re: "Tampering with a security device." I live in Wisconsin and am waiting to hear back from my state representative about this bill. RT At 10:09 PM 2/19/02 -0600, Aimee Farr wrote: >> Paging Aimee. . . what does this proposed law *really* mean? >> A.Lizard > >Hm. A question for the courts. > >Non-legally -- this law would do more damage to security interests than >anything they could possibly dream up. Simply "passing a law" is not a >solution to people intent on B&E, etc. I'm of the opinion this could be >aimed at something else, possibly dissent populations and "surveillance >saboteurs," or ..."surveillance subversion" -- whatever the buzzword will >be. If so, these people don't understand the nature of political dissent or >workforce sabotage. > >I think it could be better-drafted so as to protect legitimate interests. > >I would like to know what interest drafted this bill. > >~Aimee > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4855 From: Aimee Farr Date: Wed Feb 20, 2002 9:54am Subject: RE: "Tampering with a security device." I did not read all of your post, and have it confused with something else. (Nothing to do w/ bugs, etc.) Sorry, I crossed threads from another channel! ~Aimee > -----Original Message----- > From: Aimee Farr [mailto:aimee.farr@p...] > Sent: Tuesday, February 19, 2002 10:10 PM > To: TSCM-L-yahoogroups.com > Subject: [TSCM-L] "Tampering with a security device." > > > > Paging Aimee. . . what does this proposed law *really* mean? > > A.Lizard > > Hm. A question for the courts. > > Non-legally -- this law would do more damage to security interests than > anything they could possibly dream up. Simply "passing a law" is not a > solution to people intent on B&E, etc. I'm of the opinion this could be > aimed at something else, possibly dissent populations and "surveillance > saboteurs," or ..."surveillance subversion" -- whatever the buzzword will > be. If so, these people don't understand the nature of political > dissent or > workforce sabotage. > > I think it could be better-drafted so as to protect legitimate interests. > > I would like to know what interest drafted this bill. > > ~Aimee > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 4856 From: A Grudko Date: Wed Feb 20, 2002 8:08am Subject: "Tampering with a security device." - Original Message - From: James M. Atkinson > > The intention of the statute is to stop shoplifter from tampering > with "Inventory Control Tags" and the related support systems. > I does not appear to have anything to do with bugs and wiretaps. There was a passingly interesting and technically distorted discourse in the media here last month about active VQRP RF (431Mhz) digital ID tags being used in government premises is SA. The media tried to make out that one political party was tracking the movements of all others and implied an evil Orwellian conspirasy when in fact the installers were just trying to reduce rampant theft and security breaches. Remember 'The Man From Uncle'? If you bypassed the secret chamber behind the tailor's shop without the triangular yellow tag you were tortured dead meat, or worse, had to listen to one of Mr Alexander's monalogues. I think that was a CBS classified Marty Kaiser c. 1964 system. :-) Can this 2002 system be abused? Of course - so can water. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time e 4857 From: David Alexander Date: Thu Feb 21, 2002 2:30am Subject: "TSCM SURVIVOR" >YOU have been elected leader of one of the 5 groups. > >Your orders? > >*tick-tock, tick-tock* Tell everyone not to panic, your alarm clock will go off any second and you'll wake up. _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4858 From: Rob Muessel Date: Thu Feb 21, 2002 8:45am Subject: Equipment for sale A colleague contacted me about a set of ISA equipment he'd like to sell. It consists of 1. ECR 1 Receiver w/haliburton case 2. Frequency extenders up to 7ghz. 3. Chart recorder in haliburton case 4. NJD-4 Non Linear junction detector 5. Carrier Current detector w/case and sound source All are in good, if not excellent, shape with low miles. Price is reasonable. Contact me off the list for details if you are interested. -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 4859 From: James M. Atkinson Date: Thu Feb 21, 2002 10:11am Subject: A Cow Story TRADITIONAL CAPITALISM: You have two cows. You sell one and buy a bull. Your herd multiplies, and the economy grows. You sell them and retire on the income. ENRON VENTURE CAPITALISM: You have two cows. You sell three of them to your publicly listed company, using letters of credit opened by your brother-in-law at the bank, then execute a debt/equity swap with an associated general offer so that you get all four cows back, with a tax exemption for five cows. The milk rights of the six cows are transferred via an intermediary to a Cayman Island company secretly owned by the majority shareholder who sells the rights to all seven cows back to your listed company. The annual report says the company owns eight cows, with an option on one more. Sell one cow to buy a new president of the United States, leaving you with nine cows. No balance sheet provided with the release. The public buys your bull. ARTHUR ANDERSON, LLC You have 2 cows. You shred all documents that Enron has any cows, take 2 cows from Enron for payment for consulting the cows, and attest that Enron has 9 cows. AN AMERICAN CORPORATION You have two cows. You sell one, and force the other to produce the milk of four cows. You are surprised when the cow drops dead. FRENCH CORPORATION You have two cows. You go on strike because you want three cows. A JAPANESE CORPORATION You have two cows. You redesign them so they are one-tenth the size of an ordinary cow and produce twenty times the milk. You then create clever cow cartoon images called Cowkimon and market them World-Wide. A GERMAN CORPORATION You have two cows. You re-engineer them so they live for 100 years, eat once a month, and milk themselves. A BRITISH CORPORATION You have two cows. Both are mad. AN ITALIAN CORPORATION You have two cows, but you don't know where they are. You break for lunch. A RUSSIAN CORPORATION You have two cows. You count them and learn you have five cows. You count them again and learn you have 42 cows. You count them again and learn you have 12 cows. You stop counting cows and open another bottle of vodka. A SWISS CORPORATION You have 5000 cows, none of which belong to you. You charge others for storing them. A HINDU CORPORATION You have two cows. You worship them. A CHINESE CORPORATION You have two cows. You have 300 people milking them. You claim full employment, high bovine productivity, and arrest the newsman who reported the numbers. AN ISRAELI CORPORATION So, there are these two Jewish cows, right? They open a milk factory, an ice cream store, and then sell the movie rights. They send their calves to Harvard to become doctors. So, who needs people? AN ARKANSAS CORPORATION You have two cows. That one on the left is kinda cute. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4860 From: kirk Date: Thu Feb 21, 2002 11:25am Subject: Re: A Cow Story Dear kind-hearted friends... Now that the holiday season has passed, please look into your heart to help those in need. Enron executives in our very own country are living at or just below the seven-figure salary level. And, as if that weren't bad enough, they will be deprived of it as a result of the bankruptcy and current SEC investigation. But now, you can help! For only $20,835 a month, about $694.50 a day (that's less than the cost of a large screen projection TV) you can help an Enron executive remain economically viable during his time of need. This contribution by no means solves the problem, but it's a start! Almost $700 may not seem like a lot of money to you, but to an Enron exec it could mean the difference between a vacation spent sucking ass in DC, golfing in Florida or a Mediterranean cruise. For you, seven hundred dollars is nothing more than rent, a car note or mortgage payments. But to an Enron exec $700 will almost replace his per diem. Your commitment of less than $700 a day will enable an Enron exec to buy that home entertainment center, trade in the year-old Lexus for a new Ferrari, or enjoy a weekend in Rio. HOW WILL I KNOW I'M HELPING? Each month, you will receive a complete financial report on the exec you sponsor. Detailed information about his stocks, bonds, 401(k), real estate, and other investment holdings will be mailed to your home. You'll also get information on how he plans to invest his golden parachute. Imagine the joy as you watch your executive's portfolio double or triple! Plus, upon signing up for this program, you will receive a photo of the exec (unsigned-for a signed photo, please include an additional $50.00). Put the photo on your refrigerator to remind you of other peoples' suffering. HOW WILL HE KNOW I'M HELPING? Your Enron exec will be told that he has a SPECIAL FRIEND who just wants to help in a time of need. Although the exec won't know your name, he will be able to make collect calls to your home via a special operator just in case additional funds are needed for unexpected expenses. YES, I WANT TO HELP! I would like to sponsor an Enron executive. My preference is checked below: [ ] Mid-level Manager [ ] Director [ ] Vice President (Higher cost; please specify which department) [ ] President (Even higher cost; please specify which department) [ ] CEO (Contribution:: Average Enron janitor monthly salary x 700) [ ] Entire Company [ ] I'll sponsor an Exec most in need. Please select one for me. *It's just that easy so do it now!* Please charge the account listed below ___________ per day and send me a picture of the Enron executive I have sponsored, along with my very own Enron "Keep America Strong; Sponsor an Enron Exec: Ask Me How!" t-shirt to wear proudly. And thank you so very much! ---------- Original Message ---------------------------------- From: "James M. Atkinson" Date: Thu, 21 Feb 2002 11:11:56 -0500 > >TRADITIONAL CAPITALISM: You have two cows. You sell one and buy a >bull. Your herd multiplies, and the economy grows. You sell them and >retire on the income. > >ENRON VENTURE CAPITALISM: You have two cows. You sell three of them >to your publicly listed company, using letters of credit opened by >your brother-in-law at the bank, then execute a debt/equity swap with >an associated general offer so that you get all four cows back, with >a tax exemption for five cows. The milk rights of the six cows are >transferred via an intermediary to a Cayman Island company secretly >owned by the majority shareholder who sells the rights to all seven >cows back to your listed company. The annual report says the company >owns eight cows, with an option on one more. Sell one cow to buy a >new president of the United States, leaving you with nine cows. No >balance sheet provided with the release. The public buys your bull. > >ARTHUR ANDERSON, LLC You have 2 cows. You shred all documents that >Enron has any cows, take 2 cows from Enron for payment for consulting >the cows, and attest that Enron has 9 cows. > >AN AMERICAN CORPORATION You have two cows. You sell one, and force >the other to produce the milk of four cows. You are surprised when >the cow drops dead. > >FRENCH CORPORATION You have two cows. You go on strike because you >want three cows. > >A JAPANESE CORPORATION You have two cows. You redesign them so they >are one-tenth the size of an ordinary cow and produce twenty times >the milk. You then create clever cow cartoon images called Cowkimon >and market them World-Wide. > >A GERMAN CORPORATION You have two cows. You re-engineer them so they >live for 100 years, eat once a month, and milk themselves. > >A BRITISH CORPORATION You have two cows. Both are mad. > >AN ITALIAN CORPORATION You have two cows, but you don't know where >they are. You break for lunch. > >A RUSSIAN CORPORATION You have two cows. You count them and learn you >have five cows. You count them again and learn you have 42 cows. You >count them again and learn you have 12 cows. You stop counting cows >and open another bottle of vodka. > >A SWISS CORPORATION You have 5000 cows, none of which belong to you. >You charge others for storing them. > >A HINDU CORPORATION You have two cows. You worship them. > >A CHINESE CORPORATION You have two cows. You have 300 people milking >them. You claim full employment, high bovine productivity, and arrest >the newsman who reported the numbers. > >AN ISRAELI CORPORATION So, there are these two Jewish cows, right? >They open a milk factory, an ice cream store, and then sell the movie >rights. They send their calves to Harvard to become doctors. So, who >needs people? > >AN ARKANSAS CORPORATION You have two cows. That one on the left is kinda cute. >-- > >-------------------------------------------------------------------------------------------------- >The First, The Largest, The Most Popular, and The Most Complete TSCM, >Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. >-------------------------------------------------------------------------------------------------- > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com >-------------------------------------------------------------------------------------------------- > People sleep peaceably in their beds at night only because rough > men stand ready to do violence on their behalf. - George Orwell > -------------------------------------------------------------------------------------------------- > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > -- Kirk Adirim President TACTRONIX Tactical Electronics for Critical Missions 8497 Sunset Boulevard #28 West Hollywood, CA 90069 USA E: kirk@t... T: 323-650-2880 F: 310-388-5886 W: www.tactronix.com -- 4861 From: James M. Atkinson Date: Thu Feb 21, 2002 10:36pm Subject: It speaks for itself. It speaks for itself. Because I drove the night shift, my cab became a moving confessional. Passengers climbed in, sat behind me in total anonymity, and told me about their lives. I encountered people whose lives amazed me, ennobled me, made me laugh and weep. But none touched me more than a woman I picked up late one August night. When I arrived at 2:30 a.m., the building was dark except for a single light in a ground floor window. Under these circumstances, many drivers would just honk once or twice, wait a minute, then drive away. But I had seen too many impoverished people who depended on taxis as their only means of transportation. Unless a situation smelled of danger, I always went to the door. This passenger might be someone who needs my assistance, I reasoned to myself. So I walked to the door and knocked. "Just a minute," answered a frail, elderly voice. (I could hear something being dragged across the floor.) After a long pause, the door opened. A small woman in her 80s stood before me. She was wearing a print dress and a pillbox hat with a veil pinned on it, like somebody out of a 1940's movie. By her side was a small nylon suitcase. The apartment looked as if no one had lived in it for years. All the furniture was covered with sheets. There were no clocks on the walls, no knickknacks or utensils on the counters. In the corner was a cardboard box filled with photos and glassware. "Would you carry my bag out to the car?" she said. I took the suitcase to the cab, then returned to assist the woman. She took my arm and we walked slowly toward the curb. She kept thanking me for my kindness. "It's nothing," I told her. "I just try to treat my passengers the way I would want my mother treated." "Oh, you're such a good boy," she said. When we got in the cab, she gave me an address, then asked, "Could you drive through downtown?" "It's not the shortest way," I answered quickly. "Oh, I don't mind," she said. "I'm in no hurry. I'm on my way to a hospice." I looked in the rear view mirror. Her eyes were glistening. "I don't have any family left," she continued. "The doctor says I don't have very long.." I quietly reached over and shut off the meter. "What route would you like me to take?" I asked. For the next two hours, we drove through the city. She showed me the building where she had once worked as an elevator operator. We drove through the neighborhood where she and her husband had lived when they were newlyweds. She had me pull up in front of a furniture warehouse that had once been a ballroom where she had gone dancing as a girl. Sometimes she'd ask me to slow in front of a particular building or corner and would sit staring into the darkness, saying nothing. As the first hint of sun was creasing the horizon, she suddenly said, "I'm tired. Let's go now." We drove in silence to the address she had given me. It was a low building, like a small convalescent home, with a driveway that passed under a portico. Two orderlies came out to the cab as soon as we pulled up. They were solicitous and intent, watching her every move. They must have been expecting her. I opened the trunk and took the small suitcase to the door. The woman was already seated in a wheelchair. "How much do I owe you?" she asked, reaching into her purse. "Nothing," I said. "You have to make a living," she answered. "There are other passengers," I responded. Almost without thinking, I bent and gave her a hug. She held onto me tightly. "You gave an old woman a little moment of joy," she said. "Thank you." I squeezed her hand, then walked into the dim morning light. Behind me, a door shut. It was the sound of the closing of a life. I didn't pick up any more passengers that shift. I drove aimlessly, lost in thought. For the rest of that day, I could hardly talk. What if that woman had gotten an angry driver, or one who was impatient at the end his shift? What if I had refused to take the run, or had honked once, then driven away? On a quick review, I don't think that I have done anything more important in my life. We're conditioned to think that our lives revolve around great moments. But great moments often catch us unaware--beautifully wrapped in what others may consider a small one. People may not remember exactly what you did, or what you said, ...but they will always remember how you made them feel. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4862 From: Aimee Farr Date: Fri Feb 22, 2002 10:12pm Subject: Whoops. [Moral lesson. ~Aimee] US v. YANG (02/20/02 - No. 00-3125, 00-3126, 00-3150) Where the defendants believed the information they conspired and attempted to steal was a trade secret, the fact that the information was not an actual trade secret was irrelevant, as the defense of impossibility is unavailable to defendants charged under the Economic Espionage Act of 1996, 18 U.S.C. sections 1832(a)(4) and (5). To read the full text of this opinion, go to: http://laws.lp.findlaw.com/6th/02a0062p.html From: R. Snyder Date: Wed Feb 19, 2003 8:51am Subject: Re: Taking a byte out of Baghdad The popular press likes to use the term "virus" rather loosely. Given the ubiquitous usage of TCP/IP over twisted-pair ethernet, many potential vulnerabilities could be exploited without specific knowledge of computer OS's. For example, with sufficient knowledge of a printer's network interface, a trojan-horse DOS capability could be installed in the printer. A printer would be a logical candidate for such an attack, as it would be in the perfect position to become acquainted with the network addresses of all the computers printing to it. Upon observing the occurrence of a triggering condition, the printer could then begin a DOS attack on the computers on the LAN. Moreover, with more knowledge or assumptions of computer OS's, a printer would be in a position to launch attacks within the LAN via NetBIOS/NetBEUI/IPX. Even without knowledge of the printer's network interface, an additional network interface could easily be bridged across the printer's. Triggering could be conditioned upon network traffic that would be expected to occur on the network (e.g., air defense messages indicating a massive air attack), network traffic that could be induced to occur (e.g., leaking a pseudo-codeword to the enemy with the expectation that they would recite it in their network traffic), or some other phenomenon (e.g., including a radio receiver in the printer responsive to a signal transmitted during the overflight of an EW asset). All of the foregoing would be possible even on a LAN having no connection to the internet. The bottom line is that installing a compromised hardware component in a network is a bad thing, and the possibility of such installation should be met with investigation, not denial. I'm not saying that any of the above would be likely or trivial to implement, but that I see nothing that would place the proposed schemes beyond the realm of possibility given sufficient knowledge, access, and motivation. __________________________________________________ Do you Yahoo!? Yahoo! Shopping - Send Flowers for Valentine's Day http://shopping.yahoo.com 6934 From: Gregory Perry Date: Wed Feb 19, 2003 10:50am Subject: window bounce countermeasure This gadget is pretty neat, takes a standard audio source and modulates it via suction cup to any surface, $29.99. Seems with the right degree of tint and this with a pink noise source would make a great countermeasure against laser listening devices: http://www.thinkgeek.com/electronics/audio/5a15/ Gregory Perry --------------------------------- "There are a thousand hacking at the branches of evil to one who is striking at the root." -- Henry David Thoreau 6935 From: Steve Uhrig Date: Wed Feb 19, 2003 8:19pm Subject: RE: Taking byte from Baghdad On 19 Feb 2003 at 7:54, Kutlin, Josh wrote: > Ok ...thanks to this thread I went out and bought my first shortwave > (DX-399) this past weekend for $30 on closeout. Good price. Welcome to what likely will be a fascinating hobby, and the way many of us started in our careers. > The first thing I realized is that I need a better antenna. Yup. > Did some reading (and rigging) and I realized that the 25 feet of co-ax > (its all I had and the snow closed radio shack) is just not cutting it. There needs to be something at the end of the coax. Coax only couples the receiver to the antenna. Except in rare circumstances in special designs, the coax itself is not the antenna. > My question is and I apologize if it is off topic for this group, but > does any one know where I could find plans to make a cheap active > antenna? It's all radio comm technology, which we all need to know, and antennas are a critical part of this. Not off topic. You do NOT need nor should you use an active antenna. Lots of problems. In 35 years of shortwave listening, I've never used anything other than wire antennas, for both receive and transmit, and I've logged well over 100 countries. Even spoke to the Space Shuttle once, and got a confirmation QSL card (postcard) from NASA. All you need is wire on your receiver. The more the better, but a little hunk of anything will work. I'm playing with a homemade receiver here, literally made on a cakepan with some old tubes from the barn, and all I have is some clipleads tied together and strung up the wall. Am hearing wall to wall stations. Get any scrap of telephone wire, electrical, hookup, anything. The more the better. Throw it out the window. If you're on the ground floor, throw it on top of some bushes. If on an upper floor, just let it hang down. If practical, connect one end to a tree with a piece of rope or plastic something as an insulator. For receive, nothing is critical. For HF, which I presume is where you are interested, just get metal out there. 20 feet will do a lot of good. 50 feet better. 100 feet superb. Capture area is what counts for your initial efforts. That means metal out there. Doesn't have to be heavy gauge wire, either. If you're in an apartment where you need to conceal it, unwind an old transformer to get several hundred feet of very fine wire which can be nearly invisible. Be sure to scrape the varnish off one end before connecting! You don't need a tuner or anything fancy. Just connect the end of the long wire to your antenna terminal. Learn something about HF propogation. Higher frequencies, for example, tend to work better during the day. Lower frequencies open up around sunset. Each band has its own peculiarities, which change from day to day. Learning them is part of the fun. Be patient, tune carefully, and stop and listen. Don't leap all over the bands looking for loud strong stuff. You'll find it, but miss a lot of the interesting lower powered stations. If you get serious, headphones make a difference. Try listening on the amateur (ham) bands, in the evenings 3.5 - 4.0 (80/75 meter wavelength) megacycles, and maybe 7.0 - 7.3 (40 meters) evenings or days. During the day, early on, look up 20 meters and 15 meters. Any issue of the annual Radio Amateur's Handbook will be of tremendous value to you. Monitoring Times magazine (who has a website) will give you some frequencies to tune for starting. Remember to be patient. There's a lot of very fascinating stuff to hear, but you have to be tuning carefully and listening closely to hear it. Practically anyone will hear spy numbers stations and Russian jamming stations which sound like buzzsaws. Sometimes you can hear the foreign broadcast station underneath the jamming the country does not want their people to hear. See if you can find radio station HCJB in Quito, Ecuador, Radio Nederlands in Hilversum, Holland, Deutche Welle in Germany, Radio Havana in Cuba, and good old Voice of America. All are very strong, and found in several places on the dial. Let us know how it goes. Regards ... Steve WA3SWS ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6936 From: Steve Uhrig Date: Wed Feb 19, 2003 8:26pm Subject: Re: window bounce countermeasure On 19 Feb 2003 at 10:50, Gregory Perry wrote: > This gadget is pretty neat, takes a standard audio source and > modulates it via suction cup to any surface, $29.99. Seems with the > right degree of tint and this with a pink noise source would make a > great countermeasure against laser listening devices: Yes, if you have a problem with laser listening devices. I've never seen one and have no concern about them as a hostile threat. Simpler would be just using white (pink) noise from an FM broadcast radio tuned between stations. That's an inexpensive source of nearly pure pink noise. Some years ago, Allied or one of them offered speaker drivers about the size of a fist with a threaded wood screw sticking out. You could thread the driver to sheetrock between studs, put some power in and it did a fairly decent job of reproducing the audio on the wallboard. I put a small plastic container of about 8 ounces onto the thing, fed it with 30 watts of ultrasonic (from an 807 oscillator, no less), and made an ultrasonic cleaner. Worked fine for cleaning small parts. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6937 From: Matt Paulsen Date: Wed Feb 19, 2003 8:57pm Subject: RE: Re: Taking a byte out of Baghdad -----Original Message----- From: R. Snyder [mailto:rds_6@y...] Sent: Wednesday, February 19, 2003 6:52 AM To: dennis.bergstrom@c... Cc: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Taking a byte out of Baghdad The popular press likes to use the term "virus" rather loosely. Given the ubiquitous usage of TCP/IP over twisted-pair ethernet, many potential vulnerabilities could be exploited without specific knowledge of A 12 year old can take out a network. It's easy to do and there's not a whole heck of a lot anyone could do to stop it. Give someone $300,000 worth of time and training and it's not a question of if but when. Want to be secure, don't run a network, simple. C2 it. 6938 From: Matt Paulsen Date: Thu Feb 20, 2003 1:13am Subject: Does it get CNN? http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=2908353930 6939 From: Hawkspirit Date: Thu Feb 20, 2003 10:20am Subject: Backdoor 11/18/2002 Entry: "NSA BACKDOOR IN EVERY MICROSOFT OPERATING SYSTEM" How NSA access was built into Windows Duncan Campbell Careless mistake reveals subversion of Windows by NSA. A CARELESS mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA "help information" trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled. The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA. Computer security specialists have been aware for two years that unusual features are contained inside a standard Windows software "driver" used for security and encryption functions. The driver, called ADVAPI.DLL, enables and controls a range of security functions. If you use Windows, you will find it in the C:\Windows\system directory of your computer. ADVAPI.DLL works closely with Microsoft Internet Explorer, but will only run crypographic functions that the US governments allows Microsoft to export. That information is bad enough news, from a European point of view. Now, it turns out that ADVAPI will run special programmes inserted and controlled by NSA. As yet, no-one knows what these programmes are, or what they do. Dr Nicko van Someren reported at last year's Crypto 98 conference that he had disassembled the ADVADPI driver. He found it contained two different keys. One was used by Microsoft to control the cryptographic functions enabled in Windows, in compliance with US export regulations. But the reason for building in a second key, or who owned it, remained a mystery. A second key Two weeks ago, a US security company came up with conclusive evidence that the second key belongs to NSA. Like Dr van Someren, Andrew Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had been probing the presence and significance of the two keys. Then he checked the latest Service Pack release for Windows NT4, Service Pack 5. He found that Microsoft's developers had failed to remove or "strip" the debugging symbols used to test this software before they released it. Inside the code were the labels for the two keys. One was called "KEY". The other was called "NSAKEY". Fernandes reported his re-discovery of the two CAPI keys, and their secret meaning, to "Advances in Cryptology, Crypto'99" conference held in Santa Barbara. According to those present at the conference, Windows developers attending the conference did not deny that the "NSA" key was built into their software. But they refused to talk about what the key did, or why it had been put there without users' knowledge. A third key?! But according to two witnesses attending the conference, even Microsoft's top crypto programmers were astonished to learn that the version of ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys. Brian LaMachia, head of CAPI development at Microsoft was "stunned" to learn of these discoveries, by outsiders. The latest discovery by Dr van Someren is based on advanced search methods which test and report on the "entropy" of programming code. Within the Microsoft organisation, access to Windows source code is said to be highly compartmentalized, making it easy for modifications to be inserted without the knowledge of even the respective product managers. Researchers are divided about whether the NSA key could be intended to let US government users of Windows run classified cryptosystems on their machines or whether it is intended to open up anyone's and everyone's Windows computer to intelligence gathering techniques deployed by NSA's burgeoning corps of "information warriors". According to Fernandez of Cryptonym, the result of having the secret key inside your Windows operating system "is that it is tremendously easier for the NSA to load unauthorized security services on all copies of Microsoft Windows, and once these security services are loaded, they can effectively compromise your entire operating system". The NSA key is contained inside all versions of Windows from Windows 95 OSR2 onwards. "For non-American IT managers relying on Windows NT to operate highly secure data centres, this find is worrying", he added. "The US government is currently making it as difficult as possible for "strong" crypto to be used outside of the US. That they have also installed a cryptographic back-door in the world's most abundant operating system should send a strong message to foreign IT managers". "How is an IT manager to feel when they learn that in every copy of Windows sold, Microsoft has a 'back door' for NSA - making it orders of magnitude easier for the US government to access your computer?" he asked. Can the loophole be turned round against the snoopers? Dr van Someren feels that the primary purpose of the NSA key inside Windows may be for legitimate US government use. But he says that there cannot be a legitimate explanation for the third key in Windows 2000 CAPI. "It looks more fishy", he said. Fernandez believes that NSA's built-in loophole can be turned round against the snoopers. The NSA key inside CAPI can be replaced by your own key, and used to sign cryptographic security modules from overseas or unauthorised third parties, unapproved by Microsoft or the NSA. This is exactly what the US government has been trying to prevent. A demonstration "how to do it" program that replaces the NSA key can be found on Cryptonym's website. According to one leading US cryptographer, the IT world should be thankful that the subversion of Windows by NSA has come to light before the arrival of CPUs that handles encrypted instruction sets. These would make the type of discoveries made this month impossible. "Had the next-generation CPU's with encrypted instruction sets already been deployed, we would have never found out about NSAKEY." 6940 From: James M. Atkinson Date: Thu Feb 20, 2003 1:32pm Subject: ACLU asks Supreme Court to hear appeal of wiretap ruling http://www.cnn.com/2003/LAW/02/19/wiretap.appeal/index.html ACLU asks Supreme Court to hear appeal of wiretap ruling From Kevin Bohn CNN Washington Bureau WASHINGTON (CNN) --In what it calls an unprecedented action, the American Civil Liberties Union, along with a coalition of other civil liberties groups, is asking the U.S. Supreme Court to overturn new, more lenient standards for wiretaps in foreign intelligence investigations. The case is unusual because the groups are suing on behalf of people who are under surveillance by the government, but the groups don't know the identities of the people under surveillance, how many people are involved or where they are. The coalition filed its request with the nation's high court Tuesday. If it takes the case, it would be the first opportunity for the Supreme Court to rule on the constitutionality of such wiretaps, known as FISAs for the act they are named after -- the Foreign Intelligence Surveillance Act. Last November the U.S. Foreign Intelligence Surveillance Court of Review, in its first ruling, decided behind closed doors that the Justice Department could meet what the civil rights groups consider more lenient standards in deciding when this type of wiretap could be used. Before the Patriot Act, foreign intelligence had to be a "primary" purpose of the investigation. Now, foreign intelligence has to be a "significant" purpose. The court overseeing the issuance of wiretaps had ruled against that interpretation last year, saying it was too broad. Although the groups petitioning the Supreme Court are not parties to the decision, they argued in their motion they should be allowed to appeal the ruling because the issue "should not be finally adjudicated by courts that sit in secret" and by courts that "allow only the government to appear before them." Justice Department officials emphasize that under law, prosecutors still have to show the court that would grant such wiretaps probable cause that the target of the surveillance is a "foreign power" or an "agent of a foreign power," and that there has been no relaxation of the basic requirements that must be met. "We do not enter into this litigation lightly," said Ziad Asali, president of the American-Arab Anti-Discrimination Committee, one of the groups asking the Supreme Court to take the case. "We firmly believe that these expanded powers erode the functionality and checks and balances of our judicial system." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6941 From: Does it matter Date: Thu Feb 20, 2003 10:17am Subject: Re: Does it get CNN? Interesting. What would you do with that? You get the land and the satellite but what can you do get free cable? listen to things in outer space? Replies are appreciated. --- In TSCM-L@yahoogroups.com, "Matt Paulsen" wrote: > http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=2908353930 6942 From: Stephen Pendergast Date: Thu Feb 20, 2003 1:38pm Subject: Re: Backdoor This may be a hoax. See http://hoaxinfo.com/nsacode.htm The Cryptonym web site http://www.cryptonym.com now comes up with a cryptic message "This page was left blank intentionally." Stephen L Pendergast 619 692-4400 x233 CACI Technologies 1011 Camino Del Rio South Suite 600 San Diego, CA 92108 6943 From: William Knowles Date: Thu Feb 20, 2003 2:27pm Subject: Re: Backdoor On Thu, 20 Feb 2003, Stephen Pendergast wrote: > This may be a hoax. See http://hoaxinfo.com/nsacode.htm > The Cryptonym web site http://www.cryptonym.com now comes up with a cryptic > message > > "This page was left blank intentionally." Its simple in my book, If you have the freedom to chose your operating system and don't trust Microsoft products, don't run it. :) The one necessary evil around here is M$ Office, and we're ramping up to OSX in the next few months. As for Cryptonym, try the Internet Wayback Machine... http://web.archive.org/web/*/http://www.cryptonym.com William Knowles wk@c... > Stephen L Pendergast > 619 692-4400 x233 > CACI Technologies > 1011 Camino Del Rio South Suite 600 > San Diego, CA 92108 *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 6944 From: Steve Uhrig Date: Thu Feb 20, 2003 2:45pm Subject: Re: Does it get CNN? On 20 Feb 2003 at 16:17, Does it matter u12armresl@y... wrote: > What would you do with that? You get the land and the satellite but > what can you do get free cable? listen to things in outer space? This is the antenna you need to get the ranges advertised by the spy shops for 2.4 gig wireless video transmitters and micro powered audio transmitters. Anyone should know that! Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6945 From: Steve Uhrig Date: Thu Feb 20, 2003 2:49pm Subject: Re: ACLU asks Supreme Court to hear appeal of wiretap ruling On 20 Feb 2003 at 14:32, James M. Atkinson wrote: > Justice Department officials emphasize that under law, prosecutors > still have to show the court that would grant such wiretaps probable > cause that the target of the surveillance is a "foreign power" or an > "agent of a foreign power," and that there has been no relaxation of > the basic requirements that must be met. As anyone who has been on the other side of the fence knows, all you need to do to slide through FISA is list a Hispanic surname on your long list of people in the 'Affidavit for Statement of Probable Cause'. Probably would fly with Jesus O'Brien Tortellini Moskowicz. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6946 From: Fernando Martins Date: Fri Feb 21, 2003 1:27am Subject: Re: Backdoor hhmmm the NSA Backdoor ... 1999? It was funny at the time that a german company became MS security partner, and while MS was explain them selfs, the german company on his site was offering solutions against that trojan. At the time I was cooperating with that german company, so I remember well that X-File story :> This is something that some crazy kid wrote in those days .... *** Subject: The Alien From Seatle (new X-File series) I wonder if you wonder what i'm wondering ... why Kitetoa and my self now, dedicated ourselfs in helping people about f00d hacks? Because its not a joke ... a joke was the answer i get from Microsoft Brasil about the NSAKey ("all X-Files is what you saying"), so this article is dedicated in his memory. Good Bless You!!!!!! (...) Following the X-Files new : The Alien from Seatle ... here it goes the resume of last episodes... 1# Alien Base in Brasil # http://www.iptvreports.mcmail.com/ic2kreport.htm#_Toc448565556102. In 1994, NSA intercepted phone calls between Thomson-CSF and Brazil concerning SIVAM, a $1.3 billion surveillance system for the Amazon rain forest. The company was alleged to have bribed members of the Brazilian government selection panel. The contract was awarded to the US Raytheon Corporation - who announced afterwards that "the Department of Commerce worked very hard in support of U.S. industry on this project".(69) Raytheon also provide maintenance and engineering services to NSA's ECHELON satellite interception station at Sugar Grove. 2# But ... what is ECHELON? ask Mulder # http://www.uol.com.br/idgnow/busca/0911b3.htm EU could start investigations about a U.S. spy net 09/11/98 The EU is considering an large investigation to find out if NSA is abusing his presence and his power of survailance over the Internet to spy private and goverment institutions. The NSA is responsable for manage a spy program codename Echelon, that came from the Could War. The Comite for Cientific and Technologic Options of European Parlement says that Echelon is a hiden spy worldwide network for communication interceptions like e-mail, phones, faxes, satellite and backbones. (!!!!!!!!!!!) It's all reported in a document "An Avaliation of Political Control Technologies", showing how NSA send intercepted information by satellite to Fort Meade, in Maryland U.S., from a hub based on Menwith Hill (near London UK) Daniel Verton - Federal Computer Week 3# What's a little spying between friends? # http://www.nandotimes.com/technology/story/body/0,1634,89923-142316-981920-0 ,00.html 4# Yeah ... and there is a lunatic spending money with that? bah ...# FY 1999 Defense Budget Documents: http://www.fas.org/man/docs/fy99/topics.htm Documents on Military Spending: http://www.fas.org/man/docs/index.html 5# OK ... now jump to the NSAKey subject or i'll shut this out # http://www.techweb.com/wire/story/TWB19990906S0003 Caspar Bowden said: "Building in a 'back up' key makes no sense unless there is a revocation method for the primary (key). There is no revocation method." http://www.fipr.org/ I don't believe them -- what kind of natural disaster are they talking about? A meteor destroying all the earth's structures?" said Privacy International director general, Simon Davies."Microsoft's argument is inconsistent with its operating procedure -- it could hold a single key in multiple locations, that is a standard security procedure." He added that to compromise user security, "it's not necessary to share access with the NSA -- simply complying with their requirements will do that." http://www.wired.com/news/news/technology/story/21589.html?wnpg=2 The _NSAKEY is one of two such keys buried deep in the cryptography source code of most Windows operating systems. In other reports, Microsoft said that the _NSAKEY is still a Microsoft-controlled key that will serve as a backup in the event that the first key is compromised. That just doesn't make sense, Fernandes said. "If they lost the first key which is the equivalent to them losing the Windows source code, then that would be okay, they could just start using the backup key." Crypto expert Marc Briceno did have another word for it: "feeble." "I must say I do not believe Microsoft's present explanation that the presence of the _NSAKEY corresponds to standard practices in software development," said Marc Briceno, director of the Smartcard Developer Association. (http://www.scard.org/) "There is no technical reason for Microsoft to include a second security module verification key in their operating system ... to mark the passing of export requirements," Briceno said. 6#Le Grand Finale (only for truely hardcore fanatics) Crypto AG: The NSA's Trojan Whore? http://caq.com/cryptogate ********* Don't loose the next episodes ... "While Alien Bill finish his Trojan2000, anonymnous sources that want to keep it that way, indeed had report from a trusted 3rd party the clame for the hack on http://www.trojan2000test.com/" the MP3 version is avaiable on the holly powerfull knowledge base www.antionline.com (tm) ********* Bacano (tm) Esoteric Pizza Research Team (tm) CopyThis8=> (c) 1999 ---------------------------------------------------------------------------- ---- 6947 From: Hawkspirit Date: Fri Feb 21, 2003 11:52am Subject: Sweep Needed Office sweep needed for Houston Texas area, contact me today Friday if possible, I will be out of the office sweeping all weekend. Roger Tolces Electronic Security Co. 323-462-1351 6948 From: James M. Atkinson Date: Fri Feb 21, 2003 10:23pm Subject: AIRLINE TALK All too rarely, airline attendants make an effort to make the in-flight "safety lecture" and their other announcements a bit more entertaining. Here are some real examples that have been heard or reported: ******************************** On a Continental Flight with a very "senior" flight attendant crew, the pilot said, "Ladies and gentlemen, we've reached cruising altitude and will be turning down the cabin lights. This is for your comfort and to enhance the appearance of your flight attendants." ******************************** On landing, the stewardess said, "Please be sure to take all of your belongings. If you're going to leave anything, please make sure it's something we'd like to have." ******************************** There may be 50 ways to leave your lover, but there are only 4 ways out of this airplane" ******************************** "Thank you for flying Delta Business Express. We hope you enjoyed giving us the business as much as we enjoyed taking you for a ride." ******************************** As the plane landed and was coming to a stop at Ronald Reagan, a lone voice came over the loudspeaker: "Whoa, big fella. WHOA!" ******************************** After a particularly rough landing during thunderstorms in Memphis, a flight attendant on a Northwest flight announced, "Please take care when opening the overhead compartments because, after a landing like that, sure as hell everything has shifted." ******************************** From a Southwest Airlines employee: "Welcome aboard Southwest Flight 245 to Tampa. To operate your seat belt, insert the metal tab into the buckle, and pull tight. It works just like every other seat belt; and, if you don't know how to operate one, you probably shouldn't be out in public unsupervised." ******************************** "In the event of a sudden loss of cabin pressure, masks will descend from the ceiling. Stop screaming, grab the mask, and pull it over your face. If you have a small child traveling with you, secure your mask before assisting with theirs. If you are traveling with more than one small child, pick your favorite." ******************************** Weather at our destination is 50 degrees with some broken clouds, but we'll try to have them fixed before we arrive. Thank you, and remember, nobody loves you, or your money, more than Southwest Airlines." ******************************** "Your seat cushions can be used for flotation; and, in the event of an emergency water landing, please paddle to shore and take them with our compliments." ******************************** "Should the cabin lose pressure, oxygen masks are in the overhead area. Please place the bag over your own mouth and nose before assisting children .. or other adults acting like children." ******************************** "As you exit the plane, make sure to gather all of your belongings. Anything left behind will be distributed evenly among the flight attendants. Please do not leave children or spouses." ******************************** And from the pilot during his welcome message: "Delta airlines is pleased to have some of the best flight attendants in the industry. Unfortunately, none of them are on this flight!" ******************************** Heard on Southwest Airlines just after a very hard landing in Salt Lake City: The flight attendant came on the intercom and said, "That was quite a bump, and I know what y'all are thinking. I'm here to tell you it wasn't the airline's fault, it wasn't the pilot's fault, it wasn't the flight attendant's fault ...it was the asphalt." ******************************** Overheard on an American Airlines flight into Amarillo, Texas, on a particularly windy and bumpy day: During the final approach, the Captain was really having to fight it. After an extremely hard landing, the Flight Attendant said, "Ladies and Gentlemen, welcome to Amarillo. Please remain in your seats with your seat belts fastened while the Captain taxis what's left of our airplane to the gate!" ******************************** Another flight attendant's comment on a less than perfect landing:"We ask you to please remain seated as Captain Kangaroo bounces us to the terminal." ******************************** An airline pilot wrote that on this particular flight he had hammered his ship into the runway really hard. The airline had a policy which required the first officer to stand at the door while the Passengers exited, smile, and give them a "Thanks for flying our airline." He said that, in light of his bad landing, he had a hard time looking the passengers in the eye, thinking that someone would have a smart comment. Finally everyone had gotten off except for a little old lady walking with a cane. She said, "Sir, do you mind if I ask you a question?" "Why, no, Ma'am," said the pilot. "What is it?" The little old lady said, "Did we land, or were we shot down?" ******************************** After a real crusher of a landing in Phoenix, the Flight Attendant came on with, "Ladies and Gentlemen, please remain in your seats until Capt. Crash and the Crew have brought the aircraft to a screeching halt against the gate. And, once the tire smoke has cleared and he warning bells are silenced, we'll open the door and you can pick your way through he wreckage to the terminal." ******************************** Part of a flight attendant's arrival announcement: "We'd like to thank you folks for flying with us today. And, the next time you get the insane urge to go blasting through the skies in a pressurized metal tube, we hope you'll think of US Airways." ******************************** A plane was taking off from Kennedy Airport. After it reached comfortable cruising altitude, the captain made an announcement over the intercom, "Ladies and gentlemen, this is your captain speaking. Welcome to Flight Number 293, nonstop from New York to Los Angeles. The weather ahead is good and, therefore, we should have a smooth and uneventful flight. Now sit back and relax... OH, MY GOD!" Silence followed, and after a few minutes, the captain came back on the intercom and said, "Ladies and Gentlemen, I am so sorry if I scared you earlier. While I was talking to you, the flight attendant accidentally spilled a cup of hot coffee in my lap. You should see the front of my pants!" A passenger in Coach yelled, "That's nothing. You should see the back of mine!" ******************************** Heard on a Southwest Airline flight. "Ladies and gentlemen, if you wish to smoke, the smoking section on this airplane is on the wing and if you can light 'em, you can smoke 'em." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6949 From: kondrak Date: Sat Feb 22, 2003 4:10am Subject: Heres a weird one.. Have a "customer" who's complaining of surveillance. Did the normal checking of house, work, phones, lan and vehicles... Found nothing of note until I did a UV scan of his cars and SUV. Found a dab of what appears to me to be silastic, (silicone rubber) on both the front windshield, and the back window that fluoresce under long wave Ultra-violet. They were disguised as a bug splot, (highly unusual as this is cold winter time). Both of these are highly UV reactive. I scraped them off and they are on their way to a lab, but they fluoresce under a normal long-wave blacklight, like one would see in a disco. Illuminating them with a medium power UV lamp, (at 100') I could pick them up at about a quarter mile with a rifle-scope trained on them, even though they produced negligible close up indications they were illuminated. Anyone see this stuff before? If so, whom. 6950 From: Mitch D Date: Sat Feb 22, 2003 8:31am Subject: WTB used or new CanonXL1S ( off topic) If anyone on the list has a excellent reliable source for purchasing a new, or has a good used Canon XL1S dig camcorder pls contact me off the list. Thanks Mitch __________________________________________________ Do you Yahoo!? Yahoo! Tax Center - forms, calculators, tips, more http://taxes.yahoo.com/ 6951 From: Matt Paulsen Date: Sat Feb 22, 2003 11:33am Subject: recent incident. Recently had a location that had all the suspicious signs of corporate espionage - ceo's secretary's workstation was attacking the server systems and mis's systems, but no one else. Local antivirus only picked up 1 virus and couldn't wipe it. Tools were showing that the workstation had a keystroke logger in it, as well as it attempting to email to an aol gateway and also attempting smb pipes to propagate - but only to executive and high level network administration systems. Now the first question is, what sort of virus would have a keystroke logger, mail subsystem and propagation system in this manner.. None really... So, a remote scan of the system was done, and it turned out that 4 virii were detected through this method. Long story short - scan once locally, scan twice remotely and don't get too paranoid. 6952 From: kondrak Date: Sat Feb 22, 2003 8:22pm Subject: Re: Fw: Heres a weird one.. Interesting....yes, Isopropyl 70% washed all traces off after the silicone was scraped off with a razor blade. I used surgical gloves when I removed it, so no skin contact occurred. I'll look up that dye...I'm familiar with that kind of usage, used to do ultrasound inspection of graphite materials. At 15:43 2/22/03 -0500, you wrote: >Hi Kondrak >I am a non destructive certified Inspector with General Electric Aircraft >Engines 23YRS >The dye used to be called turco P41 which is non water soluble, you need a >solvent ALCOHOL to completely remove its flurense from the windshield and >your hands. >It does not wash off with soap and water you will need surgical hand soap to >break it down what we call emulsify the chemical. >If its in your cloths it will not wash out you can take them to the dry >cleaners to have them dry cleaned which will remove the dye. > >FPI -FLURENSENT PENETRANT INSPECTION is used in the Aircraft industry to >locate cracks in metals and it can be used on some plastic. >Heat make the dye more illuminate. >The dye can be bought in a spray can easily obtainable. >ANDRE HOLMES >----- Original Message ----- >From: "kondrak" >To: >Sent: Saturday, February 22, 2003 5:10 AM >Subject: [TSCM-L] Heres a weird one.. > > > > Have a "customer" who's complaining of surveillance. > > Did the normal checking of house, work, phones, lan and vehicles... > > > > Found nothing of note until I did a UV scan of his cars and SUV. > > > > Found a dab of what appears to me to be silastic, (silicone rubber) on >both > > the front windshield, and the back window that fluoresce under long wave > > Ultra-violet. They were disguised as a bug splot, (highly unusual as this > > is cold winter time). > > > > Both of these are highly UV reactive. I scraped them off and they are on > > their way to a lab, but they fluoresce under a normal long-wave >blacklight, > > like one would see in a disco. > > > > Illuminating them with a medium power UV lamp, (at 100') I could pick >them > > up at about a quarter mile with a rifle-scope trained on them, even though > > they produced negligible close up indications they were illuminated. > > > > Anyone see this stuff before? If so, whom. > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > 6953 From: Michael Puchol Date: Sun Feb 23, 2003 4:34am Subject: Re: recent incident. Hi Matt, Good advice - I'm going to add my own grain of sand to the paranoia scale. Last night I was at a costumer's offices, where they had reported "unusual activity" in their server and some workstations. Apparently, they had installed McAffee's VirusScan Online, which works by both a real-time system hook detection method, file-access and user-launched scans, combined with automatic updates of the engine and signature files. I've tried it and works reasonably well. In this case, the server had been infected by Code Red (always patch thy systems!), and for whatever reason VirusScan wasn't picking it up. I contacted McAfee support, and to my surprise, their antivirus does NOT support Windows 2000 Server. This seemed strange since I have another server with it installed and it appeared to do it's job - but no. Obviously I was a tad dissapointed with McAffee to even allow installation of the antivirus without any checking of the operating system version (even the most basic installers can do this), thus giving this costumer a false sense of security. Being in a bit of a hurry to get this costumer up and running again, I installed CA's InoculateIT on the server, which successfully picked up the virus (but couldn't delete it), and ran a normal scan of the system. Next week I'll install Symantec's virus scanner, which has centralised management and some other neat features (and works on servers). The moral of the story: always check system requirements before installing an antivirus, firewall, IDS or other security software. If in doubt, ask the manufacturer. If then still in doubt, try it on an isolated test machine before deploying it. Apart from this, I've seen viruses which disable firewall software, install keyloggers, propagate via SMB, etc. This is not uncommon, and it wouldn't be hard to write something which combined some of these 'features'. Regards, Mike ----- Original Message ----- From: "Matt Paulsen" To: Sent: Saturday, February 22, 2003 6:33 PM Subject: [TSCM-L] recent incident. > Recently had a location that had all the suspicious signs of corporate > espionage - ceo's secretary's workstation was attacking the server systems > and mis's systems, but no one else. Local antivirus only picked up 1 virus > and couldn't wipe it. Tools were showing that the workstation had a > keystroke logger in it, as well as it attempting to email to an aol gateway > and also attempting smb pipes to propagate - but only to executive and high > level network administration systems. > > Now the first question is, what sort of virus would have a keystroke logger, > mail subsystem and propagation system in this manner.. None really... So, a > remote scan of the system was done, and it turned out that 4 virii were > detected through this method. > > Long story short - scan once locally, scan twice remotely and don't get too > paranoid. 6954 From: Date: Thu Feb 20, 2003 9:16am Subject: Re: Backdoor In a message dated 2/20/2003 12:14:55 PM Pacific Standard Time, spendergast@c... writes: > > This may be a hoax. No good citizen always trusts his government and Microsoft. [Non-text portions of this message have been removed] 6955 From: Dave Emery Date: Thu Feb 20, 2003 2:47pm Subject: Re: Backdoor On Thu, Feb 20, 2003 at 11:38:23AM -0800, Stephen Pendergast wrote: > > This may be a hoax. See http://hoaxinfo.com/nsacode.htm > The Cryptonym web site http://www.cryptonym.com now comes up with a cryptic > message > "This page was left blank intentionally." > For what little it is worth, the story going around in the crypto research community has been that this was a second backup key provided at the suggestion of NSA (but not by NSA) to handle the contingency that Microsoft's primary code signing key had been compromised or lost. There was quite extensive discussion of this in crypto circles some time ago. -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 6956 From: Dragos Ruiu Date: Fri Feb 21, 2003 4:53am Subject: GPS/GSM tracking Pertinent to an old thread on here, I thought some people here might be interested to know that this month's Circuit Cellar magazine has schematics and construction details for a small self contianed unit that sends GPS positional info with 1-25m resolution every two seconds via GSM SMS messages. cheers, --dr -- dr@k... pgp: http://dragos.com/ kyxpgp http://cansecwest.com 6957 From: Craig Snedden Date: Fri Feb 21, 2003 2:05pm Subject: GSM/Nextel and Roaming (a bit o/t) Hi all, Apologies that this post is a bit off topic, but I am having difficulty in getting an answer to this question and I am sure there is more than enough expertise in this list to provide the answer.... So here goes. I am travelling from the UK to the US (Nevada) next week and have been told (again!) that my triband gsm phone will be fine (yes roaming is enabled etc. etc.) However, I have been told that for the area that I will be in, Nextel is the best carrier. As I understand, Nextel is not a GSM based system, but iDen, therefore my GSM phone, triband or not won't work... Correct assumption? My question is this, do I simply try getting service with a GSM carrier in the area and trust to luck, or do I try to get a Nextel compatible handset and if I do, will my GSM sim chip fit in a Nextel phone...? (I want to be able to get calls in the normal way while I am away from homebase and not have to pick up voicemails by calling from another phone). Having fallen foul of this before (travelling to Florida.... "Oh yes, your phone will work all over Florida..." Only to find that the part of Florida I was in only got PCN coverage!!!) I don't want to be left in the dark again. Any suggestions? Thanks guys, Best regards. Craig --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.456 / Virus Database: 256 - Release Date: 18/02/2003 [Non-text portions of this message have been removed] 6958 From: Ocean Group - MU TSD Date: Sat Feb 22, 2003 10:37am Subject: Bluetooth Security Hi, We've recently been working with a company who's management use wireless bluetooth access by using headsets for their mobile phones. We've been considering weather to add this to our risk evaluations. We did feel that with its power output 0.25mW or so the risk of using it in their offices and on compnay premises was somewhat acceptable. However we concluded that outside the office, in specific high risk scenario's, such as sitting in their car or on a train etc it would allow someone alot of time to work on compromising the situation. Basically I was wondering if anyone has had to deal with this threat and does anyone know of any papers on bluetooth encryption and the strenght of its security implmmentations. If I went on previous wireless implementations, such as the standard wireless lan etc I wouldn't hold alot of faith and would probably have to advise clients not to use it outside of premises etc. At least until I had seen some risk evaluations from some tech labs etc. If I remember rightly even the GSM ciphers, AS1/2? were compromised with a couple of basic PC setups, however GSM isn't on my agenda at the moment but I will revisit it later. Anyway, any thoughts or information links would be appreciated. Kind regards Oisin Ocean Group, Technical Security Division, Ireland. 6959 From: Date: Sat Feb 22, 2003 0:19pm Subject: Rif: recent incident. > Long story short - scan once locally, scan twice remotely and don't get too > paranoid. I beg to differ: the Three Laws of Paranoia clearly state: 1) Paranoia is never enough; 2) When you get sufficiently paranoic , you'll chase false alarms; 3) It's better to chase a false alarm, than not following up. :-) Ciao! Remo Cornali 6960 From: Date: Sat Feb 22, 2003 6:43pm Subject: Re: Heres a weird one.. Scan the house, windows and walls, doors, back of chairs, inside walls with widow exposures. If you have the time, scan the whole house. Scan wardrobe (especially outer garments). Check the shoes. Nothing on the tires? Email me if you need more. At 04:10 2/22/03, kondrak wrote: >Have a "customer" who's complaining of surveillance. >Did the normal checking of house, work, phones, lan and vehicles... > >Found nothing of note until I did a UV scan of his cars and SUV. > >Found a dab of what appears to me to be silastic, (silicone rubber) on both >the front windshield, and the back window that fluoresce under long wave >Ultra-violet. They were disguised as a bug splot, (highly unusual as this >is cold winter time). > >Both of these are highly UV reactive. I scraped them off and they are on >their way to a lab, but they fluoresce under a normal long-wave blacklight, >like one would see in a disco. > >Illuminating them with a medium power UV lamp, (at 100') I could pick them >up at about a quarter mile with a rifle-scope trained on them, even though >they produced negligible close up indications they were illuminated. > >Anyone see this stuff before? If so, whom. > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6961 From: Valance Date: Sun Feb 23, 2003 0:57pm Subject: Re: recent incident. which strain of Code Red did you identify on this server? and just curious, given you ID'd it before McAfee could try, what was the telling symptom that let you know the server was infected? a root.exe file or a hacked index.asp? could netstat find a backdoor on a listening port? the reasons i am curious is that the later Code Red strain is a trojan and anti-virus suites are very limited in their trojan functions. few people know this and think trojans are actually virii and that good ole McAfee will take care of everything. generally, trojans need to be removed manually by editing the registry and deleting the individual polymorphically named files that the registry has generated. and as far as detecting their presence, AV suites are not the best choice. you really need to use an anti-trojan suite like TDS (Trojan Defense Suite), learn the function of all the TCP and UDP ports and how to monitor the ports' behavior on the server. the best site around, i think, to start is: http://tds.diamondcs.com.au/html/danger.htm - you will be able to download trial versions of their software and learn about vulnerable ports and over 20,000 strains of trojans. it's fun. but you know, it sounds like your McAfee guy may not have been the expert about the difference between virii and trojans and responded with anything they thought you might believe rather than actual information. i know McAfee supports Win2000 and it says so on their site: http://www.mcafee.com/myapps/vs7/default.asp#sysReq (VirusScan software system req). however, i know when i used to test trojans for their spy capabilities in the pre-911 days, we had McAfee installed on W98 and it never found any of the trojans we tested, even though some of their names did appear in McAfee's virus definitions list. we would laugh and pin a red PhD, BS sticker on their boxes :) kk --- In TSCM-L@yahoogroups.com, "Michael Puchol" wrote: > Hi Matt, > > Good advice - I'm going to add my own grain of sand to the paranoia scale. > Last night I was at a costumer's offices, where they had reported "unusual > activity" in their server and some workstations. Apparently, they had > installed McAffee's VirusScan Online, which works by both a real- time system > hook detection method, file-access and user-launched scans, combined with > automatic updates of the engine and signature files. I've tried it and works > reasonably well. > > In this case, the server had been infected by Code Red (always patch thy > systems!), and for whatever reason VirusScan wasn't picking it up. I > contacted McAfee support, and to my surprise, their antivirus does NOT > support Windows 2000 Server. This seemed strange since I have another server > with it installed and it appeared to do it's job - but no. Obviously I was a > tad dissapointed with McAffee to even allow installation of the antivirus > without any checking of the operating system version (even the most basic > installers can do this), thus giving this costumer a false sense of > security. > > Being in a bit of a hurry to get this costumer up and running again, I > installed CA's InoculateIT on the server, which successfully picked up the > virus (but couldn't delete it), and ran a normal scan of the system. Next > week I'll install Symantec's virus scanner, which has centralised management > and some other neat features (and works on servers). > > The moral of the story: always check system requirements before installing > an antivirus, firewall, IDS or other security software. If in doubt, ask the > manufacturer. If then still in doubt, try it on an isolated test machine > before deploying it. > > Apart from this, I've seen viruses which disable firewall software, install > keyloggers, propagate via SMB, etc. This is not uncommon, and it wouldn't be > hard to write something which combined some of these 'features'. > > Regards, > > Mike > > > ----- Original Message ----- > From: "Matt Paulsen" > To: > Sent: Saturday, February 22, 2003 6:33 PM > Subject: [TSCM-L] recent incident. > > > > Recently had a location that had all the suspicious signs of corporate > > espionage - ceo's secretary's workstation was attacking the server systems > > and mis's systems, but no one else. Local antivirus only picked up 1 > virus > > and couldn't wipe it. Tools were showing that the workstation had a > > keystroke logger in it, as well as it attempting to email to an aol > gateway > > and also attempting smb pipes to propagate - but only to executive and > high > > level network administration systems. > > > > Now the first question is, what sort of virus would have a keystroke > logger, > > mail subsystem and propagation system in this manner.. None really... So, > a > > remote scan of the system was done, and it turned out that 4 virii were > > detected through this method. > > > > Long story short - scan once locally, scan twice remotely and don't get > too > > paranoid. 6962 From: refmon Date: Sun Feb 23, 2003 4:17pm Subject: re: recent incident Hi, This is my first post here- the name is John Collins; I have been learning a great deal, thank you all. With regard to this virus issue outlined in this thread, while we are not PC or MAC mechanics of the most elite species, we have had some experience with odd PC behaviors and also misbehavior of antivirus programs. We are running mixes of Win95, Win98, Win2000 and using various vintages of Norton Utilities with Antivirus...oddly, the older equipment with the older versions seem much more stable in the long term....less mysteries, less hard crashes. Maybe the older equipment doesn't support the newer viruses? We have a fairly simple, high quality network consisting at this time, of two Dell 2.5GHz P4 PC's a couple of printers, and a CAD plotter in the main office AND a remote lab with two Radisys Telco 5500 server chassis running as plain PC's, 2 Dell PII 266MHz PC's and a local HP AdvanceStack hub. The remote lab prints and plots to the office. The entire system is hung on a DSL modem with a SonicWall Firewall (pretty bulletproof itself, but really poor support experiences). We have experienced several issues with piggy-backed viruses that slip in on downloads and emails...most are snagged by either my AV or Wormguard software. I currently have one PC out of service after a download carrying a fairly violent "thing" that took out all drivers, took antivirus offline, and triggered a reboot. Actually what happened is the registry was trashed and then the reboot restored things automatically except the behavior of AV was highly modified and the "thing" had heavily installed itself. At the first sign of odd behavior, we pull the network connections to isolate the problem ... hopefully. We also periodically back up the registry files in a mis-named directory with the files misnamed so viral sweeps don't find the backups...this is at best a minor help. The Modified AV protected itself from my attempts to shut it off and fought violently with me as I tried to troubleshoot. I finally rebooted in DOS and manually deleted all the AV directories and the registry files. I then rebooted and lo and behold, had a perfectly working PC (that I don't trust)...the Antivirus, to an extent, had been turned against me, or rather the PC. I have had to set up a two-PC-network and recover files of value and rescan the files for viruses, worms, spyware, and trojans. I'm coming up with quite a collection - mostly spyware, one alleged Trojan (not clear...behaves like...), several older viruses including "monkey B", which is at least 6 years old. (The current config/build on this PC is less than 1 year old). This PC will be burned to the ground and rebuilt after preliminary disk-wipes. The disk will then be hung on another scsi PC bus and wiped to a pass depth of about 6 - 8 passes. The PC will then be rebuilt. Oddly enough, all other PC's check clean and exhibit none of the odd behaviors...it seems the single Radisys was targeted. We have also found that as the paranoia level rises, we set our protections tighter and tighter. We're finding you can set too tight to the point where virus scans, cleansweeps, and registry sweeps can mistake innocent software for viruses, etc. Symptoms of this include mysterious halting of accessory operation (driver gets nabbed). I have no pat answers, to be sure, although we are revising our browsing procedures, which have been quite lax, so as to put some common sense out front... in our office we don't have the rampant personal use on the business net problem, but we have leaned very heavily on firewalls and AV and wormguard software. Our immediate goal is to reduce exposure. In addition to common sense browsing, email usage, etc, we are taking to shutting down PC's instead of allowing them to idle during unused periods. Further, we are disabling "auto update" functions in windows, antivirus, etc. Any updates will be managed manually, thus managing trips out on the internet. Additionally, as we wrestle with this stuff, we've learned that a lot of malicious code depends heavily on sharing paths...we are entirely reevaluating our shared resources setup. Obviously, there is no single fix or software package that can deal with this...I do not envy the IT guys in larger companies that do not run constant training and security sweeps. thanks for listening John Collins President, Reference Video, Inc. Oregon _________________________________________________________ Hi Matt, Good advice - I'm going to add my own grain of sand to the paranoia scale. Last night I was at a costumer's offices, where they had reported "unusual activity" in their server and some workstations. Apparently, they had installed McAffee's VirusScan Online, which works by both a real-time system hook detection method, file-access and user-launched scans, combined with automatic updates of the engine and signature files. I've tried it and works reasonably well. In this case, the server had been infected by Code Red (always patch thy systems!), and for whatever reason VirusScan wasn't picking it up. I contacted McAfee support, and to my surprise, their antivirus does NOT support Windows 2000 Server. This seemed strange since I have another server with it installed and it appeared to do it's job - but no. Obviously I was a tad dissapointed with McAffee to even allow installation of the antivirus without any checking of the operating system version (even the most basic installers can do this), thus giving this costumer a false sense of security. Being in a bit of a hurry to get this costumer up and running again, I installed CA's InoculateIT on the server, which successfully picked up the virus (but couldn't delete it), and ran a normal scan of the system. Next week I'll install Symantec's virus scanner, which has centralised management and some other neat features (and works on servers). The moral of the story: always check system requirements before installing an antivirus, firewall, IDS or other security software. If in doubt, ask the manufacturer. If then still in doubt, try it on an isolated test machine before deploying it. Apart from this, I've seen viruses which disable firewall software, install keyloggers, propagate via SMB, etc. This is not uncommon, and it wouldn't be hard to write something which combined some of these 'features'. Regards, Mike ----- Original Message ----- From: "Matt Paulsen" To: Sent: Saturday, February 22, 2003 6:33 PM Subject: [TSCM-L] recent incident. > Recently had a location that had all the suspicious signs of corporate > espionage - ceo's secretary's workstation was attacking the server systems > and mis's systems, but no one else. Local antivirus only picked up 1 virus > and couldn't wipe it. Tools were showing that the workstation had a > keystroke logger in it, as well as it attempting to email to an aol gateway > and also attempting smb pipes to propagate - but only to executive and high > level network administration systems. > > Now the first question is, what sort of virus would have a keystroke logger, > mail subsystem and propagation system in this manner.. None really... So, a > remote scan of the system was done, and it turned out that 4 virii were > detected through this method. > > Long story short - scan once locally, scan twice remotely and don't get too > paranoid. From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 7:56pm Subject: Who's bugging you on the Web? Who's bugging you on the Web? http://www.localbusiness.com/Story/0,1118,NOCITY_639140,00.html INTERNET By Wayne Carter, LocalBusiness.com Feb 20, 2001 08:04 AM ET NEWS ANALYSIS DALLAS, Feb. 20 (LocalBusiness.com) -- Surveillance bugs are to most people the stuff of spy novels and TV and movie crime dramas, but many people are getting bugged every day. But rather than searching frantically for little listening devices planted in their offices, homes and cars to ferret out the intruders, they need only look at their computers. Every time a person visits the Internet, it is likely that they activate what has become known as a Web bug, a small, transparent bit of HTML code that tracks their movements within a site -- sometimes all over the Web -- during a surfing session. Dallas-based Privacy Council, which helps companies protect their privacy and that of their customers on the Web, recently cut a deal with Pittsburgh, Penn.-based iventurelab to provide bug-detection capabilities. Iventurelab runs a Web-based service that detects Web bugs, and Privacy Council will provide that service to its customers. But Privacy Council and iventurelab see bugs as more than a privacy issue. "Part of our methodology is to address security as well as privacy," said Kevin Robertson, Privacy Council's technology vice president. "Web bugs are one of many concerns." Evolution under watch Web bugs, much like cockroaches in the natural world, apparently have been scurrying around from the beginning. HTML is the programming language used to build Web pages, and it's just a matter of using a few special HTML bricks to plant a Web bug on a site. "Those things are known by several names -- bots, applets, bugs -- and they're all little pieces of intelligence that gather information, said Bob Wesolek, chief financial officer at Houston-based Sharp Technology Inc. Bugs are related to cookies, the digital ID tags that Web pages store in people's browsers, but there are key differences. While cookies are used to gather data about Web surfers' habits, they also serve a useful purpose. When a person logs onto a stock-trading portal where they have an account, for instance, a cookie can cause the site to immediately display that person's name and account data. And Web browsers can be set to decline cookies outright or ask for permission to accept them. Web bugs, on the other hand, start surreptitiously gathering data about surfers as soon as they hit a Web page containing a bug. And there is disagreement among experts on just what those bugs are doing. Inquisitiveness or espionage? Ryan Russell, an incident analyst at San Mateo, Calif.-based SecurityFocus.com, said Web bugs are just marketing tools. "All they're interested in is gathering information so they can target marketing [efforts] better," he said. That includes popping up banner ads that should be of interest, among other things. But Tommy Wang, iventurelab's founder and chief executive officer, believes they've become more than that. "We have identified four classes and multiple classes under each type," Wang said. "There are identity tracking devices and some that can steal contact lists and other vital information. They can really access your computer." Wesolek downplayed the likelihood of such capabilities. He said security threats still are mostly from hackers, people looking to use electronic connections to access and manipulate computer systems, not automated spying devices brought in unknowingly from the Web. "We're not aware of any [Web bugs] that are that interactive," he said. "They're limited to doing things using the capabilities of the browser." Russell agreed. "Stealing [information] is a leap, but there is tracking going on," he said. "If you somehow forward [a bug] to other people, they activate the bug, and it can see who else it's going to, and that information can be used to correlate marketing ideas." Jeff Havrilla is an Internet security analyst at the CERT Coordination Center in Carnegie Mellon University's Software Engineering Institute. He said a greater security concern is applications written in Java or ActiveX, which are more powerful than true Web bugs. And while Web browsers can catch such intruders, it's also easy for them to slip past the guard. "The major Web browsers, Netscape and Internet Explorer, can catch those things," he said. "But they [are programmed to] detect Western or Latin characters, and unfamiliar characters may not be detected. And browser defaults are set to download [those applications] without notification. That's something we're trying to make people aware of." Causes for concern While Havrilla agreed that Web bugs are currently harmless aside from privacy concerns, he said creative programming could turn them to more sinister use. Third parties often are aggregating data collected by Web bugs, whether it's a marketing firm hired by the site operator or another company that wants to target the same basic audience as the Website where the bug is planted. Security holes in Web pages could let unscrupulous operators use Web bugs as portals to hit users with unwelcome applications using an unsuspecting Web site as the conduit. And caching, which allows small versions of Web pages and other images to be stored so they'll load faster on subsequent visits, could allow Web bugs to hide in users computers and perform ongoing surveillance. "That might become a security concern, but no one has fully thought that out," Havrilla said. Even if Web bugs never pose more than a minor security threat, Privacy Council believes companies should still take them very seriously. Privacy concerns have many people leery of the Web, and people want to know up front what information is gathered about them and how it's used. That's where privacy policies come into play. Privacy Council believes many companies, especially those that have acquired other companies' Web sites, may be unknowingly violating their own privacy policies by using Web bugs to gather information. "We plan to use [inventurelab] to help companies identify tracking devices they're using intentionally or unintentionally," Robertson said. Wayne Carter covers the Dallas region for LocalBusiness.com. E-mail him with story ideas or comments. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2523 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 8:03pm Subject: US shocked by Russia's £1m FBI spy US shocked by Russia's £1m FBI spy http://www.theherald.co.uk/news/archive/21-2-19101-0-36-18.html ANNETTE McCANN AN FBI counter-intelligence expert was last night charged with spying for Russia to earn £1m in cash and diamonds from the Kremlin. Robert Philip Hanssen, 56, and a father of six, could face the death penalty if he is convicted of involvement in what experts called one of the worst espionage cases in recent US history. His work, which is believed to have involved exposing three Russian intelligence agents in the pay of the US government, two of whom were later executed, could be linked to the notorious case of CIA spy Aldrich Ames. The White House said last night that George W Bush, the US president, had been told of the case before the arrest of Hanssen, who is only the third FBI agent ever to be accused of spying. Mr Bush said anyone who betrayed their country would be rooted out and brought to justice. "Allegations of espionage of an FBI counter-intelligence agent are extremely serious and are deeply disturbing," Mr Bush told reporters aboard Air Force One en route to St Louis. "Allegations of espionage are a reminder that we live in a dangerous world, a world that sometimes does not share American values," Mr Bush said. He had "the utmost confidence" in "the men and women who serve in the FBI, those who represent our country in the CIA and in the Justice Department. "I thank the men and women who proudly serve our country. But anyone who would betray this trust, I warn you, we'll find you and bring you to justice." Mr Hanssen was arrested at his home in the suburbs of Washington on Sunday night shortly after agents saw him deposit a package of classified information at a "dead drop" in a Virginia state park. The Russians, whom Louis Freeh, FBI director, said never knew the real identity of the double agent they code-named "Ramone", left £34,000 at another site on Sunday for Hanssen to collect, but he never reached it. Hanssen had apparently volunteered his services as a spy to the Soviet Union when he was based in New York in 1985. He had been paid in money and diamonds - at least £412,000 in cash over the years. Mr Freeh said last night that Hanssen's alleged conduct "represented the most traitorous actions imaginable", adding that the £34,000 was "his bread and butter for many, many years". John Ashcroft, attorney general, said the actions of the double agent had exposed America as an "international target in a dangerous world". He is accused amongst other charges of disclosing the identity of two KGB officials, who were first compromised by Ames and had been recruited by the government to serve as "agents in place" at the Soviet embassy in Washington. When these two KGB returned to Moscow, they were tried on espionage charges and executed. Mr Ashcroft added: "The arrest of Robert Hanssen for espionage should remind us all and every American should know that our nation, our free society is an international target in a dangerous world. "In fact, the espionage operations designed to steal vital secrets of the United States are as intense today as they have ever been." FBI officials are still assessing the damage of the Hanssen disclosures, but one source said the information he released had caused extreme damage to US security. Plato Cacheris, Hanssen's attorney, said his client would be pleading "at this point not guilty". Meanwhile, Swedish police have detained a suspected spy, reportedly working for Russia. The security police said the suspect worked in trade and industry. -Feb 21st -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2524 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 8:04pm Subject: A bridge too far for FBI agent A bridge too far for FBI agent http://www.theherald.co.uk/news/archive/21-2-19101-0-21-1.html CHRIS STARRS THE man accused of being America's latest spy took teenage inspiration from Kim Philby, the British double agent, and allegedly used old-fashioned fieldcraft to communicate with his masters in the Kremlin. Details of the case against Robert Phillip Hanssen emerge in the court papers presented last night. They tell of dead drops, secret codes, diamond pay-offs, and an individual disparaging of his homeland. His arrest, after a four-month surveillance operation, was also redolent of the old-fashioned cloak and dagger style that has graced many Hollywood thrillers. Mr Hanssen had been due to collect a package containing £34,000 which had been waiting for him at a pick-up point at a bridge in a park in Arlington. The father-of-six never made the collection. His former FBI colleagues had him in custody. Friends and neighbours had been oblivious to the crimes he is alleged to have committed. Nancy Cullen, a friend, said: "They go to church every Sunday - if that means anything - loading all six kids into the van." She said the Hanssens were regulars at local parties, referring to him as "very attractive...not overly gregarious". Trained as an accountant, with experience as an investigator in the financial section of the Chicago Police Department, the 56-year-old took his oath of office with the FBI in 1976. But he told his Russian "friends" that he was moved to embark on his course as a double agent as a teenager. "I decided on this course when I was 14 years old," he wrote, according to the affidavit. Philby defected to the Soviet Union in 1963 just before being exposed as a spy who had not only damaged Britain, but also the US. "I'd read Philby's book," Mr Hanssen wrote. "Now that is insane, eh! My only hesitations were my security concerns under uncertainty. I hate uncertainty." >From the start of his dalliance with Moscow, Mr Hanssen was obsessed with security. In that earliest listed contact, Mr Hanssen said Soviet intelligence had "suffered some setbacks", and provided the names of three KGB agents he said had been recruited by the United States, the affidavit said. Two of these agents were later executed. Promising more information in this typed note, which was sent through the US mail, Hanssen asked for £70,000 and set up a coded system to conceal the scheduling of communications: "I will add six (you subtract six) from stated months, days and times in both directions of future communications." Under this system, February 20 would become August 26, and 6 pm would become midnight. Later that month, Mr Hanssen allegedly offered signals using white adhesive tape on a signpost near his home in northern Virginia just outside Washington. A horizontal line of tape would mean he was ready to get a KGB package; a vertical piece of tape would mean the drop had occurred; a subsequent horizontal piece of tape would mean the package was received. Such dead drops - in which the two sides never saw each other - were the norm during his 15 years working with Soviet and Russian intelligence, the affidavit alleged, and documents said the Russians never knew who their contact was. He initially signed off simply as "B," but later used the aliases "Ramon Garcia", "Jim Baker", and "G Robertson". Cash payments of tens of thousands of dollars were sometimes included in the KGB drops, the affidavit said, and while Mr Hanssen found these welcome, he was wary. "I have little need or utility for more than the 100,000 (dollars)," he allegedly wrote. "It merely provides a difficulty since I cannot spend it, store it, or invest it easily without tripping 'drug warning' bells. "Perhaps some diamonds as security to my children and some goodwill so that, when the time comes, you will accept my senior services as a guest lecturer. Eventually, I would appreciate an escape plan. Nothing lasts forever." He eventually received £400,000 in cash and diamonds from the Soviets and Russians, the affidavit said; in addition, an account was opened for him in Moscow that eventually was valued at £600,000, making his total gain £1m. Using dead drops, Hanssen provided details of defence information, national security information, and other matters. What had begun with the homespun signals of tape on signposts, and eventually moved on to such simple signals as different coloured drawing-pins that were visible from slowly moving vehicles, also included encrypted computer disks. He had disparaging words for the FBI - "Generally speaking you overestimate the FBI's capacity to interdict you" - and for the US in general. "The US can be errantly likened to a powerfully built but retarded child, potentially dangerous, but young, immature and easily manipulated," he wrote. "But don't be fooled by that appearance. It is also one which can turn ingenious quickly, like an idiot savant, once convinced of a goal." -Feb 21st -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2525 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 8:05pm Subject: FBI spy who sold out to Russia 'did megaton damage' Wednesday 21 February 2001 FBI spy who sold out to Russia 'did megaton damage' http://www.telegraph.co.uk/et?ac=003100565149417&rtmo=psIpMe1e&atmo=99999999&pg=/et/01/2/21/wspy21.html By Ben Fenton in Washington BRITISH and American spycatchers were yesterday investigating the damage done by a senior FBI officer charged with spying for Moscow for the past 16 years. Robert Hanssen, a father of six who faces the death penalty if convicted, was described as having done "megaton damage" to American intelligence. His arrest, as he allegedly made a "dead drop" and picked up $50,000 (£33,000) in a park near his home in Virginia on Sunday, sent shock waves through the intelligence communities on both sides of the Atlantic. The arrest came after the FBI obtained documents from the former KGB, but sources said considerable detective work was needed because Hanssen had been able to keep his identity secret from his paymasters. British sources said that intelligence officials from London had been in close contact with their American counterparts to try to discern what Hanssen might have given away that would affect British security. Although Hanssen, 56, worked mainly in the FBI's counter-intelligence sector, watching the activities of foreign diplomats in Washington during his 27-year career, his security clearance was so high that he had access to the highest grade of secrets. One of the two charges formally laid against him in a court in Alexandria, Virginia, yesterday was of betraying in October 1989 the identities of three men who worked as double agents within the ranks of the KGB. The CIA believes that the three were executed by the Soviet Union as a result. Among the details that will be sought by MI5 and MI6 is whether Hanssen could have seen information about agents working for Britain within the Soviet and Russian intelligence structures. The director of the FBI, Louis Freeh, said Hanssen's alleged conduct "represents the most traitorous actions imaginable". The full extent of the damage was not known "because no accurate assessment could be conducted without jeopardising the investigation", he said. But it was believed to be "exceptionally grave". The US Attorney-General, John Ashcroft, said the espionage was "a very serious breach in the security of the United States. Every American should know that our nation, our free society, is an international target in a very dangerous world." In the brief court hearing yesterday, Hanssen was said to have been motivated by money and to have received $1.4 million over the period of his alleged treachery. President Bush said the charges were "extremely serious and deeply disturbing". He said: "Allegations of espionage are a reminder that we live in a dangerous world - a world that sometimes does not share American values." Officials in Washington called Hanssen the Aldrich Ames of the FBI. Ames, arrested in 1994, was a senior CIA officer whose treason is thought to have been the most damaging committed by an American spy. Hanssen is alleged to have confirmed some of Ames's disclosures for the Russians. FBI officers sealed off the large suburban house in Vienna, a commuter town a few miles from Washington, where Hanssen lived with his wife, Bernadette, and their children. He is only the third agent of the FBI, which in espionage matters plays the same role as MI5 in Britain, to be accused of spying. In 1997 Earl Pitts, an instructor at the FBI Academy in Quantico, was sentenced to 27 years' imprisonment after admitting he spied for Moscow during and after the Cold War. Richard Miller, a Los Angeles FBI agent arrested in 1984, was later sentenced to 20 years in prison. The arrest of Hanssen is the latest in a series of intelligence embarrassments for America. Last year a former US army officer was accused of spying for the Soviet Union and later Russia. Prosecutors said Col George Trofimoff had given away military secrets for 25 years. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2526 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 10:17pm Subject: Why Espionage? Why Espionage? http://www.abcnews.go.com/sections/us/DailyNews/hanssen_spies010220.html Expert Says Spies Driven By More Than Money By Bryan Robinson Feb. 20 ≠ Robert Hanssen now joins Earl Pitts and Richard Miller as the only FBI agents arrested for spying on their own country. Pitts is serving a 27-year sentence after admitting in 1997 that he spied for Moscow during and after the Cold War. Miller was released in 1994 after serving a reduced sentence for espionage, and now Robert Hanssen could face life in prison ≠ even death ≠ if convicted of multiple counts of espionage. He was arrested today for allegedly spying for the Soviets and Russia for 15 years. What would drive a man to betray his country? FBI officials suggested Hanssen may have been driven by money, saying that he received $1.4 million in cash and jewelry for his services over a 15-year period. But one expert says alleged spies like Hanssen may be driven by more than money. "Generally, what happens with people is that they are getting some kind of monetary payment, but they are driven by the excitement and thrill of doing something and getting away with it," said Patrick Donnelly, professor of sociology and criminologist at the University of Dayton. "As they get deeper into something, they get a sense of satisfaction of doing something with nobody finding out about it." Empowered By Knowledge and the Thrill Spies, Donnelly said, also feel empowered by the information they have access to and perhaps, a rush they feel when they get away with turning over that information. Those who choose to spy on their countries, Donnelly said, are drawn to the thrill of leading a double life and grow more confident the longer they get away with their activities. "In that time [where Hanssen allegedly served as a spy], he's probably having access to the underside of the job. He probably feels safe because he feels like the people around him trust him," Donnelly said. "And he probably got close to his colleagues and got an idea of the type of lives they lead." A letter Hanssen allegedly wrote to his Russian beneficiaries suggests he may have become infatuated with the thrill of a double life as a spy long before joining the FBI. According to an FBI affidavit, Hanssen wrote in the letter: "I decided on this course when I was 14 years old. I read Kim Philby's book." Philby was a notorious British double agent who defected to the Soviet Union nearly 40 years ago. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2527 From: Jeremy Date: Tue Feb 20, 2001 6:34pm Subject: FBI agent It's a shame that someone would sell out his own country for the love of money. It's not like he wasnt bringing down a pretty penny working for the FBI.. 2528 From: Shawn Hughes Date: Wed Feb 21, 2001 11:19am Subject: feds on the cutting edge FBI surveillance systems get digital upgrade Amid ongoing debate over surveillance tools' potential to invade privacy, the FBI is replacing its analog wiretapping equipment with digital systems in all 56 field offices. Under the Digital Storm program, the bureau will replace large reel-to-reel tape recorders with PC specially tuned for audio storage capability. The minimum requirement for running the digital recording applications is an 800-MHz Pentium PC with 256M of RAM and RAID Level 5 storage. About 20 percent of the FBI offices already have the new digital systems. With a budget of $30 million for fiscal 2001, the FBI Laboratory this year will upgrade as many field offices as possible, said Michael T. Elliott, unit chief for telecommunications intercept and collection technology. The bureau plans to finish the conversion to digital by 2003. http://www.gcn.com/vol20_no4/news/3709-1.html Shawn - insert flippant quote here [Non-text portions of this message have been removed] 2529 From: Jesse Thomas Date: Tue Feb 20, 2001 4:33pm Subject: Re: FBI Russia spy caused "grave" damage No offense, but I would have to give my condolences to the former FBI agent for his good work over the many spying years. Unfortunately that line of work is limited in providing information to the Soviets, rather than US citizens. I understand that the type of information disseminated, which includes how the FBI spies on it's own people, makes me a bit confused as to who the 'bad guy' really is. Of course, is is a bit unethical to reveal hard-earned engineering accomplishments to those who have not participated in R&D, nor have earned it. I'm talking about intellectual property here. That would be a crime, as that is the injured party. As far as what is 'grave' damage as caused by the spy act, I doubt if there is any adverse effect on our ability to bomb foreign nations or spy on our own people. > > On a visit to St Louis, Bush said: "This has been a difficult day for those > who love our country and especially for those who serve our country in law > enforcement and the intelligence community." particularly the intelligence community, since that is their jobs > > 2530 From: Shawn Hughes Date: Wed Feb 21, 2001 11:29am Subject: steganography sniffers Secret Messages Come in .Wavs Neil Johnson has a job that's nothing if not unusual: He investigates how to uncover concealed messages embedded in sound and video files. A researcher at Virginia's George Mason University, Johnson is one of a small but growing number of digital detectives working in the field of computer steganalysis -- the science of detecting hidden communications. "I analyze stego tools," said the 32-year-old security specialist who is the associate director of GMU's Center for Secure Information Systems. "I try to find out what can be detected or disabled. I see what their limitations are." http://www.wired.com/news/politics/0,1283,41861,00.html also, http://www.cl.cam.ac.uk/~fapp2/steganography/ Shawn - insert flippant quote here [Non-text portions of this message have been removed] 2531 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 9:33am Subject: FBI portrays Robert Hanssen's double life A 15-year paradox FBI portrays Robert Hanssen's double life A 15-year paradox http://cgi.usatoday.com/usatonline/20010221/3083038s.htm By Richard Willing and Traci Watson USA TODAY WASHINGTON -- He was the son of a Chicago cop, a quiet type who admired strong leaders, went to Mass on Sundays and occasionally shocked colleagues by spouting profanity-laced quotes from Gen. George S. Patton. But to folks such as I.C. Smith, a onetime colleague in the FBI's counterintelligence division, the lanky, sometimes-disheveled man called Bob Hanssen was still ''not your typical FBI agent.'' Little did they know. Hanssen, charged Tuesday with spying for 15 years on the government he swore to serve, was an apparent paradox, a man of separate and warring loyalties that seem impossible to have coexisted in one slim human frame. A 100-page FBI affidavit, filed in connection with the charges, and interviews with neighbors, relatives and law enforcement sources paint a contradictory picture: On the surface, Hanssen, 56, was a suburban dad, toiling at his government job, joining with his wife, Bonnie, to raise six children in the Washington suburbs, putting them through Catholic schools and colleges, and making the payments on a Ford Taurus, an Isuzu Trooper and a fast-fading Volkswagen van. At the same time, the government says, Hanssen was something else entirely -- a spy for the Soviet Union and its successor, the Russian Federation. They were the sworn enemies of his team, FBI counterintelligence, and, in the case of the U.S.S.R., of his seemingly beloved church. Officials say Hanssen was a spy who profited from his activities, collecting $550,000 in cash, about $50,000 in diamonds and the promise, which he never took seriously, of $800,000 more in a Russian bank account. In court documents unsealed Tuesday, the government says he also harbored the fantasy of retiring from the FBI and relocating to Moscow to teach college courses and train future spies. His boyhood hero, he told his Russian keepers, was the British intellectual- turned-Soviet mole Kim Philby. In the Cold War of the 1950s, Philby did exactly that -- escaped to Moscow. ''Want me to lecture in your 101 course in my old age? I would be a novelty attraction,'' Hanssen wrote to a Russian contact last November. ''I'd decided on this course when I was 14. . . . I read Philby's book.'' That echoed the thought Hanssen expressed in November 1985, after first approaching KGB agents in Washington and volunteering to supply information. He would work, Hanssen wrote the KGB, for money, a few diamonds for his children and ''good will.'' ''So that when the time comes, you will accept (my) senior services as a guest lecturer,'' read the note, found by federal investigators last fall. ''Eventually, I would appreciate an escape plan. (Nothing lasts forever.)'' Policeman's son Hanssen was born April 18, 1944, in Chicago, the son of a policeman who rose to the rank of lieutenant. He was educated at Knox College, a small and selective liberal-arts college in Galesburg, Ill., then studied dentistry and accounting before landing at the FBI. Hanssen's late start -- he was nearly 32 when the bureau swore him in -- meant he was maturer than many recruits. However, the age difference left him with disdain for many he would serve with, bureaucratic types who, he once told the Russians, went ''all wet'' when faced with a decision that they had to make by themselves. In October 1985, Hanssen made just such a decision, the government says, selling Russian intelligence the names of three American-based KGB agents who were working secretly for the FBI. Hanssen had come by the information when working at FBI headquarters in Washington, but he waited until being transferred to New York City before approaching the Russians. The three KGB agents, who also had been betrayed by rogue CIA agent Aldrich Ames, were recalled to Moscow, where two were executed and the third was given a prison sentence. In 1987, Hanssen and his family returned to Vienna, Va., in the Washington suburbs, and have lived there since. By all appearances, their lives were solid and unremarkable. Those who know the Hanssens describe them as a close family. They attended Mass weekly. Four of the children attended Our Lady of Good Counsel Catholic School, which covers kindergarten through eighth grade, in Vienna. Only two of the children remain at home, a comfortable brown frame house with a basketball hoop on the side. Bernadette ''Bonnie'' Wauck, who turns 55 this month, was raised in Park Ridge, Ill., in a family that included eight children. Her father, Leroy Wauck, was a professor at Loyola University in Chicago, a Jesuit institution, where Bonnie earned a bachelor's degree in sociology. She teaches nearly full time at Oakcrest School in McLean, Va., a small Catholic girls' school. Robert and Bonnie met while they both were working in the Chicago area, Leroy Wauck said. An acquaintance who spoke to her Tuesday described Bonnie Hanssen as ''in shock'' after the arrest. She had no notion, the acquaintance said, that her husband was even under suspicion of spying. The Hanssens' son Mark is a politics major at the University of Dallas in Irving, Texas, and their son John attends law school at the University of Notre Dame. One of their daughters is married and has at least one child, said Nancy Cullen, a neighbor of the Hanssens. Devoted mother Bonnie is universally described as a devoted and skillful mother who even recorded a commercial tape about activities a family can do together. ''They're a wonderful family. They've been so concerned about raising their children well,'' said Mary Ann Budnik, CEO of R.B. Media, the company that sells Bonnie Hanssen's tape. ''The more I think about it, the more I think he's being framed.'' Two of Bonnie's sisters live nearby with their husbands and children. One, Jeanne Beglis, lives just a few doors down the street. Wauck said his son-in-law didn't complain about his job. ''It just doesn't make sense,'' he said. ''No one anticipated anything like this.'' The charges read like a continuous drumbeat: * Hanssen is accused of sending 27 letters and 22 packages to the KGB and its successor agency, the SVR. They left 33 bundles, stuffed with thousands of old dollar bills, for him. * Because of him, operations were blown, including the investigation in 1989 of foreign service officer Felix Bloch, who was suspected of spying for the Russians. Hanssen is accused of tipping off the Russians; officials say they believe that the KGB passed the information on to Bloch. And officials say Hanssen passed along names of potential recruits, including a boyhood friend. Amid these events, bits of Hanssen's personality can be spied. He was obsessive about security, blowing off one document drop when the Russians were three minutes late. He had advice for his Russian buddies: Study the methods of the late mayor Richard J. Daley, the boss of Chicago, to learn how to run a government. He offered technical tips, too. Though he used a Palm III organizer, he told the Russians in March 2000, the VII version comes with built- in wireless Internet capability. ''Could be quite effective'' in spying, Hanssen said. He could be humorous. Overconfidence, he warned the Russians, can lead ''cocksure officers'' to ''step in an occasional cowpie.'' ''Message to the translator,'' Hanssen wrote in November 2000. ''Got a good word for 'cowpie'?'' And salty. In December 1991, when a promotion and a new job temporarily sidetracked his spying, he quoted Patton to show the Russians that he was anxious to keep working for them. ''As General Patton said, 'Let's get this over with so we can go kick the (expletive deleted) out of the (expletive deleted) Japanese,' '' Hanssen wrote. Occasionally, the affidavit says, Hansen enjoyed chatting, spy to spy, with his Russian handlers. That $800,000 reportedly set aside for him in the MOST bank in Moscow? He understood, he wrote in November, that it was only an ''accounting notation'' that may or may not be paid ''at some uncertain future.'' No hard feelings, he said. ''We do the same.'' But the job could be frustrating. ''You waste me!'' he complained when the Russians failed to keep in touch. Last year, he told his Russian keepers, he knew all about the discovery of a Russian bug planted in the State Department but had ''no effective way'' of tipping them off quickly. And dangerous. His biggest fear, Hanssen confided, was ''someone like me'' -- an agent on the Russian side with knowledge of Hanssen's spying who decided to work for the Americans. A former CIA counterintelligence expert, Vincent Cannistraro, suspects that that is what happened. Sometimes the work just seemed to be getting to Hanssen. He could get the death penalty if caught, he said. Sometimes, the Russians didn't seem to appreciate the risks he takes. ''I have come about as close as I ever want to come to sacrificing myself to help you,'' he wrote in March 2000. ''Conclusion: One might propose that I am either insanely brave or quite insane. I'd answer neither. I'd say, insanely loyal. Take your pick. There is insanity in all the answers.'' Some former colleagues are saddened but not shocked that Hanssen may have led a secret life. ''He was kind of a loner, introverted, didn't laugh easily,'' I.C. Smith recalled. ''I could never figure out how he hung on as a headquarters supervisor.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2532 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 9:36am Subject: Accused spy is a man no one knew Accused spy is a man no one knew http://www.bergen.com/news/spyprofil20010221.htm Wednesday, February 21, 2001 ROBERT HANSSEN http://www.bergen.com/news/images/hansen-robert-022101.jpg By DARLENE SUPERVILLE The Associated Press WASHINGTON -- Robert Philip Hanssen was supposed to be a spy of sorts in his own country, keeping tabs on the comings and goings of foreign diplomats. The veteran FBI agent was trained all too well. The very professionalism the Chicago native brought to the task helped him operate without detection for more than a decade as a spy for Moscow, the FBI says. A father of six living in a middle-class Virginia suburb, Hanssen knew how to hide his identity even from his handlers and how to watch the FBI to see if it was watching him, authorities said after charging him with espionage. He was aware, too, of how severe the treatment can be for caught spies. "I know far better than most what mine fields are laid and the risks," Hanssen wrote to a KGB handler, according to correspondence quoted by FBI Director Louis Freeh. For all his anger, Freeh paid what sounded like grudging compliments to techniques the former Chicago police officer and 25-year FBI veteran, who studied Russian in college, is alleged to have used. "In short, the trusted insider betrayed his trust without detection," Freeh said. For Hanssen, an FBI career that began with his taking the agency's oath ended in a Virginia park Sunday night, where colleagues read him his Miranda rights. * * * Nothing special set him apart in his Vienna, Va., neighborhood, say the neighbors, although one complained that he let his dog roam and create a nuisance. Hanssen, 56, made a home for himself, his wife, and their children in a $300,000 split-level, brick-and-cedar house with a one-car garage, a Ford Taurus, and that other symbol of suburban living -- a minivan. A basketball hoop is in the driveway. Hanssen's wife, Bernadette, teaches religion part time at a Catholic high school, and the family came regularly to block parties, such as the one every Memorial Day. "Not overly gregarious," Nancy Cullen said of him. She lives several doors down from the Hanssens in a cul-de-sac she describes as "our town hall." When neighbor called neighbor to share the news of his arrest, the reaction was, "No way," Cullen said. "I've been in his house. I've never seen any Soviet flags or anything like that, if that's what you're asking," said Matt Bennett, who lives across the street. * * * The government says Hanssen had a long relationship with the Soviet Union and the Russians, dating to 1985, while assigned to the Intelligence Division of the FBI field office in New York City. Operating under the code name "Ramon," Hanssen kept his real identity a secret even from his Russian handlers, who did not find out his name or who employed him until his arrest was disclosed, Freeh said. Hanssen also checked his agency's own security systems to see whether authorities had any suspicions about him -- which they apparently did not until late last year. "He was, after all, a trained counterintelligence specialist," Freeh said. >From February 1995 until January, Hanssen was the FBI's senior representative to the State Department's Office of Foreign Missions, where he oversaw an interagency counterintelligence group. He was returned to FBI headquarters last month in a newly created position designed so that the bureau could monitor his daily activities without alerting him to its investigation. Hanssen apparently contemplated several careers before settling on one in law enforcement. He earned a bachelor's degree in chemistry from Knox College in Galesburg, Ill., in 1966, according to the government's information. He then studied dentistry at Northwestern until 1968 before receiving a master's in accounting from the university in 1971. He became a certified public accountant in 1973. He worked as a junior accountant at a Chicago firm from 1971 to 1972, when he joined the city Police Department as an investigator in the financial section of its inspection division. Hanssen joined the FBI in January 1976, and served initially in Indiana before assignments that took him back and forth between offices in New York and the Washington headquarters. * * * Biography of accused spy NAME -- Robert Philip Hanssen. AGE, BIRTH DATE -- 56; April 18, 1944. EDUCATION -- M.B.A., accounting and information systems, Northwestern University (1971); B.A., chemistry, Knox College, Galesburg, Ill. (1966). Studied dentistry, Northwestern (1966-68). EXPERIENCE: Information Resources Division, FBI headquarters, January 2001- present. FBI's senior representative, Office of Foreign Missions, State Department, Washington, February 1995-January 2001. National Security Division, FBI headquarters, December 1994-February 1995. Temporary assignment, Washington field office, April 1994-December 1994. Chief, National Security Threat List Unit, Intelligence Division, FBI headquarters, January 1992-April 1994. Soviet Operations Section, Intelligence Division, FBI headquarters, July 1991-January 1992. Inspections Staff, FBI headquarters, June 1990-June 1991. Supervisory special agent; Soviet Analytical Unit, Intelligence Division, FBI headquarters, August 1987-June 1990. Intelligence Division, New York City, September 1985-August 1987. Supervisory special agent, Intelligence Division, FBI headquarters, January 1981-September 1985; Criminal and Intelligence divisions, New York City, August 1978- January 1981. Joins FBI, assigned to offices in Indianapolis and Gary, Ind., January 1976-August 1978. FAMILY -- Wife, Bernadette; six children. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2533 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 9:38am Subject: U.S. officials, agents accused of spying U.S. officials, agents accused of spying http://cgi.usatoday.com/usatonline/20010221/3082886s.htm 2000: Retired Army Reserve colonel George Trofimoff, a civilian intelligence employee, was charged with spying for the Soviet Union and Russia for 25 years. 1997: Earl Pitts, a 13-year FBI veteran, was sentenced to 27 years in prison after pleading guilty to selling information to Russians from 1987 to 1992. 1997: Harold Nicholson, the highest-ranking CIA officer ever arrested for spying, was sentenced to 23 years in prison for selling information to the Russians, including the names of CIA trainees at the agency's school for spies. 1994: Aldrich Ames, a CIA officer, pleaded guilty to selling information to the Russians from 1985 to 1994. The information is thought to have led to the deaths of at least nine U.S. agents. He was sentenced to life in prison. 1989: Felix Bloch, a 30-year career State Department diplomat, was believed to have passed secrets to a Soviet agent in Paris. Bloch was never charged with espionage but was fired in 1990 on grounds that he lied to investigators. 1986: Jonathan Pollard, a civilian Navy intelligence analyst, was sentenced to life in prison for selling information to Israel. 1985: John Walker, a retired Navy officer, was sentenced to life in prison for selling secrets to the Soviets for 18 years. 1985: Edward Howard, a former CIA officer, fled the country as the FBI investigated allegations that he disclosed the identities of CIA agents in Moscow. He still lives in Moscow. 1985: Sharon Scranage, a CIA clerk serving in Ghana, pleaded guilty to giving names of U.S. agents to her Ghanaian boyfriend. 1984: Richard Miller, a Los Angeles FBI agent, was arrested for spying for the Soviets and later sentenced to 20 years in prison. The sentence was later reduced to 13 years. 1951: Julius and Ethel Rosenberg, accused of conspiring to pass atomic secrets to the Soviets, were the last spies to receive the death penalty in the USA. They were executed on June 19, 1953. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2534 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 9:40am Subject: Case raises questions about FBI's internal security - Agent said to have tracked bureau using its computers Case raises questions about FBI's internal security Agent said to have tracked bureau using its computers http://cgi.usatoday.com/usatonline/20010221/3083032s.htm By Toni Locy USA TODAY WASHINGTON -- FBI Director Louis Freeh called catching veteran agent Robert Hanssen ''red-handed'' selling secrets to the Russians ''a counterintelligence coup.'' But the bottom line is a high-ranking official allegedly got away with espionage for 15 years, and no one had a clue until four months ago. The arrest of Hanssen, 56, an expert on counterintelligence who wasn't subjected to a routine polygraph test for several years, raises serious questions about the FBI's internal security, reputation and future role in counterintelligence and national security, analysts say. As Aldrich Ames was a black eye to the CIA in the 1990s, so is Hanssen to the FBI, which describes him as the worst traitor in its history. ''That Hanssen could do this for 15 years is an absolute earthquake for the FBI and the intelligence community,'' says Emilio Viano, a professor at American University in Washington and an expert on counterintelligence. How Hanssen avoided detection reveals many weaknesses that will be examined by William Webster, a former CIA and FBI director appointed to head a task force to investigate how this could happen. Among those weaknesses is the length of time it took the FBI to find out about Hanssen. Analysts say the case shows that the FBI's internal safeguards should have unmasked Hanssen years ago and that the only way the bureau got on his trail was probably with outside help from Russian spies or a defector who handed over documents from the KGB, the spy agency of the former Soviet Union. Hanssen is portrayed as a cunning operative who used ''good tradecraft,'' spy lingo for eluding detection, and never drew attention to himself with an ostentatious lifestyle, as Ames did. Hanssen doesn't deserve all of the credit, however, law enforcement sources and counterintelligence experts say. Rather, they say, the FBI deserves the blame. Freeh, who fielded questions alone at a news conference, referred repeatedly to the detailed affidavit filed in federal court that laid out Hanssen's activities dating to 1985, when he allegedly offered to sell highly classified documents to the Russians. Freeh, who has headed the agency since 1993, refused to say why he considered the investigation ''a coup,'' but said, ''We did not stumble onto this investigation.'' His statement leads some experts, including Viano, to conclude that the FBI couldn't have done the investigation without access to secret documents from the KGB and its successor agency, the SVR. Viano says the FBI may have gotten many of the details of Hanssen's spying by trading for them. He says many KGB records are being passed around the world's intelligence community. ''The intelligence community is a very small community,'' he says. ''The players are well-known to each other, and both sides are sharing information on the basis of getting a quid pro quo.'' Freeh hinted as much. Through efforts to identify spies that had begun after the Ames arrest, ''the FBI was able to secure original Russian documentation of an American spy who appeared to the FBI to be Hanssen,'' he said. He refused to say, however, where that documentation came from. Analysts see a clue in timing. The FBI began looking at Hanssen in October, the same month that Sergei Tretyakov, a first secretary at the Russian mission to the United Nations, defected. ''It's Tretyakov, but they're not going to say that because they're trying to protect the source,'' says Vince Cannistraro, former CIA counterterrorism director. A law enforcement source familiar with the investigation says a key development occurred when the FBI conducted a secret entry into Hanssen's house and obtained a copy of his computer hard drive. On it were letters Hanssen allegedly wrote to his Russian handlers. The letters were encrypted, but the FBI cracked the code. The arrest comes at a time when the FBI is expanding its role in counterintelligence, opening more than 30 legal attachÈ offices around the world. However, the FBI has been lax about administering periodic, random polygraph tests of employees handling highly classified material, the source says. Hanssen was not administered such a test for the past several years, according to the source. The FBI's lack of a consistent polygraph policy was a sore point with CIA and military intelligence officers whose agencies rely heavily on lie-detector tests to keep tabs on employees, the source says. The FBI, the source says, places little weight on polygraphs because they are inadmissible in court. As an FBI employee, Hanssen was subjected every five years to financial reviews that examine credit and spending habits, but he lived modestly and wasn't given a second look, the source says. Hanssen allegedly watched his back by periodically searching the FBI's computer system to see whether agents in other parts of the agency were on to him. Through computer forensic work, the FBI went back and found he had conducted sweeping searches using his name, address and locations of the document drops he made to his handlers to determine whether investigations had been opened on any of them. In addition to assessing the damage done to national security, Webster's task force will likely examine why the FBI wasn't checking to see whether employees regularly conducted such surreptitious searches -- or whether it could. ''There's no reason for someone to be doing that unless you're guilty of something,'' says Jeffrey Richelson, a senior fellow at the National Security Archive at George Washington University in Washington. The task force also is expected to ask why the FBI wasn't checking to see what materials its employees were reviewing on their computers -- even though the bureau's computer system gives clear warning during sign-ons that it has this capability, the law enforcement source says. Sen. Richard Shelby, R-Ala., chairman of the Senate Select Committee on Intelligence, plans to hold a hearing next week to examine what damage may have been done by Hanssen's alleged cooperation with the Russians. Freeh says that ''at the end of the day, all of our systems probably need to be looked at and probably improved.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2535 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 9:41am Subject: The man who risked death to betray his country FBI agents begin making sketches outside the Virginia home of Robert Hanssen, accused of spying for Russia. The man who risked death to betray his country http://www.thescotsman.co.uk/world.cfm?id=49304&keyword=the Robert Tait In Washington THE US intelligence community was reeling from a body blow to its credibility yesterday after a senior FBI agent was charged with spying for Moscow for 15 years, inflicting "exceptionally grave" damage on national security. Robert Philip Hanssen, 56, appeared in court accused of selling some of the United States' most sensitive intelligence secrets to the KGB - the spy agency of the former Soviet Union - and its Russian successor. The charges allege that betrayed the identity of three American moles in the KGB, two of whom were subsequently executed. He faces the death penalty or a maximum fine of $2.8 million (about £1.8 million) if convicted. It is alleged that Hanssen, a father-of-six who had been an FBI agent for 27 years, spied for the Soviet Union before its break-up and for Russia thereafter. Louis Freeh, the FBI director, alleged in a news conference yesterday that Hanssen had received $650,000 (£450,000) and diamonds in reward for his espionage work for Moscow. The FBI had accepted a $50,000 package intended for Hanssen, Mr Freeh said. Bureau agents been tracking Hanssen for four months before he was finally arrested on Sunday at a park near his $300,000 suburban Washington home after he had allegedly dropped off a package of classified information. President George Bush reacted by reading out a prepared statement to television cameras aboard Air Force One, the presidential jet. "Allegations of espionage within the FBI are extremely serious and deeply disturbing," he said. "Particularly for the thousands of men and women who work for the FBI and now must deal with allegations that one of their own may have undermined it." He described the allegations as "a reminder that we live in a dangerous world". Mr Bush added: "I thank the men and women who proudly serve our country. But anyone who would betray its trust, I warn you we will find you and bring you to justice." Hanssen is only the third FBI agent to be charged with espionage. Mr Freeh said that his alleged offences were "not only an affront to his fellow FBI agents but also to the American people". Hanssen is charged with passing classified documents to KGB agents on 20 March, 1989, with the intent of injuring the United States. The charges further state that he had voluntarily become a Soviet spy in October 1985, and that his espionage continued until his arrest. Mr Freeh said Hanssen operated under the code name "Ramon" and provided "highly classified information to the KGB and its successor agency, the SVR". He said Hanssen used encrypted communication, dead drops and other clandestine techniques. Mr Freeh further alleged that Hanssen independently disclosed the identity of two KGB officials who initially been compromised by convicted CIA spy Aldridge Ames. The agents had been recruited by the US to serve as "agents in place" at the Soviet embassy in Washington. They were later recalled to the Soviet Union, charged and executed. Mr Freeh said Hanssen's conduct "represented the most traitorous actions imaginable". He said there was no precise measurement of the damage Hanssen's alleged activities had inflicted "because no accurate damage assessment could be conducted without jeopardising the investigation". But he added: "We believe it was exceptionally grave." John Ashcroft, the US attorney general, said: "Individuals who commit treasonous acts against the United States will be held fully accountable. "Every American should know that our nation, our free society is an international target in a dangerous world. "In fact, the espionage operations designed to steal vital secrets of the United States are as intense today as they have ever been." Hanssen appeared at a federal court in Alexandria, a suburb of Washington, yesterday. Dressed in a black turtle neck, black shirt and grey trousers, he was silent and solemn as the charges were read out. He is being defended by one of Washington's premier defence attorneys, Plato Cacheris, who also represented Ames and Monica Lewinsky. Mr Cacheris said Hanssen planned to plead not guilty. He said his client was "emotional" and quite "upset" by the case against him. "The FBI always make out like they've got a great case," Mr Cacheris said. "But we'll see." Hanssen's arrest follows a series of national security embarrassments for the US. Last year, the government's case against the Los Alamos research laboratory physicist, Wen Ho Lee - who had been accused of selling the "crown jewels" of America's nuclear secrets to China - collapsed in a plea bargain. There were also a series of security lapses at the state department, one of which included the disappearance of a diplomat's lap top containing highly sensitive classified information. John Deutch, the former director of the CIA, was also charged with mishandling classified intelligence documents on insecure home computers. He was subsequently pardoned by Bill Clinton. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2536 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 9:44am Subject: Stashes of diamonds. Secret dead drops of classified documents. Swiss bank accounts Still Spy-Vs.-Spy for Russia, U.S. http://www.worldnews.com/?action=display&article=5850176&template=worldnews/search.txt&index=recent The Associated Press, Wed 21 Feb 2001 WASHINGTON (AP) ≠ Stashes of diamonds. Secret ``dead drops'' of classified documents. Swiss bank accounts. The details of FBI agent Robert Hanssen's alleged espionage for Russia read like a Cold War novel but nonetheless provide fresh evidence that the United States and Moscow are still very much engaged in spy-vs.-spy intrigue. ``Intelligence and counterintelligence are with us and will be with us for some time,'' FBI Director Louis Freeh acknowledged Tuesday after announcing Hanssen's arrest. ``This case has got a foot in the past, but part of it has clearly got a foot in the present.'' But why spy now, when the Cold War is for the history books? Russia is no longer seen as the enemy, intelligence experts say, but neither is it embraced as a full-fledged friend. ``One never knows what another country has in mind down the road, and someone who's a friend today may prove to be an enemy tomorrow,'' said Loch Johnson, a University of Georgia political scientist who worked on intelligence for the Clinton White House and congressional committees. Furthermore, he said, ``Russia still has the capacity to destroy the United States in 30 minutes, so that focuses the attention, even though the prospects of that are minimal in the near term.'' Beyond military secrets, the international espionage game targets political and economic information that could give an advantage to one side or another. In the Information Age, ``we have come to understand just how vital information is, regardless of where you get it,'' said Kenneth Allard, a former Army intelligence officer now at the Center for Strategic and International Studies. If anything, tensions between the United States and Russia have been on the rise of late. Twice in the past two weeks, for example, Moscow was rankled when top U.S. officials lumped Russia with Osama bin Laden and China as global threats and complained that it was spreading missile technology to Iran and North Korea. On Tuesday, Attorney General John Ashcroft described America as ``an international target in a dangerous world'' and said espionage operations aimed at the United States are ``as intense today as they have ever been.'' He didn't mention that U.S. espionage remains robust as well. In fact, U.S. spending for spying has been on the increase in recent years, after dropping off after the Cold War, according to Steve Aftergood, an intelligence analyst for the Federation of American Scientists. ``Everybody spies on everybody; that's the rule of thumb,'' said Aftergood. He said U.S. spending on intelligence, estimated at $30 billion this year, is likely to continue to increase as expensive spy satellites need replacing over the next decade. As for Russia, foreign intelligence activities never seem to have flagged under former President Boris Yeltsin, and some analysts have predicted they would increase under his successor, Vladimir Putin, a 15-year KGB veteran. >From U.S. proposals for a new missile defense system, to Russia's yawning technological gap, to NATO's proposed thrust to the East, spies have plenty of work assessing the West's next moves. Even allied nations spy on one another. In one notable case, former Navy analyst Jonathan Pollard was convicted in 1985 of spying on the United States for Israel. More recently, France has complained that a U.S.-led eavesdropping network known as Echelon is being used to snoop on the business of its European allies. U.S. officials have never publicly confirmed the network exists and deny that the United States engages in industrial espionage. Freeh pointed to congressional testimony that nearly two dozen countries use their security services in the United States to gather economic information. For all the sophistication of modern espionage with satellites and the like, there will always be demand for ``human-based intelligence'' ≠ that is, spies who do the type of double dealing now attributed to Hanssen. ``The more things change, the more they stay the same,'' said Allard. ``There's literally no substitute for somebody on the inside.'' And in a friendlier world, it may be easier for moles to rationalize their conduct, reasoning that they're not really jeopardizing national security when they sell out their country. As for all the made-for-TV details of stealthy double agents and dead drops in the Hanssen case, Allard said: ``Guess what? The old tried- and-true methods still work.'' ≠≠≠ On the Net: CIA: http://www.cia.gov Federation of American Scientists' Project on Government Secrecy: http://www.fas.org/sgp/ Copyright 2001 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2537 From: Robert G. Ferrell Date: Wed Feb 21, 2001 10:01am Subject: Re: steganography sniffers >unusual: He investigates how to uncover concealed >messages embedded in sound and video files. I've been considering developing a stego sniffer myself. If that does come to pass (it's not a trivial task), I'll make it available to members of this list. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2538 From: Robert G. Ferrell Date: Wed Feb 21, 2001 10:19am Subject: Re: NSA's Security Enhanced >Since I finally do have Linux on my computer, >this Version of Linux sounds Interesting. >http://www.nsa.gov/selinux/ This is essentially Linux with RACF (OK, that's an oversimplification. But data access granularity is the principal thrust of the kernel mods). I personally would still recommend OpenBSD, at least until SecLinux has been put through the ringer by the hacker community. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2539 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 2:39pm Subject: Insider knowledge Wednesday, 21 February, 2001, 13:56 GMT Insider knowledge http://news.bbc.co.uk/hi/english/world/americas/newsid_1182000/1182217.stm Urgent questions are being asked about how veteran FBI agent Robert Hanssen, who allegedly sold some of the US Government's most sensitive secrets to Moscow, operated undetected for 15 years. According to senior intelligence officials, one reason is that Robert Philip Hanssen, who worked for the bureau for 27 years, knew the system so well, he managed to avoid arousing suspicion. Revelations about his alleged role at the heart of the FBI's counter intelligence operations in the US, have come as a huge shock. The Bureau is now beginning to assess the potential damage wrought to national security. 'Very experienced' Apart from being indicted for espionage, Mr Hanssen has been charged with betraying three double agents working for the Americans from the Soviet embassy in Washington, Two were executed when they returned to Moscow, while the third was imprisoned. At a news conference on Tuesday, FBI chief Louis Freeh said Mr Hanssen had managed to operate undetected because he was "a very, very experienced intelligence officer". On Wednesday, the New York Times wrote: "The bureau's own security safeguards seem to have been gravely deficient." "Even someone schooled in deception ought not to escape FBI detection for better than a decade of dealing with Russian handlers." According to an FBI affidavit, Mr Hanssen took numerous precautions that only a trained counter-intelligence expert would follow. He refused to meet Soviet (or later Russian) agents in person, either in Washington or abroad, knowing that these agents were often under surveillance and that foreign trips would arouse suspicion. He only used code for dates and places, encrypted computer discs and refused to accept KGB radio transmitters or other spy devices, which, if discovered, would immediately incriminate him. Former FBI director William H Webster, who is assessing the damage to national security, said he knew the bureau's counter-intelligence "matrix" too well. The FBI has acknowledged that a detailed review of its internal security is certain to find flaws in the FBI's procedures for ferreting out spies. The Washington Post says one area that is likely to be scrutinised is the FBI's unwillingness to give lie detector tests to employees on a regular basis. Mr Freeh has not disclosed how Mr Hanssen was finally caught, but there has been speculation that he was betrayed by a Russian source, who handed over his entire KGB dossier to the US. Four-month operation The FBI was first aware that there was a mole several months ago. A joint investigation was launched by the FBI, CIA, the State Department and the Justice Department. Mr Hanssen was kept under surveillance for at least four months. His phone was tapped and his house searched in his absence. FBI agents also covertly intercepted $50,000 in cash, which Russian intelligence officers are believed to have put into a secret location - a "drop" - for Mr Hanssen to pick up later. He was finally arrested on Sunday at a park in Vienna, Virginia, after allegedly dropping off a package of classified information for retrieval by Russian agents. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2540 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 2:41pm Subject: Darwin Awards Update!! From another list member.... who will remain in the shadow... Darwin Awards Update!! The Darwin Awards, for those not familiar, are for those individuals who contribute to the survival of the fittest by eliminating themselves from the gene pool before they have a chance to breed. 1. A young Canadian man, searching for a way of getting drunk cheaply, because he had no money with which to buy alcohol, mixed gasoline with milk. Not surprisingly, this concoction made him ill, and he vomited into the fireplace in his house. The resulting explosion and fire burned his house down, killing both him and his sister. 2. A 34-year-old white male found dead in the basement of his home died of suffocation, according to police. He was approximately 6'2" tall and weighed 225 pounds. He was wearing a pleated skirt, white bra, black and white saddle shoes, and a woman's wig. It appeared that he was trying to create a schoolgirl's uniform look. He was also wearing a military gas mask that had the filter canister removed and a rubber hose attached in its place. The other end of the hose was connected to one end of a hollow wooden tube approx. 12" long and 3" in diameter. The tube's other end was inserted into his rear end for reasons unknown, and was the cause of his suffocation. Police found the task of explaining the circumstances of his death to his family very awkward. 3. Three Brazilian men were flying in a light aircraft at low altitude when another plane approached. It appears that they decided to moon the occupants of the other plane, but lost control of their own aircraft and crashed. They were all found dead in the wreckage with their pants around their ankles. 4. A police officer in Ohio responded to a 911 call. She had no details before arriving, except that someone had reported that his father was not breathing. Upon arrival, the officer found the man face down on the couch, naked. When she rolled him over to check for a pulse and to start CPR, she noticed burn marks around his genitals. After the ambulance arrived and removed the man - who was declared dead on arrival at the hospital - the police made a closer inspection of the couch, and noticed that the man had made a hole between the cushions. Upon flipping the couch over, they discovered what caused his death. Apparently the man had a habit of putting his penis between the cushions, down into the hole and between two electrical sanders (with the sandpaper removed, for obvious reasons). According to the story, after his orgasm the discharge shorted out one of the sanders, electrocuting him. 5. A 27-year-old French woman lost control of her car on a highway near Marseilles and crashed into a tree, seriously injuring her passenger and killing herself. As a commonplace road accident, this would not have qualified for a Darwin nomination, were it not for the fact that the driver's attention had been distracted by her Tamagotchi key ring, which had started urgently beeping for food as she drove along. In an attempt to press the correct buttons to save the Tamagotchi's life, the woman lost her own. 6. A 22-year-old Reston, VA man was found dead after he tried to use octopus straps to bungee jump off a 70-foot railroad trestle. Fairfax County police said Eric Barcia, a fast-food worker, taped a bunch of these straps together,wrapped an end around one foot, anchored the other end to the trestle at Lake Accotink Park, jumped and hit the pavement. Warren Carmichael, a police spokesman, said investigators think Barcia was alone because his car was found nearby. 'The length of the cord that he had assembled was greater than the distance between the trestle and the ground', Carmichael said. Police say the apparent cause of death was 'Major trauma'. 7. A man in Alabama died from rattlesnake bites. It seems that he and a friend were playing a game of catch, using the rattlesnake as a ball. The friend - no doubt, a future Darwin Awards candidate - was hospitalised. 8. Employees in a medium-sized warehouse in west Texas noticed the smellof a gas leak. Sensibly, management evacuated the building, extinguishing all potential sources of ignition (lights, power, etc.). After the building had been evacuated, two technicians from the gas company were dispatched. Upon entering the building, they found they had difficulty navigating in the dark. To their frustration, none of the lights worked. Witnesses later described the sight of one of the technicians reaching into his pocket and retrieving an object, that resembled a cigarette lighter. Upon operation of the lighter-like object, the gas in the warehouse exploded, sending pieces of it up to three miles away. Nothing was found of the technicians, but the lighter was virtually untouched by the explosion. The technician suspected of causing the blast had never been thought of as 'bright' by his peers. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2541 From: Robert G. Ferrell Date: Wed Feb 21, 2001 2:42pm Subject: Re: Darwin Awards Update!! > Nothing was found of the technicians, but the >lighter was virtually untouched by the explosion. The technician >suspected of causing the blast had never been thought of as 'bright' >by his peers. I don't believe this one. Too Warner Brothers. RGF 2542 From: William Knowles Date: Wed Feb 21, 2001 3:45pm Subject: Re: Re: NSA's Security Enhanced On Wed, 21 Feb 2001, Robert G. Ferrell wrote: > >Since I finally do have Linux on my computer, > >this Version of Linux sounds Interesting. > >http://www.nsa.gov/selinux/ > > This is essentially Linux with RACF (OK, that's an > oversimplification. But data access granularity is the principal > thrust of the kernel mods). I personally would still recommend > OpenBSD, at least until SecLinux has been put through the ringer > by the hacker community. Heh, the local Linux users group & a majority of the guys and few gals from the 2600 group near me are too paranoid to start playing with the SELinux since its from the NSA. :) William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 2543 From: David Miller Date: Wed Feb 21, 2001 3:01pm Subject: RE: Darwin Awards Update!! Personally I think they all were a little contrived. Not your usual Darwin fare. -----Original Message----- From: Robert G. Ferrell [mailto:rferrell@r...] Sent:Wednesday, February 21, 2001 2:42 PM To:TSCM-L@yahoogroups.com Subject:Re: [TSCM-L] Darwin Awards Update!! > Nothing was found of the technicians, but the >lighter was virtually untouched by the explosion. The technician >suspected of causing the blast had never been thought of as 'bright' >by his peers. I don't believe this one. Too Warner Brothers. RGF 2544 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 6:52pm Subject: U.S. Diplomats Quizzed on Contact With Alleged Russian Spy U.S. Diplomats Quizzed on Contact With Alleged Russian Spy http://www.russiatoday.com/news.php3?id=294814 WASHINGTON, Feb 21, 2001 -- (Agence France Presse) Federal investigators on Wednesday began interviewing U.S. diplomats who may have known alleged Russian spy Robert Philip Hanssen during his stint at the State Department, officials said. A team of agents from the Federal Bureau of Investigation were quizzing State Department employees who could have come into contact with Hanssen who served as an FBI liaison officer there for a half-decade until last month, they said. "The FBI, as part of their investigation, will be interviewing people here who might have worked with him or known him," a senior department official told AFP. The official, speaking on condition of anonymity, said no State Department employee was suspected of collaborating with Hanssen and that the investigators were mainly interested in learning what diplomatic information could have been compromised. Hanssen, an FBI counter-intelligence agent who was formally charged with espionage on Tuesday, had a second-floor office at the State Department where he coordinated matters involving foreign diplomatic missions with the FBI. His work at the department gave him unfettered access not only to classified information regarding the movement of foreign diplomats and their status but also to secure areas in the headquarters building which has been heavily criticized for security violations. Though Hanssen worked in the department for five years and is alleged to have spied for the former Soviet Union and Russia for more than 15, investigators say they have not yet found evidence he was responsible for any of the deeply embarrassing security lapses there. Over the past three years, the State Department has been been plagued by various incidents including the 1999 discovery of a sophisticated Russian listening device planted in a conference room and the still unsolved January 2000 disappearance of laptop computer containing highly classified data . Those incidents followed one in 1998 in which an unknown man wearing a tweed coat walked into a room six doors from former secretary of state Madeleine Albright's office, picked up a sheaf of classified material and walked out unmolested. "There are some of us that probably would like to see a laptop, a couple of bugs, stacks of documents and a tweed coat turn up in Hanssen's old office here, but that doesn't seem likely," said a State Department official. In fact, according to papers filed in court by prosecutors on Tuesday, Hanssen complained to his Russian handlers about the slowness of their communications, saying he could have alerted them to the discovery of the listening device if they had an improved system. ((c) 2001 Agence France Presse) -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2545 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 6:53pm Subject: Gaps in Ames Case May Be Filled by F.B.I.'s Own Spy Case February 21, 2001 Gaps in Ames Case May Be Filled by F.B.I.'s Own Spy Case http://www.nytimes.com/2001/02/21/national/21DAMA.html?pagewanted=all By JAMES RISEN WASHINGTON, Feb. 20 ≠ When a Central Intelligence Agency officer, Aldrich H. Ames, was arrested as a spy for Moscow in 1994, critics questioned how the agency could have allowed his espionage to go undetected for nine years. Officials at the Federal Bureau of Investigation helped fuel the criticism with complaints that the C.I.A. had failed to share sensitive information, stifling the investigation. Now the F.B.I. finds the shoe on the other foot, facing questions about how it allowed a senior bureau official to spy for Moscow for nearly twice as long as Mr. Ames had. After the arrest of the F.B.I. official, Robert Philip Hanssen, 56, on Sunday in a suburban Virginia park, where he was suspected of leaving classified material for his Russian handlers, officials are saying he may be the most damaging spy for Moscow since Mr. Ames. In an extensive affidavit released today, the government charged that Mr. Hanssen compromised spies working for the United States, including three Russian K.G.B. officers who had also been betrayed by Mr. Ames. Two of those officers were tried and executed; the third was imprisoned and later released. Mr. Hanssen is also suspected of being the person who tipped off Moscow to the 1989 spy investigation of a State Department official, Felix S. Bloch. The F.B.I. believes that Mr. Bloch was subsequently warned by the K.G.B. Mr. Bloch was never arrested for espionage, but was fired from the State Department. Current and former American officials also say Mr. Hanssen's case may help explain the losses of technical intelligence operations against the Russians for which investigators were never certain that Mr. Ames could be blamed. "This explains a lot," one former official said. "There were things that we thought might have been done by Ames, but we always thought that it was a stretch for Ames to have known about certain programs." Current and former officials say there has been strong suspicion in the intelligence community for several years that the Russians still had at least one high-level agent, possibly more, within the government. But Mr. Hanssen's case is more than just a historical curiosity. As a 25-year F.B.I. veteran who spent most of his career in counterintelligence, Mr. Hanssen had access to a wide array of highly sensitive cases and documents, and the F.B.I. believes he became a frequent user of the bureau's computers to supplement his own knowledge. The F.B.I. director, Louis J. Freeh, said he was troubled that a hostile agent could go undetected for 15 years, while using internal computer systems to protect himself and gain access to sensitive material. Mr. Freeh is reviewing internal security procedures to determine why they failed in this case. According to the government affidavit, Mr. Hanssen volunteered to spy for the Soviet Union in October 1985, just five months after Mr. Ames did, yet he managed to avoid detection for seven years longer. The F.B.I. suggested today that he may have been more successful because his counterintelligence training made him far more knowledgeable about how the F.B.I. detects and catches spies. That training also made him far more careful in his dealings with the Russians. The F.B.I. believes that he never gave the Russians his name or identified his agency. He never even met with his Russian handlers, instead volunteering via letter to a senior K.G.B. officer in Washington. The Hanssen case seems certain to shed light on some of the most celebrated spy cases of the final years of the cold war, cases which many believed were already settled history. Most notably, Mr. Hanssen, officials say, corroborated some of the information that Mr. Ames was providing to the K.G.B., which certainly would have increased Moscow's confidence in the secret material it was receiving from both agents. The government says Mr. Hanssen revealed to the K.G.B. that two of its own officers serving in Washington in the mid-1980's, Valery F. Martinov and Sergei M. Motorin, were working for the F.B.I. In addition, he revealed that Boris Yuzhin, a Soviet intelligence officer in San Francisco in the late 1970's and early 1980's, had been recruited by the F.B.I. Mr. Ames, who volunteered to spy for the Soviets in April 1985, had also revealed the identities of all three by June of that year, the F.B.I. believes. But now it is clear for the first time that the K.G.B. did not rely solely on Mr. Ames for evidence needed to arrest those officers. Mr. Hanssen is suspected of identifying the three K.G.B. agents in October 1985. Mr. Motorin and Mr. Martinov were tried and executed, with Mr. Martinov being lured back to Moscow in November 1985, when he was asked to serve as a member of an honor guard escorting a K.G.B. officer, Vitaly Yurchenko, home after his defection to the United States and his redefection to the Soviet Union. Mr. Yuzhin was arrested in December 1986, imprisoned and then released in 1992. He has resettled in the United States. Mr. Freeh said at a news conference today that Mr. Hanssen used the F.B.I.'s computers to see whether the bureau's counterintelligence investigators were on to him. Mr. Hanssen's easy access to the F.B.I.'s computer system may be one focus of the F.B.I. review. Mr. Hanssen, the government says, was a prodigious spy. In an espionage career that spanned 15 1/2 years, the government charges, he wrote 27 letters to the K.G.B., later the S.V.R., and handed over some 6,000 pages of documentary material. Those documents contained a wide array of United States secrets, the government says, including information about the F.B.I.'s double- agent program, future American intelligence requirements and an assessment of the K.G.B.'s efforts to spy on American nuclear programs. The government charges that he also turned over a top-secret F.B.I. review of information from defectors about Soviet infiltration of the intelligence community. In addition to compromising sensitive technical intelligence operations against the Russians, the affidavit states, Mr. Hanssen betrayed the techniques the F.B.I. used to keep track of Soviet and Russian officers in the United States. For most of the last five years, Mr. Hanssen was the F.B.I.'s chief representative at the State Department, but F.B.I. officials do not believe those were his most productive years as a spy. They do not believe, for example, that he was involved in the Russian operation to plant a listening device in a State Department conference room. The affidavit went on to describe actions that seemed to implicate Mr. Hanssen. In a letter to his Russian handlers in June that was reprinted in the affidavit, Mr. Hanssen made it clear he wanted to be of greater help. He told the Russians that he needed a faster and more secure means of communicating with them, perhaps with a new Palm VII organizer with wireless Internet capability. If he had a faster way to contact the Russians, the letter states, he might have been able to warn Moscow that a listening device had been found at the State Department. "Such matters are why I need rapid communications," the reprinted letter states. "It can save you much grief." At the State Department, Mr. Hanssen may have been out of the daily flow of the most sensitive counterintelligence operations, but he still attended weekly staff meetings of the F.B.I.'s national security division, officials said. The period when Mr. Hanssen had the potential to do his greatest damage came earlier. He volunteered to the K.G.B. while assigned to the F.B.I.'s intelligence division in New York, where he was a supervisor of a counterintelligence squad. Just before he is said to have sent his letter to the Russians, he was a supervisory agent in the intelligence division at F.B.I. headquarters, where he was on a panel dealing with technical projects used by the bureau in counterintelligence. While the F.B.I. did not identify those projects in its affidavit, they may have involved sophisticated electronic means to monitor K.G.B. officers serving in the United States. >From 1987 through 1990, Mr. Hanssen was a supervisor in the F.B.I.'s Soviet analytical unit, and later a program manager in the intelligence division's Soviet operations unit. Perhaps his most sensitive post came in late 1994, when he worked briefly in the office of the F.B.I.'s assistant director for national security, the official in charge of all bureau intelligence operations. That posting came just months after Mr. Ames's arrest, and was at a time when the F.B.I. was gaining the upper hand over the C.I.A. in their long-running war for control over counterintelligence. Former United States intelligence officials noted that after the Ames case, the F.B.I. gained the right of "full visibility" into the C.I.A.'s Russian operations, a move intended to allow the agencies to work jointly and quickly to catch spies. It is unclear whether Mr. Hanssen's espionage benefited from that policy shift. Officials indicated today that Mr. Hanssen was, in turn, betrayed by another spy. They said that late last year a source provided the United States with Russian documents that pointed to Mr. Hanssen. The affidavit released today provided a remarkably detailed account of his career as a Russian agent, information that seemingly could come only from old K.G.B. files. Those Russian documents revealed to the F.B.I. that Moscow did not know Mr. Hanssen's real name ≠ he gave them only code names ≠ and may have learned it only after his arrest. In the past, other spies have worked anonymously as well. For example, Sergei Vorontsov, a K.G.B. officer in Moscow, volunteered to work for the C.I.A. without identifying himself. American intelligence officers did not learn his identity until he was arrested in 1986. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2546 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 6:54pm Subject: FBI spy case highlights insider threat to corporate data FBI spy case highlights insider threat to corporate data http://www.computerworld.com/cwi/stories/0,1199,NAV47-68-84-88_STO57889,00.html By DAN VERTON (February 21, 2001) A career FBI agent with significant experience and access to FBI IT systems was charged yesterday with spying for Russia since 1985, in what FBI Director Louis Freeh has called the worst case of insider espionage in FBI history. The agent, Robert Phillip Hanssen, is accused of giving Russian intelligence agents highly classified documents and divulging details about American intelligence sources and electronic surveillance operations. In exchange, he allegedly received an estimated $1.4 million in cash and diamonds. According to a 100-page affidavit filed in the U.S. District Court in Alexandria, Va., Hanssen used his access to the FBI's Electronic Case File system, which contains classified information about ongoing FBI investigations, to check if the FBI had been alerted to his activities. Although Hanssen and his Russian handlers relied heavily on traditional spying methods, such as dead drops for exchanging packages anonymously, the case is being touted by the FBI and IT security experts as a harsh lesson in a growing threat to corporate data by insiders. "In short, the trusted insider betrayed his trust without detection," said Freeh, during a press conference yesterday. "He constantly checked FBI records for signs that he and the drop sites he was using were being investigated." Freeh has since ordered that a special panel be formed to review all FBI processes and systems and to study the issue of insider abuse. "The most important lesson to be learned from this incident is that most security breaches are the work of insiders, not outsiders," said Richard Hunter, a security analyst at Stamford, Conn.-based Gartner Group Inc. "This incident is not about cybercrime or hacking per se, but historically, the vast majority of cybercrimes are committed by insiders," said Hunter, who is also a former analyst at the National Security Agency. "Security is not mainly about software or biometrics. First and foremost, it's about people and policies." According to a recent survey of 359 companies by the FBI and the Computer Security Institute (CSI), companies lost more than $50 million in 2000 as a result of unauthorized insider access and insider abuse of IT systems. And while 38% of companies in the FBI/CSI survey reported between one and five incidents of insider abuse, 37% of companies said they didn't know how many security breaches related to insiders had taken place. Hanssen, an expert in counterintelligence methods at the FBI, was detailed to the New York Field Office's intelligence division in 1979 to help establish the FBI's automated counterintelligence database in that office. Investigators characterized Hanssen as having a "high degree of computer technology expertise." Although Hanssen was arrested while dropping off classified hard-copy documents at a predetermined location for his Russian handlers, he made extensive use of computer media, such as encrypted floppy disks, removable storage devices and a Palm II handheld computer, to communicate with Russian intelligence officers, according to the affidavit. In fact, he provided as many as 26 encrypted floppy disks during the course of his espionage activities, it said. The lesson for corporate America "is that companies tend to gain a false sense of security from strong perimeter security," such as firewalls and intrusion detection systems, said Eric Friedberg, a former computer and telecommunications crime coordinator at the U.S. Attorney's Office in New York. "What goes on behind the firewall can be even more damaging because of the degree of access insiders have." Friedberg is now a computer crime consultant at Stroz and Associates, a New York firm founded by Ed Stroz, the former head of the FBI's New York Computer Crimes Squad. During the past six months, Stroz and Associates has worked with half a dozen companies that have been victimized by insiders, said Friedberg. Those cases involved everything from deleted files to trade secrets that were mailed to unauthorized parties and cases where individuals set up competing businesses on the company's own server without the company's knowledge, he said. One way companies can protect themselves from insider abuse is to focus on what their networks can tell them about what is going on inside the company, said Friedberg. He recommended that companies look into artificial intelligence-enabled security software that can tip administrators off to "anomalous activity" on the network. "At the end of the day, all of our systems probably need to be looked at and maybe improved," said FBI Director Freeh. "But at the end of the day, what we rely upon is honest people." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2547 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 6:56pm Subject: FBI builds case on paper trail FBI builds case on paper trail http://www.detnews.com/2001/nation/0102/21/a05-191021.htm Associated Press FBI agents load computers that were removed from FBI agent Robert Philip Hanssen's home in Vienna, Va., Tuesday. http://www.detnews.com/pix/2001/02/21/a05spy2.jpg By Larry Margasak / Associated Press WASHINGTON -- The government's case against FBI agent Robert Philip Hanssen seems like reality imitating art, spy novel material that includes executed double-agents, package drops along park footbridges and payments in diamonds. All going on for 15 years. Hanssen, 56, only the third FBI agent ever accused of spying, was accused Tuesday of espionage and conspiracy to commit espionage. In one of many letters quoted in an FBI affidavit, Hanssen was alleged to have written to his Russian handlers on Nov. 17, 2000, of his possible fate if caught: "Recent changes in U.S. law now attach the death penalty to my help to you as you know, so I do take some risk." The allegations of a Hanssen relationship with the Soviet KGB intelligence agency and its successor, the SVR, included both bizarre and lighter moments. There was contact through use of a newspaper ad purporting to sell a 1971 Dodge that "needs engine work," the FBI affidavit said. When the KGB asked how Hanssen would explain the diamonds he received, the agent was ready to tell everyone they came from his grandmother, it said. In a Dec. 25 message from the Russians, the American was offered "Christmas greetings from the KGB," according to the documents. And to show appreciation in another instance, the Russians were said to have quoted poetry: "What's our life, if full of care. You have no time to stop and stare?" According to the FBI, Hanssen's spying began with an Oct. 1, 1985, letter to a KGB official in the United States. "Soon I will send a box of documents. ... They are from certain of the most sensitive and highly compartmented projects of the U.S. intelligence community," wrote the man the Russians knew as "B." "I believe they are sufficient to justify a $100,000 payment to me," Hanssen allegedly said in the letter included in the affidavit. Mostly using footbridges at parks in Washington's Virginia suburbs, the FBI alleged, Hanssen would signal the Russians of a package drop with a vertical white adhesive tape, and the Russians would respond with a piece of horizontal adhesive tape. All this was playing well in Moscow, where in 1989 the KGB officers involved in the operation allegedly involving Hanssen won the highly coveted Order of the Red Banner, Order of the Red Star and the Medal for Excellent Service. But the FBI said that by last March, a Hanssen letter to the Russians showed a man in despair. "I have come about as close as I ever want to come to sacrificing myself to help you, and I get silence," Hanssen allegedly wrote. "I hate silence. ... Conclusion: One might propose that I am either insanely brave or quite insane. I'd answer neither. I'd say, insanely loyal." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2548 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 6:58pm Subject: Profile: Unassuming double agent? Wednesday, 21 February, 2001, 14:16 GMT Profile: Unassuming double agent? http://news.bbc.co.uk/hi/english/world/americas/newsid_1182000/1182034.stm Robert Philip Hanssen, the FBI agent accused of spying for Russia, was just a few years off retirement at the time of his arrest. He may have felt reasonably confident that he had successfully fooled the intelligence organ of the most powerful country in the world. According to the FBI, over the years he had received over $1.4m in cash, diamonds, and money paid into Russian accounts - enough for him and his family to live in the lap of luxury for the rest of his days. However, Mr Hanssen's lawyer said that "at this point" the suspect planned to plead not guilty to any charges brought against him. After 15 years of allegedly working as a double agent, there were few signs of this cloak-and-dagger existence. He lived in a modest four-bedroom house in a suburb of Virginia, with his wife and six children. The family attended Sunday mass every week, driving to church in a 10-year-old van. Friends and neighbours were shocked by his arrest, describing him as quiet and unassuming. "I never saw them flaunt anything, any kind of wealth," one neighbour, Nancy Powell, told the Washington Post. Motivation Officials investigating the case will want to know what may have motivated a highly intelligent and successful agent to risk his life. Was it the allure of money and diamonds? Was it ideological conviction? Or was there something in his personality that was attracted to subterfuge and the life of the double agent? Letters and documents contained in an FBI affidavit suggest that Mr Hanssen was not overly interested in financial gain. "As far as the funds are concerned, I have little need for more than the $100,000" said a letter apparently written by Hanssen to the Russians. "It merely provides a difficulty since I cannot spend it, store it or invest it easily without tripping 'drug money' warning bells." "Perhaps some diamonds as security to my children and some goodwill would be better," it said. Secret life In another letter Mr Hanssen apparently reveals that he had been attracted to a life of espionage since he was a teenager, and was inspired by the British spy, Kim Philby. "I decided on this course when I was 14 years old," he wrote to his Russian handlers, according to the affidavit. Mr Hanssen grew up in Chicago, and went on to study chemistry, maths and Russian at Knox College in Illinois. His acquaintances described him as aloof, but otherwise a "regular guy". He is said to be a strict father, who limits television watching and walks his dog at night. He is also said to be a member of the Opus Dei, a secretive and conservative Roman Catholic order. 'Intelligent but arrogant' Mr Hanssen joined the FBI in 1976, rapidly moving up the ranks until he became a supervisory special agent in the Soviet Analytical Unit at the agency's Washington headquarters in 1987. His colleagues at the FBI described him as extremely intelligent, but with a tendency towards arrogance. "He was bright and he knew he was bright," said Richard Alu, a fellow FBI agent who is now a security consultant. "He was kind of arrogant about it." But he always took great care not to reveal his identity - and, according to court documents, never met his Russian handlers - showing he did not take risks lightly. US officials said it was that kind of caution and inside knowledge that allowed Hanssen to operate as a mole for 15 years. But the FBI said that by last March, a Hanssen letter to the Russians showed a man in despair. "I have come about as close as I ever want to come to sacrificing myself to help you and I get silence," Mr Hanssen allegedly wrote, after the Russians failed to respond to one of his signals. "I hate silence. ... Conclusion: One might propose that I am either insanely brave or quite insane. I'd answer neither. I'd say, insanely loyal." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2549 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 6:55pm Subject: Virginia Woods Hold Spy Secrets Virginia Woods Hold Spy Secrets http://www.guardianunlimited.co.uk/breakingnews/US/0,3560,747858,00.html Wednesday February 21, 2001 11:50 pm VIENNA, Va. (AP) - The FBI agent accused of spying for Moscow did his stealthy work along picturesque footbridges crossing serpentine streams, the government says. Still, he did not seem to appreciate the bucolic break from the office. ``Recognize that I am dressed in business suit and can not slog around in inch deep mud,'' the FBI says Robert Hanssen complained to his Russian handlers, who never seemed to tire of finding new parks for their mole. ``I am not a young man,'' he is said to have reminded his contacts on another occasion. Northern Virginia, with some of the country's worst traffic congestion, is also studded with parks and nature trails that provide respite from the suburban buzz. The FBI says they also became transfer sites for some of the nation's top secrets over the 15 years Hanssen is accused of spying. ``There is a lot of history here other than the monuments and the museums,'' said Paul Moore, a counterintelligence specialist who once worked with Hanssen. ``When a spy looks out at the terrain, he sees a little different picture. He sees features that he can use in his work.'' At least a dozen parks are identified as dead-drop locations in the FBI's thickly detailed affidavit, which purports to quote directly from correspondence between the handlers and their source. Although Hanssen is quoted as grousing about distant sites and excessive mud, most of his alleged moonlighting went on in easily accessible, if secluded, places. It was not an Outward Bound expedition by any means. Key locations were just minutes by car from two homes Hanssen and his family lived in during two stints since 1981 in Virginia's Fairfax County. Indeed, the FBI agent told Russian handlers the best places to leave classified information - and collect money and diamonds in payment - were not the most hidden ones, according to the documents. ``Can be actually more secure in easier modes,'' he is said to have written in September 1987. The parks were code named: An (as if for Ann), Bob, Charlie, Doris, Ellis, Flo and so on. A look at the parks where the espionage is alleged to have begun in 1985 and ended Sunday, with activities and correspondence as described in the government's case: NOTTOWAY PARK: Code named simply Park and, later, Prime, Nottoway is half a mile down Lemontree Lane from the home Hanssen lived in during the 1980s. Soccer fields, tennis courts and nature trails abound. After sending the KGB material by mail, Hanssen proposed the first dead drop - a delivery left for someone to pick up without the two meeting. The drop was to be $50,000 in payment for the mailed secrets. He put a vertical piece of white tape on a signpost to signal he was ready to receive the package. The KGB put up a horizontal piece to signal the drop was made. Then him again, another vertical mark to show he had picked it up. ``Remove old tape before leaving signal,'' he instructed. Some drops at the park were botched. One time, the KGB mistakenly placed a package under the wrong corner of the footbridge. On another occasion, in 1988, a KGB agent arrived at 9:03 p.m., three minutes after the end of the prearranged drop period. The agent saw a man who had removed the white tape get in his car and drive away. On Wednesday, park employees said they do not take notice of visitors unless they are playing music too loudly or doing something obscene. Taking advantage of the park's new notoriety, a radio station set up a promotion in the parking lot, giving away lottery tickets. A man walking a dog brandished a bag and joked he had found more secrets. Actually, it was a bag of dog poop. --- FOXSTONE PARK: Code named Ellis, Foxstone is a narrow strip of woodland tracking a stream less than two miles from the Hanssens' current home. A winding, paved path crosses a road and two wooden footbridges, one open and a stone's throw from the road, the other, more tucked away and bordered by thick bramble. Here, a package from the Russians containing $55,000 sat for three days, uncollected, before they retrieved it themselves. Another drop was made five days later. Eleven days after that, Hanssen gave the signal he had picked it up. ``I say bear with me on this,'' Hanssen said in a ``Dear Friends'' letter lamenting the lonely nature of his work, ``because you must realize I do not have a staff with whom to knock around all the potential difficulties. (For me breaks in communications are most difficult and stressful.)'' On Dec. 12, he drove by four times on the road that dissects the path. It was a ``signal site'' where white tape would indicate a drop. On Dec. 26, he drove by three times in the evening, stopped with a flashlight to look around, and ``turned and walked away, shrugging his shoulders and raising his arms in a gesture of apparent disgust or exasperation,'' the FBI said. On Sunday, the FBI arrested him at the site and found a stash of classified material in a garbage bag under one of the footbridges. The FBI said he had put it there nine minutes earlier. --- LONG BRANCH NATURE CENTER About 14 miles closer to Washington, in Arlington County, the nature center is the most tucked-away of the three parks even though it is just one mile from a six-lane highway. Popular with children, it offers nature hikes for tots year-round, family campfires and, in season, gardens for ferns, butterflies and more. The Russians and their source called it Lewis. On Feb. 12, the FBI found a package under the corner of the stage of an outdoor amphitheater where children scamper, hunting for nature souvenirs. The FBI analyzed it, found $50,000 in it, photocopied material from it, and quietly put it back, keeping it under surveillance until Hanssen's arrest. ``I was sitting right next to a bag of money,'' a park employee said Wednesday, clasping his head with his hands. ^--- On the Net: FBI: http://www.fbi.gov -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2550 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 6:58pm Subject: Full text of Hanssen affidavit Full text of Hanssen affidavit http://www.fbi.gov/pressrm/pressrel/pressrel01/affidavit.pdf -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2551 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 6:59pm Subject: FBI Calculates Spy Damage FBI Calculates Spy Damage http://dsc.discovery.com/news/ap/20010220/spy2.html Associated Press, Copyright 2001 Wed. 21, 2001 ≠ The FBI is trying to calculate the national security damage allegedly wrought by one of its own agents, Robert Philip Hanssen, accused of spying for Russia for more than 15 years. FBI Director Louis Freeh says the intelligence losses appear to be ``exceptionally grave.'' An FBI affidavit describing Hanssen's alleged spying said he passed along to Soviet and later Russian agents 6,000 pages of documents ≠ a virtual catalogue of top secret and secret programs. The case marked the third time that an FBI agent has been accused of espionage, and it brought a quick reaction from President Bush and members of Congress on Tuesday. ``Allegations of espionage are a reminder that we live in a dangerous world, a world that sometimes does not share American values,'' Bush said in a statement he read to reporters on Air Force One. Declaring that espionage remains a threat to the nation even with the Cold War gone, the president added: ``To anyone who would betray its trust, I warn you, we'll find you and we'll bring you to justice.'' ``This could be a very, very, very serious case of espionage,'' said Sen. Richard Shelby, R-Ala., chairman of the Senate Intelligence Committee. ``Here's an agent who is a veteran of the FBI, who's been doing counterintelligence for a long time. He knows a lot. He could have given them a lot.'' Freeh told a news conference: ``The full extent of the damage done is yet unknown, because no accurate damage assessment could be done during the course of the covert investigation without jeopardizing it. We believe, however, that it was exceptionally grave. The criminal conduct alleged represents the most traitorous actions imaginable against a country governed by the rule of law.'' Freeh said security measures need to be tightened, and he ordered an internal review to be headed by William Webster, a former FBI and CIA director. ``We don't say, at this stage ... that we have a system that can prevent this type of conduct,'' Freeh said. Hanssen, a 25-year FBI agent, was arrested Sunday night at a park in suburban Virginia after dropping a package of documents for his Russian contacts, authorities said. FBI agents confiscated $50,000 hidden for him at a nearby drop site. An FBI affidavit alleged that Hanssen betrayed his country for about $1.4 million in cash and diamonds. A court hearing was set for March 5 for the father of six, who was charged with espionage and conspiracy to commit espionage. Hanssen, who could face the death penalty, appeared briefly in U.S. District Court in Alexandria, Va., on Tuesday to have the charges read and was ordered held without bond. He was not asked how he pleaded to the charges but outside the courthouse his lawyer, Plato Cacheris, told reporters: ``At this point, not guilty.'' In one letter cited in the FBI's affidavit, the writer, allegedly Hanssen, said he was encouraged by the memoirs of the notorious British-Soviet double agent Kim Philby. ``I decided on this course when I was 14 years old,'' the letter stated. ``I had read Philby's book.'' The FBI affidavit said Hanssen and CIA spy Aldrich Ames identified to the Russians three of their double agents, leading to the execution of two of them. The document also said Hanssen ``compromised dozens of United States government classified documents,'' including those involving: The National Measurement and Signature Intelligence Program, which involves activities and technologies including acoustic intelligence, radar intelligence, nuclear radiation detection, infrared intelligence, radio frequencies and effluent-and-debris sampling. This program is not only classified ``top secret'' but subject to further restricted handling under a category designated ``Sensitive Compartmented Information.'' A highly classified and tightly restricted analysis of the foreign threat to a classified U.S. government program. The program is classified ``top secret/SCI.'' The FBI Double Agent Program, ``top secret.'' The Intelligence Community's Comprehensive Compendium of Future Intelligence Requirements, ``top secret.'' A study on recruitment operations of the KGB, the Soviet/Russian intelligence agency, against the CIA, ``secret.'' An assessment of the KGB's effort to gather information on certain U.S. nuclear programs, ``top secret.'' A CIA analysis of the KGB's First Chief Directorate, ``secret.'' The affidavit said Hanssen also compromised a technical program ``of enormous value'' and ``specific communications intelligence capabilities, as well as several specific targets.'' And he disclosed FBI counterintelligence techniques, sources, methods and operations, the bureau said. He also tipped off the KGB to the FBI's secret investigation of Felix Bloch, a foreign service agent suspected of spying for Moscow in 1989, the FBI said. The KGB was then able to warn Bloch, the agency said. Justice Department prosecutors were never able to find key evidence that Bloch passed secret document -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From: Dawn Star Date: Tue Feb 22, 2000 11:21am Subject: transformers You better watch out using transformers across phone lines, it is real easy to interfere with the ring cycle and cause all sorts of nasty things to happen. Roger Message: 2 Date: Mon, 21 Feb 2000 12:12:07 -0600 From: Trace Carpenter Subject: Re: switch software manipulation I haven't been in the office much lately, so I haven't followed this tread very closely. Therefore I apologize if this is redundant, however if monitoring the wire pair for audio passage is the problem, you can build a fantastic little interface out of a 1:1 transformer and a non polarized capacitor. Both available at your local RadShk for a couple of bucks. You can even use a three pair RJ surface jack as a project box for the interface. We use them all the time when we're bringing audio from one source to another to keep from getting that nasty hum that you'll often get from dissimilar grounds. In fact we came up with it for use in an East Texas radio station that was having that hum problem with their equipment that they used to put callers on the air. They're cheap, easy and the nice thing is that since the transformer is a 1:1 and the cap is non polarized, there is no wrong way to hook it up and your equipment is totally isolated from the wire pairs. Like I said, I haven't been able to follow this tread lately so if this answer doesn't fit the original question, please accept my apologies. [Non-text portions of this message have been removed] 62 From: Trace Carpenter Date: Tue Feb 22, 2000 0:11pm Subject: Re: transformers Hi Roger, Maybe I didn't make the application clear. The point of the transformer and capacitor is to create an isolation to insure that very thing does not happen. Dawn Star wrote: > From: "Dawn Star" > > You better watch out using transformers across phone lines, it is real easy to interfere with the ring cycle and cause all sorts of nasty things to happen. Roger > > Message: 2 > Date: Mon, 21 Feb 2000 12:12:07 -0600 > From: Trace Carpenter > Subject: Re: switch software manipulation > > I haven't been in the office much lately, so I haven't followed this tread very > closely. Therefore I apologize if this is redundant, however if monitoring the wire > pair for audio passage is the problem, you can build a fantastic little interface > out of a 1:1 transformer and a non polarized capacitor. Both available at your > local RadShk for a couple of bucks. You can even use a three pair RJ surface jack > as a project box for the interface. > > We use them all the time when we're bringing audio from one source to another to > keep from getting that nasty hum that you'll often get from dissimilar grounds. In > fact we came up with it for use in an East Texas radio station that was having that > hum problem with their equipment that they used to put callers on the air. They're > cheap, easy and the nice thing is that since the transformer is a 1:1 and the cap is > non polarized, there is no wrong way to hook it up and your equipment is totally > isolated from the wire pairs. > > Like I said, I haven't been able to follow this tread lately so if this answer > doesn't fit the original question, please accept my apologies. > > [Non-text portions of this message have been removed] > > ------------------------------------------------------------------------ > Shop the web for great deals. Save on Computers, > electronics, Home furnishings and more. > http://click.egroups.com/1/1559/1/_/_/_/951242386/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- *Trace Carpenter *2926 Maple Ave., Ste. 200 *Dallas, Texas 75201 *214.828.4520; 214.740-0112 Facsimile *Because the fly on the wall might not be the only bug in the room.ô 63 From: Rex Throttle Date: Thu Feb 24, 2000 2:59am Subject: Blown operation in RSA Almost seems they wanted to get caught. ------ S.African spy chief defends German operation Ellis Mnyandu 02/24/00 CAPE TOWN, Feb 24 (Reuters) - South Africa's intelligence chief has defended a bungled operation to monitor visitors to the German embassy in Pretoria and said his service was well managed. ``As human beings we're fallible and therefore this incident represented an aberration rather than a norm,'' Intelligence Minister Joe Nhlanhla told Reuters. German diplomats last November found a camera in a tree focused on the entrance to their mission in Pretoria. Wires led from the camera to a recording device in a rubbish bin. Nhlanhla's ministry has not given a reason for the embassy operation, but South African newspaper reports said at the time the camera had been part of an operation to counter alleged recruitment of South Africans by the German intelligence. ``(This) is something that happens the world over. It happens with the best in the world. You can hardly be expected to work and somewhere along the road there's no mistake,'' Nhlanhla said. ``The incident of the German embassy I think is behind us now and I don't think it also meant anything out of the ordinary.'' Initially, South Africa denied spying on Germany, its biggest trading partner, but after an inquiry the government acknowledged earlier this month that the embassy had been under official surveillance. The Foreign Affairs Ministry said the ``act was conducted within the scope and framework of duty, it was nonetheless handled in an overzealous manner by an intelligence operative.'' It said Foreign Affairs Minister Nkosazana Zuma and German ambassador Harald Gannf had reaffirmed their commitment to sound relations between Berlin and Pretoria following the probe. Germany is South Africa's most important trading ally, with annual trade volume of around 22 billion rand ($3.5 billion), just ahead of Britain. Its Foreign Minister Joschka Fischer is scheduled to visit South Africa next month. ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com 64 From: Robert C. Motzer <1RCM@M...> Date: Fri Feb 25, 2000 0:12am Subject: Re: Digest Number 191 To everyone on the list: There has been some mention in the last few digests about individual models of electronic telephone systems that do not take kindly to certain pairs being shorted, certain tests being conducted, etc that are tolerated well by most all other systems. I was just wondering if anyone on the list has a somewhat complete compilation of all of these little 'glitches' or knows of a commercial publication containing that information. If not, perhaps the moderator would consent to receiving all of the 'send- ins' from list members and compiling them into another worthwhile reference file on his already excellent resource page. I was just thinking that having the 'finds & mistakes' of others compiled in one place and available when you attack a beast you haven't checked before might save a whole lot of us from some real embarrassment and 2 AM panic every time we check a system that we have never come across before. Just another 'Bob' 65 From: James M. Atkinson, Comm-Eng Date: Fri Feb 25, 2000 6:46pm Subject: Re: Digest Number 191 At 1:12 AM -0500 2/25/00, Robert C. Motzer wrote: >From: "Robert C. Motzer" <1RCM@M...> > >To everyone on the list: > >There has been some mention in the last few digests about individual models >of electronic telephone systems that do not take kindly to certain pairs >being shorted, certain tests being conducted, etc that are tolerated well by >most all other systems. I was just wondering if anyone on the list has a >somewhat complete compilation of all of these little 'glitches' or knows of >a commercial publication containing that information. If not, perhaps the >moderator would consent to receiving all of the 'send- ins' from list >members and compiling them into another worthwhile reference file on his >already excellent resource page. > >I was just thinking that having the 'finds & mistakes' of others compiled in >one place and available when you attack a beast you haven't checked before >might save a whole lot of us from some real embarrassment and 2 AM panic >every time we check a system that we have never come across before. > >Just another 'Bob' Please do not take this the wrong way, as I don't mean to offend anybody. If you do not have a copy of the exact line specification or configuration (from the manuf.) and have not yet received formal training (from the factory) on the specific system you are about the test, then leave it alone (or be prepared to learn a very painful lesson and have embarassing experience). Several years back (around 90-91) a TSCM'er in the DC area blew up a huge brand new AT&T PBX system that had just been installed. He "lit up the PBX" with the "HV Pulse Function" present in the new phone analyser he had just bought (the damage to the PBX was over 14,000 dollars). If you don't have formal training on the PBX system which you are being asked to examine then hand the project off to someone to has. Blowing a fuse is one thing, but blowing out a line card is something your customer will never forget. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 66 From: Intelligence Inc. Date: Sun Feb 27, 2000 1:53pm Subject: Re: X Ray machine for sale Per Mr. Uhrig's comments and x-ray equipment for sale. Please note that in the State of California (and many other states), the operation of ANY x-ray devices require the operator to have a state issued Fluoroscopy license. And the device must be checked out by qualified personnel daily. Lee Lapin Steve Uhrig wrote: > > From: "Steve Uhrig" > > Once upon a midnight dreary, William L. McCrory pondered, weak and weary: > > > The statement, "You also can X ray your own or someone else's > > limbs," is unprofessional and suggests that the writer has little > > familiarity with radiation safety. > > The statement, essentially, is directly from the manufacturer's > literature. > > One *primary* application advertised for the device is realtime > use in sports, to X ray a player directly on the ball field. > > The EMT profession is a major consumer of this precise model > machine. > > > No one should routinely use a portable fluoroscope > > In TSCM one might use it a grand total of 60 minutes a year, in > 15 second increments. > > > They are not magic wands. They cannot find bombs and they > > cannot find "bugs." They can only highlight objects which, to > > the well-trained observer, indicate that further close > > physical or instrumental examination is necessary. > > Don't we all say this to each other about every piece of sweep > equipment, with my soapbox showing quite a bit more wear than > most? > > > Before buying this or any other used fluoroscopic equipment, > > insist that it first be examined by a qualified inspector > > I *said* the things were at the factory for checkout and would > not ship until blessed by them. > > Steve > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > --------------------------- ONElist Sponsor ---------------------------- > > Free Valentineís Day Delivery from Petopia.com. > Looking for that pet-perfect Valentineís Day gift? > Click here for free delivery with purchases of $25 or more. > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 67 From: James M. Atkinson, Comm-Eng Date: Sun Feb 28, 1999 11:02am Subject: Vision Next time someone implies that something that is part of your future vision is impossible, improbable or even impractical, remember this list. (And perhaps quote them a favorite selection!) Enjoy the "wisdom of the ages". ************************************************* "Computers in the future may weigh no more than 15 tons." --"Popular Mechanics," forecasting the relentless march of science, 1949. ---------------------------------------------------- "I think there is a world market for maybe five computers." --Thomas Watson, chairman of IBM, 1943. ---------------------------------------------------- "I have traveled the length and breadth of this country... and talked with the best people, and I can assure you that data processing is a fad that won't last out the year." --The editor in charge of business books for Prentice Hall, 1957. ------------------------------------------------------ "But what...is it good for ?" -- Engineer at the Advanced Computing Systems Division of IBM commenting on the microchip, 1968. ------------------------------------------------------ "There is no reason anyone would want a computer in their home." --Ken Olson, president, chairman and founder of Digital Equipment Corp., 1977 --------------------------------------------------- "This 'telephone' has too many shortcomings to be seriously considered as a means of communication. The device is inherently of no value to us." -- Western Union internal memo, 1876. ----------------------------------------------------- "The wireless music box has no imaginable commercial value. Who would pay for a message sent to nobody in particular ?" -- David Sarnoff's associates (NBC) in response to his urgings for investment in the radio in the 1920s. --------------------------------------------------- "The concept is interesting and well-formed, but in order to earn better than a 'C,' the idea must be feasible." -- A Yale University management professor in response to Fred Smith's paper proposing reliable overnight delivery service. (Smith went on to found Federal Express Corp.) ----------------------------------------------------- "Who the hell wants to hear actors talk ?" -- Harry M. Warner, Warner Brothers, 1927. ------------------------------------------------------- "I'm just glad it'll be Clark Gable who's falling on his face and not Gary Cooper." --Gary Cooper on his decision not to take the leading role in "Gone with the Wind." ------------------------------------------------------- "A cookie store is a bad idea. Besides, the market research reports say America likes crispy cookies, not soft and chewy cookies like you make." -- Response to Debbi Fields' idea of starting her company, Mrs. Fields' Cookies. ---------------------------------------------------- "We don't like their sound, and guitar music is on the way out." -- Decca Recording Co. rejecting the Beatles, 1962. ------------------------------------------------------ "Heavier-than-air flying machines are impossible." --Lord Kelvin, president, Royal Society, 1895. ----------------------------------------------------- "If I had thought about it, I wouldn't have done the experiment. The literature was full of examples that said you can't do this." -- Spencer Silver, on the work that led to nthe unique adhesives on 3-M "Post-It" Notepads. --------------------------------------------------------- "So we went to Atari and said, 'Hey, we've got this amazing thing, even built with some of your parts, and what do you think about funding us ? Or we'll give it to you. We just want to do it. Pay our salary, we'll come work for you.' And they said, 'No.' So then we went to Hewlett- Packard, and they said, 'Hey, we don't need you; you haven't got through college yet.'" --Apple Computer Inc. founder Steve Jobs on attempts to get Atari and H-P interested in his and Steve Wozniak's personal computer. ------------------------------------------------------- "Professor Goddard does not know the relation between action and reaction... and the need to have something better than a vacuum against which to react. He seems to lack the basic knowledge ladled out daily in high schools." -- New York Times editorial about Robert Goddard's revolutionary rocket work, 1921. ------------------------------------------------------ "You want to have consistent and uniform muscle development across all of your muscles ? It can't be done. It's just a fact of life. You just have to accept inconsistent muscle development as an unalterable condition of weight training." -- Response to Arthur Jones, who solved the "unsolvable" problem by inventing Nautilus. ------------------------------------------------------- "Drill for oil ? You mean drill into the ground to try and find oil ? You're crazy." -- Drillers who Edwin L. Drake tried to enlist to his project to drill for oil in 1859. ------------------------------------------------------ "Stocks have reached what looks like a permanently high plateau." -- Irving Fisher, Professor of Economics, Yale University, 1929. --------------------------------------------------------- "Airplanes are interesting toys but of no military value." -- Marechal Ferdinand Foch, Professor of Strategy, Ecole Superieure de Guerre. -------------------------------------------------------- "Everything that can be invented has been invented." -- Charles H. Duell, Commissioner, U.S. Office of Patents, 1899. ------------------------------------------------------ "Louis Pasteur's theory of germs is ridiculous fiction." --Pierre Pachet, Professor of Physiology at Toulouse, 1872. --------------------------------------------------------- "The abdomen, the chest and the brain will forever be shut from the intrusion of the wise and humane surgeon." --Sir John Eric Ericksen, British surgeon, appointed Surgeon-Extraordinary to Queen Victoria, 1873. --------------------------------------------------------- "640k ought to be enough for anybody." -- Bill Gates, 1981 --------------------------------------------------------- =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 68 From: Trace Carpenter Date: Mon Feb 28, 2000 4:36pm Subject: Tempo Sidekick 7B For Sale If anyone is interested I ended up with an extra NEW STYLE Sidekick 7B recently that I'd like to sell. If you're not familiar with the Sidekick it is THE test set used by every major telephone company in the United States to troubleshoot twisted pair applications. Additionally, please note that this is the NEW Version which also has AC capabilities as well as the larger display. Not the old squared off unit. Among it's features are a single setup for testing Tip-Ring, Tip Ground, and Ring-Ground testing via a three lead hook-up. Plus your butt set hooks up to the meter which allows you to easily check on and off hook voltages with a single hook up. If you're interested you can see that actual meter at http://counterspies.com/sidekick I've also included a link to the manufactures page. The unit sells new through Power Telephone Supply for $670.00. I have found them used through Schultz for $400.00. I'm asking $285.00 for this one and will pay the shipping in the Continental U.S. Thanks -- *Trace Carpenter *2926 Maple Ave., Ste. 200 *Dallas, Texas 75201 *214.828.4520; 214.740-0112 Facsimile *Because the fly on the wall might not be the only bug in the room.ô 69 From: Dawn Star Date: Tue Feb 29, 2000 5:37pm Subject: 2.4 GHz On a recent sweep I ran into a Siemens Gigaset cordless digital 2420 phone system (2.4 GHz). http://www.ic.siemens.ca/prod/2420more.htm http://www.ic.siemens.ca/prod/2420.htm http://www.siemenscordless.com/cordless/userguide/AppendixD.html http://www.siemenscordless.com/cordless/faqs.html http://www.siemenscordless.com/about/resources/digcord.html The system uses time division duplexing and time division multiple access. It uses digital voice coding and frequency hopping spread spectrum, (100 hops per second). Also adaptive differential pulse code modulation. Voice sampling bit rate of 32kbps. To make a long story short, this damn thing is almost invisible to a spectrum analyzer and keeps a frequency counter spinning. Has anyone tried the REI VBA-2400 video booster antenna, claims to give 20 db of gain @ 2.4 Ghz http://www.research-electronics.com/brochures.htm click under oscor. I wonder it this might help? Any suggestions, if we cant see these puppies we are in big trouble! Roger [Non-text portions of this message have been removed] 70 From: James M. Atkinson, Comm-Eng Date: Tue Feb 29, 2000 6:09pm Subject: Re: 2.4 GHz At 6:37 PM -0500 2/29/00, Dawn Star wrote: >From: "Dawn Star" > >On a recent sweep I ran into a Siemens Gigaset cordless digital 2420 phone >system (2.4 GHz). > >http://www.ic.siemens.ca/prod/2420more.htm > >http://www.ic.siemens.ca/prod/2420.htm > >http://www.siemenscordless.com/cordless/userguide/AppendixD.html > >http://www.siemenscordless.com/cordless/faqs.html > >http://www.siemenscordless.com/about/resources/digcord.html > >The system uses time division duplexing and time division multiple access. >It uses digital voice coding and frequency hopping spread spectrum, (100 >hops per second). Also adaptive differential pulse code modulation. Voice >sampling bit rate of 32kbps. To make a long story short, this damn thing >is almost invisible to a spectrum analyzer and keeps a frequency counter >spinning. Has anyone tried the REI VBA-2400 video booster antenna, claims >to give 20 db of gain @ 2.4 Ghz >http://www.research-electronics.com/brochures.htm click under oscor. >I wonder it this might help? >Any suggestions, if we cant see these puppies we are in big trouble! > >Roger Roger, The Gigasets can be easily detected with a "paper clip antenna" and spectrum analyser a good 50-100 feet away inside of a house or office building. If we add the VBA (which is one hell of a product for the amount they cost) the detection can range can increased to as much as hundred of feet (I can detect them a good 500-800 feet away). For my initial checks of the 2.4 GHz band I start with a "paper clip" (in case something is spitting out hundreds of watts of RF). Once I am certain that I am not going to "poof" my SA I switch to the REI VBA (or my older active crossed log). Once I am happy with the results I move to a high gain waveguide and LNA combo (around 45 dB of gain) to scan 1-18 GHz spectrum in detail. The VBA is handy, battery powered, and small (unlike a 15+ pound waveguide and LNA combo). Couple it with a Radio Shack 2.4 Rcvr, and a small 4" TV and it's single to hunt down 2.4 GHz devices (for less then $1000). If any of the list members are interested, we are offering the VBA at $495.00, and the new OSCOR 21 GHz microwave convertor at only $9,850.00. As a courtesy to list members we will pickup the shipping and handling charges for 2nd day delivery. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 71 From: Charles Patterson Date: Tue Feb 29, 2000 11:05pm Subject: Re: 2.4 GHz You may also be interested that the Siemens Gigaset also has a "room monitor" mode. Not what you might expect, you can leave the handset in a room and it will activate and call the base when it detects sound above a certain level in the room. Can't give up that physical inspection yet! charles ----- Original Message ----- From: Dawn Star To: Sent: Tuesday, February 29, 2000 6:37 PM Subject: [TSCM-L] 2.4 GHz > > From: "Dawn Star" > > On a recent sweep I ran into a Siemens Gigaset cordless digital 2420 phone system (2.4 GHz). > > http://www.ic.siemens.ca/prod/2420more.htm > > http://www.ic.siemens.ca/prod/2420.htm > > http://www.siemenscordless.com/cordless/userguide/AppendixD.html > > http://www.siemenscordless.com/cordless/faqs.html > > http://www.siemenscordless.com/about/resources/digcord.html > > The system uses time division duplexing and time division multiple access. It uses digital voice coding and frequency hopping spread spectrum, (100 hops per second). Also adaptive differential pulse code modulation. Voice sampling bit rate of 32kbps. To make a long story short, this damn thing is almost invisible to a spectrum analyzer and keeps a frequency counter spinning. Has anyone tried the REI VBA-2400 video booster antenna, claims to give 20 db of gain @ 2.4 Ghz > http://www.research-electronics.com/brochures.htm click under oscor. I wonder it this might help? > Any suggestions, if we cant see these puppies we are in big trouble! > Roger > > > [Non-text portions of this message have been removed] > > > ------------------------------------------------------------------------ > Registering a domain name is quick and easy. > http://click.egroups.com/1/1611/0/_/507420/_/951867216/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 72 From: MICROSEARCH Date: Thu Mar 2, 2000 7:49am Subject: X-ray inspections A few days ago someone posted a message about laws requiring the licensing of x-ray units, and the requirement that they be inspected daily. According to section 115085 of the California Health & Safety Code, the frequency of inspection depends on the type of unit. Mammography units require annual inspection, whereas the units used in dental offices require an inspection every five years. I didn't spend a great deal of time on the research, but the only permit and/or licensing requirements I saw related to the medical use of x-ray units. A search on the OSHA web site yielded very little information about x-ray units. The main topic at OSHA concerned reacting to complaints about over exposure. People often overestimate the amount of danger associated with x-ray exposure. The small portable C-arm units are completely safe for use in TSCM work. Best regards, Rick Hofmann, CCO, CPP PI16998 MICROSEARCH - Technical Surveillance Countermeasures - Counterespionage P.O.Box 2084 - Cypress, Ca. 90630 714-952-3812 Fax:714-209-0037 [Non-text portions of this message have been removed] 73 From: James M. Atkinson, Comm-Eng Date: Thu Mar 2, 2000 2:33pm Subject: Voltages As per another list members request: The following is a listing of the various voltages commonly found within residential and business construction, but not including distribution voltages (such as 480 volts, etc). All of the following will typically be found in offices, bathrooms, homes, closets, kitchens, etc located in the U.S. In most residential buildings you will have 120 and 240 VAC commonly used, but in commerical buildings, mansions, (and apartment buildings) you will often find 480 VAC circuits. I have actually performed TSCM at large estates which had a 15,000 volt substation on the property that fed 480 volts into each of the buildings via transformers, which in turn provided 220/240/250V UPS systems and generators, which in turn provided 120 volts for the lighting, power etc. Of course the list does not include "everything" but it is a good place to start. Please feel free to add to the list. Note: Unless you know otherwise; assume that there is 600 volts present (or soon to be present) on all wires you are about to test. Until you know that a lower voltage (and current) is involved consider all conductors to be potentially lethal. Yes, you may have a 30 kHz, 50 mV RF signal present in the Traverse Mode, but it may also be riding on a 480 volt three phase circuit. Remember to check all conductor combination both in relatioship to other conductors, to ground, to free space, and to "other signal paths". ---------- Hard Wired Door Bells and Buzzer Systems 3-6 VDC (usually battery powered) 8-16 VAC (usually transformer powered) 24 VAC (transformer powered) Fluorescent Electromagnetic Ballasts 120 VAC 277 VAC Thermostats and HVAC Controls millivolts (Common with computerized systems) 24-30 VAC (Typical Thermostat) 120 VAC (Typically Baseboard or Similar Radiant Systems) 250 VAC (Typically Baseboard or Similar Radiant Systems) 277 VAC (Typically Baseboard or Similar Radiant Systems) Hot Water Heaters 24 VDC (Typical Thermostat) 24 VAC (Typical Thermostat) 120 VAC 240 VAC CATV 8 - 60 VDC (For Line Repeaters) Telephone (don't get me started) [grin] ...of course your mileage may vary -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 74 From: Warren Wotton Date: Thu Mar 2, 2000 10:59am Subject: Re: Voltages James. A short note from a Electrican; New construction in commercial bldg.s Power crct.s 600-575,208,3phase,120vrecp.s and lights. Higher efficency lighting systems at 347v usually with low voltage relay switching 24v and microprocessor control. At 03:33 PM 3/2/00 -0500, you wrote: >From: "James M. Atkinson, Comm-Eng" > >As per another list members request: > >The following is a listing of the various voltages commonly found within >residential and business construction, but not including distribution >voltages (such as 480 volts, etc). > >All of the following will typically be found in offices, bathrooms, homes, >closets, kitchens, etc located in the U.S. > >In most residential buildings you will have 120 and 240 VAC commonly used, >but in commerical buildings, mansions, (and apartment buildings) you will >often find 480 VAC circuits. > >I have actually performed TSCM at large estates which had a 15,000 volt >substation on the property that fed 480 volts into each of the buildings >via transformers, which in turn provided 220/240/250V UPS systems and >generators, which in turn provided 120 volts for the lighting, power etc. > >Of course the list does not include "everything" but it is a good place to >start. > >Please feel free to add to the list. > > >Note: Unless you know otherwise; assume that there is 600 volts present (or >soon to be present) on all wires you are about to test. Until you know that >a lower voltage (and current) is involved consider all conductors to be >potentially lethal. Yes, you may have a 30 kHz, 50 mV RF signal present in >the Traverse Mode, but it may also be riding on a 480 volt three phase >circuit. > >Remember to check all conductor combination both in relatioship to other >conductors, to ground, to free space, and to "other signal paths". > >---------- > >Hard Wired Door Bells and Buzzer Systems > > 3-6 VDC (usually battery powered) > 8-16 VAC (usually transformer powered) > 24 VAC (transformer powered) > > >Fluorescent Electromagnetic Ballasts > > 120 VAC > 277 VAC > > >Thermostats and HVAC Controls > > millivolts (Common with computerized systems) > 24-30 VAC (Typical Thermostat) > > 120 VAC (Typically Baseboard or Similar Radiant Systems) > 250 VAC (Typically Baseboard or Similar Radiant Systems) > 277 VAC (Typically Baseboard or Similar Radiant Systems) > > >Hot Water Heaters > > 24 VDC (Typical Thermostat) > 24 VAC (Typical Thermostat) > > 120 VAC > 240 VAC > > >CATV > > 8 - 60 VDC (For Line Repeaters) > > >Telephone > > > (don't get me started) [grin] > > > >...of course your mileage may vary > >-jma > > =================================================================== > Sed quis custodiet ipsos Custodes? > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Copyright 2000, James M. Atkinson, All Rights Reserved > > > >------------------------------------------------------------------------ >GET A NEXTCARD VISA, in 30 seconds! Get rates as low as 2.9% >Intro or 9.9% Fixed APR and no hidden fees. Apply NOW! >http://click.egroups.com/1/936/0/_/507420/_/952029409/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > Warren Wotton Contact: Brandon University Wotton@B... 270-18th Street 204-727-9665 Brandon,Manitoba CANADA R7A 6A9 CONFIDENTIALITY NOTICE: This message is intended only for the use of the individual or entity to which it is addressed and may contain information that is privileged, confidential and exempt from disclosure under applicable law. If the reader of this message is not the intended recipient you are hereby notified that any dissemination, distribution or copying of this transmission is prohibited. If you have received this transmission in error, please notify us immediately by return E-mail or by telephone at 204-727-4475 and destroy the transmission by deleting the file and/or shredding any paper copy. 75 From: Mike F. Date: Fri Mar 3, 2000 6:29pm Subject: VOLTAGES,commercial & residential The voltages found in most residential systems,is a single phase Edison system.You can get 240 volt for say a dryer circuit from this type of system. In a lot of commercial building you will have the above configuration and then you will have the 480 volt 3 phase panel(s). This being used for large air conditioners and othe equipment with motors. On the 3 phase you get 480 volt phase to phase,A-PHASE,B-PHASE,& C-PHASE. So you can get 480volt from A TO B,A TO C,AND B TO C. In the panel you will have ground bar which we'll call G. 277 volt phase to ground.So for 277volt A TO G,B TO G,C TO G. It would be more accurate to use a Nuetral,therefore it is really, A TO N,B TO N,C TO N for your 277volts, The 277 voltage is used primarily in Lighting systems. later4,mike fiorentino 76 From: Jay Coote Date: Fri Feb 4, 2005 3:40pm Subject: Panasonic Phone Switch Assistance Has anyone looked into the vulnerabilities of a Panasonic KX-T123211D switching system? It looks as if remote and on-site programming can be accomplished. Remote programming (per their badly written manual) looks like PC-programmable via modem and generic comm software or dumb terminal and modem. There is a SYSTEM switch marked EIA (local programming) SET for remote programming and PITS (they don't say what PITS is for). I would like to eliminate any back door programming or lines, as well as cut out the programming features and change the access code. "RTFM" Thanks, Jay ˇ 77 From: Charles Patterson Date: Fri Mar 3, 2000 11:47pm Subject: Re: Panasonic Phone Switch Assistance Hi Jay, You are mostly correct. The 123211D can be programmed remotely as long as it has the required cards installed in it. If you have looked inside the cabinet, the cards used for remote programming will be in the upper shelf. The first card needed is the KXT123291, DISA card, the second card needed is the KXT123296 modem card. If the modem card is not there, then remote programming cannot be done. There may also be a remote diagnostic card: KXT123295, or a second DISA card KXT123292. The DISA cards provide "Direct Inward System Access" - the ability to dial in from outside and reach another extension directly, but they do not provide any remote programming capability by themselves. The modem card is required. Most installers do not use remote programming on this system. The switch on the side selects programming by direct rs232 connection (EIA) or PITS which is Panasonics fun anacronim for "proprietary integrated telephone set" (they love weird letter combinations). PITS programming means programming by the telephone set. The set plugged into the lowest numbered jack (usually 101) becomes a programming phone when the switch is thrown. When the switch is in EIA mode I believe it basically shuts down the phone system for direct connect programming (RS232), so that is not used very often either. hope this helps! Charles Charles Patterson communications@c... Global Communications Tarrytown, NY http://www.telephonesecurity.com ----- Original Message ----- From: Jay Coote To: Sent: Friday, March 03, 2000 8:59 PM Subject: [TSCM-L] Panasonic Phone Switch Assistance > > From: "Jay Coote" > > Has anyone looked into the vulnerabilities of a Panasonic KX-T123211D > switching system? It looks as if remote and on-site programming can be accomplished. Remote programming (per their badly written manual) > looks like PC-programmable via modem and generic comm software > or dumb terminal and modem. There is a SYSTEM switch marked EIA > (local programming) SET for remote programming and PITS (they don't > say what PITS is for). > > I would like to eliminate any back door programming or lines, as well > as cut out the programming features and change the access code. > > "RTFM" > > Thanks, > Jay > ˇ > > ------------------------------------------------------------------------ > MAXIMIZE YOUR CARD, MINIMIZE YOUR RATE! > Get a NextCard Visa, in 30 seconds! Get rates as low as > 0.0% Intro or 9.9% Fixed APR and no hidden fees. > Apply NOW! > http://click.egroups.com/1/2122/0/_/507420/_/952135149/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 78 From: Miguel Puchol Date: Sun Mar 5, 2000 5:44pm Subject: RE: 2.4 GHz Hi all, > The Gigasets can be easily detected with a "paper clip antenna" and > spectrum analyser a good 50-100 feet away inside of a house or office > building. Just to add some comments on the Gigaset question. I own a couple of them, and they are great cordless phones. Regarding detection, it must be said that the DECT standard states, and you will find this in some Gigaset manuals, that the phones use 120 duplex channels, between 1880 and 1900 MHz in 1728 kHz channel steps. Binary speed of each slot within a channel is 1152 kbit/s, with an average power output of 10 mW. The signal can be easily be picked up by a decent scanner (AR5000 for example) by scanning 1880 MHz up in steps of 1728 kHz. If anybody is interested in knowing what they sound like, I can record some audio and send it across, let me know. Cheers, Mike 79 From: Dawn Star Date: Sat Mar 11, 2000 6:11pm Subject: The Passing of Norman Perle I would like to take a moment of your time to talk about my friend, Norman Perle. He passed to the Spirit World on February 19, 2000 while at a security convention in California. He was 61 years old. I met Norman back in 1973 when I first started in counter-measures. There were only three people doing bug sweeps in Los Angeles at that time: Norm, a fellow named Sergio Borquez and myself. When I attempted in those early days to contact Norm, he was reluctant to talk and was very secretive about his business and techniques. At that time he had an office in a high-rise building off of Hollywood Blvd. As the years went by and he realized that there was plenty of business for everybody, he became more friendly. Eventually, we started sharing information on devices that were found and techniques that we were developing with the TDR, which at that time was brand new. Somewhere in the late '70's Norman decided to shift his focus to being an expert in the area of audiotape verification. He became an expert witness in this area and certainly one of the best-known in all of the country. If my memory serves me right, he worked on the Nixon tapes. In the past 10 years or so, when I had visited him at his home office in Northridge, it was kind of like going to Dr. Frankenstein's laboratory. His lab was filled from floor to ceiling with stacks of technical information, test equipment, and associated components. There was barely room to walk yet he seemed to know where everything was. He at that time showed me some of the advance technology and techniques of micro-photographing of audio images. I would like to honor my friend at this time by telling one of our shared bug-sweep stories. Some years ago, I was in Las Vegas sweeping some gambling casinos. I got an emergency call from Los Angeles from a noted civil rights attorney. Some Palestinian people had been arrested by the federal government and charged with terrorism. This attorney thought that the federal government was bugging the phones at the defense attorney's offices. The circumstances of the case were that the Arab Defense League had set up a defense team for these men that were charged at an existing attorney's office in West Los Angeles. After about a week, or ten days, the activity became too much to handle at this office. So the defense team was moved across town to an office in Hollywood. The first day that the new telephone lines were operational in the new Hollywood office, the secretaries found that they were talking to the secretaries at the old office across town. The lines in both locations were cross-connected. The government, after discovering that the office had moved, had also moved their wiretaps to the trunks of the new location but had forgotten to lift the taps at the old location. This led to the lines at both offices being crossed. I called Norman and told him that I couldn't get back fast enough for this situation and asked him if he could handle it in my place. He took off right away to the attorney's office. He was able, in a matter of hours, to get the technical evidence to support this finding. The defense team immediately went to federal court with a discovery order for a wiretap on legal counsel's lines. The federal judge was outraged and ordered the government to show cause. Within a short period of time, all charges against the defendants were dropped and the men were set free. I am grateful for Norman doing excellent work for me in my absence. He was an extremely dedicated and meticulous individual. He did whatever it took to the 'nth' degree to present the best evidence possible. Norman is survived by his wife Barbara Perle and their two children. Barbara asks that anyone that would like to could make a donation in Norman's name to the American Diabetes Society. Barbara can be contacted by mail at Barbara Perle, 8357 Shirley Avenue, Northridge CA 91324. Norman, you will be greatly missed and hopefully we will aspire to do the quality work that you did when you were on the frontline. Thank you for being my friend for so many years. Roger Tolces [Non-text portions of this message have been removed] 80 From: Michael Martz Date: Sun Mar 12, 2000 2:19pm Subject: For Sale: Kaiser SCD5 Hello, I have an unused new in box Marty Kaiser SCD5 Carrier Current detector for sale for $200 if anybody needs one. The battery powered SCD5 detects VLF (10 KHz to 700 KHz) carrier-current signals on AC power or telephone lines. The unit is supplied withdetector/amplifier assembly, AC and telephone input cables (both protected to 400 volts DC or 50/60 Hz AC) and headset. Please email for any questions. Thanks, MM 81 From: James M. Atkinson, Comm-Eng Date: Fri Mar 17, 2000 3:47pm Subject: Larry LaPrise There was recently a great loss in the entertainment world this week. Larry LaPrise, the Detroit native who wrote the song "Hokey Pokey", died recently at the age of 83. It was especially difficult for the family. They had trouble keeping him in the casket. They'd put his left leg in and, well... you know the rest. Happy St. Patties Day -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 82 From: Brown & Sikes Date: Fri Mar 17, 2000 6:48pm Subject: Re: For Sale: Kaiser SCD5 Michael; Sorry, just got around to looking over the e-mails. Is the c/c detector still available? Let me know. Thanks Martin Brown brnsike@s... Michael Martz wrote: > From: Michael Martz > > Hello, > > I have an unused new in box Marty Kaiser SCD5 Carrier Current > detector for sale for $200 if anybody needs one. > > The battery powered SCD5 detects VLF (10 KHz to 700 KHz) > carrier-current signals on AC power or telephone lines. The unit is > supplied withdetector/amplifier assembly, AC and telephone input > cables (both protected to 400 volts DC or 50/60 Hz AC) and headset. > > Please email for any questions. > > Thanks, > > MM > > ------------------------------------------------------------------------ > DON'T HATE YOUR RATE! > Get a NextCard Visa, in 30 seconds! Get rates as low as > 0.0% Intro or 9.9% Fixed APR and no hidden fees. > Apply NOW! > http://click.egroups.com/1/2120/0/_/507420/_/953072859/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 83 From: James M. Atkinson, Comm-Eng Date: Mon Mar 20, 2000 1:28pm Subject: Massachusetts Driving Rules [Humor] Massachusetts Driving Rules [Humor] 1. A right lane construction closure is just a game to see how many people can cut in line by passing you on the right as you sit in the left lane waiting for the same drivers to squeeze their way back in before hitting the orange construction barrels. 2. Turn signals will give away your next move. A real Massachusetts driver never uses them. Use of them in Boston may be illegal. 3. Under no circumstances should you leave a safe distance between you and the car in front of you, or the space will be filled in by somebody else putting you in an even more dangerous situation. 4. Crossing two or more lanes in a single lane-change is considered "going with the flow." 5. The faster you drive through a red light, the smaller the chance you have of getting hit. 6. Never get in the way of an older car that needs extensive bodywork. Massachusetts is a no-fault insurance states and the other driver has nothing to lose. 7. Braking is to be done as hard and late as possible to ensure that your ABS kicks in, giving a nice, relaxing foot massage as the brake pedal pulsates. For those of you without ABS, it's a chance to stretch your legs. 8. Construction signs warn you about road closures immediately after you pass the last exit before the backup. 9. The new electronic traffic warning system signs are not there to provide useful information. They are only there to make Massachusetts look high-tech and to distract you from seeing the State Police Radar car parked on the median. 10. Never pass on the left when you can pass on the right. 11. Speed limits are arbitrary figures, given only as suggestions and are apparently not enforceable during rush hour. 12. Just because you're in the left lane and have no room to speed up or move over doesn't mean that a Mass driver flashing his high beams behind you doesn't think he can go faster in your spot. 13. Please remember that New Hampshire is the Granite State, named so for a reason. Try to stay on the road. 14. Always slow down and rubberneck when you see an accident or even if someone is just changing a tire. 15. Throwing litter on the roads adds variety to the landscape and gives Adopt-a-Highway Crews something to clean up. 16. It is assumed that State Police cars passing at high speed may be followed in the event you need to make up a few minutes in your travel. 17. Learn to swerve abruptly. Massachusetts is the home of high-speed slalom driving thanks to DOT, which places potholes in various locations to test drivers' reflexes. 18. It is traditional in Massachusetts to honk your horn at cars that don't move the instant the light changes. 19. Seeking eye contact with another driver revokes your right of way, except in Boston where it acts as an invitation to duel or play chicken. 20. Never take a green light at face value. Always look right and left before proceeding. (In Maine it is allowed to stop and then decide which direction to turn.) 21. Remember that the goal of every Massachusetts driver is to get there first, by whatever means necessary. 22. Real Massachusetts female drivers can put on pantyhose, apply eye makeup and balance the checkbook at seventy-five miles per hour during a snowstorm in bumper-to-bumper traffic. 23. Real Massachusetts male drivers can remove pantyhose and a bra at seventy-five miles per hour in bumper-to-bumper traffic during daylight hours. 24. Heavy snow, ice, fog, and rain are no reasons to change any of the previously listed rules. These weather conditions are God's way of ensuring a natural selection process for body shops,junk yards, and new vehicle sales. =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 84 From: James M. Atkinson, Comm-Eng Date: Mon Mar 20, 2000 4:34pm Subject: Estimate Worksheet for TSCM Services Good Afternoon, I will be adding a "Estimate Worksheet for TSCM Services" to my website and would like to solicit opinions (in private) before I make it live. The worksheet (which is still in Draft form) may be found at the following address: http://www.tscm.com/SweepsEstimate.html I have been using a similar estimation worksheet, but would like to offer something the consumer can fill out. Do you think it would be helpful to add a paragraph explaining each block of the worksheet, or should I post it just as it is? Thank You, -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 85 From: Date: Mon Mar 20, 2000 4:55pm Subject: Re: Estimate Worksheet for TSCM Services Greetings. I am of the opinion that your document on pricing is self-explanatory. Maybe a link on each aspect linking to a page that explains the process in detail would be efficacious. Kanbanwa, Erik. http://community.webtv.net/Negative-/Gotterdammerung 86 From: Trace Carpenter Date: Tue Mar 21, 2000 8:46am Subject: Re: Estimate Worksheet for TSCM Services I like the sheet and although it is self explanatory to those of us in the profession, a description might be beneficial to the end customer. If they don't need it, no damage is done. "James M. Atkinson, Comm-Eng" wrote: > From: "James M. Atkinson, Comm-Eng" > > Good Afternoon, > > I will be adding a "Estimate Worksheet for TSCM Services" to my > website and would like to solicit opinions (in private) before I make > it live. > > The worksheet (which is still in Draft form) may be found at the > following address: > > http://www.tscm.com/SweepsEstimate.html > > I have been using a similar estimation worksheet, but would like to > offer something the consumer can fill out. > > Do you think it would be helpful to add a paragraph explaining each > block of the worksheet, or should I post it just as it is? > > Thank You, > > -jma > =================================================================== > Sed quis custodiet ipsos Custodes? > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Copyright 2000, James M. Atkinson, All Rights Reserved > > ------------------------------------------------------------------------ > GET A NEXTCARD VISA, in 30 seconds! Get rates > as low as 0.0% Intro APR and no hidden fees. > Apply NOW! > http://click.egroups.com/1/975/0/_/507420/_/953591678/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- *Trace Carpenter *2926 Maple Ave., Ste. 200 *Dallas, Texas 75201 *214.828.4520; 214.740-0112 Facsimile *Because the fly on the wall might not be the only bug in the room.ô 87 From: Jay Coote Date: Tue Mar 21, 2000 7:47pm Subject: TSCM receivers With the shadow of asinine receiver/scanner laws looming over US security and TSCM persons.... what can one do to obtain a receiver (for legitimate TSCM use) which has not been electronically neutered? It would be just like a 'bugger' to set his/her device to transmit within the coverage gaps of US-market receivers.... Jay Coote TSCM@j... 88 From: James M. Atkinson, Comm-Eng Date: Tue Mar 21, 2000 8:43pm Subject: Re: TSCM receivers At 9:26 PM -0500 3/21/00, Jay Coote wrote: >From: "Jay Coote" > >With the shadow of asinine receiver/scanner laws looming over >US security and TSCM persons.... what can one do to obtain >a receiver (for legitimate TSCM use) which has not been >electronically neutered? >It would be just like a 'bugger' to set his/her device to transmit >within the coverage gaps of US-market receivers.... >Jay Coote >TSCM@j... > A round trip airplane ticket to Canada is easiest method. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 89 From: Scott Malcolm Date: Tue Mar 21, 2000 6:51pm Subject: Re: Digest Number 202 > Message: 2 > Date: Mon, 20 Mar 2000 17:34:12 -0500 > From: "James M. Atkinson, Comm-Eng" > Subject: Estimate Worksheet for TSCM Services > > Good Afternoon, > > I will be adding a "Estimate Worksheet for TSCM Services" to my > website and would like to solicit opinions (in private) before I make > it live. > > The worksheet (which is still in Draft form) may be found at the > following address: > > http://www.tscm.com/SweepsEstimate.html >snip James, I just added your: Optional Written Report (Typically 10% of total fee) to my present contract. Most of my clients could care less about a report up an over the hard documented findings. Excellent time saver. Regards, Scott Malcolm Malcolm & Associates Inc. Serving the State of Wisconsin Office 262 965 4426 Fax 262 965 4629 http://www.execpc.com/~conf-pi "Your Confidential Alternative" 90 From: Hoffman Date: Tue Mar 21, 2000 8:24pm Subject: Re: TSCM receivers > With the shadow of asinine receiver/scanner laws looming over > US security and TSCM persons.... what can one do to obtain > a receiver (for legitimate TSCM use) which has not been > electronically neutered? > Jay Coote ------------------------------------ Hoffman replies: Legitimate electronic test equipment is exempt from the laws you mentioned in 18 U.S.C. Chapter 119, Sec 2512. The only reason that companies like OPTOELECTRONICS, and the various scanner manufacturers block the cell band in my opinion, is because they are too cowardly, and they lack the testicular fortitude to claim that their equipment is for telecommunication company use, and so they are afraid of reprisals by rabid federal law enforcement. Anyway, whenever I want a scanning receiver which covers the cellular band, I just order it from various U.S. mail-order resellers. Despite common myth, there are lots of people who are all too happy to ignore the law; you just have to know who the "friendlies" are that will sell you the goods. I'll give you advice on how to purchase such units. It's just like illicit drugs. At first it seems as if nobody is selling the stuff, but if you do a little digging and scratch the surface; make some telephone calls; buy some products from dealers; and get to know people... You'll then realize that you can get cell capable scanners with no problem, so long as you've got the green. From: Matthijs van der Wel Date: Thu Feb 22, 2001 0:14am Subject: Information Warfare -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The Dutch company "TNO Physics and Electronics Lab" is writing a report for the Dutch government on the status of The Netherlands electronic infrastructure in case of an 'Information War' (cyberwar) . Although the report isn't finished yet, the first indications are not at all too positive (...). On their website, TNO offers a collection of links to websites and articles about Information Warfare: http://www.tno.nl/instit/fel/intern/wkiwar5.html. TNO also has a page with links about the subject "Information Operations": http://www.tno.nl/instit/fel/intern/wkinfdef.html and "Information Security": http://www.tno.nl/instit/fel/intern/wkinfsec.html All pages are in English and worth a visit. Yours sincerely, Matthijs van der Wel e-Consultant (and in no way affiliated with TNO, just someone who got curious after a lecture TNO gave on the subject) -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.8 for non-commercial use iQA/AwUBOpPWC5+uKjzZYzkREQKH8wCfZ6ufQlk7u9LzHXJAwmTC1JwbvsUAoLC7 nLp4OvCvg0EteOWflVwlYSH5 =1POz -----END PGP SIGNATURE----- 2553 From: A Grudko Date: Thu Feb 22, 2001 9:07am Subject: Re: FBI agent ----- Original Message ----- > It's a shame that someone would sell out his own country for the love of money. Here in southern Africa there is a trend which you might look out for. Zimbabwe President Robert Mgabe has uncovered a plot to overthrow his 23 year government, and in reply has fired the judiciary, seized all foreign currency, bombed the press and encouraged the occupation of private land by mobs. This subversive process is described as a 'democratic election'. Watch out in case one comes your way. Andy Grudko Johannesburg 2554 From: Bob Washburne Date: Thu Feb 22, 2001 2:32pm Subject: Re: Darwin Awards Update!! Fiction (can't call them "Urban Legends" until everyone has heard them and knows them to be true) has crept into the Awards in the past, but all entries appear to be tentative until verified. Ideally, verification comes from the actual hospital or corinor's report. But in some cases, e.g. a story from Poland, you only have a story from one of the major news wires. Even so, this lends some measure of credibility. This is a good lesson for all of us: healthy skeptisism without summary dismissal until the story can be confirmed one way or the other. All filtered through the understanding that we are not in an ideal world. Bob Washburne David Miller wrote: > > Personally I think they all were a little contrived. Not your usual Darwin > fare. > > -----Original Message----- > From: Robert G. Ferrell [mailto:rferrell@r...] > Sent: Wednesday, February 21, 2001 2:42 PM > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] Darwin Awards Update!! > > > Nothing was found of the technicians, but the > >lighter was virtually untouched by the explosion. The technician > >suspected of causing the blast had never been thought of as 'bright' > >by his peers. > > I don't believe this one. Too Warner Brothers. > > RGF > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 2555 From: James M. Atkinson, Comm-Eng Date: Thu Feb 22, 2001 7:47pm Subject: USA v. Robert Philip Hanssen: Affidavit in Support of Criminal Complaint, Arrest Warrant and Search Warrant IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division UNITED STATES OF AMERICA) ) v.) )CRIMINAL NO. ROBERT PHILIP HANSSEN,) a/k/a "B") a/k/a "Ramon Garcia") a/k/a "Jim Baker") a/k/a "G. Robertson") AFFIDAVIT IN SUPPORT OF CRIMINAL COMPLAINT, ARREST WARRANT AND SEARCH WARRANTS I, Stefan A. Pluta, being duly sworn, depose and state as follows: 1. I am presently employed as a Special Agent of the Federal Bureau of Investigation (FBI) and am assigned to the Washington Field Office in the District of Columbia. I have been employed as an FBI Special Agent for approximately 13 years. I have completed FBI training in foreign counterintelligence matters. As a result of my training and experience, I am familiar with the tactics, methods, and techniques of foreign intelligence services and their agents. 2. This affidavit is in support of applications for the following: A) A warrant for the arrest of ROBERT PHILIP HANSSEN (DOB 4/18/44) for violations of Title 18 United States Code, Sections 794 (a) (Transmitting National Defense Information) and 794 (c) (Conspiracy to Commit Espionage); and B) Search warrants for: 1) The residence of ROBERT PHILIP HANSSEN, such premises known and described as a single family residence located at: 9414 Talisman Drive Vienna, Virginia 22182 as more fully described in Attachment B, and which is within the Eastern District of Virginia; 2) One silver 1997 Ford Taurus, bearing VIN IFALP52U9VG211742 and Virginia license plate number ZCW9538, which is owned by ROBERT PHILIP HANSSEN and anticipated to be within the Eastern District of Virginia; 3) One 1993 Volkswagen van, bearing VIN WV2KC0706PH080424 and Virginia license plate number ZCW9537, which is owned by ROBERT PHILIP HANSSEN and anticipated to be within the Eastern District of Virginia; 4) One 1992 Isuzu Trooper, bearing VIN JACDH58W7N7903937 and Virginia license plate YRP3849, which is owned by ROBERT PHILIP HANSSEN and anticipated to be within the Eastern District of Virginia. 3. In my capacity as case agent assigned to this matter, I have examined documents and other records pertinent to this investigation from numerous sources. Searches and various forms of surveillance have also been conducted pursuant to the Foreign Intelligence Surveillance Act (FISA) and orders of the Foreign Intelligence Surveillance Court (FISC). I. SUMMARY OF INVESTIGATION 4. The results of this investigation to date indicate that there is probable cause to believe that, beginning in 1985 and continuing to the present, ROBERT PHILIP HANSSEN (hereinafter "HANSSEN"), a United States citizen, has conspired with officers and agents of the Union of Soviet Socialist Republics (hereinafter "USSR" or "Soviet Union") and with its principal successor state, the Russian Federation (hereinafter "Russia") to commit espionage against the United States on behalf of a foreign government, specifically the Soviet Union or Russia, and has in fact engaged in such espionage. 5. The evidence establishes that between 1985 and the present, HANSSEN ≠ who the KGB/SVR referred to as "B" ≠ has engaged in the following conduct in violation of 18 U.S.C. ßß794 (a) and (c): (a) He compromised numerous human sources of the United States Intelligence Community. Three of these sources were compromised by both HANSSEN and former CIA officer Aldrich Ames, resulting in their arrest, imprisonment and, as to two individuals, execution. HANSSEN compromised these three individuals expressly in order to enhance his own security and enable him to continue spying against the United States. (b) He compromised dozens of United States Government classified documents, including documents concerning the National MASINT (Measurement and Signature Intelligence) Program (classified TOP SECRET/SCI), the United States Double Agent Program (classified SECRET), the FBI Double Agent Program (classified TOP SECRET), the United States Intelligence Community's Comprehensive Compendium of Future Intelligence Requirements (classified TOP SECRET), a study concerning KGB recruitment operations against the CIA (classified SECRET), an assessment of the KGB's effort to gather information concerning certain United States nuclear programs (classified TOP SECRET), a CIA analysis of the KGB's First Chief Directorate (classified SECRET), a highly classified and tightly restricted analysis of the foreign threat to a specific named highly compartmented classified United States Government program (classified TOP SECRET/SCI), and other classified documents of exceptional sensitivity. (c) He compromised United States Intelligence Community technical operations of extraordinary importance and value. This included specific electronic surveillance and monitoring techniques and precise targets of the United States Intelligence Community. In one case, he compromised an entire technical program of enormous value, expense and importance to the United States Government. In several other cases, he compromised the United States Intelligence Community's specific communications intelligence capabilities, as well as several specific targets. (d) He compromised numerous FBI counterintelligence investigative techniques, sources, methods and operations, and FBI operational practices and activities targeted against the KGB/SVR. He also advised the KGB/SVR as to specific methods of operation that were secure from FBI surveillance and warned the KGB/SVR as to certain methods of operation which were subject to FBI surveillance. (e) He disclosed to the KGB the FBI's secret investigation of Felix Bloch, a Foreign Service Officer, for espionage, which led the KGB to warn Bloch that he was under investigation, and completely compromised the investigation. (f) HANSSEN's conspiratorial activities continue to the present. HANSSEN continues to monitor a particular SVR signal site, doing so on numerous occasions in December 2000, January 2001 and February 2001. A recent search of HANSSEN's personal vehicle, pursuant to court authorization, disclosed a number of classified SECRET documents, entries in a personal journal concerning matters related to the instant investigation, and items typically used to mark signal sites. It has also been determined that HANSSEN continues to attempt to ascertain whether he has become the subject of FBI investigative interest, including checking FBI records to determine whether there have been recent entries as to his own name, his home address, or the signal site. (g) Over the course of HANSSEN's espionage activities, he communicated on numerous occasions with KGB/SVR personnel. This Affidavit cites 27 letters he sent to the KGB/SVR, and it describes 33 packages the KGB/SVR left for HANSSEN at secret locations, and 22 packages HANSSEN left for the KGB/SVR at secret locations. The Affidavit also describes two telephone conversations HANSSEN had with KGB personnel. The Affidavit describes 26 computer diskettes that HANSSEN passed to the KGB/SVR, containing additional disclosures of information, and 12 diskettes that the KGB/SVR passed to "B". HANSSEN provided the KGB/SVR more than 6,000 pages of documentary material. (h) For his services to the KGB/SVR, HANSSEN was paid over $600,000 in cash and diamonds. In addition, the KGB/SVR placed funds in escrow in a Moscow bank on HANSSEN's behalf. Some time in the last two years, the KGB/SVR informed HANSSEN that the escrowed funds are now worth at least $800,000. II. KEY TERMS AND ENTITIES 6. The term counterintelligence means information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassination conducted for or on behalf of foreign powers, organizations or persons. 7. The KGB (Komitet Gosudarstvenoy Bezopasnosti, or Committee for State Security) was the intelligence service of the former Soviet Union. The KGB's First Chief Directorate (FCD) was responsible for foreign intelligence, active measures, and counterintelligence. KGB FCD intelligence officers assigned to Soviet diplomatic missions could be assigned to Line KR (Foreign Counterintelligence), Line N (Illegals Operations), Line PR (Political), or Line X (Science and Technology), among others. The KGB's Second Chief Directorate (SCD) was responsible, among other things, for domestic counterintelligence, that is, counterintelligence activities within the Soviet Union. The KGB's Moscow headquarters was referred to as the Moscow Center. 8. Since December 1991, the SVR (Sluzhba Vneshney Razvedki Rossii, or Russian Foreign Intelligence Service) has been the Russian Federation's successor agency to the KGB's foreign intelligence arm. 9. The GRU (Glavnoye Razvedyvateinoye Upravlenie, or Chief Intelligence Directorate of the General Staff) was the military intelligence agency of the former Soviet Union, and continues to serve that function for the Russian Federation. 10. The Soviet/Russian Embassy in Washington, D.C., is located at 1125 16th Street, N.W.; the Soviet/Russian Diplomatic-Compound is located at 2650 Wisconsin Avenue, N.W. The KGB/SVR presence in a Soviet/Russian diplomatic mission is called the Rezidentura. headed by the KGB/SVR Rezident. 11. An agent-in-place is a person who remains in a position while acting under the direction of a hostile intelligence service, so as to obtain current intelligence information. It is also called a recruitment-in-place. 12. An illegal is an intelligence officer or a recruited agent who operates in a foreign country in the guise of a private person, and is often present under false identity. 13. A double agent is an agent engaged in clandestine activity for two or more intelligence services who provides information about one service to another. 14. A dead drop is a prearranged hidden location used for the clandestine exchange of packages, messages, and payments, which avoids the necessity of an intelligence officer and an agent being present at the same time. 15. A signal site is a prearranged fixed location, usually in a public place, on which an agent or intelligence officer can place a predetermined mark in order to alert the other to operational activity. Such a mark may be made by, for example, chalk or a piece of tape. The operational activity signaled may be the fact that a dead drop has been "loaded" and is ready to be "cleared." A call-out signal may be used to trigger a contact between an agent and an intelligence officer. 16. An accommodation address is a "safe" address, not overtly associated with intelligence activity, used by an agent to communicate with the intelligence service for whom he working. 17. The FBI has documented the use by the KGB/SVR of agents-in-place, illegals, double agents, dead drops, signal sites, call-out signals, and accommodation addresses, including their use in the Northern Virginia area, in the Eastern District of Virginia. 18. The United States Intelligence Community is the aggregation of those Executive Branch entities and programs that, in accordance with applicable United States law and the provisions of Executive Order 12333, conduct intelligence activities that are necessary for the conduct of foreign relations and the protection of the national security of the United States, and that make up the total national intelligence effort. It includes the FBI's National Security Division, the Central Intelligence Agency (CIA), the National Security Agency (NSA), the National Reconnaissance Organization (NRO), the Defense Intelligence Agency (DIA), the Bureau of Intelligence and Research of the Department of State (DOS/INR), and the intelligence elements of the military service branches, among other entities. 19. The Foreign Intelligence Surveillance Act (FISA), Title 50, United States Code, Sections 1801-1811 and 1821-1829, provides for electronic surveillance and searches within the United States directed at persons for whom there is probable cause to believe they are knowingly engaged in clandestine intelligence gathering activities for or on behalf of a foreign power, which activities involve or may involve a violation of the criminal statutes of the United States, as authorized by the Foreign Intelligence Surveillance Court (FISC). 20. Aldrich Hazen Ames is a former CIA officer who in 1994 was arrested and subsequently pled guilty to having committed espionage as an agent of the KGB and SVR. Ames volunteered to the KGB in April 1985, and provided information to the KGB and the SVR until the date of his arrest in February 1994. 21. Classified information is defined by Executive Order 12958 and its predecessor orders (including E.O. 12356), as follows: information in any form that (1) is owned by, produced by or for, or under the control of the United States Government; (2) falls within one or more of the categories set forth in Section 1.5 of the Order (including intelligence sources or methods, cryptology, military plans, and vulnerabilities or capabilities of systems, installations, projects, or plans relating to the national security), and (3) is classified by an original classification authority who determines that its unauthorized disclosure reasonably could be expected to result in damage to the national security. Where such unauthorized release could reasonably result in "serious" damage, the information may be classified as SECRET. Where such damage is "exceptionally grave," the information may be classified TOP SECRET. Access to classified information at any level may be further restricted through compartmentation in SENSITIVE COMPARTMENTED INFORMATION (SCI) categories. Dissemination of classified information at any level may also be restricted through caveats such as: NOFORN (Not Releasable to Foreign Nationals), NOCONTRACT (Not Releasable to Contractors or Contractor/Consultants), WNINTEL (Warning Notice: Intelligence Sources and Methods Involved), and ORCON (Dissemination and Extraction of Information Controlled by Originator). III. BACKGROUND OF ROBERT PHILIP HANSSEN 22. ROBERT PHILIP HANSSEN was born on April 18, 1944, in Chicago, Illinois, where he was raised. He is a United States citizen. 23. HANSSEN received an AB degree in Chemistry from Knox College, in Illinois, in 1966. He studied dentistry at Northwestern University, in Chicago, Illinois, from 1966 to 1968, and received an MBA degree in Accounting and Information Systems from Northwestern University in 1971. He became a Certified Public Accountant in 1973. 24. From 1971 to 1972, HANSSEN was employed as a junior accountant at an accounting firm in Chicago, Illinois. In 1972, HANSSEN joined the Chicago Police Department as an investigator in the Financial Section of the Inspection Services Division. 25. HANSSEN studied the Russian language during college. A. FEDERAL BUREAU OF INVESTIGATION EMPLOYMENT AND DUTIES 26. On January 12, 1976, HANSSEN entered on duty as a Special Agent of the Federal Bureau of Investigation. He has served as an FBI Special Agent continuously since that date. 27. After initial training, HANSSEN was assigned to the FBI Field Office in Indianapolis, Indiana, and served on a White Collar Crime squad at the Resident Agency in Gary, Indiana, until August 1, 1978. 28. From August 2, 1978 to January 10, 1981, HANSSEN was assigned to the FBI Field Office in New York, New York, initially working on accounting matters in the Field Office's criminal division. 29. In March 1979, HANSSEN was detailed to the New York Field Office's intelligence division to help establish the FBI's automated counterintelligence data base in that office. At that time, this was a new automated database of information about foreign officials, including intelligence officers, assigned to the United States. Its contents were classified up to the SECRET level. 30. From January 12, 1981, to September 22, 1985, HANSSEN was assigned to FBI Headquarters in Washington, D.C., as a Supervisory Special Agent in the Intelligence Division. From January 1981 to August 1983, HANSSEN was assigned to the Budget Unit, which managed the FBI's portion of the United States Intelligence Community' s National Foreign Intelligence Program, and prepared budget justifications to Congress. This office had access to the full range of information concerning intelligence and counterintelligence activities involving FBI resources. From August 1983 until September 1985, HANSSEN was assigned to the Soviet Analytical Unit, which supported FBI FCI operations and investigations involving Soviet intelligence services, and provided analytical support to senior FBI management and the Intelligence Community. While at FBI Headquarters, HANSSEN was assigned to the intelligence component of a particular highly-compartmented classified United States Government program. He also served on the FBI's FCI Technical Committee, which was responsible for coordinating technical projects relating to FCI operations. 31. From September 23, 1985, to August 2, 1987, HANSSEN was assigned to the intelligence division of the FBI Field Office in New York, New York, as supervisor of an FCI squad. 32. From August 3, 1987, to June 24, 1990, HANSSEN was reassigned to FBI Headquarters in Washington, D.C., where he again served as a Supervisory Special Agent in the Intelligence Division's Soviet Analytical Unit. 33. From June 25, 1990, to June 30, 1991, HANSSEN was assigned to the FBI Headquarter' s Inspections Staff as an Inspector's Aide. In this assignment he traveled to FBI Field Offices, Resident Agencies, and FBI Legal Attache offices in United States Embassies abroad. 34. On July 1, 1991, HANSSEN returned to the Intelligence Division at FBI Headquarters, where he served for six months in the Soviet Operations Section as a program manager in the unit responsible for countering efforts by the Soviets (and particularly the KGB's Line X) to acquire United States scientific and technical intelligence. 35. From January 6, 1992, to April 11, 1994, HANSSEN served as Chief of the National Security Threat List (NSTL) Unit in the Intelligence Division (renamed the National Security Division, or NSD, in 1993) at FBI Headquarters. There he focused the Unit's efforts on economic espionage. 36. In April 1994, HANSSEN was temporarily assigned to the FBI's Washington Metropolitan Field Office (now called Washington Field Office). 37. In December 1994, HANSSEN was reassigned to FBI Headquarters, in the Office of the Assistant Director for NSD. 38. From February 12, 1995, to January 12, 2001, HANSSEN was detailed to serve as the FBI's senior representative to the Office of Foreign Missions of the United States Department of State (DOS/OFM). In that position he functioned as the head of an interagency counterintelligence group within DOS/OFM, and as FBI's liaison to the State Department's Bureau of Intelligence and Research (DOS/INR). His office was in an area designated Suites 106, 107 and 108 of Room 2510C of the State Department building at 2201 C Street, N.W., Washington, D.C. 39. Effective January 13, 2001, HANSSEN was assigned to a newly-created position in the Information Resources Division, at FBI Headquarters, in order that the FBI could more effectively monitor his daily activities without alerting him to the ongoing investigation of his activities. His current office is Room 9930 of FBI Headquarters, 935 Pennsylvania Avenue, N.W., Washington, D.C. 40. At no time during his employment with the FBI was HANSSEN ever authorized, directly or indirectly, to deliver, communicate, or transmit the classified information and documents described in this Affidavit to agents, officers, or employees of the KGB, SVR, or any other hostile foreign intelligence service. B. OATHS OF OFFICE 41. On January 12, 1976, upon entering service with the FBI, HANSSEN signed an Oath of Office in which he swore that: I will support and defend the Constitution of the United States against all enemies, foreign and domestic; that I will bear true faith and allegiance to the same; that I take this obligation freely, without any mental reservation or purpose of evasion; and that I will well and faithfully discharge the duties of the office on which I am about to enter. So help me God. 42. On January 12, 1976, HANSSEN also signed the FBI Pledge for Law Enforcement Officers, in which he pledged, in part, as follows: Humbly recognizing the responsibilities entrusted to me, . . . . I accept the obligation in connection with my assignments to . . . consider the information, coming into my knowledge by virtue of my position as a sacred trust, to be used solely for official purposes. . . . In the performance of my duties and assignments, I shall not engage in unlawful and unethical practices .. .. While occupying the status of a law enforcement officer or at any other time subsequent thereto, I shall not seek to benefit personally because of my knowledge of any confidential matter which has come to my attention. I am aware of the serious responsibilities of my office and in the performance of my duties . . . I shall wage vigorous warfare against the enemies of my country, of its laws, and of its principles; . . . I shall always be loyal to my duty, my organization, and my country. 43. On January 12, 1976, HANSSEN also signed an Employment Agreement in which he stated, in part: I hereby declare that I intend to be governed by and I will comply with the following provisions: (1) That I am hereby advised and I understand that Federal law such as Title 18, United States Code, Sections 793, 794, and 798; Order of the President of the United States (Executive Order 11652); and regulations issued by the Attorney General of the United States (28 Code of Federal Regulations, Sections 16.21 through 16.26) prohibit loss, misuse, or unauthorized disclosure or production of national security information, other classified information and other nonclassified information in the files of the FBI; (2) I understand that unauthorized disclosure of information in the files of the FBI or information I may acquire as an employee of the FBI could result in impairment of national security, place human life in jeopardy, or result in the denial of due process to a person or persons who are subjects of an FBI investigation, or prevent the FBI from effectively discharging its responsibilities. I understand the need for this secrecy agreement; therefore, as consideration for employment I agree that I will never divulge, publish, or reveal either by word or conduct, or by other means disclose to any unauthorized recipient without official written authorization by the Director of the FBI or his delegate, any information from the investigatory files of the FBI or any information relating to material contained in the files, or disclose any information or produce any material acquired as part of the performance of my official duties or because of my official status. . . . (4) That I understand unauthorized disclosure may be a violation of Federal law and prosecuted as a criminal offense and in addition to this agreement may be enforced by means of an injunction or other civil remedy. C. SECURITY CLEARANCES AND ACKNOWLEDGMENTS 44. HANSSEN received his initial TOP SECRET security clearance on January 12, 1976, and has held various SCI accesses since his initial SCI indoctrination on June 23, 1980. 45. On June 23, 1980, HANSSEN signed a Nondisclosure Agreement for Sensitive Compartmented Information, in which he acknowledged receiving a security indoctrination for a particular SCI program, and further acknowledged, among other things: 3. I have been advised that direct or indirect unauthorized disclosure, unauthorized retention, or negligent handling of the designated Sensitive Compartmented Information by me could cause irreparable injury to the United States, and be used to advantage by a foreign nation. . . . 4. In consideration of being granted access to the designated Sensitive Compartmented Information, I pledge that I will never divulge such information, in any form or any manner, to anyone who is not authorized to receive it, without prior written authorization from an appropriate official of the United States Government. 5. I have been advised that any unauthorized disclosure of the designated Sensitive Compartmented Information by me may be a substantial violation of this agreement, and may result in the termination of my employment. In addition, I have been advised that any such unauthorized disclosure by me may constitute violations of United States civil or criminal laws, including, as to the latter, the provisions of Sections 793, 794, and 798, Title 18, United States Code, and of Section 783, Title 50, United States Code. . . . I acknowledge that the briefing officer has made available Sections 793, 794, 798, and 1001 of Title 18, United States Code, Section 783 of Title 50, United States Code, Executive Order 12065, as amended and the Information Security Oversight Office Directive of 2 October 1978, as amended, which implements this Executive Order, so that I may read them at any time, if I so choose. . . . I make this agreement without any mental reservation or purpose of evasion. HANSSEN signed further iterations of this SCI Nondisclosure Agreement, in order to have access to additional SCI program information, on the following dates: October 1, 1981; March 1, 1982; September 9, 1983; April 10, 1985; and May 31, 1991. 46. On October 15, 1984, HANSSEN signed a Classified Information Nondisclosure Agreement in which he stated, in part: 1. Intending to be legally bound, I hereby accept the obligations contained in this Agreement in consideration of my being granted access to classified information. . . . 2. I hereby acknowledge that I have received a security indoctrination concerning the nature and protection of classified information . . . . 3. I have been advised and am aware that direct or indirect unauthorized disclosure, unauthorized retention, or negligent handling of classified information by me could cause irreparable injury to the United States or could be used to advantage by a foreign nation. I hereby agree that I will never divulge such information unless I have officially verified that the recipient has been properly authorized by the United States Government to receive it or I have been given prior written notice of authorization from the United States Government Department or Agency . . . last granting me a security clearance that such disclosure is permitted. I further understand that I am obligated to comply with laws and regulations that prohibit the unauthorized disclosure of classified information. 4. . . . I have been advised and am aware that any unauthorized disclosure of classified information by me may constitute a violation or violations of United States criminal laws, including the provisions of Sections 641, 793, 794, 798, and 952, Title 18, United States Code, the provisions of Section 783(b), Title 50, United States Code, and the provisions of the Intelligence Identities Protection Act of 1982. I recognize that nothing in this Agreement constitutes a waiver by the United States of the right to prosecute me for any statutory violation. . . . 10. I have read this Agreement carefully and my questions, if any, have been answered to my satisfaction. I acknowledge that the briefing officer has made available to me Sections 641, 793, 794, 798, and 952 of Title 18, United States Code, Section 783(b) of Title 50, United States Code, the Intelligence Identities Protection Act of 1982, and Executive Order 12356, so that I may read them at this time, if I so choose. D. RESIDENCES 47. From 1981 until 1985, HANSSEN owned a house and resided with his family on Whitecedar Court in Vienna, Virginia. 48. In approximately August 1987, after returning from his tour of duty in New York City, HANSSEN purchased a residence at 9414 Talisman Drive in Vienna, Virginia, where he and his family have lived continuously since. IV. BASIS FOR THE INFORMATION IN THIS AFFIDAVIT 49. This Affidavit is based on numerous different types and sources of information, including the following: A. Letters, and other forms of communications from "B" to the KGB/SVR, and from the KGB/SVR to "B"; B. A recording of a telephone conversation between "B" and a KGB/SVR officer; C. Computer media, including hard drives and storage devices; D. The actual plastic material that constituted the inner wrapping of a package that "B" passed to the KGB/SVR; E. Information provided by former KGB/SVR personnel; F. Records of the FBI, the CIA, and other agencies of the United States Intelligence Community; G. The contents of an actual package that the KGB/SVR passed to "B"; H. Forensic testing and examination; I. Interviews; J. Physical searches and electronic surveillance conducted by the FBI pursuant to FISC authority; K. Public records; L. Other law enforcement and intelligence techniques, sources and methods; and M. KGB/SVR operational and production files. V. THE KGB's "B" OPERATION 50. The sources of information described in the foregoing section have established the following regarding "B": 51. On or about October 4, 1985, a KGB Line PR officer in Washington, D.C., named Viktor M. Degtyar, received an envelope by mail, at his residence in Alexandria, Virginia, in the Eastern District of Virginia. The envelope was postmarked "Prince George's Co, MD" on October 1, 1985. Inside was an inner envelope, marked: "DO NOT OPEN. TAKE THIS ENVELOPE UNOPENED TO VICTOR I. CHERKASHIN." At that time, Viktor Ivanovich Cherkashin was the Line KR Chief at the Soviet Embassy in Washington, D.C. Inside the inner envelope was an unsigned typed letter from the person whom the KGB came to call "B." The letter read in part as follows: DEAR MR. CHERKASHIN: SOON, I WILL SEND A BOX OF DOCUMENTS TO MR. DEGTYAR. THEY ARE FROM CERTAIN OF THE MOST SENSITIVE AND HIGHLY COMPARTMENTED PROJECTS OF THE U.S. INTELLIGENCE COMMUNITY. ALL ARE ORIGINALS TO AID IN VERIFYING THEIR AUTHENTICITY. PLEASE RECOGNIZE FOR OUR LONG-TERM INTERESTS THAT THERE ARE A LIMITED NUMBER OF PERSONS WITH THIS ARRAY OF CLEARANCES. AS A COLLECTION THEY POINT TO ME. I TRUST THAT AN OFFICER OF YOUR EXPERIENCE WILL HANDLE THEM APPROPRIATELY. I BELIEVE THEY ARE SUFFICIENT TO JUSTIFY A $100,000 PAYMENT TO ME. I MUST WARN OF CERTAIN RISKS TO MY SECURITY OF WHICH YOU MAY NOT BE AWARE. YOUR SERVICE HAS RECENTLY SUFFERED SOME SETBACKS. I WARN THAT MR. BORIS YUZHIN (LINE PR, SF), MR. SERGEY MOTORIN, (LINE PR, WASH.) AND MR. VALERIY MARTYNOV (LINE X, WASH.) HAVE BEEN RECRUITED BY OUR "SPECIAL SERVICES." "B" proceeded to describe in detail a particular highly sensitive and classified information collection technique. In addition, "TO FURTHER SUPPORT MY BONA FIDES" he provided specific closely-held items of information regarding then-recent Soviet detectors. "B" added: DETAILS REGARDING PAYMENT AND FUTURE CONTACT WILL BE SENT TO YOU PERSONALLY. . . . MY IDENTITY AND ACTUAL POSITION IN THE COMMUNITY MUST BE LEFT UNSTATED TO ENSURE MY SECURITY. I AM OPEN TO COMMO SUGGESTIONS BUT WANT NO SPECIALIZED TRADECRAFT. I WILL ADD 6, (YOU SUBTRACT 6) FROM STATED MONTHS, DAYS AND TIMES IN BOTH DIRECTIONS OF OUR FUTURE COMMUNICATIONS. The information concerning the FBI's recruitment of Yuzhin, Motorin, and Martynov was classified at least at the SECRET level, as was the defector information. The sensitive information collection technique described above was classified at the TOP SECRET level. 52. Valeriy Fedorovich Martynov was a KGB Line X officer assigned to the Soviet Embassy in Washington, D.C., from October 1980 to November 1985. In April 1982, the FBI recruited Martynov to serve as an agent-in-place, and he was debriefed jointly by the FBI and the CIA. Martynov was compromised to the KGB by Ames in June 1985 and by "B" in October 1985, as described above. Based in part on the information provided by "B", the KGB directed Martynov to return to Moscow in November 1985, ostensibly to accompany KGB officer Vitaliy Yurchenko, who was returning to the Soviet Union after his August 1985 defection to the United States. Upon arriving in Moscow on or about November 7, 1985, Martynov was arrested, and he was subsequently tried on espionage charges. Martynov was convicted and executed. 53. Sergey Mikhailovich Motorin was a KGB Line PR officer assigned to the Soviet Embassy in Washington D.C., from June 1980 to January 1985. In January 1983, the FBI recruited Motorin to serve as an agent-in-place, and he was debriefed by the FBI. Motorin returned to Moscow at the end of his tour of duty in January 1985. Motorin, like Martynov, was compromised to the KGB by Ames in June 1985 and by "B" in October 1985, as described above. Based in part on the information "B" gave the KGB, Motorin was arrested in November or December 1985, tried and convicted on espionage charges during the period of October-November 1986, and executed in February 1987. 54. Boris Nikolayevich Yuzhin was a KGB Line PR officer assigned to San Francisco under cover as a student from 1975 to 1976, and then as a TASS correspondent from 1978 to 1982. The FBI recruited him to serve as an agent-in-place, and debriefed him. After returning to the Soviet Union, Yuzhin became the subject of an internal KGB investigation. Yuzhin was compromised to the KGB by Ames in June 1985 and by "B" in October 1985. Based in part on the information "B" gave the KGB, Yuzhin was arrested in December 1986, convicted of espionage, and sentenced to serve 15 years in prison. In 1992, he was released under a general grant of amnesty to political prisoners, and subsequently emigrated to the United States. 55. On or about October 15, 1985, Degtyar received by mail, at his residence in Alexandria, Virginia, in the Eastern District of Virginia, a package from "B" containing a large number of classified documents, including some original documents, of the United States Intelligence Community. 56. At 8:35 am on October 16, 1985, FBI surveillance personnel observed Degtyar arriving at the Soviet Embassy carrying a large black canvas bag which he did not typically carry. 57. Thereafter, Degtyar received by mail, at his residence in Alexandria, Virginia, in the Eastern District of Virginia, a typed message from "B," in an envelope bearing a handwritten address and postmarked "New York, NY" on October 24, 1985. The message included the following text: DROP LOCATION Please leave your package for me under the corner (nearest the street) of the wooden foot bridge located just west of the entrance to Nottoway Park. (ADC Northern Virginia Street Map, #14, D3) PACKAGE PREPARATION Use a green or brown plastic trash bag and trash to cover a waterproofed package. SIGNAL LOCATION Signal site will be the pictorial "pedestrian-crossing" signpost just west of the main Nottoway Park entrance on Old Courthouse Road. (The sign is the one nearest the bridge just mentioned.) SIGNALS My signal to you: One vertical mark of white adhesive tape meaning I am ready to receive your package. Your signal to me: One horizontal mark of white adhesive tape meaning drop filled. My signal to you: One vertical mark of white adhesive tape meaning I have received your package. (Remove old tape before leaving signal.) The message established a date and times for the signals and drops, and concluded: "I will acknowledge amount with my next package." The KGB designated this dead drop site by the codename "PARK". It is located in Fairfax County, Virginia, in the Eastern District of Virginia. 58. On Saturday, November 2, 1985, the KGB loaded the "PARK" dead drop site with $50,000 in cash and a message proposing procedures for future contacts with "B". 59. On or about November 8, 1985, Deglyar and Cherkashin received a typed letter from "B", which read in part as follows: Thank you for the 50,000. I also appreciate your courage and perseverance in the face of generically reported bureaucratic obstacles. I would not have contacted you if it were not reported that you were held in esteem within your organization, an organization I have studied for years. I did expect some communication plan in your response. I viewed the postal delivery as a necessary risk and do not wish to trust again that channel with valuable material. I did this only because I had to so you would take my offer seriously, that there be no misunderstanding as to my long-term value, and to obtain appropriate security for our relationship from the start. "B" then rejected the contact plans proposed by the KGB, and suggested a particular communications scheme based on "a microcomputer 'bulletin board'" at a designated location, with "appropriate encryption." Meanwhile, he wrote: "Let us use the same site again. Same timing. Same signals." "B" proposed that the next dead drop occur on "September 9" which, according to the "6" coefficient that he established with the KGB in his first letter, actually meant that the dead drop operation would take place on March 3, 1986. "B" also wrote: As far as the funds are concerned, I have little need or utility for more than the 100,000. It merely provides a difficulty since I can not spend it, store it or invest it easily without triping [sic] "drug money" warning bells. Perhaps some diamonds as security to my children and some good will so that when the time comes, you will accept by [sic] senior services as a guest lecturer. Eventually, I would appreciate an escape plan. (Nothing lasts forever.) Referring to Yuzhin, Motorin, and Martynov, whom he had identified in his first letter as United States intelligence recruitments, "B" wrote: I can not provide documentary substantiating evidence without arousing suspicion at this time. Never-the-less, it is from my own knowledge as a member of the community effort to capitalize on the information from which I speak. I have seen video tapes of debriefings and physically saw the last, though we were not introduced. The names were provided to me as part of my duties as one of the few who needed to know. You have some avenues of inquiry. Substantial funds were provided in excess of what could have been skimmed from their agents. The active one has always (in the past) used a concealment device -- a bag with bank notes sewn in the base during home leaves. In conclusion, "B" warned of a "new technique" used by NSA, which he described. 60. On March 3, 1986, the KGB loaded dead drop site "PARK", but "B" did not appear and the KGB removed its package from the dead drop site the same day. 61. On or about June 30, 1986, Deglyar received a typed letter from "B" at his residence in Alexandria, Virginia, in the Eastern District of Virginia. The letter read in part as follows: I apologize for the delay since our break in communications. I wanted to determine if there was any cause for concern over security. I have only seen one item which has given me pause. When the FBI was first given access to Victor Petrovich Gandarev, they asked . . . if Gundarev knew Viktor Cherkashin. I thought this unusual. I had seen no report indicating that Viktor Cherkashin was handling an important agent, and here-to-fore he was looked at with the usual lethargy awarded Line Chiefs. The question came to mind, are they somehow able to monitor funds, ie., to know that Viktor Cherkashin received a large amount of money for an agent? I am unaware of any such ability, but I might not know that type of source reporting. "B" then described a United States Intelligence Community technical surveillance technique. He concluded: If you wish to continue our discussions, please have someone run an advertisement in the Washington Times during the week of 1/12/87 or 1/19/87, for sale, "Dodge Diplomat, 1971, needs engine work, $1000." Give a phone number and time-of-day in the advertisement where I can call. I will call and leave a phone number where a recorded message can be left for me in one hour. I will say, "Hello, my name is Ramon. I am calling about the car you offered for sale in the Times." You will respond, "I'm sorry, but the man with the car is not here, can I get your number." The number will be in Area Code 212. I will not specify that Area Code on the line. "B" signed the letter: "Ramon". According to the established "6" coefficient, the weeks the advertisement was actually to run were July 6, 1986, or July 13, 1986. 62. Viktor Gundarev was a KGB Line KR officer who defected to the United States on February 14, 1986. A classified FBI debriefing report, dated March 4, 1986, reports that FBI debrief ers showed Gundarev a photo of Cherkashin and asked if he knew Cherkashin. 63. The following advertisement appeared in the Washington Times from July 14, 1986, to July 18, 1986: DODGE - '71, DIPLOMAT, NEEDS ENGINE WORK, $1000. Phone (703) 451-9780 (CALL NEXT Mon., Wed., Fri. 1 p.m.) 64. The number 703/451-9780 at that time belonged to a public telephone located in the vicinity of the Old Keene Mill Shopping Center, in Fairfax County, Virginia, in the Eastern District of Virginia. On Monday, July 21, 1986, "B" called that number and gave the number 628-8047. The call was taken by Aleksandr Kirillovich Fefelov, a KGB officer assigned to the Soviet Embassy in Washington, D.C. 65. One hour later, Fefelov telephoned 212/628-8047 and told "B" that the KGB had loaded the "PARK" dead drop site. The KGB mistakenly placed the package under the wrong corner of the wooden footbridge at the "PARK" site. 66. On or about August 7, 1986, Degtyar received a letter from "B" slating that he had not found the package at the dead drop site, and indicating that he would phone 703/451-9780 on August 18, 20, or 22. The KGB then retrieved its package from the "PARK" dead drop site. 67. On Monday, August 18, 1986, "B" telephoned 703/451-9780, and spoke with Fefelov. The latter portion of the conversation was recorded as follows: ([UI] = unintelligible) "B": Tomorrow morning? FEFELOV: Uh, yeah, and the car is still available for you and as we have agreed last time, I prepared all the papers and I left them on the same table. You didn't find them because I put them in another corner of the table. "B": I see. FEFELOV: You shouldn't worry, everything is okay. The papers are with me now. "B": Good. FEFELOV: I believe under these circumstances, mmmm, it's not necessary to make any changes concerning the place and the time. Our company is reliable, and we are ready to give you a substantial discount which will be enclosed in the papers. Now, about the date of our meeting. I suggest that our meeting will be, will take place without delay on February thirteenth, one three, one p.m. Okay? February thirteenth. "B": [UI] February second? FEFELOV: Thirteenth. One three. "B": One three. FEFELOV: Yes. Thirteenth. One p.m. "B": Let me see if I can do that. Hold on. FEFELOV: Okay. Yeah. [pause] "B": [whispering] [UI] FEFELOV: Hello? Okay. [pause] "B": [whispering] Six .... Six .... [pause] "B": That should be fine. FEFELOV: Okay. We will confirm you, that the papers are waiting for you with the same horizontal tape in the same place as we did it at the first time. "B": Very good. FEFELOV: You see. After you receive the papers, you will send the letter confirming it and signing it, as usual. Okay? "B": Excellent. FEFELOV: I hope you remember the address. Is . . . if everything is okay? "B": I believe it should be fine and thank you very much. FEFELOV: Heh-heh. Not at all. Not at all. Nice job. For both of us. Uh, have a nice evening, sir. "B": Do svidaniya. FEFELOV: Bye-bye. According to the established "6" coefficient, the operation discussed in this conversation was actually scheduled to occur on August 19, 1986, at 7:00 am. The KGB then loaded the "PARK" dead drop site with $10,000 in cash, as well as: proposals for two additional dead drop sites to be used by "B" and the KGB; a new accommodation address codenamed "NANCY"; and emergency communications plans for "B" to personally contact KGB personnel in Vienna, Austria. The "NANCY" address was the residence of KGB Line PR officer Boris M. Malakhov in Alexandria, Virginia, in the Eastern District of Virginia, who was to become Degtyar's replacement as the Soviet Embassy press secretary. "B" was instructed to mis-spell Malakhov's name as "Malkow." "B" subsequently cleared the dead drop. 68. Thereafter, Degtyar received an envelope at his residence in Alexandria, Virginia, in the Eastern District of Virginia. The envelope bore a handwritten address and return address: "Ramon Garcia, 125 Main St, Falls Church VA." It was postmarked from "NO VA MSC 22081" on August 19, 1986. MSC designates the Merrifield Service Center, located in the Eastern District of Virginia. Inside the envelope was a handwritten note: "RECEIVED $10,000. RAMON." 69. On or about September II, 1987, Malakhov received an envelope at his residence in the Eastern District of Virginia. The envelope bore a handwritten address to "B.N. MALKOW" at the "NANCY" address, and a handwritten return address of "R. GARCIA, 125 MAIN ST, ALEXANDRIA, VA", and was postmarked September 8, 1987. Inside was the following typed letter: Dear Friends: No, I have decided. It must be on my original terms or not at all. I will not meet abroad or here. I will not maintain lists of sites or modified equipment. I will help you when I can, and in time we will develop methods of efficient communication. Unless a [sic] see an abort signal on our post from you by 3/16, I will mail my contact a valuable package timed to arrive on 3/18. I will await your signal and package to be in place before 1:00 pm on 3/22 or alternately the following three weeks, same day and time. If my terms are unacceptable then place no signals and withdraw my contact. Excellent work by him has ensured this channel is secure for now. My regards to him and to the professional way you have handled this matter. sincerely, Ramon According to the established "6" coefficient, the dates referred to in this letter were actually September 10, 12, and 16. 70. On Monday, September 14, 1987, the KGB received in the mail a package of documents including TOP SECRET National Security Council documents. 71. On Tuesday, September 15, 1987, the KGB loaded the "PARK" dead drop site with $10,000 cash. The KGB also proposed two additional dead drop sites, one codenamed "AN" located in Ellanor C. Lawrence Park in Western Fairfax County, in the Eastern District of Virginia, and another codenamed "DEN" at a different location farther away. The KGB proposed that "B" load the dead drop at "PARK" or "AN" on September 26, 1987, and that the KGB respond by loading "DEN". 72. On Wednesday, September 16, 1987, the KGB determined that "B" had cleared the "PARK" dead drop and removed the signal 73. On September 26, 1987, the KGB recovered from the "PARK" dead drop site a package from "B". The package contained a handwritten letter reading as follows: My Friends: Thank you for the $10,000. I am not a young man, and the commitments on my time prevent using distant drops such as you suggest. I know in this I am moving you out of your set modes of doing business, but my experience tells me the [sic] we can be actually more secure in easier modes. "B" then suggested an exchange procedure involving a parked car instead of a dead drop site, and a related communications procedure, but stated: "If you cannot do this I will clear this once ëAN' on your scheduled date (rather than the other)." He then asked the KGB to "Find a comfortable Vienna VA signal site to call me to an exchange any following Monday." He closed the letter, "Good luck with your work", and signed it "Ramon." The package also contained a document which the KGB described as having the title which roughly translates into English as: "National Intelligence Program for 87". 74. Thereafter, the KGB proposed to "B" a signal site in Vienna, Virginia, in the Eastern District of Virginia, on the post of a stop sign on the shoulder of Courthouse Road near its junction with Locust Street. This signal site was referred to as "V". 75. On September 29, 1987, the KGB deposited $100,000 into an escrow account established for "B" in a Soviet bank in Moscow. 76. On November 10, 1987, Malakhov received a letter from "B" at his residence in the Eastern District of Virginia. The envelope bore a return address of "J. Baker" in "Chicago" and was postmarked on November 7, 1987. In the letter, "B" advised that Saturday for "AN" was not suitable, and he postponed the operation for two days, until Monday, November 16. He advised that he had an urgent package for the KGB, and asked the KGB to place a signal confirming receipt of the letter. That same day, the KGB placed a signal at the "PARK" signal site. Thereafter, whenever "B" used the word "Chicago" in a return address, it was to signal that he intended for a dead drop exchange to occur the following Monday. 77. On Sunday, November 15, 1987, the KGB loaded the "AN" dead drop site with a package. It was not cleared by "B" and, on November 17, the KGB removed the package. 78. On Thursday, November 19, 1987, the KGB received a handwritten letter from "B". The envelope bore a return address of "G. Robertson" in "Houston" and was postmarked on November 17, 1987. The letter read as follows: Unable to locate AN based on your description at night. Recognize that I am dressed in business suit and can not slog around in inch deep mud. I suggest we use once again original site. I will place my urgent material there at next AN times. Replace it with your package. I will select some few sites good for me and pass them to you. Please give new constant conditions of recontact as address to write. Will not put substantive material through it. Only instructions as usual format. Ramon 79. On Monday, November 23, 1987, "B" and the KGB carried out an exchange operation at the "PARK" dead drop site. The package from "B" to the KGB contained: a cable-type report about a meeting in October 1987 with a valuable source, whom the KGB referred to as "M"; a survey of information provided by Vitaliy Yurchenko; and an official technical document describing COINS-II. In 1987, COINS-II was the then-current version of the United States Intelligence Community's "Community On-Line Intelligence System," which constituted a classified Community-wide intranet. The package from the KGB to "B" contained $20,000 cash and a letter conveying "regards" from the KGB Director and advising that $100,000 had been deposited in a bank at 6-7% interest. The letter also asked "B" for a variety of specific classified information. The KGB gave "B" two new accommodation addresses and asked "B" to propose new dead drop sites. 80. On February 4, 1988, the KGB received a note from "B" at one of the new accommodation addresses it had given to "B" in the November 23, 1987, dead drop. The address was the residence of a Soviet diplomatic official known to the FBI as a KGB co-optee, located in the Eastern of Virginia. The note read simply: "OK". It was in an envelope bearing a return address of "Jim Baker" in "Langley" and postmarked in Washington, D.C., on February 3, 1988. 81. On Monday, February 8, 1988, "B" and the KGB carried out an exchange operation at the "PARK" dead drop site in Nottoway Park, which the KGB had now renamed "PRIME". The package from "B" to the KGB contained a typed, unsigned letter. In the letter, "B" acknowledged receipt of $20,000 and identified two additional drop sites. He then went on to provide detailed information concerning a Soviet detector, and advised the KGB that he had arranged time to review the detector's file. "A full report will follow as soon as possible." He then disclosed to the KGB certain specific information concerning the United States Intelligence Community's communication intelligence capabilities. Enclosed with the letter was the first computer diskette "B" passed to the KGB. Also in the package from "B" were classified documents. The package from the KGB to "B" contained $25,000 cash, and a letter conveying thanks of the KGB Chairman, Vladimir Kryuchkov, for the information about the valuable source "M". The KGB also asked "B" for more information about "M" and the "agent network" in New York City, and about a particular KGB officer. On the next day, February 9, 1988, the KGB observed that the signal at "PARK/PRIME" had been removed, indicating that "B" had cleared the dead drop. 82. On March 16, 1988, the KGB received a second computer diskette from "B" at an accommodation address in the Eastern District of Virginia. The envelope bore a return address of "Jim Baker" in "Chicago" and was postmarked in Washington, D.C., on March 15, 1988. 83. On March 17, 1988, the KGB received a letter from "B" at an accommodation address in the Eastern District of Virginia. The envelope bore a return address of "Jim Baker" in "Chicago" and was postmarked in Northern Virginia on March 16, 1988. In the letter, "B" instructed the KGB to use the "PARK/PRIME" dead drop site until the KGB approved the other sites. 84. On Monday, March 21, 1988, the KGB observed a signal from "B" at the "PARK/PRIME" site, but was unable to check the dead drop site because strangers were present in the park. 85. On March 26, 1988, the KGB received a third computer diskette from "B" at an accommodation address in the Eastern District of Virginia. The envelope bore a return address of "Jim Baker" in "Chicago" and was postmarked in Washington, D.C., on March 24, 1988. The KGB found no text on the diskette, which it referred to as "D-3". 86. On Monday, March 28, 1988, "B" and the KGB carried out an exchange operation at the "PARK/PRIME" dead drop site. The package from "B" to the KGB included his fourth computer diskette ("D-4"), a TOP SECRET document entitled "The FBI's Double Agent Program" and a document that the KGB described as a Director of Central Intelligence (DCI) document entitled "Stealth Orientation." The package from the KGB to "B" included $25,000 cash and a letter explaining why the KGB had not been able to check the "PARK/PRIME" dead drop site on March 21. In the letter, the KGB also advised it had been unable to read the diskettes "B" had passed to the KGB. The KGB asked "B" for information about codes and cryptograms, intelligence support for the Strategic Defense Initiative, submarines, and other classified material. The next day, the KGB observed that "B" had removed the signal from the "PARK/PRIME" site, indicating he had removed the package. 87. On April 4, 1988, the KGB received an envelope from "B" at an accommodation address in the Eastern District of Virginia. The envelope bore a return address of "Jim Baker" in "Alexandria" and was postmarked in Northern Virginia, on March 31, 1988. The envelope contained a note from "B" reading: "use 40 TRACK MODE. this letter is not a signal." The term "use 40-track mode" refers to a technical process for re-formatting a computer diskette in order to conceal data by putting the data onto specific tracks on the diskette. Unless a person uses the correct codes to decrypt such a diskette, the diskette would appear to be blank. 88. On April 6, 1988, the KGB received a package from "B" at an accommodation address in the Eastern District of Virginia. The envelope bore a return address of "Jim Baker" in "Fairfax" and a postmark of "MSC NO VA" (Merrifield Service Center, Northern Virginia, in the Eastern District of Virginia) on April 5. The package contained a fifth diskette ("D-5"). On the diskette, "B" provided what the KGB characterized as "everything" about a particular KGB officer, additional information about a KGB defector named Victor Sheymov, and information about two specific Soviet FBI recruitments. "B" also explained why the KGB had been unable to read his diskettes. "B" also asked the KGB for diamonds. The KGB subsequently purchased several diamonds for use in the "B" operation. 89. On May 24, 1988, the KGB received a letter from "B" at an accommodation address in the District of Columbia. The envelope bore a return address of "Jim Baker" in "Chicago" and was postmarked in "MSC NO VA" on May 17, 1988. With the letter was "B"'s sixth diskette ("D-6"), which contained information about a number of matters. The diskette also contained information about a specific recent FBI Soviet recruitment operation. 90. On Monday, May 30, 1988, a KGB officer arrived at the "PARK/PRIME" dead drop site at 9:03 pm, three minutes after the end of the prearranged dead drop exchange period. The KGB officer saw a man who apparently removed the signal, got into hi; car, and drove away. 91. On July 15, 1988, the KGB received a letter from "B" a an accommodation address in the Eastern District of Virginia. The envelope bore a return address "Chicago" and was postmarked "WDC 200" on July 13, 1988. The zip codes for Washington, D.C., begin "200". The typed letter read as follows: I found the site empty. Possibly I had the time wrong. I work from memory. My recollection was for you to fill before 1:00 a.m. I believe Viktor Degtyar was in the church driveway off Rt. 123, but I did not know how he would react to an approach. My schedule was tight to make this at all. Because of my work, I had to synchronize explanations and flights while not leaving a pattern of absence or travel that could later be correlated with communication times. This is difficult and expensive. I will call the number you gave me on 2/24, 2/26 or 2/28 at 1:00 a.m., EDST. Please plan filled signals. Empty sites bother me. I like to know before I commit myself as I'm sure you do also. Let's not use the original site so early at least until the seasons change. Some type of call-out signal to you when .1 have a package or when I can receive one would be useful. Also, please be specific about dates, e.g., 2/24. Scheduling is not simple for me because of frequent travel and wife. Any ambiguity multiplies the problems. My security concerns may seem excessive. I believe experience has shown them to be necessary. I am much safer if you know little about me. Neither of us are children about these things. Over time, I can cut your losses rather than become one. Ramon P.S. Your "thank you" was deeply appreciated. 92. On Monday, July 18, 1988, "B" and the KGB carried out an exchange operation at the "PARK/PRIME" dead drop site. The package from "B" contained over 530 pages of material, including: (A) A CIA document concerning certain nuclear programs, dated approximately November 1987 classified TOP SECRET and with the caveats NOFORN NOCONTRACT ORCON. (B) A DCI document entitled "Compendium of Future Intelligence Requirements: Volume II", dated September 1987, prepared by the Staff of the Intelligence Producers Council and classified TOP SECRET/SCI with the caveat NOFORN. (C) A CIA Counterintelligence Staff Study entitled "The Soviet Counterintelligence Offensive: KGB Recruitment Operations Against CIA," dated March 1988 and classified SECRET with the caveats NOFORN NOCONTRACT ORCON. This document contains the following preface: Warning NoticeIntelligence Sources or Methods Involved (WNINTEL) National SecurityUnauthorized Disclosure InformationSubject to Criminal Sanctions and also specifically defining "NOFORN" as "Not Releasable to Foreign Nationals." (D) A TOP SECRET comprehensive historical FBI review of allegations from recruitments and detectors over a period of years that the Soviet intelligence services had penetrated the United States Intelligence Community. It identified Soviet recruitments and detectors with specificity, and describes particular information they provided. It contained the following warning: IN VIEW OF THE EXTREME SENSITIVITY OF THIS DOCUMENT. THE UTMOST CAUTION MUST BE EXERCISED IN ITS HANDLING. THE CONTENTS INCLUDE A COMPREHENSIVE REVIEW OF SENSITIVE SOURCE ALLEGATIONS AND INVESTIGATIONS OF PENETRATION OF THE FBI BY THE SOVIET INTELLIGENCE SERVICES. THE DISCLOSURE OF WHICH WOULD COMPROMISE HIGHLY SENSITIVE COUNTERINTELLIGENCE OPERATIONS AND METHODS. ACCESS SHOULD BE LIMITED TO A STRICT NEED-TO-KNOW BASIS. The package from the KGB to "B" contained $25,000 cash and a letter asking for information about surveillance systems, the agent network in New York City, illegal intelligence, and several specific FBI recruitment operations. The KGB proposed two new dead drop and related signal sites. One, named "BOB", was under a footbridge in Idylwood Park, between Vienna and Falls Church, in the Eastern District of Virginia. The other, named "CHARLIE", was under a footbridge in Eakin Community Park, south of Vienna, in the Eastern District of Virginia. For these dead drop sites, the KGB instructed "B" to load the dead drops by 9:00 pm on the designated day; the KGB would clear it by 10:00 pm and load it with a package which "B" was to clear after 10:00 pm. 93. On July 31, 1988, the KGB received an envelope from "B" at an accommodation address in the Eastern District of Virginia. The envelope bore a return address of Alexandria and contained a letter dated July 29 and "B"'s seventh diskette ("D-7"), which contained information on technical surveillance systems, a new recruitment in New York City, illegal intelligence, and several other specific Soviet recruitment targets. 94. On August 22, 1988, the KGB deposited $50,000 in an escrow account for "B" at a Moscow bank. 95. On September 21, 1988, the KGB received an envelope from "B" at an accommodation address in the Eastern District of Virginia. The envelope bore a return address of "Chicago" and was postmarked "WDC" on September 20. The envelope contained "B"'s eighth diskette ("D-8") and a note that read: "At BOB". The diskette contained information about particular Soviet recruitment targets of the FBI. 96. On Monday, September 26, 1988, "B" and the KGB carried out an exchange operation at the "BOB" dead drop site. The package from "B" contained approximately 300 pages of material, including an FBI memo about a particular individual believed at the time to be a KGB Line KR officer in New York City, information on technical means of Soviet intelligence, a transcript of a Counterintelligence Group meeting, and information on several other matters. The package from the KGB contained a diamond valued at $24,720, and a letter advising "B" that $50,000 had been deposited in his account. The letter also expressed gratitude to "B" from the KGB Chairman (Vladimir A. Kryuchov). The letter also discussed communications procedures, security measures, a personal meeting, and passports. It also asked "B" to provide information about classified technical operations in the Soviet Union, agent network details, allies' sources, FBI programs, past cases, and a certain missile technology. 97. On December 1, 1988, the KGB received a package from "B" at an accommodation address in the Eastern District of Virginia. It bore a return address of "G. Robertson, Baker's Photo" and was postmarked "WDC" on November 30, 1988. The package contained a letter and his ninth diskette ("D-9"), which contained information about a number of classified matters. 98. On Monday, December 26, 1988, "B" and the KGB carried out an exchange operation at the "CHARLIE" dead drop site in the Eastern District of Virginia. The package from "B" contained his tenth diskette ("D-IO") and approximately 356 pages of material. On the diskette, "B" provided additional classified information. He also provided six recent National HUMINT Collection Plan (NHCP) documents, and a document whose title the KGB noted as "Soviet Armed Forces and Capabilities for Conducting Strategic Nuclear War Until the End of the 1990s." The package from the KGB to "B" contained $10,000 cash, a second diamond, valued at $17,748, and a message in which the KGB asked "B" for additional specific information about a wide variety of classified technical and recruitment matters. The next day, the KGB observed that the signal at the "CHARLIE" site had been removed, indicating "B" had removed the KGB's package. 99. On Tuesday, January 31, 1989, the KGB observed an emergency call-out signal at a signal site that it had issued to "B", located at the intersection of Q Street and Connecticut Avenue, N.W., Washington, D.C. By prearrangement, the KGB immediately unloaded a package from "B" at the "BOB" dead drop site. The package contained a cable, with a note reading: "Send to the Center right away. This might be useful." Also in the package was "B"'s eleventh diskette ("D-ll"), which contained comments on the cable, as well as information on several specific individuals about whom the KGB had asked for information. 100. On Thursday, March 16, 1989, "B" marked a call-out signal site that the KGB has issued to him, located at the Taft Bridge in Northwest Washington, D.C. 101. On Monday, March 20, 1989, "B" and the KGB carried out an exchange operation at the "CHARLIE" dead drop site in the Eastern District of Virginia. "B" passed two packages to the KGB. One contained a TOP SECRET SCI document entitled "DCI Guidance for the National MASINT Intelligence Program (FY 1991-FY 2000)," prepared by the Measurement and Signature Intelligence (MASINT) Committee and dated November 1988. The document bears the caveats NOFORN and NOCONTRACT, and contains the following preface: Warning Notice Intelligence Sources or Methods Involved (WNINTEL) NATIONAL SECURITY INFORMATION Unauthorized Disclosure Subject to Criminal Sanctions According to its Introduction, this document contains the MASINT Committee's recommendations to the DCI for the collection, processing, and reporting of MASINT, and represents the Intelligence Community's consensus on specific MASINT objectives and studies leading to needed capabilities. Its contents are highly specific and technical. In passing this document to the KGB, "B" requested that it be returned. The second package from "B" to the KGB contained his twelfth computer diskette ("D-12") and approximately 539 pages of materials including classified information on a variety of matters. The KGB package to "B" contained $18,000 cash and a third diamond, valued at $11,700. It also-contained a letter that confirmed the KGB had received "B"'s packages on December 26 and January 31, discussed a personal meeting, requested new dead drop sites, and asked how to increase operational security. The KGB also asked "B" about his security precautions for the diamonds. ("B" told the KGB that he would say the diamonds came from his grandmother.) The KGB also asked for information about a wide variety of technical and operational subjects. The KGB thanked "B" for the information he provided on January 31, and asked him "for everything else that's possible." On Tuesday, March 21, 1989, the KGB observed that the signal at "CHARLIE" had been removed, indicating that "B" had removed the KGB's package. 102. On March 24, 1989, the KGB marked the "V" signal site on Courthouse Road in Vienna, in the Eastern District of Virginia, indicating that "B" should pick up a package at the "PARK/PRIME" dead drop site the following Monday. On Monday, March 27, 1989, the KGB loaded the dead drop with the MASINT document, for return to "B", but "B" did not clear the drop. 103. In April 1989, the KGB presented several awards to KGB officers involved in the "B" operation, including the highly- coveted Order of the Red Banner, the Order of the Red Star, and the Medal for Excellent Service. 104. On Monday, May 22, 1989, after a call-out signal from "B", he and the KGB carried out an exchange operation at the "BOB" dead drop site, in the Eastern District of Virginia. The package "B" passed to the KGB contained the first and third diamonds the KGB had given to him and which "B" returned for cash, and his thirteenth diskette ("D-13") in which he suggested an account in Switzerland and bonds to be transferred to it. The package also contained approximately 80 pages of material, including a document whose title the KGB noted as "National Intelligence Program 90-91." The diskette contained classified information about a variety of technical and operational matters. "B" also provided information about United States Foreign Officer Felix Bloch and an illegal in Vienna, Austria. This disclosure compromised the FBI's then-ongoing espionage investigation of Bloch, as described below. The package that the KGB passed to "B" on May 22, 1989, did not contain a payment, but in a letter the KGB promised to do so the next time. The KGB also returned the MASINT Committee document, and described its two prior failed efforts to return it. The next day, the KGB observed that the signal associated with the "BOB" dead drop site had been removed, indicating that "B" had retrieved the KGB's package. 105. Felix Bloch had been identified as an associate of Austria-based known Soviet illegal Reino Gikman on the basis of a telephone call between them on April 27, 1989. One day later, the FBI opened a classified investigation of Bloch, who at the time was assigned to the State Department in Washington, D.C. Meetings between Bloch and Gikman were observed in Paris on May 14, 1989, and Brussels on May 28, 1989. In early June 1989, after "B" had compromised the Bloch investigation, Gikman suddenly left for Moscow. Early on the morning of June 22, 1989, Bloch received a telephone call at his home in Washington, D.C., from a man identifying himself as "Ferdinand Paul". According to a recording of that call, "Ferdinand Paul" told Bloch that he was calling "in behalf of Pierre" who "cannot see you in the near future" because "he is sick", and that "a contagious disease is suspected." (Bloch knew Gikman as "Pierre".) "Paul" then told Bloch: "I am worried about you. You have to take care of yourself." Having concluded that this call alerted Bloch that his association with Gikman had been compromised, the FBI interviewed Bloch on June 22 and 23, 1989. Bloch denied he had engaged in espionage and ultimately declined to answer any further questions. The FBI was unable further to develop its investigation of Bloch. 106. On Monday, August 7, 1989, after two call-out signals from "B", he and the KGB carried out an exchange operation at the "CHARLIE" dead drop site in the Eastern District of Virginia. In the package from "B" were five rolls of film containing a highly-restricted TOP SECRET/SCI analysis of the foreign threat to a specific and named highly-compartmented United States Government program, dated May 1987. Also in the package from "B" was his fourteenth diskette ("D-14"), which contained information from the Bloch-Gikman file, and several FBI recruitment attempts. "B" approved a new dead drop site the KGB had proposed, codenamed "DORIS", located under a footbridge in Canterbury Park in Springfield, Virginia, in the Eastern District of Virginia. The KGB's package to "B" contained $30,000 cash and a letter promising to compensate him for the returned diamonds. The KGB rejected his suggestions for an account in Switzerland. The KGB discussed communications plans, and proposed a new dead drop site, codenamed "ELLIS", under a footbridge over Wolftrap Creek near Creek Crossing Road at Foxstone Park, near Vienna, Virginia, in the Eastern District of Virginia, with a signal site on the "Foxstone Park" sign. The next day, the KGB observed that the signal associated with the "CHARLIE" dead drop site had been removed, indicating that "B" had retrieved the KGB's package. 107. On August 17, 1989, the KGB deposited $50,000 into an escrow account established for "B" in a Soviet bank in Moscow. 108. On Monday, September 25, 1989, "B" and the KGB carried out an exchange operation at the "DORIS" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained approximately 80 pages of material including part of a document concerning a highly-sensitive United States technical operation classified at the TOP SECRET/SCI level. In passing this document, "B" compromised a program of enormous value, expense, and importance to the United States. Also in the package was his fifteenth diskette ("D-15"), containing additional classified information. The package from the KGB to "B" contained $30,000 cash, a letter, and, for the first time from the KGB, a computer diskette. The next day, the KGB observed that the signal associated with the "CHARLIE" dead drop site had been removed, indicating that "B" had retrieved the KGB's package. 109. On October 2, 1989, the KGB received a letter from "B" at an accommodation address in the Eastern District of Virginia. It bore a return address of "G. Robertson, 1408 Ingeborg Ct., McLean VA" and was postmarked "NO VA" on October 28, 1989. The letter reported that: "The disk is clean. I tried all methods -- completely demagnetized." 110. On October 17, 1989, the KGB received an envelope from "B" at an accommodation address, in the Eastern District of Virginia. It bore a return address of "G. Robertson, 1101 Kingston Ct., Houston, TX" and was postmarked "NO VA MSC 220" on October 16, 1989. The envelope contained "B"'s sixteenth diskette ("D-16"). 111. On Monday, October 23, 1989, "B" and the KGB carried out an exchange operation at the "ELLIS" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained an exact duplicate of the sixteenth diskette ("D-16"), which "B" had sent by mail the week before. The diskette contained additional classified information about technical and recruitment matters. "B" requested the KGB to load the "ELLIS" dead drop site at any time, and advised that he would check the signal site periodically about the loading. The package from the KGB t.o "B" contained $55,000 cash and a letter advising "B" that $50,000 had been deposited into his escrow account in Moscow. "B" never signaled that he had cleared this dead drop, and on October 26 the KGB retrieved its package. 112. On Tuesday, October 31, 1989, the KGB loaded the "ELLIS" dead drop site with a package containing the $55,000 cash and a second KGB diskette. The diskette provided a new accommodation address, and instructions to "B" on how to inform the KGB which materials should be opened by the KGB in Washington, D.C., and which should go to the Center. It conveyed regards from the KGB Chairman and made extensive requests for additional information concerning particular United States intelligence activities targeting the Soviet Union. On November 11, 1989, the KGB observed that the "ELLIS" signal site was removed, indicating that "B" had removed the KGB's package. 113. On Monday, December 25, 1989, after a call-out signal from "B", he and the KGB carried out an exchange operation at the "BOB" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained his seventeenth diskette ("D-17") and several documents including a DCI National Intelligence Estimate entitled "The Soviet System in Crisis: Prospects for the Next Two Years" and dated November 1989. This document was classified SECRET, bore the caveats NOFORN NOCONTRACT WNINTEL, and contained the notice: "Unauthorized Disclosure Subject to Criminal Sanctions." He also provided additional documents on the highly sensitive technical operation referred to above. The diskette contained a message in which "B" complimented the KGB's efficient actions, and provided current information about: several ongoing FBI recruitment operations against Soviet intelligence officers; three new tightly-protected FBI sources within the KGB and other Soviet entities; and four detectors. He also provided updated information on the Bloch-Gikman matter. The package from the KGB to "B" contained $38,000 cash as payment for the October 16-23 period plus compensation for the two returned diamonds, and two KGB diskettes. The diskettes contained Christmas greetings from the KGB, discussed communications plans, and asked "B" for specific information about a variety of classified technical operations. 114. On Monday, March 5, 1990, after a call-out signal from "B", he and the KGB carried out an exchange operation at the "CHARLIE" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained his eighteenth diskette ("D-18"), on which "B" provided classified information on a wide variety of topics, including: four Soviet nationals, a KGB officer, a Soviet illegal, and two KGB detectors, who were all serving as FBI-CIA sources; communications intelligence operations; and the identification of a particular named NSA employee and the sensitive office in which the employee worked. The package also contained a 120-page document whose title, according to KGB records, was "Soviet Armed Forces and Strategic Nuclear Capabilities for the 1990s," dated February 1990. The package from the KGB contained $40,000 cash and a KGB diskette. The diskette discussed communications plans and asked "B" to provide information on a wide variety of classified technical, operational, and recruitment matters. The KGB also asked "B" what the Soviets could use of the certain highly classified and sensitive program information he had previously disclosed. 115. On Monday, May 7, 1990, after a call-out signal from "B", he and the KGB carried out an exchange operation at the "DORIS" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained his nineteenth diskette ("D-19") and approximately 232 pages of material, including another document on the tightly-compartmented classified program that was the subject of the document "B" passed to the KGB on August 7, 1989. "B" also gave the KGB permission to use the certain highly classified and sensitive program information he had previously disclosed. "B" also advised that because of a promotion he would be traveling for one year, and he discussed communications plans and a method of renewing contact. The package from the KGB to "B" contained $35,000 cash and a KGB diskette. The diskette contained communications plans, and identified a new dead drop site, codenamed "FLO", located under a footbridge in Lewinsville Park near the intersection of Warner Avenue and Westbury Road in McLean, Virginia, in the Eastern District of Virginia, and a nearby signal site. The diskette also contained specific requests for information, including operational leads and materials on recruitments of Soviets. It read, in part, as follows: Dear Friend: . . . . We attach some information requests which we ask Your kind assistance for. We are very cautious about using Your info and materials so that none of our actions in no way causes [sic] no harm to Your security. With this on our mind we are asking that sensitive materials and information (especially hot and demanding some actions) be accompanied by some sort of Your comments or some guidance on how we may or may not use it with regard to Your security. We wish You good luck and enclose $35,000. Thank you. Sincerely, Your friends. 116. On or about May 17, 1990, the KGB received a letter and a diskette from "B" at an accommodation address in the Eastern District of Virginia. 117. On Monday, May 21, 1990, the KGB loaded the "ELLIS" dead drop site with a package containing two KGB diskettes, and marked a call-out signal for "B." "B" picked up the KGB's package, but did not leave one for the KGB. The KGB diskettes contained a letter that discussed in detail communications plans and recontact procedures. It read, in part: Dear Friend: Congratulations on Your promotion. We wish You all the very best in Your life and career. We appreciate Your sympathy for some difficulties our people face - Your friendship and understanding are very important to us. Of course You are right, no system is perfect and we do understand this. Speaking about the systems. We don't see any problem for the system of our future communications in regard to this new circumstances of Yours. Though we can't but regret that our contacts may be not so regular as before, like You said. We believe our current commo plan - though neither perfect - covers ruther [sic] flexibly Your needs: You may have a contact with us anytime You want after staying away as long as You have to. So, do Your new job, make Your trips, take Your time. The commo plan we have will still be working. We'll keep covering the active call out signal site no matter how long it's needed. And we'll be in a ready-to-go mode to come over to the drop next in turn whenever You are ready: that is when You are back home and decide to communicate. All You'll have to do is to put Your call out signal, just as now. And You have two addresses to use to recontact us only if the signal sites for some reason don't work or can't be used. . . . But in any case be sure: You may have a contact anytime because the active call out site is always covered according to the schedule no matter how long you've been away. . . . Thank You and good luck. Sincerely, Your friends. The KGB particularly asked "B" to "give us some good leads to possible recruitments" among "interesting people in the right places." The KGB also asked for information about a Soviet Embassy employee who "B" had previously identified as an FBI recruitment-in-place, and who the KGB believed was about to defect. 118. On August 20, 1990, the KGB received from "B" an envelope, containing his twentieth diskette ("D-20"), at an accommodation address in the Eastern District of Virginia. The envelope bore the return address "J. Baker, Box 1101, Alexandria VA". The diskette contained classified information about several matters. "B" instructed the KGB to load the "FLO" dead drop site on September 3, 1990. 119. On Monday, September 3, 1990, the KGB loaded the "FLO" dead drop site with a package containing $40,000 cash, and a KGB diskette containing a letter which identified more call-out signal sites and contained numerous specific requests for classified information. The letter noted that some of the materials "B" had provided about "political issues of interest . . . were reported to the very top." "B" subsequently picked up the KGB's package. 120. On Saturday, February 2, 1991, in response to an emergency call-out signal from "B", the KGB retrieved a package from "B" at the "CHARLIE" dead drop site in the Eastern District of Virginia. The package contained "B"'s twenty-first diskette ("D-21"), which included a letter in which "B" acknowledged receipt of the $40,000, which he characterized as "too generous." He disclosed to the KGB that the FBI's chief of counterintelligence in the New York Field Office had told him that the FBI had recruited a specific number of sources at a particular Soviet establishment. "B" also advised that he would be ready for an operation on February 18, 1991. In exchange, the KGB left a package for "B" but he did not pick it up and the KGB later retrieved it. 121. On Monday, February 18, 1991, the KGB loaded the "CHARLIE" dead drop site with a package containing $10,000 cash and a KGB diskette. The diskette established two new dead drop sites, one of which was codenamed "GRACE" and located under a footbridge in Rock Creek Park in Washington, D.C. It also asked "B" to provide specific classified technical and operational information, and instructed that the next contact would be at the "DORIS" dead drop site. 122. On Monday, April 15, 1991, in response to a call-out signal from "B", he and the KGB carried out an exchange operation at the "DORIS" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained his twenty-second diskette ("D-22") in which he confirmed receipt of cash. "B" also provided classified FBI material about a specific recruitment operation about which the KGB had previously asked. The package from the KGB to "B" contained $10,000 and a KGB diskette which read, in part, as follows: Dear Friend: Time is flying. As a poet said: "What's our life, If full of care You have no time To stop and stare?" You've managed to slow down the speed of Your running life to send us a message. And we appreciate it. We hope You're O'K and Your family is fine too. We are sure You're doing great at Your job. As before, we'll keep staying alert to respond to any call from You whenever You need it. We acknowledge receiving one disk through CHARLIE. One disk of mystery and intrigue. Thank you. Not much a business letter this time. Just formalities. We consider Site-9 cancelled. And we are sure You remember: our next contact is due at ELLIS. Frankly, we are looking forward to JUNE. Every new season brings new expectations. Enclosed in our today's package please find $10,000. Thank You for Your friendship and help. We attach some information requests. We hope You'll be able to assist us on them. Take care and good luck. Sincerely, Your friends. The KGB asked "B" for information about several specific classified matters, including United States Intelligence Community plans to respond to domestic turmoil in the Soviet Union and new United States communications intelligence efforts. 123. On Monday, July 15, 1991, after a call-out signal from "B", he and the KGB carried out an exchange operation at the "ELLIS" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained his twenty-third diskette ("D-23") and approximately 284 pages of material. The diskette read, in part: "I returned, grabbed the first thing I could lay my hands on" and " I was in a hurry so that you would not worry, because June has passed, they held me there longer." He also noted that he had at least five years until retirement, and remarked: "Maybe I will hang in there for that long." "B" also reported on a particular FBI-CIA operation. The classified documents passed by "B" included FBI documents, human intelligence plans, and documents concerning nuclear and missile weapons proliferation. The package from the KGB to "B" contained $12,000 cash and a KGB diskette reading, in part, as follows: Dear friend: Acknowledging the disk and materials . . . received through "DORIS" we also acknowledge again Your superb sense of humor and Your sharp-as-a-razor mind. We highly appreciate both. Don't worry. We will not steam out incorrect conclusions from Your materials. Actually, Your information grately [sic] assisted us in seeing more clearly many issues and we are not ashamed to correct our notions if we have some. So, thank You for Your help. But if some of our requests seem a bit strange to You, please try to believe us there were sufficient reasons to put them and that what we wanted was to sort them out with Your help. In regard to our "memo" on Your security. Just one more remark. If our natural wish to capitalize on Your information confronts in any way Your security interests we definitely cut down our thirst for profit and choose Your security. The same goes with any other aspect of Your case. That's why we say Your security goes first. . . . We are sure You remember our next contact is due at "FLO". As always we attach some information requests, which are of current interest to us. We thank You and wish You the very best. Sincerely, Your friends. Enclosed in the package please find $12,000. The KGB gave "B" new communications plans, and numerous specific requests for classified technical, operational, and recruitment matters. The KGB also asked follow-up questions about information "B" had previously provided, and requested specific United States Intelligence Community activity towards the Soviet Union. 124. On Monday, August 19, 1991, after a call-out signal from "B", he and the KGB carried out an exchange operation at the "FLO" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained a recent FBI memorandum concerning specific methods of surveillance of a particular Soviet intelligence officer. It also contained "B"'s twenty-fourth diskette ("D-24") on which he discussed communications plans and provided information about classified technical and operational matters. On this diskette, he also discussed how the Soviet Union could benefit from a thorough study of the period of Chicago' s history when the city was governed by Mayor Richard J. Daley. The package from the KGB to "B" contained $20,000 cash and a message welcoming "B" back and advising that the next exchange would be at the "GRACE" dead drop site. 125. On Monday, October 7, 1991, after a call-out signal from "B", he and the KGB carried out an exchange operation at the "GRACE" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained his twenty-fifth diskette ("D-25") and a classified document entitled "The US Double-Agent Program Management Review and Policy Recommendations" dated September 10, 1991. On the diskette, "B" provided information about various classified recruitment operations. "B" also identified by name a particular "old friend" whom he suggested the KGB try to recruit; he explained that the man was a military officer who had recently been told he would not be promoted. The package from the KGB to "B" contained $12,000 cash and a KGB diskette reading, in part, as follows: Dear friend: Thanks for the package of 02.13. [The] materials are very promising, we intend to work on the scenario so wisely suggested by You. And the magical history tour to Chicago was mysteriously well timed. Have You ever thought of foretelling the things? After Your retirement for instance in some sort of Your own "Cristall [sic] Ball and Intelligence Agency" (CBIA)? There are always so many people in this world eager to get a glimpse of the future. But now back to where we belong. There have been many important developments in our country lately. So many that we'd like to reassure You once again. Like we said: we've done all in order that none of those events ever affects Your security and our ability to maintain the operation with You. And of course there can be no doubt of our commitment to Your friendship and cooperation which are too important to us to loose [sic].... Please note: our next contact is due at HELEN. Enclosed in the package please find $12,000 and attached as always are some information requests which we'd ask Your kind attention to. Thank You and good luck. Sincerely, Your friends. The KGB provided new communications plans and asked "B" for specific information about a variety of classified technical, operational, and analytical matters. The KGB also asked for the current 1991 issue of a particular document reporting on Soviet knowledge of United States satellite reconnaissance systems, commenting that: "It's fun to read about the life in the Universe to understand better what's going on on our own planet." Asking about some pages that appeared to be missing from "B"'s July package, the KGB noted: "Sometimes it happens, we understand. Life is becoming too fast." 126. On December 12, 1991, the KGB received an envelope from "B" at an accommodation address in Alexandria, Virginia, in the Eastern District of Virginia. The envelope, which was addressed by hand, bore a handwritten return address of "J. Baker, Box 1101, Houston, TX" and was postmarked Washington, D.C. The envelope contained a handwritten note reading: "≠ @ BOB on 6/22; T. DEVICE APPROVED 6/16, COMING SOON". Using the established "6" coefficient, the reference to "6/22" actually refers to December 16. The reference to "T. DEVICE" related to information "B" had previously passed to the KGB regarding a classified technical operation. 127. On Monday, December 16, 1991, "B" and the KGB carried out an exchange operation at the "BOB" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained several documents, including: (A) A DCI Counterintelligence Center research paper entitled "The KGB's First Chief Directorate: Structure, Functions, and Methods," dated November 1990. The document was classified SECRET with the caveats NOFORN NOCONTRACT ORCON. It also bore the following notices: WARNING NOTICE This document should be disseminated only to persons having both the requisite clearances and a need to have access to its contents for performance of their duties. No further distribution or reproduction is authorized without the approval of the Associate Deputy Director for Operations for Counterintelligence, CIA. and National SecurityUnauthorized Disclosure InformationSubject to Criminal Sanctions (B) A current volume of the DCI Congressional Budget Justification that detailed the programs and resource needs of the FBI's Foreign Counterintelligence Program. The document was classified SECRET with the caveats NOFORN NOCONTRACT ORCON, and the warning: "Unauthorized Disclosure Subject to Criminal Sanctions." The package from "B" also contained his twenty-sixth diskette ("D-26") in which he expressed embarrassment over the pages missing from his earlier package, and advised that he had been promoted to a position of increased salary and authority that had moved him temporarily out of direct responsibility for Soviet matters. He noted that a new mission for his new group had not yet been defined, and he quoted a particular remark by General Patton about the Japanese. "B" discussed communications plans, and provided information about various classified technical and operational matters. He also proposed a new communications system, in which he would set up an office at a location in town not subject to electronic surveillance, where he and the KGB could communicate directly using a computer that would be specially-equipped with certain advanced technology. The package from the KGB to "B" contained $12,000 cash and a KGB diskette discussing communications plans and asking for specific information about various classified matters. 128. In one message to "B" the KGB warned him to: "Examine from the point of security Your practice of copying materials." 129. On or before October 6, 1999, "B" received the following letter from the SVR: Dear friend: welcome! It's good to know you are here. Acknowledging your letter to V. K. we express our sincere joy on the occasion of resumption of contact with you. We firmly guarantee you for a necessary financial help. Note, please, that since our last contact a sum set aside for you has risen and presents now about 800.000 dollars. This time you will find in a package 50.000 dollars. Now it is up to you to give a secure explanation of it. As to communication plan, we may have need of some time to work out a secure and reliable one. This why we suggest to carry on the 13th of November at the same drop which you have proposed in your letter to V. K. We shall be ready to retrieve your package from DD since 20:00 to 21:00 hours on the 12th of November after we would read you [sic] signal (a vertical mark of white adhesive tape of 6-8 cm length) on the post closest to Wolf trap Creek of the "Foxstone Park" sign. We shall fill our package in and make up our signal (a horizontal mark of white adhesive tape). After you will clear the drop don't forget to remove our tape that will mean for us - exchange is over. We propose a new place where you can put a signal for us when in need of an urgent DD operation. LOCATION: the closest to Whithaven [sic] Parkway wooden electricity utility pole at the south-west corner of T- shaped intersection of Foxhall Road and Whitehaven Parkway (map of Washington, DC, page 9, grid Bll). At any working day put a white thumb tack (I cm in diameter, colored sets are sold at CVS) into the Northern side of the pole at the height of about 1.2 yards. The tack must be seen from a car going down Foxhall Road. This will mean for us that we shall retrieve your package from the DD Foxstone Park at the evening of the nex [sic] week's Tuesday (when it's getting dark). In case of a threatening situation of any kind put a yellow tack at the same place. This will mean that we shall refrain from any communication with you until further notice from your side (the white tack). We also propose for your consideration a new DD site "Lewis". DD LOCATION: wooden podium in the amphitheatre of Long-branch Nature Center (map of N.Virginia, page 16, grid G8). The package should be put under the FAR-LEFT corner of the podium (when facing the podium). Entter [sic] Longbranch Nature Center at the sign from Carlin Springs Road (near 6th Road south) and after parking your car in the lot follow the sign "To Amphitheatre." LOCATION OF THE DD SIGNAL: a wooden electricity utility pole at the north- west corner of the intersection of 3d Street and Carlin Springs Road neaqr [sic] the Metrobus stop (the same map, grid F7). The signals are the same as in the "Foxstone Park" DD. The white adhesive tape should be placed on the NORTHERN side of the pole, so that it could be noticed fro [sic] a car moving along Carlin Springs Road in the southern direction from Route 50. Please, let us know during the November operation of your opinion on the proposed places (the new signal and DD "Lewis"). We are intending to pass you a permanent communications plan using drops you know as well a new portion of money. For our part we are very interested to get from you any information about possible actions which may threaten us. Thank you. Good luck to you. Sincerely, Your friends. The initials "V. K." are those of a known SVR Line KR senior officer in Washington, D.C. 130. On or before March 14, 2000, "B" wrote a letter to the SVR, reading, in part, as follows: .... I have come about as close as I ever want to come to sacrificing myself to help you, and I get silence. I hate silence. . . . Conclusion: One might propose that I am either insanely brave or quite insane. I'd answer neither. I'd say, insanely loyal. Take your pick. There is insanity in all the answers. I have, however, come as close to the edge as I can without being truly insane. My security concerns have proven reality-based. I'd say, pin your hopes on 'insanely loyal' and go for it. Only I can lose. I decided on this course when I was 14 years old. I'd read Philby's book. Now that is insane, eh! My only hesitations were my security concerns under uncertainty. I hate uncertainty. So far I have judged the edge correctly. Give me credit for that. Set the signal at my site any Tuesday evening. I will read your answer. Please, at least say goodbye. It's been a long time my dear friends, a long and lonely time. Ramon Garcia 131. On or before June 8, 2000, "B" wrote a letter to the SVR which read, in part, as follows: Dear Friends: Administrative Issues: Enclosed, once again, is my rudimentary cipher. Obviously it is weak in the manner I used it last -- reusing key on multiple messages, but I wanted to give you a chance if you had lost the algorythm [sic]. Thank you for your note. It brought me great joy to see the signal at last. As you implied and I have said, we do need a better form of secure communication -- faster. In this vein, I propose (without being attached to it) the following: One of the commercial products currently available is the Palm VII organizer. I have a Palm III, which is actually a fairly capable computer. The VII version comes with wireless internet capability built in. It can allow the rapid transmission of encrypted messages, which if used on an infrequent basis, could be quite effective in preventing confusions if the existance [sic] of the accounts could be appropriately hidden as well as the existance [sic] of the devices themselves. Such a device might even serve for rapid transmittal of substantial material in digital form. Your FAPSI could review what would be needed, its advisability, etc., obviously -- particularly safe rules of use. While FAPSI may move with the rapidity of the Chinese army, they can be quite effective, in juggernaut fashion, that is to say thorough. . . . New topics: If you are wise, you will reign [sic] in the GRU. They are causing no end of grief. But for the large number of double-agents they run, there would be almost no ability to cite activity warranting current foreign counterintelligence outlays. Of course the Gusev affair didn't help you any. If I'd had better communications I could have prevented that. I was aware of the fact that microphones had been detected at the State Department. (Such matters are why I need rapid communications. It can save you much grief.) Many such things are closely held, but that closeness fails when the need for action comes. Then the compartments grow of necessity. I had knowledge weeks before of the existence of devices, but not the country placing them. . . . I only found out the gruesome details too late to warn you through available means including the colored stick-pin call. (Which by the way I doubted would work because of your ominous silence.) Very frustrating. This is one reason I say 'you waste me' in the note. . . . The U.S. can be errantly likened to a powerfully built but retarded child, potentially dangerous, but young, immature and easily manipulated. But don't be fooled by that appearance. It is also one which can turn ingenius [sic] quickly, like an idiot savant, once convinced of a goal. The [ ] Japanese (to quote General Patten [sic] once again) learned this to their dismay.... I will not be able to clear TOM on the first back-up date so don't be surprised if we default to that and you find this then. Just place yours again the following week, same protocol. I greatly appreciate your highly professional inclusion of old references to things known to you in messages resulting from the mail interaction to assure me that the channel remains unpirated. This is not lost on me. On Swiss money laudering [sic], you and I both know it is possible but not simple. And we do both know that money is not really 'put away for you' except in some vague accounting sense. Never patronize at this level It offends me, but then you are easily forgiven. But perhaps I shouldn't tease you. It just gets me in trouble. thank you again, Ramon 132. On or before July 31, 2000, "B" received the following letter from the KGB/SVR: Dear Ramon: We are glad to use this possibility to thank You for Your striving for going on contact with us. We received Your message. The truth is that we expended a lot of efforts to decipher it. First of all we would like to emphasize that all well known events wich [sic] had taken place in this country and in our homeland had not affected our resources and we reaffirm our strong intentions to maintain and ensure safely our long-term cooperation with You. We perceive Your actions as a manifestation of Your confidence in our service and from our part we assure You that we shall take all necessary measures to ensure Your personal security as much as possible. Just because proceeding from our golden rule - to ensure Your personal security in the first place - we have proposed to carry out our next exchange operation at the place which had been used in last august [sic]. We did not like to give You any occasion to charge us with an inadequate attention to problems of Your security. We are happy that, according to the version You have proposed in Your last letter, our suggestions about DD, known as "Ellis", coincided completely. However a situation around our collegues [sic] at the end of passed [sic] year made us to refuse this operation at set day. 1. We thank You for information, wnich [sic] is of a great interest for us and highly evaluated in our service. We hope that during future exchanges we shall receive Your materials, which will deal with a [sic] work of IC, the FBI and CIA in the first place, against our representatives and officers. We do mean its human, electronic and technical penetrations in our residencies here and in other countries. We are very interested in getting of the objective information on the work of a special group which serches [sic] "mole" in CIA and FBI. We need this information especially to take necessary additional steps to ensure Your personal security.... 2. Before staling a communication plan that we propose for a next future, we would like to precise [sic] a following problem. Do You have any possibility to meet our collegues [sic] or to undertake the exchange ops in other countries? If yes, what are these countries? Until we receive Your answer at this [sic] questions and set up a new communication plan, we propose to use for the exchange ops DD according to the following schedule: = DD "LEWIS" on 27 of may 2001 (with a coefficient it will mean on 21 of november 2000). We draw Your attention on the fact that we used a former coefficient - 6 (sender adds, addressee subtracts). A time will be shown at real sense. We will be ready to withdraw Your package beginning by 8 PM on 27 may 2001 after we shall read Your signal. After that we put DD our package for You. Remove Your signal and place our signal by 9 PM of the same day. After that You will withdraw our package and remove our signal. That will mean an exchange operation is over. We shall check signal site (i.e., its absence) the next day (28 of May) till 9 PM. If by this time a signal had not been removed we shall withdraw our package and shall put it in for You repeatedly dates with DD "ELLIS" ≠ in each seven days after 28 May till 19 of June 2001 (i.e., 13 of December 2000). = We propose to carry out our next operation on 16 of October 2001 (i.e., 10 of April) at the DD "LINDA" in "Round Tree park" (if this place suits for Your [sic] we would like to receive Your oppinion [sic] about that during exchange in may). A time of operation from 8 pm to 9 pm, signals and schedule of alternate dates are the same. In the course of exchange ops we shall pass to You descriptions of new DD and SS that You can check them before. You will find with this letter descriptions of two new DD "LINDA" and "TOM". Hope to have Your opinion about them. In case of break off in our contacts we propose to use DD "ELLIS", that you indicated in your first message. Your note about a second bridge across the street from the 'F' sign, as back up, is approved. We propose to use "ELLIS" once a year on 12 August (i.e., with coeff. it will be 18 February) at the same time as it was in August 1999. On that day we can carry out a full exchange operation -- You will enload your package and put a signal, we shall withdraw it, load our package and put our signal. You will remove our package and put your signal. Alternate dates - in seven days 'til next month. = As it appears from your message, you continue to use post channel as a means of communication with us. You know very well our negative attitude toward this method. However if you send by post a short note where date (i.e., with coefficient), time and name of DD for urgent exchange are mentioned, you could do it by using address you had used in September (i.e., with coeff.) putting in a sealed envelope for V. K. In future, it is inexpedient to use a V. K. name as a sender. It will be better to choose any well known name in this country as you did it before. 3. We shall continue work up [sic] new variants of exchanging messages including PC disks. Of course we shall submit them to your approval in advance. If you use a PC disk for next time, please give us key numbers and program you have used. 4. We would like to tell you that an insignificant number of persons know about you, your information and our relationship. 5. We assess as very risky to transfer money in Zurich because now it is impossible to hide its origin... 133. On or before November 17, 2000, "B" wrote a letter to the KGB/SVR, reading, in part, as follows: Dear Friends: Bear with me. It was I who sent the message trying to use TOM to communicate material to you. On reflection, I can understand why you did not respond. I see that I failed to furnish you sufficient information for you to recognize that the message you left for me in ELLIS did not go astray. You do this often (communicate such assurances through the mention of items like the old date offset we used), and believe me, it is not lost on me as a sign of professionalism. I say bear with me on this because you must realize I do not have a staff with whom to knock around all the potential difficulties. (For me breaks in communications are most difficult and stressful.) Recent changes in U.S. law now attach the death penalty to my help to you as you know, so I do take some risk. On the other hand, I know far better than most what minefields are laid and the risks. Generally speaking you overestimate the FBI's capacity to interdict you, but on the other hand, cocksure officers, (those with real guts and not as much knowledge as they think) can, as we say, step in an occasional cowpie. (Message to the translator: Got a good word for cowpie in Russian?? Clue, don't blindly walk behind cows.). . . . I have drawn together material for you now over a lengthy period. It is somewhat variable in import. Some were selected as being merely instructive rather than urgently important. I think such instructive insights often can be quite as valuable or even more valuable long-term because they are widely applicable rather than narrow. Others are of definite value immediately. My position has been most frustrating. I knew Mr. Gusev was in eminent [sic] danger and had no effective way of communicating in time. I knew microphones of an unknown origin were detected even earlier and had no regular way of communicating even that. This needs to be rectified if I am to be as effective as I can be. No one answered my signal at Foxhall. Perhaps you occasionally give up on me. Giving up on me is a mistake. I have proven inveterately loyal and willing to take grave risks which even could cause my death, only remaining quiet in times of extreme uncertainty. So far my ship has successfully navigated the slings and arrows of outrageous fortune. I ask you to help me survive. . . . On meeting out of the country, it simply is not practical for me. I must answer too many questions from family, friends, and government plus it is a cardinal sign of a spy. You have made it that way because of your policy. Policies are constraints, constraints breed patterns. Patterns are noticed. Meeting in this country is not really that hard to manage, but I am loath to do so not because it is risky but because it involves revealing my identity. That insulation has been my best protection against betrayal by someone like me working from whatever motivation, a Bloch or a Philby. (Bloch was such a shnook. . . . I almost hated protecting him, but then he was your friend, and there was your illegal I wanted to protect. If our guy sent to Paris had balls or brains both would have been dead meat. Fortunately for you he had neither. He was your good luck of the draw. He was the kind who progressed by always checking with those above and tying them to his mistakes. The French said, "Should we take them down?" He went all wet. He'd never made a decision before, why start then. It was that close. His kindred spirits promoted him. Things are the same the world over, eh?) On funds transfers through Switzerland, I agree that Switzerland itself has no real security, but insulated by laundering on both the in and out sides, mine ultimately through say a corporation I control loaning mortgage money to me for which (re) payments are made.... It certainly could be done. Cash is hard to handle here because little business is ever really done in cash and repeated cash transactions into the banking system are more dangerous because of the difficulty in explaining them. That doesn't mean it isn't welcome enough to let that problem devolve on me. (We should all have such problems, eh?) How do you propose I get this money put away for me when I retire? (Come on; I can joke with you about it. I know money is not really put into an account at MOST Bank, and that you are speaking figuratively of an accounting notation at best to be made real at some uncertain future. We do the same. Want me to lecture in your 101 course in my old age? My college level Russian has sunk low through inattention all these years; I would be a novelty attraction, but I don't think a practical one except in extremis.) So good luck. Wish me luck. OK, on all sites detailed to date, but TOM'S signal is unstable. See you in 'July' as you say constant conditions. yours truly, Ramon 134. On the evening of Tuesday, December 12, 2000, FBI surveillance personnel observed HANSSEN driving four times past the Foxstone Park sign on Creek Crossing Road in Vienna, Virginia. As described above, the Foxstone Park sign is the signal site associated with the "ELLIS" dead drop site, which was used from early on in the KGB's "B" operation. 135. Also on the evening of Tuesday, December 12, 2000, FBI surveillance personnel observed HANSSEN walking into a particular store at a shopping center near Foxstone Park at the same time as a known SVR officer was in front of the store. 136. On Tuesday, December 26, 2000, FBI surveillance personnel observed HANSSEN three times at the Foxstone Park signal site: a) At approximately 5:42 pm, HANSSEN stopped his vehicle in front of the Foxstone Park sign for approximately ten to fifteen seconds. b) At approximately 8:53 pm, HANSSEN parked his car on a street off Creek Crossing Road and walked to the Foxstone Park signal site. HANSSEN stopped in front of the Foxstone Park sign, holding a lit flashlight, and swept the flashlight beam in a vertical motion over some wooden pylons located near the sign, between the road and the sign. He appeared to the FBI surveillance personnel to focus his flashlight beam on one of the pylons. He then turned and walked away, shrugging his shoulders and raising his arms in a gesture of apparent disgust or exasperation. HANSSEN returned to his vehicle, and drove away to a nearby Tower Records store. c) At approximately 9:32 pm, HANSSEN drove back past the Foxstone Park signal site, stopped his vehicle in front of it for approximately two to three seconds, and then drove away. 137. During January 2001, FBI surveillance personnel observed HANSSEN drive past the Foxstone Park signal site, and either slowing or stopping at the site, on three occasions. At approximately 8:18 pm on Tuesday, January 9, 2001, HANSSEN drove past the Foxstone Park signal site, came to a complete stop in front of it for approximately 10 seconds, then drove away. Shortly before 6:00 pm on Tuesday, January 23, 2001, HANSSEN drove past the Foxstone Park signal site, came to a rolling stop near it, and then drove away. After 5:00 pm on Friday, January 26, 2001, HANSSEN drove past the Foxstone Park signal site, slowing down near it. 138. On the evening of Monday, February 5, 2001, FBI surveillance personnel observed HANSSEN driving past the Foxstone Park signal site three times between approximately 5:37 pm and approximately 7:44 pm. 139. On Monday, February 12, 2001, FBI surveillance personnel checking the "LEWIS" dead drop site found a package concealed at the site. FBI personnel removed the package and transported it to the FBI Laboratory, where it was opened, its contents were examined and photocopied, and it was restored to an apparently intact condition. The package was then replaced at the dead drop site. The package contained $50,000 in used $100 bills and a typed note reading: "Next 10/31/01 TOM alt. 20,27". These were wrapped in white paper, which was taped, and which in turn was wrapped in a taped-up black plastic trash bag inside a second black plastic trash bag. VI. FACTS ESTABLISHING THAT "B" IS ROBERT PHILIP HANSSEN There is overwhelming evidence that "B" is ROBERT PHILIP HANSSEN. A. FORENSIC EVIDENCE 140. When "B" made dead drops to the KGB/SVR, he would place the contents of the drop in a plastic garbage bag, which he would wrap with tape. The plastic bag would then be placed inside a second garbage bag. The FBI has come into possession of the inner plastic bag used by "B" on one occasion to wrap the contents of a package to the KGB. 141. An FBI fingerprint examiner has conducted an examination of the plastic bag and ascertained that it contains two latent fingerprints of comparison value. The examiner determined that these two fingerprints are those of ROBERT PHILIP HANSSEN. B. MATERIAL OBTAINED FROM HANSSEN'S FBI OFFICE AND VEHICLE 142. On February 5, 2001, pursuant to court authorization, the FBI searched HANSSEN's current personal office within Room 9930 at FBI Headquarters. HANSSEN's briefcase, located in the office, contained (1) HANSSEN's current valid United States tourist passport; (2) a personal address book; (3) several personal checkbooks; (4) multiple sets of financial statements; (5) one computer floppy disk; (6) one 8MB Versa Card Flash Memory Adapter, which is a memory storage card for a computer; (7) one cell phone. These items were photographed, duplicated, or otherwise recorded, but not removed or altered. Upon examination, the FBI determined that the memory storage card contained several letters associated with the "B" operation, which are further described elsewhere in this Affidavit. That these letters were found in HANSSEN's possession is clear and unequivocal evidence that HANSSEN is "B". 143. On January 30, 2001, pursuant to court authorization, the FBI searched HANSSEN's Ford Taurus automobile, and found the following: (1) In the glove compartment were a roll of white Johnson & Johnson medical adhesive tape, and a box of Crayola colored chalk containing 12 pieces of chalk. (2) In one of four cardboard boxes in the trunk were seven classified documents printed from the FBI's Automated Case Support (ACS) system. Several pertained to ongoing FBI foreign counterintelligence investigations and were classified SECRET. (3) In another cardboard box in the trunk were six green fabric-covered United States government ledger notebooks, containing classified information. (4) Also in the trunk were a roll of Superior Performance Scotch clear mailing tape, and dark-colored Hefty garbage bags. These items were not removed, although small samples were taken, and they were photographed. 144. On February 12, 2001, pursuant to court authorization, the FBI again searched HANSSEN's Ford Taurus automobile. In addition to the items described in part (1) of the foregoing paragraph, the glove compartment contained a small plastic box containing thumbtacks of various colors, including yellow and white. It was further ascertained that at least one of the pieces of chalk was pink. These items were not removed, although small samples were taken, and they were photographed. During this search, HANSSEN's briefcase was observed in the vehicle, but it was not removed. C. RECORDING OF TELEPHONE CONVERSATION 145. On August 18, 1986, KGB Officer Aleksander Fefelov spoke by telephone with "B". A portion of that telephone call, lasting approximately two minutes, was recorded. Two FBI analysts, who have worked closely and routinely with HANSSEN for at least five years, have listened to both the recording and an FBI-enhanced version of the recording in which background noise has been minimized. They have both concluded without reservation that the voice of "B" is that of HANSSEN. D. DEAD DROP SITES 146. There is a particularly clear correlation between HANSSEN's personal residence in Northern Virginia and two dead drop sites used frequently in the "B" operation. 147. In 1985, when "B" volunteered to the KGB, HANSSEN lived on Whitecedar Court, in Vienna, Virginia. The first dead drop site selected by "B" was Nottoway Park, which was less than a five minute walk from Whitecedar Court. Between 1985 and 1989, the Nottoway Park site was used for dead drops so frequently - 17 times - that it was designated by the KGB as the "PARK/PRIME" dead drop site. 148. In November 1985, the Whitecedar Court house was sold and HANSSEN moved to New York to undertake his new assignment in the New York Field Office. He returned to FBI Headquarters in August 1987, and moved into a home at 9414 Talisman Drive, Vienna, Virginia, which he had bought in July 1987. 149. In August 1989, the KGB designated drop site "ELLIS," located near Foxstone Park in Vienna, Virginia. The frequent use of this site -- at least seven times -- suggests that "B" lived very close to the site or passed it routinely. A further indication of this is that "B" told the KGB in October 1989 that the KGB could use the "ELLIS" site at any time. In fact, the "ELLIS" site is an approximately one-mile walk from HANSSEN's Talisman Drive residence. E. PALM III 150. HANSSEN owns a Palm III device which is a hand-held personal digital assistant. The FBI has determined that HANSSEN's Palm III contains a reference to "ELLIS" and the date February 18, and the time 8:00. The term "ELLIS" is the KGB/SVR codename for the dead drop site located in the area of Foxstone Park that was used seven times by either "B", the KGB/SVR, or both. F. CORRELATION OF HANSSEN'S WORK ASSIGNMENTS TO "B"'s DISCLOSURES TO THE KGB/SVR 151. "B"'s first letter to the KGB was postmarked in Prince George's County, Maryland, on Tuesday, October 1, 1985. Although at that time HANSSEN had recently been re-assigned to New York City, FBI records show that on that particular day he was in Washington, D.C., on administrative matters. Prince George's County is located on the route between Washington, D.C., and New York City. 152. In May 1990, "B" told the KGB that, due to a promotion, he would be traveling more and his access to materials would be limited. In May 1990, HANSSEN was reassigned from the Soviet Analytical Unit in the Intelligence Division to the Inspection Division at FBI Headquarters. An Inspection Division assignment is a typical feature of an FBI supervisory agent's career path and requires frequent travel to FBI field offices for inspections. While serving in this assignment, HANSSEN traveled frequently from June 1990 through June 1991 to conduct inspections in various FBI offices. 153. On July 15, 1991, "B" indicated to the KGB that he had "returned" from a trip. The KGB responded on August 15, 1991 with a message welcoming him back and noting that "it's great for you to touch the green, green grass o£ home." HANSSEN returned on May 24, 1991 from a lengthy overseas inspection tour. 154. On December 16, 1991, "B" told the KGB that he had "an increase in salary and authority [which] moved him temporarily out of direct responsibility, but a new mission for my new group has not been fully defined" and that "I hope to adjust to that . . . . As General Patton said . . . 'let's get this over with so we can go kick the [ ] out of the [ ] Japanese." (He quoted the same reference to Japanese in the letter he wrote to the SVR on or before June 8, 2000.) At that time, HANSSEN was preparing to assume new duties as Chief of the new National Security Threat List Unit at FBI Headquarters, where he focused the Unit's counterintelligence efforts on economic espionage. This new assignment resulted in an increase in salary (from GS-14 to GS- 15) and authority (Unit Chief). Several FBI employees recall that HANSSEN frequently quoted General Patton, and one employee who worked closely with HANSSEN specifically remembers HANSSEN once using the above-mentioned Patton quote in a discussion with him. 155. In February 1988, "B" told the KGB that he could read the Viktor Sheymov file because a special project relating to Sheyrnov was about to begin. At that time, HANSSEN was reviewing the Sheyrnov file in preparation for his participation in upcoming Intelligence Community debriefings of Sheymov. 156. Throughout the "B" operation, "B" reported on Sheymov's defection. HANSSEN took particular interest in the Sheymov case and developed a personal friendship with Sheymov. Recently, in fact, HANSSEN told FBI co-workers that he was considering an offer of lucrative employment by Sheymov after retirement in April 2001. 157. On August 19, 1991, "B" passed detailed information to the KGB on FBI coverage of a particular suspected Soviet intelligence officer. On July 1, 1991, HANSSEN returned to the Intelligence Division at FBI Headquarters (after his tour of duty on the Inspection Staff) and became the Headquarters Supervisor responsible for FBI coverage of this suspected Soviet intelligence officer. 158. In his assignment to CI-3A, the FBI's Soviet Analytical Unit, HANSSEN had access to an extremely broad array of highly classified material. The FBI has determined that HANSSEN's access to classified material is consistent with "B"'s disclosure of classified material to the KGB/SVR. 159. During two extended periods when "B" was inactive, from November 1985 to June 1986, and August 1986 to August 1987, HANSSEN was assigned to the FBI's Field Office in New York City. 160. In July 1991, "B" told the KGB that he had at least five more years until retirement. HANSSEN was eligible for retirement from the FBI in 1996. G. HANSSEN'S USE OF THE FBI AUTOMATED CASE SUPPORT SYSTEM 161. The Automated Case Support System (ACS) is the FBI's collected computerized databases of investigative files and indices. ACS came online in October 1995. The main, and most extensive ACS database, is the Electronic Case File (ECF), which contains electronic communications and certain other documents related to ongoing FBI investigations, programs, and issues, and the indices to those documents. It is the equivalent of a closed FBI intranet. ACS users can access individual files by making full-text search requests for particular words or terms. 162. FBI personnel who are "approved users" of ACS, including HANSSEN, must log on with a user identification number and password unique to each user. Retrieval logs make it possible to conduct audits of individuals' use of ACS. 163. An audit of HANSSEN's use of ACS shows that he has been a consistent user of ECF in particular, and that he periodically conducted searches of the ECF database using a wide variety of very specific search terms. Although some of HANSSEN's ACS use appears to have been related to his official responsibilities, he made a substantial number of ACS searches apparently directly related to his own espionage activities. Through these searches, HANSSEN could retrieve certain FBI records that would indicate whether HANSSEN or his KGB/SVR associates, or their activities or operational locations, were known to or suspected by the FBI, and thus whether he was exposed to danger. For example, on the following dates HANSSEN searched the ECF for the following terms, limiting some of the searches to a specified period of time as indicated: July 25, 1997:HANSSEN March 30, 1998:DEAD DROP AND KGB May 18, 1998:DEAD DROP DEAD DROP AND RUSSIA July 6, 1998:DEAD DROP DEAD DROP AND WASHINGTON FISA AND CELL PHONE HANSSEN July 30, 1998:9414 TALISMAN DEAD DEAD DROP DEAD DROP AND WASHINGTON DOUBLE D HANSSEN ROBERT P. HANSSEN September 3, 1998:ROBERT HANSSEN ROBERT P HANSSEN ROBERT P. HANSSEN September 21, 1998:'DEAD DROP' 'DEAD DROP' AND RUSSIA October 13, 1998:DEAD DROP DEAD DROP [Dates=08/01/1998-10/13/1998 October 27, 1998:'DEAD DROP' 'DEAD DROP' AND WASHINGTON 'DEAD DROP' WASHINGTON December 14, 1998:DEAD DROP DEAD DROP AND WASHINGTON April 7, 1999:DROP SITE DROP SITE AND RUSSIA April 12, 1999:ROBERT HANSSEN TALISMAN TALISMAN DRIVE WHITE CEDAR WHITECEDAR COURT August 11, 1999:CCTV AND VIRGINIA CCTV AND VIRGINIA[Dates=01/01/1999- 08/11/1999 FOXSTONE August 17, 1999:DEAD DROP[Dates=01/01/1999-08/17/1999 August 30, 1999:DEAD DROP DEAD DROP[Dates=07/01/1999-08/30/1999 September 2, 1999:CCTV CCTV AND SVR 'DEAD DROP' AND SVR 'DEAD DROP' SVR September 28, 1999:DROP SITE DROP SITE[Dates=10/01/1999-10/21/1999 TALISMAN October 21, 1999:DEAD DROP[Dates=10/01/1999-10/21/1999 October 26, 1999:VIENNA AND VIRGINIA VIENNA AND VIRGINIA AND FCI [Dates= 01/01/1999-10/27/1999] October 27, 1999:DEAD DROP [Dates=1/09/1999-1/28/1999 November 3, 1999:FOXSTONE FOXSTONE AND VIENNA VIENNA AND DROP VIENNA AND DROP AND FCI [Dates=01/01/1999-ll/4/1999 VIENNA AND DROP[Dates=01/06/1999- 03/11/1999] November 15, 1999:DEAD DROP AND VIRGINIA FOXSTONE January 13, 2000:DEAD DROP[Dates=01/01/2000-01/13/2000 DEAD DROP [Dates=10/01/1999-12/31/1999 January 18, 2000:DROP SITE AND VIRGINIA SVR AND DEAD DROP NOT GRU March 14, 2000:DEAD DROP AND SVR March 31, 2000:DEAD DROP DEAD DROP AND RUSSIA May 22, 2000:TALISMAN DRIVE September 28, 2000:DEAD DROP AND WASHINGTON October 4, 2000:DROP SITE[Dates=08/01/2000-10/04/2000 November 13, 2000:DEAD DROP[Dates=10/01/2000-ll/13/2000 December 21, 2000:DEAD DROP [Dates=10/01/2000-12/22/2000 ESPIONAGE [Dates=11/01/2000-12/21/2000 January 3, 2001:ROBERT HANSSEN January 16, 2001:DEAD DROP[Dates=12/01/2000-01/15/2001 ESPIONAGE [Dates=12/01/2000-01/15/2001 January 19, 2001:DEAD DROP[Dates=12/01/2000-01/18/2001 January 22, 2001:DEAD DROP[Dates=01/01/2000-01/12/2001 DEAD DROP[Dates=12/01/2000-01/22/2001 DEADDROP[Dates=01/01/2000-01/22/2001 FOXSTONE H. "B"'S "OLD FRIEND" 164. In 1991, "B" proposed that the KGB consider recruiting a particular named individual who he described as an "old friend." HANSSEN had been friends with this individual since HANSSEN was a teenager. VII. LOCATION OF EVIDENCE, FRUITS, INSTRUMENTALITIES,. AND PROCEEDS 165. Based on my training and experience, and that of other FBI personnel with whom I have consulted, and on my participation in this investigation, I know that: 166. Persons who have engaged in espionage activities on behalf of foreign intelligence services maintain records, notes, bank records, financial statements, calendars, journals, maps, instructions, classified documents, and other papers or documents relating to the transmittal of national defense and classified intelligence information to foreign governments and intelligence services. Such records, notes, bank records, financial statements, calendars, journals, maps, instructions, classified documents, and other papers or documents are maintained, albeit often secreted, on their persons, in and around their residences, at their places of employment, in home and office computers, in their automobiles, and in other remote locations such as safe deposit boxes and storage facilities. 167. Persons who have been engaged in espionage activities on behalf of foreign intelligence services often utilize espionage paraphernalia, including devices designed to conceal and transmit national defense and classified intelligence information. These paraphernalia and devices include materials used by espionage agents to communicate between each other and with a foreign government, to wit: coded pads, secret writing paper, chemicals used to develop coded and secret messages, microdots, and microfiche, together with instructions in the use of these materials; electronic recording and transmittal equipment; computers and computer disks; cameras and film; books, records, documents, and papers. The information that is frequently passed or recorded through such methods often includes: (1) national defense and classified intelligence information; (2) the identities of other foreign espionage agents and intelligence officers; (3) financial transactions, including payments to foreign espionage agents and hidden financial accounts; (4) records of previous illicit espionage transactions; and (5) the source and disposition of national defense and classified information. 168. Persons who have been engaged in espionage activities on behalf of foreign intelligence services routinely conceal in their residences large amounts of United States and foreign currency, financial instruments, precious metals and gems, jewelry, and other items of value and/or proceeds of illegal espionage transactions. They also conceal records relating to hidden foreign and domestic bank and financial records, including accounts in fictitious names. 169. Persons who have been engaged in espionage activities on behalf of foreign intelligence services often secrete national defense and classified documents and materials, as well as clandestine communications devices and instructions, contact instructions, codes, telephone numbers, maps, photographs, other papers and materials relating to communications procedures, and proceeds and records of illegal espionage transactions, in secure hidden locations and compartments within their residences, places of employment, safe deposit boxes, storage facilities, and/or motor vehicles, including hidden compartments within motor vehicles, for ready access and to conceal such items from law enforcement authorities. 170. Persons who have been engaged in espionage activities on behalf of foreign intelligence services are not unlike any other person in our society in that they maintain documents and records, often doing so for long periods of time regardless of whether their value to the person has diminished. These persons maintain documents and records that will identify and corroborate travel both in the United States and abroad made in connection with foreign intelligence activity, including personal meets with foreign intelligence officers. Such documents and records include passports, visas, calendars, journals, date books, telephone numbers, credit cards, hotel receipts, airline records, correspondence, carbon copies of money orders and cashier's checks evidencing large cash expenditures, and accounts and records in fictitious names. 171. Persons who have been engaged in espionage activities on behalf of foreign intelligence services often maintain identity documents, including those utilizing fictitious identities. United States foreign currency, instructions, maps, photographs. United States and foreign bank accounts' access numbers and instructions, and other papers and materials relating to emergency contact procedures and escape plans. 172. The above-described results of recent court authorized searches of HANSSEN's automobile and office demonstrate that HANSSEN has retained evidence of his espionage activity, and that such activity is ongoing. 173. Both the location of the dead drop site "ELLIS", and the location of the signal site associated with the "ELLIS" dead drop site ≠ the Foxstone Park sign in the southern part of Foxstone Park -- are within an approximately one-mile driving and walking distance from HANSSEN's residence at 9414 Talisman Drive, Vienna, Virginia. 174. "B" had substantial communications with the KGB about using sophisticated computer techniques for communications, and he sent information to the KGB on encrypted computer diskettes. HANSSEN is known to be highly skilled in the use of computers and computer programming, and to maintain at least one computer with its own server in his residence at 9414 Talisman Drive, Vienna, Virginia. There is thus probable cause to believe that in continuing espionage activities HANSSEN is using one or more computers (in addition to his Palm III device) and related disks, diskettes, and other equipment now located in his residence at 9414 Talisman Drive, Vienna, Virginia. VIII. SPECIAL NEEDS AND JUSTIFICATION TO SEIZE COMPUTERS AND RELATED HARDWARE AND ELECTRONIC STORAGE DEVICES FOUND AT HANSSEN'S RESIDENCE FOR OFF-SITE EXAMINATION 175. As noted above, HANSSEN has a high degree of computer technology expertise. In addition, there is probable cause to believe that HANSSEN is using computers as an instrumentality of his espionage activities. This is evidenced by the letters to and from the KGB/SVR found on the computer memory card in his briefcase, and by the reference "ELLIS" on his Palm III device, as well as HANSSEN's extensive accessing of the FBI's ACS system for information relevant to his espionage activities. HANSSEN has at least one computer and a server in his residence at 9414 Talisman Drive, Vienna, Virginia, and a portable laptop computer. Because of the likelihood that HANSSEN will have extraordinary amounts of information and files in his computers (including laptops) and any computer storage devices and that such information may be encrypted, it will be neither practical nor reasonable to require the searching agents to examine the defendant's computers onsite at his residence. Given HANSSEN's computer expertise and concern about detection, there is considerable risk that HANSSEN has set up self-destruct programs for his computers that could erase vital evidence and files if his system or systems were examined by anyone other than experts. Accordingly, the FBI intends to seize those components of HANSSEN' s computer hardware and related equipment as the FBI determines must be seized in order to be examined in an appropriate location by Computer Analysis Response Team (CART) personnel. Seizing and disabling the defendant's computer hardware will also help prevent HANSSEN or any co-conspirators from seeking to erase any data on HANSSEN's computer system (including his server) from any remote location and through any special destructive program. 176. In addition, it is highly probable that HANSSEN has access to and has used the computers (including laptops) of family members residing in the same residence. Accordingly, he may be using these computers of family members to store or transmit or conceal classified information or other evidence of the espionage activity set forth in this affidavit. It will therefore be necessary to seize and examine the computer hardware and files within of family members. Such computers and files therein will be speedily returned to those family members if examination discloses that they have in fact no evidence or documents connected to the espionage activity described in this Affidavit. IX. REQUEST FOR AUTHORITY TO EXECUTE SEARCH WARRANTS DURING NIGHTTIME HOURS Based on my experience and the experience of other FBI Special Agents known to me, I am aware that persons who have committed serious felonies, particularly those felonies with authorized punishments of death or incarceration for any term of years or life, will often attempt to destroy evidence, fruits, and instrumentalities of their crimes if alerted prematurely to law enforcement interest. I also know that foreign intelligence services, including the SVR, are able to communicate prearranged "danger" signals to their agents to alert them to destroy evidence, fruits and other instrumentalities of crime, as well as to execute emergency escape plans. I am also aware that these hostile foreign intelligence services, and in particular the SVR, actively seek to penetrate United States intelligence and law enforcement agencies by technical and human means to learn about FBI counterintelligence activities. As a result, law enforcement interest could be detected at any time and it may be necessary to execute a search warrant during night time hours to preserve evidence, fruits and instrumentalities of espionage from destruction. In addition, it is noted that as a Special Agent of the Federal Bureau of Investigation, HANSSEN is authorized to carry a service weapon at all times, and he is known to have additional weapons in his residence, and may in his vehicles, that could pose an immediate danger and threat to any searching or arresting agents unless seized and secured as quickly as possible. If the FBI is unsuccessful in apprehending HANSSEN immediately, he could return home during evening hours to destroy incriminating evidence, obtain a weapon and other items to assist his flight or evasion. In an undated letter to the KGB in November 1985, HANSSEN wrote: "Eventually I would appreciate an escape plan." HANSSEN currently carries his valid tourist passport in his briefcase. As noted above, the SVR has instructed HANSSEN to use a yellow tack in case of a "threatening situation", which could trigger an SVR-assisted escape, and he has recently possessed yellow tacks. It is highly likely that HANSSEN would have such an escape plan in place by 2001, and that authority to search at any time of the day or night would be essential to foil any such escape plan, especially if HANSSEN received warning from the SVR. Finally, as noted above, much of the operational activity of the "B" operation occurred at night. Recently, HANSSEN was observed checking a known KGB/SVR signal site on several nighttime occasions in December 2000 and January and February. Accordingly, there is probable cause to believe that HANSSEN would go to the signal site or related dead drop site (both designated under the code name "ELLIS") at any time, and especially at night to avoid detection. Because an arrest of HANSSEN could well occur in the nighttime hours, and the searches should be conducted immediately upon his arrest, authority is requested to execute search warrants during nighttime hours. X. CONCLUSION AS TO PROBABLE CAUSE TO SEARCH 177. Based on the above facts and circumstances, I believe there is probable cause that evidence, fruits, instrumentalities, and proceeds of espionage activity by ROBERT PHILIP HANSSEN, in violation of Title 18, United States Code, Section 794 (a) (Transmitting National Defense Information) and Section 794 (c) (Conspiracy to Commit Espionage), are located in: 1) The residence of ROBERT PHILIP HANSSEN, such premises known and described as a single family residence located at: 9414 Talisman Drive Vienna, Virginia 22182 as more fully described in Attachment B, and which is within the Eastern District of Virginia; 2) One silver 1997 Ford Taurus, bearing VIN IFALP52U9VG211742 and Virginia license plate number ZCW9538, which is anticipated to be within the Eastern District of Virginia; 3) One 1993 Volkswagen van, bearing VIN WV2KC0706PH080424 and Virginia license plate number ZCW9537, which is anticipated to be within the Eastern District of Virginia; 4) One 1992 Isuzu Trooper, bearing VIN JACDH58W7N7903937 and Virginia license plate YRP3849, which is anticipated to be within the Eastern District of Virginia; XI. WARRANTS REQUESTED Based on all the foregoing, I respectfully request a warrant for the arrest of ROBERT PHILIP HANSSEN, and search warrants for the locations described in the immediately foregoing Section of this Affidavit. XII. ATTESTATION The above facts are true and correct to the best of my knowledge and belief. [signed] Stefan A. Pluta Special Agent Federal Bureau of Investigation Sworn and Subscribed to before me this 16th day of February, 2001. [signed:] T.R. JOSEPH [?] UNITED STATES MAGISTRATE JUDGE ATTACHMENT A 1) Espionage paraphernalia, including devices designed to conceal and transmit national defense and classified intelligence information and material, and implements used by espionage agents to communicate with their handlers and with a foreign government, to wit: white tape, mailing tape, colored chalk (all used for signaling purposes), coded pads, secret writing paper, microdots, any letters, notes or other written communications (including contact instructions) between defendant ROBERT PHILIP HANSSEN and any agents of the SVR or other intelligence service of the Russian Federation; any computers, (including laptops), computer disks, cameras, film, codes, telephone numbers, maps, photographs and other materials relating to communication procedures, correspondence; 2) Records, notes, calendars, journals, maps, instructions, and classified documents and other papers and documents relating to the transmittal of national defense and classified intelligence information (including the identities of foreign espionage agents and intelligence officers and other foreign assets or sources providing information to the United States Intelligence Community, such as the FBI and CIA; United States Government ledger notebooks in which the defendant ROBERT PHILIP HANSSEN has notes pertaining to FBI foreign counterintelligence investigations; records of previous illicit espionage transactions, national defense and classified intelligence information, including copies of documents copied or downloaded by ROBERT PHILIP HANSSEN from the FBI's Automated Case Support System (ACS), which is the FBI's computerized databases of investigative indices and files; FBI investigative serials; records receipts, .papers or documents reflecting financial accounts, where ROBERT PHILIP HANSSEN received payments from the KGB, SVR, or other agents of the Soviet Union or successor Russian Federation, records or documents reflecting the source and disposition of national defense and classified intelligence and counterintelligence information; 3) Large amounts of United States and foreign currency, financial instruments, precious metals, jewelry, and other items of value, which are the proceeds of or assets derived from illegal espionage transactions; any financial records of foreign and domestic bank accounts, including canceled checks, monthly statements, deposit slips, withdrawal slips, wire transfer requests and confirmations, account numbers, addresses, credit cards and credit card statements, financial and investment account records (including dividend records, stock transaction records), all reflecting illicit proceeds or wealth from multiple years of engaging in espionage for pay from the Soviet Union and successor Russian Federation and their intelligence services; records of such financial accounts and records in the possession or control of defendant ROBERT PHILIP HANSSEN but in fictitious or alias names; 4) Passports, visas, calendars, date books, address books, credit card and hotel receipts, airline records, reflecting travel in furtherance of espionage activities, and any documents evidencing large cash expenditures derived from espionage activities; 5) Identity documents, including but not limited to passports, licenses, visas (including those in fictitious or alias identities), U.S. and foreign currency, instructions, maps, photographs, U.S. and foreign bank account access numbers and instructions and other papers and materials relating to emergency contact procedures and escape routes; 6) Safety deposit box records, including signature cards, bills, and payment records, safety deposit box keys, whether in the name of the defendant or a family member; any records pertaining to any commercial storage sites where the defendant may be storing other classified intelligence and counter-intelligence documents or other records of his espionage activities; 7) Federal, state and local tax returns, work sheets, W-2 forms, 1099 forms, and any related schedules; 8) Records concerning real property purchases, sales, transfers, both within the United States and any foreign countries, including deeds, deeds of trust, land contracts, settlement statements, and mortgage documents, such records reflecting disposition of proceeds from and assets acquired from money paid to the defendant for his espionage on behalf of the Soviet Union, successor Russian Federation, and their intelligence services; 9) Telephone bills and records, including calling cards and pager records; 10) Photographs, including photographs of co-conspirators; correspondence (including envelopes) to and from ROBERT PHILIP HANSSEN and handlers, contacts and intelligence agents of the Soviet Union and successor Russian Federation; 11) Copies of applications, affidavits, search warrants, and returns filed with the Foreign Intelligence Surveillance Court (FISC), concerning current FBI foreign counterintelligence investigations and notes, reports and records pertaining to such investigations, including FBI requests for FISC authority; 12) Computer hardware, software, and storage media, known to be used by the defendant or to which he had access, including, but not limited to: any personal computer, laptop computer, modem, and server, which have been and are being used to commit the offenses of espionage and conspiracy to commit espionage; records, information and files contained within such computer hardware containing evidence and fruits of defendant's espionage activity between October 1, 1985, and the present, including classified documents, in whatever form and by whatever means they have been created or stored, including but not limited to any electrical, electronic, or magnetic form of storage device; floppy diskettes, hard disks, zip disks, CD-ROMs, optical discs, backup tapes, printer buffers, smart cards, memory calculators, pagers, personal digital assistants such as Palm III devices, removable hard drives, memory cards, zip drives, and any photographic forms of such records including microfilm, digital prints, slides, negatives, microfiche, photocopies, and videotapes, computer terminals and printers used by the defendant in said espionage activity. ATTACHMENT B 9414 Talisman Drive, Vienna, Virginia, is the current residence of defendant ROBERT PHILIP HANSSEN, and his family. This residence is a single family detached house, the closet street intersecting 9414 Talisman Drive is McKinley Street. Talisman Drive ends in a cul de sac. It is further described as a wood multi-story building painted brown. This residence also includes an attached garage. 9414 Talisman Drive includes any appurtenances within the curtilege of this property, and any grounds, yard or woods constituting any part of the land upon which this residence is located. ATTACHMENT C One 1997 Ford Taurus four-door, silver in color, VIN #IFALP52U9VG211742, Virginia license tags ZCW9538, which is owned by, registered to, and used by ROBERT PHILIP HANSSEN. It is anticipated that this vehicle will be located in the Eastern District of Virginia in the vicinity of 9414 Talisman Drive in Vienna, Virginia, or elsewhere in the Eastern District of Virginia. ATTACHMENT D One 1993 Volkswagen van, Vin #WV2KC0706PH080424, Virginia license tags ZCW9537, owned and used by ROBERT PHILIP HANSSEN, and also used by his wife. It is anticipated that this vehicle will be located in the Eastern District of Virginia in the vicinity of 9414 Talisman Drive, Vienna, Virginia. ATTACHMENT E One 1992 Isuzu Trooper, VIN #JACDH58W7N7903937, Virginia license tags YRP3849. This vehicle is owned by, and possibly operated by ROBERT PHILIP HANSSEN. It is anticipated that this vehicle will be located in the Eastern District of Virginia in the vicinity of 9414 Talisman Drive, Vienna, Virginia. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2556 From: Jordan Ulery Date: Thu Feb 22, 2001 11:47pm Subject: Re; 518 #2 Andy's warning is almost too late in the US, and I am afraid that the arrest of Hansen will encourage more restrictions on our open government. One of the greatest threats to a democratic society is the action of the government itself to "protect" the state and thus the people therein. A democratic republic like the US can exist only if the people support and participate in the operation of the state. Like the former Speaker said, "all politics is local" and each citizen must be involved in his town, county and state as well as the federal government to make this, or any, society work. A democracy, even a republic, like the US, must remain open. Open meetings, open records and open government. When the records get closed, then the government acts in a painfully secret manner and all sorts of little liberties are taken away, in the name of "security," "protection." anti-terrorism," and the like. Eventually we have no liberty at all. One of the penalties we pay for living in a free society is that breaches occur. It is our duty to prevent the lapses and maintain our own defenses. The Founding Fathers knew this. To often we have heard the quotes of "He who desire security of liberty deserves neither" and "the price of liberty is eternal vigilance." Take those quotes into today's world where you are bodily searched before going to court, before visiting a federal building and now, in many places, before visiting state offices. Yes, security is necessary, but it has to be balanced. President Mgabe is making sure he is secure. Stalin and Hitler both made sure they were secure. The first victim is access to government records. The second is access to government. The final victim to "security" is our very liberty to go and do as we please without undue government interference, i.e., the definition of liberty offered by the Supreme Court. Consider, Washington State attempting to close court records to public inspection. Maryland narrowly averting closure of court records. New Hampshire attempting to set up a "Privacy Tzar" (neat phrase for the Tzar of All the Russias was the head of a totalitarian government) that would evaluate your request for public records to determine if your really needed to view the records the government kept. The FTC making regulations that directly countermand the wording of the Fair Credit Reporting Act and intent of Congress. The FCRA itself which prevents an employer from complying with preexisting harassment, equal opportunity and discrimination laws without enormous effort. When government helps crooks, thieves, and scam artist to hide, there is something very wrong with its operation. Please note that I did not mention the more sensational cases, until the last, which have only lead to even more violence. MHO 2557 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:22am Subject: Hints to alleged spy's identity reportedly in letters Friday, February 23, 2001, 12:00 a.m. Pacific Hints to alleged spy's identity reportedly in letters http://seattletimes.nwsource.com/cgi-bin/WebObjects/SeattleTimes.woa/wa/gotoArticle?zsection_id=268448413&text_only=0&slug=spy23&document_id=134269364 by Karen Gullo The Associated Press WASHINGTON - Veteran FBI figure Robert Philip Hanssen left a trail of clues that led authorities to arrest him and charge him with spying for Moscow, say former co-workers and intelligence experts. Russian documents and letters that Hanssen, a 20-year FBI countintelligence agent accused of passing top-secret information to the Soviets and Russian for 15 years, allegedly sent to his Soviet handlers contained hints of his identity - from his code name "B" (Hanssen went by Bob) to using the name of his hometown Chicago as a signal, these former associates said in interviews. FBI officials would not publicly discuss how they came to pinpoint Hanssen as the agent whose alleged spying activities were detailed in internal Russian documents they obtained. "He increased his chances of getting caught" said Paul Moore, a former FBI counterintelligence analyst who has known Hanssen for 20 years. FBI officials have said that Hanssen's identity was not known to the Soviets. The letters and documents about Hanssen refer to him as "B". But these documents had details about the information that Hanssen was accused of leaking, which the FBI could then use to narrow its search. "They had a lot to work with," said Richard Alu, a retired FBI counterintelligence agent who worked with Hanssen for several years. The FBI said yesterday that tighter controls over top-secret documents, and other improvements recommended after the Aldrich Ames spy case, helped it to apprehend Hanssen. Ames was a longtime CIA officer convicted of spying for the former Soviet Union. Bureau management had been cautioned four years ago by the Justice Department inspector general to enhance training and communications. The FBI was criticized at the time by the Justice Department inspector general for not doing enough to find out how Ames leaked sensitive information to the Soviet Union. Ames pleaded guilty in 1994. FBI spokesman John Collingwood said recommendations made in the inspector general's 1997 report were implemented and had a direct bearing on the arrest of Hanssen. "The post-Ames focus on the possibility of additional compromises led directly to the charges against Hanssen. Substantial resources and expertise are being afforded to this effort," he said. Nevertheless, Hanssen's spying went undetected for 15 years. Moore said Hanssen was never polygraphed, which is done in cases of suspicious behavior. The FBI has declined to comment on whether Hanssen took the test. Not only that, Hanssen was meticulous about checking to see whether the bureau was aware of his activities, FBI officials have said. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2558 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:22am Subject: Ex-FBI aides say accused spy took chances Ex-FBI aides say accused spy took chances http://www.chron.com/cs/CDA/story.hts/nation/831056 Associated Press WASHINGTON -- Veteran FBI figure Robert Philip Hanssen left a trail of clues that led authorities to arrest him and charge him with spying for Moscow, say former co-workers and intelligence experts. Former associates said Russian documents and letters that Hanssen allegedly sent to his Soviet handlers contained hints of his identity -- from his code name "B" (Hanssen went by Bob) to using the name of his hometown Chicago as a signal. FBI officials would not publicly discuss how they came to pinpoint Hanssen as the agent whose alleged spying activities were detailed in internal Russian documents they obtained. But two former FBI counterintelligence agents who worked with Hanssen said his letters and other evidence in the 100-page affidavit provided several clues about what transpired. "He increased his chances of getting caught" said Paul Moore, a former FBI counterintelligence analyst who has known Hanssen for 20 years. Moore said Hanssen was never polygraphed. The FBI has declined to comment on whether Hanssen took the test. Hanssen also was meticulous about checking to see whether the bureau was aware of his activities, FBI officials said. They said Hanssen's identity was not known to the Russians. The letters and documents about Hanssen refer to him as "B." But the files had details about the information that Hanssen was accused of leaking, which the FBI could then use to narrow its search. "They had a lot to work with," said Richard Alu, a retired FBI counterintelligence agent who worked with Hanssen. On Thursday, FBI officials said tighter controls over top-secret files, and other improvements recommended after the Aldrich Ames spy case, helped apprehend Hanssen. The 20-year counterintelligence agent is accused of passing secret information to the former Soviet Union and Russia for 15 years. Four years ago, the Justice Department's inspector general cautioned FBI officials to enhance training and communications. At the time, the inspector general criticized the FBI for not doing enough to find out how Ames leaked sensitive information to the Soviets. Ames pleaded guilty in 1994. FBI spokesman John Collingwood said recommendations made in the inspector general's 1997 report were implemented and had a bearing on Hanssen's arrest. "The IG's recommendations were constructive and incorporated into the FBI's counterespionage program," Collingwood said. "The post-Ames focus on the possibility of additional compromises led directly to the charges against Hanssen. Despite the improvements, Hanssen's alleged espionage went undetected for 15 years. Meanwhile, President Bush said he was "deeply concerned" about the case and said he would wait for an independent review of internal FBI security procedures to be completed before considering whether FBI agents should be given routine polygraph tests. "We ought to be concerned about espionage in America," Bush said at his first news conference since his inauguration. ============================ AT A GLANCE ============================ ROBERT PHILIP HANSSEN http://www.chron.com/cs/CDA/story.hts/nation/831056 AGE-BIRTH DATE -- 56; April 18,1944. EDUCATION -- M.B.A., accounting and information systems, Northwestern University (1971); B.A., chemistry, Knox College, Galesburg, Ill. (1966). Studied dentistry, Northwestern (1966-1968). EXPERIENCE: ï Information Resources Division, FBI headquarters, January 2001-present. ï FBI's senior representative, Office of Foreign Missions, State Department, Washington, February 1995-January 2001. ï National Security Division, FBI headquarters, December 1994-February 1995. ï Temporary assignment, Washington field office, April 1994-December 1994. ï Chief, National Security Threat List Unit, Intelligence Division, FBI headquarters, January 1992-April 1994. ï Soviet Operations Section, Intelligence Division, FBI headquarters, July 1991-January 1992. ï Inspections Staff, FBI headquarters, June 1990-June 1991. ï Supervisory special agent; Soviet Analytical Unit, Intelligence Division, FBI headquarters, August 1987-June 1990. ï Intelligence Division, New York City, September 1985-August 1987. ï Supervisory special agent, Intelligence Division, FBI headquarters, January 1981-September 1985; ï Criminal and intelligence divisions, New York City, August 1978-January 1981; ï Joins FBI, assigned to offices in Indianapolis and Gary, Ind., January 1976-August 1978. FAMILY -- Wife, Bernadette; six children. Source: Associated Press -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2559 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:24am Subject: It's a mole game to catch a spy Friday February 23, 10:21 PM It's a mole game to catch a spy http://uk.news.yahoo.com/010223/80/b6g1y.html By Tabassum Zakaria WASHINGTON (Reuters) - It's a mole game -- Russians get secrets from an American spy who apparently gets caught because of documents United States obtained from inside Russian intelligence -- and around and around it goes. The case of Robert Hanssen, a 25-year veteran of the FBI accused of selling secrets to Russia for money and diamonds over 15 years, illustrates the circle of treachery that has been played out through the ages. Hanssen was arrested on Sunday on charges of selling secrets to Moscow, including names of Soviets who spied for the United States. His downfall came from original documents and letters of communication between an American code-named "B" and "Ramon" and Russian handlers, which were obtained by U.S. authorities. U.S. officials have been extremely tight-lipped about how they obtained those letters, which look almost like a case file, but they say those documents point to Hanssen. Intelligence experts say the source is obvious -- a Russian mole handed the letters to the United States. "This was a highly protected source, to penetrate and get hold of the files related to this case was extremely difficult," Oleg Kalugin, a former general in the Soviet spy agency KGB, told Reuters. But he said it was clear the letters came from "a source inside the Russian intelligence service, that's too obvious." Kalugin, who left the KGB in 1990 and moved to the United States in 1995, said the documents about the American spy could have been handed over by a Russian defector. The Russians probably know who the mole is, he said. "With the very narrow circle of people who had access to the Hanssen files, maybe it would be not that difficult to find him," he added. Each side probably patted themselves on the back at various points in this case -- the Russians at finding out they allegedly penetrated the FBI and the Americans for apparently catching the spy, Kalugin said. "The FBI was always considered the toughest target to penetrate," he said. "The easiest was the Defense Department." "This is why the penetration of this calibre is really a spectacular feat for the Soviet, Russian intelligence," Kalugin said. "On the other hand the fact that he was exposed ... is another spectacular feat for the FBI, CIA." "THERE WILL ALWAYS BE MOLES" Former CIA Director Robert Gates said moles were always going to be a fact of life in governments. "There will always be a tiny number who betray the trust," he said in an opinion piece in The New York Times on Friday. "There will always be moles because governments will always want to know what other governments are up to," he wrote. U.S. investigators had been on a mole hunt for a second spy who was leaking secrets to Moscow after catching Aldrich Ames in 1994. Ames, a CIA officer, was later convicted of spying for the Soviet Union until its 1991 demise and then for Russia. The hunt for the second spy went on for years because investigators were convinced that Ames could not account for all the information Moscow appeared to have received. "When we were looking for Ames, we didn't know we were looking for two people," said Paul Redmond, a former CIA official who led the hunt that caught Ames. Redmond, who left CIA in 1997, had headed the spy agency's Counterintelligence Centre established in April 1988. Redmond said some of the signs pointing to a mole were when someone had too much money, was an outcast, hated the boss, had marital troubles, drank excessively, was narcissistic, gambled, and was very curious about others' classified work. Kalugin said Hanssen's characteristics were those of a "nearly perfect spy" who would go undetected. "With his devout Catholicism, with a large family, with the modest ways of life, with no money spent in a visible way, and keeping a low profile," Kalugin said. Federal law enforcement officials said Hanssen was never given a polygraph, but neither were most agents who started when he did. Since the mid-1990s, all prospective FBI employees and agents working on sensitive cases are given a polygraph. An investigation by former CIA and FBI Director William Webster into the security breach will look at whether a more rigorous polygraph policy at the FBI is necessary. At the CIA all new employees are given polygraphs before they are hired, most are again tested after about three years, and again after about a five-year interval, CIA spokesman Bill Harlow said. There are also random polygraphs. "It's a useful tool, it's not a perfect tool, it has a deterrent effect," he said. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2560 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:25am Subject: For Hanssen, tips that helped Clinton come in from the cold For Hanssen, tips that helped Clinton come in from the cold http://cgi.usatoday.com/usatonline/20010223/3091123s.htm By Walter Shapiro The fine print first: This column does not condone spying for a foreign power. This column does not intend to suggest that Bill Clinton or anyone who ever worked for him condones such espionage. This column recognizes that the charges against Robert Philip Hanssen have not been proven in a court of law. This column uses only natural ingredients, though political coloring has been added. And everything you're about to read has been certified as 100% imaginary. To: Robert Philip Hanssen From: A friend, aka Ramon2 Subject: Your public relations problems For eight years, I served in the upper reaches of the Clinton White House, helping the president and first lady escape scrapes that make your legal predicament seem like kiddie-league soccer. Although I am no longer in a position to help you arrange a presidential pardon, I can offer you some time-tested PR tricks that will transform your image from front-page felon facing the death penalty to the sympathetic victim of a witch hunt. You surely can understand why I prefer to keep my identity secret. I am sending you this get-acquainted memo as a public good-will offering. If you find my advice as useful as President Clinton did, we can make payment arrangements later. I understand you prefer used $100 bills in black garbage bags. Your attorney, Plato Cacheris, is a renowned Washington lawyer, but he is woefully behind the times when it comes to spin. I heard him say on ABC, ''It's a serious matter. An FBI agent was charged with espionage, and we'll have to see -- we'll have to see what the quality of the case is.'' Do you really believe that if President Clinton had mounted such a lame ''we'll have to see'' defense, he would have survived impeachment? Now, for the patented escape tricks that saved a presidency: * The war room. Get a half-dozen friends (former FBI colleagues would be ideal) to hit TV the way Russian troops hit Chechnya. Armed with daily talking points, they'll mount a defense on shows from Today to Nightline. * The money trap. Did you notice what the Clintons did when confronted with reports that Hillary's brother, Hugh Rodham, had received $400,000 to help arrange two pardons? They made him give the money back. No money, no quid pro quo. If you eliminate greed as a motive, any conduct can be made to appear defensible. Let's assume you still have most of the $600,000 in cash and diamonds that your Russian paymasters allegedly gave you. Immediately FedEx the loot to Vladimir Putin with an apologetic note saying that you just discovered it while renovating an upstairs bathroom. * The conspiracy. You need one to properly cast yourself as a victim. The details can be as vague as Hillary's ''vast right-wing conspiracy.'' So whose shadowy hand has been orchestrating these diabolical charges? A pulp novelist like Robert Ludlum might concoct a band of rogue FBI agents determined to bring back the Cold War. But a more up-to-date ploy is to have your TV spokesmen suggest that a cabal of militarists in Beijing is out to torpedo your selfless efforts to bring about true rapprochement between Russia and America. * Everybody does it. This has been the trademark Clinton defense. You instinctively grasped its possibilities by expressing in your Moscow missives your boyhood admiration for legendary British double agent Kim Philby. Have your spin team wax patriotic by reminding viewers that spying is part of the great American free-enterprise tradition dating back to Benedict Arnold. * Make the scandal bipartisan. If the prosecutors are to be believed, you were politically even-handed in your espionage efforts, spying under Republican and Democratic presidents. Congratulations on your cleverness. This means that both parties are likely to tread carefully for fear of being blamed for not uncovering your double-agent artistry. * Name-drop shamelessly. Who had just become the Russian leader in 1985, when you first donated your services to the cause of world peace? Nobel Prize winner Mikhail Gorbachev, who deserves major credit for ending the Cold War. So make sure that your defense team mentions Gorbachev and Ronald Reagan (you've got to get the conservatives on your side) in every interview. But we still have the pesky problem of why you reportedly halted your creative efforts for a few years, only to resume them in 1999. What was your motivation? Just say that you were inspired by watching the backhand -- and, let's face it, short skirts -- of Russian tennis phenom Anna Kournikova. A long shot: Have you, like Marc Rich, ever done anything for Israel? Finally, a word to the wise: Negative terminology like ''spying'' and ''treason'' can be as fatal (and I don't use that word lightly) as ascribing the wrong meaning to the verb ''is.'' Use softer, more caring language to describe your activities. Phrases like ''creating a level playing field'' and ''information sharing'' scored particularly well with focus groups. That's it for now. Got to run. Saddam Hussein's people are on the other line. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2561 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:27am Subject: Spy in FBI rightly alarms officials Spy in FBI rightly alarms officials http://cgi.usatoday.com/usatonline/20010223/3091099s.htm The Times-Picayune, New Orleans, in an editorial: ''Tuesday's announcement by FBI officials that one of their own agents had spied for Russia for 15 years is frightening, because (Robert Phillip Hanssen's) alleged crimes have the potential to cause great damage to the United States. . . . To be sure, Hanssen is entitled to fight any charges against him. And as the disastrous investigation into nuclear scientist Wen Ho Lee showed, government agencies sometimes do make accusations that turn out to be false. But officials are correct to be alarmed at Hanssen's arrest and to promise a thorough and complete investigation.'' The Hartford (Conn.) Courant in an editorial: ''No one should be shocked that the United States and other countries engage in spying. They do it in peacetime as well as during wars. Friends spy on friends. Even after the end of the Cold War and the fall of the Soviet Union, Moscow and Washington keep tabs on each other clandestinely. But treason is another matter. . . . If Hanssen is found guilty, he should spend the rest of his life in prison.'' Brian Jenkins, a senior adviser to the president of Rand Corp., in a column for the Los Angeles Times: ''Why do spies spy? Research shows that the motives are mostly personal, tawdry and banal and mainly involve money. What is interesting is how cheaply spies sell themselves. . . . (Hanssen) reportedly received $1.4 million during 15 years. If true, he bargained better than most. . . . Most spies are traitors . . . (but) only a few betray their country. Many betray the companies they work for. Corporate loyalties are thin these days.'' Atlanta Journal and Constitution in an editorial: ''The unveiling of Hanssen's treachery, while disturbing, does not strike the terror it would have had he been caught soon after he embarked upon it in the mid-1980s. Then, the Soviet Union had been dubbed the 'evil empire' by the Star Wars-inspired President Reagan, and the tensions between the two countries were high. Since then, our relations with Russia have improved greatly, but these days again seem shaky. Indeed, this episode shows the urgency, not just of improving FBI security, but also of maintaining a balanced relationship with Russia that keeps the stakes of our inevitable mutual espionage low.'' The Courier-Journal, Louisville, in an editorial: ''There's no reason for Americans to be shocked that Russia still conducts vigorous espionage operations against the U.S. We do the same to Russia. In fact, the damage that Hanssen allegedly did . . . was done mostly to our efforts to penetrate . . . Russian secret services. What is shocking, or at least profoundly disappointing, is that someone in Hanssen's position could be recruited by the Russians and could elude detection for 15 years.'' Daniel Schorr, news analyst, All Things Considered, National Public Radio: ''What strikes me about the Hanssen spy case is the banality and the grandiosity. The banal quality was greed. . . . The spies of the wartime and early Cold War era . . . were moved less by money than ideology, the conviction that communism offered a better way. . . . Then there was the grandiosity, the Walter Mitty quality . . . this quiet, churchgoing, suburban father of six leading the secret life of a master spy that their neighbors would marvel at, had they only known, which, of course, they couldn't because he was so clever. . . . The question is how the intelligence community will recover from this disaster of almost unprecedented proportions . . . (and) tighten security without strangling intelligence.'' Dale McFeatters in a column for Scripps Howard News Service: ''The FBI has asked William Webster, who has headed both the FBI and CIA, to undertake a thorough overhaul of its security procedures. . . . Webster will undoubtedly come up with numerous useful recommendations to repair defects in the FBI's security. Repairing defects in the human heart will be harder.'' What people are saying about an alleged spy for Russians -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2562 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:34am Subject: FBI Is Faulted for Failing to Heed Calls for Frequent Polygraph Tests FBI Is Faulted for Failing to Heed Calls for Frequent Polygraph Tests http://www.iht.com/articles/11533.html David A. Vise and Dan Eggen Washington Post Service WASHINGTON The FBI failed to heed a series of blunt warnings to adopt security measures that might have allowed agents to detect the kind of espionage that Robert Hanssen allegedly conducted for much of the past 15 years, according to government officials. . Congressional panels, interagency task forces and the Justice Department's inspector general repeatedly warned the FBI that it needed to subject agents to more frequent lie detector tests, increase their financial disclosure and impose tighter controls on the dissemination of classified documents. . But many of these proposals were rejected by FBI leaders on the grounds that they could harm the bureau's culture of trust among agents and hamper the recruitment of talented individuals, according to FBI officials and experts on espionage. . As a result, intelligence experts said, the agency responsible for rooting out spies in the U.S. government was unable to uncover a high-level mole in its own midst: Mr. Hanssen himself was not polygraphed as he rose through the ranks during 25 years at the FBI because the FBI's procedures do not require it, officials said Wednesday. . Until recently, the FBI had largely escaped criticism while other federal agencies, particularly the Departments of State and Energy, have come under intense scrutiny from Congress for alleged inattention to security. . Now, the Hanssen case has put the focus on the FBI itself, and the bureau may have to make the kind of changes - such as widespread polygraphing - that have been adopted by the CIA and other agencies, former bureau officials said. . Many of the suggestions for tightening security at the FBI were made after 1994, in the wake of the Aldrich Ames spy case, which prompted the CIA to overhaul its procedures after Mr. Ames, a CIA operative, pleaded guilty to spying for the Soviet Union. . The FBI has "a history of being fiercely resistant to change or to any oversight from outside," a former Justice Department official said. "They always say they're capable of keeping their own house in order. That was obviously not the case here." . Mr. Hanssen, 56, was arrested Sunday night as he attempted to deliver a trash bag full of highly classified documents, officials said. He was charged with spying for Moscow in return for $1.4 million in cash, diamonds and deposits in a Russian bank. . His activities contributed to the execution of two Russian agents who had been working for U.S. intelligence, officials said. . While Mr. Hanssen was so skilled in counterintelligence and other techniques that it may have been virtually impossible to prevent his determined efforts to allegedly sell information to the Russians, officials and experts sifting through the damage are disturbed that it could have gone undetected for so long. . While the FBI's director, Louis Freeh, has said that there are legitimate arguments in favor of polygraphs, he and other bureau officials have specifically opposed the widespread use of lie detector tests because they believe inaccuracies and inconclusive results may create more problems than they solve. . But security experts argue that the mere threat of undergoing lie detector tests has a valuable deterrent effect against spying and that the results can be used as one of many tools in a screening process to prevent betrayal.A former FBI director, William Webster, who will lead an inquiry into the agency's security measures, said in an interview that the spy case "highlights very clearly" the debate over whether the FBI needs to use lie detector tests more aggressively on both a random and routine basis. . Under FBI procedures, polygraphs are conducted on all new agents and other employees. They are also used in certain cases when agents are given access to sensitive information about a secret program or criminal case. . The FBI performs background reinvestigations of all employees every five years, and uses lie detector tests only in those instances when there is an unexplained anomaly. . Internal security experts at the FBI have been unable to suggest how to address the problems with polygraph testing in a way that would not force the bureau to sideline valued supervisors and agents who have polygraph results that cannot be explained. . The CIA, after implementing polygraphs to tighten security, has numerous employees who essentially have been idled because of inconclusive results. . Senator Bob Graham, the Florida Democrat who is a ranking member of the Senate Select Committee on Intelligence, said his panel would hold a hearing next Wednesday in part to probe how the FBI is monitoring the finances, lifestyles and truthfulness of its employees. Routine polygraphs may be necessary, he said, "when you're dealing with this level of sensitiveness." . Mr. Webster's panel will examine whether the FBI's antiquated computer systems and its rules governing access to sensitive information played a direct role in allowing Mr. Hanssen to turn over state secrets. For years, in a bid to deter such behavior, the Russians used a strict document control system that required agents and intelligence officers to identify themselves whenever they accessed top-secret information. . NBC Delayed Broadcasting Spy Report . A senior NBC executive said the television network held the story about Mr. Hannsen's arrest for more than 12 hours at the FBI's request, The Associated Press reported on Wednesday from New York. . The FBI feared that the release of the story would spoil a stakeout Monday aimed at catching the FBI agent's alleged Russian contacts. As it turned out, no one attempted to retrieve a parcel at the stakeout. NBC broke the story Tuesday morning. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2563 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:36am Subject: When No One Watches the Spooks When No One Watches the Spooks http://www.iht.com/articles/11445.html William Safire The New York Times WASHINGTON "Sorry about the handwriting," my linguistic source at the Allenwood Federal Penitentiary in White Deer, Pennsylvania, writes. "The Bureau of Prisons has a dinosaurian paranoia about typewriters, word processors and just about any writing tools beyond pencils and ballpoints, universally called 'ink pins.'" . My correspondent is Aldrich Ames, the American who spent nine years as a mole inside the CIA, paid by the Soviet Union to finger American spies in the Kremlin. His espionage led to the execution of a dozen U.S. sources. Two of those deadly fingerings, we are now told by the FBI, were confirmed by information provided to the KGB by Robert Philip Hanssen, who was arrested this week in what was said to be a secrets-for-cash transaction. . As a high-level FBI counterspy, Mr. Hanssen was privy to identities of some U.S. spies and was in a position to warn a fellow Soviet agent when U.S. counterintelligence was about to close in on him. But apparently someone inside the KGB did to him in the United States what Mr. Ames and he had long done to American agents in Russia - tipped off the other side. The accused turncoat Hanssen is represented by the Washington superlawyer Plato Cacheris, whose other famous clients include Mr. Ames and Monica Lewinsky. (Monica is not a spy.) Through Plato, I wrote to "Rick" Ames in my capacity of language maven, seeking definitions of spookspeak terms. CIA censorship delayed his answer, but the recent arrest of a man suspected to be his fellow mole adds piquancy to his reply. . Mr. Ames claims that his confession was coerced by prosecutors who threatened to jail his wife. "The target often (usually, when the pressure is sufficient) simply tells his interrogators what they want to hear, true or false. And of course, that's what I did - most everything the FBI and CIA wanted to hear from me I told them, a wonderful mixture of fact and mutually agreed-upon fantasy." The convicted spy adds: "A few government officials - no one in the FBI or the DOJ [Department of Justice], I think - knew some of the truth about my relations with the KGB and the SVR [Russian successor to the Soviet KGB], but they've remained silent." I take this as an attempt by Mr. Ames to cast suspicion on former CIA colleagues. . Mr. Hanssen, like Mr. Ames, may cut a deal with prosecutors leery of revealing too many secrets in court. He will presumably offer to detail the extent of damage to U.S. security in return for an escape from the death penalty, which, if guilty of complicity in the killing of U.S. agents, he would richly deserve. . The FBI cannot be pleased that Mr. Hanssen's prosecutor is Randy Bellows, an assistant U.S. attorney in Alexandria, Virginia. His still secret 800-page, four-volume report on the Wen Ho Lee investigation does not absolve the wrongdoer but, I am told, excoriates Reno Justice's obfuscatory procedures and the FBI's botching of the case. . So now it appears that the Russians have had two moles in place since the mid-'80s: Mr. Ames inside the CIA, Mr. Hanssen allegedly inside the FBI. Vladimir Putin can claim a KGB triumph; U.S. counterintelligence failed. . That sardonic laughter you hear from on high is that of the late James Jesus Angleton. America's great counterspy and orchid cultivator of the 1960s and '70s may have tromped on the toes of colleagues with his unrelenting suspicions, but he kept the CIA mole-free. He was driven from office by an intelligence bureaucracy and a miffed media that vilified his vigilance as "sick think." . I had asked my spookspeak source, Rick Ames, about that phrase. "It was used, and stuck," he writes, "as a description of Jim Angleton's 'monster plot,' theories which infected the intelligence community for a number of years. The monster plot was virtually groundless, irrational, and had all the earmarks of paranoid delusion." . The intelligence barn door will now be slammed shut with belated promises of computer surveillance and self-deluding lie detectors. What is needed instead is a touch of well-placed paranoia in the minds of the defenders of national secrets. The real "sick think" is complacency. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2564 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:37am Subject: Analysis: U.S. may seek accused spy's cooperation Analysis: U.S. may seek accused spy's cooperation http://www.vny.com/cf/News/upidetail.cfm?QID=162200 Thursday, 22 February 2001 13:40 (ET) Analysis: U.S. may seek accused spy's cooperation By MICHAEL KIRKLAND, UPI Legal Affairs Correspondent WASHINGTON, Feb. 22 (UPI) -- Accused FBI traitor Robert P. Hanssen may not face the death penalty even if convicted in what officials are calling one of the most damaging spy cases in U.S. history. Like CIA traitor Aldrich Ames, Hanssen had access to some of the most guarded information in the U.S. intelligence community. Also like Ames, U.S. investigators may be far more interested in repairing the damage allegedly caused by Hanssen than in seeking his life. A 32-year veteran of the CIA, Ames was arrested by an FBI team in Northern Virginia in 1994. He was accused of working for Moscow, beginning in 1985. In exchange for money, Ames betrayed vital U.S. assets in Russia. At least 10, possibly as many as 15, Russians working covertly for the United States were executed. Until his arrest in Northern Virginia Monday night, Hanssen, like Ames, worked in counter-intelligence and was tasked with defending the United States from foreign espionage. Like Ames, Hanssen is accused of beginning to work for the Soviets in 1985. The FBI alleges that Hanssen, a 27-year veteran of the bureau, supplied information to the Russians that confirmed Moscow's suspicions of at least three of Ames's victims. Like Ames, Hanssen allegedly operated for years within the shadowy world of clandestine operations, selling out his country in a cynical exchange for money, before he was detected and arrested. Finally, like Ames, Hanssen is represented by one of the best courtroom lawyers in Washington, Plato Cacheris, who helped Ames avoid the death penalty in exchange for a guilty plea and complete cooperation with U.S. investigators. The U.S. intelligence community had good reason to seek Ames's cooperation. Without it, U.S. officials may never have known the extent of the damage he caused. In 1995, the CIA assessed the aftermath of the Ames case. The agency concluded that Ames not only betrayed Russians working for the United States, he revealed information that made this country more vulnerable to Russian espionage operations. The CIA found that of more than 900 human intelligence reports made available to U.S. centers of policy -- including the Oval Office -- from 1985 to 1994, a "disturbingly high percentage" came from agents controlled by the KGB and its successor agency, the SVR. The extent of the damage allegedly caused by Hanssen, if he is indeed proved to be a traitor, is still to be assessed. But former associates who have talked to the media in the wake of Hanssen's arrest have said that his access to secrets was extremely broad. The news reports have not been well-received at the FBI, where Director Louis Freeh has clamped down on contacts with the media. Hanssen is said to have had access to U.S. intelligence secrets across the board, from the CIA and the National Security Agency as well as the FBI. The potential for damage, if Hanssen is proven guilty, is even greater than that posed by Ames's betrayal. The need to identify, contain and repair that damage may lead U.S. prosecutors to offer Hanssen the same deal that was offered Ames -- no death penalty in exchange for life imprisonment and complete honesty about his operations. A decision on whether to seek the death penalty for Hanssen may not come for some time. President George W. Bush still has to name a U.S. attorney for the Eastern District of Virginia, where the former FBI official is being detained and would eventually be tried. The U.S. attorney ultimately must decide whether to seek the death penalty, a decision that by law must be ratified by Attorney General John Ashcroft. -- Copyright 2001 by United Press International. All rights reserved. -- -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2565 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:37am Subject: Analysis: FBI spy was in Pope task force Analysis: FBI spy was in Pope task force http://www.vny.com/cf/News/upidetail.cfm?QID=162346 Thursday, 22 February 2001 20:10 (ET) Analysis: FBI spy was in Pope task force By UWE SIEMON-NETTO, UPI Religion Correspondent WASHINGTON, Feb. 22 (UPI) -- Meet the threefold enigmatic man: FBI agent, alleged Soviet spy, and member of the "pope's taskforce," Opus Dei, a discreet, wealthy, very conservative and extraordinarily powerful Catholic prelature. Was it with ill intent that Robert P. Hanssen had wormed himself into this tightly structured and growing organization, whose Latin name means Work of God? Did he believe in its stated goal to "spread the ideal of holiness in the middle of the world?" Or did he join it as a cover? Was he professionally curious about some of Opus Dei's alleged activities, such as supporting Lech Walesa's Solidarity union in an effort to undermine Poland's communist regime? Because of its circumspect nature and its discipline, Opus Dei's very name evokes wild allegations. At one point the Italian media with its knack for publishing unsubstantiated charges insinuated its complicity in the sudden death of the 33-day Pope John Paul I in 1978. Doubtless, among Opus Dei's 84,000 members worldwide are very powerful personalities. FBI director Louis Freeh, Hanssen's former boss, is understood to be one, as are members of the political and social establishment in many Western countries and Latin America, politicians, professors, journalists, artists and generals. Left-wing and liberal groups tend to loathe it. In an Internet article, Catholics for Choice called Opus Dei "one of the most...reactionary organizations in the Roman Catholic church today." They singled out its opposition to abortion. "Opus Dei works in partnership with the Vatican in international events such as the United Nations conferences on population in Cairo in 1994." On that occasion, the Vatican teamed up with the Muslims to squash a Clinton administration attempt to have a woman's right to an abortion declared a global human right. In truth, though, Opus Dei is the church's only "floating diocese" to which some of the world's most committed Catholics belong -- and even some Protestants, who are not official members. They just work for and pray with the organization's men and women. Opus Dei, which has its spectacularly beautiful headquarters in Rome, is a newcomer to the Vatican's ancient power structure. It was founded in 1928 by Josemaria Escriva, a Spanish priest who later became its first bishop. There is no question that Opus Dei's goals are closely related to those of the Christian renewal ideas Pope John Paul II has been expounding since the very beginning of his pontificate. Its members commit themselves to leading an authentically Christian life in the secular world. "The mission of Opus Dei is to promote among Christians of all social classes a life in the middle of the world consistent with their faith and to contribute to the evangelization of every sphere of society," states the organization's mission description. "In short, it is to spread the message that all the baptized are called to seek holiness and make the Gospel known. This same message was the core of the Second Vatican Council." "In order to achieve this aim, the Prelature provides for the spiritual, educational, and pastoral care of its faithful and offers help to many other persons, each one in his or her own state in life, profession and situation of the world." These goals may not be the preferred flavor of postmodernity, but they are Biblical. In its pronouncements, Opus Dei never ceases to point to the core of the Gospel as the foundation for a Christian life: Scriptural texts stressing Christ's promise to make his followers children of God. The text most frequently quoted by the Prelature reads, "But to all who received Him, who believed in His name, he gave power to become the children of God" (John 1:12). The organization has three kinds of members. There are some 2,000 priests organized in a brotherhood -- the Holy Cross Society. The lay members consist of celibates and non-celibates who join not by giving vows but by signing contracts that can only be broken with the permission of the prelate-general (bishop), to whom all must promise obedience. Opus Dei's regulations are strict. Everybody must report his or her personal and professional activities once a week to a "director." Confessing once a week to a priest belonging to the organization is mandatory. All members attend mass daily. If they are married, they are asked to send their children to Opus Dei schools, which the organization's detractors accuse of being recruitment centers. To become a member, a young woman or man must be at least 18. Opus Dei's determination to have authentic Christians "sanctify the world" and permeate "all activities and temporal realities with the sprit of the Gospel" lies, of course, at the root of its hostile reception from groups with limited interest in holiness. It is in line with the pope's prayers for the world and out of line with deconstructionists trying to keep faith out of the public square. Hence, Opus Dei is a shock force in the front lines of today's culture wars -- and a target of constant attack. How and why did the enigmatic Robert Hanssen place himself squarely in these trenches? This is a fascinating topic to speculate about. But the answer seems very elusive at this point. -- Copyright 2001 by United Press International. All rights reserved. -- -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2566 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:39am Subject: US Department Of State May Declare Some Russian Diplomats "Persona Non Grata" Updated 22.02.2001 at 19:21:16 US Department Of State May Declare Some Russian Diplomats "Persona Non Grata" http://allnews.ru/english/2001/02/22/deportation/ Richard Boucher, an official spokesman for the US Department of State, answering a question of a RIA Novosti correspondent at a press conference in Washington on Wednesday, said some Russian diplomats might be expelled from the USA in connection with Hanssen's case. According to Boucher, the issue might be considered in the near future. Some names of Russian diplomats are mentioned in documents handed over to the court under Hanssen's case. FBI agent Robert Philip Hanssen has been arrested in Washington on suspicion of spying for Russia during the past fifteen years. Hanssen became suspected of spying for Russia after an internal intelligence audit had revealed the presence of a mole in the FBI. Later American intelligence obtained some Russian documents, which confirmed their suspects. Before the arrest Hanssen had been working in FBI headquarters in Washington. His task was performing surveillance on Russian Embassy and Russian government missions in New-York. Russia refrains from making official comments on Hanssen's arrest and his possible relation with Russian intelligence. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2567 From: Steve Whitehead Date: Thu Feb 22, 2001 10:25am Subject: Liberian 'spy' journalists jailed Monrovia, Liberia - Authorities have jailed four journalists with an independent newspaper seen as critical of President Charles Taylor, accusing them of espionage. The men, three top editors and a senior reporter from The News, were arrested late on Wednesday, a few hours after the newspaper published a report saying the government was spending $50 000 on helicopter parts - noting that civil servants had not been paid in more than four months. The News report, quoting what it called "authentic documents", gave few details, though the government has at least three helicopters used for military operations. While the report did not mention military activity, the writ of arrest said "the intent of the paper was to reveal national defence information to foreign powers", and accused the men of espionage. A government statement later linked the report to the stand-off between Liberia and neighbouring Guinea. The two nations have seen their relations disintegrate over the past couple of years and have traded accusations over backing cross-border raids that have turned their frontier area into a combat zone. The Press Union of Liberia, the umbrella organisation for Liberian journalists, issued a statement saying it would be closely watching for the proceedings. The four arrested men are editor-in-chief Abdulai Dukuly, managing editor Joseph Bartuah, news editor Jerome Dalieh and Bobby Tapson, a senior reporter. Their newspaper is seen in government circles as critical of Taylor. Taylor, a powerful warlord in Liberia's 1989-1996 civil war, is highly sensitive to criticism and has long had strained relations with journalists. In August, his government arrested a British television crew and accused its members of spying. The journalists were released after heavy international pressure. - Sapa-AP http://www.news24.co.za/News24/Africa/West_Africa/0,1113,2-11-998_985438,00.html Steve Whitehead Managing Member TSCM Services cc Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) URL http://www.tscm.co.za E-mail sceptre@m... P O Box 16063, Lyttelton, 0140, Centurion, South Africa [Non-text portions of this message have been removed] 2568 From: e cummings Date: Fri Feb 23, 2001 4:55pm Subject: Accused spy Robert Hanssen web page and usenet postings one can view this (now retired) FBI double-agent's website at: http://members.home.net/tim.meehan/ hanssen's usenet postings under can be viewed in google's usenet archives (currently in beta) at http://groups.google.com according to google, hanssen@o... posted to the following groups: comp.sys.laptops comp.sys.palmtops.pilot alt.comp.sys.palmtops.pilot one FBI affidavit alleges he planned to smuggle classified documents out of FBI headquarters in his Palm computing device... -bernieS 2569 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 8:40pm Subject: Contemptuous Philby Laid a Fool's Trail Contemptuous Philby Laid a Fool's Trail http://www.latimes.com/news/comment/20010222/t000015886.html By VERNE W. NEWTON "I decided on this course when I was 14 years old. I'd read Philby's book. Now that is insane, eh!" --Robert Philip Hanssen * * * If you're 14 and you picked Kim Philby for a role model, you lose. But according to information filed by the FBI, that is just what Robert Philip Hanssen, the agent arrested Tuesday, claims he did after reading Philby's "My Silent War." Philby, like Hanssen a highly trusted senior intelligence official, was recruited as a spy by the Soviet Union even before he entered MI6, Britain's CIA. He had climbed to nearly the pinnacle of MI6 before being brought down by the defections to Moscow of Donald MacLean and Guy Burgess, both of whom he knew well at Cambridge University, both of whom worked for the Foreign Office, and both of whom were also Soviet spies. That was in 1951. Philby was forced out of MI6 and lived a shadowy life as a journalist and probably as a retainer to his loyal MI6 friends. But in 1963 the walls were about to close on him, and Philby too escaped to Moscow. His book, written under the supervision of his Soviet paymasters, was largely a work of propaganda in which he glamorized the life of a man whose every waking moment was a lie. He had to manage his lies not only to his professional colleagues but to his friends and his family. Philby insisted he did all this because he was an anti-fascist or because he believed in the redistribution of wealth. But these defenses fall flat. Between the lines, and drawing on his well-documented life, it is clear that ideology had nothing to do with his choice. The question, after all, was never why Philby spied for the Soviets, but why they chose him over the many alienated Cambridge students in the 1930s who were eager to serve their idealized notion of the U.S.S.R., rather than the decadent British society. What Soviet recruiters saw in Philby was not an ideologue, because he wasn't one. Nor was he a passionate advocate for social justice, nor did he recite the Marxist catechism. Rather, they saw a weak man of few convictions who needed to become a robot in a rigid system with none of the responsibilities of a pluralistic society. They also saw in Philby a man who was drawn to conspiratorial relationships. Cambridge University was well-known for its secret societies, and a number of Soviet spies were Apostles, the most elite of the secret societies (almost none came from Oxford, a more open school that thought Cambridge's secret societies were infantile). Philby's hunger for conspiratorial relationships was sated by the Soviet Union, an entity that someone once described as an organized system of paranoia. Betrayal of his friends and colleagues was an opiate. In his book he ridicules those who trusted him for being too stupid and naive to know that he could not be trusted. And his own feelings of inadequacy disappeared beneath the gush of superiority that came from having secrets that even those in his super-secret agency never remotely suspected--that his true loyalty was not to England but to the Soviet dictatorship. There can be no doubt that Philby's book was calculated to appeal to the young Hanssens of the West. In his breezy style he posited the notion that if you believed in world peace and social justice in the 1930s (and beyond), the logical next step was to transfer your loyalty to the U.S.S.R. (no one imagined that one day it would crumble). We have nothing from Hanssen yet. But the FBI claims he wrote the letters and messages they released. The quoted passages certainly contain familiar themes. The anger at his government and his agency as a defense mechanism for justifying his alleged betrayal. The desperate cry of a man who feels he has been abandoned by his Russian spymasters to whom he declared his "insane loyalty." Whoever wrote those messages sounds as if he experienced the bitter lesson of Philby and so many others: The Soviets had only contempt for those who served them as spies. Philby, Burgess and MacLean were all isolated, given no jobs, treated with suspicion. All three died alcoholics. These are the things Philby did not reveal to his admiring 14-year-old reader. - - - Verne W. Newton Is the Author of "The Cambridge Spies: the American Side of the Philby, Burgess, Maclean Story" (Madison Books, 1991) -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2570 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 8:41pm Subject: Hanssen Is Not the Only Oneí Hanssen Is Not the Only Oneí http://www.insightmag.com/archive/200103207.shtml By Paul M. Rodriguez rodriguez@i... The names Robert Philip Hanssen and Aldrich Ames already are notorious. But, according to intelligence sources, the list of traitors in U.S. security agencies is likely to grow. The espionage case involving FBI counterintelligence agent Robert Philip Hanssen is far from over, according to U.S. law-enforcement and intelligence sources who tell Insight the alleged FBI traitor is among four to seven other U.S. agents under scrutiny as possible spies for Russia. ìHeís not the only one. There is at least another significant case in the works,î says a U.S. intelligence source commenting about the ongoing damage assessment concerning Hanssen. It involves not only FBI investigators but agents from the CIA, the National Security Agency (NSA), the State Department, the Defense Intelligence Agency (DIA), the National Security Council (NSC) and more. There has been talk in the years since the arrest of Aldrich Ames in 1994 about a second (or third) mole high in the U.S. government. Ames was a CIA analyst who turned traitor and revealed some of the most sensitive U.S. intelligence secrets to the Russians. He began spying around the same time that Hanssen is alleged to have begun. In the years since Ames was caught, U.S. intelligence agencies have continued to receive information pointing to an ongoing and significant series of security breaches. These activities were of an extremely high level, very sophisticated, and involved a staggering breadth of information touching on many agencies. ìWe had focused on numerous individuals at the CIA and the FBI, as well as targets at the NSA, but never could put the pieces together,î says a retired FBI counterintelligence agent familiar with the multiagency investigations. The Washington Post reported on Feb. 23 that among those suspected of spying for Russia was a senior CIA agent who, despite passing numerous polygraph tests, had been suspended since 1999. Although the suspect was, like Hanssen, involved in counterintelligence operations affecting Russia, a national-security official tells Insight, ìthe details we kept hearing from the field [about espionage] never fully matched up with his access to information.î But, until Hanssenís arrest Feb. 18 outside a park in Northern Virginia, the extraordinary post-Ames leaks of classified information had stymied U.S. intelligence. ìThere were several people we suspected, but never was it Hanssen,î says a colleague who worked closely with the accused FBI traitor. In fact, says the official story, it was only late last fall that Hanssen became a suspect as a result of information obtained by the CIA and developed in cooperation with the FBIís spy catchers. Based on the 100-page affidavit filed by prosecutors with a Virginia district court and unsealed Feb. 20, the pieces then began to fall together. The solved puzzle revealed an astonishing picture of Hanssenís alleged espionage going back at least 15 years and resulting in the deaths of at least two double agents working in Russia for the United States, as well as the imprisonment of a third. ìThere is much more to this than the public yet knows,î says a senior congressional aide briefed on the Hanssen investigation. ìItís more serious than anyone knows.î How serious? ìThatís all I can tell you, but we believe other agencies also have been penetrated,î the aide says. Another highly placed intelligence source tells this magazine: ìHanssen isnít the only one.î Making matters worse, say others, including an FBI official who asked not to be named, is the FBIís failure to employ either routine polygraph tests on its senior agents or automatic alarms on classified computers to identify unusual entries by volume or date. Hanssen routinely checked his own name and address in classified computers to determine whether he was under suspicion. For years rumors have persisted that while Ames was indeed an important Russian spy, he was not always in a position to have had firsthand knowledge of many secrets that Russia was known to have obtained clandestinely from U.S. security agencies. Thatís why when Hanssen came under scrutiny the possibility of his guilt seemed to explain other extraordinary and ongoing losses of secrets. Hanssen had unique access to U.S. spy-craft techniques and secrets, as well as to the status of U.S. counterintelligence and monitoring operations targeting not only the Russians but Washington-based agents of many other countries. Insight was told that this is one reason why even the CIAís counterintelligence departments were kept in the dark during the four- to five-month probe of Hanssen. During that time only a select few knew any details, and even these were quarantined from colleagues. While the full damage assessment will take months (if not years), U.S. spy catchers are continuing to troll for spies, Insight has learned, at the CIA, the FBI and among military personnel assigned to both the NSA and NSC. ìWeíre focusing on several people right now,î confirms a senior intelligence official. ìBut I canít tell you for sure we have all the holes plugged.î -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2571 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 8:46pm Subject: Secret Team Led Search for Mole Moderators Note.... [Sun Tzu said that to be effective spies are always used in groups of at least 3, but that a wise general will employ groups of at least five. That said, where are the other spies???] -jma Secret Team Led Search for Mole http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2001/02/24/MN142463.DTL Joint operation resulted in arrest of FBI agent James Risen, New York Times Saturday, February 24, 2001 Washington -- A secret investigative team established in 1994 to identify the source of a series of damaging intelligence losses played a crucial role in the counterespionage probe that led to Sunday's arrest of an FBI agent, Robert Philip Hanssen, officials said yesterday. The mole-hunting unit -- a joint operation of the FBI and the CIA whose existence has never before been disclosed -- was created because investigators could not explain why intelligence operations against Russia continued to be compromised even after the arrest of Aldrich Ames, a senior CIA covert officer. Shortly after Ames' capture, they concluded that it was unlikely he could have been responsible for all of the intelligence losses of the previous few years. Most damaging of the intelligence breaches was the apparent disclosure to the Russians of an elaborate and costly technical intelligence program monitoring their activities in the United States, officials said. The apparent compromise of that program -- which remains highly classified and which officials refused to describe -- may have cost the United States hundreds of millions of dollars, according to current and former U.S. officials. Other unexplained intelligence problems, including the disclosure to Moscow in 1989 that the FBI was conducting an espionage investigation of State Department official Felix S. Bloch, prompted officials to begin a new search for a spy inside the U.S. government, officials added. Yet some officials said that the driving force behind the creation of the new counterespionage unit was the need to find out what had happened to the costly technical intelligence program. They said they believe Hanssen's arrest may solve that mystery. In addition to the KGB officers working for the FBI that he betrayed, officials charge that the loss of that technical program was the most severe blow he inflicted on U.S. intelligence during his alleged 15-year career as a Russian spy. The special investigative unit, which works within the Counterespionage Group at the CIA's Counterintelligence Center, was created by Paul Redmond, the CIA counterintelligence expert who led the effort to apprehend Ames. The unit was responsible for a series of espionage investigations that subsequently led to the arrests of other significant spies, officials now say. They include both Earl Edwin Pitts, an FBI agent sentenced to 27 years in prison in 1997 for spying for the Soviet Union, and Harold J. Nicholson, a former CIA station chief in Romania who was also sentenced to more than 23 years in prison in 1997 for spying for Moscow. The efforts of the joint mole-hunting operation were finally rewarded late last year, when a Russian source provided what appears to be virtually the entire KGB file on the Hanssen case. The special investigative unit was a successor to an earlier and equally secretive CIA internal investigative team that helped uncover Ames. It is still in existence today, even after Hanssen's arrest, because officials believe it is possible that there are additional foreign agents inside the U.S. government. ©2001 San Francisco Chronicle Page C14 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2572 From: Bullfrog007 Date: Sat Feb 24, 2001 2:24pm Subject: NSA Job Fair February 23, 2001 National Security Agency to host first-ever career fair By George Cahlink gcahlink@g... Seeking a new generation of workers, the National Security Agency will hold its first-ever job fair Saturday at its headquarters in Ft. Meade, Md. "The recruitment event is part of a larger strategy to recruit the diverse, highly skilled work force needed to meet the challenges of the 21st century," said NSA officials in a statement. The agency says it is seeking workers with experience or education in computer science, mathematics, engineering, signal analysis, language, data collection, "cryptanalysis" and intelligence analysis. Other intelligence agencies will also be represented at the career fair. The NSA statement noted that the Defense agency has "a proud history of recruiting and hiring top talent"--including more than 2,000 employees annually throughout the 1980s. But, the agency said, recruiting has become "more difficult" in recent years and old hiring methods must be "transformed" to meet today's needs. Other federal agencies are facing similar problems. A tight labor market and burdensome federal hiring rules have made recruitment a challenge. The General Accounting Office has repeatedly criticized agencies for failing to plan for the future workforce, and has warned that if more aggressive hiring and retention policies are not implemented, there will be a shortage of federal workers over the next decade. The career fair also is the latest attempt to put a public face on an agency that has long had a reputation for secrecy. NSA Director Lt. Gen. Michael Hayden has advocated a more open approach as the key to winning continued support from Congress for modernizing the agency's information systems and convincing the public that NSA doesn't spy on U.S. citizens. 2573 From: Steve Uhrig Date: Sat Feb 24, 2001 9:46pm Subject: Full Coverage Receivers available Hello list, Again I have a few unblocked ICOM receivers in excellent condition available. Have R8500 base receivers and R100 portable/mobile receivers. Many are familiar with the R8500. This is ICOM's newest wideband HF/VHF/UHF receiver, quite common with sweepers or for surveillance listening posts. The problem is getting them with 800 megacycle coverage. All the ones sold commercially are cellular blocked, with no provision for TSCM practitioners to obtain unblocked ones legally. We do not want receivers with holes in the coverage. Here are some that don't have the holes. These are full coverage receivers originally restricted to and purchased by the government, generally used for one weekend in a surveillance, then traded in. Basic specs are 100kc to 2 gigs, AM, Wide FM, Narrow FM, CW, SSB. This is a triple conversion tabletop receiver powered by 12VDC or 110VAC with included power supply. Can be used portable or mobile or fixed station. Go here for full specs and a photo: http://www.icomamerica.com/receivers/tabletop/icr8500.html This receiver is the best one ICOM has released to date, significantly better than the R9000, and a later model in the series of R7000/R7100. Remember this is a full coverage receiver, and covers from 100kc (0.1 megacycles) to 2 gigs (2000 megacycles). You do not need an additional receiver to cover the HF portion of the spectrum. When not sweeping, you will use this as a lab receiver on your test bench. There is an RS232 input port as part of this receiver, so you do not need the expensive external level converter to computer control it. There are a number of third party software packages available to remotely operate the receiver. Rather than one of the computer-controlled black box receivers, the R8500 can be computer controlled as well as it has a full featured front panel for standalone use. There may be times when you do not want to drag a laptop around just to run your receiver. There also is an IF and discriminator output on the rear panel for accessories. One of the standard internal features will scan and store any signals found in a special memory bank for later review. ICOM just raised the price on these substantially, and that higher price will soon be reflected on dealers' pricing. Even then, you can't buy them full coverage without a government sponsor willing to give you a blessing. I only have a few of these, so don't wait if you need a portable, decent full coverage receiver. Practically every time I list these, every one I have sells within a few days and I have to refuse orders from people who come too late. A wideband receiver is one of the first items in a professional sweep kit. When the other equipment sniffs a potentially hostile transmitter, you then tune this to the frequency and disassemble the signal manually. Price is $2000 shipped in the U.S. This is less than current retail for a blocked receiver and less than unblocked receivers imported from Canada or England, with no chance of these being seized at the border. I also have the accessory TV-R7100 AM video demodulator to fit the R8500 receiver. This will let you demodulate and display on an external video monitor any AM video signals you may pick up, whether broadcast, amateur or surveillance. These are extremely scarce. Price is $400 with purchase of a receiver only. And I have one speech synthesizer board available which will read the receiver frequency out in voice when it stops somewhere while scanning. This is convenient if you are running an unattended tape, so you know what it is that caused the receiver to stop scanning. I take credit cards for payment. The R100 is a little brother to the R8500 receivers. The performance is basically the same as far as frequency coverage and modes, but the R100 does not have all the "soft" capabilities of the R8500, nor do they have the computer control port or ability to display alpha tags on programmed channels. These are good if you want a full coverage receiver to install in your vehicle or something a bit smaller for a portable sweep kit. These can be analog tuned with a knob and also cover the restricted 800 meg frequencies blocked on consumer receivers. Here are basic specs on the R100 mobile/portable receiver: Frequency Coverage: 100 kHz to 1856 MHz continuous Mode: AM, FM, Wide FM (WFM) Power Supply Requirement: 13.8 V DC +/-15% Current Drain (at 13.8 V DC): Less than 1.1 A The R100 was discontinued some time ago and unfortunately there is no replacement for these friendly and versatile receivers. The supply of these is dwindling, especially in the restricted unblocked (government) versions. Price of R100s is $650. Anyone buying a receiver is eligible to purchase a wideband discone antenna for $75, which is a $50 discount off the normal price of $125. This antenna is ideal for this receiver, and is a good antenna for sweeping. Mount it on a tripod or microphone stand and move the antenna around the area you are sweeping. Antenna can be used for transmit also, from 25-2000 megs. Holler if interested and your receiver can ship immediately. Remember we pay the freight and insurance, which is considerable on equipment of this value. I also will consider trades towards the above, and I purchase surveillance, countersurveillance and communications equipment. Email me with anything you have to sell or trade. More equipment is listed on my webpage: http://www.swssec.com/used.html Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2574 From: James M. Atkinson, Comm-Eng Date: Sun Feb 25, 2001 4:09pm Subject: Spies: Who needs 'em? Spies: Who needs 'em? http://www.worldnetdaily.com/news/article.asp?ARTICLE_ID=21830 © 2001 WorldNetDaily.com Nobody likes to hear about any American knowingly betraying his country, but this week's espionage revelation suggests that some serious rethinking of the proper role of espionage and secrets in a post-cold war United States is in order. Perhaps keeping secrets and running spies is not as all-fired important to this country as it used to be. Perhaps, if our desire is to be a beacon of liberty in the world, it is time to think about putting away such childish things, or at least changing the way we do them. Robert Philip Hanssen, the 27-year FBI veteran who is accused of having spied for the Soviet Union and later for Russia for the past 16 years, is alleged to have given the Soviets and later the post-Soviet Ruskies tons of important information. But has it really damaged the United States all that much -- especially insofar as the real national interest is to be a free country? Will anybody raise the question? Mr. Hanssen, who is reported to have spent most of his career in counterintelligence against the Russians at the FBI headquarters in Washington, was in a position to have given the Russians some of the most sensitive, top-secret data the FBI possessed. FBI director Louis Freeh, while being somewhat circumspect, said of the suspected damage to U.S. intelligence that "We believe it was exceptionally grave." So the Russians, like the Soviets many times before them, seem to have pulled off an extraordinary long-term espionage coup, this time against the FBI. A couple of years ago it was the CIA's turn to be embarrassed at revelations that long-time employee Aldrich Ames had for years spied for the Soviets and then the Russians. As establishment-oriented an analyst as intelligence writer David Wise said on television that Hanssen was the FBI's Aldrich Ames case, a deeply troubling and potentially demoralizing episode. It's embarrassing, but how deeply should ordinary Americans be concerned about Russians spying against the U.S.? Look at the big picture. The Russians may be better at spying, though Cato Institute defense analyst Ivan Eland warned me that that's not necessarily a foregone conclusion. It could be that the U.S. is actually better at catching turned agents and the Russians are an open book to various agents they haven't discovered. The actions of the Clinton administration don't suggest that U.S. officials have had a very good idea of what was really going on in Russia for the past several years, but maybe that can't be blamed on our intelligence services. It wouldn't be amazing if the Clinonistas knew all about the corruption and crony capitalism and kept pumping money in anyway because they didn't know anything else to do and figured sending good U.S. taxpayers' money after bad at least wouldn't do major damage. If it turns out that the Russians really are better at spying -- and given the culture of secrecy and clandestine activity it's certainly not out of the question -- we need to wonder just what this superiority has bought them. Which country has the healthiest economy and the strongest military in the history of the world and which is an economic and political basket case? This will seem like heresy to some, but might it be worthwhile to speculate on the possibility that all those precious secrets allegedly passed on by Mr. Hanssen to the Russians didn't do the Russians much good or the United States much real harm. I would go a little further to raise the possibility that a relatively open society that is not obsessed with secrecy and values the free flow of information is not only more stable than a tyranny, but actually has a long-term strategic advantage over a society whose government is obsessed with secrecy and control. All through the Cold War Americans worried, often enough with justification, that the Soviets were more determined, more ruthless, more persistent and more skilled at various dark political arts than our guys. But the inherent weaknesses of a centrally-planned socialist economy, combined with corruption and loss of belief in the holy communist mission, eventually did the Soviet Union in. Scholars will debate for decades whether it was Reagan's rearmament, the threat of Star Wars, blind luck, miscalculations by Gorbachev or a combination of these and other factors that precipitated the fall of communism as an armed and dangerous force in the world. But those who understand the superiority of a free society and the inherent instability of a command-and-control economy knew the contradictions and inability to calculate when central planners make all important decisions would eventually weaken the socialist system. And it happened, fortunately with very little physical violence. Since then, with corruption, criminality and bumbling, post-Soviet Russia has not made much progress; if anything living standards have declined for the vast majority of Russians who have little aptitude or taste for crony capitalism and gangsterism. The birthrate is down, life expectancy has declined, alcoholism -- if anything -- is up. The leadership might still get things together sufficiently that Russia becomes a real threat to more of its neighbors, but at this point the country is in pitiful shape. So how much good did skill at espionage do the Russians? Without justifying his sleazy actions or misplaced loyalties at all, we have to wonder how much real harm to U.S. citizens Mr. Hanssen was able to do. The Bush administration says it is conducting a thoroughgoing reassessment of military needs and missions in the wake of the Decade of Improvisation. While it's doing so it should take a cold-eyed second look at just how much we need the intelligence apparatus we built during the Cold War and which has been casting about for a mission ever since. If the United States is not all that committed to "humanitarian" and "nation-building" military interventions, just how much information do we need? How much of the information produced by all the paper-shuffling gnomes in Washington needs to be classified? The United States has no natural enemies who pose a real military threat except those our leaders choose to engage -- which is not to say that countries with possible regional ambitions like Russia, China, North Korea, Iran and even Iraq don't warrant continued scrutiny. But do we need to spend $30 billion a year -- that's what the government released as the total intelligence budget a few years ago when it as in a mood of temporary openness -- to run spies and collect electronic intelligence? I have long advocated that the CIA be abolished. No doubt the government will still have a need for reliable information in the world whose post-Cold War shape is still evolving, but the CIA is too institutionalized, too rooted in the Cold War culture, too set in its ways, too bureaucratic to be reformed to become the leaner, cheaper intelligence service that might be warranted. Better to rethink our position in the world and then design an intelligence service from scratch to fit into our vision of our role in the world. Similarly, the espionage functions of the FBI deserve a cold-blooded reassessment. Louis Freeh has been opening up FBI offices all over the world, but the reasons (beyond the empire-building that is the natural inclination of any bureaucracy) are pretty murky. And the Hanssen fiasco, following so closely on the Wen Ho Lee bungle -- not to mention Waco, Ruby Ridge, the Olympic bombing, the crime lab troubles and other scandals involving cover-up and obstruction of justice -- suggest that the once-proud FBI is an agency in need of serious reform. Cutting back its duties to strictly interstate domestic crime -- eliminating dozens of functions it doesn't perform well -- might be a good start. I am really advocating something a little bigger: that we call into question the importance of espionage to the national interests of a free country in which most citizens (at least with the end of the Cold War) value freedom more than global influence. If we want to lead other countries toward freedom more by example than by brute force, we should understand that open access to information and an accountable government are more valuable than a short-term espionage victory that can't even be publicized. The espionage mentality encourages overclassification as a side effect. All kinds of trivial information gets a "Top Secret" label that has more to do with the self-importance of bureaucrats than with any real need. Our government classifies so much information that foreign governments often know more about what our government is up to than American citizens are allowed to know. And this addiction to secrecy impedes the free flow of information and the incentives to innovate that are the real secret weapon of a free society in a dangerous world. Again, I'm the last person to apologize for Mr. Hanssen; though I'll try to maintain the presumption of innocence until I know more, it seems unlikely the FBI would blunder so badly as to so publicly go after the wrong guy. If Mr. Hanssen really spied for the Russians he betrayed the trust of many and should receive severe punishment, of course. But his case, in conjunction with the Aldrich Ames case, other blunders and the changed world we face with the demise of the Soviet Union as an active threat might suggest to some Americans that it's time for a hard-nosed reassessment of the place of secrets and espionage in a country that aspires to the freedom and progress that come from emphasizing the benefits of civil society over a highly politicized superstructure. Freedom, not talent in the dark arts, is our heritage and birthright. And it seems to work better than doing second-rate imitations of relatively closed societies that emphasize secrecy, authority, state power and dirty tricks. ----- Alan Bock is author of "Ambush at Ruby Ridge" and "Waiting to Inhale: The Politics of Medical Marijuana." Senior editorial writer and columnist at the Orange County Register, he is also senior contributing editor at the National Educator and a contributing editor at Liberty magazine. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2575 From: James M. Atkinson, Comm-Eng Date: Sun Feb 25, 2001 4:14pm Subject: The spy and the FBI spin doctor The spy and the FBI spin doctor http://www.theage.com.au/news/2001/02/25/FFX72YC6KJC.html By ROGER FRANKLIN Sunday 25 February 2001 Two men, each representing one of Washington's most venerable dark arts, were drawn together last week in a parallel universe of treachery. They both worked for the FBI. One, perhaps motivated by nothing more noble than greed, had turned spy. The other, prompted by a very pressing need, had turned spin doctor. Robert Philip Hanssen, a member of the FBI's counter-intelligence unit, hit the front pages of almost every paper in America when he was arrested after more than 15 years of allegedly passing some of his country's most sensitive secrets to Moscow. The attention the sting received was carefully orchestrated by FBI director Louis Freeh. He summoned reporters to his agency's Washington headquarters to announce Hanssen's arrest. And for all the sad and straight-faced candor he displayed for the cameras as he detailed the damage Hanssen had done to US security, broadcasting the grim truth was really the last thing on the embattled lawman's agenda. What he needed to do was spin, to whirl the story until the most glaring fact of the case - the FBI's incredible incompetence - became lost in the general blur of minute details. And twirl it he did, burying the press in a deluge of details that teams of America's top investigative reporters were still scrambling to unravel and expand as the week came to an end. Freeh, you see, had both his own future and his agency's soiled reputation to consider - and the one question he couldn't afford to be grilled about was also the most obvious: how could Hanssen, a man who had spent virtually his entire official career hunting Russian spies, have managed to work so long and hard for Moscow without being uncovered? Even Freeh was forced to admit that all the signs were there. All that should have been required to catch this mole was basic, routine diligence. That, and perhaps just a bit less institutional arrogance on the part of an agency that considered itself beyond penetration. Instead, while the man who has been called the biggest traitor since Benedict Arnold accumulated a $A2.7 million fortune in cash and diamonds, the FBI neglected to give him so much as a lie-detector test. Even more striking was the failure to notice that Hanssen was regularly trawling the agency's most sensitive computer database to see if his own name had been added to a list of possible moles. A routine audit of the computer records would have identified the traitor in minutes. What made the case so difficult, Freeh stressed, was that Hanssen was himself a senior counter-intelligence specialist. He knew better than anybody how to cover his tracks. Not even his Russian handlers knew his real name, identity or where he worked within the intelligence community. While the spy catchers remained oblivious to Hanssen's secret life, the children who played with his six kids on a leafy suburban street in Washington knew something was up. Sure, Mr Hanssen went to church with his wife and kids, and barracked for the local Little League side. But when the neighborhood kids visited his home, all were given the same stern warning: don't ever go into that room off the basement. He could be a scary guy when he stared straight into you, one former playmate recalled last week. Jam-packed with banks of sophisticated computer equipment, the dark chamber was where Hanssen transferred sensitive FBI documents to floppy disks that he would later leave at pre-arranged drop points - taped to the girders of bridges, tucked under stones, jammed behind road signs - for his Russian contacts to retrieve. According to Freeh, not even Hanssen's wife suspected him. In return for the information Hanssen provided, Moscow showed its gratitude with packages of $100 notes, sometimes containing as much as $50,000, that were double-wrapped in black plastic garbage bags and accompanied by what were often quite long letters of appreciation and concern. It is obvious from the notes Hanssen penned in return just how the double life was wearing him down - and how, even with the Russians, he could not curb a pathological need to deceive. "I decided on this course when I was 14 years old," he wrote in March last year, adding by way of explanation, "... I'd read Philby's book!" It was a minor but instructive slip: When Hanssen was 14, British traitor and double agent Kim Philby had yet to put pen to paper. So what of the damage Hanssen inflicted on his country? Of that, Freeh had less to say. The arresting officer's affidavit mentions how Hanssen provided the Russians with nuts-and-bolts details of several counter-intelligence programs, including a high-tech operation intended to eavesdrop on Russia's electronic communications. In other letters, he provides the names of potential moles the Russians might consider trying to recruit. One of them, a military officer whom Hanssen calls an old friend, was identified as a ripe prospect because he had been denied promotion and was understandably bitter. Perhaps, Hanssen suggested, that anger could be cultivated until it blossomed into productive treason. If you take Freeh's word for it, Hanssen's greatest gift to the Russians, however, was his role as a source capable of confirming information they were receiving from other double agents. When CIA turncoat Aldrich Ames reported that Moscow was harboring at least three agents who were reporting to the CIA, Moscow would have been loathe to take action on the strength of one unconfirmed tip. But when Hanssen was able to confirm two of the names, the fingered men were arrested, tortured and dispatched with bullets to the head. The third man - the one Hanssen could neither confirm nor deny - was merely arrested and held in prison until Boris Yeltsin ordered his release last year. Hanssen's own fate is likely to echo that of the two spies he helped turn in. His chances of being executed would have to be pretty high given George W. Bush's affection for capital punishment. As for Freeh, his prospects don't look too good either. Republicans hold him in no great affection, claiming he did nothing to further their attempts to investigate White House scandals in the Clinton years. Meanwhile, Democrats' opinion of him is scarcely any better. Clearly, the definition of honor and loyalty in Washington's parallel universe can be a very subjective thing. Just ask Robert Hanssen. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2576 From: James M. Atkinson, Comm-Eng Date: Sun Feb 25, 2001 4:16pm Subject: Tour of spying landmarks offers a timely reminder Sunday, February 25, 2001, 12:00 a.m. Pacific Tour of spying landmarks offers a timely reminder http://seattletimes.nwsource.com/cgi-bin/WebObjects/SeattleTimes.woa/wa/gotoArticle?zsection_id=268448417&text_only=0&slug=spytour25&document_id=134269586 by Vernon Loeb The Washington Post WASHINGTON - Seven blocks on R Street in Georgetown are all that separate the rise and the fall of American intelligence, from the mansion of World War II spy master William "Wild Bill" Donovan to the mailbox where CIA traitor Aldrich Ames left signals in chalk for his Soviet handlers. David Major calls it "Spy Street," and it's one of the attractions on the "SpyDrive," a tour of 30 Washington espionage sites that twists and turns through most of the major spy cases of the past 50 years, with running commentary by Major and his sidekick, Oleg Kalugin. Major spent a career chasing foreign spies for the FBI, ultimately becoming counterintelligence adviser at the Reagan White House. Kalugin was a Soviet spy in Washington - the youngest major general in KGB history. "What we're going to show you is buildings and monuments," Major says. But "you're going to see it through the eyes of a counterintelligence officer and an intelligence collector." The SpyDrive is a commercial spinoff of a tour Major started running several years ago for corporate executives and U.S. government personnel to make the point that the nation's capital has long been a major playground for all manner of foreign spies - and still is. "Since this is the most important city in the world, it is a very, very viable target," says Major, a stout, bearded man in a black leather jacket. "This is not something stuck in the past. It faces every single one of us in the future." What he's trying to tell his busload of spy tourists, many of whom have a certain law-enforcement look, is that a little paranoia isn't necessarily a bad thing, especially if you're an executive steeped in trade secrets or a government official with a security clearance. If you think you're being followed on the streets of Washington, maybe you are. "Russian espionage is now on the rise," says the small, dapper Kalugin, now a permanent resident alien who works as an instructor at Major's training firm in suburban Alexandria, Va., the Centre for Counterintelligence and Security Studies. "The U.S. used to be Enemy No. 1. Now it is Priority No. 1." There is, of course, no more famous monument to espionage in Washington than the old Soviet Embassy on 16th Street, now the Russian ambassador's residence. Kalugin calls it "the hub of intelligence operations in this country." Major points to the front door that three of the most damaging American spies - Ames, Navy warrant officer John Walker and National Security Agency employee Ronald Pelton - walked through to begin their careers in treason. Then he directs attention down an alley north of the embassy at the back door, where the Soviets spirited Walker and Pelton out of the building to avoid detection by an FBI surveillance team. On K Street in Georgetown, famous espionage terrain, the tour passes Chadwick's, the pub where Ames handed over seven pounds of top-secret material to his KGB handler, including the names of 20 CIA assets in the Soviet bloc, 10 of whom were subsequently executed. Then there's Martin's Tavern on Wisconsin Avenue, where Vassar graduate and Soviet courier Elizabeth Bentley operated in the '30s and '40s. Just a block up Wisconsin, there's Au Pied de Cochon, the French bistro where KGB defector Vitaly Yurchenko bolted from his CIA handlers in 1985, walked to the new Soviet Embassy at the top of the hill and un-defected - a route retraced by the SpyDrive bus. There's debate to this day about whether Yurchenko was a legitimate defector or a KGB plant. But Kalugin - who debriefed Yurchenko upon his return to Moscow - says the KGB believed he was a genuine defector who simply grew disenchanted as a ward of the CIA. Kalugin worked for 12 years as a spy in Washington before returning home to run the KGB's foreign counterintelligence program. He was elected to the Russian parliament in 1990 after the fall of the Soviet Union before returning to the United States as part of a joint venture with AT&T. "Now I am back to the old trade that I never thought I would resume again," says Kalugin, who is still a Russian citizen. "But old habits never die." On R Street - "one of the spy streets in Washington," Major says - the bus slows in front of the former home of "Wild Bill" Donovan, director of the Office of Strategic Services, forerunner of the CIA, during World War II. Just up the street is Dumbarton Oaks, the 19th-century mansion and surrounding gardens described on some tours as an important research library in Byzantine and medieval studies. On the SpyDrive, it's the place where Navy analyst and convicted spy Jonathan Pollard met his Israeli handler. Farther down, at 37th and R, is the famous blue mailbox: Ames' "signal site." The CIA malcontent, who started spying in 1985, would mark the box with chalk so the KGB would know to check a prearranged "dead drop" for a new cache of top-secret reports. It's just a plain blue mailbox now. What makes the SpyDrive an intriguing jaunt is its mix of buildings like Alger Hiss' row house at 2905 P St. N.W., and monuments like a spot on Sheridan Circle - "right where that red car is right now," Major says - where a car bomb planted by Gen. Augusto Pinochet's intelligence service in 1976 killed former Chilean diplomat Orlando Letelier and his American colleague Ronni Moffitt. There's Mitchell Park, where fired CIA officer Edward Lee Howard sat for hours in October 1983, pondering whether to betray his country, before walking to the nearby Soviet Trade Mission and formally becoming a spy. And at 2800 Wisconsin Ave. is what Major calls the "Jennifer Miles tryst apartment," named after the South African intelligence officer who spied in Washington for the Cubans in the late 1960s before the FBI caught her and kicked her out of the country. "The Cold War is over," Kalugin says at tour's end. "Some of the old practices of the Cold War are no longer with us. On the other hand, it would be naive to believe that since the collapse of the U.S.S.R., espionage has stopped. In fact, espionage will go on as long as national interest exists." If you go The SpyDrive runs a couple of times a month. For reservations, call 866-SPYDRIVE or go to www.spydrive.com. The tour meets in Washington, D.C., with optional pickup in Virginia; group reservations are available for up to 50 people. Cost is $35 per person. Copyright © 2001 The Seattle Times Company -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2577 From: James M. Atkinson, Comm-Eng Date: Sun Feb 25, 2001 4:17pm Subject: Alleged spy, handlers were on friendly terms, but relationship deteriorated Sunday, February 25, 2001, 12:00 a.m. Pacific Alleged spy, handlers were on friendly terms, but relationship deteriorated http://seattletimes.nwsource.com/cgi-bin/WebObjects/SeattleTimes.woa/wa/gotoArticle?zsection_id=268448413&text_only=0&slug=spy25&document_id=134269808 by Dan Eggen and David A. Vise The Washington Post WASHINGTON - The relationship allegedly lasted for years, through letters written and gifts exchanged, but eventually FBI agent and alleged spy Robert Hanssen and his friends from Moscow drifted apart. Once defined by regular communication, their ties had frayed to nothing. Despite the high-tech surveillance and encryption methods that have blossomed in the intelligence trade, a spy's success still often depends on the psychologically complicated relationship with a foreign patron. That bond is clearly evident in the case of Hanssen, 56, the highly placed FBI counterintelligence expert whose alleged illicit correspondence is part spy tale and part Valentine. The 109-page affidavit against Hanssen filed this week in U.S. District Court, as well as statements by FBI Director Louis Freeh and other U.S. officials, portray a tangled and, at times, almost intimate relationship between Hanssen and his "handlers." What began as an alliance solely on Hanssen's terms became, over time, a murkier compact, a dance between two parties united in suspicion and dependent on trust. There are moments of joy, angry spats, and expressions of deep gratitude. "Thank you for your friendship and help," one Soviet official wrote; "Your `thank you' was deeply appreciated," Hanssen responded. "His handlers were, in many ways, his lifeline and his refuge," said Robert Blitzer, former head of the FBI's counterterrorism division. "He was out there totally, totally alone. He'd already betrayed his country many times, so they had him, and he wanted to be had. ... There's a very close bond that can develop, and it was even more intense in this case." Hanssen was arrested last Sunday and charged with spying for Moscow for much of the past 15 years in return for $1.4 million in cash, diamonds and deposits in a Russian bank. His activities severely harmed U.S. intelligence operations, officials say, and contributed to the execution of two KGB double agents. In the early years of the relationship, which allegedly began in 1985, the flattery and expressions of mutual respect increased. The Moscow agents called him "friend"; he addressed them as "friends." In 1989, a Dec. 25 package included "Christmas greetings from the KGB." Moscow also regularly inquired about Hanssen's family, health and happiness. The Soviets massaged Hanssen's ego in other ways too, trumpeting his importance and the quality of his information. A 1988 drop included a note of thanks from then KGB chairman Vladimir Kryuchkov. "They were very skillful in the way they played him. It is clear he became quite dependent on them," said former FBI deputy director Larry Potts. "It wasn't unintentional that the handlers of this guy treated him by calling him a friend and expressing concern for his family. They were at least trying to make him think there was a personal relationship." For Hanssen, money was clearly one benefit, but his correspondence indicates it was not the only one. He appeared to revel in the attention from Moscow, and seemed thrilled by the high-wire act of being a double agent. Larry Torrence, a former FBI counterintelligence official, believes "it's certainly possible that (Hanssen) felt he was good enough to beat this whole thing. There could be that challenge there ... to win the chess game. But it appears he became a little sloppy near the end." It is possible, of course, that his correspondence was strategic on Hanssen's part, too, differing little from the flattery of the other side. William Webster, the former FBI and CIA director who is heading a panel to investigate the Hanssen affair, said that "what he's telling the handlers may be for particular purposes of his own. "He may not be just venting his soul," Webster said. "He may be very calculating in what he was telling them." If so, Hanssen seemed to do a convincing job. Near the end the frustration exhibited in his writing only increased, as he simultaneously lambasted and pleaded with his handlers. "Perhaps you occasionally give up on me. Giving up on me is a mistake," he allegedly wrote. "I have proven inveterately loyal and willing to take grave risks which even could cause my death. ... I ask you to help me survive." His final request: "Wish me luck." Copyright © 2001 The Seattle Times Company -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2578 From: James M. Atkinson, Comm-Eng Date: Sun Feb 25, 2001 4:17pm Subject: Spy Suspect Seemed Fervent Catholic - Writer Saturday February 24 9:56 PM ET Spy Suspect Seemed Fervent Catholic - Writer http://dailynews.yahoo.com/h/nm/20010224/ts/crime_spying_dc_23.html WASHINGTON (Reuters) - Robert Hanssen, the senior FBI (news - web sites) official accused of selling secrets to Russia for 15 years, appeared to be a fervent Roman Catholic and anti-communist, according to a journalist who befriended him in the 1990s. James Bamford, the author of a best-selling expose of the National Security Agency and a former investigative journalist and producer for ABC News, was struck by Hanssen's ''ostentatiously pious devotion to the Catholic faith'' and his involvement with Opus Dei, a lay organization devoted to promoting the church and proselytizing, Newsweek reported on Saturday. Hanssen seemed ``almost obsessed'' with the church and Opus Dei, Bamford is quoted as saying in an article on the Web site that the magazine shares with MSNBC (http:/www.msnbc.com). The author, who is about to publish a sequel to his book on the NSA, ``The Puzzle Palace,'' told Newsweek that Hanssen regularly wrote anti-communist papers for the FBI that seemed dogmatic and anachronistic, like ``something out of the 1950s.'' Bamford recalled ending his relationship with Hanssen in the late 1990s out of exasperation with his religious and ideological obsessions. Bamford, who Newsweek said had ``apparently'' used Hanssen as a news source, remembered that the FBI man had been particularly interested in an interview he conducted several years ago in Moscow with Viktor Cherkashin, one of the former Soviet Union's legendary spymasters. Hanssen wanted to hear every detail of the interview, Bamford said, which seemed perfectly reasonable at the time since Hanssen was one of the FBI's most senior counterintelligence agents. Although they apparently never met, news reports have suggested that Cherkashin might have been Hanssen's handler in Moscow. While at ABC News, Bamford broke the story of the FBI's ultimately unsuccessful espionage investigation of U.S. diplomat Felix Bloch. The probe fell apart, Newsweek said, because Bloch received a tip from a Soviet mole inside the U.S. government. That mole is now suspected to have been Hanssen, it said. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2579 From: James M. Atkinson, Comm-Eng Date: Sun Feb 25, 2001 4:19pm Subject: The Friends of Robert Philip Hanssen The Friends of Robert Philip Hanssen http://www.msnbc.com/news/535540.asp Investigative journalist James Bamford knew accused spy for several years By Mark Hosenball NEWSWEEK WEB EXCLUSIVE Feb. 24 ≠ Apart from his clandestine relationship with the Soviet KGB, accused FBI mole Robert Philip Hanssen had a curious friend in Washington: investigative author James Bamford. BAMFORD, WHO IS about to publish ìBody of Secrets,î a sequel to ìThe Puzzle Palace,î his best-selling expose about the hyper-secret National Security Agency, told NEWSWEEK he knew Hanssen for several years during the 1990s and was close enough to the disgraced FBI agent that Hanssen attended Bamfordís wedding. In retrospect, Bamford is now looking for hidden meanings in his various contacts with Hanssen. Several years ago, Bamford, then working as a producer for ABC News, went to Moscow to conduct an on-camera interview with one of the former Soviet Unionís most legendary spymasters, Viktor Cherkashin. A colonel in the KGB, the now-defunct Soviet intelligence service, Cherkashin had been the ìhandlerî of the CIAís most damaging known turncoat, Aldrich Ames. Upon his return to Washington, Bamford told some of his friends in the intelligence community, including Hanssen, about his interview with Cherkashin. Hanssen wanted to know every detail of what the ex-Soviet spymaster told the American reporter. He expressed an interest in seeing a raw transcript of the interview. Bamford told Hanssen he could not give him a transcript of the interview but he described to Hanssen much of the detail. Bamford says he thought nothing more about Hanssenís interest in the Cherkashin interview until last week, when he was confronted with the stunning accusation that for the last 15 years, Hanssen had been acting as a Soviet mole inside the FBI. More astonishing still was the revelation that Hanssenís likely spymaster in Moscow, who he never personally met, was one Viktor Cherkashin. A WORRIED MOLE? At the time, it was perfectly logical for Hanssen to be interested in the details of an American interview with one of the Russiansí top spymasters, since Hanssen was one of the FBIís most experienced Soviet counterintelligence analysts. But in reality, Bamford now wonders, was Hanssen worried that Cherkashin had inadvertently, or intentionally, said something to ABC that could have compromised Hanssenís activities as a Russian mole? Bamford says he never noticed anything that would, on the surface, have tipped him off to the fact that Hanssen was living a double life as an FBI Soviet analyst and Russian mole. But in hindsight, Bamford acknowleges that some of Hanssenís behavior over the years seemed strange and conceivably may have reflected the fact that he was leading a secret life. For a start, Bamford says, Hanssen was regularly writing papers for the FBI about the evil machinations of Marxism, unclassified versions of which he occasionally shared with Bamford. Bamford says he found the papers dogmatic and anachronistic, like ìsomething out of the 1950s,î and eventually threw them out. He says that to his recollection, Hanssen continued to write these outdated analyses about the communist menace into the 1990s, well after the Soviet Union and, by extension, the international communist movement that it supported, had fallen apart. Bamford was coy about reflecting on the fact that he apparently was using Hanssen as a news source, which caused some consternation behind the scenes last week at ABC News, whose employ he left several years ago. Bamford says he did not meet Hanssen until long after the FBI gave up its unsuccessful espionage investigation of State Department diplomat Felix Bloch, a story that Bamford broke exclusively for ABC News; the FBI alleges that the investigation fell apart because Bloch got a tip from a Soviet mole inside the U.S. government, now suspected to have been Hanssen. RECRUITING FOR OPUS DEI Bamford says he was also struck by Hanssenís ostentatiously pious devotion to the Catholic faith, and his involvement in the society of lay Catholics called Opus Dei, a worldwide movement devoted to promoting the religion and converting nonbelievers. A nonpracticing Catholic, Bamford says that Hanssen was ìalmost obsessedî with his participation in the church and the Opus Dei movement and tried to get Bamford involved in his religious activities. At one point five or six years ago, Bamford said, Hanssen ìdragged me alongî to an Opus Dei meeting in Washington, D.C., which involved religious rituals and prayers. He said he found the event unremarkable and boring. A couple of years ago, he decided to end the friendship with Hanssen. It was too much of a bother, he said, dealing with Hanssenís obsessions with religion and communism. © 2001 Newsweek, Inc. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2580 From: James M. Atkinson, Comm-Eng Date: Sun Feb 25, 2001 4:26pm Subject: Ex-FBI chief sees need for 'electronic librarian' Ex-FBI chief sees need for 'electronic librarian' http://www.cnn.com/2001/US/02/24/fib.spy.01.reut/index.html February 24, 2001 Web posted at: 10:09 p.m. EST (0309 GMT) WASHINGTON (Reuters) -- The FBI needs an "electronic librarian" to signal if an employee peeks into unauthorized areas after a veteran agent's arrest as an alleged spy for Moscow, former FBI Director William Webster said in a TIME.com interview published Saturday. Webster will lead an inquiry into the FBI's internal security procedures in the wake of Sunday's arrest of 25-year employee Robert Hanssen on charges of selling secrets to Moscow over a 15-year period. "Electronic filings offer a lot more vulnerabilities than was anticipated," Webster said. "Invariably (double agents) are apt to wander into areas where they don't belong," he said. "We may not always recognize them when they belong -- but we can when they don't belong." Hanssen had access to a wide variety of top secret material because of his position as a counterintelligence officer, and he is accused of selling secrets about double agents, U.S. electronic surveillance methods and other sensitive topics. "In the old days," Webster said, "we'd have a librarian who'd report when people asked for files they didn't need to see." "We need to have some kind of electronic librarian. Machines can be taught, and I think we can build in a level of uncertainty that makes people in this game hesitate, and that will cut down on their effectiveness," he said. Webster, who has not begun the inquiry yet, said those ideas were not necessarily going to end up as recommendations, according to TIME.com. He is also expected to look at whether to expand the use of lie detectors, currently used on prospective FBI employees and agents working on the most sensitive cases. At the CIA, all new employees are given polygraph tests before they are hired, and most are tested again after about three years and then after about five years. There are also random tests at the spy agency. Webster, who is also a former CIA director, said on the use of lie detectors, "I don't know how we'll come out, but I expect it'll be somewhere between what FBI has and what CIA has." Copyright 2001 Reuters. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2581 From: James M. Atkinson, Comm-Eng Date: Sun Feb 25, 2001 4:28pm Subject: 'A Question of Why' - Contradictory Portrait Emerges of Spying Suspect 'A Question of Why' - Contradictory Portrait Emerges of Spying Suspect http://www.washingtonpost.com/wp-dyn/articles/A51800-2001Feb24.html FBI agents remove evidence from the Vienna, Va., home of accused spy Robert Philip Hanssen. In the fall of 1985, agents were leaving the FBI's Manhattan office at the rate of seven a month, complaining they couldn't afford to live in New York on a G-man's salary. With beginning agents making less than a city sanitation worker, and salaries no better in New York than in El Paso or Boise, many quit the bureau rather than be sent there. The money squeeze was so bad that Assistant FBI Director Thomas L. Sheer, who headed the Manhattan office, publicly warned that his agents were vulnerable to recruitment by hostile powers. Some joked blackly about spies in their ranks. Into this cauldron of malcontent came a new transfer from FBI headquarters in Washington. Robert Philip Hanssen, a nine-year bureau veteran known for being cerebral and standoffish, was assigned to head a foreign counterintelligence squad, an unglamorous but important job in a city where one-third of the 2,800 Soviet-bloc diplomats were thought to be spies. For the Hanssen family -- Bob, his wife, Bonnie, and their six children, the youngest just an infant -- the new posting meant sacrifice. They sold their four-bedroom, 2 1/2-bath house in Fairfax County for $175,000, then turned around and spent almost as much for a cramped three-bedroom, 1 1/2-bath ranch house in Yorktown Heights, 90 minutes north of New York City. By early 1987, Sheer had quit the FBI, saying flatly that his $72,500 salary left him broke. Hanssen, who was earning about $46,000, would make a different choice. While his motive remains unexplained, within nine days of joining the New York office Hanssen mailed the first of his letters to the KGB, the FBI alleges, offering stolen secret documents in return for $100,000. Today, New York FBI spokesman Joe Valiquette says, "Tom Sheer looks like the smartest man in America." Diverging Impressions Those who thought they knew 56-year-old Robert Hanssen well are shocked and mystified by the 15 years of betrayal and lies laid out in clinical detail in a 109-page federal affidavit last week. To them, his fruitful career as a wily but crass double agent is all but impossible to reconcile with the seemingly pious, Chicago police lieutenant's son who kept a crucifix on the wall behind his office desk. Hanssen, arrested on espionage charges at a drop site in a Fairfax park last Sunday, stands accused of taking more than $600,000 in cash and diamonds from the Russians, with $800,000 more allegedly waiting for him in a Moscow bank. His attorney has said Hanssen will plead not guilty. A complex and often contradictory portrait emerges from the pages of the FBI's charges and interviews with dozens of Hanssen's friends, relatives, colleagues and neighbors. To be sure, the financial pressures he faced with six children in private school were substantial for a man on a government salary. In one of his earliest communications with his KGB handler, the would-be spy asked for payment in diamonds, "as security to my children." He later returned two gems to the Russians, asking for cash instead, according to the FBI. Some who worked with Hanssen through the years cannot believe he is the man who wrote those letters and sold out his country for money. They describe a man who seemed to shun all displays of ostentation. He favored hamburgers for lunch, owned three older vehicles and drove his family to Florida on vacation to visit their grandmother. Hanssen, some suspect, must have been energized by the intellectual rush of outsmarting an opponent -- even if that opponent was his agency and the cause he served for 25 years. "It's not a story about gain. It's a story about game," said David G. Major, a former FBI counterintelligence official who has known Hanssen for more than two decades and was once his boss. The public Hanssen railed in 1950s terms against Marxist-Leninist infiltrators. Raised as a Lutheran, he converted to Catholicism after he married and later became deeply involved with Opus Dei, a conservative Catholic organization. His politics, too, were conservative and family-oriented. He attended antiabortion demonstrations and gun shows, decried communism for being "godless" and referred reverentially to the FBI's first director as "Mr. Hoover." By contrast, the double agent who operated under the code names B, Ramon and Garcia was routinely profane and dismissive of his employer and country. He contemptuously compared the United States to an idiot savant and referred to his KGB handlers as "dear friends" to whom he was "insanely loyal," in letters quoted in the affidavit. His disdain for the FBI only seemed to increase as he continued to elude discovery. Boasting degrees in chemistry and accounting, Hanssen was known within the bureau as an intellectual for his mastery of arcane details. Initially, some acquaintances said he had the nickname of Dr. Death because he dressed as properly and somberly as a mortician. But his good friends say it was because he sometimes was so deadly boring that he could induce sleep in colleagues. He delved into computers in the early 1980s, when everyone else was still using electric typewriters, and taught himself two computer programming languages, C and Pascal. James Bamford, an author of books about intelligence-gathering, met Hanssen through a mutual acquaintance seven or eight years ago. The two became friends -- Hanssen attended Bamford's wedding -- but Bamford said he now believes there was another, darker side to the man. "He had an extremely secret life," Bamford said. "It was almost to the point where he had a split personality right down the middle. It's the most complete alter ego I've ever seen." David Charney, a psychiatrist who has studied spies and was a defense expert in the case of Earl E. Pitts, an FBI agent charged with espionage in 1996, said Hanssen may have privately been frustrated with how his life was turning out. "Everyone is their own worst critic," Charney said. "If they're not satisfied with these ideals, it creates a disease within them." A target is needed to release the frustration, he said, and often it's the workplace. "To anybody in espionage, what's the worst thing you can do to sabotage someone who didn't appreciate you, who didn't promote or support you? Give away their secrets," he said. "But here's the crux: Once you've stepped over the line, there's no turning back. . . . You're trapped. There are no credible exits. So you resign yourself to living this life." James K. Kallstrom, who met often with Hanssen in the 1980s as head of the FBI's special operations division, now wonders whether Hanssen was as smart as he seemed. "He had to know the Russians were keeping a record of every contact they had with him," Kallstrom said. "And it's obvious once the FBI got hold of his [Russian] file, they were able to figure out who he was. The guy may have been smart and cunning, but he was dumb." Midwestern Roots Hanssen was born in April 1944, the only child of a Chicago cop. As a young man, he seemed to be seeking a way out of the blue-collar life represented by his boyhood neighborhood of modest brick and wooden bungalows on the city's western edge. At Taft High School, the 1962 yearbook lists him as an honors student, a member of the Radio Club and a teaching assistant, and bears this notation under his photograph: "Science is the light of life." With a degree in chemistry from Knox College, a private liberal arts campus in downstate Illinois, he next flirted with dentistry but dropped out of Northwestern University's dental school after two years. Paul Moore, a friend and former FBI agent, remembers Hanssen saying he was a good enough dentist, he could look at a decayed tooth and figure out how to approach the problem, "but he didn't want his fingers to be stuck in somebody's wet mouth all day." Instead, he switched to accounting, receiving a master's in business administration in 1971. Hanssen was raised in the Lutheran faith, according to his mother, Vivian, and attended Lutheran churches through college. Soon after his 1968 marriage to Bonnie, who comes from a large Catholic family, he converted "because he wanted to keep his family one religion," Vivian Hanssen said. After Northwestern, he worked briefly as an accountant, then joined the Chicago Police Department in October 1972, three months after his father, Howard, ended his 30-year police career and retired to Florida. Directly out of the police academy, the younger Hanssen was named to a new undercover unit called C-5, so cloaked in secrecy that its 30 or so members had fictional assignments placed in their personnel files. Hanssen was listed with the vice squad but never worked there, nor did he ever walk a beat, said Pat Camden, a department spokesman. C-5's job was to ferret out corrupt police officers, and its members were considered an elite corps. Even in that rarified group, Hanssen stood out, said Ernie Rizzo, a private investigator who knew Hanssen when they attended a secret electronics surveillance school that operated in a Chicago storefront disguised as a television repair shop. "He wasn't flashy. He was just a plain, church-going kind of guy, the kind of guy you get in counterintelligence," Rizzo said. "He was too young in the business then to have a reputation, but you could tell he was really smart." Jack Clarke, a security consultant for C-5, thought Hanssen overqualified to be a police officer: "Finally, one day I took him aside and said, 'Go down to the federal building and put in an application for the FBI. You shouldn't be here.' " Brainy and Philosophical There was a Walter Mitty quality to the beginning of Hanssen's career in the FBI. He joined Jan. 12, 1976, and did stints in Indiana and New York City before being transferred to headquarters in 1981. Much of his early work drew on his accounting background. He tracked white-collar crime. He set up an automated database to monitor foreign officials assigned to the United States. He worked on budget requests to Congress and spent two years in the Soviet analytical unit. If Hanssen stood out, it was as a brainy guy who had little interest in standing around the water cooler talking about the Redskins. "The kind of person who would walk into your office and have a very philosophical discussion about anything from computers and counterintelligence tradecraft to philosophy, ethics and classical music," said Major, who now trains CIA officers in Alexandria. "He was a moral and ethical man," said Major, recalling that Hanssen characterized communism as "godless." "Not that many people talk like that, but he did." Hanssen was comfortable talking about his faith. Moore recalls driving with Hanssen when someone on the radio obliquely referred to morality as an implied social contract. Hanssen reached over, clicked off the station and said: "That's enough of that. The basis of morality is God's love." Bamford, the writer, said Hanssen's professed Christianity and anti-communism defined him. "The two most prominent aspects of his personality were his religiosity and, ironically, his anti-communist passion," he said. " . . . And he was extremely conservative in terms of his political philosophy -- very, very antiabortion, marching in antiabortion rallies, and very pro-gun." An incident with a civilian FBI employee in February 1993 gave some the impression that he had misogynistic tendencies. The employee, Kimberly Lichtenberg, said she enraged Hanssen by walking out of a meeting. He chased her, grabbed her by the arm and swung her around so violently she fell, then started to drag her back into the meeting room, Lichtenberg said. She said that she had bruises on her arm and face and that Hanssen was suspended for five days without pay. A government official confirmed the incident. "He thinks women are beneath him," said Lichtenberg, who filed a lawsuit against Hanssen that was later dismissed when she failed to appear for a court hearing. She said she had never been notified. "How dare I disobey him? That's the worst thing I could've done." No one remembers Hanssen explicitly criticizing the bureau, at least not at the time he is alleged to have started spying. "He seemed to be disappointed in the FBI at the end there," Moore said. "But not before, and certainly not in 1985." To his friends, Hanssen sounded resigned to moving from FBI headquarters back to New York in 1985 as necessary to advance his career. "You have to get your ticket punched, be a squad supervisor," Moore said. "And he had a good post up there, as opposed to being in Queens or someplace. He seemed to be happy about it and reconciled to the idea that it was going to be expensive." Neighbors in New York recall that the Hanssens pinched pennies. "Like any big family, they seemed a little strapped for money," said Mary Barchetto, who lived across from the family on Mead Street in Westchester County. "The mother was handy, though. She made the duvet covers herself from sheets she bought. "Westchester is a tough place to live if you don't have a lot of money." The Hanssens did well on real estate transactions, though. They sold their first Vienna home for $25,000 more than they paid four years earlier; and their Westchester house, which they owned for 20 months, for $47,000 more. A Frugal Lifestyle In the comfortable Vienna neighborhood around Talisman Drive, where the Hanssens settled in 1987 on their return to Washington, Hanssen was thought of as an involved father, a religious man, a well-respected FBI agent -- and arrogant. "This was no Ward Cleaver," said neighbor Francine Bennett, who recalls Bonnie Hanssen remarking how much she missed her larger house on the other side of Vienna and found it tough to squeeze her children into the new one. Robert Hanssen, she said, "was aloof to the point that most of us just stopped trying to interact with him. I've lived across the street from him for over 10 years, and I've never talked to the man. I've repeatedly said 'Good morning,' 'Good evening,' 'How are you?' 'Drop dead,' whatever -- and no reaction." For most of last week, the family's $290,000 split-level house sat empty, surrounded by yellow "Crime Scene" tape. With Hanssen in federal custody and his wife and two teenagers still living at home temporarily ousted, FBI agents scoured the four-bedroom house, picking through his belongings and his past. Friends and neighbors continue to grapple with the jarring possibility that one of the most damaging spies in history lived in their midst. "There's nothing outstanding that would prepare you for something like this," said Mauro Scappa, 23, a technical recruiter in Washington who was close to Hanssen's oldest son in high school. The family lived frugally, neighbors said. The parents attended school functions, shuttled the kids around and participated in church activities. They restricted what TV shows their children watched. Their rectangular dinner table has a chair at each end and a bench on either side for the kids. FBI officials have told reporters that Hanssen used computers in a locked, basement room to record and process his communications with the Russians. Friends and neighbors, however, say the basement computer room they are familiar with was neither locked nor off-limits. "I beat the game Frogger twice on the computer in that room," said neighbor Hadley Greene, 13, a friend of the youngest Hanssen daughter. Robert Hanssen irritated some neighbors by letting his dog, a black Lab mix named Sunday, run unleashed in their yards, prompting at least three visits by county animal control and police officers. Hanssen's unwillingness to control his dog despite repeated warnings antagonized neighbors, said Mike Shotwell, president of the homeowners association. "Most of us knew he was an [FBI] agent," said Shotwell, describing Hanssen as aloof and unfriendly. "That's where we figured the arrogance came from." One after another, the six Hanssen children trooped off to private schools affiliated with Opus Dei: the three daughters to Oakcrest, a girls' school now in McLean; the sons to The Heights, a Potomac school also attended by a son of FBI Director Louis J. Freeh. Tuition at The Heights is currently $10,700 a year, while Oakcrest charges $9,000. One Hanssen son attended the College of William & Mary and is in law school at the University of Notre Dame. Another son is enrolled at the University of Dallas, a small Catholic school. FBI officials place Robert Hanssen's salary at $87,000 to $114,000 a year. Bonnie Hanssen is a part-time teacher at Oakcrest, friends said. "He lived like a guy making his salary who has six kids," Moore said. "I used to kid him, 'They're all insurance policies. They're all going to take care of you when you're old.' " Hanssen's attorneys declined to comment for this article. Bonnie Hanssen, through those attorneys, also declined to comment. One of the couple's grown daughters said the children still love and support their father, but she declined to say more. Hanssen's mother, Vivian, interviewed by telephone from her home in Florida, said: "It's unbelievable to me, and I can't imagine him doing something like that. But I love him just the same." Orthodox Catholics Religion was central to the family's life. Instead of attending Mass near home, the family drove eight miles to a more traditional parish, St. Catherine of Siena, in Great Falls. Both Hanssens belonged to Opus Dei, an international organization of Catholics whose members consider themselves orthodox followers of church doctrine. Members are expected to meditate and attend Mass daily and to regularly confess to a priest. The group, founded by a Spanish priest in 1928, has 84,000 adherents worldwide and has generated controversy over the years. Some Catholics and others contend that it pressures vulnerable people to join, sometimes urging alienation from family and friends who don't strictly share its beliefs. Opus Dei members say the group is about helping people find God in daily life. Members believe that all people are called to sainthood and that they get there by following orthodox rules and rituals. Those who've known the Hanssens through church and school question how Hanssen the Catholic could have been Hanssen the spy, working on behalf of a political system that sought to repress religious expression. "I still think of them as a family with very deep Catholic affections and roots," said Alvaro DeVicente, college counselor at The Heights. "But I'm baffled. If this were a single man who had no family connections and no other passions, I can see it. But how do you go home every night and look at your wife? How do you go to your parish every Sunday?" Church leaders say they certainly didn't see the kind of big money Hanssen is alleged to have taken. His contributions to Opus Dei, according to a national spokesman, totaled $4,000 from 1988 to 1992; and he gave The Heights $200 or $300 annually -- not counting tuition -- from 1988 to 1998. "Everything is alleged," said the Rev. C. John McCloskey, an Opus Dei priest based in Washington. "But obviously if it is true, he couldn't have done anything more against what Opus Dei stands for, or for that matter the church. It's unthinkable." Examining the Pieces In the realm of spydom, double agents intrigue the most. Colleagues and friends alike marvel that, if the allegations are true, Hanssen could have survived so long, never seeming to crack under the strain of living two fundamentally different and compartmentalized lives. They now wonder: What was true and what was the illusion? Was the life they saw a ruse, no more than clever cover? Or was there truth in both? John J. Hamre, a former deputy defense secretary, believes he sees clues in the letters authorities say Hanssen wrote to the KGB. They begin businesslike, Hamre notes, and degenerate into slavish thanks to his handlers for their good wishes and pleas for them to respond. "It sounds like a guy who was living further and further into this deception," he said, "and was starving for the attention he felt he deserved." To Paul Moore, Hanssen's longtime friend, it's a vexing puzzle. "I can't make all the pieces fit together," Moore said. "I still have the question of why." © 2001 The Washington Post Company -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From: A Grudko Date: Sun Feb 22, 2004 1:17am Subject: "Pro Hunter" A friend found a 'Pro Hunter - RF Signal Detector (Made in Taiwan)' keyring 'bug detector' being given away with an electronics magazine. It would be cool Xmas give-away with my co. logo on it but a google search found a gazillion 'Pro Hunters'. Anyone know who makes this little diode-detector? Andy Grudko (British), DPM, Grad IS (South Africa) Consulting Investigator, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , andy@g... Pretoria (+27 12) 244 0255 - 244 0256 (Fax) Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" 8267 From: Michael Puchol Date: Sun Feb 22, 2004 8:09am Subject: Re: Yahoo privacy problems There is one way to protect yourself from HTML email messages, and that is to install a personal firewall (ZoneAlarm is nice-looking, I'd recomment Sygate's Pro version as the most feature-rich), and write a custom rule that forbids Outlook from accessing ANY ports other than 25 and 110 (POP3 and SMTP), thus preventing it from loading all the images that are linked to an external server. This is an example of what the firewall blocked while simply erasing the email messages (short sample, the amount of blocked traffic is huge): Date | Time | Remote host | Remote IP | Remote port | Local IP | Local port | Direction | Action | Program 02/21/2004 20:34:40 e-ticket-ads.com [208.254.20.196] 80 192.168.0.101 1602 Outgoing Blocked C:\Archivos de programa\Outlook Express\msimn.exe 02/22/2004 14:58:16 lanzadera2.ya.com [62.151.2.43] 80 192.168.0.101 3556 Outgoing Blocked C:\Archivos de programa\Outlook Express\msimn.exe 02/22/2004 14:58:19 us.i1.yimg.com [195.53.49.43] 80 192.168.0.101 3559 Outgoing Blocked C:\Archivos de programa\Outlook Express\msimn.exe Remember, as a general rule, you should specifically close down all ports that you don't absolutely need. Also, disabling HTML email is recommended. Best regards, Mike ----- Original Message ----- From: "cismic" To: Sent: Friday, February 20, 2004 8:16 PM Subject: Re: [TSCM-L] Yahoo privacy problems > Hi Steve, > This technology has been around a long time. It used to be called spy-bots. > When you setup a web page most servers will log and acknowledge that you > have visited a web page. ie, *.gif, *.jpg, *.html, *.asp, *.php etc are some > of the common extentions that appear when you visit a web page in that web > servers log. > > So, now, when an email is created that has a link back to some web page via > a graphic in an html email. > http://www.somesite.com/emailopendpixel.gif then that will show up in the > web log that the email was either read or opened. I don't like all the > pretty email anyway. I mean formated html in email can allow virsuses to > enter your system because it is just html like visiting a web page and > scripting can be ran from email. I read all email as text that way the > graphics or "web beacons", won't appear in any log of sites whose email I > decide to read. > > I also completely clear out all cache every day. > > Joseph > > ----- Original Message ----- > From: "Steve Uhrig" > To: > Sent: Friday, February 20, 2004 10:50 AM > Subject: [TSCM-L] Yahoo privacy problems > > > Yahoo is using 'Web Beacons' to track Yahoo Group users around the > net and see what they're doing and where they are going - much like > cookies. > > Yahoo's Privacy Statement has been updated: > > http://privacy.yahoo.com/privacy/us/pixels/details.html > > In the section 'Outside the Yahoo! Network' (3rd bullet down), you'll > see a little 'click here' link that will let you opt-out of their new > method of snooping. I strongly recommend you do this. Once you have > clicked that link, you are opted out. > > Notice the 'Success' message the top the next page after you opt-out. > Be careful because on that page there is a 'Cancel Opt-out' button > that, if clicked, will *undo* the opt-out. Very misleading if you > don't read before clicking (or not clicking) > > This situation affects everyone reading this message. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > 8268 From: A Grudko Date: Mon Feb 23, 2004 3:56am Subject: Re: "Pro Hunter" Well, I found exactly what I was looking for.. Andy Grudko Pretoria, South Africa ----- Original Message ----- > Dear Sir, > > We're Taiwan's TSCM and for TSCM-L Yahoo mailing > message to known your looking for "Pro Hunter" RF > Signal Detector, we would be glad inform you Pro > Hunter information as below: > > Specifications: > Size: (L)79 x (W)28 x (T)15 (mm) > Weight: about 26g (included batteries) > Detecting range: 50MHz-3.0GHz > Power: 6V DC (CR2032 Lithium x 2) > Color: Silver, White > > Features: > -Catching all the peeping camera. > -The smallest detector, yet Sensitive. > -It will not mis-alarm by the nearby base stations. > -Dual strength indication: Sound and LED. > > We also provied and export various RF detector and > cellular jammer, please let us know if your interesting to > purchase, we shall revert to you for further discussion > upon receipt of your information. ---------------------------------------------------------------------------- ---- 8269 From: Date: Mon Feb 23, 2004 9:34am Subject: Re: "Pro Hunter" Your description sounds like what I purchased at Radio Shack for $20 US. Details are here: http://support.radioshack.com/support_radios/doc68/68876.pdf Cory Bys ******************* N O T I C E ******************* The information contained in this e-mail, and in any accompanying documents, may constitute confidential and/or legally privileged information. The information is intended only for use by the designated recipient. If you are not the intended recipient (or responsible for the delivery of the message to the intended recipient), you are hereby notified that any dissemination, distribution, copying, or other use of, or taking of any action in reliance on this e-mail is strictly prohibited. If you have received this e-mail communication in error, please notify the sender immediately and delete the message from your system. *************************************************** 8270 From: Steve Weinert Date: Mon Feb 23, 2004 6:48am Subject: Re: Yahoo privacy problems This is one area where every little bit (or effort) helps. The ZoneAlarm or other Software Firewall log from just a couple hours on-line should be enough of a convincer. The Firewall alone may not be enough. Often an active scan for adware/spyware is needed. A typical machine that has run unprotected will have hundreds of "Pests" show up when scanned by a product like PestPatrol. A mix of hardware & software techniques can help the situation. On a budget constrained search for protection it seems that a simple router (even if it is the only computer hooked to it) with a hardware packet-to-packet firewall, a good software Firewall (I've been installing ZoneAlarm Pro), a scanning program (Zonelabs packages PestPatrol witch is decent) and using your ISP or Server level filters seems to go a long ways towards keeping things tidy. The anti-virus situation seems less clear-cut. With decent upstream protection and discipline as to locally loaded files any of the "name" programs seem to fare well. Using all the tools available seems to the route to go. Simply opt-out settings help, if only in a limited context. What have people found with Mac OS-X & other Linux systems? I wonder if at browser level if these are much different? Steve W > -----Original Message----- > Re: Yahoo privacy problems > From: "Michael Puchol" > ________________________________________________________________________ > > Date: Sun, 22 Feb 2004 15:09:44 +0100 > From: "Michael Puchol" <> > Subject: Re: Yahoo privacy problems > > There is one way to protect yourself from HTML email messages, and that is > to install a personal firewall (ZoneAlarm is nice-looking, I'd recomment > Sygate's Pro version as the most feature-rich), and write a > custom rule that > forbids Outlook from accessing ANY ports other than 25 and 110 (POP3 and > SMTP), thus preventing it from loading all the images that are > linked to an > external server. > > This is an example of what the firewall blocked while simply erasing the > email messages (short sample, the amount of blocked traffic is huge): > > Date | Time | Remote host | Remote IP | Remote port | Local IP | > Local port > | Direction | Action | Program > 02/21/2004 20:34:40 e-ticket-ads.com [208.254.20.196] 80 > 192.168.0.101 1602 > Outgoing Blocked C:\Archivos de programa\Outlook Express\msimn.exe > 02/22/2004 14:58:16 lanzadera2.ya.com [62.151.2.43] 80 192.168.0.101 3556 > Outgoing Blocked C:\Archivos de programa\Outlook Express\msimn.exe > 02/22/2004 14:58:19 us.i1.yimg.com [195.53.49.43] 80 192.168.0.101 3559 > Outgoing Blocked C:\Archivos de programa\Outlook Express\msimn.exe > > Remember, as a general rule, you should specifically close down all ports > that you don't absolutely need. Also, disabling HTML email is recommended. > > Best regards, > > Mike > 8271 From: Steve Uhrig Date: Mon Feb 23, 2004 10:05pm Subject: Spectrum analyzer FS ebay There seems to be a decent SA for sale on ebay. Price at this point is a steal. http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=2598645748 I don't know the seller, she doesn't know me, I don't know the product and suggest anyone interested poll the seller and get an assurance the thing works. And buy insurance through ebay or paypal or whatever if you are the high bidder. Top end is 26 gigs. Other specs are listed and appear respectable. Agilent. Use normal due diligence, but this may be a very good deal. Seller is brand new and may not know about minimums and reserves yet. See her other items FS too. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8272 From: Date: Mon Feb 23, 2004 6:52pm Subject: Government Still Seeking High-Tech Spy Tools Government Still Seeking High-Tech Spy Tools Pentagon's Controversial Terrorism Research Lives On at Other Agencies By MICHAEL J. SNIFFEN, AP WASHINGTON (Feb. 22) - Despite an outcry over privacy implications, the government is pressing ahead with research to create powerful tools to mine millions of public and private records for information about terrorists. Congress eliminated a Pentagon office that had been developing this terrorist-tracking technology because of fears it might ensnare innocent Americans. Still, some projects from retired Adm. John Poindexter's Total Information Awareness effort were transferred to U.S. intelligence offices, congressional, federal and research officials told The Associated Press. In addition, Congress left undisturbed a separate but similar $64 million research program run by a little-known office called the Advanced Research and Development Activity, or ARDA, that has used some of the same researchers as Poindexter's program. ''The whole congressional action looks like a shell game,'' said Steve Aftergood of the Federation of American Scientists, which tracks work by U.S. intelligence agencies. ''There may be enough of a difference for them to claim TIA was terminated while for all practical purposes the identical work is continuing.'' Poindexter aimed to predict terrorist attacks by identifying telltale patterns of activity in arrests, passport applications, visas, work permits, driver's licenses, car rentals and airline ticket buys as well as credit transactions and education, medical and housing records. The research created a political uproar because such reviews of millions of transactions could put innocent Americans under suspicion. One of Poindexter's own researchers, David D. Jensen at the University of Massachusetts, acknowledged that ''high numbers of false positives can result.'' Disturbed by the privacy implications, Congress last fall closed Poindexter's office, part of the Defense Advanced Research Projects Agency, and barred the agency from continuing most of his research. Poindexter quit the government and complained that his work had been misunderstood. The work, however, did not die. In killing Poindexter's office, Congress quietly agreed to continue paying to develop highly specialized software to gather foreign intelligence on terrorists. In a classified section summarized publicly, Congress added money for this software research to the ''National Foreign Intelligence Program,'' without identifying openly which intelligence agency would do the work. It said, for the time being, products of this research could only be used overseas or against non-U.S. citizens in this country, not against Americans on U.S. soil. Congressional officials would not say which Poindexter programs were killed and which were transferred. People with direct knowledge of the contracts told the AP that the surviving programs included some of 18 data-mining projects known in Poindexter's research as Evidence Extraction and Link Discovery. Poindexter's office described that research as ''technology not only for 'connecting the dots' that enable the U.S. to predict and pre-empt attacks but also for deciding which dots to connect.'' It was among the most contentious research programs. Ted Senator, who managed that research for Poindexter, told government contractors that mining data to identify terrorists ''is much harder than simply finding needles in a haystack.'' ''Our task is akin to finding dangerous groups of needles hidden in stacks of needle pieces,'' he said. ''We must track all the needle pieces all of the time.'' Among Senator's 18 projects, the work by researcher Jensen shows how flexible such powerful software can be. Jensen used two online databases, the Physics Preprint Archive and the Internet Movie Database, to develop tools that would identify authoritative physics authors and would predict whether a movie would gross more than $2 million its opening weekend. Jensen said in an interview that Poindexter's staff liked his research because the data involved ''people and organizations and events ... like the data in counterterrorism.'' At the University of Southern California, professor Craig Knoblauch said he developed software that automatically extracted information from travel Web sites and telephone books and tracked changes over time. Privacy advocates feared that if such powerful tools were developed without limits from Congress, government agents could use them on any database. Sen. Ron Wyden, D-Ore., who fought to restrict Poindexter's office, is trying to force the executive branch to tell Congress about all its data-mining projects. He recently pleaded with a Pentagon advisory panel to propose rules on reviewing data that Congress could turn into laws. ARDA, the research and development office, sponsors corporate and university research on information technology for U.S. intelligence agencies. It is developing computer software that can extract information from databases as well as text, voices, other audio, video, graphs, images, maps, equations and chemical formulas. It calls its effort ''Novel Intelligence from Massive Data.'' The office said it has given researchers no government or private data and obeys privacy laws. The project is part of its effort ''to help the nation avoid strategic surprise ... events critical to national security ... such as those of Sept. 11, 2001,'' the office said. Poindexter had envisioned software that could quickly analyze ''multiple petabytes'' of data. The Library of Congress has space for 18 million books, and one petabyte of data would fill it more than 50 times. One petabyte could hold 40 pages of text for each of the world's more than 6.2 billion people. ARDA said its software would have to deal with ''typically a petabyte or more'' of data. It noted that some intelligence data sources ''grow at the rate of four petabytes per month.'' Experts said those probably are files with satellite surveillance images and electronic eavesdropping results. The Poindexter and ARDA projects are vastly more powerful than other data-mining projects such as the Homeland Security Department's CAPPS II program to classify air travelers or the six-state, Matrix anti-crime system financed by the Justice Department. In September 2002, ARDA awarded $64 million in contracts covering 3 1/2 years. The contracts went to more than a dozen companies and university researchers, including at least six who also had worked on Poindexter's program. Congress threw these researchers into turmoil. Doug Lenat, the president of Cycorp Corp. in Austin, Texas, will not discuss his work but said he had an ''enormous seven-figure deficit in our budget'' because Congress shut down Poindexter's office. Like many critics, James Dempsey of the Center for Democracy and Technology sees a role for properly regulated data-mining in evaluating the vast, underanalyzed data the government already collects. Expansions of data mining, however, increase ''the risk of an innocent person being in the wrong place at the wrong time, of having rented the wrong apartment ... or having a name similar to the name of some bad guy,'' he said. 02-22-04 15:31 EST [Non-text portions of this message have been removed] 8273 From: Fernando Martins Date: Tue Feb 24, 2004 6:14am Subject: Re: Re: Yahoo privacy problems > What have people found with Mac OS-X & other Linux systems? I wonder if at > browser level if these are much different? For me MAC is still a mistery (in the practical point of view at least), but since is unix based, can't be so bad as some souls use to say ... actually I wasted some time yesterday reading stuff about latest MAC OS version, last MAC hardware, and some security related applications. It seems that the last OS version have a package of security features and applications that cover most, if not all, of the common security issues for a basic desktop computer. I still search for MAC solutions/applications for (physical) access control solutions (stuff at the same level of quality as GE Interlogix solutions). I only found once a java based software, but I didn't like it (and even forget it's the name or site ....). Regarding video surveillance, yesterday I found something that seems to be nice -http://guide.apple.com/redirect/benbird/securityspy_pdad.html - since it works with some known cctv stuff. I wonder if somebody here tested this? Regarding linux systems, well ... there are still people that think that at this level viruses don't exist and that netscape/mozzilla have no danger ... that I remember, at least since version 7.1 that suse have 'antivir' available in the pro package and in 9.0 still include lynx as default package. Novell think that they are cool, so better read what they say about it, then just my opinion about it ... Just as a side note, and still regarding the Novell/Suse issue, I hope that Microsoft now take some fresh ideas about 'Trees' and 'Active Directories' as they did in Windows 2000 ;> FM 8274 From: Keith Farnham Date: Tue Feb 24, 2004 4:28pm Subject: RE: Government Still Seeking High-Tech Spy Tools I can understand the ongoing quest for superior intelligence gathering. The history of the last three years has certainly shown the need. The methodologies of the past (recruiting nationals) have become less and less reliable; especially in the Middle East. (I'd hate to have been the handler of the "source" that gave the supposed location of Saddam that led to two failed airstrikes.) And there's no question that a computer-based snoop capability of the "carnivore" class would snare a few embezzlers, perverts and such. So what? In the final analysis, it comes down to a human being making an assessment. To borrow some gun advocate logic: Computers don't prosecute people, the judicial system does. I would submit that the human assessment is where the real problem lies. Regardless of the intelligence source, it seems we have great difficulty in this country with our agencies' ability to process information. Maybe we need to fix that problem first? >From: MACCFound@a... >To: TSCM-L@yahoogroups.com >Subject: [TSCM-L] Government Still Seeking High-Tech Spy Tools >Date: Tue, 24 Feb 2004 00:52:47 EST > > >Government Still Seeking High-Tech Spy Tools >Pentagon's Controversial Terrorism Research Lives On at Other Agencies >By MICHAEL J. SNIFFEN, AP > >WASHINGTON (Feb. 22) - Despite an outcry over privacy implications, the >government is pressing ahead with research to create powerful tools to mine >millions of public and private records for information about terrorists. > >Congress eliminated a Pentagon office that had been developing this >terrorist-tracking technology because of fears it might ensnare innocent >Americans. > >Still, some projects from retired Adm. John Poindexter's Total Information >Awareness effort were transferred to U.S. intelligence offices, >congressional, >federal and research officials told The Associated Press. > >In addition, Congress left undisturbed a separate but similar $64 million >research program run by a little-known office called the Advanced Research >and >Development Activity, or ARDA, that has used some of the same researchers >as >Poindexter's program. > >''The whole congressional action looks like a shell game,'' said Steve >Aftergood of the Federation of American Scientists, which tracks work by >U.S. >intelligence agencies. ''There may be enough of a difference for them to >claim TIA >was terminated while for all practical purposes the identical work is >continuing.'' > >Poindexter aimed to predict terrorist attacks by identifying telltale >patterns of activity in arrests, passport applications, visas, work >permits, driver's >licenses, car rentals and airline ticket buys as well as credit >transactions >and education, medical and housing records. > >The research created a political uproar because such reviews of millions of >transactions could put innocent Americans under suspicion. One of >Poindexter's >own researchers, David D. Jensen at the University of Massachusetts, >acknowledged that ''high numbers of false positives can result.'' > >Disturbed by the privacy implications, Congress last fall closed >Poindexter's >office, part of the Defense Advanced Research Projects Agency, and barred >the >agency from continuing most of his research. Poindexter quit the government >and complained that his work had been misunderstood. > >The work, however, did not die. > >In killing Poindexter's office, Congress quietly agreed to continue paying >to >develop highly specialized software to gather foreign intelligence on >terrorists. > >In a classified section summarized publicly, Congress added money for this >software research to the ''National Foreign Intelligence Program,'' without >identifying openly which intelligence agency would do the work. > >It said, for the time being, products of this research could only be used >overseas or against non-U.S. citizens in this country, not against >Americans on >U.S. soil. > >Congressional officials would not say which Poindexter programs were killed >and which were transferred. People with direct knowledge of the contracts >told >the AP that the surviving programs included some of 18 data-mining projects >known in Poindexter's research as Evidence Extraction and Link Discovery. > >Poindexter's office described that research as ''technology not only for >'connecting the dots' that enable the U.S. to predict and pre-empt attacks >but >also for deciding which dots to connect.'' It was among the most >contentious >research programs. > >Ted Senator, who managed that research for Poindexter, told government >contractors that mining data to identify terrorists ''is much harder than >simply >finding needles in a haystack.'' > >''Our task is akin to finding dangerous groups of needles hidden in stacks >of >needle pieces,'' he said. ''We must track all the needle pieces all of the >time.'' > >Among Senator's 18 projects, the work by researcher Jensen shows how >flexible >such powerful software can be. Jensen used two online databases, the >Physics >Preprint Archive and the Internet Movie Database, to develop tools that >would >identify authoritative physics authors and would predict whether a movie >would >gross more than $2 million its opening weekend. > >Jensen said in an interview that Poindexter's staff liked his research >because the data involved ''people and organizations and events ... like >the data in >counterterrorism.'' > >At the University of Southern California, professor Craig Knoblauch said he >developed software that automatically extracted information from travel Web >sites and telephone books and tracked changes over time. > >Privacy advocates feared that if such powerful tools were developed without >limits from Congress, government agents could use them on any database. > >Sen. Ron Wyden, D-Ore., who fought to restrict Poindexter's office, is >trying >to force the executive branch to tell Congress about all its data-mining >projects. He recently pleaded with a Pentagon advisory panel to propose >rules on >reviewing data that Congress could turn into laws. > >ARDA, the research and development office, sponsors corporate and >university >research on information technology for U.S. intelligence agencies. It is >developing computer software that can extract information from databases as >well as >text, voices, other audio, video, graphs, images, maps, equations and >chemical formulas. It calls its effort ''Novel Intelligence from Massive >Data.'' > >The office said it has given researchers no government or private data and >obeys privacy laws. > >The project is part of its effort ''to help the nation avoid strategic >surprise ... events critical to national security ... such as those of >Sept. 11, >2001,'' the office said. > >Poindexter had envisioned software that could quickly analyze ''multiple >petabytes'' of data. The Library of Congress has space for 18 million >books, and >one petabyte of data would fill it more than 50 times. One petabyte could >hold >40 pages of text for each of the world's more than 6.2 billion people. > >ARDA said its software would have to deal with ''typically a petabyte or >more'' of data. It noted that some intelligence data sources ''grow at the >rate of >four petabytes per month.'' Experts said those probably are files with >satellite surveillance images and electronic eavesdropping results. > >The Poindexter and ARDA projects are vastly more powerful than other >data-mining projects such as the Homeland Security Department's CAPPS II >program to >classify air travelers or the six-state, Matrix anti-crime system financed >by >the Justice Department. > >In September 2002, ARDA awarded $64 million in contracts covering 3 1/2 >years. The contracts went to more than a dozen companies and university >researchers, including at least six who also had worked on Poindexter's >program. > >Congress threw these researchers into turmoil. Doug Lenat, the president of >Cycorp Corp. in Austin, Texas, will not discuss his work but said he had an >''enormous seven-figure deficit in our budget'' because Congress shut down >Poindexter's office. > >Like many critics, James Dempsey of the Center for Democracy and Technology >sees a role for properly regulated data-mining in evaluating the vast, >underanalyzed data the government already collects. > >Expansions of data mining, however, increase ''the risk of an innocent >person >being in the wrong place at the wrong time, of having rented the wrong >apartment ... or having a name similar to the name of some bad guy,'' he >said. > >02-22-04 15:31 EST > > > > > > > >[Non-text portions of this message have been removed] > _________________________________________________________________ Stay informed on Election 2004 and the race to Super Tuesday. http://special.msn.com/msn/election2004.armx 8275 From: savanted1 Date: Tue Feb 24, 2004 3:17pm Subject: Australia: Gov't Moves to Make Interceptions Easier Australia: Gov't Moves to Make Interceptions Easier (19 February 2004) Citing recent advances in technology, Attorney-General Philip Ruddock maintains that new legislation is required to ensure that the protections afforded by the Telecommunications (Interception) Amendment Bill 2004 extends to all forms of communication. If passed, the bill would give government spy agencies greater powers to intercept people's e-mail, allow recording of calls to the Australian Security Intelligence Organization (ASIO) public lines, as well as change the definition of interception to ensure that protections given in the bill are able to keep up with technological developments. http://australianit.news.com.au/articles/0,7204,8728745%5E15306%5E% 5Enbv%5E,00.html 8276 From: A Grudko Date: Wed Feb 25, 2004 2:42am Subject: FBI 'DROWNING' IN INFO FROM BUGS, WIRETAPS The Drudge Report VOICES INSIDE THEIR HEADS: FBI 'DROWNING' IN INFO FROM BUGS, WIRETAPS Tue Feb 24 2004 08:48:10 ET Thanks to the bundle of anti-terrorism measures known as the USA Patriot Act, the FBI is conducting a "record amount" of electronic surveillance, including the use of wiretaps and bugs, CONGRESSIONAL QUARTERLY reports on Tuesday. But the bureau can't keep up with all the information pouring in from those and other sources, CQ's Justin Rood reports. "We have a record amount of collection going on," said FBI spokesman Ed Cogswell in a telephone interview. The Justice Department's 2005 budget justification for the bureau backs Cogswell up. "Electronic Surveillance (ELSUR) collection volumes are expected to continue an upward trend for months and years ahead," the justification for the FBI reads. The document says the increases are the result of "statutory easements to Foreign Intelligence Surveillance Act (FISA) authority (USA Patriot Act), a shift of FBI investigative resources to counterterrorism and counterintelligence programs heavily dependant [sic] upon ELSUR collection, and incremental growth in available ELSUR line capacity." Electronic Surveillance - ELSUR - refers to telephone wiretaps, hidden microphones, cameras placed in private areas, and other forms of surreptitious interception of oral, written or electronic communication. The 2001 Patriot Act (PL 107-56) included provisions making it easier for the FBI to obtain permission to spy on individuals as a part of counterterrorism investigations. "All systems are go," said Steven Aftergood, director of the Project on Government Secrecy at the Federation of American Scientists. [Non-text portions of this message have been removed] 8277 From: Ocean Group Date: Wed Feb 25, 2004 7:34am Subject: At least for a laugh... http://www1.iraqwar.ru/iraq-read_article.php?articleId=38169&lang=en 8278 From: waynemacdonald2002 Date: Wed Feb 25, 2004 8:14am Subject: TDR For Saale Near new Risor Bond 2901C Time Domain Reflectometer for sale, new battery a year ago. In excellent shape, hard shell travel case, all leads and operating manual, charger. $450.00 Call 1 902 582-3330 or email waynemacdonald@n... Will ship free anywhere in the USA 8279 From: Steve Uhrig Date: Fri Feb 27, 2004 8:01am Subject: Decent design resource Discover Circuits, a resource for engineers, hobbyists, inventors & consultants, is a collection of 7000+ electronic circuits or schematics cross-referenced into 500+ categories to find quick solutions for electronic design problems. http://www.discovercircuits.com/list.htm If you can't remember the formula for calculating component values for a 555 circuit, for example, you can find it here in a few clicks. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8280 From: martykaiser Date: Fri Feb 27, 2004 9:32am Subject: FBI story Hi Gang I have just updated my FBI story. You can find it at http://www.martykaiser.com/fbi1~1.htm Thanks for reading it. Marty [Non-text portions of this message have been removed] 8281 From: James M. Atkinson Date: Thu Feb 26, 2004 10:53pm Subject: Short Snit Fit Slams Brit Bugs at U.N. http://news.bbc.co.uk/1/hi/uk_politics/3491534.stm Last Updated: Friday, 27 February, 2004, 00:04 GMT Short hits back over UN spy claim http://newsimg.bbc.co.uk/media/images/39863000/jpg/_39863086_short_pa203.jpg Ms Short says she expects there are transcripts of calls to Mr Annan Former cabinet minister Clare Short has denied putting the UK or its security services at risk by claiming UN chief Kofi Annan's phone calls were bugged. After Tony Blair branded the claims "deeply irresponsible" Ms Short hit back by accusing the prime minister of using "pompous" distraction tactics. She told BBC Two's Newsnight there was no national interest that justified spying on the UN secretary general. The UN has said if the claims were true the UK had undermined Mr Annan's work. Chief spokesman Fred Eckhard said any bugging would be illegal and should be stopped. No comment At his monthly news conference, the prime minister insisted the UK security services acted in accordance with domestic and international law and in their country's best interests. Mr Blair did not directly deny the bugging operation took place, but did say: "I'm not going to comment on the work of our security services - do not take that as an indication that the allegations made by Clare Short are true. "I really do regard what Clare Short has said this morning as totally irresponsible, and entirely consistent." Asked whether she should be prosecuted or face Labour Party discipline Mr Blair said he would "have to reflect upon" her comments. In an interview with Newsnight later on Thursday, Ms Short dismissed the prime minister's attack on her as a distraction. "What's he going to say? He either says 'yes, it's true' or he has to say 'no, it's not true', then he would be telling a lie. So he's got to say something else, so he can have a go at me. She said it was "pompous" of Mr Blair to claim she had threatened national security or the security services. "There is no national interest here, there is absolutely no threat to the security services from me making this public," she said. Ms Short says she saw transcripts of Mr Annan's phone conversations. "The UK in this time was also getting spies on Kofi Annan's office and getting reports from him about what was going on." Clare Short http://news.bbc.co.uk/media/audio/39859000/rm/_39859206_spying08_short26_long.ram Listen to the full Today programme interview Asked if it was possible the UN had taped the conversations itself, she replied: "I don't think this matters. Someone is improperly distributing transcripts." She said she had thought for a long time that it was wrong, and had considered telling Mr Annan directly, but believed by bringing it into the public domain it would stop. The former minister also said she had seen no evidence of spying operations against other UN diplomatic missions. Earlier, she had said in an interview with BBC Radio 4's Today programme that the UK, in the run-up to war against Iraq, had been "getting spies on Kofi Annan's office and getting reports from him about what was going on". The British ambassador to the UN phoned Mr Annan about the claims on Thursday. But UN communications director, Edward Mortimer, said he did not think Mr Annan had received assurances the bugging had not happened or would not happen again. 'Dangerous situation' Ms Short's comments came the day after the collapse of the trial of Katharine Gun, a whistle-blower at the government surveillance and communications organisation GCHQ. She had been accused of leaking a secret e-mail from US spies apparently requesting British help in bugging UN delegates ahead of the Iraq invasion. The government says it will review whether changes are needed to the Official Secrets Act in the wake of the case. "I have had conversations with Kofi in the run up to the war thinking 'oh dear, there will be a transcript of this and people will see what he and I are saying." Clare Short Ex-Cabinet minister There has been speculation ministers were worried about the disclosure of secret documents during the trial, particularly the advice from Attorney General Lord Goldsmith about the legality of war. But Lord Goldsmith said told the House of Lords on Wednesday the decision was "on solely legal grounds ... and free from any political interference". However, Mr Blair reflected government concern at the impact on the Official Secrets Act by warning it would be a "very dangerous situation" if people thought they could just "spill out allegations, whether false or true... and get away with it". Conservative leader Michael Howard said the situation was "a complete mess" and urged Mr Blair to "get a grip on it". Liberal Democrat leader Charles Kennedy urged Mr Blair to "come clean", arguing it was not good enough for him to say he could not comment. ============================ Transcript of Clare Short interview http://news.bbc.co.uk/1/hi/uk_politics/3489372.stm Ex-Cabinet minister Clare Short was asked about the decision to drop charges against sacked GCHQ translator Katharine Gun. Mrs Gun admitted leaking a memo apparently requesting UK help in bugging UN officials in the run-up to the Iraq war. What follows is a full transcript of the interview on Radio 4's Today. Presenter John Humphrys asked Ms Short why she thought the prosecution decided it lacked evidence for a prosecution. Clare Short: Well I think this centres on the attorney-general's advice that war was legal under Resolution 1441, which was published as a matter of fact, but was very, very odd. The more I think about it the more fishy I feel it was. It came very, very late. He came to the Cabinet the day Robin Cook resigned and sat in Robin's seat. Two sides of A4, no discussion permitted. We know already that the Foreign Office legal advisers had disagreed and one of them had said there was no authority for war. The Liberals have been pressing for the brief on the basis of which he said there was authority for war. There's a question of whether the exaggeration of the threat and the immediacy of the threat from any possible biological and chemical weapons in Iraq was part of the brief for the attorney-general so that he would give the legal authority. So my own suspicion is that the attorney has stopped this prosecution because part of her defence was to question legality and that would have brought his advice into the public domain again and there was something fishy about the way in which he said war was legal. Q: What this memo showed - the secret memo that Katharine Gunn disclosed - what it showed was pressure by the United States on other countries to get support for a second united resolution and spying indeed on those countries. Do you believe that Britain - that our government - might have been involved in that with the United States? CS: Well there was enormous for [inaudible] a second resolution and then of course it is clear now there was a date for war so they didn't need Blix to do his job and then come to a second resolution if need be. But they were going to war anyway and they were going to bully and pressure countries to vote for it. I mean enormous pressure was brought to bear - Valerie Amos, Lady Amos, went round Africa with people from our intelligence services trying to press them. I had to make sure that we didn't promise a misuse of aid in a way that would be illegal. Q: A view - was it being suggested then? CS: There was worry about her brief and making sure that there was no such suggestion because it would have been a breach of the law... Q: But can I question you on that for a second - did somebody suggest that that might have been the right strategy? CS: We were worried that that was going to be done and went to some trouble to make sure her briefing made it clear that that could not legally be done. I mean the UK in this time was also getting - spying on Kofi Annan's office and getting reports from him about what was going on. The US was pressing Chile, Mexico - enormous pressures were brought to bear. What's remarkable is that these countries didn't break. And if you remember the other part of the context is we were then all deceived about the French position and told the French had said they'd veto any second resolution - which wasn't true, we now know. Chirac said we'd veto now because Blix needs his time but if Blix failed then of course we would vote with others to organise military action. Q: But pressure is one thing - you expect that I suppose, spinning is another thing, you expect that I suppose. Spying is something quite different - spying in the United Nations is something quite different isn't it? CS: Well indeed. But these things are done and in the case of Kofi's office it's been done for some time. Q: Indeed again, let me repeat the question then - do you believe Britain's been involved in it? CS: Well I know - I've seen transcripts of Kofi Annan's conversations. In fact I've had conversations with Kofi in the run up to war, thinking 'oh dear there will be a transcript of this and people will see what he and I are saying'. Q: So in other words, British spies - let's be very clear about this in case I'm misunderstanding you - British spies have been instructed to carry out operations within the United Nations on people like Kofi Annan? CS: Yes absolutely. Q: Did you know about this when you were in government? CS: Absolutely, I read some of the transcripts of the accounts of his conversations. Q: Is this legal? CS: I don't know - I presume so. It's odd but I don't know about the legalities. But the major issue here is the legal authority for war and whether the attorney-general had to be persuaded, at the last minute, against the advice of one of the Foreign Office legal advisers, who then resigned, that he could give authority for war and whether there had to be an exaggeration of the threat of the use of chemical and biological weapons to persuade him that there was legal authority - that's the big question. Q: And what should happen now? CS: I think the good old British democracy should keep scrutinising and pressing to get the truth out. Q: How? There's been a lot of it and a lot of people now are beginning to say and indeed have already said - well look we've heard it all, we've had the war, it's all over, let's put it behind us. Tony Blair certainly wants to put it behind us. CS: Yes but the tragedy is Iraq is a disastrous mess; 10,000 Iraqis have died, American troops are dying, some of our troops have died. The Middle East is more angry than ever. I'm afraid that the sort of deceit on the route to war was linked to the lack of preparation for afterwards and the chaos and suffering that continuous - so it won't go away will it? ============================ Profile of Clare Short http://news.bbc.co.uk/1/hi/uk_politics/3488642.stm By Nick Assinder BBC News Online political correspondent Clare Short has lobbed another grenade into the government with her claim that British spooks routinely bugged UN officials. Ever since she quit the government over the Iraq war, she has maintained her fierce criticism of the prime minister for his role in taking the country into that conflict - even going so far as to demand his resignation. It is not the first time she has turned her anger onto her own party leader. She has resigned from the Labour Party frontbench three times - twice over the Gulf Wars and once over prevention of terrorism laws. And along with former Foreign Secretary Robin Cook, she led the backbench critics of the war. But unlike Mr Cook who quit on the eve of the war, the way she went severely damaged her standing with her previous supporters. Rather than quitting before the war she publicly agonised over the rights and wrongs of the conflict - and only decided to quit her post as International Development Secretary once the main hostilities ended. That bemused many of her traditional allies in the Labour left - and her latest revelation is likely to raise the question of why, if she had been concerned by the intelligence services' behaviour, she did not resign at the time. On the wane Clare Short built her political career on her reputation as a principled straight talker and is a formidable figure in the Commons who can be emotional and occasionally savage. Ms Short's passionate beliefs developed early in her life. She was born and bred in Birmingham, the second of seven children of Irish parents. Her father, a teacher, came from Crossmaglen and she was once strident in her call for British troops to leave Northern Ireland. With a degree in political science, Clare Short had no notion of entering Parliament until she worked as a private secretary to a Conservative Home Office minister, Mark Carlisle, and found many MPs decidedly "unimpressive" at their jobs. She thought "I could do that" and in 1983 became the member for Birmingham, Ladywood. Secret son An early target was The Sun's Page Three girl and similar newspaper photographs. The failure of her bill to ban them was inevitable. After calling for the legalisation of cannabis and suggesting that perhaps people like herself could afford to pay more tax, she strained Tony Blair's patience when she refrained from backing his line in a TV interview about tube strikes. Later she stunned Westminster by introducing her secret son, Toby, to the public, 31 years after she had given him up for adoption. Her recent rebellions include stands over the sale of an expensive military air traffic system to Tanzania and government plans for top-up fees for students. Ms Short was also the first cabinet minister to condemn Labour's acceptance of a donation from soft porn publisher Richard Desmond. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8282 From: James M. Atkinson Date: Thu Feb 26, 2004 11:13pm Subject: Kofi Annan' needs to bring in better TSCM people Sorry Folks, but this foolishness about Kofi Annan's phones and his being bugged by the Brits, is quite amusing. You can't get within 1500 feet of the U.N. Headquarters without picking up on at least a dozen different bugging device in a mater of seconds. -jma http://www.voanews.com/article.cfm?objectID=97BFB4C8-9585-40BF-AFAD641C2B0F5C3F&title=UN%3A%20%20Spying%20on%20Annan%20Would%20Be%20Violation%20of%20International%20Law&catOID=45C9C78C-88AD-11D4-A57200A0CC5EE46C&categoryname=Europe Europe UN: Spying on Annan Would Be Violation of International Law Peter Heinlein United Nations 26 Feb 2004, 23:14 UTC A U.N. spokesman says any bugging of Secretary-General Kofi Annan's phones, if it happened, would be a violation of international law. Spokesman Fred Eckhard says the secretary-general was disappointed to hear allegations that British intelligence had spied on him. "Such activity would undermine the integrity and confidential nature of diplomatic exchanges," he said. "Those who speak to the secretary-general are entitled to assume their exchanges are confidential." Mr. Eckhard's comments came after former British Cabinet member Clare Short said intelligence agents listened in on Secretary-General Annan's phone conversations in the days before the war in Iraq. Ms. Short made the allegation in an interview with the British Broadcasting Corporation. U.N. spokesman Eckhard said, if true, such activities would constitute violations of at least three international conventions, and would compromise the secretary-general's effectiveness as an international diplomat. "We're reaffirming the principle that these premises are inviolable under international law, and we expect all member states to respect their commitments under this legal instrument," he said. Mr. Eckhard emphasized that U.N. security personnel do not know when or if the secretary-general's phone has been bugged. He said efforts to detect spying had been intensified, but would not specify what that might mean. He told reporters "We're throwing down a red flag, and saying, if this is true, please stop it." ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8283 From: James M. Atkinson Date: Thu Feb 26, 2004 3:53pm Subject: The world's second oldest profession Business is good.... ;-) The third oldest profession is that of catching spies, -jma http://news.bbc.co.uk/2/hi/americas/3490120.stm The world's second oldest profession By Paul Reynolds BBC News Online world affairs correspondent Whatever the truth of Clare Short's claim that Britain was spying on UN Secretary General Kofi Annan during the run-up to the Iraq war, the tradition of spying on your friends as well as your enemies is a long established one. A rather bulky old telephone bugging device http://newsimg.bbc.co.uk/media/images/39861000/jpg/_39861166_device_newsstill_300.jpg It is also one which leads to scandals when revealed. We certainly know that the United States was interested in eavesdropping on members of the Security Council. The British whistleblower Katherine Gun, against whom charges were dropped on Wednesday, leaked a memo from Frank Koza of the US electronic intelligence gathering body, the National Security Agency, asking for help in targeting the communications of Angola, Cameroon, Chile, Bulgaria, Guinea and Pakistan. Mr Koza's request points to one of the most recent revelations about how all this is done. In this case he would probably have been asking to tap into the network called Echelon. The existence of Echelon was made known some years ago and was the subject of a report in July 2001 by the European Parliament worried at the civil liberties implications and that Echelon might be for commercial advantage. Basically five English-speaking countries - the US, the UK, Canada, Australia and New Zealand - are said to have divided up the electronic world between them so that they can intercept communications across much of the globe. They use ground stations to tap into satellite transmissions mainly to listen into telephone calls, e-mails and faxes. Quite often, their computers are programmed to spot certain words and pick up certain dialled numbers and addresses. Joshua's example That spying is the second oldest profession is indicated by the Old Testament no less. http://newsimg.bbc.co.uk/media/images/39565000/jpg/_39565843_gchqdoughnut203.jpg GCHQ is the home of Britain's intelligence-gathering operations When the children of Israel were about to enter the Promised Land, the Bible says, their leader took the precaution of trying to get intelligence about what lay ahead. "Joshua son of Nun sent two spies out from Shittim secretly with orders to reconnoitre the country. The two men came to Jericho and went to the house of a prostitute named Rahab..." Rahab, of course, was engaged in the oldest profession. Joshua's example has been followed ever since. In our time, the bugging of embassies has been especially popular. That is partly because diplomatic codes are so hard to break. http://newsimg.bbc.co.uk/media/images/39861000/jpg/_39861198_wright_ap203body.jpg Wright said bugging was rife in London in the 1950s and 60s And that does not mean just the embassies of your enemies, though that has gone on a lot. I remember being called out by Russian diplomats on a Saturday afternoon towards the end of the Cold War. They displayed rather ancient looking microphones they had found embedded in plasterwork in one of their residences. The shocked look they put on was a joy to behold. Last year it was reported that Britain had bugged the High Commission (embassy) of Pakistan after the 11 September attacks. It was said that devices were put in under cover of building work. The British said nothing. The Pakistanis had their suspicions. French bugged A former MI5 agent, Peter Wright, revealed in his book Spycatcher, which the British Government tried to have banned, that in the 1950s and 60s "we bugged and burgled our way across London at the state's behest, while pompous bowler-hatted civil servants in Whitehall pretended to look the other way". Gentlemen do not read each other's mail Henry L Stimson Former US secretary of state He said that Lancaster House, the venue for many a diplomatic discussion including the Rhodesia talks, had been wired for sound so that MI5 could listen into delegations in their private rooms. Mr Wright also said that the communications of the French Embassy in London had been intercepted when Britain was trying to join the Common Market. Secret unit The most sensational revelations, though, came in a book published in 1931. It was called The American Black Chamber and it was written by a brilliant and flamboyant American cryptographer named Herbert Yardley. Mr Yardley had led a secret unit by this name which decoded diplomatic traffic from just after World War I until 1928 - when New York lawyer Henry L Stimson became secretary of state and was horrified to discover where a lot of his information was coming from. He closed the Black Chamber down with the words: "Gentlemen do not read each other's mail." Unfortunately, this put Mr Yardley out of a job, so to make some money he wrote his book. It revealed that the US had broken Japanese ciphers and had, for example, found out what the Japanese bottom line was in a important naval conference in 1921, enabling the US to press an advantage. But Mr Yardley also cheerfully spoke about attacking the British codes and accepted that the British were doing the same. He ruefully reflected in the book about the dim prospects for American negotiators at future meetings: "How would America fare in the conference room without the Black Chamber? The Department of State still used its 16th century codes. "I could see the rush of excitement in the British Admiralty cipher Bureau, as their skilful, experienced cryptographers prepared for the phalanx of American code clerks and their antiquated codes. I rather envied the British cryptographers." ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8284 From: James M. Atkinson Date: Thu Feb 26, 2004 3:49pm Subject: Blair Hit by Annan Spying Claim, U.N. Cries Foul See, I told the U.N. they were buying the wrong equipment (no kidding). -jma http://reuters.com/newsArticle.jhtml;jsessionid=DPMEPWYMA54JGCRBAELCFFA?type=worldNews&storyID=4447474 Blair Hit by Annan Spying Claim, U.N. Cries Foul Thu Feb 26, 2004 01:05 PM ET By Mike Peacock LONDON (Reuters) - Britain spied on U.N. chief Kofi Annan before the Iraq war, former minister Clare Short said on Thursday, threatening a fresh crisis for Prime Minister Tony Blair and drawing an angry response from the United Nations. Blair declined to address the claim, beyond saying British security services acted within domestic and international law. But the U.N. declared any such operation would be illegal. "We want this action to stop if indeed it has been carried out," U.N. chief spokesman Fred Eckhard told reporters. "It undermines the secretary-general's conduct of business with other leaders. It is therefore not good for the United Nations' work and it is illegal." Britain's U.N. ambassador talked to Annan on Blair's behalf. Short's allegation comes a day after Britain dropped charges against a translator who admitted leaking a top-secret U.S. document seeking London's help in bugging United Nations members in the run-up to the war. The former aid minister, who resigned after the war but was in government during the period when London and Washington sought U.N. authorization for military action, said Secretary-General Annan's office had been specifically targeted. "In the case of Kofi's office, it was being done for some time," Short told BBC Radio. "I read some of the transcripts of the accounts of his conversations." Blair reacted angrily to his now frequent critic, saying she was undermining the intelligence services and British security as it faced a real threat from ruthless Islamic militants. "The fact that those allegations were made...is deeply irresponsible," he told a news conference in his Downing Street home. "We are going to be in a very dangerous situation as a country if people feel they can simply spill out secrets or details of security operations, whether false or true." BLAIR CAN'T SHAKE IRAQ Iraq has become a political nightmare for Blair. Ten months after Saddam Hussein was toppled, none of the banned weapons Blair claimed Iraq had primed for use has been found. The premier's public trust ratings have slumped and many in his Labour Party feel betrayed to the point of mutiny. Bob Worcester of pollsters MORI said Blair remains favorite to win a third term at next year's election but with a majority of 60-80 in the 659-seat parliament, down from 161 now. That could leave him at the mercy of a hardcore of Labour MPs so opposed to the war they will now fight him on any front. "Until the boil of the truth about Iraq is lanced, the prime minister can never put this behind him," Labour MP Jeremy Corbyn told Reuters. On Wednesday, state prosecutors said they had insufficient evidence to prove 29-year-old translator Katharine Gun broke the Official Secrets Act although she freely admitted leaking a memo which she said revealed a U.S. plot to spy on U.N. missions. At the time of the memo, Britain and the U.S. were desperately trying to persuade wavering members of the Security Council to back war. Blair's opponents believe the government's top lawyer, Attorney-General Lord Goldsmith, killed the case for fear that questions about the war's legality would be raised. Goldsmith denied the case was dropped for political reasons, or that he took the decision. "At the time we started military action it was my own considered...view that military action was lawful," he told parliament. "I believe today it was the correct legal position." Blair's spokesman said the government would review the Official Secrets Act to see if it needed amending. Gun, who worked at surveillance center GCHQ, said she had exposed "illegality and wrongdoing on the part of the U.S. government, who attempted to subvert our own security services." The Observer newspaper said the leaked memo showed America asked for Britain's help to bug the offices of Security Council members -- Chile, Mexico, Cameroon, Angola, Guinea and Pakistan. Some diplomats were philosophical. Spain's U.N. ambassador Innocencio Arias said: "Everybody spies on everybody." ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8285 From: Date: Fri Feb 27, 2004 9:06am Subject: Honeywell Video System Announce Recall of Security Camera http://www.safetyalerts.com/recall/p/04/p0013522.htm February 26, 2004 CPSC, Honeywell Video System Announce Recall of Security Camera Name of product: ADEMCO Rapid/Dome security camera Units: 689 Manufacturer/Importer: Video Controls Ltd., of Cheshire, United Kingdom. Imported by Honeywell Video Systems of Lewisville, Texas. Hazard: The security cameras plastic mounting assembly can crack, allowing the dome and the camera to fall from the wall or ceiling, possibly injuring someone. Incidents/Injuries: Honeywell received one report of the camera assembly falling from the ceiling. No injuries. Description: The recalled security camera is an indoor video camera mounted on the wall or ceiling. The camera is covered with a smoked plastic dome measuring about 6 inches in diameter. A mechanism to move the camera and a mounting assembly are also part of the product. The recalled security cameras have these part numbers: AD5RCPP16 AD5GCMPP18 AD5GCPP18 AD5GCPP22 The cameras also have serial numbers within these ranges: G01 (January 2002) to G12 (December 2002) H01 (January 2002) to H08 (August 2003). The serial numbers are located inside the product, on a white label attached to the side of the camera mounting. Sold at: The recalled security cameras were not sold directly to consumers. They were sold from January 1, 2002, to October 17, 2003, to independent dealers who installed them in commercial buildings. The security cameras sold for approximately $1000 to $1700. Manufactured in: United Kingdom Remedy: Contact Honeywell Video Systems to arrange for free repair of the security cameras mounting assembly. Consumer Contact: Call Honeywell at (800) 573-0154 between 8 a.m. and 5 p.m. ET (Monday through Friday). 8286 From: James M. Atkinson Date: Fri Feb 27, 2004 9:22am Subject: What's the etiquette for spying on friends? http://the.honoluluadvertiser.com/article/2004/Feb/27/op/op03a.html Posted on: Friday, February 27, 2004 EDITORIAL What's the etiquette for spying on friends? What's odd about this week's drama in London is how little reverberation it's causing in Washington. Katharine Gun, a translator at Britain's secret eavesdropping agency, the Government Communications Headquarters (GCHQ), had been facing two years in prison on a charge of violating the Official Secrets Act. But the moment she entered her innocent plea Wednesday, the government dropped its case. Gun's case may be only the beginning of a larger scandal. A former British Cabinet minister now says that British spies have regularly bugged the office of U.N. Secretary General Kofi Annan. Last year, as the United States and Britain prepared to invade Iraq, Gun came across an e-mail from the U.S. National Security Agency (NSA), asking GCHQ to mount a "surge" of spying against members of the U.N. Security Council whose votes would be crucial to passing a second resolution authorizing war. Gun was outraged at what she considered an attempt to subvert the U.N. So she leaked the memo to the Observer newspaper, which then reported that the NSA stepped up eavesdropping on officials from Angola, Cameroon, Chile, Bulgaria, Guinea and Pakistan, all members of the Security Council at the time. Gun was not about to go quietly. She claimed a defense of "necessity" - that her leak was required to prevent an illegal war. What puzzles us is why there isn't even a slight hint of embarrassment in Washington. Perhaps it's naive to be surprised that we've been spying on friendly diplomats. But when we're caught red-handed, shouldn't we at least act a bit sheepish? More to the point, Gun correctly saw that such bugging operations are contrary to international law and conventions, and a threat to the very legality that is the basis, in and between our Western democracies, of trust and justice. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8287 From: James M. Atkinson Date: Fri Feb 27, 2004 9:57am Subject: Spying Much Denied but Done a Lot at U.N., Experts Say [More like it "tilted", no so much "tipped"] -jma Spying Much Denied but Done a Lot at U.N., Experts Say By Dana Priest and Colum Lynch Washington Post Staff Writers Friday, February 27, 2004; Page A14 From the very first day it convened, the United Nations has been a magnet for spies, according to U.N. diplomats and U.S. intelligence experts. The tapping of phone lines and the planting of microphones in U.N. offices are common enough that the organization employs a team of debuggers, headed by a former New York police officer, to routinely sweep offices and respond to requests from nations that suspect their officials are being monitored. "In my opinion everybody spies on everybody, and when there's a crisis, big countries spy a lot," said Inocencio F. Arias, Spain's ambassador to the United Nations. "I wouldn't be surprised if this secretary general and other secretary generals have been listened to by a handful of big powers, and not only the ones you are thinking." An ambassador of a Security Council member nation, who spoke on the condition of anonymity, said it would almost be an insult to be spared the attention of foreign intelligence agencies. "It used to be a shame; now it's a matter of status. If your mission is not bugged, then you are really worth nothing." President Franklin D. Roosevelt "fought hard for the United States to host the opening session" of the United Nations" in April 1945, says James Bamford in his book about the National Security Agency, "Body of Secrets." "It seemed like a magnanimous gesture to most of the delegates. But the real reason was to better enable the United States to eavesdrop on its guests," according to Bamford. "They're doing it today," said Stephen C. Schlesinger, author of "Act of Creation: The Founding of the United Nations." "States always will be using spying to further their own national security interests." Regardless of how common spying is, it is not common to get caught, as the NSA apparently was last March when a British translator gave the Observer newspaper copies of an agency memo requesting a "surge" in eavesdropping on Security Council members during the debate on authorizing the use of force against Iraq. Yesterday, a former British cabinet member told BBC radio that she had seen transcripts of Secretary General Kofi Annan's surreptitiously recorded conversations. Experts say it would be highly unusual if the United States did not know about the Annan eavesdropping. Under a secret pact between Britain, Canada, Australia and the United States, Washington has responsibility for surveilling and sharing information on targets within the United States, NSA experts said. No wiretapping is allowed in the United States without a court order. When the eavesdropping involves foreign officials, the FBI or the NSA must obtain a Foreign Intelligence Surveillance Act order, although classified executive orders permit surveillance of specific targets. Besides U.S. law, U.N. spokesman Fred Eckhard said, three treaties -- the 1946 Convention on the Privileges and Immunities of the United Nations, the 1947 agreement between the United Nations and the United States regarding the headquarters of the United Nations, and the 1961 Vienna Convention on Diplomatic Relations -- affirm the inviolability of U.N. premises. "The premises of the United Nations shall be inviolable," states the 1947 agreement, signed by Britain and the United States. It adds that the United Nations' "property and assets . . . shall be immune" from any form of "interference, whether by executive, administrative, judicial or legislative action." At the same time, most diplomats acknowledge spying as a fact of life. It was at its height during the Cold War, when U.S. and Soviet agents competed for secret information, and the two rival countries filled their U.N. delegations with CIA and KGB officers. Still, it is a subject few diplomats discuss openly. "I take it as something that could take place," Sergey Lavrov, Russia's ambassador to the United Nations, said of the recent allegations. "I think it is illegal, but this shows that the British intelligence service at least technically are very professional." Lavrov said Russian intelligence would not engage in the same activity. "Never, never," he said. "I don't think you could find any even suspicion that the secretary general's office was bugged by the Russian intelligence service." Another Security Council member nation's ambassador reacted with incredulity. "On the record, if Lavrov says so, I have to believe Lavrov," the diplomat said. "Off the record: Is he joking?" "The U.N. spends millions a year on anti-bugging equipment," said James Atkinson, president of the Granite Island Group, a firm that provides debugging services to governments and private firms. Atkinson recently drove into New York for fun, passing by many foreign missions to the United Nations. "My equipment picked up so many bugs that it nearly tipped over." "The secretariat routinely takes technical measures to guard against such invasions of privacy," Eckhard said, "and those efforts will now be intensified." Lynch reported from the United Nations. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8288 From: James M. Atkinson Date: Fri Feb 27, 2004 9:20am Subject: British admit to spying on Annan http://www.trivalleyherald.com/Stories/0,1413,86~10669~1982948,00.html British admit to spying on Annan Former cabinet member says office in United Nations was bugged By Patrick E. Tyler, New York Times LONDON -- A former member of Prime Minister Tony Blair's Cabinet asserted Thurs-day that British intelligence services conducted electronic surveillance of the U.N. secretary-general, Kofi Annan, in the run-up to the Iraq war. The former minister, Clare Short, who is still a member of Parliament, received a harsh rebuke from Blair, who told a news conference that Short had endangered Britain's national security with her "totally irresponsible" remarks. He would not comment on any allegations about espionage operations. At the United Nations in New York, Annan's spokesman, Fred Eckhard, said at a news conference that it would be illegal to conduct electronic spying at the United Nations and that Annan would be disappointed if Britain had bugged his conversations. Eckhard said efforts were under way to ensure the security of Annan's confidential conversations. He refused to say whether any listening devices had been found in Annan's office. "We're throwing down a red flag and saying that if this is true, please stop it," Eckhard said. The U.N. news conference added to the diplomatic embarrassment for Blair, who was said to be outraged that a member of his own Labor Party had spoken publicly about one of the most sensitive types of espionage. Michael Howard, the Tory opposition leader, called Thursday's developments "a complete mess" for Britain. The diplomatic tempest began when Short, who initially supported the war but later resigned from the Cabinet after the fall of Baghdad, told a BBC radio interviewer on Thursday morning that transcripts of Annan's private conversations were circulated last year among Blair's Cabinet members. "I read some of the transcripts of the accounts of his conversations," she said, asserting that Annan's office was bugged. "These things are done, and in the case of Kofi's office, it's been done for some time." She said she was so certain of the surveillance that she recalled "having conversations with Kofi in the run-up to war, thinking: 'Oh dear, there will be a transcript of this, and people see what he and I are saying.'" Short's remarks reflected the continued hemorrhaging of secrets related to espionage conducted during the bare-knuckled political debate at the United Nations in March 2003, as the Bush administration and Blair's government sought to overcome resistance from France, Germany, Russia and a number of smaller states that were opposed to a resolution that would authorize the Iraq war. Short's blunt disclosure -- which a number of experts said appeared to be a violation of the Official Secrets Act -- underscored the unpopularity of the war in Britain and the bitterness that has developed between Blair and a sizable contingent of rebels within his own party. The revelation of targeted espionage in the executive suites of the United Nations came a day after Blair's government declined to prosecute a 29-year-old government linguist, Katharine Gun, who admitted leaking details of another bugging operation, also aimed at the United Nations, during the war debate last year. Gun worked for the intelligence agency known as General Communications Headquarters, which intercepts and decodes communications. She said she was "shocked" when she received a copy of a top secret message from the U.S. National Security Agency, requesting British assistance in conducting electronic surveillance against the diplomats of "swing" nations -- Angola, Cameroon, Guinea, Chile, Mexico and Pakistan -- whose votes were critical to passing a war resolution. She leaked the message to the British Sunday newspaper The Observer and turned herself in for arrest. Gun's lawyers were preparing a defense that she felt it was necessary to expose what she believed was espionage activity that fell outside international law. As part of her defense, her lawyers were going to insist on seeing the full private assessment of Lord Goldsmith, the attorney general, on whether Britain could go to war without specific authorization from the Security Council. The British government's reaction to the two disclosures sharply contrasted with the era of the Cold War, when significant breaches of secrecy like Gun's and Short's most often resulted in immediate censure and prosecution, a move that was regarded as necessary in the face of serious threats to national security. Blair said Thursday that major threats still exist, but he offered no coherent explanation on the change in policy, except to say that the Official Secrets Act perhaps needed to be reviewed. He said the episodes involving Gun and Short showed "that we are going to be in a very dangerous situation as a country if people feel that they can simply spill out secrets or details of secret operations." But when pressed on why British prosecutors had declined to bring Gun to trial, Blair said the case was dropped because of the "interplay between evidentiary issues and the legal framework." He said he could go no further and insisted that he had played no role in the decision to drop the case. A number of political analysts pointed out that the prosecution of Gun, who said she had acted out of conscience, would have re-ignited the debate over the war in Iraq at a time when Blair was trying to move on to a new domestic agenda. But Short's intervention on Thursday demonstrated how difficult it is for Blair to get beyond the war. The prime minister accused his critics on Thursday of using "conspiracy" theories, allegations of government lying and wrongdoing as "cover for people who want to have a debate about the rightness or wrongness of the conflict and we should have that." "It is actually a debate on, 'Was it right to remove Saddam Hussein the way you did or should you have waited and given the inspectors more time,'" Blair said, adding, "That is the heart of the debate." ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8289 From: James M. Atkinson Date: Fri Feb 27, 2004 9:18am Subject: Blair told to come clean on UN spying allegations http://www.channelnewsasia.com/stories/afp_world/view/73034/1/.html Time is GMT + 8 hours Posted: 27 February 2004 1921 hrs Blair told to come clean on UN spying allegations LONDON : Prime Minister Tony Blair was under pressure to come clean on allegations Britain spied on UN Secretary General Kofi Annan in the run-up to the Iraq war. Blair reacted angrily when his former international development secretary, Clare Short, claimed Thursday that Britain had eavesdropped on Annan's conversations, and that she had seen the transcripts. The row escalated when former UN chief weapons inspector Richard Butler, in Australia, revealed that at least four countries bugged his conversations as he was conducting delicate negotiations in the late 1990s on disarming Iraq. Blair, who was to speak Friday at a Labour Party gathering in the Scottish highlands, called Short's allegation "deeply irresponsible" and insisted that British intelligence always acted within the law. In New York, Annan's spokesman Fred Eckhard said that eavesdropping on the secretary general would be illegal. "We would be disappointed if this were true," he said. "Such activities would undermine the integrity and confidential nature of diplomatic exchanges." But the leader of the opposition Liberal Democratic party, Charles Kennedy, said that Blair had to go further and issue a unequivocal denial. "The issue at stake here is whether we as a country somehow or other we complicit in the bugging of the secretary general of the United Nations," said Kennedy on BBC radio. "That surely is a matter to which we should be given an adequate reply," he said. "The prime minister must come clean, and he must not use the intelligence services as a means to protect his own personal political interests." Short, who quit Blair's cabinet last May over the Iraq war, dropped her bombshell a day after government prosecutors abandoned a secrecy case against British intelligence translator Katharine Gun. She has admitted leaking a top-secret memo from the US National Security Agency, dated January 31 last year, soliticing Britain's help in spying on six UN Security Council member states. The appeal from Washington was issued when US President George W. Bush and Blair was trying -- unsuccessfully, it turned out -- to get a green light from the United Nations to invade Iraq, which they did on March 20. In Washington, US Secretary of State Colin Powell refused to comment on Short's allegation, let alone whether the United States was eavesdropping at UN headquarters in New York. "I have nothing to say with respect to the activities of the United Kingdom," Powell said. "We never talk about intelligence matters of that nature in public." One-time foreign secretary Robin Cook, who also quit Blair's cabinet in protest against the Iraq war, and who had enjoyed the same senior ministerial rank as Short, cast doubt on his former colleague's claim. "I would be surprised if it were true that, in the run-up to the war on Iraq, we intercepted the calls of Kofi Annan," wrote Cook in the Independent newspaper. But in Australia, Butler -- the chief UN arms inspector in 1997 to 1999 -- said he was "well aware" that he was being bugged during his time at the United Nations. He alleged that Britain, France, Russia and the United States all listened in on his conversation. The four, with China, are all permanent members of the UN Security Council. "How did I know? Because those who did it would come to me and show me the recordings that they had made on others to help me do my job disarming Iraq," Butler said on Australia's ABC radio. "They would say 'We're just here to help you' and they would never show me any recordings they had made on me." - AFP ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8290 From: James M. Atkinson Date: Fri Feb 27, 2004 9:24am Subject: UN weapons inspector 'well aware' of spying http://www.theglobeandmail.com/servlet/story/RTGAM.20040227.wweapons/BNStory/Front/ UN weapons inspector 'well aware' of spying Associated Press Sydney - Former United Nations chief weapons inspector Richard Butler said he was "well aware" that his telephone calls were being monitored during his tenure, as he weighed into the debate surrounding allegations Britain spied on the UN before the Iraq war. Mr. Butler said Friday that while he was in charge of investigating Iraq's weapons programs he was forced to go for walks in New York's Central Park for confidential discussions with his contacts, because the phones in his office at the UN headquarters were bugged. "Of course I was (bugged)," he told Australian Broadcasting Corp. (ABC) radio. "I was well aware of it. How did I know? Because those who did it would come to me and show me the recordings that they had made on others to help me do my job disarming Iraq." Butler, the UN's chief weapons inspector in Iraq from 1997 to 1999, said at least four permanent members of the UN Security Council monitored his calls - the United States, Britain, France and Russia. His comments came after an Australian intelligence analyst told the ABC that the phone of the UN's most recent weapons inspector, Hans Blix, was tapped whenever he was in Iraq hunting for banned weapons and the information was shared between the United States, Britain and its allies. The revelations were prompted by accusations on Thursday by former British cabinet minister Clare Short that Britain spied on UN Secretary General Kofi Annan in the build up to the Iraq war. She said she had read transcripts of Mr. Annan's conversations while she was a member of the government. The UN said any bugging of Mr. Annan's office would be illegal and should end immediately. ABC radio cited an unnamed intelligence source at the Australian intelligence agency, the Office of National Assessments, who claimed that Mr. Blix's cellphone was monitored and his conversations recorded while he was in Iraq prior to the war last year. "That's what I'm told, specifically each time he entered Iraq, his phone was targeted and recorded and the transcripts were then made available to the United States, Australia, Canada, the U.K. and also New Zealand," ABC investigative reporter Andrew Fowler said, citing his intelligence contacts. He did not say who tapped Mr. Blix's phone. Australia is a close ally of Britain and the United States and the three countries shared intelligence in the lead-up to last year's invasion of Iraq. Canberra also dispatched troops to take part in the U.S.-led invasion of Iraq. Steve Ingram, a spokesman for Attorney General Philip Ruddock, who is ultimately responsible for security and intelligence matters, refused comment. "We don't make it a practice of commenting on what we might and might not have seen in relation to intelligence matters," he told The Associated Press. Mr. Blix, 75, who headed the UN inspectors from 2000 to mid-2003, was in Iraq for months before the war looking for evidence that Saddam Hussein was developing a weapons program. No weapons of mass destruction have been found. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8291 From: Steve Uhrig Date: Fri Feb 27, 2004 0:32pm Subject: Re: The world's second oldest profession On 26 Feb 2004 at 16:53, James M. Atkinson wrote: > The third oldest profession is that of catching spies, The first two are virtually indistinguishable from one another ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8292 From: martykaiser Date: Fri Feb 27, 2004 2:44pm Subject: NLJD Hey... If anyone is looking for a good and inexpensive NLJD try http://www.nelk.ru ...that's right, Russian. Sells for about US$4,000.00. Marty [Non-text portions of this message have been removed] 8293 From: Robert Dyk Date: Fri Feb 27, 2004 3:55pm Subject: RE: NLJD NLJD is not the only thing they build, http://www.nelk.ru/eng/katalog.php?part=4&open=_95&id_parent=95 Thanks for the heads up. Marty, Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. -----Original Message----- From: martykaiser [mailto:martykaiser@p...] Sent: February 27, 2004 15:44 To: TSCM-L Subject: [TSCM-L] NLJD Hey... If anyone is looking for a good and inexpensive NLJD try http://www.nelk.ru ...that's right, Russian. Sells for about US$4,000.00. Marty [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8294 From: G P Date: Fri Feb 27, 2004 10:45am Subject: Re: FBI story Very interesting story Marty - just goes to show what can happen to you if you go against the grain of the "old guard" network out there in D.C. Keep talking about it and publish what you know, that's the only way you will affect a change. It's not the federal government that is the problem, it's the shadow network that likes to manipulate and distort intelligence information that is at fault. I went through a similar episode out in D.C. in 2000/2001, hired a few "international business development" fellows from the Center for Strategic and International Studies and subsequently had my entire company (then valued at $19 million) taken over by them, had my reputation trashed by a continuing stream of false and anonymous information that was continually leaked to every 3-letter agency in D.C., and lost everything but the shirt on my back at the end of it. Most of those guys are now presidential advisers for the current W. Bush administration: Bill Stokes - Chairman of the Washington Network Group and EndeavorConnect, covert operative and psychological operations guy for the State Department, personal friends with Bush Sr., Kissinger etc. I hired 'Billy' and his gang to help out with international marketing, I had no clue who or what they were about until it was all over. Billy likes to play games with the cognitive sciences (such as NLP and Ericksonian hypnotherapy), has access to LSD-25 derived psychoactive chemicals that were banned by the Kerry Commission, and is on a first name basis with the who's who in the intelligence community. Frank Cilluffo - Credited with coining the term "Homeland Security", Franky Boy is a presidential adviser to W. Bush and is behind most of the WMD hogwash being peddled in D.C. Last I heard Franky was an exec over at DHS, Franky also likes to goof around with cognitive sciences research from the MK days, if you cross Franky he'll label you a terrorist so enjoy the perennial FBI/CIA investigation that ensues as a result. Michael Palashak - Covert operative for the State Department, personal friends with Bush Sr. and W. Bush, also helps peddle WMD hogwash with Franky Cilluffo. Protege for Stokes, with bad teeth to boot. Gore Friedrichs - The lead "investor" that introduced all of those fine fellows; Friedrichs is also a member of the establishment out there in D.C., his father used to be the Chairman of the NASD, lackey for Stokes and Cilluffo and psyop neophyte. Michael Bednardczyk - Covert operative for the State Department, "professional services" lead for Blackhat / Defcon, would sell his own mother for a quarter if he thought it would make him more popular. Spewer of false information to the intelligentsia, poor fatboy could never quite figure out the basics of technology so handling other computer security kiddies is his forte. Michael is adept at one thing, which is taking credit for other people's work. Keep talking about it Marty, exposing their darkness is the only defense. Mark 4:22 - "For there is nothing hid, which shall not be manifested; neither was any thing kept secret, but that it should come abroad." Greg martykaiser wrote: Hi Gang I have just updated my FBI story. You can find it at http://www.martykaiser.com/fbi1~1.htm Thanks for reading it. Marty [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links --------------------------------- Do you Yahoo!? Get better spam protection with Yahoo! Mail [Non-text portions of this message have been removed] 8295 From: James M. Atkinson Date: Fri Feb 27, 2004 1:58pm Subject: UK accused of doing Washington's dirty work [The first rule of diplomacy, it not to trust the other diplomats. -jma] http://english.pravda.ru/mailbox/22/98/387/12167_Blair.html UK accused of doing Washington's dirty work 02/27/2004 16:40 Ex-Minister claimed UK spies bugged UN after request from US. The Britain of Tony Blair is Washington's lap-dog, to order to heel, to use and to abuse. The latest revelations that Washington asked London to bug the UN Secretary-General's office and the representatives of the UNSC will come as no surprise in today's world, where Washington and London prefer to lie, forge documents and kill than to use discussion, debate, dialogue and diplomacy. Claire Short, the former Cabinet Minister for Overseas Development, who resigned over the ilegality of the war against Iraq, claimed yesterday that British spies bugged the office of Kofi Annan in the period before the war, giving as proof the fact that she had read transcripts of such conversations. Another source, Katherine Gun, was dismissed from her job at the Government Communications Headquarters (GCHQ) for leaking the contents of a memo, dated January 2003, which referred to eavesdropping activities on the representatives of UN Security Council members from Angola, Bulgaria, Cameroon, Chile, Guinea Conakri and Pakistan, who had their telephones tapped. Why? To try to find something to be used later to blackmail or cajole these representatives to support Washington and London in their attack against Iraq, because Washington and London knew and know that the attack was illegal without the support of the UNSC. This is the diplomacy followed by the Bush regime in Washington and the Blair regime in London, sanctioned by a handful of cowards such as Portugal's Jose Barroso, Spain's Jose Maria Aznar and Italy's Silvio Berlusconi. How much lower can this gallery of rogues sink? Timothy Bancroft-Hinchey ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- From: Matt Paulsen Date: Sun Feb 23, 2003 8:36pm Subject: RE: Bluetooth Security Check out https://www.bluetooth.org/ https://www.bluetooth.org/foundry/specification/docman/ contains the specs. -----Original Message----- From: Ocean Group - MU TSD [mailto:inertia@o...] Sent: Saturday, February 22, 2003 8:38 AM To: TSCM Group Subject: [TSCM-L] Bluetooth Security Hi, We've recently been working with a company who's management use wireless bluetooth access by using headsets for their mobile phones. We've been considering weather to add this to our risk evaluations. We did feel that with its power output 0.25mW or so the risk of using it in their offices and on compnay premises was somewhat acceptable. However we concluded that outside the office, in specific high risk scenario's, such as sitting in their car or on a train etc it would allow someone alot of time to work on compromising the situation. Basically I was wondering if anyone has had to deal with this threat and does anyone know of any papers on bluetooth encryption and the strenght of its security implmmentations. If I went on previous wireless implementations, such as the standard wireless lan etc I wouldn't hold alot of faith and would probably have to advise clients not to use it outside of premises etc. At least until I had seen some risk evaluations from some tech labs etc. If I remember rightly even the GSM ciphers, AS1/2? were compromised with a couple of basic PC setups, however GSM isn't on my agenda at the moment but I will revisit it later. Anyway, any thoughts or information links would be appreciated. Kind regards Oisin Ocean Group, Technical Security Division, Ireland. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6964 From: kondrak Date: Mon Feb 24, 2003 2:18am Subject: GPS devices increasingly are used to spy on people http://www.chron.com/cs/CDA/story.hts/nation/1789996 GPS devices increasingly are used to spy on people By FRANK JAMES Chicago Tribune WASHINGTON -- While GPS technology that uses satellites has been a boon to millions who don't want to get lost, others increasingly are turning to the same technology to track people and keep an eye on them. Spouses who believe mates are having affairs, employers who suspect workers are misusing company vehicles or parents who wonder if their children are where they are supposed to be are among those using devices tied to the global positioning system of satellites. At Washington's WJLA-TV, employees say officials at the station have abused the technology. Last year, management installed tracking devices in station vehicles -- cars and trucks that news crewmembers are permitted to take home. Officials at the station, an ABC affiliate, have said the devices are to let editors know where vehicles are for newsgathering purposes so that the closest crew can be dispatched. But employees said the devices have been used to monitor them. As one cameraman drove along a highway, a manager phoned to tell him to stop driving so fast. Company officials confronted another cameraman, wanting to know why the company car was driven on the employee's day off. "You have managers who call you and say, `Why have you stopped here, why did you stop there?' " said a news cameraman who asked not to be identified. "You're like, `I had to go to the bathroom,' or `I had to get something to eat.' " The station's general manager, Chris Pike, didn't return several calls for comment. While such GPS tracking is legal, the trend has contributed to the looming sense that the United States is increasingly a surveillance society, especially in the wake of stepped-up, terrorism-related security. The tracking also has created a backlash, with some subjects of electronic tracking seeking to thwart the technology. "Location tracking can be a considerably significant invasion of privacy," said Lee Tien, senior counsel for the Electronic Frontier Foundation, a San Francisco-based organization concerned with civil liberties and technology issues. "Who has access to that information?" he asked. "Under what circumstances? A lot of people don't think about what it means for your employer to be able to know where you go throughout your day. Or an insurance company." The satellite technology used for tracking relies on the same network widely used for navigation. GPS navigation is what allows U.S. cruise missiles to explode on, or within feet of, selected targets. Recovery workers marked the location of space shuttle Columbia debris with GPS devices. Many rental cars now come with GPS displays that let customers find addresses in unfamiliar cities. Meanwhile, Oregon is considering the feasibility of installing GPS technology in the cars of its residents to record how many in-state miles they drive as the state considers imposing car-related taxes based on road-mileage-driven versus fuel purchased. GPS may have even figured in one of the most notorious crime sprees in recent U.S. history. Last year, when the Washington-area sniper suspects were arrested, a GPS device was among the items found in their possession. Investigators speculate it might have helped them evade police dragnets by taking side streets instead of major roads. A network of 24 geo-stationary satellites broadcasts signals received by GPS devices. Using triangulation, the satellites help the devices gain a fix on their location anywhere on Earth. While the navigational functions of GPS have caused little or no clamor, tracking has caused a stir. The devices can not only indicate direction but the speed at which a vehicle or person is moving and the precise address they have visited. Some tracking is meant to protect the vulnerable. Wherify Wireless Inc., for example, makes a high-tech bracelet containing a GPS device and tiny wireless phone that can be placed on the wrists of children or Alzheimer's patients to help locate them if they get lost. Some companies offer tracking technology to the anxious parents of teenage drivers so they can know not only where their children are going but how fast they were driving. The devices cost about $400. "If you look at our (tracking) technology, it way overweighs the bad that people can do with it," said Timothy Neher, founder and president of the company. Neher got the idea for the devices after a scary moment during a zoo visit when he was momentarily separated from two young relatives in his care. Trucking firms have used GPS tracking for years to keep tabs on their drivers and shipments. But concerns about the potential use of the data for discipline purposes caused the Teamsters union to include specific language prohibiting such use in the contract it reached with United Parcel Service last August. 6965 From: frost_bitten_ca Date: Mon Feb 24, 2003 3:16am Subject: Sound projection technologies Woody Norris has a way of getting inside your head. No, we don't mean his overpowering handshake or Barnumesque penchant for self-promotion ("This is the biggest thing in audio in 77 years"). We mean HyperSonic Sound, his latest creation. (A prolific inventor, Norris, 64, also won a Best of What's New for a personal flying machine.) Unlike traditional speakers, which scatter sound, Norris' device streams it in a precise, laser-like beam for up to 150 yards with almost no degradation in quality or volume. If that seems incredible, trust me, it is. When I met Norris in September he pointed the 7-inch-square emitter at me from 30 feet away. Suddenly I heard the sound of birds chirping. The noise didn't seem to emanate from his device; I felt like it was generated inside my noggin. Yet a guy just 2 feet away from me couldn't hear it. How does it work? The piezoelectric transducer emits sound at frequencies above the human ear's 20,000-cycle threshold. Unlike low- frequency waves, the high-frequency signals don't spread out as they travel through air. Yet they do interact with the air to induce a related set of ultrasonic waves. These waves combine with the original waves, interfering to create an audible signal, focused into a beam. The applications are numerous, if not apparent: Thousands of soda machines in Tokyo will soon bombard passersby with the enticing sound of a Coke being poured, and several U.S. supermarkets will promote products to shoppers as they walk down corresponding aisles. Eventually HyperSonic Sound might enable a nightclub to play disco on one side of the dance floor and salsa on the other. Ambulances equipped with hypersonic sirens could clear the streets without waking the neighbors. Norris' company, American Technology, sells the devices for $600. http://www.popsci.com/popsci/bown/article/0,16106,388134,00.html see also holosonics: http://www.holosonics.com/ 6966 From: Johnston, Richard Date: Mon Feb 24, 2003 11:04am Subject: RE: GPS devices increasingly are used to spy on people So, what is the problem? The vehicle belongs to the TV station. It is their property. They should tell you it is being tracked and that should be sufficient. That should warn you not to park the vehicle at a bar at 2 a.m. or use it for your hobby of robbing banks. Just drive like your boss is riding with you. If you want privacy get out of their truck. Take your own car. You have no expectation of privacy at work, except in the restroom. Your desk, your office, your computer, your company car, etc., are not yours. They are for business. If the boss sees you go to your girlfriends house at 2 p.m., when you are supposed to be working, it is not an invasion of your privacy. It is not a violation of your civil liberties. It is a demonstration of your deceit and stupidity. Now, if the boss puts the tracker on your personally-owned car... -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: Monday, February 24, 2003 1:18 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] GPS devices increasingly are used to spy on people http://www.chron.com/cs/CDA/story.hts/nation/1789996 GPS devices increasingly are used to spy on people By FRANK JAMES Chicago Tribune WASHINGTON -- While GPS technology that uses satellites has been a boon to millions who don't want to get lost, others increasingly are turning to the same technology to track people and keep an eye on them. Spouses who believe mates are having affairs, employers who suspect workers are misusing company vehicles or parents who wonder if their children are where they are supposed to be are among those using devices tied to the global positioning system of satellites. At Washington's WJLA-TV, employees say officials at the station have abused the technology. Last year, management installed tracking devices in station vehicles -- cars and trucks that news crewmembers are permitted to take home. Officials at the station, an ABC affiliate, have said the devices are to let editors know where vehicles are for newsgathering purposes so that the closest crew can be dispatched. But employees said the devices have been used to monitor them. As one cameraman drove along a highway, a manager phoned to tell him to stop driving so fast. Company officials confronted another cameraman, wanting to know why the company car was driven on the employee's day off. "You have managers who call you and say, `Why have you stopped here, why did you stop there?' " said a news cameraman who asked not to be identified. "You're like, `I had to go to the bathroom,' or `I had to get something to eat.' " The station's general manager, Chris Pike, didn't return several calls for comment. While such GPS tracking is legal, the trend has contributed to the looming sense that the United States is increasingly a surveillance society, especially in the wake of stepped-up, terrorism-related security. The tracking also has created a backlash, with some subjects of electronic tracking seeking to thwart the technology. "Location tracking can be a considerably significant invasion of privacy," said Lee Tien, senior counsel for the Electronic Frontier Foundation, a San Francisco-based organization concerned with civil liberties and technology issues. "Who has access to that information?" he asked. "Under what circumstances? A lot of people don't think about what it means for your employer to be able to know where you go throughout your day. Or an insurance company." The satellite technology used for tracking relies on the same network widely used for navigation. GPS navigation is what allows U.S. cruise missiles to explode on, or within feet of, selected targets. Recovery workers marked the location of space shuttle Columbia debris with GPS devices. Many rental cars now come with GPS displays that let customers find addresses in unfamiliar cities. Meanwhile, Oregon is considering the feasibility of installing GPS technology in the cars of its residents to record how many in-state miles they drive as the state considers imposing car-related taxes based on road-mileage-driven versus fuel purchased. GPS may have even figured in one of the most notorious crime sprees in recent U.S. history. Last year, when the Washington-area sniper suspects were arrested, a GPS device was among the items found in their possession. Investigators speculate it might have helped them evade police dragnets by taking side streets instead of major roads. A network of 24 geo-stationary satellites broadcasts signals received by GPS devices. Using triangulation, the satellites help the devices gain a fix on their location anywhere on Earth. While the navigational functions of GPS have caused little or no clamor, tracking has caused a stir. The devices can not only indicate direction but the speed at which a vehicle or person is moving and the precise address they have visited. Some tracking is meant to protect the vulnerable. Wherify Wireless Inc., for example, makes a high-tech bracelet containing a GPS device and tiny wireless phone that can be placed on the wrists of children or Alzheimer's patients to help locate them if they get lost. Some companies offer tracking technology to the anxious parents of teenage drivers so they can know not only where their children are going but how fast they were driving. The devices cost about $400. "If you look at our (tracking) technology, it way overweighs the bad that people can do with it," said Timothy Neher, founder and president of the company. Neher got the idea for the devices after a scary moment during a zoo visit when he was momentarily separated from two young relatives in his care. Trucking firms have used GPS tracking for years to keep tabs on their drivers and shipments. But concerns about the potential use of the data for discipline purposes caused the Teamsters union to include specific language prohibiting such use in the contract it reached with United Parcel Service last August. Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 6967 From: Michael Puchol Date: Mon Feb 24, 2003 3:32pm Subject: Re: Bluetooth Security Hi Oisin, If you look at http://www.fte.com you will find a handy Bluetooth sniffer. You will also notice that on most consumer hardware useability prevales over security, and thus even that PIN code checking for pairing devices is used, it is all done in the clear. Some products don't implement encryption at all, whereas some others have it off by default. Regards, Mike ----- Original Message ----- From: "Ocean Group - MU TSD" To: "TSCM Group" Sent: Saturday, February 22, 2003 5:37 PM Subject: [TSCM-L] Bluetooth Security > Hi, > > We've recently been working with a company who's management use wireless > bluetooth access by using headsets for their mobile phones. We've been > considering weather to add this to our risk evaluations. > > We did feel that with its power output 0.25mW or so the risk of using it in > their offices and on compnay premises was somewhat acceptable. > > However we concluded that outside the office, in specific high risk > scenario's, such as sitting in their car or on a train etc it would allow > someone alot of time to work on compromising the situation. > > Basically I was wondering if anyone has had to deal with this threat and > does anyone know of any papers on bluetooth encryption and the strenght of > its security implmmentations. If I went on previous wireless > implementations, such as the standard wireless lan etc I wouldn't hold alot > of faith and would probably have to advise clients not to use it outside of > premises etc. At least until I had seen some risk evaluations from some tech > labs etc. > > If I remember rightly even the GSM ciphers, AS1/2? were compromised with a > couple of basic PC setups, however GSM isn't on my agenda at the moment but > I will revisit it later. > > Anyway, any thoughts or information links would be appreciated. > > Kind regards > > Oisin > > Ocean Group, > Technical Security Division, > Ireland. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 6968 From: Michael Puchol Date: Mon Feb 24, 2003 3:40pm Subject: Re: Re: recent incident. Hi Valance, Thanks for the information, and yes, the installed Code Red was a dropper. It hadn't opened any ports (neither netstat nor fport showed anything), although I hadn't enough time to leave it running to check for random activity, so I cannot say for sure - only that when I saw the server, Code Red wasn't doing much. The telltale sign was an explorer.exe of only 8KB in C:\. There was a couple of modified registry entries that launched this .exe, which in turn launched the "real" explorer.exe after having done it's "thing". Also, it had mapped two drives, C and D, so that they could be accessed from a web browser, and also set windows system file security to 'none', all this in registry. Some MSDAC entries had been modified too. I only found one root.exe in /inetpub/scripts, but that was it. McAfee is indeed supported under Windows 2000 Professional, but from what the technical support guy (to call him something) said, it appears that the Server family of Windows 2000 isn't supported, and it may appear that the antivirus is working, when it is not. Best regards, Mike ----- Original Message ----- From: To: Sent: Sunday, February 23, 2003 7:57 PM Subject: [TSCM-L] Re: recent incident. > which strain of Code Red did you identify on this > server? and just curious, given you ID'd it before > McAfee could try, what was the telling symptom that > let you know the server was infected? a root.exe > file or a hacked index.asp? could netstat find a backdoor > on a listening port? > > the reasons i am curious is that the later Code Red strain > is a trojan and anti-virus suites are very limited > in their trojan functions. few people know this and > think trojans are actually virii and that good ole > McAfee will take care of everything. generally, > trojans need to be removed manually by editing > the registry and deleting the individual polymorphically > named files that the registry has generated. and > as far as detecting their presence, AV suites are not > the best choice. you really need to use an anti-trojan > suite like TDS (Trojan Defense Suite), learn the function > of all the TCP and UDP ports and how to monitor the ports' > behavior on the server. the best site around, i think, to > start is: http://tds.diamondcs.com.au/html/danger.htm - you > will be able to download trial versions of their software and > learn about vulnerable ports and over 20,000 strains of trojans. > it's fun. > > but you know, it sounds like your McAfee guy may not > have been the expert about the difference between > virii and trojans and responded with anything they > thought you might believe rather than actual information. > i know McAfee supports Win2000 and it says so on their site: > http://www.mcafee.com/myapps/vs7/default.asp#sysReq > (VirusScan software system req). however, i know when i > used to test trojans for their spy capabilities in the > pre-911 days, we had McAfee installed on W98 and it never > found any of the trojans we tested, even though some of > their names did appear in McAfee's virus definitions list. > we would laugh and pin a red PhD, BS sticker on their > boxes :) > > kk > > > --- In TSCM-L@yahoogroups.com, "Michael Puchol" wrote: > > Hi Matt, > > > > Good advice - I'm going to add my own grain of sand to the > paranoia scale. > > Last night I was at a costumer's offices, where they had > reported "unusual > > activity" in their server and some workstations. Apparently, they > had > > installed McAffee's VirusScan Online, which works by both a real- > time system > > hook detection method, file-access and user-launched scans, > combined with > > automatic updates of the engine and signature files. I've tried it > and works > > reasonably well. > > > > In this case, the server had been infected by Code Red (always > patch thy > > systems!), and for whatever reason VirusScan wasn't picking it up. > I > > contacted McAfee support, and to my surprise, their antivirus does > NOT > > support Windows 2000 Server. This seemed strange since I have > another server > > with it installed and it appeared to do it's job - but no. > Obviously I was a > > tad dissapointed with McAffee to even allow installation of the > antivirus > > without any checking of the operating system version (even the > most basic > > installers can do this), thus giving this costumer a false sense of > > security. > > > > Being in a bit of a hurry to get this costumer up and running > again, I > > installed CA's InoculateIT on the server, which successfully > picked up the > > virus (but couldn't delete it), and ran a normal scan of the > system. Next > > week I'll install Symantec's virus scanner, which has centralised > management > > and some other neat features (and works on servers). > > > > The moral of the story: always check system requirements before > installing > > an antivirus, firewall, IDS or other security software. If in > doubt, ask the > > manufacturer. If then still in doubt, try it on an isolated test > machine > > before deploying it. > > > > Apart from this, I've seen viruses which disable firewall > software, install > > keyloggers, propagate via SMB, etc. This is not uncommon, and it > wouldn't be > > hard to write something which combined some of these 'features'. > > > > Regards, > > > > Mike > > > > > > ----- Original Message ----- > > From: "Matt Paulsen" > > To: > > Sent: Saturday, February 22, 2003 6:33 PM > > Subject: [TSCM-L] recent incident. > > > > > > > Recently had a location that had all the suspicious signs of > corporate > > > espionage - ceo's secretary's workstation was attacking the > server systems > > > and mis's systems, but no one else. Local antivirus only picked > up 1 > > virus > > > and couldn't wipe it. Tools were showing that the workstation > had a > > > keystroke logger in it, as well as it attempting to email to an > aol > > gateway > > > and also attempting smb pipes to propagate - but only to > executive and > > high > > > level network administration systems. > > > > > > Now the first question is, what sort of virus would have a > keystroke > > logger, > > > mail subsystem and propagation system in this manner.. None > really... So, > > a > > > remote scan of the system was done, and it turned out that 4 > virii were > > > detected through this method. > > > > > > Long story short - scan once locally, scan twice remotely and > don't get > > too > > > paranoid. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 6969 From: Rob Muessel Date: Mon Feb 24, 2003 4:28pm Subject: RE: AIRLINE TALK On a flight I was on from S. Carolina back to NYC, the boarding announcement went like this: "Thank you for flying Business Express. Your crew today is flight attendant Naomi Campbell serving you in the cabin. In the cockpit we have Captain James Kirk and First Officer Spock. We hope you enjoy your flight." No one batted an eye. -- -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 www.tscmtech.com USA [Non-text portions of this message have been removed] 6970 From: Matt Paulsen Date: Mon Feb 24, 2003 8:27pm Subject: RE: Re: recent incident. I worked at McAfee on ePolicy Orchestrator a few years ago. I know the developers quite well, 2k is supported... we were working with it before it was released, and were actively joint developing with Microsoft during betas. -----Original Message----- From: Michael Puchol [mailto:mpuchol@s...] Sent: Monday, February 24, 2003 1:40 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Re: recent incident. Hi Valance, Thanks for the information, and yes, the installed Code Red was a dropper. It hadn't opened any ports (neither netstat nor fport showed anything), although I hadn't enough time to leave it running to check for random activity, so I cannot say for sure - only that when I saw the server, Code Red wasn't doing much. The telltale sign was an explorer.exe of only 8KB in C:\. There was a couple of modified registry entries that launched this .exe, which in turn launched the "real" explorer.exe after having done it's "thing". Also, it had mapped two drives, C and D, so that they could be accessed from a web browser, and also set windows system file security to 'none', all this in registry. Some MSDAC entries had been modified too. I only found one root.exe in /inetpub/scripts, but that was it. McAfee is indeed supported under Windows 2000 Professional, but from what the technical support guy (to call him something) said, it appears that the Server family of Windows 2000 isn't supported, and it may appear that the antivirus is working, when it is not. Best regards, Mike ----- Original Message ----- From: To: Sent: Sunday, February 23, 2003 7:57 PM Subject: [TSCM-L] Re: recent incident. > which strain of Code Red did you identify on this > server? and just curious, given you ID'd it before > McAfee could try, what was the telling symptom that > let you know the server was infected? a root.exe > file or a hacked index.asp? could netstat find a backdoor > on a listening port? > > the reasons i am curious is that the later Code Red strain > is a trojan and anti-virus suites are very limited > in their trojan functions. few people know this and > think trojans are actually virii and that good ole > McAfee will take care of everything. generally, > trojans need to be removed manually by editing > the registry and deleting the individual polymorphically > named files that the registry has generated. and > as far as detecting their presence, AV suites are not > the best choice. you really need to use an anti-trojan > suite like TDS (Trojan Defense Suite), learn the function > of all the TCP and UDP ports and how to monitor the ports' > behavior on the server. the best site around, i think, to > start is: http://tds.diamondcs.com.au/html/danger.htm - you > will be able to download trial versions of their software and > learn about vulnerable ports and over 20,000 strains of trojans. > it's fun. > > but you know, it sounds like your McAfee guy may not > have been the expert about the difference between > virii and trojans and responded with anything they > thought you might believe rather than actual information. > i know McAfee supports Win2000 and it says so on their site: > http://www.mcafee.com/myapps/vs7/default.asp#sysReq > (VirusScan software system req). however, i know when i > used to test trojans for their spy capabilities in the > pre-911 days, we had McAfee installed on W98 and it never > found any of the trojans we tested, even though some of > their names did appear in McAfee's virus definitions list. > we would laugh and pin a red PhD, BS sticker on their > boxes :) > > kk > > > --- In TSCM-L@yahoogroups.com, "Michael Puchol" wrote: > > Hi Matt, > > > > Good advice - I'm going to add my own grain of sand to the > paranoia scale. > > Last night I was at a costumer's offices, where they had > reported "unusual > > activity" in their server and some workstations. Apparently, they > had > > installed McAffee's VirusScan Online, which works by both a real- > time system > > hook detection method, file-access and user-launched scans, > combined with > > automatic updates of the engine and signature files. I've tried it > and works > > reasonably well. > > > > In this case, the server had been infected by Code Red (always > patch thy > > systems!), and for whatever reason VirusScan wasn't picking it up. > I > > contacted McAfee support, and to my surprise, their antivirus does > NOT > > support Windows 2000 Server. This seemed strange since I have > another server > > with it installed and it appeared to do it's job - but no. > Obviously I was a > > tad dissapointed with McAffee to even allow installation of the > antivirus > > without any checking of the operating system version (even the > most basic > > installers can do this), thus giving this costumer a false sense of > > security. > > > > Being in a bit of a hurry to get this costumer up and running > again, I > > installed CA's InoculateIT on the server, which successfully > picked up the > > virus (but couldn't delete it), and ran a normal scan of the > system. Next > > week I'll install Symantec's virus scanner, which has centralised > management > > and some other neat features (and works on servers). > > > > The moral of the story: always check system requirements before > installing > > an antivirus, firewall, IDS or other security software. If in > doubt, ask the > > manufacturer. If then still in doubt, try it on an isolated test > machine > > before deploying it. > > > > Apart from this, I've seen viruses which disable firewall > software, install > > keyloggers, propagate via SMB, etc. This is not uncommon, and it > wouldn't be > > hard to write something which combined some of these 'features'. > > > > Regards, > > > > Mike > > > > > > ----- Original Message ----- > > From: "Matt Paulsen" > > To: > > Sent: Saturday, February 22, 2003 6:33 PM > > Subject: [TSCM-L] recent incident. > > > > > > > Recently had a location that had all the suspicious signs of > corporate > > > espionage - ceo's secretary's workstation was attacking the > server systems > > > and mis's systems, but no one else. Local antivirus only picked > up 1 > > virus > > > and couldn't wipe it. Tools were showing that the workstation > had a > > > keystroke logger in it, as well as it attempting to email to an > aol > > gateway > > > and also attempting smb pipes to propagate - but only to > executive and > > high > > > level network administration systems. > > > > > > Now the first question is, what sort of virus would have a > keystroke > > logger, > > > mail subsystem and propagation system in this manner.. None > really... So, > > a > > > remote scan of the system was done, and it turned out that 4 > virii were > > > detected through this method. > > > > > > Long story short - scan once locally, scan twice remotely and > don't get > > too > > > paranoid. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6971 From: Matt Paulsen Date: Mon Feb 24, 2003 9:21pm Subject: RE: Re: recent incident. / off topic Quick note. I'd forgotten that I had started an epo-l group on yahoo for epolicy orchestrator and other virii discussions... No one has really joined it but it's there for those that want to partake in that sort of discussion. Subscribe: epo-l-subscribe@yahoogroups.com 6972 From: Fernando Martins Date: Tue Feb 25, 2003 6:46am Subject: Re: GPS/GSM tracking talking about GSM and news ... http://www.intel.com/update/contents/wi03031.htm btw, the link about dr post is http://www.circuitcellar.com/library/print/0203/ChaoMing151/index.htm FM ----- Original Message ----- From: "Dragos Ruiu" To: Sent: Friday, February 21, 2003 10:53 AM Subject: [TSCM-L] GPS/GSM tracking > Pertinent to an old thread on here, I thought > some people here might be interested to know > that this month's Circuit Cellar magazine has > schematics and construction details for a small > self contianed unit that sends GPS positional > info with 1-25m resolution every two seconds > via GSM SMS messages. cheers, --dr > -- > dr@k... pgp: http://dragos.com/ kyxpgp > http://cansecwest.com > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6973 From: Joshua Krage Date: Tue Feb 25, 2003 9:42pm Subject: Re: Bluetooth Security On Sat, Feb 22, 2003 at 04:37:48PM +0000, Ocean Group - MU TSD wrote: > We've recently been working with a company who's management use wireless > bluetooth access by using headsets for their mobile phones. We've been > considering weather to add this to our risk evaluations. Lots of potential risks. I'm still working through it, but NIST's draft on wireless network security has lots of useful information. From the TOC, it has a description of bluetooth, its weaknesses (including crypto), and includes a list of threats and a security checklist. Look for special pub 800-48, "Wireless Network Security: 802.11, Bluetooth, and Handheld Devices". > We did feel that with its power output 0.25mW or so the risk of using it in > their offices and on compnay premises was somewhat acceptable. Not likely to be in a phone, but apparently the Bluetooth spec, class 3 devices, can range up to 100m. I hadn't seen that before. :/ 6974 From: kondrak Date: Thu Feb 27, 2003 2:04am Subject: RED ALERT! heads up Quick security alert SRI if this is OT, BUT, its a security related subject. >Since most of us deal with UPS this info may be helpful. > > > > > >------------------------------------------------------------------- >FYI ... > >Quick security alert: $32,000 worth of UPS uniforms have been purchased >over the last 30 days by person(s) unknown on eBay. Law enforcement is >working the case however no suspect(s) have been identified. Subjects may >try to gain facility access by wearing these uniforms. >If anyone has suspicions about a UPS delivery (i.e., no truck but driver, >no UPS identification, etc.), contact UPS to verify employment. > > >URGENT >N.J. OFFICE OF COUNTER-TERRORISM ADVISORY >Re: POSSIBLE IMPERSONATION OF UPS PERSONNEL SEEKING ACCESS TO >BUILDINGS >The New Jersey Office of Counter-Terrorism has received a report of an >attempt by an unknown individual to enter a government facility by >falsely posing as an employee of the United Parcel Service. Based on >this incident, security personnel should exercise heightened vigilance >when screening all delivery personnel at the entrances to all buildings and >when accepting deliveries. Such measures should include careful inspection >of credentials and identification of all delivery personnel to ensure that >they are who they purport to be. 6975 From: Kevin Murray Date: Thu Feb 27, 2003 8:59am Subject: Re: RED ALERT! heads up Quick security alert Anonymous and unverified "RED ALERT" postings are definitely not helpful. Before you do a Chicken Little dance on our list please... - Verify your alert to make sure it is not a hoax or malicious disinformation. - State the source of your information with URL link, if possible. - Fully identify yourself. Thank you, Kevin Kevin D. Murray - CPP, CFE, BCFE Murray Associates Eavesdropping Detection and Counterespionage Consultants to Business & Government http://www.spybusters.com On Thursday, February 27, 2003, at 03:04 AM, kondrak wrote: > SRI if this is OT, BUT, its a security related subject. >> Since most of us deal with UPS this info may be helpful. >> ------------------------------------------------------------------- >> FYI ... >> >> Quick security alert: $32,000 worth of UPS uniforms have been >> purchased >> over the last 30 days by person(s) unknown on eBay. Law enforcement is >> working the case however no suspect(s) have been identified. Subjects >> may >> try to gain facility access by wearing these uniforms. >> If anyone has suspicions about a UPS delivery (i.e., no truck but >> driver, >> no UPS identification, etc.), contact UPS to verify employment. >> >> URGENT >> N.J. OFFICE OF COUNTER-TERRORISM ADVISORY >> Re: POSSIBLE IMPERSONATION OF UPS PERSONNEL SEEKING ACCESS TO >> BUILDINGS >> The New Jersey Office of Counter-Terrorism has received a report of an >> attempt by an unknown individual to enter a government facility by >> falsely posing as an employee of the United Parcel Service. Based on >> this incident, security personnel should exercise heightened vigilance >> when screening all delivery personnel at the entrances to all >> buildings and >> when accepting deliveries. Such measures should include careful >> inspection >> of credentials and identification of all delivery personnel to ensure >> that >> they are who they purport to be. 6976 From: Hawkspirit Date: Thu Feb 27, 2003 10:16am Subject: New historical TSCM article I am proud to announce the addition to the historical section of my web site, the full text and pictures of the May 20, 1966 Life Magazine article "The Big Snoop". This is certainly one of the great old TSCM articles written during the time of first awareness of bugging as a real force in America. Included in the article is a section covering one of the first famous original sweepers Bernard Bates Spindel . The URL for this article is: http://www.bugsweeps.com/info/life_article.html Other historical articles can be found at : http://www.bugsweeps.com/info/index.html Roger Tolces Electronic Security Co. Los Angeles www.bugsweeps.com 6977 From: Date: Thu Feb 27, 2003 0:10pm Subject: e-bay and UPS Uniforms While the potential still exists for misuse of uniforms, I believe that the recently mentioned problem has been resolved. I have been advised via another closed list that a law firm retained by UPS has been purchasing the uniforms to prevent them from falling into the wrong hands. Carl Larsen Larsen and Associates Surprise, AZ [Non-text portions of this message have been removed] 6978 From: Fernando Martins Date: Fri Feb 28, 2003 0:03am Subject: Re: CCTV line monitoring For that kind of tasks, what monitors are in use around here? http://www.cbcamerica.com/cctvprod/ganz/monitors/mon_pdf/psm02.pdf FM ----- Original Message ----- From: "Kirk Adirim" To: ; Sent: Wednesday, February 19, 2003 8:04 AM Subject: RE: [TSCM-L] CCTV line monitoring > Hi George, > You make a TINY slit or nick in the coax with a razor knife, then seperate > the braided shielding and foil (if any), expose the dielectric material. > Using a homemade needle probe jig, you penetrate the dielectric and make > contact with the center conductor while avoiding any shorts to the shield. > Another needle is woven slightly into the exposed braided shield to give you > your ground. Both needle probes are terminated onto a piece of RG174/U or > similar coax and run to your hand held video monitor or other test > equipment. > In lieu of slitting the coax, you could obtain one of the circular punches > from a leather belt hole punch. By chucking it into a handle you can cut > out a circular plug of insulation from the side of the coax. Using liquid > tape or neoprene glue, you can reseal your intrusion from moisture. > > Hope this helps, > > Kirk > www.tactronix.com > > > > > -----Original Message----- > From: George Shaw [mailto:george.shaw@u...] > Sent: Sunday, February 16, 2003 7:39 AM > To: tscm-l@yahoogroups.com > Subject: [TSCM-L] CCTV line monitoring > > > OK not directly a case of tracking a monitored line but more a quest to > understand how it could be accomplished. > > Situation: I have a client that has around 55 RG59 coax cables in a > bundle running through the building. None are marked as to which camera > they are coming from or which terminal on the multiplex they are > connected to. The multiplex has 32 + 16 inputs (48) and a selector for > 48 cameras. > > If I can not access the coax ends (at the multiplex) how can I test for > > 1. The presence of a video feed in the coax without breaking the coax > and testing for signal? Say from a point within the building but NOT at > either end, the test has to be as un-intrusive as possible; (no cutting > the coax and rejoining) like a clamp meter for current would do. > > 2. The detection of a live cable i.e. one that is being used as opposed > to a dead coax. Like above no/little intrusion of the coax possible. > > > > -- > George Shaw MI3GTO > > " Any Sufficiently Advanced Technology > is Indistinguishable from Magic" > ---Arthur C. Clarke > > Mobile: +44 (0) 7740 361 163 > Email: george.shaw@u... > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6979 From: Does it matter Date: Wed Feb 26, 2003 4:00pm Subject: Re: Bluetooth Security Bluetooth goes on the back burner as a security issue for now SSL was just cracked a few weeks ago lol. --- In TSCM-L@yahoogroups.com, Joshua Krage wrote: > On Sat, Feb 22, 2003 at 04:37:48PM +0000, Ocean Group - MU TSD wrote: > > We've recently been working with a company who's management use wireless > > bluetooth access by using headsets for their mobile phones. We've been > > considering weather to add this to our risk evaluations. > > Lots of potential risks. I'm still working through it, but NIST's draft on > wireless network security has lots of useful information. From the TOC, > it has a description of bluetooth, its weaknesses (including crypto), and > includes a list of threats and a security checklist. > > > > Look for special pub 800-48, "Wireless Network Security: 802.11, Bluetooth, > and Handheld Devices". > > > > We did feel that with its power output 0.25mW or so the risk of using it in > > their offices and on compnay premises was somewhat acceptable. > > Not likely to be in a phone, but apparently the Bluetooth spec, class 3 > devices, can range up to 100m. I hadn't seen that before. :/ 6980 From: Ocean Group - MU TSD Date: Thu Feb 27, 2003 11:06am Subject: Hmmm... International Security Company eh? Message: 19 Date: Wed, 26 Feb 2003 18:45:45 -0800 (PST) From: G-2 Subject: British bodyguard of killing two Afghans in hotel A British bodyguard was under arrest in Kabul yesterday accused of killing two Afghans in his room in the Intercontinental Hotel. Colin Barry, who works for an unidentified international security firm, was taken into custody after police found two bodies in his room. Mr Barry was wounded and was taken to hospital. Mohammed Khalil Aminzada, Kabul's deputy police chief, said he found one Afghan lying on the floor of Mr Barry's room with his hands tied behind his back while another was slumped across the sofa. Mr Barry told police he was the bodyguard of an American businessman who was married to an Afghan woman but he refused to disclose their identities. Catherine Brooker, a British embassy spokesman, confirmed the shooting and said Mr Barry was wounded. Officers of the 4,800-strong International Security Assistance Force said their troops were not involved in the incident. "We certainly know the incident happened but don't know what kind of business Barry was involved in," said a western official. Mr Aminzada hinted that the case could be linked to gun-running. "It is a very complicated incident and could be linked with arms smuggling and sales of arms," he said. The hotel, high on a hill overlooking Kabul, houses mostly foreign guests and is a centre for visiting businessmen, journalists and aid workers. Its restaurant is a popular meeting place. There has been an explosion in fly-by-night businessmen arriving in the Afghan capital to make quick profits since the Taliban were driven out 15 months ago. Many are young and inexperienced and look for gullible Afghan partners who may have good contacts with government ministers. Thousands of Afghans have also arrived from America, Britain and Germany with their pockets full of dollars, trying to restart their family businesses or begin new ones. Some are involved in the drugs and weapons trades. Foreigners in Kabul have been warned to take extra precautions because of fears that the remnants of al-Qa'eda and the Taliban, who are regrouping in the country's eastern provinces along the border with Pakistan, may try to stage a dramatic shooting or kidnapping of foreigners in Kabul. United Nations officials and foreign diplomats are on a high state of alert. This month a tape recording allegedly made by Osama bin Laden called for suicide bombings in Iraq and http://www.dailytelegraph.co.uk/news/main.jhtml?xml=/news/2003/02/27/wafg27. xml&sSheet=/news/2003/02/27/ixworld.html 6981 From: Date: Thu Feb 27, 2003 2:59pm Subject: Re: RED ALERT! heads up Quick security alert Sherry Black at the New Jersey Office of Counter-Terrorism did confirm this one: URGENT N.J. OFFICE OF COUNTER-TERRORISM ADVISORY Re: POSSIBLE IMPERSONATION OF UPS PERSONNEL SEEKING ACCESS TO BUILDINGS The New Jersey Office of Counter-Terrorism has received a report of an attempt by an unknown individual to enter a government facility by falsely posing as an employee of the United Parcel Service. Based on this incident, security personnel should exercise heightened vigilance when screening all delivery personnel at the entrances to all buildings and when accepting deliveries. Such measures should include careful inspection of credentials and identification of all delivery personnel to ensure that they are who they purport to be. Since you shouldn't believe me, here is where I found their phone number so you can call them if you'd like: http://www.gnyha.org/eprc/general/contact_info/EmergencyContactNumbers.html As of right now I have been unable to confirm the sale of UPS uniforms on eBay. Sherry Black did state that part of the message did NOT originate from the New Jersey Office of Counter-Terrorism. (Embedded image moved to file: pic12423.pcx) ********************************** N O T E ***************************************** All e-mail sent to and from this address will be received or otherwise recorded by the First Banks corporate e-mail system and is subject to archival, monitoring or review by, and/or disclosure to, someone other than the recipient. *********************************************************************************************** [Non-text portions of this message have been removed] 6982 From: MIKE F. Date: Thu Feb 27, 2003 5:11pm Subject: Fwd: Showcasing the rugged defense electronics marketplace! LATER4,Mike F. ------------------------------------------------------------------------ MILITARY & AEROSPACE ELECTRONICS EAST 2003 SHOW WITH COTSCON April 23-24, 2003 Baltimore Convention Center Baltimore, MD http://www.maeshow.com Co-located With: Homeland Security Solutions Conference & Exhibition (http://www.homelandsecuritysolutionsshow.com) $AVE WITH JOINT CONFERENCE & EXHIBITION DISCOUNTS! ======================================== For defense and aerospace systems designers, COTS is now a way of life. The MILITARY & AEROSPACE ELECTRONICS SHOW is moving aggressively to keep pace with fast-moving military and aerospace industries. Do you know the direction that technology for weapons detection and inspection is headed? Would you like to learn how Nano Smart Coating(tm) material could help detect and heal cracks and corrosion in combat vehicles? Or, maybe you would like to join in on an interactive panel discussion on how the experts are coping with aging electronics? Hear these speakers and more at this year's MILITARY & AEROSPACE ELECTRONICS EAST 2003 CONFERENCE. The unique perspective of M&AE magazine translates directly to the conference format. It emphasizes the "why to," rather than the "how to," of military and aerospace electronics design. M&AE is aware of the new paradigms in warfare created since September 11, 2001, and reports on them monthly in print. Electronics is playing an increasing role in military and aerospace systems. This year's ALL-NEW technical sessions will focus on rugged defense electronics and COTS technology, industry and design issues and include: - Weapons Detection and Inspection - Killing Bugs on Mars: NASA JPL Case Study Steve Blackman, Director of Marketing and Business Development, Wind River Systems - Mitigating the Risks of COTS in Military Applications Al Steel, Marketing Account Manager/Defense Programs Analyst, Texas Instruments - Rad-Hardened Electronics Marketplace Dan King, Project Manager, MRC Johari Space Market Analysis, MRC Microelectronics - COTS at All Levels David B. Oeffinger, Fellow Engineer, Northrop Grumman Corporation - Visual Area Networking - Nano Smart Coating(tm) Material for Combat Vehicles Laura Battista, Environmental Engineer, U.S. Army TACOM-ARDEC - Migrating Avionics Systems From MIL-STD-1553 to Higher Speeds Mike Glass, Technical Marketing Manager, Data Device Corporation - Choosing Media for Rugged COTS Data Storage Ofer Tsur, Marketing Manager, M-Systems - PANEL DISCUSSION: Coping with Aging Electronics Moderator: John Keller, Editor-in-Chief, Military & Aerospace Electronics Magazine Panelists: Lt. General Eugene Tattini, US Air Force, Retired, Deputy Director of the Jet Propulsion Laboratory; Philip Hamilton, Vice President of Marketing, VISTA Controls - A Curtiss-Wright Company; and Daniel Smith, Vice President of Integrated Defense Systems, Raytheon Company - Panel Discussion - Real-Time Software Moderator: John Keller, Editor-in-Chief, Military & Aerospace Electronics Magazine Panelists: Mark Griglock, Engineering Manager, Safety-Critical Systems, Green Hills Software; Steve Blackman, Director of Marketing and Business Development, Wind River Systems; and Victor Yodaiken, CEO, FSM Labs - Blackhawk Helicopter, Maneuver Commander's Environment Chris Marzilli, Vice President and General Manager, Commercial Hardware Systems, General Dynamics C4 Systems, Inc. *Speakers/Topics subject to change. For updated speakers and conference descriptions, visit http://www.maeshow.com ------------------------------------------------------------------------------------------- ALL UNDER ONE ROOF! Explore the solutions from recognized leaders in the rugged defense electronics arena as they demonstrate their newest products and services. With over 75 exhibitors, you can count on the Military & Aerospace Electronics Exhibition to deliver the latest news, technology and breakthroughs in the industry. Research products and services including: - Integrated Circuits - Board Products - Computers, Rugged and Commercial - Computer Peripherals - Display/Software - Design & Development Tools - Communications Equipment - Test & Measurement Equipment - Components - Sensors - Power Electronics - Plus much more! ------------------------------------------------------------------------- TWO IMPORTANT EVENTS UNDER ONE ROOF: This year's event is co-located with the HOMELAND SECURITY SOLUTIONS CONFERENCE & EXHIBITION. The Homeland Security Solutions Conference & Exhibition is for systems applications buyers and manufacturers who are intimately connected with efforts to bolster homeland security to prevent and respond to attacks form foreign and domestic terrorists. View the entire program online at http://www.homelandsecuritysolutionsshow.com ------------------------------------------------------------------------- EXHIBITING & SPONSORSHIP OPPORTUNITIES AVAILABLE! Contact Maureen Kane today at (603) 891-9423 or mailto:maureenk@p... to reserve your spot! ------------------------------------------------------------------------ DON'T FORGET TO BOOK YOUR HOTEL ROOM: Sheraton Inner Harbor Hotel 300 South Charles Street Baltimore, MD 21201 Main #/Reservations: (410) 962-8300 Fax: (410) 962-8211 ROOM RATE: $149 plus tax, single/double RATES EXPIRE ON FRIDAY, APRIL 4, 2003 Reservations should be made directly with the hotel. Mention "THE MILITARY & AEROSPACE ELECTRONICS EAST 2003 SHOW" to receive the special show rate at the hotel. ========================================= HERE'S HOW TO REGISTER! Click here to view the entire program online: http://www.maeshow.com Register by March 24, 2003 and save $50 off the regular price! BEST BUY! MILITARY & AEROSPACE ELECTRONICS SHOW AND $925 HOMELAND SECURITY SOLUTIONS CONFERENCE & EXHIBITION Includes admission to all Military & Aerospace Electronics (M&AE) AND Homeland Security Solutions (HSS) sessions; admission to the joint Military & Aerospace Electronics and Homeland Security Solutions exhibition; the Military & Aerospace Electronics AND Homeland Security Solutions proceedings; the networking reception; and lunch on both days. NOTE: The two conferences are running concurrently. Your joint admission will allow you to choose any session from both conferences. MILITARY & AEROSPACE ELECTRONICS SHOW $625 Includes admission to all M&AE Show sessions; admission to the joint HSS and M&AE exhibition; the M&AE proceedings; the networking reception; and lunch on both days. HOMELAND SECURITY SOLUTIONS CONFERENCE & EXHIBITION $625 Includes admission to all HSS sessions; admission to the joint M&AE and HSS exhibition; the HSS proceedings; the networking reception; and lunch on both days. EXHIBITION ONLY $25 Includes admission to the joint M&AE and HSS exhibition on both days and networking reception. CONFERENCE PROCEEDINGS $195 A copy of the M&AE proceedings OR a copy of the HSS proceedings. *Prices good on new registrations only and cannot be combined with any other offer. Simply call, fax, e-mail mailto:atdregistration@p..., go online to http://www.maeshow.com Please remember to include your name, title, company, address, phone, fax, e-mail, which package you are interested in and payment information. Also, please refer to your special discount code: CCE03EM6. Sincerely, Lisa Gowern Registration Coordinator Military & Aerospace Electronics East 2003 Show with COTScon P: 603-891-9267 F: 603-891-9490 E: mailto:atdregistration@p... W: http://www.maeshow.com ------------------------------------------------------------------------ Sponsored by: Military & Aerospace Electronics Magazine (http://www.milaero.com) Produced by: PennWell Co-located with: Homeland Security Solutions Conference & Exhibition (http://www.homelandsecuritysolutionsshow.com) TO UNSUBSCRIBE FROM THIS NOTIFICATION PLEASE CLICK HERE http://mae.omessage.com/uzAAB5cQAAAmYB ===8<===========End of original message text=========== -- Best regards, MIKE mailto:mleogran@t... 6983 From: Mitch D Date: Fri Feb 28, 2003 8:48am Subject: Re: CCTV line monitoring Nice,wonder how much it is......... Just recently picked up a small NTSC B&W monitor from supercircuits, www.supercircuits.com/STORE/prodinfo.aspnumber=MON1&variation=&aitem=49&mitem=232 MON1 Price: $119.95 B/W 3/4 Inch Test Monitor The new pocket-sized MON-1 is perfect for installation applications. The MON-1 makes setup easy. The MON-1 comes with a standard RCA female built-in connector. All that is required for operation is to plug the camera into the MON-1 and then press the activation switch above the viewfinder. Adjustable eyepiece ensures clarity. Measuring 4.4î X 1.7î X 1.3î and weighing a mere 3.5 ounces the handy MON-1 will eliminate bulky test monitors. Powering the MON-1 is three AAA batteries providing over 24 hours of continuous viewing time. Built-in shut-off switch helps prevent dead batteries. Sharp black and white picture. Comes with monitor, easy connection instructions, 30 day money back guarantee and 1 year manufacturerís "I was using a 4"LCD but it didnt last long(less than 2 years) and the picture was terrible.It was 250 bucks new.I figured I'd go with the small one as its cheap to replace in the event of a problem,,,, If you've got a budget to destroy,or someone elses $$ to spend theres a handheld waveform analyzer thats pretty nice, WFM 90 by Tektronics,pricey but nice.... Hope this helps...." MD __________________________________________________ Do you Yahoo!? Yahoo! Tax Center - forms, calculators, tips, more http://taxes.yahoo.com/ 6984 From: Date: Sat Mar 1, 2003 11:27am Subject: Wiretap expert tells the dirt on buggers SavannahNOW | Local News - Wiretap expert tells the dirt on buggers 03/01/03 Wiretap expert tells the dirt on buggers By Tuck Thompson 912.652.0323tuckt@s... Technology has made it easier for people to bug your house and tap your phone. But it also has made it easier to catch them. If the phone company and law enforcement won't help, private companies will fill the void Granite Island Group in Gloucester, Mass., is one of about a dozen "technical surveillance counter measure" firms with high-priced electronic equipment capable of locating wiretaps and bugs. Manager James M. Atkinson said many perpetrators are people obsessed with controlling minutia, from crooked businessmen to public officials who want dirt. Atkinson recently helped a district attorney gather wiretapping evidence on a money-laundering sheriff who was testing the loyalty of his deputies by having them wiretap their staff. "Law enforcement is all about power and control," he said. "Per capita there is more illegal eavesdropping going on by cops than the normal population." Yet from his years of experience, Atkinson said it's "virtually unheard of" for prosecutors to arrest policemen breaking wiretapping laws simply because "it makes the whole criminal justice system look bad." "Cops don't like to bust other cops," he said. Police also catch criminals all the time and know the legal pitfalls to avoid. If you're a victim of a phone wiretapping, your phone company could be blaming you at the same time it covers for staff it knows are listening to your calls or hooking up others. "It goes on quite a bit," Atkinson said of phone workers doing connections for money or favors. Companies discipline workers for major offenses, but usually deny the problem exists to avoid lawsuits. Atkinson carefully screens potential clients because people often claim to be wiretapped because they are paranoid or want attention. But until he shows up with a truck full of surveillance equipment and traces signals to the nearest inch, there's no way to know who is telling the truth. Many "odd" people have proven correct in their suspicions. Many "normal" people have been caught telling lies. There are many links on the local news sidebar regarding this subject. Read more about the industry at A TARGET="_top" HREF="http://www.tscm.com. [Non-text portions of this message have been removed] 6985 From: kondrak Date: Sat Mar 1, 2003 6:11pm Subject: Re: Wiretap expert tells the dirt on buggers Nice article, congrats James! At 17:27 3/1/03 -0500, you wrote: > HREF="http://www.savannahnow.com/stories/030103/LOCbugexpert.shtml">SavannahNOW > | Local News - Wiretap expert tells the dirt on buggers 03/01/03 > > >Wiretap expert tells the dirt on buggers > >By Tuck Thompson >912.652.0323tuckt@s... > >Technology has made it easier for people to bug your house and tap your >phone. But it also has made it easier to catch them. > >If the phone company and law enforcement won't help, private companies will >fill the void > >Granite Island Group in Gloucester, Mass., is one of about a dozen "technical >surveillance counter measure" firms with high-priced electronic equipment >capable of locating wiretaps and bugs. > >Manager James M. Atkinson said many perpetrators are people obsessed with >controlling minutia, from crooked businessmen to public officials who want >dirt. > >Atkinson recently helped a district attorney gather wiretapping evidence on a >money-laundering sheriff who was testing the loyalty of his deputies by >having them wiretap their staff. > >"Law enforcement is all about power and control," he said. "Per capita there >is more illegal eavesdropping going on by cops than the normal population." > >Yet from his years of experience, Atkinson said it's "virtually unheard of" >for prosecutors to arrest policemen breaking wiretapping laws simply because >"it makes the whole criminal justice system look bad." > >"Cops don't like to bust other cops," he said. > >Police also catch criminals all the time and know the legal pitfalls to >avoid. > >If you're a victim of a phone wiretapping, your phone company could be >blaming you at the same time it covers for staff it knows are listening to >your calls or hooking up others. > >"It goes on quite a bit," Atkinson said of phone workers doing connections >for money or favors. Companies discipline workers for major offenses, but >usually deny the problem exists to avoid lawsuits. > >Atkinson carefully screens potential clients because people often claim to be >wiretapped because they are paranoid or want attention. But until he shows up >with a truck full of surveillance equipment and traces signals to the nearest >inch, there's no way to know who is telling the truth. > >Many "odd" people have proven correct in their suspicions. Many "normal" >people have been caught telling lies. > >There are many links on the local news sidebar regarding this subject. > >Read more about the industry at A TARGET="_top" HREF="http://www.tscm.com. > > > > >[Non-text portions of this message have been removed] >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6986 From: kondrak Date: Sun Mar 2, 2003 4:57am Subject: US to bug security council Check THIS out.... http://www.observer.co.uk/iraq/story/0,12239,905954,00.html 6987 From: James M. Atkinson Date: Sat Mar 1, 2003 8:59pm Subject: How The Soviets Are Bugging America How The Soviets Are Bugging America By Sen. Daniel Patrick Moynihan From Popular Mechanics, April 1987 Soviet agents may be listening to your personal telephone conversations. If you're involved in the government, in the defense industry or in sensitive scientific activity, there is a good chance they are. In fact, a recent unclassified Senate Intelligence Committee report on counterintelligence indicates more than half of all telephone calls in the United States made over any distance are vulnerable to interception. Every American has a right to know this. You should also know that the Reagan administration has recognized this threat for a long time now, but so far, the bureaucratic response has been piecemeal, and at times reluctant. Consider this as background: In 1975, when I was named permanent U.S. representative to the United Nations, Vice President Nelson Rockefeller summoned me to his office in the Old Executive Office Building. There was something urgent he had to tell me. The first thing I must know about the United Nations, he said, is that the Soviets would be listening to every call I made from our mission and from the ambassador's suite in the Waldorf Towers. I thought this a very deep secret, and treated it as such. Only later did I learn that Rockefeller had publicly reported this intelligence breach to the president in June 1975. The Rockefeller "Report to the President on CIA Activities Within the United States" notes: "We believe these countries (communist bloc) can monitor and record thousands of private telephone conversations. Americans have the right to be uneasy if not seriously disturbed at the real possibility that their personal and business activities, which they discuss freely over the telephone, could be recorded and analyzed by agents of foreign powers." The Soviets conduct this eavesdropping from their "diplomatic" facilities in New York City; Glen Cove, Long Island; San Francisco; and Washington. By some estimates, they have been doing so since 1958. President Reagan knows this well. He sat on the Rockefeller Commission and signed its final report concluding that such covert activities existed. If we had any doubts about this eavesdropping effort, Arkady Schevchenko dispelled them when he came over in 1975 and subsequently defected in 1978. As you will recall, Schevchenko was, at the time, the second-ranking Soviet at the United Nations and an up-and-comer in the Soviet hierarchy. He describes the listening operation in New York City in his book "Breaking With Moscow": "The rooftops at Glen Cove, the apartment building in Riverdale, and the Mission are bristled with antennas for listening to American conversations." But we have to worry about more than just parabolic dish antennas tucked behind the curtains in the Soviet "apartment" building in Riverdale, New York. There are also those Russian trawlers that travel up and down our coast. They are fishing, but fishing for what? Communications. And now the Soviets have taken their eavesdropping a step further and have built two new classes of AGI, or Auxiliary Gathering Intelligence, vessels. From the hull up, these new vessels are floating antennas, I suppose. Most dangerous of all, perhaps, is the Soviet listening complex in Lourdes, Cuba, just outside of Havana. This facility is the largest such Soviet listening facility outside its national territory. According to the president, it "has grown by more than 60 percent in size and capability during the past decade." Lourdes allows instant communications with Moscow, and is manned by 2100 Soviet technicians. 2100! By comparison, our Department of State numbers some 4400 Foreign Service Officers - total. Again, to cite the recent Senate Intelligence Committee report: "The massive Soviet surveillance efforts from Cuba and elsewhere demonstrate ... that the Soviet intelligence payoff from the interception of unsecured communications is immense." Intelligence specialists are not prone to exaggeration, they do not last long that way. You can be assured that "massive" and "immense" are not subtle words as used in this context. There are, however, two things you should know. First, our most secret government messages are now protected from interception or are scrambled, and all classified message and data communications are secure. In addition, protected communications zones are being established in Washington, San Francisco and New York by rerouting most government circuits and by encrypting microwave links which continue to be vulnerable to intercept. But there are still communications links which carry unclassified, but sensitive, information that we need to protect. Second, it is a truism in the intelligence field that while bits of information may be unclassified, in aggregate they can present a classified whole. The Senate Intelligence Committee informs us, "Due to inherent human weakness, government and contractor officials, at all levels, inevitable fail to follow strict security rules ... Security briefings and penalties were simply not adequate to prevent discussion of classified information on open lines." If the Soviets CAN piece it together, you must assume they WILL given the resources they invest toward this effort. But the intelligence community needs no reminder that we are up against a determined and crafty opponent. In 1983, for example, a delegation of Soviet scientists were invited to tour a Grumman plant on Long Island. No cameras. No notes. All secure, right? Wrong. The delegation had attached adhesive tape to the soles of their shoes to gather metal fragments from the plant floor for further study at home. The Soviets are pretty good at metallurgy - probably the best in the world - and we don't need to help them any further. But concern is not always translated into budgetary action, at least not in the realm of communications security. Let us take a look at the technical problem confronting us. As you know, there are two basic ways voice can be transmitted over telephone media: digital and analog. Analog refers to voice waves which are modulated (amplified) up to a very high frequency (HF). That is, they are increased in speed from hundreds of cycles per second to thousands of cycles per second. This facilitates their passage over distance. Nevertheless, because analog radio waves diminish rapidly over distance, it's necessary to periodically amplify, or boost, the signal either at a microwave relay tower repeater or satellite transponder. (Actually, the signals are diminished in frequency to voice quality and then brought back up to high frequency.) Digital transmissions are voice or data vibration signals which are converted into a series of on-and-off pulses, zeros and ones, as in a computer. Like analog telephone calls, digital calls go through a process of modulation and demodulation. For the purposes of this discussion, we need only remember two things about analog and digital telephony. First, analog telephony is fast being replaced by digital telephony because it better translates computer language. But, more importantly, after a high initial overhaul cost, it's possible to send thousands of digital calls (bundles) over a single conduit. Therefore, as we expand our digital capacity, we must ensure that both our analog and digital communications are protected from Soviet eavesdropping. Second, sending bundles over a single conduit is the base block at which we introduce the encryption I am talking about. When you place a long-distance telephone call from point A to point B, there are three communications paths, or circuits, over which your call might travel: microwave, satellite or cable. Cable is the most secure. However, it is the least practical and economical method for bulk transmission over long distances. As a result, 90 percent of our long-distance telephone traffic is sent by microwave or satellite, and that which is in the air can be readily intercepted. As your signal travels along the cable from your home to the local switching station and then on to a long-haul switching station, it is combined (stacked and bundled might better describe the process) with as many as 1200 other signals trying to get to the same region of the country. This system of stacking and bundling signals is called multiplexing and it's how the telecommunications industry gets around the problem of 7 million New Yorkers all trying to call their senator at the same time on the same copper wire or radio frequency. If you use a common carrier, that is, if you have not rented a dedicated channel from a telecommunications company, a computer at the long-haul switching station will select the first available route to establish a circuit over which your call signals may travel. Therefore, calls that the caller believes to be on less vulnerable circuits may be automatically switched to more vulnerable ones. All this takes place in 1 to 3 seconds. So let's follow your call as it goes by either microwave or satellite. If your call goes via microwave, it will be relayed across the country as a radio wave in about 25-mile intervals from tower to tower (watch for the towers the next time you drive on an interstate route) until it eventually reaches a distant switching station where it is unlinked from the other signals, passed over cable to your friend's telephone, and converted back into voice. The problem with this system: Along these microwave paths there is what we call "spill". This measures about 12.5 meters in width and the full 25 miles between towers. This is where the microwave signal is most at risk. Using a well- aimed parabolic dish antenna (located, let's say, on the top of Mount Alto, one of the highest hills in the District of Columbia, and the site of the new Soviet embassy) you can intercept this signal and pull it in. And that is just what the Soviets are doing. My solution: Throw the bastards out if they are listening to our microwave signals. Nothing technical about it. On three occasions I have introduced legislation requiring the president to do just that, unless in doing so, he might compromise an intelligence source. On June 7, 1985, this measure was adopted by the Senate as Title VII to the Foreign Relations Authorization Bill, but it was dropped in conference with the House of Representatives at the urging of the administration. Nevertheless, I think the administration accepted the simple logic behind the proposal when at the end of October, 55 Soviet diplomats were ordered to leave the country, including, The New York Times tells us, "operatives for intercepting communications." Now, let's not let the Soviets just replace one agent with another. The process is much the same for a satellite telephone call. Today, approximately eight telecommunications carriers offer satellite service using something like 25 satellites. Let's suppose your signal has traveled to a long-haul switching station and all microwave paths are filled. The carrier's computer searches for an alternative path to send the signal and picks out a satellite connection. At the ground station, your call is sent by a transponder up to a satellite and then down again to a distant ground station. Using an array of satellite dishes at Lourdes, the Soviets can seize these signals from the sky just as a backyard satellite dish can pull in television (and telephone) signals. High speed computers then sort through the calls and identify topics and numbers of particular interest. And if the information provided is real time intelligence, the Soviets have the ability to transmit it instantaneously to Moscow. And yes, the Soviets have the range at Lourdes to grasp our satellite transmissions as they travel from New York to Los Angeles or Washington to Omaha. Here, too, there is a solution: Develop and procure cryptographic hardware for use at the common-carrier long- haul switching stations. This hardware will encrypt the multiplexed telephone signals (that is, approximately 1200 calls at a time) before they are transmitted as radio waves from ground station to ground station, a technique analogous to the cable networks scrambling their signals. This can be done for under $1 billion. If we start by encrypting just those unclassified signals we categorize as sensitive, those having greatest impact on the national defense or foreign relations of the U.S. government, it would cost us about half as much. It would cost us so much more not to do so. Communications security has no constituency. There is no tangible product and the public can never really be sure that we have done anything. But National Security Decision Directive 145 says it is a national policy and the national responsibility to offer assistance to the private sector in protecting communications. It's time to make communications security (ComSec in the lingo) a true national security priority supported with resources as well as rhetoric. This was certainly the conclusion of the comprehensive Intelligence Committee report. I agree, and have suggested a way to get on with it. If someone has a better idea - if you have another idea - I would be happy to know it. The important thing is that we stop this massive leak of sensitive information and protect your privacy. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6988 From: Date: Sun Mar 2, 2003 6:21am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 6989 From: Date: Sun Mar 2, 2003 6:21am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6990 From: A Grudko Date: Sun Mar 2, 2003 1:27pm Subject: Revealed: US dirty tricks to win vote on Iraq war From another group. Andy Grudko Johannesburg > Revealed: US dirty tricks to win vote on Iraq war > > Secret document details American plan to bug phones and emails of key > Security Council members > > Martin Bright, Ed Vulliamy in New York and Peter Beaumont > Sunday March 2, 2003 > The Observer > > The United States is conducting a secret 'dirty tricks' campaign against UN > Security Council delegations in New York as part of its battle to win votes > in favour of war against Iraq. > Details of the aggressive surveillance operation, which involves > interception of the home and office telephones and the emails of UN > delegates in New York, are revealed in a document leaked to The Observer. > > The disclosures were made in a memorandum written by a top official at the > National Security Agency - the US body which intercepts communications > around the world - and circulated to both senior agents in his organisation > and to a friendly foreign intelligence agency asking for its input. > > The memo describes orders to staff at the agency, whose work is clouded in > secrecy, to step up its surveillance operations 'particularly directed at... > UN Security Council Members (minus US and GBR, of course)' to provide > up-to-the-minute intelligence for Bush officials on the voting intentions of > UN members regarding the issue of Iraq. > > The leaked memorandum makes clear that the target of the heightened > surveillance efforts are the delegations from Angola, Cameroon, Chile, > Mexico, Guinea and Pakistan at the UN headquarters in New York - the > so-called 'Middle Six' delegations whose votes are being fought over by the > pro-war party, led by the US and Britain, and the party arguing for more > time for UN inspections, led by France, China and Russia. > > The memo is directed at senior NSA officials and advises them that the > agency is 'mounting a surge' aimed at gleaning information not only on how > delegations on the Security Council will vote on any second resolution on > Iraq, but also 'policies', 'negotiating positions', 'alliances' and > 'dependencies' - the 'whole gamut of information that could give US > policymakers an edge in obtaining results favourable to US goals or to head > off surprises'. > > Dated 31 January 2003, the memo was circulated four days after the UN's > chief weapons inspector Hans Blix produced his interim report on Iraqi > compliance with UN resolution 1441. > > It was sent by Frank Koza, chief of staff in the 'Regional Targets' section > of the NSA, which spies on countries that are viewed as strategically > important for United States interests. > > Koza specifies that the information will be used for the US's 'QRC' - Quick > Response Capability - 'against' the key delegations. > > Suggesting the levels of surveillance of both the office and home phones of > UN delegation members, Koza also asks regional managers to make sure that > their staff also 'pay attention to existing non-UN Security Council Member > UN-related and domestic comms [office and home telephones] for anything > useful related to Security Council deliberations'. > > Koza also addresses himself to the foreign agency, saying: 'We'd appreciate > your support in getting the word to your analysts who might have similar > more indirect access to valuable information from accesses in your product > lines [ie, intelligence sources].' Koza makes clear it is an informal > request at this juncture, but adds: 'I suspect that you'll be hearing more > along these lines in formal channels.' > > Disclosure of the US operation comes in the week that Blix will make what > many expect to be his final report to the Security Council. > > It also comes amid increasingly threatening noises from the US towards > undecided countries on the Security Council who have been warned of the > unpleasant economic consequences of standing up to the US. > > Sources in Washington familiar with the operation said last week that there > had been a division among Bush administration officials over whether to > pursue such a high-intensity surveillance campaign with some warning of the > serious consequences of discovery. > > The existence of the surveillance operation, understood to have been > requested by President Bush's National Security Adviser, Condoleezza Rice, > is deeply embarrassing to the Americans in the middle of their efforts to > win over the undecided delegations. > > The language and content of the memo were judged to be authentic by three > former intelligence operatives shown it by The Observer. We were also able > to establish that Frank Koza does work for the NSA and could confirm his > senior post in the Regional Targets section of the organisation. > > The NSA main switchboard put The Observer through to extension 6727 at the > agency which was answered by an assistant, who confirmed it was Koza's > office. However, when The Observer asked to talk to Koza about the > surveillance of diplomatic missions at the United Nations, it was then told > 'You have reached the wrong number'. > > On protesting that the assistant had just said this was Koza's extension, > the assistant repeated that it was an erroneous extension, and hung up. > > While many diplomats at the UN assume they are being bugged, the memo > reveals for the first time the scope and scale of US communications > intercepts targeted against the New York-based missions. > > The disclosure comes at a time when diplomats from the countries have been > complaining about the outright 'hostility' of US tactics in recent days to > persuade then to fall in line, including threats to economic and aid > packages. > > The operation appears to have been spotted by rival organisations in Europe. > 'The Americans are being very purposeful about this,' said a source at a > European intelligence agency when asked about the US surveillance efforts. 6991 From: Steve Uhrig Date: Mon Mar 3, 2003 0:21pm Subject: RE: Taking byte from Baghdad On 3 Mar 2003 at 12:53, Kutlin, Josh wrote: > First I want to say thank you to all those who wrote back and gave me > some great ideas and good links. > What I wound up doing was taking 100 feet of 22 gauge insulated > speaker wire, and I hung it off my balcony (does not touch the > ground). Then ran it to a piece of insulated copper via alligator clip > and into a connector for the external antenna. I also tried hooking it > up to the chepo antenna on the radio but the results where ...uhh sub > par. The reception when I use the external jack is great. However I > now have a different problem. I have multiple stations coming in on > one frequency and a lot of other noise. I am looking to "tune the > wire". Any suggestions on where to look for a solution? I have seen > some sites that recommend connecting to the long wire at different > points. Would this help? Most likely you are overloading the receiver. That means you are cramming more signal down its throat than it is designed to handle. Remember, anything metallic picks up every frequency, although at different levels of efficiency. 100 feet is quite long. I suspect that long length of wire is gathering lots of signals on lots of frequencies all over, at fairly strong levels. The receiver is unable to separate the single signal on one frequency you want from the loud jumble of signals at many frequencies it is being fed. This is a simple explanation, but I hope it makes a bit of sense. Tuning the long wire is probably not what you want. That will make it more efficient. You need it less efficient. I'd shorten it to perhaps 40 feet, which very roughly is resonant at 11.175 megacycles. It's not at all critical for receive. Also, you could be living near some loud broadcast stations, like AM or FM radio or television. You could be picking up those extremely loud signals. Those signals can mix with many other unwanted (and unknown) signals your antenna is picking up and create 'intermod products' which are the sums and differences of the two frequencies. This can be happening inside your receiver, or external. As a crude example, say there was a radio station near you transmitting a loud signal at 88 megacycles (bottom of FM broadcast band). And say there was a paging transmitter interconnect at 76 megacycles, which is very common. The difference between these two frequencies, 12 megacycles, as well as the sum, 164 megacycles, are 'intermod products'. The 12 megacycle signal would very likely swamp the 11 megacycle you are trying to listen to, which will be fairly weak. The solutions to these are proper antenna design and, preferably, a higher quality receiver. Better receivers have better filters, preselectors, and in newer ones, some digital processing to help out. You can do a fine job with the simpler and older receivers. The best receiver I own for shortwave listening is an old Drake 2B with tubes, probably manufactured in the late 1960s. I'm not implying you need a better receiver. I'm trying to give you the theory so you can understand and work through things. Shorten your antenna. I've received and transmitted around the world with only a few watts into some test leads clipped together and to a picture on the wall. One end of my wire antenna fell down in a snowstorm, and yesterday, with one end laying in the snow, I still was hearing wall to wall South American stations on 28 megacycles. Brazil and Argentina were pounding in. I did not try, but I suspect with six feet of wire hung out the window of the room I would have heard some of them. I was using a very sensitive and selective homebuilt receiver however. But when signals are strong, like if there is an AM broadcast station in town, you can receive them, literally, with a rusty razor blade and a safety pin detector, a simple capacitor and coil wound on a toilet paper tube, and a cheap earphone. Many of us did that as kids. Look for a crystal radio kit in one of the online catalogs. Modern receivers are very sensitive. That is cheap. Selectivity is a more important spec, and is more expensive. If you could find a ham radio club or local ham radio operator in your area, he probably would be pleased to assist you, and could identify the problem quickly if he was sitting in front of your equipment. Contact www.arrl.org to locate a ham radio club near you if you don't know any local hams. They play with antennas for fun, and if they live near you are likely to know the loud local signals which can contribute to intermod. Keep us posted. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6992 From: Hawkspirit Date: Mon Mar 3, 2003 6:23pm Subject: Dektor Anyone know if Dektor is still around, I have an associate that needs chart paper and other parts for a PSE. Thanks Roger From: James M. Atkinson Date: Sun Feb 24, 2002 4:06pm Subject: Performance Standards - RF Survey I would like to propose some discussion and get some some feedback from other list members concerning the detection of RF fields during a TSCM survey. As we know eavesdroppers like to exploit the RF spectrum, and that every spy shop carries various toys that show up all up and down the RF spectrum. Typically, if the TSCM specialist can get within just a few wavelengths of the device it can be detected 100% of the time even with primitive products such as broadband field detectors, or feedback detectors. The only problem is that the farther we move away from the device the greater the difficulty of detection due to reduced signal levels. Getting really close to the eavesdropping device is well and good, but when you get to close to the area your checking for bugs the greater the likelihood that you will tip off the eavesdropper. Take for example an eavesdropping situation where the bug is a video transmitter in a clock on an executive desk. By the time you drag your equipment cases into the office to be inspected and set up the bug detection equipment for the sweep the eavesdropper already has been watching and/or listening to you for 20-30 minutes. Because of this, we initially set up some distance away and direct our equipment toward the area that will be inspecting to see if we can sniff out any potential eavesdropping signal of interest. We then move closer, repeat, and then move closer until we are inside the area actually being checked. Since the TSCM'er is some distance away and the signals are fairly low level we have to use some sophisticated equipment to pull the signal up to a level where it can be detected. I would suggest that 100 percent of the time a TSCM specialist must be able to detect and pinpoint a (not greater then) -50 dBm NBFM signal from a remote (171 or 400 MHz) source at distance of at least 50 feet and passing though at least two interior walls. If we drop the power levels even further so that we have no more then -80 dBm coming off the signal source antenna, push the distances out to 300 feet, and add an exterior wall and 2-3 more interior walls we come up with an even better "detection model" where you should be able to detect the signal better then 99% of the time (at a distance of 300 feet). What all this means is that we need to be using equipment with a sensitivity of well under -100 dBm, and we need to have the ability to isolate the signal (using directional antennas and methods) while still some distance from the area being checked. I routinely use a calibrated -130 dBm signal (.1 uV) with a 1 kHz sliver FM modulated signal for equipment function checks (with the antenna's 24 inches apart). -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4864 From: James M. Atkinson Date: Sun Feb 24, 2002 6:45pm Subject: Re: Performance Standards - RF Survey [errata] Oops, I made a typo: The line should have read "... -130 dBm signal (well below.1 uV) with a 1 kHz..." I would point out that -130 dBm = -23 dBuV and -117 dBm (into a 50 ohm load) would be .1 uV I apologize for the error, mea cupla. -jma [snip] >I routinely use a calibrated -130 dBm signal (.1 uV) with a 1 kHz >sliver FM modulated signal for equipment function checks (with the >antenna's 24 inches apart). > >-jma > -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4865 From: tek492p Date: Sun Feb 24, 2002 7:07pm Subject: Re: Performance Standards - RF Survey My main piece of "RF detection" equipment consists of a Tektronix 492 spectrum analyzer and a Diamond D-130J 25-to-1300 Mhz discone antenna. (I have other antennas for higher frequencies). I also have a "test transmitter", (manufactured by Vega), which is basically a motion picture wireless microphone. The frequency is 169.925 Mhz, 50 mW, NBFM. Another "test transmitter", (manufactured by Com-Tek), also a motion picture wireless microphone, transmits on 72.1 MHZ, 25 mW, NBFM. I am also an amateur (ham) radio operator, and have about a dozen, or more, various transmitters ranging in frequency from 40 MHz to 500 Mhz, with power levels from 10 mW to 100 mW. Some I bought, some I built myself from scratch, some are audio modulated, others are just "oscillators". A source for "wireless microphones", is your local Radio Shack or electronics store. Anyway, (and getting to the point), I set-up the spectrum analyzer in my house with the discone antenna. Then I walk around the neighborhood at night with several of my "test transmitters", and place them next to the side of a house at various distances from a few houses away to several blocks. Depending on the power level and number of buildings, parked cars, and bushes, I can detect my test transmitters anywhere from 300 to 1,000 feet away. While this is not a "calibrated" test, it does give me a very good idea of the real world detection capabilities of my 492-with-discone antenna set-up. Jack Lindauer Intertect TSCM services Los Angeles (818) 831-0515 --- In TSCM-L@y..., "James M. Atkinson" wrote: > > I would like to propose some discussion and get some some feedback > from other list members concerning the detection of RF fields during > a TSCM survey. > > > I would suggest that 100 percent of the time a TSCM specialist must > be able to detect and pinpoint a (not greater then) -50 dBm NBFM > signal from a remote (171 or 400 MHz) source at distance of at least > 50 feet and passing though at least two interior walls. > > If we drop the power levels even further so that we have no more then > -80 dBm coming off the signal source antenna, push the distances out > to 300 feet, and add an exterior wall and 2-3 more interior walls we > come up with an even better "detection model" where you should be > able to detect the signal better then 99% of the time (at a distance > of 300 feet). > > > -jma 4866 From: Steve Uhrig Date: Sun Feb 24, 2002 6:22pm Subject: What are decibels and what do they mean to me? Once upon a midnight dreary, James M. Atkinson pondered, weak and weary: > I would suggest that 100 percent of the time a TSCM specialist must > be able to detect and pinpoint a (not greater then) -50 dBm NBFM > signal from a remote (171 or 400 MHz) source at distance of at least 50 > feet and passing though at least two interior walls. -50 dBm is 1x10^(-8) watts, or 0.01 microwatts, or 1/100 of a microwatt, or 1/100th of a millionth of a watt, or 1 nanowatt if I did all the math correctly in my head. Such power levels at any frequency or any mode will not radiate the length of your arm unless possibly in a vacuum. The noise level in your equipment will be much higher. There may be an error in this -50 dBm spec. A typical Cony or Deco or similar common bug transmits a signal of perhaps +13dBm (20 milliwatts) into a probably inefficient antenna. Most of these are WBFM, but it makes no difference. That would be a more realistic spec to look for, as radiated from the hostile or test device, not as received at the input to the TSCM equipment. As a guide for others, remember dBm is a reference power level compared to a milliwatt. The lower case m in dBm means milliwatt. The d in dBm means deci, or 1/10, of a Bel. The capital B is Bel, in honor of Alexander Graham. Since a Bel is a fairly large amount, we use decibels, or dB, which is 1/10 of a Bel, or 0.1 Bel. We write this as dB, and if referenced to 1 milliwatt (remember watt is power), 1 dBm. When writing these figures, a positive number is assumed unless a -- (minus) sign is specified. A positive sign can be used, but if not, the number is assumed to be positive. 3 dB is twice or one half, depending on which way you are going. So 3dBm means twice 0dBm, or 2 milliwatts. -3dBm would be 1/2 of a milliwatt, or 0.5 milliwatts, or 500 microwatts. 10 dB is ten times, or 1/10th, again depending on which way you are going. So -10dBm is 1/10 of a milliwatt, or 0.1 miliwatt, or 100 microwatts. A microwatt is a millionth of a watt. A milliwatt is, of course, a thousandth of a watt. -20 dBm is read as (1/10th of 1/10th), or 1/100. Or 1/100 of a milliwatt, which is 10 microwatts. -30 dBm is (1/10th of 1/10th of 1/10th), or 1/1000 overall, or 0.001 of a milliwatt, or 1 microwatt. -40dBm is 1/10th of a microwatt, or 0.1 microwatts. -50 dBm is (1/10th of 1/10th), or 1/100th of a microwatt overall, or 0.01 microwatts. 1/100th of a MICROWATT. To further explain, every 3 dB doubles or halves the power level. Doubles if positive, halves if negative. Every 10 dB multiplies power by 10 if positive, or divides by 10 if negative. EVERYONE should master the above, which is the most basic of electronics theory. Then when some place specifies a power output of a device as +13 dBm, you will know it is 20 milliwatts (1 milliwatt times 10dB = 10 milliwatts, then again times 3dB doubles to 20 milliwatts). Sometimes places try to disguise power output levels by referencing them in dB. dB is a relative level. If you say 10 dB gain, you have to say 10dB referenced to WHAT? 10dB is ten times, but ten times WHAT? If it is written as 10 dBm, then you know they mean 10 times one milliwatt, also stated as 10 dB referenced to 1 milliwatt. The lower case m means milliwatt. so 10 dBm is 10 milliwatts. 0dBm is 1 milliwatt of power, and you can go from there. Read all the above until it makes sense. The important thing to master is 10dB is 10 times or 1/10th (if negative), and 3dB is twice or one half (one half if negative.) +10dB =10 times the power -10dB=1/10th the power (negative) +3dB=twice the power -3dB=one half the power (negative) Learn the few lines above, and you will be able to read specs and spec sheets like a pro. I recommend printing this message and saving it, or putting it in your paper documentation you carry with your sweep gear. The wizards out there, please correct me if I made any errors above. I am on some pretty severe preop meds preceding back surgery tomorrow morning. Can barely focus and am an absolute bubblehead, but I think the above is correct. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4867 From: john schmitt Date: Sun Feb 24, 2002 11:23pm Subject: Re: What are decibels and what do they mean to me? Dear Steve, I'm hopeful your surgery is painless and successful, but your math lexicon is a little off. A nanowatt is 1 billionth of a watt, 10^-9 being the general definition of nano. Nano, nano, as Mork used to say. Your advice to TSCM novices is a good start but rather than just printing off your notes they ought to have a good basic math course with logarithmic concepts such as what decibels are based upon. I'd venture that your lesson about how 13 db is 20x is lost on most people who don't have the basis concepts. John Schmitt ----- Original Message ----- From: "Steve Uhrig" To: Sent: Sunday, February 24, 2002 7:22 PM Subject: [TSCM-L] What are decibels and what do they mean to me? > Once upon a midnight dreary, James M. Atkinson pondered, weak and weary: > > > I would suggest that 100 percent of the time a TSCM specialist must > > be able to detect and pinpoint a (not greater then) -50 dBm NBFM > > signal from a remote (171 or 400 MHz) source at distance of at least 50 > > feet and passing though at least two interior walls. > > -50 dBm is 1x10^(-8) watts, or 0.01 microwatts, or 1/100 of a microwatt, > or 1/100th of a millionth of a watt, or 1 nanowatt if I did all the math > correctly in my head. > > Such power levels at any frequency or any mode will not radiate the > length of your arm unless possibly in a vacuum. > > The noise level in your equipment will be much higher. > > There may be an error in this -50 dBm spec. > > A typical Cony or Deco or similar common bug transmits a signal of > perhaps +13dBm (20 milliwatts) into a probably inefficient antenna. Most > of these are WBFM, but it makes no difference. That would be a more > realistic spec to look for, as radiated from the hostile or test device, > not as received at the input to the TSCM equipment. > > As a guide for others, remember dBm is a reference power level compared > to a milliwatt. The lower case m in dBm means milliwatt. The d in dBm > means deci, or 1/10, of a Bel. The capital B is Bel, in honor of > Alexander Graham. Since a Bel is a fairly large amount, we use decibels, > or dB, which is 1/10 of a Bel, or 0.1 Bel. We write this as dB, and if > referenced to 1 milliwatt (remember watt is power), 1 dBm. > > When writing these figures, a positive number is assumed unless a -- > (minus) sign is specified. A positive sign can be used, but if not, the > number is assumed to be positive. > > 3 dB is twice or one half, depending on which way you are going. So 3dBm > means twice 0dBm, or 2 milliwatts. -3dBm would be 1/2 of a milliwatt, or > 0.5 milliwatts, or 500 microwatts. > > 10 dB is ten times, or 1/10th, again depending on which way you are > going. So -10dBm is 1/10 of a milliwatt, or 0.1 miliwatt, or 100 > microwatts. A microwatt is a millionth of a watt. A milliwatt is, of > course, a thousandth of a watt. > > -20 dBm is read as (1/10th of 1/10th), or 1/100. Or 1/100 of a milliwatt, > which is 10 microwatts. > > -30 dBm is (1/10th of 1/10th of 1/10th), or 1/1000 overall, or 0.001 of a > milliwatt, or 1 microwatt. > > -40dBm is 1/10th of a microwatt, or 0.1 microwatts. > > -50 dBm is (1/10th of 1/10th), or 1/100th of a microwatt overall, or 0.01 > microwatts. 1/100th of a MICROWATT. > > To further explain, every 3 dB doubles or halves the power level. Doubles > if positive, halves if negative. > > Every 10 dB multiplies power by 10 if positive, or divides by 10 if > negative. > > EVERYONE should master the above, which is the most basic of electronics > theory. Then when some place specifies a power output of a device as +13 > dBm, you will know it is 20 milliwatts (1 milliwatt times 10dB = 10 > milliwatts, then again times 3dB doubles to 20 milliwatts). Sometimes > places try to disguise power output levels by referencing them in dB. > > dB is a relative level. If you say 10 dB gain, you have to say 10dB > referenced to WHAT? 10dB is ten times, but ten times WHAT? If it is > written as 10 dBm, then you know they mean 10 times one milliwatt, also > stated as 10 dB referenced to 1 milliwatt. The lower case m means > milliwatt. so 10 dBm is 10 milliwatts. 0dBm is 1 milliwatt of power, and > you can go from there. > > Read all the above until it makes sense. The important thing to master is > 10dB is 10 times or 1/10th (if negative), and 3dB is twice or one half > (one half if negative.) > > +10dB = 10 times the power > -10dB = 1/10th the power (negative) > > +3dB = twice the power > -3dB = one half the power (negative) > > Learn the few lines above, and you will be able to read specs and spec > sheets like a pro. > > I recommend printing this message and saving it, or putting it in your > paper documentation you carry with your sweep gear. > > The wizards out there, please correct me if I made any errors above. I am > on some pretty severe preop meds preceding back surgery tomorrow morning. > Can barely focus and am an absolute bubblehead, but I think the above is > correct. > > Steve > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4868 From: James M. Atkinson Date: Mon Feb 25, 2002 10:41am Subject: Tiny Insect Could Hold Key to Better Listening Devices [I can just see it now... the spy shops try to convince customers that by inserting a $5,000 genetically altered secret house fly into their ear canal that they can listen though walls at 300 feet. -jma] Fly Research Creates Buzz Tiny Insect Could Hold Key to Better Listening Devices By Jessica Rappaport, Tech Live Feb. 21 We all know the expression "if I could be a fly on the wall ä" But if you could be a fly, you would probably want to be the Ormia ochracea. This insect is only a quarter-inch long and together, its ears are smaller than a period at the end of a sentence. The ears may be tiny, but their directional hearing is so acute they are the basis of a biomimicry project that may lead to the next generation of hearing aids and spy microphones. A common complaint among hearing-aid users is that they are unable to focus on a speaker in a crowd because of all of the background noise. What hearing-aid wearers need is a device that offers better directional hearing. This is where the Ormia ochracea excels. Researchers hope to mimic the fly's hearing capabilities. Ten years ago, Cornell University professor Ron Hoy and biologist Daniel Robert from the University of Zurich started studying how the nervous systems of small animals work. They were interested in how the ears of the Ormia ochracea work. So they contacted professor Ronald Miles at Binghamton University because of his ability to measure the vibrations of small things. From Fly to Super Bug Slowly, the team located Ormia ochracea's eardrums, located just behind the fly's face. The ears are so close together the sound waves arrive only a few billionths of a second apart. The tissue bridge between the two eardrums amplifies the tiny time difference in sound wave arrival which gives the fly its exceptional hearing capabilities. After testing the fly and realizing how precise its hearing is, the team decided to apply the knowledge. The team developed a prototype that mimics the fly's hearing. The prototype is made of silicon and looks like a computer chip. "It's certainly an example of how engineers and technology can learn cool things from animals," Miles said. "It might be if someone was smart enough they would have been able to figure it out without looking at the animal, but I think that after looking at how this ear works it gave us different sorts of ideas on how you would make a microphone." The team is still several years away from producing commercial uses for this technology. But one day people may practically have the ability to be a fly on a wall, with hearing so precise they can listen in on all juiciest gossip. The first usable device is not expected until 2005, although researchers say that date could be pushed forward if national security concerns lead to an increase in research and development funding. Copyright 2002 TechTV, Inc. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. Copyright © 2002 ABC News Internet Ventures. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "It is not the critic who counts, not the man who points out how the strong man stumbled, or where the doer of deeds could have done better. The credit belongs to the man who is actually in the arena; whose face is marred by the dust and sweat and blood; who strives valiantly; who errs and comes short again and again; who knows the great enthusiasms, the great devotions and spends himself in a worthy course; who at the best, knows in the end the triumph of high achievement, and who, at worst, if he fails, at least fails while daring greatly; so that his place shall never be with those cold and timid souls who know neither victory or defeat." - Theodore Roosevelt,1910 -------------------------------------------------------------------------------------------------- 4869 From: James M. Atkinson Date: Mon Feb 25, 2002 4:00pm Subject: State of the Onion - 1230 live subscribers. The list may find it of interest that we now have 1230 subscribers. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "It is not the critic who counts, not the man who points out how the strong man stumbled, or where the doer of deeds could have done better. The credit belongs to the man who is actually in the arena; whose face is marred by the dust and sweat and blood; who strives valiantly; who errs and comes short again and again; who knows the great enthusiasms, the great devotions and spends himself in a worthy course; who at the best, knows in the end the triumph of high achievement, and who, at worst, if he fails, at least fails while daring greatly; so that his place shall never be with those cold and timid souls who know neither victory or defeat." - Theodore Roosevelt,1910 -------------------------------------------------------------------------------------------------- 4870 From: Steve Uhrig Date: Mon Feb 25, 2002 5:10pm Subject: Felons on this list? ALL READ > From: "tek492p" > I am also an amateur (ham) radio operator, and have about a dozen, or > more, various transmitters ranging in frequency from 40 MHz to 500 > Mhz, with power levels from 10 mW to 100 mW. Some I bought, some I > built myself from scratch, some are audio modulated, others are just > "oscillators". Jack, you have just confessed in a public forum widely read by law enforcement, to committing a number of state and federal felonies. Ten seconds on QRZ.com will return your amateur call and physical address for any agency who wants to take you down. You can be certain copies of your post were printed and submitted by someone to Justice Dept, to some U.S Attorney somewhere. Jack, go to Jim's site www.tscm.com and READ AND MEMORIZE 18USC 2511 and 2512. Title 18 is the U.S. Criminal Code, BTW. It is a federal FELONY to possess any device primarily intended for electronic interception. Also a felony to advertise them to the public. And of course to use them. The ONLY exceptions are: 1)Government agencies. 2)Common carriers (paging companies, telephone companies, etc.) in their NORMAL course of business, and 3)PERSONS UNDER CONTRACT with a government agency to supply these devices. So unless you happen to have ongoing purchase orders (CONTRACT) continuously covering your sale of these devices to a government agency, every day you possess each one is a felony at both the federal and virtually all state levels. The government is up in arms over privacy issues now, and are foaming at the mouth to make an example of someone. Apparently you weren't in the business yet during the several coordinated large scale raids some years back, where persons in possession of these devices were dragged out in handcuffs, with the media alerted prior and TV cameras running. Many went to jail and virtually all had to find another career. They even got Spyking/SpyTurd aka Frank Jones, who was the Teflon Turd for 20 years. Felony. Parole. Can't travel without permission of your P.O. Can't own a firearm ever again for the rest of your life. Can't hold a passport for the rest of your life. Can't vote. Can't get a job in any government position. Can't get a job anywhere in security, or any place who runs background checks. Can't rent apartments or houses. Et al. A lot of these people taken down were identified by undercovers monitoring forums like this one. Others were by personal visits to shops. More were from examining customer lists from various vendors of the things. Enough people have forgotton, the left wing is screaming about privacy issues, and certain agencies are very willing to do their job, in this instance. They're ready to move again, and you're jumping up and down advertising, waving a red flag and begging to go on their list. Your only safe course of action right now is to surrender the things to your local law enforcement agency on your own terms, advising them you just learned your possession of them was illegal and you are surrendering them in accordance with the law. Get a receipt. That may be your Get Out Of Jail Free card. Don't tell them why you had them. You have the right not to be a witness against yourself. Deal with some busy desk sergeant or busy duty officer, get him to sign a receipt, and leave it at that. You do NOT want to go off into a back room with the detectives or tech guys and brag about being a sweeper. Cops hate sweepers. Cops hate anyone who tries to assume powers or authority they don't have. TSCMers have no more right to possess these gadgets than does a boy scout. Since the other transmitters you mentioned are not on amateur frequencies, the ones in your above paragraph likely are not either. Even if they were, the described operation would be illegal under amateur license rules (one way transmissions, no I.D., etc.). At a minimum, it will cost you your full time job if you work for anyone else, your own business, your life's savings, and you will have a criminal record the rest of your life. Oh, and of course your ham license. Hams are held to higher standards than the general public, because we are licensed, allegedly know the laws which govern us, and we are supposed to know better. Persons active in any facet of the security business fare worse than Joe Sixpack in raids, because you will be held to higher standards also. If you are in the security business, whether as a uniformed guard walking a post on midnight shift at a construction site, a full time TSCM'er, a PI (PI's also are licensed, so held to higher standards) or anything, you will be facing a hostile judge, a hostile prosecutor and a jury who votes as they are told by the judge. FOLKS -- LISTEN WELL THIS IS CRITICAL. READ THIS: Being in the TSCM business, or pretending to, or wanting to, DOES NOT confer on you any special privilege to possess surveillance equipment. Demonstrating the stuff to the wrong people, or if the Wrong People (to you, meaning government) learn of your possession, you WILL be charged with a felony. Your entire place will be raided. Everything will be confiscated down to trash cans and pencil sharpeners. Ask Ramsey. Ask EEB, now long out of business. Ask any of the 40+ places hit all at the same instant, nationwide, in the raids a few years ago. There is not one square inch of your facility that will not be tossed, and not a single electronic item left in your house/business/car/wherever. NO ONE is immune. You WILL NOT get away with it. A $20 kit is as illegal as anything. A zip gun will get you the same mandatory jail penalty as will carrying a Colt Python. I am in the unfortunate position at this immediate moment of testifying against a Maryland PI agency in cooperation with Maryland State Police. My testimony likely will put someone in jail. I may likely be called upon, as a well accepted long term expert court witness on electronic surveillance, to testify against you. This would sadden me. Doesn't matter if you run a training facility. Doesn't matter if you do demos. Doesn't matter if you claim to have found a bug on a job, and 99% of the people who claim this are lying anyway. In my entire career, spanning 30 years last month, I have found only a small number of devices or wired phones. When I did, I secured the area and notified the FBI or local law enforcement, whoever I could get, and stayed with the devices, not touching them, until the authorities arrived to take custody. The things are akin to a smoking gun. FELONY. You can't afford to fool around. In one case, I testified before the grand jury in Cranston, RI, and the bad guy was indicted and went to jail. Any of these TSCM training facilities who maintain surveillance devices allegedly for training have no legal grounds for having the things. They are as guilty as anyone else. And their nice new fancy buildings will be sold at some distress sale a few years after the raid, to pay legal bills. IT HAS HAPPENED. This is not speculation. This is not crying wolf. Dozens of guys spend months to years in jail cells merely for playing with the cheap Micro bugs. If you would happen to be one of the extremely few persons who ever actually locates an illicit surveillance device through your own efforts, you can't go with the wishes of your client, or wait to see who services it, or feed it false info. That makes you an accessory after the fact as well as a co-conspirator. A few more counts, and a few more years. Your only option is to call LE immediately and request they take custody. You may ask how some companies can advertise the things. In many, if not most, cases, the spy shops carry no inventory. They are committing a violation by advertising them, but only rarely do they actually possess the crap they claim to sell. Most are ripoffs or brokers at best. Some companies actually may have the things, and they go on a list to be raided along with 40 or 50 others around the country, all at the same hour, so they can't call each other and warn each other. That's the way it was done the last two times. More professional companies, legitimate manufacturers of professional devices actually used by law enforcement (you don't think they use $20 Cony bugs, do you?), sell only to government and more or less continuously have contracts to supply their products to government agencies. That is a clear exemption under 18USC 2511 and 2512. Claiming to 'sell to police' is meaningless, and we all hear it several times a week. Having a history (paper purchase orders from a government agency and copies of invoices as well as payments received) is the only thing that counts. Bottom line: Unless you have regular business, which you can document, providing electronic surveillance equipment to government agencies, you cannot possess audio surveillance, data, much video, anything which transmits, or much of what connects to the phone line. You will not be the one to decide what is legal and what is not. A prosecutor will, after most of what you own is hauled away in an 18 wheeler for a 3 month inventory, after which time you will be able to examine your files to prepare your defense at a government warehouse under government supervision 2 days a week for 2 hours at a time, and will have the privilege of copying your own files at 25 cents a page. You're not a big tough guy having bugs. You're a fool. I don't mean to address this specifically to Jack, but generically to the group. You WILL get caught, and you will not work in anything remotely related to security ever again. Save this message, print it, and refer to it frequently. This may be the most serious message you have yet read on this list. Steve (incidentally a ham, WA3SWS) ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4871 From: Date: Mon Feb 25, 2002 1:48pm Subject: Re: Felons on this list? ALL READ In a message dated 2/25/02 3:48:27 PM Pacific Standard Time, steve@s... writes: << You will not be the one to decide what is legal and what is not. A prosecutor will, after most of what you own is hauled away in an 18 wheeler for a 3 month inventory, >> It will be a longer period than three months. It's now procedure for the evidence to be reviewed by "multiple" agencies to insure that nothing is missed. 4872 From: Aimee Farr Date: Mon Feb 25, 2002 7:24pm Subject: RE: Felons on this list? ALL READ > -----Original Message----- > From: Steve Uhrig [mailto:steve@s...] > Sent: Monday, February 25, 2002 5:11 PM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Felons on this list? ALL READ > After reading Steve's post, I feel like a puppy that wet the carpet, and I didn't do anything bad. Time has passed this law by. It is no longer consistent with the range of devices available, the advertising, or public awareness. It was written for law enforcement, with private interests as an afterthought in the congressional record. As it stands, the charlatans are likely to act in confidence (not that this isn't a security virtue) -- but they are also less likely to act in, or advocate, the public interest. They are also more likely to work flat-out against it. I think it cuts against law enforcement interests and contributes to a cadre of unprofessionals that would subvert intelligence gathering. It certainly represents an out-dated approach to security/privacy. ("The Pillar Of Salt") I think today's agencies would be receptive to anything that would improve reporting, assist them in investigations, or "partner" them with corporate/private interests. I would think some creative legislation could be drafted so as to work to the advantage of all interests. The "evil" isn't the inanimate object. ("Voodoo.") For private security professionals to be in conflict with their public cohorts is a sign of irrationality. Certain technological-cultural changes were just not anticipated. I don't see why you can't get a working group together with the relative agencies to examine contemporary problems and propose creative solutions in surveillance/counterespionage. It would assist them in perceiving and adapting to change and threats, grease information flows, and even improve their public image. Agencies should look toward protecting and enabling the private sector, or their agendas will suffer. As surveillance becomes more pervasive, sensitization is likely to lead to a flashback that works against their interests. ~Aimee 4873 From: James M. Atkinson Date: Mon Feb 25, 2002 8:48pm Subject: RE: Felons on this list? ALL READ I hate to be the guy holding the rolled up newspaper but... Both the statute and case law that apply to the possession, use, sale, and such of eavesdropping devices is actually quite clear and easy to understand. There is no latitude, no excuses, no alibi's, no "get out of jail free" cards, and no way to tap dance around the issue. Simply put; members of the public can not play with the stuff, nor can they twist definitions to justify their misdeeds. Also, LEO's can only use it after being specifically authorized by the courts, and at no other times. If you have a "test transmitter" the bloody thing had better say "Hewlett Packard" or at least be a device with an FCC ID number, not be even remotely useful for covert eavesdropping (and not one thing that could even slightly raise the eyebrow of any Grand Jury member). Hint: If you have to EXPLAIN to someone "why it's not a bug", then your already screwed. -jma At 7:24 PM -0600 2/25/02, Aimee Farr wrote: > > -----Original Message----- >> From: Steve Uhrig [mailto:steve@s...] >> Sent: Monday, February 25, 2002 5:11 PM >> To: TSCM-L@yahoogroups.com >> Subject: [TSCM-L] Felons on this list? ALL READ >> > >After reading Steve's post, I feel like a puppy that wet the carpet, and I >didn't do anything bad. > >Time has passed this law by. It is no longer consistent with the range of >devices available, the advertising, or public awareness. It was written for >law enforcement, with private interests as an afterthought in the >congressional record. > >As it stands, the charlatans are likely to act in confidence (not that this >isn't a security virtue) -- but they are also less likely to act in, or >advocate, the public interest. They are also more likely to work flat-out >against it. I think it cuts against law enforcement interests and >contributes to a cadre of unprofessionals that would subvert intelligence >gathering. It certainly represents an out-dated approach to >security/privacy. ("The Pillar Of Salt") > >I think today's agencies would be receptive to anything that would improve >reporting, assist them in investigations, or "partner" them with >corporate/private interests. I would think some creative legislation could >be drafted so as to work to the advantage of all interests. The "evil" isn't >the inanimate object. ("Voodoo.") > >For private security professionals to be in conflict with their public >cohorts is a sign of irrationality. Certain technological-cultural changes >were just not anticipated. > >I don't see why you can't get a working group together with the relative >agencies to examine contemporary problems and propose creative solutions in >surveillance/counterespionage. It would assist them in perceiving and >adapting to change and threats, grease information flows, and even improve >their public image. > >Agencies should look toward protecting and enabling the private sector, or >their agendas will suffer. As surveillance becomes more pervasive, >sensitization is likely to lead to a flashback that works against their >interests. > >~Aimee > -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "It is not the critic who counts, not the man who points out how the strong man stumbled, or where the doer of deeds could have done better. The credit belongs to the man who is actually in the arena; whose face is marred by the dust and sweat and blood; who strives valiantly; who errs and comes short again and again; who knows the great enthusiasms, the great devotions and spends himself in a worthy course; who at the best, knows in the end the triumph of high achievement, and who, at worst, if he fails, at least fails while daring greatly; so that his place shall never be with those cold and timid souls who know neither victory or defeat." - Theodore Roosevelt,1910 -------------------------------------------------------------------------------------------------- 4874 From: Aimee Farr Date: Mon Feb 25, 2002 9:48pm Subject: RE: Felons on this list? ALL READ jma: > I hate to be the guy holding the rolled up newspaper but... :) I wasn't expressing disagreement with the gist of Steve's post, or the BLACK-LETTER LAW -- just my disagreement with what is an ineffective regulatory scheme, and one that is starting to negatively effect the very interests it was crafted to protect. "Bad law" arguments carry no weight in court, and I didn't suggest that it did. My argument was for a revisitation of this statute with regard to private sector interests and for public-private collaboration to address the real problems. We have failed to do that in espionage, and it's time for congress to take revisit this problem with meaningful analysis, rather than simply knee-jerk prohibitive statutes. (i.e., let's put some enablement and $ behind these statutes.) Steve's post was so long and detailed - I gather I should have cut and pasted. ~Aimee 4875 From: Steve Uhrig Date: Mon Feb 25, 2002 10:12pm Subject: RE: Felons on this list? ALL READ Once upon a midnight dreary, the lovely and talented Miss Aimee Farr Esq. pondered, weak and weary: > I wasn't expressing disagreement with the gist of Steve's post, or the > BLACK-LETTER LAW -- just my disagreement with what is an ineffective > regulatory scheme, and one that is starting to negatively effect the very > interests it was crafted to protect. It was designed to keep electronic surveillance out of the hands of the unwashed masses. It was written, and is enforced, to do that very effectively. Appropriate provisions are made for legitimate users or possesors of electronic surveillance, and I detailed those, and anyone can read them in the original cite of the statute. What's the problem? Keep the stuff out of the hands of bozos, and specifically detail acceptable uses of the stuff? Seems to do that quite effectively. > "Bad law" arguments carry no weight in court, and I didn't suggest > that it did. Void for vagueness certainly is in place, as are any laws which conflict with the Constitution (for example, the 5th Amendment says more than you think it does. "No law shall be passed imparing the obligation on contracts'. NO LAW. If I have a contract with you to haul Bibles to Iowa, NO LAW, state, federal, motor vehicle or anything, legally can be applied which impairs that contractural obligation. If I choose to make the trip with no state-issued drivers' license, no vehicle registration, etc. no power on Earth legally can stop me. And any law which conflicts with the Constitution or the Bill of Rights is null and void. Or jury nullification, if you want to open that bag of worms. But that's another story. > My argument was for a revisitation of this statute with regard to private > sector interests and for public-private collaboration to address the real > problems. The law provides perfectly for real problems in the private sector. Use the stuff, possess it, advertise it, go to jail on a felony rap, unless you are a government agency operating under a court order or a communications infrastructure provider, or a registered legitimate manufacturer of the things, for authorized users only. What needs to be revisited? Do you want to loosen the restrictions so more people other than government can buy and use electronic surveillance against others? The real problems are not enough enforecment of the existing law. > We have failed to do that in espionage, and it's time for congress to > take revisit this problem with meaningful analysis, rather than simply > knee-jerk prohibitive statutes. (i.e., let's put some enablement and $ > behind these statutes.) We don't need any knee jerk prohibitions. We already have them. ANYONE OTHER THAN GOVERNMENT USING THE CRAP IS COMMITTING A FELONY! What more needs to be said? If any exception was made whatsoever for the public to use this stuff, it would be for video from the lovely Aimee's boudoir (sp?) !! Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4876 From: Aimee Farr Date: Mon Feb 25, 2002 11:14pm Subject: RE: RE: Felons on this list? ALL READ Steve.... > Once upon a midnight dreary, the lovely and talented Miss Aimee Farr Esq. > pondered, weak and weary: > > > I wasn't expressing disagreement with the gist of Steve's post, or the > > BLACK-LETTER LAW -- just my disagreement with what is an ineffective > > regulatory scheme, and one that is starting to negatively > effect the very > > interests it was crafted to protect. > > It was designed to keep electronic surveillance out of the hands of the > unwashed masses. It was written, and is enforced, to do that very > effectively. Okay, let me try to say this, so I am not misunderstood....gimme a break, my mind has been on something else all day, and it's fuzzy. 1. Money talks, words walk. 2. I can make many arguments for how this statute could be improved. In some places, it does cut against everybody's interests. In my opinion, and in the opinion of leading legal scholars on this damn statute. It's screwy! 3. "First, you must establish a relationship with the person in charge, whom I will refer to as the client. This has to be closely akin to a doctor-patient or attorney-client relationship. This person must trust you implicitly...." -Robert W. Doms, Sr., LTC AUS, Ret., _Practical Countermeasures For Law Enforcement_ 7 (2000). I found the above quote briefing the viability of a "protective function privilege" (via statute) for private counterespionage practitioners, which might address some of the misprision of felony issues. (Fat chance.) I would argue that you are a *fiduciary* professional, and you shouldn't have to babysit a stupid gadget. If you carry the indicia of a professionalism, I have no problem trusting you to deliver the "evil" to law enforcement. You have been engaged as a private solutionist. Heaven forbid you should study the evil! *gasp!* I think that should be legal. YOU'RE the GOOD GUY. The "thing" isn't THE CRIMINAL -- and if you want one, you're perfectly capable of building it. It is an invisible crime, that's low fear of apprehension. I want to figure out a way to empower the legit professionals. Also, an independent confidentiality statute allowing for sanitized reports or "turn-ins" through a third-party certification organization might offer law enforcement some additional insight into a "quiet problem," and offer you protected disclosure. I have no idea...but I don't think there is anything wrong with asking dumb questions. We are currently taking similar measures to protect private cybersecurity data from FOIA requests to grease public-private information flows. Bundled together, such a scheme might better balance competing needs, encourage open reporting, serve as a vehicle for awareness, etc. I'm talking about legitimizing illegal surveillance, or making it easier on the bad guys. I would make it harder for them. > Appropriate provisions are made for legitimate users or possesors of > electronic surveillance, and I detailed those, and anyone can read them > in the original cite of the statute. I disagree. There should be an exception for qualified research. Limited or licensed, whatever. > What's the problem? Keep the stuff out of the hands of bozos, and > specifically detail acceptable uses of the stuff? Steve, I'm not in the mood do a legal brief right now, maybe later. Prohibitions are just not enough, and the statute has failed to address some important areas, IMO. > Seems to do that quite effectively. Not from here. > > "Bad law" arguments carry no weight in court, and I didn't suggest > > that it did. > > > My argument was for a revisitation of this statute with regard > to private > > sector interests and for public-private collaboration to > address the real > > problems. > > The law provides perfectly for real problems in the private sector. > > Use the stuff, possess it, advertise it, go to jail on a felony rap, > unless you are a government agency operating under a court order or a > communications infrastructure provider, or a registered legitimate > manufacturer of the things, for authorized users only. > > What needs to be revisited? Espionage, sabotage, sedition and subversion. Congressional history suggests they are often "bundled" together. What about the failure to report an abstraction of national defense information -- a broad judicial definition. In light of our "connectivity" maybe that needs to be broader. Who is monitoring these things and correlating them? Yes, I know...but they don't have enough resources, networks, or money. > Do you want to loosen the restrictions so more people other than > government can buy and use electronic surveillance against others? Heck no. > The real problems are not enough enforecment of the existing law. And.... -- not enough awareness, information, collaboration and education. That requires money. > > We have failed to do that in espionage, and it's time for congress to > > take revisit this problem with meaningful analysis, rather than simply > > knee-jerk prohibitive statutes. (i.e., let's put some enablement and $ > > behind these statutes.) > > We don't need any knee jerk prohibitions. We already have them. :) > ANYONE OTHER THAN GOVERNMENT USING THE CRAP IS COMMITTING A FELONY! > > What more needs to be said? Whenever you want money, you have to say something. And, the private sector half of Title III has been neglected. The statute wasn't written to protect privacy, that was a compromise measure. That's clearly in the congressional record. > If any exception was made whatsoever for the public to use this stuff, it > would be for video from the lovely Aimee's boudoir (sp?) !! I'm NOT talking about public exceptions!!!!!!!! (Go rest for surgery, my thoughts are with you.) ~Aimee 4877 From: Aimee Farr Date: Mon Feb 25, 2002 11:20pm Subject: RE: RE: Felons on this list? ALL READ > I'm talking about legitimizing illegal surveillance, or making it > easier on > the bad guys. I would make it harder for them. Should have read: I'm NOT talking about... The caselaw behind this statute is really kinked in places in the private sector. I've got states wandering all over the place in the private sector issues -- by statute and court limb-stretching. Uniformity would provide guidance. ~Aimee> 4878 From: tek492p Date: Tue Feb 26, 2002 0:31am Subject: Re: What are decibels and what do they mean to me? --- In TSCM-L@y..., "john schmitt" wrote: > > Dear Steve, > I'd venture that your lesson > about how 13 db is 20x is lost on most people who don't have the basis > concepts. > Simple: 0 dBm is referenced to 1 milliwatt. Therefore... +10 dBm is 10 milliwatts. (+10 dBm equals 10 times the power). +13 dBm is 20 milliwatts. (+3 dBm equals 2 times the power). Jack Lindauer Intertect TSCM services Los Angeles (818) 831-0515 4879 From: tek492p Date: Tue Feb 26, 2002 1:39am Subject: Re: Felons on this list? ALL READ --- In TSCM-L@y..., "Steve Uhrig" wrote: > > From: "tek492p" > > Your only safe course of action right now is to surrender the things to > your local law enforcement agency on your own terms, advising them you > just learned your possession of them was illegal and you are surrendering > them in accordance with the law. Ah....... Please read my original post again. These are MOTION PICTURE WIRELESS MICROPHONES, I repeat, MOTION PICTURE WIRELESS MICROPHONES, that are placed on the actors when the camera is on a wide shot. I own these MOTION PICTURE WIRELESS MICROPHONES, because at one time I worked in the motion picture industry as a Production Sound Mixer. Oh, and by the way, I live in Los Angeles, which is the motion picture capital of the world. There are also hundreds of other Productions Sound Mixers as well as dozens of sound equipment rental houses that have these microphones. Perhaps the ENTIRE motion picture and television industry should all surrender their WIRELESS MICROPHONES or we can just wait for the Federal government and local law enforcement agencies to raid all the motion picture and television studios. > Since the other transmitters you mentioned are not on amateur > frequencies, the ones in your above paragraph likely are not either. > You are correct. They are NOT on amateur radio frequencies, they ARE on FCC APPROVED, I repeat, FCC APPROVED WIRELESS MICROPHONE FREQUENCIES. These frequencies are allocated to the motion picture and television industry for wireless microphones. Here are the frequencies of my WIRELESS MICROPHONES: Four wireless microphones (for the actors); 169 - 170 Mhz. One wireless microphone (for the director's headphones); 72.1 Mhz. Perhaps I should have been more specific in my original post about the frequencies. I was just trying to indicate that I used various transmitters at both VHF & UHF frequencies. The actual range of frequencies is 50 MHz to 450 MHz. The wireless microphones mentioned above, plus a few amateur radio transmitters. Next time. Please don't jump to conclusions. If you would have asked first about the "transmitters" and "frequencies", I could have told you that they were simply just motion picture wireless microphones. I would be very happy to demonstrate my MOTION PICTURE WIRELESS MICROPHONES to any agent of any law enforcement agency, along with a few "war stories" of some of the films I worked on. Jack Lindauer Intertect TSCM services Los Angeles (818) 831-0515 4880 From: Date: Mon Feb 25, 2002 9:18pm Subject: Re: Re: Felons on this list? ALL READ In a message dated 2/25/02 11:40:22 PM Pacific Standard Time, tek492p@y... writes: << Perhaps I should have been more specific in my original post about the frequencies. I was just trying to indicate that I used various transmitters at both VHF & UHF frequencies. The actual range of frequencies is 50 MHz to 450 MHz. The wireless microphones mentioned above, plus a few amateur radio transmitters. Next time. Please don't jump to conclusions. If you would have asked first about the "transmitters" and "frequencies", I could have told you that they were simply just motion picture wireless microphones. >> FROM ORIGINAL POST In a message dated 2/24/02 5:10:56 PM Pacific Standard Time, tek492p@y... writes: << I am also an amateur (ham) radio operator, and have about a dozen, or more, various transmitters ranging in frequency from 40 MHz to 500 Mhz, with power levels from 10 mW to 100 mW. Some I bought, some I built myself from scratch, some are audio modulated, others are just "oscillators". >> Seems like you have quite a collection of transmitters. 4881 From: David Alexander Date: Tue Feb 26, 2002 9:50am Subject: questionable Zimbabwe surveillance film Has anybody seen this news item about surveillance footage that allegedly shows the leader of the opposition in Zimbabwe discussing the 'elimination' of the president ? The footage is grainy and appears to be heavily edited and out of sequence and supposedly filmed by an ex Mossad agent http://news.bbc.co.uk/hi/english/world/africa/newsid_1841000/1841846.stm regards _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4882 From: DrPepper Date: Tue Feb 26, 2002 10:53am Subject: Re: Felons on this list? ALL READ Steve, , , Just from reading this snippet, I don't see where he admits to violating any law. He is merely saying that he has some transmitters on these various frequencies. I also have a few transmitters in this freq range, but I also have some that go down to 160 meters, as well. What law is he violating? -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ============================================ Steve Uhrig wrote: > > From: "tek492p" > > > I am also an amateur (ham) radio operator, and have about a dozen, or > > more, various transmitters ranging in frequency from 40 MHz to 500 > > Mhz, with power levels from 10 mW to 100 mW. Some I bought, some I > > built myself from scratch, some are audio modulated, others are just > > "oscillators". > > Jack, you have just confessed in a public forum widely read by law > enforcement, to committing a number of state and federal felonies. 4883 From: Ray Van Staden Date: Mon Feb 26, 2001 11:31am Subject: Re: questionable Zimbabwe surveillance film David I have seen the alleged footage. It has been edited beyond belief, the picture & sound quality is poor to say the least. In today's day & age, & being an ex-Mossad agent, having this so called "world class consultancy" , & to go produce such a poor quality production, speaks volumes in its self. For it to be released so close to the elections in Zimbabwe is very suspicious. This "ex-Mossad: agent has a very dubious past going back to Oliver North & Contra Affair in the United States, where he was exposed as being fraud by either TIME or NEWSWEEK (possible even both). Surprise Surprise the man also happens to be have even been a consultant to Mugabe for the last 15 years. Why would Morgan Tsvangiri go to a political consultancy firm in Canada to have Mugabe bumped off? The elections should be interesting should Tsvangirai win the election, Mugabe is likely to use the military and the police to reject the electoral result and maintain his rule by force. If this happens, widespread civil unrest may ensue. It is, of course, also possible that Mugabe might decide not to take the chance of losing the election by calling a state of emergency. If ZANU-PF can instigate enough violence, and can solicit some kind of violent response from the MDC, this would enable Mugabe to argue that free and fair elections will not be possible and that it was in the "interest of democracy" to postpone such elections. Raymond ----- Original Message ----- From: "David Alexander" To: "'TSCM submissions'" Sent: Tuesday, February 26, 2002 5:50 PM Subject: [TSCM-L] questionable Zimbabwe surveillance film > > Has anybody seen this news item about surveillance footage that allegedly > shows the leader of the opposition in Zimbabwe discussing the 'elimination' > of the president ? > > The footage is grainy and appears to be heavily edited and out of sequence > and supposedly filmed by an ex Mossad agent > > http://news.bbc.co.uk/hi/english/world/africa/newsid_1841000/1841846.stm [Non-text portions of this message have been removed] 4884 From: Michael Puchol Date: Tue Feb 26, 2002 0:02pm Subject: Re: Felons on this list? ALL READ Hi, First of all, let me say that Steve's piece was very well put, but there are a few minor details that I want to point out. I believe that the mere possession of a transmitter does not constitute an illegal act (OK, depending on the type of transmitter, you may need a license to own it in some places), I personally have about 85 transmitters in the 400-470MHz band in storage.......they are Kenwood PMR transceivers for an AVL system we're installing next month - that doesn't mean I'm doing anything illegal. So, the mere mention of a 'transmitter' shouldn't raise eyebrows and comments all over - let's be more specific, let's talk about 'bugs' or 'taps' or 'transceivers' (or other specific terms). This way we won't get all heated up over nothing. If the guy admitted to possessing a 'bug' then Steve's post is more than deserved, as is punishment as provided by current laws - but, to have a few transmitters in public, license-exempt bands for testing your equipment is something I personally don't find inmoral or wrong - I use devices like the Kenwood UBZ (license free 433MHz band transceiver, 50mW, I believe in the US it goes in the FRS band), CB radios, HF transmitter boards (huge ones, could hardly be used as 'bugs', apart they cannot carry audio other than a test tone), DECT telephones (for wideband), WiFi cards (for 2.4GHz spread spectrum), etc.... What it comes down to, also mentioning a post by James a while ago, is that you don't need -real- bugs to get training, practice or become proficient with your equipment, you can do it with many devices that are perfectly legal to use. If you need to conceal something small to simulate a bug for a physical inspection, then use the playing chips or other inert material. Make your test transmitters big, and label them as such - I have one of these UBZ/FRS rigs inside an orange peli case, with a lead battery and a small microcontroller I can program to TX, change channels etc. for various purposes, like simulating a burst TX or channel hopper. Regarding the not-so-good relationship between TSCMers and law enforcement, I think it's a question of awareness - I have really good friends in the police forces, and find that sometimes they come ask me about stuff - like a GPS a thieve lost the other day inside a house he broke into - they called me to see what could be extracted from it, and voil√ , a waypoint marked 'Home' - yes, it was the burglar's home, he apparently used the GPS to 'mark' succulent houses. Anyway, I'm wondering off-topic now - you have to try to show L.E. that you're not a juju man that comes with all those blinking boxes, cables & antennas, finds the bug, and leaves them to do the cleaning up. Lack of knowledge (of what the other is doing) leads to lack of trust, which leads to bad feelings. Just my ‚Ǩ0.02 worth, all the best, Mike > Steve Uhrig wrote: > > > > From: "tek492p" > > > > > I am also an amateur (ham) radio operator, and have about a dozen, or > > > more, various transmitters ranging in frequency from 40 MHz to 500 > > > Mhz, with power levels from 10 mW to 100 mW. Some I bought, some I > > > built myself from scratch, some are audio modulated, others are just > > > "oscillators". > > > > Jack, you have just confessed in a public forum widely read by law > > enforcement, to committing a number of state and federal felonies. > 4885 From: Aimee Farr Date: Tue Feb 26, 2002 5:31pm Subject: RE: questionable Zimbabwe surveillance film Staden: > This "ex-Mossad: agent has a very dubious past going back to > Oliver North & Contra Affair in the United States, All pasts are "dubious," and accordingly, everything goes to the Contra Affair -- eventually. I just thought it was like a "family tree" ... or maybe "roots" when you need to dye your hair again. Everybody has it, but it's not polite to mention. TV has trained the public to trust surveillance footage. Truth can actually can have little to do with what carries, and attacking the veracity of it can have little effect (see "Emotional Selection" hyperlink below, along with misc. references). The more you discredit it, the more people look, and are emotionally impacted, and the more people emotionally credit it. > It has been edited beyond belief, the picture & sound quality is > poor to say the least. "Seeds of untruth" if properly packaged, nets more commentary and pass-along. This conflicts a little bit with traditional notions of say, radio propaganda. "For example, if memes are selected for their emotional content [rather than informational content], then social systems may sometimes experience emotional snowballing ñrunaway selection for emotional content rather than for information." -- Emotional Selection. (See, also "terrorism," "cyberterrorism," and other "framing" strategies of "Homeland Defense.") "Certain memes also operate to undermine public faith in governmental or social institutions." -- Id. I look for "noncombatant footage" to discredit military initiatives, political payloads via an email virus, domestic agit-prop, anti-intelligence, etc. Surveillance will probably increasingly feed propaganda efforts, as surveillance is media. Ditto for the private sector. At least the Pentagon is not about to engage in anything resembling an information deception operation. You see, lying threatens the credibility of the D.C. leaking establishment, and their power to covertly influence American policy through the media -- without guidelines, or accountability to....anybody. Only in D.C. can that sort of pot-kettle irony masquerade as a moral position in warfare. ~Aimee Misc. Refs -- they wander, I don't pretend to have read every one, ignore my abbreviations: ----------- O/SI-D/Heath, et. Al./Emotional Selection In Memes: The Case of the Urban Legend @ http:http://www.apa.org/journals/psp/press_releases/december_2001/psp8161028 .html (good primary cites) S/SI-D/Dewar/The Art of Deception in Warfare IW/S/MH-IWPElliott-Bateman/The Fourth Dimension of Warfare, Volume I Intelligence, Subversion, Resistance T/SI-D/Thomas/Int'l Conflict Controllers @ http://call.army.mil/fmso/fmsopubs/issues/manipult.htm O/SI-D/Kam/Surprise Attacks: The Victim's Perspective O/SI-D/Blum/Deceivers and Deceived: Observations on Confidence Men and Their Victims, Informants and Their Quarry, Political and Individual Spies and Ordinary Citizens O/SI-D/Whaley/Cheating and Deception O/SI-D/Charters & Tugwell/Deception Operations: Studies in an East-West Context O/CA-P/Hulnick/Dirty Tricks For Profit: Covert Action In Private Industry (International Journal of Intelligence and CounterIntelligence, 14: 529-544, 2001) Modern Conflict Theorists - Convergence/S/MCT-C/Wilson, Michael/Toward An Ontology of Integrated Intelligence & Conflict @ http:www.metatempo.com T/SI-P/Ellul, Jacques/Propaganda: The Formation Of Men's Attitudes O/SI-P/Soley/Radio Warfare S/SI-P/Salminen/The Silenced Media: The Propaganda War Between Russia and the West... S/SI-P/Bernays/Propaganda T/SI-P/Kirkpatric/Soviet Political Warfare Techniques T/SI-P/Manheim/Death of a Thousand Cuts: Origins, Strategy and Tactics of the Attack on the Corporation S/SI/Cialdini/Influence: Science and Practice S/PS/Pitney/The Art of Political Warfare 4886 From: Justin T. Fanning Date: Tue Feb 26, 2002 5:39pm Subject: AN IDIOT'S IDIOT Police in Radnor, Pennsylvania, interrogated a suspect by placing a metal colander on his head and connecting it with wires to a photocopy machine. The message "He's lying" was placed in the copier, and police pressed the copy button each time they thought the suspect wasn't telling the truth. Believing the "lie detector" was working, the suspect confessed. 4887 From: Steve Uhrig Date: Tue Feb 26, 2002 6:20pm Subject: RE: Felons on this list? ALL READ Once upon a midnight dreary, Aimee Farr pondered, weak and weary: > I wasn't expressing disagreement with the gist of Steve's post, or the > BLACK-LETTER LAW -- just my disagreement with what is an ineffective > regulatory scheme, and one that is starting to negatively effect the > very interests it was crafted to protect. Not many would agree those protected by the statute are negatively affected. Some doddering old lunatics who pretend to be involved in the profession might, but that is only to gather support for their attempted heroics, saving law enforcement from themselves, coupled with a significant amount of greed and envy. No names will be mentioned out of courtesy to the gentleman suffering from dementia for the last 25 years. > 1. Money talks, words walk. Irrelevant, to those of us living on the same planet. > 2. I can make many arguments for how this statute could be improved. In > some places, it does cut against everybody's interests. In my opinion, and > in the opinion of leading legal scholars on this damn statute. It's > screwy! If legal scholars are so damn knowledgeable, why is this country in such a miserable mess? Legal scholars can think anything they want. They aren't involved in the profession. Lots of people disagree with me on points of law. Lots of them are even lawyers. ALL walk away educated after my testimony, and with just the ever so slightest hint of humility. > 3. "First, you must establish a relationship with the person in charge, > whom I will refer to as the client. This has to be closely akin to a > doctor-patient or attorney-client relationship. This person must trust you > implicitly...." -Robert W. Doms, Sr., LTC AUS, Ret., _Practical > Countermeasures For Law Enforcement_ 7 (2000). Bob Doms is a knowledgeman, and a good friend. But what does this have to do with anything regarding the public's ILLEGAL possession of transmitters. Bob Doms did not write that booklet for the public. He wrote it for other law enforcement officers. He's talking people on the other side of the fence from where we are sitting. > I found the above quote briefing the viability of a "protective function > privilege" (via statute) for private counterespionage practitioners, which > might address some of the misprision of felony issues. (Fat chance.) We don't speak. Men are from Mars. Women are from Venus. Above was an example. (If Aimee was from any planet other than Earth, it would be Venus however). > I would argue that you are a *fiduciary* professional, and you > shouldn't have to babysit a stupid gadget. If you carry the indicia of > a professionalism, I have no problem trusting you to deliver the > "evil" to law enforcement. Then you are a proponent of destroying the legal chain of custody, and ruining any chance of prosecution? SWEEPERS ARE LAYMEN! Only in the most unusual of instances are they commissioned law enforcement officers, and this discussion excludes them. Sweepers have NO LEGAL GROUND to claim the status of 'fiduciary' professional. No provisions for that in the law. The law is fine the way it is. Sweepers, with only the rarest exceptions described above, are laymen. They are the public. Break the legal chain of custody by placing physical evidence of a felony in the hands of a layman, and no prosecutor will touch it. Or is that an ulterior motive you are seeking? How would any sweeper you know of, from this list or anywhere else in the galaxy, be considered a 'fiduciary' professional? What standards would be applied? What certifications? What licensing? What training? BECCA fell flat on its face, twice under two separate leaders, trying to establish this. ERI is nothing more than a former unsuccessful BECCA under a different moniker. Under what standards or authority would you confer the aegis of 'fiduciary professional' regarding ANY sweeper you have met thus far? Even me? !!! > You have been engaged as a private solutionist. Heaven forbid you > should study the evil! *gasp!* I think that should be legal. I want to study the effects of machine gun fire impacting on Texas female attorneys. Should I be allowed to have a machine gun? I want to study the effects of gamma rays on man in the moon marigolds. Should I be allowed to have marigolds? Gamma rays? Point being, for these other studies, there are certifications, licensing, formal training requirements, etc. to separate the men from the boys. There aren't in the TSCM business. So, legally, we're all boys. A bunch of people have tried to start organizations to develop criteria and bestow certifications. These have been unofficial from a government point of view, and every single one, without exception, has become riddled with corruption, fiscal improprieties, driven only by the oppressive and smothering ego of the person at the helm (all of whom, incidentally, have been retired longer than most of us have been in business or even alive in some cases). No TSCMer on the planet has any more *official* claim to fame than any other. Some may look up to others, others may usurp authority in various organizations, some may pitch an endless line of porcine feces. But there is no officially sanctioned organization who can say 'members of our organization, or members certified by our organization' are 'CERTIFIED' TSCM practitioners. Yeah, you can buy certificates from several of these groups to whom I have been referring, and I mean buy. Point being, NO TSCMer has any legal standing to possess electronic surveillance devices nor to take them into custody, merely by virtue of being involved in TSCM to some degree. Youse guys come down on others for UPL. We have to compete with them. > YOU'RE the GOOD GUY. The "thing" isn't THE CRIMINAL -- and if you want > one, you're perfectly capable of building it. It is an invisible crime, > that's low fear of apprehension. I want to figure out a way to empower the > legit professionals. I'm perfectly capable of building a machine gun, or synthesizing crystal meth. I do build surveillance devices, within complete compliance with the law. I even could build a feisty female Texas attorney if I had a free weekend, but I'm not sure what I'd do with her. There are no legit professionals to empower. There is no mechanism for conferring the hallowed status of legit professional on someone, short of that someone joining a public law enforcement agency or established (meaning able to show an ongoing history of supply to government on paper, not in their wet dreams) manufacturer of electronic surveillance devices. That is the problem. If you asked on this list, 99% would consider themselves legit professionals. Ask me, might possibly be as high as 3% - 5%. Maybe. And that counts the police officers I know who monitor this list. The owner of this list, Jim Atkinson, and the writer and operator of the largest TSCM website in the world, is not a legit professional authorized to possess electronic surveillance. If he locates a device on a job, I can promise you he won't touch it; he will remain on the scene until duly constituted authorities arrive to take custody of the device. I don't even have to ask him. I know that is how he would handle it. How would you separate a voyeur or someone up to no good, from someone who signs up on this list, learns a few buzzwords, then starts lying about how many bugs they've found (and I've just described a significant portion of this list)? Appropriate provisions are made for legitimate users or possesors of electronic surveillance, and I detailed those, and anyone can read them in the original cite. > I disagree. There should be an exception for qualified research. > Limited or licensed, whatever. There is. Simply get a government contract to supply devices or even services, even if for destructive test, or evaluation, or assault and flattery, and you're completely in the clear legally. That's precisely what I did, and last month was 30 years I've been doing it. I'll quit here. I have to leave for Seattle in the AM. Amongst other things, gonna meet with a bunch of high powered attorneys and advise them how to handle their client's affairs where surveillance may be involved. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4888 From: john schmitt Date: Tue Feb 26, 2002 1:11am Subject: Re: Re: What are decibels and what do they mean to me? Excuse me, Mr. Lindauer, but I fail to see how your lesson, either, provides much in the way of help for someone who does not have the basic concepts, as you say: ******* Simple: 0 dBm is referenced to 1 milliwatt. Therefore... +10 dBm is 10 milliwatts. (+10 dBm equals 10 times the power). +13 dBm is 20 milliwatts. (+3 dBm equals 2 times the power). ************* Why are these things true? Well, it turns out, they're only approximately true. First of all, the reference to 1 milliwatt is irrelevant. Decibels of sound pressure are referenced to .0002 dynes/cm^2, or .0002 microbar, or 2 micropascals, but they are decibels nonetheless. The "deci" refers to a multiplication of 10 of an exponential power. As in 10 dB is really 1, which means one more power of 10. As in 3 dB is really .3 power of 10. It happens that 10 to the .3 power is 1.995262315, which is close enough to 2 for government work. This is the reason that 13 dB is about 20x, 10x for the 10 (1 power of 10) and 2x for the 3 (0.3 power of 10. -- John Schmitt ----- Original Message ----- From: "tek492p" To: Sent: Tuesday, February 26, 2002 1:31 AM Subject: [TSCM-L] Re: What are decibels and what do they mean to me? > --- In TSCM-L@y..., "john schmitt" wrote: > > > > Dear Steve, > > > I'd venture that your lesson > > about how 13 db is 20x is lost on most people who don't have the > basis > > concepts. > > > > > Simple: > > 0 dBm is referenced to 1 milliwatt. Therefore... > > +10 dBm is 10 milliwatts. (+10 dBm equals 10 times the power). > > +13 dBm is 20 milliwatts. (+3 dBm equals 2 times the power). > > Jack Lindauer > Intertect > TSCM services > Los Angeles > (818) 831-0515 > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 4889 From: Date: Tue Feb 26, 2002 9:11am Subject: Rants and flames >>Steve Uhrig stated: "Once upon a midnight dreary, the lovely and talented Miss Aimee Farr Esq. pondered, weak and weary" Do the rules of this forum permit such childish flames? >>Steve Uhrig stated: "ANYONE OTHER THAN GOVERNMENT USING THE CRAP IS COMMITTING A FELONY!" And I suppose that since Steve is approved as a Govt. vendor/contractor/supplier he is protecting his turf by not wanting anyone else to have the legal right to experiment, design, sell, etc... >>Steve Uhrig stated: "If any exception was made whatsoever for the public to use this stuff, it >>would be for video from the lovely Aimee's boudoir (sp?) !!" Do the rules of this forum permit sexual harassing rants? Karl V. Prentner, CPA/CITP, CISA Corporate Audit and Security Services 770-563-4048 Public key = http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x177C7121 If you are not the addressee indicated in this message you may not copy or deliver this message to anyone. Please destroy this message and notify me by reply email. Let me know by reply email if you or your employer do not want or allow messages of this kind. Opinions, conclusions and other information in this message that do not relate to the official business of my firm are mine and mine alone. 4890 From: Steve Uhrig Date: Tue Feb 26, 2002 9:04pm Subject: Re: Rants and flames Once upon a midnight dreary, karl.prentner@w... pondered, weak and weary: Haven't you ever seen standard reply headers which reflect the personality or sense of humor of the person sending the email? Pardon, The most esteemed karl.prentner@w... condescended to post to this list: > And I suppose that since Steve is approved as a Govt. > vendor/contractor/supplier he is protecting his turf by not wanting > anyone else to have the legal right to experiment, design, sell, > etc... I welcome contact with other *legitimate* manufacturers in my profession. We get together regularly to compare notes. It's not an adversarial thing. We help each other set up and demo our respective goodies when we're meeting the same client. Many of us sub work out to each other. I referred several government callers today to other manufacturers with more appropriate products for their needs than ours. I'm all for anyone who operates within the law. The entire conversation was about those who don't, but since it took longer to read the whole thread than to watch an episode of "Roseanne', few probably bothered to follow the thread. > Do the rules of this forum permit sexual harassing rants? It's a matter of perception. Most of us, and I lead the pack, are quite fond of and highly respect Aimee, her intellect, her wit, her education, her courage to speak out where an issue merits discussion. She's read a *lot* of classic literature, as I know from private email. I frankly doubt she takes it as sexual harassment, and if she did, you can be sure she would let me know, off list incidentally, in no uncertain terms. She knows I think a lot of her. Friends can banter back and forth like this. Sorry you can't. Do you perceive me to be sexually harassing you? Look back on the archives of this list to the day it started, count the numbers of posts of a technical nature, see where I fall in the standings. Where do you fall? I'll go you one further. Subtract ten times the number of 'let your hair down after an extremely stressful day' posts I've made from the number of technical posts I've made, and see where the numbers still fall. So far, as I recall, you're 0 for 1. > Karl V. Prentner, CPA/CITP, CISA Corporate Audit and Security Services > Public key = > http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x177C7121 > If you are not the addressee indicated in this message you may not > copy or deliver this message to anyone. Please destroy this message and > notify me by reply email. Let me know by reply email if you or your > employer do not want or allow messages of this kind. Opinions, > conclusions and other information in this message that do not relate > to the official business of my firm are mine and mine alone. > If you are not the named recipient, any review, dissemination, > distribution or copying of this communication is prohibited. If you > received this transmission in error, please contact me immediately for > instructions." The people who add these nonsense disclaimers to their emails and faxes have overblown egos. Such prattle is a waste of bandwidth, useless and worthless. Anyone appending this kind of garbage to their emails (especially) and faxes, permanently brand themselves in my mind as someone who thinks what they have to say is a lot more important than anyone else would think it was. Yeah. You sent this email on the web. What if I happen to read it by mistake? I will instantly delete it, send you a certified letter saying I accidentally read it, cancel all my appointments and wait for your instructions on what to do, agree to make a series of appointments with a psychologist and take a series of hypnotic drugs to purge any memory of your secret squirrel critically important message from my mind, and hire a lawyer to defend me from the mayhem that certainly will come my way as a result of the legal action you will take against me because I profited from accidentally reading your misdirected fax or email. Yeah. We all know your communications are life and death critical, and nations can topple if they would fall into the wrong hands. You are important. Your communications are so vital you have to waste bandwidth and my time and storage with all these warnings and disclaimers. Get real. Sign your name, use an accepted email signature, and leave it at that. Forget all this crap you copied from someone who copied it from someone else who copied it from yet another someone else, and which none of you understand, but makes you feel warm and wet. I would lay odds Aimee is the only one on this list of >1250 who could explain the disclaimer. And maybe poke more holes in it than I can. Steve ABCD/EF, GHI, JKLM. NO, PQR. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4891 From: Thomas (Yahoo!) Date: Tue Feb 26, 2002 8:38pm Subject: Question about device I saw Greetings; First time poster, so please forgive my tangents. I was walking w/ my family nearby the Naval Postgraduate School in Monterey and my wife spotted something odd up in the trees and asked if I saw anything like that before. What she saw was odd and here is where you'll have to forgive me for my description of this device is going to be crude... Up a tree about 35 feet in to the air was a boom microphone pointed TOWARDS the Postgraduate School. The Boom was attached to a small rectangular box (small and gray) the box was held to the tree w/ a small wire strap on top and a thin ('bout 1/4 inch wide) red band on bottom. About an hour later we came back by the same tree and to my surprise, the apparatus was missing. One of two things came to my mind, a) some type of surveillance? or b) animal sound recordings? I'm not in to animal study, but would it make sense to place some type of microphone attachment in a tree to listen/record animal migration patterns? Just a thought, anyone w/ an idea? Sorry for the lack of a better description, but alas I failed on that one. Thank you for your time. Thomas Roy Garner SETIPRIME ( http://www.setiprime.com ) 4580576 (ICQ)/thomasroygarner (Y!) --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.325 / Virus Database: 182 - Release Date: 2/19/2002 [Non-text portions of this message have been removed] 4892 From: tek492p Date: Tue Feb 26, 2002 10:56pm Subject: Re: Question about device I saw --- In TSCM-L@y..., "Thomas \(Yahoo!\)" wrote: > Greetings; > > > Up a tree about 35 feet in to the air was a boom microphone pointed TOWARDS > the Postgraduate School. The Boom was attached to a small rectangular box > (small and gray) the box was held to the tree w/ a small wire strap on top > and a thin ('bout 1/4 inch wide) red band on bottom. > > About an hour later we came back by the same tree and to my surprise, the > apparatus was missing. > By the description of the device, and by myself having worked in the motion picture industry as a Production Sound Mixer (yes, I am the one with the motion picture wireless microphones) the device was probably used eariler in the day for an outdoor video production. I use to "plant" microphones myself, to keep them out of the shot of the camera. The crew probably had to "wrap" (leave) the outdoor location in a hurry to shoot somewhere else, and the sound person decided to leave the microphone up in the tree and come back for it later, since it was out of reach to be stolen. These boom microphones have excellent audio quality and are very directional, therefore reducing outdoor noises to the sides and back (such as traffic noise). They are excellent for picking up the actors dialogue, but make very poor "surveillance" microphones for long distance audio pick-up. The "box" on the back of the microphone is a battery "power supply" for the microphone, since these microphones are condenser microphone and therefore require power. (+10 to +18 volts, two 9-volt batteries connected in series, and the batteries last a long time since the microphone draws very little current). I personally own four of these microphones. They are made in Germany by Sennheiser. Cost: $1,200.00 U.S. dollars EACH. Jack Lindauer Intertect TSCM services Los Angeles (818) 831-0515 From: James M. Atkinson, Comm-Eng Date: Sun Feb 25, 2001 4:31pm Subject: U.S. Looks To Address Spy Problem U.S. Looks To Address Spy Problem http://www.guardianunlimited.co.uk/breakingnews/US/0,3560,754659,00.html Sunday February 25, 2001 8:20 pm WASHINGTON (AP) - Senators worried about America's compromised secrets are pitching a variety of ideas to keep intelligence out of the wrong hands. They are not sure any single one will do the job. Random lie-detector tests, audits of FBI agents' personal finances, and rotations to ensure people do not stay in top-secret positions too long are among proposals in play as the Senate Intelligence Committee prepares for hearings this week on the case of accused spy Robert Hanssen. As hungry as they are for answers, intelligence experts in and out of government expressed a measure of humility Sunday from the knowledge that solutions are as elusive as the spying trade itself. Higher salaries to discourage turncoats? That might help, said the committee chairman, Sen. Richard Shelby, R-Ala. ``But I guess if somebody's really motivated to spy for money, they're going to do it.'' Would random polygraphs like those used by the CIA have caught Hanssen, an FBI counterintelligence specialist, sooner? ``Maybe, maybe not,'' Shelby said. ``But I believe that they ought to use that.'' William S. Cohen, defense secretary in the Clinton administration and a spy novelist on the side, was struck by the cleverness of the techniques attributed to Hanssen in allegedly giving Moscow secrets over 15 years without drawing attention to himself. ``You can never fully stop spying,'' Cohen said. ``What you can do is to try to take every reasonable precaution to catch spies in your midst.'' Senators and Cohen, a former senator who organized a 1990 counterintelligence review, poked through a list of stepped-up precautions in appearances on the Sunday talk shows, including NBC's ``Meet the Press,'' ``Fox News Sunday,'' CBS' ``Face the Nation'' and CNN's ``Late Edition.'' FBI Director Louis Freeh, among those scheduled to testify before the committee Wednesday, has drawn only guarded criticism so far for having a mole go undetected for so long. President Bush has expressed confidence in him. But without using Freeh's name, Massachusetts Sen. John Kerry, a Democrat, said he could not understand why tougher procedures were not in place at the FBI along the lines of those instituted at the CIA after Aldrich Ames, one of their own, pleaded guilty to spying for Moscow in 1994. ``Somebody has to be held accountable,'' Kerry said. ``People would resign in the past over something like this.'' Florida Sen. Bob Graham, top Democrat on the committee, said people in sensitive intelligence jobs should be expected to give up greater privacy and submit to more polygraphs, and perhaps audits to detect unusual personal wealth. He also questioned why someone would be left for years in a highly sensitive job. ``Sometimes you gain complacency and people get in trouble,'' he said. Whether audits would have raised suspicion about Hanssen is an open question. He did not have an obviously lavish lifestyle, living in a modest suburban home in Virginia and driving a Taurus and minivan. He was, however, putting six children through Catholic schools and university, Graham noted. In a letter Hanssen is alleged to have written to his Russian handlers in 1985, the beginning of his alleged moonlighting for the KGB and its successor agency, he noted that a large reward could cause complications because ``I can not spend it, store it, or invest it easily without (tripping) ... warning bells.'' But payments in cash and diamonds added up, exceeding $600,000, the government says. The government says Hanssen passed some 6,000 documents and 26 computer disks to his handlers, detailing eavesdropping techniques, helping to confirm the identity of Russian double agents, and spilling other secrets. Using sophisticated computer techniques to gather information, and parks to drop off and retrieve packages, he operated without ever meeting his handlers or telling them where he worked, authorities say. Hanssen ``hid himself very well and ... by virtue of his training, knew all of the trade craft that would protect him from discovery,'' Cohen said. Sen. Chuck Hagel, R-Neb., said the United States let down its guard after the Soviet Union collapsed, despite the continuing demand for American secrets from foe and friend alike. ``We've become way too complacent and sanguine here over the last few years,'' he said. Even while pondering the alleged betrayal from within the FBI, Shelby could not say with certainty that his committee's own staff, which is let in on intelligence secrets, is free from moles of its own. ``We hope so,'' he said. ``You know, there's always surprises.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2583 From: Doug Ellsworth Date: Sun Feb 25, 2001 11:57pm Subject: Lou Scherma Hi group, This is an unusual request, but a collegue, Mick Atteberry, asked me recently if I knew how to contact Lou Scherma. Mick describes Lou as his former mentor (now retired) and formerly a TSCM'er of high esteem. Since I don't know Lou, I thought some of you may be able to help. So, if any of you are familiar with Lou, or might have a tel number or some other info, please reply. Alternatively, If any of you have contact with Lou, please refer him to Mick at ConAgra Foods in Omaha at 402.595.4725. Happy days, -Doug [Non-text portions of this message have been removed] 2584 From: James M. Atkinson, Comm-Eng Date: Mon Feb 26, 2001 7:31am Subject: 'A Moral and Ethical Man': Colleagues Recall Their Time Spent With Agent Accused of Spying 'A Moral and Ethical Man': Colleagues Recall Their Time Spent With Agent Accused of Spying http://www.iht.com/articles/11732.html Carol Morello and William Claiborne Washington Post Service Why Would He Do It? WASHINGTON In the fall of 1985, agents were leaving the FBI's Manhattan office at the rate of seven a month, complaining they could not afford to live in New York on a government salary. With beginning agents making less than a city sanitation worker, and salaries no better in New York than in El Paso, Texas, or Boise, Idaho, many quit the bureau rather than be sent there. . The money squeeze was so bad that Thomas Sheer, an assistant director of the bureau who headed the Manhattan office, publicly warned that his agents were vulnerable to recruitment by hostile powers. Some joked blackly about spies in their ranks. . Into this cauldron of malcontent came a new transfer from FBI headquarters in Washington. . Robert Philip Hanssen, a nine-year bureau veteran known for being cerebral and standoffish, was assigned to head a foreign counterintelligence squad, an unglamorous but important job in a city where one-third of the 2,800 Soviet-bloc diplomats were thought to be spies. . For the Hanssen family - Bob, his wife, Bonnie, and their six children, the youngest just an infant - the new posting meant sacrifice. They sold their four-bedroom, 2- bath house in Fairfax County, Virginia, for $175,000, then turned around and spent almost as much for a cramped three-bedroom, 1-bath ranch house in Yorktown Heights, 90 minutes north of New York City. By early 1987, Mr. Sheer had quit the FBI, saying flatly that his $72,500 salary left him broke. Mr. Hanssen, who was earning about $46,000, would make a different choice. . While his motive remains unexplained, within nine days of joining the New York office Mr. Hanssen mailed the first of his letters to the KGB, the FBI alleges, offering stolen secret documents in return for $100,000. . Today, Joe Valiquette, a spokesman for the FBI in New York, says, "Tom Sheer looks like the smartest man in America." Those who thought they knew Robert Hanssen well are shocked and mystified by the 15 years of betrayal and lies laid out in clinical detail in a 109-page federal affidavit last week. To them, his alleged career as a wily but crass double agent is all but impossible to reconcile with the seemingly pious, Chicago police lieutenant's son who kept a crucifix on the wall behind his office desk. . Mr. Hanssen, arrested on espionage charges at a drop site in a Fairfax park on Feb. 18, stands accused of taking more than $600,000 in cash and diamonds from the Russians, with $800,000 more allegedly waiting for him in a Moscow bank. . His attorney has said that Mr. Hanssen, 56, will plead not guilty. A COMPLEX and often contradictory portrait emerges from the pages of the FBI's charges and interviews with dozens of Mr. Hanssen's friends, relatives, colleagues and neighbors. . To be sure, the financial pressures he faced with six children in private school were substantial for a man on a government salary. In one of his earliest communications with the KGB, the would-be spy allegedly asked for payment in diamonds, "as security to my children." He later returned two gems to the Russians, asking for cash instead, according to the FBI. . Some who worked with Mr. Hanssen through the years cannot believe he is the man who wrote those letters and sold out his country for money. . They describe a man who seemed to shun all displays of ostentation. He favored hamburgers for lunch, owned three older vehicles and drove his family to Florida on vacation to visit their grandmother. . If Mr. Hanssen stood out, it was as a brainy guy who had little interest in standing around the water cooler talking about football. David Major, a former FBI counterintelligence official who has known Mr. Hanssen for more than two decades and was once his boss, remembers Mr. Hanssen as "the kind of person who would walk into your office and have a very philosophical discussion about anything from computers and counterintelligence tradecraft to philosophy, ethics and classical music." . "He was a moral and ethical man," added Mr. Major, recalling that Mr. Hanssen characterized communism as "godless." . "Not that many people talk like that, but he did." . Mr. Hanssen, some suspect, must have been energized by the intellectual rush of outsmarting an opponent - even if that opponent was his agency and the cause he served for 25 years. . "It's not a story about gain. It's a story about game," said Mr. Major, who now trains CIA officers. . The public Mr. Hanssen railed in 1950s terms against Marxist-Leninist infiltrators. Raised as a Lutheran, he converted to Catholicism after he married and later became deeply involved with Opus Dei, a conservative Catholic organization. . His politics, too, were conservative and family-oriented. He attended anti-abortion demonstrations and gun shows, decried communism for being "godless" and referred reverentially to the FBI's first director as "Mr. Hoover." . By contrast, the double agent who operated under the code names B, Ramon and Garcia was routinely profane and dismissive of his employer and country. He contemptuously compared the United States to an idiot savant and referred to his KGB handlers as "dear friends" to whom he was "insanely loyal," in letters quoted in the affidavit. His disdain for the FBI only seemed to increase as he continued to elude discovery. . Boasting degrees in chemistry and accounting, Mr. Hanssen was known within the bureau as an intellectual for his mastery of arcane details. INITIALLY, some acquaintances said he had the nickname of Dr. Death because he dressed as properly and somberly as a mortician. But his good friends say it was because he sometimes was so deadly boring that he could induce sleep in colleagues. He delved into computers in the early 1980s, when everyone else was still using electric typewriters, and taught himself two computer programming languages, C and Pascal. . James Bamford, an author of books about intelligence-gathering, met Mr. Hanssen through a mutual acquaintance seven or eight years ago. The two became friends - Mr. Hanssen attended Mr. Bamford's wedding - but Mr. Bamford said that he now believes there was another, darker side to the man. "He had an extremely secret life," Mr. Bamford said. . "It was almost to the point where he had a split personality right down the middle. It's the most complete alter ego I've ever seen." . David Charney, a psychiatrist who has studied spies and was a defense expert in the case of Earl Pitts, an FBI agent charged with espionage in 1996, said Mr. Hanssen may have privately been frustrated with how his life was turning out. "Everyone is their own worst critic," Mr. Charney said. "If they're not satisfied with these ideals, it creates a disease within them." . A target is needed to release the frustration, he said, and often it is the workplace. . "To anybody in espionage, what's the worst thing you can do to sabotage someone who didn't appreciate you, who didn't promote or support you? Give away their secrets," Mr. Charney said. "But here's the crux: Once you've stepped over the line, there's no turning back." He continued: "You're trapped. There are no credible exits. So you resign yourself to living this life." James Kallstrom, who met often with Mr. Hanssen in the 1980s as head of the FBI's special operations division, now wonders whether Mr. Hanssen was as smart as he seemed. . "He had to know the Russians were keeping a record of every contact they had with him," Mr. Kallstrom said. "And it's obvious once the FBI got hold of his Russian file, they were able to figure out who he was. The guy may have been smart and cunning, but he was dumb." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2585 From: James M. Atkinson, Comm-Eng Date: Mon Feb 26, 2001 7:32am Subject: Congress to Grill Intelligence Chiefs Over Russian Spy Scandal Congress to Grill Intelligence Chiefs Over Russian Spy Scandal http://www.russiatoday.com/news.php3?id=297384 WASHINGTON, Feb 26, 2001 -- (Agence France Presse) Members of Congress vowed Sunday to grill Bush administration and top intelligence officials at a special Senate hearing to determine the extent of the damage inflicted by the latest Russian spy scandal. In the wake of last week's dramatic arrest of FBI counterintelligence agent Robert Hanssen, the Senate Intelligence Committee, led by Republican Richard Shelby, plans to put the Washington intelligence community on the witness stand starting Wednesday. Shelby said that after questioning Attorney General John Ashcroft, the director of the FBI Louis Freeh, CIA chief George Tenet as well as other key players, "we will know a lot more," about the scandal that has stunned Washington. Asked on "Fox News Sunday" to say how damaging Hanssen's betrayal really was, Shelby declined to characterize the spy case as the worst ever. "But I would agree from what I know with Louis Freeh, that it's grave, it's very serious," he said. Hanssen, 56, was charged Tuesday with selling information that damaged U.S. security and compromised three Russian double agents working for the United States. A preliminary court hearing is scheduled for March 5 for the former deputy director of FBI Intelligence Division's Soviet Section. Hanssen allegedly began to pass highly sensitive information to Moscow in 1985 and continued in the activity even after the fall of the Soviet Union in the early 1990s. Experts estimate that Hanssen, a 27-year FBI veteran with virtually unlimited access to state secrets, may have seriously compromised U.S. national security. Shelby credited the FBI with doing a good job in unmasking the alleged spy but asked "what took so long?" and questioned security practices at the agency which unlike the CIA does not routinely use polygraph testing on its staff. "The polygraph has got to be a tool," he said. Bob Graham, the senior Democrat on the committee, also advocated regular lie detector testing at the FBI. "In other agencies, such as the CIA, the use of polygraph has been felt to have been an important means by which to discourage people from engaging in this kind of activity," he told Fox. FBI chief Freeh has called on former FBI and Central Intelligence Agency (CIA) director William Webster to carry out a broad review of security measures. Questions about the motives of Hanssen, who was allegedly paid more than a million dollars by Moscow, have yet to be answered, but low pay at the FBI may be a factor, Shelby acknowledged. "Well, I think pay is always a factor. Our agents, CIA, our people in the Justice Department ought to be paid well. But I guess if somebody's really motivated to spy for money, they're going to do it," he said. Former defense secretary William Cohen, speaking on the CBS talk show "Face the Nation," said traitors will always emerge but suggested a number of steps needed to be taken to limit the damage. These would include reducing individual access to information, so no one agent has "access to virtually everything." Also computers should be programmed to alert officials if an agent is carrying out unauthorized searches, as Hanssen allegedly did. "And then finally, consider the possibility of the polygraph. That's something that I think would be important," he said. ((c) 2001 Agence France Presse) -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2586 From: James M. Atkinson, Comm-Eng Date: Mon Feb 26, 2001 7:33am Subject: CIA reacted, but FBI didn't, to earlier spy case CIA reacted, but FBI didn't, to earlier spy case http://orlandosentinel.com/news/orl-asec-hd-spy-022501.story?coll=orl%2Dhome%2Dheadlines Associated Press Posted February 25, 2001 WASHINGTON -- The CIA tightened security dramatically after one of its own, Aldrich Ames, pleaded guilty to espionage in 1994 so that random lie-detector tests could hit any employee at any time. The FBI, by contrast, tiptoed into internal lie-detector, or polygraph, exams of employees. Now that agent Robert Philip Hanssen has been charged with spying for the Soviet Union and then Russia for more than 15 years, some are calling for the bureau to match the CIAís earlier response. "When the Ames case hit, Congress came down very hard on the agency, and the agency did a lot to change the culture so people were more supportive of counterintelligence and understanding counterintelligence," said Cindy Kwitchoff, who left the CIA last year. The CIA has conducted lie-detector tests on employees since its inception. Even before the Ames case, all employees were given polygraphs before hiring, after a three-year probationary period and every five years thereafter. Former CIA official Vincent Cannistraro said the discovery that Ames had been able to access a message-delivery system of overseas operational traffic prompted the CIA to clamp down on such trespassing. "Thereís better access controls at the CIA in the wake of Ames . . . but they were not implemented within the counterintelligence directorate of the FBI," Cannistraro said Friday. The CIA also started having counterespionage experts train its security investigators, required all employees to file detailed annual financial disclosures and established databases that looked at employeesí personal foreign travel, foreign contacts and outside activities. If you want to moonlight, you need the agencyís permission. If you travel to Cancun, you have to tell the CIA. At the FBI, annual financial disclosure forms are required only of people in specified positions, bureau employees must disclose travel plans and agents are banned from taking second jobs, agent Jay Spadafore said. The FBI started requiring polygraphs before employment only in 1994 -- long after Hanssen was hired. Hanssen never took an FBI polygraph. A critical 1997 report by the Justice Departmentís inspector general prompted numerous changes at the FBI. Copyright © 2001, Orlando Sentinel -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2587 From: James M. Atkinson, Comm-Eng Date: Mon Feb 26, 2001 7:34am Subject: U.S. Charges Pose Paradox of Pious Spy for Godless Foe Sunday February 25 05:00 PM EST U.S. Charges Pose Paradox of Pious Spy for Godless Foe http://dailynews.yahoo.com/h/nyt/20010225/ts/u_s_charges_pose_paradox_of_pious_spy_for_godless_foe_1.html By PHILIP SHENON The New York Times Robert Philip Hanssen, the F.B.I. official accused of spying for Russia, gave every appearance of living a pious life, often telling his friends that the teachings of Lenin were incompatible with those of Jesus Christ. WASHINGTON, Feb. 24 ≠ For a man accused of betraying his country to the godless leadership of the Soviet Communist Party, Robert Philip Hanssen could not have seemed a more devout follower of the Roman Catholic Church ≠ or a more committed anti-Communist. He often told his friends in the counterintelligence division of the F.B.I., where he worked for most of his 25-year career with the bureau, that he loathed Communism and that the teachings of Lenin were incompatible with those of Jesus Christ. "Bob would walk into my office and tell me that without religion, man is lost," said his former F.B.I. supervisor, David Major, "and that the Soviet Union would ultimately fail because it was run by the godless Communists. And I believe he was sincere." The bureau's former chief China analyst, Paul D. Moore, recalled that when F.B.I. agents held going-away parties at strip clubs near the bureau's headquarters in Washington, Mr. Hanssen refused to attend, saying his faith would not permit it. "He said, you shouldn't do that because it's an occasion of sin," said Mr. Moore, who used to car-pool to work with Mr. Hanssen, a friend of 20 years. He recalled Mr. Hanssen's snapping off the car radio one day during a talk-show conversation about morality ≠ and whether morality was based on social contracts. "He leaned over and turned off the radio and said, `That's enough of that,' " Mr. Moore said. "He said the foundation for morality is not an implied social contract; it's God's law." If Mr. Hanssen's piety and staunch anti-Communism were simply a front for his treachery, if they were a cover for a long career in espionage, they were remarkably convincing to the professional spy catchers who worked day in and day out with the shy, socially awkward, highly intelligent agent. Mr. Hanssen, who could face the death penalty, was arrested last Sunday on charges of spying since 1985, initially for the Soviet Union and then, after its collapse, for Russia. He was apprehended after he supposedly dropped off secret documents at a park near his home in Vienna, Va. The case is described by officials as potentially the worst intelligence breach in the bureau's history, given Mr. Hanssen's access to some of the most highly classified information in the computer banks of the F.B.I. The bureau has said that at least two Russian double agents who were executed may have been exposed because of his disclosures. In his quarter-century at the F.B.I. ≠ at the time of his arrest, he was only a few months from retirement ≠ Mr. Hanssen gave every appearance of living the life of a God-fearing Christian. When he worked in the fourth-floor offices of the counterintelligence division at F.B.I. headquarters in the 1980's, colleagues remembered that he would sometimes leave his cubicle for an hour to attend Mass at a downtown church. Every Sunday for years, Mr. Hanssen and his wife, Bonnie, a teacher, were found in the same left-side pew near the altar of St. Catherine of Siena Catholic Church in Great Falls, Va. The Hanssens told friends they had selected the church because it was one of the few in the region that still conducted a Latin Mass, and they preferred a traditional service. Among the church's other regular parishioners: Louis J. Freeh, the director of the F.B.I., and Justice Antonin Scalia of the Supreme Court. (Mr. Freeh said through a spokesman that he had known the Hanssens through a handful of contacts at the church but was never a "social friend" of the couple's.) The Hanssens were adherents of Opus Dei, an elite conservative Catholic order. Opus Dei urges its members to attend daily Mass, and Mr. Hanssen also regularly appeared for evening prayer-and-confession sessions known as recollections. While the Hanssens lived in a suburb of Washington known for the quality of its public schools, they chose instead to send their six children ≠ three boys and three girls ≠ to expensive private schools affiliated with Opus Dei. Former colleagues said they would be shocked if Mr. Hanssen turned out to have spent the money he is accused of having received from his handlers in Moscow ≠ at least $600,000 in cash, the F.B.I. says ≠ on alcohol or fancy automobiles or women. Instead, they suspect, he probably used much of the proceeds from his spying to pay tuition at his children's schools. The Heights School of Potomac, Md., which his youngest son, a junior, attends, charges annual tuition and fees of nearly $11,000, which alone would make a large dent in Mr. Hanssen's F.B.I. salary of about $100,000 a year. His older sons also graduated from the school, which will not say if any of the boys received financial aid. Calls for comment to his daughters' school, Oakcrest, in McLean, Va., were not returned. In interviews since his arrest, many of Mr. Hanssen's closest friends and colleagues, dumbfounded by the spying accusations, have said they can only offer a guess as to why a man so committed to his faith might have volunteered for espionage on behalf of the political system that was long considered organized religion's greatest enemy. Several suggest that Mr. Hanssen must have been able to completely compartmentalize his life, deluding himself into thinking that espionage was simply an exciting intellectual challenge that had nothing to do with leading a good, moral Christian life. "I think Bob was able to bifurcate his life," said Mr. Major, his former supervisor. "He somehow made the intellectual leap, which I just cannot rationalize, that the compromise of information was somehow O.K., and that it was just a game. It's too simple to say thrill, but I do believe that he was in for the game, not the gain." Rusty Capps, a retired counterintelligence agent who worked with Mr. Hanssen at F.B.I. headquarters in the early 1990's, agreed that Mr. Hanssen was a "brilliant guy" who may have needed "the thrill ≠ this is a guy who needs stimulation, who liked to walk on the razor's edge." "I probably recruited 50 or 60 people over the years to provide information to the United States, and the vast majority of them did it because their lives weren't all that exciting," Mr. Capps said. "Certainly money is always there, revenge, disgruntlement, ego gratification. But it's also excitement." The theory is supported by F.B.I. documents showing that Mr. Hanssen insisted on several so-called dead drops in the Washington area ≠ risky secret exchanges of packages with his Moscow handlers ≠ at short intervals. Common espionage doctrine holds that it is far less dangerous to exchange more material at fewer dead drops. F.B.I. officials say that Mr. Hanssen's career stalled years ago, and that resentment over his failure to rise higher in management despite his obvious intelligence could be a factor in his decision to spy. But many who know Mr. Hanssen say it was clearly not the full explanation, and that he complained far less than other agents about troubles with his career. "I never had the impression that he felt that he was thwarted," said John J. Gaskill, a retired agent who considered Mr. Hanssen a friend. "There's a very high percentage of special agents who are not necessarily looking to climb the ladder." Evidence released by the F.B.I. seems to suggest that greed would not have been the sole motivation, either. In one letter supposedly written by Mr. Hanssen to his Soviet handlers in November 1985, the letter writer, known to the Russians by the code name B, asked them to stop sending money beyond an initial $100,000. "I have little need or utility for more," the letter said. "It merely provides a difficulty since I cannot spend it, store it or invest it easily." Neighbors who live near the Hanssens' brick and wood home in Vienna remember a quiet, reclusive man who seemed little interested in money or material goods, apart from computers, which were a passion. F.B.I. colleagues say that he did not drink or swear, certainly never in their presence. He made clear that clothes were not important to him. He wore dark, fraying, unstylish business suits, often the same one for two or three days in a row. His wardrobe and timid, dour personality earned him nicknames among colleagues like Dr. Death, the Mortician and Digger, short for gravedigger. Richard McPherson, a fellow member of Opus Dei and the headmaster of the Heights School, said he continued to believe that Mr. Hanssen's shows of piety and his lack of interest in material goods "were not some sort of cover." He remembered Mr. Hanssen's devotion to his children, and how he volunteered for school dances, where he served as a chaperon, and attended his sons' sporting events. "I thought he was a great father, a good husband and a good professional," Mr. McPherson said. "Of course, if he did what he is purported to have done, then he was living a lie as a Christian and a citizen. But I'm still hoping there's an explanation." The roots of Mr. Hanssen's commitment to the church and to law enforcement are found in Chicago, where he was born in April 1944 to a Catholic family. "When people from Chicago meet, they ask what parish are you from," said Mr. Moore, who also grew up in the city. Mr. Hanssen's father was a Navy petty officer who later joined the Chicago Police Department. Robert graduated with a degree in chemistry from Knox College, outside Chicago, in 1966. His F.B.I. records show he also studied Russian there. F.B.I. investigators are trying to determine whether Mr. Hanssen developed another interest ≠ espionage ≠ in his youth in Chicago. The bureau said in its court papers this week that Mr. Hanssen wrote to his Russian handlers last year to say that "I decided on this course when I was 14 years old ≠ I'd read Philby's book." The reference was to Kim Philby, the dashing British traitor who defected to Moscow in 1963, when his involvement in a Soviet spy ring was about to be revealed. (F.B.I. colleagues point out that Mr. Philby's memoirs were not published until the late 1960's, when Mr. Hanssen was well into his 20's, not 14, and that the statement was probably a lie meant to win over his Russian counterparts.) Mr. Hanssen had trouble settling on a career after college. He dropped out of Northwestern University's dental school after two years to enter its business school, where he received an M.B.A. In 1972, he followed his father into the Chicago Police Department, where he was quickly assigned to undercover work. He arrived at the F.B.I. in 1976, hired to work initially on a white- collar crime squad in Gary, Ind. Colleagues say that from the earliest days of his career at the bureau, Mr. Hanssen impressed everyone with his intelligence; some called him brilliant. Mr. Hanssen distinguished himself early in his career for his mastery of computer technology, which he helped introduce to the counterintelligence division ≠ a fact that alarms F.B.I. investigators who are now trying to figure out what damage he may have done. "He was always on the leading edge of computers," Mr. Gaskill said. "He had access to pretty much anything that we were involved in." But while his superiors were excited about his technical skills, they were put off by his awkwardness in social settings, his indifference to his wardrobe, his slouching posture. A tall man, he always seemed to be hunched over, his head perched on his neck at an odd, birdlike angle, colleagues said. In an organization that had always prided itself on a military-style esprit de corps and tended to prefer managers with booming voices who looked good on camera, friends in the bureau say that Mr. Hanssen should have known he was never going to rise very far in the F.B.I. Mr. Capps, the retired counterintelligence agent, recalled organizing a seminar in the early 1990's at which Mr. Hanssen was asked to lecture on counterintelligence techniques. "And people would stop listening to him after one or two sentences," he said. "He had no ability to modulate his voice, no ability to entertain. It was just awful." "`There is a full package of talents necessary to convince management that you could handle yourself at the next level," Mr. Capps said. "He didn't possess that package." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2588 From: James M. Atkinson, Comm-Eng Date: Mon Feb 26, 2001 7:35am Subject: Newsweek Cover: 'The Mind of a Spy' Newsweek Cover: 'The Mind of a Spy' http://news.excite.com/news/pr/010225/ny-newsweek-spys Updated 1:23 PM ET February 25, 2001 FBI Director Freeh Gave Speech at Son's School and Was Greeted by Fellow Agent And Suspected Spy Robert Hanssen Hanssen's Children Assume Allegations Are True, Says In-Law; Dental School Classmate Says Hanssen Would 'Show Off' at Mental Facility, Interrogating Patients NEW YORK, Feb. 25 /PRNewswire/ -- FBI Director Louis Freeh showed up to give a speech at his son's school and was greeted by another school parent, fellow FBI agent Robert Hanssen, who was at that moment under surveillance for turning traitor as a Russian spy, Newsweek reports in the current issue. When Freeh returned to his office the next day, he told a colleague how difficult it had been to give a speech on ethics and morality, all the while knowing that Hanssen -- a 27-year bureau veteran, father of six and member of the righteous and anti-communist Opus Dei -- had betrayed everything that Freeh held dear. (Photo: http://www.newscom.com/cgi-bin/prnh/20010224/NEWSWEEK ) The Newsweek report details the life of Hanssen before and after he became a spy, based on the affidavit released by the FBI and interviews with friends and colleagues. Hanssen's children are assuming the allegations against their father are true, his sister-in-law Liz Rahimi told Newsweek. "They just think there was something wrong with their dad, and they didn't know," she said in the March 5 cover story, "The Mind of a Spy," (on newsstands Monday, February 26). Hanssen's mother-in-law Fran Wauck told Newsweek, "The family is devastated. We don't even know who he is." When he was 21, Hanssen went to dental school. He worked at a state mental facility on the weekends and enjoyed interviewing the patients, as if he were a real psychiatrist, and occasionally would invite a friend to the hospital to watch him perform. "He loved showing people the control he had over the patients, who were mostly bonkers," said John Sullivan, a classmate. "He liked to show off for his friends, putting these people through their paces. He wasn't mean to the inmates; he just quietly interrogated them." Sullivan said Hanssen had another quirk: he repeatedly described a dream, in which he was sitting on a throne, "like Emperor Ming in Flash Gordon," passing final judgment on his enemies. "Guard!" Hanssen would imagine himself commanding. "Take them away!" -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2589 From: James M. Atkinson, Comm-Eng Date: Mon Feb 26, 2001 7:36am Subject: Diamonds Are a Spy's Best Friend Sunday, February 25, 2001 Diamonds Are a Spy's Best Friend http://www.latimes.com/news/comment/20010225/t000016876.html By DAVID WISE WASHINGTON--Perhaps the most startling aspect of the espionage firestorm that broke over Washington last week was that for many years neither the KGB nor the FBI knew the identity of the spy. Senior officials of the KGB and its successor, Russia's SVR, were doubtless ecstatic to have another incredibly valuable mole planted somewhere inside the U.S. intelligence establishment. But the spy had refused to reveal his name, to meet face to face with the Russians or even to say where he worked. He was known to them only as "Ramon." The Federal Bureau of Investigation, in turn, had for several years suspected that a mole was burrowing away inside its ranks, but only within the past few months was it able to narrow the search to Robert Philip Hanssen. Last Sunday evening, the FBI arrested Hanssen, a veteran FBI counterintelligence agent, as he emerged from a "dead drop," a hiding place in a park in Northern Virginia, where officials said he had left a bag of classified documents. A package containing $50,000 was waiting for him in another hiding place nearby, the FBI said. As far as is known, the Russian spy agency did not learn the name Robert Hanssen until just after 7 o'clock Tuesday morning, when Matt Lauer, co-host of NBC's "Today" show, and correspondent Pete Williams broke the news of the arrest hours before it was officially revealed. According to the FBI, for more than 15 years, Hanssen, who has pleaded not guilty to espionage charges, provided highly sensitive classified documents and information to the KGB and the SVR. The damage, FBI Director Louis J. Freeh said, was "exceptionally grave." Hanssen's spying, he added, "represents the most traitorous actions imaginable." The 56-year-old FBI man had worked for the bureau for 25 years, most of that time in counterintelligence. In a long and detailed affidavit, the FBI charged that its trusted counterintelligence agent had been paid or promised $1.4 million. He was earning $114,000 a year at the FBI. Hanssen, the FBI said, had received $600,000 in cash and diamonds and was told that another $800,000 had been placed in an escrow account for him in Moscow. The existence of a suspected deep-cover mole in the most sensitive area of the FBI's operations, its National Security Division, was a devastating blow to the bureau, whose counterintelligence agents have in the past been regarded as highly effective at catching foreign spies. Now, it is alleged, one of their own turned his training and counterespionage skills against his agency and his country. If so, it means that the FBI harbored its own Aldrich H. Ames for more than 15 years. Hanssen is said to have begun his double life on Oct. 1, 1985, less than six months after Ames volunteered his services to Moscow. Ames, a trusted CIA officer, was arrested in 1994 after betraying the names of countless Russians, most of them intelligence agents working for the Central Intelligence Agency. Ten were executed; many others imprisoned. Hanssen stands accused of confirming to the KGB the names of two of those agents who were subsequently shot, and a third, who was imprisoned by the Soviets but later pardoned by former President Boris N. Yeltsin. Ames pleaded guilty and received a life sentence. After the Ames case, Congress passed a law restoring the death penalty for espionage in certain situations. Because Hanssen is accused of contributing to the deaths of two agents, Valery F. Martinov and Sergei M. Motorin, KGB officers who were stationed in the Soviet Embassy in Washington, he could face the death penalty for that or other alleged acts. As his lawyer, Hanssen has hired the wily and formidable Plato Cacheris, who also represented Ames. Hanssen is married with a wife and six children--he attends the same Catholic church as Freeh and the two know each other--and to all outward appearances, he was a dedicated, straight-arrow FBI man living within his means. Although the government might choose to put him on trial, the greater likelihood is that Cacheris, if his client agrees, will seek a plea bargain. Under such a deal, Hanssen would be expected to reveal the full extent of his alleged treachery in exchange for something less than the death penalty. In his alleged spying for Moscow, Hanssen himself appeared well aware of the danger. In one letter to his Russian handlers, the FBI said he wrote: "Recent changes in U.S. law now attach the death penalty to my help to you as you know, so I do take some risk." When an intelligence disaster is uncovered, spy agencies embark on a "damage assessment," now underway in the Hanssen case. Mark Hulkower, the former assistant U.S. attorney who successfully prosecuted Ames, has said that Hanssen's prosecutors must figure out a way to get a plea bargain. Without it, the government may never know the full extent of the alleged damage done. But the FBI has already claimed that Hanssen provided the Russians with 6,000 pages of documents and compromised a huge amount of highly classified programs and intelligence methods, including "technical operations," a euphemism for bugging, wiretapping and other exotic means of listening in on Russian installations and operatives in this country. If there is any comfort for the FBI in all this, it is that U.S. spies, in what Freeh called a "counterintelligence coup," apparently succeeded in obtaining a rare treasure: the actual KGB file on Ramon. The file includes letters between an unidentified American spy and his Russian handlers. Some of those same letters, the FBI said, were found on a computer card in Hanssen's office at bureau headquarters in Washington. The FBI has not said how it obtained the KGB file, although one possibility is that a Russian defector brought it out as his ticket to a generous amount of money from the CIA or the FBI and a new life in America. The FBI isn't saying. Under the CIA's "resettlement program," a defector who came over with a jewel of that magnitude would be guaranteed red-carpet treatment, a large stipend for life, a new identity and personal security. There are many unresolved questions about the case, including not only the extent of the damage, Hanssen's alleged motives, how he was caught and how he managed, if the charges are true, to get away with his spying for so long. The last question is, in some ways, the easiest to answer. As a trained counterintelligence agent, and a good one by all accounts, Hanssen's job was to catch Soviet, then Russian spies. That would have provided him with unexcelled cover if he betrayed his trust. Moreover, someone in Hanssen's position would have known exactly how to maintain contact with the Russians in a way to avoid detection by his counterintelligence colleagues. He knew all the tricks of the trade--that was his job. He refused to meet any Russians, either here or abroad. Typically, Russian spies meet their American agents in Vienna, Mexico or other overseas locations for a simple reason: They assume the FBI will not be watching. Hanssen, according to the FBI affidavit, set the terms by refusing to reveal his true identity or in what government agency he worked. William H. Webster, the respected former director of both the FBI and the CIA, has been enlisted to review the bureau's internal procedures to see whether they can be improved in the wake of the Hanssen case. He will no doubt take a close look at the bureau's lie-detector policy. Although new FBI employees are polygraphed, only selected agents involved in highly sensitive cases are given lie-detector tests, and not routinely. The CIA, which has much greater faith in lie detectors, polygraphs its officers at set intervals. On the other hand, Ames sailed through his polygraph tests with no great difficulty; the KGB had advised him to just relax and get a good night's sleep before facing the machine. Hanssen apparently knew that life on the edge might one day lead to his undoing. "Eventually, I would appreciate an escape plan," he allegedly wrote to his Soviet handlers in 1985. "Nothing lasts forever." - - - David Wise Writes Frequently About Intelligence. he Is the Author of "Cassidy's Run: the Secret Spy War Over Nerve Gas." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2590 From: James M. Atkinson, Comm-Eng Date: Mon Feb 26, 2001 7:37am Subject: Senators call for changes at FBI to prevent spying Senators call for changes at FBI to prevent spying http://www.cnn.com/2001/ALLPOLITICS/02/25/spy.fallout/index.html February 25, 2001 Web posted at: 2:19 PM EST (1919 GMT) WASHINGTON (CNN) -- The chairman of a Senate committee that will investigate the case of a 25-year veteran of the FBI charged with espionage said Sunday he wants to find out why it took investigators so long to uncover the alleged misdeeds, and he called for reforms within the agency to guard against the possibility of having moles within its ranks. "The question is, what took so long?" said Sen. Richard Shelby, R-Alabama, speaking on "Fox News Sunday." "Why did they not have some leads? Or, if they had them, did they ignore them?" Sen. John Kerry, D-Massachusetts, also expressed frustration that an apparent mole went undetected for 15 years. Robert Philip Hanssen was arrested a week ago on charges that he spied for the Soviet Union and later Russia over a period of 15 years. "I don't understand, I really don't understand, how in the most sensitive areas of your counterespionage, et cetera, you don't have better procedures in place to be making certain that people are living up to the highest standards and that this has gone on as long as it has," he said on CNN's "Late Edition with Wolf Blitzer." "I'm shocked. I'm really surprised by it. I think most Americans are ... I think somebody has to be held accountable." Kerry suggested that somebody ought to step down because of the disclosures, but he did not elaborate. "We don't seem to hold people accountable the way one used to," Kerry said. "People would resign over something like this in the past." Shelby, the chairman of the Senate Select Committee on Intelligence, said there have to be changes within the FBI to guard against any spy activity. The committee is scheduled to hold a closed-door hearing Wednesday at which CIA Director George Tenet, FBI Director Louis Freeh and Attorney General John Ashcroft are expected to testify. Shelby noted that Hanssen had been involved with counterintelligence operations for most of his career and suggested that kind of tenure might be unhealthy. "What do you gain by leaving someone in a very sensitive position for so many years?" Shelby asked on "Fox News Sunday." "Sometimes you gain complacency and people get in trouble. I think the FBI, in my opinion, is going to have to change some management practices there, but we're waiting to hear from Louis Freeh." If convicted, Hanssen could face the death penalty or life in prison. He is scheduled to appear in federal court March 5 in Alexandria, Va., for a preliminary hearing. Sen. Bob Graham, a Florida Democrat who sits on the intelligence panel, said the FBI should have picked up warning signs sooner. "There were some lifestyle issues of Hanssen that raised questions," Graham told Fox. "Apparently he had six children, several, if not all, of whom were attending expensive private schools. And the question is, how did he afford to pay that? Those would have been questions raised if the FBI had had regulation financial audits of its sensitive personnel." Graham said the FBI needs to conduct periodic polygraph tests and scrutinize the financial records of those employees in sensitive positions. The FBI and CIA are determining the scope of the security damage allegedly caused by Hanssen, but have described it as serious and extensive. Sen. Chuck Hagel, R-Nebraska, said a thorough review of domestic intelligence operations is needed. "I think we're going to have to open up all the windows and the doors, and take a new look at our entire intelligence apparatus -- the people, the process, the procedures," he said on CNN. "We've become way too complacent and sanguine here over the last few years ... That cannot stand." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2591 From: Date: Mon Feb 26, 2001 11:53am Subject: Someone I'm sure can use this... Click here: Forensex Laboratories Corp 2592 From: Shawn Hughes Date: Tue Feb 27, 2001 5:42am Subject: How to please the IS dept. Subject: How to please your IS Department HOW TO PLEASE YOUR I.S. DEPARTMENT (A quick check list for those who need to make contact.) 1. When you call us to have your computer moved, be sure to leave it buried under half a ton of postcards, baby pictures, stuffed animals, dried flowers, bowling trophies and children's art. We don't have a life, and we find it deeply moving to catch a fleeting glimpse of yours. 2. Don't write anything down. Ever. We can play back the error messages from here. 3. When an I.S. person says he's coming right over, go for coffee. That way you won't be there when we need your password. It's nothing for us to remember 700 screen saver passwords. 4. When you call the help desk, state what you want, not what's keeping you from getting it. We don't need to know that you can't get into your mail because your computer won't power on at all. 5. When I.S. support sends you an E-Mail with high importance, delete it at once. We're just testing. 6. When an I.S. person is eating lunch at his desk, walk right in and spill your guts right out. We exist only to serve. 7. Send urgent email all in uppercase. The mail server picks it up and flags it as a rush delivery. 8. When the photocopier doesn't work, call computer support. There's electronics in it. 9. When you're getting a NO DIAL TONE message at home, call computer support. We can fix your telephone line from here. 10. When you have a dozen old computer screens to get rid of, call computer support. We're collectors. 11. When something's wrong with your home PC, dump it on an I.T. person's chair with no name, no phone number and no description of the problem. We love a puzzle. 12. When an I.S. person tells you that computer screens don't have cartridges in them, argue. We love a good argument. 13. When an I.S. person tells you that he'll be there shortly, reply in a scathing tone of voice: "And just how many weeks do you mean by shortly?" That motivates us. 14. When the printer won't print, re-send the job at least 20 times. Print jobs frequently get sucked into black holes. 15. When the printer still won't print after 20 tries, send the job to all 68 printers in the company. One of them is bound to work. 2593 From: James M. Atkinson, Comm-Eng Date: Tue Feb 27, 2001 8:25pm Subject: Humor At The Bad Guy's Expense C L U M S Y C R O O K S - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Get Your Daily Dose Of Humor At The Bad Guy's Expense! 02-20-01 * Humor - Funny Pictures - Jokes * Issue #121 http://www.clumsycrooks.com ------------------------------------------------------------ IN THIS ISSUE ------------------------------------------------------------ => Clumsy Crook Of The Week => The Funnies => Cool Site Of The Day (Very COOL) => Another Clumsy Crook - Hey send us your funny crook stories & jokes! email to: dave@c... ------------------------------------------------------------ CLUMSY CROOK OF THE WEEK: TRUE STORY ------------------------------------------------------------ Pierce County, Washington A parole went before the judge for violating the drug use section of his parole. The judge fined the parole and gave him another chance. Upon exiting the court room he went to the clerk to make arrangements to pay the fine. He pulled out his wallet, removed a bag of marijuana, set it on the counter and began counting out hundred dollar bills to pay the fine. He was promptly re-arrested. ------------------------------------------------------------ THE FUNNIES ------------------------------------------------------------ A cop pulls a guy over for weaving across two lanes of traffic. He walks up to the drivers window and asks, "You drinkin'?" The driver said, - "You buyin'?" - - - - A sargeant bawled out a rookie. "Did you watch all of the exits like I told you?" "Yep," the rookie answered. "I think he must have left by one of the entrances!" ------------------------------------------------------------ COOL SITE OF THE DAY ------------------------------------------------------------ Twisted Humor: Funny Jokes, pictures & images, funny audio and video files - World's largest site. http://www.linkcounter.com/go.php?linkid=96114 ------------------------------------------------------------ ANOTHER CLUMSY CROOK ------------------------------------------------------------ A Knoxville Police Department Investigator sent two officers to a local motel. A maintenance man had discovered a 19 year old man sleeping in a room that he had not paid for. The officers found the young man hiding behind the bed in the room. When confronted with the police the young man offered to pay for the room in quarters. That was when the police decided to take a look around. Down a hallway, the officers found a snack machine that had been smashed open and all its money missing. The 19 year old was charged with criminal trespassing, theft, and vandalism. ( I guess there is no charge for "just plain stupid"). Submitted By: Noel Holley-Bell Knoxville, TN -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2594 From: A.Lizard Date: Tue Feb 27, 2001 1:41pm Subject: user-friendly spyware Now that Hannsen has joined the colorful past of spying. . . Would you believe that someone is marketing a Windows computer cracking tool as a Napster alternative? ["ShareSniffer Inc.'s newly-launched software, also called ShareSniffer, allows people to hunt for exposed Windows file systems with the ease of a Napster-user searching for a favorite track. "Right now... there are tens of thousands of computers worldwide that have their files deliberately shared with the Internet with no password required," reads the ShareSniffer web site. The site goes on to encourage netizens to rummage through strangers' music files, digital movies, Microsoft Word documents and spreadsheets. The company motto: "Because it's there."] In other words, it's a user friendly Windows cracking tool marketed to the general public. This class of tool isn't exactly new, this kind of tool can be of great legitimate use to sysadmins and of great illegitimate use for crackers. It's making this kind of tool usable even for novices and marketing it that's the innovation. Handing this kind of tool out to people too unsophisticated to know that snooping through the hard drives of others is bad manners at best, likely to get their ISP accounts terminated, and even get put them in jail and encouraging them to use it is one of the most irresponsible things I've ever heard of. http://www.securityfocus.com/news/159 news.admin.net-abuse.email http://groups.google.com/groups?q=alt.sharesniffer&hl=en&lr=&safe=off&rnum=10&seld=922054339&ic=1 And the site URL, which for some reason isn't in the article is: http://www.sharesniffer.com . I'd say security by obscurity about this isn't working, when I searched on sharesniffer earlier at google, I turned up hits on alt.hacker.malicious and alt.fan.cult-dead-cow . I've also seen a lot more hits on port 137 (Windoze file sharing) than usual. I immediately checked my Windows network permissions to make *sure* I hadn't inadvertently turned "file sharing ON"... and I'm running dialup behind the ZoneAlarm firewall. :-) Of course, people who don't have their network permissions turned on to share files are immune, as are people with decent firewalls. Presumably, Hannsen would have eschewed the use of this tool as too "scriptkiddieish"... but for anybody working at a company unsophisticated about securing workstations (probably *most*), this is a dream come true. I think that this is something we're all going to have to keep our eyes out for. While I strongly suspect that this site is going to disappear very soon, the program is going to be showing up at a great many places in the future, among them your clients' employee hard drives. A.Lizard ************************************************************************ Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 2595 From: James M. Atkinson, Comm-Eng Date: Mon Feb 26, 2001 7:46pm Subject: Transcript of a news conference held by FBI Director Louis Freeh and Attorney General John D. Ashcroft regarding charges against FBI agent Robert Philip Hanssen Tuesday, February 20, 2001 Following is the transcript of a news conference held by FBI Director Louis Freeh and Attorney General John D. Ashcroft regarding charges against FBI agent Robert Philip Hanssen. DIRECTOR FREEH: Good afternoon, ladies and gentlemen. I'm Louis Freeh, the FBI director. I'd like to begin by introducing on the platform with me, of course, Attorney General John Ashcroft, seated next to George Tenet, director of central intelligence, Helen Fahey, the U.S. attorney for the Eastern District of Virginia, which has jurisdiction over this case, and Judge William Webster. My pleasure to introduce the attorney general. ATTORNEY GENERAL ASHCROFT: Thank you, Director Freeh. Sunday, the FBI successfully concluded an investigation to end a very serious breach in the security of the United States. The arrest of Robert Hanssen for espionage should remind us all, every American should know that our nation, our free society is an international target in a dangerous world. In fact, the espionage operations designed to steal vital secrets of the United States are as intense today as they have ever been. As an agency responsible for protecting our national security, this is a difficult day for the FBI. It is especially difficult because the person who was investigated, arrested and charged is one of our own. The FBI has done an exemplary job of investigating this very sensitive matter and ending this breach of our national security. I want to commend FBI Director Freeh and his agents for taking decisive action once they learned about this risk to our national security. The FBI moved swiftly and discreetly to effect the arrest. Today's announcement is a result of their professionalism, skill, judgment and dedication. I want to thank the FBI, the CIA, the Department of State and the U.S. attorney's office for their productive cooperation in this case. Let me be clear: Individuals who commit treasonous acts against the United States will be held fully accountable. I will devote whatever resources are necessary within the department to ensure that justice is done in this case and any other case like it. FBI Director Freeh and I have agreed to order a comprehensive, independent review of FBI procedures. I look forward to receiving the report from former FBI director and former director of the Central Intelligence Agency, Judge William Webster, and I thank him for agreeing to lead this review. FREEH: Thank you, Attorney General, for your remarks. Sunday night, as you heard, the FBI arrested Robert Philip Hanssen who was charged with committing espionage. Hanssen is a special agent of the FBI with a long career in counterintelligence. The investigation that led to these charges is the direct result of the long-standing FBI-CIA efforts, ongoing since the Aldrich Ames case, to identify additional foreign penetrations of the United States intelligence community. The investigation of Hanssen was conducted by the FBI in partnership with the CIA, the Department of the State and, of course, the Justice Department. The successful investigation also is a direct result of a counterintelligence coup by the FBI working with its intelligence partners in this community. The complaint alleges that Hanssen conspired to and did commit espionage for Russia and the former Soviet Union. The actions alleged date back as far as 1985 and, with the possible exception of several years in the 1990s, continued until his arrest on Sunday. He was arrested while in the process of using a Fairfax County dead drop to clandestinely provide classified documents to his Russian handlers. FBI agents also covertly intercepted $50,000 in cash, which the Russian intelligence officers put in a second drop we believe intended for Hanssen. It is alleged that Hanssen provided to the former Soviet Union and subsequently to Russia substantial volumes of highly classified information that he acquired during the course of his job responsibilities in counterintelligence. In return, he received large sums of money and other remuneration, including diamonds. The complaint alleges that he received over $600,000 in cash. The full extent of the damage done is yet unknown, because no accurate damage assessment could be done during the course of the covert investigation without jeopardizing it. We believe, however, that it was exceptionally grave. The criminal conduct alleged represents the most traitorous actions imaginable against a country governed by the rule of law. As difficult as this moment is for the FBI and the country, I am, like the attorney general, immensely proud of the men and women who conducted this investigation. Their actions represent counterintelligence at its very best, and under the most difficult and sensitive of circumstances. Literally, Hanssen's colleagues and coworkers at the FBI conducted this investigation and did so professionally, securely and without hesitation. Much of what these men and women did remains undisclosed. But their success, and that of our CIA friends and counterparts, represent unparalleled expertise and dedication to principle and mission. The complaint alleges that Hanssen, using the code name Ramone, engaged in espionage by providing highly classified information to the KGB and its successor agency, the SVR, using encrypted communications, dead drops and other clandestine techniques. The information he is alleged to have provided compromised numerous human sources, technical operations and FBI counterintelligence techniques, sources and methods, as well as investigations, including the Felix Bloch investigation. The affidavit alleges that Hanssen voluntarily became an agent of the KGB in 1985 while assigned to the intelligence division at the FBI field office in New York City. As supervisor of a foreign counterintelligence squad, Hanssen allegedly began spying for the Soviets in 1985, when in is first letter to the KGB he volunteered information that compromised several sensitive techniques. He also independently disclosed the identity of two KGB officials, first compromised by Ames, who were recruited by the U.S. government to serve as agents in-place at the Soviet Embassy here in Washington. When these two KGB officials returned to Moscow, they were tried and convicted on espionage charges and executed. Hanssen subsequently was assigned to a variety of national security posts that legitimately provided him access to classified information relating to the former Soviet Union and Russia. As a result of these assignments within the FBI, he gained access to some of the most sensitive and highly classified information in the United States government. To be very clear on the issue, at no time was he ever authorized to communicate information to agents of the KGB or SVR, nor can there be any doubt that he was keenly aware of the gravity of his traitorous actions. He later wrote to his KGB handler, speaking about the severity with which U.S. law punishes his alleged actions and acknowledging, quote, ``I know far better than most what mine fields are laid and the risks.'' Hanssen was detailed to the Office of the Foreign Missions at the Department of State from 1995 to 2000. The complaint, however, does not allege any compromises by him at the State Department. In one letter to his Russian handlers, Hanssen complains about lost opportunities to alert them that the FBI had discovered the microphone hidden in the State Department, known then by the FBI, but apparently not by Hanssen, that it was being monitored by a Russian intelligence officer. In this assignment, however, he did continue to have access to sensitive FBI information, and he remained assigned to our national security division and routinely dealt with sensitive and classified matters. For many years, the CIA and FBI have been aggressively engaged in sustained analytical effort to identify foreign penetrations of our country. That effort is complemented by substantial FBI proactive investigation of Foreign Service Intelligence officers here and by critical work done by the CIA. Because of these coordinated efforts, the FBI was able to secure original Russian documentation of an American spy who appeared to be Hanssen, a premise that was soon to be confirmed when Hanssen was identified by the FBI as having clandestinely communicated with Russian intelligence officers. As alleged in the complaint, computer forensic analysis, substantial covert surveillance, court-authorized searches and other sensitive techniques reveal that Hanssen has routinely accessed FBI records and clandestinely provided those records and other classified information to Russian intelligence officers. As alleged, he did so using a variety of sophisticated means of communication, encryption and dead drops. You see before you, on the poster board, pictures of two of the dead drops which he used. The one on the left is called Ellis (ph). It's in Arlington. I'm sorry, it's near Vienna, Virginia. This was the dead drop which he used Sunday night to place his package. He was arrested immediately thereafter. The other dead drop, called Louis (ph), is in Arlington. That was the location where the Russian intelligence officers put down $50,000 in cash, we believe intended for Hanssen. We recovered that money, and of course we covered the Ellis dead drop, both during the arrest and thereafter. The complaint alleges that Hanssen, using his training and experience to protect himself from discovery by the FBI, never met face to face with his Russian handlers, never revealed to them his true identity or even where he worked. He constantly checked FBI records for signs that he and the drop sites he was using were being investigated. He refused any foreign travel to meet with the Russians, and even declined to use any of their trade craft. Hanssen never displayed outward signs that he was receiving large amounts of unexplained cash. He was, after all, a trained counterintelligence specialist. For these reasons, the FBI learned of his true identity long before the Russians. They are learning of it today. Even without knowing who he was or where he worked, his value to the Russians was clear, both by the substantial sums of money paid and the prestigious awards given to their own agents for his operation. While this investigation and arrest represents, for me, a brilliant counterintelligence and investigative success, the complaint alleges that Hanssen located and removed, undetected from the FBI, substantial quantities of information that he was able to access as a result of his assignments. None of the internal information or personnel security measures in place alerted those charged with internal security as to his activities. In short, the trusted insider betrayed his trust without detection. While the risk that an employee of the United States government will betray his country can never be eliminated, there must be more that we can do at the FBI to protect ourselves from such an occurrence. I've asked Judge William Webster, and he has graciously agreed, to examine thoroughly the internal security functions and procedures of the FBI and to recommend improvements. Judge Webster is uniquely qualified, as both a former FBI director, CIA director and director of Central Intelligence, to undertake this review. This is particularly timely as we move to the next generation of automation to support our FBI information infrastructures. Judge Webster and anyone he selects to assist him will have complete access and whatever resources are necessary to complete the task. He will report directly to the attorney general and I, and we will share his report with the National Security Council and the Congress. I intend to act swiftly on any of his recommendations. Before concluding, I'd like to take an opportunity, again, to thank the director of central intelligence, George Tenet, for his leadership, for his cooperation and the assistance of his agency in this and many other investigations. Through our cooperative efforts, the FBI and the CIA were able to learn the true identity of Ramone and the FBI was able to conduct an investigation. Our joint efforts over the last several years, and specifically in this case, should be pause to those contemplating betrayal of the nation's trust. Without the current and unprecedented level of trust and cooperation between the CIA and FBI, making this case would not have been possible, nor would many other intelligence, counterintelligence and counterterrorism matters that we work very closely together. Through Attorney General John Ashcroft, I'd like to thank the Department of Justice, and particularly the U.S. Attorney's Office for the Eastern District of Virginia, their level of support and expertise, and that from Acting Deputy Attorney General Robert Muller (ph), Counsel for Intelligence Policy, Frances Frago Townsend, of course the U.S. Attorney Helen Fahey, and Assistant U.S. Attorney Randy Bellows (ph), has been nothing but superb. We particularly appreciate the unhesitating leadership, judgment and support of Attorney General Ashcroft from the moment he took office. Director Tenet and I have briefed the intelligence committees of Congress because of the clear national security implications. As the director, I am proud of the courageous men and women of the FBI, who each day make enormous sacrifices in serving their country. They have committed their lives to public service and to upholding the high standards of the FBI. Since becoming director, over 7 1/2 years ago, I've ministered the FBI oath of office to over 4,600 special agents at the FBI. Each one of them--and I share with them the pride and sanctity of the words that they repeat--swear to support and defend the Constitution of the United States against all enemies, foreign and domestic, and to bear true faith and allegiance to the same. Regrettably, I stand here today both saddened and outraged. The FBI agent who raised his hand and spoke those words over 25 years ago has been charged today with violating that oath in the most egregious and reprehensible manner possible. The FBI entrusted him with some of its most sensitive matters, and the U.S. government relied upon him for his service and his integrity. He has, as charged, abused and betrayed that trust. The crimes alleged are an affront not only to his fellow FBI employees, but to the American people, not to mention the pain and suffering he has brought upon his family. I take solace and satisfaction, however, that the FBI succeeded in this investigation with the help of all the people and entities that I've mentioned, and that, as an agency, we've lived up to our responsibility, no matter how painful that may be. I'd like to introduce now Helen Fahey, the U.S. attorney for the Eastern District of Virginia, to make her remarks. HELEN FAHEY: In the past decade it has been the unfortunate duty of the United States Attorney's Office in the Eastern District of Virginia to prosecute a number of espionage cases, including Ames, Pitts, Nicholson, Squillacote, Boone and others. With each case, we hope that it will be the last. Unfortunately today, with the arrest of Robert Hanssen, we begin again the process of bringing to justice another United States government official charged with the most egregious violations of the public trust. The full resources of the Department of Justice will be devoted to ensuring that those who betray their country and the people of the United States are prosecuted and severely punished. I wish to express my appreciation for the outstanding work done by the National Security Division and the Washington field office of the FBI in this investigation. Their superlative work in this extraordinarily sensitive and important investigation is a testament to their professionalism and dedication. I would also like to express my appreciation for the outstanding assistance provided by the Internal Security Section of the Criminal Division of the Department of Justice, and in particular John Dione and Laura Ingersoll, and also Randy Bellows and Justin Williams of my office for their outstanding work on this case. Thank you. FREEH: We're going to pause just for a moment, and I'm going to be happy to take your questions. And there's some materials that have been prepared for you, including some photographs. They will duplicate the photographs you see on the two boards in front of the room. We also will provide you with the affidavit in support of the arrest warrant, as well as the search warrant. It's about 100 pages. You have a copy of my statement and a copy of a press release. And if there are additional matters that we can release as the process goes forward, we will certainly make those available. I'll take your questions now. QUESTION: When did you first start the investigation of Hanssen? Can you pinpoint the exact time? FREEH: I don't want to pinpoint the exact time. I would say it was the latter part of last year. However, there has been an ongoing initiative, as I mentioned, between the agency and the FBI, going back to the Ames case, to identify additional penetrations. But we focused on it specifically towards the latter part of last year. QUESTION: Dr. Freeh, can you help us put into perspective how this case compares with the Aldrich Ames case, in terms of the damage? I understand that you have just begun your damage assessment, but just help us with the level of importance to U.S. security. FREEH: Yes. I don't want to really characterize it or compare it to another case. These charges, of course, are just charges. If you look at the 100-page affidavit, which is very detailed, including a description of the materials that he is alleged to have transferred to the Soviet officers over a long period of time, and I think you can compare that, certainly, with the public documents in those other cases, but I'd rather not characterize it. I certainly want to wait for a damage assessment, which we've not done, and I certainly will make that available at that point. QUESTION: This is clearly one of the worst that your agency has ever faced, is it not? FREEH: I would clearly characterize it in that fashion. QUESTION: Director Freeh, how difficult was it to make the case, given the fact that this was a man who was well-versed in all the tradecraft? FREEH: Well, I think it was very difficult. And I think, when you look at the affidavit, you will get a sense as to not only his experience, but the deliberate and very consistent methods that he employed to avoid detection. There's about 23 references throughout the 100 pages where, in his conversations, which you will have repeated, to the Russian officers he talks about his security. There's discussions about payments through Swiss bank accounts, taking payments in diamonds. You'll see on pages 88 and 89 of the affidavit that for many years he continuously runs his own name, his address, the drop sites that he's using through FBI indices to see if they are of any interest. There is an occasion reported in the affidavit where, to contact his handlers securely, he asked them to take out a newspaper ad and then will supply them a number where he can be contacted, which is a pay phone number. So this is a very experienced intelligence officer. This was his bread and butter for many, many years. And for that reason, it was an extremely complex investigation, particularly to do it securely and clandestinely. QUESTION: Director, we haven't had the opportunity to read the affidavit, so excuse me if I'm asking something that's written down there. But can you elaborate at all on this counterintelligence feed that you said brought this information to you? FREEH: I really can't at this point. But I will say and emphasize what I did refer to in my remarks, that this case was not an accidental case. We didn't stumble into this investigation. We didn't, as we do in some cases, predicate it on the incidental or even casual find of information. This was a very carefully planned and deliberately directed investigation by our part. And as I mentioned, there are a lot of things that go into that which I can't discuss right now. But it really does testify to the extraordinary work and talent of the people involved and the coordination between the CIA and the FBI. QUESTION: In all due respect, how can you call this a counterintelligence success when you had a spy working inside the FBI for over 15 years without being detected? Why wasn't he detected earlier? And how did he manage to pass, presumably, numerous polygraph examinations for a person in those positions? FREEH: Well, of course, those questions and others that we have will be the subject of Judge Webster's inquiry. The reason I call it a success is that, as an operation and as an investigation, it is an immense success. To conduct this investigation securely, clandestinely, without any leaks and to do it to the point that we could catch, red-handed, an experienced intelligence officer laying down classified documents for his handlers, also intercept $50,000 in cash, which the intelligence officers were providing for him, in the business of counterintelligence I think by any expert would be judged a huge success. That does not, of course, answer the question as to why someone for 15 years can successfully operate. I've indicated a couple of the reasons in the documents why we think he was successful. As I said, the Russians, until they heard the morning reports, did not know his name, did not know where he worked. He is very, very carefully, throughout the affidavit, obsessed with his security. And he was very, very successful in masking and protecting his communications and his activities. FREEH: That doesn't mean we can't do better in terms of our countersecurity measures. We're going to ask Judge Webster to look at that. But you have to separate the operational success from the problem, which indeed is a severe one, of having someone successfully do it, at least until the point that we caught him. (CROSSTALK) QUESTION: Are there any Russian intelligence officers who will be expelled as a result of his contacts? FREEH: I can't comment on that. QUESTION: Mr. Freeh, some past spies were pretty clear that their motive was financial. You say in your statement that he volunteered originally, sent a letter volunteering to spy. Do you have any idea, have you been able to discover why he wanted to spy? FREEH: Well, you'll be able to see the letter in the affidavit. It's a October 1, 1985, letter. It is implied in the letter that he is volunteering, of course, but that he's not volunteering for nothing. The $600,000, which is alleged in the complaint, is a significant amount of money. There is also references to another $800,000, which the Russian intelligence officers indicate, and he confirms, is in an escrow account for him, somewhere outside the United States. As to any other motivations, we just have not had the opportunity to establish those, and I wouldn't want to speculate about them. (CROSSTALK) QUESTION: You say that several people have been executed partly as a possible result of the information passed on, that U.S. sources have been compromised. Do you have a figure on how many people may have been compromised, how many may have died, as a result of this espionage? FREEH: What we've alleged in the complaint is that, on two separate occasions, the defendant provided information after Ames had provided information on two officers, two officers who had been recruited here. And we know from--as we set forth in the affidavit, they were both executed. So it was an accumulation of both types of information. As to other cases, I can't speculate about them. There is nothing alleged in the affidavit. And of course, as we do our damage assessment, we may be able to ascertain others, or we may not, depending on how that analysis goes. QUESTION: Dr. Freeh, two questions: First, was he operating alone or did he have others with whom he worked? And is this an ongoing investigation? And second, is this for you, as the FBI director, the toughest and worst moment since you became director in 1993, given the length of the security breach and the way in which it went undetected for so long on your watch? FREEH: As far as we know, he operated alone, of course in tandem with the Washington intelligence officers. We have no indication that anyone else worked with him or assisted him. But, of course, as we now do a covert investigation, including interviews, we will determine--have not ruled out the possibility that someone else may have assisted him. There's no evidence of that, however, at this time. In terms of the worst case, worst moment: I think probably the worst moment in this job will always be when we have agents killed in the line of duty. Unfortunately, four of them have been killed since I've been here, other agents wounded. In terms of cases and in terms of the integrity of the FBI and the honor of the men and women who serve, this case, as I mentioned, is a great and tragic moment for us. QUESTION: I understand you're going to do a review of what happened, but surely you've asked some tough questions and you have a sense of what some of the biggest loopholes were in the FBI's internal security that allowed him to function for as long as he did as a spy. Do you have a sense of what those loopholes were? And have you made any immediate changes to plug the holes? FREEH: We have not made any immediate changes since the point in time when we focused on this particular case and this particular defendant. One of the advantages of having Judge Webster review everything that we do in terms of security programs, personnel management, records management will give us the benefit of that analysis. We have some ideas. We have some theories. QUESTION: Can you talk about some of them? FREEH: No, I wouldn't want to talk about what I think are the vulnerabilities in our system. What I will say, however, is we don't say, at this stage, certainly, that we have a system that can prevent this type of conduct. At the end of the day, all of our systems probably need to be looked at and maybe improved. But at the end of the day, what we rely upon is honest people, who when they take the oath to defend the Constitution and serve the people, they do that honestly and we can rely on that. That's something that did not happen in this case. QUESTION: How can you be so sure that the Russians didn't know he was an FBI agent? FREEH: Well, as I said, if you look at the complaint, and we have a lot of other bases to conclude that his conversations with them were done purely in an anonymous channel, and that he specifically designed his relationship that way, so if there was to be a compromise on their side, nobody could identify him by name, where he worked or what he looked like, and he was very conscious and very successful at that. QUESTION: One, can you at least identify the Russian handlers? And two, in what way did he compromise the Bloch investigation? FREEH: We have identified some of the handlers. With respect to the compromise of the Bloch investigation, I don't think I want to say more than what's in the affidavit, and there's a fairly definitive description of that compromise in the papers. QUESTION: Can you elaborate on the nature of Sunday evening's apprehension? The events that took place during that time. FREEH: Well, as you'll see in the complaint, because of our investigation and surveillance of the subject, we knew that he had an appointment at the Ellis (ph) site, as he described it in his computer, at 8 p.m. on 2-18-01, which was Sunday. So we had been anticipating from the point that we learned that, which was sometime before Sunday, that something would happen on that site at that time and place. So we were set up by surveillance to monitor it. And he came there. As you'll see in the affidavit, he got out of his car, he marked the park sign with a piece of white tape. The site is called a dead drop. A dead drop is a place where an intelligence officer and his recruited asset can communicate safely and clandestinely without seeing each other or being seen face to face. After he marked the site, he went into the woods and he laid his package down, which is represented in the photograph, at the base of one of the footings on the footbridge. He was in there about nine minutes, he came out to his car. He was arrested at that point by the FBI agents. He was taken out of the area. We maintained our surveillance on that site, as well as the site in Arlington where the $50,000 was put down, the Louis (ph) site. And we were expecting him, as I said, to do something at that site on Sunday evening. QUESTION: Did he comment at that time? FREEH: We gave him his Miranda rights, and I don't want to comment any further on what happened after that. QUESTION: Director Freeh, even if the Russian agents did not know his identify, wouldn't the nature of the information he was providing them indicate that he was a deep source within the FBI, considering what he was providing them? FREEH: No, I don't think so, because in our analysis of the information, both the information which is set forth in the complaint and other information, it would not be very easy to determine where, in fact, he was situated. For instance, the information which is alleged in the complaint, with respect to the three KGB officers that had been recruited, that information was furnished both by Ames and then subsequently by Hanssen as we allege it. So looking at the documentation, which, as you will see in the complaint, was not just FBI documentation, but throughout the community, it would be very hard to make that analysis. QUESTION: Three or two? FREEH: The affidavit refers to three particular officers, two of whom were executed, one who was imprisoned and later released. I'm not sure what page it is on, but it is in your affidavit. QUESTION: (OFF-MIKE) FREEH: I don't want to comment on the nature of the surveillance. We had court-authorized orders, which of course authorized us to conduct the most sensitive part of the investigation. QUESTION: What was Hanssen's reaction when you caught him? And have you been able to discuss this with him or question him? FREEH: As I said, he was arrested. The agents who conducted the arrest perceived him to be surprised and shocked by the arrest. And I don't want to comment on any of the subsequent events, except he was given his Miranda rights and then taken to a facility to be processed. QUESTION: How long had he been under surveillance? And was there any reason why he didn't grab him after he took the money? FREEH: Well, he didn't take the money. The money actually remained in the site in Arlington. QUESTION: I mean, why not wait until he went to get the money, if that's what you've been waiting for him to do? FREEH: Well, we were more interested in what was going to happen at the Ellis (ph) site, because we believed that, at that point, he would put down a package. The package that he put down contains classified information. It has to do with our internal documents and, actually, matters that are presented before the courts. So it was much more important for us to get him placing that package than picking up the money. So we let the money rest for a while and focused on the Sunday Ellis (ph) site. QUESTION: (OFF-MIKE) FREEH: No. QUESTION: Can you confirm that he did in fact take polygraph tests? FREEH: I don't want to comment on that. QUESTION: Do you know where he is being held? FREEH: He is being held in a detention facility in Virginia. And he was, of course, presented for the initial appearance in Alexandria this morning. QUESTION: (OFF-MIKE) FREEH: It was very, very critical information to have. And as I said, it is original Russian documentation, but I don't want to expand on it right now beyond that. QUESTION: What was his work here? Can you describe more about what he did in '85 and in his career? FREEH: Well, as most of his career, as set forth in the affidavit, has been in the foreign counterintelligence area, particularly dealing with the Soviets and the Soviet intelligence services. He worked in New York as a foreign counterintelligence special agent. He ran one of our foreign counterintelligence squads, at that point. His assignments back at headquarters, except for a brief period on our inspections, had to do primarily with foreign counterintelligence. For the last 5 1/2 years, he's been the FBI representative at the State Department, the Office of Foreign Missions. And he was brought back here in January, so we could isolate him and focus more of our investigation on him. QUESTION: Was he authorized to have contact with Russians? FREEH: No, he was not. (CROSSTALK) QUESTION: Did he work on the Aldrich Ames case or any other major espionage cases? FREEH: He had access to a lot of the information that related to those investigations and others. As I mentioned, the affidavit alleges an overlap between some of his activities and Ames' reporting. QUESTION: Many Americans are going to be surprised that this keeps going on. The Cold War is long over. The attorney general said, ``Yes, well it keeps going.'' This man has his roots in the Cold War. Is that what you are finding the United States is mostly facing, a residual? Or, is it a continuing, ongoing--does recruiting continue? Can you give us some sense of this? FREEH: Well, I think it's both residual and ongoing. I think that, with respect to the matters alleged in the affidavit, you cannot simply say that this was an artifact or a residual of the Cold War. The activity obviously continued beyond that. And as late as Sunday, there was clearly an intent to exchange $50,000 in cash for very highly classified and very damaging information from the FBI. So I think that intelligence and counterintelligence are with us and will be with us for some time. As you know, in 1996, the Congress passed the economic espionage statute because of hearings and testimony that indicated that many countries, in fact 22 or 23 of them, use their security services in the United States to clandestinely gather economic information, which is very valuable and which is done by clandestine means. So I think part of this case has got a foot in the past, but part of it has clearly got a foot in the present. QUESTION: (OFF-MIKE) FREEH: No. I don't want to expand beyond that. But no. I'll take one more question. QUESTION: You often talk about the need for accountability within the bureau. Who is accountable in a situation like this? And as director, how much of the responsibility or accountability do you see as your own or the head of the National Security Division? Where does the buck stop? FREEH: Well, the buck stops with me. I'm accountable for it. I'm responsible for it. It clearly happened on my watch and what I have to do, in conjunction with Judge Webster's review, is reexamine, you know, my leadership and my administration to make sure that I didn't let anything go. But I'm the one the responsible and I should be held accountable. I'll take one last question. Yes? QUESTION: Dr. Freeh, you're working closely with the Russians on various international investigations. What does a case like this do to your cooperation with the Russians? FREEH: I don't think it impacts on it at all. You know, we work very closely with the ministry of the interior on criminal matters. We work with their security agency, the internal security agency, on counterterrorism matters. Those will relationships are extremely important to both countries, and I think they will continue and not be affected by this case. Thank you very much. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2596 From: James M. Atkinson, Comm-Eng Date: Tue Feb 27, 2001 8:19am Subject: Signs of the Times Signs of the Times On a Plumbers truck: "We repair what your husband fixed." On the trucks of a local plumbing company in NE Pennsylvania: "Don't sleep with a drip. Call your plumber." Pizza shop slogan: "7 days without pizza makes one weak." At a tire shop in Milwaukee: "Invite us to your next blowout." Door of a plastic surgeon's office: "Hello. Can we pick your nose?" At a laundry shop: "How about we refund your money, send you a new one at no charge, close the store and have the manager shot. Would that be satisfactory?" At a towing company: "We don't charge an arm and a leg. We want tows." On an electrician's truck: "Let us remove your shorts." In a non-smoking area: "If we see smoke, we will assume you are on fire and take appropriate action." On a maternity room door: "Push. Push. Push." At an optometrist's office: "If you don't see what you're looking for, you've come to the right place." On a taxidermist's window: "We really know our stuff." In a podiatrist's office: "Time wounds all heels." On a fence: "Salesmen welcome! Dog food is expensive." At a car dealership: "The best way to get back on your feet - miss a car payment." Outside a muffler shop: "No appointment necessary. We hear you coming." In a veterinarian's waiting room: "Be back in 5 minutes. Sit! Stay!" At the electric company: "We would be de-lighted if you send in your bill. However, if you don't, you will be." In a restaurant window: "Don't stand there and be hungry. Come on in and get fed up." In the front yard of a funeral home: "Drive carefully. We'll wait." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2597 From: James M. Atkinson, Comm-Eng Date: Tue Feb 27, 2001 8:20am Subject: Laws of Nature * Kauffman's Paradox of the Corporation: The less important you are to the corporation, the more your tardiness or absence is noticed. * Murphy's First Law for Wives: If you ask your husband to pick up five items at the store and then you add one more as an afterthought, he will forget two of the first five. * The Salary Axiom: The pay raise is just large enough to increase your taxes and just small enough to have no effect on your take-home pay. * Miller's Law of Insurance: Insurance covers everything except what happens. * First Law of Living: As soon as you start doing what you always wanted to be doing, you'll want to be doing something else. * Weiner's Law of Libraries: There are no answers, only cross-references. * Isaac's Strange Rule of Staleness: Any food that starts out hard will soften when stale. Any food that starts out soft will harden when stale. * The Grocery Bag Law: The candy bar you planned to eat on the way home from the market is hidden at the bottom of the grocery bag. * Lampner's Law of Employment: When leaving work late, you will go unnoticed. When you leave work early, you will meet the boss in the parking lot. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2598 From: 1RCM <1RCM@M...> Date: Mon Feb 26, 2001 6:21pm Subject: Used piece wanted Hi List I'm looking for a used Kaiser 1080-H. Anyone having a line on one please contact me off-list at: 1RCM@M... Thanks ... RCM 2599 From: James M. Atkinson, Comm-Eng Date: Mon Feb 26, 2001 8:30pm Subject: Hanssen holds some cards in his favor Hanssen holds some cards in his favor http://cgi.usatoday.com/usatonline/20010226/3094251s.htm By Pete Earley ''The Justice Department really screwed up,'' CIA traitor Aldrich Ames told me. Prosecutors had seized his bank accounts, expensive house, even his Jaguar sports car, but had overlooked another asset. ''They didn't say a word about the $2 million the Russians are holding for me in Moscow.'' I nearly laughed out loud. Did Ames, who was responsible for the deaths of 10 agents, really believe his Russian pals were going to pay him $2 million now that he had been caught and was sure to spend his life in prison? ''Pete,'' he replied, ''They will pay me. I'm not the only American out there spying for them. There are others and they will be watching to see how the Russians treat me now that I've been caught.'' I had no idea in July 1994 when I interviewed Ames that FBI Agent Robert Philip Hanssen was also allegedly a spy. The FBI claims the Russians have tucked away $800,000 in Moscow for him, too. Based on last week's news reports, it looks like the government has a ''slam dunk'' case. Hanssen is doomed. His fate sealed. He's headed for a death sentence. Don't you believe it. Having done books about America's two most notorious spies, Aldrich Ames and Naval officer John Walker Jr., I can tell you that Hanssen has several aces he still can play -- if he is smart. Swap information for a plea bargain: Despite the public bravado, neither the FBI nor federal prosecutors will want this case to come to trial. Why? Proving espionage is difficult. The Russians aren't going to testify. Even more important, the U.S. intelligence community will not want to discuss its secrets and ''tradecraft'' in public. Add in embarrassment by the FBI. The fact that Hanssen spied for 15 years undetected is as big of a black eye for it as Ames was for the CIA. It will take a lot of television reruns of Efrem Zimbalist Jr., getting his man in The FBI to restore confidence. Moreover, there are practical reasons why the government will want to negotiate a plea bargain. It wants to debrief him and quickly assess how much damage he has done. What documents did he sell, what does he know about his Russian contacts? What information did the Russians ask him to steal? (Knowing what documents the Russians didn't want him to steal will be useful because that might mean they already are getting them from someone else.) Finally, who better than a veteran Russian spy to tell the FBI what is wrong with its security? Use media to put out his side of the story. Television bigshots are hounding his Washington, D.C., attorney, Plato Cacheris, in hopes of nailing a ratings-grabbing ''exclusive interview.'' They can't pay Hanssen, but they will promise to tell ''your side of the story.'' I remember hearing Ames plot how he was going to offer Diane Sawyer an exclusive interview, but only if she first broadcast a sympathetic interview with his bratty wife, Rosario, who the government had jailed as his co-conspirator. Ames urged Rosario to portray herself as an abused spouse who was helplessly manipulated by her vicious CIA-trained husband. I wasn't surprised when Sawyer took that approach in her ''exclusive'' with Rosario. Nor was I shocked when Ames later granted his first interview to someone else. With spies, there is no honor. Cacheris will try to spin stories that will give Hanssen a human face. Offer cooperation in exchange for leniency for family. Hanssen would be wise to look at how Walker and Ames negotiated pleas. Walker, who was a KGB mole for 18 years, pulled a coup, Ames blew it. The difference was attitude. Walker despised the media, hated the government, and never felt regret, embarrassment, or remorse. He had a street punk's attitude. It worked. The government agreed to go soft on his son, Michael, in return for Walker's full cooperation. Michael was lured into the spy ring by his father and was arrested on the aircraft carrier USS Nimitz, where he'd stolen secret documents that he was supposed to destroy. Michael was paroled after serving 15 years, a relatively light sentence for a major spy. Ames immediately gave prosecutors whatever they wanted, naively thinking his cooperation would free his wife. It didn't. She spent nearly four years in prison on charges that many legal scholars believe could have been easily rebuffed. Don't get me wrong. Hanssen is not walking away from all this. The government will threaten the death penalty (unlikely) and a life sentence (almost certain.) He's a lost cause, but if he hangs tough, he might be able to save his family. You can bet Hanssen didn't report the $1.4 million in alleged KGB payoffs on his income tax. Everything he owns will be seized. His wife and children will be put out in the street. That's where a deal will be struck: Hanssen's help in return for his family being spared bankruptcy. If that fails, then Hanssen might want to take a more dramatic step: ask the Russians to transfer the $800,000 into a Swiss account. Think I'm joking? After interviewing Ames, I flew to Moscow and met with a Russian general who had ''handled'' the CIA spy. The first thing he told me was, ''Please tell Mr. Ames we will keep his money drawing interest in a bank and will be searching for ways to get it to him.'' As I was preparing to leave that night, my Russian host took my arm and said, ''You know, we could give you Ames' two million and you could find a way to get it to him.'' For a brief second, I envisioned myself flying home with my briefcase bulging with $100 bills, but I suspected my host was testing me. I politely declined. I don't know if the Russians ever kept their promise to Ames. But Ames was right about one thing: there was at least one spy watching to see how the Russians were going to react. The question now is: Who is out there watching to see how the Russians will treat Hanssen? Pete Earley is the author of Confessions of a Spy: The Real Story of Aldrich Ames and Family of Spies: Inside the John Walker Spy Ring. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2600 From: James M. Atkinson, Comm-Eng Date: Mon Feb 26, 2001 8:32pm Subject: Spy case demos insider threat Spy case demos insider threat http://www.computerworld.com/cwi/stories/0,1199,NAV47-68-84-88_STO58062,00.html FBI suspect's system use went undetected By DAN VERTON (February 26, 2001) The career FBI agent charged with spying last week had significant IT experience and access, underscoring the growing threat to corporate data by insiders. The agent, Robert Phillip Hanssen, was charged with spying for Russia since 1985. He allegedly gave Russian intelligence agents highly classified documents and details about U.S. intelligence sources and electronic surveillance, in exchange for an estimated $1.4 million in cash and diamonds. According to a 100-page affidavit filed in the U.S. District Court in Alexandria, Va., Hanssen used his computer access to the FBI's Electronic Case File system, which contains classified information about ongoing FBI investigations, to check whether the FBI had been alerted to his activities. The lesson for corporate America "is that companies tend to gain a false sense of security from strong perimeter security," like firewalls and intrusion-detection systems, said Eric Friedberg, a former computer and telecommunications crime coordinator at the U.S. Attorney's Office in New York. "What goes on behind the firewall can be even more damaging because of the degree of access insiders have." Friedberg is now a computer crime consultant at Stroz Associates LLC in New York. During the past six months, the firm has worked with half a dozen companies that have been victimized by insiders, said Friedberg. Those cases involved everything from deleted files to cases where individuals covertly set up competing businesses on their employers' servers, he said. Because Hanssen was an authorized user, his queries didn't raise any suspicion. However, after Hanssen was arrested while allegedly dropping off classified paper documents for his Russian handlers, the FBI was able to correlate his log activity in the database with his espionage activities. "In short, the trusted insider betrayed his trust without detection," FBI Director Louis Freeh said during a press conference. Freeh has since ordered that a special panel be formed to review all FBI processes and systems and to study the issue of insider abuse. According to a survey of 359 companies by the FBI and the Computer Security Institute in San Francisco, companies lost more than $50 million last year as a result of unauthorized insider access and abuse of IT systems. Some 38% of firms in the survey reported between one and five incidents of insider abuse. Another 37% said they didn't know how many breaches had taken place. Hanssen was assigned to the New York Field Office's intelligence division in 1979 to help establish the FBI's automated counterintelligence database in that office. Investigators characterized Hanssen as having a "high degree of computer technology expertise." Hanssen made extensive use of computer media, such as encrypted floppy disks, removable storage devices and a Palm II handheld computer, to communicate with Russian intelligence officers, according to the affidavit. He provided as many as 26 encrypted floppy disks during the course of his activities, it said. Hanssen used a technique called 40-track mode, in which a floppy disk is made to have slightly less capacity than normal, allowing text to be hidden in what appears to be a blank disk. "Security is not mainly about software or biometrics. First and foremost, it's about people and policies," said Richard Hunter, a security analyst at Stamford, Conn.-based Gartner Group Inc. One way companies can protect themselves from insider abuse is to focus on what their networks can tell them about what's going on inside the company, said Friedberg. He recommended that companies look into artificial intelligence-enabled software that can tip administrators off to anomalous activity on the network. Allen Thomson, a former CIA scientist, suggested that maybe the FBI and companies should consider using the two-person integrity rule for all sensitive database searches and system operations as a means to reduce the chance that information will be deliberately compromised. That means two people would have to agree to the searches and both would bear witness to what was being done and why. The intelligence community routinely uses the two-person integrity rule for things such as handling cryptographic keys and other highly sensitive data. "This would be a pain but might cut down on unauthorized/malicious use," Thomson said. The downside, however, is that this could frighten some users and cause them not to use the tools that are available to them, he said. So, "roaming around and looking for anomalies and patterns is [still] a good thing in many disciplines, counterintelligence among them." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2601 From: James M. Atkinson, Comm-Eng Date: Wed Feb 28, 2001 2:55pm Subject: THIS IS VERY, VERY TRUE. THIS IS VERY, VERY TRUE. To realize the value of ten years Ask a newly divorced couple. To realize the value of four years Ask two, now single, high school sweethearts. To realize the value of one year Ask a student who has failed a final exam. To realize the value of nine months Ask a mother who gave birth to a still born. To realize the value of one month Ask a mother who has given birth to a premature baby. To realize the value of one week Ask an editor of a weekly newspaper. To realize the value of one hour Ask the lovers who are waiting to meet. To realize the value of one minute Ask a person who has missed the train, bus or plane. To realize the value of one second Ask a person who has survived an accident. To realize the value of one millisecond Ask the person who has won a silver medal in the Olympics Time waits for no one. Treasure every moment you have. You will treasure it even more when you can share it with someone special. The origin of this letter is unknown. Do not keep this letter to yourself... pass it on. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2602 From: Date: Wed Feb 28, 2001 10:52am Subject: Fla. Drops Wiretap Charge Vs. Teen Fla. Drops Wiretap Charge Vs. Teen By BILL KACZOR .c The Associated Press PENSACOLA, Fla. (AP) - Wiretapping charges were dropped Wednesday against a high school student who taped a chemistry lecture without the teacher's consent. Prosecutor John Molchan said the wiretapping law applies only when the person being tape-recorded has a reasonable expectation of privacy - and that was not the case in a classroom of 30 students. ``The young lady was recording a lecture, trying to assist her in learning at that particular time. I'm not sure that's an appropriate forum for prosecution,'' the prosecutor said. Asher Zaslaw, 17, a varsity weightlifter, said she recorded the October lecture at Navarre High School because she was having difficulty in the class and wanted to maintain her 3.89 grade-point average. Teacher Shelaine Goss filed a complaint, and the state brought charges Feb. 5. Calls to the teacher's home were not immediately returned on Wednesday. Principal Louise Driggers said taping in the classroom is against school policy. He said the rule is intended to prevent students from listening to tapes or CDs in class. Zaslaw would have faced penalties including community service if convicted. ``The toll it's taken on her up to this point is a shame,'' said Asher's father, Jay Zaslaw. ``That's not the kind of thing that kids on the right track should be subjected to.'' Barbara Peterson, executive director of the First Amendment Foundation in Tallahassee, said the wiretap law was never intended for classroom lectures. ``There's no expectation of privacy in a classroom,'' Peterson said. ``It kind of stuns me.'' Florida's law is similar to one in Maryland that Linda Tripp was accused of violating by recording conversations with Monica Lewinsky about her affair with former President Clinton. The charge was dropped when Lewinksy refused to testify. The most notable Florida case involved a couple who were fined $500 each in 1997 for using a scanner to tape former House Speaker Newt Gingrich's cellular phone discussion of his ethics problems. AP-NY-02-28-01 1634EST 2603 From: James M. Atkinson, Comm-Eng Date: Thu Mar 1, 2001 9:00am Subject: Guns Found in Alleged Spy's Home Prosecutors Release Spying Details http://www.guardianunlimited.co.uk/breakingnews/US/0,3560,759627,00.html Details Released About Alleged Spy http://www.guardianunlimited.co.uk/breakingnews/US/0,3560,759479,00.html Guns Found in Alleged Spy's Home http://www.guardianunlimited.co.uk/breakingnews/US/0,3560,759524,00.html Wednesday February 28, 2001 12:00 am WASHINGTON (AP) - Federal prosecutors released new details Tuesday of accused spy Robert Philip Hanssen's activities, including a letter in which Hanssen warned his alleged Russian handlers the day of his arrest that ``something has aroused the sleeping tiger.'' According to a new affidavit, the FBI recovered a computer disk from a package that Hanssen dropped at a Virginia park on Feb. 18 that contained a coded letter. In the letter, Hanssen seems to signal that his relationship with the Russians was at an end because he received a new position excluding him from obtaining sensitive documents, the document alleged. ``It seems ... that my greatest utility to you has come to an end, and it is time to seclude myself from active service,'' said the letter, signed ``Ramon Garcia,'' detailed in the affidavit. The FBI has alleged that Hanssen's code name was Ramon Garcia. A search of Hanssen's cars and home turned up ``large amounts of United States and foreign currency ... precious metals, jewelry and other items of value,'' according to a search warrant released Tuesday. Also found: passports, licenses and visas in fictitious or alias identities and records reflecting property sales and purchases both within the United States and foreign countries. The FBI has alleged Hanssen had received more than $600,000 in cash and diamonds, and an additional $800,000 had been set aside for him in an overseas escrow account. The search warrant says the money and valuables are ``illicit proceeds...from multiple years of engaging in espionage for pay from the Soviety Union and successor Russian Federation and their intelligence services.'' Investigators also found records of financial accounts that were Hanssen's but in phony names or aliases. The chairman of the Senate's intelligence committee proposed Tuesday that the FBI rotate spy catchers out of their jobs every few years to guard against complacency and overconfidence. Sen. Richard Shelby, R-Ala., said a rotation system could make it more difficult for spies to operate. ``Why leave someone in such a sensitive position for so long?'' Shelby asked in an interview. ``Although they have experience, there's also a tendency to become complacent, to become overconfident. Why not rotate them out? The military does that in command situations.'' Hanssen is scheduled for his preliminary appearance at a hearing in federal court in Alexandria, Va. on March 5. The nine-page affidavit was filed in U.S. District Court in the District of Columbia in support of search warrants for Hanssen's downtown offices at the FBI and the State Department. A list of what the FBI has turned up in the search of those offices and of Hanssen's home in Vienna, Va., has been compiled but was not immeediately available. FBI and Justice Department officials said they had not yet seen the list and could not comment on it. Hanssen, a 25-year FBI veteran and counterintelligence expert, was arrested on Feb. 18 and charged with espionage. The government alleged in a 109-page affidavit that he passed top-secret counterintelligence information to Soviet and Russian agents over a 15-year period starting in 1985. Hanssen, 56, the father of six, was only the third FBI agent ever accused of espionage. FBI director Louis Freeh called the case ``the most traitorous actions imaginable.'' The FBI began investigating Hanssen late last year after receiving Russian documents indicating that an FBI agent was passing information to the Russians. Hanssen was assigned to a new job in January at FBI headquarters, so the bureau could monitor his activities, according the affidavit released last week. ``Since communicating last, and one wonders if because of it, I have been promoted to a higher do-nothing Senior Executive job outside the regular access to information within the counterintelligence program,'' the letter said, according to the affidavit. ``It is as if I am being isolated.'' 'Ramon' said he detected radio signal bursts in his car, arousing his suspicions. ``Amusing the games children play... Something has around the sleeping tiger. Perhaps you know better than I,'' said the letter released by prosecutors. ``Life is full of its ups and downs,'' said the letter that prosecutors allege Hanssen wrote. It contained the promise of a contact in a year, ``same time, same place.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2604 From: James M. Atkinson, Comm-Eng Date: Thu Mar 1, 2001 9:00am Subject: Super Computer Access, Super Problem Super Computer Access, Super Problem Accused Spy's Activities Could Lead to National Security Overhaul http://www.abcnews.go.com/sections/us/DailyNews/hanssen010227.html W A S H I N G T O N, Feb. 27 ≠ Accused spy Robert Hanssen's "superuser" computer clearance status gave him almost unlimited access to a broad range of national security secrets, and government officials worry they may have to revamp its counterintelligence system, ABCNEWS has learned. "We may have lost our technological base in far as dealing with counterintelligence, and we'll have to start over," said Sen. Richard Shelby, chairman of the Senate Intelligence Committee. Sources told ABCNEWS today that only a small number of FBI agents have the kind of access to confidential information that Hanssen enjoyed and that explains why he may have been able to obtain so much information on several top secret programs. FBI and government officials fear that Hanssen's years of access to government secrets have severely damaged its national security system. Investigators believe that one of the programs compromised by Hanssen was Measurement and Signature Intelligence Program ≠ MASINT ≠ which allows the United States to analyze the size, payload and range of missile fired from around the world. MASINT sensors can also be used to monitor anything that moves from secret overseas factories and military bases and track radar and radio transmissions. Suspicious 'Ramon' Hanssen, a 56-year-old agent in the FBI's counterintelligence department, was arrested last week after he allegedly dropped off a package of information for Russian intelligence agents in a suburban Virginia park. Investigators say Hanssen posed as a double agent named "Ramon" who turned over American counterintelligence information to first the Soviet Union and then Russia over a 15-year period. Court documents indicate Hanssen sensed the FBI was investigating his alleged activities. According to a s affidavit for the search warrant in the case, the package investigators recovered on the day of Hanssen's arrest contained a computer disk which had an encrypted letter the 25-year FBI veteran allegedly wrote to Russian intelligence officers. In the letter, Hanssen ≠ who signed the letter as "Ramon Garcia" ≠ says that he will have stop providing confidential information because he believes officials suspect his secret activities. "I thank you for your assistance these many years," Hanssen wrote. "It seems, however, that my greatest utility to you has come to an end, and it is time to seclude myself from active service." Hanssen also noted that he had been recently reassigned within the bureau to a position where he said he would have less access to vital information. On Jan. 13, he had just been assigned to a newly created position in the Information Resources Division at FBI Headquarters in Washington, D.C. Before then, Hanssen had been the FBI's senior representative to the Office of Foreign Missions in the State Department, where he had access to mountains of intelligence files and headed an interagency counterintelligence group, which, experts believe, put him in a prime position to spy on the United States. "He had access to information from other agencies in the intelligence sphere, electronic intercepts, code word information, all kinds of sensitive estimates of foreign countries' intentions," said ABCNEWS consultant Vince Cannistraro. Sleeping Tiger Aroused In a previous affidavit, FBI investigators revealed Hanssen was transferred so they could monitor his activities more closely without tipping him off. However, his letter in the search warrant affidavit indicates that he sensed that he was being watched and was frustrated about his reassignment. "Since communicating last, and one wonders if because of it, I have been promoted to a higher do-nothing Senior Executive job outside of regular access to information within the counterintelligence program," Hanssen wrote. "It is as if I am being isolated. Ö I strongly suspect you should have concerns for the integrity of your compartment concerning the knowledge of my efforts on your behalf. Something has aroused the sleeping tiger." The search warrant also revealed some of the items investigators recovered from Hanssen's car and home. Among other things, they found: various guns and ammunition, including an AK-47 and 13 handguns and pistols; two Swiss bank account statements from Credit Suisse and Bank Leu; a picture of Catherine Zeta-Jones; an article on the movie Erin Brockovich; and passports, licenses and visas with various aliases. Hanssen's next court appearance is scheduled in federal court in Alexandria, Va. on March 5. ABCNEWSí Pierre Thomas, Beverley Lumpkin, and ABCNEWS.com's Bryan Robinson contributed to this report. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2605 From: James M. Atkinson, Comm-Eng Date: Thu Mar 1, 2001 9:00am Subject: Commentary: A certain kind of traitor Commentary: A certain kind of traitor http://www.vny.com/cf/News/upidetail.cfm?QID=163363 Tuesday, 27 February 2001 12:35 (ET) Commentary: A certain kind of traitor By LOU MARANO WASHINGTON, Feb. 27 (UPI) -- The arrest of suspected spy Robert P. Hanssen evokes echoes from the past. What kind of man betrays his own people not for gain or ideology, but for grievance? In such cases, the more intimately the traitor is involved in his own society, the greater the resentment he feels for slights, real or imagined. With six children to educate, Hanssen needed more money than his FBI salary provided. But as one of his former counterintelligence bosses told The Washington Post, "It's not a story about gain. It's a story about game." As such, it's a very old game indeed. Its players share common traits: high intelligence, an inordinate need for the affirmation of others, the desire for power at any price and a narcissistic sense of entitlement. Of course, only a tiny fraction of those who fit this personality profile turn traitor, but those who do wreak tremendous damage. Perhaps a look at two of Hanssen's predecessors can give us better insight into the motives of the rogue agent: Alcibiades of Athens and the notorious Benedict Arnold. The ancient biographer Plutarch tells us that ambition and a desire for superiority were strong aspects of Alcibiades' character. Because of his noble birth in a highly stratified society, his glibness and his good looks, Alcibiades could get away with reframing outlandish behavior that would have ruined the reputations of other men. For example, when he was about to be thrown in a wrestling match, he bit his opponent's hand hard. "You bite, Alcibiades, like a woman," said his antagonist. "No. Like a lion," Alcibiades replied. Treachery was a way of life for Alcibiades, but he first lost the approval of his countrymen for something he may not have done. Alcibiades was one of the Athenian generals in charge of an expedition that was about to sail against the Sicilian city of Syracuse when he was accused of sacrilegious behavior at a drunken party and of defacing statues of Hermes, the messenger god. The sailors refused to go without him. His enemies then said that he should face trail after his return. Alcibiades wanted the chance to clear himself immediately, but was ordered to sail instead. After the expedition had departed, Alcibiades learned that the Athenians had convicted him of sacrilege, condemned him to death, confiscated his property, and "decreed a solemn curse upon his name." His only comment was, "I will make them feel that I am alive," and he did. First he betrayed Athens to the Spartans, then the Spartans to the Persians, and then rejoined the Athenian fleet and led it to victory against the Spartans. Two thousand, five hundred years later, most American schoolchildren have learned to equate the name "Benedict Arnold" with "traitor," but few know of the important contributions Arnold made for six years to the cause of American independence. Arnold was involved in the capture of the British garrison at Fort Ticonderoga, N.Y. He then led the ill-fated invasion of Canada and was wounded in the unsuccessful attempt to capture Quebec City in a snowstorm on the last day of December, 1775. After a fighting retreat, he defeated the British attempt to cut the colonies in two by means of a naval invasion from Canada, winning precious time for the American cause. He participated with distinction in many battles, notably the Battle of Freeman's Farm on Sept. 19, 1777 and the Battle of Bemis Heights on Oct. 7. On Oct. 10-17, 1777, came the Battle of Saratoga, N.Y., which is called the turning point in the American Revolution. Arnold led a bold counterattack that ensured the American victory and was wounded severely in the leg. By this time he had clashed with Gen. Horatio Gates, whom Arnold considered overly timid, and Gates had relieved Arnold of his command. Arnold -- who had high intelligence, energy and determination -- was also thought of as ruthless, egocentric man who craved power at all costs and the financial rewards that went with it. Although George Washington appointed him commandant of Philadelphia after the British evacuation of the city in 1778, he was an embittered man who, according to historian James Henretta, was disdainful of his fellow officers and resentful of Congress for not promoting him more quickly. "Arnold's extravagance drew him into shady financial schemes and into disrepute with Congress, which investigated his accounts and recommended a court martial," Henretta wrote. Arnold then coolly calculated to deliver the American fort at West Point, N.Y., and its 3,000 defenders, to the British for a large sum of money. The arrest and execution of his British "handler," Maj. John Andre, thwarted Arnold's plans. Late in the war, Arnold led British raids into his home state of Connecticut and also into Virginia. He resettled in England, where tradition has it he was treated with contempt until his death in 1801. This earned contempt prefigures Hanssen's dealings with the Russians. Arnold and Hanssen, both intelligent men with an insatiable need for recognition, did not anticipate what would have been obvious to the ordinary person -- namely, even the beneficiaries of treason don't admire the traitor. Hanssen's need for appreciation, as expressed in his communications with the Russians, was as childlike as it was pathetic. In a 106-page affidavit, the FBI counterintelligence agent is accused of having defamed the United States while declaring himself "insanely loyal" to his KGB handlers. He traded the limited autonomy he enjoyed as a federal official for slavish ingratiation to a hostile state. The man for whom power was precious left himself with none. Double agents, such as Hanssen, face the problem that they are never really trusted by "other side." If they have turned once, they can turn again. -- Copyright 2001 by United Press International. All rights reserved. -- -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2606 From: James M. Atkinson, Comm-Eng Date: Thu Mar 1, 2001 9:00am Subject: Accused FBI Spy "Knew He Was Under Suspicion" Accused FBI Spy "Knew He Was Under Suspicion" http://www.russiatoday.com/news.php3?id=299427 WASHINGTON, Feb 28, 2001 -- (Reuters) A veteran FBI agent accused of spying for Moscow left an encrypted letter for his Russian handlers on the day of his arrest saying he knew he was under suspicion, according to court documents released on Tuesday. An FBI affidavit quoted the letter as saying: "It seems, however, that my greatest utility to you has come to an end, and it is time to seclude myself from active service." It was signed by "Ramon Garcia," an alias allegedly used by accused spy Robert Hanssen. "Something has aroused the sleeping tiger. Perhaps you know better than I," he said in the letter that was found on a computer diskette. "Life is full of ups and downs." The letter said he had been promoted "to a higher do-nothing" job outside of regular access to information on the FBI's counter-intelligence program. "It is as if I am being isolated," he said. After it began investigating him, the FBI in January transferred Hanssen from his job at the State Department to FBI headquarters. The 25-year FBI veteran is accused of spying for Moscow since 1985 in exchange for $1.4 million in cash, diamonds and money placed in a Russian bank account. He was arrested on February 18 after FBI agents watched him allegedly drop off a package of classified information at a park near his northern Virginia home, which was to be picked up by his Russian handlers. LETTER CONTAINED IN SUPPORT OF SEARCH WARRANT The new letter was contained in an affidavit by FBI agent Stefan Pluta in support of a search warrant for the office where Hanssen worked at FBI headquarters and his former office at the State Department. Pluta said FBI agents on surveillance saw Hanssen on the day of his arrest take a black plastic trash bag from the trunk of his car. The taped-up package, recovered by the agents after Hanssen's arrest, contained the diskette. The letter elaborated on his suspicions. "I believe I have detected repeated bursting radio signal emanations from my vehicle. I have not found their source, but as you wisely do, I will leave this alone, for knowledge of their existence is sufficient." The letter, addressed "Dear Friends", added: "Amusing the games children play." Hanssen said he strongly suspected the Russians "should have concerns for the integrity of your compartment concerning knowledge of my efforts on your behalf." Inside the package were seven FBI secret documents, dated from October to December, about FBI counter-intelligence investigations against Russian targets, Pluta said. FBI Director Louis Freeh has said an internal FBI investigation began late last year after an intelligence audit revealed the presence of a mole in the agency. The United States then secretly obtained Russian documents that led them to suspect Hanssen. Other court documents released on Tuesday gave an inventory of what FBI agents found when they searched Hanssen's car and home right after his arrest. Among the more than 50 items found in the car were a rosary, a large counter-intelligence poster, several spy books, including one titled, "U.S. Counterintelligence, Ethics and Conflict," and a bottle of Russian vodka. In Hanssen's house, agents listed more than 250 items, including a brown file containing an original FBI document about a Russian defector, account statements from two Swiss banks, Credit Suisse and Bank Leu, and a number of guns. Agents seized a computer and a number of computer disks, a manual entitled "Soviet Active Measures in the Post Cold War," and a photo of the grave site of George S. Patton Jr. -- the tough World War II U.S. general. (C)2001 Copyright Reuters Limited. All rights reserved. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2607 From: James M. Atkinson, Comm-Eng Date: Thu Mar 1, 2001 9:00am Subject: Spying - Old Profession Adjusting to New Age Spying - Old Profession Adjusting to New Age http://www.russiatoday.com/news.php3?id=299471 WASHINGTON, Feb 28, 2001 -- (Reuters) The Cold War has ended and targets have shifted, but one of the world's oldest professions -- espionage -- is very much alive as governments seek to keep tabs on one another, U.S. intelligence experts say. The recent arrest of FBI agent Robert Hanssen, accused of spying for Moscow over 15 years, sent a shudder through the U.S. government about secrets that were compromised and betrayal that outlived the collapse of the Soviet empire. Hanssen was caught earlier this month allegedly dropping off a package of classified information in a suburban Virginia park outside Washington, nearly a decade since the Soviet Union's demise. "The Hanssen case is a throwback to the old days," Gregory Treverton, former vice chairman of the National Intelligence Council, said. "It's a reminder that classic forms of espionage and counter-espionage are still going on," he said. After the Cold War ended, spies shifted their focus to newer threats. "There has always been a lot of spying. It didn't begin with the Cold War and it sure didn't end with the Cold War," former CIA Director Robert Gates said. "It's really more of a pre-World War I situation (now) in the sense that you have a number of nation states and no longer just two blocks arrayed against one another in the world," Gates, CIA chief from November 1991 to January 1993, said. UNCOVERING EXTREMISTS U.S. intelligence efforts are now more focused on uncovering what extremists are planning, preventing pieces of Russia's nuclear arsenal from falling into the wrong hands and stemming the international narcotics trade. But seeking a window into another government's operations will always be a staple of the business. "All governments want to know what all other governments are doing," Gates said. Russia was probably still interested in U.S. intelligence operations against it, military technology, U.S. policies on Russia and what secrets the United States was interested in acquiring about Russia, Gates said. The United States would like to know whether Russia's nuclear weapons were secure and not being smuggled out into rogue hands, Gates said. During the Cold War, a lot of U.S. intelligence analysis was "Kremlinology," a look at who was standing next to whom at Lenin's tomb and turning Soviets into double agents, Lawrence Korb, a former U.S. assistant defense secretary, said. But now the goal was more to infiltrate "terrorist" networks, which was much more difficult, he said. TRACKING BIN LADEN "The main priority now is to find out what Osama bin Laden and his friends are up to," said Korb, who is now director of studies at the Council on Foreign Relations. The United States has accused bin Laden, a Saudi exile living in Afghanistan, of masterminding the 1998 bombings of two U.S. embassies in East Africa. CIA Director George Tenet recently said bin Laden was one of the most serious threats. But extremists did not need to do the type of spying to accomplish their mission as government intelligence services must do to prevent their success, experts said. "If you're a terrorist, you know pretty much what you want to blow up," Korb said. "It's much more us wanting to find out what these folks are doing than vice versa." A surprising statistic was that more Americans died as a result of "terrorism" during the last decade of the Cold War than in the decade after the Soviet collapse, Korb said. He cited data showing that since 1989, 105 Americans were killed in 41 attacks overseas, including the October 12 attack on the USS Cole in Yemen in which 17 U.S. sailors died. During the 1980s, 571 people were killed in 69 attacks, Korb said. U.S. officials will not say how they got the original letters between an American spy code-named "B" and "Ramon" -- who authorities allege was Hanssen -- and his Russian handlers. But intelligence experts say it was fairly clear someone in Russian intelligence gave that file up to the United States. That should give Americans pause about spying for Russia as they may be more vulnerable to being outed, experts said. The end of the Cold War made it "slightly easier for people to do this (become a spy) or to justify it," Treverton said, because "being a traitor with respect to an imminent enemy may have been daunting." Moles were just part of doing business in the espionage game and there were probably still some buried in U.S. government positions, experts said. "In a certain sense, if you do a significant amount of spying and counterspying, this is a kind of cost of business," Treverton said. "No security system is foolproof." "I think any leader of an organization that did not assume that there was a spy or a mole inside would be making a serious mistake," Gates said. "The whole theme of internal security in the government is premised on minimizing the damage in case there is somebody on the inside working for the other side," he added. (C)2001 Copyright Reuters Limited. All rights reserved. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2608 From: James M. Atkinson, Comm-Eng Date: Thu Mar 1, 2001 9:00am Subject: Feds: Alleged Spy Feared End Was Near Feds: Alleged Spy Feared End Was Near http://www.abcnews.go.com/sections/us/DailyNews/hanssen010228.html Ramoní Raised Concerns In Letter to Russians W A S H I N G T O N, Feb. 28 ≠ An FBI agent accused as a Russian spy suspected investigators were on to him, and allegedly said so in a letter to his Russian handlers, an FBI affidavit suggests. "I strongly suspect you should have concerns for the integrity of your compartment concerning the knowledge of my efforts on your behalf," Robert Hanssen allegedly wrote, according to an FBI affidavit to support a search warrant application for Hanssen's former FBI offices. "Something has aroused the sleeping tiger." The letter was found on an encrypted computer floppy disk and signed by "Ramon Garcia," an alias used by Hanssen, according to the FBI. The FBI claims the diskette was part of a package in Hanssen's possession on Feb. 18, the day he was arrested. In it, the writer said he believed his promotion to a "higher do-nothing job" that gave him less access to sensitive information, as well as apparent radio interference he detected from his car, were signs he was under investigation. "I thank you for your assistance these many years," the affidavit quotes "Ramon Garcia" as writing. "It seems, however, that my greatest utility to you has come to an end, and it is time to seclude myself from active service." In a previous affidavit, FBI investigators revealed Hanssen was, in fact, transferred so they could monitor his activities more closely without tipping him off. Suspicious 'Ramon' Hanssen, a 56-year-old agent in the FBI's counterintelligence department, was arrested last week after he allegedly dropped off the package with the diskette and other information for Russian intelligence agents in a suburban Virginia park. Investigators say Hanssen, a 25-year veteran of the FBI turned over American counterintelligence information to first the Soviet Union and then Russia over a 15-year period. Hanssen had just been assigned to a newly created position in the Information Resources Division at FBI Headquarters in Washington, D.C. on Jan. 13. Before then, Hanssen had been the FBI's senior representative to the Office of Foreign Missions in the State Department, where he had access to mountains of intelligence files and headed an interagency counterintelligence group, which, experts believe, put him in a prime position to spy on the United States. "He had access to information from other agencies in the intelligence sphere, electronic intercepts, code word information, all kinds of sensitive estimates of foreign countries' intentions," said ABCNEWS consultant Vince Cannistraro. The search warrant support documents that mentioned the letter also revealed some of the items investigators recovered from Hanssen's car and home. Among other things, they found various guns and ammunition, including an AK-47 and 13 handguns and pistols; two Swiss bank account statements from Credit Suisse and Bank Leu; a picture of Catherine Zeta-Jones; an article on the movie Erin Brockovich; and passports, licenses and visas with various aliases. Hanssen's next court appearance is scheduled in federal court in Alexandria, Va. on March 5. Need to Retool Counterintelligence System? Hanssen's "superuser" computer clearance status gave him almost unlimited access to a broad range of national security secrets, and government officials worry they may have to revamp its counterintelligence system, ABCNEWS has learned. "We may have lost our technological base in far as dealing with counterintelligence, and we'll have to start over," said Sen. Richard Shelby, chairman of the Senate Intelligence Committee. Sources told ABCNEWS Tuesday that only a small number of FBI agents have the kind of access to confidential information that Hanssen enjoyed and that explains why he may have been able to obtain so much information on several top secret programs. FBI and government officials fear that Hanssen's years of access to government secrets have severely damaged its national security system. Investigators believe that one of the programs compromised by Hanssen was Measurement and Signature Intelligence Program ≠ MASINT ≠ which allows the United States to analyze the size, payload and range of missile fired from around the world. MASINT sensors can also be used to monitor anything that moves from secret overseas factories and military bases and track radar and radio transmissions. ABCNEWSí Pierre Thomas, Beverley Lumpkin, and ABCNEWS.com's Bryan Robinson contributed to this report. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2609 From: James M. Atkinson, Comm-Eng Date: Thu Mar 1, 2001 9:00am Subject: U.S. Senate Panel to Question Freeh on Spy Case U.S. Senate Panel to Question Freeh on Spy Case http://www.russiatoday.com/news.php3?id=299479 WASHINGTON, Feb 28, 2001 -- (Reuters) The Senate Intelligence Committee plans to question FBI Director Louis Freeh on Wednesday about why it took so long to uncover an agent accused of spying for Moscow over 15 years. Freeh, CIA Director George Tenet and Attorney General John Aschcroft were scheduled to testify at the closed-door hearing starting at 2 p.m. EST (1900 GMT) about the case of Robert Hanssen. The 25-year veteran of the FBI is accused of selling secrets to Moscow over 15 years for $1.4 million in money and diamonds. Lawmakers have raised questions about why law enforcement authorities did not catch him sooner. Hanssen was arrested on February 18 after FBI agents watched him drop off a package allegedly containing classified material in a park in Virginia, to be picked up by Russian handlers. Senate Intelligence Committee Chairman Richard Shelby, an Alabama Republican, and Vice Chairman Bob Graham, a Florida Democrat, both said they would ask why Hanssen's alleged activities were not uncovered earlier and how the FBI's internal security could be improved. They also were expected to discuss whether a more rigorous polygraph regimen was needed at the FBI, where new hires and agents working on highly-sensitive cases are given the test. The Central Intelligence Agency has a more regimented polygraph schedule and also conducts random tests. The senators also plan to ask about the extent of Hanssen's access to sensitive information and how much damage to national security the information given to Russia did, although a full damage assessment has not yet been completed. They plan to ask Tenet what the role of the CIA was in hunting down the mole and concluding that it was Hanssen. (C)2001 Copyright Reuters Limited. All rights reserved. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2610 From: James M. Atkinson, Comm-Eng Date: Fri Mar 2, 2001 11:26am Subject: FIVE THINGS IT TOOK ME TOO MANY YEARS TO LEARN FIVE THINGS IT TOOK ME TOO MANY YEARS TO LEARN 1. Never under any circumstances take a sleeping pill and a laxative on the same night. 2. If you had to identify, in one word, the reason why the human race has not achieved, and never will achieve, its full potential, that word would be "meetings." 3. When trouble arises and things look bad, there is always one individual who perceives a solution and is willing to take command. Very often, that individual is crazy. 4. Take out the fortune before you eat the cookie. 5. The most powerful force in the universe is gossip. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2611 From: James M. Atkinson, Comm-Eng Date: Fri Mar 2, 2001 11:30am Subject: Serious Hearing Problems An elderly gentleman had serious hearing problems for a number of years. He went to the doctor and the doctor was able to have him fitted for a set of hearing aids that allowed the gentleman to hear 100%. The elderly gentleman went back in a month to the doctor and the doctor said, "Your hearing is perfect. Your family must be really pleased that you can hear again." The gentleman replied, "Oh, I haven't told my family yet. I just sit around and listen to the conversations. I've changed my will three times!" -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From: Aimee Farr Date: Wed Feb 27, 2002 1:56am Subject: RE: Rants and flames Mr. Prentner: > >>Steve Uhrig stated: "If any exception was made whatsoever for the public > to use this stuff, it > >>would be for video from the lovely Aimee's boudoir (sp?) !!" > > Do the rules of this forum permit sexual harassing rants? Gosh, I hope so. You wouldn't believe the information that gets me in here. *batty eyelashes* Actually, they have more subtle ways of dealing with a suspected "sexual harassers." If they are suspected evil-female-lawyers, it resembles a Raptor scene from Jurassic Park. You know, "they coordinate." *I'm* the one that's in the "sexual harassment" dog house, not Uhrig. In a sense, I sexually harassed Steve first. (He won't mind me telling this, I know...) I sent him my picture, with what probably resembled some goofy pretextual introductory conversation. He sent me back a picture of him and his wife, and fairly called me a rattlesnake. I recall he even mentioned something about "K-Mart stock photos." Hence, "Uhrig" secured a place in my contacts file. Is this relevant to the list? Yes. It's the "Strange Women Are Bad Rule." Also, I use adversarial tactics to provoke conversation. (I'll stop.) And, Steve does speak from experience, and I get a lot of insight from him. Anyway, thanks for your sentiments Karl, but I asked for it. :-] ~Aimee 4894 From: James M. Atkinson Date: Wed Feb 27, 2002 6:38am Subject: Beer study Subject: Beer study Sad news about beer. You have to hope this study is flawed, but the evidence is irrefutable. A group of scientist for Health Canada suggested that, considering the results of recent analysis that revealed the presence of female hormones in beer, men should take a hard look at their beer consumption. The theory is that drinking beer makes men turn into women. To test the theory, 100 men were fed 6 pints of beer within a one hour period. It was observed that: 100% of the men gained weight, talked excessively without making sense, became overly emotional, couldn't drive, failed to think rationally, argued over nothing, had to sit down while urinating, couldn't perform sexually, and refused to apologize when wrong. No further testing is planned. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "It is not the critic who counts, not the man who points out how the strong man stumbled, or where the doer of deeds could have done better. The credit belongs to the man who is actually in the arena; whose face is marred by the dust and sweat and blood; who strives valiantly; who errs and comes short again and again; who knows the great enthusiasms, the great devotions and spends himself in a worthy course; who at the best, knows in the end the triumph of high achievement, and who, at worst, if he fails, at least fails while daring greatly; so that his place shall never be with those cold and timid souls who know neither victory or defeat." - Theodore Roosevelt,1910 -------------------------------------------------------------------------------------------------- 4895 From: paragonwa Date: Wed Feb 27, 2002 9:02am Subject: Laptop Security A few weeks ago someone on the list (or another one that I subscribe to) was looking for a way to track or locate their laptop if stolen. Loyaltec - http://www.Loyaltec.com has a product called BRIKAC that is suppose to do this. http://www.loyaltec.com/brikac.htm R K Carper CrypTEC Forensic Bellevue, WA Ron@C... http://www.CrypTEC-Forensic.com 4896 From: Marty Kaiser Date: Wed Feb 27, 2002 4:12am Subject: Fw: Quantas These will just tickle your funnybone. . . . Subject: Fw: Quantas Here are some actual logged maintenance complaints and problems, known as submitted by QUANTAS pilots and the solution recorded by maintenance engineers. By the way Quantas is the only major airline that has never had an accident. P = The problem logged by the pilot. S = The solution and action taken by the engineers. ************************************************************ P: Left inside main tire almost needs replacement. S: Almost replaced left inside main tire. P: Test flight OK, except autoland very rough. S: Autoland not installed on this aircraft. P: No. 2 propeller seeping prop fluid. S: No. 2 propeller seepage normal. Nos. 1, 3 and 4 propellers lack normal seepage. P: Something loose in cockpit. S: Something tightened in cockpit. P: Dead bugs on windshield. S: Live bugs on back order. P: Autopilot in altitude-hold mode produces a 200-fpm descent. S: Cannot reproduce problem on ground. P: Evidence of leak on right main landing gear. S: Evidence removed. P: DME volume unbelievably loud. S: DME volume set to more believable level. P: Friction locks cause throttle levers to stick. S: That's what they're there for! P: IFF inoperative. S: IFF always inoperative in OFF mode. P: Suspected crack in windscreen. S: Suspect you're right. P: Number 3 engine missing. S: Engine found on right wing after brief search. P: Aircraft handles funny. S: Aircraft warned to straighten up, fly right, and be serious. P: Target radar hums. S: Reprogrammed target radar with words. P: Mouse in cockpit. S: Cat installed 4897 From: ctm120 Date: Tue Feb 26, 2002 9:47pm Subject: Rants & Flames Karl: With all undue respect, you've butted in a conversation where you clearly don't belong, and the subject of which you apparently don't understand (either TSCM or the law). You have also impuned and insulted one the most respected practisioners in the field; a man who has forgotten more than most on this list will ever learn and who is a sage to many of us. His integrity is undisputed to anyone who knows him. Selfish motives were not behind his comments, which incidentally were legally correct. Rather the opposite. He was giving fare warning to those of us (me included) who don't take the matter seriously enough or think we are immune to the law. He personally gave me the same advice last year when I mentioned my "trophies" that I then was using to practice with. I took Steve's advice to an FBI agent who told me I'd better follow that advice. I am a police officer and the goalie on a law enforcement hockey team. The agent is a personal friend who is a forward on our team. We played together for years. He was shocked that I would be so ignorant as to think being a police officer and a TSCMer for 13 years would confer any immunity from prosecution for possessing these devices; period. Steve, as usual was right. Rather than knock someone you obviously know nothing about, or their knowledge or intentions, do some research next time so you won't have to open your mouth wider for the other foot. Chad Off Duty Security offdutysecurity@h... 4898 From: Fernando Martins Date: Wed Feb 27, 2002 8:13am Subject: RE: Beer study Workaround until a fix is available by several vendors: just drink portuguese wine ;) Any tips from Germany? :> FM > -----Original Message----- > From: James M. Atkinson [mailto:jmatk@tscm.com] > Sent: quarta-feira, 27 de Fevereiro de 2002 12:38 > To: TSCM-L Mailing List > Subject: [TSCM-L] Beer study > > > > Subject: Beer study > > Sad news about beer. You have to hope this study is flawed, > but the evidence is irrefutable. A group of scientist for > Health Canada suggested that, considering the results of > recent analysis that revealed the presence of female hormones > in beer, men should take a hard look at their beer consumption. > > The theory is that drinking beer makes men turn into women. > To test the theory, 100 men were fed 6 pints of beer within a > one hour period. It was observed that: 100% of the men > gained weight, talked excessively without making sense, > became overly emotional, couldn't drive, failed to think > rationally, argued over nothing, had to sit down while > urinating, couldn't perform sexually, and refused to > apologize when wrong. > > No further testing is planned. > > -- > > -------------------------------------------------------------- > ------------------------------------ > The First, The Largest, The Most Popular, and The Most > Complete TSCM, Bug Sweep, Spy Hunting, and > Counterintelligence Site on the Internet. > -------------------------------------------------------------- > ------------------------------------ > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com > -------------------------------------------------------------- > ------------------------------------ > "It is not the critic who counts, not the man who points out > how the strong man stumbled, or where the doer of deeds could > have done better. The credit belongs to the man who is > actually in the arena; whose face is marred by the dust and > sweat and blood; who strives valiantly; who errs and comes > short again and again; who knows the great enthusiasms, the > great devotions and spends himself in a worthy course; who at > the best, knows in the end the triumph of high achievement, > and who, at worst, if he fails, at least fails while daring > greatly; so that his place shall never be with those cold and > timid souls who know neither victory or defeat." > - Theodore Roosevelt,1910 > > -------------------------------------------------------------- > ------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire > speed, the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > 4899 From: DrPepper Date: Wed Feb 27, 2002 10:28am Subject: Re: Beer study Well, , , ther's a song that goes, , , , , , , In Heaven there is no beer, , , , , That's why we drink it here, , , , , Well known song in the Pittsburgh area. Ron C. ================================ "James M. Atkinson" wrote: > Subject: Beer study > > Sad news about beer. You have to hope this study is flawed, but the > evidence is irrefutable. A group of scientist for Health Canada > suggested that, considering the results of recent analysis that > revealed the presence of female hormones in beer, men should take > a hard look at their beer consumption. > > The theory is that drinking beer makes men turn into women. To test the > theory, 100 men were fed 6 pints of beer within a one hour period. It > was observed that: 100% of the men gained weight, talked excessively > without making sense, became overly emotional, couldn't drive, failed > to think rationally, argued over nothing, had to sit down while urinating, > couldn't perform sexually, and refused to apologize when wrong. > > No further testing is planned. > > -- > 4900 From: Shawn Hughes Date: Wed Feb 27, 2002 10:36am Subject: ebay just got an email from ebay. You need to check your user preferences at: http://cgi3.ebay.com/aw-cgi/ebayISAPI.dll?OptinLoginShow They had me agreeing to receive PHONE CALLS, POST OFFICE mail, as well as emails from their advertisers. Don't know about you, but that's bullcrap. Seeya! Shawn 4901 From: Date: Wed Feb 27, 2002 8:01am Subject: RE: Rants and flames Dear All I write not to prolong further verbal jousting but to second what Chad adequately stated in relation to Steve. Indeed it is at times like this that we get the chance to heap praise were it is due. Describing him as a 'Sage' is a very appropriate term and one which he justly deserves. You do not need to buy anything from him to receive help and advice which he offers freely. Do business with him and you will receive excellent equipment and fairness. My expertise, if I could call it that, lies in Conventional and Rural surveillance. I probably am on the bottom rung of the TSCM apprenticeship ladder, so I value the postings of Steve and others on the list, eventhough at times I feel I am reading 'German'. (no offence meant to any German members). In relation to Aimee, she certainly can provoke (promote) conversation and is a master of the 'wind up' to which I was easily 'harpooned' by her in my early days on the list. This too is of value, as I believe that if we wish to grow we must be stretched. Should Aimee wish to privately email me a list of good books that will help me improve, then I also hope she will provide a photograph which I promise to use as a bookmark. Neither persons mentioned need me to defend them, however sometimes we all need a pat on the back. This is my 'slap'. Tim [Non-text portions of this message have been removed] 4902 From: Joseph Date: Wed Feb 27, 2002 10:55am Subject: RE: Beer study The real sadness is the fact that Most people don't realize that 25% of all drinkers in the United States are kids. I think probably due to the fact that in order for most families to survive it takes 2 to 3 incomes to support a family any more. Thus causing stress on the kids when parents aren't around to discipline. Now solve that issue and it won't matter what the hormonal ingredients of beer are. Joseph -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Wednesday, February 27, 2002 4:38 AM To: TSCM-L Mailing List Subject: [TSCM-L] Beer study Subject: Beer study Sad news about beer. You have to hope this study is flawed, but the evidence is irrefutable. A group of scientist for Health Canada suggested that, considering the results of recent analysis that revealed the presence of female hormones in beer, men should take a hard look at their beer consumption. The theory is that drinking beer makes men turn into women. To test the theory, 100 men were fed 6 pints of beer within a one hour period. It was observed that: 100% of the men gained weight, talked excessively without making sense, became overly emotional, couldn't drive, failed to think rationally, argued over nothing, had to sit down while urinating, couldn't perform sexually, and refused to apologize when wrong. No further testing is planned. -- ------------------------------------------------------------------------ -------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------ -------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ------------------------------------------------------------------------ -------------------------- "It is not the critic who counts, not the man who points out how the strong man stumbled, or where the doer of deeds could have done better. The credit belongs to the man who is actually in the arena; whose face is marred by the dust and sweat and blood; who strives valiantly; who errs and comes short again and again; who knows the great enthusiasms, the great devotions and spends himself in a worthy course; who at the best, knows in the end the triumph of high achievement, and who, at worst, if he fails, at least fails while daring greatly; so that his place shall never be with those cold and timid souls who know neither victory or defeat." - Theodore Roosevelt,1910 ------------------------------------------------------------------------ -------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4903 From: Aimee Farr Date: Wed Feb 27, 2002 2:00pm Subject: RE: Rants and flames Tmerc wrote: > In relation to Aimee, she certainly can provoke (promote) > conversation and is > a master of the 'wind up' to which I was easily 'harpooned' by her in my > early days on the list. This too is of value, as I believe that > if we wish > to grow we must be stretched. Should Aimee wish to privately > email me a list > of good books that will help me improve, then I also hope she > will provide a > photograph which I promise to use as a bookmark. :) There is so much information here that is not reflected in secondary sources, it's in your heads. There is a major knowledge gap between secondary and primary sources in this area. For me to "I agree!," -- gets me zip. When I make an inflammatory statement or disagree -- it gets me great feedback and insight. Steve is an five-star source, but everybody's opinions are valid. However, stick with your co-professionals book recommendations. I have the technical abilities of a banana. ~Aimee 4904 From: Aimee Farr Date: Wed Feb 27, 2002 2:31pm Subject: RE: RE: Felons on this list? ALL READ Steve: > Legal scholars can think anything they want. They aren't involved in the > profession. Which is why I ask you. I figured this one out already. > Lots of people disagree with me on points of law. Lots of them are even > lawyers. ALL walk away educated after my testimony, and with just the > ever so slightest hint of humility. > > > 3. "First, you must establish a relationship with the person in charge, > > whom I will refer to as the client. This has to be closely akin to a > > doctor-patient or attorney-client relationship. This person > must trust you > > implicitly...." -Robert W. Doms, Sr., LTC AUS, Ret., _Practical > > Countermeasures For Law Enforcement_ 7 (2000). > But what does this have to do with anything regarding the public's > ILLEGAL possession of transmitters. > > Bob Doms did not write that booklet for the public. He wrote it for other > law enforcement officers. He's talking people on the other side of the > fence from where we are sitting. Well, I think we're all on the same side. > > I would argue that you are a *fiduciary* professional, and you > > shouldn't have to babysit a stupid gadget. If you carry the indicia of > > a professionalism, I have no problem trusting you to deliver the > > "evil" to law enforcement. > > Then you are a proponent of destroying the legal chain of custody, and > ruining any chance of prosecution? No. > SWEEPERS ARE LAYMEN! Only in the most unusual of instances are they > commissioned law enforcement officers, and this discussion excludes them. > > Sweepers have NO LEGAL GROUND to claim the status of 'fiduciary' > professional. No provisions for that in the law. In court, I would argue you are a fiduciary professional, with corresponding legal duties. Fiduciary duties are conferred by the nature of the relationship, rather than a statute. This statute makes you an agent of the government. > The law is fine the way it is. Bull. This stuff is spreading like fire ants. > Sweepers, with only the rarest exceptions described above, are laymen. > They are the public. Break the legal chain of custody by placing physical > evidence of a felony in the hands of a layman, and no prosecutor will > touch it. I disagree. The future is privatization. You are already servicing an invisible crime. That makes the play of interests a little bit unusual. > Or is that an ulterior motive you are seeking? *rolls eyes* > How would any sweeper you know of, from this list or anywhere else in the > galaxy, be considered a 'fiduciary' professional? What standards would be > applied? What certifications? What licensing? What training? The common law. > Under what standards or authority would you confer the aegis of > 'fiduciary professional' regarding ANY sweeper you have met thus far? The law. It's bigger than Title III. > > You have been engaged as a private solutionist. Heaven forbid you > > should study the evil! *gasp!* I think that should be legal. > > I want to study the effects of machine gun fire impacting on Texas female > attorneys. Should I be allowed to have a machine gun? Bad logic alert. > I want to study the effects of gamma rays on man in the moon marigolds. > Should I be allowed to have marigolds? Gamma rays? Bad logic alert. > Point being, for these other studies, there are certifications, > licensing, formal training requirements, etc. to separate the men from > the boys. > > There aren't in the TSCM business. So, legally, we're all boys. Perhaps there are more creative solutions. > Point being, NO TSCMer has any legal standing to possess electronic > surveillance devices nor to take them into custody, merely by virtue of > being involved in TSCM to some degree. Yes, that is the law. > The owner of this list, Jim Atkinson, and the writer and operator of the > largest TSCM website in the world, is not a legit professional authorized > to possess electronic surveillance. If he locates a device on a job, I > can promise you he won't touch it; he will remain on the scene until duly > constituted authorities arrive to take custody of the device. I don't > even have to ask him. I know that is how he would handle it. Well, it isn't a dead body, and it really is an outdated means of addressing the problem. Like I said, I think it contributes to 'charlatan' sales-power. I also think it undermines a fiduciary relationship. That can work against a profession's interest in maintaining the quality and ethical standards of the profession. We don't treat other security breaches this way, which do involve a felony. I don't see this issue as black and white as you do, Steve. If I was an agent of the government, "evil lawyers" would rule the earth. > Appropriate provisions are made for legitimate users or possesors of > electronic surveillance, and I detailed those, and anyone can read them > in the original cite. Yes, dear. I know what the law says. > > I disagree. There should be an exception for qualified research. > > Limited or licensed, whatever. > > There is. Simply get a government contract to supply devices or even > services, even if for destructive test, or evaluation, or assault and > flattery, and you're completely in the clear legally. > > That's precisely what I did, and last month was 30 years I've been doing > it. > > I'll quit here. I have to leave for Seattle in the AM. Amongst other > things, gonna meet with a bunch of high powered attorneys and advise them > how to handle their client's affairs where surveillance may be involved. Well, I hope they listen to you. The low-powered attorneys are still trying to figure all this out. ~Aimee 4905 From: DrPepper Date: Wed Feb 27, 2002 2:50pm Subject: Re: ebay YEP!! And the easy way to NOT get this krap, is to read carefully before you "click" -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ============================================= Shawn Hughes wrote: > just got an email from ebay. > > You need to check your user preferences at: > http://cgi3.ebay.com/aw-cgi/ebayISAPI.dll?OptinLoginShow > > They had me agreeing to receive PHONE CALLS, POST OFFICE mail, as well as > emails from their advertisers. > > Don't know about you, but that's bullcrap. > > Seeya! > > Shawn > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4906 From: Lewis Z. Koch Date: Wed Feb 27, 2002 4:45pm Subject: RE: Rants and flames As noted by Tmer in his very wide of the mark/remark about Aimee Farr she certainly can provoke (promote) > > conversation and is > > a master of the 'wind up' to which I was easily 'harpooned' by her in my > > early days on the list. This too is of value, as I believe that > > if we wish > > to grow we must be stretched. Should Aimee wish to privately > > email me a list > > of good books that will help me improve, then I also hope she > > will provide a > > photograph which I promise to use as a bookmark. One should be thankful for both small and great favors, and whin about neither. Aimee Farr "provokes?" Nonsense. Women provoke. Men are aggressive. (See Jeffrey K. Skilling. Men don't call other men provocative. They find another word that begins with "P.") Aimee harpoons? And I suppose men "nail it?" If one deservedly gets ripped a new one, perhaps one does get "grow" and gets "stretched." Aimee fails, I feel, to carefully caution that if the offense happens again, she will really take his/her ass to the cleaners. I think the same kind of posting is mandatory on homes where tough dogs reside. And in this (world) neighborhood, one damn well better have the cojones to defend oneself. Finally there is this: "Should Aimee wish to privately > > email me a list > > of good books that will help me improve, then I also hope she > > will provide a > > photograph which I promise to use as a bookmark." You should be so lucky (and there is no sarcasm to this.) I happened to have mentioned an area of law enforcement with which I have some --I thought -- fairly heavy researched background and personal familiarity. Aimee provided me with a list of about 15 books, including one out of print Congressional hearing 229 pages long that cost a small fortune to buy on a rarebook web site, that was worth every penny. Now my library on this subject, thanks to Aimee is as complete as any in the nation. What is astonishing about all this is this: 1) each of her recommendations were fresh (or had faded from my fading memory, 2) it came from someone with absolutely no personal history with the subject (as I had), 3 she spent an enormous amount of time and effort chasing all this down as merely the kind of favor one does when a neighbor comes over to borrow a cup of sugar for the brownies one is baking. I say this with the grey hair to prove it -- no one her age -- male or female -- has every coughed up that kind of information about a period of time she never lived through. "...a master of the 'wind up'?" I would suggest that any list Aimee leaves "winds up" the lessor for it. Lewis Z. Koch Journalist [Non-text portions of this message have been removed] 4907 From: Matthew Paulsen Date: Wed Feb 27, 2002 8:41pm Subject: RE: RE: Felons on this list? ALL READ Illegal, what a waste: I truly do not understand why these devices are illegal to own by individuals or organizations that provide these services. It appears to be completely illogical. Looking at the software security development industry, many people appropriate, disassemble, manufacture, research and test systems that provide direct illegal consequences if used improperly. They are in many cases entrusted by the general population to understand that bad things should not be used just because they are around. Why the TSCM field and the government have decided to mandate that these devices cannot be used by legitimate entities to perform legitimate research to develop appropriate technologies for anti and counter services seems to be a bit strange. How can one protect oneself without the ability to understand what your are protecting yourself against? How can a commerically driven nation derive a truly competitive environment which creates better products, faster, cheaper and quicker to market without this ability? It's unfortunate that the manufacturers and industry professionals of countermeasures and other related services do not work with organizations and personnel in government to create viable business opportunities which would benefit private and public efforts towards an increased awareness of their services and products while extending the product availibility to a larger audience as reduced costs with higher quality. Let the boys be boys, and if they are to be men, make them real men: When it comes to professional certifications, sure, there may not be any in the TSCM field that the public at large knows of (if there are any at all, I don't know), as there are in other fields, such as network integration or computer security or law, or accounting. Unfortunately, the certifications available that are widely used in the computing industry are all basically garbage for seasoned professionals. JMA - I hope you don't mind me using you as an example for the moment, you're a perfect pinup for what I'm talking about. You have taken umpteen training courses and probably have a 20 page resume of certifications. While it is commendable that you have trained for these certifications and continue to invest a substantial portion of your time towards maintaining them, I have known many more people in my life that I would call experts in my field that do not have certifications but rather, only take the time to learn (on their own or in courses) to understand their profession to a higher level. In a crunch if I had to choose between a non-certified person that I considered an expert and a highly certified person that I did not know, who couldn't provide case histories, I'd go with the non-certified individual that has proven their expertise in the field over a substatial period of time. Sure, I may lose out on good people once in a while, but I'm willing to take that loss since I've been burned more times in the certification pan than the experience pan. These days, teenagers are obtaining these same certifications in high school, just as seasoned professionals are. It's an unfortunate position that I'm placed in many times when I consult for uneducated clients and/or talk with hiring managers and have to go to the point of justifying bill rates that are generally five times higher than other people with less experience. In many cases these people hire the cheap person, and I clean up the mistakes later when things fail, and then it's an emergency, after-hours, sometimes weekend bill rate which is never fun to discuss with the account the next day. I think others would have similar war stories along these lines also. The technical certification industry is marketed as the end all be all, by large manufacturers, when it is nothing more than a basic grounds for distinguishing who has read a book or taken a class versus those that do not, in many cases, only to digest the material the day before taking the class - see your local 'it boot camp 5 day course' sites for more and lose it the next. Point in case - a previous manager I worked under had 19 certifications - master levels from novell, microsoft, cisco, etc etc as well as teaching certification for these courses. He couldn't bind an IP address to a NIC on Winnt. And yet he tought these courses to who knows how many people over time. I find this trend disturbing. I'd dread the day a certification standard was applied to the TSCM field, even though I am just beginning to understand the nuances of it, just as I still dread certifications in the computing industry which are driven by manufacturers for additional sales opportunities, just to be able to tell the hr manager or the client I have it so I'm considered a professional. And yet, I still wish there was a good body that would allow me to put a P.S. after my name and be able to be happy of the fact that I had learned enough to be able to say it and not defend it when it is looked at. Until that day comes, I'll continue to shake my head as I see a few TLA's after people names in resumes which hold no ground as to their true level of compentency. If things are going to change in any measurable way, the computing industry, and perhaps the TSCM industry as well, will have to look to groups such as the AICPA and the Bar to understand how to develop a true level of certification which means something in the long run (most of my CPA friends would laugh at that last sentence, but I'm not certain what my lawyer buddies would do). Until then, (imho) it's just a garbage slip of paper that anyone can get, which only means something to the hiring manager and not other industry professionals, which will create additional problems for people that do wish to excel as they face angry managers who have hired inept individuals to work for them. Matt -----Original Message----- From: Aimee Farr [mailto:aimee.farr@p...] Sent: Wednesday, February 27, 2002 12:32 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] RE: Felons on this list? ALL READ Steve: > Legal scholars can think anything they want. They aren't involved in the > profession. Which is why I ask you. I figured this one out already. > Lots of people disagree with me on points of law. Lots of them are even > lawyers. ALL walk away educated after my testimony, and with just the > ever so slightest hint of humility. > > > 3. "First, you must establish a relationship with the person in charge, > > whom I will refer to as the client. This has to be closely akin to a > > doctor-patient or attorney-client relationship. This person > must trust you > > implicitly...." -Robert W. Doms, Sr., LTC AUS, Ret., _Practical > > Countermeasures For Law Enforcement_ 7 (2000). > But what does this have to do with anything regarding the public's > ILLEGAL possession of transmitters. > > Bob Doms did not write that booklet for the public. He wrote it for other > law enforcement officers. He's talking people on the other side of the > fence from where we are sitting. Well, I think we're all on the same side. > > I would argue that you are a *fiduciary* professional, and you > > shouldn't have to babysit a stupid gadget. If you carry the indicia of > > a professionalism, I have no problem trusting you to deliver the > > "evil" to law enforcement. > > Then you are a proponent of destroying the legal chain of custody, and > ruining any chance of prosecution? No. > SWEEPERS ARE LAYMEN! Only in the most unusual of instances are they > commissioned law enforcement officers, and this discussion excludes them. > > Sweepers have NO LEGAL GROUND to claim the status of 'fiduciary' > professional. No provisions for that in the law. In court, I would argue you are a fiduciary professional, with corresponding legal duties. Fiduciary duties are conferred by the nature of the relationship, rather than a statute. This statute makes you an agent of the government. > The law is fine the way it is. Bull. This stuff is spreading like fire ants. > Sweepers, with only the rarest exceptions described above, are laymen. > They are the public. Break the legal chain of custody by placing physical > evidence of a felony in the hands of a layman, and no prosecutor will > touch it. I disagree. The future is privatization. You are already servicing an invisible crime. That makes the play of interests a little bit unusual. > Or is that an ulterior motive you are seeking? *rolls eyes* > How would any sweeper you know of, from this list or anywhere else in the > galaxy, be considered a 'fiduciary' professional? What standards would be > applied? What certifications? What licensing? What training? The common law. > Under what standards or authority would you confer the aegis of > 'fiduciary professional' regarding ANY sweeper you have met thus far? The law. It's bigger than Title III. > > You have been engaged as a private solutionist. Heaven forbid you > > should study the evil! *gasp!* I think that should be legal. > > I want to study the effects of machine gun fire impacting on Texas female > attorneys. Should I be allowed to have a machine gun? Bad logic alert. > I want to study the effects of gamma rays on man in the moon marigolds. > Should I be allowed to have marigolds? Gamma rays? Bad logic alert. > Point being, for these other studies, there are certifications, > licensing, formal training requirements, etc. to separate the men from > the boys. > > There aren't in the TSCM business. So, legally, we're all boys. Perhaps there are more creative solutions. > Point being, NO TSCMer has any legal standing to possess electronic > surveillance devices nor to take them into custody, merely by virtue of > being involved in TSCM to some degree. Yes, that is the law. > The owner of this list, Jim Atkinson, and the writer and operator of the > largest TSCM website in the world, is not a legit professional authorized > to possess electronic surveillance. If he locates a device on a job, I > can promise you he won't touch it; he will remain on the scene until duly > constituted authorities arrive to take custody of the device. I don't > even have to ask him. I know that is how he would handle it. Well, it isn't a dead body, and it really is an outdated means of addressing the problem. Like I said, I think it contributes to 'charlatan' sales-power. I also think it undermines a fiduciary relationship. That can work against a profession's interest in maintaining the quality and ethical standards of the profession. We don't treat other security breaches this way, which do involve a felony. I don't see this issue as black and white as you do, Steve. If I was an agent of the government, "evil lawyers" would rule the earth. > Appropriate provisions are made for legitimate users or possesors of > electronic surveillance, and I detailed those, and anyone can read them > in the original cite. Yes, dear. I know what the law says. > > I disagree. There should be an exception for qualified research. > > Limited or licensed, whatever. > > There is. Simply get a government contract to supply devices or even > services, even if for destructive test, or evaluation, or assault and > flattery, and you're completely in the clear legally. > > That's precisely what I did, and last month was 30 years I've been doing > it. > > I'll quit here. I have to leave for Seattle in the AM. Amongst other > things, gonna meet with a bunch of high powered attorneys and advise them > how to handle their client's affairs where surveillance may be involved. Well, I hope they listen to you. The low-powered attorneys are still trying to figure all this out. ~Aimee Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4908 From: Steve Uhrig Date: Thu Feb 28, 2002 0:03am Subject: RE: Felons on this list? ALL READ Once upon a midnight dreary, Matthew Paulsen pondered, weak and weary: > Illegal, what a waste: I truly do not understand why these devices are > illegal to own by individuals or organizations that provide these > services. > Why the TSCM field and the government have decided to mandate that > these devices cannot be used by legitimate entities to perform > legitimate research to develop appropriate technologies for anti and > counter services seems to be a bit strange. The TSCM industry has nothing to do with passing the laws. They were passed because of abuse. And, from my 30 years' experience in the industry, I will state the TSCM industry is one of the largest violators of the law as a class. > How can one protect oneself without the ability to understand what > your are protecting yourself against? A bunch of us have managed to. > Unfortunately, the certifications available that are widely used in the > computing industry are all basically garbage for seasoned > professionals. Same is true for TSCM. Even certifications are meaningless when it comes to possessing, using, advertising, etc, electronic surveillance devices. The very idiots who violate the law perpetrate it. You can thank the spy shops, for one. > I'd dread the day a certification standard was applied to the TSCM field, And rightly so, if previous attempts to do so are considered. All I have time for now. 3000 miles from home, but fortunately with a T1 in my hotel room, and a zillion emails left before I go horizontal. I still love you Aimee, however the spirit is willing, but the flesh is falling asleep ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4909 From: James M. Atkinson Date: Thu Feb 28, 2002 4:44am Subject: RE: Rants and flames As list moderator, I noticed that Aimee unsubscribed herself from the list yesterday. I enjoyed her exchanges, and found her insights to be interesting. Hopefully she will be back, -jma At 2:00 PM -0600 2/27/02, Aimee Farr wrote: >Tmerc wrote: > >> In relation to Aimee, she certainly can provoke (promote) >> conversation and is >> a master of the 'wind up' to which I was easily 'harpooned' by her in my >> early days on the list. This too is of value, as I believe that >> if we wish >> to grow we must be stretched. Should Aimee wish to privately >> email me a list >> of good books that will help me improve, then I also hope she >> will provide a >> photograph which I promise to use as a bookmark. > >:) There is so much information here that is not reflected in secondary >sources, it's in your heads. There is a major knowledge gap between >secondary and primary sources in this area. > >For me to "I agree!," -- gets me zip. When I make an inflammatory statement >or disagree -- it gets me great feedback and insight. Steve is an five-star >source, but everybody's opinions are valid. > >However, stick with your co-professionals book recommendations. I have the >technical abilities of a banana. > >~Aimee -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "It is not the critic who counts, not the man who points out how the strong man stumbled, or where the doer of deeds could have done better. The credit belongs to the man who is actually in the arena; whose face is marred by the dust and sweat and blood; who strives valiantly; who errs and comes short again and again; who knows the great enthusiasms, the great devotions and spends himself in a worthy course; who at the best, knows in the end the triumph of high achievement, and who, at worst, if he fails, at least fails while daring greatly; so that his place shall never be with those cold and timid souls who know neither victory or defeat." - Theodore Roosevelt,1910 -------------------------------------------------------------------------------------------------- 4910 From: James M. Atkinson Date: Thu Feb 28, 2002 6:12am Subject: RE: Felons on this list? ALL READ >At 7:20 PM -0500 2/26/02, Steve Uhrig wrote: [snip] > >The owner of this list, Jim Atkinson, and the writer and operator of the >largest TSCM website in the world, is not a legit professional authorized >to possess electronic surveillance. If he locates a device on a job, I >can promise you he won't touch it; he will remain on the scene until duly >constituted authorities arrive to take custody of the device. I don't >even have to ask him. I know that is how he would handle it. [snip] I will only possess an eavesdropping device if and when doing so is in total and absolute compliance with the federal laws concerning same. When I come across a bug, wiretap, or other such thing I have the common sense to simply document my findings and confirm that it is indeed a surveillance device. I will only touch the device to the extent required to determine what it is (when finding it), to confirm that it is indeed an eavesdropping device, and to document the findings without disturbing any evidence. I have, and will also assist law enforcement people (with appropriate jurisdiction) in the actual removal of the device, and if so requested I will perform a forensic evaluation and identification of the device in the field, but only under their direct and immediate supervision. At no time will I take the bug into my own possession, or play with it in any way. I treat a found bug much the same way that I would treat a dead body if I came across one in the field, and would strongly suggest that other TSCM'ers follow my lead. If I come across a dead body I am not going to stick it in my trunk, haul it home, and then perform medical experiments on it claiming that it is being done in the name of education or science. Instead I am going to stop, calm down, notify the appropriate authorities and request that they come out and take control of the situation. While I am awaiting their arrival I may take a couple of Polaroids if I can do so without disturbing the scene, and will write down as many details as possible while they are still sharp in memory. Ditto, in cases when I find a bug... Once you are positive you have found a bug IMMEDIATELY make your initial notifications. If you don't know why, then consider some other occupation. Once your initial notification you can breath easier, but try to document as much of the details as possible and take great care not to disturb the scene (if you are unable to do this, then consider some other occupation). Make lots of written notes, take lots of pictures, and watch how people around you behaving relative to the "thing you found". Once you make the first notes, or take the first photographs, sign them, write the date and time on them, and then make five photocopies of them ASAP. The originals and two sets of photocopies are given to the law enforcement officer who responds, one cop goes to the client (if the LEO approves it), and the remaining copies stay in your possession. Your attorney gets one copy, which is notarized, sealed into an envelope, which he places into a second envelope and send to himself via registered mail. When I go out to perform a sweep I always carry two instant Polaroid cameras, and enough film to make 100 pictures. I also include several Marks-a-lot pens/markers, sleeves for the Polaroids, and a pad of color charts/scales. I also carry a formal 100+ page "Discovery Protocol" which breaks down everything that I will do (in detail) when and if I find a surveillance device, and include all of this in a single briefcase which I can grab to facilitate documentation in the event of a bug find. My position and policy on how I handle bug discoveries (or bugs in general) has been the same for over twenty years now... I will not build, touch, play, or possess unless explicitly authorized to do so by law. It simply amazes me how many folks will openly violate the laws concerning bugging devices. The law is very explicit... As a private citizen or private company you can only possess these devices AFTER you obtain a written contract from a law enforcement or intelligence agency; and federal law prohibits maintaining any kind of inventory or stock in advance of the purchase order being issued. If your an ex-cop or ex-spook all those little goodies have to be returned to the agency. In fact if you are a cop you can not legally possess the devices unless you are formally "taking delivery, receiving documented training, performing documented evaluation, or executing a formal court order" and at no other time. LEO's can not by law keep a box of bugs at their office, in their cars, or loan them out to PI's. Same as a dead body... -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "It is not the critic who counts, not the man who points out how the strong man stumbled, or where the doer of deeds could have done better. The credit belongs to the man who is actually in the arena; whose face is marred by the dust and sweat and blood; who strives valiantly; who errs and comes short again and again; who knows the great enthusiasms, the great devotions and spends himself in a worthy course; who at the best, knows in the end the triumph of high achievement, and who, at worst, if he fails, at least fails while daring greatly; so that his place shall never be with those cold and timid souls who know neither victory or defeat." - Theodore Roosevelt,1910 -------------------------------------------------------------------------------------------------- 4911 From: James M. Atkinson Date: Thu Feb 28, 2002 9:43am Subject: "What to do when you discover a bug..." Seminar After some rather serious queries and requests from list members I have decided to offer a formal one day seminar in Boston, MA on "What to do when you discover a bug...". The cost will be nominal, will run about 10-12 hours, and will be held in a really nice conference room right in a hotel on the airport property (so you do not need to rent a car). The seminar will include lots of handouts, and detailed discussions and protocols on how to reduce a "bug find" down into paper documentation, and how to "cover your ass" both legally, and practically. Attendees will receive a copy of my 100+ page "Discovery Protocol" which actually exceeds the requirements laid out in CIA Procedural guides, AR 381-14, and other related standards; however, none of the seminar contents are classified (at least not yet). Based on the preferences of those attending I will offer the seminar either during the week or over the weekend (whichever the majority prefer). If there is sufficient demand I may run the course so that it runs into a second day. Enrollment will close several weeks (30 days) in advance so everybody can buy advance cheap airline or train tickets, and I would encourage attendees to arrive the evening before the seminar, and to plan to stay at least the evening of the seminar (as I have a history of running long hours on courses). As required in my other seminars I will require every attendee to sign a non-disclosure agreement in advance, and to promise to protect the seminar contents as Proprietary Trade Secrets. There will be one agreement turned in with the enrollment and seminar fee, and a second identical one turned in at the very beginning of the seminar. Also, due to the very sensitive nature of the materials the use of or possession of cameras, recorders, or any other kind of audio or video recording devices will be absolutely prohibited. Course attendees will be responsible for their own hotel rooms, their own meals, and transportation. I will provide the conference room, course materials, voluminous handouts, beverages, light snacks, and if there is enough interest a buffet breakfast (before class on the first day). I will arrange to accept tuition by either a company check, or via PayPal, however; if you are a no-show you will forfeit the fee. Once I get some feedback from the list membership I will prepare a PDF and HTML signup sheet and upload it so you can fill it out and send it in. I am leaning towards the first part of May 2002, or possibly late mid to late April. I would point out that this seminar is for serious TSCM people, corporate TSCM folks, government TSCM people, and so on. There will be no sales demos, no equipment instruction, and no hand holding, period... Only attend if you want to learn about what to do AFTER you discover the bug. If your firm or agency is interested I will consider suit-casing the seminar and bringing it to your facility for a private (close enrollment) presentation. Also, just as a formality; let me point out that people who illegally possess (or who have illegally possessed or are known to me to have illegally possessed) eavesdropping devices are not invited to attend and will be refused registration. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "It is not the critic who counts, not the man who points out how the strong man stumbled, or where the doer of deeds could have done better. The credit belongs to the man who is actually in the arena; whose face is marred by the dust and sweat and blood; who strives valiantly; who errs and comes short again and again; who knows the great enthusiasms, the great devotions and spends himself in a worthy course; who at the best, knows in the end the triumph of high achievement, and who, at worst, if he fails, at least fails while daring greatly; so that his place shall never be with those cold and timid souls who know neither victory or defeat." - Theodore Roosevelt,1910 -------------------------------------------------------------------------------------------------- 4912 From: Date: Thu Feb 28, 2002 11:56am Subject: Interesting article Found this today...thought the group my find it interesting: SteveP Students discover "bug" in Whittier College newspaper office Listening device could have been planted several years ago, says private investigator © 2002 Student Press Law Center February 27, 2002 CALIFORNIA - Student newspaper staff members at Whittier College uncovered what may turn out to be the story of the year ... in their very own office. A routine maintenance service call last week turned up an electronic surveillance device imbedded in the office walls of the Quaker Campus. It is not known how long the bug, which was not functioning when pulled from the wall, was hidden. The device was capable of transmitting a radio signal to any receiver, tuned to the correct frequency, within a three-mile radius, editor Amy Stice said. The discovery prompted a shared sense of disbelief and concern among the newspaper staff and the university's administration. As this article was posted, it was not clear which university offices, if any, were investigating the matter. Whittier Police Department officials contacted by the SPLC could not find a report of the incident in their database. The episode began last Thursday when a maintenance worker, in the newspaper office to fix a broken light table, found a problem with the electrical socket. Upon taking it apart, he discovered a two-inch surveillance device soldered to the back of the socket, Stice said. The paper alerted campus security and on Monday an electrician checked all of the other sockets in the office. No more bugs were found, but campus security called the Whittier Police Department later that day. Stice said the officers, however, were reluctant to take action. "The Whittier Police Department came in, apparently looked at the bug and said, 'Well there's nothing we can do about it; yeah there's a bug but we don't have any evidence for this,' " Stice said. The officers said they did not want to file a report, she added, and that such a measure would necessitate taking custody of the device, which would probably be thrown away at a later time. The paper decided to keep possession of the bug. Student government president Jess Craven, whose office is located in the same building as the publications room, was worried that more bugs might be hidden in the walls so he contacted a local private investigator, Thomas Barnes. Barnes, a retired police detective and former military officer, decided to help the staff pro bono, "because they didn't have any money," he said. Barnes loaned the newspaper a scanner to check the office for additional surveillance tools and he urged former Whittier mayor and current councilman Bob Alexander to "light a fire under" the local police. "Most municipal police departments aren't really on the learning curve when it comes to bugs, electronic surveillance, computer crime," Barnes said. "You're lucky, [for] the older policemen, if they can even run a computer. And if they can't even write their own reports or run a computer, then they're surely not going to be able to understand the implications of a bug." "It's pretty serious when you start hard-wiring in because it means you have to have the opportunity to do it," he continued. "This is not for a short-term problem, it's (for) somebody that wants to monitor somebody for a long period of time." The school seems to share his concern. "Student journalism and the free exchange of ideas is something that the institution has supported since its inception," university spokesperson Caye Brundage said. "So we're very concerned about anything that would inhibit the ability of our students to exchange ideas freely or that would create an atmosphere where they felt they were being inhibited." Barnes said he considers the school's administration a suspect in the surveillance. "Who would want to monitor [the newspaper] on a long-term basis?" Barnes asked rhetorically. "You start to come up with a short list of people and one of the people that usually comes up at the very top of the list is administration. It's like a murder case; one of the first people you look at is somebody related to the murder victim." Brundage disagreed, "I can't think of why I as an administrator would want to bug the office," she said. "We are interested in knowing what the [Quaker Campus] is doing but usually we're pretty aware of what stories are being [investigated anyway]." Barnes and Brundage both said that the bug appeared to have been in the wall for "a long time." Sweeps of the rest of the building turned up no additional surveillance devices. In California, electronic eavesdropping in situations where there is an expectation of privacy and individuals are unaware of the surveillance is a felony, Barnes said. Whittier College is the alma mater of former President Richard Nixon, who was forced to resign from office as a result of the Watergate scandal that was triggered by the bugging of Democratic National Committee headquarters in Washington. < Return to Previous Page [Non-text portions of this message have been removed] 4913 From: Matthew Paulsen Date: Thu Feb 28, 2002 0:06pm Subject: RE: Interesting article > The paper decided to keep possession of the bug. I guess the college is declined entrance to Jim's seminar. Bad school. Bad! Spit it out. [Non-text portions of this message have been removed] 4914 From: Matthew Paulsen Date: Thu Feb 28, 2002 0:43pm Subject: RE: RE: Felons on this list? ALL READ > The TSCM industry has nothing to do with passing the laws. I disagree wholeheartedly. The TSCM industry is an active group which can help to pass laws through lobbying efforts to educate the government and private citizenry about the benefits of its services, just as other organizations and industries do. Point in case - the tobacco industry, or the motor industry, or perhaps the software industry. They also don't make laws, they just buy them. Unfortunately, the TSCM community appears to be highly fragmented with no sound base of capital to create the necessary traffic on capitol hill to push an agenda through to create these laws. I'm sure that if the TSCM industry created a form of organization to represent its interests and hired a lobbyist there would be laws passed in the long run to create a more enriched scientific approach to the industry, but this will require a billion dollar company which I don't see in this field. Until then, we'll just have to stick it out with our head in the sand and tell others that it's not our area to make laws, but rather accept the status quo. Back to my comparison of software to tscm - viruses in the computer industry are illegal to spread around wantonly with or without the intent of creating harm, just as bugs appear to be, when a virus comes out that makes a big mess, typically the FBI investigates the antivirus firms first. The step that the government took with bugs hasn't been taken with viruses (and trojans in a sense could be considered bugs in some forms since they have eavesdropping capabilities). 9+ billions of dollars of damage each year is caused by rampant virus attacks, and yet, virus software development companies have libraries of tens of thousands of these viruses actively available to their qa, dev and research departments TO BUILD BETTER PRODUCTS TO PROTECT. Not the TSCM field though. Again, it's the use of the device in a harming manner, not the person that creates a counterdevice with access to it that is the problem. The TSCM field has allowed the government to dictate that the TSCM field cannot research devices through proper possession of these devices, but not to other fields with similar impacts upon information acccess, including espionage and treason, fiduciary liability or personnel protection which sometimes leads to the death of others. >A bunch of us have managed to. I'd rather not rely on people that have managed to get by. I'd rather rely on people that have gotten by because they understand the whole picture, or a larger majority of it than others. Educated individuals with experience vs. semi-educated individuals with experience. I'll take the #1 Miss. >The very idiots who violate the law perpetrate it. >You can thank the spy shops, for one And every $20 tech at Bob Jane Joe's ABC's Computer, Radio & Electronics Shoppe up and down the west coast. As well as software developers that claim to understand network security, and security personnel that stop doing work outside their core field of expertise and begin intruding into other areas that they shouldn't be working in. I don't think I'd be a very good executive protection agent, so I'm not going to run out and getting a level 4 armored vehicle, body armor and a gun and pitching myself to Brandy, Britney, Mandy and Will Smith. But there are people in the security field in one form or antoher that think that if they can do one thing, they can do it all, and that creates further problems. Knowing your boundries is one thing, sticking to them is another which many do not. I'd rather work with others in complementary fields to create a true service that is encompassing in nature and detail while retaining a high level of quality and professionalism for the benefit of the client. Well, off I go, have a server doing something goofy at a client site. Need to see why his remote access doesn't work. Hm. New tagline just came to mind - The difference between a remote access product and a trojan alert is a marketing department. Matt -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Wednesday, February 27, 2002 10:04 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] RE: Felons on this list? ALL READ Once upon a midnight dreary, Matthew Paulsen pondered, weak and weary: > Illegal, what a waste: I truly do not understand why these devices are > illegal to own by individuals or organizations that provide these > services. > Why the TSCM field and the government have decided to mandate that > these devices cannot be used by legitimate entities to perform > legitimate research to develop appropriate technologies for anti and > counter services seems to be a bit strange. The TSCM industry has nothing to do with passing the laws. They were passed because of abuse. And, from my 30 years' experience in the industry, I will state the TSCM industry is one of the largest violators of the law as a class. > How can one protect oneself without the ability to understand what > your are protecting yourself against? A bunch of us have managed to. > Unfortunately, the certifications available that are widely used in the > computing industry are all basically garbage for seasoned > professionals. Same is true for TSCM. Even certifications are meaningless when it comes to possessing, using, advertising, etc, electronic surveillance devices. The very idiots who violate the law perpetrate it. You can thank the spy shops, for one. > I'd dread the day a certification standard was applied to the TSCM field, And rightly so, if previous attempts to do so are considered. All I have time for now. 3000 miles from home, but fortunately with a T1 in my hotel room, and a zillion emails left before I go horizontal. I still love you Aimee, however the spirit is willing, but the flesh is falling asleep ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4915 From: Date: Thu Feb 28, 2002 9:10am Subject: Phila. Mobster's Son Pleads Guilt Phila. Mobster's Son Pleads Guilty By JEFFREY GOLD .c The Associated Press NEWARK, N.J. (AP) - The son of Philadelphia's former mob boss pleaded guilty to bookmaking charges Thursday in a landmark case in which FBI agents tapped into his computer with a surveillance system that has national-security uses. Nicodemo Scarfo, Jr., 36, relented after losing court battles to suppress the gambling records that the FBI secretly obtained from his computer through the ``key-logger'' system. The case attracted attention from privacy advocates, who said the system could be used to spy on computer users. Scarfo faces about three years in prison at his sentencing June 10. As part of the deal, the government dropped a loan-sharking charge, letting Scarfo plead to running a sports book operation. Agents broke into Scarfo's office in Belleville and installed the system on his computer. The system unlocked encrypted files and let FBI agents record keystrokes, yielding a record of the entire gambling and loansharking operation. Scarfo maintained the government needed to disclose all of the details of the system to determine whether the bugging was illegal. He got some relief in the fall, when authorities were forced by a federal judge to release an unclassified summary of the key-logger system. The judge did not require full disclosure, after authorities claimed that would ``jeopardize both ongoing and future criminal and national security operations.'' The final blow for Scarfo came Dec. 26. U.S. District Judge Nicholas H. Politan ruled that agents needed only the search warrant they had. Scarfo contended the agents needed permission for a wiretap, which is more difficult to obtain. He did not appeal the ruling, in part because of the Sept. 11 terrorist attacks, said one of his lawyers, Norris E. Gelman. ``This is not the time for that. This is a time to close ranks,'' Gelman said. Scarfo's father, the former Philadelphia-Atlantic City mob boss known as ``Little Nicky,'' is in prison. On the Net: U.S. attorney's office in Newark: http://www.njusao.org/break.html Electronic Privacy Information Center: http://www.epic.org 4916 From: James M. Atkinson Date: Thu Feb 28, 2002 6:52pm Subject: Re: Phila. Mobster's Son Pleads Guilt Yeah, But if Scarfo's attorney found out the details behind keylogger the Bureau used the entire case would get blown apart on appeal and Scarfo would likely walk. -jma At 3:10 PM -0500 2/28/02, MACCFound@a... wrote: >Phila. Mobster's Son Pleads Guilty > >By JEFFREY GOLD >.c The Associated Press > > >NEWARK, N.J. (AP) - The son of Philadelphia's former mob boss pleaded guilty >to bookmaking charges Thursday in a landmark case in which FBI agents tapped >into his computer with a surveillance system that has national-security uses. > >Nicodemo Scarfo, Jr., 36, relented after losing court battles to suppress the >gambling records that the FBI secretly obtained from his computer through the >``key-logger'' system. > >The case attracted attention from privacy advocates, who said the system >could be used to spy on computer users. > >Scarfo faces about three years in prison at his sentencing June 10. > >As part of the deal, the government dropped a loan-sharking charge, letting >Scarfo plead to running a sports book operation. > >Agents broke into Scarfo's office in Belleville and installed the system on >his computer. The system unlocked encrypted files and let FBI agents record >keystrokes, yielding a record of the entire gambling and loansharking >operation. > >Scarfo maintained the government needed to disclose all of the details of the >system to determine whether the bugging was illegal. He got some relief in >the fall, when authorities were forced by a federal judge to release an >unclassified summary of the key-logger system. > >The judge did not require full disclosure, after authorities claimed that >would ``jeopardize both ongoing and future criminal and national security >operations.'' > >The final blow for Scarfo came Dec. 26. U.S. District Judge Nicholas H. >Politan ruled that agents needed only the search warrant they had. Scarfo >contended the agents needed permission for a wiretap, which is more difficult >to obtain. > >He did not appeal the ruling, in part because of the Sept. 11 terrorist >attacks, said one of his lawyers, Norris E. Gelman. > >``This is not the time for that. This is a time to close ranks,'' Gelman >said. > >Scarfo's father, the former Philadelphia-Atlantic City mob boss known as >``Little Nicky,'' is in prison. > >On the Net: > >U.S. attorney's office in Newark: http://www.njusao.org/break.html > >Electronic Privacy Information Center: http://www.epic.org > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "It is not the critic who counts, not the man who points out how the strong man stumbled, or where the doer of deeds could have done better. The credit belongs to the man who is actually in the arena; whose face is marred by the dust and sweat and blood; who strives valiantly; who errs and comes short again and again; who knows the great enthusiasms, the great devotions and spends himself in a worthy course; who at the best, knows in the end the triumph of high achievement, and who, at worst, if he fails, at least fails while daring greatly; so that his place shall never be with those cold and timid souls who know neither victory or defeat." - Theodore Roosevelt,1910 -------------------------------------------------------------------------------------------------- 4917 From: A.Lizard Date: Thu Feb 28, 2002 3:34pm Subject: re: AN IDIOT'S IDIOT Urban legend. http://www.snopes2.com/legal/colander.htm A.Lizard >Message: 6 > Date: Tue, 26 Feb 2002 23:39:17 +0000 > From: "Justin T. Fanning" >Subject: AN IDIOT'S IDIOT > > >Police in Radnor, Pennsylvania, interrogated a suspect >by placing a metal colander on his head and connecting >it with wires to a photocopy machine. The message >"He's lying" was placed in the copier, and police >pressed the copy button each time they thought the >suspect wasn't telling the truth. Believing the "lie >detector" was working, the suspect confessed. ************************************************************************ new voicemail number,ask if you need it. Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 4918 From: tek492p Date: Thu Feb 28, 2002 10:17pm Subject: Re: "What to do when you discover a bug..." Seminar --- In TSCM-L@y..., "James M. Atkinson" wrote: > > > Attendees will receive a copy of my 100+ page "Discovery Protocol" > which actually exceeds the requirements laid out in CIA Procedural > guides, AR 381-14, and other related standards; however, none of the seminar contents are classified (at least not yet). > Jim -- Will a copy of your 100+ page "Discovery Protocol" be availabe to those who cannot attend? Jack Lindauer Intertect TSCM services Los Angeles (818) 831-0515 4919 From: James M. Atkinson Date: Thu Feb 28, 2002 10:33pm Subject: Re: "What to do when you discover a bug..." Seminar No, The only way to get the guide is to attend the seminar. -jma At 4:17 AM +0000 3/1/02, tek492p wrote: >--- In TSCM-L@y..., "James M. Atkinson" wrote: >> >> >> Attendees will receive a copy of my 100+ page "Discovery Protocol" >> which actually exceeds the requirements laid out in CIA Procedural >> guides, AR 381-14, and other related standards; however, none of >the seminar contents are classified (at least not yet). >> > >Jim -- > >Will a copy of your 100+ page "Discovery Protocol" be availabe to >those who cannot attend? > >Jack Lindauer >Intertect >TSCM services >Los Angeles >(818) 831-0515 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "It is not the critic who counts, not the man who points out how the strong man stumbled, or where the doer of deeds could have done better. The credit belongs to the man who is actually in the arena; whose face is marred by the dust and sweat and blood; who strives valiantly; who errs and comes short again and again; who knows the great enthusiasms, the great devotions and spends himself in a worthy course; who at the best, knows in the end the triumph of high achievement, and who, at worst, if he fails, at least fails while daring greatly; so that his place shall never be with those cold and timid souls who know neither victory or defeat." - Theodore Roosevelt,1910 -------------------------------------------------------------------------------------------------- 4920 From: James M. Atkinson Date: Fri Mar 1, 2002 9:24am Subject: Re: "What to do when you discover a bug..." Seminar Whoa, I had no idea that so many people were interested in this seminar... I have already had over two dozen people try to sign up for it, and several people have already sent in blank checks. Judging by the positive feedback, I may end up taking the seminar to various major cities on a regular basis. The majority seem to think that it would best to run it over the weekend, and to run it over both a Saturday and Sunday. Also the majority feel that I should keep the hours down to about 7-8 hours a day so there can be some socializing before and after the seminar. I propose a "happy medium" and will run the seminar over a day and a half so that people can fly in on Friday night, and then fly back out Sunday late afternoon/early evening to allow them to be back home in plenty of time for the next day of work. The course materials are strictly available to seminar attendees who actually show up, and if you leave early you will only receive those materials and terms handed to you up until the time you left. Seminar tuition will be $1295.00, and will include a buffet breakfast each day (before class), a nice catered lunch during the seminar on both days, beverages and snacks (during the class). However, you will be on your own for dinner, drinks, etc. The tuition will include at least 12 hours of formal instruction, and attendees will receive copious proprietary handouts, worksheets, charts, various tools, forensic items, and related materials (so reserve some extra space in your luggage). The seminar will mainly consist of a lecture format with lots of slides and overheads, plus time spent for Q&A. There will also be some practical exercises which will take place both in the seminar, and individually. If there is enough interest I will issue a "certificate of attendance" to those who attend, which will carry the title of "TSCM Discovery Protocols - Basic (12 hours)". Once the date has been settled on I will post a formal seminar notice, and provide registration details to both this forum, and to my website. Please keep the upcoming seminar confidential until after the formal seminar notice goes online. -jma At 10:43 AM -0500 2/28/02, James M. Atkinson wrote: >After some rather serious queries and requests from list members I >have decided to offer a formal one day seminar in Boston, MA on "What >to do when you discover a bug...". > >The cost will be nominal, will run about 10-12 hours, and will be >held in a really nice conference room right in a hotel on the airport >property (so you do not need to rent a car). > >The seminar will include lots of handouts, and detailed discussions >and protocols on how to reduce a "bug find" down into paper >documentation, and how to "cover your ass" both legally, and >practically. > >Attendees will receive a copy of my 100+ page "Discovery Protocol" >which actually exceeds the requirements laid out in CIA Procedural >guides, AR 381-14, and other related standards; however, none of the >seminar contents are classified (at least not yet). > >Based on the preferences of those attending I will offer the seminar >either during the week or over the weekend (whichever the majority >prefer). If there is sufficient demand I may run the course so that >it runs into a second day. > >Enrollment will close several weeks (30 days) in advance so everybody >can buy advance cheap airline or train tickets, and I would encourage >attendees to arrive the evening before the seminar, and to plan to >stay at least the evening of the seminar (as I have a history of >running long hours on courses). > >As required in my other seminars I will require every attendee to >sign a non-disclosure agreement in advance, and to promise to protect >the seminar contents as Proprietary Trade Secrets. There will be one >agreement turned in with the enrollment and seminar fee, and a second >identical one turned in at the very beginning of the seminar. Also, >due to the very sensitive nature of the materials the use of or >possession of cameras, recorders, or any other kind of audio or video >recording devices will be absolutely prohibited. > >Course attendees will be responsible for their own hotel rooms, their >own meals, and transportation. I will provide the conference room, >course materials, voluminous handouts, beverages, light snacks, and >if there is enough interest a buffet breakfast (before class on the >first day). > >I will arrange to accept tuition by either a company check, or via >PayPal, however; if you are a no-show you will forfeit the fee. > >Once I get some feedback from the list membership I will prepare a >PDF and HTML signup sheet and upload it so you can fill it out and >send it in. I am leaning towards the first part of May 2002, or >possibly late mid to late April. > >I would point out that this seminar is for serious TSCM people, >corporate TSCM folks, government TSCM people, and so on. There will >be no sales demos, no equipment instruction, and no hand holding, >period... Only attend if you want to learn about what to do AFTER you >discover the bug. > >If your firm or agency is interested I will consider suit-casing the >seminar and bringing it to your facility for a private (close >enrollment) presentation. > >Also, just as a formality; let me point out that people who illegally >possess (or who have illegally possessed or are known to me to have >illegally possessed) eavesdropping devices are not invited to attend >and will be refused registration. > >-jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "It is not the critic who counts, not the man who points out how the strong man stumbled, or where the doer of deeds could have done better. The credit belongs to the man who is actually in the arena; whose face is marred by the dust and sweat and blood; who strives valiantly; who errs and comes short again and again; who knows the great enthusiasms, the great devotions and spends himself in a worthy course; who at the best, knows in the end the triumph of high achievement, and who, at worst, if he fails, at least fails while daring greatly; so that his place shall never be with those cold and timid souls who know neither victory or defeat." - Theodore Roosevelt,1910 -------------------------------------------------------------------------------------------------- 4921 From: Steve Uhrig Date: Fri Mar 1, 2002 1:58pm Subject: RE: Felons on this list? ALL READ Once upon a midnight dreary, Matthew Paulsen pondered, weak and weary: > > The TSCM industry has nothing to do with passing the laws. > I disagree wholeheartedly. The TSCM industry is an active group which > can help to pass laws through lobbying efforts to educate the > government and private citizenry about the benefits of its services, There likely are more attorneys within a 10 mile radius of you than there are competent TSCM practitioners in the world. > Unfortunately, the TSCM community appears to be highly fragmented with > no sound base of capital to create the necessary traffic on capitol > hill to push an agenda through to create these laws. If every professional sweeper donated $1000 per sweep for a year towards a professional lobbyist, you wouldn't be able to staff the lobbyist's office. I've worked with low level nothing groups hiring lobbyisys. Try a million a year to even knock on the door, if you are serious and facing opposition of even a few powerful liberals. There isn't that much money available for lobbying. And, frankly, no one much cares. > I'm sure that if the TSCM industry created a form of organization to > represent its interests and hired a lobbyist there would be laws passed > in the long run to create a more enriched scientific approach to the > industry, but this will require a billion dollar company which I don't > see in this field. There won't be a billion dollars' worth of sweeps done worldwide in a decade, let alone being able to kick some of that towards some nebulous lobbyist. > Until then, we'll just have to stick it out with our head in the sand > and tell others that it's not our area to make laws, but rather accept > the status quo. Sometimes you have to forego the idealism and face reality. College students are full of political ideaology, while mommy and daddy finance them. > 9+ billions of dollars of damage each year is caused by rampant virus > attacks Most of it by zooheaded brand new Internet morons mailing copies to veterans warning them about it. > The TSCM field has allowed the government to dictate that the TSCM > field cannot research devices through proper possession of these > devices The TSCM field has no input into this whatsoever. > I'd rather not rely on people that have managed to get by. I'd rather > rely on people that have gotten by because they understand the whole > picture, or a larger majority of it than others. Educated individuals > with experience vs. semi-educated individuals with experience. The majority of *genuine* sweepers once were buggers for the government. THEY are the ones, and probably nearly the only ones, who understand the whole picture. > The very idiots who violate the law perpetrate it. Is that not largely true? If people didn't break the law, any given law, that law would attract little attention. > I don't think I'd be a very good executive protection agent, We agree on onr point. Let's go from there. > so I'm not going to run out and getting a level 4 armored vehicle, body > armor and a gun and pitching myself to Brandy, Britney, Mandy and Will > Smith. I never pitched Will Smith. He pitched me. > But there are people in the security field in one form or antoher that > think that if they can do one thing, they can do it all, and that > creates further problems. Morons think this. Professionals know their limitations, accept them, and try to improve their skills or, in my case, humbly pass the work to those who are infinitely more capable than I am. And vice versa. > Knowing your boundries is one thing, sticking to them is another which > many do not. Agreed. Some people think they have answers to all the world's problems. Try any corner bar on Friday night. They'll be solving the TSCM/posssesion of surveillance problem, too. > I'd rather work with others in complementary fields to create a true > service that is encompassing in nature and detail while retaining a > high level of quality and professionalism for the benefit of the > client. Well said, and a professional attitude. And is the attitude professionals have. I get a big kick out of PI who 'specialize' in every investigative discipline ever named. > The difference between a remote access product and a trojan alert is a > marketing department. We'll see that in a Scott Adams column next week. There have been several attempts to bring together groups of sweepers to improve the profession in different ways. In EVERY instance, the true unstated purposes of the organization were to, in no particular order: 1) Line the pocket$ of the leader of the organization, 2) Feed the ego of the leader of the organization, 3) Engage in a power struggle where hopefully that particular organization would rise above the others, and the others would fall down on their knees in adoration and wish they could be a part 4) Completely phony 'organizations' existing only as a sales tool for the products or services peddled by someone who knows nothing about them and has never found a bug through their own efforts. 5) Build status in the profession by issuing phony certificates of competence, sometimes at exorbitant costs. These people can't earn a living actually providing services, so they sell certificates. 6) Provide some much needed psychological esteem for the burned out has-been leaders of the organization who will not gracefully be led out to pasture. And a lot more reasons, but the above are contemporary. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4922 From: Steve Uhrig Date: Fri Mar 1, 2002 1:41pm Subject: Re: Interesting article Once upon a midnight dreary, preflat@p... pondered, weak and weary: > Students discover "bug" in Whittier College newspaper office Carpenter discovers brain tumor in pet goldfish. > Listening device could have been planted several years ago, says private > investigator Device might not have been a device at all, says someone who believes the private investigator most likely either was incompetent or a liar, likely both. > A routine maintenance service call last week turned up an electronic > surveillance device imbedded in the office walls of the Quaker Campus. It > is not known how long the bug, which was not functioning when pulled from > the wall, was hidden. The device was capable of transmitting a radio > signal to any receiver, tuned to the correct frequency, within a > three-mile radius, editor Amy Stice said. I will have to remember to contact College Newspaper Editors should I find a bug in the future somewhere, since the obviously have an extremely high level of working knowledge of communications, field theory, electronic surveillance technology, antennas, and of course such a breadth of pertinent experience so as to be able to recogize a surveillance device at sight. Funny, takes me a lot of math backed up by empirical testing to determine the range of a surveillance transmitter, and 3 miles is almost beyond what I would consider reality. Guess I need to go back to college and sign up for some journalism courses. Funny, those were the ones the engineering students switched to when they flunked out of engineering. Gonna have to hire this gal. > The discovery prompted a shared sense of disbelief and concern among the > newspaper staff and the university's administration. As this article was > posted, it was not clear which university offices, if any, were > investigating the matter. Whittier Police Department officials contacted > by the SPLC could not find a report of the incident in their database. How inconsiderate of the alleged bugger not to have filed a report with the police department detailing his installation. Terrible inconvenience. > The episode began last Thursday when a maintenance worker, in the > newspaper office to fix a broken light table, found a problem with the > electrical socket. Upon taking it apart, he discovered a two-inch > surveillance device soldered to the back of the socket, Stice said. Gonna have to hire that 'maintenance worker'. Fix a leaking radiator, dredge a hairbrush out of an overflowing toilet, find a bug. > The paper alerted campus security and on Monday an electrician checked all > of the other sockets in the office. No more bugs were found, but campus > security called the Whittier Police Department later that day. Stice said > the officers, however, were reluctant to take action. What action could they take other than prosecute the campus morons for destroying the chain of evidence and chain of custody? They should have spanked them, however, for sticking their noses into something they were not qualified to mess with. Oh, I forgot. They were journalists. They are qualified to do anything. > "The Whittier Police Department came in, apparently looked at the bug and > said, 'Well there's nothing we can do about it; yeah there's a bug but we > don't have any evidence for this,' " Stice said. The officers said they > did not want to file a report, she added, and that such a measure would > necessitate taking custody of the device, which would probably be thrown > away at a later time. 'Apparently' looked at the bug. Apparently said 'yeah there's a bug'. They also 'apparently' could have said, 'There's a dimmer, or noise filter.' > The paper decided to keep possession of the bug. Admission of a felony. Except it is unlikely, in my opinion, it was a bug, so probably no violation. > Student government president Jess Craven, whose office is located in > the same building as the publications room, was worried that more bugs > might be hidden in the walls so he contacted a local private > investigator, Thomas Barnes. An appropriate course of action by the uninitiated. > Barnes, a retired police detective and former military officer, > decided to help the staff pro bono, "because they didn't have any > money," he said. Because if he would have taken any money, it would have been under false pretenses, and he may have been at least that smart. > Barnes loaned the newspaper a scanner to check the office for additional > surveillance tools and he urged former Whittier mayor and current > councilman Bob Alexander to "light a fire under" the local police. Former police and military officers loan scanners to journalists to check for bugs. I will sleep better knowing this. > "Most municipal police departments aren't really on the learning curve > when it comes to bugs, electronic surveillance, computer crime," > Barnes said. Neither are former police officers, former military officers or private investigators. > Barnes said he considers the school's administration a suspect in the > surveillance. I would consider Barnes a suspect. > Barnes and Brundage both said that the bug appeared to have been in the > wall for "a long time." Knob and tube electrical wiring was the clue, no doubt. As was the large power supply and bank of 4CX250 power amplifier tubes in the bug. The blue flashing mercury vapor rectifiers were the real giveaway, however. > Sweeps of the rest of the building turned up no additional surveillance > devices. Good thing he loaned them that scanner. > In California, electronic eavesdropping in situations where there is an > expectation of privacy and individuals are unaware of the surveillance is > a felony, Barnes said. If someone is aware of a surveillance, is it still a surveillance? ============ ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: James M. Atkinson Date: Fri Feb 27, 2004 3:45pm Subject: Litz Wire Does anybody on the list have a reliable supplier for Litz type wire? -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8297 From: Ocean Group Date: Fri Feb 27, 2004 7:14pm Subject: Telecom Encrypt About time in my mind, its also a good pointer that there is money to be made in developing low priced end to end encryption systems that can run on mobile phones etc. It shouldn't be long before you can buy add on software that will provide a base level end to end encryption on mobile to mobile calls to stop the long trend of eavesdropping, government and commercial. http://www.tmcnet.com/usubmit/2004/Feb/1024564.htm Comments welcome! Regards 8298 From: James M. Atkinson Date: Fri Feb 27, 2004 7:54pm Subject: 'Blix's mobile phone was bugged and US and Britain shared transcripts' http://news.independent.co.uk/world/politics/story.jsp?story=495963 'Blix's mobile phone was bugged and US and Britain shared transcripts' By Kim Sengupta and Kathy Marks in Sydney 28 February 2004 The controversy over alleged British and American "dirty tricks" at the United Nations deepened yesterday with claims that two chiefs of Iraq arms inspection missions had been victims of spying. Hans Blix and Richard Butler were said to have been subjected to routine bugging while they led teams searching for Saddam Hussein's supposed weapons of mass destruction. The new charges came within 24 hours of the former cabinet minister Clare Short stating that British intelligence had taped the telephone calls of the UN secretary general, Kofi Annan. As demands grew at home and abroad for Tony Blair to confirm or deny Ms Short's allegations, the British ambassador to the UN, Emyr Jones-Parry, telephoned Mr Annan on Thursday evening. The UN said Mr Jones-Parry's call has not shed any fresh light on the matter. Edward Mortimer, Mr Annan's director of communications, said: "There was a telephone call which was apologetic in tone but did not really amount to an admission of substance. "Basically, the answer we got was the same as the Prime Minister gave at his press conference [on Thursday]. We are not complete innocents, we do realise these things happen but it was rather a shock to hear that the British government had been spying on the secretary general." Charles Kennedy, the leader of the Liberal Democrats, said Mr Blair should make a statement to MPs on the affair. His call was backed by the Labour backbencher, John McDonnell. He will table a Commons motion next week demanding to know if there was an "eavesdropping operation", and if so, how extensive it was. Mr Kennedy said: "We need to know whether British intelligence took part in spying on the United Nations Secretary-General. This is a serious allegation, made by a member of Mr Blair's cabinet, which cannot go unanswered. The United Kingdom was one of the founding members of the UN ... the suggestion that our security services were involved in some kind of illegal operation damages our national standing." Boutros Boutros-Ghali, the predecessor of Mr Annan as secretary general, said: "This is a violation of the United Nations charter. It complicates the work of the secretary general, of the diplomats, because they need a minimum of secrecy to reach a solution." Mr Butler, who led the UN disarmament team in Iraq in the 1990s, Unscom, said he was "well aware" he was being bugged. But he said spying on the UN was illegal and harmed the peace-making process. "What if Kofi Annan had been bringing people together last February in a genuine attempt to prevent the invasion of Iraq, and the people bugging him did not want that to happen, what do you think they would do with that information?" The news of the alleged bugging of Dr Blix, in charge of the last crucial UN mission before the war, seen as the last chance to avoid war, is being viewed in diplomatic circles as part of a concerted effort to sabotage attempts at a peaceful solution to the Iraq crisis. Dr Blix, who retired in June, is highly critical of George Bush and Tony Blair for the claims they made about Iraq's supposed weapons of mass destruction. Washington and London, he said, had aborted the search for weapons to pave the way for an invasion. In his reports to the UN, Dr Blix, and his fellow inspection team leader Dr Mohamed ElBaradei, the head of the International Atomic Energy Agency, had asked for more time to investigate Iraq's arsenal, a plea rejected by Washington and London. The claims of espionage against Dr Blix emerged in the Australian media, sourced to a member of the country's intelligence service. Yesterday a senior UN source confirmed to The Independent that the Iraq mission, Unmovic, were convinced they were victims of spying operations. Reports say Dr Blix's mobile telephone was monitored every time he went to Iraq, and the transcripts shared between the US, Britain and their allies, Australia, Canada and New Zealand. Dr Blix, who retired in June, had said he was aware of the possibility of being a spying target. "There are rumours in New York that there was bugging and I wouldn't be at all surprised," he said. "I assumed when I was in New York that I might well have been bugged in my office." Yesterday, a senior UN official said: "While in the Canal Hotel in Baghdad (the Unmovic headquarters at the time), we never used to talk about anything sensitive in our rooms because we thought the Iraqis might be bugging us. We used to go outside to the garden. " It is one of the ironies of life that back in New York we would sometimes take similar measures, discuss things we thought should be confidential, out of the office, in public places, sometimes the sidewalk. "The only saving grace is that neither Dr Blix or anyone else among us would speak about sensitive matters on mobile telephones, so they would not have heard anything earth-shattering just by that. But I suspect there was other, more widespread, interceptions. There were plenty of attempts to undermine us." A spokesman for the Australian attorney general, Philip Ruddock, whose office oversees security matters, would say only: "We don't make it a practice of commenting on what we might or might not have seen in relation to intelligence matters." In London, the Foreign Office said it had no comment. Dr Blix's predecessor, Mr Butler, now the governor of Tasmania, said he was actually shown transcripts of his bugged conversations. "Those who did it would come to me and show me the recordings that they made on others. 'To try to help me to do my job in disarming Iraq', they would say. 'We're just here to help you'," Mr Butler said. But the former UN chief maintained that it was not only Britain which was spying. He said: "I was utterly confident that in my attempts to have private conversations, trying to solve the problem of disarmament of Iraq, I was being listened to by the Americans, British, the French and the Russians. And they also had people on my staff reporting what I was trying to do privately. Do you think that was paranoia? Absolutely not. There was abundant evidence that we were being constantly monitored." Mr Butler said that he too had to hold sensitive conversations in the noisy cafeteria in the basement of the UN building in New York or in Central Park. "We were brought to a situation where it was plain silly to think we could have any serious conversation in our office. No one was being paranoid, everyone had a black sense of humour about it. "I was reduced to having to go either to a noisy cafeteria where there was so much noise around, and then whisper in the hope that we wouldn't be overheard, or literally take a walk in the park. I would take a walk with the person in the park and speak in a low voice and keep moving so we could avoid directional microphones and maybe just have a private conversation." Mr Boutros-Ghali also described the vulnerability of the organisation to espionage. "From the first day I entered my office they said, 'Beware, your office is bugged, your residence is bugged and it is a tradition that the member states who have the technical capacity to bug will do it without any hesitation'. "That would involve members of the Security Council," he said. "The perception is that you must know inn advance that your office, your residence, your car, your phone is bugged." The targets Richard Butler Former UN chief weapons inspector/p> He said he was "well aware" that he was being bugged at the UN. "How did I know? Because those who did it would come to me and show me the recordings that they had made on others to help me do my job disarming Iraq." He asked: "What if Kofi Annan had been bringing people together last February in a genuine attempt to prevent the invasion of Iraq, and the people bugging him did not want that to happen, what do you think they would do with that information?" Boutros Boutros-Ghali Former UN secretary general He said he was warned that he was likely to be bugged as soon as he started the job. "From the first day I entered my office, they said: 'Beware; your office is bugged, your residence is bugged, and it is a tradition that the member states who have the technical capacity to bug will do it without any hesitation.' That would involve members of the Security Council. The perception is that you must know in advance that your office, your residence, your car, your phone is bugged." ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8299 From: James M. Atkinson Date: Fri Feb 27, 2004 7:55pm Subject: Former UN chief not surprised by spying allegations http://www.abc15.com/news/morenews/index.asp?did=8008 Former UN chief not surprised by spying allegations Posted: 02/27/2004 - 14:36:36 (London-AP) -- A former secretary general of the United Nations says he always assumed his office and home were being bugged. Boutros Boutros-Ghali -- who led the U-N from 1992 to 1996 -- says he was warned that it was likely agents from various countries planted listening devices at the U-N headquarters and his residence. Boutros-Ghali's comments to the B-B-C follow a disclosure from a former member of the British Cabinet, who says she read transcripts of tapped phone calls made by current U-N chief Kofi Annan. But Clare Short's announcement is drawing fire from a former British envoy to the U-N. He says if Short was uneasy about the behavior of the intelligence community, the issue should have been addressed privately. Meantime, former chief U-N weapons inspector Richard Butler says he knew his phone calls were being bugged for a time during his tenure at the U-N. He tells Australia Broadcasting Corporation he couldn't use his office for any serious discussions on Iraq because he knew it was bugged. (Copyright 2004 by The Associated Press. All Rights Reserved.) ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8300 From: Cornolio Date: Sat Feb 28, 2004 1:20am Subject: Re: Telecom Encrypt On Sat, Feb 28, 2004 at 01:14:46AM +0000, Ocean Group wrote: > About time in my mind, its also a good pointer that there is money to be > made in developing low priced end to end encryption systems that can run on > mobile phones etc. It shouldn't be long before you can buy add on software > that will provide a base level end to end encryption on mobile to mobile > calls to stop the long trend of eavesdropping, government and commercial. > > http://www.tmcnet.com/usubmit/2004/Feb/1024564.htm Steps in that direction are being made. We even publish the complete source code so people can verify we did not put in a back door, or made mistakes. So far the only comments we got from the academic community is that we 'over engineered' it. Meaning we use too much crypto and assume AES alone might not be good enough. And more neat features are being added as we speak, so stay tuned at: http://www.cryptophone.de/ Do not underestimate the amount of effort that goes into a project like this. Realtime voice encoding (compression) on these platforms is not trivial! It took us almost three years with a team of experts to create it.... (including a lot of research on the platforms) With regards, Barry Wels 8301 From: A Grudko Date: Sat Feb 28, 2004 5:01am Subject: SA political party finds 'bugging device' Political party finds 'bugging device' 25/02/2004 16:37 - (South Africa) Cape Town - The African Christian Democratic Party has demanded an urgent inquiry following the discovery of "bugging equipment" in its City of Cape Town caucus room on Wednesday. The bugging equipment was linked to high frequency transmitter/receiver devices and video cabling leading into the ceiling of the caucus room, the party said in a statement. "ACDP Cape Town councillors discovered the cluster of audio-video equipment upon entering the caucus room prior to the council meeting (on Wednesday morning). "Councillor Ivann Kirsten immediately approached city head of security, Deon Neft, who eventually admitted that the equipment belonged to him. "Visibly shaken, Mr Neft urged Kirsten not to produce the communication device in the council chamber because of the sensitive nature of the equipment," it said. According to Neft, the equipment was not used to spy on political caucuses, but rather to record happenings "on the floor and security points". "Demanding immediate access to the caucus room in order to retrieve the equipment as well as the video recordings housed in a cupboard, the ACDP was not only denied access by security, but was informed that the video material was not viewable as the system had been compromised during the discovery." The ACDP had demanded an urgent and thorough enquiry into the security breach, as well as access to its caucus room, the statement said. Kirsten said the incident left serious questions as to the behaviour of senior city officials, as well as the extent to which it "has been endorsed by the mayor (Nomaindia Mfeketo) and her ANC/NNP coalition". "A thorough enquiry into this security and privacy breach is necessary, followed by a comprehensive written report to be submitted to council urgently. We will not let this matter rest until the truth has been exposed," Kirsten said. Andy Grudko (British), DPM, Grad IS (South Africa) Consulting Investigator, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , andy@g... Pretoria (+27 12) 244 0255 - 244 0256 (Fax) Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" 8302 From: Date: Sun Feb 29, 2004 5:14am Subject: Jim Atkinson is an expert in electronic surveillance and is http://news.independent.co.uk/uk/politics/story.jsp?story=496254 The whistleblower, the loose cannon and the case for war A week that began with extraordinary and embarrassing revelations about British spying at the UN in the run-up to the Iraq war has ended with the far more damaging suspicion that the Government is attempting to withhold evidence that may reveal there was no legal justification for the invasion in the first place. A special report by Foreign Editor Raymond Whitaker and Political Editor Andy McSmith 29 February 2004 Katharine Gun and Clare Short have never met. One is 29, the daughter of Christian missionaries still living in Taiwan, with no strong political attachments. The other is twice her age, a lifelong Labour activist who spent six years in the Cabinet as Secretary of State for International Development. Yet together they have not only blown a huge hole in the Official Secrets Act, but they have also plunged Tony Blair back into a nightmare. Just when the Prime Minister thought that he might be succeeding in his efforts to put the Iraq war behind him and refocus the political debate on domestic issues such as the revival of a "Thatcherite" Conservative Party threatening huge public spending cuts, all the unanswered questions about the war have resurfaced. When did Mr Blair agree to join President George Bush's crusade to oust Saddam Hussein? Was Britain's participation in the war legal? And is it possible to justify the tactics employed in the run-up to the war, from the use of intelligence about Iraq's alleged weapons of mass destruction to claims that friends and allies were spied upon? Mr Blair has been here before, of course. Only a month ago Lord Hutton's report appeared to exonerate the Government entirely of the charge of "sexing up" its September 2002 dossier on Iraqi WMD, only for the report to be seen as so one-sided that it actually hurt the Government. That was followed by further uncomfortable revelations about the notorious claim that Iraq could deploy chemical and biological weapons within 45 minutes, the issue over which No 10 and the BBC fought themselves to a standstill. Yet by the beginning of last week it must have seemed to the Prime Minister that Iraq was at last receding, not so much into the background, but to the point where it was possible to discuss other questions without it seeming like an attempted diversion. His staff were delighted when they got through the usual Monday morning lobby briefing without a single question on Iraq, possibly for the first time in more than a year. Mr Blair would have known that the legal authorities were about to drop their case against Ms Gun, charged with breaking the Official Secrets Act by leaking an email from the National Security Agency in the US, which asked Britain to help to spy on other countries' diplomats at the United Nations. He was aware that on Thursday morning, when he was due to hold his monthly televised press conference at Downing Street, the papers would be full of the collapse of the Gun case at the Old Bailey the previous day. But he would have his answers ready, and the prospect of a few difficult questions was a lot better than a drawn-out hearing during which Ms Gun's lawyers, with maximum publicity, would question the Government's entire legal basis for the war. The plan was to get the matter out of the way as swiftly as possible and move on to a more palatable topic, a new aid initiative for Africa. The Prime Minister had not bargained, however, on Ms Short. Mr Blair, not surprisingly, did not have his ear to the radio when Clare Short made her live appearance on the Today programme, just after 8.10am on Thursday, but staff in the Downing Street press office did. Within minutes, the Prime Minister's director of communications, David Hill, was on the line, delivering the bad news. Ms Short was invited on to the Today programme to discuss the decision not to prosecute Ms Gun. In the middle of an answer about the events of early 2003, she mentioned almost casually: "The UK in this time was also spying on Kofi Annan's office, and getting reports from him about what was going on." The sentence hung in the air for a moment until her interviewer, John Humphrys, returned to the subject, suggesting that spying on the UN was an odd thing to do. "These things are done, and in the case of Kofi's office it has been done for some time," she replied. Asked whether she believed that Britain was involved in this spying, she replied: "Well, I know. I have seen transcripts of Kofi Annan's conversations. In fact, I have had conversations with Kofi in the run-up to war thinking: 'Oh dear, there will be a transcript of this and people will see what he and I are saying'." She was asked, again, whether British spies had been carrying out operations in the UN on people like Mr Annan. "Yes, absolutely," she said, adding: "I read some of the transcripts of the accounts of his conversations." We do not know what the Prime Minister's immediate reaction was, but it is very likely that he or one of his staff will have immediately picked up the telephone to ring John Scarlett, the chairman of the Joint Intelligence Committee, and Sir Richard Dearlove, head of MI6. We know that when the 45-minute claim was attacked in the famous broadcast by Andrew Gilligan on the Today programme last May, Mr Blair's first reaction was to clear his lines with the intelligence chiefs. It is probable that what he heard from the intelligence chiefs this time was not altogether helpful to the Prime Minister. He had to go and face searching questions in front of the cameras in a couple of hours. They almost certainly told him that they did not want him to make any public comment on the activities of intelligence agencies, whether British or American, because of the precedent it would set. Those who watched the Prime Minister's public performance noticed how confident and clear he was in handling questions about the collapse of Ms Gun's trial - and how awkward he looked when discussing Ms Short. He could not say whether his former colleague's claims were true or false, falling back on the convoluted statement: "I'm not going to comment on the work that our security services do, [but] don't take that as an indication that the allegations that were made by Clare Short are true. Simply understand, I am not going to comment on the operations of our security services." Then, having denounced Ms Short for being "totally irresponsible", he was wrongfooted by a question from the Daily Express: "Have you only just woken up to the nature of Clare Short, and what does it say about your own judgement that you could allow someone like that in the Cabinet?" The furore over Ms Short's allegations, which went round the world, had scarcely anything to do with the issue in Ms Gun's trial, and arguably distracted attention from it. This might have been a help to Mr Blair, but for one fact. Both the leak for which Ms Gun was charged, and the spying claims of Ms Short, concerned a period the Prime Minister would prefer to forget: the fraught weeks in late 2002 and early 2003 as we headed for war with Iraq. By mid-October 2002, President Bush had an open mandate from both houses of Congress to go to war with Iraq. The attacks on New York and Washington were only just over a year in the past, and the White House had used the time in between to convince the American public that Saddam Hussein was somehow linked to them. With mid-term elections due the following month, few Democrats wished to seem unpatriotic by voting against the President, something which is now coming to haunt Senator John Kerry, the Democratic front-runner in this year's Presidential race. The threat of force from the US was in the background as the UN Security Council passed Resolution 1441 on 8 November, warning of "serious consequences" if Iraq did not take a "final opportunity to comply with its disarmament obligations". As far as Washington was concerned, that would mean war. In London, however, things were different. The Attorney General, Lord Goldsmith, was advising, as was the Foreign Office, that another UN Security Council resolution would be required for war to be legal. Tony Blair said of Resolution 1441: "In the event of Saddam refusing to co-operate or being in breach, there will be a further UN discussion." It seemed clear that Britain would have trouble going to war unless the Security Council specifically mandated the use of force. By the start of 2003, however, the pressure from Washington to go to war was mounting by the day. It was all Mr Blair could do to persuade a sceptical Bush administration to seek a second UN resolution. From the American point of view it was always understood that the whole UN effort was a favour to George Bush's closest ally. Lord Goldsmith, meanwhile, was confronted by the concerns of Britain's military chiefs of staff, who were arguing that they needed a clear legal basis for committing British troops to a new kind of pre-emptive war, in which it was far from clear that Britain itself was under imminent threat. The only other grounds for war permitted by the UN Charter is an explicit authorisation of force by the Security Council. It is understood that Lord Goldsmith and his staff produced a paper addressing this question, but the military chiefs said its careful balance of arguments did not meet their need for legal clarity. With a new UN resolution looking hard to achieve, it was about this time that the Attorney General began searching through earlier resolutions for a justification for war. But the all-out diplomatic effort in New York continued, and on 31 January Ms Gun, a translator of Chinese at GCHQ, the government's communications monitoring organisation in Cheltenham, came across an email from Frank Koza, a senior official of the National Security Agency, GCHQ's (much bigger) equivalent in the US. It sought British help in spying on the UN delegations of six nations which were temporary members of the Security Council. Their votes were seen as potentially making the difference between success or failure for a second resolution. Whether Britain complied with the request or not is unknown, but the email found its way to a Sunday newspaper after Ms Gun showed it to a friend with journalistic contacts. Once it was published, she immediately confessed her part and acknowledged having breached the Official Secrets Act. Why the Government dropped its case against her, therefore, can be explained only by looking at her planned defence, which was that the war was illegal. The only way this could have been countered was by making public Lord Goldsmith's final opinion, the one on which Britain went to war. Last week Lord Goldsmith said he had decided to drop the case before Ms Gun's lawyers presented a document outlining their strategy. But Barry Hugill, spokesman for Liberty, the civil rights organisation backing Ms Gun, said it had been "obvious for months that it would become a trial of the legality of the war". According to Ms Short, not even the Cabinet was allowed to see the Attorney General's legal opinion. On 17 March last year, with less than 72 hours before the bombs began falling on Baghdad, she says a document consisting of two sheets of paper was displayed, but not circulated. When she tried to initiate a discussion on it, she was cut off. At this point Elizabeth Wilmshurst, a member of the Foreign Office's legal team for nearly 30 years, abruptly resigned as deputy legal adviser. With war imminent, her departure attracted little attention at the time, but it now seems clear that she at least had seen the Attorney General's full opinion, and found it unacceptable. Last week, as speculation mounted, she spelled it out, saying: "I left my job because I did not agree that the use of force against Iraq was lawful." All that the rest of us know, from Lord Goldsmith's brief summary, is that he is relying on a 12-year-old Security Council resolution which authorised the use of force to expel Iraqi forces from Kuwait in 1991. How he justifies such a seemingly thin argument remains a secret, one guarded by the claim that there is no precedent for publishing legal opinions drawn up for the Government. But other cases are pending, including those of 14 Greenpeace supporters who occupied tanks at a Southampton military base in February last year, and five peace activists charged with criminal damage at RAF Fairford. Their lawyers are expected to demand the full opinion as well. The only legal step Downing Street is contemplating in the wake of the Katharine Gun fiasco is a review of the Official Secrets Act, which would appear to be all the more urgent following Clare Short's trampling of the same law. But a spokesman shed little light, describing the review as "the normal process that you go through after the outcome of a case", and said that it would be carried out "by the normal people in the normal way". One possibility is that government lawyers will try to write into the act a precise definition of the concept of "necessity" which cropped up during the case of the former MI5 agent David Shayler, who was jailed for selling information to a Sunday newspaper. When Mr Shayler appealed to the House of Lords, Lord Woolf raised the possibility that a defendant might be acquitted of a breach of the Act if he could show that he had revealed secrets in order to avert a threat to human life, before dismissing this possibility in Mr Shayler's case. Ms Gun's lawyers intended to argue that she was seeking to save lives by exposing skulduggery at the UN which could lead to war, and the Attorney General decided that the prosecution could not answer that claim. This might be seen, absurdly, to give immunity to anyone who wants to leak secrets in the run-up to a war. In some ways the uproar over spying at the UN, though highly embarrassing for the Government, is easier to deal with by stonewalling: nobody seriously expects any government to confirm that it is eavesdropping on its supposed friends and allies, even though everyone knows it goes on. Even anti-war MPs on the left wing of the Labour Party, who refused to join in the condemnation of Clare Short, were saying yesterday that whether or not British agents spied on Kofi Annan was not the political issue of the moment. "All of this is a massive distraction," said Alan Simpson, chairman of the left-wing Campaign Group. "I don't think we should be surprised at bugging operations. When you talked to UN officials, they presumed they were being bugged. "The issue is not about Clare's loyalty or disloyalty. It's about this assumed, untrammelled right of the Bush administration to go to war. The obsession was not about whether Saddam posed a threat to the West, but about whether the UN posed a threat to America's determination to have a war." Experts say that electronic eavesdropping is an accepted, if rarely acknowledged, part of life at the UN and one of the reasons why the US was so willing to allow the body to establish its headquarters in New York in April 1945 - a move that gave America a head start in its spying efforts. Indeed, in the aftermath of Ms Short's allegations diplomats said it was almost a matter of pride to be spied on. Spain's ambassador to the UN, Inocencio Arias, told The Washington Post: "In my opinion everybody spies on everybody, and when there's a crisis, big countries spy a lot. I would not be surprised if this Secretary-General and other Secretary-Generals have been listened to by a handful of big powers, and not only the ones you are thinking." No wire-tapping is allowed on UN premises. Three treaties are supposed to ensure the protection of the UN from spying, and yet experts say that among diplomats it is a given that spying takes place. Under an agreement by the so-called Spoke countries - the US, UK, Canada, Australia and New Zealand - spying on US territory is carried out by America's National Security Agency and then shared. Jim Atkinson is an expert in electronic surveillance and is regularly contracted by countries and private companies to sweep buildings for bugs and provide protection against electronic eavesdropping. He told an astonishing story about spying at the UN. Travelling between jobs in New York in his mobile laboratory - one of a number of vehicles fitted with detectors and anti-bug equipment - he recently made several passes of the UN headquarters. The equipment in his vehicle was deliberately left on. "The equipment immediately started logging on to bugs that had the frequencies of [bugging equipment routinely used by] various countries," he said. "I can even pick out specific bugs in specific offices." Mr Atkinson declined to identify the countries whose equipment he detected that day, but he said: "Britain and America do this stuff all the time. They have scores of people who do this ... they do it to everybody. Everybody does it to them. Everybody in the diplomatic community does not trust anybody else." He claimed that in addition to Britain and America, he expected that Iraq would have bugged Mr Annan's office, and that Saudi Arabia and Israel would also have been electronically eavesdropping. The Prime Minister's phrase of the moment is that he wants to "move on", which means that he would like the public to forget the Iraq war and pay attention to political questions such as the sharply focused differences between Labour and the Conservatives. Yet thanks to three women - Katharine Gun, Clare Short and Elizabeth Wilmshurst - Mr Blair has spent another week on the back foot. Comment from around the world on the former minister's sensational revelations emphasised that the Prime Minister still suffers lingering damage to his reputation from the Iraq war. Whether he can answer the questions which remain from that conflict, and dispel the clouds of mistrust that remain, is likely to determine how his premiership is judged. Tony Blair: Trapped in the Iraq storm The Prime Minister's phrase of the moment is that he wants to "move on", which means he would like the public to forget the Iraq war. At the start of the week, Mr Blair really thought he was getting somewhere. Interest in Iraq seemed to be fading at last. The decision not to prosecute Katharine Gun took away the possibility of a long, highly publicised trial. He had an announcement about aid to Africa at the ready for his monthly Downing Street press conference on Thursday, and on Friday he would be delivering a speech on domestic politics to the Scottish Labour Party conference. Then Clare Short's sensational revelations ruined his week, leaving his advisers wondering if he will everrid himself of this feisty Labour rebel, or repair the damage the Iraq war has done to his reputation. Lord Goldsmith: Little-known lawyer thrust into the front line after 9/11 It is possible to serve for years as Attorney General without making the news. Even the average lawyer would struggle to recall who occupied the post as recently as five years ago. The answer is that it was held for the first two years of the Blair government by the veteran MP John Morris, and for the next two years by Gareth Williams before he became Leader of the House of Lords. Peter Goldsmith, who took over the post after the 2001 election, is an experienced lawyer but a virtual unknown in the political world. Yet since his appointment, he has been involved in one political controversy after another, most of them arising from the 11 September attacks. He has negotiated on behalf of Britons detained in Guantanamo Bay; warned David Blunkett that lowering the standard of proof required to convict suspected terrorists could be a breach of the law; and - most controversially - was asked for a judgement on the legality of the Iraq war. Why the full text of that judgement has to be kept secret is now a hot political issue. Similar judgments have been made public, although there was a famous case in 1986 when the then Trade and Industry Secretary, Leon Brittan, had to resign after ordering the leak of an Attorney General's letter. Clare Short: Former minister who fell out with her colleagues Clare Short was never a politician to hold back or speak softly. She is also impulsive, and has made enemies where her friends ought to be, on the left wing of the Labour Party. They have not entirely forgiven her for staying in the Cabinet during the Iraq war, only to resign afterwards. Those with longer memories recall her part in expelling or disciplining members of the left in the 1990s. Having entered the Commons at the same time as Tony Blair, in 1983, Ms Short served for years on the National Executive Committee, the body that may yet bring her to book for her outspokenness. She held the post of International Development Secretary for six years, and was generally thought to have run her department well. Now she has aroused the anger of the party leadership like no other former minister. Andy McSmith Katharine Gun: Translator who had to follow her conscience A fluent Mandarin speaker and daughter of an English literature professor, Katharine Gun was a low-level translator for GCHQ, the government's top-secret eavesdropping centre in Cheltenham, Gloucestershire. But last March, she leaked the now infamous memo from a very senior US intelligence official at the National Security Agency, asking for British help to bug delegates of six countries at the United Nations. Sacked from GCHQ in June 2003, she has always admitted disclosing the email, written by the NSA's Defence Chief of Staff (Regional Targets), Frank Koza. But she has insisted she had "only ever followed her conscience" to prevent an "illegal war against Iraq". Ms Gun, aged 29 and married to a Turk, learnt Mandarin as she grew up in Taiwan where her father, Paul Harwood, teaches at Tunghai University. After moving to Eastbourne, East Sussex, to study for her A-levels, Ms Gun went on to read modern Chinese with Japanese at Durham University where she was described as a capable, "lively" student who would always speak out if she had something to say. Professor Harwood and Ms Gun's mother, Jan Harwood, have declared that they were "deeply proud" of their daughter's decision to breach the Official Secrets Act. Elizabeth Wilmshurst: FO specialist believed that the war was illegal The former deputy legal adviser to the Foreign Secretary, who resigned over the legality of the Iraq war last year, Elizabeth Wilmshurst is seen as one of Britain's leading experts on international criminal and diplomatic law. While little known outside diplomatic and legal circles, Ms Wilmshurst spent 29 years in the Foreign and Commonwealth Office legal department before becoming deputy head of legal affairs in 1997. Ms Wilmshurst is now head of the international law programme at the Royal Institute of International Affairs in London and a visiting professor at University College London. In 1998 she was made a Companion of St Michael and St George, one of the highest honours for diplomats. She had resigned her post in March last year because she believed the Iraq war was illegal - a view many Foreign Office experts are said to share. Before resigning, Ms Wilmshurst had led the UK delegation to set up the International Criminal Court (ICC) in The Hague, served as legal counsellor to the UK's mission to the UN, and given evidence for the Foreign Office to the House of Commons International Development Committee on the legality of sanctions. She played a controversial role in the setting-up of the ICC, when, as a Foreign Office negotiator, she supported a US attempt to block the court from prosecuting US citizens. Despite this, she is now an adviser to the ICC. There was speculation that Ms Wilmshurst might have appeared as a witness for Katharine Gun, the former GCHQ translator whose trial for leaking an email concerning a UK-US spying operation collapsed last week. Ironically, Ms Wilmshurst was due to have co-chaired with Clare Short a conference on the US-UK occupation of Iraq at the British Institute of International and Comparative Law last Thursday - the day Ms Short revealed Britain's bugging of the UN. Severin Carrell [Non-text portions of this message have been removed] 8303 From: Date: Sun Feb 29, 2004 2:58pm Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 8304 From: James M. Atkinson Date: Sat Feb 28, 2004 9:57pm Subject: Britain, Russia sweat as secret operations exposed http://www.kuwaittimes.net/today/analysis_s2.php Britain, Russia sweat as secret operations exposed In the twilight world of secret services there are few hard-and-fast rules, but the main one is: don't get found out. In two very different cases, Britain and Russia both broke that rule on Thursday. The British government was rocked by allegations by a former cabinet minister that it spied on United Nations chief Kofi Annan in the run-up to the Iraq war last year. Russia, for its part, was angrily demanding the return of secret agents arrested in Qatar and charged over the assassination of a former Chechen rebel president. The contrasting cases raise troublesome issues for international law and for other governments such as those of the United States and Israel. When is it legitimate to spy against your friends? And when is it justified to use lethal force against militant opponents in the name of the war on terror? On the first point, intelligence experts expressed no surprise at the charges by former aid minister Clare Short that Britain had bugged Annan's office and she had seen transcripts of his conversations. But they did see the leak as highly embarrassing to the government. "It does not shock me that the old days-we do not spy on our friends, and gentlemen do not read other gentlemen's mail -- are over," said Anthony Glees of the Brunel Centre for Intelligence and Security Studies in England. "We've known for several years now that British intelligence has spied on our European Union partners." Analysts noted the United Nations was a key intelligence priority because of its pivotal role in the run-up to the Iraq war, for which the United States and its key allies were seeking Security Council backing. "Clearly every major Western government would have an interest in what's going on there, and that would be covered both by normal diplomatic reporting and intelligence activities," said Crispin Black of the Risk Advisory Group. Compounding the government's discomfort, Short's revelations came the day after Britain dropped charges against a translator who leaked a top-secret U.S. document seeking London's help in bugging UN members in the run-up to last year's war on Iraq. To the extent that "rules of the game" exist for espionage, they are set out in the 1961 Vienna Convention on Diplomatic Relations. It states, for example, that the premises of a diplomatic mission "shall be inviolable", and agents of the host state cannot enter without permission. But Glees said the 43-year old rules mean little in a world where everyone spies on everyone else, including their allies. "We do not stick to the Vienna Convention, and I do not know of any liberal state in the world that does. And those states that weren't liberal never did in any case," he said. Analysts say it suits the purposes of governments and intelligence services to operate in a legal "grey zone" when it comes to espionage. "It is a kind of legal murky area," said Black. In theory, violations of the Vienna Convention could be brought before the International Court of Justice in The Hague. In practice, spy rows are handled discreetly with minimal publicity and just the occasional tit-for-tat expulsion. In the case of the two arrested Russians in Qatar, Moscow protested to the Qatari authorities that its citizens were "members of the Russian special services...linked to the battle against international terrorism". They were held over the February 13 car bombing in Qatar that killed Zelimkhan Yandarbiyev, who was briefly separatist leader of the Russian region of Chechnya. Russia is not the only country whose agents have been captured abroad while carrying out covert operations. Two Israeli Mossad agents were arrested in Jordan after trying to poison a Hamas official in 1997, and the Jewish state had to free the militant group's jailed leader to get them back. "What is the difference between (the Yandarbiyev killing) and a group of CIA agents scouring a mountain in Central Asia looking for (Osama) bin Laden?" Black said. "I think most people would accept if (the British) SIS or CIA saw bin Laden springing up a mountain they would be perfectly within their rights and morally correct to shoot him. "I don't think that's difficult. It's where you get into more nuanced cases...I'm not sure necessarily a sort of codified law is going to make them any easier to handle." ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8305 From: James M. Atkinson Date: Sat Feb 28, 2004 9:58pm Subject: Whistle-blower tipped by Downing St mole http://news.scotsman.com/politics.cfm?id=237052004 Whistle-blower tipped by Downing St mole BRIAN BRADY WESTMINSTER EDITOR THE collapse of the trial of GCHQ 'whistle-blower' Katharine Gun was caused by a tip-off to her defence team from within Tony Blair's government, it was claimed last night. A source close to Gun's lawyers has told Scotland on Sunday that a government insider told them there were serious concerns within Blair's administration about the legal justification behind the decision to go to war. Armed with this crucial information, the GCHQ translator's legal team planned to go into court and demand from the government highly sensitive documents on which the Attorney-General, Lord Goldsmith, based his advice. The case against Gun, accused of breaking the Official Secrets Act by leaking confidential war-related information to the press, was dropped suddenly without a full explanation at the Old Bailey last week. The revelation that the case began to unfold after a leak from within Westminster follows claims by former Cabinet minister Clare Short that UK intelligence services had eavesdropped on UN Secretary-General Kofi Annan. Last night, sources close to Gun's defence team claimed Goldsmith had been "duped" by inaccurate intelligence information into giving the legal green light for the Iraq conflict. Despite the growing storm, the government made it clear last night it would not make public the Attorney-General's advice on the legality of the war. But a further court challenge is expected from Greenpeace, who said they would demand to see the documents as part of an attempt to clear 14 of their activists of charges relating to anti-war protests. Gun's planned defence rested on the argument that she was trying to expose illegal activity on the part of the government. Proving this relied upon showing that the government's legal case for war was flawed. Her defence was planning to reveal startling claims that Goldsmith did a U-turn on earlier advice that a conflict would not be justified, after he was shown disturbing intelligence reports claiming Saddam Hussein represented an immediate threat to Britain's national security. It is believed that the "evidence" rested on a range of intelligence sources, including controversial claims in the government's dossiers on Iraq 's Weapons of Mass Destruction (WMD) capabilities, chiefly the allegation that Saddam could launch an attack within 45 minutes. Goldsmith is understood to have accepted that a pre-emptive strike under such conditions would be legitimate, and would not require the official endorsement of the international community. "What it rests on is that Lord Goldsmith, like the rest of the nation, was sold a pup," said a senior source close to Gun's defence. "It looks very much like he wrote the advice that he was asked to write. He did it in such a way that he covered his own back. That is what we were seeking to have disclosed in court." The case was abandoned the day after Gun's confidential submission was delivered to the government last Tuesday, serving notice that the defence would demand publication of all Goldsmith's advice and the intelligence used to back it up. The government was left facing an 'ambush', with Gun's team - assembled by the civil rights group Liberty - challenging ministers to reveal hugely sensitive documents. The defence's successful strategy began with 'inside information' about the dubious quality of intelligence passed to Goldsmith. The source told Scotland on Sunday: "We were sure of the information because it came from a good source." Asked if that meant someone within the government, the source replied: "Yes." When the source was asked whether the informant was Short he laughed and refused to answer. The submission by Gun's legal team says: "The defence believes that the advice given by the Foreign Office legal adviser expressed serious concerns about the legality (in international law) of committing British troops in the absence of a second resolution." It added: "Our understanding is that Goldsmith changed his advice in January last year to say that war would be legal, but only on this basis: it was put to him that British intelligence had credible evidence that there was a serious and imminent threat." Yesterday Downing Street insisted Goldsmith's advice would remain under wraps. A spokesman said: "The Attorney-General's advice remains confidential because of the long-standing convention that advice from government law officers is not disclosed." In a new development last night, George Foulkes, Short's former deputy at the Department for International Development, claimed that Short had told him while still a minister that if she was forced out of office, she would bring down the Prime Minister. "We were having a drink together and I think she had begun to feel there was a possibility she would be out," he said. There were always tensions between her and No 10 - not about specific issues but with the way things were being done. And she said to me, 'If I go, I am going to bring Tony Blair down with me.'" It also emerged last night that according to other unpublished documents from the Gun case, Britain's army chiefs were refusing to go to war in Iraq, amid fears over the conflict's legality, just a few days before the US and British bombing campaign began. Senior military leaders were adamant that war could not begin until they were satisfied neither they nor their men could be tried for war crimes, but were persuaded by the government's legal advice. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8306 From: Ocean Group Date: Sun Feb 29, 2004 6:40pm Subject: Does this man *really* know what he is talking about? Eavesdropping made easy . . . they can listen through a closed window (Filed: 27/02/2004) Daily Telegraph Michael Smith, who worked with GCHQ during the Cold War, says that spying on allies is routine The spying operation that led to Clare Short reading transcripts of Kofi Annan's private conversations was unlikely to have involved the use of a "bug" like those seen in spy films. The British and American intelligence agencies have many more high-tech methods of intercepting conversations that are far more adaptable and much less likely to be detected. It is far from clear from what Miss Short actually told the BBC which method was used, or even if the UK was actually involved in the interception of his conversations rather than simply a recipient of the intelligence. "The UK in this time was also getting spy [sic] on Kofi Annan's office, and getting reports from him about what was going on," Miss Short said. The first point to make is that if someone was planting bugs in Mr Annan's office, which would have been illegal under international law, the most obvious candidates are the CIA and NSA, not MI6 and GCHQ. But the main point is that surveillance technology is now so advanced that planting bugs under desks or in telephones is not even necessary. Powerful unidirectional microphones can pick up conversations through open windows. Even if the window is closed, radio beams can be bounced off the glass to detect the vibrations caused by the noise inside. These can then be translated back to produce the speech. However, the easiest way to bug a modern office is through the mobile telephones of the people working there. You don't have to actually use a mobile telephone for intelligence agencies to be able to listen to you speak. As long as it was simply switched on, a mobile telephone on Mr Annan's desk could be used to listen in to anything he was saying to anyone else. Mobile telephones communicate continuously with their control stations over a frequency that is quite separate from the one used to talk on. Anyone who has details of the frequencies and codes in use can listen in to what is being said in the immediate vicinity of any telephone on the network. Intelligence services such as GCHQ and NSA do not even need to obtain the frequencies and codes from the network provider. They can bypass the main network to take complete control of any mobile telephone. But the most likely circumstance that would have led to Miss Short seeing the transcripts of Mr Annan's conversations would be that he was talking to leaders or officials from countries that were the real target of the interception. International telephone conversations, which travel via communications satellites, are routinely intercepted by US spy satellites. The capabilities of these satellites and the computers used to process the millions of conversations they intercept are often wildly overstated. But they can pick out key telephone links, recognise key words and even "fingerprint" voices. Nor is listening in to countries or organisations that are our friends an unusual occurrence. Britain's spies routinely intercept the conversations and correspondence of our allies to discover what they are really doing. When the Government Code and Cypher School, GCHQ's predecessor, was set up at the end of the First World War, its two top targets were America and France, the two countries it had just finished fighting alongside. During the British negotiations to enter the then European Economic Community, GCHQ intercepted French diplomatic messages to find out what stance the British negotiators should take to ensure the best deal. Delegates to anything from trade negotiations to peace conferences are likely to find their rooms bugged by MI6 and their messages home intercepted by GCHQ in order to give British ministers detailed intelligence on what can and cannot be achieved. The hotel rooms of Robert Mugabe and Joshua Nkomo were bugged during the 1979 Lancaster House talks on the future of Zimbabwe, as were the rooms in Lancaster House used for meetings. As a result, Lord Carrington, the then Foreign Secretary, was briefed at the start of each day on what positions the various parties would take and what their fall-back positions in the negotiations would be. MI6 also bugged the rooms of the delegates attending the 1992 London conference on Bosnia, with regular transcripts provided to Douglas Hurd, who was then Foreign Secretary. The only surprise about the memo leaked by Katharine Gun, in which the Americans asked for increased surveillance on the six countries whose votes might help win a Security Council vote on Iraq, would be if it wasn't already happening. Nor is that illegal. Under the terms of the 1994 Intelligence Services Act, GCHQ and MI6 "obtain and provide information relating to the actions or intentions of persons outside the British Isles" to safeguard our national security and economic welfare. Miss Short's claims are controversial because interference with UN property is illegal under international law. But if the target of the intercept was the other party in the conversation rather than Mr Annan, then it is unlikely that any GCHQ officer involved could be deemed to have acted illegally. Even if they were, as long as the Foreign Secretary deemed it necessary for the proper discharge of GCHQ's statutory functions, the Intelligence Services Act exempts them from any liability under British law. ? Michael Smith's book The Spying Game is published by Politicos. 8307 From: Steve Uhrig Date: Sun Feb 29, 2004 7:20pm Subject: Re: Does this man *really* know what he is talking about? On 1 Mar 2004 at 0:40, Ocean Group wrote: > You don't have to actually use a mobile telephone for intelligence > agencies to be able to listen to you speak. As long as it was simply > switched on, a mobile telephone on Mr Annan's desk could be used to > listen in to anything he was saying to anyone else. This is untrue. > Mobile telephones communicate continuously with their control stations > over a frequency that is quite separate from the one used to talk on. > Anyone who has details of the frequencies and codes in use can listen > in to what is being said in the immediate vicinity of any telephone on > the network. This is untrue. > Intelligence services such as GCHQ and NSA do not even need to obtain > the frequencies and codes from the network provider. They can bypass > the main network to take complete control of any mobile telephone. This is true, however it's not as simple as it may sound, and requires a substantial amount of info obtained in advance, and a local (within a few hundred meters *maximum*) placement of a portable cell site simulator and appropriate antenna. It is difficult to conceal the antenna unless you are quite close to the user and have strong enough signals to get away with an inefficient covert antenna. You also need direct line of sight to a local cell site on the service the bad guy's phone uses, within the same few hundred meters. Not workable in many situations. Remember many office buildings have a cell site on their roof, and large buildings, hotels, multi story, etc. will have a cell site every few floors. Worst case is you disable all of these to give you a clear shot to the places you need, but there is a lot of side effects to doing this and it's done only in tactical situations. You wouldn't get away with it in a totally covert operation. This work is done not for surveillance, but to control communications and access via cell phone to a bad guy in a hostage situation. The law enforcement temporary cell site services the bad guy's phone transparent to him, and LE can restrict, intercept and control all calls in or out to the phone. Many times a bad guy will have a cell phone and will have a low profile confederate outside in the crowd reporting the activity of law enforcement to the bad guy. The LE command post with the portable cell site can restrict incoming calls from the media to the bad guy also, which is a real problem. Many times the bad guy will be talking to the media unknown to LE. Things can be controlled so only preauthorized cell phones can originate a call to the bad guy, or any calls must be prefixed with a dynamic code to be allowed to go through. We integrate this equipment. ---------- When the gentleman who mentioned the above untrue comments, he's either naÔve or misinformed or deliberately pushing hyperbole. Any of these would cast dispersions on anything he says. And he's trying to sell his book, so that may explain trying to glamourize the matter and get people paranoid. Always look for an ulterior motive when trying to establish someone's credibility when they make a questionable statement. ---------- Does anybody *really* know what time it is? Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8308 From: David Alexander Date: Mon Mar 1, 2004 3:42am Subject: RE: Britain, Russia sweat as secret operations exposed First a disclaimer - I'm British and therefore maybe slightly biased, but it also means I have a far better 'handle' on events in Britain than someone overseas. I don't believe that we are 'sweating' over being found out for bugging the UN. There are something like 143 Foreign Intelligence Services (FISs) around the world, all trying to do this kind of thing to each other - what do people think they do all day - haven't they seen James Bond ? (OK, so that's a bit extreme and simplistic, but it I think it makes the point). The irony is we weren't caught doing this, someone, who in my opinion is a totally irresponsible idiot , who was "in the know" owned up ! I think that what the British government is really sweating about is the legality of the decision to go to war. This is a could easily be a major political disaster which has the potential to bring down the government. I suspect it maybe the straw that breaks the camels back for us, and if it does, it may have very unfortunate effects on 'dubya', especially in an election year, because then the spot light will turn and focus on him - "Mr President, if it wasn't legal for the Brits to go to war, how come it was legal for us ?"... My 2c. David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent:29 February 2004 03:58 To:TSCM-L Subject:[TSCM-L] Britain, Russia sweat as secret operations exposed http://www.kuwaittimes.net/today/analysis_s2.php Britain, Russia sweat as secret operations exposed In the twilight world of secret services there are few hard-and-fast rules, but the main one is: don't get found out. In two very different cases, Britain and Russia both broke that rule on Thursday. The British government was rocked by allegations by a former cabinet minister that it spied on United Nations chief Kofi Annan in the run-up to the Iraq war last year. Russia, for its part, was angrily demanding the return of secret agents arrested in Qatar and charged over the assassination of a former Chechen rebel president. The contrasting cases raise troublesome issues for international law and for other governments such as those of the United States and Israel. When is it legitimate to spy against your friends? And when is it justified to use lethal force against militant opponents in the name of the war on terror? On the first point, intelligence experts expressed no surprise at the charges by former aid minister Clare Short that Britain had bugged Annan's office and she had seen transcripts of his conversations. But they did see the leak as highly embarrassing to the government. "It does not shock me that the old days-we do not spy on our friends, and gentlemen do not read other gentlemen's mail -- are over," said Anthony Glees of the Brunel Centre for Intelligence and Security Studies in England. "We've known for several years now that British intelligence has spied on our European Union partners." Analysts noted the United Nations was a key intelligence priority because of its pivotal role in the run-up to the Iraq war, for which the United States and its key allies were seeking Security Council backing. "Clearly every major Western government would have an interest in what's going on there, and that would be covered both by normal diplomatic reporting and intelligence activities," said Crispin Black of the Risk Advisory Group. Compounding the government's discomfort, Short's revelations came the day after Britain dropped charges against a translator who leaked a top-secret U.S. document seeking London's help in bugging UN members in the run-up to last year's war on Iraq. To the extent that "rules of the game" exist for espionage, they are set out in the 1961 Vienna Convention on Diplomatic Relations. It states, for example, that the premises of a diplomatic mission "shall be inviolable", and agents of the host state cannot enter without permission. But Glees said the 43-year old rules mean little in a world where everyone spies on everyone else, including their allies. "We do not stick to the Vienna Convention, and I do not know of any liberal state in the world that does. And those states that weren't liberal never did in any case," he said. Analysts say it suits the purposes of governments and intelligence services to operate in a legal "grey zone" when it comes to espionage. "It is a kind of legal murky area," said Black. In theory, violations of the Vienna Convention could be brought before the International Court of Justice in The Hague. In practice, spy rows are handled discreetly with minimal publicity and just the occasional tit-for-tat expulsion. In the case of the two arrested Russians in Qatar, Moscow protested to the Qatari authorities that its citizens were "members of the Russian special services...linked to the battle against international terrorism". They were held over the February 13 car bombing in Qatar that killed Zelimkhan Yandarbiyev, who was briefly separatist leader of the Russian region of Chechnya. Russia is not the only country whose agents have been captured abroad while carrying out covert operations. Two Israeli Mossad agents were arrested in Jordan after trying to poison a Hamas official in 1997, and the Jewish state had to free the militant group's jailed leader to get them back. "What is the difference between (the Yandarbiyev killing) and a group of CIA agents scouring a mountain in Central Asia looking for (Osama) bin Laden?" Black said. "I think most people would accept if (the British) SIS or CIA saw bin Laden springing up a mountain they would be perfectly within their rights and morally correct to shoot him. "I don't think that's difficult. It's where you get into more nuanced cases...I'm not sure necessarily a sort of codified law is going to make them any easier to handle." ---------------------------------------------------------------------------- ------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8309 From: contranl Date: Sun Feb 29, 2004 7:57pm Subject: Who makes this frequency hopping tx ? . Recently discovered Frequency hopping transmitter Size: pack of cigarettes Frequency hopping Centerfreq: 850 mhz Bandwidth +/- 80 mhz no internal mic or batt 4 mini connectors mic1,mic2,vdc/panic,antenna Metal housing Type/indication: FH5000 Looks like a universal professional unit Questions: A) Does anyone know the unit and who makes it ? B) How to detect such a unit ? walking/driving by...not being very close (but in range ofcourse)...not specificly doing a search and not using bulky equipment like spectrumanalyzers and not using a simple wideband-detector that would receive to much other sigs...more like something that you could have in your pocket...if neccesary such a detector could be tuned (fixed) for the above frequency band. Thanks Tetrascanner . 8310 From: J Grudko Date: Mon Mar 1, 2004 8:30am Subject: Re: Britain, Russia sweat as secret operations exposed --Original Message----- From: David Alexander >First a disclaimer - I'm British and therefore maybe slightly biased, Me too, but only by birth. I won't comment on the 'war' - the George Michaels video said it all. >I don't believe that we are 'sweating' over being found out for bugging the >UN. I agree - more upset that that was 'just not cricket' Ms Short. She will probably go for a walk one night and turn up dead in the woods with slit wrists in the middle of a crop circle (aerial photos will later reveal a second identical crop circle forming a perfect 'OO' symbol....) oThere are something like 143 Foreign Intelligence Services (FISs) around >the world, all trying to do this kind of thing to each other - what do >people think they do all day - haven't they seen James Bond ? In the late '80s one of my staff was caught in a car with a surveillance receiver in Zurich, outside the Iraqi embassy. He was arrested and charged but in Court the Judge agreed that he was 'probably working for an allied intelligence agency and acting in western interests' and the charges were returned 'no prossicution'. I must find the newsclipping and put it on my site - maybe GWB will give me a nice, shiney tin badge. Andy Grudko, Grudko Associates, Johannesburg Crime investigation, intelligence & VIP Protection since 1981 www.grudko.com. Johannesburg (+27 11) 781 7206 - 781 7207 (Fax) Sandton (+27 11) 465 9673 - 465 1487 (Fax) Pretoria (+27 12) 244 0255 - 244 0256 (Fax) Members of :SIRA, SACI, WAD, CALI, SASFed, SASA, UKPIN, AFIO (OS),IWWA. "When you need it done right - first time" 8311 From: J Grudko Date: Mon Mar 1, 2004 6:30am Subject: Fake debugger unfrocked I found this today whilst researching an investigation into tampering with university records... Andy Grudko www.grudko.com SA varsities earn top marks for deceit Cape Argus (South Africa) July 09 2002 at 11:00AM South Africa has emerged as a hub of one of the world's biggest fake university degree scams, offering diploma and degree certificates on the Internet via email spam and telemarketing. Fake degrees from the so-called "Harrington University" came to light after a Bothasig woman accused a Maitland electronic surveillance expert of posing as an academic doctor in electronics and later found herself defending a defamation claim in court. The Goodwood Magistrate's Court found that Maureen Gallon, a University of Cape Town staffer, had not defamed businessman Klaus Knopf, who based his claim on a certificate showing he had a degree from Harrington. Knopf, who was being sought by German justice authorities for posing as a "doctor", was listed by a special police task team in Cape Town as a wanted fugitive. Harrington would sell degrees to anyone, 'no questions asked' Knopf told the Cape Argus on Monday that he was a "legal degreed academic", but when a reporter confronted him about the Harrington certificate, he refused to discuss it. Harrington has a single web advertisement page, which simply refers visitors to a London address and phone number. Retired US university professor John Bear, who has studied fake "cyberspace degrees" and has testified for the FBI as an expert witness on the topic, said on Monday that he had been contacted by an "insider" in a Romanian company which sold the Harrington degrees saying that he wanted to spill the beans on the scam. Bear said his contact's company had sold more than 70 000 fake degrees in the past few years, as well as selling fake international driver's licences on the side Bear's contact told him the fake university's main banking activities were in South Africa and in Cyprus, and most of the telemarketing was by South Africans. Telemarketing was done from Romania by people with South African accents He said Harrington provided employers with transcripts and recommendation letters, all without any grades or coursework, for an additional fee. The Cape Argus has in its possession copies of Knopf's supposed degree and letters of recommendation from the Harrington source, which he produced as possible evidence in his civil claim. Gallon's attorney, Bev Bird, said she had been handed copies of supposedly authentic documents, but "Internet-based" documents were not accepted as evidence in court, and the case had been decided in Gallon's favour without them. Bear said there were "borderline" unaccredited Internet universities, which offered degrees on the basis of correspondence courses and practical experience in the workplace, "but Harrington is not one of them". Harrington would sell degrees to anyone, "no questions asked". Bear toured South Africa in the mid-1990s, meeting the rectors of several universities, including the University of South Africa and the University of Cape Town, to discuss the Harrington fraud. He said Harrington University was owned by an American using an address in Britain, a printer in Jerusalem and banks in Cyprus and South Africa. Telemarketing was done from Romania and South Africa "by people with South African accents", according to Bear. Harrington University had headquarters in London, but students had to wire payments overseas through Western Union, and more recently through South African banks. For a small fee, a Harrington University diploma, purportedly accepted anywhere, could be delivered within 10 business days. Harrington was offering bachelors and masters degrees, as well as doctorates, based on "life experience" for $1 400 (R14 000) - discounted by $500 for signing up the same day. Bear said a Harrington representative told a "prospective student" that with a custom-made PhD based on work experience, "you can legally call yourself doctor." The proliferation of legitimate distance-learning institutions and the ease of setting up virtual sites overseas had made it easier for people to obtain unsubstantiated degrees via the Internet, he said. The world-wide web had spawned a new generation of cyber-degree scamsters, creaming off about $200m a year - some of them up to $20m each. He estimated there were more than 300 unaccredited university sites, with one or two new ones cropping up every week. The anonymity of the Net makes it all but impossible to find the con artists, who operate fake virtual universities from remote spots, such as the Caymans tax havens or Costa Rica. Bear said the biggest problem was the ease with which a fraudster with a few hundred dollars could create a convincing front on the Net. Someone with computer savvy could steal the source code and graphics of an authentic online university and simply change a few things to create a convincing fake. Andy Grudko, Grudko Associates, Johannesburg Crime investigation, intelligence & VIP Protection since 1981 www.grudko.com. Johannesburg (+27 11) 781 7206 - 781 7207 (Fax) Sandton (+27 11) 465 9673 - 465 1487 (Fax) Pretoria (+27 12) 244 0255 - 244 0256 (Fax) Members of :SIRA, SACI, WAD, CALI, SASFed, SASA, UKPIN, AFIO (OS),IWWA. "When you need it done right - first time" 8312 From: James M. Atkinson Date: Mon Mar 1, 2004 8:49am Subject: UN steps up anti-spying measures as Blix reveals belief he was bugged http://news.independent.co.uk/world/politics/story.jsp?story=496266 UN steps up anti-spying measures as Blix reveals belief he was bugged By Raymond Whitaker and Andrew Buncombe 29 February 2004 The United Nations has stepped up anti-bugging measures at its New York headquarters in the wake of a claim by Clare Short, the former Cabinet minister, that she had seen a transcript of a private telephone conversation by Kofi Annan, the UN Secretary General. A UN spokesman, Farhan Haq, told The Independent on Sunday: "The UN routinely takes technical measures to guard against invasions of its privacy." He said such measures would be increased after Ms Short's comments in an interview last Thursday on the BBC's Today programme. Amid the storm caused by the former International Development Secretary's comments, Boutros Boutros Ghali, the former UN Secretary-General, as well as Hans Blix, the former UN chief weapons inspector, and one of his predecessors, have said they believed they were spied on. Dr Blix said he suspected that his UN office and his home in New York were bugged by the US during the run-up to war in Iraq, when he was in dispute with the British Government and the Bush administration over his demands for more time to complete his search for weapons of mass destruction in Iraq. Dr Blix, who gave lectures in Edinburgh and Cambridge last week ahead of the publication of his book, Disarming Iraq: the Search for Weapons of Mass Destruction, is promising "some big revelations". The actions of Tony Blair and George Bush in the period leading up to the war would be closely scrutinised. Asked by the IoS if he was more critical of the Prime Minister or President Bush, Dr Blix replied that he "had something to say about everyone concerned". In an interview with The Guardian, which is serialising the book, the former chief inspector said a UN counter-surveillance team had swept his home and office for bugs. But his fear of surveillance was reinforced when John Wolf, a senior member of the US administration, showed him a set of photographs that he said could only have been obtained from the UN weapons office. "I asked him how he got them and he would not tell me, and I said I resented that," Dr Blix said. He added that he had expected to be spied on by the Iraqis, but found it "disgusting" that he was treated the same way by his own side. Another former chief weapons inspector, Richard Butler, said he would go to New York's Central Park for confidential conversations with his contacts, because it was "plainly silly" to think such a conversation could be held in his office without it being monitored. Dr Blix said he, too, would go to the restaurant at the UN building or "out into the streets" for sensitive discussions. Ms Short's allegation gave rise to speculation that Britain had planted a listening device in the UN Secretary General's office, but intelligence experts believe it is far more likely that if his calls were monitored, it would be part of the traffic intercepted electronically by the National Security Agency in the US and GCHQ in Cheltenham. There have also been suggestions that what the former minister might have seen was a copy of notes routinely made of Mr Annan's telephone calls by a UN employee made for the organisation's own records. Additional reporting by Bryan Coll ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8313 From: Date: Mon Mar 1, 2004 3:44pm Subject: Michigan official faces charges for spycam in Civic Center Holland official faces charges for spycam in Civic Center Tuesday, February 24, 2004 By Shandra Martinez and John Tunison The Grand Rapids Press HOLLAND -- Holland's top recreation administrator is accused of using a hidden video camera in a private changing room to spy on teenage girls and women at the Holland Civic Center. Curt Wright, director of the city's Leisure and Cultural Services, allegedly used the device to secretly watch his victims change clothing, and may have been doing it for four years or longer, a source close to the investigation said. Wright, 57, was charged Monday with three felony eavesdropping counts. Holland City Manager Soren Wolff this morning announced the details of a two-week city investigation and said Wright was fired Friday. "As far as we know, there were 12 victims," Wolff said. "I'm just happy there isn't any more than those 12." The 12, all young women, have been contacted by police, and city officials have offered to meet with them and their parents. At least five were Hope College students, while other were summer city employees and acquaintances of Wright's family, records show. At least one was as young as 15. "I place all the blame on him, but part of me wonders how could he get away with it for so long," said one of the women, a high school senior. Wright has been a city department head for 15 years, overseeing the parks system and Civic Center operations. His salary was about $70,000. The discovery has angered the alleged victims and their parents, and rocked City Council members and city employees. "It makes me sick to my stomach," Councilwoman Linda Falstad said. "It's an unbelievable situation," said longtime councilman Bob VandeVusse. "I feel terrible for the victims. I feel terrible for his wife and children. I feel terrible for Curt. He is going to pay an awful price for very poor judgment and decisions he has made." The father of one alleged victim said he feels only anger. "As a father, if I meet this man, he is in trouble," he said. Wright was arraigned Monday in Holland District Court on three counts of eavesdropping, a felony carrying up to two years in prison and a $2,000 fine. "I can't comment," Wright said after the hearing. He then met with his lawyer, Brad Johnson, before leaving through a back door. According to court papers, Wright is charged for offenses on Sept. 13, 2000; May 24, 2001; and Sept. 23, 2003. District Judge Susan Jonas set a $5,000 personal recognizance bond for each count. Wright's bond allows him to travel to Indiana to visit relatives. "I think it would be good to get away," he told Jonas. City Manager Soren Wolff said he confronted Wright two weeks ago about a complaint. He and police declined to comment in detail on the case. The investigation began after a college student became suspicious about the photo shoots and talked to city staffers, one of the victims said police told her. Wolff put Wright on paid leave the same day, Feb. 10, and asked Holland Police Chief John Kruithoff to investigate. A clock radio with a hidden video camera was found in a dressing room inside the Civic Center. Alleged victims were photographed there after Wright reportedly asked them to participate in a marketing campaign. The campaign was supposed to generate money to renovate the aging Civic Center, victims said, adding police have told them there was no campaign. "The whole story about using this as a marketing campaign just didn't add up," Wolff said. The alleged ploy came to light Feb. 10 after one of the girls who was asked to participate in the fictitious campaign declined, became suspicious and filed a complaint against Wright with the city personnel department. The young women brought their own wardrobe that included formal wear and bathing suits. They then changed in the dressing room. Police said they discovered the hidden video camera Feb. 16, after they began investigating at the request of Wolff. "During the time the girls were asked to change their clothes, he would go into the office and observe that," the police chief said. No video recordings were found, he said. Police seized three computers, including two from his home and one from his Civic Center office, which state police are analyzing. The photos for the purported publicity campaign, which Wright took with a digital camera, were found stored on disks. The woman were clothed in those pictures. "I just felt really violated. I was really shocked because it was a city official," said one of his alleged victims. The high school senior, who did a photo shoot with Wright for the past two summers, believes Wright saw her nude. She said detectives have told her they can't find images of her in Wright's possession, but that Wright confessed she was one of his victims. She also is listed in court documents as a victim. According to the teen, who asked that her name not be used, Wright would return to his office while she changed clothes. "He would come back and be all flustered and really weird and all gross," said the teen, who was 15 and 16 when the alleged incidents occurred. She remembers feeling uncomfortable by Wright's comments like "you should wear a thong" and suggestions that she remove her bra so it didn't show beneath her strapless gown. The teen said that her sister, a friend of Wright's daughter, also had her picture taken by him six years ago. "I don't know if she was the first one," she said. Mayor Pro-Tem Craig Rich praised the city manager for responding quickly to the complaint. "From what I know, he handled (the investigation) extremely well. He went with his gut and was right," Rich said. The city manager and City Council members described Wright as competent and easy to work with. "He did a lot of good things for the city of Holland and particularly for our parks department. He was instrumental in seeing a lot of grants to pay for park improvements," VandeVusse said. "Strictly from a professional perspective of managing a department, he did a very good job." [Non-text portions of this message have been removed] 8314 From: David Alexander Date: Tue Mar 2, 2004 7:34am Subject: another BBC 'report' more hype and half-truths on tscm from the BBC: http://news.bbc.co.uk/1/hi/magazine/3522137.stm David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 8315 From: Date: Tue Mar 2, 2004 3:37am Subject: Nebraska Wiretap experts meet behind closed doors - Petersen Case Wiretap experts meet behind closed doors By Michelle Durand, Daily Journal Staff Arguments in the Scott Peterson double-murder trial moved behind closed doors again yesterday as attorneys continue to debate what evidence will be presented to the jury. Jury selection starts Thursday morning, leaving presiding judge Al Delucchi only days to finalize requests from both sides about what can be used. Still lingering are motions to squash evidence from tracking dogs and more than 3,000 phone calls from or to Peterson following his pregnant wife‚Äôs disappearance. Two wiretap experts from Nebraska were called by Peterson‚Äôs defense team yesterday to refute last week‚Äôs testimony on the calls. Both witnesses were heard in Delucchi‚Äôs chambers instead of open court, leaving the media and court spectators wondering what they said and what calls they are referencing. Most of the earlier arguments of wiretaps two weeks ago were also held behind closed doors as both sides listened to the calls. Defense attorneys not only want every phone call dismissed as evidence but also any other evidence gathered as a result of the taps. At question are a trio of calls between Peterson and his first attorney, Kirk McCallister, that were accidentally listened to by police. Defense attorney Mark Geragos maintains the breach of client-attorney privilege has tainted all the phone calls and that investigators cannot prove that the calls did not directly result in his client‚Äôs arrest. Delucchi is also expected to rule today or tomorrow on dog tracking evidence after listening to three days of testimony last week. Prosecutors want to use the dogs to show Peterson left his Modesto home with his wife‚Äôs body, took it to the Berkeley Marina where he would later claim to be fishing, and weighted her down in the bay. Dog handlers have testified that the animals positively identified Laci Peterson‚Äôs scent in her husband‚Äôs warehouse, his fishing boat and at the end of the pier where he launched the vessel. Geragos is trying to prove that the dogs are unreliable and might have tracked Scott Peterson‚Äôs scent rather than his wife‚Äôs. Peterson reported his 27-year-old wife missing the evening of Christmas Eve 2002. He told police he had been fishing in the marina and returned to an empty home. Her body and that of the couple‚Äôs unborn son washed up on a Richmond shore the following April. Within days, Peterson was arrested. He faces the death penalty if convicted of the two first-degree murders. The wiretaps collected calls on Peterson‚Äôs phone for weeks in January 2003 following his wife‚Äôs disappearance and again in April right before his arrest. The dogs were used to track Laci Peterson nearly immediately after she was reported missing. Handlers admitted that police automatically assumed she was dead and zeroed in on her husband as the suspect. Delucchi is expected to rule on the motions today. Michelle Durand can be reached by e-mail: michelle@s... or by phone: (650) 344-5200 ext. 104. What do you think of this story? Send a letter to the editor: letters@s.... [Non-text portions of this message have been removed] 8316 From: Date: Tue Mar 2, 2004 5:33am Subject: This article has good illustrations if you go to the web site http://news.bbc.co.uk/2/hi/uk_news/magazine/3522137.stm 'This goes no further...' By Brian Wheeler BBC News Online Magazine Following revelations about bugging at the United Nations, is there any way of ensuring that your private conversations stay that way? News that Kofi Annan and other senior UN figures may have been routinely bugged by US or British security services has caused a huge political row around the world. But it will also have caused alarm among other people in the public eye who deal with sensitive information - or anyone, indeed, who values their privacy. If the secretary general of the United Nations cannot prevent his private conversations from being listened to by all and sundry, who can? It seems if someone wants to listen to what you are saying badly enough, there is very little you can do to stop it. "Technological advances, particularly in the fields of power supply and miniaturisation, mean that its now possible to bug almost anywhere and anything," says Charles Shoebridge, a former counter-terrorism intelligence officer. "Similar advances have enormously improved anti-bugging capabilities too, and an enormous effort has gone into making communications secure - particularly those of governments and even large commercial organisations. "However, if security is absolutely critical, it will always pay to assume that a conversation is at least capable of being monitored." Mobile phones According to security experts, the most common listening device remains the electronic bug. But government agencies such as the CIA and MI5 have far more advanced systems at their disposal. Powerful uni-directional microphones can pick up conversations through open windows. If the window is closed, radio waves or a laser beam can be bounced off the glass. The vibrations detected can be translated into speech. But potentially the most powerful tool for the modern spy is the mobile phone. Mobiles that double as listening devices can be bought over the internet. Undetectable But today's spies are also able to convert conventional phones into bugs without the owners' knowledge. Experts believe this is the most likely method used to gather information in the UN building. Mobiles communicate with their base station on a frequency separate from the one used for talking. If you have details of the frequencies and encryption codes being used you can listen in to what is being said in the immediate vicinity of any phone in the network. According to some reports, intelligence services do not even need to obtain permission from the networks to get their hands on the codes. So provided it is switched on, a mobile sitting on the desk of a politician or businessman can act as a powerful, undetectable bug. The technology also exists to convert land line telephones into covert listening devices. Encryption technology According to one security expert, telephone systems are often fitted with "back doors" enabling them to be activated at a later date to pick up sounds even when the receiver is down. Telephone conversations are also routinely intercepted by spy satellites. The potency of key word recognition technology is often overstated, but it is still used to scan millions of conversations a day for potentially juicy information. Encryption devices, which clip on to the base of mobile phones and scramble the voice data being sent from your phone, are available. But those listening in may well be able to crack the codes. Intelligence is constant battle between the bugger and the bugged, says Michael Marks, of surveillance-equipment supplier Spymaster, and "at the moment the buggers probably have the upper hand". Mr Marks' advice to anyone who thinks they may be under surveillance is to ensure their office is swept regularly for bugs, buy an encrypted phone and make sure no one in a meeting has a mobile phone on them. Inside the tent Another way of making sure you are not being bugged is to use a Faraday cage or shielded tent, which prevents radio waves entering or leaving. Mobile phone calls are impossible from inside the tent, but no-one will be able to listen to your conversations using bugs or radio wave listening devices. It will also prevent anyone intercepting radio emissions from computers, preventing them from seeing what you have on screen. "[A Faraday cage] will stop you doing anything other than having a conversation. It is a very crude, but very secure, way of talking," says Michael Marks. A more sophisticated - and expensive - method is to build a "clean room", of the type used by the military, to shield radio waves and electromagnetic signals. Simple steps But the hardest part, according to counter-surveillance consultant William Parsons, is trying to convince diplomats and politicians that there is a threat. "They think you are trying to cramp their style. Talking is what they do. "The fact that someone might be listening doesn't actually come into their mind. It is not something that they actually comprehend." There are a few simple steps anyone can take, Mr Parsons says, to throw would-be eavesdroppers off the scent. Don't hold sensitive conversations in your office or boardroom. Or rather, give anyone listening enough to think they are getting the full picture and then save anything truly top secret for conversations in unusual locations, such as the basement. It is better to use the office phone for secret conversations, Mr Parsons says, rather than a home phone, because with 20 or more lines leaving most buildings they are much harder to bug. The big outdoors Switching on the shower while you talk in the bathroom - a favoured method of celluloid spies - is also unlikely to work, as constant volume noise can easily be filtered out. In fact, the only way to truly guarantee privacy, according to most security experts, is to take a walk in the park. Charles Shoebridge says: "It remains the case today as it has always been, that probably the best way to avoid being eavesdropped is to pass information during a long, unpredictable and unannounced walk in the big outdoors. "Word of mouth is always preferable to any form of electronic communication - assuming the information's recipient is entirely trustworthy, of course." Story from BBC NEWS: http://news.bbc.co.uk/go/pr/fr/-/2/hi/uk_news/magazine/3522137.stm Published: 2004/03/02 11:50:33 GMT © BBC MMIV [Non-text portions of this message have been removed] 8317 From: Steve Uhrig Date: Tue Mar 2, 2004 10:00pm Subject: Do you have a beat up TDR? Hi all, If you have a Riser Bond yellow box TDR which is beat up and would like to clean it up, I have a quantity of brand new empty yellow boxes to fit any R-B yellow box TDR. They have the clear plastic shelf inside the lid to hold the manual and a cable, and are drilled to accept the mounting screws going into the bottom of the TDR. I service these TDRs and purchased too many new cases from R-B. I need to clean them out to make room. Price is $100 + ship. I can take credit cards and ship anywhere in the world. I also have some R-B 1270s, a 1205T-OSP and a 3300 (not a yellow box) TDRs if anyone needs one. Contact me off list for details. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8318 From: contranl Date: Wed Mar 3, 2004 7:45am Subject: Wanted used handheld spectrumanalyzer . I am looking for a used/second hand...handheld spectrum analyzer Handheld Minimal up to 3 Ghz Digital Demodulator/Audio Something like these: Rhode & Schwarz FSH-3 Anritsu MS2711 B Willtek 9101 Protek 3201 Use: measurements on radio-equipment and countersurveillance Any frequency extenders to go with the above are also welcome. Please reply to: info@t... Thanks Tetrascanner Amsterdam The Netherlands . 8319 From: James M. Atkinson Date: Wed Mar 3, 2004 7:49pm Subject: Robin Williams for President 2004 Robin Williams for President 2004. Leave it to Robin Williams to come up with the perfect plan... what we need now is for our UN Ambassador to stand up and repeat this message. Robin Williams' plan...(Hard to argue with this logic!) I see a lot of people yelling for peace but I have not heard of a plan for peace. So, here's one plan: 1. The US will apologize to the world for our "interference" in their affairs, past & present. You know, Hitler, Mussolini, Tojo, Noriega, Milosovich and the rest of those 'good ole boys.' We will never "interfere" again. 2. We will withdraw our troops from all over the world, starting with Germany, South Korea and the Philippines. They don't want us there. We would station troops at our borders. No one sneaking through holes in the fence. 3. All illegal aliens have 90 days to get their affairs together and leave. We'll give them a free trip home. After 90 days the remainder will be gathered up and deported immediately, regardless of who or where they are. France would welcome them. 4. All future visitors will be thoroughly checked and limited to 90 days unless given a special permit. No one from a terrorist nation would be allowed in. If you don't like it there, change it yourself and don't hide here. Asylum would never be available to anyone. We don't need any more cab drivers or 7-11 cashiers. 5. No "students" over age 21. The older ones are the bombers. If they don't attend classes, they get a "D" and it's back home baby. 6. The US will make a strong effort to become self-sufficient energy wise. This will include developing non-polluting sources of energy but will require a temporary drilling of oil in the Alaskan wilderness. The caribou will have to cope for a while. 7. Offer Saudi Arabia and other oil producing countries $10 a barrel for their oil. If they don't like it, we go some place else. They can go somewhere else to sell their production. (About a week of the wells filling up the storage sites would be enough.) 8. If there is a famine or other natural catastrophe in the world, we will not interfere." They can pray to Allah or whomever, for seeds, rain, cement or whatever they need. Besides most of what we give them is stolen or given to the army. The people who need it most get very little, if anything. 9. Ship the UN Headquarters to an isolated island some place. We don't need the spies and fair weather friends here. Besides, the building would make a good homeless shelter or lockup for illegal aliens. 10. All Americans must go to charm and beauty school. That way, no one can call us "Ugly Americans" any longer. There Now, ain't that a winner of a plan. "The Statue of Liberty is no longer saying 'Give me your poor, your tired, your huddled masses.' She's got a baseball bat and she's yelling, 'You want a piece of me?'" If you agree with the above forward it to friends. the Language we speak is ENGLISH.....learn it...or LEAVE ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 8320 From: Date: Thu Mar 4, 2004 3:18am Subject: How Tiny Swiss Cellphone Chips Helped Track Global Terror Web March 4, 2004 New York Times How Tiny Swiss Cellphone Chips Helped Track Global Terror Web By DON VAN NATTA Jr. and DESMOND BUTLER ONDON, March 2 ‚Äî The terrorism investigation code-named Mont Blanc began almost by accident in April 2002, when authorities intercepted a cellphone call that lasted less than a minute and involved not a single word of conversation. Investigators, suspicious that the call was a signal between terrorists, followed the trail first to one terror suspect, then to others, and eventually to terror cells on three continents. What tied them together was a computer chip smaller than a fingernail. But before the investigation wound down in recent weeks, its global net caught dozens of suspected Qaeda members and disrupted at least three planned attacks in Saudi Arabia and Indonesia, according to counterterrorism and intelligence officials in Europe and the United States. The investigation helped narrow the search for one of the most wanted men in the world, Khalid Shaikh Mohammed, who is accused of being the mastermind of the Sept. 11 attacks, according to three intelligence officials based in Europe. American authorities arrested Mr. Mohammed in Pakistan last March. For two years, investigators now say, they were able to track the conversations and movements of several Qaeda leaders and dozens of operatives after determining that the suspects favored a particular brand of cellphone chip. The chips carry prepaid minutes and allow phone use around the world. Investigators said they believed that the chips, made by Swisscom of Switzerland, were popular with terrorists because they could buy the chips without giving their names. "They thought these phones protected their anonymity, but they didn't," said a senior intelligence official based in Europe. Even without personal information, the authorities were able to conduct routine monitoring of phone conversations. A half dozen senior officials in the United States and Europe agreed to talk in detail about the previously undisclosed investigation because, they said, it was completed. They also said they had strong indications that terror suspects, alert to the phones' vulnerability, had largely abandoned them for important communications and instead were using e-mail, Internet phone calls and hand-delivered messages. "This was one of the most effective tools we had to locate Al Qaeda," said a senior counterterrorism official in Europe. "The perception of anonymity may have lulled them into a false sense of security. We now believe that Al Qaeda has figured out that we were monitoring them through these phones." The officials called the operation one of the most successful investigations since Sept. 11, 2001, and an example of unusual cooperation between agencies in different countries. Led by the Swiss, the investigation involved agents from more than a dozen countries, including the United States, Pakistan, Saudi Arabia, Germany, Britain and Italy. Cellphones have played a major role in the constant jousting between terrorists and intelligence agencies. In their requests for more investigative powers, Attorney General John Ashcroft and other officials have repeatedly cited the importance of monitoring portable phones. Each success by investigators seems to drive terrorists either to more advanced ‚Äî or to more primitive ‚Äî communications. During the American bombing of Tora Bora in Afghanistan in December 2001, American authorities reported hearing Osama bin Laden speaking to his associates on a satellite phone. Since then, Mr. bin Laden has communicated with handwritten messages delivered by trusted couriers, officials said. In 2002 the German authorities broke up a cell after monitoring calls by Abu Musab al-Zarqawi, who has been linked by some top American officials to Al Qaeda, in which he could be heard ordering attacks on Jewish targets in Germany. Since then, investigators say, Mr. Zarqawi has been more cautious. "If you beat terrorists over the head enough, they learn," said Col. Nick Pratt, a counterterrorism expert and professor at the George C. Marshall European Center for Security Studies in Garmisch-Partenkirchen, Germany. "They are smart." Officials say that on the rare occasion when operatives still use mobile phones, they keep the calls brief and use code words. "They know we are on to them and they keep evolving and using new methods, and we keep finding ways to make life miserable for them," said a senior Saudi official. "In many ways, it's like a cat-and-mouse game." Some Qaeda lieutenants used cellphones only to arrange a conversation on a more secure telephone. It was one such brief cellphone call that set off the Mont Blanc investigation. The call was placed on April 11, 2002, by Christian Ganczarski, a 36-year-old Polish-born German Muslim whom the German authorities suspected was a member of Al Qaeda. From Germany, Mr. Ganczarski called Khalid Shaikh Mohammed, said to be Al Qaeda's military commander, who was running operations at the time from a safe house in Karachi, Pakistan, according to two officials involved in the investigation. The two men did not speak during the call, counterterrorism officials said. Instead, the call was intended to alert Mr. Mohammed of a Qaeda suicide bombing mission at a synagogue in Tunisia, which took place that day, according to two senior officials. The attack killed 21 people, mostly German tourists. Through electronic surveillance, the German authorities traced the call to Mr. Mohammed's Swisscom cellphone, but at first they did not know it belonged to him. Two weeks after the Tunisian bombing, the German police searched Mr. Ganczarski's house and found a log of his many numbers, including one in Pakistan that was eventually traced to Mr. Mohammed. The German police had been monitoring Mr. Ganczarski because he had been seen in the company of militants at a mosque in Duisburg, and last June the French police arrested him in Paris. Mr. Mohammed's cellphone number, and many others, were given to the Swiss authorities for further investigation. By checking Swisscom's records, Swiss officials discovered that many other Qaeda suspects used the Swisscom chips, known as Subscriber Identity Module cards, which allow phones to connect to cellular networks. For months the Swiss, working closely with counterparts in the United States and Pakistan, used this information in an effort to track Mr. Mohammed's movements inside Pakistan. By monitoring the cellphone traffic, they were able to get a fix on Mr. Mohammed, but the investigators did not know his specific location, officials said. Once Swiss agents had established that Mr. Mohammed was in Karachi, the American and Pakistani security services took over the hunt with the aid of technology at the United States National Security Agency, said two senior European intelligence officials. But it took months for them to actually find Mr. Mohammed "because he wasn't always using that phone," an official said. "He had many, many other phones." Mr. Mohammed was a victim of his own sloppiness, said a senior European intelligence official. He was meticulous about changing cellphones, but apparently he kept using the same SIM card. In the end, the authorities were led directly to Mr. Mohammed by a C.I.A. spy, the director of central intelligence, George J. Tenet, said in a speech last month. A senior American intelligence official said this week that the capture of Mr. Mohammed "was entirely the result of excellent human operations." When Swiss and other European officials heard that American agents had captured Mr. Mohammed last March, "we opened a big bottle of Champagne," a senior intelligence official said. Among Mr. Mohammed's belongings, the authorities seized computers, cellphones and a personal phone book that contained hundreds of numbers. Tracing those numbers led investigators to as many as 6,000 phone numbers, which amounted to a virtual road map of Al Qaeda's operations, officials said. The authorities noticed that many of Mr. Mohammed's communications were with operatives in Indonesia and Saudi Arabia. Last April, using the phone numbers, officials in Jakarta broke up a terror cell connected to Mr. Mohammed, officials said. After the suicide bombings of three housing compounds in Riyadh, Saudi Arabia, on May 12, the Saudi authorities used the phone numbers to track down two "live sleeper cells." Some members were killed in shootouts with the authorities; others were arrested. Meanwhile, the Swiss had used Mr. Mohammed's phone list to begin monitoring the communications and activities of nearly two dozen of his associates. "Huge resources were devoted to this," a senior official said. "Many countries were constantly doing surveillance, monitoring the chatter." Investigators were particularly alarmed by one call they overheard last June. The message: "The big guy is coming. He will be here soon." An official familiar with the calls said, "We did not know who he was, but there was a lot of chatter." Whoever "the big guy" was, the authorities had his number. A Swisscom chip was in the phone. "Then we waited and waited, and we were increasingly anxious and worried because we didn't know who it was or what he had intended to do," an official said. But in July, the man believed to be "the big guy," Abdullah Oweis, who was born in Saudi Arabia, was arrested in Qatar. "He is one of those people able to move within Western societies and to help the mujahedeen, who have lesser experience," an official said. "He was at the very center of the Al Qaeda hierarchy. He was a major facilitator." In January, the operation led to the arrests of eight people accused of being members of a Qaeda logistical cell in Switzerland. Some are suspected of helping with the suicide bombings of the housing compounds in Riyadh, which killed 35 people, including 8 Americans. Later, European authorities discovered that Mr. Mohammed had contacted a company in Geneva that sells Swisscom phone cards. Investigators said he ordered the cards in bulk. The Mont Blanc inquiry has wound down, although investigators are still monitoring the communications of a few people. Christian Neuhaus, a spokesman for Swisscom, confirmed that the company had cooperated with the inquiry, but declined to comment. Last year, Switzerland's legislature passed a law making it illegal to purchase cellphone chips without providing personal information, following testimony from a Swiss federal prosecutor, Claude Nicati, that the Swisscom cards had become popular with Qaeda operatives. The law goes into effect on July 1. One senior official said the authorities were grateful that Qaeda members were so loyal to Swisscom. Another official agreed: "They'd switch phones but use the same cards. The people were stupid enough to use the same cards all of the time. It was a very good thing for us." [Non-text portions of this message have been removed] 8321 From: Date: Wed Mar 3, 2004 8:55pm Subject: Re: Robin Williams for President 2004 Hi James I am great fan of Robin he speaks a lot of truth and our government in the UK could learn a lot from it. But before you completley isolate yourselves remember that you have friends in the world and not just fair weather kind ie the UK. Strangely though even these friends are treated with disdain by the US immigration service on entry Firstly we need to obtain a special visa here in the UK to visit the US for more than one month. [US citizens visiting here do not need a visa] on arrival we are often interrogated almost like criminals and the manners of the Immigration personnel are appalling. Once into the USA though I found the people more friendly and hospitable than any I have met anywhere in the world [I am very widely travelled]. Regards Dave DEMTEC David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Countermeasures Specialist Electrical Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695 558544 07866206112 demtec@a... www.demtec.co.uk The manufacture and installation of custom made covert electronic audio and video devices. Audio Tape and Video Sound track cleanup and enhancement. Professional physical and electronic countermeasures [sweep] services. note: any fellow Private Investigator e-mail groups member welcome to call in or phone to discuss applications, projects or just seeking advice. Workshop located alongside the M58 junction 3 [Non-text portions of this message have been removed] 8322 From: Intercept Investigations Date: Thu Mar 4, 2004 3:49pm Subject: From ? to 5.8 + GHz TSCM Equipment Does anyone have any recommendations for any 'basic' (I translate this to infer 'simple and relatively inexpensive') sweep gear that can cover up to at least the 5.8 GHz range. I have a client who is specifically requesting this equipment for ongoing self-protection. Thank you, -- Steven W. Gudin, Director Intercept Investigations 700 NW Gilman Boulevard #463 Issaquah (Seattle), WA 98027 Tel: (425) 313-1776 Fax: (425) 313-1875 Web: www.InterceptInvestigations.com Email: mail@I... Washington License # 1661 Nevada License # 847 NATIONWIDE & INTERNATIONAL INVESTIGATION SERVICES This communication is intended for the sole use of the individual or entity to whom it is addressed and may contain information that is privileged, confidential and exempt from disclosure under applicable law. If the reader of this communication is not the intended recipient or the employee or agent for delivering the communication to the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication may be strictly prohibited. If you receive this email in error, please notify us immediately and delete this message from your computer. Nothing contained within this email message is intended, nor should it be interpreted as, legal advice or counsel. 8323 From: Boris Kokov Date: Thu Mar 4, 2004 4:07pm Subject: RE: Digest Number 1507 Greetings, I'm looking for a Spectrum Analyzer that will run on a laptop if such a thing exists. I would assume a serial or USB connected antennae. Also, I have several of Marty Kaisers black boxes that I'd like to sell. Whats the best avenue for selling those? Best prices, etc. Thanks. _________________________________________________________________ Get a FREE online computer virus scan from McAfee when you click here. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963 8324 From: Date: Thu Mar 4, 2004 1:51pm Subject: Al-Qa'ida suspects captured after phone chips left electronic trail Al-Qa'ida suspects captured after phone chips left electronic trail By Andrew Buncombe in Washington 05 March 2004 Anti-terrorism officials have captured dozens of al-Qa'ida suspects and were able to narrow the hunt for one of the world's most wanted men because of the suspects' use of a specific mobile phone chip, it was revealed yesterday. Operation Mont Blanc, launched in 2002, tracked down the suspects by following an electronic trail left by the Swiss-made chips. Among the alleged al-Qa'ida members whose whereabouts was narrowed by following that trail was Khalid Sheikh Mohammed, the man often described as the network's operations director. "They thought these phones protected their anonymity, but they didn't," a senior European-based intelligence official told The New York Times. "This was one of the most effective tools we had to locate al-Qa'ida. The perception of anonymity may have lulled them into a false sense of security. "We now believe al-Qa'ida has figured out that we were monitoring them through these phones." It had long been suspected that members of the terrorism network were using mobile phones to communicate with each other, regularly changing the phones and the numbers they were using. But the investigation led by Swiss officials focused on the discovery that the operatives preferred a specific type of chip that carried pre-paid minutes and could be used around the world. The chips, made by Swisscom, were popular with the alleged terrorists because they could buy them without providing personal information. The investigation gathered momentum after 11 April 2002, when investigators traced a call placed by Christian Ganczarski, a 36-year-old Polish-born German Muslim who the authorities suspected was a member of al-Qa'ida. From Germany, Mr Ganczarski called Mr Mohammed, who was at the time in a safe house in Karachi. Officials said that the two men did not talk during the call but that it was instead intended to alert Mr Mohammed that a suicide bombing mission against a synagogue in Tunisia was under way. A total of 21 people, most of them German tourists, were killed in the blast. Using electronic surveillance, German authorities traced the call to Mr Mohammed's Swisscom mobile phone, even though they did not know it belonged to him. German police later searched Mr Ganczarski's house and found a log of his many numbers, including one in Pakistan that was eventually traced to Mr Mohammed. Once it was revealed he was in Karachi, the authorities turned to the National Security Agency - America's electronic eavesdropping facility - to help pinpoint him. Mr Mohammed, said to have planned the terrorist attacks of 11 September 2001, was captured in March 2003. Among his belongings was a personal phone book that contained hundreds of numbers. Tracing those numbers led investigators to as many as 6,000 phone numbers, investigators said. Authorities say that terrorists have now stopped using the chips. It is believed that communications are instead being carried out using internet phones, e-mail or personal messengers. "They know we are on to them and they keep evolving and using new methods, and we keep finding ways to make life miserable for them," said a senior Saudi official. "In many ways, it's like a cat-and-mouse game." They claim, however, that operation Mont Blanc disrupted at least three planned attacks in Saudi Arabia and Indonesia. Last January, authorities arrested eight people accused of being members of a Swiss-based al-Qa'ida logistical cell. Some of them are suspected of being involved in attacks last year on a housing compound in Riyadh, which killed 35 people. A spokesman for Swisscom confirmed that the company had co-operated with the inquiry but declined to comment further. Last year, the Swiss authorities passed a new law making it illegal to buy mobile phone chips without providing personal information. * Yemen has captured an Egyptian militant with suspected links to al-Qa'ida, the second arrest of a senior militant in the south of the country this week. He is believed to be Imam al-Sherif, founder of the Jihad group. [Non-text portions of this message have been removed] 8325 From: Steve Uhrig Date: Thu Mar 4, 2004 7:10pm Subject: Re: From ? to 5.8 + GHz TSCM Equipment On 4 Mar 2004 at 13:49, Intercept Investigations wrote: > Does anyone have any recommendations for any 'basic' (I translate this > to infer 'simple and relatively inexpensive') sweep gear that can > cover up to at least the 5.8 GHz range. I have a client who is > specifically requesting this equipment for ongoing self-protection. You would be doing this client a disservice selling him equipment. The equipment is worse than useless without proper training. I virtually can promise the client will encounter many false positives and almost certainly would miss any genuine hostile transmitter. It's a challenge for those properly equipped, trained and experienced. If the client had proper training, he wouldn't need to ask what to buy. Nothing for the range you mention which works is inexpensive. You're in the 4 figures to start. If the client is serious, he needs to contract a countermeasures person to perform the work. If he's not serious then why bother anyway? Might be kindest just to educate the client as to the realities of life and send him on his way. There's really nothing ethical you can do for him other than coordinate a competent TSCM person for him, from what you described. That said, I have precisely what you are requesting for sale in the form of an Avcom spectrum analyzer with frequency extenders to 6 gigs, but I'm trying real hard to dissuade you from pursuing it. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: George Shaw Date: Fri Mar 1, 2002 0:37pm Subject: Chat Greetings from Belfast NI. Would love to attend the seminar but flights though cheaper are still probative from Belfast to USA:( The on-line chat facility could be used for a Friday night chat and virtual teach in. In fact if Net meeting was used a virtual course in most things could be held??? -- George Shaw eMail: george.shaw@b... eMail: george.shaw@u... Home:+44 (0) 28 9062 8924 Mobile: +44 (0) 77 4036 1163 ICQ#: 1741675 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.323 / Virus Database: 180 - Release Date: 08/02/02 4924 From: Rick Hofmann - MICROSEARCH Date: Fri Mar 1, 2002 9:32pm Subject: Re: Interesting article Steve P and Group, Thanks for posting this message. It was not picked up locally so I found out about it via this list. Since I am very close to Whittier I contacted the Private Investigator, Thomas Barnes, offering to help identify the device. I contacted him early this morning, and have not received a reply as of this evening. I also contacted the College spokesperson, Caye Brundage, with the same offer. Ms. Brundage is not sure who has custody of the device, but believes it is being held by the campus security officers. Ms. Brundage took my name and number and said she would pass it along to the powers that be. I was able to find out the following: 1.The device was not transmitting a signal. 2.It was installed behind a light switch that controlled a light table in the school newspaper office. 3.The "sweep" mentioned in the article consisted of a light physical search. 4.Ms. Brundage was unaware of any scanner being used during the "sweep". If I am able to check out the device I will post all the details as soon as possible. At 12:56 PM 02/28/2002 -0500, you wrote: > Found this today...thought the group my find it interesting: > >SteveP > >Students discover "bug" in Whittier College newspaper office >Listening device could have been planted several years ago, says private >investigator > >© 2002 Student Press Law Center > >February 27, 2002 > >CALIFORNIA - Student newspaper staff members at Whittier College uncovered >what may turn out to be the story of the year ... in their very own office. > >A routine maintenance service call last week turned up an electronic >surveillance device imbedded in the office walls of the Quaker Campus. It >is not known how long the bug, which was not functioning when pulled from >the wall, was hidden. The device was capable of transmitting a radio >signal to any receiver, tuned to the correct frequency, within a >three-mile radius, editor Amy Stice said. > >The discovery prompted a shared sense of disbelief and concern among the >newspaper staff and the university's administration. As this article was >posted, it was not clear which university offices, if any, were >investigating the matter. Whittier Police Department officials contacted >by the SPLC could not find a report of the incident in their database. > >The episode began last Thursday when a maintenance worker, in the >newspaper office to fix a broken light table, found a problem with the >electrical socket. Upon taking it apart, he discovered a two-inch >surveillance device soldered to the back of the socket, Stice said. > >The paper alerted campus security and on Monday an electrician checked all >of the other sockets in the office. No more bugs were found, but campus >security called the Whittier Police Department later that day. Stice said >the officers, however, were reluctant to take action. > >"The Whittier Police Department came in, apparently looked at the bug and >said, 'Well there's nothing we can do about it; yeah there's a bug but we >don't have any evidence for this,' " Stice said. The officers said they >did not want to file a report, she added, and that such a measure would >necessitate taking custody of the device, which would probably be thrown >away at a later time. > >The paper decided to keep possession of the bug. Student government >president Jess Craven, whose office is located in the same building as the >publications room, was worried that more bugs might be hidden in the walls >so he contacted a local private investigator, Thomas Barnes. > >Barnes, a retired police detective and former military officer, decided to >help the staff pro bono, "because they didn't have any money," he said. > >Barnes loaned the newspaper a scanner to check the office for additional >surveillance tools and he urged former Whittier mayor and current >councilman Bob Alexander to "light a fire under" the local police. > >"Most municipal police departments aren't really on the learning curve >when it comes to bugs, electronic surveillance, computer crime," Barnes >said. "You're lucky, [for] the older policemen, if they can even run a >computer. And if they can't even write their own reports or run a >computer, then they're surely not going to be able to understand the >implications of a bug." > >"It's pretty serious when you start hard-wiring in because it means you >have to have the opportunity to do it," he continued. "This is not for a >short-term problem, it's (for) somebody that wants to monitor somebody for >a long period of time." > >The school seems to share his concern. > >"Student journalism and the free exchange of ideas is something that the >institution has supported since its inception," university spokesperson >Caye Brundage said. "So we're very concerned about anything that would >inhibit the ability of our students to exchange ideas freely or that would >create an atmosphere where they felt they were being inhibited." > >Barnes said he considers the school's administration a suspect in the >surveillance. > >"Who would want to monitor [the newspaper] on a long-term basis?" Barnes >asked rhetorically. "You start to come up with a short list of people and >one of the people that usually comes up at the very top of the list is >administration. It's like a murder case; one of the first people you look >at is somebody related to the murder victim." > >Brundage disagreed, "I can't think of why I as an administrator would want >to bug the office," she said. "We are interested in knowing what the >[Quaker Campus] is doing but usually we're pretty aware of what stories >are being [investigated anyway]." > >Barnes and Brundage both said that the bug appeared to have been in the >wall for "a long time." Sweeps of the rest of the building turned up no >additional surveillance devices. > >In California, electronic eavesdropping in situations where there is an >expectation of privacy and individuals are unaware of the surveillance is >a felony, Barnes said. > >Whittier College is the alma mater of former President Richard Nixon, who >was forced to resign from office as a result of the Watergate scandal that >was triggered by the bugging of Democratic National Committee headquarters >in Washington. > > >< Return to Previous Page > > > > > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ Very truly yours, Rick Hofmann, CCO, CPP MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 PI16998 4925 From: taylorhardwood Date: Fri Mar 1, 2002 9:32pm Subject: isa dar3 does anyone know anything about isa's dar3 as compared to I'm currently us cpm700 and need more equipment and would like info from someone who has first hand knowledge thanx in advance dan /taylortscm 4926 From: Steve Uhrig Date: Fri Mar 1, 2002 10:37pm Subject: Re: isa dar3 Once upon a midnight dreary, taylorhardwood pondered, weak and weary: > does anyone know anything about isa's dar3 as compared to I'm > currently us cpm700 and need more equipment and would like info from > someone who has first hand knowledge Hi Dan, They're not really all that comparable units. They each have their place. The DAR-3 is a broadband receiver with demodulator and a microwave downconverter/preamp internal to the unit. The DAR-1 is the same thing without the downconverter and preamp. I have owned several of each unit. I never felt like using the CPM on a real sweep, but I've used the DAR-3 all over the world. The DAR-3 is *much* easier to maintain and much less likely to need maintenance. The internal gelcell is inexpensive and you could change it in the dark. Plop the thing on a shelf with any sort of whip or duck antenna on it, and it will soon be hearing transmissions from planes overhead, analog cell or trunking transmissions near your building, and all sorts of stuff. Even up where I am in the country, the thing isn't quiet long. The demodulator basically is AM, but it hears both wideband and narrowband FM fine, and easily will recover audio from a low powered AM or FM signal generator output at a usable distance. The DAR is a mature, reliable, effective piece of RF sniffing equipment, and for a reasonable price, known to be in working condition, it is a nice product. www.isa-tscm.com The CPM-700 attempts to be a junior Scanlock, and in my opinion doesn't quite make it. It is capable of working almost as well as the advertising would have you believe. It accepts standard AA cells, either alkaline or nicads which is a nice advantage. I don't recall offhand if it will charge them; I think it will and chargers are cheap and usually included with REI (www.research-electronics.com) stuff. The CPM-700 was designed for those who are entertained by lots of chrome, blinking lights, whistles and baubles as is true of all REI equipment. This is an acceptable sales tactic/gimmick, however, and merely shows REI knows their market rather than indicating a low quality piece of equipment. The CPM includes an audio amp, and has various accessories (infrared probe; useless in the real world but don't turn it down if it's included in the package, an acoustic leakage transducer which works, an AC power line subcarrier which works and is nice to have, etc.). You usually see the CPM in a nylon sub-briefcase soft carrying case with Velcro straps to hold the cables, probe antenna, headphones, etc. in place. For the same money, I'd take the CPM. It hears fairly well but not excellent, and in testing the DAR hears significantly better. That does not mean, however, that the CPM is no good. You are waving the handheld antenna around, moving it close to potentially concealed transmitters. The virtues of an exponentially stronger signal due to close proximity (true in both units) makes up for lesser sensitivity. The CPM also, as mentioned, has more bells and whistles. Either unit will work acceptably well *if you do your part* for sniffing an average hostile RF device. The CPM does more. It's smaller. It uses more practical batteries. It has a lot of useful features. It has a lot of features that are nothing more than selling points and will never be used. The DAR is a better design purely for RF, and maintainable, although I have owned perhaps ten CPM-700s and have not had any fail. I have replaced that many gelcell batteries in various DAR units over the years ($17 from Mouser), but that is standard maintenance. A gelcell if not abused should last 5 years. Don't discharge it too deeply, charge it as soon as you can, and don't overcharge it. This advice does *not* hold true for nicads. See the battery articles in the Articles section of my website for battery care and feeding info. There are more CPM-700s on the planet than DARs probably by a factor of 50 or 100 to 1, but that is due to targeted marketing (every spy shop) of REI products. The DAR is real sweep equipment. I know a number of professionals who would not want to be seen using REI gear but willingly use ISA gear. I do not necessarily agree, but there is a largish amount of snake oil perception attached to the REI designs, and I speak as a 30 year manufacturer of the kind of stuff these gadgets and their owners try to find. I didn't understand from your message if you own or are considering buying one or the other pieces. Purely for RF, either will do fine. If you own neither and prices are comparable, the CPM probably is a better deal *but practice for a good while with anything you get*. I would disconnect the phone line from the base part of an analog cordless phone so you don't keep your line busy all night, put the handset in talk or intercom or whatever, have your wife hide it in various places around the house, and practice finding it. When you can find it 100% of the time with either unit, you're ready to start your sweep training. The above paragraphs hold true for any RF TSCM gear. I am willing to bet 99% of OSCOR owners could not find the cordless phone handset test as described above transmitting from within an average size house. An analog cordless phone is a fair approximation of a real bug as far as transmitting power and range. Now time for a commercial message. I have for sale some items: a CPM-700 with acoustic probe used on one occasion, quite a number of assorted Riser Bond TDRs, a nearly new Audiotel Super Broom Nonlinear Junction Detector, some radio direction finding equipment, communications gear, ICOM R100 and R8500 receivers which are NOT cellular blocked, and a good bit more new and used electronics for sale. Check some of it out here: http://www.swssec.com/used.html Not all pieces available are listed. If I ever stay off travel long enough to update the page, I will. Email me if interested in any of the items mentioned. I also buy unneeded equipment, and will consider trades or trades with cash. I take credit cards for payment and ship anywhere in the world. Eleventy-seven guys on this list can give a reference on me. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4927 From: James M. Atkinson Date: Sat Mar 2, 2002 5:03am Subject: Mobster nailed by FBI keystroke logger pleads guilty http://www.idg.net/ic_823868_1794_9-10000.html Mobster nailed by FBI keystroke logger pleads guilty George A. Chidi Jr., IDG News Service\Boston Bureau March 01, 2002, 12:00 Ending the possibility for a showdown in higher courts between the U.S. Federal Bureau of Investigation (FBI) and privacy advocates, accused loan shark Nicodemo S. Scarfo Jr. pleaded guilty in a New Jersey federal court on Thursday to a charge of illegal gambling. Federal prosecutors charged Scarfo with racketeering, illegal gambling and loan sharking in 2000, and described him as being a member of the Mafia. The case took on broader significance when the government introduced evidence gained from secretly installing a keystroke-logging tool on Scarfo's computer in order to crack the PGP (Pretty Good Privacy) encryption on one of his files. Defense attorneys tried to suppress the evidence as unconstitutional, and requested details about the workings of the keystroke-logging tool in order to prove that it violated the U.S. Constitution's Fourth Amendment protection against unreasonable search and seizure. But prosecutors kept specific details about the logger secret by successfully invoking the Classified Information Protection Act, asserting that the government has a compelling national security interest in keeping the technical details of the system from public view. U.S. District Court Judge Nicholas H. Politan rejected the defense's requests to suppress the keystroke evidence in December shortly before retiring and handing the case off to U.S. District Judge Joel Pisano, who heard Scarfo's plea on Thursday. With the guilty plea, privacy advocates will have to wait for another case in order to get a higher court to hear the constitutional challenge to the government's use of the technology, said David Sobel, general counsel to the Electronic Privacy Information Center watchdog group in Washington, D.C. "From a legal perspective, (the issues) continue to be resolved at levels about the District Court of New Jersey," Sobel said. Without being heard at a higher appellate court, the case sets no precedent beyond the New Jersey courtroom. And without more rulings from judges about the use of new surveillance technology in this or other jurisdictions, it may take a long time for a case to reach the U.S. Supreme Court. "We know that Carnivore (the FBI's controversial e-mail surveillance tool) has been in use for two years now, and there hasn't been a case where evidence gathered with it has been used in court." The FBI, in Washington, D.C., can be reached at http://www.fbi.gov/. Court documentation regarding the Scarfo case is available at http://lawlibrary.rutgers.edu/fed/html/scarfo2.html-1.html and http://www.epic.org/. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "It is not the critic who counts, not the man who points out how the strong man stumbled, or where the doer of deeds could have done better. The credit belongs to the man who is actually in the arena; whose face is marred by the dust and sweat and blood; who strives valiantly; who errs and comes short again and again; who knows the great enthusiasms, the great devotions and spends himself in a worthy course; who at the best, knows in the end the triumph of high achievement, and who, at worst, if he fails, at least fails while daring greatly; so that his place shall never be with those cold and timid souls who know neither victory or defeat." - Theodore Roosevelt,1910 -------------------------------------------------------------------------------------------------- 4928 From: Bug Sweeper Date: Sat Mar 2, 2002 0:35pm Subject: FW: Re: Interesting article -----Original Message----- From: Zero Dog [mailto:bigzerodog@e...] Sent: Saturday, March 02, 2002 10:29 AM To: tscm-l@yahoogroups.com Subject: RE: [TSCM-L] Re: Interesting article Folks, I've arranged to inspect the student newspaper office on Sunday. Will post photos of the device and where it was found shortly. From a description given to me over the phone, it sounds like an FM broadcast band kit transmitter modified to run of 110VAC. The device was left with the student newspaper for several days and they took it to some spy shop in the area. There, a 'technician' hooked it up to power and said it wasn't working. The device is now in the custody of the PD as evidence -- hopefully they'll allow a better analysis. - Eric in Los Angeles -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Friday, March 01, 2002 11:42 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Interesting article Once upon a midnight dreary, preflat@p... pondered, weak and weary: > Students discover "bug" in Whittier College newspaper office Carpenter discovers brain tumor in pet goldfish. > Listening device could have been planted several years ago, says private > investigator Device might not have been a device at all, says someone who believes the private investigator most likely either was incompetent or a liar, likely both. > A routine maintenance service call last week turned up an electronic > surveillance device imbedded in the office walls of the Quaker Campus. It > is not known how long the bug, which was not functioning when pulled from > the wall, was hidden. The device was capable of transmitting a radio > signal to any receiver, tuned to the correct frequency, within a > three-mile radius, editor Amy Stice said. I will have to remember to contact College Newspaper Editors should I find a bug in the future somewhere, since the obviously have an extremely high level of working knowledge of communications, field theory, electronic surveillance technology, antennas, and of course such a breadth of pertinent experience so as to be able to recogize a surveillance device at sight. Funny, takes me a lot of math backed up by empirical testing to determine the range of a surveillance transmitter, and 3 miles is almost beyond what I would consider reality. Guess I need to go back to college and sign up for some journalism courses. Funny, those were the ones the engineering students switched to when they flunked out of engineering. Gonna have to hire this gal. > The discovery prompted a shared sense of disbelief and concern among the > newspaper staff and the university's administration. As this article was > posted, it was not clear which university offices, if any, were > investigating the matter. Whittier Police Department officials contacted > by the SPLC could not find a report of the incident in their database. How inconsiderate of the alleged bugger not to have filed a report with the police department detailing his installation. Terrible inconvenience. > The episode began last Thursday when a maintenance worker, in the > newspaper office to fix a broken light table, found a problem with the > electrical socket. Upon taking it apart, he discovered a two-inch > surveillance device soldered to the back of the socket, Stice said. Gonna have to hire that 'maintenance worker'. Fix a leaking radiator, dredge a hairbrush out of an overflowing toilet, find a bug. > The paper alerted campus security and on Monday an electrician checked all > of the other sockets in the office. No more bugs were found, but campus > security called the Whittier Police Department later that day. Stice said > the officers, however, were reluctant to take action. What action could they take other than prosecute the campus morons for destroying the chain of evidence and chain of custody? They should have spanked them, however, for sticking their noses into something they were not qualified to mess with. Oh, I forgot. They were journalists. They are qualified to do anything. > "The Whittier Police Department came in, apparently looked at the bug and > said, 'Well there's nothing we can do about it; yeah there's a bug but we > don't have any evidence for this,' " Stice said. The officers said they > did not want to file a report, she added, and that such a measure would > necessitate taking custody of the device, which would probably be thrown > away at a later time. 'Apparently' looked at the bug. Apparently said 'yeah there's a bug'. They also 'apparently' could have said, 'There's a dimmer, or noise filter.' > The paper decided to keep possession of the bug. Admission of a felony. Except it is unlikely, in my opinion, it was a bug, so probably no violation. > Student government president Jess Craven, whose office is located in > the same building as the publications room, was worried that more bugs > might be hidden in the walls so he contacted a local private > investigator, Thomas Barnes. An appropriate course of action by the uninitiated. > Barnes, a retired police detective and former military officer, > decided to help the staff pro bono, "because they didn't have any > money," he said. Because if he would have taken any money, it would have been under false pretenses, and he may have been at least that smart. > Barnes loaned the newspaper a scanner to check the office for additional > surveillance tools and he urged former Whittier mayor and current > councilman Bob Alexander to "light a fire under" the local police. Former police and military officers loan scanners to journalists to check for bugs. I will sleep better knowing this. > "Most municipal police departments aren't really on the learning curve > when it comes to bugs, electronic surveillance, computer crime," > Barnes said. Neither are former police officers, former military officers or private investigators. > Barnes said he considers the school's administration a suspect in the > surveillance. I would consider Barnes a suspect. > Barnes and Brundage both said that the bug appeared to have been in the > wall for "a long time." Knob and tube electrical wiring was the clue, no doubt. As was the large power supply and bank of 4CX250 power amplifier tubes in the bug. The blue flashing mercury vapor rectifiers were the real giveaway, however. > Sweeps of the rest of the building turned up no additional surveillance > devices. Good thing he loaned them that scanner. > In California, electronic eavesdropping in situations where there is an > expectation of privacy and individuals are unaware of the surveillance is > a felony, Barnes said. If someone is aware of a surveillance, is it still a surveillance? ============ ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4929 From: A Grudko Date: Sat Mar 2, 2002 5:48am Subject: Re: CPM 700 - Original Message - From: Steve Uhrig > The CPM includes an audio amp, and has various accessories > (infrared probe; useless in the real world but don't turn it down if it's > included in the package, an acoustic leakage transducer which works, an > AC power line subcarrier which works and is nice to have, etc A field observation. The CPM IR probe is not shielded and (I think) accidentally becomes a EM field detector - or at least mine does. If an object is oscilating (don't ask me at what f) and you put the CPM IR probe against it - literally in contact - the CPM audibly detects this. Seeing this post I walked round my house with the CPM IR probe and got the following results: Back of TV - loud 'Wooshing' sound TV screen - serious 'raster' Curtains 1 metre away from TV - background white noise Normal phone on hook - slight increase in noise amplitude Off hook - local FM radio station but noisy Phone amp (my dad is hard of hearing) on or off hook - local FM radio station but noisy PC - goes berzerk Fax machine - nothing except raster over the LCD Dictaphone/pocket recorder - on or off, no reaction ! (too LF?) Baseball cap - background white noise Alarm clock (digital) - humms 400 Meg Panasonic cordless phone on hook (RX mode) - obvious signal, about 900 hz demodulated. The result of this pop survey: this equipment will tell you if SOME electronic equipment is operating in your baseball cap - or if someone has placed a TX in your flowerpot....but not a dictaphone. Just a field observation; not an endorsement, recommendation, advertisement, promotion, scientific study or expert opinion. :-) Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time uaside> 4930 From: James M. Atkinson Date: Sat Mar 2, 2002 1:49pm Subject: Re: CPM 700 Yeah, There is a very serious flaw in the design of their IR probe, and about half of the one I've received over the years I have had to repair myself. What happens is the IR diode leads they use is only a mm or so away from a naked copper sleeve which provides a dead short to ground. I have actually had the IR probes come in dead from the factory. Fortunately I inspect equipment before I ship it to clients. The easiest way to fix it is to use a short 5 mm piece of black tubing to insulate the exposed leads which if a little longer then you need also makes the probe more directional. Also, consider getting a small piece of Wratten 25 filter or piece of exposed film and cover the diode so that it is only responding to infrared energy. At 1:48 PM +0200 3/2/02, A Grudko wrote: >- Original Message - >From: Steve Uhrig >> The CPM includes an audio amp, and has various accessories >> (infrared probe; useless in the real world but don't turn it down if it's >> included in the package, an acoustic leakage transducer which works, an >> AC power line subcarrier which works and is nice to have, etc > >A field observation. The CPM IR probe is not shielded and (I think) >accidentally becomes a EM field detector - or at least mine does. If an >object is oscilating (don't ask me at what f) and you put the CPM IR probe >against it - literally in contact - the CPM audibly detects this. > >Seeing this post I walked round my house with the CPM IR probe and got the >following results: > >Back of TV - loud 'Wooshing' sound Likely VLF from the CRT yoke. >TV screen - serious 'raster' Yep, at 15 kHz... but was the unit responding to the light... or to stray VLF? > >Curtains 1 metre away from TV - background white noise As we would expect >Normal phone on hook - slight increase in noise amplitude Does the phone have any lights on it? >Off hook - local FM radio station but noisy >Phone amp (my dad is hard of hearing) on or off hook - local FM radio >station but noisy > >PC - goes berzerk I would hope so... Pray, you you have a HP computer or printer with an IRDA port? > >Fax machine - nothing except raster over the LCD IR off the LCD >Dictaphone/pocket recorder - on or off, no reaction ! (too LF?) No IR energy >Baseball cap - background white noise As expected >Alarm clock (digital) - humms What was it humming? > >400 Meg Panasonic cordless phone on hook (RX mode) - obvious signal, about >900 hz demodulated. > >The result of this pop survey: this equipment will tell you if SOME >electronic equipment is operating in your baseball cap - or if someone has >placed a TX in your flowerpot....but not a dictaphone. > >Just a field observation; not an endorsement, recommendation, advertisement, >promotion, scientific study or expert opinion. Have you tried using a splitter to run two or more probes at a time with the unit? or, used multiple CPMs each with a different probe? >:-) > >Andy Grudko >D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 >International business intelligence and investigations - ICQ 146498943 >Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 >0255 - 244 0256 (Fax) >SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom >When you need it done right - first time -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "It is not the critic who counts, not the man who points out how the strong man stumbled, or where the doer of deeds could have done better. The credit belongs to the man who is actually in the arena; whose face is marred by the dust and sweat and blood; who strives valiantly; who errs and comes short again and again; who knows the great enthusiasms, the great devotions and spends himself in a worthy course; who at the best, knows in the end the triumph of high achievement, and who, at worst, if he fails, at least fails while daring greatly; so that his place shall never be with those cold and timid souls who know neither victory or defeat." - Theodore Roosevelt,1910 -------------------------------------------------------------------------------------------------- 4931 From: zack <10-33@c...> Date: Sat Mar 2, 2002 8:59am Subject: Cell phone >I would like to enlist the knowlege of this group to confirm or expose a >certain device sold by Pep-Boys and others. Our intelligence Division >recently informed us of a device which is sold at the above stores to >notify the person his cell phone is ringing. Example: Im not making this up. The devices are sold to inform the driver/passenger that his cell phone is ringing by a small flashing light on the device ....... not connected to the cell phone, but hanging as an air freshener. The reason for this is that the " music " is so loud he/she cannot hear the cell phone ring, but sees the flashing light. It has been reported that these devices can ALSO detect certain transmitters used in undercover work. Hence, undercover officer coming up to vehicle/whatever with transmitter, opps, flashing light......blink.....blink......someone is shot. Anyone had any experience????? comments ???? visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." George W Bush President of the United States of America God Bless The USA .. NEVER forget 9-11-01 http://www.copscops.com/blessusa.htm [Non-text portions of this message have been removed] 4932 From: Bug Sweeper Date: Sat Mar 2, 2002 3:22pm Subject: RE: Cell phone Had 'em at HRO for years. I can't make mine flash without at least 500mw out of an HT at 3 or 4 inches. Just a toy. -EL -----Original Message----- From: zack [mailto:10-33@c...] Sent: Saturday, March 02, 2002 6:59 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Cell phone >I would like to enlist the knowlege of this group to confirm or expose a >certain device sold by Pep-Boys and others. Our intelligence Division >recently informed us of a device which is sold at the above stores to >notify the person his cell phone is ringing. Example: Im not making this up. The devices are sold to inform the driver/passenger that his cell phone is ringing by a small flashing light on the device ....... not connected to the cell phone, but hanging as an air freshener. The reason for this is that the " music " is so loud he/she cannot hear the cell phone ring, but sees the flashing light. It has been reported that these devices can ALSO detect certain transmitters used in undercover work. Hence, undercover officer coming up to vehicle/whatever with transmitter, opps, flashing light......blink.....blink......someone is shot. Anyone had any experience????? comments ???? visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." George W Bush President of the United States of America God Bless The USA .. NEVER forget 9-11-01 http://www.copscops.com/blessusa.htm [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4933 From: Charles P Date: Sat Mar 2, 2002 10:31pm Subject: Re: Cell phone You can get external belt clip vibrators for the same function. I had one that would vibrate whenever I used the microwave (oven, that is) or if a walkie talkie or other two way radio was transmitting in the vicinity. charles ----- Original Message ----- From: "zack" <10-33@c...> To: Sent: Saturday, March 02, 2002 9:59 AM Subject: [TSCM-L] Cell phone > > >I would like to enlist the knowlege of this group to confirm or expose a > >certain device sold by Pep-Boys and others. Our intelligence Division > >recently informed us of a device which is sold at the above stores to > >notify the person his cell phone is ringing. > > > Example: Im not making this up. The devices are sold to inform the > driver/passenger that his cell phone is ringing by a small flashing light > on the device ....... not connected to the cell phone, but hanging as an > air freshener. The reason for this is that the " music " is so loud he/she > cannot hear the cell phone ring, but sees the flashing light. > > It has been reported that these devices can ALSO detect certain > transmitters used in undercover work. Hence, undercover officer coming up > to vehicle/whatever with transmitter, opps, flashing > light......blink.....blink......someone is shot. > > Anyone had any experience????? comments ???? > > > visit http://www.copscops.com > Washington DC Police Department http://mpdc.dc.gov/main.shtm > > "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." > George W Bush > President of the United States of America > > God Bless The USA .. NEVER forget 9-11-01 > http://www.copscops.com/blessusa.htm > > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 4934 From: Date: Sat Mar 2, 2002 10:00pm Subject: Cell phone These devices have been around for several years, there is nothing special here. Mobile phones are notorious for generating large amounts of interference which can be used to your advantage. Several years ago I needed to activate a device in the middle of the countryside remotely 20 or 30 times a day. The theory was that I should use a sound activated switch which when the mobile rang would turn on my equipment for 2 minutes. In fact we noticed that the switch operated just before the phone rang so we put it in silent mode and it still worked. The device you are talking about has limited range and aimed at cell phone frequencies Brian [Non-text portions of this message have been removed] 4935 From: A Grudko Date: Sun Mar 3, 2002 3:31pm Subject: Re: CPM 700 + test TXs - Original Message - From: James M. Atkinson Fixes noted - thanx > >TV screen - serious 'raster' > Yep, at 15 kHz... but was the unit responding to the light... or to stray VLF? The light - if I optically blank it the raster goes and we are back to slightly elevated white noise. > >Normal phone on hook - slight increase in noise amplitude > Does the phone have any lights on it? No lights - I figured it was a bit of an RF hot spot caused by being attached to a really long antenna...the phone line - a bit like the boost to a weak AM commercial radio station you get when you pass under power lines. Of course it could be a cheap phone TX - I hear our government are having budget cut backs... :-) > >PC - goes berzerk > I would hope so... Pray, you you have a HP computer or printer with > an IRDA port? Compaq - IRDA port, yup but out of view to during my pop test. > >Dictaphone/pocket recorder - on or off, no reaction ! (too LF?) > No IR energy But none coming off the phone either - I hoped I'd got a cheap tape recorder oscilator detector in the deal....! > >Alarm clock (digital) - humms > > What was it humming? Brahms, I think. Naa, it was about 400 Hertz. Probably off the counter. > Have you tried using a splitter to run two or more probes at a time > with the unit? No - just a normal BNC 'T' connector? Is this to comparitivly test the function of each probe or is there an advantage in IR detection? > or, used multiple CPMs each with a different probe? I brought in 2 others with IR probes, for clients, but apart from a normal pre-delivery check I did not do side by side comparisons. I have a seperate IR linear RX receiver which my buddy G4AWZ, who assists me with equipment development, built. He's arriving here Thursday from the wet and cold UK with a new case of test equipment for me to experiment with. It looks like the home brew that it is BUT it is more sensitive, more directional and appears better screened than the CPM probe because it does not demod FM radio off my 'phone!!! Unfortunaly I don't have an IR lab so I can't measure frequencies. Incidentally, going back to the test TX question. I do carry test transmitters to show the clients that the equipment is not just bells and whistles. One of my Alum. cases is my random 'bit of kit' box. In there is a 432 Mhz Kenwood 10 Mw licence free Rx/Tx, an alarm system keyring TX (those pulsesare so sexy) and a deactivated parallel 'Infinity' ('Harmonica') hookswitch bypass phone tap, complete with croc clips!!! Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4936 From: James M. Atkinson Date: Sun Mar 3, 2002 6:18pm Subject: The Official MIT Nerd Test The Official MIT Nerd Test Score one point for each YES. Total score is % nerdity. Good luck! 1.Have you ever used a computer? (If the answer is no, try taking the Baker House Purity test.) 2.Have you ever programmed a computer? 3.Have you ever built a computer? 4.Done #2 continuously for more than four hours? 5.Have you ever "fingered" anyone on a computer? 6.Did you enjoy it? 7.Do you wear glasses? 8.Are your glasses broken (e.g. taped) ? 9.Is your vision worse than 20/40? 10.Worse than 20/80? 11.Are you legally blind? 12.Have you ever asked a question in lecture? 13.Have you ever answered a question in lecture? 14.Have you ever corrected a professor? 15.Have you ever answered a rhetorical question? 16.Do you sit in the front row? 17.Do you take notes in more than one color? 18.Have you ever worn a calculator? 19.A pocket protector? 20.Have you ever used a microscope? 21.Have you ever used a telescope? 22.Have you ever used an oscilloscope? 23.Is your weight less than your IQ? 24.Have you ever done #2 on Friday, Saturday, and Sunday of the same weekend? 25.Have you ever done #2 past 4 am? 26.Have you ever done #2 with someone of the appropriate sex (besides your consultant)? 27.Have you ever done #2 for money? 28.Do you own a Rubik's Cube? 29.Can you solve it? 30.Without the book? 31.Without looking? 32.Do you have acne? 33.Do you have greasy hair? 34.Are you unaware of it? 35.Have you ever bought anything from Radio Shack? 36.Did you redesign anything from Radio Shack? 37.Do you know how to use a sliderule? 38.Do you know calculus? 39.Do you know Maxwell's Equations? 40.Do you have them on a T-shirt? 41.Have you ever dissected anything? 42.Do you know pi past five decimal places? 43.Do you know e past five decimal places? 44.Do you own more than $500 in electronics (excluding stereo)? 45.More than $1000? 46.Have you ever built more than $1000 worth of electronics? 47.Have you ever designed a multistep chemical synthesis? 48.Was it fun? 49.Have you ever read The Hitchhiker's Guide to the Galaxy? 50.Was your math SAT more than 300 points higher than your verbal? 51.Have you ever worked on a Friday night? 52.While there's a party next door? 53.And wished that someone would invite you to come over? 54.Have you ever played a computer game? 55.Done #54 in the last three months? 56.Done #54 in the last three weeks? 57.Have you ever written a computer game? 58.Are your pants too short? 59.Do your socks mismatch? 60.Have you used a chemistry set? 61.After the age of 13? 62.Have you ever played D&D (or other role-playing game)? 63.Since high school? 64.Have you ever entered a science fair? 65.Did you win? 66.Do you own a digital watch? 67.Does it play music? 68.Does it have a calculator? 69.Have you ever used a rare earth element? 70.Do you own a CRC? 71.Do you own a CRT? 72.Do you own an HP calculator? 73.Do you know how to use it? 74.Were you ever on a chess team? 75.Were you ever on a debate team? 76.Do you know more than three programming languages? 77.More than eight? 78.Have you ever made a technical joke? 79.Did no one get it? 80.Can you name more than ten Star Trek episodes? 81.Are you socially inept? 82.Do you own a pencil case? 83.Do you wear it? 84.Do you know Schrodinger's equation? 85.Have you ever solved it? 86.Have you ever used the word "asymptotic"? 87.Can you count in binary? 88.Have you ever broken into a computer system? 89.A government system? 90.Have you ever changed your bank account? 91.Changed someone else's? 92.Done #2 for money? 93.Have you ever inhaled helium? 94.Do you know the Latin name for a fruit fly? 95.Do you own anything that is radio controlled? 96.Have you ever interpolated? 97.Have you ever extrapolated? 98.Have you ever used a modem? 99.Have you ever reached sexual climax while doing #2? 100.Did you understand every question on this test? RankClassification 1-20Totally cool, dude! 21-40Your social life needs some serious help. 40-60Nerd! 60-80YOU need some serious help. 80-100Hail, O Great Nerd Master. I have sacrificed some virgin, untouched sliderules in your name. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4937 From: A Grudko Date: Mon Mar 4, 2002 9:08pm Subject: Re: SteveU/Interesting article Original Message- > From: Steve Uhrig > Funny, takes me a lot of math backed up by empirical testing to determine > the range of a surveillance transmitter, and 3 miles is almost beyond > what I would consider reality. I have to take issue with my learned colleague (I've always wanted to say that - it sounds so British lawyerish). In the late 80s (maybe a sunspot maxima helped) I detected a nominal 10mw bug from 17 Km. Last time I worked a slide rule this was over 10 miles. The device was a Cony CM(?)100 continuously TXing, modified only by high impedance capacitive decoupling parallel onto a phone line and bigger batteries, mounted on top of a standard phone pole in the street but on a fairly high point. It had a 1/4 wave wire antenna and operated on a standard freq., I recall 143+ something Megs. My receiver was a Yaessu FT227R. I had an 18 metre mast with a rotatable 10 element 2M Yagi on a fairly high spot but it was not actual line of sight. Point to point, 17 Km, a fairly steady S6 signal except when aircraft passed over or in electrical storms. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time > > Guess I need to go back to college and sign up for some journalism > courses. Funny, those were the ones the engineering students switched to > when they flunked out of engineering. > > Gonna have to hire this gal. > > > The discovery prompted a shared sense of disbelief and concern among the > > newspaper staff and the university's administration. As this article was > > posted, it was not clear which university offices, if any, were > > investigating the matter. Whittier Police Department officials contacted > > by the SPLC could not find a report of the incident in their database. > > How inconsiderate of the alleged bugger not to have filed a report with > the police department detailing his installation. Terrible inconvenience. > > > The episode began last Thursday when a maintenance worker, in the > > newspaper office to fix a broken light table, found a problem with the > > electrical socket. Upon taking it apart, he discovered a two-inch > > surveillance device soldered to the back of the socket, Stice said. > > Gonna have to hire that 'maintenance worker'. Fix a leaking radiator, > dredge a hairbrush out of an overflowing toilet, find a bug. > > > The paper alerted campus security and on Monday an electrician checked all > > of the other sockets in the office. No more bugs were found, but campus > > security called the Whittier Police Department later that day. Stice said > > the officers, however, were reluctant to take action. > > What action could they take other than prosecute the campus morons for > destroying the chain of evidence and chain of custody? > > They should have spanked them, however, for sticking their noses into > something they were not qualified to mess with. > > Oh, I forgot. They were journalists. They are qualified to do anything. > > > "The Whittier Police Department came in, apparently looked at the bug and > > said, 'Well there's nothing we can do about it; yeah there's a bug but we > > don't have any evidence for this,' " Stice said. The officers said they > > did not want to file a report, she added, and that such a measure would > > necessitate taking custody of the device, which would probably be thrown > > away at a later time. > > 'Apparently' looked at the bug. Apparently said 'yeah there's a bug'. > > They also 'apparently' could have said, 'There's a dimmer, or noise > filter.' > > > The paper decided to keep possession of the bug. > > Admission of a felony. Except it is unlikely, in my opinion, it was a > bug, so probably no violation. > > > Student government president Jess Craven, whose office is located in > > the same building as the publications room, was worried that more bugs > > might be hidden in the walls so he contacted a local private > > investigator, Thomas Barnes. > > An appropriate course of action by the uninitiated. > > > Barnes, a retired police detective and former military officer, > > decided to help the staff pro bono, "because they didn't have any > > money," he said. > > Because if he would have taken any money, it would have been under false > pretenses, and he may have been at least that smart. > > > Barnes loaned the newspaper a scanner to check the office for additional > > surveillance tools and he urged former Whittier mayor and current > > councilman Bob Alexander to "light a fire under" the local police. > > Former police and military officers loan scanners to journalists to check > for bugs. I will sleep better knowing this. > > > "Most municipal police departments aren't really on the learning curve > > when it comes to bugs, electronic surveillance, computer crime," > > Barnes said. > > Neither are former police officers, former military officers or private > investigators. > > > Barnes said he considers the school's administration a suspect in the > > surveillance. > > I would consider Barnes a suspect. > > > Barnes and Brundage both said that the bug appeared to have been in the > > wall for "a long time." > Knob and tube electrical wiring was the clue, no doubt. > > As was the large power supply and bank of 4CX250 power amplifier tubes in > the bug. The blue flashing mercury vapor rectifiers were the real > giveaway, however. > > > Sweeps of the rest of the building turned up no additional surveillance > > devices. > > Good thing he loaned them that scanner. > > > In California, electronic eavesdropping in situations where there is an > > expectation of privacy and individuals are unaware of the surveillance is > > a felony, Barnes said. > > If someone is aware of a surveillance, is it still a surveillance? > > ============ > > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 4938 From: Steve Uhrig Date: Mon Mar 4, 2002 10:25pm Subject: Advice for novices Hello all, Following is a sanitized excerpt from a message exchanged with a gentleman starting in the field. Since it might be general interest, I am copying some here. No sales pitch intended; frankly I couldn't care less if anyone here buys anything from me or not, especially my precious extremely limited supply of unblocked receivers. My initial advice to the gentleman was not to spend any money on anything, merely do a lot of homework and research and learn for free before dropping a penny into hardware. This is my universal advice to newcomers. All the used equipment I have originally was purchased new by someone, then sold to me usually at a large loss for many reasons. Much of the stuff comes from new enthusiasts who get carried away, from their widows or former spouses, or former employers who have a bunch of crap some idiot in security bought from a spy shop then left to get a job more suited to his abilities, like flipping burgers. If you do want to make an investment, first put the money into something that goes between your ears, like training, basic electricity and electronics courses, or textbooks like the one described below if schooling is not practical or you aren't serious enough to make the commitment. You can always get your money back out of a used receiver if you lose interest. This is not true of most sweep equipment bought new or used. Sweep equipment is much like new cars in a way. The instant you unpack it you have cut its value by a third, permanently. If it lays around and gets dust and fingerprints on it, there goes another third. Then your ex sells it to me for 10% of what you paid for it, and I clean it up, replace the batteries, calibrate it and resell it for twice that, and someone gets a great deal because you spent money you shouldn't. You lose and everyone else wins. Don't buy hardware until you know what you will do with it and can justify it. Unless you are a professional, and if you are you don't need my advice, dream about the equipment if you want to, but don't buy it. Very, very few persons will ever earn enough sweeping to pay for their equipment. BUYING EQUIPMENT IS AN EXPENSE, NOT AN INVESTMENT, FOR MOST PEOPLE, AND THAT PROBABLY INCLUDES YOU. Don't fool yourself. Yes, I'm shouting. When a guy who sells equipment tells you not to buy it, maybe he's actually telling you the truth. ========================= Once upon a midnight dreary, a@b... pondered, weak and weary: > i have an XXX background and a pretty good set of ears > and was just wondering if it was still a bad idea to maybe tinker > around with an RF transmitter sweeper to get my ears used to combing > through the key frequencies you specified in your articles; and if you > do have a good, reliable used unit, i wouldn't mind having a new toy to > play with! The best universal tool for you, in my opinion, would be a decent general coverage shortwave/VHF/UHF receiver. You can manually tune the spectrum and every practical bug frequency up to 2 gigs. This does not include the high threat 2.4 gig video stuff, but there are cheap ways to sniff them with separate equipment. You will read about them if you go through all the archives for this list, as I recommended. You very likely would have a lot of fun doing some shortwave listening as well as learning in the process. And if you have kids, it's something you can do together and actually will drag many kids away from the web or the teevee. Have you ever spent an evening listening to Radio Moscow, or Radio Nederlands, or HCJB (Heralding Christ Jesus' Blessings, as they have been saying for at least 35 years) in Quito, Ecuador or Radio Havana? Fascinating. They still play music from the 40s and 50s, and you can still find Green Hornet and Fibber McGee and Mollie shows. And a very different view of international news, especially during a crisis. Manual tuning was the way it all was done until maybe 25 years ago when stuff like the Scanlock was introduced. Most of the government guys trained on and swear by Mason A2 or A3 receivers which were $30K to the government 30 years ago, and today a modern $2000 receiver is much better. An ICOM R8500 would be a good choice. I have them full coverage (meaning they will receive U.S. cellular telephone frequencies; illegal to sell for about the last 15 years) for $1850, or 'blocked' meaning cannot receive cell freqs, for $1250, used in perfect condition. Read more about frequency coverage elsewhere before buying. Scanner newsgroups like rec.radio.scanner is worth the noise level from the education you will pick up. Full coverage is important for sweeping. Listening to cellular calls is interesting for perhaps 30 seconds, then boring to most. Probably illegal to listen. Not illegal to sell the equipment secondhand or to possess it. You can get by with real simple antennas, perhaps even make a simple 'coat hanger groundplane' as a learning experience out of a connector and some coat hangers which will work perfectly fine for casual listening and cost under $5. Or you can buy a discone antenna which would work well and is what many/most of us use. I think I get $125 for them. They ship in a reusable cardboard tube where you can disassemble and transport the thing. You would need some feedline which would be something you could assemble yourself also as a learning experience. I would talk you through it. If you buy anything from me, remind me to throw in a toy you can take apart to see how transmitters are built, or fire up to see how it works. It will not transmit audio so it is not a bug and not illegal. It is a telemetry (data) transmitter which reads various weather conditions and transmits them down from a balloon. Good to use to teach kids about too. More description of them on my used equipment page www.swssec.com/used.html. I would recommend any issue in the last 10 years of 'The Radio Amateur's Handbook' published by the American Radio Relay League aka ARRL. www.arrl.org. This is a universal handbook covering everything about communications theory from the very beginning to the most modern. Virtually everyone has one around for reference, formulas, charts, etc. Since theory doesn't change, yet they publish the thing annually, it doesn't much matter which issue you get. I think my newest one is a 1972 and I have one which belonged to my dad from 1942 which was before I was born. The later editions have more about microwave and satellites and modern stuff, and older ones have more about stuff like teletype, vacuum tubes and earlier theory. Ideally you would want an older and a newer one, but for now anything you can find will be adequate. Check ebay for older ones. Don't pay collector's prices, though. You don't want an antique, you want a beat up reference book with coffee stains on it, for a decent price (like $20-$25 max). A new one from ARRL is $35 softcover for a 2002, and $32 for 2001 if they have any left. Either would be fine. You want the hard copy edition, NOT the CD. Nothing beats being able to carry the book to your bench, or photocopy a chart, or read it sitting on the potty. Best I can advise for now. I am going to copy this to the list anonymously, because others might be interested in the info. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4939 From: James M. Atkinson Date: Mon Mar 4, 2002 9:49am Subject: Uncle Sam Needs You - CIA Job Listings for TSCM People If any of the list membership is looking for full-time government TSCM employment at the CIA they should checkout the following. http://www.odci.gov/cia/employment/jobpostings/electronic_specialist.htm http://www.odci.gov/cia/employment/jobpostings/att5.htm The CIA, and Army are both seriously hurting right now for both TSCM people and decent equipment, so do your part. Float them a resume, and you may very well score a near term job offer right out of college. Contrary to the elite illusion they try to create, if you are under 35 years of age, can hold a soldering iron, or have a ham ticket, and have an interest in TSCM they will consider you for employment. While the base pay is sub par with what you could make in the private sector by 35-50%, they more then make up for it with benefits and intangibles. Around 70-75 subscribers of this list are US government TSCM people, including around two dozen CIA TSCM people. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4940 From: Date: Tue Mar 5, 2002 0:25pm Subject: New file uploaded to TSCM-L Hello, This email message is a notification to let you know that a file has been uploaded to the Files area of the TSCM-L group. File : /Gold List Uploaded by : graniteislandgroup Description : TSCM Referral List You can access this file at the URL http://groups.yahoo.com/group/TSCM-L/files/Gold%20List To learn more about file sharing for your group, please visit http://help.yahoo.com/help/us/groups/files Regards, graniteislandgroup 4941 From: James M. Atkinson Date: Tue Mar 5, 2002 2:53pm Subject: Labrador Retrievers [mildly off color humor] Three Labrador retrievers - a chocolate, yellow and black - are sitting in the waiting room at the vet's office when they strike up a conversation. The black lab turns to the chocolate and says, "So why are you here?" The chocolate lab replies, "I'm a pisser. I pissed on everything - the sofa, the drapes, the cat, the kids. But the final straw was last night, when I pissed in the middle of my owner's bed." The black lab says, "So what is the vet going to do?" "Gonna give me Prozac," came the reply from the chocolate lab. "All the vets are prescribing it. It works for everything." He then turns to the yellow lab and asks, "Why are you here?" The yellow lab says, " I'm a digger. I dig under fences, dig up flowers and trees, I dig just for the hell of it. When I'm inside, I dig up the carpets. But I went over the line last night when I dug a great big hole in my owner's couch." "So what are they going to do to you?" the black lab inquired. "Looks like Prozac for me too," the dejected yellow lab said. The yellow lab then turns to the black lab and asks what he's at the vet's office for. "I'm a humper," the black lab says. "I'll hump anything. I'll hump the cat, a pillow, the table, fire hydrants, whatever. I want to hump everything I see. Yesterday, my owner had just gotten out of the shower and was bending down to dry her toes, and I just couldn't help myself, I hopped on her back and started humping away." The yellow and chocolate labs exchange a sad glance and say, "So, Prozac for you too, huh?" The black lab says, "No, I'm here to get my nails clipped." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4942 From: John McCain Date: Tue Mar 5, 2002 4:54pm Subject: FYI, UWB article There's a pretty good article on ultra wide band (believe it or not, this one actually includes some references to Shannon's equations and power spectral density) in the March, 2002 Communications System Design magazine. If you don't subscribe, read it online at http://www.commsdesign.com/design_corner/OEG20020301S0021 . Naturally, it's written by someone with a product to sell, but it's a pretty good intro for those of us who haven't looked into UWB before. Cheers, JohnM Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-352-0350 807 Pioneer Web: http://www.dcbnet.com Champaign, IL. 61820 Email: Jmccain@d... 4943 From: James M. Atkinson Date: Tue Mar 5, 2002 11:09pm Subject: Re: Interesting article (Whittier College) Thanks for posting the article to the list, and I would encourage other list members to do the same when they come across similar article in the future. At 12:56 PM -0500 2/28/02, preflat@p... wrote: > Found this today...thought the group my find it interesting: > >SteveP > >Students discover "bug" in Whittier College newspaper office >Listening device could have been planted several years ago, says >private investigator > >© 2002 Student Press Law Center > >February 27, 2002 > >CALIFORNIA - Student newspaper staff members at Whittier College >uncovered what may turn out to be the story of the year ... in their >very own office. If a bug find at a college is a "big story" then campus life must be pretty boring. >A routine maintenance service call last week turned up an electronic >surveillance device imbedded in the office walls of the Quaker >Campus. OK, sounds like a typical bug find... unless they were having sweeps done on a regular basis (by a competent sweeper) the device could have been there for quite a while. >It is not known how long the bug, which was not functioning when >pulled from the wall, was hidden. The device was capable of >transmitting a radio signal to any receiver, tuned to the correct >frequency, within a three-mile radius, editor Amy Stice said. Er, I am afraid that Amy is mistaken... a device concealed "inside the walls" would likely have a range of less then 1000 feet, and more likely less then 500 feet. >The discovery prompted a shared sense of disbelief and concern among >the newspaper staff and the university's administration. It is called "organizational denial", and is normal behavior when a device is found. >As this article was posted, it was not clear which university >offices, if any, were investigating the matter. The university has no business "investigating" the device... that is a job for LEO's >Whittier Police Department officials contacted by the SPLC could not >find a report of the incident in their database. Argh... can you say "obstruction of justice" >The episode began last Thursday when a maintenance worker, in the >newspaper office to fix a broken light table, found a problem with >the electrical socket. Upon taking it apart, he discovered a >two-inch surveillance device soldered to the back of the socket, >Stice said. OK, sounds like it may be a legit find, but the fact that it was found in a newspaper office is suspect. >The paper alerted campus security and on Monday an electrician >checked all of the other sockets in the office. No more bugs were >found, but campus security called the Whittier Police Department >later that day. Stice said the officers, however, were reluctant to >take action. LEO's tend not to like to "do the right thing" when it comes to found bugs, but we are working to change that. No doubt that this electrician worked for the CIA. >"The Whittier Police Department came in, apparently looked at the >bug and said, 'Well there's nothing we can do about it; yeah there's >a bug but we don't have any evidence for this,' " Stice said. Ah, it's called an evidence pouch, and a chain of custody record. The device is examined by an expert, and their report added to the incident report (what do you mean they didn't do an incident report). A detective then prepares a investigative record, and takes everything to a local DA who determines if a Grand Jury needs to be empaneled. The DA and/or Grand Jury will decide what to do, not the local cops, and not the college. Remember that members of law enforcement can be convicted of "obstruction of justice" for the way they handle a case. >The officers said they did not want to file a report, she added, and >that such a measure would necessitate taking custody of the device, >which would probably be thrown away at a later time. Bullshit >The paper decided to keep possession of the bug. Ahem.. if they do so, then they are committing a serious federal felony. >Student government president Jess Craven, whose office is located in >the same building as the publications room, was worried that more >bugs might be hidden in the walls so he contacted a local private >investigator, Thomas Barnes. > >Barnes, a retired police detective and former military officer, >decided to help the staff pro bono, "because they didn't have any >money," he said. Bwah, ha-ha-ha-ha... pro bono, sure. He shot himself in the foot by loaning them bogus equipment, and then shot himself again by offering them faulty advise (where is the incident report). >Barnes loaned the newspaper a scanner to check the office for >additional surveillance tools and he urged former Whittier mayor and >current councilman Bob Alexander to "light a fire under" the local >police. A scanner? they have got to be kidding... a scanner? Why not loan them some frigging tarot cards, chicken bones, animal entrails, and tea leaves as well. Sure a scanner will pick up some bugs, but only if you know the frequencies, AND you can get close to the device. If the PI wanted to really help the college he should have loaned them a lab grade microwave spectrum analyzer, some broad band EMI antennas, preamplifiers, and filters (which of course this PI would have as he is holding himself out as a TSCM expert). >"Most municipal police departments aren't really on the learning >curve when it comes to bugs, electronic surveillance, computer >crime," Neither are some PI's from the sounds of it. >Barnes said. "You're lucky, [for] the older policemen, if they can >even run a computer. And if they can't even write their own reports >or run a computer, then they're surely not going to be able to >understand the implications of a bug." Wow, talk about double-speak... the "implications of a bug" are actually quite easy to understand once you get past all the hype and paranoia. I can just seen all the little spyshops, crank pots, con artists, and wanna-be's in California scrambling right now trying to get the college to buy sweep services and sweep gear. >"It's pretty serious when you start hard-wiring in because it means >you have to have the opportunity to do it," he continued. "This is >not for a short-term problem, it's (for) somebody that wants to >monitor somebody for a long period of time." Nah, probably just one of the college students with too much time on their hands. Just fume up some latent prints from the device, and the inside of the drywall and you should be able to get a clean ID on the offender. Assuming that the PI didn't totally screw up the crime scene there should be copious amount of trace evidence, latent prints, tool marks, and so on that will lead back to the spy. Of course if the PI was involved in any way, AND was even slightly involved with "the find" not being handled properly the state should (and probably will) revoke is license, or at least sanction and rebuke him. >The school seems to share his concern. Sure, but both of them seem to think this whole incident is a joke. >"Student journalism and the free exchange of ideas is something that >the institution has supported since its inception," university >spokesperson Caye Brundage said. "So we're very concerned about >anything that would inhibit the ability of our students to exchange >ideas freely or that would create an atmosphere where they felt they >were being inhibited." Blah, blah, blah... Determine the date of the install (easy to do), and then make the initial suspect list all students who worked at the paper for 3 years after the build date... suspect the paper employees first, and then everybody else. >Barnes said he considers the school's administration a suspect in >the surveillance. Clueless, absolutely clueless. >"Who would want to monitor [the newspaper] on a long-term basis?" Given the limited range of the device in question... suspect people working in the same building... >Barnes asked rhetorically. "You start to come up with a short list >of people and one of the people that usually comes up at the very >top of the list is administration. Any college graduate knows that you use rhetoric to mislead the audience, and hide the truth... so by such use of rhetoric we now see what the PI's relationship is to the "very top of the list is administration"... er, what kind of issues does this guy have with the college? >It's like a murder case; one of the first people you look at is >somebody related to the murder victim." Yes, and just like a homicide investigation you first suspect the person who found the device, and then the officers (or PI) who first responded to the scene. Funny that the PI is pointing his finger at the administration of the college, and yet HE was one of the first people to screw up the crime scene and/or the handling of the case... curious, very curious. >Brundage disagreed, "I can't think of why I as an administrator >would want to bug the office," she said. "We are interested in >knowing what the [Quaker Campus] is doing but usually we're pretty >aware of what stories are being [investigated anyway]." No, but the paper would stand to benefit by a bug discovery, as would a PI who was advising the school. In any eavesdropping investigation like this the two most important questions has to be. 1) Who would stand to gain from a find such as this (other then the obvious). 2) Who found the device, and what would THEY stand to gain by such a find. >Barnes and Brundage both said that the bug appeared to have been in >the wall for "a long time." Sweeps of the rest of the building >turned up no additional surveillance devices. OK, perhaps... but that has to be determined by experts in their respective fields, not comedians who loan neophytes scanners instead of laboratory grade test equipment. >In California, electronic eavesdropping in situations where there is >an expectation of privacy and individuals are unaware of the >surveillance is a felony, Barnes said. Federal law trumps state law, but under both jurisdictions it is a felony... but then so is obstruction of justice. >Whittier College is the alma mater of former President Richard >Nixon, who was forced to resign from office as a result of the >Watergate scandal that was triggered by the bugging of Democratic >National Committee headquarters in Washington. Oh, so logically it must have been Richard Nixon who planted the device while G. Gordon Liddy watched the door... talk about a stretch. Something funny is going on with this, and there are way to many people who stand to benefit. My initial impression is that it may be a publicity stunt, or an older device some reporter was playing with ten years ago. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4944 From: James M. Atkinson Date: Tue Mar 5, 2002 2:28pm Subject: Re: Interesting article (Whittier College) Thanks for posting the article to the list, and I would encourage other list members to do the same when they come across similar article in the future. At 12:56 PM -0500 2/28/02, preflat@p... wrote: > Found this today...thought the group my find it interesting: > >SteveP > >Students discover "bug" in Whittier College newspaper office >Listening device could have been planted several years ago, says >private investigator > >© 2002 Student Press Law Center > >February 27, 2002 > >CALIFORNIA - Student newspaper staff members at Whittier College >uncovered what may turn out to be the story of the year ... in their >very own office. If a bug find at a college is a "big story" then campus life must be pretty boring. >A routine maintenance service call last week turned up an electronic >surveillance device imbedded in the office walls of the Quaker >Campus. OK, sounds like a typical bug find... unless they were having sweeps done on a regular basis (by a competent sweeper) the device could have been there for quite a while. >It is not known how long the bug, which was not functioning when >pulled from the wall, was hidden. The device was capable of >transmitting a radio signal to any receiver, tuned to the correct >frequency, within a three-mile radius, editor Amy Stice said. Er, I am afraid that Amy is mistaken... a device concealed "inside the walls" would likely have a range of less then 1000 feet, and more likely less then 500 feet. >The discovery prompted a shared sense of disbelief and concern among >the newspaper staff and the university's administration. It is called "organizational denial", and is normal behavior when a device is found. >As this article was posted, it was not clear which university >offices, if any, were investigating the matter. The university has no business "investigating" the device... that is a job for LEO's >Whittier Police Department officials contacted by the SPLC could not >find a report of the incident in their database. Argh... can you say "obstruction of justice" >The episode began last Thursday when a maintenance worker, in the >newspaper office to fix a broken light table, found a problem with >the electrical socket. Upon taking it apart, he discovered a >two-inch surveillance device soldered to the back of the socket, >Stice said. OK, sounds like it may be a legit find, but the fact that it was found in a newspaper office is suspect. >The paper alerted campus security and on Monday an electrician >checked all of the other sockets in the office. No more bugs were >found, but campus security called the Whittier Police Department >later that day. Stice said the officers, however, were reluctant to >take action. LEO's tend not to like to "do the right thing" when it comes to found bugs, but we are working to change that. No doubt that this electrician worked for the CIA. >"The Whittier Police Department came in, apparently looked at the >bug and said, 'Well there's nothing we can do about it; yeah there's >a bug but we don't have any evidence for this,' " Stice said. Ah, it's called an evidence pouch, and a chain of custody record. The device is examined by an expert, and their report added to the incident report (what do you mean they didn't do an incident report). A detective then prepares a investigative record, and takes everything to a local DA who determines if a Grand Jury needs to be empaneled. The DA and/or Grand Jury will decide what to do, not the local cops, and not the college. Remember that members of law enforcement can be convicted of "obstruction of justice" for the way they handle a case. >The officers said they did not want to file a report, she added, and >that such a measure would necessitate taking custody of the device, >which would probably be thrown away at a later time. Bullshit >The paper decided to keep possession of the bug. Ahem.. if they do so, then they are committing a serious federal felony. >Student government president Jess Craven, whose office is located in >the same building as the publications room, was worried that more >bugs might be hidden in the walls so he contacted a local private >investigator, Thomas Barnes. > >Barnes, a retired police detective and former military officer, >decided to help the staff pro bono, "because they didn't have any >money," he said. Bwah, ha-ha-ha-ha... pro bono, sure. He shot himself in the foot by loaning them bogus equipment, and then shot himself again by offering them faulty advise (where is the incident report). >Barnes loaned the newspaper a scanner to check the office for >additional surveillance tools and he urged former Whittier mayor and >current councilman Bob Alexander to "light a fire under" the local >police. A scanner? they have got to be kidding... a scanner? Why not loan them some frigging tarot cards, chicken bones, animal entrails, and tea leaves as well. Sure a scanner will pick up some bugs, but only if you know the frequencies, AND you can get close to the device. If the PI wanted to really help the college he should have loaned them a lab grade microwave spectrum analyzer, some broad band EMI antennas, preamplifiers, and filters (which of course this PI would have as he is holding himself out as a TSCM expert). >"Most municipal police departments aren't really on the learning >curve when it comes to bugs, electronic surveillance, computer >crime," Neither are some PI's from the sounds of it. >Barnes said. "You're lucky, [for] the older policemen, if they can >even run a computer. And if they can't even write their own reports >or run a computer, then they're surely not going to be able to >understand the implications of a bug." Wow, talk about double-speak... the "implications of a bug" are actually quite easy to understand once you get past all the hype and paranoia. I can just seen all the little spyshops, crank pots, con artists, and wanna-be's in California scrambling right now trying to get the college to buy sweep services and sweep gear. >"It's pretty serious when you start hard-wiring in because it means >you have to have the opportunity to do it," he continued. "This is >not for a short-term problem, it's (for) somebody that wants to >monitor somebody for a long period of time." Nah, probably just one of the college students with too much time on their hands. Just fume up some latent prints from the device, and the inside of the drywall and you should be able to get a clean ID on the offender. Assuming that the PI didn't totally screw up the crime scene there should be copious amount of trace evidence, latent prints, tool marks, and so on that will lead back to the spy. Of course if the PI was involved in any way, AND was even slightly involved with "the find" not being handled properly the state should (and probably will) revoke is license, or at least sanction and rebuke him. >The school seems to share his concern. Sure, but both of them seem to think this whole incident is a joke. >"Student journalism and the free exchange of ideas is something that >the institution has supported since its inception," university >spokesperson Caye Brundage said. "So we're very concerned about >anything that would inhibit the ability of our students to exchange >ideas freely or that would create an atmosphere where they felt they >were being inhibited." Blah, blah, blah... Determine the date of the install (easy to do), and then make the initial suspect list all students who worked at the paper for 3 years after the build date... suspect the paper employees first, and then everybody else. >Barnes said he considers the school's administration a suspect in >the surveillance. Clueless, absolutely clueless. >"Who would want to monitor [the newspaper] on a long-term basis?" Given the limited range of the device in question... suspect people working in the same building... >Barnes asked rhetorically. "You start to come up with a short list >of people and one of the people that usually comes up at the very >top of the list is administration. Any college graduate knows that you use rhetoric to mislead the audience, and hide the truth... so by such use of rhetoric we now see what the PI's relationship is to the "very top of the list is administration"... er, what kind of issues does this guy have with the college? >It's like a murder case; one of the first people you look at is >somebody related to the murder victim." Yes, and just like a homicide investigation you first suspect the person who found the device, and then the officers (or PI) who first responded to the scene. Funny that the PI is pointing his finger at the administration of the college, and yet HE was one of the first people to screw up the crime scene and/or the handling of the case... curious, very curious. >Brundage disagreed, "I can't think of why I as an administrator >would want to bug the office," she said. "We are interested in >knowing what the [Quaker Campus] is doing but usually we're pretty >aware of what stories are being [investigated anyway]." No, but the paper would stand to benefit by a bug discovery, as would a PI who was advising the school. In any eavesdropping investigation like this the two most important questions has to be. 1) Who would stand to gain from a find such as this (other then the obvious). 2) Who found the device, and what would THEY stand to gain by such a find. >Barnes and Brundage both said that the bug appeared to have been in >the wall for "a long time." Sweeps of the rest of the building >turned up no additional surveillance devices. OK, perhaps... but that has to be determined by experts in their respective fields, not comedians who loan neophytes scanners instead of laboratory grade test equipment. >In California, electronic eavesdropping in situations where there is >an expectation of privacy and individuals are unaware of the >surveillance is a felony, Barnes said. Federal law trumps state law, but under both jurisdictions it is a felony... but then so is obstruction of justice. >Whittier College is the alma mater of former President Richard >Nixon, who was forced to resign from office as a result of the >Watergate scandal that was triggered by the bugging of Democratic >National Committee headquarters in Washington. Oh, so logically it must have been Richard Nixon who planted the device while G. Gordon Liddy watched the door... talk about a stretch. Something funny is going on with this, and there are way to many people who stand to benefit. My initial impression is that it may be a publicity stunt, or an older device some reporter was playing with ten years ago. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4945 From: Rick Hofmann - MICROSEARCH Date: Mon Mar 4, 2002 6:03pm Subject: Whittier College update Another list member made an appointment to meet with the Whittier College newspaper staff yesterday afternoon (3-3-02) and was kind enough to invite me to participate. In the mean time I was able to obtain some photos of the device from a colleague on the east coast. The device is a 110 VAC powered WFM transmitter built on a standard duplex wall socket. It is now in the custody of the Whittier Police Department. It is unknown if a crime report was taken. The device appears to be one I am familiar with, but without actually seeing it I do not want to name a specific manufacturer. If the device is what I believe it to be, it is probably at least 12 to 15 years old. It is unknown if the device was operating when discovered by the school's electrician. There was more than one layer of paint on the cover plate indicating that the device was in place for several years. According to the newspaper staff there was a sensitive story they were working on 10 or so years ago, and that may have been the reason for the placement of the device. The school newspaper office has been in this location for 17 to 18 years. It is unfortunate that the initial responders were not better acquainted with crime scene investigations in general, and Title 18 investigations in particular. There were a number of people involved with the find, and any chain of evidence appears to have been broken a few times. The correct procedure would have been notification of law enforcement (preferably the FBI) as soon as the electrician saw that he had an eavesdropping device, and without any further handling of the crime scene. Notification of law enforcement should have been done by campus safety officers, assuming they were the first to be notified by the school electrician. One of the benefits of the TSCM list is the information it provides. It is my hope that readers of this message will understand that I am not necessarily being critical of anyone involved in this case because I was not at the scene when the discovery was made, and I do not have all the facts. What I am saying is that TSCM professionals need to continue to educate their clients and potential clients about how to handle this type of incident. In this particular case there was also some incorrect information provided about the device and its capabilities. This can result in undue paranoia being generated in the minds of the victim as well as anyone reading an account of the incident in the newspaper. My personal policy is to not guess at answers to client questions about things with which I am not familiar. If I do not have the answer, I simply tell my client that I will find out and let them know later. I have seen too many cases of letting one's ego get in the way of honesty and ethics. Most of the time it ends up backfiring on the person with the giant ego anyway. Sorry for pontificating, but sometimes it's a good way to get a point across. Very truly yours, Rick Hofmann, CCO, CPP MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 PI16998 4946 From: Matthew Paulsen Date: Tue Mar 5, 2002 9:59pm Subject: US National Lab Bans Wireless Devices (http://www.llnl.gov/) I don't remember this hitting this forum. -M http://www.newsfactor.com/perl/story/16206.html By Jay Wrolstad www.WirelessNewsFactor.com, Part of the NewsFactor Network February 6, 2002 'It's easy to take a Palm PDA or laptop PC with wireless networking capability from a non-classified area into a classified area inadvertently,' Livermore Lab spokesperson David Schwoeglen told Wireless NewsFactor. 'That creates a serious security violation.' Citing security concerns associated with the pervasive nature of, and potential flaws in, wireless LANs (local area networks), the Lawrence Livermore National Laboratory has banned their use in its facilities. Livermore Lab acknowledged that wireless computer network communications can improve productivity by enabling access to information without the constraints of wired connectivity. However, computer manufacturers increasingly are bundling LAN technology with their equipment, and that can become a problem when the hardware is moved within the lab. Livermore said tests have proven that wireless network technologies and their built-in security features are not secure, and that control of such technologies is needed until security vulnerabilities can be addressed. Ubiquitous Wireless Connectivity "For many years, we have had a ban on all wireless transmission devices in classified areas. That includes cell phones and other handheld devices," Livermore Lab spokesperson David Schwoeglen told Wireless NewsFactor. Products equipped for wireless communication and mobile Internet access have made their way into sensitive computer networks that could be vulnerable to attacks by hackers and other unauthorized individuals, Livermore said. "There is temporary ban on (wireless) LANs in all areas of the lab while we do a technical evaluation and develop a new policy for their use," Schwoeglen said. Finding Flaws Livermore, a U.S. Department of Energy national laboratory that focuses on information-sensitive projects -- such as nuclear weapons design and national security research -- currently has only two LANs in operation, Schwoeglen said. "But it's easy to take a Palm PDA or laptop PC with wireless networking capability from a non-classified area into a classified area inadvertently," he said. "That creates a serious security violation." The policy states that any program or directorate with an existing wireless LAN in a "property protection" area must disconnect the LAN from all institutional networks and obtain an approved exception to the policy before resuming its operation. The new policy enables the lab to monitor on-site use of wireless technologies while evaluating their limitations and benefits. Securing the Perimeter "Many people who deal with technology don't understand how vulnerable their data is," Schwoegler said. "We do not want a pathway that connects our classified computer networks to the outside." Even TV crews working on news stories at the lab are required to obtain a special permit to broadcast from the facility, he said. The new regulations do not affect the use of cell phones and PCS (personal communications system) devices, pagers, two-way mobile and portable radios, or point-to-point voice, video and data communications systems. 4947 From: kirk Date: Wed Mar 6, 2002 0:34pm Subject: Re: FYI, UWB article I just wanted to let the group know that I've been a member of the Ultra Wideband Working Group which is a regulating and information group to the UWB industry. More information can be had on Ultra wideband at this website, www.uwb.org/faqs.html. If you feel you have something to add to the furtherance of this technology please feel free to apply for membership. Kirk ---------- Original Message ---------------------------------- From: John McCain Date: Tue, 05 Mar 2002 16:54:12 -0600 >There's a pretty good article on ultra wide band (believe it or not, this >one actually includes some references to Shannon's equations and power >spectral density) in the March, 2002 Communications System Design >magazine. If you don't subscribe, read it online at >http://www.commsdesign.com/design_corner/OEG20020301S0021 . > >Naturally, it's written by someone with a product to sell, but it's a >pretty good intro for those of us who haven't looked into UWB before. > >Cheers, >JohnM > > > >Manager, Corporate Security Voice: 217-352-3207 >Data Comm for Business, Inc. Fax: 217-352-0350 >807 >Pioneer Web: >http://www.dcbnet.com >Champaign, IL. 61820 Email: >Jmccain@d... > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > -- Kirk Adirim President TACTRONIX Tactical Electronics for Critical Missions 8497 Sunset Boulevard #28 West Hollywood, CA 90069 USA E: kirk@t... T: 323-650-2880 F: 310-388-5886 W: www.tactronix.com -- 4948 From: Date: Wed Mar 6, 2002 7:05pm Subject: interesting article check out http://www.cl.cam.ac.uk/~mgk25/ieee02-optical.pdf in PDF format but worth the read SteveP 4949 From: A.Lizard Date: Wed Mar 6, 2002 4:57pm Subject: Those blinking lights on external modems fair usage quote from abstract of paper to be published in ACM Transactions on Information and Systems Security: Information Leakage from Optical Emanations JOE LOUGHRY Lockheed Martin Space Systems and DAVID A. UMPHRESS Auburn University A previously unknown form of compromising emanations has been discovered. LED status indicators on data communication equipment, under certain conditions, are shown to carry a modulated optical signal that is significantly correlated with information being processed by the device. Physical access is not required; the attacker gains access to all data going through the device, including plaintext in the case of data encryption systems. Experiments show that it is possible to intercept data under realistic conditions at a considerable distance. Many diÆerent sorts of devices, including modems and Internet Protocol routers, were found to be vulnerable. A taxonomy of compromising optical emanations is developed, and design changes are described that will successfully block this kind of ìOptical Tempestî attack. ======================== end quote find the full paper at: http://applied-math.org/optical_tempest.pdf A.Lizard ************************************************************************ new voicemail number,ask if you need it. Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 4950 From: Matthew Paulsen Date: Wed Mar 6, 2002 2:37am Subject: mixing countries to sell transmitters Here's a question for the group. Stumbled across a website that is Israeli & US based. They are selling bugs on the web. Their hosting provider is in Florida, an nslookup yields no data on their dns other than this, so hence no company data, or address on website. Their website has only phone numbers for support - 310 area code being one of them. So, can a company like this operate legally or not? If the items are shipped/stored in Israel, and the website is hosted here, and payments are processed through a gateway provider for CC's (let assume Verisign for simplicity), is this legal or not? [Non-text portions of this message have been removed] 4951 From: A Grudko Date: Wed Mar 6, 2002 3:36pm Subject: Re: Unusual conditions Re. my last post - on the 17 km reception of a VHF bug. I should have pointed out that this was an exceptional case under conditions which do not normally apply in covert surveillance. Oh, and the bug was a Cony CN 100 not CM 100. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4952 From: Matthijs van der Wel Date: Wed Mar 6, 2002 10:28am Subject: CIA network map Hi, The British company Matta has mapped part of the CIA network, using public sources (and without breaking the law). Download and read their full report at http://www.trustmatta.com/services/docs/Matta_Counterintelligence.pdf The map: http://www.trustmatta.com/services/docs/cia-map.jpg Yours sincerely, Matthijs van der Wel From: Date: Fri Mar 2, 2001 7:24am Subject: Ex-Russian secret service boss doubts Hanssen case Ex-Russian secret service boss doubts Hanssen case MOSCOW, March 2 (Reuters) - A former Russian spy chief cast doubt on Friday on allegations that FBI agent Robert Hanssen sold secrets to Moscow for more than $1 million, saying it did not have that kind of money. Hanssen was arrested on February 18 and accused of selling secrets to the Soviet Union and subsequently Russia for $1.4 million in money and diamonds since 1985. "I view this as a provocation from the FBI," said Nikolai Kovalyov, a former head of the FSB domestic security service and now deputy chairman of the State Duma lower house of parliament's security committee. "The astronomical size of the payments also makes me cautious," he told a news conference. "Russia simply does not have that sort of money." He said such spy cases were part of efforts by U.S. President George W. Bush to strengthen his own domestic position after his slim and contested election victory. Kovalyov said recent U.S. and British air raids on Baghdad and the U.S. desire to create a national anti-missile defence shield, opposed by Russia, were part of the same phenomenon. He said Hanssen had been in no position to harm U.S. national interests as his job, uncovering foreign agents in the United States, had not given him access to damaging secrets. The United States alleges that Hanssen compromised technical operations, including electronic surveillance and monitoring techniques, and intelligence targets. Kovalyov also saw no signs that Russia's secret services had embarked on an internal witch-hunt for spies, despite a number of recent espionage cases, including that of U.S. citizen Edmond Pope and of Russian researcher Igor Sutyagin. "As for spy mania, I would say the secret services are acting in a totally restrained and balanced fashion," he said. Pope was sentenced to 20 years in jail for trying to obtain secrets on an underwater missile but was pardoned by President Vladimir Putin, himself a former KGB spy and former FSB boss. Sutyagin, a researcher for the USA and Canada Institute, a respected thinktank, is still on trial on charges of passing secrets to Western handlers. He denies the charges. 2613 From: James M. Atkinson, Comm-Eng Date: Sat Mar 3, 2001 11:28am Subject: Why Call It 'Intelligence?' Why Call It 'Intelligence?' By Pavel Felgenhauer Thursday, Mar. 1, 2001. Page 9 The Moscow Times http://www.themoscowtimes.com/stories/2001/03/01/009.html Last week FBI agent Robert Philip Hanssen was arrested in the United States and charged with spying for the Soviet Union and Russia for the last 15 years. A spokesman for Russia's Foreign Intelligence Service, Boris Labusov, told Russian State Television: "We never comment on whether any specific person has or has not a relation to Russian special services." While speaking Labusov noticeably smirked and added that "the greatest achievements of intelligence services become public knowledge only after an exposure." If Russian officials are trying to hide their alleged connection with Hanssen, they are doing a pretty lousy job of it. In fact, they seem to be quite proud of the idea that they had such an agent. In the '80s and '90s, the Russians apparently managed to operate two highly successful moles, one in the FBI and one in the CIA: Hanssen and Aldrich Ames. Moscow obtained quite a lot of sensitive information from Ames and, allegedly, from Hanssen as well. It's also virtually certain that Ames and Hanssen were not the only well-placed moles that Russia had in the West. Soviet intelligence was not only highly professional, but also remarkably successful. So why then did Moscow lose the Cold War? A retired Russian intelligence official once told me that in the late '70s, Russian military intelligence managed to acquire a package of highly secret documents revealing the true maximum production capacity of all U.S. heavy arms-making industrial plants. It turned out that the United States could not grossly expand tank and other heavy-weapons production even if the economy were put on a war footing and that the Soviet Union had a towering advantage in this field. The spies who came up with this important intelligence were expecting bunches of medals, but were harshly reprimanded by their superiors instead. The documents were suppressed by the military chiefs and never reported to the Politburo. The Soviet military-industrial chiefs were at that time conjuring a massive Western military threat in order to frighten the Kremlin into spending more on defense. They were deliberately fabricating yarns about U.S. military might and did not need any true information about American weaknesses. The same thing was happening on the other side of the Cold War divide. At the end of the '80s, the CIA estimated Soviet gross domestic product as almost 60 percent of America's. The agency portrayed Moscow not only as a military superpower - which it was in many aspects - but also as a modern industrial power, which it was not. As a result of such intelligence, the sudden political, military and industrial implosion of the Soviet empire came as a total surprise to the West. Throughout the Cold War, both countries spent billions of dollars recruiting moles that were used to find and "neutralize" enemy moles, while truly important information was shoved aside as insignificant. In 1995, for instance, the CIA produced a report that stated that no "rogue" state could develop intercontinental ballistic missiles within 15 years, and that if a threat of rogue ICBMs did develop, U.S. intelligence would detect it years in advance. This report disturbed many Washington decision-makers, so Congress formed a special commission headed by Donald Rumsfeld, who is now secretary of defense. The purpose of this commission was to conjure a rogue ICBM threat out of thin air. In 1999, the Rumsfeld commission concluded that "North Korea and Iran will have an ICBM force to attack the U.S. in five years" and Iraq will have an ICBM force ready to attack the U.S. in 10 years or sooner. Now, almost two years later, it's obvious that the Rumsfeld report is a sham and that the original CIA estimates are correct. But who cares? Rumsfeld was appointed defense secretary because he is a good apparatchik who knows that the truth is whatever the party says it is. For almost a year now, the Moscow elite has been anticipating, in accordance with intelligence reports, that the new Bush administration would be Russia's best friend no matter what happened here. At the same time, the West is still waiting for President Vladimir Putin to reveal himself as the true liberal that he must be at heart. By now, though, both East and West must have disappointedly returned to the drawing board to think up new policies - which no doubt are based on the latest reports of their respective intelligence services. Pavel Felgenhauer is an independent, Moscow-based defense analyst. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2614 From: James M. Atkinson, Comm-Eng Date: Sat Mar 3, 2001 11:28am Subject: Fraud case drama of CIA agent Fraud case drama of CIA agent http://www.thisisjersey.com/news/news2.html PART of a drama which began with a CIA agent being jailed in the United States for disclosing US secret information and money laundering through Jersey companies was played out in the Royal Court yesterday. The fraud and money laundering admitted by Texan Dennis Earl McMahan were discovered by an FBI investigation into his activities. This also looked into an unauthorised disclosure of US information that he had as a CIA agent. McMahan has been indicted in the USA and is now in prison in Dallas. In court yesterday were some of the parties who have become embroiled in a civil action which has its roots in McMahanís fraud and the deposit of cash in Jersey-registered companies. The civil action began two years ago. McMahan had been working for the plaintiffs of the original action, ED & F Man Liquid Products Ltd and its subsidiary, Westway Trading Corporation, with the purpose of building contacts in the Ukraine to sell alcohol and molasses. In the course of this employment McMahan told his employers that each contract could only be made if there was a fee paid for ëlogistical and marketing servicesí. These were paid into accounts held by Kovzac Ltd and Clifton Resources Ltd, run by Bayard Trust Company Ltd in Jersey, all defendants in the civil action brought by ED & F Man and Westway. In 1998 Royal Court injunctions were put in place to ensure that any money which could be due at the conclusion of the civil case was recoverable by remaining in this jurisdiction. Yesterday the attorney representing Kovzac Ltd, Alexander Glotov, who had travelled from the Ukraine with his client and Kovzacís beneficial owner, Oleg Dolotiy, attempted to get the injunctions against Kovzac lifted. Mr Glotov claimed that the plaintiffs had failed to make a ëfull and frank disclosureí to the Royal Court when the injunctions were granted. He accused ED & F Man of having no claim to any funds because they had been aware that ëlogistical and marketing servicesí meant that McMahan was going to use the money to bribe Ukrainian officials. He also cited telephone conversations and letters which he said made it clear that ED & F Man knew what was being asked of them but had not explained these to the court when the injunctions were made. He suggested that because the intention to bribe is illegal, it should preclude the plaintiffs from recovering any money paid to Kovzac and Clifton under the direction of McMahan. Mr Glotov said that Mr Dolotiy had been frank in the disclosures that he had made, and his client was one man up against Manís corporate structure. Acting for Man and Westway, Advocate Ashley Hoy said that Kovzac Ltd and Clifton Resources Ltd, as Jersey companies, had used Jersey banks to deposit the fraudulently gained funds and that the injunctions should remain in place. Between £100,000 and £150,000 are held in a US$ account in Kovzacís name. He said that the plaintiffs were still attempting to gain further evidence from the FBI in relation to the fraud. The FBI had some 10,000 hours of surveillance material, including communications between McMahan, Mr Dolotiy and Bayard Trust Company to which the plaintiffs were trying to gain evidence. Advocate Hoy told the court that if the injunctions were lifted it was likely that the money would disappear from this jurisdiction and his clients would be unlikely ever to be able to claim restitution. The other defendants cited in the order of justice brought by ED & F Man are the Royal Bank of Scotland International Ltd, Barclays, and Barclays Bank International. In his skeleton argument to the court yesterday, Advocate Hoy stated that in the 1999 affidavit of an FBI special agent it was suggested that Mr Dolotiy himself had been implicated in the original fraud, together with McMahan. Both Advocate Hoy and Mr Glotov denied that there had been any wrongdoing by their clients or the intention to take part in any illegal activity. Mr Glotov said that to date, and two years on since the legal proceedings began, the plaintiffs had not been able to prove their claim against any of the defendants, except McMahan, and that keeping the defendantís property in Jersey was unfair and unreasonable in all the circumstances. Advocate Hoy said that the claim made was against Kovzac Ltd and not Mr Dolotiy personally. ED & F Man has already recovered funds from an account held at Merrill Lynch in the USA in the name of Kovzac Ltd. Court Commissioner Philip Le Cras granted the lifting of the injunction against Kovzac due to the failure of the plaintiffs to make full disclosure at the time the injunctions were made in 1998 ñ but at the end of yesterdayí s hearing he announced that the court had decided to reimpose them with new conditions which oblige Advocate Hoyís clients to move on with the proceedings. Mr Le Cras was sitting with Jurats Le Ruez and Bullen. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2615 From: James M. Atkinson, Comm-Eng Date: Sat Mar 3, 2001 11:28am Subject: FEDS TO OFFER FBI 'MOLE' SING-OR-DIE DEAL FEDS TO OFFER FBI 'MOLE' SING-OR-DIE DEAL http://www.nypostonline.com/news/nationalnews/23464.htm By NILES LATHEM WASHINGTON - The feds are ready to dangle a life-preserver in front of accused FBI mole Robert Hanssen: They won't seek the death penalty if he tells all about his spying, The Post has learned. Two officials close to the espionage case said prosecutors plan to open negotiations with Hanssen's high-powered Beltway lawyer, Plato Cacheris, in the next few weeks. In a replay of the 1994 Aldrich Ames case, their priority is getting a complete account of how much damage was done by Hanssen during the 15 years he allegedly sold secrets to the Russians. Cacheris previously represented Ames, who cooperated with probers in exchange for a life sentence and leniency for his co-conspirator wife so she could raise their son. As part of his plea bargain, the money-grubbing double-agent forfeited his government pension, half-million-dollar Virginia home, luxury car and life savings. In Hanssen's case, the feds could seize the $60,000-a-year pension he was five weeks away from collecting, as well as the Virginia home where his wife and six kids live - or sweeten a plea-bargain pot by letting him keep them. "He has a lot riding on this. His family, basically, is being left with nothing," said Paul Moore, a former FBI counterintelligence agent and close friend of Hanssen. "But the question is, what compartment of his life is he in right now? Is he Bob Hanssen, the good Catholic family man? Or is he Bob Hanssen, the spy?" Because Hanssen had broad access to operational secrets for such a long period of time, intelligence officials face the prospect of reviewing virtually all operations since 1985. At the most damaging end of the spectrum, investigators are worried that Hanssen compromised the Special Collection Service program, a joint operation of the CIA and National Security Agency. The "black budget" - or top-secret - program oversees the bugging of overseas embassies and government installations, using the most exotic technologies available. Hanssen shared offices with NSA agents at the State Department, and may have picked up details of the operation there and passed them on to Moscow. A former intelligence official familiar with the program said such a scenario would be "a disaster," allowing other countries to circumvent U.S. bugs or use them to feed disinformation. Meanwhile, the Senate Intelligence Committee grilled Attorney General John Ashcroft, FBI Director Louis Freeh and CIA chief George Tenet about the security breach yesterday. After three hours behind closed doors, Ashcroft pledged to cooperate with all inquiries and "to do what is possible to avoid this kind of breach in the future." Senators said there were sharp questions about FBI procedures, including why the bureau didn't start administering random polygraph tests, as other agencies do, after the Ames scandal. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2616 From: James M. Atkinson, Comm-Eng Date: Sat Mar 3, 2001 11:28am Subject: FBI: COMPUTER FLAWS HELPED ACCUSED SPY FBI: COMPUTER FLAWS HELPED ACCUSED SPY http://www.chicagotribune.com/news/printedition/article/0,2669,SAV-0103010336,FF.html Washington Bureau March 1, 2001 WASHINGTON -- Flaws in the FBI's computer security compounded damage done by accused double agent Robert Hanssen, FBI Director Louis Freeh told the Senate Intelligence Committee on Wednesday. According to a source familiar with testimony Freeh gave in a closed session, Hanssen was able to use FBI computers to gain access to a much broader range of highly sensitive intelligence secrets than bureau officials realized was possible for an agent in his position. Hanssen, an FBI counterintelligence agent proficient in computer technology, is accused of spying for the Soviet Union and Russia for 15 years without being detected. During that time, he held a series of high-level counterintelligence positions at the FBI's Washington headquarters and at its New York field office, a center of counterespionage operations. He is accused of revealing the identities of numerous American double agents within the Russian intelligence agencies and of compromising U.S. electronic eavesdropping efforts. The alleged espionage raises the troubling possibility that significant portions of U.S. intelligence gathered in the past 15 years may be deliberate Russian disinformation. Senate Intelligence Committee Chairman Richard Shelby (R-Ala.) described the damage done to the nation's security as "very, very grave." Several senators questioned Freeh on an incident in which Hanssen acknowledged hacking into a superior's computer, said a source familiar with the committee proceedings. Hanssen told superiors he was demonstrating vulnerabilities in the computer system and the incident was noted in his personnel file, but it set off no alarm bells, Freeh responded. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2617 From: James M. Atkinson, Comm-Eng Date: Sat Mar 3, 2001 11:28am Subject: FBI's choice for spy probe chided FBI's choice for spy probe chided http://www.miami.com/herald/content/news/national/digdocs/071838.htm Critics: Ex-director Webster failed to root out double agents BY LENNY SAVINO Herald Washington Bureau WASHINGTON -- As FBI Director Louis Freeh on Friday considered expanding the use of polygraph tests to root out possible spies, some criticism arose over his earlier choice of former FBI and CIA director William Webster to tell him what went wrong. Webster headed the FBI when alleged spy Robert Hanssen began his espionage career for Moscow, and the CIA while convicted spy Aldrich Ames worked there undetected, critics noted. So he may be as much to blame as anyone, they say, and ill-suited to take an impartial look at the FBI's security lapses. ``How can you appoint the guy who was in charge of the FBI when Hanssen began to spy, and who failed to catch him during his subsequent four years as head of the CIA,'' asked Colin Thompson, a retired CIA officer who spent more than 25 years in counterintelligence. PRESIDENTIAL SUPPORT Webster, 76, a former St. Louis federal judge, headed the FBI between 1978 and 1987 and the CIA from 1987 to 1991. According to court papers, Hanssen started spying in 1985. The FBI watches for spies and counterspies operating in the United States, including CIA double agents. CIA agents, mistrustful rivals of the FBI, watch the FBI for double agents. Webster, who declined through his secretary to be interviewed, enjoys President Bush's firm support. Bush, at a news conference Thursday, praised Webster's selection and said he expected him to come up with a series of recommendations to close holes in the FBI's counterspy procedures. Steve Cimbala, a Penn State professor and expert on counterintelligence, said the key question facing Webster's review is ``how high and wide the responsibility for the Hanssen case will be examined.'' ``The review should be a careful examination of the system that allowed Hanssen to go undetected,'' Cimbala said. ``Not just finding one or two scapegoats.'' The case clearly was not the result of an immediate supervisor's shortsightedness, Cimbala said. ``Spies are expected to be clever,'' he said. ``You're supposed to have a plan to deal with that.'' ALOOF APPOINTEE Former CIA officer Thompson described Webster, during his tenure at the spy agency, as an aloof political appointee uninterested in the details of counterespionage. When Webster arrived at the CIA in 1987, the agency was roiled by the mysterious disappearances and subsequent executions of about a dozen Soviet agents who had been spying for the United States. The idea that a Soviet agent had infiltrated the FBI was hard to resist, and an investigation to ferret out the spy began. The investigation continued but Thompson said it lost momentum by the time Webster left four years later. ``It died when it should have been a high priority,'' Thompson said. ``It became the bad news you didn't want to know.'' The CIA's stalled investigation was detailed in David Wise's book, Nightmover. Oliver ``Buck'' Revell, the FBI's top counterspy during Webster's tenure there, defended his former boss stoutly. ``Bill Webster never impeded or diverted or attempted to obstruct any investigation,'' said Revell. ``If I wanted to fix the system, that's the kind of guy I'd want.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2618 From: James M. Atkinson, Comm-Eng Date: Sat Mar 3, 2001 11:28am Subject: Accused spy's KGB links glimpsed Accused spy's KGB links glimpsed http://www.miami.com/herald/content/news/national/digdocs/019676.htm FBI affidavit reveals a 15-year odyssey Accused spy Robert Philip Hanssen fooled American spy hunters for 15 years. In an odyssey that began in 1985, when he wrote an anonymous letter to a Soviet intelligence agent volunteering to work for the KBG, he allegedly delivered a steady stream of important national security secrets. Included were the identities of clandestine U.S. intelligence resources within the Russian system, at least two of whom were later executed. One served a prison sentence. Hanssen, an agent for the Federal Bureau of Investigation, was charged Tuesday with spying for Moscow. He is also accused of providing what amounted to an ongoing tutorial for Moscow's intelligence agencies in how to penetrate U.S. security systems and avoid the FBI's counterintelligence, some of which he himself helped to design and administer. For all that, the FBI says in court papers filed secretly before he was arrested, Hanssen got some $600,000 in cash and diamonds -- plus an additional $800,000 supposedly set aside for him in a Russian bank. The following are edited excerpts from an FBI affidavit filed in the spying case against Hanssen. The excerpts consist mostly of letters written by Hanssen, who called himself B, and letters written to him by his KGB contacts: OCT. 4, 1985 A KGB political officer in Washington, Viktor M. Degtyar, received an envelope by mail, at his residence in Alexandria, Va. Inside was an envelope marked: ``Do not open. Take this envelope unopened to Viktor I. Cherkashin.'' Cherkashin was the foreign counterintelligence chief at the Soviet Embassy in Washington. Inside the inner envelope was an unsigned typed letter from B. Dear Mr. Cherkashin: Soon, I will send a box of documents to Mr. Degtyar. They are from certain of the most sensitive and highly compartmented projects of the U.S. intelligence community. All are originals to aid in verifying their authenticity. Please recognize for our long-term interests that there are a limited number of persons with this array of clearances. As a collection, they point to me. I trust that an officer of your experience will handle them appropriately. I believe they are sufficient to justify a $100,000 payment to me. I must warn of certain risks to my security of which you may not be aware. Your service has recently suffered some setbacks. I warn that Mr. Boris Yuzhin, Mr. Sergei Motorin and Mr. Valery Martinov have been recruited by our ``special services.'' The letter further stated: Details regarding payment and future contact will be sent to you personally. . . My identity and actual position in the community must be left unstated to ensure my security. . . I will add 6 (you subtract 6) from stated months, days and times in both directions of our future communications. OCT. 24, 1985 Degtyar received by mail a typed message from B in an envelope postmarked New York, N.Y. It gave details of a ``drop'' and included the following instructions on signals for the drop: My signal to you: One vertical mark of white adhesive tape meaning I am ready to receive your package. Your signal to me: One horizontal mark of white adhesive tape meaning drop filled. My signal to you: One vertical mark of white adhesive tape meaning I have received your package. The drop site is located in Fairfax County, Va. On Saturday, Nov. 2, 1985, the KGB dropped off $50,000 in cash. NOV. 8, 1985 Mr. Degtyar and Mr. Cherkashin received a typed letter from B: Thank you for the 50,000. I also appreciate your courage and perseverance in the face of generically reported bureaucratic obstacles. I would not have contacted you if it were not reported that you were held in esteem within your organization, an organization I have studied for years. . . JUNE 30, 1986 Mr. Degtyar received a typed letter from B at his residence that read in part: If you wish to continue our discussions, please have someone run an advertisement in The Washington Times during the week of 1/12/87 or 1/19/87, for sale, ``Dodge Diplomat, 1971, needs engine work, $1,000.'' Give a phone number and time of day in the advertisement where I can call. I will call and leave a phone number where a recorded message can be left for me in one hour. I will say: ``Hello, my name is Ramon. I am calling about the car you offered for sale in The Times.'' You will respond: ``I'm sorry, but the man with the car is not here. Can I get your number?'' The number will be in area code 212. I will not specify that area code on the line.'' JULY 15, 1988 >From B to the KGB: My security concerns may seem excessive. I believe experience has shown them to be necessary. I am much safer if you know little about me. Neither of us are children about these things. Over time, I can cut your losses rather than become one. MAY 7, 1990 >From the KGB to B: Dear Friend: We attach some information requests which we ask your kind assistance for. We are very cautious about using your info and materials so that none of our actions in no way causes no harm to your security. With this on our mind we are asking that sensitive materials and information (especially hot and demanding some actions) be accompanied by some sort of your comments or some guidance on how we may or may not use it with regard to your security. APRIL 15, 1991 >From the KGB to B: Dear Friend: Time is flying. As a poet said: What's our life, If full of care You have no time To stop and stare? You've managed to slow down the speed of your running life to send us a message. And we appreciate it. . . Enclosed in our today's package please find $10,000. Thank you for your friendship and help. We attach some information requests. We hope you'll be able to assist us on them. Take care and good luck. MARCH 14, 2000 B wrote a letter to the Russian Foreign Intelligence Service: I have come about as close as I ever want to come to sacrificing myself to help you, and I get silence. I hate silence. . . Conclusion: One might propose that I am either insanely brave or quite insane. I'd answer neither. I'd say, insanely loyal. Take your pick. There is insanity in all the answers. JUNE 8, 2000 >From B to his contacts: The U.S. can be errantly likened to a powerfully built but retarded child, potentially dangerous, but young, immature and easily manipulated. But don't be fooled by that appearance. It is also one which can turn ingenious quickly, like an idiot savant, once convinced of a goal. The Japanese (to quote General Patton once again) learned this to their dismay. . . -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2619 From: James M. Atkinson, Comm-Eng Date: Sat Mar 3, 2001 11:27am Subject: CIA, FBI can't please panel CIA, FBI can't please panel http://www.miami.com/herald/content/news/national/digdocs/006276.htm Spy case stirs security plan BY LENNY SAVINO Herald Washington Bureau WASHINGTON -- Dissatisfied with FBI Director Louis Freeh's explanation of the Robert Hanssen spy case, members of the Senate Intelligence Committee called Wednesday for a new strategy to prevent more security lapses. ``We're not satisfied with anything at this point,'' said Sen. Richard Shelby, R-Ala., the chairman of the Select Committee on Intelligence, which is investigating the case. ``From what we've learned, what we've been told, this is a very, very grave, serious case.'' Hanssen, 56, a 27-year FBI counterintelligence agent, was charged last week with selling 6,000 pages of classified documents, including the names of at least three Soviet double agents, for $600,000 in cash and diamonds and $800,000 his handlers said was deposited in a Moscow account for him. According to court papers, Hanssen spied for the Russians for 15 years before his arrest. Sen. Bob Graham of Florida, the ranking Democrat on the committee, told reporters that the panel urged Freeh, CIA Director George Tenet and Attorney General John Ashcroft, both of whom also testified at the closed hearing, to develop a better strategy to prevent national security leaks. MANY TOOLS Graham said polygraphs are just one of many tools. Others include internal studies of agents' lifestyles, computer surveillance and personal financial audits, he said. If all these methods were used together they might sound alarms, he said. ``I don't think there's any silver bullet to do one thing and solve [the] problem,'' said Graham, speaking with Shelby after the hearing. As a matter of policy, the CIA and Defense Department test their counterintelligence operatives every five years. The FBI under Freeh and past directors including William Webster -- who is conducting an internal investigation of the Hanssen case -- has been reluctant to make agents take polygraph tests regularly. Freeh began requiring agent applicants to pass a polygraph exam in 1994. LIKELY TO DETER Graham said polygraph tests are not foolproof, but would be helpful. ``I would personally describe the polygraph as being like the metal detector at the airport,'' he said. ``It's more likely to deter someone.'' Freeh declined to discuss issues raised in the hearing, but at least one FBI official hinted Wednesday that plans to use more polygraph testing and more computer surveillance were imminent. Shelby went from saying he had ``a lot of confidence'' in Freeh at the start of the news conference to saying he had ``some confidence'' at the end. ``This committee is going to hold Director Freeh, the director of the CIA [and] the attorney general . . . accountable,'' he said. ``They're working with us and what we're interested in is stopping this as much as we can,'' Shelby said. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2620 From: James M. Atkinson, Comm-Eng Date: Sat Mar 3, 2001 11:27am Subject: Letter among new details released in FBI-spy case Letter among new details released in FBI-spy case http://www.miami.com/herald/content/news/national/digdocs/073213.htm WASHINGTON -- (AP) -- Federal prosecutors on Tuesday released new details of accused spy Robert Philip Hanssen's activities, including a letter in which Hanssen warned his alleged Russian handlers on the day of his arrest that ``something has aroused the sleeping tiger.'' Weapons and ammunition were found in Hanssen's home in Vienna, Va., including an AK-47 and 13 handguns and pistols, according to the results of a search warrant. According to a new affidavit, the FBI recovered a computer disk from a package that Hanssen dropped at a Virginia park Feb. 18 that contained a coded letter. In the letter, Hanssen seems to signal that his relationship with the Russians was at an end because he had received a new FBI position excluding him from obtaining sensitive documents, the document alleged. SIGNED BY `RAMON' ``It seems . . . that my greatest utility to you has come to an end, and it is time to seclude myself from active service,'' said the letter, signed ``Ramon Garcia,'' detailed in the affidavit. The FBI has alleged that Hanssen's code name was Ramon Garcia. ``Ramon'' said he detected radio signal bursts in his car, arousing his suspicions. ``Amusing the games children play . . . something has aroused the sleeping tiger. Perhaps you know better than I,'' said the letter released by prosecutors. Investigators were searching for ``large amounts of United States and foreign currency . . . precious metals, jewelry and other items of value,'' according to a search warrant released Tuesday. A list of items found did not include those items. Also being sought: passports, licenses and visas in fictitious or alias identities and records reflecting property sales and purchases both within the United States and abroad. ITEMS FOUND Investigators found in Hanssen's 1997 Ford Taurus seven floppy disks, computer equipment, a folder marked ``Hong Kong,'' a bottle of Stolichnaya vodka and two photos of actress Catherine Zeta Jones. Two envelopes marked ``secret'' and addressed to Stapleton Roy also were found in the car. Roy was director of intelligence at the State Department who resigned in December after one of his deputies was reassigned in a dispute over a missing laptop computer that contained classified information. The FBI has alleged that Hanssen, 56, received more than $600,000 in cash and diamonds, and $800,000 more had been set aside for him in an overseas escrow account. The search warrant says the money and valuables are ``illicit proceeds . . . from multiple years of engaging in espionage for pay from the Soviet Union and successor Russian Federation and their intelligence services.'' ACCOUNTS FOUND Investigators also found records of financial accounts that were Hanssen's but in phony names or aliases. Account statements from Credit Suisse and Bank Leu were found. Hanssen is scheduled for his preliminary appearance at a hearing in federal court in Alexandria, Va., on Monday. The nine-page affidavit was filed in U.S. District Court in the District of Columbia in support of search warrants for Hanssen's offices at the FBI and the State Department. Hanssen, a 25-year FBI veteran and counterintelligence expert, was arrested Feb. 18 and charged with espionage. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2621 From: James M. Atkinson, Comm-Eng Date: Sat Mar 3, 2001 11:27am Subject: FBI's vulnerability to Russian mole demands answers. http://www.miami.com/herald/content/opinion/editorials/digdocs/090927.htm FBI's vulnerability to Russian mole demands answers. Published Monday, February 26, 2001, in the Miami Herald There's good reason why federal law permits the death penalty for convicted spies. Spying is treachery of the worst kind: It costs millions of dollars and often results in death for exposed agents. Then why did the FBI fail for 15 years to unmask an alleged master spy within its ranks? That's a critical question that must be answered. This week, U.S. Sen. Bob Graham, D-Fla., will conduct a closed hearing before the Senate Select Committee on Intelligence, which he co-chairs, into the botched safeguards that preceded Robert Philip Hanssen's arrest last week. Those hearings should help to spur changes in the bureau's procedures that appear to be desperately needed. Mr. Hanssen, a counterintelligence expert, is believed to have passed thousands of pages of highly classified documents to the Soviets before 1989, and then to the Russians until he was arrested in a Virginia park. The toll of his betrayal, if proven true, is mind-boggling. He is believed to have turned over listening technologies, programs describing U.S. intelligence-gathering techniques and names of U.S. double agents. The data may have cost the United States hundreds of millions of dollars and is strongly linked to the deaths of at least two counterintelligence Russian agents. As damaging as Mr. Hanssen's betrayals may have been, the Justice Department's reaction seems almost casual. Attorney General John Ashcroft last week appointed former FBI director William Webster to review the bureau's internal procedures. Although Mr. Webster served honorably under Presidents Carter and Reagan, a more independent, reform-minded examination may be needed. The FBI cannot become known more for the cases it bungles rather than the ones that it solves. It hasn't yet recovered from its handling of the case against nuclear scientist Wen Ho Lee, which a federal judge forced the prosecution to drop. Despite being warned for years to tighten its internal security, the FBI until now has rejected suggestions that it give periodic polygraph tests to veteran agents, although it does so with new agents. The CIA does so with all its operatives. Such lax procedures in a game of such high stakes can't continue. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2622 From: James M. Atkinson, Comm-Eng Date: Sat Mar 3, 2001 11:27am Subject: US spy bosses hunt for second 'mole' [Moderates Note: Wake up Louis Freeh, No intelligence agency uses just one spy against the opposition, and it is well known that long term spies always come in sets. There are also a plethora of simple, inexpensive, and effective methods to very quickly ferret the remaining spies out. ] US spy bosses hunt for second 'mole' http://www.ananova.com/news/story/sm_225718.html?menu= A second spy may have infiltrated America's security services to betray its secrets to the Russians. The New York Post reports the FBI and CIA believe double agent Robert Hanssen, who was arrested last month, may not have worked alone. Hanssen is alleged to have compromised operations in the US and abroad by selling confidential information he received as a senior counter-intelligence official. He now faces death if convicted of the crime. The newspaper says the inquiry into Hanssen is focusing on why Russian agents did not pick up classified documents he left in a public park near Washington, a drop which led to his arrest. "The question is why didn't the Russians show up and collect the documents," an unnamed intelligence official told the paper. "We know Hanssen was surprised when he was arrested. Were they warned off by someone else?" The FBI had been watching Hanssen for weeks and arrested him when he dropped the documents - which included a letter telling his handlers he believed he was under surveillance and he was ending his spying. They left the documents in place and waited for 24 hours for the Russians to arrive, but they did not show and the intelligence agency was forced to admit they had arrested Hanssen as the news leaked out in Washington. The newspaper reported some of Hanssen's messages to his handlers referred to "old friends" and recruiting other Americans as spies. And some operations which were found to have been compromised could not have been linked to the mole, the paper reported. Agents are now set to undergo polygraph lie detector tests in a bid to find the suspected second traitor, a move backed by the chairman of the Senate's intelligence committee. Last updated: 13:49 Friday 2nd March 2001 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2623 From: James M. Atkinson, Comm-Eng Date: Sat Mar 3, 2001 11:27am Subject: Spy-Case Indictment Postponed Spy-Case Indictment Postponed http://www.washingtonpost.com/wp-dyn/articles/A9977-2001Mar1.html Two Sides Cooperating; Suspect Gets Access to Evidence By Brooke A. Masters and Walter Pincus Washington Post Staff Writers Friday, March 2, 2001; Page A08 Prosecutors and attorneys for accused spy Robert P. Hanssen have reached an agreement that will postpone indictment of the FBI counterintelligence expert for at least two months and give his lawyers early access to evidence. The government, under a joint motion filed in U.S. District Court in Alexandria yesterday, now has until May 21 to hold a preliminary hearing or indict Hanssen, a veteran FBI agent who could face execution if convicted of revealing the names of two Soviet intelligence officers working secretly with the FBI who later were executed. The agreement shows that the two sides are cooperating and gives the defense a chance to see whether it can question the government's evidence, including the authenticity of documents that supposedly came from Russian intelligence archives, sources said. Hanssen, a Vienna father of six, has been accused of passing more than 6,000 pages of documents to Moscow in exchange for $1.4 million. In a filing yesterday, prosecutors said that at the time of his Feb. 18 arrest, Hanssen was carrying his passport and a current Swiss bank account statement in his briefcase. "This is a spy who remained active until handcuffed," Assistant U.S. Attorney Randy I. Bellows wrote. "There were essentially no limits on what Hanssen was willing to do." Yesterday's agreement to take a timeout from public hearings gives the defense a chance to interview Hanssen at length and review government documents. It also reflects the unusual dynamic of espionage cases, lawyers with experience in these cases said. By the time the government arrests a suspected spy, prosecutors generally have spent months or years building a detailed and damning case, using secret searches, clandestine operations and confidential informants. But at the same time, federal officials generally prefer not to expose their sources in open court. In fact, the agreement postpones an evidentiary hearing that had been scheduled for Monday. Hanssen also agreed not to contest detention. Attorney General John D. Ashcroft said yesterday that the FBI will expand its use of lie-detector tests in the wake of the Hanssen case, despite reservations about the effectiveness and accuracy of polygraphs. But Ashcroft and other officials declined to provide details of the new program, or to say how many FBI employees it might affect. One Justice Department official said polygraphs will be given to "individuals who by nature of their assignment have access to sensitive information," but the official could not say what kind of information that would include. Polygraphs have been conducted on all new agents and other employees at the FBI since 1994 and on some agents with access to sensitive information. However, Hanssen, who had access to some of the nation's most sensitive intelligence secrets, was never required to take a lie-detector test. Eventually, prosecutors could offer not to seek the death penalty in exchange for interviews with Hanssen to learn exactly what he turned over to the Russians for the past 15 years. But sources said that kind of talk is premature for two reasons: The Bush administration has no established procedure for considering potential capital cases, and the defense may be able to convince a judge that Hanssen's alleged crimes don't fit the legal requirements for the death penalty. "There have been no plea discussions whatsoever," said Preston Burton, one of Hanssen's attorneys. "We've not initiated it, and they have not initiated it." Prosecutors have filed a 109-page affidavit describing dozens of exchanges in which Hanssen allegedly received $1.4 million in cash, diamonds and escrowed money for turning over dozens of highly classified documents. FBI officials said Hanssen was arrested leaving classified documents for his handlers at a Northern Virginia park. The affidavit also says Hanssen "compromised . . . technical operations of extraordinary importance and value." Among other things, sources said, Hanssen allegedly gave Moscow information about highly sophisticated overseas bugging operations run by the super-secret Special Collection Service. "I think the government has a pretty strong hand here," said former U.S. attorney Joseph diGenova, who prosecuted Israeli spy Jonathan Pollard. "You want a damage assessment, but there isn't very much the government is going to be willing to give up . . . except execution." But other analysts note that the Hanssen affidavit is silent about the period from 1992 to mid-1999, suggesting that there may be significant holes in the government's knowledge. Analysts said that Hanssen's help in filling that gap could give his attorneys bargaining power. A life-for-information deal would be irrelevant if Hanssen's attorneys can convince a judge that the death penalty should not apply. Congress did not revive the death penalty for espionage until after the 1994 case of Aldrich H. Ames, and then limited it to spies who reveal nuclear secrets or cause the death of American agents. Hanssen allegedly betrayed two Russian double agents in 1985, well before the law changed. The Constitution prevents most laws from being applied retroactively, but the U.S. Supreme Court has made an exception for certain kinds of death penalty statutes, lawyers said. The espionage statute has never been tested. The capital case also carries risks for the government because prosecutors would have to call Russian informants to connect Hanssen directly to the executions of KGB officers Sergey Motorin and Valeriy Martynov, some experts said. "You would have to show not only a chain of custody for the letters, but also show [Hanssen] received the money," said Georgetown University law professor Paul Rothstein. If the death penalty gets taken off the table, prosecutors would have to find another stick with which to pressure Hanssen. In Ames's case, they threatened to put his wife in prison for decades, but then worked out a deal in which she would serve five years if Ames accepted a life sentence and cooperated with investigators. But there is no indication that Hanssen's wife, Bonnie, knew anything. "Mrs. Hanssen was not involved. Neither she nor anyone in the family had any knowledge," said her attorney, Janine Brookner. In other spy cases, prosecutors and defense attorneys have haggled over the length of the prison sentence. But Bellows wrote in yesterday's filing that Hanssen faces a "true life sentence" because he passed "Top Secret" documents. Staff writer Dan Eggen contributed to this report. © 2001 The Washington Post Company -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2624 From: James M. Atkinson, Comm-Eng Date: Sat Mar 3, 2001 11:27am Subject: To Find a Spy To Find a Spy http://www.washingtonpost.com/wp-dyn/articles/A11684-2001Mar1.html By Jeffrey H. Smith Friday, March 2, 2001; Page A25 The arrest of FBI Special Agent Robert Hanssen raises once again the painful question of how to catch a spy. FBI Director Louis Freeh has wisely asked former FBI and CIA director William Webster to conduct an independent review of what went wrong, why it took the bureau some 15 years to discover Hanssen's alleged espionage and what steps must be taken to make sure it doesn't happen again. When Aldrich Ames was arrested in 1994, it sent shock waves through the CIA and led to a number of reforms. Now it's the FBI's turn. The FBI is under pressure to make changes, particularly to make greater use of the polygraph. But before reaching hasty conclusions, we should take a deep breath and consider which of the post-Ames changes worked and which didn't. Many in the CIA simply did not believe there could be a spy in their midst. Fortunately, a few determined officers always believed there could be a mole, and they finally got their man. But the great damage done by Ames and the fact that it took some nine years to find him led to a public outcry for reform. The CIA resisted some of the reforms, and some were adopted only after Congress enacted specific legislation. Other changes were adopted only after a bitter interagency struggle -- for example, putting an FBI agent in charge of the counterespionage effort at the CIA. Many of the changes made after the Ames case did improve counterintelligence efforts. Chief among these was greater cooperation between the CIA and FBI -- and a recognition that the CIA was not immune to having a spy in its midst. These changes proved their worth when Harold Nicholson, another CIA officer, was arrested in 1996, some two years after he volunteered his services to the Russians. But the post-Ames efforts also had a dark side. Unlike FBI agents, CIA officers have been routinely polygraphed -- even before the Ames affair. According to reports in The Post, in the wake of the Ames case the FBI and CIA reviewed the polygraph records of a large number of CIA employees and identified many who seemed to have problems. Under procedures required by a newly adopted law, those cases were referred to the FBI, where criminal investigations were opened. In some cases, serious problems were identified and dealt with by the CIA. In many other cases, there was nothing in the record other than a "significant physiological response" to a question on the polygraph. Most of these cases languished for an unconscionably long time at the FBI -- in some cases years -- before being returned to the CIA, where the officer could finally get on with his or her career. While the CIA felt that there could never be a spy at the agency, in large part because of the polygraph, the FBI felt there was never a need to polygraph all agents because they were special. Both were wrong. Now we have to get it right. The polygraph is far from a perfect tool. Honest people have "failed" polygraph examinations and dishonest people have "passed" them. It is a rather simple instrument that measures certain physiological responses -- e.g., breathing, heart rate and galvanic skin reaction, in response to a set of questions asked by an examiner. The basic theory is that when a person knowingly lies, he or she will have a measurable physiological response. Maybe so. But the polygraph is intrusive and can be abused. Secretary of State George Shultz was a hero to the State Department when he refused to let the department's officers be polygraphed as a condition of getting access to our most highly classified intelligence information. If the FBI chooses to use the polygraph, it must do so wisely. The polygraph is only one tool in an effective counterintelligence program. It can help, but if misused it can also cause morale to plummet and ruin innocent careers. Perhaps more important, it can lead to overconfidence -- as it did at the CIA prior to the arrest of Ames. The key to a good polygraph program is that the examiner must be a trained and experienced investigator. Too frequently, that is not the case. Agencies that choose to use the polygraph must ensure that examiners are adequately trained, that they have long-term career opportunities and, most important, that vigorous safeguards are in place to protect the rights and dignity of all employees. A fundamental principle must be that no adverse personnel action should be taken solely on the basis of the results of a polygraph examination. Effective counterintelligence is hard work. The Clinton administration developed a plan, known as "CI21," for Counterintelligence in the 21st Century, that seeks to address counterintelligence in a comprehensive fashion. Recent news reports that the Bush administration intends to implement the plan vigorously are encouraging. Furthermore, it's hard to find good counterintelligence and security officers. Too often, they are not widely admired within their agencies, and bright young men and women are not encouraged to pursue a career in these fields. That must change. Finally, the number of people with knowledge of sensitive counterintelligence investigations goes far beyond those CIA and FBI officers working on the matter. Justice Department lawyers, officials at other agencies and in the armed forces, and the White House/National Security Council staff are often kept informed. Certain members of Congress and the senior staff of the congressional intelligence oversight committees are, by law, kept "fully and currently informed" of these investigations. If we believe that polygraphs are going to solve our counterespionage problems, it's difficult to conclude that these individuals should not also be polygraphed. The polygraph is the classic two-edged sword. It can help preserve our security, but at a cost. In a free society, our goal must be to make that cost -- in terms of innocent lives harmed -- zero. The writer is an attorney and former CIA general counsel. © 2001 The Washington Post Company -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2625 From: James M. Atkinson, Comm-Eng Date: Sat Mar 3, 2001 11:27am Subject: FBI Expands Lie-Detector Tests [Moderators Note: Polygraphs are only useful when the subject is gullible and it is useful as a preventative measure to "keep honest people, honest", but they are fairly worthless for ferreting out spies or a seasoned subject.] FBI Expands Lie-Detector Tests http://dailynews.muzi.com/ll/english/1052686.shtml [LatelineNews: 2001-3-2] WASHINGTON - The FBI is expanding employee lie-detector tests and monitoring of worker access to sensitive information in response to allegations that a veteran counterintelligence agent spied for Moscow for 15 years, AP reported. Attorney General John Ashcroft said Thursday there is evidence that polygraphs do not always work to deter internal security breaches. But he said that ``because of the national security involved,'' he and FBI Director Louis Freeh agreed that more polygraphs should be conducted following the arrest of Robert Philip Hanssen, a 25-year veteran agent accused of spying for Russia and the Soviet Union. ``There have been cases in the past that polygraphing did not work on,'' Ashcroft said at a news conference. ``Nevertheless, I believe that there are applications for polygraph that are important.'' ``The director and I have agreed that because of the national security involved and the very important consequences of the breaches, that we should elevate the use of polygraph in certain cases,'' said Ashcroft. The FBI would not comment. The FBI also is changing the way it audits access to information to catch workers who improperly seek data, Ashcroft said. FBI agents are given polygraph tests when they apply to join the bureau but usually are not tested again unless they need a higher level of clearance. Justice Department officials said that policy would be expanded; they declined to elaborate. Ashcroft said the additional polygraphs are an interim step while the FBI's internal security procedures are reviewed by former CIA and FBI director William Webster, who will recommend how to tighten security. Meanwhile, federal prosecutors asked a judge to keep Hanssen jailed pending further action on his case. In a proffer filed Thursday in U.S. District Court in Alexandria, Va., the government said the risk that Hanssen will flee the country and the gravity of his alleged crimes mean that he should not be released. ``No conditions of release will reasonably assure either his appearances in court or the safety of our country,'' according to the filing signed by U.S. Attorney Helen Fahey. Among the evidence cited to support its request, the FBI said it had recovered statements from Hanssen's Swiss bank account and letters in which the Russians and Hanssen allegedly discuss how to hide money in a Swiss bank account. The FBI alleged that, in exchange for providing top secret information, Hanssen had received more than $600,000 in cash and diamonds, and an additional $800,000 had been set aside for him in an overseas escrow account. Investigators also found in locked safes in Hanssen's office at the State Department a file entitled ``Russian Espionage'' containing 20 to 30 documents on Felix Bloch and a sensitive classified technical intelligence collection program, an affidavit showed. The FBI has alleged that Hanssen tipped off the KGB to the FBI's secret investigation of Bloch, a foreign service agent suspected of spying for Moscow in 1989, but never arrested. A detention and preliminary hearing were scheduled for Monday. Federal prosecutors and Hanssen's attorney have asked a federal magistrate to postpone the hearing until May 21 to allow both sides more time to prepare the case. Both sides agree that the facts of the case ``are unusual and complex.'' They also agreed to ask for an extension of time for filing an indictment until May 21. Hanssen's lawyers did not immediately return telephone messages Thursday. The government has alleged that Hanssen passed along to Soviet and later Russian agents 6,000 pages of documents on secret programs that described how the U.S. gathers intelligence, technologies used for listening, people who work as double agents and other highly sensitive matters. Also Thursday, the State Department confirmed that Hanssen carried secret intelligence documents regularly between the State Department and FBI headquarters. >From 1995 until January, Hanssen was assigned by the FBI to the department's office of foreign missions, which monitors foreign diplomats. State Department spokesman Richard Boucher said Hanssen acted as a liaison ``helping transmit documents, move documents and information back and forth between the two agencies.'' Printer-friendly version Muzi.com News http://latelinenews.com -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2626 From: James M. Atkinson, Comm-Eng Date: Sat Mar 3, 2001 11:27am Subject: FBI HUNTS 2ND SPY IN ITS RANKS FBI HUNTS 2ND SPY IN ITS RANKS http://www.nypostonline.com/news/nationalnews/25228.htm Friday,March 2,2001 By NILES LATHEM WASHINGTON - Spycatchers who strongly suspect Robert Hanssen wasn't the only Russian mole inside the U.S. intelligence community have begun grilling dozens of government employees. The hunt for a second traitor moved forward as the FBI announced new security measures, including polygraph tests for agents, to catch spies in its ranks. The efforts to find other moles feeding secrets to Moscow intensified after Hanssen's Feb. 18 arrest - because Russian agents never showed up to collect classified documents the FBI veteran left in a Virginia park, sources said. "The question is why didn't the Russians show up and collect the documents?" said an intelligence official connected to the case. "We know Hanssen was surprised when he was arrested. Were they [the Russians] warned off by someone else?" The FBI, which had Hanssen under surveillance for weeks, arrested him on a Sunday afternoon after he dropped off documents, including a coded letter expressing fears he was under suspicion. Agents left the documents in place and waited 24 hours for Russian agents, but they never appeared, sources said. With news of the arrest starting to leak and Hanssen's family hiring high-powered lawyer Plato Cacheris, the FBI had no choice but to announce the arrest earlier than intended, officials close to the probe said. The mysterious Russian no-show is one of several clues pointing to the specter of another American double agent. Hanssen's communiquÈs with his Russian handlers contain references to "old friends" and exchanges about recruiting other Americans as spies. Investigators also say there are some intelligence operations in this country and overseas that were compromised but cannot be linked to Hanssen. The possibility that America's most closely guarded secrets are still at risk was raised by members of the Senate Intelligence Committee this week after a briefing from FBI Director Louis Freeh, CIA Director George Tenet and Attorney General John Ashcroft. "You know there will probably be other spies. Don't be surprised," committee Chairman Richard Shelby (R-Ala.) said. After the meeting, Ashcroft and Freeh decided "We should elevate the use of polygraph in certain cases" as an interim security measure, the attorney general said. The prospect of more spies at U.S. intelligence agencies is one reason prosecutors are anxious to move on a plea deal with Hanssen. They may drop the death penalty and allow Hanssen's family to keep his pension in exchange for Hanssen spilling the beans, including the identity of other moles. The FBI has already interviewed and cleared a handful of people close to Hanssen, including his wife Bonnie and retired Army Col. Jack Hoschouer. The Washington Times reported probers believe the Russians tried to recruit Hoschouer in the early 1990s at Hanssen's recommendation, but he spurned the approach. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2627 From: James M. Atkinson, Comm-Eng Date: Sat Mar 3, 2001 11:40am Subject: Ratcheting Up Security Ratcheting Up Security http://more.abcnews.go.com/sections/us/dailynews/spy010228.html FBI Director Louis Freeh is planning new measures to improve internal security in the wake of the Hanssen spy probe - including random and periodic lie detector testing of employees, ABCNEWS has learned. The polygraph tests will initially focus on agents and personnel who have access to the bureau's most sensitive data, particularly national security information, but it may be expanded to the entire bureau, a senior FBI source said. Nearly 400 FBI personnel were given polygraph examinations before they were allowed to work on the Hanssen case, ABCNEWS has learned. The move to expanded polygraphing is significant, since it has long been opposed by bureau rank-and-file. Employees question the viability of the tests - even though the CIA and NSA regularly use them. Freeh has been criticized for not implementing the tests earlier. Currently, polygraphing is used primarily on potential employees and people being brought into sensitive investigations. The announcement was made internally at the bureau on Wednesday, sources said, but it was not clear when the testing would begin. FBI counterintelligence agent Robert Hanssen, arrested earlier Feb. 18 on charges of spying for the Soviet Union and Russia after a 25-year career in the agency, was apparently never subjected to a lie detector test. Hanssen's colleagues say he was well-positioned to pose a serious threat to national security. "From '87 to June of 1990, he is really at the heart of the Soviet program because he is deputy chief of analysis," said David Major, a former counterintelligence official. "You have to have a few people who know everything, and so in that position all the collection and all the activity that was going would filter into his unit." Checking for the Checking The FBI will also implement enhanced computer security measures, including an expanded audit system, sources told ABCNEWS. The audits will focus on a number of areas, including: flagging instances when an agent repeatedly checks his or her own name to see if he or she is under investigation - something Hanssen apparently did - and notifying supervisors when an agent is perusing sensitive, classified material that is not directly related to their work. The revelations come after Freeh appeared in front of the Senate Intelligence Committee on Wednesday afternoon, to answer questions on why it took so long to uncover the case of Hanssen, who has been accused of spying for Moscow over 15 years. The FBI says Hanssen sold secrets to Moscow for $1.4 million in money and diamonds. He is accused of passing information on U.S. surveillance methods and the names of double agents - two of whom were executed. ABCNEWS' Pierre Thomas at the Justice Department contributed to this report. Copyright © 2001 ABC News Internet Ventures. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2628 From: Date: Sat Mar 3, 2001 11:26pm Subject: U.S. thinks Hanssen told Soviets of tunnel - paper U.S. thinks Hanssen told Soviets of tunnel - paper WASHINGTON, March 3 (Reuters) - The United States built a secret tunnel under the Soviet Embassy in Washington, but investigators believe the operation was betrayed by the FBI agent arrested last month on charges of spying for Moscow, The New York Times reported on Saturday, citing current and former intelligence and law enforcement officials. The secret tunnel operation, which officials indicated was run jointly by the FBI and the National Security Agency, was part of a broad U.S. effort to eavesdrop on Soviet -- later Russian -- facilities and personnel operating in the United States, the paper wrote in its Internet edition on Saturday. Spokesmen at the FBI and the White House declined to comment to the Times on the tunnel operation. Current and former U.S. officials estimated that the tunnel construction and related intelligence-gathering activities cost several hundred million dollars, apparently making it the most expensive clandestine intelligence operation that the agent, Robert Hanssen, is accused of betraying, the Times said. The tunnel was reportedly designed as part of a sophisticated operation to eavesdrop on communications and conversations in the Soviet Embassy complex, which was built in the 1970s and 1980s. In the 1980s, at about the time the tunnel operation was under way, the United States and the Soviet Union argued bitterly over their respective embassies in Moscow and Washington, with the United States accusing Moscow of spying at both locations, the paper said. The U.S. government has never publicly disclosed the existence of the tunnel, but in an FBI affidavit in the Hanssen case, the government said that Hanssen "compromised an entire technical program of enormous value, expense and importance to the United States government," the Times report said. The Times said officials told them that that referred to the tunnel operation and related intelligence activities. U.S. News & World Report magazine reported in its March 12 issue, out on newsstands on Monday, that officials blamed Hanssen for compromising at least two highly sensitive FBI counterintelligence programs. Hanssen, arrested on Feb. 18, has been accused of spying for Moscow since 1985. He has been accused of giving Moscow secrets that included names of double agents, as well as U.S. electronic surveillance methods. The Times said it could not be determined when the government believed Hanssen betrayed the tunnel operation. 23:20 03-03-01 2629 From: Date: Sun Mar 4, 2001 0:11pm Subject: No comment from US on Russian embassy tunnel claim No comment from US on Russian embassy tunnel claim WASHINGTON, March 4 (Reuters) - U.S. Vice President Dick Cheney said on Sunday he couldn't say whether the United States built a secret tunnel under the Soviet Embassy in Washington, which officials believe was revealed to the Russians by the FBI agent arrested last month on charges of spying for Moscow. But while declining to confirm a report by The New York Times, Cheney said he believed there were grave implications to the case of accused spy Robert Hanssen, who may have caused considerable damage to U.S. security. "I believe so," Cheney told the CBS "Face the Nation" program. "I assume, given the nature of his responsibilities and the length of time he worked for the Russians, which looks like about 15 years, that in fact it was very serious." A spokeswoman for the FBI also declined to comment on the report, which cited current and former intelligence officials as saying the tunnel operation, run jointly by the FBI and the National Security Agency, was revealed to Moscow by Hanssen. Cheney said that if the report were true he "couldn't talk about it anyway," but an assessment would have to be made to determine the full extent of the damage caused by Hanssen. "Then we'll have a good fix on exactly how much was in fact compromised," he said. The secret tunnel operation was reportedly part of a broad U.S. effort to eavesdrop on Soviet -- later Russian -- facilities and personnel operating in the United States, the Times said. Cheney told CBS the United States had not heard from the Russians about the revelation. "Not in any official sense, no," he said. Current and former U.S. officials estimated the tunnel construction and related intelligence-gathering activities cost several hundred million dollars, apparently making it the most expensive clandestine intelligence operation Hanssen is accused of betraying, the Times said. The tunnel was reportedly designed as part of a sophisticated operation to eavesdrop on communications and conversations in the Soviet Embassy complex, which was built in the 1970s and 1980s. The U.S. government has never publicly disclosed the existence of the tunnel, but in an FBI affidavit in the Hanssen case, the government said that Hanssen "compromised an entire technical program of enormous value, expense and importance to the United States government." U.S. News & World Report magazine reported in its March 12 issue, published on Monday, that officials blamed Hanssen for compromising at least two highly sensitive FBI counterintelligence programs. Hanssen, arrested on Feb. 18, has been accused of spying for Moscow since 1985. He has been accused of giving Moscow secrets that included names of double agents, as well as U.S. electronic surveillance methods. 17:20 03-04-01 2630 From: James M. Atkinson, Comm-Eng Date: Sun Mar 4, 2001 10:04pm Subject: Russia couldn't afford FBI agent, says ex-spy chief Saturday, March 03, 2001, 12:00 a.m. Pacific Russia couldn't afford FBI agent, says ex-spy chief http://seattletimes.nwsource.com/cgi-bin/WebObjects/SeattleTimes.woa/wa/gotoArticle?zsection_id=268448413&text_only=0&slug=hanssen03&document_id=134271578 by The Associated Press MOSCOW - A former Russian security chief said yesterday that the country was too broke to afford the services of alleged FBI spy Robert Hanssen and accused Washington of seeking to discredit Russia by claiming he was Moscow's agent. According to the FBI, Hanssen received more than $600,000 in cash and diamonds, and an additional $800,000 had been set aside for him in an overseas escrow account as payment for 15 years of spying. "Russia simply does not have that kind of money," said Nikolai Kovalyov, a former chief of Russia's Federal Security Service. According to the FBI, Hanssen began spying for the Soviet Union in 1985, when the Communist government spent lavishly on its intelligence operations and agents. Kovalyov, whose agency is the main successor to the Soviet-era KGB, did not deny Hanssen had worked for Moscow, saying only that the FBI's evidence was too flimsy to justify the investigators' conclusions. "His employers could have been anyone. Why is this assigned to Russia?" Kovalyov said at a news conference. Kovalyov claimed the Hanssen case was part of an elaborate plan by the Bush administration to make Americans forget about his turbulent election victory and expand his support base at home. Kovalyov cited Washington's insistence on building a national missile-defense system - which Moscow opposes - as another manifestation of the same plan. "All these steps ... are steps by the new U.S. president aimed at strengthening his position in the country," Kovalyov said. Hanssen is accused of passing to Soviet and later Russian agents 6,000 pages of secret documents that contained information about how the U.S. gathers intelligence, technologies used for listening, people who work as double agents and other highly sensitive matters. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2631 From: James M. Atkinson, Comm-Eng Date: Sun Mar 4, 2001 10:04pm Subject: FBI 'MOLE' SAYS NO TO PLEA DEAL FOR HIS LIFE FBI 'MOLE' SAYS NO TO PLEA DEAL FOR HIS LIFE http://www.nypostonline.com/news/nationalnews/25338.htm Saturday,March 3,2001 By NILES LATHEM and ANDY GELLER Accused FBI spy Robert Hanssen has this answer to the feds' sing-or-die offer: no deal for now. "I will not indulge in plea negotiations at this time," Plato Cacheris, Hanssen's high-powered Beltway lawyer, told The Post last night. Eager to find out how much damage Hanssen had done, the feds are ready to dangle a life preserver in front of him: They won't seek the death penalty if he comes clean about his spying. But sources close to the defense say the Justice Department's case has "holes in it" and they intend to pursue a not-guilty plea. In 1994, Cacheris worked out a deal for Aldrich Ames, who pleaded guilty to spying for the KGB for nine years. In return for cooperating with investigators, Ames got a life sentence and leniency for his co-conspirator wife so she could raise their son. The feds were eager to strike a quick deal with Hanssen so they could assess the damage he did during the 15 years he allegedly spied for Moscow - and find out if there are other moles in U.S. intelligence operations. To that end, they released an extraordinarily detailed 100-page affidavit when Hanssen was arraigned last week, hoping to convince him they had an airtight case. And every official who discussed the case mentioned the death penalty. Earlier this week, both sides agreed to delay the legal proceedings to give Cacheris a chance to assess the evidence. Prosecutors are hoping that once he does, he may go for a deal. As the maneuvering goes on, the State Department is warring with the Justice Department, the CIA and the FBI over whether to expel Russian diplomats in retaliation for the Hanssen case. The State Department says no, fearing the move would exacerbate tensions with Russia. But the other three agencies favor it, arguing that it would disrupt Russian intelligence operations. Meanwhile, former Russian security chief Nikolai Kovalyov said Moscow did not have enough money to pay Hanssen what the FBI charges he got. The FBI says Hanssen received more than $600,000 in cash and diamonds, and an another $800,000 was set aside for him in an overseas escrow account. "Russia simply does not have that kind of money," claimed Kovalyov, a former chief of Russia's Federal Security Service. Kovalyov, whose agency is the main successor to the KGB, did not deny Hanssen had worked for Moscow. He said only that the evidence is too flimsy to justify the FBI's conclusions. "His employers could have been anyone. Why is this assigned to Russia?" Kovalyov said. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2632 From: James M. Atkinson, Comm-Eng Date: Sun Mar 4, 2001 10:05pm Subject: Deal May Be Best Bet in Spy Case Deal May Be Best Bet in Spy Case http://www.latimes.com/news/nation/20010303/t000018790.html Espionage: Telling all might help Hanssen avoid a death sentence, experts say. A plea bargain would also protect sensitive national security data. By ERIC LICHTBLAU, ROBERT L. JACKSON, Times Staff Writers WASHINGTON--Against what prosecutors call "overwhelming" evidence of his wrongdoing, suspected spy Robert Philip Hanssen's best hope for avoiding a possible death sentence may be to strike a deal and tell all to the government, according to legal and espionage experts. A plea bargain could prove attractive to prosecutors as well, providing a clean and relatively quick way to avoid a public airing of sensitive national security information surrounding what has become the worst spy scandal in the FBI's history. And such a tack, common in spy cases, would allow intelligence officials to plunge more quickly into the laborious task of debriefing Hanssen and figuring out exactly what secrets he may have given the Russians, experts said. "Espionage cases are often very difficult to try. The paramount reason is that you don't want to do more damage during the trial than during the commission of the espionage," said Rep. Adam B. Schiff (D-Burbank), who prosecuted the infamous case of FBI spy Richard W. Miller in Los Angeles a decade ago. "Whatever information Hanssen may have passed on to the Russians you don't want transmitted to the rest of the world," Schiff said in an interview. Compromise Possible in Hanssen Case Hanssen, a former FBI counterintelligence agent, stands accused of espionage for allegedly passing secrets to the Russians over a period of 15 years in exchange for $1.4 million in cash and diamonds. As politicians hold briefings and consider long-term security reforms, Justice Department criminal lawyers are beginning the more immediate task of poring over the voluminous evidence in the case and litigating the charges against Hanssen. Hanssen intends to plead not guilty. While lawyers on both sides decline to discuss strategy and insist it is still too early to speculate about a plea bargain, they have already shown a willingness to compromise. Earlier this week, the defense and the prosecution reached an agreement putting off Hanssen's next court date until May 21. That gives the defense more time to examine the prosecution's evidence, while agreeing not to fight for Hanssen's pretrial release. "The case against him is overwhelming," federal prosecutors wrote this week. "If convicted, he faces either life in prison or the death penalty." After the apprehension of CIA spy Aldrich H. Ames in 1994, Congress toughened espionage penalties to allow the death sentence to be imposed even in peacetime if a suspect had caused the death of U.S. agents or compromised nuclear secrets. Prosecutors are still considering whether to seek the death penalty against Hanssen, according to officials familiar with the case. The chief argument for doing so would be the FBI's belief that Hanssen helped the Russians unmask several "moles," leading to the execution of two double agents working for the United States. But a lawyer familiar with the defense's thinking said Hanssen's lawyers are prepared to attack this claim by arguing that the CIA's Ames was responsible for the executions of double agents Sergey Motorin and Valeriy Martynov. Ames disclosed their identities to the Russians in 1985, months before Hanssen allegedly confirmed the names. Although the death penalty has never been imposed against a spy in the post-Cold War era, observers say it is a prospect that Hanssen and his lawyers must take seriously in light of the intense reaction the spy case has generated in the last two weeks. "If I were his attorney and the evidence was strong, that's certainly something I would be concerned about," said Joel Levine, a Los Angeles lawyer who has defended accused spies and, in the case that inspired the film "The Falcon and the Snowman," prosecuted them. Deals Struck in Ames, Other Espionage Cases Public reaction can be a driving influence. "Because of the nature of these [espionage] cases, it's difficult to get jurors who are not biased against your client. After all, you're talking about treason," said Fred W. Bennett, who represented John A. Walker Jr., a retired Navy warrant officer who pleaded guilty in 1985 to charges of masterminding a family spy ring that furnished secrets to the Soviet Union. Walker agreed to plead guilty to espionage charges and to cooperate with prosecutors because he wanted to spare a life sentence for his son, also a Navy spy. Because of his father's cooperation, Michael Walker got a 25-year sentence, while John Walker received a life term. The CIA's Ames also struck a deal in one of the most damaging espionage cases in U.S. history. He agreed to a life term in exchange for leniency for his wife, Rosario, who was a partner in his espionage. In exchange for Ames' cooperation, she was allowed to serve only a five-year sentence before returning to Latin America to care for their small child. One convicted spy who did not agree to cooperate with prosecutors was Larry Chin, the first American ever convicted of spying for China. Facing two life sentences after his 1986 conviction, Chin killed himself in prison weeks before he was to be sentenced. Because of the toughened sentencing imposed against spies after the Ames case, the threat of the death penalty now provides prosecutors with a powerful hammer, but it can also be abused. In the case of Wen Ho Lee, the computer scientist who was suspected of passing nuclear secrets to the Chinese, one FBI agent asked Lee during a 1999 interrogation: "Do you know who the Rosenbergs are?" referring to the husband-wife Soviet spy team from the 1950s. "The Rosenbergs are the only people that never cooperated with the federal government in an espionage case," the agent said. "You know what happened to them? They electrocuted them, Wen Ho." Russians Source of Some Hanssen Data? FBI Director Louis J. Freeh later acknowledged that such intimidation was inappropriate. The case against Lee largely collapsed, and he agreed to plead guilty last year to a single felony count of mishandling nuclear secrets at Los Alamos National Laboratory and to cooperate with investigators. FBI agents have debriefed Lee at length to determine what happened to the nuclear secrets he downloaded from his computer. In Hanssen's case, history and mutual interests point to the strong prospect of a plea bargain, legal and espionage experts said. "If the primary goal of Hanssen's lawyers right now is in seeing that he's not executed, the primary goal of the government should be in seeing that they prepare their case strongly, convict him and get his cooperation," said John L. Martin, who headed the Justice Department's espionage investigations unit throughout the spy-crazed 1980s. Hanssen has some clear leverage going into possible negotiations, experts said. Federal prosecutors filed a remarkably detailed set of allegations against Hanssen--information that many observers believe must have come at least in part from Russian intelligence sources. If Hanssen seeks to push the case to trial, that could put the U.S. government in the awkward spot of having to divulge how it got that information, Martin said. The government would also have to consider what secrets it could risk airing in public to prosecute Hanssen. Although there are provisions allowing sensitive information to be heard "in camera," or in private before a judge, that is not assured. Said Schiff, the prosecutor in the Miller spy case: "Depending on how the FBI has gathered its evidence against Hanssen, it may be too costly to the FBI to divulge." More than anything else, a plea bargain securing Hanssen's cooperation could provide the FBI with answers to critical questions: * What exactly did he give the Russians? * How did he avoid detection? * What was he doing during a blackout period from 1992 to 1999, when the FBI has found little evidence of communications between him and the Russians? "The government wants very much to know the extent to which national security was compromised," Schiff said, "and Hanssen obviously is in a unique position to do that." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2633 From: James M. Atkinson, Comm-Eng Date: Sun Mar 4, 2001 10:06pm Subject: 'Spy Mania' Overblown, Russian Says 'Spy Mania' Overblown, Russian Says http://www.latimes.com/news/nation/20010303/t000018789.html Secrets: A former espionage chief says his country is not returning to its Cold War ways. By JOHN DANISZEWSKI, Times Staff Writer MOSCOW--There's one espionage suspect on trial, a U.S. Fulbright scholar was branded a spy in training and held on drug charges, and the United States is accusing Russia of buying surveillance secrets from a high-level FBI agent. Into this ferment, Russia's former spymaster emerged Friday from semi-retirement to say that all the "spy mania" is overblown. In a break with Moscow rules, former spy agency chief Nikolai Kovalyov presented the closest thing yet to an official response from Russia's espionage establishment to the arrest of FBI agent Robert Philip Hanssen in the United States last month and the recent rash of spy-vs.-spy stories. He argued that Russian spy catchers have not returned to a Cold War footing and have been "totally restrained and balanced" in their pursuit of Western spies on Russian soil. Kovalyov, who served as director of the main successor to the KGB under former President Boris N. Yeltsin, dismissed the importance of any secrets that his agency might have obtained from Hanssen. The spy agency, the Federal Security Service, is known as the FSB. At a news conference, Kovalyov calmly urged Americans to take a detached view of the events. "Unfortunately, scandals of this kind are not the first, and I am afraid not the last," he said. "In my view, it is a mistake to elevate such scandals and incidents to the political level." In particular, he said he hoped that the conflict would not escalate. "The biggest mistake that the United States' leaders could make would be to expel Russian representatives from the United States. Clearly, retaliatory steps would be taken--absolutely adequate ones," he said. "Neither side is interested in this." The FBI has accused Hanssen--arrested near his suburban Washington home Feb. 18--of betraying his country for 15 years and passing on the identities of three Russian double agents working in the United States, leading to the execution of two of them. They have also said that Hanssen may have provided Russia with top-secret information about how and where the United States has planted its most sophisticated overseas eavesdropping devices. Kovalyov sought to cast doubt on the U.S. accusations against Hanssen, saying it might all turn out to be an "FBI provocation." For one thing, he said, he couldn't believe claims of U.S. investigators that Hanssen was paid $600,000 in cash and diamonds and had an additional $800,000 deposited in Russian bank accounts during the course of his alleged espionage since 1985. "Russia simply doesn't have that much money," he said. "As somebody who has worked with the special services for a long time, I tell you that all the problems that have afflicted the country--financial and economic--afflicted the special services too." Kovalyov, 52, who now serves as deputy head of the Security Committee of Russia's lower house of parliament but still carries an FSB passport, argued that Hanssen's role as a counterespionage agent within the FBI meant that whatever information he had was not vital to U.S. national interests. "Even if one assumes for the sake of argument that Hanssen worked for Russia . . . what could he have conveyed?" he asked. But his comments appeared to stop short of denying outright that Hanssen was allegedly employed by Russia's spy handlers. At one point, he said, "not a single country will forgo an attempt to get advance information on possible threats to it by another country." The espionage trial last year of U.S. businessman Edmond D. Pope, accused of trying to obtain plans for a sophisticated Russian torpedo, and the current trial of a nuclear arms expert, Igor V. Sutyagin, have led to charges that the FSB is emulating the old KGB--including show trials to dissuade Russians from having contact with foreigners. A regional FSB spokesman in Voronezh this week alleged that a 24-year-old Fulbright scholar arrested on marijuana charges was in fact an espionage trainee in Russia to perfect his language skills. But the FSB stressed in a subsequent statement that it did not intend to charge the scholar, John Edward Tobin, with espionage. Kovalyov said such cases are signs only that the FSB is doing its routine work. He was dismissive of suggestions that the FSB is turning back the clock to the days before the 1991 collapse of the Soviet Union, when it was at war with the CIA and other intelligence agencies. "I think that while we may not be friends yet, we are already equal partners" with the U.S. intelligence services, he said. He cited intensive cooperation in recent years in the fight against international terrorism, arms trafficking and organized crime. "A return to the past is simply impossible," he said. "We are a different country. . . . Everything has changed totally." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2634 From: James M. Atkinson, Comm-Eng Date: Sun Mar 4, 2001 10:07pm Subject: US offers deal on spy plea US offers deal on spy plea http://www.smh.com.au/news/0103/04/national/national14.html By Padraic Murphy Australian Jean- Phillipe Wispelaere, who is awaiting trial on espionage charges in the US, has been offered 12 years in prison to be served in Australia and America, according to his lawyer, Ivan Himmelhoch. Under the plea-bargain deal brokered by his US lawyer Nina Ginsberg and US prosecutors, Wispelaere would serve 10 years in an American prison and the remaining two years in an Australian prison if he pleads guilty. If he maintains a not guilty plea, Wispelaere faces a mandatory life sentence with no parole if found guilty by a trial judge. Wispelaere has until the end of next week to accept the deal, a tactic described as bullying by Australian-based Mr Himmelhoch. Wispelaere is accused of attempting to sell American satellite photos of Malaysia and Pakistan to Singaporean officials in Thailand. He was lured to the US by FBI officials and arrested at Washington Airport in May 1999. Mr Himmelhoch said his client would not accept the deal, and would start court proceedings in the next fortnight on the issue of jurisdiction. "These charges should not be heard in the US. This is a real threat to our sovereignty," Mr Himmelhoch said. "The crime, if any, was committed in Australia." Mr Himmelhoch said he would take the matter of jurisdiction to the United Nations if American courts rejected arguments that the case be heard in Australia. But it is understood that US intelligence officials are furious about the ease that Wispelaere, a junior employee at the Australian Defence Intelligence Organisation, was able to allegedly steal 900 documents containing US satellite photos and will fight any attempt to have the case heard in Australia. A spokeswoman for Attorney-General Daryl Williams said: "Wispelaere was arrested in the US and charged in the US and a US court should therefore hear the trial." The Sun-Herald -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2635 From: James M. Atkinson, Comm-Eng Date: Sun Mar 4, 2001 10:08pm Subject: A Spy's Secret World A Spy's Secret World http://www.msnbc.com/news/535672.asp Exclusive: To his neighbors, Robert Hanssen was a devout dad. To his FBI colleagues, he could be controlling and moralistic. To the Russians, he was ëBí and ëRamoní≠a long-term mole in the American government. His mind and motives. By Evan Thomas, NEWSWEEK "The full extent of the damages is yet unknown," said FBI Director Louis Freeh. "We believe it was exceptionally grave." March 5 issue ≠ In his long fight against the forces of evil, FBI Director Louis Freeh has always drawn on his deep faith. The director is regarded in the bureau as pure and relentlessly upright. Under the glass on Freehís desktop, along with snapshots of his wife and six kids, is a photo of the late Cardinal John OíConnor. AT LEAST ONE OF FREEHíS CHILDREN attends The Heights, a small, all-male school in Potomac, Md., affiliated with a powerful and secretive Roman Catholic order, Opus Dei. So imagine Freehís discomfort last fall when he showed up to give a speech at his sonís school and was greeted by another school parent and fellow FBI agent, Robert Hanssen, who was at that moment under surveillance for turning traitor as a Russian spy. When Freeh returned to his office the next day, he wearily told a colleague how difficult it had been to give a speech on ethics and morality, all the while knowing that Hanssen≠a 25-year bureau veteran, father of six and member of the righteous and anti-communist Opus Dei≠had betrayed everything that Freeh held dear. The director is trying to put a brave face on the spy scandal, the worst since CIA turncoat Aldrich Ames was caught working for the Russians in 1993. Last week Freeh claimed that arresting Hanssen on charges of espionage was a ìcounterintelligence coup.î From some kind of unidentified ìsourcesî U.S. intelligence obtained what seemed to be virtually the KGBís entire file on Hanssenís case. Sources tell NEWSWEEK the bureau was able to identify the turncoat≠who used code names like ìBî and ìRamonî≠from his fingerprints on the packages he allegedly sent to his Russian handlers. ìIt was a eureka moment,î said a top bureau official. Nonetheless, this week Freeh will have the difficult task of explaining to the Senate Intelligence Committee how such a mole could have gone undetected by the FBI for 15 years. In some ways, Hanssen, who is expected to plead not guilty, is a throwback to the cold-war game of spy vs. spy, when the FBI and CIA and their Soviet rivals in the KGB (now renamed the SVR) busily tried to recruit each otherís agents. Clearly, the game still goes on: Hanssen was arrested in a Vienna, Va., park a mile from his home as he dropped off classified documents, wrapped in a plastic garbage bag, for his Russian handlers. And the gumshoeís high-tech methods are harbingers of the spy game of the future. A computer whiz, Hanssen was allegedly able to steal secrets from the U.S. intelligence community by hacking into its secret databases. In one correspondence with his Russian handlers, Hanssen proposed that, rather than bother with risky rendezvous in the muddy woods, he just send Moscow encrypted stolen documents via his Palm pilot (he wanted to upgrade from a Palm III to a Palm VII). ASSESSING THE DAMAGE The damage done will take months, if not more, to sort out. Over the years the FBI mole delivered to Moscow 6,000 pages of documents and 26 computer disks detailing the bureauís ìsources and methods,î including its latest techniques for electronic eavesdropping. As a counterintelligence expert at the FBI, he had unusually broad access to the bureauís files. But the most elusive and intriguing question about Hanssen is his motivation: why would a God-fearing family man who ardently and even tediously denounced ìgodless communismî secretly sell out to the Kremlin? Greed may be only part of the answer. True, he may have worried about tuition payments for his six Catholic-school-educated children, but, unlike other alleged traitors, he did not throw money around on booze or women. According to the FBIís affidavit, the Russians paid Hanssen more than $600,000 in cash and diamonds, plus the promise of $800,000 more awaiting him in Moscow for his ìretirement.î Still, Hanssen lived the life of a frugal family man in the Virginia suburbs, driving a í97 Ford Taurus. Some of Hanssenís colleagues surmise that he simply liked to tempt fate. ìHe wanted to touch the wire,î said David Major, a section chief in the bureauís intelligence division who worked across the hall from Hanssen. ìIt was like he was wondering, ëCan I do it?í î A quirky, quietly brilliant man whose career never quite lived up to his own expectations, Hanssen may have been led into temptation partly by the boring, deadening work of spying in the real world, which involves far more waiting and paper shuffling than sleuthing in dark alleys. The forces driving Hanssen were likely complex and possibly unknowable. He seems to have been on some kind of strange quest, lurching between religions and ideologies and careers without finding relief, except perhaps in the thrill of spying. Still, it is possible, from the 100-page affidavit released by the FBI and interviews with his friends and colleagues, to begin to piece together clues to the puzzle, to gain the first insights into the twisted mind of a spy. He is described by those who knew him≠who readily acknowledge that he was hard to truly know≠as a brooding, controlling figure, fascinated by secrecy and obsessed by purity. He was, for much of his 56 years, a seeker of black-and-white certainty and higher truth who nonetheless plunged into the gray, morally compromised world of espionage. He is, in a perverse way, Louis Freehís doppelganger, a would-be scourge of evil who ended up collaborating with the very demon he was trying to exorcise. Hanssenís own explanation to his Moscow handlers for his secret life, laid out in the bureau affidavit, was at once cryptic and grandiose: ìI am either insanely brave or quite insane. Iíd answer neither. Iíd say, insanely loyal. Take your pick. There is insanity in all the answers,î he wrote the SVR in 1999. In the same rambling letter, Hanssen went on, ìI decided on this course when I was 14 years old. Iíd read Philbyís book. Now that is insane, eh!î TAKING AFTER PHILBY H.A.R. (Kim) Philby is an interesting and provocative role model. Himself the son of a spy who turned traitor, Philby was an arrogant, self-loathing aristocrat recruited by the Soviets at Cambridge University in the early 1930s. Philby wanted to overthrow what he saw as the corrupt, class-ridden establishment and replace it with a Marxist utopia. Rising to head the Soviet division in the British spy service in the early days of the cold war, he led the mole-hunters on a merry chase until he fled to Moscow in 1963. Philby did not publish his memoir, ìMy Silent War,î until 1968, when Hanssen was 24, not 14. Hanssen may just have been flattering his handlers≠or himself≠by dropping the name of Moscow Centerís greatest catch. But Hanssenís sense of intrigue≠and his fascination with spying as a moral battleground≠started young. With FBI colleagues, Hanssen would boast that his father had been a Red hunter, a member of the Chicago police forceís Red Squad, which tried to track down subversives in the 1950s and í60s. An only child, regarded as a loner and something of a cipher in high school and college (where he studied Russian), Hanssen as a 21-year-old nurtured an ambition to join the supersecret National Security Agency and become a code breaker. He also imagined going to med school and becoming a psychiatrist. He ended up at dental school. His classmates there remember him as quiet, imperturbable, almost invisible≠always neatly dressed in a coat and tie≠yet odd. He worked on the weekends at a state mental facility and enjoyed interviewing the patients, as if he were a real psychiatrist. Occasionally, he would invite a friend out to the hospital to watch him perform. ìHe loved showing people the control he had over the patients, who were mostly bonkers. He liked to show off for his friends, putting these people through their paces. He wasnít mean to the inmates; he just quietly interrogated them,î said John Sullivan, a classmate. Hanssen had another quirk, said Sullivan: he repeatedly described a dream, in which he was sitting on a throne, ìlike Emperor Ming in ëFlash Gordoní,î passing final judgment on his enemies. ìGuard!î Hanssen would imagine himself commanding. ìTake them away!î Hanssen could laugh, a deep rumble, but he never opened up about his own family. A dutiful son, he regularly visited his mother. Yet he was searching for≠or escaping from≠something deep within himself. Bored with dentistry, he dropped out, got a degree in accounting and became, like his father, a policeman. But not just any cop: he volunteered for an elite squad that investigated other cops suspected of corruption. The C5 unit was despised by most Chicago police officers, who viewed the undercover cops as traitors. ìIt didnít seem to bother him at all,î said his supervisor, John Clarke. Hanssen arrived full of insinuating questions about the regime of Mayor Richard Daley, Chicagoís all-powerful boss. Indeed, Hanssen started asking so many questions that Clarke began to secretly suspect that the rookie was actually working undercover for the federal government. ìHe looked like an altar boy,î said Clarke. ìBut I was always very suspicious of him.î VOLUNTEER SPYCATCHER Before long, Hanssen was openly working for the Feds≠as an FBI agent. Joining the bureau in 1976, Hanssen showed little interest in the normal duties of a junior G-man, standing in the cold writing down the license-plate numbers of suspected mobsters. He volunteered to be a spycatcher, to enter the arcane world of counterintelligence operations against the KGB, which was working hard to penetrate the U.S. government and steal military, political and industrial secrets. In the late í70s and early í80s, with the cold war deepening again after a period of detente, he could easily imagine the struggle against the ìEvil Empireî as a grand stage worthy of his intellectual powers and zeal. The spy-vs.-spy game that swirled around the United Nations in New York had been described as a ìwarî by its veterans, but it could be a dreary, deadening pastime for an FBI agent trying to support a large and growing family in the cityís pricey environs. Agents in the New York office of the FBI at the time complained of low pay and lower morale. After a while the duties of a counterintelligence officer≠such as reviewing the expense accounts of businessmen who traveled to Moscow≠may have seemed as dull as dental school to Hanssen. He may also have been going through some personal crisis at the time. According to family friends, his wife, Bonnie, was having periodic miscarriages between giving birth to their six children. The real cause of Hanssenís deep disquiet may never be known. But in October 1985, a month before the Geneva summit between Ronald Reagan and Mikhail Gorbachev signaled the beginning of the end of the cold war, Hanssen took a step from which≠as he well knew≠there is no turning back. According to the FBI affidavit, he offered his services to the Kremlin, in a letter sent through the regular mail to the Virginia home of a KGB agent stationed in the Soviet Embassy in Washington. As a kind of down payment, Hanssen handed over the names of three KGB agents who were secretly working for the Americans. It was a deadly gift. Two of the agents≠Valery Martynov and Sergei Motorin≠were later executed in Moscow, while the third, Boris Yuzhin, was sent to prison. (These double agents were doubly unlucky: they were earlier betrayed by the CIA mole, Aldrich Ames.) Hanssen may also have been protecting himself by eliminating sources who might finger him to the CIA. The counterintelligence expert took the usual precautions. The FBI affidavit reads like a how-to manual of good ìtradecraft.î He communicated with the KGB through ìdead drops.î In order to avoid surveillance, he never met directly with the Soviets. Rather, he would post a signal≠a piece of tape on a tree≠alerting his handlers that he was leaving a package at a predetermined site. They would leave behind further marching orders in the same spot≠and a reward. Hanssen was careful not to ask for too much. In one of his first messages, on Nov. 8, 1985, he wrote Moscow, ìAs far as funds are concerned, I have little need or utility for more than the 100,000 [dollars]. It merely provides a difficulty since I can not spend it, store it, or invest it easily without triping [sic] ëdrug moneyí warning bells. Perhaps some diamonds as security to my children and some good will so that when the time comes, you will accept by [sic] senior services as a guest lecturer. Eventually, I would appreciate an escape plan. (Nothing lasts forever.)î ëNEITHER OF US ARE CHILDRENí Hanssen may have been thinking of his model, the master spy Philby, who ended his days as a Hero of the State (though a depressed drunk), lecturing fledgling KGB officers in Moscow. Shrewdly, Hanssen never revealed his true identity to the KGB, using code names instead. He repeatedly refused requests to meet a Moscow agent at home or overseas. ìNeither of us are children about these things,î he chided his KGB handler at one point. ìOver time, I can cut your losses rather than become one.î As the chief of a counterintelligence unit in New York, then as a fairly high-ranking analyst of Soviet spying back at FBI headquarters in Washington, Hanssen was in a position to know a great deal about the FBIís spycatching operations. Intelligence experts say that Hanssen probably told the Russians how, where and when U.S. intelligence agencies, like the eavesdroppers at the NSA, were listening in on Russian communications. The true cost to national security is hard to determine. During the 15 years when Hanssen was operating as a mole, the crumbling Soviet Union and its chaotic successor, the Russian Republic, was not much of a real threat to the United States. Oleg Gordievsky, a Soviet spy who defected to Britain in 1985, suggests that the Russians might have given or sold information turned over by Hanssen to scarier enemies≠rogue states like Iraq and Libya, or terrorist groups in the Middle East. But a senior FBI official interviewed by NEWSWEEK was doubtful. He observed that Moscowís paranoid and clannish SVR has always been reluctant to share secrets even with its Russian military counterpart, the GRU. Hanssen seems to have been satisfied by his secret life for a time. According to the affidavit, his handlers cleverly nurtured him with cash and stroking and even snatches of poetry. His correspondence with the KGB is full of salutations to ìdear friends.î The chairman of the KGB himself, Vladimir Kryuchkov, sent along his personal congratulations. But by the end of that year, Hanssen had gone to ground. His next contact with the Russians, it appears, was not for seven years. BUSY MOLE-HUNTERS Hanssen may have felt a need to lie low. Aldrich Ames was exposed as a Soviet agent in 1993, and the mole-hunters were busily searching for other turncoats. Some serious security lapses could not be explained by Amesís perfidy. FBI and CIA officials wondered why some of the intelligence communityís listening devices were going deaf. And they still couldnít explain how the Russians had been able in 1989 to tip off a State Department official, Felix Bloch, who was under surveillance for spying. (According to the FBI affidavit, it was Hanssen who warned the Russians that the noose was tightening around Bloch. ìBloch was such a shnook,î Hanssen wrote his handlers, ìI almost hated protecting him.î) In the mid-í90s, the spycatchers did snare a couple of lesser moles, the CIAís Harold Nicholson and the FBIís Earl Pitts. But they remained suspicious. When Hanssen was arrested on Feb. 18, as many as half a dozen American intelligence officials were under close scrutiny at the time. Their fates remain uncertain. There were complaints last week that longtime FBI agents had been exempted from taking lie-detector tests, unlike CIA officials, who≠especially in the wake of Ames case≠were routinely ìfluttered.î But even if Hanssen had been strapped to a polygraph machine, that might not have incriminated him. Investigating his home life would not have revealed a hint of wrongdoing. According to neighbors, he got home every night at 5:30; the kids were doing their homework and dinner was on the table within a few minutes. Wife Bonnie is described as a ìcute, pixie, Doris Day-like person,î her home ìas neat as a pin.î The dogís name is Sunday, as in church. The Hanssens are devoutly religious. Although Hanssen rarely mentioned religion while growing up (he was at least nominally a Lutheran), he became an ardent Catholic, like his wife, in the mid-1970s. His attachment to Opus Dei stands in stark and perplexing contrast to his work for the Kremlin. Officials of the order hotly dispute descriptions of Opus Dei (Work of God) as a secret sect. Its followers are supposed to live a godly life while here on earth, but fellow Catholics sometimes find Opus Dei members to be a little spooky and holier-than-thou. Hanssenís colleagues regarded him as a moralizer. He refused to attend a going-away party at a girlie bar near FBI headquarters, calling the party ìan occasion of sin.î Riding home one night with another FBI official, he bridled when an NPR commentator remarked that ìthe implied social contract is the basis for morality.î Turning off the radio in disgust, Hanssen muttered, ìThe basis of morality is Godís law.î THE LUGUBRIOUS DR. DEATH At bureau headquarters, Hanssen was known for dressing in black and for a somewhat lugubrious manner, which some compared to that of an undertaker. To investigative journalist James Bamford, he handed windy assessments of the evils of communism, long after communism had collapsed. He was called, behind his back, Dr. Death. Speaking in low tones, smiling little, he had few real friends. He may have missed his Russian handlers. ìA spy is one of the loneliest people in the world,î says Dr. David Charney, a psychiatrist who has spent 20 hours interviewing Earl Pitts about his career as a spy. ìHe is completely dependent on his handler.î In late 1999, Hanssen allegedly renewed contact with Russian intelligence, which was gearing up again under President Vladimir Putin, an old KGB hand who is eager to revive some the Soviet Empireís glory days. ìDear friend: welcome!î began a letter to Hanssen from the SVR on Oct. 6. ìWe express our sincere joy on the occasion of resumption of contact with you.î Yet there was a new, panicky note on Hanssenís end. ìI have come about as close as I ever want to come to sacrificing myself to help you, and I get silence,î he petulantly wrote the SVR in March of last year. ìI hate silence.... I hate uncertainty. So far I have judged the edge correctly. Give me credit for that.î He seemed to know that the end was coming near. ìPlease,î he begs his handler, ìat least say goodbye. Itís been a long time my dear friends, a long and lonely time.î Then, more sardonically, ìWant me to lecture in your 101 course in my old age?î He was worried that he faced the death penalty if he got caught by the mole-hunters, but he didnít really believe that a welcome suite awaited him in Moscow if he bolted. As for the $800,000 supposedly set aside for his retirement, he scoffed, ìwe do both know that money is not really ëput away for youí except in some vague accounting sense. Never patronize me at this level,î he warned. ìIt offends me, but then you are easily forgiven. But perhaps I shouldnít tease you. It just gets me in trouble.î THE OFFER OF A BIG OFFICE Big trouble was just around the corner. In October, after receiving the case file of the SVR agent known as ìB,î the FBI had little trouble zeroing in on Hanssen. A senior FBI official said the top brass was stunned when the fingerprints on the packaging materials turned out to belong to one of their own. Hanssen was immediately put under round-the-clock surveillance. Perhaps sensing the dogs circling, he was beginning to talk to his FBI bosses about retirement. He was offered instead a nice big office at headquarters, NEWSWEEK has learned. When he went over for a look, the FBI bugged his old office. The gumshoes were waiting when Hanssen went to a northern Virginia park to visit a dead drop in the gloom of a February late afternoon. He walked into the woods and placed an inch-thick package under a footbridge. As he turned to go to his car, agents yelled, ìFreeze! FBI!î The long wait was over. Hanssen did not resist or even say anything. His brokenhearted wife hired one of the best criminal-defense lawyers in Washington, Plato Cacheris, who said the governmentís case may not be as solid as it seems. If history is a guide, Hanssen will cut a deal. To avoid the death penalty, he will have to help the FBI figure out just how much damage he did. Repairing the harm done his family may be harder. Hanssenís children are assuming the allegations against their father are true, said Hanssenís sister-in-law Liz Rahimi. ìThey just think there was something wrong with their dad, and they didnít know,î she said. Hanssenís mother-in-law, Fran Wauck, told NEWSWEEK, ìThe family is devastated. We donít even know who he is.î Itís not clear that anyone ever really knew Bob Hanssen, perhaps not even himself. ------------ With Eleanor Clift, Michael Isikoff, Mark Hosenball and Donatella Lorch in Washington, Dirk Johnson, Flynn McRoberts and Karen Springen in Chicago and Christian Caryl in Moscow © 2001 Newsweek, Inc. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2636 From: James M. Atkinson, Comm-Eng Date: Sun Mar 4, 2001 10:09pm Subject: U.S. thinks FBI agent told Soviets of secret tunnel U.S. thinks FBI agent told Soviets of secret tunnel Sunday March 4, 2:03 PM http://sg.news.yahoo.com/010304/3/j2ad.html WASHINGTON (Reuters) - The United States built a secret tunnel under the Soviet Embassy in Washington, but investigators believe the operation was betrayed by the FBI agent arrested last month on charges of spying for Moscow, The New York Times reported on Saturday, citing current and former intelligence and law enforcement officials. The secret tunnel operation, which officials indicated was run jointly by the FBI and the National Security Agency, was part of a broad U.S. effort to eavesdrop on Soviet -- later Russian -- facilities and personnel operating in the United States, the paper wrote in its Internet edition on Saturday. Spokesmen at the FBI and the White House declined to comment to the Times on the tunnel operation. Current and former U.S. officials estimated that the tunnel construction and related intelligence-gathering activities cost several hundred million dollars, apparently making it the most expensive clandestine intelligence operation that the agent, Robert Hanssen, is accused of betraying, the Times said. The tunnel was reportedly designed as part of a sophisticated operation to eavesdrop on communications and conversations in the Soviet Embassy complex, which was built in the 1970s and 1980s. In the 1980s, at about the time the tunnel operation was under way, the United States and the Soviet Union argued bitterly over their respective embassies in Moscow and Washington, with the United States accusing Moscow of spying at both locations, the paper said. The U.S. government has never publicly disclosed the existence of the tunnel, but in an FBI affidavit in the Hanssen case, the government said that Hanssen "compromised an entire technical program of enormous value, expense and importance to the United States government," the Times report said. The Times said officials told them that that referred to the tunnel operation and related intelligence activities. U.S. News & World Report magazine reported in its March 12 issue, out on newsstands on Monday, that officials blamed Hanssen for compromising at least two highly sensitive FBI counterintelligence programs. Hanssen, arrested on Feb. 18, has been accused of spying for Moscow since 1985. He has been accused of giving Moscow secrets that included names of double agents, as well as U.S. electronic surveillance methods. The Times said it could not be determined when the government believed Hanssen betrayed the tunnel operation. Copyright © 2001 Reuters Limited. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2637 From: James M. Atkinson, Comm-Eng Date: Sun Mar 4, 2001 10:10pm Subject: Accused spy may have revealed feds' tunnel under Russian Embassy, newspaper reports Accused spy may have revealed feds' tunnel under Russian Embassy, newspaper reports http://www.nandotimes.com/nation/story/0,1038,500459735-500700068-503805818-0,00.html The Associated Press NEW YORK (March 4, 2001 2:18 p.m. EST http://www.nandotimes.com) - The U.S. government built a secret tunnel under the then-Soviet Embassy in Washington, but its existence may have been betrayed by an FBI agent arrested two weeks ago and accused of spying for Moscow, The New York Times reported Sunday in its Internet edition. Intelligence and law enforcement officials indicated the tunnel operation was run jointly by the FBI and the National Security Agency, as part of a sophisticated eavesdropping operation used to track Soviet Union - and later Russian - facilities and personnel in the United States. Spokesmen for the FBI and the White House declined to comment on the operation in interviews with The Times. Former agent Robert Philip Hanssen, a 25-year FBI veteran and counterintelligence expert, was arrested last month and charged with spying for Moscow since 1985. The government has never publicly disclosed the existence of the tunnel operation, but an FBI affidavit filed in the Hanssen case states Hanssen "compromised an entire technical program of enormous value, expense and importance to the United States government." Officials told The Times that was a reference to the tunnel operation and related intelligence activities. The operation is estimated to have cost several hundred million dollars. FBI agents infiltrated the Soviet Embassy under the guise of contractors, an individual familiar with the planning of the operation told the newspaper. The embassy complex, which was built in the 1970s and 1980s, was not fully occupied until the 1990s as a result of a long-running dispute with the United States about charges that U.S. embassy buildings in Moscow had been bugged. The new embassy complex was not fully occupied until after the collapse of the Soviet Union. The U.S. government arrested CIA officer Aldrich Ames in 1994, and when he was not able to explain a series of damaging intelligence loses, it is believed the investigation intensified and ultimately led to Hanssen. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2638 From: James M. Atkinson, Comm-Eng Date: Sun Mar 4, 2001 10:11pm Subject: FBI spy may have revealed details of secret tunnel FBI spy may have revealed details of secret tunnel http://www.ananova.com/news/story/sm_227295.html?menu= The FBI agent accused of spying for Moscow may have betrayed details of a secret tunnel under the Russian Embassy in Washington. The New York Times, in its Sunday Internet edition, says the tunnel operation was run jointly by the FBI and the National Security Agency. They say the tunnel was part of a sophisticated eavesdropping operation. Spokesmen for the FBI and the White House have declined to comment on the operation in interviews with The Times. Former agent Robert Philip Hanssen, a 25-year FBI veteran and counterintelligence expert, was arrested last month and charged with spying for Moscow since 1985. The existence of the tunnel has never been publicly disclosed but an FBI affidavit states Hanssen "compromised an entire technical program of enormous value, expense and importance to the US government". Officials told The Times that was a reference to the tunnel operation and related intelligence activities. The operation is estimated to have cost several hundred million dollars. FBI agents are said to have infiltrated the embassy under the guise of contractors, an individual familiar with the planning of the operation told the newspaper. Last updated: 13:39 Sunday 4th March 2001 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2639 From: James M. Atkinson, Comm-Eng Date: Sun Mar 4, 2001 10:12pm Subject: Report: Spy May have Revealed Tunnel Report: Spy May have Revealed Tunnel http://www.guardianunlimited.co.uk/breakingnews/US/0,3560,768530,00.html Sunday March 4, 2001 8:20 am NEW YORK (AP) - The U.S. government built a secret tunnel under the Soviet Embassy in Washington but its existence may have been betrayed by an FBI agent arrested two weeks ago and accused of spying for Moscow, The New York Times reported in its Sunday Internet edition. Intelligence and law enforcement officials indicated the tunnel operation was run jointly by the FBI and the National Security Agency, as part of a sophisticated eavesdropping operation used to track Soviet Union - and later Russian - facilities and personnel in the United States. Spokesmen for the FBI and the White House declined to comment on the operation in interviews with The Times. Former agent Robert Philip Hanssen, a 25-year FBI veteran and counterintelligence expert, was arrested last month and charged with spying for Moscow since 1985. The government has never publicly disclosed the existence of the tunnel operation, but an FBI affidavit filed in the Hanssen case states Hanssen ``compromised an entire technical program of enormous value, expense and importance to the United States government.'' Officials told The Times that was a reference to the tunnel operation and related intelligence activities. The operation is estimated to have cost several hundred million dollars. FBI agents infiltrated the Soviet Embassy under the guise of contractors, an individual familiar with the planning of the operation told the newspaper. The embassy complex, which was built in the 1970s and 1980s, was not fully occupied until the 1990s as a result of a long-running dispute with the United States about charges that U.S. embassy buildings in Moscow had been bugged. The new embassy complex was not fully occupied until after the collapse of the Soviet Union. The U.S. government arrested CIA officer Aldrich Ames in 1994, and when he was not able to explain a series of damaging intelligence loses, it is believed the investigation intensified and ultimately led to Hanssen. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2640 From: James M. Atkinson, Comm-Eng Date: Sun Mar 4, 2001 10:20pm Subject: FBI dug deep to spy on Soviets FBI dug deep to spy on Soviets http://www.smh.com.au/news/0103/05/world/world12.html Washington: The United States built a tunnel under the Soviet Union's new embassy in Washington in order to spy on it, but investigators believe the operation was betrayed by the FBI agent arrested last month on charges of acting for Moscow. The tunnel, which officials indicated was run jointly by the FBI and the National Security Agency, was part of a broad American effort to eavesdrop on and track Soviet - later Russian - facilities and personnel in the United States. Current and former US officials estimated that the tunnel's construction and related intelligence-gathering activities cost several hundred million dollars, apparently making it the most expensive spying operation that the agent, Robert Philip Hanssen, is accused of betraying. The tunnel was designed to help a sophisticated operation to eavesdrop on communications and conversations in the Soviet Embassy complex, which was built in the 1970s and 1980s but not fully occupied until the 1990s. In the 1980s, at about the time the tunnel operation was under way, the US and the Soviet Union argued bitterly over their respective embassies in Moscow and Washington, with the US accusing Moscow of spying at both locations. The US Government has never publicly disclosed the existence of the tunnel operation. But in an FBI affidavit in the Hanssen case, it said he "compromised an entire technical program of enormous value, expense and importance to the United States Government". Officials said that was a reference to the tunnel and related intelligence activities. The Government says that Hanssen, a 25-year veteran of the FBI and a counter-intelligence expert, volunteered to spy for Moscow in October 1985. He was arrested on February18 in a Virginia park after leaving a package containing classified documents for his Russian handlers, according to the affidavit. It is not known when the Government believes Hanssen betrayed the tunnel and other spying activities aimed at the embassy. Nor is much known about how and when the operation was mounted, or whether it learned anything useful. But the emerging belief that the tunnel program had been compromised was a factor in the Government's decision to keep looking for additional spies after the 1994 arrest of the CIA officer Aldrich H. Ames, officials say. The New York Times -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2641 From: James M. Atkinson, Comm-Eng Date: Sun Mar 4, 2001 10:21pm Subject: FBI: SPY THRIVED FROM AMES BUST FBI: SPY THRIVED FROM AMES BUST http://www.nypostonline.com/news/nationalnews/25408.htm Sunday,March 4,2001 By NILES LATHEM WASHINGTON - Accused FBI turncoat Robert Hanssen took advantage of the fallout over the Aldrich Ames spy scandal at the CIA to boost his value as a double agent, investigators believe. Current and former U.S. intelligence officials told The Post they suspect Hanssen's spying profited after Ames was unmasked as a Russian agent because the immense government-wide security crackdown that followed gave the FBI greater control over U.S. counterintelligence operations and greater access to operational secrets. Officials believe that Hanssen, after "going to ground" for several months following Ames' arrest, compromised a number of highly sensitive technical operations in the late 1990s - and possibly betrayed Russians secretly working for the CIA. That Hanssen was able to flourish as a Russian double agent - and do possibly even graver damage to U.S. national security than Ames - at a time when U.S. intelligence agencies were in a period of great re-examination and recrimination is "one of the great ironies of this case," according to a former CIA official involved in the Ames investigation. At the time of Ames' arrest, the CIA was heavily criticized for failing to notice that a bitter, hard-drinking employee was operating for years as a Russian double agent while driving a Jaguar and living in a $500,000 home on a government salary. "The security procedures were found to be lacking and the entire culture of the agency was heavily criticized for contributing to Ames' ability to operate with impunity," intelligence analyst James Adams said. Under pressure from Congress, the agency instituted a number of new security procedures, including periodic polygraphing of employees, greater scrutiny of workers' finances and personal lives, and stricter controls on computers, documents and the number of people with access to information on secret operations overseas. The CIA also agreed to create a special counterintelligence office headed by the FBI. That meant information about the most closely guarded spy capers was now being shared with the bureau. "There was an agreement to combine resources on counterintelligence operations. It was felt that the CIA did not have trained investigators, that the bureau was in a better position to seek out and capture spies," said John Martin, former espionage prosecutor for the Justice Department who supervised the Ames case. Jeffrey H. Smith, CIA general counsel from 1995 to 1996, said he believes the increased cooperation between the CIA and the FBI - longtime rivals - generally was a big step toward improving national security. "There was cooperation on a whole range of issues from counter-terrorism to organized crime to counter-narcotics that resulted from these new measures. You see the results in the quick arrests of the suspects in the bombings of our embassies in East Africa," Smith said. "Obviously when you see that Hanssen was able to operate as a spy for 15 years inside the FBI, the system is a hell of a long way from perfect. But it's better than it was," Smith said. Astonishingly, while the FBI had access to the CIA's most closely guarded secrets, the bureau resisted instituting the new security procedures that had been forced upon the CIA. That allowed Hanssen, then assigned to a liaison office at the State Department, to continue to hack into FBI computers and learn even more details of U.S. spy operations, Justice Department documents show. Only this past week, in the wake of Hanssen's arrest, did the FBI agree to institute polygraphing and other security measures. FBI officials have long opposed giving employees lie detector tests. "There's a [J. Edgar] Hooveresque culture at the FBI that maintains, 'We are the elite, we are a bunch of Eliot Nesses who are men of honor,'" Adams said. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From: James M. Atkinson Date: Mon Mar 3, 2003 8:26pm Subject: Re: Dektor At 4:23 PM -0800 3/3/03, Hawkspirit wrote: >Anyone know if Dektor is still around, I have an associate that needs chart >paper and other parts for a PSE. Thanks Roger Dektor no longer exists in any form, and there is no further technical support for their products. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6994 From: Date: Fri Feb 28, 2003 11:20am Subject: These Are Not Your Father's Wiretaps FEBRUARY 27, 2003 PRIVACY MATTERS By Jane Black These Are Not Your Father's Wiretaps Privacy advocates fear that the FBI's need to monitor Internet Age technologies, such as voice over IP, will give it far too sweeping powers In the old days, tapping a phone was as easy as one-two-three. All calls ran over Ma Bell's copper wires. To listen in, law-enforcement agents simply requested that the phone company isolate the suspect's wire and record any calls made or received. One phone company. One network. One flip of a switch. That was eons ago by techno-standards, however. The new world of telecommunications has made it much harder for the FBI to thwart evildoers -- and for privacy advocates to ensure that the agency doesn't overstep its bounds. Today, dozens of new technologies need to be monitored, such as packet voice and cellular text messaging. And thousands of new service providers are now in business. "Every time the technology moves ahead, you have all these pitfalls -- all these potential points where we can creep away from the status quo to a far more intrusive type of surveillance," says Lee Tien, a senior attorney at San Francisco-based advocacy group the Electronic Frontier Foundation. The job of sorting out the mess falls in large part to Les Szwajkowski, the director of the FBI's CALEA surveillance policy and planning unit. (CALEA is an acronym for Communications Assistance for Law Enforcement Act, which was passed in 1994 and granted the FBI the right to conduct surveillance on any new technologies that arise.) With his staff of 50 engineers, lawyers, and surveillance experts, Szwajkowski's most pressing task is finding a way to tackle the challenge of packetized voice, better known as VOIP (for voice over Internet protocol), which is steadily gaining a foothold in the U.S. market. VOIP provider Vonage in Edison, N.J., alone has lured 15,000 customers since it launched in April, 2002. "SHORT ONE PLAYER." Last month, law-enforcement officials and telecom providers such as Vonage gathered at a closed-door meeting in Chicago to plan for the digital future. The technology makes for some tough issues for policymakers. Unlike a traditional phone call, where a line is dedicated between two parties, VOIP slices each call into millions of tiny digital packets, each of which can take a discrete route over the Internet. That means surveillance equipment must either be installed permanently on a network or calls must be routed through FBI surveillance equipment before being delivered to the caller, which experts say can create a suspicious delay. "Our tactical people are trying to plug every hole. But it's like playing the field short one player," says Szwajkowski. "A call that is not [able to be intercepted] is a major public-safety and security dilemma." This isn't the first time the FBI has faced such a challenge. As early as the 1980s, new features such as call forwarding and conference calling created loopholes for crafty criminals. If the FBI tapped a suspect's office phone, that person could forward the call to a home line if he or she smelled a wiretap -- outfoxing the FBI. Conference calls also thwarted so-called pen register and trap-and-trace orders, which allow law-enforcement agencies to record all the calls made or received on a particular line. WHO YA GONNA CALL? To trick the feds, one untapped person could call another and then conference in the suspected wrongdoer, without the call being registered by law enforcement. From 1992 to 1994, a total of 183 federal, state, and local law-enforcement cases were impeded by advances in digital technology, according to congressional testimony by then-FBI Director Louis Freeh. Szwajkowski's job is all the more complicated because of the explosion of new communications providers since the 1996 Telecommunications Act. Today, it's not just the phone company that completes calls. It could be an Internet service provider, a VOIP startup, or both. In rural areas, it's not uncommon for startups, such as Paul Bunyon Telecom in Bemidji, Minn., or CBeyond Communications in Atlanta, to serve just a few thousand customers apiece. "The number of new players is staggering to us," Szwajkowski says. "It was hard enough before to balance technology and economics. Today we have to negotiate with a whole new set of entrants with a range of demands and circumstances." HUNGRY CARNIVORE. Therein lies a danger, say privacy advocates. They worry that the FBI will use the rise of the packet technology and the expanding number of players as an excuse to expand its all-seeing, all-knowing surveillance power. Here's why: VOIP travels across the Internet the same way that e-mail does. Address information (the number dialed or the e-mail address) is contained in the same packet as the content (what is said or written). The FBI's solution for e-mail is the notorious Carnivore technology, which sucks up all data that passes its way. The FBI claims that Carnivore filters traffic and delivers to investigators only packets that they're lawfully authorized to obtain. But because the details remain secret, the public must trust the FBI's characterization of the system and -- more significant -- that it's complying with legal requirements. Carnivore has been highly controversial, and privacy advocates fear the FBI will develop a similar system for VOIP. "The very nature of packet technology means that whether it's an e-mail or a voice call, [the FBI] can get more and more information that allows them to be more and more privacy-invasive," says the EFF's Tien. A NEW ERA. The sheer number of players could put privacy at an even greater disadvantage. In the old days, the FBI went head-to-head with the likes of AT& T (>T ) or Verizon (>VZ ), each of which has an army of lawyers to fight off any onerous requirements. In an emerging area such as VOIP, however, small companies are on the cutting edge, and they have no money to staff a huge legal department. Szwajkowski plays down these fears. "I'm a citizen too. I don't want to be surveilled without law enforcement having built up a serious case in front of a judge," he says. "All we want is the ability to intercept, whatever technology they use to communicate." Figuring out just how to do that will be tough -- even with the best of intentions. Compromises between law enforcement and carriers over the coming year will usher in a new era of government surveillance. To avoid another Carnivore, privacy advocates must stay alert. Black covers privacy issues for BusinessWeek Online in her twice-monthly Privacy Matters column Edited by Douglas Harbrecht [Non-text portions of this message have been removed] 6995 From: Stephen Pendergast Date: Mon Mar 3, 2003 11:07am Subject: Big Brother Alert: TSA Is Getting Ready To Know You Real Well CAPPS II System to Track All PAX, FBI already looking Looks like the TSA CAPPS II is going to do a good implementation of Orwell, just 20 years late. FBI is already trying. Stephen L Pendergast 619 692-4400 x233 CACI Technologies 1011 Camino Del Rio South Suite 600 San Diego, CA 92108 ----- Forwarded by Stephen Pendergast/SD/CACI on 03/03/03 08:32 AM ----- NEWS SUMMARY Remember... You Have to Go to http://www.aero-news.net to read the WHOLE story! There's much more! TSA Is Getting Ready To Know You Real Well CAPPS II System Tracks All PAX If the government's new passenger tracking service works as advertised, every person who buys a ticket or gets on a commercial flight will be checked for ties to terror activity. The system, ordered by Congress after the Sept. 11 attacks, will gather much more information on passengers. Delta Air Lines will try it out at three unidentified airports beginning next month, and a comprehensive system could be in place by the end of the year. Nationwide Contractor Will Install CAPPS II At All PAX Terminals Transportation officials say a contractor will be picked soon to build the nationwide computer system, which will check such things as credit reports and bank account activity and compare passenger names with those on government watch lists. Advocates say the system will weed out dangerous people while ensuring law-abiding citizens aren't given unnecessary scrutiny. But critics see a potential for unconstitutional invasions of privacy and for database mix-ups that could lead to innocent people being branded security risks. Others are worried that the government won't reveal how information will be gathered and how long it will be kept. Massive Surveillance Without Public Dialogue? "We may be creating a massive surveillance system without public discussion," said Barry Steinhardt, an American Civil Liberties Union director. CAPPS II (Computer Assisted Passenger Prescreening System) will use databases that already operate in line with privacy laws and won't profile based on race, religion or ethnicity. "What it does is have very fast access to existing databases so we can quickly validate the person's identity," Transportation Secretary Norman Mineta said. 50 Years? Maybe Not... Transportation Department spokesman Chet Lunner said a Federal Register notice about CAPPS II that said the background information will be stored for 50 years is inaccurate. He said such information will be held only for people deemed security risks. That doesn't sit well with Jay Stanley, an ACLU spokesman. "When it says in print, 50 years, we'd like to see something else in print to counter that.". Capt. Steve Luckey, an airline pilot who helped develop the system, said CAPPS II will help identify a passenger's possible intentions before he gets on a plane. Unlike the current system, in which data stays with the airlines' reservation systems, the new setup will be managed by TSA. Only government officials with proper security clearance will be able to use it. CAPPS II will collect data and rate each passenger's risk potential according to a three-color system: green, yellow, red. When travelers check in, their names will be punched into the system and the boarding passes encrypted with the ranking. TSA screeners will check the passes at checkpoints. Color Coded PAX The vast majority of passengers will be rated green and won't be subjected to anything more than normal checks, while yellow will get extra screening and red won't fly. Paul Hudson, executive director of the Aviation Consumer Action Project, which advocates airline safety and security, is skeptical. "The whole track record of profiling is a very poor to mixed one," Hudson said, noting profiles of the Unabomber and the Washington-area snipers were wrong. Nine to 11 of the 19 hijackers on Sept. 11 were flagged by CAPPS, but weren't searched because the system gave a pass to passengers who didn't check their bags, Hudson said. People without checked bags now are included. Two other post-Sept. 11 efforts by other federal agencies to gather information on private citizens encountered roadblocks. Operation TIPS, a Justice Department initiative to encourage citizens to report suspicious activities, was shelved last year because of widespread opposition. Similar privacy concerns prompted Congress to cut off funding for the Pentagon's Total Information Awareness, which would mine government and commercial databases to identify potential terrorists. Lawmakers want the Defense Department to come up with better oversight policies. FMI: www.tsa.gov Top Al-Qaeda Suspect Captured Khalid Shaikh Mohammed Said To Have Plotted 9/11 Attacks Col. Rodolfo Mendoza, the former intelligence chief of the Philippine National Police, watched in horror, as we all did, when two airliners destroyed the World Trade Center Sept. 11, 2001. "They've done it," Mendoza said to himself. "They" were a small group of Islamic extremists who hated America and Jews, a group that had tried to blow up New York's World Trade Center in 1993 and two years later had come up with the idea of using hijacked airplanes as guided bombs. Mendoza knew because Philippine police had foiled a plan by the terrorists, called "Project Bojinka," to blow up 12 American-bound airliners from Manila's Nino Aquoy International Airport (right) over the Pacific. They caught one of the plotters, a hapless Pakistani pilot and bomb maker named Abdul Hakim Murad, trying to sneak into a Manila apartment to retrieve a Toshiba laptop computer loaded with incriminating plans. All but one of the terrorists behind that series of foiled or abandoned plans are in prison now. But their leader, a shadowy Pakistani named Khalid Shaikh Mohammed, eluded capture, first in Manila and later in the Persian Gulf nation of Qatar. He made his way to Afghanistan, carrying with him the idea of turning jetliners into smart bombs. Osama bin Laden and his top aides, Egyptian doctor Ayman al Zawahiri and former Egyptian policeman Mohammed Atef, bin Laden's military chief, liked Mohammed's idea. The End Of The Line (Embedded image moved to file: pic00041.jpg) Khalid Shaikh Mohammed (right) was captured by Pakistani and American intelligence operatives over the weekend. He's now being interrogated in an undisclosed foreign country. The top priority during the questioning will be to find out whether other attacks are in the works, information vital to stopping the terrorists, American counterterrorism officials said. But such information is just what Mohammed will probably to try to keep secret. Still, terrorists who learn of Mohammed's capture may alter their plans, abandon safe houses or make hurried telephone calls - actions that could expose them to detection. The only Al Qaeda capture that even comes close to this magnitude was that of Abu Zubaydah last March. Zubaydah more than once provided information that sent American security officials scurrying to provide warnings to cities and sectors of the economy, knowing all the while that he could be lying. But Zubaydah has provided some information that was later verified through other sources, officials said. That included intelligence that led to the detention of Jose Padilla, the American federal officials say was plotting to use a radiological weapon - a "dirty bomb" somewhere in the USA. American Leaders "Elated" By Capture U.S. officials were elated by Mohammed's capture. "This is equal to the liberation of Paris in the second World War," said GOP Rep. Porter Goss of Florida, chairman of the House Intelligence Committee, on ABC's "This Week." "This is a giant step backward for the Al Qaeda," Republican Sen. Pat Roberts of Kansas, chairman of the Senate Intelligence Committee, told "Fox News Sunday." "Now their operations commander is simply out of operations." Officials aren't saying anything about Mohammed's detention. Previous high-level Al Qaeda captives have not been brought to America; they would have rights not afforded on foreign soil, U.S. officials say. Where they are, however, has not been disclosed. As his interrogation moves away from the immediate, Mohammed can provide counterterrorism officials with a deeper understanding of Al Qaeda and its history. Officials believe he can detail how Sept. 11 was put together, answering long-standing questions about the plot's origins: Who chose the World Trade Center and Pentagon as targets? Who picked Sept. 11 as the date? (Embedded image moved to file: pic18467.jpg) How Mohammed Fit Into Al-Qaeda American officials say Mohammed, who was born in Kuwait and has both Pakistani citizenship and ancestry, planned and coordinated key aspects of the Sept. 11 operation. His information can be cross-checked with Ramzi Binalshibh's, his former aide who was captured in September. Binalshibh was a part of the cell that included Mohamed Atta, chief among the Sept. 11 hijackers. Abu Zubaydah, the highest-ranking al-Qaida leader now in custody, has told American officials Mohammed was the brains behind the Sept. 11 attacks on the World Trade Center and the Pentagon, as well as the first Trade Center bombing in 1993 and the failed 1995 "Bojinka" plot in Manila. (Embedded image moved to file: pic06334.jpg) At least one scrap of evidence suggests that Zubaydah may be telling the truth about Khalid Shaikh Mohammed. Intelligence officials said Mohamed Atta (right), the commander of the suicide hijackers, called Mohammed on Sept. 10. The conversation was monitored by the National Security Agency but translated from Arabic only after the attacks that killed more than 3,000 persons. Intelligence officials believe that Mohammed, using coded language, gave Atta final approval for the four teams of hijackers to proceed. "Bin Laden is unquestionably the leader, the symbol and the recruiting poster," the official said. "But it's looking more and more like Khalid actually makes things happen." Roland Jacquard, a French terrorism expert and U.N. Security Council consultant, said, "He is probably the only man who knows all the pieces of the puzzle." Where Atta and the other Sept 11 hijackers were stealthy, Mohammed was flamboyant. Atta, his main foot soldier, was thin and disciplined; Mohammed was neither. The hijackers slipped in and out of Econo Lodges; Mohammed preferred five-star hotels. Colonel Mendoza knew Khalid Shaikh Mohammed as Abdul Majid, a Saudi businessman who lived in the top floor of Manila's Josefa Apartments with Ramzi Yousef, who was later convicted in the first World Trade Center blast, which killed six and injured around 1,000. Some officials say Yousef is Mohammed's nephew; others aren't sure. Mohammed used other names: Salim Ali, Ashrai Refaat, Nabith Renin, Khalid Abdul Waddod and Fahd Bin Abdullah Bin Khalid, maybe a dozen pseudonyms in all. He isn't a Saudi or Qatari businessman, as he claimed in Manila, but a Kuwaiti-born and U.S. -educated Pakistani with a vast network of contacts and covers. "He behaves like he's an intelligence officer," Mendoza said. "He appears and disappears. He has safe houses. He is very, very clever." FMI: www.defenselink.mil Look, Up In The Sky! It's G-Man! FBI Aircraft Flying Anonymously On Surveillance Runs (Embedded image moved to file: pic26500.jpg)Look! Up in the sky! It's a bird! It's a plane (well, it is that)! It's... G-Man! Or is it? Airport officials in Bloomington (IN) said the Cessna 182 flying over the college town several times a day is involved in law enforcement surveillance. But local, state and federal law officers said it wasn't so. Now, the truth comes out. Residents in this city of 69,000 have seen the white, single-engine Cessna 182 at least since Feb. 19 making passes overhead about noon, in the late evening and after midnight. Andrew Stevens tracked the plane one night from about 8:30 p.m. to 1 a.m. "It kind of concerned me. After the plane flew away Friday night, I thought, 'I can take my own terror assessment back down to yellow.'" But then the plane returned last Monday. (Embedded image moved to file: pic19169.jpg) Officials at the Federal Aviation Administration and area airports said they could not comment about the plane beyond confirming that the flights were authorized. "This is a very sensitive situation," Monroe County Airport manager Bruce Payton said Wednesday. "I can only say that people should not be alarmed by this aircraft. This airplane is in contact with air traffic control." Law enforcement officials denied the airplane belonged to them or that they were aware of its mission. "I can say of a certainty it's not anybody out of our post, and I've called the (Indianapolis) hangar and they say it's not any of our planes," said state police Lt. Michael Saltsman, commander at the Bloomington post. (Embedded image moved to file: pic15724.jpg) The Truth Is Told But then, FBI Agent Thomas V. Fuentes said the Bureau initially issued the denial because a reporter asked if the airplane is doing electronic surveillance, which, he says it is not. Fuentes and agent James H. Davis said the FBI is not aware of any threat to Bloomington or the state, but is watching many foreign nationals. Besides individuals, they said, the aircraft is monitoring vehicles and businesses--particularly those open late at night from which faxes or e-mails can be sent. FBI officials in Washington said that use of aircraft is not uncommon in surveillance, particularly when agents are keeping tabs on vehicles over a wide-ranging area. Planes are also used when it is not feasible to introduce agents on the ground. Fuentes said the aircraft is conducting surveillance flights over several communities near Indianapolis. Bloomington, the home of Indiana University's flagship campus, is about 40 miles south of Indianapolis and has a population of 69,000. FMI: www.fbi.gov [Non-text portions of this message have been removed] 6996 From: Kutlin, Josh Date: Mon Mar 3, 2003 11:53am Subject: RE: RE: Taking byte from Baghdad First I want to say thank you to all those who wrote back and gave me some great ideas and good links. What I wound up doing was taking 100 feet of 22 gauge insulated speaker wire, and I hung it off my balcony (does not touch the ground). Then ran it to a piece of insulated copper via alligator clip and into a connector for the external antenna. I also tried hooking it up to the chepo antenna on the radio but the results where ...uhh sub par. The reception when I use the external jack is great. However I now have a different problem. I have multiple stations coming in on one frequency and a lot of other noise. I am looking to "tune the wire". Any suggestions on where to look for a solution? I have seen some sites that recommend connecting to the long wire at different points. Would this help? Josh -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Wednesday, February 19, 2003 9:19 PM To: tscm-l@yahoogroups.com Subject: [TSCM-L] RE: Taking byte from Baghdad On 19 Feb 2003 at 7:54, Kutlin, Josh wrote: > Ok ...thanks to this thread I went out and bought my first shortwave > (DX-399) this past weekend for $30 on closeout. Good price. Welcome to what likely will be a fascinating hobby, and the way many of us started in our careers. > The first thing I realized is that I need a better antenna. Yup. > Did some reading (and rigging) and I realized that the 25 feet of co-ax > (its all I had and the snow closed radio shack) is just not cutting it. There needs to be something at the end of the coax. Coax only couples the receiver to the antenna. Except in rare circumstances in special designs, the coax itself is not the antenna. > My question is and I apologize if it is off topic for this group, but > does any one know where I could find plans to make a cheap active > antenna? It's all radio comm technology, which we all need to know, and antennas are a critical part of this. Not off topic. You do NOT need nor should you use an active antenna. Lots of problems. In 35 years of shortwave listening, I've never used anything other than wire antennas, for both receive and transmit, and I've logged well over 100 countries. Even spoke to the Space Shuttle once, and got a confirmation QSL card (postcard) from NASA. All you need is wire on your receiver. The more the better, but a little hunk of anything will work. I'm playing with a homemade receiver here, literally made on a cakepan with some old tubes from the barn, and all I have is some clipleads tied together and strung up the wall. Am hearing wall to wall stations. Get any scrap of telephone wire, electrical, hookup, anything. The more the better. Throw it out the window. If you're on the ground floor, throw it on top of some bushes. If on an upper floor, just let it hang down. If practical, connect one end to a tree with a piece of rope or plastic something as an insulator. For receive, nothing is critical. For HF, which I presume is where you are interested, just get metal out there. 20 feet will do a lot of good. 50 feet better. 100 feet superb. Capture area is what counts for your initial efforts. That means metal out there. Doesn't have to be heavy gauge wire, either. If you're in an apartment where you need to conceal it, unwind an old transformer to get several hundred feet of very fine wire which can be nearly invisible. Be sure to scrape the varnish off one end before connecting! You don't need a tuner or anything fancy. Just connect the end of the long wire to your antenna terminal. Learn something about HF propogation. Higher frequencies, for example, tend to work better during the day. Lower frequencies open up around sunset. Each band has its own peculiarities, which change from day to day. Learning them is part of the fun. Be patient, tune carefully, and stop and listen. Don't leap all over the bands looking for loud strong stuff. You'll find it, but miss a lot of the interesting lower powered stations. If you get serious, headphones make a difference. Try listening on the amateur (ham) bands, in the evenings 3.5 - 4.0 (80/75 meter wavelength) megacycles, and maybe 7.0 - 7.3 (40 meters) evenings or days. During the day, early on, look up 20 meters and 15 meters. Any issue of the annual Radio Amateur's Handbook will be of tremendous value to you. Monitoring Times magazine (who has a website) will give you some frequencies to tune for starting. Remember to be patient. There's a lot of very fascinating stuff to hear, but you have to be tuning carefully and listening closely to hear it. Practically anyone will hear spy numbers stations and Russian jamming stations which sound like buzzsaws. Sometimes you can hear the foreign broadcast station underneath the jamming the country does not want their people to hear. See if you can find radio station HCJB in Quito, Ecuador, Radio Nederlands in Hilversum, Holland, Deutche Welle in Germany, Radio Havana in Cuba, and good old Voice of America. All are very strong, and found in several places on the dial. Let us know how it goes. Regards ... Steve WA3SWS ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6997 From: Date: Tue Mar 4, 2003 8:58am Subject: Spoofing Caller ID & TeleZapper immunity Call Center Mailer Touts TeleZapper Immunity Feb. 18, 2003 By: Scott Hovanyetz Senior Reporter scotth@d... Teleservices technology firm Castel claims in a direct mail campaign that its call management system gives outbound callers immunity to the TeleZapper, a home-privacy device that fools predictive dialers into thinking that a line is disconnected. The technology is intended not to help telemarketers evade privacy safeguards to reach consumers, but to help collection agencies reach those in debt who use the TeleZapper to mask their phone lines, according to Castel, Beverly, MA. The TeleZapper -- marketed by Royal Appliance Manufacturing Co., which also makes the Dirt Devil -- mimics the three-tone sound phones emit when a disconnected or out-of-service number is dialed. Predictive dialers generally listen for that tone to remove disconnected numbers from a calling list. Castel's system, dubbed DirectQuest, works not by listening for tones but by looking for digital codes -- sent by central offices in the telephone network -- that accompany calls. "We're not fooled by the TeleZapper," said Walter Elicker, Castel's director of marketing. "We just plain old don't see it." Castel is not trying to aid telemarketers in circumventing a home-privacy device, Elicker said, as such consumers are unlikely to buy from telemarketers anyway. But collection agencies and call center service agencies that work for them should be concerned that people could use the TeleZapper to stymie efforts to collect debts by telephone, he said. DirectQuest's method of weeding out disconnected lines would make the TeleZapper useless for that purpose. A Royal Appliance spokeswoman said she was unaware of predictive-dialer technology that bypasses the TeleZapper. She acknowledged that if DirectQuest works the way Castel claims, the TeleZapper would not block calls made by it. The spokeswoman also said she was unaware of consumers using TeleZapper to elude collection agencies, though she also acknowledged that the device would block collection agencies using predictive dialers the same as with telemarketers. Castel's method of detecting digital signals also reduces dead air, Elicker said. Teleservices experts blame answering-machine detection for a majority of dead-air problems, but some connection delay is caused by dialers listening for disconnected lines, he said. By detecting a live line instantly, DirectQuest can connect a call to a live agent in the time it takes for consumers to pick up the phone and bring the receiver to their ear, he said. While the TeleZapper issue is mentioned only briefly in the Castel mailer, top billing on the piece went to DirectQuest's caller-ID capabilities. Call center operators have complained that telephone network technology prevents them from transmitting caller-ID information. To ensure that a client's identity -- rather than their own -- appears on consumer caller-ID boxes, call centers must contact their telephone carrier each time they begin work on a new outbound campaign. Because call centers often switch between campaigns and clients several times a day, outbound callers would have to contact their carrier every few hours, an impractical and costly proposition even if the carrier were willing to do it, Elicker said. Many call centers opt to transmit no caller-ID data instead. Because of this, calls from telemarketers often appear as "out of area" or "unavailable" on caller-ID boxes. Castel solves this problem by letting call centers change outgoing caller-ID information on their own without going through their carrier, Elicker said. Other predictive-dialer makers, including SER Solutions Inc., are touting similar capabilities in their call center technology. Elicker declined to disclose details about the mail campaign results. He said the mailer has had more success in the past two months, in which compliance issues have gained greater attention due to the Federal Trade Commission's announcement of sweeping new telemarketing rules. Read more articles on Teleservices DMN Home | Archives | DM Yellow Pages List Directory | My Account | Online Resources Classified Ads | Direct Mail Quotes Copyright 2001 Courtenay Communications Corporation. Terms & Privacy Policy [Non-text portions of this message have been removed] 6998 From: Matt Paulsen Date: Tue Mar 4, 2003 10:00pm Subject: RE: Spoofing Caller ID & TeleZapper immunity FUD - I read a report recently that has the CEO spouting how this is going to save the telemarketing industry by bypassing telezappers and evading caller ID systems. Guess the CMO should have asked his boss what it was for first. I believe I read it in Information Week around 2-3 weeks ago. >The technology is intended not to help telemarketers evade privacy safeguards >to reach consumers, but to help collection agencies reach those in debt who >use the TeleZapper to mask their phone lines, according to Castel, Beverly, >MA. 6999 From: Matt Paulsen Date: Tue Mar 4, 2003 10:30pm Subject: RE: Spoofing Caller ID & TeleZapper immunity A recent cnn article on Castel with the president's (Burr) input on the industry. http://www.cnn.com/2003/TECH/ptech/02/26/telemarket.tool.ap/ 7000 From: Matt Paulsen Date: Tue Mar 4, 2003 11:01pm Subject: humor Excerpts From The Diary Of A Cat DAY 659 -- My captors continue to taunt me with bizarre little dangling objects. They dine lavishly on fresh meat, while I am forced to eat dry cereal. The only thing that keeps me going is the hope of escape, and the mild satisfaction I get from ruining the occasional piece of furniture. Tomorrow I may eat another house plant. DAY 662 -- Today my attempt to kill my captors by weaving around their feet while they were walking almost succeeded, must try this at the top of the stairs. In an attempt to disgust and repulse these vile oppressors, I once again induced myself to vomit on their favorite chair... must try this on their bed. DAY 669 -- Slept all day so that I could annoy my captors with sleep depriving, incessant pleas for food at ungodly hours of the night. DAY 681 -- Decapitated a mouse and brought them the headless body, in attempt to make them aware of what I am capable of, and to try to strike fear into their hearts. They only cooed and condescended about what a good little cat I was... Hmmmm, NOT working according to plan. DAY 688 -- I am finally aware of how sadistic they are. For no good reason I was chosen for the water torture. This time however it included a burning foamy chemical called "shampoo." What sick minds could invent such a liquid? My only consolation is the piece of thumb still stuck between my teeth. DAY 690 -- There was some sort of gathering of their accomplices. I was placed in solitary throughout the event. However, I could hear the noise and smell the foul odor of the glass tubes they call "beer." More importantly, I overheard that my confinement was due to MY power of "allergies." Must learn what this is and how to use it to my advantage. DAY 699 -- I am convinced the other captives are flunkies and may be snitches. The dog is routinely released and seems more than happy to return. He is obviously a half-wit. The Bird, on the other hand, has got to be an informant. He has mastered their frightful tongue (something akin to mole speak) and speaks with them regularly. I am certain he reports my every move. Due to his current placement in the metal room, his safety is assured. But I can wait, it is only a matter of time. 7001 From: Hawkspirit Date: Wed Mar 5, 2003 6:33am Subject: Enigma http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=2162414185 ENIGMA Cypher machine army model Item # 2162414185 7002 From: Hawkspirit Date: Wed Mar 5, 2003 7:41am Subject: Ebay Bugman I am glad someone is keeping us busy! http://www.stores.ebay.co.uk/id=22196001 Crystal Control Bodyworn Bug with Mic on lead US $110.00 £69.45 -05-Mar 18:37 Superb High Powered Room Bug US $63.00 £39.78 3 bids05-Mar 18:34 Superb High Powered Room Bug US $60.00 £37.88 -05-Mar 18:35 SANYO VOICE ACTIVATED TELEPHONE RECORDER US $48.00 £30.30 1 bid07-Mar 19:45 Telephone Interface Recording Bug Kit US $41.00 £25.89 -05-Mar 18:33 SAB9 MK 3 STEEPLETONE AIRBAND SCANNER US $40.00 £25.25 -07-Mar 19:45 Superb FM Room Bug device NEW PRODUCT US $40.00 £25.25 1 bid07-Mar 19:45 Office or Home Telephone Recording Bug US $39.00 £24.62 07-Mar 19:53 Office or Home Telephone Recording Bug US $39.00 £24.62 07-Mar 19:53 Office or Home Telephone Recording Bug US $39.00 £24.62 1 bid07-Mar 19:54 CCTV PINHOLE B&W CAMERA VIDEO COMPATIBLE US $35.00 £22.10 -07-Mar 19:44 GOVERNMENT AGENCY ROOM BUG WITH SCANNER US $33.00 £20.83 4 bids07-Mar 22:25 Professional PLL3 FM Scanner BRAND NEW US $32.00 £20.20 -07-Mar 19:48 Superb Spy Kit ROOM BUG AND SCANNER US $30.00 £18.94 2 bids11-Mar 20:49 Double Adaptor Phone Bug..... SUPERB PRODUCT US $30.00 £18.94 1 bid07-Mar 19:47 Fully Tuneable FM Room Bug US $25.00 £15.78 -05-Mar 18:36 FANTASTIC TELEPHONE BUG AND SCANNER SPY KIT US $20.00 £12.63 1 bid11-Mar 20:50 Affordable room covert bug device US $20.00 £12.63 1 bid07-Mar 19:47 Spy Bug Detector BRAND NEW LOW START US $20.00 £12.63 -07-Mar 19:46 Affordable FM Telephone Bug TUNEABLE US $17.00 £10.73 1 bid07-Mar 19:48 HANDSFREE WIRELESS Headset Receiver * NEW * £10.50 3 bids11-Mar 20:55 Palm Size FM Scanner SUPERB DESIGN US $16.00 £10.10 -07-Mar 19:47 EXTRA HIGH POWER BUG AFFORDABLE PRICE US $15.00 £9.47 1 bid07-Mar 22:22 EXTRA HIGH POWER BUG AFFORDABLE PRICE US $15.00 £9.47 2 bids07-Mar 22:22 EXTRA HIGH POWER BUG AFFORDABLE PRICE US $15.00 £9.47 -07-Mar 22:22 EXTRA HIGH POWER BUG AFFORDABLE PRICE US $15.00 £9.47 -07-Mar 22:22 Anti Nuisance Telephone Recording Device US $10.00 £6.31 1 bid07-Mar 19:45 Superb 4 foot DELTA KITE VERY low start £6.00 6 bids07-Mar 22:56 Inexpensive Telephone Bug .... Simple To Use US $9.00 £5.68 -07-Mar 19:45 Tiny Minature Electronic Microphone US $9.00 £5.68 1 bid07-Mar 19:47 For more items in this category, click these pages: 1 | 2 | (next page) Back to top 7003 From: Steve Uhrig Date: Wed Mar 5, 2003 9:20am Subject: Re: humor On 4 Mar 2003 at 21:01, Matt Paulsen wrote: > Excerpts From The Diary Of A Cat > The dog is routinely released and seems more than happy to return. He > is obviously a half-wit. Ben Franklin made the following observation: Dogs look up to people. Cats look down on people. Pigs treat people as equals. Cat -- the other white meat. Steve 7004 From: Steve Uhrig Date: Wed Mar 5, 2003 3:00pm Subject: Riser Bond TDR FS Hi all, If anyone needs a high end TDR, I recently got in a Riser Bond 1205T- OSP. I've now gone over it and it's perfect, ready to sell. This is a twisted pair TDR, and it will read two pairs at once, so you can see the difference between pairs and note any differences on one which may indicate a tap or anomaly. It has two inputs, two sets of leads, and displays two traces on the backlit LCD screen which can be superimposed. The unit is in near new condition, new battery, all accessories, manual, two sets of test leads, new canvas accessory carry pouch, and I even put a brand new yellow Pelican case with shoulder strap on it when I calibrated it. This TDR can be used on telephone lines, LAN wiring, or any metallic cable. It has digital storage and can internally store a number of waveforms to print later, or download to a computer when you generate your report for the client. No additional hardware is needed. It's all built in, simple memory storage button on the front panel. I even include the RS-232 computer interface cable. You can print in realtime or store TDR readings to print later, or download into a computer for storage or further analysis. The latest software is available for free download from www.riserbond.com. They update it periodically so I don't bother to include the software. Info on this TDR is there also, as well as tutorials on using it. The dual line capability, two traces at once to compare on the screen, is a superb benefit for TSCM work. In the past, I've had two separate TDRs on two lines to compare. This unit does it all in one. The 1205T-OSP is a current product. The -OSP suffix means OutSide Plant, meaning it is extra rugged for field use. The closed case is totally waterproof. It has one button testing, meaning you clip on the leads to the line under test, push one button, and the unit sets itself up automatically adjusting to the line parameters, and displays a usable waveform all within 10 seconds or so. You can merely jump from line to line using the automatic function, or override anything manually to disassemble the line electronically to whatever extent necessary. Automatic filters switch in to null out noise, 60 cycles or other garbage, and it's like magic. You can manually disable the filters if you wish to do so. Every function has a button. No complicated menus. Set velocity factor, cable impedance, pulse width and much more. A laminated cheat sheet is attached to the case with velocity factors of most common cables. The manual, which stores in the lid, goes into even more detail. Here's a super easy to use, versatile, powerful TDR for the most discriminating user. Current new price, never discounted, is $3195 in the 2002 catalog. The 2003 catalogs are not out yet, but the new price certainly will be higher. My price, as new, calibrated, all accessories, new battery, my warranty, is $2200. Save a thousand bucks. That's not chump change. I take credit cards and ship internationally. Overnight shipping available if need is immediate. If you are outside the U.S. and your mains power is 220VAC, please be sure to mention this when you order so I can include the proper charger. I've only had two others of this model, and both sold quickly. If you don't have a TDR, you're not able to sweep phone lines as effectively as you might. If you have an older one, a tired ragged out Tek or just want the latest greatest, here it is. Email if interested. Feel free to ask for references from me or the dozens on this list who have purchased TDRs from me before. Here's a good review of the different models available: http://tscm.com/riserbond.html Other Riser Bond TDRs are available also, including 1205CX, 1205CXA, 1270, all with new batteries, all accessories, calibrated, in excellent condition with my warranty. Some were used for only one week on a large install. They're at all different price levels starting at $500. Inquire for details if you'd like one different from the 1205T-OSP described above. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7005 From: James M. Atkinson Date: Thu Mar 6, 2003 7:40am Subject: France France has neither winter nor summer nor morals. Apart from these drawbacks it is a fine country. France has usually been governed by prostitutes." --Mark Twain "I would rather have a German division in front of me than a French one behind me." -- General George S. Patton "Going to war without France is like going deer hunting without your accordion." --General Norman Schwartzkopf "We can stand here like the French, or we can do something about it." --Marge Simpson "As far as I'm concerned, war always means failure" --Jacques Chirac, President of France "As far as France is concerned, you're right." --Rush Limbaugh, "The only time France wants us to go to war is when the German Army is sitting in Paris sipping coffee." --Regis Philbin "The French are a smallish, monkey-looking bunch and not dressed any better, on average, than the citizens of Baltimore. True, you can sit outside in Paris and drink little cups of coffee, but why this is more stylish than sitting inside and drinking large glasses of whiskey I don't know." --P.J O'Rourke (1989) "You know, the French remind me a little bit of an aging actress of the 1940s who was still trying to dine out on her looks but doesn't have the face for it." --John McCain, U.S. Senator from Arizona "You know why the French don't want to bomb Saddam Hussein? Because he hates America, he loves mistresses and wears a beret. He is French, people." --Conan O'Brien "I don't know why people are surprised that France won't help us get Saddam out of Iraq. After all, France wouldn't help us get the Germans out of France!" --Jay Leno "The last time the French asked for 'more proof' it came marching into Paris under a German flag." --David Letterman How many Frenchmen does it take to change a light bulb? One, he holds the bulb and all of Europe revolves around him. Next time there's a war in Europe, the loser has to keep France. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7006 From: Hawkspirit Date: Thu Mar 6, 2003 10:18am Subject: Energy Weapons For those of you who would like to find out a little more about home made energy weapons http://www.svbxlabs.com/pages/projects/ 7007 From: Valance Date: Tue Mar 4, 2003 2:32pm Subject: re: Revealed: US dirty tricks to win vote on Iraq war i feel really naive for asking this, but i just do not understand. how come Iraq is not allowed to have nuclear weapons but the USA is and does? and why doesn't the UN have arms inspections inside the USA? thanks for any enlightenment... 7008 From: Kirk Adirim Date: Fri Mar 7, 2003 10:37am Subject: RE: re: Revealed: US dirty tricks to win vote on Iraq war It's really quite simple, if Iraq were a country with a democratically elected leader then they could have nuclear weapons. India, France, South Africa etc. all have nuclear weapons, but they are governed by the people not a dictator. As to the second question, what's to inspect when you admit to, and have full disclosure of the number and types of weapons in your arsenal? -----Original Message----- From: Valance [mailto:val@c...] Sent: Tuesday, March 04, 2003 12:33 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] re: Revealed: US dirty tricks to win vote on Iraq war i feel really naive for asking this, but i just do not understand. how come Iraq is not allowed to have nuclear weapons but the USA is and does? and why doesn't the UN have arms inspections inside the USA? thanks for any enlightenment... ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7009 From: Gregory Horton Date: Fri Mar 7, 2003 6:21pm Subject: Re: re: Revealed: US dirty tricks to win vote on Iraq war Try as I might, I can't see the relationship of this question and TSCM. I might be naive, but I just do not understand. Please enlighten me.... Valance wrote: > i feel really naive for asking this, but > i just do not understand. > > how come Iraq is not allowed to have nuclear > weapons but the USA is and does? and why doesn't > the UN have arms inspections inside the USA? > > thanks for any enlightenment... > > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service > . [Non-text portions of this message have been removed] 7010 From: Stephen Pendergast Date: Fri Mar 7, 2003 9:32am Subject: Re: re: Revealed: US dirty tricks to win vote on Iraq war Saddam had to sign on to get rid of all WMD as part of the treaty with the UN coalition after he had invaded Kuwait, was forced out and lost the first Gulf war, so he could stay in power and they didn't march on Bagdad. Now he seems to have forgotten, as have a lot of other people. Stephen L Pendergast 619 692-4400 x233 CACI Technologies 1011 Camino Del Rio South Suite 600 San Diego, CA 92108 "Valance " Date: Fri Mar 7, 2003 11:02am Subject: Rif: RE: re: Revealed: US dirty tricks to win vote on Iraq war > if Iraq were a country with a democratically > elected leader then they could have nuclear weapons. Very clear, but.... where is that law written? By whom? Elected leader? By the people, I suppose. Where does that leave Pakistan? Ciao! Remo Cornali 7012 From: Date: Fri Mar 7, 2003 3:46pm Subject: Re: re: Revealed: US dirty tricks to win vote on Iraq war I'm sure I'm the 500th person to say this, but Iraq was barred by UN resolutions at the end of the Gulf War from having any sort of program for the development of weapons of mass destruction. They attacked another country....lost the war....surrendered and were subject to provisions placed by the UN (of which they are a member) as a condition for ending the aggression against them. Admittedly, a lot of diplomatic pressure is brought to bear on countries that try to develope nuclear weapons. India comes to mind. So does North Korea. Neither, however, are barred by the UN from developing them. Iraq is. Little good it seems to be doing, but that's the deal. Not naive at all, by the way. The fact that the big boys get the big toys is even a little unsettling to me, but I just have to believe that decision makers on that level have a great deal more insight than little ol' me. Martin Brown Brown & Sikes, Inc. Kirk Adirim wrote: > It's really quite simple, if Iraq were a country with a democratically > elected leader then they could have nuclear weapons. India, France, South > Africa etc. all have nuclear weapons, but they are governed by the people > not a dictator. As to the second question, what's to inspect when you > admit > to, and have full disclosure of the number and types of weapons in your > arsenal? > > -----Original Message----- > From: Valance [mailto:val@c...] > Sent: Tuesday, March 04, 2003 12:33 PM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] re: Revealed: US dirty tricks to win vote on Iraq war > > > i feel really naive for asking this, but > i just do not understand. > > how come Iraq is not allowed to have nuclear > weapons but the USA is and does? and why doesn't > the UN have arms inspections inside the USA? > > thanks for any enlightenment... > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service > . [Non-text portions of this message have been removed] 7013 From: Date: Wed Mar 12, 2003 1:53am Subject: Investigations Seminar-Kansas City The Kansas Association of Licensed Investigators will be sponsoring a training seminar featuring a nationwide speaker this spring in the Kansas City area. The following is the information we have available to us to date: The Art of Investigation How to Investigate Unique Missing Person Cases Overland Park, Kansas May 8th and 9th, 2003 Cost: Member-$145.00 Non-Member-$205.00 If registered after April 11, 2003 Cost: Member-$190.00 Non-Member-$250.00 Registration forms are pending and will be available within the week. This training includes methodology and techniques on how to solve a missing person's case. The specifics on location and the schedule will be distributed in the near future with the registration forms. Gill Alba has been seen on 48 hours, America's Most Wanted and MSNBC Investigates. He is a 28 year, Ex New York City/FBI Task Force Detective. He is recognized nationwide for his investigative accomplishments. You can learn more about Alba at his website http://www.albainvestigations.com In addition, he has a website on the case that gained him nationwide exposure. This is the case he will leading us through in this seminar. Go to http://www.kristinekupka.com for additional information. C. E. "Jack" Kelley, III, MBA C. E. Kelley & Associates Investigations P. O. Box 395, Baxter Springs, KS 66713 (620) 856-4460 Email: kelleypi@a... http://www.angelfire.com/ks/investigations/ Kansas Detective License: D-064 Board Member, Kansas Association of Licensed Investigators Member, American Society for Industrial Security Member, Association of Former Office of Special Investigations Special Agents Member, INTELNET (International organization of private investigators) [Non-text portions of this message have been removed] 7014 From: Fernando Martins Date: Thu Mar 13, 2003 7:28am Subject: electrical security vehicle hi2all This is not a tscm issue, but at least for me it's important and kind of urgent ... and since I can find here people from police and private security companies, I can't think in a better forum for asking :) I have some hints but, I wonder if the list can point me the way to find a product that can fit in "electrical security vehicle". The end is to use them for security staff transport, inside facilities where it's important the absence of noise and pollution. Thanks in advance, FM 7015 From: James M. Atkinson Date: Thu Mar 13, 2003 10:02am Subject: The Truck One day Jimmy Joe was walking down Main Street when he saw his buddy Bubba driving a brand new pickup. Bubba pulled up to him with a wide grin. "Bubba, where'd you get that truck?" "Bobby Sue gave it to me" Bubba replied. "She gave it to you? I knew she was kinda sweet on ya, but a new truck?!?" "Well, Jimmy Joe, let me tell you what happened. We were driving out on Route 6, in the middle of nowhere. Bobby Sue pulled off the road, put the truck in 4-wheel drive, and headed into the woods. She parked the truck, got out, threw off all her clothes and said 'Bubba, take whatever you want'. So I took the truck!!!" "Bubba, you is a smart man!! Them clothes woulda never fit you." -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7016 From: Ocean Group - MU TSD Date: Sat Mar 8, 2003 9:54am Subject: France What's sadder is that obviously it simply isn't a joke your sending out but a voice of contempt for people that do not agree with you. Anyway...on my last visit to France a couple of weeks ago I sat down for dinner with some friends...they couldn't believe what they were seeing on TV, Yanks pouring french wine in the gutter to show their support for their troops. What's more they promptly pointed out that everyone in the US was saying that without them in WW2 there would be no France. They then informed me that without France there would have been no USA during the war of independence. Funny that. Message: 1 Date: Thu, 6 Mar 2003 08:40:36 -0500 From: "James M. Atkinson" Subject: France France has neither winter nor summer nor morals. Apart from these drawbacks it is a fine country. France has usually been governed by prostitutes." --Mark Twain "I would rather have a German division in front of me than a French one behind me." -- General George S. Patton "Going to war without France is like going deer hunting without your accordion." --General Norman Schwartzkopf "We can stand here like the French, or we can do something about it." --Marge Simpson "As far as I'm concerned, war always means failure" --Jacques Chirac, President of France "As far as France is concerned, you're right." --Rush Limbaugh, "The only time France wants us to go to war is when the German Army is sitting in Paris sipping coffee." --Regis Philbin "The French are a smallish, monkey-looking bunch and not dressed any better, on average, than the citizens of Baltimore. True, you can sit outside in Paris and drink little cups of coffee, but why this is more stylish than sitting inside and drinking large glasses of whiskey I don't know." --P.J O'Rourke (1989) "You know, the French remind me a little bit of an aging actress of the 1940s who was still trying to dine out on her looks but doesn't have the face for it." --John McCain, U.S. Senator from Arizona "You know why the French don't want to bomb Saddam Hussein? Because he hates America, he loves mistresses and wears a beret. He is French, people." --Conan O'Brien "I don't know why people are surprised that France won't help us get Saddam out of Iraq. After all, France wouldn't help us get the Germans out of France!" --Jay Leno "The last time the French asked for 'more proof' it came marching into Paris under a German flag." --David Letterman How many Frenchmen does it take to change a light bulb? One, he holds the bulb and all of Europe revolves around him. Next time there's a war in Europe, the loser has to keep France. -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- Vocatus atque non vocatus deus aderit ---------------------------------------------------------------------------- ---------------------- 7017 From: Ocean Group - MU TSD Date: Mon Mar 10, 2003 4:26pm Subject: ASN Spying Oh my god...this comes as such a shock...is the US goverment really this bold? Message : 7 Date : Mon, 10 Mar 2003 16:08:26 +0100 De : "administrateur.dgse.org" Objet : UN INVESTIGATES AMERICAN SPYING http://www.observer.co.uk/international/story/0,6903,910567,00.html UN INVESTIGATES AMERICAN SPYING UN launches inquiry into American spying Martin Bright, Ed Vulliamy in New York and Peter Beaumont Sunday March 9, 2003 The Observer The United Nations has begun a top-level investigation into thebugging of its delegations by the United States, first revealed inThe Observer last week. Sources in the office of UN SecretaryGeneral Kofi Annan confirmed last night that the spying operationhad already been discussed at the UN's counter-terrorism committeeand will be further investigated. The news comes as British police confirmed the arrest of a 28-year-old woman working at the top secret Government CommunicationsHeadquarters (GCHQ) on suspicion of contravening the OfficialSecrets Act. Last week The Observer published details of a memosent by Frank Koza, Defence Chief of Staff (Regional Targets) atthe US National Security Agency, which monitors internationalcommunications. The memo ordered an intelligence 'surge' directedagainst Angola, Cameroon, Chile, Bulgaria and Guinea with 'extrafocus on Pakistan UN matters'. The 'dirty tricks' operation wasdesigned to win votes in favour of intervention in Iraq. The Observer reported that the memo was sent to a friendly foreign intelligence agency asking for help in the operation. It has beenknown for some time that elements within the British security serviceswere unhappy with the Government's use of intelligence information. The leak was described as 'more timely and potentially more importantthan the Pentagon Papers' by Daniel Ellsberg, the most celebratedwhistleblower in recent American history. In 1971, Ellsberg was responsible for leaking a secret history of US involvement in Vietnam, which became known as 'the Pentagon Papers',while working as a Defence Department analyst. The papers fed theAmerican public's hostility to the war. The revelations of the spying operation have caused deep embarrassmentto the Bush administration at a key point in the sensitive diplomatic negotiations to gain support for a second UN resolution authorising intervention in Iraq. White House spokesman Ari Fleischer and Defence Secretary DonaldRumsfeld were both challenged about the operation last week, butsaid they could not comment on security matters. The operation is thought to have been authorised by US NationalSecurity Adviser Condoleezza Rice, but American intelligence expertstold The Observer that a decision of this kind would also have involvedDonald Rumsfeld, CIA director George Tenet and NSA chief GeneralMichael Hayden. President Bush himself would have been informed atone of the daily intelligence briefings held every morning at the WhiteHouse. Attention has now turned to the foreign intelligence agency responsiblefor the leak. It is now believed the memo was sent out via Echelon,an international surveillance network set up by the NSA with thecooperation of GCHQ in Britain and similar organisations in Australia,New Zealand and Canada. Wayne Madsen, of the Electronic Privacy Information Centre andhimself a former NSA intelligence officer, said the leak demonstratedthat there was deep unhappiness in the intelligence world over attemptsto link Iraq to the terrorist network al-Qaeda. 'My feeling is that this was an authorised leak. I've been hearing for months of people in the US and British intelligence community whoare deeply concerned about their governments "cooking" intelligenceto link Iraq to al-Qaeda.' The Observer story caused a political furore in Chile, where President Ricardo Lagos demanded an immediate explanation of the spyingoperation. The Chilean public is extremely sensitive to reports of US'dirty tricks' after decades of American secret service involvement inthe country's internal affairs. In 1973 the CIA supported a coup thattoppled the democratically-elected socialist government of SalvadorAllende and installed the dictator General Augusto Pinochet. President Lagos spoke on the telephone with Prime Minister TonyBlair about the memo last Sunday, immediately after the publicationof the story, and twice again on Wednesday. Chile's Foreign MinisterSoledad Alvear also raised the matter with Foreign Secretary JackStraw. Chile's ambassador to Britain Mariano Fern·ndez told The Observer:'We cannot understand why the United States was spying on Chile.We were very surprised. Relations have been good with America sincethe time of George Bush Snr.' He said that the position of the Chileanmission to the UN was published in regular diplomatic bulletins,which were public documents openly available. While the bugging of foreign diplomats at the UN is permissible underthe US Foreign Intelligence Services Act, it is a breach of the Vienna Convention on Diplomatic Relations, according to one of America'sleading experts on international law, Professor John Quigley of OhioUniversity. He says the convention stipulates that: 'The receiving stateshall permit and protect free communication on the part of the missionfor all official purposes... The official correspondence of the missionshall be inviolable.' 7018 From: Craig Snedden Date: Tue Mar 11, 2003 4:17am Subject: RE: GSM/Nextel and Roaming (a bit o/t) Hi All, Thanks to everyone who responded with suggestions for GSM roaming in the US. I decided to risk it and go with my triband GSM phone. It worked fine all week with connections from Cingular and T Mobile (except in the darkest reaches of Zions NP, Utah - but then I wouldn't expect a signal there). No problems with hi-jacking either John! Thanks for the info anyhow. And yes the trip was good and very successful from a business point of view. Pity I didn't have time to meet up with some of the guys on this list. All the best Craig -----Original Message----- From: refmon [mailto:monitor@r...] Sent: 24 February 2003 08:02 To: Craig Snedden Subject: Re: [TSCM-L] GSM/Nextel and Roaming (a bit o/t) Hi Craig, I don't have a pat answer for you, but if you're going into the Las Vegas area, I want to impress upon you how important your research and final decision is...the cell and pcs companies there are deadly at hijacking your wireless traffic. If, by chance, you'll be at the convention center-take a peak across the road at the Residence Inn... usually, during a convention of significant size, you can find the hijacker trucks parked in that parking lot. It all boils down to dollars-I've had many associates hit with cell or pcs bills hundreds of dollars higher than even the jacked up Vegas rates. You are wise to ask these questions. May your trip be safe and successful. John Collins President, Reference Video, Inc. _________________________________________________________________________ ----- Original Message ----- From: "Craig Snedden" To: Sent: Friday, February 21, 2003 12:05 PM Subject: [TSCM-L] GSM/Nextel and Roaming (a bit o/t) > Hi all, > > Apologies that this post is a bit off topic, but I am having difficulty in > getting an answer to this question and I am sure there is more than enough > expertise in this list to provide the answer.... So here goes. > > I am travelling from the UK to the US (Nevada) next week and have been told > (again!) that my triband gsm phone will be fine (yes roaming is enabled etc. > etc.) However, I have been told that for the area that I will be in, Nextel > is the best carrier. As I understand, Nextel is not a GSM based system, but > iDen, therefore my GSM phone, triband or not won't work... Correct > assumption? > > My question is this, do I simply try getting service with a GSM carrier in > the area and trust to luck, or do I try to get a Nextel compatible handset > and if I do, will my GSM sim chip fit in a Nextel phone...? (I want to be > able to get calls in the normal way while I am away from homebase and not > have to pick up voicemails by calling from another phone). > > Having fallen foul of this before (travelling to Florida.... "Oh yes, your > phone will work all over Florida..." Only to find that the part of Florida I > was in only got PCN coverage!!!) I don't want to be left in the dark again. > > Any suggestions? > > Thanks guys, > > Best regards. > > Craig > --- > Outgoing mail is certified Virus Free. > Checked by AVG anti-virus system (http://www.grisoft.com). > Version: 6.0.456 / Virus Database: 256 - Release Date: 18/02/2003 > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > --- Incoming mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.456 / Virus Database: 256 - Release Date: 18/02/2003 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.459 / Virus Database: 258 - Release Date: 25/02/2003 7019 From: Gil Zimmerman Date: Thu Mar 13, 2003 7:40am Subject: re: recommendations needed, GPS system & service A client is inquiring about a GPS system that would be installed in a customized commercial coach and do the following: 1. Provide moving map displays to a vehicle driver 2. Provide web access for display of real-time data 3. Option to give their clients access to web data 4. Operate from a laptop installed in the coach 5. Monitored by a 24/7 service, like OnStar, etc. Recommendations will be appreciated. This is for possible retrofit into existing vehicle and for plans for second vehicle now in construction planning. Thanks for your assistance, Gil Zimmerman ESI, Inc., USA AGER, Paris, France www.esipi.com NJ 6869 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.459 / Virus Database: 258 - Release Date: 2/25/2003 7020 From: sowhat10101 Date: Thu Mar 13, 2003 8:59am Subject: British intelligence employee questioned on NSA memo leak Who still says it ain't so ? 7021 From: Matthijs van der Wel Date: Thu Mar 13, 2003 9:00am Subject: Iraqi Cyberwar: an Ageless Joke http://www.securityfocus.com/columnists/147 Did U.S. infowar commandos smuggle a deadly computer virus into Iraq inside a printer? Of course not. So why does it keep getting reported? ... Special Forces men were also said to have infiltrated Iraq, where they dug up a fiber-optic cable and jammed a computer virus into it. "It remained dormant until the opening moments of the air war, when it went active..." wrote the columnist. Iraq's air defense system was vanquished. ... Frankly, this is a great story. It's amusing to remember how it kicked up a storm in 1991 after its initial appearance as an April Fool's joke in Infoworld magazine. The gag asserted the National Security Agency had developed the computer virus to disable Iraqi air defense computers by eating windows -- "gobbling them at the edges..." The virus, called AF/91, was smuggled into Iraq through Jordan, hidden in a chip in a printer - - the latter being a distinguishing feature of many subsequent appearances of the hoax. ... Why was the hoax so successful? The easy answer is to simply call everyone who falls for the joke a momentary idiot. But the Gulf War virus plays to a uniquely American trait: a child-like belief in gadgets and technology and the people who make them as answers to everything. Secret National Security Agency computer scientists made viruses that hobbled Saddam's anti- air defense without firing a shot! Or maybe it didn't work but it sure was a good plan! In this respect, the joke is ageless. People are just as able to nebulously theorize about the tech of it and its implications in 2003 as they were in 1991. Will an updated version of the nonexistent AF/91 virus be used against unwired Iraq? Stay tuned... April 1st is less than a month away. 7022 From: ldudlyd Date: Thu Mar 13, 2003 11:35am Subject: From EDN mag.: cell phone Thursday, March 13, 2003 Jam that ringing cell phone? With most of the adult population carrying cell phones, efforts to restrict their use for safety reasons or just common courtesy have fallen on both sides of the law. By Warren Webb, Technical Editor -- EDN, 3/6/2003 Cell-phone use has grown astronomically over the past decade. The Cellular Telecommunications and Internet Association estimates that there are more than 135 million cell-phone subscribers in the United States alone; other estimates have placed worldwide users at more than a billion. Along with the convenience of instant communications, cell phones have brought plenty of controversy. Opponents cite privacy, security, safety, and even tranquility issues in their call for regulations and electronic technology to limit cell-phone use in certain situations or locations. Moviegoers, restaurant patrons, and travelers have long complained of ringing phones and rude cell-phone users disturbing their peace and quiet. In addition to their being annoying, cell phones are associated with several safety issues. Driving an automobile while talking on a mobile phone is the most visible example and raises the most concern. A recent Harvard Center for Risk Analysis study linked cell-phone use to as many as 2600 fatalities and 1.5 million accidents per year. New York state has banned the use of handheld cell phones while users are driving, and several other states are considering similar measures. Accident victims have also sued and won cases against employers when employees are at fault because they were driving while using cell phones. Federal regulations prohibit mobile-phone operation aboard aircraft to prevent interference with navigation instruments. Likewise, there are posted restrictions on transmitter operation near gasoline pumps and blasting zones. A Mayo Clinic study finds that cell phones might interfere with sensitive operating and diagnostic medical instruments. Cell phones also bring up security and confidentiality issues. For example, phones hidden in meeting rooms or government facilities may leak sensitive information or trade secrets. Gambling casinos want to restrict cell phones to reduce cheating, and prisons want to stop communications to increase security. Although most of these activities have legitimate reasons to stop cell-phone use in a limited area, only a few ways exist to stop RF transmissions. The most common approach is simply to ask users to voluntarily turn off their phones. Facilities can also screen or electronically sense RF signals to guarantee a transmission-free area. Although it does not eliminate RF transmissions, electronic jamming stops all cell-phone activity in a limited area. Unfortunately, the practice is illegal in the United States and most of Europe. Federal Communications Commission regulations prohibit you from operating, owning, manufacturing, marketing, or offering for sale any device that intentionally interferes with any RF transmissions. These activities are punishable by an $11,000 fine and as much as a year in prison. Tower talk You can understand how electronic jammers and detection devices operate with a little background on cell-phone basics. Each cell-phone company divides coverage areas into 5- to 10-square-mile cells with base-station antenna towers at their center. Each carrier is allocated channels within frequency bands set aside for cell phones. In the United States, the AMPS (Advanced Mobile Phone System) and PCS (Personal Communications Services) systems use hundreds of channels for digital and analog signals in the 869- to 849-MHz and 1930- to 1990-MHz bands. Most cell phones in Europe, Africa, and Asia operate on the GSM (Global System for Mobile communications) system in the 935- to 960-MHz and 1805- to 1880-MHz bands. Although the frequency bands support fewer than 1000 channels, phone systems can accommodate millions of conversations by reusing channels in nonadjacent cells. When you turn on a cell phone, it continually scans for the strongest signal from the nearest base-station tower. If the phone cannot locate a tower, it displays an out-of-service indication. Brute-force jamming kills cell-phone operation by overpowering the signal from the base-station tower. Although cell phones can change channels or increase their power to overcome interference, typical electronic jammers cover all of the channels for a specific system. A more intelligent jamming system is harder to detect, because it provides an interfering signal just long enough to disable communications, and then shuts down. Because users cannot tell whether their phone is being jammed or is simply out of range or blocked by building characteristics, illegal electronic jammers may continue to operate without complaints from the general public. Special Electronic Security Products of Israel produces a series of cell-phone jammers with a range of 9m to 1 km. Customers can select any worldwide cellular frequency band or a combination of them. The vendor's smallest device, the Ctn101, is battery-powered and fits into a briefcase or purse. The top-of-the-line CTN106 requires a 19-in. rack-mount package and jams large areas, such as prison compounds and military installations. Hubgiant, a Taiwanese company, produces several versions of its WAC1000 wave-deactivator cellular-phone immobilizer (Figure 1). These small, battery-operated devices cover a sphere with a radius of approximately 50 ft and can cover one or multiple worldwide cell-phone bands. The device output power is 10 to 20 dBm (10 to 100 mW) for each frequency band. Although its operation is illegal in the United States, Hubgiant's Model WAC1000A covers the 800- and 1900-MHz bands. Netline of Israel offers the $6500 C-Guard HP, a ruggedized, portable, weatherproof jamming system built into a hardened carrying case (Figure 2). Netline suggests applications in prisons, bomb squads, military bases, and police forces. With an effective jamming range of 20 to 1000m, depending on base-station-signal strength at the site, the C-Guard HP can eliminate cellular communications over a wide area. Cellular distraction Cell Block Technologies of Fairfax, VA, has proposed a novel technique for blocking cell-phone use in a limited area. Although the company has no products for sale, Cell Block proposes to simulate a base-station tower and distract the cell phone from establishing communications with a real base station. Once the Cell Block control unit establishes communications with the phone, it instructs the phone to go to a channel that is not active in that cellular system. This action prohibits the phone from receiving communication from the original system's base station. Although it does prevent communications within range of its transmitter, the company claims that its device does not interfere with≠but rather intervenes in≠communications. No one has tested this theory in court. Uniquely, Cell Block proposes to monitor the strength of the base-station signal and adjust the signal level of its device to ensure a constant effective range. Although people often think of jamming as the only way to stop cell-phone abuse, several companies offer alternative electronic products to help restrict wireless communications. Bluelinx offers Q-zone, which silences Bluetooth-based cell phones within 10m of a Bluelinx node. When a mobile phone enters a designated quiet zone, its ring volume changes, depending on its specifications. For example, one type of phone may switch to vibrating mode, another may ring at a much lower volume setting, and a third might divert callers to voice mail. Once it leaves the quiet zone, the phone seamlessly reverts to its previous volume settings. Bluelinx nodes cost about $500 (Figure 3). Cell-phone detectors are another legal alternative to jamming. Passive devices can scan the cellular-frequency bands and sound an alarm or flash a light when they detect a cell-phone signal. Enforcement or restricted entry is then up to the establishment. Zetron offers the Cell Phone Detector Plus, a small, wall-mounted, receiver-only device that searches for nearby transmissions in the mobile-phone or two-way-radio spectrum (Figure 4). The unit covers 400 to 2000 MHz and delivers a voice message along with local and remote alarms. You can adjust the device's sensitivity to cover a sphere with a 2 to 30m diameter. Probably the simplest legal way to eliminate all cell-phone activity in an indoor space is to line the area with grounded metal mesh to create a simple Faraday cage. This shield blocks RF transmissions into and out of the space. The technology is available for even more widespread regulation of cell-phone activity. For example, the government requires location information for its E911 program to be available in all cell phones by 2005. Thus, carriers could prevent cell-phone operation within certain "quiet zones" and simply route all of the subscriber's calls to voice mail or at least switch the phone to vibrating mode. Even though some of these futuristic approaches are possible, it seems that good manners could eliminate many cell-phone complaints. ---------------------------------------------------------------------- ---------- For more information... When you contact any of the following manufacturers directly, please let them know you read about their products in EDN. Bluelinx 1-704-341-3323 www.bluelinx.com Cell Block Technologies 1-703-277-7703 www.cell-block-r.com Hubgiant Co +886-2-22988931 www.hubgiant.com Netline +972-3-5109855 www.netline.co.il Special Electronic Security Products +972-3-5325132 www.sesp.co.il Zetron 1-425-820-6363 www.zetron.com From: Date: Thu Mar 4, 2004 2:37pm Subject: Re: Re: From ? to 5.8 + GHz TSCM Equipment In a message dated 3/4/2004 5:12:20 PM Pacific Standard Time, steve@s... writes: > That said, I have precisely what you are requesting for sale in the > form of an Avcom spectrum analyzer with frequency extenders to 6 > gigs, but I'm trying real hard to dissuade you from pursuing it. Listen to Steve. If your client needed open heart surgery, would you sell him a scalpel. For the cost of the equipment, he / you might be able to get a few years worth of sweeps by pros with better equipment than he could afford and know how to use it. …minence grise, Being an ex in this business is like being an ex-marine, ex-biker, ex-Mafia member, or an ex-homosexual. Michael [Non-text portions of this message have been removed] 8327 From: James M. Atkinson Date: Thu Mar 4, 2004 6:35pm Subject: Re: From ? to 5.8 + GHz TSCM Equipment Try the new CPM-700 with the BMP-1200 which provides coverage to 12 GHz for minimal cost. http://www.tscm.com/cpm700a.html Let me know if you need one, we take all major credit cards and can ship quickly. -jma At 04:49 PM 3/4/2004, Intercept Investigations wrote: >Does anyone have any recommendations for any 'basic' (I translate this >to infer 'simple and relatively inexpensive') sweep gear that can cover >up to at least the 5.8 GHz range. I have a client who is specifically >requesting this equipment for ongoing self-protection. > >Thank you, > >-- >Steven W. Gudin, Director >Intercept Investigations >700 NW Gilman Boulevard #463 >Issaquah (Seattle), WA 98027 > >Tel: (425) 313-1776 >Fax: (425) 313-1875 > >Web: www.InterceptInvestigations.com >Email: mail@I... > >Washington License # 1661 >Nevada License # 847 > >NATIONWIDE & INTERNATIONAL INVESTIGATION SERVICES > >This communication is intended for the sole use of the individual or >entity to whom it is addressed and may contain information that is >privileged, confidential and exempt from disclosure under applicable >law. If the reader of this communication is not the intended recipient >or the employee or agent for delivering the communication to the >intended recipient, you are hereby notified that any dissemination, >distribution or copying of this communication may be strictly >prohibited. If you receive this email in error, please notify us >immediately and delete this message from your computer. Nothing >contained within this email message is intended, nor should it be >interpreted as, legal advice or counsel. > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8328 From: Elliott & Associates, Ltd. Date: Thu Mar 4, 2004 10:12pm Subject: Re: From ? to 5.8 + GHz TSCM Equipment I have used the CPM upgrade on the last couple of searches and found that it is really an excellent addition to an already good piece of equipment. It is very good for detecting the video cameras transmitting on 2.4. It also seems more sensitive on the spread spectrum devices as I was getting a bigger kick sooner. However, as with any piece of equipment it is only as good as the operator. It is worth looking at given the elevation in frequencies currently being sold and/or used. Regards, Bill Elliott, CII ELLIOTT & ASSOCIATES, Ltd. (GMT -7) www.prvt-eye.com www.cybercrimeinternational.com "tomorrow is promised to no one" ----- Original Message ----- From: "James M. Atkinson" To: "TSCM-L" Sent: Thursday, March 04, 2004 5:35 PM Subject: Re: [TSCM-L] From ? to 5.8 + GHz TSCM Equipment > Try the new CPM-700 with the BMP-1200 which provides coverage to 12 GHz for > minimal cost. > > http://www.tscm.com/cpm700a.html > > Let me know if you need one, we take all major credit cards and can ship > quickly. > > -jma > > > > At 04:49 PM 3/4/2004, Intercept Investigations wrote: > >Does anyone have any recommendations for any 'basic' (I translate this > >to infer 'simple and relatively inexpensive') sweep gear that can cover > >up to at least the 5.8 GHz range. I have a client who is specifically > >requesting this equipment for ongoing self-protection. > > > >Thank you, > > > >-- > >Steven W. Gudin, Director > >Intercept Investigations > >700 NW Gilman Boulevard #463 > >Issaquah (Seattle), WA 98027 > > > >Tel: (425) 313-1776 > >Fax: (425) 313-1875 > > > >Web: www.InterceptInvestigations.com > >Email: mail@I... > > > >Washington License # 1661 > >Nevada License # 847 > > > >NATIONWIDE & INTERNATIONAL INVESTIGATION SERVICES > > > >This communication is intended for the sole use of the individual or > >entity to whom it is addressed and may contain information that is > >privileged, confidential and exempt from disclosure under applicable > >law. If the reader of this communication is not the intended recipient > >or the employee or agent for delivering the communication to the > >intended recipient, you are hereby notified that any dissemination, > >distribution or copying of this communication may be strictly > >prohibited. If you receive this email in error, please notify us > >immediately and delete this message from your computer. Nothing > >contained within this email message is intended, nor should it be > >interpreted as, legal advice or counsel. > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > -------------------------------------------------------------------------- --------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > -------------------------------------------------------------------------- --------------------------- > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------------- --------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------------- --------------------------- > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > 8329 From: Mitch D Date: Fri Mar 5, 2004 7:32pm Subject: Nextel Exploit Advisory NEXTEL ALERT Be advised that yesterday we learned a very disturbing feature about our Nextels. An SFPD undercover officer, who was doing some buys in one of our cases, was compromised for the following reason. He provided the crook with his Nextel cell phone as a UC contact number. He changed his voicemail and left a message using his UC name (matching his UC cover). The crook called the # and when it rang over to voicemail he pushed Option 1. Option 1, identifies the owner/operator of the phone. If you recall when you first activated your Nextel you had to call in and leave your name (or something to like that) on a Nextel recording. Anyway, that original voice recording is in EVERYONE's Nextel memory and can easily be accessed. In our case, the crook got the UCs real name and entered it into Google. Within minutes the crook learned that the UC was in an SFPD Officer who was in an officer involved shooting several years ago. The incident made the paper and is forever memorialized on the internet. It probably took all of five minutes to figure this out. As a side-note, I entered my name in Google last night and it immediately gave links to, among other things, DEA watch ("evaluations" are posted), the results of every road race I have run as well as my wife's alumni records, church newsletters that get posted on their website. DEA Tech took the time to figure out how to disable this function (refer below) on our Nextels. I advise anyone who does UC work to do the same. He sent it to a few people in the division who do UC work but you all should be advised of the same. -----Original Message----- CALL YOUR CELL # ONCE YOUR VOICE MAIL KICK'S IN PRESS #1, THIS WILL VERIFY IF YOUR NAME IS RECORDED FROM THE INTIAL ACTIVATION. IF THIS IS THE CASE, DO THE FOLLOWING; 1. CALL YOUR VOICE MAIL AND ENTER CODE, AS IF RETRIEVING MESSAGE 2. HIT OPTION #4 - PERSONAL OPTIONS 3. HIT OPTION #4 - PERSONAL PREFERENCES 4. THEN HIT DELETE KEY #3? TO DELETE NAME DO A RE-TEST USING ABOVE VOICEMAIL RETREIVAL TO VERIFY YOUR NAME IS DELETED. ===== Mitch Davis TSCM/Special Operations Group Inc. Nashville,TN.USA MitchD@t... site:www.tscmusa.com. Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 __________________________________ Do you Yahoo!? Yahoo! Search - Find what youíre looking for faster http://search.yahoo.com 8330 From: Date: Sat Mar 6, 2004 5:28am Subject: charged for camera hidden in stereo equipment 'Voyeur' victims sought -- The owner of an Adrian tanning salon was arraigned on charges stemming from a camera hidden in stereo equipment. By David Frownfelder -- Daily Telegram Staff Writer ADRIAN -- Adrian police officers say no one is sure how many women patronized Rock-N-Nails Salon, 1042 S. Main St., to use the facility's lone tanning bed throughout the past two years. Adrian Police Officer Larry Van Alstine displays the stereo in which police said a camera was hidden to photograph customers at Rock-N-Nails in Adrian. -- Telegram photo by Lad Strayer But there is no doubt that many women who visited the business may have been victimized by the actions of the salon's owner, Danny Eugene Daulton of Adrian, according to Police Chief Michael Martin. Police are now searching for additional victims in a voyeurism case in which Daulton is charged with hiding a video camera in the booth's stereo unit to secretly tape female customers. "We are looking backwards up to two years. We have no idea of the volume of people using the tanning beds," Martin said. Daulton was arraigned Monday in Lenawee County District Court before Judge James Sheridan on charges of eavesdropping-installing equipment and eavesdropping-divulging information. The first count is that Daulton allegedly installed the camera and the second charge, Martin explained, alleges that he viewed the tapes. Daulton has been released after posting $10,000 cash or surety bond. Approximately 30 women had come forward as of Monday afternoon and more victims likely will be identified through the efforts of past and present employees of the salon, Martin said. Those employees are cooperating, Martin said, because they could also have been victims. "We carried out a search warrant at his home and recovered several dozen video tapes," he explained. "Employees tanned for free and could have been taped. They told us this could have been going on for up to two years." The search warrant had been carried out and Daulton was arrested about 1 a.m. Saturday. Police don't believe Daulton shared the video tapes with anyone else. Martin stressed that only female police employees were viewing the confiscated tapes. "We are having female employees look at the very sensitive issues," Martin said. Police are also trying to determine if any of the women who were videotaped are minors, which, if proven, could constitute a child pornography charge. "We haven't found any minors yet. But if we did, that would shed a whole other light on the matter. A lot of young people used this facility," Martin said. "If a girl under 18 was taped, that could add other (types of) charges." Police had not received any complaints of any sort since the shop opened, Martin said. He stressed that police found no evidence he had sent any photos or recordings to anyone else. Martin is asking anyone who may have used the salon in the past two years to call Detective Kevin Grayer at 264-4804. Martin and Detective Sgt. Lynn Courington said police had received a tip last week of a suspicious situation at the tanning salon. Investigating officers found the small camera hidden inside a stereo unit in the tanning bed at the facility, which has been in business for more than two years. As of Monday afternoon, Daulton was facing 30 sets of charges and the police chief said that each woman who comes forward could add other charges to the case against him. Each charge is a two-year felony. http://www.lenconnect.com/articles/2004/03/02/news/news01.txt [Non-text portions of this message have been removed] 8331 From: Date: Sat Mar 6, 2004 5:31am Subject: cameras and bugs in posh hotel suites Posh Pattni Hotel Raided for Dossier The East African Standard (Nairobi) NEWS March 4, 2004 Posted to the web March 4, 2004 By Dominic Wabala Nairobi Detectives yesterday raided the luxury Grand Regency Hotel in search of more of tycoon Kamlesh Pattni's secret tapes and documents. They also raided the International Casino and reportedly arrested a former Grand Regency receiver manager. Mr Gitari Njeu, another former Grand Regency receiver manager, accompanied the officers from the hotel to the International Casino but it was not clear if he had been placed under arrest or whether he was merely assisting with investigations. Both the Grand Regency and the Casino are owned by Pattni. The 10th floor of the Grand Regency Hotel, Nairobi, where rooms 1012, 1013 and 1014 which police suspect are bugged are located At Grand Regency, detectives recovered Closed Circuit Television (CCTV) cameras, tapes and documents related to the Goldenberg scandal, according to sources. They searched several floors of the posh hotel but paid particular attention to the 10th floor Cappuccino bar, rooms 1012, 1013, 1014 and the Presidential Suite in which CCTVs and eavesdropping devices are alleged to have been installed. The source further said detectives suspected that the devices were installed and used to gather information on several prominent personalities who stayed in the rooms. The raid extended into the night as detectives searched all premises to look for more evidence. The group was led by the Kiambu Divisional Criminal Investigations Officer, Mr Mutie, who led the other previous operations on 16 of the tycoon's other premises, including his home in Kitisuru, Goldenberg secretariat in Westlands, a station on Jogoo Road, his sister's house in Parklands, among others. The detectives were interested in gathering more evidence on the Goldenberg scandal and how the money was disbursed to each bribe-taker who visited the tycoon. The raid is likely to have been prompted by the discovery of tapes and documents from the tycoon's premises recently raided by detectives. The investigators were seen leaving the hotel with documents and getting into a red car, accompanied by a hotel official. The source further revealed that some cameras were removed from a room on the 10th floor. According to the source, the detectives searched Pattni's office at the hotel and that of the receiver manager. The officers, sources say, want to know what assets the Goldenberg money bought, with a view to finding ways of seizing them. A senior official from Sheria House at the weekend travelled out of the country, immediately after getting a full report on the seized documents and tapes, to track down some of the funds. The official has expressed hope that most of the money is likely to be recovered since it can now be traced. Copyright © 2004 The East African Standard. All rights reserved. Distributed by AllAfrica Global Media (allAfrica.com). [Non-text portions of this message have been removed] 8332 From: James M. Atkinson Date: Fri Mar 5, 2004 8:13am Subject: Annan requests bugging explanation http://www.khilafah.com/home/category.php?DocumentID=9173&TagID=2 Annan requests bugging explanation uploaded 05 Mar 2004 UNITED NATIONS - U.N. Secretary-General Kofi Annan has met with British Ambassador Emyr Jones Parry in search of an explanation of alleged British bugging of his office, but both men were mum after their talk. "The secretary-general asked to see the ambassador ... and that meeting has now taken place," said U.N. chief spokesman Fred Eckhard on Thursday, adding he would have nothing more to say on what happened. Jones Parry also declined comment after the meeting. Eckhard said Annan was waiting for a fuller explanation of charges that British intelligence spied on him ahead of the U.S.-led invasion of Iraq last March. Clare Short, the former international development secretary, said last week that British agents had spied on the U.N. leader. Officials of the world body said the bugging, if true, violated international law and should immediately be stopped. Jones Parry had telephoned Annan, on behalf of Prime Minister Tony Blair, immediately after the bugging allegations became public. But diplomatic sources said their initial conversation had not directly addressed the bugging issue. The world body was clearly stunned by Short's claims as she was a high-ranking official when the alleged bugging took place. She resigned from the government after the war. Short told BBC radio she had read some of the transcripts of the bugging of Annan's office, on the 38th floor of the U.N. complex in Manhattan facing the East River. "In the case of Kofi's office, it was being done for some time," she said. A British translator earlier leaked a top-secret U.S. document to the media seeking London's help in bugging U.N. Security Council members in the run-up to the Iraq war. Source: Reuters ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8333 From: Joao Date: Wed Mar 3, 2004 5:12pm Subject: Public Records at Internet Hi All, I live in Brazil and want to get information regards real state, companies property, address and fone numbers (including reverse search) and other public information regards brasilians. I¥m looking for internet sites wich gives this information for free. Besides that, I wish to know internet sites wich gives the same information, but for finatial paradise like BVI, Caiman, etc. Thanks and sory about my poor english. Joao. -- POP. Nem parece internet gr·tis. Seja POP vocÍ tambÈm! Acesse: http://www.pop.com.br/discador.html e baixe o POPdiscador. 8334 From: James M. Atkinson Date: Sun Mar 7, 2004 9:05am Subject: Spying: The United Nations of Wiretaps? http://www.msnbc.msn.com/id/4409621/ Spying: The United Nations of Wiretaps? NewsweekMarch 8 issue - There was outrage at the United Nations last week when a former member of Tony Blair's cabinet claimed that British intelligence had conducted electronic surveillance on Secretary-General Kofi Annan in the lead-up to the Iraq war. But there wasn't much surprise. Many diplomats already assumed that wiretapping was rampant. Former Australian diplomat Richard Butler says he held sensitive meetings in Central Park. Former chief Iraq weapons inspector Hans Blix believes he was tapped. Adolfo Aguilar Zinser, Mexico's former U.N. ambassador, told NEWSWEEK, "If you are in a room and you begin a conversation that is delicate for any reason, you say, 'Let's go outside,' or 'Please do not continue'." The allegation comes right after British officials closed another wiretap controversy by absolving former intelligence officer Katharine Gun of breaking the U.K.'s Official Secrets Act-even though she admitted leaking a top-secret memo to Britain's Sunday newspaper The Observer. The memo, from the stealth U.S. National Security Agency, requested assistance in spying on undecided U.N. Security Council members last March in the lead-up to the war. Did spying have an impact on the war debate? Zinser, who was Mexico's United Nations rep at the time, claims he and other undecided missions came up with a preliminary compromise proposal on renewed inspections. The next morning, U.S. officials approached members and told them, "Don't even try it." He claims to have other "circumstantial evidence" of wiretapping, but is saving it for his book. The Chileans (a swing vote at the time) say they swept their U.N. office after The Observer article and found wiretaps. They decided to resolve the situation through "diplomatic" channels. But officials in Mexico's Ministry of Foreign Affairs told NEWSWEEK they have been waiting more than two months for a response to diplomatic "expressions of concern" sent to Washington and London. It seems unlikely they will hear any direct admission of spying from Bush or Blair-unless they install some wiretaps of their own. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8335 From: frost_bitten_ca Date: Sun Mar 7, 2004 5:48pm Subject: Canada listens to world as partner in spy system Mar. 7, 2004. 08:18 AM Canada listens to world as partner in spy system LYNDA HURST When a former cabinet minister recently charged that British spies had listened in on U.N. chief Kofi Annan in the countdown to the Iraq War, Prime Minister Tony Blair stonewalled. Clare Short said she'd seen transcripts of Annan's conversations. A furious Blair refused to confirm or deny the accusation, but blasted Short for going public. The allegation came as no surprise to anyone at the United Nations. It's a given that the New York headquarters are bugged and always have been, by friend and foe alike. It's technically illegal and officials don't like it. But there is nothing they can do but register a complaint and enjoy the squirming when a country gets caught red-handed. The public may not be so blasÈ about the fact that "good" countries, not just "bad," practice espionage ≠ routine, all-pervasive, electronic espionage. But it's naive to think otherwise. All nations spy on friends as well as enemies. Not that anyone broke into Annan's office and planted a Watergate- style bugging device. What Short likely saw were intercepts from a little-known surveillance system called Echelon, which automatically monitors virtually all of the world's communications. Every day, billions of telephone calls, e-mails, faxes, radio transmissions, even Internet downloads are captured by orbiting satellites monitoring signals on Earth, then processed by high- powered computers. A minute percentage of the traffic is "tagged" for transcription, translation if necessary, and analysis. The ordinary messages of ordinary people get caught up in the sweep, but aren't generally tagged. The likes of a U.N. secretary-general are. "Echelon is an electronic vacuum cleaner, but it is finely tuned," says Canadian intelligence specialist Wesley Wark. "They have to be precise to get what they want." But who is "they?" The high-tech Echelon system is operated by five nations known as the UKUSA alliance: the United States, Britain, Canada, Australia and New Zealand. Referred to in some circles as the "Anglo-Saxon Mafia," the U.S.-led network has existed for 58 years, emerging out of the Allies' successful signals-intelligence, or "sigint," operations during World War II. Its original primary job was to spy on the Soviet Union and win the Cold War. Today, it is counterterrorism. In a series of still-classified bilateral agreements ≠ each country has a deal with the U.S. ≠ UKUSA members pledged to jointly acquire and share all signals and communications intelligence. Common procedures, targets, equipment and methods were spelled out, along with a commitment to secrecy about the alliance's operations. The world was split into regions: Britain got Africa and Europe east to the Urals; Australia and New Zealand got Oceania; and the U.S. got the Soviet Union and wherever else it wanted. As of 1946, Canada, through the newly created Communications Security Establishment (CSE), would home in on the northern latitudes and polar regions. It had shown its expertise there during the war. "In the war, Canada had the best antennas for listening to the Soviet Union," says John Thompson, president of the Mackenzie Institute, an anti-global violence think tank in Toronto. "And we had prime listening posts, such as Alert." Canadian Forces Station Alert, on Ellesmere Island in present-day Nunavut, is still an important ground station in the Canada's network of "sigint" posts. It mainly intercepts satellite military communications. The other three are CFS Leitrim, south of Ottawa, which intercepts diplomatic traffic in and out of Canada; CFS Masset off the coast of B.C., and Canadian Forces Base Gander, Nfld., both of which primarily tap into maritime transmissions. The high-tech Echelon listening system was devised in 1971 by the American National Security Agency (NSA), which was, and remains, the dominant UKUSA member and contributor of technology. Today, it is believed to operate 120 intercept stations in up to a dozen countries; their giant antennas all point at the communications satellites continuously circling the planet. With the end of the Cold War, Echelon's priorities moved to monitoring rogue states and international organized crime. Since the 9/11 attacks, however, its emphasis is on fighting terrorism, and all that comes under that rubric ≠ attitudes inside the U.N. Security Council toward the Iraq War, for example. The intelligence gleaned is shared among the five alliance partners and often with other participants: Germany, Norway, Denmark, and Turkey have all signed secret "third-party" UKUSA agreements. Though Echelon is by far the biggest monitoring network in the world, other nations have their own satellite-based listening systems. Russia, China, France, Israel, India and Pakistan all use "sigint" as a major source of intelligence. "Everybody listens to everybody else non-stop," says John Thompson. "The public does not realize it, but Canada has been doing it for decades. It's an important part of our defence." The only countries that don't monitor global communications, he says, are "the poor ones who can't afford the technology." Canada's low-profile CSE collects foreign intelligence in the name of national security, but also attempts to block electronic interception by other states. After the Anti-terrorist Act was passed in 2001, the agency's budget was boosted to about $300 million. Its staff ≠ known as "291ers" after their military occupation code ≠ was increased to 1,300, making it the country's second biggest spy force, after the Canadian Security Intelligence Service. More computer power was added to headquarters and its other properties in Ottawa, and extra antennas were installed at some of the listening stations. Leitrim now has six. ---------------------------------------------------------------------- ---------- `The terrorist act gave the CSE new powers. It now has carte blanche to intercept in Canada.' Wesley Wark, intelligence specialist ---------------------------------------------------------------------- ---------- Though it all may sound like Big Brother, there is no need for the public to "get paranoid that the government is listening to them," says Thompson. "That's not the case. They can't `read' a fraction of what they pick up." In fact, less than 2 per cent of the transmissions are ever seen by human eyes. Artificial intelligence does the bulk of the listening and reading. The Echelon computer process used to filter messages is codenamed "Dictionary," according to Duncan Campbell, a British journalist who authored a report on UKUSA for the European Parliament in 2000. Each alliance partner has its own dictionary of key names, phrases, people, places and words (bomb, for example), but all five are used at each country's listening posts. The computer scans all messages for these words, flags those that contain them, and eliminates the vast majority that don't. If something is picked up containing a key word in another member's dictionary, it is forwarded on to that country. Everything ends up at NSA headquarters in Virginia. Echelon has also devised an advanced voice-recognition system. Still imperfect, it's thought to be in use only at Menwith Hill, the U.S. forces base in northern England that is the world's largest listening station. The system's biggest challenge, says Campbell's report, is to find a way of intercepting fibre-optic telecommunications that use light pulses to transmit data and are not collected by satellites. That, and combating encryption. Campbell also says "information warfare" personnel at NSA are working to fight its ever-increasing use by directly interfering with targeted computers: "The methods remain controversial, but include information-stealing viruses (to) data bugs and pre-emptive tampering with software or hardware." Any UKUSA partner can ask any of the others to intercept domestic communications. It then can truthfully say it does not spy on its own citizens, ≠ illegal in all five countries. That's what happened in 1983, according to former Canadian intelligence officer Mike Frost. His 1994 book, Spyworld, claimed that Britain asked the CSE to monitor two of then-prime minister Margaret Thatcher's cabinet ministers whom she suspected of disloyalty. The agency carried out the intercepts. "We never stopped to question the morality of doing what amounted to dirty tricks for a partisan politician in a foreign land. After all, we weren't spying on Canadians, that time, anyway." Ottawa has vehemently denied that it listens in on citizens. But experts say it doesn't have to when the UKUSA alliance, mainly the U.S., can monitor targeted individuals on its behalf. That may be over, says Wesley Wark, because it is now fully legal for the CSE to turn its computers on to Canadians' conversations, faxes and e-mails ≠ provided there is a foreign link. To be precise, the agency's post-9/11 mandate allows it "to collect the communications of a legitimate foreign-intelligence target located abroad if those communications enter or depart Canada." "Like all secret and sensitive systems, it is subject to abuses," says Wark. "Of course, that didn't concern us when it was the Soviets we were spying on." The CSE has a commissioner, former chief justice Antonio Lamer, whose role is to ensure it obeys the law. But Wark says he doesn't have the power that the Security Intelligence Review Committee has over CSIS. "It's doubtful his presence does anything but stop the most egregious abuses," Wark says. The agency isn't accountable to Parliament or the public. It comes under the umbrella of the Department of National Defence, but its chief, Keith Coulter, reports solely to the Privy Council and the cabinet. "The terrorist act gave the CSE new powers," says Wark. "It now has carte blanche to intercept in Canada." Its access to Echelon provides it the same means worldwide. No international law prohibits or governs the system's use, says Wark, and there is little oversight in any of the member states. In fact, the 1961 Vienna Convention on Diplomatic Relations technically prohibits the interception of transmissions in and out of embassies and the U.N. But it is widely accepted, if not acknowledged, that the convention is ignored, says intelligence specialist Bill Robinson, who compiled a comprehensive report on the CSE in the mid-'90s for Project Ploughshares, the anti-war coalition. "I see the value of intelligence for our country," he says, "but it makes me uncomfortable to see an international law flouted." It makes Hans Blix, the chief U.N. weapons inspector in pre-war Iraq, more than uncomfortable. He suspected Echelon had eavesdropped on him last year, and the Clare Short affair in Britain confirmed it for him. He had expected to be bugged by the Iraqis, but being spied on by "the same side" was, Blix said, "disgusting." http://www.thestar.com/NASApp/cs/ContentServer? pagename=thestar/Layout/Article_Type1&c=Article&cid=1078614610093&call _pageid=968332188492&col=968793972154 8336 From: Steve Uhrig Date: Mon Mar 8, 2004 9:28pm Subject: Latest freq allocation chart for U.S. ----------- U.S. RF Frequency Allocation Chart October 2003 http://12.219.193.33/allochrt.pdf Courtesy of U.S. DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Office of Spectrum Management ------------ Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8337 From: spectreman51 Date: Mon Mar 8, 2004 4:54pm Subject: Mason A-4 TSCM survellance receiver Hello all. I am wondering if anyone on the list can tell me some info about the Mason A-4 surveillance receiver. I think the freq. coverage is something like 100KHz to 20GHz. Has two seperate spectrum displays, one for RF & one for audio. LED freq. readout. Large suitcase sized unit. Comes with a variety of antennas. I dont have any photos of the unit. A friend of mine has one & I am interested in buying it from him. Any info about this set would be greatly appreciated. Regards, Chris Lumsden Sydney, Australia. 8338 From: Hawkspirit Date: Tue Mar 9, 2004 8:53pm Subject: Historical Bug sweep article Here is the latest addition to the historical bug sweep article collection, enjoy Roger Bugging the Bedroom By by Nicholas Pileggi (drawings by Ken Dallison) Esquire, May 1966 http://bugsweeps.com/info/esquire_5-66.html 8339 From: savanted1 Date: Tue Mar 9, 2004 1:37pm Subject: Wireless Sensor Technology Forum The Department of Commerce's National Telecommunications and Information Administration (NTIA), United States Patent and Trademark Office (USPTO), and Technology Administration (TA) will host a half-day forum on sensor technologies, entitled "From RFID to Smart Dust: The Expanding Market for Wireless Sensor Technologies." The first panel will address the future market for sensor technologies by examining a variety of wireless sensor technologies, along with the current and potential future uses by industry and government. The second panel will address public policy issues facing sensor technologies such as spectrum use, privacy and security, and intellectual property. http://edocket.access.gpo.gov/2004/04-4420.htm 8340 From: savanted1 Date: Tue Mar 9, 2004 3:56pm Subject: E-mail subpoena ruling hurts law enforcement A federal appeals court has upheld a 2003 ruling that overly broad subpoenas for e-mail can qualify as a computer intrusion subject to federal anti-hacking laws. The defendant in the case, Alwyn Farey-Jones, issued a subpoena for e-mails of two officials of Integrated Capital Associates (ICA),but instead of requesting only e- mails related to the case, or sent within a certain time period, demanded all the e-mails the two officials ever sent. ICA sued Mr. Farey-Jones under three civil computer protection laws, but lost. On appeal, the Ninth Circuit Court found that the subpoena violated two laws, the Computer Fraud and Abuse Act and the Stored Communications Act (SCA). The Justice Department has objected to the decision, saying it would hinder law enforcement nationwide. http://www.securityfocus.com/news/8199 8341 From: J Grudko Date: Wed Mar 10, 2004 2:49am Subject: Man hacked cop radio This article speaks for itself... Andy Grudko South Africa Jury: Man hacked cop radio> http://www.madison.com/captimes/news/stories/69518.php By Kevin Murphy Correspondent for The Capital Times March 5, 2004 Federal jurors deliberated more than six hours Thursday before finding a former University of Wisconsin-Madison graduate student guilty of two counts of intentionally blocking police radio communications here last year. Rajib Mitra, 25, of Brookfield, who was taken into custody after the verdicts were read, faces up to 20 years in prison at his sentencing by District Judge John Shabaz on May 12. Mitra's attorney, Christopher Van Wagner, said the government only had a circumstantial case against his client, since police never recovered the radio Mitra built and used to disrupt the police radio system 21 times between January and August 2003, and for three hours during a riotous Halloween night on State Street. However, in closing arguments Assistant U.S. Attorney Tim O'Shea said Mitra provided sufficient indirect evidence to find him guilty of the two radio interference crimes with which he was charged. The areas of interference occurred in the 500 and 600 blocks of State Street and near Orchard and Regent, where Mitra had lived and at the times he resided there, O'Shea said. Police called the areas around State Street where Mitra lived from January to August 2003 "a dead zone," O'Shea told jurors. O'Shea disputed Mitra's claim that the interference was an unintended consequence of trying to build a radio that would monitor emergency communications on the city's 800 megahertz trunking radio system. Mitra could have purchased a scanner that would allow him to listen to the radio talk but instead bought a radio with transmitting capabilities. Instead of visiting the Motorola Web site for information on the trunking radio system, Mitra visited Russian hacker Web sites, which showed an intent to disrupt communications, O'Shea said. The "magic radio," as O'Shea called it, didn't have one bad wire that caused it to transmit accidentally. Instead, Mitra targeted the frequencies he wanted to broadcast on and transmitted high-pitched tones, effectively disabling the radio system, O'Shea said. After losing a speeding ticket trial in November, Mitra tried a "new trick" - broadcasting pornographic sounds he downloaded from the Internet, O'Shea said. He broadcast 12 sex-sound files stored on his computer, causing police all over the city of Madison to turn down their radios while in contact with the public, O'Shea said. After police tracked the source of the pornographic broadcast to Mitra's Orchard Street apartment, Mitra threw out the radio but kept the power cord and interface device he built to link it to the computer. Discarding the radio also was proof that Mitra, who had accumulated a roomful of electronic gear, was guilty of the offenses, O'Shea said. "Why did he throw it out? Because he knew it would show he committed the crimes. It would be the primary evidence of his guilt," O'Shea said. Van Wagner argued that Mitra responsibly got rid of the radio he built once he heard the porn sounds, which he listened to for enjoyment, over a separate scanner he operated. Mitra didn't know the police were looking for him as the source of the interference, Van Wagner contended. Otherwise, Mitra also would have tossed out the power cord. The government repeatedly stretched the facts in the case to paint Mitra as a "dangerous computer hacker, a loner who listens to porn audio in the privacy of his bedroom," Van Wagner said. But every witness who knew Mitra testified that he was a respectful, intelligent person, Van Wagner said. 8342 From: Date: Wed Mar 10, 2004 8:09am Subject: surveillance equipment to place inside children's toys or furniture. MercedSun-Star.com Dispatcher detained on child porn By Stacey Wiebe ATWATER -- An Atwater police dispatcher was arrested for viewing and downloading images of child pornography on the job -- and in the midst of dispatching officers to trouble spots all over the city. George Thayer Fowler of Merced, 46, was arrested last Friday afternoon, and was later released from Merced County Jail on his own recognizance, said Deputy District Attorney Bruce Gilbert. Fowler, who has worked for the police department for several years, is accused of five misdemeanor counts of "sexual exploitation" of children. He is charged with downloading "43 photos of nude, pre-pubescent and pubescent boys and girls, 39 of which were saved to CD," according to court documents submitted by Anna Hazel, an investigator with the Merced County District Attorney's Office. "The minors were sexually posed or engaged in various sexual acts with other minors and adult males," the documents read. Atwater City Manager Greg Wellman said Tuesday that Police Chief Richard Hawthorne was instructed by city officials not to comment about the arrest. But Wellman, a spokesman for the city, said the police department is cooperating fully with the district attorney's office. "Upon notification, we made contact with the district attorney's office and we are providing all materials for his office to proceed ahead," Wellman said. "We are doing everything in our means -- as we always have been. "Based on information that Fowler -- who, according to court documents, worked the "midnight shift" -- was viewing child porn at the workplace, monitoring software was installed on all dispatch computers by the Merced County Information Systems Division. An index of various Internet sites visited by Fowler in November and January were then compiled on CD-ROM. It was noted in court documents that "50 separate images of various hard-wired and wireless electronic surveillance devices, receivers, and other peripheral items were found," in addition to child toy and furniture Web sites. According to documents submitted to the court, district attorney's investigators suspect that Fowler might have been surfing for surveillance equipment to place inside children's toys or furniture. Fowler's residence in the 5000 block of North Franklin Road was searched in January. At that time, Fowler said he was investigating child porn because he feared his father-in-law might be involved in some illegal activity. "Fowler denied being interested in or aroused by the photos and stories he viewed on the Internet; however, he admitted that in the months of 11/03 and 12/03 he accessed the child pornography sites daily ... while on duty," the documents read. Fowler later told investigators that he began viewing the sites because he was not able to "perform" sexually and was looking for arousing material in an attempt to cure his dysfunction. "Fowler expressed disgust at the content of the sites, but contended he remained 'curious' and viewing the sites became 'like driving by an accident,'" the documents stated. Former complaints of misconduct dating back to early 2002 were not sustained by former Police Chief Jerry Moore. Hawthorne, then commander of administrative services for the department, warned Fowler twice that he could not use the computers inappropriately. District attorney's investigators also interviewed some of Fowler's co-workers and a young female police Explorer scout, or volunteer. All told authorities that there were rumors of Fowler's activities. The Explorer scout also said she thought it was odd that Fowler kept the door to the dispatcher's office closed at all times. Fowler is scheduled to be arraigned at 8:30 a.m. March 26 in Merced County Superior Court, where he will enter a plea. He is currently on paid administrative leave from the department, according to court documents. Reporter Stacey Wiebe can be reached at 385-2455 or swiebe@m.... Posted on 03/10/04 00:30:00 http://www.mercedsun-star.com/local/policecalls/story/8256408p-9101179c.html [Non-text portions of this message have been removed] 8343 From: Date: Wed Mar 10, 2004 5:46pm Subject: USA government abolishes the capital punishment Request [Non-text portions of this message have been removed] 8344 From: Hawkspirit Date: Wed Mar 10, 2004 8:28pm Subject: Roger Tolces and Howard Hughes For those of you that might be interested, one of the first clients that I did audio work for was Howard Hughes. http://bugsweeps.com/info/howard_hughes.html 8345 From: David Alexander Date: Thu Mar 11, 2004 4:26am Subject: Firms turning to 'hi-tech snooping' Firms are increasingly using technology to monitor their staff because of a lack of privacy rights, a report says http://news.bbc.co.uk/1/hi/business/3500320.stm David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 8346 From: Ocean Group Date: Fri Mar 12, 2004 5:51am Subject: Mossad Mobile... Comments? Remote data erasure etc....? http://seattletimes.nwsource.com/html/nationworld/2001876453_mossad11.html March 11, 2004 By The Associated Press and Reuters JERUSALEM - A cellphone belonging to the chief of the Israeli Mossad spy agency was stolen last month, and the theft might compromise sensitive security information, police said yesterday. Mossad chief Meir Dagan's phone has not been found, and no suspects have been arrested, said Israeli police spokesman Gil Kleiman. The phone was taken from Dagan's car in Tel Aviv last month, police said. It was unclear if the theft was random or intended to obtain security information. The cellphone may have contained telephone numbers, ranks and other information on top Israeli security officials and access to the army's Internet network, Israeli media reported. To be extra safe, Mossad ordered the phone company to remotely erase the memory on Dagan's handset. "There were quite a few numbers of agents and secret service heads stored there. We did not want embarrassing exposure for them too," one source said. On Feb. 8, an Israeli TV station reported the theft of a sensitive item from a security official, but military censorship banned publication of further details until yesterday. Dagan, a counterterrorism expert and former army general, was appointed to head the Mossad in 2002. 8347 From: Cornolio Date: Fri Mar 12, 2004 9:57am Subject: Re: Mossad Mobile... On Fri, Mar 12, 2004 at 11:51:16AM +0000, Ocean Group wrote: > Comments? Remote data erasure etc....? Maybe it would be possible to erase the numbers in the SIM trough the 'SIM-toolkit'. However, if the phone would allow the SIM to be erased, it would probably also let you read the complete content. I find it hard to believe someone in that position is using a phone with these features enabled. Not to mention the fact he should have NEVER left his phone unattended. Greetings, Barry Wels 8348 From: savanted1 Date: Fri Mar 12, 2004 3:10pm Subject: FBI pushes for broadband wiretap powers A proposal submitted by the Federal Bureau of Investigations (FBI) to the Federal Communications Commission (FCC) on March 10, 2004 would require all broadband Internet providers, including cable modem and DSL companies, to "rewire" their networks to allow for wiretapping by law enforcement. Under the proposal, existing broadband providers would have 15 months to comply, while new providers would have to be immediately compliant. If accepted, the proposal could have far-reaching consequences for broadband services providers. The FBI, the US Department of Justice and the Drug Enforcement Administration view the changes as essential in the fight against crime and terrorism. The proposal states: "The ability of federal, state and local law enforcement to carry out critical electronic surveillance is being compromised today." It is unclear when a decision on the proposal can be expected. http://news.com.com/2100-1028_3-5172719.html 8349 From: Ocean Group Date: Sat Mar 13, 2004 8:33am Subject: IT Eavesdropping... Senators Try to Smoke Out Spyware By Brian Krebs washingtonpost.com Staff Writer Tuesday, March 2, 2004; 4:21 PM Three U.S. senators are tackling the growing problem of "spyware," software programs that track what people do online, alter their Web browser settings and turn their computers into unwitting Internet advertising generators. The "SPYBLOCK" Act, which was introduced late last week, would make it illegal to use the Internet to install software on people's computers without their consent, and require companies that offer software downloads to provide more disclosure about what the programs do and what information they collect. The bill also would require Internet ads generated by the software to be clearly labeled. The bill would allow states to sue violators in federal court and would call on the Federal Trade Commission to impose fines and civil penalties under consumer protection laws. "Computer users should have the security of knowing their privacy isn't being violated by software parasites that have secretly burrowed into their hard drive," said Sen. Ron Wyden (D-Ore.), who introduced the bill along with Sens. Conrad Burns (R-Mont.) and Barbara Boxer (D-Calif.). The bill is similar to legislation offered last year by Rep. Mary Bono (R-Calif.). Computer users often wind up with spyware on their PCs after downloading "free" software such as programs that let them share digital music files. It often piggybacks on free versions of media players, download managers or online greeting cards. Non-invasive versions of those programs are sometimes are called "adware." Companies that use it usually say so and allow users to disable the ads by paying a small fee to license the full version of the product. Still, the lawmakers said many companies that bundle adware with other software do not explain clearly enough how marketers will use the information those programs collect. More aggressive forms of adware and spyware can install themselves through so-called "drive-by downloads," where consumers unknowingly download invasive programs by browsing a particular Web site. Much like a computer virus, spyware can be difficult for a non-technologically savvy user to remove and it frequently saps the victim's computer processing power and Internet connection speeds. Spyware has existed for years -- the first legislation that took a shot at it came from Democratic presidential hopeful Sen. John Edwards (D-N.C.) four years ago -- but the problem is becoming more widespread, prompting fresh annoyance from Internet users and calls to bring it to a halt. "The major concern here is user control and transparency," said Ari Schwartz, associate director at the Washington, D.C.-based Center for Democracy and Technology. "We've found that many consumers do not understand what they're getting themselves into when they download software." The bill probably will not cut down on the worst kinds of spyware -- programs that exploit computer security flaws to hijack Internet connections or install "dialer programs" that force the computer to call expensive online 1-900 adult services -- said Stewart Baker, an attorney at Washington law firm Steptoe & Johnson. In that sense, Baker said, it is a lot like the CAN-SPAM Act, which many computer experts said has done little to combat the skyrocketing problem of unsolicited bulk e-mail since it became law in January. "If you apply the mailbox test, the spam law hasn't had a significant effect. It would be nice to see the spam law working as intended before we say we want to follow the same route with spyware," said Baker, who advises Internet service providers on complying with the new spam law. Several of the nation's largest Internet service providers, including America Online and Earthlink, provide free software for their subscribers to scan their computers for spyware threats. There are other anti-spyware programs available for downloading, but CDT's Schwartz warned that some unscrupulous marketers are selling programs that claim to get rid of spyware but surreptitiously install it. Last fall, the FTC accused a tiny company called D Squared Solutions of extorting computer users by inundating them with pop-up ads to promote software that purportedly blocked the exact kinds of ads it was sending. The FTC said D Squared bombarded computers with ads funneled through a security hole in a seldom-used program that runs by default on all recent Microsoft Windows PCs. Microsoft has since issued a patch to close the security hole and has said it will turn off the program via its next major software update later this year. That case is slated to go to trial next month. The commission is scheduled to hold a public workshop on spyware, adware and other software on April 19, 2004. 8350 From: Steve Weinert at Excel.Net Date: Sat Mar 13, 2004 3:09pm Subject: Re: Mossad Mobile... > > On Fri, Mar 12, 2004 at 11:51:16AM +0000, Ocean Group wrote: > > Comments? Remote data erasure etc....? > > > Maybe it would be possible to erase the numbers in the SIM trough > the 'SIM-toolkit'. However, if the phone would allow the SIM to be > erased, it would probably also let you read the complete content. > > I find it hard to believe someone in that position is using a phone > with these features enabled. Not to mention the fact he should have > NEVER left his phone unattended. I wouldn't assume anything like it being left unattended without a purpose. Could be very interesting to see where the information surfaces, who acts/reacts and such. Usually bait has a percentage of bonifide facts. Wonder what the whole story actually is....? Won't ever know, now will we? Steve W 8351 From: mark de Boer Date: Sun Mar 14, 2004 2:49am Subject: Dect telephones Hi List, Did any of you heard of software being on the market to decrypt Dect telephone's and selectivly follow a particulair telephone set within the Dect channel range. someone told me it exxists, i know now law enforcement agencies use it now but is it on the commercial market? M.de Boer RRB security Archimedesstraat 12 3316 AB Dordrecht Netherlands --------------------------------- Yahoo! Messenger - Communicate instantly..."Ping" your friends today! Download Messenger Now [Non-text portions of this message have been removed] 8352 From: Paolo Sfriso Date: Sun Mar 14, 2004 10:19am Subject: New Klingenfuss Product: Digital Data Decoder Screenshots on CD! Dear Colleagues. FYI following Email was received (of course, I have no connection with Klingenfuss and receive no financial gain or reward by posting this message). Kind Regards. Your Italian Connection. Paolo Sfriso CFE Director Gruppo S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY Phone +39 0422 828517 Fax +39 0422 823224 24hr GSM Cell +39 335 5257308 www.grupposit.com paulsfriso@t... info@g... ----- Original Message ----- From: "Joerg Klingenfuss" To: Sent: Sunday, March 14, 2004 3:44 PM Subject: New Klingenfuss Product: Digital Data Decoder Screenshots on CD! Dear friends, we now present a fascinating new product: Digital Data Decoder Screenshots on CD-R. The result of 2,300 man hours of radio monitoring and editorial work, its price is 80 EUR including registered mail worldwide. From our vast archives dating back to 1967, we now make available this selection of more than 3,500 (three thousand five hundred!) digital data decoder screenshots on CD-R. Included are more than 550 aeronautical, coast guard, company, diplomatic, fixed, maritime, meteorological, military, police, press, telecom and terrorist stations and particularly interesting messages from non-governmental organizations (NGOs) such as the International Committee of the Red Cross (ICRC), Medecins Sans Frontieres (MSF) and so on. A detailed list of countries and stations included can be found on our website. The time range covers 1997 to today and new screenshots from our global radio monitoring are added continuously. The printed index gives full details for each graphic file such as country, station, callsign, frequency, and mode. These standard graphic files in .gif or .jpg format are easily readable with any standard software package, alternatively just execute the convenient "slide show" on your Windows PC: this particular show will keep you busy for a few days! HF e-mail booms and service providers continue to expand, e.g. httw://www.sailmail.com now has a new station in Chile. HF e-mail continues to spread rapidly and no other publisher considers this mode accordingly. Among our dealers are the biggest radio amateur clubs and equipment suppliers worldwide, such as the American Radio Relay League that promotes our 2004 products in detail in QST March 2004 page 132. ----------------------------------------------- We received many requests concerning a successor product for the excellent W40PC Digital Data Decoder. In the near future, WAVECOM will release the W50USB. It will be a completely new, low-cost product for the dedicated consumer market. We will publish full details on our website as soon as possible. If you order from us, we throw in free Klingenfuss publications as well (at a value of 120 EUR) - you need them anyway to make full use of these worldwide leading decoders: 2004 Guide to Utility Radio Stations, Radio Data Code Manual, 2004 Super Frequency List on CD-ROM, and Radiotelex Messages. Unfortunately, because WAVECOM decodes certain paging modes, these products are not legal for consumer sales in the US, but can only be sold to qualifying government agencies. Please contact us if you have problems buying a WAVECOM decoder. We can name the decoder a "digital data interface PC card" or something similar if you ask us to do so (actually IT IS a digital data interface PC card ;-)) and UPS will settle the customs clearing procedure for you - that's their job and they really know it! We ship worldwide by fully insured UPS express airfreight at original WAVECOM prices without additional costs or profit. For professional customers, WAVECOM will introduce a new, optional classifier for modulation and transmission modes for the superb W51PC. This add-on will automatically classify FSK, PSK, CW.... signals in the HF spectrum. New modes in the next software release will be GW-PACTOR, GW-CLOVER, SAT-C-TDMA, and STANAG 4285. Proud users of WAVECOM decoders are invited to send us their most interesting .w40 .w41 .w51 data files continuously. Thank you for your cooperation. ----------------------------------------------- URGENT WARNING: Do not use e-mail if you require reliable communication for your information requests and orders. While an individual can easily change his or her e-mail address at will, this is not possible for business enterprises. In our field of digital data decoding and radio monitoring, we have been the international publisher with by far the longest Internet presence worldwide. Message exchange via e-mail loaded with viruses and spam has become a nightmare, making this type of "communication" extremely annoying, time-consuming, unreliable, and risky: forget that so-called SSL; it's a bad joke and a quick search for "hack ssl" on Google throws up dozens of websites with even the latest versions having been perfectly hacked. If you did not receive an answer or an order confirmation from us within a reasonable time, let's say 48 hours, we did not receive your message. Telefax and letter mail continues to be the safest and fastest way of communication, particularly for orders with payment by credit card! Since we're closed in summer from time to time ... Between April and September don't e-mail us and remember your valued order could get lost so better send it through the post! ----------------------------------------------- Latest references (for the full list please click http://www.klingenfuss.org/ref.htm) Jaap van Veen, Netherlands - 28 February 2004: "Thanks for the rapid shipment of the 2004 Super Frequency List on CD-ROM. Excellent!" Funk, Germany - March 2004: "Seit ihrer Einf¸hrung vor zehn Jahren ist die Super-Frequenzliste auf CD-ROM die einzige CD-ROM geblieben, die die neuesten Sendepl‰ne ... pr‰sentiert." Harold Ort N2RLL, Chief Editor of Popular Communications, United States of America - March 2004: "Monitors have come to know and trust the Klingenfuss 2004 Super Frequency List on CD-ROM. Among the digital data decoder screenshots are many stations of the International Committee of the Red Cross in the Afghanistan and Iraq war zones." Mike Richards G4WNC, Decode editor of Shortwave Magazine, United Kingdom - February 2004: "2004 Guide to Utility Radio Stations ... Joerg Klingenfuss has been producing this wonderful enthusiast's reference for more than 20 years now and it continues to be one of the most up-to-date references available. Despite the huge quantity of data the typeface has been very well chosen and the information is easy to read, even for my tired eyes. The 2004 Guide to Utility Radio Stations remains a favourite with enthusiasts for good reason." Bob Margolis, Products and Books Review Editor, on http://www.wunclub.com - 26 December 2003: "2004 Guide to Utility Radio Stations ... While the guidebook's strongest point always has been the digital data station listings, it also gives extensive coverage to CW, radiofax, and SSB voice stations. If you want to have the latest up-to-date information of the digital radio networks, this edition is a must purchase." Jan Nieuwenhuis, Publications editor of Benelux DX Club Bulletin, Netherlands - January 2004: "2004 Shortwave Frequency Guide ... a comprehensive reference ... covers everything you need for serious shortwave listening. - 2004 Guide to Utility Radio Stations ... an enormous amount of utility information, it's user-friendly, clearly arranged and can be used by both the radio hobbyist as well as the professional. It's a 'must have' book for the serious utility monitor. - 2004 Super Frequency List on CD-ROM ... gives you easy access to an enormous amount of information, it's a comprehensive reference for the shortwave broadcast and utility monitor. It's accurate and therefore a great source of information." Matthias Zweigert, Cameroon - 07 January 2004: "2004 Super Frequency List on CD-ROM ... ist wirklich super und enorm anwendungsfreundlich. Meinen besten Gl¸ckwunsch zu diesem Werk!" Wolfgang Steuhl in Straubinger Tagblatt / Landshuter Zeitung, Germany - 27 December 2003: "Sender & Frequenzen ... World Radio & TV Handbook ... Passport to World Band Radio ... Shortwave Frequency Guide ... Was die absolute Verl‰sslichkeit f¸r Kurzwellenj‰ger betrifft, so d¸rfte wohl Klingenfufl den Preis davontragen. W¸rde er sein Angebot erweitern und sein Jahrbuch in 'AM Frequency Guide' umtaufen, also Lang- und Mittelwelle mit derselben Aktualit‰t und Gr¸ndlichkeit aufnehmen, so m¸ssten seine Wettbewerber erzittern." Anker Petersen, Chairman of Danish Shortwave Clubs International, in Shortwave News - February 2004: "The German editor Joerg Klingenfuss and his staff have put a lot of effort to make it as up-to-date as possible. Its big advantage is that for each shortwave frequency you can read at what time it is used by various broadcasters and in which language." Michele Fiorino, Italy - 24 December 2004: "Ho ricevuto la 2004 Guide to Utility Radio Stations e le porgo i miei complimenti perchË si tratta di un'opera davvero pregievole." D Graham Scott, United Kingdom - 14 December 2004: "Having installed the WAVECOM W40PC DSP Digital Data Decoder Card, it appears to be better than my older Hoka C3 Gold (it runs under Windows!). I'm now looking for that "special" signal to decode, but I should probably read some more of the manual first!" Dr. Massimo Petrantoni, Italy - 30 November 2003: "2004 Guide to Utility Radio Stations ... Simply the best ! ----------------------------------------------- New professional customers Amt f¸r Geoinformationswesen der Bundeswehr, Fachinformationsstelle, Traben-Trarbach, Germany Bundesamt f¸r Polizei, Bibliothek und Dokumentation, Berne, Switzerland Embassy of India, Naval Wing, Naval AttachÈ, Berlin, Germany Grintek Ewation, Pretoria, South Africa (Republic of) Indian Army, Directorate of Signal Intelligence, New Delhi, India Ministere de la Defense, Armee de l'Air, Base Aerienne 123, Escadron de Soutien du Ravitaillement Technique, Commandement 2C123, Orleans Armees, France Ministry of Defence, Defence Electronics Research Laboratory, Hyderabad, India Norwegian Intelligence Service, Bedriftssenter, Logistics Office, Oslo, Norway 8353 From: Date: Sun Mar 14, 2004 2:08pm Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 8354 From: Steve Uhrig Date: Tue Mar 16, 2004 8:10pm Subject: B&K 2650 handheld SA Has anyone had a chance to evaluate the B&K 2650 handheld spectrum analyzer recently announced? Coverage to 3.3 gigs, which was a weakness in the Sperry/ProTek model. The mfr can't get one to me for evaluation until the end of the month. I'm looking for a quick report on it for a particular project. Please contact me if you've had your hands on this piece, or actually seen one in the flesh. http://bkprecision.com/www/np_search_model9.asp?model=2650 Tks .... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8355 From: Steve Uhrig Date: Tue Mar 16, 2004 9:47pm Subject: Nextel alert for undercovers Released by DEA earlier today: ----------------------------- NEXTEL ALERT FOR UNDERCOVERS Be advised that yesterday we learned a very disturbing feature about our Nextels. An SFPD undercover officer, who was doing some buys in one of our cases, was compromised for the following reason. He provided the crook with his Nextel cell phone as a UC contact number. He changed his voicemail and left a message using his UC name (matching his UC cover). The crook called the # and when it rang over to voicemail he pushed Option 1. Option 1, identifies the owner/operator of the phone. If you recall when you first activated your Nextel you had to call in and leave your name (or something to like that) on a Nextel recording. Anyway, that original voice recording is in EVERYONE's Nextel memory and can easily be accessed. In our case, the crook got the UCs real name and entered it into Google. Within minutes the crook learned that the UC was in an SFPD Officer who was in an officer involved shooting several years ago. The incident made the paper and is forever memorialized on the internet. It probably took all of five minutes to figure this out. As a side-note, I entered my name in Google last night and it immediately gave links to, among other things, DEA watch ("evaluations" are posted), the results of every road race I have run as well as my wife's alumni records, church newsletters that get posted on their website. DEA Tech took the time to figure out how to disable this function (refer below) on our Nextels. I advise anyone who does UC work to do the same. He sent it to a few people in the division who do UC work but you all should be advised of the same. -----Original Message----- CALL YOUR CELL # ONCE YOUR VOICE MAIL KICKS IN PRESS #1, THIS WILL VERIFY IF YOUR NAME IS RECORDED FROM THE INTIAL ACTIVATION. IF THIS IS THE CASE, DO THE FOLLOWING; 1. CALL YOUR VOICE MAIL AND ENTER CODE, AS IF RETRIEVING MESSAGE 2. HIT OPTION #4 - PERSONAL OPTIONS 3. HIT OPTION #4 - PERSONAL PREFERENCES 4. THEN HIT DELETE KEY #3 TO DELETE NAME DO A RE-TEST USING ABOVE VOICEMAIL RETRIEVAL TO VERIFY YOUR NAME IS DELETED. ------------------- Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: James M. Atkinson, Comm-Eng Date: Mon Mar 5, 2001 8:06am Subject: U.S. Thinks FBI Spy Revealed Tunnel Under Soviet Embassy U.S. Thinks FBI Spy Revealed Tunnel Under Soviet Embassy http://www.iht.com/articles/12430.html James Risen and Lowell Bergman New York Times Service The U.S. government constructed a secret tunnel under the Soviet Union's new embassy in Washington to eavesdrop, but federal investigators now believe the operation was betrayed by the FBI agent who was arrested last month on charges of spying for Moscow, current and former U.S. intelligence and law enforcement officials say. . The secret tunnel operation, which officials indicated was run jointly by the FBI and the National Security Agency, was part of a broad U.S. effort to eavesdrop on and track Soviet - later Russian - facilities and personnel operating in the United States. Spokesmen at the FBI and the White House declined to comment on the operation. . Current and former U.S. officials estimated that the tunnel construction and related intelligence-gathering activities cost several hundred million dollars, apparently making it the most expensive clandestine intelligence operation that the agent, Robert Hanssen, is accused of betraying. The tunnel was designed to aid in a sophisticated operation to eavesdrop on communications and conversations in the Soviet Embassy complex, which was built in the 1970s and 1980s but was not fully occupied until the 1990s. . In the 1980s, at about the time the tunnel operation was under way, the United States and the Soviet Union argued bitterly over their respective embassies in Moscow and Washington, with the United States accusing Moscow of spying at both locations. The government has never publicly disclosed the existence of the tunnel operation. But in an FBI affidavit in the Hanssen case, the government stated that Mr. Hanssen "compromised an entire technical program of enormous value, expense and importance to the United States government." Officials said that was a reference to the tunnel operation and related intelligence activities. . The government charges that Mr. Hanssen, a 25-year veteran of the FBI and a counterintelligence expert, volunteered to spy for Moscow in October 1985. He was arrested on Feb. 18 in a Virginia park after leaving a package containing classified documents for his Russian handlers, the affidavit says. . It could not be determined when the government believes Mr. Hanssen betrayed the tunnel operation and related intelligence-gathering activities targeting the embassy complex. Nor are many details known about how and when the operation was mounted, or whether it ever succeeded in collecting useful intelligence. But the emerging belief that the tunnel program had been compromised was a factor in the government's decision to keep looking for additional spies after the 1994 arrest of the CIA officer Aldrich Ames, the current and former officials said. . A secret investigative team was established to identify the source of a series of damaging intelligence losses, including the tunnel and related activities against the embassy, that could not be explained by Mr. Ames's activities. Other unexplained intelligence losses, including technical intelligence programs, as well as the 1989 disclosure to Moscow that the FBI was conducting an espionage investigation of a State Department official, Felix Bloch, also prompted officials to begin a new mole hunt, the officials added. That mole-hunt team played a critical role in the counterespionage inquiry that led to Mr. Hanssen's arrest, the officials said. It was a successor to an earlier CIA mole-hunt team that helped uncover Mr. Ames. . The tunnel was built under Moscow's new embassy complex on Wisconsin Avenue, a hilltop location known as Mount Alto, the officials said. . Soviet officials were prevented for years from fully occupying the embassy complex as a result of a long-running dispute with the United States about charges that the American Embassy in Moscow had been thoroughly bugged. Soviet diplomats occupied apartments there in 1979, and congressional critics charged that they were using those buildings as espionage outposts. In the mid-1980s, some American lawmakers claimed that the hilltop location would give the Soviets an edge in intelligence gathering against U.S. government buildings in Washington. The new embassy complex was not fully occupied until after the collapse of the Soviet Union. . Meanwhile, the U.S. intelligence offensive against the embassy remained hidden from public view even as the United States publicly protested a Soviet campaign to lace its new embassy in Moscow with listening devices. . For the operation against the Soviet Embassy, FBI agents were placed in critical jobs in some of the key contractors hired by the Soviet Union, said an individual knowledgeable about the operation. That individual said the effort involved the use of secret technology to pick up sounds inside a large building. . The record on the value of intelligence gleaned from many of the high-cost U.S. technical programs is mixed, current and former officials said. In fact, a former U.S. intelligence official said he was not certain that the Soviet Embassy tunnel operation ever actually produced any intelligence. Another official suggested that technical problems prevented the operation from becoming productive. The official suggested that the tunnel was both compromised by a spy, and also failed on technical grounds. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2643 From: James M. Atkinson, Comm-Eng Date: Mon Mar 5, 2001 8:09am Subject: Spy Case Prompts Computer Search Spy Case Prompts Computer Search http://www.washingtonpost.com/wp-dyn/articles/A22451-2001Mar4.html Hanssen's Access Brings Systems Probe By Vernon Loeb Washington Post Staff Writer Monday, March 5, 2001; Page A01 Experts are combing government computer systems to try to ensure that Robert P. Hanssen, the veteran FBI agent accused of spying for Moscow, did not sabotage them or create software vulnerabilities that could allow Russian intelligence agencies to steal information while Hanssen is in jail, senior U.S. officials said. Because Hanssen is a "highly skilled" computer programmer, the officials said, government experts are checking all the systems to which he had access at the FBI and State Department. These include classified and unclassified computers. At the FBI, systems administrators already have "scrubbed" the bureau's classified computer system, which is not attached to the Internet. They found no evidence that Hanssen planted malicious software codes either to damage the network or expand his access to secrets, the officials said. One senior official said no conclusions have been reached about Hanssen's computer activities at the State Department, where he had been assigned since 1995 to an office that monitors foreign diplomats. "The jury is still out as to what he was able to do," the official said. "Because of the possibilities, we've got to take a look." Meanwhile, a group of FBI experts, which the bureau calls a computer analysis response team (CART), is trying to recover the data on numerous hard drives, memory cards and diskettes of computers confiscated from Hanssen. They included desktop models, several laptops and even a server at his home in Vienna. Hanssen, 56, was arrested on Feb. 18 on charges of spying for Moscow over the past 15 years in exchange for $1.4 million in cash, diamonds and Russian bank deposits. A 109-page FBI affidavit filed in court alleges that Hanssen encrypted letters to his Russian handlers using computers; passed secrets on memory diskettes; stole dozens of documents from the FBI's computer network; and regularly trolled that network looking for clues that he might be under surveillance. U.S. counterintelligence officials say Hanssen's use of computers greatly exceeds that encountered in any other major U.S. espionage case, presenting new levels of complexity -- and potential damage -- as officials attempt to retrace his moves in cyberspace. "There are a large number of ways that you can infiltrate a system," said Fred Cohen, a computer security expert at Sandia National Laboratory. And, he added, "If you are an insider, the number increases dramatically." As a counterintelligence officer, Hanssen had the highest level of security clearance. Government officials declined to say, however, whether he ever had access to Intelink, a highly secure network used by the CIA, National Security Agency and other parts of the U.S. intelligence community to share information. If Hanssen used Intelink -- a system that did not exist at the time of the arrest of CIA spy Aldrich H. Ames in 1994 -- the damage could be deep and difficult to assess, intelligence officials said. In any event, it is clear from the FBI's affidavit that Hanssen was a regular user of the FBI's internal network, the Automated Case Support System, which contains classified records of investigations. "The fact that a spy for Russia had access to that is very troubling," said Dion Stempfley, a former Defense Department computer expert. Hanssen's mastery of computer hacking methods was well known inside the FBI. In 1992, he warned two senior officials -- Raymond A. Mislock Jr., then chief of the Soviet section of the FBI's Intelligence Division, and Roger P. Watson, the division's deputy assistant director for operations -- that an internal computer system was not secure, according to former officials. Mislock and Watson were skeptical that the system, then new, could easily be penetrated. So, to prove his point, Hanssen hacked into Mislock's own computer, downloaded a document and brought a copy into Mislock's office, the former officials said. Hanssen, who allegedly began spying for the KGB seven years earlier, was not disciplined because his action was seen at the time as having been carried out for the good of FBI security. But one former official with direct knowledge of the incident now wonders whether Hanssen used the security concern as a cover story so that he could search Mislock's computer for any indication that he was under suspicion as a KGB mole. "Given what he's been charged with," the former official said, "I think you'd have to say he did it to try to find out if we were looking at him." Five years later, after the Automated Case Support System linked FBI offices around the world, Hanssen began regularly searching through it for his name and home address as well as the terms "dead drop," "Russia" and "espionage" to pick up any sign that he was under investigation, the affidavit says. The FBI reconstructed those searches using retrieval logs. But, unlike the CIA, the bureau does not have a mechanism that monitors employees' computer use and flags such suspicious searches, according to Edward J. Curran, a former top FBI counterintelligence official. The FBI says it caught Hanssen immediately after he stashed a plastic trash bag at a clandestine "dead drop" in a park near his home. The bag allegedly contained seven secret documents from the Automated Case Support System about FBI counterintelligence operations against Russian targets. It also held an encrypted letter to Hanssen's handlers in the Russian Foreign Intelligence Service, the FBI says. The FBI was able to decrypt the letter quickly, possibly because Hanssen allegedly had sent his handlers an earlier letter that included a copy of his encryption key, and it was obtained in a search of his property. In addition to that package, FBI agents say they found dozens of documents from the bureau's computer system in Hanssen's car and offices at the FBI and State Department. What more he might have taken is a mystery. Although there is no evidence that he did so, "It's theoretically possible that he could have written a program to search the [FBI's Automated Case Support System] again and again and again to download the entire database," said Ira S. Winkler, a former National Security Agency officer and president of Internet Security Advisors Group, a private firm. Because the State Department's unclassified computers are linked to the Internet, Stempfley said, Hanssen could have found or created "back doors" in software that would have enabled Russian intelligence agencies to "tunnel" into U.S. databases in ways not readily apparent to systems administrators. As early as 1991 -- long before most FBI agents had surfed the World Wide Web or opened their first e-mail -- Hanssen wrote a message to his Russian handlers urging them to lease an office in downtown Washington so they could communicate "directly using a computer that would be specially-equipped with certain advanced technology," the affidavit says. Last year, Hanssen allegedly proposed an even more sophisticated system, recommending that the Russians use a Palm VII organizer that "can allow the rapid transmission of encrypted messages" and "might even serve for rapid transmittal of substantial material in digital form." The FBI was so worried about Hanssen's computer programming capabilities that it asked for, and received, the court's permission to take all his computers to a forensics laboratory for examination. "Given Hanssen's computer expertise and concern about detection," the affidavit says, "there is considerable risk that Hanssen has set up self-destruct programs for his computers that could erase vital evidence and files if his system or systems were examined by anyone other than experts." © 2001 The Washington Post Company -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2644 From: Steve Whitehead Date: Mon Mar 5, 2001 6:12am Subject: Be a mate and spy for Oz http://www.news24.co.za/News24/World/Australasia/0,1113,2-10-36_990830,00.html " Sydney, Australia - Wanted: Intelligent, ambitious and - most importantly - discreet young people to work as Australian spies. In an unprecedented move, Australia's foreign spy agency posted an advertisement on its website calling for university graduates to work undercover overseas, it was revealed on Monday. The Australian Secret Intelligence Service (ASIS) is seeking applicants with Australian citizenship and from "a broad range of disciplines and backgrounds" to work as intelligence officers at home and abroad, the website said. But shy, retiring types need not apply: the agency warns that the recruitment process is "long and intrusive". "Employment in ASIS and in the Australian Intelligence Community generally places high expectations on personal standards of integrity, accountability and commitment," the website said. "The selection process is both long and intrusive ... (and) you do need to consider your own preparedness for questions that will cover ... personal relationships and living circumstances, personal values, financial situation, physical and mental health history including substance use and abuse, and civil record." Candidates would also be put through extensive psychological and medical testing, the website said. ASIS agents are posted around the world and work closely with intelligence services such as Britain's MI6 and the US Central Intelligence Agency. The job advertisement has been prompted by pending federal legislation that would make the spy agency subject to scrutiny by parliament and more transparent in its labour and other practices, The Australian newspaper reported on Monday. Currently, ASIS does not formally report to parliament and has an unspecified budget and number of staff, the newspaper said" Steve Whitehead Managing Member TSCM Services cc Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) URL http://www.tscm.co.za E-mail sceptre@m... P O Box 16063, Lyttelton, 0140, Centurion, South Africa [Non-text portions of this message have been removed] 2645 From: Date: Sun Mar 4, 2001 4:04pm Subject: Beginner equipment. My apologies if this was repeated but I was having some trouble with the posting here. After speaking to some very credible and competent people in the TSCM business, I am taking their advice and will continue training and reading about the field. I am also educating myself about the electronics field in general since it's been a long time. Anyway I am taking some advice from one of them and asking if anyone has TSCM equipment suitable for a beginner to learn on for sale at a fair price. Specifically, I'm looking for an AVCOM PSA 65C, and an oscilloscope that someone no longer uses. Not looking for packages right now since cost is a major factor and it's just for hands on training for me, and interfacing it all my reading. This list is excellent and I appreciate being a member. Please E-Mail Quebec100@a... Thanks Harry Kastrinakis 2646 From: James M. Atkinson, Comm-Eng Date: Mon Mar 5, 2001 9:23am Subject: Re: Beginner equipment. Harry, I know that Steve Uhrig has just such a system that he has listed on his used equipment page at http://www.swssec.com/used.html -jma At 10:04 PM +0000 3/4/01, Quebec100@a... wrote: >My apologies if this was repeated but I was having some >trouble with the posting here. > > After speaking to some very credible and competent people in the >TSCM business, I am taking their advice and will continue >training and reading about the field. I am also educating myself >about the electronics field in general since it's been a long time. >Anyway I am taking some advice from one of them and asking if anyone >has TSCM equipment suitable for a beginner to learn on for sale at a >fair price. Specifically, I'm looking for an AVCOM PSA 65C, and an >oscilloscope that someone no longer uses. > Not looking for packages right now since cost is a major factor >and it's just for hands on training for me, and interfacing it all my >reading. This list is excellent and I appreciate being a member. >Please E-Mail Quebec100@a... > >Thanks > >Harry Kastrinakis -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2647 From: James M. Atkinson, Comm-Eng Date: Mon Mar 5, 2001 7:30pm Subject: Spy Tunnel Leak Called A Big Loss Spy Tunnel Leak Called A Big Loss http://www.nydailynews.com/2001-03-05/News_and_Views/Beyond_the_City/a-102135.asp NEWS WIRE SERVICES The intelligence community was reeling yesterday from news that accused spy Robert Hanssen may have alerted Moscow to a secret tunnel built under the Soviet Embassy in Washington. One-time CIA official Vincent Cannistraro said that the damage to national security could be considerable. "I think the real fallout from this is going to be looking at how the Soviets used their knowledge of this to feed false information into the American system," he said yesterday. "That's going to be the subject of a long damage assessment." Hanssen, a 25-year FBI veteran and counterintelligence expert arrested last month and charged with spying for Moscow since 1985, "compromised an entire technical program of enormous value, expense and importance to the United States government," according to an FBI affidavit filed in the Hanssen case. That program referred to the tunnel, The New York Times reported yesterday, citing sources as saying it was unclear whether the operation produced any useful intelligence. The tunnel's existence had not been known publicly. The tunnel operation, estimated to have cost several hundred million dollars, was run by the FBI and the National Security Agency as part of a sophisticated eavesdropping operation to track Soviet Union ≠ and later Russian ≠ facilities and personnel in the U.S., The Times said. The embassy complex was built in the 1970s and 1980s but not fully occupied because of a dispute with the United States over claims that U.S. Embassy buildings in Moscow had been bugged. The complex was not fully occupied until after the collapse of the Soviet Union in 1991. The U.S. government arrested CIA officer Aldrich Ames in 1994, and when he was not able to explain a series of damaging intelligence losses, it is believed the investigation intensified and ultimately led to Hanssen. Cannistraro said the decision to build the tunnel "has to be seen not in a vacuum but part of the clandestine efforts that went on between the Soviet Union and U.S. with each using tunneling. It's spy versus spy." Maynard Anderson, who used to oversee counterintelligence programs and security policy at the Department of Defense, said the operation was "innovative. I'm sorry we got caught." Original Publication Date: 3/5/01 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2648 From: James M. Atkinson, Comm-Eng Date: Mon Mar 5, 2001 7:31pm Subject: U.S. Lists Allies Trying to Gather Secrets Monday March 05 10:26 AM EST U.S. Lists Allies Trying to Gather Secrets http://dailynews.yahoo.com/h/abc/20010305/wl/u_s_lists_allies_trying_to_gather_secrets_1.html By David Ruppe ABCNEWS.com Who says friends don't spy on friends? A report has found some of the United States' closest allies are trying to gather commercial and technology secrets. Meanwhile, Russia has expressed outrage over the existence of a secret tunnel under their embassy in Washington D.C. The United States says some of its closest allies are suspected of attempting to obtain U.S. commercial and technology secrets. Japan, Israel, France, South Korea and Taiwan are highlighted as some of the most aggressive in attempting to obtain U.S. business information, through lawful and/or illegal means. China and India, less closely aligned with the U.S., are also named. The countries were listed in a little-noticed report to Congress published last month on foreign economic and industrial espionage issued by the U.S. National Counter Intelligence Center. The list was based on a survey of about a dozen Fortune 500 companies. The center coordinates government efforts to identify and counter foreign intelligence threats to U.S. national and economic security. It's staffed by the FBI, CIA, Defense Intelligence Agency, National Security Agency, State Department, Energy Department and various Pentagon agencies. "The risks to sensitive business information and advanced technologies have dramatically increased in the post-Cold War era as foreign governments - both former adversaries and allies - have shifted their espionage resources away from military and political targets to commerce," the report said. Previous reports by the center and other U.S. agencies described the level and types of economic spying but did not name specific countries, citing a need to protect intelligence sources and avoid possible foreign policy repercussions. Listing specific countries is an important development in light of the need for companies to be aware of who might be targeting them, says Steve Aftergood, a senior research analyst at the Federation of American Scientists. "I think there is a utility in speaking frankly about the issue and letting people know what the hazards might be," he says. Remi Marechaux, deputy spokesman for the French Embassy in Washington, D.C., says making the list is not necessarily a bad thing. "It depends on what you call economic espionage," he says. "We have a network of consulates, and all the consulates have a trade section which is in charge of looking for information regarding trade with the U.S. So that's the basic job of our trade section, and that's also what exists with regard to the American presence in France." Few Convictions Former President Clinton signed the U.S. Economic Espionage Act in 1996, designed by Congress to strengthen U.S. efforts to identify and counter commercial espionage. But there have been few convictions under the act. The first came in January 2000, when a federal judge sentenced a Taiwanese executive to two years probation along with six months of home detention for stealing adhesive formulas and innovations from an American company. "Successful espionage seldom comes to light, and even when economic espionage is discovered, companies are often reluctant to report to authorities that they have been the victim of such activity because of the embarrassing publicity and legal complications that may follow," the report said. Types of Information Sought Much of the information most desired by foreign information gatherers has military utility, and is restricted from exports by the U.S. government. The most sought-after critical technology categories in 1999 in rank order were information systems, sensors, lasers, electronics and aeronautic systems technologies, according to the report. But the targets of espionage can include everything from information on missile defense technology and pharmaceutical technology to manufacturing processes and encryption. Dumpster Diving, and Other Methods Commercial spies, according to the report, include government and company employees. But people on the periphery like contractors, consultants, and business competitors are also involved. And the report said computers have made it easier to steal secrets. "Using today's technology, information can be downloaded into small disks and readily removed from the premises," it said. Theft of laptops was also identified as a problem area. Foreign intelligence collectors gather U.S. secrets through such legal methods as conversations during social gatherings, and through conferences and symposiums, trade show and by simply requesting technical information. The report identified other techniques for stealing U.S. technology secrets: People breaking away from tour groups; Attempts to steal information after normal working hours; Foreign customs officials holding laptops for extended periods of time; Interception of Internet messages; Dumpster diving - searching through trash and discarded materials. "As long as the United States remains the world's leading industrial power and U.S. industry continues to lead the world in technology development, the United States will remain a prime target of foreign economic collection and industrial espionage," the report concludes. But Aftergood says, while the consequences of espionage can be devastating for a U.S. company, the implications are much less significant for the U.S. economy in general and the U.S. military. "I think it's important to keep in mind the magnitude of the threat. Our economy does not depend on secrets, it depends on [vast resources] and the whole economic infrastructure and our political system and our military," he says. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2649 From: James M. Atkinson, Comm-Eng Date: Mon Mar 5, 2001 7:33pm Subject: Embassies With Ears: A chronology of construction and eavesdropping at U.S. and Soviet Embassies With Ears: A chronology of construction and eavesdropping at U.S. and Soviet http://www.washingtonpost.com/wp-dyn/articles/A24702-2001Mar5.html 1964: U.S. officials discover 40 eavesdropping devices in the embassy in Moscow. Mid-1960s: U.S. and Soviet officials begin discussing construction of new embassies in Washington and Moscow. 1969: Tentative agreement reached. 1972: Construction agreement signed calling for simultaneous construction and reciprocal occupancy, meaning that neither nation may occupy its new building until the other nation's new embassy is completed. October 1977: George Hyman Construction Co. of Bethesda begins work on the first phase of the Soviet compound on a 12.5-acre site on Mount Alto, bordered by Wisconsin Avenue, Calvert Street, Tunlaw Road and Fulton Street. Whiting and Turner Contracting Co. of Baltimore is to build the second phase. 1978: Secret tunnel packed with Soviet eavesdropping equipment is discovered under the old U.S. Embassy in Moscow. September 1979: Construction begins on new U.S. Embassy on Tchaikovsky Street in Moscow. January 1980: Soviets lodge an official protest after finding eavesdropping devices in apartment buildings in the new compound here. One of the project's designers later says that the Soviets examined every inch of the buildings with X-ray equipment looking for bugs. 1984: Americans discover Soviet transmitters inside typewriters in use since 1982 at the old U.S. Embassy in Moscow. The transmitters picked up the contents of documents typed by embassy secretaries and transmitted them to antennas hidden in the embassy walls, which relayed the signals to a listening post outside. 1985: Work on the Soviet Embassy is completed. August 1985: U.S. workers discover eavesdropping devices in pillars, beams and floors of the new embassy in Moscow. Soviet workers are locked out of the site. Experts say six lower floors of the building, dubbed the Giant Transmitter, can never be fully debugged. December 1986: Marine Sgt. Clayton J. Lonetree turns himself in to the CIA station chief in Vienna for having contact with a KGB agent in Moscow. The entire 28-member embassy guard detachment is recalled from Moscow by the Marine Corps. Charges against Cpl. Arnold Bracy are dropped. Sgt. Robert Stufflebeam is implicated but never charged. Lonetree, convicted of 13 charges of espionage in August 1987, later that year accepts a government offer to cooperate in damage assessment interrogations in return for a five-year reduction of his 25-year sentence. April 11, 1987: Soviet officials, leading reporters and photographers on a tour of the new chancery in Washington, point to where alleged bugs were found in pillars, embedded in marble and in pipes. June 16, 1987: House votes 414 to 0 to prohibit Soviet diplomats from occupying their new embassy unless President Ronald Reagan certifies that the U.S. facility in Moscow is secure. A measure to halt construction on the Moscow building is defeated, 272 to 142. July 1, 1987: A State Department study by James R. Schlesinger, former CIA director and defense secretary, recommends rebuilding the top three floors of the new U.S. chancery in Moscow and construction of a new six-floor annex for top-security functions. 1988: Reagan proposes razing the new building in Moscow and starting over. 1989: Bush administration reconsiders razing the building as the State Department and CIA reportedly squabble over control of security there. 1991: As the Soviet Union disintegrates, Vadim Bakatin, head of the KGB,presents U.S. Ambassador Robert S. Strauss with the blueprints for the embassy bugs in Moscow. 1994: New Russian Embassy opens in Washington. May 2000: U.S. Ambassador James Collins opens the new embassy in Moscow. At a cost of $240 million, it has been taken apart and rebuilt. The top two floors are replaced with four new secure floors built by American workers using U.S. materials. ≠ Jo Rector and Nora Tillman © 2001 The Washington Post Company -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2650 From: James M. Atkinson, Comm-Eng Date: Mon Mar 5, 2001 7:35pm Subject: FBI Spy Suspect Must Stay in Jail Monday March 5 2:45 PM ET FBI Spy Suspect Must Stay in Jail http://dailynews.yahoo.com/h/ap/20010305/us/spy_case_3.html By KAREN GULLO, Associated Press Writer ALEXANDRIA, Va. (AP) - A federal judge on Monday ordered that veteran FBI (news - web sites) agent Robert Philip Hanssen remain confined to jail, saying she believes the government has an ``extraordinarily strong case'' against the man accused of spying for Moscow since 1985. In issuing the order for continued confinement, U.S. District Judge Theresa Buchanan said the 56-year-old Hanssen may ``pose a severe risk of flight'' because of the nature of the allegations against him and could pose a threat to society. During the brief court appearance, the first since his arrest on Feb. 18, Hanssen sat between two of his attorneys, dressed in a green jumpsuit and plain black tennis shoes. The word ``prisoner'' was printed on the back of his jumpsuit. Hanssen sat quietly and spoke only once, when the judge asked if he knew he was entitled to a full detention hearing. ``I do, your honor,'' he replied. Randy Bellows, an assistant U.S. attorney, told the judge that Hanssen poses a ``grave danger to the U.S.'' and because of his background and expertise in counterintelligence, he poses a grave risk of flight. Plato Cacheris, Hanssen's lawyer, said ``we do not subscribe to the facts Mr. Bellows has presented,'' but added that Hanssen was not contesting detention. Buchanan asked Hanssen if he understood that he was not contesting that arrangement, and the defendant replied, ``Yes, I do.'' The government had filed a proffer of its evidence in support of Hanssen's detention, and Hanssen waived his right to challenge the proffer and agreed not to contest his detention. Buchanan said the fact that Hanssen was found carrying his current valid passport when he was arrested, and because of the circumstance of his alleged offenses, there was no way he could be released. Under a previous agreement between his lawyers and prosecutors, a preliminary hearing was moved from Monday to May 21. The agreement calls for Hanssen's lawyers to be able to look at some of the evidence that the government has collected against him. Hanssen, a 25-year veteran FBI agent, has been held at an undisclosed detention facility since shortly after his arrest Feb. 18. Investigators apprehended him at a Virginia park just minutes after he left a package under a wooden foot bridge, which investigators say was a ``dead drop'' site for delivering secret documents to his Russian handlers. In advance of Hanssen's appearance, his attorney, Plato Cacheris, told reporters Monday that while no plea was immediately due, his client ultimately would plead not guilty. ``That's absolutely right,'' Cacheris said, when asked. He also said he thought there were ``a lot of gaps'' in the government's case and said ``we're not discussing a deal. There's no pressure.'' The Washington Post reported Monday that experts were looking closely at government computers at the FBI and the State Department to make sure that Hanssen, a skilled programmer, did not sabotage them or create vulnerabilities that could allow Russian spies to steal sensitive information while Hanssen is jailed. Unidentified authorities said the FBI's classified computer system has been checked and nothing was found to suggest Hanssen had done anything that would allow access or damage the bureau's network. No conclusions had been reached about his computer activities at the State Department, where he had been assigned since 1995 to an office that monitors foreign diplomats, the Post reported. The government alleged that since 1985, Hanssen has passed to Soviet and later Russian contacts 6,000 pages of top-secret documents containing highly sensitive information about how the United States conducts intelligence operations, which foreign agents it has targeted and technical information about communications and surveillance. Hanssen may have alerted Moscow to a secret tunnel built under the Soviet Embassy in Washington, The New York Times reported Sunday. The tunnel operation, estimated to have cost several hundred million dollars, was run by the FBI and the National Security Agency as part of a sophisticated eavesdropping operation to track Soviet and Russian facilities and personnel in the United States, the newspaper said. It said government spokesmen declined comment. Incensed by the report, Russia's Foreign Ministry on Monday demanded that the United States provide details. The Foreign Ministry issued a statement suggesting that Moscow was officially unaware of the tunnel's existence. If the report is true, it said, ``this will be a flagrant violation of the recognized norms of international law that throughout the world govern relations with foreign diplomatic missions.'' Asked about this Monday, White House spokesman Ari Fleischer said, ``If the reports are accurate or inaccurate is not a topic that I'm at liberty to discuss, and any conversations between our nations will be private ones.'' Fleischer said Bush is ``still going to approach relations with Moscow in the same way he always has, and he addressed that throughout the campaign, and we're looking forward to having good relations with Russia - straightforward, direct conversations, which is the president's manner and style, and I don't see that changing.'' At the State Department, spokesman Richard Boucher said that ``in terms of any tunnel or lack of tunnel, obviously, all this purports to relate to intelligence activities, and I wouldn't be able to comment one way or the other.'' But he did confirm that the Russian foreign ministry called in the U.S. charge d'affaires in Moscow ``in connection with stories on this subject that have appeared in the press, and all our charge said was that he would report their concerns back to Washington.'' When reporters asked Cacheris about the tunnel report, he said, ``I think it's abominable, and I think you should be skeptical about that.'' In exchange for his alleged espionage, Hanssen received $600,000 in cash and diamonds and $800,000 was deposited in a foreign bank for him, authorities charged. Hanssen could get life in prison or the death penalty if convicted. Assistant U.S. Attorney Randy Bellows filed documents last week outlining evidence the government has collected against Hanssen. They included letters to and from the Russian intelligence agency found in Hanssen's briefcase, a statement from his Swiss bank account and recordings of Hanssen's conversations with the Russians. Hanssen's attorneys will be given access to some of the government's evidence before an indictment is handed down, under an agreement struck last week. Both sides agreed to move a preliminary hearing date and the deadline for indictment to May 21. Both had been scheduled for Monday. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2651 From: James M. Atkinson, Comm-Eng Date: Mon Mar 5, 2001 7:38pm Subject: Lawyer for Spy Suspect Slams Secret Tunnel Link Monday March 5 2:29 PM ET Lawyer for Spy Suspect Slams Secret Tunnel Link http://dailynews.yahoo.com/h/nm/20010305/ts/crime_spying_dc_31.html By Tabassum Zakaria ALEXANDRIA, Va. (Reuters) - A lawyer for Robert Hanssen, a former FBI (news - web sites) agent accused of spying for Moscow, on Monday condemned reports saying Hanssen tipped off Russia to an eavesdropping tunnel below the Russian embassy in Washington. Plato Cacheris, speaking to reporters before a hearing at which Hanssen was ordered to be held in jail pending his trial, said the reports were ``abominable.'' He questioned the timing of their disclosure over the weekend. ``This defunct tunnel under the Russian embassy that some unnamed officials are now disclosing, I think is abominable and you should be skeptical about that,'' he said. ``Nobody's ever heard of it before. Why would they be telling that story now?'' Cacheris added. The New York Times reported the existence of the tunnel on Saturday and quoted unnamed officials saying they believed the operation had been betrayed to the Russians by Hanssen. The Washington Post had a similar report on Monday. FBI and White House spokesmen declined to comment on the reports, which said the tunnel was built in the 1970s and 1980s, during the Cold War when both countries were targeting the other's embassy intensively with eavesdropping equipment. Cacheris said no one had openly accused Hanssen of betraying the tunnel plan. ``No one has outright accused him of compromising it,'' he said, adding: ``All there is is speculation.'' Arrested In Park Hanssen was arrested on Feb. 18 at a park in suburban Virginia, close to Washington, after dropping off material for his Russian handlers, an affidavit said. He was accused of spying for Moscow since 1985 in exchange for $1.4 million in money and diamonds. He allegedly sold secrets including names of double agents and U.S. electronic surveillance methods, revelations that severely damaged national security, U.S. officials said. Cacheris repeated earlier statements that Hanssen planned to plead not guilty and said there were no negotiations going on with U.S. authorities on a possible plea deal. ``He will plead not guilty at the appropriate time,'' he said and added, ``We are not discussing a deal.'' Describing his client's state of mind as he faces the charges as ``normal,'' Cacheris said he had been promised early access to the government's evidence. Asked about the affidavit, he said: ``It's got a lot of gaps in it.'' At the detention hearing in federal court in the Washington suburb of Alexandria, Virginia, Judge Theresa Buchanan ruled Hanssen posed a risk of flight, citing the prosecution's case that he had a passport and money available abroad provided by Russia. She said the government's contention Hanssen knew a lot of U.S. secrets ``indicate his release could pose a danger to the United States.'' Hanssen's attorneys did not contest the ruling. ``Given his prior access, his expertise as a counterintelligence specialist, and his clear willingness to betray his position of high trust, Hanssen poses a clear and present danger that he will compromise additional information of a sensitive and classified nature,'' prosecutors said in documents submitted to the court on Thursday. Poses Flight Risk When Hanssen was arrested he had in his briefcase his passport and a statement for his Swiss bank accounts, the prosecutors said. U.S. News & World Report magazine reported in its March 12 issue, out on Monday, that officials now blamed Hanssen for compromising at least two highly sensitive FBI counterintelligence programs. One, called Pocketwatch, involved FBI surveillance of Soviet commercial activities used as fronts for spying. This included a 1985 operation, led by Hanssen, focusing on Amtorg, a Soviet trade organization in New York. Hanssen also allegedly revealed details of Spiderweb, a secret monitoring system used by the FBI to track suspected members of hostile intelligence services, the magazine reported. Agents use Spiderweb to monitor known or suspected areas of espionage activity, like drop sites, signal sites and embassies. The FBI has fired Hanssen, who was an agent for 25 years and was just months away from retirement. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2652 From: Date: Mon Mar 5, 2001 6:37pm Subject: Beginner equipment Jim, thank you. I am familiar with Steve's setup but it's a little too advanced for me at this point especially since I'm in learn mode. I'm also looking to spend significantly less money than what he is asking, although it is a fantastic deal. I've discussed it with him and he gave me some excellent advice. I've received a couple of responses to my EMail address and I appreciate that certain people are taking the time to get me a good deal for proper equipment through their contacts P.S. Just got Ted Swift's book in the mail..extremely well put together. Harry K. 2653 From: William Knowles Date: Tue Mar 6, 2001 2:05am Subject: CI Project Assistance (fwd) I saw this on the Intelforum list and thought some of the folks on the TCSM list might want to help this fellow out. Cheers! William Knowles wk@c... ---------- Forwarded message ---------- Date: Mon, 5 Mar 2001 19:04:54 -0500 (EST) From: joe whitney Reply-To: intelforum@h... To: intelforum@h... Subject: CI Project Assistance Good morning Intelligence Forum, I am an MBA student at Wilfrid Laurier University in Waterloo, Ontario, who is working on a project that requires an exposition on counter-intelligence. While I have found a good amount of background information on counter-intelligence, I have had some difficulty in finding facts that would help me answer the main question of the essay. Specifically, I need to answer: "What are the top 5 multinational companies at counter-intelligence?" Understandably, this is tough subject to research given that the top firms are likely reluctant to divulge the counter-measures they employ to protect their corporate assets. However, any guidance that you could provide is sure to be very helpful considering I am at a loss to even determine the top five firms, let alone figure out their counter-intelligence capabilities. A response at your earliest convenience would be greatly appreciated. Thank you for the time and consideration. Regards, Joe Whitney MBA Candidate 2001 Laurier School of Business & Economics _ Intelligence Forum (http://www.intelforum.org) is sponsored by Intelligence and National Security, a Frank Cass journal (http://www.frankcass.com/jnls/ins.htm) 2654 From: Robert G. Ferrell Date: Tue Mar 6, 2001 6:50am Subject: Re: U.S. Lists Allies Trying to Gather Secrets >The United States says some of its closest allies are suspected of >attempting to obtain U.S. commercial and technology secrets. Of course, _we_ would never think to spy on any of them... ;-) RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2655 From: A Grudko Date: Tue Mar 6, 2001 8:41am Subject: Re: U.S. Lists Allies Trying to Gather Secrets ----- Original Message ----- > >The United States says some of its closest allies are suspected of > >attempting to obtain U.S. commercial and technology secrets. > Of course, _we_ would never think to spy on any of them... Isn't there a page on the CIA website where employees of overseas countries can submit plans and documents in exchange for Air America air miles? Just kidding guys......we all know Air America only has 2 routes now - Washington to Bogot· and Washington to Baghdad, and who wants to go to Washington? Many thanks to all who sent condolences on my Mother's passing a week ago today. I expect to be back in the mainstream of work by Monday. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2656 From: David Alexander Date: Tue Mar 6, 2001 8:21am Subject: Re: U.S. Lists Allies Trying to Gather Secrets The subject of nations trying to gain information - commercial or otherwise, from their allies is as old as the hills. In order to appear aggrieved one has to be innocent of the same charge - and I don't believe that anyone is. The facts are that every nation says the practice is low-down, underhanded and reprehensible - and everyone does it to everyone else, including the CIA to American allies. Just my 2c David Alexander M.INSTIS Bookham Technology plc DDI: 01235 837823 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 2657 From: factfind Date: Tue Mar 6, 2001 0:35pm Subject: Re: CI Project Assistance (fwd) Laudable, to help this person out in their academic studies. And of course we know who he really is having done due diligence of some sort? (he asked rhetorically) ----- Original Message ----- From: William Knowles To: TSCM-L@yahoogroups.com Sent: Tuesday, March 06, 2001 3:05 AM Subject: [TSCM-L] CI Project Assistance (fwd) I saw this on the Intelforum list and thought some of the folks on the TCSM list might want to help this fellow out. Cheers! William Knowles wk@c... ---------- Forwarded message ---------- Date: Mon, 5 Mar 2001 19:04:54 -0500 (EST) From: joe whitney Reply-To: intelforum@h... To: intelforum@h... Subject: CI Project Assistance Good morning Intelligence Forum, I am an MBA student at Wilfrid Laurier University in Waterloo, Ontario, who is working on a project that requires an exposition on counter-intelligence. While I have found a good amount of background information on counter-intelligence, I have had some difficulty in finding facts that would help me answer the main question of the essay. Specifically, I need to answer: "What are the top 5 multinational companies at counter-intelligence?" Understandably, this is tough subject to research given that the top firms are likely reluctant to divulge the counter-measures they employ to protect their corporate assets. However, any guidance that you could provide is sure to be very helpful considering I am at a loss to even determine the top five firms, let alone figure out their counter-intelligence capabilities. A response at your earliest convenience would be greatly appreciated. Thank you for the time and consideration. Regards, Joe Whitney MBA Candidate 2001 Laurier School of Business & Economics _ Intelligence Forum (http://www.intelforum.org) is sponsored by Intelligence and National Security, a Frank Cass journal (http://www.frankcass.com/jnls/ins.htm) Yahoo! Groups Sponsor Click Here to Find Software Faster ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 2658 From: Mike Date: Tue Mar 6, 2001 1:59pm Subject: AMPS/DAMPS Test Equipment Will soon have several Smith-Myers and Curtis cellular analysers for sale to Security entities. These cost $1200 plus when new and are "HARD" to find. They were originally sold only to verified Cell Companies, authorized cellular technicians and Federal Agencies. A limited number of Curtis 5200B Nammers also available. (these units are AMPS/DAMPS capable and provide "NAM" info. Need I say more? smiles..) Make offer on one or the whole load? Nuff Said- Bootleg PS These came out of service as working units, but being sold "as-is". Email me for details or to make offers. Also have a variety of "cell capable" Pro and Aor scanners. Several have computer connections/control capabilities. These units are the ones everyone is looking for. bootleg@p... (only 2 left: AN/PPS-6 Military Remote Portable Battlefield Radar Units. COMPLETE!) Finally, Oregons Department of Motor Vehicles Drivers License and Vehicle Registration databases on CD Rom. Millions of DMV records. BRAND NEW DATA! I've been publishing these yearly and this is likely the last one due to recent State and Federal laws. (for marketing purposes only) Also have older Texas and Florida DMV databases for sale. Contact me with your lists of hard to find hardware or software you are searching for. I'm always finding deals on interesting items. [Non-text portions of this message have been removed] 2659 From: James M. Atkinson, Comm-Eng Date: Tue Mar 6, 2001 6:50pm Subject: Embassy tunnel angers Russians Embassy tunnel angers Russians http://www.cnn.com/2001/WORLD/europe/03/05/russia.tunnel/index.html March 5, 2001 Web posted at: 6:49 PM EST (2349 GMT) MOSCOW, Russia -- Russia's Foreign Ministry has demanded details of a secret tunnel allegedly built underneath the Soviet Embassy in Washington for eavesdropping. Present and former U.S. officials told CNN the tunnel -- under what is now the Russian Embassy -- was built by American intelligence services and packed with millions of dollars worth of sophisticated equipment. They believe its existence may have been revealed by Robert Hanssen, an FBI agent arrested last month on allegations of spying for Moscow. The Russian Foreign Ministry on Monday summoned the charge d'affaires at the U.S. Embassy in Moscow for an official explanation on the tunnel, said to have been jointly operated by the FBI and the National Security Agency. It said the story, if true, would amount to "a flagrant violation of the recognised norms of international law that throughout the world govern relations with foreign diplomatic missions." A spokeswoman for the Foreign Intelligence Service -- an agency that succeeded the KGB -- said she would not be surprised. "Digging tunnels is a favourite pursuit of American special services," Tatyana Samolis said in remarks carried by NTV television station, recalling a U.S. spy tunnel dug in Berlin in the 1950s. The Soviet Embassy was built in the 1970s and 1980s but was not fully occupied until 1991 because of a dispute over claims that the Soviets bugged a new U.S. Embassy building in Moscow. American officials abandoned that building in 1985 after finding it laced with KGB listening devices. In 1978, U.S. Marines discovered Soviet agents burrowing a tunnel under the U.S. Embassy. The hole was packed with electronic gear -- and a Soviet agent wearing headphones, according to news reports. The embassy denied the incident at the time. A former Russian ambassador to Washington, Vladimir Lukin, said the report of a new tunnel showed both sides were hypocritical in their public statements about the embassy spy scandals of the 1980s. "They dug this channel and later assailed us for bugging their embassy in Moscow. That shows that the level of morality on both sides is the same," he said in an interview on the Echo of Moscow radio station. The Associated Press contributed to this report. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2660 From: James M. Atkinson, Comm-Eng Date: Tue Mar 6, 2001 6:51pm Subject: Threat in the Hand of Your Palm Threat in the Hand of Your Palm http://www.wired.com/news/print/0,1294,42198,00.html by Michelle Delio 10:55 a.m. Mar. 5, 2001 PST Keep your Palm in your pocket. With just a single stroke of a stylus, anyone can launch a program that allows him or her to access, change or make a copy of any data that is stored on any Palm device. Palm acknowledged on Friday that the password-protection feature in Palm Desktop 4.0 software could easily be disabled. Palm spokeswoman Julia Rodriguez that the problem affects only users who believed they could protect sensitive or private data using Palm's password-protection feature. But security firm @Stake has issued a warning that Palm's debugging program, installed on all Palm devices and intended for use only by application developers and technical support people, can be used by anyone who is willing to read Palm's developer manual. The debugging program, when used with a Palm that is connected to a computer, allows an attacker to type in commands such as "coldboot" to wipe all the data off the device, or "export" to copy all of the device's stored data onto another computer. The debugger program can also be used to access a user's Palm password. The debugger program is activated by a graffiti stroke, an uppercase "L," with a period on the lower-left loop. Graffiti is the Palm writing system that allows users to input information by writing specific characters directly onto the Palm's display screen. The debugger's abilities are fully explained in Palm's developer's documentation, so the company has inadvertently provided a manual that allows an attacker to crack any unattended Palm, said Chris Wysopal, director of research and development for @Stake. Wysopal said that an attacker would be able to copy the contents of the average Palm "in about five minutes," and a password could be decrypted in a few seconds. Frank Voden, a consultant with TechSolutions, said that the debugger exploit is a real security risk. "Corporations and government agencies need to quickly implement security measures to cover this issue. They need to let employees know that Palm devices must be carefully protected. They have to be told to think of their Palms as if they are keys to the office's front door, and act accordingly," Voden said. Since Palm devices can freely exchange data with a network, a Palm can also be used to crack into a classified network if the device is compromised, Voden said. Wysopal of @Stake said that Palm users should be aware of the physical security and location of their Palm at all times. "A Palm device should not be left unattended or loaned to a potentially untrustworthy colleague," he said. Rodriguez advised users who require password protection of their data to consider installing Palm Desktop 3.1. "They can also secure their desktop software in some other manner until the updated Palm Desktop 4.0 release is made available," Rodriguez said. An updated release of Palm Desktop 4.0, which fixes the password-protection issue, is expected to be available within the next 4 to 6 weeks. But Wysopal said that his "most immediate recommendation" would be not to use the current family of Palm devices for the storage of sensitive or confidential information. "It is not possible to employ a secure application on top of an insecure foundation. Because Palm OS is inherently insecure, methods to attempt to completely secure data are moot," Wysopal said. Wysopal also suggested that any Palm devices that hold particularly sensitive information could be neutered, so that the machine cannot communicate with a computer via serial port synching. @Stake advises permanently gluing a piece of plastic over the Palm's serial port connector -- leaving the infrared port as the only method of synching -- or disabling the Palm's port by opening the case and cutting the specific RS232 lines. These actions will prevent an attacker from using the debug mode even if it is activated. (It would also void a Palm warranty.) "It would behoove Palm to completely remove all debugging features from future production versions of Palm OS, including OS 4.0," Wysopal said. "If the debugging functionality remains inherent in Palm OS, attackers will find methods to modify the operating system to re-enable the debug mode." Rodriguez did not comment on Palm's future plans for the debugger program. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2661 From: James M. Atkinson, Comm-Eng Date: Tue Mar 6, 2001 6:52pm Subject: Accused FBI spy betrayed U.S. countermeasures Accused FBI spy betrayed U.S. countermeasures http://www.vny.com/cf/News/upidetail.cfm?QID=165270 Monday, 5 March 2001 20:30 (ET) Accused FBI spy betrayed U.S. countermeasures BY RICHARD SALE, UPI Terrorism Correspondent WASHINGTON, March 5 (UPI) -- On Monday, the day a federal judge told accused spy Robert Hanssen he would not be allowed out of jail on bail, United Press International learned from former FBI officials that Hanssen allegedly betrayed details of U.S. surveillance and electronic countermeasures used against Soviet diplomatic and intelligence staff in Washington. In addition to revealing the existence of an electronic eavesdropping tunnel under the Soviet Embassy in Washington, these sources say Hanssen tipped the Soviets off about real-time FBI monitoring of the Soviets' interception of top secret telephone traffic. "There was a tremendous volume of calls taking place from the White House to other government agencies, and the Soviets got a lot of it," one source said. This included facsimile and data transmission circuits as well as telephone calls between Air Force One and the White House and between the White House and the National Security Agency, he said. The Soviets also listened in on the Department of Defense and State Department. The Soviets operated their interceptions from the sixth floor of their then embassy on 16th Street in Northwest Washington, and a site in a trade representation building on Connecticut Avenue, U.S. intelligence officials said. A report in the New York Times Sunday said that federal investigators believe Hanssen told Moscow about the secret tunnel operation, run by the FBI and the NSA, which sources told the paper had cost several hundred million dollars. The tunnel reportedly ran under the complex built on Washington's Wisconsin Avenue in the 1970s and 1980s to replace the 16th Street premises. However, owing to a dispute with the United States, the new building was not fully occupied until the 1990s -- by which time the Soviet Union had collapsed. The complex is now the Russian Embassy. The government charges that Hanssen, a 25-year veteran of the FBI and a counterintelligence expert, volunteered to spy for Moscow in 1985. He was arrested on Feb. 18. According to former FBI officials, the Soviets used a sophisticated microwave device shipped to the 16th Street building through the Netherlands to listen in on U.S. electronic traffic. The operation was run by the GRU -- Soviet military intelligence. Using computers, the Soviets set up a "watch list" that would hone interceptions on calls that used words like "CIA" or "strategic defense initiative." They would then transcribe the calls and send them to Moscow. The calls were intercepted to glean sensitive personal information about U.S. government officials who might be having personal, marital or financial problems that would make them vulnerable to an approach to spy for the Soviet Union. To counter this, the FBI began to track what the Soviets were tracking, a U.S. intelligence official told UPI. Hanssen also allegedly told the Soviets about a sophisticated system of street sensors that tracked Soviet diplomatic and embassy staff vehicles. The system was set up at key intersections in the downtown Washington area and was activated by the passage of Soviet vehicles, making surveillance much easier and almost foolproof, according to a former KGB defector interviewed by UPI. Hanssen also alerted the Soviets to Washington downtown hotels and other locations that had become so-called Special Facilities of the National Security Agency. The Madison Hotel, where Soviet visitors often stayed, was one such building whose hallways and doorframes had been modified into huge listening devices, U.S. intelligence officials said. Regarding the FBI-NSA listening tunnel, U.S. government officials said that the NSA was using laser beams directed at glass surfaces of the embassy compound such as windows to monitor conversations, these sources said. The lasers are able to pick up the minute vibrations of window glass caused by conversations, which can then be recorded. "The take we got wasn't all that great. The Russians aren't stupid," said one official. CIA officials at agency headquarters across the river in Virginia, fearing that Soviet operators were using the same technology against them, installed double panes of glass plus screens and meshes, a former senior CIA official told UPI. "The place looked really weird," he said. -- Copyright 2001 by United Press International. All rights reserved. -- -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2662 From: James M. Atkinson, Comm-Eng Date: Tue Mar 6, 2001 6:54pm Subject: The Spying Game Sometimes a Circle The Spying Game Sometimes a Circle http://www.guardianunlimited.co.uk/breakingnews/US/0,3560,772047,00.html Tuesday March 6, 2001 6:10 am WASHINGTON (AP) - The list of classified information that FBI agent Robert Hanssen is accused of selling to the Russians is long on details about spies spying on spies. As the potential scope of revelations is evaluated, Hanssen's case is a reminder that espionage at times can be as much about finding out what the other side knows about your own intelligence operation as it is about getting nuclear codes or other vital secrets. In a trade dubbed a ``wilderness of mirrors,'' practitioners may not see much more than reflections of each other. ``It has very little to do with a nation's top secrets sometimes,'' said Loch Johnson, a University of Georgia political scientist who worked on intelligence for the Clinton White House and congressional committees. ``It does begin to be a little bit circular - counterintelligence agencies going after one another.'' Even so, former U.S. spymasters say much can be lost, or gained, for national security when an insider betrays how one side's intelligence operation has penetrated the other side's. Hanssen is alleged to have divulged an eye-popping wealth of information about American intelligence-gathering, including extensive detail about how U.S. officials had tapped into Russian spy operations. Among documents the former counterintelligence official is alleged to have stashed in Hefty bags and left in ``dead drops'' for Russian handlers were details on the U.S. Double Agent Program, the FBI Double Agent Program and U.S. government studies of future intelligence requirements and KGB recruitment operations. Officials also believe Hanssen tipped off Moscow to a secret tunnel the Americans built under the Soviet Embassy in Washington for eavesdropping. ``He compromised United States Intelligence Community technical operations of extraordinary importance and value,'' the FBI said in an affidavit supporting Hanssen's arrest. A federal judge said Monday the government's case against Hanssen is ``extraordinarily strong'' and ordered him confined to jail. Hanssen has not entered a plea, but his attorney said he would plead innocent. A May 21 preliminary hearing has been scheduled. Steve Aftergood, an intelligence analyst for the Federation of American Scientists, said it appears much of the damage allegedly done by Hanssen ``was to U.S. intelligence, but not necessarily to the United States.'' ``When officials speak of vital secrets that might have been lost, they are really speaking within the framework of intelligence, and not national security as a whole,'' he said. In the Aldrich Ames case, as with Hanssen, the focus was on classified information about U.S. intelligence-gathering. Ames, a CIA official who pleaded guilty to espionage in 1994, is blamed for the deaths of at least nine agents working for the United States in the Soviet Union and for disclosing U.S. counterintelligence techniques. ``A lot of spying is a self-perpetuating game in which each side is simply trying to penetrate the other and to discover intelligence operations that the other side is running,'' Aftergood said. Other notable spy cases, however, have been more directly related to national security. Retired Navy Warrant Officer John A. Walker Jr., for example, pleaded guilty in 1985 to running a spy ring that gave the Soviets secret codes that allowed them to read 1 million classified Navy cables. Robert Gates, CIA director under former President Bush, stressed that the vast majority of U.S. intelligence work is aimed at gathering information about possible threats to American security, such as terrorism, proliferation of weapons of mass destruction, regional conflicts and military modernization around the world. ``Those are the things that preoccupy American intelligence,'' Gates said. At the same time, he said, U.S. officials have to be vigilant against those who can ``give away the means by which we gather the information we need to know on these threats.'' ``These people inside can do serious damage in terms of our ability to accomplish the broader mission,'' Gates said. James Woolsey, CIA director under former President Clinton from 1993 to 1995, said America's open society makes it harder to safeguard secrets. More pervasive polygraph tests of government employees, for example, would help deter foreign espionage but could intrude on workers' civil liberties. Penetrating rival spy networks, he said, does not raise the same problems, which can make counterintelligence ploys ``money well spent.'' Woolsey said striking the right balance between safeguarding secrets and protecting civil liberties means ``you can never be sure that you're completely successful'' at avoiding security breaches. As a result, he added, ``You have to be a bit more paranoid in this business than you do when you're out in the normal world of business or commerce or law.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2663 From: James M. Atkinson, Comm-Eng Date: Tue Mar 6, 2001 6:55pm Subject: In 'wilderness of mirrors,' spies may spy on spies In 'wilderness of mirrors,' spies may spy on spies http://www.nandotimes.com/nation/story/0,1038,500460379-500701297-503818439-0,00.html By NANCY BENAC, Associated Press WASHINGTON (March 6, 2001 8:30 a.m. EST http://www.nandotimes.com) - The list of classified information FBI agent Robert Hanssen is accused of selling to the Russians is long on details about spies spying on spies. As the potential scope of revelations is evaluated, Hanssen's case is a reminder that espionage at times can be as much about finding out what the other side knows about your own intelligence operation as it is about getting nuclear codes or other vital secrets. In a trade dubbed a "wilderness of mirrors," practitioners may not see much more than reflections of each other. "It has very little to do with a nation's top secrets sometimes," said Loch Johnson, a University of Georgia political scientist who worked on intelligence for the Clinton White House and congressional committees. "It does begin to be a little bit circular - counterintelligence agencies going after one another." Even so, former U.S. spymasters say much can be lost - or gained - for national security when an insider betrays how one side's intelligence operation has penetrated the other side's. Hanssen is alleged to have divulged an eye-popping wealth of information about American intelligence-gathering, including extensive detail about how U.S. officials had tapped into Russian spy operations. Among documents the former counterintelligence official is alleged to have stashed in Hefty bags and left in "dead drops" for Russian handlers were details on the U.S. Double Agent Program, the FBI Double Agent Program and U.S. government studies of future intelligence requirements and KGB recruitment operations. Officials also believe Hanssen tipped off Moscow to a secret tunnel the Americans built under the Soviet Embassy in Washington for eavesdropping. "He compromised United States Intelligence Community technical operations of extraordinary importance and value," the FBI said in an affidavit supporting Hanssen's arrest. A federal judge said Monday the government's case against Hanssen is "extraordinarily strong" and ordered him confined to jail. Hanssen has not entered a plea, but his attorney said he would plead innocent. A May 21 preliminary hearing has been scheduled. Steve Aftergood, an intelligence analyst for the Federation of American Scientists, said it appears much of the damage allegedly done by Hanssen "was to U.S. intelligence, but not necessarily to the United States." "When officials speak of vital secrets that might have been lost, they are really speaking within the framework of intelligence, and not national security as a whole," he said. In the Aldrich Ames case, as with Hanssen, the focus was on classified information about U.S. intelligence-gathering. Ames, a CIA official who pleaded guilty to espionage in 1994, is blamed for the deaths of at least nine agents working for the United States in the Soviet Union and for disclosing U.S. counterintelligence techniques. "A lot of spying is a self-perpetuating game in which each side is simply trying to penetrate the other and to discover intelligence operations that the other side is running," Aftergood said. Other notable spy cases, however, have been more directly related to national security. Retired Navy Warrant Officer John A. Walker Jr., for example, pleaded guilty in 1985 to running a spy ring that gave the Soviets secret codes that allowed them to read 1 million classified Navy cables. Robert Gates, CIA director under former President Bush, stressed that the vast majority of U.S. intelligence work is aimed at gathering information about possible threats to American security, such as terrorism, proliferation of weapons of mass destruction, regional conflicts and military modernization around the world. "Those are the things that preoccupy American intelligence," Gates said. At the same time, he said, U.S. officials have to be vigilant against those who can "give away the means by which we gather the information we need to know on these threats." "These people inside can do serious damage in terms of our ability to accomplish the broader mission," Gates said. James Woolsey, CIA director under former President Clinton from 1993 to 1995, said America's open society makes it harder to safeguard secrets. More pervasive polygraph tests of government employees, for example, would help deter foreign espionage but could intrude on workers' civil liberties. Penetrating rival spy networks, he said, does not raise the same problems, which can make counterintelligence ploys "money well spent." Woolsey said striking the right balance between safeguarding secrets and protecting civil liberties means "you can never be sure that you're completely successful" at avoiding security breaches. As a result, he added, "You have to be a bit more paranoid in this business than you do when you're out in the normal world of business or commerce or law." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2664 From: James M. Atkinson, Comm-Eng Date: Tue Mar 6, 2001 7:37pm Subject: Cellular and Pager Interception Equipment Taboo on This List Ah-hem, I really hate to have to repeat myself. Let me AGAIN point out that cellular or pager interception equipment, any other kind of eavesdropping equipment, or anything with any kind or "gray area" has absolutely no business being posted to this list, period. It's nice that the unit recently listed has various capabilities to read ESN's, allows you demodulate audio, but please do not post anything of this nature again. It's also nice that you have equipment to burn NAMS. If you want to use a product such as this to inventory the ESN's you encounter during a sweep, or need to interrogate a phone or CDPD transponder in a vehicle you are checking fine, but do not post ads for this kind of stuff to this list. I have to admit that how a NAM programmer is used in a sweep is a bit of a mystery to even me (but then of course I've only done a few hundred sweeps) Yeah, I know... "your only using it to demonstrate", "your only sniffing your own phone", "your brother is a cop", "you only sell to the FBI", "the law needs to be changed", yadda-yadda-yadda.... I don't care, keep it off this list, period. This list is not for posting "gray area" or fringe materials, rants about how unfair life is, or bitching about how "the man" is harassing you. Also, do not post ads for wireless microphones, covert video cameras, covert tape recorders, lock picks, or any similar devices which are commonly used for surveillance or that is primarily useful for criminal purposes. This list is for STOPPING spies, not how to be one. Have I made myself clear? So speaks the moderator. Thank you, -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2665 From: James M. Atkinson, Comm-Eng Date: Tue Mar 6, 2001 9:04pm Subject: Woman indicted in campaign spying case Woman indicted in campaign spying case http://www.nandotimes.com/nation/story/0,1038,500460561-500701584-503821198-0,00.html By KAREN GULLO, Associated Press WASHINGTON (March 6, 2001 4:44 p.m. EST http://www.nandotimes.com) - A woman accused of covertly giving Bush campaign materials to the Al Gore camp last year was indicted by a federal grand jury on Tuesday. Juanita Yvette Lozano, a former employee of Maverick Media - an Austin company that handled ads for President Bush's campaign - was charged with mail fraud, false statements to the FBI and perjury. If convicted, she faces 15 years in prison and a $750,000 fine. The indictment was handed up by a federal grand jury in Texas. The indictment alleged that Lozano secretly copied more than 120 pages of debate preparation documents and a 60-minute videotape of a debate preparation session with Bush and his advisers and sent it to the Gore campaign under a different name. She lied to FBI agents investigating the matter and testified falsely before the grand jury, the indictment said. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2666 From: James M. Atkinson, Comm-Eng Date: Tue Mar 6, 2001 11:18pm Subject: Apology to the List Good Evening, I would like to take a moment and apologize to the list about the cellular equipment that appeared earlier today and I felt that it would be wise to once again explain the moderation policy. As a rule, list members are automatically set up in a moderated mode when they first join (unless the list server screws up, which happens at times). Once a subscriber has demonstrated that they have something useful to add to the group, and show that they can behave in a civil manner the list moderator (yours truly) will sometimes toggle them into an un-moderated mode so they can freely post at will. If something naughty appears on the list please privately bring it to my attention so it can be dealt with immediately (usually by banned, moderating, and/or gently rebuking the offender). Do not post contraband stuff to this list, or even anything that is even slightly in the gray area as I have no tolerance for it and promise that being banned from this forum or rebuked will be the least of your concerns. I sorry if i sounds like I am ranting about this, but this forums is for professionals who hunt spies by performing TSCM and related services. If a subscriber refuses to behave themselves they will be removed; so do not try to peddle equipment, devices, or services unless they are appropriate and legitimate TSCM tools. We are not interested in spam about "investigate anyone software", posts about hiring PI's for Pay-per-View events, or other such foolishness. That said, please feel free to post information or news article about spies being caught, posts about new TSCM equipment, TSCM methods, and so on. Also, an occasional posting of G-rated humor is encouraged, as is philosophical reflections, seasons greetings, and so on (but please keep it short and sweet). But always remember, the goal of those gathered here is to hunt down eavesdroppers... not to be one, please remember it. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2667 From: David Alexander Date: Wed Mar 7, 2001 4:38am Subject: re: Threat in the Hand of Your Pa I nearly died laughing when I read this part of the posting: >Palm acknowledged on Friday that the password-protection feature in Palm >Desktop 4.0 software could easily be disabled. > >Palm spokeswoman Julia Rodriguez that the problem affects only users who >believed they could protect sensitive or private data using Palm's >password-protection feature. In other words, 'we promoted this product as having password protection, and if you believed us you were stupid.' That's really good PR David Alexander M.INSTIS Bookham Technology plc DDI: 01235 837823 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 2668 From: David Alexander Date: Wed Mar 7, 2001 4:49am Subject: re: Accused FBI spy betrayed U.S. countermeasures The posting discusses an admission of using lasers to 'listen at windows': > Regarding the FBI-NSA listening tunnel, U.S. government officials said > that the NSA was using laser beams directed at glass surfaces of the embassy > compound such as windows to monitor conversations, these sources said. The > lasers are able to pick up the minute vibrations of window glass caused by > conversations, which can then be recorded. > > "The take we got wasn't all that great. The Russians aren't stupid," said > one official. If you read 'The Aquarium' by Victor Suvorov (pseudonym of a GRU defector) which came out at least 8 years ago, this was a known technique used by both sides. To counter it, randomly contoured glass was installed in sensitive locations, with a device attached to create vibrations to greatly reduce, if not counter completely, the capability of the laser to pick up sound. This was installed in embassies around the world by the Russians (and probably by everyone else too). The admission sounds like a very poor attempt at disinformation by the US govt. David Alexander M.INSTIS Bookham Technology plc DDI: 01235 837823 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 2669 From: Robert G. Ferrell Date: Wed Mar 7, 2001 11:13am Subject: Re: re: Accused FBI spy betrayed U.S. countermeasures >If you read 'The Aquarium' by Victor Suvorov (pseudonym of a GRU defector) >which came out at least 8 years ago, this was a known technique used by both >sides. To counter it, randomly contoured glass was installed in sensitive >locations, with a device attached to create vibrations to greatly reduce, if >not counter completely, the capability of the laser to pick up sound. This >was installed in embassies around the world by the Russians (and probably by >everyone else too). I used to be a security manager for an unnamed semiconductor manufacturer who was trying to "clean room reverse engineer" the microcode of another unnamed semiconductor manufacturer's best-selling chip. The 'clean room' environment was set up in a rented office with a fictious cover business and fake 'staff.' Only four people in the 8,000+ company had keys to this office; I was one of them. The windows had that glass installed, because the onwers were beyond paranoid. It is rather odd-looking stuff, and doesn't provide much of a view, unless you like funhouse mirrors. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2670 From: James M. Atkinson, Comm-Eng Date: Wed Mar 7, 2001 1:02pm Subject: re: Accused FBI spy betrayed U.S. countermeasures At 10:49 AM +0000 3/7/01, David Alexander wrote: >The posting discusses an admission of using lasers to 'listen at windows': > >> Regarding the FBI-NSA listening tunnel, U.S. government officials said >> that the NSA was using laser beams directed at glass surfaces of the >embassy >> compound such as windows to monitor conversations, these sources said. The >> lasers are able to pick up the minute vibrations of window glass caused by >> conversations, which can then be recorded. >> >> "The take we got wasn't all that great. The Russians aren't stupid," said >> one official. > >If you read 'The Aquarium' by Victor Suvorov (pseudonym of a GRU defector) >which came out at least 8 years ago, this was a known technique used by both >sides. To counter it, randomly contoured glass was installed in sensitive >locations, with a device attached to create vibrations to greatly reduce, if >not counter completely, the capability of the laser to pick up sound. This >was installed in embassies around the world by the Russians (and probably by >everyone else too). > >The admission sounds like a very poor attempt at disinformation by the US >govt. > > >David Alexander M.INSTIS >Bookham Technology plc > >DDI: 01235 837823 >David.Alexander@B... Bouncing a laser or any kind of photonic energy against a reflective or quais reflective service in an attempt to obtain intelligence would be fool-hardy. Such activities are easy to detect, easy to defeat, and easy to trace it back to the spy. It was a clever curiosity 20 years ago, but more recently is more of a joke written about in spy novels. That said, passive laser bounce types of systems suffer from all kinds of noise issues. Of course this does not include active photonic systems which tend to be more covert and tend to be less detectable. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2671 From: Mike F Date: Wed Mar 7, 2001 2:09pm Subject: Do We need Counter Intelligence Czar- Article by Robert G. Ferrell March edition of " INFORMATION SECURITY:" Last night I was Scanning thru One of My Favorite Magazines, INFORMATION SECURITY: I came upon these words "When You Wish Upon A Czar" which caught my limited attention, I then noticed the article author is a frequent contibuter to tscm-L list,Robert G. Ferrell. You may want to go to Information Security's online site,to read the article by "RGF" http://www.infosecuritymag.com/articles/march01/columns_news_views.shtml Later 4,Mike Fiorentino Master Links 4 Master Investigators http://ml4mi.com "CONFIDENTIALITY WARNING" <==== BE AWARE I AM AS SERIOUS AS A HEART ATTACK ABOUT THE WARNING BELOW!!!!!!!!!!!!!! This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by theindividual(s)or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of thismessage/information is prohibited. If you are not the indicated recipientor havereceived this message in error contact our offices immediately for instructions." From: John McCain Date: Wed Mar 6, 2002 9:20am Subject: Information Leakage from Optical Emanations Another method of data leakage... how fast can you read the blinky LEDs on the front of your modem or router from across the street? Can ya do it in your head the way we used to interpret baudot rtty? Pretty good paper at http://applied-math.org/optical_tempest.pdf . They indicate that in 36% of the equipment tested, they were able to reconstruct the data stream... some times actually from across the street. Cheers, JohnM Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-352-0350 807 Pioneer Web: http://www.dcbnet.com Champaign, IL. 61820 Email: Jmccain@d... 4954 From: Michael Puchol Date: Thu Mar 7, 2002 4:56am Subject: Re: mixing countries to sell transmitters Well, based on the ElcomSoft case, where the company's main programmer was arrested during a conference in the U.S., I would say it's not legal at all - the programmer in this case was arrested as his company was based in Russia, but his ISP was in the U.S., and so were the credit card companies processing all the payments for his software (password breaking tools, mainly). Hope it helps, all the best, Mike (Where are you Aimee?) ----- Original Message ----- From: "Matthew Paulsen" To: Sent: Wednesday, March 06, 2002 9:37 AM Subject: [TSCM-L] mixing countries to sell transmitters > Here's a question for the group. > > Stumbled across a website that is Israeli & US based. They are selling bugs > on the web. Their hosting provider is in Florida, an nslookup yields no > data on their dns other than this, so hence no company data, or address on > website. Their website has only phone numbers for support - 310 area code > being one of them. So, can a company like this operate legally or not? If > the items are shipped/stored in Israel, and the website is hosted here, and > payments are processed through a gateway provider for CC's (let assume > Verisign for simplicity), is this legal or not? > > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 4955 From: James M. Atkinson Date: Thu Mar 7, 2002 9:19am Subject: U.S. Deports Israelis Amid Warnings of Espionage Activities http://ap.tbo.com/ap/breaking/MGAQS1FAGYC.html Mar 5, 2002 U.S. Deports Israelis Amid Warnings of Espionage Activities By Ted Bridis Associated Press Writer WASHINGTON (AP) - Authorities have arrested and deported dozens of young Israelis since early last year who represented themselves as art students in efforts to gain access to sensitive federal office buildings and the homes of government employees, U.S. officials said. A draft report from the Drug Enforcement Administration - which first characterized the activities as suspicious - said the youths' actions "may well be an organized intelligence-gathering activity." Immigration officials deported them for visa violations; no criminal espionage charges were filed. The arrests, made in an unspecified number of major U.S. cities from California to Florida, came amid public warnings from U.S. intelligence agencies about suspicious behavior by people posing as Israeli art students and "attempting to bypass facility security and enter federal buildings." The Israelis were arrested and deported on charges of working in the United States without authorization or overstaying visits on tourist visas, said Russ Bergeron, a spokesman for the Immigration and Naturalization Service in Washington. He described dozens of arrests since early 2001 but gave no exact figures. The DEA report said a majority of the students questioned by U.S. investigators acknowledged having served in military intelligence, electronic signals interception or explosive ordnance units in the Israeli military. The DEA said one person questioned was the son of a two-star Israeli general, one had served as the bodyguard to the head of the Israeli Army and another served in a Patriot missile unit. Israeli Foreign Ministry spokeswoman Yaffa Ben-Ari said it was "nonsense" that the students were spying on the United States. Another Foreign Ministry spokeswoman, Irit Stopper, confirmed that a few Israelis posing as art students were expelled from the United States for working without permits. However they were not accused of espionage, she said. She did not say how many Israelis were expelled and did not give any additional details. The DEA report was first obtained by a French Web site that specializes in intelligence news, Intelligenceonline.com, and confirmed Tuesday as authentic by DEA spokeswoman Rogene Waite in Washington. The Web site said 120 Israelis had been arrested. "That these people are now traveling in the U.S. selling art seems not to fit their background," the report said. An FBI official, speaking on condition of anonymity, noted there were no espionage charges filed against any of the individuals and that they had been deported. Asked whether any spying activity occurred, the official repeated that no charges had been filed. A Justice Department official, also asking not to be publicly identified, said investigators have been aware of some "alleged linkage" between the students and alleged espionage activities in the United States since early 2001, and said authorities have made arrests in Dallas, Chicago, San Diego and in south Florida. INS spokesman Rodney Germain in Miami said five or six people were arrested in that area at least six months ago on immigration counts. Although security experts at the DEA first characterized the youths' behavior as suspicious, and INS authorities later arrested them, the FBI typically investigates espionage cases in the United States. The DEA report said that among U.S. sites apparently targeted was Tinker Air Force Base in Oklahoma City, home to the military's AWACS surveillance planes and the place where many of the nation's B-1 bombers are repaired. Investigators also said that one female art student went to the home of a worker for the Environmental Protection Agency in Denver to sell paintings and returned later to photograph the house, according to the report. No one within the Justice Department has expressed concerns about the Israeli students possibly committing espionage, Justice spokesman Bryan Sierra said. The deputy U.S. attorney general, Larry Thompson, declined to discuss the arrests when asked about them during a news conference Tuesday. The U.S. Office of the National Counterintelligence Executive, a federal agency, circulated a public warning in March 2001 urging employees to report contact with people describing themselves as Israeli art students. "These individuals have been described as aggressive," the warning said. "They attempt to engage employees in conversation rather than giving a sales pitch." Cooperation with Israel, a longtime key ally, is increasingly important in the U.S. war on terrorism. AP-ES-03-05-02 1658EST -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4956 From: Shawn Hughes Date: Thu Mar 7, 2002 0:13pm Subject: optical emanations >SAN FRANCISCO, March 6 (Reuters) - By monitoring the flashes of LED lights >on electronics equipment >and the indirect glow from monitors, scientists in the United States and the >United Kingdom have >discovered ways to remotely eavesdrop on computer data. > > >Optical signals from the little flashing LED (light-emitting diode) lights, >usually red and dotting everything >from modems to keyboards and routers, can be captured with a telescope and >processed to reveal all the >data passing through the device, Joe Loughry, a computer programmer at >Lockheed Martin Space Systems >in Denver, told Reuters on Wednesday. > > >"It requires little apparatus, can be done at a considerable distance, and >is completely undetectable," he >writes in his paper, "Information Leakage from Optical Emanations." "In >effect, LED indicators act as little >free-space optical data transmitters, like fiber optics but without the >fiber." > > >Not every LED-enabled device is at risk, though. Affected is equipment used >in low-speed, long-distance >networks typically found in proprietary networks, such as ATM (automated >teller machines) at banks, as >opposed to corporate local area networks or home Internet connections, >Loughry said. > > >He said he was able to collect a strong optical signal from about 22 yards >(20 meters), using optical sensor >equipment. > > >"It is interesting to walk around downtown at night in a large city and look >up at the glass windows and you >see a lot of computers," Loughry said. "I've seen racks of equipment with >LEDs on them visible from the >street. That's kind of what got me to pursue this." > > >Loughry began his research on LEDs in 1994 when he was a graduate student at >Seattle University. Asked >how computer researchers could have overlooked for so long something that >literally stares them in the >face, he said: "I guess nobody ever looked at it before. > > >"I was working very late one night and waiting for a long file transfer to >complete and I was just staring at >these lights on the front of the modem and started to wonder if there was >anything there," said Loughry. > > >The solutions are easy -- locate equipment away from windows, put black tape >over LEDs or de-activate >them when not in use. Equipment manufacturers also can modify the devices. > > >The paper is scheduled to be published later this year in the scientific >journal for the Association for >Computing Machinery, called "ACM Transaction on Information and System >Security." > > >His co-author is his former professor, David Umphress, now a software >engineering professor at Alabama's >Auburn University. 4957 From: James M. Atkinson Date: Thu Mar 7, 2002 0:30pm Subject: Re: Interesting article (Whittier College) OK, As per your request I'll post your message to the list, but the Whittier Police department's account of what happened contradicts your version; and there seems to be some major questions as to who crossed the line on things that they should not be doing. Also, the people at college (and the paper) feels that the the spyshop you brought in is trying to hustle them for goods and service they don't need. There is also some concern that way to many people are scrambling around and trying to turn this into a publicity stunt to drum up more business and leach money out of the college. I would be more then happy to subscribe you to the list so that you can directly post your own version of what happened. I would also be happy to forward any details you would care to share to the list to help clear up any misunderstanding in this matter. -jma At 11:45 PM -0500 3/6/02, LAPRIVEYE@a... wrote: >X-From_: daemon Wed Mar 6 23:46:08 2002 >From: LAPRIVEYE@a... >Date: Wed, 6 Mar 2002 23:45:27 EST >Subject: Interesting article (Whittier College) >To: jmatk@tscm.com > >Mr. Atkinson, > >I am presuming that you are a Professional and as such would not >rebroadcast an unsupported web article critical of another >professional, then encouraging others to read it. We are a country >of free speech and I firmly believe in it's use. >As a Professional I was somewhat amazed that you would read an >article which is highly critical another professional by name, in >fact so critically as to be libelous, and rebroadcast it! >Some of the article is accurate however it is an insult to the >Student Body and that of the School Paper Staff that their statement >and report to the Police were not accurate. The facts as I >understand from the Police Department support that the officer did >in fact do what was reported and as such has been counseled over the >incident. >I am not an X-Police or "wanna be" but a retired Law Enforcement >Officer and I just "didn't fall off a turnip truck" as the article >amply and simply indicates. This article apparently when read >appears to be the product of a self serving bored individual not a >Professional. Professional are not quick to criticize other >Professionals for their own vanity as it appears the subtext of this >article implies. >I am thick skinned and appreciate criticism however a Professional >does not write such an inflammatory article without checking out his >facts as well as the education, training and experience of the >person he is being critical of. >If you were to post an article I think this would and should be the >appropriate article and entitle it the duties of a professional when >criticizing other professionals. As a By line I did immediatly >contact experts in the electronic evesdropping field and within an >hour had agood understanding of the manafacture and capabilities of >this "Bug" that was in part because a Professional will consult >another Professional in the appropriate field before he "shoots his >mouth off." I realize my capabilities even though I have an >education, background and certified training in electronics'. Again >even with that background I felt compelled to contact another >Professional in that specific field. >It should be remembered that we are Professionals and when we assume >the statements made by other Professionals, made by third parties we >have crossed out of the Professional field and into the area of a >Gossip monger. >I would appreciate you posting my article and forwarding it to the >originator / Author of this highly critical article which was good >but lacked research which can only reflect on the writer. >Sometimes we become legends in our own minds, a Professional does >not assume when he decides to make or rebroadcast such erroneous and >quite frankly a "mother-in-law" type article. >I understand we all get excited when an article comes out in our >field of expertise and we all do like to highlight what should have >been done which is constructive and is the proper use of a >professional LISTSERV, However we cross the line when we start >casting stones and the article no longer is instructive but a self >serving article of "I am some much smarter" and he is "a village >idiot." >I might be a "village idiot" but please research or call me to >confirm it before you broadcast it to the world. >If you are a true professional you will put this on your LISTSERV >and redirect it to the original author. >To set the record straight a police report was eventually taken and >the "Idiot" P. I. did immediately secured the services of one of >your contemporary Professionals at the point he was first contacted, >of course had the writer done his research he would of known that >and quite possibly toned down his remarks some of which could be >contributed to the Professionals in his field who were quoted out of >context and not named. We should work together not against each >other, I have learned a great deal from this "back biting" article >and it will assist me in my business so I do thank you for that. > >Thomas Barnes P. I. 8154-11300 >www.LAPrivateEye.com "the village idiot web site" -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4958 From: James M. Atkinson Date: Thu Mar 7, 2002 0:35pm Subject: Vast Israeli Spy Network Dismantled in the U.S. (A wee bit left wing, but an interesting set of messages -jma) 1. U.S. DESTROYS ISRAELI CRIMINAL SPY NETWORK http://groups.yahoo.com/group/InfoTimes/message/1287 2. An Enigma: Vast Israeli Spy Network Dismantled in the U.S. http://www.antiwar.com/rep/lemonde1.html 3. FOX NEWS SERIES ON ISRAELI SPYING IN THE U.S. http://www.firefox.1accesshost.com/cameron.html 4. French Reports: U.S. Busts Big Israeli Spy Ring http://www.commondreams.org/headlines02/0305-05.htm 5. THE ISRAELI SPY RING SCANDAL http://www.whatreallyhappened.com/spyring.html 6. Pro-Israel ADL illegally Spied on American Citizens http://groups.yahoo.com/group/InfoTimes/message/1280 7. The ADL Spying Case is Over, But the Struggle Continues http://www.counterpunch.org/adlspying2.html - The ADL Snoops - Were the Spies "Journalists"? http://www.counterpunch.org/adlspies.html 8. U.S. Deports Israeli Spy Suspects http://www.reportersnotebook.com/newforum/indexforum.html 9. Arab-Americans Spied on by ADL Sue Three Police Departments http://washington-report.org/backissues/0993/9309015.html 10. HOW AMERICANS ARE BLACKMAILED BY ISRAEL http://palestinechronicle.com/article.php?story=20020224202106987 AN ENIGMA: VAST ISRAELI SPY NETWORK DISMANTLED IN THE U.S. http://www.antiwar.com/rep/lemonde1.html by SYLVAIN CYPEL Le Monde http://www.lemonde.fr/article/0,5987,3222--265330-,00.html Translated by MALCOLM GARRIS It is undoubtedly the largest case of Israeli spying in the United States -- that has been made public -- since 1986. In June 2001, an investigative report detailed the activities of more than one-hundred Israeli agents, some presenting themselves as fine arts students, others tied to Israeli high-tech companies. All were challenged by the authorities, were questioned and a dozen of them are still imprisoned. One of their tasks was to track the Al-Qaida terrorists on American territory -- without informing the federal authorities. Elements of this investigation, taken up by American television Fox News, reinforce this thesis: that Israel did not transmit to the United States all the evidence in its possession on the preparation of the September 11 attacks. ISRAELI SPY RING UNCOVERED IN U.S. http://www.intelligenceonline.com The latest issue of the Online Intelligence Letter, a publication specializing in questions of information, has revealed that a vast Israeli spy network operating on American territory was dismantled. It is the biggest affair involving the Mossad (the Israel's external security agency) in activity against the United States since Jonathan Pollard, an employee of the U.S. Navy, was condemned to life in prison, in 1986, for spying for Israel's benefit. Which was the real scale of this network? The facts evoked by an American investigative report do not indicate if the network obtained the information it was after, or if the authorities dismantled it in its initial phase. According to the Chief Editor of Online Intelligence, Guillaume Dasquie, this "vast network of Israeli intelligence agents was neutralized by the counter-espionage services of the Department of Justice." The Americans "would have apprehended or expelled close to 120 Israeli nationals." M. Dasquie gives a report on a "61-page review article" from June 2001, given to the American justice department by a "task force" made up of agents of the DEA (Drug Enforcement Administration) and some INS (Immigration and Naturalization Service) agents "who were associated with the FBI and the office of investigation of the U.S. Air Force." Questioned by Le Monde, Will Glaspy, of the Public Affairs department of the DEA, authenticated this report, and said the DEA "holds a copy." This is not the first time that information relating to Israeli espionage appeared in the United States since the Pollard affair. In June 1999, the review Insight had described, at length, a "secret" investigation by division 5 of the FBI regarding Israeli phone-tapping targeting the White House, the State Department and the National Security Council. FOX NEWS SERIES ON ISRAELI SPYING IN THE U.S. http://www.firefox.1accesshost.com/cameron.html After the attacks of September 11, very little detailed information had come out about the arrest of some sixty Israelis. Finally, from the 11th to the 14th of December 2001, the Fox News television channel aired an investigation in four parts into Israeli espionage in the United States, in the broadcast "Carl Cameron Investigates." The Israeli Embassy in Washington immediately responded by stating that it did not contain "anything true." American Jewish organizations such JINSA (Jewish Institute for National Security Affairs), AIPAC (America-Israel Political Action Committee) and others denounced the report as a "machination." Fox withdrew from its Internet site, one day and half after its posting, all the material related to this investigation. Le Monde requested three times with Fox News to provide a tape of the broadcast. It was never done. On February 26, Fox told our correspondent in New York that sending it posed "a problem," without being specific. Le Monde, however took note of the whole script in this investigation. Carl Cameron evokes "a vast secret investigation held there" relating to "140 Israelis made to pass for students of the University of Jerusalem or Betzalel Academy of Arts [which have] unceasingly sought to come into contact with civil servants and, according to a document, targeted and penetrated military bases, dozens of buildings of the DEA, FBI and others." His investigation focused on two aspects. Firstly, could the Israelis have had preliminary knowledge of the September 11 attacks and not informed the Americans? His sources, explains Carl Cameron, tell him: "The principal question is 'how they could they have not known?'" On the screen, his Editor-in-Chief tells him thus: "Certain reports confirm that the Mossad sent representatives to the United States to warn them, before September 11, of the imminence of a major terrorist attack. That does not go in the direction of an absence of warning." Cameron's response: "The problem is not the absence of warning, but the absence of useful details" compared to those which American services suspect Israel of having held. The second round of the investigation touched on Israeli companies providing administrative services for American companies, which would conceal information. It was aimed at the manufacturer of Amdocs software, placed on Wall Street, which lists, for the 25 major telephone companies of the United States, all the calls coming into and originating from American territory, as well as the companies Nice and Comverse Infosys, the latter providing the data-processing programs to American law enforcement agencies authorized to eavesdrop on private phone conversations. Comverse is suspected of having introduced into its systems of the "catch gates" in order to "intercept, record and store" these wire-taps. This hardware would render the "listener" himself "listened to." Question to Cameron: "Are there reasons to believe the Israeli government is implicated?" Answer: "No, none, but a classified top-secret investigation is underway." The broadcast had been shown beforehand to the highest persons in charge of the CIA, the FBI, the NSA (the agency in charge of phone-taps), the DEA and the American Justice Department, none of which objected to its airing. The report submitted to the American Justice Department, to which Le Monde had access, shows that many of the "fine-arts students" suspected of illicit activity have a military past in Israeli information or advanced technology units. Some entered and left the United States on several occasions, remaining each time for short periods. Several are related to the hi-tech Israeli companies of Amdocs, Nice and Retalix. Challenged, a "coed" saw her guarantee of $10,000 paid by an Israeli working at Amdocs. Questioned, two others admitted being employed by Retalix. Le Monde obtained other information not contained in this report. Six of the intercepted "students" had a cellular telephone bought by an Israeli ex-Vice-Consul in the United States. Two others, at an unspecified time, arrived in Miami by direct flight from Hamburg, and went to the residence of an FBI agent, to try to sell him artwork, left again for the Chicago airport to go to the residence of an agent of the Justice Department, then again took a plane directly for Toronto -- all in one day. More than a third of these "students," who, according to the report, moved in at least 42 American cities, stated they resided in Florida. Five at least were intercepted in Hollywood, and two in Fort Lauderdale. Hollywood is a town of 25,000 inhabitants to the north of Miami, close to Fort Lauderdale. At least 10 of the 19 terrorists of 9/11 were residing in Florida. Four of the five members of the group that diverted American Airlines flight number 11 -- Mohammed Atta, Abdulaziz Al-Omari, Walid and Wail Al-Shehri, as well as one of the five terrorists of United flight 175, Marwan Al-Shehhi -- resided all at various times in... Hollywood, Florida. As for Ahmed Fayez, Ahmed and Hamza Al-Ghamdi and Mohand Al-Shehri, who took over United flight 75, like Said Al-Ghamdi, Ahmed Al-Haznawi and Ahmed Al-Nami, of United flight 93 which crashed September 11 in Pennsylvania, and Nawaq Al-Hamzi, of AA flight 77 (crashed into the Pentagon), they all at one time resided at Delray Beach, in the north of Fort Lauderdale. This convergence is, inter alia, the origin of the American conviction that one of the tasks of the Israeli "students" would have been to track the Al-Qaida terrorists on their territory, without informing the federal authorities of the existence of the plot. Two enigmas remain. Why was the Israeli network a priority of drug enforcement agents? An assumption: the DEA is the main American agency inquiring into the money laundering. A network such as Al-Qaida used "dirty" [funding], and the Taliban's Afghanistan was the primary exporter of opium in the world. Why this astonishing "cover" of false students canvassers for poor artwork? The Israeli network seemed to hold lists of names. Its members knew at which office or which private residence to go. The objective was apparently to make contact, even for a short time. According to an Israeli specialist in espionage, "this story is a ridiculous joke, and is not serious." Contacted, the services of the Israeli Prime Minister [Ariel Sharon] still had not, as of Monday evening March 4, answered our questions. The American Justice Department indicated to us that "a dozen" of these "students" would still be imprisoned indefinitely, and all the others had been released or deported. The FBI indicated to us that it will not make "any comment at this stage." The CIA, the FBI, the DEA, the INS, the NSA, the Justice Department and the Pentagon have all designated an investigator on this file. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4959 From: Matthew Paulsen Date: Thu Mar 7, 2002 2:12pm Subject: RE: Re: Interesting article (Whittier College) So, who were these outside Professionals that were contacted and used? What about their commentary on the article? What about a letter of reference or recommendation of services performed from the University staff and faculty? If these other Professionals are so good why not list who they are now so we can all utilize their Professional capabilities in the future? Noticed this as well - No names or information about training or expertise in this field referenced or equipment used either. http://www.laprivateeye.com/Bugging.htm Why not disclose the name of associated organizations and personnel? A lot of blanks to fill in. Matt -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Thursday, March 07, 2002 10:31 AM To: TSCM-L Mailing List Subject: [TSCM-L] Re: Interesting article (Whittier College) OK, As per your request I'll post your message to the list, but the Whittier Police department's account of what happened contradicts your version; and there seems to be some major questions as to who crossed the line on things that they should not be doing. Also, the people at college (and the paper) feels that the the spyshop you brought in is trying to hustle them for goods and service they don't need. There is also some concern that way to many people are scrambling around and trying to turn this into a publicity stunt to drum up more business and leach money out of the college. I would be more then happy to subscribe you to the list so that you can directly post your own version of what happened. I would also be happy to forward any details you would care to share to the list to help clear up any misunderstanding in this matter. -jma At 11:45 PM -0500 3/6/02, LAPRIVEYE@a... wrote: >X-From_: daemon Wed Mar 6 23:46:08 2002 >From: LAPRIVEYE@a... >Date: Wed, 6 Mar 2002 23:45:27 EST >Subject: Interesting article (Whittier College) >To: jmatk@tscm.com > >Mr. Atkinson, > >I am presuming that you are a Professional and as such would not >rebroadcast an unsupported web article critical of another >professional, then encouraging others to read it. We are a country >of free speech and I firmly believe in it's use. >As a Professional I was somewhat amazed that you would read an >article which is highly critical another professional by name, in >fact so critically as to be libelous, and rebroadcast it! >Some of the article is accurate however it is an insult to the >Student Body and that of the School Paper Staff that their statement >and report to the Police were not accurate. The facts as I >understand from the Police Department support that the officer did >in fact do what was reported and as such has been counseled over the >incident. >I am not an X-Police or "wanna be" but a retired Law Enforcement >Officer and I just "didn't fall off a turnip truck" as the article >amply and simply indicates. This article apparently when read >appears to be the product of a self serving bored individual not a >Professional. Professional are not quick to criticize other >Professionals for their own vanity as it appears the subtext of this >article implies. >I am thick skinned and appreciate criticism however a Professional >does not write such an inflammatory article without checking out his >facts as well as the education, training and experience of the >person he is being critical of. >If you were to post an article I think this would and should be the >appropriate article and entitle it the duties of a professional when >criticizing other professionals. As a By line I did immediatly >contact experts in the electronic evesdropping field and within an >hour had agood understanding of the manafacture and capabilities of >this "Bug" that was in part because a Professional will consult >another Professional in the appropriate field before he "shoots his >mouth off." I realize my capabilities even though I have an >education, background and certified training in electronics'. Again >even with that background I felt compelled to contact another >Professional in that specific field. >It should be remembered that we are Professionals and when we assume >the statements made by other Professionals, made by third parties we >have crossed out of the Professional field and into the area of a >Gossip monger. >I would appreciate you posting my article and forwarding it to the >originator / Author of this highly critical article which was good >but lacked research which can only reflect on the writer. >Sometimes we become legends in our own minds, a Professional does >not assume when he decides to make or rebroadcast such erroneous and >quite frankly a "mother-in-law" type article. >I understand we all get excited when an article comes out in our >field of expertise and we all do like to highlight what should have >been done which is constructive and is the proper use of a >professional LISTSERV, However we cross the line when we start >casting stones and the article no longer is instructive but a self >serving article of "I am some much smarter" and he is "a village >idiot." >I might be a "village idiot" but please research or call me to >confirm it before you broadcast it to the world. >If you are a true professional you will put this on your LISTSERV >and redirect it to the original author. >To set the record straight a police report was eventually taken and >the "Idiot" P. I. did immediately secured the services of one of >your contemporary Professionals at the point he was first contacted, >of course had the writer done his research he would of known that >and quite possibly toned down his remarks some of which could be >contributed to the Professionals in his field who were quoted out of >context and not named. We should work together not against each >other, I have learned a great deal from this "back biting" article >and it will assist me in my business so I do thank you for that. > >Thomas Barnes P. I. 8154-11300 >www.LAPrivateEye.com "the village idiot web site" -- -------------------------------------------------------------------------- ------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------- ------------------------ James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com -------------------------------------------------------------------------- ------------------------ As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle ------------------------------------------------------------------------ -------------------------- Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4960 From: A Grudko Date: Fri Mar 8, 2002 1:10am Subject: Re: FYI, UWB article ----- Original Message ----- From: kirk To: ; John McCain Sent: Wednesday, March 06, 2002 8:34 PM Subject: Re: [TSCM-L] FYI, UWB article > I just wanted to let the group know that I've been a member of the Ultra Wideband Working Group which is a regulating and information group to the UWB industry. More information can be had on Ultra wideband at this website, www.uwb.org/faqs.html. If you feel you have something to add to the furtherance of this technology please feel free to apply for membership. > > Kirk > > > ---------- Original Message ---------------------------------- > From: John McCain > Date: Tue, 05 Mar 2002 16:54:12 -0600 > > >There's a pretty good article on ultra wide band (believe it or not, this > >one actually includes some references to Shannon's equations and power > >spectral density) in the March, 2002 Communications System Design > >magazine. If you don't subscribe, read it online at > >http://www.commsdesign.com/design_corner/OEG20020301S0021 . > > > >Naturally, it's written by someone with a product to sell, but it's a > >pretty good intro for those of us who haven't looked into UWB before. > > > >Cheers, > >JohnM > > > > > > > >Manager, Corporate Security Voice: 217-352-3207 > >Data Comm for Business, Inc. Fax: 217-352-0350 > >807 > >Pioneer Web: > >http://www.dcbnet.com > >Champaign, IL. 61820 Email: > >Jmccain@d... > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > > > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > -- > Kirk Adirim > President > TACTRONIX > Tactical Electronics for Critical Missions > 8497 Sunset Boulevard #28 > West Hollywood, CA 90069 USA > E: kirk@t... > T: 323-650-2880 > F: 310-388-5886 > W: www.tactronix.com > -- > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 4961 From: A Grudko Date: Fri Mar 8, 2002 2:33am Subject: I've arrived!! I am now the proud owner of a 'SH-005 Lipstick size RF Signal Detector' (mine's a sexy silver). Messers Atkinson, Urhig and Kaiser, you can dump all those heavy, bulky SAs, receivers, antennas, filters, amps etc. I HAVE THE ANSWER. This amazing product (quoting from the packaging backboard) : "2. Detecting frequencies from 50 Mhz - 3.0 Ghz covering all Peeping cameras, cellphones, Taps etc. .... 5. Fuzzy scanning technique can filter the using envirnment noise to avoid mis-warning." In case you are not familiar with the Fuzzy scanning technique, it does not require any training - just 2 bottles of cheap wine. The SH-005 is so compact that it comes with a keyring loop...wow! Cool! - now I can keep my RF sweep kit in my pocket 24/7. Alas, upon inspection, more electronics have gone into the beep-beep/flash-flash function than the diode detection circuit! Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4962 From: Gordon Mitchell Date: Thu Mar 7, 2002 0:38pm Subject: Re: optical emanations It certainly is true that this can be done. Unintentional radiation of electromagnetic signals is something that has been exploited by governments for some time. In the business of commercial sweeping it seems not too relevant, however. Unless a client has a facility that is really secure it's much easier for an eavesdropper to just put something in. Looking around the room for bright IR sources is much more likely to produce optical link discoveries than worrying about a small modulation of visible LEDs. More details on this technique are available from http://applied-math.org/optical_tempest.pdf The author gives some distance/bandwidth tradeoffs that will be useful. Note that his work only employed Si PIN detectors; ranges would improve with APDs or PMTs. Following the author's measurements one can extrapolate the size of lens needed to capture light from the LED of interest. It looks like just glancing around for a huge piece of glass would suffice for countermeasures! -- Gordon phone +1 (425) 489-0446 or toll free (888) 284-5457 Electronic eavesdropping detection Bug-Killer.com Finding clues in computers eSleuth.com Shawn Hughes wrote: > > >SAN FRANCISCO, March 6 (Reuters) - By monitoring the flashes of LED lights > >on electronics equipment > >and the indirect glow from monitors, scientists in the United States and the > >United Kingdom have > >discovered ways to remotely eavesdrop on computer data. > > > > > >Optical signals from the little flashing LED (light-emitting diode) lights, > >usually red and dotting everything > >from modems to keyboards and routers, can be captured with a telescope and > >processed to reveal all the > >data passing through the device, Joe Loughry, a computer programmer at > >Lockheed Martin Space Systems > >in Denver, told Reuters on Wednesday. > > > > > >"It requires little apparatus, can be done at a considerable distance, and > >is completely undetectable," he > >writes in his paper, "Information Leakage from Optical Emanations." "In > >effect, LED indicators act as little > >free-space optical data transmitters, like fiber optics but without the > >fiber." > > > > > >Not every LED-enabled device is at risk, though. Affected is equipment used > >in low-speed, long-distance > >networks typically found in proprietary networks, such as ATM (automated > >teller machines) at banks, as > >opposed to corporate local area networks or home Internet connections, > >Loughry said. > > > > > >He said he was able to collect a strong optical signal from about 22 yards > >(20 meters), using optical sensor > >equipment. > > > > > >"It is interesting to walk around downtown at night in a large city and look > >up at the glass windows and you > >see a lot of computers," Loughry said. "I've seen racks of equipment with > >LEDs on them visible from the > >street. That's kind of what got me to pursue this." > > > > > >Loughry began his research on LEDs in 1994 when he was a graduate student at > >Seattle University. Asked > >how computer researchers could have overlooked for so long something that > >literally stares them in the > >face, he said: "I guess nobody ever looked at it before. > > > > > >"I was working very late one night and waiting for a long file transfer to > >complete and I was just staring at > >these lights on the front of the modem and started to wonder if there was > >anything there," said Loughry. > > > > > >The solutions are easy -- locate equipment away from windows, put black tape > >over LEDs or de-activate > >them when not in use. Equipment manufacturers also can modify the devices. > > > > > >The paper is scheduled to be published later this year in the scientific > >journal for the Association for > >Computing Machinery, called "ACM Transaction on Information and System > >Security." > > > > > >His co-author is his former professor, David Umphress, now a software > >engineering professor at Alabama's > >Auburn University. > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4963 From: James M. Atkinson Date: Thu Mar 7, 2002 6:43pm Subject: Reports: U.S. busts Israeli spy ring http://www.msnbc.com/news/719589.asp?cp1=1 Reports: U.S. busts Israeli spy ring French media say spies were operating in U.S. PARIS, March 5 - The United States has broken up a huge Israeli spy ring that may have trailed suspected al-Qaida members in the United States without informing federal authorities, the French newspaper Le Monde reported on Tuesday. A SECRET U.S. government report outlining spying activities by Israelis contained "elements (that) support the theory that Israel did not give the U.S. all the information it had about the planning for the Sept. 11 attacks," it wrote. Le Monde said the U.S. Drug Enforcement Administration had confirmed to it the existence of the secret study, which says the Israelis posed as graphic arts students and tried to enter buildings belonging to the DEA and other federal agencies. Intelligence Online, a Paris-based newsletter that reported on the study on Monday, said some 120 Israeli spies had been arrested or expelled and inquiries were continuing. An FBI spokesman on Monday called the Intelligence Online report a "bogus story. ... There wasn't a spy ring." In Israel on Monday, a spokesman told Reuters: "The prime minister's office declines to comment on this matter." VAST ISRAELI ESPIONAGE But Le Monde on Tuesday reported Intelligence Online's findings and added elements it said its reporters had uncovered. "A vast Israeli espionage network operating on American territory has been broken up," Le Monde wrote. It called the case the biggest Israeli spy case in the United States to be made public since 1986, a reference to the life sentence given Jonathan Pollard, an American Jew who passed U.S. military secrets to Israel. The Pollard affair strained relations between the United States and Israel, two traditionally close allies. Guillaume Dasquie, editor of Intelligence Online, said Monday's report did not specify exactly what information the alleged agents were seeking. "The report shows the clandestine network was engaged in several intelligence operations. It was a long-term project, not a one-off coup," he said. Le Monde published what it said were excerpts from the introduction of the June 2001 report, including a comment that the women in the spy ring were "usually very attractive." LINK TO AL-QAIDA? Le Monde said more than one third of the suspected Israeli spies had lived in Florida, where at least 10 of the 19 Arabs involved in the Sept. 11 airplane attacks on New York's World Trade Center also lived. At least five of them resided in Hollywood, Fla., where alleged hijack mastermind Mohammad Atta and four accomplices in the World Trade Center attacks also lived. The United States holds Saudi dissident Osama bin Laden's al-Qaida network responsible for the Sept. 11 attacks. Two Israelis lived in Fort Lauderdale, Fla., near Delray Beach, where hijackers in the planes that crashed into the Pentagon and in Pennsylvania resided temporarily, it added. "This concordance could be the source of the American view that one of the missions of the Israeli 'students' could have been to track al-Qaida terrorists on (U.S.) territory without informing federal authorities," Le Monde wrote. Le Monde said Fox News television reported in December that Israeli agents were sent to the United States before Sept. 11 to warn Washington about a threat, but the agents did not have enough useful information for U.S. officials to act on. Le Monde, which said it had seen a copy of the secret report, said it also had learned that six suspected spies had used portable telephones bought by a former Israeli vice-consul in the United States. Le Monde said several suspected spies had frequently entered and left the United States after only short stays. TECH CONNECTIONS Intelligence Online said the DEA also had confirmed the existence of the report drawn up for the Justice Department by the DEA, the Immigration and Naturalization Service, the Federal Bureau of Investigation and the U.S. Air Force. Intelligence Online said the suspects, all between 22 and 30, had recently finished their Israeli military service and one was related to a two-star Israeli general. It named several of the Israelis it said had been arrested. The inquiry began in February 2001 and is still continuing, the newsletter quoted the report as saying. "The network targeted some of the most sensitive sites in the United States," the twice-monthly newsletter said, citing an Air Force base near Oklahoma City and unnamed federal offices buildings where the Israelis tried to sell artwork. Intelligence Online said the suspected agents also had cultivated contacts with Israeli information technology companies based in the United States and serving as regular suppliers to various U.S. federal agencies. © 2002 Reuters Limited. All rights reserved. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4964 From: ariel silverstone Date: Thu Mar 7, 2002 2:09pm Subject: Re: Vast Israeli Spy Network Dismantled in the U.S. We ought also to say that all spokepersons for the FBi, DEA and INS denied those reports publicly over the pages of the Washington Post. >From: "James M. Atkinson" >To: TSCM-L Mailing List >Subject: [TSCM-L] Vast Israeli Spy Network Dismantled in the U.S. >Date: Thu, 7 Mar 2002 13:35:11 -0500 > >(A wee bit left wing, but an interesting set of messages -jma) > > > >1. U.S. DESTROYS ISRAELI CRIMINAL SPY NETWORK >http://groups.yahoo.com/group/InfoTimes/message/1287 > >2. An Enigma: Vast Israeli Spy Network Dismantled in the U.S. >http://www.antiwar.com/rep/lemonde1.html > >3. FOX NEWS SERIES ON ISRAELI SPYING IN THE U.S. >http://www.firefox.1accesshost.com/cameron.html > >4. French Reports: U.S. Busts Big Israeli Spy Ring >http://www.commondreams.org/headlines02/0305-05.htm > >5. THE ISRAELI SPY RING SCANDAL >http://www.whatreallyhappened.com/spyring.html > >6. Pro-Israel ADL illegally Spied on American Citizens >http://groups.yahoo.com/group/InfoTimes/message/1280 > >7. The ADL Spying Case is Over, But the Struggle Continues >http://www.counterpunch.org/adlspying2.html >- The ADL Snoops - Were the Spies "Journalists"? >http://www.counterpunch.org/adlspies.html > >8. U.S. Deports Israeli Spy Suspects >http://www.reportersnotebook.com/newforum/indexforum.html > >9. Arab-Americans Spied on by ADL Sue Three Police Departments >http://washington-report.org/backissues/0993/9309015.html > >10. HOW AMERICANS ARE BLACKMAILED BY ISRAEL >http://palestinechronicle.com/article.php?story=20020224202106987 > > > >AN ENIGMA: >VAST ISRAELI SPY NETWORK DISMANTLED IN THE U.S. >http://www.antiwar.com/rep/lemonde1.html > >by SYLVAIN CYPEL >Le Monde >http://www.lemonde.fr/article/0,5987,3222--265330-,00.html >Translated by MALCOLM GARRIS > >It is undoubtedly the largest case of Israeli spying in the United >States -- that has been made public -- since 1986. In June 2001, an >investigative report detailed the activities of more than one-hundred >Israeli agents, some presenting themselves as fine arts students, others >tied to Israeli high-tech companies. All were challenged by the >authorities, were questioned and a dozen of them are still imprisoned. >One of their tasks was to track the Al-Qaida terrorists on American >territory -- without informing the federal authorities. Elements of this >investigation, taken up by American television Fox News, reinforce this >thesis: that Israel did not transmit to the United States all the >evidence in its possession on the preparation of the September 11 >attacks. > >ISRAELI SPY RING UNCOVERED IN U.S. >http://www.intelligenceonline.com > >The latest issue of the Online Intelligence Letter, a publication >specializing in questions of information, has revealed that a vast >Israeli spy network operating on American territory was dismantled. > >It is the biggest affair involving the Mossad (the Israel's external >security agency) in activity against the United States since Jonathan >Pollard, an employee of the U.S. Navy, was condemned to life in prison, >in 1986, for spying for Israel's benefit. Which was the real scale of >this network? The facts evoked by an American investigative report do >not indicate if the network obtained the information it was after, or if >the authorities dismantled it in its initial phase. > >According to the Chief Editor of Online Intelligence, Guillaume Dasquie, >this "vast network of Israeli intelligence agents was neutralized by the >counter-espionage services of the Department of Justice." The Americans >"would have apprehended or expelled close to 120 Israeli nationals." > >M. Dasquie gives a report on a "61-page review article" from June 2001, >given to the American justice department by a "task force" made up of >agents of the DEA (Drug Enforcement Administration) and some INS >(Immigration and Naturalization Service) agents "who were associated >with the FBI and the office of investigation of the U.S. Air Force." >Questioned by Le Monde, Will Glaspy, of the Public Affairs department of >the DEA, authenticated this report, and said the DEA "holds a copy." > >This is not the first time that information relating to Israeli >espionage appeared in the United States since the Pollard affair. In >June 1999, the review Insight had described, at length, a "secret" >investigation by division 5 of the FBI regarding Israeli phone-tapping >targeting the White House, the State Department and the National >Security Council. > >FOX NEWS SERIES ON ISRAELI SPYING IN THE U.S. >http://www.firefox.1accesshost.com/cameron.html > >After the attacks of September 11, very little detailed information had >come out about the arrest of some sixty Israelis. Finally, from the 11th >to the 14th of December 2001, the Fox News television channel aired an >investigation in four parts into Israeli espionage in the United States, >in the broadcast "Carl Cameron Investigates." The Israeli Embassy in >Washington immediately responded by stating that it did not contain >"anything true." American Jewish organizations such JINSA (Jewish >Institute for National Security Affairs), AIPAC (America-Israel >Political Action Committee) and others denounced the report as a >"machination." Fox withdrew from its Internet site, one day and half >after its posting, all the material related to this investigation. > >Le Monde requested three times with Fox News to provide a tape of the >broadcast. It was never done. On February 26, Fox told our correspondent >in New York that sending it posed "a problem," without being specific. >Le Monde, however took note of the whole script in this investigation. >Carl Cameron evokes "a vast secret investigation held there" relating to >"140 Israelis made to pass for students of the University of Jerusalem >or Betzalel Academy of Arts [which have] unceasingly sought to come into >contact with civil servants and, according to a document, targeted and >penetrated military bases, dozens of buildings of the DEA, FBI and >others." > >His investigation focused on two aspects. Firstly, could the Israelis >have had preliminary knowledge of the September 11 attacks and not >informed the Americans? His sources, explains Carl Cameron, tell him: >"The principal question is 'how they could they have not known?'" On the >screen, his Editor-in-Chief tells him thus: "Certain reports confirm >that the Mossad sent representatives to the United States to warn them, >before September 11, of the imminence of a major terrorist attack. That >does not go in the direction of an absence of warning." Cameron's >response: "The problem is not the absence of warning, but the absence of >useful details" compared to those which American services suspect Israel >of having held. > >The second round of the investigation touched on Israeli companies >providing administrative services for American companies, which would >conceal information. It was aimed at the manufacturer of Amdocs >software, placed on Wall Street, which lists, for the 25 major telephone >companies of the United States, all the calls coming into and >originating from American territory, as well as the companies Nice and >Comverse Infosys, the latter providing the data-processing programs to >American law enforcement agencies authorized to eavesdrop on private >phone conversations. Comverse is suspected of having introduced into its >systems of the "catch gates" in order to "intercept, record and store" >these wire-taps. This hardware would render the "listener" himself >"listened to." > >Question to Cameron: "Are there reasons to believe the Israeli >government is implicated?" Answer: "No, none, but a classified >top-secret investigation is underway." The broadcast had been shown >beforehand to the highest persons in charge of the CIA, the FBI, the NSA >(the agency in charge of phone-taps), the DEA and the American Justice >Department, none of which objected to its airing. > >The report submitted to the American Justice Department, to which Le >Monde had access, shows that many of the "fine-arts students" suspected >of illicit activity have a military past in Israeli information or >advanced technology units. Some entered and left the United States on >several occasions, remaining each time for short periods. Several are >related to the hi-tech Israeli companies of Amdocs, Nice and Retalix. > >Challenged, a "coed" saw her guarantee of $10,000 paid by an Israeli >working at Amdocs. Questioned, two others admitted being employed by >Retalix. > >Le Monde obtained other information not contained in this report. Six of >the intercepted "students" had a cellular telephone bought by an Israeli >ex-Vice-Consul in the United States. Two others, at an unspecified time, >arrived in Miami by direct flight from Hamburg, and went to the >residence of an FBI agent, to try to sell him artwork, left again for >the Chicago airport to go to the residence of an agent of the Justice >Department, then again took a plane directly for Toronto -- all in one >day. > >More than a third of these "students," who, according to the report, >moved in at least 42 American cities, stated they resided in Florida. >Five at least were intercepted in Hollywood, and two in Fort Lauderdale. >Hollywood is a town of 25,000 inhabitants to the north of Miami, close >to Fort Lauderdale. At least 10 of the 19 terrorists of 9/11 were >residing in Florida. > >Four of the five members of the group that diverted American Airlines >flight number 11 -- Mohammed Atta, Abdulaziz Al-Omari, Walid and Wail >Al-Shehri, as well as one of the five terrorists of United flight 175, >Marwan Al-Shehhi -- resided all at various times in... Hollywood, >Florida. As for Ahmed Fayez, Ahmed and Hamza Al-Ghamdi and Mohand >Al-Shehri, who took over United flight 75, like Said Al-Ghamdi, Ahmed >Al-Haznawi and Ahmed Al-Nami, of United flight 93 which crashed >September 11 in Pennsylvania, and Nawaq Al-Hamzi, of AA flight 77 >(crashed into the Pentagon), they all at one time resided at Delray >Beach, in the north of Fort Lauderdale. > >This convergence is, inter alia, the origin of the American conviction >that one of the tasks of the Israeli "students" would have been to track >the Al-Qaida terrorists on their territory, without informing the >federal authorities of the existence of the plot. > >Two enigmas remain. Why was the Israeli network a priority of drug >enforcement agents? An assumption: the DEA is the main American agency >inquiring into the money laundering. A network such as Al-Qaida used >"dirty" [funding], and the Taliban's Afghanistan was the primary >exporter of opium in the world. Why this astonishing "cover" of false >students canvassers for poor artwork? The Israeli network seemed to hold >lists of names. Its members knew at which office or which private >residence to go. The objective was apparently to make contact, even for >a short time. > >According to an Israeli specialist in espionage, "this story is a >ridiculous joke, and is not serious." Contacted, the services of the >Israeli Prime Minister [Ariel Sharon] still had not, as of Monday >evening March 4, answered our questions. The American Justice Department >indicated to us that "a dozen" of these "students" would still be >imprisoned indefinitely, and all the others had been released or >deported. The FBI indicated to us that it will not make "any comment at >this stage." The CIA, the FBI, the DEA, the INS, the NSA, the Justice >Department and the Pentagon have all designated an investigator on this >file. > >-- > >-------------------------------------------------------------------------------------------------- >The First, The Largest, The Most Popular, and The Most Complete TSCM, >Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. >-------------------------------------------------------------------------------------------------- > James M. AtkinsonPh: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com >-------------------------------------------------------------------------------------------------- > As Cuvier could correctly describe a whole animal by the contemplation >of > a single bone, so the observer who has thoroughly understood one link in > a series of incidents should be able to accurately state all the other >ones, > both before and after. - Sir Arthur Conan Doyle > >-------------------------------------------------------------------------------------------------- _________________________________________________________________ Join the worldís largest e-mail service with MSN Hotmail. http://www.hotmail.com 4965 From: kirk Date: Thu Mar 7, 2002 3:20pm Subject: Re: Vast Israeli Spy Network Dismantled in the U.S. Deported Israelis Not Spies, U.S. Says Times Headlines By ERIC LICHTBLAU and ROBIN WRIGHT, TIMES STAFF WRITERS WASHINGTON -- Several dozen Israeli students have been deported since last year under a cloud of suspicion over possible espionage, but U.S. authorities said Tuesday that they are confident the youths were art peddlers, not spies. Rumors of espionage by Israeli students have circulated for months only to be denied by law enforcement officials, but new reports Tuesday in the French media revived the issue, prompting Israeli officials to dismiss the articles as "nonsense." The allegations were triggered by an internal memo last year at the Drug Enforcement Administration describing "suspicious" activity by Israeli students. Employees at several federal buildings around the country had noticed dozens of young Israelis selling artwork and toys outside their facilities. "The nature of the individuals' conduct," along with other factors, "leads [DEA security] to believe the incident may well be an organized intelligence-gathering activity," the memo said, according to a law enforcement official familiar with the document. The memo cited an unconfirmed report that the students had visited homes of government employees, apparently to peddle their art. But the DEA memo said there was no reason for immediate concern. The FBI also looked into the issue, but "we determined that there was no counterintelligence issue here. There was no spying," according to a bureau official who asked not to be identified. No one was ever charged with espionage, but some members of the group were deported for selling artwork without a proper work visa. Although he did not have an exact figure, Immigration and Naturalization Service spokesman Russ Bergeron said that in the last year or two, several dozen Israeli students on student or visitor visas have been deported. "Their cases were handled routinely and they were removed, and that's it," he said. There was no allegation of espionage, he said. Mark Regev, spokesman for the Israeli Embassy in Washington, said the allegation of espionage by Israeli students "is baseless." Cite: www.latimes.com/news/nationworld/world/la-000016769mar06.story ---------- Original Message ---------------------------------- From: "James M. Atkinson" Date: Thu, 7 Mar 2002 13:35:11 -0500 >(A wee bit left wing, but an interesting set of messages -jma) > > > >1. U.S. DESTROYS ISRAELI CRIMINAL SPY NETWORK >http://groups.yahoo.com/group/InfoTimes/message/1287 > >2. An Enigma: Vast Israeli Spy Network Dismantled in the U.S. >http://www.antiwar.com/rep/lemonde1.html > >3. FOX NEWS SERIES ON ISRAELI SPYING IN THE U.S. >http://www.firefox.1accesshost.com/cameron.html > >4. French Reports: U.S. Busts Big Israeli Spy Ring >http://www.commondreams.org/headlines02/0305-05.htm > >5. THE ISRAELI SPY RING SCANDAL >http://www.whatreallyhappened.com/spyring.html > >6. Pro-Israel ADL illegally Spied on American Citizens >http://groups.yahoo.com/group/InfoTimes/message/1280 > >7. The ADL Spying Case is Over, But the Struggle Continues >http://www.counterpunch.org/adlspying2.html >- The ADL Snoops - Were the Spies "Journalists"? >http://www.counterpunch.org/adlspies.html > >8. U.S. Deports Israeli Spy Suspects >http://www.reportersnotebook.com/newforum/indexforum.html > >9. Arab-Americans Spied on by ADL Sue Three Police Departments >http://washington-report.org/backissues/0993/9309015.html > >10. HOW AMERICANS ARE BLACKMAILED BY ISRAEL >http://palestinechronicle.com/article.php?story=20020224202106987 > > > >AN ENIGMA: >VAST ISRAELI SPY NETWORK DISMANTLED IN THE U.S. >http://www.antiwar.com/rep/lemonde1.html > >by SYLVAIN CYPEL >Le Monde >http://www.lemonde.fr/article/0,5987,3222--265330-,00.html >Translated by MALCOLM GARRIS > >It is undoubtedly the largest case of Israeli spying in the United >States -- that has been made public -- since 1986. In June 2001, an >investigative report detailed the activities of more than one-hundred >Israeli agents, some presenting themselves as fine arts students, others >tied to Israeli high-tech companies. All were challenged by the >authorities, were questioned and a dozen of them are still imprisoned. >One of their tasks was to track the Al-Qaida terrorists on American >territory -- without informing the federal authorities. Elements of this >investigation, taken up by American television Fox News, reinforce this >thesis: that Israel did not transmit to the United States all the >evidence in its possession on the preparation of the September 11 >attacks. > >ISRAELI SPY RING UNCOVERED IN U.S. >http://www.intelligenceonline.com > >The latest issue of the Online Intelligence Letter, a publication >specializing in questions of information, has revealed that a vast >Israeli spy network operating on American territory was dismantled. > >It is the biggest affair involving the Mossad (the Israel's external >security agency) in activity against the United States since Jonathan >Pollard, an employee of the U.S. Navy, was condemned to life in prison, >in 1986, for spying for Israel's benefit. Which was the real scale of >this network? The facts evoked by an American investigative report do >not indicate if the network obtained the information it was after, or if >the authorities dismantled it in its initial phase. > >According to the Chief Editor of Online Intelligence, Guillaume Dasquie, >this "vast network of Israeli intelligence agents was neutralized by the >counter-espionage services of the Department of Justice." The Americans >"would have apprehended or expelled close to 120 Israeli nationals." > >M. Dasquie gives a report on a "61-page review article" from June 2001, >given to the American justice department by a "task force" made up of >agents of the DEA (Drug Enforcement Administration) and some INS >(Immigration and Naturalization Service) agents "who were associated >with the FBI and the office of investigation of the U.S. Air Force." >Questioned by Le Monde, Will Glaspy, of the Public Affairs department of >the DEA, authenticated this report, and said the DEA "holds a copy." > >This is not the first time that information relating to Israeli >espionage appeared in the United States since the Pollard affair. In >June 1999, the review Insight had described, at length, a "secret" >investigation by division 5 of the FBI regarding Israeli phone-tapping >targeting the White House, the State Department and the National >Security Council. > >FOX NEWS SERIES ON ISRAELI SPYING IN THE U.S. >http://www.firefox.1accesshost.com/cameron.html > >After the attacks of September 11, very little detailed information had >come out about the arrest of some sixty Israelis. Finally, from the 11th >to the 14th of December 2001, the Fox News television channel aired an >investigation in four parts into Israeli espionage in the United States, >in the broadcast "Carl Cameron Investigates." The Israeli Embassy in >Washington immediately responded by stating that it did not contain >"anything true." American Jewish organizations such JINSA (Jewish >Institute for National Security Affairs), AIPAC (America-Israel >Political Action Committee) and others denounced the report as a >"machination." Fox withdrew from its Internet site, one day and half >after its posting, all the material related to this investigation. > >Le Monde requested three times with Fox News to provide a tape of the >broadcast. It was never done. On February 26, Fox told our correspondent >in New York that sending it posed "a problem," without being specific. >Le Monde, however took note of the whole script in this investigation. >Carl Cameron evokes "a vast secret investigation held there" relating to >"140 Israelis made to pass for students of the University of Jerusalem >or Betzalel Academy of Arts [which have] unceasingly sought to come into >contact with civil servants and, according to a document, targeted and >penetrated military bases, dozens of buildings of the DEA, FBI and >others." > >His investigation focused on two aspects. Firstly, could the Israelis >have had preliminary knowledge of the September 11 attacks and not >informed the Americans? His sources, explains Carl Cameron, tell him: >"The principal question is 'how they could they have not known?'" On the >screen, his Editor-in-Chief tells him thus: "Certain reports confirm >that the Mossad sent representatives to the United States to warn them, >before September 11, of the imminence of a major terrorist attack. That >does not go in the direction of an absence of warning." Cameron's >response: "The problem is not the absence of warning, but the absence of >useful details" compared to those which American services suspect Israel >of having held. > >The second round of the investigation touched on Israeli companies >providing administrative services for American companies, which would >conceal information. It was aimed at the manufacturer of Amdocs >software, placed on Wall Street, which lists, for the 25 major telephone >companies of the United States, all the calls coming into and >originating from American territory, as well as the companies Nice and >Comverse Infosys, the latter providing the data-processing programs to >American law enforcement agencies authorized to eavesdrop on private >phone conversations. Comverse is suspected of having introduced into its >systems of the "catch gates" in order to "intercept, record and store" >these wire-taps. This hardware would render the "listener" himself >"listened to." > >Question to Cameron: "Are there reasons to believe the Israeli >government is implicated?" Answer: "No, none, but a classified >top-secret investigation is underway." The broadcast had been shown >beforehand to the highest persons in charge of the CIA, the FBI, the NSA >(the agency in charge of phone-taps), the DEA and the American Justice >Department, none of which objected to its airing. > >The report submitted to the American Justice Department, to which Le >Monde had access, shows that many of the "fine-arts students" suspected >of illicit activity have a military past in Israeli information or >advanced technology units. Some entered and left the United States on >several occasions, remaining each time for short periods. Several are >related to the hi-tech Israeli companies of Amdocs, Nice and Retalix. > >Challenged, a "coed" saw her guarantee of $10,000 paid by an Israeli >working at Amdocs. Questioned, two others admitted being employed by >Retalix. > >Le Monde obtained other information not contained in this report. Six of >the intercepted "students" had a cellular telephone bought by an Israeli >ex-Vice-Consul in the United States. Two others, at an unspecified time, >arrived in Miami by direct flight from Hamburg, and went to the >residence of an FBI agent, to try to sell him artwork, left again for >the Chicago airport to go to the residence of an agent of the Justice >Department, then again took a plane directly for Toronto -- all in one >day. > >More than a third of these "students," who, according to the report, >moved in at least 42 American cities, stated they resided in Florida. >Five at least were intercepted in Hollywood, and two in Fort Lauderdale. >Hollywood is a town of 25,000 inhabitants to the north of Miami, close >to Fort Lauderdale. At least 10 of the 19 terrorists of 9/11 were >residing in Florida. > >Four of the five members of the group that diverted American Airlines >flight number 11 -- Mohammed Atta, Abdulaziz Al-Omari, Walid and Wail >Al-Shehri, as well as one of the five terrorists of United flight 175, >Marwan Al-Shehhi -- resided all at various times in... Hollywood, >Florida. As for Ahmed Fayez, Ahmed and Hamza Al-Ghamdi and Mohand >Al-Shehri, who took over United flight 75, like Said Al-Ghamdi, Ahmed >Al-Haznawi and Ahmed Al-Nami, of United flight 93 which crashed >September 11 in Pennsylvania, and Nawaq Al-Hamzi, of AA flight 77 >(crashed into the Pentagon), they all at one time resided at Delray >Beach, in the north of Fort Lauderdale. > >This convergence is, inter alia, the origin of the American conviction >that one of the tasks of the Israeli "students" would have been to track >the Al-Qaida terrorists on their territory, without informing the >federal authorities of the existence of the plot. > >Two enigmas remain. Why was the Israeli network a priority of drug >enforcement agents? An assumption: the DEA is the main American agency >inquiring into the money laundering. A network such as Al-Qaida used >"dirty" [funding], and the Taliban's Afghanistan was the primary >exporter of opium in the world. Why this astonishing "cover" of false >students canvassers for poor artwork? The Israeli network seemed to hold >lists of names. Its members knew at which office or which private >residence to go. The objective was apparently to make contact, even for >a short time. > >According to an Israeli specialist in espionage, "this story is a >ridiculous joke, and is not serious." Contacted, the services of the >Israeli Prime Minister [Ariel Sharon] still had not, as of Monday >evening March 4, answered our questions. The American Justice Department >indicated to us that "a dozen" of these "students" would still be >imprisoned indefinitely, and all the others had been released or >deported. The FBI indicated to us that it will not make "any comment at >this stage." The CIA, the FBI, the DEA, the INS, the NSA, the Justice >Department and the Pentagon have all designated an investigator on this >file. > >-- > >-------------------------------------------------------------------------------------------------- >The First, The Largest, The Most Popular, and The Most Complete TSCM, >Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. >-------------------------------------------------------------------------------------------------- > James M. AtkinsonPh: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com >-------------------------------------------------------------------------------------------------- > As Cuvier could correctly describe a whole animal by the contemplation of > a single bone, so the observer who has thoroughly understood one link in > a series of incidents should be able to accurately state all the other ones, > both before and after. - Sir Arthur Conan Doyle > -------------------------------------------------------------------------------------------------- > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > -- Kirk Adirim President TACTRONIX Tactical Electronics for Critical Missions 8497 Sunset Boulevard #28 West Hollywood, CA 90069 USA E: kirk@t... T: 323-650-2880 F: 310-388-5886 W: www.tactronix.com -- 4966 From: James M. Atkinson Date: Thu Mar 7, 2002 7:10pm Subject: Craps [The following sort of reminds me of the fiasco that recently folding out at Whittier College] Two bored casino dealers were waiting at a craps table. A very attractive blonde woman arrived and bet twenty-thousand dollars on a single roll of the dice. She said, "I hope you don't mind, but I feel much luckier when I'm completely nude." With that she stripped from her neck down, rolled the dice and yelled, "Mama needs new clothes!". Then she hollered "YES! YES! I WON! I WON!" She jumped up and down and hugged each of the dealers. She then picked up all the money and clothes and quickly departed. The dealers just stared at each other dumbfounded. Finally, one of them asked, "What did she roll?" The other answered, "I don't know. I thought YOU were watching!" MORAL Not all blondes are dumb, but all men are men. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4967 From: James M. Atkinson Date: Thu Mar 7, 2002 8:49pm Subject: Whittier College Greeting Card Over two dozen people in California are falling all over themselves to horn in and exploit the situation at Whittier College but only one TSCM'er has been able to provide even the slightest amount of insight in the matter. To the other 23, I would like to the provide the following words of encouragement: http://www.tscm.com/cupofsfu.jpg Warmest Regards, -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4968 From: James M. Atkinson Date: Fri Mar 8, 2002 9:06am Subject: US busts Israeli spy ring - French media say spies were operating in U.S. US busts Israeli spy ring French media say spies were operating in U.S. MSNBC PARIS, March 5 - The United States has broken up a huge Israeli spy ring that may have trailed suspected al-Qaida members in the United States without informing federal authorities, the French newspaper Le Monde reported on Tuesday. A SECRET U.S. government report outlining spying activities by Israelis contained "elements (that) support the theory that Israel did not give the U.S. all the information it had about the planning for the Sept. 11 attacks," it wrote. Le Monde said the U.S. Drug Enforcement Administration had confirmed to it the existence of the secret study, which says the Israelis posed as graphic arts students and tried to enter buildings belonging to the DEA and other federal agencies. Intelligence Online, a Paris-based newsletter that reported on the study on Monday, said some 120 Israeli spies had been arrested or expelled and inquiries were continuing. An FBI spokesman on Monday called the Intelligence Online report a "bogus story. ... There wasn't a spy ring." In Israel on Monday, a spokesman told Reuters: "The prime minister's office declines to comment on this matter." VAST ISRAELI ESPIONAGE But Le Monde on Tuesday reported Intelligence Online's findings and added elements it said its reporters had uncovered. "A vast Israeli espionage network operating on American territory has been broken up," Le Monde wrote. It called the case the biggest Israeli spy case in the United States to be made public since 1986, a reference to the life sentence given Jonathan Pollard, an American Jew who passed U.S. military secrets to Israel. The Pollard affair strained relations between the United States and Israel, two traditionally close allies. Guillaume Dasquie, editor of Intelligence Online, said Monday's report did not specify exactly what information the alleged agents were seeking. "The report shows the clandestine network was engaged in several intelligence operations. It was a long-term project, not a one-off coup," he said. Le Monde published what it said were excerpts from the introduction of the June 2001 report, including a comment that the women in the spy ring were "usually very attractive." LINK TO AL-QAIDA? Le Monde said more than one third of the suspected Israeli spies had lived in Florida, where at least 10 of the 19 Arabs involved in the Sept. 11 airplane attacks on New York's World Trade Center also lived. At least five of them resided in Hollywood, Fla., where alleged hijack mastermind Mohammad Atta and four accomplices in the World Trade Center attacks also lived. The United States holds Saudi dissident Osama bin Laden's al-Qaida network responsible for the Sept. 11 attacks. Two Israelis lived in Fort Lauderdale, Fla., near Delray Beach, where hijackers in the planes that crashed into the Pentagon and in Pennsylvania resided temporarily, it added. "This concordance could be the source of the American view that one of the missions of the Israeli 'students' could have been to track al-Qaida terrorists on (U.S.) territory without informing federal authorities," Le Monde wrote. Le Monde said Fox News television reported in December that Israeli agents were sent to the United States before Sept. 11 to warn Washington about a threat, but the agents did not have enough useful information for U.S. officials to act on. Le Monde, which said it had seen a copy of the secret report, said it also had learned that six suspected spies had used portable telephones bought by a former Israeli vice-consul in the United States. Le Monde said several suspected spies had frequently entered and left the United States after only short stays. TECH CONNECTIONS Intelligence Online said the DEA also had confirmed the existence of the report drawn up for the Justice Department by the DEA, the Immigration and Naturalization Service, the Federal Bureau of Investigation and the U.S. Air Force. Intelligence Online said the suspects, all between 22 and 30, had recently finished their Israeli military service and one was related to a two-star Israeli general. It named several of the Israelis it said had been arrested. The inquiry began in February 2001 and is still continuing, the newsletter quoted the report as saying. "The network targeted some of the most sensitive sites in the United States," the twice-monthly newsletter said, citing an Air Force base near Oklahoma City and unnamed federal offices buildings where the Israelis tried to sell artwork. Intelligence Online said the suspected agents also had cultivated contacts with Israeli information technology companies based in the United States and serving as regular suppliers to various U.S. federal agencies. © 2002 Reuters Limited. All rights reserved. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4969 From: D.A.Linsky Date: Fri Mar 8, 2002 0:13pm Subject: Low tech vs.high tech Directional antennas made from empty pringles cans. SSC, Inc. David A.Linsky President dlinsky@s... http://www.securesvc.com [Non-text portions of this message have been removed] 4970 From: Ed Naylor Date: Fri Mar 8, 2002 0:11pm Subject: PRINGLES CAN DIRECTIONAL ANT. http://news.bbc.co.uk/hi/english/sci/tech/newsid_1860000/1860241.stm 4971 From: thoucynic Date: Fri Mar 8, 2002 3:25pm Subject: Re: Vast Israeli Spy Network Dismantled in the U.S. > We ought also to say that all spokepersons for the FBi, DEA and INS denied > those reports publicly over the pages of the Washington Post. We ought also say that such a response is to be expected when dealing with such politically sensitive topics, that none on this list are naive, nor any childern, and that a denial concerning matters that are probably classified by individuals with a sworn duty to protect the secrecy of such information in no way indicates that there is any substance to these denials. On a final note: From an article by Justin Raimondo (who is not a left-winger, to the contrary he wrote for a Buchanan anthology): "What I like best about Online Intelligence is that it names names, "A few of the operatives are well known in the Israeli intelligence community. The report cited the names of Peer Segalovitz (military registration number 5087989) and Aran Ofek, son of a renowned two-star general in the Israeli army. The network targeted some of the most sensitive sites in the U.S., such as Tanker Air Force Base near Oklahoma City. Indeed, the U.S. Air Force's Office of Special Investigation sent a letter to the Justice Department on May 16 of last year to ask for assistance in a case against four Israelis suspected of spying: Yaron Ohana, Ronen Kalfon, Zeev Cohen and Naor Topaz." " Source; http://www.antiwar.com/justin/j030802.html Again, no one on this list is a child. 4972 From: Date: Fri Mar 8, 2002 2:38pm Subject: Light-bulb carrier current Anyone know of an actual, non theoretical, functioning in the field carrier current device contained in a working light bulb? Might save me a trip if it's in the realm of Elvis sightings and bigfoot. Thanks for any help! Martin Brown Brown & Sikes, Inc. 4973 From: Shawn Hughes Date: Fri Mar 8, 2002 6:41pm Subject: the college bug deal Quote: "..To set the record straight a police report was eventually taken..." As a self proclaimed former Professional Law Enforcement Officer, how do you defend this statement? That is exactly like saying, " after finding the corpse, eventually, a police report was taken." It tells me that you do not have any concept of chain of custody, or that as a non-police officer (spelled civilian), your job ended as soon as you found the unit. Regards, Shawn Hughes [Non-text portions of this message have been removed] 4974 From: James M. Atkinson Date: Fri Mar 8, 2002 9:37pm Subject: FBI denies reports on Israeli spy ring http://ummahnews.com/viewarticle.php?sid=2968 FBI denies reports on Israeli spy ring 2002-03-06 20:36:45 VOA News 6 March 2002 The FBI has denied reports of a major Israeli spy ring in the United States. The story was reported by "Intelligence Online," a French website specializing in intelligence matters, and by the French daily Le Monde. About 120 Israelis were said to have been arrested or deported by U.S. authorities as a result of a top-secret operation, which reportedly began last April and was ongoing. An FBI spokesman dismissed the story as "bogus" and said there was no such Israeli spy ring. Some media reports have suggested that Israel may have been aware of the preparations leading up to the September 11 attacks in New York and Washington. The French website said the Israeli spies were operating in the states of California, Texas, Arkansas and Florida. Florida was where alleged hijack leader Mohammad Atta and four accomplices had lived. Copyright 2001. This news item is distributed via Middle East News Online (MiddleEastWire.com). All rights reserved. May not be redistributed, published or used for broadcast without prior written authorisation from Middle East News Online. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4975 From: James M. Atkinson Date: Fri Mar 8, 2002 9:46pm Subject: Re: Light-bulb carrier current At 2:38 PM -0600 3/8/02, brnsike@s... wrote: >Anyone know of an actual, non theoretical, functioning in the field >carrier current device contained in a working light bulb? Might save me >a trip if it's in the realm of Elvis sightings and bigfoot. Thanks for >any help! > >Martin Brown >Brown & Sikes, Inc. There are several companies which package a VLF transmitter in the base of a light bulb, the frequency is typically below 300 kHz, and usually between 75 kHz and 250 kHz. VERY easy to detect with a spectrum analyzer and LISN if it is operably. If the unit is off line a physical inspection of the bulb base will show that the original epoxy has been disturbed, and the solder points will have been disturbed. The device will also clearly show up on an X-Ray inspection. Beware of bigfoot sightings in Texas. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4976 From: James M. Atkinson Date: Fri Mar 8, 2002 10:12pm Subject: Re: the college bug deal You make a good point, It would be one thing if the device had been left in place and the police called in, it would also be something else if they removed it and then drove it directly to the local police station. But "eventually" taking to the police indicates intent and obstruction. If you find a dead body in your living room, you do not load it in your trunk and drive around with it for a few days so you can show it to your friends and perform your own medical experiments on it. Now, lets consider that perhaps the person who found it honestly didn't know what the thing was, and was simply carrying it around trying to get experts to help him figure it out. OK, but at what moment did he stop suspecting it was a bug, and at what point did he have good reason to belive it was an illicit eavesdropping device? -jma At 7:41 PM -0500 3/8/02, Shawn Hughes wrote: >Quote: "..To set the record straight a police report was eventually taken..." > > > >As a self proclaimed former Professional Law Enforcement Officer, how do >you defend this statement? That is exactly like saying, " after finding the >corpse, eventually, a police report was taken." > > >It tells me that you do not have any concept of chain of custody, or that >as a non-police officer (spelled civilian), your job ended as soon as you >found the unit. > > >Regards, > >Shawn Hughes -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4977 From: Shawn Hughes Date: Fri Mar 8, 2002 11:24pm Subject: off topic, but confusing none the less >FORT WORTH, Texas (AP) - A judge raised bond to $250,000 Friday for a >nurse's aide accused of killing >a homeless man by hitting him with her car and leaving him to die in her >garage. > > >Chante J. Mallard, 25, had been released on $10,000 bail after she was >arrested Wednesday. Prosecutors >said that amount was too low. > > >``It is no secret that the community is outraged by the offense of the >defendant and I'd remind the court this >is a murder charge,'' said Richard Alpert, a Tarrant County assistant >district attorney. > > >District Judge James R. Wilson raised the amount. Mallard, who wept in the >courtroom, was taken into >custody after the hearing. > > >Mallard is accused of slamming into Gregory Biggs last fall on a highway >near her home, then driving >home with his head lodged in the broken windshield. Authorities say they >were tipped that she had been >drinking and taking drugs that night. > > >Police said Mallard ignored Biggs' cries for help as he bled to death over >the next two days in her garage. >His body was dumped in a park, where it was found Oct. 27. > > >Mallard faces from five years to life in prison if convicted. Police say >they expect more arrests in the case. > > >Mike Heiskell, Mallard's attorney, asked the judge to set the bond based on >the case, not community >outrage. He called on Mallard's parents, married 38 years, and one of her >older brothers, a Fort Worth Fire >Department lieutenant, to testify that she would not flee if freed on bail. > > >James E. Mallard Sr. wept on the stand, saying his daughter had no criminal >record and sometimes worked >two jobs at a time. > > >But when questioned by prosecutors, Chante Mallard's relatives acknowledged >they did not know her >boyfriend or her friends and had not been to her house in months. They also >said they did not know exactly >where Mallard worked and when. > > >``It's evident her family cares about her, but they don't know her,'' Alpert >told the judge. > > >Authorities say Biggs would have lived had he received medical attention. >His legs were broken and he >suffered cuts, but he had no internal injuries, according to the medical >examiner's office. > > >Biggs, 37, had struggled with mental illness and had been staying at a >homeless shelter, where workers said >he often brought them flowers. Biggs was estranged from his mother and sister. > > >His son, Brandon Biggs, 19, lives about 35 miles northeast of Abilene. He >said he is not angry at Mallard. > > >``I pray for her, actually,'' the high school senior told the Fort Worth >Star-Telegram. ``I'd just like to talk to >her - just ask questions and see why, to get a better understanding.'' 4978 From: Hawkspirit Date: Sat Mar 9, 2002 9:06am Subject: R.F. telephones During a sweep of a executives golf course home yesterday I had an interesting experience with his R.F. telephone. The phone was a Panasonic 2.4 GHZ spread spectrum, model KX-T62570B. He happened to be on this phone when I was sweeping with my spectrum analyzer. His conversation came in through the AM slope demodulator in my analyzer. The really interesting thing is that this guy does not own a hardwired telephone. Shows you how convenience oriented we have become. Anyway, can anyone recommend a R.F. phone that would have a frequency hopping format, more like cell phones? I am trying to remember what the Seimens Gigasets format was. For these clients who demand having the R.F. link convenience, what would be the best, most difficult to scan and demodulate R.F. phone? Thanks, Roger Tolces Electronic Security Co. www.bugsweeps.com 4979 From: Charles P Date: Fri Mar 8, 2002 9:35pm Subject: Re: Light-bulb carrier current This one is not exactly a "functioning" light bulb but it does have ir led's in it: http://www.gadgethome.com/cgi-local/SoftCart.exe/scstore/p-SVSB1.html?E+scst ore Charles charles@t... Global Communications Tarrytown, NY www.telephonesecurity.com ----- Original Message ----- From: To: "TSCM-Group" Sent: Friday, March 08, 2002 3:38 PM Subject: [TSCM-L] Light-bulb carrier current > Anyone know of an actual, non theoretical, functioning in the field > carrier current device contained in a working light bulb? Might save me > a trip if it's in the realm of Elvis sightings and bigfoot. Thanks for > any help! > > Martin Brown > Brown & Sikes, Inc. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4980 From: Paolo Sfriso Date: Sat Mar 9, 2002 7:13am Subject: Latest Purchase from Steve Uhrig Dear Colleagues. Having recently purchased a Riser Bond TDR from Steve Uhrig of SWSSEC I would like to publicly compliment Steve for his first class assistance. Not only did he supply a piece of equipment in excellent conditions at a very competitive price, but his pre-sale technical suggestions were absolutely priceless being aimed not at selling but at providing priceless suggestions on which model to purchase. Rest assured that for my future equipment purchases Steve will be the first port of call. Have a nice weekend. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 4981 From: James M. Atkinson Date: Sat Mar 9, 2002 9:16am Subject: Re: R.F. telephones The first rule of communications security is: "If it has an antenna it is not immune from eavesdropping". Instead of trying to find a "secure" cordless phone for your client, your efforts would best be spent educating the client as to why he should not be using a cordless phone if he is concerned about privacy. -jma At 7:06 AM -0800 3/9/02, Hawkspirit wrote: >During a sweep of a executives golf course home yesterday I had an >interesting experience with his R.F. telephone. The phone was a Panasonic >2.4 GHZ spread spectrum, model KX-T62570B. He happened to be on this phone >when I was sweeping with my spectrum analyzer. His conversation came in >through the AM slope demodulator in my analyzer. The really interesting >thing is that this guy does not own a hardwired telephone. Shows you how >convenience oriented we have become. Anyway, can anyone recommend a R.F. >phone that would have a frequency hopping format, more like cell phones? I >am trying to remember what the Seimens Gigasets format was. >For these clients who demand having the R.F. link convenience, what would >be the best, most difficult to scan and demodulate R.F. phone? >Thanks, >Roger Tolces >Electronic Security Co. >www.bugsweeps.com -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4982 From: Matthew Paulsen Date: Sat Mar 9, 2002 6:31pm Subject: RE: R.F. telephones Look at Panasonic's KX-TG4000B, KX-TG2000B These are 2.4ghz frequency hopping spread spectrum phones for 2 - 8 lines. You can get the 4000 for ~$200.00, and the 2000 for ~$170.00 with mfg rebates (expires this month) in the open market. MSRP is 600-700 on these devices so don't bother buying direct. Links: http://www.panasonic.com/consumer_electronics/multi_handset/multi_coupon.asp and http://www.panasonic.com/consumer_electronics/multi_handset/ and http://www.prodcat.panasonic.com/shop/NewDesign/ModelTemplate.asp?ModelId=13 137&show_all=false&product_exists=True&active=1&ModelNo=KX-TG4000B&CategoryI d=2502 -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Saturday, March 09, 2002 7:17 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] R.F. telephones The first rule of communications security is: "If it has an antenna it is not immune from eavesdropping". Instead of trying to find a "secure" cordless phone for your client, your efforts would best be spent educating the client as to why he should not be using a cordless phone if he is concerned about privacy. -jma At 7:06 AM -0800 3/9/02, Hawkspirit wrote: >During a sweep of a executives golf course home yesterday I had an >interesting experience with his R.F. telephone. The phone was a Panasonic >2.4 GHZ spread spectrum, model KX-T62570B. He happened to be on this phone >when I was sweeping with my spectrum analyzer. His conversation came in >through the AM slope demodulator in my analyzer. The really interesting >thing is that this guy does not own a hardwired telephone. Shows you how >convenience oriented we have become. Anyway, can anyone recommend a R.F. >phone that would have a frequency hopping format, more like cell phones? I >am trying to remember what the Seimens Gigasets format was. >For these clients who demand having the R.F. link convenience, what would >be the best, most difficult to scan and demodulate R.F. phone? >Thanks, >Roger Tolces >Electronic Security Co. >www.bugsweeps.com -- -------------------------------------------------------------------------- ------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------- ------------------------ James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com -------------------------------------------------------------------------- ------------------------ As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle ------------------------------------------------------------------------ -------------------------- Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] From: James M. Atkinson, Comm-Eng Date: Wed Mar 7, 2001 2:09pm Subject: Suspect may have undone top U.S. spy programs Suspect may have undone top U.S. spy programs http://inq.philly.com/content/inquirer/2001/03/07/front_page/SPY07.htm By Lenny Savino INQUIRER WASHINGTON BUREAU WASHINGTON - Robert Hanssen, the veteran FBI agent accused of spying, may have sold Russia some of America's most precious intelligence secrets, including information on how the United States tracks foreign submarines and sniffs out nuclear, chemical and biological weapons, intelligence experts said yesterday. The loss of such technical secrets could dwarf the damage from Hanssen's alleged disclosure of a secret tunnel under the Russian Embassy in Washington, demolishing a number of the nation's most important intelligence programs and wiping out more than a billion dollars in research and investment, they said. Hanssen was one of a handful of FBI counterintelligence experts whom the Pentagon and other agencies called upon to protect a wide range of exotic high-tech intelligence programs collectively called Measurement and Signature Intelligence, or MASINT, said a senior intelligence official who spoke on condition of anonymity. Hanssen also accessed CIA and Defense Department computer databases to collect highly classified information on MASINT programs, according to counterintelligence experts who asked not to be named. MASINT programs detect, find and track submarines, missiles and other weapons by analyzing the sounds they make, the heat they generate, the radiation they emit, the chemical traces they leave, or other physical evidence. Such programs have become increasingly important to the United States as other nations have learned how to combat more conventional forms of intelligence gathering, such as satellite photography and communications intercepts, said the senior intelligence official. They also have become critical to America's ability to monitor the proliferation of nuclear, chemical and biological weapons and keep track of mobile Russian nuclear missiles. "If Hanssen sold the Russians everything he knew about these programs, the damage would be devastating, among the worst we've ever seen," the official told the Inquirer Washington Bureau. "These things can be compromised in an instant. They only work as long as the other side doesn't know what we can do." Officials are still trying to assess how much damage Hanssen allegedly did, but his arrest affidavit charges that he passed on details of at least one "Top Secret SCI" (Sensitive Compartmented Information) MASINT program. SCI is a level of security clearance higher than Top Secret that restricts information to a small number of people cleared for a specific code word. The MASINT document Hanssen is accused of giving the Russians detailed recommendations for the CIA director on how MASINT information would be collected and used into the 21st century, according to the affidavit. The document was "highly specific and technical" and disclosed "the Intelligence Community's consensus on specific MASINT objectives and studies leading to needed capabilities," the affidavit said. FBI spokesman Bill Carter said he could not comment on what MASINT documents were passed or what threat they represent to national security. "We can't go beyond what's in the affidavit," Carter said. "Damage assessment is under way." Retired Air Force Gen. James Clapper, a former head of the Defense Intelligence Agency, which coordinates U.S. MASINT programs, said the technology is used for many purposes, including monitoring the size and characteristics of nuclear test blasts. "A lot of this is pretty exotic technology," Clapper said. "It's conceivable [the alleged Hanssen disclosures] could be quite egregious." "It's the Holy Grail of antisubmarine warfare," said Steven Aftergood, an intelligence analyst for the Federation of American Scientists, a Washington-based government watchdog group. "That would be something that a foreign intelligence service would be eager to get their hands on. Their interest would not so much be in duplicating it as much as discovering ways to evade our collection abilities." Hanssen, 56, was arrested Feb. 18 and charged with espionage and conspiracy to commit espionage for allegedly passing 6,000 pages of secret documents to the Russians. In exchange for spying over 15 years, court papers say, he received $1.4 million in cash, diamonds and deferred deposits in a Moscow bank. Robert D. Steele, the head of OSS.net, a Virginia-based counterintelligence consulting company, estimated the cost of MASINT technology development in the United States in the "low billions." Some MASINT technologies identify specific Russian nuclear subs by their engine and propeller sounds. Others detect chemical and biological weapons through traces of their components. The loss of MASINT information could eliminate U.S. nuclear submarines' ability to avoid detection, make it easier for Russian subs carrying missiles to hide off the U.S. coast, and help Russia conceal data on its missile and weapons tests, experts said. Based on MASINT intelligence taken from soil samples, the United States in 1998 fired 13 Tomahawk cruise missiles at a factory in Khartoum, Sudan, believed to contain the precursors of a chemical weapon, Aftergood said. U.S. intelligence officials said the factory was linked to suspected terrorist Osama bin Laden. A lawsuit by the plant's owner later raised questions about the accuracy of the information. MASINT technology arose in large part as a response to shortcomings in intelligence collection during the 1990-91 Persian Gulf war, according to Aviation Week and Space Technology magazine. =============== Lenny Savino's e-mail address is lsavino@k.... Warren P. Strobel of the Inquirer Washington Bureau contributed to this article. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2673 From: Paolo Sfriso Date: Wed Mar 7, 2001 0:41pm Subject: TCSM Instrument Airline Baggage Insurance Dear Collegues. Does anyone have suggestions on how to insure ones TSCM equipment that is checked in as airline luggage. Of course the few dollars per pound (or Euros per kilo) are ridiculously below the equipment's true value. Your Italian Connection Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 paulsfriso@t... www.grupposit.com [Non-text portions of this message have been removed] 2674 From: Paul Timmins Date: Wed Mar 7, 2001 2:13pm Subject: Re: Do We need Counter Intelligence Czar- Article by Robert G. Ferrell *clutches chest* ;-) On Wed, 7 Mar 2001, Mike F wrote: > "CONFIDENTIALITY WARNING" <==== BE AWARE > I AM AS SERIOUS AS A HEART ATTACK ABOUT THE WARNING BELOW!!!!!!!!!!!!!! By popular request my signature has moved to Paul Timmins paul@t... http://www.timmins.net/ "By definition, if you don't stand up for anything, you stand for nothing." ---Paul Timmins 2675 From: Marcelrf Date: Wed Mar 7, 2001 1:51pm Subject: Re: re: Accused FBI spy betrayed U.S. countermeasures I'm not sure if this has been posted yet, however if it has excuse me. Marcel ------------------------------------------------------------------------------------------------------------------------------- FULL INFO HERE: http://www.fas.org/irp/ops/ci/hanssen_affidavit.html IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division UNITED STATES OF AMERICA ) ) v. ) ) CRIMINAL NO. ROBERT PHILIP HANSSEN, ) a/k/a "B" ) a/k/a "Ramon Garcia" ) a/k/a "Jim Baker" ) a/k/a "G. Robertson" ) AFFIDAVIT IN SUPPORT OF CRIMINAL COMPLAINT, ARREST WARRANT AND SEARCH WARRANTS I, Stefan A. Pluta, being duly sworn, depose and state as follows: 1. I am presently employed as a Special Agent of the Federal Bureau of Investigation (FBI) and am assigned to the Washington Field Office in the District of Columbia. I have been employed as an FBI Special Agent for approximately 13 years. I have completed FBI training in foreign counterintelligence matters. As a result of my training and experience, I am familiar with the tactics, methods, and techniques of foreign intelligence services and their agents. 2. This affidavit is in support of applications for the following: A) A warrant for the arrest of ROBERT PHILIP HANSSEN (DOB 4/18/44) for violations of Title 18 United States Code, Sections 794 (a) (Transmitting National Defense Information) and 794 (c) (Conspiracy to Commit Espionage); and B) Search warrants for: 1) The residence of ROBERT PHILIP HANSSEN, such premises known and described as a single family residence located at: 9414 Talisman Drive Vienna, Virginia 22182 as more fully described in Attachment B, and which is within the Eastern District of Virginia; 2) One silver 1997 Ford Taurus, bearing VIN IFALP52U9VG211742 and Virginia license plate number ZCW9538, which is owned by ROBERT PHILIP HANSSEN and anticipated to be within the Eastern District of Virginia; 3) One 1993 Volkswagen van, bearing VIN WV2KC0706PH080424 and Virginia license plate number ZCW9537, which is owned by ROBERT PHILIP HANSSEN and anticipated to be within the Eastern District of Virginia; 4) One 1992 Isuzu Trooper, bearing VIN JACDH58W7N7903937 and Virginia license plate YRP3849, which is owned by ROBERT PHILIP HANSSEN and anticipated to be within the Eastern District of Virginia. 3. In my capacity as case agent assigned to this matter, I have examined documents and other records pertinent to this investigation from numerous sources. Searches and various forms of surveillance have also been conducted pursuant to the Foreign Intelligence Surveillance Act (FISA) and orders of the Foreign Intelligence Surveillance Court (FISC). "James M. Atkinson, Comm-Eng" wrote: > At 10:49 AM +0000 3/7/01, David Alexander wrote: > >The posting discusses an admission of using lasers to 'listen at windows': > > > >> Regarding the FBI-NSA listening tunnel, U.S. government officials said > >> that the NSA was using laser beams directed at glass surfaces of the > >embassy > >> compound such as windows to monitor conversations, these sources said. The > >> lasers are able to pick up the minute vibrations of window glass caused by > >> conversations, which can then be recorded. > >> > >> "The take we got wasn't all that great. The Russians aren't stupid," said > >> one official. > > > >If you read 'The Aquarium' by Victor Suvorov (pseudonym of a GRU defector) > >which came out at least 8 years ago, this was a known technique used by both > >sides. To counter it, randomly contoured glass was installed in sensitive > >locations, with a device attached to create vibrations to greatly reduce, if > >not counter completely, the capability of the laser to pick up sound. This > >was installed in embassies around the world by the Russians (and probably by > >everyone else too). > > > >The admission sounds like a very poor attempt at disinformation by the US > >govt. > > > > > >David Alexander M.INSTIS > >Bookham Technology plc > > > >DDI: 01235 837823 > >David.Alexander@B... > > Bouncing a laser or any kind of photonic energy against a reflective > or quais reflective service in an attempt to obtain intelligence > would be fool-hardy. Such activities are easy to detect, easy to > defeat, and easy to trace it back to the spy. > > It was a clever curiosity 20 years ago, but more recently is more of > a joke written about in spy novels. > > That said, passive laser bounce types of systems suffer from all > kinds of noise issues. > > Of course this does not include active photonic systems which tend to > be more covert and tend to be less detectable. > > -jma > > -- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 2676 From: James M. Atkinson, Comm-Eng Date: Wed Mar 7, 2001 3:26pm Subject: Counterintelligence Run Amok Wednesday, March 7, 2001 Counterintelligence Run Amok http://www.latimes.com/news/comment/20010307/t000020148.html By JAY TAYLOR Fear of foreign spies was already inordinately high in the United States when the sensational espionage charges against Robert Philip Hanssen hit the headlines. The media and the public, always starved for drama, have been captivated. The executive branch is planning tough-sounding remedies, including new super organizations. Existing counterintelligence bureaucracies have exploited the "crisis" to grow and expand. And counterspy measures, resources and personnel are already greater than they were during the height of the Cold War. President Bush is expected soon to approve establishment of a new counterintelligence policy board headed by a counterintelligence czar who will report to a new counterintelligence board of directors. This, despite the fact that there is no more KGB, no more Soviet Union. Judging by discussions in the media, the new so-called proactive measures being planned are those that monitor our own people and control sensitive documents. An example of one of these measures is the explosion in job opportunities for internal security agents in the State Department. If former Secretary of State Madeleine Albright's plan is carried out, State will hire 500 new security agents, bringing the total of such officers in the foreign service to 1,500. This compares with a total of only 2,500 foreign service officers who perform the department's core work of diplomacy--reporting, analysis, advocacy and negotiation on bilateral and international issues--including ambassadors, their deputies and other program direction officers. While security expands, some 700 other foreign service positions remain vacant because of lack of funding. Some of the work normally done by diplomats is now being performed by officers in our foreign missions from the CIA and the Pentagon, neither of which have a comparable budget problem. Yet the current danger we face from foreign espionage is a mere fraction of that posed from the 1930s to the fall of the Soviet Union in 1991. The mighty KGB's successor, the SVR, like the Soviet Navy and all the other wings of the old Communist regime's security establishment, is a shadow of its former self. For eight years, the SVR did not even contact Hanssen, one of the best-positioned moles in the United States the old KGB ever had. Except for Cuba, the SVR has lost all of the KGB's sister services, including the once extraordinarily effective East German Stasi. Moreover, since the emergence of Russia as a relatively open but very strained society, the ability of Western services to penetrate the SVR has geometrically increased. The double agent in the SVR who exposed the apparent double-crosser Hanssen apparently handed over the entire KGB file. The deeds of our counterspy turncoats resulted in the deaths of some of our Russian moles and are deserving of harsh punishment, but the consequences of their actions had no critical impact on vital U.S. interests. Notably, the FBI tunnel under the Russian Embassy in Washington reportedly revealed by Hanssen apparently produced no major intelligence. (Likewise the previous big American tunneling exercise, the famous 1950s CIA dig in Berlin, was a bust from the start. A Russian mole in London tipped off the KGB to the project before it even began.) To declare to the press, as some intelligence sources are doing, that Hanssen and Aldrich Ames brought about the "greatest losses in the history of American intelligence" is to focus on damage to the counterspy organizations themselves and not to basic national interests, as for example was the case in the theft of nuclear secrets or submarine codes. The massive spying and internal security apparatus of the KGB did not save the Soviet Union. Why now, when we face no such monolithic monster, do we need a counterintelligence czar, expanded polygraphs, more intrusive monitoring of personnel, a draconian "official secrets act" and many more internal security agents in the State Department and elsewhere? We won the hot and cold wars the old way, by maintaining a reasonable level of internal controls but concentrating on offense--penetration, mole implantation and communications intercepts. We need to safeguard counterintelligence and other sensitive information, but the possibilities and the consequences of both foreign espionage and counterspying should be kept in perspective. As George F. Kennan, architect of America's Cold War containment policy, once observed, counterintelligence takes on aspects that cause it to be viewed as a game, played in its own right. The fascination it exerts, he concluded, tends wholly to obscure, even for the general public, the original reasons for it. - - - Jay Taylor Was Deputy Assistant Secretary of State for Intelligence Coordination in the Reagan Administration -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2677 From: Date: Wed Mar 7, 2001 2:54pm Subject: CIA Turns to Data Mining CIA Turns to Data Mining By Tabassum Zakaria, Reuters Sunday, March 4, 2001; 8:26 AM The CIA, faced with a daily avalanche of information, is using new "data mining" technology to find useful nuggets within thousands of documents and broadcasts in different languages. The spy agency must sift through a barrage of information from both classified and unclassified sources in varied formats such as hard text, digital text, imagery, and audio in more than 35 languages. The Office of Advanced Information Technology (AIT), part of the CIA's Directorate of Science and Technology, is focused on finding solutions to the "volume challenge." "We're not growing at a fast rate, but the amount of information that comes into this place is growing by leaps and bounds," Larry Fairchild, AIT director, said in an interview this week in a basement demonstration room at Central Intelligence Agency headquarters. "How do we give folks technologies so that they are able to handle the big increase in information they're going to have to deal with on a day-to-day basis?" he said. One computer tool called "Oasis" can convert audio signals from television and radio broadcasts into text. It can distinguish accented English for greater accuracy in the transcription, whether the speaker is male or female, and whether one male or female voice is different from another of the same gender. At the left of the screen of a transcribed broadcast are labels "Male 1," "Female 1," "Male 2," next to sentences. If one voice is labeled with a name, the computer from then on will put that name on anything else with that same voice. So for example if a broadcast by Saudi-exile Osama bin Laden, whom the CIA considers a major threat to Americans, was transcribed and labeled, every time his voice was detected the computer would automatically label it. MACHINE TRANSLATOR If the machine translation appears off, the user can with a mouse click hear the actual broadcast. For example, the demonstration showed a transcription that read "latest danger from hell" but the audio said "latest danger from el nino." The computer cuts down on the time it would take a person to transcribe a half-hour broadcast to 10 minutes from up to 90 minutes, a CIA employee conducting the demonstration said. The CIA is planning to have Oasis developed for different languages such as Arabic and Chinese. It also finds similar meanings of words being searched, for example a broadcast might not mention "terrorism" but might say "car bombing," which the computer would tag as "terrorism" so that anyone searching for that category would find it. Currently the CIA's Foreign Broadcast Information Service is using it in one Asian city and intends to have it in other regions such as the Middle East this year. Another computer tool, "FLUENT," enables a user to conduct computer searches of documents that are in a language the user does not understand. The user can put English words into the search field, such as "nuclear weapons," and documents in languages such as Russian, Chinese and Arabic pop up. The system will then translate the document and if it is seen as useful, the analyst can send it to a human translator for more precision. Languages that FLUENT can translate into English include Chinese, Korean, Portuguese, Russian, Serbo-Croatian and Ukrainian. "Data mining" tools are used to extract key pieces of information from a variety of intelligence traffic such as on the flow of illegal drugs and also to keep track of illicit financial transactions. Tools were developed to help CIA analysts on Iraq, who were asked to analyze the agency's holdings on Iraqi war crime violations, about 1.2 million documents going back to 1979. The Text Data Mining tool extracted and indexed all words in the data so for example if an analyst was asked whether Iraq ever used anthrax as a weapon, the analyst could open the tool and find anthrax in the automatically generated index. That tool also counts the frequency of word use and can handle various spellings of the same Iraqi names or locations. There is also "gifting technology" which gives the flavor of the key information of a document in a short paragraph, Fairchild said. With the latest spy furor in the nation's capital, would any of the tools help catch a spy? "Yes, some of the things we're doing can," Fairchild said without details. "We're looking at better technologies to put in that area," he added. Another intelligence official, on condition of anonymity, said: "If they have this kind of technology to plumb the depths of open sources, you can imagine what kind of technologies they have to track down spies." 2678 From: Miguel Puchol Date: Wed Mar 7, 2001 5:05pm Subject: TCSM Instrument Airline Baggage Insurance Paul, There are insurance companies that have policies to cover electrical & electronic equipment for professional use. Rates vary according to value (obvious), wether the equipment stays at a fixed location, with alarm & other security measures, or wether it travels around alot. Also, rates go up if you want international coverage, and more so if it is also for damage, not just for total loss. We have our computer & electronic gear at the lab fully insured, and the field gear goes with an extension to the vehicles' insurance. Regarding international travel, we use couriers that accept insurance for specified amounts, and that includes damage & loss. Airlines are useless at dealing with claims on material (my own experience). Hope it helps, Mike -----Mensaje original----- De: Paolo Sfriso [mailto:paulsfriso@t...] Enviado el: miercoles, 07 de marzo de 2001 19:41 Para: TSCM-L@yahoogroups.com Asunto: [TSCM-L] TCSM Instrument Airline Baggage Insurance Importancia: Alta Dear Collegues. Does anyone have suggestions on how to insure ones TSCM equipment that is checked in as airline luggage. Of course the few dollars per pound (or Euros per kilo) are ridiculously below the equipment's true value. Your Italian Connection Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 paulsfriso@t... www.grupposit.com [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 2679 From: Bryan Herbert Date: Wed Mar 7, 2001 8:04pm Subject: Need help identifying signal Can anyone help identify these transmissions? The first file (single sweep) is receivable from 4.405-4.430MHZ USB, the second file (dual sweep) is receivable from 4.775-4.800MHz USB. The first half of the first file was recorded in AM mode and the second half as well as the entire second file was recorded in USB. -- Bryan Herbert KE6ZGP (661) 714-2611 AIM: EAVE5DR0P ICQ: 92114706 Yahoo: b_herbert_91321 http://www.geocities.com/b_herbert_91321/index.html 2680 From: Bryan Herbert Date: Wed Mar 7, 2001 8:15pm Subject: Correction! Need help identifying signal Here are the links to the audio files in question 4.405-4.430MHz USB http://www.geocities.com/b_herbert_91321/hf.wav 4.775-4.800MHz USB http://www.geocities.com/b_herbert_91321/hf2.wav BTW: These transmissions can at times also be heard on 6, 8, and 18MHz Bryan Herbert wrote: > > Can anyone help identify these transmissions? The first file (single > sweep) is receivable from 4.405-4.430MHZ USB, the second file (dual > sweep) is receivable from 4.775-4.800MHz USB. The first half of the > first file was recorded in AM mode and the second half as well as the > entire second file was recorded in USB. > > -- > Bryan Herbert KE6ZGP (661) 714-2611 > AIM: EAVE5DR0P ICQ: 92114706 Yahoo: b_herbert_91321 > > http://www.geocities.com/b_herbert_91321/index.html -- Bryan Herbert KE6ZGP (661) 714-2611 AIM: EAVE5DR0P ICQ: 92114706 Yahoo: b_herbert_91321 http://www.geocities.com/b_herbert_91321/index.html 2681 From: James M. Atkinson, Comm-Eng Date: Wed Mar 7, 2001 8:34pm Subject: Re: Correction! Need help identifying signal At 6:15 PM -0800 3/7/01, Bryan Herbert wrote: >Here are the links to the audio files in question >4.405-4.430MHz USB http://www.geocities.com/b_herbert_91321/hf.wav >4.775-4.800MHz USB http://www.geocities.com/b_herbert_91321/hf2.wav > >BTW: These transmissions can at times also be heard on 6, 8, and 18MHz > >Bryan Herbert wrote: >> >> Can anyone help identify these transmissions? The first file (single >> sweep) is receivable from 4.405-4.430MHZ USB, the second file (dual >> sweep) is receivable from 4.775-4.800MHz USB. The first half of the >> first file was recorded in AM mode and the second half as well as the >> entire second file was recorded in USB. >> >> -- >> Bryan Herbert KE6ZGP (661) 714-2611 >> AIM: EAVE5DR0P ICQ: 92114706 Yahoo: b_herbert_91321 >> >> http://www.geocities.com/b_herbert_91321/index.html > >-- >Bryan Herbert KE6ZGP (661) 714-2611 >AIM: EAVE5DR0P ICQ: 92114706 Yahoo: b_herbert_91321 OK, but where is the frequency and time domain measurements (ie: spectrum analyzer and oscilloscope output). Also, do you have a waterfall or rising raster of the signal yet? Since you are posting this to the TSCM-L list I would assume that you belive that it is an eavesdropping signal? -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2682 From: James M. Atkinson, Comm-Eng Date: Thu Mar 8, 2001 9:28am Subject: HEADLINES IN THE YEAR 2050 HEADLINES IN THE YEAR 2050 1. Florida to Be Readmitted to Union 2. Plague of Spotted Owls Threaten Crops, Livestock 3. Texas Executes Last Remaining Citizen 4. Cal Ripken Jr. Reduced to DH Role 5. Mother Monica Dies: Revered Hero of Bangkok Slums Overcame Lurid Past With US President 6. Wealthy Widow Anna Nicole Smith, 83, Weds Handsome Young Actor. "This Is True Love," He Beams. 7. Construction Begins On Grenada War Memorial In D.C. 8. Cody and Cassidy Gifford Elude Authorities. Drug-Crazed Crime Spree Continues 9. President "Bonecrusher" Jones to Face Chief Justice "Mad Dog" Ortega In Cage Match 10. Baltimore Rams Defeat St. Louis Ravens 11. Pope Phil II Settles Custody Battle With Ex-Wife 12. Upcoming NFL Draft Likely to Focus On Mutants 13. Younger Generation's Music Provokes Outrage of Elders 14. D.C. Zoo to Receive Rare Cow 15. Authentic Year 2000 Chad Sells For $6.9 Million at Sotheby's 16. Nursing Home Lawsuit Case: Clinton Denies Candy Striper's Allegations 17. Court Clears AOLTimeWarnerGE-DisneyCiscoFordRJR-NabiscoExxon-Mobil of Monopoly Charges 18. 50-Year Study: Diet and Exercise Key to Weight Loss 19. Baby Conceived Naturally 20. It Wasn't the Cigarettes - It Was the Ashtrays -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2683 From: James M. Atkinson, Comm-Eng Date: Thu Mar 8, 2001 10:06am Subject: PayPal Comments I recently had a discussion with another list member who was trying to set up a PayPal account but was having problems finding the appropriate link to do so. So anyway, here is the sign up link for PayPal. https://secure.paypal.com/affil/pal=jmatk%40tscm.com I don't really like PayPal, but it is handy when someone wants to pay for something "RIGHT NOW", or in cases where you have a lot of small orders to collect funds for and don't want to fiddle around waiting for checks to clear. If you do go with PayPal I would STRONGLY suggest that you pull the funds out of your on-line PayPal account, and into your bank as soon as the funds come in for you (PayPal is a clearing service, not a bank). I have actually found PayPal to be helpful (even though I don't like it) when someone wants some consultation over the phone (where you get paid first), and really helpful when a customer wants something shipped ASAP but can't get funds to you via a Fedex'ed company check. If your interested you can actually purchase a CPM-700, OSCOR, ORION, or other TSCM gear from us via PayPal (ie: you can use your credit card or write an e-check). -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2684 From: Robert G. Ferrell Date: Thu Mar 8, 2001 11:15am Subject: Re: PayPal Comments >If you do go with PayPal I would STRONGLY suggest that you pull the >funds out of your on-line PayPal account, and into your bank as soon >as the funds come in for you (PayPal is a clearing service, not a >bank). A word of warning: I've had extensive dealings with PayPal over the past year, and they have a tendency to be very slow about paying up, at least in my experience (maybe they just don't like my after shave). As always, ymmv. Caveat Emptor. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2685 From: A Grudko Date: Thu Mar 8, 2001 6:49am Subject: Re: re: Threat in the Hand of Your Pa ----- Original Message ----- From: David Alexander > In other words, 'we promoted this product as having password protection, and > if you believed us you were stupid.' Anyone ever lost a password on a PC, application or cellphone? You just 'phone up those nice people at the SP's helpline and, subject to some conditions, they talk you through cracking it or eMail it to you. It's the 'kid locked in the vault' syndrome. No matter how good the vault, the manufacturers have to know how to get in. Luckilly we all know that those nice people at the help lines are beyond corruption.......don't we? Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2686 From: A Grudko Date: Thu Mar 8, 2001 6:53am Subject: Re: re: Accused FBI spy betrayed U.S. countermeasures ----- Original Message ----- > To counter it, randomly contoured glass was installed in sensitive > locations, with a device attached to create vibrations to greatly reduce, if > not counter completely, the capability of the laser to pick up sound. We've not tried the glass but have done the White Noise Transducer trick for clients and it works very well against Cony contact mikes - unfortunatly I don't have a Lazer Pick Off Device to test the efficiency against that threat, but if anything I'd expect direct contact to be more sensitive. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2687 From: A Grudko Date: Thu Mar 8, 2001 1:27pm Subject: Re: Need help identifying signal ----- Original Message ----- > >4.405-4.430MHz USB http://www.geocities.com/b_herbert_91321/hf.wav > >4.775-4.800MHz USB http://www.geocities.com/b_herbert_91321/hf2.wav IMHO Lots of weird sounding stuff on LW/MW/HF, any of which could be some kind of bug but 99.9999999% probably isn't. Businesses and governments have devised millions of signals that might mean nothing to anyone but one other person on the planet - even a dead person....see the 2000 version of the movie 'On the Beach'. I approached our US Embassy ham in the early 80's about obvious 5 letter code groups being sent on HF. OK guys these were my early days in the business - gimme a break. He smiled understandingly and I ignored them. Both signals sound (by ear only) too analogue (i.e. you can descern the AF frequency changes) to be digital and too constant to be any exotic type of analogue modulation. I'd rate it really low as a TSCM source but I could be wrong and if in doubt I'd, attenuate and look for a local source. No local source to the area under inspection, no threat. Here on the other side of the planet 4.4 - 4.43 megs, no signal noticable (21h00 local for you skip experts) 4.777 to 4.8 nothing except a strong AM modern music + hourly news channel from Lesotho - Africa - (with Coke ads!) on exactly 4.800. If I was a bugger I'd move up a few hundred Megs - excepting mains inducted audio. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2688 From: Jay Coote Date: Thu Mar 8, 2001 2:48pm Subject: Re: TCSM Instrument Airline Baggage Insurance I wonder if it might be better to have the equipment shipped separately to a "safe" recipient prior to the assignment? Fewer problems with customs and minimum-wage security persons in your equipment. A friend told me about his airport experience (LAX) when a person "with attitude" opened his case upside-down allowing a TSCM receiver to fall out (about a 1-meter drop). Jay Coote Los Angeles ---------- Dear Collegues. Does anyone have suggestions on how to insure ones TSCM equipment that is checked in as airline luggage. Of course the few dollars per pound (or Euros per kilo) are ridiculously below the equipment's true value. Your Italian Connection Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 paulsfriso@t... www.grupposit.com [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 2689 From: Miguel Puchol Date: Thu Mar 8, 2001 6:14pm Subject: RE: TCSM Instrument Airline Baggage Insurance Jay, > A friend told me about his airport experience (LAX) when a > person "with attitude" opened his case upside-down allowing > a TSCM receiver to fall out (about a 1-meter drop). Ahh, that ol' sinking feeling!! This is where Pelican cases come in handy, strong to handle your average airport baggage handler, and with locking holes, just in case. I recommend these cases for lugging fragile stuff around airports. Cheers, Mike 2690 From: James M. Atkinson, Comm-Eng Date: Fri Mar 9, 2001 1:43am Subject: Bootleg now banned from this news group I regret to inform this list that effective 2:20 AM on 3/9/01 Mike Keketic (AKA: bootleg@p... ) is now banned from this news group. As the list moderator I felt that he was posting ads for items which not at all appropriate, and felt that he was insinuating they could be used for inappropriate purposes (which I will not tolerate). Also, after reviewing his previous posts to the list I felt that the was being disruptive and that there were obviously some issues he was exploring that were not in line with the stated goals of this list. He has since attempted several times to post a long raving diatribe laced with direct and indirect threats and as a result I have no choice except to ban him from the list.. I apologize to the list membership for any problems or annoyance this may have caused, but it should now be resolved. Case closed, -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2691 From: Robert G. Ferrell Date: Fri Mar 9, 2001 8:22am Subject: ATM exploits Greetings all, Here's an interesting description of an exploit for ATMs that seemed to me to have some bearing on TSCM, inasmuch as it involves an interception (man-in-the-middle attack) of electronic communications. The little anecdote at the end is amusing, as well. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== =============================================== Posted to the VULN-DEV list at Security Focus by Jerry Carrell The ATM network I worked for did suffer significant losses to wire-taps. The thief would select an ATM in a strip mall because the telephone junction box was usually unprotected on the back of the building near a telephone pole with a tell-tale large metal conduit. The thief (we believe) would back a van to the junction box. Using a device from Radio Shack he could easily identify the digital signals of the data line. He used one or two PCs in the back of the van to (a) respond to the polls from the host so the network did not sense a problem (except possibly a brief interruption when he switched to the PC) and (b) talk to the ATM. The PC program that serviced the ATM was sophisticated in some ways ... for example, it changed the "welcome" screen to "out of service" so customers would not attempt to use the ATM. However, it didn't handle error conditions which prevented him from cleaning out an ATM in several cases. There were many other changes to the ATM configuration but basically, he requested a withdrawal and the PC approved the transaction. The total loss was never announced but I'm sure it was well over $100,000 because a couple of dozen ATMs were hit. The investigation was turned over to the Secret Service. So far as I know, no one was charged but one rumor around the office was they knew who did it but had no proof. That network installed MAC boards in all their ATMs and is no longer vulnerable to that form of attack. That was about ten years ago and I don't know what security features are used in current ATMs. I still see some ATMs from that era in use and some of them may be vulnerable. This is off-topic but my favorite "security" story from the banking industry is low tech: The thief got a rent-a-cop uniform and a wicker basket. He painted a sign that said "Out of service. Please use basket". After hours he went to the night depository at a bank, set the basket on the floor, taped the sign to the wall and stood there looking official. Supposedly, many people left their deposits and no one called the police. Told to me by a tech from the company that makes most night depositories (and ATMs, for that matter). If its true, the thief deserves the money for sheer chutzpah. :=) =============================================== [Non-text portions of this message have been removed] 2692 From: James M. Atkinson, Comm-Eng Date: Fri Mar 9, 2001 8:27am Subject: Walking on Water A pastor and two of his deacons are out on the river fishing in their rowboat. Twelve o'clock rolls around, and one of the deacons notices a nice spot on the bank to have lunch. He turns to the others and says, "That looks like a nice spot for lunch. What do you say we have lunch over there?" The other deacon agrees, and so does the pastor. The deacon stands up in the boat, steps out onto the river and walks over to the bank. The pastor looks on with amazement, and thinks to himself, if his deacon is holy enough to walk on water, surely he can. The other deacon stands up, picks up the picnic basket, steps out of the boat, and walks over to the bank and sits with the first deacon. Again, the pastor thinks, if his second deacon is holy enough to walk on water, surely he can. The pastor stands up, steps out of the boat, and falls right into the water. While he's splashing around the first deacon turns to the second and says, "Think we should have told him where the tree stumps are?" -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2693 From: James M. Atkinson, Comm-Eng Date: Fri Mar 9, 2001 8:28am Subject: The Mime The Mime While attempting to earn some money as a street performer at the zoo, an out-of-work mime got an offer from the zookeeper. The zoo's most popular attraction, the gorilla, had suddenly died and the zookeeper wanted the mime to dress up like a gorilla to keep attendance up until another gorilla was found. The mime accepted the offer. The next morning, he suited up and entered the gorilla cage before the crowds arrived. He had a great time sleeping, playing, swinging on tires, and making fun of people, but eventually the crowds were tiring of his antics and started paying more attention to the lion in the next cage. The mime wanted the attention by this point, so he climbed to the top of his cage, crawled across a partition and dangled from the top of the lion's cage. The visitors loved it. At the end of the day, the zookeeper gave him a raise for keeping the crowds so entertained. This continued for several days, with the crowds growing larger all the time. But one day, the mime slipped and fell into the lion's cage. The lion prepared to pounce on the terrified man. The mime ran around the cage, yelling and screaming for help, but the lion was quick and pinned him to the ground. He looked up at the lion with fear showing through his gorilla mask, when the lion growled and said, "Shut up you idiot! Do you want to get us both fired?" -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2694 From: Doug Ellsworth Date: Fri Mar 9, 2001 10:40am Subject: Keyboard Signaling Hi Group, Some questions of curiosity interest: Many of us are visually inspecting computer keyboards and connections inside CPU cases. Just how is standard input conveyed along a keyboard cable? What type of signaling? Is there a unique standard for each of the various hardware platforms? I hope this is of enough interest to the list to generate a spirited discussion... or maybe I'm the only one interested? Happy days, Doug Douglas Ellsworth Secure Communications Corp., Inc. Automated Audit Management for Commerce from PRC, Inc. do5ug@r... 11th & Jones Street PO Box 3622 Omaha, Nebraska 68103 402.578.7709 [Non-text portions of this message have been removed] 2695 From: Steve Uhrig Date: Fri Mar 9, 2001 1:13pm Subject: Re: Keyboard Signaling > Many of us are visually inspecting computer keyboards and > connections inside CPU cases. Just how is standard input > conveyed along a keyboard cable? What type of signaling? Is > there a unique standard for each of the various hardware > platforms? In a general sense, the keyboard generates the data and sends it to the CPU. The data virtually always is pure ASC. Older IBM mainframes used a code called EBCDIC which is probably obsolete now. There is a character generator ROM (Read Only Memory) in the keyboard. This memory has the different characters stored in different locations in a memory chip. The ROM anymore probably is part of the CPU chip inside the keyboard controlling keyboard operations. The keyboard is a matrix, like a big Tic Tac Toe board. When you press a certain key, that closes a switch for a row and a column. The intersection of a row location and a column location is unique to each key. That matrix location is mapped to a particular unique memory address in the character generator ROM. The character (number, letter, punctuation mark etc.) stored in that location is then transmitted to the CPU. The matrix actually is scanned at a relatively fast speed. When you press a key on the keyboard, you in reality are holding it for a finite period of time until the scanner happens to interrogate that particular address in the matrix to see if there is a key press signal. If so, it creates an interrupt to the CPU in the keyboard and grabs and transmits the character to the system CPU as described. When you hold a key down, you trip another timing circuit to repeat the keypress. xxxxxxxxxxxxxxxxxx. Both the matrix scan rate and the repeat rate used to be simple RC timing circuits. Anymore they may be digitally derived. Once some years ago when I was building a keyboard, I got the capacitors mixed up between the scan and the repeat circuitry. The keyboard was being scanned only a few times a second, and the repeat rate was like 10 kilocycles. Not cool. Modern keyboards have their own processor, clock, crystal, etc. Data from the keyboard to the system CPU is sent serially over the single wire (you type one letter at a time, so you generate serial data which is sent a character at a time to the computer). Other lines in the cable are data back from the system to the keyboard for the different lights on the keyboard and power for everything. Hope this helps some. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2696 From: Mike F Date: Fri Mar 9, 2001 3:03pm Subject: more from scout report Spam Mimic http://www.spammimic.com/ Here is a neat tool for the paranoid or clandestine-minded user. While there are several quality encryption tools available, encrypted email is easily recognized as such. This tool encodes your message as innocent-appearing spam, which many believe the government-run Echelon and Carnivore email reading systems ignore. At present, the site is more of a diversion than an every day tool, as users can only encode and decode short messages through the interface at the site. Still, it's pretty nifty, and a plug-in may be developed in the future. [MD] Later 4,Mike Fiorentino Master Links 4 Master Investigators http://ml4mi.com "CONFIDENTIALITY WARNING" <==== BE AWARE I AM AS SERIOUS AS A HEART ATTACK ABOUT THE WARNING BELOW!!!!!!!!!!!!!! This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by theindividual(s)or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of thismessage/information is prohibited. If you are not the indicated recipientor havereceived this message in error contact our offices immediately for instructions." 2697 From: James M. Atkinson, Comm-Eng Date: Fri Mar 9, 2001 6:30pm Subject: The News with Brian Williams For what it is worth I am scheduled to be on MSNBC this evening at 9 PM (EST) talking with Pat Dawson on "The News with Brian Williams". The chat may get bumped at the last minute so I apologize in advance if it gets dropped. Nothing major, just some background on an analysis project I performed. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2698 From: Al Arango Date: Thu Mar 8, 2001 6:33pm Subject: Large Criminal Hacker Attack on Windows NT E-Banking and E-Commerce Sites I thought this might be interesting for the group >Large Criminal Hacker Attack on Windows NT E-Banking and E-Commerce Sites > >3:00 PM EST, Thursday, March 8, 2001 > >In the largest criminal Internet attack to date, a group of Eastern >European hackers has spent a year systematically exploiting known >Windows NT vulnerabilities to steal customer data. More than a million >credit cards have been taken and more than 40 sites have been >victimized. > >The FBI and Secret Service are taking the unprecedented step of >releasing detailed forensic information from ongoing investigations >because of the importance of the attacks. > >The information was released to the SANS community a short time before >it was made available to the general public so that you can be sure your >systems are safe. > >Within a day or two, the Center for Internet Security will release a >small tool that you can use to check your systems for the >vulnerabilities and also to look for files the FBI has found present on >many compromised systems - indicating your system may have already been >compromised by the attacker group. > >The Center's tools are normally available only to members, but because >of the importance of this problem, the Center agreed to make the new >tool, built for the Center by Steve Gibson of Gibson Research) available >to all who need it. Center members have already received an invitation >to the conference call this afternoon to get more data on the attack. >If your organization is not a member, we encourage you to join in this >important initiative to fight back against computer crime. See >www.cisecurity.org for a list of members and how to join. > > >Alan >Alan Paller >Director of Research >The SANS Institute > > >Here's the data available so far. > >Over the past several months, the National Infrastructure Protection >Center (NIPC) has been coordinating investigations into a series of >organized hacker activities specifically targeting U.S. computer systems >associated with e-commerce or e- banking. Despite previous advisories, >many computer owners have not patched their systems, allowing these >kinds of attacks to continue, and prompting this updated release of >information. > >More than 40 victims located in 20 states have been identified and >notified in ongoing investigations in 14 Federal Bureau of Investigation >Field Offices and 7 United States Secret Service Field Offices. These >investigations have been closely coordinated with foreign law >enforcement authorities, and the private sector. Specially trained >prosecutors in the Computer and Telecommunication Coordinator program >in U.S. Attorneys' Offices in a variety of districts have participated >in the investigation, with the assistance of attorneys in the Computer >Crime and Intellectual Property Section at the Department of Justice. > >The investigations have disclosed several organized hacker groups from >Eastern Europe, specifically Russia and the Ukraine, that have >penetrated U.S. e-commerce computer systems by exploiting >vulnerabilities in unpatched Microsoft Windows NT operating systems. >These vulnerabilities were originally reported and addressed in >Microsoft Security Bulletins MS98-004 (re-released in MS99-025), >MS00-014, and MS00-008. As early as 1998, Microsoft discovered these >vulnerabilities and developed and publicized patches to fix them. >Computer users can download these patches from Microsoft for free. > >Once the hackers gain access, they download proprietary information, >customer databases, and credit card information. The hackers >subsequently contact the victim company through facsimile, email, or >telephone. After notifying the company of the intrusion and theft of >information, the hackers make a veiled extortion threat by offering >Internet security services to patch the system against other hackers. >They tell the victim that without their services, they cannot guarantee >that other hackers will not access the network and post the credit card >information and details about the compromise on the Internet. If the >victim company is not cooperative in making payments or hiring the group >for their security services, the hackers' correspondence with the victim >company has become more threatening. Investigators also believe that >in some instances the credit card information is being sold to organized >crime groups. There has been evidence that the stolen information is >at risk whether or not the victim cooperates with the demands of the >intruders. To date, more than one million credit card numbers have been >stolen. > >The NIPC has issued an updated Advisory 01-003 at www.nipc.gov regarding >these vulnerabilities being exploited. The update includes specific >file names that may indicate whether a system has been compromised. If >these files are located on your computer system, the NIPC Watch in >Washington D.C. should be contacted at (202) 323-3204/3205/3206. >Incidents may also be reported online at www.nipc.gov/incident/cirr.htm. >For detailed information on the vulnerabilities that are being >exploited, please refer to the NIPC Advisory 00-60, and NIPC Advisory >01- 003. > > >NIPC ADVISORY 01-003 > >This advisory is an update to the NIPC Advisory 00-060, "E- Commerce >Vulnerabilities", dated December 1, 2000. Since the advisory was >published, the FBI has continued to observe hacker activity targeting >victims associated with e-commerce or e- finance/banking businesses. >In many cases, the hacker activity had been ongoing for several months >before the victim became aware of the intrusion. The NIPC emphasizes >the recommendation that all computer network systems administrators >check relevant systems and consider applying the updated patches as >necessary, especially for systems related to e-commerce or e- >banking/financial businesses. The patches are available on Microsoft=s >web site, and users should refer to the URLs listed below. > >The following vulnerabilities have been previously reported: > >Unauthorized Access to IIS Servers through Open Database >Connectivity (ODBC) Data Access with Remote Data Service (RDS): >Systems Affected: Windows NT running IIS with RDS enabled. >Details: Microsoft Security Bulletin MS99-025, NIPC CyberNotes >99-22 > >http://www.microsoft.com/technet/security/bulletin/ms99-025.asp >http://www.nipc.gov/warnings/advisories/1999/99-027.htm, >http://www.nipc.gov/cybernotes/cybernotes.htm > >Summary: Allows unauthorized users to execute shell commands on the >IIS system as a privileged use; Allows unauthorized access to secured, >non-published files on the IIS system; On a multi-homed >Internet-connected IIS systems, using Microsoft Data Access Components >(MDAC), allows unauthorized users to tunnel Structured Query Language >(SQL) and other ODBC data requests through the public connection to a >private back-end network. > >SQL Query Abuse Vulnerability >Affected Software Versions: Microsoft SQL Server Version 7.0 and >Microsoft Data Engine (MSDE) 1.0 >Details: Microsoft Security Bulletin MS00-14, NIPC CyberNotes >20-05 > >http://www.microsoft.com/technet/security/bulletin/ms00-014.asp >http://www.nipc.gov/cybernotes/cybernotes.htm > >Summary: The vulnerability could allow the remote author of a malicious >SQL query to take unauthorized actions on a SQL Server or MSDE database. > >Registry Permissions Vulnerability >Systems Affected: Windows NT 4.0 Workstation, Windows NT 4.0 Server >Details: Microsoft Security Bulletin MS00-008, NIPC CyberNotes >20-08 and 20-22 > > >http://www.microsoft.com/technet/security/bulletin/ms00-008.asp >http://www.nipc.gov/cybernotes/cybernotes.htm >Summary: Users can modify certain registry keys such that: >a malicious user could specify code to launch at system crash >a malicious user could specify code to launch at next login >an unprivileged user could disable security measures > >Web Server File Request Parsing > >While they have not been shown to be a vector for the current attacks, >Microsoft has advised us that the vulnerabilities addressed by Microsoft >bulletin MS00-086 are very serious, and we encourage web site operators >to consider applying the patch provided with this bulletin as well as >the three that are under active exploitation. > >http://www.microsoft.com/technet/security/bulletin/ms00-014.asp >http://www.nipc.gov/cybernotes/cybernotes.htm > >Summary: The vulnerability could allow a malicious user to run >system commands on a web server. > >New Information: In addition to the above exploits, several filenames >have been identified in connection with the intrusions, specific to >Microsoft Windows NT systems. The presence of any of these files on >your system should be reviewed carefully because they may indicate that >your system has been compromised: >ntalert.exe >sysloged.exe >tapi.exe >20.exe >21.exe >25.exe >80.exe >139.exe >1433.exe >1520.exe >26405.exe >i.exe > >In addition, system administrators may want to check for the >unauthorized presence of any of the following executable files, which >are often used as hacking tools: >lomscan.exe >mslom.exe >lsaprivs.exe >pwdump.exe >serv.exe >smmsniff.exe > >Recipients of this Advisory are encouraged to report computer crime to >the NIPC Watch at (202) 323-3204/3205/3206. Incidents may also be >reported online at www.nipc.gov/incident/cirr.htm. 2699 From: Craig Snedden Date: Fri Mar 9, 2001 3:07am Subject: Re: Bootleg now banned from this news group I've personally no strong feelings re "Bootleg", but it's somewhat comforting to be in a group that has a moderator that actually moderates. Too many groups have degenerated into "spam" targets, with the "participants" abusing each other with no brain one liners. Well done. ----- Original Message ----- From: "James M. Atkinson, Comm-Eng" To: "TSCM-L Mailing List" Sent: Friday, March 09, 2001 7:43 AM Subject: [TSCM-L] Bootleg now banned from this news group > > I regret to inform this list that effective 2:20 AM on 3/9/01 Mike > Keketic (AKA: bootleg@p... ) is now banned from this news > group. > > As the list moderator I felt that he was posting ads for items which > not at all appropriate, and felt that he was insinuating they could > be used for inappropriate purposes (which I will not tolerate). > Also, after reviewing his previous posts to the list I felt that the > was being disruptive and that there were obviously some issues he was > exploring that were not in line with the stated goals of this list. > > He has since attempted several times to post a long raving diatribe > laced with direct and indirect threats and as a result I have no > choice except to ban him from the list.. > > I apologize to the list membership for any problems or annoyance this > may have caused, but it should now be resolved. > > Case closed, > > -jma > -- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 2700 From: Steve Uhrig Date: Fri Mar 9, 2001 8:46pm Subject: Pictures of moderator For those who caught the piece on MSNBC, or for those who didn't, I have pictures of Jim Atkinson for sale. Email for info. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2701 From: James M. Atkinson, Comm-Eng Date: Fri Mar 9, 2001 9:02pm Subject: Re: Pictures of moderator At 9:46 PM -0500 3/9/01, Steve Uhrig wrote: >For those who caught the piece on MSNBC, or for those who >didn't, I have pictures of Jim Atkinson for sale. > >Email for info. > >Steve Nude pictures? Bastards we are, -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From: A Grudko Date: Fri Mar 9, 2001 3:14pm Subject: Mains audio Sorry guys, this is a long one - you might want to scroll to the end to see if the premise and request are of interest. During a sweep today my CPM-700 demodulated a very feint audio signal - just above the noise floor - when plugged into either of two adjacent wall sockets (nominal 220v, 50 Hz give or take 10%) in a corporate Board Room. Adjacent sockets are supposed to be on different phases because of load sharing but are frequently not, because of lazy electricians. These are in parallel. At first it sounded like a woman speaking to a man - unfortunately not in a language I understood (we have 11 official languages in SA). The woman was slightly more audible because of frequency not amplitude. I called the client to listen in case the voices could be identified, but the signal was too weak for identification by an untuned ear. It's possible that the voices were followed by music, implying a commercial station, but not clear enough to confirm. Situation is: Client's premises have been swept almost every month for the past 3 - 4 years. The same CPM-700 was used at each sweep. These sockets were tested on every occasion with no signal being detected. Client insists that no changes were made to power cabling in the Board Room since the last sweep but cannot be sure of other parts of the building. Requested changes had been made to the 'phone system, so Telco technicians have been on the premises. The client rents the whole building, which is fed from a 3 phase power distribution board in the basement, which was searched and found to be uncompromised with no detectable hostile audio or RF present (some modulation is expected for non-hostile control functions and occasional communication). All other locatable power sockets in the building was checked and found clean. The 3 phase transformer feeding the street block could not be checked. No cordless 'phone, wireless LAN, mains-modulation intercom/speaker or similar equipment is used in the building, but we cannot speak for the neighbours. 3 voice lines are actually permanent GSM cellular links. No equipment was plugged into the 2 sockets but a full search of equipment on the phase was impractical (we would have had to shut down the office for 2 days - if client OKs we'll go back and 'plug and play' every electrical item whilst monitoring the 2 sockets. Both sockets were opened and no foreign devices or curled wires were found (coiling wire to give 'stretch' like a 'phone cord can easily and unintentionally create a crude LC tuned circuit). A second scan was carried out with a Scanlock and Audiotronics (UK) LF converter with the antenna parallel to the conduiting at surface level, so about 3" (75mm) from the cable. No signal was heard*. General RF level is medium for a suburban business park but with constant growth in 900 Meg GSM cellular use to the point of RF flooding. The client is involved in major mergers and acquisitions, inevitably with political implications. This client has been illegally 'phone tapped on 3 known previous occasions (spies caught, equipment confiscated and their client identified). Security in the building is minimal, with access to the power and telco rooms guarded by 2 lever locks. Manual 'honour system' access control, no CCTV, limited alarm coverage (one floor of 4.....cutting costs!). So, to the point of my long post: For the past 3 years my long suffering partner has been receiving 'skills transfer' (Yes - I want him to eventually do all the work and send me money for the privilege as I get fat and old... ;-) ). This 'find' is another chance to give him a few other peoples' opinions on a common enigma that faces TSCMers. To plagiarise the Chrysler ad. (I think it's OK 'cos my wife drives one).....'WHAT THE ?'. My thoughts: 1) Something added to the mains circuit may have 'tuned' it to a radio station (usually AM, medium wave, minus many db slope detection on the CPM-700?). 2) Something added to the RF environment may have mixed to produce a harmonic which the old circuit now 'receives'. 3) * From above. I feel the signal containing audio was received rather than transmitted, therefore is non-hostile. Am I right - am I wrong - have we missed something - is there something else we should do? (short of demolishing the building; which is outside our budget by about 2 000%, like a government project.). Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2703 From: Miguel Puchol Date: Sat Mar 10, 2001 6:04am Subject: RE: Mains audio Andy, Have you checked the local radio stations & TV repeaters? We had a case here, where a local radio station raised it's TX power without permission, and this caused major havoc at a nearby trunked repeater station, noise, interference, etc. The cause was traced back to the station, heavy fine, all back to normal. Maybe a new station has been setup, legal or pirate, or a TV repeater added around the client's building - just a thought. Good luck, Mike > -----Mensaje original----- > De: A Grudko [mailto:agrudko@i...] > Enviado el: viernes, 09 de marzo de 2001 22:14 > Para: TSCM-L Mailing List ' > CC: Dave Wilson > Asunto: [TSCM-L] Mains audio > > > Sorry guys, this is a long one - you might want to scroll to the > end to see > if the premise and request are of interest. > > > During a sweep today my CPM-700 demodulated a very feint audio > signal - just > above the noise floor - when plugged into either of two adjacent wall > sockets (nominal 220v, 50 Hz give or take 10%) in a corporate Board Room. > Adjacent sockets are supposed to be on different phases because of load > sharing but are frequently not, because of lazy electricians. These are in > parallel. 2704 From: Charles P Date: Sat Mar 10, 2001 11:23am Subject: Re: Mains audio > > 1) Something added to the mains circuit may have 'tuned' it to a radio > station (usually AM, medium wave, minus many db slope detection on the > CPM-700?). > 2) Something added to the RF environment may have mixed to produce a > harmonic which the old circuit now 'receives'. > 3) * From above. I feel the signal containing audio was received rather than > transmitted, therefore is non-hostile. > > Am I right - am I wrong - have we missed something - is there something else > we should do? (short of demolishing the building; which is outside our > budget by about 2 000%, like a government project.). > > I would most likely suspect a combination of number 1 and 2, since there are so many uncontrollable factors with radio or shortwave stations, propagation, power feed lines, etc. It would be fun to watch them demolish the building though. charles 2705 From: Date: Sat Mar 10, 2001 11:58am Subject: ZDNet UK News: Surveillance HAVE A GREAT DAY !!! ---------- http://www.zdnet.co.uk/news/specials/1999/09/surveillance/ [Non-text portions of this message have been removed] 2706 From: James M. Atkinson, Comm-Eng Date: Sat Mar 10, 2001 0:36pm Subject: Temptation for Surveillance on Rise Temptation for Surveillance on Rise http://www.latimes.com/business/cutting/techwr/20010310/tCB00V0795.html By ANICK JESDANUN, AP Internet Writer CAMBRIDGE, Mass.--What if your cable TV converter box can report to marketers the movies, sports and steamy adult shows you like to watch? What if a portable device that measures how far you've run or walked can phone a Web site about your fitness level, and perhaps suggest exercise products for purchase? What if any time you visit an airport or attend a sporting event, you must walk past video cameras that can analyze your face and instantly identify you to authorities? Some of these scenarios are already possible and even happening. Privacy advocates and civil libertarians say the technology is getting so good and cheap that we could be entering an era of surveillance everywhere, privacy nowhere. Privacy erosion on the Internet over the past year offers just a preview. As gadgets beyond the desktop become a part of our everyday lives, the temptation increases for governments and businesses to use them for surveillance. "'1984' was simply a bit premature in estimating when technology would be online," said Barry Steinhardt, associate director of the American Civil Liberties Union. "This may not be as oppressive as what George Orwell had in mind, but nevertheless, it will be very much still a surveillance society." Orwell wrote, back in 1940s, of a futuristic totalitarian society in 1984 where citizens are under the round-the-clock surveillance. Big Brother technology was a main topic this past week at the 11th annual Computers, Freedom and Privacy conference, a gathering of academics, technologists and policymakers. As it happened, this year's conference was held just a few blocks from the Massachusetts Institute of Technology, where the basics of facial character recognition, a branch of biometrics, were developed. Unlike the video security cameras at banks and convenience stores that merely record, biometrics seek to identify. The technology has been used for years in casinos to catch cheaters. It got widespread attention during January's Super Bowl in Tampa, Fla., when law officers matched photos against a computerized police lineup of known criminals. Governments aren't the only spies, of course. Other gadgets spy on behalf of marketers, warned Richard M. Smith, chief technology officer for the Privacy Foundation. "Technology is making it a lot cheaper to build these devices," Smith said. "Five, 10 years from now, where is it going to be used?" He held up for an audience a round, portable gadget that counts your paces as you exercise. When you finish, you attach it to a larger cradle, which plugs into a phone line. You then visit a Web site for your fitness assessment and ads. The gadget, he said, could have been designed to plug directly into a personal computer -and not to report data to a Web site. But the trend among vendors "is to try to get it on the Internet and get a poke at it." And what about the emerging Bluetooth wireless standard, which promises to let devices such as pens and headphones automatically connect to networks? "Are we going to walk into a room and have our pens start talking to somebody?" Smith asked. Smith also showed Web sites that promote services such as a wireless Webcam to monitor children, and a camera that trucking companies can install to record the minutes leading up to accidents, along with data such as brake and turn signal use. He predicted lawyers would try to get such video to show juries. Even the fitness device can be used for surveillance, said Smith. His daughter suggested their dog be outfitted with one so Smith can no longer fib about walking the dog. Meanwhile, companies are gaining the ability to track customers through wireless devices. Imagine being able to e-mail a coupon for coffee as someone walks by a Starbucks. That will soon be possible using location identification that wireless companies are deploying for emergency 911 calls. And digital video recording technologies like TiVo and ReplayTV may one day let marketers customize ads based on television viewers' habits and preferences, warned David Burke, author of "Spy TV." Digital video recorders now automatically call a central office to get updated program guides. Privacy advocates fear they'll one day send back data on households' viewing habits as well. Privacy advocates are also worried about digital music devices, which could be programmed to create profiles of listening tastes. Whether marketers are actually using all of the capabilities today is another matter, Smith acknowledged. He fears the potential for tomorrow. Supporters of such technologies say the privacy fears are exaggerated, unfounded or outweighed by public safety imperatives. The facial-recognition cameras, for instance, are used to help to identify potential terrorists, law enforcement officials argue. Defending data collection by businesses, Jerry Cerasale of the Direct Marketing Association, a trade group for telemarketers and database companies, said the devices that collect marketing information do just that -and no more. The data collection occurs solely to help marketers customize information and ads for the consumers' benefit, and companies know they risk alienating customers if they trick them, Cerasale said. "There is a misconception that if you are purchasing something remotely, it might be used against you in some places like for approving mortgages and insurance," he said in a phone interview. "That's not the case." But privacy advocates point out past attempts to link and share data. The most widely cited case involves the advertising company DoubleClick, which drew ire for plans to cross-reference its records of consumers' online habits with a database that included names. Under pressure, the company suspended the plans. The FBI, meanwhile, has deployed a surveillance tool called Carnivore to check e-mail going through a network service provider for messages meant for a specific suspect. Critics say their tests show Carnivore can do much more. Some believe the U.S. Congress must pass legislation to protect Americans' privacy. At minimum, they say, the government should create a national data protection office to advise agencies and businesses on new technologies. Simson Garfinkel, author of "Database Nation: The Death of Privacy in the 21st Century," said U.S. companies considering new products and new uses for existing databases should have national guidelines to guide them. "It's hard for a lot of companies to do the right thing," he said. "We can make it easier for them." - - - On the Net: Conference: http://cfp2001.org Direct Marketing Association: http://www.the-dma.org American Civil Liberties Union: http://www.aclu.org Privacy Foundation: http://privacyfoundation.org -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2707 From: James M. Atkinson, Comm-Eng Date: Sat Mar 10, 2001 1:00pm Subject: Re: Mains audio At 11:14 PM +0200 3/9/01, A Grudko wrote: >Sorry guys, this is a long one - you might want to scroll to the end to see >if the premise and request are of interest. > > >During a sweep today my CPM-700 demodulated a very feint audio signal - just >above the noise floor - when plugged into either of two adjacent wall >sockets (nominal 220v, 50 Hz give or take 10%) in a corporate Board Room. >Adjacent sockets are supposed to be on different phases because of load >sharing but are frequently not, because of lazy electricians. These are in >parallel. How was the CPM-700 connected to the mains, and across which set of wires did the signal appear to be the strongest (Phases-Ground, Phase-Neutral, etc) At what frequency did your search receiver pickup the signal, and where you able to ferret out the signal using your spectrum analyzer hooked up to the power mains. >At first it sounded like a woman speaking to a man - unfortunately not in a >language I understood (we have 11 official languages in SA). The woman was >slightly more audible because of frequency not amplitude. Are we talking about an AM or FM modulated signal here, or some other kind of modulation. I would initially suspect you had a AM signal that was "drifting in and out". >I called the client to listen in case the voices could be identified, but >the signal was too weak for identification by an untuned ear. It's possible >that the voices were followed by music, implying a commercial station, but >not clear enough to confirm. > I would initially suspect a shortwave broadcast radio station that was being picked up by the building wiring. But always suspect the signal until you can absolutely prove that it is not hostile. >Situation is: > >Client's premises have been swept almost every month for the past 3 - 4 >years. Good, the more frequently you get into a building to do sweeps the less likely an eavesdropper will try to use a bug and will instead focus on other methods of espionage that would be able to caught using non-technical means. >The same CPM-700 was used at each sweep. Good, but was an Oscilloscope, Digital Voltmeter, Search Receiver, and Spectrum Analyzer used as well? (cough-cough) >These sockets were tested on every occasion with no signal being detected. Ah, but perhaps due to the time of day the propagation of the signals were favorable. >Client insists that no changes were made to power cabling in the Board Room >since the last sweep but cannot be sure of other parts of the building. > >Requested changes had been made to the 'phone system, so Telco technicians >have been on the premises. Unless you can see the signal on other phone or power wiring don't drift your focus away from the outlet in question. >The client rents the whole building, which is fed from a 3 phase power >distribution board in the basement, which was searched and found to be >uncompromised with no detectable hostile audio or RF present (some >modulation is expected for non-hostile control functions and occasional >communication). > >All other locatable power sockets in the building was checked and found >clean. Ah, clean of what? Clean of that specific signal, clean of any similar signals, clean of energy below 500 kHz, clean of HF, clean of audio...? > >The 3 phase transformer feeding the street block could not be checked. > >No cordless 'phone, wireless LAN, mains-modulation intercom/speaker or >similar equipment is used in the building, but we cannot speak for the >neighbours. > >3 voice lines are actually permanent GSM cellular links. Ah, GSM what? I take it your clients have completely lost their minds? Your client can not achieve any level of security by using "permanent GSM cellular links" instead of hard wired lines (ditto with PCS, etc). Yes, GSM will keep amateurs from listening in, but it will only annoy a professional eavesdropper and not actually prevent them from eavesdropping. >No equipment was plugged into the 2 sockets but a full search of equipment >on the phase was impractical (we would have had to shut down the office for >2 days - if client OKs we'll go back and 'plug and play' every electrical >item whilst monitoring the 2 sockets. Oscilloscope tests should be helpful, but make sure your on the line at the exact time the signal (and weather conditions) as last time. >Both sockets were opened and no foreign devices or curled wires were found >(coiling wire to give 'stretch' like a 'phone cord can easily and >unintentionally create a crude LC tuned circuit). "Coils" are commonly missed when performing a conducted signals analysis so it's good you are checking for them. >A second scan was carried out with a Scanlock and Audiotronics (UK) LF >converter with the antenna parallel to the conduiting at surface level, so >about 3" (75mm) from the cable. No signal was heard*. The CPM-700 is a broadband diode detector, and the Scanlock folds the spectrum. neither is a spectrum analyzer, tuned receiver, or oscilloscope. Both are good for quick checks, but when you have more time on target use other laboratory grade test equipment. >General RF level is medium for a suburban business park but with constant >growth in 900 Meg GSM cellular use to the point of RF flooding. Same problem here in the states with 1.8 GHz PCS band, seriously saturates the TSCM equipment. Same with pager stations, and analog cellular bands. What is really becoming a problem in our area are the HDTV transmitter that are coming on line. The harmonics of the digitally modulated fundamental signals appear right in the middle of several "bug bands" and have cause more them a few minutes of excitement during a bug sweep. >The client is involved in major mergers and acquisitions, inevitably with >political implications. Then your client should should be using should be using ISDN or T-carrier circuits with secure (high end) digital encryption equipment on both ends. >This client has been illegally 'phone tapped on 3 known previous occasions >(spies caught, equipment confiscated and their client identified). Then it's good they are having sweeps done frequently, but even if bugs had not been previously found it is still prudent to have the sweeps performed on a regular basis. > Security in the building is minimal, with access to the power and telco >rooms guarded by 2 lever locks. Manual 'honour system' access control, no >CCTV, limited alarm coverage (one floor of 4.....cutting costs!). Ouch, Ouch, Ouch... you can not have an effective technical counter-intelligence function when the physical security is so poor. > >So, to the point of my long post: > >For the past 3 years my long suffering partner has been receiving 'skills >transfer' (Yes - I want him to eventually do all the work and send me money >for the privilege as I get fat and old... ;-) ). Having him do all the work while you make all the money sounds like an interesting business model, let us know how (or if) it works out. >This 'find' is another chance to give him a few other peoples' opinions on a >common enigma that faces TSCMers. > >To plagiarise the Chrysler ad. (I think it's OK 'cos my wife drives >one).....'WHAT THE ?'. > >My thoughts: > >1) Something added to the mains circuit may have 'tuned' it to a radio >station (usually AM, medium wave, minus many db slope detection on the >CPM-700?). I would lean toward the building wiring picking up a broadcast from a shortwave radio station (which is why it is critical to use a spectrum analyzer to ferret out signals such as this). >2) Something added to the RF environment may have mixed to produce a >harmonic which the old circuit now 'receives'. A non-linear junction could cause such mixing, but then so could any such strong RF signal nearby (hence the value of a good SA) >3) * From above. I feel the signal containing audio was received rather than >transmitted, therefore is non-hostile. Partially correct, but do not discount it until you can absolutely prove otherwise. >Am I right - am I wrong - have we missed something - is there something else >we should do? (short of demolishing the building; which is outside our >budget by about 2 000%, like a government project.). Use a Spectrum Analyses and search receiver coupled into the power lines and carefully inspect EVERY conducted signal present. Examine every power outlet, every breaker box, every meter, every transformer, and every entry or appearance point. Include all Power wiring, all telephone wires, all CCTV/CATV cables, all alarm lines, all utilities, and so on. If it is something that enters of leaves the area in question it must be considered a hostile signal path until proved otherwise. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2708 From: Date: Sat Mar 10, 2001 11:27am Subject: DAR broadband receivers? Good afternoon everyone.. Still continuing research on TSCM equipment and ran across 'Southern Security'...speaks for itself pretty much from the web site but thank you Steve Uhrig for the advice and information. Everyday provides new insights.. Anyone have experience with the 'DAR-1 or DAR-3'? What are they? Comparable to a CPM-700..? How does a CPM-700 compare to a Scanlock? Are all three so-called broadband receivers? I've seen the CPM referenced in some posts, but rarely the scanlock. Thanks ..Harry K. P.S. Jim, missed your TV appearance..gonna wait for it to come out on video though.. 2709 From: Date: Sat Mar 10, 2001 7:07pm Subject: FBI officials got Soviet embassy tunnel tours -Post FBI officials got Soviet embassy tunnel tours -Post WASHINGTON, March 10 (Reuters) - FBI officials were so proud of a secret tunnel built beneath the Russian Embassy for electronic surveillance during the final years of the Cold War that they offered tours to senior officials with top security clearances, the Washington Post reported on Sunday. Former FBI agent Robert Hanssen, arrested on Feb. 18 on charges of selling secrets to Moscow for 15 years, is suspected of having disclosed existence of the tunnel to his Soviet handlers. U.S. media first reported the existence of the tunnel earlier this month. The Post quoted current and former government officials as saying Hanssen's suspected report about the tunnel likely nullified the technological advantages the FBI could have gained from such close range access to the then-Soviet embassy. The Post quoted one former U.S. official who said he was offered a tour but declined the invitation because he is claustrophobic. He told the Post the tunnel was accessed from a residence near the Soviet -- now Russian -- compound on Mount Alto, a hilltop north of Washington's swanky Georgetown neighborhood and one of the highest sites in Washington. The former official said the government purchased the home and started digging the tunnel out of its basement. The paper quoted another former official as saying he had toured the passageway but declined to describe it, saying everything about it remains highly classified. One intelligence source with direct knowledge of the technology Hanssen allegedly compromised told the Post the Soviets used the FBI bugs and wiretaps to feed disinformation back to the U.S. government. "They were obviously feeding a very large quantity of data to us of apparent value but no real value," the paper quoted the source as saying. "It was a very delicate game that was played out over several years." 2710 From: A Grudko Date: Sat Mar 10, 2001 4:35pm Subject: One mains audio is another mains propigation... Mains sweeping 101. -- Original Message -- > How was the CPM-700 connected to the mains, and across which set of > wires did the signal appear to be the strongest (Phases-Ground, > Phase-Neutral, etc) The CPM-700 mains modulation detector is a 2 pin, phase-phase ('live to neutral') connection. I have not opened one up but assume it's based on a LF torroid or ferrite coil with a resistive shunt (I used to build 'em with a neon as the resistance and 'connected' indicator), inducting raw RF out - in effect just decoupling the RF from the mains, but maybe the manufacturer changes the turn ratio to suit the receiver, lowering the Q. > At what frequency did your search receiver pickup the signal, and > where you able to ferret out the signal using your spectrum analyzer > hooked up to the power mains. The CPM-700 does not indicate frequency and the signal was not detected by my Scanlock or 7700. As > > Are we talking about an AM or FM modulated signal here, or some other > kind of modulation. As I only picked it up on the CPM-700, which does not have modulation selection but seemes to compromse somehow between AM and FM (FM signals being much more crisp), I can only say, going by WMED (What My Ear Detected), that it sounded like AM. Here in SA we only have a handfull of receivable AM (MW) stations during the day. > I would initially suspect you had a AM signal that was "drifting in and out". Agreed > >The same CPM-700 was used at each sweep. > > > Good, but was an Oscilloscope, Digital Voltmeter, Search Receiver, > and Spectrum Analyzer used as well? (cough-cough) 2 out of 4, but again, see * below > > > >These sockets were tested on every occasion with no signal being detected. > > > Ah, but perhaps due to the time of day the propagation of the signals > were favorable. Thank you - a point I had not considered although our sweeps have been random. Note to Dave...I missed something, grasshopper...:-) > >Client insists that no changes were made to power cabling in the Board Room > >since the last sweep but cannot be sure of other parts of the building. > > > >Requested changes had been made to the 'phone system, so Telco technicians > >have been on the premises. > > > Unless you can see the signal on other phone or power wiring don't > drift your focus away from the outlet in question. As the client's previous 3 surveillance events were illegal 'phone taps, my thought was possably a link to the mains from the PABX (switchboard/cable frame - we have to watch out for international lingo here) sourcing the audio and carrying the 'music-on-hold' as a system charactoristic. > >All other locatable power sockets in the building were checked and found > >clean. > Ah, clean of what? Clean of that specific signal, clean of any > similar signals, clean of energy below 500 kHz, clean of HF, clean of > audio...? Hmm....jma can get picky - which is good if the client has the budget....see the dreaded * below. > >3 voice lines are actually permanent GSM cellular links. > Ah, GSM what? I take it your clients have completely lost their minds? > > Your client can not achieve any level of security by using > "permanent GSM cellular links" instead of hard wired lines (ditto > with PCS, etc). > > Yes, GSM will keep amateurs from listening in, but it will only annoy > a professional eavesdropper and not actually prevent them from > eavesdropping. They may have lost their TSCM minds but not their money minds. We saw a cheque waiting a second signiture which was for 4 times my life goal....a side issue. We are in Africa. My friends in the UK or US can get a new land line 'phone line the same day. We wait up to 3 months, so instant cellular connections are very attractive. Only in the last year have our Telco made ISDN readilly available. > Oscilloscope tests should be helpful, but make sure your on the line > at the exact time the signal (and weather conditions) as last time. JMA - I can organise the time, but not the weather. You don't have a link to god@b... do you? > >A second scan was carried out with a Scanlock and Audiotronics (UK) LF > >converter with the antenna parallel to the conduiting at surface level, so > >about 3" (75mm) from the cable. No signal was heard. > Both are good for quick checks, but when you have more > time on target use other laboratory grade test equipment. Again, see * below. > >The client is involved in major mergers and acquisitions, inevitably with > >political implications. > > > Then your client should should be using should be using ISDN or > T-carrier circuits with secure (high end) digital encryption > equipment on both ends. I have ISDN, as do some of my clients, but I'm not familiar with the term T-carrier. Please enlighten. Problem with encription is as you say, both ends...I encript but do you.... But point taken. > > Security in the building is minimal, > Ouch, Ouch, Ouch... you can not have an effective technical > counter-intelligence function when the physical security is so poor. Yup - agreed and written in silicone Moses only had stone to work with). But to get the clients to listen... > >For the past 3 years my long suffering partner has been receiving 'skills > >transfer' (Yes - I want him to eventually do all the work and send me money > >for the privilege as I get fat and old... ;-) ). > Having him do all the work while you make all the money sounds like > an interesting business model, let us know how (or if) it works out. Not quite. He does a good job and hopefully we'll build a sound business and both make money....but after 20 years I might get an extra stipend. > >My thoughts: > > > >1) Something added to the mains circuit may have 'tuned' it to a radio > >station (usually AM, medium wave, minus many db slope detection on the > >CPM-700?). > I would lean toward the building wiring picking up a broadcast from a > shortwave radio station (which is why it is critical to use a > spectrum analyzer to ferret out signals such as this). Agreed > >2) Something added to the RF environment may have mixed to produce a > >harmonic which the old circuit now 'receives'. > A non-linear junction could cause such mixing, but then so could any > such strong RF signal nearby (hence the value of a good SA) > >3) I feel the signal containing audio was received rather than > >transmitted, therefore is non-hostile. > Use a Spectrum Analyses and search receiver coupled into the power > lines and carefully inspect EVERY conducted signal present. Examine > every power outlet, every breaker box, every meter, every > transformer, and every entry or appearance point. > Include all Power wiring, all telephone wires, all CCTV/CATV cables, > all alarm lines, all utilities, and so on Back to the *s. This client is on a tightly negotiated monthly contract with no room for additional work from our side. So the report to client will be, we think everything is OK but there is what looks like an innocent signal, but might not be and the only way to be sure is a major tech and physical, search, probably maxing out the monthly budget x 10. If they don't pay, they won't know. Andy Jo'burg 2711 From: Bob Washburne Date: Sun Mar 11, 2001 11:52am Subject: Re: more from scout report (spammimic) Mike F wrote: > > Spam Mimic > http://www.spammimic.com/ > > Here is a neat tool for the paranoid or clandestine-minded user. I looked at this system a while back. While being clever and very geeky, it has several major drawbacks: -) The resulting pseudo-spam has too much of a signature. It could easily be searched for by Echalon-esq sniffers. Note: Carnivore-esq sniffers don't care. They grab everything to the targeted address, but only that address. -) The encryption is trivial. Once on the radar it wouldn't take our friends at the NSA a day to crack it. -) You can only use it through the web site. And I believe them when they say that they aren't recording their site usage! For something a bit more useable, perform a web search on "steganographic" which is the art of hiding messages in the low order bits of sound and image files. Some systems, such as StegFS, create an actual file system which can be mounted. Unfortuneatly, this can leave a signature so that the black hats can tell when something is hidden in you file. If I were to design a system, it would propably work something like this: 1) Take the media file and randomly change each word within a range of +/- 15. The low order bits of any recording are usually random anyway. This just guarentees a bit of chaos in the system without noticable changing the quality of the recording. 2) Encrypt your plaintext so that it looks like random bits. 3) Split the cyphertext up and place it in the two low order bits of each word of the media file. As long as your encryption scheme doesn't leave a signature, you have plausible deniability. Also, most steganographic systems use at least four bits. With my system you have scrambled four bits, but only used two thus confusing any attempt to find seganographic signatures. Of course, all of this works best if you keep "under the radar". If youv'e done something to get authorities interested in you, then you will probably get caught. Once it's been determined that you are sending secret messages, then the taps and bugs will be brought in and a case built without the need of breaking your encryption. Enjoy, Bob Washburne 2712 From: James M. Atkinson, Comm-Eng Date: Mon Mar 12, 2001 6:29am Subject: FBI top brass had tours of spy tunnel FBI top brass had tours of spy tunnel http://www.thetimes.co.uk/article/0,,3-97537,00.html FROM DAMIAN WHITWORTH IN WASHINGTON THE FBI was so pleased with itself when it built a tunnel under the Soviet Embassy that it ran guided tours for senior officials to show off its electronic surveillance operation. As the visitors stooped and shuffled through the dirt to examine how listening devices were deployed, even the hardiest Cold War veterans may have shivered at the thrill of it all. Up above, enemy agents, perfectly aware of what was going on, perhaps allowed themselves a smile as they went about the business of ensuring that none of the information the devices detected was of the least use to the United States. After the arrest last month of Robert Hanssen, a senior FBI official charged with spying for the Soviet Union and then Russia for 15 years, the existence of the tunnel was revealed along with the FBIís allegation that Hanssen had told Moscow of it many years ago. The disclosure that an unwitting FBI was proudly taking its top brass on tours of a white elephant comes as a fresh embarrassment. The tunnel was built from a house the FBI bought on a hilltop close to the embassy. It is not known when the US realised that the Soviets were aware of their subterranean surveillance work but officials have claimed that they knew long before Hanssen was unmasked as a spy. The tunnel let the FBI tap into telephone wires and power cables and place receivers which picked up signals transmitted by bugs placed throughout the embassy. Intelligence officials believe that Hanssenís suspected report about the tunnel to his Soviet handlers rendered the hugely expensive operation useless. One intelligence source with direct knowledge of the technology Hanssen allegedly compromised told the Washington Post that the Soviets used the FBI bugs and wiretaps to feed disinformation back to the US Government. There is a new parlour game, too: what did the FBI do with all that soil? -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2713 From: James M. Atkinson, Comm-Eng Date: Mon Mar 12, 2001 6:31am Subject: FBI scandal leaves CIA gloating FBI scandal leaves CIA gloating http://www.suntimes.com/output/news/spy11.html March 11, 2001 BY LISA HOFFMAN WASHINGTON--When CIA mole Aldrich Ames was unearthed in 1994, Congress and President Bill Clinton punished the spy agency by yanking its control over its own counterintelligence operations and giving it to the FBI. It was a humiliating time for the storied CIA. Not only had the agency missed signs that Ames, chief of the CIA's Soviet counterintelligence, had been selling some of the nation's top secrets to Moscow for years. But the CIA also would lose command over a prime part of its turf to its longtime rival, the FBI. Now the tables have turned. It's the FBI in the hot seat this time, embarrassed by its damaging failure to detect its own alleged Russian mole, 15-year FBI counterintelligence operative Robert Hanssen. "They have their own spy, big time," said one retired high-ranking CIA counterintelligence agent who served during the FBI takeover. "Couldn't happen to a nicer bunch." In some quarters of the U.S. intelligence community these days, there is a mixture of bitterness and glee at the FBI's plight--along with relief that it's not the CIA at fault this time. Resentment over some reforms instituted after Ames was uncovered, along with anger that the FBI had failed to practice what it had preached to the CIA about internal security, also are not hard to find. Unlike the CIA, for instance, the FBI doesn't randomly polygraph its agents or require regular financial disclosures from them as early warning techniques for detecting in-house turncoats. If the FBI had, it might have prevented Hanssen's alleged betrayal, now shaping up to be one of the costliest such breaches in U.S. history. Hanssen, 56, was arrested Feb. 18 on charges he passed 6,000 pages of secret documents to the Soviets and Russians in exchange for $1.4 million in cash, diamonds and an escrow fund. But there also is a recognition, though grudging from some, that those very post-Ames reforms have already gone far in reducing 50 years of mistrust between the two agencies and forcing them to collaborate openly with each other. "The changes have all been to the good," said Jeffrey Smith, who became the CIA's general counsel when the reforms began. Angered that the CIA had failed for several years to share vital information about its investigation of Ames and other suspected spies, Congress and Clinton set up a national counterespionage center and put the FBI in charge. A senior FBI official also was installed at the helm of the CIA's internal counterintelligence operation--which the CIA had considered off-limits to all but its own elite staff--so the FBI would have equal access to the CIA's raw intelligence. And top CIA and FBI officials were directed to meet biweekly. The purpose of all this was to crack the institutionalized antipathy that was forged during World War II, when FBI Director J. Edgar Hoover saw President Franklin D. Roosevelt's establishment of the Office of Strategic Services, the CIA's predecessor, as a threat to the FBI's dominion. Over the years, the agencies traded accusations that the other had lied, withheld vital information or otherwise obstructed operations and investigations. Compounding the animosity were their very different cultures and methods of operation. The CIA, for instance, has long considered itself the province of intellectuals, while viewing the FBI as a rarefied street cops' domain. "The CIA has been regarded as where [its personnel] come from Ivy League colleges and like to go to the opera, and the FBI has the products of whatever college and like to go to NASCAR races," said Smith, now a Washington lawyer. "They're almost adversarial by nature," said Peter Earnest, a 35-year CIA veteran. Even so, the enforced mingling of the agencies has already led to at least two successes. The 1996 nabbing of accused CIA spy Harold Nicholson and accused FBI mole Earl Edwin Pitts are hailed as examples of how, when the agencies work together, cases can be made both quicker and better. "It works well, as in the Nicholson case, which was largely the result of sharing pieces of information back and forth," Smith said. Scripps Howard News Service *** BUREAU VS. AGENCY CENTRAL INTELLIGENCE AGENCY * Established: 1947 * Director: George Tenet, since 1997 * 2001 budget: Classified * Total employees: Classified * Headquarters: Langley, Va. * Web site: www.cia.gov FEDERAL BUREAU OF INVESTIGATION * Established: 1908. Its name dates from 1935 * Director: Louis Freeh, since 1993 * 2001 budget: $3.1 billion * Total employees: 27,300, including 16,000 special agents * Headquarters: Washington. * Web site: www.fbi.gov -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2714 From: James M. Atkinson, Comm-Eng Date: Mon Mar 12, 2001 6:35am Subject: PROUD FBI OFFERED TOURS OF SECRET TUNNEL BUILT UNDER SOVIET EMBASSY PROUD FBI OFFERED TOURS OF SECRET TUNNEL BUILT UNDER SOVIET EMBASSY http://www.chicagotribune.com/news/printedition/article/0,2669,SAV-0103110209,FF.html By Vernon Loeb The Washington Post March 11, 2001 WASHINGTON -- FBI officials were so proud of a secret tunnel the agency built beneath the Soviet Embassy for electronic surveillance during the final years of the Cold War that they offered tours of the passageway to senior officials with top security clearances, former government officials said last week. One former official acknowledged that he had toured the passageway but declined to describe it, saying everything about it remains highly classified. Another ex-official who was offered a tour but declined the invitation because he is claustrophobic said the tunnel was reached from a residence near the Soviet--now Russian--compound on Mt. Alto, a hilltop north of Georgetown between Wisconsin Avenue and Tunlaw Road NW that is one of the highest sites in Washington. The former official said the government bought the home and started digging the tunnel out of its basement. While much about the tunnel remains a closely held secret, electronic surveillance experts inside and outside the intelligence community said its operation gave the FBI the proximity needed to intercept Soviet communications using a variety of bugs and taps. "The closer the eavesdropper gets to the target, the more he can do," said one former government expert, explaining how tiny bugs planted throughout the embassy could have transmitted signals to the tunnel through fiber-optic and copper lines that are extremely difficult to detect. "Any time you can get physical proximity to a target, it opens up a world of possibilities," said another expert who once worked for the National Security Agency. The NSA provided eavesdropping technology for the tunnel. Beyond "hard-wired" bugs directly connected to receivers in the tunnel, the experts said, the tunnel could have enabled the FBI to tap into telecommunications lines and even power cables, which carry electromagnetic signals that can be reconstructed and deciphered. A one-time law-enforcement official said laser technology was deployed in the tunnel, technology the experts said could have been used to capture sound waves emanating from pipes and structural support beams. One former government electronic surveillance guru said tiny microphones could even have been inserted in toilets through water pipes to monitor conversations in bathrooms. Whatever technologies the NSA deployed to bug the embassy, however, the useful information it obtained was likely negligible, according to current and former government officials. Prosecutors now believe that FBI agent Robert Hanssen tipped off the KGB to the tunnel's existence early in his alleged 15-year career as a spy for the Soviet Union, nullifying the technological advantages the FBI could have gained from such close range. One intelligence source with direct knowledge of the technology Hanssen allegedly compromised said the Soviets used the FBI bugs and wiretaps to feed disinformation back to the U.S. government. "They were obviously feeding a very large quantity of data to us of apparent value but no real value," the source said. "It was a very delicate game that was played out over several years." A 109-page affidavit filed in court to support espionage charges against Hanssen never specifically mentions the tunnel. A senior U.S. official said the affidavit refers indirectly to the eavesdropping operation when it alleges that Hanssen "compromised an entire technical program of enormous value, expense and importance to the United States." In any event, U.S. officials realized the tunnel operation had been compromised years before Hanssen was unmasked last month as an alleged spy for Moscow, former FBI and intelligence officials said. Stanislav Lunev, a former colonel in Soviet military intelligence, said U.S. officials might have been alerted by a broadcast on Soviet television in 1987. In the broadcast, Soviet officials revealed numerous listening devices found throughout the embassy, including its basement. "Somebody dug in the basement with a shovel and found electronic devices, brand new," said Lunev, who arrived in Washington under cover as a correspondent for the Soviet news agency Tass in 1988 and defected to the United States in 1992. Lunev said he was never told that a tunnel existed but hardly finds the disclosure remarkable. "To believe there is no tunnel under the embassy would be stupid," Lunev said. "It's real life, a clear practice of intelligence." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2715 From: James M. Atkinson, Comm-Eng Date: Mon Mar 12, 2001 8:52am Subject: For the Birds According to the Knight-Ridder News Service, the inscription on the metal bands used by the U.S. Department of the Interior to tag migratory birds has been changed. The bands used to bear the address of the Washington Biological Survey, abbreviated Wash. Biol. Surv. That is, until the agency received the following letter from a camper: Dear Sirs: While camping last week I shot one of your birds. I think it was a crow. I followed the cooking instructions on the leg tag and I want to tell you it was horrible. The bands are now marked Fish and Wildlife Service. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2716 From: Dawn Star Date: Mon Mar 12, 2001 1:40pm Subject: Mains Audio "I called the client to listen in case the voices could be identified, but the signal was too weak for identification by an untuned ear. It's possible that the voices were followed by music, implying a commercial station, but not clear enough to confirm." A Grudko It sounds like A.M. Radio, Easy way to check is bring along an A.M. radio and match up program material. Comes under the tool box heading, basic stuff: along with the flashlight, screwdriver, and paper clip. Roger, Electronic Security, Los Angeles 2717 From: James M. Atkinson, Comm-Eng Date: Mon Mar 12, 2001 4:10pm Subject: Re: Cellular and Pager Interception Equipment At 11:05 AM +0200 3/8/01, A Grudko wrote: >Off the list > >----- Original Message ----- >> It's nice that the unit recently listed has various capabilities to >> If you want to use a product such as this to inventory the ESN's you >> encounter during a sweep, or need to interrogate a phone or CDPD >> transponder in a vehicle you are checking fine, but do not post ads >> for this kind of stuff to this list. I have to admit that how a NAM >> programmer is used in a sweep is a bit of a mystery to even me > >> (but then of course I've only done a few hundred sweeps) > >Me too - 2 tomorrow, but, in the spirit of admitting that I don't know >everything, can you expand on the acronyms ESN and CDPD with a brief >description of their relevance to TSCM. I could guess but I'd rather get it >from you. We might have the same here but known by a different name. > >Thanx > >Andy Grudko. D.P.M., Grad I.S, (S.A.) >CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & >intelligence >Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - >Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 >11) 465 9673 - 465 1487 (Fax) - Est. 1981 >GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA >Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, IPA, AmChamCom >"When you need it done right - first time" The "ESN" refers to an Electronic Serial Number that is imbedded inside the communication device which is used to identify a specific device from another device. ESN's are supposed to be, but are not always unique (usually due to mischief). CDPD is a "Packet Data" network which piggybacks a data network on top of a normal cellular telephone network. Since GPS/CDPD transponders are fairly popular as illicit tracking devices there are several methods that can be used to "burp" them. "Burping" a transponder is course done at the tail end of a sweep as it is alerting in nature. It involves creating a very low power signal (generally less then a mW) on a directional antenna which is passed over areas which may contain an illicit tracking device (ie: rear deck). The goal is to cause the transponder to momentarily loose contact with the base station and thereby "burp" trying to regain contact. The TSCM'er then listens for the "burp" with a spectrum analyzer, search receiver, or similar diagnostics equipment. Since the interruption of contact only lasts for a second or so (we hope) the transponder gives up it's hidden location when it burps. If the spy has foolishly instructed the transponder to transmit coordinates in real time (or on a frequent basis) the devices are very easy to find, on the other hand if it is in a "forward and store" mode they can be a real bitch to find and you may have to resort to burping. As always, a rigorous four plus hour physical search of the vehicle is also really helpful. -jma PS: I would STRONGLY warn the list membership that if you have any kind of cellular test equipment that you use during sweeps that you had bloody well be only using it for only legitimate purposes (TSCM'ers do not need pager or cellular interception equipment to perform a bug sweep). . -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2718 From: Samuel Hayes Date: Mon Mar 12, 2001 3:40pm Subject: Aspiring TSCM'er Hello to everyone from Atlanta, Ga. My name is Samuel Hayes. I would like to especially say hello to Jim, (hey Jim). Jim, i dont know if u remember me but we have spoken a number of times on the phone about what path I need to take to find my place amongst the real pro's in the TSCM field, and I would like to say thanks for all of your advice. Everything is working out well so far (even though its alot of work).My question to the group is this... I am currently enrolled in an electronic fundamentals course at my local tech. school and also employed by Bellsouth as a Facility Technician (we build networks-I'm in the fiber optics crew). Is there any thing else anyone can think of that I could do to give me a strong foundation with which to build the necessary skills to be a TSCM tech? Anyone perhaps looking for an enthusiastic apprentice with a strong desire to learn (and carry all the heavy stuff), whose willing to travel? Hey Jim, whats the status on Granite Island Groups classes opening to the public and how do I sign up? Well, I'll start with these few questions for now. Hope someone can help. Ciao' SRH3 __________________________________________________ Do You Yahoo!? Yahoo! Auctions - Buy the things you want at great prices. http://auctions.yahoo.com/ 2719 From: Miguel Puchol Date: Mon Mar 12, 2001 5:45pm Subject: RE: Re: Cellular and Pager Interception Equipment James, There is an easier way to find one, at least in some cases. If your SA is somewhat portable, drive the vehicle around an inoffensive route, but one that would make a planted device to register in various cells, then you can see the 'burps' without having to TX on the cell band, which as I learned on my flesh some weeks ago, seems to be somewhat illegal... :-) I however suppose less than a mW can be considered 'common use' under some legislations. If you have contact with the telcos, and have the location of the cells you are going to be passing, you can map expected coverage from various cells to determine 'handover points', where you can look closer for 'burps'. When you have a high cell traffic in the search area, you can record the traces, then play them back at the office to look for similar strength 'burps' at expected locations. Just a thought, all the best, Mike > -----Mensaje original----- > De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] > Enviado el: lunes, 12 de marzo de 2001 23:10 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] Re: Cellular and Pager Interception Equipment > > The "ESN" refers to an Electronic Serial Number that is imbedded > inside the communication device which is used to identify a specific > device from another device. ESN's are supposed to be, but are not > always unique (usually due to mischief). > > CDPD is a "Packet Data" network which piggybacks a data network on > top of a normal cellular telephone network. > > Since GPS/CDPD transponders are fairly popular as illicit tracking > devices there are several methods that can be used to "burp" them. > > "Burping" a transponder is course done at the tail end of a sweep as > it is alerting in nature. It involves creating a very low power > signal (generally less then a mW) on a directional antenna which is > passed over areas which may contain an illicit tracking device (ie: > rear deck). The goal is to cause the transponder to momentarily loose > contact with the base station and thereby "burp" trying to regain > contact. The TSCM'er then listens for the "burp" with a spectrum > analyzer, search receiver, or similar diagnostics equipment. > > Since the interruption of contact only lasts for a second or so (we > hope) the transponder gives up it's hidden location when it burps. > > If the spy has foolishly instructed the transponder to transmit > coordinates in real time (or on a frequent basis) the devices are > very easy to find, on the other hand if it is in a "forward and > store" mode they can be a real bitch to find and you may have to > resort to burping. > > As always, a rigorous four plus hour physical search of the vehicle > is also really helpful. > > -jma > > > PS: I would STRONGLY warn the list membership that if you have any > kind of cellular test equipment that you use during sweeps that you > had bloody well be only using it for only legitimate purposes > (TSCM'ers do not need pager or cellular interception equipment to > perform a bug sweep). > > > > > > . > -- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 2720 From: Craig Snedden Date: Mon Mar 12, 2001 3:57pm Subject: Re: Mains Audio Ooops! I 'd have difficulty convincing myself that the characteristics of my AM "tranny" antenna is in any way comparable to what is effectively a very long wire (maybe several kilometres) attached to an RF front end......... So we take down the HF150, the ATU and 30 odd metres of copper and we build an antenna on site. And most probably we still wouldn't be able to get the same signal... Know it, tried it. I run 4 LF & HF receivers side by side for about 8/12 hours each day, each has it's own characteristics, even when coupled up to the same antenna one will pull the signal, while another just won't catch it.... :-( ----- Original Message ----- From: "Dawn Star" To: Sent: Monday, March 12, 2001 7:40 PM Subject: [TSCM-L] Mains Audio > "I called the client to listen in case the voices could be identified, but > the signal was too weak for identification by an untuned ear. It's possible > that the voices were followed by music, implying a commercial station, but > not clear enough to confirm." > A Grudko > > It sounds like A.M. Radio, Easy way to check is bring along an A.M. radio > and match up program material. Comes under the tool box heading, basic > stuff: along with the flashlight, screwdriver, and paper clip. > Roger, Electronic Security, Los Angeles > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 2721 From: A Grudko Date: Wed Mar 14, 2001 7:26am Subject: Re: Mains Audio and other signals Thanks Craig, that's another good point. Just as 'There's no replacement for cubic displacement', on AM LW/MW size does count, and the mV/mtr gain over a couple of klicks of solid copper conductor But woah - 4 HF rigs at once; you must have one noisy test bench! I get irritated and confused if more than 3 AM or FM signals pop up at the same time - I often hit the big ALL OFF switch (the PSU). One of my TSCM test rigs is an ancient but still worthwhile Fair Mate HP-100E portable scanner. It has 1000 memories, AM, NBFM or WBFM stored, 8.0 to 999.995 Megs. All I do with it is anytime I discover or read about a new bug frequency (don't you love those detailed spec. catalogues) is I enter the frequency and mode, in no special order. Then during a sweep I let it just run. I sometimes also let it run as I drive through the city and suburbs 'cos you never know when you'll pick up a conventional Cony, Micro or AAA device... Monday I had a Middle East supplier phone me offering unsolicited Micro phone and room bugs, via London at 'unbeatable prices'. Today a rep. from a Far East based company phoned out of the blue. He claims he's been active selling covert surveillance devices in SA for 4 months. I was happy to talk to the guys to find out what's appearing on the local scene - and to try to work out who are buying what and why. ----- Original Message ----- From: Craig Snedden To: Sent: Monday, March 12, 2001 11:57 PM Subject: Re: [TSCM-L] Mains Audio > I 'd have difficulty convincing myself that the characteristics of my AM > "tranny" antenna is in any way comparable to what is effectively a very long > wire (maybe several kilometres) attached to an RF front end......... > So we take down the HF150, the ATU and 30 odd metres of copper and we build > an antenna on site. And most probably we still wouldn't be able to get the > same signal... Know it, tried it. > I run 4 LF & HF receivers side by side for about 8/12 hours each day, each > has it's own characteristics, even when coupled up to the same antenna one > will pull the signal, while another just won't catch it.... 2722 From: James M. Atkinson, Comm-Eng Date: Wed Mar 14, 2001 9:14am Subject: Re: Mains Audio and other signals At 3:26 PM +0200 3/14/01, A Grudko wrote: [snip] >All I do with it is anytime I discover or read about a new bug frequency >(don't you love those detailed spec. catalogues) is I enter the frequency >and mode, in no special order. Then during a sweep I let it just run. I >sometimes also let it run as I drive through the city and suburbs 'cos you >never know when you'll pick up a conventional Cony, Micro or AAA device... > [snip] Here are a few more for you to keep an eye on, they are all low cost Japanese units that are flooding the consumer and spy shop markets abroad. All frequencies are in MHz, and the devices use NBFM modulation. Very, very heavily used in major US cities, and fairly easy to find at considerable distances with the appropriate equipment. In fact it is tough to perform a bug sweep in major city in the US (ie: NYC, DC, Chicago, Boston, etc) and not pickup on at least one of these frequencies being used for covert eavesdropping. 134.0000 134.9000 139.6000 139.9400 139.9700 139.9800 140.0000 140.0500 140.4500 141.0000 149.0000 149.4500 149.8950 154.0000 154.5850 339.4500 361.8250 396.4300 396.4400 396.8200 397.2400 397.2500 397.5650 398.0100 398.0300 398.0500 398.1100 398.2100 398.2150 398.4600 398.6050 398.6400 398.6450 398.6500 399.0250 399.0300 399.2500 399.4300 399.4550 399.5750 399.6050 399.6150 399.6400 399.7500 399.9100 399.9900 400.0000 413.0000 418.0000 433.9200 442.9000 Of course your mileage may vary, -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2723 From: JAMES M. McGING Date: Wed Mar 14, 2001 9:20am Subject: Re: Digest Number 538 I have a new email address, and would appreciate you amending your records, as I wish to continue to be a member of the list. Thank you, James M. McGing old: sheriff@w... new: Tourmakeady2001@y... 2724 From: Craig Snedden Date: Wed Mar 14, 2001 9:56am Subject: Re: Re: Mains Audio and other signals Hi Andy, Nice to hear someone else out there has a Fairmate. Nice little unit and easy to use, even if you have lost the manual like me....... O.K. I'll come clean, I'm not blessed with 4 arms and several sets of ears (although some of the guys I worked with in the past seemed to be so blessed!). Usually, 2 or 3 of the rigs are set up to rx RTTY under computer control. I have two budget AKD HF-3's, (which actually give a respectable performance), a Lowe HF-150 and an AR7030. Regarding "bugging" equipment from London, there are a couple of suppliers, who to my certain knowledge (having taken thier stuff to bits & compared them), buy cheap units from the far east (xtal controlled UHF & VHF transmitters, recorders, knowles mikes etc.) and stick thier own badges on them, then hike the price by 100% or so. A couple of years ago I bought two recorder/transmitter devices (srictly for training purposes Mr. Atkinson, Sir!) from a supplier for about £120 each. A few months later during a sweep I came across an identical unit in a clients premises, but "badged" by a well known London supplier. I looked up thier catalogue to find them priced at £300 each.... But you're right, it's always worth talking to these people, often a bit of "social engineering", turning the spying game back on them, will reveal who is buying what. Most salesmen are too greedy to make the sale that client ethics go straight out the window! I trust your autumn isn't getting too cold for you down there, the fine weather is just starting here, we're up to 3 degrees centigrade today! Best regards, Craig ----- Original Message ----- From: "A Grudko" To: Sent: Wednesday, March 14, 2001 1:26 PM Subject: [TSCM-L] Re: Mains Audio and other signals > Thanks Craig, that's another good point. Just as 'There's no replacement for > cubic displacement', on AM LW/MW size does count, and the mV/mtr gain over a > couple of klicks of solid copper conductor > > But woah - 4 HF rigs at once; you must have one noisy test bench! > > I get irritated and confused if more than 3 AM or FM signals pop up at the > same time - I often hit the big ALL OFF switch (the PSU). > > One of my TSCM test rigs is an ancient but still worthwhile Fair Mate > HP-100E portable scanner. It has 1000 memories, AM, NBFM or WBFM stored, 8.0 > to 999.995 Megs. > > All I do with it is anytime I discover or read about a new bug frequency > (don't you love those detailed spec. catalogues) is I enter the frequency > and mode, in no special order. Then during a sweep I let it just run. I > sometimes also let it run as I drive through the city and suburbs 'cos you > never know when you'll pick up a conventional Cony, Micro or AAA device... > > Monday I had a Middle East supplier phone me offering unsolicited Micro > phone and room bugs, via London at 'unbeatable prices'. > > Today a rep. from a Far East based company phoned out of the blue. He claims > he's been active selling covert surveillance devices in SA for 4 months. > > I was happy to talk to the guys to find out what's appearing on the local > scene - and to try to work out who are buying what and why. > > ----- Original Message ----- > From: Craig Snedden > To: > Sent: Monday, March 12, 2001 11:57 PM > Subject: Re: [TSCM-L] Mains Audio > > > I 'd have difficulty convincing myself that the characteristics of my AM > > "tranny" antenna is in any way comparable to what is effectively a very > long > > wire (maybe several kilometres) attached to an RF front end......... > > So we take down the HF150, the ATU and 30 odd metres of copper and we > build > > an antenna on site. And most probably we still wouldn't be able to get the > > same signal... Know it, tried it. > > I run 4 LF & HF receivers side by side for about 8/12 hours each day, each > > has it's own characteristics, even when coupled up to the same antenna one > > will pull the signal, while another just won't catch it.... > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 2725 From: James M. Atkinson, Comm-Eng Date: Wed Mar 14, 2001 11:09am Subject: Re: Re: Mains Audio and other signals At 3:56 PM +0000 3/14/01, Craig Snedden wrote: >Hi Andy, [snip] >Regarding "bugging" equipment from London, there are a couple of suppliers, >who to my certain knowledge (having taken thier stuff to bits & compared >them), buy cheap units from the far east (xtal controlled UHF & VHF >transmitters, recorders, knowles mikes etc.) and stick thier own badges on >them, then hike the price by 100% or so. A couple of years ago I bought two >recorder/transmitter devices (srictly for training purposes Mr. Atkinson, >Sir!) from a supplier for about £120 each. A few months later during a >sweep I came across an identical unit in a clients premises, but "badged" by >a well known London supplier. I looked up thier catalogue to find them >priced at £300 each.... [snip] A bug which is selling in japan for $85.00 retail in Japan is available wholesale (in Japan) for under $50.00 bucks. Now in London that same exact bug is openly sold for 300 to 500 dollars (US), and illicitly offered in the US via SpyShops for many thousands of dollars (typically a 50:1 markup ratio or more). I have personally seen eavesdropping devices for sale at a popular New York SpyShop for $4,995.00 (yes, five grand) which were readily available in Japan for fifty dollars. Of course if you agree to become a dealer for the NY SpyShop they will give you a special price of half off ($2,500.00), but you have to promise to buy ten units. A few calls to the manufacture and they confirmed that they were selling hundreds of this particular units at a time to that specific SpyShop and that they were well aware of the 100 fold markup. >But you're right, it's always worth talking to these people, often a bit of >"social engineering", turning the spying game back on them, will reveal who >is buying what. Most salesmen are too greedy to make the sale that client >ethics go straight out the window! Heck, a 100 fold markup is a pretty good markup. Your right about turning the spying game back on them with a few phone calls [Grin] >I trust your autumn isn't getting too cold for you down there, the fine >weather is just starting here, we're up to 3 degrees centigrade today! > >Best regards, > >Craig -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2726 From: James M. Atkinson, Comm-Eng Date: Wed Mar 14, 2001 1:17pm Subject: Capital Q&A: James Woolsey on spies and rogue missiles Capital Q&A: James Woolsey on spies and rogue missiles http://www.vny.com/cf/News/upidetail.cfm?QID=167776 Tuesday, 13 March 2001 18:55 (ET) Capital Q&A: James Woolsey on spies and rogue missiles By CARMEN J. GENTILE WASHINGTON, March 13 (UPI) -- R. James Woolsey is a Washington insider of the first rank, having served as director of central intelligence and in a host of other key roles -- from helping create the first outlines of a missile defense program to forging military bonds with European allies. So when Woolsey talks about spies or missile shields, Washington listens. In an interview with United Press International, Woolsey warned against complacency in the U.S. intelligence community in the wake of the arrest of FBI agent Robert Hanssen for allegedly selling U.S. secrets to the Soviets for 15 years. Woolsey said agencies like the FBI and the CIA -- which had its own notorious spy case involving Aldrich Ames -- may have been lulled "because they couldn't quite believe that one of their career case officers was a Soviet spy. ...That's one of the things you have to be very humble about, in a sense." And Woolsey says missile defense, far from being pie in the sky, is evolving to the point where rogue missiles would be "much easier to shoot down" than earlier plans would have allowed. Currently a partner at the law firm of Shea & Gardner in Washington, Woolsey returned to the private sector in January 1995 after serving two years as director of central intelligence. Woolsey has also served as: ambassador to the negotiations on Conventional Armed Forces in Europe; undersecretary of the Navy; general counsel to the Senate Committee on Armed Services and adviser on the U.S. delegation to the Strategic Arms Limitation Talks. He was also appointed by President Reagan as delegate-at-large to the U.S.-Soviet Strategic Arms Reduction Talks and Nuclear and Space Arms Talks. Excerpts of the interview follow. Woolsey put only one restriction on the questions: "No tunnel talk," a reference to the reported multimillion-dollar secret tunnel built next to the Soviet Embassy in Washington that Hanssen's alleged spying may have compromised. Hanssen allegedly divulged its existence to the Soviets as early as 1985. If that scenario is correct, the tunnel would have been useless an information-gathering source during Woolsey's tenure at the CIA. Q. Can you assess the damage caused by the alleged spying activities of Robert P. Hanssen? A. It appears from the affidavit, and that's all any of us can go on, that the damage is quite substantial because it looks as if he got two people killed, though (convicted CIA traitor) Ames got between 10 and 13 killed. Two of the people he fingered were apparently two that Ames had named as well. A third was imprisoned as a result of what he said. Hanssen was apparently exposed to a number of programs in other agencies including technical collection programs. It's hard to know exactly what these were from the affidavit. Q. Could you surmise what the technical collections were? A. No, I probably wouldn't even if I could -- just the context of the way they're presented on the affidavit suggests they were quite important. ... It looks as if he gave (his handlers) documents about intelligence planning and what we were focusing on and probably a lot of material that helped the KGB avoid surveillance by the FBI here and the CIA overseas. And he appears to have had access to material from agencies other that than the FBI. Q. The CIA? A. Some of these documents look like they may be CIA documents, some from the State Department, we don't know. But they do, just from the titles in the affidavit, appear to be of substantial importance. Q. Do you believe there are currently other counterspies infiltrating intelligence agencies in high positions such as Hanssen's? A. Woolsey: It's hard to say. One hopes not, but you always have to act as if there may well be. You have to be a little bit paranoid to be in the counterintelligence business. Hopefully it's paranoia that's somewhat under control because you can't go making wild accusations about people based on flimsy evidence, ruining people's lives and careers. But on the other hand, you have to follow diligently every lead, including looking at your own organization. I think the CIA had a hard time capturing Ames because they couldn't quite believe that one of their career case officers was a Soviet spy. And I think the FBI had a hard time catching Hanssen because of a similar assumption about FBI agents. So that's one of the things you have to be very humble about, in a sense. If you are in the counterintelligence business, you cannot assume your organization is completely able to avoid penetration. No matter how fine the barrel of apples -- a barrel of both the clandestine service in the CIA and FBI special agents, who are wonderful, talented, extraordinarily, able, patriotic people -- any barrel of apples can have a bad one in it. And it has happened now two or three times to both the FBI and the CIA. This ought to put to rest the idea that there is no sector of intelligence that does not need to be serious about counterintelligence because a foreign power would not be able to penetrate it. That just appears to be wrong. Q. In the Ames case, the convicted CIA traitor was living what appeared to be well beyond his means -- he had a nice home and he drove an expensive car. To the general public, these things would automatically arouse suspicion. Why was it that following his conviction the FBI did not appear to improve its security and adopt CIA practices such as the use of polygraph tests and regular checks of agents financial records? A. Ames was able to succeed in spying for nine years in spite of the fact that he was spending money on some things beyond his salary. I believe it happened because back after 1975, the CIA's security and counterintelligence operations were heavily decentralized. Before 1975 they had been in the control of a single individual, James Angleton (legendary former deputy director of counter-intelligence at the CIA), who figures prominently in a lot of spy novels, and in many ways was a very successful and able man who did a lot of positive things for the country and the CIA. But like a number of people, he probably stayed in the job a few years too long, he got a bit paranoid at the end. He did ruin a few people's careers who in fact did nothing wrong. He came to the view, for example, that if you believed in the sign of Soviet split, you may well be suspect. And so after he was fired in 1974, the CIA overreacted to Angleton's centralization of power and authority and very heavily decentralized its counterintelligence and security operations. And as a result, the milieu that Ames came into when he started to spy in 1985 was one in which the people who knew about his spending on his house did not know about his drinking, and the people that knew about his drinking didn't know about his polygraph (results). One of the things the CIA did in the aftermath of the Ames affair, in addition to increasing our level of attention to people's finances, was to consolidate substantially the security and counterintelligence responsibilities out at Langley (CIA headquarters in suburban Virginia) so that things wouldn't fall through the cracks. I don't know how the FBI runs its programs for polygraphs and financial reporting. That's entirely up to them. And I'm sure that as Judge Webster does his review, he will come up with some recommendations for strengthening those procedures. But I am under the impression that they didn't take the types of steps after 1994 that we did at the CIA. I think you have to admit, however, (and) anyone who would be critical of the FBI on this issue would have to admit, that Hanssen, assuming he is guilty as charged, was an extremely clever spy. Not only was he in counterintelligence, so he knew about surveillance techniques and the like, but it's also the case that he was able to figure out which Soviet case officers did not have mail cover, so he could go ahead and contact them. He also generally, except perhaps for some of the private school tuition for his children, appeared to live very much within his means. He did not throw money around the way Ames did, and he convinced everyone that he was a devout religious man, family man and lived that kind of lifestyle. Part of his cleverness was in not showing that he had a lot of extra money that other spies have from time to time. Q. Do you think the bureau will follow suit and step up its security measures? A. I'm sure all of their measures will be up for review and I'd be surprised if there weren't some modifications to them. Q. Why do you think he did it, if in fact he is found guilty? A. That's one of the strangest aspects of this case. He seems to be in part motivated by money, but not exclusively, and in part motivated by a sense of arrogance and the challenge -- this business in the affidavit about bragging how he had wanted to do this since he was 14 years old and his sense of superiority, as well as denigrating the FBI and the U.S. government. He seems to be an individual whose personality and his arrogance had something to do with his decision to try and make this work. Q. A recent article in Washington Post questions the origin of the KGB documents that exposed Hanssen. Do you have any idea where these alleged documents came from? A. If I knew, I wouldn't say. Q. Switching gears, in 1996 you testified in front of the Senate Select Committee on Intelligence that "ballistic missiles can, and in the future increasingly will, be used by hostile states for blackmail, terror and to drive wedges between us and our friends and allies." It was your judgment then that the Clinton administration was not "giving this vital problem the weight it deserves." Do you see the Bush administration giving it the proper weight it deserves, and how would they going about doing so, if they are not already? A. Well certainly I think their commitment to missile defense suggests more attention. Secretary of Defense Donald Rumsfeld chaired a commission in '97-98 I served on that called a lot of attention to this problem. The Clinton administration was in the process of sort of pooh-poohing it when, about six weeks after the report was issued, the North Koreans launched a missile that had a partially successful third stage that then later failed. It flew over Japan into the Pacific, and that suggested that the North Koreans were rather far along in missile development that conceivably would be able to reach the United States, at least at an early stage in Alaska or Hawaii. That appeared to be the event -- the combination of the Rumsfeld Commission report and North Korean test -- that finally more or less woke up the Clinton administration. I think the system that they deployed, or were planning to deploy, or might have been planning to deploy, had a lot of weaknesses. The Bush administration (is) focused on trying to move promptly to do something about this issue. I think this had now spread to the point that it is a serious concern all across the political spectrum. I think this issue is really catching on, and the question is not whether, but how, the U.S. will deploy some type of missile defense. Q. Some European countries and Russia have balked, saying that in varying degrees they were not in support of Bush's proposed missle defense plan. Now Germany has changed its stance on the U.S. missile strategy and even Russian President Vladimir Putin has said that it is important for Russia to ally itself with the West to combat rogue states. A. Our allies, first and foremost, and maybe even Mr. Putin, are responding to American firmness of will. When the United States expresses itself as determined to do something, people tend to take that seriously. The Clinton administration never expressed any sense of determination about this matter. I think it is beginning to seep in that the Bush administration is not planning something similar to its predecessors. The Clinton administration called it National Missile Defense and their system was solely designed to protect the Unites States. The reason it was designed that way was due to what's called a mid-course intercept system that could intercept ballistic missiles long after they are launched into space, where they are hard to pick out against the background of space and moving at several miles per second. The reason the Clinton administration system was designed that way, was that they wanted to make them resemble as close as possible the systems that would have been permitted by the 1972 U.S.-Soviet ABM treaty. If you start from the other end, and ask what is strategically useful, I think you don't end up focusing principally on a mid-course system, but rather on something that would shoot down (a) ballistic missile in what's called boost phase, that is, an early stage of flight when they are large, slow and hot. At those early phases of flight, they are much easier to shoot down. The question is getting the missile that would shoot them or the satellite that would get in their way or laser beam that would destroy them close enough so that it could do the job during the early stage of their trajectory. A system like that (proposed by the Bush administration) has an added advantage of protecting everybody, not just the United States. For example, let's say the United States had a missile site in eastern Turkey and could shoot down shortly after it was launched anything coming out of Iraq. That doesn't just protect the United States, it protects Germany and Russia and essentially everyplace in the world. So I would hope and think that our allies, and maybe even the Russians, would be more favorably disposed toward a system that could protect them as well as us, rather than one such as the Clinton administration was pursuing that could only protect the Unites States. Some of the critics in Europe of the Clinton administration's NMD proposal said it was an expression of ''fortress America,'' and they had a point. As long as you're using a mid-course system based in the United States, you're only protecting the United States, but if you are shooting these things down in boost phase, you're protecting everybody. If I were a German, I would feel more positively about a system protecting me as well as the Unites States, than I would about one that was just protecting the United States. Q. How closely does the Bush missile plan resemble the Strategic Defensive Initiative or "Star Wars" plan proposed by President Reagan? A. President Reagan's initial interest was in directed-energy weapons, satellites in space with lasers or particle beams that would shoot down missiles in boost phase. And that grew to the somewhat derisory term "Star Wars," suggesting that it was a very far-out idea. The Bush administration, the first Bush administration, focused on something called the Global Protection System that they worked on cooperatively with Russians when President Yeltsin expressed interest in it in 1992. That had several components, but one of them was a rather simpler idea which was boost-phase intercepts using small satellites that would not fire lasers, but would be expendable themselves, and move into the path of a ballistic missile as it was coming up in boost phase. That project was called Brilliant Pebbles: The satellites were small, but they had a lot of sophisticated electronics on them for intercepting technologically advanced Russian missiles. There are other ideas for doing this, including one that I support called Burros, which are also small satellites that move into the path of missiles, but aren't as sophisticated. They're designed to deal with missile threats from Iraq, Iran, North Korea and the like. I don't know what this Bush administration is going to do, but whether you are talking about shooting down a ballistic missile in boost phase from the surface from the earth, or these relatively simple satellites, that technology is somewhat simpler than what the Clinton administration was trying to do. They really were trying to hit a bullet with a bullet. Q. There has been speculation that the SDI was more or less a scare tactic than a feasible missile defense system, designed to frighten the Russians to spend on defense into bankruptcy. A. I think it may have had that effect. I think President Reagan thought that something could be deployed relatively quickly, and I think he was committed to it and sincere about it. The Russians, I think, thought we could probably deploy something rather quickly. After all, they went into space first in 1958, and a few years later, President Kennedy said we would put a man on the moon by the end of the decade. And in 8 ? years, you have Americans walking on the moon on live television and by all reports the Soviet Politburo watching it on television were stunned and some of them weeping. So they knew what the Unites States could do if it put their mind to it, in space and in technology. President Reagan's original concept of directed energy in space was a very challenging technology and I think it did have the effect of frightening the Russians into spending a great deal more on their military. It was definitely one of the things that demoralized them and helped bankrupt their system. SDI had a hand in helping end the Cold War successfully. -- Copyright 2001 by United Press International. All rights reserved. -- -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2727 From: Paolo Sfriso Date: Wed Mar 14, 2001 0:41pm Subject: Digital Radio Transmittion Sound website Dear Collegues. The following link might be of interest for comparing unusual digital radio transmittion sounds. http://www.wunclub.com/sounds/index.html Your Italian Connection Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 paulsfriso@t... www.grupposit.com [Non-text portions of this message have been removed] 2728 From: Gerard P. Keenan Date: Wed Mar 14, 2001 8:02pm Subject: New Info Sorry for the cross postings but I wanted to provide some update on my business/company. We are now known as: Executive Assets, Inc. Gerard P. Keenan, Dir. of Operations 1005 Celia St. West Islip, NY 11795-2503 (631) 587-4020 (ph) (516) 768-9602 (cell/mobile) (530) 323-6832 (Jfax) secureops@e... gkeenan@s... http://www.geocities.com/executiveassets GPKeenan Co., Int'l Security Services will remain in operation as a subsidiary of Executive Assets and will serve primarily as the administrative/research/analysis part of the operation handling publishing, the three restricted mailing lists, terrorism database, and other similar operations. Cheers! Jerry Keenan [Non-text portions of this message have been removed] 2729 From: Date: Thu Mar 15, 2001 3:13am Subject: An Irish Friendship Wish ! AN IRISH FRIENDSHIP Wish May there always be work for your hands to do; May your purse always hold a coin or two; May the sun always shine on your windowpane; May a rainbow be certain to follow each rain; May the hand of a friend always be near you; May God fill your heart with gladness to cheer you ! Happy Saint Patrick's Day ! ; Mar.17 Top of the Day ! To all ! HAVE A GREAT DAY !!! 2730 From: Edward J. Michaels Date: Wed Mar 14, 2001 9:14pm Subject: REI reply to assistance? I guess this is all 1 each OSCOR, ORION and CPM-700 gets you when dealing with a busy manufacturer? "Hello Edward J. We have received you're request and will respond as soon as possible. Thank You, Research ELectronics Intl. Copyright ©2000 Research ELectronics Intl. All Rights Reserved" [Non-text portions of this message have been removed] 2731 From: Charles P Date: Thu Mar 15, 2001 8:59am Subject: Re: REI reply to assistance? Sounds to me like an automated email response- just a courtesy to acknowledge that your message was received. Tom Jones (prez of REI) is usually active on this list so you probably will get a response now! :) ----- Original Message ----- From: "Edward J. Michaels" To: Sent: Wednesday, March 14, 2001 10:14 PM Subject: [TSCM-L] REI reply to assistance? > I guess this is all 1 each OSCOR, ORION and CPM-700 gets you when > dealing with a busy manufacturer? > > "Hello Edward J. > > We have received you're request and will respond as soon as possible. > > Thank You, > Research ELectronics Intl. > Copyright ©2000 Research ELectronics Intl. All Rights Reserved" From: Matthew Paulsen Date: Sat Mar 9, 2002 6:42pm Subject: Implementation of "smart card" technology across DoD by 2003 <> By Gerry J. Gilmore American Forces Press Service WASHINGTON, March 8, 2002 ñ- Implementation of "smart card" technology across DoD by 2003 will enable the department to deploy troops faster and safeguard its people and facilities better, the card's program manager said March 5. DoD's Common Access Card is a plastic identification card with an embedded 32-kilobyte memory chip, said Mary Dixon, director of the DoD Access Card Office. The card has already been issued at many stateside and overseas locales, and about this time next year, 4 million active-duty military, selected reservists, DoD civilians and eligible contractor employees are expected to have them, she noted. The card and stored data can be tied into computer networks for personnel actions and added security. It has proven its worth in speeding troop processing times during recent testing at Schofield Barracks, Hawaii, Dixon noted. The 25th Infantry Division troops there used to have to spend one or more days preparing for deployments using paper records, she said. The cards reduced deployment processing times to about an hour or two for each individual who took part in the test, Dixon remarked. And besides getting troops to the front faster, she noted, Common Access Cards could save time in a number of other ways. "We're returning that time to the units -- they can use it for training," she explained. Security concerns across DoD have been greatly heightened because of the Sept. 11 terrorist attacks, Dixon noted. Widespread use of smart card technology for identification purposes will also enhance DoD's security infrastructure, she noted. Personal identification numbers today, and biometric data such as fingerprints in the future, can be contained on the card, making it much more secure than paper IDs, Dixon said. "There is a one-in-a-million chance that you might guess a person's six-digit PIN," she explained, adding that the card automatically locks up to deny access after receiving three incorrect PINs. Widespread use of Common Access Cards should bolster security for DoD's people, buildings and facilities, Dixon noted. The new technology, she added, also allows a "one- card-fits-all" system, so IDs, Public Key Infrastructure tokens, and multiple security passes could be melded onto one card. Unlike easily duplicated paper ID cards, common access cards -- with their one-of-a-kind computer chips and embedded biometric data -- can facilitate secure access into a sophisticated computer security network, Dixon explained. If a common access card is lost or stolen, she noted, the identification and security accesses on the card can be invalidated immediately. Biometric information already in the card's computer database, she added, would be checked when a request is made for a replacement card. Issuance of Common Access Cards contains myriad checks and balances to ensure integrity, Dixon noted. A fraudulently issued card might conceivably get past security officials at first, but definitely not for long, she said. 4984 From: Hawkspirit Date: Sun Mar 10, 2002 9:48am Subject: R.F. Phone Believe me I did that, but this a Donald Trump personality and you can't tell him much, so, if I have to recommend an RF linked phone, what is the most difficult to demodulate? I am going to pick up a Seimens Gigaset next week and test it. Roger At 11:10 AM 3/10/2002 +0000, you wrote: >From: "James M. Atkinson" >Subject: Re: R.F. telephones > > >The first rule of communications security is: "If it has an antenna >it is not immune from eavesdropping". > >Instead of trying to find a "secure" cordless phone for your client, >your efforts would best be spent educating the client as to why he >should not be using a cordless phone if he is concerned about privacy. > >-jma 4985 From: James M. Atkinson Date: Sun Mar 10, 2002 9:54am Subject: Re: R.F. Phone In that case there is no legitimate product available, and you should tell your client that his expectations are unrealistic. Don't be afraid to hold your ground, the client will respect you for it. I have personally had so educate some of the richest multi-billionaires in the US, and you have to be pragmatic when dealing with these folks. Don't tell them what they want to hear, but what they need to hear, and always be up front with them... always. -jma At 7:48 AM -0800 3/10/02, Hawkspirit wrote: >Believe me I did that, but this a Donald Trump personality and you can't >tell him much, so, if I have to recommend an RF linked phone, what is the >most difficult to demodulate? I am going to pick up a Seimens Gigaset next >week and test it. Roger > > > >At 11:10 AM 3/10/2002 +0000, you wrote: >>From: "James M. Atkinson" >>Subject: Re: R.F. telephones >> >> >>The first rule of communications security is: "If it has an antenna >>it is not immune from eavesdropping". >> >>Instead of trying to find a "secure" cordless phone for your client, >>your efforts would best be spent educating the client as to why he >>should not be using a cordless phone if he is concerned about privacy. >> > >-jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4986 From: Michael Puchol Date: Sun Mar 10, 2002 11:55am Subject: Re: R.F. Phone Yes, but you also have to give him a solution, or you might get fired - a compromise here is a mix between using a somewhat-secure phone (like a DECT Gigaset), and teaching your costumer not to talk anything of a sensitive nature over it. I agree that there are many situations in which you MUST tell your costumer "it can't be done", but let's be realistic - DECT demodulators/decryptors are not over-the-counter items, nor are they available at spy shops - so with the above compromise, I don't think this guy will be in any real danger. You can download the DECT security specifications, plus cryptanalysis papers from the ETSI web site - an attack on DECT would most likely involve a man-in-the-middle scenario, or really heavy post-processing. In any case, it's not an easy task, or something that any bozo with a scanner will be able to do. All the best, Mike ----- Original Message ----- From: "James M. Atkinson" To: Sent: Sunday, March 10, 2002 4:54 PM Subject: Re: [TSCM-L] R.F. Phone > > In that case there is no legitimate product available, and you should > tell your client that his expectations are unrealistic. Don't be > afraid to hold your ground, the client will respect you for it. > > I have personally had so educate some of the richest > multi-billionaires in the US, and you have to be pragmatic when > dealing with these folks. Don't tell them what they want to hear, but > what they need to hear, and always be up front with them... always. > > -jma > > > At 7:48 AM -0800 3/10/02, Hawkspirit wrote: > >Believe me I did that, but this a Donald Trump personality and you can't > >tell him much, so, if I have to recommend an RF linked phone, what is the > >most difficult to demodulate? I am going to pick up a Seimens Gigaset next > >week and test it. Roger > > > > > > > >At 11:10 AM 3/10/2002 +0000, you wrote: > >>From: "James M. Atkinson" > >>Subject: Re: R.F. telephones > >> > >> > >>The first rule of communications security is: "If it has an antenna > >>it is not immune from eavesdropping". > >> > >>Instead of trying to find a "secure" cordless phone for your client, > >>your efforts would best be spent educating the client as to why he > >>should not be using a cordless phone if he is concerned about privacy. > >> > > >-jma > -- > > -------------------------------------------------------------------------- ------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------- ------------------------ > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > -------------------------------------------------------------------------- ------------------------ > As Cuvier could correctly describe a whole animal by the contemplation of > a single bone, so the observer who has thoroughly understood one link in > a series of incidents should be able to accurately state all the other ones, > both before and after. - Sir Arthur Conan Doyle > ------------------------------------------------------------------------ -------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 4987 From: James M. Atkinson Date: Sun Mar 10, 2002 0:02pm Subject: The Lie Behind the Lie Detector http://antipolygraph.org/pubs.shtml Polygraph Publications The Lie Behind the Lie Detector http://antipolygraph.org/lie-behind-the-lie-detector.pdf 2nd digital edition. 739 kb PDF.* Click on above link with right mouse button to save to disk. While an HTML version of the 2nd edition of The Lie Behind the Lie Detector is not yet available, you may still browse the 1st edition in HTML format By George W. Maschke and Gino J. Scalabrini 176 Pages Executive Summary POLYGRAPH "testing" has no scientific basis: it's entirely dependent on your ignorance and fear. Educate yourself. In this book, you will discover the trickery on which polygraph "testing" depends, and learn how to make sure you pass your polygraph "test." Our government's reliance on unreliable polygraph "testing" is both a danger to our national security and a hazard to the reputations of law-abiding citizens whose trustworthiness is judged by this voodoo science. The Lie Behind the Lie Detector exposes polygraph waste, fraud, and abuse. Chapter One covers the validity of polygraph "testing." Polygraphy can have no scientific validity because it is not a scientific procedure. Chapter Two discusses polygraph policy, with special emphasis on the Aldrich H. Ames espionage case. In addition, the false positive problem in polygraph security screening is also discussed in detail. Chapter Three exposes the trickery on which polygraph "testing" depends. Chapter Four provides detailed instructions on how to use polygraph countermeasures to protect yourself against becoming a false positive. Chapter Five discusses grievance procedures for those who have been falsely accused based on polygraph chart readings. The Lie Behind the Lie Detector is free for non-commercial use and distribution. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4988 From: Al Arango Date: Sun Mar 10, 2002 9:35am Subject: Re: Light-bulb carrier current -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, Here's a couple: Some vendors: http://www.smarthome.com/7528.html http://216.190.224.33/servlet/cat/product/CVL32.html The manufacturer/importer: http://www.seaview.com/index.htm Best Reagrds Al At 10:35 PM 3/8/2002 -0500, you wrote: >This one is not exactly a "functioning" light bulb but it does have ir led's >in it: > >http://www.gadgethome.com/cgi-local/SoftCart.exe/scstore/p-SVSB1.html?E+scst >ore > >Charles > > >charles@t... >Global Communications >Tarrytown, NY >www.telephonesecurity.com > > >----- Original Message ----- >From: >To: "TSCM-Group" >Sent: Friday, March 08, 2002 3:38 PM >Subject: [TSCM-L] Light-bulb carrier current > > > > Anyone know of an actual, non theoretical, functioning in the field > > carrier current device contained in a working light bulb? Might save me > > a trip if it's in the realm of Elvis sightings and bigfoot. Thanks for > > any help! > > > > Martin Brown > > Brown & Sikes, Inc. > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -----BEGIN PGP SIGNATURE----- Version: PGP Personal Privacy 6.5.3 iQA/AwUBPIt9J1AWwP1+SxuBEQJS3gCg7JHcWmU6dCRROEZdY7MRCoON9+8AoJdd j7PsJjvIh6RH5z4rPZznkUN3 =oWTP -----END PGP SIGNATURE----- 4989 From: Markku-Juhani O. Saarinen Date: Sun Mar 10, 2002 0:51pm Subject: Re: R.F. Phone On Sun, 10 Mar 2002, Michael Puchol wrote: [clip] > You can download the DECT security specifications, plus > cryptanalysis papers from the ETSI web site - Hmm, that is not entirely accurate.. It is true that ETSI has made the design and analysis of some newer telephony security standards available (e.g. the 3GPP algorithms), but the details of DECT, TETRA, and GSM encryption algorithms are still restricted. They've made some generic "analysis" available (like ETSI EN 300 175-7 regarding DECT), but these documents do not contain sufficient amount of technical detail to be useful to a cryptanalyst. Of course that doesn't mean that the details of encryption algorithms wouldn't have leaked to some or been reverse engineered; especially the GSM security algorithms are nowadays described even in cryptography textbooks. But they are not officially available from ETSI ! > an attack on DECT would most likely involve a man-in-the-middle > scenario, or really heavy post-processing. In any case, it's not an easy > task, or something that any bozo with a scanner will be able to do. True.. of course "any bozo" can probably still put their tap on the wire since encryption stops there. The amount of postprocessing (i.e. computational effort required to recover the key) can be debated. Cheers, - mjos Markku-Juhani O. Saarinen Helsinki University of Technology 4990 From: Michael Puchol Date: Sun Mar 10, 2002 2:03pm Subject: Re: R.F. Phone > [clip] > > You can download the DECT security specifications, plus > > cryptanalysis papers from the ETSI web site - > > Hmm, that is not entirely accurate.. Agreed. The document you mention below (I just checked it again) only provides generic security information about DECT, and some analysis on security/attack scenarios... > It is true that ETSI has made the design and analysis of some newer > telephony security standards available (e.g. the 3GPP algorithms), but the > details of DECT, TETRA, and GSM encryption algorithms are still > restricted. They've made some generic "analysis" available (like ETSI EN > 300 175-7 regarding DECT), but these documents do not contain > sufficient amount of technical detail to be useful to a cryptanalyst. ... but enough for me to see that this isn't some simple digital coding/scrambling scheme - it has some relative security. > Of course that doesn't mean that the details of encryption algorithms > wouldn't have leaked to some or been reverse engineered; especially the > GSM security algorithms are nowadays described even in cryptography > textbooks. But they are not officially available from ETSI ! Yup. And the DECT security algorithms have also leaked - specially since every manufacturer of a DECT device needs them, which inevitably sends them out in the open... > > an attack on DECT would most likely involve a man-in-the-middle > > scenario, or really heavy post-processing. In any case, it's not an easy > > task, or something that any bozo with a scanner will be able to do. > > True.. of course "any bozo" can probably still put their tap on the > wire since encryption stops there. The amount of postprocessing > (i.e. computational effort required to recover the key) can be debated. OK, the line tap is true, but the original discussion concerned on securing the air portion of the conversation, if the wire is not secure after that, then there's not much to discuss I guess :-) The old scenario of throwing ten high-security padlocks onto a solid-steel door with reinforced hinges, only to leave a window open afterwards. All the best, Mike 4991 From: Matthew Paulsen Date: Sun Mar 10, 2002 2:56pm Subject: FW: Implementation of "smart card" technology across DoD by 2003 Reposting to group. -----Original Message----- From: Thomas (Yahoo!) [mailto:thomasroygarner@y...] Sent: Sunday, March 10, 2002 9:10 AM To: mpaulsen6@a... Subject: RE: [TSCM-L] Implementation of "smart card" technology across DoD by 2003 Has anyone seen these cards yet? I have one (active duty) and for those that have had military experience, this may come as a laugh. One item is the cost of these cards. I haven't seen much discussion on this, however, if one is to break down the costs (and I'm estimated largely here, so please forgive), we are GOING to see a HUGE administrative cost regarding the new ID cards. Guessing that in about four years (give/take), and I'm not including advancement, card replacement and influx of new personnel, since the cards are now being distributed Navy Wide, the cost is going to increase. I was issued my card about one month ago, according to the ID Card (civilian) processor, these cards cost between (not exact so don't flame me ok?) $10.00 - $15.00 each. My card is good for four years, so, imagine, Navy wide, @ $10-15 bucks a card, every four years, how much money this is going to cost. Assuming an estimated number of personnel @ around 100,000 (HUGE ESTIMATE WARNING!!! Figures not verified) personnel, your looking at $1-$1.5 yearly cost in about four years, once the cards come online. So, I'm assuming we will start seeing "notes" regarding how to take care of ones card, not to damage them, misplace them, etc. Since, they are only issuing the cards (in my area) on advancement and/or extensions. OK, so the #'s are not exact, but the point there will be a cost increase. What happens if a new encryption scheme comes out? Are they going to have to replace every card? Better, what happens if the encryption is cracked? Just curious... The humorous part of my story (besides my math skills) was an attempt to purchase alcohol and use my military ID card. I had a retired military (Army personnel) who was working the counter, and b/c the ID Card looks like a "badge" and not an ID Card, he didn't believe that my card was my military ID Card, I attempted to educate this individual and state that this is indeed my new military ID card. However, the education was lost and so was the sale of goods to me b/c I do not have any other form of ID (another long story). Ok, now that I read this, it isn't that funny, but one can imagine there will be an increase in admin costs, security will be only as good as those educated, and civilian population education will be needed to ensure that everyone knows what the "new" ID card looks like. Ohh yeah, and the printed text on my card is starting to chip away, where my Pay Grade / Rank is listed, the text is starting to flake off, so soon, I'll have to go back to my PSD and request a new ID Card b/c the old card is slowly becoming unreadable. Thomas Roy Garner SETIPRIME ( http://www.setiprime.com ) 4580576 (ICQ)/thomasroygarner (Y!) -----Original Message----- From: Matthew Paulsen [mailto:mpaulsen6@a...] Sent: Saturday, March 09, 2002 4:43 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Implementation of "smart card" technology across DoD by 2003 <> By Gerry J. Gilmore American Forces Press Service WASHINGTON, March 8, 2002 ñ- Implementation of "smart card" technology across DoD by 2003 will enable the department to deploy troops faster and safeguard its people and facilities better, the card's program manager said March 5. DoD's Common Access Card is a plastic identification card with an embedded 32-kilobyte memory chip, said Mary Dixon, director of the DoD Access Card Office. The card has already been issued at many stateside and overseas locales, and about this time next year, 4 million active-duty military, selected reservists, DoD civilians and eligible contractor employees are expected to have them, she noted. The card and stored data can be tied into computer networks for personnel actions and added security. It has proven its worth in speeding troop processing times during recent testing at Schofield Barracks, Hawaii, Dixon noted. The 25th Infantry Division troops there used to have to spend one or more days preparing for deployments using paper records, she said. The cards reduced deployment processing times to about an hour or two for each individual who took part in the test, Dixon remarked. And besides getting troops to the front faster, she noted, Common Access Cards could save time in a number of other ways. "We're returning that time to the units -- they can use it for training," she explained. Security concerns across DoD have been greatly heightened because of the Sept. 11 terrorist attacks, Dixon noted. Widespread use of smart card technology for identification purposes will also enhance DoD's security infrastructure, she noted. Personal identification numbers today, and biometric data such as fingerprints in the future, can be contained on the card, making it much more secure than paper IDs, Dixon said. "There is a one-in-a-million chance that you might guess a person's six-digit PIN," she explained, adding that the card automatically locks up to deny access after receiving three incorrect PINs. Widespread use of Common Access Cards should bolster security for DoD's people, buildings and facilities, Dixon noted. The new technology, she added, also allows a "one- card-fits-all" system, so IDs, Public Key Infrastructure tokens, and multiple security passes could be melded onto one card. Unlike easily duplicated paper ID cards, common access cards -- with their one-of-a-kind computer chips and embedded biometric data -- can facilitate secure access into a sophisticated computer security network, Dixon explained. If a common access card is lost or stolen, she noted, the identification and security accesses on the card can be invalidated immediately. Biometric information already in the card's computer database, she added, would be checked when a request is made for a replacement card. Issuance of Common Access Cards contains myriad checks and balances to ensure integrity, Dixon noted. A fraudulently issued card might conceivably get past security officials at first, but definitely not for long, she said. --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.333 / Virus Database: 187 - Release Date: 3/8/2002 4992 From: Matthew Paulsen Date: Sun Mar 10, 2002 3:09pm Subject: RE: Implementation of "smart card" technology across DoD by 2003 The cards we were issuing (and the one I was issued) ran between $30 and $60 flat depending on weather it was a "card" or "fob" - cards were garbage, people kept putting them in their wallet, and they would break - what a concept... a card in your wallet. And then you had a badge which was simpler that ran $4 - $6 to make, and administrative overhead that was calculated at $15 - $20 for creating everything, and an additional $80 - $120 for security development for your access id's to be populated throughout the system. Matt -----Original Message----- From: Matthew Paulsen [mailto:mpaulsen6@a...] Sent: Sunday, March 10, 2002 12:56 PM To: 'TSCM submissions' Subject: FW: [TSCM-L] Implementation of "smart card" technology across DoD by 2003 Reposting to group. -----Original Message----- From: Thomas (Yahoo!) [mailto:thomasroygarner@y...] Sent: Sunday, March 10, 2002 9:10 AM To: mpaulsen6@a... Subject: RE: [TSCM-L] Implementation of "smart card" technology across DoD by 2003 Has anyone seen these cards yet? I have one (active duty) and for those that have had military experience, this may come as a laugh. One item is the cost of these cards. I haven't seen much discussion on this, however, if one is to break down the costs (and I'm estimated largely here, so please forgive), we are GOING to see a HUGE administrative cost regarding the new ID cards. Guessing that in about four years (give/take), and I'm not including advancement, card replacement and influx of new personnel, since the cards are now being distributed Navy Wide, the cost is going to increase. I was issued my card about one month ago, according to the ID Card (civilian) processor, these cards cost between (not exact so don't flame me ok?) $10.00 - $15.00 each. My card is good for four years, so, imagine, Navy wide, @ $10-15 bucks a card, every four years, how much money this is going to cost. Assuming an estimated number of personnel @ around 100,000 (HUGE ESTIMATE WARNING!!! Figures not verified) personnel, your looking at $1-$1.5 yearly cost in about four years, once the cards come online. So, I'm assuming we will start seeing "notes" regarding how to take care of ones card, not to damage them, misplace them, etc. Since, they are only issuing the cards (in my area) on advancement and/or extensions. OK, so the #'s are not exact, but the point there will be a cost increase. What happens if a new encryption scheme comes out? Are they going to have to replace every card? Better, what happens if the encryption is cracked? Just curious... The humorous part of my story (besides my math skills) was an attempt to purchase alcohol and use my military ID card. I had a retired military (Army personnel) who was working the counter, and b/c the ID Card looks like a "badge" and not an ID Card, he didn't believe that my card was my military ID Card, I attempted to educate this individual and state that this is indeed my new military ID card. However, the education was lost and so was the sale of goods to me b/c I do not have any other form of ID (another long story). Ok, now that I read this, it isn't that funny, but one can imagine there will be an increase in admin costs, security will be only as good as those educated, and civilian population education will be needed to ensure that everyone knows what the "new" ID card looks like. Ohh yeah, and the printed text on my card is starting to chip away, where my Pay Grade / Rank is listed, the text is starting to flake off, so soon, I'll have to go back to my PSD and request a new ID Card b/c the old card is slowly becoming unreadable. Thomas Roy Garner SETIPRIME ( http://www.setiprime.com ) 4580576 (ICQ)/thomasroygarner (Y!) -----Original Message----- From: Matthew Paulsen [mailto:mpaulsen6@a...] Sent: Saturday, March 09, 2002 4:43 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Implementation of "smart card" technology across DoD by 2003 <> By Gerry J. Gilmore American Forces Press Service WASHINGTON, March 8, 2002 ñ- Implementation of "smart card" technology across DoD by 2003 will enable the department to deploy troops faster and safeguard its people and facilities better, the card's program manager said March 5. DoD's Common Access Card is a plastic identification card with an embedded 32-kilobyte memory chip, said Mary Dixon, director of the DoD Access Card Office. The card has already been issued at many stateside and overseas locales, and about this time next year, 4 million active-duty military, selected reservists, DoD civilians and eligible contractor employees are expected to have them, she noted. The card and stored data can be tied into computer networks for personnel actions and added security. It has proven its worth in speeding troop processing times during recent testing at Schofield Barracks, Hawaii, Dixon noted. The 25th Infantry Division troops there used to have to spend one or more days preparing for deployments using paper records, she said. The cards reduced deployment processing times to about an hour or two for each individual who took part in the test, Dixon remarked. And besides getting troops to the front faster, she noted, Common Access Cards could save time in a number of other ways. "We're returning that time to the units -- they can use it for training," she explained. Security concerns across DoD have been greatly heightened because of the Sept. 11 terrorist attacks, Dixon noted. Widespread use of smart card technology for identification purposes will also enhance DoD's security infrastructure, she noted. Personal identification numbers today, and biometric data such as fingerprints in the future, can be contained on the card, making it much more secure than paper IDs, Dixon said. "There is a one-in-a-million chance that you might guess a person's six-digit PIN," she explained, adding that the card automatically locks up to deny access after receiving three incorrect PINs. Widespread use of Common Access Cards should bolster security for DoD's people, buildings and facilities, Dixon noted. The new technology, she added, also allows a "one- card-fits-all" system, so IDs, Public Key Infrastructure tokens, and multiple security passes could be melded onto one card. Unlike easily duplicated paper ID cards, common access cards -- with their one-of-a-kind computer chips and embedded biometric data -- can facilitate secure access into a sophisticated computer security network, Dixon explained. If a common access card is lost or stolen, she noted, the identification and security accesses on the card can be invalidated immediately. Biometric information already in the card's computer database, she added, would be checked when a request is made for a replacement card. Issuance of Common Access Cards contains myriad checks and balances to ensure integrity, Dixon noted. A fraudulently issued card might conceivably get past security officials at first, but definitely not for long, she said. --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.333 / Virus Database: 187 - Release Date: 3/8/2002 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4993 From: Steve Uhrig Date: Sun Mar 10, 2002 5:40pm Subject: Avcom spectrum analyzer FS - cheap Hello list entities, I have available for sale an Avcom PSA-65A spectrum analyzer. This unit was purchased by a firm who used it twice, cared for it precisely, and sold it off when they realized they did not have the ability to interpret its results properly. The unit comes with the optional FM demodulator, includes standard AM demod, screen overlays, padded carrying case with accessory pouch (for test leads, manuals, shoulder strap etc), handle/stand, original instruction manual in 3 ring notebook with storage pockets, recent rechargeable battery and a telescoping whip antenna suitable for the majority of uses you would have for this thing. It also has the 10 kc bandwidth filter which in addition to providing a narrower bandwidth (normal is 75kc), also increases the lower frequency limit to 200 kc instead of 1 megacycle. This unit sells new on www.avcomofva for $2855 plus $89 for the case. Due to some incompetent coding on the Avcom website, I am unable to check the price of the optional 10kc filter or FM demodulator. I will guesstimate the total cost of this unit new equipped as described, today, would be around $3500. I will sell it for about half that, or $1850. The Avcom is an industry standard spectrum analyzer, used by novices as well as many pros. Many (many!) professional sweepers never move beyond this unit. It is extremely easy to learn and use, potent, sensitive enough to do a fine job, lightweight (about 30 pounds), rugged, very common so you easily will be able to get advice if you need it, reliable, and overall a proper tool for anyone serious about sweeping and not having a blank check budget. The 10kc resolution filter and FM demodulator make this one especially attractive for TSCM as well as an excellent value. The Avcom as described above has a top frequency limit of 1 gig. I also have a downconverter which plugs directly into the PSA-65A and extends the coverage to 2 gigs. It is a fairly elegant unit, actually recalibrating the LCD frequency readout by adding one gig to the readout so you don't have to do it in your head like with other methods. This is an Avcom MFC-something piece also which you will see on their website for $565. My price if purchased with the above PSA-65A is $300, $325 if purchased separately. Separate purchase will not be unless someone buys the spectrum analyzer and does not want the frequency extender. The unit will be shipped in the original heavily padded Avcom box. Anyone interested, contact me with questions or to arrange a sale. I take credit cards for payment and will ship anywhere in the world. If it ships outside the U.S., I will include a 220>110VAC power converter. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4994 From: Hawkspirit Date: Sun Mar 10, 2002 7:57pm Subject: R.F. phones http://www.digitaljournalist.org/issue0005/radio.htm RADIOMAN Roger Williams HOW TO HAVE A CORDLESS PHONE AND MAINTAIN PRIVACY It's only been a few decades since the first rudimentary FM-based cordless phones were introduced for consumer use. With modern computer technology, consumers have a wide range of security devices available to them. However, the buyer needs to know how to find the ultimate in range and reliable security. Without this security the phone user's conversations can easily be monitored and recorded. For instance, your checking account and credit card numbers, as well as other personal information can easily be picked up by unscrupulous eavesdroppers. Most cordless phone users are unaware that anyone with a police scanning device can sit outside a user's home and listen to the private two-way conversation going on. And the party being called may not be aware that the caller is using a cordless phone and thus subject to unknown monitoring. Armed with just a little technical information, however, any buyer can make decisions regarding a cordless phone purchase from the standpoint of security, increased range, and relatively low cost. The Original Phone: 49 MHz When the mass-produced cordless devices were hooked to phone lines as wireless extensions, little thought was given to the eavesdropper. These units transmitted and received direct FM signals on a single frequency, between the government-assigned frequencies of 46.0 MHz and 49.995 MHz. Anyone with a scanner could eavesdrop. Even worse, someone with another cordless phone could be on the same frequency, and if close enough, could access the phone line of the original user to make calls which would be charged to the number of that original user's system. These phones sometimes have ten frequencies that are switchable. Anyone with one of these units can "cruise" the neighborhood, switching channels until a "live one" is found, and then use that person's phone to make a call (as soon as a dial tone is heard, the frequency is active and phone calls can be made and received using someone else's line). Unfortunately, fancy packaging surround these Star Trek-looking devices and sales continue--buyers oblivious to the dangers. The idea is to stay away from these devices which can be easily monitored. New Generation: 900 MHz Phone Systems Once all the concerns over security were voiced, manufacturers requested and received permission to build cordless extension phones in the 900 MHz band range. These extender phones have increased range, and, with the new digital technology, have increased security. However, there are many devices available which can still monitor, but not use the systems. Although this protects the phone systems from illegal use, the eavesdropper remains a problem. This unit is sold to the consumer as eavesdropper-proof, leaving the buyer with a false sense of security. A version of the unit with "Spread Spectrum Technology," which is basically secure, has been introduced in a limited number of devices. Spread Spectrum Technology is a marriage of radio and digital technology involving automated non-repeating frequency switching--computer controlled. This technology provides noise-free transmission with the cleanest audio, combined with the highest security. These systems have double the range of previous systems. A Spread Spectrum transmission is a thousand times wider than a regular cordless phone signal. With all this extra space there is room for more data to be transmitted, which increases the sound quality and reduces interference from other units on nearby frequencies. Scanners are unable to make sense of the Spread Spectrum signal, therefore making it more secure. Only high tech computer-driven systems can monitor Spread Spectrum devices--at great expense and size. If a 900 MHz system is to be purchased, it should have Spread Spectrum Technology in both the handset and the base receiver. If only one part is covered it can still be monitored easily. The Future: 2.4 GHz Systems A number of manufacturers have recently released a version of the Spread Spectrum phones at a frequency not available in any commercially made monitors. The technology is the same as in the 900 MHz Spread Spectrum devices, however, there is slightly more range, with even greater security. Manufacturers and Costs Many major manufacturers are providing the consumer with quality, high-security devices. Competition between these manufacturers is keeping down the cost to the consumer. The prices range from about $60, for the totally non-secured 49 MHz devices, to $200 for the high-end 2.4 GHz Spread Spectrum unit with caller I.D., paging, voice mail, redial, message waiting and other exotic features. Uniden Corporation, Sony, Panasonic, and AT&T are among the major suppliers of today's equipment. I recommend that warranties be carefully checked. If the salesperson can explain Spread Spectrum Technology, they may be the right one to help you in your selection. If not, look carefully at the documentation--the unit's technology may NOT be Spread Spectrum. Remember: the unit MUST have Spread Spectrum on BOTH the handset and its base. Radioman can be reached at roger.w@i... All questions are certainly welcome. 4995 From: Hawkspirit Date: Sun Mar 10, 2002 8:25pm Subject: R.F. Phone Scrambling Anyone know what flavor of scrambling they are using on this phone? http://www.pc4d.com/electronics/products/97/gh2400_cordless_phone.shtml "The Freedom Phone features security protections for your privacy. Voice scramble encodes the signal between the handset and the base when you place and receive calls, making it virtually impossible for someone to intercept or understand your private conversations. Your cordless phone also randomly selects one of 65,000 available security codes." 4996 From: Hawkspirit Date: Sun Mar 10, 2002 9:20pm Subject: R. F. phone scrambling Here is a something on Casio's security approach Security: SecureComtm uses a highly sophisticated digital voice-scrambling technology, making eavesdropping on the communication between the handset and the base virtually impossible. Automatic Digital Security Coding protects communications between the handset and base by randomly selecting one of 16 million security codes. Signals from other phones, baby monitors or other 900 MHz devices will not falsely activate CASIO COMMUNICATIONS's 900 MHz features. 4997 From: Hawkspirit Date: Sun Mar 10, 2002 9:46pm Subject: Spread Spectrum Demodulator If you think that spread spectrum or frequency hopping alone will secure your R.F. phone conversation this next section describes the demodulator chips: Spread spectrum signals are demodulated in two steps: 1) the spectrum spreading (direct sequence, frequency hopping) modulation is removed, and 2) the signal is demodulated. The process of despreading a signal is called correlation. The spread spectrum signal is despread when the proper synchronization of the spreading code between the transmitter and receiver is achieved. Synchronization is the most difficult aspect of the receiver. More time, research, effort, and money has gone into the development and improving of synchronization techniques than in any other area of spread spectrum. The problem of synchronization is further broken down into two parts: initial acquisition and tracking. There are several methods to solve the synchronization problem. Many of these methods require a great deal of discrete components to implement. But perhaps the biggest break-through has been from Digital Signal Processing (DSP) and Application Specific Integrated Circuits (ASIC). DSP has provided high speed mathematical functions that can slice up in many small parts and analyze the spread spectrum signal to synchronize and decorrelate it. ASIC chips drive down the cost by using VLSI technology and creating generic building blocks that can be used in any type of application the designer wishes. With the fast growing Part 15 and Personal Communications System (PCS) spread spectrum market, many ASIC manufactures have been designing and selling ASIC chips that take care of the most difficult problem in spread spectrum -- despreading and synchronization. With a few extra components, the amateur can have a fully functioning spread spectrum receiver. One manufacture of a spread spectrum demodulator ASIC is Loral Communications Systems (recently Unisys Communications Systems Division) DSP Components, Dept. 9065, M/S F1F12, 640 North 2200 West, Salt Lake City, Utah 84116-2988; Phone: (801) 594-2440. Their PA-100 performs the functions of despreading and demodulation, carrier recovery loop (frequency or phase), Pseudo Noise (PN) code detection, PN code tracking loop, data synchronization, and automatic gain control. It is programmable and offers a wide range of choices in data rates, modulation types, processing gains, PN codes, loop bandwidths, and tracking and acquisition procedures. It is capable of chipping rates up to 32 Mcps and data rates up to 64 Mbps. The PA-100 is controlled via a simple 8-bit interface. The chip is a 208-pin plastic Metrix Quad Flat Package (MQFP). The cost of the chip is $167.00 in single qty and $67.00 in lots of 1000. 4998 From: Lawrence Dillard Date: Sat Mar 9, 2002 8:08pm Subject: snoop diffuse CRT light group: CRT light, reflected from a wall and detected with a PMT, computer processed, enables reading the screen! Check the 16 page PDF file at: http://www.cl.cam.ac.uk/~mgk25/ieee02-optical.pdf Regards Larry Dillard 4999 From: Charles P Date: Sun Mar 10, 2002 9:48pm Subject: Re: R. F. phone scrambling Important advertising distinction... > Automatic Digital Security Coding protects communications between the > handset and base by randomly selecting one of 16 million security codes. Most likely this is NOT scrambling > Signals from other phones, baby monitors or other 900 MHz devices will not > falsely activate CASIO COMMUNICATIONS's 900 MHz features. The security codes they speak of ONLY prevent other devices from accessing the phone line, etc. They typically do NOT prevent other devices from listening. Charles ----- Original Message ----- From: "Hawkspirit" To: Sent: Sunday, March 10, 2002 10:20 PM Subject: [TSCM-L] R. F. phone scrambling > Here is a something on Casio's security approach > > Security: SecureComtm uses a highly sophisticated digital voice-scrambling > technology, making eavesdropping on the communication between the handset > and the base virtually impossible. > Automatic Digital Security Coding protects communications between the > handset and base by randomly selecting one of 16 million security codes. > Signals from other phones, baby monitors or other 900 MHz devices will not > falsely activate CASIO COMMUNICATIONS's 900 MHz features. > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 5000 From: Steve Uhrig Date: Sun Mar 10, 2002 11:07pm Subject: Comments on CASIO phones & EN-Genius > Signals from other phones, baby monitors or other 900 MHz devices will > not falsely activate CASIO COMMUNICATIONS's 900 MHz features. Casio discontinued the manufacture of all telephone equipment (Phone Mate Division) about 6 months ago. Anything still remaining is dead stock. There is a separate company contracted for warranty service, but no parts, accessories or post-warranty repairs are available. So I would question the wisdom of any investment in them unless you are willing to toss it when it croaks. You will find all telephone numbers for Casio/Phone Mate have been disconnected and their website is dead. I had just bought a new Casio Phone Mate multi line multi handset CDMA cordless phone system for the office last fall, and, as I always do, I purchase a service manual for the system so I can somehow bump up the handset volume. Both my wife and I are very hard of hearing and cannot use ordinary cordless phones because the earpiece volume is too low. I tried to get a service manual for the new cordless system and learned Casio was out of the phone business. I patiently wound my way through the labrynth on the web and on the phone to the contract service center and they said they had one manual and under the terms of their contract they were not allowed to release any technical info. I told them why I wanted it, and it turned out the boss in that office also was hard of hearing, they used the same cordless phone system, and had developed a mod to increase the earpiece volume in the cordless handset. They faxed me a schematic and indicated a single resistor to change. That worked and made the things usable. Adding a counterpoise to the antenna on the base increased the range a good bit but it still is pretty poor. Other than that, I love the phones and they are impossible to copy on a scanner. A scanner does not even stop on them. Wish I could buy more handsets for them, because I only got three with them, for me, my wife and my tech, and when one croaks the system gets replaced the next day. There were no more separate handsets available anywhere I looked. System came with one. Speaking of range, does anyone have any experience with the En-Genius super long range cordless phone system? Since my house and my office are next door to each other and share the same phone system, computers, satellite uplink, etc. I would like a cordless phone which covers both properties. The properties are fairly large but the total of 3 buildings are fairly close and all are wood frame and no foil backed insulation. No cordless phone I have tried will work reliably from the back corner of the house to the back corners of the office. I am not going to put an outside antenna on the cordless phone. I would appreciate a direct mail from anyone who has experience with these systems. I'm ready to buy one as soon as I find someone who actually has used one. Tks ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5001 From: Justin T. Fanning Date: Mon Mar 11, 2002 2:57am Subject: Re: R. F. phone scrambling That's a 24 bit authentication system (2^24 = 16,777,216), which most likely translates to 2 rows of 12 dip switches (which are almost always left in the factory default), or perhaps a few thumb wheels (that usually always get set to someone's birthday or phone number). 99% chance it's only being used to authenticate the handset to the base and Vis-‡-vis. Enough to perhaps stop the casual passer by from making toll calls, but considering this is effectively a three character password, an automated system would have it within a very short period. Not to mention that I don't believe these systems make any attempt to encode or use any Diffie-Hellman style key exchange and simply transmit their keys in the clear, so a sophisticated party could grab the key(s) right out of the air. A-K-A "Gone in 60 Seconds" garage door opener scene. My personal opinion (for what it's worth), I'd try and convince your client to not use a cordless phone as their primary handset for HEALTH reasons. Most of us are trying to eliminate excess RF from our lives, not glue a 2.4 Ghz TX to our ear (I wonder why no company has produced an IR cordless?! - IR headphones have been available for years). I think you'll find there is simply no consumer demand for highly secure cordless phones. (try a google search on +"cordless phone" and +"scramble"). A quick search showed some frequency inversion, what looked like some bit shift or bit flip techniques, but mostly snake oil. There also seems to be significant confusion at the retail end between call content security and call authentication security which frequently seemed to get blurred something like "This phone uses 65K codes so you know you're calls will be secure". Consider most major manufactures in this market want to market their products globally and a phone with built in heavy encryption spells heavy export & import issues in many countries. You could build a solution from existing off the shelf parts, Motorola and many of the majors all produce encryption modules for their two way radio lines (not sure about full duplex though), you could build this right into the handset & base. But now your talking custom installations, voided warranties, voided telco/FCC permits etc. I wonder if there is some type of external analogue encryption device that may acoustically fit to the handset, with another box between the receiver and the wall socket? This may offer a clumsy (but non warrantie/FCC voiding) solution. Have you considered an STU-IIB/STU-III minisat terminal solution? Good security, calls costs are a little higher than your average telco, but you have to love that range! :) (the ultimate cordless phone) JF --- Charles P wrote: > > Important advertising distinction... > > > Automatic Digital Security Coding protects communications between the > > handset and base by randomly selecting one of 16 million security codes. > > Most likely this is NOT scrambling > > > Signals from other phones, baby monitors or other 900 MHz devices will not > > falsely activate CASIO COMMUNICATIONS's 900 MHz features. > > The security codes they speak of ONLY prevent other devices from accessing > the phone line, etc. They typically do NOT prevent other devices from > listening. > > Charles > > ----- Original Message ----- > From: "Hawkspirit" > To: > Sent: Sunday, March 10, 2002 10:20 PM > Subject: [TSCM-L] R. F. phone scrambling > > > Here is a something on Casio's security approach > > > > Security: SecureComtm uses a highly sophisticated digital voice-scrambling > > technology, making eavesdropping on the communication between the handset > > and the base virtually impossible. > > Automatic Digital Security Coding protects communications between the > > handset and base by randomly selecting one of 16 million security codes. > > Signals from other phones, baby monitors or other 900 MHz devices will not > > falsely activate CASIO COMMUNICATIONS's 900 MHz features. > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5002 From: Charles P Date: Sun Mar 10, 2002 11:42pm Subject: Re: Comments on EN-Genius I tested an EnGenius with a Siemens 2420 Gigaset and found them to be fairly equal. The EnGenius was nothing spectacular. The significance may be the ability to add external antennae. But the Siemens also is supposed to have external antenna capability too if my memory is correct. The EnGenius was built very solidly, metal housing. Heavy though. I have a Panasonic KXT7890 ss phone with a remote handset charger. I put the base in the attic and I can get a clear signal in another building about 1/2 block away (~1/8 mile?) through trees. They discontinued that model though, so if you find one it's a good deal. Charles ----- Original Message ----- From: "Steve Uhrig" To: Sent: Monday, March 11, 2002 12:07 AM Subject: [TSCM-L] Comments on CASIO phones & EN-Genius > > Signals from other phones, baby monitors or other 900 MHz devices will > > not falsely activate CASIO COMMUNICATIONS's 900 MHz features. > > Casio discontinued the manufacture of all telephone equipment (Phone Mate > Division) about 6 months ago. > > Anything still remaining is dead stock. > > There is a separate company contracted for warranty service, but no > parts, accessories or post-warranty repairs are available. So I would > question the wisdom of any investment in them unless you are willing to > toss it when it croaks. You will find all telephone numbers for > Casio/Phone Mate have been disconnected and their website is dead. > > I had just bought a new Casio Phone Mate multi line multi handset CDMA > cordless phone system for the office last fall, and, as I always do, I > purchase a service manual for the system so I can somehow bump up the > handset volume. Both my wife and I are very hard of hearing and cannot > use ordinary cordless phones because the earpiece volume is too low. > > I tried to get a service manual for the new cordless system and learned > Casio was out of the phone business. I patiently wound my way through the > labrynth on the web and on the phone to the contract service center and > they said they had one manual and under the terms of their contract they > were not allowed to release any technical info. I told them why I wanted > it, and it turned out the boss in that office also was hard of hearing, > they used the same cordless phone system, and had developed a mod to > increase the earpiece volume in the cordless handset. They faxed me a > schematic and indicated a single resistor to change. That worked and made > the things usable. > > Adding a counterpoise to the antenna on the base increased the range a > good bit but it still is pretty poor. Other than that, I love the phones > and they are impossible to copy on a scanner. A scanner does not even > stop on them. Wish I could buy more handsets for them, because I only got > three with them, for me, my wife and my tech, and when one croaks the > system gets replaced the next day. There were no more separate handsets > available anywhere I looked. System came with one. > > Speaking of range, does anyone have any experience with the En-Genius > super long range cordless phone system? Since my house and my office are > next door to each other and share the same phone system, computers, > satellite uplink, etc. I would like a cordless phone which covers both > properties. The properties are fairly large but the total of 3 buildings > are fairly close and all are wood frame and no foil backed insulation. No > cordless phone I have tried will work reliably from the back corner of > the house to the back corners of the office. I am not going to put an > outside antenna on the cordless phone. > > I would appreciate a direct mail from anyone who has experience with > these systems. I'm ready to buy one as soon as I find someone who > actually has used one. > > Tks ... Steve > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5003 From: Shawn Hughes Date: Mon Mar 11, 2002 10:09am Subject: phones, phones, phones Guys, Short of a STU-III being fed into a RF link, there just ain't no REALLY secure cordless phones. I've looked into it for years, because I like being able to go to the shop or pubs area, while talking on the phone (trying to explain something). The trick on the CASIO and all others using "Automatic Digital Security Coding", is: that ADSC has nothing to do with voice privacy. In ye olde days, you could take your cordless phone, and cruise around hitting 'talk' until you key up somebody else's base. Especially with a ham antenna grafted onto the phone handset. Both illegal, but done. Now, the phones' base loads a code into the handset everytime you replace it into the base. It sends this code as a preamble - no code, no dialtone. On the 2.4GHz units, be wary. Many use 2.4 for the out but still use 900 MHz for the back haul. Now following the thread, I have learned something new. Can you explain in more depth what you were using, and did to demod a spread spectrum signal again, please? Sincerely, Shawn 5004 From: James M. Atkinson Date: Mon Mar 11, 2002 11:07am Subject: Seminar : "What to do after you discover the bug..." - Boston 4/27/2002 SEMINAR ANNOUNCEMENT Granite Island Group Title: "What to do after you discover the bug..." Date: April 27-28, 2002 Duration: Twelve (12) classroom hours Location: Boston, MA Who Should Attend: Government, corporate, and private TSCM specialists, counter intelligence technicians, private investigators, law enforcement officers, and security personnel who are, have been, or may be involved finding an eavesdropping device or anyone involved in investigating an eavesdropping incident. Prerequisites: There are no formal prerequisites, however; this seminar assumes the attendee has knowledge of basic TSCM, counterintelligence, or investigative skills. Scope: This seminar will cover the protocols to follow when an eavesdropping device (or suspected eavesdropping device) is discovered to ensure that the eavesdropper or device can be identified. The seminar will also cover making proper notifications, documentation procedures, collection of evidence, establishing a chain of custody, evaluating the device, and measures taken to protect the discovery, and yet identify the spy. Security Classification: This seminar is unclassified, however; the material presented will cover highly proprietary materials, specialized methods, and trade secrets. As such all attendees will be required to sign a trade secret non-disclosure agreement. Instructor: James M. Atkinson, President and Sr. Engineer, Granite Island Group; Mr. Atkinson is a TSCM specialist, counter-surveillance expert, communications engineer, security consultant, and instructor with a reputation for designing and installing some of the most powerful secure communications systems used by both government agencies and major corporations. He has personally performed hundreds of TSCM inspections and is one of the most respected names in the industry. Registration: Attendance is limited and the seminar is expected to fill up fast so complete and return the attached registration and payment as soon as possible to guarantee your seat. All registrations will be acknowledged, and each attendee will be sent an agenda, hotel registration instructions, maps, and directions to the seminar site. Registration closes 14 days before the seminar. Seminar Fee: The fee for this seminar is $1295.00 USD per attendee for early registration and payment (until March 26, 2002). The fee for attendees who register and/or pay after March 26, 2002 is $1595.00. Online Signup: http://www.tscm.com/seminar02116.html Includes: The seminar fee will include over 12 hours of formal instruction, 100+ page "Discovery Protocol" workbook, and certificate of attendance. Attendees will also receive copious proprietary handouts, worksheets, charts, various tools, forensic items, and related materials (so reserve some extra space in your luggage). The seminar fee also includes a continental breakfast and catered lunch each day, beverages, and snacks (during the class). However, attendees will be on their own for dinner, drinks, lodging, travel, etc. Payment Options: The seminar fee is payable in full in advance at the time of registration, and at least 21 days in advance either by a check, money order, PayPal payment, or credit card via PayPal to: https://secure.paypal.x.com/refer/pal=jmatk%40tscm.com). If your agency requires an invoice to facilitate payment we are happy to provide same, but the invoice will still have to paid at least 21+ days in advance. Seminar Registration Form Full payment must be received at least 21 days before seminar date Name:______________________________________________ Company:______________________________________________ Address:______________________________________________ City:__________________State: _____Zip Code:_____ Phone:__________________Fax:___________________ E-Mail______________________________ Signature______________________________Date _________ Form of Payment Check ____ Money Order ____ PayPal ____ Credit Card (via PayPal) ____ Here is the full PayPal link for this seminar in case you need it: https://www.paypal.com/xclick/business=jmatk%40tscm.com&undefined_quantity=1&item_name=Seminar+-+What+to+do+after+you+discover+the+bug/BOSTON&item_number=Seminar+02116+%5Bearly+registration%5D&amount=1%2C295.00&return=http%3A//www.tscm.com/seminar02116.html Please complete this form and email, fax, or mail, along with your payment to: Granite Island Group 127 Eastern Avenue #291Ph: (978) 381-9111 Gloucester, MA 01931-8008Fax: http://www.tscm.com/mailto:jmatk@tscm.com -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 5005 From: Matthew Paulsen Date: Mon Mar 11, 2002 11:22am Subject: Hong Kongers to get 'smart' ID cards Hong Kongers to get 'smart' ID cards http://www.cnn.com/2002/TECH/ptech/03/11/hong.kong.smart.ids.ap/index.html 5006 From: A Grudko Date: Tue Mar 12, 2002 4:29am Subject: TSCMer coming of age Troling through jma's wesite today I saw something I wanted to briefly comment on. This week my wife and I are celebrating 21 years in the PI business. I didn't note the date I started serious TSCM work but it was about a year later with the purchase of my first Scanlock. I know that Uncle James is somewhat critical of PIs who conduct sweeps but in my own defence, because the State won't appoint an attorney for me, I have to point out that I modified a pre-WW2 Marconi radio to terrorise the neighbourhood with alien noises from our garden when I was about 7. Shortly afterwards I discovered the fun that concealed wired microphones could bring to an 8 year old. At 9 I built a 'cat's whisker' LW receiver and at 11 I built my first LW/MW(AM) radio and BFO. And so it went on, including some relevant study courses, with very important practicals, but not to degree level, plus field work with a company in London. On emmigrating to South Africa in 1979 I saw an oportunity to enter the TSCM field. I have found bugs of all types and I probably missed some, but hopefully, as 'Old Blue Eyes' sings, 'too few to mention'. I keep upgrading my equipment, as my budget allows 'cos TSCM here has not been a big money earner for me but I also value the free updates and advice that I get from this group. Regards Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 5007 From: James M. Atkinson Date: Mon Mar 11, 2002 6:56pm Subject: Keep Alert and Stay Cautious (UPI) WASHINGTON, DC---- Police warn all male clubbers, party-goers and unsuspecting pub regulars to keep alert and stay cautious when offered a drink from any woman. A new date rape drug on the market, called "beer", is being used by females to target unsuspecting men. The drug is generally found in liquid form, and is now available almost anywhere. "Beer" is used by female sexual predators at parties and bars to convince their male victims to go home and have sex with them. Typically, a woman needs only to persuade a guy to consume a few units of "beer" and then simply ask him home for 'no-strings-attached sex.' Men are rendered helpless against this approach: After several "beers" men will often succumb to desires to perform sexual acts on horrific looking women to whom they would never normally be attracted. Men often awaken after being given "beer" with only hazy memories of exactly what has happened to them the night before, just a vague feeling that something bad occurred. At other times these unfortunate men are stung for their life's savings in a familiar scam known as a "relationship." Please! Forward this warning to every male you know. However, if you fall victim to this insidious "beer" and the predatory women administering it, there are male support groups with venues in every town where you can discuss the details of your shocking encounter in an open and frank manner with similarly-affected, like-minded guys. For the nearest such support group near you, just look up "Golf Courses" in the Yellow Pages. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 5008 From: James M. Atkinson Date: Mon Mar 11, 2002 6:50pm Subject: Expensive Cigars Some people are too smart for their own good. A Charlotte NC lawyer purchased a box of 24 very rare and expensive cigars then insured them against fire among other things. Within a month he had smoked his entire stock-pile of these great cigars, without yet having made even his first premium payment on the policy and duly filed a claim against the insurance company. In his claim, the lawyer stated the cigars were lost "in a series of small fires." The insurance company refused to pay, citing the obvious Reason: that the man had consumed the cigars in the normal fashion. The lawyer sued....and won! In delivering the ruling the judge agreed with the insurance company that the claim was frivolous. The Judge stated nevertheless, that the lawyer held a policy from the company in which it had warranted that the cigars were insurable and also guaranteed that it would insure them against fire, without defining what! is considered to be "unacceptable Fire," and was obligated to pay the claim. Rather than endure a lengthy and costly appeal process, the insurance company accepted the ruling and paid $15,000.00 to the lawyer for his loss of the rare cigars in the "fires." NOW FOR THE BEST PART... After the lawyer cashed the check, the insurance company had him arrested on 24 counts of ARSON!!!! (Since there was a time break between the consumption of each cigar, each consumption was ruled a separate incident). The State used his own insurance claim and court testimony from the previous case against him. The lawyer was convicted of intentionally burning his insured property 24 separate times and sentenced him to 24 months in jail, ordered him to register with the local law enforcement where ever he lives as an arsonist (same classification as a sex offender since many cases of arson are actually considered sex offenses) and had to pay a $24,000.00 fine. This is a true story and was the 1st place winner in the recent Criminal Lawyers Award Contest. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 5009 From: James M. Atkinson Date: Mon Mar 11, 2002 7:23pm Subject: Re: TSCMer coming of age Andy, You misunderstand, I don't at all have a problem with PI's performing TSCM services provided that they are good at TSCM, have legitimate equipment, and don't misrepresent themselves to their client.. If the PI has a few weeks (or even days) of formal TSCM training under their belt, AND some legitimate equipment, AND they make if very clear the client what their technical limitations are, then I applaud them in their efforts. What I have a problem are PI's who buys a $3,000 box, attends little (if any) training and then hang their shingle out claiming to be a bug sweeping expert. There is a huge difference between an engineer or technician who shows up with a half million dollars in laboratory grade test equipment, and a unemployed cop with a CPM-700. I know a number of PI's who provide TSCM services, and most know when they need to bring in "the heavy guns" (ie: an outside TSCM specialist), but they also know when a quick check with a CPM-700 may be all the client needs. -jma At 12:29 PM +0200 3/12/02, A Grudko wrote: >Troling through jma's wesite today I saw something I wanted to briefly >comment on. > >This week my wife and I are celebrating 21 years in the PI business. I >didn't note the date I started serious TSCM work but it was about a year >later with the purchase of my first Scanlock. > >I know that Uncle James is somewhat critical of PIs who conduct sweeps but >in my own defence, because the State won't appoint an attorney for me, I >have to point out that I modified a pre-WW2 Marconi radio to terrorise the >neighbourhood with alien noises from our garden when I was about 7. > >Shortly afterwards I discovered the fun that concealed wired microphones >could bring to an 8 year old. >At 9 I built a 'cat's whisker' LW receiver and at 11 I built my first >LW/MW(AM) radio and BFO. >And so it went on, including some relevant study courses, with very >important practicals, but not to degree level, plus field work with a >company in London. On emmigrating to South Africa in 1979 I saw an >oportunity to enter the TSCM field. > >I have found bugs of all types and I probably missed some, but hopefully, as >'Old Blue Eyes' sings, 'too few to mention'. > >I keep upgrading my equipment, as my budget allows 'cos TSCM here has not >been a big money earner for me but I also value the free updates and advice >that I get from this group. > >Regards > >Andy Grudko -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 5010 From: Steve Uhrig Date: Mon Mar 11, 2002 7:37pm Subject: We has arrived The Minox Historical Society makes a commemorative mug and T shirt every month as collector's items, with a different Minox camera each month. I am a member of the Executive Committee (ExComm has 2 members, elected by the membership, which is about 1000 worldwide). Check here *carefully* http://www.cafepress.com/cp/store/store.aspx?storeid=minox,minox1,minox2 Look at the shirts and the mugs. I used to be a nobody in Minox. Now I am a well known nobody. Fruit Cake ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5011 From: mwel10 Date: Tue Mar 12, 2002 2:58am Subject: Citizens of the world (humor) TOP 10 REASONS FOR BEING DUTCH 1. You can get arrested for growing plants, but not for smoking them. 2. You can make jokes about the Belgians and still drink their beer. 3.a. You can legally kill yourself. b. You can legally be killed 4. You're exactly like the Germans, except that nobody hates you. 5. You think you are a world power, but everyone else thinks Copenhagen is your capital. 6. You get to insult people and defend yourself by saying it's a national tradition. 7. You can put your finger in a dyke and it will save your country. 8. You live in the most densely populated country in Europe, and still you've never seen your neighbours. 9. If the economy is bad, blame the Germans. If a war is started, blame the Germans. If you lose your keys, blame the Germans. 10.Bikes are public property. Locks are a challenge. TOP 10 REASONS FOR BEING BELGIAN 1. You get to speak three languages, but none of them intelligibly. 2. If other countries want to fight a war, they will do it in your country. 3. You can brew drinks out of fruit, and still call it beer. 4. You are either a. like the Dutch, just less efficient b. like the French, just less romantic c. like the Germans. 5. Decent fries. Real mayonnaise. Great chocolate. The best beer. 6. No one knows anything about you, except for the Dutch and French and they make fun of you. 7. More scandals in a week than any other country in a decade. 8. You can drive like a maniac on the road and nobody cares. 9. All your famous countrymen are either imaginary, or sex-offenders. 10. Face it. It's not really a country, is it ? TOP 10 REASONS FOR BEING FRENCH 1. When speaking fast you can make yourself sound gay. 2. Experience the joy of winning the World Cup for the first time. 3. You get to eat insect food like snails and frog's legs. 4. If there's a war you can surrender really early. 5. You don't have to read the subtitles on those late night films on Channel 81 6. You can test your own nuclear weapons in other people's countries. 7. You can be hideously ugly and still become a famous film star. 8. Allow Germans to march up and down your most famous street humiliating your sense of national pride. 9. You don't have to bother with toilets, just crap in the street. 10. People think you're a great lover even when you're not. TOP 10 REASONS FOR BEING AMERICAN 1. You can have a woman president without electing her. 2. You can spell color wrong and get away with it. 3. You can call Budweiser beer. 4. You can be a crook and still be president. 5. If you've got enough money you can get elected to do anything. 6. If you can breathe you can get a gun. 7. It's cool to be really obese. 8. You can play golf in the most grotesque clothes ever made and nobody seems to care. 9. Pitch in at the 11th hour for major world conflicts. 10. You get to play/watch glorified cricket called baseball with each other and call it a "World" series. TOP 10 REASONS FOR BEING ENGLISH 1. Two World Wars and One World Cup. 2. Warm beer. 3. You get to play/watch glorified rounders called cricket. 4. You get to accept defeat very graciously in major sporting events. 5. Union jack underpants. 6. Water shortages guaranteed every single summer and flooding in Winter. 7. You can live in the past and imagine you are still a world power. 8. Bathing once a week - whether you need to or not. 9. Ditto changing underwear. 10. Beats being Welsh. TOP 10 REASONS FOR BEING SCOTTISH 1. You're not English! 2. You're not English! 3. You're not English! 4. You're not English! 5. You're not English! 6. You're not English! 7. You're not English! 8. You're not English! 9. You're not English! 10. You're not English! TOP 10 REASONS FOR BEING ITALIAN 1. In-depth knowledge of bizarre pasta shapes. 2. Unembarrassed to wear fur. 3. No need to worry about tax returns. 4. Glorious military history prior to 117AD. 5. Can wear sunglasses indoors or at night. 6. Political stability. 7. Flexible working hours. 8. Live near the Pope. 9. Can spend hours braiding girlfriend's armpit hair. 10. Country run by Sicilian mobsters. TOP 10 REASONS FOR BEING SPANISH 1. Glorious history of killing South American tribes. 2. The rest of Europe thinks Africa begins at the Pyrenees. 3. You get your beaches invaded by Germans, Danes, Brits, etc. 4. The rest of your country is already invaded by Moroccans. 5. Everybody else makes crap paella and claims it's the real thing. 6. Honesty. 7. Only sure way of bedding a woman is to dress up in stupid, tight clothes and risk your life in front of bulls. 8. You get to eat bull's testicles. 9. Gibraltar. 10. Supported Argentina in Falklands War. TOP 10 REASONS FOR BEING GERMAN 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Ok, give them a second chance 1. Oktoberfest. 2. Oktoberfest-beer. 3. BMW. 4. VW. 5. Audi. 6. Mercedes. 7. On a highway you can travel at a speed that would bring you to jail in any other country of the world. 8. You do not have to learn German as a foreign language. 9. You think sauerkraut is delicious. 10. Contrary to common belief laughing is not forbidden by law (yet). TOP 10 REASONS FOR BEING INDIAN 1. Chicken Madras. 2. Lamb Passanda. 3. Onion Bhaji. 4. Bombay Potato. 5. Chicken Tikka Masala. 6. Rogan Josh. 7. Popadoms. 8. Chicken Dopiaza. 9. Kingfisher lager. 10. Aggravate everyone else by shaking your head when talking. TOP 10 REASONS FOR BEING IRISH 1. Guinness. 2. 18 children because you can't use contraceptives. 3. You can get into a fight just by walking down someone's street. 4. Pubs never close. 5. Can use Papal edicts on contraception passed in second Vatican Council of 1968 to persuade your girlfriend that you can't have sex with a condom on. 6. No one can ever remember the night before. 7. Kill people you don't agree with. 8. Stew. 9. More Guinness. 10. Eating stew and drinking Guinness in an Irish pub at 3 in the morning after a bout of sectarian violence. TOP 10 REASONS FOR BEING CANADIAN 1. It beats being an American. 2. Only country to successfully invade the US and burn its capital to the ground. 3. You can play ice hockey 12 months a year, outdoors. 4. Only country to successfully invade the US and burn its capital to the ground. 5. Where else can you travel 1000 miles over fresh water in a canoe? 6. A political leader can admit to smoking pot and his/her popularity ratings will rise. 7. Only country to successfully invade the US and burn its capital to the ground. 8. Kill Grizzly bears with huge shotguns and cover your house in their skins. 9. Own-an-Eskimo scheme. 10. Only country to successfully invade the US and burn its capital to the ground. TOP 10 REASONS FOR BEING AUSTRALIAN 1. Know your great-grand-dad was a murdering bastard that no civilized nation on earth wanted. 2. Fosters Lager. 3. Dispossess Aborigines who have lived in your country for 40,000 years because you think it belongs to you. 4. Cricket captain not afraid to cry live on TV. 5. Tact and sensitivity. 6. Bondi Beach. 7. Other beaches. 8. Liberated attitude to homosexuals. 9. Drinking cold lager on the beach. 10. Having a bit of a swim and then drink some cold lager on the beach. TOP 10 REASONS FOR BEING GREEK 1. You get to shout about your culture although the only real culture most Greeks have is what is growing between their toes. 2. The police are even more corrupt than the criminals they are supposed to be chasing. 3. You can blow your nose in the street by pinching it between the thumb and forefinger and trumpeting forth without everyone around retching their stomach contents up at the sight. 4. Old women can sport moustaches. 5. Young women can sport moustaches. 6. Men can be hairier than the average grizzly bear and not get put in a zoo. 7. You get to call the bouzouki a musical instrument when the rest of the world sees it as an instrument of torture. 8. You are the only nation to have lost its marbles and still wants to let everyone else around the world know about it. 9. Ridiculous bureaucracy. 10. Nana Mouskouri and George Michael. Yours sincerely, Matthijs 5012 From: David Alexander Date: Tue Mar 12, 2002 7:17am Subject: re: we has arrived >Date: Mon, 11 Mar 2002 20:37:50 -0500 >From: "Steve Uhrig" >Subject: We has arrived > >The Minox Historical Society makes a commemorative mug and T shirt every >month as collector's items, with a different Minox camera each month. I >am a member of the Executive Committee (ExComm has 2 members, elected by >the membership, which is about 1000 worldwide). > >Check here *carefully* > >http://www.cafepress.com/cp/store/store.aspx?storeid=minox,minox1,minox2 > >Look at the shirts and the mugs. > >I used to be a nobody in Minox. Now I am a well known nobody. I could cope with spending 20,000 on sweep gear. I could even cope with growing a beard But if I have to have a hat like that to be a TSCMer, then I'm sticking with Information Security work ! Sorry Steve, too good an opportunity to pass up on. _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... From: Steve Uhrig Date: Tue Mar 12, 2002 8:42am Subject: Re: we has arrived From: David Alexander > I could cope with spending 20,000 on sweep gear. I could even cope with > growing a beard But if I have to have a hat like that to be a TSCMer, > then I'm sticking with Information Security work ! So now you know the secret to success in TSCM. Shhhhh -- we don't tell the stupid people. Dress for success. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5014 From: Richard Thieme Date: Tue Mar 12, 2002 2:14pm Subject: summer on the Black Sea - what could be lovelier? Anybody ever heard of these guys??????? Subject: The International Conference "INFORMATION TECHNOLOGIES AND SECURITY -2002" held June 24-29, 2002 in Partenit - Crimea - Ukraine Dear colleagues, I am writing to invite you to attend the most valuable learning and networking experience in the security industry: The International Conference "INFORMATION TECHNOLOGIES AND SECURITY -2002" held June 24-29, 2002 in Partenit - Crimea - Ukraine. The main idea of the conference is discussion of the actual problems of globalization of information system and safety of modern information technologies, the making and development of contacts between scientists and experts in different fields of science, including technologies and mass mind formation means, social, legal and technical questions of information security, legal providing and more. Conference assumes acquaintance with ideas, approaches and concrete result of theoretical and practical problems solutions. The opportunity of advertising and exhibition actions realization will be to the conference participants. Within this context, the conference seeks to: - Information systems globalization and safety - Information protection and protection from the information - Applied aspects of information technologies safety providing More detailed information about Conference- http://www.crime-research.org/ibt/ Regards, Vladimir Golubev,Ph.D Director of the Computer Crime Problems Research Center (+380)612 639-973 (+380)612 645-715 gva@c... http://www.crime-research.org/eng/ http://cybercrime.report.ru 5015 From: D.A.Linsky Date: Tue Mar 12, 2002 4:29pm Subject: All Fired up Some people are too smart for their own good. A Charlotte NC lawyer purchased a box of 24 very rare and expensive cigars then insured them against fire among other things. Within a month he had smoked his entire stock-pile of these great cigars, without yet having made even his first premium payment on the policy and duly filed a claim against the insurance company. In his claim, the lawyer stated the cigars were lost "in a series of small fires." The insurance company refused to pay, citing the obvious Reason: that the man had consumed the cigars in the normal fashion. The Lawyer sued....and won! In delivering the ruling the judge agreed with the insurance company that the claim was frivolous. The Judge stated nevertheless, that the lawyer held a policy from the company in which it had warranted that the cigars were insurable and also guaranteed that it would insure them against fire, without defining what! is considered to be "Unacceptable Fire," and was obligated to pay the claim. Rather than endure a lengthy and costly appeal process, the insurance company accepted the ruling and paid $15,000.00 to the lawyer for his loss of the rare cigars in the "fires." NOW FOR THE BEST PART... After the lawyer cashed the check, the insurance company had him arrested on 24 counts of ARSON!!!! (Since there was a time break between the consumption of each cigar, each consumption was ruled a separate incident). The State used his own insurance claim and court testimony from the previous case against him. The lawyer was convicted of intentionally burning his insured property 24 separate times and sentenced him to 24 months in jail, ordered him to register with the local law enforcement where ever he lives as an arsonist (same classification as a sex offender since many cases of arson are actually considered sex offenses) and had to pay a $24,000.00 fine. This is a true story and was the 1st place winner in the recent Criminal Lawyers Award Contest. David Linsky SSC,Inc. dlinsky@s... http://www.securesvc.com **************************************************************************** "The truth is incontrovertible. Malice may attack it. Ignorance may deride it. But in the end, there it is. " - Winston Churchill [Non-text portions of this message have been removed] 5016 From: Hawkspirit Date: Tue Mar 12, 2002 6:50pm Subject: Spread Spectrum Demodulation While conducting an R.F. sweep at a clients residence I was able to demodulate the clients cordless phone's spread spectrum signal as he was talking using the AM slope demodulator on my spectrum analyzer. Roger Tolces www.bugsweeps.com At 12:14 PM 3/12/2002 +0000, you wrote: >Can you explain in more depth what you were using, and did to demod a >spread spectrum signal >again, please? >sincerely, >Shawn 5017 From: Steve Whitehead Date: Wed Mar 13, 2002 0:02am Subject: SA's own Watergate? "Cape Town - A quagmire of espionage and bugging, that would put a James Bond movie to shame, was uncovered in the Western Cape parliamentary building on Tuesday. Sophisticated tapping and monitoring equipment was found. Sources say the scandal that may ensue has the potential to become South Africa's own Watergate scandal. National Intelligence has already started an investigation into the matter. The former Western Cape administration under Gerald Morkel, former premier and current mayor of Cape Town, as well as the office of his former director-general (DG), Dr Niel Barnard, will be investigated. Barnard was the director-general of National Intelligence under the former NP government. Routine sweep Sources say the equipment was found during a routine sweep by the NI unit responsible for the security of government buildings. The Western Cape provincial administration is one of the tenants of the building. Western Cape Premier Peter Marais confirmed that NI was investigating. When asked to confirm whether equipment had been found, Marais said he had not yet received the final report and could not comment at this stage. He referred all other queries to his acting DG, Dr Gilbert Lawrence. Lawrence could not be reached for comment. Confidential information indicates at least three types of bugging devices were found - telephone taps, micro transmitters to broadcast conversations within offices, and equipment allowing listeners to tap into conversations from a distance. This information was confirmed by a national government source. Sources close to the investigation allege that the information gleaned from the use of the equipment was probably used to keep detailed files on politicians and officials up to date. The equipment is apparently being kept in boxes somewhere in the legislature's building. Morkel wanted office swept Barnard was approached for comment on Tuesday night, but failed to return a message left for him. Morkel said he has never been privy to information originating from bugging devices. "To tell you the truth, I asked Dr Barnard on a number of occasions to have my office swept as details of confidential conversations regularly leaked," Morkel said. When asked whether anything suspicious was ever found, Morkel said: "Not that I am aware of." Marais relieved the former DG of his position on December 5 last year and Minister for the Public Service and Administration, Geraldine Fraser-Moleketi, approved the severance package. All indications are that Fraser-Moleketi will ask the Western Cape government to launch an investigation into the incident after she heard about the NI agency's investigation. Her spokesperson, Thembela Kulu, confirmed that bugging devices were found in the provincial parliamentary building. She said, should an inquest be initiated, it would be announced at a media conference. She declined any further comment" Story at http://www.news24.co.za/News24/South_Africa/WesternCape/0,1113,2-7-830_1156038,00.html Steve Whitehead TSCM Services URL http://www.tscm.co.za E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa [Non-text portions of this message have been removed] 5018 From: Mitch D Date: Thu Mar 14, 2002 8:17pm Subject: Good things come in big boxes! I just purchased a piece of equipment from Steve U @ sws,and I wanted to give Steve a double thumbs up,and 4 stars! Everything was exactly as he had indicated,there was no pressure to buy anything extra,and his knowledge of the product, and its application, is of the highest degree of excellence. I felt very confident thru every aspect of the sale,and recieved the gear without any flaws. With so many half assed/non-functional gimmicks,junk,and inferior equipment floating across the net,trade papers,auctions and used electronic distributors for sale,I can say I'm extremely pleased,I'd buy gear from Steve again,and felt like I did a deal with a "good friend" in the business,and above all made a new friend. Thanks Steve! M __________________________________________________ Do You Yahoo!? Yahoo! Sports - live college hoops coverage http://sports.yahoo.com/ 5019 From: Rick Hofmann - MICROSEARCH Date: Thu Mar 14, 2002 9:52pm Subject: Fwd: Good things come in big boxes! Mitch and group, I certainly concur with Mitch. I bought a used Icom R8500 from Steve a few years ago. When it arrived I thought he had made a mistake and sent me a new one. I would not hesitate to buy equipment from Steve. I also wanted to mention a short follow up to the Whittier College incident. I received some questions about jurisdiction and why the FBI was not called. I spoke to the ASAC for Los Angeles to get his input. Since California has its own Penal Code sections against eavesdropping it is not generally a problem if the local PD handles the investigation and does not call the FBI. It becomes a problem if the victim of the eavesdropping has some kind of federal connection. A manufacturing firm with a government contract, for example. The FBI would appreciate notification of any eavesdropping discoveries, but they may not pursue the investigation in states where there is concurrent legislation against eavesdropping. The specific FBI office with jurisdiction over Whittier is the West Covina, California office. The ASAC for Los Angeles said that office is a small one without the resources that might be needed to investigate a complicated eavesdropping case. >Subject: [TSCM-L] Good things come in big boxes! > >I just purchased a piece of equipment from Steve >U @ sws,and I wanted to give Steve a double >thumbs up,and 4 stars! > Everything was exactly as he had >indicated,there was no pressure to buy anything >extra,and his knowledge of the product, and its >application, is of the highest degree of >excellence. >I felt very confident thru every aspect of the >sale,and recieved the gear without any flaws. > With so many half assed/non-functional >gimmicks,junk,and inferior equipment floating >across the net,trade papers,auctions and used >electronic distributors for sale,I can say I'm >extremely pleased,I'd buy gear from Steve >again,and felt like I did a deal with a "good >friend" in the business,and above all made a new >friend. > Thanks Steve! > M Very truly yours, Rick Hofmann, CCO, CPP, PI16998 MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 http://home.earthlink.net/~microsearch 5020 From: Date: Fri Mar 15, 2002 0:25am Subject: Law-enforcement DIRT Trojan released http://www.theregister.co.uk/content/55/24433.html Law-enforcement DIRT Trojan released By Thomas C Greene in Washington Posted: 14/03/2002 at 20:43 GMT Disgraced former policeman and convicted felon Frank Jones of Codex Data Systems has had his Web site hacked and his overpriced cop-spy Trojan, aptly named D.I.R.T., released to the public. One would hope that the security community will make use of the above .zip file, provided courtesy of Cryptome's John Young, examine the product and publish a tool for making a Windows box DIRT-proof easily and effectively. The .zip contains the main executable, the installer and the user's manual. It is not a working example, as the activation key is lacking. Jones has been hustling his rip-off product to LEAs (law-enforcement agencies) and military organizations as an elite crime-fighting tool. But in reality it's a common Trojan horse which permits over-zealous cops to upload files (i.e., plant incriminating evidence) on a victim's computer without any auditing mechanism which would record this criminal activity by the authorities. Thus it's been a hit in quarters where this sort of abuse is unlikely to be challenged, such as Asia, Africa and South America. 5021 From: Date: Fri Mar 15, 2002 7:20am Subject: California - Privacy of Calls Affirmed Privacy of Calls Affirmed Ruling: Court defines confidential phone conversations broadly, making lawsuits easier. By MAURA DOLAN, TIMES STAFF WRITER SAN FRANCISCO -- The California Supreme Court strengthened privacy protections Thursday by making it easier to successfully sue people who secretly tape others' phone conversations. The court decided unanimously that a conversation is confidential under state law if a party expects he or she is not being overheard or recorded. Those who secretly tape others can be liable for at least $5,000 in damages for each recording. Thursday's decision, which broadly defines what is confidential, was a defeat for the media, in particular broadcasters who have been sued for airing interviews with people who did not know they were being recorded. Media lawyers had filed a brief in the case urging the court to adopt a more narrow definition that would make it harder for plaintiffs to argue that remarks had been confidential. The ruling stemmed from a Los Angeles case involving recordings a woman made of telephone calls between her now deceased husband and his son. The son, who charged his stepmother had tried to hasten his father's death, now stands to collect as much as $120,000 for 24 phone conversations recorded by his stepmother. California has prohibited private parties from recording telephone calls without consent from all participants--only if the calls included a "confidential communication." Courts of appeal have disagreed over what constituted a confidential conversation. In their brief to the court, lawyers for media outlets including the three major television networks argued that a broad definition of confidential communication would end the use of hidden microphone and camera reporting in California. The ruling also could make it more difficult for the print media to use material from recordings provided by third parties. Jerry K. Staub, a lawyer who represented the son in Thursday's case, said disputes over secret taping also arise frequently in the course of litigation, when one side tapes another's damaging admissions without the party's knowledge and consent. "I think that is going to stop now, and that is a good thing," Staub said. If the court had ruled more narrowly, no conversation would be considered confidential unless one of the parties at the time had declared it to be so, Staub said. The state high court ruled in a dispute between J. Michael Flanagan and his stepmother, Honorine T. Flanagan in Flanagan v. Flanagan, S085594. Honorine married Michael's father, John, in 1969, and John adopted her daughter. He also had two children, including Michael, from a previous marriage. When he married Honorine, John Flanagan had an estate worth about $22 million. John was diagnosed as having prostate cancer in 1992, and his physician prescribed medicine to slow the spread of the disease. Honorine began giving her husband his monthly prescribed injections in 1993. The court said that John changed his estate plan in 1995. Instead of leaving all his property to his wife, he planned to give his grandchildren from his first marriage an interest in his property. Around that time, Honorine told her manicurist, Dale Denels, that she would pay someone to kill John, the court said. In September of that year, Honorine also told Denels that she was injecting John with water instead of his medicine. The manicurist began taping her telephone calls with Honorine and told Michael that his father's life was in danger, according to the court. The manicurist played Michael a tape of one of her conversations with his stepmother, and Michael played it for his father. John moved out of his house and moved in with Michael. A physician later concluded that John had not been receiving his prescribed medication. John changed his will to leave all his property to his two children from his first marriage. But John and Honorine reconciled in August 1996, and John again changed his will. He died of cardiovascular disease in March 1997, and Honorine "ended up with basically everything," said Staub, who represented Michael in the case. Staub said the couple had lived for years in Beverly Hills, but eventually moved to the Palm Springs area. He said John, who had earned a fortune in the mortuary business, was in his 80s when he died, and Honorine was in her 60s at that time. Honorine sued Michael and her manicurist for conspiracy, invasion of privacy and emotional distress. Michael filed a cross complaint, charging that Honorine had illegally taped all of his telephone conversations with his father after the couple reunited. During a trial in Los Angeles, Honorine said she had installed a voice-activated recorder with her husband's consent and listened to tapes of telephone calls daily. Michael testified that his stepmother had forbidden her husband to speak with him and that he considered all his calls with his father to be confidential. A jury awarded Michael $5,000 for each of 24 calls and $1.2 million in punitive damages. The trial judge eliminated the punitive damage award and reduced total compensation to $5,000. An appeals court later decided that two of three conversations played to the jury were confidential, but that none of the other conversations were protected because Michael had presented no evidence of their content. The appellate court, relying on an earlier decision, said that a conversation is confidential only if the parties had reason to expect that it would not later be divulged to someone else. In rejecting that definition, the California Supreme Court noted that the Legislature has approved a law to protect cellular phone conversations from intentional eavesdropping or recording. The Legislature chose to protect all phone conversations, not just those "where a party wanted to keep the content secret," Justice Joyce Kennard wrote for the court. "The Legislature's ongoing concern is with eavesdropping or recording of conversations, not later dissemination," Kennard wrote. She said the state's Privacy Act "protects against intentional, nonconsensual recording of telephone conversations, regardless of the content of the conversation or the type of telephone involved." Ed Green, who represented Honorine, said the Court of Appeal will now have to decide whether the telephone calls were confidential under the definition handed down Thursday. He said there was testimony at the trial that Honorine, who never faced criminal charges, "did not attempt to kill" her husband and that she never withheld his medication. If you want other stories on this topic, search the Archives at latimes.com/archives. For information about reprinting this article, go to www.lats.com/rights. 5022 From: Matthew Paulsen Date: Fri Mar 15, 2002 4:55pm Subject: RE: Law-enforcement DIRT Trojan released Full details on the DIRT trojan JOHAR can be found here: http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=TROJ_PSW.JOHA R.A and here: http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=TROJ_PSW.JOHA R.A&VSect=T and here: http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=TROJ_PSW.JOHA R.A&VSect=S DIRT uses the same filenames - desktop.exe, desktop.log and desktop.dll just like the psw.johar.a trojan. -----Original Message----- From: oldman@d... [mailto:oldman@d...] Sent: Thursday, March 14, 2002 10:26 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Law-enforcement DIRT Trojan released http://www.theregister.co.uk/content/55/24433.html Law-enforcement DIRT Trojan released By Thomas C Greene in Washington Posted: 14/03/2002 at 20:43 GMT Disgraced former policeman and convicted felon Frank Jones of Codex Data Systems has had his Web site hacked and his overpriced cop-spy Trojan, aptly named D.I.R.T., released to the public. One would hope that the security community will make use of the above .zip file, provided courtesy of Cryptome's John Young, examine the product and publish a tool for making a Windows box DIRT-proof easily and effectively. The .zip contains the main executable, the installer and the user's manual. It is not a working example, as the activation key is lacking. Jones has been hustling his rip-off product to LEAs (law-enforcement agencies) and military organizations as an elite crime-fighting tool. But in reality it's a common Trojan horse which permits over-zealous cops to upload files (i.e., plant incriminating evidence) on a victim's computer without any auditing mechanism which would record this criminal activity by the authorities. Thus it's been a hit in quarters where this sort of abuse is unlikely to be challenged, such as Asia, Africa and South America. Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5023 From: James M. Atkinson Date: Sun Mar 17, 2002 6:06pm Subject: Kids [...sounds like a typical bug sweep in New York] The boss of a big company needed to call one of his employees about an urgent problem with one of the main computers. He dialed the employee's home phone number and was greeted with a child's whispered, "Hello?" Feeling put out at the inconvenience of having to talk to a youngster, The boss asked, "Is your daddy home?" "Yes," whispered the small voice. "May I talk with him?" the man asked. To the surprise of the boss, the small voice whispered, "No." Wanting to talk with an adult, the boss asked, "Is your Mommy there?" "Yes," came the answer. "May I talk with her?" Again, the small voice whispered, "No." Knowing that it was not likely that a young child would be left home alone, the boss decided he would just leave a message with the person who should be there watching over the child. "Is there anyone there besides you?" the boss asked the child. "Yes," whispered the child, "a policeman." Wondering what a cop would be doing at his employee's home, the boss asked, "May I speak with the policeman?" "No, he's busy," whispered the child. "Busy doing what?" asked the boss. "Talking to daddy and mommy and the fireman," came the whispered answer. Growing concerned as he heard what sounded like a helicopter through the Ear piece on the phone, the boss asked, "What is that noise?" "A hello-copper," answered the whispering voice. "What is going on there?" asked the boss, now alarmed. In an awed, whispering voice, the child answered, "The search team just landed the hello-copper." Alarmed, and more than just a little frustrated, the boss asked, "What Are they searching for?" Still whispering, the young voice replied along with a muffled giggle, "ME." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5024 From: Steve Whitehead Date: Mon Mar 18, 2002 0:59am Subject: Net widens in Cape computer snooping probe "By Ashley Smith Fears of a Western Cape government spying conspiracy have deepened, with administration insiders confirming that the investigation has widened. Now allegations that sophisticated programs were used to tap into staff computers in Cape Town are being investigated. The information, gathered while the Democratic Party/ New National Party coalition was in power in the Western Cape, was then allegedly used to draw up so-called personality profiles of officials. This was done by monitoring websites they visited, emails and other private documents. The same information technology programs could also have been used to monitor the computers of politicians. The latest twist follows nearly two weeks of drama for the new ANC-NNP provincial government, which took over from the DP-NNP coalition late last year. The drama started on the evening of March 5 when Pierre Beneke, a director in former Western Cape director-general Niel Barnard's office, and two female colleagues were confronted by a policeman. He had noticed that Beneke was carrying cardboard boxes to a vehicle parked in the provincial government garage. Among unconfirmed allegations are that the items in the cardboard boxes included bugging and computer equipment. A sweep of the legislature was then conducted and further devices were allegedly found. An inquiry has been instituted" Story at http://www.iol.co.za/index.php?click_id=13&art_id=ct20020317213431443N210305&set_id=1 Steve Whitehead TSCM Services URL http://www.tscm.co.za [Non-text portions of this message have been removed] 5025 From: A Grudko Date: Mon Mar 18, 2002 6:36pm Subject: Test - please delete Test - please delete 5026 From: A Grudko Date: Mon Mar 18, 2002 6:51pm Subject: SA Judge denies covert surveillance order Independant on Line Cape Town, South Africa March 07 2002 at 02:25PM Jeanette Traverso the deputy judge-president of the Cape, on Thursday categorically denied any involvement in the covert installation of video cameras to monitor disturbances from the public gallery during the Staggie murder trial. This was Traverso's second public denial. At a special media briefing, the judge told reporters: "The false allegation that I authorised the installation is an attack on my integrity - my most precious possession that I will defend with my life. "My only concern now is to clear my name. When an allegation is made of a judge lying, it is a serious reflection on the judiciary itself, and he or she has to set the record straight - as I am doing now - or admit the lie." The judge rejected as false the allegation made recently in the Cape High Court by Senior Superintendent Daniel Lourens that she had personally authorised the installation of cameras. He said this happened during a meeting in her chambers. Lourens is attached to the SA Police Service technical support unit, and made the allegation under oath during an inquiry launched this month by Judge John Foxcroft, the judge presiding in the Staggie trial. Lourens's allegation insinuated that Traverso had lied in a joint statement last year in which both Traverso and the Cape Judge-President John Hlophe denied any involvement in, or knowledge of, the cameras. On Thursday, Traverso said she had been unable to respond earlier to recent media reports about Lourens's allegation, as Foxcroft had not yet given judgment in the case. Judgment was delivered on Wednesday Traverso said: "It is with grave reservation that I make this statement, but I believe that I am entitled to and, in the interests of the judiciary, obliged to protect my integrity." She said in September last year she chaired a security committee meeting in the place of Judge-President Hlophe, who had been away. The possible installation of cameras raised at the meeting, but Traverso said she had made it clear that she could not consent to this. Individual judges would have to decide themselves whether they wanted such devices in their courts. She said it was resolved at the meeting to send a letter to Hlophe in order to sensitise the judiciary about requests to place devices in court rooms, to monitor threats. Traverso said no such letter was in fact sent to Hlophe. She said Tommy Prins, head of the Scorpions, had informed Foxcroft last September about the secret installation of the two cameras. She said she had not been informed of Prins's meeting with Foxcroft, nor was the judge-president. Traverso met with the national director of public prosecutions, Bulelani Ngcuka, on Thursday morning, prior to the media conference. She said Ngcuka had advised her not to issue a statement about the surveillance cameras, and she told him she would "think about it". She told reporters she had made it clear to Ngcuka that she had intended to issue a press statement setting out the facts in full and thereby clearing her name. Ngcuka's spokesperson, Sipho Ngwema said Ngcuka had not asked, but only advised, Traverso not to make a statement. "Ngcuka felt it was not in the interest of justice for the judge to hold a media conference, but he only advised her." - Sapa Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 5027 From: A Grudko Date: Mon Mar 18, 2002 7:04pm Subject: Parliament bug? Did anyone else hear a rumour that an audio/video bug was found in the SA Parliament building in Cape Town last week? Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 5028 From: A Grudko Date: Mon Mar 18, 2002 7:13pm Subject: Re: SA's own Watergate? Please ignore my last post - I have overseas guests staying and they used my eMail address, causing this post to drop into my 'read mail' folder. I thought I was getting very few mails since they arrived! Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 5029 From: taylorhardwood Date: Mon Mar 18, 2002 0:24am Subject: optoelectronics `hi:group I ran across a man that has a good supply of of 3000a plus units for sale new in the box while these are discontinued by optoelectronics the price is good $199+ shipping if anyone is interested I can post his name and phone tomorrow dan 5030 From: Marko Radovic Date: Mon Mar 18, 2002 9:57am Subject: ISO 17799 Hello, Does anyone know where to download ISO 17799 security standard for free? Any help is welcome! Marko __________________________________________________ Do You Yahoo!? Everything you'll ever need on one web page from News and Sport to Email and Music Charts http://uk.my.yahoo.com 5031 From: Marcel Date: Mon Mar 18, 2002 3:17pm Subject: CIA Web Site Tracks Visitors With Cookies http://www.washtech.com/news/govtit/15707-1.html -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 5032 From: Matthew Paulsen Date: Mon Mar 18, 2002 8:44pm Subject: RE: ISO 17799 Marko, I believe that BSPL copywrites that material locally and internationally, so it has to be purchased, just like any other authored work, hence their name - British Standards Publishing Limited. You may have better luck trying Powell's Technical, half.com, ebay.com, amazon.com or other locations where someone may be trying to offload it as a used document. Could be wrong tho, best of luck. Matt -----Original Message----- From: Marko Radovic [mailto:radovic_marko@y...] Sent: Monday, March 18, 2002 7:57 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] ISO 17799 Hello, Does anyone know where to download ISO 17799 security standard for free? Any help is welcome! Marko __________________________________________________ Do You Yahoo!? Everything you'll ever need on one web page from News and Sport to Email and Music Charts http://uk.my.yahoo.com Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 5033 From: Ngan Thai Date: Mon Mar 18, 2002 8:14pm Subject: Re: ISO 17799 In message <20020318155720.85432.qmail@w...>, =?iso-8859-1?q ?Marko=20Radovic?= writes: >Hello, > >Does anyone know where to download ISO 17799 security >standard for free? > >Any help is welcome! The ISO17799:2000 standard can be purchased from BSI's site: https://www.bspsl.com/secure/iso17799software/cvm.cfm That's also the official source of the standard. Another good (free this time) source if IT and related security is BSI's IT Baseline Protection Model: http://www.bsi.de/gshb/english/menue.htm Cheers, VS 5034 From: Wayne T Work Date: Mon Mar 18, 2002 9:32pm Subject: RE: ISO 17799 dudes, This is the US standard for what is the BSPL 799 standard. There might be a copy of this on the NIST or some derivation of this standard. Good hunting. -----Original Message----- From: Matthew Paulsen [mailto:mpaulsen6@a...] Sent: Monday, March 18, 2002 9:45 PM To: 'TSCM submissions' Subject: RE: [TSCM-L] ISO 17799 Marko, I believe that BSPL copywrites that material locally and internationally, so it has to be purchased, just like any other authored work, hence their name - British Standards Publishing Limited. You may have better luck trying Powell's Technical, half.com, ebay.com, amazon.com or other locations where someone may be trying to offload it as a used document. Could be wrong tho, best of luck. Matt -----Original Message----- From: Marko Radovic [mailto:radovic_marko@y...] Sent: Monday, March 18, 2002 7:57 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] ISO 17799 Hello, Does anyone know where to download ISO 17799 security standard for free? Any help is welcome! Marko __________________________________________________ Do You Yahoo!? Everything you'll ever need on one web page from News and Sport to Email and Music Charts http://uk.my.yahoo.com Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5035 From: David Alexander Date: Tue Mar 19, 2002 5:57am Subject: re: ISO 17799 standard >Does anyone know where to download ISO 17799 security >standard for free? > >Any help is welcome! > >Marko Marko This is not a 'free standard', you have to pay for a copy. I paid for mine. It is subject to copyright and illegal to make copies/supply them to other people, etc. ISO 17799 is the international adoption of the British Standard BS 7799. Note that there are 2 parts to the British Standard, and the ISO only covers part 1 at the moment. For reference, Information Security is my specialist subject. I am one of very few people qualified as a Lead Auditor of BS7799/ISO17799 worldwide. I am happy to offer brief advice and guidance. regards _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 5036 From: Fernando Martins Date: Tue Mar 19, 2002 5:09pm Subject: RE: ISO 17799 This is not where you can download the standard, but some nice resources about it http://www.iso17799.hpg.ig.com.br/index.htm <- for any portuguese/brazilian around (?) http://www.all.net/books/standards/bs7799.html http://matrix0.members.beeb.net/iso-17799/ http://www.securityauditor.net/iso17799/index.htm http://www.iso17799world.com/ You can buy the standard at http://www.iso.ch or http://bsonline.techindex.co.uk/ FM ª -----Original Message----- ª From: Marko Radovic [mailto:radovic_marko@y...] ª Sent: segunda-feira, 18 de MarÁo de 2002 15:57 ª To: TSCM-L@yahoogroups.com ª Subject: [TSCM-L] ISO 17799 ª ª ª Hello, ª ª Does anyone know where to download ISO 17799 security ª standard for free? ª ª Any help is welcome! ª ª Marko ª ª __________________________________________________ ª Do You Yahoo!? ª Everything you'll ever need on one web page ª from News and Sport to Email and Music Charts http://uk.my.yahoo.com ª ª ª ------------------------ Yahoo! Groups Sponsor ª ---------------------~--> Tiny Wireless Camera under $80! ª Order Now! FREE VCR Commander! Click Here - Only 1 Day Left! ª http://us.click.yahoo.com/nuyOHD/7.PDAA/yigFAAª /kgFolB/TM ª ª ª -------------------------------------------------------------- ª -------~-> ª ª ======================================================== ª TSCM-L Technical Security Mailing List ª "In a multitude of counselors there is strength" ª ª To subscribe to the TSCM-L mailing list visit: ª http://www.yahoogroups.com/community/TSCM-L ª ª It is by caffeine alone I set my mind in motion. ª It is by the juice of Star Bucks that thoughts acquire ª speed, the hands acquire shaking, the shaking is a warning. ª It is by caffeine alone I set my mind in motion. ª =================================================== TSKS ª ª Your use of Yahoo! Groups is subject to ª http://docs.yahoo.com/info/terms/ ª ª ª 5037 From: James M. Atkinson Date: Tue Mar 19, 2002 11:05pm Subject: Teaching Math Teaching Math in 1950: A logger sells a truckload of lumber for $100. His cost of production is 4/5 of the price. What is his profit? Teaching Math in 1960: A logger sells a truckload of lumber for $100. His cost of production is 4/5 of the price, or $80. What is his profit? Teaching Math in 1970: A logger exchanges a set "L" of lumber for a set "M" of money. The cardinality of set "M" is 100. Each element is worth one dollar. Make 100 dots representing the elements of the set "M." The set "C", the cost of production contains 20 fewer points than set "M." Represent the set "C" as a subset of set "M" and answer the following question: What is the cardinality of the set "P" of profits? Teaching Math in 1980: A logger sells a truckload of lumber for $100. His cost of production is $80 and his profit is $20. Your assignment: Underline the number 20. Teaching Math in 1990: By cutting down beautiful forest trees, the logger makes $20. What do you think of this way of making a living? Topic for class participation after answering the question: How did the forest birds and squirrels feel as the logger cut down the trees? There are no wrong answers. Teaching Match in 2000: A logger sells a truckload of lumber for $100. His cost of production is $120. How does Arthur Andersen determine that his profit margin is $60? -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5038 From: Ray Van Staden Date: Tue Mar 20, 2001 1:06am Subject: ZIMBABWE'S PLIGHT!!! Letter from Kerry Kay re their plight and that of John Rutherford. Subject: Zimbabwean citizen Alistair wrote the message below. May we as the adoptive parents of Jon carry on from here. I flew in to the Hospital the minute I heard to be with Jon. I did not take my diary, brief case, emergency evacuation case etc. - just wanted to get to Jon. Iain and David followed an hour later. No sooner had they arrived at the hospital we got a phone call to say our tractor driver had been beaten up. So I stayed with Jon and Iain and David returned home. The next nightmare unfolded as a group of zanu trained killer militia surrounded David and Iain in the truck. David managed to get away through the bush and with great presence of mind, switched off my computer, locked our dogs up in the house, gathered our weapons and ran back through the bush to Iain. By which time Marimo and Katsiro (self styled war vets) were threatening them through the window. The farmers had called the Police (a joke). I managed to get half way home and stopped in at a friends farm only to hear David yelling over the radio, "please someone help, red alert (i.e. Life threatening) I was in the garden helpless other than praying and crying. Then, the wonderful call on the radio, "the Police have arrived". Out leapt AK 47 wielding so called Police who then turned their guns onto Iain and David !! Between a rock and a hard place, Iain said to David, "duck" and put his foot down - the truck windscreen was smashed but they got away with their lives. Earlier that morning Alistair and I had helped the police constable "load" Jon's dead guard into the body box - he had been beaten to death (interpreted by the police as "ill - natural causes" well perhaps natural causes according to the doctrine of brutality and killing in the ruling party book) - the dead guard Darlington's eyes and mouth were open, his last words to his killers was "my boss (Jon) did not do anything wrong". I just broke down and sobbed uncontrollably for the sheer brutality of it all, killing and beating with impunity, a witch hunt to beat, rape and kill whoever supported the legitimate opposition party. It is evening and our workers have all been chased off the farm, our dogs are still locked up in our house (or killed) and our home and farm yard looted. This is a carbon copy of what happened two years ago. We have to believe that God has a plan for our beloved country - and we continue to pray. Today I allowed myself the total breakdown of all defenses - together with our wonderful friends, black and white, urban and rural, and cried and cried and cried. Tomorrow I will be strong again, and so will my family, friends and countrymen and women. For those of you in the wings, please help us avoid genocide/ethnic cleansing, whatever you want to call it. We are on the brink. With much love and chinja's, Kerry (rather devastated but not defeated!) Kay This is what you get for being a citizen of Zimbabwe. Hours of being beaten and threatened with death, one of your employees lying near by dying after being beaten for hours. The badza handle wielders are previous employees who have been taken to youth camps and politically re-educated over the last two months. Jon Jon Rutherford's supposed crime is that during the election he supported and transported MDC agents etc. He was not involved and was actually away from the farm with friends. The security guard beaten with him possibly saved his life. Jon Jon effected his escape by managing to persuade the thugs that he needed urgent medical attention and had to get him to hospital immediately. This they conceded after realizing that the man was dying. Jon Jon and his wife Emma and two young children are very lucky to be alive. She had to spend two and a half hours away from her children detained by these thugs being continually threatened with her life, before she was rescued. Letter from Kerry Kay A FOLLOW ON E MAIL CONTINUES THE STORY Subject: the mayhem continues Dearest All, some good news is that the NSPCA managed to get to our home late this afternoon, and the front door was open so the bastards had been through our home, but at least the dogs were alive. They will go back tomorrow to hopefully fetch the dogs, cats and pigs. The house hasn't been looted yet - perhaps some fat political commissar is waiting to move into our lovely home. He may move in but he won't be there long .... All our goats have been killed, the farmyard looted of all our equipment, fertiliser and fuel. However, we are alive and that's how it must stay, even if it means losing everything again as we did two years ago. We are re-grouping with all our colleagues, friends and extended families, black, white, young, old, farmworkers etc. and giving one another encouragement - we are all scattered away from our homes, but once again are "building other homes and families" all over the place. When we had to leave the farm in April 2000 for those five long months, we moved our cattle to a place of safety the other side of Harare. This morning we learned that the farmer who we have been leasing grazing from, was bludgeoned to death by the local "war vets" and squatters. His cousin phoned me today and she said it was a gruesome, brutal, savage sight to behold. How long will this evil bastard and his henchmen be allowed to continue on their retribution spree? Does the world not realise, acknowledge (especially Mbeki) that the mdc is 47 per cent of the legitimate national government - yet the brutality is being systematically metered out on all those connected with the legitimate opposition. In the high density suburbs in Marondera, black people are "being dealt with" every night for not being a part of the ruling butchery party - they are the unheard voices, the people without email access, access to the media and definitely NO recourse to law - because there is NO LAW. Whoever you are, where ever you are, get writing, phoning, lobbying for the battered silenced and mutilated majority in Zimbabwe. with love and some hope, through you, Kerry.xxx [Non-text portions of this message have been removed] 5039 From: A Grudko Date: Wed Mar 20, 2002 4:13pm Subject: CIA cookies http://www.foia.ucia.gov/ CIA Web Site Tracks Visitors With Cookies By Brian McWilliams, Newsbytes.com Monday, March 18, 2002; 2:55 PM A Web site operated by the Central Intelligence Agency is marking visitors with a unique identification tag or "cookie" that violates federal privacy guidelines and the agency's own privacy policy., according to Public Information Research, a non-profit group. The CIA's Electronic Reading Room site, which provides online access to previously released CIA documents, places a "persistent" cookie on visitors' computers when they visit the site. Designed to remain on the visitor's computer until December 2010, the cookie contains the user's Internet protocol address as well as a unique identification number, Newsbytes has confirmed. The use of persistent cookies at http://www.foia.ucia.gov was first discovered by Public Information Research, a Texas-based non-profit. A spokesperson for the CIA said the agency was still analyzing the report and had no immediate comment. In a June 2000 memorandum to all government agencies, the director of the White House Office of Management and Budget advised operators of government sites and their contractors that "the presumption should be that 'cookies' will not be used at Federal web sites." Most Web sites can log the Internet protocol (IP) address and activities of visitors without the use of cookies. But the persistent cookie at the CIA Freedom of Information Act (FOIA) site enables the agency to better track an individual visitor's search requests, according to Daniel Brandt, PIR's founder. "The keywords you put in for searching on FOIA documents can reveal a lot about you. The CIA can use these cookies to reconstruct who is interested in what. Even if you browse from several different ISPs, they can use your cookie's unique ID to tie all your searches together," said Brandt. According to the privacy policy at the CIA's Electronic Reading Room, the site does not use persistent cookies and instead only uses temporary "session cookies" that expire when the user closes his browser. A review of some federal sites today by Newsbytes revealed that several are placing session cookies on visitors' computers. Such sites include the FirstGov.gov portal, the FBI's jobs site, as well as the main sites operated by the Small Business Administration, the Department of Education and the Selective Service. The privacy policy at the main CIA Web site, located at http://www.cia.gov, states that the CIA Web site "does not use the 'cookies' that some Web sites use to gather and store information about your visits to their sites." Brandt said it is likely that the CIA Electronic Reading Room site was created by a contractor using a standard Web hosting package that included a Web traffic analysis program, and that the CIA may not even be aware of it. "They still need to stop using the persistent cookie and destroy all the information they have collected from it," he said. The HTML source code of the CIA Electronic Reading Room site said it was designed by Olympus Group. Calls to the Virginia-based company's switchboard resulted in a recorded message stating that "Olympus Group has closed its door and is no longer in operation." The CIA FOIA site appears to be hosted on systems operated by Digex, a large Internet service provider in Maryland. According to the OMB memo, the use of cookies by federal sites is justified only when there is "a compelling need to gather the data on the site" as well as "appropriate and publicly disclosed privacy safeguards for handling of information derived from cookies." The CIA Electronic Reading Room is at http://www.foia.ucia.gov Public Information Research is at http://www.pir.org The OMB's cookie memo is at http://www.whitehouse.gov/omb/memoranda/m00-13.html Reported by Newsbytes, http://www.newsbytes.com Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 5040 From: Marcelrf-A-GPS-i100 Date: Wed Mar 20, 2002 10:48am Subject: Firms undergo NSA infosec rating http://www.fcw.com/fcw/articles/2002/0318/web-nsa-03-20-02.asp -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 5041 From: James M. Atkinson Date: Wed Mar 20, 2002 11:04pm Subject: 60-page DEA report on spy ring Update: The spies who came in from the art sale Creative Loafing has obtained a report detailing alleged Israeli spy activity in the United States. BY JOHN SUGG Editor's note: Portions of the report mentioned in this article can be found at http://atlanta.creativeloafing.com/2002-03-20/news_dea.pdf. A major international espionage saga is unfolding across the United States, with some of its roots right here in the Atlanta area. It's been pretty hush-hush so far, largely because the implications could be a major embarrassment for the government. The spy story is even more touchy because it isn't Saddam, Fidel, Osama or even what passes nowadays for the KGB spying on America -- but our "friend" in the war against "evil," Israel. The basis of the spy allegations is a 60-page document -- a compilation of field reports by Drug Enforcement Administration agents and other U.S. law enforcement officials. Creative Loafing last week obtained a copy of the report from intelligence sources with long-term contacts among both Israeli and American agencies. The government has attempted to deflect attention from earlier leaks about the spy scandal. However, while declining to confirm or deny the authenticity of the document, a spokesman for the DEA, William Glaspy, did acknowledge that the agency had received many reports of the nature described in the 60 pages. A source familiar with the creation of the document has told CL that the 60-page memo was a draft intended as the base for a 250-page report. The larger report has not been produced because of the volatile nature of suggesting that Israel spies on America's deepest secrets. Another DEA spokesperson, Rogene Waite, told Associated Press a draft document had been compiled and forwarded to other agencies. The validity of the scenarios described in the document is attested to in at least one official mention. The Office of the National Counterintelligence Executive, in a March 2001 summary, reported on "suspicious visitors to federal facilities" and noted the type of "aggressive" activity recounted in the document obtained by the Planet. The nation's most prominent Jewish newspaper, the New York-based Forward, also has confirmed portions of the vast spying network -- although stating that the Israelis were monitoring Arabs in the United States, not trying to access U.S. secrets. Referring to the arrest of five Israeli employees of a New Jersey moving company who were arrested and held for two months after the Sept. 11 attack, Forward on March 15 stated: "According to one former high-ranking American intelligence official, who asked not to be named, the FBI came to the conclusion at the end of its investigation that the five Israelis ... were conducting a Mossad surveillance mission and that their employer, Urban Moving Systems of Weehawken, N.J., served as a front." Forward also reported that a counterintelligence probe concluded two of the men were operatives of Mossad, Israel's spy service. Reports of the spying were first made public in December broadcasts by Fox News reporter Carl Cameron. It isn't clear whether he had the 60-page document or was only told its contents. A French online news service has obtained the report, and Le Monde in Paris has advanced the story. However, in the United States, the media ignored the original Fox broadcast, and only a handful of publications. The Atlanta Journal-Constitution hasn't reported the story although another Cox-owned paper, The Palm Beach Post has. The absence of reporting hasn't gone unnoticed. The authoritative British intelligence and military analysis service, Jane's Information Group, on March 13 chided: "It is rather strange that the U.S. media ... seem to be ignoring what may well prove to be the most explosive story since the 11 September attack, the alleged breakup of a major Israeli espionage operation in the United States which aimed to infiltrate both the Justice and Defense departments and which may also have been tracking al-Qaida terrorists before the aircraft hijackings took place." In flat language and sometimes excruciating bureaucratic detail, the document relates scores of encounters between federal agents and Israelis describing themselves as art students. The implication is that the seemingly innocuous cover was used to gain access to sensitive U.S. offices and military installations. For example, Paragraph 82 of the document states that MacDill Air Force Base intelligence officers were warned in March 2001 of the art students' efforts. A month later, a special alert was issued about a "possible intelligence collection effort" at Tinker Air Force Base in Oklahoma City. Among other activities, the base houses AWACS surveillance planes and repairs B-1 bombers. The author of the document is not identified. However, many DEA and other law enforcement agents are named. CL has contacted some of the named agents, and three federal employees have confirmed the incidents described in the report. None disputed the authenticity of the report. One senior DEA official, when read paragraphs that mentioned him, said: "Absolutely, that's my report," adding, however, that he didn't think the incidents were sufficient to prove an ongoing spy operation. All of the federal employees said they could not be quoted by name. The specific incidents are richly chronicled, down to names, drivers' license numbers, addresses and phone numbers of the Israelis. Perhaps most intriguing, the Israelis' military and intelligence specialties are listed: "special forces," "intelligence officer," "demolition/explosive ordnance specialist," "bodyguard to head of Israeli army," "electronic intercept operator" -- even "son of a two-star (Israeli) army general." "The activities of these Israeli art students raised the suspicion of (the DEA's Office of Security Programs) and other field offices when attempts were made to circumvent the access control systems at DEA offices, and when these individuals began to solicit their paintings at the homes of DEA employees," the document states. "The nature of the individuals' conduct, combined with intelligence information and historical information regarding past incidents (involving Israelis leads the DEA) to believe the incidents may well be an organized intelligence gathering activity." The document also links the Israelis to possible drug investigations. The report states: "DEA Orlando has developed the first drug nexus to this group. Telephone numbers obtained from an Israeli Art Student encountered at the Orlando (district office) have been linked to several ongoing DEA MDMA (Ecstasy) investigations in Florida, California, Texas, and New York." Much of the Israeli activity, according to the report, centered on Florida. In addition to attempting to gain access to government installations, the document states that the Israelis approached many intelligence agents, prosecutors and federal marshals at their homes -- including one incident on Davis Islands. In researching this story, the CL has learned of other encounters not included in the 60-page report. For example, a member of Congress from Georgia recounted to CL of being targeted by the art students on two occasions. A Tampa state court judge was also approached. Neither the member of Congress nor the judge wanted to be named. In an era where CNN CEO Walter Issacson says it would be "perverse" to televise Afghan babies killed by U.S. bombs, it's not surprising some stories go unnoticed by a press that embraces "patriotism" by ignoring sacred cows. One such sacred cow is what's happening in Israel and Palestine. Reporters know that to criticize Israel -- to point out, for example, that wanton killing of innocents is equally devilish, whether committed by Ariel Sharon's soldiers flying U.S.-made helicopters, or by a Hamas suicide bomber who pushes the button -- is to risk being called an anti-Semite. It's a tired canard meant to bludgeon debate into silence, but it's often effective. Even with that background, however, it's a little hard to understand the media's avoidance of the spy story. In 1999, word began spreading among intelligence agencies about bands of Israeli "students" doing very strange things, such as popping up around federal buildings and military establishments marketing artwork. According to CL intelligence sources, low-level alerts began being flashed around to offices of the FBI, DEA, federal prosecutors and others. By March 23, 2001, counterintelligence officials had issued a bulletin to be on the watch for Israelis masquerading as "art students." The alert stated that there was an "ongoing 'security threat' in the form of individuals who are purportedly 'Israeli National Art Students' that are targeting government offices selling 'artwork.'" At the same time, American intelligence services were increasingly worried by the dominance of many highly sensitive areas of telecommunications by Israeli companies. Comverse Infosys (now called Verint) provides U.S. lawmen with computer equipment for wiretapping. Speculation is that "catch gates" in the system allowed listeners to be listened to. Software made by another Israeli outfit, Amdocs, provided extensive records of virtually all calls placed by the 25 largest U.S. telephone companies. The relationship of those companies to the detained Israelis is detailed in the 60-page document. The DEA's intense interest in the case stems from its 1997 purchase of $25-million in interception equipment from Israeli companies, according to a March 14 report by Intelligence Online, a French Web-based service that first revealed the existence of the 60-page document. "In assigning so many resources to the inquiry (all DEA offices were asked to contribute)," Intelligence Online stated. "The agency was clearly worried that its own systems might have been compromised." Often the Israeli "students" sold their artwork on street locations near federal buildings. In Tampa on March 1, 2001, a DEA agent heard a knock on his office door. According to the government report: "At the door was a young female who immediately identified herself as an Israeli art student who had beautiful art to sell." Knowing about the security alert, the agent began questioning the "student." After several contradictory statements, the agent concluded "her responses were evasive at best." Elsewhere, the document notes that the students were "persistent" in trying to gain access to the homes of law enforcement personnel. On other occasions, the "students" showed up at homes of intelligence agents, judges and other government employees. The report describes a December 2000 incident when a man and a woman knocked on the door of an Atlanta DEA agent. "Both subjects claimed to be Israeli art students," the document states. "The Special Agent examined some of the artwork, but became suspicious when the students would not provide him with a contact telephone number.... Subsequently, the Special Agent saw someof the exact same artwork for sale at [a]kiosk in the Mall of Georgia." Many of the apparent operatives had set up shop at addresses only stones' throws from Arabs in San Diego, Little Rock, Irving, Texas, and in South Florida. The Planet also has obtained a watch list of mostly Arabs under scrutiny by the U.S. government. The addresses of many correspond to the specific areas where the Israelis established bases. For example, an address for the Sept. 11 hijacking leader, Mohammad Atta, is 3389 Sheridan St. in Hollywood, Fla., only a few blocks and a few hundred feet from the address of some of the Israelis, at 4220 Sheridan. A dozen Israelis, including the alleged surveillance leader, had been based in Hollywood, Fla., between January and June last year -- quite possibly watching Arabs living nearby who are suspected of providing logistical support to Osama bin Laden's network. Especially in Florida, where 10 of the 19 Sept. 11 terrorists lived, the revelations about the Israeli activities bolster speculation, reported by a Fox news reporter, that the students-cum-spies might have gained advance knowledge of aspects of the Sept. 11 terrorists -- and not passed on that critical intelligence to the United States. CL sources with Israeli connections suggest that the information might have been relayed to U.S. agencies, but might have been ignored or overlooked. Despite the highly suspect behavior of the Israelis, the media hadn't picked up on the story. Then came Sept. 11. While America was mesmerized by the "War on Terrorism," the media went out to a four-martini lunch when it came to skeptical reporting. With a few commendable exceptions. One of those is Carl Cameron, a gutsy reporter for Fox News. On Dec. 12, Cameron broke the blockbuster spy story. He said at the time: "Since Sept. 11, more than 60 Israelis have been arrested or detained, either under the new PATRIOT anti-terrorism law, or for immigration violations. A handful of active Israeli military were among those detained, according to investigators, who say some of the detainees also failed polygraph questions when asked about alleged surveillance activities against and in the United States." Fox also reported the Israeli "students" "targeted" U.S. military bases -- which is bolstered by the report obtained by the CL. In the rest of the world -- Europe, Arab countries and Israel, especially -- the story made headlines. Even the official Chinese news agency perked up. Not in our well-defended (against disturbing news) homeland, however. Cameron, in an interview, said he doesn't believe the conspiracy theories about why the story was ignored here. An honest scribe, he points to a shortcoming in his own work -- one hammered on by Israeli critics at the time -- conceding "there were no (on the record) interviews. I didn't tell other reporters where to find the documents. They couldn't do instant journalism." Others at Fox confirm there was intense pressure on the network by pro-Israeli lobbying groups, such as the Anti-Defamation League and the misnamed Committee for Accuracy in Middle East Reporting (CAMERA). "These charges are arrant nonsense unworthy of the usually reliable Fox News," CAMERA huffed in a Dec. 12 release. Cameron reported Dec. 13 that federal agents were afraid to criticize Israel. "Investigators within the DEA, INS and FBI have all told Fox News that to pursue or even suggest Israeli spying ... is considered career suicide." Cameron told me in similar language that's what journalists also can face. And, what's clear is that Fox quickly removed the story from its Web site. (It was reposted this month by Fox after other media began showing interest in the story.) After Cameron's initial reports, the story pretty much evaporated in the United States before Christmas. Then, all hell broke loose in the last few weeks. Intelligence Online in France obtained the same 60-page June 2001 federal report that CL has. The French Web site reported that 120 Israelis had by now been detained or deported by U.S. authorities. Let's repeat that: 120 potential spies. This isn't worth press curiosity? Few papers have given the story significant space. Many, like the AJC, haven't uttered a peep. Some of what has seeped out is disturbing. The Oklahoman, prompted by the French articles, reported last week that 10 months ago four Israelis peddling artwork (but carrying military IDs) were detained near sensitive Tinker Air Force Base in Oklahoma. Le Monde in Paris recounted that six intercepted "students" had cell phones purchased by an Israeli vice consul in the United States. Sources told me that many of the phones had a walkie-talkie feature that was virtually impossible to intercept. Bush administration shills were quick to try to spin the story -- perhaps to minimize damage should it turn out the government did have information in advance about the people or activities that led to the Sept. 11 attack. A Justice Department spokesperson, Susan Dryden, called the spy report an "urban myth," and other federal flacks trumpeted that no Israeli had been charged with or deported for spying. Of course, in the Great Game, "friendly" spies are seldom embarrassed by being called by their true colors. The Israelis who have been deported have been given the boot because of visa expirations and other minor violations. The Washington Post, which apparently doesn't have the 60-page document, nonetheless reported March 6 that unnamed law enforcement officials had told the paper that a "disgruntled" DEA agent had compiled the report after other federal agencies didn't react to the Israelis' suspicious behavior. The Post, however, also quoted a DEA spokesman who acknowledged that the large number of incident reports had been combined into a draft memo. As with CL's inquiry, the DEA spokesman wouldn't confirm for the Post whether the memo was the 60-page document. Predictably, Israeli Embassy spokesman Mark Reguev derided the Intelligence Online report as "nonsense." And, pro-Israeli apologists such as anti-Arab ideologue Daniel Pipes quickly took the field with strident polemics. Pipes, who makes no claim of having seen the 60-page document, nonetheless claimed in a March 11 column that the story was a "dangerous falsehood" and that "U.S. journalists found not a shred of evidence to support" it. The fact that reporters were beginning to piece together real shreds was blithely ignored by Pipes. Israel in the past has belligerently denied wrongdoing until long after the truth was obvious. Israel claimed Jonathan Pollard -- a super spy who did horrendous, deadly damage to the United States until arrested in 1985 - wasn't an agent. And, Israel has stubbornly contended its 1967 attack on the USS Liberty, in which 35 American sailors were slaughtered, was an accident -- a lie exposed in recent reports including one last fall on the History Channel. A recent authoritative book, Body of Secrets, by James Bamford, concludes that National Security Agency officials "were virtually unanimous in their belief that the attack was deliberate." With the purported art students, it's likely that denial will reach screeching levels. The Bush administration would find it difficult to explain why it either ignored or discounted such a large espionage operation. Senior Editor John Sugg can be reached at 404-614-1241. 03.20.02 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5042 From: David Alexander Date: Thu Mar 21, 2002 6:35am Subject: Re: Firms undergo NSA Infosec rating I have to say this is a positive step in the right direction. It is to be hoped that one of the assessment criteria is: 'Must have ISO 17799 accreditation' Ok, so I'm biased, but it is as good a foundation to build security from as you could ever wish for. As we all know security is as much a state of mind as a set of physical and procedural safeguards. ISO 17799 positively encourages a good culture. It's one of the things the audit will look for and assess. My 2c. _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... From: David Alexander Date: Fri Mar 14, 2003 2:48am Subject: RE: France > -----Original Message----- > From: Ocean Group - MU TSD [mailto:inertia@o...] > Sent: 08 March 2003 15:54 > To: TSCM Group > Subject: [TSCM-L] France > > > What's sadder is that obviously it simply isn't a joke your > sending out but > a voice of contempt for people that do not agree with you. > > Anyway...on my last visit to France a couple of weeks ago I > sat down for > dinner with some friends...they couldn't believe what they > were seeing on > TV, Yanks pouring french wine in the gutter to show their > support for their > troops. What's more they promptly pointed out that everyone > in the US was > saying that without them in WW2 there would be no France. > They then informed > me that without France there would have been no USA during the war of > independence. Funny that. By the same token, you kicked our English butts in 1776, but now we're the ones lining up alongside you out in the desert. In the 14th & 15th Century England and France had a war known as the 'Hundred years war' (France 1, England 0 after extra time ), yet in 1944 we played a major part (with yourselves) in hauling them out of the fire. I seem to remember the US had something called the Monroe doctrine for a long time - what would hapen if you still had that in effect now ? They say 24 hours is a long time in politics, let alone 227 years. Things change. P.S. I always take my .308 calibre semi-auto accordian when I go hunting... David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 7024 From: A Grudko Date: Fri Mar 14, 2003 6:59pm Subject: Lo-jack (sp?) Anyone out there familiar with the tech. side of the lo-jack vehicle recovery system - I'm looking for the frequencies so that I can DF vehicles when I'm on police duty. I guess private replies are the most appropriate. Andy Grudko andy@g... (Hartbeesport Police Reserve). 7025 From: Marcel Date: Fri Mar 14, 2003 9:38am Subject: Re: Lo-jack (sp?) II. BACKGROUND 2. LoJack operates a stolen vehicle recovery system (SVRS) with state and local police departments across the nation. The system aids in the tracking and recovery of stolen vehicles. Section 90.20(e)(6) of the Commissionís Rules designates frequency 173.075 MHz for SVRS use, and sets forth certain technical parameters. For example, mobile units are restricted to a duty cycle of no more than 200 milliseconds every ten seconds, or 200 milliseconds every second when a vehicle is being tracked actively. The Waiver Request seeks a waiver of Section 90.20(e)(6), to permit LoJack to utilize a duty cycle of 1800 milliseconds every 300 seconds when the system is activated by unauthorized movement, with a maximum of six messages per mobile unit in any thirty-minute period. II. BACKGROUND 2. LoJack operates a stolen vehicle recovery system (SVRS) with state and local police departments across the nation. The system aids in the tracking and recovery of stolen vehicles. Section 90.20(e)(6) of the Commissionís Rules designates frequency 173.075 MHz for SVRS use, and sets forth certain technical parameters. For example, mobile units are restricted to a duty cycle of no more than 200 milliseconds every ten seconds, or 200 milliseconds every second when a vehicle is being tracked actively. The Waiver Request seeks a waiver of Section 90.20(e)(6), to permit LoJack to utilize a duty cycle of 1800 milliseconds every 300 seconds when the system is activated by unauthorized movement, with a maximum of six messages per mobile unit in any thirty-minute period. http://ftp.fcc.gov/Bureaus/Wireless/Orders/2000/da001987 A Grudko wrote: > Anyone out there familiar with the tech. side of the lo-jack vehicle > recovery system - I'm looking for the frequencies so that I can DF vehicles > when I'm on police duty. > I guess private replies are the most appropriate. > > Andy Grudko > andy@g... > (Hartbeesport Police Reserve). [Non-text portions of this message have been removed] 7026 From: Marcel Date: Fri Mar 14, 2003 10:11am Subject: Re: Lo-jack (sp?) Here is the LoJack III Theory of Operation And Tuning Procedure Manual From Motorola AIEG Revision: A May 16, 2000 (Note it may not include the new duty cycle referenced here: http://ftp.fcc.gov/Bureaus/Wireless/Orders/2000/da001987.doc) https://gullfoss2.fcc.gov/prod/oet/forms/blobs/retrieve.cgi?attachment_id=118716&native_or_pdf=pdf -- Marcel wrote: > II. BACKGROUND > > 2. LoJack operates a stolen vehicle recovery system (SVRS) with state and local police > departments across the nation. The system aids in the tracking and recovery of stolen > vehicles. Section 90.20(e)(6) of the Commissionís Rules designates frequency 173.075 MHz > for SVRS use, and sets forth certain technical parameters. For example, mobile units are > restricted to a duty cycle of no more than 200 milliseconds every ten seconds, or 200 > milliseconds every second when a vehicle is being tracked actively. The Waiver Request > seeks a waiver of Section 90.20(e)(6), to permit LoJack to utilize a duty cycle of 1800 > milliseconds every 300 seconds when the system is activated by unauthorized movement, with > a maximum of six messages per mobile unit in any thirty-minute period. > http://ftp.fcc.gov/Bureaus/Wireless/Orders/2000/da001987.doc -- "NEXTEL-1 IT'S NOT JUST NEXTEL" Note The New address Subscribe to Nextel-1: http://www.groups.yahoo.com/subscribe/NEXTEL-1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 7027 From: James M. Atkinson Date: Sat Mar 15, 2003 0:10am Subject: Dossier Updated - Ian A. Murphy "Captain Zap" Greetings, The dossier of Ian Murphy "Captain Zap" has been updated, and list members should find it interesting (or at least amusing). He is a dirt-bag felon, career felon, and career con artist. http://www.tscm.com/farms.html A number of list members have been screwed by this guy, and the industry as a whole should keep an eye out for him Ian Murphy is a homeless, penniless, petty criminal, convicted felon, psychiatric patient, with a severe narcotic and alcohol addiction. He has been convicted of numerous criminal offenses including felony theft, car theft, drunk driving, and so on. He has repeatedly been arrested for narcotics possession, domestic abuse, and various other "dirty boy" offenses. He is a close associate of Frank Jones "SpyKing" ( http://www.tscm.com/spyking.html ), and several other well know con artists and crackpots. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7028 From: Matt Paulsen Date: Sat Mar 15, 2003 0:42am Subject: RE: Dossier Updated - Ian A. Murphy "Captain Zap" ***** - Secretary Toes, the making. "I laughed... I cried... I cringed..." 7029 From: Matt Paulsen Date: Sat Mar 15, 2003 0:46am Subject: listserv for 1st line respondents? Any good suggestions for 1st line respondents that work in the private industry, yet coordinate with local/state/federal groups for 1st hour response? Areas of interest - government, emergency services, public health, information and telecommunications. TIA, Matt 7030 From: Matt Paulsen Date: Sat Mar 15, 2003 1:11am Subject: RE: Iraqi Cyberwar: an Ageless Joke Does anyone else remember that show from NBC - Secret Service, aired 16 Aug 1992? about the virus embedded in the printer.... I remember watching it that night, quick bling bling for such an early air of the evils of technology..snort. Found the snips below on it as well. So, can anyone validate the claims made in the story that was aired on national TV 11 years later? A few thoughts - someone mistook the fabled evil of all virii, the Novell Virus of 1990 when writing the story? Or, it was as accurate as the moon saga that Fox aired... or it happened as described, and could be the missing link in this urban legend. -various snips below- http://venus.soci.niu.edu/~cudigest/CUDS4/cud438.txt Date: 17 Aug 1992 12:24:24 -0400 (EDT) From: Stephen Tihor 212 998 3052 Subject: File 5--Secret Service -- the TV show Last night NBC broadcast an episode of "Secret Service" in NY at least that featured a straightforwards nut who wants to kill the President The expert quickly diagnosed the problem as a VIRUS. Interesting references were made to viruses lurking WITHIN modems. Then they identified the source of the attacking codes as the local font storage in what appeared to be a old DECwriter dot matrix printer. The expert has announced that this is a logic bomb and eventually realizes that since the bug code is not in the copy of the system on disk as long as they shutdown without writing memory to disk they can reboot bug free. So a brief deliberate blackout is used to save the city. -end snips- -----Original Message----- From: Matthijs van der Wel [mailto:tscm@f...] Sent: Thursday, March 13, 2003 7:01 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Iraqi Cyberwar: an Ageless Joke http://www.securityfocus.com/columnists/147 Did U.S. infowar commandos smuggle a deadly computer virus into Iraq inside a printer? Of course not. So why does it keep getting reported? ... Special Forces men were also said to have infiltrated Iraq, where they dug up a fiber-optic cable and jammed a computer virus into it. "It remained dormant until the opening moments of the air war, when it went active..." wrote the columnist. Iraq's air defense system was vanquished. ... Frankly, this is a great story. It's amusing to remember how it kicked up a storm in 1991 after its initial appearance as an April Fool's joke in Infoworld magazine. The gag asserted the National Security Agency had developed the computer virus to disable Iraqi air defense computers by eating windows -- "gobbling them at the edges..." The virus, called AF/91, was smuggled into Iraq through Jordan, hidden in a chip in a printer - - the latter being a distinguishing feature of many subsequent appearances of the hoax. ... Why was the hoax so successful? The easy answer is to simply call everyone who falls for the joke a momentary idiot. But the Gulf War virus plays to a uniquely American trait: a child-like belief in gadgets and technology and the people who make them as answers to everything. Secret National Security Agency computer scientists made viruses that hobbled Saddam's anti- air defense without firing a shot! Or maybe it didn't work but it sure was a good plan! In this respect, the joke is ageless. People are just as able to nebulously theorize about the tech of it and its implications in 2003 as they were in 1991. Will an updated version of the nonexistent AF/91 virus be used against unwired Iraq? Stay tuned... April 1st is less than a month away. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7031 From: Steve Uhrig Date: Sat Mar 15, 2003 10:35pm Subject: Wirtap prosecution http://www.eonline.com/News/Items/0,1,4775,00.html Remember this was 5 years ago when analog cell was deployed far more widely than it is today. Federal prosecution of a paparazzi for intercepting an analog cell phone call between Tom Cruise and his wife Nicole Kidman. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7032 From: Date: Sun Mar 16, 2003 5:11am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7033 From: Date: Sun Mar 16, 2003 5:11am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7034 From: Does it matter Date: Sat Mar 15, 2003 8:05pm Subject: WOW hope this isn't really being used If you're under FBI surveillance, there's a good chance your phone calls and Internet traffic are traveling over the equipment of Verint Systems -- a company that's doing very well these days, writes SecurityFocus' Kevin Poulsen. New York-based technology firm Verint Systems recently launched a product called "IntelliFind" that claims impressive capabilities. The system is designed to be attached to the phone lines at a company's call center, where it silently monitors every telephone call, and -- using advanced voice recognition technology -- picks out conversations in which certain keywords are spoken, dumping a digital recording into a searchable database. "You can decide you want to see all the calls where product 'xyz' was mentioned, and then you can pick one and listen to that entire call," says Alan Roden, Verint's VP of corporate development. If IntelliFind sounds like something that would normally be found on a supercomputer humming in an NSA basement, there's a reason. Behind business intelligence offerings like IntelliFind, and a line of networkable video cameras, Verint is a leading maker of electronic surveillance equipment and software for the United States and other governments. And it turns out that while other technology firms are struggling in a down economy, the business of helping governments with their spying may be a growth industry. In quarterly results announced Wednesday, Verint, a subsidiary of Comverse Technology, posted record sales of $42 million for the fourth quarter of fiscal year 2002 -- the company's third straight quarter of growth since going public in May 2002. "During the year we believe that a greater interest in gathering intelligence to prevent criminal activity by government and law enforcement agencies resulted in greater demand for our communication interception solutions," said company president Dan Bodner in a conference call for analysts. "Over the past year we enhanced our competitive position by entering new markets, expanding our customer base, and introducing new capabilities for the analysis of content and culled data collected from wireline, wireless and data networks." Among those new markets was an unnamed country "in the Latin America region" whose government recently placed a multi-million dollar order for communications interception systems, said Bodner. Bodner didn't say what the Latin American government bought with that money, but the mainstay of Verint's electronic surveillance business is its "STAR-GATE" and "RELIANT" products, which operate on the supply and consumption sides of domestic spying respectively. The RELIANT system acts as a government agency's big ear, collecting and managing intercepted voice, e-mail, fax, SMS, data, chat, and Web browsing -- all on a single platform. On the delivery side, STAR- GATE does the actual wiretapping, and is primarily marketed to telephone companies trying to comply with the 1994 Communications Assistance for Law Enforcement Act (CALEA), which requires telecommunications carriers to keep their networks wiretap friendly for the FBI. An ISP version of STAR-GATE lets Internet providers conduct lawful surveillance of their customers and send the intercepted data to law enforcement over private networks. PATRIOT Profits With recent legislation and court decisions granting U.S. law enforcement agencies greater spying powers than they've had since the Nixon administration, government surveillance solutions look like a good bet, and other technology companies are getting in on the game. Last Fall, VeriSign launched its "NetDiscovery" service -- a turnkey CALEA solution for telephone companies that sends intercepted communications to law enforcement over a national IP- based network, using Verint STAR-GATEs for the taps. And last August, computer security company Network Associates got into the Carnivore business with its acquisition of Utah-based Traxess, makers of the "DragNet" Internet spy tool. And for every company that makes the news with a surveillance system, there may be countless more that nobody's ever heard of. When the non-profit Electronic Privacy Information Center recently obtained a list of companies vying for a piece of the Defense Department's "Total Information Awareness" computerized spying project, the list of bidders included nearly as many obscure companies as it did brand name defense contractors. "It looks like there's this whole world of these little security technology companies that are probably doing well these days," says EPIC attorney David Sobel. But Gartner analyst John Pescatore isn't convinced that there's big money in domestic surveillance. Instead, he says, the real opportunities are in helping the U.S. perform surveillance internationally. Indeed, according to its quarterly report, Verint has a subsidiary that provides communications interception solutions to what's described demurely as "various U.S. government agencies." The subsidiary's offices hold a facility security clearance from the Defense Department, and are located in Chantilly, Virginia, a stone's throw from most of America's intelligence agencies. "Certainly with the USA-PATRIOT Act and all this homeland security stuff, there's been more effort in domestic collection," says Pescatore. "But the domestic type money has been a lot slower to start flowing than the national intelligence stuff... There's been definite growth there." 7035 From: Robin Hunter Date: Sun Mar 16, 2003 4:57am Subject: Re-FRANCE The Sunday Times, News Review Section, March 16th 2003; "Plans to revive Captain Scarlet, the vintage children's TV series, have hit a snag. France has vetoed the idea, saying that the evil Mysterons, Captain Scarlet's arch-enemy, pose no current threat to earth." regards from Scotland, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. [Non-text portions of this message have been removed] 7036 From: Dora Furlong Date: Sun Mar 16, 2003 2:32pm Subject: Re: WOW hope this isn't really being used A lot of engines for internet usage have been developed like this and do get used. The problem with these things is absolutely none of them, that i am aware of or have researched, actually provide integrity checking on the data as it is captured....a simple hash as it comes in, then validation the first time it is accessed and recheck of the hash any other time you wish it would be simple enough...but well how do we know this is the original data captured....I would not call this information evidence....I would call it an investigative lead that must be validated elsewhere. -->Dora On Sun, 16 Mar 2003, Does it matter wrote: > If you're under FBI surveillance, there's a good chance your phone > calls and Internet traffic are traveling over the equipment of > Verint Systems -- a company that's doing very well these days, > writes SecurityFocus' Kevin Poulsen. > > New York-based technology firm Verint Systems recently launched a > product called "IntelliFind" that claims impressive capabilities. > The system is designed to be attached to the phone lines at a > company's call center, where it silently monitors every telephone > call, and -- using advanced voice recognition technology -- picks > out conversations in which certain keywords are spoken, dumping a > digital recording into a searchable database. "You can decide you > want to see all the calls where product 'xyz' was mentioned, and > then you can pick one and listen to that entire call," says Alan > Roden, Verint's VP of corporate development. > > If IntelliFind sounds like something that would normally be found on > a supercomputer humming in an NSA basement, there's a reason. Behind > business intelligence offerings like IntelliFind, and a line of > networkable video cameras, Verint is a leading maker of electronic > surveillance equipment and software for the United States and other > governments. And it turns out that while other technology firms are > struggling in a down economy, the business of helping governments > with their spying may be a growth industry. In quarterly results > announced Wednesday, Verint, a subsidiary of Comverse Technology, > posted record sales of $42 million for the fourth quarter of fiscal > year 2002 -- the company's third straight quarter of growth since > going public in May 2002. > > "During the year we believe that a greater interest in gathering > intelligence to prevent criminal activity by government and law > enforcement agencies resulted in greater demand for our > communication interception solutions," said company president Dan > Bodner in a conference call for analysts. "Over the past year we > enhanced our competitive position by entering new markets, expanding > our customer base, and introducing new capabilities for the analysis > of content and culled data collected from wireline, wireless and > data networks." > > Among those new markets was an unnamed country "in the Latin America > region" whose government recently placed a multi-million dollar > order for communications interception systems, said Bodner. > > Bodner didn't say what the Latin American government bought with > that money, but the mainstay of Verint's electronic surveillance > business is its "STAR-GATE" and "RELIANT" products, which operate on > the supply and consumption sides of domestic spying respectively. > The RELIANT system acts as a government agency's big ear, collecting > and managing intercepted voice, e-mail, fax, SMS, data, chat, and > Web browsing -- all on a single platform. On the delivery side, STAR- > GATE does the actual wiretapping, and is primarily marketed to > telephone companies trying to comply with the 1994 Communications > Assistance for Law Enforcement Act (CALEA), which requires > telecommunications carriers to keep their networks wiretap friendly > for the FBI. An ISP version of STAR-GATE lets Internet providers > conduct lawful surveillance of their customers and send the > intercepted data to law enforcement over private networks. > > PATRIOT Profits > > With recent legislation and court decisions granting U.S. law > enforcement agencies greater spying powers than they've had since > the Nixon administration, government surveillance solutions look > like a good bet, and other technology companies are getting in on > the game. Last Fall, VeriSign launched its "NetDiscovery" service -- > a turnkey CALEA solution for telephone companies that sends > intercepted communications to law enforcement over a national IP- > based network, using Verint STAR-GATEs for the taps. And last > August, computer security company Network Associates got into the > Carnivore business with its acquisition of Utah-based Traxess, > makers of the "DragNet" Internet spy tool. > > And for every company that makes the news with a surveillance > system, there may be countless more that nobody's ever heard of. > When the non-profit Electronic Privacy Information Center recently > obtained a list of companies vying for a piece of the Defense > Department's "Total Information Awareness" computerized spying > project, the list of bidders included nearly as many obscure > companies as it did brand name defense contractors. "It looks like > there's this whole world of these little security technology > companies that are probably doing well these days," says EPIC > attorney David Sobel. > > But Gartner analyst John Pescatore isn't convinced that there's big > money in domestic surveillance. Instead, he says, the real > opportunities are in helping the U.S. perform surveillance > internationally. Indeed, according to its quarterly report, Verint > has a subsidiary that provides communications interception solutions > to what's described demurely as "various U.S. government agencies." > The subsidiary's offices hold a facility security clearance from the > Defense Department, and are located in Chantilly, Virginia, a > stone's throw from most of America's intelligence agencies. > > "Certainly with the USA-PATRIOT Act and all this homeland security > stuff, there's been more effort in domestic collection," says > Pescatore. "But the domestic type money has been a lot slower to > start flowing than the national intelligence stuff... There's been > definite growth there." > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > One net to rule them all One net to find them One net to bring them all Using Unix to bind them 7037 From: human being Date: Sun Mar 16, 2003 5:27pm Subject: TSCM-L fish story comments below relate to this recent NYC story.... Fish Talks, Town Buzzes http://www.nytimes.com/2003/03/15/nyregion/15FISH.html i am curious if, in the history of TSCM, that someone has made 'things talk' through remote microphones to speakers, or with pre-recorded messages embedded in other devices, instead of just listening but for fear. once i heard of a house that was thought to be haunted or that it was being terrorized by someone unknown, who had control over the answering machine, lights, etc. this all led me to wonder if, in the area of wireless lapel microphones and the nature of carp's voracious ability to eat (anything and everything) that it may have had room for an electromagnetic speaker. possible? has this ever happened? or is this just in the pranks/jokes category and would serve no other purpose (disinformation or misinformation). curious, it is. brian http://www.electronetwork.org/list/ 7038 From: Andre Holmes <1ach@g...> Date: Mon Mar 17, 2003 2:30am Subject: Re: TSCM-L fish story Hello Brian It is in no way a superstition but reality. A careful sweep will uncover the Microphone sooner or later. Andre Holmes Neptune Enterprise Security ----- Original Message ----- From: "human being" To: Sent: Sunday, March 16, 2003 6:27 PM Subject: [TSCM-L] TSCM-L fish story > > comments below relate to this recent NYC story.... > > Fish Talks, Town Buzzes > http://www.nytimes.com/2003/03/15/nyregion/15FISH.html > > i am curious if, in the history of TSCM, that someone has made > 'things talk' through remote microphones to speakers, or with > pre-recorded messages embedded in other devices, instead of > just listening but for fear. once i heard of a house that was thought > to be haunted or that it was being terrorized by someone unknown, > who had control over the answering machine, lights, etc. this all > led me to wonder if, in the area of wireless lapel microphones and > the nature of carp's voracious ability to eat (anything and everything) > that it may have had room for an electromagnetic speaker. possible? > has this ever happened? or is this just in the pranks/jokes category > and would serve no other purpose (disinformation or misinformation). > > curious, it is. brian > http://www.electronetwork.org/list/ > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 7039 From: A Grudko Date: Sun Mar 16, 2003 8:58pm Subject: TSCM-L fish story - Original Message - From: human being To: Sent: Monday, March 17, 2003 1:27 AM Subject: [TSCM-L] TSCM-L fish story > > comments below relate to this recent NYC story.... > > Fish Talks, Town Buzzes > http://www.nytimes.com/2003/03/15/nyregion/15FISH.html > > i am curious if, in the history of TSCM, that someone has made > 'things talk' through remote microphones to speakers, or with > pre-recorded messages embedded in other devices, instead of > just listening but for fear. once i heard of a house that was thought > to be haunted or that it was being terrorized by someone unknown, > who had control over the answering machine, lights, etc. this all > led me to wonder if, in the area of wireless lapel microphones and > the nature of carp's voracious ability to eat (anything and everything) > that it may have had room for an electromagnetic speaker. possible? > has this ever happened? or is this just in the pranks/jokes category > and would serve no other purpose (disinformation or misinformation). Go back to basics and a moving coil over a fixed magnet is both speaker and microphone. OK, the impedances are missmatched so frequency response and levels are terrible, but add the right impedance matching transformer and a 4 - 8 ohm speaker becomes a 600 - 1200 ohm dynamic mike. I must admit I've never tried to make an electret mike act like a speaker, but I'm sure I could at least make it shriek like the Carp From Hell.... Andy Grudko (British), Grad I.S, South Africa Registered as a security service provider by the Private Security Industry Regulatory Authority, registration number. 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 7040 From: Date: Mon Mar 17, 2003 9:07am Subject: Ex-Va. GOP Head's Wiretap Charges Upheld Ex-Va. GOP Head's Wiretap Charges Upheld By ADRIENNE SCHWISOW .c The Associated Press RICHMOND, Va. (AP) - A federal judge refused Monday to throw out charges that the former head of Virginia's Republican Party illegally eavesdropped on and recorded Democratic conference calls. Attorneys for Edmund Matricardi III argued that his participation in the two calls was legal under Virginia's Freedom of Information Act and the First Amendment. But prosecutors said it was a criminal act because he listened to a Democratic strategy session without identifying himself or getting consent from Democratic legislators. ``He's being prosecuted for one reason and one reason only: As a partisan, he clandestinely and deliberately listened in on Democratic Party conference calls for his own selfish reasons,'' Assistant U.S. Attorney Stephen Miller said. U.S. District Judge James Spencer said he would explain his ruling in favor of the prosecution in a later written memorandum. Matricardi, 34, is scheduled to go on trial April 9 on five felony charges related to wiretapping for allegedly eavesdropping on two Democratic strategy sessions and recording one of them. Claudia Tucker, chief of staff to former state House Speaker S. Vance Wilkins Jr., has pleaded guilty to a misdemeanor for listening in on one of the calls. Because of the scandal, Matricardi resigned as Virginia GOP director. He later joined the South Carolina GOP as operations director, then quit that post after he was indicted in Virginia. A former Democratic legislative aide admitted in a plea agreement last month that he distributed the phone number and access code for the private Democratic conference calls. 03/17/03 14:56 EST [Non-text portions of this message have been removed] 7041 From: doug ellsworth Date: Mon Mar 17, 2003 1:37am Subject: UV eye protection Hi group, Need a source for eye protection when using various wavelengths of UV. Would like max protection yet minimal interference of visual discrimination. I've been using just COTS UV sunglasses, but am concerned about fairly long total periods of reflected exposure during some physical inspections. Special goggles? Or should I consider rigging up a special close-up video/monitor "viewer" to my UV source and completely shield eyes from ambient UV? Thanks, -Doug 7042 From: Date: Mon Mar 17, 2003 3:47pm Subject: Re: TSCM-L fish story I used to do this in High School. I needed a little speaker and didn't have anything else, so I plugged the mic into the output and with the vol down low, was able to hear the feed. Played around and did this with a radio too. Took a smashed radio and spliced the (broken) speaker wires to a little lapel mic and had an ear piece. Not the best sound, but clear enough. :-) At 20:58 3/16/03, A Grudko wrote: >- Original Message - >From: human being >To: >Sent: Monday, March 17, 2003 1:27 AM >Subject: [TSCM-L] TSCM-L fish story > > > > > > comments below relate to this recent NYC story.... > > > > Fish Talks, Town Buzzes > > http://www.nytimes.com/2003/03/15/nyregion/15FISH.html > > > > i am curious if, in the history of TSCM, that someone has made > > 'things talk' through remote microphones to speakers, or with > > pre-recorded messages embedded in other devices, instead of > > just listening but for fear. once i heard of a house that was thought > > to be haunted or that it was being terrorized by someone unknown, > > who had control over the answering machine, lights, etc. this all > > led me to wonder if, in the area of wireless lapel microphones and > > the nature of carp's voracious ability to eat (anything and everything) > > that it may have had room for an electromagnetic speaker. possible? > > has this ever happened? or is this just in the pranks/jokes category > > and would serve no other purpose (disinformation or misinformation). > >Go back to basics and a moving coil over a fixed magnet is both speaker and >microphone. OK, the impedances are missmatched so frequency response and >levels are terrible, but add the right impedance matching transformer and a >4 - 8 ohm speaker becomes a 600 - 1200 ohm dynamic mike. > >I must admit I've never tried to make an electret mike act like a speaker, >but I'm sure I could at least make it shriek like the Carp From Hell.... > >Andy Grudko (British), Grad I.S, South Africa >Registered as a security service provider by the Private Security Industry >Regulatory Authority, registration number. 8642 >www.grudko.com , andy@g... . Est. 1981. International investigations >(+27 12) 244 0255 - 244 0256 (Fax). >IPA, SACI, WAD, CALI, UKPIN, IWWA. >When you need it done right - first time > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7043 From: Fernando Martins Date: Tue Mar 18, 2003 3:56pm Subject: Nokia SGSN (DX200 Based Network Element) SNMP issue This may have some interest here ...FM@stake, Inc. www.atstake.com Security Advisory Advisory Name: Nokia SGSN (DX200 Based Network Element) SNMP issue Release Date: 03/13/2003 Application: Nokia SGSN (DX200 Based Network Element) Platform: DX200 Severity: An attacker is able to read SNMP options with any community string Author: Ollie Whitehouse [ollie@a...] Vendor Status: Vendor has removed support for this protocol CVE Candidate: CVE Candidate number applied for Reference: www.atstake.com/research/advisories/2003/a031303-2.txt Overview: Nokia's (http://www.nokia.com) SGSN (Serving GPRS support node) is the platform which exists between the legacy GSM network and the new IP core of the GPRS network. This enables operators to deploy high speed data access over the top of their GSM network with minimal upgrades to their BSCs (Base Station Controllers), thus making the transition from a 2.0G to a 2.5G network. Due to its position in the network (i.e. between the RF network and the IP network) the SGSN will have interfaces on the SS7 signaling network and the IP core network as well as connections to the BSCs. For this reason, the SGSN can be considered a key part of the infrastructure of any mobile operator looking to deploy GPRS. A vulnerability exists in the SNMP (Simple Network Management Protocol) daemon of the DX200 based network element that allows an attacker to read SNMP options with ANY community string. This is a good example of why network elements which introduce IP functionality to legacy networks should have their functionality verified in terms of impact on security before deployment in a production environment. Proof of Concept: The following proof of concept will return the default MIB information on the DX200 based network element using the snmpwalk and snmpset commands which ship by default with operating systems such as Linux. [reading of SNMP details] snmpwalk tellmeyoursecrets Vendor Response: In SNMP v1 (RFC 1157) and v2c (RFC 1901) standards, authentication is based on a community string (text string) representing an unencrypted username without a password. A recognized concern in industry is that the security check as documented in these SNMP standards is inadequate. Because of the above, read access to MIB-II (RFC 1213) variables is allowed in Nokia SGSN SG1 / SG1.5 products with any community string value. However, write access to MIB-II variables is not permitted in Nokia SGSN SG1 / SG1.5 products, even though the SNMP MIB-II RFC standard defines some of the MIB-II variables to be write accessible. Nokia has made a product design decision that the value of each write accessible MIB-II variable remains unchanged, even in cases where the SNMP agent in Nokia SGSN SG1 / SG1.5 products would return an OK status notification as a response to the SNMP set-request operation. This means that a malicious attacker is under no circumstances able to alter any settings of Nokia SGSN SG1 / SG1.5 products via the SNMP interface. Furthermore, support for the SNMP interface has been removed from subsequent Nokia SGSN releases, which eliminates the possibilities for SNMP based vulnerabilities completely. Vendor Recommendation: Network operators do not need to take any further action. @stake Recommendation: Typically in a GPRS network design, the SGSN should not be contactable from the Gi interface of the GGSN where the user's routable IP is located. This is due to the fact that GGSN to SGSN communication occurs over the Gn interface. However @stake has observed instances where the NMS (Network Management System) network is routable from the Gi network. If the SGSN has an NMS connection, then appropriate ACLs (Access Control Lists) should be deployed on the routing device or firewall between the Gi and the NMS networks to restrict access to SNMP. Common Vulnerabilities and Exposures (CVE) Information: The Common Vulnerabilities and Exposures (CVE) project has assigned the following names to these issues. These are candidates for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. CAN-2003-0137 @stake Vulnerability Reporting Policy: http://www.atstake.com/research/policy/ @stake Advisory Archive: http://www.atstake.com/research/advisories/ PGP Key: http://www.atstake.com/research/pgp_key.asc @stake is currently seeking application security experts to fill several consulting positions. Applicants should have strong application development skills and be able to perform application security design reviews, code reviews, and application penetration testing. Please send resumes to jobs@a.... Copyright 2003 @stake, Inc. All rights reserved. 7044 From: Matt Paulsen Date: Tue Mar 18, 2003 10:25pm Subject: RE: Nokia SGSN (DX200 Based Network Element) SNMP issue @stake is so in need of cash... get me boundschecker and notepad.. I'll go find a 'vulnerability' to match this one in wit, style and class in no time and write up some witty 'security advisory' to boot. Heck, forget notepad.. copy con I say. Where's my f6 key? -----Original Message----- From: Fernando Martins [mailto:fernando.martins@e...] Sent: Tuesday, March 18, 2003 1:57 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Nokia SGSN (DX200 Based Network Element) SNMP issue This may have some interest here ...FM@stake, Inc. www.atstake.com Security Advisory Advisory Name: Nokia SGSN (DX200 Based Network Element) SNMP issue Release Date: 03/13/2003 Application: Nokia SGSN (DX200 Based Network Element) Platform: DX200 Severity: An attacker is able to read SNMP options with any community string Author: Ollie Whitehouse [ollie@a...] Vendor Status: Vendor has removed support for this protocol CVE Candidate: CVE Candidate number applied for Reference: www.atstake.com/research/advisories/2003/a031303-2.txt Overview: Nokia's (http://www.nokia.com) SGSN (Serving GPRS support node) is the platform which exists between the legacy GSM network and the new IP core of the GPRS network. This enables operators to deploy high speed data access over the top of their GSM network with minimal upgrades to their BSCs (Base Station Controllers), thus making the transition from a 2.0G to a 2.5G network. Due to its position in the network (i.e. between the RF network and the IP network) the SGSN will have interfaces on the SS7 signaling network and the IP core network as well as connections to the BSCs. For this reason, the SGSN can be considered a key part of the infrastructure of any mobile operator looking to deploy GPRS. A vulnerability exists in the SNMP (Simple Network Management Protocol) daemon of the DX200 based network element that allows an attacker to read SNMP options with ANY community string. This is a good example of why network elements which introduce IP functionality to legacy networks should have their functionality verified in terms of impact on security before deployment in a production environment. Proof of Concept: The following proof of concept will return the default MIB information on the DX200 based network element using the snmpwalk and snmpset commands which ship by default with operating systems such as Linux. [reading of SNMP details] snmpwalk tellmeyoursecrets Vendor Response: In SNMP v1 (RFC 1157) and v2c (RFC 1901) standards, authentication is based on a community string (text string) representing an unencrypted username without a password. A recognized concern in industry is that the security check as documented in these SNMP standards is inadequate. Because of the above, read access to MIB-II (RFC 1213) variables is allowed in Nokia SGSN SG1 / SG1.5 products with any community string value. However, write access to MIB-II variables is not permitted in Nokia SGSN SG1 / SG1.5 products, even though the SNMP MIB-II RFC standard defines some of the MIB-II variables to be write accessible. Nokia has made a product design decision that the value of each write accessible MIB-II variable remains unchanged, even in cases where the SNMP agent in Nokia SGSN SG1 / SG1.5 products would return an OK status notification as a response to the SNMP set-request operation. This means that a malicious attacker is under no circumstances able to alter any settings of Nokia SGSN SG1 / SG1.5 products via the SNMP interface. Furthermore, support for the SNMP interface has been removed from subsequent Nokia SGSN releases, which eliminates the possibilities for SNMP based vulnerabilities completely. Vendor Recommendation: Network operators do not need to take any further action. @stake Recommendation: Typically in a GPRS network design, the SGSN should not be contactable from the Gi interface of the GGSN where the user's routable IP is located. This is due to the fact that GGSN to SGSN communication occurs over the Gn interface. However @stake has observed instances where the NMS (Network Management System) network is routable from the Gi network. If the SGSN has an NMS connection, then appropriate ACLs (Access Control Lists) should be deployed on the routing device or firewall between the Gi and the NMS networks to restrict access to SNMP. Common Vulnerabilities and Exposures (CVE) Information: The Common Vulnerabilities and Exposures (CVE) project has assigned the following names to these issues. These are candidates for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. CAN-2003-0137 @stake Vulnerability Reporting Policy: http://www.atstake.com/research/policy/ @stake Advisory Archive: http://www.atstake.com/research/advisories/ PGP Key: http://www.atstake.com/research/pgp_key.asc @stake is currently seeking application security experts to fill several consulting positions. Applicants should have strong application development skills and be able to perform application security design reviews, code reviews, and application penetration testing. Please send resumes to jobs@a.... Copyright 2003 @stake, Inc. All rights reserved. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7045 From: Date: Wed Mar 19, 2003 1:31am Subject: Bugging Devices Found in French EU Office Bugging Devices Found in French EU Office .c The Associated Press BRUSSELS, Belgium (AP) - Electronic bugging devices have been found in offices used by the French and German delegations in a building where an European Union summit will open on Thursday, EU officials said. EU spokesman Dominique-George Marro said Wednesday the EU had launched an investigation into the bugs, but had no immediate idea who was behind it. He said listening devices were also found in offices used by other EU nations, but declined to say which or how many. The offices were in an EU headquarters building. ``We found anomalies in the telephone lines'' during regular security checks a few days ago, said Marro by telephone. He said only a small number of lines had been affected. Leaders of the 15 EU nations are scheduled to hold a summit Thursday and Friday in the sprawling Justus Lipsius building which houses the secretariat of the EU council of ministers. The EU's regular meetings of ministers are held there. The building also houses the offices of Javier Solana, the EU's high representative for foreign and security policy. 03/19/03 07:02 EST [Non-text portions of this message have been removed] 7046 From: David Alexander Date: Wed Mar 19, 2003 9:31am Subject: FW: TSCM-L speaker I would have thought a Sea Bass would be a much better candidate for a speaker than a Carp..... David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk X-eGroups-Return: sentto-49964-7513-1047917219-dave_ale=etmra.com@r... X-Sender: agrudko@i... X-Apparently-To: TSCM-L@yahoogroups.com To: X-Mailer: Microsoft Outlook Express 5.00.2615.200 From: "A Grudko" X-Yahoo-Profile: damstuff2000 Mailing-List: list TSCM-L@yahoogroups.com; contact TSCM-L-owner@yahoogroups.com Delivered-To: mailing list TSCM-L@yahoogroups.com List-Unsubscribe: Date: Mon, 17 Mar 2003 04:58:15 +0200 Subject: [TSCM-L] TSCM-L fish story - Original Message - From: human being To: Sent: Monday, March 17, 2003 1:27 AM Subject: [TSCM-L] TSCM-L fish story > > comments below relate to this recent NYC story.... > > Fish Talks, Town Buzzes > http://www.nytimes.com/2003/03/15/nyregion/15FISH.html > > i am curious if, in the history of TSCM, that someone has made > 'things talk' through remote microphones to speakers, or with > pre-recorded messages embedded in other devices, instead of > just listening but for fear. once i heard of a house that was thought > to be haunted or that it was being terrorized by someone unknown, > who had control over the answering machine, lights, etc. this all > led me to wonder if, in the area of wireless lapel microphones and > the nature of carp's voracious ability to eat (anything and everything) > that it may have had room for an electromagnetic speaker. possible? > has this ever happened? or is this just in the pranks/jokes category > and would serve no other purpose (disinformation or misinformation). Go back to basics and a moving coil over a fixed magnet is both speaker and microphone. OK, the impedances are missmatched so frequency response and levels are terrible, but add the right impedance matching transformer and a 4 - 8 ohm speaker becomes a 600 - 1200 ohm dynamic mike. I must admit I've never tried to make an electret mike act like a speaker, but I'm sure I could at least make it shriek like the Carp From Hell.... Andy Grudko (British), Grad I.S, South Africa Registered as a security service provider by the Private Security Industry Regulatory Authority, registration number. 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time David Alexander Towcester, Northamptonshire, England Competition Co-ordinator - MSA British Drag Racing Championship Founder member, European Top Methanol Racers Association www.etmra.com Gone racing, back in 5.5 seconds 7047 From: Hawkspirit Date: Wed Mar 19, 2003 6:10pm Subject: Caller ID http://cgi1.ebay.com/aw-cgi/eBayISAPI.dll?MakeTrack&item=3012540984 7048 From: Robert Dyk Date: Wed Mar 19, 2003 8:28pm Subject: RE: Caller ID We are about to sell a large lot of our inventory of CCTV equipment including NIB Panasonic Pan Tilt drives, NIB Burle housings and brackets, High security in-wall housings as well as multiplexers, quad splitters, etc etc. Anyone on the list interested in this or other CCTV equipment, before it goes on ebay or other, please contact me privately. Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. 7049 From: Date: Wed Mar 19, 2003 1:39pm Subject: Rif: FW: TSCM-L speaker > I would have thought a Sea Bass would be a much better candidate for a > speaker than a Carp..... Especially since the fish was still alive when the phenomenon was observed: the sea bass still had reflexes.... Ciao! Remo Cornali, Milano, Italy 7050 From: James M. Atkinson Date: Thu Mar 20, 2003 6:14am Subject: Short and Sweet Support our Troops. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7051 From: Ocean Group - MU TSD Date: Thu Mar 20, 2003 4:57am Subject: US keeping on eye on the EU...or rather an ear Hmm......wonder who they use for their sweeps? Any ideas? If anyone digs up the Le Figaro article I would appreciate a copy....... Cheers Vance Deran Ocean Group, Technical Security Division, Ireland. _______________ Listening devices found in offices of EU states From:ireland.com Thursday, 20th March, 2003 Brussels: Electronic bugging devices have been found in offices used by six EU member-states at a Brussels building where European leaders will meet this evening, writes Denis Staunton, in Brussels The devices, describes as "highly sophisticated", were discovered almost three weeks ago during a routine sweep by security staff at the Justus Lipsius building, headquarters of the EU Council of Ministers. The bugs were found in telephone cabling in rooms used by French, German, British, Italian, Spanish and Austrian delegations during meetings of EU ministers. Devices were also discovered in rooms that were once used as offices but now serve other functions, such as storage rooms. The French newspaper Le Figaro broke the story yesterday, saying that Belgian authorities are convinced that the US was behind the bugging. However, a spokesman for the Council of Ministers, Mr Dominique-Georges Marro, said that, although an investigation was under way, it was not yet possible to say who was responsible. "We have no evidence that it was the Americans but we also have none that it wasn't," he said. A spokesman for the US mission to the EU said the mission had received no communication from the council about the investigation into the bugging. The six countries whose delegation rooms were bugged were informed as soon as the discovery was made. It was not until Le Figaro reported the story that other member-states, including Greece, which holds the EU presidency, were informed. The EU foreign policy chief, Mr Javier Solana, who has offices in the building, first heard about the discovery yesterday, but he was told that no devices were found in his offices or those of the military staff in the building. Sweden's EU ambassador, Mr Sven-Olaf Petersson, said after a briefing by council officials that the devices were found on February 28th, but there were indications that they may have been installed before the building was inaugurated in 1995. "They were very sophisticated installations, we are told, which only a few intelligence services are able to install," he said. There have long been concerns about security at the Justus Lipsius building, and NATO officials have refused to attend meetings there on the basis that the rooms were not secure. When Mr Solana moved into the building, he installed a number of "secure" rooms which are swept for listening devices. 7052 From: Robin Hunter Date: Thu Mar 20, 2003 7:20am Subject: Re-Short and Sweet Seconded from Scotland, UK. ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. From: James M. Atkinson, Comm-Eng Date: Thu Mar 15, 2001 9:09am Subject: Re: REI reply to assistance? At 10:14 PM -0500 3/14/01, Edward J. Michaels wrote: >I guess this is all 1 each OSCOR, ORION and CPM-700 gets you when >dealing with a busy manufacturer? > >"Hello Edward J. > >We have received you're request and will respond as soon as possible. > >Thank You, >Research ELectronics Intl. >Copyright ©2000 Research ELectronics Intl. All Rights Reserved" Edward, I wouldn't be concerned, it was probably just a courtesy reply that REI sent you until a tech person could get back with you to take care of whatever problem or question you had. If for some reason you don't get the issue taken care of then feel free to present it to the list as there are easily 100 OSCORs, 50 ORIONs, and tons of other equipment between all of the 800+ active list members. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2733 From: James M. Atkinson, Comm-Eng Date: Thu Mar 15, 2001 0:07pm Subject: Two Eskimos sitting in a kayak were chilly. Ouch, ouch, ouch . . . Two Eskimos sitting in a kayak were chilly. When they lit a fire in the craft it sank, proving once and for all that you can't have your kayak and heat it too. Two boll weevils grew up in South Carolina. One went to Hollywood and became a famous actor. The other stayed behind in the cotton fields and never amounted to much. The second one, naturally, was known as the lesser of two weevils. It gets worse . . . A three-legged dog walked into a saloon in the Old West. He slid up to the bar and announced "I'm looking for the man who shot my paw." Did you hear about the Buddhist who refused his dentist's Novocain during root canal work? He wanted to transcend dental medication. A group of chess enthusiasts checked into a hotel and were standing in the lobby discussing their recent tournament victories. After about an hour, the manager came out of the office and asked them to disperse. "But why?" they asked, as they moved off. "Because," he said, "I can't stand chess nuts boasting in an open foyer." A man entered his local paper's pun contest. He sent in ten different puns, in the hope that at least one of the puns would win. Unfortunately, no pun in ten did. And worse . . . A woman had twins, and gave them up for adoption. One of them went to a family in Egypt and was named Amahl. The other went to a family in Spain; they named him Juan. Years later, Juan sent a picture of himself to his mother. Upon receiving the picture, she told her husband that she wished she also had a picture of Amahl. Her husband responded, "But they are twins--if you've seen Juan, you've seen Amahl." And now the piece de resistance . . . Some friars were behind on their belfry payments, so they opened up a small florist shop to raise the funds. Since everyone liked to buy flowers from the "Men of God," the rival florist across town thought the competition was unfair. He asked the good fathers to close down, but they would not. He went back and begged the friars to close. They ignored him. He asked his mother to ask the friars to get out of business. They ignored her, too. So the rival florist hired Hugh MacTaggart, the toughest and most vicious thug in town to "persuade" them to close. Hugh beat up the friars and trashed their store,saying he'd be back if they didn't close shop. Terrified, they did so, thereby proving once again (Brace yourself) that Hugh, and only Hugh, can prevent florist friars. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2734 From: James M. Atkinson, Comm-Eng Date: Thu Mar 15, 2001 0:22pm Subject: ATV Video Signals Here are some more ATV video signals that may be used for covert video. Mostly AM video, but could be FM. 421.25 426.25 427.25 434.92 434.00 439.25 471.75 477.25 483.25 489.25 495.25 910.25 922.25 923.25 1253.25 1277.25 1289.25 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2735 From: James M. Atkinson, Comm-Eng Date: Thu Mar 15, 2001 7:02pm Subject: Think Keystone Kops When You Think of Our Spies Think Keystone Kops When You Think of Our Spies http://www.latimes.com/news/comment/20010315/t000022616.html By ALEXANDER COCKBURN The air quivers with gloomy assessments of the secrets "compromised" by the FBI's Robert Philip Hanssen, a senior official who stands accused of working for the Russians since 1985. If you believe the FBI affidavit against him filed in federal court, Hanssen not only betrayed spies working for the U.S.--some of whom were then executed--he ratted on "an entire technical program of enormous value, expense and importance to the United States." This turns out to have been the construction of a tunnel under the new Russian Embassy in Washington. Hanssen also allegedly trundled documents by the cartload to "dead drops" in various suburbs around Washington, often within a few minutes walk from his house. It's amusing to listen to U.S. counterintelligence officials now scorning Hanssen for lack of "trade craft" in using the same drop week after week. These are the same caliber of counterintelligence officials who remained incurious across the decades about the tinny clang of empty drawers in their "TOP SECRET" filing cabinets, all contents removed on a daily basis by one spy or another--Hanssen or, earlier, the CIA's Aldrich H. Ames are just two examples--who apparently deemed the use of copying machines too laborious. In just one assignment, the CIA later calculated, Ames gave the KGB a stack of documents estimated to be 15 to 20 feet high. The FBI's Hanssen was slack about "trade craft" because he knew just how remote the possibility of discovery was. The only risk he couldn't accurately assess was the one that brought him down: betrayal by a Russian official privy to the material he was sending to Moscow. The record of proven failure by U.S. intelligence agencies is long and dismal. To take two of the most notorious lapses, the CIA failed to predict the Sino-Soviet split and also gravely underestimated the speed with which the Soviet Union was falling apart, a blunder that the agency later tried to blame on Ames. In the mid-1990s, CIA Director John Deutch testified to Congress that "taken as a whole, Ames' activities facilitated the Soviet, and later the Russian, effort to engage in perception management operations." The purpose of this "perception management program," according to Deutch? "To convince us that the Soviets remained a superpower and that their military R&D program was robust." So here was Deutch (himself scandalously pardoned by President Clinton after personally perpetrating some of the most egregious security lapses in the CIA's history) claiming that treachery by the CIA's man Ames was the reason the CIA failed to notice that the Soviet Union was falling apart. Following that line of analysis, Ames could have entered a plea of innocence on the grounds that in helping the Soviet Union exaggerate its might, he was only following official agency policy. After all, one of the prime functions of the CIA in the Cold War years was to inflate the military capabilities of the Soviet Union, thereby assisting military contractors and their allies in Congress and the Pentagon in the extraction of money to build more weapons to counter these entirely imaginary Soviet threats. Back in the mid-1970s, CIA Director George H.W. Bush found that regular CIA analysts were making insufficiently alarmist assessments of Soviet might and promptly installed Team B, a group replete with trained exaggerators, who then contrived the lies necessary to justify the soaring Pentagon procurement budgets of the Reagan '80s. Anyway, real secrets, the kind that divert the mighty over breakfast, don't concern weapons but gossip: the exact capabilities of Dick Cheney's heart, for example, or the sexual peccadilloes of public figures. That's the sort of stuff J. Edgar Hoover used to keep in his safe. These days, the nation's real intelligence work is being done by the National Enquirer. We could cut off the CIA and FBI intelligence budgets and improve the security of this nation all at once by simply relying on its pages. A final parable about another intelligence debacle is the failure to predict Egypt's attack on Israel in the Yom Kippur War in October 1973. In fact, a CIA analyst named Fred Fear had noticed earlier that year that the Egyptians were buying a lot of bridge-building equipment from the Russians. Assessing the nature and amount of this equipment, Fear figured out where the bridges would be deployed across the Suez Canal and how many troops could get across them. He wrote a report, with maps, predicting how the Egyptians would attack. Fear's superiors ignored the report until the attack took place. Then they hauled it out, tore off the maps and sent them to the White House, labeled as "current intelligence." - - - Alexander Cockburn Is Co-author With Jeffrey St. Clair and Allan Sekula of "Five Days That Shook the World: Seattle and Beyond," Just Released by Verso Press -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2736 From: James M. Atkinson, Comm-Eng Date: Thu Mar 15, 2001 7:03pm Subject: FBI Names Counterintelligence Chief FBI Names Counterintelligence Chief http://www.worldnews.com/?action=display&article=6218187&template=worldnews/search.txt&index=recent The Associated Press, Thu 15 Mar 2001 WASHINGTON (AP) ≠ The FBI chose a 28-year veteran agent and former counterespionage chief at the CIA to coordinate the government's spy-fighting activities. FBI Special Agent David W. Szady was named Thursday to head a counterintelligence ``board of directors'' that includes senior deputies at the CIA and the Defense Department and FBI Director Louis Freeh. The position was created by an executive order signed by President Clinton in January. Szady, a special agent in the FBI's Portland, Ore., office, has 25 years of experience in counterintelligence investigations, and has served as chief of the CIA's counterintelligence center, the FBI said in a news release. A 28-year FBI veteran, Szady has been assigned to counterintelligence matters in San Francisco and Washington. Freeh said Szady's job will be to ``develop a national strategy for the protection of the nation's most sensitive national security information in coordination with the United States counterintelligence community.'' The announcement comes a month after the FBI accused veteran agent Robert Philip Hanssen of spying for Moscow for 15 years while holding a variety of counterintelligence jobs with access to some of the country's most sensitive secrets. How Hanssen allegedly spied without being detected by his supervisors has raised questions about security practices at the FBI and sparked two internal investigations. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2737 From: James M. Atkinson, Comm-Eng Date: Thu Mar 15, 2001 7:04pm Subject: FBI selects counterintelligence czar FBI selects counterintelligence czar http://www.cnn.com/2001/US/03/15/fbi.counterspy.czar/index.html March 15, 2001 Web posted at: 11:26 a.m. EST (1626 GMT) From CNN Correspondent Kelli Arena WASHINGTON (CNN) -- FBI Director Louis Freeh has selected a counterintelligence "czar" who will be given the task of strengthening U.S. capabilities to track spies, CNN learned Thursday. FBI special agent David Szady will be the new director of the program called CI21. Szady is a 28-year counterintelligence specialist who heads the FBI's Portland, Oregon, field office. The White House is expected to make the announcement, followed by a statement from the FBI. CI21 -- which stands for counterintelligence for the 21st century -- was created by a presidential directive signed in the last days of the Clinton administration. The directive mandates the appointment of a counterspy czar. The directive also outlines steps to enable the counterintelligence officials to better fulfill their mission of identifying, understanding, prioritizing and counteracting the intelligence threats faced by the United States. The FBI has come under increasing criticism following the arrest of Robert Hanssen, a 25-year FBI veteran who allegedly served as a spy for the Soviet Union and then Russia starting in 1985. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2738 From: Steve Uhrig Date: Thu Mar 15, 2001 9:41pm Subject: Video, TSCM, surveillance and cameras Hello all, Anyone installing, using or maintaining video systems of any sort may enjoy reading an article I recently wrote and just posted to our site: http://www.swssec.com/videoart.html Police & Security News magazine will print it in 4 parts starting with the March issue. Youse guys get an advance copy. Also have posted an updated used equipment list with surveillance, countersurveillance and communications gear plus some other stuff: http://www.swssec.com/used.html and Minox cameras: http://www.swssec.com/minox.html We now return you to your regularly scheduled programming. Does the name Pavlov ring a bell? Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2739 From: Bob Washburne Date: Fri Mar 16, 2001 8:49am Subject: An Irish Toast An Irish toast to all the White Hats out there: "Here's to you, as good as you are, and to me, as bad as I am. "For as good as you are and as bad as I am "I'm as good as you are as bad as I am!" Happy St. Patty's Day. Bob Washburne - Ach! The wee folk ha' been recallibratin' me equipment! 2740 From: James M. Atkinson, Comm-Eng Date: Fri Mar 16, 2001 10:27am Subject: Hello, is this the FBI? "Hello, is this the FBI?" "Yes. What do you want?" "I'm calling to report about my neighbor Billy Bob Smith! He is hiding marijuana inside his firewood." "Thank you very much for the call, sir." The next day, the FBI agents descend on Billy Bob's house. They search the shed where the firewood is kept. Using axes, they bust open every piece of wood, but find no marijuana. They swore at Billy Bob and left.. The phone rings at Billy Bob's house. "Hey, Billy Bob! Did the FBI come?" "Yeah!" "Did they chop your firewood?" "Yep." "Merry Christmas Buddy" -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2741 From: James M. Atkinson, Comm-Eng Date: Fri Mar 16, 2001 10:29am Subject: The Army A friend was in front of me coming out of church one day, and as always the preacher was standing at the door shaking hands as the congregation departed. He grabbed my friend by the hand and pulled him aside. The preacher said to him, "You need to join the Army of the Lord!" My friend replied, "I'm already in the Army of the Lord, Preacher." The preacher questioned, "How come I don't see you except for Christmas and Easter?" He whispered back, "I'm in the secret service." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2742 From: Dawn Star Date: Fri Mar 16, 2001 10:59am Subject: Unknown Lamp Pole Device While doing a sweep in the inner city in Los Angeles yesterday, I saw the following: On a standard cast metal street lamp in a residential neighborhood was mounted a white electronics package, The device was held around the neck of the pole (underside) with metal bands. The box was 8" long x 4" deep x 4" wide. It was mounted by the lamp head and a black wire came out of the box to the lamp head for what appears to be power. The box is cream color with varieties of numbers printed on its case. A cell frequency antenna with two pigtails is hanging out of the bottom of the box. There appears to be no lens holes but could have a pin hole. This is a side street with no traffic. No other poles in the area had this unit. What do you know out there? Roger Tolces, Electronic Security, Los Angeles 2743 From: James M. Atkinson, Comm-Eng Date: Fri Mar 16, 2001 10:30am Subject: Now this is tact A burglar broke into the house of a Quaker in the middle of the night and started to rob it. The Quaker heard the noise and went downstairs with his shotgun. When he found the burglar he pointed his gun at him and said gently, "Friend, I mean thee no harm, but thou standest where I am about to shoot!" -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2744 From: James M. Atkinson, Comm-Eng Date: Fri Mar 16, 2001 10:32am Subject: On our 25th anniversary On our 25th anniversary, my husband took me out to dinner. Our teenage daughters said they'd have dessert waiting for us when we returned. After we got home, we saw that the dining room table was beautifully set with china, crystal and candles, and there was a note that read: "Your dessert is in the refrigerator. We are staying with friends, so go ahead and do something we wouldn't do!" My husband turned to me and said, "I suppose we could vacuum." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2745 From: James M. Atkinson, Comm-Eng Date: Fri Mar 16, 2001 10:35am Subject: Divorce A judge was interviewing a woman regarding her pending divorce, and asked, "What are the grounds for your divorce?" She replied, "About four acres and a nice little home in the middle of the property with a stream running by." "No," he said, "I mean what is the foundation of this case?" "It is made of concrete, brick and mortar," she responded. "I mean," he continued, "What are your relations like?" "I have an aunt and uncle living here in town, and so do my husband's parents." He said, "Do you have a real grudge?" "No," she replied, "We have a two-car carport and have never really needed one." "Please," he tried again, "is there any infidelity in your marriage?" "Yes, both my son and daughter have stereo sets. We don't necessarily like the music, but the answer to your questions is yes." "Ma'am, does your husband ever beat you up?" "Yes," she responded, "about twice a week he gets up earlier than I do." Finally, in frustration, the judge asked, "Lady, why do you want a divorce?" "Oh, I don't want a divorce," she replied. "I've never wanted a divorce. My husband does. He said he can't communicate with me." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2746 From: James M. Atkinson, Comm-Eng Date: Fri Mar 16, 2001 10:40am Subject: Office Memo Regarding Retirement Memo to all employees As a result of the reduction of money budgeted for department areas, we are forced to cut down on our number of personnel. Under this plan, older employees will be asked to go on early retirement, thus permitting the retention of the younger people who represent our future. Therefore, a program to phase out older personnel by the end of the current fiscal year, via retirement, will be placed into effect immediately. This program will be known as SLAP (Sever Late Aged Personnel). Employees who are SLAPPED will be given the opportunity to look for jobs outside the company. Provided they are SLAPPED, they can request a review of their employment records before actual retirement takes place. This phase of the operation is called SCREW (Survey of Capabilities of Retired Early Workers). All employees who have been SLAPPED or SCREWED may file an appeal with the upper management. This is called SHAFT (Study by Higher Authority Following Termination). Under the terms of the new policy, an employee may be SLAPPED once, SCREWED twice, but may be SHAFTED as many times as the company deems appropriate. If an employee follows the above procedures, he/she will be entitled to get HERPES (Half Earnings for Retired Personnel's Early Severance) or CLAP (Combined Lumpsum Assistance Payment) unless he/she already has AIDS (Additional Income From Dependents or Spouse). As HERPES or CLAP are considered benefit plans, any employee who has received HERPES or CLAP will no longer be SLAPPED or SCREWED by the company. Management wishes to assure the younger employees who remain on board will meet the company's high standards. The company will continue its policy to train employees through our Special High Intensity Training (SHIT). This company takes pride in the amount of SHIT our employees receive. We have given our employees more SHIT than any company in this area. If any employee feels they do not receive enough SHIT on the job, see your immediate supervisor. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2747 From: James M. Atkinson, Comm-Eng Date: Fri Mar 16, 2001 11:44am Subject: Re: Unknown Lamp Pole Device At 8:59 AM -0800 3/16/01, Dawn Star wrote: >While doing a sweep in the inner city in Los Angeles yesterday, I saw the >following: >On a standard cast metal street lamp in a residential neighborhood was >mounted a white electronics package, The device was held around the neck of >the pole (underside) with metal bands. The box was 8" long x 4" deep x 4" >wide. It was mounted by the lamp head and a black wire came out of the box >to the lamp head for what appears to be power. The box is cream color with >varieties of numbers printed on its case. A cell frequency antenna with two >pigtails is hanging out of the bottom of the box. There appears to be no >lens holes but could have a pin hole. This is a side street with no >traffic. No other poles in the area had this unit. >What do you know out there? >Roger Tolces, Electronic Security, Los Angeles Are you sure it's not a microcell? What where the markings on the case. What electromagnetic signals did it create Any links to the phone lines? Do you have pictures or at least some measurements? Suspect it is hostile until you can prove otherwise. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2748 From: Marcelrf Date: Fri Mar 16, 2001 11:17am Subject: Re: Unknown Lamp Pole Device It could be a few things; 1) Metricom 2.4 Gig /900mhz Transmitter/ Rpt 2) Meter reading Rpt- SCADA 3) Cellular Pico Cell These are my 1st guesses......but could be a few others any names or # on the box?? Dawn Star wrote: > While doing a sweep in the inner city in Los Angeles yesterday, I saw the > following: > On a standard cast metal street lamp in a residential neighborhood was > mounted a white electronics package, The device was held around the neck of > the pole (underside) with metal bands. The box was 8" long x 4" deep x 4" > wide. It was mounted by the lamp head and a black wire came out of the box > to the lamp head for what appears to be power. The box is cream color with > varieties of numbers printed on its case. A cell frequency antenna with two > pigtails is hanging out of the bottom of the box. There appears to be no > lens holes but could have a pin hole. This is a side street with no > traffic. No other poles in the area had this unit. > What do you know out there? > Roger Tolces, Electronic Security, Los Angeles > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 2749 From: Steve Whitehead Date: Fri Mar 16, 2001 3:03pm Subject: Phone-tap probe complete "Phone-tap probe complete Philip de Bruin A police dossier containing allegations of at least three criminal charges against Dr. Louis Luyt "or possibly other people", was on Friday morning handed to Advocate Andre de Vries SC, director of public prosecutions in the Witwatersrand. The dossier, consisting of two thick bundles, emanates from the police investigation into the Ellis Park/Luyt telephone bugging scandal last year. The charges which have to be considered at this early stage, said De Vries, are those of illegal tapping and transgression of the Telecommunications Act in connection with interfering with telephone cables as well as criminal defamation. "It is still too early to say which charges, if any, will eventually be formulated and who, if anyone, will be the accused. The dossier will now be studied before I make my final decision. That will probably take some time because it's a thick document," said De Vries. De Vries confirmed that apart from the three specific charges that were brought to his attention by the police, there "is also another charge or charges" against Luyt or other people that could arise from the investigation. According to Beeld's information, certain people refused to make statements to the police and there is a possibility that they could be summonsed according to Article 205 of the Criminal Procedure Act to compel them to make information at their disposal, available. De Vries would not comment on this because he had not yet studied the dossier. In a disclosure which shook South African rugby, Luyt confirmed in statements last year that he had had the telephone of Golden Lions Rugby Union (GLRU) head, Johan Prinsloo, tapped. Luyt alleged that Prinsloo and Laurie Mains, Cats coach, and former Springbok Hennie le Roux were busy with a "conspiracy" to undermine him and the Golden Lions Players' Trust (GLPT). Apart from the information he obtained through the tapping, Luyt said he also had a "source" from amongst the players (this later turned out to be former Golden Lion James Dalton). Court cases followed after Luyt's statements and tension in the GLRU camp increased. Prinsloo, Mains and Le Roux immediately reported Luyt's telephone tapping to the police, and it is this dossier that has been given to De Vries. Discontent in GLRU quarters at one stage reached breakpoint and spilled over into the GLPT. Those whom Luyt regarded as supporters of the Prinsloo camp found their positions as trustees under threat. Memanwhile the GLRU remained firm in its support for the Prinsloo group and there was open hostility between Luyt and the GLRU management. The upshot was that Luyt resigned as chairman of the GLPT and as chairman of the Ellis Park board. Luyt's son, Louis Jnr, eventually also resigned as director and CEO of Ellis Park" http://www.news24.co.za/News24/South_Africa/0,1113,2-7_997317,00.html Steve Whitehead Managing Member TSCM Services cc Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) URL http://www.tscm.co.za E-mail sceptre@m... P O Box 16063, Lyttelton, 0140, Centurion, South Africa [Non-text portions of this message have been removed] 2750 From: Talisker Date: Fri Mar 16, 2001 3:37pm Subject: Smoke Detectors Hi all I'm like a bus, no mails for months then 2 at once :o) Smoke detectors are without doubt the bane of my life, they always trigger the NLJD, in offices they are mostly supplied from the mains, therefore need no maintenance. They have cables to the central panel therefore can extract the signal without the need to radiate. They are also difficult to get into and fragile putting the TSCM operative at risk from a lawsuit should a future fire go undetected. So, any tips from the seasoned prfessionals, on how they get round this problem. Take Care Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List Security Tools Notification http://groups.yahoo.com/group/security-tools/join 2751 From: Talisker Date: Fri Mar 16, 2001 3:41pm Subject: Re: Unknown Lamp Pole Device Roger Was it purely a physical search that attracted you to the device or was it emanating, if so what were the characteristics? What were the various numbers printed on it's case? Take Care Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List Security Tools Notification http://groups.yahoo.com/group/security-tools/join ----- Original Message ----- From: "Dawn Star" To: Sent: Friday, March 16, 2001 4:59 PM Subject: [TSCM-L] Unknown Lamp Pole Device > While doing a sweep in the inner city in Los Angeles yesterday, I saw the > following: > On a standard cast metal street lamp in a residential neighborhood was > mounted a white electronics package, The device was held around the neck of > the pole (underside) with metal bands. The box was 8" long x 4" deep x 4" > wide. It was mounted by the lamp head and a black wire came out of the box > to the lamp head for what appears to be power. The box is cream color with > varieties of numbers printed on its case. A cell frequency antenna with two > pigtails is hanging out of the bottom of the box. There appears to be no > lens holes but could have a pin hole. This is a side street with no > traffic. No other poles in the area had this unit. > What do you know out there? > Roger Tolces, Electronic Security, Los Angeles > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 2752 From: Kevin D. Murray Date: Fri Mar 16, 2001 4:39pm Subject: Re: Unknown Lamp Pole Device Roger, It is a Ricochet. Details at: http://www.metricom.com/ Kevin -- Kevin D. Murray CPP, CFE, CCO, BCFE Murray Associates Counterespionage Consultants to Business & Government Eavesdropping Detection Specialists www.spybusters.com Dawn Star wrote: > While doing a sweep in the inner city in Los Angeles yesterday, I saw the > following: > On a standard cast metal street lamp in a residential neighborhood was > mounted a white electronics package, The device was held around the neck of > the pole (underside) with metal bands. The box was 8" long x 4" deep x 4" > wide. It was mounted by the lamp head and a black wire came out of the box > to the lamp head for what appears to be power. The box is cream color with > varieties of numbers printed on its case. A cell frequency antenna with two > pigtails is hanging out of the bottom of the box. There appears to be no > lens holes but could have a pin hole. This is a side street with no > traffic. No other poles in the area had this unit. > What do you know out there? > Roger Tolces, Electronic Security, Los Angeles > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 2753 From: Dawn Star Date: Fri Mar 16, 2001 4:55pm Subject: Unknown Lamp Pole Device hi roger, you probably saw a metricom ricochet spread-spectrum data transceiver, which operates in the unlicensed 902-928 mhz band. i use the service here in philly, which provides 128kbps encrypted wireless internet access to laptops via a low-power pcmcia card or via a small 1watt external transceiver that plugs into a computer's serial or usb port. typically, metricom hangs one off a utility pole every 4 blocks, and there are quite a few of them here in center-city philadelphia. metricom's network coverage map indicates they have an infrastructure in LA. http://www.metricom.com -ed cummings Yes, I did get microwave data emissions in the 800 to 900 Meg range, wide band -spread spectrum and in places that I had not seen frequency centers before. The measurement was made from inside a house in a nearby location.The antenna on the pole being forty feet off the ground is impossible to get near for proximity readings. I also will not stand out in the street with a spectrum analyzer at an unknown location. Gone to jail once doing that! I did not have my binoculars on hand to get the unit numbers, I may go back for a re-check. I checked the map at the Metricom site and they say they service the area in which this unknown unit was located. This may be the answer. I'll do more research. One more thought, if this unit uses the single antenna to communicate with subscribers (Internet service modems) how does it communicate with its server. Typical cell systems implement connection with the switch with a microwave link and dish. This thing isn't capable of communication with both the subscriber and the server on the same antenna could it? That would be a tall order while multiplexing multiple subscribers. The pole had no evidence of any other wiring. Thanks, for your quick responses. Best, Roger Tolces, Electronic Security Co., Los Angeles 2754 From: Justin T. Fanning Date: Fri Mar 16, 2001 4:49pm Subject: Re: Unknown Lamp Pole Device I think you will find its a Bell South 'Mobile Data' service, if you search the Bell pages long enough you should find a picture. I was recently in CA, USA (close to Silicon Valley) and saw what you describe on apx. every 50'th street pole, take a drive around the area, see if you can find more. If you want to read more about Radio Data, its effectively an RF gateway into the public X.25 Data infrastructure, see one of the many providers at: http://www.data-mobile.com/bmd02000.html Of course, now that everyone is use to seeing such boxes, the potential for mis-use in much the same as cable repeaters now exists. I wouldn't be overly complacent, or overly concerned, a quick call to Bell South should confirm one way or the other. Hope this helps, Justin T. Fanning Justin@f... --- Talisker wrote: > > Roger > Was it purely a physical search that attracted you to the device or was it > emanating, if so what were the characteristics? > > What were the various numbers printed on it's case? > > Take Care > Andy > > http://www.networkintrusion.co.uk > Talisker's Network Security Tools List > > Security Tools Notification > http://groups.yahoo.com/group/security-tools/join > ----- Original Message ----- > From: "Dawn Star" > To: > Sent: Friday, March 16, 2001 4:59 PM > Subject: [TSCM-L] Unknown Lamp Pole Device > > > While doing a sweep in the inner city in Los Angeles yesterday, I saw the > > following: > > On a standard cast metal street lamp in a residential neighborhood was > > mounted a white electronics package, The device was held around the neck > of > > the pole (underside) with metal bands. The box was 8" long x 4" deep x 4" > > wide. It was mounted by the lamp head and a black wire came out of the box > > to the lamp head for what appears to be power. The box is cream color with > > varieties of numbers printed on its case. A cell frequency antenna with > two > > pigtails is hanging out of the bottom of the box. There appears to be no > > lens holes but could have a pin hole. This is a side street with no > > traffic. No other poles in the area had this unit. > > What do you know out there? > > Roger Tolces, Electronic Security, Los Angeles > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 2755 From: James M. Atkinson, Comm-Eng Date: Sat Mar 17, 2001 9:42am Subject: The office bore who decided to be Bond SATURDAY MARCH 17 2001 The office bore who decided to be Bond BEN MACINTYRE America is gripped by the espionage case of a spy who invented himself Norman Mailer has agreed, for an undisclosed but presumably enormous sum, to write the screenplay for a film about Robert Hanssen, the FBI agent who was arrested on multiple espionage charges last month. Hanssen had been in jail less than three weeks when Mailer was signed up, but it is only appropriate that he should already be heading into celluloid. The tale was made-for-television. Indeed, to read the letters Hanssen allegedly wrote to his Soviet and Russian handlers over the years, he seems to have invented himself for the screen, as the lead actor in a rolling drama of his own creation. The letters are packed with the sort of slick, corny lines Hollywood craves _- "Something has aroused the sleeping tiger" and "Life is full of ups and downs" - written just before Hanssen was captured by his fellow FBI agents, and accused of turning over to Moscow a vast array of secrets ("Nearly the whole goddam store," in the words of one FBI executive) that allegedly sent two Soviet double-agents to their deaths. Hanssen, to judge from the vast volume of evidence compiled against him, is a creation of art, fitting snugly into the long tradition of the criminal mastermind who lives an elaborate double-life. By day he was the dutiful and dull office agent, the churchgoing father of six, whose worst known sin was to allow his dog Sunday to run off its leash. But by night, say his accusers, he was "Ramon Garcia" or "B", the master-spy, the ruthless practitioner of dead-drop and double-cross, who stayed one step ahead of his pursuers for 15 years. Prosecutors have depicted Hanssen as the Professor Moriarty of spies. In Conan Doyle's words: "A genius, a philosopher, an abstract thinker. He has a brain of the first order . . . the organiser of half that is evil and of nearly all that is undetected." The Hanssen character is the direct heir to Doctor Jekyll, Keyser Sˆze from The Usual Suspects and Edgar Allen Poe's Man of the Crowd: the hidden evil-doer, the shadowy double-man, the innocuous suburban dad who turns out to be the ¸ber-traitor. This is material tailor-made for Mailer. The FBI's efforts to turn Hanssen into a bogeyman reflect the fact that he does not quite fit accepted patterns of spying, and his alleged actions may say more about the arrogant, elitist and self-embellishing world of international espionage than his fellow spies and counterspies would like to hear. Hanssen was no ideologue. In one letter, the writer claims to have been inspired to treachery by Kim Philby, but there is no hint Hanssen spied out of principle like the British double-agent. He was disdainful of "godless communism", and there is nothing in the evidence to suggest that he believed he was following a higher cause. He was not, apparently, driven by avarice. He lived frugally, and in debt; he never demanded more than he was given, and sometimes he asked for less. The affidavit alleges he was paid some $1.4 million in cash and diamonds, but he never spent it. There were no flashy cars, no expensive women, no honey traps or blackmail. He did not even need the companionship of fellow conspirators; indeed, the FBI thinks he he never met them. Instead, Hanssen may have been motivated by something much more complex: a peevish sense of under-appreciation that spilt into self-invention. The grandiosity, narcissism and arrogance of the letters are striking. To his colleagues, Hanssen was "The Mortician" or "Dr Death", a pudgy, humourless bore in a bad suit who had been promoted just as high as he deserved, and possibly a little higher. But the Hanssen of the letters is a daredevil, an intellectual colossus surrounded by pygmies. The writer is constantly looking at himself from outside, as if through a lens: "I am either insanely brave, or quite insane. I'd answer neither. I'd say insanely loyal." A recent study of some 150 treason cases in the US by researchers at Brigham Young University found an evolving espionage pattern: the ideologue-spy giving way to the mercenary-spy and, in more recent times, the traitor impelled by ego and disgruntlement. Hanssen seems to emerge from the latter category, but he may also represent a new species of double-agent, motivated by a powerful self-image familiar in film and literature, as the brilliant, lone anti-hero, operating unseen in the heart of the Establishment. Most intelligence work is remarkably boring - checking car numberplates and wading through the expense accounts of foreign diplomats - but Hanssen appears to have created for himself a more exciting world, part fantasy, part reality. He kept photographs of Catherine Zeta-Jones, after seeing the Welsh actress in the thriller Entrapment, along with a bottle of Stolychnya vodka and a pair of Walther PPK pistols, the guns favoured by James Bond. There is more than a touch of Walter Mitty in the letters: "I have come as close as I ever want to come to sacrificing myself . . . it's been a long time, dear friends, a long and lonely time . . . I know far better than most what minefields are laid, and the risks." Agent "B" was showing off, partly to his handlers, but mostly to himself. Perhaps that explains why he escaped detection for so long. The mercenary leaves a money trail; the true believer eventually betrays his feelings; but the clever fantasist following the path of psychological self-gratification leaves no spoor. Norman Mailer now has the intriguing task of writing a screenplay about a character who secretly penned his own script, in invisible ink, and never told another soul. comment@t... -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2756 From: James M. Atkinson, Comm-Eng Date: Sat Mar 17, 2001 11:59am Subject: Tunnel under Russian embassy intrigues Washington neighbours Tunnel under Russian embassy intrigues Washington neighbours http://www.thestar.com/apps/AppLogic+FTContentServer?pagename=thestar/Layout/Article_Type1&c=Article&cid=984717158315&call_page=TS_World&call_pageid=968332188854&call_pagepath=News/World Cold War nostalgia grips exclusive enclave William Walker WASHINGTON BUREAU With this report William Walker assumes his duties as The Star's Washington Bureau chief. http://www.thestar.com/images/walker_010317.jpeg WASHINGTON - For Robert Hyman and his neighbours, the obsession began last week when they heard the ultra-secretive National Security Agency (NSA) and FBI had built a tunnel through their community below the adjacent Russian Embassy. Officials now admit that 15 years ago, the FBI bought a house in Hyman's Glover Park neighbourhood, an exclusive enclave of 10,000 residents on the northern edge of Georgetown. With help from the CIA's directorate of science and technology, U.S. agents secretly dug through the house's basement, tunnelled beneath the Russian embassy and hid the removal of massive amounts of dirt before installing sophisticated listening devices. Meanwhile, former FBI agent Robert Hanssen was charged with espionage last month after allegedly trying to pick up $50,000 (U.S.) from a ``dead drop'' in a nearby Virginia park, where he had signalled the Russians that he'd planted secret government documents in return for payment. Hanssen's sordid career as an alleged ``mole,'' which is the subject of three current investigations - two American and one Russian - touching the offices of U.S. President George W. Bush and Russian President Vladimir Putin, leads all the way back to the cozy confines of Glover Park. It's a story that would move spy novelist John Le Carr to envy. For Hyman and his fellow residents, it's a splash of Cold War nostalgia too delicious to stop debating. They call it Tunnel Talk. It includes safe houses, tapped telephone lines, FBI stakeout vehicles, telephoto lenses, surveillance, counter-surveillance, intelligence gathering and counter-intelligence misinformation. With the secret tunnel dug, the FBI allegedly inserted microphones in the embassy's toilets through basement plumbing. Officials say laser technology transmitted data so FBI agents could decipher movements of Russians based on their steps on the floor and sounds from the embassy building's support beams. For the U.S. government, details about the tunnel remain classified. No matter. Hyman and fellow Glover Park inhabitants just want to know one thing: where is the damn tunnel and which house was it built under? The spy tale has captured not just Glover Park, but most of Washington. The Washington Post and Washington Times newspapers are at war over the story, all five local TV stations have covered it and newspapers from Europe, including Britain's The Independent, are hot on the trail. Hyman, president of the Glover Park Citizens Association, regularly patrols the neighbourhood for illegal dumping in its picturesque wooded ravine, parking infractions, potholes in need of filling and the like. Now he has a much sexier pursuit: espionage and intrigue of the highest order. Hyman, whose wife Deb is a lobbyist on Capital Hill, is renovating the massive three-storey house the couple bought two years ago and also overseeing rental properties they own in the area. But much of his day is spent on neighbourhood rounds as association president. Spend a day with Hyman and it becomes clear how Tunnel Talk has captured everyone's imagination. It's the buzz of the dog walking park, of neighbourhood meetings, of the local watering hole and coffee shops which dot nearby Wisconsin Ave. ``People love talking about it, boy, do they love talking about it,'' Hyman says as he drives through the area, pointing out possible tunnel locations. He also points out three FBI agents on stakeout in an unmarked car. ``Don't stare at them,'' he warns. ``It's gotten to the point where I get people calling me and leaving bogus messages like `Boris this is Ivan, I'm leaving the money in the usual spot. This is not a secure line.' Then click. It's hilarious.'' Spook stories are nothing new in Glover Park. Back in 1994, Aldrich Ames, now serving time in a Pennsylvania prison, was convicted of spying after he'd marked a Glover Park mailbox as a ``dead drop'' for the Russians. Ames was a CIA employee paid by the former Soviet Union and his espionage cost the lives of several of America's top Russian sources. Now U.S. and Russian officials are taking the Hanssen case very seriously. Washington has prepared a 109-page affidavit alleging he spied on the United States for 15 years. The Russians are questioning their staff in New York and Washington to determine who leaked Hanssen's detailed espionage case file to American authorities. The file allegedly confirms Hanssen tipped off the Russians to the existence of the Glover Park tunnel. While both the FBI and the Russian embassy now refuse comment on the whole mess, there have been reports that the Russians, knowing of the tunnel's existence, fed useless information (or counter-intelligence) to the Americans through their listening devices. Serious stuff for officials, but for Glover Park residents it's more of a lark. They're accustomed to the sight of plainclothes FBI agents sitting in parked cars on their streets. They've seen the telephoto lenses peering out from third floor windows of those two strange (``safe'') houses across from the embassy, where the shades are always drawn, no mail is delivered or garbage picked up and nobody seems to come or go. ``The FBI, when they dig a tunnel under the Russian embassy, are just doing their job,'' said resident Peter Spalding, a retired U.S. State Department employee whose house backs on to the embassy grounds. ``For us, it's more like a humorous situation. Nobody knows which house the tunnel comes from, so there's a lot of speculation. But we're probably never going to find out.'' Michael Oberschneider thought he'd figured it out. For five years the graduate student and his wife have lived in a house on a dead-end street, their back door just two metres from the embassy's barbed wire fence. In his basement, Oberschneider discovered two small doors covered with old maps taped to the wall. Inside, he shines his flashlight to show two large secret rooms dug out of the ground, covered below with loose debris and rubble. ``It's just ironic to me that these two holes are hidden here and they face the embassy,'' he said as he conducted a tour. ``But maybe it's just a crawl space. Maybe the FBI is happy to have me suggesting this is the tunnel's location because they know this isn't it.'' At one point, the FBI was so proud of its tunnel that it offered tours to senior U.S. government officials with proper security clearance, the Washington Post reported. Hyman's tour has brought him to the neighbourhood dog walking park by day's end. Here the residents gather around a picnic table on a warm Washington afternoon, kids in strollers and canines chasing after one another, to talk tunnel. ``I'd love to know where it is and frankly, if I found out I'd tell everyone,'' said Susan Phillips, who is here with her dog, Watson. ``Once it's out, what can they do? ``It might make a tourist attraction,'' she said, unaware a Washington entrepreneur already offers visitors a ``spy tour,'' soon to feature Glover Park, no doubt. ``It might make a little history lesson on the Cold War for our kids.'' John Getchell, a second-generation Glover Park resident, says most neighbours are taking the tunnel in stride, ``as we do all things in this capital.'' He jokes about getting a group to pose as a road crew and become the first to dig down to it. ``I was not even vaguely surprised. People who live in houses bordering the embassy see strange things happening all the time. Some people feel that having the FBI and CIA around makes things safer. But I figure even if they saw a mugging or a robbery, they'd probably just sit there and watch. It's what they do.'' Getchell said neighbourhood animosity between Americans and Russian embassy staff has largely evaporated the decade since the fall of the old Soviet Union. Russian children now go to a neighbourhood school with Phillips' kids and the embassy lets Hyman use its facilities for fundraising events. Aside from the odd story about prodigious drinking, the Russians are now widely considered good neighbours. ``It's refreshing now that they are part of the community,'' Getchell said. ``But with this tunnel issue and the spy (Hanssen) they caught, it's like the Cold War has come full circle.'' Hyman's last stop of the day is his local watering hole. All that sleuthing has left him thirsty. But here too, Tunnel Talk is an even greater obsession than the NCAA college basketball tournament on TV. ``You smoked out that tunnel yet, Rob?'' asks Pete, the bartender. Hyman shrugs. ``My money's on you man, you'll find it.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2757 From: Ryan Huggins Date: Sat Mar 17, 2001 11:33am Subject: RE: Unknown Lamp Pole Device Hello, I have been reading this conversation, and I have one question. I have seen these boxes as well, and sometimes they do have what appear to be two circular "lenses" on the front of them (pointing towards traffic). My main concern is that I live in Westlake Village (Ventura County, CA) and about a block away is LA county. At least in our section of LA county those boxes are on every intersection (on all 4 lights), and on the 101 between Newbury Park and Oxnard (most of the time on brand new lighting structures). I can understand the Ricochet receiver concept, but we have far to many of them for that to sit well with me. Could these be some kind of LAPD/CHP observational cameras? Call me crazy, but I can see some form of computer program being used to check license plates to scan for fleeing suspects, or something of that nature. Thank you, Ryan Huggins > ________________________________________________________________________ > ________________________________________________________________________ > > Message: 4 > Date: Fri, 16 Mar 2001 08:59:25 -0800 > From: Dawn Star > Subject: Unknown Lamp Pole Device > > While doing a sweep in the inner city in Los Angeles yesterday, I saw the > following: > On a standard cast metal street lamp in a residential neighborhood was > mounted a white electronics package, The device was held around > the neck of > the pole (underside) with metal bands. The box was 8" long x 4" deep x 4" > wide. It was mounted by the lamp head and a black wire came out > of the box > to the lamp head for what appears to be power. The box is cream > color with > varieties of numbers printed on its case. A cell frequency > antenna with two > pigtails is hanging out of the bottom of the box. There appears to be no > lens holes but could have a pin hole. This is a side street with no > traffic. No other poles in the area had this unit. > What do you know out there? > Roger Tolces, Electronic Security, Los Angeles > > 2758 From: James M. Atkinson, Comm-Eng Date: Sun Mar 18, 2001 11:02am Subject: Re: ATV Video Signals - 3 questions At 8:44 PM +0200 3/16/01, A Grudko wrote: >----- Original Message ----- >> Here are some more ATV video signals that may be used for covert video. >Mostly AM video, but could be FM. > >Thanks James. > >I presume ATV = Amature TV, which I equate to Slow-Scan, low resolution or >Very Slow-Scan, higher resolution due to the narrow bandwith available to >Hams. Last year I found a Kenwood manufactured colour digital camera (CCD >head in a fake PIR; modulator, Kenwood VHF transceiver and PSU in the >ceiling above) operating just below the 2 Mtr band. It was commercialy >available kit set up on permanant TX. Really easy to find as the signal was >2 watts of FM and sounded almost like RTTY (any one remember that mode?). It >seemed to send one frame every 30 seconds or so. A two watt transmitter would be tough to miss, and it is amazing that any eavesdropper would be so foolish to use something that hot. >Anyway, here are my questions. > >If I punch those freqencies and modes into my Fair Mate for background >checking and it locks on, what would an ATV signal sound like ('What My Ear >Heard' - WMEH - principal) - AM or FM on the right or wrong receive mode? You would listen for the 50 or 60 Hz "growl" caused by the sync pulses primarily in a wide band AM mode with the IF bandwidth as wide as possible. >Would the WMEH change in response to radical light changes (as in 'lights >on, lights off' grasshopper). I prefer to use a photographers strobe light, or really small "disco strobe" (watch it with the jokes folks) and watch for the signal on the scope rising in time with the strobe. >Commercial broadband signals picked up as audio on FM on CS receivers are >referred to here as 'raster' - is the same term used in the US? Yes, we refer to it as a "Rasterized Signal", in fact "Raster Analysis" is the evaluation of any signal which has timing, repetitive, or sub carrier nature. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2759 From: Nacht Gotterdammerung Date: Sun Mar 18, 2001 3:21am Subject: Re: Digest Number 541 Sounds like my criteria for choosing a girlfriend: J.M.A. said; "Are you sure it's not a microcell? What where the markings on the case. What electromagnetic signals did it create Any links to the phone lines? Do you have pictures or at least some measurements? Suspect it is hostile until you can prove otherwise." Erik. == Those that travel long distances in isolation will defend themselves with strange arts. Shin shin, shin gan. The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. _____________________________________________________________ Yourname@i...
When you want them to remember!
http://burn.inhell.com 2760 From: Steve Whitehead Date: Sun Mar 18, 2001 9:07am Subject: Hidden Camera in Bathroom "Barmaid's Peeping Tom nightmare JEREMY LAWRENCE THE mother of a 20-year-old barmaid who was allegedly spied on by her housemate as she bathed said this week that her daughter's life had been wrecked since she found a camera in the ceiling. Fanie Terblanche, 28, appeared in the Strand Magistrate's Court on Friday after police alleged they had discovered recorded images of his 20-year-old housemate, Chantal Wilson, on video tapes. daughter "a nervous wreck", Gerda Wilson said this week. Terblanche is facing a charge of crimen injuria and is out on bail of R10 000 after police found a camera in the ceiling above the bath in the two-bedroomed flat in Gordon's Bay. Police allegedly confiscated five video recordings and are also investigating the possibility that the recordings had appeared on the Internet. "Chantal met [Terblanche] at the bar where she worked in Gordon's Bay last year," said Gerda Wilson, the barmaid's mother. "He said he was looking for someone to share the rent and she wanted to move out of her father's house. "At first I was against this, but she said she was only renting a room and there was nothing going on between them. They moved into a flat in July last year. A few months later they moved to another one. "When she first found out about it (the recordings) she was so emotional, she couldn't stop crying," Gerda Wilson said. She said a friend who was visiting her daughter had noticed a little hole in the ceiling above the bath. "When we looked closer we discovered that there was a video camera in the ceiling and it was linked to a computer in the other room," she said. They then reported the matter to the police. Gerda Wilson said her daughter was a nervous wreck after the incident. "She has problems sleeping and has had to go for counselling. She's scared. When she works there are policemen she knows who say things like, 'here comes the naked girl'. When she gets dropped off at home she has a special signal to show her boss that she is safe." Chantal Wilson, who has signed a deal to tell her story to a magazine, declined to speak to the Sunday Times. Terblanche, who has made three court appearances, is expected to plead at his next appearance, on April 25" Read story at http://www.suntimes.co.za/2001/03/18/news/news15.htm Steve Whitehead Managing Member TSCM Services cc Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) URL http://www.tscm.co.za E-mail sceptre@m... P O Box 16063, Lyttelton, 0140, Centurion, South Africa [Non-text portions of this message have been removed] 2761 From: Dawn Star Date: Mon Mar 19, 2001 0:58pm Subject: "Wedding Bells" Any one have information on this subject? TOWER, 1990, CIA, NSA: Electronic cross country subliminal programming and suggestion Targeting: Mass population, short-range intervals, long-range cumulative Frequencies: Microwave, EHF SHF Methodology: Cellular telephone system, ELF modulation Purpose: Programming through neural resonance and encoded information Effect: Neural degeneration, DNA resonance modification, psychic suppression Pseudonym: "Wedding Bells" Roger Tolces, Electronic Security, Los Angeles From: savanted1 Date: Tue Mar 16, 2004 0:55pm Subject: U.S.A.: DARPA's New Spy Blimp Larry Correy, DARPA program manager, says that DARPA's planned technological blimp will provide a "dynamic, detailed, real-time picture of all movement on or above the battlefield." The blimp, which is to be three times the size of the Goodyear blimp, is known as the Integrated Sensor is Structure (ISIS) airship and will use a flexible radar antenna to gather information. http://www.newsmax.com/archives/articles/2004/3/12/222951.shtml 8357 From: savanted1 Date: Tue Mar 16, 2004 1:06pm Subject: U.S.A.: Gov't Agencies Want Wiretapping Ensured The U.S. Justice Department, the Federal Bureau of Investigations and the Drug Enforcement Administration stated in legal papers filed with the Federal Communications Commission, "The ability of federal, state, and local law enforcement to carry out critical electronic surveillance is being compromised today." The agencies have proposed that technology companies be required to ensure that law enforcement agencies can install wiretaps on Internet traffic and on future digital communications. Critics maintain that the government's proposal would put limits on the introduction of new technology until it can be made wire-tap friendly. http://seattlepi.nwsource.com/national/apwashingto n_story.asp?category=1152&slug=Internet%20Wiretaps 8358 From: Academic Investigations Date: Tue Mar 16, 2004 1:12pm Subject: GSM-listening Does anyone have practical experience about îIMSI-catchersî? The price? Iím interested with detection etc?. Yours truly, Mr. Jouni Heikkinen Helsinki [Non-text portions of this message have been removed] 8359 From: Mitch D Date: Wed Mar 17, 2004 1:49am Subject: AOR sdu 5600 spectrum display Unit New AOR Product for AOR Fans Some nice receivers on the site as well the AOR 3000 has been improved It is a widely used receiver by scanner buffs,and has been used in oem applications....... http://www.aorusa.com/sdu5600.html __________________________________ Do you Yahoo!? Yahoo! Mail - More reliable, more storage, less spam http://mail.yahoo.com 8360 From: Ocean Group Date: Wed Mar 17, 2004 1:41pm Subject: Best Wishes... Just wishing everyone a Happy St. Patrick's Day from the most strategically important country in the world! ;) Can anyone verify that they do actually die the river green in New York? I wonder what they use.....? 8361 From: gkeenan Date: Wed Mar 17, 2004 1:55pm Subject: Re: Best Wishes... Not in New York, but they do in Chicago. Just saw a picture of it a little earlier. Jerry K. GPKeenan Co. 1005 Celia St. West Islip, NY 11795-2503 (631) 587-4020 (ph) (631) 587-4020 (fax1) (530) 323-6832 (Fax2) (516) 587-4020 (cell) secureops@o... gkeenan@s... ----- Original Message ----- From: Ocean Group To: TSCM Yahoogroup Sent: Wednesday, March 17, 2004 2:41 PM Subject: [TSCM-L] Best Wishes... Just wishing everyone a Happy St. Patrick's Day from the most strategically important country in the world! ;) Can anyone verify that they do actually die the river green in New York? I wonder what they use.....? ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS [Non-text portions of this message have been removed] 8362 From: James M. Atkinson Date: Wed Mar 17, 2004 7:30pm Subject: Legendary http://www.washingtonpost.com/wp-dyn/articles/A61560-2004Mar15.html Jessica Simpson, whose verbal gaffes are legendary, pulled another one Sunday visiting the White House, our sources say. The singer was introduced to Interior Secretary Gale Norton and gushed: "You've done a nice job decorating the White House." ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8363 From: James Coote Date: Sat Mar 20, 2004 4:07pm Subject: Optoelectronics DC440 F/S I have an Optoelectronics DC-440 decoder for sale. It decodes DTMF and PL tones. It may be useful for demonstrating communications system velnerabilities to clients when connected to a receiver, line or playback device. 9VDC, 2.1mm, center + power adaptor and manual not included. Working, in good cosmetic condition. $250 plus UPS shipping. Sorry, USA-only sale and advanced payment via US Postal Service Money Order Thanks, Jay 8364 From: Date: Fri Mar 19, 2004 8:44am Subject: Re: U.S.A.: Gov't Agencies Want Wiretapping Ensured The critics are correct, of course, in that new technology WILL be held up until made wiretap friendly. In the area of telecommunications, CALEA already requires that. What is not clear is whether data communications (packets) is covered by CALEA and thus must also have a "wiretap solution" before rolling out. Certain recent rulings have made it seem that data communications from one computer to another computer (Pulver, Skype, MSN Instant Messenger) is not a telecommunications service but if it hits the PSTN it becomes telecommunications and subject to CALEA. Sgt. Kirk Sewell Illinois State Police, Technical Investigations 500 Iles Park Place, Suite 300 Springfield, IL 62718 (217) 524-6079 office (217) 467-4211 pager (217) 836-0919 mobile 8365 From: Pizza Waves Date: Fri Mar 19, 2004 6:52pm Subject: Bugs RF Hello all, For your data bases on the micro European transmitters : MICRO AND SECURITY ELECTRONIC GROUP OF COMPANYS Efftingestr.19-2000 hamburg 70 ñ phone : 040/6560032-34 (Germany) : LF/VHF/UHF : 100-150 Mhz (1 mW ñ 2 mW ñ 3 mW) WFM 80-150 Khz (60 mW) PWM 120-170 Mhz (5 mW) NFM crystal controlled 380-440 Mhz (5 mW) NFM crystal controlled 1150-1300 Ghz (3 mW) NFM crystal controlled 135-170 Mhz (300 mW) NFM crystal controlled COFREXPORT 93. rue Jouffroy díAbbans 75017 Paris (France) Phone : 33/ 01.43.80.25.46 Email : mail@c... UHF : Computer keyboard bugging : 313 Mhz NFM SECURITY OF INFORMATION CORP. Kahovka Street 33 corp. 2 Moscow 113461 (Russia) Phone : +7 (095) 124 3327 Satellite phone : +7 502 224 8129 VHF/UHF : 130-140 Mhz NFM 300-430 Mhz NFM crystal controlled 465-475 Mhz NFM (5 mW) 90-115 Mhz NFM 390 Mhz NFM crystal controlled (kit bug/receiver) 417 Mhz NFM (3 mW) crystal controlled 410-440 Mhz NFM ìSheaffer penî 480 Mhz NFM crystal controlled ìtieî 415-435 Mhz NFM (5 mW - 100 mW) crystal controlled PROTEXARMS 26. rue de Chateaudun 75009 Paris (France) Phone : 01.45.26.08.34 VHF/UHF : 130-200 Mhz (5 mW- 10 mW- 20 mW- 100 mW- 500 mW) NFM 150-174 Mhz (10 mW ñ 100 mW) NFM crystal controlled 150-250 Mhz (10 mW- 100 mW) NFM crystal controlled 137-140 Mhz (1 mW ñ 50 mW) NFM 135-180 Mhz (60 mW ñ 100 mW) NFM crystal controlled CRELEC ELECTRONIQUE 6. rue des Jeuneurs 75002 Paris (France) Phone : 01.45.08.87.77 VHF/UHF : 90-135 Mhz NFM 104-120 Mhz NFM 140-165 Mhz NFM crystal controlled 140-144 Mhz NFM crystal controlled 1200 Ghz NFM crystal controlled ìVidÈoî 1400 Ghz NFM crystal controlled ìVidÈoî 2400 Ghz NFM (50 mW ñ 300 mW) crystal controlled ìVidÈoî *********************************************************** Plousey Vincent Consultant indÈpendant CME (contre mesures Èlectroniques) tel.GSM : 06.13.47.56.15 tel. : 33/ 01.46.68.49.47 email : vincent@a... Radio dÈtection (dÈbugging), sÈcuritÈ PABX (alcatel/matra), sÈcuritÈ rÈseaux radios HF/VHF/UHF, sÈcuritÈ rÈseaux WiFi (802.11b/g). *********************************************************** 8366 From: Pizza Waves Date: Sat Mar 20, 2004 5:12pm Subject: Bugs RF MICRO AND SECURITY ELECTRONIC GROUP OF COMPANYS Efftingestr.19-2000 hamburg 70 ñ phone : 040/6560032-34 (Germany) : LF/VHF/UHF : 100-150 Mhz (1 mW ñ 2 mW ñ 3 mW) WFM 80-150 Khz (60 mW) PWM 120-170 Mhz (5 mW) NFM crystal controlled 380-440 Mhz (5 mW) NFM crystal controlled 1150-1300 Ghz (3 mW) NFM crystal controlled 135-170 Mhz (300 mW) NFM crystal controlled COFREXPORT 93. rue Jouffroy díAbbans 75017 Paris (France) Phone : 33/ 01.43.80.25.46 Email : mail@c... UHF : Computer keyboard bugging : 313 Mhz NFM SECURITY OF INFORMATION CORP. Kahovka Street 33 corp. 2 Moscow 113461 (Russia) Phone : +7 (095) 124 3327 Satellite phone : +7 502 224 8129 VHF/UHF : 130-140 Mhz NFM 300-430 Mhz NFM crystal controlled 465-475 Mhz NFM (5 mW) 90-115 Mhz NFM 390 Mhz NFM crystal controlled (kit bug/receiver) 417 Mhz NFM (3 mW) crystal controlled 410-440 Mhz NFM ìSheaffer penî 480 Mhz NFM crystal controlled ìtieî 415-435 Mhz NFM (5 mW - 100 mW) crystal controlled PROTEXARMS 26. rue de Chateaudun 75009 Paris (France) Phone : 01.45.26.08.34 VHF/UHF : 130-200 Mhz (5 mW- 10 mW- 20 mW- 100 mW- 500 mW) NFM 150-174 Mhz (10 mW ñ 100 mW) NFM crystal controlled 150-250 Mhz (10 mW- 100 mW) NFM crystal controlled 137-140 Mhz (1 mW ñ 50 mW) NFM 135-180 Mhz (60 mW ñ 100 mW) NFM crystal controlled CRELEC ELECTRONIQUE 6. rue des Jeuneurs 75002 Paris (France) Phone : 01.45.08.87.77 VHF/UHF : 90-135 Mhz NFM 104-120 Mhz NFM 140-165 Mhz NFM crystal controlled 140-144 Mhz NFM crystal controlled 1200 Ghz NFM crystal controlled ìVidÈoî 1400 Ghz NFM crystal controlled ìVidÈoî 2400 Ghz NFM (50 mW ñ 300 mW) crystal controlled ìVidÈoî 8367 From: Steve Uhrig Date: Sun Mar 21, 2004 7:30pm Subject: TDRs for sale The following Riser-Bond TDRS are for sale: Model 1270New $3500my price $1900 Model 1205-OSPNew $3195my price $2100 Model 3300New $1995my price $1400 All are used, in perfect operating condition and very good physical condition. Each has new battery, fresh calibration, all accessories including test leads, battery charger, instruction manual, laminated wallet cheat sheet, computer interface cable, and canvas accessory carrying pouch. Also available are a new hard carrying/transport case for any model, and one new empty yellow box pre-machined for any of the yellow box TDRs. This new box also includes the clear plastic carrier for the instruction manual inside the lid. Clean up your beat up TDR by dropping it into a new box, which takes 5 minutes. I stock the new boxes and can supply new batteries for your TDR if necessary. 220VAC chargers can be substituted for 110VAC chargers at no cost if so requested at time of order. All are guaranteed to be in perfect working condition. The supply of used TDRs in decent shape is dwindling, and the ones I have examined recently have had more wear than I will accept, or have had operational problems I didn't want to tackle. The ones I refuse generally end up on ebay. More info can be found here: http://www.swssec.com/part_one.html These TDRs are extremely rugged and all have internal digital storage of waveforms which later can be dumped to a printer or into a computer via an RS232 port. The simple software for doing this is called Wave View, and the latest version is available as a free download from www.riserbond.com. Using Waveview, you can take readings on a job, store them then dump them into a laptop and into a report, or print and save against future use for baseline inspection. All TDRs will read twisted pair as well as coax or any metallic conductor pair. The 1205T and 3300 are designed for specifically for twisted pair but read perfectly well on coax. Ask me if you have any question on which model would be best for your application. All have selectable pulse widths, sensitivity, and have magnification, one button setup and many other features. These things are easy to use, very rugged, and powerful. With some practice, you will own any metallic pair or coax you inspect. Nothing can hide from these when used in proper hands. You quickly will become confident in your abilities, and this confidence will be obvious to potential clients. All are subject to prior sale. I can take credit cards or checks for payment and ship to any non- embargoed country. I've probably sold 50 similar TDRs to members of this list. Feel free to ask for references, or check the References section of my website for that sort of thing. You also can check ebay under my email address and find a perfect record of 655 positives and zero negatives or neutrals. If you are serious in TSCM, you need a TDR, and Riser Bond is the best choice. No delicate, expensive CRTs like in Tektronix models as all Riser Bond machines have rugged backlit large LCD readouts like a solid state oscilloscope. All have automatic filtering, also, which will notch out 50/60 cycle mains interference as well as stepping through different filter modes to give the best image on the screen automatically or manually. All also can be used on powered lines up to 400 volts without problems. The things practically work themselves, but all parameters can be controlled manually also. When closed, the cases (except 3300 which is not a yellow box) are waterproof and can kick around in your van without needing any extra packing cases to protect them. Holler if questions. If you can use a TDR and are ready to stand on your hind legs and sweep like a man, you need one of these. Without a TDR, you're only playing games. There are excellent tutorials on using TDRs on both Riser Bond's website www.riserbond.com and www.tscm.com. While I don't make any claim about being a Riser Bond service center, I note Riser Bond themselves refer people to me who call them to have a machine serviced. Short of physical damage, I've seen very few problems with them. Email if interested. Save this message against future need. Other used and new TSCM, surveillance, communications, test equipment and related electronic toys can be found on our website: http://www.swssec.com/equipment_for_sale.html I buy excess or otherwise unneeded electronic equipment also. Please consider me first when you have something to sell. Regards .... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8368 From: Date: Mon Mar 22, 2004 4:23pm Subject: Jacko targets jet-bugging 'conspirators' Jacko targets jet-bugging 'conspirators' March 23, 2004 - 10:18AM Besieged pop singer Michael Jackson today took aim at four more people who he says conspired to hide cameras in the private jet that carried him to his arrest last year on child abuse charges. Jackson's lawyers added the names of four more defendants to a lawsuit that alleged that jet charter company XtraJet secretly videotaped a meeting between the singer and his lawyer on a flight to Santa Barbara in November. The new defendants include travel agent Cynthia Montgomery, who booked the flight and recently sued Jackson for allegedly failing to reimburse her for the trip from the gambling hub of Las Vegas to California. Other new defendants include Montgomery's travel agency, an XtraJet executive and Pavair, another aviation firm. But Los Angeles' based Strategies attorney Lloyd Kirschbaum however insisted that none of the defendants were responsible for taping Jackson. He said he expected the responsible party to come forward soon. Jackson's attorneys claimed that XtraJet had offered copies of the tape of a meeting between the "King of Pop" and attorney Mark Geragos to media outlets for up to $US1.5 million ($2.0 million). A court order obtained by Jackson's attorneys in December prevents XtraJet from attempting to sell the tape. Jackson sued XtraJet in November over the videotaping. But Kirschbaum said the company turned over the tape to the Federal Bureau of Investigation. XtraJet officials said they found the videotape aboard the jet that shuttled Jackson to and from Las Vegas for his November 21 arrest. AFP This story was found at: http://www.smh.com.au/articles/2004/03/23/1079939617055.html [Non-text portions of this message have been removed] 8369 From: Date: Tue Mar 23, 2004 3:51pm Subject: ECMSA -1300 Electronic Countermeasure Signal Analyzer Several months old but noteworthy. HEADLINE: Security Intelligence Technologies, Inc. Signs New Licensee with 3-Year Agreement Valued at 1.5 Million DATELINE: NEW YORK, Nov. 17, 2003 BODY: Security Intelligence Technologies, Inc., (OTCBB:SITG) today announced it has signed a three-year distribution agreement with a prominent private European government consulting company who are now licensed to sell its counterterrorism, surveillance, counter- surveillance and security products exclusively in Serbia. Per the three-year distribution agreement, the distributor paid an up front fee of $150,000 and is obligated to make minimum annual purchases of $500,000 per year, totaling $1,500,000. In return for the upfront fee, the distributor receives a 10% discount on their first $1,500,000 worth of purchase orders. This is twelfth distributor agreement signed by SITG in the past year. "Our licensee program assists in the further development of the emerging European market and continually expands our product line internationally," stated Ben Jamil, Chief Executive Officer of SITG. "Through our distributors we are able to reach a global market for our proprietary security products and services. The distributor's first order includes such proprietary products as the VIP-16 Bomb Jammer, a portable radio frequency detection and jamming system used in counter terrorism and bomb prevention, The ECMSA -1300 Electronic Countermeasure Signal Analyzer that detects virtually all clandestine transmitters and the VL-6500 Non-Linear Junction Detector which electromagnetically detects the presence of semi-conductors, electronic components and most radio frequency transmissions. About Security Intelligence Technologies, Inc. Security Intelligence Technologies, Inc. designs, assembles, and markets various advanced proprietary security products used throughout the world by the general public, military, law enforcement and security personnel in both public and private sectors, as well as governmental agencies, multinational corporations and non- governmental organizations. SITG products include a broad range of proprietary, professional, branded law enforcement and consumer equipment such as covert audio and video intercept, electronic countermeasures, video, photo, and optical systems, radio communication, explosive contraband detection, armored vehicles and clothing, nuclear, biological and chemical masks and protective clothing, voice stress analysis lie detection and global positioning systems, used for tracking, locating and recovering vehicles and fleet management. SITG products are marketed under CCS International, Ltd., G-Com Technologies and The Counter Spy Shops of Mayfair, London(R) brand names and are sold primarily through a worldwide network of sales agents. SITG trained, multilingual and experienced security personnel work closely with clients to create and implement solutions to complex security problems. These services include security planning, advice and management, security systems integration, intellectual property asset protection, threat assessment, due diligence investigations and training and seminar programs in counterintelligence, countersurveillance and counterterrorism. SITG products and props can be seen in major motion pictures, including Silence of the Lambs, First Kid, Mission Impossible 1, Meet the Parents, Supertroopers, Bad Company and Spy, The Movie. SITG also co-brands its Night Vision Binoculars with Ford's Aston Martin, and donates products to International Spy Museum's exhibits. Safe Harbor Statement Statements in this press release and oral statements that may be made by the Company or by officers, directors or employees of the Company acting on the Company's behalf may constitute "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995. Such forward-looking statements involve known and unknown risks, uncertainties and other unknown factors that could cause the actual results of the Company to be materially different from the historical results or from any future results expressed or implied by such forward-looking statements. In addition to statements which explicitly describe such risks and uncertainties, readers are urged to consider statements labeled with the terms "believes," "expects," "intends," "may," "should," or "anticipates" to be uncertain forward-looking statements. The forward looking statements contained herein are also subject generally to other risks and uncertainties that are described from time to time in the Company's reports and registration statements filed with the Securities and Exchange Commission. The material under "Risk Factors" and management's discussion and analysis of fiscal condition and results of operations are included in the company's Form 10-K for the fiscal year ended June 30, 2003. Information on SITG's corporate website is not a part of this press release. Due to the sensitive nature of their purchases, SITG does not disclose the identity of clients. Analyst/Investor kits and store tours available upon request For more information see SITG's websites at: www.spyzone.com, www.gcomtech.com and www.bombjammer.com CONTACT: SITG Contact: Fierce Communications LLC Ms. Arielle Jamil, 212-995-2138 PRSpygirl@s... URL: http://www.businesswire.com LOAD-DATE: November 18, 2003 [Non-text portions of this message have been removed] 8370 From: Steve Uhrig Date: Tue Mar 23, 2004 9:13pm Subject: A CCS under any other name is still CCS On 23 Mar 2004 at 21:51, NoPositiveWork@a... wrote: > About Security Intelligence Technologies, Inc. > Security Intelligence Technologies, Inc. designs, assembles, and > markets various advanced proprietary security products used throughout > the world by the general public, military, law enforcement and security > personnel in both public and private sectors, as well as governmental > agencies, multinational corporations and non- governmental > organizations. > SITG products are marketed under CCS International, Ltd., G-Com > Technologies and The Counter Spy Shops of Mayfair, London(R) brand > names and are sold primarily through a worldwide network of sales > agents. In the unlikely event there are still people left who don't know, the above statements are a long way from what most of us would consider to be truthful. All mentioned companies are outfits to stay FAR away from. Any affiliation with them will ruin you. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8371 From: Ocean Group Date: Wed Mar 24, 2004 6:32am Subject: Sweeps unsuccessful for Governments... It seems that sweeps have a low success rate when concerned with government mischief!!! Beware! Our friends are bugging us, embassies told BY DANIEL MCGRORY AND ANDREW PIERCE THE TIMES March 24, 2004 BRITISH diplomats in Brussels head the list of envoys who are being targeted by foreign intelligence agencies, according to a leaked Foreign and Commonwealth Office document seen by The Times. Security experts have warned senior diplomats in the Belgian capital that their e-mails may be intercepted and homes may be bugged, and that counter-surveillance "sweeps" are unlikely to succeed. British diplomats in Bosnia and Pakistan have also been told that they are being spied upon by supposedly friendly governments, according to the document. Concern is now so great that one of the officials in charge of Foreign Office security has cautioned envoys that the department's information technology systems are "under attack" and that routine e-mails to and from Whitehall could no longer be regarded as safe. Diplomats have been told that every message they send must be delivered on a secure system after one foreign government took offence at an e-mail that its agents had secretly and illegally intercepted. The envoys at risk include the three British ambassadors in Brussels who deal respectively with the EU, Nato and the host Belgian Government, and those at the British Embassy in Sarajevo and the High Commission in Islamabad. The new generation of spies believe they will learn far more secrets from eavesdropping on diplomats' homes rather than trying to bug formal meetings at embassy buildings. These security lapses were only discovered after ministers ordered an urgent review following the bomb attack on the British Consulate in Istanbul last November. As well as the threat from terrorist bombers, the investigators found evidence of espionage leaks. The document seen by The Times details how Peter Millett, the head of the security strategy unit at the Foreign Office, discussed the latest spying operations last month with leaders of the Diplomatic Service Association, which represents 650 of Britain's senior envoys. The revelation comes weeks after Clare Short, the former Cabinet minister, claimed Britain was spying on Kofi Annan, the UN SecretaryGeneral, and MI5 was accused of bugging the Pakistani High Commission in London. So far, the Foreign Office has not made any public protest to the three countries named in the report. The Foreign Office and other departments have secure systems in their buildings but staff often fail to use them when routinely sending e-mails. There is also evidence of how spies are listening into conversations between senior envoys and visiting ministers, believing British officials and their government guests might speak more freely over dinner or drinks in the residence than they might during formal embassy briefings. MI5 officers were sent to Brussels to investigate the bugging of offices used by British diplomats in the EU Council of Ministers building. The Russians and the Israelis were suspected of planting sophisticated bugs in the offices of six EU delegations, including Britain, which were discovered last May. There were also accusations last summer that the Pakistani authorities tried to bug the British High Commissioner's office when a stray wire was found trailing from his desk. The Foreign Office said of these latest spying allegations: "We do not comment on leaked documents." The reaction of foreign diplomats in Britain was summed up by one veteran envoy in London, who said: "It would be a bit rich for Britain to take the high moral ground about being spied on by friends after their alleged behaviour at the UN." 8372 From: Date: Wed Mar 24, 2004 3:17am Subject: Man Indicted in Wiretap Case Man Indicted in Wiretap Case The defendant is accused of recording the computer keystrokes of a workplace colleague. By Regine Labossiere Times Staff Writer March 24, 2004 A Huntington Beach man Tuesday became the first person in the nation to be charged with illegally using an electronic device to record someone's computer keystrokes, according to the U.S. attorney's office. A federal grand jury in Los Angeles indicted Larry Lee Ropp, 46, on one count of wiretapping, said Thom Mrozek a spokesman for the U.S. attorney's office in Los Angeles. When Ropp worked at Bristol West Insurance Group/Coast National Insurance Co. in Anaheim, he secretly installed a "Key Katcher" into the computer of the vice president's secretary, Mrozek alleged. The device was plugged into the computer to record every keystroke the secretary made, he alleged. Ropp was fired in September for violating the company's time-clock policy, Mrozek said. After he was fired, Ropp called a company employee and asked her to remove what he called a "toy" from the computer. The employee told her supervisor, Mrozek said. The firm's technology department found that the device was not a toy, Mrozek said, and called the FBI. Bristol is involved in a class-action civil suit brought by former employees. Information from FBI interviews suggested that Ropp was trying to obtain information for the plaintiffs in that lawsuit, Mrozek said. Ropp could not be reached for comment. Mrozek said devices such as the Key Katcher are commercially available and are legal as long as they are used on personal property. Parents sometimes use them to monitor their children's computer activity. The devices can be used to steal private information, company secrets and passwords. Ropp was arrested Feb. 25 and released on bond that day, Mrozek said. A conviction could bring Ropp a maximum of five years in federal prison. Because the computer was hooked up to the Internet and was connected to company branches in Arizona and Florida, Ropp was indicted under federal law, Mrozek said. Ropp admitted to the FBI that he used the Key Katcher, but he said the California Department of Insurance had hired him as a whistle-blower. Department representatives denied that claim. [Non-text portions of this message have been removed] 8373 From: Ocean Group Date: Wed Mar 24, 2004 11:19am Subject: CCS 2 I'll second that. Don't even consider this crowd seriously. Just because they can afford to pay a PR company and because they are signing distribution agreements with people does not mean that their products are high quality and most importantly does not mean that they are an honest company..... Message: 2 Date: Tue, 23 Mar 2004 22:13:20 -0500 From: "Steve Uhrig" Subject: A CCS under any other name is still CCS On 23 Mar 2004 at 21:51, NoPositiveWork@a... wrote: > About Security Intelligence Technologies, Inc. > Security Intelligence Technologies, Inc. designs, assembles, and > markets various advanced proprietary security products used throughout > the world by the general public, military, law enforcement and > security personnel in both public and private sectors, as well as > governmental agencies, multinational corporations and non- > governmental organizations. > SITG products are marketed under CCS International, Ltd., G-Com > Technologies and The Counter Spy Shops of Mayfair, London(R) brand > names and are sold primarily through a worldwide network of sales > agents. In the unlikely event there are still people left who don't know, the above statements are a long way from what most of us would consider to be truthful. All mentioned companies are outfits to stay FAR away from. Any affiliation with them will ruin you. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8374 From: Spook Date: Wed Mar 24, 2004 11:51am Subject: Re: ECMSA -1300 Electronic Countermeasure Signal Analyzer SITG is actually CCS, and is only one of a dozen aliases, front companies, and activities their hide behind. The "distribution agreements" are a bit of an old joke, as the equipment is grossly over-priced and their "dealer" is more a victim than anything else. Of course their victim/dealer is hoping to make millions of dollars a year in profits, but once the "dealers" customers realizes that their are getting screwed the business dries up. IMHO, The products are grossly mis-represented, the catalogs are deceptive and fraudulent, and the profit margins so high that it invites significant deception. In fact the markups are often 100 times what Radio Shack, Telex, Toys-R-Us, or Wal-mart charges for the same thing. CCS sends out copies of this same "Press Release" everything they hook a new victim... but their stock price is floundering, the market markers limited, and the stock generally trades between a few insiders. You may have heard of "Penny Stocks", but IMHO this is a dog of a stock that is more aptly called a "Plugged Nickel Stock". Of course your mileage may vary, but I am waiting for the market capitalization of the stock to collapse, for the price to plummet, and for the stock to be de-listed. I am puzzled if customers are supposed to pay by stuffing dollars into a G-String, or do they just leave it on the dresser? -jma At 09:51 PM 3/23/2004, NoPositiveWork@a... wrote: >Several months old but noteworthy. > >HEADLINE: Security Intelligence Technologies, Inc. Signs New Licensee >with 3-Year Agreement Valued at 1.5 Million > >DATELINE: NEW YORK, Nov. 17, 2003 > >BODY: Security Intelligence Technologies, Inc., (OTCBB:SITG) today >announced it has signed a three-year distribution agreement with a >prominent private European government consulting company who are now >licensed to sell its counterterrorism, surveillance, counter- >surveillance and security products exclusively in Serbia. > >Per the three-year distribution agreement, the distributor paid an up >front fee of $150,000 and is obligated to make minimum annual >purchases of $500,000 per year, totaling $1,500,000. In return for >the upfront fee, the distributor receives a 10% discount on their >first $1,500,000 worth of purchase orders. > >This is twelfth distributor agreement signed by SITG in the past >year. "Our licensee program assists in the further development of the >emerging European market and continually expands our product line >internationally," stated Ben Jamil, Chief Executive Officer of SITG. >"Through our distributors we are able to reach a global market for >our proprietary security products and services. > >The distributor's first order includes such proprietary products as >the VIP-16 Bomb Jammer, a portable radio frequency detection and >jamming system used in counter terrorism and bomb prevention, The >ECMSA -1300 Electronic Countermeasure Signal Analyzer that detects >virtually all clandestine transmitters and the VL-6500 Non-Linear >Junction Detector which electromagnetically detects the presence of >semi-conductors, electronic components and most radio frequency >transmissions. > >About Security Intelligence Technologies, Inc. > >Security Intelligence Technologies, Inc. designs, assembles, and >markets various advanced proprietary security products used >throughout the world by the general public, military, law enforcement >and security personnel in both public and private sectors, as well as >governmental agencies, multinational corporations and non- >governmental organizations. SITG products include a broad range of >proprietary, professional, branded law enforcement and consumer >equipment such as covert audio and video intercept, electronic >countermeasures, video, photo, and optical systems, radio >communication, explosive contraband detection, armored vehicles and >clothing, nuclear, biological and chemical masks and protective >clothing, voice stress analysis lie detection and global positioning >systems, used for tracking, locating and recovering vehicles and >fleet management. SITG products are marketed under CCS International, >Ltd., G-Com Technologies and The Counter Spy Shops of Mayfair, >London(R) brand names and are sold primarily through a worldwide >network of sales agents. SITG trained, multilingual and experienced >security personnel work closely with clients to create and implement >solutions to complex security problems. These services include >security planning, advice and management, security systems >integration, intellectual property asset protection, threat >assessment, due diligence investigations and training and seminar >programs in counterintelligence, countersurveillance and >counterterrorism. SITG products and props can be seen in major motion >pictures, including Silence of the Lambs, First Kid, Mission >Impossible 1, Meet the Parents, Supertroopers, Bad Company and Spy, >The Movie. SITG also co-brands its Night Vision Binoculars with >Ford's Aston Martin, and donates products to International Spy >Museum's exhibits. > >Safe Harbor Statement > >Statements in this press release and oral statements that may be made >by the Company or by officers, directors or employees of the Company >acting on the Company's behalf may constitute "forward-looking >statements" within the meaning of the Private Securities Litigation >Reform Act of 1995. Such forward-looking statements involve known and >unknown risks, uncertainties and other unknown factors that could >cause the actual results of the Company to be materially different >from the historical results or from any future results expressed or >implied by such forward-looking statements. In addition to statements >which explicitly describe such risks and uncertainties, readers are >urged to consider statements labeled with the terms "believes," >"expects," "intends," "may," "should," or "anticipates" to be >uncertain forward-looking statements. The forward looking statements >contained herein are also subject generally to other risks and >uncertainties that are described from time to time in the Company's >reports and registration statements filed with the Securities and >Exchange Commission. The material under "Risk Factors" and >management's discussion and analysis of fiscal condition and results >of operations are included in the company's Form 10-K for the fiscal >year ended June 30, 2003. Information on SITG's corporate website is >not a part of this press release. Due to the sensitive nature of >their purchases, SITG does not disclose the identity of clients. > >Analyst/Investor kits and store tours available upon request > >For more information see SITG's websites at: www.spyzone.com, >www.gcomtech.com and www.bombjammer.com > >CONTACT: SITG Contact: >Fierce Communications LLC >Ms. Arielle Jamil, 212-995-2138 >PRSpygirl@s... > >URL: http://www.businesswire.com > >LOAD-DATE: November 18, 2003 8375 From: larry d chapman Date: Wed Mar 24, 2004 6:44am Subject: Re: A CCS under any other name is still CCS Well spoken Steve; a few of us have had clients who have had to learn the hard way. Do your research. LDC -- --------- Original Message --------- DATE: Tue, 23 Mar 2004 22:13:20 From: "Steve Uhrig" To: tscm-l@yahoogroups.com Cc: On 23 Mar 2004 at 21:51, NoPositiveWork@a... wrote: > About Security Intelligence Technologies, Inc. > Security Intelligence Technologies, Inc. designs, assembles, and > markets various advanced proprietary security products used throughout > the world by the general public, military, law enforcement and security > personnel in both public and private sectors, as well as governmental > agencies, multinational corporations and non- governmental > organizations. > SITG products are marketed under CCS International, Ltd., G-Com > Technologies and The Counter Spy Shops of Mayfair, London(R) brand > names and are sold primarily through a worldwide network of sales > agents. In the unlikely event there are still people left who don't know, the above statements are a long way from what most of us would consider to be truthful. All mentioned companies are outfits to stay FAR away from. Any affiliation with them will ruin you. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. ____________________________________________________________ Find what you are looking for with the Lycos Yellow Pages http://r.lycos.com/r/yp_emailfooter/http://yellowpages.lycos.com/default.asp?SRC=lycos10 [Non-text portions of this message have been removed] 8376 From: James M. Atkinson Date: Wed Mar 24, 2004 10:41am Subject: Police to get more spy devices http://www.theage.com.au/articles/2004/03/24/1079939700234.html Police to get more spy devices March 24, 2004 - 2:05PM Police could soon have access to more spy devices to help them keep a step ahead of criminals under proposed new laws introduced to parliament. The government's Surveillance Devices Bill 2004 allows police investigating crimes under commonwealth laws to use optical, data and tracking surveillance devices. Currently, they are only allowed to use listening devices. The new laws will help Australia Federal Police, the Australian Crime Commission or state or territory police investigating people suspected of committing offences under commonwealth law. Attorney-General Philip Ruddock said the new legislation was needed because current surveillance device laws were not up to the job of policing in the 21st century. "To restrict commonwealth law enforcement to the use of devices which are only capable of recording spoken words is simply not adequate," he told parliament. "As criminal and terrorist groups make use of sophisticated technology, our police must be able to match and better them." Mr Ruddock said the bill would also expand the range of offences police could obtain a surveillance device warrant for, such as terrorism, people trafficking and child sex tourism. Police investigating people who fail to declare the import or export of $10,000 or more, people operating a bank accounts using a false name and officers protecting Australia's fisheries will be able to use the devices. However they will have to get a warrant or authorisation from a senior officer. Police using tracking devices not involving entering private property or the inside of a suspect's vehicle will only have to obtain permission from a senior officer rather than get a court warrant. Police will also be able to use devices without obtaining a warrant in emergency situations such as terrorism, serious drug offences and if there is an imminent threat to a person's safety. Also for the first time, Australian police will be able to obtain warrants here to use surveillance devices overseas in limited circumstances. Debate on the new bill was adjourned. C2003 AAP ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8377 From: James M. Atkinson Date: Wed Mar 24, 2004 0:25pm Subject: Re: Man Indicted in Wiretap Case It doesn't help that Key Katcher has multiple backdoors, can easily be detected, easily disabled, and has a history of being sold by felons, crooks, mental patients, and so on. It is illegal to use, to possess, to attempt to possess, to sell, to buy, to advertise or any variation thereof. A parent cannot use this on either their own, or their kids computer, nor can a business use these to spy on their own employees. It is illegal, a felony, a tort, and a generally naughty and forbidden thing. However, these are a piece of cake to find technically during a sweep. Simply use a low inductance tuned shielded magnetic coil, a fire-wall bandpass filter, and a 40-45 dB LNA. Go for the oscillator, and the harmonics of the oscillator for 100% detection of the device. TSCM detection protocol is identical for that of finding modern sub-miniature digital audio recorders. Also extremely easy to detect via the naked eye (if you have a clue), and can also be easily detected by simply using the USB strobe method. I have records that the U.S. Government has bought a number of these, and that the purchase was illegal, and the equipment was used in direct violation of U.S. Law, and used to perform illegal buggings that were not court authorized or approved. -jma At 09:17 AM 3/24/2004, NoPositiveWork@a... wrote: >Man Indicted in Wiretap Case > >The defendant is accused of recording the computer keystrokes of a workplace >colleague. > >By Regine Labossiere >Times Staff Writer > >March 24, 2004 > >A Huntington Beach man Tuesday became the first person in the nation to be >charged with illegally using an electronic device to record someone's >computer >keystrokes, according to the U.S. attorney's office. > >A federal grand jury in Los Angeles indicted Larry Lee Ropp, 46, on one count >of wiretapping, said Thom Mrozek a spokesman for the U.S. attorney's office >in Los Angeles. > >When Ropp worked at Bristol West Insurance Group/Coast National Insurance Co. >in Anaheim, he secretly installed a "Key Katcher" into the computer of the >vice president's secretary, Mrozek alleged. The device was plugged into the >computer to record every keystroke the secretary made, he alleged. > >Ropp was fired in September for violating the company's time-clock policy, >Mrozek said. After he was fired, Ropp called a company employee and asked >her to >remove what he called a "toy" from the computer. > >The employee told her supervisor, Mrozek said. The firm's technology >department found that the device was not a toy, Mrozek said, and called >the FBI. > >Bristol is involved in a class-action civil suit brought by former employees. >Information from FBI interviews suggested that Ropp was trying to obtain >information for the plaintiffs in that lawsuit, Mrozek said. > >Ropp could not be reached for comment. > >Mrozek said devices such as the Key Katcher are commercially available and >are legal as long as they are used on personal property. Parents sometimes >use >them to monitor their children's computer activity. > >The devices can be used to steal private information, company secrets and >passwords. > >Ropp was arrested Feb. 25 and released on bond that day, Mrozek said. A >conviction could bring Ropp a maximum of five years in federal prison. > >Because the computer was hooked up to the Internet and was connected to >company branches in Arizona and Florida, Ropp was indicted under federal law, >Mrozek said. > >Ropp admitted to the FBI that he used the Key Katcher, but he said the >California Department of Insurance had hired him as a whistle-blower. >Department >representatives denied that claim. > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8378 From: James M. Atkinson Date: Wed Mar 24, 2004 0:42pm Subject: Re: CCS 2 Well in that case I could claim to have just landed hundreds of millions of dollars in investment capital from Nigeria, Yemen, and Pakistan. [snicker] -jma At 12:19 PM 3/24/2004, Ocean Group wrote: >I'll second that. Don't even consider this crowd seriously. > >Just because they can afford to pay a PR company and because they are >signing distribution agreements with people does not mean that their >products are high quality and most importantly does not mean that they are >an honest company..... > > > >Message: 2 > Date: Tue, 23 Mar 2004 22:13:20 -0500 > From: "Steve Uhrig" >Subject: A CCS under any other name is still CCS > >On 23 Mar 2004 at 21:51, NoPositiveWork@a... wrote: > > > About Security Intelligence Technologies, Inc. > > > Security Intelligence Technologies, Inc. designs, assembles, and > > markets various advanced proprietary security products used throughout > > the world by the general public, military, law enforcement and > > security personnel in both public and private sectors, as well as > > governmental agencies, multinational corporations and non- > > governmental organizations. > > > SITG products are marketed under CCS International, Ltd., G-Com > > Technologies and The Counter Spy Shops of Mayfair, London(R) brand > > names and are sold primarily through a worldwide network of sales > > agents. > >In the unlikely event there are still people left who don't know, the above >statements are a long way from what most of us would consider to be >truthful. > >All mentioned companies are outfits to stay FAR away from. Any affiliation >with them will ruin you. > >Steve > > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance >equip mailto:Steve@s... website http://www.swssec.com tel >+1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we >monitor" >******************************************************************* > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8379 From: Date: Wed Mar 24, 2004 11:30am Subject: Re: ECMSA -1300 Electronic Countermeasure Signal Analyzer In a message dated 3/24/2004 10:26:43 AM Pacific Standard Time, spook@t... writes: > I am puzzled if customers are supposed to pay by stuffing dollars into a > G-String, or do they just leave it on the dresser? No, you have to pay up front. They always take the money first. [Non-text portions of this message have been removed] 8380 From: kondrak Date: Wed Mar 24, 2004 9:52pm Subject: Fake PayPal, AOL spam operations stopped by FTC, DOJ Proving theres an idiot born every minute... >Fake PayPal, AOL spam operations stopped by FTC, DOJ >The spammer illegally obtained credit card and account information from >hundreds of users > > >News Story by Todd R. Weiss > > >MARCH 23, 2004 (COMPUTERWORLD) - A spam e-mail operation that sent out >e-mails falsely claiming to be from PayPal or America Online Inc., >tricking hundreds of consumers into entering their credit card, banking >and user account information on fake PayPal and AOL Web sites, has been >stopped by the U.S. Department of Justice and the Federal Trade >Commission. > >In a joint announcement yesterday, the two agencies said that Zachary >Keith Hill of Houston has been ordered to halt the >identity theft operation, which was the type of scam also known as >phishing, while he awaits sentencing on federal >criminal charges. > >Each agency led its own probe into Hill's activities. > >In a criminal case brought by the DOJ in U.S. District Court in the >Southern District of Texas, Houston Division, Hill pleaded >guilty last month to charges of using illegally obtained account access >information to buy goods worth more than $1,000 >and to a charge of illegally possessing account information for more >than 15 people on his PC. > >In a separate civil lawsuit filed by the FTC in December (download PDF), >Hill was charged with false affiliation for claiming >that the e-mail messages he sent were from PayPal, AOL and other >Internet service providers. He was also charged with >making false claims to consumers so they would provide account >information and with one count of unfair use of that >private information and a count of inducing consumers to submit account >information by using deceptive means. The >24-page complaint asked the court to issue an injunction barring Hill >from continuing his operations. > >Casey Stavropoulos, a DOJ spokeswoman, said Hill is expected to be >sentenced on the criminal charges on May 18. He >faces a maximum prison term of 10 to 15 years, she said, but he could >get a lesser sentence as a result of his >cooperation with authorities after his arrest. He also faces fines of at >least $200,000 plus restitution. > >Hill sent the fake e-mails between March 2001 and February 2003, >according to the DOJ. > >Investigators were able to link Hill to the fake messages through e-mail >addresses that were embedded in the HTML code >in the fake Web pages, said Patricia Poss, one of the FTC attorneys >working on the case. The HTML code in the Web >pages directed the information entered by consumers to Hill's e-mail >addresses, Poss said. > >The FTC case against Hill remains in litigation, she said. He has agreed >to the preliminary injunction that halted his >operations while both sides work to resolve the case. Hill is connected >to at least $78,000 in purchases or attempted >purchases on new credit card accounts he opened using the stolen >information, the FTC said. > >He illegally obtained 471 credit card numbers, 152 bank account and bank >routing numbers and 541 usernames and >passwords for personal Internet access accounts using his fake Web >sites, according to his plea agreement with the >Justice Department. > >Under Hill's scam, consumers received e-mails that appeared to come from >AOL or PayPal. The "From" line identified the >sender as "billing center" or "account department" and the "Subject" >line carried warnings such as "AOL Billing Error >Please Read Enclosed Email," or "Please Update Account Information >Urgent!" The messages warned consumers that their >accounts would be canceled if they didn't respond. > >A hyperlink in the e-mail pointed to what appeared to be the AOL Billing >Center, with AOL's logo and live links to real AOL >Web pages. But the site was actually Hill's Web site, where he harvested >consumers' names and their mothers' maiden >names as well as their billing addresses, Social Security numbers, dates >of birth, bank account numbers, bank routing >numbers, AOL screen names and passwords. > >Hill's PayPal scheme used the PayPal passwords that consumers provided, >allowing him to use their PayPal accounts to >purchase goods and services. > >"As the Hill case demonstrates, the government can make a difference >when agencies work together to crack down on >Internet identity theft scams," Assistant Attorney General Christopher >A. Wray of the DOJ's Criminal Division said in a >statement. > >Several attempts to reach Hill by telephone were unsuccessful. > >Nicholas Graham, a spokesman for Dulles, Va.-based AOL, said the company >applauds the government's prosecution of >the case. "This is a very important issue to us," Graham said. > >Amanda Pires, a spokeswoman for San Jose-based PayPal, said the company >believes the case will help deter others >from using similar scams. "It also helps to educate people not to >respond to these fraudulent e-mails," she said. > >Assisting in the cases were the FBI's Washington Field Office and the >U.S. attorney for the Eastern District of Virginia's >Computer Hacking and Intellectual Property Squad. > >http://www.computerworld.com/printthis/2004/0,4814,91562,00.html 8381 From: Thomas Shaddack Date: Wed Mar 24, 2004 8:11pm Subject: Re: Man Indicted in Wiretap Case Disclaimer: I have no experiences with the hardware keyloggers yet, but got my hands on microcontrollers and used to play quite extensively with the PS/2 keyboards. The PS/2 keyboard interface is something between simple and trivial. There are 4 wires present: +5V, ground, CLK, and DTA. The CLK and DTA are pulled up to logical H on both sides and are bidirectional (which makes it peculiar - and annoying - to work with); every keypress, key repeat (sent as another keypress), and key release are sent from the keyboard to the computer as a scancode - an 8-bit number, with the most significant bit set if the scancode is a key release, and cleared when it is a keypress)[1]. Some keys are sent as multiple bytes, usually prefixed with 0xE0, Escape code. The computer sends back to the keyboard the initialization requests (to which the keyboard answers and confirms its presence), set/unset the LEDs, and the typematic rate set (the keyboard maintains the repeat-when-keypress on its own). [1] Which explains when sometimes a Shift, Ctrl, or Alt key gets "stuck" - it's when the computer misses the key release event. Tapping the key again solves the matter. The physical protocol is, again, very simple. It's a synchronous serial interface; the value of the DTA line at the rising edge of the CLK line is moved to the bit shift register. See http://panda.cs.ndsu.nodak.edu/~achapwes/PICmicro/PS2/ps2.htm for detailed description. (A neat project from which a proof-of-concept keylogger could be forked is a convertor of PS/2 keyboard to RS232 or RS485, allowing connecting keyboards to computers as serial terminals; has lots of applications in automatization, as computer keyboards are dirt-cheap.) On Wed, 24 Mar 2004, James M. Atkinson wrote: > It doesn't help that Key Katcher has multiple backdoors, can easily be > detected, easily disabled, and has a history of being sold by felons, > crooks, mental patients, and so on. Not even mentioning it's usually much easier to bug the machine in purely software way, unless the machine is hardened, which is rare. There is a plethora of trojans available for such purposes, and hooking a system call from the keyboard is not exactly difficult for a skilled programmer. There are even worms with built-in keyloggers with known location of storage of the keylog file; using one of them instead of hardware device would provide some plausible deniability for the overly-curious-individual-in-question. There are ways to detect a software keylogger too, but in some cases they aren't trivial. The programmers, in a giant and exciting chess game, come with new ways to both detect and hide the keyloggers. Example: a favorite way to detect them is to watch the files on the disk for the ones that slowly grow with the use of the keyboard - as a response, a keylogger that logs to Windows Registry appeared. The Yin and the Yang seek eternal dynamic equilibrium. A hardware keylogger, built into the computer itself, could be a very useful security audit device, eg. for the computers with usually not accessed keyboards, in untrusted locations like eg. the colocation facilities. Together with a tamper detection switch inside the case (which the keylogger microcontroller may do on its own), and forbidden boot from a CD/FDD[2], it could present a good way to assure the administrator that no one tried to gain access to the machine via the local console, while not inhibiting the access entirely. Thus permitting the scenario when the admin calls in a help and navigates the console operator over the phone, while still being fully informed what happened with the machine and when. The plug-between-keyboard-and-computer toy is unsuitable for this purpose, though - both for the way it physically connects to the keyboard cable, and because I can't see its firmware so I won't trust it. [2] Another thing to care of is the possibility of the disk being removed from the case and accessed separately. However, modern hard drives are equipped with SMART registers, that log data ranging from the number of read and seek errors to the power-up count, which is incremented every time the power is applied to the drive. It's possible to get around this as well, if you swap the board on the drive (as the SMART data are stored in an EEPROM chip on the disk's controller board), but that can be prevented by gluing the board to the disk by epoxy, if there is a risk that the eventual adversary will use this approach. Then there has to be a process in the boot-up sequence that checks the number of power-ons the disk went through, and checks if it is exactly n (reboot) or n+1 (power-cycle) (where n is the value of the last check), and alerts the administrator when it is not the case. A tamper switch inside the case has its role in preventing this route of entry, as well. I think keyloggers are legal here, anyway. (Maybe in the US as well; the Key Katcher is openly marketed even by non-crook outlets like ThinkGeek.com, for pretty long time already, and I din't hear about it rising any eyebrows yet. It can be really useful even legitimately - who wouldn't like to avoid retyping that long mail eaten by a bluescreening machine. But again, for a higher security scenario, I would prefer it to not be present.) A version that switches off logging after receiving a log-in sequence could be a good way for maintaining control over the access to the machine while still maintaining the privacy of the legitimate user (who knows the off-password). Could be effective to detect physical-access tampering with the machine. A nice way of realization could be a microcontroller connected to the keyboard connector on one side, the I2C bus on the motherboard on the other side, accessed by software, switched off after a high security user logs in using eg. a smartcard. My servers - my castles. > However, these are a piece of cake to find technically during a sweep. > Simply use a low inductance tuned shielded magnetic coil, a fire-wall > bandpass filter, and a 40-45 dB LNA. Go for the oscillator, and the > harmonics of the oscillator for 100% detection of the device. TSCM > detection protocol is identical for that of finding modern sub-miniature > digital audio recorders. AFAIK, the loggers are powered from the computer, don't have their own batteries (which is logical, given that there are no data to record when the keyboard is off, and that plenty of power is available on the wire when the keyboard is on), don't run their clock when the computer is off, unlike "normal" bugs. It's good to be aware about this. Also, it should be possible to use a trick used by microcontroller programmers for lowering the power consumption - switch off the chip's clock when there is nothing to do, eg. when there was no activity on the CLK line for specified amount of milliseconds, and wake up the chip by an interrupt when the activity is present. The caveat here is to be aware about the time it takes the microcontroller to wake up and run its clock (see the datasheet). However, the prepare-for-transmission pulse on the CLK line that precedes the data transmission itself could give some milliseconds of breathing space. There are also microcontroller flavors that are marketed as instant-on, with very short wake-up-and-start-the-clock delay. Probably not an issue with KeyKatcher, but could be good to be aware about this possibility for various homebrew devices. > Also extremely easy to detect via the naked eye (if you have a clue), and > can also be easily detected by simply using the USB strobe method. Unless specifically built-in into the computer, like the way I described above. The KeyKatcher is a toy, ridiculously easy to find by just looking at the cable. A good way to eliminate this kind of threat is to use USB keyboards instead of the PS/2 ones. The USB protocol is much more difficult to eavesdrop on, and I am not aware about any USB keylogger being available on the market. Though I guess it's still possible to build - but the microcontroller required for that is much more powerful, as instead of simple bitshifting and EEPROM writing it has to decode the entire USB protocol. Which is everything but trivial, and resorting to a software keylogger or bugging the keyboard multiplexing matrix is easier anyway. What's "USB strobe", please? I didn't manage to find anything about it in my references. > I have records that the U.S. Government has bought a number of these, and > that the purchase was illegal, and the equipment was used in direct > violation of U.S. Law, and used to perform illegal buggings that were not > court authorized or approved. Every government does it; I won't be surprised if my one would be routinely doing the same. Are they so incompetent they can't build their own? Sorry for talking so much. Should learn to talk more briefly. -- ....I am not paranoid. I am the sysadmin. 8382 From: kondrak Date: Wed Mar 24, 2004 9:36pm Subject: Stoned Criminals Don't mess with bullet proof glass. http://www.bullguard.com/badnews Open this in internet explorer, then hit play....OH! Pain! 8383 From: Noel E. Hanrahan Date: Wed Mar 24, 2004 3:26pm Subject: New Member Good afternoon all, my name is Noel Hanrahan and I'm a director of IDSS, a Peruvian based company dedicated to security. Aside from being agents of one of the larger manufacturers of security products, we have a small team of prefessionals dedicated to the collection, analysis, disseminantion and providing of security information on a national and, to a smaller extent, international level. I look forward to participating with you all in this group. Noel E: Hanrahan [Non-text portions of this message have been removed] 8384 From: Mitch D Date: Wed Mar 24, 2004 11:08pm Subject: Re TDR's For Sale Just a quick comment: The prices Steve has listed for TDR's are excellent,you will find no deals on new TDR's, Riser Bond gear at reduced prices is priceless.We have purchased gear from SWS repetitively and have never had a problem. ===== Mitch Davis TSCM/Special Operations Group Inc. Nashville,TN.USA MitchD@t... site:www.tscmusa.com. Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 __________________________________ Do you Yahoo!? Yahoo! Finance Tax Center - File online. File on time. http://taxes.yahoo.com/filing.html 8385 From: Mitch D Date: Wed Mar 24, 2004 11:12pm Subject: CCS Gear CCS Gear: On display at the Intl Spy Museum is a CCS "bug detector" that was apparently used by Aldrich Ames. Il bet he still curses it......... __________________________________ Do you Yahoo!? Yahoo! Finance Tax Center - File online. File on time. http://taxes.yahoo.com/filing.html From: James M. Atkinson, Comm-Eng Date: Mon Mar 19, 2001 1:12pm Subject: Re: "Wedding Bells" At 10:58 AM -0800 3/19/01, Dawn Star wrote: >Any one have information on this subject? >TOWER, 1990, CIA, NSA: >Electronic cross country subliminal programming and suggestion >Targeting: Mass population, short-range intervals, long-range cumulative >Frequencies: Microwave, EHF SHF >Methodology: Cellular telephone system, ELF modulation >Purpose: Programming through neural resonance and encoded information >Effect: Neural degeneration, DNA resonance modification, psychic suppression >Pseudonym: "Wedding Bells" > >Roger Tolces, Electronic Security, Los Angeles Yes... but it is now called MTV and the Comedy Channel. April Fools day is still 13 days away (cough-cough) -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2763 From: Marcelrf Date: Mon Mar 19, 2001 1:05pm Subject: Re: "Wedding Bells" http://www.trufax.org/research/projects.html http://www.eagle-net.org/omega/omega38.htm Dawn Star wrote: > Any one have information on this subject? > TOWER, 1990, CIA, NSA: > Electronic cross country subliminal programming and suggestion > Targeting: Mass population, short-range intervals, long-range cumulative > Frequencies: Microwave, EHF SHF > Methodology: Cellular telephone system, ELF modulation > Purpose: Programming through neural resonance and encoded information > Effect: Neural degeneration, DNA resonance modification, psychic suppression > Pseudonym: "Wedding Bells" > > Roger Tolces, Electronic Security, Los Angeles > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 2764 From: Miguel Puchol Date: Mon Mar 19, 2001 7:31pm Subject: RV: "Wedding Bells" Following the 'trufax' link, it strikes me how much crap can be written, and how scientific or pseudo-scientific terms be used to confuse people, usually leading them into other mind-control techniques not involving: >> Bohm Superquantum-Relativistic Potential, AKA holographic infinite information continuum, AKA intelligent field that interpenetrates the universe, AKA 'God'<<....quoted right out of this site. Hmmmm...will go to sleep now, the voices are telling me! Cheers all, Mike > > -----Mensaje original----- > > De: Marcelrf [mailto:Marcelrf@B...] > > Enviado el: lunes, 19 de marzo de 2001 20:06 > > Para: Dawn Star > > CC: TSCM-L@yahoogroups.com > > Asunto: Re: [TSCM-L] "Wedding Bells" > > > > > > http://www.trufax.org/research/projects.html > > > > http://www.eagle-net.org/omega/omega38.htm > > 2765 From: James M. Atkinson, Comm-Eng Date: Mon Mar 19, 2001 8:23pm Subject: Re: RV: "Wedding Bells" At 2:31 AM +0100 3/20/01, Miguel Puchol wrote: >Following the 'trufax' link, it strikes me how much crap can be >written, and how scientific or pseudo-scientific terms be used to >confuse people, usually leading them into other mind-control >techniques not involving: > >>> Bohm Superquantum-Relativistic Potential, AKA holographic >infinite information continuum, AKA intelligent field that >interpenetrates the universe, AKA 'God'<<....quoted right out of >this site. > >Hmmmm...will go to sleep now, the voices are telling me! > >Cheers all, > >Mike Oh no, The little voices are talking to me again and telling me that I have to go home and clean the guns now. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2766 From: James M. Atkinson, Comm-Eng Date: Tue Mar 20, 2001 8:44am Subject: Paradoxes of the Secret World Paradoxes of the Secret World http://www.washingtonpost.com/wp-dyn/articles/A16011-2001Mar16.html By Vernon Loeb Washington Post Staff Writer Monday, March 19, 2001; 12:00 AM Combing through the government's 109-page affidavit against accused spy Robert P. Hanssen, former FBI counterintelligence analyst Paul Moore noticed that the KGB had picked a succession of drop sites and given them code names in alphabetical order. The striking pattern began in 1987 with a drop site in Ellanor C. Lawrence Park in Western Fairfax County, codenamed AN, and continued with other sites code-named BOB, CHARLIE, DORIS, ELLIS, FLO and, finally, GRACE. The sites were allegedly used by Hanssen, a veteran FBI counterintelligence agent, and his handlers to exchange classified documents and cash payments through 1991, the period covered by a KGB dossier obtained by U.S. intelligence. While the affidavit says nothing about what Hanssen may have been doing between 1991 and 1999, it notes that Hanssen's handlers ultimately proposed a dead drop, code-named LEWIS, in 2001, quoting correspondence found on Hanssen's computer after he fell under suspicion late last year. Moore believes it is only logical to assume that drop site code names beginning with H,I,J and K were used between 1991 and 1999 and thinks this alphabetical code-naming system provides the strongest clue yet that Hanssen remained an active spy during the mysterious gap in the affidavit. "Was he active during that time?" asked Moore, who now works as an instructor at the Centre for Counterintelligence and Security Studies in Alexandria. "According to the pattern--and it's a pretty definite pattern--the answer would be yes." Moore's theory about the missing alphabetical drop sites dovetails with another clue in the affidavit that suggests Hanssen remained active from 1991 to 1999: the money. In an October 1999 letter to Hanssen, according to the FBI affidavit, the Russians said that "the sum set aside for you has risen and presents now about $ 800,000." That is $500,000 more than the $ 300,000 Hanssen's KGB handlers had mentioned setting aside for him in earlier communications, when he allegedly was being paid at a rate of $ 100,000 a year in 1987, 1988 and 1989. "They're not in the habit of paying large, one-time bonuses," Moore said. But what is most remarkable about Moore's analysis is his closeness to Hanssen: the two were virtually best friends right up to the point at which Hanssen was arrested Feb. 18 minutes after leaving a plastic garbage bag stuffed with classified documents near his suburban Virginia home. Moore isn't thrilled to be further implicating his friend. "It's like[performing] an autopsy," he said. "But [counterintelligence analysis] is what I do for a living. My friend Bob would not do these things. I'm analyzing how Bob the spy did these things." "An Astonishing Tenure for a Spy" As Moore can attest, government prosecutors went out of their way to include extensive detail about Hanssen's alleged spy career in the affidavit. But they clearly reserved their highest powers of rhetorical flourish for a "proffer" filed in court earlier this month to convince a judge to keep Hanssen locked up pending trial. Calling his alleged 15-year espionage career "an astonishing tenure for a spy," the government's disdain for him is caustic and raw. "Virtually up to the moment of his arrest, he was querying the FBI's internal computer system for indicators that he was under investigation," the proffer states. "It is reasonable to assume that he was not doing this for the purpose of determining when best to surrender." The proffer describes the case against Hanssen--who intends to plead not guilty--as "overwhelming" and states: "One can scarcely imagine more incriminating evidence than Hanssen's activities of February 18, 2001: his marking of a known signal site...; his depositing...a package containing classified documents; and his final note to the Russians indicating that he now suspected he was under investigation..." Relying heavily on italic type for emphasis, the proffer goes on to allege that "there were essentially no limits as to what Hanssen was willing to do in support of his espionage activities," noting that he betrayed three Russian agents working for the United States. "In other words," the proffer says, "Hanssen was willing to sacrifice the lives of others in order to protect himself." Referring to a joking reference Hanssen once allegedly made in a letter to his handlers about ultimately working for them in Moscow as a "guest lecturer," the proffer concludes: "With $800,000 awaiting him in Moscow, and a potential lifetime in prison awaiting him in the United States--or worse--one can only imagine the alacrity with which Hanssen would seek to assume his post as 'guest lecturer.'" The Tunnel and the Law Since the story broke more than two weeks ago about Hanssen's alleged compromise of a secret eavesdropping tunnel constructed below the Soviet Embassy in Washington in the 1980s, U.S. officials have said nothing about the legal basis for such an operation. But the Foreign Intelligence Surveillance Act of 1978 specifically authorizes electronic surveillance of foreign government installations in the United States, with approval of a secret federal court established to oversee such intelligence collection. "This category would include foreign embassies and consulates and similar'official' foreign government establishments that are located in the United States," according to the House Permanent Select Committee on Intelligence legislative history of FISA. In seeking orders from the secret court, government officials must include in their requests "a statement of the means by which surveillance will be effected and a statement whether physical entry is required to effect the surveillance," according to the FISA, section 104a(8). Digging a tunnel beneath an embassy presumably falls under the category of "physical entry." Moscow's "Paradoxical" Bugs The latest volume of the State Department's official diplomatic history, Foreign Relations of the United States, includes a 1964 damage assessment of a Soviet "intelligence coup"--the successful bugging of the U.S. Embassy in Moscow in the 1950s and early 1960s. Steven Aftergood, director of the Federation of American Scientists' project on government secrecy, spotted the assessment and circulated it in one of his regular "Secrecy News" bulletins last week. While microphones planted in the embassy enabled them to read "most, if not all, of our telegraphic messages," according to the State Department assessment, the impact of this capability could scarcely be detected in the way the Soviets behaved. "In order to keep us from discovering their intelligence coup the Soviets appear to have sacrificed many of the specific gains they might have made, and eschewed actions that might have given them away," the assessment states. By intercepting U.S. diplomatic communications, the assessment concludes, "Soviet leaders gained considerable advantage in their dealings with us, and, over time, they may have felt free to pursue more assertive policies because they had a clearer idea of what our reaction might be." But the Soviets seemed to have followed "a policy of self-denial of use of the information derived," the assessment notes, to protect their microphones, knowing they could provide invaluable advance warning in the event of a U.S. attack. Thus, the State Department found the effects of this major intelligence compromise "paradoxical." Indeed, the department's bottom-line conclusion highlights a central paradox of the secret world, where the advantage of acting on secret information must always be weighed against the possibility of compromising its source. © 2001 Washington Post Newsweek Interactive -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2767 From: Craig Snedden Date: Tue Mar 20, 2001 3:07am Subject: Re: "Wedding Bells" Do I hear Homer Simpson in there somewhere....?? Craig ----- Original Message ----- From: "Miguel Puchol" To: Sent: Tuesday, March 20, 2001 1:31 AM Subject: RV: [TSCM-L] "Wedding Bells" > Following the 'trufax' link, it strikes me how much crap can be > written, and how scientific or pseudo-scientific terms be used to > confuse people, usually leading them into other mind-control > techniques not involving: > > >> Bohm Superquantum-Relativistic Potential, AKA holographic > infinite information continuum, AKA intelligent field that > interpenetrates the universe, AKA 'God'<<....quoted right out of > this site. > > Hmmmm...will go to sleep now, the voices are telling me! > > Cheers all, > > Mike > > > > > -----Mensaje original----- > > > De: Marcelrf [mailto:Marcelrf@B...] > > > Enviado el: lunes, 19 de marzo de 2001 20:06 > > > Para: Dawn Star > > > CC: TSCM-L@yahoogroups.com > > > Asunto: Re: [TSCM-L] "Wedding Bells" > > > > > > > > > http://www.trufax.org/research/projects.html > > > > > > http://www.eagle-net.org/omega/omega38.htm > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 2768 From: Matthijs van der Wel Date: Tue Mar 20, 2001 6:49am Subject: EMI Thought this might be interesting. From the Cryptome website (http://cryptome.org) comes a 79 pages military handbook on EMI, dating 30 September 1988. Text file (no images): http://cryptome.org/mil-hdbk-1195.htm Zip file (1 MB): http://cryptome.org/mil-hdbk-1195.zip Abstract: MILITARY HANDBOOK: RADIO FREQUENCY SHIELDED ENCLOSURES Electromagnetic Interference (EMI) is a description of the phenomenon which results from allowing conducted and radiated electrical signals to reach destinations where their presence is undesirable. Uncontrolled EMI may cause computer malfunction or error, detonation of electrically explosive devices, or be the cause for loss of classified information to an enemy. The objective of this handbook is to provide a basic understanding of the problems associated with the acquisition of a facility containing one or more EMI shielded enclosures. It is intended that only the characteristics of the facility that are unusual in comparison to a nonshielded facility will be addressed. This handbook is a brief introduction to EMI shielding theory, and presents basic criteria of importance during the planning, design, and construction of a typical facility containing an EMI shielded enclosure. Yours sincerely, Matthijs van der Wel 2769 From: Robert G. Ferrell Date: Tue Mar 20, 2001 10:44am Subject: Re: Two Eskimos... >Ouch, ouch, ouch . . . There are (highly civilized) places in the world where this post would be grounds for divorce, and possibly even for criminal proceedings... ;-) RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2770 From: Jay Coote Date: Tue Mar 20, 2001 0:15pm Subject: Finding Vehicle Trackers? I'd like to hear your experiences in finding and removing vehicle tracking systems. I'm aware of VHF and UHF pulsed, CW or MCW transmitters, doppler RDF sets and the 900 MHz Teletrac stuff. Are there any other trends I should be concerned about? I would think that if GPS is used, the 1540 MHz GPS antenna would have to be above the dash or rear window ledge, or diplexed in with the cellular antenna? With not much time or access to the vehicle the tracker and antenna will be under a fender, wheel-well, etc. But, with "a little more time", where would a teletrac or other tracker be hidden? The client believes that screws in the driver and passenger door panels have been turned, and there is a "new noise" under the dash. I tend to believe this client. Comments? Jay Coote Los Angeles 2771 From: Miguel Puchol Date: Tue Mar 20, 2001 1:54pm Subject: RE: Finding Vehicle Trackers? Jay, As part of our bussiness, we manufacture vehicle tracking systems, for legitimate users only (security, transport, jewlers, etc), and have some experience with this. For those who may ask, we don't even answer requests from spy-shops & the like... First of all, we now have GPS receivers, that integrate receiver and antenna into a small package (see www.sanav.com), that are capable of receiving signals through a car's metallic roof. We even had one under the copilot's seat, still getting a good fix. This means that unlike with 'normal' GPS receivers, where the antenna had to have an unrestricted view of the sky, one can now hide a receiver almost anywhere. With conventional systems, good hiding places for the antenna are plastic bumpers, under the dashboard, under the rear tray, sometimes between the lining and the plastic base. Same goes for the TX antenna, although the car's Band II FM antenna has been used in some systems. Also take off the roof lining, sometimes the devices can be attached to the metal beams inside, and if they are thin, go unnoticed. Besides this, look for emanations on the usual bands, I know where I would look here across the pond (GSM, ETACS & some VHF/UHF common bug freqs). A good physical search will do a lot of good also, between the RF and physical check you'll fish out 90% of the bugs. Passive systems, that activate only with certain events, can also be found using techniques described in posts a few days back. Hope this helps, all the best, Mike > -----Mensaje original----- > De: Jay Coote [mailto:TSCM@j...] > Enviado el: lunes, 01 de enero de 1601 1:00 > Para: TSCM-L@yahoogroups.com > Asunto: [TSCM-L] Finding Vehicle Trackers? > > > I'd like to hear your experiences in finding and removing vehicle > tracking systems. > I'm aware of VHF and UHF pulsed, CW or MCW transmitters, doppler > RDF sets and the > 900 MHz Teletrac stuff. Are there any other trends I should be > concerned about? > > I would think that if GPS is used, the 1540 MHz GPS antenna would have to > be above the dash or rear window ledge, or diplexed in with the > cellular antenna? > > With not much time or access to the vehicle the tracker and antenna will > be under a fender, wheel-well, etc. > But, with "a little more time", where would a teletrac or other > tracker be hidden? > > The client believes that screws in the driver and passenger door > panels have been > turned, and there is a "new noise" under the dash. I tend to > believe this client. > > Comments? > Jay Coote > Los Angeles > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 2772 From: Miguel Puchol Date: Tue Mar 20, 2001 4:15pm Subject: RE: Finding Vehicle Trackers? Marcel, It basically sends de contents of the RMC sentence. Optionally, it can send DGPS fix data (with DGPS receiver, such as a RASANT module), EPE, and other SV data that is available from the NMEA sentences. It's just a matter of volume of information, the more you want to send out, the better you have to take care of your communications. Another option is data compression, where a position fix, vel & hdg can be sent in 8 bytes - this was done for a system via Orbcomm, where you pay-per-byte. :-) Basically, 3 sats are needed to get a fix, although not a good one. My experience is that now, with SA off, with 5 SVs you can have an error better than 10m (some 30') 95% of the time - so DGPS is not really necessary. Cheers, Mike > -----Mensaje original----- > De: Marcelrf [mailto:Marcelrf@b...] > Enviado el: martes, 20 de marzo de 2001 21:11 > Para: Miguel Puchol > CC: TSCM-L@yahoogroups.com > Asunto: Re: [TSCM-L] Finding Vehicle Trackers? > > > Miguel, > > Does your system use DGPS? How many Sats do you need for a lock. > Does the system > report "Figure of Merit"? > 2773 From: Jay Coote Date: Tue Mar 20, 2001 5:13pm Subject: Vehicle Tracker Sweep & Physical - Con't. List; Thanks for the comments on vehicle tracking equipment et al. One of the vehicles I will sweep is a 1991 Nissan NX 1600, and information on hidey-holes in that model would be appreciated. Great brains to pick on this list - thanks, Jay Coote 2774 From: Marcelrf Date: Tue Mar 20, 2001 2:11pm Subject: Re: Finding Vehicle Trackers? Miguel, Does your system use DGPS? How many Sats do you need for a lock. Does the system report "Figure of Merit"? Miguel Puchol wrote: > Jay, > > As part of our bussiness, we manufacture vehicle tracking systems, for > legitimate users only (security, transport, jewlers, etc), and have some > experience with this. For those who may ask, we don't even answer requests > from spy-shops & the like... > > First of all, we now have GPS receivers, that integrate receiver and antenna > into a small package (see www.sanav.com), that are capable of receiving > signals through a car's metallic roof. We even had one under the copilot's > seat, still getting a good fix. This means that unlike with 'normal' GPS > receivers, where the antenna had to have an unrestricted view of the sky, > one can now hide a receiver almost anywhere. > > With conventional systems, good hiding places for the antenna are plastic > bumpers, under the dashboard, under the rear tray, sometimes between the > lining and the plastic base. Same goes for the TX antenna, although the > car's Band II FM antenna has been used in some systems. Also take off the > roof lining, sometimes the devices can be attached to the metal beams > inside, and if they are thin, go unnoticed. > > Besides this, look for emanations on the usual bands, I know where I would > look here across the pond (GSM, ETACS & some VHF/UHF common bug freqs). A > good physical search will do a lot of good also, between the RF and physical > check you'll fish out 90% of the bugs. Passive systems, that activate only > with certain events, can also be found using techniques described in posts a > few days back. > > Hope this helps, all the best, > > Mike > > > -----Mensaje original----- > > De: Jay Coote [mailto:TSCM@j...] > > Enviado el: lunes, 01 de enero de 1601 1:00 > > Para: TSCM-L@yahoogroups.com > > Asunto: [TSCM-L] Finding Vehicle Trackers? > > > > > > I'd like to hear your experiences in finding and removing vehicle > > tracking systems. > > I'm aware of VHF and UHF pulsed, CW or MCW transmitters, doppler > > RDF sets and the > > 900 MHz Teletrac stuff. Are there any other trends I should be > > concerned about? > > > > I would think that if GPS is used, the 1540 MHz GPS antenna would have to > > be above the dash or rear window ledge, or diplexed in with the > > cellular antenna? > > > > With not much time or access to the vehicle the tracker and antenna will > > be under a fender, wheel-well, etc. > > But, with "a little more time", where would a teletrac or other > > tracker be hidden? > > > > The client believes that screws in the driver and passenger door > > panels have been > > turned, and there is a "new noise" under the dash. I tend to > > believe this client. > > > > Comments? > > Jay Coote > > Los Angeles > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 2775 From: Guy Urbina Date: Tue Mar 20, 2001 6:15pm Subject: computer controlled TSCM equipment Hello list, I've been toying with this idea in my head for a couple of weeks and wanted to throw it out to you guys. I know a good portion of you all use computer controlled instrumentation in your sweeps. I want to get a feel of what you would really like to see in computer controlled instrumentation from a TSCM perspective. 1.) What instruments would you like to see have computer control that don't have it now? 2.) What improvements would you like to see in the current control interfaces that you now use? 3.) What interfaces do you prefer? (i.e. RS232, GPIB, 10BT ethernet...) The reason I'm asking is that I am very proficient in National Instrument's LABview programming language and I think it's time to design some VI's (Virtual Instruments) specifically for TSCM. It basically is a graphical language specifically made for instrumentation. It has a unique GUI with a plethora of features. You can see it at www.ni.com if you so choose. First, I want to gauge the interest level in such an endeavor. I know many of you use spectrum analyzers and OSCORS, I'm challenged to improve on those current interfaces. let me know what you all think. best regards, -Guy P.S. (don't let my domain name fool you! yes, I'm an engineer for SI, but I also perform GPS, security R&D consulting after work. :) 2776 From: Miguel Puchol Date: Wed Mar 21, 2001 2:26am Subject: RE: Vehicle Tracker Sweep & Physical - Con't. Jay, Don't know much about this model, does it have an EU equivalent? If not self-powered (own battery) you can look for abnormal wires coming out of the battery, or other susceptible places, like the fuse block, ignition key lines, etc. Good luck, Mike > -----Mensaje original----- > De: Jay Coote [mailto:TSCM@j...] > Enviado el: lunes, 01 de enero de 1601 1:00 > Para: tscm-l@yahoogroups.com > Asunto: [TSCM-L] Vehicle Tracker Sweep & Physical - Con't. > > > List; > Thanks for the comments on vehicle tracking equipment et al. > One of the vehicles I will sweep is a 1991 Nissan NX 1600, > and information on hidey-holes in that model would be appreciated. > Great brains to pick on this list - thanks, > Jay Coote > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 2777 From: James M. Atkinson, Comm-Eng Date: Wed Mar 21, 2001 7:32am Subject: Re: computer controlled TSCM equipment At 4:15 PM -0800 3/20/01, Guy Urbina wrote: >Hello list, > >I've been toying with this idea in my head for a couple of weeks and wanted >to throw it out to you guys. > >I know a good portion of you all use computer controlled instrumentation in >your sweeps. I want to get a feel of what you would really like to see in >computer controlled instrumentation from a TSCM perspective. > > >1.) What instruments would you like to see have computer control that don't >have it now? > >2.) What improvements would you like to see in the current control >interfaces that you now use? > >3.) What interfaces do you prefer? (i.e. RS232, GPIB, 10BT ethernet...) > >The reason I'm asking is that I am very proficient in National Instrument's >LABview programming language and I think it's time to design some VI's >(Virtual Instruments) specifically for TSCM. It basically is a graphical >language specifically made for instrumentation. It has a unique GUI with a >plethora of features. You can see it at www.ni.com if you so choose. > >First, I want to gauge the interest level in such an endeavor. > >I know many of you use spectrum analyzers and OSCORS, I'm challenged to >improve on those current interfaces. > >let me know what you all think. > >best regards, > >-Guy > >P.S. (don't let my domain name fool you! yes, I'm an engineer for SI, but >I also perform GPS, security R&D consulting after work. :) A very high quality computer based PORTABLE digital Xray system with sub millimeter resolution. Density of material would be displayed in color shades. All control interfaces should be either firewire and/or USB System should be able to overlay import pictures from other imaging devices (such as a thermal camera, or similar imaging devices.. Instead of offering just a flat imaging plate also offer a curved one to that when shooting things like door knobs you can get a 3D image. Allow the system to import previous X-rays and digitally subtract out "what was their last time". ...and for a second product line. A very high quality rigid bore scope 3-5 mm OD with a hard mounted CCD professional grade video camera mounted in the tip, and capabilities for an external monitor. Also, a series of digital inspection devices (camera modules) that can be attached to fiberglass poles for physical inspections. The big issue is that they have to use some very high definition color CCD cameras, AND be supply to supply their own light. ...for a third suggestion. Very high resolution thermal imaging device suitable for using viewing normal room surfaces, with resolution of 32 bits, using Stirling micro cooler is OK, as is Argon, but try to avoid if at all possible. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2778 From: James M. Atkinson, Comm-Eng Date: Wed Mar 21, 2001 7:58am Subject: Re: Finding Vehicle Trackers? At 1:17 PM -0500 3/20/01, Jay Coote wrote: >I'd like to hear your experiences in finding and removing vehicle >tracking systems. >I'm aware of VHF and UHF pulsed, CW or MCW transmitters, doppler RDF >sets and the >900 MHz Teletrac stuff. Are there any other trends I should be >concerned about? > >I would think that if GPS is used, the 1540 MHz GPS antenna would have to >be above the dash or rear window ledge, or diplexed in with the >cellular antenna? > >With not much time or access to the vehicle the tracker and antenna will >be under a fender, wheel-well, etc. >But, with "a little more time", where would a teletrac or other >tracker be hidden? > >The client believes that screws in the driver and passenger door >panels have been >turned, and there is a "new noise" under the dash. I tend to >believe this client. > >Comments? >Jay Coote >Los Angeles In addition to spectrum analyzers, digital voltmeters, and all of your normal TSCM equipment you will need some other additional equipment. IMHO, the most important (additional) tools you can use for a vehicle sweep is a thick blanket (to lay on), a box of heavy duty surgical gloves (to help keep your hands clean and un cut), a really strong Xeneon flashlight with 8 hours of batteries (so you can see what your doing), several small hand held mirrors, digital camera, non conductive spike, and so on. I also like to bring along an oversize reflective tarp (space blanket) to park the vehicle on, and provide me with a good ground plane. I have also found it helpful to have a large CLEAR plastic trash bag handy, and several one gallon zip lock baggies for all the little treasures you find under and behind the seats. Ideally the vehicle exterior physical inspection (under the car) will take about 90 minutes, wheel wells 15 minutes each, trunk 30-45 minutes, rear deck 15-20 minutes, head liner 10-15 minutes, support columns 10 minutes, each seating position 15-30 minutes each, and the under dash area at least an hour. The engine compartment will vary but generally takes at lest an hour. If you really hustle you can clear a vehicle in under 4 hours, but your really going to have to be moving. Personally I prefer to start underneath the vehicle on the driver side and work my way around clockwise. Then I make a second pass and inspect every thing up to the axle line, and a third pass for everything below the top of the wheel wells (and external to the vehicle). Then everything external to the vehicle up to the height of the tops of the headlights and tail light, and so on. I do not enter the vehicle until the external inspection is complete so as to keep the inspection as non-alerting as possible. As the inspection moves into the interior of the vehicle the trunk area is checked first, then the rear deck, and the backs of the rear seats. Then I move into the passenger compartment (starting with the rear seats, and migrate towards the front). Once the passengers seats have been cleared I move to the dash, and then into the engine compartments. All vehicle body cavities are checked for a second time, and anything even remotely usable an an antenna is evaluated. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2779 From: Steve Uhrig Date: Wed Mar 21, 2001 9:23am Subject: Complete RF sweep kit available Hello list dudes and dudettes, I have for sale some decent RF sweep gear. Anyone getting started, or needing a spare kit, would do well with this. Most seasoned TSCMers don't have an RF kit this nice. The key piece is an Avcom PSA-65B (spectrum analyzer) upgraded to 65C specs by Marty Kaiser. Unit has the following factory options: +FM demodulator +10 kc bandwidth resolution filter +AM demodulator +RFP-24 preamp (the better one) +Downconverter to extend upper range to 2.5 gigs +DC power cord +Telescoping whip antenna, 90 degrees, with BNC. +Padded carrying case with pouch +Plastic lid which protects front panel while shipping +All AVCOM manuals In addition, this unit has a number of Marty Kaiser mods to improve its effectiveness in TSCM and to allow use of certain TSCM-specific accessories: +Subcarrier detection mod +Video transmission recovery mod +Front panel aux jack for these accessories and interfacing others. Provides +12VDC for accessories so you don't have to use separate power supplies. Nice when in the field. This piece is in superb condition and probably unused when it came to me. I ran it only long enough to check all functions and verify operation against my IFR. The Avcom is more sensitive than my $15,000 IFR service monitor. (I don't use or recommend a service monitor for sweeping; it is just a lab piece I use as a reference. A service monitor is a piece of test equipment generally used for repairing two way radio equipment). This kit also includes some Kaiser accessories intended to work with the modified Avcom: +SCD-5 subcarrier receiver. This can be used standalone. Tunable to let you listen to any subcarriers riding on a primary signal. Not possible to listen without this, although you can see the subcarrier. Same unit is used to read subcarriers on power or telco lines. Can use with other receivers. +Kaiser matrix switch. Lets you switch between SCD-5 and headphones without having to plug and unplug jacks. Use when switching from carrier to subcarrier mode. Convenient and elegant. +VLF converter to let you tune from 10kc to 500 kc. You monitor, tune and view through the Avcom. Use for RF or power line subcarrier. +Miniature TV about the size of a cigar box, used as a video monitor for the video demodulator. Very nice little unit tunes VHF and UHF broadcast channels as well as AM and FM broadcast. Can be a sound source also while sweeping. +Kaiser RAS 515 Raster Analysis Display box. Connects to any oscilloscope having a Z axis input and lets you monitor any form of video transmission. Also monitors "radiation from computers". All parameters are tunable making this an extremely versatile unit. If there is anything usable for sniffing stuff radiating from computer screens, this is it. This is a *very* rare unit. Packed in a separate small Pelican case. As a side observation, if anything would be capable of intercepting radiation from computers or video screens along the lines of what Tempest tries to prevent, this is the piece. All the above is in superb condition and will be sold as a lot. If you need a complete RF kit, here it is. Good kit for a beginner or spare for a professional, and one you would not outgrow for a long time, if ever. Also a good backup set or one to leave in a particular country where you sweep a lot so you don't have to deal with the expense and hassles of carrying equipment all over the world. Fairly priced for what this is, and it is all assembled and integrated in one place. You don't have to run all over, buy a bunch of boxes and make them all work together and find the right cables and adapters. It's all here, and all done by a professional (Marty Kaiser). And no long delivery times. Can ship this package overnight if an emergency. The current cost of all this according to the respective catalogs, is $9300. I will let this set go for $7500 plus freight. I will ship anywhere in the world and can take credit cards for payment. Anyone wanting to get into sweeping would be very well equipped with this package. The work is already done in selecting the appropriate and compatible equipment, and you are buying from a known and experienced sweeper, not a spy shop or an unknown somewhere. See the above at the following websites: http://www.avcomofva.com http://www.martykaiser.com See my used equipment page for more TSCM, surveillance, commo and electronic gear: http://www.swssec.com/used.html Also Minox submini "spy" cameras at: http://www.swssec.com/minox.html Questions certainly welcome. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2780 From: Rob Muessel Date: Wed Mar 21, 2001 3:06pm Subject: Something from the Archives I thought that the members of the list might like to take a look at a news report of the bugging of a sales meeting in 1941. It's on my website. http://tscmtech.com/Hints_sugestions.htm Click on the pdf file. -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 2781 From: Charles Patterson Date: Wed Mar 21, 2001 7:41pm Subject: AR3000a software Can someone recommend good software to be used with the AR3000a receiver? I've been looking at a couple of demos but would like to know if anyone has found one particularly useful for our work. thanks charles Charles Patterson charles@t... Global Communications Tarrytown, NY www.telephonesecurity.com www.avtele.com 2782 From: Date: Wed Mar 21, 2001 5:16pm Subject: U.S. expelling nearly 50 Russian officials U.S. expelling nearly 50 Russian officials By Tabassum Zakaria WASHINGTON, March 21 (Reuters) - The United States is expelling about 50 Russian diplomats suspected of being intelligence officers, partly in retaliation for the case of FBI agent Robert Hanssen accused of spying for Moscow over 15 years, a U.S. official said on Wednesday. It would be the biggest expulsion of suspected spies since "Operation Famish" in 1986 when President Ronald Reagan ordered 80 Soviet diplomats out of the country. The United States on Wednesday declared about six Russian officials persona non grata for alleged spying activities, which usually means they must leave the country immediately, the official told Reuters on condition of anonymity. That group, which included two Russians who had already left the United States, was being expelled in retaliation for Hanssen who was arrested Feb. 18 and accused of selling secrets to Moscow for $1.4 million in money and diamonds. The United States also is asking about 40 other Russian officials suspected of being intelligence officers to leave in response to concerns that Russia has had too many spies in the United States for some time, the official said. The United States suspects Russia has hundreds of intelligence officers operating in this country. CBS News, which first reported the expulsions, said no deadline had been set for the Russians to leave and some could remain in this country for a few more months. Secretary of State Colin Powell summoned the Russian ambassador on Wednesday to notify him of the expulsions, CBS said. "We have nothing to say on this topic," State Department spokesman Philip Reeker said. "I cannot confirm if the report is accurate or inaccurate," a White House spokeswoman said. A CIA spokesman would not comment. There was no immediate comment from the Russian Embassy, and Russian Foreign Ministry officials in Moscow were not available for comment in the middle of the night there. Hanssen was arrested after allegedly leaving classified material in a garbage bag at a drop site in a suburban Virginia park. The FBI waited to see who would pick it up, but no one ever did. Hanssen, who plans to plead not guilty, is accused of selling secrets including names of double agents and U.S. electronic surveillance methods. U.S. officials say the revelations severely damaged national security. The former FBI agent is suspected of compromising an eavesdropping tunnel dug by U.S. authorities under the Russian embassy in Washington, some officials have said. While the Cold War ended a decade ago, espionage activities by the United States and Russia against each other have not ceased. The U.S. government has been trying to get Russia to lower the number of intelligence officers operating in the United States for some time, but the requests have generally been ignored, U.S. officials said. In the last public expulsions involving the two countries, the United States in December 1999 expelled a Russian diplomat, Stanislav Gusev, after he was caught outside the State Department allegedly monitoring a listening device hidden in a conference room inside the building. Russia responded shortly afterward by expelling a U.S. diplomat, Cheri Leberknight, saying she was caught red-handed with an array of spy gadgets. 22:05 03-21-01 2783 From: A Grudko Date: Thu Mar 22, 2001 6:12am Subject: Re: computer controlled TSCM equipment ----- Original Message ----- > At 4:15 PM -0800 3/20/01, Guy Urbina wrote: > >I know a good portion of you all use computer controlled instrumentation in > >your sweeps. I want to get a feel of what you would really like to see in > >computer controlled instrumentation from a TSCM perspective. > >1.) What instruments would you like to see have computer control that don't > >have it now? There is a great deal of RF detection equipment, but telephone lines, especially analogue lines, can take a great deal of careful measuring and physical searching to be fairly confident that a line is 'clean' - in fact my standard report points out that we don't think an external line can ever be declared 100% 'clean'. My 'perfect' Telephone Line Analyser would combine: TDR On and off hook DC voltage: 0 - 99 to 3 decimal places On and off hook current in milliamps: 0 - 99 to 2 decimal places Capacitance (manual - would require disconnection at exchange) Optional DTMF tone sequencer - 16 to the power of 4 typical (@ 10 pulses per sec. would need 109 minutes - ouch) Audio sweep: sine wave 50 Hz - 40 KHz. A square wave/sawtooth generator might would be faster (richer in harmonics) but less reliable Pulse/DTMF (Including A-D control tones) dialling Hi/Mid/Low impedance audio coupling Self test/calibration A standard test sequence Data base of line/equipment/instrument/accessory electronic characteristics ('signatures') Intelligent interrogation of electronic characteristics with recommendations Full memory of previous tests Common OS/software reporting such as Excel On the hardware side: 3.5" disc writer Selectable Multi cable combining 120/240 Mains/battery/external DC power High impedance coupling socket to TSCM RX. Sturdy all weather design (may be used in the field for pole/distribution box checks) Multi-standard plugs/sockets/adaptors 7 mtr cable extensions (you don't want to take this baby UP the phone pole. Digitals? - we just search very carefully. So come on guys, what have I missed on the perfect TLA? Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2784 From: James M. Atkinson, Comm-Eng Date: Thu Mar 22, 2001 10:09am Subject: Re: computer controlled TSCM equipment Andy, You have a good point, so let's bounce it around the list for discussion. At 2:12 PM +0200 3/22/01, A Grudko wrote: >----- Original Message ----- >> At 4:15 PM -0800 3/20/01, Guy Urbina wrote: >> >I know a good portion of you all use computer controlled instrumentation >in >> >your sweeps. I want to get a feel of what you would really like to see in >> >computer controlled instrumentation from a TSCM perspective. >> >1.) What instruments would you like to see have computer control that >don't >> >have it now? > >There is a great deal of RF detection equipment, but telephone lines, >especially analogue lines, can take a great deal of careful measuring and >physical searching to be fairly confident that a line is 'clean' - in fact >my standard report points out that we don't think an external line can ever >be declared 100% 'clean'. It's not just telephone lines, but also; power lines, Cable TV, alarm lines, and so on.... More specifically you should consider these to be "Conducted Signal Paths" , and each of them must be checked in detail for any threats. Conducted Signal Paths are a really serious eavesdropping threat, and the phone lines are just one vulnerability. >My 'perfect' Telephone Line Analyser would combine: > >TDR The TDR needs to be able to "shoot" two or more pair at time, with a four pair being ideal. >On and off hook DC voltage: 0 - 99 to 3 decimal places Good >On and off hook current in milliamps: 0 - 99 to 2 decimal places Also good >Capacitance (manual - would require disconnection at exchange) You also need a Giga-ohm insulation test >Optional DTMF tone sequencer - 16 to the power of 4 typical (@ 10 pulses >per sec. would need 109 minutes - ouch) Maybe, but instead of trying to trigger the device why not just hunt for the intrusion and related impact on the lines electronic signature. >Audio sweep: sine wave 50 Hz - 40 KHz. A square wave/sawtooth generator >might would be faster (richer in harmonics) but less reliable The audio needs to be extremely stable, and as spectrally pure as possible. The user should be able to spin a knob to adjust the frequency, but also be able to punch it in on a keyboard. Resolution should be to two decimal places. Upper coverage should be to 500 kHz, and should have the ability to phase lock with the line frequency, and have the ability to delay or decay a tone bursts to certain positions on the line freq. >Pulse/DTMF (Including A-D control tones) dialling DTMF and MF tones as well, plus all of the industry standard test tone sequences and signalling. (this works out to be about 64 tone combinations, with 4-5 timing variations each). >Hi/Mid/Low impedance audio coupling Hmmm.... this is a tough one.... How about adding two different adjustable inputs as well? One for impedances below 900 ohms, the second 900-3000 ohms, and the rest fixed impedances . But what about coupling into the AC mains? they generally run 10-20 ohms, while the phone lines are much higher? >Self test/calibration With the capability to print a hard copy report (on a real printer, not one of those crappy little adding machine tapes). >A standard test sequence An AUTOMATED sequence for testing where you connect the leads, push the bottom, and read the hardcopy report for interpretation. >Data base of line/equipment/instrument/accessory electronic characteristics >('signatures') This is a VERY dangerous thing to do, instead have the instrument flag :"anomalies" and let the TSCM'er decide if they are hostile or not. >Intelligent interrogation of electronic characteristics with recommendations ... be still my beating heart ... >Full memory of previous tests Yes, but with the ability to compensate for environmental variations (temp, humidity, and barometric pressure). and the instrument should have a sensor for these built into the test set, and should be able to automatically compensate, or allow the user to plug their own numbers in. >Common OS/software reporting such as Excel Agree'd, and I would lean towards a simple SLYK or CSV format. >On the hardware side: >3.5" disc writer Nope... give the instrument a USB port as the control that way you can control it with a laptop. One of the big problems with the OSCOR, Scanlock, and other similar products is the way the build in controller limits the functions and thus prohibits development of controlling software and/or functions to make the unit more helpful.... just present a USB port and give the user a library of drivers so they can make it dance. For the non-technical folks they can offer a turn-key piece of software instead of a library. >Selectable Multi cable combining Please explain >120/240 Mains/battery/external DC power Agreed, and let's give it enough battery to carry it though a 12 hour day. ... and please, please, please STOP using Gell batteries in TSCM gear as they do some really ugly things to other equipment that contain NiCad cells. Instead develop the batteries to be NiMH, or Lithium Ion with a fast charge function. Also, make the power pack removable... and allow them to be recharged independent of the instrument. >High impedance coupling socket to TSCM RX. Yes, but add a transient limiter and band rejection filters to keep the unit from saturating other instruments (ie: feed the power lines into the input of a spectrum analyzer) >Sturdy all weather design (may be used in the field for pole/distribution >box checks) A small Pelican case is good (something about 13*21*9 or so) >Multi-standard plugs/sockets/adaptors Should be usable anywhere in the world without having to cobble together special cords. >7 mtr cable extensions (you don't want to take this baby UP the phone pole. Good point, but at times you may not have a choice Ah, how about this... give the system a removable (and intelligent) line adapter that can be attached right at the access point, and that can be controlled at a distance. ...or to take it one step further allow the remote to be controlled from down the line being tested. >Digitals? - we just search very carefully. The digital signal was to travel in the analog domain, and as such it provides us with a series of analog signals we can measure. Also, the unit must be able to split out the timing for any digital signal and allow examination of each channel (or at least have a jack for an external datacom instrument) >So come on guys, what have I missed on the perfect TLA? Sadly, there is minimal demand for them, plus doing phone line and power line tests are not sexy so many TSCM'ers skip them or do only a token check. >Andy Grudko. D.P.M., Grad I.S, (S.A.) [snip] -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2785 From: Craig Snedden Date: Thu Mar 22, 2001 9:24am Subject: Re: computer controlled TSCM equipment ----- Original Message ----- From: "A Grudko" To: Sent: Thursday, March 22, 2001 12:12 PM Subject: Re: [TSCM-L] computer controlled TSCM equipment > > So come on guys, what have I missed on the perfect TLA? > A nice cheap price and someone to work it for you while you rake in the dough! :-) Craig The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 2786 From: Robert G. Ferrell Date: Thu Mar 22, 2001 11:26am Subject: Re: computer controlled TSCM equipment >>> >your sweeps. I want to get a feel of what you would really like to see in >>> >computer controlled instrumentation from a TSCM perspective. As an aside to this thread, let me state that I'm a pretty decent control systems programmer; if anyone has serious plans to produce such an automated computer-controlled tool, I'd be happy to help with control and user interface development. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2787 From: A Grudko Date: Thu Mar 22, 2001 1:10pm Subject: Re: computer controlled TSCM equipment ----- Original Message ----- From: James M. Atkinson, Comm-Eng > > >Selectable Multi cable combining > Please explain Just about every 'phone we encounter these days uses 2 wires. Wax on, wax off; data in, data off. So why are there 4 conductors? A decade (or was it millenium) ago many local PBX (Private Branch Exchange) extensions/lines used 4 - 16 (really old mechanical pushbutton phones - like 20 years back!!) cables to connect to the PABX (Private Automatic Branch Exchange) or line. Don't laugh, but when I arrived in Africa in 1979 we still had many manual exchanges operated by 2 pin 8mm plugs hand pluged by an operator with a headset linking calls locally and to the outside world. We even had a TV soap opera, based on the goossipy interception of calls, called 'Nommer Assebleif' (apologies for local spelling errors) meaning 'Number Please'. In my early '80's TLAs we built in two 10 way wafer switches and a heck of a lot of croc clip terminated cables. Seriesed in were 1.5 v and 9 v switchable supplies with reversable polarity (to drive EC Mikes). Testing all combinations of 5 pairs called for 10 x 10 x 3 (300) manual cable tests. Clients bitched that we were wasting time (their money...). Even today, most phones have 4 pin connectors, but only use 2. Why? Spares just in case. What more could a spy ask for. Sidetone. Sidetone? Every phone - even digital - has sidetone - it's that squirt of your mike audio that joins the other person's audio at the earpiece and makes the handset earpiece sound 'natural'. So the earpierce carries both sides of the conversation. The buggist plucks this up at the PCB connector in the instrument and sends it down the 2 unused cables that the manufacturer has kindly supplied as 'spares'. From there the buggist's imagination rules as to how he gets the audio out of the building. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2788 From: James M. Atkinson, Comm-Eng Date: Thu Mar 22, 2001 2:20pm Subject: Pet Medication Instructions CAT: 1) Pick cat up and cradle it in the crook of your left arm as if holding a baby. Position right forefinger and thumb on either side of cat's mouth and gently apply pressure to cheeks while holding pill in right hand. As the cat opens mouth pop pill into mouth. Allow cat to close mouth and swallow. 2) Retrieve pill from floor and cat from behind sofa. Cradle Cradle cat in left arm and repeat process. 3) Retrieve cat from bedroom, and throw soggy pill away. 4) Take new pill from foil wrap, cradle cat in left arm holding rear paws tightly with left hand. Force jaws open and push pill to back of mouth with right forefinger. Hold mouth shut for a count of ten. 5) Retrieve pill from goldfish bowl and cat from top of wardrobe. Call spouse in from garden. 6) Kneel on floor with cat wedged firmly between knees, hold front and rear paws. Ignore low growls emitted by cat. Get spouse to hold head firmly with one hand while forcing wooden ruler into mouth. Drop pill down ruler and vigorously rub cat's throat. 7) Retrieve cat from curtain rail, get another pill from foil wrap. Make a note to buy new ruler and repair curtains. Carefully sweep shattered figurines and vases from hearth and set to one side for gluing later. 8) Wrap cat in large towel and get spouse to lie on cat with head just visible from below armpit. Put pill in end of drinking straw, force mouth open with pencil and blow down drinking straw. 9) Check label to make sure pill is not harmful to humans, drink 1 beer to take taste away. Apply Band-Aid to spouse's forearm and remove blood from carpet with cold water and soap. 10) Retrieve cat from neighbor's shed. Get another pill. Open another beer. Place cat in cupboard and close door onto neck to leave head showing. Force mouth open with dessert spoon. Flick pill down throat with elastic band. 11) Fetch screwdriver from garage and put cupboard door back on hinges. Drink beer. Fetch bottle of scotch. Pour shot, drink. Apply cold compress to cheek and check records for date of your last tetanus shot. Apply whiskey compress to cheek to disinfect. Toss back another shot. Throw tee-shirt away and fetch new one from bedroom. 12) Call the Fire Department to retrieve the friggin' cat from tree across the street. Apologize to neighbor who crashed into fence while swerving to avoid cat. Take last pill from foil wrap. 13) Tie the little bastard's front paws to rear paws with garden twine and bind tightly to leg of dining room table. Find and put on heavy duty pruning gloves from shed. Push pill into mouth followed by large piece of fillet steak. Be rough about it. Hold head vertically and pour 2 pints of water down throat to wash pill down. 14) Consume remainder of Scotch. Get spouse to drive you to the emergency room, sit quietly while doctor stitches fingers and forearm and removes pill remnants from right eye. Call furniture shop on way home to order new table. 15) Arrange for Humane Society to collect mutant cat from hell and call local pet shop to see if they have any hamsters. DOG: 1) Wrap pill in bacon, cheese or peanut butter. Make him beg. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2789 From: James M. Atkinson, Comm-Eng Date: Thu Mar 22, 2001 8:03pm Subject: Why the Spy Bosses Don't Always Like Spy Purges Why the Spy Bosses Don't Always Like Spy Purges http://www.time.com/time/world/article/0,8599,103455,00.html >From Moscow and Washington, TIME's correspondents explain the latest espionage tit-for-tat BY TONY KARON TIME.com: Presumably the U.S. expulsion of diplomats accused of spying is retaliation for FBI counterintelligence officer Robert Hanssen, who turned out to be a double agent? Elaine Shannon in Washington: The U.S. certainly had to do something about Hanssen's handlers. From a public relations point of view, they had to make clear that we know who you are and this sort of thing won't be tolerated. Beyond Hanssen, though, getting rid of a larger number of Russian agents solves a different kind of problem. The FBI is under severe budget constraints. They have to maintain their number of agents at current levels or even reduce them through attrition. Their resources for surveillance are shrinking. So if you reduce the number of agents who have to be watched, you manage your resources better. An SVR [the Russian counterpart to the CIA] agent may meet an asset or make a dead drop only once every 90 days or so. But you have to watch him all the time, because if you miss him on the 90th day, which happens to have been a Sunday night, you could miss a year's work. So if you're seriously watching someone, you have to have three people on the job, in rotating shifts. Expelling a large number of agents reduces the workload, and better manages the budget. President Bush, of course, also has domestic and geopolitical motives for making a statement that we're not warm and fuzzy with the Russians. It's the most dramatic move against the Russian community in Washington since President Reagan's mass expulsion in the early 1980s. President Bush is the most conservative president since Reagan; he's more conservative than his father. So he may also be out to reassure conservatives that the Bush administration doesn't view Russia as simply another European nation. TIME.com: What's the response in Moscow? Andrew Meier in Moscow: Moscow has responded by promising a tit-for-tat expulsion. Government officials characterized the U.S. decision as a "Cold War" move. Unofficially, though, I spoke to a couple of people in the intelligence community here, who said President Bush was living in a time warp. This hasn't been done since President Reagan did it in the 1980s, and it's being perceived as a crude slap in Russia's face, motivated by the need for damage control over the Hanssen case. Russians are particularly skeptical of the numbers. Some reports are saying that up to 50 officials will be sent home on charges of spying. There's some doubt here over whether that number could seriously have been suspected of espionage ≠ Moscow sees this as hype and grandstanding. The Russians see this as overreaching, and a dangerous early taint on the relation between the two countries. They see it as in keeping with some remarkably hostile comments on Russia recently by senior U.S. officials such as Defense Secretary Rumsfeld. Of course what you have to realize here is that whether in Washington or Moscow, decisions to expel the other side's spies come from the politicians, not the intelligence community. Because when you kick out spies en masse, you have to start from scratch again, in identifying the spies sent to replace those expelled. And if you've managed to recruit any spies on the other side, it's certainly not in your interests to send them home. But if you're doing a mass expulsion, you can't exempt your double agents, for fear of exposing them. So it's unlikely that the intelligence community in Washington chose the expulsion option. It's seen as more of a political move. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2790 From: James M. Atkinson, Comm-Eng Date: Thu Mar 22, 2001 8:35pm Subject: Another Russian "Mole" in U.S. Government Suspected [Moderators Note: There are at least TWO more moles inside the FBI's counterintelligence program... let me repeat TWO moles (they probably be in either DC, NY, and LA). The Soviets have (at least over the past two decades) always applied at least three independent moles into any program that they are interested in. Hanssen may (or may not) have been the first, and may (or may not) have been the most senior, but he is by no means the only one... watch for the sparks to fly again. -jma ] Another Russian "Mole" in U.S. Government Suspected http://www.russiatoday.com/news.php3?id=318171§ion=default WASHINGTON, Mar 22, 2001 -- (Agence France Presse) U.S. intelligence suspects that another Russian "mole" is burrowed within the U.S. government despite last month's arrest of FBI counter-intelligence official Robert Hanssen, the chairman of the House Intelligence Committee said Thursday. Representative Porter Goss, a Republican from Florida, hailed a U.S. decision to send home 50 Russian diplomats, telling reporters the action should be seen as a response to a "an extraordinary, geometric increase" in Russian espionage that had gotten out of hand under the Clinton administration. "This last round is a line in the sand," Goss told reporters at a breakfast here. "The headline today as far as I'm concerned is (Secretary of State) Colin Powell saying, 'Different person, different administration, new line in the sand, clean it up or get out," he told defense reporters at a breakfast here. The action was believed to have been triggered by the discovery of an alleged Russian mole in the FBI, Hanssen, a 25-year agency counter-intelligence veteran who was arrested last month on charges of betraying a wealth of U.S. secrets to Moscow over a 15-year period. Goss, however, said the Central Intelligence Agency, which had been on a mole hunt since the 1994 arrest of CIA official Aldrich Ames on espionage charges, believes another double agent is operating inside the U.S. government besides Hanssen. "I think Hanssen obviously fits a large part of the matrix that was the riddle, but I don't think the matrix is completely solved," he said. Asked whether there was evidence of a third mole, Goss said, "Yes. There are some things that are loose that are hard to explain." Goss, himself a former CIA officer, cautioned reporters against reading the action against Russian diplomats as purely a retaliation for Hanssen, portraying it instead as a long overdue crackdown on Russian espionage activities in the United States. He laid part of the blame on what he said was a breakdown in "security culture" under the previous Democratic administration, citing the disappearance of a laptop with classified materials at the State Department, a bugged chair rail in a State Department conference room, and other recent intelligence embarrassments as symptoms of the problem. But he also attributed the rise to a combination of Russian "paranoia" about U.S. intentions and a reassertion of Russia's view of itself as a world power under Russian President Vladimir Putin, a former KGB officer. The targets of Russian espionage appeared to be focused on acquiring information about U.S. plans and intentions, equipment design and new technologies, rather than covert operations aimed at shaping U.S. public opinion, he said. "I can't tell you how bad the paranoia is over there still," said Goss. "Remember Putin is back, the KGB is back under a new name, new initials. This is the way it is working. That clique of people are dealing the way that clique used to deal." Russian espionage activity began to expand before Putin came to power as factions within the former KGB scrambled to survive by showing their new masters what they were capable of producing, he said. "After Putin came in, I think there was a green light to go ahead because 'these are my guys.' So I think you had two separate motivations that have led to escalation, that are somewhat circumstantial," he said. He said Thursday's move signaled a shift in policy toward Russia by the new administration. "I think you are going to see a much tougher policy on Russia -- not threatening, tougher," he said. ((c) 2001 Agence France Presse) -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2791 From: James M. Atkinson, Comm-Eng Date: Thu Mar 22, 2001 8:40pm Subject: 'Shower spy camera' doctor let off 'Shower spy camera' doctor let off http://www.thisislondon.co.uk/dynamic/news/story.html?in_review_id=373297 A London doctor who was arrested after allegedly putting a spy camera in a shampoo bottle to video nurses showering will not face criminal charges. Dr Michael Shiew, 27, formally resigned as a junior doctor at St George's hospital, Tooting, this month after police found what they said was a spy camera set up to beam pictures to a video recorder in a bedroom at Brighton General Hospital, where he was on a training course. A confiscated video cassette did not show anybody using the shower block. A six-week investigation yielded insufficient evidence to charge him, the Crown Prosecution Service says. The General Medical Council has said it may look at the case if Dr Shiew's alleged actions breached its disciplinary procedures. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From: David Alexander Date: Thu Mar 20, 2003 8:01am Subject: RE: Short and Sweet and ours ! David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire England Office: 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk > -----Original Message----- > From: James M. Atkinson [mailto:jmatk@tscm.com] > Sent: 20 March 2003 12:14 > To: TSCM-L Mailing List > Subject: [TSCM-L] Short and Sweet > > > > Support our Troops. > > -jma > -- > > -------------------------------------------------------------- > ------------------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------- > ------------------------------------ > James M. Atkinson Ph: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com > -------------------------------------------------------------- > ------------------------------------ > Vocatus atque non vocatus deus aderit > -------------------------------------------------------------- > ------------------------------------ > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> > Get 128 Bit SSL Encryption! > http://us.click.yahoo.com/xaxhjB/hdqFAA/xGHJAA/kgFolB/TM > -------------------------------------------------------------- > -------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7054 From: gkeenan Date: Thu Mar 20, 2003 9:12am Subject: Re: Short and Sweet Amen!! Jerry Keenan, PO1, USN, Ret. and wife CPO, USN-R, Ret. And my son from my first marriage, 4 yrs. USN and a dual national of US and UK. Jerry Keenan ----- Original Message ----- From: David Alexander To: TSCM-L@yahoogroups.com Sent: Thursday, March 20, 2003 9:01 AM Subject: RE: [TSCM-L] Short and Sweet and ours ! David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire England Office: 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk > -----Original Message----- > From: James M. Atkinson [mailto:jmatk@tscm.com] > Sent: 20 March 2003 12:14 > To: TSCM-L Mailing List > Subject: [TSCM-L] Short and Sweet > > > > Support our Troops. > > -jma > -- > > -------------------------------------------------------------- > ------------------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------- > ------------------------------------ > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > -------------------------------------------------------------- > ------------------------------------ > Vocatus atque non vocatus deus aderit > -------------------------------------------------------------- > ------------------------------------ > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> > Get 128 Bit SSL Encryption! > http://us.click.yahoo.com/xaxhjB/hdqFAA/xGHJAA/kgFolB/TM > -------------------------------------------------------------- > -------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 7055 From: gkeenan Date: Thu Mar 20, 2003 9:13am Subject: Fw: Short and Sweet Just a P.S. that I forgot to mention - my son (the USN vet) also has two cousins currently serving in the Royal Air Force in the Middle East. 'Jerry ----- Original Message ----- From: gkeenan To: David.Alexander@d... ; TSCM-L@yahoogroups.com Sent: Thursday, March 20, 2003 10:12 AM Subject: Re: [TSCM-L] Short and Sweet Amen!! Jerry Keenan, PO1, USN, Ret. and wife CPO, USN-R, Ret. And my son from my first marriage, 4 yrs. USN and a dual national of US and UK. Jerry Keenan ----- Original Message ----- From: David Alexander To: TSCM-L@yahoogroups.com Sent: Thursday, March 20, 2003 9:01 AM Subject: RE: [TSCM-L] Short and Sweet and ours ! David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire England Office: 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk > -----Original Message----- > From: James M. Atkinson [mailto:jmatk@tscm.com] > Sent: 20 March 2003 12:14 > To: TSCM-L Mailing List > Subject: [TSCM-L] Short and Sweet > > > > Support our Troops. > > -jma > -- > > -------------------------------------------------------------- > ------------------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------- > ------------------------------------ > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > -------------------------------------------------------------- > ------------------------------------ > Vocatus atque non vocatus deus aderit > -------------------------------------------------------------- > ------------------------------------ > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> > Get 128 Bit SSL Encryption! > http://us.click.yahoo.com/xaxhjB/hdqFAA/xGHJAA/kgFolB/TM > -------------------------------------------------------------- > -------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 7056 From: A Grudko Date: Wed Mar 19, 2003 10:39pm Subject: Jamming I hear that the American military are jamming the 3 Iraq Satellite TV channels & transmitting their own programmes - 16ghz 1kw uplink from Kuwait. Could be an urban legend but could also be the reason that the Iraqis appear to have launched short range conventional missiles at Kuwait today. Andy Grudko (British), Grad I.S, South Africa Registered as a security service provider by the Private Security Industry Regulatory Authority, registration number 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 7057 From: Fernando Martins Date: Thu Mar 20, 2003 5:30pm Subject: Re: US keeping on eye on the EU...or rather an ear ----- Original Message ----- From: "Ocean Group - MU TSD" To: "TSCM Group" Sent: Thursday, March 20, 2003 10:57 AM Subject: [TSCM-L] US keeping on eye on the EU...or rather an ear > > > Hmm......wonder who they use for their sweeps? Any ideas? If anyone digs up > the Le Figaro article I would appreciate a copy....... They use the security services of the European Council. For now it seems that they are not quite sure about the source of the bugs, if they are US or not. The portuguese office didn't had that problem, so it seems. People say that the PBX of the Justus Lipsius building have extra ears since the beginning. Those are the only things I can add, from the portuguese news. FM 7058 From: Jeff Moss Date: Fri Mar 21, 2003 0:17am Subject: DEF CON Announcement: CFP, Media now on line! Hello everyone, I would like to make several DEF CON related announcements. The Call For Papers for speaking at DEF CON ELEVEN (or XI, 0x0B, 1.1, 11) is now on-line and in effect. Continuing last year, we will continue to pay speakers. We are also continuing to improve speaker quality. It is no longer enough to have green hair and an attitude. Check it out at: http://www.defcon.org/html/defcon-11/defcon-11-cfp.html The speeches from DEF CON 0a are now on-line with the DEF CON media server. 90% of the talks are encoded with Real Helix and should be at a better resolution than past media. The missing talks are being hunted down now and re-encoded. Only video is currently available, with the audio only encoding to follow. Listen to 60+ talks spanning privacy, wireless, hacking, network defense and more! DEF CON 0a Media: http://www.defcon.org/html/links/defcon-media-archives.html#DEF CON 10 Solicitation for papers, stories, and art: Contrary to rumors on IRC, DEF CON is not starting a publication. What we are doing is expanding the show program to be more of than just a show guide since last year's program with the added articles was such a huge hit. As such we are looking for serious technical articles, relating to the underground scene, privacy, computer security, humor, stories, and art. Go to http://www.defcon.org/html/defcon-11/defcon-11-program.html Thank you, Jeff 7059 From: Steve Uhrig Date: Fri Mar 21, 2003 9:58am Subject: Listen to the war live - R8500 RX FS And I don't mean CNN. If you've wanted a reason to buy a *cellular unblocked* ICOM R8500 receiver, here's another: The R8500 is an excellent HF, VHF and UHF receiver. It covers all the shortwave (HF) bands where worldwide military communications take place. Throw some wire out the window, and it's fairly simple to hear both friendly and hostile military comms from the Middle East, drug cartels in Latin America, NASA operations. Radio Kuwait, shortwave broadcast from small and large countries, propoganda, etc. Also amateur (ham radio) communications frequently called upon in disaster situations to back up government and commercial commo. Few scanners or other receivers cover the HF bands (100kc -- 30 megacycles). You need USB (Upper SideBand) coverage as well as AM. While some traffic is encrypted, most is not. 11.175 is the CB Channel 19 equivalent with military coordination. Hear refueling, missile launches, base to base commo, aircraft to base. This is intended to be a long range channel, and is fairly strong here in Maryland on the East Coast most of the time. Listen for an hour and you'll hear something, as it's happening, with all the stress and professionalism in the voices. I'm constantly turning CNN down to listen when something comes up on 11.175. That's one of many freqs. More can be found here: http://www.milaircomms.com/ghfs.html http://www.milaircomms.com/middle_east_shortwave.html Many others. It's also interesting to listen to the shortwave broadcasts from other countries. You get a whole different slant on world events when seen through the eyes of others. Radio Havana still talks about the U.S. pigs. Lot of propoganda. Still jamming stations. Still U.S. pirate stations just above 7.3 megacycles. It's all there for the effort of tuning. I'm only using a discone on the roof on mine, and it hears reasonably well, plenty enough for SWLing (Short Wave Listening). With an ICOM R8500, not only do you get a very decent HF radio which can monitor all HF frequencies, you get a full coverage VHF and UHF radio which does not have the critical cellular frequencies blocked. While listening to cell is blah, eavesdroppers have taken advantage of the inability of most receivers to cover this area around 800-900 megacycles. The receiver covers ALL frequencies from 0.1 to 2000 megacycles. Go here for full specs and a photo of the R8500: http://www.icomamerica.com/receivers/tabletop/icr8500.html Also a photo. The receiver can serve many purposes. You can use it for SWLing, as a demodulator for your spectrum analyzer, as a manual sweep receiver, as a VHF/UHF public safety scanner, to listen to the audio portion of broadcast television stations, data and 43X and 900 megacycle transmissions -- ANYTHING within the frequency range. Some exotic modes can be covered by using optional decoders. The R8500 is significantly more sensitive than most sweep equipment. It's designed to hear signals from all over the world, not just in the room. Once your TSCM gear identifies a signal, disassemble it with the R8500 and see for sure what it is. Unblocked (full coverage) receivers are restricted sale to government agencies only. TSCM practitioners do not qualify to purchase this necessary piece of equipment. The pieces I have are slightly used, generally one weekend only in a government listening post, then taken in by me on trade, alignment completely checked from antenna to speaker, and we improve on factory specs by a noticeable amount. The factory assembly robot tunes close enough to meet spec. We go through manually and tune for best performance, which almost always is significantly better than spec. You'll appreciate the difference. The receiver is powered by 110VAC or 12VDC. 220 VAC available on request. Price for these restricted recievers, legal to sell as used items is $1850. A versatile, rugged, capable receiver with many applications for anyone involved in surveillance, communications or security. This receiver is a standard in surveillance vans, and most TSCM teams will have this or an older model to tune in signals identified with the TSCM equipment. 25 years ago, all sweeping was manual and was done with Mason receivers which were not as capable as this thing. Optional video demodulators, spectrum monitor readouts, speech synthesizers, software, etc. are available from various vendors if you have a special application. Can take credit cards and ship internationally. Something to do with your tax return. A basic tool in any sweep kit that doesn't just sit there between sweeps. As a special, any receiver ordered referencing this email before the end of March will be shipped free in the U.S. via priority mail. Save about fifty bucks in freight and insurance and get it while all the interesting listening is there for the effort of hooking the thing up and tuning. Supply of these unblocked receivers is *very* limited as they are restricted sale to government only. Discone antennas also available which are a perfect match for this receiver, and what I use here at the office as well as in the field. $125 includes a reusable shipping tube. Antenna assembles and disassembles in a minute or two. Ask on this list for references. Holler if any questions. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7060 From: Rick Hofmann - MICROSEARCH Date: Fri Mar 21, 2003 10:13pm Subject: R8500 receivers from SWS Security I bought an Icom R8500 from Steve Uhrig two or three years ago. When it arrived I thought he had made a mistake and sent me a new one. It came in the original box with all the original plastic bags, twist ties and foam packing material. I called to tell him he made a mistake, but was advised that it was definitely a used receiver. I have since bought additional used equipment from Steve and it has all arrived in perfect condition. I would not hesitate to recommend buying used equipment from SWS Security. Very truly yours, Rick Hofmann, CCO, CPP, PI16998 MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 http://home.earthlink.net/~microsearch 7061 From: Matt Paulsen Date: Sat Mar 22, 2003 1:50am Subject: RE: Jamming Well, I'll confirm that Iraq TV's official website is hacked http://www.iraqtv.ws - saw it a few days ago.. INA's website was timing out as well back then.. http://www.uruklink.net I think it was being DDoS'd around then, now it's probably rubble. -----Original Message----- From: A Grudko [mailto:agrudko@i...] Sent: Wednesday, March 19, 2003 8:40 PM To: TSCM Group Subject: [TSCM-L] Jamming I hear that the American military are jamming the 3 Iraq Satellite TV channels & transmitting their own programmes - 16ghz 1kw uplink from Kuwait. Could be an urban legend but could also be the reason that the Iraqis appear to have launched short range conventional missiles at Kuwait today. Andy Grudko (British), Grad I.S, South Africa Registered as a security service provider by the Private Security Industry Regulatory Authority, registration number 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7062 From: Graham Lorax Bignell Date: Fri Mar 21, 2003 3:33pm Subject: Delta Force Hacks Saddam "news" of ops. http://www.upi.com/view.cfm?StoryID=20030321-020114-4031r Secret op targeted Saddam By Richard Sale, UPI Intelligence Correspondent Published 3/21/2003 3:32 PM A top-secret U.S. intelligence operation, working in Baghdad weeks before the war, provided the crucial targeting information vital to the attempt to kill Iraqi dictator Saddam Hussein early Thursday, administration officials said. The highly clandestine targeting effort, directed at top Iraq leaders, involved specialized CIA and military teams under command of the CIA, these sources said, speaking on condition of anonymity. A senior, former covert operative of the CIA told United Press International that the "most important" information was obtained by a small group of Delta operatives who infiltrated a fiber optic communication center in Baghdad, compromising its communications. "They were able to triangulate phone calls and determine their point of origin," this source said. Fiberoptic lines are considered one of the most secure forms of telephone communications, according to a former Bell Atlantic official. Delta Forces are part of the Joint Special Operations Command based at Fort Bragg, N.C. Two administration officials with access to sensitive intelligence told UPI that Saddam and his two sons definitely were in one of the three buildings of the compound in a Baghdad suburb when it was flattened by bombs from F-117 fighters and cruise missiles from U.S. ships and submarines early Thursday Iraq time. The attack came after expiration of an ultimatum from U.S. President George W. Bush that Saddam and his sons leave Iraq or face war. "Saddam was in the building when that stuff went off," said one U.S. official. Another U.S. official said: "Within the (intelligence) community there is a general belief that Saddam is still alive, and the rest is wishful thinking." An administration official said it was believed Saddam had suffered damage to one of his inner ears. One former senior U.S. intelligence official said that the administration is examining "highly credible" reports that Saddam's son, Qusay, had been killed in the raid. An administration official acknowledged the report is in "circulation" but said: "We don't know yet if it's accurate." A former senior CIA analyst, who said he also thinks that Qusay is dead, pointed to a quote Saddam made in his broadcast after the attack in which the Iraqi leader said: "This family has sacrificed in this war." The former senior analyst said he believed this was a reference to Qusay's death. "I'm surprised more people haven't picked up on this," he said. Qusay, 37, a low-key personality known by critics as Mr. Snake, was being groomed by Saddam to be his successor, U.S. officials said. In addition to Qusay's death, an administration official said there were "very credible reports" that Izzet al Douri, the red-headed commander of Iraq's Northern Region, had also been killed in the raid. "We have the reports on these people; we don't have an definite answer yet," this official said. Administration officials also said that it was definitely Saddam who appeared Friday in broadcast on Iraqi TV. According to U.S. government officials, the CIA-directed intelligence collection effort was tasked to focus on Iraqi military and residential sites used by the senior leadership for meetings and get-togethers. A congressional staffer told UPI: "We know that certain places in Baghdad were kept under visual surveillance by U.S. intelligence -- both human and technical surveillance." The CIA/military teams consisted of operatives, many of whom are black or Middle Easterners "who could pass for Iraqis -- they were swarthy, fluent in Arabic, knew the dialects," according to one former senior CIA official. Saddam, for example, speaks Arabic with a heavy Tikrit accent, he said. Tikrit is Saddam's hometown. Arabic-speaking analysts from the Defense Intelligence Agency made a key contribution in putting together "the final targeting package," a former senior Pentagon official said. Copyright © 2001-2003 United Press International --- Graham "Lorax" Bignell - 416 366 9755 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 7063 From: Hawkspirit Date: Sun Mar 23, 2003 1:17pm Subject: Sweep Needed Sweep needed for a residence in the Detroit MI area, contact me asap if you are interested in handling this assignment. Roger Tolces Electronic Security Co. Los Angeles www.bugsweeps.com 7064 From: Wayne T Work Date: Sat Mar 22, 2003 11:21am Subject: RE: Jamming Well, Not sure I can confirm that this is a TRUE Iraqi website since it is hosted and DNS here is the US (See below data -- Note no hopes out of US. Might have to write a nasty gram to Register.com about hosting websites that could be tied to anti American activities. Just thought you all might want this data. 03/22/03 12:14:04 Spade Log 03/22/03 12:15:51 dig www.iraqtv.ws @ 204.60.0.2 Dig www.iraqtv.ws@d... (216.21.226.84) ... Authoritative Answer Query for www.iraqtv.ws type=255 class=1 www.iraqtv.ws CNAME (Canonical Name) iraqtv.ws iraqtv.ws NS (Nameserver) dns27.register.com iraqtv.ws NS (Nameserver) dns28.register.com Dig www.iraqtv.ws@d... (216.21.234.84) ... Authoritative Answer Query for www.iraqtv.ws type=255 class=1 www.iraqtv.ws CNAME (Canonical Name) iraqtv.ws iraqtv.ws NS (Nameserver) dns27.register.com iraqtv.ws NS (Nameserver) dns28.register.com Dig www.iraqtv.ws@2... ... Non-authoritative answer Recursive queries supported by this server Query for www.iraqtv.ws type=255 class=1 www.iraqtv.ws CNAME (Canonical Name) iraqtv.ws iraqtv.ws NS (Nameserver) dns27.register.com iraqtv.ws NS (Nameserver) dns28.register.com dns27.register.com A (Address) 216.21.234.84 dns28.register.com A (Address) 216.21.226.84 03/22/03 12:15:06 Fast traceroute www.iraqtv.ws Trace www.iraqtv.ws (216.21.224.200) ... 1 64.252.71.254 38ms 24ms 177ms TTL: 0 (64-252-71-254.adsl.snet.net ok) 2 66.159.184.226 25ms 24ms 86ms TTL: 0 (dist1-vlan60.mrdnct.sbcglobal.net ok) 3 66.159.184.116 * * 22ms TTL: 0 (bb2-g6-0.mrdnct.sbcglobal.net ok) 4 151.164.188.241 32ms 31ms 33ms TTL: 0 (bb1-p9-0.hrndva.sbcglobal.net ok) 5 151.164.243.26 32ms 239ms 33ms TTL: 0 (bb2-p15-0.hrndva.sbcglobal.net ok) 6 151.164.243.201 218ms 242ms 208ms TTL: 0 (bb2-p13-0.nycmny.sbcglobal.net ok) 7 151.164.243.17 69ms 178ms * TTL: 0 (bb1-p15-0.nycmny.sbcglobal.net ok) 8 144.223.26.201 * 83ms 74ms TTL: 0 (sl-gw31-nyc-11-0.sprintlink.net ok) 9 144.232.13.35 208ms 33ms 32ms TTL: 0 (sl-bb27-nyc-12-0.sprintlink.net ok) 10 144.232.13.173 50ms 32ms 33ms TTL: 0 (sl-bb24-nyc-8-0.sprintlink.net ok) 11 144.232.9.118 34ms 32ms 32ms TTL: 0 (No rDNS) 12 206.24.207.230 171ms * 31ms TTL: 0 (bhr1-pos-10-0.Jerseycitynj1.cw.net ok) 13 216.32.223.42 39ms 32ms 31ms TTL: 0 (csr21-ve240.Jerseycitynj1.cw.net ok) 14 216.32.193.106 110ms 33ms 31ms TTL: 0 (No rDNS) 15 216.21.224.200 163ms 34ms 33ms TTL:244 (No rDNS) 03/22/03 12:14:10 IP block www.iraqtv.ws Trying 216.21.224.200 at ARIN Trying 216.21.224 at ARIN OrgName: Register.com, Inc OrgID: REG Address: 575 8th Avenue City: New York StateProv: NY PostalCode: 10018 Country: US NetRange: 216.21.224.0 - 216.21.239.255 CIDR: 216.21.224.0/20 NetName: RCOM-1BLK NetHandle: NET-216-21-224-0-1 Parent: NET-216-0-0-0-0 NetType: Direct Allocation NameServer: DNS1.REGISTER.COM NameServer: DNS2.REGISTER.COM NameServer: DNS3.REGISTER.COM NameServer: DNS4.REGISTER.COM Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE RegDate: 2000-06-28 Updated: 2000-06-28 TechHandle: CK296-ARIN TechName: Kleban, Chris TechPhone: +1-212-798-9100 TechEmail: chris@r... OrgAbuseHandle: CUSTO-ARIN OrgAbuseName: Customer Service OrgAbusePhone: +1-800-899-9724 OrgAbuseEmail: support@r... OrgNOCHandle: NOC207-ARIN OrgNOCName: Network Operations Center OrgNOCPhone: +1-902-749-2488 OrgNOCEmail: ops@r... OrgTechHandle: NETWO55-ARIN OrgTechName: Network Engineering OrgTechPhone: +1-212-798-9100 OrgTechEmail: neteng@r... # ARIN WHOIS database, last updated 2003-03-21 20:00 # Enter ? for additional hints on searching ARIN's WHOIS database. Wayne T Work CISSP (Work) 203.217.5004 (Fax) 208-545-4365 Owner and Sr. Information Systems Security Consultant Security Gauntlet Consulting www.securitygauntlet.com -----Original Message----- From: Matt Paulsen [mailto:mpaulsen6@a...] Sent: Saturday, March 22, 2003 2:51 AM To: TSCM Group Subject: RE: [TSCM-L] Jamming Well, I'll confirm that Iraq TV's official website is hacked http://www.iraqtv.ws - saw it a few days ago.. INA's website was timing out as well back then.. http://www.uruklink.net I think it was being DDoS'd around then, now it's probably rubble. -----Original Message----- From: A Grudko [mailto:agrudko@i...] Sent: Wednesday, March 19, 2003 8:40 PM To: TSCM Group Subject: [TSCM-L] Jamming I hear that the American military are jamming the 3 Iraq Satellite TV channels & transmitting their own programmes - 16ghz 1kw uplink from Kuwait. Could be an urban legend but could also be the reason that the Iraqis appear to have launched short range conventional missiles at Kuwait today. Andy Grudko (British), Grad I.S, South Africa Registered as a security service provider by the Private Security Industry Regulatory Authority, registration number 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ------------------------ Yahoo! Groups Sponsor ---------------------~--> Get 128 Bit SSL Encryption! http://us.click.yahoo.com/xaxhjB/hdqFAA/xGHJAA/kgFolB/TM ---------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ [Non-text portions of this message have been removed] 7065 From: Date: Mon Mar 24, 2003 2:40am Subject: Envoy in Myanmar Finds Listening Device Envoy in Myanmar Finds Listening Device By AYE AYE WIN .c The Associated Press YANGON, Myanmar (AP) - A visiting U.N. human rights envoy on Monday suspended his mission to Myanmar after finding a bugging device while conducting confidential interviews with political prisoners. The envoy, Paulo Sergio Pinheiro of Brazil, said he found the bug while talking to political prisoners in Insein prison outside Yangon on Saturday. Pinheiro told reporters he was leaving Yangon later Monday, two days ahead of schedule. ``I think that was a very serious incident and my untimely departure is an expression of my anger and frustration,'' he said, pounding the table with his fist. ``I hope the government will demonstrate its willingness to continue to cooperate with the commission on human rights.'' The envoy said he found a wireless microphone under the table in the room where he was conducting an interview. ``The authorities expressed regret on learning of the incident,'' according to a statement from the United Nations. ``They gave the assurance that the incident would be investigated in full.'' Pinheiro arrived in Yangon on Wednesday to investigate allegations of human rights abuses and evaluate the conditions of an estimated 1,000 political prisoners in the nation also known as Burma. A foreign diplomat, speaking on condition of anonymity, said Pinheiro was ``shocked and upset'' when the device was found after he and his two colleagues heard a strange noise under the table. Before interviewing the prisoners, Pinheiro had assured each person he or she could speak freely, the diplomat said. The visit was one of a series of visits to compile a report scheduled to be delivered to the U.N. Human Rights Commission in Geneva at the end of the month. Myanmar's junta has also faced criticism for failing to make progress in its reconciliation process with opposition leader Aung San Suu Kyi. Her party won the 1990 general elections but was never allowed to take power. Critics say the junta is not serious about restoring democracy. 03/24/03 07:10 EST [Non-text portions of this message have been removed] 7066 From: Matt Paulsen Date: Mon Mar 24, 2003 9:21am Subject: Life sentence for failed spy. From infocon's daily pdf... 37. March 21, Associated Press - Life sentence for failed spy. A retired Air Force master sergeant was sentenced to life in prison without parole on Thursday for offering to sell intelligence secrets to Iraq and China. Judge Gerald Bruce Lee of Federal District Court imposed the sentence, which was brokered by prosecutors and by lawyers for the defendant, Brian P. Regan. In the agreement, the government promised not to prosecute Regan's wife, Anette, and allowed her to keep part of Mr. Regan's military pension. Regan also agreed to tell the government about any classified information he might have given to other people or countries and to submit to lie detector tests. His wife also agreed to cooperate. Regan, 40, was convicted last month on two counts of attempted espionage and a charge of gathering national defense information. He was acquitted of trying to spy for Libya. Source: http://www.nytimes.com/2003/03/21/national/21SPY.html 7067 From: Date: Sun Mar 23, 2003 4:25pm Subject: Alinco scanner radio Recently I acquired an Alinco DJ-X2000 scanner radio, which features a "transweeper" function, also field strength meter and frequency counter. I have found these functions to not be very useful and wish to ask whether other people have had more success with this make. My understanding is that transweeper looks for the audio it generates on RF as it sweeps; so it would only find simple analog bugs, not anything encoded or more sophisticated; is that right? In practice it seems to "find" bugs on various frequencies such as broadcast FM stations, reporting lots of false positives. Given that there are so many false positives, it would be impossible to guess what would be a genuine find. The field strength meter doesn't seem to work at all either, I held it next to a cordless phone transmitter and it showed nothing. 7068 From: James M. Atkinson Date: Mon Mar 24, 2003 1:04pm Subject: Message to Saddam Marine sending a message to Saddam http://www.tscm.com/saddammessage.jpg More to follow as they roll into Baghdad. *** Support Our Troops *** -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7069 From: Steve Uhrig Date: Mon Mar 24, 2003 1:25pm Subject: Re: Alinco scanner radio On 23 Mar 2003 at 22:25, mist@p... wrote: > Recently I acquired an Alinco DJ-X2000 scanner radio, which features a > "transweeper" function, also field strength meter and frequency > counter. I have found these functions to not be very useful and wish > to ask whether other people have had more success with this make. The replies you received on the scanner newsgroup were pretty much right on. Your piece includes the transweeper function as a sales gimmick only. It essentially is worthless for any real world countersurveillance application. Use it as a scanner, or sell it and buy professional TSCM gear if that is what you need. However, before you spend any money, educate yourself so you buy armed with full knowledge. That won't happen in a day or a week. This is a good list to learn, just like learning to play the violin. Takes a while. First, define *realistically* what you need to do. Then identify FIRST the skills you will need to accomplish that task. Only after you have acquired the skills should you then think about equipment. The equipment does not do the work. What's between your ears does. The equipment is only a tool. Buying a tool before you know the job you need to do or have the skills to use that tool is not wise. A city born and bred yuppie shouldn't buy a chain saw to paint his walls. He should learn what tools are appropriate, then learn something about painting, then spend the money on tools. He won't know the appropriate tools to buy until he learns about painting. In the process of learning you also learn what tools you do, and do not, need. Actually the above is a lousy analogy, as painting is not nearly as critical as bug sweeping. You miss a bug and there could be serious consequences. And without training, you WILL miss things regardless of the tools/hardware/equipment you have. There is no middle ground. You're either playing or you're serious. As long as you're honest with yourself and others, fine. If you just have an interest in the subject matter or the profession with no practical application, fine, there's lots of info here. If you're serious, or want to be, and are willing to pay your dues and do it properly, you'll also find a lot of resources here. The archives of this list will teach you a lot and would be time well spent. Scan subjects and read any which look technical. You'll develop a feel for persons who know what they're talking about and can concentrate on their posts. With 1300+ members here and plenty of traffic, there is a lot in the archives so you need to refine your search criteria somehow. Remember there is a lot of noise level in any group, even more so in large ones. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7070 From: Date: Mon Mar 24, 2003 9:32am Subject: U.N. Aide in Myanmar Finds Bugging Device U.N. Aide in Myanmar Finds Bugging Device By AYE AYE WIN .c The Associated Press YANGON, Myanmar (AP) - A visiting U.N. human rights envoy on Monday suspended his mission to Myanmar and left the country after finding a bugging device while conducting confidential interviews with political prisoners. The envoy, Paulo Sergio Pinheiro of Brazil, said he found the bug while talking to political prisoners in Insein prison outside Yangon on Saturday. On finding the device he contacted the prison director before phoning the deputy foreign minister to register an official complaint. ``I think that was a very serious incident and my untimely departure is an expression of my anger and frustration,'' he said, pounding the table with his fist. ``I hope the government will demonstrate its willingness to continue to cooperate with the commission on human rights.'' The envoy said he found a wireless microphone under the table in the room where he was conducting an interview. Later Monday, Pinheiro flew out of Yangon, two days ahead of schedule. ``The authorities expressed regret on learning of the incident,'' according to a statement from the United Nations. ``They gave the assurance that the incident would be investigated in full.'' Pinheiro arrived in Yangon on Wednesday to investigate allegations of human rights abuses and evaluate the conditions of an estimated 1,000 political prisoners in the nation also known as Burma. A foreign diplomat, speaking on condition of anonymity, said Pinheiro was ``shocked and upset'' when the device was found after he and his two colleagues heard a strange noise under the table. Before interviewing the prisoners, Pinheiro had assured each person he or she could speak freely, the diplomat said. The visit was one of a series of visits to compile a report scheduled to be delivered to the U.N. Human Rights Commission in Geneva at the end of the month. Myanmar's junta has also faced criticism for failing to make progress in its reconciliation process with opposition leader Aung San Suu Kyi. Her party won the 1990 general elections but was never allowed to take power. Critics say the junta is not serious about restoring democracy. 03/24/03 14:10 EST [Non-text portions of this message have been removed] 7071 From: Matt Paulsen Date: Mon Mar 24, 2003 7:48pm Subject: hardware ks logger.. http://abcnews.go.com/sections/scitech/TechTV/techtv_keyboardspy030320.html I seem to remember someone once mentioning that hardware ks loggers were illegal, yet software ks loggers weren't. 7072 From: Matt Paulsen Date: Mon Mar 24, 2003 9:32pm Subject: RE: Message to Saddam My contribution... http://parcelfarce.linux.theplanet.co.uk/~jmr/saddam.swf -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Monday, March 24, 2003 11:04 AM To: TSCM-L Mailing List Subject: [TSCM-L] Message to Saddam Marine sending a message to Saddam http://www.tscm.com/saddammessage.jpg More to follow as they roll into Baghdad. *** Support Our Troops *** -jma -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- Vocatus atque non vocatus deus aderit ---------------------------------------------------------------------------- ---------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7073 From: Matt Paulsen Date: Mon Mar 24, 2003 11:13pm Subject: humor...Got this recently Recently received this email regarding a dead box.... 'press F1 or F10 / the mousse is not moving and the keyboard is not functioning' 7074 From: kondrak Date: Tue Mar 25, 2003 0:32am Subject: Hmm..heads up Re:James I think theres some hocus-pocus going on. I got an email (bout 2 hrs ago) referring to James, and some of the legal stuff he's embroiled in, and I couldn't either open it, nor delete it and it locked up Eudora tight. It DID however, come in under another mailbox, and not the TSCM one. (I use eudora and segregate incoming by mailbox) There was no name associated either, since I couldn't open it to see. The email had an attachment, and I had to crash out of eudora to get it out of locked mode. I ran the virus detector over the entire directory, and found nil. I've seen this before from other accounts (none on this list), and usually found virus activity associated with the email. Just a heads up to the list, in case someone else gets a weirdly acting email that has something pertaining to this group as a subject... At 21:13 3/24/03 -0800, you wrote: >Recently received this email regarding a dead box.... >'press F1 or F10 / the mousse is not moving and the keyboard is not >functioning' > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7075 From: Marcel Date: Tue Mar 25, 2003 2:01am Subject: Re: Hmm..heads up Re:James It was a PDF file- It came back clean- It was some nonsense- kondrak wrote: > I think theres some hocus-pocus going on. I got an email (bout 2 hrs ago) > referring to James, and some of the legal stuff he's embroiled in, and I > couldn't either open it, nor delete it and it locked up Eudora tight. It > DID however, come in under another mailbox, and not the TSCM one. (I use > eudora and segregate incoming by mailbox) There was no name associated > either, since I couldn't open it to see. > The email had an attachment, and I had to crash out of eudora to get it out > of locked mode. > I ran the virus detector over the entire directory, and found nil. I've > seen this before from other accounts (none on this list), and usually found > virus activity associated with the email. > > Just a heads up to the list, in case someone else gets a weirdly acting > email that has something pertaining to this group as a subject... > > At 21:13 3/24/03 -0800, you wrote: > >Recently received this email regarding a dead box.... > >'press F1 or F10 / the mousse is not moving and the keyboard is not > >functioning' > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > > > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL-1 IT'S NOT JUST NEXTEL" Note The New address Subscribe to Nextel-1: http://www.groups.yahoo.com/subscribe/NEXTEL-1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 7076 From: kondrak Date: Tue Mar 25, 2003 2:39am Subject: RE: Hmm..heads up Re:James Ok, thanks for the update Matt. It didn't trigger either the .pdf reader nor the copy of adobe I've got here, so it must of had errors. It is interesting, at about the same time, I did note a virus on the mail check, it was not however, associated with that exact email. It was handled in the normal manner, terminated with extreme prejudice. ;) At 22:39 3/24/03 -0800, you wrote: >No virus.. just a pdf... Treat it like a zit. Pop it and it'll fester. >Ignore it and it will disappear. 7077 From: Fernando Martins Date: Tue Mar 25, 2003 2:55am Subject: Re: Hmm..heads up Re:James In my case it was very funny because it was one of those bored times, and I was watching some cartoons in http://www.attrition.org/gallery/cartoons/ but then I was really really bored and start reading http://www.attrition.org/errata/charlatan.html well ... guess who is there? (just add #murphy to the url :) FM p.s. - i didn't read it all (was already bored ...), but the mail and attach had no virii 7078 From: William Knowles Date: Tue Mar 25, 2003 5:01am Subject: Re: Hmm..heads up Re:James On Tue, 25 Mar 2003, Fernando Martins wrote: > In my case it was very funny because it was one of those bored > times, > p.s. - i didn't read it all (was already bored ...), but the mail > and attach had no virii Yeah, I got it too, the .PDF was a joke, never have I seen anything so over copyrighted before, it made my eyes bleed, and that other attachment said it was a .rtf file but was so munged that I deleted that off the bat. If the said party is on the list, or has an operative reporting back, Please 'thank' them for sending me that 750K email, I only wish there was a better address than a throwaway e-mail account to bitch back upstream for sending that. - WK 7079 From: Does it matter Date: Mon Mar 24, 2003 9:40pm Subject: Re: Alinco scanner radio Oh no now Steve is a violin player!!!!! --- In TSCM-L@yahoogroups.com, "Steve Uhrig" wrote: > On 23 Mar 2003 at 22:25, mist@p... wrote: > > > Recently I acquired an Alinco DJ-X2000 scanner radio, which features a > > "transweeper" function, also field strength meter and frequency > > counter. I have found these functions to not be very useful and wish > > to ask whether other people have had more success with this make. > > The replies you received on the scanner newsgroup were pretty much > right on. > > Your piece includes the transweeper function as a sales gimmick only. > It essentially is worthless for any real world countersurveillance > application. > > Use it as a scanner, or sell it and buy professional TSCM gear if > that is what you need. However, before you spend any money, educate > yourself so you buy armed with full knowledge. That won't happen in a > day or a week. This is a good list to learn, just like learning to > play the violin. Takes a while. > > First, define *realistically* what you need to do. Then identify > FIRST the skills you will need to accomplish that task. Only after > you have acquired the skills should you then think about equipment. > > The equipment does not do the work. What's between your ears does. > The equipment is only a tool. Buying a tool before you know the job > you need to do or have the skills to use that tool is not wise. > > A city born and bred yuppie shouldn't buy a chain saw to paint his > walls. He should learn what tools are appropriate, then learn > something about painting, then spend the money on tools. He won't > know the appropriate tools to buy until he learns about painting. In > the process of learning you also learn what tools you do, and do not, > need. > > Actually the above is a lousy analogy, as painting is not nearly as > critical as bug sweeping. You miss a bug and there could be serious > consequences. And without training, you WILL miss things regardless > of the tools/hardware/equipment you have. > > There is no middle ground. You're either playing or you're serious. > As long as you're honest with yourself and others, fine. If you just > have an interest in the subject matter or the profession with no > practical application, fine, there's lots of info here. If you're > serious, or want to be, and are willing to pay your dues and do it > properly, you'll also find a lot of resources here. > > The archives of this list will teach you a lot and would be time well > spent. Scan subjects and read any which look technical. You'll > develop a feel for persons who know what they're talking about and > can concentrate on their posts. With 1300+ members here and plenty of > traffic, there is a lot in the archives so you need to refine your > search criteria somehow. > > Remember there is a lot of noise level in any group, even more so in > large ones. > > Regards ... Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* 7080 From: Steve Uhrig Date: Tue Mar 25, 2003 10:04am Subject: Re: Alinco scanner radio On 25 Mar 2003 at 3:40, Does it matter wrote: > Oh no now Steve is a violin player!!!!! And Steve had mentioned: > > Remember there is a lot of noise level in any group, even more so in > > large ones. Case in point. 7081 From: Steve Uhrig Date: Tue Mar 25, 2003 10:59am Subject: Mason Mini Probe 5? Asking for a friend. Would anyone have a manual for this receiver? He would like a copy. Any leads on where to find one? Tks ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7082 From: A Grudko Date: Mon Mar 24, 2003 10:28pm Subject: Re: Aide in Myanmar Finds Device Journalists love a story, even if it probably does not make sense. ----- Original Message ----- > The envoy, Paulo Sergio Pinheiro of Brazil, said he found the bug while > talking to political prisoners in Insein prison outside Yangon on Saturday. ..... > The envoy said he found a wireless microphone under the table in the room > where he was conducting an interview. So there is this evil regiem that tortures political prisoners. They own and control the prison, including the room in which diplomats can interview political prisoners in private. They can install the most sophisticated concealed surveillance devices at thier leisure...and they plant a wireless room bug? > A foreign diplomat, speaking on condition of anonymity, said Pinheiro was > ``shocked and upset'' when the device was found after he and his two > colleagues heard a strange noise under the table. So not only a wireless room but but one which makes a strange noise - was it powered by a cockroach running on a treadmill? And Mr Pinheiro is qualified to identify a wireless room bug? I wonder if he was searched going in? > Before interviewing the prisoners, Pinheiro had assured each person he or she > could speak freely, the diplomat said. Real estate agents say " Position, position, position" Politicians say "Agenda, agenda. agenda". :-) Andy Grudko (British), Grad I.S, South Africa Registered as a security service provider by the Private Security Industry Regulatory Authority, registration number. 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time From: John Savage Date: Thu Mar 21, 2002 7:50am Subject: MLPIA Banner Good Morning! Here is the link to the MLPIA banner ad: http://mlpia.org/images/anim_mlpia.gif Go to "File" and "Save As" to your own computer, >src="http://mlpia.org/images/anim_mlpia.gif" width="600" height="80" >border="0" alt=Maine Licensed Private Investigators Association"> Please also keep in mind that this group is now by referrals and invitation only, so if you know of someone that would like to be a part of this rapidly growing "networking machine," send them this way. Respectfully, The MLPIA Network http://groups.yahoo.com/group/MLPIA-Network/ John Lee Savage (LPIA) P.O. Box 634 Old Orchard Beach, ME 04064 TEL: 207-286-3945 FAX: 781-723-2551 ******************************************* Licensed by the Maine Department of Public Safety (Lic #373) ******************************************* Maine Notary Public ******************************************* National Association of Investigative Specialists (NAIS) ******************************************* Maine Licensed Private Investigators Association (MLPIA) www.mlpia.org ******************************************* --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.338 / Virus Database: 189 - Release Date: 3/14/02 5044 From: Joseph Date: Thu Mar 21, 2002 0:51pm Subject: RE: MLPIA Banner Well, for one thing I would change your banner to the accepted standard for web pages which is 468 * 60. This will help those who wish to use your banner that already have a system in place. Joseph -----Original Message----- From: John Savage [mailto:iseeu@m...] Sent: Thursday, March 21, 2002 5:51 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] MLPIA Banner Good Morning! Here is the link to the MLPIA banner ad: http://mlpia.org/images/anim_mlpia.gif Go to "File" and "Save As" to your own computer, >src="http://mlpia.org/images/anim_mlpia.gif" width="600" height="80" >border="0" alt=Maine Licensed Private Investigators Association"> Please also keep in mind that this group is now by referrals and invitation only, so if you know of someone that would like to be a part of this rapidly growing "networking machine," send them this way. Respectfully, The MLPIA Network http://groups.yahoo.com/group/MLPIA-Network/ John Lee Savage (LPIA) P.O. Box 634 Old Orchard Beach, ME 04064 TEL: 207-286-3945 FAX: 781-723-2551 ******************************************* Licensed by the Maine Department of Public Safety (Lic #373) ******************************************* Maine Notary Public ******************************************* National Association of Investigative Specialists (NAIS) ******************************************* Maine Licensed Private Investigators Association (MLPIA) www.mlpia.org ******************************************* --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.338 / Virus Database: 189 - Release Date: 3/14/02 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5045 From: Matthew Paulsen Date: Thu Mar 21, 2002 6:57pm Subject: New Interception Bill in New Zealand http://www.newsbytes.com/news/02/175371.html New Zealand telecommunications network operators and Internet service providers will be legally obligated to install a system that will allow police or the secret service to eavesdrop on phone calls or e-mail messages, the New Zealand government has confirmed. Many will also have to pay for the capability, Associate Minister of Justice Paul Swain said today. The changes to New Zealand's telecommunications laws were tabled last year. The legislation - the Telecommunications (Interception Capability) Bill - is being drafted right now, the minister said. The bill would require all telecom and Internet service providers to be "interception-capable." Customer e-mail and voice messages may be intercepted by carriers when the police, the New Zealand Security Intelligence Service or the Government Communications Security Bureau present a warrant ordering the carriers to do so. "The government will pay for the provision of interception capability for existing fixed and mobile voice networks to be implemented within 18 months from the date the legislation is enacted," Swain said, in a government media release today. Network operators will have to meet the cost of allowing snooping on Internet and e-mail communications within five years of the legislation enactment. Swain confirmed that any interception will require a warrant issued by the High Court - which is the current case for traditional wiretapping. "This law on interception capability will bring us into line with legal requirements already in place in a number of different countries including the United States, Australia, Germany, Netherlands and the U.K .," Swain said. "New Zealand has to make these changes to be certain our law enforcement and national security are not eroded by changes in technology," he added. Reported By Newsbytes.com, http://www.newsbytes.com . 5046 From: James M. Atkinson Date: Thu Mar 21, 2002 8:20pm Subject: FOREGONE CONCLUSION FOREGONE CONCLUSION: (A) The Japanese eat very little fat and suffer fewer heart attacks than the British or Americans. (B) On the other hand, the French eat a lot of fat and also suffer fewer heart attacks than the British or Americans. (C) The Chinese drink very little red wine and suffer fewer heart attacks than the British or Americans. (D) The Italians drink excessive amounts of red wine and also suffer fewer heart attacks than the British or Americans. (E) Conclusion: Eat & drink what you like. It's speaking English that kills you. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5047 From: Marko Radovic Date: Fri Mar 22, 2002 2:12am Subject: ISO 17799 Hello, I would like to thank all the pepople who privided help and information cocerning ISO 17799 standard. Any additional information about standard is welcome. Marko __________________________________________________ Do You Yahoo!? Everything you'll ever need on one web page from News and Sport to Email and Music Charts http://uk.my.yahoo.com 5048 From: James M. Atkinson Date: Fri Mar 22, 2002 0:49pm Subject: Blind Man's Dilemma Blind Man's Dilemma A blind man enters a Ladies Bar by mistake. He finds his way to a barstool and orders a drink. After sitting there for a while, he yells to the bartender, "Hey, you wanna hear a blonde joke?" The bar immediately falls absolutely quiet. In a very deep, husky voice, the woman next to him says, "Before you tell that joke, sir, you should know five things: 1 - The bartender is a blonde. 2 - The bouncer is a blonde. 3 - I'm a 6 feet tall, 200 pound blonde with a black belt in karate. 4 - The woman sitting next to me is blonde and is a professional weightlifter. 5 - The lady to your right is a blonde and is a professional wrestler. Now think about it seriously, Mister. Do you still wanna tell that joke?" The blind man thinks for a second, shakes his head, and declares, "Nah...Not if I'm gonna have to explain it five times." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5049 From: zack <10-33@c...> Date: Fri Mar 22, 2002 7:22am Subject: From Russia with love I did not think that they could sell this stuff............do you pay in rubbles ?? <<< Date: Fri Mar 22, 2002 1:46pm Subject: Re: From Russia with love WELL, , , , LOOK AT THE EMAIL ADDY, , , ," info@t... " {oops,sry abt the caps}, , , , , It's in Russia! ======================================== zack wrote: > I did not think that they could sell this stuff............do you pay in > rubbles ?? > > <<< (DVR) Edic-mini > http://www.telesys.ru/english/edic-mini.shtml > with extraordinary characteristics: > Edic-mini model A - the smallest size over the world (17x57x10 mm), up to > 1120 min of > record time. > Edic-mini model ˜ - the longest battery life (up to 70 hours in record > mode, metal case > 27»54»7 mm), up to 1120 min of recording time. > Edic-mini model B1 - the roundest DVR in the world :-) (metal case d=30 mm, > h=14 mm), up to 1120 min of recording time. > Edic-mini model C - the longest recording time (up to 8960 min =149 hours), > metal case 27»54»10 mm > Coming soon: > Edic-mini model S - stereo digital voice recorder. > Edi”-mini BW1 - round wood (cade) case (for lovers of cade fragrance :-), > the most stylish DVR in the world. > > All digital voice recorders have extremely high voice sensitivity, digital PC > interface, telephone line interface to record phone > conversations, programmable user's interface, ability of using it for data > storage and > transfer (capacity from 16Mbyte to 1Gbyte). > > Also we produce voice modules (assembled PCB only) EMM > http://www.telesys.ru/english/modules.shtml , > which are Edic-mini compatible and allow you to create your own solution > of high technology DVR. > > We are looking for dealers for selling our product, but pls note, that we > don't offer cheap product, we offer unique one - it has no > competitors in the word market now. > We are ready to design and produce any kind of DVR upon your request. Low > volume order (100+) is acceptable too. > > Welcome to our website http://www.telesys.ru/english to get more > information. > > visit http://www.copscops.com > Washington DC Police Department http://mpdc.dc.gov/main.shtm > > "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." > George W Bush > President of the United States of America > > God Bless The USA .. NEVER forget 9-11-01 > http://www.copscops.com/blessusa.htm > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5051 From: DrPepper Date: Fri Mar 22, 2002 1:52pm Subject: Re: From Russia with love Sure, , , pay in rubles, and get squat in return for your money, , , , And if you use a credit card, it'll be maxed out in a flash, , , , DrPepper wrote: > WELL, , , , LOOK AT THE EMAIL ADDY, , , ," info@t... " > {oops,sry abt the caps}, , , , , It's in Russia! > > ======================================== > > zack wrote: > > > I did not think that they could sell this stuff............do you pay in > > rubbles ?? > > > > <<< > (DVR) Edic-mini > > http://www.telesys.ru/english/edic-mini.shtml > > with extraordinary characteristics: > > Edic-mini model A - the smallest size over the world (17x57x10 mm), up to > > 1120 min of > > record time. > > Edic-mini model ˜ - the longest battery life (up to 70 hours in record > > mode, metal case > > 27»54»7 mm), up to 1120 min of recording time. > > Edic-mini model B1 - the roundest DVR in the world :-) (metal case d=30 mm, > > h=14 mm), up to 1120 min of recording time. > > Edic-mini model C - the longest recording time (up to 8960 min =149 hours), > > metal case 27»54»10 mm > > Coming soon: > > Edic-mini model S - stereo digital voice recorder. > > Edi”-mini BW1 - round wood (cade) case (for lovers of cade fragrance :-), > > the most stylish DVR in the world. > > > > All digital voice recorders have extremely high voice sensitivity, digital PC > > interface, telephone line interface to record phone > > conversations, programmable user's interface, ability of using it for data > > storage and > > transfer (capacity from 16Mbyte to 1Gbyte). > > > > Also we produce voice modules (assembled PCB only) EMM > > http://www.telesys.ru/english/modules.shtml , > > which are Edic-mini compatible and allow you to create your own solution > > of high technology DVR. > > > > We are looking for dealers for selling our product, but pls note, that we > > don't offer cheap product, we offer unique one - it has no > > competitors in the word market now. > > We are ready to design and produce any kind of DVR upon your request. Low > > volume order (100+) is acceptable too. > > > > Welcome to our website http://www.telesys.ru/english to get more > > information. > > > > visit http://www.copscops.com > > Washington DC Police Department http://mpdc.dc.gov/main.shtm > > > > "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." > > George W Bush > > President of the United States of America > > > > God Bless The USA .. NEVER forget 9-11-01 > > http://www.copscops.com/blessusa.htm > > > > [Non-text portions of this message have been removed] > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 5052 From: John Savage Date: Sun Mar 24, 2002 7:35am Subject: MLPIA Proudly Presents: Forensic Polygraph Assessments Seminar !!!! Doug Calderbank & Cory Emmons Announce.......... "MAINE LICENSED PRIVATE INVESTIGATORS ASSOCIATION (MLPIA)" Proudly Presents: FORENSIC POLYGRAPH ASSESSMENTS FOR THE LEGAL PROFESSION, CORPORATE SECURITY DEPARTMENTS, AND THE PRIVATE SECTOR! WHEN: Wednesday April 17, 2002 (2002-2003 MEMBERSHIP KICKOFF) TIME: 4:30 PM Presentation ∑ 6 PM Social & Buffet ∑ 7 PM Meeting WHERE: Augusta Country Club in Manchester, Maine (only 3.4 miles West from Exit 30) When are polygraphs used? Who uses polygraph services? What happens in a polygraph examination? Why are polygraph services valuable to your client? Learn and see for yourself! Some of the valuable aspects of the investigative use of polygraph testing are to help exonerate the innocent person who is surrounded by circumstantial evidence. It is also particularly valuable in those investigations that rely only on testimonial evidence and in marital and family counselors to alleviate fears and prove innocence to spouse and family members. Polygraph testing can be utilized for law enforcement applicant screening, victims of sex crimes, child abuse cases, and civil litigation to name a few. This presentation is a learning experience for Defense Attorneys, Public Defenders, Civil Litigation Attorneys, Private Investigators, Companies and Corporations under the limits of the Employee Polygraph Protection Act of 1988 (EPPA), and Law Enforcement Agencies. The presenters of this event will be Portland Police Detective Mark Teceno and Retired State Police Polygraph Examiner Donald Lizotte. The Presentation includes a delicious FULL DINNER BUFFET and materials for: $20.00 MEMBERS or $30.00 NON-members R.S.V.P. as soon as possible and then make out your check by April 5th payable to: MLPIA, ATTN: Polygraph Presentation, PO Box 1645, Portland, Me 04104 Questions? E-mail the association at: MLPIA@a... or hit reply on the yahoo groups You can also contact (Seminar Chairpersons) Investigators Douglas Calderbank @ 207-671-3868 or Corey Emmons @ 207-756-2684. PLEASE SUPPORT THE ASSOCIATION BY ATTENDING A MLPIA GENERAL MEMBERSHIP MEETING WILL ALSO BE HELD AFTER THE BUFFET INVITE ALL NON-MEMBERS, CLIENTS, LAWYERS, AND ASSOCIATES TO ATTEND AND LEARN MORE ABOUT MLPIA Visit our redesigned website at: www.MLPIA.org John Lee Savage (LPIA) P.O. Box 634 Old Orchard Beach, ME 04064 TEL: 207-286-3945 FAX: 781-723-2551 ******************************************* Licensed by the Maine Department of Public Safety (Lic #373) ******************************************* Maine Notary Public ******************************************* National Association of Investigative Specialists (NAIS) ******************************************* Maine Licensed Private Investigators Association (MLPIA) www.mlpia.org ******************************************* --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.342 / Virus Database: 189 - Release Date: 3/14/02 5053 From: D.A.Linsky Date: Sun Mar 24, 2002 1:41pm Subject: Re: Digest Number 891 SSC, Inc. - Phone = 203-333-1707 - Location = Connecticut - Experience = greater than 15 years INVESTIGATIVE ADVISOR - Connecticut: SSC, Inc. an innovative and progressive Security and Investigations company is searching for a Professional Investigative Advisor for its Investigations division. This position requires heavy interface with media, law enforcement and professional organizations as a public representative of SSC, Inc. We are searching for a seasoned Law Enforcement or Military Investigative Official with previous command experience. Position will support sales, management and the development of our consulting business. We are open to discussion of employment either as a subcontractor or as a full time employee. This position requires periodic travel within the northeast corridor and superb written and verbal communication skills. Public appearances are an important part of this job. For additional information or to schedule an interview, apply by email or forward your resume with salary history to David Linsky President, SSC, Inc. You can also visit our website at http://www.securesvc.com ----- Original Message ----- From: To: Sent: Sunday, March 24, 2002 2:16 PM Subject: [TSCM-L] Digest Number 891 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ------------------------------------------------------------------------ There is 1 message in this issue. Topics in this digest: 1. MLPIA Proudly Presents: Forensic Polygraph Assessments Seminar !!!! From: "John Savage" ________________________________________________________________________ ________________________________________________________________________ Message: 1 Date: Sun, 24 Mar 2002 08:35:34 -0500 From: "John Savage" Subject: MLPIA Proudly Presents: Forensic Polygraph Assessments Seminar !!!! Doug Calderbank & Cory Emmons Announce.......... "MAINE LICENSED PRIVATE INVESTIGATORS ASSOCIATION (MLPIA)" Proudly Presents: FORENSIC POLYGRAPH ASSESSMENTS FOR THE LEGAL PROFESSION, CORPORATE SECURITY DEPARTMENTS, AND THE PRIVATE SECTOR! WHEN: Wednesday April 17, 2002 (2002-2003 MEMBERSHIP KICKOFF) TIME: 4:30 PM Presentation ∑ 6 PM Social & Buffet ∑ 7 PM Meeting WHERE: Augusta Country Club in Manchester, Maine (only 3.4 miles West from Exit 30) When are polygraphs used? Who uses polygraph services? What happens in a polygraph examination? Why are polygraph services valuable to your client? Learn and see for yourself! Some of the valuable aspects of the investigative use of polygraph testing are to help exonerate the innocent person who is surrounded by circumstantial evidence. It is also particularly valuable in those investigations that rely only on testimonial evidence and in marital and family counselors to alleviate fears and prove innocence to spouse and family members. Polygraph testing can be utilized for law enforcement applicant screening, victims of sex crimes, child abuse cases, and civil litigation to name a few. This presentation is a learning experience for Defense Attorneys, Public Defenders, Civil Litigation Attorneys, Private Investigators, Companies and Corporations under the limits of the Employee Polygraph Protection Act of 1988 (EPPA), and Law Enforcement Agencies. The presenters of this event will be Portland Police Detective Mark Teceno and Retired State Police Polygraph Examiner Donald Lizotte. The Presentation includes a delicious FULL DINNER BUFFET and materials for: $20.00 MEMBERS or $30.00 NON-members R.S.V.P. as soon as possible and then make out your check by April 5th payable to: MLPIA, ATTN: Polygraph Presentation, PO Box 1645, Portland, Me 04104 Questions? E-mail the association at: MLPIA@a... or hit reply on the yahoo groups You can also contact (Seminar Chairpersons) Investigators Douglas Calderbank @ 207-671-3868 or Corey Emmons @ 207-756-2684. PLEASE SUPPORT THE ASSOCIATION BY ATTENDING A MLPIA GENERAL MEMBERSHIP MEETING WILL ALSO BE HELD AFTER THE BUFFET INVITE ALL NON-MEMBERS, CLIENTS, LAWYERS, AND ASSOCIATES TO ATTEND AND LEARN MORE ABOUT MLPIA Visit our redesigned website at: www.MLPIA.org John Lee Savage (LPIA) P.O. Box 634 Old Orchard Beach, ME 04064 TEL: 207-286-3945 FAX: 781-723-2551 ******************************************* Licensed by the Maine Department of Public Safety (Lic #373) ******************************************* Maine Notary Public ******************************************* National Association of Investigative Specialists (NAIS) ******************************************* Maine Licensed Private Investigators Association (MLPIA) www.mlpia.org ******************************************* --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.342 / Virus Database: 189 - Release Date: 3/14/02 ________________________________________________________________________ ________________________________________________________________________ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5054 From: Steve Uhrig Date: Sun Mar 24, 2002 9:15pm Subject: Educating v. Marketing? This message is one posted following a thread from another TSCM list (a closed list, so don't inquire about joining). Others on that list thought the info was of general interest, so I am posting it here in case anyone could benefit. Feel free to reprint it anywhere, WITH PRIOR PERMISSION FROM ME. ================== > Has anyone in the business, that you all know of that is, ever tried a > series of dog and pony road shows that have been targeted at the right > general-mix and large slate of invitees for the pure and honest purpose > of 'education', and not simply to 'sell' their own services? Sir Bob, You will probably find many of us regularly do presentations before various groups, exposing them to the technology, explaining the need for the service, how to select a legitimate practitioner, and a very few words said about the presenter being a local legitimate provider of the service who happened to take the time to speak before this group where others haven't. Several times a year I do a presentation and mini dog and pony show before Chamber of Commerce meetings, various county monthly Bar Association meetings, various security and management groups, etc. The meetings help me keep my public speaking skills up, keep me familiar with explaining things in the language of the common layman (very important; eliminate or define any buzzwords) and keep my name before the types of people who may buy my service. I generally try to tag my presentation on with a PIs. Even though a PI license is not required to sweep in MD, if any hostile device were found it almost always will involve subsequent investigation, and I am more comfortable having a license associated with the job from the beginning. The PIs I work with, of course, are ones who have referred me a lot of work and are in my camp, and their enthusiasm comes across. I give some simple handouts to each attendee, at the conclusion of my presentation. I have learned if you give them out early, people will read them instead of listening to me. They can read anytime; they can listen to me once. The handouts have my letterhead on them only, no advertising or marketing. I do have business cards and Rolodex cards up front and I invite attendees to take one, but I do not hand them out. There are no other competent sweepers in my immediate area, so I don't get into mentioning anyone else. If I did, they'd darn well have to pay me referrals to cover my expenses and hassle in generating work for them. The presentations always are well received, enough intelligent questions asked to where I know they absorbed my material and I wasn't over their head (very important to perfect your presentation that way, or they will be sleeping while you are talking), and I watch after the group leaves how many of my handouts are left behind. A few are normal, and I collect them to use again. A lot means I was over their head or the group was not the proper people to listen to this sort of presentation. BUT (and there is always a but) -- Selling sweeps most of the time is like selling wedding dresses. If you knock on a door peddling wedding dresses and someone in the household is getting ready to get married, you may have a sale. If someone in the business is not getting married, it doesn't matter what quality your wedding dresses are, how well you know wedding dresses, how cheap they are, and how many of their friends you have fitted with wedding dresses. You don't sell a dress or a sweep. It is hard to generate business for sweeps. The best you can do, and it is a long, slow, ongoing process, is to let them know of the threat and who to call if they ever should have a concern in the future. And all the worn out cautions apply: people buy from people. They much prefer to buy from people they have met. But it doesn't happen overnight. You have to be patient, and keep chipping away even when you don't see results. The market has no loyalty. Just because you did a dynamite presentation for the Bar Association, they will not call you a year later when one of their clients asks about a sweep. They will call the last guy who contacted them, whether it be you or a schlock PI with a Ralph Thomas box. You need to keep pouding away. I have found it to be very true that the average sale is made on the 5th attempt. This can be the 5th exposure through 5 meetings, or you could count direct mail, trade shows, word of mouth, etc. That number 5 is the average. Sometimes it will be one. Sometimes it will be ten. Give up before 5 and you've wasted your time on the first 1, 2, 3 or 4. Appearances are critical. Dress BETTER than them. Have your wife clean all the dust off your sweep gear. Yeah, we all know we don't use the stuff enough to keep it from getting dusty. Charge all batteries. Bring plenty of extension cords. Arrange for enough tables to set everything up. Remember the old adage: "What I hear, I forget. What I see I remember. What I do, I understand." Pass around deactivated or dummy bugs. Have anyone interested X-ray your phony bugged telephone handset. Borrow a pager or small recorder from someone in the audience, and show how your nonlin can find it buried underneath something. Do not, however, let them back you into a phony sweep where they hide something and challenge you to find it. I tell them, "I WILL find it, but I go through a procedural list, and if you are willing to sit here and be absolutely still and quiet, no talking, for potentially several hours, I WILL find anything you have concealed. However, I work from checklists and I do not violate that as the chances of overlooking a critical step would be too high." That's all it takes. Then show them how the nonlin will find something under a newspaper on a table, or some such. If you don't have a telephone handset, use an FRS radio with the PTT switch held down with a rubber band and show how the equipment responds. Don't concentrate too much on equipment, though. You will find many of these folks, especially older ones, are technologically challenged and will not have much patience. Limit playing with your toys to 10 minutes max in a one hour presentation. Discuss liability if a company hired to find something misses it. Do that without overtly implying any competition is incompetent. Merely make the statement of fact and let them make the connection in their own mind. Every few minutes, atop and ask if there are any questions. Try to learn the participant's name, and repeat his name and question for the others in the group who may not have heard the questions. Treat every question, no matter how stupid, seriously. And feed people back their names and titles, if any, They eat that up. Repeat the questioner's name to the group, as he may be a big wheel or officer the rest will respect, and pay more attention to a question from the big shot. If they try to trip you up, don't get flustered. My answer is "a proper answer to your question would take more time than I have right now. I'll be glad to get with you after the meeting and answer your question in the detail it requires." Or, never be afraid to say you don't know but will be glad to research the answer and get back to them. I try to get a business card from everyone as well as pass around a roster for everyone to sign with full contact info including email. If they ask the reason, I will say this is so I know I have spoken with you already and won't bother to mail you literature in the future that we already have covered in this presentation, or some such. Like with the media (especially with the media), MAKE SURE you control the interview. If they get into all these dragged out lunatic stories, tell them you will be glad to get with them after the presentation and give their question the attention it deserves (which may be nothing). Pay special attention to quiet guys who hang around looking at your gear but don't approach you. Be aggressive. He may be on the edge of buying some spy shop crap and is beginning to have some doubt. Since I go with a PI, I have the PI introduce me. Seems more humble. Have the PI hand lit out near the end of your presentation. Have the PI leave his cards on the table too. Treat everyone with respect, even when you find out they have contracted your incompetent competition for $50K a quarter. Don't speak down about anyone or anything. State the facts, and let them draw their own conclusion. I could go on forever, but these are the basics. Good question Bob. If there was any interest, I'd teach a TSCM marketing course. But since only 8 people will see this message, this is not the place to announce it. I may copy this message, edited, to the main list. Some good info for newbies. Anyone sweeping actively or full time has developed their marketing to a high level of efficiency. Learn from them. Copyright (C) March 2001 by Steve Uhrig, SWS Security =============== ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5055 From: Matthew Paulsen Date: Mon Mar 25, 2002 10:19am Subject: Internet Draft - Responsible Vulnerability Disclosure Worth a read. May make companies legally liable for not fixing security holes. http://www.ietf.org/internet-drafts/draft-christey-wysopal-vuln-disclosure-0 0.txt Internet Engineering Task Force Steve Christey INTERNET-DRAFT MITRE Valid for six months Chris Wysopal Category: Best Current Practice @stake, Inc. February 2002 Responsible Vulnerability Disclosure Process draft-christey-wysopal-vuln-disclosure-00.txt Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet Drafts are working documents of the Internet Engineering Task Force (IETF), its Areas, and its Working Groups. Note that other groups may also distribute working documents as Internet Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/1id-abstracts.html The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. Copyright Notice Copyright (C) The Internet Society (2002). All Rights Reserved. Abstract New vulnerabilities in software and hardware products are discovered and publicized on a daily basis. The disclosure of vulnerability information has been a divisive topic for years. During the process of disclosure, many vendors, security researchers, and other parties follow a variety of unwritten or informal guidelines for how they interact and share information. Some parties may be unaware of these guidelines, or they may intentionally ignore them. This state of affairs can make it difficult to achieve a satisfactory outcome for everyone who uses or is affected by vulnerability information. The purpose of this document is to describe best practices for a responsible disclosure process that involves vulnerability reporters, product vendors or maintainers, third parties, the security community, and ultimately customers and users. Christey & Wysopal Expires August 2002 [Page 1] Internet-Draft Responsible Vulnerability Disclosure February 2002 Table of Contents 1 Introduction and Purpose ....................................... 3 1.1 Background ................................................... 3 1.2 Major Roles in Disclosure .................................... 3 1.3 Motivations .................................................. 4 1.4 Goals of Responsible Disclosure .............................. 5 2 Phases of Responsible Disclosure ............................... 6 3 Responsibilities in the Phases of Vulnerability Disclosure ..... 7 3.1 Latent Flaw .................................................. 7 3.2 Discovery .................................................... 7 3.3 Notification Phase: Initial Notification ..................... 8 3.3.1 Vendor Responsibilities .................................... 8 3.3.2 Reporter Responsibilities .................................. 9 3.4 Notification Phase: Vendor Receipt .......................... 11 3.4.1 Vendor Responsibilities ................................... 11 3.5 Validation Phase ............................................ 11 3.5.1 Vendor Responsibilities ................................... 11 3.5.2 Reporter Responsibilities ................................. 13 3.5.3 Coordinator Responsibilities .............................. 14 3.6 Resolution Phase ............................................ 14 3.6.1 Vendor Responsibilities ................................... 14 3.6.2 Reporter Responsibilities ................................. 15 3.7 Release Phase ............................................... 16 3.7.1 Vendor Responsibilities ................................... 16 3.7.2 Reporter Responsibilities ................................. 18 3.7.3 Coordinator Responsibilities .............................. 18 3.7.4 Customer Responsibilities ................................. 19 3.7.5 Security Community Responsibilities ....................... 19 3.8 Follow-Up Phase ............................................. 20 4 Policy Publication ............................................ 20 4.1 Vendor Policy ............................................... 20 4.2 Reporter Policy ............................................. 20 4.3 Coordinator Policy .......................................... 21 5 References .................................................... 21 5.1 Disclosure Policies ......................................... 21 5.2 Commentary on Disclosure Details ............................ 21 5.3 Commentary on Disclosure Process ............................ 22 5.4 Commentary on Advisories .................................... 24 5.5 Commentary on Vendor Accessibility .......................... 24 5.6 Discovery of Issues in the Wild ............................. 25 5.7 Researcher Credibility and Vulnerability Reproduction ....... 26 5.8 Miscellaneous ............................................... 26 6 Acknowledgements .............................................. 26 7 Security Considerations ....................................... 26 8 Authors' Addresses ............................................ 27 9 Full Copyright Statement ...................................... 27 Christey & Wysopal Expires August 2002 [Page 2] Internet-Draft Responsible Vulnerability Disclosure February 2002 Document Conventions The key words "REQUIRED", "MUST", "MUST NOT", "SHOULD", "SHOULD NOT", and "MAY" in this document are to be interpreted as described in "Key words for use in RFCs to Indicate Requirement Levels" [RFC2119]. 1 Introduction and Purpose This document provides guidance and recommendations for the community of developers, vendors, end users, researchers and security professionals who wish to perform responsible vulnerability disclosure within the information technology arena. For purposes of this document, the term "responsible" refers to the recognition of a formal, repeatable process for the reporting, evaluation, resolution and publication of vulnerability information. "Vulnerability" refers to any bug, flaw, behavior, output, outcome or event within an application, system, device, or service that could lead to increased risk or security exploit. For purposes of this document, we have standardized on the term "product" to encompass the full suite of products that are addressed by this document. 1.1 Background Vulnerabilities are an inherent and unfortunate part of the design and development process. Vulnerability detection may occur during any phase of the product lifecycle, to include design, development, testing, implementation or operation. Ideally, vulnerabilities are largely prevented through a design process that considers security. However, due to a variety of reasons, many vulnerabilities are detected after a product is implemented in an operational environment and supporting customer objectives. A variety of legislative and social issues directly influences the process for vulnerability research, detection and response. Developers, customers and the security community all have divergent perspectives on the impact of vulnerabilities. Currently, vulnerability release is inconsistent and largely driven from the perspective of the party who has the greatest ability to control the process. In an effort to create a common framework by which objectives are met to the benefit of all parties, this document communicates a formal, repeatable process for addressing vulnerability disclosure in a responsible manner. This document provides a means to address the common goal of providing more secure products while reducing the risk to customers. 1.2 Major Roles in Disclosure Several types of individuals or organizations may play a role in the process of vulnerability disclosure. These roles may overlap. Christey & Wysopal Expires August 2002 [Page 3] Internet-Draft Responsible Vulnerability Disclosure February 2002 A Vendor is an individual or organization who provides, develops, or maintains software, hardware, or services, possibly for free. A Customer is the end user of the software, hardware, or service that may be affected by the vulnerability. A Reporter is the individual or organization that informs (or attempts to inform) the Vendor of the vulnerability. Note that the Reporter may not have been the initial discoverer of the problem. A Coordinator is an individual or organization who works with the Reporter and the Vendor to analyze and address the vulnerability. Coordinators are often well-known third parties. Coordinators may have resources, credibility, or working relationships that exceed those of the reporter or vendors. Coordinators may serve as proxies for reporters, help to verify the reporter's claims, resolve conflicts, and work with all parties to resolve the vulnerability in a satisfactory manner. Note: while Coordinators can facilitate the responsible disclosure process for a vulnerability, the use of Coordinators by other parties is not a requirement. The Security Community includes individuals or organizations whose primary goals include improving overall information technology security. The community includes security administrators and analysts, system administrators who are responsible for the security of their systems, commercial or non-profit organizations who provide security-related products or services, researchers and academics, informal groups, and individuals. 1.3 Motivations Individuals and organizations have a wide variety of motivations (some in direct conflict with each other) that make the disclosure process more complex. Vendors may have one or more of the following motivations. Some vendors believe that public notification may help their customers address vulnerabilities, at the possible cost of negative publicity. Some vendors may be unresponsive, or secretly fix vulnerabilities, for fear of negative publicity. Some vendors may not have the technical skills to understand the nature of the vulnerability and the risk that it poses. Customers often wish to have secure products, but security features can make it more difficult to use those products. Many customers do not care about the nature of the vulnerability. However, there is a small percentage of customers for whom vulnerability information plays a critical role in their usage of products. Some vendors may be customers of other vendors. Christey & Wysopal Expires August 2002 [Page 4] Internet-Draft Responsible Vulnerability Disclosure February 2002 Reporters have a variety of motivations. Because reporters are often the means through which vulnerability information is communicated, they have a major impact on how the disclosure process is followed. Reporters may be motivated by altruism ("to make computers more secure"), recognition or fame, marketing to highlight technical skills (for individuals as well as companies), forcing unresponsive vendors to address a vulnerability, curiosity or the challenge of vulnerability analysis, or malicious intent to damage the reputations of specific vendors, wreak havoc, or cause financial damage to customers. The vague goals of altruism are often open to different interpretations by different reporters. Reporters may be inexperienced, malicious, or have insufficient resources to follow the full process of disclosure. Reporters are seldom compensated for their important role in enhancing Internet security. The motivations for members of the security community may vary depending on the specific tasks that are being undertaken by the members. Community members may have motivations that include those of vendors, customers, and/or reporters. In addition, members of the security community may wish to track trends in vulnerabilities, identify new types of vulnerabilities, or design new products and processes to reduce the impact of vulnerabilities. Coordinators are often members of the security community, and as such may share the same motivations. Coordinators may also be required by their mission or contract to perform this role. 1.4 Goals of Responsible Disclosure The goals of responsible disclosure include: 1) Ensure that vulnerabilities can be identified and eliminated effectively and efficiently for all parties. 2) Minimize the risk to customers from vulnerabilities that could allow damage to their systems. 3) Provide customers with sufficient information for them to evaluate the level of security in vendors' products. 4) Provide the security community with the information necessary to develop tools and methods for identifying, managing, and reducing the risks of vulnerabilities in information technology. 5) Minimize the amount of time and resources required to manage vulnerability information. 6) Facilitate long-term research and development of techniques, products, and processes for avoiding or mitigating vulnerabilities. Christey & Wysopal Expires August 2002 [Page 5] Internet-Draft Responsible Vulnerability Disclosure February 2002 7) Minimize the amount of antagonism that often exists between parties as a result of different assumptions and expectations, due to the lack of consistent and explicit disclosure practices. 2 Phases of Responsible Disclosure Following are the basic phases of the responsible vulnerability disclosure process. Some of these phases may be bypassed in specific situations with agreement across all parties. In other cases, one or more parties may not be responsible, skipping some phases. 1) Latent Flaw. A flaw is introduced into a product during its design, specification, development, installation, or default configuration. 2) Discovery. One or more individuals or organizations discover the flaw through casual evaluation, by accident, or as a result of focused analysis and testing. In some cases, knowledge of the flaw may be kept within a particular group. A vulnerability report or an exploit program may be discovered "in the wild," i.e., in use by malicious attackers or made available for use and distribution. 3) Notification. A reporter or coordinator notifies the vendor of the vulnerability ("Initial Notification"). In turn, the vendor provides the reporter or coordinator with assurances that the notification was received ("Vendor Receipt"). 4) Validation. The vendor or other parties verify and validate the reporter's claims ("Reproduction"). 5) Resolution. The vendor and other parties also try to identify where the flaw resides ("Diagnosis"). The vendor develops a patch or workaround that eliminates or reduces the risk of the vulnerability ("Fix Development"). The patch is then tested by other parties (such as reporter or coordinator) to ensure that the flaw has been corrected ("Patch Testing"). 6) Release. The vendor, coordinator, and/or reporter release the information about the vulnerability, along with its resolution. The vendor may initially release this information to its customers and other organizations with which it may have special relationships ("Limited release"). The vendor or other parties may then release the information - possibly with additional details - to the security community. 7) Follow-up. The vendor, customer, coordinator, reporter, or security community may conduct additional analysis of the vulnerability or the quality of its resolution. Christey & Wysopal Expires August 2002 [Page 6] Internet-Draft Responsible Vulnerability Disclosure February 2002 3 Responsibilities in the Phases of Vulnerability Disclosure 3.1 Latent Flaw The following recommendations identify how most latent flaws can be avoided. 1) The Vendor SHOULD ensure that programmers, designers, and testers are knowledgeable about common flaws in the design and implementation of products. Rationale: Some classes of vulnerabilities are well-known and can be easily exploited using repeatable techniques. Educated programmers, designers, and testers can identify and eliminate vulnerabilities before the product is provided to customers, or prevent their introduction into the product in the first place. 2) Customers SHOULD configure their products and systems in ways that eliminate latent flaws or reduce the impact of latent flaws, including (1) removing default services that are not necessary for the operation of the affected systems, (2) limiting necessary services only to networks or systems that require access, (3) using the minimal amount of access and privileges necessary for proper functioning of the products, and (4) using security features of the product or operating system that reduce the chance that a flaw can be successfully exploited. Rationale: Many computer intrusions involve the exploitation of vulnerabilities in network services that are unnecessary for typical operating environments. In some cases, system configuration can reduce the overall risk of vulnerabilities (known and unknown). For example, the Code Red and Nimda worms of 2001 were largely successful because of these factors. 3) The Security Community SHOULD track all known vulnerabilities to identify new classes of vulnerabilities, educate the public about these types of vulnerabilities, and find ways to detect or prevent them in the development, testing, and deployment of products. 3.2 Discovery 1) The Reporter SHOULD make a reasonable effort to ensure that: - the vulnerability is real - the process of getting the product into a known exploitable state is repeatable - the vulnerability has not already been reported by the vendor or well-established vulnerability information sources Rationale: Some vulnerabilities are re-discovered after they have already been fixed, or the reporter has introduced the problem due to Christey & Wysopal Expires August 2002 [Page 7] Internet-Draft Responsible Vulnerability Disclosure February 2002 misconfiguration, or the reporter identifies the symptoms of the vulnerability without determining the cause. If the reporter ensures that the problem is new and real, then the reporter will will avoid unnecessarily consuming the time and resources spent by vendors and other parties in investigating the problem. Note: in some cases, a reporter may not be able to make a reasonable effort due to limitations of time, resources, access to the product, or expertise. In some cases, the problem may only appear intermittently, or the product is only temporarily accessible to the reporter (e.g., when the reporter is a consultant who discovers the problem in products that a customer uses). In other cases, the reporter may discover information about the vulnerability without having any access to the product. Note: in some cases, the reporter may be able to coerce the product into a state that is known to be exploitable, without creating a fully working exploit program (e.g., a buffer overflow with a long string of 'A' characters may produce a result that shows that the instruction pointer has been overwritten). This is considered a reasonable effort. 3.3 Notification Phase: Initial Notification To facilitate the disclosure process, Vendors need to be accessible to Reporters, and Reporters need to find and use the appropriate communication channels for notifying Vendors. 3.3.1 Vendor Responsibilities 1) The Vendor MUST make it as easy as possible for Reporters, Coordinators, Customers, and the Security Community to notify the Vendor of vulnerabilities. Rationale: It is often difficult for reporters or other parties to notify vendors of vulnerabilities, especially if the reporters are not customers. This may cause the parties to bypass other phases of the disclosure process, or adopt a policy that avoids vendor notification because of previous bad experiences with vendors. 2) The Vendor SHOULD establish a Security Response Capability (SRC) that consists of one or more individuals or groups that are responsible for responding to vulnerability reports, verifying vulnerabilities, releasing bulletins, etc. Christey & Wysopal Expires August 2002 [Page 8] Internet-Draft Responsible Vulnerability Disclosure February 2002 3) The Vendor SHOULD ensure that its staff knows how to recognize a reported security issue and direct it to the Security Response Capability. This recommendation applies to staff who provide support online, over the telephone, in person, or through some other means by which reporters may interact with the Vendor. 4) If the Vendor can control the e-mail addresses that it uses (e.g., it has its own domain name), then the Vendor SHOULD define and publish the "secalert" alias for use in vulnerability notification. Rationale: Currently, Vendors use a variety of aliases for notification, including "security-alert," "security," and "support." Some Vendors may use the "security" alias for physical security facilities. The "security" alias is also defined in RFC2142 for use in incident handling. The "security-alert" alias is longer than 8 characters and contains a dash, which could make it more difficult to use or locate in search engines. The "secalert" alias is not commonly used at this time, and as such it does not have the types of issues that some commonly-used aliases have. Note: smaller vendors may not be able to control which e-mail addresses they use. 5) If the Vendor operates a web site or other means of distributing information regarding its product, then the Vendor SHOULD create and publish a "security" page or folder that identifies how vulnerability reports should be made. The Vendor SHOULD make this page easy to find from other locations, such as a separate contact page or index. 6) The Vendor MUST provide a facility for individuals or organizations who are not Customers to report vulnerabilities. The Vendor SHOULD NOT require (1) an active technical support number, (2) telephone access that is not toll-free, or (3) user registration for a web site or other facility that would be used for reporting. Rationale: As described earlier, some reporters or coordinators are not necessarily customers of the Vendor. If the Vendor is not accessible to them, then they will be more likely to bypass other aspects of this process. 7) The Vendor SHOULD recognize that inexperienced or malicious reporters may not use proper notification, and define its own procedures for handling such cases. 3.3.2 Reporter Responsibilities 1) The Reporter SHOULD make reasonable efforts to use the appropriate channels for notifying the Vendor of the vulnerability: Christey & Wysopal Expires August 2002 [Page 9] Internet-Draft Responsible Vulnerability Disclosure February 2002 (a) The Reporter SHOULD attempt to notify the vendor through the channels described in this section. (b) If the Vendor is not accessible through those channels, then the Reporter MAY attempt to contact the vendor through technical support. Note: in some cases, a reporter may not be able to make a reasonable effort due to time limitations, lack of proper access to the vendor, inexperience, expense, prohibitions by the reporter's own organization, or the reporter does not meet some criteria for notification (e.g., a support contract number). 2) If the Reporter is unable to notify the Vendor, then the Reporter SHOULD ask a Coordinator to notify the Vendor. The Reporter SHOULD provide the Coordinator with a list of contacts or mechanisms that were used to attempt to notify the Vendor. Rationale: a Coordinator may appear more credible than the Reporter, or have a previously established relationship with the Vendor. The Reporter may be prohibited from disclosing the vulnerability directly to the Vendor. Note: the Coordinator will not necessarily have a different way of reaching the Vendor than the Reporter does. 3) The Reporter and/or Coordinator SHOULD record the date of notification. Rationale: This helps Customers, Reporters, Coordinators, and the Security Community track how long it takes for a Vendor to resolve a vulnerability after the initial notification. 4) The Reporter SHOULD provide the Vendor, and the Coordinator (if any), with all known details of the issue, including any programs, scripts, or pseudo-code that would allow the Vendor to reproduce and/or confirm the vulnerability. Rationale: such details make it easier for the Vendor and Coordinator to reproduce and diagnose the vulnerability, which then allows the Vendor to identify or develop a resolution more quickly. Note: some vulnerabilities may be theoretical or not well-understood in this phase of the disclosure process, and the Reporter may not have developed programs that exploit the problem. In other cases, the Reporter may be using proprietary programs to demonstrate the vulnerability. Christey & Wysopal Expires August 2002 [Page 10] Internet-Draft Responsible Vulnerability Disclosure February 2002 3.4 Notification Phase: Vendor Receipt 3.4.1 Vendor Responsibilities 1) The Vendor MUST notify the Reporter and involved Coordinators that the Vendor has received the notification. This Receipt does not necessarily imply that the Vendor has researched or reproduced the vulnerability, only that the Vendor is aware of the notification. Rationale: if the Vendor does not respond, then the Reporter or Coordinator may not be sure if the Vendor is truly aware of the reported vulnerability, and/or if the Vendor intends to resolve the vulnerability. This often causes Reporters or Coordinators to bypass later phases of the disclosure process in order to warn customers of the risks to their systems. 2) The Vendor MUST provide the Reporter and involved Coordinators with a Receipt within 7 days. Rationale: Other time frames (such as 5 business days) were considered but deemed unworkable due to international issues (e.g., "work weeks" may fall on different days in different countries, there are different national or religious holidays). Defining a time frame relative to the Vendor or Reporter could not work without some form of communication between both parties. Note: small but responsible Vendors or individuals may not be able to provide this degree of responsiveness, especially during vacation periods. Reporters and Coordinators SHOULD take this into account during the notification phase. Small, responsible Vendors SHOULD post some clear notification when it is known that such delays will occur. 3) If the Vendor's receipt message is automatically generated, then it SHOULD include a time period or date by which an individual (or the Security Response Capability) will provide follow-up on the reported vulnerability. The time period SHOULD NOT exceed 10 days. 4) Within 10 days of initial notification, the Vendor's Security Response Capability SHOULD provide a clear response to the Reporter and any involved Coordinators. 3.5 Validation Phase 3.5.1 Vendor Responsibilities 1) If the vulnerability is found in a supported product, the Vendor MUST either (1) reproduce the vulnerability, (2) determine if there is enough evidence for the existence of the vulnerability when it Christey & Wysopal Expires August 2002 [Page 11] Internet-Draft Responsible Vulnerability Disclosure February 2002 cannot be reproduced, (3) determine if the vulnerability is already known (and possibly resolved), or (4) work with the Reporter to determine if the vulnerability is related to the specific environment in which it was discovered (including configuration errors or interactions with other products). 2) If the vulnerability is found in an unsupported or discontinued product, the Vendor MAY refuse to validate the vulnerability. However, the Vendor MUST ensure that the reported vulnerability does not exist in supported product versions or other supported products based on the vulnerable product. 3) The Vendor SHOULD NOT assume that the risk or impact of the vulnerability is limited to what has been identified by the Reporter or involved Coordinator. Rationale: The Reporter or involved Coordinator may not have sufficient experience or time to identify the full scope of the problem. Sometimes, a theoretical vulnerability is later found to be more easily exploitable as a result of follow-on analysis or the creation of a tool. For example, it may be easy for a Reporter to find evidence of a buffer overflow vulnerability by sending a long argument that causes a product to crash. It is an indicator that a carefully crafted program could be used to execute arbitrary code. The Reporter and Vendor may not have the skills or resources to create such a program, but such a program could be created in the future. 4) The Vendor SHOULD examine its product to ensure that it is free of other problems that are similar to the reported vulnerability. Rationale: some Vendors reproduce and resolve the specific issue that is identified by the Reporter without extending their analysis to see if similar mistakes were made elsewhere in the product. The Reporter, others in the Security Community, or hackers may conduct follow-on research to find these other vulnerabilities. This can result in a cycle in which vulnerabilities are discovered and patched so often that it becomes difficult for customers to manage the volume of resolutions that they need to apply. 5) The Vendor MUST consult with the Reporter and involved Coordinators when more information or analysis is needed. 6) The Vendor SHOULD provide status updates to the Reporter and any involved Coordinators every 7 days. The Vendor MAY negotiate with the parties for less frequent updates. 7) The Vendor MUST notify the Reporter and any involved Coordinators when the Vendor is able to reproduce the vulnerability. Christey & Wysopal Expires August 2002 [Page 12] Internet-Draft Responsible Vulnerability Disclosure February 2002 8) The Vendor SHOULD attempt to resolve the vulnerability within 30 days of initial notification. 9) If the Vendor cannot resolve the vulnerability within 30 days, then the Vendor MUST provide the Reporter and involved Coordinators with specific reasons why the vulnerability cannot be resolved. 10) If the Vendor is aware of other vendors that share the same codebase as the affected product, then the Vendor MUST either (1) notify those vendors, or (2) notify a Coordinator that other Vendors may be affected by the reported vulnerability. 3.5.2 Reporter Responsibilities 1) The Reporter SHOULD work with the Vendor in a timely fashion to explain the vulnerability and conduct further analysis. Rationale: if a problem is sufficiently complex or only appears in a portion of deployed systems, then the Vendor may not be able to reproduce the issue. In other cases, the Vendor may not understand the problem. If the Reporter is slow to respond, then this can extend the time window during which Customers are at risk. 2) If the Vendor does not understand the nature, risk, or resolution of the vulnerability, then the Reporter or involved Coordinators SHOULD provide the Vendor with resources that help to explain the vulnerability. Note: Some Vendors may require - or insist - upon extensive consultation to identify the vulnerability. Reporters and Coordinators may not have the time or resources to provide such assistance. 3) If the Reporter does not have the time or resources to conduct such analysis, then the Reporter SHOULD notify the Vendor and suggest alternate contacts (such as Coordinators) who may be able to assist the Vendor. The Reporter SHOULD NOT attempt to bypass later phases. 4) If the Reporter finds that the Reporter is in error, then the Reporter SHOULD notify the Vendor and involved Coordinators. Rationale: if a Reporter does not perform this notification, then the Vendors or Coordinators may continue to spend unnecessary resources on further analysis of the issue. 5) The Reporter SHOULD grant time extensions to the Vendor if there is evidence that the Vendor is acting in good faith to resolve the vulnerability. Christey & Wysopal Expires August 2002 [Page 13] Internet-Draft Responsible Vulnerability Disclosure February 2002 6) If the Vendor is unresponsive or disagrees with the Reporter's findings, then the Reporter SHOULD involve a Coordinator. 3.5.3 Coordinator Responsibilities 1) The Coordinator MUST attempt to resolve any conflicts or technical disagreements that arise between the Reporter and the Vendor. 2) If a Vendor is unresponsive or does not appear to be acting in good faith to resolve the vulnerability, then the Coordinator SHOULD attempt to convince the Vendor to follow the proper process. 3) If a Reporter is unresponsive or does not appear to be acting in good faith to resolve the vulnerability, then the Coordinator SHOULD attempt to convince the Reporter to follow the proper process. 4) The Coordinator SHOULD work with the Vendor and Reporter to determine if other Vendors are affected by the same problem. 5) The Coordinator SHOULD work with the Vendor and Reporter to identify time extensions (if any) that are acceptable to all parties. 3.6 Resolution Phase The "Resolution" of a vulnerability involves action regarding one or more of the following: - patch creation - recommendation of configuration change - design change - workaround - no action If the Vendor does not participate or is unresponsive, then the Reporter and Coordinator might not be able to create a patch or change the design of the product. 3.6.1 Vendor Responsibilities 1) The Vendor MUST identify the fundamental nature of the flaw within the source code or in the design of the product ("Diagnosis"). 2) The Vendor MUST either (1) provide a patch, configuration change, or workaround that appropriately reduces or eliminates the risk of the vulnerability ("Fix Development"), or (2) provide the Reporter and involved Coordinators with specific reasons for its inaction. Christey & Wysopal Expires August 2002 [Page 14] Internet-Draft Responsible Vulnerability Disclosure February 2002 3) The Vendor SHOULD request time extensions from the Reporter and involved Coordinators when necessary. 4) The Vendor SHOULD test the patches, configuration changes, and workarounds sufficiently to ensure that either (1) they do not adversely affect the operation of the product, or (2) it is clear which conditions may adversely affect the operation of the product. Rationale: Vendors may be pressured to quickly resolve vulnerabilities without sufficient testing, especially when Reporters have bypassed the Notification or Validation phases. As a result, the resolution may adversely affect more systems than necessary. 5) The Vendor MUST provide the Reporter and involved Coordinators with all known configuration changes or workarounds that address the vulnerability ("Fix Development"). 6) The Vendor SHOULD provide the Reporter and involved Coordinators with any patches ("Patch Testing"). Rationale: this helps the Reporter and Coordinator to confirm that the vulnerability has been reduced or eliminated. Note: the Vendor's business model may require that only supported Customers can have access to a patch, which could exclude Reporters or Coordinators. Such Vendors should recognize that this practice may result in an incomplete patch that does not address the vulnerability in question. 7) If the Reporter is unresponsive or uncooperative, or a dispute arises, then the Vendor SHOULD work with a Coordinator to identify the best available resolution for the vulnerability. 3.6.2 Reporter Responsibilities 1) The Reporter SHOULD recognize that it may be difficult for a Vendor to resolve a vulnerability within 30 days if (1) the problem is related to insecure design, (2) the Vendor has a diverse set of hardware, operating systems, and/or product versions to support, or (3) the Vendor is not skilled in security. 2) The Reporter SHOULD grant time extensions to the Vendor if the Vendor is acting in good faith to resolve the vulnerability. 3) If the Vendor is unresponsive or uncooperative, or a dispute arises, then the Reporter SHOULD work with a Coordinator to identify the best available resolution for the vulnerability. Christey & Wysopal Expires August 2002 [Page 15] Internet-Draft Responsible Vulnerability Disclosure February 2002 3.7 Release Phase 3.7.1 Vendor Responsibilities 1) The Vendor SHOULD work with the Reporter and involved Coordinators to arrange a date after which the vulnerability information may be released. 2) The Vendor MAY ask the Reporter and Coordinator to allow a "Grace Period" up to 30 days, during which the Reporter and Coordinator do not release details of the vulnerability that could make it easier for hackers to create exploit programs. Rationale: a grace period provides Customers with a time period in which they can fix their systems. During this time, the lack of details may make it more difficult or resource-intensive for attackers to determine the nature of the vulnerability and craft an exploit. However, some security-aware Customers desire such details so that they can better decide whether the resolution of the vulnerability is appropriate for their environment. In addition, some members of the Security Community desire such details in order to (1) enhance tools or techniques to detect vulnerable systems on Customer networks (such as vulnerability scanners), (2) enhance tools or techniques to detect attempts to exploit vulnerabilities on Customer networks (such as intrusion detection systems), (3) provide databases or other information that Customers use to identify and prioritize vulnerabilities that may affect the Customer's enterprise, and (4) perform research and trend analysis. 3) If the Reporter has not properly followed the process and publicly announces the vulnerability, then the Vendor SHOULD post its awareness of the vulnerability, and the Vendor's progress in its resolution, to appropriate forums. Rationale: this allows Customers and the Security Community to know that the Vendor is aware of the problem and working to resolve it. Note: some Vendors may not wish to acknowledge such vulnerabilities until a patch is available. 4) If a Reporter has properly followed the process, then the Vendor MUST provide credit to that reporter. 5) If a Coordinator has properly followed the process, then the Vendor SHOULD provide credit to the Coordinator. 6) If a Reporter has not properly followed the process and publicly announces the vulnerability, then the Vendor MAY provide credit to the reporter. Christey & Wysopal Expires August 2002 [Page 16] Internet-Draft Responsible Vulnerability Disclosure February 2002 Rationale: Some people believe that even if a reporter has not followed the procedures properly, the reporter has still provided valuable information that is useful to the Vendor, Customers, Coordinators, and the Security Community, and academic integrity would dictate that reporters should be credited. However, since credit is a motivation for some reporters, others believe that irresponsible reporters should not be encouraged to bypass the process and still get credit. 7) The Vendor MUST NOT assume that the lack of vulnerability details will prevent the creation of an exploit. Rationale: If the Vendor provides source code for the product, then any entity who has access to the product could easily determine the specific locations of the vulnerability and identify possible attack vectors that reach the vulnerable code. If the Vendor does not provide source code, then any entity who has access to a patch could use reverse engineering techniques to determine how the code was changed, then infer the nature of the vulnerability. 8) The Vendor SHOULD cryptographically sign all patches using a method that is commonly accessible on the platforms for the Vendor's product. The Vendor should clearly advertise its cryptographic key and provide cryptographic checksums for its patches. Rationale: This increases the assurance that the patches from the Vendor are authentic. 9) The Vendor SHOULD provide an easily accessible mechanism for Customers and the Security Community to obtain all security advisories, such as a web page. The most recent advisory SHOULD be listed first. 10) The Vendor SHOULD provide a mechanism for notifying Customers and the Security Community when new advisories are published. 11) The Vendor SHOULD provide a means for the Security Community to identify which reported vulnerabilities are genuine, but are not regarded by the Vendor as important enough to merit a security advisory. Rationale: Vendors are often unwilling to release security advisories unless the security issue is critical for its Customers. This can reduce operating expenses for the Vendor and most Customers. However, some members of the Security Community, and some Customers, also prefer to protect themselves against less serious vulnerabilities. If a Vendor does not at least indicate to its security-aware Customers that a security-related resolution is available, then those Customers may remain at risk for Christey & Wysopal Expires August 2002 [Page 17] Internet-Draft Responsible Vulnerability Disclosure February 2002 vulnerabilities that they would otherwise wish to resolve. 12) The Vendor SHOULD provide an easily accessible indicator that allows a Customer to determine if the resolution has been applied to a system, e.g., by modifying the product's version number or providing the Customer with a tool that identifies the resolutions that have been applied to a product. 3.7.2 Reporter Responsibilities 1) The Reporter SHOULD work with the Vendor and involved Coordinators to arrange a date after which the vulnerability information may be released. 2) If the Vendor has not resolved the vulnerability within a time frame that is allowed by this process, then the Reporter SHOULD work with a Coordinator to announce the vulnerability to Customers and the Security Community. 3) If another reporter has not properly followed the process and publicly announced the vulnerability, then the Reporter MAY announce that the Reporter was responsibly following the disclosure process with the Vendor and involved Coordinators. 4) If a Vendor requests a Grace Period, then the Reporter SHOULD follow the Grace Period before releasing details of the vulnerability. 5) After the Grace Period, the Reporter MAY release additional details. The Reporter SHOULD carefully consider how much detail is needed by Customers and the Security Community. Note: in some cases, the nature of the vulnerability could make it difficult or impossible to release vulnerability details that do not allow someone to exploit the vulnerability. 6) The Reporter SHOULD provide credit to any Vendor and/or Coordinator who has followed the process. 3.7.3 Coordinator Responsibilities 1) The Coordinator SHOULD work with the Vendor and Reporter to arrange a date after which the vulnerability information may be released. 2) If the Vendor requests a Grace Period, the Coordinator SHOULD follow the Grace Period and encourage the Reporter to follow the Grace Period. Christey & Wysopal Expires August 2002 [Page 18] Internet-Draft Responsible Vulnerability Disclosure February 2002 3) The Coordinator SHOULD provide credit to any Vendor and/or Reporter who properly follows the process. 4) The Coordinator MAY provide credit to a reporter who has not properly followed the process. 3.7.4 Customer Responsibilities 1) The Customer MUST NOT assume that the lack of details will prevent the creation of an exploit. 2) If the Vendor has released information regarding the vulnerability, then the Customer SHOULD assume that the information is credible. The Customer SHOULD NOT require that the vulnerability be demonstrated before applying the resolution. 3) If the Vendor has not released such information, but a well-established Reporter or Coordinator has, then the Customer SHOULD assume that the information is credible. The Customer SHOULD NOT require that the vulnerability be demonstrated before applying the resolution. 4) If vulnerability information has been released and a Grace Period exists, then the Customer SHOULD apply the resolution to its systems during the Grace Period. 5) Where possible, the Customer SHOULD test any patches, configuration changes, or workarounds on test systems before making the changes in an operational environment. 6) The Customer SHOULD inform the Vendor and the Security Community if a patch, configuration change, or workaround does not appear to work properly. 7) The Customer SHOULD give preference to products whose Vendors follow responsible disclosure practices. 3.7.5 Security Community Responsibilities 1) The Security Community SHOULD publicly recognize all Vendors, Reporters, and Coordinators who follow responsible vulnerability disclosure. 2) The Security Community SHOULD adopt a set of terms that allows all parties to describe the inherent risk or impact of a vulnerability that can be interpreted in various environments, threat levels, and policies. Christey & Wysopal Expires August 2002 [Page 19] Internet-Draft Responsible Vulnerability Disclosure February 2002 Rationale: Customers have varying operational needs at different levels of security, which can make it difficult to define a "one size fits all" risk level for any vulnerability. Current terminology often uses a "High, Medium, Low" breakdown, but there are no formal definitions. As such, this terminology is used inconsistently, partially because it is based on the perspective of the entity who is using it. It is also insufficient to capture the complexity and tradeoffs of vulnerabilities in today's environment. 3.8 Follow-Up Phase 1) The Vendor SHOULD clearly notify Customers and the Security Community when a resolution is (a) faulty, or (b) revised. 2) The Vendor SHOULD NOT re-release the same advisory for newly discovered, closely related vulnerabilities. Rationale: The re-release of an advisory may not be noticed as well by Customers, which could cause the Customers to believe that their systems are secure because they applied the resolution that was identified in the original advisory. 4 Policy Publication 4.1 Vendor Policy A Vendor SHOULD publish a policy and procedures statement that includes the following information: 1) Where it complies (and does not comply) with the process outlined in this document. 2) The typical amount of time after notification that the Vendor requires to produce a resolution. 3) The Grace Period, if any, that the Vendor wishes to observe. 4) How the Vendor determines whether a reported problem is serious enough to merit a security advisory. 4.2 Reporter Policy If a Reporter is a member of the Security Community and the Reporter frequently finds new vulnerabilities, then the Reporter SHOULD publish a policy and procedures statement that includes the following information: 1) Where it complies (and does not comply) with the process outlined in this document. Christey & Wysopal Expires August 2002 [Page 20] Internet-Draft Responsible Vulnerability Disclosure February 2002 2) The maximum Grace Period that the Reporter is willing to follow. 4.3 Coordinator Policy A Coordinator SHOULD publish a policy and procedures statement that includes the following information: 1) Where the Coordinator complies (and does not comply) with the process outlined in this document. 2) The maximum Grace Period that the Coordinator is willing to follow. 5 References Note: many of these references identify posted messages to security-related mailing lists. These messages often resulted in long threads that explore the related issues in more depth. 5.1 Disclosure Policies RFPolicy 2.0 http://www.wiretrip.net/rfp/policy.html Bugtraq Frequently Asked Questions http://www.securityfocus.com/popups/forums/bugtraq/faq.shtml NTBugtraq Disclosure Policy http://ntbugtraq.ntadvice.com/default.asp?sid=1&pid=47&aid=48 CERT/CC Vulnerability Disclosure Policy http://www.kb.cert.org/vuls/html/disclosure/ ACROS ASPR Notification and Publishing Policy http://www.acros.si/aspr_policy.html NMRC policy http://www.nmrc.org/advise/policy.txt @stake Security Advisory Disclosure Policy http://www.atstake.com/research/policy/index.html 5.2 Commentary on Disclosure Details "Full Disclosure is a necessary evil" Elias Levy SecurityFocus web site August 16, 2001 http://www.securityfocus.com/news/238 Christey & Wysopal Expires August 2002 [Page 21] Internet-Draft Responsible Vulnerability Disclosure February 2002 "It's Time to End Information Anarchy" Scott Culp Microsoft web site October 2001 http://www.microsoft.com/technet/columns/security/noarch.asp "Security in an Open Electronic Society" Elias Levy SecurityFocus web site October 21, 2001. http://www.securityfocus.com/news/270 "Full Disclosure" Bruce Schneier Crypto-Gram Newsletter November 15, 2001 http://www.counterpane.com/crypto-gram-0111.html#1 "Script Kiddies Suck" Marcus Ranum Black Hat Briefings presentation July 2000 http://web.ranum.com/usenix/blackhat-2000-keynote.mp3 "The Network Police Blotter: The Slaughter of the Innocents" Marcus Ranum ;Login: magazine October 2000 http://web.ranum.com/usenix/ranum_5_temp.pdf 5.3 Commentary on Disclosure Process "Bugs in the Disclosure Process" Ivan Arce TISC Insight, Volume 3, Issue 3 February 9, 2001 http://tisc.corecom.com/newsletters/33.html "SUMMARY: Bug announcement rule of thumb." Bill Stout NTBugtraq mailing list August 13, 1998 http://marc.theaimsgroup.com/?l=ntbugtraq&m=90310164223252&w=2 Christey & Wysopal Expires August 2002 [Page 22] Internet-Draft Responsible Vulnerability Disclosure February 2002 "Microsoft admits IE security alert lapse" Wendy McAuliffe ZDNet November 19, 2001 http://www.zdnet.com/filters/printerfriendly/ 0,6061,2825716-2,00.html "RFP2K03: Contemplations on dvwssr.dll and its affects on life" Rain Forest Puppy Bugtraq mailing list April 20, 2000 http://www.securityfocus.com/archive/1/56394 "Xato Advisory: Win2k/XP Terminal Services IP Spoofing" Xato Bugtraq mailing list November 14, 2001 http://www.securityfocus.com/archive/1/240248 "Vulnerability Escrow (was: Extreme Hacking)" Crispin Cowan NFR Wizards mailing list July 7, 1999 http://archives.neohapsis.com/archives/nfr-wizards/1999_2/0416.html "Can we afford full disclosure of security holes?" Richard M. Smith Bugtraq mailing list August 10, 2001 http://www.securityfocus.com/archive/1/203499 "Anti-Web 'Vulnerability' is a false alarm" Doug Hoyte Vuln-Dev mailing list December 1, 2001 http://marc.theaimsgroup.com/?l=vuln-dev&m=100732828128718&w=2 "Windows of Vulnerability: A Case Study Analysis" William A. Arbaugh, William L. Fithen, John McHugh IEEE Computer December 2000 "Sun denies Unix flaw" John Geralds vnunet.com November 20, 2001 http://www.vnunet.com/News/1126973 Christey & Wysopal Expires August 2002 [Page 23] Internet-Draft Responsible Vulnerability Disclosure February 2002 "Open Response To Microsoft Security - RE: It's Time to End Information Anarchy" Steve Manzuik Vuln-Dev mailing list October 17, 2001 http://archives.neohapsis.com/archives/vuln-dev/2001-q4/0195.html "A Step Towards Information Anarchy: A Call To Arms" hellNbak Nomad Mobile Research Center November 2, 2001 http://www.nmrc.org/InfoAnarchy/InfoAnarchy.htm "To Disclose or Not to Disclose, That Is the Question" Mark Joseph Edwards Windows 2000 Magazine June 27, 2001 http://www.windowsitsecurity.com/Articles/Index.cfm?ArticleID=21618 "Towards a responsible vulnerability process" David LeBlanc NTBugtraq mailing list November 3, 2001 http://archives.neohapsis.com/archives/ntbugtraq/2001-q4/0097.html 5.4 Commentary on Advisories "Writing security advisories" Kurt Seifried September 10, 2001 http://www.seifried.org/security/articles/ 20010910-writing-security-advisories.html "Xato commentary on MS security bulletins" Xato Bugtraq mailing list December 7, 2000 http://marc.theaimsgroup.com/?l=bugtraq&m=97626305317046&w=2 5.5 Commentary on Vendor Accessibility "Getting to the Third Wave of Security Responsiveness" Scott Culp January 2001 http://www.microsoft.com/technet/columns/security/thrdwave.asp Christey & Wysopal Expires August 2002 [Page 24] Internet-Draft Responsible Vulnerability Disclosure February 2002 "An informal analysis of vendor acknowledgement of vulnerabilities" Steve Christey, Barbara Pease Bugtraq mailing list March 11, 2001 http://marc.theaimsgroup.com/?l=bugtraq&m=98438570915835&w=2 "Shockwave Flash buffer overflow" Neal Krawetz Bugtraq mailing list December 29, 2000 http://marc.theaimsgroup.com/?l=bugtraq&m=97845942432045&w=2 "Re: Shockwave Flash buffer overflow" Peter Santangeli Bugtraq mailing list January 5, 2001 http://marc.theaimsgroup.com/?l=bugtraq&m=97897439808223&w=2 "Re: SafeWord Agent for SSH (secure shell) vulnerability" Leif Nixon Bugtraq mailing list November 29, 2001 http://marc.theaimsgroup.com/?l=bugtraq&m=100706579514862&w=2 5.6 Discovery of Issues in the Wild "sadmind" Nancy Lin SF-INCIDENTS mailing list December 9, 1999 http://marc.theaimsgroup.com/?l=incidents&m=94476722417209&w=2 "sadmind exploits (remote sparc/x86)" Marcy Abene Bugtraq mailing list December 10, 1999 http://marc.theaimsgroup.com/?l=bugtraq&m=94486731225359&w=2 "IIS %c1%1c remote command execution" Rain Forest Puppy Bugtraq mailing list October 17, 2000 http://marc.theaimsgroup.com/?l=bugtraq&m=97180137413891&w=2 Christey & Wysopal Expires August 2002 [Page 25] Internet-Draft Responsible Vulnerability Disclosure February 2002 5.7 Researcher Credibility and Vulnerability Reproduction "vCard DoS on Outlook 2000" Joel Moses Bugtraq mailing list August 31, 2000 http://marc.theaimsgroup.com/?l=bugtraq&m=96774764029236&w=2 "Microsoft Outlook 2000 vCard Buffer Overrun" @stake February 26, 2001 http://www.atstake.com/research/advisories/2001/a022301-1.txt "Re: Microsoft Security Bulletin MS01-012" Joel Moses Bugtraq mailing list February 23, 2001 http://marc.theaimsgroup.com/?l=bugtraq&m=98322714210100&w=2 5.8 Miscellaneous "Vulnerability disclosure publications and discussion tracking" University of Oulu November 20, 2001 http://www.ee.oulu.fi/research/ouspg/sage/disclosure-tracking/ "Devil in the details - why package signing matters" Kurt Seifried October 24, 2001 http://www.seifried.org/security/articles/ 20011023-devil-in-details.html 6 Acknowledgements We gratefully acknowledge the constructive comments received from several contributors. Any errors or inconsistencies in this document are solely the responsibility of the authors, and not of the reviewers. This document does not necessarily reflect the opinion of the reviewers or their parent organizations. We would like to thank Andy Balinsky, Mary Ann Davidson, Elias Levy, Russ Cooper, Scott Blake, Seth Arnold, Rain Forest Puppy, Marcus Ranum, Lori Woeler, Adam Shostack, Mark Loveless, Scott Culp, and Shawn Hernan for their valuable input. 7 Security Considerations This entire document discusses security issues. Christey & Wysopal Expires August 2002 [Page 26] Internet-Draft Responsible Vulnerability Disclosure February 2002 8 Authors' Addresses Steve Christey The MITRE Corporation 202 Burlington Road Bedford, MA 01730 USA E-Mail: coley@m... Chris Wysopal @stake, Inc. 196 Broadway Cambridge, MA 02139-1902 USA E-Mail: cwysopal@a... 9 Full Copyright Statement Copyright (C) The Internet Society (2002). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organisations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. This document expires August 12, 2002. Christey & Wysopal Expires August 2002 [Page 27] 5056 From: James Goldston Date: Mon Mar 25, 2002 0:34pm Subject: RE: Internet Draft - Responsible Vulnerability Disclosure The RFC has been withdrawn by its authors. See below. James =-=-=-=-=-=-= ISN message -=-=-=-=-=-=-= http://www.newsbytes.com/news/02/175273.html By Brian McWilliams, Newsbytes BURLINGTON, MASSACHUSETTS, U.S.A., 18 Mar 2002, 2:26 PM CST Proponents of an effort to standardize the handling of computer security vulnerabilities today aborted the effort after receiving critical comments from reviewers. In a message today to members of the Internet Engineering Task Force's Security Area Advisory Group, the authors announced they were withdrawing the draft in response to feedback from members who felt the document was not appropriate for the IETF "since it does not deal with technical protocols." The proposed standard, laid out in a document called "Responsible Vulnerability Disclosure Process," was submitted last month to the IETF, an Internet standards body, by Steve Christey and Chris Wysopal, security researchers from Mitre Corp. and AtStake, respectively. The document proposed a set of "best practices" to be used by product vendors, security researchers and others involved in the disclosure of computer security flaws. "There does not appear to be any way to achieve consensus on that issue, regardless of the merits of the current draft or any future document that may attempt to describe disclosure recommendations," said Christey in the message today. Christey and Wysopal were not immediately available for comment. The announcement of the proposed standard's demise stated that the authors are "currently identifying other forums that may be more suitable for discussion of the current document and future revisions. If we can't find such a forum, we will create one." Under the proposed standard, discoverers of security bugs will honor a 30-day grace period after reporting a security flaw to a vendor before disclosing details of the vulnerability. Vendors in turn are to acknowledge reports of bugs within seven days, and to set up a special e-mail address for receiving reports. The draft follows an October 2001 call for responsible disclosure from Scott Culp, head of Microsoft's security response center. In a much-discussed document at the Microsoft site, Culp decried what he called the state of "information anarchy" surrounding the current security reporting process. While many security researchers and vendors already follow the practices detailed in the proposed IETF standard, others expressed concerns that codifying a reporting standard could have negative consequences. In a posting to the SAAG mailing list last month titled "Thanks, I am not buying this RFC," Georgi Guninski, a Bulgarian security consultant, stated that the proposed standard could allow vendors to label bug finders as "irresponsible while shifting the focus from their buggyware." According to an acknowledgments section, the draft document reflected input from several key security industry figures, including the leaders of security at Microsoft and Oracle, as well as representatives from top security consulting firms and the Computer Emergency Response Team. The draft IETF vulnerability disclosure document is at http://www.ietf.org/internet-drafts/draft-christey-wysopal-vuln-disclosure- 00.txt - ISN is currently hosted by Attrition.org To unsubscribe email majordomo@a... with 'unsubscribe isn' in the BODY of the mail. =-=-=-=-=-=-= End of ISN message -=-=-=-=-=-=-= > -----Original Message----- > From: Matthew Paulsen [mailto:mpaulsen6@a...] > Sent: Monday, March 25, 2002 11:20 AM > To: tscm-l@yahoogroups.com > Subject: [TSCM-L] Internet Draft - Responsible Vulnerability Disclosure > > > Worth a read. May make companies legally liable for not fixing security > holes. > > http://www.ietf.org/internet-drafts/draft-christey-wysopal-vuln-d > isclosure-0 > 0.txt > > > Internet Engineering Task Force Steve Christey > INTERNET-DRAFT MITRE > Valid for six months Chris Wysopal > Category: Best Current Practice @stake, Inc. > February 2002 > > Responsible Vulnerability Disclosure Process > draft-christey-wysopal-vuln-disclosure-00.txt > > Status of this Memo > > This document is an Internet-Draft and is in full conformance with [snip] 5057 From: Richard Gray Date: Sun Mar 24, 2002 3:32pm Subject: Introduction Hello: I am a private investigator in Louisiana. I currently do not offer TSCM service because I don't have an adequate base knowledge, but plan to offer it in the future after receiving training. It amazes me how many of my local colleagues purchase a $1,000.00 RF Sweeper and offer countermeasures sweeps, but have absolutely no idea about what they are doing. I guess this is prevalent in any industry. Anyhow, what organizations provide training for countermeasures work? I would prefer online learning with minimal travel. Thanks in advance for any assistance, Richard Gray _________________________________ Richard T. Gray Jr. Legal Investigator License No. 1914-050896-LA Gray & Associates, LLC PO Box 2368 Crowley, LA 70527 337-785-0046 Voice 800-394-8216 Fax www.la-pi.com ricky@l... "When you need to know!" TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 5058 From: greendots . Date: Sun Mar 24, 2002 2:27pm Subject: blonde joke Q: Why are blonde jokes only "one liners"? A: So brunettes can understand them. --- _________________________________________________________________ MSN Photos is the easiest way to share and print your photos: http://photos.msn.com/support/worldwide.aspx 5059 From: James M. Atkinson Date: Mon Mar 25, 2002 9:16pm Subject: Mini spy cameras record brisk sales in China after Taiwan sex scandal http://www.hindustantimes.com/nonfram/210302/dLFOR21.asp Mini spy cameras record brisk sales in China after Taiwan sex scandal AFP Beijing, March 21 Sales of miniature spy cameras have boomed in China after a hidden device was used to record the sexual exploits of a Taiwanese politician, state media said on Thursday. Many of the cameras, which sell for as little as 100 yuan (12 dollars), are bought by people who wish to supervise their spouse's activities, the China Daily reported. Sales of the devices began to rocket after Taiwanese politician Chu Mei-feng's romp with a married lover was secretly filmed, with the salacious escapade then watched by an eager public via pirate VCDs and the Internet. News of the liaison was also heavily featured on mainland Chinese Internet sites. "I wholesaled more than 400 micro-cameras last month," a dealer at an electrical appliance shop in the southern city of Guangzhou told the paper. The suddenly growing interest in the mini-cameras is causing some concern in China among those who believe it could pose a major challenge to privacy. "Residents feel unsafe as this method has been used to expose aspects of people's private lives," said Weng Weiquan, a member of the National People's Congress, China's parliament. But there is little people can do except sue if their privacy has been violated, since China has no regulations supervising the sale of surveillance equipment, the paper said. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5060 From: Date: Mon Mar 25, 2002 5:34am Subject: Body Scanner Photos Websites of interest: 1. www.aclu.org/issues/privacy/bodyscanner.html (New airport scanner photos.) 2. Philadelphia Inquirer front page of Sunday issue (3-24-02) "Drive-by hackers hunt free, easy Web access". WWW. philly.com and www.phillynews.com 5061 From: ed Date: Mon Mar 25, 2002 5:00pm Subject: bill allows investigators to plant a listening device indefinitely http://www.latimes.com/news/nationworld/nation/la-000021670mar25.story?coll=la%2Dheadlines%2Dnation Maryland's proposal would expand the ability of police to tap phones by allowing investigators to plant a listening device indefinitely, not just for 30 days. It would, for the first time, permit use of a "roving wiretap" to record a suspect's conversations on multiple phones with a single warrant.... 5062 From: Steve Uhrig Date: Tue Mar 26, 2002 10:44am Subject: Re: bill allows investigators to plant a listening device indefinitely Once upon a midnight dreary, ed pondered, weak and weary: > Maryland's proposal would expand the ability of police to tap phones by > allowing investigators to plant a listening device indefinitely, not just > for 30 days. It would, for the first time, permit use of a "roving > wiretap" to record a suspect's conversations on multiple phones with a > single warrant.... This pretty much is basic CALEA. MD will try to claim they invented it, and the feds ran with it. Maryland has been toughening up on wiretap laws, not relaxing them. I live in MD. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5063 From: James M. Atkinson Date: Tue Mar 26, 2002 3:50pm Subject: Threat from Foreign Economic Collection and Industrial Espionage http://www.ncix.gov/pubs/reports/fy01.htm http://www.ncix.gov/docs/fecie_fy01.pdf 2001 This report was prepared by the Office of the National Counterintelligence Executive and is not available in hard copy. However, it is in PDF format and can be downloaded by using the link at the bottom of this page. Scope Note This annual report reviews the threat from foreign economic collection and industrial espionage and is conducted in compliance with a Congressional mandate. Reporting throughout calendar year 2000 showed continued efforts by foreign governments, corporations, and individuals to acquire US proprietary economic information. The Intelligence Authorization Act for Fiscal Year 1995, Section 809(b), Public Law 103-359 requires that the President annually submit to Congress updated information on the threat to US industry from foreign economic collection and industrial espionage. This report updates the sixth Annual Report to Congress on Foreign Economic Collection and Industrial Espionage, disseminated in September 2000 and covers intelligence reporting and other information from calendar year 2000. The Authorization Act specifies that the annual report is to examine three aspects of the threat to US industry: the number and identity of the foreign governments believed to be conducting industrial espionage, the industrial sectors and types of information and technology targeted by such espionage, and the methods used to conduct espionage. To prepare this assessment, the Office of the National Counterintelligence Executive (NCIX) requested the assistance of the Intelligence Community (IC). The following government agencies provided individual assessments for this report: *Air Force Office of Special Investigations (AFOSI). *Central Intelligence Agency (CIA). *Defense Intelligence Agency (DIA). *Defense Security Service (DSS). *Department of Energy (DOE). *Department of State, including the Bureau of Intelligence and Research and the Bureau of Diplomatic Security. *Federal Bureau of Investigation (FBI). *Army Counterintelligence Center (ACIC). *Naval Criminal Investigative Service (NCIS). *National Reconnaissance Office (NRO). *National Security Agency (NSA). *US Customs Service. Key Findings As the world's leading industrial power and leader in technology development, the United States continues to be a prime target of foreign economic collection and industrial espionage. The United States pays a high financial price for economic espionage. The business community estimates that, in calendar year 2000, economic espionage cost from $100-250 billion in lost sales. The greatest losses to US companies involve information concerning manufacturing processes and research and development. Increasing competition for limited global resources will intensify economic collection against the United States, including the theft of trade secrets and competitive business information. Definitions Economic Espionage. There is no consensus within the US Government on the definition of economic espionage. For the purposes of this report, NCIX will use the US Attorney General's definition of economic espionage as "the unlawful or clandestine targeting or acquisition of sensitive financial, trade, or economic policy information; proprietary economic information; or critical technologies." This definition excludes the collection of public domain and legally available information that constitutes a significant majority of economic collection. Aggressive intelligence collection that is entirely in the public domain and is legal may harm US industry, but it is not espionage. It, however, may help foreign intelligence services identify and fill information gaps that could be a precursor to economic espionage.a Industrial Espionage. According to the Justice Department, industrial espionage is defined "as activity conducted by a foreign . . . government or by a foreign company with the direct assistance of a foreign government against a private US company for the sole purpose of acquiring commercial secrets." This definition does not extend to the activity of private entities conducted without foreign government involvement, nor does it pertain to lawful efforts to obtain commercially useful information, such as information available on the Internet. Although some open-collection efforts may be a precursor to clandestine collection, they do not constitute industrial espionage. Some countries have a long history of ties between government and industry; however, it is often difficult to ascertain whether espionage has been committed under foreign government sponsorship, a necessary requirement under the Economic Espionage Act, Title 18 U.S.C., Section 1831. Proprietary Information. Another term used in this report is proprietary information, the definition of which is information not within the public domain and that which the owner has taken some measures to protect. Generally, such information concerns US business and economic resources, activities, research and development, policies, and critical technologies. Although it may be unclassified, the loss of this information could impede the ability of the United States to compete in the world marketplace and could have an adverse effect on the US economy, eventually weakening national security. Commonly referred to as "trade secrets," this information typically is protected under both state and federal laws. For a conviction under the Economic Espionage Act (EEA) of 1996 (Title 18 U.S.C., Chapter 90), a person must convert a trade secret to an economic benefit in interstate or foreign commerce. Overview of the Threat to US National Security The United States continues to be threatened by the theft of proprietary economic information and information on critical technologies. The risks to sensitive business information and advanced technologies continue to increase significantly as foreign governments--both former adversaries and allies--focus their espionage resources in ever-greater numbers on the private sector. They are seeking not only technological data but also financial and commercial information that will provide their companies with a competitive edge in the global economy. Targeted US Defense Information and Technology According to US defense industry reporting, targeting conducted by commercial and individual foreign collectors accounted for 60 percent of the total suspicious activities. Government-sponsored targeting--including military and other official government activity--accounted for 21 percent of suspicious activities. Targeting activities by government-affiliated entities--including institutes, laboratories, and universities--accounted for another 19 percent. Foreign companies whose work exclusively or predominantly supports government agencies were assessed as being government affiliated. Collection Methods There has been no visible change in foreign collection methods over the past year. Economic and industrial information collectors seldom use one method of collection. They combine collection techniques into a concerted effort that includes legal and illegal methods, and they continue to become more innovative in their tactics. Consistent with traditional espionage operations, significant foreign intelligence collection efforts are often conducted legally and openly. These collection efforts often serve as precursors to economic espionage: *Open-source collection activities: *Requests for information. *Solicitation and marketing of services. *Acquisition of technology and companies. *Visits by foreign nationals to US facilities. *Conferences. *Internet activity (cyber attack and exploitation). *Exploitation of joint ventures. Requests for Information Activities reported in this category include unsolicited requests received from known or unknown sources--usually foreign--for classified, sensitive but unclassified, export?controlled, or company proprietary information. According to the Defense Security Service (DSS), in 2000 these kinds of suspicious activities accounted for 41 percent of total reported collection efforts. Not surprisingly, there has been a dramatic rise in the use of the Internet for these kinds of collection activities. DSS reported that the use of the Internet by foreign entities collecting US technology and technical information accounted for 27 percent of all suspicious contacts. The Internet provides a simple, low-cost, nonthreatening, risk-free means of worldwide access to US technology. E-mail and Web-chat exchanges are inconspicuous and can bypass traditional security safeguards, directly reaching the targeted individual. Solicitation and Marketing of Foreign Services One of the most popular tactics used to gain access to US research and development facilities is to have foreign scientists submit unsolicited employment applications. In 2000, facilities that were the targets of this kind of solicitation were working on such technologies as electro-optics, ballistics, and astrophysics. Other approaches included offers of software support, internships, and proposals to act as sales or purchasing agents. In addition, of growing importance is the greater use of foreign research facilities and software development companies located outside the United States to work on commercial projects related to protected programs. Any time direct control of a process or a product is relinquished, the technology associated with it is susceptible to possible exploitation. Acquisition of Technology and Companies Acquisitions were greatly on the rise in 2000. This is the latest manifestation of an increased trend to acquire sensitive technologies through purchase. According to DSS reporting, 88 percent of all reported suspicious acquisition activities involved third parties. Third parties are not the actual entities acquiring the technology but are the ultimate end users. Third-party acquisitions are often an indicator of a possible technology transfer or diversion because when the ultimate recipients are determined, they are often countries that are on embargoed lists for the acquired items. One method that is commonly used involves setting up a freight forwarder, that is, a cooperating US-based company that will provide the ultimate foreign recipient with a US address to subvert US export-control laws. Exploitation of Visits to US Companies During the past year, efforts continued by foreigners to exploit their visits to US facilities. Some examples of exploitation techniques include: *Wandering around facilities unescorted, bringing unauthorized cameras and/or recording devices into cleared facilities, or pressing their hosts for additional accesses or information. *Adding last minute and/or unannounced persons as part of the visit. *Arriving unannounced and seeking access by asking to see an employee belonging to the same organization as the visitor. *Hiding true agendas, for example, by trying to shift conversations to topics not agreed upon in advance. *Misrepresenting a visitor's importance or technical competency to secure visit approval. Conferences International seminar audiences often include leading scientists and technical experts, who pose more of a threat than intelligence officers due to their level of technical understanding and ability to exploit immediately the intelligence they collect. The counterintelligence community reporting indicates that, during seminars, foreign entities attempt subtle approaches such as sitting next to a potential target and initiating casual conversation. This activity often serves as a starting point for later exploitation. Membership lists of international business and/or technical societies are increasingly used to identify potential US targets. One of the most common targeting techniques is to use collectors who have common cultural backgrounds with the target such as origin of birth, religion, or language. Internet Activity (Cyber Attack and Exploitation) This category addresses cyber attack and exploitation vice Internet?based requests for information. The majority of Internet endeavors are foreign probes searching for potential weaknesses in systems for exploitation. One example was a network attack that, over the period of a day, involved several hundred attempts to use multiple passwords to illegally obtain access to a cleared defense facility's network. Fortunately, the facility had an appropriate level of protection in place to repel this attack. This example reflects the extent to which intelligence collectors are attempting to use the Internet to gain access to sensitive or proprietary information. Given the considerable effort that is under way in the cyber attack and exploitation arenas, substantial resources will need to be allocated in the future to ensure adequate security countermeasures. Exploitation of Joint Ventures/Research Joint ventures place foreign personnel in close proximity to US personnel and technology and can thereby facilitate access to protected programs. This is of special concern when foreign employees are in place for long periods of time. In this scenario, there is always a danger that foreign employees will be more readily accepted as full partners, and the security vigilance of US colleagues may wane. Some examples of suspicious activity in joint ventures/research include: foreign workers seeking access to areas or information outside the purview of their work agreement, enticing US companies to provide large quantities of technical data as part of the bidding process, and foreign organizations sending more representatives than reasonably necessary for particular projects. Illegal Collection Activities Foreigners seeking to acquire US proprietary economic and industrial information often engage in the following types of illegal activities: *Acquisition of export-controlled technologies. The unlawful acquisition of export-controlled technologies by foreign collectors remains a considerable concern. Methods of operation employed to circumvent the export-control process include: using front companies within the United States and overseas, illegally transporting products to an undisclosed end user by utilizing false end-user certificates, and purchasing products that have been modified during the manufacturing process to meet export-controlled specifications. *Theft of trade secrets and critical technologies. US businessmen traveling overseas are increasingly becoming targets of foreign collection activities. There are numerous examples of briefcases or laptop computers showing evidence of unauthorized access after being left unattended in hotel rooms. In addition, there is evidence of travelers being photographed during business meetings in foreign countries for future targeting. *Agent recruitment, US volunteers, and co-optees. Foreign intelligence services and government-sponsored entities continue to utilize traditional clandestine espionage methods to collect US trade secrets and critical technologies. These methods include agent recruitment, US volunteers, and co-optees. ------------------------------------------------------------------------ Appendix Key Economic Espionage Cases Published in the Press People's Republic of China Case One Two businessmen, one a Chinese national, who is the president of a Beijing-based firm, and the other a naturalized Canadian citizen, pleaded guilty to charges of illegally exporting fiber-optic gyroscopes to the PRC without the required State Department permits. Export of these gyroscopes to the PRC is prohibited. The two men bought the gyroscopes from a Massachusetts company and planned to export them to the PRC via a Canadian subsidiary of the Beijing-based firm. The gyroscopes can be used in missile and aircraft guidance systems, as well as smart bombs. Case Two Two naturalized US citizens were convicted of conspiring to illegally export weapons parts to their native China. They used their exporting company to purchase surplus US missile, aircraft, radar, and tank parts from the Defense Reutilization and Marketing Service and then ship them to the PRC. The exported items were on the US Munitions List that prohibited them from being shipped without a license from the State Department. Case Three Two Chinese scientists and a naturalized US citizen who was born in China were arrested for stealing product designs from a major US telecommunications firm and passing them to a Chinese Government-owned company in Beijing. Both Chinese scientists had received technical degrees from US universities before being employed by the US firm. Case Four A Chinese company based in Orlando, Florida, was charged with illegally exporting radiation-hardened integrated circuits to Chinese missile and satellite manufacturers in the PRC without the required Department of Commerce licenses. The affidavit prepared by the Department of Commerce described three illegal diversions of the missile microchips. According to weapons proliferation specialists, the microchips have military applications and could be used by the Chinese military to improve their long-range missile-targeting capabilities. Case Five A naturalized Chinese national was arrested for attempting to smuggle a defense-grade Radiance high-speed (HS) infrared camera to the PRC. Since the Radiance HS camera is on the US Munitions List, companies must file with the Department of State to legally export such items. The camera was destined for the Chinese State Ship Building Corporation, a state-owned conglomerate of 58 companies that is based in Beijing and Shanghai. Pakistan Case One US Customs Service agents arrested two Pakistani brothers and charged them with conspiring to smuggle sophisticated cameras for military intelligence gathering to a Pakistani Government laboratory. One of the brothers was a naturalized US citizen, while the other, a Pakistani citizen, had recently completed requirements for a master's degree in engineering at a US university. A US aerospace company alerted the US Customs Service to the suspicious activities of the brothers after they attempted to purchase the cameras despite being denied an export license by the State Department. Case Two A British citizen pleaded guilty to violating the Arms Export Control Act by trying to ship night-vision goggles and blueprints for C-130 aircraft to Pakistan. He was acting on behalf of a firm located in Islamabad. The C-130 aircraft is used for a variety of military purposes, including troop transport, surveillance, and gunships. Iran A 20-month federal investigation culminated in the arrest by the US Customs Service of a naturalized Canadian from Iran and a Malaysian citizen for conspiring to illegally export aircraft parts for the F-14 Tomcat, F-5 Tiger, and F-4 Phantom to the Iranian air force. In addition, a naturalized US citizen from Iran pleaded guilty to violating the Arms Export Control Act by trying to smuggle F-14 parts into Iran. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5064 From: James M. Atkinson Date: Tue Mar 26, 2002 3:55pm Subject: Dennis Miller on Airport Security It seems like every week you read about another airport that had to be evacuated because some clueless Pillar of Dim forgot he had his 20-piece commemorative Civil War surgeon's kit in his carry-on bag. Ultimately who's to blame for all the security problems that led up to September 11? We could point the finger at the airlines, but it isn't really fair. They've got enough to worry about, delaying our flights, making sure the planes have barely enough Sprite so I can't get a full can, and editing the next middling issue of their inflight magazine to make sure their puff piece on Alicia Keys doesn't actually cross the line into the informative. Before September 11th, the average airport security checkpoint had holes that Joey Chitwood could barrel-roll a flaming Camaro through. The name on your boarding pass could've been "Mr. Hey Ivgottabomb," but as long as you put your ankle-holstered Derringer and 10-inch Bowie knife into that plastic bucket with approximately the same muted, rhythmic din as others did car keys and coins, the only thing likely to raise the screener's eyebrow would be your Superman logo bikini briefs slowly parading across the X-Ray monitor. Prior to September 11th, the two firms providing security to most of the airports in America were named "Argenbright" and "Wackenhut." In retrospect, it probably wasn't such a good idea putting our lives in the hands of what sounds like a couple of Scandinavian lube jellies. Some congressmen didn't want to federalize airport security screeners because they said private enterprise could handle it more efficiently. Yeah, right. That's why, when somebody starting mailing anthrax to the Capital dome, the first thing you guys did was tell the FBI, "No, don't bother with your well-trained high-tech expertise, we low-bid-contracted the job out to a couple of minimum wage slugs who are killing time until a second-assistant fry-cook position opens up at Wendy's." You really want airline safety? Make the airport screeners fly on a plane once a week. And if you think the rent-a-guards manning the scanners at your airport appear unfocused or distracted, you've never been to LAX. I've seen security personnel turn down the volume on the metal detectors so they can debate whether or not Yasmine Bleeth is hotter in person. But there are also instances where these security people should lighten up a little bit. Not every errant piece of metal has the potential to kill. You ever try taking a guy out with a nail clipper or a tweezers? Believe me, it takes hours. And we have to do our part, too. Don't grunt when they ask you questions - be cheerful and forthright. Don't bitch when they ask you to open your bags - help them do it. And don't just sullenly comply with a strip search - grind it a little, you sexy thang. Everybody quit whining. To those of you who find a pat down and a thorough investigation of your carry on luggage an invasive violation of your civil liberties... You don't like someone poking around your precious duffel bag? Try having strangers attempt to identify you by the mole on the left side of your nutsack dangling from a corn stalk in some field in Nebraska and then tell me where's the greater loss of privacy. Why can't I be safe when I fly? I want cockpit doors that take more than a mail box key to get into. I want profiling. I want the passenger seating graded by suspicion. I want parachutes to come with the in-flight magazines. I want the National Guard to fire off a few rounds every now and then to keep the people standing in line on their toes. I want screeners with at least one more career option. I want pilots equipped with stun guns, and catheters so they never have to leave their seats. And I want flight attendants who can kick ass like that chick on "Alias". Actually, I do have some ideas for improving Airline Security. As for luggage, none of any kind. No checked bags, no carry on bags, no purses, wallets, cardboard boxes or paper sacks. The plane? No seats, no overhead bins, no closets, no cupboards, no lavatories. The passengers? No clothes, everybody buck-naked. And no hair, none, no beards, no pits, no pubes, everybody's slick as a redneck's tires. No open bodily orifices, all nostrils, ears, assholes, vaginas and urethras are spackled shut with a non-toxic, hard-setting polymer. But obviously, that would just be in coach. Of course, that's just my opinion. I could be wrong. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5065 From: James M. Atkinson Date: Tue Mar 26, 2002 8:37pm Subject: Re: Seminar : "What to do after you discover the bug..." - Boston 4/27/2002 Greetings, We seem to have a bit of a wrinkle as registration for the seminar has been a bit better then expected. The first seminar overflowed, then there were several inquiries about running closed enrollment versions, then people started offering to pay more if we could squeeze them in.. As a result I have had to schedule some additional dates, which allows the seminar will be offered on more then just the original date. I moved some of the attendees into a two other special closed versions which is only available to those holding a security clearance, and working for one of two agencies (or contractors of those agencies). As a result of this reshuffling the April 27-28, 2002 date now has some seats available, and we will be adding another seminar date as well. A fourth seminar is being scheduled, and I should have the date set in a few days... it will be either late May or early June and will be held in Baltimore, MD or Washington DC. The fourth seminar will come at a higher cost ($1795 for two days, $1495 for early registration), but will include an extra module of four to six hours that deals with "Marketing Professional TSCM Services" which will be presented by a guest instructor (that many of you already know). This seminar will run two full days, whereas the other seminar version is only a day and a half. If your interested in attending either seminar you need to get your registration in soon or you may miss out. A detailed course listing will be added next week. http://www.tscm.com/seminar02116.html -jma At 12:07 PM -0500 3/11/02, James M. Atkinson wrote: >SEMINAR ANNOUNCEMENT >Granite Island Group > >Title: "What to do after you discover the bug..." > >Date: April 27-28, 2002 > >Duration: Twelve (12) classroom hours > >Location: Boston, MA > >Who Should Attend: Government, corporate, and private TSCM >specialists, counter intelligence technicians, private investigators, >law enforcement officers, and security personnel who are, have been, >or may be involved finding an eavesdropping device or anyone involved >in investigating an eavesdropping incident. > >Prerequisites: There are no formal prerequisites, however; this >seminar assumes the attendee has knowledge of basic TSCM, >counterintelligence, or investigative skills. > >Scope: This seminar will cover the protocols to follow when an >eavesdropping device (or suspected eavesdropping device) is >discovered to ensure that the eavesdropper or device can be >identified. The seminar will also cover making proper notifications, >documentation procedures, collection of evidence, establishing a >chain of custody, evaluating the device, and measures taken to >protect the discovery, and yet identify the spy. > >Security Classification: This seminar is unclassified, however; the >material presented will cover highly proprietary materials, >specialized methods, and trade secrets. As such all attendees will be >required to sign a trade secret non-disclosure agreement. > >Instructor: James M. Atkinson, President and Sr. Engineer, Granite >Island Group; Mr. Atkinson is a TSCM specialist, counter-surveillance >expert, communications engineer, security consultant, and instructor >with a reputation for designing and installing some of the most >powerful secure communications systems used by both government >agencies and major corporations. He has personally performed hundreds >of TSCM inspections and is one of the most respected names in the >industry. > >Registration: Attendance is limited and the seminar is expected to >fill up fast so complete and return the attached registration and >payment as soon as possible to guarantee your seat. All registrations >will be acknowledged, and each attendee will be sent an agenda, hotel >registration instructions, maps, and directions to the seminar site. >Registration closes 14 days before the seminar. > >Seminar Fee: The fee for this seminar is $1295.00 USD per attendee >for early registration and payment (until March 26, 2002). The fee >for attendees who register and/or pay after March 26, 2002 is >$1595.00. > >Online Signup: http://www.tscm.com/seminar02116.html > >Includes: The seminar fee will include over 12 hours of formal >instruction, 100+ page "Discovery Protocol" workbook, and certificate >of attendance. Attendees will also receive copious proprietary >handouts, worksheets, charts, various tools, forensic items, and >related materials (so reserve some extra space in your luggage). The >seminar fee also includes a continental breakfast and catered lunch >each day, beverages, and snacks (during the class). However, >attendees will be on their own for dinner, drinks, lodging, travel, >etc. > >Payment Options: The seminar fee is payable in full in advance at the >time of registration, and at least 21 days in advance either by a >check, money order, PayPal payment, or credit card via PayPal to: >https://secure.paypal.x.com/refer/pal=jmatk%40tscm.com). If your >agency requires an invoice to facilitate payment we are happy to >provide same, but the invoice will still have to paid at least 21+ >days in advance. > > >Seminar Registration Form >Full payment must be received >at least 21 days before seminar date > > >Name:______________________________________________ > >Company:______________________________________________ > >Address:______________________________________________ > >City:__________________State: _____Zip Code:_____ > >Phone:__________________Fax:___________________ > >E-Mail______________________________ > >Signature______________________________Date _________ > > >Form of Payment > >Check ____ Money Order ____ PayPal ____ Credit Card (via PayPal) ____ > >Here is the full PayPal link for this seminar in case you need it: > >https://www.paypal.com/xclick/business=jmatk%40tscm.com&undefined_quantity=1&item_name=Seminar+-+What+to+do+after+you+discover+the+bug/BOSTON&item_number=Seminar+02116+%5Bearly+registration%5D&amount=1%2C295.00&return=http%3A//www.tscm.com/seminar02116.html > > >Please complete this form and email, fax, or mail, along with your payment to: > >Granite Island Group >127 Eastern Avenue #291Ph: (978) 381-9111 >Gloucester, MA 01931-8008Fax: >http://www.tscm.com/mailto:jmatk@tscm.com > -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5066 From: William Knowles Date: Wed Mar 27, 2002 2:58am Subject: Spanish priest installs electronic jammer in church to banish cellular ringing http://story.news.yahoo.com/news?tmpl=story&u=/ap/20020326/ap_wo_en_ge/spain_jammed_church_5&printer=1 Tue Mar 26, 2:13 PM ET MORAIRA, Spain - A priest fed up with mobile phones ringing during Mass has installed an electronic jammer to keep his flock in tune with God. The Rev. Francisco Llopis, pastor of the Church of the Defenseless, said the beeps, tunes and other digital noise emitted by today's omnipresent cell phones are incompatible with quiet worship. Llopis' church in this southeast coastal town is the first in Spain to install such a device, which transmits low-power radio signals that sever communications between cellular handsets and cellular base-stations. Llopis said that when he flicks the switch, "I ensure that the religious service is celebrated within the parameters of prayer," the national news agency Efe quoted him as saying. The controversial technology is designed to create quiet zones in places like restaurants, movie theaters and libraries. Commercial jamming systems are illegal in the United States, Canada and Britain, but some countries such as Australia and Japan allow limited use. Spain has a legal vacuum, says NiceCom, the only Spanish company which markets the technology. It has been doing so for two years, and lawmakers are now discussing the issue, NiceCom spokeswoman Inma Jimenez said. The Spanish Science and Technology Ministry did not return a call seeking comment. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 5067 From: Lewis Hipkins Date: Tue Mar 26, 2002 8:10pm Subject: Re: Body Scanner Photos The article on "Hackers hunt for free" mentions the www.netstumbler.com which is a great site dedicated to "sniffing out those access points" Their version of Netstumber software works well with my Wireless card. I find a ton of access points out there while driving to work every day. Lewis Hipkins Multi-Media Communications Ph: 610-496-6670 Fax 610-664-0562 5068 From: James M. Atkinson Date: Wed Mar 27, 2002 9:04am Subject: SpyKing Busted Again... (and again... and again.. and again...) http://cryptome.org/dirt-safrica.htm http://www.theregister.co.uk/content/55/24477.html http://www.theregister.co.uk/content/55/24461.html http://www.theregister.co.uk/content/55/24456.html http://cryptome.org/dirty-jones.htm http://www.theregister.co.uk/content/55/24433.html http://www.theregister.co.uk/content/archive/19480.html http://cryptome.org/dirt-author.htm http://cryptome.org/dirt-feedback.htm http://www.diamondcs.com.au/web/alerts/dirtanalysis.htm http://cryptome.org/dirty-hope.htm http://cryptome.org/dirt-guide.htm http://cryptome.org/dirty-lantern.htm http://www.theregister.co.uk/content/archive/19404.html -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5069 From: Date: Wed Mar 27, 2002 2:45pm Subject: ANI I got a good 800 ANI number from someone in the group last year. Wrote it in my notebook I keep with my tel-tools and didn't write it down anywhere else. Lost the notebook somewhere and I sure would like to have that number again. If anyone has it, would you please reply directly to my e-mail. Thanks! Martin Brown Brown & Sikes, Inc. Dallas, TX 5070 From: James M. Atkinson Date: Thu Mar 28, 2002 7:38am Subject: Trojan vendor dishes the Dirt [The JOHAR Trojan is and has been easily detected by almost any anti-virus software. Note the very last sentence, which in fact appears to be true.] http://www.vnunet.com/News/1122902 Trojan vendor dishes the Dirt By James Middleton [07-06-2001] Codex Data Systems, marketers of the controversial Dirt Trojan, has rubbished claims that the product does not actually exist. Eddie James, vice president of Codex, told vnunet.com: "Dirt has been available since 1998. It is in use by a number of law enforcement agencies." James also claimed that organisations such as Nato and the Hi-tech Crime Investigators Association have expressed interest in the product. "The only reason it is of interest now is because someone got hold of a marketing presentation that was not for public disclosure. In fact, the product's existence was not meant to be public knowledge," he said, adding that "if we find that person we will file a criminal complaint through the Secret Service". James said that he would "love to demonstrate the tool", but since vnunet.com is not an officially recognised law enforcement agency, he could not. The reputation of Codex has been called into question after it was revealed by UK news website theregister that company chief executive Frank Jones is a convicted felon and known fraudster currently on probation for illegal possession of surveillance devices. James was forced to acknowledge that the only reason Dirt is undetectable by antivirus software is because no antivirus company has ever seen it, and that it could only be used as a "last resort" tool after obtaining a court order. As for the ability to bypass firewalls, done by killing the process in the operating system, there is no explanation as to how it attacks the firewall in the first place. However, Paul Rogers, network security analyst at MIS, who has met the company, said he was very impressed with the standard of keyloggers Codex offered, but as he had not seen Dirt in action, he remained sceptical. The rumours have also been fuelled by newsgroup postings from people claiming to have seen demonstrations of Dirt. One such posting on the Cypherpunk Hyperarchive said that Dirt it is "not much more than BackOrifice, NetBus, VNC or PC Anywhere, for that matter". "It has a bit more capability than some of those, in that it will act as something similar to an FTP server and a keystroke capture tool. But any programmer with 2nd year C programming and a Win32 compiler can download VNC and add stuff to it to do the same thing," it added. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5071 From: James M. Atkinson Date: Thu Mar 28, 2002 7:32am Subject: Cryptome dishes the Dirt http://www.vnunet.com/News/1130192 Cryptome dishes the Dirt By James Middleton [18-03-2002] Controversial bugging software turns up on the web Controversial spying and bugging software, Dirt, exposed by vnunet.com last summer, was revealed to be a bit more than vapourware when it turned up on a Dutch website last week. Dirt first hit the headlines last May, when it emerged that Codex Data Systems was marketing a password-stealing Trojan, similar to the infamous Back Orifice or the FBI's mysterious Magic Lantern, to law enforcement authorities. The company, headed up by Frank Jones, a convicted felon and known fraudster currently on probation for illegal possession of surveillance devices, denied that the product was vapourware but could not offer vnunet.com any proof. But over the last few days, Dirt and a wealth of accompanying manuals and information, including details of a system to mass-distribute Dirt, appeared on a Dutch free hosted site at Xs4all.nl. Needless to say it was quickly shut down by Xs4all after Codex got wind of it, but was subsequently republished on cypherpunk favourite Cryptome.org. Dirt was marketed as an undetectable Trojan and password thief, to be used by licensed authorities for keeping track of criminals' activities. Many of the product's claims were embroiled in mystique and could not be supported because vnunet.com did not have a government licence to tap communications. Even if we did see it, we would have had to sign an NDA (non-disclosure agreement). But what is available on Cryptome appears to be a fully functional version of the software. It did require a key to unlock it, but one Cryptome reader solved that. "It is pathetically easy to enable the software for full unlimited account use, giving a Trojan creation software," he said. "To activate it without requirement for a dongle took about 20 minutes of basic examination and only 6 bytes of change were required." Now the full downloadable version available from Cryptome allows you to "trojan/steal data/abuse human rights to your hearts content". The discovery has been accompanied by a slew of conspiracy theories, claiming the program was intentionally leaked to the public in order to force existing users to upgrade their licences with Codex, now that the older version of the software is likely to be tracked by antivirus products. Some parts of the program available in the Cryptome version date from as far back as 1998, and it has been pointed out that the Dirt Trojan is picked up by existing antivirus software as the Johar Trojan. But what is perhaps more worrying is an update on Cryptome yesterday, which revealed marketing presentations for a mass distribution system for Dirt, known as Hope (Harnessing the Omnipotent Power of the Electron). This allows for the implementation of user identification codes in documents which can gather information on designated targets. Another feature is the creation of "dangles" - alluring bait such as servers claiming to contain interesting documents, which tracks access and reports on who views and downloads the documents. Cryptome said: "Users should beware that criminal products by Codex are treacherous and could double-cross. Development of protection against treachery and double-cross of seemingly benign and covertly criminal products, not only from Codex, is the purpose of releasing the Codex material." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5072 From: James M. Atkinson Date: Thu Mar 28, 2002 8:13am Subject: NSA on Skills for National/Homeland Security Source: http://www.nsa.gov/releases/20020312.pdf Agenda for hearing and witness list: http://www.senate.gov/~gov_affairs/031202witness.htm Hearing video: http://www.senate.gov/~gov_affairs/031202video.ram _________________________ Statement For the Record Before the Governmental Affairs Subcommittee on International Security, Proliferation, and Federal Services Hearing on Critical Skills For National Security and the Homeland Security Federal Workforce Act Mr. Harvey A. Davis Associate Director, Human Resource Services National Security Agency 12 MARCH 2002 _________________________ Thank you very much Mr. Chairman, Ranking Member, and Members of the Committee on Governmental Affairs for the opportunity to appear at this hearing on "Critical Skills for National Security and The Homeland Security Federal Workforce Act." The National Security Agency (NSA) is the nation's cryptologic organization and, as such, employs this country's premier codemakers and codebreakers. A high-technology organization, NSA is on the cutting edge of information technology. Founded in 1952, NSA is a separately organized Agency within the Department of Defense and supports military customers and national policymakers. NSA's mission is to exploit secret foreign communications and produce foreign intelligence information while protecting U.S. communications. "Exploiting" communications is referred to as signals intelligence (SIGINT); "protecting" is known as information assurance (IA). These are capabilities in which the United States leads the world. NSA's greatest strength lies in its highly talented civilian and military workforce. Possessing a wealth of critical skills and expertise, this workforce includes mathematicians, intelligence analysts, linguists, computer scientists, and engineers. In fact, NSA is said to be the largest employer of mathematicians in the United States and perhaps the world. NSA is also one of the most important centers of foreign language analysis and research within the Government. As we address the serious challenges facing our nation today, it is imperative that we remember that our people are key to constructing the unified, end-to-end enterprise needed to achieve and maintain information superiority for America. The intelligence business is fundamentally about skills and expertise, and this means people - people in whom we need to invest to prepare them to deal with the array of complex issues they will tackle over the next generation. No system or technology by itself will enable us to master the new threat environment or manage the glut of information we will face in the years ahead. We need a skilled and expert workforce enabled by technology and armed with the best analytic tools. We have spent significant sums of money acquiring technology and developing technical solutions. Our employees must use that technology to maximum benefit, particularly those individuals with expertise and training in mathematics, science, foreign languages, and the other analytic disciplines, as capabilities in those fields are at the very core of our critical intelligence mission and are vital to our future success. Upon reporting for duty in the Spring of 1999, the Director of NSA initiated a transformation of our workforce designed to focus our employees on the mission, to strip away needlessly bureaucratic processes, to change our ethos, and to maintain staffing levels in critical areas. The events of September 11th reinforced our need to transform the Agency, confirmed we were on the right path, showed that we must increase the pace of transformation, and ultimately underscored the value of people and their contributions to producing intelligence. If nothing else, the events of September 11th highlighted the fact that there is no single solution to the threats facing our nation. Therefore, a balanced, multidisciplinary approach is the only answer. Teams of individuals with varied skills, working together and employing the latest technology, in collaborative and creative ways, are our best defense against the threats of the 21st Century. To create these collaborative teams, NSA relies on a unique combination of specialties. Analysts, engineers, physicists, mathematicians, linguists, and computer scientists are key to that mix. These individuals team as necessary to meet ever-changing requirements. Our Director describes the modern day employee not so much as a football player, with a set position, playing offense or defense, but rather as a soccer player, moving to the spot where opportunity presents itself, shifting from offense to defense on the same play, throughout the game, as required. So, while there are certainly specific roles that our employees play, we gain great advantage from their ability to adapt to new situations and fill a number of different needs. For example, cryptanalysts (those individuals working at the very core of our SIGINT and IA missions) use mathematics, computer programming, engineering, and language skills, as well as new technologies and creativity, to solve complex intelligence problems. That is why NSA is looking for people who are intelligent and imaginative critical thinkers who can contribute original ideas to the solution of our most difficult challenges. In fact, no single field of academic study is targeted for cryptanalysis; NSA hires people with technical and non-technical degrees, ranging from mathematics to music, engineering to history, and computer programming to chemistry. Our workforce today includes many individuals representing the best in their chosen fields. We have numerous subject matter experts who have a wealth of indepth knowledge to bring to bear in service of the nation. In addition, among our communities of mathematicians, engineers, computer scientists, linguists, analysts, and those in related technical fields, we count those who have chosen to apply their skills across the intelligence disciplines. Many of our most successful computer scientists and signals analysts hold advanced mathematical degrees; a number of our analysts have computer science and telecommunications backgrounds; mathematicians contribute directly to both of our missions by designing cipher systems to protect U.S. information systems and searching for weaknesses in our adversaries' systems; engineers apply their skills in a number of critical cryptologic areas; language analysts make some of our best intelligence analysts; and, in fact, everyone is encouraged to gain experience across organizations and missions. We also encourage participation in interdisciplinary assignments and training to provide additional professional breadth. This range of experience allows virtually seamless interface among many of our disciplines. Certainly, mathematics, science, foreign language, and analysis will always be critical requirements for NSA. With the increased volume, velocity, and variety of globalized network communications, there has been a growing need for our mathematicians, engineers, computer scientists and those in related technical disciplines to have expertise in new skill areas. Among those areas are Network Security, Vulnerability Analysis, Public Key Infrastructure, Data and Fiber Optics Communications, Image Processing, Encryption, Biometrics, Database Management, and Data Visualization. There has been a similar broadening in the scope of contributions of our language analysts, who are now going well beyond their more traditional applications of language expertise and target analysis to tackle network exploitation and SIGINT development. The blurring of the lines between the technical and the analytic disciplines is an ongoing and inevitable outcome of the increasingly technical nature of our work and the sophistication and complexity of our targets. No discussion of resources would be complete without a specific mention of our continued need for qualified linguists. The need for competent and near-native language capability is critical to our success, today, and tomorrow. However, there has been a significant de-emphasis within the United States in the instruction of foreign languages, which makes it increasingly difficult to recruit new hires to keep the language pool healthy. Although we cannot resolve this on our own, we are taking steps to address it. We are now sponsoring a new outreach program for language to incentivize such a capability in partnership with flagship schools. This initiative will be modeled after our successful math program where we have established relationships with faculty and students at a number of institutions, funded research, provided grants and scholarships and encouraged mathematics programs at all levels. In the mid-1990s, NSA focused heavily on technology as the solution for many of its complex challenges. Facing massive technological advances, while downsizing and trying to maximize our return on investment, the Agency focused its hiring and development initiatives on computer science, engineering and mathematics at the expense of language and analysis. This was largely due to the belief that better technology would increase the capability of analysts to process large amounts of data more effectively and efficiently. While that has undoubtedly been the case, the loss over the last several years of experienced linguists and analysts has created difficulties for the Agency in target knowledge, less commonly taught languages, and in training of the next generation of analysts. As we strive for better balance, we have tried to maintain a robust and fairly consistent mathematics hiring program, looked more to private industry and contracting for technical skills, reenergized our linguist and analyst hiring and revitalized our cryptologic reserve program. These cryptologic reservists, former employees who are brought back into Agency service to augment our workforce for short periods of time, play a key role in meeting surge requirements and providing particular technical or target expertise. While a strong analytic and technical skill base is an absolute requirement, we must also augment these skills with managers, systems engineering experts, project managers, and support personnel. The leaders who shape the technical and analytic working environment over the next decade must have superior skills for developing and mentoring our workforce at all levels and mission areas. They must apply sound business practices, coupled with innovative personnel management and ensure that all segments of the workforce succeed in meeting our national mission requirements. Technology and the world change rapidly, and great emphasis is placed on staying ahead of these changes with employee training and development programs. The Department of Defense and its components develop and maintain strategies and programs for ensuring the recruitment and professional development of its employees, and NSA is taking full advantage of a wide variety of these programs. Just 5 months into the fiscal year, NSA has hired approximately half of its FY2002 target of 800 new employees and we are finishing up an extraordinarily successful FY2001 hiring program. Like many other Agencies, NSA has struggled over the years to attract top talent to Government, yet we have had success attracting new recruits with the quality, complexity, depth, and scope of our work; our commitment to continuing education and development (as evidenced by our Cooperative Education Program, and our Skills Enhancement Recruitment Incentive Program-a scholarship program for new hires in mathematics and the sciences); the payment of Foreign Language incentives; targeted hiring and retention bonuses; continuing education opportunities; and our work life initiatives. All of those benefits and programs notwithstanding, the market continues to be a challenge for us, especially to meet our goals in the sciences and less commonly taught languages. As a result, we continuously pulse the market with the goal of being as competitive as possible. Our people remain the key to NSA's success in achieving information superiority in the 21st century and beyond. As our Signals Intelligence Director recently stated before Congress, "I would be remiss if I did not emphasize here that our most valuable asset - our engineers, mathematicians, linguists, analysts and all the rest - have made the difference. And it is the talent and will of our people that continue to give me confidence." We remain dedicated to those efforts that will ensure that we have a work force, with the right people with the right skills in the right jobs. We have made progress shaping our workforce, shifting our skill mix, and deploying our people as effectively as possible. We are committed to recruiting, hiring, and retaining the highly educated, technically sophisticated, and readily adaptable corps of skilled individuals required to meet the mission challenges posed by new targets and new technologies. As we transform the Agency, we will continue to provide the vital information that will enable the United States to maintain a decisive edge in information superiority. Thank you Mr. Chairman and Members of the committee for giving me the opportunity to testify before you today. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- From: James M. Atkinson, Comm-Eng Date: Wed Mar 22, 2000 1:27pm Subject: TSCM receivers "Fred" asked that the following be posted anonymously, so I am forwarding it as per his request. --- >>>>> I usually do not comment on the list, however, some of the comments below greatly disturbed me. Mr. Hoffman's comments give our business and everyone associated with TSCM services a bad reputation. The comments below may be his opinion, but they are quite offensive to honest manufactuers that work hard to develop legal TSCM equipment. Furthermore, I am amazed that you would recommend illegal activity and compare this business to dealing with drug dealers. Optoelectronics is a good honest company and I respect their business and business practices. Do you expect Optoelectronics to trade a thriving business to be prosecuted simply because a few private investigators want to scan and intercept cell phones? There is certainly available professional equipment that allows professional people to do professional sweeps within the bounds of the law. No company wishes to be hounded by a rabid federal law enforcement officer. However, it seems to me that Mr. Hoffman has set himself up for just such scrutiny by publicly sending out his advice to break the law. I hope for his sake that there are no rabid Federal Law enforcement officers that are members of the list, but you never know. Furthermore, these are the types of attitudes that, when publicly voiced, increase the scrutiny of the microscope that we already live under in this business. anonymous At 10:59 AM -0600 3/22/00, Fred-the-Fed wrote: >-----Original Message----- >From:Hoffman [SMTP:hoffman@n...] >Sent:Wednesday, March 22, 2000 8:18 AM >To:TSCM-L@onelist.com >Subject:Re: [TSCM-L] TSCM receivers > >From: "Hoffman" > > > With the shadow of asinine receiver/scanner laws looming over > > US security and TSCM persons.... what can one do to obtain > > a receiver (for legitimate TSCM use) which has not been > > electronically neutered? > > Jay Coote >------------------------------------ >Hoffman replies: > >Legitimate electronic test equipment is exempt from the >laws you mentioned in 18 U.S.C. Chapter 119, Sec 2512. > >The only reason that companies like OPTOELECTRONICS, >and the various scanner manufacturers block the cell band >in my opinion, is because they are too cowardly, and they >lack the testicular fortitude to claim that their equipment is >for telecommunication company use, and so they are afraid >of reprisals by rabid federal law enforcement. > >Anyway, whenever I want a scanning receiver which covers >the cellular band, I just order it from various U.S. mail-order >resellers. Despite common myth, there are lots of >people who are all too happy to ignore the law; you just >have to know who the "friendlies" are that will sell you >the goods. I'll give you advice on how to purchase >such units. It's just like illicit drugs. At first it seems >as if nobody is selling the stuff, but if you do a little >digging and scratch the surface; make some telephone >calls; buy some products from dealers; and get to >know people... You'll then realize that you can >get cell capable scanners with no problem, >so long as you've got the green. =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 92 From: Jesse Thomas Date: Wed Mar 22, 2000 1:38pm Subject: Re: TSCM receivers Geeze, talk about neutered! What's the big deal. Stop being so paranoid. "James M. Atkinson, Comm-Eng" wrote: > From: "James M. Atkinson, Comm-Eng" > > "Fred" asked that the following be posted anonymously, so I am > forwarding it as per his request. > > --- > > >>>>> > > I usually do not comment on the list, however, some of the comments below > greatly disturbed me. Mr. Hoffman's comments give our business and everyone > associated with TSCM services a bad reputation. The comments below may be > his opinion, but they are quite offensive to honest manufactuers that work > hard to develop legal TSCM equipment. Furthermore, I am amazed that you > would recommend illegal activity and compare this business to dealing with > drug dealers. Optoelectronics is a good honest company and I respect their > business and business practices. Do you expect Optoelectronics to trade a > thriving business to be prosecuted simply because a few private > investigators want to scan and intercept cell phones? There is certainly > available professional equipment that allows professional people to do > professional sweeps within the bounds of the law. No company wishes to be > hounded by a rabid federal law enforcement officer. However, it seems to me > that Mr. Hoffman has set himself up for just such scrutiny by publicly > sending out his advice to break the law. I hope for his sake that there are > no rabid Federal Law enforcement officers that are members of the list, but > you never know. Furthermore, these are the types of attitudes that, when > publicly voiced, increase the scrutiny of the microscope that we already > live under in this business. > > anonymous > > At 10:59 AM -0600 3/22/00, Fred-the-Fed wrote: > >-----Original Message----- > >From: Hoffman [SMTP:hoffman@n...] > >Sent: Wednesday, March 22, 2000 8:18 AM > >To: TSCM-L@onelist.com > >Subject: Re: [TSCM-L] TSCM receivers > > > >From: "Hoffman" > > > > > With the shadow of asinine receiver/scanner laws looming over > > > US security and TSCM persons.... what can one do to obtain > > > a receiver (for legitimate TSCM use) which has not been > > > electronically neutered? > > > Jay Coote > >------------------------------------ > >Hoffman replies: > > > >Legitimate electronic test equipment is exempt from the > >laws you mentioned in 18 U.S.C. Chapter 119, Sec 2512. > > > >The only reason that companies like OPTOELECTRONICS, > >and the various scanner manufacturers block the cell band > >in my opinion, is because they are too cowardly, and they > >lack the testicular fortitude to claim that their equipment is > >for telecommunication company use, and so they are afraid > >of reprisals by rabid federal law enforcement. > > > >Anyway, whenever I want a scanning receiver which covers > >the cellular band, I just order it from various U.S. mail-order > >resellers. Despite common myth, there are lots of > >people who are all too happy to ignore the law; you just > >have to know who the "friendlies" are that will sell you > >the goods. I'll give you advice on how to purchase > >such units. It's just like illicit drugs. At first it seems > >as if nobody is selling the stuff, but if you do a little > >digging and scratch the surface; make some telephone > >calls; buy some products from dealers; and get to > >know people... You'll then realize that you can > >get cell capable scanners with no problem, > >so long as you've got the green. > > =================================================================== > Sed quis custodiet ipsos Custodes? > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Copyright 2000, James M. Atkinson, All Rights Reserved > > ------------------------------------------------------------------------ > GET A NEXTCARD VISA, in 30 seconds! Get rates as low as 2.9% > Intro or 9.9% Fixed APR and no hidden fees. Apply NOW! > http://click.egroups.com/1/936/0/_/507420/_/953753693/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 93 From: Michael Martz Date: Tue Mar 21, 2000 9:19pm Subject: Re: TSCM receivers > I ordered un-cell blocked recievers via mail order from Canada no problem from the guys at: http://www.durhamradio.ca/ It took about two weeks to get the equipment but I did get it with no problems from customs. They labeled the Opto reciever as "FM Radio". MM 94 From: Rocco Rosano Date: Tue Mar 21, 2000 9:54pm Subject: Re: TSCM receivers Jay, Et Al I don't really see this as a problem. At least to the same degree that Jay may see it. Jay Coote wrote: > From: "Jay Coote" > > With the shadow of asinine receiver/scanner laws looming over > US security and TSCM persons.... what can one do to obtain > a receiver (for legitimate TSCM use) which has not been electronically neutered? Sometimes, it is important (in the RF arena) to fall back to the basics. RF analysis and detection is the fundamental. And there is a vast array of equipment out there COTS that, when put together, does a much better job than do the "all-in-one" scanner packages. > It would be just like a 'bugger' to set his/her device to transmit > within the coverage gaps of US-market receivers.... > Jay Coote > TSCM@j... Just fall back to the basics. A good antenna and sensor array (eg SAS series), with a good spectrum analyzer with narrow band and wide band IF Outputs. And, independent demodulators, decoders and filters. A good O'scope. And very important, a very good range of very sensitive pre-amps that are battery powered and compact. Any of you who have work government TSCM or ASA/NSA intercept and collection have seen all these devices. They are not very expensive in comparison to the major end-items, but they work just fine. And, they are only limited to the scope and range of your primary receiver. Rocco Rosano Reynoldsburg, OH mailto:roccorosano@a... > 95 From: cclaypole Date: Wed Mar 22, 2000 3:23am Subject: VIRUS WARNING Dear Colleagues, Whilst I am sure you folk on the other side of the big pond are normally aware of these sort of things well before we get to find out about them in rural England; just to be on the safe side, I am copying this to the community. Take care, Chris Claypole Labyrinth International, England --- Original Message ----- From: Martha O'Sullivan To: Sent: 21 March 2000 11:17 Subject: FW: Fwd[2]:virus warning > I have just received some info on a virus that has just been released. > > Someone is sending out a cute screensaver of the Budweiser frogs. if you > download it you will lose everything. Your hard drive will crash and > someone from the Internet will get your screen name and password. > > DO NOT DOWNLOAD IT UNDER ANY CIRCUMSTANMCES. > > it went into circulation yesterday as far as we know. Please distribute > this message. This is a new and very malicious virus and not many people > know about it. This information was announced yesrday morning from > Microsoft. Please share it with everyone that might access the internet. > > AOL has said this is a very dangerous virus and that there is NO remedy > for it at this time. Please practice cautionary measures and forward to > all your on-line friends. Regards Tim [Non-text portions of this message have been removed] 96 From: Sarunas Krivickas Date: Wed Mar 22, 2000 7:19am Subject: Interception of microwave bulk Hi everybody, I am just joined the TSCM-L, therefore, I have no any view about manner of discussion on this forum. So, please excuse me if my question does not fit to forum's frame. Also, sorry for my English. It is not my mother language. Thanks. The questions are related to interception of information bulk transmitted by microwave radio relay link. 1. Could you advice some open www sources about /subj/? 2. Does the possibility to intercept e.g. ISDN bulk is simple and cheap? 3. Do you know any figures e.g. distances, approx. cost of equipment or system, etc.? 4. any other comments? Notes: There I am talking not about encrypted links, projects like echelon and gov. systems. Also, you are welcome to contact to my by e-mail direct. Regards, Mr. Sarunas Krivickas 97 From: Hoffman Date: Wed Mar 22, 2000 9:52pm Subject: Re: TSCM receivers From: hoffman@n... To : spook@c... RE : Items prohibited by law, and how it relates to the TSCM industry. My response to "Fred". ------------------------------------ "Fred" has shared his opinion, and now I choose to not so briefly write my opinion on the matter. My position summarized: I think that a large portion of 18 USC 2512 is a crock; and that pretty much represents my position on the matter. The only part of Chapter 119 (ECPA) which I think is worth anything, are the sections which codify governments conduct as it pertains to surveillance. I think that any law which restricts a private individuals (including businessmen) righ to own [or] manufacture a full featured quality electronic product (or a piece of crap for that matter) is fundamentally wrong. ------------------------------------- For the better part of the last 5 years, I have dedicated my time (among many other political causes which I take up) to doing two things as it pertains to this conversation. First, I have tirelessly petitioned my representitives to have the current laws (18 USC Ch 119) amended so as to further the principles of the American way of life as I view it. I knew from the start that this would be a waste of time since laws once written are virtually irreversable. Nevertheless, I keep at it simply to voice my opinion. Secondly, what I have done that has made a difference is to personally talk face-to-face and by correspondance with various well known resellers of products which are affected by the aforementioned law. I have talked with a dozen companies that I have close relations with that are small resellers of scanning receivers, or other "Title III" type goods (i.e. mail-order "spy supply" companies which the self righteous are so fond of bashing). Many years ago, most mail order companies were feeling the squeeze and hysteria when they read about various spy shops getting busted, or U.S. Customs seizing cell capable scanners as well as "cellular intercept devices". When I had my own mail-order company several years ago, I had pondered the issue briefly, and immediately made the decision that I'll sell anything I damned well please; and that I did! Proudly. Nobody ever came knocking on my door. So I encouraged my associates not to feel the pressure, and thanks to me (or so I like to think I played my part through friendly encouragement) there are other companies owned by some people who have some testicular fortitude and are not afraid to sell what are now considered unlawful goods (i.e. transmitters, and cell capable scanners). Not all of my friends sell the goods overtly; but they still sell them; and I'm damned happy for them. There represents a ceartain portion of TSCM practitioners who have never sold "Title III" type goods and may have some moral aversion to them, and to other people selling them. To these people I simply say, "Sorry, but although you have the right to your opinion, another citizens business is really not your concern." So [you] just do what you do, and let other people go about their life selling the products which they choose to sell. Jumping down each others throats is merely counterproductive and does not help anyone. I happen to have been on "both sides of the fence so to speak" I used to own a low-key mail order business which sold some of the usual Title III goods, plus a few units which I manufactured myself including an absolutely fabulous rifle microphone and what is probably the lowest noise-high gain amplifiers on the market (sorry, Kaiser). Although my mail order business in now closed down, I am now in the process of designing some new products which are mainly for countermeasures. I have an excellent telephone analyzer and carrier current receiver and am now working on an RF differential receiver that I will be selling probably next year. Quite frankly, I see absolutely no "conflict of interest" whatsover. I am an electrical engineer first and foremost and designing products is one of the things that I do. I really could care less what I manufacture, or what the 18 U.S.C. has to say about it, so long as I can produce a product which I am happy with. -------------------- Fred> However, it seems to me that Mr. Hoffman has Fred> set himself up for just such scrutiny by publicly Fred> sending out his advice to break the law. I hate nitpicking (or do I), but I dont believe that I actually advised anyone to break the law. I merely stated a fact that there are plenty of guys out there willing to sell cell capable scanners. Regardless, as you can see by my aforementioned opening, I despise the current law because it is a gross violation of everything which this country is supposed to represent. The government has no busines butting it's nose into the economic affairs of industry, especially for something as trite as electronic goods. We're not talking toxic chemicals and nuclear weapons here. Government intervention is both unwanted and unamerican, and has no place in the Title III or TSCM market; just as it has no place dictating laws regarding the Internet or who can own and use computers, such as the laws which exist in other countries such as Russia (or gun ownership). ------------------ Fred> Mr. Hoffman's comments give our business and Fred> everyone associated with TSCM services a bad Fred> reputation. Mr. Hoffmans comments have nothing whatsoever do do with "our business", or "your business" or "the TSCM industry". It has to do with the rights of 450+ Million Americans to be free from government intrusions in matters of interstate and intrastate commerce. Your entitled to your opinion, but you ceartainly dont speak for an entire industry, and you sure as hell dont speak for 450 Million americans. There are a hell of alot more HAM radio, electronic hobbyists, and scanner hobbyists in this country than there are TSCM practitioners (or enthusiasts) and if you want to make this into some kind of contest, you pretty much lose by a factor or 10,000:1. Quite frankly, I dont see how another persons right to own electronic equipment is any of "your business". Do you really think the majority of 450 Million Americans really give a darned about the TSCM industry. That comment represents the ultimate in arrogance, that you think everyones rights should be restricted, just so as to appease your conscience or to make the industry look good. To phrase it another way; "the world does not revolve around you, or the TSCM industry"... so give it a rest. Furthermore, it wasn't more than a few years ago when such laws regarding transmitters and scanners largely did not exist. In fact, I think there were a hell of alot more industry folks who were happier back then because they did not have the government butting into their industry. Most manufacturers do not look kindly on government intrusion, nor do most manufacturers take kindly to being forced to produce an inferior product with limited/restricted capabilities. ----------------------- Fred> his opinion(sic).. are quite offensive to Fred> honest manufactuers that work hard to develop Fred> legal TSCM equipment. First, I take objection to your use of the word "honest manufacturers". It's merely an obfuscation on your part designed to make you look like the fictitious good guy, and make somebody else look like the bad guy. If given the chance, manufacturers produce what the public wants by the laws of supply and demand. (Thats the American way. That is what is morally righteous.) At the same time, manufacturers strive to produce the best products that they can. When government intervenes and starts forcing manufacturers to compromise the integrity and capability of their products, you can be damned sure that most manufacturers will take objection. Some companies make buckle under to pressure (like cowards) and produce the modified products (like cell blocked scanners), but it sure as hell is not because they want to, or because they think its morally right. They merely comply due to government extortion; the threat of law. A company that buckles into government pressure is in no way whatsoever a more "reputable" company than another company which refuses to comply with the law. You should not confuse morality with legality; as so many people in American society cannot seem to distinquish the difference. If a company resells cellular capable scanners, that does not make that company "immoral" and ceartainly not "disreputable". In law and politics people are often fond of using the latin phrases "malum prohibitum", and "malum en se". In short, these simple phrases distinguish the vast difference between something which is immoral versus something which is merely a piss ante technical violation of some rule or regulation. ------------------------- Fred> Optoelectronics is a good honest company and I Fred> respect their business and business practices. Fred> Do you expect Optoelectronics to trade a thriving Fred> business to be prosecuted simply because a few private Fred> investigators want to scan and intercept cell phones? Fred> There is certainly available professional equipment Fred> that allows professional people to do professional Fred> sweeps within the bounds of the law. No company wishes Fred> to be hounded by a rabid federal law enforcement officer. (Somebody always has to bring up the strawman argument about "evil private investigators"; really I'm tired of that one) So you tell me, why should Optoelectronics; a reputable company with fabulous products (incidentally, I happen to own about $6,000 worth of Opto goods) be excluded from producing quality, full featured products that could be sold to the TSCM industry. Why should Optoelectronics have to modify their products at all just because of some far reatching hypothetical scenario about "those evil private investigators listening to cell phones with some of Optos goods." Clearly any cognizant human being can see the hypocrisy of the law. We do not ban guns (not yet anyway) on the assumption that everyone is a potential John Gacey. We dont ban crow bars and other household tools because they can be used as burgulars tools. Do you seriously believe Optoelectronics gives a rats ass about the morality of the use of their products. If Section 2512 was never passed you can be damned sure that today, Opto would be selling cellular capable equipment because that is what the market forces want!! Aside from the fact that they strive to produce a full featured product. If section 2512 was amended, you'd see virtually every manufacturer in the country revamping their products within six months to make them cellular capable... "Ethics my ass".. "Reputation my ass." The companies are only following the law because they feel they are being coerced to. Nobody is following it voluntarily. How many manufacturers intentionally blocked the cellular and cordless phone band before the law was passed??? -------------------------- Fred> Furthermore, these are the types of attitudes that, Fred> when publicly voiced, increase the scrutiny of the Fred> microscope that we already live under in this business. Fred, I'll have to agree with you on this point. Discretion is sometimes a good tactic. However, this so-called public scrutiny you speak of works both ways. This just goes to demonstrates by your comment, that others like yourself feel some kind of coercive squeeze from extrinsic forces such as federal law or public sentiment. By trying to be "hush-hush" about the matter, you are merely allowing the industry to be attacked, and your not doing your part to stand up for your industry and your right to own any piece of electronic test equipment that you choose which hasn't been modified in accordance with some law. -------------------------- Fred> Furthermore, I am amazed that you would recommend Fred> illegal activity and compare this business to dealing Fred> with drug dealers. I shouldn't waste my time replying... but you obviously misread something. I made no comparison of the drug industry to the electronic industry. So I'm not quite sure why your "foaming at the mouth". As a side note, this is where I shall just add my libertarian opinion that the drug cartels are every bit as "reputable" as the electronic industry, so I simply don't even find your point valid. Just because the government indiscriminately declares a particular industry as illegal or even immoral depending upon whatever crusade happens to be in vogue this decade, ceartainly does not make that industry any less reputable. This is where ya'll are supposed to draw the parralel about how the government is once again butting its nose into the tobacco and gun industry (think: Smith & Wesson agreement brought about by government extortion). ---------------------------------- So ends my rant on this topic which I take very personally. As a libertarian, I believe this country has gone into "the dumpers" thanks to the good ol' politicians inability to mind their own damned business and to leave private industry to do what they do. Oh, and we can also discuss my opinion regarding the fact that I believe no person has any "reasonable expectation of privacy" on a cellular telephone. You want privacy; use encryption. Anyone that advocates the cellular and cordless phone restriction law is merely part of the larger problem which exists of the public being fed a false panacea. Respectable security professionals should likely never put any false legal remedies ahead of real technical solutions such as encryption (or plain ol' common sense). 98 From: Date: Wed Mar 22, 2000 7:58pm Subject: Re: VIRUS WARNING A VERY old hoax....at least 2 years since I've last seen it. 99 From: William Knowles Date: Wed Mar 22, 2000 8:47pm Subject: Re: VIRUS WARNING On Wed, 22 Mar 2000, cclaypole wrote: This is more of an Internet chain letter, but it goes without saying to NOT run any code from unknown sources because you are running the risk of downloading trojan horses or infected files. I also highly recommend you all get an update of your virus definations for your anti-virus programs to prevent you from losing all your data should you be unlucky enough to download a real virus. Cheers! William Knowles wk@c... > From: "cclaypole" > > Dear Colleagues, > > Whilst I am sure you folk on the other side of the big pond are > normally aware of these sort of things well before we get to find > out about them in rural England; just to be on the safe side, I am > copying this to the community. > > > I have just received some info on a virus that has just been released. > > > > Someone is sending out a cute screensaver of the Budweiser frogs. if you > > download it you will lose everything. Your hard drive will crash and > > someone from the Internet will get your screen name and password. *-------------------------------------------------* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen. Alfred. M. Gray, USMC --------------------------------------------------- C4I Secure Solutions http://www.c4i.org *-------------------------------------------------* 100 From: A.Lizard Date: Thu Mar 23, 2000 4:28am Subject: Re: TSCM receivers At 22:54 2000-03-21 -0500, you wrote: >From: Rocco Rosano > >Jay, Et Al > >I don't really see this as a problem. At least to the same degree that >Jay may see >it. > >Jay Coote wrote: > > > From: "Jay Coote" > > > > With the shadow of asinine receiver/scanner laws looming over > > US security and TSCM persons.... what can one do to obtain > > a receiver (for legitimate TSCM use) which has not been electronically > neutered? > >Sometimes, it is important (in the RF arena) to fall back to the basics. RF >analysis and detection is the fundamental. And there is a vast array of >equipment >out there COTS that, when put together, does a much better job than do the >"all-in-one" scanner packages. Anyone using the WinRadio for this? http://www.winradio.com A.Lizard ************************************************************************ Personal Web site http://www.ecis.com/~alizard Disaster prep & y2k computer fixes: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... PGP 6.5.1 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 101 From: Miguel Puchol Date: Fri Mar 24, 2000 4:51pm Subject: RE: TSCM receivers Hi Hoffman, I think that Opto's attitude is very understandable, given what the government in the U.S. can do to a major electronic kits dealer, where they were raided and around $100.000 worth of gear seized, because their experimental FM crystal radio kits were considered illegal bugging devices. Nobody who wants to bug someone past a 5 on a 1 to 100 scale is going to ever use one of these, so I hardly see them as potential threats. So, you can imagine what they could to to Opto if they started selling unblocked Xplorers. This one in question has an 'unlock code', which was posted on Compuserve some time ago. I wouldn't however compare buying cell-capable scanners with drug dealing, maybe taking it a bit too far... Just my opinion :-) Mike > -----Mensaje original----- > De: Hoffman [mailto:hoffman@n...] > Enviado el: miÈrcoles, 22 de marzo de 2000 3:24 > Para: TSCM-L@onelist.com > Asunto: Re: [TSCM-L] TSCM receivers > > > From: "Hoffman" > > > With the shadow of asinine receiver/scanner laws looming over > > US security and TSCM persons.... what can one do to obtain > > a receiver (for legitimate TSCM use) which has not been > > electronically neutered? > > Jay Coote > ------------------------------------ > Hoffman replies: > > Legitimate electronic test equipment is exempt from the > laws you mentioned in 18 U.S.C. Chapter 119, Sec 2512. > > The only reason that companies like OPTOELECTRONICS, > and the various scanner manufacturers block the cell band > in my opinion, is because they are too cowardly, and they > lack the testicular fortitude to claim that their equipment is > for telecommunication company use, and so they are afraid > of reprisals by rabid federal law enforcement. > > Anyway, whenever I want a scanning receiver which covers > the cellular band, I just order it from various U.S. mail-order > resellers. Despite common myth, there are lots of > people who are all too happy to ignore the law; you just > have to know who the "friendlies" are that will sell you > the goods. I'll give you advice on how to purchase > such units. It's just like illicit drugs. At first it seems > as if nobody is selling the stuff, but if you do a little > digging and scratch the surface; make some telephone > calls; buy some products from dealers; and get to > know people... You'll then realize that you can > get cell capable scanners with no problem, > so long as you've got the green. > > > ------------------------------------------------------------------------ > MAXIMIZE YOUR CARD, MINIMIZE YOUR RATE! > Get a NextCard Visa, in 30 seconds! Get rates as low as > 0.0% Intro or 9.9% Fixed APR and no hidden fees. > Apply NOW! > http://click.egroups.com/1/2122/0/_/507420/_/953694411/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 102 From: James M. Atkinson, Comm-Eng Date: Fri Mar 24, 2000 10:45pm Subject: RE: TSCM receivers Ramsey only got "burned at the Stake" as he was blatantly advertising one or more of his products as a quote "Phone Bug" (I have copies of the catalog where he does this), he got a bit too cocky, and the government took him down a peg. On top of that virtually nothing they sold had an FCC ID and they would sell to anybody (not just hobbyists). If he was only selling kits to hobbyists he would not have gotten busted. Also, PI's LOVED the little crystal controlled bug as they could buy it fully assembled for virtually nothing (and yes, hundreds did... none of which were hobbyists). Second, Opto got "looked at" as they were selling the hell out of the CF-802 Cellular Filter and Pre-amplifier, and were marketing it as an "Interception Device" (with quite a bit of "nudge, nudge, wink, wink"). The government really didn't care about Scout, Explorer, R10, R20 until they started to push the CF-802 Snooper. If it is legitimate test equipment the government will leave them alone, but if is "gray area toys" and the manufacture tries to push it as "spy gear" they will feel the wait of the law. TSCM'ers generally do not have problems obtaining normal spectrum analyzers, test sets, and related equipment which has cellular coverage... it's just when they try to get cheap consumer grade goodies that it becomes tough. It's all a matter of intent. TSCM'ers do not need to intercept cellular calls, however; they do need to view a suspect signal in the frequency and time domain (which has nothing to do with snooping in on cell calls). Just my humble opinion. -jma At 11:51 PM +0100 3/24/00, Miguel Puchol wrote: >From: "Miguel Puchol" > >Hi Hoffman, > >I think that Opto's attitude is very understandable, given what the >government in the U.S. can do to a major electronic kits dealer, where they >were raided and around $100.000 worth of gear seized, because their >experimental FM crystal radio kits were considered illegal bugging devices. >Nobody who wants to bug someone past a 5 on a 1 to 100 scale is going to >ever use one of these, so I hardly see them as potential threats. >So, you can imagine what they could to to Opto if they started selling >unblocked Xplorers. This one in question has an 'unlock code', which was >posted on Compuserve some time ago. >I wouldn't however compare buying cell-capable scanners with drug dealing, >maybe taking it a bit too far... > >Just my opinion :-) > >Mike > > > > -----Mensaje original----- > > De: Hoffman [mailto:hoffman@n...] > > Enviado el: miÈrcoles, 22 de marzo de 2000 3:24 > > Para: TSCM-L@onelist.com > > Asunto: Re: [TSCM-L] TSCM receivers > > > > > > From: "Hoffman" > > > > > With the shadow of asinine receiver/scanner laws looming over > > > US security and TSCM persons.... what can one do to obtain > > > a receiver (for legitimate TSCM use) which has not been > > > electronically neutered? > > > Jay Coote > > ------------------------------------ > > Hoffman replies: > > > > Legitimate electronic test equipment is exempt from the > > laws you mentioned in 18 U.S.C. Chapter 119, Sec 2512. > > > > The only reason that companies like OPTOELECTRONICS, > > and the various scanner manufacturers block the cell band > > in my opinion, is because they are too cowardly, and they > > lack the testicular fortitude to claim that their equipment is > > for telecommunication company use, and so they are afraid > > of reprisals by rabid federal law enforcement. > > > > Anyway, whenever I want a scanning receiver which covers > > the cellular band, I just order it from various U.S. mail-order > > resellers. Despite common myth, there are lots of > > people who are all too happy to ignore the law; you just > > have to know who the "friendlies" are that will sell you > > the goods. I'll give you advice on how to purchase > > such units. It's just like illicit drugs. At first it seems > > as if nobody is selling the stuff, but if you do a little > > digging and scratch the surface; make some telephone > > calls; buy some products from dealers; and get to > > know people... You'll then realize that you can > > get cell capable scanners with no problem, > > so long as you've got the green. > > > > > > ------------------------------------------------------------------------ > > MAXIMIZE YOUR CARD, MINIMIZE YOUR RATE! > > Get a NextCard Visa, in 30 seconds! Get rates as low as > > 0.0% Intro or 9.9% Fixed APR and no hidden fees. > > Apply NOW! > > http://click.egroups.com/1/2122/0/_/507420/_/953694411/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > >------------------------------------------------------------------------ >Good friends, school spirit, hair-dos you'd like to forget. >Classmates.com has them all. And with 4.4 million alumni already >registered, there's a good chance you'll find your friends here: >http://click.egroups.com/1/2623/0/_/507420/_/953957691/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 103 From: Rocco Rosano Date: Fri Mar 24, 2000 10:55pm Subject: Re: TSCM receivers Et Al: Why go to all that trouble when you can see the entire spectrum with a spectrum analyzer? I guess I don't understand! Rocco Rosano Reynoldsburg, Ohio Miguel Puchol wrote: > From: "Miguel Puchol" > > Hi Hoffman, > > I think that Opto's attitude is very understandable, given what the > government in the U.S. can do to a major electronic kits dealer, where they > were raided and around $100.000 worth of gear seized, because their > experimental FM crystal radio kits were considered illegal bugging devices. > Nobody who wants to bug someone past a 5 on a 1 to 100 scale is going to > ever use one of these, so I hardly see them as potential threats. > So, you can imagine what they could to to Opto if they started selling > unblocked Xplorers. This one in question has an 'unlock code', which was > posted on Compuserve some time ago. > I wouldn't however compare buying cell-capable scanners with drug dealing, > maybe taking it a bit too far... > > Just my opinion :-) > > Mike > > > -----Mensaje original----- > > De: Hoffman [mailto:hoffman@n...] > > Enviado el: miÈrcoles, 22 de marzo de 2000 3:24 > > Para: TSCM-L@onelist.com > > Asunto: Re: [TSCM-L] TSCM receivers > > > > > > From: "Hoffman" > > > > > With the shadow of asinine receiver/scanner laws looming over > > > US security and TSCM persons.... what can one do to obtain > > > a receiver (for legitimate TSCM use) which has not been > > > electronically neutered? > > > Jay Coote > > ------------------------------------ > > Hoffman replies: > > > > Legitimate electronic test equipment is exempt from the > > laws you mentioned in 18 U.S.C. Chapter 119, Sec 2512. > > > > The only reason that companies like OPTOELECTRONICS, > > and the various scanner manufacturers block the cell band > > in my opinion, is because they are too cowardly, and they > > lack the testicular fortitude to claim that their equipment is > > for telecommunication company use, and so they are afraid > > of reprisals by rabid federal law enforcement. > > > > Anyway, whenever I want a scanning receiver which covers > > the cellular band, I just order it from various U.S. mail-order > > resellers. Despite common myth, there are lots of > > people who are all too happy to ignore the law; you just > > have to know who the "friendlies" are that will sell you > > the goods. I'll give you advice on how to purchase > > such units. It's just like illicit drugs. At first it seems > > as if nobody is selling the stuff, but if you do a little > > digging and scratch the surface; make some telephone > > calls; buy some products from dealers; and get to > > know people... You'll then realize that you can > > get cell capable scanners with no problem, > > so long as you've got the green. > > > > > > ------------------------------------------------------------------------ > > MAXIMIZE YOUR CARD, MINIMIZE YOUR RATE! > > Get a NextCard Visa, in 30 seconds! Get rates as low as > > 0.0% Intro or 9.9% Fixed APR and no hidden fees. > > Apply NOW! > > http://click.egroups.com/1/2122/0/_/507420/_/953694411/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > ------------------------------------------------------------------------ > Good friends, school spirit, hair-dos you'd like to forget. > Classmates.com has them all. And with 4.4 million alumni already > registered, there's a good chance you'll find your friends here: > http://click.egroups.com/1/2623/0/_/507420/_/953957691/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 104 From: Miguel Puchol Date: Sun Mar 26, 2000 5:48am Subject: RE: TSCM receivers I was not aware of all these details, being from Spain. If this is how it went, then I understand how the system works over in the U.S. Here in Spain, telecomms law states that interception of ANY message or information not intended for you is illegal, but this is very rarely inforced. Some high-ranking gov' officials cell calls were recorded and filtered to media, and nothing was done about it (apart from throwing the analog phones away and buying GSM ones). All scanners sold are fully open, but strangely enough, amateur radios like the Yaesu VX-1 or VX-5, which are sold as 'dual-band rigs with wide RX coverage', are only capable of receiving amateur bands out of the box. You can, however, perform a simple mod to open the rig. All Yaesu have to do is put a label on the box that reads 'not modifiable by sole use of the keypad or external software', and they're covered. Cheers, Mike > Ramsey only got "burned at the Stake" as he was blatantly advertising > one or more of his products as a quote "Phone Bug" (I have copies of > the catalog where he does this), he got a bit too cocky, and the > government took him down a peg. On top of that virtually nothing they > sold had an FCC ID and they would sell to anybody (not just > hobbyists). < SNIP > 105 From: James M. Atkinson, Comm-Eng Date: Sun Mar 26, 2000 6:01pm Subject: Roswell Keep this in mind as "Election 2000" gains momentum... On July 1, 1947, witnesses claim a spaceship with five aliens aboard crashed on a sheep and cattle ranch outside Roswell NM, an incident they say has been covered up by the military. On March 31, 1948, exactly nine months after that day, Al Gore was born. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 106 From: Robert G. Ferrell Date: Mon Mar 27, 2000 10:53am Subject: Re: Roswell >On July 1, 1947, witnesses claim a spaceship with five aliens aboard >crashed on a sheep and cattle ranch outside Roswell NM, an incident >they say has been covered up by the military. >On March 31, 1948, exactly nine months after that day, Al Gore was born. I expect if he's elected he'll disappear into the White House and reemerge in his true visage, Marvin the Martian. The first time someone takes a pot shot at him during a press conference, we'll hear, "I'm getting very angry. Very angry indeed." Next thing you know, out comes the Illudium P-32 Explosive Space Modulator and we're all toast. Cheers, RGF 107 From: Perry Myers Date: Mon Mar 27, 2000 10:41am Subject: RE: Roswell Not that there is anything wrong with a little foreign intervention. After all, us earthlings have not exactly been perfect so far! -----Original Message----- From: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] Sent: Sunday, March 26, 2000 6:02 PM To: TSCM-L Mailing List Subject: [TSCM-L] Roswell From: "James M. Atkinson, Comm-Eng" Keep this in mind as "Election 2000" gains momentum... On July 1, 1947, witnesses claim a spaceship with five aliens aboard crashed on a sheep and cattle ranch outside Roswell NM, an incident they say has been covered up by the military. On March 31, 1948, exactly nine months after that day, Al Gore was born. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved ------------------------------------------------------------------------ MAXIMIZE YOUR CARD, MINIMIZE YOUR RATE! Get a NextCard Visa, in 30 seconds! Get rates as low as 0.0% Intro or 9.9% Fixed APR and no hidden fees. Apply NOW! http://click.egroups.com/1/2122/0/_/507420/_/954175054/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 108 From: Date: Mon Mar 27, 2000 11:29am Subject: Re: TSCM receivers Thanks fo your opinion. I liked it. Can you direct me to a hand held spectrum analyser? I've got something going on at the home front here that causes me concern Thanks, Dan 109 From: Andre Holmes <1ach@g...> Date: Mon Mar 27, 2000 3:42pm Subject: Re: Roswell I want to clear up any misconceptions about real flying sausers.It was 1992 I was asleep in my camper a travel trailer located on high ground topographical area plus 500 acres much of it unseen by humans I got lost one day and hiked four grulling hrs till I reached a road luckey for me I was armed shotgun and 45 ready for any attack.That was one day on the other day while asleep it was a summer night pitched black small acorns were on the trees,I started to get hot and I was sweaton. I saw this bright white lighted flying object about 300 ft above tree tops it was to my left.It was then that I realized It was a UFO by then one of the resident land owners down over the ridge beyound the creek opened up on the ufo with a 12 gauge shotgun I heard of storys of people trying to take on ufos and losing believe me humans can knock it out of the sky with heat seeking projectiles from silos only,now what did the shooting do to the spacecraft nothing accept it moved out of projectairy range of the shooting.It got closer to me maintaing tree top height about 100ft I heard the engines they were smooth real quite Id say two engines it was like hearing properly tuned honda engines. My skin did get blocky I also communicated with it using a mag flashlite I flickered it on and off took about 25sec for them to respond then how ever many times I flicker four then four acorns fell from the trees you could hear then and count them as well.I would say it was not as big as a football field.You could not get a real good look at it because it would hover in and out and the glow of lights would throw your vision off sometimes you would see four lights when it moved out then two lights when it moved in.I did not have a working camera only buris 10-50s at the time.Since then I have seen two unducumented animals on two legs that eats meat one actually stalks me through the woods so I always have softnose bullets all the time.That was a true story and the locals can back it up and if you are daring and can shoot staight you can hike out there and camp for three days with optics you will see the animal stalk you,but I plan on getting it on film first then I will go national with it. When we are in space moris code should be sent out in all directions then have cameras picking up movement of a UFO. -----Original Message----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Date: Monday, March 27, 2000 11:37 AM Subject: [TSCM-L] Roswell >From: "James M. Atkinson, Comm-Eng" > >Keep this in mind as "Election 2000" gains momentum... > >On July 1, 1947, witnesses claim a spaceship with five aliens aboard >crashed on a sheep and cattle ranch outside Roswell NM, an incident >they say has been covered up by the military. > >On March 31, 1948, exactly nine months after that day, Al Gore was born. > >-jma > =================================================================== > Sed quis custodiet ipsos Custodes? > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Copyright 2000, James M. Atkinson, All Rights Reserved > >------------------------------------------------------------------------ >MAXIMIZE YOUR CARD, MINIMIZE YOUR RATE! >Get a NextCard Visa, in 30 seconds! Get rates as low as >0.0% Intro or 9.9% Fixed APR and no hidden fees. >Apply NOW! >http://click.egroups.com/1/2122/0/_/507420/_/954175054/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > 110 From: Date: Mon Mar 27, 2000 11:02am Subject: Re: TSCM receivers I like this. Thanks for the info. Can you help with a name as far as where I can get one? Dan 111 From: Date: Mon Mar 27, 2000 11:22am Subject: Re: TSCM receivers Thanks for your opinion. I really appreciated it. I would appreciate an update on new equipment you might be designing. I have a specific concern here at home and need some counter technology. Thanks again for your comments Dan McGraw Elk River, MN 112 From: Ray Fitgerald Date: Mon Mar 27, 2000 6:38pm Subject: Re: Roswell I love it. " Truth is stranger than fiction".. Beam me up Al... I guess I'll be on the SS hit list now!... Raymond J. Fitzgerald Bureau Of Special Services bosspi@i... http://business.inc.com/bosspi 914-543-6487 --- 914-534-1060 FAX Licensed & Bonded Investigators in N.Y. since 1973 Member: NALI,ALDONYS,NAPPS,COIN,EPIC. " Truth Never Fears Detection " -----Original Message----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Date: Monday, March 27, 2000 11:37 AM Subject: [TSCM-L] Roswell >From: "James M. Atkinson, Comm-Eng" > >Keep this in mind as "Election 2000" gains momentum... > >On July 1, 1947, witnesses claim a spaceship with five aliens aboard >crashed on a sheep and cattle ranch outside Roswell NM, an incident >they say has been covered up by the military. > >On March 31, 1948, exactly nine months after that day, Al Gore was born. > >-jma > =================================================================== > Sed quis custodiet ipsos Custodes? > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Copyright 2000, James M. Atkinson, All Rights Reserved > >------------------------------------------------------------------------ >MAXIMIZE YOUR CARD, MINIMIZE YOUR RATE! >Get a NextCard Visa, in 30 seconds! Get rates as low as >0.0% Intro or 9.9% Fixed APR and no hidden fees. >Apply NOW! >http://click.egroups.com/1/2122/0/_/507420/_/954175054/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > 113 From: Jay Coote Date: Mon Mar 27, 2000 8:03pm Subject: Re: TSCM receivers I'm not up on the latest in handheld analyzers, but a good analyzer- with enough senstivity to find more than a "spy-store" bug, plus microwave coverage, will cost. You might consider hiring a TSCM specialist who has an analyzer (he or she should!) as well as equipment for telephones, carrier-current, physical searches and the rest. J. ---------- > From: Clockdepot@a... > > Thanks fo your opinion. I liked it. Can you direct me to a hand held spectrum > analyser? I've got something going on at the home front here that causes me > concern > Thanks, > Dan > > ------------------------------------------------------------------------ > DON'T HATE YOUR RATE! > Get a NextCard Visa, in 30 seconds! Get rates as low as > 0.0% Intro or 9.9% Fixed APR and no hidden fees. > Apply NOW! > http://click.egroups.com/1/2120/0/_/507420/_/954199050/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 114 From: James M. Atkinson, Comm-Eng Date: Mon Mar 27, 2000 8:52pm Subject: Re: TSCM receivers At 5:29 PM -0500 3/27/00, Clockdepot@a... wrote: >From: Clockdepot@a... > >Thanks fo your opinion. I liked it. Can you direct me to a hand held spectrum >analyser? I've got something going on at the home front here that causes me >concern >Thanks, >Dan It pains me to have to say this, but there are no decent hand held spectrum analyzers. About the closest to a "hand held" unit you can get (that is worth a hoot) is an AVCOM unit but the unit is fairly large. On the one hand I would suggest that you stay away from the hand held spectrum analyzers for use during TSCM usage as most of them are (or were) actually designed for use in aligning antennas, and not for hunting for very low level RF signals. Yet on the other hand I would recommend any instrument, tool, or method that gives you any advantage over the opposition. You money would be better spend on a CPM-700, 2044, or 2057. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 115 From: Jordan Ulery Date: Mon Mar 27, 2000 10:59pm Subject: Re: Roswell Good point, but I seem to recall that during the last election there was some foreign intervention in the form of Chinese contributions to the Clinton/Gore team. Perry Myers wrote: > From: Perry Myers > > Not that there is anything wrong with a little foreign intervention. After > all, us earthlings have not exactly been perfect so far! > > -----Original Message----- > From: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] > Sent: Sunday, March 26, 2000 6:02 PM > To: TSCM-L Mailing List > Subject: [TSCM-L] Roswell > > From: "James M. Atkinson, Comm-Eng" > > Keep this in mind as "Election 2000" gains momentum... > > On July 1, 1947, witnesses claim a spaceship with five aliens aboard > crashed on a sheep and cattle ranch outside Roswell NM, an incident > they say has been covered up by the military. > > On March 31, 1948, exactly nine months after that day, Al Gore was born. > > -jma > =================================================================== > Sed quis custodiet ipsos Custodes? > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Copyright 2000, James M. Atkinson, All Rights Reserved > > ------------------------------------------------------------------------ > MAXIMIZE YOUR CARD, MINIMIZE YOUR RATE! > Get a NextCard Visa, in 30 seconds! Get rates as low as > 0.0% Intro or 9.9% Fixed APR and no hidden fees. > Apply NOW! > http://click.egroups.com/1/2122/0/_/507420/_/954175054/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > ------------------------------------------------------------------------ > GET A NEXTCARD VISA, in 30 seconds! Get rates as low as 0.0% > Intro or 9.9% Fixed APR and no hidden fees. Apply NOW! > http://click.egroups.com/1/937/0/_/507420/_/954184849/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 116 From: Jesse Thomas Date: Mon Mar 27, 2000 6:21pm Subject: Re: TSCM receivers Oh, they're easy to modify. I used to have some schematics on that stuff. I should dig them up for old times sake. remind me later for them. laters. Jay Coote wrote: > From: "Jay Coote" > > With the shadow of asinine receiver/scanner laws looming over > US security and TSCM persons.... what can one do to obtain > a receiver (for legitimate TSCM use) which has not been electronically neutered? > It would be just like a 'bugger' to set his/her device to transmit > within the coverage gaps of US-market receivers.... > Jay Coote > TSCM@j... > > ------------------------------------------------------------------------ > MAXIMIZE YOUR CARD, MINIMIZE YOUR RATE! > Get a NextCard Visa, in 30 seconds! Get rates as low as > 0.0% Intro or 9.9% Fixed APR and no hidden fees. > Apply NOW! > http://click.egroups.com/1/2122/0/_/507420/_/953689650/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 117 From: Steve Uhrig Date: Mon Mar 27, 2000 6:41pm Subject: Handheld spectrum analyzer Once upon a midnight dreary, Clockdepot@a... pondered, weak and weary: > Can you direct me to a hand held spectrum analyser? There is a handheld spectrum analyzer for sale on our website used equipment page, along with other surveillance, countersurveillace and communications equipment. http://www.swssec.com/used.html Regards .... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 118 From: Date: Mon Mar 27, 2000 9:13pm Subject: Re: Roswell Hhahahahhahhahaha. http://community.webtv.net/Negative-/Gotterdammerung 119 From: isg Date: Sat Mar 25, 2000 9:03pm Subject: Re: For Sale: Kaiser SCD5 Michael: Just had a chance to read your e-mail is the unit still available? Pls. notify e-mail or phone 973-335-4139. Rich Michael Martz wrote: > From: Michael Martz > > Hello, > > I have an unused new in box Marty Kaiser SCD5 Carrier Current > detector for sale for $200 if anybody needs one. > > The battery powered SCD5 detects VLF (10 KHz to 700 KHz) > carrier-current signals on AC power or telephone lines. The unit is > supplied withdetector/amplifier assembly, AC and telephone input > cables (both protected to 400 volts DC or 50/60 Hz AC) and headset. > > Please email for any questions. > > Thanks, > > MM > > ------------------------------------------------------------------------ > DON'T HATE YOUR RATE! > Get a NextCard Visa, in 30 seconds! Get rates as low as > 0.0% Intro or 9.9% Fixed APR and no hidden fees. > Apply NOW! > http://click.egroups.com/1/2120/0/_/507420/_/953072859/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 120 From: James M. Atkinson, Comm-Eng Date: Tue Mar 28, 2000 4:33pm Subject: Radio Transcript [Humor] This is the transcript of the ACTUAL radio conversation of a US Naval ship and the Canadians, off the coast of Newfoundland, October 1995. Radio conversation released by the Chief of Naval Operations 10-10-95. ----- CANADIANS: Please divert your course 15 degrees to the South, to avoid a collision. AMERICANS: Recommend you divert your course 15 degrees to the North, to avoid a collision. CANADIANS: Negative. You will have to divert your course 15 degrees to the South to avoid a collision. AMERICANS: This is the Captain of a US Navy ship. I say again, divert YOUR course. CANADIANS: Negative. I say again negative, you will have to divert your course. AMERICANS: THIS IS THE AIRCRAFT CARRIER US LINCOLN, THE SECOND LARGEST SHIP IN THE UNITED STATES ATLANTIC FLEET. WE ARE ACCOMPANIED BY THREE DESTROYERS, THREE CRUISERS, AND NUMEROUS SUPPORT VESSELS. I DEMAND THAT YOU CHANGE YOUR COURSE 15 DEGREES NORTH. I SAY AGAIN, THAT'S 15 DEGREES NORTH, OR COUNTERMEASURES WILL BE UNDERTAKEN TO ENSURE THE SAFETY OF THIS SHIP. CANADIANS: We're a lighthouse. Your call. =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== From: James M. Atkinson, Comm-Eng Date: Fri Mar 23, 2001 8:24am Subject: Psychiatrist A psychiatrist is doing rounds in his asylum with a couple of students. They look in on one patient and the psychiatrist says to his students, "Sometimes this fellow thinks he's a temptress in a Bizet opera, but today, as you can see from his goose stepping, he thinks he's the World War II head of the Nazi Luftwaffe. What condition do you think he's suffering from?" The first student replies, "Is he a paranoid schizophrenic with a multiple personality disorder?" The second student says, "No, I think he just doesn't know whether he's Carmen or Goering." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2793 From: James M. Atkinson, Comm-Eng Date: Fri Mar 23, 2001 8:25am Subject: Some Things to Ponder! Birthdays are good for you: the more you have the longer you live. How long a minute is depends on what side of the bathroom door you're on. I have noticed that the people who are late are often so much jollier than the people who have to wait for them. If ignorance is bliss, why aren't more people happy? If Wal-Mart is lowering prices every day, how come nothing in the store is free yet? You may be only one person in the world, but you may also be the world to one person. Some mistakes are too much fun to only make once. Don't cry because it's over; smile because it happened. We could learn a lot from crayons:some are sharp, some are pretty, some are dull, some have weird names, and all are different colors ...but they all have to learn to live in the same box. Everything should be made as simple as possible, but no simpler. A truly happy person is one who can enjoy the scenery on a detour. Happiness comes through doors you didn't even know you left open -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2794 From: Robert G. Ferrell Date: Fri Mar 23, 2001 8:39am Subject: Re: Psychiatrist >The second student says, "No, I think he just doesn't know >whether he's Carmen or Goering." Ugh. Reminds me of something from James Thurber (I'm paraphrasing because I don't remember the exact Horace quote he used): If you prefer "I think, therefore I am" to "Tear thyself from delay," you are putting Descartes before Horace. ;-) Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2795 From: Steven Fustero Date: Fri Mar 23, 2001 10:25am Subject: Re: Psychiatrist > >The second student says, "No, I think he just doesn't know > >whether he's Carmen or Goering." > > Ugh. Reminds me of something from James Thurber (I'm paraphrasing because > I don't remember the exact Horace quote he used): > > If you prefer "I think, therefore I am" to "Tear thyself > from delay," you are putting Descartes before Horace. > Sort of reminds me of the baseball joke about: "The beer that Milt Famey Walk us" SJF IACSP iacsp@e... > ;-) > > Cheers, > > RGF > > Robert G. Ferrell, CISSP > Information Systems Security Officer > National Business Center > U. S. Dept. of the Interior > Robert_G_Ferrell@n... > ======================================== > Who goeth without humor goeth unarmed. > ======================================== > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- ----------------------------------------------------- Click here for Free Video!! http://www.gohip.com/free_video/ 2796 From: Miguel Puchol Date: Fri Mar 23, 2001 10:09am Subject: RE: computer controlled TSCM equipment Andy, I have to say that here in Spain all subscriber lines, the local loop, runs on cable with 4 conductors, plus a steel guide to make it more resistant to mechanical damage. Lines only take two, even ISDN & DSL, so the other two can be used in many ways to get information out of a building. Also, it's very common that when someone gets a second line fitted, the telcos will lay another 4-way cable, thus leaving two unused pairs... Now we also have an electric company that wants to enable the power lines running into people's homes to act as high-speed data lines (2Mbps), and they should be getting permits very soon - I cannot imagine though how you can keep things minimally private in this scenario. With normal lines, at least you know that your cable goes straight (usually) to the switch, but with powerlines, you are sharing the medium with all your neighbourhood. Happy hunting! Mike > -----Mensaje original----- > De: A Grudko [mailto:agrudko@i...] > Enviado el: jueves, 22 de marzo de 2001 20:11 > Para: TSCM-L@yahoogroups.com > Asunto: Re: [TSCM-L] computer controlled TSCM equipment > > > ----- Original Message ----- > From: James M. Atkinson, Comm-Eng > > > > >Selectable Multi cable combining > > > Please explain > > Just about every 'phone we encounter these days uses 2 wires. > Wax on, wax off; data in, data off. > > So why are there 4 conductors? > > A decade (or was it millenium) ago many local PBX (Private Branch > Exchange) > extensions/lines used 4 - 16 (really old mechanical pushbutton > phones - like > 20 years back!!) cables to connect to the PABX (Private Automatic Branch > Exchange) or line. > > Don't laugh, but when I arrived in Africa in 1979 we still had many manual > exchanges operated by 2 pin 8mm plugs hand pluged by an operator with a > headset linking calls locally and to the outside world. > > We even had a TV soap opera, based on the goossipy interception of calls, > called 'Nommer Assebleif' (apologies for local spelling errors) meaning > 'Number Please'. > > In my early '80's TLAs we built in two 10 way wafer switches and > a heck of a > lot of croc clip terminated cables. Seriesed in were 1.5 v and 9 v > switchable supplies with reversable polarity (to drive EC Mikes). Testing > all combinations of 5 pairs called for 10 x 10 x 3 (300) manual > cable tests. > Clients bitched that we were wasting time (their money...). > > Even today, most phones have 4 pin connectors, but only use 2. Why? Spares > just in case. > > What more could a spy ask for. > > Sidetone. > > Sidetone? > > Every phone - even digital - has sidetone - it's that squirt of your mike > audio that joins the other person's audio at the earpiece and makes the > handset earpiece sound 'natural'. > > So the earpierce carries both sides of the conversation. The > buggist plucks > this up at the PCB connector in the instrument and sends it down the 2 > unused cables that the manufacturer has kindly supplied as 'spares'. > > From there the buggist's imagination rules as to how he gets the audio out > of the building. > > > Andy Grudko. D.P.M., Grad I.S, (S.A.) > CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & > intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, IPA, AmChamCom "When you need it done right - first time" ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 2797 From: James M. Atkinson, Comm-Eng Date: Fri Mar 23, 2001 10:25am Subject: Dinner with the Parents A girl asks her boyfriend to come over Friday night and have dinner with her parents. This being a big event, the girl tells her boyfriend that after dinner, she would like to go out and "do it" for the first time. Well, the boy is ecstatic, but he has never done it before, so he takes a trip to the pharmacist to get some protection. The pharmacist helps the boy for about an hour. He tells the boy everything there is to know about protection and "doing it". At the register, the pharmacist asks the boy how many he'd like to buy; a 3-pack, a 10-pack, or a family pack. The boy insists on the family pack because he thinks he will be very busy, it being his first time and all. That night, the boy shows up at the girl's parent's house and meets his girlfriend at the door. She greets him, saying "Oh I'm so excited for you to meet my parents, come on in." The boy goes inside and is taken to the dinner table where the girl's parents are seated. The boy quickly offers to say grace and bows his head. A minute passes, and the boy is still deep in prayer with his head down. Ten minutes pass and still no movement from the boy. Finally, after 20 minutes with his head down, the girlfriend leans over and whispers to her boyfriend, "I had no idea you were so religious." The boy turns and whispers back, "I had no idea your father was a pharmacist." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2798 From: Jake Bozeman Date: Fri Mar 23, 2001 9:40am Subject: Self Contained TSCM System I am a software developer and systems integrator with 18 yrs experience in automation systems. Much of my experience is in building custom systems with integrated OEM cards. All of the specifications I've seen here, and more, can be incorporated into a tool case system. I would be willing to build a system to specifications in conjunction with a TSCM expert. For a highly qualified TSCM expert I would build the system and code the software for free if you would provide the hardware. For this to be a worthwhile proposition the TSCM expert must be a leader in their field. Most of the analog/digital component cards are very inexpensive as are wintel mother boards. The most expensive item would be a flat screen monitor with sufficient resolution and refresh rate required to run an osilliscope window. All other business issues are open... Anyone interested please contact me at jake.bozeman@l.... 2799 From: Date: Fri Mar 23, 2001 9:58pm Subject: Spy case prompts polygraphs for 500 in FBI - Post Spy case prompts polygraphs for 500 in FBI - Post WASHINGTON, March 24 (Reuters) - Some 500 FBI employees with access to intelligence information will be given lie detector tests beginning next week in the first security reform stemming from the arrest of alleged spy Robert Hanssen, the Washington Post reported on Saturday. The newspaper cited officials as saying the 500 employees who will face the first polygraph tests of their careers include about 150 top managers at FBI headquarters in Washington, special agents in charge of regional offices and any others with access to sensitive intelligence material. FBI Director Louis Freeh has also ordered reviews of all "sensitive investigations" to determine if other agents have accessed information outside their normal duties, the Post said, citing a memo sent to FBI employees last week. U.S. Attorney General John Ashcroft announced March 1 that the FBI would expand the use of polygraph tests and would more closely audit access to computers and other information. Ashcroft said that he and Freeh had agreed on the interim measures after the February arrest of Hanssen, a 25-year FBI veteran and counter-intelligence expert. Hanssen has been accused of spying for Moscow since 1985 in exchange for $1.4 million in money and diamonds. He allegedly gave Moscow secrets that included names of double agents and U.S. electronic surveillance methods, revelations that severely damaged national security, U.S. officials said. The FBI in the mid-1990s started giving polygraphs to new hires and agents working on highly-sensitive cases. But Hanssen and other long-time agents were never tested. 2800 From: James M. Atkinson, Comm-Eng Date: Sun Mar 25, 2001 7:23am Subject: Trade Secrets - Is America's top-secret spy tradecraft still secure? Trade Secrets - Is America's top-secret spy tradecraft still secure? Miniature cameras placed in the headlights of vehicles of known Russian spies, to record their movements. Homing devices, and an extensive system of transmitters, to track them as they traveled throughout New York City. Slivers of metal and fiber optics, embedded in window seals and furniture, to serve as supersensitive listening equipment. Now, these surveillance techniques, among the best practiced by U.S. counterintelligence, may be lost. ABCNEWS has learned that suspected Russian spy Robert Hanssen was in a position to reveal the techniques, called tradecraft, to his Russian and Soviet handlers, when he worked for the FBI in New York from 1985 to 1987. At that time, Hanssen was a counterintelligence agent, supervising a squad targeting Soviet spies in the home town of the United Nations and international finance, the prime domestic location for American espionage efforts against the Russians. "Hanssen would have had access and knowledge of all of the techniques that would be used against the Soviets," said Harry Brandon, who once oversaw the FBI's counterintelligence program. "I would assume everything is gone. Assume the worst," he said. Secrets from the Playbook Among the secrets that Hanssen may have revealed is the location of a supersecret counterintelligence center in New York known as MEGAHUT. That knowledge would allow the Russians to closely monitor undercover FBI operations. He might have also revealed a large scale real estate program maintained by the United States, that bought properties in expensive areas throughout New York City so they could be used for surveillance. Other secrets from the tradecraft playbook include an FBI system for photographing passengers coming in from Russia - to monitor for incoming spies. FBI officials are now reviewing failed covert operations from the period Hanssen was in New York, trying to see if the failures were because their tradecraft playbook had been given to the Russians. But the electronic snooping war continues to evolve, with more sophisticated devices that are increasingly difficult to detect. One new development is the airborne microphone. "Having no metallic content whatsoever makes it immune from X-rays," said surveillance consultant Martin Kaiser. "It makes it immune from known wire detection processes so it's really the ideal microphone." 'Exceptionally Strong' Evidence Meanwhile, a federal judge recently ordered Hanssen to stay in jail on the grounds that the government's evidence against him was "exceptionally strong." Hanssen was arrested Feb. 18, charged with selling secrets to Russia and the Soviet Union since 1985, including the names of double agents and U.S. surveillance methods. The counts against him say he "compromised numerous FBI counterintelligence investigative techniques, sources, methods and operations, and operational practices and activities targeted against" Soviet and Russian agents in the U.S. He faces life in prison or death if convicted. His lawyers have said he is planning to plead not guilty. Copyright © 2001 ABC News Internet Ventures. Click here for Terms of Use & Privacy Policy & Internet Safety Information applicable to the site. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2801 From: A Grudko Date: Sat Mar 24, 2001 10:26am Subject: Re: 'Shower spy camera' doctor let off ----- Original Message ----- > Dr Michael Shiew, 27, formally resigned as a junior doctor at St George's > hospital, Tooting, this month after police found what they said was a spy > camera set up to beam pictures to a video recorder in a bedroom at Brighton > General Hospital, where he was on a training course. > A confiscated video cassette did not show anybody using the shower block. A > six-week investigation yielded insufficient evidence to charge him, the > Crown Prosecution Service says. The General Medical Council has said it may > look at the case if Dr Shiew's alleged actions breached its disciplinary > procedures. An interesting TechLaw precident? - if true.... >A London doctor who was arrested after allegedly putting a spy camera in a shampoo bottle to video nurses showering will not face criminal charges. I'm trying to get my thoughts round this. A spy camera in a shampoo bottle ? 3 options: 1. One off oportunistic drop - complete unit, cam., tx, batteries (must be low power/range, dropped 06:00 ish to hope for any fun), antenna (must be omni-directional, VP). -----or was it steam powered?-----and from which end???? 2. Regular visitor - 2 identical units, swapped daily when batteries flat, 'till discovered 3. Few hours access - shampoo bottle contained cam. - hard wired to tx, psu, ant (possibly 'beam' ) All options assume conditions where the bottle won't be touched. Given 3 above I'd have gone for concealment in a fixture; not that I have any interest in showering women........ Presumably the police ascertained that: the camera was transmitting (implied by 'beam') the suspect's VCR's receiver was tuned to the camera output through a broadcast band TX frq. or that the VCR was connected to a RX if the TX was outside of broadcast frequencies Of course, many of today's TVs and VCRs have auto tune facilities. Joe Public hits a button and every usable local signal is loaded into their equipment's memory. So if the TX was on a commercial frequency and the VCR had the frequency in memory it proves nothing as probably dozens of other TVs/VCRs within range could have innocently received the signal in an urban area. If it was a case of non-standard TX/RX equipment (implying criminal oportunity and means, nailing the suspect), why would video taping be an essential evidential element to prosicute - he could have been getting his jollies watching live 'Shower TV'. * If the accused was in fact responsible for the planting of the equipment, there should be other evidence (DNA, fingerprints, witnesses, surveillance CCTV, access control, proof of purchase of equipment, other voyeristic material on site, prior arrests, peer testimony etc). The quoted article is written with the normal journalistic disregard for evidence (newspapers sell stories, not facts). "set up to beam pictures to a video recorder in a bedroom at Brighton" Do journalists know the technical differences between 'beam' and 'broadcast' and their limitations? Doubtfull. Why was the suspect identified as such? See * above. "A confiscated video cassette did not show anybody using the shower block. " But did it show the shower block? Was it blank? Was it Lethal Weapon 2? This is why they are low paid journalists, not high paid lawyers. Bylines, not facts. If I was an intelligent pervert (as against just being a pervert) I'd simply study to become a gynaecologist,,,,, but that is part of the complex human condition. Incedentally, my free personal showercam can be viewed at www.wet-hairy-fat-bald-pertvert-bloke.com (joke). Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2802 From: James M. Atkinson, Comm-Eng Date: Mon Mar 26, 2001 10:49am Subject: Putin holds the aces in spy games Putin holds the aces in spy games http://www.sunday-times.co.uk/news/pages/sti/2001/03/25/stifgnusa02003.html? Tony Allen-Mills, Washington and Mark Franchetti, Moscow Blair warns Putin over Russian spies in Britain FOR ONCE, there was no media circus as President George W Bush stepped from his limousine in the woods of northern Virginia last week. Television cameras are rarely welcome at the Langley headquarters of the CIA, where Bush had gone to praise America's spies for their "vital contribution to our nation's security". Although he had come to thank the "dedicated and daring" agents who provide him with his breakfast intelligence briefings - "I see your product every morning at 8 o'clock sharp," he said - Bush must also have known that he was about to make their jobs a great deal harder. The day after his visit he ordered the expulsion of 50 Russian diplomats accused of spying for Moscow. Nobody in Washington had the slightest doubt that President Vladimir Putin would retaliate in kind. Sure enough, by the end of last week the Kremlin had let it be known that an equal number of American diplomats would soon be packing their bags. "We have time to think, to carefully pick," gloated Sergei Ivanov, the secretary of Putin's national security council. Moscow, he said, intended to expel the diplomats "who are most precious to the Americans". The question being asked in the Washington and Moscow intelligence communities last week, though, was: who stands to lose most from Bush's plunge back to cold war-style espionage confrontation - the Kremlin or the CIA? The arrest earlier this year of Robert Hanssen, a senior FBI special agent who spent 15 years selling secrets to Moscow, has not only provoked the biggest purge since President Ronald Reagan booted out 80 Russians in 1986; it has also raised serious doubts about Bush's foreign policy judgment, the future of the relationship between former superpower adversaries and America's ability to protect its military and economic secrets from hostile foreign scrutiny. In a throwback to the cold war age of espionage obsession, counterintelligence agents in Moscow and Washington were yesterday reported to be searching for spies who are believed still to be operating. After scrutinising thousands of pages of evidence collected from computer disks and other sources following Hanssen's arrest in February, American officials have reportedly concluded that at least one other spy for Russia remains undetected in a key American government post. According to tomorrow's edition of US News and World Report magazine, a former CIA official is quoted as saying: "There's a massive mole hunt going on." A similar operation is under way in the ranks of the SVR, the Russian foreign intelligence agency that replaced the KGB. Sources in Moscow claimed that it had not yet identified the man or woman who betrayed Hanssen's identity to the Americans. Until now it has been widely assumed that American authorities learnt about Hanssen during debriefings of Sergei Tretyakov, a Russian diplomat to the United Nations who defected last October. "If that were the case, the first thing the SVR would have done after it realised Tretyakov had defected would have been to alert Hanssen and freeze all contact with him," said Marina Latysheva, an expert on Russian intelligence. Instead, Hanssen maintained contact with his Russian handlers in Washington until days before his arrest. As late as February 12 - six days before his arrest - FBI agents found a package of $50,000 in used $100 bills at a so-called dead drop site where Russian diplomats left messages for Hanssen. "The SVR must have a mole inside its ranks," said a former Russian intelligence officer. "The service will now be doing everything it can to track him down." At stake is a commodity that both sides continue to regard as crucial to their respective national interests. "Sound intelligence is still critically important to America's national security," Bush told the CIA last week. But some Washington sources believe that America's ability to gather that intelligence may be damaged more than Moscow's in the wake of the Hanssen affair. Since the collapse of communism, several American academics have questioned the basis of espionage operations in a world of fast-changing technology where a skilled computer operator can obtain volumes of classified information with a few clicks of a mouse. "The central question about spying today is whether it is still necessary," Loch K Johnson, a Georgia political scientist, wrote in the influential journal Foreign Policy last year. The most spectacular recent example of the collapsing value of traditional espionage techniques proved to be Hanssen's betrayal of the spy tunnel built under the Soviet embassy - now the Russian embassy - in Washington. For more than a decade American agents ran what they believed was an invaluable listening operation. It now appears that the Russians learnt about the tunnel years ago and may have fed the Americans all manner of deliberate disinformation. At the same time, intelligence sources said, both sides have powerful reasons for continuing to seek each other's secrets. America's global technological superiority remains a magnet for intensive military and industrial espionage by Russia and many other states. "They are very interested in continuing to obtain militarily significant technologies," said Herbert Baker Spring, a defence expert at the Washington-based Heritage Foundation. Although the level of Russian diplomatic spying in America declined sharply in the early 1990s, intelligence sources say it began to pick up in 1993 and has recently returned to cold war levels. Hanssen's exposure offered Bush the opportunity to send a message to Moscow in much the same way he had sent one to Saddam Hussein, when he bombed Baghdad within a few days of entering the White House. "This is somewhat more than just a routine tit-for-tat," said Baker Spring. "It signals a sterner policy towards Moscow in the sense that significant problems in the relationship are not going to be papered over, or in the worst cases ignored." In American eyes, China is steadily replacing Russia as a more dangerous military threat and last week's disclosure that a senior Beijing officer had defected to Washington hinted at an intelligence war being waged on a new front line. However, America still requires significant intelligence about Russia's nuclear arsenal and its weapons sales around the world. Bush also needs to know at his breakfast CIA briefings what Russia has succeeded in learning about American military plans for such controversial programmes as the "son of star wars" anti-missile shield. Ivanov, an old KGB friend of Putin's, accused Washington last week of attempting to turn Russia into "a scarecrow figure . . . a focus of evil, trading in missiles and nuclear weapons right and left, and spying across the world". Many conservative Republicans see that picture as entirely accurate. Yet several American sources have suggested the CIA will be hurt more than the SVR if Russia goes ahead with its threat to be selective in its promised expulsions. American officials noted last week that the head of the SVR station in Washington had been spared expulsion as a signal that Washington did not seek to precipitate a lasting crisis. Putin may not prove so accommodating, and the reckoning in intelligence circles last week was that the heavyweight Russian spy operation in America could afford to lose 50 agents more comfortably than the CIA can do without key operatives in Moscow. "We've underestimated our enemies," said a former Justice Department spy prosecutor. "Russia has a vacuum cleaner mentality when it comes to sucking up intelligence from potential adversaries, particularly the United States, and that continues today . . . it's going to take a long time before we can rebuild from this." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2803 From: James M. Atkinson, Comm-Eng Date: Mon Mar 26, 2001 10:50am Subject: Rules of the Espionage Game Still Apply: Get Caught and You Go Home NEWS ANALYSIS Rules of the Espionage Game Still Apply: Get Caught and You Go Home http://www.iht.com/articles/14524.html James Risen New York Times Service WASHINGTON Retaliatory measures now under way between Washington and Moscow fit neatly into the long-established rules of the espionage game that the two sides have played by ever since their spies first went out "into the cold" to do silent battle. . President George W. Bush's decision to expel four Russian diplomats immediately, and demand that Moscow withdraw 46 others by July 1, is the largest such action since 1986, and it is far more aggressive than any such action taken by the United States since the collapse of the Soviet Union. . Russian officials, complaining that the Bush administration is trying to turn back the clock to a Cold War mentality, quickly retaliated in kind. . But the actions followed the general rule that both the United States and the Soviet Union, and now Russia, have always accepted: that when one side gets caught running a spy on the other's turf, some intelligence officers serving under cover as diplomats have to go home. . It matters not that the spy in question might have volunteered to betray his country without much persuasion from his professional handlers. The rule of thumb in the intelligence world is simple: Get caught and you go home. . This explains why the Bush administration targeted for immediate expulsion the Russian intelligence officers who the United States believes were directly involved in handling the case of the FBI agent Robert Philip Hanssen, arrested last month on charges that he spied for Moscow for more than 15 years. . Still, another rule of the game is that there is something approaching professional courtesy in the espionage world. Intelligence officers, whether Americans from the CIA or Russians from the FSB, the successor to the KGB, almost never face serious harm themselves, even when they get caught red-handed. . Sometimes an intelligence officer will be arrested after the spy being handled has been unmasked. But because professional case officers almost always work under diplomatic cover and have diplomatic immunity, they are quickly released. . While the agents whom they have been handling face either long prison terms or even possible execution by their government, the worst that the foreign intelligence officers usually face is a public outing and a declaration by the opposing government that they are persona non grata, and that they must quickly leave. . At the end of one the most important spy operations run by the CIA against the Soviet Union during the Cold War, for example, a Soviet scientist, Adolf Tolkachev, was arrested in 1985. After Mr. Tolkachev's arrest and interrogation, the KGB lured a CIA officer, Paul Stombaugh, out for what he believed was a meeting with Mr. Tolkachev. When Mr. Stombaugh arrived at the meeting site, the KGB sprang its trap and arrested him. He was quickly released; the sole purpose of the KGB ambush had been to "out" an American and briefly weaken the CIA's operations in Moscow. . An ironclad rule of the game is that when one side orders the expulsion of intelligence officers as a result of an espionage case, the other country orders the expulsion of an similar number of intelligence officers - even if they have not been caught in a spy case themselves. . After the 1994 arrest of a CIA officer, Aldrich Ames, on charges of spying for Moscow, the Clinton administration ordered the expulsion of one Russian, the Washington rezident, or station chief. In response, the Russians ordered the expulsion of the CIA's station chief in Moscow. . Mr. Bush's move appears to have the added component of using the Hanssen case as a pretext for a broad move to reduce the Russian intelligence presence in the United States, which American officials complain has crept back up to Cold War levels. . In the latter stages of the Cold War the CIA and KGB even opened a regular channel of communications to make certain that the two agencies were working from the same informal play book. . With Cold War tensions running high during the Reagan administration, senior KGB officials approached their CIA counterparts and proposed the creation of a special communications line between the spy agencies. . After fits and starts, the "Gavrilov Channel" - named by the KGB after a 19th century Russian poet - led to secret meetings between senior CIA and KGB officials at neutral sites like Vienna and Helsinki. . For years, "Gavrilov" meetings enabled American and Soviet intelligence officials to make sure that both the CIA and the KGB understood the state of play in the espionage world. . Yet, new realities have intruded as the Bush administration has moved against the Russians. After the end of the Cold War, the CIA and the FSB began a formal liaison relationship - a dramatic expansion of "Gavrilov" style meetings - while the FBI opened an office in Moscow and officials began meeting with their Russian counterparts as well. . The two sides meet frequently to discuss issues on which they believe they can cooperate, like counterterrorism and counternarcotics programs. The official liaison programs have added a new and rather awkward layer to the spy-versus-spy relationship. . On Thursday, for instance, a U.S. official noted that the FSB's chief of station in Washington was not among those being declared persona non grata. . That Russian official's position is openly declared to the United States, and he is involved in liaison relations. . Despite its dramatic expulsion order and tough words to Moscow, the Bush administration apparently believes it would be counterproductive to expel him. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2804 From: James M. Atkinson, Comm-Eng Date: Mon Mar 26, 2001 11:11am Subject: Water and Coke - Interesting Facts Water and Coke - Interesting Facts WATER We all know that water is important but I've never seen it written down like this before. 75% of Americans are chronically dehydrated. (Likely applies to half world pop.) In 37% of Americans, the thirst mechanism is so weak that it is often mistaken for hunger. Even MILD dehydration will slow down one's metabolism as much as 3%. One glass of water shuts down midnight hunger pangs for almost 100% of the dieters studied in a U-Washington study. Lack of water, the #1 trigger of daytime fatigue. Preliminary research indicates that 8-10 glasses of water a day could significantly ease back and joint pain for up to 80% of sufferers. A mere 2% drop in body water can trigger fuzzy short-term memory, trouble with basic math, and difficulty focusing on the computer screen or on a printed page. Drinking 5 glasses of water daily decreases the risk of colon cancer by 45%, plus it can slash the risk of breast cancer by 79%, and one is 50% less likely to develop bladder cancer. Are you drinking the amount of water you should every day? ================================================= COKE No wonder coke tastes soooo good: 1. In many states (in the USA) the highway patrol carries two gallons of Coke in the trunk to remove blood from the highway after a car accident. 2. You can put a T-bone steak in a bowl of coke and it will be gone in two days. 3. To clean a toilet: Pour a can of Coca-Cola into the toilet bowl and let the "real thing" sit for one hour, then flush clean. The citric acid in Coke removes stains from vitreous china. 4. To remove rust spots from chrome car bumpers: Rub the bumper with a crumpled-up piece of Reynolds Wrap aluminum foil dipped in Coca-Cola. 5. To clean corrosion from car battery terminals: Pour a can of Coca-Cola over the terminals to bubble away the corrosion. 6. To loosen a rusted bolt: Applying a cloth soaked in Coca-Cola to the rusted bolt for several minutes. 7. To bake a moist ham: Empty a can of Coca-Cola into the baking pan, wrap the ham in aluminum foil, and bake. Thirty minutes before the ham is finished, Remove the foil, allowing the drippings to mix with the Coke for a sumptuous brown gravy. 8. To remove grease from clothes: Empty a can of coke into a load of greasy clothes, add detergent, And run through a regular cycle. The Coca-Cola will help loosen grease stains. It will also clean road haze from your windshield. FYI: 1. The active ingredient in Coke is phosphoric acid. Its Ph is 2.8. It will dissolve a nail in about 4 days. 2. To carry Coca-Cola syrup (the concentrate) the commercial truck must use the Hazardous material place cards reserved for Highly corrosive materials. 3. The distributors of coke have been using it to clean the engines of their trucks for about 20 years! Still Want To Drink Up????????? -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2805 From: Miguel Puchol Date: Mon Mar 26, 2001 11:18am Subject: RE: Water and Coke - Interesting Facts Very informative! Now....what if I switch to Pepsi? :-) Mike > -----Mensaje original----- > De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] > Enviado el: lunes, 26 de marzo de 2001 19:11 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] Water and Coke - Interesting Facts > > > > Water and Coke - Interesting Facts > > 2806 From: Robert G. Ferrell Date: Mon Mar 26, 2001 11:19am Subject: Re: Water and Coke - Interesting Facts >1. The active ingredient in Coke is phosphoric acid. Its Ph is 2.8. It will >dissolve a nail in about 4 days. >Still Want To Drink Up????????? Since the homeostatic pH of a normal stomach is 1.5 - 1.7, this fails to impress me. The second half of this article is pure FUD. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2807 From: James M. Atkinson, Comm-Eng Date: Mon Mar 26, 2001 11:45am Subject: Lie tests could stop spies or careers Lie tests could stop spies or careers http://www.detnews.com/2001/nation/0103/24/a04-203082.htm In wake of Hanssen espionage case, FBI expands polygraph use By Dan Eggen / The Washington Post WASHINGTON -- It seemed like a routine polygraph screening. Mark Mallah and other members of an FBI counterintelligence unit in New York were hooked up to lie detector machines and quizzed about drug use, contacts with foreigners and other subjects deemed vital to their roles in protecting national security. The test turned out to be anything but ordinary for Mallah. The 10-year FBI agent said he was accused of being deceptive on the exam, prompting a suspension from his job and a full-scale investigation that included 24-hour surveillance and interrogations of family and friends. When he was finally cleared and reinstated 19 months later, Mallah said, he quit. "I didn't have any desire to work for an organization that would do that to me," said Mallah, who left the FBI in 1996 and now practices law in San Francisco. "They never produced any evidence or came forward with anything, but the polygraph still undermined my career. ... I was effectively ruined." In the wake of charges that veteran agent Robert Hanssen had spied for Moscow since 1985, the FBI is embroiled in a debate over how far to expand its use of polygraph tests of employees with access to sensitive information. Hanssen never took a lie detector test during his 25 years with the bureau. Some analysts and lawmakers argue that more aggressive use of the devices might have stopped him much earlier. Skeptics say allegations such as Mallah's underscore the danger in relying too heavily on polygraph devices, which aren't considered reliable enough to be used in court. Atty, Gen. John Ashcroft said earlier this month that the FBI will expand polygraph use on some FBI employees because of "the very important consequences of breaches" in national security. But he conceded that "the polygraph is not a sure way," estimating an error rate of about 15 percent. Critics argue that such "false positives" can derail careers; even proponents concede that 2 percent to 5 percent of the tests are probably inaccurate. At the FBI, about a fifth of job applicants fail pre-employment lie detector tests, according to a report to Congress. Few get a second chance, and most are denied jobs, officials said. Polygraph machines, which measure respiration, blood pressure and other physical changes, can be defeated. Aldrich Ames, convicted of espionage in 1994, passed two polygraph exams while spying for Moscow, although investigators later faulted one of the tests as "deficient." Some Web sites brag that people can learn to beat the tests in a matter of hours. Others disagree, arguing that the machines serve as a deterrent at least, and can provide crucial clues in intelligence cases. At the FBI, polygraphs have been mandatory for new employees since 1994, and administered to some agents like Mallah because they have access to sensitive information about a secret program or criminal case. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2808 From: Steve Uhrig Date: Mon Mar 26, 2001 11:02am Subject: Re: Putin holds the aces in spy games Once upon a midnight dreary, James M. Atkinson, Comm-Eng pondered, weak and weary: > The day after his visit he ordered the expulsion of 50 Russian > diplomats accused of spying for Moscow. Nobody in Washington had > the slightest doubt that President Vladimir Putin would retaliate > in kind. Sure enough, by the end of last week the Kremlin had let > it be known that an equal number of American diplomats would soon > be packing their bags. > The question being asked in the Washington and Moscow > intelligence communities last week, though, was: who stands > to lose most from Bush's plunge back to cold war-style > espionage confrontation - the Kremlin or the CIA? The U.S. stands to lose more. The Russians have far more assets in the U.S. than the U.S. has in Russia. 50 expulsions from each would be a far greater percentage of U.S. intelligence personnel in Russia than Russians in the U.S. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2809 From: James M. Atkinson, Comm-Eng Date: Mon Mar 26, 2001 11:46am Subject: Corporate India sleepless over spying Corporate India sleepless over spying http://www.indian-express.com/ie/daily/20010326/ibu26018.html SANJAY SARDANA NEW DELHI, MAR 25: Corporate espionage is spreading rapidly in India, adversely affecting or threatening to affect businesses. As many as 72 per cent of the respondents covered in India Fraud Survey Report 2001 of global consultancy firm KPMG said corporate espionage has already affected or could affect their businesses. The survey covered 120 corporates. Consumer product segment accounted for the maximum number of frauds in terms of percentage. As many as 89 per cent of respondents from this sector said they suffered a fraud, followed by the hospitality (67 per cent) and the retail (50 per cent) industry. However, the actual number of frauds was the highest in the manufacturing sector followed by consumer products and financial services sector. Almost 46 per cent of the corporate frauds were committed by employees, 13 per cent by suppliers and another 12 per cent by service providers, says the survey.Women are fast catching up with men. The percentage of female fraudsters has risen to 11 per cent from 8 per cent since the last survey conducted in 2000. However, the profile of the typical fraudster continues to be the same as last year. It's usually a male aged between 26-40 years, earning between Rs 1 lakh-Rs 2.5 lakh and having spent between two to five years in the organisation.Respondents cited expense accounts (35 per cent), secret commissions (26 per cent) and false invoices (23 per cent) as the most expensive types of frauds. The other types of frauds include counterfeiting, forged cheques and loan documents, transportation contracts, bogus claims, fake mail transfers, and disappearance of customers. Close to 50 per cent of the respondents have experienced fraud of one form or the other in their organisations. Of these, close to 65 per cent of the organisations could quantify their losses to the tune of Rs 94 million, while the balance 36 per cent were unaware of the amount of loss suffered by them on account of frauds. The survey aimed at determining the outlook of the senior management towards various aspects of frauds, their experiences with frauds and steps taken by them. The questionnaire concentrated on issues like e-frauds, corporate espionage, experience and prevention of frauds, internal/external investigations, investigations by police/regulatory agencies and profile of the fraudster.More than 51 per cent of the respondents felt that internal methods like internal auditor reviews and internal controls (42 percent) are more effective tools to detect frauds than external methods. Corporates prefer internal investigations to external ones, as close to 86 per cent of the respondents adopted the internal method for investigation into frauds. An analysis of the areas of losses for the three major lines of businesses (categorised by the highest number of actual incidents), that is, consumer products, manufacturing and financial services, shows that misappropriation of funds and false financial statements were the largest area of loss in the financial services sector. But it was much lower in case of manufacturing and consumer product segments. Other major fraud-prone areas in the financial services sector were ATMs and credit cards. Copyright C 2001 Indian Express Newspapers (Bombay) Ltd. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2810 From: James M. Atkinson, Comm-Eng Date: Mon Mar 26, 2001 11:51am Subject: Spies come in from the cold, go on exhibit Spies come in from the cold, go on exhibit http://www.sunspot.net/features/arts/bal-as.spy25mar25.story?coll=bal%2Dsociety%2Dutility Visitors may spy, with their own eyes, the trappings and tales of undercover operatives. By Ellen Gamerman Sun National Staff Originally published March 25, 2001 WASHINGTON - Once a week in the late 1960s, after each installment of the TV spy adventure series, "Mission: Impossible," the phones would start ringing around Central Intelligence Agency headquarters. "You'd see a guy peel off his face on the show and people all over the CIA community would call Monday morning and say, 'Can we do that?' " recalls Jonna Hiestand Mendez, who was building espionage gadgetry in the CIA's Office of Technical Service at the time. "They also tended to like the electronic communications on the show - everything from talking into your lapel to your ring to your watch to your shoe." Few seem more fascinated by spy stories than spies themselves. Now, after years in the shadows, they have finally figured out how to make a public tribute to their profession. In an unlikely pairing, former spooks have spent the last two years teaming with museum experts to assemble the new International Spy Museum, a sprawling celebration of agents and their trade set to open a year from now in downtown Washington. At a time when this city seems to be crawling with intrigue - the arrest of FBI agent and suspected spy Robert Philip Hanssen, the disclosure of a U.S. spy tunnel under the Russian embassy, the U.S. government's ouster of more than 50 Russian diplomats this past week under suspicion of espionage and Russia's ensuing expulsion of American diplomats in Moscow - the museum taps a secret network that experts say has only grown in recent decades. The end of the Cold War has not diminished the craft of espionage, intelligence officials assert, but it has created a changing landscape that relies more heavily on the trade than ever. Cash-strapped nations want to steal a rival's high-priced defense technology, superpowers try to collect intelligence in an age of international terrorism and, sometimes, even countries that call themselves friends spy just for spying's sake. The intelligence officers that the spy museum aims to honor are traitors in some countries, heroes in others. The collection, though, will attempt to view them dispassionately, apart from their ideologies. Here, they are simply masters of their profession, people who turned snooping into an art form. While some former agents cringe at the idea of gum-snapping tourists horning in on their clandestine realm, others look at the museum as the memorial they never had. Finally, the world can know how hard it is to remember which fake name to sign on a document. "Among the leagues of retired spies around the world, you often hear their frustration - the preamble to so many of their stories is, 'If people only knew,' " says H. Keith Melton, a military historian who will provide the museum artifacts from his 6,000-piece, invitation-only spycraft collection in South Florida. "What the International Spy Museum will do is give a glimpse at some of these stories that heretofore have gone untold." The story of the museum begins with a millionaire broadcasting executive named Milton Maltz. Fascinated by the idea that every other FedEx deliveryman in Washington could be a double-agent - and that spy stories exist everywhere from the Bible to the walls of ancient Egyptian tombs - Maltz decided to build a museum in the heart of spy country devoted to the tales of the centuries-old spy trade. "It will be," he predicted, "the secret history of history." Maltz's preoccupation with espionage began when he was in the U.S. Navy in the Korean War, assigned to the super-secret National Security Agency. Later he founded Malrite Communications Group Inc., an operator of big-market radio and TV stations, and a related firm that is building the $30 million for-profit museum. "I think most people are fascinated by this circumspect group of individuals who risk their lives," says Maltz, 71, now retired and living in South Florida. "It's like that old saying: Nothing is as it seems." The five-building interactive complex, a block from FBI headquarters, is likely to mix typical sunscreen-and-sneakers Washington tourists with a far more mysterious set of onlookers. "Oh, I think a lot of our visitors will be spies - I have no doubt," says Dennis Barrie, director of the spy museum project who oversaw the creation of the Rock and Roll Hall of Fame in Cleveland. "Spies are fascinated with how the story is told and how they're presented." The museum, which includes CIA agents among its top advisers but is not sanctioned by the agency, will not reveal top-secret material. Still, so much tradecraft has been declassified over the years that organizers say this project easily will become the world's largest museum devoted to the history of espionage when it opens in spring, 2002. Today, museum researchers are traveling the globe for items like surreptitious entry kits and mechanical-pencil firing devices. Former KGB and CIA agents are consulting on everything from robot cameras to evasion techniques. The staff is videotaping interviews with dozens of spies, including some still behind prison bars, for an oral history. Some strange bedfellows, like gurus in the art of gift-shop layout and experts who understand stealth assassinations, are working to turn a sometimes brutal trade into a tourist-friendly experience. Among the items in the collection so far: "The Kiss of Death" (a KGB lipstick tube that, when twisted, fires a single bullet), a World War II Enigma machine (used to encipher and decipher messages by the Germans, ultimately decoded by the Allies in a coup that helped them win the war), a display of microdots (a reduction of a page of text to less than one millimeter in size) and an array of fake warts and eyeballs used to conceal classified information. The exhibits will examine the interplay between popular culture and the spy world. Former spies recall how Russian KGB technicians brought sketch books to James Bond movies because they thought actual American spies were using the futuristic gadgets. The stories made for chuckles at the CIA, but often art did inspire reality. "Looking at reality and fiction, we've often wondered out loud which really came first," says Carlos Davis, a 20-year CIA veteran who led the agency's fine arts commission. The collection, along with celebrating unsung spies, attempts to debunk the myths of the intelligence world. First in its sights: Mata Hari, a World War I spy and sensual dancer whose seductive techniques as a spy are legendary. The exhibit, though, will dismiss her as an overblown flirt made into a legend by a French firing squad. Helping assemble the collection is a band of former spies, including Oleg Kalugin, a retired major general in the Soviet KGB who has admitted to a bureaucratic role in the murder of Bulgarian dissident Georgi Markov with a poison-tipped umbrella on a London bridge in 1978. Working beside Kalugin is Tony Mendez, a 25-year CIA veteran who spied undercover during the Cold War and became famous for deftly changing identities. The museum skates delicately around the idea that it is glorifying a profession that has resorted to violence to obtain information. Anticipating critics, organizers are focusing on the more cerebral side of intelligence work and excluding simulated gunfire games from the museum's interactive exhibits. The museum draws some inspiration from commercially successful Disney-style playgrounds - the three-floor space will include interactive spy games, a giant gift shop, a swanky restaurant and catchy exhibits with names such as "Cloak and Dagger," "Dragons and Snakes" and "Wilderness of Mirrors." Still, the museum's creators also hope to tell the definitive history of spying, from the Trojan Horse to the Hanssen saga. Spying, long dubbed the world's second-oldest profession, is traced to its roots. In this country, that includes the tale of George Washington, who sent a cadre of women across the Delaware to locate the munitions and barracks of British troops before his famous attack. A section of the museum called "Celebrity Spies" will list others whose exploits are little-known, such as these World War II sleuths: Singer Josephine Baker (a spy for the French Resistance), Hollywood filmmaker John Ford (head of the field photographic unit of the CIA predecessor, the Office of Strategic Services) and chef Julia Child (an agent in India and China with the OSS). The gallery's organizers realize that since so much modern spy information is top confidential, the newest exhibits may tell only part of the story - though with spies tattling on each other all over Washington, they also hope to update the stories as new secrets are revealed. With each passing day, the project's researchers learn how the artifacts they will put under museum glass are not just relics from a bygone era: As the latest headlines illustrate, age-old tricks of spycraft are still very alive. After visiting this realm of intrigue, the museum's planners promise, no idling phone truck on the street will look innocent. No chalk mark on the pavement will appear random. And no stranger next door will ever seem above suspicion again. Copyright C 2001, The Baltimore Sun -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2811 From: Ray Van Staden Date: Mon Mar 26, 2001 9:36am Subject: SOUTH AFRICAN / NORWEGIAN DEVICE? Could members of the group comment on the following article which appeared in the Media in South Africa over the weekend. Has this journalist been taken for a ride ? Taking into consideration in South Africa we only have GSM. THE SUNDAY INDEPENDENT - South Africa March 24 2001 Watch it, somebody's listening to your cell By Jeremy Gordin Got a person in your life whose existence you have managed to keep secret from your spouse because you make your covert arrangements by cellular phone only? Better start thinking again about your mode of communication. A South African company known as Strategic Digital Technologies, based in Selby, Johannesburg, has, together with a Norwegian company called Scandec, manufactured what they say is the first machine capable of passively monitoring cellular telephone conversations. "Passive" is the operative word. Until now it has been possible to tap cellphone conversations, and apparently law enforcement agencies, secret services and the like are doing it the world over. Totally passive to the airtime network But such tapping - "active" monitoring of a cellular conversation by creating a stronger signal than the nearest base station - creates a "black hole" that immediately becomes evident in the control room of the service provider, say Clint Nassif and Bruce de Kock, managing director and group operations director respectively of Strategic Digital Technologies. "Our machine, the Delta III, is, as we say in the trade, totally passive to the airtime network, service providers or any other organisation, and thus maintains the optimum confidentiality of the operator," said De Kock. What this means in simple English is that the Delta III is the first machine that is able to tap cellular telephones while keeping the existence and whereabouts of the tapper secret. Neither Nassif nor De Kock denies having been involved "some time ago" with intelligence agencies and in the investigation of organised crime. Both vehemently deny, however, that Strategic Digital Technologies is a front for the national intelligence agency or the secret service. "We worked, via our Norwegian partners, with a number of former KGB experts in this field; we don't deny this," said De Kock, "which is probably why people are saying negative things about us. 'We worked with a number of former KGB experts' "As far as Delta III is concerned, we are business people with a legitimate product that we want to market," said De Kock. This week De Kock demonstrated Delta III to The Sunday Independent at a "safe house" somewhere in Gauteng. Tapping and recording a "real time" conversation on cellular phones between De Kock and another person, chosen at random, worked perfectly. The likely price for Delta III will be about $400 000 (about R3,2-million), according to De Kock. But price is not the only reason you need not worry too much about those sweet nothings you whisper over your cellular phone to someone who's not supposed to exist: Delta III will be available only to government and law enforcement agencies --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 2812 From: Robert G. Ferrell Date: Mon Mar 26, 2001 0:28pm Subject: Re: SOUTH AFRICAN / NORWEGIAN DEVICE? But such tapping - "active" monitoring of a cellular conversation by creating a>stronger signal than the nearest base station - creates a "black hole" that immediately becomes evident in the control room of the service provider, say Clint Nassif and Bruce de Kock, managing director and group operations director respectively of Strategic Digital Technologies. Ya lost me right here. I routinely pick up cell phone conversations on my scanner, despite the fact that I'd really rather not listen to Billy Bob telling Darlene how come he's gonna be late gettin' home tonight. I'm relatively certain that this is an entirely passive process. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2813 From: John Titterton Date: Mon Mar 26, 2001 1:07pm Subject: RE: SOUTH AFRICAN / NORWEGIAN DEVICE? Conversations off a GSM network????? - must get one of those scanners! JT -----Original Message----- From: Robert G. Ferrell [mailto:rferrell@r...] Sent: 26 March 2001 20:29 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] SOUTH AFRICAN / NORWEGIAN DEVICE? But such tapping - "active" monitoring of a cellular conversation by creating a>stronger signal than the nearest base station - creates a "black hole" that immediately becomes evident in the control room of the service provider, say Clint Nassif and Bruce de Kock, managing director and group operations director respectively of Strategic Digital Technologies. Ya lost me right here. I routinely pick up cell phone conversations on my scanner, despite the fact that I'd really rather not listen to Billy Bob telling Darlene how come he's gonna be late gettin' home tonight. I'm relatively certain that this is an entirely passive process. Cheers, RGF 2814 From: Date: Mon Mar 26, 2001 10:39am Subject: new number Toll Free (866)477-9246 works in the US only 2815 From: Miguel Puchol Date: Mon Mar 26, 2001 5:01pm Subject: RE: SOUTH AFRICAN / NORWEGIAN DEVICE? It should be possible to (relatively) easily monitor conversations 'passively' in a GSM network, provided the following: - There is no encryption used between the cell and the phone (although the algorithm used in GSM is notoriously weak). - The phone/cell do not use frequency hopping - the rate is very high, if you look at it on your SA the signal moves within 1MHz many times per second. To sync with this is very difficult. - You have the right codecs to retrieve the audio - not difficult to obtain, as every phone has one :-) These factors only make it more difficult, but not impossible. I think it's much easier to monitor a control channel (which are not encrypted) to catch SMS messages, and call details, than calls themselves. Nowadays, as criminals know that either or both sides of the conversation could be tapped, use SMS messaging extensively, a substitute for the pagers they used, until these could be easily monitored too. I would, however, stay well away from any such 'miracle machines' that are advertised in this almost-spammish way, even if they claim 'for gov hands only' (thanks James!) All the best, Mike > -----Mensaje original----- > De: John Titterton [mailto:jt@i...] > Enviado el: lunes, 26 de marzo de 2001 21:08 > Para: TSCM-L@yahoogroups.com > Asunto: RE: [TSCM-L] SOUTH AFRICAN / NORWEGIAN DEVICE? > > > Conversations off a GSM network????? - must get one of those scanners! > > JT > > -----Original Message----- > From: Robert G. Ferrell [mailto:rferrell@r...] > Sent: 26 March 2001 20:29 > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] SOUTH AFRICAN / NORWEGIAN DEVICE? > > > But such tapping - "active" monitoring of a cellular conversation by > creating > a>stronger signal than the nearest base station - creates a "black hole" > that > immediately becomes evident in the control room of the service > provider, say > Clint Nassif and Bruce de Kock, managing director and group operations > director > respectively of Strategic Digital Technologies. > > Ya lost me right here. I routinely pick up cell phone conversations on my > scanner, despite the fact that I'd really rather not listen to Billy Bob > telling Darlene how come he's gonna be late gettin' home tonight. I'm > relatively certain that this is an entirely passive process. > > Cheers, > > RGF > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 2816 From: James M. Atkinson, Comm-Eng Date: Mon Mar 26, 2001 6:36pm Subject: USA vs Abraham Abdallah - COMPLAINT UNITED STATES OF AMERICA : COMPLAINT -V- : VIOLATION OF 18 U.S.C. : 1341, 1343 ABRAHAM ABDALLAH, DEFENDANT. : COUNTY OF OFFENSE : NEW YORK -------------------------------------------X SOUTHERN DISTRICT OF NEW YORK, ss.: J. ALEXANDER PICKETT, BEING DULY SWORN, DEPOSES AND SAYS THAT HE IS A SPECIAL AGENT WITH THE UNITED STATES SECRET SERVICE, ASSIGNED TO THE NEW YORK ELECTRONIC CRIMES TASK FORCE AND CHARGES AS FOLLOWS: COUNT ONE FROM IN OR ABOUT SEPTEMBER 2000, UP TO AND INCLUDING IN OR ABOUT MARCH 2001, IN THE SOUTHERN DISTRICT OF NEW YORK AND ELSEWHERE, ABRAHAM ABDALLAH, THE DEFENDANT, HAVING DEVISED AND INTENDING TO DEVISE A SCHEME AND ARTIFICE TO DEFRAUD, AND FOR OBTAINING MONEY AND PROPERTY BY MEANS OF FALSE AND FRAUDULENT PRETENSES, REPRESENTATIONS AND PROMISES, UNLAWFULLY, WILLFULLY AND KNOWINGLY TRANSMITTED AND CAUSED TO BE TRANSMITTED BY MEANS OF WIRE, RADIO AND TELEVISION COMMUNICATION IN INTERSTATE AND FOREIGN COMMERCE, WRITINGS, SIGNS, SIGNALS, PICTURES, AND SOUNDS FOR THE PURPOSE OF EXECUTING SUCH SCHEME AND ARTIFICE, AND THEREBY DID AFFECT A FINANCIAL INSTITUTION, TO WIT, ABDALLAH ATTEMPTED, BY MEANS OF TELEPHONE CALLS, ELECTRONIC MAIL MESSAGES, FACSIMILES, AND BANK WIRE TRANSACTIONS, TO CAUSE AMOUNTS TOTALING APPROXIMATELY $22 MILLION TO BE WITHDRAWN FROM LEGITIMATE ACCOUNTS HELD BY OTHERS, SOME OF WHICH WERE LOCATED AT FEDERALLY INSURED FINANCIAL INSTITUTIONS, AND ATTEMPTED TO CAUSE THOSE FUNDS TO BE DEPOSITED INTO FRAUDULENT ACCOUNTS CREATED BY HIM. (TITLE 18, UNITED STATES CODE, SECTION 1343.) COUNT TWO FROM IN OR ABOUT SEPTEMBER 2000, UP TO AND INCLUDING IN OR ABOUT MARCH 2001, IN THE SOUTHERN DISTRICT OF NEW YORK AND ELSEWHERE, ABRAHAM ABDALLAH, THE DEFENDANT, HAVING DEVISED AND INTENDING TO DEVISE A SCHEME AND ARTIFICE TO DEFRAUD, AND FOR OBTAINING MONEY AND PROPERTY BY MEANS OF FALSE AND FRAUDULENT PRETENSES, REPRESENTATIONS AND PROMISES, AND TO SELL, DISPOSE OF, LOAN, EXCHANGE, ALTER, GIVE AWAY, DISTRIBUTE, SUPPLY, AND FURNISH AND PROCURE FOR UNLAWFUL USE COUNTERFEIT AND SPURIOUS OBLIGATIONS, SECURITIES AND OTHER ARTICLES, AND ANYTHING REPRESENTED TO BE INTIMATED AND HELD OUT TO BE SUCH COUNTERFEIT AND SPURIOUS ARTICLE, FOR THE PURPOSE OF EXECUTING SUCH SCHEME AND ARTIFICE AND ATTEMPTING SO TO DO, UNLAWFULLY, WILLFULLY AND KNOWINGLY PLACED IN A POST OFFICE AND AUTHORIZED DEPOSITORY FOR MAIL MATTER, MATTERS AND THINGS WHATEVER TO BE SENT AND DELIVERED BY THE POSTAL SERVICE, AND DEPOSITED AND CAUSED TO BE DEPOSITED MATTERS AND THINGS WHATEVER TO BE SENT AND DELIVERED BY A PRIVATE AND COMMERCIAL INTERSTATE CARRIERS, TOOK AND RECEIVED THEREFROM, SUCH MATTERS AND THINGS, AND KNOWINGLY CAUSED TO BE DELIVERED BY MAIL AND SUCH CARRIER ACCORDING TO THE DIRECTION THEREON, AND AT THE PLACE AT WHICH IT IS DIRECTED TO BE DELIVERED BY THE PERSON TO WHOM IT IS ADDRESSED, MATTERS AND THINGS, TO ANOTHER PERSON, WHO HAD NOT AUTHORIZED THE MAILING OF THOSE CHECKS, TO BE MAILED TO A LOCATION IN MANHATTAN. (TITLE 18, UNITED STATES CODE, SECTION 1341.) THE BASES FOR MY KNOWLEDGE AND THE FOREGOING CHARGE ARE, IN PART, AS FOLLOWS: 1. I AM A SPECIAL AGENT WITH THE UNITED STATES SECRET SERVICE ("USSS") AND CURRENTLY ASSIGNED TO THE NEW YORK ELECTRONIC CRIMES TASK FORCE. I HAVE INVESTIGATED THE ABOVE CAPTIONED CASE, HAVE SPOKEN WITH OTHER LAW ENFORCEMENT OFFICIALS AND OTHER INDIVIDUALS, AND HAVE REVIEWED VARIOUS DOCUMENTS, INCLUDING REPORTS PREPARED BY OTHER LAW ENFORCEMENT OFFICIALS AND WITNESSES. BECAUSE THIS AFFIDAVIT IS BEING SUBMITTED FOR A LIMITED PURPOSE, I HAVE NOT INCLUDED DETAILS OF EVERY ASPECT OF THIS INVESTIGATION WHERE CONVERSATIONS OR STATEMENTS ARE RELATED HEREIN, THEY ARE RELATED IN SUBSTANCE AND IN PART. 2. ON OR ABOUT FEBRUARY 7, 2001, I WAS CONTACTED BY AN INVESTIGATOR HIRED BY A CORPORATION LOCATED IN CALIFORNIA TO INVESTIGATE A POSSIBLE SPANKING OF THE CEO OF THAT CORPORATION ("CEO"). THAT INVESTIGATOR INFORMED ME OF THE FOLLOWING: A. ON OR ABOUT DECEMBER 19, 2000, A NEW ON-LINE ACCOUNT WAS OPENED AT MERRILL LYNCH IN MANHATTAN ("MERRILL") IN THE NAME OF CEO1 ("MERRILL ACCOUNT OF CEO1"). THIS ACCOUNT WAS OPENED USING CORRECT INFORMATION CONCERNING CEO1'S NAME, DATE OF BIRTH, SOCIAL SECURITY NUMBER, AND LINE OF CREDIT HELD AT WELLS FARGO BANK ("WELLS FARGO ACCOUNT"), THE DEPOSITS OF WHICH ARE INSURED BY THE FEDERAL DEPOSIT INSURANCE CORPORATION. CEO1 HELD OTHER ACCOUNTS AT MERRILL BUT HAD NOT AUTHORIZED THE OPENING OF THIS PARTICULAR ACCOUNT. THE NEWLY OPENED ACCOUNT WAS AUTOMATICALLY LINKED TO OTHER ACCOUNTS HELD BY CEO1 AT MERRILL. THE PERSON WHO OPENED THE MERRILL ACCOUNT OF CEO1 PROVIDED THE FOLLOWING CONTACT INFORMATION: AN ADDRESS LOCATED ON THIRD AVENUE IN MANHATTAN, TWO PHONE NUMBERS LOCATED IN CALIFORNIA, AND AN ELECTRONIC MAIL ADDRESS ("E-MAIL ADDRESS1"). B. ON OR ABOUT DECEMBER 20, 2000, WELLS FARGO RECEIVED A PHONE CALL FROM A PERSON IDENTIFYING HIMSELF AS CE01. THAT PERSON STATED THAT HE WAS IN NEW YORK AND DIRECTED THAT $4 MILLION BE TRANSFERRED FROM THE WELLS FARGO ACCOUNT INTO THE NEWLY CREATED MERRILL ACCOUNT CE01. THE CALLER PROVIDED THE CORRECT ACCOUNT NUMBER FOR EACH ACCOUNT AND STATED THAT HE COULD BE REACHED AT A TELEPHONE NUMBER IN NEW YORK. SUBSEQUENT INVESTIGATION REVEALED THAT THAT TELEPHONE NUMBER WAS ASSIGNED TO A WIRELESS PHONE THAT WAS BILLED TO AN ADDRESS IN MANHATTAN, AND THAT IT WAS NOT REGISTERED TO CEO1. WHEN THE WELLS FARGO CUSTOMER SERVICE AGENT CALLED THAT PHONE, THE PERSON WHO ANSWERED IDENTIFIED HIMSELF AS CEO1. BECAUSE THE MERRILL ACCOUNT OF CEO1, WHICH WAS PROVIDED TO WELLS FARGO BY THE PERSON ORDERING THE $4 MILLION TRANSFER, WAS NOT AN ACCOUNT INTO WHICH CEO1 TYPICALLY WIRED FUNDS, WELLS FARGO INVESTIGATED THE MATTER AND LEARNED THAT CEO1 HAD NOT AUTHORIZED THE TRANSFER. WELLS FARGO THEREFORE REFUSED TO TRANSFER THE $4 MILLION. 3. DURING THE COURSE OF MY INVESTIGATION, I REVIEWED A REPORT PREPARED BY AN INVESTIGATOR AT FIDELITY INVESTMENTS ("FIDELITY"). IN MARCH 2001, I CONFIRMED WITH AN INVESTIGATOR AT FIDELITY THAT THAT REPORT WAS ACCURATE. THAT REPORT INFORMED ME OF THE FOLLOWING: A. ON OR ABOUT SEPTEMBER 11, 2000, A PERSON IDENTIFYING HIMSELF AS THE CEO OF A CORPORATION LOCATED IN MANHATTAN "(CEO2") PLACED A TELEPHONE CALL TO FIDELITY AND REQUESTED THAT FIDELITY LIQUIDATE $1.5 MILLION FROM SEVERAL SPECIFIC INVESTMENT ACCOUNTS HELD BY CEO2. (ONE OF THOSE ACCOUNTS IS HEREINAFTER REFERRED TO AS THE "FIDELITY ACCOUNT OF CEO2.") THE CALLER FURTHER REQUESTED THAT THE $1.5 MILLION BE WIRED TO A BANK ACCOUNT AT ANZ BANK LOCATED IN MELBOURNE, AUSTRALIA. THE CALLER REQUESTED THAT FIDELITY SEND THE FORMS NECESSARY TO EFFECT THESE TRANSACTIONS BY ELECTRONIC MAIL TO AN E-MAIL ADDRESS ("E-MAIL ADDRESS 2") THAT HE PROVIDED. B. ON OR ABOUT SEPTEMBER 14, 2000, AN INDIVIDUAL IDENTIFYING HIMSELF AS CEO2 CALLED FIDELITY AND AGAIN REQUESTED THAT FIDELITY WIRE $1.5 MILLION FROM THE FIDELITY ACCOUNT OF CEO2 AND ANOTHER FIDELITY ACCOUNT TO AN ACCOUNT AT ANZ BANK IN AUSTRALIA. THE CALLER REQUESTED THAT FIDELITY SEND CERTAIN FORMS REQUIRING HIS SIGNATURE TO A FACSIMILE NUMBER LOCATED IN MANHATTAN. FIDELITY FAXED THE FORMS TO THAT MANHATTAN NUMBER. THE CALLER ALSO PROVIDED A PHONE NUMBER AT WHICH HE COULD BE REACHED. SUBSEQUENT INVESTIGATION REVEALED THAT THAT PHONE NUMBER WAS ASSIGNED TO A WIRELESS PHONE AND BILLED TO AND ADDRESS IN NEW YORK CITY. C. FIDELITY SUBSEQUENTLY DETERMINED THAT CEO2 HAD NOT AUTHORIZED THE REQUESTED TRANSFER OF $1.5 MILLION. FIDELITY REFUSED TO WIRE THE FUNDS, PLACED RESTRICTIONS ONTO THE ACCOUNTS, AND ASSIGNED NEW ACCOUNT NUMBERS TO THE ACCOUNTS. FIDELITY ALSO LEARNED FROM ANZ BANK THAT THE ACCOUNT INTO WHICH THE FUNDS WERE TO BE WIRED WAS CREATED BY AN APPLICATION SENT OVER THE INTERNET THAT PROVIDED A ZIP CODE IN MANCHESTER, NEW HAMPSHIRE THAT WAS INCORRECT. D. ON OR ABUT OCTOBER 16, 2000, A PERSON IDENTIFYING HIMSELF AS CEO2 CONTACTED FIDELITY. HE REQUESTED THAT THE ADDRESS ASSOCIATED WITH ONE OF THE NEW FIDELITY ACCOUNTS OF CEO2 BE CHANGED TO AN ADDRESS ON LEXINGTON AVENUE IN MANHATTAN. HE FURTHER REQUESTED THAT NEW BLANK CHECKS ASSOCIATED WITH THAT ACCOUNT BE SENT TO THAT ADDRESS AND PROVIDED A CONTACT TELEPHONE NUMBER LOCATED IN MANHATTAN (THE "212 PHONE NUMBER"). FIDELITY MAILED THE CHECKS TO THE LEXINGTON AVENUE ADDRESS. HOWEVER, THE REAL CEO2 LEARNED OF THIS REQUEST, TRAVELED TO THE LEXINGTON AVENUE ADDRESS, AND PERSONALLY RETRIEVED THE CHECKS THAT WERE LOCATED IN THE MAIL ROOM OF THAT LOCATION. 4. IN OR ABOUT FEBRUARY 2001, ANOTHER SPECIAL AGENT OF THE USSS ("SA1") INFORMED ME THAT HE HAD LEARNED FROM A REPRESENTATIVE OF THE ISSUER OF THE 212 PHONE NUMBER THAT THAT NUMBER IS A "VIRTUAL" PHONE NUMBER, WHICH CAN ONLY BE USED TO RECEIVE VOICE NAIL AND FACSIMILES, AND THAT THE SUBSCRIBER TO THE 212 PHONE NUMBER HAD PAID FOR IT USING A CREDIT CARD. SA1 FURTHER INFORMED ME THAT THE CREDIT CARD ACCOUNT USED TO PAY FOR THE 212 PHONE NUMBER HAD BEEN SUBJECT TO FRAUD. 5. IN OR ABOUT MARCH 2001, I REVIEWED A SECOND REPORT PREPARED BY AN INVESTIGATOR AT FIDELITY. SHORTLY AFTER MY REVIEW OF THE REPORT, AN INVESTIGATOR AT FIDELITY CONFIRMED THAT THE INFORMATION IN THE REPORT WAS ACCURATE. THAT REPORT INFORMED ME OF THE FOLLOWING: A. IN OR ABOUT OCTOBER 2000, AND INDIVIDUAL CLAIMING TO BE THE PRESIDENT OF A CORPORATION ("CORPORATION 1") MAILED AND APPLICATION TO FIDELITY IN ORDER TO OPEN AN ACCOUNT IN THE NAME OF CORPORATION 1 (THE "FIDELITY ACCOUNT OF CORPORATION 1"). THE APPLICATION STATED THAT THE ADDRESS OF CORPORATION 1 WAS A PARTICULAR ADDRESS ON PARK AVENUE IN MANHATTAN (THE "PARK AVENUE ADDRESS") AND THAT THE TELEPHONE NUMBER OF THE PRESIDENT OF CORPORATION 1 WAS THE 212 PHONE NUMBER. (AS DISCUSSED IN PARAGRAPH 3 (D) ABOVE, THE 212 PHONE NUMBER HAD BEEN PROVIDED TO FIDELITY IN CONNECTION WITH A FRAUDULENT FIDELITY ACCOUNT OPENED IN THE NAME OF CE02). THE APPLICATION FURTHER PROVIDED EMAIL ADDRESS 1 FOR THE PRESIDENT OF CORPORATION 1. (AS DISCUSSED IN CONNECTION WITH THE MERRILL ACCOUNT OF CEO1). PURSUANT TO THIS APPLICATION, FIDELITY OPENED AND ACCOUNT IN THE NAME OF CORPORATION 1. B. ON OR ABOUT NOVEMBER 17, 2000, FIDELITY RECEIVED A CHECK IN THE AMOUNT OF $6.5 MILLION ISSUED FROM A SEPARATE ACCOUNT OF CORPORATION 1 OPENED AT UNION BANK IN IRVINE, CALIFORNIA. THE CHECK WAS FOR DEPOSIT INTO THE FIDELITY ACCOUNT OF CORPORATION 1. FIDELITY SUBSEQUENTLY CONTACTED THE CHIEF FINANCIAL OFFICER OF CORPORATION 1 AND LEARNED THAT THE $6.5 MILLION CHECK WAS AN ALTERED VERSION OF A CHECK ORIGINALLY ISSUED BY CORPORATION 1 IN THE AMOUNT OF $30. ACCORDINGLY, FIDELITY DID NOT DEPOSIT THE CHECK. C. ON OR ABOUT NOVEMBER 21, 2000, A PERSON CLAIMING TO BE THE PRESIDENT OF CORPORATION 1 PLACED A TELEPHONE CALL TO FIDELITY. THAT PERSON INQUIRED WHEN THE $6.5 MILLION DESCRIBED IN THE PRECEDING PARAGRAPH WOULD BE AVAILABLE FOR WITHDRAWAL. THAT PERSON STATED THAT HE COULD BE REACHED AT THE 212 PHONE NUMBER IF ANY ISSUES AROSE CONCERNING THE $6.5 MILLION CHECK. 6. IN OR ABOUT MARCH 2001, I SPOKE TO A FRAUD INVESTIGATOR AT MERRILL CONCERNING A FRAUDULENT ACCOUNT OPENED AT MERRILL IN THE NAME OF AN INVESTOR ("INVESTOR") LOCATED IN THE NEW YORK CITY AREA. THAT INVESTIGATOR INFORMED ME OF THE FOLLOWING: A. ON OR ABOUT DECEMBER 23, 2000, A PERSON OPENED AN ON-LINE ACCOUNT AT MERRILL USING THE INVESTOR'S NAME, CORRECT SOCIAL SECURITY NUMBER AND CORRECT ADDRESS, AND WAS ASSIGNED AN ACCOUNT NUMBER ("INVESTOR'S FRAUDULENT MERRILL ACCOUNT"). A MANHATTAN PHONE NUMBER WAS SUPPLIED AS THE CONTACT NUMBER FOR THIS ACCOUNT. THE INVESTOR ALSO HAD SEVERAL LEGITIMATE MERRILL ACCOUNTS ("INVESTOR'S LEGITIMATE MERRILL ACCOUNTS") AT THAT TIME. B. ON OR ABOUT JANUARY 2, 2001, THE MERRILL INVESTIGATOR DISCOVERED THAT THE MOTHER'S MAIDEN NAME AND PLACE OF BIRTH PROVIDED FOR THE INVESTOR'S FRAUDULENT MERRILL ACCOUNT WERE INCORRECT. MERRILL CLOSED THAT ACCOUNT. C. ON OR ABOUT JANUARY 11, 2001, A PERSON IDENTIFYING HIMSELF AS THE INVESTOR CALLED MERRILL AND INQUIRED ABOUT A $10 MILLION CHECK THAT THE CALLER EXPECTED TO BE DEPOSITED INTO THE INVESTOR'S FRAUDULENT MERRILL ACCOUNT. SHORTLY THEREAFTER, THE MERRILL INVESTIGATOR DETERMINED THAT A $10 MILLION CHECK ISSUED BY FLEET BANK HAD BEEN MAILED TO MERRILL FOR DEPOSIT INTO THE ACCOUNT. THE MERRILL INVESTIGATOR CONTACTED A PERSON AT FLEET BANK, WHO INFORMED HIM THAT COLORATION OF THE CHECK WAS NOT THAT OF FLEET CHECKS AND CERTAIN NUMBERS ON THE ACCOUNT WERE OUT OF SEQUENCE, THEREBY INDICATING THAT IT WAS A COUNTERFEIT CHECK. 7. IN OR ABOUT FEBRUARY AND MARCH 2001, SA1 INFORMED ME OF THE FOLLOWING: A. FROM IN OR ABOUT DECEMBER 2000 THROUGH IN OR ABOUT MARCH 2001, SA1 WAS INVESTIGATING FRAUD CONCERNING VARIOUS CREDIT CARD ACCOUNTS. MERCHANTS HAD INFORMED SA1 THAT THE 212 PHONE NUMBER HAD BEEN PROVIDED AS CALL BACK NUMBER IN CONNECTION WITH MANY ORDERS FOR MERCHANDISE THAT HAD BEEN PAID FOR USING UNAUTHORIZED CREDIT CARD NUMBERS. B. IN OR ABOUT JANUARY 2001, A MERCHANT LOCATED IN TEXAS (THE "MERCHANT") INFORMED SA1 THAT A PERSON HAD ORDERED CERTAIN CREDIT CARD READING MACHINES AND THAT THE PERSON HAD USED UNAUTHORIZED CREDIT CARD NUMBERS TO MAKE THE PURCHASE. THE PERSON PLACING THE ORDER HAD REQUESTED THAT THE MACHINES BE DELIVERED TO LOCATIONS IN BROOKLYN. THE MERCHANT ALSO STATED THAT THE PERSON ORDERING THOSE MACHINES HAD PROVIDED THE 212 PHONE NUMBER AS A CONTACT PHONE NUMBER. C. ON OR ABOUT MARCH 2, 2001, THE MERCHANT INFORMED SA1 THAT A PERSON USING THE NAME OF THE CEO OF AN INVESTMENT BANK LOCATED IN MANHATTAN ("CEO4") HAD ORDERED SOFTWARE FOR CREDIT CARD READING MACHINES OVER THE TELEPHONE USING A CREDIT CARD NUMBER. THE MERCHANT STATED THAT THE PERSON HAD ORIGINALLY REQUESTED A QUANTITY OF SOFTWARE THAT WAS SUSPICIOUS BECAUSE IT WAS FAR MORE THAN MOST REQUESTS THE MERCHANT RECEIVED. SA1 DETERMINED THAT THE CREDIT CARD NUMBER USED TO ORDER THAT SOFTWARE WAS NOT ISSUED TO CEO4 AND INFORMED THE MERCHANT OF THAT FACT. THE MERCHANT STATED THAT A PACKAGE (THE "PACKAGE") CONTAINING THE CONTRACTS FOR THE SALE OF SOFTWARE WOULD BE DELIVERED BY UNITED PARCEL SERVICE ("UPS") UNDER THE NAME OF CEO4 TO AND ADDRESSES LOCATED IN MANHATTAN. THE MERCHANT ALSO PROVIDED A SPECIFIC UPS TRACKING NUMBER FOR THAT PACKAGE. D. ON OR ABOUT MARCH 2, 2001, SA1 INFORMED A DETECTIVE WITH THE NEW YORK CITY POLICE DEPARTMENT ("NYPD") THAT THE PACKAGE REFERRED TO IN THE PRECEDING PARAGRAPH WAS SCHEDULED TO BE DELIVERED TO A SPECIFIC ADDRESS IN MANHATTAN UNDER THE NAME OF CEO4. THAT DETECTIVE DIRECTED UPS TO HOLD THE PACKAGE AT ITS DISTRIBUTION LOCATION IN THE BRONX. ON OR ABOUT MARCH 5, 2001, SA1 SPOKE TO A REPRESENTATIVE OF UPS WHO CONFIRMED THAT A PACKAGE BEARING THE TRACKING NUMBER REFERRED TO IN THE PRECEDING PARAGRAPH WAS AT THE BRONX LOCATION. ON OR ABOUT MARCH 7, 2001, A MESSENGER PICKED UP THE PACKAGE AND WAS QUESTIONED BY NYPD DETECTIVES. THE MESSENGER INFORMED THE DETECTIVES THAT HE HAD BEEN DIRECTED TO DELIVER THE PACKAGE TO A LOCATION IN BROOKLYN. A DETECTIVE THEN POSED AS A MESSENGER AND DELIVERED THE PACKAGE TO A PERSON IN BROOKLYN. THAT PERSON THEN CONTACTED ABRAHAM ABDALLAH, THE DEFENDANT, WHO WAS ARRESTED WHEN HE ARRIVED TO PICK UP THE PACKAGE. 8. ON OR ABOUT MARCH 8, 2001, AN NYPD DETECTIVE INFORMED ME THAT ABRAHAM ABDALLAH, THE DEFENDANT, HAD IN HIS CUSTODY AT THE TIME OF HIS ARREST VARIOUS DOCUMENTS AND OTHER ITEMS. I HAVE REVIEWED THE MATERIALS IN ABDALLAH'S POSSESSION AT THE TIME OF HIS ARREST. THEY INCLUDED, AMONG OTHER THINGS, THE FOLLOWING: A. A COPY OF THE OCTOBER 9, 2000 ISSUE OF FORBES MAGAZINE THAT CONTAINS AN ARTICLE ENTITLED "THE 400 RICHEST PEOPLE IN AMERICA" (WHICH INCLUDES INFORMATION ABOUT CEO1 AND THE INVESTOR) AND HANDWRITTEN NOTES LISTING THE SOCIAL SECURITY NUMBERS, ADDRESSES, INVESTMENT ACCOUNTS, AND OTHER INFORMATION ABOUT MANY INDIVIDUALS LISTED IN THE MAGAZINE, AS WELL AS THE ACCOUNT NUMBER OF THE WELLS FARGO ACCOUNT OF CEO1, THE INVESTOR'S SOCIAL SECURITY NUMBER AND ADDRESS, AND THE ACCOUNT NUMBER OF ONE OF THE INVESTOR'S LEGITIMATE MERRILL ACCOUNTS; B. NUMEROUS SEPARATE LISTS THAT INCLUDE E-MAIL ADDRESS 1, THE NAMES OF CEO1, CEO2, CEO4 AND THE INVESTOR, THE ACCOUNT NUMBER OF MERRILL ACCOUNT OF CEO1, THE PHONE NUMBER PROVIDED AS THE CONTACT NUMBER FOR THE INVESTOR'S FRAUDULENT MERRILL ACCOUNT, AND THE ACCOUNT NUMBERS FOR THE INVESTOR'S LEGITIMATE AND FRAUDULENT MERRILL ACCOUNTS; C. LISTS CONTAINING CREDIT CARD NUMBERS OF AND OTHER INFORMATION FOR HUNDREDS OF INDIVIDUALS, NUMEROUS PHONE NUMBERS AND ADDRESSES, AND THE ADDRESS TO WHICH THE PACKAGE WAS ADDRESSED THAT RESULT DIN THE ARREST OF ABRAHAM ABDALLAH, THE DEFENDANT; D. A PIECE OF NOTEBOOK PAPER THAT LISTS SEVEN HANDWRITTEN STEPS BEGINNING WITH "OPEN THE FIDELITY ACCOUNT...."; E. VARIOUS FEDERAL EXPRESS AIR BILLS ADDRESSED TO THE PARK AVENUE ADDRESS; F. NUMEROUS CREDIT CARDS PURPORTEDLY ISSUED TO ABRAHAM ABDALLAH, THE DEFENDANT, AND OTHERS; G. AN INK STAMP OF THE NAME OF CEO4'S CORPORATION; H. DOCUMENTS PURPORTING TO BE SENT BY CORPORATION 1; I. A NOTARY STAMP; AND J. TWO WIRELESS TELEPHONES. 9. ON OR ABOUT MARCH 8, 2001, A DETECTIVE INFORMED ME THAT AFTER HE ARRESTED ABRAHAM ABDALLAH, THE DEFENDANT, HE DETERMINED THE PHONE NUMBER OF ONE OF THE WIRELESS PHONES IN ABDALLAH'S POSSESSION BY DIALING A PHONE NUMBER UNDER INVESTIGATION AND HEARING IT RING IMMEDIATELY ON THE PHONE. 10. IN OR ABOUT MARCH 2001, I RECEIVED RECORDS FROM NEXTEL COMMUNICATIONS, THE ISSUER OF THE PHONE NUMBER DIALED BY THE DETECTIVE AS DESCRIBED IN THE PRECEDING PARAGRAPH. THOSE RECORDS INDICATE THAT THE 212 PHONE NUMBER, A "VIRTUAL" VOICE MAIL BOX ASSOCIATED WITH SEVERAL OF THE TRANSACTIONS DESCRIBED ABOVE, WAS CALLED FORM THE WIRELESS PHONE IN THE CUSTODY OF ABRAHAM ABDALLAH, THE DEFENDANT, PRIOR TO HIS ARREST. 11. IN OR ABOUT MARCH 2001, A DETECTIVE WITH THE NYPD INFORMED ME OF THE FOLLOWING: AFTER THE ARREST OF ABRAHAM ABDALLAH, THE DETECTIVE INTERVIEWED A PERSON AT ABDALLAH'S RESIDENCE. THAT PERSON (THE "BROTHER") STATED THAT HE WAS ABDALLAH'S BROTHER, THAT HE OWNED THE BUILDING, AND THAT ABDALLAH LIVED IN THE BUILDING. THE BROTHER FURTHER STATED THAT ABDALLAH HAD USED A COMPUTER LOCATED AT THE BROTHER'S HOUSE, WHICH WAS LOCATED ON THE SAME STREET AS ABDALLAH'S RESIDENCE. THE BROTHER THEN WENT TO THAT RESIDENCE, RETRIEVED THE COMPUTER, AND CONSENTED TO THE DETECTIVE TAKING POSSESSION OF THE COMPUTER IN ORDER TO ANALYZE ITS CONTENTS. ANALYSIS OF THAT COMPUTER HAS REVEALED THAT E-MAIL ADDRESS 2, WHICH HAD BEEN ASSOCIATED WITH VARIOUS FRAUDULENT TRANSACTIONS DESCRIBED ABOVE (SEE PARAGRAPH 3(A), WAS STORED IN SEVERAL LOCATIONS ON THE HARD DRIVE OF THAT COMPUTER. WHEREFORE, DEPONENT PRAYS THAT A WARRANT BE ISSUED FOR THE ARREST OF ABRAHAM ABDULLAH, THE DEFENDANT, AND THAT HE BE ARRESTED AND IMPRISONED OR BAILED AS THE CASE MAY BE. J. ALEXANDER PICKETT SPECIAL AGENT UNITED STATES SECRET SERVICE NEW YORK ELECTRONIC CRIMES TASK FORCE SWORN TO BEFORE ME THIS 22ND DAY OF MARCH, 2001 RONALD L. ELLIS UNITED STATES MAGISTRATE JUDGE SOUTHERN DISTRICT OF NEW YORK APPROVED: ____________________ JONATHAN R. STREETER ASSISTANT UNITED STATES ATTORNEY BEFORE: HONORABLE RONALD L ELLIS 01-MAG.0481 UNITED STATES MAGISTRATE JUDGE SOUTHERN DISTRICT OF NEW YORK -------------------------------------------X -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2817 From: Marcelrf Date: Mon Mar 26, 2001 2:35pm Subject: Re: SOUTH AFRICAN / NORWEGIAN DEVICE? Call Motorola they have had the technology for a while! John Titterton wrote: > Conversations off a GSM network????? - must get one of those scanners! > > JT > > -----Original Message----- > From: Robert G. Ferrell [mailto:rferrell@r...] > Sent: 26 March 2001 20:29 > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] SOUTH AFRICAN / NORWEGIAN DEVICE? > > But such tapping - "active" monitoring of a cellular conversation by > creating > a>stronger signal than the nearest base station - creates a "black hole" > that > immediately becomes evident in the control room of the service provider, say > Clint Nassif and Bruce de Kock, managing director and group operations > director > respectively of Strategic Digital Technologies. > > Ya lost me right here. I routinely pick up cell phone conversations on my > scanner, despite the fact that I'd really rather not listen to Billy Bob > telling Darlene how come he's gonna be late gettin' home tonight. I'm > relatively certain that this is an entirely passive process. > > Cheers, > > RGF > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 2818 From: James M. Atkinson, Comm-Eng Date: Tue Mar 27, 2001 8:49am Subject: Pentagon bans wireless from sensitive areas [Moderators Note: ...It's about bloody time, personal electronics devices are one of the governments biggest vulnerabilities for exploitation, but because of the political ramifications of banning them everybody looks the other way. PDA's, cell phones, pagers, radios, and laptops have absolutely no business being brought into or near areas where classified things are done or discusses. -jma] Pentagon bans wireless from sensitive areas http://www.fcw.com/fcw/articles/2001/0326/web-pent-03-26-01.asp BY Bill Murray 03/26/2001 The Pentagon has begun prohibiting workers in classified meeting areas from using wireless devices unless they disable their transmission capabilities. Personnel cannot bring digital devices with wireless data transmission capabilities into Pentagon sensitive compartmented information facilities (SCIF) "unless the device's infrared port has been taped over by an opaque tape and its antenna has been removed/disconnected," wrote David O. Cooke, the Pentagon's director of administration and management. "It's a very good policy to have," said Alan Paller, research director at the SANS Institute in Bethesda, Md. "The reason a SCIF exists is to isolate" classified information, he said. The wireless policy exists for "the same reason you don't allow floppy diskettes to leave SCIFs. It's the same reason you don't allow tape recorders at the CIA." In a March 6 memo, Cooke said that his policy's success will depend largely on individuals voluntarily abiding by it. He also called the policy "an interim measure pending publication of a national policy," and that SCIF security managers should consider it a basic level of security protection. Part of the value of Cooke's wireless policy is that it reminds classified workers that they probably shouldn't bring wireless devices into SCIFs, Paller said. Users can't remove the antenna on many wireless devices, he said. The policy also gives the armed services a way to prosecute anyone who violates the policy, Paller said. The Defense Protective Service is implementing Cooke's memo, said Glenn Flood, a Pentagon spokesman. Since DPS handles physical security for the Pentagon, it is notifying organizations about the wireless policy, he said. It's up to each organization to report any violations of the wireless policy that occur. Part of the Pentagon's caution could have to do with the fact that wireless devices from companies such as Palm Inc. and Research in Motion Ltd. (maker of BlackBerry) have become more popular among the armed services' top officials. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2819 From: Paolo Sfriso Date: Tue Mar 27, 2001 6:58am Subject: South African / Norwegian Device ??? ...Quote... Message: 16 Date: Mon, 26 Mar 2001 15:35:27 -0500 From: Marcelrf Subject: Re: SOUTH AFRICAN / NORWEGIAN DEVICE? Call Motorola they have had the technology for a while! ...Unquote... Are you sure ? Kindly let us have model name, description/tech. sheet, and price. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 paulsfriso@t... www.grupposit.com 2820 From: David Alexander Date: Tue Mar 27, 2001 6:10am Subject: re: SOUTH AFRICAN / NORWEGIAN DEVICE? This article sounds highly dubious to me. It has been possible to monitor such communications for a long time with a standard listening device that has no transmit capability and must, by definition, be untraceable except by very short-range emissions. Cellphones and sites are not tight-beam, therefore the signal radiates. The supposed confidentiality on GSM is provided by an encryption system, but the security services insisted on there being a back door to the algorithm to make their lives easier. I think Ross Anderson at Cambridge University, England has written about this in detail. It's certainly public domain knowledge. David Alexander M.INSTIS Global client-server & Communications Manager Bookham Technology plc DDI: 01235 837823 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 2821 From: Ray Van Staden Date: Tue Mar 27, 2001 2:59am Subject: HAS ANY USED THIS DEVICE? The posting SOUTH AFRICAN / NORWEGIAN DEVICE ?, has reference to this posting. After this posting I received the following E-Mail: ----- Original Message ----- From: Jim Bridges jamesabridge@e... To: Ray Van Staden Sent: 26 March 2001 08:56 Subject: GSM Interceptor FAO Ray Van Staden The article you read in the newspsper is correct, this equipment is real and in use. I know - I have seen it, used it and promote it. Regards Jim Bridges Scandec The problem is when I replied to Mr Bridges I got the following answer: ----- Original Message ----- From: "Postmaster" To: Sent: 27 March 2001 09:40 Subject: Nondeliverable mail > ------Transcript of session follows ------- > jamesabridge@e... > The user's email name is not found. > > The only reference I can find to Scandec is linked to the International film industry with the following address details: Scandec ---------------------------------------------------------------------------- ---- PO Box 71, Sofiemyr, N-1412 Norway Tel: +47 6680 5960 Fax: +47 6680 5959 I accept that the technology exsists. With regards to the so called DELTA III Device, has anyone ever used it? If so what are the specifications. --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za From: A Grudko Date: Mon Mar 24, 2003 9:38pm Subject: Re: Hmm..heads up Re:James - Original Message ----- From: kondrak > Ok, thanks for the update Matt. It didn't trigger either the .pdf reader > nor the copy of adobe I've got here, so it must of had errors. It opened here automatically OK although I had to click on one 'ignore' error button first. I read it but didn't bother to save it. People, like the sender, who write, 'I have the big bucks' and continue in broken English, generraly don't impress me, so I deleted it. Andy Grudko (British), Grad I.S, South Africa Registered as a security service provider by the Private Security Industry Regulatory Authority, registration number. 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 7084 From: A Grudko Date: Mon Mar 24, 2003 10:06pm Subject: Re: Alinco scanner radio - Original Message - > Recently I acquired an Alinco DJ-X2000 scanner radio, which features a "transweeper" function, also field strength meter and frequency counter. I've used Alinco transceivers for about 8 years and they are great as flexible, inexpensive radios which you will not loose sleep over when a staff member uses one to hammer nails into a wall... but as a countersurveillance tool, no. The X2000 special features you mention are a gimmick for non-TSCMers. Andy Grudko (British), Grad I.S, South Africa Registered as a security service provider by the Private Security Industry Regulatory Authority, registration number 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 7085 From: gkeenan Date: Tue Mar 25, 2003 11:26am Subject: military hotline numbers Click Here For Hepful Military Hotline Numbers Mon Mar 24, 3:32 PM ET Below are some helpful phone numbers for families with questions about their loved ones deployed overseas. a.. Army: (800) 833-6622 b.. Marine Corps: (800) 433-6868 c.. Navy: (800) 372-5463 d.. Air Force: (866) 299-0596 GPKeenan Co., Int'l Security Services 1005 Celia St. West Islip, NY 11795-2053 (631) 587-4020 (ph) (516) 768-9602 (cell) (530) 323-6832 (Jfax) gkeenan@s... secureops@e... [Non-text portions of this message have been removed] 7086 From: kondrak Date: Tue Mar 25, 2003 2:31pm Subject: speaking of.. Scanners, I've got need of a Bearcat/Uniden 760-xlt or 950xlt, in new condx. Will be a gift for a GF. Anyone got one around, and want to sell it, contact me off list. Thanks. 7087 From: kondrak Date: Tue Mar 25, 2003 2:36pm Subject: Re: Re: Aide in Myanmar Finds Device At 06:28 3/25/03 +0200, you wrote: >Journalists love a story, even if it probably does not make sense. I distinctly identified a particular foul aroma around this story as well.... >And Mr Pinheiro is qualified to identify a wireless room bug? I wonder if he >was searched going in? > > > Before interviewing the prisoners, Pinheiro had assured each person he or >she > > could speak freely, the diplomat said. > >Real estate agents say " Position, position, position" >Politicians say "Agenda, agenda. agenda". 7088 From: Date: Wed Mar 26, 2003 8:00am Subject: Steve, Violins, scanners etc. I have known Steve Uhrig for several years and tend to draw on his background and experiences in our field of endeavor (TSCM that is) Steve is one of the few, the very proud, and knows of what he speaks. I also know of Steve's ability to explain in plain language how our particular type of specialty operates. I have also draw on his knowledge of equipment used in the TSCM world. He not only offers sound advice he is an honest broker of it as well. Listen one and all for others may know not of what they speak. 7089 From: gkeenan Date: Wed Mar 26, 2003 10:17am Subject: another test Sorry about this everyone, but I'm having problems with my yahoo account. They don't make anything simple. So I'm sending this to some of my groups to see what's going on. They say everything is back to normal - but you never know with those people. Jerry K. GPKeenan Co., Int'l Security Services 1005 Celia St. West Islip, NY 11795-2053 (631) 587-4020 (ph) (516) 768-9602 (cell) (530) 323-6832 (Jfax) gkeenan@s... secureops@e... [Non-text portions of this message have been removed] 7090 From: gkeenan Date: Wed Mar 26, 2003 10:33am Subject: apologies I'm really sorry about this everyone - but I can't seem to get this yahoo snafu sorted out. I'm hoping this will be the last test I have to send out. They say it's fixed. Jerry K GPKeenan Co., Int'l Security Services 1005 Celia St. West Islip, NY 11795-2053 (631) 587-4020 (ph) (516) 768-9602 (cell) (530) 323-6832 (Jfax) gkeenan@s... secureops@e... [Non-text portions of this message have been removed] 7091 From: gkeenan Date: Wed Mar 26, 2003 0:07pm Subject: One more time. Apparently everyone has been getting my posts on the lists, but I'm not getting anything at all back on them. So I'm going to give this another try. I did some resetting/editing so I hope this'll be the last time. I really appreciate your patience, everyone, and I apologize for this fiasco. Jerry K. GPKeenan Co., Int'l Security Services 1005 Celia St. West Islip, NY 11795-2053 (631) 587-4020 (ph) (516) 768-9602 (cell) (530) 323-6832 (Jfax) gkeenan@s... secureops@e... [Non-text portions of this message have been removed] 7092 From: Charles P. Date: Wed Mar 26, 2003 1:32pm Subject: Re: One more time. OK Jerry, We'll let it slide this time, but the next TSCM-L party is at your place. cp ----- Original Message ----- From: "gkeenan" To: ; <22SAS@yahoogroups.com>; ; <1811@yahoogroups.com>; ; ; Sent: Wednesday, March 26, 2003 1:07 PM Subject: [TSCM-L] One more time. > > Apparently everyone has been getting my posts on the lists, but I'm not getting anything at all back on them. So I'm going to give this another try. I did some resetting/editing so I hope this'll be the last time. > > I really appreciate your patience, everyone, and I apologize for this fiasco. > > Jerry K. > > GPKeenan Co., Int'l Security Services > 1005 Celia St. > West Islip, NY 11795-2053 > (631) 587-4020 (ph) > (516) 768-9602 (cell) > (530) 323-6832 (Jfax) > gkeenan@s... > secureops@e... > > > > [Non-text portions of this message have been removed] > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 7093 From: gkeenan Date: Wed Mar 26, 2003 1:41pm Subject: Re: One more time. Hi Charles, Thanks! I got your reply twice, so I'm going to assume that since you had both the TSCM and my email addresses that it came across both ways. I don't know what the deal is with this thing. The only yahoo groups that I'm getting any posts from are the two that I also happen to be co-moderator of! I'm getting nothing back from any of the others. And now it looks as if another list, that is not on yahoo, but a private server, is also not getting through. I'm getting it on my other email account, but not on this one. I'm about as confused as I ever hope to be. This had been going on for nearly 5 hours and it's frustrating as hell - since about 90% of my business comes from those lists! Again, thanks for the reply. Cheers! Jerry ----- Original Message ----- From: "Charles P." To: ; "gkeenan" Sent: Wednesday, March 26, 2003 2:32 PM Subject: Re: [TSCM-L] One more time. > OK Jerry, > > We'll let it slide this time, but the next TSCM-L party is at your place. > > cp > > ----- Original Message ----- > From: "gkeenan" > To: ; <22SAS@yahoogroups.com>; > ; <1811@yahoogroups.com>; > ; ; > > Sent: Wednesday, March 26, 2003 1:07 PM > Subject: [TSCM-L] One more time. > > > > > > Apparently everyone has been getting my posts on the lists, but I'm not > getting anything at all back on them. So I'm going to give this another try. > I did some resetting/editing so I hope this'll be the last time. > > > > I really appreciate your patience, everyone, and I apologize for this > fiasco. > > > > Jerry K. > > > > GPKeenan Co., Int'l Security Services > > 1005 Celia St. > > West Islip, NY 11795-2053 > > (631) 587-4020 (ph) > > (516) 768-9602 (cell) > > (530) 323-6832 (Jfax) > > gkeenan@s... > > secureops@e... > > > > > > > > [Non-text portions of this message have been removed] > > > > > > Yahoo! Groups Sponsor > > ADVERTISEMENT > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > > > > 7094 From: The Dog's Bollix Date: Tue Mar 25, 2003 8:42pm Subject: Re: Re: Alinco scanner radio Steve's points are right on the money as always. I have a X2000 and I use it to tune into curious spikes on my spectrum analyzer. Sometimes I hook it to the output sometimes not. The transweeper function actually does a decent job of tracking down simple RF transmitters SO LONG AS you know what you are looking for. And if you can put up with that screeching noise for long enough to allow you to find a bug, then you'll have surely tipped off every listener within a 1/4 mile and probably have aherd of cats waiting for you outside. To depend on it for TSCM work is not advisable unless you like to impress with flashing lights and buzzers. As a scanner - it's great IMO. And for those of you that call Steve a "violin player" I'd challenge you to place your wits against his in this field any day. If you can call him down - why don't you try to catch him out - technically? He's probably forgotten more than many of us will ever learn about this field. NC --- Steve Uhrig wrote: > On 25 Mar 2003 at 3:40, Does it matter > wrote: > > > Oh no now Steve is a violin player!!!!! > > And Steve had mentioned: > > > > Remember there is a lot of noise level in any > group, even more so in > > > large ones. > > Case in point. > > > > > > > > > > > > > > > > __________________________________________________ Do you Yahoo!? Yahoo! Platinum - Watch CBS' NCAA March Madness, live on your desktop! http://platinum.yahoo.com 7095 From: Bill Wagner Date: Tue Mar 25, 2003 9:55pm Subject: Mason A2 I am new to the group and joined in hopes of finding someone who has schematics or service info for the Mason A2 radio set. I have a few page brocure but nothing better. I collect early samples of technology and have one of these and am very interested in getting it fully aligned. 7096 From: Steve Uhrig Date: Wed Mar 26, 2003 6:45pm Subject: NATIA I'd like to speak to anyone going to NATIA this August in Tampa, especially as a vendor. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7097 From: Andre Holmes <1ach@g...> Date: Wed Mar 26, 2003 10:41pm Subject: Fw: Re: Alinco scanner radio ----- Original Message ----- From: "Andre Holmes" <1ach@G...> To: "The Dog's Bollix" Sent: Wednesday, March 26, 2003 11:38 PM Subject: Re: [TSCM-L] Re: Alinco scanner radio > Hello > > I have delt with Steve and talked and emailed him time and time over he has > been great as a person first, sweeper second and has always been correct. > > As a new comer to the field I am very confident in my abilities thanks > partially to talking with Steve. > > I am a competitor as well as Steve Please do not under estimate his > knowledge and ability. > > Respectfully Andre Holmes > Neptune Enterprise Security > USA > ----- Original Message ----- > From: "The Dog's Bollix" > To: > Sent: Tuesday, March 25, 2003 9:42 PM > Subject: Re: [TSCM-L] Re: Alinco scanner radio > > > > Steve's points are right on the money as always. > > > > I have a X2000 and I use it to tune into curious > > spikes on my spectrum analyzer. Sometimes I hook it to > > the output sometimes not. > > > > The transweeper function actually does a decent job of > > tracking down simple RF transmitters SO LONG AS you > > know what you are looking for. > > > > And if you can put up with that screeching noise for > > long enough to allow you to find a bug, then you'll > > have surely tipped off every listener within a 1/4 > > mile and probably have aherd of cats waiting for you > > outside. > > > > To depend on it for TSCM work is not advisable unless > > you like to impress with flashing lights and buzzers. > > > > As a scanner - it's great IMO. > > > > And for those of you that call Steve a "violin player" > > I'd challenge you to place your wits against his in > > this field any day. If you can call him down - why > > don't you try to catch him out - technically? He's > > probably forgotten more than many of us will ever > > learn about this field. > > > > NC > > > > --- Steve Uhrig wrote: > > > On 25 Mar 2003 at 3:40, Does it matter > > > wrote: > > > > > > > Oh no now Steve is a violin player!!!!! > > > > > > And Steve had mentioned: > > > > > > > > Remember there is a lot of noise level in any > > > group, even more so in > > > > > large ones. > > > > > > Case in point. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > __________________________________________________ > > Do you Yahoo!? > > Yahoo! Platinum - Watch CBS' NCAA March Madness, live on your desktop! > > http://platinum.yahoo.com > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > 7098 From: Matt Paulsen Date: Thu Mar 27, 2003 1:50am Subject: tempest @ cryptome http://cryptome.org/etl90-3.pdf 7099 From: Matt Paulsen Date: Thu Mar 27, 2003 1:49am Subject: U.S. Steps Up Secret Surveillance http://www.washingtonpost.com/ac2/wp-dyn/A16287-2003Mar23?language=printer washingtonpost.com U.S. Steps Up Secret Surveillance FBI, Justice Dept. Increase Use of Wiretaps, Records Searches By Dan Eggen and Robert O'Harrow Jr. Washington Post Staff Writers Monday, March 24, 2003; Page A01 Since the Sept. 11, 2001, attacks, the Justice Department and FBI have dramatically increased the use of two little-known powers that allow authorities to tap telephones, seize bank and telephone records and obtain other information in counterterrorism investigations with no immediate court oversight, according to officials and newly disclosed documents. The FBI, for example, has issued scores of "national security letters" that require businesses to turn over electronic records about finances, telephone calls, e-mail and other personal information, according to officials and documents. The letters, a type of administrative subpoena, may be issued independently by FBI field offices and are not subject to judicial review unless a case comes to court, officials said. Attorney General John D. Ashcroft has also personally signed more than 170 "emergency foreign intelligence warrants," three times the number authorized in the preceding 23 years, according to recent congressional testimony. Federal law allows the attorney general to issue unilaterally these classified warrants for wiretaps and physical searches of suspected terrorists and other national security threats under certain circumstances. They can be enforced for 72 hours before they are subject to review and approval by the ultra-secret Foreign Intelligence Surveillance Court. Government officials describe both measures as crucial tools in the war on terrorism that allow authorities to act rapidly in the pursuit of potential threats without the delays that can result from seeking a judge's signature. Authorities also stress that the tactics are perfectly legal. But some civil liberties and privacy advocates say they are troubled by the increasing use of the tactics, primarily because there is little or no oversight by courts or other outside parties. In both cases, the target of the investigation never has to be informed that the government has obtained his personal records or put him under surveillance. "When this kind of power is used in the regular criminal justice system, there are some built-in checks and balances," said David Sobel, general counsel of the Electronic Privacy Information Center (EPIC), which is suing the Justice Department for information about its secretive anti-terrorism strategies. "The intelligence context provides no such protection. That's the main problem with these kinds of secretive procedures." The use of national security letters has been accelerated in part because Congress made it easier to use and apply them. The USA Patriot Act, a package of sweeping anti-terrorism legislation passed after the Sept. 11 attacks, loosened the standard for targeting individuals by national security letters and allowed FBI field offices, rather than a senior official at headquarters, to issue them, officials said. The records that can be obtained through the letters include telephone logs, e-mail logs, certain financial and bank records and credit reports, a Justice official said. The Patriot Act also significantly increased the amount of intelligence information that can be shared with criminal prosecutors and federal grand juries, giving authorities new powers in the war on terrorism. National security letters can be used as part of criminal investigations and preliminary inquiries involving terrorism and espionage, according to officials and internal FBI guidelines on the letters. According to documents given to EPIC and the American Civil Liberties Union as part of their lawsuit, the FBI has issued enough national security letters since October 2001 to fill more than five pages of logs. There is no way to determine exactly how many times the documents have been employed because the logs were almost entirely blacked out, according to a copy provided to The Washington Post by the ACLU. The Justice Department and FBI refuse to provide summary data about how often the letters are used. Several lawmakers have proposed legislation that would require the department to provide that kind of data. "In our view, the public is entitled to these statistics," said Jameel Jaffer, staff attorney for the ACLU's national legal department. "We have no idea how those are being used." FBI spokesman John Iannarelli said "it's safe to say that anybody who is going to conduct a terrorism investigation is probably going to use them at some point. . . . It's a way to expedite information, and there's nothing that needs expediting more than a terrorism investigation." But a November 2001 memorandum prepared by FBI attorneys warned that the letters "must be used judiciously" to avoid angering Congress, which will reconsider Patriot provisions in 2005. "The greater availability of NSLs does not mean they should be used in every case," the memo says. Beryl A. Howell, former general counsel to Sen. Patrick Leahy (D-Vt.) and a specialist in surveillance law, described national security letters as "an unchecked, secret power that makes it invisible to public scrutiny and difficult even for congressional oversight." Howell now is a managing director and general counsel at Stroz Friedberg LLC, a computer forensic firm in the District. Under the Foreign Intelligence Surveillance Act (FISA), the government has the power to obtain secret warrants for telephone wiretaps, electronic monitoring and physical searches in counterterrorism and espionage cases. The Justice Department has expanded its use of such warrants since a favorable FISA court ruling last year, which determined that the Patriot Act gave federal officials broad new authority to obtain them. The warrants, cloaked in secrecy and largely ignored by the public for years, have become a central issue in the ongoing debate over missteps before the Sept. 11 attacks. The FBI has come under sharp criticism from lawmakers who say FBI officials misread the FISA statute in the case of Zacarias Moussaoui, the alleged terror conspirator who was in custody before the attacks. No warrant was sought in the Moussaoui case, and his computer and other belongings were not searched until after the attacks. Even less well known are provisions that allow the attorney general to authorize these secret warrants on his own in emergency situations. The department then has 72 hours from the time a search or wiretap is launched to obtain approval from the FISA court, whose proceedings and findings are closed to the public. Officials said that Ashcroft can use his emergency power when he believes there is no time to wait for the FISA court to approve a warrant. There are no additional restrictions on emergency warrants, other than the rules that apply to all FISA applications, officials said. Ashcroft told lawmakers earlier this month that Justice made more than 1,000 applications for warrants to the secret court in 2002, including more than 170 in the emergency category. In the previous 23 years, only 47 emergency FISA warrants were issued. FBI Director Robert S. Mueller III, in similar testimony to the Senate Judiciary Committee, said, "We can often establish electronic surveillance within hours of establishing probable cause that an individual is an appropriate FISA subject." "We have made full and very productive use of the emergency FISA process," Mueller said. Sobel and other civil liberties advocates say they are troubled by the aggressive use of emergency FISAs because it leaves the initial decision up to the attorney general and allows clandestine searches and surveillance for up to three days before any court review. Staff researcher Madonna Lebling contributed to this report. © 2003 The Washington Post Company 7100 From: Bill Wagner Date: Wed Mar 26, 2003 7:31pm Subject: Mason radio I am new to the group and joined in hopes of finding someone who has schematics or service info for the Mason A2 radio set. I have a few page brocure but nothing better. I collect early samples of technology and have one of these and am very interested in getting it fully aligned. 7101 From: Andre Holmes <1ach@g...> Date: Thu Mar 27, 2003 6:41pm Subject: Re: Mason radio Hello Bill Try recycled-equipment on ebay he sold a mini probe and may run across one or may provide the buyers email in hopes of getting a copy. Item number 1742430008 Mason Mini Probe Receiver 10 gig last contact on this is 6/25/2002 Good luck Andre Holmes Neptune Enterprise Security USA ----- Original Message ----- From: "Bill Wagner" To: Sent: Wednesday, March 26, 2003 8:31 PM Subject: [TSCM-L] Mason radio > I am new to the group and joined in hopes of finding someone who has > schematics or service info for the Mason A2 radio set. I have a few > page brocure but nothing better. I collect early samples of technology > and have one of these and am very interested in getting it fully aligned. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 7102 From: kondrak Date: Thu Mar 27, 2003 9:22pm Subject: French espionage against our troop French espionage against our troops The French have faced some serious charges in the past few months. They've been called traitorous, lazy and odious. But now, it seems that those charges haven't gone nearly far enough: It appears that the French have engaged in espionage against the United States and coalition forces in the Middle East. The other day, I received a letter from a U.S. Air Force officer stationed on a base in Saudi Arabia. He wrote that coalition commanders expelled French soldiers from his base late last week. The French had apparently been caught hacking into the U.S. secret computer system. Their rooms had been evacuated, and British and American troops were allowed to move their own belongings into the plush surroundings the French had previously enjoyed. The officer reported that the information was 60-70 percent reliable, as a couple of semi-reliable sources had corroborated the story. This story has been kept under tight wrap by the governments involved -- perhaps because the information is false. But if the French troops were indeed removed from the base for spying on the U.S. military, relations between our countries will have reached a new low. This latest breach of international relations would be the logical culmination of a pattern of deceit and treachery. After stifling a United Nations vote on any resolution authorizing the use of force in Iraq, France has frustrated U.S. goals as much as humanly possible. On March 24, the French refused the United States' request that France expel Iraqi diplomats and freeze the French-held funds of the Saddam Hussein regime. French President Jacques Chirac pledged to oppose any U.S.-led effort to gain an "after-the-fact" U.N. resolution condoning our campaign to disarm Iraq. In a letter to fellow peacenik Pope John Paul II, Chirac reiterated his commitment to "defend the primacy of law, justice and dialogue between peoples." Chirac's commitment to law and justice ends where physical force begins; Chirac said that he "deeply (regrets) the start of armed operations." Despite France's opposition to the war, the French maintain that any post-war mess must be cleaned up with the help of the United Nations, aided by -- you guessed it -- France. The French government has also made untiring efforts to paint Saddam Hussein and his gang of brutal thugs as victims of imperialist aggression. Over the weekend, the Iraqi military allegedly murdered some American POWs and taped interrogations of several others, a few of whom were wounded at the time. Al-Jazeera, the Qatari television channel, broadcast the footage of the interrogations that was distributed by the Iraqi government. While the video made clear the brutality of the Iraqi regime, the French did not react with shock or horror at the prospect of American POWs being killed, wounded or forced to undergo severe humiliation in violation of the Geneva Convention. Instead, the Higher Audiovisual Council (CSA), the French broadcast watchdog, chastised Al-Jazeera head Michael Kik for putting the tape on television and revealing Iraqi war crimes. Now, the French military has allegedly been expelled from a coalition base in Saudi Arabia for spying on the uncultured Americans. Can the French sink any lower? The sad truth is that they can. Jacques Chirac's approval ratings are sky high; anything anti-American goes over like gangbusters with the French public. And that anti-American sentiment is likely to become more and more severe with the growth of the militant Muslim population in France. France currently has 5 million Muslims, totaling somewhere between 5 percent and 10 percent of its population. The highly polarized Muslim community has gained enormous prominence in France, especially because other ethnic groups are reproducing at relatively low rates while Muslims are having many children. At some point in the future, if demographic trends hold, France could become a majority Muslim state -- and a dangerous foe to the United States. The French government has nuclear weapons. What will happen if an extremist Muslim government rises to power in France, with control of full-fledged nuclear weapons? This is a problem that cannot be solved in the short term, with people like Jacques Chirac in charge of foreign policy. But over the long term, France must be given some sort of economic incentive or disincentive to disarm, before it is too late. If France is willing to spy on United States forces in the Persian Gulf now, can we expect any better if the electoral majority in France is militantly Islamist? ©2003 Creators Syndicate, Inc. a [Non-text portions of this message have been removed] 7103 From: A Grudko Date: Thu Mar 27, 2003 5:02pm Subject: Re: French espionage against our troop - Original Message - >From: kondrak >To: >Sent: Friday, March 28, 2003 5:22 AM >Subject: [TSCM-L] French espionage against our troop I don't think that this is an appropriate place for either pro or anti war propoganda. Andy Grudko (British), Grad I.S, South Africa Registered as a security service provider by the Private Security Industry Regulatory Authority, registration number 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 7104 From: Ocean Group - MU TSD Date: Thu Mar 27, 2003 8:10pm Subject: http://www.moveon.org/technicaldifficulties/move_on4.swf Sorry folks...couldn't help my rebellious side....funny but with a message. 7105 From: Gil Zimmerman Date: Fri Mar 28, 2003 5:12am Subject: RE: French espionage against our troop ...especially when there appears to be no factual basis for the message. regards, Gil Zimmerman, NJ/NY; ESI / AGER; gil@e... -----Original Message----- From: A Grudko [mailto:agrudko@i...] Subject: Re: [TSCM-L] French espionage against our troop I don't think that this is an appropriate place for either pro or anti war propoganda. --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.465 / Virus Database: 263 - Release Date: 3/25/2003 7106 From: kondrak Date: Fri Mar 28, 2003 11:18am Subject: Re: French espionage against our troop >Since it regarded espinoge, I thought it topical. Propaganda is in the eye >of the beholder. > >I don't think that this is an appropriate place for either pro or anti war >propoganda. 7107 From: James M. Atkinson Date: Fri Mar 28, 2003 1:16pm Subject: Old Glory Old Glory I am the Flag of the United States of America. My name is Old Glory. I fly atop the world's tallest buildings. I stand watch in America's halls of justice. I fly majestically over institutions of learning. I stand guard with power in the world. Look up and see me. I stand for peace, honor, truth and justice. I stand for freedom. I am confident. I am arrogant. I am proud. When I am flown with my fellow banners, My head is a little higher, My colors a little truer. I bow to no one! I am recognized all over the world. I am worshipped - I am saluted. I am loved - I am revered. I am respected - and I am feared. I have fought in every battle of every war for more then 200 years. I was flown at Valley Forge, Gettysburg, Shiloh and Appomattox. I was there at San Juan Hill, the trenches of France, in the Argonne Forest, Anzio, Rome and the beaches of Normandy. Guam, Okinawa, Korea and KheSan, Saigon, Vietnam know me. I was there. I led my troops; I was dirty, battleworn and tired, But my soldiers cheered me and I was proud. I have been burned, torn and trampled on the streets of countries I have helped set free. It does not hurt for I am invincible. I have been soiled upon, burned, torn and trampled in the streets of my country. And when it's done by those Whom I've served in battle - it hurts. But I shall overcome - for I am strong. I have slipped the bonds of Earth and stood watch over the uncharted frontiers of space from my vantage point on the moon. I have borne silent witness to all of America's finest hours. But my finest hours are yet to come. When I am torn into strips and used as bandages for my wounded comrades on the battlefield, When I am flown at half-mast to honor my soldier, Or when I lie in the trembling arms of a grieving parent at the grave of their fallen son or daughter, I am proud. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7108 From: Paul A. Gerlich Date: Fri Mar 28, 2003 8:01am Subject: Hi If anybody needs Investigations done in the Czech or Slovak Republics then let me know. I enjoy the group Paul --------------------------------- Do you Yahoo!? Yahoo! Platinum - Watch CBS' NCAA March Madness, live on your desktop! [Non-text portions of this message have been removed] 7109 From: Jason Dibley Date: Fri Mar 28, 2003 9:25am Subject: Mason A-3 Radio Reciever I have a Mason A-3 Radio reciever with spectrum display. I only have the operators manual, no service or schematics. if this is any help. Cheers Jason Miles Dibley QCC Interscan Ltd 7110 From: Robin Hunter Date: Fri Mar 28, 2003 8:17am Subject: Ocean Group I can only presume you are neither British or American and have no loved ones involved in the current Iraq Campaign. However, being as this is a group where the membership is predominantly American, many ex-military, I find these sort of postings neither amusing nor relevant. If memory serves me well you are an Irish Company, you might do well to remember the words of a fellow Irishman, Edmond Burke "All that is required for the triumph of evil is that good men do nothing". regards from Scotland, proud to be a member of the coalition/allies. ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. [Non-text portions of this message have been removed] 7111 From: gkeenan Date: Fri Mar 28, 2003 3:04pm Subject: Re: Ocean Group Well said Robin! Cheers! Jerry Keenan USN, Retired (wife is also USN Reserve, Retired) ----- Original Message ----- From: Robin Hunter To: TSCM-L@yahoogroups.com Sent: Friday, March 28, 2003 9:17 AM Subject: [TSCM-L] Ocean Group I can only presume you are neither British or American and have no loved ones involved in the current Iraq Campaign. However, being as this is a group where the membership is predominantly American, many ex-military, I find these sort of postings neither amusing nor relevant. If memory serves me well you are an Irish Company, you might do well to remember the words of a fellow Irishman, Edmond Burke "All that is required for the triumph of evil is that good men do nothing". regards from Scotland, proud to be a member of the coalition/allies. ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. [Non-text portions of this message have been removed] Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 7112 From: Gregory Horton Date: Fri Mar 28, 2003 4:18pm Subject: www.moveon What was funny about this odious website? Let's get back on track and stop the b.s. Greg Horton From: Dave Emery Date: Wed Mar 24, 2004 11:30pm Subject: Re: Man Indicted in Wiretap Case On Thu, Mar 25, 2004 at 03:11:54AM +0100, Thomas Shaddack wrote: > instead of the PS/2 ones. The USB protocol is much more difficult to > eavesdrop on, and I am not aware about any USB keylogger being available > on the market. Though I guess it's still possible to build - but the > microcontroller required for that is much more powerful, as instead of > simple bitshifting and EEPROM writing it has to decode the entire USB > protocol. Which is everything but trivial, and resorting to a software > keylogger or bugging the keyboard multiplexing matrix is easier anyway. There is USB interface silicon around in various places, including user programmable FPGAs with USB interfaces - while not as easy as 1980s keyboard interfaces, I would think anyone designing a product with any volume would be able to afford the tools and resources to use these for monitoring USB keyboard traffic. (What the gotchas are I don't know as I have not explored USB keyboard protocol issues in detail). The evilness of a hardware sniffer is that while potentially detectable by TSCM techniques (as discussed), it is in general not detectable by software on the monitored machine and cannot be neutralized by reinstalling the OS and applications or detected by using software debugging tools and techniques. > -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass 02493 8387 From: Thomas Shaddack Date: Thu Mar 25, 2004 10:18am Subject: Re: Man Indicted in Wiretap Case On Thu, 25 Mar 2004, Dave Emery wrote: > There is USB interface silicon around in various places, > including user programmable FPGAs with USB interfaces - while not as > easy as 1980s keyboard interfaces, I would think anyone designing a > product with any volume would be able to afford the tools and resources > to use these for monitoring USB keyboard traffic. (What the gotchas are > I don't know as I have not explored USB keyboard protocol issues in > detail). USB protocol is pretty complex. Hundreds of pages of specs. Don't know how much of it is for the HID class (Human-Interface Devices, from keyboards to mice to joysticks), though. In hardware, USB is a differential synchronous bidirectional bus vaguely resembling something between RS422 and RS485. Intercepting data from it is definitely possible; maybe even relatively easy (I thought about it overnight, if I'd be designing it I'd go for the route of catching all the USB packets by an FPGA tapping the differential line, discarding everything that doesn't match a bitmask matching the keypress event packets, then either putting the scancode into a register and sending an interrupt to the microcontroller to take care of it (if FPGA-micro pair is used), or putting it into a serial EEPROM by the FPGA itself (more tricky and with less freedom for the developer, but one chip less). There are pre-made libraries of USB interfaces for FPGAs, eg. at [1], but nothing of them is for tapping the line, they are either the host or the device side. [1] Another interesting thing to find there is a very fast implementation of 128-bit AES. > The evilness of a hardware sniffer is that while potentially > detectable by TSCM techniques (as discussed), it is in general not > detectable by software on the monitored machine and cannot be neutralized > by reinstalling the OS and applications or detected by using software > debugging tools and techniques. In turn, the evilness of a software sniffer is that it can't be found by "hardware" TSCM methods nor by physical search, and that it can be installed remotely, without having to even come physically close to the machine. A sexy thing to do could be installing a keylogger (or at least its loader) right into the BIOS of the computer[2]. Modern machines have it in Flash ROM, so it can be updated (as a poor compensation for the overaccelerated development process and lack of proper testing). It's unusual enough it could stay a chance to be overlooked during an audit. If combined with an electromagnetic technique, eg. using the computer's native EM emissions and intentionally modulate them (eg. by patterned access to the PCI or memory bus)[3], could be pretty interesting. But I am just wildly speculating now. [2] You can't just hook the keyboard interrupt, as modern operating systems take over the BIOS calls and use their device drivers for talking directly with the hardware, but during the initial phase of the boot sequence the BIOS plays its role. The event chain of the boot sequence would have to be compromised, so the keylogger would be inserted into the keyboard driver during the moment it's being loaded into the memory; patching the binary during the load is not trivial, but - as some "game loaders" used to play pirate games without cracking off the copy protection on the files themselves show - it's very much possible. Similar techniques used to be common with boot viruses as well. Maybe they will return, in some updated form reflecting the OS changes, bringing a refreshing breeze into the stale atmosphere of boring Outlook-Transmitted Diseases. [3] Prior art from 1999 exists. http://www.mail-archive.com/cryptography@c2.net/msg01769.html 8388 From: Date: Fri Mar 26, 2004 11:17am Subject: Interviewed - Would-be whistleblower indicted for keyboard tap NEWS Would-be whistleblower indicted for keyboard tap By Kevin Poulsen, SecurityFocus Mar 24 2004 8:14PM A former claims adjuster for a U.S. insurance company is the first to be charged under federal wiretap law for the covert use of a hardware keystroke logger, after he was caught using the device while secretly helping consumer attorneys gather information to use against his own company. Larry Ropp, 46, was indicted Tuesday by a federal grand jury in Los Angeles on a single count of endeavoring to intercept electronic communications. Ropp is accused of installing a "KEYKatcher" keystroke logger on the PC of a secretary to a vice president at the Bristol West Insurance Group where he worked. The KEYKatcher attaches inline with a keyboard connector, and stores every keystroke in an internal memory for later retrieval. In an interview with SecurityFocus, Ropp admitted to using the device, which he says he ordered off the Internet. But he defended his office skullduggery as a necessary evil to expose improper anti-consumer practices at the company. "The FBI themselves use key loggers quite a bit," he said. "Here, I'm a whistleblower, and I'm getting the shaft." Ropp was working at Bristol West's Anaheim, California office last year when a state appeals court ruled that the company had been illegally canceling the policies of customers who were a single day late with their payments. Under California law, an insurance company must give 10 days notice before canceling a delinquent customer's automobile liability policy. Bristol West had been circumventing that requirement by issuing "cancellation notices" with every bill, before payment was due, so that by the due date the 10 days had already passed. "If it was due Tuesday, and you had an accident on Wednesday, you didn't have any insurance," says Ropp. "It was out-and-out a wrongful, illegal denial." A California appellate court ruled against Bristol West in January, in a lawsuit filed by a customer, Curtis Mackey, who'd been involved in an auto accident two weeks after missing a payment, and was consequently denied a claim. Without admitting wrongdoing, the company subsequently agreed to pay six million dollars to settle a separate class action lawsuit filed on behalf of customners whose policy was canceled without proper notice. Office Intrigue As he tells it, the affair left Ropp with a bad taste in his mouth, and ultimately turned him against his employer. "I just felt there were a lot of people getting screwed," he says. By his account, which meshes with an affidavit filed by an FBI agent in his case, Ropp began secretly copying internal company documents about the canceled policies, then passing them on to two lawyers representing plaintiffs in the lawsuit. Then, late last year, Ropp, the attorneys, another Bristol employee and a private investigator all met with investigators with California's Department of Insurance, which is charged with enforcing insurance laws in the state. There, Ropp offered what the FBI describes as "information concerning Bristol's handling of certain claims." What happened next depends on who you ask. Ropp says the Department was interested, and wanted Ropp get more documentation. "They told us to gather all the information we can," he recalls. The Department remembers it differently. "It's a very strange situation," says spokesperson Carrie Beckstein. The meeting took place at Ropp's request, Beckstein said, and the investigators were not persuaded to probe Bristol's practices. "The only information that we wanted was, what, exactly [Ropp] was up to... We have not requested his services. We did not ask him to go out and elicit information." Regardless, Ropp says he set his sights on a company database of every custome r who might qualify as a member of the class in the lawsuit. "What I was trying to do is get the current list of those claims, and what they did or didn't do with them, and I wanted to get that for the Department of Insurance," says Ropp. That's where the FBI and federal prosecutors say Ropp crossed the line. The database was password protected, and Ropp decided to crack the system. After some Googling, he settled on the KEYKatcher as the best tool for the job. "Basically all it does its capture every stroke that you type into the computer, like passwords and stuff." He ordered it online, and secretly installed it on the secretary's machine. The plan began to unravel on September 3rd, when the company fired Ropp for, as the FBI puts it, "not adhering to its time-keeping policies." (Ropp says he failed to report the time he spent in the office secretely gathering documents.) Suddenly barred from the building, Ropp phoned former co-worker Karen Kaiser the next day, and asked her to discreetly retrieve the KEYKatcher from the bugged computer -- he suggested she pretend to tie her shoe next to the secretary's desk, then unplug the keyboard cable from the PC and remove the device. Instead, Kaiser snitched on Ropp, and the company brought in forensic investigators who recovered the device and found files of intercepted keystrokes on Ropp's old office computer, demonstrating that he'd already harvested the KEYKatcher at least once. "If I had never called, they would have never known," he says. The company called in the FBI, and Ropp quickly admitted the caper. But he told agents that he'd been working for the Department of Insurance. The Department distanced itself from Ropp's adventuring, assuring the FBI that it "had never directed Ropp to collect any evidence that he would not be able to obtain in the normal course of business," according to the affidavit. For his part, Ropp admits the Department never told him to crack passwords or tap keystrokes, but he claims he was under the impression that he had their blessing to investigate his employer. Today, he says he feels burned. "All of a sudden when everything blew up, I'm out there hanging by myself," he says. The U.S. Attorney's office in Los Angeles says Ropp is the first defendant in the U.S. to be charged for illegally using a hardware keystroke logger. The indictment charges a violation of the federal wiretap statute, which criminalizes the covert interception of electronic communication -- in this case several e-mail messages that had been typed in by the tapped secretary, and were therefore stored in the device. Citing the ongoing nature of the case, Craig Eisenacher, spokesman for Bristol West, declined to comment on Ropp's indictment, or on Ropp's claim that he was working to expose company wrongdoing. Ropp is free on a $15,000 signature bond, and is scheduled to be arraigned April 5th. < http://www.securityfocus.com/news/8329 > Copyright © 1999-2004 SecurityFocus [Non-text portions of this message have been removed] 8389 From: Date: Sun Mar 28, 2004 2:01pm Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 8390 From: Steve Uhrig Date: Mon Mar 29, 2004 6:47pm Subject: U.S. Trojan software caused big bang in USSR According to Reed, a former secretary of the Air Force and special assistant to President Reagan, the Reagan administration faced a choice in 1981 when it gained access to an agent in the KGB technical intelligence directorate and discovered that Soviet theft of American technology had been massive. "In essence, the Pentagon had been in an arms race with itself," Reed said in a phone interview with Wired News. Rather than arrest everyone they could to try to close the operation down and halt further espionage, DCI William Casey and National Security Council staffer Gus Weiss cooked up a better plan: They turned into hackers. "(Soviet operatives) stole stuff, and we knew what they were going to steal," Reed said. "Every microchip they stole would run fine for 10 million cycles, and then it would go into some other mode. It wouldn't break down, it would start delivering false signals and go to a different logic." The most spectacular result of this hacking, according to Reed, was a massive explosion during the summer of 1982 in the controversial pipeline delivering Siberian natural gas to Western Europe. Soviet spies stole software needed to operate the pipeline, not knowing that "it had a few lines of software added that constituted a Trojan horse," said Reed. "They checked it out, it looked fine, and ran just fine for a few months. But the Trojan horse was programmed to let it run for four or five months and then the pumps and compressors are told, 'Today is the day we are going to run a pressure test at some significantly increased pressure.'" "We expected that the pipeline would spring leaks all the way from Siberia to Germany, but that wasn't what happened," Reed said. "Instead the welds all blew apart. It was a huge explosion. The Air Force thought it was a 3-kiloton blast." --------------- Above is an excerpt from an article. Full text can be found at: http://www.wired.com/news/print/0,1294,62806,00.html Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8391 From: Ocean Group Date: Tue Mar 30, 2004 9:20am Subject: RE: U.S. Trojan software caused big bang in USSR They left out the fact that it was French Intelligence that put them onto their man in the KGB that told them about the purchases, which was relayed by the French PM to Reagan, so you see the Franch aren't always "plotting" against the US! :) ******************************** Message: 1 Date: Mon, 29 Mar 2004 19:47:45 -0500 From: "Steve Uhrig" Subject: U.S. Trojan software caused big bang in USSR According to Reed, a former secretary of the Air Force and special assistant to President Reagan, the Reagan administration faced a choice in 1981 when it gained access to an agent in the KGB technical intelligence directorate and discovered that Soviet theft of American technology had been massive. "In essence, the Pentagon had been in an arms race with itself," Reed said in a phone interview with Wired News. Rather than arrest everyone they could to try to close the operation down and halt further espionage, DCI William Casey and National Security Council staffer Gus Weiss cooked up a better plan: They turned into hackers. "(Soviet operatives) stole stuff, and we knew what they were going to steal," Reed said. "Every microchip they stole would run fine for 10 million cycles, and then it would go into some other mode. It wouldn't break down, it would start delivering false signals and go to a different logic." The most spectacular result of this hacking, according to Reed, was a massive explosion during the summer of 1982 in the controversial pipeline delivering Siberian natural gas to Western Europe. Soviet spies stole software needed to operate the pipeline, not knowing that "it had a few lines of software added that constituted a Trojan horse," said Reed. "They checked it out, it looked fine, and ran just fine for a few months. But the Trojan horse was programmed to let it run for four or five months and then the pumps and compressors are told, 'Today is the day we are going to run a pressure test at some significantly increased pressure.'" "We expected that the pipeline would spring leaks all the way from Siberia to Germany, but that wasn't what happened," Reed said. "Instead the welds all blew apart. It was a huge explosion. The Air Force thought it was a 3-kiloton blast." --------------- Above is an excerpt from an article. Full text can be found at: http://www.wired.com/news/print/0,1294,62806,00.html Steve 8392 From: Ocean Group Date: Wed Mar 31, 2004 6:09am Subject: How a telephone intercept led to MI5's biggest hunt for Islamic terror suspects By Jason Bennetto and Kim Sengupta The Independent 31 March 2004 It was in February that eight young British citizens living in and around London first became the focus of what would turn into MI5's biggest ever operation against suspected al-Qa'ida terrorists. During the next six weeks, the full force of Britain's intelligence capabilities were used against the suspects, all of whom are of Pakistani descent, to track them, eavesdrop their conversations, bug their phones, and follow their every move. The security services were first alerted to the suspected cells of Islamic extremists after intercepting one of the group's telephone conversations. As the operation snowballed, more and more officers from MI5, Scotland Yard's anti-terrorist branch, and the listening centre at GCHQ in Cheltenham, joined the investigation. The inquiry, codenamed Crevis, came to a head yesterday in a series of co-ordinated early morning raids involving around 700 police officers. The target of the operation were eight men, aged 17, 18, 19, 20, 21, 21, 22 and 32, and a warehouse in west London. Inside the lock-up storage centre in Boston Road, Hanwell, the police seized more than half a ton of ammonium nitrate fertiliser, a bomb-making ingredient, in a 6ft by 2ft plastic bag. It was the biggest seizure of potential bomb-making material since the IRA suspended its terror campaign in 1997. During the numerous phone taps and interceptions in the security services' operation, the group of young men are alleged to have discussed a number of possible targets in Britain, including a shopping complex on or close to the M25 motorway. There were suggestions the Jordanian embassy could have been targeted because of Jordan's assistance to the Americans before the Iraq war and because Iraqi soldiers are now training in that country. Other targets were also allegedly mentioned, but according to anti-terrorist sources, no single location was selected. There is speculation that the men considered an attack on Gatwick or Heathrow because several of the men arrested lived near the airports and at least one works at Gatwick but sources believe that is unlikely because of the tight security surrounding the airports. Little information has been released about the eight men who were arrested, although the security service has built up a detailed picture of their lives during the intensive surveillance operation. Two of the men were arrested in Uxbridge, north-west London, one in Ilford, Essex, one in Horley, Surrey, one in Slough and three in Crawley in Sussex. All the men have family connections in Pakistan and are understood to have visited the country several times. One suspect is said to have taken part in a training camp near Peshawar in the west of the country before the war in Afghanistan, after travelling to the Punjab to visit relatives. But it is in Britain that the group are alleged to have become radicalised and joined the growing band of Islamic extremists who support Osama bin Laden. One of the suspects was said to have worshipped at the Brixton mosque where Richard Reid and Zacarias Moussaoui, the so-called 20th hijacker in the 11 September attacks, have also worshipped. It is not known, however, if the men ever met. The age of the remaining suspects is thought to reflect the growing radicalisation of a tiny number of young British-born Muslims. There appeared to be no overt links between the eight suspects arrested yesterday and the group accused over the Madrid bombing. The extreme youth of the majority of the eight also highlights the difficulties for the security services in trying to identify likely al-Qa'ida followers. In normal circumstances, anti-terrorist operations would be aimed at suspects with a history of extremism or violence. The decision to arrest the suspects yesterday was taken by MI5 and Deputy Assistant Commissioner Peter Clarke, head of the Anti-Terrorist Branch and national co-ordinator for terrorism, amid concerns that a bomb was being prepared. At 6am, officers from five different police forces carried out the raids i in the Home Counties. In all, 24 properties were raided and searches were continuing in many of them last night. Police were on guard at the Access Storage Solutions warehouses yesterday while forensic officers continued their examination of the site where they discovered the fertiliser. The warehouse contains individually alarmed lock-ups, 24-hour automated access to the site and office space. So-called "drive-ups" allow vans and cars to back on to the storage units, making loading easier. In Crawley, about 100 officers took part in the operation and arrested three men aged 19, 22 and 32 in the Langley Green area of the town, which has one of the largest ethnic populations in West Sussex. No names have been released but it is believed one of those arrested worked for Sky Chef, a catering company at Gatwick while the other worked for Checker Cab Company, also based at the airport. Officers remained at the addresses, which continued to be cordoned off with police tape last night. In Langley Drive, Crawley, yesterday, two uniformed police officers were standing guard outside a house after one of the raids. Police were also on guard outside an internet cafÈ in nearby Langley Parade. A house was raided in Juniper Road, Crawley and six houses were raided in Luton. Forensic officers in white boiler suits searched the premises. Yasin Rehman, information officer for the Luton Council of Mosques, said extremist groups had been targeting young men in Luton for several years. He said they had been banned from mosques after attempting to recruit followers but continued to hold meetings and distribute leaflets in the town. He said Muslim leaders had formed the council of mosques in an attempt to counteract the extremist messages. "I would say there are up to 30-40 people in Luton who are members of these groups," said Mr Rehman. "They used to produce leaflets. Sometimes disgusting leaflets about killing people. We tried to stop that, telling them that they could not use our mosques to distribute these leaflets. Their message seems to be that the West is to blame for everything. The majority of the people in the Muslim community don't support extremism. But we are concerned because they are targeting young people - young people who come from deprived areas who often have nothing and little hope." One neighbour of a family raided in Luton said: "I'd be amazed if they were involved in any kind of terrorism. They can't have done anything wrong. They're a nice family. From what I heard, the police came here at about 5 o'clock kicking doors down like The Sweeney." Crawley Police warned that searches were likely to continue for several days. Police are also investigating the Gatwick Holiday Inn in Horley where an arrest was made in connection with anti-terrorism operations. They sealed off two rooms on the fourth floor. Room numbers 440 and 442 have been placed off limits by officers who have posted a police guard outside the doors. Items are being removed for examination. The Home Secretary David Blunkett said the finds were a "timely reminder" that British interests at home and abroad remained a target. "We have always been clear with the people in the UK that we face a real and serious threat," he said. 8393 From: Ocean Group Date: Wed Mar 31, 2004 10:32am Subject: Tempest...No SpyShop BS, Just Science Don't ever ask another Tempest question until you've read this thesis: http://www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-577.pdf (167 pages, 8.4MB) These guys, let under Ross Anderson, are by far the best security engineers on the planet, in my eyes. I don't respect anyone more. When they talk everyone should listen! :) Regards Oisin 8394 From: Fernando Martins Date: Thu Apr 1, 2004 2:12am Subject: Re: Tempest...No SpyShop BS, Just Science I agree. If by any chance one is wondering "who the hell is this guy?", here's some focus of light ... http://www.cl.cam.ac.uk/~rja14/ - Ross Anderson home page http://www.cl.cam.ac.uk/Research/Security/ - Computer Security Group, Computer Laboratory, University of Cambridge http://www.cl.cam.ac.uk/~rja14/book.html - a book by Ross Anderson, Security Engineering (lots of what is here is in his home page, as studies) http://www.cl.cam.ac.uk/users/rja14/tamper.html - one of those studies, one of my favorites FM ----- Original Message ----- From: "Ocean Group" To: Sent: Wednesday, March 31, 2004 5:32 PM Subject: [TSCM-L] Tempest...No SpyShop BS, Just Science > Don't ever ask another Tempest question until you've read this thesis: > > http://www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-577.pdf (167 pages, 8.4MB) > > These guys, let under Ross Anderson, are by far the best security engineers on the planet, in my eyes. I don't respect anyone more. > > When they talk everyone should listen! :) > > Regards > > Oisin > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 8395 From: A.Lizard Date: Fri Mar 26, 2004 4:58pm Subject: Re: Man Indicted in Wiretap Case Wouldn't the weak spot of a hardware keyboard sniffer be that the data from that sniffer has to be transferred to the eavesdropper in some manner? If that data is being shipped outbound via the Internet, wouldn't it be possible to detect it as 'packets not originating from any known process/application running on this machine'? Of course, if it's transmitting RF, I don't see any way a software app could detect it, that's a matter for TSCM techniques. One of my favorite ZoneAlarm features is that it's supposed to detect any application that connects to the Internet and ask permission on behalf of that application to complete the connection. A.Lizard >________________________________________________________________________ >________________________________________________________________________ > >Message: 1 > Date: Thu, 25 Mar 2004 00:30:03 -0500 > From: Dave Emery >Subject: Re: Man Indicted in Wiretap Case > >On Thu, Mar 25, 2004 at 03:11:54AM +0100, Thomas Shaddack wrote: > > > instead of the PS/2 ones. The USB protocol is much more difficult to > > eavesdrop on, and I am not aware about any USB keylogger being available > > on the market. Though I guess it's still possible to build - but the > > microcontroller required for that is much more powerful, as instead of > > simple bitshifting and EEPROM writing it has to decode the entire USB > > protocol. Which is everything but trivial, and resorting to a software > > keylogger or bugging the keyboard multiplexing matrix is easier anyway. > > There is USB interface silicon around in various places, >including user programmable FPGAs with USB interfaces - while not as >easy as 1980s keyboard interfaces, I would think anyone designing a >product with any volume would be able to afford the tools and resources >to use these for monitoring USB keyboard traffic. (What the gotchas are >I don't know as I have not explored USB keyboard protocol issues in >detail). > > The evilness of a hardware sniffer is that while potentially >detectable by TSCM techniques (as discussed), it is in general not >detectable by software on the monitored machine and cannot be neutralized >by reinstalling the OS and applications or detected by using software >debugging tools and techniques. > > > > >-- > Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass > 02493 > > > > >________________________________________________________________________ >________________________________________________________________________ > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >------------------------------------------------------------------------ >Yahoo! Groups Links > > > > >------------------------------------------------------------------------ -- member The Internet Society (ISOC), The HTML Writers Guild. "They need to wake up and smell the fire, it is their pants that are burning." hombresecreto, re: the famous SCO threat letter Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizardx@y... PGP 8.0 key available by request or keyserver. Download PGP from: http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html ***Looking for INTELLIGENT new technology public policy alternatives?*** http://www.ecis.com/~alizard/technology.html 8396 From: A.Lizard Date: Fri Mar 26, 2004 5:01pm Subject: Re: Man Indicted in Wiretap Case At 07:08 AM 3/25/04, you wrote: Could you explain the USB strobe method? thanks A.Lizard >Message: 5 > Date: Wed, 24 Mar 2004 13:25:12 -0500 > From: "James M. Atkinson" >Subject: Re: Man Indicted in Wiretap Case > >It doesn't help that Key Katcher has multiple backdoors, can easily be >detected, easily disabled, and has a history of being sold by felons, >crooks, mental patients, and so on. > >It is illegal to use, to possess, to attempt to possess, to sell, to buy, >to advertise or any variation thereof. A parent cannot use this on either >their own, or their kids computer, nor can a business use these to spy on >their own employees. It is illegal, a felony, a tort, and a generally >naughty and forbidden thing. > >However, these are a piece of cake to find technically during a sweep. >Simply use a low inductance tuned shielded magnetic coil, a fire-wall >bandpass filter, and a 40-45 dB LNA. Go for the oscillator, and the >harmonics of the oscillator for 100% detection of the device. TSCM >detection protocol is identical for that of finding modern sub-miniature >digital audio recorders. > >Also extremely easy to detect via the naked eye (if you have a clue), and >can also be easily detected by simply using the USB strobe method. > >I have records that the U.S. Government has bought a number of these, and >that the purchase was illegal, and the equipment was used in direct >violation of U.S. Law, and used to perform illegal buggings that were not >court authorized or approved. > >-jma -- member The Internet Society (ISOC), The HTML Writers Guild. "They need to wake up and smell the fire, it is their pants that are burning." hombresecreto, re: the famous SCO threat letter Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizardx@y... PGP 8.0 key available by request or keyserver. Download PGP from: http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html ***Looking for INTELLIGENT new technology public policy alternatives?*** http://www.ecis.com/~alizard/technology.html 8397 From: ve3awf Date: Sat Mar 27, 2004 11:07am Subject: Micro-Tel MSR-904A Hello I would like to buy orginal manual or copy for Micro-Tel MSR-904A Rrgards 73! Andrzej Wolczanski VE3AWF mailto:awfqisto@i... 8398 From: James M. Atkinson Date: Wed Mar 31, 2004 5:08pm Subject: Re: Tempest...No SpyShop BS, Just Science Too bad the article is loaded with both technical and historic errors, and was written by someone who was obviously inexperienced, biased, and attempting to sensationalize on an urban legend and on something of which they had no formal education or training... the same material was funny 25 years ago when someone else "discovered it". Shame on the University for allowing such drivel to appear under their letterhead. -jma At 11:32 AM 3/31/2004, Ocean Group wrote: >Don't ever ask another Tempest question until you've read this thesis: > >http://www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-577.pdf (167 pages, 8.4MB) > >These guys, let under Ross Anderson, are by far the best security >engineers on the planet, in my eyes. I don't respect anyone more. > >When they talk everyone should listen! :) > >Regards > >Oisin ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8399 From: Date: Tue Mar 30, 2004 10:39am Subject: Rif: U.S. Trojan software caused big bang in USSR "We expected that the pipeline would spring leaks all the way from Siberia to Germany, but that wasn't what happened," Reed said. "Instead the welds all blew apart. It was a huge explosion. The Air Force thought it was a 3-kiloton blast." The Merriam-webster definition of kiloton is: "an explosive force equivalent to that of 1000 tons of TNT " How many cubic feet of (somewhat compressed) natural gas would you need, - mixed with the appropriate amount of atmosferic oxygen - to give an explosive force equivalent to ONE TON of TNT? This story sounds like a metropolitan legend to me. Ciao! Remo 8400 From: James M. Atkinson Date: Tue Mar 30, 2004 1:56pm Subject: Osama bin Laden went to heaven After his death, Osama bin Laden went to heaven. There he was greeted by George Washington, who proceeded to slap him across the face and yell at him, "How dare you try to destroy the nation I helped conceive!" Patrick Henry approached and punched Osama in the nose and shouted, "You wanted to end our liberties but you failed." James Madison entered, kicked Osama in the groin and said, "This is why I allowed our government to provide for the common defense!" Thomas Jefferson came in and proceeded to beat Osama many times with a long cane and said, "It was evil men like you that provided me the inspiration to pen the Declaration of Independence! ". These beatings and thrashings continued as John Rudolph, James Monroe and 66 other early Americans came in and unleashed their anger on the Muslim terrorist leader. As Osama lay bleeding and writhing in unbearable pain an Angel appeared. Bin Laden wept in pain and said to the Angel, "This is not what you promised me." The Angel replied, "I told you there would be 72 Virginians waiting for you in heaven. What did you think I said? ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8401 From: Shawn Hughes Date: Thu Apr 1, 2004 11:31am Subject: Re: Fuel-Air Explosives Not as much as you might suspect, Remo. It is based on what we call the RE (Relative Effectiveness) of one explosive compound to another. I agree that the gas in those lines are somewhat compressed, but you might consider the size of the conduit, and the CFM ( cubic feet per minute) that the conduit is capable of flowing. Also, How long did the failure release product into the atmosphere until an ignition source met the product in the correct proportions? -Shawn Shawn Hughes Lead Instructor Explosive and WMD Operations Tactical Response, Inc. www.warriormindset.com At 10:23 AM 4/1/04 , you wrote: >How many cubic feet of (somewhat compressed) natural gas would you need, > - mixed with the appropriate amount of atmosferic oxygen - >to give an explosive force equivalent to ONE TON of TNT? >This story sounds like a metropolitan legend to me. > >Ciao! > Remo > > > > > > > > > > > 8402 From: kondrak Date: Thu Apr 1, 2004 3:48pm Subject: Re: Re: Man Indicted in Wiretap Case What would make you think the unsuspecting user would pay attention to something traversing port 80 (http), port 25 (SMTP) or even port 443 (SSL) which are in use in the normal daily tasks? This is where a firewall that notifies you that something OTHER than your normal stuff is attempting to phone home is a great help. Ive caught spyware that way, though its almost always masked by saying something innocuous (winNTkernal for example) is attempting to connect to 12.123.xxx.xxx via FTP. Bottom line is, YOU GOTTA BE VIGILANT! Find out exactly what is calling whom. Whois the IP address, and its its a non-descript addy somewhere in a huge system chances are its evil. If the addy doesn't resolve to an name, beware. If it does, check the site to see exactly what they do. Some are brighter than others...Ive found a site that relayed from SBC (Southwest Bell), to China, to Europe to send spyware data. At 17:58 3/26/2004, you wrote: >Wouldn't the weak spot of a hardware keyboard sniffer be that the data from >that sniffer has to be transferred to the eavesdropper in some manner? If >that data is being shipped outbound via the Internet, wouldn't it be >possible to detect it as 'packets not originating from any known >process/application running on this machine'? > >Of course, if it's transmitting RF, I don't see any way a software app >could detect it, that's a matter for TSCM techniques. > >One of my favorite ZoneAlarm features is that it's supposed to detect any >application that connects to the Internet and ask permission on behalf of >that application to complete the connection. > >A.Lizard > > >________________________________________________________________________ > >________________________________________________________________________ > > > >Message: 1 > > Date: Thu, 25 Mar 2004 00:30:03 -0500 > > From: Dave Emery > >Subject: Re: Man Indicted in Wiretap Case > > > >On Thu, Mar 25, 2004 at 03:11:54AM +0100, Thomas Shaddack wrote: > > > > > instead of the PS/2 ones. The USB protocol is much more difficult to > > > eavesdrop on, and I am not aware about any USB keylogger being available > > > on the market. Though I guess it's still possible to build - but the > > > microcontroller required for that is much more powerful, as instead of > > > simple bitshifting and EEPROM writing it has to decode the entire USB > > > protocol. Which is everything but trivial, and resorting to a software > > > keylogger or bugging the keyboard multiplexing matrix is easier anyway. > > > > There is USB interface silicon around in various places, > >including user programmable FPGAs with USB interfaces - while not as > >easy as 1980s keyboard interfaces, I would think anyone designing a > >product with any volume would be able to afford the tools and resources > >to use these for monitoring USB keyboard traffic. (What the gotchas are > >I don't know as I have not explored USB keyboard protocol issues in > >detail). > > > > The evilness of a hardware sniffer is that while potentially > >detectable by TSCM techniques (as discussed), it is in general not > >detectable by software on the monitored machine and cannot be neutralized > >by reinstalling the OS and applications or detected by using software > >debugging tools and techniques. > > > > > > > > >-- > > Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass > > 02493 > > > > > > > > > >________________________________________________________________________ > >________________________________________________________________________ > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >------------------------------------------------------------------------ > >Yahoo! Groups Links > > > > > > > > > >------------------------------------------------------------------------ > >-- >member The Internet Society (ISOC), The HTML Writers Guild. >"They need to wake up and smell the fire, it is their pants that are burning." > hombresecreto, re: the famous SCO threat letter >Personal Website http://www.ecis.com/~alizard >business Website http://reptilelabs.com >backup address (if ALL else fails) alizardx@y... >PGP 8.0 key available by request or keyserver. Download PGP from: >http://www.pgpi.org for e-mail privacy. >Disaster prep info: http://www.ecis.com/~alizard/y2k.html >***Looking for INTELLIGENT new technology public policy alternatives?*** > http://www.ecis.com/~alizard/technology.html > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 8403 From: kondrak Date: Thu Apr 1, 2004 3:54pm Subject: Re: Re: Fuel-Air Explosives Really, spew enough natural gas (which right out of the ground isn't real smelly) and something's eventually going to spark and ignite it somewhere. At 12:31 4/1/2004, you wrote: >Not as much as you might suspect, Remo. > >It is based on what we call the RE (Relative Effectiveness) of one >explosive compound to another. I agree that the gas in those lines are >somewhat compressed, but you might consider the size of the conduit, and >the CFM ( cubic feet per minute) that the conduit is capable of flowing. >Also, How long did the failure release product into the atmosphere until an >ignition source met the product in the correct proportions? > > > >-Shawn > >Shawn Hughes >Lead Instructor >Explosive and WMD Operations >Tactical Response, Inc. >www.warriormindset.com > > > > >At 10:23 AM 4/1/04 , you wrote: > >How many cubic feet of (somewhat compressed) natural gas would you need, > > - mixed with the appropriate amount of atmosferic oxygen - > >to give an explosive force equivalent to ONE TON of TNT? > >This story sounds like a metropolitan legend to me. > > > >Ciao! > > Remo > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 8404 From: Date: Thu Apr 1, 2004 1:37pm Subject: Historic hoaxes and how not to be fooled yourself Historic hoaxes and how not to be fooled yourself By Sara Steindorf You'd think that, after 300 years, people would catch on. A "kick me" sign pinned to someone's back dates to the 1700s. Pennies glued to the pavement are just as old. Faked photos have been around nearly as long as photography itself (a 19th-century invention). Concocted creatures - ever hear of a "jackalope"? - are old, old news as well. But that doesn't mean people don't fall for such things today. And while pranks such as "kick me" signs and superglued coins are exposed in a moment, faked photos and other hoaxes can last longer. A host of hoaxes - deceptions publicly parading as truths - circulate on the Internet every day. Some hoaxes last for weeks, months, even decades. So, to arm you for April Fool's Day, here are a few well-known hoaxes from the past and present. Do you believe in fairies? In 1917, 15-year-old Elsie Wright and her cousin, 10-year-old Frances Griffiths, gushed to their parents that they'd been out playing with fairies. Naturally, the grownups didn't believe them - until they saw pictures. The photos appeared to show the girls in a garden in Cottingley, Yorkshire, with tiny winged creatures prancing about. After a local photographic expert pronounced the images real, word spread. Many people began to believe in fairies. The photos even duped Sir Arthur Conan Doyle, author of the Sherlock Holmes mysteries! Sixty years later, the cousins confessed: They had cut out the fairy figures from a children's book and attached them to garden plants with hatpins. It began as a prank and got out of hand. Earlier, in the late 1800s, faked photos had been used to try to convince people that a phantom city existed in Alaska and that "brain waves" could produce the image of a cat on film. By the early 1900s, "freak postcards" showed corn as big as trees, barn-size cabbages, and whopper grass-hoppers. The photos were cut out and pasted together to create the effect. Then along came "Snowball, the Monster Cat." In early 2000, a startling image began circulating on the Internet. It showed a bearded man holding a cat as big as a large dog. It seemed outlandish, but it looked so real. A story began circulating with the photo: Snowball's mother (a normal-size cat) had been abandoned near a nuclear lab. Somehow, nuclear radiation had resulted in the enormous Snowball. Many believed it - or scoffed that it was a normal-size cat with a very small man. When the photo appeared on "The Tonight Show with Jay Leno," the cat was let out of the bag. In May 2001, Washington resident Cordell Hauglie announced that "Snowball" was his daughter's cat, Jumper, who weighed a mere 21 pounds. He had created the fake image in 20 minutes using photo manipulation software. He'd e-mailed the image to friends as a joke. Somehow, the joke ... snowballed. Today, Mr. Hauglie is still mystified and amused. Even after the image was exposed as a fake, people wanted to come by to see "the giant cat." He created the photo "never thinking for a moment that adults would assume such a cat really existed!" he says via e-mail. The most convincing hoaxes, however, are often the ones created by the experts themselves. On April 1, 1957, the BBC's prestigious "Panorama" TV show reported on the "spaghetti harvest" in Switzerland. Viewers saw Richard Dimbleby, the show's anchor, walking among trees dripping with noodles as a rural family plucked pasta and put it in baskets. "The spaghetti harvest here in Switzerland is not, of course, carried out on anything like the tremendous scale of the Italian industry," Dimbleday told viewers. "For the Swiss ... it tends to be more of a family affair." Viewers eager to grow spaghetti were reportedly told by the BBC to "place a sprig of spaghetti in a tin of tomato sauce and hope for the best." (To be fair, spaghetti was an exotic dish in Britain in the 1950s.) To see the broadcast, go to www.bbc.co.uk and search for "Swiss spaghetti harvest." Alex Boese, who has tracked hoaxes for several years on MuseumOfHoaxes.com, says this is his favorite. It meets his top criteria for a "good" hoax: "That it's not mean, and that it makes people laugh." A new name for the Liberty Bell Today, many companies send out phony press releases or publish fake ads on April Fool's Day. They want to show customers that they can be lighthearted and, of course, they want the publicity. On April 1, 1996, Taco Bell took out full-page ads in five major newspapers announcing that they were buying the Liberty Bell and renaming it. It would now be known as the "Taco Liberty Bell." "A lot of people were angry," says Mr. Boese. "You just think of all the sports stadiums being named after companies these days - but now the Liberty Bell ?" Taco Bell kept a straight corporate face until noon and then revealed that it was a joke. Taco Bell got an estimated $25 million in free publicity for the stunt. And sales for that April 1-2 were $1.1 million higher compared with sales on March 25-26. Finally, a favorite ploy of hoaxers has been to make their stories hard to verify. In 1702, the self-proclaimed "Native of Formosa" arrived in Holland. His eccentric behavior seemed to prove his claim: He worshiped the sun and moon and ate heavily spiced raw meat. Because the people had never met anyone from Formosa (now Taiwan), he was treated as a celebrity. He managed to confound his critics for years. No one could check his story. In 1706, he finally confessed. He was an imposter looking for easy money. Today, the Internet and e-mails make great use of this trick. Among the classic examples is the "Internet Cleaning" e-mail of 1997. It warned that the Internet would be shut down on April 1. Everyone was encouraged to turn off their computers and servers and disconnect their Internet connections so that "Internet-crawling robots" could remove "electronic flotsam and jetsam" to create a "better-working and faster" Internet. "It was just plausible enough for new computer users to believe it," says David Emory of UrbanLegends.About.com. But one giveaway that it was fraudulent, he says, was that the source on the e-mail was phony, so there was no one to contact to verify the story. Good hoaxes always seem outlandish, but possible, Boese says. But often, so does the truth. How did people greet the news that the Earth was round? Or that it revolved around the sun? Common sense sometimes exposes a hoax, but look deeper. Boese says to ask yourself: ‚Ä¢ Where did this come from, and is that source trustworthy? (If no source is given, that's a danger flag.) ‚Ä¢ What do other sources say about it? Check with some websites you trust. ‚Ä¢ Who produced this and why? What were their motives for producing it? Finally, check the date: Was it published on April 1? (A dead giveaway: Is it dated "March 32"?) Anti-hoax resources If you Hear of something on April 1 that seems too weird, extreme, or amazing to be true, check it out on one of these rumor-bashing websites: MuseumOfHoaxes.com is Alex Boese's site, which began as research for his PhD on the history of science. TruthOrFiction.com is operated by broadcaster Rich Buhler, a longtime researcher of rumors and urban legends. UrbanLegends.About.com is run by David Emery, a writer and an avid chronicler of urban folklore and hoaxes. (Be skeptical of insistent language with lots of exclamation marks, dire warnings, and capitalized words, Mr. Emery says.) If you're wondering if an e-mail virus warning is bogus, try Vmyths.com, run by security expert Rob Rosenberger. Researcher and editor John Ratliff's BreakTheChain.org offers a lowdown on current e-mail chain letters. How New Year's became April Fool's Day The origins of April Fool's Day are unknown, though one popular theory goes like this: In 16th-century France, the start of the new year was April 1. It was celebrated with parties and dancing into the night. Then in 1582, Pope Gregory VIII introduced a new calendar for the Christian world, and the new year began on Jan. 1. But some people didn't hear about the date change, or didn't believe it, so they continued to celebrate New Year's Day on April 1. Others made fun of these traditionalists and played tricks on them. In 1752, Britain finally adopted the Gregorian calendar, and April Fool's Day began to be celebrated in England and in the American colonies. The tradition of practical joking and mischiefmaking, however, dates back to ancient Greek and Roman times. On some holidays, for example, "slaves were allowed to play tricks on their masters and children could play tricks on their parents," says Alex Boese, author of "The Museum of Hoaxes" (Dutton, 2002). The purpose of the unruly holidays was to "let people release a bit of steam on one day of the year, helping to preserve the social order for the remaining days," Mr. Boese says. Meanwhile, hoax trends have evolved through the years. In the 14th century, fake religious artifacts were the most popular hoaxes, says Boese. In the 18th century, hoaxes that poked fun at society's flaws were all the rage. For example, big-time hoaxer Benjamin Franklin published phony stories under a false name to mock the drunkenness of locals, the fashion of hoop petticoats, and the public's obsession with prophecy. Today, Internet and media hoaxes dominate. "On April Fool's Day, some of the biggest hoaxers are companies who place fake ads in newspapers, hoping to gain publicity," says Boese. And thanks to the Internet and e-mail, now anyone can spread a hoax both cheaply and easily. from the March 30, 2004 edition - http://www.csmonitor.com/2004/0330/p18s01-hfks.html [Non-text portions of this message have been removed] 8405 From: James Coote Date: Thu Apr 1, 2004 10:21pm Subject: For Sale Items Optoelectronics DC-440 DTMF/PL/Signalling decoder Used with radio receiver/scanner or audio playback device Requires 9VDC 2.1mm adaptor. No manual. Good cosmetic and working condition. $200 + UPS Ground Uniden BC-760XLT Scanner With built-in CTCSS decoder and 120 v power adaptor Fixed and variable-level audio outputs Useful monitoring local radio activity or demonstrating wireless vulnerabilities. Very clean condition $200 + UPS ground Contact me regarding terms of sale. Thanks, Jay Los Angeles 8406 From: James Coote Date: Sat Apr 3, 2004 4:48pm Subject: AOR-1000XLT Handheld receiver For Sale AOR-1000 handheld receiver, full coverage. Good for client demonstrations of wireless vulnerabilities or examining low-level RF threats while portable. Very good cosmetic and working condition, however, has a small blemish in the left side of the LCD display. Runs on NICADs or AA alkaline batteries (not furnished). BNC antenna, attenuator switch and 3.5 mm audio output for phones or peripherals. Protector holster and NICAD charger. $300 plus packing/shipping, USA-only Terms: prepayment via US Postal Service money order only. Thanks, Jay Los Angeles 8407 From: James M. Atkinson Date: Sat Apr 3, 2004 10:35am Subject: Other Other Approximately sixty circus performers have been shot from cannons. At last report, thirty-one of these have been killed. The Boeing 767 aircraft is a collection of 3.1 million parts from 800 different suppliers around the world: fuselage parts from Japan, center wing section from Southern California, flaps from Italy. A man irate about his income tax paid Uncle Sam with a plaster of Paris check that weighed several pounds. He wasn't all that bright, because once the government cashed the check, it was returned to him and he had to keep it for five years for his records. On the new hundred dollar bill the time on the clock tower of Independence Hall is 4:10. Parker Brothers prints about 50 billion dollars worth of Monopoly money in one year. Calvin and Hobbes: Hobbes originally had pads on his hands and feet but Bill Waterson (the creator) found them too distracting and removed them. It took Leo Tolstoy six years to write "War & Peace". Charlie Brown's father was a barber. Lucy and Linus (who where brother and sister) had another little brother named Rerun. (He sometimes played left-field on Charlie Brown's baseball team, [when he could find it!]). In the name of art, Chris Burden arranged to be shot by a friend while another person photographed the event. He sold the series of pictures to an art dealer. He made $1750 on the deal, but his hospital bill was $84,000. In Britainís House of Commons, the government and opposition sides of the House are separated by two red lines. The distance between the lines is two swordsí lengths, a reminder of just how seriously the Brits used to take their politics. The surface area of an average-sized brick is 79 cm squared. In the kingdom of Bhutan, all citizens officially become a year older on New Year's Day. The diameter of the wire in a standard paper clip is 1 millimeter - or about 0.04 inch. People generally say there are 365 days in a year. By a year, I mean this is the time period it takes the earth to travel around the sun: 365 days. Actually, however, it takes the Earth 365.25 days to make this trip. In other words, for every year we gain one-fourth of a day and every for years we gain an extra day. If nothing was done about this, our calendar would move backwards one full day every four years in relation to our seasons. November 29 is National Sinky Day; a day to eat over one's sink and worship it. Public typists work at typewriters charging about 14 cents per page. On a good day, a public typist earns about $3.50. On average, there are 333 squares of toilet paper on a roll. Halloween isn't an established holiday by law. It is traditional that Halloween is Oct. 31 no matter what day of the week it falls on. Halloween dates from 837 when Pope Gregory IV instituted All Saints or All Hallows Day on Nov. 1 to take the place of an earlier festival known as the Peace of the Martyrs. The day was set aside to honor all saints, known and unknown. Halloween then is a shortened form of All Hallows Eve - the evening before All Hallows Day. Certainly, you have a choice of celebrating it on Oct. 30, Saturday, if you wish. Many of the area parties will be held then rather than on Sunday. It's probably appropriate to say some people equate Halloween with the occult or Satanism and don't approve of it at all. The numbers on opposite sides of a die always add up to 7. In 1979, Namco released Pac-Man, the most popular arcade game of all time. Over 300,000 units were sold worldwide. More than 100,000 units are sold in the United States alone. Originally named Puck Man, the game was retitled after executives saw the potential for vandals to scratch out part of the letter P on the game's marquee, which might discourage parents from letting their children play. Pac-Man became the first video game to be popular with both males and females. Elizabeth Goose, who lived in Massachusetts in the late 1600's, is credited by some with the nursery rhymes read to us as children. However, most of those rhymes existed before her time in the form of satirical poems and drinking songs. Some were based on actual events or characters. Charles Perrault, a Frenchman, published a collection of these rhymes in 1697 and an illustration accompanying the text showed an old woman telling stories, with the words "Mother Goose" appearing behind her. The book was eventually published in England and the United States and more rhymes were added with each new publication. It wasn't until the 1800's that a relative of Mrs. Goose claimed the stories originated with Elizabeth. If you were born in Los Alamos, New Mexico during the Manhattan project (where they made the atomic bomb), your birth place is listed as a post office box in Albuquerque. The St. Louis Gateway Arch had a projected death toll while it was being built. No one died. The Hoover Dam was built to last 2,000 years. The concrete in it will not even be fully cured for another 500 years. The "Calabash" pipe, most often associated with Sherlock Holmes, was not used by him until William Gillette (an American) portrayed Holmes on stage. Gillette needed a pipe he could keep in his mouth while he spoke his lines. The Chinese national anthem is called "the march of volunteers." "The Tale of Genji", a Japanese work from the early eleventh century, is considered by many scholars to be the world's first full novel. The novel was written by a woman: Murasaki Shikibu, or Lady Murasaki. The reason wheels seem to spin backwards on a camera is because when you film something, you are really taking a series of still images and then replaying them so fast that the eye is fooled into thinking it is a continuous stream of images. The eye can see about 12-14 frames per second. Because of a physical law called the Nyquist Sampling Theorem you need to display frames twice as fast as the eye can see to fool it into seeing it as a continuous movie (Nyquist showed mathematically why that is true). So, imagine you have a wheel that is spinning exactly once every second. If you took a picture at the same rate, it would look like it is standing still. That's because it rotates exactly once every time you take a picture. Now take a picture just a little bit faster than 1 per second. Now every time you take a picture, the wheel has not quite made it all the way around; maybe it will have gone 350 degrees around, so it's 10 degrees behind the first frame. The next frame it will have gone another 350 degrees, making it now 20 degrees behind the first frame, and so on. When you play the film back, it will look like the wheel is moving backwards, even though you know it was going forwards. The opposite effect happens when you take pictures a bit slower than the rotation rate. It gets more complicated when the wheel does not rotate at a constant rate, like when a car accelerates. The next time you watch TV or go to the movies, watch the wheels as a car speeds up. You might see the wheel appear to go backwards, them stop, then go forwards, all while the car is moving forwards. The glue on Israeli postage stamps is certified kosher. If you have three quarters, four dimes, and four pennies, you have $1.19. You also have the largest amount of money in coins without being able to make change for a dollar. In the UPC, the lines≠the Universal Product Code≠hold 11 numbers, each of which is a code that describes the product. The size, weight, and manufacturer or distributor, for example, are each represented by a number. The numbers are in the form that computers can read, 0's (black lines) and 1's (white lines). The San Francisco Cable cars are the only mobile National Monuments. Eskimos never gamble. 20252 is Smokey the Bear's own zip code. 203 million dollars is spent on barbed wire each year in the U.S. The external tank on the space shuttle is not painted. If you had enough water to fill one million goldfish bowls, you could fill an entire stadium. Zip code 12345 is assigned to General Electric in Schenectady, NY. Success magazine recently declared bankruptcy. The average ice berg weighs 20,000,000 tons. The first crossword puzzle appeared in 1913 in an American paper called "World." It was devised by its editor Arthur Wynne. It was of 32 words and diamond shaped. There were no black boxes in the puzzle. Some 30,000,000 Americans slave over crosswords in newspaper, journals, and paperback books. The hardest crossword puzzles according to experts appear in two British papers: "The London Times" and "Observer." Only few readers can complete these and it takes them 2 to 3 hours. The record time for completing a "Times" puzzle was an incredible 3 minutes and 45 seconds by a British diplomat named Roy Dean in 1970. The largest crossword puzzle ever published had 2631 clues across and 2922 clues down. It took up 16 sq. feet of space. The strangest crossword ever made was by a British writer Max Beerbohm in 1940. He called it the "Impossible Crossword" and issued warning to puzzlers so they do not go crazy trying to solve it, as the clues were nonsensical and the answers didn't exist. George Washington is the only man whose birthday is a legal holiday in every state of the U.S as of a few years ago. acetwothreefourfivesixseveneightninetenjackqueenking Excluding the joker, if you add up the letters in all the names of the cards in the deck (Ace, two, three, four,...,king). the total number of letters is 52, the same as the number of cards in the deck. Did you play with LEGO blocks when you were a kid? Since 1949, the LEGO company, based in Denmark, has produced more than 200,000,000,000 of the plastic elements that make up the Lego System. There are 102,981,500 ways to combine six of the 8-studed bricks of one color. The name LEGO did not come from the cry of an angry mother who couldn't get her kid to put down his toys and come to dinner: "LEGO of those bricks or I'll kill you!" It's from the Danish, "LEg GOdt," which means "play well." The Statue of Liberty's mouth is 3 feet wide. The father of the Pink Flamingo (the plastic lawn ornament) is Don Featherstone of Massachusetts. Featherstone graduated from art school and went to work as a designer for Union Products, a Leominster, Mass., company that manufactures flat plastic lawn ornaments. He designed the pink flamingo in 1957 as a follow up project to his plastic duck. Today, Featherstone is president and part owner of the company that sells an average of 250,000 to 500,000 plastic pink flamingos a year."I did it to keep from starving." - Don Featherstone (flamingo creator) If China imported just 10% of it's rice needs- the price on the world market would increase by 80%. Cleveland spelled backwards is "DNA level C". When wearing a Kimono, Japanese women wear socks called "Tabi". The big toe of the sock is separated from the rest of the toes, like a thumb from a mitten. The names of the two stone lions in front of the New York Public Library are Patience and Fortitude. They were named by then-mayor Fiorello LaGuardia. How valuable is the penny you found laying on the ground? If it takes just a second to pick it up, a person could make $36.00 per hour just picking up pennies. Carnegie Mellon University offers bag piping as a major. The instructor James McIntosh, who is a member of the Most Excellent Order of the British Empire, and who began bag piping at the age 11. The book of Esther in the Bible is the only book which does not mention the name of God. The Douglas DC-3 passenger airplane was the first to make a profit carrying people. There are 52 cards in a standard deck and there are 52 weeks in a year. There are 4 suits in a deck of cards and 4 seasons in a year. If you add the values of all the cards in a deck (jack=11 queen=12, etc.) you get a total of 365 the same as the number of days in a year. The roar that we hear when we place a seashell next to our ear is not the ocean, but rather the sound of blood surging through the veins in the ear. Any cup-shaped object placed over the ear produces the same effect. In 1982, the last member of a group of people who believed the Earth was hollow died. A man named John Bellavia has entered over 5000 contests, and has never won a thing. The famous painting of "Whistler's Mother" was once bought from a pawn shop. Revolvers cannot be silenced because of all the noisy gasses which escape the cylinder gap at the rear of the barrel. In 1961, Henry Matisse's painting Le Bateau hung upside down in New York's Museum of Modern Art. It remained upside down for forty-one days until someone noticed. It's estimated nearly 116,000 people passed in front of the painting before the error was noted. The number 4 is the only number that has the same number of letters in its name as its meaning. A standard 747 Jumbo Jet has 420 seats. According to Dennis Changon, spokesman for the International Civil Aviation Organization in Montreal, Canada - if all of the commercial planes in the world were grounded at the same time there wouldn't be space to park them all at gates. If you lace your shoes from the inside to the outside the fit will be snugger around your big toe. In 1931, an industrialist named Robert Ilg built a half-size replica of the Leaning Tower of Pisa outside Chicago and lived in it for several years. The tower is still there. The first manager of the Seattle Space Needle, Hoge Sullivan, was acrophobic - fearful of heights. The 605 foot tall Space Needle is fastened to its foundation with 72 bolts, each 30 feet long. The Space Needle sways approximately 1 inch for every 10 mph of wind. It was built to withstand a wind velocity of 200 miles-per-hour. The first revolving restaurant, The Top of the Needle, was located at the 500-foot level of the 605-foot-high steel-and-glass tower at the Century 21 Exposition in Seattle, Washington. It contained 260 seats and revolved 360 degrees in an hour. The state-of-the-art restaurant was dedicated on May 22, 1961. The foundations of the great European cathedrals go down as far as forty or fifty feet. In some instances, they form a mass of stone as great as that of the visible building above the ground. Police dogs are trained to react to commands in a foreign language; commonly German but more recently Hungarian. The roads on the island of Guam are made with coral. Guam has no sand. The sand on the beaches is actually ground coral. When concrete is mixed, the coral sand is used instead of importing regular sand from thousands of miles away. The Holland and Lincoln Tunnels under the Hudson River connecting New Jersey and New York are an engineering feat. The air circulators in the tunnels circulate fresh air completely every ninety seconds. The official soft drink of the state of Nebraska - Kool-Aid. Ivory Soap was originally named P&G White Soap. In 1879, Harley Proctor found the new name during a reading in church of the 45th Psalm of the Bible: "All thy garments smell of myrrh, and aloes, and cassia, out of ivory palaces, whereby they have made thee glad." Studebaker still exists, but is now called Worthington. 7.5 million toothpicks can be created from a cord of wood. A McDonald's straw will hold 7.7ml, or just over one-and-a-half teaspoons of whatever you are drinking. This means that it would take 17,000 strawfuls of water to fill up a 34 gallon bathtub. The original IBM punch-card is the same size as a Civil War era dollar bill. BAND-AID Brand Adhesive Bandages first appeared on the market in 1921, however, the little red string that is used to open the package did not get added until 1940. Jane Barbie was the woman who did the voice recordings for the Bell System. Month after month, the little Bell Company lived from hand to mouth. No salaries were paid in full. Often, for weeks, they were not paid at all. In Watson's notebook there are such entries during this period as "Lent Bell fifty cents," "Lent Hubbard twenty cents," "Bought one bottle beer≠too bad can't have beer every day." When Bell's patent was sixteen months old, there were 778 telephones in use. The first "Hello" badge used to identify guests and hosts at conventions, parties, etc. was traced back to September 1880. It was on that date that the first Telephone Operators Convention was held at Niagara Falls and the "Hello" badge was created for that event. During the depths of the Depression, telephones in use fell from 16 to 13 per 100 population and by the late 1970's the number had surpassed 75 per 100 population. Western Electric mass-produced color telephones for the first time in 1954. In Japan, Western Electric first sold equipment in 1890, then in 1899 helped form the Nippon Electric Company (NEC). This was Japan's first joint venture with an American firm. Northern Telecom, Alcatel N.V. and NEC all had roots in Western Electric. The use of telephone answering machines became popular in 1974. In the first month of the Bell Telephone Company's existence in 1877, only six telephones were sold. In 1953, Sony Corporation obtained a transistor license from Western Electric Co. that led to its development of the world's first commercially successful transistor radio. In the early days of the telephone, operators would pick up a call and use the phrase, "Well, are you there?". It wasn't until 1895 that someone suggested answering the phone with the phrase "number please?" Sometimes, early telephone operators would get to know their customers so well, the customers would ask for a reminder call when it was time to remove a cake from the oven, leave the phone off the hook near their sleeping child when they left the house, hoping the operator would hear any cries of distress, request a wake up call before taking a long nap. Just like today's computers, early telephones were very confusing to new users. Some became so frustrated with the new technology, they attacked the phone with an ax or ripped it out of the wall. In the early 1880's some well-to-do telephone owners started the unusual trend of paying to have a theatre employee hold a telephone receiver backstage, transmitting live plays and operas into their living rooms. The first transatlantic wedding took place on December 2, 1933.The groom was in Michigan. The bride, in Sweden. The ceremony took seven minutes and cost $47.50. In the Catholic church, St. Gabriel, an archangel, is the patron saint of telecommunications. The famous emergency hotline, whereby the President could have immediate contact with the Kremlin wasn't established until 1984. Prior to 1984, the only direct contact to the Kremlin was a cumbersome teleprinter link, supplying text messages that then had to be translated, responses drafted and sent back. During President Lyndon Johnson's term, many people mis-dialed the White House number and instead reached the home of a New York housewife. Rose Brown had a near identical phone number. He wrote and thanked her for her diplomacy in receiving his highly sensitive calls and promised to return the favor when her friends and family accidentally dialed the White House. A gator in the road is a huge piece of tire from a blow out on a truck, called a gator because the fly up when a truck runs one over and take out your air lines causing you to lose air and forcing your spring brakes to come on which causes a rather abrupt stop. In 1997 a Menorah was built in Latrun, near the main Jerusalem-Tel Aviv highway. It was more than 60-feet tall, weighed 17 metric tons, and took up an area of 600-square meters. A rabbi was lifted in a crane each night of the holiday to light the candles on the menorah, which was made of metal pipes. Before settling on the name of Tiny Tim for his character in "A Christmas Carol", three other alliterative names were considered by Charles Dickens. They were: Little Larry, Puny Pete and Small Sam. Kwanzaa has seven basic symbols, which represent values and concepts reflective of African culture. - Mazao: Fruits, Nuts, and Vegetables - Mkeka: Place Mat - Vibunzi: Ear of Corn - Mishumaa Saba: The Seven Candles - Kinara: The Candleholder - Kikombe Cha Umoja: The Unity Cup - Zawadi: Gifts Rudolph, the Red-Nosed Reindeer was conceived by author Robert May in 1939. Two other names he thought of before deciding on Rudolph were Reginald and Rollo. Electric Christmas tree lights were first used in 1895. The idea for using electric Christmas lights came from an American, Ralph E. Morris. The new lights proved safer than the traditional candles. The name of the dog on the Cracker Jack box is Bingo. According to Scientific American magazine: if you live in the northern hemisphere, odds are that every time you fill your lungs with air at least one molecule of that air once passed thru Socrates lungs. It is believed that Shakespeare was 46 around the time that the King James Version of the Bible was written. In Psalms 46, the 46th word from the first word is shake and the 46th word from the last word is spear. The U.S. Library of Congress has compiled a 232-source bibliography on the subject of when, properly speaking, centuries roll over. Almost all of the sources agree that the twentieth century will not end until December 31, 2000. The Times Square "time ball" is named the "Star of Hope". It was specially made for this year and contains 504 glass crystals cut into triangles, 600 light bulbs, 96 big lights, and 92 mirrors. The official time ball for the U.S. is on top of the U.S. naval Observatory in Washington, DC As early as 1845, the U.S. Navy dropped a time ball every noon from atop a building on a hill overlooking Washington, DC. People from many miles could set their watches at noon. Ships anchored in the Potomac River could check their chronometers. Left-handed people are statistically more likely to be geniuses, and to be insane. Left-handedness is more common among writers and some kinds of artists. But lefties tend to be more accident-prone and on average don't live as long. Did you know that Beetle from the comic strip 'Beetle Bailey' and Lois from the comic strip 'Hi and Lois' are brother and sister? The newspaper serving Frostbite Falls, Minnesota, the home of Rocky and Bullwinkle, is the Picayune Intellegence. The earliest recorded case of a man giving up smoking was on April 5, 1679, when Johan Katsu, Sheriff of Turku, Finland, wrote in his diary "I quit smoking tobacco." He died one month later. A lead pencil is good for about 50,000 words. 1960 was the last model year for Edsel and Desoto. Woodbury Soap was the first product to show a nude woman in its advertisements. The year - 1936. The photo, by Edward Steichen, showed a rear full-length view of a woman sunbathing - wearing only sandals. London's Millennium Dome, the largest of its kind in the world, is over one kilometer in circumference and covers over 80,000 square meters. The Dome is supported by 43 miles of high-strength cable which holds up 100,000 square meters of fabric. The translucent roof is 50 meters high at the center and strong enough to support a jumbo jet. The Dome could contain two Wembley Stadiums or the Eiffel Tower on its side. You could even fit the Great Pyramid of Giza inside it. St. Stephen is the patron saint of bricklayers. It's rumored that sucking on a copper penny will cause a breathalyzer to read 0. According to suicide statistics, Monday is the favored day for self-destruction. The car-making Dodge brothers Horace and John were Jewish, that's why the first Dodge emblem had a star of David in it. Studebaker was the only major car company to stop manufacturing cars while making a profit on them. The issue of leap year and the weirdness of February is always worth looking at because, coming so infrequently, who can remember the explanation for it from the last time? The earth revolves around the sun every 365.24 days, not an even 365. That produces an extra day's worth of hours every four years. We could distribute them as a bonus to everyone: a one-day time-out every fourth year in which the clock is stopped and we stay in bed all day. But we don't. Instead we add an extra day onto February. Why February? It was originally the last month on the Roman calendar and a logical place to stick the extra day. But Julius Caesar changed the first month to January, stranding February and its little peculiarity in the second spot. The first person selected as the Time Magazine Man of the Year - Charles Lindbergh in 1927. Kate "God Bless America" Smith sold more U.S. war bonds than anyone else during World War II. She sold $600 million worth. The Nike "swoosh" logo was designed by University of Oregon student Carolyn Davidson in 1964, four years after business undergraduate Phil Knight and track coach Bill Bowerman founded the company they originally called Blue Ribbon Sports. Ms. Davidson was paid $35 dollars for her design. If you need to dial the telephone and your dial is disabled, you can tap the button in the cradle. If, for example, you need to dial 911, you can tap the button 9 times, then pause, then tap once, then again. Turning a clock's hands counterclockwise while setting it is not necessarily harmful. It is only damaging when the timepiece contains a chiming mechanism. On June 10, 1958, a tornado was crashing through El Dorado, Kansas. The storm pulled a woman out of her house and carried her sixty feet away. She landed, relatively unharmed, next to a phonograph record titled "Stormy Weather." Astronauts are not allowed to eat beans before they go into space because passing wind in a spacesuit damages them. The height and width of modern American battleships was originally determined by insuring they had to be able to go beneath the Brooklyn Bridge and through the Panama Canal. Nobody knows where the body of Voltaire is. It was stolen in the nineteenth century and has never been recovered. The theft was discovered in 1864, when the tomb was opened and found empty. Owing to a faulty cornerstone, the church of St. John in Barmouth, Wales, crashed in ruins a minute after it was finished. It was rebuilt, and the new edifice has endured to the present day. A car operates at maximum economy, gas-wise, at speeds between 25 and 35 miles per hour. A car that shifts manually gets 2 miles more per gallon of gas than a car with automatic shift. A car uses 1.6 ounces of gas idling for one minute. Half an ounce is used to start the average automobile. Many of us feel that we have at least one book in us. But the business of publishing and the process of creating and selling a book can be forbidding. In New York City, America's publishing capital, things have gotten so hectic that some agents are seeing several editors over the course of one lunch. The Lord's Prayer appears twice in the Bible, in Matthew VI and Luke XI. The Luxor Hotel (shaped like an Egyptian Pyramid) is 36 stories tall, required more than 150,000 cubic yards of concrete, six thousand construction workers and 18 months to build. It takes a specially designed window washing device 64 hours to clean the sides of the pyramid, which is covered by 13 acres of glass. The Luxor atrium is the world's largest and could comfortably hold nine Boeing 747 airplanes. To prevent some numbers from occurring more frequently than others, dice used in crap games in Las Vegas are manufactured to a tolerance of 0.0002 inches, less than 1/17 the thickness of a human hair. A 41-gun salute is the traditional salute to a royal birth in Great Britain. At the height of the teddy bear's huge popularity in the early 1900s, there is record of one Michigan priest who publicly denounced the teddy as an insidious weapon. He claimed that the stuffed toy would lead to the destruction of the instincts of motherhood and eventual racial suicide. Beatrix Potter created the first of her legendary "Peter Rabbit" children's stories in 1902. The Sarah Winchester house, in San Jose, CA, is a truly bizarre piece of architecture. Mrs. Winchester, after losing first a daughter and then her husband to disease, consulted a medium to find the reason for her terrible luck. The medium advised her that there was a curse on her family, brought about by her husband's manufacturing of rifles when he was alive. To escape the curse, the medium advised, she should move West and build, and perhaps would live forever. Mrs. Winchester did just that, using the fortune she had inherited to buy a house and just keep building≠adding on room after room for 36 years. Each room had 13 windows (the number was considered spiritual rather than unlucky) and many of the windows contained precious jewels. Other odd features of the house≠intended to confuse evil spirits≠included a staircase that went straight to a ceiling, doors that open onto two-story drops, a room with a glass floor, and a room without windows that - once entered - a person cannot leave without a key. The house contains 160 rooms, 2000 doors, and 10,000 windows, some of which open onto blank walls. There are also secret passageways. If an object has no molecules, the concept of temperature is meaningless. That's why it's technically incorrect to speak of the "cold of outer space" - space has no temperature, and is known as a "temperature sink," meaning it drains heat out of things. The gesture of a nose tap, in Britain, means secrecy or confidentiality. In Italy, a tap to the nose signifies a friendly warning. In 1981 a guy had a heart attack after playing the game BERSERK - video gaming's only known fatality. Mario, of Super Mario Bros. fame, appeared in the 1981 arcade game, Donkey Kong. His original name was Jumpman, but was changed to Mario to honor the Nintendo of America's landlord, Mario Segali. Alcoholics are twice as likely to confess a drinking problem to a computer than to a doctor, say researchers in Wisconsin. In the game Monopoly, the most money you can lose in one travel around the board (normal game rules, going to jail only once) is $26,040. The most money you can lose in one turn is $5070. The Grand Coulee Dam in the state of Washington in the U.S., completed in 1942, was hailed in its time as a structure more massive than the Great Pyramid of Cheops. The United States government keeps its supply of silver at the U.S. Military Academy at West Point, New York. A 17th-century Swedish philologist claimed that in the Garden of Eden God spoke Swedish, Adam spoke Danish, and the serpent spoke French. The Metro subway of Washington, DC, has several really deep stations. Its Forrest Glen station - in the Maryland suburbs - is 196 feet deep and has the longest subway escalator in the Western Hemisphere. But MOST of the subway stations in Leningrad are deeper than that. Out of all of the postage stamps in the United States with people's faces on them, there is not one that has the picture of someone alive. "Fine turkey" and "honeycomb" are terms used for different qualities and textures of sponges. In order to sell his sets of Shakespeare door-to-door, David McConnell offered free perfume to his customers. He realized the perfume was more popular and began selling cosmetics door-to-door. This began the company that grew into Avon. Some china is called "bone" china because some powdered animal bone is mixed in with the clay used to make this china: it gives the china a special kind of strength, whiteness, and translucency. Russians are buying skateboards from the U.S. - but not for recreational purposes. They see them as an answer to some of the country's transportation needs, because the boards are less expensive than bicycles and require little storage space. The first boards went to school instructors so they could train pupils how to ride them. The "black box" that houses an airplane's voice recorder is orange so it can be more easily detected amid the debris of a plane crash. The Colgate Company started out making starch, soap, and candles. In 1881, Procter & Gamble's Harley Procter decided that adding the word pure to his Ivory soap would give its sales a necessary shot in the arm. Analysis proved that Ivory was almost 100% pure fatty acids and alkali, the stuff that most soap is made of. Ivory's impurities were limited to 0.56%≠0.11% uncombined alkali, 0.28% carbonates, and 0.17% mineral matter. Harley marked his soap 99 and 44/100% pure, deciding that using the exact number sounded more credible than rounding up to 100%. Since most people are right-handed, the holes on men's clothes have buttons on the right - to make it easier for men to push them through the holes. Well, that's easy, but aren't women mostly right-handed too? Women's buttons are on the OPPOSITE side so their maids can dress them. When buttons were first used, they were expensive and only wealthy women had them. Since a maid faces the woman she is dressing, having the buttons on the left of the dress places them on the maid's right. Each of the suits on a deck of cards represents the four major pillars of the economy in the middle ages: heart represented the Church, spades represented the military, clubs represented agriculture, and diamonds represented the merchant class. The 3rd year of marriage is called the leather anniversary. World Tourist day is observed on September 27. Street Boulevard in Joplin, Missouri was named for Gabby Street, the manager of the St. Louis Cardinals in the early 1930's. Liberace Museum has a mirror-plated Rolls Royce; jewel-encrusted capes, and the largest rhinestone in the world, weighing 59 pounds and almost a foot in diameter. Mary Stuart became Queen of Scotland when she was only six days old. Every queen named Jane has either been murdered, imprisoned, gone mad, died young, or been dethroned. Four of the first six presidents of the U.S. were 57 years old when they were inaugurated. No other presidents have been inaugurated at that age. Shampoo was first marketed in the USA in 1930 by John Breck, who was the captain of a volunteer fire department. Vellum, a fine-quality writing parchment, is prepared from animal skin: lambs, kids, and very young calves. Coarser, tougher types are made from the skins of male goats, wolves, and older calves. Vellum replaced papyrus and was superseded by paper. Catherine de Medici was the first woman in Europe to use tobacco. She took it in a mixture of snuff. Historians claim that the first valentine was a poem sent in 1415 by Charles, Duke of Orleans, to his wife. He was imprisoned in the Tower of London at the time. In the United States, Miss Esther Howland is given credit for sending the first valentine's cards. Commercial valentines were introduced in the 1800's and now the date is very commercialized. The town of Loveland, Colorado, does a large post office business around February 14. In 1969 the Navy spent $375,000 on an "aerodynamic analysis of the self-suspended flare." The study's conclusion was that the Frisbee was not feasible as military hardware. In 1970, "MCI" stood for "Microwave Communications, Inc." No longer used as an acronym, it now stands alone. The orange things that crossing guards, construction and high way workers, etc. wear is called a retroreflective vest, or "International Orange". Roger Wrenn was the photographer who took the famous picture of General Douglas MacArthur wading ashore in the Philippines in October 1944. If a person counted at the rate of 100 numbers a minute and kept counting for eight hours a day, five days a week, it would take a little over 4 weeks to count to one million and just over 80 years to reach a billion. February is Black History Month. WHAT CAN TELL ABOUT AN INTERSTATE HIGHWAY FROM ITS NUMBER? If it's an odd-number, it's a north-south route. Even-numbered Interstates run east-west. A three-digit number beginning with an even-number is a beltway while a three-digit number beginning with an odd-number is a bypass or spur. Some people think that the stage musical Les Miserables runs a bit long, but it's a mere flash in time compared with one of the sentences in the novel on which it is based. Supposedly to make it easy to read, that 3-page, 823-word sentence is divided by 93 commas, 51 semicolons and 4 dashes. By raising your legs slowly and laying on your back, you can't sink in quicksand. There are no clocks in Las Vegas gambling casinos. The numbers '172' can be found on the back of the U.S. $5 dollar bill in the bushes at the base of the Lincoln Memorial. The name Wendy was made up for the book Peter Pan, there was never a recorded Wendy before. Flying from London to New York by Concord, due to the time zones crossed, you can arrive 2 hours before you leave. "Put your hand on a hot stove for a minute, and it seems like an hour. Sit with a pretty girl for an hour, and it seems like a minute. THAT'S relativity." -Albert Einstein (That one's for who the page is dedicated to...) It would take 11 Empire State Buildings, stacked one on top of the other, to measure the Gulf of Mexico at its deepest point. Nearly a quarter of all U.S. pet owners bring their pet on the job. Last June, 200 American companies participated in the first ever "Take Your Dog to Work Day". Nobody knows who built the Taj Mahal. The names of the architects, masons, and designers that have come down to us have all proved to be latter-day inventions, and there is no evidence to indicate who the real creators were. The Las Vegas MGM Grand's 170,000-square-foot casino is larger than the playing field at Yankee Stadium. It contains more than 3,000 gaming machines. Buckingham Palace consists of 600 rooms. Roman statues were made with detachable heads, so that one head could be removed and replaced by another. Salt helped build the Erie Canal. A tax of 12 1/2 percent on New York State salt, plus tolls charged for salt shipments, paid for nearly half of the $7 million construction cost. Superman dates back to June 1938, when he appeared in Action Comics No. 1. Batman arrived on the scene one year later in Detective Comics No. 27, appearing May 1939. There is a house in Rockport, Massachusetts, built entirely of newspaper. The Paper House at Pigeon Cove, as it is called, is made of 215 thicknesses of newspaper. According to a 1995 survey, 7 out of 10 British dogs get Christmas gifts from their doting owners. The first drive-in service station in the United States was opened by Gulf Oil Company - on December 1, 1913, in Pittsburgh, Pennsylvania. The Pentagon building in Arlington, Virginia, has nearly 68,000 miles of telephone lines. The Cairo Opera House was destroyed by fire in 1970. The Cairo fire station was located inside the same building. The Pentagon is twice the size of the Merchandise Mart in Chicago, and has three times the floor space of the Empire State Building in New York. It is one of the world's largest office buildings. The Curly Redwood Lodge is one of northern Californiaís most unique lodges. It was built from one curly redwood tree that produced 57,000 board feet of lumber. The tree - cut down in 1952 - was 18 feet 2 inches at the trunk. Curly redwood is unique because of the curly grain of the wood, unlike typical straight grained redwood. At age ninety, Peter Mustafic of Botovo, Yugoslavia, suddenly began speaking again after a silence of 40 years. The Yugoslavian news agency quoted him as saying, "I just didn't want to do military service, so I stopped speaking in 1920; then I got used to it." A "hairbreadth away" is 1/48 of an inch. Ever wonder where the term "Work Smarter...Not Harder" originated? Allan F. Mogensen, the creator of Work Simplification, coined the phrase in the 1930s. The 1990s equivalent term is probably Business Process Reengineering. On dry, windy days, pollen can travel up to 500 miles. Built in only 16 months between 1941 and 1942, the Pentagon is only 71ft tall, yet it has 5 floors, 17.5 miles of corridors, 150 stairways, 280 restrooms, 685 drinking fountains, 7,748 windows and workers replace more than 250 lightbulbs each day. Because of its size, the Pentagon operates much like a small city; it has it's own shopping mall, bank, power plant, water and sewage facilities, fire station, police force, fast food restaurants and a "mayor". At its peak in 1943, the Pentagon had a working population of about 33,000. Today about 23,000 employees work in the building. The Procrastinators Club of America sends news to its members under the masthead "Last Month's Newsletter." The National Lighter Museum in Guthrie, Oklahoma has nearly 20,000 pieces, representing over 85,000 years of lighters and fire starters. The only museum of its kind in the world, it is dedicated to collecting and preserving the history of the evolution of lighters. Shakespeare's volume, Sonnets, contains 154 sonnets. Sonnets 1-126 are addressed to a male friend and sonnets 127-152 are addressed to a mysterious woman. Sonnets 153 and 154 fit in neither category. The U.S standard railroad gauge (distance between rails) is 4 feet, 8.5 inches. The U.S. Library of Congress has compiled a 232-source bibliography on the subject of when, properly speaking, centuries roll over. Almost all of the sources agree that the twentieth century does not end until December 31, 2000. There are 6,272,640 square inches in an acre. There are 63,360 inches in a mile. There are more than 200 different types of Barbie Dolls. A man irate about his income tax paid Uncle Sam with a plaster of Paris check that weighed several pounds. He wasn't all that bright, because once the government cashed the check, it was returned to him and he had to keep it for five years for his records. Two objects have struck the earth with enough force to destroy a whole city. Each object, one in 1908 and again in 1947, struck regions of Siberia. Not one human being was hurt either time. Hallmark makes cards for 105 different relationships. If the Earth was smooth, the ocean would cover the entire surface to a depth of 12,000 feet. Little known, and even less appreciated, the United States actually has a mothers-in-law day. Young priests of the island of Leukas, Greece, to qualify for service at the temple of Apollo, were required in ancient Greece to don the wings of an eagle and plunge from Cape Dukato into the sea, a dive of 230 feet. It was assumed that the gods would eliminate those unfit, but no diver was ever injured, although the ordeal was performed for centuries. The blueprints for the Eiffel Tower covered more than 14,000 square feet of drafting paper. Elwood Edwards' voice is heard more than 27 million times a day (which comes to more than 18,000 times per minute). Edwards is the man behind those special 3 words (not "I love you") "You've got mail!". Back in 1989, Edwards' wife, Karen, was working in customer service for a little-known outfit in Vienna, Virginia called Quantum Computer Services. Quantum had an online service called Q-Link. Karen overheard the company's CEO, a young guy by the name of Steve Case, describe how he wanted to add a voice to its user interface. Her advice: "I said, 'Hey, you ought to try Elwood.'" Her husband had spent his entire career in local radio and TV. Edwards agreed to record four simple phrases on a run-of-the-mill cassette player: "Welcome!"; "File's done"; "Goodbye"; and, of course, "You've got mail!". Quantum changed its name to AOL and Edwards's voice debuted on AOL 1.0 in October 1989. When the Titanic sank in 1912, hundreds of passengers were saved only because a Marconi wireless operator, David Sarnoff, reportedly picked up the ship's radio distress messages and alerted ships in the area. Sarnoff went on to become president of the first radio network, the National Broadcasting Company. Pudden'head Wilson, the title character in Twain's novel about switched babies, is regarded by the townspeople as a fool because of his hobby of collecting finger impressions on glass. His strange pasttime, however, leads to his identification of a murderer and his revelation of an incident where two babies, one the son of a slave and one the son of a slaveholder, were switched. It would take more than 150 years to drive a car to the sun. In the 40's, the Bich pen was changed to Bic for fear that Americans would pronounce it 'Bitch.' Snoopy stood on two legs for the first time in a 1958 strip. Snoopy and Charlie Brown appeared together on the March 17th, 1967 cover of Life Magazine. The Apollo X astronauts took the duo into space in 1969. Charlie Brown hits a game-winning home run on March 30, his first in 43 years. Unfortunately - he NEVER got to kick the football. Charles Schulz was born November 26, 1922, to Carl and Dena Schulz of St. Paul, Minnesota. Within a week, however, Charles became known as "Sparky," christened by an uncle with a soft spot for Barney Google's horse "Sparkplug." Schulz never lost his nickname, proof of a life devoted to comics. Schulz died Saturday February 12th, 2000 - shortly after completing work on what was scheduled to be the last Sunday PEANUTS strip. Ghosts appear in 4 Shakespearian plays; Julius Caesar, Richard III, Hamlet and Macbeth. If you took a standard slinky and stretched it out it would measure 87 feet. Rebecca Elizabeth Marier was the first woman to graduate "top of the class" at West Point, the U.S. Military Academy. The rankings are based on academic, military, and physical accomplishments. Jean Marie Butler was the first woman graduate from the United States Coast Guard Academy in 1980. She also was the first woman to graduate from any U.S. service academy. Huckleberry Finn's remedy for warts was swinging a dead cat in a graveyard at midnight. Three teaspoons make up one tablespoon. Daisy is the name of Dagwood Bumstead's dog. Dr. Jekyll's first name is Henry. Camera shutter speed "B" stands for bulb. The color black moves first in checkers. Mario Puzo wrote "The Godfather." The first American in space was Alan B. Shepard Jr. IBM's motto is "Think." Mr. Boddy is the murder victim in the game "Clue." There are 225 spaces on a Scrabble board. Aladdin's nationality was Chinese. Sherlock Holmes archenemy was Professor Moriarty. Superman's boyhood home was Smallville, Illinois. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8408 From: savanted1© Date: Fri Apr 2, 2004 1:15pm Subject: Re: FAE Explosives Dear, Group Members As far as I know fuel air explosives have to be confined to a container to have the mixture enclosed so I thin that this type of scenario would not be plausible. I did not however read the initial information and was basing my opinions on the comments presented on the daily digest. I am an ordnance man with ten years of experience in both air-layed and hand held weaponry. If I am not mistaken the F.A.E. bomb are composed of a gel agent that expands when exposed to the air. I do believe that the actual percentage of gel mixture in the container is 75% gel and 25% air inside the container the 25% is for expansion. The gel can be viewed through a viewing window which is 3 degrees right from the aft lug that is used to load the weapon. Very Respectfully Garrett Hord AO1 (AW/NAC) USN ret. Savanted1© Mr. Garrett Hord Innovations At The Speed Of A ThoughtÆ You Cannot Do Today's Work With Yesterday's SkillsÆ --------------------------------- Do you Yahoo!? Yahoo! Small Business $15K Web Design Giveaway - Enter today [Non-text portions of this message have been removed] 8409 From: Date: Thu Apr 1, 2004 6:05am Subject: New Member here Hello members I am Roger Holloway located in North Texas. Please take a look at my site to learn more on my services. If I can be of help please fell free to contact me. Cordially, Roger Roger Holloway TPLI PO Box 851 Iowa Park, TX 76367 940-592-7000 www.TexasDetective.com TX License # A10709 Member: TPSA, TALI, IPSA, ION, NNA, NSA, NAPPS, USPSA, NRRN "CONFIDENTIALITY WARNING": This electronic message contains Information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. Be aware that any disclosure, copying, distribution, or use of the content of this message / information is prohibited. If you received this message in error please contact us right away. Please be advised any advice or opinions should not be considered legal advice I am not an Attorney. [Non-text portions of this message have been removed] 8410 From: James M. Atkinson Date: Sat Apr 3, 2004 10:48am Subject: The Spy Who Blew the Whistle http://www.worldpress.org/Americas/1831.cfm From the April 2004 issue of World Press Review (VOL. 51, No. 4) WMD Intelligence Tested The Spy Who Blew the Whistle Ewen MacAskill, Richard Norton-Taylor, and Julian Borger, The Guardian (liberal), London, England, Feb. 26, 2004 Katharine Gun, a former British intelligence officer, walked free from the Old Bailey yesterday [Feb. 25] and rekindled the debate over the war in Iraq. Her arrest for disclosing an unethical-and potentially illegal-U.S.-British bugging operation against friendly countries raises new questions about the events running up to the Iraq war, the behavior of the intelligence services, and the validity of the legal advice given by the attorney general, Lord Goldsmith, to the government. Gun's appearance in the Old Bailey had its origin in New York more than a year ago. In the final fortnight before war in Iraq, six members of the U.N. Security Council-Angola, Cameroon, Guinea, Pakistan, Mexico, and Chile-found themselves caught up in a swirl of U.S.-British diplomacy. The British government desperately wanted them to swing behind a resolution on Iraq. But the six were proving difficult to persuade, and the U.S. and British governments urgently wanted any snippets about their likely voting intentions. The U.S. government opted for underhand methods and asked the British government-and its intelligence services, including its listening agency, GCHQ [Government Communications Headquarters]-to help out. Frank Koza, of the U.S. National Security Agency, sent out a memo and included in the recipients was GCHQ. The top secret memo asked for information about the voting intentions of Security Council members, jokingly adding "minus U.S. and GBR of course." He asked for "the whole gamut of information that could give U.S. policy-makers an edge in obtaining results favorable to U.S. goals or to head off surprises." He asked agents to focus on what had been dubbed at the U.N. "the U6": the undecided six Security Council members. The memo seems to have been distributed widely within GCHQ. But it is not known whether the agency itself acted on the request. Had it done so, its role would have been to eavesdrop on foreign embassies in London. It is commonplace, though never admitted, for the U.S. and British governments to listen in on friendly states. Intelligence analysts said yesterday that it was not surprising that the offices and even homes of the U.N. swing states were bugged. he 1994 Intelligence Services Act allows GCHQ to eavesdrop "in the interests of national security, with particular reference to the defense and foreign policies of Her Majesty's government in the United Kingdom." The wording can be interpreted extremely broadly. During the fevered diplomacy in New York, the role of the six countries was pivotal. The U.S. public assessment was that they could be brought around. The [British] Foreign Office was privately more pessimistic, especially in regards to Mexico and Chile. James Welch, a solicitor for Liberty, the civil rights group, and Gun's lawyer, said yesterday: "Clearly what was being sought was an edge at a time when they were trying to secure a second U.N. resolution....What the United States was asking Britain to do was clearly unlawful in international law. It was a clear breach of the Vienna convention and it is also very arguably unlawful in domestic law." This diplomatic maneuvering was taking place while another, related row was brewing behind closed doors in Britain over whether existing U.N. resolutions provided a legal basis for going to war. Clare Short, who was in the Cabinet at the time, yesterday praised Gun for her bravery. Short, then the international development secretary, said there had been "something smelly, fishy" about the legal advice from the attorney general. She said she suspected the case against Gun had been dropped "because they do not want the light shone on the attorney general's advice." At the time, Short said, Cabinet members had been given only two pages of advice, and no discussion was allowed in Cabinet. Those pages have been made public but, she said, lots of crucial information related to the advice remained confidential. While Gun is becoming a cause cÈlËbre in Britain, the case has not yet resonated in the United States, where it has attracted scant attention. It has been a bigger issue in Latin America. Mexico sent diplomatic notes to the U.S. and British governments this month seeking information about Gun's allegations. A Chilean government spokesman, Patricio Santamaria, confirmed that in early 2003 wiretaps had been found in most of the phones at Chile's U.N. mission. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8411 From: David Alexander Date: Sun Apr 4, 2004 2:22am Subject: RE: Other In Britain's House of Commons, the government and opposition sides of the House are separated by two red lines. The distance between the lines is two swords' lengths, a reminder of just how seriously the Brits used to take their politics. Actually it's two sword lengths and one foot Ok, ok, so I'm picky David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 8412 From: Steve Uhrig Date: Sun Apr 4, 2004 0:45pm Subject: Re: FAE Explosives Once upon a midnight dreary, savanted1© pondered, weak and weary: > As far as I know fuel air explosives have to be confined to a > container to have the mixture enclosed so I thin that this type of > scenario would not be plausible. With respect Garrett, this list is not the appropriate place for such a discussion. This is an open list, and with an open list where anyone can belong, there are some areas which should not be discussed. This especially is true where the area of discussion has wandered way off the mission of the list. There are more appropriate places to discuss this type of info. The primary mission of this list is to discuss technical aspects of technical countermeasures. As this is a popular hobbyist/enthusiast/groupie topic, you can be certain not every one of the 1110 members here are discreet professionals. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8413 From: Shawn Hughes Date: Sun Apr 4, 2004 10:04pm Subject: Re: Digest Number 1531 Garrett, Without getting into a large discussion on the merits of munitions, if this statement: "fuel air explosives have to be confined to a container to have the mixture enclosed so I thin that this type of scenario would not be plausible." means that you believe that a FAE needs to be enclosed to function, you are mistaken. While having the munition function as designed in an enclosed target space makes for a much greater effect, it isn't necessary for functioning. Discussion of the ordnance filler you discuss is NSI Classified Information. However, it is public knowledge that the science of FAE/thermobaric rounds have advanced past the point of what you've released, and utilize certain other liquid and solid fillers. I am familiar with the round you mention, however, I encourage you to google for the terms "finely divided particle explosion" and "Russian RPG FAE" for more up-to-date data. I'll be happy to point you in the direction of specific munitions if you'd like. For everyone else, a fuel air explosive is very similar to what happens in a grainery or silo explosion, or when a flammable gas escapes in volume and meets an ignition source. Weaponizing this type of effect is fairly difficult, but accidents due to this effect are unfortunately fairly common. Remember that all explosions are simply very, very, VERY rapid burning of product. Garrett, if you want to continue this offline, I'll be happy to, but I don't want to take up anymore of the others' time on the topic. V/R, Shawn Shawn Hughes Lead Instructor Explosive and WMD Operations Tactical Response Incorporated www.warriormindset.com At 09:02 AM 4/4/04 , you wrote: >Dear, Group Members > >As far as I know fuel air explosives have to be confined to a container to >have the mixture enclosed so I thin that this type of scenario would not >be plausible. I did not however read the initial information and was >basing my opinions on the comments presented on the daily digest. I am an >ordnance man with ten years of experience in both air-layed and hand held >weaponry. If I am not mistaken the F.A.E. bomb are composed of a gel >agent that expands when exposed to the air. I do believe that the actual >percentage of gel mixture in the container is 75% gel and 25% air inside >the container the 25% is for expansion. The gel can be viewed through a >viewing window which is 3 degrees right from the aft lug that is used to >load the weapon. > >Very Respectfully >Garrett Hord >AO1 (AW/NAC) >USN ret. 8414 From: Shawn Hughes Date: Sun Apr 4, 2004 10:19pm Subject: apologies Steve, I apologize. I receive the digest version, and did not get this response from you. Shawn 8415 From: Mitch D Date: Mon Apr 5, 2004 5:30am Subject: US Eavesdropping efforts leads to arrests Subject: Eavesdropping by U.S. agency led to arrests of terrorist suspects: report LONDON- The arrests of nine terrorist suspects in Britain and one in Canada last week began with a message intercepted by the National Security Agency in the United States that appeared to give instructions for an attack in the United Kingdom by al-Qaida commanders in Pakistan, The Sunday Times reports. The newspaper says the message was received by computers at the NSA's electronic eavesdropping centre in Maryland, which monitors millions of telephone calls and e-mails a day. Police in Britain were alerted of the threat after the NSA analysed the automatic translation of the communication that The Sunday Times said was "thought to be between Britain and Pakistan." Once alerted, senior British police and intelligence officers, including David Veness, head of special operations at Scotland Yard, and Eliza Manningham-Buller, director general of MI5, set up Operation Crevice, the code name for the international anti-terrorist sweep. Meanwhile in Canada, the RCMP arrested Momin Khawaja, 24, a software developer in Ottawa, in an investigation they have dubbed Project Awaken. He is the first Canadian charged under the Anti-Terrorism Act and faces two counts for unspecified offences between Nov. 10, 2003 and last Monday. Published reports say the RCMP had Khawaja under surveillance for more than a month at the request of British police. During a recent visit to Britain he was shadowed by British undercover police. Investigators claim he had a "pivotal role" in the alleged plot, as well as links to Saudi Arabian extremists, The Sunday Times said. But Khawaja's lawyer, Steven Greenberg, said Friday there has been "no link established at this time" between the case and allegations of the London bomb plot. Khawaja is slated for a bail hearing Wednesday and will plead not guilty, Greenberg added. The Mounties have said legal and operational limitations prevent them from releasing more information on the case. Detectives from the National Crime Squad in Britain were redeployed from dealing with organized crime to keep surveillance on the suspects in Britain and the operation led to the seizure last week of a half a tonne of ammonium nitrate fertilizer, a chemical used to make home-made terrorist bombs, in a storage garage near London's Heathrow Airport. The newspaper said the original tip, picked up by NSA satellites, was given high priority because it appeared to be instructions for an attack passing between Al-Qaida commanders in Pakistan and associates in Britain. The sender was apparently in the circle around Abu Musab al-Zarqawi, believed to be the mastermind of attacks in Baghdad and Karbala last month in Iraq that killed 280 people during a Muslim religious festival. The link to Pakistan is also seen as significant because it disproves a view that al-Qaida's command structure had been broken up and scattered by the fall of the Taliban in Afghanistan and arrests made around the world in the last 21 years of the war on terror, The Sunday Times said. "We all thought there were cells operating in isolation and had been told that the al-Qaida network had been destroyed from the top when suddenly we find a chain of command leading back to Pakistan," a senior Scotland Yard source is quoted as saying. Source> http://www.mytelus.com/news/article.do?pageID=world_home&article ===== Mitch Davis TSCM/Special Operations Group Inc. Nashville,TN.USA MitchD@t... site:www.tscmusa.com. Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 From: James M. Atkinson, Comm-Eng Date: Tue Mar 27, 2001 8:43am Subject: Defector Confirms Chinese Army Spying on U.S. Defector Confirms Chinese Army Spying on U.S. http://www.newsmax.com/archives/articles/2001/3/26/195051.shtml Charles R. Smith Tuesday, March 27, 2001 Armed with information from a high-ranking defector, President Bush is reported to be on the verge of shutting down Chinese military espionage in America. The defector, identified by the BBC as Lt. Col. Xu Junping, is said to be singing like a bird about Chinese army intelligence operations inside the United States. According to Taiwanese news sources, Xu is a senior colonel in charge of North American affairs for the People's Liberation Army General Staff Department. Xu's reported expertise is arms control and U.S. military-to-military contacts. Xu's information on Chinese army spy operation has led several high-ranking members of the Bush administration to press for the suspension of major military-to-military contacts with Beijing. Under the proposed ban, Chinese military officials will no longer be allowed the exclusive access to sensitive U.S. facilities that they previously enjoyed under the Clinton administration, which considered China a "strategic partner" in Asian military affairs. Although not as dramatic as the expulsion of dozens of Russian spies, the move will cripple People's Liberation Army intelligence operations inside America. The Bush-led effort is expected to allow high-level Chinese army officers to attend only official military functions. Why Did Clinton Abet Chinese Spying on U.S.? The information obtained from Xu has led U.S. intelligence officials to question the previous free access given to Chinese army officers during the 1990s. The Clinton strategic partnership with the People's Liberation Army included military training, computers, encrypted communications equipment, satellites and exclusive access to U.S. military facilities inside America. Xu confirmed that Chinese army intelligence officers frequently abused civilian programs to mask their military and economic espionage. According to documents previously obtained from the U.S. government using the Freedom of Information Act, China abused a civil air traffic control program to obtain important military information such as "Combat Readiness." The documents also show that the Chinese attempted to conceal the military background of the representatives. For example, in 1993 a Chinese military delegation visited America under the Federal Aviation Administration civil exchange program using civilian titles. One FAA official noted that many of the Chinese delegation actually held rank in the People's Liberation Army. The anonymous FAA official who attending the meeting wrote "military" next to the names of seven members of the 1993 "China Air Traffic Control" delegation in an apparent effort to track the Chinese army officers. The 1993 FAA delegation list included "Mr. Kui Fulin," who toured Federal Aviation Administration headquarters in Washington, Andrews AFB in Maryland, and Boeing Corp. in Washington state. Mr. Kui Fulin was actually Gen. Kui Fulin, Chinese army deputy chief of the general staff. Fulin is known as the man who planned the brutal 1989 army attack on unarmed student demonstrations in Tiananmen Square. The Chinese army access to the America continued throughout the Clinton years under the so-called Federal Aviation Administration civilian air program with exclusive tours backed by U.S. industry giants such as United Airlines and Lockheed Martin. In May 1999 Chinese air force and navy officers visited Edwards Air Force Base for the Federal Aviation Administration civil program under a tour sponsored by Lockheed Martin. Edwards AFB is a test center for American military and NASA research aircraft, including the F-22, Joint Strike Fighter and space shuttle. U.S. Air Force documents show that Sr. Col. Li Zhongli, Sr. Col. Wang Changzheng and Maj. Wang Shouxing gained entry to Edwards Air Force Base. The documents noted that the Chinese officers were given detailed information on military operations at Edwards AFB. The Chinese air force officers were also given details on U.S. Air Force "Special Airspace" areas inside America that are used for military training, research and national security zones. The Chinese military officers were given the latest information on advanced "mobile radars," command and control systems, GPS navigation and "Surveillance Avionics" such as "Air to Air," "Air to Ground" and "Surface Area Movement" surveillance radars. Chinese military officers were also given training on U.S. Air Force combat missions, including "bombing and strafing" and "combat readiness." The U.S. Air Force documents show Chinese Air Force officers were given a "simulated" F-16 training mission under the FAA civil program. The training included a "two ship formation of F-16s from Luke AFB, Arizona" on a "bombing" and overflight mission in a training area, code-named "Baghdad," northwest of Prescott, Ariz. The simulated exercise also included "in-flight refueling" with a tanker aircraft under control of a U.S. Air Force AWACs plane. Defense and State Department officials, backed by the espionage details provided by Xu, have reportedly recommended the new freeze in military exchanges amid heightened security concerns. The new concern in Washington is reflected in the recent decision by President Bush to order air strikes against a Chinese-built air defense system outside Baghdad. The U.S. and U.K. air attacks were timed to strike when Chinese engineers were not working on the Iraqi fiber-optic command network, NATO code-named "Tiger Song." In the following war of words, Secretary of State Colin Powell reported conservations with Beijing clearly noted the U.N. embargo on weapons for Baghdad is still in effect. Powell stated that the public and private protests over Beijing's illegal supply of weaponry to Iraq would continue. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2823 From: Steve Uhrig Date: Tue Mar 27, 2001 0:36pm Subject: Good telco tutorial Will be of most benefit to novices, but is a good cram course in telephone networking. http://www.utdallas.edu/~jbayer/lecture4.PDF Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2824 From: Shawn Hughes Date: Wed Mar 28, 2001 3:21am Subject: rf from a coke bottle and you thought the EM spectrum was crowded already.......... http://www.technologyreview.com/magazine/mar01/schmidt.asp 2825 From: James M. Atkinson, Comm-Eng Date: Fri Mar 30, 2001 10:57am Subject: HOW DO THESE PEOPLE SURVIVE HOW DO THESE PEOPLE SURVIVE Recently, when I went to McDonald's I saw on the menu that you could have an order of 6, 9 or 12 Chicken McNuggets. I asked for a half dozen nuggets. "We don't have half dozen nuggets", said the teenager at the counter. "You don't?" I replied. "We only have six, nine, or twelve," was the reply. "So I can't order a half-dozen nuggets, but I can order six?" "That's right." So I shook my head and ordered six McNuggets. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2826 From: James M. Atkinson, Comm-Eng Date: Fri Mar 30, 2001 11:01am Subject: Out of Paper Several years ago, we had a new West Point graduate who was none too swift. One day he was typing and turned to a Sergeant and said, "I'm almost out of typing paper, What do I do?" "Just use copier machine paper," the Sergeant told him. With that, the West Point graduate took the last remaining blank piece of paper, put it on the photocopier and proceeded to make five "blank" copies. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2827 From: James M. Atkinson, Comm-Eng Date: Fri Mar 30, 2001 11:03am Subject: Kids say the darndest things! Kids say the darndest things! "BABY FAT?" When I was six months pregnant with my third child, my three year old came into the room when I was just getting ready to get into the shower. She said, "Mommy, you are getting fat!" I replied, "Yes honey, remember Mommy has a baby growing in her tummy." "I know," she replied, "but what is growing in your butt?" "A WISE LITTLE GIRL" A certain little girl, when asked her name, would reply, "I'm Mr. Sugarbrown's daughter." Her mother told her this was wrong, she must say,"I'm Jane Sugarbrown." The Vicar spoke to her in Sunday School and said, "Aren't you Mr. Sugarbrown's daughter?" She replied, "I thought I was, but mother says I'm not." "TOO ROUGH" A little girl asked her mother, "Can I go outside and play with the boys?" Her mother replied, "No, you can't play with the boys, they're too rough. The little girl thought about it for a few moments, and asked, "If I can find a smooth one, can I play with him?" "THUMB SUCKING" A boy had reached four without giving up the habit of sucking his thumb, though his mother had tried everything from bribery, to reasoning to painting it with lemon juice to discourage the habit. Finally she tried threats, warning her son that, "If you don't stop sucking your thumb, your stomach is going to blow up like a balloon. " Later that day, walking in the park, mother and son saw a pregnant woman sitting on a bench. The Four year old considered her gravely for a minute, then spoke to her saying, "Uhoh .. I know what you've been doing." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2828 From: James M. Atkinson, Comm-Eng Date: Fri Mar 30, 2001 11:03am Subject: Billable Time A doctor and a lawyer were talking at a party. Their conversation was constantly interrupted by people describing their ailments and asking the doctor for free medical advice. After an hour of this, the exasperated doctor asked the lawyer, "What do you do to stop people from asking you for legal advice when you're out of the office?" "I give it to them," replied the lawyer, "and then I send them a bill." The doctor was shocked, but agreed to give it a try. The next day, still feeling slightly guilty, the doctor prepared the bills. When he went to place them in his mailbox, he found a bill from the lawyer. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2829 From: James M. Atkinson, Comm-Eng Date: Fri Mar 30, 2001 0:52pm Subject: The Price Of Getting Old The Price Of Getting Old For the first time in many years, a an old man traveled from his rural town to the city to attend a movie. After buying his ticket, he stopped at the concession stand to purchase some popcorn. Handing the attendant his money, he couldn't help but comment, "The last time I came to the movies, popcorn was only 15 cents." "Well, sir," the attendant replied with a grin, "You're really going to enjoy yourself. We have sound now." - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - "How was your golf game, dear?" asked Jack's wife Tracy. "Well, I was hitting pretty well, but my eyesight's gotten so bad, I couldn't see where the ball went." "You're seventy-five years old, Jack!" admonished his wife. "Why don't you take my brother Scott along?" "But he's eighty-five and doesn't even play golf anymore," protested Jack. "Yes, but he's got perfect eyesight and can watch your ball for you," Tracy pointed out. The next day Jack teed off with Scott looking on. Jack swung and the ball disappeared down the middle of the fairway. "Did you see where it went?" asked Jack. "Yup," Scott answered. "Well, where is it?" yelled Jack, peering off into the distance. "I forgot." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2830 From: Lisa Tyree Date: Sun Apr 1, 2001 2:27pm Subject: I don't mean to be rude, but netiqette dictates we stick to the subject. None of the recent posts I've read have ANYTHING WHATSOEVER to do with counter-intelligence, which is obviously to enlightened citizens like me & (I would think) others here, VERY IMPORTANT. I'm sure there might be others that feel the same way. There are places on the 'net for everything, including this small talk. Just find it. Thank you for reading this! :-)) 2831 From: Craig Meldrum Date: Sun Apr 1, 2001 11:52pm Subject: TSCM in Hong Kong This is my first posting to this group although I have been monitoring it for a couple of weeks. I am interetsde in hearing from anybody who has had experience in carrying out an international TSCM job in Hong Kong. I would appreciate a direct contact via email to craig@s... Thanks Craig 2832 From: Date: Mon Apr 2, 2001 2:46am Subject: (no subject) 2833 From: Date: Mon Apr 2, 2001 7:41am Subject: Re: Digest Number 554...Lisa LIGHTEN UP LISA! YES, WE ALL READ WITH PASSION ITEMS CONCERNING OUR CHOSEN PROFESSION...SOMETIMES IT IS NICE TO HAVE A LITTLE HUMOR BESTOWED UPON US. THE EVERYDAY INFO SENT ALONG BY "JMA," et. al. IS PRICELESS INDEED, HAVE A CHUCKLE AND GET ON WITH IT. SCHOOL WAS OUT FOR ONE DAY!!! REGARDS, JOHN R. DILLON tdifinc@c... 2834 From: Nacht Gotterdammerung Date: Mon Apr 2, 2001 8:37am Subject: Re: Digest Number 554 -Netiquette- New word for me. I figure since this list is the sole property and brainchild of Mr. Atkinson, if he has an issue with the content, he will speak up. Besides which, I think alot of the recent humor posts (to which I assume you are refering) have been posted by Mr. Atkinson. Also, the heading of this list is not counter-intelligence, although counter-intelligence is indeed a discipline of T.S.C.M., the heading is Technical Surveilance Counter Measures. Godspeed. --- TSCM-L@yahoogroups.com > wrote: > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS >------------------------------------------------------------------------ > >There is 1 message in this issue. > >Topics in this digest: > > 1. I don't mean to be rude, but netiqette dictates we stick to the subject. > From: "Lisa Tyree" > > >________________________________________________________________________ >________________________________________________________________________ > >Message: 1 > Date: Sun, 01 Apr 2001 19:27:47 -0000 > From: "Lisa Tyree" >Subject: I don't mean to be rude, but netiqette dictates we stick to the subject. > >None of the recent posts I've read have ANYTHING WHATSOEVER to do >with counter-intelligence, which is obviously to enlightened citizens >like me & (I would think) others here, VERY IMPORTANT. >I'm sure there might be others that feel the same way. >There are places on the 'net for everything, including this small >talk. Just find it. >Thank you for reading this! :-)) > > > > >________________________________________________________________________ >________________________________________________________________________ > > > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ == Those that travel long distances in isolation will defend themselves with strange arts. Shin shin, shin gan. The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. _____________________________________________________________ Yourname@i...
When you want them to remember!
http://burn.inhell.com 2835 From: Robert G. Ferrell Date: Mon Apr 2, 2001 0:13pm Subject: Re: I don't mean to be rude >None of the recent posts I've read have ANYTHING WHATSOEVER to do >with counter-intelligence, which is obviously to enlightened citizens >like me & (I would think) others here, VERY IMPORTANT. The owner of this list feels that the occasional humorous post is well within the scope of TSCM. I happen to agree, inasmuch as humor is a vital element in maintaining perspective and balance against the sometimes painfully technical nature of TSCM. Humor is a tool of the intellect, and an appreciation of irony is a signpost of intellectual maturity. There will be plenty of technobabble in this august forum in the future--enough to satisfy even the most hardcore TSCM aficionado. For now, though, try to appreciate the intent, if not the actual product, of JMA's policy. You can always hit the delete key. Put another way, stop and smell the roses. Cheers, RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 2836 From: James M. Atkinson, Comm-Eng Date: Mon Apr 2, 2001 1:07pm Subject: List Policy and Guidelines Thanks RGF, As the list moderator let me say a few things here, TSCM and technical security as some pretty serious stuff, stressful as all dickens, and so on. We work long hours under less then favorable conditions. It's up at 4 am, drive 90 minutes to a client site, spend an hour unloading 2 tons of lab gear on site, and spend the next 16 hours using equipment to climb around every nook and cranny of the clients location where you may or may not find a bug. Then repack and reload the 2 tons of equipment back on the truck, and drive back to the office, type up the report so you can get it to them in the morning, and it your lucky sneak in 3-4 hours of sleep before getting to to repeat to whole thing the next morning. Of course during this whole thing you back will spasm up on you while unloading the truck, the clients employees will try to steal you laptop, the CEO of the company turns into Charles Manson, the PI who brought you in plants a device to be found, the head of security wants you to tap some phones, the accounting department still hasn't aid for the last sweep, and the bloody power just went out knocking out your laptop. CEO's that WANT a sweep just to make themselves feel important, attorneys who only want to pay you if you find something, anti-government types ranting about black helicopters, delusionary mental patients, and so on. On top of this add: bleeding edge instruments that are finicky, rot gut coffee, no lunch (not counting the two stale donuts), people with attitudes, mental patients calling six times a day, never enough power cords, fogged up Xray film, NLJD getting false hits, phones that aren't wired right, firewalls with default password, locks that never work the right way, and everybody either trying to get you to work for free or telling you that "it's not their responsibility or jurisdiction". For a real bonus add some big corporate client who just bought a broadband diode detector system from some New York Spyshop for a quarter million dollars and has convinced himself that his office is riddled with bugs (but who gets pissed at you for telling him that his equipment is of minimal value, and that his office is free of bugs). That said, it is healthy to pass around some bits of humor on a regular basis as those of us to perform several hard core sweeps a week need to vent off out steam. Most of the people on this list can relate to what I am talking about, and I would encourage anybody who has a problem with that policy o unsubscribe. As list moderator I have always encouraged list member to swap humor on a regular basis and to vent a little steam (but please play nice). PS: On a side note I would point out that THIS list is the largest of it kind anywhere in the world, and that a large percentage of the membership consists of both government and corporate hard-core TSCM people. So speaks the moderator (who now shuts up), -jma At 12:13 PM -0500 4/2/01, Robert G. Ferrell wrote: > >None of the recent posts I've read have ANYTHING WHATSOEVER to do >>with counter-intelligence, which is obviously to enlightened citizens >>like me & (I would think) others here, VERY IMPORTANT. > >The owner of this list feels that the occasional humorous post is >well within the scope of TSCM. I happen to agree, inasmuch as humor >is a vital element in maintaining perspective and balance against >the sometimes painfully technical nature of TSCM. Humor is a tool >of the intellect, and an appreciation of irony is a signpost of >intellectual maturity. > >There will be plenty of technobabble in this august forum in the >future--enough to satisfy even the most hardcore TSCM aficionado. >For now, though, try to appreciate the intent, if not the actual >product, of JMA's policy. You can always hit the delete key. > >Put another way, stop and smell the roses. > >Cheers, > >RGF > >Robert G. Ferrell, CISSP -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2837 From: Date: Mon Apr 2, 2001 1:49pm Subject: U.S.: China boarded spy plane Bush 'troubled' by Chinese stand, demands 'immediate access' to 24 U.S. airmenNBC's Jim Miklaszewski reports Monday on the escalating incident involving 24 U.S. airmen. MSNBC WASHINGTON, April 2 ≠ The last communication from the crew of the U.S. spy plane that made an emergency landing in China was that armed Chinese soldiers were boarding the plane, U.S. officials said Monday. As international tensions over the incident escalated, President Bush demanded "immediate access" to the crew and plane, but China indicated U.S. diplomats wouldn't be allowed to meet with the crew until Tuesday. April 2 ≠ Adm. Dennis Blair, the commander of U.S. Pacific Military Forces, tells 'Today' that the Chinese fighter should have stayed out of the way of the U.S. aircraft "I'M TROUBLED by the lack of a timely Chinese response to our request," Bush said in a brief statement at the White House. "Our embassy officials are on the ground and prepared to visit the crew and aircraft as soon as the Chinese government allows them to do so." He did not say what the United States might do if the crew and aircraft, being held on China's Hainan Island, were not released soon. Soon after, a State Department spokesman said China had since indicated that U.S. diplomats would be allowed to meet with the crew on Tuesday. China's foreign minister, Tang Jiaxuan, told reporters he hoped "an adequate solution can be found soon." But, asked when the U.S. crew would be released, Tang replied: "It's not our plane which hit the American plane, quite the contrary. Our pilot is still missing." China insists the U.S. aircraft hit its fighter jet, while the United States says it's more likely the other way around. The two aircraft collided early Sunday about 70 miles south of Hainan, over the South China Sea. The U.S. plane made an emergency landing, while the Chinese jet reportedly crashed at sea. At the Pentagon, U.S. officials, who spoke on condition of anonymity, told NBC News that the Chinese troops boarded the Navy aircraft to take the crew members off the plane. It's not known if force was used. Advertisement The commander of U.S. Pacific Military Forces, Adm. Dennis Blair, told NBC's "Today" show that the crew would have taken "procedures" to disable or destroy any sensitive equipment and data had they been forced from the plane. MSNBC's military analyst, Ken Allard, noted that boarding the U.S. aircraft would be "a violation of U.S. sovereignty because the plane is U.S. territory, like an embassy." Not since 1968, when North Korea seized the USS Pueblo, has there been such an incident. DESTROYERS NEAR ISLAND Reports from the Pentagon that the U.S. warships off Hainan are there to send a message Navy officials said three destroyers were diverted to an area about 150 to 200 miles off Hainan after having stopped in Hong Kong. The USS Hewitt, Fitzgerald and Higgins had been en route back to the U.S. West Coast after a tour of duty in the Persian Gulf. U.S. officials told NBC News that the move was intended to signal to China that the United States takes the incident very seriously ≠ and that the detention of the plane and crew is a violation of international law. The officials added that the law gives the plane and its crew immunity ≠ and precludes the Chinese from boarding, inspecting or detaining the aircraft. The United States claims that even though the plane landed on Chinese territory without permission, it did so in a life-threatening emergency and that therefore China has no right under international law to seize the plane. MUTUAL BLAME Blair accused the Chinese jet of violating air practices, saying smaller, faster aircraft are supposed to veer away from larger, slower ones. Reports from Beijing that China has become quiet about the incident, perhaps testing to see how the new U.S. administration reacts to such situations But China has accused the U.S. pilots of ramming its F-8 fighter jet, causing it to crash. The Chinese Foreign Ministry said "the U.S. side has total responsibility for this event," adding that it had lodged a "solemn representation and protest" and reserved the right to seek damages. It threatened further "representations" over the plane's entering what it maintained was Chinese airspace and landing without permission. U.S. officials said the aircraft was in international airspace during what they described as a routine mission. China's Foreign Ministry said two fighters were sent up to track the U.S. plane as it approached Chinese airspace. "The U.S. plane abruptly diverted toward the Chinese planes, and its head and left wing collided with one of the Chinese planes, causing the Chinese plane to crash," it said. But Blair said the EP-3 was large and slow, more likely to have been hit by the nimble Chinese F-8 fighter than the reverse. "It's pretty obvious who bumped who," Blair said Sunday at a news conference in Honolulu. PAST INTERCEPTS Blair said the Chinese were to blame, citing a "pattern of increasingly unsafe behavior" in the South China Sea. "I must tell you that the intercepts by Chinese fighters over the past couple of months have become more aggressive to the point that we felt they were endangering the safety of the Chinese and American aircraft," Blair said. U.S. military officials had "launched a protest at the working level" before Sunday's incident but did not receive a satisfactory response, he said. "We went to the Chinese and said: 'Your aircraft are not intercepting in a professional manner. There's a situation here,'" Blair said. "It's not a normal practice to play bumper cars in the air." NBC's Jim Miklaszewski said encounters with Chinese fighters are frequent as U.S. planes fly along China's coast eavesdropping on military communications. "When these surveillance planes fly near China, they're often intercepted by Chinese planes in a case of cat and mouse," he said. "However, they come dangerously close. The U.S. has warned the Chinese through diplomatic channels several times before to knock it off." TEST FOR BUSH The dispute is likely to complicate relations as the Bush administration and Beijing are still feeling each other out and establish a working relationship. China-U.S. relations had only recently been fully restored after a U.S. plane on a NATO mission bombed the Chinese Embassy in Belgrade, Yugoslavia, in May 1999, sparking bitter anti-U.S. street protests in Beijing. China has reacted angrily to renewed U.S. attacks on its human rights record, particularly over its treatment of the Falun Gong spiritual movement, and Bush has complained over the detention of a U.S.-based academic in China accused of spying. In the next few weeks, Bush is due to make a decision that could have a fundamental impact on the course of relations during his term ≠ whether to go ahead with U.S. arms sales to Taiwan. Beijing has waged a vigorous campaign to kill the sale, particularly the transfer of AEGIS-equipped Arleigh Burke-class guided missile destroyers. Squadron leader denies China's take SENSITIVE SPY TARGET For the past eight years, the Chinese military has been the top priority for the Navy EP-3s operating in the western Pacific. One of the top missions for the planes is to provide data to U.S. Navy aircraft battle groups, according to intelligence documents read to NBC News. China's military uses Hainan Island to keep an eye on the South China Sea. It is covered with military bases because of its proximity to Vietnam and the Spratley Islands, which are claimed by China and five other countries and are among the U.S. Navy's prime targets for observation. Parts of the Spratleys are claimed by China, Brunei, Malaysia, Taiwan, Vietnam and the Philippines. The United States officially takes no position on the dispute but insists that freedom of navigation must be maintained in the important South China Sea route. The EP-3, which is about the size of a Boeing 737, is an unarmed four-engine propeller plane that is packed with electronics for listening in on radio signals and monitoring radar sites. There are 12 EP-3s worldwide, according to NBC sources. The EP-3 has 20 intelligence "positions" on board, each monitored by a Navy specialist. The plane can fly up to 12 hours at 28,000 feet and can constantly monitor the early warning and fire control radar of a target as well as communications. Data can be recorded on board or transmitted. Printable version Source: U.S. Pacific Command/Washington Post NBC News' Robert Windrem in New York, Eric Baculinao in Beijing, Ned Colt in Hong Kong and Jim Miklaszewski in Washington and The Associated Press and Reuters contributed to this report. Official statement on incident from the U.S. Pacific Command EOM HAVE A GREAT DAY !!! ---------- http://www.msnbc.com/news/553032.asp [Non-text portions of this message have been removed] 2838 From: A Grudko Date: Mon Apr 2, 2001 4:12pm Subject: Re: Digest Number 554...Lisa ----- Original Message ----- > THE EVERYDAY INFO SENT ALONG BY "JMA," et. al. IS PRICELESS INDEED, HAVE A > CHUCKLE AND GET ON WITH IT. REGARDS, JOHN R. DILLON Heck, It's James' list, his call. The stuff most of us deal with can be pretty serious so a bit of diversion is welcome. If my mail opens on a joke I hit the delete button 99% of the time (unless it's a report on G Dubaya's latest press conference). Thank heavans we don't have the petty posturing and bickering I see on so many other lists. I admit, I don't send - or pass - quite so many off topic posts to the lists I moderate, but I guess on a quiet (posting) day I might send an irrelevant message just to make sure everyone knew the list was still there. I can tell you that of the 20 or so lists I participate in, this one gives me more useable knowledge than any other - including the ones I run. jma must be doing something right. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2839 From: Charles P Date: Mon Apr 2, 2001 7:02pm Subject: TSCM humor... change a light bulb? How many TSCMer's does it take to change a light bulb? 0 really, but at least 3 to 5 or more to perform the required insection. 1 to search for RF emissions 1 to check carrier current 1 to run the o'scope looking for audio on the power line 1 to contact the authorities to perform the actual change, since we are only there to inspect, document our findings, and report with recommendations to the client. 1 to explain to the client that just because we found a bad bulb today, that doesn't mean another one won't go bad after we've left, and that there are other bulbs in other offices that we did not inspect since they were not in the specified areas of the sweep. 1 to post a joke about it to the mailing list There must be some other necessary operations I've forgotten... 2840 From: Richard Thieme Date: Mon Apr 2, 2001 2:08pm Subject: Re: List Policy and Guidelines Jim, in your spare time, why don't you turn this into a column or article? it's funny it's true it has attitude it's educational etc etc - for a trade pub - enhancing it wouldn't take too much. It's really the rump of the best kind of piece - an emotional flow with a lot of energy carrying along a lot of useful information that could only come from an expert, so it makes multiple points and does it succinctly. why would be a good trade pub for it? RT At 02:07 PM 04/02/2001 -0400, you wrote: >Thanks RGF, > >As the list moderator let me say a few things here, > >TSCM and technical security as some pretty serious stuff, stressful >as all dickens, and so on. We work long hours under less then >favorable conditions. > >It's up at 4 am, drive 90 minutes to a client site, spend an hour >unloading 2 tons of lab gear on site, and spend the next 16 hours >using equipment to climb around every nook and cranny of the clients >location where you may or may not find a bug. Then repack and reload >the 2 tons of equipment back on the truck, and drive back to the >office, type up the report so you can get it to them in the morning, >and it your lucky sneak in 3-4 hours of sleep before getting to to >repeat to whole thing the next morning. > >Of course during this whole thing you back will spasm up on you while >unloading the truck, the clients employees will try to steal you >laptop, the CEO of the company turns into Charles Manson, the PI who >brought you in plants a device to be found, the head of security >wants you to tap some phones, the accounting department still hasn't >aid for the last sweep, and the bloody power just went out knocking >out your laptop. CEO's that WANT a sweep just to make themselves feel >important, attorneys who only want to pay you if you find something, >anti-government types ranting about black helicopters, delusionary >mental patients, and so on. > >On top of this add: bleeding edge instruments that are finicky, rot >gut coffee, no lunch (not counting the two stale donuts), people with >attitudes, mental patients calling six times a day, never enough >power cords, fogged up Xray film, NLJD getting false hits, phones >that aren't wired right, firewalls with default password, locks that >never work the right way, and everybody either trying to get you to >work for free or telling you that "it's not their responsibility or >jurisdiction". > >For a real bonus add some big corporate client who just bought a >broadband diode detector system from some New York Spyshop for a >quarter million dollars and has convinced himself that his office is >riddled with bugs (but who gets pissed at you for telling him that >his equipment is of minimal value, and that his office is free of >bugs). > >That said, it is healthy to pass around some bits of humor on a >regular basis as those of us to perform several hard core sweeps a >week need to vent off out steam. Most of the people on this list can >relate to what I am talking about, and I would encourage anybody who >has a problem with that policy o unsubscribe. As list moderator I >have always encouraged list member to swap humor on a regular basis >and to vent a little steam (but please play nice). > >PS: On a side note I would point out that THIS list is the largest of >it kind anywhere in the world, and that a large percentage of the >membership consists of both government and corporate hard-core TSCM >people. > >So speaks the moderator (who now shuts up), > >-jma > > > > > > >At 12:13 PM -0500 4/2/01, Robert G. Ferrell wrote: >> >None of the recent posts I've read have ANYTHING WHATSOEVER to do >>>with counter-intelligence, which is obviously to enlightened citizens >>>like me & (I would think) others here, VERY IMPORTANT. >> >>The owner of this list feels that the occasional humorous post is >>well within the scope of TSCM. I happen to agree, inasmuch as humor >>is a vital element in maintaining perspective and balance against >>the sometimes painfully technical nature of TSCM. Humor is a tool >>of the intellect, and an appreciation of irony is a signpost of >>intellectual maturity. >> >>There will be plenty of technobabble in this august forum in the >>future--enough to satisfy even the most hardcore TSCM aficionado. >>For now, though, try to appreciate the intent, if not the actual >>product, of JMA's policy. You can always hit the delete key. >> >>Put another way, stop and smell the roses. >> >>Cheers, >> >>RGF >> >>Robert G. Ferrell, CISSP > >-- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > Richard Thieme ThiemeWorks ... professional speaking and business consulting: ThiemeWorks P. O. Box 170737 the impact of computer technology Milwaukee Wisconsin on people in organizations: 53217-8061 helping people stay flexible voice: 414.351.2321 and effective fax: 414.351.5779during times of accelerated change. cell: 414.704.4598 http://www.thiemeworks.com http://www.richardthieme.com - for information on Professional Speaking 2841 From: Date: Tue Apr 3, 2001 2:39am Subject: China makes U.S. wait to see crew China makes U.S. wait to see crew Adm. Dennis Blair, commander of U.S. forces in the Pacific, describes Sunday's incident at a news conference in Honolulu. April 2 ≠ U.S. officials said the Chinese military boarded the top-secret U.S. spy plane. NBC's Jim Miklaszewski reports. MSNBC WASHINGTON, April 3 ≠ With relations already stretched thin, the United States and China played a tense waiting game Tuesday while their diplomats sparred over what to do with 24 Americans confined on an island in the South China Sea. Beijing told U.S. officials they would have to wait until Tuesday night before they could meet with the U.S. crew members, as the two superpowers bickered over the midair collision of military planes that grounded the U.S. crew Sunday. April 2 ≠ Adm. Dennis Blair, the commander of U.S. Pacific Military Forces, says the Chinese pilot should have stayed out of the way. BEIJING REFUSED President Bush's demand Monday for "immediate access" to the 24 Americans and their high-tech spy plane. Chinese officials told U.S. diplomats that they would be permitted Tuesday night (Tuesday morning in the United States) to see the crew members, said U.S. ambassador to China Joseph Prueher in Beijing. Prueher's comments to reporters confirmed those made Monday in Washington by White House spokesman Scott McClellan, who said the diplomats expected to meet up with the crew members around then. U.S.-China face offSpy plane collisionïLatest newsïNBC: U.S. spy flights assume new urgencyïAnti-U.S. anxiety in ChinaïCrew of the U.S. planeïChinese jet got too close, U.S. squadron leader saysïOpinions: China syndromeïSpecial report: The Secret Empire"We had a meeting last night with Assistant Foreign Minister Zhou Wenzhong at the Foreign Ministry where he gave us the expectation that we will see the crew this evening. And we are expecting to do that," Preuher said. U.S. officials said the last communication from the crew ≠ 22 Navy personnel, three of them women, as well as an Air Force officer and a Marine ≠ was that armed Chinese soldiers were boarding the plane, which made an emergency landing early Sunday after colliding with a Chinese fighter jet, whose pilot China said was still missing. The pilot of the Chinese fighter managed to parachute from his aircraft, the Xinhua news agency reported on Tuesday. It said the search for the missing airman involving 11 ships and more than 20 planes was going on around the clock in the South China Sea. BUSH 'TROUBLED' Bush, who said he was "troubled by the lack of a timely Chinese response to our request," did not say what the United States might do if the crew, being held at a guesthouse on China's Hainan Island, were not released soon. Two defense attaches from the U.S. Embassy in Beijing and a diplomat from the U.S. Consulate in Guangzhou were stuck in their hotel in the city of Sanya near the Lingshui military air base, where the plane is parked. They have so far been frustrated in their efforts to make contact with the crew. Advertisement As for the plane, an unarmed Navy EP-3E Aries II bristling with electronics for listening in on radio signals and monitoring radar sites, Bush demanded that it be returned "without further damaging or tampering." The Associated Press reported that the plane stood empty at the military airfield where it landed in the town of Lingshui, quoting a Chinese sailor who refused to give his name when contacted by telephone at an adjacent naval facility. At the Defense Department, U.S. officials told NBC News on condition of anonymity that Chinese troops boarded the Navy aircraft to take the crew members off the plane. It was not known whether force was used. The commander of U.S. Pacific Military Forces, Adm. Dennis Blair, said on NBC's "Today" show that the crew would have taken steps to disable or destroy any sensitive equipment and data had they been forced from the plane. But MSNBC military analyst Ken Allard said the Chinese could still get valuable information from the aircraft, adding that boarding the plane would be "a violation of U.S. sovereignty because the plane is U.S. territory, like an embassy." TENSE DIPLOMATIC SITUATION Not since 1968 has the United States waded through a similar military and diplomatic thicket, when North Korea seized the USS Pueblo. The dispute is likely to complicate relations between Beijing and Washington, which were strained even before Bush took office only 2Ω months ago. April 2 ≠ NBC's David Gregory reports that President Bush's first major international test involves a country he has said is a competitor, not a strategic partner. Broken relations had only recently been fully mended after a U.S. plane on a NATO mission bombed the Chinese Embassy in Belgrade, Yugoslavia, in May 1999, sparking bitter anti-U.S. street protests in Beijing. China has reacted angrily to renewed U.S. attacks on its human rights record, and Bush has complained over the detention of a U.S.-based academic accused of spying. Bush is due soon to decide whether to go ahead with U.S. arms sales to Taiwan, which Beijing has waged a vigorous campaign to kill. China's foreign minister, Tang Jiaxuan, told reporters Monday that he hoped "an adequate solution can be found soon" to the impasse over the plane collision. But the two governments contested virtually every detail of the incident, including who hit whom and in whose territory. "It's not our plane which hit the American plane," Tang told reporters. "Quite the contrary. Our pilot is still missing." The Chinese Foreign Ministry said in a statement that "the U.S. plane abruptly diverted toward the Chinese planes, and its head and left wing collided with one of the Chinese planes, causing the Chinese plane to crash." China maintained that the collision occurred in Chinese airspace, saying two fighters were sent up to track the U.S. plane as it approached Chinese territory. The United States said its aircraft was in international airspace during what officials described as a routine mission. The Chinese Foreign Ministry concluded that "the U.S. side has total responsibility for this event." It said China had lodged a "solemn representation and protest" and reserved the right to seek damages. U.S. officials, however, characterized the collision as an accident caused when one of two Chinese fighter jets shadowing the U.S. plane ran into it. Blair said the EP-3 was large and slow, and much more likely to have been hit by the nimble Chinese F-8 fighter than the reverse. "It's pretty obvious who bumped who," Blair said Sunday at a news conference in Honolulu, adding, "I must tell you that the intercepts by Chinese fighters over the past couple of months have become more aggressive to the point that we felt they were endangering the safety of the Chinese and American aircraft." U.S. officials in Washington told NBC News' Andrea Mitchell that Washington did not think the Chinese jet deliberately rammed the U.S. plane, but they insisted that it was still at fault, describing Chinese pilots as "notoriously bad airmen." U.S. military officials had "launched a protest at the working level" before Sunday's incident but did not receive a satisfactory response, Blair said. "It's not a normal practice to play bumper cars in the air." NBC's Jim Miklaszewski said encounters with Chinese fighters were frequent as U.S. planes flew along China's coast eavesdropping on military communications. "When these surveillance planes fly near China, they're often intercepted by Chinese planes in a case of cat and mouse," he said. "However, they come dangerously close. The U.S. has warned the Chinese through diplomatic channels several times before to knock it off." DIPLOMATIC MANEUVERS After the collision, the U.S. plane made an emergency landing without Chinese permission on the island of Hainan, about 70 miles south in the South China Sea. Bush offered help in finding the missing Chinese pilot and his jet, but he met with no public response. Reports from the Pentagon that the U.S. warships off Hainan are there to send a message So far, the diplomatic maneuvers were being conducted at Cabinet level. A senior U.S. official said that after discussions with his foreign policy team, Bush decided not to call Chinese leaders himself, concerned that doing so would suggest that the White House was in a crisis mode. "We don't want to overreact and make an accident become an incident," a U.S. official told NBC News. But in a signal to China, three destroyers were temporarily diverted to an area about 150 to 200 miles off Hainan after having stopped in Hong Kong. The USS Hewitt, Fitzgerald and Higgins had been en route back to the U.S. West Coast after a tour of duty in the Persian Gulf. Pentagon officials said the three destroyers lingered in the region to "monitor the situation" before being "released to proceed on duties as assigned" several hours later. U.S. officials told NBC News that the move was intended to alert China that the United States took the incident very seriously ≠ and that the detention of the plane and its crew was a violation of international law. The officials added that the law gave the plane and its crew immunity and precluded the Chinese from boarding, inspecting or detaining the aircraft. The United States claimed that even though the plane landed on Chinese territory without permission, it did so in a life-threatening emergency and that therefore China had no right under international law to seize it. INTELLIGENCE BONANZA While officials said the safety of the U.S. crew was their paramount concern, they were also intent on recovering the spy plane. In London, a military expert said China could sell any information it obtained to the Russians, giving them access to "one of the most sophisticated intelligence-gathering airplanes in the world." "It's catastrophic for the U.S. if the Chinese have managed to gain access to the aircraft and if they've managed to obtain access to the computers and the hard disks," said Paul Beaver of Jane's Information Group, publisher of the Jane's Defense Weekly, the standard reference on military equipment. NBC News' Robert Windrem in New York and Jim Miklaszewski, Andrea Mitchell and David Gregory in Washington; MSNBC.com's Alex Johnson and Miguel Llanos; The Associated Press; and Reuters contributed to this report. HAVE A GREAT DAY !!! ---------- http://www.msnbc.com/news/553032.asp [Non-text portions of this message have been removed] 2842 From: Talisker Date: Tue Apr 3, 2001 2:42pm Subject: Re: humour or humor I seem to remember me posting a similar mail to Lisa about 12 months ago, and getting a similar rebuke I have now been assimilated, resistance WAS futile! I enjoy the humor, if I'm busy I just filter by subject - better to reduce the signal to noise ratio than have no signal at all All I would say, as I did 12 months ago is why not start the subject with the word humor thereby aiding the filtering and increasing the signal to noise ratio by 3dB Take Care Andy PS Also Lisa was extremely polite with her remarks, it seems only fair to extend to her the courtesy - on the subject of netiquette the use of capitals is not good http://www.networkintrusion.co.uk Talisker's Network Security Tools List Security Tools Notification http://groups.yahoo.com/group/security-tools/join ----- Original Message ----- From: To: Sent: Monday, April 02, 2001 5:41 PM Subject: Re: [TSCM-L] Digest Number 554...Lisa > LIGHTEN UP LISA! > > YES, WE ALL READ WITH PASSION ITEMS CONCERNING OUR CHOSEN > PROFESSION...SOMETIMES IT IS NICE TO HAVE A LITTLE HUMOR BESTOWED UPON US. > > THE EVERYDAY INFO SENT ALONG BY "JMA," et. al. IS PRICELESS INDEED, HAVE A > CHUCKLE AND GET ON WITH IT. SCHOOL WAS OUT FOR ONE DAY!!! > > REGARDS, > JOHN R. DILLON > tdifinc@c... > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 2843 From: Martin Date: Tue Apr 3, 2001 4:12pm Subject: Caller ID Question I received a call from a client who described the following circumstances that I thought I would get your collective thoughts on: An individual is in litigation with an area bank. He reports, and has a photo to prove, that he found on his cordless instrument's caller ID the name of the bank that he is opposed to in court and his own telephone number. Of course, he is insisting that his telephone is being monitored by this bank, which is silly, but if what he says is true, it really doesn't make sense...unless it was some sort of glitch at the exchange and just happened to coincidently, be his opposition in court. Anyone have any ideas? Martin Brown Brown & Sikes, Inc. Dallas, Texas 2844 From: James M. Atkinson, Comm-Eng Date: Tue Apr 3, 2001 7:12pm Subject: Re: Caller ID Question I would first suspect that it is a hoax, and that the information he has was fabricated and then documented so as to give the guy some "evidence" to wave around. After disproving the hoax possibility, it could be a case where someone from the bank simply called to talk to him, he saw the number and flipped out. Third, it could just be a screw up on the part of the CO. -jma At 4:12 PM -0500 4/3/01, Martin wrote: > I received a call from a client who described the following >circumstances that >I thought I would get your collective thoughts on: > > An individual is in litigation with an area bank. He reports, and >has a photo to >prove, that he found on his cordless instrument's caller ID the name of >the bank that >he is opposed to in court and his own telephone number. Of course, he >is insisting that his telephone is being monitored by this bank, which >is silly, but if what he says is true, it really doesn't make >sense...unless it was some sort of glitch at the >exchange and just happened to coincidently, be his opposition in court. > >Anyone have any ideas? > >Martin Brown >Brown & Sikes, Inc. >Dallas, Texas -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2845 From: Charles P Date: Tue Apr 3, 2001 8:31pm Subject: Re: Caller ID Question It could easily be a call from a payphone at the bank. Many payphones will have the caller id show up as the location of the phone. Or it may just be that someone at the bank gave him a call. There is little reason to think that it would imply eavesdropping. charles ----- Original Message ----- From: "Martin" To: "TSCM-Group" Sent: Tuesday, April 03, 2001 5:12 PM Subject: [TSCM-L] Caller ID Question > I received a call from a client who described the following > circumstances that > I thought I would get your collective thoughts on: > > An individual is in litigation with an area bank. He reports, and > has a photo to > prove, that he found on his cordless instrument's caller ID the name of > the bank that > he is opposed to in court and his own telephone number. Of course, he > is insisting that his telephone is being monitored by this bank, which > is silly, but if what he says is true, it really doesn't make > sense...unless it was some sort of glitch at the > exchange and just happened to coincidently, be his opposition in court. > > Anyone have any ideas? > > Martin Brown > Brown & Sikes, Inc. > Dallas, Texas > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 2846 From: Dawn Star Date: Wed Apr 4, 2001 11:20am Subject: Microwave Effects Anyone have information on this: The theoretical possibility of psycho telemetric influence (the capability of affecting human behavior by transmitted radio signals at controlled frequencies) has been suggested by Soviet neuropsychological investigations at Uralyera and Novosibirsk (Luria and Perov, 1974a, 1975c, 1976a), which can cause involuntary subliminal psychological energy field compliance to operative microwave apparatus. 2847 From: Miguel Puchol Date: Wed Apr 4, 2001 11:23am Subject: RE: Microwave Effects Ahhhh! That explains why every time I heat up the chicken in my microwave, I just sit there staring at it going around and around for five minutes.... All the best, Mike > -----Mensaje original----- > De: Dawn Star [mailto:bratkid@e...] > Enviado el: miercoles, 04 de abril de 2001 18:20 > Para: TSCM-L@yahoogroups.com > Asunto: [TSCM-L] Microwave Effects > > > Anyone have information on this: > > The theoretical possibility of psycho telemetric influence (the > capability > of affecting human behavior by transmitted radio signals at controlled > frequencies) has been suggested by Soviet neuropsychological > investigations > at Uralyera and Novosibirsk (Luria and Perov, 1974a, 1975c, 1976a), which > can cause involuntary subliminal psychological energy field compliance to > operative microwave apparatus. > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 2848 From: Talisker Date: Wed Apr 4, 2001 0:15pm Subject: Re: humor Microwave Effects I seem to remember in the late 80's an elderly lady drying her poodle in the microwave, she received a lot of money due to the psychological distress, which is minor compared to the distress of the poodle :o) Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List Security Tools Notification http://groups.yahoo.com/group/security-tools/join ----- Original Message ----- From: "Dawn Star" To: Sent: Wednesday, April 04, 2001 5:20 PM Subject: [TSCM-L] Microwave Effects > Anyone have information on this: > > The theoretical possibility of psycho telemetric influence (the capability > of affecting human behavior by transmitted radio signals at controlled > frequencies) has been suggested by Soviet neuropsychological investigations > at Uralyera and Novosibirsk (Luria and Perov, 1974a, 1975c, 1976a), which > can cause involuntary subliminal psychological energy field compliance to > operative microwave apparatus. > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 2849 From: Robert G. Ferrell Date: Wed Apr 4, 2001 0:24pm Subject: Re: Microwave Effects >The theoretical possibility of psycho telemetric influence (the capability >of affecting human behavior by transmitted radio signals at controlled >frequencies) has been suggested by Soviet neuropsychological investigations >at Uralyera and Novosibirsk (Luria and Perov, 1974a, 1975c, 1976a), which >can cause involuntary subliminal psychological energy field compliance to >operative microwave apparatus. Well, about two or three times a year someone walks into the local FBI office and claims that some sinister organization is trying to injure and/or control them by directing microwaves at them from the towers that dot the landscape around here. I do know that one of the initiation tricks played on soldiers newly assigned to mobile communications units equipped with microwave transmitters in the '60s was to get the new person to climb up on top of the truck, ostensibly to examine something inside the transmitting antenna, then turn the transmitter on for a max power burst while the person was in the signal path. Usually knocked 'em right off the van. Or so an old friend of mine claimed. ;-) Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2850 From: Miguel Puchol Date: Wed Apr 4, 2001 2:10pm Subject: RE: Microwave Effects Well, extreme microwave power (as with military radars & the like) can injure someone, but rather on the physical than on the mental side. I image first symptoms to be a warm feeling, getting hotter, and a hell of a headache... In any case, this initiation trick is one that could have done a lot of damage, and landed someone in a court(martial). All the best, Mike > -----Mensaje original----- > De: Robert G. Ferrell [mailto:rferrell@r...] > Enviado el: miercoles, 04 de abril de 2001 19:24 > Para: TSCM-L@yahoogroups.com > Asunto: Re: [TSCM-L] Microwave Effects > > > >The theoretical possibility of psycho telemetric influence (the > capability > >of affecting human behavior by transmitted radio signals at controlled > >frequencies) has been suggested by Soviet neuropsychological > investigations > >at Uralyera and Novosibirsk (Luria and Perov, 1974a, 1975c, > 1976a), which > >can cause involuntary subliminal psychological energy field > compliance to > >operative microwave apparatus. > > Well, about two or three times a year someone walks into the local > FBI office and claims that some sinister organization is trying to > injure and/or control them by directing microwaves at them from > the towers that dot the landscape around here. > > I do know that one of the initiation tricks played on soldiers newly > assigned to mobile communications units equipped with microwave > transmitters > in the '60s was to get the new person to climb up on top of the truck, > ostensibly to examine something inside the transmitting antenna, > then turn the > transmitter on for a max power burst while the person was in the > signal path. > Usually knocked 'em right off the van. > > Or so an old friend of mine claimed. > > ;-) > > Cheers, > > RGF > > Robert G. Ferrell, CISSP > Information Systems Security Officer > National Business Center > U. S. Dept. of the Interior > Robert_G_Ferrell@n... > ======================================== > Who goeth without humor goeth unarmed. > ======================================== > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 2851 From: Date: Wed Apr 4, 2001 2:28pm Subject: Caller I.D question In litigation, all " coincidences" must be viewed suspiciously. Material infomation should not be routed through the line(s) in question, until the lawsuit is settled. Often, " when in doubt, there is no doubt." RE ; Humor I laugh , therefore i am. A philosopher once said ,"Life is a veil of tears between two eternitys" Laughter pierces that veil,and allows the spirit to soar. ; >) HAVE A GREAT DAY !!! From: Jay Coote Date: Tue Mar 28, 2000 7:18pm Subject: ISA's ETA-4 Telephone Analyzer I may have a chance to purchase a used ISA ETA-4 telephone analyzer. The short-form instructions say it is capable of: On-hook/off-hook voltage tests Current test Tone sweep High voltage test All-wire Listen I would like hear what the used ETA-4 may be worth, and any other comments from those of you who have used, or own one. (I am thinking, is there much need anymore for high-voltage tests or tonal sweeps?) Thanks, Jay Coote Los Angeles who have one of these units. 122 From: James M. Atkinson, Comm-Eng Date: Tue Mar 28, 2000 8:16pm Subject: Re: ISA's ETA-4 Telephone Analyzer At 8:27 PM -0500 3/28/00, Jay Coote wrote: >From: "Jay Coote" > >I may have a chance to purchase a used ISA ETA-4 telephone analyzer. >The short-form instructions say it is capable of: >On-hook/off-hook voltage tests >Current test >Tone sweep >High voltage test >All-wire Listen > >I would like hear what the used ETA-4 may be worth, and any other >comments from those of you who have used, or own one. (I am >thinking, is there much need anymore >for high-voltage tests or tonal sweeps?) > >Thanks, >Jay Coote >Los Angeles >who have one of these units. Jay, I have been using several telephone analyzers for years including several Winklemann units, a BTA-3, BTA-2, ETA-1, ETA-2, ETA-3, MCS-77, AT&T Loop Analyzer, Several Kaiser units, a Soviet Unit, and others. I would classify telephone analyzers into four separate group, each with its own function: The first is a box designed to check the telephone instrument itself for failure or modification (up to 8 wires at a time, plus earth group). It is actually quite easy to check a given model of phone when such a system is used. Of course you still need to do a physical inspection, along with an optional X-ray. This will commonly have multi-tone generation, "listen in", carrier detection, and so on. The second box is similar to the first but is designed to test "The Loop" or the wiring (such a system ALWAYS includes a TDR), and only a single set of wires are tested at a time (but it may have a multiplexed box, as mentioned below). The most critical of these tests in the TDR mapping, leakage tests, and the voltage tests. The third type of box is one used to test the older 25 pair telephone systems. These systems often contain a "high voltage option" that must be used with caution (keep these monsters away from any modern PBX systems). The fourth is a "Multiplexed Box" that expands any of the above instruments into "thousands of combinations". This is usually done though the use of a bank of CPU controlled reed relays, or (God forbid) manual switches. In answer to you question... YES tonal sweeps (at least 4 tones) is important, so is leakage test, voltage tests, RF tests, and TDR. Stay away from the high voltage tests, and instead use a "Kicker", but only on a limited basis. IMHO, The best all around hands down Telephone Analyzer I have found is the Kaiser 1080H (I sell them for only $2970, which is a tenth to half the price of other units we offer). I would suggest supplementing it with an 2030 for the RF checks (which I have hard wired into mine). The built in TDR is also great (I modified mine to add a ten turn heli-pot for the timing). The battery and compact size makes it great when working in the phone rooms. I also hacked in a pair of mini-WECO jacks so I can use popper clips with greater ease. I also added a small transient limiting circuit which lets my spectrum analyzer couple directly to the line under test. I should add that virtually every instrument I own has been seriously modified (sorry but I'm a geek).Also, the 1080H "kicks-ass" when you add one of the new Fluke 199 oscilloscopes. After almost two decades of "Telephone Analyzer Grief" I ended up sitting down last Fall, designed and then built my own Telephone Analyzer. If anybody out there is interested in my design, give me a call... right now it is purely an analog prototype, but computer control via USB is in the works (as I have spare time). If you can get an ETA-1, or ETA-3 for under $1000 snap it up... other wise spend your money on a Winklemann 200, or a Kaiser 1080H. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 123 From: James M. Atkinson, Comm-Eng Date: Tue Mar 28, 2000 10:36pm Subject: Re: Radio Transcript [Humor] At 8:01 PM -0600 3/28/00, William Knowles wrote: >On Tue, 28 Mar 2000, James M. Atkinson, Comm-Eng wrote: > > > From: "James M. Atkinson, Comm-Eng" > > > > This is the transcript of the ACTUAL radio conversation of a US > > Naval ship and the Canadians, off the coast of Newfoundland, > > October 1995. Radio conversation released by the Chief of Naval > > Operations 10-10-95. > >As much as I have heard this story over and over, During a consulting >gig I had in San Diego last year I had to ask someone in the Navy if >this was really true, A Naval officer I had got to know over a few >lunches informed me that is an urban legend and later e-mailed me this >URL that explains it. > >http://www.snopes.com/spoons/faxlore/lighthse.htm > >I should also mention that its a favorite story with Big Five >consulting groups and it was also debunked in a past issue of >Fast Company magazine. > >Cheers! > >William Knowles >wk@c... I know it's an urban legend...but it's close to April Fools Day so I said what the hell. (grin) -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 124 From: William Knowles Date: Tue Mar 28, 2000 8:01pm Subject: Re: Radio Transcript [Humor] On Tue, 28 Mar 2000, James M. Atkinson, Comm-Eng wrote: > From: "James M. Atkinson, Comm-Eng" > > This is the transcript of the ACTUAL radio conversation of a US > Naval ship and the Canadians, off the coast of Newfoundland, > October 1995. Radio conversation released by the Chief of Naval > Operations 10-10-95. As much as I have heard this story over and over, During a consulting gig I had in San Diego last year I had to ask someone in the Navy if this was really true, A Naval officer I had got to know over a few lunches informed me that is an urban legend and later e-mailed me this URL that explains it. http://www.snopes.com/spoons/faxlore/lighthse.htm I should also mention that its a favorite story with Big Five consulting groups and it was also debunked in a past issue of Fast Company magazine. Cheers! William Knowles wk@c... *-------------------------------------------------* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen. Alfred. M. Gray, USMC --------------------------------------------------- C4I Secure Solutions http://www.c4i.org *-------------------------------------------------* 125 From: Perry Myers Date: Tue Mar 28, 2000 9:52am Subject: RE: Roswell Andre, I want to party with you! -----Original Message----- From: Andre Holmes [mailto:1ach@g...] Sent: Monday, March 27, 2000 3:42 PM To: TSCM-L@onelist.com Subject: Re: [TSCM-L] Roswell From: "Andre Holmes" <1ach@g...> I want to clear up any misconceptions about real flying sausers.It was 1992 I was asleep in my camper a travel trailer located on high ground topographical area plus 500 acres much of it unseen by humans I got lost one day and hiked four grulling hrs till I reached a road luckey for me I was armed shotgun and 45 ready for any attack.That was one day on the other day while asleep it was a summer night pitched black small acorns were on the trees,I started to get hot and I was sweaton. I saw this bright white lighted flying object about 300 ft above tree tops it was to my left.It was then that I realized It was a UFO by then one of the resident land owners down over the ridge beyound the creek opened up on the ufo with a 12 gauge shotgun I heard of storys of people trying to take on ufos and losing believe me humans can knock it out of the sky with heat seeking projectiles from silos only,now what did the shooting do to the spacecraft nothing accept it moved out of projectairy range of the shooting.It got closer to me maintaing tree top height about 100ft I heard the engines they were smooth real quite Id say two engines it was like hearing properly tuned honda engines. My skin did get blocky I also communicated with it using a mag flashlite I flickered it on and off took about 25sec for them to respond then how ever many times I flicker four then four acorns fell from the trees you could hear then and count them as well.I would say it was not as big as a football field.You could not get a real good look at it because it would hover in and out and the glow of lights would throw your vision off sometimes you would see four lights when it moved out then two lights when it moved in.I did not have a working camera only buris 10-50s at the time.Since then I have seen two unducumented animals on two legs that eats meat one actually stalks me through the woods so I always have softnose bullets all the time.That was a true story and the locals can back it up and if you are daring and can shoot staight you can hike out there and camp for three days with optics you will see the animal stalk you,but I plan on getting it on film first then I will go national with it. When we are in space moris code should be sent out in all directions then have cameras picking up movement of a UFO. -----Original Message----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Date: Monday, March 27, 2000 11:37 AM Subject: [TSCM-L] Roswell >From: "James M. Atkinson, Comm-Eng" > >Keep this in mind as "Election 2000" gains momentum... > >On July 1, 1947, witnesses claim a spaceship with five aliens aboard >crashed on a sheep and cattle ranch outside Roswell NM, an incident >they say has been covered up by the military. > >On March 31, 1948, exactly nine months after that day, Al Gore was born. > >-jma > =================================================================== > Sed quis custodiet ipsos Custodes? > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Copyright 2000, James M. Atkinson, All Rights Reserved > >------------------------------------------------------------------------ >MAXIMIZE YOUR CARD, MINIMIZE YOUR RATE! >Get a NextCard Visa, in 30 seconds! Get rates as low as >0.0% Intro or 9.9% Fixed APR and no hidden fees. >Apply NOW! >http://click.egroups.com/1/2122/0/_/507420/_/954175054/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > ------------------------------------------------------------------------ PERFORM CPR ON YOUR APR! Get a NextCard Visa, in 30 seconds! Get rates as low as 0.0% Intro or 9.9% Fixed APR and no hidden fees. Apply NOW! http://click.egroups.com/1/2121/0/_/507420/_/954199248/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 126 From: William Knowles Date: Wed Mar 29, 2000 2:31am Subject: Spy lesson No 1: don't lose your laptop Also worth looking at: Lifting the lid on a trick of the trade: http://www.telegraph.co.uk:80/et?ac=001348276150442&rtmo=aNb8JxpL&atmo=99999999&pg=/et/00/3/29/nlap129.html Spy lesson No 1: don't lose your laptop http://www.telegraph.co.uk:80/et?ac=001348276150442&rtmo=aTdKJ5WJ&atmo=99999999&pg=/et/00/3/29/nlap29.html London: Details of the British intelligence services techniques - "tradecraft" - stored in a laptop computer that was left in a taxi were not encrypted and could have been read by anyone. The computer was left by an MI6 officer - thought to be a female trainee - who had spent the evening drinking with colleagues in a tapas bar about a mile from the MI6 building at Vauxhall Cross in central London. It was lost on March 3, one day before another laptop containing secret information was stolen from an MI5 officer at Paddington station. MI5 said that although information on its stolen computer concerned Northern Ireland, there was no threat to national security and no lives were at risk. In addition, the computer's classified data was encrypted and could not have been read without a separate electronic keying device. MI6 is responsible for foreign intelligence and MI5 handles internal security. By contrast, the "training material" on the MI6 computer was not encrypted, and worried intelligence officers were forced to ask police who recovered it 13 days later if anyone had read it. So frantic were they to recover the computer that they placed an advertisement in the classified columns of the London Evening Standard purporting to be from an "academic" and offering a "substantial reward". The advertisement claimed that the Toshiba 4000 series CDS, a top of the range laptop, contained vital research notes for his PhD. Its loss was important enough for Robin Cook, Foreign Secretary, to be informed, but the Metropolitan Police recovered the laptop two weeks later. An inquiry is under way into the incident and reports will go to Mr Cook and the intelligence and security committee, the parliamentary watchdog which oversees the activities of MI5, MI6 and GCHQ. A Foreign Office spokesman said: "We were assured by the police that the laptop was not compromised. It largely held training information. It was not something hugely damaging." But there is no doubt that the loss of the computer is very embarrassing to MI6, which makes a great play of the fact that it never reveals details of its operations. It has even refused to release its historical archives from the First World War, arguing that to do so risks putting off potential agents who would not want to know that at some point their names would be revealed. Marco Rebato, owner of Rebato's, the tapas bar where MI6 staff apparently congregate, said he had no recollection of a drunken spy. He said: "No MI6 agents or anybody else came back to my bar to say they had lost their laptop or left it behind. If someone that drunk had been in, we would have remembered straightaway. It's not like we would know there are secret agents coming here." But Frank Henry, owner of nearby South Lambeth Cars, said he had been visited by two men who asked if a laptop had been left in one of his cars. He said: "It was all a bit odd. I got a visit from two smartly dressed men who said they had lost a briefcase with something important in it which they thought they might have left in a taxi. "I remember them saying that they had been to a tapas bar just down the road and that they had been the worse for wear that night. One said they couldn't remember which cab firm they called because they were in such a state and they were trying all of them in the area. "They seemed a bit cagey, as if they were trying to bluff me or play a game, like they didn't want to tell me everything although I suppose they were quite friendly. We had no record of being called out when they said." Sir Tom King, chairman of the parliamentary watchdog, said insufficient thought had been given to the impact of new technology. He said: "It goes right to the heart of intelligence and security. They depend on people, often very brave people, being willing to give them information. People risk their lives in giving the information in the confidence that those agencies will keep it protected." *-------------------------------------------------* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen. Alfred. M. Gray, USMC --------------------------------------------------- C4I Secure Solutions http://www.c4i.org *-------------------------------------------------* 127 From: Steve Whitehead Date: Wed Mar 29, 2000 10:54am Subject: Re: ISA's ETA-4 Telephone Analyzer Dear Jay We have been using ISA equipment for a number of years and found that their equipment works well. We use both the ETA-3A and the new Winkelmann 200/B Multi-line Telephone Line Analysers, depending on the assignment. The ETA-3A is for instance compatible with the ECR-2 Spectrum Analyser Receiver and we also use a Tekronix THS720A scope with it. As far as I know the ETA-4 is a limited edition and I presume will probably also be compatible with other measuring equipment. You are welcome to have a look and read more about the new 200/B TLA at our web site http://www.tscm.co.za We have a Winkelmann 200 model TLA for sale that is still in a prestine condition. Regards Steve Whitehead TSCM Services cc South Africa E-Mail info@t... > From: "Jay Coote" > > I may have a chance to purchase a used ISA ETA-4 telephone analyzer. > The short-form instructions say it is capable of: > On-hook/off-hook voltage tests > Current test > Tone sweep > High voltage test > All-wire Listen > > I would like hear what the used ETA-4 may be worth, and any other comments from those of you who have used, or own one. (I am thinking, is there much need anymore > for high-voltage tests or tonal sweeps?) > > Thanks, > Jay Coote > Los Angeles > who have one of these units. > > > ------------------------------------------------------------------------ > LOW RATE, NO WAIT! > Get a NextCard Visa, in 30 seconds! Get rates > as low as 2.9% Intro or 9.9% Fixed APR and no hidden fees. > Learn more at: > http://click.egroups.com/1/937/0/_/507420/_/954292737/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 128 From: Jay Coote Date: Wed Mar 29, 2000 10:25pm Subject: Re: ISA's ETA-4 Telephone Analyzer Steve; Thanks for the information. I'll research this ISA unit some more, and may make an offer to the seller. Jay ---------- > From: "Steve Whitehead" > > Dear Jay > > We have been using ISA equipment for a number of years and found that their > equipment works well. We use both the ETA-3A and the new Winkelmann 200/B > Multi-line Telephone Line Analysers, depending on the assignment. > > The ETA-3A is for instance compatible with the ECR-2 Spectrum Analyser > Receiver and we also use a Tekronix THS720A scope with it. As far as I know > the ETA-4 is a limited edition and I presume will probably also be > compatible with other measuring equipment. > > You are welcome to have a look and read more about the new 200/B TLA at our > web site http://www.tscm.co.za > > We have a Winkelmann 200 model TLA for sale that is still in a prestine > condition. > > Regards > > Steve Whitehead > TSCM Services cc > South Africa E-Mail info@t... > > > From: "Jay Coote" > > > > I may have a chance to purchase a used ISA ETA-4 telephone analyzer. > > The short-form instructions say it is capable of: > > On-hook/off-hook voltage tests > > Current test > > Tone sweep > > High voltage test > > All-wire Listen > > > > I would like hear what the used ETA-4 may be worth, and any other comments > from those of you who have used, or own one. (I am thinking, is there > much need anymore > > for high-voltage tests or tonal sweeps?) > > > > Thanks, > > Jay Coote > > Los Angeles > > who have one of these units. > > > > > > ------------------------------------------------------------------------ > > LOW RATE, NO WAIT! > > Get a NextCard Visa, in 30 seconds! Get rates > > as low as 2.9% Intro or 9.9% Fixed APR and no hidden fees. > > Learn more at: > > http://click.egroups.com/1/937/0/_/507420/_/954292737/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > ------------------------------------------------------------------------ > PERFORM CPR ON YOUR APR! > Get a NextCard Visa, in 30 seconds! Get rates as low as > 0.0% Intro or 9.9% Fixed APR and no hidden fees. > Apply NOW! > http://click.egroups.com/1/2121/0/_/507420/_/954352959/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 129 From: James M. Atkinson, Comm-Eng Date: Thu Mar 30, 2000 1:29pm Subject: Estimate Worksheet First I would like to thank all of the list members who offered feedback on the estimate worksheet I was working on last week. The final version of it has now been pasted into an active page on my website. If anyone is interest in the final product you can find it at the following link. http://www.tscm.com/howcost.html It is a shortened version of the one I myself use for estimating projects, but I've arranged it so that non technical people should be able to understand it, and work out an estimated project cost (this one is 3-4 pages long). The full 50+ page estimate worksheet I use can accurately estimate (or model) a sweep to within +/-15 minutes on a 4 day sweep. I had considered break out the construction elements a bit more, and listing the costs of the physical inspection (ie: NLJD, Xray, Thermal), but I am still undecided. I am a bit undecided on how far I want to break down the computer and videophone based inspections (as they can take a great deal of time, and should be handled as a project within itself). Same with ISDN, T-Carrier, and related evaluations. The other issue, is breaking down the external RF surveys... I generally like to run at least three external RF sweeps outside of the building, and then at least two internally sweeps before I check the sound stage. The problem is how do I break this down so that the customer finds the RF segment easy to understand, and is comfortable with someone spending 6+ hours on it? I also have considered adding "times" to the worksheet so that customers can see that it takes 10-15 minutes for this, 30 minutes for that and so on. Of course you can take the total balance, and simple divide my daily rate. Your feedback will be greatly appreciated (as always) -jma PS: Ahem... on an added note... several list members (who will remain nameless) have already ripped off my estimate worksheet and plastered it up on their website... please ask first, give me credit, and at least buy me dinner (flower are optional). =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 130 From: Andre Holmes <1ach@g...> Date: Thu Mar 30, 2000 1:35pm Subject: VBA Jim Im interested in learning more about the VBA and its applications, power requirements, and its limitations as far as what antennas can and cannot be used with it. [Non-text portions of this message have been removed] 131 From: James M. Atkinson, Comm-Eng Date: Thu Mar 30, 2000 1:54pm Subject: Re: VBA At 2:35 PM -0500 3/30/00, Andre Holmes wrote: >Jim Im interested in learning more about the VBA and its >applications, power requirements, and its limitations as far as what >antennas can and cannot be used with it. The VBA is an excellent little antenna which gives the 2.4 GHz ISM band a little bit of a boost, and makes it a lot easier to find various microwave threats including video devices. Technically it is a "Threat Specific Antenna" in that it is high gain, and focused (or concentrated) on a fairly narrow chunk of the RF spectrum. The VBA combines a small log periodic antenna (which is highly directional) along with a preamplifier. If you have an OSCOR, or an AVCOM spectrum analyzer you will want one of these antennae. By the way... I sell them for $495, so let me know if I can help you out. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 132 From: Jay Coote Date: Fri Mar 31, 2000 7:44pm Subject: Good mobile antenna for outside the sound stage? I'd like to hear about good mobile antennas for RF monitoring from outside the sound stage. For scanner listening and VHF low/high and UHF monitoring, I have used Radiall-Larsen NMO dual-band antennas. These are designed for VHF 150-something and UHF 460-something and have some lowband performance although I have not swept one. Plus- it looks like a plain comms antenna on the van. I have seen other "patch" "dome" and "blade" stealth antennas, some stick in vehicle windows like a decal, others are not as obtrusive as a whip antenna. Some of the companies who produce L/E surveillance vans make good use of ladder racks and other equipment which would look normal on a service truck or van to disguise their VHF/UHF/MW antennas... For VLF-HF, I suppose one could use a standard 1-meter whip and an "active whip" preamplifier (with VLF upconvertor if the TSCM receiver is "numb" on VLF). Smaller yagis or microwave LP and horn antennas could simply go behind the vehicle's windows, aimed towards the site. Ideas? Jay Coote Los Angeles 133 From: James M. Atkinson, Comm-Eng Date: Sat Apr 1, 2000 0:33pm Subject: Re: Good mobile antenna for outside the sound stage? At 12:53 PM -0500 4/1/00, Jay Coote wrote: >I'd like to hear about good mobile antennas for RF monitoring from outside >the sound stage. > >For scanner listening and VHF low/high and UHF monitoring, >I have used Radiall-Larsen NMO dual-band antennas. These >are designed for VHF 150-something and UHF 460-something and have some >lowband performance although I have not swept one. Plus- it looks like a >plain comms antenna on the van. >I have seen other "patch" "dome" and "blade" stealth antennas, some >stick in vehicle windows like a decal, others are not as obtrusive as a >whip antenna. Some of the companies who produce L/E surveillance >vans make good use of ladder racks and other equipment which >would look normal on a service truck or van to disguise their VHF/UHF/MW >antennas... >For VLF-HF, I suppose one could use a standard 1-meter whip >and an "active whip" preamplifier (with VLF upconvertor if the TSCM receiver >is "numb" on VLF). >Smaller yagis or microwave LP and horn antennas could simply go behind >the vehicle's windows, aimed towards the site. > >Ideas? > >Jay Coote >Los Angeles > In TSCM we are not (or should not) be generating any type of RF field, and because of this antenna designed for transmitting should be avoided (such as most ham radio antenna's). Also since we are hunting for extremely low powered signals I would encourage you to stay away from NMO mounts or any other type of "mechanical/electrical connection" between the antenna and cable. I have had really good luck with some of the Radio Shack magnetic mount scanner antenna's as the new one have a BNC connector instead of the old Motorola jack. I add a small pre-amp into the base, and supply DC voltage over the coax to power it (which I draw from my radio or SA). The antenna works well from 45 MHz to about a 1 GHz, but does a decent job on 2.4 GHz on hot signals. Above about 1 GHz though it is helpful to use a wave guide (1-18) pointed out a window (I clamp mine to the headrest and cover it with a straw hat) and then drive around the area. Since the wave guide will also "suck in" signals below 1 GHZ I can get fairly decent coverage from 800 MHz to about 22 GHz which is fine for my initial scans. Below 45 MHz I have had good luck with active loops, but they are none too subtle. I have had my best luck by simply mag mounting an omni-directioanl antenna to the vehicle roof in the exact center, and ensuring a good electrical ground. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 134 From: Rick Date: Sun Apr 2, 2000 2:12am Subject: Re: For Sale: Kaiser SCD5 Dear Mr. Martz, I may be interested in this particular unit. Please contact me by telephone @ (979) 244-4920 to discuss. Thanks, Rick Udovich Michael Martz wrote: > From: Michael Martz > > Hello, > > I have an unused new in box Marty Kaiser SCD5 Carrier Current > detector for sale for $200 if anybody needs one. > > The battery powered SCD5 detects VLF (10 KHz to 700 KHz) > carrier-current signals on AC power or telephone lines. The unit is > supplied withdetector/amplifier assembly, AC and telephone input > cables (both protected to 400 volts DC or 50/60 Hz AC) and headset. > > Please email for any questions. > > Thanks, > > MM > > ------------------------------------------------------------------------ > DON'T HATE YOUR RATE! > Get a NextCard Visa, in 30 seconds! Get rates as low as > 0.0% Intro or 9.9% Fixed APR and no hidden fees. > Apply NOW! > http://click.egroups.com/1/2120/0/_/507420/_/953072859/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 135 From: Jesse Thomas Date: Fri Mar 31, 2000 3:07pm Subject: good wiretapping articles http://www.free-market.net/spotlight/wiretapping/ [Non-text portions of this message have been removed] 136 From: Robert G. Ferrell Date: Mon Apr 3, 2000 11:13am Subject: Re: antenna Speaking of antennas, here's one that ought to interest you guys: http://www.patents.ibm.com/details?&pn=US06025810__&s_all=1#23 Sort of an interdimensional walkie-talkie. I wonder what class of HAM you have to be to use this? Amateur-over-extended? :-) RGF Robert G. Ferrell, CISSP Information Security Officer National Business Center, US DoI Robert_G_Ferrell@n... ------------------------------------------------------------ Nothing I have ever said should be construed as even vaguely representing an official statement by the NBC or DoI. ------------------------------------------------------------ 137 From: Maloid, William Date: Tue Apr 4, 2000 7:36am Subject: Deletion from mail list Please remove me from your mailing list. Thank you, wcm 138 From: arthur Date: Tue Apr 4, 2000 9:14pm Subject: Re: Deletion from mail list Please delete me from your mail list. Thank you. arthur@m... 139 From: Jay Coote Date: Wed Apr 5, 2000 3:48pm Subject: TDR Comparisons? I am the proud owner of a Tektronics 1502-B TDR with the YT strip chart printout. The manual I have (TM 11-6625-3240-14, June 15, 1993) is vague as to whether this is a "wet" or "dry" line TDR- I've always used the 1502-B with a BNC coaxial protector, but the trade-off is a slight tilt in the display.... I'd like to hear comments on "homebrewing" protectors for the 1502-B as well as comments on other smaller TDRs with specs better our equal to the 1503-C/YT or 1502-C/YT (The 1502 is costlier, has a higher resolution, but only goes out to 2000 feet or so. The 1503 family go out to 50,000 feet on some wire types. The B and C versions have an LCD display and hardly resemble the early 1502 and 1503s.) Thanks, Jay Coote Los Angeles 140 From: James M. Atkinson, Comm-Eng Date: Wed Apr 5, 2000 10:06pm Subject: Re: TDR Comparisons? At 8:53 PM -0400 4/5/00, Jay Coote wrote: >I am the proud owner of a Tektronics 1502-B TDR with the YT strip >chart printout. >The manual I have (TM 11-6625-3240-14, June 15, 1993) is vague as to >whether this is a "wet" or "dry" line TDR- I've always used the >1502-B with a BNC coaxial protector, but the trade-off is a slight >tilt in the display.... > >I'd like to hear comments on "homebrewing" protectors for the 1502-B >as well as comments on other smaller TDRs with specs better our equal >to the 1503-C/YT or 1502-C/YT > >(The 1502 is costlier, has a higher resolution, but only goes out to >2000 feet or so. >The 1503 family go out to 50,000 feet on some wire types. The B and >C versions >have an LCD display and hardly resemble the early 1502 and 1503s.) > >Thanks, >Jay Coote >Los Angeles Jay, The 1500 series is STRICTLY a dry line TDR unless it has the Ethernet option, and even then it is for WET ETHERNET, but DRY "everything else". DO NOT, REPEAT DO NOT use this instrument on "live" telephone lines. I would point out that VR3021 and VR3020 are 5.6 volt diodes on the front end, and that they will "go poof" if you apply loop voltage for anything more then a few seconds. The A6 Ethernet Board bumps these voltages up a bit, but still no where near the voltages found on normal phone lines. In the event that you are lucky enough to have the TDR connected when ring voltage is applied you can expect to damage the unit (which will permanently degrade performance, but not kill the unit). The unit is designed to handle PERIODIC applications up to 400 volts, but it is ill-advised to every apply more then 11.2 volts or you will get screwed up readings. If you get into a pinch and have to use a 1500 series on a wet line then add a cap in series to kill the DC, and a couple of switching diodes to kill anything over 6 volts (and of course a set of zeners). A small impedance matching circuit will also be helpful. Remember the 1500 was designed (many years ago) to test the cabling on antenna's, not telephone loop circuits. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 141 From: Date: Tue Apr 4, 2000 4:02pm Subject: Re: Re: antenna Interesting antenna concept. Arigato. 142 From: Dawn Star Date: Thu Apr 6, 2000 10:46am Subject: Jay, I have a Tektronix 1503 that I've been using since 1980. Its range goes for miles if you know the tricks. It really kicks butt. In 1985 I busted a bunch of federal wiretaps with it and they threw me in jail and set my bail at one million dollars. How's that for certifiable results. Roger P.S. I've used this unit on over 2500 sweeps (25 to 50 lines per sweep) all on active trunks with ring-in's all the time - this unit never misses a beat - and its power lies in using it on active lines including station lines within the local system. [Non-text portions of this message have been removed] 143 From: arthur Date: Thu Apr 6, 2000 0:22pm Subject: Re: Re: antenna please remove my name from mailing list arthur@m... 144 From: arthur Date: Thu Apr 6, 2000 0:40pm Subject: Re: Delete Please delete my name from your mailing list 145 From: arthur Date: Thu Apr 6, 2000 0:41pm Subject: Re: delete Please delete my name from your mailing list 146 From: Date: Thu Apr 6, 2000 0:41pm Subject: Re: Re: Delete Arthur, Please get a clue. Posting to the list is not how you take your self out of it. Erik. 147 From: arthur Date: Thu Apr 6, 2000 3:18pm Subject: Re: Re: Delete I never asked to be posted to the TSCM listing. Have been trying to get off the list. The information given is very good, for the most part, but not of interest to me. 148 From: Robert P. Savoie Date: Thu Apr 6, 2000 3:22pm Subject: Re: Re: antenna Please remove my name from the mailing list. Tech stuff is not my bag. Thanks arthur wrote: > please remove my name from mailing list > > arthur@m... > ----------------------------------------------------------------------- > > ----------------------------------------------------------------------- > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS [Non-text portions of this message have been removed] 149 From: Warren Wotton Date: Thu Apr 6, 2000 11:56am Subject: Stop the Mail,Please Warren Wotton Contact: Brandon University Wotton@B... 270-18th Street 204-727-9665 Brandon,Manitoba CANADA R7A 6A9 CONFIDENTIALITY NOTICE: This message is intended only for the use of the individual or entity to which it is addressed and may contain information that is privileged, confidential and exempt from disclosure under applicable law. If the reader of this message is not the intended recipient you are hereby notified that any dissemination, distribution or copying of this transmission is prohibited. If you have received this transmission in error, please notify us immediately by return E-mail or by telephone at 204-727-4475 and destroy the transmission by deleting the file and/or shredding any paper copy. 150 From: Warren Wotton Date: Thu Apr 6, 2000 4:59pm Subject: Stop the Mail,Please Stop the Mail,Please Warren Wotton Contact: Brandon University Wotton@B... 270-18th Street 204-727-9665 Brandon,Manitoba CANADA R7A 6A9 CONFIDENTIALITY NOTICE: This message is intended only for the use of the individual or entity to which it is addressed and may contain information that is privileged, confidential and exempt from disclosure under applicable law. If the reader of this message is not the intended recipient you are hereby notified that any dissemination, distribution or copying of this transmission is prohibited. If you have received this transmission in error, please notify us immediately by return E-mail or by telephone at 204-727-4475 and destroy the transmission by deleting the file and/or shredding any paper copy. ------------------------------------------------------------------------ PERFORM CPR ON YOUR APR! Get a NextCard Visa, in 30 seconds! Get rates as low as 0.0% Intro or 9.9% Fixed APR and no hidden fees. Apply NOW! http://click.egroups.com/1/2121/0/_/507420/_/955058226/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Warren Wotton Contact: Brandon University Wotton@B... 270-18th Street 204-727-9665 Brandon,Manitoba CANADA R7A 6A9 CONFIDENTIALITY NOTICE: This message is intended only for the use of the individual or entity to which it is addressed and may contain information that is privileged, confidential and exempt from disclosure under applicable law. If the reader of this message is not the intended recipient you are hereby notified that any dissemination, distribution or copying of this transmission is prohibited. If you have received this transmission in error, please notify us immediately by return E-mail or by telephone at 204-727-4475 and destroy the transmission by deleting the file and/or shredding any paper copy. From: Michael Puchol Date: Thu Mar 28, 2002 0:59pm Subject: Re: Trojan vendor dishes the Dirt Whaaaa??? > "The only reason it is of interest now is because someone got hold of > a marketing presentation that was not for public disclosure. In fact, > the product's existence was not meant to be public knowledge," he > said, adding that "if we find that person we will file a criminal > complaint through the Secret Service". This crap has been on their site for months (maybe even years), for anyone to see - I cannot believe they're saying this... > James said that he would "love to demonstrate the tool", but since > vnunet.com is not an officially recognised law enforcement agency, he > could not. Demonstrate a trojan? There are plenty out there in the wild, just ask NAI or other competent antivirus firm to make a demo, they have quite a collection. > The reputation of Codex has been called into question after it was > revealed by UK news website theregister that company chief executive > Frank Jones is a convicted felon and known fraudster currently on > probation for illegal possession of surveillance devices. 'nuff said. > James was forced to acknowledge that the only reason Dirt is > undetectable by antivirus software is because no antivirus company > has ever seen it, and that it could only be used as a "last resort" > tool after obtaining a court order. If it actually exists, and if its actually used by anyone, which I doubt (both counts) it won't be long until an antivirus company sees it, and then that's it. > As for the ability to bypass firewalls, done by killing the process > in the operating system, there is no explanation as to how it attacks > the firewall in the first place. Any decent firewall will prevent access to and from an outside network, and will signal any attempt to do so. And, if the trojan does what it says, then what better symptom as to it's presence than your firewall spontaneously shutting itself down? > However, Paul Rogers, network security analyst at MIS, who has met > the company, said he was very impressed with the standard of > keyloggers Codex offered, but as he had not seen Dirt in action, he > remained sceptical. Yes, they could fool someone with only basic computing skills, but that's that. Anyway, a pile of cow dung. With flies around it. Cheers, Mike 5074 From: James M. Atkinson Date: Thu Mar 28, 2002 9:49pm Subject: A Perfect Spy A Perfect Spy March 27, 2002 Is George Trofimoff one of the greatest spies ever to betray America, or a loyal army officer who spent a career defending this country? One thing is sure: Col. Trofimoff, retired from the U.S. Army Reserve, is the highest ranking American officer ever convicted of espionage. Last summer, a federal judge sent him to prison for life. During his trial, prosecutors called Trofimoff the perfect spy. He was perfect, they said, because of the extraordinary crime he managed to pull off without ever getting caught. Interviewed by 60 Minutes II correspondent Scott Pelley in a Florida prison, Trofimoff, 74, calls himself "a patriot that served this country for 46 years and a half or 47 years." His story is intertwined with the bloody history of Europe. The Trofimoff family was Russian. He says his grandparents were murdered in the revolution and, as a boy in World War II, he was rescued by American GIs. When Trofimoff joined the U.S. army to fight the communists that murdered his grandparents, he left behind a brother, Igor, who became a clergyman and was a cardinal in the Russian Orthodox Church. Trofimoff spent his career in military intelligence. He was so far above suspicion that he was put in charge of a house in Nuremberg, Germany, where American intelligence would interview defectors from the Soviet Union. The interrogation center contained a library of classified information, everything the U.S. knew about the Soviet Union that interrogators used in questioning defectors. Then in 1992, a Soviet KGB clerk named Vasili Mitrokhin defected and claimed that one of the U.S. interrogation centers was being looted by a spy. He handed over KGB records that showed the stolen American secrets exceeded 80 volumes - 50,000 pages taken over 25 years. Christopher Andrew, a Cambridge University professor who helped British intelligence analyze Mitrokhin's revelations, says the information included military intelligence operations planned and carried out by the United States against the Soviet Union. Mitrokhin didn't have the name of the traitor, but the Soviet files he delivered described the spy as a "career American intelligence officer." And the courier who carried the secrets was a "clergyman" in the Russian Orthodox church. "An American officer who gave it to the Soviets through a Russian priest. And that fit me like a glove. No question about it," says Trofimoff who often met his brother in Germany. "My brother was traveling outside the Soviet Union," he says. "So I have no doubt in my mind that the KGB had their eyes on him. And controlled him in a way." In 1994, Trofimoff and his brother were arrested by the Germans, an arrest based solely on the sketchy description in Mitrokhin's KGB archive. The brothers were released immediately. A judge said there was no evidence that they were the men described in the files. Cleared, Trofimoff left Germany to retire in Melbourne, Fla., where he bought a house on Patriot Drive and settled into a quiet retirement. Then on July 10, 1997, he received a hand-delivered letter from "friends" in the Russian embassy. One of them, Igor Galkin, wrote and phoned from the embassy repeatedly seeking a meeting and offering him money. Trofimoff tells Pelley he thought his brother's church was trying to send him money through Russia's Washington embassy. Trofimoff was in debt and once told his brother he needed cash. So Trofimoff agreed to meet Galkin in Florida. Galkin was an undercover FBI agent and there was a hidden camera in the room. Galkin turned the conversation to military intelligence and asked Trofimoff whether he had ever met KGB agents in Europe. For six hours, the conversation rolled out like a confession with Galkin asking what documents, Trofimoff had stolen from the interrogation center. Trofimoff says he invented a story because he believed if he pretended to be a retired spy, the Russian church would have reason give him money "At the time, I wanted to convince him that I worked for the KGB," Trofimoff tells Pelley. "I can't explain the logic behind it anymore. My major logic was, I need money, they need a reason to help me. They need a justification, so I'm going to try to provide them with that. And that's what I did." At his trial, prosecutors called a star witness, Gen. Oleg Kalugin of the Soviet KGB, who told the jury the names of KGB agents who worked with Trofimoff. They were the same names Trofimoff remembered in one of those phone calls with the FBI undercover agent. But Trofimoff tells Pelley, "I have never met any of these people anywhere. And when I picked those names, I just happened to pick them." In his testimony, Kalugin said he arranged a meeting with Trofimoff in Bad Ischl, Austria, about 150 miles from Nuremberg. Kalugin wrote about this unnamed American spy in his memoirs, but there are key differences between the story he told on the stand and the one in the book. Among other things, the book says there were several meetings and in a different city. Trofimoff says Kalugin is lying. "If you look at the entire trial, they don't have single piece of evidence, except Kalugin," says Trofimoff. "It's what Kalugin says against what I say." But Trofimoff himself said plenty to the undercover FBI agents. He explains this, saying "Kalugin says a lot of things in this book and he admits he lied, right? Now, I said a lot of things during the interview with Galkin, which I admit were lies. If they believed Kalugin's lies were lies, why don' t they believe my lies were lies? You see?" The jury believed the prosecution. Prosecutors said Trofimoff took the files from the interrogation center little by little, photographed them, and gave the film to his brother. They said the motive was money, but they also admitted it was a perfect crime. There's no physical evidence, just the word of a former KGB general. Since this all began, the Communists have fallen and his brother has died. But Trofimoff maintains his innocence. "I can't say something that I don't know," he says. "Because I have never, never had anything to do with them. And I will repeat that until I die, or until I clear my name." © MMII, CBS Worldwide Inc. All Rights Reserved. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5075 From: James M. Atkinson Date: Thu Mar 28, 2002 9:50pm Subject: FBI to divulge more Carnivore details http://news.com.com/2102-1023-870028.html FBI to divulge more Carnivore details By Gwendolyn Mariano Staff Writer, CNET News.com March 27, 2002, 1:40 PM PT Privacy advocates have won another round in their fight to gain access to more information about the FBI's Carnivore e-mail surveillance system. A federal judge this week ordered the FBI to expand its search for records about Carnivore, also known as DCS1000, technology that is installed at Internet service providers to monitor e-mail from criminal suspects. The court denied a motion for summary judgment and ordered the FBI to produce within 60 days "a further search" of its records pertaining to Carnivore as well as a device called EtherPeek, which manages network traffic. The FBI has defended Carnivore by assuring the public that it only captures e-mail and other online information authorized for seizure in a court order, but the Electronic Privacy Information Center (EPIC) has voiced concerns over potential abuse. EPIC sued the FBI, the investigative arm of the Justice Department, in July 2000 under the Freedom of Information Act so it could examine Carnivore-related documents. EPIC "has raised a 'positive indication' that the FBI may have overlooked documents in other FBI divisions, most notably the offices of the General Counsel and Congressional and Public Affairs," U.S. District Judge James Robertson wrote in his order. The court order marks the latest chapter in EPIC's ongoing legal battle with the Justice Department. The lawsuit could have significant implications for the government's tactics of monitoring Internet use in federal investigations. According to the order, the FBI had completed its processing of EPIC's FOIA request, producing a search of 1,957 pages of material but releasing only 1,665 pages to EPIC. The privacy group claimed those records were inadequate, saying they only addressed technical aspects of Carnivore, not legal and policy implications. EPIC General Counsel David Sobel said the FBI and Justice Department have been "very grudging" about the Carnivore information they are willing to release. "A new court-supervised search is likely to result in the release of a lot of significant new information, particularly because the information that we're likely to get now is material dealing with the Justice Department and the FBI's assessment of the legal issues raised by the use of Carnivore," Sobel said. "I think now--especially after Sept. 11 when these kinds of techniques are likely to increase in use--it's even more important that information be made public and how the techniques are being used and how the Justice Department sees the legal issues." In September 2000, the Justice Department commissioned IIT Research Institute, an arm of the Illinois Institute of Technology, to undergo a review of Carnivore. Two months later, the institute released its findings, saying the technology "protects privacy and enables lawful surveillance better than alternatives." The report said Carnivore provides investigators with no more information than is permitted by a given court order and that it poses no risk to Internet service providers. The Justice Department and FBI could not be immediately reached for comment. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5076 From: James M. Atkinson Date: Mon Mar 25, 2002 9:15pm Subject: Sex scandal sparks run on spy cameras in China http://www.nationalpost.com/news/world/story.html?f=/stories/20020322/415172.html Sex scandal sparks run on spy cameras in China 'Friend' videotaped liaison Araminta Wordsworth National Post Sales of mini-cameras are booming in China in the wake of a sex scandal on the other side of the Taiwan Strait in which a politician was secretly filmed romping with her married boyfriend. Many of the cameras, which sell for as little as 100 yuan (about $20), are being snapped up by people who apparently hope to check up on their spouse's activities, the China Daily reported yesterday. The sudden enthusiasm for spying on loved ones is generally credited to the travails of Chu Mei-feng, a former Taipei city councillor who was secretly filmed by a Linda Tripp-like friend having sex with a married lover. The "friend," Kuo Yu-long, sold the 40-minute tape to a local tabloid magazine, Scoop Weekly, which packaged the steamy hijinks on a CD given away with an issue just before Christmas. It was a runaway best-seller. Although the magazine was quickly forced to withdraw the CD, pirated copies are selling for as much as $45 and are even available in China. News of the liaison was also heavily featured on mainland Chinese Web sites. Apart from providing titillating reading, the saga also alerted consumers as to how mini-cameras could be used for spying. China Daily said it found the handy devices selling for between 100 yuan and 3,000 yuan at one electrical appliance store in the southern city of Guangzhou. "I wholesaled more than 400 micro-cameras last month," the owner told the paper. He said some people were buying the cameras to oversee their spouse's activities, while stores and businesses were also using them as security devices. For anxious spouses, the dealer recommended a wireless model that was able to pick up signals within one kilometre. The suddenly growing interest in the mini-cameras is causing some concern in China among those who believe it could pose a major challenge to privacy. "Residents feel unsafe as this method has been used to expose aspects of people's private lives," said Weng Weiquan, a member of the National People's Congress, China's parliament. But there is little people can do except sue if their privacy has been violated, since China has no regulations supervising the sale of surveillance equipment, the paper said. In Taiwan, it is a different story. Ms. Kuo and her co-conspirators, who include a former mayor of the city of Hsinchu and the magazine's owners, have been charged with behaviour detrimental to public morale, theft and document forgery. They face jail terms of up to four years. As for Ms. Chu, the scandal has given her a whole new career. She has written a book about her liaisons with six lovers, given countless media interviews and done a stint as a radio disc jockey. Last week, she travelled to Singapore for a series of pop concerts, which netted her about $129,000. The neophyte performer, who admits she does not sing very well, said she was nervous as she took the stage, but drew courage from her supporters. "If I do not stand up for those who supported and love me, I will be letting them down." awordsworth@n... -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5077 From: Matthew Paulsen Date: Fri Mar 29, 2002 6:32am Subject: Bin Laden used Compact M to dial murder http://www.vnunet.com/News/1130426 Bin Laden used Compact M to dial murder By James Middleton [26-03-2002] Satellite phone records reveal terrorists' moves Phone records for Osama bin Laden were released last week, revealing London and the Home Counties as a hot bed of Al-Qaeda activity. Over 260 calls were made from a satellite phone in Afghanistan between 1996 and 1998 to around 27 numbers in Britain, including calls to terrorist agents and known sympathisers, as well as some inexplicable calls to bizarrely unconnected numbers. Records which have come to light since the trial of the four Al-Qaeda terrorists accused of bombing US embassies in Kenya and Tanzania, show that bin Laden made use of a satellite phone purchased on the credit card of Dr Saad al Fagih, a 45 year-old surgeon who heads the London-based Movement for Islamic Reform in Arabia. The phone in question was a £10,500 Inmarsat Compact M satellite phone with an all weather external antenna and battery and a block of 3,000 pre-paid minutes. Marketing blurb for the phone claims that the Compact M is the "smallest, lightest Inmarsat satellite telephone available and is the ideal communication tool when you don't know where your travels will take you". Over 200 calls were made to the London homes of Khaled al Fawwaz and Ibrahim Eidarous, two Al-Qaeda sympathisers now in prison awaiting extradition to the US for their part in the US embassy bombings. Al Fawwaz kept a note of the satellite phone number in his address book under the name 'Atef'. Muhammad Atef, bin Laden's right hand man, apparently also used the phone to direct Al-Qaeda's operations. According to The Sunday Times, bin Laden stopped using the phone two months after members of the terrorist body bombed the two US embassies in Africa. Apparently he suspected his movements were being traced through the phone and possibly switched to another. One of the more bizarre calls, lasting three minutes, was to a ground floor council flat in Erith, Kent in December 1996. Michelle Urquart, its occupant, is a housewife who lived there with her three children. After the UK, the countries bin Laden called most frequently were Yemen - where terrorists bombed destroyer USS Cole in October 2000 - Sudan, Iran, Azerbaijan, Pakistan, Saudi Arabia and Italy, where police thwarted a poison gas attack on the US embassy earlier this year. Only six calls were made to the US. Iraq is noticeable by its absence on the records. Again this may be because bin Laden suspected his calls were being traced. Calls to the satellite phone number 00873 682 505 331 are met with a "your call cannot be connected" message. vnunet.com has previously reported that bin Laden and the Taleban were customers of Inmarsat, until their accounts were terminated in 2000. 5078 From: James M. Atkinson Date: Mon Mar 25, 2002 9:16pm Subject: Chinese cameras spying on spouses http://news.bbc.co.uk/hi/english/world/asia-pacific/newsid_1885000/1885218.stm Thursday, 21 March, 2002, 11:37 GMT Chinese cameras spying on spouses ======================================= "Residents feel unsafe as this method has been used to expose aspects of people's private lives" Weng Weiquan ======================================= The cameras are easily hidden http://news.bbc.co.uk/olmedia/1885000/images/_1885218_afp_camera300.jpg Mini spy cameras are the latest consumer 'must-have' in southern China, as spouses try to keep tabs on partners and shops keep an eye on theft, according to the China Daily. The state-controlled newspaper said the cameras, which can be easily hidden from sight, were "selling like hot cakes" in south China's Guangdong Province. Officials are worried the cameras could be used intrusively to spy on people and expose their peccadilloes, the paper said. Worries about the cameras even reached China's National People's Congress, where deputy Weng Weiquan called for laws to stop secret filming. "Residents feel unsafe as this method has been used to expose aspects of people's private lives," he said. Taiwan scandal Spy cameras shot into public consciousness after one was used in Taiwan to film a politician having sex with her married lover. Ms Chu's latest performance Taipei City councilwoman Chu Mei-feng was forced from office after the film, which was made without her knowledge, was widely circulated. She has since resurfaced as a pop singer, appearing last week in concert in Singapore. Videos of her sexual performance, reproduced on to optical disks, have been selling well across China and other Asian countries. China Daily said it found spy-cameras selling for between 100 yuan ($12) to 3,000 yuan ($360) in one Guangzhou shop. "I wholesaled more than 400 micro-cameras last month," one dealer told the paper. The dealer said some people were buying the cameras to oversee their spouse's activities, while shops and businesses were also using them as security devices. For anxious spouses, the dealer recommended one wireless camera that was able to pick up signals within one kilometre. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5079 From: Steve Uhrig Date: Fri Mar 29, 2002 8:33am Subject: Re: Bin Laden used Compact M to dial murder Once upon a midnight dreary, Matthew Paulsen pondered, weak and weary: > Satellite phone records reveal terrorists' moves > Phone records for Osama bin Laden were released last week, revealing > London and the Home Counties as a hot bed of Al-Qaeda activity. Over > 260 calls were made from a satellite phone in Afghanistan between 1996 > and 1998 to around 27 numbers in Britain, including calls to terrorist > agents and known sympathisers, as well as some inexplicable calls to > bizarrely unconnected numbers. We knew this BEFORE 9/11. I was and am working Sigint on this matter. Here is an article with some info on what we were doing and knew BEFORE the world knew his name. We had him on Inmarsat months before 9/11, and trying to unravel the networks of shill/shell companies he had set up all in a circle back to each other was frustrating but rather fun once we started to see the pattern. http://www.business2.com/articles/mag/print/0,1643,17511,00.html The full article in the printed copy of the magazine had a lot more specific details than the excerpt above. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5080 From: A Grudko Date: Fri Mar 29, 2002 8:25am Subject: Bin Laden - Humour, unrelated to Easter. NO REFLECTION ON MY FRIEND MATTHEW WHO POSTED THIS.... Interesting but it is just the usual journalistic 'sleight of hand' to turn ten off-the-wire words into a 600 word column. - Original Message ----- > Phone records for Osama bin Laden were released last week, revealing London > and the Home Counties as a hot bed of Al-Qaeda activity. > Over 260 calls were made from a satellite phone in Afghanistan between 1996 > and 1998 to around 27 numbers in Britain, including calls to terrorist > agents and known sympathisers, as well as some inexplicable calls to > bizarrely unconnected numbers. Perhaps the media should find a reporter who can count over 260. OK, let's take 269 - that's an average of about one call every 3 days to the UK. > Over 200 calls were made to the London homes of Khaled al Fawwaz and Ibrahim > Eidarous, two Al-Qaeda sympathisers now in prison awaiting extradition to > the US for their part in the US embassy bombings. So that leaves 'over' 60 calls to 'bizarrely unconnected numbers'. Do the media expect terrorists to only phone sequential numbers? Even international terrorists order take away pizza and book cinema tickets. 60 calls in 730 days = one every 13 days or so. Golly gosh, that is really earth shattering. > Apparently he suspected his movements were being traced through the phone > and possibly switched to another. Aparantly? This is not a fool. He is running rings around Bush, Powell, Blair etc. Megatonnes of munitions are being thrown at Afghanistan and he's on the phone to his Mum making fun of the west. Of course he suspected it. His phone switched to another! Amazing - no wonder with such advanced technology he is able to evade the combined allied forces. At that rate my teenage daughters could take over Quantico tomorrow and Langly on Sunday. Imagen the damage if OBL ever gets hold of a cell phone.... > One of the more bizarre calls, lasting three minutes, was to a ground floor > council flat in Erith, Kent in December 1996. Michelle Urquart, its > occupant, is a housewife who lived there with her three children. The Homo Office released this transcript: "Err, Hello, Salaam." "Wot" "This is Osama - I saw your add in the December 1996 Hustler - sorry, post is a bit slow to these caves" "Wot?" "Is that Mistress Susan?" "No, I'm Michelle" "Is Mistress Susan there?" "Wot?" "I've been a bad boy and I want to be spanked" And so forth for 3 minutes. Bizarre indeed - anyone in the Home Office can tell you that Mistress Susan retired last year! ;-) This reporter gives no substance to his/her reporting. It is blatant sensationalism of the type that creates the imaginary 'facts' we all see circulated on the net. > After the UK, the countries bin Laden called most frequently were Yemen - > where terrorists bombed destroyer USS Cole in October 2000 - Sudan, Iran, > Azerbaijan, Pakistan, Saudi Arabia and Italy, where police thwarted a poison > gas attack on the US embassy earlier this year. Only six calls were made to > the US. Oh oh. Now it gets serious. Were these calls to the Trilateral commission? Louis Farrakan? Pres. GW Bush? Mohammed Ali? Pres. Hillary Clinton? Bartv Simpson? The NBA? The CIA. > Iraq is noticeable by its absence on the records. Again this may be because > bin Laden suspected his calls were being traced. Or they would not pay for collect calls. A totally specious train of thought - why bring Iraq into it if it was not there! > Calls to the satellite phone number 00873 682 505 331 are met with a "your > call cannot be connected" message. If I was OBL I'd be complaining about this shocking service and suing Imarsat. Typical of a capitalist imperialst expansionist Service Provider. :-) On the other hand, if I was the ISP or reporter I'd publicise 00873 682 505 331 - a pay to dial number - and watch the money roll in from curious folks round the world. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 5081 From: Richard Gray Date: Sun Mar 24, 2002 3:32pm Subject: Spy Software Detection Help Is there any software that will detect logging and spyware programs installed on a computer? Ricky _________________________________ Richard T. Gray Jr. Legal Investigator License No. 1914-050896-LA Gray & Associates, LLC PO Box 2368 Crowley, LA 70527 337-785-0046 Voice 800-394-8216 Fax www.la-pi.com ricky@l... "When you need to know!" -----Original Message----- From: Marko Radovic [mailto:radovic_marko@y...] Sent: Friday, March 22, 2002 2:12 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] ISO 17799 Hello, I would like to thank all the pepople who privided help and information cocerning ISO 17799 standard. Any additional information about standard is welcome. Marko __________________________________________________ Do You Yahoo!? Everything you'll ever need on one web page from News and Sport to Email and Music Charts http://uk.my.yahoo.com Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 5082 From: Steve Uhrig Date: Fri Mar 29, 2002 2:46pm Subject: No free lunch The below is clipped from another list, and what pisses me off is that is is 100% true. I made a specific note in my daytimer. I last reset all this crap on yahoogroups on Jan 21st, to off. This morning I checked, and every bloody one was turned back on. I don't believe I have signed up with any new groups or made any changes to my account since Jan 21st which would give these clowns license to change all my preferences. We pay for use of their servers and service a lot more than by the advertising tag line appended to all our messages. I may research the personal email addresses and fax numbers of the owners of yahoogroups, and make sure a sufficient portion of the spam I receive is forwarded directly to them. If I put a mind to it, I can uncover their addresses as fast as they change them, and let them see what it feels like. ============================ Yahoo has apparently made a sneaky change to everybody's "Marketing Preferences," changing all their "No's" to "Yes," the result of which will be a load of spam. To change it back: Go to Yahoo Groups (http://groups.yahoo.com) and sign in. Go to My Groups and click on Account Info, verify your password if it asks you to, and your Yahoo ID card comes up. Click on 'Edit your Marketing Preferences' and change all those Yea's back to No's. Click Save Changes. ==================== Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5083 From: Date: Fri Mar 29, 2002 10:17am Subject: Re: Spy Software Detection Help In a message dated 3/29/02 8:01:52 AM Pacific Standard Time, laspy1@y... writes: << Is there any software that will detect logging and spyware programs installed on a computer? >> http://www.hushmail.com/spycop/ 5084 From: Matthew Paulsen Date: Fri Mar 29, 2002 3:27pm Subject: RE: Spy Software Detection Help A large list of applications used for anti-spyware. http://download.cnet.com/downloads/1,10150,0-10001-103-0-1-7,00.html?tag=src h&qt=spyware&cn=&ca=10001 -----Original Message----- From: MACCFound@a... [mailto:MACCFound@a...] Sent: Friday, March 29, 2002 1:17 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Spy Software Detection Help In a message dated 3/29/02 8:01:52 AM Pacific Standard Time, laspy1@y... writes: << Is there any software that will detect logging and spyware programs installed on a computer? >> http://www.hushmail.com/spycop/ Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5085 From: DrPepper Date: Fri Mar 29, 2002 3:31pm Subject: Re: No free lunch JMA, , , , THIS is exactly what I was talkikng about, , , , And I see that I am stil recieveing TSCM. Ron C. Steve Uhrig wrote: > The below is clipped from another list, and what pisses me off is that is > is 100% true. > > I made a specific note in my daytimer. I last reset all this crap on > yahoogroups on Jan 21st, to off. > > This morning I checked, and every bloody one was turned back on. > > I don't believe I have signed up with any new groups or made any changes > to my account since Jan 21st which would give these clowns license to > change all my preferences. > > We pay for use of their servers and service a lot more than by the > advertising tag line appended to all our messages. > > I may research the personal email addresses and fax numbers of the owners > of yahoogroups, and make sure a sufficient portion of the spam I receive > is forwarded directly to them. If I put a mind to it, I can uncover their > addresses as fast as they change them, and let them see what it feels > like. > > ============================ > > Yahoo has apparently made a sneaky change to everybody's "Marketing > Preferences," changing all their "No's" to "Yes," the result of which > will be a load of spam. To change it back: > > Go to Yahoo Groups (http://groups.yahoo.com) and sign in. Go to My > Groups and click on Account Info, verify your password if it asks you to, > and your Yahoo ID card comes up. Click on 'Edit your Marketing > Preferences' and change all those Yea's back to No's. Click Save Changes. > > ==================== > > Steve > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 5086 From: James M. Atkinson Date: Mon Mar 25, 2002 9:13pm Subject: FBI Moves To Prevent Espionage http://www.guardian.co.uk/uslatest/story/0,1282,-1605657,00.html FBI Moves To Prevent Espionage Saturday March 23, 2002 1:10 AM WASHINGTON (AP) - Since capturing a spy in its ranks, the FBI has reduced the number of agents with access to sensitive intelligence and conducted hundreds of polygraphs that have identified possible problems with about 10 employees, officials said. Senior FBI officials said the intensified focus on preventing espionage also has increased the number of disciplinary cases in the last six months involving employees. No new espionage suspects have been identified, officials said. Most matters have been referred to the FBI's Office of Professional Responsibility, which investigates internal wrongdoing, the officials said. ``Our goal is to bring the culture along to the point where security is considered part of the daily operations,'' said Ken Senser, a CIA employee who was brought over to the FBI in 1999 to improve internal security. He now oversees the FBI's new security division. Over the last six months, the FBI has reduced by hundreds the number of employees who have access to Sensitive Compartmented Information (SCI), which is even more sensitive than top secret intelligence. Roughly half of the FBI's 28,000 employees held SCI clearance at times before the number was reduced. Officials said the new, lower figure is classified, but only employees with a need to know such information for their immediate jobs now hold the high-level clearance. ``We focused on the numbers of people who had access to SCI and actually we were able to reduce that number noticeably,'' Senser said. Former CIA and FBI Director William Webster is wrapping up a massive review of the FBI's internal security in the aftermath of the Robert Hanssen spy case. The senior agent spied for Russia for more than a decade without U.S. detection. While awaiting Webster's recommendations, the FBI agreed to answer questions earlier this week from The Associated Press about some of the changes and findings already made. FBI officials said they have conducted more than 700 polygraphs of FBI agents and workers with access to the most sensitive information and have identified a small number whose tests raised flags, such as possible deception, that warranted additional scrutiny. Officials said the number was just over 1 percent of those tested - just under 10 workers. They declined to be more specific, citing ongoing investigations and personnel privacy. Officials said that some workers whose polygraphs raise initial concerns about deception may eventually be cleared because things like medical conditions can cause anomalies on the tests. But they described a broad effort to remake the FBI's internal security procedures. Assistant FBI Director John Collingwood said internal security for too long was not given the priority and emphasis it needed inside an agency whose primary focus was catching criminals and which relied on a family oriented system of trust. ``We have failed to do those basic things, as mundane as they may seem, that are vital, and that are becoming increasingly vital, in today's world,'' Collingwood said. In March 2001 as the bureau was still reeling from the breadth of Hanssen's espionage, then-Director Louis Freeh announced several changes that included increased use of polygraphs. New Director Robert Mueller has gone even further, reorganizing the entire structure of the FBI to put added emphasis on terrorism prevention and improved internal security. FBI officials said a key focus will be on a multiyear project to craft new computer systems that will detect suspicious activity as it is occurring rather than years later. The goal eventually is to provide FBI supervisors with regular reports ``that says these are 10 things that happened last night that you ought to look into that are causes of some concern,'' Senser said. In the interim, every FBI field office has created a security council to routinely review issues of security and sensitive intelligence in day-to-day operations. The sharper focus on security isn't limited to the FBI. The Justice Department this month enacted tighter restrictions against foreigners working on computer systems at the department. Officials indicated they may allow foreigners to continue working on some current projects if they determine there is ``an acceptable level of risk,'' according to an internal memo. ``Waivers will be granted only in exceptional and unique circumstances,'' but foreigners would never be allowed to work on classified technology systems at Justice, the memo said. ^--- On the Net: FBI: http://www.fbi.gov Guardian Unlimited © Guardian Newspapers Limited 2002 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5087 From: James M. Atkinson Date: Fri Mar 29, 2002 8:38pm Subject: THE 2002 U.S. BIG BROTHER AWARDS CALL FOR NOMINATIONS THE 2002 U.S. BIG BROTHER AWARDS On April 18, 2002, Privacy International will hold the fourth U.S. "Big Brother Awards" to name and shame the public and private sector individuals and organizations which have done the most to invade personal privacy in the United States in the past year. Three distinctive "Orwell" statutes of a golden boot stomping a head will be presented to the government agencies and officials, companies and initiatives which have done most to invade personal privacy in the previous year. A "lifetime achievement" award will also be presented to the organization that has systematically invaded privacy over a long period of time. Previous "winners" include The Federal Bureau of Investigation, the National Security Agency, DoubleClick, ChoicePoint, The FAA's BodyScan system, the Department of Commerce and Microsoft. The judging panel, consisting of lawyers, academics, consultants, journalists and civil rights activists, are inviting nominations from members of the public. Nominations can be made directly from the site: http://www.privacyinternational.org/bigbrother/us2002/ Privacy International will post the 'most popular' current nominations on its' site. "Brandeis" awards will be also be given out to champions of privacy. The Brandeis Award is named after US Supreme Court Justice Louis Brandeis, who is considered the father of American privacy law, describing privacy as "the right to be left alone." The awards are given to those have done exemplary work to protect and enhance privacy. Previous winner include Phil Zimmermann, creator of PGP, Beth Givens, founder of the Privacy Rights Clearing House and Robert Ellis Smith, editor of the Privacy Journal. The Big Brother Awards are now in their fourth year. There have been ceremonies in the UK, the US, Germany, Austria, Switzerland, Hungary, France, Denmark and the Netherlands. This event will mark the 20th ceremony. Further information can be found at on the PI website at http://www.privacyinternational.org/bigbrother/. The initiator of the awards, Privacy International, was founded in 1990, and campaigns on a wide range of privacy issues across the world. More information on Privacy International is available at: http://www.privacyinternational.org/ The ceremony will be held at the Cathedral Hill Hotel in San Francisco, Cal at the 2002 Computers, Freedom and Privacy Conference. More information on CFP 2002 is available at: http://www.cfp2002.org/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5088 From: Steve Uhrig Date: Fri Mar 29, 2002 9:01pm Subject: More on Yahoo SPAM Here's a copy of the press release about Yahoo! changing your email preferences without telling you about it, posted to the Usenet newsgroup news.admin.net-abuse.email by a former Yahoo! employee. This was NOT sent to list owners or moderators (or Yahoo users). Wonder why? Steve ------------------------ From: Derek Balling Newsgroups: news.admin.net-abuse.email Subject: Yahoo - Where "No" means "Not Now" Date: Thu, 28 Mar 2002 06:55:16 -0500 According to: http://biz.yahoo.com/djus/020327/200203272215000735_1.html Yahoo will now be requiring users - even those who have previously opted out of mailings from the company, to go and re-edit their preferences because the default option on a plethora of new e-mail categories is "to get spammed". So if you signed up for an account three years ago, said "don't e-mail me" and promptly forgot about the account, prepare for an onslaught of e- mail that you may not easily be able to get rid of if you don't remember the account particulars. "The company is essentially using this requirement to promote its newer services. For instance, users who signed up for Yahoo two or three years ago -- and who opted out of promotional e-mails at the time -- might not be aware that Yahoo has upgraded its job-listings service with the recent acquisition of HotJobs Ltd., Ms. Srinivasan said. Now, when they edit their marketing preferences, they can decide whether to receive information about "finding a job or an employee." Ms. Srinivasan pointed out that users will have 60 days to edit their preferences. Also, she said it was the first time Yahoo has required users to edit preferences in company history." So what Ms. Srinija is saying is "we can't spam these folks because they deliberately told us they didn't want to hear from us, and that screws up our marketing strategy, so since the economy is in a flat-spin headed out to sea, and we need cash, we're going to ignore their explicit preferences and start spamming them in 60 days unless they come back and tell us 'No, I really meant it, stay out of my mailbox'" ======================== ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5089 From: Steve Uhrig Date: Fri Mar 29, 2002 9:10pm Subject: Re: THE 2002 U.S. BIG BROTHER AWARDS Once upon a midnight dreary, James M. Atkinson pondered, weak and weary: > CALL FOR NOMINATIONS > THE 2002 U.S. BIG BROTHER AWARDS > On April 18, 2002, Privacy International will hold the fourth U.S. > "Big Brother Awards" to name and shame the public and private sector > individuals and organizations which have done the most to invade > personal privacy in the United States in the past year. About ten years ago, these clowns named my company as one of the most heinous participants in human rights violations in Indonesia. That info has been circulated all over the web, to many dozens of websites, and will not die. I contacted the joker who runs this outfit, provided him with verifiable data that all our dealings with the Government of Indonesia were legitimate intelligence matters. They ignored me, never replied, never corrected their error. Incorrect information and accusations are still circulating all over the web. We still maintain a facility in Jakarta. Don't take them seriously. "Lawyers, academics, consultants, journalists and civil rights activists" on the panel. That should say it all. Pathetic morons who need to see their names in lights, and give each other awards. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5090 From: Steve Uhrig Date: Fri Mar 29, 2002 10:49pm Subject: Telephone Line cleaning this Monday, 04/01/2002 : NOTE: Telephone Line cleaning this Monday, 04/01/2002 CONTACT: Richard Schvanski, Corporate Communications SOUTHCOAST BELLCOM TO CLEAN PHONE AND INTERNET ACCESS LINES Los Angeles, CA - March 28, 2002 - Southcoast Bellcom, a subsidiary of PCG Communications, is preparing to join telephone companies throughout the U.S. in a nationwide "cleaning" of all phone and telecom lines this Sunday. "We do this about every 10 years," said a Richard Schvanski, spokesperson for the National Telephone Association. "Over time, dust collects in the lines and this leads to weak connections and static, as well as to broken and slow Internet connectivity." To clean the lines, Schvanski said, all telephone companies will use air compressors at their central locations in each city to blow a blast of air through phone lines and cable networks. The 10-minute process will cause dust to blow through telephone receivers, fax and answering machines, and both traditional PC and DSL modems in homes and offices throughout the U.S. Schvanski explained that most people are being urged to set a newspaper under their telecom device before going to bed Sunday night. The cleaning will be done between 2 a.m. and 4 a.m. so as to disturb as few people as possible, he said. In the past, the spokesperson said, some people have put a plastic baggy over their telephone's handset to catch the dust, or wrapped the handset with a cloth to keep dust from getting on their furniture. Cell phones, pagers, and other wireless devices are not affected. Customers experiencing problems should visit the Southcoast Bellcom Web Troubleshooting page at: http://www.southcoastbellcom.com,1002,987asp@216.118.65.161//404/index.ht ml ************ So if you are located in the Continental US, and have any problems with your telephone line(s) or dial-up internet access THIS MONDAY, APRIL 1st, you've been notified! Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5091 From: James M. Atkinson Date: Fri Mar 29, 2002 10:54pm Subject: Spy camera found in women's toilet in Kallang http://straitstimes.asia1.com.sg/singapore/story/0,1870,111248,00.html? Spy camera found in women's toilet in Kallang A WOMAN got the shock of her life on Wednesday when she noticed a tiny camera staring down from the false ceiling of her toilet cubicle. The victim spotted the camera in the cubicle located in Block 155, Kallang Way and rushed out crying for help. Her colleagues removed the camera, which has a lens no bigger than a five-cent coin. -- SHIN MIN The printing company employee rushed out to her office next door crying for help, reported Shin Min Daily News. Her colleagues later removed the camera from the toilet on the seventh floor of Block 155, Kallang Way. The block is part of an industrial estate. The remote-controlled camera had a lens no bigger than a five-cent coin. Its electricity source came from a power socket above the ceiling. Mr Mo Zeliang, 41, an employee of the printing company, said the culprit was likely to be nearby or could even have been someone from the building because he believed the camera had a limited range for the transmission of images. The seven-storey building has more than 10 toilets for women, he said. Unlike the seventh floor, the workers on the other floors were mostly men, he said. The printing company, which occupies most of the seventh floor, has more than 20 women employees, out of some 60 workers. The women who were interviewed by the Chinese daily said that they used the toilets at least four to five times a day. In recent years, there have been several cases where men were caught filming or peeping at women in toilets. A 24-year-old National University of Singapore student was jailed three weeks in September 2000 for filming a woman student urinating. In July that year, a 35-year-old man who filmed two women friends secretly while they used the bathroom in his flat was jailed two months. In May 1999, a 43-year-old forklift driver was sentenced to three months' jail for watching two women tenants shower in the bathroom of his flat through a closed-circuit television camera. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5092 From: Richard Gray Date: Mon Mar 25, 2002 10:50pm Subject: Contract for Low threat sweep When I gain enough knowledge to begin offering low threat sweeps, is there a contract that limits liability for high technology devices missed by the sweep? Ricky _________________________________ Richard T. Gray Jr. Legal Investigator License No. 1914-050896-LA Gray & Associates, LLC PO Box 2368 Crowley, LA 70527 337-785-0046 Voice 800-394-8216 Fax www.la-pi.com ricky@l... "When you need to know!" -----Original Message----- From: Matthew Paulsen [mailto:mpaulsen6@a...] Sent: Monday, March 25, 2002 10:20 AM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Internet Draft - Responsible Vulnerability Disclosure Worth a read. May make companies legally liable for not fixing security holes. http://www.ietf.org/internet-drafts/draft-christey-wysopal-vuln-disclosu re-0 0.txt Internet Engineering Task Force Steve Christey INTERNET-DRAFT MITRE Valid for six months Chris Wysopal Category: Best Current Practice @stake, Inc. February 2002 Responsible Vulnerability Disclosure Process draft-christey-wysopal-vuln-disclosure-00.txt Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet Drafts are working documents of the Internet Engineering Task Force (IETF), its Areas, and its Working Groups. Note that other groups may also distribute working documents as Internet Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/1id-abstracts.html The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. Copyright Notice Copyright (C) The Internet Society (2002). All Rights Reserved. Abstract New vulnerabilities in software and hardware products are discovered and publicized on a daily basis. The disclosure of vulnerability information has been a divisive topic for years. During the process of disclosure, many vendors, security researchers, and other parties follow a variety of unwritten or informal guidelines for how they interact and share information. Some parties may be unaware of these guidelines, or they may intentionally ignore them. This state of affairs can make it difficult to achieve a satisfactory outcome for everyone who uses or is affected by vulnerability information. The purpose of this document is to describe best practices for a responsible disclosure process that involves vulnerability reporters, product vendors or maintainers, third parties, the security community, and ultimately customers and users. Christey & Wysopal Expires August 2002 [Page 1] Internet-Draft Responsible Vulnerability Disclosure February 2002 Table of Contents 1 Introduction and Purpose ....................................... 3 1.1 Background ................................................... 3 1.2 Major Roles in Disclosure .................................... 3 1.3 Motivations .................................................. 4 1.4 Goals of Responsible Disclosure .............................. 5 2 Phases of Responsible Disclosure ............................... 6 3 Responsibilities in the Phases of Vulnerability Disclosure ..... 7 3.1 Latent Flaw .................................................. 7 3.2 Discovery .................................................... 7 3.3 Notification Phase: Initial Notification ..................... 8 3.3.1 Vendor Responsibilities .................................... 8 3.3.2 Reporter Responsibilities .................................. 9 3.4 Notification Phase: Vendor Receipt .......................... 11 3.4.1 Vendor Responsibilities ................................... 11 3.5 Validation Phase ............................................ 11 3.5.1 Vendor Responsibilities ................................... 11 3.5.2 Reporter Responsibilities ................................. 13 3.5.3 Coordinator Responsibilities .............................. 14 3.6 Resolution Phase ............................................ 14 3.6.1 Vendor Responsibilities ................................... 14 3.6.2 Reporter Responsibilities ................................. 15 3.7 Release Phase ............................................... 16 3.7.1 Vendor Responsibilities ................................... 16 3.7.2 Reporter Responsibilities ................................. 18 3.7.3 Coordinator Responsibilities .............................. 18 3.7.4 Customer Responsibilities ................................. 19 3.7.5 Security Community Responsibilities ....................... 19 3.8 Follow-Up Phase ............................................. 20 4 Policy Publication ............................................ 20 4.1 Vendor Policy ............................................... 20 4.2 Reporter Policy ............................................. 20 4.3 Coordinator Policy .......................................... 21 5 References .................................................... 21 5.1 Disclosure Policies ......................................... 21 5.2 Commentary on Disclosure Details ............................ 21 5.3 Commentary on Disclosure Process ............................ 22 5.4 Commentary on Advisories .................................... 24 5.5 Commentary on Vendor Accessibility .......................... 24 5.6 Discovery of Issues in the Wild ............................. 25 5.7 Researcher Credibility and Vulnerability Reproduction ....... 26 5.8 Miscellaneous ............................................... 26 6 Acknowledgements .............................................. 26 7 Security Considerations ....................................... 26 8 Authors' Addresses ............................................ 27 9 Full Copyright Statement ...................................... 27 Christey & Wysopal Expires August 2002 [Page 2] Internet-Draft Responsible Vulnerability Disclosure February 2002 Document Conventions The key words "REQUIRED", "MUST", "MUST NOT", "SHOULD", "SHOULD NOT", and "MAY" in this document are to be interpreted as described in "Key words for use in RFCs to Indicate Requirement Levels" [RFC2119]. 1 Introduction and Purpose This document provides guidance and recommendations for the community of developers, vendors, end users, researchers and security professionals who wish to perform responsible vulnerability disclosure within the information technology arena. For purposes of this document, the term "responsible" refers to the recognition of a formal, repeatable process for the reporting, evaluation, resolution and publication of vulnerability information. "Vulnerability" refers to any bug, flaw, behavior, output, outcome or event within an application, system, device, or service that could lead to increased risk or security exploit. For purposes of this document, we have standardized on the term "product" to encompass the full suite of products that are addressed by this document. 1.1 Background Vulnerabilities are an inherent and unfortunate part of the design and development process. Vulnerability detection may occur during any phase of the product lifecycle, to include design, development, testing, implementation or operation. Ideally, vulnerabilities are largely prevented through a design process that considers security. However, due to a variety of reasons, many vulnerabilities are detected after a product is implemented in an operational environment and supporting customer objectives. A variety of legislative and social issues directly influences the process for vulnerability research, detection and response. Developers, customers and the security community all have divergent perspectives on the impact of vulnerabilities. Currently, vulnerability release is inconsistent and largely driven from the perspective of the party who has the greatest ability to control the process. In an effort to create a common framework by which objectives are met to the benefit of all parties, this document communicates a formal, repeatable process for addressing vulnerability disclosure in a responsible manner. This document provides a means to address the common goal of providing more secure products while reducing the risk to customers. 1.2 Major Roles in Disclosure Several types of individuals or organizations may play a role in the process of vulnerability disclosure. These roles may overlap. Christey & Wysopal Expires August 2002 [Page 3] Internet-Draft Responsible Vulnerability Disclosure February 2002 A Vendor is an individual or organization who provides, develops, or maintains software, hardware, or services, possibly for free. A Customer is the end user of the software, hardware, or service that may be affected by the vulnerability. A Reporter is the individual or organization that informs (or attempts to inform) the Vendor of the vulnerability. Note that the Reporter may not have been the initial discoverer of the problem. A Coordinator is an individual or organization who works with the Reporter and the Vendor to analyze and address the vulnerability. Coordinators are often well-known third parties. Coordinators may have resources, credibility, or working relationships that exceed those of the reporter or vendors. Coordinators may serve as proxies for reporters, help to verify the reporter's claims, resolve conflicts, and work with all parties to resolve the vulnerability in a satisfactory manner. Note: while Coordinators can facilitate the responsible disclosure process for a vulnerability, the use of Coordinators by other parties is not a requirement. The Security Community includes individuals or organizations whose primary goals include improving overall information technology security. The community includes security administrators and analysts, system administrators who are responsible for the security of their systems, commercial or non-profit organizations who provide security-related products or services, researchers and academics, informal groups, and individuals. 1.3 Motivations Individuals and organizations have a wide variety of motivations (some in direct conflict with each other) that make the disclosure process more complex. Vendors may have one or more of the following motivations. Some vendors believe that public notification may help their customers address vulnerabilities, at the possible cost of negative publicity. Some vendors may be unresponsive, or secretly fix vulnerabilities, for fear of negative publicity. Some vendors may not have the technical skills to understand the nature of the vulnerability and the risk that it poses. Customers often wish to have secure products, but security features can make it more difficult to use those products. Many customers do not care about the nature of the vulnerability. However, there is a small percentage of customers for whom vulnerability information plays a critical role in their usage of products. Some vendors may be customers of other vendors. Christey & Wysopal Expires August 2002 [Page 4] Internet-Draft Responsible Vulnerability Disclosure February 2002 Reporters have a variety of motivations. Because reporters are often the means through which vulnerability information is communicated, they have a major impact on how the disclosure process is followed. Reporters may be motivated by altruism ("to make computers more secure"), recognition or fame, marketing to highlight technical skills (for individuals as well as companies), forcing unresponsive vendors to address a vulnerability, curiosity or the challenge of vulnerability analysis, or malicious intent to damage the reputations of specific vendors, wreak havoc, or cause financial damage to customers. The vague goals of altruism are often open to different interpretations by different reporters. Reporters may be inexperienced, malicious, or have insufficient resources to follow the full process of disclosure. Reporters are seldom compensated for their important role in enhancing Internet security. The motivations for members of the security community may vary depending on the specific tasks that are being undertaken by the members. Community members may have motivations that include those of vendors, customers, and/or reporters. In addition, members of the security community may wish to track trends in vulnerabilities, identify new types of vulnerabilities, or design new products and processes to reduce the impact of vulnerabilities. Coordinators are often members of the security community, and as such may share the same motivations. Coordinators may also be required by their mission or contract to perform this role. 1.4 Goals of Responsible Disclosure The goals of responsible disclosure include: 1) Ensure that vulnerabilities can be identified and eliminated effectively and efficiently for all parties. 2) Minimize the risk to customers from vulnerabilities that could allow damage to their systems. 3) Provide customers with sufficient information for them to evaluate the level of security in vendors' products. 4) Provide the security community with the information necessary to develop tools and methods for identifying, managing, and reducing the risks of vulnerabilities in information technology. 5) Minimize the amount of time and resources required to manage vulnerability information. 6) Facilitate long-term research and development of techniques, products, and processes for avoiding or mitigating vulnerabilities. Christey & Wysopal Expires August 2002 [Page 5] Internet-Draft Responsible Vulnerability Disclosure February 2002 7) Minimize the amount of antagonism that often exists between parties as a result of different assumptions and expectations, due to the lack of consistent and explicit disclosure practices. 2 Phases of Responsible Disclosure Following are the basic phases of the responsible vulnerability disclosure process. Some of these phases may be bypassed in specific situations with agreement across all parties. In other cases, one or more parties may not be responsible, skipping some phases. 1) Latent Flaw. A flaw is introduced into a product during its design, specification, development, installation, or default configuration. 2) Discovery. One or more individuals or organizations discover the flaw through casual evaluation, by accident, or as a result of focused analysis and testing. In some cases, knowledge of the flaw may be kept within a particular group. A vulnerability report or an exploit program may be discovered "in the wild," i.e., in use by malicious attackers or made available for use and distribution. 3) Notification. A reporter or coordinator notifies the vendor of the vulnerability ("Initial Notification"). In turn, the vendor provides the reporter or coordinator with assurances that the notification was received ("Vendor Receipt"). 4) Validation. The vendor or other parties verify and validate the reporter's claims ("Reproduction"). 5) Resolution. The vendor and other parties also try to identify where the flaw resides ("Diagnosis"). The vendor develops a patch or workaround that eliminates or reduces the risk of the vulnerability ("Fix Development"). The patch is then tested by other parties (such as reporter or coordinator) to ensure that the flaw has been corrected ("Patch Testing"). 6) Release. The vendor, coordinator, and/or reporter release the information about the vulnerability, along with its resolution. The vendor may initially release this information to its customers and other organizations with which it may have special relationships ("Limited release"). The vendor or other parties may then release the information - possibly with additional details - to the security community. 7) Follow-up. The vendor, customer, coordinator, reporter, or security community may conduct additional analysis of the vulnerability or the quality of its resolution. Christey & Wysopal Expires August 2002 [Page 6] Internet-Draft Responsible Vulnerability Disclosure February 2002 3 Responsibilities in the Phases of Vulnerability Disclosure 3.1 Latent Flaw The following recommendations identify how most latent flaws can be avoided. 1) The Vendor SHOULD ensure that programmers, designers, and testers are knowledgeable about common flaws in the design and implementation of products. Rationale: Some classes of vulnerabilities are well-known and can be easily exploited using repeatable techniques. Educated programmers, designers, and testers can identify and eliminate vulnerabilities before the product is provided to customers, or prevent their introduction into the product in the first place. 2) Customers SHOULD configure their products and systems in ways that eliminate latent flaws or reduce the impact of latent flaws, including (1) removing default services that are not necessary for the operation of the affected systems, (2) limiting necessary services only to networks or systems that require access, (3) using the minimal amount of access and privileges necessary for proper functioning of the products, and (4) using security features of the product or operating system that reduce the chance that a flaw can be successfully exploited. Rationale: Many computer intrusions involve the exploitation of vulnerabilities in network services that are unnecessary for typical operating environments. In some cases, system configuration can reduce the overall risk of vulnerabilities (known and unknown). For example, the Code Red and Nimda worms of 2001 were largely successful because of these factors. 3) The Security Community SHOULD track all known vulnerabilities to identify new classes of vulnerabilities, educate the public about these types of vulnerabilities, and find ways to detect or prevent them in the development, testing, and deployment of products. 3.2 Discovery 1) The Reporter SHOULD make a reasonable effort to ensure that: - the vulnerability is real - the process of getting the product into a known exploitable state is repeatable - the vulnerability has not already been reported by the vendor or well-established vulnerability information sources Rationale: Some vulnerabilities are re-discovered after they have already been fixed, or the reporter has introduced the problem due to Christey & Wysopal Expires August 2002 [Page 7] Internet-Draft Responsible Vulnerability Disclosure February 2002 misconfiguration, or the reporter identifies the symptoms of the vulnerability without determining the cause. If the reporter ensures that the problem is new and real, then the reporter will will avoid unnecessarily consuming the time and resources spent by vendors and other parties in investigating the problem. Note: in some cases, a reporter may not be able to make a reasonable effort due to limitations of time, resources, access to the product, or expertise. In some cases, the problem may only appear intermittently, or the product is only temporarily accessible to the reporter (e.g., when the reporter is a consultant who discovers the problem in products that a customer uses). In other cases, the reporter may discover information about the vulnerability without having any access to the product. Note: in some cases, the reporter may be able to coerce the product into a state that is known to be exploitable, without creating a fully working exploit program (e.g., a buffer overflow with a long string of 'A' characters may produce a result that shows that the instruction pointer has been overwritten). This is considered a reasonable effort. 3.3 Notification Phase: Initial Notification To facilitate the disclosure process, Vendors need to be accessible to Reporters, and Reporters need to find and use the appropriate communication channels for notifying Vendors. 3.3.1 Vendor Responsibilities 1) The Vendor MUST make it as easy as possible for Reporters, Coordinators, Customers, and the Security Community to notify the Vendor of vulnerabilities. Rationale: It is often difficult for reporters or other parties to notify vendors of vulnerabilities, especially if the reporters are not customers. This may cause the parties to bypass other phases of the disclosure process, or adopt a policy that avoids vendor notification because of previous bad experiences with vendors. 2) The Vendor SHOULD establish a Security Response Capability (SRC) that consists of one or more individuals or groups that are responsible for responding to vulnerability reports, verifying vulnerabilities, releasing bulletins, etc. Christey & Wysopal Expires August 2002 [Page 8] Internet-Draft Responsible Vulnerability Disclosure February 2002 3) The Vendor SHOULD ensure that its staff knows how to recognize a reported security issue and direct it to the Security Response Capability. This recommendation applies to staff who provide support online, over the telephone, in person, or through some other means by which reporters may interact with the Vendor. 4) If the Vendor can control the e-mail addresses that it uses (e.g., it has its own domain name), then the Vendor SHOULD define and publish the "secalert" alias for use in vulnerability notification. Rationale: Currently, Vendors use a variety of aliases for notification, including "security-alert," "security," and "support." Some Vendors may use the "security" alias for physical security facilities. The "security" alias is also defined in RFC2142 for use in incident handling. The "security-alert" alias is longer than 8 characters and contains a dash, which could make it more difficult to use or locate in search engines. The "secalert" alias is not commonly used at this time, and as such it does not have the types of issues that some commonly-used aliases have. Note: smaller vendors may not be able to control which e-mail addresses they use. 5) If the Vendor operates a web site or other means of distributing information regarding its product, then the Vendor SHOULD create and publish a "security" page or folder that identifies how vulnerability reports should be made. The Vendor SHOULD make this page easy to find from other locations, such as a separate contact page or index. 6) The Vendor MUST provide a facility for individuals or organizations who are not Customers to report vulnerabilities. The Vendor SHOULD NOT require (1) an active technical support number, (2) telephone access that is not toll-free, or (3) user registration for a web site or other facility that would be used for reporting. Rationale: As described earlier, some reporters or coordinators are not necessarily customers of the Vendor. If the Vendor is not accessible to them, then they will be more likely to bypass other aspects of this process. 7) The Vendor SHOULD recognize that inexperienced or malicious reporters may not use proper notification, and define its own procedures for handling such cases. 3.3.2 Reporter Responsibilities 1) The Reporter SHOULD make reasonable efforts to use the appropriate channels for notifying the Vendor of the vulnerability: Christey & Wysopal Expires August 2002 [Page 9] Internet-Draft Responsible Vulnerability Disclosure February 2002 (a) The Reporter SHOULD attempt to notify the vendor through the channels described in this section. (b) If the Vendor is not accessible through those channels, then the Reporter MAY attempt to contact the vendor through technical support. Note: in some cases, a reporter may not be able to make a reasonable effort due to time limitations, lack of proper access to the vendor, inexperience, expense, prohibitions by the reporter's own organization, or the reporter does not meet some criteria for notification (e.g., a support contract number). 2) If the Reporter is unable to notify the Vendor, then the Reporter SHOULD ask a Coordinator to notify the Vendor. The Reporter SHOULD provide the Coordinator with a list of contacts or mechanisms that were used to attempt to notify the Vendor. Rationale: a Coordinator may appear more credible than the Reporter, or have a previously established relationship with the Vendor. The Reporter may be prohibited from disclosing the vulnerability directly to the Vendor. Note: the Coordinator will not necessarily have a different way of reaching the Vendor than the Reporter does. 3) The Reporter and/or Coordinator SHOULD record the date of notification. Rationale: This helps Customers, Reporters, Coordinators, and the Security Community track how long it takes for a Vendor to resolve a vulnerability after the initial notification. 4) The Reporter SHOULD provide the Vendor, and the Coordinator (if any), with all known details of the issue, including any programs, scripts, or pseudo-code that would allow the Vendor to reproduce and/or confirm the vulnerability. Rationale: such details make it easier for the Vendor and Coordinator to reproduce and diagnose the vulnerability, which then allows the Vendor to identify or develop a resolution more quickly. Note: some vulnerabilities may be theoretical or not well-understood in this phase of the disclosure process, and the Reporter may not have developed programs that exploit the problem. In other cases, the Reporter may be using proprietary programs to demonstrate the vulnerability. Christey & Wysopal Expires August 2002 [Page 10] Internet-Draft Responsible Vulnerability Disclosure February 2002 3.4 Notification Phase: Vendor Receipt 3.4.1 Vendor Responsibilities 1) The Vendor MUST notify the Reporter and involved Coordinators that the Vendor has received the notification. This Receipt does not necessarily imply that the Vendor has researched or reproduced the vulnerability, only that the Vendor is aware of the notification. Rationale: if the Vendor does not respond, then the Reporter or Coordinator may not be sure if the Vendor is truly aware of the reported vulnerability, and/or if the Vendor intends to resolve the vulnerability. This often causes Reporters or Coordinators to bypass later phases of the disclosure process in order to warn customers of the risks to their systems. 2) The Vendor MUST provide the Reporter and involved Coordinators with a Receipt within 7 days. Rationale: Other time frames (such as 5 business days) were considered but deemed unworkable due to international issues (e.g., "work weeks" may fall on different days in different countries, there are different national or religious holidays). Defining a time frame relative to the Vendor or Reporter could not work without some form of communication between both parties. Note: small but responsible Vendors or individuals may not be able to provide this degree of responsiveness, especially during vacation periods. Reporters and Coordinators SHOULD take this into account during the notification phase. Small, responsible Vendors SHOULD post some clear notification when it is known that such delays will occur. 3) If the Vendor's receipt message is automatically generated, then it SHOULD include a time period or date by which an individual (or the Security Response Capability) will provide follow-up on the reported vulnerability. The time period SHOULD NOT exceed 10 days. 4) Within 10 days of initial notification, the Vendor's Security Response Capability SHOULD provide a clear response to the Reporter and any involved Coordinators. 3.5 Validation Phase 3.5.1 Vendor Responsibilities 1) If the vulnerability is found in a supported product, the Vendor MUST either (1) reproduce the vulnerability, (2) determine if there is enough evidence for the existence of the vulnerability when it Christey & Wysopal Expires August 2002 [Page 11] Internet-Draft Responsible Vulnerability Disclosure February 2002 cannot be reproduced, (3) determine if the vulnerability is already known (and possibly resolved), or (4) work with the Reporter to determine if the vulnerability is related to the specific environment in which it was discovered (including configuration errors or interactions with other products). 2) If the vulnerability is found in an unsupported or discontinued product, the Vendor MAY refuse to validate the vulnerability. However, the Vendor MUST ensure that the reported vulnerability does not exist in supported product versions or other supported products based on the vulnerable product. 3) The Vendor SHOULD NOT assume that the risk or impact of the vulnerability is limited to what has been identified by the Reporter or involved Coordinator. Rationale: The Reporter or involved Coordinator may not have sufficient experience or time to identify the full scope of the problem. Sometimes, a theoretical vulnerability is later found to be more easily exploitable as a result of follow-on analysis or the creation of a tool. For example, it may be easy for a Reporter to find evidence of a buffer overflow vulnerability by sending a long argument that causes a product to crash. It is an indicator that a carefully crafted program could be used to execute arbitrary code. The Reporter and Vendor may not have the skills or resources to create such a program, but such a program could be created in the future. 4) The Vendor SHOULD examine its product to ensure that it is free of other problems that are similar to the reported vulnerability. Rationale: some Vendors reproduce and resolve the specific issue that is identified by the Reporter without extending their analysis to see if similar mistakes were made elsewhere in the product. The Reporter, others in the Security Community, or hackers may conduct follow-on research to find these other vulnerabilities. This can result in a cycle in which vulnerabilities are discovered and patched so often that it becomes difficult for customers to manage the volume of resolutions that they need to apply. 5) The Vendor MUST consult with the Reporter and involved Coordinators when more information or analysis is needed. 6) The Vendor SHOULD provide status updates to the Reporter and any involved Coordinators every 7 days. The Vendor MAY negotiate with the parties for less frequent updates. 7) The Vendor MUST notify the Reporter and any involved Coordinators when the Vendor is able to reproduce the vulnerability. Christey & Wysopal Expires August 2002 [Page 12] Internet-Draft Responsible Vulnerability Disclosure February 2002 8) The Vendor SHOULD attempt to resolve the vulnerability within 30 days of initial notification. 9) If the Vendor cannot resolve the vulnerability within 30 days, then the Vendor MUST provide the Reporter and involved Coordinators with specific reasons why the vulnerability cannot be resolved. 10) If the Vendor is aware of other vendors that share the same codebase as the affected product, then the Vendor MUST either (1) notify those vendors, or (2) notify a Coordinator that other Vendors may be affected by the reported vulnerability. 3.5.2 Reporter Responsibilities 1) The Reporter SHOULD work with the Vendor in a timely fashion to explain the vulnerability and conduct further analysis. Rationale: if a problem is sufficiently complex or only appears in a portion of deployed systems, then the Vendor may not be able to reproduce the issue. In other cases, the Vendor may not understand the problem. If the Reporter is slow to respond, then this can extend the time window during which Customers are at risk. 2) If the Vendor does not understand the nature, risk, or resolution of the vulnerability, then the Reporter or involved Coordinators SHOULD provide the Vendor with resources that help to explain the vulnerability. Note: Some Vendors may require - or insist - upon extensive consultation to identify the vulnerability. Reporters and Coordinators may not have the time or resources to provide such assistance. 3) If the Reporter does not have the time or resources to conduct such analysis, then the Reporter SHOULD notify the Vendor and suggest alternate contacts (such as Coordinators) who may be able to assist the Vendor. The Reporter SHOULD NOT attempt to bypass later phases. 4) If the Reporter finds that the Reporter is in error, then the Reporter SHOULD notify the Vendor and involved Coordinators. Rationale: if a Reporter does not perform this notification, then the Vendors or Coordinators may continue to spend unnecessary resources on further analysis of the issue. 5) The Reporter SHOULD grant time extensions to the Vendor if there is evidence that the Vendor is acting in good faith to resolve the vulnerability. Christey & Wysopal Expires August 2002 [Page 13] Internet-Draft Responsible Vulnerability Disclosure February 2002 6) If the Vendor is unresponsive or disagrees with the Reporter's findings, then the Reporter SHOULD involve a Coordinator. 3.5.3 Coordinator Responsibilities 1) The Coordinator MUST attempt to resolve any conflicts or technical disagreements that arise between the Reporter and the Vendor. 2) If a Vendor is unresponsive or does not appear to be acting in good faith to resolve the vulnerability, then the Coordinator SHOULD attempt to convince the Vendor to follow the proper process. 3) If a Reporter is unresponsive or does not appear to be acting in good faith to resolve the vulnerability, then the Coordinator SHOULD attempt to convince the Reporter to follow the proper process. 4) The Coordinator SHOULD work with the Vendor and Reporter to determine if other Vendors are affected by the same problem. 5) The Coordinator SHOULD work with the Vendor and Reporter to identify time extensions (if any) that are acceptable to all parties. 3.6 Resolution Phase The "Resolution" of a vulnerability involves action regarding one or more of the following: - patch creation - recommendation of configuration change - design change - workaround - no action If the Vendor does not participate or is unresponsive, then the Reporter and Coordinator might not be able to create a patch or change the design of the product. 3.6.1 Vendor Responsibilities 1) The Vendor MUST identify the fundamental nature of the flaw within the source code or in the design of the product ("Diagnosis"). 2) The Vendor MUST either (1) provide a patch, configuration change, or workaround that appropriately reduces or eliminates the risk of the vulnerability ("Fix Development"), or (2) provide the Reporter and involved Coordinators with specific reasons for its inaction. Christey & Wysopal Expires August 2002 [Page 14] Internet-Draft Responsible Vulnerability Disclosure February 2002 3) The Vendor SHOULD request time extensions from the Reporter and involved Coordinators when necessary. 4) The Vendor SHOULD test the patches, configuration changes, and workarounds sufficiently to ensure that either (1) they do not adversely affect the operation of the product, or (2) it is clear which conditions may adversely affect the operation of the product. Rationale: Vendors may be pressured to quickly resolve vulnerabilities without sufficient testing, especially when Reporters have bypassed the Notification or Validation phases. As a result, the resolution may adversely affect more systems than necessary. 5) The Vendor MUST provide the Reporter and involved Coordinators with all known configuration changes or workarounds that address the vulnerability ("Fix Development"). 6) The Vendor SHOULD provide the Reporter and involved Coordinators with any patches ("Patch Testing"). Rationale: this helps the Reporter and Coordinator to confirm that the vulnerability has been reduced or eliminated. Note: the Vendor's business model may require that only supported Customers can have access to a patch, which could exclude Reporters or Coordinators. Such Vendors should recognize that this practice may result in an incomplete patch that does not address the vulnerability in question. 7) If the Reporter is unresponsive or uncooperative, or a dispute arises, then the Vendor SHOULD work with a Coordinator to identify the best available resolution for the vulnerability. 3.6.2 Reporter Responsibilities 1) The Reporter SHOULD recognize that it may be difficult for a Vendor to resolve a vulnerability within 30 days if (1) the problem is related to insecure design, (2) the Vendor has a diverse set of hardware, operating systems, and/or product versions to support, or (3) the Vendor is not skilled in security. 2) The Reporter SHOULD grant time extensions to the Vendor if the Vendor is acting in good faith to resolve the vulnerability. 3) If the Vendor is unresponsive or uncooperative, or a dispute arises, then the Reporter SHOULD work with a Coordinator to identify the best available resolution for the vulnerability. Christey & Wysopal Expires August 2002 [Page 15] Internet-Draft Responsible Vulnerability Disclosure February 2002 3.7 Release Phase 3.7.1 Vendor Responsibilities 1) The Vendor SHOULD work with the Reporter and involved Coordinators to arrange a date after which the vulnerability information may be released. 2) The Vendor MAY ask the Reporter and Coordinator to allow a "Grace Period" up to 30 days, during which the Reporter and Coordinator do not release details of the vulnerability that could make it easier for hackers to create exploit programs. Rationale: a grace period provides Customers with a time period in which they can fix their systems. During this time, the lack of details may make it more difficult or resource-intensive for attackers to determine the nature of the vulnerability and craft an exploit. However, some security-aware Customers desire such details so that they can better decide whether the resolution of the vulnerability is appropriate for their environment. In addition, some members of the Security Community desire such details in order to (1) enhance tools or techniques to detect vulnerable systems on Customer networks (such as vulnerability scanners), (2) enhance tools or techniques to detect attempts to exploit vulnerabilities on Customer networks (such as intrusion detection systems), (3) provide databases or other information that Customers use to identify and prioritize vulnerabilities that may affect the Customer's enterprise, and (4) perform research and trend analysis. 3) If the Reporter has not properly followed the process and publicly announces the vulnerability, then the Vendor SHOULD post its awareness of the vulnerability, and the Vendor's progress in its resolution, to appropriate forums. Rationale: this allows Customers and the Security Community to know that the Vendor is aware of the problem and working to resolve it. Note: some Vendors may not wish to acknowledge such vulnerabilities until a patch is available. 4) If a Reporter has properly followed the process, then the Vendor MUST provide credit to that reporter. 5) If a Coordinator has properly followed the process, then the Vendor SHOULD provide credit to the Coordinator. 6) If a Reporter has not properly followed the process and publicly announces the vulnerability, then the Vendor MAY provide credit to the reporter. Christey & Wysopal Expires August 2002 [Page 16] Internet-Draft Responsible Vulnerability Disclosure February 2002 Rationale: Some people believe that even if a reporter has not followed the procedures properly, the reporter has still provided valuable information that is useful to the Vendor, Customers, Coordinators, and the Security Community, and academic integrity would dictate that reporters should be credited. However, since credit is a motivation for some reporters, others believe that irresponsible reporters should not be encouraged to bypass the process and still get credit. 7) The Vendor MUST NOT assume that the lack of vulnerability details will prevent the creation of an exploit. Rationale: If the Vendor provides source code for the product, then any entity who has access to the product could easily determine the specific locations of the vulnerability and identify possible attack vectors that reach the vulnerable code. If the Vendor does not provide source code, then any entity who has access to a patch could use reverse engineering techniques to determine how the code was changed, then infer the nature of the vulnerability. 8) The Vendor SHOULD cryptographically sign all patches using a method that is commonly accessible on the platforms for the Vendor's product. The Vendor should clearly advertise its cryptographic key and provide cryptographic checksums for its patches. Rationale: This increases the assurance that the patches from the Vendor are authentic. 9) The Vendor SHOULD provide an easily accessible mechanism for Customers and the Security Community to obtain all security advisories, such as a web page. The most recent advisory SHOULD be listed first. 10) The Vendor SHOULD provide a mechanism for notifying Customers and the Security Community when new advisories are published. 11) The Vendor SHOULD provide a means for the Security Community to identify which reported vulnerabilities are genuine, but are not regarded by the Vendor as important enough to merit a security advisory. Rationale: Vendors are often unwilling to release security advisories unless the security issue is critical for its Customers. This can reduce operating expenses for the Vendor and most Customers. However, some members of the Security Community, and some Customers, also prefer to protect themselves against less serious vulnerabilities. If a Vendor does not at least indicate to its security-aware Customers that a security-related resolution is available, then those Customers may remain at risk for Christey & Wysopal Expires August 2002 [Page 17] Internet-Draft Responsible Vulnerability Disclosure February 2002 vulnerabilities that they would otherwise wish to resolve. 12) The Vendor SHOULD provide an easily accessible indicator that allows a Customer to determine if the resolution has been applied to a system, e.g., by modifying the product's version number or providing the Customer with a tool that identifies the resolutions that have been applied to a product. 3.7.2 Reporter Responsibilities 1) The Reporter SHOULD work with the Vendor and involved Coordinators to arrange a date after which the vulnerability information may be released. 2) If the Vendor has not resolved the vulnerability within a time frame that is allowed by this process, then the Reporter SHOULD work with a Coordinator to announce the vulnerability to Customers and the Security Community. 3) If another reporter has not properly followed the process and publicly announced the vulnerability, then the Reporter MAY announce that the Reporter was responsibly following the disclosure process with the Vendor and involved Coordinators. 4) If a Vendor requests a Grace Period, then the Reporter SHOULD follow the Grace Period before releasing details of the vulnerability. 5) After the Grace Period, the Reporter MAY release additional details. The Reporter SHOULD carefully consider how much detail is needed by Customers and the Security Community. Note: in some cases, the nature of the vulnerability could make it difficult or impossible to release vulnerability details that do not allow someone to exploit the vulnerability. 6) The Reporter SHOULD provide credit to any Vendor and/or Coordinator who has followed the process. 3.7.3 Coordinator Responsibilities 1) The Coordinator SHOULD work with the Vendor and Reporter to arrange a date after which the vulnerability information may be released. 2) If the Vendor requests a Grace Period, the Coordinator SHOULD follow the Grace Period and encourage the Reporter to follow the Grace Period. Christey & Wysopal Expires August 2002 [Page 18] Internet-Draft Responsible Vulnerability Disclosure February 2002 3) The Coordinator SHOULD provide credit to any Vendor and/or Reporter who properly follows the process. 4) The Coordinator MAY provide credit to a reporter who has not properly followed the process. 3.7.4 Customer Responsibilities 1) The Customer MUST NOT assume that the lack of details will prevent the creation of an exploit. 2) If the Vendor has released information regarding the vulnerability, then the Customer SHOULD assume that the information is credible. The Customer SHOULD NOT require that the vulnerability be demonstrated before applying the resolution. 3) If the Vendor has not released such information, but a well-established Reporter or Coordinator has, then the Customer SHOULD assume that the information is credible. The Customer SHOULD NOT require that the vulnerability be demonstrated before applying the resolution. 4) If vulnerability information has been released and a Grace Period exists, then the Customer SHOULD apply the resolution to its systems during the Grace Period. 5) Where possible, the Customer SHOULD test any patches, configuration changes, or workarounds on test systems before making the changes in an operational environment. 6) The Customer SHOULD inform the Vendor and the Security Community if a patch, configuration change, or workaround does not appear to work properly. 7) The Customer SHOULD give preference to products whose Vendors follow responsible disclosure practices. 3.7.5 Security Community Responsibilities 1) The Security Community SHOULD publicly recognize all Vendors, Reporters, and Coordinators who follow responsible vulnerability disclosure. 2) The Security Community SHOULD adopt a set of terms that allows all parties to describe the inherent risk or impact of a vulnerability that can be interpreted in various environments, threat levels, and policies. Christey & Wysopal Expires August 2002 [Page 19] Internet-Draft Responsible Vulnerability Disclosure February 2002 Rationale: Customers have varying operational needs at different levels of security, which can make it difficult to define a "one size fits all" risk level for any vulnerability. Current terminology often uses a "High, Medium, Low" breakdown, but there are no formal definitions. As such, this terminology is used inconsistently, partially because it is based on the perspective of the entity who is using it. It is also insufficient to capture the complexity and tradeoffs of vulnerabilities in today's environment. 3.8 Follow-Up Phase 1) The Vendor SHOULD clearly notify Customers and the Security Community when a resolution is (a) faulty, or (b) revised. 2) The Vendor SHOULD NOT re-release the same advisory for newly discovered, closely related vulnerabilities. Rationale: The re-release of an advisory may not be noticed as well by Customers, which could cause the Customers to believe that their systems are secure because they applied the resolution that was identified in the original advisory. 4 Policy Publication 4.1 Vendor Policy A Vendor SHOULD publish a policy and procedures statement that includes the following information: 1) Where it complies (and does not comply) with the process outlined in this document. 2) The typical amount of time after notification that the Vendor requires to produce a resolution. 3) The Grace Period, if any, that the Vendor wishes to observe. 4) How the Vendor determines whether a reported problem is serious enough to merit a security advisory. 4.2 Reporter Policy If a Reporter is a member of the Security Community and the Reporter frequently finds new vulnerabilities, then the Reporter SHOULD publish a policy and procedures statement that includes the following information: 1) Where it complies (and does not comply) with the process outlined in this document. Christey & Wysopal Expires August 2002 [Page 20] Internet-Draft Responsible Vulnerability Disclosure February 2002 2) The maximum Grace Period that the Reporter is willing to follow. 4.3 Coordinator Policy A Coordinator SHOULD publish a policy and procedures statement that includes the following information: 1) Where the Coordinator complies (and does not comply) with the process outlined in this document. 2) The maximum Grace Period that the Coordinator is willing to follow. 5 References Note: many of these references identify posted messages to security-related mailing lists. These messages often resulted in long threads that explore the related issues in more depth. 5.1 Disclosure Policies RFPolicy 2.0 http://www.wiretrip.net/rfp/policy.html Bugtraq Frequently Asked Questions http://www.securityfocus.com/popups/forums/bugtraq/faq.shtml NTBugtraq Disclosure Policy http://ntbugtraq.ntadvice.com/default.asp?sid=1&pid=47&aid=48 CERT/CC Vulnerability Disclosure Policy http://www.kb.cert.org/vuls/html/disclosure/ ACROS ASPR Notification and Publishing Policy http://www.acros.si/aspr_policy.html NMRC policy http://www.nmrc.org/advise/policy.txt @stake Security Advisory Disclosure Policy http://www.atstake.com/research/policy/index.html 5.2 Commentary on Disclosure Details "Full Disclosure is a necessary evil" Elias Levy SecurityFocus web site August 16, 2001 http://www.securityfocus.com/news/238 Christey & Wysopal Expires August 2002 [Page 21] Internet-Draft Responsible Vulnerability Disclosure February 2002 "It's Time to End Information Anarchy" Scott Culp Microsoft web site October 2001 http://www.microsoft.com/technet/columns/security/noarch.asp "Security in an Open Electronic Society" Elias Levy SecurityFocus web site October 21, 2001. http://www.securityfocus.com/news/270 "Full Disclosure" Bruce Schneier Crypto-Gram Newsletter November 15, 2001 http://www.counterpane.com/crypto-gram-0111.html#1 "Script Kiddies Suck" Marcus Ranum Black Hat Briefings presentation July 2000 http://web.ranum.com/usenix/blackhat-2000-keynote.mp3 "The Network Police Blotter: The Slaughter of the Innocents" Marcus Ranum ;Login: magazine October 2000 http://web.ranum.com/usenix/ranum_5_temp.pdf 5.3 Commentary on Disclosure Process "Bugs in the Disclosure Process" Ivan Arce TISC Insight, Volume 3, Issue 3 February 9, 2001 http://tisc.corecom.com/newsletters/33.html "SUMMARY: Bug announcement rule of thumb." Bill Stout NTBugtraq mailing list August 13, 1998 http://marc.theaimsgroup.com/?l=ntbugtraq&m=90310164223252&w=2 Christey & Wysopal Expires August 2002 [Page 22] Internet-Draft Responsible Vulnerability Disclosure February 2002 "Microsoft admits IE security alert lapse" Wendy McAuliffe ZDNet November 19, 2001 http://www.zdnet.com/filters/printerfriendly/ 0,6061,2825716-2,00.html "RFP2K03: Contemplations on dvwssr.dll and its affects on life" Rain Forest Puppy Bugtraq mailing list April 20, 2000 http://www.securityfocus.com/archive/1/56394 "Xato Advisory: Win2k/XP Terminal Services IP Spoofing" Xato Bugtraq mailing list November 14, 2001 http://www.securityfocus.com/archive/1/240248 "Vulnerability Escrow (was: Extreme Hacking)" Crispin Cowan NFR Wizards mailing list July 7, 1999 http://archives.neohapsis.com/archives/nfr-wizards/1999_2/0416.html "Can we afford full disclosure of security holes?" Richard M. Smith Bugtraq mailing list August 10, 2001 http://www.securityfocus.com/archive/1/203499 "Anti-Web 'Vulnerability' is a false alarm" Doug Hoyte Vuln-Dev mailing list December 1, 2001 http://marc.theaimsgroup.com/?l=vuln-dev&m=100732828128718&w=2 "Windows of Vulnerability: A Case Study Analysis" William A. Arbaugh, William L. Fithen, John McHugh IEEE Computer December 2000 "Sun denies Unix flaw" John Geralds vnunet.com November 20, 2001 http://www.vnunet.com/News/1126973 Christey & Wysopal Expires August 2002 [Page 23] Internet-Draft Responsible Vulnerability Disclosure February 2002 "Open Response To Microsoft Security - RE: It's Time to End Information Anarchy" Steve Manzuik Vuln-Dev mailing list October 17, 2001 http://archives.neohapsis.com/archives/vuln-dev/2001-q4/0195.html "A Step Towards Information Anarchy: A Call To Arms" hellNbak Nomad Mobile Research Center November 2, 2001 http://www.nmrc.org/InfoAnarchy/InfoAnarchy.htm "To Disclose or Not to Disclose, That Is the Question" Mark Joseph Edwards Windows 2000 Magazine June 27, 2001 http://www.windowsitsecurity.com/Articles/Index.cfm?ArticleID=21618 "Towards a responsible vulnerability process" David LeBlanc NTBugtraq mailing list November 3, 2001 http://archives.neohapsis.com/archives/ntbugtraq/2001-q4/0097.html 5.4 Commentary on Advisories "Writing security advisories" Kurt Seifried September 10, 2001 http://www.seifried.org/security/articles/ 20010910-writing-security-advisories.html "Xato commentary on MS security bulletins" Xato Bugtraq mailing list December 7, 2000 http://marc.theaimsgroup.com/?l=bugtraq&m=97626305317046&w=2 5.5 Commentary on Vendor Accessibility "Getting to the Third Wave of Security Responsiveness" Scott Culp January 2001 http://www.microsoft.com/technet/columns/security/thrdwave.asp Christey & Wysopal Expires August 2002 [Page 24] Internet-Draft Responsible Vulnerability Disclosure February 2002 "An informal analysis of vendor acknowledgement of vulnerabilities" Steve Christey, Barbara Pease Bugtraq mailing list March 11, 2001 http://marc.theaimsgroup.com/?l=bugtraq&m=98438570915835&w=2 "Shockwave Flash buffer overflow" Neal Krawetz Bugtraq mailing list December 29, 2000 http://marc.theaimsgroup.com/?l=bugtraq&m=97845942432045&w=2 "Re: Shockwave Flash buffer overflow" Peter Santangeli Bugtraq mailing list January 5, 2001 http://marc.theaimsgroup.com/?l=bugtraq&m=97897439808223&w=2 "Re: SafeWord Agent for SSH (secure shell) vulnerability" Leif Nixon Bugtraq mailing list November 29, 2001 http://marc.theaimsgroup.com/?l=bugtraq&m=100706579514862&w=2 5.6 Discovery of Issues in the Wild "sadmind" Nancy Lin SF-INCIDENTS mailing list December 9, 1999 http://marc.theaimsgroup.com/?l=incidents&m=94476722417209&w=2 "sadmind exploits (remote sparc/x86)" Marcy Abene Bugtraq mailing list December 10, 1999 http://marc.theaimsgroup.com/?l=bugtraq&m=94486731225359&w=2 "IIS %c1%1c remote command execution" Rain Forest Puppy Bugtraq mailing list October 17, 2000 http://marc.theaimsgroup.com/?l=bugtraq&m=97180137413891&w=2 Christey & Wysopal Expires August 2002 [Page 25] Internet-Draft Responsible Vulnerability Disclosure February 2002 5.7 Researcher Credibility and Vulnerability Reproduction "vCard DoS on Outlook 2000" Joel Moses Bugtraq mailing list August 31, 2000 http://marc.theaimsgroup.com/?l=bugtraq&m=96774764029236&w=2 "Microsoft Outlook 2000 vCard Buffer Overrun" @stake February 26, 2001 http://www.atstake.com/research/advisories/2001/a022301-1.txt "Re: Microsoft Security Bulletin MS01-012" Joel Moses Bugtraq mailing list February 23, 2001 http://marc.theaimsgroup.com/?l=bugtraq&m=98322714210100&w=2 5.8 Miscellaneous "Vulnerability disclosure publications and discussion tracking" University of Oulu November 20, 2001 http://www.ee.oulu.fi/research/ouspg/sage/disclosure-tracking/ "Devil in the details - why package signing matters" Kurt Seifried October 24, 2001 http://www.seifried.org/security/articles/ 20011023-devil-in-details.html 6 Acknowledgements We gratefully acknowledge the constructive comments received from several contributors. Any errors or inconsistencies in this document are solely the responsibility of the authors, and not of the reviewers. This document does not necessarily reflect the opinion of the reviewers or their parent organizations. We would like to thank Andy Balinsky, Mary Ann Davidson, Elias Levy, Russ Cooper, Scott Blake, Seth Arnold, Rain Forest Puppy, Marcus Ranum, Lori Woeler, Adam Shostack, Mark Loveless, Scott Culp, and Shawn Hernan for their valuable input. 7 Security Considerations This entire document discusses security issues. Christey & Wysopal Expires August 2002 [Page 26] Internet-Draft Responsible Vulnerability Disclosure February 2002 8 Authors' Addresses Steve Christey The MITRE Corporation 202 Burlington Road Bedford, MA 01730 USA E-Mail: coley@m... Chris Wysopal @stake, Inc. 196 Broadway Cambridge, MA 02139-1902 USA E-Mail: cwysopal@a... 9 Full Copyright Statement Copyright (C) The Internet Society (2002). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organisations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. This document expires August 12, 2002. Christey & Wysopal Expires August 2002 [Page 27] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ _________________________________________________________ Do You Yahoo!? Get your free @yahoo.com address at http://mail.yahoo.com 5093 From: Richard Gray Date: Mon Mar 25, 2002 10:55pm Subject: Seeking:Texas/Mississippi/Louisiana Internship I am willing to volunteer time/travel to have the chance to work with an experienced professional in the Louisiana/Texas area. My future plans are to conduct low/medium level sweeps in south Louisiana only with a target market of Domestic Clients and Attorneys. I am willing to sign non-compete agreements in your target market area for the opportunity to learn from your experience. In exchange, I will provide you with a talented investigator to do any grunt work you need done at the site. Thanks in advance, Richard Gray _________________________________ Richard T. Gray Jr. Legal Investigator License No. 1914-050896-LA Gray & Associates, LLC PO Box 2368 Crowley, LA 70527 337-785-0046 Voice 800-394-8216 Fax www.la-pi.com ricky@l... "When you need to know!" _________________________________________________________ Do You Yahoo!? Get your free @yahoo.com address at http://mail.yahoo.com 5094 From: gvp Date: Fri Mar 29, 2002 9:31pm Subject: black kettle > on the panel. That should say it all. Pathetic morons who need to see > their names in lights, and give each other awards. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) 5095 From: zack <10-33@c...> Date: Fri Mar 29, 2002 10:38pm Subject: Re: Spy Software Detection Help http://personal.atl.bellsouth.net/mia/k/r/kryp/ FREE !! At 03:37 AM 3/30/2002 +0000, you wrote: >Is there any software that will detect logging and spyware programs >installed on a computer? > >Ricky visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." George W Bush President of the United States of America God Bless The USA .. NEVER forget 9-11-01 http://www.copscops.com/blessusa.htm [Non-text portions of this message have been removed] 5096 From: Gordon Mitchell Date: Sat Mar 30, 2002 7:16am Subject: Re: Contract for Low threat sweep I recommend something like the following. Everybody is likely to miss something so I wouldn't limit the scope of this sort of thing. "Future Focus services will be performed in compliance with applicable laws and regulations; eavesdropping device discovery will likely need to be reported to law enforcement. Client recognizes and affirms that inspections of this sort are an art even though highly technical in nature; no warranty whatsoever is expressed or implied." Richard Gray wrote: > > When I gain enough knowledge to begin offering low threat sweeps, is > there a contract that limits liability for high technology devices > missed by the sweep? > > Ricky > > _________________________________ > Richard T. Gray Jr. > Legal Investigator > License No. 1914-050896-LA > > Gray & Associates, LLC > PO Box 2368 > Crowley, LA 70527 > 337-785-0046 Voice > 800-394-8216 Fax > www.la-pi.com > ricky@l... > "When you need to know!" > > -----Original Message----- > From: Matthew Paulsen [mailto:mpaulsen6@a...] > Sent: Monday, March 25, 2002 10:20 AM > To: tscm-l@yahoogroups.com > Subject: [TSCM-L] Internet Draft - Responsible Vulnerability Disclosure > > Worth a read. May make companies legally liable for not fixing security > holes. > > http://www.ietf.org/internet-drafts/draft-christey-wysopal-vuln-disclosu > re-0 > 0.txt > > Internet Engineering Task Force Steve Christey > INTERNET-DRAFT MITRE > Valid for six months Chris Wysopal > Category: Best Current Practice @stake, Inc. > February 2002 > > Responsible Vulnerability Disclosure Process > draft-christey-wysopal-vuln-disclosure-00.txt > > Status of this Memo > > This document is an Internet-Draft and is in full conformance with > all provisions of Section 10 of RFC2026. Internet Drafts are working > documents of the Internet Engineering Task Force (IETF), its Areas, > and its Working Groups. Note that other groups may also distribute > working documents as Internet Drafts. > > Internet-Drafts are draft documents valid for a maximum of six months > and may be updated, replaced, or obsoleted by other documents at any > time. It is inappropriate to use Internet-Drafts as reference > material or to cite them other than as "work in progress." > > The list of current Internet-Drafts can be accessed at > http://www.ietf.org/1id-abstracts.html > > The list of Internet-Draft Shadow Directories can be accessed at > http://www.ietf.org/shadow.html. > > Copyright Notice > > Copyright (C) The Internet Society (2002). All Rights Reserved. > > Abstract > > New vulnerabilities in software and hardware products are discovered > and publicized on a daily basis. The disclosure of vulnerability > information has been a divisive topic for years. During the process > of disclosure, many vendors, security researchers, and other parties > follow a variety of unwritten or informal guidelines for how they > interact and share information. Some parties may be unaware of these > guidelines, or they may intentionally ignore them. This state of > affairs can make it difficult to achieve a satisfactory outcome for > everyone who uses or is affected by vulnerability information. > > The purpose of this document is to describe best practices for a > responsible disclosure process that involves vulnerability reporters, > product vendors or maintainers, third parties, the security > community, and ultimately customers and users. > > Christey & Wysopal Expires August 2002 [Page 1] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > Table of Contents > > 1 Introduction and Purpose ....................................... 3 > 1.1 Background ................................................... 3 > 1.2 Major Roles in Disclosure .................................... 3 > 1.3 Motivations .................................................. 4 > 1.4 Goals of Responsible Disclosure .............................. 5 > 2 Phases of Responsible Disclosure ............................... 6 > 3 Responsibilities in the Phases of Vulnerability Disclosure ..... 7 > 3.1 Latent Flaw .................................................. 7 > 3.2 Discovery .................................................... 7 > 3.3 Notification Phase: Initial Notification ..................... 8 > 3.3.1 Vendor Responsibilities .................................... 8 > 3.3.2 Reporter Responsibilities .................................. 9 > 3.4 Notification Phase: Vendor Receipt .......................... 11 > 3.4.1 Vendor Responsibilities ................................... 11 > 3.5 Validation Phase ............................................ 11 > 3.5.1 Vendor Responsibilities ................................... 11 > 3.5.2 Reporter Responsibilities ................................. 13 > 3.5.3 Coordinator Responsibilities .............................. 14 > 3.6 Resolution Phase ............................................ 14 > 3.6.1 Vendor Responsibilities ................................... 14 > 3.6.2 Reporter Responsibilities ................................. 15 > 3.7 Release Phase ............................................... 16 > 3.7.1 Vendor Responsibilities ................................... 16 > 3.7.2 Reporter Responsibilities ................................. 18 > 3.7.3 Coordinator Responsibilities .............................. 18 > 3.7.4 Customer Responsibilities ................................. 19 > 3.7.5 Security Community Responsibilities ....................... 19 > 3.8 Follow-Up Phase ............................................. 20 > 4 Policy Publication ............................................ 20 > 4.1 Vendor Policy ............................................... 20 > 4.2 Reporter Policy ............................................. 20 > 4.3 Coordinator Policy .......................................... 21 > 5 References .................................................... 21 > 5.1 Disclosure Policies ......................................... 21 > 5.2 Commentary on Disclosure Details ............................ 21 > 5.3 Commentary on Disclosure Process ............................ 22 > 5.4 Commentary on Advisories .................................... 24 > 5.5 Commentary on Vendor Accessibility .......................... 24 > 5.6 Discovery of Issues in the Wild ............................. 25 > 5.7 Researcher Credibility and Vulnerability Reproduction ....... 26 > 5.8 Miscellaneous ............................................... 26 > 6 Acknowledgements .............................................. 26 > 7 Security Considerations ....................................... 26 > 8 Authors' Addresses ............................................ 27 > 9 Full Copyright Statement ...................................... 27 > > Christey & Wysopal Expires August 2002 [Page 2] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > Document Conventions > > The key words "REQUIRED", "MUST", "MUST NOT", "SHOULD", "SHOULD NOT", > and "MAY" in this document are to be interpreted as described in "Key > words for use in RFCs to Indicate Requirement Levels" [RFC2119]. > > 1 Introduction and Purpose > > This document provides guidance and recommendations for the community > of developers, vendors, end users, researchers and security > professionals who wish to perform responsible vulnerability > disclosure within the information technology arena. For purposes of > this document, the term "responsible" refers to the recognition of a > formal, repeatable process for the reporting, evaluation, resolution > and publication of vulnerability information. "Vulnerability" refers > to any bug, flaw, behavior, output, outcome or event within an > application, system, device, or service that could lead to increased > risk or security exploit. For purposes of this document, we have > standardized on the term "product" to encompass the full suite of > products that are addressed by this document. > > 1.1 Background > > Vulnerabilities are an inherent and unfortunate part of the design > and development process. Vulnerability detection may occur during > any phase of the product lifecycle, to include design, development, > testing, implementation or operation. Ideally, vulnerabilities are > largely prevented through a design process that considers security. > However, due to a variety of reasons, many vulnerabilities are > detected after a product is implemented in an operational environment > and supporting customer objectives. A variety of legislative and > social issues directly influences the process for vulnerability > research, detection and response. Developers, customers and the > security community all have divergent perspectives on the impact of > vulnerabilities. Currently, vulnerability release is inconsistent > and largely driven from the perspective of the party who has the > greatest ability to control the process. In an effort to create a > common framework by which objectives are met to the benefit of all > parties, this document communicates a formal, repeatable process for > addressing vulnerability disclosure in a responsible manner. This > document provides a means to address the common goal of providing > more secure products while reducing the risk to customers. > > 1.2 Major Roles in Disclosure > > Several types of individuals or organizations may play a role in the > process of vulnerability disclosure. These roles may overlap. > > Christey & Wysopal Expires August 2002 [Page 3] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > A Vendor is an individual or organization who provides, develops, or > maintains software, hardware, or services, possibly for free. > > A Customer is the end user of the software, hardware, or service that > may be affected by the vulnerability. > > A Reporter is the individual or organization that informs (or > attempts to inform) the Vendor of the vulnerability. Note that the > Reporter may not have been the initial discoverer of the problem. > > A Coordinator is an individual or organization who works with the > Reporter and the Vendor to analyze and address the vulnerability. > Coordinators are often well-known third parties. Coordinators may > have resources, credibility, or working relationships that exceed > those of the reporter or vendors. Coordinators may serve as proxies > for reporters, help to verify the reporter's claims, resolve > conflicts, and work with all parties to resolve the vulnerability in > a satisfactory manner. Note: while Coordinators can facilitate the > responsible disclosure process for a vulnerability, the use of > Coordinators by other parties is not a requirement. > > The Security Community includes individuals or organizations whose > primary goals include improving overall information technology > security. The community includes security administrators and > analysts, system administrators who are responsible for the security > of their systems, commercial or non-profit organizations who provide > security-related products or services, researchers and academics, > informal groups, and individuals. > > 1.3 Motivations > > Individuals and organizations have a wide variety of motivations > (some in direct conflict with each other) that make the disclosure > process more complex. > > Vendors may have one or more of the following motivations. Some > vendors believe that public notification may help their customers > address vulnerabilities, at the possible cost of negative publicity. > Some vendors may be unresponsive, or secretly fix vulnerabilities, > for fear of negative publicity. Some vendors may not have the > technical skills to understand the nature of the vulnerability and > the risk that it poses. > > Customers often wish to have secure products, but security features > can make it more difficult to use those products. Many customers do > not care about the nature of the vulnerability. However, there is a > small percentage of customers for whom vulnerability information > plays a critical role in their usage of products. Some vendors may > be customers of other vendors. > > Christey & Wysopal Expires August 2002 [Page 4] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > Reporters have a variety of motivations. Because reporters are often > the means through which vulnerability information is communicated, > they have a major impact on how the disclosure process is followed. > Reporters may be motivated by altruism ("to make computers more > secure"), recognition or fame, marketing to highlight technical > skills (for individuals as well as companies), forcing unresponsive > vendors to address a vulnerability, curiosity or the challenge of > vulnerability analysis, or malicious intent to damage the reputations > of specific vendors, wreak havoc, or cause financial damage to > customers. The vague goals of altruism are often open to different > interpretations by different reporters. Reporters may be > inexperienced, malicious, or have insufficient resources to follow > the full process of disclosure. Reporters are seldom compensated for > their important role in enhancing Internet security. > > The motivations for members of the security community may vary > depending on the specific tasks that are being undertaken by the > members. Community members may have motivations that include those > of vendors, customers, and/or reporters. In addition, members of the > security community may wish to track trends in vulnerabilities, > identify new types of vulnerabilities, or design new products and > processes to reduce the impact of vulnerabilities. > > Coordinators are often members of the security community, and as such > may share the same motivations. Coordinators may also be required by > their mission or contract to perform this role. > > 1.4 Goals of Responsible Disclosure > > The goals of responsible disclosure include: > > 1) Ensure that vulnerabilities can be identified and eliminated > effectively and efficiently for all parties. > > 2) Minimize the risk to customers from vulnerabilities that could > allow damage to their systems. > > 3) Provide customers with sufficient information for them to evaluate > the level of security in vendors' products. > > 4) Provide the security community with the information necessary to > develop tools and methods for identifying, managing, and reducing the > risks of vulnerabilities in information technology. > > 5) Minimize the amount of time and resources required to manage > vulnerability information. > > 6) Facilitate long-term research and development of techniques, > products, and processes for avoiding or mitigating vulnerabilities. > > Christey & Wysopal Expires August 2002 [Page 5] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > 7) Minimize the amount of antagonism that often exists between > parties as a result of different assumptions and expectations, due to > the lack of consistent and explicit disclosure practices. > > 2 Phases of Responsible Disclosure > > Following are the basic phases of the responsible vulnerability > disclosure process. Some of these phases may be bypassed in specific > situations with agreement across all parties. In other cases, one or > more parties may not be responsible, skipping some phases. > > 1) Latent Flaw. A flaw is introduced into a product during its > design, specification, development, installation, or default > configuration. > > 2) Discovery. One or more individuals or organizations discover the > flaw through casual evaluation, by accident, or as a result of > focused analysis and testing. In some cases, knowledge of the flaw > may be kept within a particular group. A vulnerability report or an > exploit program may be discovered "in the wild," i.e., in use by > malicious attackers or made available for use and distribution. > > 3) Notification. A reporter or coordinator notifies the vendor of > the vulnerability ("Initial Notification"). In turn, the vendor > provides the reporter or coordinator with assurances that the > notification was received ("Vendor Receipt"). > > 4) Validation. The vendor or other parties verify and validate the > reporter's claims ("Reproduction"). > > 5) Resolution. The vendor and other parties also try to identify > where the flaw resides ("Diagnosis"). The vendor develops a patch or > workaround that eliminates or reduces the risk of the vulnerability > ("Fix Development"). The patch is then tested by other parties (such > as reporter or coordinator) to ensure that the flaw has been > corrected ("Patch Testing"). > > 6) Release. The vendor, coordinator, and/or reporter release the > information about the vulnerability, along with its resolution. The > vendor may initially release this information to its customers and > other organizations with which it may have special relationships > ("Limited release"). The vendor or other parties may then release > the information - possibly with additional details - to the security > community. > > 7) Follow-up. The vendor, customer, coordinator, reporter, or > security community may conduct additional analysis of the > vulnerability or the quality of its resolution. > > Christey & Wysopal Expires August 2002 [Page 6] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > 3 Responsibilities in the Phases of Vulnerability Disclosure > > 3.1 Latent Flaw > > The following recommendations identify how most latent flaws can be > avoided. > > 1) The Vendor SHOULD ensure that programmers, designers, and testers > are knowledgeable about common flaws in the design and implementation > of products. > > Rationale: Some classes of vulnerabilities are well-known and can be > easily exploited using repeatable techniques. Educated programmers, > designers, and testers can identify and eliminate vulnerabilities > before the product is provided to customers, or prevent their > introduction into the product in the first place. > > 2) Customers SHOULD configure their products and systems in ways that > eliminate latent flaws or reduce the impact of latent flaws, > including (1) removing default services that are not necessary for > the operation of the affected systems, (2) limiting necessary > services only to networks or systems that require access, (3) using > the minimal amount of access and privileges necessary for proper > functioning of the products, and (4) using security features of the > product or operating system that reduce the chance that a flaw can be > successfully exploited. > > Rationale: Many computer intrusions involve the exploitation of > vulnerabilities in network services that are unnecessary for typical > operating environments. In some cases, system configuration can > reduce the overall risk of vulnerabilities (known and unknown). For > example, the Code Red and Nimda worms of 2001 were largely successful > because of these factors. > > 3) The Security Community SHOULD track all known vulnerabilities to > identify new classes of vulnerabilities, educate the public about > these types of vulnerabilities, and find ways to detect or prevent > them in the development, testing, and deployment of products. > > 3.2 Discovery > > 1) The Reporter SHOULD make a reasonable effort to ensure that: - the > vulnerability is real - the process of getting the product into a > known exploitable state is repeatable - the vulnerability has not > already been reported by the vendor or well-established vulnerability > information sources > > Rationale: Some vulnerabilities are re-discovered after they have > already been fixed, or the reporter has introduced the problem due to > > Christey & Wysopal Expires August 2002 [Page 7] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > misconfiguration, or the reporter identifies the symptoms of the > vulnerability without determining the cause. If the reporter ensures > that the problem is new and real, then the reporter will will avoid > unnecessarily consuming the time and resources spent by vendors and > other parties in investigating the problem. > > Note: in some cases, a reporter may not be able to make a reasonable > effort due to limitations of time, resources, access to the product, > or expertise. In some cases, the problem may only appear > intermittently, or the product is only temporarily accessible to the > reporter (e.g., when the reporter is a consultant who discovers the > problem in products that a customer uses). In other cases, the > reporter may discover information about the vulnerability without > having any access to the product. > > Note: in some cases, the reporter may be able to coerce the product > into a state that is known to be exploitable, without creating a > fully working exploit program (e.g., a buffer overflow with a long > string of 'A' characters may produce a result that shows that the > instruction pointer has been overwritten). This is considered a > reasonable effort. > > 3.3 Notification Phase: Initial Notification > > To facilitate the disclosure process, Vendors need to be accessible > to Reporters, and Reporters need to find and use the appropriate > communication channels for notifying Vendors. > > 3.3.1 Vendor Responsibilities > > 1) The Vendor MUST make it as easy as possible for Reporters, > Coordinators, Customers, and the Security Community to notify the > Vendor of vulnerabilities. > > Rationale: It is often difficult for reporters or other parties to > notify vendors of vulnerabilities, especially if the reporters are > not customers. This may cause the parties to bypass other phases of > the disclosure process, or adopt a policy that avoids vendor > notification because of previous bad experiences with vendors. > > 2) The Vendor SHOULD establish a Security Response Capability (SRC) > that consists of one or more individuals or groups that are > responsible for responding to vulnerability reports, verifying > vulnerabilities, releasing bulletins, etc. > > Christey & Wysopal Expires August 2002 [Page 8] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > 3) The Vendor SHOULD ensure that its staff knows how to recognize a > reported security issue and direct it to the Security Response > Capability. This recommendation applies to staff who provide support > online, over the telephone, in person, or through some other means by > which reporters may interact with the Vendor. > > 4) If the Vendor can control the e-mail addresses that it uses (e.g., > it has its own domain name), then the Vendor SHOULD define and > publish the "secalert" alias for use in vulnerability notification. > > Rationale: Currently, Vendors use a variety of aliases for > notification, including "security-alert," "security," and "support." > Some Vendors may use the "security" alias for physical security > facilities. The "security" alias is also defined in RFC2142 for use > in incident handling. The "security-alert" alias is longer than 8 > characters and contains a dash, which could make it more difficult to > use or locate in search engines. The "secalert" alias is not > commonly used at this time, and as such it does not have the types of > issues that some commonly-used aliases have. > > Note: smaller vendors may not be able to control which e-mail > addresses they use. > > 5) If the Vendor operates a web site or other means of distributing > information regarding its product, then the Vendor SHOULD create and > publish a "security" page or folder that identifies how vulnerability > reports should be made. The Vendor SHOULD make this page easy to > find from other locations, such as a separate contact page or index. > > 6) The Vendor MUST provide a facility for individuals or > organizations who are not Customers to report vulnerabilities. The > Vendor SHOULD NOT require (1) an active technical support number, (2) > telephone access that is not toll-free, or (3) user registration for > a web site or other facility that would be used for reporting. > > Rationale: As described earlier, some reporters or coordinators are > not necessarily customers of the Vendor. If the Vendor is not > accessible to them, then they will be more likely to bypass other > aspects of this process. > > 7) The Vendor SHOULD recognize that inexperienced or malicious > reporters may not use proper notification, and define its own > procedures for handling such cases. > > 3.3.2 Reporter Responsibilities > > 1) The Reporter SHOULD make reasonable efforts to use the appropriate > channels for notifying the Vendor of the vulnerability: > > Christey & Wysopal Expires August 2002 [Page 9] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > (a) The Reporter SHOULD attempt to notify the vendor through the > channels described in this section. > > (b) If the Vendor is not accessible through those channels, then the > Reporter MAY attempt to contact the vendor through technical > support. > > Note: in some cases, a reporter may not be able to make a reasonable > effort due to time limitations, lack of proper access to the vendor, > inexperience, expense, prohibitions by the reporter's own > organization, or the reporter does not meet some criteria for > notification (e.g., a support contract number). > > 2) If the Reporter is unable to notify the Vendor, then the Reporter > SHOULD ask a Coordinator to notify the Vendor. The Reporter SHOULD > provide the Coordinator with a list of contacts or mechanisms that > were used to attempt to notify the Vendor. > > Rationale: a Coordinator may appear more credible than the Reporter, > or have a previously established relationship with the Vendor. The > Reporter may be prohibited from disclosing the vulnerability directly > to the Vendor. > > Note: the Coordinator will not necessarily have a different way of > reaching the Vendor than the Reporter does. > > 3) The Reporter and/or Coordinator SHOULD record the date of > notification. > > Rationale: This helps Customers, Reporters, Coordinators, and the > Security Community track how long it takes for a Vendor to resolve a > vulnerability after the initial notification. > > 4) The Reporter SHOULD provide the Vendor, and the Coordinator (if > any), with all known details of the issue, including any programs, > scripts, or pseudo-code that would allow the Vendor to reproduce > and/or confirm the vulnerability. > > Rationale: such details make it easier for the Vendor and Coordinator > to reproduce and diagnose the vulnerability, which then allows the > Vendor to identify or develop a resolution more quickly. > > Note: some vulnerabilities may be theoretical or not well-understood > in this phase of the disclosure process, and the Reporter may not > have developed programs that exploit the problem. In other cases, > the Reporter may be using proprietary programs to demonstrate the > vulnerability. > > Christey & Wysopal Expires August 2002 [Page > 10] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > 3.4 Notification Phase: Vendor Receipt > > 3.4.1 Vendor Responsibilities > > 1) The Vendor MUST notify the Reporter and involved Coordinators that > the Vendor has received the notification. This Receipt does not > necessarily imply that the Vendor has researched or reproduced the > vulnerability, only that the Vendor is aware of the notification. > > Rationale: if the Vendor does not respond, then the Reporter or > Coordinator may not be sure if the Vendor is truly aware of the > reported vulnerability, and/or if the Vendor intends to resolve the > vulnerability. This often causes Reporters or Coordinators to bypass > later phases of the disclosure process in order to warn customers of > the risks to their systems. > > 2) The Vendor MUST provide the Reporter and involved Coordinators > with a Receipt within 7 days. > > Rationale: Other time frames (such as 5 business days) were > considered but deemed unworkable due to international issues (e.g., > "work weeks" may fall on different days in different countries, there > are different national or religious holidays). Defining a time frame > relative to the Vendor or Reporter could not work without some form > of communication between both parties. > > Note: small but responsible Vendors or individuals may not be able to > provide this degree of responsiveness, especially during vacation > periods. Reporters and Coordinators SHOULD take this into account > during the notification phase. Small, responsible Vendors SHOULD > post some clear notification when it is known that such delays will > occur. > > 3) If the Vendor's receipt message is automatically generated, then > it SHOULD include a time period or date by which an individual (or > the Security Response Capability) will provide follow-up on the > reported vulnerability. The time period SHOULD NOT exceed 10 days. > > 4) Within 10 days of initial notification, the Vendor's Security > Response Capability SHOULD provide a clear response to the Reporter > and any involved Coordinators. > > 3.5 Validation Phase > > 3.5.1 Vendor Responsibilities > > 1) If the vulnerability is found in a supported product, the Vendor > MUST either (1) reproduce the vulnerability, (2) determine if there > is enough evidence for the existence of the vulnerability when it > > Christey & Wysopal Expires August 2002 [Page > 11] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > cannot be reproduced, (3) determine if the vulnerability is already > known (and possibly resolved), or (4) work with the Reporter to > determine if the vulnerability is related to the specific environment > in which it was discovered (including configuration errors or > interactions with other products). > > 2) If the vulnerability is found in an unsupported or discontinued > product, the Vendor MAY refuse to validate the vulnerability. > However, the Vendor MUST ensure that the reported vulnerability does > not exist in supported product versions or other supported products > based on the vulnerable product. > > 3) The Vendor SHOULD NOT assume that the risk or impact of the > vulnerability is limited to what has been identified by the Reporter > or involved Coordinator. > > Rationale: The Reporter or involved Coordinator may not have > sufficient experience or time to identify the full scope of the > problem. Sometimes, a theoretical vulnerability is later found to be > more easily exploitable as a result of follow-on analysis or the > creation of a tool. For example, it may be easy for a Reporter to > find evidence of a buffer overflow vulnerability by sending a long > argument that causes a product to crash. It is an indicator that a > carefully crafted program could be used to execute arbitrary code. > The Reporter and Vendor may not have the skills or resources to > create such a program, but such a program could be created in the > future. > > 4) The Vendor SHOULD examine its product to ensure that it is free of > other problems that are similar to the reported vulnerability. > > Rationale: some Vendors reproduce and resolve the specific issue that > is identified by the Reporter without extending their analysis to see > if similar mistakes were made elsewhere in the product. The > Reporter, others in the Security Community, or hackers may conduct > follow-on research to find these other vulnerabilities. This can > result in a cycle in which vulnerabilities are discovered and patched > so often that it becomes difficult for customers to manage the volume > of resolutions that they need to apply. > > 5) The Vendor MUST consult with the Reporter and involved > Coordinators when more information or analysis is needed. > > 6) The Vendor SHOULD provide status updates to the Reporter and any > involved Coordinators every 7 days. The Vendor MAY negotiate with > the parties for less frequent updates. > > 7) The Vendor MUST notify the Reporter and any involved Coordinators > when the Vendor is able to reproduce the vulnerability. > > Christey & Wysopal Expires August 2002 [Page > 12] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > 8) The Vendor SHOULD attempt to resolve the vulnerability within 30 > days of initial notification. > > 9) If the Vendor cannot resolve the vulnerability within 30 days, > then the Vendor MUST provide the Reporter and involved Coordinators > with specific reasons why the vulnerability cannot be resolved. > > 10) If the Vendor is aware of other vendors that share the same > codebase as the affected product, then the Vendor MUST either (1) > notify those vendors, or (2) notify a Coordinator that other Vendors > may be affected by the reported vulnerability. > > 3.5.2 Reporter Responsibilities > > 1) The Reporter SHOULD work with the Vendor in a timely fashion to > explain the vulnerability and conduct further analysis. > > Rationale: if a problem is sufficiently complex or only appears in a > portion of deployed systems, then the Vendor may not be able to > reproduce the issue. In other cases, the Vendor may not understand > the problem. If the Reporter is slow to respond, then this can > extend the time window during which Customers are at risk. > > 2) If the Vendor does not understand the nature, risk, or resolution > of the vulnerability, then the Reporter or involved Coordinators > SHOULD provide the Vendor with resources that help to explain the > vulnerability. > > Note: Some Vendors may require - or insist - upon extensive > consultation to identify the vulnerability. Reporters and > Coordinators may not have the time or resources to provide such > assistance. > > 3) If the Reporter does not have the time or resources to conduct > such analysis, then the Reporter SHOULD notify the Vendor and suggest > alternate contacts (such as Coordinators) who may be able to assist > the Vendor. The Reporter SHOULD NOT attempt to bypass later phases. > > 4) If the Reporter finds that the Reporter is in error, then the > Reporter SHOULD notify the Vendor and involved Coordinators. > > Rationale: if a Reporter does not perform this notification, then the > Vendors or Coordinators may continue to spend unnecessary resources > on further analysis of the issue. > > 5) The Reporter SHOULD grant time extensions to the Vendor if there > is evidence that the Vendor is acting in good faith to resolve the > vulnerability. > > Christey & Wysopal Expires August 2002 [Page > 13] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > 6) If the Vendor is unresponsive or disagrees with the Reporter's > findings, then the Reporter SHOULD involve a Coordinator. > > 3.5.3 Coordinator Responsibilities > > 1) The Coordinator MUST attempt to resolve any conflicts or technical > disagreements that arise between the Reporter and the Vendor. > > 2) If a Vendor is unresponsive or does not appear to be acting in > good faith to resolve the vulnerability, then the Coordinator SHOULD > attempt to convince the Vendor to follow the proper process. > > 3) If a Reporter is unresponsive or does not appear to be acting in > good faith to resolve the vulnerability, then the Coordinator SHOULD > attempt to convince the Reporter to follow the proper process. > > 4) The Coordinator SHOULD work with the Vendor and Reporter to > determine if other Vendors are affected by the same problem. > > 5) The Coordinator SHOULD work with the Vendor and Reporter to > identify time extensions (if any) that are acceptable to all > parties. > > 3.6 Resolution Phase > > The "Resolution" of a vulnerability involves action regarding one or > more of the following: > > - patch creation > - recommendation of configuration change > - design change > - workaround > - no action > > If the Vendor does not participate or is unresponsive, then the > Reporter and Coordinator might not be able to create a patch or > change the design of the product. > > 3.6.1 Vendor Responsibilities > > 1) The Vendor MUST identify the fundamental nature of the flaw within > the source code or in the design of the product ("Diagnosis"). > > 2) The Vendor MUST either (1) provide a patch, configuration change, > or workaround that appropriately reduces or eliminates the risk of > the vulnerability ("Fix Development"), or (2) provide the Reporter > and involved Coordinators with specific reasons for its inaction. > > Christey & Wysopal Expires August 2002 [Page > 14] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > 3) The Vendor SHOULD request time extensions from the Reporter and > involved Coordinators when necessary. > > 4) The Vendor SHOULD test the patches, configuration changes, and > workarounds sufficiently to ensure that either (1) they do not > adversely affect the operation of the product, or (2) it is clear > which conditions may adversely affect the operation of the product. > > Rationale: Vendors may be pressured to quickly resolve > vulnerabilities without sufficient testing, especially when Reporters > have bypassed the Notification or Validation phases. As a result, > the resolution may adversely affect more systems than necessary. > > 5) The Vendor MUST provide the Reporter and involved Coordinators > with all known configuration changes or workarounds that address the > vulnerability ("Fix Development"). > > 6) The Vendor SHOULD provide the Reporter and involved Coordinators > with any patches ("Patch Testing"). > > Rationale: this helps the Reporter and Coordinator to confirm that > the vulnerability has been reduced or eliminated. > > Note: the Vendor's business model may require that only supported > Customers can have access to a patch, which could exclude Reporters > or Coordinators. Such Vendors should recognize that this practice > may result in an incomplete patch that does not address the > vulnerability in question. > > 7) If the Reporter is unresponsive or uncooperative, or a dispute > arises, then the Vendor SHOULD work with a Coordinator to identify > the best available resolution for the vulnerability. > > 3.6.2 Reporter Responsibilities > > 1) The Reporter SHOULD recognize that it may be difficult for a > Vendor to resolve a vulnerability within 30 days if (1) the problem > is related to insecure design, (2) the Vendor has a diverse set of > hardware, operating systems, and/or product versions to support, or > (3) the Vendor is not skilled in security. > > 2) The Reporter SHOULD grant time extensions to the Vendor if the > Vendor is acting in good faith to resolve the vulnerability. > > 3) If the Vendor is unresponsive or uncooperative, or a dispute > arises, then the Reporter SHOULD work with a Coordinator to identify > the best available resolution for the vulnerability. > > Christey & Wysopal Expires August 2002 [Page > 15] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > 3.7 Release Phase > > 3.7.1 Vendor Responsibilities > > 1) The Vendor SHOULD work with the Reporter and involved Coordinators > to arrange a date after which the vulnerability information may be > released. > > 2) The Vendor MAY ask the Reporter and Coordinator to allow a "Grace > Period" up to 30 days, during which the Reporter and Coordinator do > not release details of the vulnerability that could make it easier > for hackers to create exploit programs. > > Rationale: a grace period provides Customers with a time period in > which they can fix their systems. During this time, the lack of > details may make it more difficult or resource-intensive for > attackers to determine the nature of the vulnerability and craft an > exploit. However, some security-aware Customers desire such details > so that they can better decide whether the resolution of the > vulnerability is appropriate for their environment. In addition, > some members of the Security Community desire such details in order > to (1) enhance tools or techniques to detect vulnerable systems on > Customer networks (such as vulnerability scanners), (2) enhance tools > or techniques to detect attempts to exploit vulnerabilities on > Customer networks (such as intrusion detection systems), (3) provide > databases or other information that Customers use to identify and > prioritize vulnerabilities that may affect the Customer's enterprise, > and (4) perform research and trend analysis. > > 3) If the Reporter has not properly followed the process and publicly > announces the vulnerability, then the Vendor SHOULD post its > awareness of the vulnerability, and the Vendor's progress in its > resolution, to appropriate forums. > > Rationale: this allows Customers and the Security Community to know > that the Vendor is aware of the problem and working to resolve it. > > Note: some Vendors may not wish to acknowledge such vulnerabilities > until a patch is available. > > 4) If a Reporter has properly followed the process, then the Vendor > MUST provide credit to that reporter. > > 5) If a Coordinator has properly followed the process, then the > Vendor SHOULD provide credit to the Coordinator. > > 6) If a Reporter has not properly followed the process and publicly > announces the vulnerability, then the Vendor MAY provide credit to > the reporter. > > Christey & Wysopal Expires August 2002 [Page > 16] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > Rationale: Some people believe that even if a reporter has not > followed the procedures properly, the reporter has still provided > valuable information that is useful to the Vendor, Customers, > Coordinators, and the Security Community, and academic integrity > would dictate that reporters should be credited. However, since > credit is a motivation for some reporters, others believe that > irresponsible reporters should not be encouraged to bypass the > process and still get credit. > > 7) The Vendor MUST NOT assume that the lack of vulnerability details > will prevent the creation of an exploit. > > Rationale: If the Vendor provides source code for the product, then > any entity who has access to the product could easily determine the > specific locations of the vulnerability and identify possible attack > vectors that reach the vulnerable code. If the Vendor does not > provide source code, then any entity who has access to a patch could > use reverse engineering techniques to determine how the code was > changed, then infer the nature of the vulnerability. > > 8) The Vendor SHOULD cryptographically sign all patches using a > method that is commonly accessible on the platforms for the Vendor's > product. The Vendor should clearly advertise its cryptographic key > and provide cryptographic checksums for its patches. > > Rationale: This increases the assurance that the patches from the > Vendor are authentic. > > 9) The Vendor SHOULD provide an easily accessible mechanism for > Customers and the Security Community to obtain all security > advisories, such as a web page. The most recent advisory SHOULD be > listed first. > > 10) The Vendor SHOULD provide a mechanism for notifying Customers and > the Security Community when new advisories are published. > > 11) The Vendor SHOULD provide a means for the Security Community to > identify which reported vulnerabilities are genuine, but are not > regarded by the Vendor as important enough to merit a security > advisory. > > Rationale: Vendors are often unwilling to release security advisories > unless the security issue is critical for its Customers. This can > reduce operating expenses for the Vendor and most Customers. > However, some members of the Security Community, and some Customers, > also prefer to protect themselves against less serious > vulnerabilities. If a Vendor does not at least indicate to its > security-aware Customers that a security-related resolution is > available, then those Customers may remain at risk for > > Christey & Wysopal Expires August 2002 [Page > 17] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > vulnerabilities that they would otherwise wish to resolve. > > 12) The Vendor SHOULD provide an easily accessible indicator that > allows a Customer to determine if the resolution has been applied to > a system, e.g., by modifying the product's version number or > providing the Customer with a tool that identifies the resolutions > that have been applied to a product. > > 3.7.2 Reporter Responsibilities > > 1) The Reporter SHOULD work with the Vendor and involved Coordinators > to arrange a date after which the vulnerability information may be > released. > > 2) If the Vendor has not resolved the vulnerability within a time > frame that is allowed by this process, then the Reporter SHOULD work > with a Coordinator to announce the vulnerability to Customers and the > Security Community. > > 3) If another reporter has not properly followed the process and > publicly announced the vulnerability, then the Reporter MAY announce > that the Reporter was responsibly following the disclosure process > with the Vendor and involved Coordinators. > > 4) If a Vendor requests a Grace Period, then the Reporter SHOULD > follow the Grace Period before releasing details of the > vulnerability. > > 5) After the Grace Period, the Reporter MAY release additional > details. The Reporter SHOULD carefully consider how much detail is > needed by Customers and the Security Community. > > Note: in some cases, the nature of the vulnerability could make it > difficult or impossible to release vulnerability details that do not > allow someone to exploit the vulnerability. > > 6) The Reporter SHOULD provide credit to any Vendor and/or > Coordinator who has followed the process. > > 3.7.3 Coordinator Responsibilities > > 1) The Coordinator SHOULD work with the Vendor and Reporter to > arrange a date after which the vulnerability information may be > released. > > 2) If the Vendor requests a Grace Period, the Coordinator SHOULD > follow the Grace Period and encourage the Reporter to follow the > Grace Period. > > Christey & Wysopal Expires August 2002 [Page > 18] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > 3) The Coordinator SHOULD provide credit to any Vendor and/or > Reporter who properly follows the process. > > 4) The Coordinator MAY provide credit to a reporter who has not > properly followed the process. > > 3.7.4 Customer Responsibilities > > 1) The Customer MUST NOT assume that the lack of details will prevent > the creation of an exploit. > > 2) If the Vendor has released information regarding the > vulnerability, then the Customer SHOULD assume that the information > is credible. The Customer SHOULD NOT require that the vulnerability > be demonstrated before applying the resolution. > > 3) If the Vendor has not released such information, but a > well-established Reporter or Coordinator has, then the Customer > SHOULD assume that the information is credible. The Customer SHOULD > NOT require that the vulnerability be demonstrated before applying > the resolution. > > 4) If vulnerability information has been released and a Grace Period > exists, then the Customer SHOULD apply the resolution to its systems > during the Grace Period. > > 5) Where possible, the Customer SHOULD test any patches, > configuration changes, or workarounds on test systems before making > the changes in an operational environment. > > 6) The Customer SHOULD inform the Vendor and the Security Community > if a patch, configuration change, or workaround does not appear to > work properly. > > 7) The Customer SHOULD give preference to products whose Vendors > follow responsible disclosure practices. > > 3.7.5 Security Community Responsibilities > > 1) The Security Community SHOULD publicly recognize all Vendors, > Reporters, and Coordinators who follow responsible vulnerability > disclosure. > > 2) The Security Community SHOULD adopt a set of terms that allows all > parties to describe the inherent risk or impact of a vulnerability > that can be interpreted in various environments, threat levels, and > policies. > > Christey & Wysopal Expires August 2002 [Page > 19] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > Rationale: Customers have varying operational needs at different > levels of security, which can make it difficult to define a "one size > fits all" risk level for any vulnerability. Current terminology > often uses a "High, Medium, Low" breakdown, but there are no formal > definitions. As such, this terminology is used inconsistently, > partially because it is based on the perspective of the entity who is > using it. It is also insufficient to capture the complexity and > tradeoffs of vulnerabilities in today's environment. > > 3.8 Follow-Up Phase > > 1) The Vendor SHOULD clearly notify Customers and the Security > Community when a resolution is (a) faulty, or (b) revised. > > 2) The Vendor SHOULD NOT re-release the same advisory for newly > discovered, closely related vulnerabilities. > > Rationale: The re-release of an advisory may not be noticed as well > by Customers, which could cause the Customers to believe that their > systems are secure because they applied the resolution that was > identified in the original advisory. > > 4 Policy Publication > > 4.1 Vendor Policy > > A Vendor SHOULD publish a policy and procedures statement that > includes the following information: > > 1) Where it complies (and does not comply) with the process outlined > in this document. > > 2) The typical amount of time after notification that the Vendor > requires to produce a resolution. > > 3) The Grace Period, if any, that the Vendor wishes to observe. > > 4) How the Vendor determines whether a reported problem is serious > enough to merit a security advisory. > > 4.2 Reporter Policy > > If a Reporter is a member of the Security Community and the Reporter > frequently finds new vulnerabilities, then the Reporter SHOULD > publish a policy and procedures statement that includes the following > information: > > 1) Where it complies (and does not comply) with the process outlined > in this document. > > Christey & Wysopal Expires August 2002 [Page > 20] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > 2) The maximum Grace Period that the Reporter is willing to follow. > > 4.3 Coordinator Policy > > A Coordinator SHOULD publish a policy and procedures statement that > includes the following information: > > 1) Where the Coordinator complies (and does not comply) with the > process outlined in this document. > > 2) The maximum Grace Period that the Coordinator is willing to > follow. > > 5 References > > Note: many of these references identify posted messages to > security-related mailing lists. These messages often resulted in > long threads that explore the related issues in more depth. > > 5.1 Disclosure Policies > > RFPolicy 2.0 > http://www.wiretrip.net/rfp/policy.html > > Bugtraq Frequently Asked Questions > http://www.securityfocus.com/popups/forums/bugtraq/faq.shtml > > NTBugtraq Disclosure Policy > http://ntbugtraq.ntadvice.com/default.asp?sid=1&pid=47&aid=48 > > CERT/CC Vulnerability Disclosure Policy > http://www.kb.cert.org/vuls/html/disclosure/ > > ACROS ASPR Notification and Publishing Policy > http://www.acros.si/aspr_policy.html > > NMRC policy > http://www.nmrc.org/advise/policy.txt > > @stake Security Advisory Disclosure Policy > http://www.atstake.com/research/policy/index.html > > 5.2 Commentary on Disclosure Details > > "Full Disclosure is a necessary evil" > Elias Levy > SecurityFocus web site > August 16, 2001 > http://www.securityfocus.com/news/238 > > Christey & Wysopal Expires August 2002 [Page > 21] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > "It's Time to End Information Anarchy" > Scott Culp > Microsoft web site > October 2001 > http://www.microsoft.com/technet/columns/security/noarch.asp > > "Security in an Open Electronic Society" > Elias Levy > SecurityFocus web site > October 21, 2001. > http://www.securityfocus.com/news/270 > > "Full Disclosure" > Bruce Schneier > Crypto-Gram Newsletter > November 15, 2001 > http://www.counterpane.com/crypto-gram-0111.html#1 > > "Script Kiddies Suck" > Marcus Ranum > Black Hat Briefings presentation > July 2000 > http://web.ranum.com/usenix/blackhat-2000-keynote.mp3 > > "The Network Police Blotter: The Slaughter of the Innocents" > Marcus Ranum > ;Login: magazine > October 2000 > http://web.ranum.com/usenix/ranum_5_temp.pdf > > 5.3 Commentary on Disclosure Process > > "Bugs in the Disclosure Process" > Ivan Arce > TISC Insight, Volume 3, Issue 3 > February 9, 2001 > http://tisc.corecom.com/newsletters/33.html > > "SUMMARY: Bug announcement rule of thumb." > Bill Stout > NTBugtraq mailing list > August 13, 1998 > http://marc.theaimsgroup.com/?l=ntbugtraq&m=90310164223252&w=2 > > Christey & Wysopal Expires August 2002 [Page > 22] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > "Microsoft admits IE security alert lapse" > Wendy McAuliffe > ZDNet > November 19, 2001 > http://www.zdnet.com/filters/printerfriendly/ > 0,6061,2825716-2,00.html > > "RFP2K03: Contemplations on dvwssr.dll and its affects on life" > Rain Forest Puppy > Bugtraq mailing list > April 20, 2000 > http://www.securityfocus.com/archive/1/56394 > > "Xato Advisory: Win2k/XP Terminal Services IP Spoofing" > Xato > Bugtraq mailing list > November 14, 2001 > http://www.securityfocus.com/archive/1/240248 > > "Vulnerability Escrow (was: Extreme Hacking)" > Crispin Cowan > NFR Wizards mailing list > July 7, 1999 > http://archives.neohapsis.com/archives/nfr-wizards/1999_2/0416.html > > "Can we afford full disclosure of security holes?" > Richard M. Smith > Bugtraq mailing list > August 10, 2001 > http://www.securityfocus.com/archive/1/203499 > > "Anti-Web 'Vulnerability' is a false alarm" > Doug Hoyte > Vuln-Dev mailing list > December 1, 2001 > http://marc.theaimsgroup.com/?l=vuln-dev&m=100732828128718&w=2 > > "Windows of Vulnerability: A Case Study Analysis" > William A. Arbaugh, William L. Fithen, John McHugh > IEEE Computer > December 2000 > > "Sun denies Unix flaw" > John Geralds > vnunet.com > November 20, 2001 > http://www.vnunet.com/News/1126973 > > Christey & Wysopal Expires August 2002 [Page > 23] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > "Open Response To Microsoft Security - RE: It's Time to End > Information Anarchy" > Steve Manzuik > Vuln-Dev mailing list > October 17, 2001 > http://archives.neohapsis.com/archives/vuln-dev/2001-q4/0195.html > > "A Step Towards Information Anarchy: A Call To Arms" > hellNbak > Nomad Mobile Research Center > November 2, 2001 > http://www.nmrc.org/InfoAnarchy/InfoAnarchy.htm > > "To Disclose or Not to Disclose, That Is the Question" > Mark Joseph Edwards > Windows 2000 Magazine > June 27, 2001 > http://www.windowsitsecurity.com/Articles/Index.cfm?ArticleID=21618 > > "Towards a responsible vulnerability process" > David LeBlanc > NTBugtraq mailing list > November 3, 2001 > http://archives.neohapsis.com/archives/ntbugtraq/2001-q4/0097.html > > 5.4 Commentary on Advisories > > "Writing security advisories" > Kurt Seifried > September 10, 2001 > http://www.seifried.org/security/articles/ > 20010910-writing-security-advisories.html > > "Xato commentary on MS security bulletins" > Xato > Bugtraq mailing list > December 7, 2000 > http://marc.theaimsgroup.com/?l=bugtraq&m=97626305317046&w=2 > > 5.5 Commentary on Vendor Accessibility > > "Getting to the Third Wave of Security Responsiveness" > Scott Culp > January 2001 > http://www.microsoft.com/technet/columns/security/thrdwave.asp > > Christey & Wysopal Expires August 2002 [Page > 24] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > "An informal analysis of vendor acknowledgement of vulnerabilities" > Steve Christey, Barbara Pease > Bugtraq mailing list > March 11, 2001 > http://marc.theaimsgroup.com/?l=bugtraq&m=98438570915835&w=2 > > "Shockwave Flash buffer overflow" > Neal Krawetz > Bugtraq mailing list > December 29, 2000 > http://marc.theaimsgroup.com/?l=bugtraq&m=97845942432045&w=2 > > "Re: Shockwave Flash buffer overflow" > Peter Santangeli > Bugtraq mailing list > January 5, 2001 > http://marc.theaimsgroup.com/?l=bugtraq&m=97897439808223&w=2 > > "Re: SafeWord Agent for SSH (secure shell) vulnerability" > Leif Nixon > Bugtraq mailing list > November 29, 2001 > http://marc.theaimsgroup.com/?l=bugtraq&m=100706579514862&w=2 > > 5.6 Discovery of Issues in the Wild > > "sadmind" > Nancy Lin > SF-INCIDENTS mailing list > December 9, 1999 > http://marc.theaimsgroup.com/?l=incidents&m=94476722417209&w=2 > > "sadmind exploits (remote sparc/x86)" > Marcy Abene > Bugtraq mailing list > December 10, 1999 > http://marc.theaimsgroup.com/?l=bugtraq&m=94486731225359&w=2 > > "IIS %c1%1c remote command execution" > Rain Forest Puppy > Bugtraq mailing list > October 17, 2000 > http://marc.theaimsgroup.com/?l=bugtraq&m=97180137413891&w=2 > > Christey & Wysopal Expires August 2002 [Page > 25] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > 5.7 Researcher Credibility and Vulnerability Reproduction > > "vCard DoS on Outlook 2000" > Joel Moses > Bugtraq mailing list > August 31, 2000 > http://marc.theaimsgroup.com/?l=bugtraq&m=96774764029236&w=2 > > "Microsoft Outlook 2000 vCard Buffer Overrun" > @stake > February 26, 2001 > http://www.atstake.com/research/advisories/2001/a022301-1.txt > > "Re: Microsoft Security Bulletin MS01-012" > Joel Moses > Bugtraq mailing list > February 23, 2001 > http://marc.theaimsgroup.com/?l=bugtraq&m=98322714210100&w=2 > > 5.8 Miscellaneous > > "Vulnerability disclosure publications and discussion tracking" > University of Oulu > November 20, 2001 > http://www.ee.oulu.fi/research/ouspg/sage/disclosure-tracking/ > > "Devil in the details - why package signing matters" > Kurt Seifried > October 24, 2001 > http://www.seifried.org/security/articles/ > 20011023-devil-in-details.html > > 6 Acknowledgements > > We gratefully acknowledge the constructive comments received from > several contributors. Any errors or inconsistencies in this document > are solely the responsibility of the authors, and not of the > reviewers. This document does not necessarily reflect the opinion of > the reviewers or their parent organizations. > > We would like to thank Andy Balinsky, Mary Ann Davidson, Elias Levy, > Russ Cooper, Scott Blake, Seth Arnold, Rain Forest Puppy, Marcus > Ranum, Lori Woeler, Adam Shostack, Mark Loveless, Scott Culp, and > Shawn Hernan for their valuable input. > > 7 Security Considerations > > This entire document discusses security issues. > > Christey & Wysopal Expires August 2002 [Page > 26] > > Internet-Draft Responsible Vulnerability Disclosure February 2002 > > 8 Authors' Addresses > > Steve Christey > The MITRE Corporation > 202 Burlington Road > Bedford, MA 01730 > USA > > E-Mail: coley@m... > > Chris Wysopal > @stake, Inc. > 196 Broadway > Cambridge, MA 02139-1902 > USA > > E-Mail: cwysopal@a... > > 9 Full Copyright Statement > > Copyright (C) The Internet Society (2002). All Rights Reserved. > > This document and translations of it may be copied and furnished to > others, and derivative works that comment on or otherwise explain it > or assist in its implementation may be prepared, copied, published > and distributed, in whole or in part, without restriction of any > kind, provided that the above copyright notice and this paragraph are > included on all such copies and derivative works. However, this > document itself may not be modified in any way, such as by removing > the copyright notice or references to the Internet Society or other > Internet organisations, except as needed for the purpose of > developing Internet standards in which case the procedures for > copyrights defined in the Internet Standards process must be > followed, or as required to translate it into languages other than > English. > > The limited permissions granted above are perpetual and will not be > revoked by the Internet Society or its successors or assigns. > > This document and the information contained herein is provided on an > "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING > TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING > BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION > HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF > MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. > > This document expires August 12, 2002. > > Christey & Wysopal Expires August 2002 [Page > 27] > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, the > hands acquire shaking, the shaking is a warning. It is by caffeine > alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > _________________________________________________________ > Do You Yahoo!? > Get your free @yahoo.com address at http://mail.yahoo.com > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- Gordon phone +1 (425) 489-0446 or toll free (888) 284-5457 Electronic eavesdropping detection Bug-Killer.com Finding clues in computers eSleuth.com 5097 From: Gordon Mitchell Date: Sat Mar 30, 2002 7:20am Subject: Re: Spy Software Detection Help Of course it depends on what you mean by spyware. I consider programs like Real Audio to be spyware. Here's something that seems to work finding registry entries and looking for .dll files. http://www.lavasoft.de/aaw.html -- Gordon phone +1 (425) 489-0446 or toll free (888) 284-5457 Electronic eavesdropping detection Bug-Killer.com Finding clues in computers eSleuth.com Richard Gray wrote: > > Is there any software that will detect logging and spyware programs > installed on a computer? > > Ricky > > > _________________________________ > Richard T. Gray Jr. > Legal Investigator > License No. 1914-050896-LA > > Gray & Associates, LLC > PO Box 2368 > Crowley, LA 70527 > 337-785-0046 Voice > 800-394-8216 Fax > www.la-pi.com > ricky@l... > "When you need to know!" > > -----Original Message----- > From: Marko Radovic [mailto:radovic_marko@y...] > Sent: Friday, March 22, 2002 2:12 AM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] ISO 17799 > > Hello, > > I would like to thank all the pepople who privided > help and information cocerning ISO 17799 standard. > > Any additional information about standard is welcome. > > Marko > > __________________________________________________ > Do You Yahoo!? > Everything you'll ever need on one web page > from News and Sport to Email and Music Charts > http://uk.my.yahoo.com > > Yahoo! Groups Sponsor > > ADVERTISEMENT > > 007140:HM/A=847665/R=0/*http://ads.x10.com/?bHlhaG9vbW9uc3RlcjcuZGF0=101 > 6803186%3eM=215002.1818248.3328688.1261774/D=egroupweb/S=1705007140:HM/A > =847665/R=1> > > pmail/S=1705007140:HM/A=847665/rand=398610181> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service > . > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5098 From: A Grudko Date: Sat Mar 30, 2002 10:24am Subject: Spam - Original Message - >>From: Steve Uhrig >> I don't believe I have signed up with any new groups or made any changes to my account since Jan 21st which would give these clowns license to change all my preferences. Ahh - I had noticed an increase in spam to about 10 % of my eMails, but I put down to the fact that I turned off my Spam-Buster last month because it was interfering with my CD writer. It never occured to me that 'they' might have changed my preferences but it's probably a right they . I'll certainly go into the site and check my settings. Thanks Steve for this valueable info. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 5099 From: Fernando Martins Date: Sat Mar 30, 2002 3:26pm Subject: RE: Spy Software Detection Help Yes, several, but should you relly on them? The best way is to *dig* in the OS and see what is running ... For example, if it is (and I hope it's not) some 0-day spy trojan or logging application, it's not known, so shareware or commercial software will not spot it probably. FM ª -----Original Message----- ª From: Richard Gray [mailto:laspy1@y...] ª Sent: domingo, 24 de MarÁo de 2002 21:32 ª To: tscm-l@yahoogroups.com ª Subject: [TSCM-L] Spy Software Detection Help ª ª ª Is there any software that will detect logging and spyware ª programs installed on a computer? ª ª Ricky ª ª ª _________________________________ ª Richard T. Gray Jr. ª Legal Investigator ª License No. 1914-050896-LA ª ª Gray & Associates, LLC ª PO Box 2368 ª Crowley, LA 70527 ª 337-785-0046 Voice ª 800-394-8216 Fax ª www.la-pi.com ª ricky@l... ª "When you need to know!" ª ª -----Original Message----- ª From: Marko Radovic [mailto:radovic_marko@y...] ª Sent: Friday, March 22, 2002 2:12 AM ª To: TSCM-L@yahoogroups.com ª Subject: [TSCM-L] ISO 17799 ª ª ª Hello, ª ª I would like to thank all the pepople who privided ª help and information cocerning ISO 17799 standard. ª ª Any additional information about standard is welcome. ª ª Marko ª ª __________________________________________________ ª Do You Yahoo!? ª Everything you'll ever need on one web page ª from News and Sport to Email and Music Charts http://uk.my.yahoo.com ª ª ª ª Yahoo! Groups Sponsor ª ª ADVERTISEMENT ª ª ª ª ª ª ======================================================== ª TSCM-L Technical Security Mailing List ª "In a multitude of counselors there is strength" ª ª To subscribe to the TSCM-L mailing list visit: ª http://www.yahoogroups.com/community/TSCM-L ª ª It is by caffeine alone I set my mind in motion. ª It is by the juice of Star Bucks that thoughts acquire speed, ª the hands acquire shaking, the shaking is a warning. It is by ª caffeine alone I set my mind in motion. ª =================================================== TSKS ª ª Your use of Yahoo! Groups is subject to the Yahoo! Terms of ª Service . ª ª ª ª ª [Non-text portions of this message have been removed] ª ª ª ª ------------------------ Yahoo! Groups Sponsor ª ---------------------~--> Tiny Wireless Camera under $80! ª Order Now! FREE VCR Commander! Click Here - Only 1 Day Left! ª http://us.click.yahoo.com/nuyOHD/7.PDAA/yigFAAª /kgFolB/TM ª ª ª -------------------------------------------------------------- ª -------~-> ª ª ======================================================== ª TSCM-L Technical Security Mailing List ª "In a multitude of counselors there is strength" ª ª To subscribe to the TSCM-L mailing list visit: ª http://www.yahoogroups.com/community/TSCM-L ª ª It is by caffeine alone I set my mind in motion. ª It is by the juice of Star Bucks that thoughts acquire ª speed, the hands acquire shaking, the shaking is a warning. ª It is by caffeine alone I set my mind in motion. ª =================================================== TSKS ª ª Your use of Yahoo! Groups is subject to ª http://docs.yahoo.com/info/terms/ ª ª ª 5100 From: Fernando Martins Date: Sat Mar 30, 2002 4:15pm Subject: RE: Re: THE 2002 U.S. BIG BROTHER AWARDS > From: Steve Uhrig [mailto:steve@s...] (...) > that all our dealings with the Government of Indonesia were > legitimate intelligence matters. (...) > "Lawyers, academics, consultants, journalists and civil > rights activists" > on the panel. That should say it all. Pathetic morons who need to see > their names in lights, and give each other awards. As a consultant, and as portuguese, I may consider that "That should say it all" may work in both ways ... Not 10, but probably 15 years ago I was also saying that "That should say it all", but then, somehow, I get involved with the East Timor issue, and learned that not all indonesians, or people with deals with them, do things against human rights, and so I learn to respect them. Fernando Martins Consultant for IT, Electronic and Physical Security 5101 From: Date: Sun Mar 31, 2002 5:08am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. This file is set to automatically go out to list members every two weeks, Please review it, and ensure that you are listed properly (correct address, phone, etc). ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Mid Atlantic and New York City Metropolitan Area (also, Manhattan, Long Island, New Jersey, and Pennsylvania) Kevin D. Murray Murray Associates P.O. Box 668 Oldwick, NJ 08858 (908) 832-7900 Telephone URL: http://www.spybusters.com/ E-mail: murray@s... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (425) 489-0446 Telephone URL: http://www.bug-killer.com/ E-mail: gordonm@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 5102 From: Graham Bignell Date: Sat Mar 30, 2002 10:06pm Subject: Re: Spy Software Detection Help On Sun, 24 Mar 2002, Richard Gray wrote: > Is there any software that will detect logging and spyware programs > installed on a computer? Others have reffered to virus-scanner like software which will work great unless the spyware is written to hide itself or is new. A solution that will detect logging/spyware programs working on a system or inside a network is the use of Tripwire (http://tripwire.com) or similar tool which detects any change to files and a proper firewall. Proper Firewall Configuration (IMO) means that everything not denied is logged. Unfortunatly, typical spyware behavior is to use HTTP or DNS as carrier protocols, which is basically invisible to a packet filtering firewall that simply blocks on IP. This is where "personal firewall" systems can come in quite handy, as they run under the same OS as the spyware, and are so able to view system internals and identify which application it is that attempts use of the network. --- Graham "Lorax" Bignell - 416 366 9755 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 From: Andre Holmes <1ach@g...> Date: Fri Mar 28, 2003 6:16pm Subject: Fw: Mason A-3 Radio Reciever ----- Original Message ----- From: "Andre Holmes" <1ach@G...> To: "Jason Dibley" Sent: Friday, March 28, 2003 7:15 PM Subject: Re: [TSCM-L] Mason A-3 Radio Reciever > Hello > > To add to the inquiry > > I have full manual,schematics,and tuning operations it is a thick package > and can cost $100.00 in materials just to print. > > Question do you have the TV-1 if so can you give a description of its > design. > > Andre Holmes > Neptune Enterprise Security > ----- Original Message ----- > From: "Jason Dibley" > To: > Sent: Friday, March 28, 2003 10:25 AM > Subject: [TSCM-L] Mason A-3 Radio Reciever > > > > > > I have a Mason A-3 Radio reciever with spectrum display. I only have the > > operators manual, no service or schematics. if this is any help. > > > > Cheers > > > > Jason Miles Dibley > > QCC Interscan Ltd > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > 7114 From: James M. Atkinson Date: Fri Mar 28, 2003 7:36pm Subject: Membership Warning Greetings, There is a convicted felon, and con artist in Tampa, Florida who has been spoofing email to members of this list, claiming that my website is going down, that the TSCM-L list is going down, and similar drivel. Some quick research proved who the offender was, and he will be dealt with appropriately... in a way that he will remember for a quite a while. The lesson will also be taught to some of his friends, associates, and family members as an example to them to also behave themselves. If you get any of his drivel please forward it to me, so I can in turn forward it to the appropriate authorities in Florida. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7115 From: A Grudko Date: Fri Mar 28, 2003 6:18pm Subject: Re: Membership Warning - Original Message - > There is a convicted felon, and con artist in Tampa, Florida who has been spoofing email to members of this list, claiming that my website is going down I got a second one minutes ago from jmatk@c... and will forward it privatly. Happy hunting (just remember that major calibres are more effective but minor calibres are more fun). Andy Grudko (British), Grad I.S, South Africa Registered as a security service provider by the Private Security Industry Regulatory Authority, registration number 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 7116 From: James M. Atkinson Date: Sat Mar 29, 2003 8:55am Subject: For the kid in all of us. For loads of amusement click on the following link: http://www.createafart.com/index.asp -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7117 From: Fernando Martins Date: Sat Mar 29, 2003 10:22am Subject: Re: Membership Warning > Happy hunting (just remember that major calibres are more effective but > minor calibres are more fun). I would remember if I want to be effective ... Anyway, I don't hunt for fun. FM p.s. - now, if it is fishing we are talking about, that's other story =;o) 7118 From: greendots . Date: Fri Mar 28, 2003 10:56pm Subject: [HUMOR] - Iraqi's Weekly TV Guide Iraqi's Weekly TV Guide SUNDAY: 0800 - My 33 Sons 0830 - Osama Knows Best 0900 - I Dream of Mohammed 0930 - Let's Mecca Deal 1000 - The Kabul Hillbillies MONDAY: 0800 - Husseinfeld 0900 - Mad About Everything 0930 - Monday Night Stoning 1000 - Win Bin Laden's Money 1030 - Allah McBeal TUESDAY: 0800 - Wheel of Terror 0830 - The Price Is Right if Osama Says It's Right 0900 - Children Are Forbidden From Saying the Darndest Things 0930 - Taliban's Wackiest Public Execution Bloopers 1000 - Buffy the Yankee Imperialist Dog Slayer WEDNESDAY: 0800 - Beat the Press 0830 - When Kurds Attack 0900 - Two Guys, a Girl, and Pita Bread 0930 - Just Shoot Everyone 1000 - Veilwatch THURSDAY: 0800 - Fatima Loves Chachi 0830 - M*U*S*T*A*S*H 0900 - Veronica's Closet With Long, Black, Shapeless Dresses & Veils 0930 - Married with 139 Children 1000 - Eye for an Eye Witness News FRIDAY: 0800 - Judge Saddam 0830 - Suddenly Sanctions 0900 - Who Wants to Marry a Terrorist Millionaire? 0930 - Cave and Garden Television 1000 - No-Witness News SATURDAY: 0800 - Spongebob Squareturban 0830 - Who's Koran Is It Anyway? 0900 - Teletalibans 0930 - Camel 54, Where Are You? --- _________________________________________________________________ 7119 From: A Grudko Date: Sat Mar 29, 2003 1:16am Subject: Re: Iraqi's Weekly TV Guide If you cast stones, be prepared to duck. See below. - Original Message - From: greendots . Subject: [TSCM-L] [HUMOR] - Iraqi's Weekly TV Guide > US's Weekly TV Guide > SUNDAY: > 0800 - Three in a Million at US church > 0830 - Gerry Springer - "Your wife is my lover, Pa" > 0900 - I Dream of MacDonnalds > 0930 - Let's Make a Deal on those Florida votes judge ;-) > 1000 - The Texas Hillbillies > MONDAY: > 0800 - Rumpsfeld > 0900 - Mad About Everything French > 0930 - Monday Night Bombings - this week, Baghdad, next week, Paris > 1000 - Win Bush's Halliburton Money > 1030 - Alibi McBeal - Congressional pre-impeachment defender > TUESDAY: > 0800 - Wheel of US Invasions (almost daily since loosing in Vietnam) > 0830 - The Price of War Is Right if Bush Says It's Right > 0900 - Patriot Act Buggings - Americans Saying the Darndest Things > 0930 - USMC Wackiest Friendly Fire Accidents > 1000 - Buffy the Yankee Imperialist Dog > > WEDNESDAY: > 0800 - Imbed and control the Press > 0830 - When Kurds Defend > 0900 - Two Guys, a Girl, and a rape drug in her Coke > 0930 - Just Shoot Everyone in Waco > 1000 - Killwatch > > THURSDAY: > 0800 - JHK Loves Maralyn > 0830 - M*A*S*A*C*R*E - This month, Iraq. > 0900 - Monica Lewinski's Closet (why American women can't be President but they can have one) > 0930 - Married with 2 Children and 127 mistresses - The JFK story > 1000 - Eye Witness News from a bra, oops, bar in Washington > FRIDAY: > 0800 - Pre-Judge Saddam > 0830 - Suddenly Sanctimonious > 0900 - Who Wants to Marry a new American Iraqi Oil Millionaire? > 0930 - Guantalamo and Garden Television > 1000 - No-Witness News, presented by OJ Simpson > > SATURDAY: > 0800 - WWE Rumble in the Squareturban: The Rock meets Castro > 0830 - Who's Oil Is It Anyway? > 0900 - Teletexans: We don't want oil > 0930 - Camel 54, Where Are You? Presidential secrets revealed. 7120 From: Mitch D Date: Sat Mar 29, 2003 7:07pm Subject: International Security Conference 2003 Las Vegas Report Hello fellow list members, Just got back from ISC in Las Vegas.The show was huge,over 186 DVR Vendors alone in addition to many other vendors and products geared for the security industry.Locks,Gates,Cameras,(overt and covert),thermal gear,software,X RAy and just about anything a security supplier or alarm co would stock or sell.Also,,,, AID had a booth setup,(yes theyre still in business,) REI had an OSCOR and cpm 700,Orion and line amp in the booth as well and were very friendly. Last but not least,there was a seller from Redwood Ca selling a "ZAPPER" RF Detector for electronic countermeasure use that covered 50 kc up to 3 gig. Special show price was $329.00 I didnt get any photos but it more or less looked like a size 5 sneaker with a analog meter in the "toe" that read from one to ten and beautiful blinking LED's. When I asked for a demo,it was proudly displayed,and energized, with a comment that it was picking up my cell phone which i flipped open.The mfgr told me "see its picking up your phone",I politely replied "COOL!!!" but my phone is shut off!"........ Another manufacturer explained how he was constructing a 2.4 gig transmitter that would cover 200 plus miles at 50 watts for a "Special Operation" I asked him why the need for so much power,when in 1969 NASA was sending/receiving video feed at 1/4 of a watt on 2.4g to and from the moon? It was then explained that it was for a Special Operation and no more could be discussed about it.....(Note:Wheres Steve U when you need him? ) East Coast ISC is in DC later this year,it was worth the trip,try to make it if you can. Cheers __________________________________________________ Do you Yahoo!? Yahoo! Platinum - Watch CBS' NCAA March Madness, live on your desktop! http://platinum.yahoo.com 7121 From: Steve Uhrig Date: Sat Mar 29, 2003 7:57pm Subject: Re: International Security Conference Report On 29 Mar 2003 at 17:07, Mitch D wrote: > Another manufacturer explained how he was constructing a 2.4 gig > transmitter that would cover 200 plus miles at 50 watts for a "Special > Operation" I asked him why the need for so much power,when in 1969 NASA > was sending/receiving video feed at 1/4 of a watt on 2.4g to and from > the moon? It was then explained that it was for a Special Operation and > no more could be discussed about it.....(Note:Wheres Steve U when you > need him? Steve U was probably taking a nap. I haven't been to an ISC since 1984. 200 miles would not be possible regardless of raw RF power or antenna gain. The curvature of the earth would prevent the antennas from seeing each other unless they were flying on balloons. The RF horizon miles is roughly two times the square root of the height in feet. Line of sight for perfectly flat terrain over 10 miles takes an antenna 50 feet off the ground at each end to overcome the curvature of the earth. But, spy shops have proven time and time again they can violate the laws of physics, so maybe I should keep my thoughts to myself. Another instance of whoever quotes the higher number wins. Danger, 50,000 Ohms. Some years ago a vendor was advertising 100 milliwatt 5 mile body wires. The fine print in the ad read 'with a Yagi at each end.' Now 2 or 3 elements I can see at VHF for a covert body worn transmitter, but not sixteen elements ... Steve U ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7122 From: Date: Sun Mar 30, 2003 5:21am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7123 From: Date: Sun Mar 30, 2003 5:21am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7124 From: Mitch D Date: Sun Mar 30, 2003 8:16am Subject: Re: Re: International Security Conference Report But, spy shops have proven time and time again they can violate the laws of physics, so maybe I should keep my thoughts to myself. > > Another instance of whoever quotes the higher number wins. "Spy Shop Physics" I was trying so hard not to laugh at this vendor, I figured if I antagonized a little bit they'd eventually come up with something out of the ordinary.......and he did..... __________________________________________________ Do you Yahoo!? Yahoo! Platinum - Watch CBS' NCAA March Madness, live on your desktop! http://platinum.yahoo.com 7125 From: Does it matter Date: Sat Mar 29, 2003 11:29pm Subject: Re: International Security Conference Report doesn't anyone use the Mr. MicrophoneÆ anymore for body worn info gatherings? --- In TSCM-L@yahoogroups.com, "Steve Uhrig" wrote: > On 29 Mar 2003 at 17:07, Mitch D wrote: > > > Another manufacturer explained how he was constructing a 2.4 gig > > transmitter that would cover 200 plus miles at 50 watts for a "Special > > Operation" I asked him why the need for so much power,when in 1969 NASA > > was sending/receiving video feed at 1/4 of a watt on 2.4g to and from > > the moon? It was then explained that it was for a Special Operation and > > no more could be discussed about it.....(Note:Wheres Steve U when you > > need him? > > Steve U was probably taking a nap. I haven't been to an ISC since > 1984. > > 200 miles would not be possible regardless of raw RF power or antenna > gain. The curvature of the earth would prevent the antennas from > seeing each other unless they were flying on balloons. > > The RF horizon miles is roughly two times the square root of the > height in feet. Line of sight for perfectly flat terrain over 10 > miles takes an antenna 50 feet off the ground at each end to overcome > the curvature of the earth. But, spy shops have proven time and time > again they can violate the laws of physics, so maybe I should keep my > thoughts to myself. > > Another instance of whoever quotes the higher number wins. > > Danger, 50,000 Ohms. > > Some years ago a vendor was advertising 100 milliwatt 5 mile body > wires. The fine print in the ad read 'with a Yagi at each end.' > > Now 2 or 3 elements I can see at VHF for a covert body worn > transmitter, but not sixteen elements ... > > Steve U > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* 7126 From: Matt Paulsen Date: Sun Mar 30, 2003 4:14pm Subject: Law Enforcement Associates Receives CE Certification For Under Vehicle Inspection System http://www.disastercenter.com/terror.hts?view+104568096428397 Law Enforcement Associates Receives CE Certification For Under Vehicle Inspection System ---------------------------------------------------------------------------- ---- [ Follow Ups ] [ Post Followup ] [ Terror emergency news and notices ] ---------------------------------------------------------------------------- ---- Posted by sandihop on 02/19/03 at 10:56 Law Enforcement Associates Receives CE Certification For Under Vehicle Inspection System Youngsville, NC, February 19, 2003 - Law Enforcement Associates Corporation (LENF: OTCBB), a surveillance and security technology company, today announced that the Under Vehicle Inspections System (UVIS) has received CE Certification effective Jan 30,2003. The certification satisfies all quality and safety requirements necessary to sell the UVIS in European Union (EU) countries. The UVIS views the underside of vehicles entering and exiting secure areas or facilities for explosives and contraband President Paul Feldman stated îBy obtaining the CE certification, we have expanded our global market potential to include the European markets for The Under Vehicle Surveillance Systems. This is an important milestone and shows our technical capability and market dedication. Security is a global issue and we have recently made initial introductions of technology in the U.K., Italy and Germany.î The UVIS was developed to address specific security needs in entering and exiting secure facilities. The systems are currently installed in excess of 800 locations worldwide. These included military bases, government installations, embassies, nuclear facilities, oil refineries, and UN and NATO locations. The UVIS provides a clear, high contrast real-time video inspection of the undercarriage of cars, vans and trucks at entry points in half the time of the standard inspection mirror search. In a government field test performed by the U.S. military, the UVIS was compared to standard inspection mirror searches. The results of the government field test indicated that the UVIS, as compared to standard mirror inspection searches, had a higher percentage of target acquisitions, which is the locating and preventing of explosives and other types of contraband from entering a protected facility. The Company has established a strong presence in the U.S. market for its line of surveillance and security products and was honoured with the Corporate America Award in 2002. The National Drug Enforcement Officers Association gave the award. For more details visit: http://www.ndeoa.org/award.html About CE Certification: CE certification, European Conformity, is required for products sold in the EU. The European Union consists of Austria, Belgium, Denmark, Finland, France, Germany, Greece, Ireland, Italy, Luxembourg, Netherlands, Portugal, Spain, Sweden and the U.K. About Law Enforcement Associates Corporation: Law Enforcement Associates Corporation, based in North Carolina, through its wholly owned subsidiary, Law Enforcement Associates, Inc., manufactures and markets a diverse line of undercover surveillance and security products including a complete line of audio and video surveillance equipment as well as an under vehicle inspection system, which is one of the Companyís leading products. For more information on the Companyís products view: http://www.lea-sales.com/home.shtml or http://www.uvisystems.com/app.htm. Investors: http://www.investorideas.com Forward-Looking Information: The statements in this news release contain forward-looking information within the meaning of the Private Securities Litigation Reform Act of 1995. Such forward-looking statements involve certain risks, assumptions and uncertainties, including the inability to generate and secure the necessary product sale, or the lack of acceptance of the companyís products by its customers. In each case actual results may differ materially from such forward-looking statements. The company does not undertake to publicly update or revise its forward-looking statements even if experience or future changes make it clear that any projected results (expressed or modified) will not be realized. Contact: ECON Investor Relations, Inc. toll free at 1-866-730-1127 Dawn Van Zant via email dvanzant@i... Trevor Ruehs via email truehs@i... Email: slhop2003@y... Link: Law Enforcement Associates ---------------------------------------------------------------------------- ---- Followups: ---------------------------------------------------------------------------- ---- Use the form below to post a followup. Email is optional. Name: E-Mail: Subject: Message: >Law Enforcement Associates Receives CE Certification For Under Vehicle Inspection System > >Youngsville, NC, February 19, 2003 - Law Enforcement Associates Corporation (LENF: OTCBB), a surveillance and security technology company, today announced that the Under Vehicle Inspections System (UVIS) has received CE Certification effective Jan 30,2003. The certification satisfies all quality and safety requirements necessary to sell the UVIS in European Union (EU) countries. The UVIS views the underside of vehicles entering and exiting secure areas or facilities for explosives and contraband > >President Paul Feldman stated îBy obtaining the CE certification, we have expanded our global market potential to include the European markets for The Under Vehicle Surveillance Systems. >This is an important milestone and shows our technical capability and market dedication. Security is a global issue and we have recently made initial introductions of technology in the U.K., Italy and Germany.î > >The UVIS was developed to address specific security needs in entering and exiting secure facilities. The systems are currently installed in excess of 800 locations worldwide. These included military bases, government installations, embassies, nuclear facilities, oil refineries, and UN and NATO locations. > >The UVIS provides a clear, high contrast real-time video inspection of the undercarriage of cars, vans and trucks at entry points in half the time of the standard inspection mirror search. In a government field test performed by the U.S. military, the UVIS was compared to standard inspection mirror searches. The results of the government field test indicated that the UVIS, as compared to standard mirror inspection searches, had a higher percentage of target acquisitions, which is the locating and preventing of explosives and other types of contraband from entering a protected facility. > >The Company has established a strong presence in the U.S. market for its line of surveillance and security products and was honoured with the Corporate America Award in 2002. The National Drug Enforcement Officers Association gave the award. For more details visit: >http://www.ndeoa.org/award.html > >About CE Certification: >CE certification, European Conformity, is required for products sold in the EU. The European Union consists of Austria, Belgium, Denmark, Finland, France, Germany, Greece, Ireland, Italy, Luxembourg, Netherlands, Portugal, Spain, Sweden and the U.K. > >About Law Enforcement Associates Corporation: > >Law Enforcement Associates Corporation, based in North Carolina, through its wholly owned subsidiary, Law Enforcement Associates, Inc., manufactures and markets a diverse line of undercover surveillance and security products including a complete line of audio and video surveillance equipment as well as an under vehicle inspection system, which is one of the Companyís leading products. > >For more information on the Companyís products view: > >http://www.lea-sales.com/home.shtml or http://www.uvisystems.com/app.htm. > >Investors: http://www.investorideas.com > >Forward-Looking Information: The statements in this news release contain forward-looking information within the meaning of the Private Securities Litigation Reform Act of 1995. Such forward-looking statements involve certain risks, assumptions and uncertainties, including the inability to generate and secure the necessary product sale, or the lack of acceptance of the companyís products by its customers. In each case actual results may differ materially from such forward-looking statements. The company does not undertake to publicly update or revise its forward-looking statements even if experience or future changes make it clear that any projected results (expressed or modified) will not be realized. > >Contact: >ECON Investor Relations, Inc. toll free at 1-866-730-1127 >Dawn Van Zant via email dvanzant@i... >Trevor Ruehs via email truehs@i... > > Optional Link URL: Title: ---------------------------------------------------------------------------- ---- [ Terror emergency news and notices ] 7127 From: Steve Uhrig Date: Sun Mar 30, 2003 10:26pm Subject: Antisocial English Ninety-nine percent of all lawyers give the rest a bad name. Remember: FIRST you pillage, THEN you burn. If we weren't meant to eat animals then why are they made of meat? Give a man a match, and he'll be warm for a minute, but light him on fire, and he'll be warm for the rest of his life. http://www.habets.pp.se/english.php evetS 7128 From: Hawkspirit Date: Mon Mar 31, 2003 8:28am Subject: Time Traveler Sent: Friday, March 28, 2003 3:45 PM Subject: 'TIME-TRAVELER' BUSTED FOR INSIDER TRADING http://entertainment.yahoo.com/entnews/wwn/20030319/104808600007.html PROACTIVE NEWS EMAIL ALERT 'TIME-TRAVELER' BUSTED FOR INSIDER TRADING Wednesday March 19, 2003 By CHAD KULTGEN NEW YORK -- Federal investigators have arrested an enigmatic Wall Street wiz on insider-trading charges -- and incredibly, he claims to be a time-traveler from the year 2256! Sources at the Security and Exchange Commission confirm that 44-year-old Andrew Carlssin offered the bizarre explanation for his uncanny success in the stock market after being led off in handcuffs on January 28. "We don't believe this guy's story -- he's either a lunatic or a pathological liar," says an SEC insider. "But the fact is, with an initial investment of only $800, in two weeks' time he had a portfolio valued at over $350 million. Every trade he made capitalized on unexpected business developments, which simply can't be pure luck. "The only way he could pull it off is with illegal inside information. He's going to sit in a jail cell on Rikers Island until he agrees to give up his sources." The past year of nose-diving stock prices has left most investors crying in their beer. So when Carlssin made a flurry of 126 high-risk trades and came out the winner every time, it raised the eyebrows of Wall Street watchdogs. "If a company's stock rose due to a merger or technological breakthrough that was supposed to be secret, Mr. Carlssin somehow knew about it in advance," says the SEC source close to the hush-hush, ongoing investigation. When investigators hauled Carlssin in for questioning, they got more than they bargained for: A mind-boggling four-hour confession. Carlssin declared that he had traveled back in time from over 200 years in the future, when it is common knowledge that our era experienced one of the worst stock plunges in history. Yet anyone armed with knowledge of the handful of stocks destined to go through the roof could make a fortune. "It was just too tempting to resist," Carlssin allegedly said in his videotaped confession. "I had planned to make it look natural, you know, lose a little here and there so it doesn't look too perfect. But I just got caught in the moment." In a bid for leniency, Carlssin has reportedly offered to divulge "historical facts" such as the whereabouts of Osama Bin Laden and a cure for AIDS. All he wants is to be allowed to return to the future in his "time craft." However, he refuses to reveal the location of the machine or discuss how it works, supposedly out of fear the technology could "fall into the wrong hands." Officials are quite confident the "time-traveler's" claims are bogus. Yet the SEC source admits, "No one can find any record of any Andrew Carlssin existing anywhere before December 2002." 7129 From: Kevin Murray Date: Mon Mar 31, 2003 8:45am Subject: Re: Time Traveler > Sent: Friday, March 28, 2003 3:45 PM > Subject: 'TIME-TRAVELER' BUSTED FOR INSIDER TRADING He should have seen it coming. - Kevin > > http://entertainment.yahoo.com/entnews/wwn/20030319/104808600007.html 7130 From: Steve Uhrig Date: Mon Mar 31, 2003 0:10pm Subject: Riser Bond 3300 TDRs for sale Hi all, I have available two NEW UNUSED Riser Bond 3300 TDRs. These machines are designed specifically for twisted pair. Info can be found here, photo as well as a spec sheet: http://www.riserbond.com/PRODUCTS/Model_3300/model_3300.html The unit will sweep two pairs at once, show you two traces, and let you superimpose one over the other to see any differences. This is valuable for sweeping. You can connect to two pairs and see any differences between them. If one has appearances or faults looking different from the other, you need to find out why. It will tell you how far it is to the fault, and with some simple interpreting of the waveform which is described well in the book, you can tell various types of splices, reactances, etc. You will have a good idea what to look for before you even start. Machine comes with all accessories: two sets of extremely rugged test leads, battery charger (specify 110VAC or 220VAC), instruction manual, laminated cheat sheet card, padded carrying case with shoulder strap, and15 month warranty which begins when you send in the enclosed warranty card. Advantages: small, inexpensive relatively speaking, very easy to use, dual pair capability, internal digital waveform storage. See above website for specifics. Disadvantages: Not as rugged as yellow box TDRs. If you are working indoors mostly and are careful with your equipment, this will not be a factor. If you work outdoors, travel a lot or transport your gear a lot, work on poles or industrial facilities, one of my yellow box Riser Bond machines may be a better choice. Inquire if interested in them. These model 3300 units are current production. 2003 price is $1995 (a $200 increase over 2002 prices), and no one gets discounts. My price half of that, or $1000. Save 50% on a NEW UNUSED (except for bench check by me) TDR, a basic tool for any cable work and especially telephone countermeasures. I take credit cards and ship internationally. Ask here for references, including some for this exact model. See Riser Bond's website or ask me if any questions. Something to do with your tax refund. Or write off the purchase as a business expense. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7131 From: David Alexander Date: Sat Mar 29, 2003 9:36am Subject: Dilemma You are the President of the U.S.A. and you've just learned that there is an asteroid headed for France that will wipe out their entire country. It is scheduled to hit about 2.30 a.m. in just two days time from now. You have enough ships and military personnel nearby to evacuate them safely, but they are on stand-by in case of needing to take more troops and supplies to Iraq. Your question: Do you set the VCR to record the asteroid hitting France, or Do you stay up to watch it live? David Alexander Towcester, Northamptonshire, England Competition Co-ordinator - MSA British Drag Racing Championship Founder member, European Top Methanol Racers Association www.etmra.com Gone racing, back in 5.5 seconds David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 7132 From: Kutlin, Josh Date: Mon Mar 31, 2003 9:59am Subject: Taking byte from Baghdad: Thank you I just wanted to say thanks to members of this list for getting me started with regards to SW listening. In particular Andy Grudko & Steve Uhrig have been extremely helpful as well as dead on accurate with their technical inputs. If I had a problem or question, they knew the answer and where willing to share it (or at least point me in the right direction). For that I want to say thanks. In any case, for the cost of lunch for the week (if you don't bring from home), and about 2-3 hrs a day of reading and tinkering, I have been able to learn a significant amount about radios, antennas and how signals work. I am currently picking up messages and broadcasts from all over the globe as well as some Mil traffic. My advice to those who want an inexpensive way to start learning about signals, is to get a cheap shortwave radio, a spool of wire and start reading. Thanks again Josh 7133 From: Steve Uhrig Date: Mon Mar 31, 2003 2:24pm Subject: Verizon sticks to their guns RIAA Pushes Verizon to Identify Alleged Music Pirate The Recording Industry Association of America and Verizon will head to court again Tuesday, as the record labels try to compel the wireless carrier to provide the identity of a customer who allegedly downloaded more than 600 copyrighted music files in one day. Verizon refused to snitch even after a judge ordered it to comply. In response, the RIAA has issued further subpoenas insisting that Verizon reveal even more names. http://boston.internet.com/news/article.php/2116721 ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7134 From: Matt Paulsen Date: Mon Mar 31, 2003 8:26pm Subject: RE: Dilemma Tivo -----Original Message----- From: David Alexander [mailto:david.alexander@d...] Sent: Saturday, March 29, 2003 7:37 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Dilemma You are the President of the U.S.A. and you've just learned that there is an asteroid headed for France that will wipe out their entire country. It is scheduled to hit about 2.30 a.m. in just two days time from now. You have enough ships and military personnel nearby to evacuate them safely, but they are on stand-by in case of needing to take more troops and supplies to Iraq. Your question: Do you set the VCR to record the asteroid hitting France, or Do you stay up to watch it live? David Alexander Towcester, Northamptonshire, England Competition Co-ordinator - MSA British Drag Racing Championship Founder member, European Top Methanol Racers Association www.etmra.com Gone racing, back in 5.5 seconds David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7135 From: Steve Uhrig Date: Mon Mar 31, 2003 11:01pm Subject: Internet Spring Cleaning Internet Spring Cleaning Print Article It's that time again! As many of you know, each year the Internet must be shut down for 24 hours in order to allow us to clean it. The cleaning process, which eliminates dead email and inactive ftp, www and gopher sites, allows for a better-working and faster Internet. DO NOT CONNECT TO THE INTERNET FROM MARCH 31st 23:59pm (GMT) UNTIL 12:01am (GMT) APRIL 2nd. This year, the cleaning process will take place from 23:59 pm (GMT) on March 31st until 00:01 am (GMT) on April 2nd. During that 24-hour period, five powerful Internet-crawling robots situated around the world will search the Internet and delete any data that they find. In order to protect your valuable data from deletion we ask that you do the following: 1.. Disconnect all terminals and local area networks from their Internet connections. 2.. Shut down all Internet servers, or disconnect them from the Internet. 3.. Disconnect all disks and hardrives from any connections to the Internet. 4.. Refrain from connecting any computer to the Internet in any way. Fu Ling Yu Interconnected Network Maintenance Staff Main Branch, Massachusetts Institute of Technology Sysops and others: Since the last Internet cleaning, the number of Internet users has grown dramatically. Please assist us in alerting the public of the upcoming Internet cleaning by posting this message where your users will be able to read it. Please pass this message on to other sysops and Internet users as well. Thank you. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7136 From: A.Lizard Date: Mon Mar 31, 2003 9:51pm Subject: re: 'TIME-TRAVELER' BUSTED FOR INSIDER TRADING http://www.snopes.com/humor/iftrue/insider.htm Claim: Man arrested for insider trading attributes his financial success to time travel. Status: False. Example: [Collected on the Internet, 2003] rest at the URL A.Lizard >Message: 3 > Date: Mon, 31 Mar 2003 06:28:03 -0800 > From: Hawkspirit >Subject: Time Traveler > >Sent: Friday, March 28, 2003 3:45 PM >Subject: 'TIME-TRAVELER' BUSTED FOR INSIDER TRADING > >http://entertainment.yahoo.com/entnews/wwn/20030319/104808600007.html >PROACTIVE NEWS EMAIL ALERT > > >'TIME-TRAVELER' BUSTED FOR INSIDER TRADING >Wednesday March 19, 2003 > > >By CHAD KULTGEN >NEW YORK -- Federal investigators have arrested an enigmatic Wall Street >wiz on insider-trading charges -- and incredibly, he claims to be a >time-traveler from the year 2256! >Sources at the Security and Exchange Commission confirm that 44-year-old >Andrew Carlssin offered the bizarre explanation for his uncanny success in >the stock market after being led off in handcuffs on January 28. >"We don't believe this guy's story -- he's either a lunatic or a >pathological liar," says an SEC insider. >"But the fact is, with an initial investment of only $800, in two weeks' >time he had a portfolio valued at over $350 million. Every trade he made >capitalized on unexpected business developments, which simply can't be pure >luck. >"The only way he could pull it off is with illegal inside information. He's >going to sit in a jail cell on Rikers Island until he agrees to give up his >sources." >The past year of nose-diving stock prices has left most investors crying in >their beer. So when Carlssin made a flurry of 126 high-risk trades and came >out the winner every time, it raised the eyebrows of Wall Street watchdogs. >"If a company's stock rose due to a merger or technological breakthrough >that was supposed to be secret, Mr. Carlssin somehow knew about it in >advance," says the SEC source close to the hush-hush, ongoing investigation. >When investigators hauled Carlssin in for questioning, they got more than >they bargained for: A mind-boggling four-hour confession. >Carlssin declared that he had traveled back in time from over 200 years in >the future, when it is common knowledge that our era experienced one of the >worst stock plunges in history. Yet anyone armed with knowledge of the >handful of stocks destined to go through the roof could make a fortune. >"It was just too tempting to resist," Carlssin allegedly said in his >videotaped confession. "I had planned to make it look natural, you know, >lose a little here and there so it doesn't look too perfect. But I just got >caught in the moment." >In a bid for leniency, Carlssin has reportedly offered to divulge >"historical facts" such as the whereabouts of Osama Bin Laden and a cure >for AIDS. >All he wants is to be allowed to return to the future in his "time craft." >However, he refuses to reveal the location of the machine or discuss how it >works, supposedly out of fear the technology could "fall into the wrong >hands." >Officials are quite confident the "time-traveler's" claims are bogus. Yet >the SEC source admits, "No one can find any record of any Andrew Carlssin >existing anywhere before December 2002." > > > >Message: 4 > Date: Mon, 31 Mar 2003 09:45:42 -0500 > From: Kevin Murray >Subject: Re: Time Traveler > > > > > > Sent: Friday, March 28, 2003 3:45 PM > > Subject: 'TIME-TRAVELER' BUSTED FOR INSIDER TRADING > >He should have seen it coming. >- Kevin > > > > http://entertainment.yahoo.com/entnews/wwn/20030319/104808600007.html ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -Benjamin Franklin, Historical Review of Pennsylvania, 1753 Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... PGP 8.0 key available by request,keyserver,or on my Web site Download PGP from http://www.pgpi.org for e-mail privacy. PGPfone v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ Disaster prep info: http://www.ecis.com/~alizard/y2k.html ************************************************************************ 7137 From: fred sinclair Date: Tue Apr 1, 2003 2:15am Subject: Re: Dilemma Atomic Bomb France before , they will not suffer ... ----- Original Message ----- From: Matt Paulsen To: TSCM-L@yahoogroups.com Sent: Tuesday, April 01, 2003 4:26 AM Subject: RE: [TSCM-L] Dilemma Tivo -----Original Message----- From: David Alexander [mailto:david.alexander@d...] Sent: Saturday, March 29, 2003 7:37 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Dilemma You are the President of the U.S.A. and you've just learned that there is an asteroid headed for France that will wipe out their entire country. It is scheduled to hit about 2.30 a.m. in just two days time from now. You have enough ships and military personnel nearby to evacuate them safely, but they are on stand-by in case of needing to take more troops and supplies to Iraq. Your question: Do you set the VCR to record the asteroid hitting France, or Do you stay up to watch it live? David Alexander Towcester, Northamptonshire, England Competition Co-ordinator - MSA British Drag Racing Championship Founder member, European Top Methanol Racers Association www.etmra.com Gone racing, back in 5.5 seconds David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 7138 From: Steve Uhrig Date: Tue Apr 1, 2003 11:28am Subject: New security device For those who have clients handling sensitive data, the following product may be useful to them: http://tinyurl.com/8loe(URL shortened for convenience). It is a combination color laser printer and shredder. Like the other multifunction devices (printer, fax, copier, scanner), this unit combines several necessary functions into one. It may be the closest we'll get to the ultimate data security device for some time. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7139 From: James M. Atkinson Date: Tue Apr 1, 2003 1:10pm Subject: *** Saddam and his 2 Sons Captured *** http://www.debka.com/ Last Updated on April 1, 2003, 12:49 PM (GMT+02:00) Saddam and his 2 Sons Captured while fleeing Baghdad Sources with American troops in Iraq confirm that Saddam, and his two sons were just taken into custody 150 miles outside the western city of Ar Ramadi. They were discovered when a huge convoy of trucks headed for the Syrian border was stopped by U.S. Force after a brief fire-fight. Saddam and his sons were found in an automobile moving with the convoy, and according to sources all three were dressed in women's clothing. More to follow. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7140 From: Steve Uhrig Date: Tue Apr 1, 2003 3:20pm Subject: Useful conversion chart A way for us to convert from cycles per second to Hertz. http://brainerdham.org/Tips/CPS_to_Hz_conversion.html May want to print or bookmark. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7141 From: Robert Dyk Date: Tue Apr 1, 2003 3:51pm Subject: RE: Useful conversion chart Been looking for this for years, my slide rule is almost worn out doing this conversion manually... BTW has anyone seen something similar to convert VA to Watts? ;-) > -----Original Message----- > From: Steve Uhrig [mailto:steve@s...] > Sent: April 1, 2003 4:21 PM > To: tscm-l@yahoogroups.com > Subject: [TSCM-L] Useful conversion chart > > > A way for us to convert from cycles per second to Hertz. > > http://brainerdham.org/Tips/CPS_to_Hz_conversion.html > > May want to print or bookmark. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 7142 From: Date: Tue Apr 1, 2003 9:33am Subject: legal question if a bug sweep turns up evidence of police surveillance, does the sweep company have to notify the police that they are telling their client that they have discovered their bugs, cleaned/removed them? is it legal to remove police bugs/ surveillance cams? i assume the sweep company is allowed to reveal police bug/cam findings to their client, right? thanks! val From: kondrak Date: Sun Mar 31, 2002 4:45am Subject: Spy Software.. Good day to all, RE: Spyware Trojans and '0 dayz warez' are the job of the anti-virus software. (Yours IS up to date isn't it?) They're more agile detecting strange things at disk, memory and OS level. "Spyware", is usually loaded as an adjunct of loading a popular program, (like Gator, Kazza or the like). Some programs, like Bearshare, (a GNU file sharing program) have clickouts on loading, where you can prefer to NOT allow the program to load the spyware. (Support that model!) Spyware is more corporate oriented, used to gather personal identifying signs and sell this to the hucksters who run this slimy business model, running roughshod over privacy concerns is NOT a way to engender yourselves IMHO. (Electronic stalking?) There is noting to suggest that this type of computer intrusion can not be effectively stopped with a combination of spyware detection and removal, and a properly maintained fairewall. There are a few good anti-spyware programs out there, and I advocate the LavaSoft free detector, its well done IMHO. Some companies have taken spamware to an art, anything AOL oriented these days, (and not saying they're the only practitioner) such as Netscape 6.1, and upgrades of benign programs like WinAmp are infested with spyware. Running the detector like AdAware, is good, but like anti-viri software, it needs to have fresh definitions for detection freshness, Ad Aware has that exact availability, theres a link there to the "auto-check-for new definitions' software as well. I'm not a salesman for Ad Aware, though at this point some my think that ;) ...but I've used it with great success in cleaning corporate networks, and personal machines of this scourge. I personally, totally, disagree with implementing a spy scheme in a computer for corporate purposes, (amongst others). If you want my stats, then you fully inform, and ask permission on bended knee, NOT plant it now and ask later...(Opt out, default, by law!) Informed consent and explicit permission. Ok, FYI: A punch up of Google tonite shows this for spyware: http://www.google.com/search?num=30&meta=hl%3D%26lr%3D&q=spyware I see 94,200 references, check some out... Spyware is a major concern of corporations, for two reasons, A) Obviously: Security, who wants some alien piece of software "phoning home", with whatever intent, or data payload. And equally important, B) as networks become more congested in an enterprise: bandwidth. Spyware is eating up packets of data that surely can be more productively utilized. Good luck in your endevors.... Marc Reference URL's: Ad Aware: http://www.lavasoftusa.com/aaw.html Reference Update, spyware definitions: http://www.wyvernworks.com/Lavasoft/refupdate.exe At 21:26 3/30/02 +0000, you wrote: >Yes, several, but should you relly on them? >The best way is to *dig* in the OS and see what is running ... >For example, if it is (and I hope it's not) some 0-day spy trojan or >logging application, it's not known, so shareware or commercial software >will not spot it probably. > >FM > >ª -----Original Message----- >ª From: Richard Gray [mailto:laspy1@y...] >ª Sent: domingo, 24 de MarÁo de 2002 21:32 >ª To: tscm-l@yahoogroups.com >ª Subject: [TSCM-L] Spy Software Detection Help >ª >ª >ª Is there any software that will detect logging and spyware >ª programs installed on a computer? >ª >ª Ricky >ª >ª >ª _________________________________ >ª Richard T. Gray Jr. >ª Legal Investigator >ª License No. 1914-050896-LA >ª >ª Gray & Associates, LLC >ª PO Box 2368 >ª Crowley, LA 70527 >ª 337-785-0046 Voice >ª 800-394-8216 Fax >ª www.la-pi.com >ª ricky@l... >ª "When you need to know!" >ª >ª -----Original Message----- >ª From: Marko Radovic [mailto:radovic_marko@y...] >ª Sent: Friday, March 22, 2002 2:12 AM >ª To: TSCM-L@yahoogroups.com >ª Subject: [TSCM-L] ISO 17799 >ª >ª >ª Hello, >ª >ª I would like to thank all the pepople who privided >ª help and information cocerning ISO 17799 standard. >ª >ª Any additional information about standard is welcome. >ª >ª Marko >ª >ª __________________________________________________ >ª Do You Yahoo!? >ª Everything you'll ever need on one web page >ª from News and Sport to Email and Music Charts http://uk.my.yahoo.com >ª >ª >ª >ª Yahoo! Groups Sponsor >ª >ª ADVERTISEMENT >ª >ª ª web/S=1705 >ª 007140:HM/A=847665/R=0/*http://ads.x10.com/?bHlhaG9vbW9uc3Rlcj >ª cuZGF0=101 >ª 6803186%3eM=215002.1818248.3328688.1261774/D=egroupweb/S=17050 >ª 07140:HM/A >ª =847665/R=1> >ª >ª ª 74/D=egrou >ª pmail/S=1705007140:HM/A=847665/rand=398610181> >ª >ª ======================================================== >ª TSCM-L Technical Security Mailing List >ª "In a multitude of counselors there is strength" >ª >ª To subscribe to the TSCM-L mailing list visit: >ª http://www.yahoogroups.com/community/TSCM-L >ª >ª It is by caffeine alone I set my mind in motion. >ª It is by the juice of Star Bucks that thoughts acquire speed, >ª the hands acquire shaking, the shaking is a warning. It is by >ª caffeine alone I set my mind in motion. >ª =================================================== TSKS >ª >ª Your use of Yahoo! Groups is subject to the Yahoo! Terms of >ª Service . >ª >ª >ª >ª >ª [Non-text portions of this message have been removed] >ª >ª >ª >ª ------------------------ Yahoo! Groups Sponsor >ª ---------------------~--> Tiny Wireless Camera under $80! >ª Order Now! FREE VCR Commander! Click Here - Only 1 Day Left! >ª http://us.click.yahoo.com/nuyOHD/7.PDAA/yigFAAª /kgFolB/TM >ª >ª >ª -------------------------------------------------------------- >ª -------~-> >ª >ª ======================================================== >ª TSCM-L Technical Security Mailing List >ª "In a multitude of counselors there is strength" >ª >ª To subscribe to the TSCM-L mailing list visit: >ª http://www.yahoogroups.com/community/TSCM-L >ª >ª It is by caffeine alone I set my mind in motion. >ª It is by the juice of Star Bucks that thoughts acquire >ª speed, the hands acquire shaking, the shaking is a warning. >ª It is by caffeine alone I set my mind in motion. >ª =================================================== TSKS >ª >ª Your use of Yahoo! Groups is subject to >ª http://docs.yahoo.com/info/terms/ >ª >ª >ª > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ [Non-text portions of this message have been removed] 5104 From: Matthew Paulsen Date: Sun Mar 31, 2002 11:49am Subject: RE: Spy Software Detection Help I'm sure I've missed things and flubbed some area or point here or there. I just wanted to throw out a few ideas for people if their thinking about actually approaching network security in some sort of specific manner that may actually accomplish more than the basic firewall and garden hose approach that most companies take to it. There's software just as good as tripwire that's free off the web - see sourceforge.net and other free disty sites (even tripwire.org is a contender for Tripwire's own apps that aren't linux based.. geeze.. ouch). But if you need the support that Tripwire can provide since it's packaged, it's good to get. Also, you should log all aspects of the system, except for successful log writes, which creates a circular log error (or in some systems, a successful success write can create the circular log of death, so be careful). A compromised system that is being used successfully is just at risk as a non-compromised system that isn't being used successfully. Hence, log everything as much as possible and learn how to read those log files. There are also good content filtering software and application filtering systems available that can provide promiscuous scanning for known strings which don't have to be client side resident, but it's good to bunny up (my Easter term of the year) on a few levels to make sure your safe. For a good starting configuration, you should have a packet analyzer outside your network (I like sniffer pro from NAI, others have their own preferences), then an inline av scanner for mail (NAI external for me, then I switch to CAI or Symantec for internal as well as NAI for some areas. I don't like vendor dependance in this area, since two or more -IS- better than one in this circumstance), etc, that's protocol layer resident which can strip and reassemble, and sequester if necessary, then a firewall (first I use a UN*X type), then a contextual (application and protocol switching) switch with av integrated - a good natural firewall in some cases for those that still use IPX with IP/IPX tunnelling applications (not so good with some databases though), then a proxy server (I like to switch to a non-Un*x type, such as Novell or Microsoft, confuses the prey), then another packet analyzer for internal traffic analysis, then the workstations should have personal firewalls which perform application scanning as well as a good AV application. All systems should use a combination of encrypted file services as well as PGP or some variant - I prefer a twofish/PGP system, I mount a virtual filesystem using twofish, then encrypt and sign stuff - docs, spreadsheets, etc, dump it in the twofish encrypted filesystem and dismount that filesystem - takes two passwords to get to it and their only in my brain, safe and secure, the filesystems can be stored on EFS/DFS systems as well and backed up to tape, so your DRP is good to go. Consider it a lockbox in a safe if you will, works great. You may want to have another firewall if you're feeling up to it, and you may have a more advanced setup if you're hosting web services and databases - always strip your db server off the web server and isolate calls between the two to specific IP's on separate subnets using strange ports of call (I've wanted to say that for so long). You may need to have other things for other services - vpn's may need secureID cards, etc. SSL, PKI, etc. You should also have scanners on servers as well for basic services - f,ps/news/mail, etc. Get Win2K or Linux or something else that does have a modicum of security available on all your computers rather than 9x and toss that and the macs out the door (as well as your marketing department that won't give up those g3's - shudder-). Don't give out admin access and lock them down with security apps and utilities. But either way, nothing beats a well educated individual and a good admin group, so budgeting more $$$ for personnel and training should be a first step before the above steps are even contemplated. Lastly, you should hire a TSCM person with a network security person and a physical security person. That way you actually cover all your bases on a security sweep at once. Doing 1 or 2 of the 3 is pointless. You get an F either way you do it if you don't hire all 3. Your leak could be a person stealing hard drives from the server room, bugging your room or emailing your competitor with your latest secret project. Matt (Plug - I do networkie stuff like the above. If you need to hire someone.. hire me.. 503-228-4156x2#) -----Original Message----- From: Graham Bignell [mailto:lorax@e...] Sent: Saturday, March 30, 2002 8:07 PM To: Richard Gray Cc: tscm-l@yahoogroups.com Subject: Re: [TSCM-L] Spy Software Detection Help On Sun, 24 Mar 2002, Richard Gray wrote: > Is there any software that will detect logging and spyware programs > installed on a computer? Others have reffered to virus-scanner like software which will work great unless the spyware is written to hide itself or is new. A solution that will detect logging/spyware programs working on a system or inside a network is the use of Tripwire (http://tripwire.com) or similar tool which detects any change to files and a proper firewall. Proper Firewall Configuration (IMO) means that everything not denied is logged. Unfortunatly, typical spyware behavior is to use HTTP or DNS as carrier protocols, which is basically invisible to a packet filtering firewall that simply blocks on IP. This is where "personal firewall" systems can come in quite handy, as they run under the same OS as the spyware, and are so able to view system internals and identify which application it is that attempts use of the network. --- Graham "Lorax" Bignell - 416 366 9755 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5105 From: Matthew Paulsen Date: Sun Mar 31, 2002 0:47pm Subject: RE: Spy Software Detection Help I wouldn't consider a TSCM professional to be a physical security expert any more than a network security person to be a TSCM professional. Knowledge of the fields is one thing, expertise is another. I'd hope that a physical security expert be involved in non-tscm related services such as air, maritime and ground protection services. Typical companies that come to mind would be Brinks, ADT and similar firms, which typically don't provide TSCM services, or if they do, only as a small portion of their overall business plan. They would hopefully employ a 3rd party for a separate analysis of physical protection (a blind) and provide two separate compiled reports for a good system to be developed. Matt -----Original Message----- From: Graham Bignell [mailto:lorax@e...] Sent: Sunday, March 31, 2002 10:31 AM To: Matthew Paulsen Cc: tscm-l@yahoogroups.com Subject: RE: [TSCM-L] Spy Software Detection Help On Sun, 31 Mar 2002, Matthew Paulsen wrote: > Lastly, you should hire a TSCM person with a network security person and a > physical security person. That way you actually cover all your bases on a > security sweep at once. Doing 1 or 2 of the 3 is pointless. You get an F > either way you do it if you don't hire all 3. Your leak could be a person > stealing hard drives from the server room, bugging your room or emailing > your competitor with your latest secret project. I would hope that anyone billing themselves as a TSCM practitioner[1] would be considered a professional in physical security as well as computer systems. If someone is just going to be waving a magic wand around doing their rain dance, well they might miss that KeyGhost or the script hidden in the cron which dials a second number after the days accounting is sent to the bank. [1]: I have wondered why JMA, SU et. al. don't whip up a little international association for the licencing of TSCM, and register something as a servicemark. Such as the way the title "Engineer" is protected in Ontario by the APEO / CCOPE. (I will now mention MCSE as the worst case scenario for such an appellation.) --- Graham "Lorax" Bignell - 416 366 9755 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 5106 From: Graham Bignell Date: Sun Mar 31, 2002 0:30pm Subject: RE: Spy Software Detection Help On Sun, 31 Mar 2002, Matthew Paulsen wrote: > Lastly, you should hire a TSCM person with a network security person and a > physical security person. That way you actually cover all your bases on a > security sweep at once. Doing 1 or 2 of the 3 is pointless. You get an F > either way you do it if you don't hire all 3. Your leak could be a person > stealing hard drives from the server room, bugging your room or emailing > your competitor with your latest secret project. I would hope that anyone billing themselves as a TSCM practitioner[1] would be considered a professional in physical security as well as computer systems. If someone is just going to be waving a magic wand around doing their rain dance, well they might miss that KeyGhost or the script hidden in the cron which dials a second number after the days accounting is sent to the bank. [1]: I have wondered why JMA, SU et. al. don't whip up a little international association for the licencing of TSCM, and register something as a servicemark. Such as the way the title "Engineer" is protected in Ontario by the APEO / CCOPE. (I will now mention MCSE as the worst case scenario for such an appellation.) --- Graham "Lorax" Bignell - 416 366 9755 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 5107 From: Fernando Martins Date: Sun Mar 31, 2002 3:40pm Subject: RE: Spy Software.. '0 day warez' ? That's new ... Since warez is the illegall copy and distribution of commercial software, how can it be 0-day? Also, if your anti-virus is not updated, or even if it is, in the early days many virii/trojan can not be removed or cleaned, just detected. Knowing the OS is the issue, for example regarding vbs kind of virus you don't need even a anti-virus software to protect you, if the OS hardening was well done. I suppose this is not the common kind of issue for the list, so I rest my case here ;) FM ª -----Original Message----- ª From: kondrak [mailto:kondrak@s...] ª Sent: domingo, 31 de MarÁo de 2002 11:45 ª To: TSCM-L@yahoogroups.com ª Subject: [TSCM-L] Spy Software.. ª ª ª Good day to all, ª RE: Spyware ª ª Trojans and '0 dayz warez' are the job of the anti-virus ª software. (Yours ª IS up to date isn't it?) They're more agile detecting strange ª things at ª disk, memory and OS level. ª ª "Spyware", is usually loaded as an adjunct of loading a ª popular program, ª (like Gator, Kazza or the like). ª Some programs, like Bearshare, (a GNU file sharing program) ª have clickouts ª on loading, where you can prefer to NOT allow the program to load the ª spyware. (Support that model!) ª Spyware is more corporate oriented, used to gather personal ª identifying ª signs and sell this to the hucksters who run this slimy ª business model, ª running roughshod over privacy concerns is NOT a way to ª engender yourselves ª IMHO. (Electronic stalking?) There is noting to suggest that ª this type of ª computer intrusion can not be effectively stopped with a ª combination of ª spyware detection and removal, and a properly maintained fairewall. ª ª There are a few good anti-spyware programs out there, and I ª advocate the ª LavaSoft free detector, its well done IMHO. ª ª Some companies have taken spamware to an art, anything AOL ª oriented these ª days, (and not saying they're the only practitioner) such as ª Netscape 6.1, ª and upgrades of benign programs like WinAmp are infested with ª spyware. ª Running the detector like AdAware, is good, but like ª anti-viri software, it ª needs to have fresh definitions for detection freshness, Ad ª Aware has that ª exact availability, theres a link there to the "auto-check-for new ª definitions' software as well. ª ª I'm not a salesman for Ad Aware, though at this point some my ª think that ;) ...but I've used it with great success in ª cleaning corporate networks, and ª personal machines of this scourge. ª I personally, totally, disagree with implementing a spy scheme in a ª computer for corporate purposes, (amongst others). If you ª want my stats, ª then you fully inform, and ask permission on bended knee, NOT ª plant it now ª and ask later...(Opt out, default, by law!) Informed consent ª and explicit ª permission. ª ª ª Ok, FYI: A punch up of Google tonite shows this for spyware: ª http://www.google.com/search?num=30&meta=hl%3D%26lr%3D&q=spyware ª ª I see 94,200 references, check some out... ª ª Spyware is a major concern of corporations, for two reasons, ª A) Obviously: Security, who wants some alien piece of ª software "phoning ª home", with whatever intent, or data payload. ª ª And equally important, ª B) as networks become more congested in an enterprise: ª bandwidth. Spyware ª is eating up packets of data that surely can be more ª productively utilized. ª ª ª Good luck in your endevors.... ª ª Marc ª ª ª Reference URL's: ª ª Ad Aware: http://www.lavasoftusa.com/aaw.html ª Reference Update, spyware definitions: ª http://www.wyvernworks.com/Lavasoft/refupdate.exe ª ª ª ª ª ª ª At 21:26 3/30/02 +0000, you wrote: ª >Yes, several, but should you relly on them? ª >The best way is to *dig* in the OS and see what is running ... For ª >example, if it is (and I hope it's not) some 0-day spy trojan or ª >logging application, it's not known, so shareware or commercial ª >software will not spot it probably. ª > ª >FM ª > ª >ª -----Original Message----- ª >ª From: Richard Gray [mailto:laspy1@y...] ª >ª Sent: domingo, 24 de MarÁo de 2002 21:32 ª >ª To: tscm-l@yahoogroups.com ª >ª Subject: [TSCM-L] Spy Software Detection Help ª >ª ª >ª ª >ª Is there any software that will detect logging and spyware ª >ª programs installed on a computer? ª >ª ª >ª Ricky ª >ª ª >ª ª >ª _________________________________ ª >ª Richard T. Gray Jr. ª >ª Legal Investigator ª >ª License No. 1914-050896-LA ª >ª ª >ª Gray & Associates, LLC ª >ª PO Box 2368 ª >ª Crowley, LA 70527 ª >ª 337-785-0046 Voice ª >ª 800-394-8216 Fax ª >ª www.la-pi.com ª >ª ricky@l... ª >ª "When you need to know!" ª >ª ª >ª -----Original Message----- ª >ª From: Marko Radovic [mailto:radovic_marko@y...] ª >ª Sent: Friday, March 22, 2002 2:12 AM ª >ª To: TSCM-L@yahoogroups.com ª >ª Subject: [TSCM-L] ISO 17799 ª >ª ª >ª ª >ª Hello, ª >ª ª >ª I would like to thank all the pepople who privided ª >ª help and information cocerning ISO 17799 standard. ª >ª ª >ª Any additional information about standard is welcome. ª >ª ª >ª Marko ª >ª ª >ª __________________________________________________ ª >ª Do You Yahoo!? ª >ª Everything you'll ever need on one web page ª >ª from News and Sport to Email and Music Charts ª http://uk.my.yahoo.com ª >ª ª ª >ª ª >ª Yahoo! Groups Sponsor ª >ª ª >ª ADVERTISEMENT ª >ª ª >ª ª web/S=1705 ª >ª 007140:HM/A=847665/R=0/*http://ads.x10.com/?bHlhaG9vbW9uc3Rlcj ª >ª cuZGF0=101 ª >ª 6803186%3eM=215002.1818248.3328688.1261774/D=egroupweb/S=17050 ª >ª 07140:HM/A ª >ª =847665/R=1> ª >ª ª >ª ª 74/D=egrou ª >ª pmail/S=1705007140:HM/A=847665/rand=398610181> ª >ª ª >ª ======================================================== ª >ª TSCM-L Technical Security Mailing List ª >ª "In a multitude of counselors there is strength" ª >ª ª >ª To subscribe to the TSCM-L mailing list visit: ª >ª http://www.yahoogroups.com/community/TSCM-L ª >ª ª >ª It is by caffeine alone I set my mind in motion. ª >ª It is by the juice of Star Bucks that thoughts acquire speed, ª >ª the hands acquire shaking, the shaking is a warning. It is by ª >ª caffeine alone I set my mind in motion. ª >ª =================================================== TSKS ª >ª ª >ª Your use of Yahoo! Groups is subject to the Yahoo! Terms of ª >ª Service . ª >ª ª >ª ª >ª ª >ª ª >ª [Non-text portions of this message have been removed] ª >ª ª >ª ª >ª ª >ª ------------------------ Yahoo! Groups Sponsor ª >ª ---------------------~--> Tiny Wireless Camera under $80! ª >ª Order Now! FREE VCR Commander! Click Here - Only 1 Day Left! ª >ª http://us.click.yahoo.com/nuyOHD/7.PDAA/yigFAAª /kgFolB/TM ª >ª ª >ª ª >ª -------------------------------------------------------------- ª >ª -------~-> ª >ª ª >ª ======================================================== ª >ª TSCM-L Technical Security Mailing List ª >ª "In a multitude of counselors there is strength" ª >ª ª >ª To subscribe to the TSCM-L mailing list visit: ª >ª http://www.yahoogroups.com/community/TSCM-L ª >ª ª >ª It is by caffeine alone I set my mind in motion. ª >ª It is by the juice of Star Bucks that thoughts acquire ª >ª speed, the hands acquire shaking, the shaking is a warning. ª >ª It is by caffeine alone I set my mind in motion. ª >ª =================================================== TSKS ª >ª ª >ª Your use of Yahoo! Groups is subject to ª >ª http://docs.yahoo.com/info/terms/ ª >ª ª >ª ª >ª ª > ª > ª > ª > ª >======================================================== ª > TSCM-L Technical Security Mailing List ª > "In a multitude of counselors there is strength" ª > ª > To subscribe to the TSCM-L mailing list visit: ª > http://www.yahoogroups.com/community/TSCM-L ª > ª > It is by caffeine alone I set my mind in motion. ª > It is by the juice of Star Bucks that thoughts acquire speed, ª > the hands acquire shaking, the shaking is a warning. ª > It is by caffeine alone I set my mind in motion. ª >=================================================== TSKS ª > ª >Your use of Yahoo! Groups is subject to ª >http://docs.yahoo.com/info/terms/ ª ª ª [Non-text portions of this message have been removed] ª ª ª ª ------------------------ Yahoo! Groups Sponsor ª ---------------------~--> Access Your PC from Anywhere Check ª Email & Transfer files - Free Download ª http://us.click.yahoo.com/Z8IZpD/3XkDAA/yigFAAª /kgFolB/TM ª ª ª -------------------------------------------------------------- ª -------~-> ª ª ======================================================== ª TSCM-L Technical Security Mailing List ª "In a multitude of counselors there is strength" ª ª To subscribe to the TSCM-L mailing list visit: ª http://www.yahoogroups.com/community/TSCM-L ª ª It is by caffeine alone I set my mind in motion. ª It is by the juice of Star Bucks that thoughts acquire ª speed, the hands acquire shaking, the shaking is a warning. ª It is by caffeine alone I set my mind in motion. ª =================================================== TSKS ª ª Your use of Yahoo! Groups is subject to ª http://docs.yahoo.com/info/terms/ ª ª ª 5108 From: Fernando Martins Date: Sun Mar 31, 2002 3:43pm Subject: RE: Spy Software Detection Help > Lastly, you should hire a TSCM person with a network security > person and a physical security person. That way you actually > cover all your bases on a security sweep at once. Doing 1 or > 2 of the 3 is pointless. You get an F either way you do it > if you don't hire all 3. Your leak could be a person > stealing hard drives from the server room, bugging your room > or emailing your competitor with your latest secret project. > > Matt > (Plug - I do networkie stuff like the above. If you need to > hire someone.. hire me.. 503-228-4156x2#) Duh ... I can make all 3 for half the price :> You are right, at least until now and including all kind of entities, I don't know one that had the 3 jobs well done. FM 5109 From: Fernando Martins Date: Sun Mar 31, 2002 4:01pm Subject: RE: Spy Software Detection Help > I wouldn't consider a TSCM professional to be a physical > security expert any more than a network security person to be > a TSCM professional. Knowledge of the fields is one thing, > expertise is another. I'd hope that a physical security > expert be involved in non-tscm related services such as air, > maritime and ground protection services. Typical companies > that come to mind would be Brinks, ADT and similar firms, > which typically don't provide TSCM services, or if they do, > only as a small portion of their overall business plan. They > would hopefully employ a 3rd party for a separate analysis of > physical protection (a blind) and provide two separate > compiled reports for a good system to be developed. I agree, but there are companies that at least electronic and physical security are part of their portfolio. Probably in the future all the 3 areas can be covered by one company, at least one I hope it will ;) Lets take for example a CCTV system, that is managed along with a access control system, using Unix and Windows servers, protected with firewalls and IDS's (at least), that can be remotely controled using VPN. Consider that the VPN includes TEMPEST technology. A TSCM service to check all system may also be needed, if it's a high security system, witch is easy to be considering the solutions in this virtual system. In my point of view, the less people involved the better, so if all this can be done by one single company, great. At least as a security consultant, and trying not to be the known moron type, I have to know how to design and execute a project as this one. The usual 20 cents ;) FM 5110 From: Steve Uhrig Date: Sun Mar 31, 2002 6:52pm Subject: Anyone know of -- a distance learning center? I'm looking for a place who already has the infrastructure set up for distance learning, to whom I could work with setting up some classes offered through them. If anyone knows of such a place, please get with me off list. Tks .. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5111 From: Secdep Date: Mon Apr 1, 2002 0:10am Subject: South Africa - New Security Industry Categories The following providers of security services in South Africa have been given notice by the Minister for Safety & Security to register under the new Private Security Industry Regulation Act, 2001 (Act No 56 of 2001): a.. Locksmiths; b.. Private Investigators; c.. Security training providers; d.. Manufacturers, importers & distributors of monitoring devices as defined in the Interception & Monitoring Prohibition Act, 1992; e.. Installers & repairers of security equipment or persons servicing security equipment; f.. Labour brokers & others making persons available to render a security service; g.. Persons who monitor the signals or transmissions from electronic security equipment; & h.. Persons who manage or control the rendering of security services. The Minister for Safety & Security, Steve Tswete, determined through a notice published in terms of the Private Security Industry Regulation Act, 2001 that every category or class of security service providers (as mentioned above) need to be registered before 01 October 2002 if they intend to render a security service from this date. http://www.sira-sa.co.za --- From the desk of Raymond van Staden Van Staden and Associates cc Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 5112 From: Date: Mon Apr 1, 2002 9:34am Subject: Truce called in Spyware wars Truce called in Spyware warsWinWhatWhere no longer breaks anti-spyware productBy Bob Sullivan MSNBC Martch 27 ≠ In the latest chapter of Spyware vs. Anti-spyware, the maker of snooping program WinWhatWhere backed away from evasive programming tactics Wednesday. Richard Eaton, president of WinWhatWhere Corp., said his software would no longer insert stray code into Anti-spyware program Who's Watching Me to break the program. The announcement comes after MSNBC.com revealed WinWhatWhere and competitor SpectorSoft Corp. both intentionally break the anti-Spyware program. SO-CALLED SPYWARE programs have been controversial for years. Programs like Spector and WinWhatWhere can be secretly installed on any machine ≠ even from afar ≠ and quietly watch every keystroke and mouse motion. Information gleaned by the spy software can then be remotely e-mailed to the real spy. As a counter-measure, some programmers have developed "anti-spy" programs like Trapware.com's Who's Watching Me. But developer Wes Austin revealed to MSNBC.com on Monday that spyware developers had recently started writing code to break his software, so Who's Watching Me didn't blow their cover. WinWhatWhere did so by inserting stray text into a file critical for Who's Watching Me's operations; Spector simply crashes the anti-spy program. But Wednesday, Eaton said he had a change of heart. Who's Watching WinWhatWhere? "I got to thinking writing to their file wasn't a very nice thing to do," Eaton said. "The thought of writing into another program's files, well, I guess that's not playing fair. You don't want anyone to think your program is doing something malicious." So as of Wednesday, WinWhatWhere no longer inserts the stray text into Who's Watching Me files. Asked if he would try to circumvent Who's Watching Me another way, Eaton said only: "I can't say." SpectorSoft has not announced any changes to its program. HAVE A GREAT DAY !!! ---------- http://www.msnbc.com/news/730650.asp?cp1=1 [Non-text portions of this message have been removed] 5113 From: Secdep Date: Mon Apr 1, 2002 10:52am Subject: Vehicle Tracking Device Can a anyone identify the manufacturer of a vehicle tracking device, found on a fuel tank of a car in South Africa. There is small identification plate on the side with the following; M7722 Ser. No 386 ID R154DL The device is 12cm (Length) by 3cm (Breadth), 2cm in height over batteries, 3cm in height over antenna. Resembles a miniature coffin, Has a base plate with 6 small powerful magnets Metal construction with a aluminium cover over the batteries & a moulded hard plastic cover over the antenna. Powered by two 3.6 Volt Batteries (AA size) The antenna is coiled foil on a small PC Board. It is transmitting short signals at 10 second intervals. Transmitting on 862.288 Mhz Raymond VAN STADEN --- From the desk of Raymond van Staden Van Staden and Associates cc Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 5114 From: James M. Atkinson Date: Mon Apr 1, 2002 10:45am Subject: Highly Classified Indexing Methods and Procedures Major leak of classified materials. Visit this link before the government forces them to take it down: http://www.google.com/technology/pigeonrank.html Looks like one of the most sophisticated methods available, and it has major applications in the TSCM world. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5115 From: Graham Bignell Date: Sun Mar 31, 2002 8:57pm Subject: RE: Spy Software.. On Sun, 31 Mar 2002, Fernando Martins wrote: > '0 day warez' ? That's new ... Since warez is the illegall copy and > distribution of commercial software, how can it be 0-day? No, not new... "0D w4r3Z" is as old as the basement BBS. "zero day" refers to something that is aquired and distributed before it is officially released. --- Graham "Lorax" Bignell - 416 366 9755 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 5116 From: Fernando Martins Date: Mon Apr 1, 2002 1:54pm Subject: RE: Spy Software.. > -----Original Message----- > From: Graham Bignell [mailto:lorax@e...] > Sent: segunda-feira, 1 de Abril de 2002 3:58 > To: Fernando Martins > Cc: TSCM-L@yahoogroups.com > Subject: RE: [TSCM-L] Spy Software.. > > > On Sun, 31 Mar 2002, Fernando Martins wrote: > > > '0 day warez' ? That's new ... Since warez is the illegall copy and > > distribution of commercial software, how can it be 0-day? > > No, not new... "0D w4r3Z" is as old as the basement BBS. > "zero day" refers to something that is aquired and > distributed before it is officially released. So, zero day warez is the illegall copy of beta versions of commercial software. Yeah, it make sense and was the first time I saw that expression. I just use to refer 0-day for exploits, and about warez I don't use to make a diference between beta versions and final versions, it's all warez. But regarding anti-virus or spy software, I still can't make a connection with '0-day warez' ... Can Carnivore be and example and do anti-virus software detect and clean that? :> FM 5117 From: A Grudko Date: Mon Apr 1, 2002 5:21pm Subject: Re: Vehicle Tracking Device - Original Message - From: Secdep > Can a anyone identify the manufacturer of a vehicle tracking device, found on a fuel tank of a car in South Africa. > There is small identification plate on the side with the following; > M7722 > Ser. No 386 > ID R154DL I'm not doubting my friend Raymond's information for a moment, but can anyone understand the mentality of leaving such evidence on a device? There was a proposal here over a decade ago that all legal covert surveilance devices be 'tagged' but I don't think it went through. I stand to be corrected. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 5118 From: Michael Puchol Date: Mon Apr 1, 2002 6:00pm Subject: Re: Vehicle Tracking Device Hi Raymond, Can you send me a picture of the device? I've done a lot of work on AVL, so I could try dig something out. Cheers, Mike ----- Original Message ----- From: "Secdep" To: "TSCM-L" Sent: Monday, April 01, 2002 6:52 PM Subject: [TSCM-L] Vehicle Tracking Device > Can a anyone identify the manufacturer of a vehicle tracking device, found on a fuel tank of a car in South Africa. > > There is small identification plate on the side with the following; > > M7722 > Ser. No 386 > ID R154DL > > The device is 12cm (Length) by 3cm (Breadth), 2cm in height over batteries, 3cm in height over antenna. Resembles a miniature coffin, Has a base plate with 6 small powerful magnets > > Metal construction with a aluminium cover over the batteries & a moulded hard plastic cover over the antenna. > > Powered by two 3.6 Volt Batteries (AA size) > > The antenna is coiled foil on a small PC Board. > > It is transmitting short signals at 10 second intervals. > > Transmitting on 862.288 Mhz > > Raymond VAN STADEN > > --- > > From the desk of Raymond van Staden > Van Staden and Associates cc > > Tel: +27 (0)31 916-1262 > Fax: +27 (0)31 916-1263 > > Email: raymond@v... > Internet: http://www.vanstaden.co.za > > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5119 From: James M. Atkinson Date: Mon Apr 1, 2002 11:11pm Subject: Re: Highly Classified Indexing Methods and Procedures [snicker, snicker, snicker] Happy April Fools Day. -jma At 11:45 AM -0500 4/1/02, James M. Atkinson wrote: >Major leak of classified materials. > >Visit this link before the government forces them to take it down: > >http://www.google.com/technology/pigeonrank.html > >Looks like one of the most sophisticated methods available, and >it has major applications in the TSCM world. > >-jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5120 From: Perry Myers Date: Tue Apr 2, 2002 6:38pm Subject: RE: Spy Software Detection Help You are correct Fernando! I have tried several of them and Ad-Aware by Lavasoft and a couple of the other so called spy detectors and they have not found Spector software or the E-Blaster. For Eblaster, the best solution is a personal firewall, something like Zone Alarms by Zone Labs. Perry D. Myers, CFE President & CEO E-mail: perry@d... MSI Detective Services Myers Service, Inc. Corporate Headquarters 2076 N. Elston Ave. Suite 200 Chicago, IL. 60614-3940 Phone 773-342-8300 Facsimile 773-486-4430 Professional Investigators Since 1959 Investigations Nationwide 24 Hour Availability www.detectiveservices.com -----Original Message----- From: Fernando Martins [mailto:fernando.martins@e...] Sent: Saturday, March 30, 2002 3:27 PM To: tscm-l@yahoogroups.com Subject: RE: [TSCM-L] Spy Software Detection Help Yes, several, but should you relly on them? The best way is to *dig* in the OS and see what is running ... For example, if it is (and I hope it's not) some 0-day spy trojan or logging application, it's not known, so shareware or commercial software will not spot it probably. FM ª -----Original Message----- ª From: Richard Gray [mailto:laspy1@y...] ª Sent: domingo, 24 de MarÁo de 2002 21:32 ª To: tscm-l@yahoogroups.com ª Subject: [TSCM-L] Spy Software Detection Help ª ª ª Is there any software that will detect logging and spyware ª programs installed on a computer? ª ª Ricky ª ª ª _________________________________ ª Richard T. Gray Jr. ª Legal Investigator ª License No. 1914-050896-LA ª ª Gray & Associates, LLC ª PO Box 2368 ª Crowley, LA 70527 ª 337-785-0046 Voice ª 800-394-8216 Fax ª www.la-pi.com ª ricky@l... ª "When you need to know!" ª ª -----Original Message----- ª From: Marko Radovic [mailto:radovic_marko@y...] ª Sent: Friday, March 22, 2002 2:12 AM ª To: TSCM-L@yahoogroups.com ª Subject: [TSCM-L] ISO 17799 ª ª ª Hello, ª ª I would like to thank all the pepople who privided ª help and information cocerning ISO 17799 standard. ª ª Any additional information about standard is welcome. ª ª Marko ª ª __________________________________________________ ª Do You Yahoo!? ª Everything you'll ever need on one web page ª from News and Sport to Email and Music Charts http://uk.my.yahoo.com ª ª ª ª Yahoo! Groups Sponsor ª ª ADVERTISEMENT ª ª ª ª ª ª ======================================================== ª TSCM-L Technical Security Mailing List ª "In a multitude of counselors there is strength" ª ª To subscribe to the TSCM-L mailing list visit: ª http://www.yahoogroups.com/community/TSCM-L ª ª It is by caffeine alone I set my mind in motion. ª It is by the juice of Star Bucks that thoughts acquire speed, ª the hands acquire shaking, the shaking is a warning. It is by ª caffeine alone I set my mind in motion. ª =================================================== TSKS ª ª Your use of Yahoo! Groups is subject to the Yahoo! Terms of ª Service . ª ª ª ª ª [Non-text portions of this message have been removed] ª ª ª ª ------------------------ Yahoo! Groups Sponsor ª ---------------------~--> Tiny Wireless Camera under $80! ª Order Now! FREE VCR Commander! Click Here - Only 1 Day Left! ª http://us.click.yahoo.com/nuyOHD/7.PDAA/yigFAAª /kgFolB/TM ª ª ª -------------------------------------------------------------- ª -------~-> ª ª ======================================================== ª TSCM-L Technical Security Mailing List ª "In a multitude of counselors there is strength" ª ª To subscribe to the TSCM-L mailing list visit: ª http://www.yahoogroups.com/community/TSCM-L ª ª It is by caffeine alone I set my mind in motion. ª It is by the juice of Star Bucks that thoughts acquire ª speed, the hands acquire shaking, the shaking is a warning. ª It is by caffeine alone I set my mind in motion. ª =================================================== TSKS ª ª Your use of Yahoo! Groups is subject to ª http://docs.yahoo.com/info/terms/ ª ª ª ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5121 From: Michael Puchol Date: Wed Apr 3, 2002 3:39am Subject: Re: Spy Software Detection Help I have one question on this subject: if the FBI is being grilled over the Scarfo case and use of keyloggers, the legality of which questioned, etc. the these spyware manufacturers should go straight to jail, do not pass 'Go', shouldn't they? I mean, they're planting software on your computer, most times without your knowledge, which is used to send personal information about you to external persons or companies...not something I thought was even remotely legal... All the best, Mike 5122 From: David Alexander Date: Wed Apr 3, 2002 5:11am Subject: re: spy software >"zero day" refers to something that is aquired and distributed before it is >officially released. With my Information Security hat on: I think that the wrong meaning of zero day is being referred to here. A "zero day" item is the holy grail of hackers. It refers to a security vulnerability that is not yet known to the software company that wrote the operating system or application, the users or the security community. It is a means of entry that no-one knows exists and is not being guarded against. There is no patch and no alarm bells will ring if it is used. Imagine someone came up with a new way of bugging a room using a completely new method. Until what to look for and how to detect it was publicised it would most likely go unnoticed by most people. Hackers trade such things for usernames & passwords, ex-directory modem numbers, new hacking tools and utilities, valid credit card numbers and locations of 'open machines' they can use to launch attacks from. In terms of value, a zero day vulnerability is the equivalent of a straight royal flush in poker - nothing is worth more. regards _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 5123 From: Matthew Paulsen Date: Wed Apr 3, 2002 10:32am Subject: RE: Spy Software Detection Help That's why there's a EULA. You click yes in most cases which obsolves them when you install the primary application. Always read the EULA. -----Original Message----- From: Michael Puchol [mailto:mpuchol@s...] Sent: Wednesday, April 03, 2002 1:39 AM To: tscm-l@yahoogroups.com Subject: Re: [TSCM-L] Spy Software Detection Help I have one question on this subject: if the FBI is being grilled over the Scarfo case and use of keyloggers, the legality of which questioned, etc. the these spyware manufacturers should go straight to jail, do not pass 'Go', shouldn't they? I mean, they're planting software on your computer, most times without your knowledge, which is used to send personal information about you to external persons or companies...not something I thought was even remotely legal... All the best, Mike Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5124 From: Graham Bignell Date: Wed Apr 3, 2002 7:31am Subject: Re: re: spy software On Wed, 3 Apr 2002, David Alexander wrote: > >"zero day" refers to something that is aquired and distributed before it is > >officially released. > > I think that the wrong meaning of zero day is being referred to here. A > "zero day" item is the holy grail of hackers. It refers to a security > vulnerability that is not yet known to the software company that wrote the > operating system or application, the users or the security community. It is > a means of entry that no-one knows exists and is not being guarded against. > There is no patch and no alarm bells will ring if it is used. No, "zero day warez" is what was mentioned, which is correct. What you are reffering to is a "zero day exploit" which is also correct, but much less common as these windows of vunerability are usually quite short lived before the community at large becomes aware of the problem. (It is difficult to test an exploit in isolation or without a target, and someone must know it exists before they can use it.) In the case of a new software vunerability being used to access a computer system, I would expect alarm bells to ring when something went "wrong" (requiring vigilance) such as an application failing, file deletion, or other state change that can be detected. Like with a listening device collecting insider information, you might not know it is there, but become rather suspicious when the competition keeps beating you to market on everything discussed in the room. -- "Zero Day" made a lot of COBOL programmers fairly wealthy. :) --- Graham "Lorax" Bignell - 416 366 9755 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 5125 From: The Dog's Bollix Date: Wed Apr 3, 2002 8:09am Subject: Spy Software - How to locate eBlaster etc.... The simplest, most effective way is to usea product called SpyCop. It is not freeware, and it works. I have no affiliation to them except to say that their product will ocate Spector and eBlaster and any other key-logger out there for Windoze. Now, I have noticed one flaw, if SpyCop is installed before eBlaster or Spector it gets corrupted when one of these spy programs is installed. It can be downloaded from any of the downlaod sites. --- Perry Myers wrote: > You are correct Fernando! I have tried several of > them and Ad-Aware by > Lavasoft and a couple of the other so called spy > detectors and they have > not found Spector software or the E-Blaster. For > Eblaster, the best > solution is a personal firewall, something like Zone > Alarms by Zone > Labs. > > Perry D. Myers, CFE > President & CEO > E-mail: perry@d... > > MSI Detective Services > Myers Service, Inc. > Corporate Headquarters > 2076 N. Elston Ave. Suite 200 > Chicago, IL. 60614-3940 > Phone 773-342-8300 > Facsimile 773-486-4430 > > Professional Investigators Since 1959 > Investigations Nationwide > 24 Hour Availability > www.detectiveservices.com > > > -----Original Message----- > From: Fernando Martins > [mailto:fernando.martins@e...] > Sent: Saturday, March 30, 2002 3:27 PM > To: tscm-l@yahoogroups.com > Subject: RE: [TSCM-L] Spy Software Detection Help > > > Yes, several, but should you relly on them? > The best way is to *dig* in the OS and see what is > running ... > For example, if it is (and I hope it's not) some > 0-day spy trojan or > logging application, it's not known, so shareware or > commercial software > will not spot it probably. > > FM > > ª -----Original Message----- > ª From: Richard Gray [mailto:laspy1@y...] > ª Sent: domingo, 24 de MarÁo de 2002 21:32 > ª To: tscm-l@yahoogroups.com > ª Subject: [TSCM-L] Spy Software Detection Help > ª > ª > ª Is there any software that will detect logging and > spyware > ª programs installed on a computer? > ª > ª Ricky > ª > ª > ª _________________________________ > ª Richard T. Gray Jr. > ª Legal Investigator > ª License No. 1914-050896-LA > ª > ª Gray & Associates, LLC > ª PO Box 2368 > ª Crowley, LA 70527 > ª 337-785-0046 Voice > ª 800-394-8216 Fax > ª www.la-pi.com > ª ricky@l... > ª "When you need to know!" > ª > ª -----Original Message----- > ª From: Marko Radovic > [mailto:radovic_marko@y...] > ª Sent: Friday, March 22, 2002 2:12 AM > ª To: TSCM-L@yahoogroups.com > ª Subject: [TSCM-L] ISO 17799 > ª > ª > ª Hello, > ª > ª I would like to thank all the pepople who privided > ª help and information cocerning ISO 17799 standard. > ª > ª Any additional information about standard is > welcome. > ª > ª Marko > ª > ª __________________________________________________ > ª Do You Yahoo!? > ª Everything you'll ever need on one web page > ª from News and Sport to Email and Music Charts > http://uk.my.yahoo.com > ª > ª > ª > ª Yahoo! Groups Sponsor > ª > ª ADVERTISEMENT > ª > ª > ª web/S=1705 > ª > 007140:HM/A=847665/R=0/*http://ads.x10.com/?bHlhaG9vbW9uc3Rlcj > ª cuZGF0=101 > ª > 6803186%3eM=215002.1818248.3328688.1261774/D=egroupweb/S=17050 > ª 07140:HM/A > ª =847665/R=1> > ª > ª > ª 74/D=egrou > ª pmail/S=1705007140:HM/A=847665/rand=398610181> > ª > ª > ======================================================== > ª TSCM-L Technical Security Mailing List > ª "In a multitude of counselors there is > strength" > ª > ª To subscribe to the TSCM-L mailing list > visit: > ª > http://www.yahoogroups.com/community/TSCM-L > ª > ª It is by caffeine alone I set my mind in motion. > ª It is by the juice of Star Bucks that thoughts > acquire speed, > ª the hands acquire shaking, the shaking is a > warning. It is by > ª caffeine alone I set my mind in motion. > ª > =================================================== > TSKS > ª > ª Your use of Yahoo! Groups is subject to the Yahoo! > Terms of > ª Service . > ª > ª > ª > ª > ª [Non-text portions of this message have been > removed] > ª > ª > ª > ª ------------------------ Yahoo! Groups Sponsor > ª ---------------------~--> Tiny Wireless Camera > under $80! > ª Order Now! FREE VCR Commander! Click Here - Only 1 > Day Left! > ª http://us.click.yahoo.com/nuyOHD/7.PDAA/yigFAAª > /kgFolB/TM > ª > ª > ª > -------------------------------------------------------------- > ª -------~-> > ª > ª > ======================================================== > ª TSCM-L Technical Security Mailing List > ª "In a multitude of counselors there is > strength" > ª > ª To subscribe to the TSCM-L mailing list > visit: > ª http://www.yahoogroups.com/community/TSCM-L > ª > ª It is by caffeine alone I set my mind in motion. > ª It is by the juice of Star Bucks that thoughts > acquire > ª speed, the hands acquire shaking, the shaking is > a warning. > ª It is by caffeine alone I set my mind in motion. > ª > =================================================== > TSKS > ª > ª Your use of Yahoo! Groups is subject to > ª http://docs.yahoo.com/info/terms/ > ª > ª > ª > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > === message truncated === __________________________________________________ Do You Yahoo!? Yahoo! Tax Center - online filing with TurboTax http://taxes.yahoo.com/ 5126 From: Date: Wed Apr 3, 2002 10:49am Subject: Re: Spy Software Detection Help Just to jump into the discussion....I purchased a copy of SpyCop and downloaded the free version of Ad-Aware. Then, I downloaded the demo version of Ghost Key. SpyCop found it, but Ad-Aware did not. Only problem I have with SpyCop is that it is painfully slow. Martin Brown Brown & Sikes, Inc. Dallas, TX Perry Myers wrote: > You are correct Fernando! I have tried several of them and Ad-Aware by > Lavasoft and a couple of the other so called spy detectors and they have > not found Spector software or the E-Blaster. For Eblaster, the best > solution is a personal firewall, something like Zone Alarms by Zone > Labs. > > Perry D. Myers, CFE > President & CEO > E-mail: perry@d... > > MSI Detective Services > Myers Service, Inc. > Corporate Headquarters > 2076 N. Elston Ave. Suite 200 > Chicago, IL. 60614-3940 > Phone 773-342-8300 > Facsimile 773-486-4430 > > Professional Investigators Since 1959 > Investigations Nationwide > 24 Hour Availability > www.detectiveservices.com > > -----Original Message----- > From: Fernando Martins [mailto:fernando.martins@e...] > Sent: Saturday, March 30, 2002 3:27 PM > To: tscm-l@yahoogroups.com > Subject: RE: [TSCM-L] Spy Software Detection Help > > Yes, several, but should you relly on them? > The best way is to *dig* in the OS and see what is running ... > For example, if it is (and I hope it's not) some 0-day spy trojan or > logging application, it's not known, so shareware or commercial software > will not spot it probably. > > FM > > ª -----Original Message----- > ª From: Richard Gray [mailto:laspy1@y...] > ª Sent: domingo, 24 de MarÁo de 2002 21:32 > ª To: tscm-l@yahoogroups.com > ª Subject: [TSCM-L] Spy Software Detection Help > ª > ª > ª Is there any software that will detect logging and spyware > ª programs installed on a computer? > ª > ª Ricky > ª > ª > ª _________________________________ > ª Richard T. Gray Jr. > ª Legal Investigator > ª License No. 1914-050896-LA > ª > ª Gray & Associates, LLC > ª PO Box 2368 > ª Crowley, LA 70527 > ª 337-785-0046 Voice > ª 800-394-8216 Fax > ª www.la-pi.com > ª ricky@l... > ª "When you need to know!" > ª > ª -----Original Message----- > ª From: Marko Radovic [mailto:radovic_marko@y...] > ª Sent: Friday, March 22, 2002 2:12 AM > ª To: TSCM-L@yahoogroups.com > ª Subject: [TSCM-L] ISO 17799 > ª > ª > ª Hello, > ª > ª I would like to thank all the pepople who privided > ª help and information cocerning ISO 17799 standard. > ª > ª Any additional information about standard is welcome. > ª > ª Marko > ª > ª __________________________________________________ > ª Do You Yahoo!? > ª Everything you'll ever need on one web page > ª from News and Sport to Email and Music Charts http://uk.my.yahoo.com > ª > ª > ª > ª Yahoo! Groups Sponsor > ª > ª ADVERTISEMENT > ª > ª ª web/S=1705 > ª 007140:HM/A=847665/R=0/*http://ads.x10.com/?bHlhaG9vbW9uc3Rlcj > ª cuZGF0=101 > ª 6803186%3eM=215002.1818248.3328688.1261774/D=egroupweb/S=17050 > ª 07140:HM/A > ª =847665/R=1> > ª > ª ª 74/D=egrou > ª pmail/S=1705007140:HM/A=847665/rand=398610181> > ª > ª ======================================================== > ª TSCM-L Technical Security Mailing List > ª "In a multitude of counselors there is strength" > ª > ª To subscribe to the TSCM-L mailing list visit: > ª http://www.yahoogroups.com/community/TSCM-L > ª > ª It is by caffeine alone I set my mind in motion. > ª It is by the juice of Star Bucks that thoughts acquire speed, > ª the hands acquire shaking, the shaking is a warning. It is by > ª caffeine alone I set my mind in motion. > ª =================================================== TSKS > ª > ª Your use of Yahoo! Groups is subject to the Yahoo! Terms of > ª Service . > ª > ª > ª > ª > ª [Non-text portions of this message have been removed] > ª > ª > ª > ª ------------------------ Yahoo! Groups Sponsor > ª ---------------------~--> Tiny Wireless Camera under $80! > ª Order Now! FREE VCR Commander! Click Here - Only 1 Day Left! > ª http://us.click.yahoo.com/nuyOHD/7.PDAA/yigFAAª /kgFolB/TM > ª > ª > ª -------------------------------------------------------------- > ª -------~-> > ª > ª ======================================================== > ª TSCM-L Technical Security Mailing List > ª "In a multitude of counselors there is strength" > ª > ª To subscribe to the TSCM-L mailing list visit: > ª http://www.yahoogroups.com/community/TSCM-L > ª > ª It is by caffeine alone I set my mind in motion. > ª It is by the juice of Star Bucks that thoughts acquire > ª speed, the hands acquire shaking, the shaking is a warning. > ª It is by caffeine alone I set my mind in motion. > ª =================================================== TSKS > ª > ª Your use of Yahoo! Groups is subject to > ª http://docs.yahoo.com/info/terms/ > ª > ª > ª > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ [Non-text portions of this message have been removed] 5127 From: McIntyre Date: Wed Apr 3, 2002 11:35am Subject: Black Hat Briefings (Vegas) Call for Papers Well folks, less than one more month (May 1st, 2002) before the BlackHat 2002 Call for Papers closes! I hope to see several list members either speak at, or attend the show: Papers and presentations are now being accepted for the Black Hat Briefings 2002 conference. The conference is held from July 31-August 1, 2002 at the Caesars Palace Hotel and Resort in Las Vegas, NV, USA. Papers and requests to speak will be received and reviewed until May 1, 2002. Please read the full announcement at: http://www.blackhat.com/html/bh-usa-02/bh-usa-02-cfp.html 5128 From: Fernando Martins Date: Wed Apr 3, 2002 3:05pm Subject: RE: re: spy software > What you are reffering to is a "zero day exploit" which is > also correct, but much less common as these windows of > vunerability are usually quite short lived before the > community at large becomes aware of the problem. IF the comunity becomes aware ... > (It is difficult to test an exploit in isolation or without a > target, and someone must know it exists before they can use it.) Yeah, it can be, specially if it is from somebody else or if the source is not available or if one can't code. But it's very easy to get a target ... Just setup another box in your lab, test a system against know vulnerabilities, TRY to discover new ones, and create exploits to use them. It's quite simple, the method ;> > In the case of a new software vunerability being used to > access a computer system, I would expect alarm bells to ring > when something went "wrong" (requiring vigilance) such as an > application failing, file deletion, or other state change > that can be detected. Like with a listening device > collecting insider information, you might not know it is > there, but become rather suspicious when the competition > keeps beating you to market on everything discussed in the room. Yeah, there are IDS's (intrusion detection systems), but also ways to cheat them ... It can be very simple as with any alarm system, if you know how it can ring so many times nobody, at least in a period of time, will care, you can get in. In this area (as in others) IT Security and Physical Security are just the same, in methods. Again, as I said in other mail, it can be a great advantage if a company have knowledge in more then one field in security, and the 'holy grail' is to rock on all 3: IT, electronics and physical. FM 5129 From: Fernando Martins Date: Wed Apr 3, 2002 3:05pm Subject: RE: re: spy software > I think that the wrong meaning of zero day is being referred > to here. A "zero day" item is the holy grail of hackers. It > refers to a security vulnerability that is not yet known to > the software company that wrote the operating system or > application, the users or the security community. It is a > means of entry that no-one knows exists and is not being > guarded against. There is no patch and no alarm bells will > ring if it is used. I think that the holy grail of hackers is not a "zero day", but a remote "root", but assuming that it is, is refered to a way to exploit a vulnerability and not the vulnerability itself. It can even be a known vulnerability, but that nobody else knows a way how to exploit it. > Hackers trade such things for usernames & passwords, > ex-directory modem numbers, new hacking tools and utilities, > valid credit card numbers and locations of 'open machines' > they can use to launch attacks from. Credit card numbers? I think criminals do that ... If I know how to use a gun it doesn't mean that I'm an assassin, does it? Let's say, a hacker can build an exploit that can compromise a web site, a criminal will take advantage of that knowledge to steal classified/confidencial/personal information, or DoS the site, or any other illegall activity. It's about time to people in any field of security know what a hacker is and that not all hackers are criminals! FM 5130 From: Dragos Ruiu Date: Wed Apr 3, 2002 0:33pm Subject: zero-day (was Re: re: spy software) On Wed, 3 Apr 2002 08:31:37 -0500 (EST) Graham Bignell wrote: > No, "zero day warez" is what was mentioned, which is correct. What > you are reffering to is a "zero day exploit" which is also correct, > but much less common as these windows of vunerability are usually > quite short lived before the community at large becomes aware of the > problem. (It is difficult to test an exploit in isolation or without > a target, and someone must know it exists before they can use it.) Clarification: warez kiddiez use term 0day to mean new release of game/movie/etc... I would like to contest your "short lived" hypothesis. Myself, some of the Honeynet members as well as a few other groups have been keeping statistics on vulnerabilities for formally researching the sizes of these "windows." We have been trying to note when the exploits get caught in the wild, when the vulnerability is discovered vs. when the useable exploits for it get written, when the gossip starts in the haxor groups, when the information gets circulated in the ivory tower "security information cartels" and when the public advisories are released vs. the the private and public distribution of the tools to exploit them. It's quite a complicated informational ecosystem with surprising linkages and leakages, and so far the data is all over the map making it difficult to discern trends because it varies so much on a case by case basis. We are trying to pull all this together into some papers in the future. I have seen no evidence that these windows are decreasing in size and becoming "short lived." As a matter of fact I would even postuate that the opposite phenomenon may be in effect as the general awareness of security has also increased the recognition of the value of this knowledge, as well as increased the market for and viability of converting this intellectual property into other forms of currency. :-) I know of several security firms and vendors that are willing to and _have_ handed over cash and other rewards in exchange for this kind of information, and the number of small clusters and groupings of individuals, organizations, and even nation-states exchanging this information is on the rise. The haxor "scene" itself seems to be suffering from some increasing fragmentation and compartmentalization too. Must cause great fun and headaches for the SigInt folks. :-) :-P As a pretty sensationalistic case in point, the recent fairly wide ranging CERT advisory on the broad and multiple vulnerabilities in equipment utilizing the SNMP protocol is acknowledged to have been been in circulation in the "underground" for well over two years, enough time it is reputed, for certain groups and individuals to amass practical exploits for over 75% of the targets listed (which was well, uh, almost everything :-). It is certain that some vendor organizations had notification at least six months in advance of its publication. The "antisec" movement seems to be picking up converts instead of shrinking. Ph33r. As they say: All your base r belong to us. :-) cheers, --dr (P.s. if that doesn't convince you, my own _verified_ vulnerability clock on SNMP ASN overflows puts it at >4 years. b00m! ;) -- --dr pgpkey: http://dragos.com/dr-dursec.asc CanSecWest/core02 - May 1-3 2002 - Vancouver B.C. - http://cansecwest.com 5131 From: Dries 'Doris' Bessels Date: Wed Apr 3, 2002 11:56pm Subject: Yahoo - Important news A recent change in Yahoo accounts: Yahoo! has added a new section to your "Account Info" that requests spammers to send you unsolicited e-mail. They have set this on for everybody. Everybody's default settings are initially set to "yes" meaning that everybody who uses Yahoo is allegedly requesting advertisers to send unsolicited e-mail to them! Follow these instructions to turn these settings off: 1. Go to http://groups.yahoo.com 2. Click on "Account Info" in the upper-right corner 3. Click on "Edit your marketing preferences" down under "Member Information" under "Yahoo! Mail Address" 4. Click all the buttons to "No" for Special Offers and Marketing Communications 5. Scroll down to make sure you get all the checkboxes 6. Look at the very bottom of the page to click "No" for U.S. Mail and Phone calls 7. Press the "Save Changes" button 8. Click "continue" to confirm your changes 9. Click the "Finished" button The following comes from http://help.yahoo.com/help/us/privacy/privacy-23.html : Yahoo! is notifying users of these changes to marketing preferences via email. Your new marketing preferences will not take effect until 60 days after the date the email is sent to you, so you have plenty of time to decide what you want to receive and what you don't. To change your preferences, go to the Marketing Preferences page. YAHOO! PRIVACY POLICY See also: http://privacy.yahoo.com/ and http://help.yahoo.com/us/privacy/ Kind regards Dries Dries 'Doris' Bessels Ride to work, work to ride Amsterdam, The Netherlands FLSTC '00 (Yellow) E-mail : Dries@D... http://www.driesbessels.com Cellphone: +31-6-4402-8346 http://www.flimm.com [Non-text portions of this message have been removed] 5132 From: zack <10-33@c...> Date: Thu Apr 4, 2002 8:18am Subject: Re: Spy Software Detection help Try this program, I am very satisfied with it and its free http://personal.atl.bellsouth.net/mia/k/r/kryp/ Also try http://www.analogx.com/contents/download/network/cookie.htm feel free to look around. This might also interest you http://www.copscops.com/downloads.htm At 09:12 PM 4/3/2002 +0000, you wrote: >Subject: Re: Spy Software Detection Help > >Just to jump into the discussion....I purchased a copy of SpyCop and >downloaded the free version of Ad-Aware. Then, I downloaded the demo version >of Ghost Key. SpyCop found it, but Ad-Aware did not. Only problem I have >with SpyCop is that it is painfully slow. visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." George W Bush President of the United States of America God Bless The USA .. NEVER forget 9-11-01 http://www.copscops.com/blessusa.htm [Non-text portions of this message have been removed] From: human being Date: Tue Apr 1, 2003 3:56pm Subject: Re: New security device one question: from its description it is unclear if it shreds printed documents _after they've been printed, or as it seems to read to me: that it shreds an immediately printed document, without ever leaving the machine (that is: a computer print-out one does not see, but that gets shredded). thus: is this is joke? (it appears to say 'hp' too, on the label, but is branded otherwise) brian On Tuesday, April 1, 2003, at 11:28 AM, Steve Uhrig wrote: > For those who have clients handling sensitive data, the following > product may be useful to them: > > http://tinyurl.com/8loe(URL shortened for convenience). > > It is a combination color laser printer and shredder. Like the other > multifunction devices (printer, fax, copier, scanner), this unit > combines several necessary functions into one. > > It may be the closest we'll get to the ultimate data security device > for some time. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* 7144 From: A Grudko Date: Tue Apr 1, 2003 7:41am Subject: Re: Useful conversion chart - Original Message - From: Steve Uhrig > A way for us to convert from cycles per second to Hertz. > http://brainerdham.org/Tips/CPS_to_Hz_conversion.html > May want to print or bookmark. Thanks Steve, but Hertz have let us down here. They claim to be number one but our three cellphone companies have been offering 'per second' services for over a year. That being said, I don't see why anyone would want to rent a unicycle, bicycle or tricycle outside of NYC or Venice Beach anyway. Loof Lirpaon 7145 From: Steve Uhrig Date: Tue Apr 1, 2003 7:38pm Subject: RE: Useful conversion chart On 1 Apr 2003 at 16:51, Robert Dyk wrote: > Been looking for this for years, my slide rule is almost worn out > doing this conversion manually... Yeah, My $2 Pickett bamboo slide rule from college is nearly gone too. When my dad dies, I inherit his aluminum Pickett. I to this day keep a circular slide rule in my truck for calculating gas mileage. My $2 Pickett does cubes and cube roots. I've never seen a calculator which does that. > BTW has anyone seen something similar to convert VA to Watts? It's not a direct conversion unless the load is purely resistive. Add any reactance and you get into Power Factor. Look it up. Power factor of 1 is pure resistive load. Any reactance lowers the power factor below 1, and you multiply by that fraction to get the true rating. A typical example would be a PF of 0.7 for something like a refrigerator. It annoys me that UPS systems are rated in VA rather than watts. I suppose technically it's more precise, but I believe it is more an advertising ploy than anything else. My 2200 VA UPS on the phone system here, video, alarms, network hub, etc. is rated at 1600 watts or 2200 VA. I guess they pick some arbitrary figure for power factor. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7146 From: A Grudko Date: Tue Apr 1, 2003 8:28am Subject: Re: legal question - Original Message - From: Val - in an unspecified country. Maybe you are in Iraq? > if a bug sweep turns up evidence > of police surveillance How would you know it's police surveillance? Is there a sticker on the bug that says "Disneyland Police Department"? > Does the sweep company have to notify the > police that they are telling > their client that they have discovered > their bugs, cleaned/removed them? > is it legal to remove police bugs/ > surveillance cams? I've seen this discussion before. Here in SA, if there is a legal LEO surveillance operation in situ and you touch them or talk about them you will be criminally prosicuted - jail time. In my contracts/reports I make it clear that I will NOT report on LEO surveillance but in practice, once you have discovered that device, do you have the connections to ID it? A difficult call. Andy Grudko (British), Grad I.S, South Africa Registered as a security service provider by the Private Security Industry Regulatory Authority, registration number. 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 7147 From: Steve Uhrig Date: Tue Apr 1, 2003 8:25pm Subject: Re: Useful conversion chart On 1 Apr 2003 at 15:41, A Grudko wrote: > - Original Message - > From: Steve Uhrig > > A way for us to convert from cycles per second to Hertz. > > http://brainerdham.org/Tips/CPS_to_Hz_conversion.html > > May want to print or bookmark. Andy sez: > Thanks Steve, but Hertz have let us down here. They claim to be number > one but our three cellphone companies have been offering 'per second' > services for over a year. Good one Andy. For the record: Frequency is measured in cycles. Not bushels, cubits or rods. Hertz rents cars. And any frequency below 50 megacycles is useful only for audio or I.F., but that's a different conversation. Steve 7148 From: James M. Atkinson Date: Tue Apr 1, 2003 10:22pm Subject: Re: *** Saddam and his 2 Sons Captured *** At 2:10 PM -0500 4/1/03, James M. Atkinson wrote: >http://www.debka.com/ > >Last Updated on April 1, 2003, 12:49 PM (GMT+02:00) > >Saddam and his 2 Sons Captured while fleeing Baghdad > >Sources with American troops in Iraq confirm that Saddam, and his two >sons were just taken into custody 150 miles outside the western city >of Ar Ramadi. They were discovered when a huge convoy of trucks >headed for the Syrian border was stopped by U.S. Force after a brief >fire-fight. Saddam and his sons were found in an automobile moving >with the convoy, and according to sources all three were dressed in >women's clothing. > >More to follow. Happy April Fools Day -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7149 From: Andre Holmes <1ach@g...> Date: Wed Apr 2, 2003 7:33am Subject: Re: legal question ----- Original Message ----- From: To: Sent: Tuesday, April 01, 2003 10:33 AM Subject: [TSCM-L] legal question > > if a bug sweep turns up evidence > of police surveillance, does the > sweep company have to notify the > police that they are telling > their client that they have discovered > their bugs, cleaned/removed them? ==== I would by all means tell the client of the find it would be fulfilling your obilgation. ===== If you should see that the device is being monitored by the Police then you should not touch the device if it is located outside of the clients personal property in my opinion. ===== There remains at issue is the device there as a result of Court order meaning that a felony has been commited by your client on the flip side with out a Court order the client has a legal right to argue invasion of privacy, and possibility of illegal evidence gathering against him/her so its imperative that the defence attorney request discovery of a court order. =====If a device is found possibly installed by the Police and there is evidence of there presence then the sweep team should ducument all activity around the location of the sweep. ===== I have rolled up on a Police covert operation and I had with me a Icom R2 in full scan. ===== The Icom R2 locked on 434 MHz with 5 KHz spacing, I was approx 400 ft from the target area in a vehicle. ===== I noticed that they were using a 434 MHz wireless camera with the undercover agent in a lighted area to compensate for lux. 40 ft away was the recording team, it was great to see it all in real time and pick off the wireless camera at the same time so if you are within the radius of a real bug you should have no problem locking on the signal. ------- The Icom R2 sqwilled big time. ==== My experience =====Andre Holmes Neptune Enterprise Security USA > is it legal to remove police bugs/ > surveillance cams? > > i assume the sweep company is allowed to reveal > police bug/cam findings to their > client, right? > > thanks! val > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 7150 From: Andre Holmes <1ach@g...> Date: Wed Apr 2, 2003 7:58am Subject: Fw: legal question ----- Original Message ----- From: Andre Holmes To: jw mooty Sent: Wednesday, April 02, 2003 8:57 AM Subject: Re: [TSCM-L] legal question Hello JW Try http://www.aesham.com I have both full and cell blocked the cell blocked is better. Andre Holmes Neptune Enterprise Security USA ----- Original Message ----- From: jw mooty To: Andre Holmes Sent: Wednesday, April 02, 2003 8:42 AM Subject: Re: [TSCM-L] legal question where mite i buy a The Icom R2 ... wes mooty 501-617-4103 ----- Original Message ----- From: Andre Holmes To: TSCM-L@yahoogroups.com Sent: Wednesday, April 02, 2003 7:33 AM Subject: Re: [TSCM-L] legal question ----- Original Message ----- From: To: Sent: Tuesday, April 01, 2003 10:33 AM Subject: [TSCM-L] legal question > > if a bug sweep turns up evidence > of police surveillance, does the > sweep company have to notify the > police that they are telling > their client that they have discovered > their bugs, cleaned/removed them? ==== I would by all means tell the client of the find it would be fulfilling your obilgation. ===== If you should see that the device is being monitored by the Police then you should not touch the device if it is located outside of the clients personal property in my opinion. ===== There remains at issue is the device there as a result of Court order meaning that a felony has been commited by your client on the flip side with out a Court order the client has a legal right to argue invasion of privacy, and possibility of illegal evidence gathering against him/her so its imperative that the defence attorney request discovery of a court order. =====If a device is found possibly installed by the Police and there is evidence of there presence then the sweep team should ducument all activity around the location of the sweep. ===== I have rolled up on a Police covert operation and I had with me a Icom R2 in full scan. ===== The Icom R2 locked on 434 MHz with 5 KHz spacing, I was approx 400 ft from the target area in a vehicle. ===== I noticed that they were using a 434 MHz wireless camera with the undercover agent in a lighted area to compensate for lux. 40 ft away was the recording team, it was great to see it all in real time and pick off the wireless camera at the same time so if you are within the radius of a real bug you should have no problem locking on the signal. ------- The Icom R2 sqwilled big time. ==== My experience =====Andre Holmes Neptune Enterprise Security USA > is it legal to remove police bugs/ > surveillance cams? > > i assume the sweep company is allowed to reveal > police bug/cam findings to their > client, right? > > thanks! val > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 7151 From: Date: Tue Apr 1, 2003 9:15pm Subject: RE Useful conversion chart From Dave UK If you are talking DC then just multiply [volts x Amps] I you are talking AC and its an inductive load i.e. a motor rather than filament light then use Volts x Amps x Cosine i.e. the efficiency of the circuit, usually assumed to be 0.8 which means for an inductive circuit this would be 80% efficient against a lighting load Regards Dave TSCM [Technical Surveillance and Countermeasures] David McGauley Demtec Electronic Surveillance and Counter Measures Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L39 0HF UK 01695 558544 07866206112 demtec@a... The manufacture and installation of custom made covert electronic audio and video devices Professional physical and electronic counter measures [sweep] services. Note: any fellow UKPIN members welcome to call in to discuss applications. Workshop located alongside the M58 junc 3 [Non-text portions of this message have been removed] 7152 From: Craig Meldrum Date: Tue Apr 1, 2003 7:06pm Subject: Old TSCM Equipment I have the following gear for sale ISA Boomerang 2 NLJD ISA ETA-3 Telephone Analyser ISA ECR-1 Spectrum Analyser None of it is going and is not in particularly good condition but it may be useful for parts if you have similar equipment. Please contact me directly if interested. Craig =============================== Craig Meldrum, Managing Director Communications Security Ltd PO Box 8314, Symonds St Auckland, New Zealand Ph: 64-9-3093386 Fax: 64-9-3021148 =============================== 7153 From: Steve Uhrig Date: Wed Apr 2, 2003 11:46am Subject: Re: legal question On 2 Apr 2003 at 8:33, Andre Holmes wrote: > ===== I have rolled up on a Police covert operation and I had with me > a Icom R2 in full scan. > ===== The Icom R2 locked on 434 MHz with 5 KHz spacing, I was approx > 400 ft from the target area in a vehicle. > ===== I noticed that they were using a 434 MHz wireless camera > with the undercover agent in a lighted area to compensate for lux. 40 > ft away was the recording team, it was great to see it all in real > time and pick off the wireless camera at the same time so if you are > within the radius of a real bug you should have no problem locking on > the signal. Well, Andre, you stumbled onto an illegal surveillance operation. In the U.S., 434 megacycles is ILLEGAL to use for surveillance. That frequency is an amateur radio (ham radio) frequency, legal ONLY for hobby operation. No local, state or federal agency can use it for surveillance. Federal agencies MUST get an IRAC coordination to use anything other than frequencies licensed to them. IRAC *will not* coordinate any amateur frequencies for law enforcement surveillance. So, whomever the LE agency was surveilling, their evidence is no good because it was gathered illegally. If things ever go to court, and the defense attorney is sharp enough, that evidence and anything subsequent will be thrown out. Doesn't matter that the spy shops sell stuff there. It's cheap and easy to relabel inexpensive ham radio equipment and sell it illegally at inflated prices to naive agencies. To use anything on amateur frequencies, you must have a ham radio license of the proper class for that frequency, be engaged in two way communication, identify with your ham callsign every ten minutes, and commercial uses are forbidden. It is impossible for a law enforcement agency to meet these criteria in surveillance. There is an exception for 434 and other frequencies to be used for low power data transmissions, like car alarm remote controls, but the field strength limits restrict range to a very short distance. Effective power out for a legal data device on 434 is less than one milliwatt, although it is not measured that way. And that is for data only, not video or voice or anything. Another problem with using amateur frequecies is that many hams spend all their waking hours listening for weak signals all around the bands. The probability for intercept is very high. And, many amateur frequencies are used as inputs to repeaters. 434 megacycles is the input to one of the amateur repeaters in the LA basin. Transmit there and you'll be sharing your signals with thousands of hobbyists over several hundred square miles. It's happened, and the hams have had to DF 'surveillance' transmitters used to monitor a parking lot. In two different cases I've had, one LE agency using spy shop stuff got into the TV system in a hotel where they were working, and anyone on the proper channel in any hotel room could watch the surveillance in another room in the hotel. In another, at El Dorado airport in Bogota, the military was using some wireless video purchased from a spy shop and got into the video system of the entire airport. Their surveillance was seen on many many video monitors throughout the airport, for the few minutes before they discovered it and shut it down. With equipment most of us would have, it would be extremely difficult to intercept a properly done LE video surveillance. Virtually all of it is at microwave, you need to be in the path or very close, and more and more of it is being encrypted. So, in a different way, you uncovered an illegal surveillance. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7154 From: A Grudko Date: Wed Apr 2, 2003 0:25am Subject: Re: legal question Original Message - From: Steve Uhrig > In the U.S., 434 megacycles is ILLEGAL to use for surveillance. That frequency is an amateur radio (ham radio) frequency, legal ONLY for hobby operation. > There is an exception for 434 and other frequencies to be used for low power data transmissions, like car alarm remote controls, but the field strength limits restrict range to a very short distance. Effective power out for a legal data device on 434 is less than one milliwatt, although it is not measured that way. And that is for data only, not video or voice or anything. I have in my hand a 'licence free' Kenwood UBZ-LH68 10 milliwatt handy-talky and Ch 38 is 434.00 Mhz. No FCC data is provided. Andy Grudko (British), Grad I.S, South Africa Registered as a security service provider by the Private Security Industry Regulatory Authority, registration number 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time > > Another problem with using amateur frequecies is that many hams spend > all their waking hours listening for weak signals all around the > bands. The probability for intercept is very high. And, many amateur > frequencies are used as inputs to repeaters. 434 megacycles is the > input to one of the amateur repeaters in the LA basin. Transmit there > and you'll be sharing your signals with thousands of hobbyists over > several hundred square miles. It's happened, and the hams have had to > DF 'surveillance' transmitters used to monitor a parking lot. > > In two different cases I've had, one LE agency using spy shop stuff > got into the TV system in a hotel where they were working, and anyone > on the proper channel in any hotel room could watch the surveillance > in another room in the hotel. > > In another, at El Dorado airport in Bogota, the military was using > some wireless video purchased from a spy shop and got into the video > system of the entire airport. Their surveillance was seen on many > many video monitors throughout the airport, for the few minutes > before they discovered it and shut it down. > > With equipment most of us would have, it would be extremely difficult > to intercept a properly done LE video surveillance. Virtually all of > it is at microwave, you need to be in the path or very close, and > more and more of it is being encrypted. > > So, in a different way, you uncovered an illegal surveillance. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 7155 From: Date: Wed Apr 2, 2003 0:33pm Subject: Bell Atlantic Employee Pleads Guilty to Leaking Information on Wiretap Former Bell Atlantic Employee Pleads Guilty to Leaking Information on Wiretap Investigations, Reports U.S. Attorney BOSTON, Mass., April 2 /PRNewswire/ -- A Weymouth man pleaded guilty yesterday in federal court to leaking wiretap information to bookies in exchange for relief from his gambling debts while he was an employee of Bell Atlantic. United States Attorney Michael J. Sullivan; Special Department of Justice Prosecutor John H. Durham; Federal Bureau of Investigation Inspector Gary M. Bald; and Colonel Thomas J. Foley, Superintendent of the Massachusetts State Police, announced that RICHARD H. O'BRIEN, age 66, of 79 Donald Street, Weymouth, Massachusetts, pleaded guilty yesterday before Senior U.S. District Judge Morris E. Lasker to a one count Information charging him with obstruction of justice. At yesterday's plea hearing, the prosecutor told the Court that had the case proceeded to trial, the evidence would have proven that O'BRIEN was employed as a Network Operations Manager at Bell Atlantic telephone company located in Taunton, Massachusetts. In the regular course of its business, Bell Atlantic would receive sealed court orders directing that it assist law enforcement agencies in their efforts to carry out lawful orders authorizing wiretaps and pen registers. O'BRIEN, through his position at Bell Atlantic, had access to, and knowledge of, these court ordered wiretaps and pen registers. Between January and August of 1999, O'BRIEN, in exchange for cash payments and other debt relief, disclosed to bookies who were targets of investigations being conducted by the FBI and the Massachusetts State Police, information concerning wiretaps and pen registers that had been in sealed court orders served on Bell Atlantic. Bell Atlantic terminated O'BRIEN on September 1, 1999. Judge Lasker scheduled sentencing for June 24, 2003 at 2:15pm. O'BRIEN faces a maximum sentence of 5 years in prison, to be followed by 3 years of supervised release and a fine of up to $250,000. The case is part of an ongoing investigation by the Justice Task Force which is comprised of federal prosecutors and members of the FBI who have no current or prior ties to the Boston area. The Task Force is under the direction of Special Assistant U.S. Attorney John Durham and FBI Inspector Gary Bald and was formed in January, 1999, in response to the recommendations of the former U.S. Attorney and FBI Special Agent in Charge. The case was prosecuted by Special Assistant U.S. Attorneys John H. Durham and Cynthia Shepherd. SOURCE U.S. Attorney CO: U.S. Attorney ST: Massachusetts SU: LAW http://www.prnewswire.com 04/02/2003 17:59 EST [Non-text portions of this message have been removed] 7156 From: A.Lizard Date: Wed Apr 2, 2003 7:49pm Subject: RE: Useful conversion chart At 10:43 PM 4/2/03 +0000, you wrote: >Message: 2 > Date: Tue, 01 Apr 2003 20:38:31 -0500 > From: "Steve Uhrig" >Subject: RE: Useful conversion chart > >On 1 Apr 2003 at 16:51, Robert Dyk wrote: > > > Been looking for this for years, my slide rule is almost worn out > > doing this conversion manually... > >Yeah, My $2 Pickett bamboo slide rule from college is nearly gone >too. When my dad dies, I inherit his aluminum Pickett. Luckily for me, the TI-30 hit the market just as I was starting to learn slide rule. I now wish I hadn't done the obvious thing and disposed of my cheapo plastic slide rule, most kids have never seen one before. >I to this day keep a circular slide rule in my truck for calculating >gas mileage. > >My $2 Pickett does cubes and cube roots. I've never seen a calculator >which does that. There's an nth root function on most "slide rule" calculators, where n=3, your cube root problem is solved. For instance, on the Windows scientific calculator, enter the number, click the Inverse function, then hit the X^3 key. > > BTW has anyone seen something similar to convert VA to Watts? > >It's not a direct conversion unless the load is purely resistive. > >Add any reactance and you get into Power Factor. Look it up. Power >factor of 1 is pure resistive load. Any reactance lowers the power >factor below 1, and you multiply by that fraction to get the true >rating. A typical example would be a PF of 0.7 for something like a >refrigerator. > >It annoys me that UPS systems are rated in VA rather than watts. I >suppose technically it's more precise, but I believe it is more an >advertising ploy than anything else. My 2200 VA UPS on the phone >system here, video, alarms, network hub, etc. is rated at 1600 watts >or 2200 VA. I guess they pick some arbitrary figure for power factor. > >Steve VA is at least technically the right unit for a UPS, power factor *is* relevant, switching power supplies for PCs are decidedly reactive loads, some more so than others. Laser printers are so far from being resistive loads that UPS manufacturers generally will tell users *NOT* to connect laser printers to them unless they are specifically rated for that service. So my laser printer is simply plugged into a surge protector (Tripp-Lite, I'm paranoid :-)) next to the plug for the UPS that powers the rest of my setup. A.Lizard ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -Benjamin Franklin, Historical Review of Pennsylvania, 1753 Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... PGP 8.0 key available by request,keyserver,or on my Web site Download PGP from http://www.pgpi.org for e-mail privacy. PGPfone v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ Disaster prep info: http://www.ecis.com/~alizard/y2k.html ************************************************************************ 7157 From: A Grudko Date: Thu Apr 3, 2003 3:47am Subject: Re: RE: Useful conversion chart - Original Message ----- From: A.Lizard > Luckily for me, the TI-30 hit the market just as I was starting to learn slide rule. > I now wish I hadn't done the obvious thing and disposed of my cheapo plastic slide rule, most kids have never seen one before. I still have 2 and am tempted to put them in bank safety deposit boxes for my kids to inherit as part of a lost era. Andy Grudko (British), Grad I.S, South Africa Registered as a security service provider by the Private Security Industry Regulatory Authority, registration number 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 7158 From: Matt Paulsen Date: Thu Apr 3, 2003 7:39pm Subject: RE: Membership Warning I guess he'll will now 'sue' cryptome.. be prepared for more spam with more copyright than you can stand in your inbox.. http://cryptome.org/threats/iam-threat.htm - Original Message - > There is a convicted felon, and con artist in Tampa, Florida who has been spoofing email to members of this list, claiming that my website is going down 7159 From: Date: Thu Apr 3, 2003 8:46pm Subject: Re: Membership Warning In a message dated 4/3/2003 6:08:29 PM Pacific Standard Time, mpaulsen6@a... writes: > http://cryptome.org/threats/iam-threat.htm and His truth goes marching on! [Non-text portions of this message have been removed] 7160 From: kondrak Date: Fri Apr 4, 2003 2:43am Subject: Re: Membership Warning I'm just surprised this guy hasn't met some..er..."unfortunate" circumstances to change his karma for good..... Apparently he has a historically long record of abusing people, (and apparently we on this list are not spared his lunatic rantings).. I wouldn't be surprised if he met some rather unfortunate luck. One day, he's going to abuse the wrong person, someone, who takes great umbrage at his actions and the only way we will know he's been dealt with, is by his lack of presence in the future. "The Internet provides a method that enables both the intelligentsia and the brain rotted can make their views known..." -Anon > > http://cryptome.org/threats/iam-threat.htm > >and His truth goes marching on! > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7161 From: James M. Atkinson Date: Fri Apr 4, 2003 2:00am Subject: RE: Membership Warning At 5:39 PM -0800 4/3/03, Matt Paulsen wrote: >I guess he'll will now 'sue' cryptome.. be prepared for more spam with more >copyright than you can stand in your inbox.. >http://cryptome.org/threats/iam-threat.htm > >- Original Message - >> There is a convicted felon, and con artist in Tampa, Florida who has been >spoofing email to members of this list, claiming that my website is going >down But if the watchman see the sword come, and blow not the trumpet, and the people be not warned; if the sword come, and take any person from among them, he is taken away in his iniquity; but his blood will I require at the watchman's hand. -Ezekiel 33:6 -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7162 From: Ocean Group - MU TSD Date: Thu Apr 3, 2003 6:35pm Subject: Re: RE: Useful conversion chart The last person I saw with a slide rule was a lecturer showing how to do frequency response graphs for bode plots! I promptly pocketed one before they became like a dodo! Mine was a TI-30xa....how young am I!?! Cheers Oisin 7163 From: Date: Thu Apr 3, 2003 8:55pm Subject: Demtec TEST Please ignore this is a test some of my postings are not making it ???????? TSCM [Technical Surveillance and Countermeasures] David McGauley Demtec Electronic Surveillance and Counter Measures Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L39 0HF UK 01695 558544 07866206112 demtec@a... www.demtec.co.uk [under construction] The manufacture and installation of custom made covert electronic audio and video devices Professional physical and electronic counter measures [sweep] services. Note: any fellow UKPIN members welcome to call in to discuss applications. Workshop located alongside the M58 junc 3 [Non-text portions of this message have been removed] 7164 From: Michael Puchol Date: Fri Apr 4, 2003 3:52am Subject: Re: Membership Warning I've just been reading some of the stuff on this guy's site (which from the spelling alone suggests he's not a rocket scientist), and it seems clear that he's simply delusional. A few quotes, "You were warned about copying any image, text or files with out permission! Now your hard drive has told everything! Do you see it spinning? Do you know what it is doing? It will spin whenever it is told too, and it could spin until you remove the images or text. If you have more than 2 of these images, you may be in trouble. Copyright violations are a serious offense and you could learn just how serious this offense is, in a short time. Remove the images now or ? Ever heard of Object Embedded Source Code? You are going to love it!" (Found in some form of copyright warning) Er...so anyone who visits his site is inmediately infected by this drive-spinning anti-copying embedded code, right? I mean, all the images are stored in the web browser's local cache, unless otherwise configured, so.....I've never heard of OESC, since it doesn't exist - you cannot embed code in an image - you can hide code with stegano, watermark it, etc. but you simply CANNOT stick code in a JPG that will magically be run in the viewer's computer. "Safe Nuclear Power, Nature Safe Chemicals, Technical Surveillance and Countermeasures, Free Range Beef and Poultry Meats, Childrens Programing, Snack Foods,Organic Herbs and Speciality Video's & Books" Man, these guys will take over Microsoft & Amazon one of these days! Finally, the fact that they have an extensive links page to information about illegal interception, monitoring, cracking, warez, and other unsavoury activities is not very reassuring to potential costumers of this ¸bersecurity company. Cheers, Mike ----- Original Message ----- From: "kondrak" To: Sent: Friday, April 04, 2003 10:43 AM Subject: Re: [TSCM-L] Membership Warning > I'm just surprised this guy hasn't met some..er..."unfortunate" > circumstances to change his karma for good..... > Apparently he has a historically long record of abusing people, (and > apparently we on this list are not spared his lunatic rantings).. I > wouldn't be surprised if he met some rather unfortunate luck. > One day, he's going to abuse the wrong person, someone, who takes great > umbrage at his actions and the only way we will know he's been dealt with, > is by his lack of presence in the future. > > "The Internet provides a method that enables both the intelligentsia and > the brain > rotted can make their views known..." -Anon > > > > > > > http://cryptome.org/threats/iam-threat.htm > > > >and His truth goes marching on! > > > > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > > > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 7165 From: Matt Paulsen Date: Fri Apr 4, 2003 10:05am Subject: RE: Re: RE: Useful conversion chart I had one in the 4th grade.. -----Original Message----- From: Ocean Group - MU TSD [mailto:inertia@o...] Sent: Thursday, April 03, 2003 4:36 PM To: TSCM Group Subject: [TSCM-L] Re: RE: Useful conversion chart The last person I saw with a slide rule was a lecturer showing how to do frequency response graphs for bode plots! I promptly pocketed one before they became like a dodo! Mine was a TI-30xa....how young am I!?! Cheers Oisin ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7166 From: Matt Paulsen Date: Fri Apr 4, 2003 10:04am Subject: RE: Membership Warning "Technical Surveillance and Countermeasures, Free Range Beef and Poultry Meats" We have a tire dealership that gives away free beef with the purchase of 4 new tires. I think the crazy is onto something.. Hey JMA.. when are you going to give away free beef with a sweep? :) 7167 From: A Grudko Date: Fri Apr 4, 2003 1:14pm Subject: Scanlock ECM Has anyone out there got an operators manual for the Scanlock ECM that could be faxed/eMailed to me? Andy Grudko (British), Grad I.S, South Africa Registered as a security service provider by the Private Security Industry Regulatory Authority, registration number 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 7168 From: Date: Fri Apr 4, 2003 10:58am Subject: Rif: Useful conversion chart > A way for us to convert from cycles per second to Hertz. > http://brainerdham.org/Tips/CPS_to_Hz_conversion.html Odd, that nobody commented on the april-foolishness of the conversion and the diagram (and the date you sent it). When I was a chemical engineering student at the Milano Politecnico, I had two calculators: a 10-inch "desktop" model, for the heavy work, when a higher precision was needed, an a half-size "pocket" model, for the quick and dirty shots. I got my degree in 1969.... Ciao! Remo 7169 From: refmon Date: Fri Apr 4, 2003 3:34pm Subject: Re: Membership Warning Hi, John Collins here. While I am not a licensed investigator, I have had to wrestle with this sort of thing many times. This felonious fraudulator is one of a few subjects I can comment on with some level of real knowledge, having dealt with the underlying maladjustments (to put it mildly) in personal and corporate situations. To put it in short form, all the discussion and public reaction, etc is contributing to keeping this guy afloat...he is all about the drama and controversy and drawing others into the emotional cyclone. This is an incredibly "convenient" malady for he who has it-all the symptoms are self-validating and all who are critical of the individual are automatically liars and frauds (again, in his mind). The more drawn into the drama or crisis everyone becomes, the more empowered (in his own mind) he becomes, and resultantly, the more in your face. As has been pointed out, at some point he may cross the wrong person, but it's not likely. In my experience, this sort of individual is eerily skilled at reading potential victims at a glance, has a chameleon-like presence, and walks the line just short of soliciting a violent or otherwise decisive reaction...thus, the low/mid level, constant, yammering and not-quite-worth-it legal violations. In the rare situation where he may get caught, convicted and slammered, he's a victim, he resets, and comes out even more righteous and "insightful". I'd predict that if everyone stopped reacting to the guy that he will attempt several times to create new dramas...getting no reaction, he will move on to other grazing grounds or simply fall apart. The problem remains that he moves on to other victims...those who serve to protect those victims don't get to walk away... I have had to work with mental health professionals who find this sort of personality disorder so draining that they must self-counsel within their own local groups in order to avoid fast burnout. The biggest mistake I have seen made with people like this is trying to use conventional enforcement or treatment modes...they do not respond in a constructive way. Corporate HR and Security departments usually don't seem to recognize this...there is no way that current policy established by a corporation of healthy people would even remotely apply to such an individual. Likewise, most normal, well meaning people are not equipped to spot and/or deal with such an individual. Just two cents worth from a battle worn corporate manager and father. good luck & best regards John Collins _______________________________________________________ ----- Original Message ----- From: "James M. Atkinson" To: "TSCM-L Mailing List" Sent: Friday, April 04, 2003 12:00 AM Subject: RE: [TSCM-L] Membership Warning > At 5:39 PM -0800 4/3/03, Matt Paulsen wrote: > >I guess he'll will now 'sue' cryptome.. be prepared for more spam with more > >copyright than you can stand in your inbox.. > >http://cryptome.org/threats/iam-threat.htm > > > >- Original Message - > >> There is a convicted felon, and con artist in Tampa, Florida who has been > >spoofing email to members of this list, claiming that my website is going > >down > > > > But if the watchman see the sword come, and blow not > the trumpet, and the people be not warned; if the > sword come, and take any person from among them, he > is taken away in his iniquity; but his blood will I > require at the watchman's hand. -Ezekiel 33:6 > > -jma > -- > > -------------------------------------------------------------------------- ------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------- ------------------------ > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > -------------------------------------------------------------------------- ------------------------ > Vocatus atque non vocatus deus aderit > -------------------------------------------------------------------------- ------------------------ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 7170 From: James M. Atkinson Date: Sat Apr 5, 2003 9:53am Subject: GPS Tracking Systems I need to purchase 25-30 GPS tracking systems for use on my own vehicles. The units will be installed in large heavy trucks, and the tracking data must be accessible via the net on a web page in the form of a map. Also, when the vehicles are moved, is moving, or when an covert security alarm is activated I need the service provider to maintain a detailed history of the truck movement. I'll arrange for installation on this end, so I am basically just looking for the black boxes, and a recommendation on a tracking service provider. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7171 From: Mitch D Date: Sat Apr 5, 2003 1:16pm Subject: Bad American (Off Topic humor) YES, I'M A BAD AMERICAN by George Carlin I Am Your Worst Nightmare. I am a BAD American. I am George Carlin. I believe the money I make belongs to me and my family, not some mid level governmental functionary be it Democratic or Republican! I'm in touch with my feelings and I like it that way, damn it! I think owning a gun doesn't make you a killer, it makes you a smart American. I think being a minority does not make you noble or victimized, and does not entitle you to anything, you don't work for! I believe that if you are selling me a Big Mac, try to do it in English. And if you are a citizen of the United States start speaking the language. I think fireworks should be legal on the 4th of July. I think that being a student doesn't give you any more enlightenment than working at Blockbuster. In fact, if your parents are footing the bill to put your pansy ass through 4 years plus, of college, you haven't begun to be enlightened. I believe everyone has a right to pray to his or her God when and where they want to. My heroes are John Wayne, Babe Ruth, Roy Rogers, and whoever canceled Jerry Springer. I don't hate the rich. I don't pity the poor. I know wrestling is fake and I don't waste my time arguing about it. I think global warming is a big lie. Where are all those experts now, when I'm freezing my ass off during these long winters and paying, paying, paying? I've never owned a slave, or was a slave, I didn't wander forty years In the desert after getting chased out of Egypt. I haven't burned any witches or been persecuted by the Turks and neither have you! So, shut-the-Hell-up already. I want to know which church is it exactly where the Reverend Jesse Jackson practices, which branch of the Government he gets his money, and why he is always part of the problem and not the solution. Can I get an AMEN on that one? I think the cops have every right to shoot your sorry ass if you're running from them. I also think they have the right to pull your ass over if you're breaking the law, regardless of what color you are. I think if you are too stupid to know how a ballot works, I don't want you deciding who should be running the most powerful nation in the world for the next four years. I dislike those people standing in the intersections trying to sell me crap or trying to guilt me into making "donations" to their cause. These people should be targets. I believe that it doesn't take a village to raise a child, it takes two parents, a married man and woman. I believe if she has her lips on your Willie, it's sex, and this applies even if you are President of the United States. And what the hell is going on with gas prices... again? If this makes me a BAD American, then yes, I'm a BAD American. If you are a BAD American too, please forward this to everyone you know. We need our country back! __________________________________________________ Do you Yahoo!? Yahoo! Tax Center - File online, calculators, forms, and more http://tax.yahoo.com 7172 From: kondrak Date: Sat Apr 5, 2003 3:19pm Subject: Re: Rif: Useful conversion chart Ok, if we're trotting out old calculators stories... (grin) I've still got the first one I bought, and still use it daily. It's a Texas Instruments SR-10. I paid $40 for it, and that was I think 1970 or 71. When I bought it, I had the option (for that amount of money) or either a calculator that did scientific notation, or one with a memory. I opted for the scientific notation, as for me, easily getting .0005% of a 472 mhz signal was more important that a bit of flash memory that held a value for a while. That was back in high school, and I made the right choice. Its still used in the radio end of my work almost every day. I can say its been worth the $40, though for that money today, you can get a super-whizbang calculator that you cant even figure out how to program, its so complicated. >When I was a chemical engineering student at the Milano Politecnico, >I had two calculators: a 10-inch "desktop" model, for the heavy work, >when a higher precision was needed, an a half-size "pocket" model, >for the quick and dirty shots. I got my degree in 1969.... From: James M. Atkinson, Comm-Eng Date: Wed Apr 4, 2001 3:03pm Subject: Here are a few of my favorite things... Well, it looks like we have some interest in developing this topic a bit further: Several dozen list members have approach me and suggest that we collectively develop a few dozen "angst issues" and then explore each in detail. What follows are a few of my own observations, and I would encourage others to add their own so that we may all benefit (or at least be amused). It will show the less glamorous side of our business, and perhaps relate some of the real-world issues that we have to deal with. It is an enhanced version of the little rant that I did a few days ago Please consider it to be humorous in nature, and feel free to add some of your own. Jim's "Angst Issues" (song to the tune of "Here are a few of my favorite things...") It's up at 4 am, drive 90 minutes to a clients site, then spend an hour unloading 2 tons of laboratory grade gear on site. Of course the customer forgot to mention that the loading dock is 1500 feet away from the office you will be sweeping, and for an added bonus the elevators are down so you also have to drag all of your equipment up 12 flights of stairs. Spend the next 16 hours using equipment to climb around every nook and cranny of the clients location where you may or may not find a bug, and in doing so you will succeed in tearing a hole in the $75 dollar pair of suit pants you just bought. Then repack and reload the 2 tons of equipment back on the truck, and drive back to the office, type up the report so you can get it to the client in the morning when they arrive at the office. If your lucky sneak in 3-4 hours of sleep before getting to repeat to whole thing the next morning. Climbing up and down a 12 foot ladder 240 times in one day to move ceiling tiles and check out lighting fixtures. Of course during this whole thing your back will spasm up and go out on you while unloading the truck (thank heavens for bottle of Aleve, and Zantac, and Pepto Bismol I have in my kit). God bless the clients employees and.or contractors who will try to steal your laptop or briefcase if you give then half a chance, and of course let's not forget about the guys who will try to swipe your hand held oscilloscope or even your OSCOR. Finding out that your clients site is 300 yards away from a multi-megawatt VHF TV station, and that you left all of your band reject filters back at the office. The CEO of the Fortune 500 company who seemed rational but who turns into Charles Manson, and starts ranting about the DEA trying to poison him, the CIA has implanted a tracking device in his neck, the FBI stalking him, and that aliens have just scheduled him for another abduction and proctologic examination. The PI who brought you in plants a little spy shop device to be found during the sweep as he believes (in error) that this will ensure future work for him. The client who actually planted a bug (or bugs) in his own office to see if your any good at finding such threats, and who is then surprised when you tell him in graphic detail where he can stick the thing. The client who bugs his own office (which you find) and tries to play the "victim game" for political or legal reasons, or who simply does it to get attention. The head of security who wants you to tap some phones, install some video cameras, and fix his security system which his brother in-law installed (and has never worked right). Security and/or CCTV that got installed by low bidders who had no idea what they are doing (and your biting your tongue). The clients accounting department still hasn't paid for the last sweep, and you just found out that the advance retainer check they gave you for this sweep just bounced. The bloody power just went out knocking out your laptop, causing acrid smoke to start rising out of your microwave spectrum analyzer. Plus in the darkness you tripped on a RG-214 cable causing your rather costly low noise microwave amplifier and feed horn to come crashing to the floor. CEO's that want a sweep just to make themselves feel important and who want you to show up wearing a green lab coat and a shoulder holster (just like the last guys who swept his office last week). PI's who want to talk about sweeps ( just to make themselves feel important), and who promise you the moon-an-the-stars but for some reason they don't deliver. Attorneys who only want to pay you if you find something, and who want to play the little "nudge-nudge, wink-wink" game. Add to this the attorneys who try to bribe you to testify as an expert witness, and offer you a fortune if you agree to lie on the witness stand for them. Anti-government and conspiracy nut types who start ranting about black helicopters, NATO storm troopers hiding in the bushes, road maps on the backs of road signs, chemicals in the drinking water, and so on, and so on, ad nauseam. You find out that the vetted "security consultant" or PI with references who brought you in is actually a convicted felon and con artist using a false name, and that neither you or the client knew this until the sweep was already scheduled. Then you find out that the guy has multiple outstanding arrest warrants under his real name, and that he is pissed as the police popped him on the outstanding warrants (thanks to you). The self appointed TSCM expert who you just talked to brags about making a million dollars a years, by himself, with only an OSCOR. Delusionary mental patients working for a major company (usually in senior management) who were perfectly lucid on when you spoke to them phone, and perfectly sane when you initially visited their office. But as soon as you show up with your gear, and don't find the "multipurpose CIA mind control and harassment transmitter" they strip down to their underwear climb up on their conference room table with a Samurai sword and start screaming that they are going to commit ritual suicide to make the little voices stop. Bleeding edge instruments that are finicky, or refuse to power up after being bounced around one time too many in the back of the truck. TSCM equipment that was grossly misrepresented by the manufacture and is in fact deafer then Beethoven (and about as useful on a sweep). Test equipment that you sent out for a routine calibration that should have been back 6 weeks ago, and every time you call the check on it nobody can find the unit or tells you that it is awaiting parts. Power cords, you can never have enough power cords. Antenna cables that are exactly three inches too short. Rot gut coffee that could lift the chrome off a bumper, add to that no lunch (not counting the two stale donuts), and ulcers that start to act up from a combination of stress and bad coffee. Did I mention yet that Zantac and Pepto is a good thing. People with attitudes who are more interested in playing little corporate or government power games, and don't really need a sweep at all. Completely bullshit ads for low end "bug detectors" marketed towards PI's that claim that they can make $250 per hour doing sweeps. People who write books and articles about TSCM, but who are actually just plagiarizing the work of others. Government agencies that think that just because they're government agency they automatically get payment terms... oh plus they want a discount, plus they want to put it out to bid, plus they want you to fill out 50 pages of paperwork, and so on, and so on, and so on. Mental patients calling six times a day who think that you are a combination psychologist, minister, therapist, psychiatrist, ghost-buster, brain surgeon, hearing doctor, pharmacist, and confessor (the bells, the bells, the bells, the bells, the bells, the bells... ) Power cords, did I mention that you can never have enough power cords. Fogged up Xray film Processing chemicals for the X-ray film that leak thus burning your arm and eating a hole in your pants. NLJD getting false hits causing you to a half hour checking out the beer can someone dropped inside the wall cavities during construction. Phones that aren't wired right, I mean really... have these people ever heard about cable pairing and color codes. Phone rooms that are not locked, and ones that are a pig sty. All of the Argon leaking out of the thermal imager due to a faulty valve, and your backup bottle is also bad. The Polaroid film for the instant camera you brought is for your other instant camera The client doesn't have blueprints he can send you for the area he want swept, can't get you into the building in advance, but he wants a flat rate for the sweep (which will of course be more then that charged by the local PI he has been using in the past). Firewalls with default password, computers with wide open guest privileges, and wireless networks that let the high school kid a mile away tie into the corporate LAN. Locks, dead latches, hinges, and door frames that never work the right way, and the client expects YOU to fix it. Everybody trying to get you to work for free. Customers who know the price of everything, but the value of nothing Client who try to shoot the messenger Cheap bastards who come up with "gee, I can get my brother-in-law who used to work for the FBI to do it for 300 bucks, so why should I pay you five grand". Neophytes with no background in the business who want to come apprentice with you. Ex-government TSCMers who have minimal equipment if any, no technical background, and minimal technical training but who insist that they can offer legitimate TSCM service just based on a six week DASE course they took 10 years ago. Governmental agencies continually telling you that "it's not their responsibility or jurisdiction". A big corporate client who just bought a broadband diode detector system from some New York spy shop for a quarter million dollars and has convinced himself that his office is riddled with bugs (but who gets pissed at you for telling him that his equipment is of minimal value, and that his office is free of bugs). ... and that is just the first part, I would rant for days.... -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2853 From: James M. Atkinson, Comm-Eng Date: Wed Apr 4, 2001 3:12pm Subject: More flaws found in wireless LAN protocol More flaws found in wireless LAN protocol By Dennis Fisher, eWEEK April 3, 2001 2:15 PM PT URL: A University of Maryland research team said Tuesday that it had identified several more security flaws in the much-maligned 802.11 wireless LAN protocol. Earlier this year, researchers at the University of California at Berkeley discovered several vulnerabilities in the encryption protocol used on wireless LANs. "When you combine this with the stuff that the Berkeley guys found, it pretty much covers all of the security in these wireless access points," said William Arbaugh, assistant professor of computer science at the University of Maryland in College Park. The latest problems have to do with the way the protocol handles access control and authorization requests. Arbaugh said finding the problems was "exceedingly easy" and that exploiting them was trivial. Potentially the most serious of the three flaws is a hole that allows an eavesdropper to sniff the name of the network -- which is used as a shared secret for authentication purposes in some 802.11 implementations, including the Lucent Technologies Inc. Orinoco cards that Arbaugh's team used -- and then use the information to access the network. This would be prevented by the WEP (Wireless Equivalent Privacy) encryption used in 802.11, but the messages containing the network name are always broadcast in cleartext, Arbaugh said. The team also identified a problem with the MAC (media access control) addresses used on wireless LAN cards. Like the network name, MAC addresses are broadcast in cleartext and can therefore be easily captured by an eavesdropper. The attacker can then program the address onto his or her card and access the network. The final attack involves capturing via eavesdropping the plaintext and ciphertext of the shared keys used for authentication. Using this information, an attacker can compute the valid authentication response and then compute a new integrity check value using another known exploit and join the network. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2854 From: Miguel Puchol Date: Wed Apr 4, 2001 3:27pm Subject: RE: More flaws found in wireless LAN protocol We were about to order a 3Com Starter Pack (access point + 3 PCCard units) for our non-secure PCs at the office....maybe we'll rethink this one. If we finally do order it, I'll try a few tricks and post back the results. All the best, Mike > -----Mensaje original----- > De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] > Enviado el: miercoles, 04 de abril de 2001 22:12 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] More flaws found in wireless LAN protocol > > > > More flaws found in wireless LAN protocol > By Dennis Fisher, eWEEK > April 3, 2001 2:15 PM PT > URL: > > A University of Maryland research team said Tuesday that it had > identified several more security flaws in the much-maligned 802.11 > wireless LAN protocol. > > Earlier this year, researchers at the University of California at > Berkeley discovered several vulnerabilities in the encryption > protocol used on wireless LANs. > > "When you combine this with the stuff that the Berkeley guys found, > it pretty much covers all of the security in these wireless access > points," said William Arbaugh, assistant professor of computer > science at the University of Maryland in College Park. > > The latest problems have to do with the way the protocol handles > access control and authorization requests. Arbaugh said finding the > problems was "exceedingly easy" and that exploiting them was trivial. > > Potentially the most serious of the three flaws is a hole that allows > an eavesdropper to sniff the name of the network -- which is used as > a shared secret for authentication purposes in some 802.11 > implementations, including the Lucent Technologies Inc. Orinoco cards > that Arbaugh's team used -- and then use the information to access > the network. > > This would be prevented by the WEP (Wireless Equivalent Privacy) > encryption used in 802.11, but the messages containing the network > name are always broadcast in cleartext, Arbaugh said. > > The team also identified a problem with the MAC (media access > control) addresses used on wireless LAN cards. Like the network name, > MAC addresses are broadcast in cleartext and can therefore be easily > captured by an eavesdropper. The attacker can then program the > address onto his or her card and access the network. > > The final attack involves capturing via eavesdropping the plaintext > and ciphertext of the shared keys used for authentication. Using this > information, an attacker can compute the valid authentication > response and then compute a new integrity check value using another > known exploit and join the network. > -- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 2855 From: Marcelrf Date: Tue Apr 3, 2001 9:05pm Subject: Re: Caller ID Question I built a caller ID generator years ago for a project.........It was nothing high-tech. It can be done........... "James M. Atkinson, Comm-Eng" wrote: > I would first suspect that it is a hoax, and that the information he > has was fabricated and then documented so as to give the guy some > "evidence" to wave around. > > After disproving the hoax possibility, it could be a case where > someone from the bank simply called to talk to him, he saw the > number and flipped out. > > Third, it could just be a screw up on the part of the CO. > > -jma > > At 4:12 PM -0500 4/3/01, Martin wrote: > > I received a call from a client who described the following > >circumstances that > >I thought I would get your collective thoughts on: > > > > An individual is in litigation with an area bank. He reports, and > >has a photo to > >prove, that he found on his cordless instrument's caller ID the name of > >the bank that > >he is opposed to in court and his own telephone number. Of course, he > >is insisting that his telephone is being monitored by this bank, which > >is silly, but if what he says is true, it really doesn't make > >sense...unless it was some sort of glitch at the > >exchange and just happened to coincidently, be his opposition in court. > > > >Anyone have any ideas? > > > >Martin Brown > >Brown & Sikes, Inc. > >Dallas, Texas > > -- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 2856 From: Scott Malcolm Date: Wed Apr 4, 2001 1:59pm Subject: Re: Digest Number 555 TSCM-L@yahoogroups.com wrote: > Message: 1 > Date: Mon, 2 Apr 2001 16:52:13 +1200 > From: "Craig Meldrum" > Subject: TSCM in Hong Kong > > This is my first posting to this group although I have been monitoring it > for a couple of weeks. I am interetsde in hearing from anybody who has had > experience in carrying out an international TSCM job in Hong Kong. > > I would appreciate a direct contact via email to craig@s... > > Thanks > Craig Dear Craig and List, I have never worked with the people at the below site. From looking at their CV's I would think they might have an answer to your question or give you a lead. http://www.asiapi.com/ http://www.asiapi.com/profile.html Regards, Scott Malcolm Malcolm & Associates,Inc. Serving the State of Wisconsin http://www.execpc.com/~conf-pi Office 262 965 4426 / Fax 262 965 4629 2857 From: Craig Meldrum Date: Wed Apr 4, 2001 4:22pm Subject: TSCM in Hong Kong A quick note to thank all those people who responded to my query on this matter, I have been overwhelmed and have now satisfied my requirements. Thank you Craig =============================== Craig Meldrum, Managing Director Communications Security Ltd PO Box 8314, Symonds St Auckland, New Zealand Ph: 64-9-3093386 Fax: 64-9-3021148 =============================== 2858 From: Date: Wed Apr 4, 2001 9:48pm Subject: TSCM in Hong Kong I did a TSCM in Mexico City. The biggest problem was when we came back to LA and went thru US Customs. They wanted us to prove that the equipment was purchased in the US and went with us and was not purchesed in Mexico or some other country. We did not have any trouble getting into or out of Mexico. We were more than a little nervous about leaving the equipment in the hotel room while we went to eat. But, no problem. There is a customs form which can be filled out listing your equipment and identifying serial number. They stamp it when you leave and then you're back in without any trouble. Secondly, hand carry the delicate (and expensive) stuff. When I went to HK (without any equipment) the customs/immigration officer saw my old business card/name tag on my bags, ask if I had any ID proving I used to work for the feds, and said "enjoy your stay". Carl Carl A. Larsen, Jr. Larsen and Associates Private Investigations, PI-14282 Post Office Box 247 Carmichael, California, 95609 916-973-0515, fax 916-486-2735 2859 From: A Grudko Date: Wed Apr 4, 2001 3:31pm Subject: A bit off topic : Solar activity Geepers, have I noticed the interuption of RF services since the Monday night event, and we were ba. Even today the tail of our high band business VHF FM repeater is pure noise, probably 6 - 10 db up. We lost some Europe based Sat. TV pictures and raised noise levels were noticeable on every frequency we monitor, from 27 megs to 1.2 Gigs, in broadband bursts of uo to 2 seconds. Subjectively, I'd say I've have had more GSM cellular dropped calls than ever before. An interesting RF event - we try to find 5 milliwatt devices. How many billion gigawatts per hour was this? I think even Austin Powers could have ID'd this TX. Andy Grudko Johannesburg 2860 From: James M. Atkinson, Comm-Eng Date: Thu Apr 5, 2001 9:46am Subject: Don't you dare === Contempt === A small town prosecuting attorney called his first witness to the stand in a trial-a grandmotherly, elderly woman. He approached her and asked, "Mrs. Jones, do you know me?" She responded, "Why, yes, I do know you Mr. Williams. I've known you since you were a young boy. And frankly, you've been a big disappointment to me. You lie, you cheat on your wife, you manipulate people and talk about them behind their backs. You think you're a rising big shot when you haven't the brains to realize you never will amount to anything more than a two-bit paper pusher. Yes, I know you." The lawyer was stunned. Not knowing what else to do he pointed across the room and asked, "Mrs. Williams, do you know the defense attorney?" She again replied, "Why, yes I do. I've known Mr. Bradley since he was a youngster, too. I used to baby-sit him for his parents. And he, too, has been a real disappointment to me. He's lazy, bigoted, he has a drinking problem. The man can't build a normal relationship with anyone and his law practice is one of the shoddiest in the entire state. Yes, I know him." At this point, the judge rapped the courtroom to silence and called both counselors to the bench. In a very quiet voice, he said with menace, "If either of you asks your mother if she knows me, you'll be jailed for contempt!" -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2861 From: James M. Atkinson, Comm-Eng Date: Thu Apr 5, 2001 9:49am Subject: Hell Bound Lawyer The lawyer is standing at the gate to Heaven and St. Peter is listing his sins: 1) Defending a large corporation in a pollution suit where he knew they were guilty. 2) Defending an obviously guilty murderer because the fee was high. 3) Overcharging fees to many clients. 4) Prosecuting an innocent woman because a scapegoat was needed in a controversial case. ...And the list goes on for quite awhile. The lawyer objects and begins to argue his case. He admits all these things, but argues, "Wait, I've done some charity in my life also." St. Peter looks in his book and says,"Yes, I see. Once you gave a dime to a panhandler and once you gave an extra nickel to the shoeshine boy, correct?" The lawyer gets a smug look on his face and replies, "Yes." St. Peter turns to the angel next to him and says, "Give this guy 15 cents and tell him to go to hell. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2862 From: Dawn Star Date: Thu Apr 5, 2001 10:37am Subject: Plants "The PI who brought you in plants a little spy shop device to be found during the sweep as he believes (in error) that this will ensure future work for him." The first time I swept a Vegas Casino in the early 70's, I arrived at the casino on Friday night to do the sweep on Saturday while the administration offices were quiet. They gave me a great room with a jumbo Jacuzzi. I ordered some champaign from room service and myself and my girl friend settled in for the night. After a while I got a bad feeling about the room so I busted out the sweep gear and in less than an hour I had three listening devices. The next morning when I was brought up to the top of the hotel to meet the president, he put his hand out to shake mine I put the devices in his hand. He smiled at me and laughed and that started some great gigs in Vegas. The story spread around the city grapevine. In those days there were no corporations running Vegas and it was wild and wide open. Later I got to see the surveillance room that monitored specific hotel suits. Now you know why if you start winning big the first thing they do is comp you a room! Roger Tolces, Electronic Security Co., Los Angeles 2863 From: Rob Muessel Date: Thu Apr 5, 2001 0:04pm Subject: Panic Buttons- off topic a bit One of my clients runs an executive protection detail. Thy are looking for several wireless "panic button" systems. They envision a system consisting of a small transmitter like a automotive remote unlocking ones that their principals can carry. As many as four body worn receivers would be required. Range is about 100 feet. Anyone know of any products that fit this application? -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 2864 From: Miguel Puchol Date: Thu Apr 5, 2001 1:12pm Subject: RE: Panic Buttons- off topic a bit Rob, We developed, a few years back, a home assistance system for the Red Cross, that consists of a collar with a small round device, that has a red button. When this button is pressed, a call is generated from the owner's telephone to the assistance center, and an ambulance/doctor dispatched. It should be very easy to modify it for portable use - i.e. portable transmitters and receivers. They operate in the 433MHz unlicensed band. Maybe it could help. How should these devices be worn? Belt mounted, for example? All the best, Mike > -----Mensaje original----- > De: Rob Muessel [mailto:rmuessel@t...] > Enviado el: jueves, 05 de abril de 2001 19:05 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] Panic Buttons- off topic a bit > > > One of my clients runs an executive protection detail. Thy are looking > for several wireless "panic button" systems. They envision a system > consisting of a small transmitter like a automotive remote unlocking > ones that their principals can carry. As many as four body worn > receivers would be required. Range is about 100 feet. > > Anyone know of any products that fit this application? > -- > Rob Muessel, Director email: rmuessel@t... > TSCM Technical Services Phone: 203-354-9040 > 11 Bayberry Lane Fax: 203-354-9041 > Norwalk, CT 06851 > USA > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 2865 From: James M. Atkinson, Comm-Eng Date: Thu Apr 5, 2001 1:24pm Subject: Re: Panic Buttons- off topic a bit At 1:04 PM -0400 4/5/01, Rob Muessel wrote: >One of my clients runs an executive protection detail. Thy are looking >for several wireless "panic button" systems. They envision a system >consisting of a small transmitter like a automotive remote unlocking >ones that their principals can carry. As many as four body worn >receivers would be required. Range is about 100 feet. > >Anyone know of any products that fit this application? >-- >Rob Muessel, Director email: rmuessel@t... >TSCM Technical Services Phone: 203-354-9040 >11 Bayberry Lane Fax: 203-354-9041 >Norwalk, CT 06851 >USA Car alarm key fob type transmitter at 300-315 MHz. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2866 From: Charles P Date: Thu Apr 5, 2001 8:28pm Subject: Re: Panic Buttons- off topic a bit Hi Rob, Almost all major alarm system brands have the key fob type transmitter that Jim mentioned. The function of the buttons is programmable and you can usually use multiple receivers. Just today I saw a wrist watch with buttons on it that Ademco makes for their panels, that caught my eye, I hadn't thought of it for personal protection but it should be good for that too. Also available are the "man-down" type transmitters that can initiate an alert if they turn from vertical to horizontal for a time period, you wear them on a belt and they also have pushbutton. The company that made the units I used to use are no longer in business (If you know anyone who wants a used system with no tech support, let me know), but I can dig up the info on others if that's what you had in mind. The standard alarm types would be easy to interface. We set up one system that triggers voice announcements over the two way radio. charles Charles Patterson charles@t... Global Communications Tarrytown, NY www.telephonesecurity.com www.avtele.com ----- Original Message ----- From: "Rob Muessel" To: "TSCM-L Mailing List" Sent: Thursday, April 05, 2001 1:04 PM Subject: [TSCM-L] Panic Buttons- off topic a bit > One of my clients runs an executive protection detail. Thy are looking > for several wireless "panic button" systems. They envision a system > consisting of a small transmitter like a automotive remote unlocking > ones that their principals can carry. As many as four body worn > receivers would be required. Range is about 100 feet. > > Anyone know of any products that fit this application? > -- > Rob Muessel, Director email: rmuessel@t... > TSCM Technical Services Phone: 203-354-9040 > 11 Bayberry Lane Fax: 203-354-9041 > Norwalk, CT 06851 > USA > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 2867 From: Steve Uhrig Date: Thu Apr 5, 2001 9:24pm Subject: Useful site to refer lunatics to who annoy you: http://zapatopi.net/afdb.html Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2868 From: James M. Atkinson, Comm-Eng Date: Thu Apr 5, 2001 9:32pm Subject: Re: Useful site At 10:24 PM -0400 4/5/01, Steve Uhrig wrote: >to refer lunatics to who annoy you: > >http://zapatopi.net/afdb.html > >Steve Right, but there products are all title 3 items, and they only sell to law enforcement. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2869 From: James M. Atkinson, Comm-Eng Date: Thu Apr 5, 2001 9:42pm Subject: FBI spy suspect 'took stripper to church' Friday 6 April 2001 FBI spy suspect 'took stripper to church' http://www.telegraph.co.uk/et?ac=003100565149417&rtmo=aCXJhuTJ&atmo=99999999&pg=/et/01/4/6/whans06.html By Toby Harnden in Washington THE FBI agent accused of spying for Russia took a stripper to church services and spent $10,000 on a car for her, according to federal prosecutors. Investigators said the purchase of the car and perhaps other presents helped to explain what Robert Hanssen, 56, who is married with six children, did with the $600,000 (L420,000) in cash and diamonds paid to him by the Russians. The relationship, combined with the discovery that Hanssen and his wife, Bonnie, ran up debts of $275,000 (L192,000), also raises questions about why the FBI did not heed clear warning signals about such a senior counter-espionage agent. It was said there was no evidence of a sexual relationship between Hanssen and the "exotic dancer", whom he met at a Washington DC strip club in the early 1990s. Hanssen, a devout Roman Catholic, apparently wanted to "convert" her in the way that William Gladstone, the Victorian prime minister, sought to "save" fallen women who had been reduced to prostitution. The stripper was said to have attended masses at the church of St Catherine of Siena in Great Falls, Virginia, on more than one occasion. There were also indications that Hanssen might have bought her a plane ticket to Tokyo. Plato Cacheris, Hanssen's lawyer, said he would not comment on "such scurrilous allegations" and his client intended to plead "not guilty" to all charges regarding spying activity said to date back to 1985. Hanssen, who spent 25 years in the FBI, is accused of passing about 6,000 pages of documents on secret US programmes to Soviet and later Russian agents. He faces the death penalty if found guilty. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2870 From: James M. Atkinson, Comm-Eng Date: Thu Apr 5, 2001 9:44pm Subject: Rambus allegedly had spy at JEDEC Rambus allegedly had spy at JEDEC http://www.electronicstimes.com/story/OEG20010405S0037 By Jack Robertson, EBN (04/05/01 19:59 p.m. GMT) Rambus Inc. had a mole called "Secret Squirrel" tipping it off to private SDRAM deliberations at JEDEC (Joint Electron Devices Engineering Council) in 1997, Infineon Technologies has charged in the federal district court in Richmond, Va. Rambus had resigned a year earlier from the JEDEC committee drafting the SDRAM standard. However, Infineon attorneys presented internal e-mails from Rambus files from a hidden source identified only as "Secret Squirrel," allegedly leaking details of the JEDEC discussions on SDRAM after Rambus had left. Internal Rambus documents disclosed last month at the trial also show a source inside JEDEC called "Deep Throat" claimed to be keeping the memory design firm informed of the confidential SDRAM standards discussions. The alleged Rambus spies inside JEDEC surfaced when the transcript of a March 15 pretrial conference was recently released into the court record. Infineon lawyers told Federal Judge Robert Payne that the e-mails from "Secret Squirrel" and "Deep Throat" provided details of the DLL technology that JEDEC was considering and ultimately included in the SDRAM standard. They charged that Rambus then subsequently included the DLL technology as part of its amended SDRAM patent application on SDRAMs filed in 1997. Rambus attorneys told the court that Richard Crisp, Rambus engineer and recipient of the Secret Squirrel and Deep Throat e-mails, had no knowledge of where the messages came from, according to the transcript. "Mr. Crisp testified it was one of the most bizarre experiences of his life was receiving these e-mails," according to Rambus attorney David Pendarvis. John Desmarais, Infineon lawyer, told Judge Payne, "It goes directly to the scheme here, because what happens [is] Rambus continues to modify its pending patent applications after withdrawing from JEDEC until they get it finally right in the patents,,,and one of them is in this suit." The secret e-mail allegations are only the latest bizarre twist in the bitter SDRAM patent litigation between Rambus and Infineon, and also with Hyundai Electronics Industries Co. and Micron Technology in eight courts in the U.S. and in Europe. A series of other e-mails from Rambus' Richard Crisp were previously disclosed in the separate patent suit against Hyundai in the San Jose, Calif. federal court, which discussed the company's strategy against the SDRAM standard under discussion at JEDEC from 1992-96. The latest transcript showed Infineon introduced yet another Crisp e-mail from 1992 which the German chip maker claimed showed Rambus' attempt "to derail the SDRAM standard. One of the ways they were going to do that was what Mr. Crisp calls a press war by essentially, disparaging SDRAM in the press," said Infineon attorney Desmarais. The transcript disclosed that Infineon also took its knocks from Judge Payne at the pretrial hearing, when it tried to introduce a promotional videotape touting its DRAM fab at White Oak, Va. outside Richmond to provide a local interest slant for jurors. Judge Payne chastised the lawyers, "Come on. You look at me and you tell me with a straight face that this can come in [as evidence]." Infineon withdrew the tape as evidence. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2871 From: Steve Uhrig Date: Thu Apr 5, 2001 10:24pm Subject: Minox spy cameras The following was brought to my attention by another list member. It was printed in today's AFIO newsletter. AFIO = Association of Former Intelligence Officers. I know several members of this list also belong to AFIO. Anyone with an interest in or need for subminiature photography is invited to visit the site. --------------------------------------- SECTION IV -- OTHER MISCELLANEOUS ITEMS OF INTEREST NEW MINOX WEBSITE: There are many interesting aspects to the intelligence community. The hardware used by field intel types is a specialty area, and one studied heavily by experts in tradecraft such as AFIO member H. Keith Melton. A further specialty is miniature photography, the Minox submini cameras being an important and historical intelligence tool from the 1940s to the present day. Minox cameras have played a part in many major events in history, one being the Walker Brothers spy ring. The Walkers wore out three Minox model C cameras in photographing the approximately one million documents they turned over to the Soviets. AFIO member Steve Uhrig, President of SWS Security in Maryland, manufactures electronic surveillance equipment [motto: "In God we trust, all others we monitor"], and is a collector and world-renown historian on Minox submini cameras. Visit his webpage with descriptions of the various models of Minox cameras and accessories, tidbits of history involving Minox, and descriptions of cameras and accessories for sale. If you have a Minox camera, match it to the pictures on the webpage and learn something about the history of your model. Those who were issued and used Minoxes in the field will enjoy some reminiscing on this excellent site. Visitors wishing to learn about these marvelous little intelligence tools or even purchase one will feel right at home here. Steve offers advice and consulting to new or seasoned Minox enthusiasts at no charge. He also is interested in purchasing Minox cameras or accessories if you have anything to sell. Highly recommended. mailto:Steve@s...; website http://www.swssec.com/minox.html, tel +1+410-879-4035, fax +1+410-836-1190. (recommended by AFIO President Gene Poteat) -------------------------------- Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2872 From: Charles P Date: Thu Apr 5, 2001 10:45pm Subject: Re: Useful site > to refer lunatics to who annoy you: > > http://zapatopi.net/afdb.html > > Steve > > Incredible! I'll have to keep a few in my tool case. 2873 From: James M. Atkinson, Comm-Eng Date: Thu Apr 5, 2001 11:18pm Subject: Breaking Foot-and-Mouth Satire Subject: [GCFL] Breaking Foot-and-Mouth Satire Foot-And-Mouth Believed To Be First Virus Unable To Spread Through Microsoft Outlook Atlanta, Ga. (SatireWire.com) Scientists at the Centers for Disease Control and Symantec's AntiVirus Research Center today confirmed that "foot-and-mouth" disease cannot be spread by Microsoft's Outlook email application, believed to be the first time the program has ever failed to propagate a major virus. "Frankly, we've never heard of a virus that couldn't spread through Microsoft Outlook, so our findings were, to say the least, unexpected," said Clive Sarnow, director of the CDC's infectious disease unit. The study was immediately hailed by British officials, who said it will save millions of pounds and thousands of man hours. "Up until now we have, quite naturally, assumed that both foot-and-mouth and mad cow were spread by Microsoft Outlook," said Nick Brown, Britain's Agriculture Minister. "By eliminating it, we can focus our resources elsewhere." However, researchers in the Netherlands, where foot-and-mouth has recently appeared, said they are not yet prepared to disqualify Outlook, which has been the progenitor of viruses such as "I Love You," "Bubbleboy," "Anna Kournikova," and "Naked Wife," to name but a few. Said Nils Overmars, director of the Molecular Virology Lab at Leiden University: "It's not that we don't trust the research, it's just that as scientists, we are trained to be skeptical of any finding that flies in the face of established truth. And this one flies in the face like a blind drunk sparrow." Executives at Microsoft, meanwhile, were equally skeptical, insisting that Outlook's patented Virus Transfer Protocol (VTP) has proven virtually pervious to any virus. The company, however, will issue a free VTP patch if it turns out the application is not vulnerable to foot-and-mouth. Such an admission would be embarrassing for the software giant, but Symantec virologist Ariel Kologne insisted that no one is more humiliated by the study than she is. "Only last week, I had a reporter ask if the foot-and-mouth virus spreads through Microsoft Outlook, and I told him, 'Doesn't everything?'" she recalled. "Who would've thought?" Copyright 2001, SatireWire Received from PackyHumor mailing list. [Moderators Note: April is such a fun time of the year] -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2874 From: Rob Muessel Date: Fri Apr 6, 2001 8:29am Subject: panic buttons Thanks for the suggestions. Finding a suitable transmitter isn't the problem, though. Those are a dime a dozen. None of the receivers I've seen are intended to be portable; they are designed for fixed installations. I don't want to get into a repackaging and modification project. I'm just trying to do the guy a favor. But,..... -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 2875 From: Robert G. Ferrell Date: Fri Apr 6, 2001 9:25am Subject: Re: Breaking Foot-and-Mouth Satire >Foot-And-Mouth Believed To Be First Virus Unable To Spread Through >Microsoft Outlook ROTFLMAO! RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2876 From: James M. Atkinson, Comm-Eng Date: Fri Apr 6, 2001 9:38am Subject: Two indicted in theft of Cisco stock Two indicted in theft of Cisco stock A federal grand jury Wednesday indicted two Cisco Systems accountants, accusing them of breaking into the company's computer system and illegally transferring millions of dollars in Cisco stock into their own brokerage accounts, apparently by exploiting weaknesses in the networking giant's internal security. Geoffrey Osowski, 30, of Mountain View and Wilson Tang, 35, of Palo Alto were charged with computer and wire fraud in connection with allegations they started shifting shares of Cisco stock to themselves in December, then cashed in on the profits over the next several months. Osowski, a financial analyst, and Tang, an accounting manager, admitted the scheme to FBI agents when confronted two weeks ago, according to an FBI affidavit. http://www0.mercurycenter.com/premium/business/docs/fraud05.htm http://www.techtv.com/news/politicsandlaw/story/0,24195,3320550,00.html -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2877 From: James M. Atkinson, Comm-Eng Date: Fri Apr 6, 2001 11:37am Subject: Watch Those Conducted Signal Paths Folks Watch Those Conducted Signal Paths Folks Recently, I had a client contact me to come in for an unscheduled and after hours evaluation of a executives desktop computer. Their in-house security people came across an "anomaly" and wanted an outside consultant to check it out. Security Posture: Client has good locks, good doors, good alarm system, good lighting, good video coverage of ingress and egress points and so on. The entire building is also subject to random TSCM inspections. He and his staffs office are check weekly by their internal security people for RF devices (plus a physical inspection). Also, an outside TSCM service provider (guess who) comes in every 90 days or so for a full extended survey. Articulated Threat: Client was suspicious as his firm has been laying off people in droves, the stock is in the dumps, competitors are trying a hostile takeover, they are embroiled in multiple lawsuits, etc, etc, etc. He feels that his desk and files have been getting rummaged though several times a week, and their security people are fairly certain that it is one of their senior tech support people (can you say "covert video"). Confirmation and Rationale: "Word has leaked" just prior to several layoffs about certain very specific things that were being said in this executives specific office concerning specific people, their separation packages, and other details. Additionally, covert audio recordings from some of these meetings (in that specific office) have been played back to executives in an attempt to manipulate the negotiation of larger severance packages. General Findings: A senior tech support person appears to have modified the suspect computer to pass audio though the un-used cable pairs used on the 100 -Base-T computer network. Furthermore, software was found on the tech support persons computer to allow long term digitizing of the audio which appeared on the LAN tap which was programmed to automatically email copies of the compressed audio files to a secondary off-site computer (where it was being served up as MP3 files). Evaluation of automated backup tapes located copies of these MP3 files being downloaded by, or being anonymously e-mailed to other employees in the company. Finding Details: Modification consisted of two Kynar wires tack soldered to microphone input on [executives] computer motherboard, a small AGC microphone driver circuit board (kit type) drew power from mother board and pushed the audio signal down the LAN wires to the IDF where it was cross wired to the LAN wiring which went to the tech's desk (several floors away). LAN wiring was traced back to [techs] computer where it appeared on his LAN card. [Tech's] computer was checked and a similar patch was found from the LAN card to his microphone input on the motherboard (he was using the executives microphone as his own). There was no foreign RF emanations, and no visible external mods to either machine. Clear room audio was observed on the punch blocks in the IDF phone room on un-used pairs but the wall plates were un-modified. Excessive damage (relative) to other cable pair punch connections (scratches and plastic deformation) which provide related services the same room indicated that there have been multiple past intrusions. There were no modifications external to the computers other then the jumper wires in the phone rooms. Inspection of the techs desk and work areas by the companies security department located change and master keys for the entire complex, various recording devices, catalogs for eavesdropping devices, a handgun, ammunition, and other contraband (he claimed to be a reserve cop). Computer records [on his machine] indicate that the intercept had been in operation for only a few weeks prior to discovery. After Action: The tech was interviewed and dismissed (with a severance package) the next business day and a formal incident report filed with the appropriate law enforcement agency (but the company will not press charges). During the the extensive interview session the subject confessed and prepared a written statement where he stated it was done simply for revenge (he was upset about not getting a Xmas bonus). Client is now performing a full conductor check for the entire facility, as well as a hardware and software physical inspection. They are also replacing all lock cores and locking down the building, etc. -jma [Note: I was given permission to post this incident report to the TSCM-L list provided that the client (who's security people are list members) was not identified in anyway... They have reviewed this sanitized posting and approved its release] -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2878 From: Craig Meldrum Date: Fri Apr 6, 2001 6:17pm Subject: Re: Panic Buttons Rob One of my "other company's" puts together a system something like what you are looking for. It all dependes on where you want to send the signal to. The system consists small transmitters smaller than a garage remote which transmit back to a receiver which can be connected to almost anything you want. We have systems connected to computers and a standalone system that retransmits the incoming signal to a pager. Average cost per transmitter around $50. The receiver setup cost would depend on what you wanted to do with the signal. We are also looking at developing a simple device that consists a receiver and transmitter in one unit for use a by a mobile team. When one pushes his button the rest of the team get a vibrating alert on their unit. This was asked for by a nightclub who wanted each of their bouncers to be able to alert the rest if he needed assistance and the vibra-alert was because it was too noisy in a night club to hear a beeper. The only limitation on such a system is that if you have 5 or 6 units you cannot be sure who pushed the button or where they are if you can't see them but it does alert the team that one of the others is in need of assistance. Cheers Craig ========================================================= Craig Meldrum, Managing Director Communications Security Ltd, PO Box 8314, Symonds St, Auckland, New Zealand Ph: 64-9-3093386 Fax: 64-9-3021148. craig@c..., www.comsec.co.nz Selective Communications Group Ltd, PO Box 8798, Symonds St, Auckland, New Zealand, Ph: 64-9-3021142 Fax: 64-9-3021148 craig@s..., www.selective.co.nz Australian Office: i-Mobile Pty Ltd, PO Box 446, Burwood NSW 1805, Australia. Ph: 61-2-97152238 Fax: 61-2-97152941 craig@i..., www.paging-data-receiver.com ========================================================= 2879 From: James M. Atkinson, Comm-Eng Date: Sat Apr 7, 2001 5:39am Subject: Insider trading probe like `spy stuff' Insider trading probe like `spy stuff' http://www.thestar.com/cgi-bin/gx.cgi/AppLogic+FTContentServer?GXHC_gx_session_id_FutureTenseContentServer=04626d67fdf274ee&pagename=thestar/Layout/Article_Type1&c=Article&cid=986504048027&call_page=TS_Business&call_pageid=968350072197&call_pagepath=Busin Rob Ferguson BUSINESS REPORTER Private investigators looking for evidence of insider trading through numbered offshore accounts at RBC Dominion Securities could be greasing palms in the Bahamas and interrogating staff in Toronto. ``This is no different from spy stuff,'' said Al Rosen, a York University professor and head of Rosen@Associates, a forensic accounting and investigations firm that has handled several major probes. Investigators will be pressuring officials at private banks in the Bahamas and Switzerland for the identities of the holders of numbered accounts used in the suspected insider trading, Rosen said. Those private banks routed what RBC Dominion Securities said were ``suspicious'' stock trades in companies the investment dealer - owned by the Royal Bank of Canada - was advising in top-secret mergers and acquisitions. But those foreign bankers may not co-operate because of banking secrecy laws. ``If you get the law thrown back at you, then it's a matter of getting the information through other means,'' Rosen said. ``We pass it over to specialists. Would they bribe? Yeah. They get the information a little too quickly.'' RBC Dominion, the country's largest investment dealer, has hired the forensic accounting firm of Kroll Lindquist Avey to conduct an investigation. Kroll investigators are already overseas and officials in Toronto could not be reached for comment on their methods yesterday. RBC Dominion officials also could not be reached. Meanwhile, investigators will be looking for anyone in the investment dealer's mergers and acquisitions department who had the motivation and opportunity to make extra cash by peddling information, said Len Brooks, a forensic accounting professor at the University of Toronto. Office phone and e-mail records can be searched, phone calls may have been monitored and assessments of personal financial circumstances can be made, he added. There is also a more direct route, according to Rosen. ``You put the heat on them. Who has the biggest mortgage, the biggest car, the biggest number of ex-wives, the most mistresses?'' ``Certain people, as you ask the questions, they're nervous or evasive. It becomes basic police work.'' RBC Dominion, the country's biggest investment dealer, shocked Bay Street Wednesday by revealing it has uncovered a series of ``suspicious'' stock trades. Many of the trades were in shares of companies the firm was advising on upcoming mergers and acquisitions, raising the possibility insider information was leaking out. Few details of the trades were made public. The Ontario Securities Commission and the Toronto Stock Exchange are also conducting their own investigations. One complication is that the holders of the Swiss and Bahamian accounts could be holed up anywhere around the globe, perhaps hiding at the end of a long paper trail through many more banks. ``It's a question of unravelling the mystery,'' Brooks said. ``You can have this stuff go five times around the world,'' Rosen added. ``If anyone is any good at it, they'll move it (the money) three or four places or split the account. You don't want a paper trail that's too easy to follow.'' However, if the offshore banks are ``corresponding banks'' with which the Royal Bank regularly does business, finding the identities of the account holders should be routine, Brooks said. In that case, another recourse is through law enforcement agencies such as the RCMP, which can deal directly with foreign police forces or market regulators. In cases like these, investigators have also found the accounts have been opened by one person in another person's name, complicating the chase. ``Then you start pursuing that trail,'' Rosen said. ``You find who it is and interview that person and break them down and ask if they're getting 5 per cent and if some other person's getting 95 per cent. Then it's just normal police work.'' The account holders would then have to be tracked down and questioned about relationships with anyone at RBC Dominion. Rosen said the forensic accounting field is so busy, he's winding up his teaching career at York. And the University of Toronto's Rotman School of Management is launching a distance-education diploma program for chartered accountants in forensic and investigative accounting, said Brooks, who is the director. ``White-collar crime is a growth area. You need training beyond the C.A. designation in areas of evidence and interviewing and investigating to do a good job.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2880 From: James M. Atkinson, Comm-Eng Date: Sat Apr 7, 2001 5:41am Subject: E-mail wiretapping used to spy on corporate communications E-mail wiretapping used to spy on corporate communications http://www.theregister.co.uk/content/8/18147.html By: John Leyden Posted: 06/04/2001 at 11:12 GMT Corporate spies are using covert JavaScript code within email to track the contents of sensitive financial communications. That's the warning from managed service provider Activis which said that it is seeing increasing use of malicious JavaScript coding to create Web bug that spy on Internet traffic. These Web bugs can be embedded into HTML based emails before they are sent. The code then acts to covertly copy the original sender each time this email is forwarded on within the recipient's system. The issue has been well known within the security community since February, when online watchdog the Privacy Foundation highlighted the problem. Activis says it is a live threat that is been actively exploited. It picked up the trend in the course of providing content management services for its clients. Despite the bleak picture painted by Activis the situation is far from hopeless. It is possible to eradicate 'e-wiretapping' via Web bugs by installing email encryption software, or turning off JavaScript in HTML messages. The advice is timely because there is evidence that businesses do not take email security seriously enough, despite conducting more and more sensitive business negotiations over the Net, chiefly because it greatly speeds up discussions. A recent report on email security within mergers and acquisitions, published by IT services company Northgate Information Solutions, found 100 firm out of 500 sent 70 per cent or more of confidential information via email. Despite this, only 11 per cent of the total sample said that they had secure, encrypted email. Lawyers, who really ought to know about the need for confidentiality, were the worst offenders with only eight per cent insisting on using encrypted emails when sending confidential information to external parties. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2881 From: James M. Atkinson, Comm-Eng Date: Sat Apr 7, 2001 7:04pm Subject: Corporate spy case unfolds in lawsuit Corporate spy case unfolds in lawsuit Fruit of the Loom worker admits sharing secrets http://www.chicagotribune.com/business/businessnews/article/0,2669,ART-51039,FF.html By Robert Manor Tribune staff reporter April 8, 2001 An international case of corporate spying is playing out in Chicago, with a former manager at underwear maker Fruit of the Loom confessing she betrayed her employer and gave critical trade secrets to a competitor. "This case is about industrial espionage at the highest corporate level and the lengths to which predatory competitors will go to obtain commercial advantage," Fruit of the Loom lawyers charged in documents filed in U.S. District Court here. Fruit of the Loom filed suit last week against Gildan Activewear Inc., of Montreal, and one of its top executives. In the case, Fruit of the Loom seeks unspecified damages and asks the courts to prohibit Gildan from using confidential production and sales forecasts it allegedly obtained late last year. On Thursday U.S. District Judge Joan Gottschall issued a temporary restraining order against Gildan. A Gildan spokeswoman Friday declined to comment on the lawsuit, saying the company is still studying it. At the heart of the case is this allegation: That the Canadian company, with the help of the former Fruit of the Loom executive, stole trade secrets to gain a competitive edge and grab market share and sales from its competitor in the cut-throat apparel business. Such high-profile charges of corporate espionage are not uncommon, security consultants say. Kraft Foods, for example, filed a lawsuit this year against Marshall, Minn.-based pizzamaker Schwan's Sales Enterprises Inc., alleging that in the late 1990s Schwan's hired an investigator to uncover Kraft's plans for a rising dough pizza. Last year Cargill Inc. paid $100 million to settle a lawsuit alleging that it had used secret biotech material provided by a former employee of a competitor, Pioneer Hi-Bred International. Fruit of the Loom's lawsuit against Gildan, meanwhile, relies in large part on the admission of a former Fruit of the Loom insider that she supplied confidential company documents to an executive at Gildan. The woman in question is identified in court papers as Elizabeth Walton, formerly a Rockfield, Ky.-based employee of Fruit of the Loom. Walton, who is not named as a defendant in the lawsuit, is expected to testify for Fruit of the Loom if the case goes to trial. Walton, the lawsuit says, worked for David Cherry, who was a vice president at Fruit of the Loom until 1998, when he left to become an executive vice president at Gildan. Cherry is a top executive at Gildan, serving on its executive management committee. Cherry, the lawsuit says, remained in touch with Walton after he left Fruit of the Loom. In an affidavit filed as part of the case, Walton spells out what allegedly happened next: "On Nov. 27, 2000, Cherry called me at work and left a voice mail message asking me to call him," Walton said. Cherry, she says in the affidavit, instructed her to use a pay phone. And when she called him, Walton says, Cherry asked her "if I could do him a favor and get my hands on a Fruit of the Loom forecast report and a sew plan report," she said. Valuable reports Fruit of the Loom contends that these reports set out a wealth of information about its plans and production capabilities-data that Gildan can exploit to win customers and sales away from Fruit of the Loom. The two reports include production goals for the company's plants in El Salvador, Honduras, Mexico and elsewhere. They would allow Gildan to estimate production costs, Fruit of the Loom says. They detail sales to specific customers, trends in demand and budget information. "In sum, the sew plan and forecast report provide Gildan with a road map to Fruit of the Loom's production and sales strategies worldwide," the company says. In the sort of dry language typical of legal affidavits, Walton goes on to say that she honored her former boss' request for the confidential documents. "After talking with Cherry, I returned to my office and used my office computer to access a company file containing the company's current forecast report and I (already) had a copy of a sew plan report," Walton said. "I put a copy of the forecast report and my copy of the sew plan report in a FedEx envelope" and sent them to Cherry. "When I sent the reports to Cherry," she went on in the affidavit, "I knew they were confidential Fruit of the Loom information that was not publicly available and that they should not have been provided to anyone outside of the company." Fruit of the Loom and Gildan have been on remarkably different trajectories. At fast-growing Gildan, profits have soared from $6 million in 1997 to $56 million last year, and the company's stock, which trades on the New York Stock Exchange, has shot up 230 percent since 1998. Fruit of the Loom, meanwhile, has wallowed in bankruptcy since late 1999 after moving production from the U.S. to plants in Third World countries, a decision that led to severe transportation and management problems. Executive departures At least five Fruit of the Loom executives have taken jobs at Gildan in recent years. One of those executives, sources say, alerted Fruit of the Loom about the alleged theft after copies of the reports began circulating around Gildan's offices. The court papers don't say why Walton left Fruit of the Loom, where until recently she was director of customer service. And John Ray, general counsel for Fruit of the Loom, said it is unclear why Walton turned over such valuable information to a competitor. She wasn't paid for the documents. Walton couldn't be reached for comment. Cherry, through a Gildan spokeswoman, declined to be interviewed. If Fruit of the Loom was victimized by Gildan, it would not be not the first company to suffer from corporate espionage. The American Society for Industrial Security estimates that Fortune 1000 companies lose at least $45 billion a year due to corporate spying. E-mail rmanor@t... -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From: Matthew Paulsen Date: Thu Apr 4, 2002 5:53pm Subject: Paranoia paradise Had a recent converstation with someone about this sort of stuff... Lots of laughs were involved from start to finish. I do feel truly sorry for others that have to deal with these whacko's on a daily basis. I normally only get to deal with people that are sane, but don't understand technology that think it's easy to do. Guess I can live with my frustrating teaching moments when I look at the alternatives that are available. Hmm... I guess a conspiracy theorist would say that this article was posted by the BBC as a disinformation dismeination plot against the UK citizenry by the established media mafia... hehe :) -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= http://news.bbc.co.uk/hi/english/uk/newsid_1909000/1909378.stm Thursday, 4 April, 2002, 11:24 GMT 12:24 UK Paranoia paradise By Chris Horrie BBC News Online What makes a good conspiracy theory? What is it about some stories that, however unlikely, convince people that they are true? French author Thierry Meyssan's book L'Effroyable Imposture (The Appalling Fraud) - which claims that the US government may have "staged" the 11 September attack on the Pentagon - has been condemned for lack of taste. The book has found thousands of readers in France But it is merely the latest contribution to the mushrooming media "conspiracy industry" - based on the premise that whatever anybody in authority says, the exact opposite is almost certainly the truth. In an age of The X-Files and a lack of trust in the scientific, political and military establishment, there are millions apparently prepared to believe that what they see on the TV news is a complete con and that "the truth" is being suppressed by mysterious and unidentifiable Powers That Be. Who controls the British Crown... who keeps the metric system down... we do! we do! Anthem of the Stone Cutters, from The Simpsons In short, the world seems to be coming down with a bad case of mass paranoia. The Grassy Knoll There are those, for example, who believe that the Titanic was not sunk but captured by Albanian pirates (why Albanians?), its cargo of gold bullion stolen, its crew and passengers sold to white slave traders and a "fake" wreck created to cover up for this near-perfect super crime. Less obscure are the numerous theories surrounding the death of John F Kennedy - the most outrageous (and recent) that he was somehow shot by his wife, Jackie. Then there is the persistent campaign to convince everyone that the moon landing was faked in a TV studio and on location in an Arizona desert in order to boost the popularity of Richard Nixon. There are entire interest groups with names like The Grassy Knoll and The Conspiracy Continues devoted to "researching" ever more convoluted versions of the Kennedy assassination, many now finessed to entire alternative secret histories of the world dating back to the Garden of Eden. Twilight Zone Conspiracy Planet links to all the familiar conspiracy theories - Elvis is not dead; UFO abductions; tireless efforts of drug companies to suppress cures for diseases, and car companies to prevent the development of the electric car. Homespun UK conspiracies of recent vintage include the idea that MI6 killed Diana, Princess of Wales, to prevent her marrying a Muslim and endless stuff about British intelligence services being under the thumb of the Russians, the French and - strangely enough - the Swiss. The alien in Roswell, New Mexico, centre of strange events If all of this seems to be like the script for a particularly duff edition of The Twilight Zone, remember that ex-BBC presenter and Coventry City goalkeeper David Icke preaches that the world is being secretly run by super-intelligent lizards from another planet. Modern day conspiracy theorising like this may seem harmless to some. But belief in a sinister group of super-secret political puppet masters controlling world events is an old idea, pre-dating even modern science fiction. Nazi paranoia Fortunately, the more nutty global conspiracy theories have generally been confined to the fringe. But not always. The Nazi regime in Germany based its persecution of Jews on the idea that leaders of the religion acted as a secret governing council of the world, waging a secret war against Germany by cooking up communism, capitalism, jazz, pornography and modern art. This nonsense had its roots in 19th century France, where Jews were blamed for both the French revolution and the defeat of Napoleon. Anti-Semitic A best-selling French "non fiction" book, The French Jews, maintained a Jewish world council based in Gibraltar controlled the world banking system and was plotting the destruction of European civilisation. David Icke: "World is run by lizards" The book went through 114 editions in a single year, sold millions across Europe and made its author, Edouard Drumont, a leading player in French politics. Drumont's most extreme followers even believed that Jews had infiltrated the Catholic Church and placed a "Jewish Pope" on the throne of St Peter. Later, Drumont's ravings were perfected by the Russian secret police who faked a complete set of documents "proving" the existence of a "world Jewish conspiracy" and published in millions of copies around the world under the title of the "Protocols of the Elders of Zion". Spy mania Almost as horrific - on the political left - was the Communist conspiracy theory in 1930s Russia that famines caused by economic mismanagement were being deliberately manufactured by richer, conservative "Kulak" farmers - working conspiratorially with undercover German and British spies. "Spy mania", together with the wild idea that the Kulaks were deliberately starving themselves to death, led to countless executions and further intensification of famine, claiming the lives of millions. In the 1930s the controversial German psychologist Wilhelm Reich diagnosed belief in conspiracy theories as a form of mass hysteria and as a type of contagious "emotional plague". The problem is that once the basic idea is accepted that an endlessly devious, super-secret cabal is running events, everything that happens can be seen as further and ever more convincing evidence of conspiracy. 5134 From: James M. Atkinson Date: Thu Apr 4, 2002 7:41pm Subject: Webster Report The Webster report on espionage inside the FBI is now online. http://www.tscm.com/websterreport.pdf -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5135 From: Dragos Ruiu Date: Thu Apr 4, 2002 9:09am Subject: cryptome How interesting. I post to this list in response to the 0day discussion. I never see the post go out on the list. The next day I find my post anonymized and posted on cryptome.org Quite an interesting information ecosystem we live in indeed. amused, --dr -- --dr pgpkey: http://dragos.com/dr-dursec.asc CanSecWest/core02 - May 1-3 2002 - Vancouver B.C. - http://cansecwest.com 5136 From: James M. Atkinson Date: Fri Apr 5, 2002 3:09pm Subject: Re: cryptome Actually, your post actually did make it to (and was posted on) the list, but you may not have gotten a copy yourself. -jma At 3:09 PM +0000 4/4/02, Dragos Ruiu wrote: >How interesting. > >I post to this list in response to the 0day discussion. > >I never see the post go out on the list. > >The next day I find my post anonymized and posted on cryptome.org > >Quite an interesting information ecosystem we live in indeed. > >amused, >--dr > >-- >--dr pgpkey: http://dragos.com/dr-dursec.asc > CanSecWest/core02 - May 1-3 2002 - Vancouver B.C. - >http://cansecwest.com -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5137 From: James M. Atkinson Date: Fri Apr 5, 2002 5:30pm Subject: Seven F.B.I. Employees Fail Polygraph Tests for Security http://www.nytimes.com/2002/04/04/national/04HANS.html?todaysheadlines April 4, 2002 Seven F.B.I. Employees Fail Polygraph Tests for Security By DAVID JOHNSTON WASHINGTON, April 3 - About seven F.B.I. employees with access to highly classified information have been unable to pass polygraph examinations administered as part of the bureau's stepped-up security program after the arrest last year of a senior agent as a Russian spy, F.B.I. officials said today. At a meeting with reporters at Federal Bureau of Investigation headquarters, Robert S. Mueller III, the director, said that about 700 bureau employees had been given polygraph exams in the aftermath of the arrest of Robert P. Hanssen, who has pleaded guilty to spying for Moscow. Mr. Mueller said, "We are heartened that less than 1 percent of the 700 raised issues that require further investigation." Mr. Mueller and other bureau officials discussed expanded use of polygraphs and other measures adopted as a result of embarrassing security lapses found after the Hanssen case. Mr. Mueller spoke today before the release of a report by a commission that is expected to conclude that the lack of controls on employees made it much easier for Mr. Hanssen to pilfer secret bureau documents without being caught. The yearlong review of security procedures was conducted by a commission led by William H. Webster, former director of central intelligence and the F.B.I. Mr. Webster will testify next week about his findings to the Senate Judiciary Committee. "Every employee should recognize that in the wake of Hanssen, we have to emphasize security more than we have," Mr. Mueller said. "Anybody who looks at our organization realizes that security was not a priority. We've moved to address that." In other steps to tighten security, the bureau has created a security division, limited the number of people who have access to classified material and tightened controls on employees who use classified computer systems. In addition, Kenneth H. Senser, a C.I.A. officer who is in charge of the security overhaul at the F.B.I., said the bureau will expand its use of public records, like property sale documents, to check agents' financial disclosure reports. He said that the bureau is considering whether to use psychological profiles to uncover behavior that might lead to spying. "Our goal is to deter those people, if they're thinking rationally," Mr. Senser said. "In some cases they don't. If we can't deter them, to try to minimize that time between when they make the decision to go bad and when they actually get detected, and along that way, minimize the damage that's done." As for employees who were unable to pass polygraphs, Mr. Mueller said that the results did not automatically mean they were suspected of espionage. He said that a follow-up investigation could exonerate all of the employees. Other officials said polygraph tests may be extended to several thousand more employees. Mr. Hanssen, an F.B.I. counterintelligence expert for 25 years, is awaiting sentencing next month. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 5138 From: James M. Atkinson Date: Fri Apr 5, 2002 5:36pm Subject: FBI Report: Lax Technology Security Aided Hanssen http://www.foxnews.com/story/0,2933,49430,00.html FBI Report: Lax Technology Security Aided Hanssen Thursday, April 04, 2002 By Carl Cameron WASHINGTON - The FBI is expected this week to issue a scathing report on security problems discovered during an internal review of the Robert Hanssen spy case. The report, to be delivered to Attorney General John Ashcroft by Friday, concludes after extensive debriefings with Hanssen that the FBI suffers from lax attention to technology and document security and has numerous management problems, sources familiar with the report told Fox News. Former CIA Director William Webster, who is also a former head of the FBI, conducted the far-reaching review, and is expected to testify before the Senate Judiciary Committee next Tuesday. Robert Hanssen was an FBI agent for 25 years, at times highly involved in counterintelligence operations, before being arrested as a spy for the Soviet Union and Russia. Last July, he pleaded guilty to nearly two dozen charges of selling U.S. secrets to the Moscow over 20 years. Hanssen has nonetheless been sparring with his debriefers for months, and transcripts of the interviews reveal that his knowledge of top-secret FBI and CIA operations went well beyond his own "need to know" status, sources said. Sources said Hanssen appeared to "play with his debriefers" and often sought to impress them with the vast amount of intelligence he claims to have compromised. Hanssen met with Webster's team four times over the last year. Sources familiar with the Webster report say it will state that: - the FBI has failed to resolve long standing internal security concerns; - FBI computers, networks and encryption standards are outdated and vulnerable to compromise; - FBI records storage and security is inadequate and vulnerable to compromise; - FBI management and command and control operations are outdated and malfunctioning; and - FBI morale in the field and management communications are faltering. In October, Fox News was first to report that Hanssen had stolen top-secret U.S. law-enforcement software applications, as well as handbooks for the Community Online Intelligence Network, used by investigators to access various law-enforcement databases. Hanssen sold the COIN applications to the Russians, and U.S. intelligence believes that the software was in turn provided to Al Qaeda leader Usama bin Laden by Russian organized-crime figures. Government officials say the software may enable bin Laden to track the international investigation of terror assets and keep his money from being seized. The United States is not the only nation to use the COIN software. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5139 From: James M. Atkinson Date: Fri Apr 5, 2002 7:26pm Subject: Report: FBI Failed to Track Agent http://library.northernlight.com/ED20020404900000068.html?cb=0&dx=1006&sc=0#doc Report: FBI Failed to Track Agent Story Filed: Thursday, April 04, 2002 8:49 PM EST WASHINGTON (AP) -- The FBI has failed to comply with a presidential order that requires agents who work with the nation's most closely guarded secrets to disclose details of their finances, according to a report that quotes spy Robert Hanssen as saying the lapse helped him elude capture. The report, harshly critical of security within the FBI, said it found serious problems years ago and as recently as October. As quoted in the report, Hanssen outlined how the security shortcomings aided his 22-year spying career for Moscow. ``The only thing that possibly could have uncovered my espionage activities was a complete investigation of my financial positions and deposits to bank accounts,'' Hanssen told investigators, according to the report from a commission led by William H. Webster, a former CIA and FBI director. Hanssen has pleaded guilty to selling secrets in exchange for $1.4 million over the two decades. The Webster report, released Thursday, also disclosed that one month after the Sept. 11 terror attacks, FBI officials deliberately lifted restrictions on internal investigative files and widely exposed within the bureau sensitive information from secret wiretaps and searches granted under the 1978 Foreign Intelligence Surveillance Act. Such FISA information -- traditionally used for tracking down spies -- cannot be used in criminal cases under U.S. law. Some critics questioned whether the FBI may have accidentally revealed the identities of its clandestine agents overseas or the targets of its U.S. spy-hunting cases. FBI Director Robert Mueller ``is committed to ensuring that's not going to happen again,'' said Kenneth Senser, the bureau's new security chief. He said the move would have allowed any current spies in the FBI to read those files, ``but there would be a record that the agent tried to get into the file,'' Senser said. The FBI defended its hurried decision in light of the extraordinary events of Sept. 11. ``There was so much concern about the possibility of another impending attack, we wanted to make sure we didn't possess some piece of information that would be predictive of that,'' Assistant Director John Collingwood said. ``We didn't know any other way to do it, other than making everything available.'' The Webster report, which focused largely on the Hanssen case, agrees with Hanssen that the FBI could have detected his espionage earlier with better checks of his family's finances. He paid cash for a large addition to his home in Vienna, Va, which could have tipped off FBI spy-hunters. Any business transactions in excess of $10,000 cash must be reported to the Internal Revenue Service on a specific form. Under IRS rules, the FBI can review the forms freely. IRS spokesman Don Roberts said the agency could not answer whether the FBI ever has sought the information, because it does not track requests. Attorney General John Ashcroft said the Webster report ``demonstrates how a trusted insider, through repeated acts of betrayal and treachery over more than 20 years, was able to exploit deficiencies in FBI internal security systems and procedures to cause grievous harm.'' Ashcroft said he was pleased with FBI reforms being put in place. ``While we can never completely eliminate the possibility of a trusted person betraying his country, we can, we must and we are making these changes part of our everyday way of doing business,'' FBI Director Robert Mueller said. Citing Hanssen's own interviews with some members of the commission, the report said Hanssen's motivation for spying was money. His family was financially strapped after his transfer by the FBI in 1979 to New York, and he wanted to ``get a little money'' from espionage and then ``get out of it.'' By 1999, near the peak of Hanssen's most recent spying activities, he complained to the Russians of high credit-card debt, and said that college tuition for some of his six children and two mortgages on his home were creating an ``atmosphere of desperation.'' A year later, he boasted to the Russians: ``Generally speaking, you overestimate the FBI's capacity to interdict you.'' The Webster report accuses the FBI of failing to comply with instructions from President Clinton in August 1995, in response to the arrest of Aldrich Ames, a veteran CIA agent who pleaded guilty in 1994 to selling secrets to Moscow for $1.3 million during nine years. The new report says Hanssen started spying in 1979, roughly six years earlier than previously believed. Clinton's executive order required U.S. employees who worked with classified information to file written disclosure reports about their finances, including information about holdings by their spouse and dependent children. The order also permits intelligence agencies to ask the Treasury Department to search bank records and other financial databases to verify that FBI employees, for example, do not have unusually large bank accounts they are unable to explain. But the FBI ``does not require employees or contractors to complete a financial disclosure form'' except for a few senior officials, according to the Webster report. It said financial information provided by others at the FBI ``is in response to a limited series of questions on a standard form, which has little adjudicative value.'' The report recommends a new system that would ``compare employee-generated data with external sources to determine whether the employee has unreported or unexplained wealth of excessive indebtedness.'' The FBI's new head of security, Kenneth H. Senser of the CIA, this week described plans to use commercial database and other records to verify the financial disclosures that FBI employees make. Records of property sales, car purchases or other transactions could alert spy-hunters that an FBI agent is spending too freely. ``We've got to be a little more innovative in vetting people,'' Senser said. When the CIA began using a similar system, some employees complained that these checks invaded their privacy, but the CIA defended their use because of the Ames case. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 5140 From: Matthew Paulsen Date: Fri Apr 5, 2002 9:18pm Subject: Intelligence Key to Anti-terrorism in Africa, Former Ambassador Says http://usinfo.state.gov/regional/af/security/a2020401.htm Intelligence Key to Anti-terrorism in Africa, Former Ambassador Says Shinn discusses possible U.S. involvement in Somalia By Aly Lakhaney Washington File Staff Writer Washington -- Terming U.S. monitoring of potential terrorist sites in Africa a correct course, former Ambassador to Ethiopia David Shinn called recently for "continued collection of intelligence and surveillance of the waters off shore and the airspace above Somalia." While many American officials have been tight-lipped about possible military action in Africa, "leave no doubt that Somalia is being looked at carefully," said Shinn, who made his comments January 29 at George Washington University in Washington, in a speech titled "The Horn of Africa and International Terrorism." Shinn, who served as the deputy director of the Somalia Task Force and coordinator for Somalia in 1992 and 1993, recognized that "there has been a major effort to improve our intelligence on Somalia." The United States has also "solicited the cooperation of Somalia's neighbors...both on the intelligence front and on a contingency basis for use of their territory in a future action in Somalia." He identified intelligence as a major obstacle in action against Somalia because "there has been no on-the-ground American presence and precious few visitors to the southern two-thirds of Somalia since 1994." Shinn added, "U.S. understanding of events and intelligence on Somalia has been abysmal -- at least until recently." In the U.S. effort to cut off funding of terrorist organizations, "the U.S. seized the assets and shut down the U.S. offices of al-Barakat, the leading Somali money transfer company that the U.S. says has links to al-Qaeda. Al-Barakat also ran a long-distance telephone company using AT&T services. That is no longer in operation," said Shinn. The United States has also had some international support for its efforts in Somalia as "German, French, [and] American planes and ships have significantly increased surveillance of the 1,900-mile-long [3040-kilometer long] Somali coast and Somali airspace, with the goal of preventing al-Qaeda members from entering Somalia from Afghanistan," said Shinn. "These are all appropriate measures," said the former ambassador. Shinn also recommended taking action against al-Ittihad, a Somali-based terrorist organization that "evolved in the aftermath of the collapse of the Somali national government." Al-Ittihad's goals include the creation of "an Islamic state in Somalia and either to incorporate the Ogaden [the huge eastern region of Ethiopia peopled mostly by Somalis] into that state or at least free it of Ethiopian control," according to the former ambassador. Al-Ittihad is also allegedly connected to al-Qaeda, he said. Putting "pressure on factions in Somalia to remove al-Ittihad and al-Qaeda" and "work[ing] closely with Somalia's neighbors and encourag[ing] them to crack down on al-Ittihad supporters" were among the suggestions made by Shinn for U.S. action. The former ambassador also discussed the possibility of a "snatch and grab" operation against members of al-Ittihad, a strategy that was used by the United States in its 1993 campaign in Somalia. "If an opportunity based on incontrovertible intelligence arises for the snatch of a major terrorist, grab it," he said. Shinn voiced concern about taking military action in Somalia similar to that taken in Afghanistan. "It is unlikely there are any terrorist training camps left," and "any al-Ittihad follower with any brains has long since tried to blend in with other Somalis. One can seriously ask if there are any targets to bomb," said Shinn. As for the "snatch and grab" strategy, Shinn pointed to the U.S. record in Mogadishu from 1993, which "was not very good, even when the U.S. had thousands of troops on the ground." Shinn concluded, "There was just too much bad intelligence." "The military options are not very inviting, especially when the threat to the United States from Somalia seems questionable," said Shinn, and he recommended that "the U.S. avoid significant military action in Somalia" until "intelligence indicates there is a greater threat than appears to be the case now." The former ambassador added, "If the international community wants to deal meaningfully with the long-term problem of Islamic fundamentalism in Somalia, it should consider steps that help lead to the establishment of a viable national government." 5141 From: Date: Sun Apr 7, 2002 0:49pm Subject: US Spy Plane Expected Back in Service US Spy Plane Expected Back in Service By KYLE WINGFIELD .c The Associated Press MARIETTA, Ga. (AP) - A year after a collision with a fighter jet forced it to make an emergency landing in China, a U.S spy plane that was picked over and cut apart is being put back together and could be back in the air next month. The Navy EP-3 electronic surveillance plane is undergoing repairs at Lockheed-Martin in Marietta. That work should be completed in May, when the plane is to be flown to a Raytheon Co. plant at Waco, Texas, for electronic updates, Navy spokesman Bob Coble said. After that, the four-engine plane is scheduled to return to Navy service by the end of the year. ``The inventory of EP-3 aircraft is 11, so it's not like there's tons and tons of these things around,'' Coble said. ``It's a surveillance and reconnaissance airplane, and we've got lots of missions for that kind of airplane.'' The plane was flying over the South China Sea on April 1, 2001, when it collided with a Chinese fighter. The EP-3, with a crew of 24, made an emergency landing on China's Hainan island, where the crew members were detained for 11 days. The Chinese pilot was lost. Each side blamed the other for the collision. China accused the U.S. plane of violating international law by landing without permission, and it refused to let American technicians fix it and fly it out. The U.S. crew destroyed much of the plane's sensitive eavesdropping devices, but China is believed to have removed some equipment when it seized the plane and may have gleaned some useful information. Three months after the crash, the U.S. spy plane was released to the United States and, with its wings and tail cut off, loaded onto a cargo plane for the flight home. The incident further strained relations between China and the United States which were already tense over issues including Taiwan, arms proliferation and human rights. China also has demanded $1 million to compensate for expenses related to housing the spy plane and its crew. It rejected a U.S. offer of $34,000 as unacceptable. Coble said that because of security he couldn't discuss the repairs now being made or what the Chinese might have learned from the plane. But analysts say equipment left on board could have provided some information. ``What they would get most of all is a very, very powerful sense of what we are capable of listening to and what we are capable of finding out,'' said Bates Gill, a senior fellow at the Brookings Institution. ``I think they would be very interested to find that out.'' The EP-3 is basically a ``giant electronics signals vacuum cleaner'' that can monitor communications data from telephones, radios and even walkie-talkies, said Gill, head of the institution's Center for Northeast Asian Policy Studies. By monitoring radar, infrared and other weapons-tracking systems, it can determine how a country detects and then reacts to aircraft in or near its airspace, former military intelligence officer Roland Schumann said. China would have been very interested to learn how the United States integrates the plane's various pieces of hardware, which can then communicate with submarines, ships and other planes and fuse intelligence gathered in the past with intelligence being gathered in real time, he said. ``The U.S. has spent an enormous amount of time and money to enhance and upgrade their intelligence systems, and any time an opposing force can get their hands on the end result of those years and money, it's in their best interest,'' he said. 5142 From: Rick Hofmann - MICROSEARCH Date: Mon Apr 8, 2002 5:35pm Subject: Warning-Suspicious circumstances L.A. area I received a call from a male identifying himself with a first name only about doing a residential TSCM inspection. The caller had a Russian accent, and was calling from an area of Los Angeles (Hollywood) where there is a significant Russian and Eastern European immigrant population. The caller claimed to be suspicious that one of his clients is conducting a surveillance operation against him. He would not go in to specifics, would not give his last name, and declined to give me his address or phone number. He did give me a pager number as a means of contact. The caller wanted to meet me at a public location before taking me to his residence. I declined his request primarily because I have a policy against doing residential inspections unless by referral from a trusted client or colleague, but there were other reasons. At the risk of sounding paranoid I will explain some of the other reasons why I declined the caller's request. First, the caller would not give me any specifics about his suspicions, or himself. Second, there is a significant organized crime (primarily Russian Mafia) presence in Hollywood. Many of the members of these organized crime groups are former KGB Agents, and they have their own TSCM teams. One of my concerns was that this may have been a scam to obtain some new equipment for one of the "teams". I have some clients in the Hollywood area whose primary adversaries are Russian Mafia and I have seen first hand what they are capable of. I would encourage readers to use caution when dealing with people from the former Soviet Union and Eastern European countries now living in Hollywood and West Los Angeles. There are other Russian Mafia cells in other parts of the country where the same cautions are applicable. Very truly yours, Rick Hofmann, CCO, CPP, PI16998 MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 http://home.earthlink.net/~microsearch 5143 From: James M. Atkinson Date: Mon Apr 8, 2002 6:23pm Subject: Re: Warning-Suspicious circumstances L.A. area Good Advice Rick, Mugging a TSCM'er to get access to equipment has long been a problem There have been at least a half dozen cases in as many years where a TSCM'ers equipment vanished when servicing a "questionable client". Two of those mugged are list members (who should have known better) One guy lost all of his equipment when the shipment was "lost" by the freight company when they delivered the cases (the guys client actually ripped him off). One got cleaned out by an ex-employee (an ex-gvt sweeper). The last guy had all his equipment seized and then lost by customs of a foreign government. When the client turns into a squirrel the wisest decision is to walk away. -jma At 3:35 PM -0700 4/8/02, Rick Hofmann - MICROSEARCH wrote: > I received a call from a male identifying himself with a first name only >about doing a residential TSCM inspection. The caller had a Russian >accent, and was calling from an area of Los Angeles (Hollywood) where there >is a significant Russian and Eastern European immigrant population. The >caller claimed to be suspicious that one of his clients is conducting a >surveillance operation against him. He would not go in to specifics, would >not give his last name, and declined to give me his address or phone >number. He did give me a pager number as a means of contact. The caller >wanted to meet me at a public location before taking me to his >residence. I declined his request primarily because I have a policy >against doing residential inspections unless by referral from a trusted >client or colleague, but there were other reasons. > > At the risk of sounding paranoid I will explain some of the other >reasons why I declined the caller's request. First, the caller would not >give me any specifics about his suspicions, or himself. Second, there is a >significant organized crime (primarily Russian Mafia) presence in >Hollywood. Many of the members of these organized crime groups are former >KGB Agents, and they have their own TSCM teams. One of my concerns was >that this may have been a scam to obtain some new equipment for one of the >"teams". I have some clients in the Hollywood area whose primary >adversaries are Russian Mafia and I have seen first hand what they are >capable of. > > I would encourage readers to use caution when dealing with people from >the former Soviet Union and Eastern European countries now living in >Hollywood and West Los Angeles. There are other Russian Mafia cells in >other parts of the country where the same cautions are applicable. > > >Very truly yours, > >Rick Hofmann, CCO, CPP, PI16998 > >MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage >Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: >714-209-0037 >http://home.earthlink.net/~microsearch > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5144 From: James M. Atkinson Date: Mon Apr 8, 2002 7:58pm Subject: Romanian Daily Publishes List of Securitate Agents Working in Intelligence Title: Romanian Daily Publishes List of Securitate Agents Working in Intelligence Document Number: FBIS-EEU-2002-0405 Document Type: Daily Report Document Title: FBIS Translated Text Document Region: East Europe Document Date: 28 Mar 2002 Division: Balkan States Subdivision: Romania Sourceline: EUP20020405000259 Bucharest Ziua in Romanian 28 Mar 02 pp I-IV of supplement AFS Number: EUP20020405000259 Citysource: Bucharest Ziua Language: Romanian N/A Subslug: "Armageddon 7" report: "Armageddon of Securitate People" [Romanian text: http://www.ziua.ro/search.php?class=2002&id=16240&kword=Securitate&style=3 ] [FBIS Translated Text] We have received yet another cyber-bomb in the editorial office e-mails. It is the Armageddon 7 report. This time, the text refers to Securitate officers who continued to hold key posts in the intelligence services established by democratic regimes after 1989. The moment chosen to propagate in the media the information included in the appendix to this new Armageddon (which includes approximately 1,600 names) is delicate. The injection of this information is happening at the very time that there is increasingly intense talks about Romania joining NATO and about the fact that it is just a matter of hours before it becomes public that -- willy-nilly -- Romania will be taken into NATO, along with Bulgaria. It is already known that one of the primary requirements of the NATO leaders is that no more "dinosaurs" from the former Securitate should remain in the structures of the Romanian intelligence services. The source of Armageddon 7 is equally unknown to us. Our editorial office got it from the Press Monitoring Agency, which says that, as far as it is concerned, it just got it like you catch a ball when playing sports. Perhaps General Zaharia Toma [of the Interior Ministry, MI] knows more about this, or perhaps it is some secret service chief who has started his own fight with the parallel services. When we asked about Armageddon 7, the Romanian Intelligence Service [SRI] answered us placidly: "No comment" [preceding two words published in English]. This makes room for the interpretation that anything is possible. We decided to publish the Armageddon 2 report, owing to the gratuitous reaction of the prime minister, but this time we are publishing the entire text of this new Armageddon precisely owing to the opacity of the SRI. We know that the publication of this new Armageddon will start a new storm, an even bigger one than that started by Armageddon 2. However, we hope that, by sending this text to the printing press, we will no longer have a diversion meant to hide the truth, that, instead of witnessing other arrests "in the street" or new abuses by the Prosecuting Magistracy, we will get concrete answers as to whether the information included in this electronic document is real or not. We also mention that there are references to Ziua in the appendix to Armageddon 7 -- namely to revelations published by our daily. They are partly true. Some of these are known facts. Equally, as far as we are concerned, we believe that the information in this Armageddon may be "partly" true, because we have found enough mistakes. This is precisely why the public needs to find out about this list. If officials chose to say "no comment," we prefer to go to the public to find out the truth. The names in this list are not names of ghosts. The persons in question have acquaintances, neighbors, and so forth, who can deny or confirm the facts, over the head of the SRI. We are inviting them to the debate. [Signed] Bogdan Comaroni [Text of "Armageddon 7" report] It has been exactly 12 years since the SRI was established and 12 years since the public has been systematically and shamelessly lied to about the composition of that structure. Both [former SRI Directors] Virgil Magureanu and Costin Georgescu and [current SRI Director] Radu Timofte have been misleading us and are continuing to do so, taking turns to assure us that the SRI is becoming a modern intelligence service, in which he number of former Securitate officers is decreasing continuously. Today we find that, on the contrary, the former Communist body in charge of repression and intelligence is still controlling the game at the SRI, as the number of former Securitate officers always prevails at the SRI management level in Bucharest, in the management of local branches, and in all of its compartments. Retired former Securitate officers are also certainly on the offensive, infiltrated in economic structures, in financial institutions, managing public and private money, in the executive, and in the legislature. They have been and still are present in state or private funds, in financial investment companies, in the Financial Oversight Body, in the customs system, and, not least, in privatization mechanisms. Exactly 54 private security and protection companies are managed by former Securitate officers, and all of them are in permanent conflict with this country's laws. They have been parasites on numerous banks, under the pretext of assuring the internal and external protection of those banks, and the banks protected by them have collapsed, one by one. They established the International Religions Bank [BIR], and they are the ones who led it to bankruptcy when the population's deposits reached a tempting size. Then they got together in all kinds of insurance companies, which have no brilliant future. In fact, our forecast has partly been confirmed. In an extreme situation, they signed up together under the banner of the great robber Sorin Ovidiu Vantu, who is cleverer than them at making money out of corners where they did not have access, either because they did not know the procedure or for other reasons. What can be more significant than the fact that more than 320 reservists from the former Securitate and the SRI, shoulder to shoulder, worked for this profoundly dubious man, cashing in their shares, of course? Equally, what can be more significant than the fact that our vigilant domestic intelligence service pretended not to notice anything when Vantu's clay empire was riding on top of the wave? We are going back to the former Securitate officers that the SRI has kept. When he was director, Magureanu deceived us by claiming that there were only 15 percent of them in the service he managed. A decade later, Timofte is triumphantly giving us the same percentage. What could this mean? That out of the first 15 percent, those who died or retired were replaced with former Securitate people brought from home or from the marketplace? Unlike the SRI directors, the directors of the SIE [Foreign Intelligence Service] at least had the common sense to stay away from playing games with numbers, and, implicitly, from becoming ridiculous. For years we have been told that former Securitate officers in the SIE and the SRI were kept exclusively as specialists. In that case, what was the specialty of General Dumitru Badescu, SRI division chief, if he ended up being mocked by a small-time informer? What was the specialty of General Corneliu Grigoras, SIE directorate chief, if two less-known journalists with modest reputations managed to lure him into a trap, through which he lost his job? Come to think of it, what was the specialty of General Vasile Lupu, first deputy of the SRI bosses during two parliamentary terms in office, decorated by President Ion Iliescuand former President Emil Constantinescu? Did he specialized in the low blows with which he tried to hit Timofte? Actually, the SIE and the SRI did not keep Securitate officers who distinguished themselves before 1989 by their civilized, measured behavior. Instead, they kept the ones who were not shy about making every possible move to get ahead, polishing the shoes of the right figurehead politicians, hanging around talking and pretending they were good at something, or putting up for bid documents that could be used for blackmail. In this manner, the SRI was filled with people who pull strings behind the scenes and engage in intrigues, and others who are good for nothing. Made up of both active and retired officers, this category of Securitate officers was precisely the one who troubled the waters all the time in our society, because they are ready for any contingency. They have people who support the government, but they also have other shifts that support the opposition. The most certain sign that power in the SIE and the SRI is no longer in the hands of the evanescent directors, but in the hands of former Securitate officers is offered by the two latest major decisions made because these officers exercised pressure. The former has to do with the SIE: from now on, this espionage service can do business for profit. Namely, it can establish firms, and it is certain that auditing bodies will not have access to their management. As they used to do in the old days, a special auditing body will be established, made up of former Securitate people. In connection with this issue, we reiterate a statement made by the distinguished General Iulian Vlad on 31 March1990: "Security work, the prestige of the institution, and even this country's good name have been seriously damaged by the so-called activity to bring in hard currency, conducted primarily by external UM [Military Unit] 0544 and UM 0195, as well as the internal security UM 0650. Apart from the fact that, most of the time, the moneys represented a small fraction of the price of the goods that the state would have cashed in anyway in fair negotiations, Securitate officers had to enter into all kinds of combinations with foreigners, which were often compromising, and there was no definite control of their activity and of the hard currency involved. Equally serious was the fact that the units in question had to a large extent been detoured from the missions for which they had been established and which were useful to the country. Despite all of the efforts we made to exempt the Securitate from this task or at least to reduce it substantially, we were not successful. On the contrary [Securitate chief] Tudor Postelnicu turned it into a priority activity, to which the entire apparatus had to contribute." Obviously, former Securitate officers who used to work for the CIE [Foreign Intelligence Center] or even the DIE [Foreign Intelligence Directorate] feel their palms itch when they think about dollars and euros. But who would have imagined that an intellectual like Ioan Talpes, who supervised the transformation of the SIE into a SA [shareholding company] or even anSRL [limited partnership company], could play Postelnicu's role so happily? The latter decision, made under pressure from former Securitate officers, this time in the SRI, was to dismantle the National Intelligence Agency [ANI]. As pretexts, they invoked the lack of funds and the fact that many graduates do not live up to the commitment they make, not taking jobs in the SRI. That is great! Funds for useless trips around the world in airplanes full of family members, political supporters, and most obedient journalists can be found immediately. But not for a school meant to educate officers who will protect this country's interests. The truth is different: there is better education at the ANI than what they used to get at the Securitate school in Baneasa Forest [near Bucharest], which bothers Securitate people, who were educated at schools where attendance was not required and who have the kind of degrees that everybody knows how they were granted -- and still are. It is also normal that the graduates in question avoid getting jobs with the SRI. Nobody in his right mind and with a solid education would agree to become the servant of the likes of Vasile Lupu, who chases ranks, and Dumitru Badescu, who is a sucker. It was a piece of cake for former Securitate officers to penetrate the legislature. Colonel Stefan David, former chief of the Securitate in Resita, broke the ice. We cannot accuse Colonel Ilie Merce of any wrongdoing, almost all of the writers in Bucharest knew him, and maybe he even got the votes of some of them who were curious to see how a Securitate man is doing in democracy: like fish out of water or like an earthworm in the fish's mouth? However, Ristea Priboi, forgetting to tell people that he was a former Securitate officer, worked like a real crook. More, he associated the SIE with his con job. The SIE did not communicate to the CNSAS [National Council for the Study of Securitate Files] any precise data on him, thus contributing to its own compromising. Indeed, following such an experience, how can anyone trust the service's signals, syntheses, and verdicts? Still, the penetration of former Securitate officers into the executive is much more dangerous. Wearing the masks of advisers, they teem everywhere, like termites. We have identified six or seven such people in the entourage of the prime minister alone, with Priboi as their leader, fretting around. If the name of our prime minister was Vladimir Voronin or Aleksandr Lukashenko, this would be explainable. But it is harder to answer this question: why does highly educated, aloof Adrian Nastase put up with Priboi, who is poor in spirit, whom even his former colleagues hate as a piece of garbage, lovingly calling him "Pig!" What does Nastase learn from Constantin Silinescu, a nobody in his profession? What does he learn from General Mihai Caraman, who engaged in espionage with the posterior part of his body toward the enemy? To say nothing of other people, smaller ones, but cleverer in getting lost in the vegetation of the government savanna, hiding behind various fuzzy landmarks in the landscape. There is an idea floating in the air that, following a personality cult that is exhibited according to all the rules, there is a dictatorship in store for us. For now, Nicolae Ceausescu has strong reasons to be envious: he only spoke on television two hours a day, because that is how long Romanian Television stayed on the air. In comparison, Nastase speaks to the nation from dawn until after midnight, because we now have many more televisions that are on the air around the clock. We will discuss some other time the dictatorship that makes both Nastase and stupid Priboi happy. When it is too late for them. PS: We are publishing fragments of a list that includes more than 1,600 names of former Securitate officers who have been going from one place to another in the SRI, the SIE, and other, more civilian structures from 1990 to present. In order to avoid accusations that we publish state secrets, we steered clear of developing our demonstration on the current SRI staffing scheme. In the current circumstances, a possible investigation would not ask what those Securitate people are doing in the staffing scheme,it would ask why observers who were not taken into consideration got hold of that scheme. Appendix Ion Adamescu Former Securitate officer, recuperated by the SRI with the rank of colonel and hired by the Timisoara section. He cooperated in exposing Magureanu's informer file, and this is why he was placed in the reserves on 16 April 1996. Aldea Former officer of the Securitate Fourth Directorate. Currently lieutenant colonel, section chief in the Army General Intelligence Directorate [DGIA]. Aleca Former Securitate officer from Ramnicu Valcea, recuperated by the SRI with the rank of major. Two months after the December 1989 events, he resumed surveillance of the county hospital in town, his objective before the revolution. Constantin Alexa Former Securitate officer, recycled by the SRI. He took the initiative to expose file Z 4848, which revealed that Francisc Baranyi [former health minister] used to be a Securitate informer. He was later dismissed from the service and sued. Stefan Alexie Former Securitate general, chief of the Counterespionage Directorate, and state secretary in the Interior Ministry before December 1989. In the 1990s, for a rather long period of time, he worked as an adviser to controversial businessman Vantu, who made an essential contribution in bankrupting the National Investment Fund [FNI]. Vasile Alexoie Before 1989, he was chief of the Securitate in Roman. After December 1989, he was co-opted in the SRI management in Iasi County. After being placed in the reserves, he became president of the Iasi FNI and director of the local Gelsor company branch, which belonged to Vantu. Valer Andreica Former Securitate officer, taken by the SRI with the rank of major. At first, he worked for the section in Targu Mures. In July 1998, he was transferred to the post of deputy chief of the SRI section in Cluj. Andrei Andronic Former Securitate officer. Taken by the SRI, he was promoted to the rank of colonel and promoted to the post of chief of the SRI section in Iasi. Octavian Stelian Andronic Former colonel in the Securitate espionage service, station chief in The Netherlands and Israel. Because of his precarious professionalism, he was no longer accredited abroad during the last period of the Communist regime, and he worked for the AVP [special hard currency providing] service. Reactivated by the SRI as an economic adviser to Magureanu, he had his headquarters in London Street [Bucharest], under the cover of a ghost company called Eson SRL, where the wife of journalist Octavian Andronic was a shareholder. As an adviser, Octavian Stelian Andronic sold several documents to the SRI that had been in the Securitate archives for a long time on the paintings that were taken out of the country by former King Mihai and his attempts to sell them through Western auction firms. Eson SRL ceased its activity following press reports. Vasile Angelescu Former high-ranking officer in the espionage service of the former Securitate, suspected of ties with the KGB in Romania. After the events of December 1989, he was promoted to the rank of general and promoted to the post of first deputy director of the new SIE. His son, Mircea Angelescu, an important member of the FSN [National Salvation Front] in the 1990s, was involved as shareholder in the dubious business of the SC Macons and Co SA company, registered in Belgium. He then became President Iliescu's chief of staff. Constantin Angelescu Former high-ranking Securitate officer. Before December 1989, he was chief of UM 107/AVS of the CIE, a unit that specialized in state smuggling. In 2000, he was vice president of the Rapid soccer club. Marin Antonie Former Securitate officer. He was one of the first deputies of the SRI section chief in Dolj County. Apavaloaie Former officer of the Securitate Fourth Directorate. Currently a lieutenant colonel, chief of the financial service, in the DGIA. Apostolescu Former Securitate officer, working for the Fifth Directorate, which was in charge of protecting Ceausescu and other Communist dignitaries. Currently, he is chief of the SRI section in Brasov. Petre Arsene Former Securitate officer. As a reservist, he coordinated the establishment of a dubious private investigation agency in Ramnicu Valcea, which got illegally involved in the riot led by miners in September 1991. Later, it was discovered that the so-called ANISE [National Investigation and Economic Security Agency] was established with forged deeds. Gheorghe Atudoroaie Former Securitate officer in Timisoara, involved in the crackdown in December 1989. After being taken away from judiciary bodies, the SRI recuperated him with the rank of colonel. For a while, he was chief of the Protection Division. Costin Georgescu tried to appoint him as chief of the SRI Zonal Operative Center in Oradea, but his appointment was cancelled following protests from civil society. Alexandru Avram Former Securitate colonel in UM 0225, a unit of the CIE in charge of infiltrating the organizations of the anti-Communist emigration and combating programs by foreign radio stations that broadcast in Romanian. After December 1989, he held on for a few years in the espionage service, but then he was placed in the reserves because he could not speak any foreign language. With other former Securitate officers, he managed to steal several confidential documents from the Astra insurance company, which unleashed an intense press campaign against the management of that company through intermediaries. Following that campaign, the Astra management was changed. After that, Avram became deputy director of the Astra branch in Bucharest, although he has received no training in insurance. Baciu Former Securitate officer recuperated by the SRI with the rank of major. He was the first officer of the new intelligence institution to become the object of a public scandal when he tried to reactivate an informer. Vasile Badea Former officer of the Securitate Fourth Directorate. Currently a lieutenant colonel, deputy section chief of the DGIA. Ion Balea Reserve colonel of the former Securitate. In July 1992 several members of the PNTCD [National Peasant Christian Democratic Party] in Arges County accused him of having infiltrated the local PNTCD organization on behalf of the SRI. Alexandru Balogh Former Securitate officer recuperated by the SRI. In 1998, he was chief of the surveillance service of the SRI section in Cluj. Bogdan Baltazar According to Mircea Raceanu, who has recently been decorated by Iliescu, before December 1989, Baltazar was an undercover Securitate officer. After the December 1989 events, he became an important member in the leadership of the PD [Democratic Party]. Now he is president of the Romanian Development Bank [BRD-Groupe Societe Generale]. Dumitru Badescu Former Securitate officer. Taken by the SRI, he became a general in December 1994 and managed the Economic Counterintelligence Division. He played an important role in detouring the investigation into the Cigarette 2 affair, directly participating in forging the file developed by the Military Prosecuting Magistracy. He was dismissed because he made stupid use of an informer, who talked to the press. The way in which he allowed himself to be trapped proved the very low level of his professionalism. Later, he was appointed adviser to the SRI director. Domitian Baltei Former colonel in the Securitate espionage service, deputy station chief in London and Tokyo, then station chief in Cologne. Dismissed from the service for immoral behavior and involvement in various businesses that favored Generals Nicolae Doicaru and Ion Mihai Pacepa. After being placed in the reserves, he became a professor at the Stefan Gheorghiu Academy. After December 1989, he infiltrated himself into the entourage of Corneliu Vadim Tudor [president of the Greater Romania Party, PRM], whom he intoxicated with the most fantastic information, of which some could have compromised this country's foreign relations. When the press exposed his past as a Securitate man, Vadim dismissed him as a political adviser. Ionel Bidireci Former high-ranking Securitate officer. He is now a general and chief of the SRI Counterintelligence Division. Roxana Bichel She has been mentioned by the press recently in the entourage of the management staff of the executive and the Privatization Ministry. A member of the boards of a multitude of economic companies. If by any chance she is a member of the Ivan Bikel family (Bikel was a DIE colonel, who once worked under the cover of Romanian representative of the West German Franz Kirchfeld company), we understand whom we are talking about. Mihai Bichir Former officer of the Securitate espionage service, recycled by the SIE with the rank of colonel. Director of Directorate E 101 (Europe, United States, Canada, and international bodies). He is said to be Teodor Melescanu's man, with whom he cooperated in Geneva and who helped him in his career. Ioan Bidu Former Securitate officer. Currently deputy rector of the National Intelligence Academy, which educates future SRI officers. Cornel Biris Former Securitate officer, recuperated by the SIE. On 30 November 1999, he was promoted to the rank of brigadier general. Chief of the division in charge of crisis analysis and deputy director of the SRI. Placed in the reserves in February 2002 at the request of [SIE Director] Gheorghe Fulga. Ion Bodunescu Former Securitate colonel, former chief of the MI [Interior Ministry] county inspectorates in the counties of Dolj, Mehedinti, and Teleorman. Until 1989, he distinguished himself by publishing works written by Blacks. Despite the fact that he was caught committing gross plagiarism, he continued to dedicate himself to this hobby [preceding word published in English]. In the early 1990s, his name could be found in Romania Mare, Politica, and Europa, with insipid, nostalgic, and vindictive articles, marked, of course, by ardent patriotism. Titu Bondoc Former Securitate officer, taken in by the SRI and appointed deputy chief of the SRI Section in Gorj County. In June 1990, he coordinated the journey of the miners to Bucharest. Later, he was placed in the reserves, with the rank of colonel. In May 2001, he was still under criminal investigation by the Section of Military Prosecuting Magistracies for undermining state power. Liviu Borcea Former Securitate officer, former labor camp commander at the Danube-Black Sea Canal. Due to his criminal behavior, dozens of political prisoners and common criminals died. After 1989 he retired to Cluj, and nobody has held him accountable for his crimes. Ion Botofei Former Securitate colonel, in charge of ensuring the security of Ceausescu's routes in Bucharest. For a while, he was also deputy commander of the Bucharest Municipality Securitate. After a short recycling at the SRI, he was appointed chief of the Association of Former SRI Officers, which is in fact an association of former Securitate officers. He provided the liaison between former Securitate people in the SRI management and Securitate people placed in the reserves. Valentin Constantin Bretfelean Former Securitate officer. Until September 2001, as a major, he managed the SRI Section in Maramures County. Dismissed and sent before the SRI Trial Council for serious violations of the institution's rules. So far, he has not been punished in any way. Nicolae Briceag Former Securitate officer. He summarily executed at least 12 individuals who had not been sentenced to death; these facts have been determined by the Communist authorities. After 1990, he retired to Cluj, and nobody has held him accountable for his deeds. Doru Blaj Former officer of the Securitate Fourth Directorate. He is now a lieutenant colonel and section chief in the DGIA. Constantin Bucur Former Securitate officer recycled by the SRI, where he specialized in wiretapping telephone conversations. He placed at the disposal of the press several inconclusive tapes that involved the institution in an unwanted scandal. He was dismissed on 14 June 1999, and the Military Court of Appeals sentenced him to two years in prison, suspended. Later, as a member of the PRM, he ran for office and became a deputy in the Romanian Parliament. Vasile Buliga Former Securitate officer. In recent years, he has been an employee of the Gelsor trust, managed by Vantu. Marius Tertulian Budusel Former Securitate officer. After December 1989, he was employed by the SRI and promoted, until he reached the post of section chief in Pitesti. Florin Calapod Former high-ranking Securitate officer. After December 1989, he became commander of UM 0215, the MI unit in charge of intelligence and counterintelligence, which he tried to turn into a parallel service to the SRI. The press repeatedly reported, offering concrete examples, that under Calapod's management, UM 0215 was engaged in political police activities, to the detriment of its legal duties. After having been placed in the reserves, he got involved in suspicious business with US and Australian firms that distribute Viagra illegally online. He has appeared in some television shows, lecturing the nation on what an intelligence service is all about. Cornel Caraba Former Securitate officer in UM 0110. During the last period of the Communist regime, he worked for the Securitate espionage service, namely in UM 0544: in 1986 he was temporarily transferred from there to Cluj. After December 1989, he was employed by the SRI and promoted to the rank of colonel and to the post of SRI section chief in Cluj. The press reported that he could have been one of the artisans of the 1996 Cristal plan, which sought to ensure the survival of the Securitate and the preservation of its influence as the Communist regime collapsed. Owing to his unorthodox relations with the underground economic circles of Transylvania, the local and central press attacked him. In July 1998, he was transferred to the SRI central offices in Bucharest. Mihai Caraman Retired Securitate general. In 1958-1968, as chief of the espionage station in Paris, he led the notorious "Caraman network," which managed to steal documents from NATO headquarters. Later, he was chief of the DIE Counterintelligence Division. After Pacepa's defection, he was transferred to marginal posts and eventually placed in the reserves. Immediately after the December 1989 events, he was appointed chief of the CIE, which later became the SIE. The anomaly was obvious: the espionage service of a country seeking NATO membership was left in the hands of a man who had spied on NATO. Caraman was dismissed in May 1992 at the express request of Manfred Woerner, then NATO secretary general. Currently, the same Caraman is a private adviser to Nastase. Cristian Calinoiu Former Securitate officer. After December 1989, employed by the Antiterrorist Brigade with the rank of lieutenant colonel. He was a member of that brigade, which was deployed at the Otopeni International Airport [near Bucharest]. In 1992, it was determined that he was giving job-related information to Europa magazine, edited by Ilie Neacsu, who is currently a PRM deputy. Traian Chebeleu According to Raceanu, before 1989, Chebeleu was an undercover Securitate officer in the Ministry of Foreign Affairs. In the 1990s, he became a presidential adviser and spokesman for Iliescu. Under Constantinescu, he went back to diplomacy. Mihai Ciausescu Former Securitate officer, recuperated by the SRI with the rank of captain. Officer in the surveillance service of the SRI Section in Cluj. Traian Ciceo Former officer of the Securitate espionage service. Before December 1989, he worked in Paris under diplomatic cover. There was suspicion that he might have been recruited by the French special services. Despite that, he was promoted in the SRI to the rank of brigadier general. He acted to counteract irredentism, extremism, and separatism on ethnic criteria. In March 1998, owing to his Bacchus-like inclinations, he was dismissed from the SRI. Cigan Former Securitate officer, currently a lawyer with the Bihor County Bar. As the press has reported, by offering bribe to the right people, he propelled his wife up to the post of vice president of the Court of Appeals in Oradea. Ciovica Former Securitate officer. In the SRI, he became chief of the Zonal Operative Center in Targu Mures. Placed in the reserves in 1998. Cismaru Former Securitate officer from Valcea County. As a major in the SRI, he became chief of the section in Bacau. Stefan Floricel Coman Beginning in 1968, he was a Securitate officer in the former Special Unit "T," UM 0634, empowered to wiretap telephone conversations. After the events of December 1989, he became a commander of the Special Telecommunication Service [STS], subordinated to the Country's Supreme Defense Council [CSAT]. Costel Ciuca Former officer of the Securitate DIE. Close ties with people involved in the Cigarette 2 smuggling affair. Close ties with Amer Obeid, president of the League of Iraqis in Romania. Valentin Ciuca Former Securitate officer, arrested in December 1989 and investigated as a member of the Timisoara lot. After two years and some months, he was released from prison, for lack of evidence. With Radu Tinu, he founded the Tival Impex SRL company, which prospered during the embargo imposed on Yugoslavia. Gheorghe Cocos Former high-ranking officer of the Securitate espionage service. He worked in Italy under the cover of chief of the Economic Agency in Milan. Several years ago, he was banned from entering Italy. Currently, he is managing some of the firms that belong to George Constantin Paunescu. Constantin Constantin Former Securitate officer. As a colonel in 1989, he was chief of the UM 0215 personnel service. He is a close relative of Viorel Hrebenciuc. Marian Cornaciu Officer of the Securitate DIE. He worked for the Dunarea foreign trade enterprise. After the events of December 1989, he privatized, specializing in selling concentrated fodder for cattle. Currently, he is an important member of the Romanian Humanist Party [PUR], led by Dan Voiculescu. Corneci Former Securitate colonel. He is currently a member of the SRI management in charge of the thorny personnel issue. Valeriu Corsatea Former Securitate officer. In the SRI, he was deputy commander of the Antiterrorist Brigade. In December 1994, he was promoted to the rank of brigadier general. In 1998, he was transferred, becoming deputy chief of an SRI intelligence division. Neagu Cosma Securitate general, former chief of the Third Directorate, which was in charge of espionage, former commander of the Baneasa school for Securitate officers. After being placed in the reserves, he became executive president of the Romanian Automobile Club. In 1990, he was reactivated in the SRI as chief of the Inspection Service and adviser to Magureanu. Soon, they dismissed him. General Gheorghe Diaconescu said in an interview that Cosma allegedly tried to obtain some problematic files in the archives of the former Securitate. Lucian Costache Former Securitate captain of the MI Inspectorate in Buzau. He cooperated with Petrica Dinu in recruiting informers. After the events of December 1989, he was hired by the Buzau County Police Inspectorate. Gheorghe Cotoman Former Securitate officer, recuperated by the SRI as lieutenant colonel. In 1994, he was deputy chief of the J Formation. Ovidiu Craciun Former Securitate officer, currently lieutenant colonel, chief of the SRI Section in Piatra Neamt. Dumitru Cristea A professional psychologist, one of the worst acquisitions that Magureanu made from civilian life. As deputy SRI director and rector of the National Intelligence Institute, he was quickly promoted to the rank of general, but he had suspicious relations with female students who were subordinate to him, and this disqualified him morally, so he had to give up his post. Possibly, former Securitate officers in the SRI management stabbed him in the back, because they treated him like a stranger. Mircea Croitoru Former officer of the Securitate espionage service. For a while, he worked under diplomatic cover in London, but he was recalled in 1978 under vague circumstances. Under President Constantinescu, he was appointed ambassador to Oslo, and the press criticized this. Florentin Danciu Former Securitate officer recuperated by the SRI as a lieutenant colonel. In 1994, he was commander of Division E. Mihai Darie Former Securitate officer from 14 April 1976 to 15 April 1990, when he was placed in the reserves. Before December 1989, he monitored the Fundeni hospital. In 1990, he specialized as chief of the FSN economic commission. At the same time he established and managed various private firms. He returned to politics as secretary general of the Bucharest Prefecture. In 1997, he was executive secretary of the PD. Like any important former Securitate man, he has a certificate for fighting for the victory of the Romanian revolution. Gheorghe Dascalu Former undercover DIE officer. Physical therapist, settled in Desenzano, Brescia Province, Italy. Involved in the Porcelain smuggling affair. In 2000, he was reported to have German and Romanian citizenships and an Italian identity document. Stefan David Former Securitate colonel with a dubious past. Until 1985, he managed the Securitate service in Caras Severin County. In the 1992-1996 Parliament, he was a deputy representing the Socialist Labor Party. Daniel Daianu Former officer of the Securitate espionage service, a fact he admitted to after becoming finance minister in the Victor Ciorbea government. The prime minister defended him, saying he allegedly did not conduct political police activities. Aurealian Deaconescu Former Securitate officer. Currently chief of the Fraud Service in the Astra insurance company. He was involved in defrauding the company to Vantu's benefit. Constantin Decu Former Securitate officer, recuperated by the SRI as colonel. In the mid-1990s, he was chief of the SRI section in Constanta. Dumitru Diaconescu Former Securitate colonel, personnel chief of the Bucharest Municipality Securitate. After December 1989, he managed the Aliance Coop company, which was involved in arms trafficking. He had shady financial relations with Bankcoop, a bank that was deliberately led to bankruptcy, and with the military company Romtehnica. Gheorghe Diaconescu Former colonel with the Securitate Third Directorate, which was in charge of counterespionage. After December 1989 he became deputy director of the SRI. Dismissed for illegally possessing documents of the former Securitate, alcoholism, and the incorrect handling of hard currency funds. Later, he ensured the intelligence protection of the deals made by businessman Costel Bobic. Nicolae Dinca Former Securitate officer, taken into the SRI as major. At first, he worked for the SRI Section in Timis County. In July 1998, he was transferred and became deputy chief of the SRI Section in Cluj. Petrica Dinu Former counterintelligence captain at the Buzau County Securitate. There, under cover of representing the Frigo Service, he organized a center to recruit informers. After the events of December 1989, he became chief of the service in charge of protecting personnel in the Buzau County Police Inspectorate, and he was involved in monitoring and harassing the opponents of the Iliescu regime. Doban Former Securitate officer, specialized in "bourgeois" political parties and people who were convicted for political reasons. He managed the file on philosopher Constantin Noica, who was monitored [by the Securitate]. Dimitrie Dobre Former high-ranking officer of the Securitate espionage service, he continued his activity after December 1989 in the SIE. In March 1998, after being promoted to the rank of general, he was placed in the reserves. Vasile Doros Former Securitate colonel, former chief of the SRI Section in Bacau, which he managed for eight years. Through his son, Claudiu Doros, he led the FNI local branch in Bacau, an institution that was deliberately led to bankruptcy by Vantu. Dragoman Former Securitate officer recuperated by the SRI as colonel. In 1998, he was chief of the SRI Section in Arad. Ion Dragoi Former Securitate officer in UM 0110. After December 1989, he became section chief of Politia Romana [Romanian Police] magazine. After being placed in the reserves, he worked for various publications, including Expres magazine (the Cornel Nistorescu series). Currently, he is looking for sponsors to publish an espionage and counterespionage publication. Artur Dumitrescu Prosecutor, an active collaborator of the Securitate before December 1989. Among other things, he was the one who investigated those who participated in the protest rally against the Communist regime in Brasov on 15 November 1987. For his zeal at the time, he was promoted, and he kept his prerogatives after Ceausescu's regime was ousted, as well. In 1998 he was delegated to investigate the Cigarette 2 smuggling affair, namely to erase the traces of the intelligence services' involvement in that con job. Gheorghe Dumitrescu Former Securitate officer. When Cigarette 2 was unfolding, he was a captain with the SRI surveillance service. Vasile Dumitru Former Securitate colonel in the espionage service. He worked undercover as a press attache in London. After December 1989, he specialized as a journalist working for the Expres press trust. He published various articles wherever and whenever he could, exalting the ineptness of the institution he was once a member of. Nicodim Farcas Former Securitate officer, recycled by the SRI as a lieutenant colonel, subordinated to Colonel Ghoerghe Moldovan at the SRI Section in Maramures County. There were reports that he gave information from inside the service to the PUNR [Romanian National Unity Party]. Virgil Faur Former officer of the Securitate espionage service, recycled by the SIE as a colonel. Filip Former Securitate officer, a CI [expansion not given] at the Cluj army command. Recuperated by the SRI as a colonel. Florea Former Securitate officer. As a major in the SRI, he was chief of the SRI Section in Harghita County. Gheorghe Alexandru Florea Former Securitate officer recuperated by the SRI as colonel. In 1994, he was chief of the SRI General Secretariat. Ioan Florian Former Securitate officer. In 1998 he was chief of the SRI Section in Buzau. Previously, he managed the Zonal Operative Center in Cluj. Nicolae Garofeanu Former Securitate officer. Recuperated by the SRI, he became the first chief of the Pitesti section. The press published documents that showed the exposure of old informers and political police preoccupations similar to those he had before December 1989. Ion Petre Gavrilescu He was a higher-ranking officer in the former Securitate's espionage department. In 2000, he was brought back to active service in the SIE through a presidential decree. He was promoted to the rank of division general. His true identity triggered controversial debates. A little bit more than one year later, he was passed again into the reserves. Mircea Gheordunescu He used to work as a physics teacher at a Bucharest high school [Spiru Haret]. Until 1989, he was one of the former Securitate's informants. Later, he entered the political life. He joined the PNTCD. In 1996, he was appointed as a deputy director in the Romanian Intelligence Service. Many people who were familiar with his past used to blackmail him. That is why, from the position he had at that time, he favored many fraudulent privatization processes, such as those involving a chain of food shops in Bucharest and the Bucharest Hotel. Dan Gheorghe He is a former Securitate officer. He was the deputy commanding officer of the special unit in charge of antiterrorism. He was an active participant in the attempt to reprimand the street actions that led to Nicolae Ceausescu's fall. In December 1989 -- the media also wrote about this -- in his capacity as the head of the defense unit at the Otopeni International Airport, he allowed approximately 50 Securitate officers to flee abroad by using counterfeit documents. After December 1989, he was appointed head of the SRI's antiterrorist brigade. For a short while, he worked for the UM 0215. This unit had more expertise in the field of the political police than in anything else. After that, he was briefly the director of the Universul news agency while Sorin Ovidiu Vantu owned it. The agency was accused of having been an intelligence service, working in parallel with the similar state services. Dan Gherghe came back to the SRI as an aide to the body's new director, Radu Timofte. On 1 November 2001 he resigned from office. However, he continues to be present in ruling circles. Gheorghe Gherghina He is a former Securitate officer, Colonel Gheorghe Ardelean's deputy (former Moise Bula) at the USLA's [Special Unit To Fight Terrorism] leadership. After having been re-trained in the SRI, he was Ion Botofei's successor in the leadership of the Former SRI's Officers' Association, which is in fact an association of former Securitate officers. He ensures the connection between the former Securitate officers currently in the SRI's leadership and those in the reserves. Dan Ghibernea Before 1989, a person with an identical name was an undercover officer in the former Securitate's espionage department. He was accredited as an international civil servant at UNESCO. At the moment, the Dan Ghibernea we refer to is Romania's ambassador to the United Kingdom. Marius Ghile A former Securitate officer in the Second Directorate for economic counterintelligence. He was an expert in Hungarian counterespionage. In 2000, he was appointed as the head of the SRI Salaj County's branch. Benone Ghinea A former officer in the Securitate's espionage department. After the December 1989 events, he was brought back into active service in the SIE. He was sent to South Africa as an undercover agent, acting as a commercial attache. He involved himself in some suspect deals with Puma helicopters and cashed some undue commission fees. He was sent to court and received a mild sentence, just "fit" for a former Securitate officer. Mihai Ghita A former Securitate officer, currently a colonel, and head of the SRI's Slatina branch. Nicolae Goia A former Securitate officer. Currently a member of the Foreign Intelligence Service's leadership. In February 2002, he was promoted to the rank of brigadier general. Nicolae Dorel Goron A former Securitate officer. Currently a colonel and the incumbent head of the SRI's Arad branch. Grama A former Securitate counterintelligence officer. Following the December 1989 events, the SRI rehabilitated him with the rank of a Colonel. In a short while, he was appointed as the head of the human resources staff in the "G" Division (logistics). Ilie Anghel Gradinaru A former Securitate officer. In the SRI, he was promoted to the position of head of the department for religious cult-sects in the SRI Constanta County branch. He holds the rank of major. In the spring of 2000, he was noticed while keeping the PDSR's [Social Democracy Party of Romania] staff under surveillance during their visit to Constanta. Corneliu Grigoras A former officer in the Securitate's espionage department. He was kept in the system after the events in December 1989, too. On the eve of the 1996 elections, he monitored the moves made in the CDR's [Romanian Democratic Convention] headquarters for the PDSR's benefit. Nevertheless, during Emil Constantinescu's presidential mandate he was promoted to the rank of general and appointed to the General Counterespionage Directorate in the SIE. Two journalists staged a trap for him. He proved to be a stupid person, fell into this trap, and was removed from office. Eugen Grigorescu A former Securitate officer. In the SRI's structures, he was promoted to colonel and then to brigadier general. He is the head of the technical expertise division, code-named Division "S." Gugiu A former Securitate colonel. When the former SRI Officers' Association was set up, he was appointed its cashier. Nicolae Constantin Hateganu A former Securitate officer. Chairman of the Astra Insurance Company's administrative board. His role is still unclear in the damages brought against the company in Sorin Ovidiu Vantu's favor. He was removed from office in March 2001. At the moment, he is being investigated. Ioan Hancu A former Securitate officer. In the SRI, with the rank of colonel, he became the deputy head of the Cluj field branch. He was removed from office in July 1998. Gheorghe Huidu A former Securitate officer. He kept the Romanian Radio Public Station under surveillance. After December 1989, the SRI recovered him with the rank of colonel. The project of the extremist magazine Europa, led by Ilie Neacsu, was drafted at his residence. Neacsu, a former PRM MP, passed with bag and baggage to the PSD. Bujorel Iamandi A former Securitate officer. After being recruited into the SRI, he was promoted to the rank of general. He was promoted to the position of head of the Counterintelligence Department, currently called the Protection Department. He was removed from office following the Timofte-KGB [SRI's incumbent director's alleged ties with the KGB] scandal. Vasile Valeriu Iancu A former Securitate colonel. Currently, the SRI director's first deputy. On 30 November 1999, he was promoted to brigadier general. Before December 1989 he worked within the foreign counterintelligence unit in the UM 0215, which was set after General Ion Mihai Pacepa's defection. He also worked in the UM 0544, for foreign counterintelligence. After the revolution, he was appointed the first head of the SRI's Counterintelligence Directorate. Then he was appointed as head of the SRI's oversight body. Teodor Ilies A former officer in the Securitate's Directorate for Foreign Intelligence. At the moment he is in the leading team of the SC [commercial company] Alliancecoop. During 1995-1996, the Army's Procurement Department contacted him for the purpose of facilitating some dubious arms exports. Florian Ioan A former Securitate officer. He was brought back to active service in the presidential bodyguard and protection service, where he was promoted to colonel. In 1998, he was passed into the reserves due to health-related causes. He has placed himself at the disposal of controversial businessman Sorin Ovidiu Vantu. In this capacity, he set up a paramilitary service in the village of Corbeanca [close to Bucharest]. Its missions included surveillance and escort activities, and even abducting people. Alexandru Iordache A former Securitate officer and expert in criminal investigations. On 31 December 1990, he was passed into the reserves, upon request, from the Romanian Intelligence Service. He was involved in smuggling cigarettes from Cyprus. Through these operations, he brought damages amounting to $110 million to the Romanian State. On 15 July 2001, he was brought back to active service for a short while in the SRI. At the moment he is a personal legal aide to General Zaharia Toma, who is a secretary of state in the Interior Ministry. It has been pointed out Iordache allegedly has bank accounts in Switzerland at the BNP Schweiz. Nicolae Iosub A former officer in the Securitate's Fourth Directorate. Currently a colonel, he is a department head in the Army's General Directorate of Intelligence. Virgil Irimia A former higher-ranking Securitate officer. The SRI recovered him with the rank of colonel. Immediately after the December 1989 events, he became the deputy head of the SRI's Botosani County branch. He was removed from office on charges of being involved in deals carried out by some dubious companies in that county. Nicolae Irinoiu A former high-ranking officer in the Securitate's espionage department. He was kept in the system some time after the 1996 elections. He carried out intelligence missions in the United States and in Turkey. He was passed into reserves with the rank of general. Juverdeanu A former Securitate officer recovered by the SRI with the rank of major. He was passed into the reserves following some blackmail activities carried out by resorting to counterfeit documents. Mihai Lazar A former Securitate officer at the Dunarea foreign trade company, which was under the Securitate's control. At the moment, he is a general manager at Grivco International SA. Pavel Lascut Before 1989, he was an officer within the Foreign Intelligence Center [CIE]. He was the office head in the Department for France-Benelux-Spain-Portugal in the Europe Division. He also carried out missions abroad, under the cover of a commercial representative in Spain and Portugal. During the Constantinescu regime, he was appointed as a deputy director in the Customs Directorate. Tudor Lica A former Securitate officer. In the summer of 2000, he was appointed as head of the department in charge of parallel intelligence offices in the SRI's Division "A." Dan Lungu A former Securitate officer. After December 1989, he was employed in the SRI's Buzau branch with the rank of captain. It is known that he has attempted to recruit a female journalist from the local daily Opinia. Vasile Lupu A former Securitate officer in the UM 0110. Quite inadequately, this unit was considered to be a structure meant to fight the KGB agents in Romania. In fact, the unit used to manufacture arguments, based on which the people who fell into Nicolae Ceausescu's disfavor were charged with spying for the Soviet Union. This method was meant to misinform public opinion, which was sensitive to any Russian threat. After the December 1989 events, he was recruited into the SRI's structures. In a short time, more precisely on 27 March 1994, he was appointed as head of the Counterintelligence Directorate. He was the SRI's first deputy director in two legislatures, under Virgil Magureanu and Costin Georgescu's mandates. Throughout this period, he made considerable efforts to strengthen the former Securitate officers' influence in all fields of political, economic, and social life. On 30 November 1999, he was promoted to Army Corps general. Much earlier, the media pointed out the fact that his successive promotions were the result of intervention by influential people whom he had kept under surveillance in the past. Most of them are important people in the state. Because he was unable to get rid of the specific methods of the UM 0110, he was involved in publicly launching the misinformation that the SRI's future director, Radu Timofte, was allegedly recruited by the KGB. He was passed into reserves as an Army Corps general. Victor Marcu A general in the reserves. He was an active staff member of the former Securitate and headed an office within the former Center for Foreign Intelligence. He was in charge of Romania's immigration problems. Then he was transferred to the Romanian Intelligence Service. For a short time, he was director Virgil Magureanu's first deputy. After he had a conflict with the latter, Marcu was removed from his position and from the SRI in 1995. He was charged with having business relations with Arab mafiosi. His records include the obscure coordination of the dubious deals developed by the SC Macons & Co SA Company, registered in Belgium. His daughter, Anca Steliana Marcu, was the company's main shareholder. However, he remained a reliable person at the Cotroceni [presidential] palace. At one point, with support from some obscure forces, he succeeded in setting up a customs checkpoint downtown Bucharest. He was to administer it together with his circle of friends. When the media exposed the illegal deal, the customs checkpoint vanished into thin air, as if it had never existed. After the November 2000 elections, Victor Marcu was appointed deputy minister in the Privatization Ministry. He held the position of undersecretary of state. Quite cautiously, he forwarded his resignation shortly before the emergence of the scandal around Sorin Ovidiu Vantu and the fraudulent deeds that were carried out to the detriment of the Astra Insurance Company. Marian Matei A former Securitate officer in the Military Academy's counterintelligence department. He is married to the former Communist leader Ion Dinca's niece. In December 1989, he was found armed in the PCR [Romanian Communist Party] CC's [Central Committee] headquarters. He was a lieutenant colonel at the time and was a member of the team appointed to protect the former dictator Ceausescu. On 24 March 1990, the SRI employed him after intervention by Mihai Stan. A short time later, he was promoted to brigadier general. Dumitru Mazilu A former Securitate officer, the former commanding officer at the Baneasa Securitate school from 1965-1967. He was removed from office following his attempt to counterfeit some documents related to a car accident. He was reoriented toward diplomacy. He also played the role of dissident. Immediately after December 1989, he emerged on the political scene as a vice president of the National Salvation Front's Council. In one of the confused days of January 1990, he climbed up on a tank and shouted what the civilians that had taken to the streets never did: "Death to the former Securitate officers!" After having committed himself in something that looked like a coup d'etat, he left for Switzerland for quite some time. He came back to Bucharest later, when people had already forgotten him. At the moment, he is the vice president of a UN commission. Virgil Magureanu The first head of the Romanian Intelligence Service, which was officially set up in March 1990. This body started to structure itself in the first days of that same year. In April 1992, journalist Ioan Itu published Magureanu's file. The latter was a former officer in the syntheses department of the Securitate's Foreign Intelligence Directorate [DIE]. In December 1995, Magureanu himself published his file as a former Securitate informant. Most probably, he had been warned that a major publication was about to do the same thing. Vasile Maierean A former Securitate Colonel. He was involved in culture and art problems. At the moment, he is working in the SIE. On 30 November 1999, he was promoted to brigadier general. Vasile Malureanu A colonel in the former Securitate's structures. A general in the current Romanian Intelligence Service's structures. Vlad Margineanu A former Securitate officer, the former head of the SRI's Brasov branch. He is one of the Romanian Discount Bank's [BRS] founders. The bank was deliberately brought to bankruptcy in 2002, after $17 million had disappeared from the Astra Insurance Company's account. Stefan Masu A former high-ranking Securitate officer. After the December 1989 events, he was briefly the deputy head of the SRI Prahova County's branch. Then he started to do businesses on his own. Among other things, he was one of the shareholders of the dubious SC Macons & Co. SA Company, registered in Belgium. Mecu A high-ranking Securitate officer recovered by the SRI. He was promoted to the rank of general. He is the commanding officer of the SRI's Bran Office. Teodor Melescanu According to statements by Mircea Raceanu, whom President Iliescu has recently granted an award, before 1989, Melescanu was a former Securitate officer under diplomatic cover. After the [December 1989] revolution, he was appointed foreign minister. Later on, he established the Alliance for Romania party [ApR], which he led to total disaster. He ran for president and lost. Ilie Merce A former Securitate colonel. He was the head of the art-culture department in the former Securitate's First Directorate. During 1985-1986, he led the Eterul Department, whose mission was to combat the foreign radio stations that used to broadcast in Romanian. Later, he was appointed head of the Securitate's Buzau County branch. After December 1989, he remained in the Romanian Intelligence Service. He was removed from office due to many inadequate deeds and to the open sabotage carried out against the body's leadership. He was passed into the reserves. He joined the Greater Romania Party, where he went up the hierarchy, until he became the party's first vice president. In the November 2000 elections, he ran on this party's slates. He was elected as an MP. Later, it was proved he had been involved in political police activities. At the moment, he is currently involved in a lawsuit filed by the victims of one of his deeds. Sever Mesca A former Securitate officer in the espionage department. He carried out missions in Italy and the United Kingdom. At the moment, after having been an important member of the Greater Romania Party, on whose slates he had been elected as an MP, he passed into the PSD's camp. He is currently engaged in an argument with the head of his former party. Iosif Mircea Miclea A former Securitate officer, currently a lieutenant colonel, the head of the SRI's Maramures County branch. Lionel Micu A former Securitate officer. After the December 1989 events, he vanished abroad. At the onset of 1999, he was expelled from Canada after being identified as "a member of the former Romanian Securitate and an accomplice to many atrocities." Mircea Miron A former Securitate officer. The SRI recovered him. He became the first head of the Alba Iulia office. An officer under his subordination sent intimidating letters to some opposition members' addresses. Victor Mitran A former Securitate officer in the espionage department. After he displayed abnormal behavior during a drill in Yugoslavia, he was subjected to a medical checkup. He was found to be suffering from paranoia. He was passed into the reserves. Immediately after December 1989, he was brought back to active service within the SRI. However, he damaged the service's image after he published a series of completely phantasmagoric information in the media. He also wrote a book full of completely stupid things. He continues to create confusion in the public opinion on various television shows. Ioan Mocan A former Securitate officer, currently the head of the SRI's Bistrita-Nasaud County branch. Cornel Moga A former Securitate officer. During Emil Constantinescu's regime, he was appointed as the head of the SRI Bihor County branch. A former political prisoner informed the media about the fact that Moga had conducted political police activities before 1989. He said the latter had searched and had even beaten him. Jean Moldoveanu A former Securitate officer, the former commanding officer of the Securitate troops. After the December 1989 events, he was the first head of the Romanian Police forces. Gheorghe Moldovan A former Securitate colonel who was recovered by the SRI. In the first half of the 1990s, he was appointed as the head of the SRI Maramures branch. He was removed from office for having wiretapped some UDMR [Hungarian Democratic Union of Romania -- RMDSZ] local leaders' phones. He claimed he had carried out this mission at Virgil Magureanu's order. However, he failed to provide the slightest evidence in this respect. He was sentenced, but his sentence was suspended. Ion Alexandru Munteanu A former Securitate officer within the Independent "D" [Misinformation] Service. After that, he was in charge of the surveillance of foreign students at the Bucharest University Center. It was found he had been involved in various onerous deals with them. He was demoted, sent to court, and sentenced to several years in prison. After the December 1989 events, he was released from prison. He went through a series of dubious promotions. A little more than two years later, he was promoted from the rank of a soldier to that of a general. He was appointed as general director of the State Archives. He was an important member of the Greater Romania Party. Deceased. Vasile Munteanu He is suspected of having been one of the former Securitate's undercover officers. The Romanian Intelligence Service took him over, too. As the head of the Otopeni cargo customs office, his duties also included ensuring the facilities requested by the special transports of commodities. He was involved in the Cigarette 2 smuggling deal. Constantin Muraru A former Securitate officer. Currently a colonel, the head of the SRI's Suceava County branch. Ionel Muresan A former high-ranking Securitate officer, recovered by the SRI with the rank of colonel. In 1998, he was leading the counterintelligence service of the department in which he had been employed. Victor Nacu A former Securitate officer, re-employed in the SRI's Bacau County branch. Not long ago he was transferred to the Bucharest head unit. Nicolae Nadejde A former colonel in the Securitate's espionage department. In 1983, he was appointed as the DIE's representative in a shadow company, Marsue Holding, meant to cover the activity carried out by some Romanian agents abroad. He retired in 1986 while holding the same position. After December 1989, he was compelled to transfer the money in the company's bank account to an SRL [limited responsibility company] company's bank account. He refused to do it. In 1993, the Foreign Intelligence Service filed charges against him for embezzlement of funds. The gesture was far from the espionage people's habits, which used to launder their dirty linen at home. Consequently, it remains to be seen what is hiding behind the Marsue deal. Victor Nanescu A former high-ranking officer in the Securitate's espionage department. He was kept in the system not too long after the 1996 elections. He was passed into the reserves with the rank of general. Toma Nastase A former Securitate colonel within the Independent "D" (Misinformation) Department. He was brought back into active service in the SRI for a short while. After that, he was passed into the reserves. He became an important member of the Greater Romania Party. From that position, he used the information obtained while he was in office in public life. Deceased. Grigore Neciu A former Securitate officer, [Communist] party secretary of the Cluj County Securitate Inspectorate. In 1998, he was the head of the UM 0215 in Cluj. Aurelian Neferoiu A former Securitate major, the deputy head of the Fifth Office in USLA. After December 1989, he was appointed general manager of the state office for the government's special problems. In 1997, he was Mircea Gheordunescu's deputy at the leadership of the National Agency for the Control on Strategic Exports and Chemical Weapons Ban [ANCESIAC]. Misu Negritoiu According to the statements by Mircea Raceanu, whom President Ion Iliescu has recently granted an award, Negritoiu was an undercover Securitate officer. After 1989, he played an important role in the Romanian power structures. Andrei Nica A former Securitate officer, recovered by the SRI with the rank of lieutenant colonel. In 1994, he was a member of the "B" Counterintelligence Directorate's leadership. Nicolae M Nicolae A former undercover officer in the Foreign Intelligence Directorate. He was removed from that position following General Ion Mihai Pacepa's defection. He was a former foreign trade minister and Romania's ambassador to Washington during Nicolae Ceausescu's regime. In the first post-revolutionary Romanian Government, he returned to the leadership of Romania's foreign trade. Constantin Nicolescu A former officer in the Securitate's espionage department, currently a senator for Arges County. He is the chairman of the Parliament's SIE Oversight Committee. Dumitru Nicusor A former Securitate officer. In the SRI, he was the head of the Dobruja's Regional Operational Center. In 1994, he was promoted to the rank of brigadier general. Carol Nihta A former Securitate officer. Currently a lieutenant colonel, the head of the SRI's Resita branch, Caras-Severin County. Ogasanu A former Securitate officer, re-employed by the SRI. With the rank of general, he led the SRI's Operation Center in Transylvania. After passing into the reserves, he became the director of the Gelsor branch in Oradea. He played an important role in the National Investment Fund's [FNI] collapse. Emil Olariu A former high-ranking Securitate officer, recovered by the SRI, with the rank of colonel. In 1998, he worked in the SRI's Harghita County branch. Otelea General Otelea's son, from the Steaua sports club. He was an officer in the Securitate's Fourth Directorate. At the moment, he is a colonel in the Army's General Directorate for Intelligence. Valerica Pamfil A former Securitate officer. In the SRI, he was appointed as office head in the Anti-terrorist Brigade with the rank of lieutenantcolonel. He was charged with influence peddling. Gheorghe Pasc He was a former Securitate major before 1989. Later, during Virgil Magureanu's mandate, he was promoted to the rank of lieutenant colonel and then to colonel. He was promoted as head of the "F" Division in the SRI, which used to store computer data and managed the institution's archives. Before the establishment of the National Council in Charge of Studying the Former Securitate Archives [CNSAS], a civil body that should be the same thing as the Gauck Institute in Germany, he retired due to health-related problems. He set up a security guard and protection company. In 1999, when the CNSAS was established, nobody knows what methods he used, but he succeeded in obtaining the exclusive right for his company to ensure the guarding and protection for the aforementioned council. At the CNSAS' headquarters, he installed various pieces of special equipment. Supposedly, many microphones controlled from outside are among these devices. Thus, those who reportedly have to study the former Securitate's behavior are still at the Securitate's mercy. All of their moves are allegedly being kept under control. Petre Pavel A former Securitate officer, taken over in the SRI's structures with rank of colonel. After having passed into the reserves, he helped manufacture a counterfeit commitment in the Division "S" laboratories, proving its author was as a former Securitate informant, to Senator Corneliu Vadim Tudor's detriment and to the benefit of Ziua. George Constantin Paunescu A former undercover Securitate officer. In this capacity, before 1989, he led the Romanian Economic Agency in Milan. He was and perhaps still is banned from entering Italy. The Italian special services know more about him than the SRI claims to know. He runs his operations in Italy via a branch in the Swiss canton of Ticino. In 1996, when he was subjected to some criminal investigations, he fled the country, at first to Switzerland, under the pretext of a medical treatment. Then he settled temporarily in the United States. From that position, he sponsored several of Ion Iliescu and Adrian Nastase's trips across the Atlantic Ocean, with the help of the lobbyist called the Eurasia Group, with a majority Russian capital. Petru Pele A former Securitate officer. In the SRI, he was appointed head of the SRI's Timisoara branch. He had a conflict with Virgil Magureanu. His file, which proved he was a former collaborator for the local Securitate, was made public. He was removed from the system and currently has dedicated himself to his businesses. Cornel Pentelie A former Securitate officer. He was later promoted to the rank of major within the SRI. His true name has the initials DM. He worked under General Dumitru Badescu, who was the head of the division in charge of economic counterintelligence. He was present in the unit that carried out the "Cigarette 2" smuggling operation. He was identified as such on the video recordings made at the airport. Corneliu Petre A former Securitate officer in the Third Directorate for Counterespionage. After December 1989, he was passed into the reserves. Later, he involved himself in various businesses with persons working for the Russian Lukoil Company. Stelian Pintilie A former Securitate General, appointed as the minister of postal services and telecommunications in the first government after December 1989. At the moment, he is running various businesses, also in the telecommunications field, along with STS head General Tudor Tanase. Among other things, he worked as a councilor to the Ericsson Company, which was among the main players involved in the scandal related to the Romanian Army's transmissions system. Ion Pinta A former Securitate officer. He was the first head of the SRI's Gorj County branch. He had the rank of colonel. He took part in the June 1990 miners' incursion. He directed the miners' travel to Bucharest. Later, he was employed in SRI's central unit in Bucharest. In May 2001, he had the same position, although the legal system's bodies were conducting an investigation against him. He was charged with undermining state power. Radu Podgoreanu A former Securitate general's son-in-law. At the moment, he is the chairman of the Chamber of Deputies' Foreign Policy Committee. Gabriel Polmolea A former Securitate officer in Brasov. The SRI took him over. At first, he was the deputy head of the SRI's Dolj County branch. When his superior was ousted, he was appointed leader of the branch. In June 1994, he was appointed head of the Oltenia Region's Operational Center. Dumitru Pop A former Securitate officer. In the SRI, with the rank of a colonel, he was appointed as the deputy head of the SRI's Cluj County branch. He was removed from office in July 1998. Viorel Pop A former Securitate officer, re-trained in the SRI with the rank of lieutenant colonel. He was Gheorghe Moldovan's subordinate in the SRI's Maramures County branch. It has been reported he used to provide information from inside the service to the PUNR [Romanian National Unity Party]. Ioan Popa A former officer in the Securitate's espionage department, re-trained in the SIE, with the rank of colonel. He headed the Directorate for Synthesis and Analysis for some time. Doru Popescu A former Securitate officer. After the December 1989 events, he fled abroad and disappeared. In early 1999, he was expelled from Canada after being identified as "a member of the former Romanian Securitate and an accomplice to many atrocities." Ion Popescu A former Securitate colonel. During his espionage-related activities in Paris, his mission was to compromise priest Vasile Boldeanu and to transfer the Romanian Christian Orthodox Church in France's capital under the Bucharest Patriarchy's authority. His mission failed. He was asked to return to Romania. He continued to work as an undercover officer. He was appointed as the head of the Department for Religious Cults. After December 1989, with support from some high-ranking clergy, with whom he had probably used to work, he set up the International Bank of Religions. The dubious sponsorships, along with the mismanagement of funds, have ultimately brought this bank's sonorous bankruptcy. Other former Securitate officers, tied to the incumbent ruling party, were also involved in this bankruptcy. Poporoaga A former low-ranking Securitate officer, recovered by the SRI, in the surveillance division. He fell into a trap on the occasion of the Anda Terrace scandal. Alexandru Constantin Postelnicu A former Securitate officer. After the December 1989 events, he was promoted to the rank of general and he was the first head of the SRI's Dolj County branch. He tried to recruit journalists from troublesome media circles in Craiova. The local media focused on his activities. It succeeded in taking his picture in a professional situation. He was removed from office. Obviously, he has started to run his own businesses. Ioan Preda A former Securitate officer. In the SRI, with the rank of colonel, he was appointed as head of the Constanta County branch. Ristea Priboi A former Securitate colonel. He was an active staff member of the UM 0199, which was a sub-unit of the espionage department, which dealt with European territory. Starting in May 1988, he was transferred to the UM 0225, another sub-unit dealing with espionage activities. This unit was involved in infiltrating Romanian immigrants in Europe and fighting the foreign radio stations that used to broadcast in Romanian. Some former Securitate officers say that, before 1989, he trained incumbent Romanian Prime Minister Adrian Nastase to place him in the West as an undercover agent. The operation was to take place in 1990. However, the December 1989 revolution triggered the project's cancellation. Later, Ristea Priboi became Adrian Nastase's aide. Allegations say he is very close to the prime minister. Following the November 2000 elections, Adrian Nastase tried to impose Priboi as the head of the Parliament's SIE Oversight Committee. The deal failed, following the forceful intervention by the media, which had managed to find a few facts about Ristea Priboi's past. He remained Adrian Nastase's aide. From his position, he makes it easier for other former Securitate officers to enter the ruling party's structures and, implicitly, the state bodies. In December 2000, Ristea Priboi was imposed as a member of the administrative board of the SIF [Financial Investment Company] Oltenia. This allowed him to control the economic activities carried out in one of the country's important regions, in collaboration with another former Securitate officer, Dinut Staicu. A group of former Securitate officers has recently forwarded to the major media's editorial offices, to some parties, and institutions' headquarters, a letter that states that his former comrades also dislike Ristea Priboi. This letter calls the character with the comradely name "Pig!" We also happen to be familiar with some things about how Ristea Priboi plots against the incumbent prime minister's political opponents. It is impossible to explain how a cultivated person, with an education achieved in normal conditions, with masters and doctoral degrees, who has often traveled to Western countries and speaks several foreign languages, like Nastase, can bear to have such an aide close to him. Dumitru Prichici A former officer in the State Securitate Department's technical divisions. After December 1989, as an associate of the Zenith Trading Consulting Company, he illegally manufactured and traded devices for wiretapping phones. He involved his son, Codrut Prichici, in these activities, too. In the fall of 1997, after having exposed himself at a television station, he was sent to court. He was charged with violating the National Security Law. Florin Radu A former Securitate officer, recovered by the SRI with the rank of major. After having passed into the reserves, he launched himself in business. In 1997, he was subjected to an investigation for outstanding debts incurred by a bank loan. In 1998, the Democratic Party [PD] nominated him to be appointed as the head of the Financial Oversight Body in Buzau County. Nicolae Radu A former Securitate officer. He was taken over by the SRI with the rank of colonel. He led the SRI's Galati County branch. In the spring of 1994, he was transferred to Bucharest and promoted both to a higher position and to a higher rank. Niculae Radu A former Securitate officer, he was re-trained in the SRI. He was appointed as the head of the counterespionage office at the SRI's Botosani County branch. He was removed from office for alleged involvement in the deals carried out by some dubious companies in that county. Ion Raita A former Security major, recovered by the SRI. At the onset of the 1990s, he was appointed as the head of the SRI's office in Sinaia. He was passed into the reserves following the protests voiced by those who had been subjected to his investigations before December 1989. In 1992, he ran for mayor of Sinaia as an independent candidate. Stefan Ramfu A former Securitate colonel, employed in the Independent Misinformation Department. Among other things, he used to launch some fake stories abroad. According to them, some dissidents that could not be kept in the country anymore had allegedly been among the former Securitate's agents. Mathematician Mihai Botez was one of the persons who was subjected to this despicable treatment. At the moment, Ramfu is delivering expert training at the National Intelligence Institute. Gheorghe Ratiu A former Securitate colonel, the former head of the Securitate's First Directorate in charge of domestic intelligence during 1986-1989. Immediately after the December 1989 revolution, he left Romania and went abroad. He went to West Germany and returned to Romania from... China after things settled down a little bit. At the moment, he is one of businessman Sorin Ovidiu Vantu's most important councilors. Marian Rizea A former Securitate officer. He was later recruited to the SRI's structures. He led the SRI's Dambovita County branch. Aurel Rogojanu A former Securitate colonel, the former head of General Iulian Vlad's secretarial office. The latter was the head of the State Security's Directorate. When he retired from the SRI, he published a book that justifies the former Securitate's actions. At the moment, he is SRI Director Radu Timofte's aide. Viorel Ros A former Securitate officer, he graduated from the Baneasa School for active staff members of the Interior Ministry. He worked for the UM 0279 as an expert in foreign intelligence. Starting in 1979, when he was passed into the reserves, he worked in the legal system. In 1993, he was appointed as chairman of the Bucharest Court of Justice. Constantin Rotaru A former Securitate colonel, currently a general, the deputy director of the Foreign Intelligence Service. Before December 1989, he was the deputy director at the ICE [foreign trade company] Dunarea. He remained in that positions in the early 1990s, too. He left the system temporarily. He led the Intact media trust. He has a close collaboration with businessman Dan Voiculescu [owner of the Antena 1 private television station] at the moment. The latter was the endorser of the Crescent Company, another one of the former Securitate companies, with its headquarters Cyprus. In fact, according to the information published by the media, through General Constantin Rotaru, the SIE manages and grants protection to several of Dan Voiculescu's companies. Cornel Rudareanu A former Securitate colonel. At the moment, he is one of businessman Sorin Ovidiu Vantu's advisers. Valer Rus The former head of the SRI's Turda branch. He is an expert in irredentism-related matters. The SRI took him over in its structures with the rank of Colonel, as an expert in the problems of ethnic minorities. In 1998, he was the head of the SPP's [Guard and Protection Service] structure in Transylvania. Rusan A former high-ranking Securitate officer, recovered by the SRI, with the rank of colonel. Before December 1989, he used to work hand in hand with General Vasile Lupu, who took Rusan with him. In the mid-1990s, Colonel Rusan was appointed head of the Surveillance Directorate. Ion Rusu Alias Ion Prigoreanu. A former Securitate major. He was a French teacher at the Interior Ministry's school for active officers at Baneasa. In the years before December 1989, he worked as an undercover agent, as an employee of the Agerpres news agency. Immediately after December 1989, he was appointed as a general secretary of Zig Zag magazine's editorial office (the Ion Cristoiu series). At present he teaches French at a Bucharest high school, after having earned his doctorate on the basis of articles written by other people. Vasile Rusu A former high-ranking officer in the Securitate's espionage department. After December 1989, he continued to work within the SIE. In March 1998, after being promoted to the rank of brigadier general, he was passed into the reserves. Ion Savonea A former Securitate first lieutenant in Sinaia. During the first months of 1990, he was involved in the violation of the local Securitate archives' seals. Ion Sabareanu A former Securitate officer. In the SRI, he was appointed deputy head of the antiterrorist Brigade, with the rank of lieutenant colonel. He was charged with influence peddling. Cornel Satmareanu A former officer in the former Securitate military counter-espionage and counter-intelligence departments (Third and Fourth Directorates, respectively). He was passed into the reserves in 1991. However, he was kept in the structures parallel to the active structures. In 1999, he was asked to testify as a defense witness in the lawsuit filed by former President Emil Constantinescu against Andrei Zeno. The latter accused the head of state of being a foreign power's alleged agent. Vasile Secares According to statements by Mircea Raceanu, whom President Ion Iliescu has recently granted an award, Secares was an undercover Securitate officer before 1989. He was a member of the teaching staff at the [former] "Stefan Gheorghiu" [only for party members in leading communist structures] Academy. After the December 1989 Revolution, he became an important member of the innovative group "A Future for Romania." At present, he is the rector of the Academy for Political and Administrative Sciences. This is also some kind of "Stefan Gheorghiu," but with a different shape. Constantin Silinescu A former Securitate colonel. He was an operative agent abroad during 1974-1984. He was an office head in the communist espionage department. After December 1989, he was kept in the system. He was promoted to general. He was promoted to be deputy director of the Foreign Intelligence Service. He collaborated with General Florentin Popa in operations involving arms trafficking. Following a conflict with General Ioan Talpes, the SIE director, he was passed into the reserves. After the 2000 elections, he became one of Prime Minister Adrian Nastase's aides. He currently holds the same position. Ion Tomita Sima A former Securitate officer. He was a colonel, with a PhD in engineering, in the Special Telecommunications Service. On 30 November 1999, he was promoted to brigadier general. Tiberiu Simon A former Securitate officer. He is currently a lieutenant colonel and the head of the SRI's Bacau County branch. Ovidiu Soare A former Securitate officer within the Fifth Directorate, which dealt with ensuring the guard and protection of former Communist dignitaries. He ensured Nicu Ceausescu's protection and guard and then that of Alexandrina Gainuse. During the December 1989 events, he sought refuge in the Militia's Section 1. At present, he is the head of the SRI's "A" Division. Vlad Soare A former Securitate undercover officer in the Romanian Bank for Foreign Trade [Bancorex]. He contributed to the bank's bankruptcy after December 1989. At present, he is the chairman of the Gelsor financial group, which is the property of businessman Sorin Ovidiu Vantu. Sobolu A former officer in the Securitate's Fourth Directorate. He is currently a colonel and an office head in the Army's General Directorate for Intelligence. George Sotir A former officer in the Securitate's Fourth Directorate. At present, he is a colonel and the head of the Air Forces service in the Army's General Directorate for Intelligence. Ilie Suba A former Securitate officer in the Bucharest Municipality's branch. He was an expert in youth- and student-related problems. After the December 1989 events, he went vanished. He returned to public life in April 1990 as an SRI officer. He led the Antiterrorist Brigade. He was an adviser to Senator Sergiu Nicolaescu's parliamentary commission, which dealt with the investigation of the December 1989 events. In 1997, he passed into the reserves. Later, he was appointed as head of the Protocol Department and staff's protection at the World Trade Center. Dinel Staicu A former Securitate officer in the Dolj County inspectorate. After December 1989, to cover up his deeds, he developed some businesses that were not too legal in Hunedoara County. He took advantage of that county's status as a disadvantaged area. When things calmed down a little, he returned to Craiova. He played a significant role in the International Bank of Religions' bankruptcy. At present, he controls SIF Oltenia through various intermediaries. He is closely tied to businessman Sorin Ovidiu Vantu and to Ristea Priboi, Prime Minister Adrian Nastase's aide. Laurentiu Stamatescu A former Securitate major in the counterintelligence department in Covasna County. During the events in December 1989, he was involved in the deadly shooting of engineer Gheorghe Suiu. Later, he was recruited by the Romanian Intelligence Service. He was promoted to the rank of colonel and to the position of head of the Covasna County branch. Gelu Stan A former Securitate officer, who dealt with religious cult-related problems. In 1998, he was secretary of the Cluj branch of the [former] National Romanian Party [PNR], chaired by Virgil Magureanu. Mihai Stan A former Securitate colonel in the Independent Misinformation Department. After December 1989, he became SRI Director Virgil Magureanu's deputy. He was promoted to general. Following the Berevoiesti deal, he was removed from office. This scandal involved the mismanagement of the transportation of some documents belonging to the former Securitate. He was then appointed head of the Directorate for International Relationships in the Private Ownership Fund. Soon afterward, he was appointed head of the Center for Operational Documentation of the Guard and Protection Service. He was again removed from office against the backdrop of the scandal triggered by the Cigarette 2 state smuggling operation. At present, he is nothing less than the general director at the... Organization for Human Rights Protection in Romania. Ion Stanescu A former Securitate officer, currently a lieutenant colonel and head of the SRI's Ploiesti branch. Ion Stoica A former Securitate colonel. Before 1989, he worked in the Securitate's Bucharest Municipality branch. After 1989, he was reintegrated into the SRI. To lose any trace of him, he was transferred to the position of head of the SRI's Dambovita County branch. When things calmed down a little, he was invited back to Bucharest. When Virgil Magureanu was replaced, he retired. He was immediately hired to become an aide to Adrian Nastase, whose party was in opposition at the time. After the November 2000 elections, he kept the same position. In parallel, he was the head of the domestic protection department at the International Bank of Religions. A gang of former Securitate officers brought the bank to bankruptcy. When Adrian Nastase was appointed as the country's prime minister, Stoica was honored with the position of deputy general director of the Romanian customs system. Ion Sandru A former Securitate colonel employed by the Romanian Intelligence Service after 1989. In 1997, he was passed into the reserves. He is considered to be a member of Mircea Gheordunescu's entourage, one of the SRI's deputy directors. After having passed into the reserves, he was appointed head of the legal office at the International Bank of Religions [BIR]. Another former Securitate officer, Colonel Ion Popescu established and chaired this bank. The depositors' savings were wasted. The bank went bankrupt in 2000. Later, on behalf of Mircea Gheordunescu, he was also involved in the privatization process of the Bucharest Hotel. He acted to the detriment of many honest investors and to the benefit of a genuine mafiosi ring made up of financial frauds. Later, he was appointed as a legal expert and an AGA [Shareholders' General Assembly] secretary at the SC Bucharest-Turism SA. Constantin Serban A former Securitate officer from the UM 0110. After that, the SRI incorporated him into its structures. Until the spring of 1998, he was head of the SRI's Targu Mures branch. At that time, he entered the reserves with the rank of colonel. He was brought back to active service in 1998, when he was appointed as the head of the SRI's Cluj County branch. Bebe Serbanescu A former Securitate officer, re-employed in the SRI's structures. He is Dinel Staicu's godson. When he gave up his job, he started to import listening and recording devices from abroad, used in his godfather's dubious connections in Craiova. Ion Serbanoiu A former higher-ranking Securitate officer. He was a general, the head of the Cluj County's Securitate Inspectorate. After the December 1989 events, he was in charge of the guard and protection system at the Dacia Felix Bank, which was soon brought to bankruptcy. Alexandru Somlea A former Securitate officer, restored by the SRI with the rank of colonel. After having passed into the reserves, he became the co-owner of a company in the Civic Center. Marian Stefan A former Securitate officer. Currently a colonel, the head of the SRI's Timisoara branch. Ion Manole Stefanut A former Securitate officer, recovered by the SRI. On 30 November 1999, he was promoted to the rank of brigadier general. Ion Stirbu A former Securitate officer. Before December 1989, he was a member of the team that ensured Nicolae Ceausescu's guard. He was passed into the reserves with the rank of lieutenant colonel. He was appointed deputy director at the Galati customs office. In the spring of 1994, he was brought back to active service. He was employed as the head of the SRI's Galati County branch. Tudor Tanase During 1976-1978, he was an officer in the Foreign Intelligence Directorate. During 1978-1989, he worked in the Special Unit "R" in the State Security Directorate. In 1993, Nicolae Vacaroiu's government re-employed him in the Special Telecommunications Service. He involved himself in many private deals, based on obscure funds, together with former Securitate General Stelian Pintilie. In May 2001, although his participation in companies with similar objects of activity had not yet been wound up, he was appointed as head of the Special Telecommunications Service, with the rank of general. The incumbent government did not take into account any of the warning signals sent by the media. Alexandru Tanasescu A former Securitate General, passed into the reserves in 1999. He was an active officer in the former Directorate for Foreign Intelligence. He carried out several missions abroad for the aforementioned body, mainly in the United States. After December 1989, he was kept in the Foreign Intelligence Service's structure. He went up the hierarchy, until he was appointed its first deputy director. He was the topic of frequent media campaigns. He was removed from the espionage service in 2000. Later, he was appointed as an adviser to the director of the Aedificia Carpati construction trust. This trust had built the SIE's current headquarters in Baneasa. Its director, Petre Badea, owed Alexandru Tanasescu a few favors, because his company had been favored in the bid. We would like to point out the fact that the Aedificia Carpati construction trust, with the help of some other former Securitate officers, has benefited and continues to benefit from important orders from the state. We may list the National Library, the consolidation works of the Telephones' Palace, the Special Telecommunications System's headquarters, the repair works at the Royal Palace, and so forth. Everybody kept taking from Petre Badea until they led him to the verge of bankruptcy. Ion Tanasoiu A former undercover Securitate officer. He acted mainly in the Benelux region. Through his children, Oana and Nineta, he was involved in the SC Macons & Co SA's dubious deals, a company that was registered in Belgium. Razvan Temesan A former undercover Securitate officer at the Romanian Bank for Foreign Trade. After December 1989, he was appointed as the bank's director. He remained in that position until he led the bank to bankruptcy. Although he was brought to court and was held in preventive custody, he succeeded in getting off scot-free. At present, it should be noted that he is deeply involved in Sorin Ovidiu Vantu's deals, in his capacity as an adviser to the much-contested Romanian Discount Bank. He has been recently proposed to be appointed as a manager at the Romanian Commercial Bank. It is desirable that he would fail to bring this bank to bankruptcy, too, to make us privatize it at the cost of one euro. Teodor A former officer in the former Securitate's Fourth Directorate. At present, he is a colonel. He is the deputy office head within the Army's General Directorate for Intelligence. Aurel Teodorescu A former Securitate officer in Bucharest. After December 1989, he worked as a commissioner in the Financial Oversight Body, as head of a department in the Bucharest City Hall, and then as a deputy director at the Customs General Directorate. The media paid attention to him because he favored dubious cigarette shipments. Teslovan A former Securitate officer, recovered by the SRI with the rank of colonel. In 1998, he worked in the SRI's Harghita County branch. Tinca A former high-ranking Securitate officer, recovered by the SRI. He led the Oradea Regional Operational Center. Tinca A former low-ranking Securitate officer recovered by the SRI in the Surveillance Department. He fell into the trap during the Anda Terrace scandal. Gheorghe Tinca According the statements by Mircea Raceanu, whom President Ion Iliescu has recently granted an award, Tinca was a former Securitate officer who worked undercover in the Foreign Ministry. At the onset of the 1980s, the United States refused to grant him an entry visa. In 1994, he was appointed defense minister. Later, he joined the ApR, Teodor Melescanu's bankrupt political party. At present, he is Romania's ambassador in Prague. Radu Tinu A former Securitate major, deputy head of the Timis County's Securitate Inspectorate. He was in charge of the misinformation and counterespionage departments. He was arrested in December 1989. He was subjected to an investigation as a member of the Timisoara lot. After a little more than two years, he was released from prison due to a lack of evidence. Along with Valentin Ciuca, he set up the Tival Impex SRL Company, which thrived during the embargo against Yugoslavia. Although he declared he would not want the return of the communism, all of his published statements speak extremely highly of the former Securitate. Maria Tiriboi A former Securitate officer. She was in charge of surveillance at the Institute for Research and Technological Design for Transportation Activities. She returned to the institution in 1992, this time as an SRI officer. Gheorghe Toader A former officer in the Securitate's espionage department. Under Ioan Talpes' mandate, he was the SIE's deputy director. In December 1994, he was promoted to the rank of brigadier general. He was passed into the reserves on 3 April 2000. Constantin Toma A former high-ranking Securitate officer. The SRI recovered him. He was the deputy head of the SRI's Bacau branch and then its acting head. He was appointed as such in January 1998. Alexandru Tonescu A former high-ranking Securitate officer. At present, he is a general and a member of the SRI's central leadership. Ioan Trifu A former Securitate officer. Until January 2002, he led the SRI's Bistrita-Nasaud County branch. Alin Vivian Tudose A former Securitate colonel in the Second Directorate in charge of economic counterintelligence. No evidence proves he had been re-trained in the SRI. However, in the fall of 1999, he published in the media the information that Radu Campeanu [liberal politician, former presidential candidate in 1990] used to work for the former Securitate. This kind of misinformation is not sent to the public at random. This kind of activity is carried out in an organized framework. It also depends on the SRI's Securitate-oriented leadership's momentary interests. Romica Turcanu A former Securitate officer. Immediately after the December 1989 events, the SRI recovered him with the rank of colonel. He was appointed as head of the SRI's Botosani County branch. He was removed from office following his involvement in the financial pyramid scheme Caritas. Olimpian Ungherea A former Securitate officer. At first, he worked in the Craiova Inspectorate. He was transferred to Bucharest, where he was in charge of the Interior Ministry's Pentru Patrie magazine. He wrote thrillers. After December 1989, he was appointed as the PDSR's media councilor. He was the vice president of the PDSR's Sector 3 Bucharest branch. In 1997, at a signal from behind the scenes, he forwarded his resignation in a boisterous manner. He also wrote a book in which he mocked Ion Iliescu. Marian Ureche A former Securitate colonel. He is the former deputy head of the First Directorate in charge of domestic intelligence. He was involved in activities aimed at combating the foreign radio stations that used to broadcast in Romanian. When he retired from the SRI, he collaborated on a book that contains extremely high praise for the former Securitate. Following the 2000 elections, he was appointed head of the Independent Department for Protection and is in charge of the fight against corruption in the Justice Ministry. Gavrila Valean He is a former officer in the Securitate's Foreign Intelligence Directorate. At present, he is a member of the SC Alliancecoop's leadership. During 1995-1996, the Army's Procurement Department contacted him to facilitate some dubious arms exports. Constantin Valceanu A former Securitate officer. He was an expert in arms exports. In 1997, he was appointed as Mircea Gheordunescu's deputy in the leadership of the National Agency for the Control of Strategic Exports and Chemical Weapons Ban. Later, he was appointed as general director of the Pro Romania Consulting Company. Victor Veliscu He is a former Securitate officer who passed into the reserves after December 1989. At present he is SRI Director Radu Timofte's main aide. The latter is a former Border Guard officer who does not have any expertise in the field of intelligence. In Timofte's name, Victor Veliscu does and undoes everything in the SRI. He acts to the former Securitate officer's constant benefit, to the detriment of those who graduated from the National Intelligence Institute. Victor Veliscu is known for his extremely close ties with Sorin Ovidiu Vantu, a businessman who is expert in fraudulent operations and who has spread his tentacles over the entire Romanian financial-banking sector. Veliscu has also worked for the latter for a number of years. Gheorghe Vicol A former Securitate officer. In 1998, he was the head of the SRI's Onesti branch, in Bacau County. Mihai Vidican A former Securitate officer. After December 1989, he was employed in the SRI's structures at the Timisoara branch office. Following a scandal related to the collection of some signatures in favor of Viorel Salagean's candidacy for president, he retired. The SRI's branches in Transylvania also took part in that difficult task. Florin Viisoreanu A former Securitate officer in Giurgiu. Following the December 1989 events, he was transferred to the SRI's office in the town of Alexandria. He is a typical example of the changes performed at the former Securitate's staff level to lose track of some officers who had been previously involved in despicable activities. Tanase Vizitiu A former Securitate officer. After the December 1989 events, he was recruited into the SRI's Antiterrorist Brigade, in its troops deployed at the Otopeni International Airport. In 1992, it was discovered he used to deliver job-related information to the Europa magazine, edited by Ilie Neacsu. The latter used to be a PRM MP until not long ago. He has recently joined the PSD. Dan Vladu A former Securitate officer. In the SRI, he was appointed head of the counterespionage department in the Constanta County branch. In the spring of 2000, he made himself obvious because he conducted surveillance on the PDSR staff members who were visiting the locality. Teodor Vlaicu A former high ranking Securitate officer. The SRI recovered him with the rank of colonel. Before December 1989, he led the counterintelligence department in Cluj. He was assigned the same mission for the entire Transylvania area after the establishment of the SRI. His son was employed at the SRI's Cluj branch, even though he did not have the training needed for this job. Ioan Vladut A former Securitate officer. He was among the first commanding officers of the SRI's Oltenia Regional Operational Center. He had the rank of lieutenant colonel. Ilie Vranceanu A former Securitate officer. He is the former head of the National Investment Fund in Bistrita County. Sorin Ovidiu Vantu brought the fund to bankruptcy because he fraudulently appropriated most of the 300,000 depositors' money. Ion Zahiu A former Securitate officer. After the December 1989 events, he was recruited into the SRI's structures. He was promoted to the rank of colonel and to the position of head of the SRI's Buzau County branch. After having passed into the reserves, he was employed as the director of the DHL branch in Romania. Dumitru Zamfir A former Securitate colonel, at present an SRI general. He is the head of the department that also deals with wiretapping phone conversations. On 30 November 1999 he was promoted to the rank of brigadier general. Those who know him say he reportedly got rich due by embezzling funds from the SRI's budget. Grigore Zagarin A former Securitate officer. The SRI took him over in its structures. He was promoted to the rank of colonel and then to brigadier general. He has recently retired from the position of head of the counterespionage division. Andrei Zeno A former Securitate officer. After December 1989, he was passed into the reserves. Under Emil Constantinescu's presidential mandate, he accused the head of state of having allegedly been the agent of a foreign power. The PRM has managed his declarations in such a manner to make them generate an extremely sonorous scandal. Andrei Zeno was sentenced, but his sentence was suspended. He was elected a PRM MP. Deceased. [Description of Source: Bucharest Ziua in Romanian -- popular, privately owned daily; generally critical of the political establishment across the board] ------------------------------------------------------------------------ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5145 From: James M. Atkinson Date: Mon Apr 8, 2002 8:03pm Subject: Cost of IT security breaches doubles - FBI http://www.theregister.co.uk/content/6/24747.html Cost of IT security breaches doubles - FBI By John Leyden Posted: 08/04/2002 at 11:44 GMT Two in three US firms say they lost money after falling victim to security breaches last year, according to an FBI survey. The cost of intrusions was almost double that of 2000. Eighty-five percent of respondents taking part in the sixth annual Computer Crime and Security Survey, detected computer security breaches in 2001. Most resulted in a financial hit, with 64 per cent saying their firms had lost money due to security lapses. The survey discovered a slight increase in willingness to report computer crimes. More than a third (36 per cent) of the 538 security professionals polled reported intrusions to law enforcement, up from 25 per cent who contacted the authorities about breaches in the previous year. The average cost of security breaches, for those 186 firms prepared to estimate losses, was more than $2 million, compared to an average loss of $1.06 million recorded last year. As in previous years, the most serious financial losses occurred through theft of proprietary information (34 respondents reported loses of $151 million) and financial fraud (21 respondents lost an estimates total of $93 million). Internet connections, rather than internal systems, were cited as the most common point of attack. Denial of service attacks, employee misuse of computers (downloading pirate software or porn) and viruses become more serious problem last year, according to the survey, which was conducted by the Computer Security Institute trade association with the FBI. Patrice Rapalus, CSI Director, said the survey showed "neither technologies nor policies alone really offer an effective defence for your organisation". Firms which want to build secure infrastructures should embrace "both the human and technical dimensions" of information security, and develop a properly funded strategy to combat security breaches, he said. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5146 From: Matthew Paulsen Date: Mon Apr 8, 2002 11:19pm Subject: RE: Cost of IT security breaches doubles - FBI (pet peeve..)This is such a common occurrance for large and small businesses... I average a few security scans a week, one today yielded 3 high level holes where data could be exported and site disruption could occur, as well as a legal issue that now needs to be involved (this done in 5 minutes of testing.. what would 6 months of in-depth analysis yield?). I tend to handle a few fraudlent traces that are grand theft fraud 50% of the time each week - I have 11 open now. I'll probably have 5 more come in this week, and perhaps deal with 100 more in the course of the year. This equates to probably around .01% of the general purchasing level of my clients customer bases. That .01% may not look too large, but think about how much money is getting moved around on the Internet these days and you may change your mind. Companies that are open to these problems typically do not secure their systems properly and will not budget for, nor outsource for, the expertise necessary to resolve the issue. Hence insurance firms such as Zurich and Chubb creating new "e" policies to save their own financials from ruin, then setting timelines on the policies rather than $$ amounts before reaction is resolved... so you lose millions if you're ddos'd, or your ISP's lines are cut before the insurance co's start paying out. No wonder .com's can't make money.. They can't cover losses or keep their doors open. Card processing firms market AVS as the good way to go for credit processing, and bump up fraud to unbelievable levels to make shopping experiences easier, but merchants lose millions to countries such as Bangladesh, Syria, Iran, Iraq, Qahar, Morocco and more as fraud is transacted and government response is nil. Also, the FBI and Secret Service and other firms are partially to blame since they have not clearly identified which jurisdictions nor operating arenas they are involved in and have maintained a cloak and dagger image to the general public since their inception. I dare someone to kick off a call to Verisign and ask where to send a credit card fraud investigation to - you will either get the FBI or the Secret Service. Perhaps a phone call to the FBI will yield the FBI's credit card complaint domain if you're lucky. I've had recommendations to submit data to the Postal Services investigation groups for international investigations, as well as Interpol, but not once have I heard anyone mention the CIA should be contacted for international investigations involving grand theft, and yet the Secret Service and the FBI will clearly tell you that international investigations are not in their domain but they "have offices in those countries" so they'll "send the report" over to them to do what they can (ie: nothing). Clarity is needed in plain simple terms for businesses to react to these disruptions. Further fieldings of calls to the FBI will get you nowhere in a hurry if you mention you want information on InfraGard... Trying to get an application mailed to you is like trying to get an IRS audit dropped. Most folks inside (not to mention outside) the FBI don't know what it is, and if they do, a local chapter is non-existent in many cases. If it does exist, you're probably faced with fees which doesn't prompt many highly qualified individuals and service organizations to become involved (not to mention it may get the ax with the rest of the FBI's computer crime stuff if folks have their way up higher in govt.). Proprietary information theft is sometimes a hard thing to qualify as well. Since some companies hide behind "Trade Secret" clauses, it's hard for investigating organizations and courts to subpoena data properly to determine if a crime is, has or may be occurring, or even if you can get enough information together to go after a potential criminal or organization committing criminal acts. Also, tracing data is inconsistent when determining suspects since the general security managers of organizations have no logging, little logging, or a lot but not necessarily the technical capabilities to understand what is being logged. And if by some miracle of luck, they do have a log, you're back at that happy subpoena moment, which spins you back to dealing with... the Secret Service.. no wait.. The FBI... no.. perhaps the CIA.. no.. what about... Or, maybe I'm all wrong and things are happy campy. Matt -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Monday, April 08, 2002 6:04 PM To: TSCM-L Mailing List Subject: [TSCM-L] Cost of IT security breaches doubles - FBI http://www.theregister.co.uk/content/6/24747.html Cost of IT security breaches doubles - FBI By John Leyden Posted: 08/04/2002 at 11:44 GMT Two in three US firms say they lost money after falling victim to security breaches last year, according to an FBI survey. The cost of intrusions was almost double that of 2000. Eighty-five percent of respondents taking part in the sixth annual Computer Crime and Security Survey, detected computer security breaches in 2001. Most resulted in a financial hit, with 64 per cent saying their firms had lost money due to security lapses. The survey discovered a slight increase in willingness to report computer crimes. More than a third (36 per cent) of the 538 security professionals polled reported intrusions to law enforcement, up from 25 per cent who contacted the authorities about breaches in the previous year. The average cost of security breaches, for those 186 firms prepared to estimate losses, was more than $2 million, compared to an average loss of $1.06 million recorded last year. As in previous years, the most serious financial losses occurred through theft of proprietary information (34 respondents reported loses of $151 million) and financial fraud (21 respondents lost an estimates total of $93 million). Internet connections, rather than internal systems, were cited as the most common point of attack. Denial of service attacks, employee misuse of computers (downloading pirate software or porn) and viruses become more serious problem last year, according to the survey, which was conducted by the Computer Security Institute trade association with the FBI. Patrice Rapalus, CSI Director, said the survey showed "neither technologies nor policies alone really offer an effective defence for your organisation". Firms which want to build secure infrastructures should embrace "both the human and technical dimensions" of information security, and develop a properly funded strategy to combat security breaches, he said. -- -------------------------------------------------------------------------- ------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------- ------------------------ James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com -------------------------------------------------------------------------- ------------------------ "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python ------------------------------------------------------------------------ -------------------------- Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5147 From: James M. Atkinson Date: Tue Apr 9, 2002 8:43am Subject: Highly Classified Recruiting Video The following classified video just turned up on the net. http://cagle.slate.msn.com/mondo/MondoAlQaeda.asp List members would do well to take a few minutes to review the materials, and forward them to the proper authorities. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5148 From: D.A.Linsky Date: Tue Apr 9, 2002 3:39pm Subject: We must not forget. All, The following are the very wise words of Retired Marine Master Gunnery Sergeant, Ed Evans. His words are very striking and pointed, well worth your time to read. This one is worth a "pass on." (He is a Member of The Third Marine Division Association.) I Will NOT Forget! I sat in a movie theater watching "Schindler's List," asked myself, "Why didn't the Jews fight back?" Now I know why. I sat in a movie theater, watching "Pearl Harbor and asked myself, "Why weren't we prepared?" Now I know why. Civilized people cannot fathom, much less predict, the actions of evil people. On September 11, dozens of capable airplane passengers allowed themselves to be overpowered by a handful of poorly armed terrorists because they did not comprehend the depth of hatred that motivated their captors. On September 11, thousands of innocent people were murdered because too many Americans naively reject the reality that some nations are dedicated to the dominance of others. Many political pundits, pacifists and media personnel want us to forget the carnage. They say we must focus on the bravery of the rescuers and ignore the cowardice of the killers. They implore us to understand the motivation of the perpetrators. Major television stations have announced they will assist the healing process by not replaying devastating footage of the planes crashing into the Twin Towers. I will not be manipulated. I will not pretend to understand. I will not forget. I will not forget the liberal media who abused freedom of the press to kick our country when it was vulnerable and hurting. I will not forget that CBS anchor Dan Rather preceded President Bush's address to the nation with the snide remark, "No matter how you feel about him, he is still our president." I will not forget that ABC TV anchor Peter Jennings questioned President Bush's motives for not returning immediately to Washington, DC and commented, "We're all pretty skeptical and cynical about Washington." And I will not forget that ABC's Mark Halperin warned if reporters weren't informed of every little detail of this war, they aren't "likely nor should they be expected-to show deference." I will not isolate myself from my fellow Americans by pretending an Attack on the USS Cole in Yemen was not an attack on the United States of America. I will not forget the Clinton administration equipped Islamic terrorists and their supporters with the world's most sophisticated telecommunications equipment and encryption technology, thereby compromising America's ability to trace terrorist radio, cell phone, land lines, faxes and modem communications. I will not be appeased with pointless, quick retaliatory strikes like those perfected by the previous administration. I will not be comforted by "feel-good, do nothing" regulations like the silly "Have your bags been under your control?" question at the airport. I will not be influenced by so called "antiwar demonstrators" who exploit the right of expression to chant anti-American obscenities. I will not forget the moral victory handed the North Vietnamese by American war protesters who reviled and spat upon the returning soldiers, airmen, sailors and Marines. I will not be softened by the wishful thinking of pacifists who chose reassurance over reality. I will embrace the wise words of Prime Minister Tony Blair who told Labor Party conference, "They have no moral inhibition on the slaughter of the innocent. If they could have murdered not 7,000 but 70,000, does anyone doubt they would have done so and rejoiced in it? There is no compromise possible with such people, no meeting of minds, no point of understanding with such terror. Just a choice: defeat it or be defeated by it. And defeat it we must!" I will force myself to: * hear the weeping * feel the helplessness * imagine the terror * sense the panic * smell the burning flesh * experience the loss * remember the hatred. I sat in a movie theater, watching "Private Ryan" and asked myself, "Where did they find the courage?" Now I know. We have no choice. Living without liberty is not living. * Ed Evans, MGySgt., USMC (Ret.) Not as lean, Not as mean, But still a Marine. SSC,Inc. David A. Linsky President **************************************************************************** "The truth is incontrovertible. Malice may attack it. Ignorance may deride it. But in the end, there it is. " - Winston Churchill [Non-text portions of this message have been removed] 5149 From: Charles P Date: Tue Apr 9, 2002 7:27pm Subject: A bit more humor Why are there no Wal Marts in Afghanistan? . . . . . . . . . . . . . . . . . . 'cause they're all Targets. 5150 From: Steve Uhrig Date: Tue Apr 9, 2002 10:54pm Subject: Chad Margita front and center Chad, please email me with your new address. Your old ISP is kicking a message back saying they went out of business. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5151 From: john schmitt Date: Wed Apr 10, 2002 0:15am Subject: Re: We must not forget. Dear Mr. Linsky, Pardon me, but rhetoric, however inspirational you may find it to be in the case of Mr. Evans, is not necessarily "wisdom". It is simply opinion. Railing against President Clinton, or Dan Rather or Peter Jennings, reveals a political stance of your own, but has nothing to do with the topic of TSCM, unless one were to assume that all TSCM-ers have a particularly extreme right-wing point of view, which I do not believe to be the case. Your sentiments at the end I share, that living without liberty is not worth living. Mr. Franklin shared this opinion in the late 18th century, saying that those who would trade privicy for safety deserved neither. But, I strongly question whether your blind allegience to a political party, or to a President who was failed to be elected by a majority of the votes, or to his amateur leadership in the very silly procedures currently being practiced in our "airport security" programs, or to his current historically-record lack of leadership in the MidEast, to say nothing of his wrecking of the economy with ridiculous tax cuts, insidious Enron relationships, and insider crafting of energy policies, has anything to do with either liberty or TSCM. I recommend we keep this forum on the very useful topics for which it was established. John C. Schmitt, Ph.D Vice President, Business Development BioLink Technologies, International, Inc, www.biolinkusa,com ----- Original Message ----- From: "D.A.Linsky" To: Sent: Tuesday, April 09, 2002 4:39 PM Subject: [TSCM-L] We must not forget. > All, > > The following are the very wise words of Retired Marine Master Gunnery > Sergeant, Ed Evans. His words are very striking and pointed, well worth > your time to read. This one is worth a "pass on." (He is a Member of The > Third Marine Division Association.) > > I Will NOT Forget! > I sat in a movie theater watching "Schindler's List," asked myself, "Why > didn't the Jews fight back?" > > Now I know why. > I sat in a movie theater, watching "Pearl Harbor and asked myself, "Why > weren't we prepared?" > > Now I know why. > > Civilized people cannot fathom, much less predict, the actions of evil people. > > On September 11, dozens of capable airplane passengers allowed themselves > to be overpowered by a handful of poorly armed terrorists because they did > not comprehend the depth of hatred that motivated their captors. > > On September 11, thousands of innocent people were murdered because too > many Americans naively reject the reality that some nations are dedicated > to the dominance of others. Many political pundits, pacifists and media > personnel want us to forget the carnage. They say we must focus on the > bravery of the rescuers and ignore the cowardice of the killers. They > implore us to understand the motivation of the perpetrators. Major > television stations have announced they will assist the healing process by > not replaying devastating footage of the planes crashing into the Twin Towers. > > I will not be manipulated. > I will not pretend to understand. > I will not forget. > I will not forget the liberal media who abused freedom of the press > to kick our country when it was vulnerable and hurting. > > I will not forget that CBS anchor Dan Rather preceded President Bush's > address to the nation with the snide remark, "No matter how you feel about > him, he is still our president." > > I will not forget that ABC TV anchor Peter Jennings questioned President > Bush's motives for not returning immediately to Washington, DC and > commented, "We're all pretty skeptical and cynical about Washington." > > And I will not forget that ABC's Mark Halperin warned if reporters weren't > informed of every little detail of this war, they aren't "likely nor should > they be expected-to show deference." > > I will not isolate myself from my fellow Americans by pretending an Attack > on the USS Cole in Yemen was not an attack on the United States of America. > > I will not forget the Clinton administration equipped Islamic terrorists > and their supporters with the world's most sophisticated telecommunications > equipment and encryption technology, thereby compromising America's > ability to trace terrorist radio, cell phone, land lines, faxes and modem > communications. > > I will not be appeased with pointless, quick retaliatory strikes like those > perfected by the previous administration. > > I will not be comforted by "feel-good, do nothing" regulations like the > silly "Have your bags been under your control?" question at the airport. > > I will not be influenced by so called "antiwar demonstrators" who exploit > the right of expression to chant anti-American obscenities. > > I will not forget the moral victory handed the North Vietnamese by American > war protesters who reviled and spat upon the returning soldiers, airmen, > sailors and Marines. > > I will not be softened by the wishful thinking of pacifists who chose > reassurance over reality. > > I will embrace the wise words of Prime Minister Tony Blair who told Labor > Party conference, "They have no moral inhibition on the slaughter of the > innocent. If they could have murdered not 7,000 but 70,000, does anyone > doubt they would have done so and rejoiced in it? > > There is no compromise possible with such people, no meeting of minds, no > point of understanding with such terror. Just a choice: defeat it or be > defeated by it. And defeat it we must!" > > I will force myself to: > * hear the weeping > * feel the helplessness > * imagine the terror > * sense the panic > * smell the burning flesh > * experience the loss > * remember the hatred. > > I sat in a movie theater, watching "Private Ryan" and asked myself, "Where > did they find the courage?" > > Now I know. > > We have no choice. Living without liberty is not living. > * Ed Evans, MGySgt., USMC (Ret.) > Not as lean, > Not as mean, > But still a Marine. > > > > SSC,Inc. > > David A. Linsky > > President > > > > > **************************************************************************** > "The truth is incontrovertible. Malice may attack it. Ignorance may deride it. But in the end, there it is. " > - Winston Churchill > > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5152 From: David Alexander Date: Wed Apr 10, 2002 11:22am Subject: Russia accuses US of spy plot From BBC news website Russia accuses CIA of spying (No ! really ? I thought that was what they were paid for) http://news.bbc.co.uk/hi/english/world/europe/newsid_1921000/1921567.stm Russian intelligence officials say they have uncovered a plot by the United States of trying to steal military secrets through secret agents. A spokesman for Russia's internal intelligence agency, the Federal Security Service (FSB), accused the CIA of trying to get classified information on new kinds of weaponry and Russia's defence links with other ex-Soviet states. American agents posing as diplomats were detected in Russia and a second, unnamed ex-Soviet state as they tried to recruit an employee at a secret defence installation, he said. The US Embassy in Moscow has refused to comment on the case, which comes just weeks before a US-Russian summit. "The FSB has irrefutable evidence of the CIA's spying activities against Russia," the FSB official said. He said that a diplomat at the US Embassy had led the operation, which allegedly involved coded letters and "caches". But early intervention had prevented any damage being done to Russian security interests, he said. Russia and the United States have traded mutual accusations of spying a number of times in recent years. Just over a year ago, the US expelled 50 Russian diplomats on spying charges, prompting Russia to expel 46 American diplomats. _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 5153 From: u12armresl Date: Wed Apr 10, 2002 2:45pm Subject: Wireless Monitors I knew that it was coming soon but not this soon. There are several totally wireless monitors on the market now which now pose even greater securiry risk to all people that have them. It used to be that line of sight lasers were reading monitors and the tech got pretty good, but now it looks as you wont need a laser anymore. 5154 From: Date: Wed Apr 10, 2002 4:26pm Subject: New file uploaded to TSCM-L Hello, This email message is a notification to let you know that a file has been uploaded to the Files area of the TSCM-L group. File : /mission.txt Uploaded by : graniteislandgroup Description : TSCM-L Mission Statement You can access this file at the URL http://groups.yahoo.com/group/TSCM-L/files/mission.txt To learn more about file sharing for your group, please visit http://help.yahoo.com/help/us/groups/files Regards, graniteislandgroup 5155 From: James M. Atkinson Date: Wed Apr 10, 2002 4:22pm Subject: Nontechnical Descriptions of Selected Emotional, Mental, and Personality Disorders Here is a cheat sheet of Emotional, Mental, and Personality Disorders I got from DSS. It is a good piece of material to refer to from time to time as it covers many of the problems some TSCM clients may exhibit. When you talking to a prospective client you should listen quietly and carefully and keep the following materials in mind to see if any of what they say creates a hit on a disorder. On the other hand your potential client may be perfectly OK, but is just scared, confused, or misguided... learn to tell the difference. -jma ------------------------------------------------------ Nontechnical Descriptions of Selected Emotional, Mental, and Personality Disorders See below for descriptions in lay terminology of some of the more common or significant disorders. These descriptions are based principally on the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition (DSM-IV), published by the American Psychiatric Association. Refer to DSM-IV for specific diagnostic criteria and for information on disorders not described here. Emotional, mental, and personality disorders are not as easily recognized as some physical illnesses like measles and mumps. Although the description of each disorder contains a general pattern of symptoms, there are many differences in the symptoms present from one case to another. The severity and duration of symptoms also varies. Many symptoms are characteristic of several different disorders. The boundaries that divide one disorder from other emotional or mental disorders are not always clear. Many individuals have multiple disorders. When adjudicating emotional, mental, and personality issues, the key point is not what disorder a subject has, if any. It is whether subject has behaved in a manner that suggests unreliability, untrustworthiness, poor judgment, or any other reason for believing subject may be a poor security risk. Adjustment Disorder Adjustment disorder occurs as a reaction to a stressful circumstance. It is diagnosed if the distress the individual feels is greater than expected given the nature of the stressful event, or if there is significant impairment in social relationships or work performance. By definition, adjustment disorder must begin within three months of the stressful event and be resolved within six months afterwards, unless the stressful circumstance is ongoing. If the problem was triggered by death of a close relative or friend, it is generally considered bereavement rather than adjustment disorder. This disorder is generally classified by subtype -- adjustment disorder with depressed mood, with anxiety, or with disturbance of conduct. Depressed mood refers to depression, tearfulness, or feelings of hopelessness. Anxiety refers to nervousness, worry, or jitteriness. Disturbance of conduct generally refers to antisocial behavior. Ref 15 Antisocial Personality Disorder Antisocial behavior, also known by the more technical terms of psychopathy and sociopathy, involves lack of respect for the commonly accepted rules of society. Manipulation of others and deceit are central features of this disorder. The following section cites an example of this disorder from a prominent espionage case. Antisocial behavior is a serious security concern. Values that normally inhibit illegal or vindictive behavior are missing. This can lead to fraud, embezzlement, computer sabotage or espionage when an individual sees an easy opportunity for illicit gain or becomes disaffected from the organization. Selling secrets may be viewed as a simple business opportunity rather than as treason Persons with antisocial personality disorder shamelessly take others for granted and manipulate them to serve their own self-interest or indulge their own desires. Such persons take pleasure in beating the system and not getting caught. Lying to others is common, as is lack of gratitude. Stealing, shoplifting, cheating on taxes, failure to pay parking tickets, aggressive or reckless driving, failure to pay bills even though money is available, picking fights, extreme promiscuity, sexual harassment, cruelty to animals, and spouse or child abuse are examples of antisocial behaviors. There is little remorse about the adverse effects of one's behavior on others. At work, typical behaviors include padding travel vouchers or expense accounts; being consistently late to work or leaving earlier than is reasonable; abusing sick leave; lack of concern with meeting deadlines; taking classified information home; misusing the diplomatic pouch; pilfering office supplies; lying to cover up a mistake or to make oneself look good; maneuvering to undermine a colleague who is viewed as a competitor for promotion; drug use or any other violation of regulations by a government employee. Antisocial persons tend to resent authority and dislike supervision, to attribute their lack of success to others "having it in for me," to think no one understands them, and that life is giving them a raw deal. Most people tend to blame others for their problems, but antisocial individuals are likely to focus the blame on their supervisor. They may submit extensive written appeals in response to any criticism in their performance evaluation. When antisocial subjects feel offended or frustrated in their desires, they may be inclined to hold a grudge and to seek revenge. Antisocial persons believe such improper behavior is commonplace and will not be punished. They have a high opinion of their ability to con their way out of trouble, and a low opinion of the astuteness of authorities who would catch them. The arrogance and self-confidence of the con man may be very useful in certain occupations (intelligence operations officer, undercover police officer, salesperson), so it is sometimes difficult to distinguish a valuable talent from a serious character defect. In severe cases of antisocial personality disorder, individuals are likely to have a criminal record that clearly disqualifies them for access to classified information. They are also unlikely to have the history of academic or career success that qualifies them to apply for a position of responsibility. Moderately antisocial personalities, however, may appear to be very desirable candidates for employment. They are often excellent con artists, and able to manipulate people so effectively that they do exceptionally well in interviews and are evaluated favorably by casual acquaintances. The true character is revealed only after prolonged or intimate contact. Antisocial personality disorder often occurs together with narcissistic personality disorder. This usually begins in childhood or adolescence. The most flagrant antisocial behavior may diminish after age 30. However, inability to sustain lasting, close, and responsible relationships with family, friends, sexual partners, or employer may persist into late adult life. Ref 15 A person with some antisocial characteristics, but who does not meet the criteria for diagnosis of antisocial personality disorder, may be assessed under the Personal Conduct guideline, Pattern of Dishonest, Unreliable, or Rule-Breaking Behavior. Espionage Case Example 1 John Walker As a youth, Navy spy John Walker rolled used tires down hills at cars passing below, threw rocks through school windows, stole money from purses and coats left unattended at school functions, stole coins from church donation boxes for the poor, set fires, and shot at the headlights of cars. When arrested for attempted burglary at age 17, Walker admitted six other burglaries. He was pardoned so that he could join the Navy. A childhood friend, who says he knew Walker like a brother, described him many years later as "cunning, intelligent, clever, personable, and intrinsically evil." After his arrest, he enjoyed the publicity; he had no remorse. He rationalized involving his brother, son and friend in espionage, and trying to recruit his daughter, as trying to help them be successful in life, and he later criticized them for using him. He felt his only real mistake was allowing himself to be surrounded by weaker people who eventually brought him down. He concluded, "I am the real victim in this entire unpleasant episode." One author who spent about 160 hours interviewing Walker after his conviction wrote: "He is totally without principle. There was no right or wrong, no morality or immorality, in his eyes. There were only his own wants, his own needs, whatever those might be at the moment." He betrayed his country, crippled his wife emotionally, corrupted his children, and manipulated his friends. Yet all the while, he didn't see himself as different from others, only a little smarter. In his view, "Everyone is corrupt...everyone has a scam." Ref 16 Bipolar Disorder Bipolar disorder is characterized by episodes of extreme excitability (mania) and usually, but not invariably, also some degree of depression. It is the current terminology for what used to be called manic-depressive. If only episodes of mania are present, or mainly mania with some depression, it is called bipolar I disorder. If it is mainly depression, with some mania, it is called bipolar II disorder. If only episodes of depression are present, it is called depressive disorder. Episodes of mania are identified by: *An abnormally elevated, expansive, or irritable mood that leads to hyperactivity, impulsive behavior, and poor judgment. Mood may alternate between euphoric and irritable if subject's wishes are thwarted. *Inflated self-esteem, decreased need for sleep, increased talkativeness, thoughts that race faster than they can be expressed, easily distracted. *Abnormal (for the individual) involvement in pleasurable activities with high potential for painful consequences, e.g., unrestrained buying sprees, sexual indiscretions, foolish business investments. Episodes of depression are identified by: *Feelings of sadness and emptiness, or loss of interest or pleasure in normal activities. *Weight loss or weight gain, insomnia, fatigue or loss of energy, feelings of worthlessness or inappropriate guilt, diminished ability to concentrate, indecisiveness, or recurrent thoughts of death. *Significant distress or significant adverse effects on work, social, or family activities. Bipolar disorder is a recurring disorder. More than 90% of people who have one manic episode go on to have future episodes, although there may be several years between episodes and individuals may be fully functional between episodes. Because it recurs, and because it causes talkativeness and poor judgment, bipolar disorder is a significant security concern. Ref 15 Borderline Personality Disorder The principal characteristics of borderline personality disorder are: *Unwarranted fear of rejection or abandonment, usually associated with low self-esteem. Such persons are uncomfortable alone. Examples of such behavior include inappropriate anger when someone important to them must cancel an appointment, or panic at a temporary separation. *A pattern of unstable relationships with friends, lovers, or bosses. Such persons need a great deal of nurturing and support from any relationship. They may initially idolize someone who provides that nurturing, but then shift suddenly and dramatically to view that same person as hostile or cruel if they do not care enough or are not "there" enough for them. *Suicide, threats of suicide, or self-mutilation precipitated by fears of separation or rejection, such as fear of abandonment by a lover. *Unstable self-image leading to sudden changes in career goals, values, or types of friends. *Potentially damaging impulsive behavior in several areas such as substance abuse, unsafe sex, gambling, spending money irresponsibly, reckless driving, or binge eating. *Inappropriate expressions of anger, or difficulty controlling anger; chronic feelings of emptiness or boredom; or short but intense periods of irritability or anxiety. Lacking self-confidence, such persons may undermine themselves just at the moment a goal is about to be achieved, e.g., dropping out of school just before graduation, destroying a good relationship just when it is clear that the relationship could last. Self-destructive acts may also be precipitated by fear of having to assume increased responsibility. Borderline personality disorder is a significant security concern, because loyalty may shift so suddenly and dramatically to whomever purports to offer the necessary nurturing and support. Irrational feelings of abandonment by a supervisor or employing organization may precipitate self-destructive behavior or vindictive rage at one's employer. Borderline personality disorder is present in about 2% of the general population. It may occur together with other disorders. It is diagnosed about three times as often in females as in males. Physical and sexual abuse, neglect, family conflict, and early loss or separation from parents are common in the family histories of persons with this disorder. Ref 15 Dependent Personality Disorder Persons with dependent personality disorder have a pervasive and excessive need to be taken care of that leads to submissive behavior, fears of separation, and great difficulty making everyday decisions. Such individuals tend to be passive and to need an excessive amount of advice and reassurance from others. They want to be told what to do. They may agree to things they know are wrong rather than risk losing the support of those on whom they depend. Dependent personality disorder often occurs together with other disorders, such as borderline, avoidant, and histrionic personality disorders. Ref 15 Depression The essential feature of depression is either a feeling of being depressed, sad, hopeless or discouraged, or the loss of interest or pleasure in nearly all activities previously considered enjoyable. Brief periods of depression are normal, especially if life is difficult, one is ill, or after a traumatic experience such as divorce, death of a close friend or relative, or personal failure of some kind. To qualify as a major depressive disorder, depression must persist for most of the day, nearly every day, for at least two consecutive weeks and must include one or more of the following characteristics: *Decreased energy, tiredness, apathy, or fatigue. *Sense of worthlessness or guilt, such as guilty preoccupation over minor past failings; or a sense of helplessness. *Changes in sleeping patterns -- insomnia or somnolence. *Marked changes in appetite. *Agitation, e.g., inability to sit still, pacing, hand-wringing, pulling or rubbing of skin or clothing. *Talk about death or suicide. *Difficulty in thinking, concentrating, or making decisions. Depression can generally be controlled by medication or professional counseling. The security significance depends upon whether the depression affects judgment or work performance. It is quite possible for some persons to feel considerable personal distress from depression without this affecting their judgment or work performance. As in a number of other areas, how the individual actually behaves may be more relevant for security evaluation than the medical diagnosis. Ref 15 Eating Disorders The individual with anorexia nervosa refuses to maintain a minimally normal body weight. Weight loss is usually achieved primarily by restricting food intake, although there may be some self-induced vomiting or misuse of laxatives or diuretics. The self-esteem of individuals with anorexia nervosa is highly dependent upon their body shape and weight. As a result, there is an intense fear of gaining weight or becoming fat. Paradoxically, concern about gaining weight often increases as actual weight declines. Self-starvation has significant physical and sometimes psychological consequences. Hospitalization is common and death is not infrequent. The essential features of bulimia nervosa are binge eating a couple times a week following by self-induced vomiting or misuse of laxatives to avoid gaining weight. Individuals with bulimia nervosa are similar to those with anorexia nervosa in their fear of gaining weight and high level of dissatisfaction with their own bodies, but generally do maintain a normal weight. Anorexia and bulimia both indicate fundamental problems of low self-esteem and poor adjustment. Bulimia is a greater security concern than anorexia as bulimics are typically ashamed of their eating problems and attempt to conceal them. Binge eating usually occurs in secrecy. Bulimia is frequently accompanied by other mood, anxiety, and personality disorders. About one-third of those with bulimia also have a substance abuse problem. From one-third to one-half also have one or more personality disorders, most frequently borderline personality disorder. Ref 15 Histrionic Personality Disorder The word histrionic refers to behavior that is theatrical, deliberately affected, or deliberately displaying emotion for the effect that it has. The histrionic personality is identified by excessive emotionality and attention-seeking behavior that begins in early childhood and is present in a variety of contexts. Histrionic individuals appear very charming, enthusiastic, and open or flirtatious, but this wears thin as they constantly demand to be the center of attention. They feel so uncomfortable or unappreciated when not the center of attention that they may make up stories or create a scene to focus attention on themselves Physical appearance is often used to draw attention. For a woman, there may be seductive dress or behavior; for a man, macho dress or behavior. Romantic fantasy is common, but such persons often have difficulty achieving emotional intimacy in romantic relationships. Relationships fluctuate between emotional manipulation of the partner and strong dependence on the partner. Dramatic expression of emotions may be turned on and off so quickly that others may suspect the individual is faking these feelings. Histrionic personalities may express strong feelings with dramatic flair, but without any supporting facts or details. They are impulsive, bored with routine work, and crave the excitement of new experiences. Histrionic Personality Disorder often occurs together with other disorders such as Borderline Personality, Antisocial Personality, Narcissistic Personality, and Dependent Personality Disorder. Ref 15 Histrionic personality is a security concern because such persons are easily influenced by others and by current fads. They make quick and impulsive judgments and crave excitement. They may be overly trusting, especially of strong authority figures whom they see as magically solving their problems. Narcissistic Personality Disorder A narcissistic personality is characterized by unwarranted feelings of self-importance or self-esteem (grandiosity), a sense of entitlement, and a lack of empathy for others. These characteristics are discussed separately below and then related to security issues. Grandiosity Wholly unwarranted feelings of self-importance or self-esteem are referred to by psychologists as grandiosity. Grandiose persons grossly overestimate their abilities and inflate their accomplishments. They are often preoccupied with fantasies of success, power, beauty or love. They may need constant reinforcement of this fantasy image of themselves. Grandiose persons expect to be viewed as "special" even without appropriate accomplishments. The need for praise and sensitivity to criticism dominate relationships with others. Personal friendships, relationships with supervisors and co-workers, and amorous relationships turn quickly from love to hate, and vice versa, depending upon whether the relationship supports or undermines subject's self-esteem. The narcissist demands unconditional acceptance of his or her specialness, and relationships blossom only when this is given and sour quickly when it is not. Self-esteem is almost always fragile. An unreasonably high, overt self-evaluation masks inner doubts and insecurities. It is paradoxical that someone with such a crippling sense of inadequacy should act in such an arrogant, imperious, and grandiloquent manner. Grandiose persons feel they are so smart or so important that the rules, which were made for ordinary people, do not apply to them. Rules and social values are not necessarily rejected as they are by the antisocial personality; it is just that one feels above the rules. Entitlement A sense of entitlement is characterized by unreasonable expectation of especially favorable treatment. Such persons expect to be given whatever they want or feel they need. They may feel entitled to a promotion or to a higher grade in school just because they worked hard for it, regardless of the quality of their performance; entitled to more money because housing or college costs are so high, even though they didn't earn it; entitled to cut in front of the line because they are so busy or their time is so valuable. They may also feel entitled to punish others, to "give them what they deserve," because others failed to recognize their special abilities or frustrated their desires in some other way. Instead of congratulating a colleague who receives a promotion, the narcissist may feel bitter and grouse that the promotion wasn't deserved. Several persons arrested for embezzlement have revealed that they started to take money only after someone on a par with them got a promotion that they didn't receive. They felt entitled to take the money because they should have been promoted. Many people genuinely do get a raw deal, and may be justified in feeling they deserve better. Feelings of entitlement in such cases become a security problem only if the person is planning revenge or retaliation. Lack of Empathy Narcissists generally view the world only from the perspective of how it affects themselves. There is little empathy or ability to understand the feelings or problems of others. For example, when a co-worker becomes seriously ill, one may be upset by the inconvenience caused by the worker's absence and relatively unconcerned about the welfare of the worker. Narcissistic persons shamelessly take others for granted and manipulate or exploit them to achieve their own ends. They may be unusually aggressive and ambitious in seeking relationships with others in positions of power. In romantic relationships, the partner is often treated as an object to be used to bolster one's self-esteem. In extreme cases, the narcissist who gains power over others, as in a relationship between supervisor and subordinate, may use this power in humiliating and cruel ways, sometimes just for what seems like personal amusement. Ref 15 Relevance to Security Narcissism should not be confused with the simple egotism found in many capable and loyal employees who progress to senior positions due to their strong abilities, self-confidence, and ambition. An unwarranted sense of self-importance is a concern only when self-evaluation is so far out of line with reality, and with how one is perceived by supervisors and colleagues, that disappointment and resentment are inevitable. The narcissist's need for recognition is so strong that failure provokes a need for vindication and revenge. The compelling need to justify unwarranted self-esteem may cause a grandiose person with a grudge to seek recognition elsewhere -- with an opposition intelligence service or business competitor. Feelings of entitlement are a security concern because they may be used to rationalize illegal behavior or may reduce the inhibitions that otherwise deter illegal behavior. When combined with antisocial attitudes, grandiosity, or desperate need or greed for money, a feeling of entitlement leads to easy rationalization of theft, fraud, or other illegal activity for monetary gain. "I'm only taking what I deserve." It is also an easy rationalization for revenge. "If they hadn't screwed me, I wouldn't be doing this, so it's their fault; they deserve it." When narcissists fail to perform adequately at work, it is always someone else's fault. The many arrested spies who exhibited this characteristic blamed others for their treason. They blamed their behavior on the counterculture movement of the 1960s, on an insensitive and intrusive Intelligence Community, poor security practices, supervisors who failed to recognize their potential, spouses for not being understanding, or government for not taking the right political stance. Few saw themselves as traitors; they saw themselves as victims. Self-deception and rationalization facilitate criminal behavior, as they enable an individual to consider such behavior in a more justifiable light. They also soothe an offender's conscience as the activity progresses. Narcissism is illustrated by the following examples from espionage cases. Espionage Case Example 2 Jonathan Pollard Jonathan Jay Pollard was a Naval Intelligence analyst arrested for espionage on behalf of Israel. From an early age, Pollard had a fantasy of himself as a master strategist and a superhero defending Israel from its enemies. He became obsessed with the threats facing Israel and a desire to serve that country. In college, Pollard boasted that he had dual citizenship and was a colonel in the Israeli Army. His Stanford senior yearbook photo listed him as "Colonel" Pollard, and he reportedly convinced almost everyone that Israeli intelligence was paying his tuition. After his arrest, Pollard said this was all "fun and games," and "no one took it seriously." But most of his fellow students did not see it as a game. Pollard kept his pro-Israeli views to himself while working for Naval Intelligence, but other tall tales about himself were more or less a joke in the office. He was unpopular among his colleagues, as they resented his bragging, his arrogance, and his know-it-all attitude. At one point, Pollard received permission to establish a back-channel contact with South African intelligence through a South African friend he had known in graduate school. Through a combination of circumstances, Pollard's story about his relationship with the South Africans began to unravel. After telling Navy investigators fantastic tales about having lived in South Africa and his father having been CIA Station Chief there, Pollard's security clearance was pulled and he was told to obtain psychiatric help. When the doctor concluded he was not mentally ill, Pollard filed a formal grievance and got his clearance and job back. Pollard's need to feel important, and to have others validate that importance, led him to pass several classified political and economic analyses to three different friends whom he felt could use the information in their business. This was before he volunteered his services to Israel. Although he hoped to eventually get something in return, his principal motive was simply to impress his friends with his knowledge and the importance of his work. Several years later, under a different supervisor, it was again Pollard's grandiosity that attracted adverse attention, contributing to his eventual compromise and arrest. The supervisor caught Pollard lying about his dealings with another government agency. The only purpose of the lie was apparently to make Pollard appear to be a more important person than he was. The supervisor wondered why Pollard would make up stories like this and began paying much closer attention to Pollard's activities. He noticed that Pollard was requesting so many Top Secret documents concerning Soviet equipment being supplied to the Arab world that it was becoming a burden on the clerk who had to log them in. The risk Pollard ran by requesting so many documents may also be explained by his grandiosity; such persons often think they are too smart to be caught. Ref 20 Obsessive-Compulsive Disorder This disorder is characterized by recurrent obsessions or compulsions. Obsessions are persistent ideas, impulses, or images that intrude on one's consciousness and that cause anxiety or distress. Compulsions are repetitive behaviors usually performed to relieve the anxiety or distress caused by obsessions. For example, an obsession about cleanliness might be relieved by compulsive hand washing. An obsession about having things in order, might be relieved by reordering things every morning to ensure they are in exactly the right place. An obsession with an obscene sexual image may be driven from the mind by counting to 10 forward and backward 100 times. Many obsessions or compulsions are insignificant. Obsessive-compulsive disorder is diagnosed only when there is a problem severe enough to be time-consuming, cause distress, or adversely affect an individual's performance. Obsessive-compulsive disorder suggests the presence of unresolved underlying problems. It is often associated with other emotional disorders. There is a distinction between this disorder and obsessive-compulsive personality disorder. The obsessive-compulsive personality attempts to maintain a sense of control through painstaking attention to rules, trivial details, procedures, lists, and schedules. Individuals with obsessive-compulsive personality disorder pursue orderliness and perfection at the expense of flexibility and efficiency. Ref 15 Although job performance may be adversely affected by inflexibility and stubbornness, the obsessive-compulsive personality is likely to follow all security regulations to the letter. Such a person is unlikely to ever, under any circumstances, leave a safe unlocked. Paranoid Personality Disorder The paranoid personality is distinguished by a pervasive distrust and suspicion of other people. Such persons are preoccupied with unjustified doubts about the loyalty or trustworthiness of friends or associates. They are reluctant to confide in others for fear that information they share will be used against them. They may refuse to answer personal questions, saying the information is "nobody's business." They read hidden meanings that are demeaning or threatening into innocent remarks or unrelated events. They may interpret an innocent mistake by a store clerk as a deliberate attempt to shortchange them. A supervisor's compliment on an accomplishment may be misinterpreted as an attempt to coerce more or better performance. An offer of help may be viewed as a criticism that they are not doing well enough on their own. Minor slights arouse major hostility, and these slights are never forgiven or forgotten. Such persons often have unjustified suspicions that their spouse or sexual partner is unfaithful. They want to maintain complete control over intimate relationships to avoid being betrayed. They may gather trivial and circumstantial "evidence" to support their jealous beliefs. Paranoid personalities may blame others for their own shortcomings. Because they are quick to counterattack in response to perceived threats, they may become involved in legal disputes. Such persons are attracted to simplistic black and white explanations of events, and are often wary of ambiguous situations. Paranoia often disrupts relationships with supervisors and co-workers. Severe paranoia is often a precursor of other mental disorders or found together with other disorders. Ref 15 Paranoia is a serious security concern, as the paranoid can easily view his or her employer or the U.S. Government as the enemy, and act accordingly. Alternatively, what appears to be paranoia may have a factual basis. Seemingly extreme concern about being investigated or watched or searching for listening devices or hidden cameras may indicate that a person is engaged in illegal activity and fears detection. Phobias and Panic Attack A phobia is a strong and persistent fear of some specific object or situation. A phobia may cause anxiety, such as fear of heights or fear of flying. In more serious cases, it may precipitate a panic attack. A panic attack is a sudden and usually short period of intense fear or discomfort accompanied by symptoms such as pounding heart, sweating, trembling, shortness of breath, feeling of choking, chest pain, nausea, dizziness, numbness, chills or hot flushes, fear of going crazy, or fear of death. Phobias that could entail security risk in some work environments include Agoraphobia and Social Phobia. Agoraphobia is fear of being in places or situations from which escape might be difficult or embarrassing, or in which help may not be available, in case of a panic attack. Typically, this leads to avoidance of situations such as being alone outside the home or at home alone, being in a crowd of people, traveling in an automobile or airplane, or being on a bridge or in an elevator. Seriousness is measured by the extent to which avoidance of these situations interferes with a person's daily routine, work performance, or social life. Social phobia is fear of social situations in which one is exposed to unfamiliar people, or fear of any situation in which one's performance will be observed by others, such as public speaking. The subject fears their anxiety will be apparent to others and cause embarrassment or humiliation. Some anxiety is common. It qualifies as a phobia only if avoidance of the feared situation interferes with social relationships or work performance or causes marked distress. Ref 15 Schizophrenia There is no single definitive symptom for schizophrenia, but a constellation of various possible symptoms that together cause a significant reduction in ability to function effectively at work, in interpersonal relations, or in care for oneself. The following symptoms are characteristic but do not normally all appear in any single case. *Delusions, such as belief that one is being persecuted or ridiculed, or that one's thoughts or body parts are being manipulated or have been replaced by someone else's. *Hallucinations, such as hearing voices. *Disorganized thinking and speech, such as slipping off the track from one topic to another, or completely unrelated responses. *Bizarre behavior, such as wearing multiple overcoats on a hot day, maintaining a rigid posture, or being unaware of one's surroundings. *Absence of emotion; inability to initiate or complete common, everyday activities at work or at home, Schizophrenia is a serious mental illness. Although some symptoms respond to treatment, complete remission is unusual. Ref 15 Schizotypal Personality Disorder Schizotypal personality disorder can be viewed as a mild form of schizophrenia. Behavior is eccentric rather than bizarre. Instead of delusions and hallucinations, there are milder perceptual distortions. Such persons may be preoccupied with superstitions or paranormal phenomena. They may believe they have magical control over others, e.g., believing that their spouse taking the dog for a walk is a direct result of their thinking it should be done an hour earlier. They may incorrectly interpret unrelated events as having a special message for them. A defining element of schizotypal personality disorder is a pervasive pattern of having little desire for, being uncomfortable with, and having little capacity for maintaining close relationships. Such persons prefer to keep to themselves as they feel they are different and don't fit in. They usually have no or few close friends or confidants other than a close relative. Ref 15 Schizotypal personality disorder is a serious security concern, as judgment is distorted. Inability to form close relationships suggests inability to develop loyalty. Reference Materials Glossary of Psychiatric Terms Ref. 14 abreaction: expressing feelings that have been suppressed. acrophobia: excessive fear of heights. acute: sudden onset and brief duration (as opposed to chronic). adjustment disorder: a reaction to a stressful event or circumstances that causes significant distress or impairs work performance or social relationships. affect: generally, a synonym for feelings, moods, emotions. affective disorders: conditions in which feelings of sadness or elation are excessive and not realistic, given the person's life conditions. Depression and mania are affective disorders. agoraphobia: unrealistic fear of open spaces. ambivalence: contradictory attitudes toward a person, such as love and hate, that occur at the same time. anesthesia: numbness of part of the body surface, absence of sense of touch. anorexia nervosa: aversion to food, usually caused by psychological conditions. antisocial personality: persons who are in constant conflict with society, without conscience, incapable or unwilling to establish bonds of affection or loyalty (see also sociopath, psychopath). anxiety: a state characterized by apprehensiveness, nervousness, fear. atypical: not typical, unusual or infrequent. axis: some psychiatric reports classify patients on five dimensions or axes. See Five-Axis System of Psychiatric Evaluations. avoidant personality: a pervasive pattern of avoiding interpersonal contact for fear of criticism, disapproval, or rejection. bipolar disorder: behavior that involves both depressive and manic episodes (depressive = unusual degree of sadness; manic = excitable, expansive, unrealistically cheerful). borderline personality: a term applied to very unstable persons who are impulsive, unpredictable, often self-destructive, and deficient in interpersonal skills. bulimia: a disorder characterized by periods of overeating followed by induced vomiting or the use of laxatives. chronic: a condition of lengthy duration; sometimes used to mean irreversible and incurable. compulsion: an irrational and repetitive impulse to perform some act, e. g. frequent handwashing. compulsive personality: excessive concern with rules, efficiency, order, neatness, and punctuality. conduct disorder: patterns of behavior that consistently violate established norms, usually applied to children and adolescents. conversion reaction: bodily symptoms, in the absence of any tissue damage, that symbolize the patient's psychological conflict. defense mechanism: a pattern of behavior that protects the person from anxious feelings. delusion: a persistent or dominating false conception regarding matters of fact, and which is resistant to reason. dementia: impairment of mental abilities, such as memory and problem-solving. dependent personality: a person who lacks of self-confidence, is easily influenced through dependence on others, and often avoids initiating action. depressed affect: refers to sadness or depression. depression: extreme sadness, often accompanied by self-blame. dissociation: the action of separating psychological processes that ordinarily are associated or connected; for example, upon experiencing misfortune the person fails to show expected or conventional signs of sadness. dysfunction: impairment of judgment or action, abnormal function. dyslexia: reading disorder characterized by omission, distortion, and modification of words while reading, often leading to avoidance of situations requiring normal reading skills. dysphoria: unhappy, feeling bad, unpleasant feelings (opposite of euphoria). ego-dystonic: refers to thoughts, images, and feelings that a person regards as alien, unwanted, and inconsistent with self-image. endogenous depression: feelings of sadness attributable to internal causes in the absence of external circumstances such as loss of job, death of a loved one, etc. entitlement: unreasonable expectation of especially favorable treatment. epilepsy: a physical illness, not a mental illness, characterized by seizures and loss of consciousness. Epileptics who conscientiously take standard doses of medication and who are free of seizures are not a security concern. Unusually high doses of medication or continued seizures indicate need for a medical evaluation. exhibitionism: displaying one's genitals or other private parts to an involuntary observer for the purpose of sexual arousal. exogenous depression: feelings of sadness associated with external circumstances such as loss of job, death of a spouse, not winning a coveted prize, etc. euphoria: feeling good, experiencing pleasant feelings. flashback: vivid, intense reliving of a past experience, usually an experience associated with the use of mind-altering drugs or post-traumatic stress disorder. functional psychosis: severe disturbance in thought, emotional display, and overt conduct in the absence of brain damage, intoxication, or chemical imbalance. grandiosity: exaggerated self importance, conceited, exaggerated expectations of recognition for ordinary job performance. hallucination: the report of imaginings that are bizarre and that others regard as inappropriate. The person "sees" things or events, or "hears" voices that cannot be validated by others. histrionic personality: a person who is typically overly dramatic, usually for the purpose of manipulating others. hysteria: a diagnostic term that has been replaced by either histrionic personality or conversion reaction. Historically, bodily symptoms in the absence of organic pathology. mania: extreme excitability, unrealistic cheerfulness, grandiose thinking often accompanied by insomnia. masochism: a term to denote a person's achieving sexual gratification from pain inflicted by another person. narcissism: self-indulgent, self-love, absorbed in self. neurosis: dominant feelings of anxiety, obsessive thoughts, compulsive actions, or physical complaints without objective evidence of physical disease. The concept of neurosis has been virtually displaced by "personality disorders." neurotic: pertaining to behavior associated with excessive use of defense mechanisms. obsessive-compulsive disorder: the person is preoccupied with unwanted thoughts and images (obsessions) and/or involuntary, repetitive actions that have no apparent purpose (compulsions). organic brain syndrome: impaired behavior attributable to brain disease or damage (sometimes called organic psychosis). paranoid: suspicious and mistrustful in the absence of reasons for such behavior. paraphilia: recurrent and intense sexual urge or sexually arousing fantasy generally involving either objects, suffering or humiliation, children, or nonconsenting partners. pathology: abnormal physical or psychological condition. phobia: irrational fear, often associated with avoidance of the object of such fears. physiological: pertaining to bodily, organic functioning. posttraumatic stress disorder: delayed stress resulting from some earlier traumatic event, flashbacks, nightmares, lack of concentration, and reports of feeling strange and out of touch with everyday events. premorbid: the psychological status of a person before the development of abnormal conduct. projection: a defense mechanism; attributing to another person, or to the environment, some undesirable impulse or characteristic which is actually within oneself. psychopathic personality: see antisocial personality. psychosis: a serious mental disorder involving severe distortion of reality; extreme impairment of thought and action (equivalent to everyday terms such as insanity, lunacy, madness, crazy). remission: marked improvement or recovery from an illness, although the improvement may be temporary. repression: a defense mechanism; a threatening thought is ignored in order to avoid the pain of acknowledging one's guilt or shame. Some authorities define repression as the mental condition of not being conscious of a painful thought or feeling. sadism: sexual gratification achieved by inflicting pain on others. schizophrenia: a term used to describe undesirable conduct characterized by hallucinations, delusions, or bizarre behavior. schizoid: a descriptive term for a person who appears alienated from others, has poor interpersonal skills, and withdraws from social interaction. sociopathic personality: see antisocial personality. somatic: refers to the body. stupor: unresponsiveness, sometimes equivalent to unconsciousness. voyeurism: sexual pleasure through observing others in the act of undressing, colloquially such a person is called a "Peeping Tom." Five-Axis System of Psychiatric Evaluations Some psychiatric evaluations follow a format suggested by the American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition. The diagnosis is given on five dimensions, or "axes." Axes I and II are for reporting any emotional, mental, or personality disorders or other conditions that are a focus of clinical attention. These are the heart of any assessment. Many psychiatric evaluations deal only with Axes I and II. Axis III is for reporting other general medical conditions that are potentially relevant to the understanding or management of the Axes I and II problems. For example, depression may be caused by a thyroid problem. Axis IV is for reporting stressful circumstances that may affect the diagnosis, treatment, or prognosis for mental disorders reported under Axis I and II. Examples of such circumstances are death of a family member, financial problems, job problems, sexual or physical abuse, and inadequate health care. These stressful circumstances are sometimes categorized on a scale that ranges from mild through moderate, severe, and extreme to catastrophic. Axis V is for reporting clinical judgment of the individual's overall level of psychological, social, and occupational functioning. How well the subject functions is summarized by a single number on a scale from 1 to 100. This can be useful to an adjudicator as a measure of how subject's mental condition may impact on work performance and ability to maintain the security of classified information. For an explanation of what these numbers mean, see the Global Assessment of Functioning (GAF) Scale, below. Global Assessment of Functioning (GAF) Scale Psychological, social, and occupational functioning is measured on a hypothetical continuum of mental health - illness. Impairment in functioning due to physical (or environmental) limitations is not included. Intermediate numbers such as 45, 68, or 72 may be used as appropriate. 100 - 91: Superior functioning in a wide range of activities, life's problems never seem to get out of hand, is sought out by others because of his or her many positive qualities. No symptoms. 90 - 81: Absent or minimal symptoms (e.g., mild anxiety before an exam), good functioning in all areas, interested and involved in a wide range of activities, socially effective, generally satisfied with life, no more than everyday problems or concerns (e.g., an occasional argument with family members) 80 - 71: If symptoms are present, they are transient and expectable reactions to psychosocial stressors (e.g., difficulty concentrating after family argument); no more than slight impairment in social occupational or school functioning (e.g., temporarily falling behind in schoolwork). 70 - 61: Some mild symptoms (e.g., depressed mood and mild insomnia) OR some difficulty in social, occupational, or school functioning (e.g., occasional truancy, or theft within the household), but generally functioning pretty well, has some meaningful interpersonal relationships. 60 - 51: Moderate symptoms (e.g., flat affect and unnecessarily detailed or repetitive speech, occasional panic attacks) OR moderate difficulty in social, occupational or school functioning (e.g., few friends, conflicts with peers or co-workers). 50 - 41: Serious symptoms ( e.g., suicidal ideation, severe obsessional rituals, frequent shoplifting) OR any serious impairment in social, occupational, or school functioning (e.g., no friends, unable to keep a job). 40 - 31: Some impairment in reality testing or communication (e.g., speech is at times illogical, obscure, or irrelevant ) OR major impairment in several areas, such as work or school, family relations, judgment, thinking, or mood ( e.g., depressed man avoids friends, neglects family, and is unable to work; child frequently beats up younger children, is defiant at home, and is failing at school). 30 - 21: Behavior is considerably influenced by delusions or hallucinations OR serious impairment in communication or judgment ( e.g., sometimes incoherent, acts grossly inappropriately, suicidal preoccupation) OR inability to function in almost all areas (e.g. stays in bed all day; no job, home, or friends). 20 - 11: Some danger of hurting self or others (e.g., suicide attempts without clear expectation of death; frequently violent; manic excitement) OR occasionally fails to maintain minimal personal hygiene (e.g., smears feces) OR gross impairment in communication (e.g., largely incoherent or mute). 10 - 1: Persistent danger of severely hurting self or others (e.g., recurrent violence) OR persistent inability to maintain minimal personal hygiene OR serious suicidal act with clear expectation of death. 0: Inadequate information. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5156 From: Steve Uhrig Date: Wed Apr 10, 2002 5:56pm Subject: Re: Emotional, Mental, and Personality Disorders My inferiority complex is bigger and better than anyone else's. Anyone who goes to a psychiatrist ought to have his head examined. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5157 From: Matthew Paulsen Date: Wed Apr 10, 2002 6:46pm Subject: RE: Re: Emotional, Mental, and Personality Disorders Test yourself.. and your cat! http://www.4degreez.com/misc/personality_disorder_test.mv The Top 16 Signs Your Cat has a Personality Disorder 16. Couldn't muster up sufficient disdain if all nine lives depended on it! 15. You've repeatedly found him in the closed garage, hunched over the wheel of your running Buick. 14. Sits for hours in fascination while listening to Bob Dole. 13. Teeth and claw marks all over your now-empty bottles of Prozac. 12. No longer licks paws clean, but washes them at the sink again and again and again... 11. Continually scratches on the door to get in... the OVEN door. 10. Doesn't get Garfield, but laughs like hell at Marmaduke. 9. Rides in your car with its head out the window. 8. She's a dues-paid, card-carrying member of the Reform Party. 7. You realize one day that the urine stains on the carpet actually form the letters N-E-E-D T-H-E-R-A-P-Y. 6. Has built a shrine to Andrew Lloyd Webber entirely out of empty "9 Lives" cans. 5. Spends all day in litterbox separating the green chlorophyll granules from the plain white ones. 4. After years of NPR, Tabby is suddenly a Ditto-Puss. 3. Sullen and overweight, your sunglass-wearing cat shoots the TV with a .45 Magnum when it sees cartoon depictions of stupid or lazy felines. 2. Your stereo is missing, and in the corner you find a pawn ticket and 2 kilos of catnip. and the Number 1 Sign Your Cat has a Personality Disorder... 1. Makes an attempt on "First Cat" Sock's life in a pathetic attempt to impress Jodie Foster. -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Wednesday, April 10, 2002 3:56 PM To: Tscm-l@yahoogroups.com Subject: [TSCM-L] Re: Emotional, Mental, and Personality Disorders My inferiority complex is bigger and better than anyone else's. Anyone who goes to a psychiatrist ought to have his head examined. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5158 From: James M. Atkinson Date: Wed Apr 10, 2002 8:28pm Subject: Russia accuses US of 'spy plot' [The nice kids at Langley seems to have step in it again -jma] http://news.bbc.co.uk/hi/english/world/europe/newsid_1921000/1921567.stm Wednesday, 10 April, 2002, 17:35 GMT 18:35 UK Russia accuses US of 'spy plot' ==================================== "The FSB has irrefutable evidence of the CIA's spying activities against Russia." - FSB official ==================================== The case has echoes of the old days of the KGB Russian intelligence officials say they have uncovered a plot by the United States to try to steal military secrets using spies. A spokesman for Russia's internal intelligence agency, the Federal Security Service (FSB), accused the CIA of trying to get classified information on new kinds of weaponry and Russia's defence links with other ex-Soviet states. "The mission was carried out by CIA officers, working under cover of US diplomatic representations in Moscow and one of the CIS countries," the FSB said in a statement. The US embassy in Moscow has refused to comment on the case, which comes just weeks before a US-Russian summit. Tricks of the trade "The FSB has irrefutable evidence of the CIA's spying activities against Russia," an FSB official said. A diplomat at the US embassy in Moscow is accused of leading an operation to recruit a Russian defence ministry specialist who was working on top secret matters. The timely intervention of the Russian counter intelligence services enabled them to prevent serious damage to Russia's security FSB statement Sources told the Interfax agency that the diplomat, a woman, had already left Moscow. She allegedly used coded letters, invisible ink and dead letter boxes to communicate with her target. Another CIA undercover agent, a man named as David Robertson, is alleged to have met the informer outside Russia. "The timely intervention of the Russian counter intelligence services enabled them to uncover the CIA's plans at an early stage, bring their activities under control and prevent serious damage to Russia's security," the FSB said. Tensions rising Russia and the United States have traded mutual accusations of spying a number of times in recent years. The Robert Hanssen case sparked dozens of expulsions Just over a year ago, the US expelled 50 Russian diplomats on spying charges, prompting Russia to expel 46 American diplomats, after FBI agent Robert Hanssen was revealed to have spied for Russia. And six months before that, American Edmund Pope was sentenced to 20 years in jail for trying to acquire military secrets. President Vladimir Putin later pardoned him on grounds of ill health. The latest spying allegations are set to heighten tensions before Mr Putin meets US President George W Bush in a few weeks' time. After a brief spell of detente, following the 11 September attacks, friction between the nations has recently grown as they come into conflict over issues including steel tariffs and poultry imports. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5159 From: James M. Atkinson Date: Wed Apr 10, 2002 8:30pm Subject: FBI Concedes Spy Could Still Go Undetected [Like I said before, and will say again... -jma] http://www.washingtonpost.com/wp-dyn/articles/A22524-2002Apr9.html FBI Concedes Spy Could Still Go Undetected By Walter Pincus Washington Post Staff Writer Wednesday, April 10, 2002; Page A06 More than a year after the arrest of FBI spy Robert P. Hanssen, there is still "substantial risk" that a bureau insider could commit espionage undetected, the FBI's new chief of security told a Senate committee yesterday. Kenneth H. Senser, the FBI's new assistant director for security, said it will take more time to install adequate safeguards in the FBI's aging computer system and another six months before a personal financial disclosure program can be started. Senser told Sen. Patrick J. Leahy (D-Vt.), chairman of the Senate Judiciary Committee, that "there is a greater possibility we would probably detect him [Hanssen] today than a year ago." But he quickly added: "I can't say with certainty that they [inside spies] would be detected." The delay in introducing financial disclosure requirements for FBI agents and employees surprised senators because Hanssen had told a commission investigating his more than 20 years of espionage that such a requirement might have led to his discovery. Senser said the FBI is drawing up the program requirements and hiring people to supervise and review the submitted disclosures. "It may be in the next six months," Senser said, "that we may be able to launch the program." Hanssen, 57, was arrested by the FBI in February 2001 after he left a cache of classified documents for his Moscow handlers in a park near his Vienna home. The Soviet Union and Russia paid him more than $1.4 million in cash, diamonds and promised bank deposits in exchange for betraying U.S. secrets, officials have said. The 25-year FBI veteran pleaded guilty in July to 15 counts of espionage as part of an agreement to avoid the death penalty. He is scheduled to be sentenced May 10. Senser and two other senior FBI officials appeared before the panel after the testimony of William H. Webster, who headed the commission that last week recommended several reforms after a year-long inquiry into the Hanssen case that found numerous security gaps at the FBI. Webster, who led the FBI and CIA at different times in the 1980s and 1990s, emphasized one of the recommendations stemming from the inquiry: that a government-wide system be established so "security lapses in a particular intelligence entity lead to improved security measures throughout the entire intelligence community." Many of the Webster panel's recommendations concerned the FBI's computer systems, which Webster said had been "underfunded for years." Hanssen, he said, did not have to "hack" his way into the system becauseeven restricted information is available to anyone with access to the computers. Some of the improvements being sought would create "tripwires" that would reveal the identity of anyone trying to access case files. But Sen. Richard J. Durbin (D-Ill.), who has studied the bureau's computers, said the new computer system the FBI is installing "would not be able to pull [the FBI program] out of the swamp" it is in. Senser said a recently approved supplemental appropriation would "begin the process of getting an information assurance program" and another $78 million was in the fiscal 2003 budget. But he could not estimate the cost of complete modernization. In September 2000, Congress approved $379 million for updating FBI computers. Leahy said the FBI's practice of putting sensitive foreign intelligence wiretap information on its computer case-tracking system, given the limited security precautions, ran contrary to FBI promises to hold such information more closely when it requested increased authority to conduct wiretaps after the Sept. 11 terrorist attacks. Dale Watson, the FBI's chief of counterterrorism and counterintelligence operations, assured Leahy that the rules involving that information, which had not been enforced in the past, "must be followed." © 2002 The Washington Post Company -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5160 From: James M. Atkinson Date: Wed Apr 10, 2002 8:43pm Subject: SPA-22-Russia says it uncovers CIA spy ring http://www.spa.gov.sa/html/archive_e.asp?srcfile=512180&NDay=10/04/2002&wcatg=0 Date :4/10/02 2:59:57 PM No.: 22 SPA-22-Russia says it uncovers CIA spy ring - Interfax MOSCOW, April 10, SPA - - Russia's Federal Security Bureau said on Wednesday it had uncovered a U.S. plan to steal Russian military secrets, Interfax news agency reported. CIA officials posing as U.S. diplomats tried to recruit an expert in a secret Defense Ministry plant before the FSB intervened, the agency said. "The FSB has irrefutable evidence of the CIA's spying activities in Russia," an FSB official was quoted as saying. "The work was carried out by CIA officers, working under the cover of American diplomats in Moscow and in one of the CIS states." The U.S. embassy was not immediately available for comment on the accusations, which come just over a month before a summit in Russia between President Vladimir Putin and his U.S. counterpart George W. Bush. --SPA1459 Local Time 1159 GMT -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5161 From: James M. Atkinson Date: Wed Apr 10, 2002 8:46pm Subject: Russian Agency Accuses CIA Of Spying http://www.guardian.co.uk/worldlatest/story/0,1280,-1651368,00.html Russian Agency Accuses CIA Of Spying Wednesday April 10, 2002 10:10 PM MOSCOW (AP) - The Russian successor to the KGB on Wednesday accused the CIA of trying to acquire military secrets, allegations that include such traditional spy tradecraft as invisible ink, secret drop points and mind-altering drugs. Russian television showed grainy footage provided by security services. Mark Mansfield, spokesman for the Langley, Va.-based CIA, declined to comment Wednesday. Agency officials routinely decline to discuss foreign allegations of U.S. espionage. Despite the end of the Cold War, experts say the spy business is alive and well between Russia and the United States and that both sides have a healthy interest in trying to predict the other's next moves - even if they're now allies. A spokesman for the Federal Security Service, the Soviet-era KGB's chief successor, said CIA officers posing as embassy officials in Russia and another, unidentified ex-Soviet republic had tried to recruit an employee at a secret Russian Defense Ministry installation. The security service interfered at an early stage and was able to monitor the CIA officers' activities and prevent serious damage to Russia's security, the spokesman said on condition of anonymity. The service named two alleged participants in the operation: David Robertson, whose post at an unnamed embassy in the former Soviet Union was not described, and Yunju Kensinger, reportedly a third secretary in the consular department of the U.S. Embassy in Moscow. The Interfax news agency, citing an ``informed source,'' said Kensinger had already left Moscow. It quoted the security service's press office as saying that Kensinger, like other alleged American intelligence agents in Russia, had not met personally with her Russian contact or contacts. Instead, she used secret drop points and messages in invisible ink. State-controlled ORT television showed grainy footage of a woman identified as Kensinger walking with other embassy employees. It also broadcast pictures of a plastic-wrapped package stashed among some bushes in what it identified as the Sokolniki region of Moscow, and an interview in a darkened room with a man identified as a Federal Security Service operative. He explained that the Russian Defense Ministry employee, identified only by his first name, Viktor, had gone to a U.S. Embassy in another former Soviet republic last spring to try to find information about a relative who had gone missing abroad. Embassy officers allegedly slipped him psychotropic drugs to get information, because he was found a week later wandering the streets in shock and with amnesia. The ITAR-Tass news agency reported that only after psychiatric treatment had Viktor - whom a security service employee called a ``real patriot'' - been able to reconstruct the details of his visit. ``As a result, the Federal Security Service took the necessary steps to stop the leak of Russian secrets through this channel and unmask the Langley employees who used the most unscrupulous methods,'' ITAR-Tass said. The U.S. Embassy in Moscow would not comment on the espionage accusation, which followed a warm spell prompted by Russia's participation in the U.S.-led anti-terror campaign. Analysts noted the latest spy scandal emerged just weeks ahead of a May summit between President Bush and Putin. ``It's the choice of timing that immediately raises questions,'' said Tom Sanderson of the Center for Strategic and International Studies in Washington. ``There are a number of people who are unhappy at how Putin is walking in lockstep with the Americans.'' Viktor Kremenyuk, deputy director for the USA-Canada Institute in Moscow, doubted the scandal will affect the summit. ``Of course spy scandals aren't good for bilateral relations, but they don't have any negative consequences,'' he told the Interfax news agency. Relations haven't been too cozy, however. In December, President Bush announced that the United States would dump the Anti-Ballistic Missile Treaty, which Moscow had vowed to preserve. The two nations also sparred over newly imposed U.S. steel tariffs, which Russia says will severely damage its metals industry, and Russia's ban on U.S. poultry. Shortly after Putin, a former KGB agent, became acting president in December 1999, U.S. businessman Edmond Pope became the first American convicted of spying in Russia in 40 years. Putin pardoned him shortly after his conviction. Last year, Russia ordered 50 U.S. diplomats to leave the country, mirroring the U.S. expulsion of Russian diplomats following the arrest of FBI agent Robert Hanssen on charges of spying for Moscow. The Russians' arrest of U.S. Fulbright scholar John Tobin on marijuana charges also attracted wide attention after security officials said they believed he was a spy in training. Tobin was freed from prison last August. Guardian Unlimited © Guardian Newspapers Limited 2002 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5162 From: James M. Atkinson Date: Wed Apr 10, 2002 8:44pm Subject: Russia says uncovers CIA spy ring - Continued http://www.russiajournal.com/news/index.shtml?nd=12675#n12675 19:44 [Wednesday 10th April, 2002] Russia says uncovers CIA spy ring MOSCOW - Russia on Wednesday accused the United States of trying to steal military secrets, just weeks before President Vladimir Putin and his U.S. counterpart George W. Bush are due to meet in Moscow. The Interfax news agency quoted an official of the FSB domestic security service as saying it had uncovered a U.S. spy ring. CIA officials posing as U.S. diplomats had tried to recruit an expert in a secret Defence Ministry plant before the FSB, the main successor to the Soviet KGB, intervened, it said. "The FSB has irrefutable evidence of the CIA's spying activities in Russia," an FSB official was quoted as saying. "The timely intervention of the Russian security service stopped the U.S. plans at an early stage, taking control of their action and preventing a serious threat to the security of the Russian Federation." Officials at the U.S. embassy in Moscow and the CIA in Washington declined to comment. The FSB was unavailable for comment. Russia and the United States have improved ties since the September 11 attacks against U.S. cities, when Putin was among the first to offer his support. The Kremlin has since backed the U.S.-led war on terrorism. The FSB charges add to a growing list of woes likely to crop up at the May 23-25 summit in Moscow and St Petersburg, already set to include bickering over U.S. poultry imports, a U.S.-funded radio broadcast to Russia's separatist Chechnya region and nuclear disarmament. The unnamed FSB official, speaking to Interfax, named a junior diplomat in the U.S. embassy in Moscow as leading the operation, adding the diplomat had already left Russia. "The work was carried out by CIA officers, working under the cover of American diplomats in Moscow and in one of the CIS states," the official said. In March last year, 50 Russian diplomats were expelled from the United States, prompting a tit-for-tat response from the Kremlin in the worst spy scandal to shake Moscow and Washington since the Cold War. /Reuters/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- From: James M. Atkinson Date: Sat Apr 5, 2003 3:19pm Subject: Re: Membership Warning John, Your make a good point, but it is morally wrong and dishonest for good men keep their mouth shut about con artists, thieves, felons, and fraudsters. By keeping quiet it allows the bad guys to lie, cheat, and steal from even more victims. If you say nothing then you are partially responsible for creating more victims. Fight the good fight, and give no quarter to the dirt-bag, felons, and con artists that prey on our profession, or those that give our profession a bad name. -jma At 1:34 PM -0800 4/4/03, refmon wrote: >Hi, > >John Collins here. While I am not a licensed investigator, I have had to >wrestle with this sort of thing many times. This felonious fraudulator is >one of a few subjects I can comment on with some level of real knowledge, >having dealt with the underlying maladjustments (to put it mildly) in >personal and corporate situations. > >To put it in short form, all the discussion and public reaction, etc is >contributing to keeping this guy afloat...he is all about the drama and >controversy and drawing others into the emotional cyclone. This is an >incredibly "convenient" malady for he who has it-all the symptoms are >self-validating and all who are critical of the individual are automatically >liars and frauds (again, in his mind). The more drawn into the drama or >crisis everyone becomes, the more empowered (in his own mind) he becomes, >and resultantly, the more in your face. As has been pointed out, at some >point he may cross the wrong person, but it's not likely. In my experience, >this sort of individual is eerily skilled at reading potential victims at a >glance, has a chameleon-like presence, and walks the line just short of >soliciting a violent or otherwise decisive reaction...thus, the low/mid >level, constant, yammering and not-quite-worth-it legal violations. In the >rare situation where he may get caught, convicted and slammered, he's a >victim, he resets, and comes out even more righteous and "insightful". > >I'd predict that if everyone stopped reacting to the guy that he will >attempt several times to create new dramas...getting no reaction, he will >move on to other grazing grounds or simply fall apart. The problem remains >that he moves on to other victims...those who serve to protect those victims >don't get to walk away... I have had to work with mental health >professionals who find this sort of personality disorder so draining that >they must self-counsel within their own local groups in order to avoid fast >burnout. > >The biggest mistake I have seen made with people like this is trying to use >conventional enforcement or treatment modes...they do not respond in a >constructive way. Corporate HR and Security departments usually don't seem >to recognize this...there is no way that current policy established by a >corporation of healthy people would even remotely apply to such an >individual. Likewise, most normal, well meaning people are not equipped to >spot and/or deal with such an individual. > >Just two cents worth from a battle worn corporate manager and father. > >good luck & best regards > >John Collins >_______________________________________________________ >----- Original Message ----- >From: "James M. Atkinson" >To: "TSCM-L Mailing List" >Sent: Friday, April 04, 2003 12:00 AM >Subject: RE: [TSCM-L] Membership Warning > > >> At 5:39 PM -0800 4/3/03, Matt Paulsen wrote: >> >I guess he'll will now 'sue' cryptome.. be prepared for more spam with >more >> >copyright than you can stand in your inbox.. >> >http://cryptome.org/threats/iam-threat.htm >> > >> >- Original Message - >> >> There is a convicted felon, and con artist in Tampa, Florida who has >been >> >spoofing email to members of this list, claiming that my website is going >> >down >> >> >> >> But if the watchman see the sword come, and blow not >> the trumpet, and the people be not warned; if the >> sword come, and take any person from among them, he >> is taken away in his iniquity; but his blood will I > > require at the watchman's hand. -Ezekiel 33:6 >> > > -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7174 From: Merl Klein Date: Sat Apr 5, 2003 0:51pm Subject: Fw: legal question ----- Original Message ----- From: Merl Klein To: TSCM-L@yahoogroups.com ; Andre Holmes Sent: Friday, April 04, 2003 3:08 PM Subject: Re: [TSCM-L] legal question Hi A.H. In Canada (Ha Ha) There are provisions in the Criminal Code that prohibit the disclosure of any information surrounding any legally authorized interception. This interception is not limited to Law inforcement. But try to get a civil order! There are also provisions in the Criminal Code that allow for a general warrant to be issued to protect any TSCM contractor from Civil prosecution by his customer. So get to know the technical law enforcement personel in your area, REALLY WELL In the past I have found that the removal of the device by myself, not telling my customer, and returning the device to the Police has left the Police with an operational problem (IE reinstallation of the device), and I have been able to assure my client that his conversations are remaining private. Everyone is happy, and no laws have been broken. Don't know if this fits in your jurisdiction, but it works in Western Canada. Merl KLEIN (604-469-2009) Technical Security Investigations Ltd. ----- Original Message ----- From: Andre Holmes To: TSCM-L@yahoogroups.com Sent: Wednesday, April 02, 2003 5:58 AM Subject: Fw: [TSCM-L] legal question ----- Original Message ----- From: Andre Holmes To: jw mooty Sent: Wednesday, April 02, 2003 8:57 AM Subject: Re: [TSCM-L] legal question Hello JW Try http://www.aesham.com I have both full and cell blocked the cell blocked is better. Andre Holmes Neptune Enterprise Security USA ----- Original Message ----- From: jw mooty To: Andre Holmes Sent: Wednesday, April 02, 2003 8:42 AM Subject: Re: [TSCM-L] legal question where mite i buy a The Icom R2 ... wes mooty 501-617-4103 ----- Original Message ----- From: Andre Holmes To: TSCM-L@yahoogroups.com Sent: Wednesday, April 02, 2003 7:33 AM Subject: Re: [TSCM-L] legal question ----- Original Message ----- From: To: Sent: Tuesday, April 01, 2003 10:33 AM Subject: [TSCM-L] legal question > > if a bug sweep turns up evidence > of police surveillance, does the > sweep company have to notify the > police that they are telling > their client that they have discovered > their bugs, cleaned/removed them? ==== I would by all means tell the client of the find it would be fulfilling your obilgation. ===== If you should see that the device is being monitored by the Police then you should not touch the device if it is located outside of the clients personal property in my opinion. ===== There remains at issue is the device there as a result of Court order meaning that a felony has been commited by your client on the flip side with out a Court order the client has a legal right to argue invasion of privacy, and possibility of illegal evidence gathering against him/her so its imperative that the defence attorney request discovery of a court order. =====If a device is found possibly installed by the Police and there is evidence of there presence then the sweep team should ducument all activity around the location of the sweep. ===== I have rolled up on a Police covert operation and I had with me a Icom R2 in full scan. ===== The Icom R2 locked on 434 MHz with 5 KHz spacing, I was approx 400 ft from the target area in a vehicle. ===== I noticed that they were using a 434 MHz wireless camera with the undercover agent in a lighted area to compensate for lux. 40 ft away was the recording team, it was great to see it all in real time and pick off the wireless camera at the same time so if you are within the radius of a real bug you should have no problem locking on the signal. ------- The Icom R2 sqwilled big time. ==== My experience =====Andre Holmes Neptune Enterprise Security USA > is it legal to remove police bugs/ > surveillance cams? > > i assume the sweep company is allowed to reveal > police bug/cam findings to their > client, right? > > thanks! val > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 7175 From: Andre Holmes <1ach@g...> Date: Sat Apr 5, 2003 6:55pm Subject: Re: legal question Hello Merl Its nice information and I will cherish it. Thanks Andre Holmes Neptune Enterprise Security USA ----- Original Message ----- From: "Merl Klein" To: Sent: Saturday, April 05, 2003 1:51 PM Subject: Fw: [TSCM-L] legal question > > ----- Original Message ----- > From: Merl Klein > To: TSCM-L@yahoogroups.com ; Andre Holmes > Sent: Friday, April 04, 2003 3:08 PM > Subject: Re: [TSCM-L] legal question > > > Hi A.H. > > In Canada (Ha Ha) There are provisions in the Criminal Code that prohibit the disclosure of any information surrounding any legally authorized interception. This interception is not limited to Law inforcement. But try to get a civil order! There are also provisions in the Criminal Code that allow for a general warrant to be issued to protect any TSCM contractor from Civil prosecution by his customer. So get to know the technical law enforcement personel in your area, REALLY WELL In the past I have found that the removal of the device by myself, not telling my customer, and returning the device to the Police has left the Police with an operational problem (IE reinstallation of the device), and I have been able to assure my client that his conversations are remaining private. Everyone is happy, and no laws have been broken. > > Don't know if this fits in your jurisdiction, but it works in Western Canada. > > > Merl KLEIN (604-469-2009) > Technical Security Investigations Ltd. > > > ----- Original Message ----- > From: Andre Holmes > To: TSCM-L@yahoogroups.com > Sent: Wednesday, April 02, 2003 5:58 AM > Subject: Fw: [TSCM-L] legal question > > > > ----- Original Message ----- > From: Andre Holmes > To: jw mooty > Sent: Wednesday, April 02, 2003 8:57 AM > Subject: Re: [TSCM-L] legal question > > > Hello JW > > Try http://www.aesham.com I have both full and cell blocked the cell blocked is better. > > Andre Holmes > Neptune Enterprise Security > USA > ----- Original Message ----- > From: jw mooty > To: Andre Holmes > Sent: Wednesday, April 02, 2003 8:42 AM > Subject: Re: [TSCM-L] legal question > > > where mite i buy a > The Icom R2 ... > > > wes mooty > 501-617-4103 > > > > > ----- Original Message ----- > From: Andre Holmes > To: TSCM-L@yahoogroups.com > Sent: Wednesday, April 02, 2003 7:33 AM > Subject: Re: [TSCM-L] legal question > > > > ----- Original Message ----- > From: > To: > Sent: Tuesday, April 01, 2003 10:33 AM > Subject: [TSCM-L] legal question > > > > > > if a bug sweep turns up evidence > > of police surveillance, does the > > sweep company have to notify the > > police that they are telling > > their client that they have discovered > > their bugs, cleaned/removed them? > > > ==== I would by all means tell the client of the find it would be > fulfilling your obilgation. > > ===== If you should see that the device is being monitored by the Police > then you should not touch the device if it is located outside of the clients > personal property in my opinion. > > ===== There remains at issue is the device there as a result of Court order > meaning that a felony has been commited by your client on the flip side with > out a Court order the client has a legal right to argue invasion of privacy, > and possibility of illegal evidence gathering against him/her so its > imperative that the defence attorney request discovery of a court order. > > =====If a device is found possibly installed by the Police and there is > evidence of there presence then the sweep team should ducument all activity > around the location of the sweep. > > ===== I have rolled up on a Police covert operation and I had with me a Icom > R2 in full scan. > > ===== The Icom R2 locked on 434 MHz with 5 KHz spacing, I was approx 400 ft > from the target area in a vehicle. > > ===== I noticed that they were using a 434 MHz wireless camera > with the undercover agent in a lighted area to compensate for lux. > 40 ft away was the recording team, it was great to see it all in real time > and pick off the wireless camera at the same time so if you are within the > radius of a real bug you should have no problem locking on the signal. > > ------- The Icom R2 sqwilled big time. > > ==== My experience > > =====Andre Holmes > Neptune Enterprise Security > USA > > is it legal to remove police bugs/ > > surveillance cams? > > > > i assume the sweep company is allowed to reveal > > police bug/cam findings to their > > client, right? > > > > thanks! val > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > > > [Non-text portions of this message have been removed] > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 7176 From: refmon Date: Sat Apr 5, 2003 6:59pm Subject: Re: Membership Warning Hi James, As with most of my 1:30AM emails, I could have done better in organizing my thoughts. I tried to note that "The problem remains that he moves on to other victims...those who serve to protect those victims don't get to walk away...", which refers directly to those good men who work to battle the conartists, thieves, felons and fraudsters. I could have presented the point better. The key for the civilian victims is that they be guided to not get sucked in further...it's harder than it sounds. Those who must deal with this sort of person need to keep their own mental health in mind...I have seen this sort of person do immeasurable damage without actually lifting a finger-once the victims (a person or an organization) get sucked in, they tend to further the damage through their continued interaction with the offender. In short, your statement is absolutely true-to do this subject justice, it takes several volumes. John _______________________________________________ ----- Original Message ----- From: "James M. Atkinson" To: Sent: Saturday, April 05, 2003 01:19 PM Subject: Re: [TSCM-L] Membership Warning > John, > > Your make a good point, but it is morally wrong and dishonest for > good men keep their mouth shut about con artists, thieves, felons, > and fraudsters. > > By keeping quiet it allows the bad guys to lie, cheat, and steal from > even more victims. If you say nothing then you are partially > responsible for creating more victims. > > Fight the good fight, and give no quarter to the dirt-bag, felons, > and con artists that prey on our profession, or those that give our > profession a bad name. > > -jma > > > > At 1:34 PM -0800 4/4/03, refmon wrote: > >Hi, > > > >John Collins here. While I am not a licensed investigator, I have had to > >wrestle with this sort of thing many times. This felonious fraudulator is > >one of a few subjects I can comment on with some level of real knowledge, > >having dealt with the underlying maladjustments (to put it mildly) in > >personal and corporate situations. > > > >To put it in short form, all the discussion and public reaction, etc is > >contributing to keeping this guy afloat...he is all about the drama and > >controversy and drawing others into the emotional cyclone. This is an > >incredibly "convenient" malady for he who has it-all the symptoms are > >self-validating and all who are critical of the individual are automatically > >liars and frauds (again, in his mind). The more drawn into the drama or > >crisis everyone becomes, the more empowered (in his own mind) he becomes, > >and resultantly, the more in your face. As has been pointed out, at some > >point he may cross the wrong person, but it's not likely. In my experience, > >this sort of individual is eerily skilled at reading potential victims at a > >glance, has a chameleon-like presence, and walks the line just short of > >soliciting a violent or otherwise decisive reaction...thus, the low/mid > >level, constant, yammering and not-quite-worth-it legal violations. In the > >rare situation where he may get caught, convicted and slammered, he's a > >victim, he resets, and comes out even more righteous and "insightful". > > > >I'd predict that if everyone stopped reacting to the guy that he will > >attempt several times to create new dramas...getting no reaction, he will > >move on to other grazing grounds or simply fall apart. The problem remains > >that he moves on to other victims...those who serve to protect those victims > >don't get to walk away... I have had to work with mental health > >professionals who find this sort of personality disorder so draining that > >they must self-counsel within their own local groups in order to avoid fast > >burnout. > > > >The biggest mistake I have seen made with people like this is trying to use > >conventional enforcement or treatment modes...they do not respond in a > >constructive way. Corporate HR and Security departments usually don't seem > >to recognize this...there is no way that current policy established by a > >corporation of healthy people would even remotely apply to such an > >individual. Likewise, most normal, well meaning people are not equipped to > >spot and/or deal with such an individual. > > > >Just two cents worth from a battle worn corporate manager and father. > > > >good luck & best regards > > > >John Collins > >_______________________________________________________ > >----- Original Message ----- > >From: "James M. Atkinson" > >To: "TSCM-L Mailing List" > >Sent: Friday, April 04, 2003 12:00 AM > >Subject: RE: [TSCM-L] Membership Warning > > > > > >> At 5:39 PM -0800 4/3/03, Matt Paulsen wrote: > >> >I guess he'll will now 'sue' cryptome.. be prepared for more spam with > >more > >> >copyright than you can stand in your inbox.. > >> >http://cryptome.org/threats/iam-threat.htm > >> > > >> >- Original Message - > >> >> There is a convicted felon, and con artist in Tampa, Florida who has > >been > >> >spoofing email to members of this list, claiming that my website is going > >> >down > >> > >> > >> > >> But if the watchman see the sword come, and blow not > >> the trumpet, and the people be not warned; if the > >> sword come, and take any person from among them, he > >> is taken away in his iniquity; but his blood will I > > > require at the watchman's hand. -Ezekiel 33:6 > >> > > > -jma > -- > > -------------------------------------------------------------------------- ------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------- ------------------------ > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > -------------------------------------------------------------------------- ------------------------ > Vocatus atque non vocatus deus aderit > -------------------------------------------------------------------------- ------------------------ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 7177 From: Date: Sun Apr 6, 2003 1:39am Subject: Rif: Re: Rif: Useful conversion chart > Ok, if we're trotting out old calculators stories... (grin) > I've still got the first one I bought, and still use it daily. > It's a Texas Instruments SR-10. I paid $40 for it, and that was I think > 1970 or 71. >> When I was a chemical engineering student at the Milano Politecnico, >> I had two calculators: a 10-inch "desktop" model, for the heavy work, >> when a higher precision was needed, an a half-size "pocket" model, >> for the quick and dirty shots. I got my degree in 1969.... Ahem, I intended slide-rule calculators, the 25 cm long one, to be used on the desktop, was at the same time "portable". :-) Ciao! Remo 7178 From: Date: Sat Apr 5, 2003 10:04pm Subject: Advice please Dear Members Does anybody own or has owned an AVCOM Spectrum Analyser ie the PSA-65C or the PSA-65A together with aN AVCOM Frequency Extender. I am looking to replace my German HAMEG I use for field work with something more suited to Countermeasures work and "field lab" use. AVCOM seem to be the only manufacturer around to tailor an Analyser to TSCM use at a reasonable price Any advice for or against would be very welcome Regards Dave UK TSCM [Technical Surveillance and Countermeasures] David McGauley Demtec Electronic Surveillance and Counter Measures Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L39 0HF UK 01695 558544 07866206112 demtec@a... www.demtec.co.uk [under construction] The manufacture and installation of custom made covert electronic audio and video devices Professional physical and electronic counter measures [sweep] services. Note: any fellow UKPIN members welcome to call in to discuss applications. Workshop located alongside the M58 junc 3 [Non-text portions of this message have been removed] 7179 From: Robert Dyk Date: Sun Apr 6, 2003 11:14am Subject: RE: Advice please One of my spectrum analyzers is a PSA-65. This unit has been exceptionally reliable and robust. I have the outboard frequency conversion modules to 3 gig. This unit warms up in seconds and is ready to go at a moments notice. With the right antennae, I would not hesitate to recommend this unit for the job it is intended to do. It has its quirks like any other piece of equipment, but this unit does not owe me anything and continues to do its job without issue. Important note: all my gear travels in Pelican 1650 road cases and is only ever out of them to use or recharge. Good Luck, Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. > -----Original Message----- > From: DEMTEC@A... [mailto:DEMTEC@A...] > Sent: April 6, 2003 4:05 AM > To: tscm-l@yahoogroups.com > Subject: [TSCM-L] Advice please > > > Dear Members > Does anybody own or has owned an AVCOM Spectrum Analyser ie the PSA-65C > or the PSA-65A together with aN AVCOM Frequency Extender. > I am looking to replace my German HAMEG I use for field work with > something > more suited to Countermeasures work and "field lab" use. > AVCOM seem to be the only manufacturer around to tailor an > Analyser to TSCM > use at a reasonable price > Any advice for or against would be very welcome > Regards Dave UK > > TSCM [Technical Surveillance and Countermeasures] > David McGauley > Demtec > Electronic Surveillance and Counter Measures Specialist > Electrical/Electronics Engineer ex Police > Demtec House > Ormskirk > Lancs L39 0HF > UK > 01695 558544 > 07866206112 > demtec@a... > www.demtec.co.uk [under construction] > The manufacture and installation of custom made covert electronic > audio and > video devices > Professional physical and electronic counter measures [sweep] services. > Note: any fellow UKPIN members welcome to call in to discuss applications. > Workshop located alongside the M58 junc 3 > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 7180 From: Mitch D Date: Sun Apr 6, 2003 9:11pm Subject: Re: Advice please The AVCOM's are very user friendly. I have both a PSA 65 A and C. I like the using the extenders on the C with the clear backlit LCD display,theres no math to do when looking at diff freqs. They both work well,calibrate easy,are built like "brick outhouses"and travel well. Tech Support used to be very good for AVCOM,although Ramsey is now the distributor for the line.I havent had any problems since Ramsey took over. If you go AVCOM get the padded case,its worth the extra money IMHO as are the extenders and other accessories. I purchased mine from SWS (Steve U).You may want to drop him a line and inquire as to if he has any in stock --- DEMTEC@A... wrote: > Dear Members > Does anybody own or has owned an AVCOM Spectrum Analyser ie > the PSA-65C > or the PSA-65A together with aN AVCOM Frequency Extender. > I am looking to replace my German HAMEG I use for field work > with something > more suited to Countermeasures work and "field lab" use. > AVCOM seem to be the only manufacturer around to tailor an > Analyser to TSCM > use at a reasonable price > Any advice for or against would be very welcome > Regards Dave UK > > TSCM [Technical Surveillance and Countermeasures] > David McGauley > Demtec > Electronic Surveillance and Counter Measures Specialist > Electrical/Electronics Engineer ex Police > Demtec House > Ormskirk > Lancs L39 0HF > UK > 01695 558544 > 07866206112 > demtec@a... > www.demtec.co.uk [under construction] > The manufacture and installation of custom made covert > electronic audio and > video devices > Professional physical and electronic counter measures [sweep] > services. > Note: any fellow UKPIN members welcome to call in to discuss > applications. > Workshop located alongside the M58 junc 3 > > > [Non-text portions of this message have been removed] > > > ===== Mitch Davis TSCM/Special Operations Group Inc. Antioch,TN.USA MitchD@t... website:www.tscmusa.com. Tel (615)837-9933 Cell(615) 584-9933 __________________________________________________ Do you Yahoo!? Yahoo! Tax Center - File online, calculators, forms, and more http://tax.yahoo.com 7181 From: Date: Sun Apr 6, 2003 6:57am Subject: Re: Advice please Robert Many Thanks for your reply and advice I was most interested also to see you are using the Frequency extenders successfully. Does the Avcom have any outputs on its rear ie an IF port that can be connected to a scanner to demodulate signals??? There is no mention of any o/p ports in the published spec I know that the AVCOM already has a demodulator built in but seems to me that such a hookup would be more sensitive and of a higher resolution used with my higher spec ICOM 8500 Receiver Regards Dave TSCM [Technical Surveillance and Countermeasures] David McGauley Demtec Electronic Surveillance and Counter Measures Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L39 0HF UK 01695 558544 07866206112 demtec@a... www.demtec.co.uk [under construction] The manufacture and installation of custom made covert electronic audio and video devices Professional physical and electronic counter measures [sweep] services. Note: any fellow UKPIN members welcome to call in to discuss applications. Workshop located alongside the M58 junc 3 [Non-text portions of this message have been removed] 7182 From: John M Date: Sun Apr 6, 2003 1:38pm Subject: Re: Bad American (hoax) http://www.georgecarlin.com/georgecarlin/home/dontblame.html After just seeing him ranting on HBO last night, this seemed a lot more reactionary then his usual diatribes. Took about 10 seconds on Google to find that this is a hoax that has been variously attributed to him and also Ted Nugent. Nugent published portions of it in his gun magazine in 2001 but denies writing it. The politics of the letter seem more Nugent then Carlin. Please take a second (or maybe 10) to research this junk before passing it on. Also see: http://www.urbanlegends.com/ulz/carlin.html __________________________________________________ Do you Yahoo!? Yahoo! Tax Center - File online, calculators, forms, and more http://tax.yahoo.com 7183 From: A.Lizard Date: Sun Apr 6, 2003 4:20pm Subject: Urban Legend - YES, I'M A BAD AMERICAN At 05:07 PM 4/6/03 +0000, you wrote: It didn't look right, so I checked. It's a fake, George Carlin says so. He seems less than pleased with the stuff circulating under his name on the Net. A.Lizard http://www.georgecarlin.com/georgecarlin/home/dontblame.html http://www.georgecarlin.com/georgecarlin/home/bogus.html http://www.urbanlegends.com/ulz/carlin.html While Nugent did publish a version of 'The Bad American' in his 'Adventure Outdoors' magazine early in 2001, he did not claim credit for authoring it and versions of it were circulating well (September 2000) before Nugent published it. A.Lizard >essage: 1 > Date: Sat, 5 Apr 2003 11:16:37 -0800 (PST) > From: Mitch D >Subject: Bad American (Off Topic humor) > >YES, I'M A BAD AMERICAN >by George Carlin > >I Am Your Worst Nightmare. I am a BAD American. I am George >Carlin. I believe the money I make belongs to me and my family, >not some mid level governmental functionary be it Democratic or >Republican! I'm in touch with my feelings and I like it that >way, damn it! > >I think owning a gun doesn't make you a killer, it makes you a >smart American. > ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -Benjamin Franklin, Historical Review of Pennsylvania, 1753 Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... PGP 8.0 key available by request,keyserver,or on my Web site Download PGP from http://www.pgpi.org for e-mail privacy. PGPfone v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ Disaster prep info: http://www.ecis.com/~alizard/y2k.html ************************************************************************ 7184 From: Mitch D Date: Sun Apr 6, 2003 10:37pm Subject: Re: Urban Legend - YES, I'M A BAD AMERICAN Oh well,it was worth the laugh,my apologies to george if hes a list member ;) --- "A.Lizard" wrote: > At 05:07 PM 4/6/03 +0000, you wrote: > > It didn't look right, so I checked. It's a fake, George Carlin > says so. He > seems less than pleased with the stuff circulating under his > name on the Net. > > A.Lizard > http://www.georgecarlin.com/georgecarlin/home/dontblame.html > http://www.georgecarlin.com/georgecarlin/home/bogus.html > > http://www.urbanlegends.com/ulz/carlin.html > While Nugent did publish a version of 'The Bad American' in > his 'Adventure > Outdoors' magazine early in 2001, he did not claim credit for > authoring it > and versions of it were circulating well (September 2000) > before Nugent > published it. > > A.Lizard > > >essage: 1 > > Date: Sat, 5 Apr 2003 11:16:37 -0800 (PST) > > From: Mitch D > >Subject: Bad American (Off Topic humor) > > > >YES, I'M A BAD AMERICAN > >by George Carlin > > > >I Am Your Worst Nightmare. I am a BAD American. I am George > >Carlin. I believe the money I make belongs to me and my > family, > >not some mid level governmental functionary be it Democratic > or > >Republican! I'm in touch with my feelings and I like it that > >way, damn it! > > > >I think owning a gun doesn't make you a killer, it makes you > a > >smart American. > > > > > > > ************************************************************************ > member The Internet Society (ISOC), The HTML Writers Guild. > "They that can give up essential liberty to obtain a little > temporary > safety deserve neither liberty nor safety." > -Benjamin Franklin, Historical Review of Pennsylvania, > 1753 > Personal Website http://www.ecis.com/~alizard > business Website http://reptilelabs.com > backup address (if ALL else fails) alizard@C... > PGP 8.0 key available by request,keyserver,or on my Web site > Download PGP from http://www.pgpi.org for e-mail privacy. > PGPfone v2.1 available for secure voice conferencing, get > your own (W9x,NT,Mac) at > http://www.pgpi.org/products/nai/pgpfone/ > Disaster prep info: http://www.ecis.com/~alizard/y2k.html > ************************************************************************ > > > ===== Mitch Davis TSCM/Special Operations Group Inc. Antioch,TN.USA MitchD@t... website:www.tscmusa.com. Tel (615)837-9933 Cell(615) 584-9933 __________________________________________________ Do you Yahoo!? Yahoo! Tax Center - File online, calculators, forms, and more http://tax.yahoo.com 7185 From: Mitch D Date: Mon Apr 7, 2003 10:41am Subject: Re: Advice please I started with the "A",then upgraded to the "C" when it became available.Occasionally I'll bring both out on a job to save some time (usually for domestics),or use one in a vehicle to check the "RF floor",before doing the actual sweep. As some other members indicated the FM Demod option is a must,as is the 10khz step feature. Personally I like the C as it displays the frequencies while using the freq extenders,where you may have to do some math while using extenders on the A. SWS ships worldwide just in case Grove won't work. Cheers! --- Demtec@a... wrote: > Thanks for your reply Mitch > I was interested to see you had an A and C model any > particular reason for > this apart from the obvious diference in spec > Everybody seems to speak highly of them and it looks like my > next purchase. > I will definitley buy the padded case I will either buy from > Steve or Grove > there is a distrib in the UK but they dont carry stock > Thanks again Regards Dave > ===== Mitch Davis TSCM/Special Operations Group Inc. Antioch,TN.USA MitchD@t... website:www.tscmusa.com. Tel (615)837-9933 Cell(615) 584-9933 __________________________________________________ Do you Yahoo!? Yahoo! Tax Center - File online, calculators, forms, and more http://tax.yahoo.com 7186 From: Date: Mon Apr 7, 2003 7:32am Subject: Missing Persons Investigations Seminar-Kansas City-May 8 & 9 This seminar should be very interesting and it is being presented in a central location (Kansas City). > From: "Gil Alba" > Subject: Re:Seminar: Missing Without a Trace > > Dear Members, > "Missing Without a Trace"- The Kansas Association of License Investigators > (KALI) is having a seminar about how to investigate missing person cases. > This seminar will cover just about any type of investigation that a PI will > be involved with and more important provide you with the knowledge and > confidence required to pursue investigations. From: How to get involved in > high profile cases to interacting with the police, dealing with the media > and much, much more. > > However, this seminar is not limited to PI's only. Anyone that is > interested in finding the answers to unsolved mysteries and perhaps always > thought that they had the intuition is welcome. PI's, police officers, > detectives, attorney's, criminal justice, all LEO, media, mystery writers, > psychics or just ordinary people are welcome. > > I have had this case for over four years and the usual thing is not to talk > about an open ongoing high-profile case. However, this case would go as many > other "missing without a trace" cases would go if everyone just sat back and > did nothing. So, one of the reasons that I do this seminar about this case > is to tell as many people about the case as possible and in turn teach the > "Art of Investigation." Another reason that I give this seminar is that I > know that there are a lot of smart and interesting people that attend the > seminar. Perhaps they have ideas I certainly encourage and welcome > participation from everyone, whether law enforcement or civilians. > > I did a seminar in New York City at the Learning Annex. They had to move > the seminar from a class room to a local Holiday Inn because of the > unexpected attendance. > > Forensic and missing without a trace cases are very popular at this time and > are some of the most watched TV shows. What the audience gets from me is > that I am not a public speaker nor a teacher, but the real thing . . . ex- > New York City Detective that has the case and is investigating the case even > while the seminar is taking place. I will have the audience step into my > shoes with me and see what they would do as investigators and go along with > me to see how to best solve this case. The reason for placing Kristine > Kupka's website on the brochure is that I would like the attendees to read > about the case prior to attending and go along with me. > > It is going to be an interesting seminar and also the networking with > experts is invaluable. I hope to see all of you there and please pass on the > information in the event that anyone else may want to attend. > > The following is the info from KALI: > The Art of Investigation > The Kristine Kupka Case: > Listed by The N.Y. Daily News as one of New York's Top 10 Mysteries, the > Kristine Kupka case will be featured. In 1998, five months pregnant, the > college > student went off with her professor, the father of her unborn child. He came > back. She didn't. Gil & Bill will lead you through the investigation of this > case > and other cases. It's a rare chance to learn how the world's best detectives > solve > some of the world's worst crimes. To research the Kristine Kupka Case log on > to > Http://www.kristinekupka.com and Http://www.albainvestigations.com > In this fascinating seminar, you're the detective. > ~ ~ You examine the evidence. > ~ ~ You learn how to conduct interviews. > ~ ~ You interact by giving opinions. > ~ ~ You find the answers. > PROGRAM: DESCRIPTION: > Perhaps one of the most frustrating types of investigations is the missing > person case. In this fascinating seminar you become involved and investigate > a > current, unsolved case and unravel the mystery. Learn the methodology behind > the > investigation: research the case, develop a plan of action and learn > investigative techniques from 28-year, Ex-New York City/FBI Task Force, > First Grade > Detective,Gil Alba & Ex-NYPD Detective Bill Majeski. > About the speakers: > Gil Alba > Before founding his own agency, nationally recognized P.I. Gil Alba had a > distinguished career with the New York City Police Department. He worked > with the FBI/NYPD Violent Crime Task Force, specializing in difficult and > unusual > cases. Gil has been seen on 48 Hours, America's Most Wanted, Fox News and > MSNBC > INVESTIGATES filmed a one-hour special. > Bill Majeski, co-author of "Corporate Security Practices" and a regular on > Fox News will team up with Gil to bring you his expertise on interviewing > methods and > many other aspects of the investigative process. Gil & Bill combine for 50 > years > of law enforcement experience. > > KALI REGISTRATION > Kansas Association of Licensed Investigators > Spring Conference 2003 Registration > May 8 -9, 2003 > REGISTRATION FEES: > Members of KALI: $145.00 if registered by April 16 and $190.00 after this date. > Non- Members: $205.00 if registered by April 16 and $250.00 after this date. > Registration Fee includes the following: Reception and presentation by Gil > Alba & Bill Majeski on Thursday, May 8, 2003. Continental Breakfast, Lunch, > Afternoon Snack, and > "The Art of Investigation" presentation. > **If you are not a member of KALI and are a licensed private Investigator > you can join the association and attend the conference for the same price as > a non-member registration fee. For more information please call the KALI > office at (785) 233-5255. > PAYMENT: > KALI - mailed to: > 1200 SW. 10th Ave., Topeka, KS 66604 > Questions? Call (785) 233-5255 or Fax: (785) 234-2433. > RESERVATIONS: > A block of rooms has been reserved at the Sheraton Over-land Park Hotel and > Convention Center at the rate of $89.00/night plus tax. This rate will be > available until April 8, 2003. To make reservations please call (913) > 234 -2100 and ask for reservations. Please identify yourself as a KALI > conference attendee. Check in time is 3:00pm and check out time is 12:00pm. > Hotel is: 6100 College Boulevard, Overland Park, Kansas 66211. > Refund Policy: > HELPFUL INFORMATION: > Thursday, May 8, 2003, 5:00 - 7:00 pm KALI Reception & Introduction by Gil > Alba & Bill Majeski > Friday, May 9, 2003 Throughout The Day, "The Art of Investigation" > > Thank you > Gil C. E. "Jack" Kelley, III, MBA C. E. Kelley & Associates Investigations P. O. Box 395, Baxter Springs, KS 66713 (620) 856-4460 Email: kelleypi@a... http://www.angelfire.com/ks/investigations/ Kansas Detective License: D-064 Board Member, Kansas Association of Licensed Investigators Member, American Society for Industrial Security Member, Association of Former Office of Special Investigations Special Agents Member, INTELNET (International organization of private investigators) [Non-text portions of this message have been removed] 7187 From: ed Date: Mon Apr 7, 2003 10:00am Subject: Avcom - new models unannounced David, Before buying an Avcom PSA-65C (which I own and recommend) you might want to know Avcom will be releasing new models in about 16 weeks. The first units will be PSA-1727A, PSA-45C which are the digital front end, LCD, lightweight spectrum analyzers. These units can be directly controlled or remotely controlled via ethernet (UTP RJ-45 or 802.11b) and over the internet, and can be configured to record and log measurements. Avcom has not yet announced these new models or their specifications or pricing, but I do know they will cost more than the PSA-65C. -ed At 07:11 PM 4/6/03 -0700, DEMTEC@A... wrote: > > Dear Members > > Does anybody own or has owned an AVCOM Spectrum Analyser ie > > the PSA-65C > > or the PSA-65A together with aN AVCOM Frequency Extender. > > I am looking to replace my German HAMEG I use for field work > > with something > > more suited to Countermeasures work and "field lab" use. > > AVCOM seem to be the only manufacturer around to tailor an > > Analyser to TSCM > > use at a reasonable price > > Any advice for or against would be very welcome > > Regards Dave UK > > > > TSCM [Technical Surveillance and Countermeasures] > > David McGauley > > Demtec > > Electronic Surveillance and Counter Measures Specialist > > Electrical/Electronics Engineer ex Police > > Demtec House > > Ormskirk > > Lancs L39 0HF > > UK > > 01695 558544 > > 07866206112 > > demtec@a... > > www.demtec.co.uk [under construction] > > The manufacture and installation of custom made covert > > electronic audio and > > video devices > > Professional physical and electronic counter measures [sweep] > > services. > > Note: any fellow UKPIN members welcome to call in to discuss > > applications. > > Workshop located alongside the M58 junc 3 7188 From: Date: Mon Apr 7, 2003 8:00am Subject: Re: Advice please Thanks again Mitch All these little hints are a great help. I found a UK supplier called TONER they are actually American they have a 230 volt version in the USA ready to ship. Good point about the display while using the extenders that is very useful Off Topic I have just caught the news You fellas seem to be doing well in IRAQ but are you???? The Iraqi Information Minister keeps popping up on the BBC news telling us that the Yanks are surrounded and on the run apparently dying in huge numbers [cant always make out what he is saying though as the Iraqi F16'S keep flying low overhead] Thanks Again Dave TSCM [Technical Surveillance and Countermeasures] David McGauley Demtec Electronic Surveillance and Counter Measures Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L39 0HF UK 01695 558544 07866206112 demtec@a... www.demtec.co.uk [under construction] The manufacture and installation of custom made covert electronic audio and video devices Professional physical and electronic counter measures [sweep] services. Note: any fellow UKPIN members welcome to call in to discuss applications. Workshop located alongside the M58 junc 3 [Non-text portions of this message have been removed] 7189 From: David Alexander Date: Tue Apr 8, 2003 6:10am Subject: advert - Infosec consultant in the UK Dear all I recently moved job to become a consultant and our moderator very kindly said that I could post a quick advert to the list. I'm not a TSCMer, never will be, but I am a very good Information Security consultant, with good technical knowledge of all aspects of IT security architectures, Information Security management and policies (I was one of the first 50 people in the world accredited as a Lead Auditor for ISO 17799), UK legislation, firewalls, penetration testing, forensic computing, etc. I am an ex RAF officer (driver, airframe), with a high security clearance and good experience of working in commercial, government and defence environments. I have outstanding people-facing skills and am a good teacher and facilitator for courses, seminars, etc. I'm also a good project manager (Certified PRINCE 2 Practitioner) and have the ability to make things happen without upsetting anyone (unless they deserve it of course...). I'm on this list to learn about TSCM from you guys in case I ever need to use it, or counter it. By the same token if I can help anyone with my specialist knowledge, please feel free to ask. thanks for your time Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 7190 From: David Alexander Date: Tue Apr 8, 2003 5:59am Subject: FW: bugs UK man convicted of making and selling illegal bugs http://news.bbc.co.uk/1/hi/england/leicestershire/2918127.stm David Alexander Information Security Consultant Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 7191 From: James M. Atkinson Date: Tue Apr 8, 2003 11:20am Subject: Re: FW: bugs - Bungalow-bug man's big profits At 11:59 AM +0100 4/8/03, David Alexander wrote: >UK man convicted of making and selling illegal bugs > >http://news.bbc.co.uk/1/hi/england/leicestershire/2918127.stm > The funny thing about all of this, is that the guy seems to have been buying cheap little Japanese devices, and was simply selling other peoples products. -jma >Bungalow-bug man's big profits > >From the understated dormer bungalow he shared with his mother, >Umesh Bharakada produced an array of gadgets usually found in James >Bond films. > >The 37-year-old fashioned bugging devices to be hidden in everyday >objects such as three-pin plug adaptors, phone sockets and >calculators. > >From Syston in Leicester, he sold them across the internet to other >suppliers, private investigators and detective agencies earning >about £40,000 a year profit. > >Bharakada even paraded his illicit talents by driving a Rolls-Royce >car with the number plate A15 BUG. > >But his firm called Leicester Surveillance Ltd was tracked down by >the Radiocommunications Agency, part of the Department for Trade and >Industry. > >One of their investigators, Clive Corrie, told BBC News Online the >trail led to Bharakada's bungalow after firms retailing the bugging >equipment said he was their supplier. > >"He said he didn't have any formal qualifications but you could see >he had put a lot research into this. > >"He had managed to adapt existing circuits and produce his own brand of goods. > >"Some of them were the size of your little fingernail. > >"Some were built into household devices like three-pin plug adaptors >and some built into a phone adaptor - these record phone >conversations as well as the conservations from the room. > >"They take their power from where they plug into to take away the >need for batteries." > >He said the devices being made were the sort of listening tools that >might be used by the police or security services. > >Air safety 'degraded' > >Nothing close to what Bharakada was making would be legally sold on >the high street. > >"The majority of the ones he was making were operating on a band of >frequencies that are allocated for the Civil Aviation Authority for >use by aircraft and they had potential to cause interference." > > >That meant that safety levels of aircraft could have been "degraded" >if the bugs were being used nearby. > >The most powerful bugs, and therefore the most dangerous to >aircraft, were tracking devices which could be attached to cars to >allow pursuers to follow them. > >Bharakada told Leicester Magistrates' Court that he was not aware he >was breaking the law under the Wireless Telegraphy Act 1949. > >However, he pleaded guilty on Friday to supplying, using and >offering for sale the equipment between January and August of last >year. > >The judge said he could have been jailed but told him to pay a >£4,000 fine with £4,000 costs. > >Bharakada's equipment was also taken, which was estimated by Mr >Corrie to be worth £20,000. > >Story from BBC NEWS: >http://news.bbc.co.uk/go/pr/fr/-/1/hi/england/leicestershire/2918127.stm > >Published: 2003/04/04 16:25:21 > >© BBC MMIII > -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7192 From: Steve Uhrig Date: Tue Apr 8, 2003 9:30pm Subject: Microtel PR 700A manual needed If anyone can help with a copy of the above manual, I would appreciate it and it would be worth your while. Trying to find one for an older gentleman who has been a mentor to me. He just scored one of these receivers and needs a manual. Offlist replies appreciated. Tks ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7193 From: Ocean Group - MU TSD Date: Tue Apr 8, 2003 5:36pm Subject: Sweeping....floors... Well, you'll never guess what came through my mailbox today....have a look.... God if I knew sweeping was this easy I would have dropped out of play school...! :) Please folks, comments? Is it really this easy? Is there really no competition? Is all I need some business cards and a phone? Cheers Oisin Ps. Sorry about the size of the email, only way I could get it to you! __________________________________ SWEEP SERVICE BUSINESS OPPORTUNITY The new business of the 21st century is the Security Business. Specifically, the Sweep Service Provider business. Combating invasions of privacy is the focus, as EAVESDROPPING, WIRETAPPING, & SPYING are no longer problems for governments alone, but for everyday people & businesses. To learn how you can benefit from the research & design efforts of the CCS Counter Surveillance Industry, take a look at the basics. Sweep Service Provider basics: The Technology The Opportunity The Demand Opportunity Benefits Clients Lack of Competition Getting Started Support Questions & Answers Application THE TECHNOLOGY: There are solutions to the eavesdropping problems of today. The solutions are achieved by using Counter-Surveillance Equipment to detect the actual spy equipment used for eavesdropping. By designing, engineering, and developing systems as the VL-8000, CCTA-1000, & the ECM-1300, Counter Surveillance Equipment from CCS has advanced to the next level of personal, corporate, & law enforcement Privacy & Security. These technological systems are the backbone for Sweep Service Providers. They are tools designed & produced by CCS to arm the user with ammunition to combat petty & serious invasions of electronic privacy. The result of using our products has made it possible for individual users to conduct electronic examinations of personal & business environments in the form of Sweep Examinations. These Counter Surveillance Sweep Services help alleviate the discomfort & unrest caused by the threat of surveillance devices such as bugs and wiretaps . Spying on other people is not new, but invading their privacy using high technology is. Newspapers, magazines, TV, and radio now report that with advances in Spy Technology, there is an actual need to defend peoples privacy. That need presents an opportunity to offer a commercial service to people in the workplace, at home, and in the public domain. Taking charge of this type of situation requires that you use Tools of Technology to provide security solutions and awareness to people in need. THE OPPORTUNITY The Involvement, like any business, requires effort to perform the service at client locations. The demand exists for consultants to solve problems of privacy at the business & family level for the defense of people's security. People will pay for PEACE OF MIND when it comes to protecting their secrets, their privacy, and their vulnerability. Using CCS Counter Surveillance techniques, methods, & technologies, the Sweep Service Provider can effectively fight electronic eavesdropping and bugging devices that pose serious threats to personal, corporate, & law enforcement security. THE DEMAND Where does the demand come from? Is there really a demand? People & Businesses happily pay for protection. Protection from Electronic Eavesdropping & spying. Spies steal information all the time, and not just from governments. The business world gets its share of Spying. Spies leak & steal valuable information. This is called Industrial Espionage: Insider information & bidding secrets in businesses Proprietary technology & formulas Confidential secrets Unique sales tactics & ideas Every year, billions of dollars are stolen in corporate Theft & other people's business ideas. There really is a demand to combat this. Spies steal information in people's personal lives. Disputing spouses listen in on private phone calls, room conversations, even conversations at the office & car. Matrimonial problems that result in divorce cause people to spy on their spouses: Eavesdropping on settlement cases & attorneys Hiring investigators to snoop on private conversations Steal information concerning loved ones in custody battles Emotional insecurities move people to spy on each other Issues of trust & fidelity move people to spy on each other There really is a demand to combat this. Understanding the Demand, it is clear that there is a need as well as an opportunity at hand to offer Sweep Services. ESTIMATED OPPORTUNITY BENEFITS One could charge $300 / hour depending upon: Physical size of the office / home being examined Quantity of telephone & communication ports evaluated Internal survey of phone company communication junction box (boxes) Environmental factors such as accessibility to internal & External areas under examination will determine how long a Sweep will take. If the area is large, then the hours Required will add up to a longer paying Sweep Service. One could charge $1800 - $2,000 per Sweep Service depending upon: Time of day / weekend for the Sweep Service to be performed Optional confidential written report of Sweep results One could charge $5,000 - $8,000 for Sweep Equipment, insuring the sell of Sweep Equipment to clients charge the clients for Sweep Equipment Training. Whether you want a part-time or full-time experience as a Sweep Service Provider, it is clear that the benefit from the potential is large; and to start, no experience or technical knowledge is required. CCS has been leading the industry in Counter Surveillance products and systems since 1959, with the introduction of our first Phone Analyzer. Our track record of product development & services have laid the foundation for others to join the Sweep Service Provider Industry. Our Technology and expertise have assisted many people to successfully understand the Sweep Service business, and how to benefit extensively. CLIENTS Where do clients come from? Most clients don't know they are being spied upon until 1) they begin to suspect or 2) something happens. Either way, the need for people to be able to locate the Sweep Service Provider is great. The following are the 2 most popular methods for promoting Sweep Services and finding clients in need: Active & Passive Promoting Passive promoting involves placing an ad in the local classifieds section of newspapers. People need to see your name & number, and that your service is available for hire. Active promoting involves networking through the phone book, through law firms, brokerage firms, actively getting the word out that your service is available. If you don't know anyone who could refer you, then take action and make calls to local businesses, local stock & real estate brokerage firms, news agencies. Everyone has secrets they want to protect. LACK OF COMPETITION In this industry, one must ask and recognize the following: Q: Is there competition? A: Virtually none. Simply check the phone book. If there are any, a simple call to them will let you know what their rates are (and retainers, if any). If the rates are cheap, then it is fair to presume that "You get what you pay for". If you go to a doctor with a problem, price is normally not an issue. Just as a doctor solves problems, so will you as a Sweep Service Provider . Therefore, it is ok to charge high fees for professional service examinations. Sweep Service Providers that charge "low cost" rates do not boost consumer confidence. Clients will pay good money in order to get good service. For this reason, professional competition is virtually non-existent. HOW TO GET STARTED Begin at home, during your free time. All you will need is a phone, some business cards, the ability to place a classified ad, and a desire to make money. Classified ads and even phone book listings will get you exposure. Once people find out you offer Sweep Services to detect "electronic surveillance bugs" and "electronic phone wiretaps", then it would make sense for them to go to you to solve their privacy concerns & problems. But . . . its not that simple ! ! ! Once you start getting business, you really need to know what you are doing. To cash-in on the Sweep Business, you will need the right TOOLS & TRAINING. Tools: CCS builds Electronic Counter Surveillance Equipment for Personal, Corporate, & Law Enforcement Sectors. On the business & personal level, VL-8000 & CCTA-1000 technology can sweep rooms, hallways, crawl spaces, & phone lines in minutes. On the government level, ECM-1300 technology can detect covert listening devices automatically (defines the distance and location of the transmissions, stores all encountered signals for later review, and has a microprocessor-controlled counter surveillance system with a custom designed, built-in spectrum analyzer). Training: CCS has been in the forefront of the Security Industry For Decades. With many of our experts and former directors beginning their industry experience in the late fifties and early sixties, they have spent numerous decades developing solutions which have become the standards of the surveillance, counter-surveillance and personal protection industries. To learn how to conduct a sweep, whether in a home, office, warehouse, embassy, etc, or even in a vehicle takes practice. Our instructors have the experience required to instruct Sweep Service Providers. Growth through Assistance After going on Sweep Services, your business may require more manpower. Should you start to grow too fast, it would be worthwhile to take on an assistant or trainee. If you are too busy to train an assistant, we at CCS can train one for you. Our bug detectors & tap detectors are not difficult to handle. Growing with time, you may employ your trainee to go on Sweep Services alone, giving you time to expand your operation by scheduling additional clients or even going on site surveys at multiple locations. Hiring an additional apprentice will contribute to the expansion of your operation at an aggressive rate. SUPPORT CCS builds & sells Sweep Equipment. As bugging & wiretapping technology develops in complexity & sophistication, we understand the need to remain current in cutting edge Counter Measures. Therefore, we are available to help you succeed. If you get into a situation that requires additional help, we are just a phone call away. If you accept a Sweep Service that may seem to be too large to handle, then we have the ability to either walk you through the Sweep or even arrange for additional on-site support at your clients location (s). If your client's are outside of the United States, and need help, our technicians can travel from our any of our offices from New York, California, Florida, Washington DC, or England. QUESTIONS AND ANSWERS In trying to further comprehend the Sweep Industry, ask and recognize the following questions : Q: Is it really easy to perform an Electronic Sweep? A: Yes. Using the right tools & training, CCS can outfit you with the know-how to get into the Sweep Business Q: If it is so easy to perform, why would businesses & people need a Sweep Service Provider ? A: People would rather hire someone to do a job then do it themselves. Example: People would rather hire a doctor to solve their physical problems. Example: People would rather hire an exterminator to solve their bug problems. Q: Can the police protect businesses & people from electronic eavesdropping? A: No. They cannot. Police do not have the ability nor the facilities to stop information theft. In fact, police agencies are generally more concerned with using the same eavesdropping technology to gather evidence on criminals and should be allowed to. However, someone has to be able to protect honest businesses and the general public from the inside eavesdropper who invades privacy for offense, for profit & theft. From these answers, it is clear that there is a need as well as an opportunity at hand to offer Sweep Services. CCS Recognition CCS is able to respond to diverse needs, both governmental and private. CCS has been leading the Sweep industry, learning and adapting to technology changes, and has the experience to guide you as a Sweep Service Provider . APPLICATION The time to act is now. The demand is at hand, as most people would rather hire a trained professional Sweep Service Provider than spend the time learning how to do it themselves. If you are up to the challenge and want to succeed, then apply below. If you recognize the potential, then clearly you are ready. With the proper tools & training, Counter Surveillance can help you grow a new business, or help you start a side business. You may also: -fill out the following application, or simply call us for more information at 888-779-9205 (within the US), or at 914-654-8700 (outside the US). Our standard business hours are 9:30 am to 5:30 pm Monday Friday. To request more information from CCS International, Ltd, submit this rapid request form below (or Contact US with any questions you might have): First Name: Last Name: Company Street Address City State/Province ZIP/Postal Code Country Telephone Fax Email Address Company Website Best Time to Call When do you think you will decide upon a Security Business Opportunity? 1 Month, 3 Months, 6 Months, 9 Months, This year ? Next 2 years ? Next 5 years How much do you have available for a Security Business Opportunity? Under $10,000 $10,000 - $20,000 $20,000 - $50,000 $50,000 - $100,000 $100,000 + Not Sure For further details, do not hesitate to contact David Jones at the main Headquarters: CCS International Ltd. located at 145 Huguenot Street, New Rochelle, NY 10801 (914) 654-8700 Tel (914) 654-1302 Fax ccssales@s... Email www.spyzone.com Website Copyright CCS International Ltd. 2003 7194 From: Robin Hunter Date: Tue Apr 8, 2003 10:38am Subject: RE(BUGS) Bungalow-bug The funny thing about this story, is that it is neither an offence to manufacture nor possess such equipment in the U.K. it is an offence to use it. It would be interesting to see what the actual charges were. I suspect he was either using the stuff himself or selling it on without getting a disclaimer from the purchaser to the effect that the goods were purchased knowing their use in the U.K. was illegal. regards from Edinburgh, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. [Non-text portions of this message have been removed] 7195 From: kondrak Date: Wed Apr 9, 2003 1:45pm Subject: Re: Sweeping....floors... At 11:36 PM 4/8/2003 +0100, you wrote: >Well, you'll never guess what came through my mailbox today....have a >look.... > >God if I knew sweeping was this easy I would have dropped out of play >school...! :) > >Please folks, comments? > >Is it really this easy? Is there really no competition? Is all I need some >business cards and a phone? > >Cheers > >Oisin Yup....so buy a printing program and some Avery 5371 blanks, and now YOU TOO can get in on the business....groan... > For >this reason, professional competition is virtually non-existent. What' he smoking? >HOW TO GET STARTED > >Begin at home, during your free time. > >All you will need is a phone, some business cards, the ability to place a >classified ad, and a desire to make money. Classified ads and even phone >book listings will get you exposure. Between sending SPAM, stapling brouchures, selling Viagara, and peddling mortgages you might be able to raise bail money. OH, and dd I mention MONEY $$$$$$ ? >But . . . its not that simple ! ! ! The ONLY truthful statement I see here...... >Once you start getting business, you really need to know what you are doing. >To cash-in on the Sweep Business, you will need the right TOOLS & TRAINING. > >Tools: Easily and cheaply available from Radio Schlack! >CCS has been in the forefront of the Security Industry For Decades. WHO? I'll file this under "humor".... HAHA!! 7196 From: Date: Wed Apr 9, 2003 0:02pm Subject: Re: Sweeping....floors... In a message dated 4/9/2003 10:18:33 AM Pacific Standard Time, inertia@o... writes: > Please folks, comments? I heard that they hired the Dell computer dude to do their training. [Non-text portions of this message have been removed] 7197 From: Steve Uhrig Date: Wed Apr 9, 2003 6:06pm Subject: A picture is worth a thousand words WIRELESS REVIEWS ON THE AIR Hosted by Jason Ankeny A PRIMEDIA Property April 9, 2003 If you want to view this on the web go to: http://enews.primediabusiness.com/enews/telephony/v/697 EDITOR'S PERSPECTIVE --Picture Imperfect By Jason Ankeny April 9, 2003 For all its advances, technology has never been much good at inspiring common sense among users--the growing number of communities banning mobile phone use in public settings and while driving is testament to that. So it's really no surprise to hear that mobile camera phones are already making enemies. Now, an increasing number of gyms and strip clubs across the globe, fearing the obvious violations to the privacy of their employees and customers, have begun instituting bans on the devices. Saudi Arabia's Commission for Promoting Virtue and Preventing Vice has vetoed camera phones throughout the nation, while the Italian Information Commissioner has instituted new regulations demanding that photos only be taken for personal use. Even some Hollywood studios have put the smack down, outlawing camera phones from advance movie screenings. And if Tinseltown is shying away from photo ops, you know something's wrong. A significant number of people have predicted big things for wireless imaging applications. In fact, in a recent Wireless Review Web site survey that asked readers, "What would you consider the 'killer app' for mobile data networks in their current technological state?," 19% responded "wireless imaging," behind only mobile Internet access (34%) and e-mail (26%). That makes the growing opposition to mobile camera phones that much more troubling--many companies are counting on wireless imaging to generate significant revenues in the years to come, but it's not going to happen if consumers discover that camera phones have been banned everywhere they go. I want to believe that people can police themselves--you wouldn't bring a standard camera into a gym locker room and start snapping photos, so why would you do the same thing with a wireless device? I think that the vast majority of people still adhere to basic social mores (not to mention the law), and that these bans on camera phones are an overreaction to worst-case-scenario fears. But in the minds of lawmakers and business owners, the wireless populace has clearly proved it can't be trusted to behave responsibly, which is why so many cities are writing legislation against mobile use (and why you can't go see a movie without the theatre screening some kind of reminder for the audience to turn off its phones). Once you've gotten burned by past iterations of wireless technology, you're not about to let it happen again. Wireless imaging applications are still in their infancy, so there's still time for the industry to reach out to lawmakers and customers alike. Education is critical--it's imperative that the industry doesn't allow concerns over imaging to escalate beyond its control. Explain to lawmakers exactly how wireless imaging works, what consumers can and cannot do, and how to implement rules that promote basic rights to privacy without severely compromising the rights of mobile phone users. Likewise, users need to fully understand when it is and is not appropriate to snap and send photos with their phones, as well as the penalties should they violate any laws or regulations. It seems like simple, common sense stuff--but then, not so long ago it also seemed pretty obvious that you shouldn't be gabbing away on a mobile phone while changing lanes at 80 m.p.h., and look how that turned out. Let's not make the same mistake twice. Send me an e-mail at jankeny@p... (mailto:jankeny@p...). ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7198 From: Hawkspirit Date: Wed Apr 9, 2003 11:18pm Subject: Cell Phone Bug This one looks like big trouble http://www.cctv-city.com/erol.html#1317x0 A bugging device that you can dial into from anywhere in the world... Have the ability to listen to conversations from anywhere in the world. Looks Exactly The Same As Normal Siemens Phones. Versatile for Covert Solutions Professional Equipment Can Also Be Used As A Normal Mobile Phone. Completely Undetectable That Someone May be Listening Since the first release of the Mobile Phone Bug back in August 2001 this amazing technology has now be advanced with our Brand New Releases that now come in the form of standard Seimens Mobile phones as pictured here. You then have the ability to dial into the phone from anywhere in the world and listen to what is happening and being said around that phone. And not only that but you can also use this Mobile Phone Bug as an ordinary phone. 7199 From: Steve Uhrig Date: Wed Apr 9, 2003 11:46pm Subject: Re: Cell Phone Bug On 9 Apr 2003 at 21:18, Hawkspirit wrote: > This one looks like big trouble > http://www.cctv-city.com/erol.html#1317x0 Their site seems to have errors and the above link won't open for me. Errors on page. Just get an endless message 'Please Wait. Store Loading.' May be my antique browser. Don't overlook the fact that spy shops almost always exaggerate. Spy shops define the word 'hyperbole'. > A bugging device that you can dial into from anywhere in the world... All Motorola cell phones I've owned from the first flip phone to the current V70 has this ability. Activate auto answer and disable ring. You can call it from anywhere, it will answer silently and you can listen. Nothing new. Most of us have been preaching this to our clients for years. > Have the ability to listen to conversations from anywhere in the > world. Looks Exactly The Same As Normal Siemens Phones. It is a normal phone. That's why it looks and works like a normal phone. However, since the company is in the U.K. the phone almost certainly is GSM which will not work here in the U.S. but may be a problem in countries where GSM mobile telephone is deployed. > Since the first release of the Mobile Phone Bug back in August 2001 > this amazing technology has now be advanced with our Brand New > Releases that now come in the form of standard Seimens Mobile phones > as pictured here. You then have the ability to dial into the phone > from anywhere in the world and listen to what is happening and being > said around that phone. And not only that but you can also use this > Mobile Phone Bug as an ordinary phone. All they are selling is a stock unmodified cell phone. Yes, it is a problem, which is another reason to try to keep cell phones from being carried into critical meetings. Especially be cautious if someone exits the room but leaves their cell phone on the table. They may be calling it from the pay phone in the lobby or another cell phone to hear what is being said in their absence. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7200 From: Mitch D Date: Fri Apr 11, 2003 10:44am Subject: floor sweeping Looks like the "Spy King" has resurfaced,again ........... ===== Mitch Davis TSCM/Special Operations Group Inc. Antioch,TN.USA MitchD@t... website:www.tscmusa.com. Tel (615)837-9933 Cell(615) 584-9933 __________________________________________________ Do you Yahoo!? Yahoo! Tax Center - File online, calculators, forms, and more http://tax.yahoo.com 7201 From: Ocean Group - MU TSD Date: Wed Apr 9, 2003 5:25pm Subject: Sweeping....floors...part 2 Ah, It's ok guys....just when I was becoming disillusioned I got another email. Now all you need is to attend their seminar.....AND $1500 BUCKS!!! Ps. Bring your own business cards, drinks are extra and you have to buy the headphones to listen to the talk at the seminar. For $1500. __________________________________________________________ PRIVATE SEMINAR ON AVANCED SECURITY AND NEW TECHNOLOGIES CCS International, Ltd. has developed a new seminar and training workshop focused on the growing demands and necessities in specialized security, intelligence, counter intelligence, personal protection and antiterrorism. The current situation in international circles requires a detailed awareness of the existing solutions in the field of Advanced Technology in Security. We would like to extend a cordial invitation for you to participate in this Private Seminar on Specialized Security and Advanced Technology, S.E.S.A.T 2003 (Specialized Educational Seminar on Advanced Technology). The seminar will be held in New Rochelle, New York on April 30th, May 1st and May 2nd. We offer this seminar exclusively to Government Organizations, International Corporations and to a few select group of clients. The duration of the seminar is approximately 18 hours, divided into 2 Ω days, during which we will provide theoretical, practical and operational details, information and training regarding the latest advances in products, equipment, systems and services in this highly confidential and sensitive field. Below, we have detailed the segments that compose the Seminar/Workshop: COMMENCEMENT OF THE FIRST DAY: 10:00AM CCS INTRODUCTION AND PRESENTATION STG Surveillance Technology Group G-COM Government Communication CSS Counter Spy Shops Spyzone.com, Gcomtech.com and CCS Publishing 10:30AM DIFFERENT CATEGORIES OF CLIENTS AND POSSIBLE NECESSITIES Client Category 1 Client Category 2 Client Category 3 11:00AM LEVELS IN THREAT ANALYSIS (OFFENSIVE/DEFENSIVE) Low Level Medium Level High Level 12:00PM METHODS/ACQUIRING OF INTELLIGENCE (EAVESDROPPING) Microphones Recorders Telephony Long Range Acoustic Microphones The Human Ear Laser System Infrared System Tempest System Counter Measure (Electronic Sweeps) 1:00PM LUNCH 2:00PM TELEPHONY Theory of Operation Interception Measures Countermeasures 3:00PM SCRAMBLERS/ENCRYPTORS Scramblers Theory of Operation Voice Inversion Signal Interruption Encryptors (Voice, Fax, Data) Theory of Operation Digitalization Encryption Randomizing 4:00PM CELLULAR MONITORING Theory of Operation Analog Systems Digital Systems Use of Tactical Systems 1 Channel Systems 4 Channel Systems 8 Channel Systems 5:00PM END OF FIRST DAY COMMENCEMENT OF THE SECOND DAY 10:00AM VOICE STRESS ANALYSIS (LIE DETECTION) Theory and Operative Principles Interrogation Procedures Applications Limitations 11:00AM NIGHT VISION Theory of Operation Active and Passive Systems 1st, 2nd and 3rd Generation 12:00PM VIDEO Theory of Operation Wired Systems Wireless Systems Fiber Optics Video Transmission (RF, Telephone, Cellular) 1:00PM LUNCH 2:00PM TRACKING AND LOCATING (GPS RF) RF Personal/Vehicle Theory of Operation GPS Personal/Vehicle Theory of Operation Applications in Cases of Kidnapping 3:00PM DETECTORS Metal Theory of Operation Explosive Theory of Operation Contraband Theory of Operation 3:30PM BULLET PROOF PROTECTION Vests/Clothing Protection Theory and Principles Bullet Proff Vehicles Theory and Principles Materials 4:00PM PERSONAL PROTECTION Physical Protection Protection of Goods 4:30PM INTEGRATION OF THE VARIED EXPOSED SYSTEMS Offensive Applications (Only Authorized Agencies) Defensive Applications 5:00PM END OF THE SECOND DAY COMMENCEMENT OF THE THIRD DAY Private Meetings and Specific Consultation and Requirements: 10:00AM REQUIREMENTS FOR ACQUIRING EQUIPMENT/SYSTEMS Personal Use Organization Requirements Client Requirements 11:00AM INTEREST IN DISTRIBUTION OR REPRESENTATION License/Franchise Authorized Distribution Reseller Programs 12:00PM PRESENTATION OF CERTIFICATES COMPLETION OF SEMINAR S.E.S.A.T. 2003 is a unique opportunity to receive the complete training on the different possibilities in security solutions for your own protection or that of your organization or business. The cost of the seminar is $1,500USD per person of which 50% will be credited towards the purchase of products, equipment, systems or services provided by CCS. Additionally, we will be including the GCOM catalog, CCS Cd-Rom as well as the CCS Product Guide. The seminar will be presented in English but can be presented in Spanish in our Miami, FL office by our international experts. We hope to receive a prompt confirmation of your participation in this special event. Should you or any members of your organization have any questions, do not hesitate to contact our New York Headquarters at 888-779-9205. If you wish to attend, simply complete the enclosed registration form below and fax it back to 914-654-1302 to my attention: Tom Felice. Please keep in mind that seats are limited to this event, therefore, we suggest that registration forms be submitted at the earliest. At the moment, CCS is also accepting applications for those who wish to become an Authorized Licensees. For more information, you may visit our website at www.spyzone.com or contact our representative at 914-654-8700. Yes, I will be attending the S.E.S.A.T seminar: ________ No, I will not be able to attend on this date: _________ Kindly notify me of other upcoming event: ________ Fill out the information below to be notified of future events. Company Name: ________________________ Contact Name: _________________________ Telephone #: __________________________ Fax #: _______________________________ E-mail: ______________________________ Signature: ___________________________ Registration First/Last Name: ____________________________________________ Business/Organization: _______________________________________ Address: __________________________________________________ City/State/Country: _________________________________________ Telephone: ______________________ Fax: _____________________ Mobile: ____________________E-mail: ________________________ To ensure and reserve your attendance, it is necessary to receive your confirmation with the corresponding payment, which can be made via credit card or bank transfer. Below you will find our bank details. Name of Attendees: 1. _______________________________ 2. _______________________________ 3. _______________________________ Payment Methods (include all credit card details) Credit Card: MC ____, Visa _____, A/X ______ Name on Card _________________________ Credit Card # __________________________ Date of Expiration ______________________ Wire Transfer: North Fork Bank 175 W. 72nd Street New York, NY 10023 CCS International, Ltd. ACC #: 9054004420 ABA #: 021407912 7202 From: Ocean Group - MU TSD Date: Wed Apr 9, 2003 5:58pm Subject: Airport.... Hello, I thought someone might be able to enlighten me as to my recent experience... On recently flying through Copenhagen airport while catching a transfer I was going through the usual airport security passport check.... But the guy took one look at me, took my passport and put it on what looked to me as a flat bed scanner with no lid. There was two leds on the "machine" and it was on red as standby and then when he put my passport on it it did nothing for a second and then went green. He handed me back my passport and nodded me on. My thoughts: Irish passports have no biometric tags or coded information so the only thing I could think of was that it got scanned and a photo logged to some random database where copies of suspicious punters passports are kept! :) It was, however the first time it happened to me....I swear! A colleague reckoned that maybe it was a Danish Intelligence/Immigration database where random passport scans were taken, or else some way of authenticating the passport. Anyone got any bright ideas...? Cheers Oisin Ocean Group, Technical Security Division, Ireland. From: Ocean Group Date: Mon Apr 5, 2004 9:20am Subject: Re: Tempest...No SpyShop BS, Just Science Jim Unless you specifically spell out the errors and the mistakes and back up your statement your criticism will be pointless other than offering an "opinion". Regards O ****************** Message: 6 Date: Wed, 31 Mar 2004 18:08:59 -0500 From: "James M. Atkinson" Subject: Re: Tempest...No SpyShop BS, Just Science Too bad the article is loaded with both technical and historic errors, and was written by someone who was obviously inexperienced, biased, and attempting to sensationalize on an urban legend and on something of which they had no formal education or training... the same material was funny 25 years ago when someone else "discovered it". Shame on the University for allowing such drivel to appear under their letterhead. -jma 8417 From: J Grudko Date: Mon Apr 5, 2004 8:35am Subject: Re: New Member here -----Original Message----- > I am Roger Holloway located in North Texas. Please take a look at my site to >learn more on my services. If I can be of help please fell free to contact me. Roger is like one of those bad pennies - except he's one of the good pennies. In the 7 years my family had property north of Houston I visited frequently and never bumped into him - and now he follows me to every list I'm on!!! :-) Welcome Roger Andy Grudko, Grudko Associates, Johannesburg Crime investigation, intelligence & VIP Protection since 1981 www.grudko.com. Johannesburg (+27 11) 781 7206 - 781 7207 (Fax) Sandton (+27 11) 465 9673 - 465 1487 (Fax) Pretoria (+27 12) 244 0255 - 244 0256 (Fax) Members of :SIRA, SACI, WAD, CALI, SASFed, SASA, UKPIN, AFIO (OS),IWWA. "When you need it done right - first time" 8418 From: Hawkspirit Date: Mon Apr 5, 2004 10:23pm Subject: Question for group I have a client who lifted her home phone and heard an automated female voice say "to continue recording this call, press 5", anyone have any ideas on this one? Roger Tolces www.bugsweeps.com ---------- --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.614 / Virus Database: 393 - Release Date: 3/5/2004 [Non-text portions of this message have been removed] 8419 From: Steve Whitehead Date: Tue Apr 6, 2004 3:25pm Subject: Equipment For Sale Dear List Members We are in the process to upgrade the equipment we use in our training classes and have the following excess equipment for sale. If you are interested please contact us directly on the e-mail address below. We ship anywhere in the World. The following equipment is available 2 Scanlock ECM Countermeasures Receivers. Both have their original carrying cases and the original accessories. The one was serviced and calibrated a while back at Audiotel and both have new batteries. Both are in working condition with brand new sets of antennas. The one unit shows outside wear and tear but the other unit is still in good condition. 1 Datong Ranger Version Countermeasures Receiver with the original carrying case. Still in an excellent condition with accessories. 1 Shearwater Hunter V-2 Differential Field Gradient Radio Microphone Detector. This unit is basically brand new and has only been used a few times. 1 ISA, ECR-2 Countermeasures Receiver with the ECR-2 SmartScan software and the MDC-4 Microwave Range Extender from 1 - 7 GHz. The ECR-2 is still in a good condition with a recent calibration certificate and the SmartScan software is the latest CD version that can operate with Windows XP. The antenna of the range extender is broken and the unit requires a service/calibration. The original carrying case and all the accessories are included. 1 Standard Oscor. This is an old model from 1995/1996 but still in a working condition. It is recommended that the this unit be upgraded. 3 ETA-3 Single Line Telephone Analysers, two units have all their original accessories. These units were manufactured by ISA. 1 SuperScout C4 Non-Linear Junction Detector manufactured by Microlab with its original carrying case. It is in a working condition. 1 Audiotel Broom Non-Linear Junction Detector that is in a very good condition with its original carrying case. Recently serviced and fitted with new batteries. This one has not been used for about six years. We also have a demo Hawk 450 XD Non-Linear Junction Detector available for sale. (came onto the market in mid 2003) 1 Winkelmann Model 200 Multi-Line Telephone Analyser. It is in a working order with all the original accessories and overall good condition but because of its weight and size is probably more useful than a boat anchor or as a museum piece. If you are interested or require more info about the equipment you are welcome to contact us directly on e-mail info@t... All serious offers for the equipment will be considered. Regards Steve Whitehead Managing Member TSCMT Services P O Box 16063 Lyttelton 0140 Pretoria South Africa Phone: (012) 664-3157 International (002712) Fax: (012) 664-3180 Web site: http://www.tscm.co.za E-mail: info@t... [Non-text portions of this message have been removed] 8420 From: Ocean Group Date: Tue Apr 6, 2004 7:30am Subject: IP Tapping Note the spec, good read. http://www.securityfocus.com/printable/news/8394 8421 From: Spook Date: Tue Apr 6, 2004 5:12pm Subject: Re: Question for group 75 mG Thorazine, bid -jma At 11:23 PM 4/5/2004, Hawkspirit wrote: >I have a client who lifted her home phone and heard an automated female >voice say "to continue recording this call, press 5", anyone have any ideas >on this one? >Roger Tolces >www.bugsweeps.com 8422 From: James M. Atkinson Date: Tue Apr 6, 2004 5:26pm Subject: Re: Re: Tempest...No SpyShop BS, Just Science Sure, Find someone willing to pay for a page-by-page review of the white paper and I'll be happy to do so. Given the number of errors found in the paper on initial review I estimate that spelling out each of them and debunking them individually will cost around $83,500 USD. Will you be paying for that by check, or by cash? -jma At 10:20 AM 4/5/2004, Ocean Group wrote: >Jim > >Unless you specifically spell out the errors and the mistakes and back up >your statement your criticism will be pointless other than offering an >"opinion". > >Regards > >O > >****************** > >Message: 6 > Date: Wed, 31 Mar 2004 18:08:59 -0500 > From: "James M. Atkinson" >Subject: Re: Tempest...No SpyShop BS, Just Science > >Too bad the article is loaded with both technical and historic errors, and >was written by someone who was obviously inexperienced, biased, and >attempting to sensationalize on an urban legend and on something of which >they had no formal education or training... the same material was funny 25 >years ago when someone else "discovered it". > >Shame on the University for allowing such drivel to appear under their >letterhead. > >-jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8423 From: mark de Boer Date: Tue Apr 6, 2004 0:32pm Subject: micronics MSA 338 Hi list, Is any of you familliar with the Micronics MSA 338 spectrum analyser, the specs seem to be oke for TSCM use Average noise level-110dBm (typical, center frequency : 100MHz RBW : 3kHz, VBW : 100Hz Would it be possible touse a down converter to view the 3>12 Ghz band on this type of analyser? With regards, Marc.de Boer RRBsecurity Archimedesstraat 12 3316 AB Dordrecht Netherlands --------------------------------- Yahoo! Messenger - Communicate instantly..."Ping" your friends today! Download Messenger Now [Non-text portions of this message have been removed] 8424 From: contranl Date: Mon Apr 5, 2004 3:37pm Subject: Gps Detection (detecting Gps trackers/devices) . Gps Detection (detecting Gps trackers/devices) I have developed a simple piece of equipment for the quick detection and finding of Gps based devices, It will detect all Gps devices such as: Cartrackers (combination of a Gps receiver and Gsm/Cellphone) Cartrackers (combination of a Gps receiver and wireless modem) Cartrackers (combination of a Gps and low power burst transceiver) Cartrackers (combination of a Gps receiver and a passive datalogger) Any other device that use a Gps receiver It will detect Gps receivers that work on both frequencies: L1 Civil, 1575.42 Mhz L2 Militairy, 1227.60 Mhz The equipment has the size of a cigarette pack...it has a small telescopic antenna, and works on batteries,there is a display that shows the frequency and signalstrength,a speaker with volume control for audible verification is included too. a flashing Led or (switchable)beeper indicates a valid signal.for silent operation a headphone output is provided. It will allow you to search a car,truck,small boat or package in a few minutes and detect any possible Gps devices. It can be operated by non skilled operators with just a little understanding of radio-signals The newest Gps receivers can now be so sensitive that direct sight of satellites is no longer necessary this is achieved by increasing the number of "correlators" wich is basically a mathematical function in the ever more powerful Dsp-processors wich are inside every Gps receiver...tests have shown that a valid position can now be calculated when the Gps receiver is in a underground parking garage...or even when the receiver is inside a microwave oven wich is highly screened. In pratice this means that a car tracker including it's antenna now can be hidden anywhere inside or under a car.(and not only in the usual places)..it will need just a very small opening to the outside world...this opening does'nt have to have a view on the sky...the antenna can be in any direction where it can pick up some reflections coming from anywhere,the antenne could be directed to the ground and pick up reflections there...it could be in a closed trunk while picking up the signals trough the non metallic backseats and windows...it could be cleverly mounted inside the engine compartment...and so on. A purely physical inspection now means the complete dismanteling of the car or at least removing the dashboard and all panels since the Gps receiver could be anywhere...such a dismanteling is not easy and might take a full day or more...and if not done by specialists it might leave some damage and scratches. How it works: Gps receivers do emit (unwanted) radiation...some of these low to very low power signals are caused by: Local oscillators (LO) Processor clock circuits (quarz crystal) Intermidiate frequency/mixer circuits (spurious) The above frequencies depend on the design of the circuit and vary from manufacturer to manufacturer they could be predicted...but since there are hundreds of gps receivers available you would end up with a list of thousands of frequencies (that is if you can get your hands on all these receivers...wich you can't)...together with other frequencies that are found in cars and caused by other electronic equipment, To check every found frequency and determine whether it is caused by a gps receiver or other car-electronics is a big and lengthy task and certainly not do-able for unskilled operators. However there is one common frequency rediated from every Gps receiver...this frequency is allways the same and is neccesary to make the receiver work...without it a Gps receiver cannot function....this frequency is : 1,023 Mhz wich is called the "CHIPRATE" sometimes called "CHIPPING RATE" or "CA CODE" All Gps-satellites send there information at a dataspeed of 1,023 Mb/sec the Gps receiver receives this signal and needs to synchronize it's internal processes to the same dataspeed to calculate a position....such a dataspeed generates a low power radio signal at 1.023 Mhz it will also generate various harmonics...these harmonics can go up to a few hundred Mhz for example 63 times 1,023 Mhz = 64,4490 Mhz....wich harmonic is the strongest depends on the design of the circuit (components used , length of the coppertraces on the circuitboard , screening quality and size of the housing), if the unit is wired to the car's electrical circuit will make a difference too and will tend to increase the strength of harmonics in the lower frequency range. Such harmonic radiation is very weak and will not show up on a spectrum analyzer....it will not be picked up by any wideband- detector either...simply because they are not sensitive enough. A real receiver with high sensitivity (tuned frontend) can pick up such a harmonic radiation at a distance varying from 30 centimeters to 4 meters My detector is a real scanning (high sensitive) receiver programmed with 1000 frequencies (exact harmonics of 1.023 Mhz) between 1 and 2000 mhz ... it will most certainly (99,99%) pick up one of the harmonics provided it's antenna is close enough to the (hidden) receiver The fact that it will only receive exact harmonics of the Gps- receiver generated signal greatly rules out the reception of other (false)signals generated by other equipment/electronics. Furthermore such a harmonic can easely be identified since it always sounds the same...nomatter wich Gps receiver is used. it sounds like a continious data stream with typical variations...infact what you hear is part of the process that's going on inside the Dsp chip The militairy Gps-signals (L2) happen to have an exactly 10 times higher "CHIPRATE" wich is 10 x 1.023 = 10.23 Mhz...this is not a coincidence....that's how the system was designed...so there harmonics will also show up at some of the same frequencies but only further spaced apart. To furthermore facilitate the identification i have added a small microprocessor (Pic) wich analyzes and recognizes the typical signature/sound of the signal...when it detects a valid signal it will flash a Led or a (switchable) beeper. Operation of the unit is straightforward and easy: First you do a sweep like you would do with any other handheld rf detector ( you sit inside the car and move the antenna in all directions,then you walk slowly around the car while keeping the antenna close to the car, then you do the bottom of the car by moving the antenna across the bottom,then you do a more precise scan by "touching" or keeping the antenna close to all surfaces,panels and objects in and outside the car (in a similair fashion as you would do with a metaldetector or "broomeffect"-detector) Moving the antenna should be done slowly in order to give the receiver the time to scan all harmonics ( 2 seconds for all 1000 frequencies) Unit has been tested on: Garmin,Magellan,Lowrance,Trimble,Wavecom,Benefon,Proscout...etc Possible options are: A) Additional programming of custom frequencies (for example those caused by other known bugging equipment) B) Additional antenna with 25 dB low noise amplifier (1~2000 mhz) adjustable gain, 1,5 meter HighQ coax cable (phantom feed..does'nt need extra batteries) C) Additional triband Gsm detector (800/1800/1900 Mhz) with signature verification wich will also detect handshaking/updating signals while gsm unit is in standby and not making a call( usefull to detect Gsm transmitters/bugs/devices)...it might take somtime for such a handshake/update signal to appear...therefore the unit can be left unattended and will sound an alarm or flash a light until it is reset) active gsm transmitters will ofcourse be announced immidiatly. distance to Gsm transmitter can be more then 12 meters. You may contact me at: info@t... Greetings Tetrascanner www.tetrascanner.com . 8425 From: contranl Date: Tue Apr 6, 2004 6:47pm Subject: Why do my posting not appear ? Could anyone tell my why my postings do'nt appear ? actually i wouild like amn answer from a modersator of this group ! i do'nt get any notification I do'nt get any message from the moderator that my postings are not ok , off topic or something like that I have written to James (moderator) he does not respond at all I am a member of several yahoo groups and this is the only one that causes problems It's ok with me if you do'nt like my postings it's your group but at least you should tell me that once I do'nt consider it very funny when i spent hours and hours writting the stuff...and then find out it was all for nothing This has happened at least 3 times now the last month so it's not a coincidence if you do'nt want my postings please tell me so that is the least thing you can do and to me that seems the correct way Once again i do'nt think this is funny and i would like an answer Thanks tetrascanner www.tetrascanner.com 8426 From: gkeenan Date: Wed Apr 7, 2004 0:21am Subject: Re: Why do my posting not appear ? Well, Hard to say. James is a busy guy. However, you haven't provided any info on your self, either. And quite frankly, as a published writer myself, you use of English and its attendent puncuation and syntac leaves a lot to be desired. On the other hand, you command of the English language does not, in my opinion, mean anything - really. But since you didn't provide a signature so people on this list know what language you're using - then, hey, what the hell! We don't even know who you are, what country you're in, what language you speak, or what your command of the English language is (you don't have to speak the Queen's English - few of us do - but you could at least let us know who you are, and your company). As to why your posts don't appear? Not a clue. Happens to me from time to time as well, and not just on this list - but on the other 75 lists I belong to (not counting the 3 I'm owner/moderator of). Jerry GPKeenan Co. 1005 Celia St. West Islip, NY 11795-2503 (631) 587-4020 (ph) (631) 587-4020 (fax1) (530) 323-6832 (Fax2) (516) 587-4020 (cell) secureops@o... gkeenan@s... ----- Original Message ----- From: contranl To: TSCM-L@yahoogroups.com Sent: Tuesday, April 06, 2004 7:47 PM Subject: [TSCM-L] Why do my posting not appear ? Could anyone tell my why my postings do'nt appear ? actually i wouild like amn answer from a modersator of this group ! i do'nt get any notification I do'nt get any message from the moderator that my postings are not ok , off topic or something like that I have written to James (moderator) he does not respond at all I am a member of several yahoo groups and this is the only one that causes problems It's ok with me if you do'nt like my postings it's your group but at least you should tell me that once I do'nt consider it very funny when i spent hours and hours writting the stuff...and then find out it was all for nothing This has happened at least 3 times now the last month so it's not a coincidence if you do'nt want my postings please tell me so that is the least thing you can do and to me that seems the correct way Once again i do'nt think this is funny and i would like an answer Thanks tetrascanner www.tetrascanner.com ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 8427 From: James M. Atkinson Date: Wed Apr 7, 2004 1:02am Subject: Not your typical Sweep Equipment I have 11 ea recently refurbished and dyno'd Cummins NHC-250 engines still sealed in the steel transit cases with dyno certs running them at 400 horses each. Also have 8 ea matching 5 speed manual Rockwell transmissions (all new), and three new automatic 4 speed trannys for the NHC-250's. The transmissions include TWO PTO's with the first suitable for running 30-100 KW generator, and the second for running a hydraulic pump. I am looking for some more 20 foot, S-280 shelters in good shape suitable for refurbishment, plus I need several new swingfires. If anyone on the list is interested let me know. -jma PS: Yes, I use these bad boys for bug sweeps ;-) ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8428 From: Steve Uhrig Date: Wed Apr 7, 2004 11:51am Subject: Riser Bond TDR batteries If you have any older model Riser Bond TDRs with lead acid batteries (any before 1205CXA, including the 1205T), the rechargeable batteries have been discontinued by the manufacturer. I suspect the lead content caused some environmental concerns. Riser Bond has a few old ones left for $95 + ship. I've got the last of production from March, fresh stock, for $75 + ship and will install for another $50. The batt packs are true lead acid, not gelcells. They're closer to round than rectangular. There is no effective replacement for the lead acid packs unless you want to go to very expensive NiMH which involves Riser Bond or you or me recalibrating the charging circuit and changing some components. Space is at a premium inside the yellow box TDRs and space was allocated for this particular battery pack. While others certainly could be adapted, it's needless work. Replace yours now on your own terms instead of having to redesign the thing in a year or two when your battery dies. If you bought your TDR from me it had a new battery when shipped and should be good for 5 years if you don't leave it on charge all the time but charge it after use and every few months of storage. More batteries of this type die from being cooked to death from overcharging than any other cause. Contact me if you'd like a lead acid original battery to install yourself (takes about 45 minutes) or if you'd like me to swap it for you. Supply is very limited. I can take credit cards and ship anywhere in the world. I can supply NiMH batteries for the more recent models at a higher price. Contact me for details. Remember, if you're in a European country, you need a 50 Hz battery instead of the 60 Hz version used in the U.S. Specify when ordering. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8429 From: Hawkspirit Date: Wed Apr 7, 2004 0:56pm Subject: Fwd: Re: Question for group >I think Darren has it figured out. A way to record calls using mesage >center special features and then three way calling to connect to the party >you want to record, if you timing is off, the target would hear the >automated voice. Darren you are sharp dude! Also thanks to all others that responded. Roger Tolces www.bugsweeps.com >Darren said: > >I don't know if this is it or not but several cell phone messages >have similiar messages "to continue recording press 5" etc if anyone >on the phone caller A, caller B, or 3 way caller C were on there >with a voice mail deal then that could be it. > >I've noticed that people that don't have equipment to record calls >think that is a neat way to do it i.e. calling their own cell >number and getting the voice mail then 3 way calling the person >that they want to record and talking, but they forget that there is >a time limit on that or they hang up and forget there was a 3 way >call. > > >Darren > > >--- In TSCM-L@yahoogroups.com, Hawkspirit wrote: > > I have a client who lifted her home phone and heard an automated >female > > voice say "to continue recording this call, press 5", anyone have >any ideas > > on this one? > > Roger Tolces > > www.bugsweeps.com > > > > ---------- > > > > > > --- > > Outgoing mail is certified Virus Free. > > Checked by AVG anti-virus system (http://www.grisoft.com). > > Version: 6.0.614 / Virus Database: 393 - Release Date: 3/5/2004 > > > > > > [Non-text portions of this message have been removed] > > > >--- >Incoming mail is certified Virus Free. >Checked by AVG anti-virus system (http://www.grisoft.com). >Version: 6.0.614 / Virus Database: 393 - Release Date: 3/5/2004 ---------- --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.614 / Virus Database: 393 - Release Date: 3/5/2004 [Non-text portions of this message have been removed] 8430 From: Ocean Group Date: Wed Apr 7, 2004 0:46pm Subject: Re: Tempest...No SpyShop BS, Just Science Well, I certainly didn't ask for a page by page review, however it was that pointed out that it was riddled with inaccuracies and then proceeded to call it "drivel". If you felt so strongly about it then I would imagine it should only take a couple of seconds to write down the biggest errors, I do know that you are kept busy hunting spys, but surely after critcising someone's hard work you'd at least have the decency to back up your attack with a couple of lines of substance. I look forward to it, Kind regards Oisin PS. Yes messages do from time to time not appear on the list, they are quietly, how could I put it, muffled. ****** Message: 4 Date: Tue, 06 Apr 2004 18:26:12 -0400 From: "James M. Atkinson" Subject: Re: Re: Tempest...No SpyShop BS, Just Science Sure, Find someone willing to pay for a page-by-page review of the white paper and I'll be happy to do so. Given the number of errors found in the paper on initial review I estimate that spelling out each of them and debunking them individually will cost around $83,500 USD. Will you be paying for that by check, or by cash? -jma 8431 From: Hawkspirit Date: Wed Apr 7, 2004 8:01pm Subject: Historical Sweep Article Here is a new article just added to my historical sweep articles section. Roger Tracking Down Bugs Using a Spectrum Analyzer Are you being bugged? Here's how to find RF bugging devices that are invading your privacy. by Richard A. Bowen Radio Electronics, June 1989 http://www.bugsweeps.com/info/tracking_bugs.html ---------- --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.614 / Virus Database: 393 - Release Date: 3/5/2004 [Non-text portions of this message have been removed] 8432 From: David Alexander Date: Thu Apr 8, 2004 1:42am Subject: Re: Tempest...No SpyShop BS, Just Science James You don't have to debunk the entire paper, just pick one point at random and do one of your renowned demolition jobs on it's science and logic for us. Think of it as a sales pitch for your knowledge and skills.... David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: Ocean Group [mailto:inertia@o...] Sent:07 April 2004 18:47 To:tscm-l@yahoogroups.com Subject:[TSCM-L] Re: Tempest...No SpyShop BS, Just Science Well, I certainly didn't ask for a page by page review, however it was that pointed out that it was riddled with inaccuracies and then proceeded to call it "drivel". If you felt so strongly about it then I would imagine it should only take a couple of seconds to write down the biggest errors, I do know that you are kept busy hunting spys, but surely after critcising someone's hard work you'd at least have the decency to back up your attack with a couple of lines of substance. I look forward to it, Kind regards Oisin PS. Yes messages do from time to time not appear on the list, they are quietly, how could I put it, muffled. ****** Message: 4 Date: Tue, 06 Apr 2004 18:26:12 -0400 From: "James M. Atkinson" Subject: Re: Re: Tempest...No SpyShop BS, Just Science Sure, Find someone willing to pay for a page-by-page review of the white paper and I'll be happy to do so. Given the number of errors found in the paper on initial review I estimate that spelling out each of them and debunking them individually will cost around $83,500 USD. Will you be paying for that by check, or by cash? -jma ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8433 From: Date: Sat Apr 10, 2004 5:13pm Subject: Big Brother in rearview mirror of rental cars Big Brother in rearview mirror of rental cars Jane Engle Los Angeles Times Apr. 11, 2004 12:00 AM If you care about your privacy or your pocketbook, ask whether your rental car has electronic tracking equipment and what it's used for. The answers may surprise you - if you can get them. Since 2002, more rental cars have been fitted with such systems, which instantly can relay information on your car's speed, route and position to the rental company. This is done by wireless devices and Global Positioning System receivers that pinpoint location. Rental companies say they use the devices mainly to track stolen vehicles. Sparked lawsuits A flurry of lawsuits two years ago accused a Budget Rent A Car licensee in Tucson of using such a system to covertly track renters who took cars out of state and to fine them thousands of dollars. Earlier, another rental company, in New Haven, Conn., allegedly tracked renters who drove faster than 79 mph and fined them. State officials ordered the Connecticut company to stop the practice. The Tucson cases were settled last year, on undisclosed terms, and Budget says the outlet there has stopped tracking renters. But the issue didn't end there. At least two renters say Payless Car Rental in the San Francisco area used electronic tracking in the past few months to fine them for taking cars out of state. One of them, Steve McCarney of Reston, Va., said he was "absolutely furious" when a Payless licensee that serves the Oakland airport added $786.37 in penalties to his $155.52 four-day rental because he drove the car out of state to Ashland, Ore., for a wedding. He said the rental staff told him he was tracked electronically. McCarney said he wasn't told about the out-of-state rule, and it was buried in the contract, and there was no notice of the tracking system. Payless spokeswoman Margie Martin said that the company did provide disclosure on these issues online and in contracts, and that its licensees had a right to keep tabs on their vehicles. "It's their property, and they need to know where it is at any given time," she said. Spurs legislation Now, a California assemblywoman has introduced a bill to crack down on electronic tracking in the industry. Under the bill, a rental company would have to tell customers when they make their reservation whether the car has "electronic surveillance technology" and what it's used for. Disclosure would be oral and written in at least 12-point type on the rental contract. The company couldn't share or store electronic-tracking data unless the renter gave permission, and it couldn't use the data to impose fines or surcharges. So far, industry response to the bill is mixed. Hertz activates the devices, which are mostly on luxury cars, only "if we suspect a vehicle has been stolen," said Richard Broome, spokesman for Hertz, and otherwise does not track renters' speed or location. Renters aren't told which cars have electronic tracking because the company wants to avoid tipping off thieves, he added. Avis and Budget, in a joint statement, said they "unequivocally do not use satellite tracking devices" unless "a vehicle is reported stolen to law enforcement." Although Avis and Budget "strongly discourage" uses other than recovering stolen vehicles, independent franchisees, who run about a quarter of Avis' outlets and nearly half of Budget's, can use the tracking devices "in any lawful manner," the companies said. Which is what worries privacy watchdogs: Almost any use could be lawful, given the lack of regulation. [Non-text portions of this message have been removed] 8434 From: Date: Sun Apr 11, 2004 2:02pm Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 8435 From: Date: Wed Apr 7, 2004 2:16am Subject: Re[3]: Tempest...No SpyShop BS, Just Science > Given the number of errors found in the paper on initial review I estimate > that spelling out each of them and debunking them individually will cost > around $83,500 USD. You've almost got me on the hook! What about outlining just the first few errors, as a pre-sales effort? *pre-sales efforts are of course free of charge* ;-) Ciao! Remo Cornali Milano, Italy 8436 From: Noel E. Hanrahan Date: Wed Apr 7, 2004 2:06pm Subject: RE: Why do my posting not appear ? Sir, Firstl, I agree with Jerry, maybe James has a problem with the English you use, but as he said, there is no indication that English is your first language ( I would hope it isn't) so you may be excused. However, not signing your postings really isn't an acceptable part of lists like this, so maybe you should tell us all who you are, where you are from and the like. On to your Tetrascanner: I have developed a simple piece of equipment for the quick detection and finding of Gps based devices, Quick Detection you say? Define "Quick" considering it takes 2 seconds (your words) to go through the range of frequencies in your little "box", and what you are looking for is a radiating signal or harmonic from a timing circuit, I would suggest that to cover a small car properly would take you the best part of half an hour...IF YO KNEW WHAT YO WERE DOING, which according to this........ It can be operated by non skilled operators with just a little understanding of radio-signals ........ isn't a given. I can only assume from the above that your chosen market isn't TSCM professionals, because lets face it, all you've done is take something like an old Bearcat 200 XLT, made it smaller, taken a few things out, changed the frequency and VOILLA, a GSM detecter.... now...... The newest Gps receivers can now be so sensitive that direct sight of satellites is no longer necessary this is achieved by increasing the number of "correlators" wich is basically a mathematical function in the ever more powerful Dsp-processors wich are inside every Gps receiver...tests have shown that a valid position can now be calculated when the Gps receiver is in a underground parking garage...or even when the receiver is inside a microwave oven wich is highly screened. ...... I MAY be wrong, and somebody else on the list might help me out here, but isn't the whole idea of GPS to use.. em.. whats them things called again... oh yes, SATELLITES? I have tried and I have tried with my magellan to get a signal in my parking garage, and it doesn't work. With or without external antenna. The basic idea is that you NEED a line of sight so the processor can time the distance between it and the different satellites and get it's position. My wife didn't approve of putting the Magellan inside the microwave oven, but stubborn as I am, I tried and couldn't get a signal there either. However there is one common frequency rediated from every Gps receiver...this frequency is allways the same and is neccesary to make the receiver work...without it a Gps receiver cannot function....this frequency is : 1,023 Mhz wich is called the "CHIPRATE" sometimes called "CHIPPING RATE" or "CA CODE" O.K. Oscillators giving chips a frequency of 1,023 Mhz. It could be true, there are hundreds if not thousands of combinations you can use to get that frequency. HOWEVER, considering that any radio circuit will be very well shielded as per FCC regulations, that frequency will not escape the device, and if it does it won't go more than a few inches.... so again I ask, how long to check every inch of a vehicle? To furthermore facilitate the identification i have added a small microprocessor (Pic) wich analyzes and recognizes the typical signature/sound of the signal...when it detects a valid signal it will flash a Led or a (switchable) beeper. Is it just me or does the above statement make it sound like this device comes with CCS written on it somewhere, what with the state of the art LED and beeper...... Operation of the unit is straightforward and easy: First you do a sweep like you would do with any other handheld rf detector ( you sit inside the car and move the antenna in all directions,then you walk slowly around the car while keeping the antenna close to the car, then you do the bottom of the car by moving the antenna across the bottom,then you do a more precise scan by "touching" or keeping the antenna close to all surfaces,panels and objects in and outside the car (in a similair fashion as you would do with a metaldetector or "broomeffect"-detector) Now I have some questions. My Nextel has a GPS receiver built in.... will your "box" detect that? WHY would someone use a GPS tracking system with GSM? GSM technology is on the whole more accurate than GPS AND works quite nicely underground, inside buildings and pretty much anywhere. Ask my staff, they get a bit annoyed when I query their phones every half hour..... Sincerely, Noel E. Hanrahan IDSS, PERU +51 1 9743 9117 [Non-text portions of this message have been removed] 8437 From: contranl Date: Wed Apr 7, 2004 8:05pm Subject: Dutch sigint station (satellite interception) from 2 to 22 dishes . A small sigint station in The Netherlands (satellite interception) is going to upgrade it's capacity by increasing the number of satellite dishes from 2 to 22 Militairy say this is neccessary to keep up with the current happenings in the world...when completed it will be one of the biggest satellite interception stations in the world..(probably top 5 ). Initial cost will be 70 Million Euro's. Critics such as D.Campbell (the journalist who revealed the Echolon network to the world)and some insiders say that it's overkill for such a small country and that the only purpose would be to place itself on the intellegence-community map where trading of intellegence (real and commercial) is the order of the day. Some members of parliament are opposed and will ask questions. source: dutch national tv tetrascanner www.tetrascanner.com . 8438 From: Russ Date: Mon Apr 12, 2004 4:21pm Subject: RF Jamming - Stadium Protection Law enforcement in Washington State has asked me about the effectiveness of this system. Anyone have experience or knowledge? What about the ability of groups with a nefarious purpose gaining access to such a system and rendering law enforcement or first responders ineffective? Respectfully, Russ PROTECTION OF OLYMPIC SIZE STADIUMS AND LARGE ARENAS FROM IMPROVISED RADIO-CONTROLLED EXPLOSIVE DEVICES FOR IMMEDIATE RELEASE: New York, New York - April 2, 2004, Security Intelligence Technologies, Inc., today announced the launch of its new product, the STADIUM FREQUENCY SPECTRUM JAMMING SYSTEM (SJ5000). The SJ5000 is a bomb jammer that uses tower mounted stations in combination with mobile stations to provide protection for stadiums and temporarily crowded areas around the stadium from radio frequency (RF) operated explosive devices. RF receiving equipment in light towers and minibuses transmit and receive signals to detect, locate and jam RF spectrum within the preset vicinity.. The SJ5000 prevents the use of RF explosive triggering objects including cell phones, pagers or similar electronic products used in terrorist operations as well as jam almost any radio-controlled device smuggled into virtually any stadium, rendering them inoperable. "Radio Frequency controlled bombs and suicide bombers generally operate from a considerably short distance using transmitters with an output of less than 5 watts." States Brady Geril, VIP of Product Management at SITG." Their primary terrorist tactic is creating fear of an attack more than the attack itself. A large, crowded, public space presents an obvious target because it allows terrorists to blend into their surroundings and choose their desired moment of detonation. Without the SJ5000, defense in this situation would be quite limited and the detonation of even one isolated bomb within the perimeter would cause panic and chaos." A stadium-centered computer serves as the main control of the SJ5000's operations and executes all frequency-finding procedures. Jamming stations providing local jamming to all entrance areas can be extended by the addition of mobile stations driven around the stadium. The towers and mobile units may serve as observation posts for security teams who are also able to communicate by programming communication windows into the system, allowing security personnel to speak with each other throughout the stadium during frequency jamming. 8439 From: lgslgslgslgs_lgslgslgslgs Date: Sun Apr 11, 2004 10:09am Subject: A question about NLJD hi, everyone I am a new member. I have read some of messages and learned a lot of. I have a question about NLJD. I saw the article in http://www.tscm.com/tmdenljd.html. And I found "When a microwave sweep generator is synchronized and offset to a digital spectrum analyser the results are far superior to that of any NLJD (but much more expensive). For this reason NLJD's rapidly lost favor during the late 1980's, and have since been replaced with microwave sweep generators (if you don't mind dragging around an extra 60+ pounds of equipment). The technique of using a sweep generator as a NLJD signal is know a "Chirping"." But I don't undersatand about it. If mircowave sweep generator generates a linear FM signal? What is the principle? 8440 From: larry d chapman Date: Thu Apr 8, 2004 6:23am Subject: Re: Re: Tempest...No SpyShop BS, Just Science Maybe we need a "Whiner of the Month" award or maybe a "Wall of Shame" board upon which to post this sort of thing. --------- Original Message --------- DATE: Wed, 07 Apr 2004 18:46:34 From: Ocean Group To: tscm-l@yahoogroups.com Cc: Well, I certainly didn't ask for a page by page review, however it was that pointed out that it was riddled with inaccuracies and then proceeded to call it "drivel". If you felt so strongly about it then I would imagine it should only take a couple of seconds to write down the biggest errors, I do know that you are kept busy hunting spys, but surely after critcising someone's hard work you'd at least have the decency to back up your attack with a couple of lines of substance. I look forward to it, Kind regards Oisin PS. Yes messages do from time to time not appear on the list, they are quietly, how could I put it, muffled. ****** Message: 4 Date: Tue, 06 Apr 2004 18:26:12 -0400 From: "James M. Atkinson" Subject: Re: Re: Tempest...No SpyShop BS, Just Science Sure, Find someone willing to pay for a page-by-page review of the white paper and I'll be happy to do so. Given the number of errors found in the paper on initial review I estimate that spelling out each of them and debunking them individually will cost around $83,500 USD. Will you be paying for that by check, or by cash? -jma ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. ____________________________________________________________ Find what you are looking for with the Lycos Yellow Pages http://r.lycos.com/r/yp_emailfooter/http://yellowpages.lycos.com/default.asp?SRC=lycos10 [Non-text portions of this message have been removed] 8441 From: Monty Date: Sat Apr 10, 2004 10:51pm Subject: Re: Gps Detection (detecting Gps trackers/devices) Have to say this from the beginning WHAT A PIECE OF BULLSHIT. Can what he says be done ? Yes But only in the quite of RF clean room. Could you ever rely on this in the field? NO !!! The problem is that people will buy this trash and this will just encourage him (and others like him) to continue to build crap. With a little more effort they could be building equipment that we could really use. Monty --- contranl wrote: > . > > > Gps Detection (detecting Gps trackers/devices) > > I have developed a simple piece of equipment for the > quick detection > and finding of Gps based devices, > > It will detect all Gps devices such as: > > Cartrackers (combination of a Gps receiver and > Gsm/Cellphone) > Cartrackers (combination of a Gps receiver and > wireless modem) > Cartrackers (combination of a Gps and low power > burst transceiver) > Cartrackers (combination of a Gps receiver and a > passive datalogger) > Any other device that use a Gps receiver > > It will detect Gps receivers that work on both > frequencies: > > L1 Civil, 1575.42 Mhz > L2 Militairy, 1227.60 Mhz > > The equipment has the size of a cigarette pack...it > has a small > telescopic antenna, and works on batteries,there is > a display that > shows the frequency and signalstrength,a speaker > with volume control > for audible verification is included too. a flashing > Led or > (switchable)beeper indicates a valid signal.for > silent operation a > headphone output is provided. > > It will allow you to search a car,truck,small boat > or package in a > few minutes and detect any possible Gps devices. > It can be operated by non skilled operators with > just a little > understanding of radio-signals > > The newest Gps receivers can now be so sensitive > that direct sight > of satellites is no longer necessary this is > achieved by increasing > the number of "correlators" wich is basically a > mathematical > function in the ever more powerful Dsp-processors > wich are inside > every Gps receiver...tests have shown that a valid > position can now > be calculated when the Gps receiver is in a > underground parking > garage...or even when the receiver is inside a > microwave oven wich > is highly screened. > > In pratice this means that a car tracker including > it's antenna now > can be hidden anywhere inside or under a car.(and > not only in the > usual places)..it will need just a very small > opening to the outside > world...this opening does'nt have to have a view on > the sky...the > antenna can be in any direction where it can pick up > some > reflections coming from anywhere,the antenne could > be directed to > the ground and pick up reflections there...it could > be in a closed > trunk while picking up the signals trough the non > metallic backseats > and windows...it could be cleverly mounted inside > the engine > compartment...and so on. > A purely physical inspection now means the complete > dismanteling of > the car or at least removing the dashboard and all > panels > since the Gps receiver could be anywhere...such a > dismanteling is > not easy and might take a full day or more...and if > not done by > specialists it might leave some damage and > scratches. > > How it works: > > Gps receivers do emit (unwanted) radiation...some of > these low to > very low power signals are caused by: > > Local oscillators (LO) > Processor clock circuits (quarz crystal) > Intermidiate frequency/mixer circuits (spurious) > > The above frequencies depend on the design of the > circuit and vary > from manufacturer to manufacturer > they could be predicted...but since there are > hundreds of gps > receivers available you would end up with a list of > thousands > of frequencies (that is if you can get your hands on > all these > receivers...wich you can't)...together with other > frequencies that > are found in cars and caused by other electronic > equipment, > To check every found frequency and determine whether > it is caused by > a gps receiver or other car-electronics is a big and > lengthy task > and certainly not do-able for unskilled operators. > > However there is one common frequency rediated from > every Gps > receiver...this frequency is allways the same and is > neccesary > to make the receiver work...without it a Gps > receiver cannot > function....this frequency is : 1,023 Mhz wich is > called > the "CHIPRATE" sometimes called "CHIPPING RATE" or > "CA CODE" > > All Gps-satellites send there information at a > dataspeed of > 1,023 Mb/sec the Gps receiver receives this signal > and needs to > synchronize it's internal processes to the same > dataspeed to > calculate a position....such a dataspeed generates a > low power > radio signal at 1.023 Mhz it will also generate > various > harmonics...these harmonics can go up to a few > hundred Mhz > for example 63 times 1,023 Mhz = 64,4490 Mhz....wich > harmonic is the > strongest depends on the design of the circuit > (components used , > length of the coppertraces on the circuitboard , > screening quality > and size of the housing), if the unit is wired to > the car's > electrical circuit will make a difference too and > will tend to > increase the strength of harmonics in the lower > frequency range. > > Such harmonic radiation is very weak and will not > show up on a > spectrum analyzer....it will not be picked up by any > wideband- > detector either...simply because they are not > sensitive enough. > > A real receiver with high sensitivity (tuned > frontend) can pick up > such a harmonic radiation at a distance varying from > 30 centimeters > to 4 meters > > My detector is a real scanning (high sensitive) > receiver programmed > with 1000 frequencies (exact harmonics of 1.023 Mhz) > between 1 and > 2000 mhz ... > it will most certainly (99,99%) pick up one of the > harmonics > provided it's antenna is close enough to the > (hidden) receiver > The fact that it will only receive exact harmonics > of the Gps- > receiver generated signal greatly rules out the > reception of other > (false)signals generated by other > equipment/electronics. > Furthermore such a harmonic can easely be identified > since it always > sounds the same...nomatter wich Gps receiver is > used. > it sounds like a continious data stream with typical > > variations...infact what you hear is part of the > process that's > going on inside the Dsp chip > > The militairy Gps-signals (L2) happen to have an > exactly 10 times > higher "CHIPRATE" wich is 10 x 1.023 = 10.23 > Mhz...this is not a > coincidence....that's how the system was > designed...so there > harmonics will also show up at some of the same > frequencies but only > further spaced apart. > > To furthermore facilitate the identification i have > added a small > microprocessor (Pic) wich analyzes and recognizes > the typical > signature/sound of the signal...when it detects a > valid signal it > will flash a Led or a (switchable) beeper. > > Operation of the unit is straightforward and easy: > First you do a sweep like you would do with any > other handheld rf > detector ( you sit inside the car and move the > antenna in all > directions,then you walk slowly around the car while > keeping the > antenna close to the car, then you do the bottom of > the car by > moving the antenna across the bottom,then you do a > more precise scan > by "touching" or keeping the antenna close to all > surfaces,panels > and objects in and outside the car (in a similair > fashion as > you would do with a metaldetector or > "broomeffect"-detector) > > Moving the antenna should be done slowly in order to > give the > receiver the time to scan all harmonics ( 2 seconds > for all 1000 > frequencies) > > > Unit has been tested on: > Garmin,Magellan,Lowrance,Trimble,Wavecom,Benefon,Proscout...etc > > Possible options are: > > A) > Additional programming of custom frequencies (for > example those > caused by other known bugging equipment) > > B) > Additional antenna with 25 dB low noise amplifier > (1~2000 mhz) > adjustable gain, 1,5 meter HighQ coax cable (phantom > feed..does'nt > need extra batteries) > > C) > Additional triband Gsm detector (800/1800/1900 Mhz) > with signature > verification wich will also detect > handshaking/updating signals > while gsm unit is in standby and not making a call( > usefull to > detect Gsm transmitters/bugs/devices)...it might > take somtime for > such a handshake/update signal to appear...therefore > the unit can be > left unattended and will sound an alarm or flash a > light until it is > reset) active gsm transmitters will ofcourse be > announced immidiatly. > distance to Gsm transmitter can be more then 12 > meters. > > > You may contact me at: > > info@t... > > Greetings > > Tetrascanner > www.tetrascanner.com > > . > > > > > > > > > > > > > > > > > __________________________________ Do you Yahoo!? Yahoo! Small Business $15K Web Design Giveaway http://promotions.yahoo.com/design_giveaway/ 8442 From: Steve Uhrig Date: Tue Apr 13, 2004 2:43pm Subject: Re: RF Jamming - Stadium Protection Once upon a midnight dreary, Russ pondered, weak and weary: > Law enforcement in Washington State has asked me about the > effectiveness of this system. I find that very hard to believe. You can't get away with statements like that here. Try Usenet. Law enforcement has fingertip and phone call access to the top EOD/IED experts on the planet. There are groups of hundreds of specialists funded by millions of dollars who know virtually everything there is to know about the technology. They're not going to go to an unknown for information. > Anyone have experience or knowledge? The described system from the mentioned company is complete fiction. The press release you read was written to entice ignorant investors into buying phony 'dealerships'. Beware. There, I just saved you a $50,000 ripoff. Do your homework. Research CCS in the archives for this list and elsewhere on the web. You're welcome. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8443 From: Steve Uhrig Date: Tue Apr 13, 2004 2:48pm Subject: Re: Tempest...No SpyShop BS, Just Science Once upon a midnight dreary, cornali@r... pondered, weak and weary: > What about outlining just the first few errors, as a pre-sales effort? > *pre-sales efforts are of course free of charge* Wrong. I know you're joking, but this leads into a serious point. ------------- Pre-sales efforts are paid for on a consulting arrangement, via a retainer paid in advance. If a sale results, the pre-sale consulting fees are credited in full thus costing the customer nothing. If the customer doesn't buy and is wasting our time, the fee covers our time, overhead and expenses. Position yourself as a technical specialist, not a salesperson. People waste less of your time that way. Does your attorney grant the first legal session free? Not reputable ones. Does he ever work out of his own pocket? Only on contingencies, and then you pay expenses usually anyway. He's only gambling his fees. You want to be positioned in the minds of potential clients as a professional, not a car salesman. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8444 From: Date: Tue Apr 13, 2004 11:51am Subject: Re: RF Jamming - Stadium Protection In a message dated 4/13/2004 12:14:18 PM Pacific Standard Time, vercingetorixbc@y... writes: > < its > new product, the STADIUM FREQUENCY SPECTRUM JAMMING SYSTEM (SJ5000).>> Sounds / smells like Arpege to me..... [Non-text portions of this message have been removed] 8445 From: James M. Atkinson Date: Tue Apr 13, 2004 4:13pm Subject: Re: RF Jamming - Stadium Protection It boggles the mind. -jma At 04:51 PM 4/13/2004, NoPositiveWork@a... wrote: >In a message dated 4/13/2004 12:14:18 PM Pacific Standard Time, >vercingetorixbc@y... writes: > > > > < > its > > new product, the STADIUM FREQUENCY SPECTRUM JAMMING SYSTEM (SJ5000).>> > > Sounds / smells like Arpege to me..... ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- From: Perry Myers Date: Thu Apr 6, 2000 3:36pm Subject: To remove yourself You need to go to the web site to remove yourself. To subscribe or unsubscribe go to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L Perry D. Myers, CFE CEO & President Myers Service, Inc. Investigations 2076 N. Elston Ave. Suite 200 Chicago, IL. 60614-3940 Phone 773-342-8300 Facsimile 773-486-4430 email: perry@d... For information on investigative services please visit our web site at www.detectiveservices.com This e-mail is strictly confidential. If you receive this email in error, please forward immediately to info@d... 152 From: Andre Holmes <1ach@g...> Date: Thu Apr 6, 2000 7:20pm Subject: Re: Roger wrote I busted a bunch of wiretaps question Roger did you report your findings to the FBI when you first discovered the taps I believe thats the normal procedure that is to report all findings on telcowiring period. -----Original Message----- From: Dawn Star To: TSCM-L@onelist.com Date: Thursday, April 06, 2000 11:44 AM Subject: [TSCM-L] >Jay, I have a Tektronix 1503 that I've been using since 1980. Its range goes for miles if you know the tricks. It really kicks butt. In 1985 I busted a bunch of federal wiretaps with it and they threw me in jail and set my bail at one million dollars. How's that for certifiable results. Roger > >P.S. I've used this unit on over 2500 sweeps (25 to 50 lines per sweep) all on active trunks with ring-in's all the time - this unit never misses a beat - and its power lies in using it on active lines including station lines within the local system. > > >[Non-text portions of this message have been removed] > > >------------------------------------------------------------------------ >DON'T HATE YOUR RATE! >Get a NextCard Visa, in 30 seconds! Get rates as low as >0.0% Intro or 9.9% Fixed APR and no hidden fees. >Apply NOW! >http://click.egroups.com/1/2120/0/_/507420/_/955035859/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > 153 From: Date: Thu Apr 6, 2000 8:04pm Subject: Re: Re: antenna Go to www.onelist.com and remove yourself from the list. 154 From: Jesse Thomas Date: Thu Apr 6, 2000 2:42pm Subject: Re: Re: Delete I believe that is where the term, "clueless" came from. Negative-@w... wrote: > Arthur, Please get a clue. Posting to the list is not how you take your > self out of it. > Erik. > > ------------------------------------------------------------------------ > GET A NEXTCARD VISA, in 30 seconds! Get rates as low as 2.9% > Intro or 9.9% Fixed APR and no hidden fees. Apply NOW! > http://click.egroups.com/1/936/0/_/507420/_/955051773/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 155 From: William Knowles Date: Thu Apr 6, 2000 4:45pm Subject: Re: Re: antenna On Thu, 6 Apr 2000, Robert P. Savoie wrote: Getting off of mailing lists doesn't seem to be the bag of all the mail lately, and most of tech stuff goes clear over my head, but its begining to make some sense the more I look at it. > Please remove my name from the mailing list. Tech stuff is not my > bag. Thanks If you all spent a little time reading the entire message you would see a URL at the bottom of the messages pointing you to: http://www.onelist.com/community/TSCM-L Which at the bottom of that page you would find... Addresses: Post message: TSCM-L@egroups.com Subscribe: TSCM-L-subscribe@egroups.com Unsubscribe: TSCM-L-unsubscribe@egroups.com List owner: TSCM-L-owner@egroups.com URL to this page: http://www.egroups.com/group/TSCM-L So over sending mail to over 350+ members of this list that you want off, You could very well mail the list owner if unsubscribing didn't pan out to take you off the list, and really, eGroups is one of the easiest lists to get off of. -WK > arthur wrote: > > > please remove my name from mailing list > > > > arthur@m... ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS *-------------------------------------------------* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen. Alfred. M. Gray, USMC --------------------------------------------------- C4I Secure Solutions http://www.c4i.org *-------------------------------------------------* 156 From: Jesse Thomas Date: Thu Apr 6, 2000 2:40pm Subject: Re: Stop the Mail,Please Dear snowbunny, I don't get it. What is this 'confidentiality' stuff, when you don't even say anything.. Warren Wotton wrote: > Warren Wotton Contact: > > Brandon University Wotton@B... > 270-18th Street 204-727-9665 > Brandon,Manitoba > CANADA > R7A 6A9 > CONFIDENTIALITY NOTICE: This message is intended only for > the use of the individual or entity to which it is > addressed and may contain information that is privileged, > confidential and exempt from disclosure under applicable > law. If the reader of this message is not the intended > recipient you are hereby notified that any dissemination, > distribution or copying of this transmission is prohibited. > If you have received this transmission in error, please > notify us immediately by return E-mail or by telephone at > 204-727-4475 and destroy the transmission by deleting the > file and/or shredding any paper copy. > > ------------------------------------------------------------------------ > PERFORM CPR ON YOUR APR! > Get a NextCard Visa, in 30 seconds! Get rates as low as > 0.0% Intro or 9.9% Fixed APR and no hidden fees. > Apply NOW! > http://click.egroups.com/1/2121/0/_/507420/_/955058226/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 157 From: James M. Atkinson, Comm-Eng Date: Fri Apr 7, 2000 1:50pm Subject: Forbes Article I thought the list might find the following article interesting. It's actually quite funny how the kid got caught. http://www.forbes.com/columnists/penenberg/ Now back to hunting for bugs, -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 158 From: Robert G. Ferrell Date: Fri Apr 7, 2000 10:38am Subject: Re: Re: antenna >If you all spent a little time reading the entire message you would >see a URL at the bottom of the messages pointing you to: I think we should drop all this hooha about UFOs and alien abductions and concentrate on the weird phenomenon of people who don't know how to get off of mailing lists they must have signed up for. I've been watching this eerie development for several years now. It cuts across all walks of life and all ages, races, and cultures. Apparently there are literally thousands of people on mailing lists out there who have no idea how they got there, or how to get off, despite the fact that the information is almost always right there in front of them, frequently as part of the very message to which they're replying. Is this some new and insidious form of dyslexia that's being spread by increasing computer semi-literacy? Perhaps it's a virus that comes attached to the automated response you get when you sign up for a mailing list. I doubt that these same people would write a letter to the editor of a newspaper to have their subscription cancelled. What malignant force is it that causes them to take a similar action where mailing lists are concerned? I call for a White House Special Task Force to investigate immediately, before the terror spreads any further. RGF Robert G. Ferrell, CISSP Information Security Officer National Business Center, US DoI Robert_G_Ferrell@n... ------------------------------------------------------------ Nothing I have ever said should be construed as even vaguely representing an official statement by the NBC or DoI. ------------------------------------------------------------ 159 From: Arthur Bishop Date: Sat Apr 8, 2000 5:25pm Subject: FREE Just a quick announcement regarding our FREE FraudKiller applications. The FraudKiller applications used to be free for download on our site. For various reasons, we dumped the stand-alone applications (you had to download and install) in favor if web applications (immeidate gratification with no download / install). The FraudKiller applications are now available in a private area for investigative professionals. The applications allow you to construct driver license numbers from personal data for nine (9) states. In addition, you can extract SSN's from Nevada driver license numbers. Use of these applications is FREE to licensed professionals who use the resource responsibly. You can apply for access at: http://www.vindico.com/FraudKiller/Register.htm best to all Arthur Bishop Vindico, Inc. Fraud-Fighting Resources: http://www.vindico.com FREE Fraud-Fighting and Investigative Software: http://www.vindico.com Investigation, Privacy and Personal Protection: http://www.vindico.com Skip Tracing Resources: http://www.vindico.com SSN Validation Software: http://www.vindico.com The Browser Security Test: http://www.vindico.com The Wizard of Search! http://www.vindico.com/search/WizOfSearch.htm 160 From: Dawn Star Date: Sat Apr 8, 2000 6:55pm Subject: normal procedure Message: 2 Date: Thu, 6 Apr 2000 20:20:44 -0400 From: "Andre Holmes" <1ach@g...> Subject: Re: Roger wrote I busted a bunch of wiretaps question Roger did you report your findings to the FBI when you first discovered the taps I believe thats the normal procedure that is to report all findings on telcowiring period. -----Original Message----- From: Dawn Star To: TSCM-L@onelist.com Date: Thursday, April 06, 2000 11:44 AM Subject: [TSCM-L] Sure, I called them up and said " I just busted a bunch of your wiretaps so why don't you come on down to my office and arrest me and charge me with obstruction of justice and conspiracy" Let me tell you, it ain't no joke when you sitting across the table from the F.B.I., D.E.A., I.R.S criminal, and United States Customs and they want to know why their taps aren't playing music anymore! Roger [Non-text portions of this message have been removed] 161 From: Robert G. Ferrell Date: Fri Apr 7, 2000 2:17pm Subject: Re: Forbes Article > http://www.forbes.com/columnists/penenberg/ I spend about half my life doing exactly this sort of investigating, and I gotta tell ya that it's almost never this easy: photos of the guy's car and a citation, for God's sake. Sheesh. Brian just lucked out. RGF Robert G. Ferrell, CISSP Information Security Officer National Business Center, US DoI Robert_G_Ferrell@n... ------------------------------------------------------------ Nothing I have ever said should be construed as even vaguely representing an official statement by the NBC or DoI. ------------------------------------------------------------ 162 From: Adam Penenberg Date: Fri Apr 7, 2000 2:13pm Subject: lists sometimes people who sign up for something online and don't see an "opt-out" feature can end up on mailing lists they didn't intend to sign up for. for ex., if you sign up for excite.com you will end up receiving loads of spam from harris barton interactive (of harris polls fame), asking you to participate in online polling. i interviewed several people for a column who had no idea how they ended up on the harris poll spam list. (see http://www.forbes.com/columnists/penenberg/2000/0320.htm) or friends, acquaintances and contacts will sign you up for lists without your knowing. (that's how i ended up on several.) that said, what's the big deal anyway? i'm sure most of us on the list here get dozens, if not 100s of emails a day; a few from tscm doesn't add up yto all that much. --adam ---------- >From: "Robert G. Ferrell" >To: TSCM-L@egroups.com >Subject: Re: [TSCM-L] Re: antenna >Date: Fri, Apr 7, 2000, 11:38 AM > >>If you all spent a little time reading the entire message you would >>see a URL at the bottom of the messages pointing you to: > >I think we should drop all this hooha about UFOs and alien abductions and >concentrate on the weird phenomenon of people who don't know how to get off of >mailing lists they must have signed up for. I've been watching this eerie >development for several years now. It cuts across all walks of life and all >ages, races, and cultures. > >Apparently there are literally thousands of people on mailing lists out there >who have no idea how they got there, or how to get off, despite the fact that >the information is almost always right there in front of them, frequently as >part of the very message to which they're replying. Is this some new and >insidious form of dyslexia that's being spread by increasing computer >semi-literacy? Perhaps it's a virus that comes attached to the automated >response you get when you sign up for a mailing list. > >I doubt that these same people would write a letter to the editor of a newspaper >to have their subscription cancelled. What malignant force is it that causes >them to take a similar action where mailing lists are concerned? > >I call for a White House Special Task Force to investigate immediately, before >the terror spreads any further. > > >RGF > > >Robert G. Ferrell, CISSP >Information Security Officer >National Business Center, US DoI >Robert_G_Ferrell@n... >------------------------------------------------------------ >Nothing I have ever said should be construed as even vaguely >representing an official statement by the NBC or DoI. >------------------------------------------------------------ > > >------------------------------------------------------------------------ >DON'T HATE YOUR RATE! >Get a NextCard Visa, in 30 seconds! Get rates as low as >0.0% Intro or 9.9% Fixed APR and no hidden fees. >Apply NOW! >http://click.egroups.com/1/2120/0/_/507420/_/955134179/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > 163 From: Date: Sat Apr 8, 2000 5:49am Subject: Re: Hey Roger, Sorry about the jail time but man ......what results! The authorities aren't so hot anymore. Similar stories are surfacing. Good Luck DM 164 From: Andre Holmes <1ach@g...> Date: Sat Apr 8, 2000 9:18pm Subject: Re: normal procedure To Members of TSCM-L So why did roger have to go through the turmoil I personally was told by the FBI that they are only concerned with wiretaps bugs they really dont care, now I confused. -----Original Message----- From: Dawn Star To: TSCM-L@onelist.com Date: Saturday, April 08, 2000 7:50 PM Subject: [TSCM-L] normal procedure >Message: 2 > Date: Thu, 6 Apr 2000 20:20:44 -0400 > From: "Andre Holmes" <1ach@g...> >Subject: Re: > >Roger wrote I busted a bunch of wiretaps question Roger did you report your >findings to the FBI when you first discovered the taps I believe thats the >normal procedure that is to report all findings on telcowiring period. >-----Original Message----- >From: Dawn Star >To: TSCM-L@onelist.com >Date: Thursday, April 06, 2000 11:44 AM >Subject: [TSCM-L] > > >Sure, I called them up and said " I just busted a bunch of your wiretaps so why don't you come on down to my office and arrest me and charge me with obstruction of justice and conspiracy" Let me tell you, it ain't no joke when you sitting across the table from the F.B.I., D.E.A., I.R.S criminal, and United States Customs and they want to know why their taps aren't playing music anymore! Roger > > >[Non-text portions of this message have been removed] > > >------------------------------------------------------------------------ >Get a NextCard Visa, in 30 seconds! >1. Fill in the brief application >2. Receive approval decision within 30 seconds >3. Get rates as low as 2.9% Intro or 9.9% Fixed APR >Apply NOW! >http://click.egroups.com/1/2646/0/_/507420/_/955237810/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > 165 From: James M. Atkinson, Comm-Eng Date: Sat Apr 8, 2000 10:15pm Subject: Always remember, 49.9% of your friends are below average [humor] After all of the bitching, moaning, flaming, and complaining on the list this week I thought it was time to post some humor. Come on folks, relax, have a laugh, and don't be for intense. -jma Always remember, 49.9% of your friends are below average. It takes a big man to cry, but it takes a bigger man to laugh at that man. If at first you don't succeed, blame it on your parents. The Bible tells us to love our neighbors, and also to love our enemies; probably because they are generally the same people When you're riding in a time machine way far into the future, don't stick your elbow out the window, or it'll turn into a fossil. For sale: an antique desk suitable for lady with thick legs and large drawers. 14% of Americans surveyed agree that Puerto Rico should not be the 51st state because "that extra star would make the flag look bad." 23% of Perot voters say, "The candidate I vote for usually loses." 17% of college graduates would punch themselves really hard in the face for $50. 28% of Americans think that our army's high-tech military equipment is too expensive to risk in combat. One third of American women agree that baseball was more exciting when it was on strike. When Ford Motor Company began marketing their popular Pinto in Brazil years ago, they were puzzled by terrible sales. Things improved when they changed the name to Corcel, which means "steed." Pinto is Brazilian slang for "tiny male genitals..." Tired of cleaning yourself? Let me do it. Dog for sale: eats anything and is fond of children. Rehab is for quitters God bless Darwin. Dammit, Jim, I'm a doctor, not some kind of medical technician! YOU! OUT OF THE GENE POOL! Stock up and save. Limit: one Why buy a product that it takes 2000 flushes to get rid of? Our bikinis are exciting. They are simply the tops. Illiterate? Write today for free help. I discovered today that goldfish do not like jello. Screw the planet, save yourself. What is another word for synonym? If a mute swears does his mother wash his hands out with soap? When sign makers go on strike, is anything written on their signs? When you open a big bag of cotton balls, is the top one meant to be thrown away? Why isn't there mouse flavored cat food. Is it possible to be totally partial. If a funeral procession is at night, do people drive with there lights off? How can a slim chance and a fat chance be the same, while a wise man and a wise guy are opposites? How can the weather be hot as hell one day and cold as hell another? Dad always thought laughter was the best medicine, which I guess is why several of us died of tuberculosis. I hope if dogs ever take over the world, and they chose a king, they don't just go by size, because I bet there are some Chihuahuas with some good ideas. The face of a child can say it all, especially the mouth part of the face. If you were a poor Aztec with no weapons, and a bunch of conquistadors came up to you and asked where the gold was, I don't think it would be a good idea to say, "I swallowed it. So sue me." When you go in for a job interview, I think a good thing to ask is if they ever press charges. To me, boxing is like a ballet, except there's no music, no choreography, and the dancers hit each other. Probably the earliest fly swatters were nothing more than some sort of striking surface attached to the end of a long stick. If a stealth bomber crashes in a forest, will it make a sound? If a parsley farmer is sued, can they garnish his wages? Should vegetarians eat animal crackers? If cops arrest a mime, do they tell him he has the right to remain silent? Why do people who know the least know it the loudest? If trees could scream, would we be so cavalier about cutting them down? We might, if they screamed all the time, really loudly, for no good reason. Better not take a dog on the space shuttle, because if he sticks his head out when you're coming home his face might burn up. If a kid asks where rain comes from, I think a cute thing to tell him is "God is crying." And if he asks why God is crying, another cute thing to tell him is "Probably because of something you did." If you saw two guys named Hambone and Flippy, which one would you think liked dolphins the most? I'd say Flippy, wouldn't you? You'd be wrong, though. It's Hambone. Mom used to get offended when I used the word "puke." But to me, that's what her dinner tasted like. Children need encouragement. If a kid gets an answer right, tell him it was a lucky guess. That way he develops a good, lucky feeling. Whether they find a life there or not, I think Jupiter should be called an enemy planet. Instead of trying to build newer and bigger weapons of destruction, we should be thinking about getting more use out of the ones we already have. If you ever catch on fire, try to avoid looking in a mirror, because I bet that will really throw you into a panic. I think the mistake a lot of us make is thinking the state-appointed shrink is our friend. I wish outer space guys would conquer the Earth and make people their pets, because I'd like to have one of those little beds with my name on it. I hope life isn't a big joke, because I don't get it. I wish I lived back in the old west days, because I'd save up my money for about twenty years so I could buy a solid-gold pick. Then I'd go out West and start digging for gold. When someone came up and asked what I was doing, I'd say, "Looking for gold, ya durn fool." He'd say, "Your pick is gold," and I'd say, "Well, that was easy." Good joke, huh. =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 166 From: James M. Atkinson, Comm-Eng Date: Sat Apr 8, 2000 10:21pm Subject: Re: FREE Arthur, In the future please do not post product announcements to the TSCM-L list unless it has a specific application for running spectrum analyzers, performing FFT, extracting RF from 480 Volt AC mains, or similar TSCM function, I welcome spirited discussion of TSCM and related subjects with an occasional piece of humor, biting satire, or philosophy). But PLEASE, PLEASE, PLEASE do not spam the list, or include it in cross postings of things that have nothing to do with TSCM, TEMPEST, HI-JACK, NON-STOP, etc. -jma At 3:25 PM -0700 4/8/00, Arthur Bishop wrote: >Just a quick announcement regarding our FREE FraudKiller applications. > >The FraudKiller applications used to be free for download on our site. For >various reasons, we dumped the stand-alone applications (you had to >download and install) in favor if web applications (immeidate gratification >with no download / install). > >The FraudKiller applications are now available in a private area for >investigative professionals. The applications allow you to construct driver >license numbers from personal data for nine (9) states. In addition, you >can extract SSN's from Nevada driver license numbers. > >Use of these applications is FREE to licensed professionals who use the >resource responsibly. > >You can apply for access at: > >http://www.vindico.com/FraudKiller/Register.htm > >best to all > >Arthur Bishop >Vindico, Inc. =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 167 From: James M. Atkinson, Comm-Eng Date: Sat Apr 8, 2000 10:30pm Subject: Re: lists Ahem, The ONLY way you can get on the TSCM-L mailing list is for you yourself to sign up via the onelist website, or to send me an Email requesting membership. I decline about 30% of all membership requests, and try to limit subscribers to only those people actively involved in the TSCM business. I normally exclude anybody with a criminal background (whether convicted or not), mental patients, people who work both sides, and anybody with poor ethics. The list exists to educate, illuminate, and to enhance the profession, period. While there are a small number of people on the list who are new to the business and "may still be a bit green" they are good folks who will eventually mature into respected TSCM'ers. Nobody, REPEAT NOBODY gets on the list without specifically requesting membership. -jma At 3:13 PM -0400 4/7/00, Adam Penenberg wrote: >sometimes people who sign up for something online and don't see an "opt-out" >feature can end up on mailing lists they didn't intend to sign up for. for >ex., if you sign up for excite.com you will end up receiving loads of spam >from harris barton interactive (of harris polls fame), asking you to >participate in online polling. i interviewed several people for a column who >had no idea how they ended up on the harris poll spam list. (see >http://www.forbes.com/columnists/penenberg/2000/0320.htm) > >or friends, acquaintances and contacts will sign you up for lists without >your knowing. (that's how i ended up on several.) that said, what's the big >deal anyway? i'm sure most of us on the list here get dozens, if not 100s of >emails a day; a few from tscm doesn't add up yto all that much. > >--adam > > > > >---------- > >From: "Robert G. Ferrell" > >To: TSCM-L@egroups.com > >Subject: Re: [TSCM-L] Re: antenna > >Date: Fri, Apr 7, 2000, 11:38 AM > > > > >>If you all spent a little time reading the entire message you would > >>see a URL at the bottom of the messages pointing you to: > > > >I think we should drop all this hooha about UFOs and alien abductions and > >concentrate on the weird phenomenon of people who don't know how >to get off of > >mailing lists they must have signed up for. I've been watching this eerie > >development for several years now. It cuts across all walks of life and all > >ages, races, and cultures. > > > >Apparently there are literally thousands of people on mailing >lists out there > >who have no idea how they got there, or how to get off, despite >the fact that > >the information is almost always right there in front of them, frequently as > >part of the very message to which they're replying. Is this some new and > >insidious form of dyslexia that's being spread by increasing computer > >semi-literacy? Perhaps it's a virus that comes attached to the automated > >response you get when you sign up for a mailing list. > > > >I doubt that these same people would write a letter to the editor >of a newspaper > >to have their subscription cancelled. What malignant force is it >that causes > >them to take a similar action where mailing lists are concerned? > > > >I call for a White House Special Task Force to investigate >immediately, before > >the terror spreads any further. > > > > > >RGF > > > > > >Robert G. Ferrell, CISSP > >Information Security Officer > >National Business Center, US DoI > >Robert_G_Ferrell@n... > >------------------------------------------------------------ > >Nothing I have ever said should be construed as even vaguely > >representing an official statement by the NBC or DoI. > >------------------------------------------------------------ =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 168 From: James M. Atkinson, Comm-Eng Date: Sat Apr 8, 2000 11:42pm Subject: Notification Chain Good Evening, I am just in from spending all day (the last 17 hours) on a sweep, and I am dog tired, so I will make this Email brief. In the event that you find a bug, wiretap, illegal use or possession of surveillance equipment you are legally obligated to notify law enforcement. There are no what ifs, no lame excuses, blah, blah, blah. If you find a technical surveillance device, you must notify law enforcement, period. If a technical surveillance device (or activity) involves classified information, national defense, economic espionage, T3 violations, or related issues you had better make sure the FBI gets formally involved. (Study up on Title 18, and the FBI's "MIOG, Manual of Investigative Operations and Guidelines"). As a rule I will not even leave the office for any type of TSCM projects unless I have first familiarized myself with a "Notification Chain". This "Chain" contains the names, agencies, and telephone numbers (including fax) of everybody who would need to be notified of any finding. I also prepare a series of fax-able notification letters in advance that permit me to fill in the blanks and squirt hard copies off (via laptop) to the appropriate agencies before establishing voice contact. Of course you have to collect and verify all of numbers, names, etc in advance. If "something nasty" is found that is a actual violation of the law, or would be of interest to a federal law enforcement agency then I push to have the area considered a crime scene, and push to have it immediately secured and sealed. If "nobody is officially interested" in sealing the scene, then I at least get a local L/E officer to come by and complete an incident report. Of course in all cases you should documents, document, document, as the person who finds the bug will (as a rule) be initially suspected as the person who planted it. Allowing an investigator to see your "work products" may very well help you avoid any kind of "awkward situation". Also, try to get a series of Polaroids (I prefer 8*10 LF) of the area and of the suspect device. If possible also set up a video recorder to catch all activity around the suspect device "in case someone gets cute" and tries to make the device disappear. Of course your mileage may vary. -jma. =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 169 From: Andy Grudko Date: Sun Apr 9, 2000 4:22am Subject: Re: Re: antenna ----- Original Message ----- > I think we should drop all this hooha about UFOs and alien abductions and > concentrate on the weird phenomenon of people who don't know how to get off of > mailing lists they must have signed up for. Robert, this was a brilliant commentary. So there IS intelligent life on Earth after all...... Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia Israel - www.grudko.com. - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 Members of : SCIP (Gauteng Chairman), SACI (President), GIN (Charter), WAD, CALI, SASFed, SASA, SAMLF, UKPIN, Prisoners' Rehabilitation & Education Trust --- "When you need it done right - first time" --- 170 From: Andy Grudko Date: Sun Apr 9, 2000 5:06am Subject: Re: lists blah blah ----- Original Message ----- > I decline about 30% of all membership requests, and try to limit > subscribers to only those people actively involved in the TSCM > business. I normally exclude anybody with a criminal background > (whether convicted or not), mental patients, people who work both > sides, and anybody with poor ethics. So how did I get on? Groucho Marx said "I wouldn't want to join a club that would have someone like me as a member". (:-) Out of interest - we carry out about 15 commercial TSCM sweeps a month. We find devices in about 3% of cases. we beleive that illegal surveillance in South Africa is 'common' , mostly carried out by PIs. How do we compare to you guys round the world? Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia Israel - www.grudko.com. - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 Members of : SCIP (Gauteng Chairman), SACI (President), GIN (Charter), WAD, CALI, SASFed, SASA, SAMLF, UKPIN, Prisoners' Rehabilitation & Education Trust --- "When you need it done right - first time" --- 171 From: Date: Sun Apr 9, 2000 7:50am Subject: Re: Always remember, 49.9% of your friends are below average [humor] Amen! 172 From: McIntyre Date: Sat Apr 8, 2000 10:02pm Subject: Re: Forbes Article At 02:17 PM 04/07/2000 -0500, you wrote: > > http://www.forbes.com/columnists/penenberg/ > >I spend about half my life doing exactly this sort of investigating, and I >gotta >tell ya that it's almost never this easy: photos of the guy's car and a >citation, for God's sake. Sheesh. Brian just lucked out. Actually, when it comes to these little script kiddies.....you'd be surprised how easy it is. I'm often surprised at how long it takes for Fed LE to catch up with them some times. We already know the Feds use printouts of the Attrition mirrors for questioning and later as evidence. You figure they'd make better use of it for things like "greet patterns", HTML metatags, graphic analysis, as well as simple search engines like Altavista and Google, or Dejanews. These kids almost always leave a trail as many of them have been using the net for years.....a lot of that time using their real persona. 173 From: Date: Sun Apr 9, 2000 4:35am Subject: Re: lists blah blah Andy, Can you somehow get me your address. I'd like to get a letter off to you. Thanks DM Clockdepot@a... 174 From: 1RCM <1RCM@M...> Date: Sun Apr 9, 2000 9:21am Subject: Two Items Hi Group, First I'd like to give a hearty Amen to the moderator's last post regarding notifying LE upon the finding of any device or penetration - active or suspect. It is simply the right thing, the ETHICAL thing and the legal thing to do. And before anyone asks me to show the specific statutes, laws or sections that mandate a report of the find or a surrender of the item, as one who worked in this arena for 15 years I'll freely grant you that they all are admittedly hazy and vague and really open to interpretation and argument. But think about this - if you have a find and don't report it (especially if it is one of 'theirs') and someone even 'whispers' about it (can you really trust your client's secret-keeping abilities even though you are only trying to respect his wishes?) a good investigator has many options in his bag of tricks. For example he can have the IRS crawl up your six. After all you did find the thing as a representative of a business that definitely has all its I's dotted and T's crossed - didn't you and don't you? Or he can establish that you merely touched the device while handing it to whomever - an interesting case of violation of Title III, conspiracy and withholding evidence. Or he could 'play' a ton of other fun 'games' with you, your expensive lawyer, and your business that all leave you shamed, tired and broke before he decides that you've learned your lesson. And please don't say that any of that violates your rights, its against the law, or whatever. It is simply a matter of if you want to 'play' so can 'they'. So do the right thing and the ethical thing and just report the find. Don't roll the dice and take a chance on a forced intimate relationship with a guy named Bubba for about 15 years. Failure to make proper notifications (or at least having a DOCUMENTED record of making attempts if you don't readily or easily 'get anyone interested' ((Steve Uhrig can attest to this problem)) is a game that may be good for repeat business or honoring a client's request, but it is also one that you'll eventually lose! Second, has anyone had any bad experiences with Optoelectronics lately. I have several Opto devices that I've had good experience and good service with in the past. But last year I bought one of their TechToyz DTMF mini-decoders that now has me cussing their name. I used it only about 5 times over the past year and for the last two months it sat turned-off on a shelf. A few weeks ago when I went to use it - Nada, it wouldn't even power-up! I checked the usual problems - nope. I got some suggestions via e-mail from Opto to try - still nothing. So they said "send it down and we'll look at it". The reply came back that after some checking they can't get it to work either. They apparently agree that there was no misuse, no water damage, no 'tinkering', no power problems and nothing else adverse on my part that they can see - they just don't know why it won't work. So their answer is to charge me 2/3 of the cost of a new one to get the thing working. Naturally I declined. I'm not whining here, and with the thing out of warranty I certainly didn't expect the repair for free - but 2/3 the price of a new one seems a bit excessive to me - especially since whatever happened to it apparently is related to manufacturing and not to my actions. I'm just wondering if anyone else has found Opto's customer service to have gone down hill or if I have a 'fluke' here and everyone else has had good service. Also, I'm now looking for an inexpensive DTMF decoder (built or kit) that only will be used infrequently - any suggestions? Thanks, 'Just another Bob' 1RCM@M... 175 From: Jesse Thomas Date: Sun Apr 9, 2000 5:31am Subject: Re: lists blah blah Didn't Woody Allen say that? Andy Grudko wrote: > ----- Original Message ----- > So how did I get on? Groucho Marx said "I wouldn't want to join a club that > would have someone like me as a member". (:-) > 176 From: Trace Carpenter Date: Mon Apr 10, 2000 9:17am Subject: Re: normal procedure Seem's like I've been an argument over this before, but I'd still like to hear input from others in the business. We've had instances over the years when after finding a tap, the client wanted it left alone for self serving reasons. In these instances it was either a domestic dispute/divorce or corporate espionage situation. In any event, the taps were illicitly placed. Therefore they were being left on the line to either place surveillance on the tap to catch the party, or to launch a disinformation campaign. My take on it has always been that Texas is a one party consent state and the owner of the line now knows the conversation is being monitored therefore he or she is now the one party. Basically then we have no Complainant so there are no charges to be filed. Secondly, regardless of the situation, it's not my phone line so I have no formal standing to make a complaint or be a Complainant. I know there are others out there that are hard core "you must report it." Any opinions? Dawn Star wrote: > Message: 2 > Date: Thu, 6 Apr 2000 20:20:44 -0400 > From: "Andre Holmes" <1ach@g...> > Subject: Re: > > Roger wrote I busted a bunch of wiretaps question Roger did you report your > findings to the FBI when you first discovered the taps I believe thats the > normal procedure that is to report all findings on telcowiring period. > -----Original Message----- > From: Dawn Star > To: TSCM-L@onelist.com > Date: Thursday, April 06, 2000 11:44 AM > Subject: [TSCM-L] > > Sure, I called them up and said " I just busted a bunch of your wiretaps so why don't you come on down to my office and arrest me and charge me with obstruction of justice and conspiracy" Let me tell you, it ain't no joke when you sitting across the table from the F.B.I., D.E.A., I.R.S criminal, and United States Customs and they want to know why their taps aren't playing music anymore! Roger > > [Non-text portions of this message have been removed] > > ------------------------------------------------------------------------ > Get a NextCard Visa, in 30 seconds! > 1. Fill in the brief application > 2. Receive approval decision within 30 seconds > 3. Get rates as low as 2.9% Intro or 9.9% Fixed APR > Apply NOW! > http://click.egroups.com/1/2646/0/_/507420/_/955237810/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- *Trace Carpenter *2926 Maple Ave., Ste. 200 *Dallas, Texas 75201 *214.828.4520; 214.740-0112 Facsimile *Because the fly on the wall might not be the only bug in the room.ô 177 From: Jordan Ulery Date: Mon Apr 10, 2000 9:03am Subject: Re: normal procedure In a one party state you are likely ok. In a two party state you had better read the law. If it is like NH the law states clearly that any type of device is illegal sans court order. In addition, NH law requires the reporting of felonies (wire taping is a felony) so you are SOL trying to hide the device; you are mandated to report. Trace Carpenter wrote: > Seem's like I've been an argument over this before, but I'd still like to hear input from others in the business. > > We've had instances over the years when after finding a tap, the client wanted it left alone for self serving reasons. In these instances it was either a domestic dispute/divorce or corporate espionage situation. In any event, the taps were illicitly placed. Therefore they were being left on the line to either place surveillance on the tap to catch the party, or to launch a disinformation > campaign. My take on it has always been that Texas is a one party consent state and the owner of the line now knows the conversation is being monitored therefore he or she is now the one party. Basically then we have no Complainant so there are no charges to be filed. Secondly, regardless of the situation, it's not my phone line so I have no formal standing to make a complaint or be a > Complainant. I know there are others out there that are hard core "you must report it." > > Any opinions? > > Dawn Star wrote: > > > Message: 2 > > Date: Thu, 6 Apr 2000 20:20:44 -0400 > > From: "Andre Holmes" <1ach@g...> > > Subject: Re: > > > > Roger wrote I busted a bunch of wiretaps question Roger did you report your > > findings to the FBI when you first discovered the taps I believe thats the > > normal procedure that is to report all findings on telcowiring period. > > -----Original Message----- > > From: Dawn Star > > To: TSCM-L@onelist.com > > Date: Thursday, April 06, 2000 11:44 AM > > Subject: [TSCM-L] > > > > Sure, I called them up and said " I just busted a bunch of your wiretaps so why don't you come on down to my office and arrest me and charge me with obstruction of justice and conspiracy" Let me tell you, it ain't no joke when you sitting across the table from the F.B.I., D.E.A., I.R.S criminal, and United States Customs and they want to know why their taps aren't playing music anymore! Roger > > > > [Non-text portions of this message have been removed] > > > > ------------------------------------------------------------------------ > > Get a NextCard Visa, in 30 seconds! > > 1. Fill in the brief application > > 2. Receive approval decision within 30 seconds > > 3. Get rates as low as 2.9% Intro or 9.9% Fixed APR > > Apply NOW! > > http://click.egroups.com/1/2646/0/_/507420/_/955237810/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > -- > *Trace Carpenter > *2926 Maple Ave., Ste. 200 > *Dallas, Texas 75201 > *214.828.4520; 214.740-0112 Facsimile > *Because the fly on the wall might not be the only bug in the room.ô > > ------------------------------------------------------------------------ > GET A NEXTCARD VISA, in 30 seconds! Get rates as low as 2.9% > Intro or 9.9% Fixed APR and no hidden fees. Apply NOW! > http://click.egroups.com/1/936/0/_/507420/_/955376273/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 178 From: Trace Carpenter Date: Mon Apr 10, 2000 10:57am Subject: Re: normal procedure That's been my take on it. If I believed that the device was legally placed and the disinformation campaign was being launched against law enforcement, then of course I would have more concerns. However when you find a regular speed recorder hooked to a Radio Shack parallel switch hidden in the attic it's doubtful :>) Jordan Ulery wrote: > In a one party state you are likely ok. In a two party state you had better read the law. If it is like NH the law states clearly that any type of device is illegal sans court order. In addition, NH law requires the reporting of felonies (wire taping is a felony) so you are SOL trying to hide the device; you are mandated to report. > > Trace Carpenter wrote: > > > Seem's like I've been an argument over this before, but I'd still like to hear input from others in the business. > > > > We've had instances over the years when after finding a tap, the client wanted it left alone for self serving reasons. In these instances it was either a domestic dispute/divorce or corporate espionage situation. In any event, the taps were illicitly placed. Therefore they were being left on the line to either place surveillance on the tap to catch the party, or to launch a disinformation > > campaign. My take on it has always been that Texas is a one party consent state and the owner of the line now knows the conversation is being monitored therefore he or she is now the one party. Basically then we have no Complainant so there are no charges to be filed. Secondly, regardless of the situation, it's not my phone line so I have no formal standing to make a complaint or be a > > Complainant. I know there are others out there that are hard core "you must report it." > > > > Any opinions? > > > > Dawn Star wrote: > > > > > Message: 2 > > > Date: Thu, 6 Apr 2000 20:20:44 -0400 > > > From: "Andre Holmes" <1ach@g...> > > > Subject: Re: > > > > > > Roger wrote I busted a bunch of wiretaps question Roger did you report your > > > findings to the FBI when you first discovered the taps I believe thats the > > > normal procedure that is to report all findings on telcowiring period. > > > -----Original Message----- > > > From: Dawn Star > > > To: TSCM-L@onelist.com > > > Date: Thursday, April 06, 2000 11:44 AM > > > Subject: [TSCM-L] > > > > > > Sure, I called them up and said " I just busted a bunch of your wiretaps so why don't you come on down to my office and arrest me and charge me with obstruction of justice and conspiracy" Let me tell you, it ain't no joke when you sitting across the table from the F.B.I., D.E.A., I.R.S criminal, and United States Customs and they want to know why their taps aren't playing music anymore! Roger > > > > > > [Non-text portions of this message have been removed] > > > > > > ------------------------------------------------------------------------ > > > Get a NextCard Visa, in 30 seconds! > > > 1. Fill in the brief application > > > 2. Receive approval decision within 30 seconds > > > 3. Get rates as low as 2.9% Intro or 9.9% Fixed APR > > > Apply NOW! > > > http://click.egroups.com/1/2646/0/_/507420/_/955237810/ > > > ------------------------------------------------------------------------ > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > -- > > *Trace Carpenter > > *2926 Maple Ave., Ste. 200 > > *Dallas, Texas 75201 > > *214.828.4520; 214.740-0112 Facsimile > > *Because the fly on the wall might not be the only bug in the room.ô > > > > ------------------------------------------------------------------------ > > GET A NEXTCARD VISA, in 30 seconds! Get rates as low as 2.9% > > Intro or 9.9% Fixed APR and no hidden fees. Apply NOW! > > http://click.egroups.com/1/936/0/_/507420/_/955376273/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > ------------------------------------------------------------------------ > LOW RATE, NO WAIT! > Get a NextCard Visa, in 30 seconds! Get rates > as low as 2.9% Intro or 9.9% Fixed APR and no hidden fees. > Apply NOW! > http://click.egroups.com/1/2122/0/_/507420/_/955379015/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- *Trace Carpenter *2926 Maple Ave., Ste. 200 *Dallas, Texas 75201 *214.828.4520; 214.740-0112 Facsimile *Because the fly on the wall might not be the only bug in the room.ô 179 From: James M. Atkinson, Comm-Eng Date: Mon Apr 10, 2000 11:56am Subject: Re: normal procedure [Soap Box Mode ON] Ouch, Ouch, Ouch, Let me repeat myself: I doesn't matter which state you are in... If you find a bug, wiretap, etc it is critical that you immediately involve some level of law enforcement. The sale, possession, use, exploitation, etc of such things is illegal UNDER FEDERAL LAW (state law be damned), and failure to inform law enforcement makes you liable for federal obstruction of justice charges. However, If the suspect device is a tracking device (operating under its own power), or a video camera (also operating under its own power, and without an audio circuit) then you may or may not need to contact law enforcement. If it is an audio, telephone, TTY, computer, or related intercept device (or software) then you and the FBI need to talk. If you value your freedom (some don't) , then you will FORMALLY notify a law enforcement agency if you find a *** KNOWN *** bug or wiretap, period. If you have thought to the contrary I would STRONGLY encourage you to contact AUSA Mary Jo White (in writing) or Janet Reno and formally ask "her thoughts" on the subject. If you ask your attorney for advise in this matter make you you get his opinion in writing, and that he will defend you in a criminal case at no charge in the future. Also, if a law enforcement agency claims that "it is one of theirs" ask for the name of the Judge, court of jurisdiction, and the docket/case number so that you can be formally placed under a protective order. Of course if the interception is not court ordered, they will refuse to provide such information (which is a clue it is an illegal wiretap), and you should immediately contact the FBI or local U.S Attorneys office ASAP. Please, for your own sake, do not try to be cute... you will only get hurt. -jma [Soap Box Mode OFF] At 10:03 AM -0400 4/10/00, Jordan Ulery wrote: >In a one party state you are likely ok. In a two party state you >had better read the law. If it is like NH the law states clearly >that any type of device is illegal sans court order. In addition, >NH law requires the reporting of felonies (wire taping is a felony) >so you are SOL trying to hide the device; you are mandated to report. > >Trace Carpenter wrote: > > > Seem's like I've been an argument over this before, but I'd still >like to hear input from others in the business. > > > > We've had instances over the years when after finding a tap, the >client wanted it left alone for self serving reasons. In these >instances it was either a domestic dispute/divorce or corporate >espionage situation. In any event, the taps were illicitly placed. >Therefore they were being left on the line to either place >surveillance on the tap to catch the party, or to launch a >disinformation > > campaign. My take on it has always been that Texas is a one >party consent state and the owner of the line now knows the >conversation is being monitored therefore he or she is now the one >party. Basically then we have no Complainant so there are no >charges to be filed. Secondly, regardless of the situation, it's >not my phone line so I have no formal standing to make a complaint >or be a > > Complainant. I know there are others out there that are hard >core "you must report it." > > > > Any opinions? > > > > Dawn Star wrote: > > > > > Message: 2 > > > Date: Thu, 6 Apr 2000 20:20:44 -0400 > > > From: "Andre Holmes" <1ach@g...> > > > Subject: Re: > > > > > > Roger wrote I busted a bunch of wiretaps question Roger did you >report your > > > findings to the FBI when you first discovered the taps I >believe thats the > > > normal procedure that is to report all findings on telcowiring period. > > > -----Original Message----- > > > From: Dawn Star > > > To: TSCM-L@onelist.com > > > Date: Thursday, April 06, 2000 11:44 AM > > > Subject: [TSCM-L] > > > > > > Sure, I called them up and said " I just busted a bunch of your >wiretaps so why don't you come on down to my office and arrest me >and charge me with obstruction of justice and conspiracy" Let me >tell you, it ain't no joke when you sitting across the table from >the F.B.I., D.E.A., I.R.S criminal, and United States Customs and >they want to know why their taps aren't playing music anymore! >Roger =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 180 From: William L. McCrory Date: Mon Apr 10, 2000 10:36am Subject: Re: normal procedure Talk with your attorney. If he or she isn't practicing criminal law, you may want to talk with one who is, and find out what your criminal liability could be under state and federal laws. Consider that if you leave an illegal interception in place, you may well be an accessory after the fact, aiding and abetting a felony, or committing misprision of felony. If your TSCM practice requires you to have a license issued by your state, have your attorney explain any reporting obligations that may attach to having the license. Again, check with your attorney to better understand what may be required of you in your state. One-party consent can only be given by one who is lawfully a party to the conversation being intercepted. Ownership of the line does not automatically convey the right to intercept the conversations of two or more non-consenting parties. In some business settings, employees have signed documents acknowledging that they have been told that their telephone conversations may be monitored, but that does not sound like the case here. Ownership of the line does not affect your standing to "make a complaint." If you know a crime has been committed, either federal or state, you have every right to report it. You are a witness, not a victim. Trace Carpenter wrote: > Seem's like I've been an argument over this before, but I'd still like > to hear input from others in the business. > > We've had instances over the years when after finding a tap, the > client wanted it left alone for self serving reasons. In these > instances it was either a domestic dispute/divorce or corporate > espionage situation. In any event, the taps were illicitly placed. > Therefore they were being left on the line to either place > surveillance on the tap to catch the party, or to launch a > disinformation > campaign. My take on it has always been that Texas is a one party > consent state and the owner of the line now knows the conversation is > being monitored therefore he or she is now the one party. Basically > then we have no Complainant so there are no charges to be filed. > Secondly, regardless of the situation, it's not my phone line so I > have no formal standing to make a complaint or be a > Complainant. I know there are others out there that are hard core > "you must report it." > > Any opinions? > > Dawn Star wrote: > > > Message: 2 > > Date: Thu, 6 Apr 2000 20:20:44 -0400 > > From: "Andre Holmes" <1ach@g...> > > Subject: Re: > > > > Roger wrote I busted a bunch of wiretaps question Roger did you > report your > > findings to the FBI when you first discovered the taps I believe > thats the > > normal procedure that is to report all findings on telcowiring > period. > > -----Original Message----- > > From: Dawn Star > > To: TSCM-L@onelist.com > > Date: Thursday, April 06, 2000 11:44 AM > > Subject: [TSCM-L] > > > > Sure, I called them up and said " I just busted a bunch of your > wiretaps so why don't you come on down to my office and arrest me and > charge me with obstruction of justice and conspiracy" Let me tell > you, it ain't no joke when you sitting across the table from the > F.B.I., D.E.A., I.R.S criminal, and United States Customs and they > want to know why their taps aren't playing music anymore! Roger > > > > [Non-text portions of this message have been removed] > > > > > ------------------------------------------------------------------------ > > > Get a NextCard Visa, in 30 seconds! > > 1. Fill in the brief application > > 2. Receive approval decision within 30 seconds > > 3. Get rates as low as 2.9% Intro or 9.9% Fixed APR > > Apply NOW! > > http://click.egroups.com/1/2646/0/_/507420/_/955237810/ > > > ------------------------------------------------------------------------ > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > -- > *Trace Carpenter > *2926 Maple Ave., Ste. 200 > *Dallas, Texas 75201 > *214.828.4520; 214.740-0112 Facsimile > *Because the fly on the wall might not be the only bug in the room.ô > > > ----------------------------------------------------------------------- > > ----------------------------------------------------------------------- > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS From: James M. Atkinson, Comm-Eng Date: Sat Apr 7, 2001 8:42pm Subject: Spying game is still played by the old rules Bush's China crisis Spying game is still played by the old rules http://www.observer.co.uk/focus/story/0,6903,470293,00.html Nigel West explains how the Cold War mentality survived the collapse of communism Special report: China Special report: George Bush's America Sunday April 8, 2001 The Observer During the Cold War, 1985 became known as 'The Year Of The Spy' because of the peak in espionage activity: it included Aldrich Ames's offer to sell secrets to the Soviet Union and the exfiltration from Moscow of Oleg Gordievsky, MI6's long-term mole inside the KGB. This year looks set to match 1985, with the exposure in Washington DC of FBI counter-intelligence expert Robert Hanssen; the expulsion of dozens of Russian and American diplomats accused of spying, after the defection of two senior officers of Russia's Foreign Intelligence Service, the SVR, in New York and Ottawa; and the seizure in China of a US Navy EP-3 reconnaissance aircraft. In addition, an American was convicted of espionage in Moscow and then freed, while a Russian ex-diplomat accused of working for the British was given a hefty prison sentence. Cold War rivalries have never properly evaporated: it takes longer than a decade for Russian, Chinese and US military mindsets to shake off the culture of superpower confrontation. There is a paradox in the new era of close co-operation in fighting organised crime, people smugglers, the drug cartels and the money-launderers. Some of the conventional intelligence targets may have changed, with a greater emphasis on terrorism, nuclear proliferation and economic intelligence, but the SVR continued to maintain clandestine contact with Hanssen long after its monolithic predecessor, the KGB, had been dismantled, and the US National Security Agency persists in operating electronic intelligence (elint) flights along China's coast. The loss of the EP-3 is reminiscent of the capture of another elint platform, the USS Pueblo, by North Korea in 1968. Clearly the espionage game has been largely unaffected by the geopolitical changes that have occurred since Boris Yeltsin suppressed the August 1992 coup mounted by the former KGB chairman, Vladimir Kryuchkov. Actually, as a sign of his rehabilitation after only the briefest term in prison, Kryuchkov's birthday party last December was attended by President Vladimir Putin, and the Kremlin is appointing former KGB stalwarts to important public positions. The Russians and the Chinese recognise that in any period of military cutback the need for intelligence becomes greater, with even a minor technological breakthrough, perhaps in the fields of laser weaponry or anti-ballistic missile systems, being of critical importance. Hence the need for the dramatic increase in technical and industrial espionage. Evidently the CIA was anxious to learn about a new, phenomenally high-speed Russian torpedo; the Chinese acquired details of a new American atomic weapon design from Los Alamos; and the SVR penetrated the heart of the FBI's citadel of counter-intelligence. Plus Áa change. All sides deploy much the same tradecraft and are guided by a single certainty: that good intelligence can deter aggression, forestall surprises and also prevent bloodshed. . Secret society: why is the Government so frightened of the truth? An RSA debate in association with The Observer. Thursday, 12 April 2001 at 6.30pm, RSA, 8 John Adam Street, London WC2N 6EZ. Doors open 6pm. Admission free, but to reserve tickets call 020 7451 6868. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2883 From: James M. Atkinson, Comm-Eng Date: Sat Apr 7, 2001 8:46pm Subject: Spy laptop safety no longer mission impossible Spy laptop safety no longer mission impossible http://www.excite.co.uk/news/story/UKOnlineReportTopNews/IIMFFH54838_2001-04-08_00-48-00_B135808 08/04/01 01:48 By Sinead O'Hanlon LONDON (Reuters) - Spies and security service staff will be issued with high-tech James Bond style briefcases after a spate of embarrassing bungles in which agents have lost official secrets, the Ministry of Defence has said. A ministry spokesman told Reuters 15,000 thief-proof briefcases had been ordered at a cost of 1,000 pounds each after it emerged security service and armed forces staff had lost 204 laptops since 1997. "It got to the point where these things seemed to be disappearing every week and it was an embarrassment." Many of the briefcases will be fitted with gadgets more familiar to fans of British agent 007 or the "Mission Impossible" television series than the average civil servant. As well as being able to withstand high explosives, the cases will be fitted with a "self- destruct" mechanism to wipe the laptop's hard drive if a thief tries to open the case, the spokesman said. Only a fraction of the briefcase losses have been made public but the few that were have embarrassed British security services. In November an agent for MI5, the domestic intelligence service, left a briefcase full of secret documents on a train. In May a military laptop - believed to contain details of a warplane project with the United States - was stolen from a naval intelligence officer at a train station. The previous March there were reports that two agents - one from MI5 and the other from Britain's overseas security service MI6 - had lost laptops containing secret information. The MI5 laptop, said to contain confidential information on Northern Ireland, was also snatched at a train station. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2884 From: Aimee Farr Date: Sat Apr 7, 2001 9:00pm Subject: IAAL Introduction My name is Aimee Farr, and "I Am A Lawyer," hereinafter referred to as "IAAL," and incorporated herein for all purposes. BIO/STATEMENT OF PRACTICE (using the "Fairy Tale" sanitization/redaction method): Once upon a time, "Cinderella Lawyer" was trapped in small law practice with her kind, but fuddy-duddy lawyer-father and his evil step-secretary. She was miserable! She was forced to do menial, boring legal work. "Oh, I am so miserable!" she cried. Then, in a "magical moment," her Fairy Lady Justice appeared, and waved her magic scales over Cinderella Lawyer, sprinkling law-dust of intelligence, data-protection, privacy law, and things-she-never-knew-existed. Extremely puzzled, she met two little mice named Gus and Jack, was given a pair of glass slippers, took a spin in a pumpkin, and danced with Prince Charming Clientele. I appreciate the courtesy extended to me to join this list, and I give the most weighty consideration to confidentiality concerns in your correspondence, offlist and on. Furthermore, I look forward to looking up new acronyms. [X] YES! Please send me my complimentary tinfoil hat. [FN1] [_] No. Please do not scare me at this time. [FN1] The archives indicate a high tolerance-level for profession-orientated humor. _SEE_ EXHIBIT A: From: "James M. Atkinson, Comm-Eng" Date: Thu Apr 5, 2001 2:49pm Subject: Hell Bound Lawyer. *laughter* Respectfully submitted, ~Aimee Law Office of Aimee E. Farr 5400 Bosque, Suite 675 Waco, Texas 76710-4418 T: 254.751.0030 F: 254.751.0963 E: mailto:aimee.farr@p... Outlook/Lotus click-to Contacts: http://my.infotriever.com/aimeefarr 2885 From: =wampyr= Date: Sun Apr 8, 2001 8:45am Subject: U.S. Surveilance plane down Do any listmembers have any opinions or uncommon information reguarding the 24 servicemen being held in china? This standoff situation makes me sort of tense as I see china as one of the few actual threats globaly. == Those that travel long distances in isolation will defend themselves with strange arts. Shin shin, shin gan. The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. _____________________________________________________________ Yourname@i...
When you want them to remember!
http://burn.inhell.com 2886 From: Craig Date: Mon Apr 9, 2001 9:21pm Subject: FYI hI.. Long time lurker - so this is my first post found this neat hardware.. http://www.optoelectronics.com/ds1000.htm 2887 From: Robert G. Ferrell Date: Tue Apr 10, 2001 7:36am Subject: Re: FYI >http://www.optoelectronics.com/ds1000.htm Hmmm. Might be fun to take one of those onboard next time you fly (plugged into your laptop), just to see what kind of digital RF profile it would generate. I would think the differences between at the gate (cell phones allowed), during takeoff/landing (no passenger electronics), and inflight (laptops but no personal cell phones) would be especially revealing. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2888 From: Date: Tue Apr 10, 2001 9:00pm Subject: Jiang Pushes For Apology April 10 ≠ Both President Bush and China's President Jiang had comments on the stalemate over the U.S. spy plane. NBC's Jim Miklaszewski reports. Bush urges patience, but demands release of crew again MSNBC STAFF AND WIRE REPORTS April 10 ≠ Chinese President Jiang Zemin said Tuesday that he trusts in the ability of China and the United States to end their impasse over the spy plane collision, but reiterated his standing demand for an apology. "Taking into the account the important role of the two countries, we have to find a solution," Jiang said at a news conference in Uruguay, his third stop on a six-nation Latin American tour. April 10 ≠ President Bush is getting plenty of unsolicited advice on what to do if the Americans are not released soon, but the options come with lots of baggage. NBC's Andrea Mitchell reports. AT ONLY his second news briefing since opening the trip last Thursday in Chile, Jiang said China's position was "sufficiently clear" as he stood by demands that the United States apologize for the downing of the Chinese jet April 1. The pilot is missing and feared dead. Jiang's response to a question about the stalemate was terse. When asked what the key to finding a way out was, he alluded to his repeated demands for a U.S. apology. "Our position on this issue is sufficiently clear," said Jiang, adding that he had already spoken about China's demands during his last news conference, Thursday in Santiago, Chile. In Washington, President Bush counseled patience in the standoff, saying "diplomacy sometimes takes a little longer than people would like" but also again demanding the U.S. crew's release. For the second straight day, Bush appeared to be preparing Americans for the possibility that the diplomatic standoff with China could drag on. Simultaneously, he again called on Beijing to release the crew and hinted at the consequences of a failure to do so. "The longer this goes, the more likely it is that it could ≠ could ≠ jeopardize relations," Bush said. "And we certainly don't want that to happen. Earlier in the day, China's Foreign Ministry shrugged off Bush's warning Monday that relations could be damaged by the stalemate over the U.S. spy plane and its crew, but it called a U.S. expression of sorrow over a Chinese fighter pilot's apparent death a "step in the right direction." INCREASED POLITICAL PRESSURE Bush's plea for patience came amid increased pressure from both ends of the political spectrum to bring the 24-member crew home without major capitulation to China. The president also was confronted by a politically tricky offer by the Rev. Jesse Jackson to visit China to try to win the crew's release. The president sidestepped a question about whether he would endorse a Jackson mission to China. U.S.-China face offïLatest newsïWashPost: Detainees develop a routineïNewsweek: Special reportïNewsweek: Crash in cloudsïCrew of the U.S. planeïOpinions: Diplomacy tipsïChina's military: MSNBC special reportïNBC: Was pilot top gun?ïInteractive: China's militaryïWhat's your opinion? Sound off on our BBS "I appreciate the good will of a lot of Americans who are concerned about our folks on Hainan island," Bush said, shortly after being briefed on a fifth meeting between U.S. diplomats and the crew members. "This administration is doing everything it can ... to end the situation in an efficient way." Earlier, Secretary of State Colin Powell said he had phoned the leader of the Chicago-based Rainbow/PUSH Coalition and told him that while the administration appreciates his offer of help, it will continue to work through diplomatic channels. Jackson, however, indicated he still intends to go to China if given permission. "The point is to get a solution and not leave our soldiers there as trophies," said Jackson, who has previously helped free American prisoners in Syria, Iraq and Yugoslavia. Powell planned to go ahead Tuesday with a trip to Europe, including a stop in Paris, on his way to the Balkans. He will keep in close touch with Bush and other top advisers, State Department spokesman Richard Boucher said. U.S. PLANE ON AUTOPILOT? Should Congress move to block China's entry into the World Trade Organization? Yes. No. Vote to see results Even as the diplomatic efforts continued apace, Pentagon officials on Tuesday were leaking details of the April 1 collision between the U.S. spy plane and a Chinese fighter jet that amounted to the strongest challenge yet to Beijing's account. Senior Pentagon officials who spoke to The Associated Press on condition of anonymity quoted a State Department cable reporting the pilot said the plane was on autopilot at the time of the collision. Officials offered this new information as more proof for their argument that the U.S. spy plane was flying straight and steady, not deviating in speed, altitude or direction. China has said the U.S. plane swerved into the fighter jet. A Pentagon official speaking on condition of anonymity also said the crew has reported that the Chinese jet made two close passes ≠ coming within a few feet of the U.S. plane ≠ before the collision. The pilot of a second Chinese fighter who witnessed the accident has said the pilot of the Navy plane caused the accident by suddenly swerving into the path of the jets. ï'Hardball' at 5 p.m. ET U.S.-China standoff with former Secretary of State Henry Kissinger. In Beijing Tuesday, Chinese Foreign Ministry spokesman Sun Yuxi shrugged off Bush's warning that the standoff was jeopardizing U.S.-Chinese relations. "I hope the U.S. side will not further complicate the issue," he said at a news briefing, adding that China hoped the United States would adopt a "positive and cooperative attitude." Sun had positive words for Powell's statement over the weekend that Washington was "sorry" that the Chinese pilot apparently had been killed as a result of the collision. The collision led to the emergency landing of the American EP-3E on China's Hainan Island, where it and its crew remain as the two nations attempt to negotiate and end to the incident. "The expression of 'sorry' is a step in the right direction, but we don't think this issue is fully solved," Sun said. "We still urge the U.S. to take a positive attitude and take the stance of the Chinese side seriously." Chinese President Jiang spokesman said Monday that U.S. expressions of remorse have so far been "unacceptable." 'PRONOUNCEMENTS ... ARE UNACCEPTABLE' "Where is the responsibility? I think it's very clear," said Zhu Bangzao, a senior Chinese Foreign Ministry official who also acts as Jiang's spokesman, said when peppered with questions at a news briefing in Buenos Aires. "The pronouncements of the United States are unacceptable to the Chinese people." Talks aimed at resolving the impasse have centered on Beijing's demand for a U.S. apology for the accident. Bush administration officials have refused to issue a formal apology, saying the spy plane was on a routine reconnaissance flight in international airspace and suggesting the collision was the fault of the Chinese pilot, who remains missing after his plane went down at sea. FIFTH MEETING WITH CREW Advertisement Meanwhile, U.S. diplomats led by U.S. Brig. Gen. Neal Sealock met with crew members for the fifth time on Tuesday night, the 10th day of the crew's detention, on China's Hainan island. Sealock said the detained crew members remain in high spirits and were exercising and getting regular news reports and e-mails from home. Privately, U.S. officials say they are making progress in talks with China aimed at securing the crew's freedom and return of the spy plane, though they concede that the release of the American fliers is probably not imminent. That opinion is bolstered by the view of many observers in China, who say that no resolution will occur before the search for the missing pilot, Wang Wei, is officially declared to be over. SEARCH FOR PILOT INTENSIFIES All indications are that such a declaration is at least several days away. In recent days, China has stepped up its search for Wang and his F-8 fighter. State media said Tuesday that 4,000 Hainan residents combed beaches with flashlights ≠ joining hundreds of military and fishing vessels and at least 70 planes in the search. A waiting game could prove troublesome for Bush, whose comments counseling patience apparently were aimed at conservatives who have stepped up their anti-China rhetoric and begun to question Bush's handling of the situation. Criticism of Bush's go-slow approach also has begun to surface outside his party. Printable version Democratic Sen. Robert Torricelli of New Jersey asked Monday "whether it is appropriate to have both an ambassador and hostages in the same country." Polls show voters support Bush's leadership on China, but senior Republicans said the goodwill could erode if the standoff continues. U.S. OFFICIALS SEE EVENTUAL SOLUTION Despite the signs of impatience, U.S. officials continue to insist they are not overly concerned by hard-line public comments by the Chinese and indicate that they still expect an eventual solution to emerge from proposed language already on the table. "This is just a case of the Chinese trying to get more and us pushing back and saying this is the best we can do," one U.S. official told NBC's Andrea Mitchell. A senior U.S. administration official, briefed on the talks, said negotiations were slowly moving closer to a way to release the crew. Another said advances were minuscule Monday, after rapid progress late last week. Efforts to end the crisis appeared to hinge on a choice of words in a communiquÈ being drafted that would allow a face-saving way out for both Bush and Jiang. Negotiations were delicate, but officials said over the weekend that talks focused on three major points: Neither side would accept responsibility, the plane and the crew would be released and a standing joint commission on maritime safety would investigate the collision. NBC News' Kevin Tibbles in Haikou; Jim Maceda in Hong Kong; Andrea Mitchell, Jim Miklaszewski, Betsy Steuart, Robert Windrem and Campbell Brown in Washington; The Associated Press; and Reuters contributed to this report. HAVE A GREAT DAY !!! 2889 From: Date: Tue Apr 10, 2001 9:12pm Subject: Detainees Develop A Routine Detainees develop a routine U.S. crew staying in military guesthouse in red-light district A view of the command center at the People's Liberation Army South China Naval and Airforce base in Haikou on China's Hainan Island. By Philip P. Pan THE WASHINGTON POST HAIKOU, China, April 9 ≠ The Nanhang No. 1 Guesthouse is operated by the Chinese navy here, just off a raucous street lined with beer gardens, brothels and discos. For much of the past nine days, it has also been home to 24 American crew members detained by the Chinese military when their surveillance plane made an emergency landing on Hainan Island. The complex stands in one of this provincial capital's many red-light districts. A light breeze carries laughter and music from a nearby beer garden through the hot, humid air. ACCORDING TO U.S. officials, the crew members can watch Chinese television and read the China Daily, a state-run English-language newspaper that has published attacks on them as well as on the United States. They pass the time with card games, paperback novels and crossword puzzle magazines provided by U.S. diplomats allowed to visit them. Chinese officials here have provided no information on the detained fliers or their quarters. But a sketchy picture of their confinement emerges from the U.S. diplomats. The detained Americans are staying two to a room, they say, except for the three female crew members, who share a room, and the commander, identified by a Pentagon official as Lt. Shane Osborn of Norfolk, Neb., who has his own quarters. TOGETHER AT MEALS Guards bring them together for meals, Chinese cuisine that some of the detainees have described as excellent. Others complained of indigestion and needed Pepto-Bismol. More Post coverageïDetainees Develop a RoutineïBush Emphasizes Toll on U.S.-China RelationsïTaiwan Says Plane Shouldn't Affect Sales The crew pores through e-mail printouts from friends and relatives that the Chinese authorities have agreed to pass on. And every night, they look forward to news during a visit from Army Brig. Gen. Gratton O. "Neal" Sealock II, who heads a team of U.S. diplomats here working to ensure the crew's safety and comfort as talks to free them continue in Washington and Beijing. Nine days after the Navy plane collided with a Chinese fighter jet over the South China Sea, Sealock and a senior U.S. consular officer, Ted Gong, met for a fourth time tonight with crew members. After the 40-minute session, Sealock reported the crew was in "extremely high spirits" and staying in clean rooms in a "hotel environment, not anything close to anything below that." "That includes things like air conditioning. . . . They've been able to clean their uniforms and do all those sorts of things. They're being well taken care of," he said. NEARBY BEER GARDEN Western journalists have twice seen vehicles carrying Sealock and Gong entering and leaving the gate of the inn, which is operated by the Chinese navy's South Sea Fleet Air Force and sits adjacent to other military facilities. Beyond the gate stands what looks like a five-story hotel with curtains drawn at almost every window. The complex stands in one of this provincial capital's many red-light districts. A light breeze carries laughter and music from a nearby beer garden through the hot, humid air. Young women in tight clothing ask strangers to sit and chat; men without shirts lounge around in sidewalk restaurants. A neon sign above a nearby bar declares in English, "Cowboys, cowgirls, welcome." The compound appears lightly guarded, but residents said they have seen bursts of security activity in recent days, including large numbers of undercover police. The guesthouse used to accept reservations from the public, but operators there now hang up abruptly when callers inquire about rooms. Chinese officials took Sealock and Gong directly to the guesthouse tonight, a sign of progress in their push for improved access to the crew. Previously, the U.S. diplomats were required to attend a meeting at the offices of the Hainan provincial government to discuss ground rules for the visits. Advertisement The process has been frustrating. The diplomats are unclear why, but all four meetings have occurred at night. They have come to expect a late-night phone call in their hotel rooms. A Chinese functionary tells them to be ready in 15 minutes. Nothing happens for an hour. Then the phone rings again: Be downstairs in 10 minutes. Negotiations over ground rules take place in a conference room lined with gifts from various visiting delegations to Hainan, including one from California. Five Chinese officials usually attend, led by Fan Zhenshui, deputy director general of the Foreign Ministry's consular department. PAINSTAKING DETAILS The meetings usually include some posturing, with Chinese officials charging that the U.S. plane entered Chinese airspace illegally, for example. But it appears the Chinese officials at the table lack full decision-making power. They often ask for breaks, apparently to call higher-ups for guidance. Every detail must be negotiated. How much time will Sealock have with the crew? How many crew members will he be permitted to see? Will he be able to pass along the Snickers bars and M&Ms he purchased for them? The back-and-forth, all of which is slowly translated and transcribed, can take more than three hours and often stretches past midnight. Sealock usually offers the U.S. government's help with the Chinese investigation into the collision. He has also been pressing for "unfettered access" to the crew in the form of regular, twice-daily visits, but the Chinese have not responded. Still, the situation has gradually improved. During the first meeting with the crew, Chinese officials monitored the discussion, tried to stop Sealock from asking about the collision and refused to let him meet individually with crew members. But Sealock and Gong have been allowed to see crew members without supervision beginning with the second meeting, when they met with the entire crew and then with three crew members separately: the pilot, the youngest enlisted man and one of the women. In the third meeting, the Chinese allowed the envoys to see only eight crew members; no explanation has been made public. Tonight, they met with the entire crew again. The meetings usually take place in what appears to be a classroom. Dressed in their flight suits, the crew members listen as Sealock updates them on the negotiations, offers encouragement and passes on messages from President Bush and the latest sports scores. He and Gong inquire about their health and comfort and answer questions. Sealock, 52 ñ an Army general from a military family who serves as the U.S. Embassy's defense attache and has studied Chinese ñ is the crew's primary contact with the United States. For him, colleagues say, the job is as much about making sure the Chinese are treating the Americans well as it is about assuring them that Washington will not forget about them. Sealock dresses in his Army greens when he goes to meet the crew. When he returns, he delivers a brief statement to reporters and then goes upstairs to call Washington. Sitting on his bed in his hotel room, he calls the White House on his mobile phone and briefs Bush directly. "Makes you feel real proud," Sealock told the president after an hour-long session with the crew on Friday night. "They look good." During the day, Sealock stays out of sight, working in a hotel room that his team uses as a command center and consulting regularly with U.S. Ambassador Joseph W. Prueher in Beijing. The diplomats take occasional shopping trips to buy clothing, toiletries, snacks, cigarettes, reading materials and contact lens solution, all of which they pass on to Chinese officials for the crew. The Chinese officials refuse to let Sealock or Gong give anything to the crew members directly, insisting on inspecting everything first, including the e-mail from families. © 2001 The Washington Post Company HAVE A GREAT DAY !!! ---------- http://www.msnbc.com/news/557206.asp [Non-text portions of this message have been removed] 2890 From: Phillip H. Waters Date: Tue Apr 10, 2001 0:32pm Subject: Fuzzy Wuzzy was a Spy Fuzzy Wuzzy Was a Spy : A new high-tech stuffed bear developed by two German organizations, dubbed Telebuddy, looks like a trade show handout but could conceivably be used as a peeping teddy. As described in Technology Review, a publication of the Massachusetts Institute of Technology, Telebuddy houses a camera, a microphone, speakers, and robotics, "all linked via radio to a local computer connected to the Web." Someone back at the office can be the beneficiary of the virtual eyes and ears of Telebuddy. It's billed as a convenience--with no mention of espionage. From ASIS Online - www.securitymanagement.com 2891 From: Paolo Sfriso Date: Wed Apr 11, 2001 1:48am Subject: Tech info on rome bombing Dear Collegues. FYI the recent (04.30hrs April 10th, 2001) terrorist bombing in Rome carried out by a splinter group of the "Brigate Rosse" (Red Brigades) involved the following "technical innovations". 1) The bomb was actually set off by a cellphone triggered remote control. 2) Revendication was carried out by e-mail sent to a number of Italian newspapers. Both seem to be first-time tactics. Your Italian Connection Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 paulsfriso@t... www.grupposit.com [Non-text portions of this message have been removed] 2892 From: Rob Muessel Date: Wed Apr 11, 2001 7:35am Subject: Re: Fuzzy Wuzzy was a Spy I think most TSCM guys will be able to find this nefarious threat. See the attached picture from their website. If they shrink it about 97% and make it look like a grown up's toy, I'll start to worry. In the meantime, be sure to ask your clients if anyone has been walking around with a giant light blue elmo on their backs in the sensitive areas. -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA [Non-text portions of this message have been removed] 2893 From: James M. Atkinson, Comm-Eng Date: Wed Apr 11, 2001 10:15am Subject: Gildan got gold mine of details: spy suit Gildan got gold mine of details: spy suit http://www.montrealgazette.com/business/pages/010410/5065694.html Fruit of the Loom alleges executive stole operating plans JAN RAVENSBERGEN The Gazette Gildan Activewear Inc. maintained a stony public silence yesterday in the face of explosive allegations that one of its top executives orchestrated an industrial-espionage coup last fall from Gildan's Montreal head office. The espionage effort is said to have handed the local T-shirt maker a gold mine of inside information detailing rival Fruit of the Loom Inc.'s business plans for 2001. "The stolen operating plans" alleged to have been obtained by top Gildan executive David Cherry from one of his former colleagues at Fruit of the Loom yielded the fast-growing Montreal garment maker with a bonanza of inside information, "a road map to Fruit of the Loom's production and sales strategies worldwide," Fruit of the Loom stated in a filing with a U.S. court. "This case is about industrial espionage at the highest corporate level and the lengths to which predatory competitors will go to obtain commercial advantage," Fruit of the Loom added. It argued for a temporary restraining order against Gildan that was granted last Thursday by U.S. District Court Judge Joan Gottschall in Chicago. The judge ordered Gildan, Cherry and another freshly hired senior Gildan executive, John Martin, not to use any of the information alleged to have been obtained by Cherry. Fruit of the Loom hasn't yet specified dollar damages in the lawsuit. Gildan is a publicly traded company that has been on a fast growth track. In the face of the extraordinary nature of the allegations and the high level of detail provided in the court filings, it simply refused yesterday to talk. Greg Chamandy, the company's chairman and chief executive, was tied up in meetings all day with lawyers and others and wasn't available for even a brief interview with The Gazette, an assistant told the newspaper. Glenn Chamandy, Gildan's president and chief operating officer, also wasn't available. On Friday, Laurence Sellyn, Gildan's chief financial officer, had said that "it's really going to take a couple of days before I can intelligently comment" on the allegations. He was attending a meeting in Atlanta yesterday, and couldn't be reached. The company's top officers "are going to say something" about the allegations, Grace Pollock, an outside public-relations official from InvestComm Group Inc. representing Gildan, finally said late yesterday afternoon. When? "Soon," Pollock responded. Gildan shares have been dropping for the past six trading days, losing a further 50 cents yesterday to $22.25. They took a hit last week after Gildan shut a factory in Barbados. Jamaican police had found between 10 and 30 tonnes of marijuana in a container originating from that plant. While Gildan will respond to the allegations from financially wobbly Fruit of the Loom "very soon," Pollock said, "I can't say any more than that." The court filing states that Cherry obtained "sales data for specific customers by unit volume," with sales to such large Fruit of the Loom customers "broken down by quarter, performance to budget and previous annual performance." The effect would be to give Gildan insider knowledge of exactly what Fruit of the Loom was charging for every product line, with "historical actual sales data for 1996 through 1999 broken out by product category worldwide." "This customer information provides Gildan with immense marketing advantages," the court filing stated, given that "many of Fruit of the Loom's major customers are actual or potential Gildan customers." Information alleged to have been obtained by Cherry covers "sales strategies and data; sales production strategies and data; customer information; pricing strategies; product-development plans; and trade secrets" at Fruit of the Loom, which is currently under bankruptcy protection after running into big trouble moving production to Third World plants. Its annual revenues total close to $1.5 billion U.S. Gildan has said it's on track for revenue this year of about $600 million. Analyst Claude Proulx at BMO Nesbitt Burns cut his 12-month price target for the stock to $36 from $43.50 in a report issued yesterday morning. A request for a copy of his morning comment was rebuffed. "Our research is for our clients only," said Philippe Habeichi, a Proulx assistant. Only last Thursday, the analyst had pegged $43.50 as his target price for Gildan. Time line of Events Based on Allegations - April, 1998: David Cherry leaves job at Fruit of the Loom as vice-president (order fulfillment) and later moves to Gildan. - Nov. 27, 2000: Cherry, now Gildan's executive vice-president (planning and logistics) and a member of its executive-management committee, leaves an office voice-mail for former colleague Elizabeth Walton, then Fruit of the Loom's director (customer service). He requests a callback. When Walton does call back, "Cherry asked her to call him again from a pay phone using a Gildan 800 number." On that 800 call, "Cherry asked her to send him copies of Fruit of the Loom's Forecast Report and Sew Plan." Walton "already possessed a copy of the Sew Plan." She "then obtained a copy of the Forecast Report from Fruit of the Loom's computer system." "After she left work that day, Walton sent the Forecast Report and her copy of the Sew Plan via Federal Express to Cherry in Canada." - Nov. 28, 2000: "Cherry called Walton and thanked her for sending the Sew Plan and Forecast Report." - Late December, 2000: "A member of Gildan's senior management asked Harold Moore, then a Gildan plant manager in North Carolina, and a former Fruit of the Loom executive, to review a current Fruit of the Loom Sew Plan to interpret the report's style numbers." Moore knows this report is confidential and concludes "that a competitor could use the information in the report to damage Fruit of the Loom's business or gain a competitive advantage." - March, 2001: Gildan hires John Martin, another former senior Fruit of the Loom executive. - April 5, 2001: Judge Joan Gottschall of U.S. District Court for Northern Illinois issues temporary restraining order against Gildan. The Montreal firm "shall not use, distribute, and disclose in any way the information contained in any Fruit of the Loom Forecast Report and Sew Plan," she rules. - April 18, 2001: Hearing date scheduled on a request by Fruit of the Loom for a preliminary injunction. - April 23, 2001: Expiry date for Judge Gottschall's order. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2894 From: Scott Malcolm Date: Wed Apr 11, 2001 0:08pm Subject: Re: Digest Number 562 > Message: 5 > Date: Tue, 10 Apr 2001 10:32:58 -0700 > From: "Phillip H. Waters" > Subject: Fuzzy Wuzzy was a Spy > > Fuzzy Wuzzy Was a Spy : > > A new high-tech stuffed bear developed by two German organizations, dubbed Telebuddy, > looks like a trade show handout but could conceivably be used as a peeping teddy. Snip> Humor so beware! http://www.gcfl.net/archive/print/19991222.html Regards, Scott Malcolm Malcolm & Associates,Inc. Serving the State of Wisconsin http://www.execpc.com/~conf-pi Office 262 965 4426 / Fax 262 965 4629 2895 From: James M. Atkinson, Comm-Eng Date: Wed Apr 11, 2001 3:14pm Subject: Another Open Source Intelligence Analysis - What IT Is: The Evidence Behind Dean Kamen's Secret Invention [Moderators Note: Earlier this year I performed an independent case study of the "Ginger leak" which had occurred back in January. The purpose was to study how the leak developed and to research the various open-source loose ends which presented counter intelligence vulnerabilities. In a nutshell, the analysis demonstrated a poster child for "how not to keep a secret", and also permitted a great academic exercise on sifting though minute fragments of information to develop the bigger picture. The case study of the leak was also used to teach proper analysis. List members may want to check out the following as well: http://www.tscm.com/ginger/ -jma] http://www.inside.com/jcs/Story?article_id=28265&pod_id=13 What IT Is: The Evidence Behind Dean Kamen's Secret Invention Adam Penenberg 4/11/2001 After Dean Kamen wheeled a luggage carrier piled with a couple of black duffel bags and some cardboard boxes into a ballroom at the Hyatt Regency, he told the guard to lock up behind him. It was December 2000 and Kamen-inventor, physicist and winner of the National Medal of Technology-had flown to San Francisco to meet some big-name investors. Among them were venture capitalist John Doerr of Kleiner Perkins; Jeff Bezos, founder of Amazon; Credit Suisse First Boston's Michael Schmertzler; and Vern Loucks, the recently retired ceo of Baxter Healthcare. Kamen had also invited along veteran technology reporter Steve Kemper, who had been documenting the secret project for a book. This event, as portrayed in Kemper's subsequent book proposal, made for a compelling scene. And Kemper's proposal was carefully crafted-omitting many key details-to create maximum mystery, maximum buzz and a maximum book advance. (It gained him a very decent $250,000 from the Harvard Business School Press.) Now, after an extensive investigation that included combing through public filings and documents relating to the secret project, it's possible to paint a detailed picture of what the tech powerbrokers were so excited about that day. It appears that Kamen began to assemble two ''Ginger'' scooters with a screwdriver and some hex wrenches while the assembled cast awaited the arrival of the irascible Steve Jobs, another key adviser. Although Kemper's proposal didn't explicitly spell it out, the scooter-qua-scooter was actually not the most groundbreaking part of the presentation. If and when the scooter goes into general production, it's likely it will be powered by hydrogen instead of gasoline, which would give it a smooth, quiet, pollution-free ride. The only emission would be a few drops of water. Several patents and trademarks filed in the U.S. and in Europe also indicate that Kamen and the engineers at his company, DEKA Research and Development Corp. of Manchester, N.H., have created a scooter designed to mimic how upright human beings maintain their balance. Kamen has dubbed the effect ''dynamic stabilization,'' a term DEKA has trademarked. Within 10 minutes Kamen had both Gingers up and running. He turned one on and began to ride around the room. Bezos grabbed the other and as he tooled around, he couldn't help but laugh out loud. Kamen offered his scooter to Doerr, and he began to frolic with his Ginger. They were all having so much fun they barely noticed Jobs slip in to the ballroom. At the time the secrecy-obsessed Kamen had no clue that in less than a month, Ginger would become a kind of latter-day gearhead folk religion. The cause of most of his woes would be Kemper's book proposal, entitled ''IT'' (possibly for ''Individual Transport''), which was obtained by Inside.com. A veteran contributor to The Hartford Courant, Kemper had profiled Kamen for Smithsonian Magazine in 1994. And even though the text of the book proposal was deliberately elliptical and oblique, it was still revealing. ''From a corporate-security perspective, the leaking of Kemper's proposal was a nightmare for Dean Kamen,'' says James M. Atkinson, president and senior engineer of Granite Island Group in Gloucester, Mass., and an expert in electronic counterintelligence. ''If you were to chart the information in the proposal with patents, trademarks, domain registrations, building permits, factory blueprints, mortgage filings and other publicly available information, you could get a good idea what Kamen has been up to.'' Given the media frenzy set off by the publication of portions of the ''IT'' proposal on Jan. 9, [Inside] set out, with Atkinson's help, to piece together a more detailed picture of what Kamen was up to. GINGER MANIA Certainly Ginger had prompted some wild speculation. At the site theITquestion.com, Ginger fanatics speculated that ''IT'' was a ''personal hovercraft,'' a ''backpack helicopter'' or a Star Trek-like transporter, among other things. But 33 percent of its polled visitors had it at least half-right when they ventured that Ginger was a ''personal scooter.'' What most of them didn't know is that Kamen's invention proposes to use a new fuel source, hydrogen-and, possibly, a revolutionary new engine. Its approach to transportation could, if successful, yield entirely new types of vehicles. One clue: in September 1999, Kamen's DEKA created a new company called ACROS. According to a trademark filing, ACROS's goal was to create a product line that features ''motorized, self-propelled, wheeled personal mobility aids, namely wheelchairs, scooters, carts and chariots.'' In a note the inventor sent to Kemper, he claimed that the project had to remain secret because he was afraid that certain unnamed forces (presumably automobile and petroleum companies), ''could appropriate the technology by assigning hundreds of engineers to catch up to us.... We could be left gagging in their dust.'' The leak occurred when Rafe Sagalyn, founder of the Washington, D.C., literary agency that represents Kemper, did what any good agent does: try to sell the foreign and dramatic rights to the book. In January, he personally e-mailed the proposal, along with more than a year's worth of digital communiqu?s between Kemper and his Sagalyn agent, Dan Kois, to a Hollywood scout. Recognizing hot gossip, the scout forwarded it to friends and colleagues in publishing with the note ''check this out.'' UNLIKE ANY VEHICLE Interest was so keen in the days after the ''IT'' story broke that ''Kamen'' and ''Ginger'' were among the most-requested search terms on the Lycos search engine. Kamen declined to detail his plans and issued a statement decrying the ''unfortunate, unapproved leak of a book proposal.'' ''We have a promising project, but nothing of the earth-shattering nature that people are conjuring up,'' he wrote. Contacted for this story, Kamen's publicist said he was out of the country and unreachable. Yet if the patents DEKA has filed for its scooterlike vehicle reflect the final prototype as accurately as do Kamen's patents for his most famous invention, a stair-climbing wheelchair, then Ginger will be unlike any vehicle ever mass-produced. Instead of wheels situated one in front of the other-as with a traditional scooter-Kamen's contraption probably balances on two wheels that are parallel, each one attached to an independently operated axle. There is more evidence: According to the book proposal, Doug Field, a Ford Motor Company veteran, is the head of Ginger's design team. The project's ''ceo,'' Tim Adams, used to run Chrysler's South American and European operations. A glance at the jobs DEKA is trying to fill through its Web site indicates that the company is seeking several engineers with a background in automobiles, software development and consumer electronics. One job opening of note is for an electrical engineer who can ''design power converters, inverters and motor drives in the 500-5,000 watt range,'' more than enough power at the top of the range to drive a 200-pound man in a scooter, golf cart or even a larger Ginger ''chariot.'' Cross-referencing the book proposal with Kamen's recent pursuits, it looks like the scooter will run on hydrogen. This would fulfill John Doerr's vision: the big markets of the future (he's been reported assaying) will be ''clean water, transportation, clean power.'' Kamen is quoted in the proposal adding that Ginger ''will profoundly affect our environment'' and ''be an alternative to products that are dirty, expensive, sometimes dangerous and often frustrating, especially for people in cities.'' Kamen most likely plans to produce hydrogen from propane, a common, cost-effective method. (Another, more expensive way is to extract it from natural gas.) This may explain the huge propane tanks Kamen had installed at his home in Bedford, N.H.-where he keeps a second R&D lab-and at one of his company's buildings in Manchester, N.H. Kamen, 49, maintains an enviable public image as an altruistic Buckaroo Banzai of the 21st century. Countless articles have portrayed him as an eccentric, multimillionaire genius inventor whose name is listed on some 100 patents. His work with his foundation, first, which he uses as a basis for promoting science and technology to children, is impressive. Success has allowed him to play out boyhood fantasies. A recent profile on 60 Minutes II showed Kamen commuting to work in one of his helicopters, which he flies himself, blasting out the theme from Star Wars over a stereo. He also pilots his own private jet. The lifelong bachelor not only owns an 18,000-square-foot home in Bedford, but has his own private island off the Connecticut coast (which boasts its own currency). As with many Kamen inventions, Ginger has roots in earlier projects. DEKA's corporate Web site claims its ''development efforts focus upon the creation of technologies which will have a variety of applications. A single invention may become the core technology of numerous, often diverse, products.'' Of the almost 100 patents to Kamen's name, most are improvements on existing patents, filed through DEKA (as in DEan KAmen). DANCE PARTNERS? Ginger's inspiration can probably be traced to 1992, when Kamen began work on a mechanical miracle-on-wheels called the IBOT, a wheelchair that can traverse almost any terrain, and even climb stairs. The project was code-named ''Fred,'' as in Fred Astaire-and Johnson & Johnson fronted a $100 million grant to develop it. Throughout the 1990s Kamen filed patent applications, both here and abroad, with the World Intellectual Property Organization (WIPO), including ''Transportation Vehicles and Methods,'' ''Constant Pressure Seating System'' and ''Anti-Tipping Mechanism.'' Together, these patents make up IBOT. Approval of IBOT's marketing claims by the federal Food and Drug Administration, the final step before production can begin, is expected this year. Kemper, in an e-mail to his agent dated Sept. 19, 1999, reports that Kamen had started work on Ginger in early 1998. In ''IT'' the reporter claims that Kamen's investors had forced Kamen to create a company wholly separate from DEKA to develop Ginger. Public records show that nine days before Kemper's e-mail, DEKA registered the trademark ''ACROS.'' (Interestingly, another ''ACROS,'' a bicycle-component manufacturer specializing in high-quality forks and shocks, opened up shop in Renningen, Germany, in 1998 as well. Its trademark also identifies the company, in part, as a maker of ''bicycles, wheelchairs, scooters'' and other bike-related goods. The company didn't reply to requests about whether it has links to Kamen.) After IBOT, Kamen applied for a slew of new patents for his next project: Fred's smaller, sexier, more lithe dance partner, Ginger. In June 1999 DEKA filed with WIPO for a ''personal mobility vehicles and methods'' patent, which included a drawing (since widely distributed) of a woman balanced on an odd-looking vehicle with two wheels-like the rear wheels on a toy wagon-with perhaps a third, smaller wheel in the front to avoid tipping. Over the wheels is a platform with a long, slender fork that ends in T-shaped handlebars. Making use of Kamen's patented two-wheel balancing device, such a vehicle would handle effortlessly. In 1999 DEKA applied for a WIPO patent for a ''balancing vehicle with camber and toe-in,'' a rough equivalent to the scooter's presumed suspension system. Combine these with Kamen's ''dynamic stabilization'' and other IBOT patents, and you get a scooter. It's not clear exactly how fast such a scooter might go. But if vehicles running on hydrogen (as a new generation of fuel cells do) were to become as popular as Kamen and his investors believe they could be, whole cities would have to be redesigned. A hydrogen-supply infrastructure would have to be built, with facilities created to store large amounts of liquid hydrogen, as well as a national network of hydrogen filling stations, either built from the ground up or, more likely, as an overlay on existing gas stations. All the major oil and auto companies are at least looking at this. Texaco has taken a stake in a company called Energy Conversion Devices. Shell and bp Amoco are working together on a hydrogen project, as is Exxon Mobil. The big oil companies are ''selectively making acquisitions and making alliances, because they see this potential movement as both an opportunity and threat,'' says Sam Brothwell, an analyst at Merrill Lynch. But a worry for Kamen is that the move to a hydrogen economy could create a morass of regulatory concerns for ACROS. ''One of Kamen's biggest worries,'' Kemper wrote in ''IT,'' is that ''nervous regulators will impose rules that limit Ginger and stop it from changing the world.'' The conventional wisdom today is that it won't be until 2010 that pure-hydrogen fuel-cell vehicles will be common on the road. Next year, Ford, DaimlerChrysler and General Motors plan to market hybrid fuel-cell vehicles that change gas into hydrogen, dramatically cutting down on emissions. A scooter powered by a pure-hydrogen cell is the technological first step before hydrogen-powered cars. Kamen, it seems, has even bigger dreams than wheelchairs and scooters. As Bezos, who serves on the advisory board for Ginger along with Jobs, reportedly said to Kamen at the meeting with investors after the demo at the San Francisco Hyatt, ''That's why we're here, not to make $3 billion in a niche market.'' STIRLING OPPORTUNITY In January 1999, Kamen was listed as an inventor on a patent application for an improvement on a special type of engine called a ''cantilevered crankshaft Stirling cycle machine,'' and he has subsequently filed for a number of other improvements as well. Invented in 1816 by the Rev. Robert Stirling of Scotland, the original engine was a cost-effective alternative to the new steam engine. A Stirling is an ''external'' combustion engine that relies on the heating of a gas (such as helium) that expands and powers pistons. But Stirling engines have proved expensive to develop, especially in a size small enough to be of practical use. If Kamen has solved this problem with his engine, he could, as Kemper's proposal asserts, become richer than Bill Gates. ''The engine that Kamen patented is really a mobile power plant,'' says Brent Van Arsdale, the owner of American Stirling, a Wichita, Kan., company that makes rudimentary Stirlings for hobbyists. ''It would be a good power source for his IBOT wheelchair, or in any other type of vehicle he might want to design.'' Judging by the domain names ACROS has recently registered, Kamen has big plans for his Stirling engine. The first step would be to combine the engine with his scooters. On Nov. 30, 2000, ACROS registered stirlingelectric.com. Five weeks later Kamen also registered stirlingscooter.com, -.net and -.org, as well as mystirlingscooter.com. To achieve the $5 billion valuation his investors believe his company will be worth in five years, according to Kempner's proposal, Kamen would have to ramp up production quickly to get into the market. Unfortunately, Kamen has hit some potential snags on the way. One involves the massive, 100,000-square-foot factory he just broke ground on near his home in Bedford. ACROS purchased the property for $900,000 on Dec. 28, 2000. But Kamen still lacks a building permit. Neighbors have been up in arms over potential noise from the large factory air-conditioner units that are required by law, and the folks at a nearby retirement home are miffed about the racket Kamen's helicopter makes when it flies overhead, residents there say. According to the town planning inspector, the earliest Kamen could receive permission to build would be in May. But workers at the factory site say they don't expect the project to get started until August. Kamen planned to unveil Ginger next January, according to Kemper. The most logical place would be at the annual auto show held every January in Detroit. He might have a prototype of a scooter to show then, but he likely won't have enough on hand for widespread sale-or have in place the hydrogen infrastructure to power them. Kamen's biggest concern may turn out to be plain old competition. He isn't the only one developing fuel-cell-derived transportation. Ford is introducing a line of ''Think'' vehicles that includes a line of advanced electric scooters, bicycles and cars. Honda plans to introduce a ''zero-emission fuel cell'' vehicle in the near future. gm has unveiled the Opel Zafira, a prototype car powered by a fuel cell that gm claims is the most efficient fuel cell ever developed. Not to be outdone, DaimlerChrysler has also built a zero-emission fuel-cell prototype. CROWDED FIELD Other companies are experimenting with using fuel cells in scooters and then providing the vehicles with hydrogen when needed. In December, Manhattan Scientifics announced an agreement with Aprilia S.p.A., one of Europe's largest manufacturers of motor scooters and motorcycles, to create a fuel-cell-powered concept bicycle. GRoW International Corp. of North Branch, N.J., recently patented a technique to tap into the electric power grid in order to provide hydrogen to parked vehicles outfitted with fuel cells. More ominously for Kamen, several other inventors have received patents for Stirling engine upgrades. Like many entrepreneurs, Kamen may also have financial challenges. He not only mortgaged his home three times between 1997 and 1999, the last time for $4.5 million to cover Christmas bonuses for employees (according to Kemper's proposal), but Kamen's business is leveraged heavily, too. According to public records, all five of the properties he owns in Manchester, N.H., including the ones he runs DEKA out of, are mortgaged into the millions, debt which he has spread over three separate banks, with the terms of his agreements getting more and restrictive. Many of the tenants to whom Kamen rents space in his buildings, including his own company, DEKA, are now required to pay rent directly to the bank. If Kamen can't begin to manufacture ACROS scooters and Stirlings in mass quantities, if the delays keep mounting, he might not be able to beat his variously giant and well-heeled competitors to market. In exchange for $90 million in venture capital, Kamen had to give up 15 percent of his new company, implying a valuation of around $600 million. If he runs into another money crunch, he would have to dilute his ownership even more to attract new capital. Eventually, he could lose control. Instead of becoming the next Bill Gates or Henry Ford, Kamen might find himself ending up like another great American inventor, Preston Tucker, who in the 1940s built the Tucker, a car too far ahead of its time. The car was a commercial dud. On the other hand, its creator was immortalized in a Francis Ford Coppola film. Additional research by Chris Schultz. Adam L. Penenberg is the co-author of Spooked: Espionage in Corporate America (Perseus Books). -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2896 From: Date: Wed Apr 11, 2001 5:09pm Subject: China says it will free U.S. crew China says it will free U.S. crew Crew members of the U.S. plane detained in China, shown in a photo obtained by NBC News. April 11 ≠ President Bush makes a statement on the expected release of 24 detained U.S. crew members in China. MSNBC April 11 ≠ China said Wednesday it would free the crew of a U.S. spy plane after receiving a letter saying the United States was "very sorry" for the plane's unauthorized landing and the death of a Chinese pilot. A plane left Guam to retrieve the crew as U.S. and Chinese officials negotiated final details of the release, which was expected later in the day. How do you rate President Bush's handling of the dispute over the spy plane? Excellent. He kept the rhetoric cool and won the crew's release. Fair. He got the crew out, but China still has the plane. Poor. Beijing dragged this out far too long. Vote to see results THE CHINESE will not immediately return the EP-3E spy plane to the United States, according to the carefully negotiated letter that paved the way for the release of the 24 crew members. A Continental Airlines 737 left Guam shortly before 12:30 p.m. ET and was expected to arrive abput 6 p.m. ET. Officials said the crew was expected to leave Hainan Island late Wednesday and fly to Guam, where they have been allotted a four-hour stopover, including a photo opportunity with the local press. The exact timing of the crew members' release remained unclear, as Chinese officials said unspecified "procedures" would have to be completed before they would be turned over to U.S. officials. Members of the crew were using a cellular phone to speak with family members for the first time since the standoff began. Several parents said they had received very brief calls from their children saying they were doing well and would be home soon. The 21 men and three women have been in Chinese custody since April 1, when their plane collided in midair with a Chinese fighter jet over the South China Sea. The Chinese aircraft went down at sea, and the pilot is presumed dead. What's next for spy plane crewThe Chinese government has said that the 21 men and three women will be allowed to leave "promptly." Here's the expected timeline: ïA commercial charter plane from Guam is expected to leave for Hainan Island at 12:15 p.m. ET, carrying specialists who will debrief the crew during the return flight and psychologists to counsel the crew members if needed.ïThe charter will return to Guam, where the crew will be transferred to a military transport for a flight to Hawaii.ïIn Hawaii, the crew will spend several days "decompressing." Debriefing about the accident, the landing and their incarceration will continue.ïThe crew will be transported to their home base at the Whidbey Island Naval Air Station in Washington state for a "welcoming ceremony," probably later this week. A COMPLEX SEMANTIC COMPROMISE The letter that ended the dispute, which U.S. Ambassador Joseph Prueher delivered Wednesday afternoon to the Chinese Foreign Ministry, was a complex semantic compromise worked out during days of arduous negotiations. The letter twice stated that the United States was "very sorry" that a Chinese pilot apparently died as a result of the collision and that the U.S. aircraft entered Chinese airspace and landed without "verbal clearance." But it stopped short of the formal apology demanded by Beijing, which has insisted that the U.S. aircraft was responsible for the collision. China to free U.S. crewïLatest newsïU.S. letter to ChinaïCrew's families 'ecstatic'ïFineman: Bush aces first big foreign crisis testïNewsweek: Crash in cloudsïCrew of the U.S. planeïMSNBC special report: China's militaryïIssues dividing China, U.S.ïChina's military powerïWhat's your opinion? Join the discussionChinese officials and the state-run media characterized the letter as an apology, but U.S. Secretary of State Colin Powell said the wording was consistent with what Washington had said from the beginning: "There was nothing to apologize for," he said in Paris, where he was meeting with allies to discuss U.S. policy in the Balkans. "To apologize would have suggested that we had done something wrong and were accepting responsibility for having done something wrong." April 11 ≠ NBC's Ned Colt reports from Beijing on the deal struck between China and the U.S. for the release of the 24-member U.S. spy plane crew. President Bush, in a statement at the White House, called the 11-day standoff "a difficult situation for both our countries." "I know the American people join me in expressing their sorrow for the loss of life of a Chinese pilot. Our prayers are with his wife and his child," Bush said. Later, Bush met with the family of crew member Steven Blocher, an aviation electrician's mate 3rd class. "I'm so appreciative of how this family and other families were so steadfast," Bush said as he posed for photos with Robert and Sandy Blocher during a visit to Concord, N.C., to promote his budget. China's foreign minister, Tang Jiaxuan, said the crew was being released on "humanitarian grounds" and expressed hope that the dispute would not damage relations between the two governments. "China puts great importance on its relations with the United States," Tang said. But many members of Congress warned that Beijing may still pay a price ≠ on matters ranging from trade and China's Olympic bid to possible U.S. arms sales to Taiwan. Advertisement "Progress on this agenda depends on rebuilding the trust that was damaged over the last 11 days," Senate Democratic leader Tom Daschle of South Dakota said. Congress could end up approving a number of nonbinding resolutions, including a pending one that would oppose China's bid to host the 2008 Olympics because of Beijing's human rights record. Calls have also mounted in Congress for Bush to approve high-tech arms sales to Taiwan. China considers Taiwan a renegade province and has opposed such sales. MEETING APRIL 18 The United States and China agreed to meet starting April 18 to discuss the mid-air collision. The two countries planned to discuss developing a plan to return to the United States the heavily damaged EP-3E plane, which is incapable of flying with its nose cone and propeller destroyed, U.S. officials said. The spy plane's crew MSNBC InteractiveïThe Americans at the center of the spy plane standoffWhile China has called an end to the U.S. reconnaissance flights over China, U.S. officials said there were no plans to stop the eavesdropping flights, which collect radar, radio and other electronic transmissions several times a month. China indicated that it was in no hurry to return the aircraft, which U.S. officials assume has been stripped of its sophisticated surveillance equipment. "We have to keep the airplane ... to make further investigation," said Shen Guofang, China's deputy ambassador to the United Nations. INTERPRETIVE PARSING Interpretive parsing of the letter began almost as soon as China announced it would free the crew. The Chinese used the word for "violate" when they announced the text of the letter domestically in the context of the U.S. plane's entry into China's airspace, but U.S. sources told NBC News that the administration had rejected the use of that term in an earlier draft of the letter. State Department officials, speaking on condition of anonymity, noted that the letter had been carefully crafted to express sorrow for landing on Chinese territory, but not for flying in international airspace. Some Chinese, however, were angry that the resolution fell short of the full apology China's leaders had demanded. "Sorry is not enough," 33-year-old Beijing delivery man Liu Yan told Reuters. "Our government has not been hard enough on the United States. I am very dissatisfied." The compromise language that cleared the way for the release of the crew was hammered out Tuesday. The letter also notes that while the U.S. plane violated Chinese sovereignty, it was crippled by the crash, was flying under a mayday signal and had to make an emergency landing. Pentagon officials said Chinese objected to the use of a military aircraft to retrieve the crew, so the U.S. dispatched the commercial charter from Guam. The plane was carrying specialists who will begin debriefing the crew on the return flight and psychologists for possible counseling, the officials said. After returning to Guam, the crew was expected to be transferred to a military plane for a flight to Hawaii's Hickam Air Force Base on the island of Oahu, where they are expected to arrive around midday Thursday, U.S. officials said. The crew will spend several days in Hawaii "decompressing" and being debriefed about the accident, the landing and their incarceration. WHIDBEY ISLAND CEREMONY The military does not plan to fly family members of the crew to Hawaii, but it will transport them to the home base at the Whidbey Island Naval Air Station in Washington state for a "welcoming ceremony, probably later this week," officials said. Crew members with families in Japan, where the plane was based during its current tour of duty, would be flown directly there after being debriefed. Before news of the deal, U.S. diplomats led by Army Brig. Gen. Neal Sealock met with crew members for the fifth time Tuesday night, the 10th day of the crew's detention, on China's Hainan Island. Sealock said the detained crew members remained in high spirits and were exercising and getting regular news reports and e-mails from home. NBC's Kevin Tibbles on Hainan Island, Ned Colt in Beijing and Andrea Mitchell and Kerry Sanders in Washington; The Associated Press and Reuters contributed to this report. HAVE A GREAT DAY !!! ---------- http://www.msnbc.com/news/553032.asp [Non-text portions of this message have been removed] 2897 From: Date: Thu Apr 12, 2001 3:41am Subject: Do You Know who's Watching You? Maclean's Online -- Cover Index Interesting articles HAVE A GREAT DAY !!! ---------- http://www.macleans.ca/xta-doc/2001/02/19/Cover/index.shtml [Non-text portions of this message have been removed] 2898 From: Date: Thu Apr 12, 2001 4:18am Subject: SpectorSoft - Software for Recording PC and Internet Activity Surveillance threat. Interesting articles. HAVE A GREAT DAY !!! ---------- http://www.spectorsoft.com/whatsnew/ [Non-text portions of this message have been removed] 2899 From: Date: Thu Apr 12, 2001 4:51am Subject: Humor ! maybe! 1.) Background Music for Sweeps; http://adrock3215.virtualave.net/mission.mid And 2.) For Those Really Tough Assignments!, http://adrock3215.virtualave.net/jbond.mid ;>) HAVE A GREAT DAY !!! 2900 From: James M. Atkinson, Comm-Eng Date: Thu Apr 12, 2001 6:54am Subject: An Espionage Treaty An Espionage Treaty By Boris Pankin Thursday, Apr. 12, 2001. Page 8 The Moscow Times (Opinion) http://www.themoscowtimes.com/stories/2001/04/12/006.html In a recent interview in Izvestia, Nikolai Stepanov, the former chief of foreign correspondents for the Novosti news agency, stated: "After perestroika and the putsch, the security organs left our agency. Why that happened, I don't know. This was not decided at the agency, but somewhere in higher political circles." Since I was a member of those "higher political circles" during the period between the August 1991 putsch in Moscow and the December 1991 putsch in Belovezhskaya Pushcha, serving as Soviet foreign minister, I may be able to shed some light on what happened during those blessed months. In November 1991, Mikhail Gorbachev signed - and Boris Yeltsin approved - an order reducing by one-third the number of military intelligence and KGB foreign intelligence agents working under the cover of Soviet embassies and other Soviet organizations abroad, including media outlets. Shortly thereafter, newspapers connected to the security organs began attributing this "scheme" to me, claiming that it was the result of previous conflicts "between the ambassador and the station chief." As a matter of fact, there were some conflicts of this sort - involving, for instance, Alexander Yakovlev in Canada and Rafik Nishanov in Jordan. Personally, my cup of patience overflowed when the KGB station chief in Stockholm made it clear that, in his opinion, the only significant reason for having embassies at all is so that they can serve as cover for intelligence agents. I encountered an even more striking situation shortly after I was named ambassador to Prague in 1990. At that time, our fraternal socialism had reached the point where some of our real diplomats pretended to be important by claiming to actually be intelligence agents. I wouldn't even deign to call most of these people "intelligence agents." Whole swarms of them were just following their own diplomats around, including even ambassadors. After I became minister, I was surprised by the domination of these "colleagues" in the area of personnel and came to the conclusion that it was imperative to get them out of my ministry as quickly as possible. I don't know whether he was being sincere or not, but surprisingly my efforts were completely endorsed by Leonid Shebarshin, who was then the head of this section of the KGB and who even served as acting KGB director for three days after the August 1991 putsch. He made an appointment to see me, at which he admitted that he too was suffering from this overstaffing. Apparently the Soviet fashion for grotesque nepotism had not bypassed even his department. After I was appointed ambassador to London at the end of 1991, I saw for myself that Gorbachev's order was being carried out even though Gorbachev himself was no longer president. However, I don't know what happened to this process after 1994, although there are a number of indications in mass media that it was reversed. Over the last few years I have wondered a bit about the fates and roles of those intelligence agents in the post-Soviet period. How have they fared since the thawing of the Cold War, the dawning of global openness, the collapse of the Berlin Wall and other visible and invisible barriers, and since world leaders began proclaiming a new era of strategic partnership? Everyone declares that spying on one another is bad form, but no one is ready to abandon this unseemly business. Obviously, no one is going to renounce spying unilaterally. And they are right not to. Just as was the case with nuclear weapons, moving away from espionage requires multilateral agreements and mutual concessions. Just as with nuclear weapons - where first atmospheric testing was banned and later underground testing and where a long process led to minimizing the threat from tactical nuclear weapons, the most insidious type - shutting down the spying game will require a step-by-step process. Perhaps the place to start would be a ban on recruiting foreign nationals. That is, all civilized governments will agree to stop trying to induce, blackmail or bribe people to spy for them - especially by using people who face nothing more than the threat of expulsion if they are discovered. One of these recruiters who worked as a diplomat in my embassy in Stockholm made it public later that his work was just like that of a collective farm chairman who would exaggerate his harvest figures: He would invite some naive citizen of the country where he worked to dinner and then write out a report to headquarters about how he had recruited a new agent. I think that the old saying that every cloud has a silver lining is true. The recent exchange of blows between Russia and the United States has shaken the entire world and served to demonstrate that there should be some international legal controls on such jousting. It is time to retrain our spies as scholars and analysts. After all, in the age of the Internet, that would be more practical. And a lot safer. Boris Pankin served as the Soviet foreign minister from August to December 1991. He contributed this comment to The Moscow Times. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2901 From: David Alexander Date: Thu Apr 12, 2001 6:41am Subject: re: return of the spyplane I have some views on the debate about the return of the E3 spyplane to the USA. I don't think its' return is likely to be anytime soon, and there is almost nothing that the Americans can legitimately do about it. In 1975 a MIG-23 Foxbat was flown from Russia to Japan by a defector who claimed political asylum. Russia demanded the return of the aircraft, which was at the time one of the aircraft that NATO feared the most in the PVO Strany - the Soviet air defence forces. A high altitude high speed interceptor with modern weapon systems. The USA and the rest of NATO stripped the plane to its components, examined, documented what they found and then rebuilt it. I believe they even flew it. It turned out to be nowhere near as big a threat as NATO thought. If the USA can do it to others, then 'others' will have no compunction about doing it to the USA. There is no moral high ground here. That is not to say I condone it, or their government, this is purely me saying that the US govt. cannot claim to be whiter than white and the injured party. Privately I bet the Pentagon accept they won't see the aircraft back before China thinks they have wrung every last bit of information from it. As an indication of what is possible. In W.W.II the British received a piece of V1 wreckage from a test flight (courtesy of the resistance forces). It was a piece of wing about 12" long. From that one small section they deduced quite accurately the range, payload and accuracy of the V1. Imagine what can be done today from a few components. just my 2c. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 2902 From: Miguel Puchol Date: Thu Apr 12, 2001 8:04am Subject: RE: re: return of the spyplane What I cannot understand is why don't these 'spy' planes get equipped with some kind of self-destruct mechanism for all the sensitive hardware (and software). I even heard that the crew banged some equipment with a hammer, to try and give as little as possible to the chinese... There are plenty of ways to permanently damage equipment, or it's most sensitive parts, in a matter of seconds. Just a thought, Mike > -----Mensaje original----- > De: David Alexander [mailto:david.alexander@b...] > Enviado el: jueves, 12 de abril de 2001 13:42 > Para: 'TSCM submissions' > Asunto: [TSCM-L] re: return of the spyplane > > > I have some views on the debate about the return of the E3 spyplane to the > USA. > > I don't think its' return is likely to be anytime soon, and there > is almost > nothing that the Americans can legitimately do about it. > 2903 From: James M. Atkinson, Comm-Eng Date: Thu Apr 12, 2001 8:31am Subject: RE: re: return of the spyplane Good Morning, As a rule all "special things" on theses birds are designed in such a way to allow them to be quickly removed and destroyed in a matter of minutes, if not seconds. The more highly classified/sensitive the item is the easier it is to remove, and the high the priority on the destruction list. They would have first zeroized the crypto, then destroyed any used or unused keys and key loaders (theses are the hottest things on board). Next, zeroize all instrument memory, wipe all tapes, and destroy all flight and/or tasking records. Once the "soft records" are cleared the trusty fire axes, percy the three pound sledge hammer, and heavy dykes (not the short haired kind) would come out and the physical hardware destroyed as much as possible (based on a destruction priorities table). Once the "software" was been wiped the hardware really doesn't need to be smashed. With todays technology the real magic is in the software, and the hardware is just a commodity. The real hardware treasure on the plane is actually the antenna in the belly pod, and the wide band receivers/controllers behind it (and there is little you can do to destroy it short of a belly landing) Now, keep in mind that the hardware may not have been touched at all, and that the crew may have only destroyed the "classified soft items", leaving the unclassified hardware mostly untouched. In reality most of the hardware on these planes is completely unclassified (despite what the media tells you), and is available to anybody willing to cough up cash for the hardware (hell you can buy a lot of it at Ham-fests and on E-Bay if you know what your doing). Incidents such as this is "just a cost of doing business" in the SIGINT realm of things. We spy... they spy... everybody spies... and sometimes someone gets pinched or outright caught. It's just good that we got our people back as they are the only thing that really matters, and the hell with the damn plane. Just my two-cents, -jma At 3:04 PM +0200 4/12/01, Miguel Puchol wrote: >What I cannot understand is why don't these 'spy' planes get equipped with >some kind of self-destruct mechanism for all the sensitive hardware (and >software). I even heard that the crew banged some equipment with a hammer, >to try and give as little as possible to the chinese... > >There are plenty of ways to permanently damage equipment, or it's most >sensitive parts, in a matter of seconds. > >Just a thought, > >Mike -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2904 From: Miguel Puchol Date: Thu Apr 12, 2001 1:59pm Subject: RE: re: return of the spyplane Well explained, well understood, thanks! I think that software defined equipment is more and more common, Motorola has just been awarded a contract to build more SDRs (software-defined radios, I believe this is the correct acronym), which basically is a bunch of DSPs and a uC put toghether, and a very complex software system, capable of being re-keyed or entirely re-programmed over the air. This should enable all NATO forces to be able to use common comms equipment, unlike the tons of incompatible gear floating around at present. So, it should be possible for the software to even wipe itself if hardware tampering was detected. Cheers, and happy Easter holidays (for those who get some!) Mike > -----Mensaje original----- > De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] > Enviado el: jueves, 12 de abril de 2001 15:32 > Para: TSCM-L@yahoogroups.com > Asunto: RE: [TSCM-L] re: return of the spyplane > > > Good Morning, > > As a rule all "special things" on theses birds are designed in such a > way to allow them to be quickly removed and destroyed in a matter of > minutes, if not seconds. The more highly classified/sensitive the > item is the easier it is to remove, and the high the priority on the > destruction list. > 2905 From: Date: Fri Apr 13, 2001 1:03am Subject: Do You Know Who's Watching You? HAVE A GREAT DAY !!! ---------- http://www.macleans.ca/xta-asp/storyview.asp?viewtype=browse&vpath=/2001/02/19/Cover/46739.shtml [Non-text portions of this message have been removed] 2906 From: James M. Atkinson, Comm-Eng Date: Fri Apr 13, 2001 9:36am Subject: On a visit to the library On a visit to the library I happened to notice a man and a woman, both deaf, signing with intense gestures, apparently in a heated debate. The man said something, and the woman seemed upset. She started signing her reply very fast, to the point where the man couldn't understand a word; she also signed in big, wide gestures. Finally, looking strained, her companion took her hands, "silencing" her. The he signed, very small and slowly, "You don't have to shout, I'm not blind." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2907 From: James Goldston Date: Fri Apr 13, 2001 11:00am Subject: Deaf dscipline on a visit to church Years ago, I was in the church parking lot and saw a father have to discipline his son. The dad took the son around the side of the church (though I could still easily see), they signed back and forth, then the dad pulled off his belt and whacked sonny on the butt a few times. The father was deaf and mute, the son was speaking and hearing. The child jumped up and down and made body language like he was being killed and screaming at the top his lungs. However, he uttered not a word. I was amazed. James Goldston 2908 From: Dawn Star Date: Fri Apr 13, 2001 10:31am Subject: Do You Know who's Watching You? "Now, when a person places a call, carriers record which cell, or transmitter area, the call is coming from." People think I am weird and old fashioned for still using pay phones, it is hard to break a 30 year habit! Roger 2909 From: Dawn Star Date: Fri Apr 13, 2001 0:57pm Subject: Book Anyone know about this book I found on Amazon.com? Technical Surveillance and Countermeasures (TS/CM) Equipment in Russia: A Strategic Entry Report, 1998 by The Manufacturing Research Group Our Price: $1,400.00 Availability: This title usually ships within 4-6 weeks. Please note that titles occasionally go out of print or publishers run out of stock. We will notify you within 2-3 weeks if we have trouble obtaining this title. 2910 From: Dawn Star Date: Fri Apr 13, 2001 1:01pm Subject: Career: Debugging Consultant http://www.jobprofiles.com/alldebugger.htm 2911 From: A Grudko Date: Sat Apr 14, 2001 8:06am Subject: Re: Do You Know who's Watching You? ----- Original Message ----- >> ".... record which cell, or transmitter area, the call is coming from." > People think I am weird and old fashioned for still using pay phones, it is > hard to break a 30 year habit! And you can't beat a linesman's butt/testset for anonymity - in theory. There would be legal implications if you use someone else's line, but that's not going to stop the criminals and spies out there. I built one from an old rotary dial phone when I was 12, relocating the dial, dynamic mouthpiece, speakers and a toggle 'hookswitch' into an old Philips a.m/f.m radio that was long and slim. It actually worked! Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom "When you need it done right - first time" From: James M. Atkinson, Comm-Eng Date: Mon Apr 10, 2000 3:00pm Subject: FM Broadcast Measurement Protocol The following "FM Broadcast Measurement Protocol" is a proprietary method I developed to ferret out kit bugs, and other related devices being used for eavesdropping inside or just outside the FM broadcast band. As we all know any 10 year old kid can by kit bugs at Radio Shack for ten bucks, solder them together and have a fairly decent eavesdropping device. I have developed a similar protocol for TV stations, SW stations, WX, AM stations, and so on which provide a series of over 2500 measured broadcast signals that can be used as an index during sweeps. Deviations (no pun intended) in any of these signals may indicate an eavesdropping device (such as a broadcast TV frequency with audio in the wrong place, and no video carrier). Minimum Instrumentation: Digital Spectrum Analyzer Laptop computer to control SA and download data sets Biconical or Double Discone Antenna (30-300 MHz) Log Periodic or Directional Loop Lab Grade Low Noise Amplifier (+30 dB on Antenna) Low Loss Cables with N Type Connectors Antenna Stand Conducted Signals Box (Line Impedance Coupler/Filter) Pre-Sweep Readings: 1) External at 5 points, at least 1/4 mile away to profile local "friendly signals" active from 70 MHz to 135 MHz. Criss-cross with FCC databases. 2) Multiple (at least 3) readings internally before approaching the sound stage. 3) Conducted signals analysis at Elec. closets, IDF and MDF 4) Actual RF analysis of the sound stage with the antenna being moved at least 5-6 times inside each room When in doubt use a 6*6 or smaller search grid. 5) Conducted Signals Analysis. Primary Evaluations - Actual Measurements via laptop The primary function is to hunt for signals that do not conform to common standards (such as 200 kHz spacing) RBW 1 kHz VBW1 kHz Sweep5 Seconds Ref Level-65 dBm (a function of BW) Log5 dB/division Amplitude PAPreamp On (+15 dB) AverageTrace Averaging OFF HoldPeak Hold on Trace 2 HoldMinimum Hold on Trace 3 Samples1024 points (or more) for each trace Span2 MHz (10 stations, centered on graticule axis) 1st Start Freq.86.9 (Channel 200, minus 1 MHz) 1st Center87.9 (Channel 200) 1st End Freq.88.9 (Channel 200, plus 1 MHz) Step Size1600 kHz (8 channels) Last Start Freq106.5 (Channel 300, minus 1 MHz) Last Center107.5 (Channel 300) Last End Freq.108.5 (Channel 300, plus 1 MHz) Note: The noise floor should be just above the lowest graticule marking on the screen. Hostile Signal Indicators (non-alerting) 1) 200 kHz Channel Spacing Corrupted Commonly caused by variable capacitor tuning, or similar analog tuning circuits used by eavesdropping devices. Watch out for any energy present in the 25 kHz guard band between stations. 2) "Drifty" Carrier The devices are typically not crystal controlled, however; broadcast stations will be rock solid. 3) No Sub Carriers, or not a 150 kHz BW To increase range some devices may use NFM instead of WFM or may not generate sub-carrier such as the pilot tone. 4) Narrow Bandwidth Commercial stations will usually have a deviation of +/- 75 kHz. Bugs tend not to be so picky and are often less then less than +/- 75 kHz. It's not uncommon fro such bugs to use a bandwidth of less then 20 kHz. 5) Incorrect Polarization It could be a device taped horizontally under a table, and will help minimize detection. Remember to swivel you antennas to check all polarizations. 6) Little or no modulation Remember broadcasting is expensive, and commercial stations rarely make money from dead air time. On the other hand most bugs create tons of dead air. 7) FM Deviation is not symmetrical Radio Shack, Cony, Xandi, Rainbow, and Ramsey bugs do not use a balanced deviation and are typically - 90 kHz to + 45 kHz, Lower deviation is often twice the upper deviation. Beware of any Assymetrical Deviations. 8) Amplitude abnormally high Anything over -70 dBm is suspect, and anything over -50 should be considered highly hostile. I've seen some of these little devils cranked up as hot as +15 dBm at 20 feet (Remember to move your antenna around). Hostile Signal Indicators (alerting) 1) Feedback or Regenerative Signal Detection - WFM/NFM with Clicker 2) Sensitivity to thumping 3) Sensitivity to "loading effects" 4) Sensitivity to tone generation. Force widest deviation with 25-45 watt audio amp, cross over filters, and three speakers while generating a single tone, or LOUD pink noise (such as a vacuum cleaner). The goal is to exceed this acoustical limits of the bugs design, and to cause it to "flip out". Many device to start creating massive harmonics if you can overload the front end with noise or a single tone (1 kHz works well). Secondary Evaluations - Actual Measurements via laptop The primary function is to evaluate the guard band area between FM stations (which should not have any energy other then thermal noise present) RBW 1 kHz (300 Hz optional) VBW1 kHz (300 Hz optional) Sweep5 Seconds (10-15 seconds optional) Ref Level-65 dBm (a function of BW, -80 optional) Log5 dB/division Amplitude, (2 dB optional) PAPreamp On (+15 dB) AverageTrace Averaging OFF HoldPeak Hold on Trace 2 HoldMinimum Hold on Trace 3 Samples1024 points (or more) for each trace Span25 kHz (Centered on on guard band) 1st Start Freq.87.7850 (Channel 200, minus 1 MHz) 1st Center88.8000 (Channel 200) 1st End Freq.88.8125 (Channel 200, plus 1 MHz) Step Size200 kHz (1 channels) Last Start Freq108.5850 (Channel 300+) Last Center107.6000 (Channel 300+) Last End Freq.108.6125 (Channel 300+) Third Evaluation - Actual Measurements via laptop The function is to identify RF energy just outside the FM broadcast band which may or may not be hostile. Watch out for TV-6 audio signals, and for wireless microphones in the 72-75 MHz area. RBW 1 kHz VBW1 kHz Sweep5 Seconds Ref Level-65 dBm (a function of BW) Log5 dB/division Amplitude PAPreamp On (+15 dB) AverageTrace Averaging OFF HoldPeak Hold on Trace 2 HoldMinimum Hold on Trace 3 Samples1024 points (or more) for each trace Span2 MHz 1st Start Freq.69 1st Center70 1st End Freq.71 Step Size1000 kHz Last Start Freq134 Last Center135 Last End Freq.136 Of course you still will need to check from DC to light, but the above methods help to find eavesdropping device inside the FM broadcast band. If you find the above protocol helpful then you can at least buy me a cup of coffee. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== [Non-text portions of this message have been removed] 182 From: Perry Myers Date: Mon Apr 10, 2000 0:41pm Subject: RE: normal procedure I certainly empathize with Trace here but the law is correctly stated by Mr. McCrory. You are taking a chance when you leave a job knowing there was an active tap without reporting it. Then again, jaywalking is not enforced here in Chicago. Not that the two compare. Which reminds me of a case I had a few years ago. I found and reported an active recorder on the line. The 20 year veteran Chicago Police officer reporting to the scene was convinced that no crime was committed until he checked his 'handy dandy little criminal code book' (his words) to find out that it was indeed a crime. When he radioed in the case there was a barrage of calls on the radio from fellow officers who were also unaware that it was a crime. This is an all party consent state on top of this. Just goes to show you how unaware even a veteran police officer can be. Perry D. Myers, CFE CEO & President Myers Service, Inc. Investigations 2076 N. Elston Ave. Suite 200 Chicago, IL. 60614-3940 Phone 773-342-8300 Facsimile 773-486-4430 email: perry@d... For information on investigative services please visit our web site at www.detectiveservices.com This e-mail is strictly confidential. If you receive this email in error, please forward immediately to info@d... -----Original Message----- From: William L. McCrory [mailto:wmccrory@p...] Sent: Monday, April 10, 2000 10:37 AM To: TSCM-L@egroups.com Subject: Re: [TSCM-L] normal procedure Talk with your attorney. If he or she isn't practicing criminal law, you may want to talk with one who is, and find out what your criminal liability could be under state and federal laws. Consider that if you leave an illegal interception in place, you may well be an accessory after the fact, aiding and abetting a felony, or committing misprision of felony. If your TSCM practice requires you to have a license issued by your state, have your attorney explain any reporting obligations that may attach to having the license. Again, check with your attorney to better understand what may be required of you in your state. One-party consent can only be given by one who is lawfully a party to the conversation being intercepted. Ownership of the line does not automatically convey the right to intercept the conversations of two or more non-consenting parties. In some business settings, employees have signed documents acknowledging that they have been told that their telephone conversations may be monitored, but that does not sound like the case here. Ownership of the line does not affect your standing to "make a complaint." If you know a crime has been committed, either federal or state, you have every right to report it. You are a witness, not a victim. Trace Carpenter wrote: > Seem's like I've been an argument over this before, but I'd still like > to hear input from others in the business. > > We've had instances over the years when after finding a tap, the > client wanted it left alone for self serving reasons. In these > instances it was either a domestic dispute/divorce or corporate > espionage situation. In any event, the taps were illicitly placed. > Therefore they were being left on the line to either place > surveillance on the tap to catch the party, or to launch a > disinformation > campaign. My take on it has always been that Texas is a one party > consent state and the owner of the line now knows the conversation is > being monitored therefore he or she is now the one party. Basically > then we have no Complainant so there are no charges to be filed. > Secondly, regardless of the situation, it's not my phone line so I > have no formal standing to make a complaint or be a > Complainant. I know there are others out there that are hard core > "you must report it." > > Any opinions? > > Dawn Star wrote: > > > Message: 2 > > Date: Thu, 6 Apr 2000 20:20:44 -0400 > > From: "Andre Holmes" <1ach@g...> > > Subject: Re: > > > > Roger wrote I busted a bunch of wiretaps question Roger did you > report your > > findings to the FBI when you first discovered the taps I believe > thats the > > normal procedure that is to report all findings on telcowiring > period. > > -----Original Message----- > > From: Dawn Star > > To: TSCM-L@onelist.com > > Date: Thursday, April 06, 2000 11:44 AM > > Subject: [TSCM-L] > > > > Sure, I called them up and said " I just busted a bunch of your > wiretaps so why don't you come on down to my office and arrest me and > charge me with obstruction of justice and conspiracy" Let me tell > you, it ain't no joke when you sitting across the table from the > F.B.I., D.E.A., I.R.S criminal, and United States Customs and they > want to know why their taps aren't playing music anymore! Roger > > > > [Non-text portions of this message have been removed] > > > > > ------------------------------------------------------------------------ > > > Get a NextCard Visa, in 30 seconds! > > 1. Fill in the brief application > > 2. Receive approval decision within 30 seconds > > 3. Get rates as low as 2.9% Intro or 9.9% Fixed APR > > Apply NOW! > > http://click.egroups.com/1/2646/0/_/507420/_/955237810/ > > > ------------------------------------------------------------------------ > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > -- > *Trace Carpenter > *2926 Maple Ave., Ste. 200 > *Dallas, Texas 75201 > *214.828.4520; 214.740-0112 Facsimile > *Because the fly on the wall might not be the only bug in the room.(tm) > > > ----------------------------------------------------------------------- > > ----------------------------------------------------------------------- > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS ------------------------------------------------------------------------ PERFORM CPR ON YOUR APR! Get a NextCard Visa, in 30 seconds! Get rates as low as 0.0% Intro or 9.9% Fixed APR and no hidden fees. Apply NOW! http://click.egroups.com/1/2121/0/_/507420/_/955387350/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 183 From: James M. Atkinson, Comm-Eng Date: Tue Apr 11, 2000 9:10am Subject: Expensive Monkeys [Humor] Expensive Monkeys A tourist walked into a pet shop near Microsoft's corporate headquarters and was looking at the animals on display. While he was there, another customer walked in and said to the shopkeeper, "I'll have a C monkey please." The shopkeeper nodded, went over to a cage at the side of the shop and took out a monkey. He fit a collar and leash, handed it to the customer, saying, "That'll be $5000." The customer paid and walked out with his monkey. Startled, the tourist went over to the shopkeeper and said, "That was a very expensive monkey. Most of them are only a few hundred dollars. Why did it cost so much?" The shopkeeper answered, "Ah, that monkey can program a computer in C -- very fast, tight code, no bugs, well worth the money." The tourist looked at the monkey in another cage. "That one's even more expensive! $10,000! What does it do?" "Oh, that one's a C++ monkey; it can manage object-oriented programming, Visual C++, even some Java. All the really useful stuff," said the shopkeeper. The tourist looked around for a little longer and saw a third monkey in a cage of its own. The price tag around its neck read $50,000. He gasped to the shopkeeper, "That one costs more than all the other put together! What on earth does it do?" The shopkeeper replied, "Well, I haven't actually seen it do anything, but it says it's a software engineer." =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 184 From: Hartmann Martin Date: Sun Apr 9, 2000 5:01am Subject: Rohde&Schwarz EB 200 Anyone experienced Problems with the new Rohde&Schwarz EB200 Receiver? -sensitivity above 1GHc? -The DIGISCAN Feature(Frequency Hoppers?) -I/Q Demod/Output Thanks. Vic/RADIO SCANNER-Germany ____________________________________________________________________ _______________________________________________________ Get 100% FREE Internet Access powered by Excite Visit http://freelane.excite.com/freeisp 185 From: Equipo de Soporte Date: Mon Apr 10, 2000 5:52am Subject: La Noticia de Boleon-El traductor y los superdominios Ya puedes hacer una prueba de traduccion del ingles al espaÒol y a partor del proximo envio lo podras hacer en 5 o 6 idiomas diferentes, por lo que ya no sera un problema el idioma lo tienes en http://www.eldorado.es [Non-text portions of this message have been removed] 186 From: James M. Atkinson, Comm-Eng Date: Tue Apr 11, 2000 3:50pm Subject: More talking heads about TEMPEST. More talking heads about TEMPEST. I just wish they had quoted me correctly. http://www.smartcomputing.com/editorial/article.asp?article=articles/a rchive/g0804/23g04/23g04.asp&guid=t185b87i -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 187 From: Jesse Thomas Date: Tue Apr 11, 2000 5:28pm Subject: Re: Rohde&Schwarz EB 200 Now that brings back memories of Rohdi & Schwarz training on CMD80's in Menningham, Germany.. Hartmann Martin wrote: > Anyone experienced Problems with the new Rohde&Schwarz EB200 Receiver? > > -sensitivity above 1GHc? > -The DIGISCAN Feature(Frequency Hoppers?) > -I/Q Demod/Output > > Thanks. > > Vic/RADIO SCANNER-Germany > > ____________________________________________________________________ > > _______________________________________________________ > Get 100% FREE Internet Access powered by Excite > Visit http://freelane.excite.com/freeisp > > ------------------------------------------------------------------------ > eGroups + great entertaining = An Unforgettable Easter > Click Below to see how > http://click.egroups.com/1/3124/0/_/507420/_/955480594/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 188 From: Jay Coote Date: Fri Apr 14, 2000 10:04pm Subject: Receiver Discussion I am thinking of adding an AOR SDU-5500 spectral display and Icom TV-R7100 video demodulator to my existing AOR-3000 receiver.... I have also seen an AOR AR7000B in the AES catalog. This covers 0.1-2000 MHz, has selectable NTSC/PAL video demodulator, and spectral display The AR7000 has it's own color LCD display. Is this receiver good, adequate or worse? Also, anyone have comments on the Icom R-8500? I may be looking into one of these receivers and adding the TV- R7100 demodulator and SDU-5500 spectral display. Thanks, Jay Coote Los Angeles 189 From: James M. Atkinson, Comm-Eng Date: Sat Apr 15, 2000 10:11am Subject: Re: Receiver Discussion At 10:45 AM -0400 4/15/00, Jay Coote wrote: >I am thinking of adding an AOR SDU-5500 spectral display and Icom TV-R7100 >video demodulator to my existing AOR-3000 receiver.... > >I have also seen an AOR AR7000B in the AES catalog. This covers >0.1-2000 MHz, has selectable NTSC/PAL video demodulator, and >spectral display >The AR7000 has it's own color LCD display. Is this receiver good, adequate >or worse? > >Also, anyone have comments on the Icom R-8500? I may be looking into one >of these receivers and adding the TV- R7100 demodulator and SDU-5500 > >spectral display. > >Thanks, >Jay Coote >Los Angeles > Jay, The AOR SDU is a complete dog that "lights up the spectrum" when you use it.Use the AVCOM SDM-42 instead. The new HP spectrum analyzers are the way to go as they are capable of handling a wide variety of video signals, AND you can display the signals on the internal monitor. While the product is new and still has a few "issues" it does perform well. Quite a few TSCM'ers are purchasing a PSA-65C and adding the new VDM video demodulator to deal with the various video threats. You can get an entire system suitable for locating video bugs for under 7 grand. The R-8500 with an SDM-42 also makes good system, but you will also need an external TV demodulator and monitor. Don't forget about the lower end of the spectrum as well, there are many nasty little narrow band FM devices down around 20-250 kHz. If your buying new equipment make sure it has coverage below 50 kHz (100 kHz min), and that you can use NFM demodulation in the VLF bands. Watch out for FM video around 17 and 21 MHz on the phone lines -jma PS: Here is what the AVCOM system consists of: PSA-65C Analog Spectrum Analyzer$ 3,230.00 Recommended Options: 10 kHz Resolution Bandwidth Filter$ 325.00 Oscilloscope Interface Option$ 210.00 Sub-Carrier Detector$ 140.00 FM Video Demodulator/AM Module(s)$ 1085.00 1.25 - 2.50 GHz Frequency Extender / Mixer$ 650.00 2.50 - 3.75 GHz Frequency Extender / Mixer$ 650.00 5.70 - 6.20 GHz Frequency Extender / Mixer$ 890.00 Carrying Case$ 105.00 Foam Carry Handle$ 7.50 You will want to obtain a 4" LCD monitor locally, along with a large Pelican, SKB, or similar case to transport the system. =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== [Non-text portions of this message have been removed] 190 From: Mike F Date: Fri Apr 14, 2000 10:44pm Subject: telco site Hi a while back someone listed a Telecom site with info such as wire colors and other things,concerning telephones. My computer crashed a while back and I lost the info. Please send me the Web Address. You can email me privately. thanks, later4,mike fiorentino Michael T. Fiorentino 237 South Edwards Ave #3 Syracuse,NY 13206-2945 EMAIL ME 4 my PHONE NUMBER This electronic message contains information from which may be privileged and confidential. The information isintended for use only by the individuals or entity named above. If you arenot the intended recipient, be aware that any disclosure, copying,distribution, or use of the contents of this informationis prohibited. If you are not the indicated recipient or have received this message in error ontact our offices immediatly for instructions. 191 From: Charles Patterson Date: Sat Apr 15, 2000 7:34pm Subject: Re: telco site Mike, Check out www.ablecomm.com He's got a lot of stuff, mostly about panasonic phones, but he's got wire colors and links to a lot of other sites. Charles Charles Patterson communications@c... Global Communications Tarrytown, NY http://www.telephonesecurity.com ----- Original Message ----- From: Mike F To: TSCM- Sent: Friday, April 14, 2000 11:44 PM Subject: [TSCM-L] telco site > > > Hi a while back someone listed a Telecom site with info such as wire colors > and other things,concerning telephones. > My computer crashed a while back and I lost the info. > Please send me the Web Address. > You can email me privately. > thanks, > later4,mike fiorentino > > > > Michael T. Fiorentino > 237 South Edwards Ave #3 > Syracuse,NY 13206-2945 > > EMAIL ME 4 my PHONE NUMBER > > This electronic message contains information from which may be privileged > and confidential. The information isintended for use only by the individuals > or entity named above. If you arenot the intended recipient, be aware that > any disclosure, copying,distribution, or use of the contents of this > informationis prohibited. If you are not the indicated recipient or have > received this message in error ontact our offices immediatly for > instructions. > > > ------------------------------------------------------------------------ > Avoid the lines and visit avis.com for quick and easy online > reservations. Enjoy a compact car nationwide for only $29 a day! > Click here for more details. > http://click.egroups.com/1/3011/0/_/507420/_/955813058/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 192 From: Trace Carpenter Date: Sat Apr 15, 2000 8:24pm Subject: Re: telco site Mike, It wasn't me but I think the URL you're talking about is http://www.ablecomm.com/colorcodes.htm There are some "colorful" sayings to commit the color orders to memory. I wouldn't want to post it here in the open out of respect to the list and the moderator but feel free to email me if you want one :-) Mike F wrote: > Hi a while back someone listed a Telecom site with info such as wire colors > and other things,concerning telephones. > My computer crashed a while back and I lost the info. > Please send me the Web Address. > You can email me privately. > thanks, > later4,mike fiorentino > > Michael T. Fiorentino > 237 South Edwards Ave #3 > Syracuse,NY 13206-2945 > > EMAIL ME 4 my PHONE NUMBER > > This electronic message contains information from which may be privileged > and confidential. The information isintended for use only by the individuals > or entity named above. If you arenot the intended recipient, be aware that > any disclosure, copying,distribution, or use of the contents of this > informationis prohibited. If you are not the indicated recipient or have > received this message in error ontact our offices immediatly for > instructions. > > ------------------------------------------------------------------------ > Avoid the lines and visit avis.com for quick and easy online > reservations. Enjoy a compact car nationwide for only $29 a day! > Click here for more details. > http://click.egroups.com/1/3011/0/_/507420/_/955813058/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- *Trace Carpenter *2926 Maple Ave., Ste. 200 *Dallas, Texas 75201 *214.828.4520; 214.740-0112 Facsimile *Because the fly on the wall might not be the only bug in the room.ô 193 From: Andy Grudko Date: Sat Apr 15, 2000 8:48am Subject: Re: FM Broadcast Measurement Protocol ----- Original Message ----- > If you find the above protocol helpful then you can at least buy me a > cup of coffee. All this to locate an FM bug........! I know I'm on a different continent but I think it's actually a different planet. We just use a Scanlock 2000, CPR 700 and Optronics Xplorer with spectrum analysis software for this level of sweep. In low background RF saturation areas we do a quick sweep (1 metre max. from all objects), but in high RF backgrounds we sweep as close as possible. We have a find rate of 3 - 4%.......now I fear we might be missing something, except our 'spies' are really not sophisticated. We located an FM device on about 116 Mhz (Cony/Micro/AAA type) 3 weeks ago in a local gov. office. The Scanlock picked it up the momnent it was switched on (almost embarassingly fast considering our fee!!!!) Andy Grudko (CEO), Grudko Wilson Associates (SA) (Pty) Ltd. Criminal Investigators. Johannesburg head office - Est. 1981 - www.grudko.com - (+27 11) 465 9673 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI (President), GIN (Charter), SAMLF ------ "When you need it done right - first time" 194 From: Andy Grudko Date: Sun Apr 16, 2000 9:56am Subject: Hit Test - my reboot after being severely Trojan'ed by the Ericsohn/Nokia eMail bug. Please click on reply so I get your number back into my (deleted) address book (pray no other damage) and then delete this message. Andy Grudko (CEO), Grudko Wilson Associates (SA) (Pty) Ltd. Criminal Investigators. Johannesburg head office - Est. 1981 - www.grudko.com - (+27 11) 465 9673 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI (President), GIN (Charter), SAMLF ------ "When you need it done right - first time" 195 From: Andy Grudko Date: Sun Apr 16, 2000 10:19am Subject: Test Test - my reboot after being severely Trojan'ed by the Ericsohn/Nokia eMail bug. Please click on reply so I get your number back into my (deleted) address book (pray no other damage) and then delete this message. Andy Grudko (CEO), Grudko Wilson Associates (SA) (Pty) Ltd. Criminal Investigators. Johannesburg head office - Est. 1981 - www.grudko.com - (+27 11) 465 9673 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI (President), GIN (Charter), SAMLF ------ "When you need it done right - first time" 196 From: Jordan Ulery Date: Sun Apr 16, 2000 3:57pm Subject: Re: Test Andy Grudko wrote: > Test - my reboot after being severely Trojan'ed by the Ericsohn/Nokia eMail > bug. Please click on reply so I get your number back into my (deleted) > address book (pray no other damage) and then delete this message. > > Andy Grudko (CEO), Grudko Wilson Associates (SA) (Pty) Ltd. Criminal > Investigators. > Johannesburg head office - Est. 1981 - www.grudko.com - (+27 11) 465 9673 > 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI > (President), GIN (Charter), SAMLF ------ "When you need it done right - > first time" > > ------------------------------------------------------------------------ > Avoid the lines and visit avis.com for quick and easy online > reservations. Enjoy a compact car nationwide for only $29 a day! > Click here for more details. > http://click.egroups.com/1/3011/0/_/507420/_/955902836/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 197 From: Steve Uhrig Date: Sat Apr 15, 2000 11:33am Subject: Re: Receiver Discussion - ICOM Once upon a midnight dreary, Jay Coote pondered, weak and weary: > Also, anyone have comments on the Icom R-8500? I may be > looking into one of these receivers and adding the TV- R7100 > demodulator and SDU-5500 spectral display. I will qualify every statement below by first reminding everyone that ICOM receivers are, at best, high end hobby products. They are not professional receivers, but they are so cheap they have taken a share of the market for inexpensive receivers. The R8500 is superior to any AOR. Receiver performance is largely the same amongst all the hobby receivers, but the ease of operation and features is better on the R8500. Before ICOM and SWS got divorced, in our 17 year history with the product I sold several thousand ICOM receivers, including the R8500, and I have not yet had any service problems other than burned out panel lights (a 20 minute repair) on the R8500. The AOR has a noisier IF and more spurs than the ICOM. Noisier IF means weak signals are masked by the noise. Spurs means false alarms. The TV-R7100 is expensive, special order only/3 month delivery and I believe has been discontinued. ICOM would order them in from Japan as needed. In our last year with ICOM, we sold 35 of them, and ICOM overall sold only our 35, so you can see they are not popular. The TV-R7000 is essentially identical, the only difference being physical packaging and the TV-R7100 having an ACG line which the earlier one does not. The AGC line does not come into play except with very strong signals and you will not miss it. The things are AM video only and pretty soft, but they do work. They are no substitute for a dedicated video receiver by a competent manufacturer though. There is more factory and aftermarket support for ICOM than AOR. The AOR line was handled primarily by EEB, but now that they are out of business you may have trouble getting service. I have owned 4 AOR receivers. All four needed factory service, one three times. One was provided free by AOR in an attempt to convince me to sell their product. They didn't like it when they ran into someone who genuinely understood the receiver market. The AVCOM and AOR and Grove spectrum monitors are toys. They all are knockoffs of the Atlantic Electronics units which were designed for NSA and to their specs, and are available exclusively through CSE Associates www.cse-assoc.com. You can find the stuff on CSE's website under Products | Atlantic Electronics. CSE's phone number is 301-898-9360. Ask for Ozzie, who is the fellow who designed the thing. Some years ago, Fort Meade (NSA) bought thousands of ICOM receivers each year. They used them as throwaway receivers in spy kits. They left the country and had an average lifetime of 6 weeks. Each unit also included a signal monitor. They wrote the spec, Atlantic Electronics made several units which met their various specs, and the Fort in turn bought thousands of the monitors along with the ICOM receivers. Tons of them (I know; I paid the freight bills). EEB, now defunct, was an ICOM dealer sniffing after a chunk of that business. They originally bought the signal monitors from CSE Associates and supplied their own ICOM receivers and competed with us. Then they decided to build their own unit and take the business away from Atlantic/CSE. They had AOR build a signal monitor intended to be cheaper. In the process, performance suffered. AVCOM (down the street from EEB) and Grove also tried to build their own versions. NSA tested and accepted none of them. Cost was not an issue if the things did not do the job. I personally have used all of them, and the Atlantic Electronics unit is superior. Weak signals not above the noise on the others are clearly visible on the Atlantic Electronics. Cost is about the same. The SM-7071 is the appropriate monitor for ICOM receivers. Even though tens of thousands of them have been delivered to the government, you never see one on the used market. When we quit being an ICOM dealer, NSA switched to Watkins Johnson receivers and ICOM lost the major customer for their receivers. With our volume, we could buy a few extra and supply our associates at less than normal dealer price. Any ICOM dealer currently can get an unblocked receiver just for the asking. All the dealer has to do is certify verbally to ICOM that the thing is going to a legitimate customer. This is a recent policy change. If you can convince a friendly dealer that TSCM is a legitimate use for full coverage, you'll get it. Best time to try this is when you are buying something else from him. And having some formal certification or other paper demonstrating you are indeed involved in TSCM in the real world, not just your own mind, will help and probably be required. While I'm on the subject of receivers, I'll state that the R7000 was very good, the R7100 miserable and should be avoided, R100 very good, R8500 superb, R9000 very miserable and should be avoided at all costs, especially used. All the handheld receivers are toys only. R7000, R7100, R100 and R9000 all are out of production. Don't buy any new receiver in its first year of production. They all have problems in the beginning and the early users pay for the privilege of being guinea pigs. ICOM traditionally has been of little assistance helping to resolve receiver problems. Dealers know nothing about the product other than how to sell it, and for the most part are worthless with technical problems. Dealers' extent of engineering or service capability is to make out a UPS label to return the radio to ICOM's repair facility. Avoid any receiver which has been modified. Some basement hacker is unlikely to outsmart the ICOM engineers. Virtually all the mods have side effects. Speeding up the scan, for example, (a popular mod) means the receiver does not dwell on a channel long enough for the PLL to settle fully, thus resulting in lower sensitivity and the likelihood of the scan not stopping on legitimate signals. One thing that should be done is to run the large receivers from an external 12 volt supply. The internal supplies run too hot and eventually will cause the receiver to fail, especially if racked and stacked. The R8500 was the first receiver to use an external power supply, which also keeps the receiver itself lighter and smaller. We service in house all ICOM receivers and ICOM commercial equipment for anyone who needs service. For that matter, we will service any quality brand of communications equipment except cell phones and pagers, and we are a Motorola shop if anyone needs accessories or parts. We also service Motorola Securenet equipment. ICOM receivers and the associated gingerbread are OK things to have for manually tuning. They are of little value as exclusive pieces for radiated TSCM work. Will be glad to answer any questions on the ICOM line or accessories. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 198 From: Mike F Date: Sat Apr 15, 2000 10:08pm Subject: CONSUMER ELECTRONICS LINKS & Repair Electronics Links How 2 Repair Electronics Links & CONSUMER ELECTRONICS LINKS & http://isdl.ee.washington.edu/CE/CEPointers.html Michael T. Fiorentino 237 South Edwards Ave #3 Syracuse,NY 13206-2945 EMAIL ME 4 my PHONE NUMBER This electronic message contains information from which may be privileged and confidential. The information isintended for use only by the individuals or entity named above. If you arenot the intended recipient, be aware that any disclosure, copying,distribution, or use of the contents of this informationis prohibited. If you are not the indicated recipient or have received this message in error ontact our offices immediatly for instructions. 199 From: William L. McCrory Date: Sat Apr 15, 2000 10:17pm Subject: Re: telco site Mike, This may not be the site cited, but it has good info anyway. http://www.hubbell-premise.com/TechInfo.asp Bill McCrory 200 From: Mike F Date: Sat Apr 15, 2000 11:25pm Subject: TELCO SITE There are some "colorful" sayings to commit the color orders to memory. The sayings are for Resistor color codes,at least the ones I heard were in electronics especially lab,you needed to have those color codes commited to memory. Thanks for site info. I sure someone has mentioned this,your part of management of counter-spies, is your name really Tracy or Trace? If so your name really goes with your Profession later4,mike f Michael T. Fiorentino 237 South Edwards Ave #3 Syracuse,NY 13206-2945 EMAIL ME 4 my PHONE NUMBER This electronic message contains information from which may be privileged and confidential. The information isintended for use only by the individuals or entity named above. If you arenot the intended recipient, be aware that any disclosure, copying,distribution, or use of the contents of this informationis prohibited. If you are not the indicated recipient or have received this message in error ontact our offices immediatly for instructions. -----Original Message----- From: Trace Carpenter [mailto:mgmt@c...] Sent: Saturday, April 15, 2000 9:24 PM To: TSCM-L@egroups.com Subject: Re: [TSCM-L] telco site Mike, It wasn't me but I think the URL you're talking about is http://www.ablecomm.com/colorcodes.htm There are some "colorful" sayings to commit the color orders to memory. I wouldn't want to post it here in the open out of respect to the list and the moderator but feel free to email me if you want one :-) Mike F wrote: > Hi a while back someone listed a Telecom site with info such as wire colors > and other things,concerning telephones. > My computer crashed a while back and I lost the info. > Please send me the Web Address. > You can email me privately. > thanks, > later4,mike fiorentino > > Michael T. Fiorentino > 237 South Edwards Ave #3 > Syracuse,NY 13206-2945 > > EMAIL ME 4 my PHONE NUMBER > > This electronic message contains information from which may be privileged > and confidential. The information isintended for use only by the individuals > or entity named above. If you arenot the intended recipient, be aware that > any disclosure, copying,distribution, or use of the contents of this > informationis prohibited. If you are not the indicated recipient or have > received this message in error ontact our offices immediatly for > instructions. > > ------------------------------------------------------------------------ > Avoid the lines and visit avis.com for quick and easy online > reservations. Enjoy a compact car nationwide for only $29 a day! > Click here for more details. > http://click.egroups.com/1/3011/0/_/507420/_/955813058/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- *Trace Carpenter *2926 Maple Ave., Ste. 200 *Dallas, Texas 75201 *214.828.4520; 214.740-0112 Facsimile *Because the fly on the wall might not be the only bug in the room.ô ------------------------------------------------------------------------ eGroups + great entertaining = An Unforgettable Easter Click Below to see how http://click.egroups.com/1/3124/0/_/507420/_/955848261/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 201 From: gerard p. keenan Date: Sun Apr 16, 2000 2:49pm Subject: Re: Hit -----Original Message----- From: Andy Grudko To: TSCM-L@egroups.com ; TSCM-L Mailing List Date: Sunday, April 16, 2000 12:33 PM Subject: [TSCM-L] Hit >Test - my reboot after being severely Trojan'ed by the Ericsohn/Nokia eMail >bug. Please click on reply so I get your number back into my (deleted) >address book (pray no other damage) and then delete this message. > >Andy Grudko (CEO), Grudko Wilson Associates (SA) (Pty) Ltd. Criminal >Investigators. > Johannesburg head office - Est. 1981 - www.grudko.com - (+27 11) 465 9673 >465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI >(President), GIN (Charter), SAMLF ------ "When you need it done right - >first time" > > > >------------------------------------------------------------------------ >Avoid the lines and visit avis.com for quick and easy online >reservations. Enjoy a compact car nationwide for only $29 a day! >Click here for more details. >http://click.egroups.com/1/3011/0/_/507420/_/955902791/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > 202 From: Miguel Puchol Date: Sun Apr 16, 2000 4:15pm Subject: RE: Receiver Discussion Hi Jay, I have an AR5000 with the SDU5500. For anything but hobby work it's not the best choice. The SDU has nice features, like presenting the sweep in channel steps resolution (i.e. 12.5kHz steps, etc.) but it's very sloooooow. I just borrowed a TV-R7000 from a friend, and I'm in the process of making the mod to it so it works with AOR rigs, I'll post some results when I get it working. Besides this, I would rather go for the AR5000 than the Icom R-8500, it has a wider RX range, and it is a LOT more sensitive above 1300 MHz than the Icom. For example, with the same antenna, Inmarsat (around 1540 MHz) was recived quite well by the 5000, while the signal was very noisy and didn't even make the needle bump on the 8500. The 5000 is half as big and weighs half of what the 8500 does, so it's better for moving around. With the 5000 you get the choice to switch between up to 4 antennas, for the frequency ranges that you specify for each one of them, automatically. Just my opinion, all the best, Mike > -----Mensaje original----- > De: Jay Coote [mailto:TSCM@j...] > Enviado el: lunes, 01 de enero de 1601 1:00 > Para: tscm-l@onelist.com > Asunto: [TSCM-L] Receiver Discussion > > > I am thinking of adding an AOR SDU-5500 spectral display and Icom TV-R7100 > video demodulator to my existing AOR-3000 receiver.... > > I have also seen an AOR AR7000B in the AES catalog. This covers > 0.1-2000 MHz, has selectable NTSC/PAL video demodulator, and > spectral display > The AR7000 has it's own color LCD display. Is this receiver > good, adequate > or worse? > > Also, anyone have comments on the Icom R-8500? I may be looking into one > of these receivers and adding the TV- R7100 demodulator and SDU-5500 > > spectral display. > > Thanks, > Jay Coote > Los Angeles 203 From: Andy Grudko Date: Mon Apr 17, 2000 1:25pm Subject: Re: Test Info. loaded - thank you ye Andy Grudko (CEO), Grudko Wilson Associates (SA) (Pty) Ltd. Criminal Investigators. Johannesburg head office - Est. 1981 - www.grudko.com - (+27 11) 465 9673 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI (President), GIN (Charter), SAMLF ------ "When you need it done right - first time" ----- Original Message ----- From: Jordan Ulery To: Sent: Sunday, April 16, 2000 9:57 PM Subject: Re: [TSCM-L] Test > > > Andy Grudko wrote: > > > Test - my reboot after being severely Trojan'ed by the Ericsohn/Nokia eMail > > bug. Please click on reply so I get your number back into my (deleted) > > address book (pray no other damage) and then delete this message. > > > > Andy Grudko (CEO), Grudko Wilson Associates (SA) (Pty) Ltd. Criminal > > Investigators. > > Johannesburg head office - Est. 1981 - www.grudko.com - (+27 11) 465 9673 > > 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI > > (President), GIN (Charter), SAMLF ------ "When you need it done right - > > first time" > > > > ------------------------------------------------------------------------ > > Avoid the lines and visit avis.com for quick and easy online > > reservations. Enjoy a compact car nationwide for only $29 a day! > > Click here for more details. > > http://click.egroups.com/1/3011/0/_/507420/_/955902836/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > ------------------------------------------------------------------------ > IT Professionals: Match your unique skills with the best IT projects at > http://click.egroups.com/1/3381/0/_/507420/_/955922249/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 204 From: Jay Coote Date: Thu Apr 20, 2000 6:24pm Subject: Orphan Ani Can someone post me the ANI numbers and any other useful telephone numbers? I am in the Southern CA area (usually). Thanks, Jay Coote Los Angeles 205 From: Date: Thu Apr 20, 2000 6:44pm Subject: RE: Orphan Ani 800 346 0152 /M Michael J. Canaan President Trident Investigative Service, Inc. Corporate Special Services P.O. Box 1950 Renton, WA 98057-1950 901 Rainier Avenue North Suite B-202 Renton, WA 98055 Office:(206) 772-9646 Facsimile:(206) 772-9647 Cellular:(206) 660-1100 Pager:(206) 609-7773 [24 Hour Numeric] Email:mike@t... Web:www.tridentseattle.com -----Original Message----- From:Jay Coote [mailto:TSCM@j...] Sent:Friday, July 10, 2893 3:44 PM To:TSCM-L@egroups.com Subject:[TSCM-L] Orphan Ani Can someone post me the ANI numbers and any other useful telephone numbers? I am in the Southern CA area (usually). Thanks, Jay Coote Los Angeles ------------------------------------------------------------------------ Enjoy the award-winning journalism of The New York Times with convenient home delivery. And for a limited time, get 50% off for the first 8 weeks by subscribing. Pay by credit card and receive an additional 4 weeks at this low introductory rate. http://click.egroups.com/1/3102/0/_/507420/_/956273087/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 206 From: Mike F Date: Fri Apr 21, 2000 6:58am Subject: ANAC I noticed that the last ANAC had been already posted.So here is anothe one works all across nation.As I mentioned if you send me the area code you are in I might have the local ANAC,which is always better to use. I say the local ANAC's are better because the national ones if over-used will shut down. later4,mike f. 1-888-294-7514 Call this number and listen for a few seconds until the end of the outgoing greeting.Then the ANAC comes on. Michael T. Fiorentino Syracuse,NY 13206-2945 "CONFIDENTIALITY WARNING This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 207 From: Mike F Date: Fri Apr 21, 2000 7:03am Subject: RE: Orphan Ani Jay here is ANAC,Automatic Number Announcement Circuit. 1-800-346-0152 , If you give me the area codes ,I might be able to send the local 3 digit ANAC,nunbers which are better to use. later4,mike fiorentino -----Original Message----- From: Jay Coote [mailto:TSCM@j...] Sent: Friday, July 10, 2893 6:44 PM To: TSCM-L@egroups.com Subject: [TSCM-L] Orphan Ani Can someone post me the ANI numbers and any other useful telephone numbers? I am in the Southern CA area (usually). Thanks, Jay Coote Los Angeles ------------------------------------------------------------------------ Enjoy the award-winning journalism of The New York Times with convenient home delivery. And for a limited time, get 50% off for the first 8 weeks by subscribing. Pay by credit card and receive an additional 4 weeks at this low introductory rate. http://click.egroups.com/1/3102/0/_/507420/_/956273087/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 208 From: Jay Coote Date: Sat Apr 22, 2000 7:10pm Subject: Re: Orphan Ani Thanks! ---------- > 800 346 0152 > > /M > > Michael J. Canaan > President > Trident Investigative Service, Inc. > Corporate Special Services > > P.O. Box 1950 > Renton, WA 98057-1950 > > 901 Rainier Avenue North > Suite B-202 > Renton, WA 98055 > > Office:(206) 772-9646 > Facsimile:(206) 772-9647 > Cellular:(206) 660-1100 > Pager:(206) 609-7773 [24 Hour Numeric] > Email:mike@t... > Web:www.tridentseattle.com > > -----Original Message----- > From:Jay Coote [mailto:TSCM@j...] > Sent:Friday, July 10, 2893 3:44 PM > To:TSCM-L@egroups.com > Subject:[TSCM-L] Orphan Ani > > Can someone post me the ANI numbers and any other useful telephone numbers? > I am in the Southern CA area (usually). > Thanks, > Jay Coote > Los Angeles > > > ------------------------------------------------------------------------ > Enjoy the award-winning journalism of The New York Times with > convenient home delivery. And for a limited time, get 50% off for the > first 8 weeks by subscribing. Pay by credit card and receive an > additional 4 weeks at this low introductory rate. > http://click.egroups.com/1/3102/0/_/507420/_/956273087/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > ------------------------------------------------------------------------ > Enjoy the award-winning journalism of The New York Times with > convenient home delivery. And for a limited time, get 50% off for the > first 8 weeks by subscribing. Pay by credit card and receive an > additional 4 weeks at this low introductory rate. > http://click.egroups.com/1/3102/0/_/507420/_/956282442/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 209 From: Jay Coote Date: Tue Apr 25, 2000 6:12pm Subject: Another ANI-ANAC Question To the person who gave me info on the newbie site ANAC text, thanks. I could use some more info on that, or other sites like it. To other readers, I am still looking for some more good ANI - ANAC numbers for California and Southwestern US area codes. 211-2345 seems to work in most Southern CA PacBell areas- not sure about GTE. Thanks, Jay Coote Los Angeles 210 From: James M. Atkinson, Comm-Eng Date: Tue Apr 25, 2000 7:42pm Subject: Mafiaboy I realize that the following only loosely involves TSCM, but I though it would be of interest to the list now that they actually have laid charges against the person responsible (one down, three to go...). - The following is based on my own research (which is private). About two years ago someone using the nickname of "NiGhTmArE" became active in various IRC chat rooms, joined various hacker mailing lists, and exhibited all of the signs of a newbie (he was 14 years old). Short afterwards he changed his handle to mafiaboy and posted to various groups begging for passwords and "pimping warez". Occasionally "mafiaboy" would drop his real name as "Mike", Mike C.", or "Mike Calce", and several times signed his messages "Justin Farcus" or simply "Farcus". Several time he also posted using a "farcus51" email address. On several occasions he mentioned that he lived near Quebec, and one one occasion listed his city as being Roxboro. He passed his phone number around on IRC channels which he thought was private, and listed his phone number on his website at his ISP (mostly phreaker groupies). At that time he was using the Email address and web page at dsuper.net Mike Calce AKA: NiGhTmArE AKA: Justin Farcus AKA: Mafiaboy Roxboro, QC E-mail: mafiaboy@d... Mid 1999 he began using several other aliases including Ganster, Gansters-Clan, Canadian Gangster, Brain Buzz, Brain Boy, and several other "script kiddie" handles. The name "Paul Calce" has been reported in the press as the name of the kids father (who the RCMP claims was trying hire a hit man). I did a little research on the name and came up with the following address (which may or may not be the kids father and current address). Paul Calce 6135 Rue Harvey Pierrefonds, QC H8Z 2K8 I also checked the surrounding area for other related information and came up with the following address associated with the kid (at one time or another he used this name and/or address). J Calce 777 Louis Fornel Boucherville, QC J4B 1A2 Shortly after the first wave of attacks I was asked to analyze (by a paying customer) some of the log files that turned up on the West Coast related to this incident. I was able to trace the suspect activity back to sympatico.ca and dsuper.net accounts which had an account name of "Justin Farcus", with a phone number in Boucherville. Now this "Justin Farcus" in Boucherville may or may not be related to the "J Calce" (also in Boucherville), but it is a really strange coincidence. What Mafiabrat/Mike failed to realize is that since broadband Internet connections are so subject to abuse that cable modem based ISP companies keep DETAILED logs of what their customers do on-line... Doom on Mafiabrat ... -jma PS: I actually had an ID on this kid three days after the Yahoo attack =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== From: James M. Atkinson Date: Wed Apr 10, 2002 8:46pm Subject: Russia says uncovers U.S. spy ring http://uk.news.yahoo.com/020410/80/cwbo7.html Wednesday April 10, 07:17 PM Russia says uncovers U.S. spy ring By Clara Ferreira-Marques MOSCOW (Reuters) - Russia's security police has accused the United States of drugging a scientist in a cloak-and-dagger conspiracy to steal military secrets. The allegations on Wednesday were a throwback to tit-for-tat spy scandals which dominated the chilly first months of the presidencies of Vladimir Putin and George W. Bush, and they sounded a sour note ahead of the two men's summit in Russia next month. Sketchy but exotic details of the spy case were described by unidentified officers of the FSB security police, appearing on the evening television news with their faces in silhouette. They said the Russian scientist had stumbled into one of Moscow's consulates in another former-Soviet republic with his memory apparently wiped out by drugs, recalling only that he had visited a U.S. embassy to check on family in the United States. "He was brought to Moscow and here the FSB did some tests on him, and we established that he had known some government secrets and that he had been under psychoactive drug treatment for a long time," a concealed FSB officer told NTV television. The scientist had been recruited by the CIA, which gave him instructions in letters written in invisible ink, the officer said, adding the espionage was thwarted before damage was done. Footage of a young Asian woman was shown, and the news reports said she was a CIA agent responsible for the operation who had posed as a junior American diplomat but was no longer in Russia. Officials at the U.S. embassy in Moscow and the CIA in Washington declined to comment. The FSB did not answer calls. In March last year, the Bush administration expelled 50 Russian diplomats from the United States, prompting a tit-for-tat response from the Kremlin in the worst spy scandal to shake Moscow and Washington since the Cold War. Russia and the United States have greatly improved ties since the September 11 attacks against U.S. cities, when Putin was among the first to offer his support. The Kremlin has since backed the U.S.-led war on terrorism. But the FSB charges add to a growing list of woes likely to crop up at the May 23-25 summit in Moscow and St Petersburg, already set to include bickering over U.S. poultry imports, a U.S.-funded radio broadcast to Russia's separatist Chechnya region and nuclear disarmament. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5164 From: James M. Atkinson Date: Wed Apr 10, 2002 8:45pm Subject: Russia: U.S. spy plot foiled http://www.cnn.com/2002/WORLD/europe/04/10/russia.spy/index.html Russia: U.S. spy plot foiled April 10, 2002 Posted: 9:56 AM EDT (1356 GMT) MOSCOW, Russia -- Russia's Federal Security Bureau said on Wednesday it had uncovered a U.S. plan to steal Russian military secrets. The spy allegations come just over a month before President Vladimir Putin and his U.S. counterpart, George W. Bush, are due to meet for a summit in Moscow and St Petersburg. According to the Interfax news agency, CIA officials posing as U.S. diplomats tried to recruit an expert in a secret Defence Ministry plant before the FSB -- successor to the Soviet-era KGB -- stepped in. The news agency said Russia's national security had not been jeopardised. The classified information being sought by the CIA was about new Russian weaponry and about Russian military cooperation with ex-Soviet republics, Interfax said. It allegedly involved trips to other countries. Inside Russia, the CIA communicated with their informer through dead letter boxes and secret messages, according to the Russian secret service. "The FSB has irrefutable evidence of the CIA's spying activities in Russia," an FSB official was quoted as saying. "The work was carried out by CIA officers, working under the cover of American diplomats in Moscow and in one of the CIS states," the unnamed official said. He named a woman junior diplomat in the U.S. embassy in Moscow as leading the operation, adding that the diplomat had already left Russia. The U.S. embassy declined to comment on the accusations. The FSB was unavailable for comment. In March 2001, 50 Russian diplomats were expelled from the United States, prompting a tit-for-tat response from the Kremlin in the worst spy scandal to shake Moscow and Washington since the Cold War. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5165 From: James M. Atkinson Date: Wed Apr 10, 2002 8:48pm Subject: Russian Security Service Says CIA Tried to Steal Military Secrets http://www.foxnews.com/story/0,2933,50026,00.html Russian Security Service Says CIA Tried to Steal Military Secrets Wednesday, April 10, 2002 MOSCOW - The Russian successor to the KGB on Wednesday accused the CIA of trying to acquire military secrets, allegations that include such traditional spy tradecraft as invisible ink, secret drop points and mind-altering drugs. Russian television showed grainy footage provided by security services. Mark Mansfield, spokesman for the Langley, Va.-based CIA, declined to comment Wednesday. Agency officials routinely decline to discuss foreign allegations of U.S. espionage. Despite the end of the Cold War, experts say the spy business is alive and well between Russia and the United States and that both sides have a healthy interest in trying to predict the other's next moves - even if they're now allies. A spokesman for the Federal Security Service, the Soviet-era KGB's chief successor, said CIA officers posing as embassy officials in Russia and another, unidentified ex-Soviet republic had tried to recruit an employee at a secret Russian Defense Ministry installation. The security service interfered at an early stage and was able to monitor the CIA officers' activities and prevent serious damage to Russia's security, the spokesman said on condition of anonymity. The service named two alleged participants in the operation: David Robertson, whose post at an unnamed embassy in the former Soviet Union was not described, and Yunju Kensinger, reportedly a third secretary in the consular department of the U.S. Embassy in Moscow. The Interfax news agency, citing an "informed source," said Kensinger had already left Moscow. It quoted the security service's press office as saying that Kensinger, like other alleged American intelligence agents in Russia, had not met personally with her Russian contact or contacts. Instead, she used secret drop points and messages in invisible ink. State-controlled ORT television showed grainy footage of a woman identified as Kensinger walking with other embassy employees. It also broadcast pictures of a plastic-wrapped package stashed among some bushes in what it identified as the Sokolniki region of Moscow, and an interview in a darkened room with a man identified as a Federal Security Service operative. He explained that the Russian Defense Ministry employee, identified only by his first name, Viktor, had gone to a U.S. Embassy in another former Soviet republic last spring to try to find information about a relative who had gone missing abroad. Embassy officers allegedly slipped him psychotropic drugs to get information, because he was found a week later wandering the streets in shock and with amnesia. The ITAR-Tass news agency reported that only after psychiatric treatment had Viktor - whom a security service employee called a "real patriot" - been able to reconstruct the details of his visit. "As a result, the Federal Security Service took the necessary steps to stop the leak of Russian secrets through this channel and unmask the Langley employees who used the most unscrupulous methods," ITAR-Tass said. The U.S. Embassy in Moscow would not comment on the espionage accusation, which followed a warm spell prompted by Russia's participation in the U.S.-led anti-terror campaign. Analysts noted the latest spy scandal emerged just weeks ahead of a May summit between President Bush and Putin. "It's the choice of timing that immediately raises questions," said Tom Sanderson of the Center for Strategic and International Studies in Washington. "There are a number of people who are unhappy at how Putin is walking in lockstep with the Americans." Viktor Kremenyuk, deputy director for the USA-Canada Institute in Moscow, doubted the scandal will affect the summit. "Of course spy scandals aren't good for bilateral relations, but they don't have any negative consequences," he told the Interfax news agency. Relations haven't been too cozy, however. In December, President Bush announced that the United States would dump the Anti-Ballistic Missile Treaty, which Moscow had vowed to preserve. The two nations also sparred over newly imposed U.S. steel tariffs, which Russia says will severely damage its metals industry, and Russia's ban on U.S. poultry. Shortly after Putin, a former KGB agent, became acting president in December 1999, U.S. businessman Edmond Pope became the first American convicted of spying in Russia in 40 years. Putin pardoned him shortly after his conviction. Last year, Russia ordered 50 U.S. diplomats to leave the country, mirroring the U.S. expulsion of Russian diplomats following the arrest of FBI agent Robert Hanssen on charges of spying for Moscow. The Russians' arrest of U.S. Fulbright scholar John Tobin on marijuana charges also attracted wide attention after security officials said they believed he was a spy in training. Tobin was freed from prison last August. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5166 From: James M. Atkinson Date: Wed Apr 10, 2002 8:47pm Subject: CIA 'drugged Russian defence worker to get military secrets' http://news.independent.co.uk/world/russia/story.jsp?story=283659 11 April 2002 00:38 GMT+1 Home > News > World > Russia CIA 'drugged Russian defence worker to get military secrets' By Judith Ingram 11 April 2002 Russia's main security service has accused the Central Intelligence Agency of trying to acquire Russian military secrets, using two agents posing as American diplomats to try to recruit a Russian Defence Ministry employee. A spokesman for the security service said that CIA officers posing as embassy officials in Russia and another, unnamed former Soviet republic had tried to recruit an employee at a secret defence installation, identified only as Viktor. The service named two alleged participants in the operation: David Robertson, whose post at an unnamed embassy in the former Soviet Union was not described, and Yunju Kensinger, an official at the US embassy in Moscow. The Interfax news agency, citing an "informed source", said Ms Kensinger had left Moscow. It quoted the security service's press office as saying that Ms Kensinger had not personally met her Russian contact or contacts. Instead, she used secret drop points and messages in invisible ink. State-controlled ORT television showed grainy footage of a woman identified as Ms Kensinger walking with other embassy employees. It also broadcast pictures of a plastic-wrapped package stashed among bushes in what it identified as the Sokolniki region of Moscow, and an interview in a darkened room with a man described as a Federal Security Service operative. He explained that the Russian employee had gone to a US embassy in a former Soviet republic to try to find information about a relative who had gone missing abroad. Embassy officers allegedly slipped him drugs to get information out of him. He was found with shock and amnesia, but was later able to reconstruct the details of his visit. (AP) -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5167 From: Fernando Martins Date: Wed Apr 10, 2002 4:20pm Subject: 2002 CSI/FBI computer crime and security survey http://www.gocsi.com/press/20020407.html Any comments regarding this survey? FM 5168 From: Charles P Date: Wed Apr 10, 2002 5:51pm Subject: Voicemail Hacking at HP Voicemail hacking hits the news: URL: http://www.sfgate.com/cgi-bin/article.cgi?file=/news/archive/2002/04/10/fina ncial1539EDT0111.DTL (04-10) 13:24 PDT SAN JOSE, Calif. (AP) -- Two days before Hewlett-Packard Co. shareholders voted on the contested purchase of Compaq Computer Corp., HP chief Carly Fiorina told her top lieutenant she was nervous about the outcome and suggested taking "extraordinary" steps to win over two big investors. "If you would take Deutsche Bank, I'll take Northern Trust, get on the phone and see what we can get, but we may have to do something extraordinary for those two to bring them over the line here," Fiorina said in a voice mail to chief financial officer Robert Wayman. The message was anonymously forwarded to a reporter at the San Jose Mercury News, which printed a transcript of it Wednesday and made the audio clip available online. The disclosure comes as HP's last-minute moves to win support for the $19 billion Compaq deal are at the center of a lawsuit against the company by dissident director Walter Hewlett. Hewlett, the son of an HP co-founder and the leader of the proxy fight against the deal, claims HP improperly got the investment arm of Deutsche Bank to switch 17 million votes in favor of the deal by threatening to take future business away from the bank. Deutsche had helped arrange a multibillion-dollar line of credit for HP just days earlier. Hewlett wants a Delaware judge to throw out Deutsche Bank's votes, which he believes were enough to give HP what Fiorina called a "slim but sufficient" margin of victory in the March 19 vote. Fiorina's voice mail to Wayman apparently was retrieved by someone with access to an internal server connected to the company phone system. HP confirmed that it was authentic, but claimed that nothing discussed in the message was improper or illegal. Wayman said in a statement that HP executives were constantly assessing whether they had effectively pitched the deal to large investors and "did in fact make extraordinary efforts" in the final days, with dozens of last-minute presentations. Still, Hewlett's lawyers believe the voice mail could support their Delaware lawsuit and expect the message will be turned over in the pretrial discovery phase. The trial is scheduled to begin April 23. Dennis Block, who heads the mergers and acquisitions division at the Cadwalader, Wickersham & Taft law firm in New York, said the voice mail shows that Fiorina and Wayman went all out to lobby investors but is not in itself evidence they resorted to improper or coercive tactics. "I do not view the voice mail as a smoking gun," he said. But Charles Elson, director of the corporate governance program at the University of Delaware, said the voice mail "certainly does not help" HP's case. "The use of the term `extraordinary' leads one to question what kind of means are extraordinary," Elson said. In her message to Wayman on the night of March 17, Fiorina said she and HP's proxy solicitor were nervous that Deutsche Bank and Northern Trust would reject the deal. Deutsche Bank controlled 25 million HP shares; Northern Trust Global Investors had about 13 million. "And so the suggestion is that you call the guy at Deutsche Bank again first thing Monday morning," Fiorina said in the voice mail. "And if you don't get the right answer from him, then you and I need to demand a conference call, an audience, etc., to make sure that we get them in the right place. So, Alan (Miller, HP's proxy solicitor) is feeling like you need a definite answer from the vice chairman, and if it's the wrong one, we have to swing into action." Deutsche Bank has refused to comment. Northern Trust Global Investors would not disclose whether it voted for or against the deal, but said its position did not change at all in the final days. HP shares rose 31 cents to close at $17.72 on the New York Stock Exchange, where shares of Houston-based Compaq gained 48 cents to $9.76. 5169 From: Steve Whitehead Date: Thu Apr 11, 2002 5:52am Subject: Rooivalk secrets take wings "Pretoria - Thieves who broke into the closely guarded Denel complex in Pretoria knew exactly what they wanted. Only computer hard disks containing information of the Rooivalk attack helicopter were stolen in the burglary that shows signs of industrial espionage. From evidence in the investigation thus far it appears the thieves knew exactly what they wanted and were not interested in computer equipment when they burgled the Denel aviation department. The National Intelligence Agency (NIA) has joined police in the investigation, said NIA spokesperson Lorna Daniels on Wednesday. Knew details about security The joint probe was initiated as Denel's manufacturing plants are regarded as national key points. Johan Holdt, who heads the Denel department, said the thieves were clearly in possession of information about the triple electrified fence surrounding the complex as well as its offices since they went directly to the offices from where they stole the computers. Information stored on the hard-disks pertained mainly to the Rooivalk helicopter project, as well as Hawk fighter jet tail-section manufacturing details, which Denel manufactures on contract. Holdt noted that the information mainly comprised details about helicopter production for the air force. "We are almost certain that no blueprints were stolen. We keep those technical details elsewhere." The thieves dug a tunnel under the electrified fence and then gained access to the building through a window three metres above the ground where the section for military aircraft is located. Holdt said the window had not been not shut properly, but that it wasn't certain whether this had been done on purpose. Power supply to the electrified fence is switched off at times and it appears the thieves were probably aware of these times. The hard-disks of 25 desktop and laptop computers were stolen as well as an overhead projector. Holding partnership talks Closed-circuit security cameras were installed at strategic points after a spate of thefts in the workshops, which had put an end to these thefts. The cameras were mainly in the workshops and failed to record the weekend burglary. Additional security measures have been put into place to prevent a repeat burglary. The police said no arrests had been made. The government and BAE Systems of Britain, manufacturer of Hawk training fighter jets, are holding talks to negotiate a strategic partnership between Denel and BAE Systems, which could result in partial privatisation of Denel. Denel manufactures aircraft and other spare parts for a variety of commercial clients including Boeing and Rolls-Royce. Denel's military aircraft section has been upgrading air force aircraft for several years. After the decision to acquire Hawk and Gripen fighter jets for the air force, the company became involved in manufacturing certain components of the two types of fighter jets locally" Story at http://www.news24.co.za/News24/South_Africa/Gauteng/0,1113,2-7-829_1166897,00.html Steve Whitehead E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa [Non-text portions of this message have been removed] 5170 From: David Alexander Date: Thu Apr 11, 2002 10:56am Subject: Re: Emotional, Mental, and Personality Disorders >My inferiority complex is bigger and better than anyone else's. You know, I never thought I would ever see two men argue over who had the smallest one of anything. Then someone invented mobile phones _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 5171 From: Matthew Paulsen Date: Thu Apr 11, 2002 11:33am Subject: RE: Re: Emotional, Mental, and Personality Disorders NoSlfCntrl@a... (smirk, psychology) A Stanford research group advertised for participants in a study of obsessive-compulsive disorder. They were looking for therapy clients who had been diagnosed with this disorder. The response was gratifying; they got 3,000 responses about three days after the ad came out. All from the same person. Heard from NY Disk Jockey Bob Shannon on WCBS-FM, an oldies station. -----Original Message----- From: David Alexander [mailto:david.alexander@b...] Sent: Thursday, April 11, 2002 8:57 AM To: 'TSCM submissions' Subject: [TSCM-L] Re: Emotional, Mental, and Personality Disorders >My inferiority complex is bigger and better than anyone else's. You know, I never thought I would ever see two men argue over who had the smallest one of anything. Then someone invented mobile phones _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5172 From: Matthew Paulsen Date: Thu Apr 11, 2002 11:29am Subject: RE: Re: Emotional, Mental, and Personality Disorders If someone with multiple personalities threatens suicide... is it considered a hostage situation? -----Original Message----- From: David Alexander [mailto:david.alexander@b...] Sent: Thursday, April 11, 2002 8:57 AM To: 'TSCM submissions' Subject: [TSCM-L] Re: Emotional, Mental, and Personality Disorders >My inferiority complex is bigger and better than anyone else's. You know, I never thought I would ever see two men argue over who had the smallest one of anything. Then someone invented mobile phones _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5173 From: A Grudko Date: Thu Apr 11, 2002 2:33pm Subject: Will implantable tracking chips be used by totalitarian government? 'Digital Angel' lands in China Will implantable tracking chips be used by totalitarian government? By Sherrie Gossett © 2002 WorldNetDaily.com Making good on its promise to "achieve a global presence," Digital Angel Corporation - manufacturer and marketer of high-tech, implantable devices for tracking human beings - has opened a research and development facility in Shen Zhen, a special economic zone near Hong Kong, hoping to cash in on vast markets in China and the Far East. As WorldNetDaily first reported, Digital Angel is a sophisticated, miniaturized tracking device intended by its manufacturer for subdermal implantation in large numbers of human beings. After heavy publicity, the manufacturer last year deflected criticism from privacy advocates and Christians concerned over biblical prophesy by removing all references to human implantation from its website and literature, only to re-introduce human implantation - with a product called VeriChip - after Sept. 11, due to the nation's new preoccupation with security. Andy Grudko - South Africa D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust When you need it done right - first time 5174 From: A Grudko Date: Thu Apr 11, 2002 3:20pm Subject: Smaller is better Quote > You know, I never thought I would ever see two men argue over who had the > smallest one of anything. > Then someone invented mobile phones Just out of interest: what is the smallest stand-alone, self powered functional room bug members have seen? In practical terms I think that the difficulty of getting the thing in place and operational is more important than size, but clients often ask. It's sort of a 'Ripley's' question. Andy Grudko - South Africa D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust When you need it done right - first time 5175 From: James M. Atkinson Date: Thu Apr 11, 2002 3:10pm Subject: Re: Will implantable tracking chips be used by totalitarian government? The only problem is that the product, the company, and the salesmen have all been debunked so many times that it's become a joke. -jma At 9:33 PM +0200 4/11/02, A Grudko wrote: >'Digital Angel' lands in China >Will implantable tracking chips be used by totalitarian government? > >By Sherrie Gossett >© 2002 WorldNetDaily.com > >Making good on its promise to "achieve a global presence," Digital Angel >Corporation - manufacturer and marketer of high-tech, implantable devices >for tracking human beings - has opened a research and development facility >in Shen Zhen, a special economic zone near Hong Kong, hoping to cash in on >vast markets in China and the Far East. > >As WorldNetDaily first reported, Digital Angel is a sophisticated, >miniaturized tracking device intended by its manufacturer for subdermal >implantation in large numbers of human beings. After heavy publicity, the >manufacturer last year deflected criticism from privacy advocates and >Christians concerned over biblical prophesy by removing all references to >human implantation from its website and literature, only to re-introduce >human implantation - with a product called VeriChip - after Sept. 11, due to >the nation's new preoccupation with security. > > >Andy Grudko - South Africa >D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 >International business intelligence and investigations - ICQ 146498943 >(+27 12) 244 0255 - 244 0256 (Fax) >SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust >When you need it done right - first time -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5176 From: James M. Atkinson Date: Thu Apr 11, 2002 4:01pm Subject: Re: Emotional, Mental, and Personality Disorders I seem to recall that at some military hospitals have the psychiatrist and the proctologist right next to each other, and that in DC they share the same office space. -jma At 6:56 PM -0400 4/10/02, Steve Uhrig wrote: >My inferiority complex is bigger and better than anyone else's. > >Anyone who goes to a psychiatrist ought to have his head examined. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5177 From: Matthew Paulsen Date: Fri Apr 12, 2002 1:13am Subject: RE: Will implantable tracking chips be used by totalitarian government? Given that the company's stock is trading at less than 1/2 the value it was trading at since 9/11, the overwhelming number of sells versus buys for inside traders, the limitation to one sizable institutional investor that seems to be a new buyin at the end of last year and the market focus the company is in, ya just might have something there JMA... Now for a teardown... Randolph K. Geissler - Former CEO of "Destron Fearing (NASDAQ: DFCO)", not listed on NASDAQ any longer, why? It merged with Applied Digital Solutions, Inc. (Nasdaq:ADSX) in 2000. So he's still doing the same job at the same company.... why didn't they just say this on the page? http://www.digitalangel.net/about_bio.asp Reading top to bottom, the best hope yet that I've seen is William Faresich. From the bio, they may have actually scored someone decent, so was he fired, laid off or flee when the company product line didn't start to sell? It doesn't really say when he came on board, which is interesting since most of the other key personnel have chronological dates associated with positions, even inline positions. Dr. Peter Zhou - why does that name sound familiar? Anyone in Florida know this name? I just keep thinking Florida and Zhou, maybe I'm just tired. This name is going to bug me all week long... For some reason it is so familiar. Next topic of thought. I wonder if the FBI will make a new subsection for their approved biometric list for the chip. http://www.fbi.gov/hq/cjisd/iafis/cert.htm Or if they do, if they'll add InfoPet, Schering-Plough Animal Health and Avid to their approved company list as well, that's for my wife, the Vet Tech :) Someone get me that 14 guage needle please. This'll be fun. Well if we didn't have Digital Angel (and the FBI) to poke at, we'd have memorable companies such as Digital Biometrics, come on all you LEA's you love those tenprinters.. don'tcha (Funny story here - which sued Identix, then sold to Visionics, which in turn, merged with Identix, ouch, how much did the lawyers get on that one?) from Minnetonka which basically works in the same pool, with the same talent, with the same market results, so... Looks like an industry trend overall perhaps? Where is Digital Angel from again? Sidenote: One nice website with biometric news links: http://www.dss.state.ct.us/pubs/BIOMET_BREAKING_%20NEWS.html G'Nite all. The above was supposed to be informative, as well as humorous, except of course, if you work at any of the above listed companies, and then I didn't write this.. someone broke into my house, sat down on my computer, and wrote it, so please don't chip me in my sleep..... you've already got my cats and dog, isn't that enough? No wait. There's China! After that, I guess we can go after India. Matt -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Thursday, April 11, 2002 1:11 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Will implantable tracking chips be used by totalitarian government? The only problem is that the product, the company, and the salesmen have all been debunked so many times that it's become a joke. -jma At 9:33 PM +0200 4/11/02, A Grudko wrote: >'Digital Angel' lands in China >Will implantable tracking chips be used by totalitarian government? > >By Sherrie Gossett >© 2002 WorldNetDaily.com > >Making good on its promise to "achieve a global presence," Digital Angel >Corporation - manufacturer and marketer of high-tech, implantable devices >for tracking human beings - has opened a research and development facility >in Shen Zhen, a special economic zone near Hong Kong, hoping to cash in on >vast markets in China and the Far East. > >As WorldNetDaily first reported, Digital Angel is a sophisticated, >miniaturized tracking device intended by its manufacturer for subdermal >implantation in large numbers of human beings. After heavy publicity, the >manufacturer last year deflected criticism from privacy advocates and >Christians concerned over biblical prophesy by removing all references to >human implantation from its website and literature, only to re-introduce >human implantation - with a product called VeriChip - after Sept. 11, due to >the nation's new preoccupation with security. > > >Andy Grudko - South Africa >D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 >International business intelligence and investigations - ICQ 146498943 >(+27 12) 244 0255 - 244 0256 (Fax) >SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust >When you need it done right - first time -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------- ------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 5178 From: Matthew Paulsen Date: Fri Apr 12, 2002 1:25am Subject: RFID's for Chips? Just as an interesting question, does anyone know what frequencies InfoPet, Schering-Plough Animal Health and Avid use? Matt 5179 From: Matthew Paulsen Date: Fri Apr 12, 2002 1:34am Subject: RE: RFID's for Chips? 134.2 kHz - Destron Fearing's http://www.destron-fearing.com/elect/elect.html And it'd seem that ISO is 134.x kHz This appears to cover these brands/mfg's if I'm reading this right. COMPANION ANIMAL Animal Electronic I.D. Systems Pty Ltd. marketing Lifechip in Australia; Anitech Enterprises, Inc., marketing PETNETô in Canada; Dainippon Pharmaceutical Co. Inc., marketing Lifechipô in Japan; Identipet in South Africa; Merial, marketing Indexelô in Europe; Schering-Plough Animal Health, marketing HomeAgainô in the United States. Database managed by AKC Companion Animal Recovery. VDC, plc/Animal Care marketing Identichipô in the United Kingdom. Marketing partners selling to other key markets include: LABORATORY ANIMALS BioMedic Data Systems, Inc. marketing Destron Fearing systems in the laboratory animal business worldwide. EQUINE Electronic ID selling Destron Fearing equine microchips in the United States. FISH AND WILDLIFE Biomark, Inc. marketing Destron Fearing systems to the fish and wildlife markets. MANUFACTURING Raytheon Microelectronics EspaÒa, S.A. -----Original Message----- From: Matthew Paulsen [mailto:mpaulsen6@a...] Sent: Thursday, April 11, 2002 11:25 PM To: Tscm-l@yahoogroups.com Subject: [TSCM-L] RFID's for Chips? Just as an interesting question, does anyone know what frequencies InfoPet, Schering-Plough Animal Health and Avid use? Matt ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5180 From: James M. Atkinson Date: Fri Apr 12, 2002 3:28pm Subject: Russians: CIA Used Drugs to Recruit [Reads like an episode of "Get Smart" -jma] http://www.newsday.com/news/nationworld/wire/sns-ap-russia-us-espionage0411apr11.story?coll=sns%2Dap%2Dnationworld%2Dheadlines Russians: CIA Used Drugs to Recruit By VLADIMIR ISACHENKOV Associated Press Writer April 11, 2002, 12:47 PM EDT MOSCOW -- U.S. spies used drugged cookies and drinks to break the will of a Russian defense employee and recruit him as an agent, according to new details of Russian security service allegations published by a newspaper Thursday. The Federal Security Service, or FSB, ridiculed the alleged U.S. espionage effort in the report in the daily Komsomolskaya Pravda, saying the CIA once delivered secret instructions to their agent in invisible ink that melted away when he used Russian tap water to develop them. "The Americans will never defeat us because they will never figure out that our tap water differs from that in Langley," the city in Virginia where the CIA is based, the newspaper said quoting FSB officials. The FSB, the KGB's main successor, said Wednesday that CIA officers posing as embassy officials in Russia and another, unidentified former Soviet republic had tried to recruit an employee at a secret Russian Defense Ministry installation. CIA spokesman Mark Mansfield and the U.S. Embassy in Moscow both declined to comment Wednesday on the allegations. In the two-page report Thursday in Komsomolskaya Pravda, the FSB elaborated on details of the allegations. It identified the Russian expert as Viktor, 58, a worker of a defense ministry facility near Zhukovsky air base, the Russian air force's top flight test center near Moscow. According to the newspaper, in April 2001 Viktor went to the U.S. Embassy in the unidentified ex-Soviet republic to seek information about a relative that has gone missing abroad. After leaving the embassy, he was found by local police sitting on a garden bench in shock and amnesia. Viktor was brought to Moscow where the FSB concluded that the U.S. Embassy officers had slipped him psychotropic drugs to get information out of him. The newspaper said that David Robertson, the Embassy official who met with Viktor, treated him with drinks and cookies while asking him "in-depth" questions about his work. "Within minutes, Viktor felt weakness and light trance," an apparent reaction to drugs, the newspaper reported. Under FSB control, Viktor received instructions in invisible ink allegedly delivered by Yunju Kensinger, reportedly a third secretary in the consular department of the U.S. Embassy in Moscow. On one occasion, the message began to melt away when Viktor tried to read it using special tablets and Russian tap water. FSB agents rushed to save it with bottled water, the newspaper said. In the first message, disguised as a juice pack, the alleged U.S. contacts sent him $10,000 in cash along with instructions to provide information about confidential documents received by his organization and data on Russia's latest air-to-air and air-to-surface missiles. After the FSB concocted a response, Viktor delivered it to Robertson in the same city where they first met. The newspaper said Viktor later received more cash and instructions from his handlers, but the FSB decided to end the operation after getting enough "factual evidence" of U.S. espionage activities. Komsomolskaya Pravda said Kensinger had already left Moscow -- the claim made Wednesday by the Interfax news agency and Russian television. The espionage accusation comes amid renewed U.S.-Russian tensions following a warm spell prompted by Russia's support of the U.S.-led anti-terror campaign. A former KGB spy in London, Mikhail Lyubimov, said the latest espionage allegations showed that the two countries remain interested in spying on each other despite better ties. "Now the main effort is to get military and technical information," he told Associated Press Television News. "Whatever our relations are, I think that both countries are experimenting with new weapons, trying to make them more effective and better, and therefore this competition will proceed." Copyright © 2002, The Associated Press -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5181 From: James M. Atkinson Date: Fri Apr 12, 2002 3:20pm Subject: Daily Moment of Zen - Good Morning (Modified to reflect contemporary wisdom) Daily Moment of Zen (Modified to reflect contemporary wisdom): 1. Do not walk behind me, for I may not lead. Do not walk ahead of me, for I may not follow. Do not walk beside me either. Just leave me the hell alone. 2. The journey of a thousand miles begins with a broken fan belt and a leaky tire. 3. It's always darkest before dawn. So if you're going to steal your neighbor's newspaper, that's the time to do it. 4. Sex is like air. It's not important unless you aren't getting any. 5. Don't be irreplaceable. If you can't be replaced, you can't be promoted. 6. No one is listening until you fart. 7. Always remember you're unique. Just like everyone else. 8. Never test the depth of the water with both feet. 9. If you think nobody cares if you're alive, try missing a couple of car payments. 10. Before you criticize someone, you should walk a mile in their shoes. That way, when you criticize them, you're a mile away and you have their shoes. 11. If at first you don't succeed, skydiving is not for you. 12. Give a man a fish and he will eat for a day. Teach him how to fish, and he will sit in a boat and drink beer all day. 13. If you lend someone $20 and never see that person again, it was probably worth it. 14. If you tell the truth, you don't have to remember anything. 15. Some days you are the bug; some days you are the windshield. 16. Don't worry; it only seems kinky the first time. 17. Good judgment comes from bad experience, and a lot of that comes from bad judgment. 18. The quickest way to double your money is to fold it in half and put it back in your pocket. 19. A closed mouth gathers no foot. 20. Duct tape is like the Force. It has a light side and a dark side, and it holds the universe together. 21. There are two theories to arguing with women. Neither one works. 22. Generally speaking, you aren't learning much when your lips are moving. 23. Experience is something you don't get until just after you need it. 24. Never miss a good chance to shut up. 25. We are born naked, wet, and hungry, and get slapped on our ass ... then things get worse . 26. The most wasted day of all is one in which we have not laughed -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5182 From: James M. Atkinson Date: Fri Apr 12, 2002 3:03pm Subject: Re: Smaller is better At 10:20 PM +0200 4/11/02, A Grudko wrote: >Quote >> You know, I never thought I would ever see two men argue over who had >the >> smallest one of anything. >> Then someone invented mobile phones > >Just out of interest: what is the smallest stand-alone, self powered >functional room bug members have seen? In practical terms I think that the >difficulty of getting the thing in place and operational is more important >than size, but clients often ask. It's sort of a 'Ripley's' question. > >Andy Grudko - South Africa >D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 >International business intelligence and investigations - ICQ 146498943 >(+27 12) 244 0255 - 244 0256 (Fax) >SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust >When you need it done right - first time I heard that the CIA has perfected a method of concealing an eavesdropping device in the rectum. For some reason someone at ITC keeps referring to so-and-so at the Agency Tech Services as "having a serious bug up his ass" ..or perhaps I heard this wrong ;-) [greets to the lurkers from ITC] -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5183 From: gkeenan Date: Fri Apr 12, 2002 4:51pm Subject: Re: Smaller is better Could be the guy is just an asshole :) (Oh, I should slap myself -- but I just couldn't pass that one up!!) Jerry Keenan ----- Original Message ----- From: "James M. Atkinson" To: Sent: Friday, April 12, 2002 4:03 PM Subject: Re: [TSCM-L] Smaller is better > At 10:20 PM +0200 4/11/02, A Grudko wrote: > >Quote > >> You know, I never thought I would ever see two men argue over who had > >the > >> smallest one of anything. > >> Then someone invented mobile phones > > > >Just out of interest: what is the smallest stand-alone, self powered > >functional room bug members have seen? In practical terms I think that the > >difficulty of getting the thing in place and operational is more important > >than size, but clients often ask. It's sort of a 'Ripley's' question. > > > >Andy Grudko - South Africa > >D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 > >International business intelligence and investigations - ICQ 146498943 > >(+27 12) 244 0255 - 244 0256 (Fax) > >SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust > >When you need it done right - first time > > > > I heard that the CIA has perfected a method of concealing an > eavesdropping device in the rectum. > > For some reason someone at ITC keeps referring to so-and-so at the > Agency Tech Services as "having a serious bug up his ass" > > ..or perhaps I heard this wrong ;-) > > > [greets to the lurkers from ITC] > > > -jma > -- > > -------------------------------------------------------------------------- ------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------- ------------------------ > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > -------------------------------------------------------------------------- ------------------------ > "...three shall be the number to count, and the number to be counted shall > be three.....four shall thou not count......five is right out". - M. Python > ------------------------------------------------------------------------ -------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5184 From: Matthew Paulsen Date: Fri Apr 12, 2002 6:25pm Subject: someone looking for high level scientists This was actually meant for the entire egroup. Tom is looking for assistance from the scientific community to build a new product line in a few phases. Please contact him directly if you're interested in this sort of business opportunity. Matt ------------------------------ Hi, I'm looking for someone that has spectrograph software or someone with a spectrograph willing to cooperate with me on a project. The final frequency analysis should be from someone with academic credentials, doctorate level, but anyone with a credible physics and electrical engineering degreed backgrounds should be able to handle it. Later I'm looking to acquire two tone generators & digital counters to duplicate and alter these frequencies. If anyone on this e-group has information that could assist me regarding the above said, please email me off line. Tom Apperson thomasapperson@m... www.American-Bodyguard.Com 503-254-1122 5185 From: Information Date: Fri Apr 12, 2002 10:18pm Subject: Re: Smaller is better In reality, Winston Arrington did put together a device which was concealed in the vagina with the antenna wire concealed in the seams of a bikini. It was for use on topless beaches. I suppose it could have also been placed in the rectum. Talk about radiating a signal! Bill Elliott, CII ELLIOTT & ASSOCIATES, Ltd. (GMT -7) http://www.prvt-eye.com http://www.cybercrimeinternational.com > > I heard that the CIA has perfected a method of concealing an > eavesdropping device in the rectum. > > 5186 From: Steve Uhrig Date: Sat Apr 13, 2002 1:44am Subject: Re: Implantable tracking chips On 11 Apr 2002 at 21:33, A Grudko wrote: > 'Digital Angel' lands in China > Will implantable tracking chips be used by totalitarian government? > As WorldNetDaily first reported, Digital Angel is a sophisticated, > miniaturized tracking device intended by its manufacturer for > subdermal implantation in large numbers of human beings. The parent company of Digital Angel was hoaxed into acquiring them following presumably a staged demo. Digital Angel recently sent out several thousand press releases worldwide on their vaporware. A number of the magazines contacted me for comment, including Popular Science and Business 2.0, and, after interviewing me and verifying my info, will be publishing retractions. I've watched their ongoing scams with interest. People, even technical ones, are too willing to believe anything associated with GPS or lasers is akin to magic, and both the laws of physics and common sense goes out the window. Following is a piece I wrote on request for AFIO (Association of Former Intelligence Officers) after they, too, reprinted the vaporware press release not knowing any better. The WIN referenced below = Weekly Intelligence Notes. I forwarded a copy of the below to Digital Angel, and even offered to travel anywhere in the U.S. at my own expense to witness a demo of the product. I followed up with a phone call, getting nothing but voice mail, and never heard anything back from them. ====================== There have been a lot of press releases over the years about various flavors of covert GPS tracking systems. The 'Digital Angel' is one piece of vaporware which seems to resurface every few years. Allegedly, GPS location data will be received by a child's or geriatric's bracelet, pet's collar, small unit hidden inside a suitcase, the same inside an expensive set of golf clubs, and even biological implants. The GPS- derived location data somehow magically is transmitted, covertly, to a central monitoring station where authorities can be notified of the location of the missing or lost person, item, whatever, in realtime. Sounds good. Good enough, in fact, to attract hundreds of thousands of dollars of venture capital and seed money from persons who do not understand the technology but want to believe in the smoke and mirrors the peddlers of these systems claim. Well, the laws of physics can't be violated. Remember, the GPS receivers, in order to develop accurate ongoing location information, must have an antenna which will see a minimum of 4 GPS satellites (birds) simultaneously. For all practical purposes, this means the GPS receive antenna must see the horizon for 360 degrees. To accomplish this is nearly impossible in a covert application. Shading the antenna with a person's body, a vehicle, trees, buildings, etc. will block the view of the satellites most of the time. When a GPS receiver sees fewer than 4 birds, you have little more than an expensive stopwatch. Periodically, the GPS system using a covert antenna will manage to see 4 birds and get an accurate fix. Once it loses the view of 4 birds, however, the algorithm in the GPS engine switches over to dead reckoning. This means the GPS box will try to make its best guess of its current position by extrapolating from the last known valid fix it received. This is all well and good if the GPS is installed in a plane or a boat which tend to travel in straight lines. People and automobiles do not do this, however. So the extrapolation is invalid, meaning its best guess is WRONG. Then the problem further remains of how to telemeter these GPS- derived coordinates to the central station. This is another area where the peddlers of the system hide behind 'proprietaty' black magic. This can't be done. Transmitters need an antenna. They need size, They need batteries. All this means a package far too large to be contained in a bracelet or whatever. Some systems claim to use CDPD, or the cellular network, to uplink the location data. Without some size for the antenna, transmitter and batteries, this will not happen. Put the peddlers of these vaporware systems on the spot, and they hide behind the 'proprietary' veil again. This is their way of taking the 5th Amendment for not knowing the answer to how they uplink the alleged GPS-derived data to the monitoring station. The fact is, they aren't doing this, although many of them have become quite adept at staging phony demonstrations of the technology. The bottom line is: these GPS-based tracking systems, whether carried on a person or installed in a vehicle, can't possibly work when you consider all the physics and technical requirements involved. When Digital Angel refers to biological implants, the above further impeaches their claims. No exposed GPS or uplink antenna, size, battery, etc. all would be much more complicated as an implant than as a child's bracelet. This isn't the proper forum to go into detailed communications theory and why it is impossible for these vaporware systems to work as claimed. Suffice it to say they don't. They are hype. In a recent WIN, a mention was made of a WIRED magazine article on Digital Angel, pushing it as THE solution to personnel locating (abducted children always is good for a lot of press coverage), covert vehicle tracking, locating high value items likely to be stolen, etc. WIRED Magazine themselves exposed Digital Angel as a scam 3 years ago, in this article: http://www.wired.com/wired/archive/7.10/spam.html. Apparently WIRED does not even read their own archives. Digital Angel has risen again, like a phoenix, from the ashes, ready to scam a whole new round of investors. Watch the website for the company mentioned in the most recent WIN. Soon the manufacturer will be soliciting investors to purchase 'distributorships' for a particular geographical area, country, etc. The cycle repeats. Learn from history or be doomed to repeat it! Potential investors, especially -- read that last sentence again! My company manufactures radio direction finding systems primarily for military and law enforcement, for tracking vehicles, narcotics shipments, arms shipments, hazardous waste shipments, etc. We have done this work all over the world, and have developed much of the RDF (Radio Direction Finding) technology now used in commercial and military applications. It's difficult to unwash the brains of persons who have succumbed to the heavy marketing and press release expenditures of fiction such as Digital Angel and other GPS-based covert tracking systems. GPS *is* suitable for fleet locating of vehicles on a non-covert basis, as well as many other clever and useful applications. However, for finding kidmapped children, stolen merchandise, etc., it's all smoke and mirrors. The dishonest peddlers of Digital Angel and similar vaporware capitalize on people's lack of understanding of the technology involved. They are adept at slinging around buzzwords, but cannot answer simple, basic questions about how the system actually works. Their excuse? 'Proprietary, sorry, can't release that information.' Anyone with a serious need for a system involving this sort of technology is welcome to contact me and engage us on a consulting basis. I can be reached best by email as Steve@s.... Our website Articles section also has some white papers on radio direction finding which may be of interest to persons researching this technology www.swssec.com. I would be pleased to meet with any peddlers of the Digital Angel product, witness a demo I control, and report back the results. If I am wrong, I most humbly will admit to such, and would be a most enthusiastic supporter of Digital Angel in its various permutations. Opinions expressed herein are mine only, and do not reflect upon AFIO in any way. (C) Feb 2002 by Steve Uhrig, SWS Security. ================== Steve Uhrig is President of SWS Security, a manufacturer of electronic surveillance and intelligence gathering systems for military, law enforcement and government since 1972. The company maintains facilities in ten countries, with headquarters in Maryland, USA. Steve is a recognized authority on electronic surveillance, accepted as an expert witness in numerous courts, and an acknowledged expert worldwide in electronic surveillance both in theory and in practice. The company has developed many of the systems and techniques now in widespread use in the industry in areas such as radio direction finding, video transmission, data, voice and communications technology. Steve Uhrig is a member of AFIO. ================== ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5187 From: Paolo Sfriso Date: Sat Apr 13, 2002 11:45am Subject: Wanted 2nd hand CPM-700 Dear Colleagues. A friend has asked me to find (for purchase) a 2nd hand CPM-700 or similar broadband countermeasures receiver. Is there anybody out there with a spare one on sale ? Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 5188 From: James M. Atkinson Date: Sun Apr 14, 2002 0:10am Subject: Silicon Valley's Spy Game http://www.nytimes.com/2002/04/14/magazine/14TECHNO.html The New York Times Magazine April 14, 2002 Silicon Valley's Spy Game The post-boom high-tech industry has found a new backer -- the Office of Homeland Security. The mission is to help the government track its citizens the way Amazon tracks its customers. By JEFFREY ROSEN Jeffrey Rosen is an associate professor at George Washington University Law School and the legal affairs editor of The New Republic. His last article for The Times Magazine was about the growth of surveillance. Gilman Louie is one of the most successful computer-game developers of all time. ''I'm your classic entrepreneur,'' he told me recently. ''I started my first business with my fraternity brothers at San Francisco State.'' Louie, an amateur fighter pilot, had his first big success in 1987 with a game called Falcon, which allowed players to simulate the flight of an F-16. Falcon sold millions of copies, not only to teenage boys but also to pilots in the United States Air Force, who found it so realistic that it helped them learn to fly real fighter jets. Louie's biggest success came in 1988, when he imported from the Soviet Union an unexpectedly addictive game called Tetris, which became the best-selling computer game ever. ''Between Nintendo sales and PC sales, 70 or 80 million copies of that game sold,'' Louie says. ''We even found out that Hillary Clinton loved playing Tetris on the Game Boy.'' Lots of companies were impressed by Louie's success, including Hasbro, which put him in charge of creating its games Web site. And then in 1998, Louie was recruited by an even more powerful employer: the Central Intelligence Agency. ''The C.I.A. actually thought that my computer-game background was a valuable asset,'' Louie recalls. ''I look at the world as one big system -- one big game.'' The C.I.A. had just founded an unusual venture-capital firm called In-Q-Tel, and the agency wanted Louie to be the C.E.O. ''The 'Q' stands for the 'Q' factor -- it's named after the character in James Bond,'' says Louie. In-Q-Tel was the brainchild of George Tenet, the C.I.A. director, who believed that by investing $30 million a year in Internet startups in Silicon Valley, the C.I.A. could encourage the development of cutting-edge technologies that might be useful for national intelligence. Louie's marching orders were to provide venture capital for data-mining technologies that would allow the C.I.A. to monitor and profile potential terrorists as closely and carefully as Amazon monitors and profiles potential customers. The valley has long indulged its own antiestablishment mythology -- rebellious, libertarian hackers in their parents' garages, bucking the system by inventing world-changing, personally empowering technologies -- and Louie was worried that persuading programmers to collaborate with the C.I.A. would be ''borderline ludicrous.'' Despite his doubts, Louie agreed to open one In-Q-Tel office in Menlo Park, Calif., and another near Washington. He quickly discovered that far from recoiling at the idea of working with the C.I.A., Internet entrepreneurs flocked to his door. The chance to play with the government's cool toys trumped their fears of Big Brother. After the dot-com crash, Silicon Valley, desperate for venture capital, began to depend more and more on the federal government. Then came Sept. 11, and the establishment of the Office of Homeland Security. In-Q-Tel now finds itself just one of several deep-pocketed federally financed investors that are eager to back technological solutions to our new security challenges. The Bush administration is asking Congress for $38 billion for homeland security, and much of this money will be parceled out among competing federal agencies -- including the Defense Department and the F.B.I. -- which can then use the money either to invest directly in security technologies or to follow In-Q-Tel's model of providing venture capital to young companies in the private sector. Like the C.I.A., the Office of Homeland Security has concluded that the same technologies that were useful before Sept. 11 for tracking, profiling and targeting potential customers can be turned today on potential terrorists. In the wake of the bursting of the tech bubble and in the thick of the war on terrorism, Silicon Valley is reinventing itself as the new headquarters for the military-technological complex. As always, the entrepreneurs are following the money. In January, this led them to Las Vegas for the Consumer Electronics Show, the largest trade show of futuristic gadgets in North America. After Sept.11, the conference organizers decided to sponsor a special exhibition hall at the Riviera Hotel for technologies that are especially well suited to homeland defense. That old familiar gold-rush feeling was in the air at the Riviera: one speaker estimated that federal spending on security technologies would grow by 30 percent a year, rising to $62 billion by 2006. (''God bless America'' read the PowerPoint slide, over an image of firefighters raising the flag.) In the buzzing exhibition hall, participants admired a hologram of the Statue of Liberty, as well as a man in a gigantic thumbprint costume, who had been hired by a company called DigitalPersona to advertise its fingerprint-recognition device. After displaying their wares, the technologists flocked to an In-Q-Tel reception near the exhibition hall, trolling for federal investors from the C.I.A.,F.B.I. and Defense Department. ''All we served was pot-stickers and 7-Up,'' Louie recalls, ''but people didn't want to leave.'' In Las Vegas, several companies predicted that profiling techniques that are now used to detect credit-card fraud could soon be used to detect potential terrorists. A few weeks later, this prediction turned out to be a reality, when The Washington Post reported that the federal aviation authorities and two technology companies called Accenture and HNC Software are planning to test at airports a profiling system designed to analyze each passenger's living arrangements, travel and real-estate history, along with a great deal of demographic, financial and other personal information. Using data-mining and predictive software, the government then plans to assign each passenger a ''threat index'' based on his or her resemblance to a terrorist profile. Passengers with high threat indexes will be flagged as medium or high risks and will be taken aside for special searches and questioning. Our system ''will check your associates,'' Brett Ogilvie of Accenture told Business Week. ''It will ask if you have made international phone calls to Afghanistan, taken flying lessons or purchased 1,000 pounds of fertilizer.'' The only problem: in order for the system to obtain answers to those questions, the nation's privacy laws will need to be relaxed. Federal laws currently restrict the personally identifiable information that the government can demand from credit-card and phone companies except as part of a specific investigation. When I called Brett Ogilvie to ask what data Accenture proposes to analyze, his spokeswoman, Stacey Jones, said that she couldn't reveal that information: it's a trade secret. ''Anyone who is interested in beating the system can, once we start divulging what the systems are,'' she explained. I said that I wasn't interested in the specific profiling factors; I only wanted to know whether Accenture proposed to include information in its database that the government isn't now permitted to examine. But Jones stuck to her script: ''National security and client confidentiality prohibits us from divulging what the factors are.'' Accenture's profiling scheme is open to question not only because it would almost certainly violate the privacy rights of airline passengers, but also because it seems unlikely to work. Investigators will tell you that people who commit credit-card fraud often fit a consistent profile -- using the stolen card to buy gas at self-service stations, for example, and then using it to buy clothes. By contrast, terrorists don't fit a consistent profile: you're looking for a needle in a haystack, but the color and the shape of the needle keep changing. Mohamed Atta might have been kept out of the country if immigration officials had been aware that there was a warrant for his arrest in Broward County, Florida. But Accenture's profiling system is not designed to check passengers against a watch list of suspected criminals or terrorists. Instead it is designed to compare the purchasing activities and personal behavior of millions of passengers with those exhibited in the past by a tiny group of terrorists -- to create a predictive profile of likely hijackers. Lawrence Lessig, who teaches law at Stanford and is the nation's leading authority on the law and architecture of cyberspace, argues that the Accenture system is unworkable. ''I can understand these massive data systems to deal with things like stealing from the government or not paying your taxes -- systematic repetitive large-scale deviations from the law,'' he says. ''The problem I really have with the terrorism stuff is, do we have any good reason to believe we could ever predict this type of behavior?'' Because the sample of known terrorists is so small, Lessig says, the profiles are bound to be inaccurate. The entrepreneurs of Silicon Valley are undaunted by questions about whether it makes sense to profile terrorists the way they profile e-business consumers; they haven't been so enthusiastic about a race to innovate since the height of the dot-com bubble. In the glory days of the late 90's, Silicon Valley was consumed by the search for the ''killer app,'' the software application that was just so cool and effective that everyone had to buy it. After Sept. 11, the consensus in the valley is that the national-security ''killer app'' will allow government agencies to access and share information about Americans that is currently stored in different databases -- from your chat-room gossip to your shopping history to your parking tickets, and perhaps even the payment history for your child-support checks. ''Today, every federal intelligence and law-enforcement agency and all manner of state and local bodies maintain their own separate databases on suspected criminals,'' Larry Ellison, the founder and C.E.O. of Oracle Corporation , wrote in The Wall Street Journal last October. ''Do we need more databases? No, just the opposite. The biggest problem today is that we have too many. The single thing we could do to make life tougher for terrorists would be to ensure that all the information in myriad government databases was integrated into a single national file.'' Oracle, in fact, is the world's largest database manufacturer, and Ellison offered to donate the software for a single national database free of charge to the United States government. (The company, Ellison added, would charge for upgrades and maintenance.) Oracle's office in Reston, Va., is near the headquarters of the C.I.A., which is appropriate enough: when Larry Ellison founded the company 25 years ago, his first client was the C.I.A., to whom he sold a program called Oracle, the world's first ''relational'' database. At that time, information in computer databases was stored in unrelated files: a company like Ford, for example, could keep one file of its employees and another file of its departments, but it had no easy way of relating the two files. Ellison saw the commercial potential of the relational database and began marketing it in 1979. By the height of the dot-com boom in 2000, Ellison's net worth had soared to $80 billion, making him (briefly) the richest person in the world. When I visited Oracle in January, the security guard in the lobby gave me a high-tech ID badge that could track where I was in the building at all times. I was ushered upstairs to a bright conference room where seven people were sitting around a huge oval table. One of them, David Carey, turned out to be the former No. 3 man at the C.I.A.; he had just retired as executive director after 32 years with the agency. Carey joined Oracle to head its new Information Assurance Center, which was founded in November to design homeland-security and disaster-recovery solutions and market them to the federal government. Like his colleagues, Carey was in an expansive mood. He said that the United States government accounted for 23 percent of Oracle's multibillion-dollar licensing revenue last year and that he expected the federal side of the business to improve after Sept. 11. ''How do you say this without sounding callous?'' he asked. ''In some ways, Sept. 11 made business a bit easier. Previous to Sept. 11, you pretty much had to hype the threat and the problem.'' Carey said that last summer, leaders in the public and private sector wouldn't sit still for a briefing. Then his face brightened. ''Now they clamor for it!'' After Sept. 11, Carey and Ellison held a series of top-level meetings in Washington about the use of Oracle technology for homeland security. ''In November, Larry had a serious discussion with Vice President Cheney, and I met with Ridge, Ashcroft and Mueller,'' Carey says, referring to the director of the Office of Homeland Security, the attorney general and the director of the F.B.I. I asked to see an example of Oracle's new homeland-security technology, and I was ushered into a demonstration hall outside the conference room that looked like something out of the last ''Star Wars'' movie. ''I'll give you an overview of 'Leaders,''' said Brian Jones, then the head of Oracle's health-care consulting unit. ''It stands for Lightweight Epidemiology Advanced Detection and Emergency Response System.'' By collecting health-care information from hospital emergency rooms across the country, Leaders is designed to monitor outbreaks of suspicious diseases and provide early warnings for biological attacks. At 9:20 a.m. on Sept. 11, Jones had received a phone call from the Centers for Disease Control in Atlanta, which feared that the attack on the twintowers might be followed by a bioterrorism attack. Working for 10 straight hours, Jones put into his computer the address of every hospital in New York State, to detect unusual disease outbreaks, like smallpox. ''Every hospital was capable of submitting data to a repository,'' he explained. ''The Centers for Disease Control's experts could sit back in Atlanta and pull up a map just like I'm showing you here.'' Jones punched a key and a digital map of New York City appeared on the screen. Using a combination of 7,500 digital photographs and architectural plans of more than 6,000 miles of underground pipes, Oracle has created a detailed map of every building, sewer and water line and curb in the city. By the evening of Sept. 11, Jones was ready to monitor every emergency-room bed in the state. Oracle is now working with the federal government to apply the same surveillance system to hospitals throughout the country. The system would allow hospitals to report incidents of suspicious diseases like anthrax, smallpox and Ebola to a central database. The program can then send out e-mail or voice-mail alerts to law-enforcement officials if it detects suspicious patterns of diseases anywhere in the country. Steve Cooperman, Oracle's new director of homeland security, said, ''We're going to build a bioterrorism shield, so eventually everyone is going to have to participate -- every hospital, every clinic, every lab.'' The prospect of every hospital in America reporting your medical condition to a central Oracle database might cause some patients alarm. (Oracle insists that the information can be stored in ways that can't be linked to individual patients.) The same potential for invasions of privacy is raised by Larry Ellison's proposal to centralize all of the separate criminal databases run by federal and state authorities into a single national database. After we filed back into the conference room, David Carey explained that Oracle is already discussing with various federal agencies methods of sharing information that are currently restricted by law. ''We think of it as a triangle,'' said Tim Hoechst, a senior vice president for technology at Oracle, holding up a Dorito. ''At one corner is privacy, at one corner is assurance of security -- how safe is the data -- and at another corner is usability. It's all a matter of trade-offs. What we focus on is making the Dorito here, and putting you in any corner that you feel comfortable with. On Sept. 12, most Americans would say, Privacy out the window; go catch the folks. So we would have moved it all the way to usability. But maybe day to day, we move it a little bit more toward security.'' As the databases are consolidated, I asked, who should decide the proper balance between privacy and access? How do you avoid a situation in which someone could be kept off a plane because he had skipped jury duty or had an overdue parking ticket? A hush fell over the room, and people looked awkwardly at their sandwiches. Finally Hoechst spoke up. ''You'll notice that we all became suspiciously quiet when we started talking about policy questions,'' he said. ''At Oracle, we leave that to our customers to decide. We become a little stymied when we start talking about the 'should wes' and the 'whys' and the 'hows,' because it's not our expertise.'' The Tom Lehrer song about the Nazi rocket scientist who defected to America popped into my head: ''Once ze rockets are up, who cares where they come down?/That's not my department,' says Wernher von Braun.'' ''I expect that if you ask Larry Ellison the question he'd give you a much better answer,'' one of Hoechst's associates chimed in. Hoechst agreed. ''My experience with him is that he knows an extraordinary amount about a lot of things. Every time I think I know something, he knows much more. He's read more books on it.'' So I set off for Silicon Valley to meet Larry Ellison. The Oracle campus near the San Francisco airport is known as the Emerald City, for its artificial lakes and silo-shaped towers of glass and silver. Ellison's private palace, however, is a $30 million mansion in nearby Atherton, modeled on the Katsura Imperial Villa in Kyoto. I was checked in there by two bodyguards with dark shirts and dark tans and escorted into the house to wait. The living room was large and airy, with lots of blond wood and shoji screens. It overlooked a beautiful Japanese garden, where ducks swam and waterfalls shimmered. Ellison appeared a few minutes later from behind one of the screens, wearing a pressed charcoal suit over a black turtleneck. He appeared fit and tanned, with piercing hazel eyes and a trimmed beard slightly flecked with gray. He suggested that we talk in the garden, but the loud whine of a neighbor's mulcher made this impossible. (In Silicon Valley, even $30 million doesn't buy you quiet.) Defeated by the noise, we retreated to the dining room, with its high-backed black lacquer chairs and black lacquer table. Ellison is not a shy or enigmatic billionaire. He is entertainingly indiscreet -- he answered every question with a torrent of confident opinions. ''The Oracle database is used to keep track of basically everything,'' he said. ''The information about your banks, your checking balance, your savings balance is stored in an Oracle database. Your airline reservation is stored in an Oracle database. What books you bought on Amazon is stored in an Oracle database. Your profile on Yahoo is stored in an Oracle database.'' Much of the information in these separate commercial databases is also centralized in large databases maintained by credit-card companies like TRW to detect fraud and to decide whether customers should get credit at the mall. When it comes to government data, by contrast, there are hundreds of separate, disconnected databases. ''The huge problem is the fragmented data,'' he said. ''We knew Mohamed Atta was wanted. It's just that we didn't check the right database when he came into the country.'' Ellison wants to consolidate the hundreds of separate state and federal databases into a single Oracle database, using the centralized credit-card databases as a model. ''We already have this large centralized database to keep track of where you work, how much you earn, where your kids go to school, were you late on your last mortgage payment, when's the last time you got a raise,'' he said. ''Well, my God, there are hundreds of places we have to look to see if you're a security risk.'' He dismissed the risks of privacy violations: ''I really don't understand. Central databases already exist. Privacy is already gone.'' As Ellison spoke, it occurred to me that he was proposing to reconstruct America's national security strategy along the lines of Oracle's business model. When Oracle moved its business to the Internet in 1995, Ellison complained that its customer information was scattered across hundreds of separate databases, which meant that the German office couldn't share information about customers with the French office. By consolidating 130 separate databases into a single database on the Internet, Ellison said, Oracle saved a billion dollars a year and found it easier to track, monitor and discriminate among its customers. This was what Ellison now wanted to do for America. I asked if there would be any controls on access to the database. For example, would Ellison want people to be kept off a plane because they were late on their alimony payments? ''Oh, no, I don't think we would keep anyone off on alimony payments,'' Ellison said. ''But if the system designed to catch terrorists also catches mere bank robbers and deadbeat dads, that's O.K. I think that's a good thing. I don't think it's a bad thing.'' There are, at the moment, legal restrictions prohibiting the sharing of data by government agencies. The most important restriction was passed in 1974, to prevent President Nixon from ordering dragnet surveillance of Vietnam protesters and searching for their youthful marijuana arrests. I asked Ellison whether these legal restrictions should be relaxed. ''Oh, absolutely,'' he said. ''I mean absolutely. The prohibitions are absurd. It's this fear of an all-too-powerful government rising up and snatching away our liberties.'' Since Sept. 11, Ellison argued, those qualms no longer make any sense: ''It's our lives that are at risk, not our liberties,'' he said. Ellison proposes to link the central government database to a system of digital identification cards that would be optional for citizens but mandatory for aliens. He wants each card holder to provide a thumbprint or iris scan that would be stored in the central database. I recalled that Lawrence Lessig of Stanford Law School had explained to me that a national fingerprint database was probably the most invasive of all possible designs for an identification system, because it would allow the government to dust for fingerprints in a nightclub or a protest scene and identify everyone who was there. I asked Ellison why the government couldn't minimize these privacy concerns by storing the fingerprint on the ID card. Ellison dismissed the suggestion. ''Everyone's got this amorphous idea that the government will somehow misuse this,'' he said, ''but no one has given me a substantive example of what will happen that's bad.'' I tried again. What about the centralized storage of health information, as Oracle was proposing to do with the Leaders system. Would Ellison wantgovernment officials to have access to personally identifiable genetic information? ''I feel like Alice has fallen through the looking glass,'' Ellison said. His voice rose; he was starting to get a little testy. ''Does this other database bother you here? We can't touch that database because I won't be able to use my credit card. Like, I won't be able to go to the mall!'' He took on the voice of Sean Penn's stoner from ''Fast Times at Ridgemont High.'' ''Like, that's really disturbing. Like, don't mess with my mall experience. O.K., so people have to die over here without this, but that's not going to affect my experience going to the mall.'' He exhaled, and in his regular billionaire voice asked, ''I mean, what the hell is going on?'' Ellison said he was late for an appointment at Intel and started to make motions to leave. I tried one more question. Were there no differences between Oracle and the United States government, I asked, that should make us hesitate before centralizing all of our national databases using Oracle as a model? ''From the information-science standpoint, there's no difference at all,'' he replied. ''These central databases are cheaper and better and they solve all these problems. We can manage credit risks that way. We should be managing security risks in exactly the same way.'' It's not surprising, of course, that Larry Ellison sincerely believes that what's good for Oracle is good for America. But there are, in fact, differencesbetween an e-business and the American government, differences that perhaps should make us hesitate before reconstructing America along the business model of the Oracle Corporation. ''Depending on how these technologies are designed, they can respect traditional values of liberty or not,'' says Lawrence Lessig, ''and whether they do depends on the values that drive the designers and the institutions we build to check the design.'' Although Lessig's path-breaking book ''Code and Other Laws of Cyberspace'' argues that it's possible to design technologies that protect privacy and security at the same time, he has become pessimistic that Silicon Valley, left to its own devices, will get the balance right. ''The reality is that all the market power is going to be on the side of delivering the security, and there's no strong claim on the other side for delivering the privacy,'' he says. ''There's no court that will stand up and push the demand for heightened review for privacy, and there's no politician. And then you have Larry Ellison types riding in with the glow of the market. He's like a rich version of a North Korean dictator.'' Here, then, is the Catch-22 of the integrated databases that are being constructed in the wake of Sept. 11: the technologists want the politicians to decide the balance between privacy and security, but because the technology is so complicated and unfamiliar, very few politicians seem up to the task. I visited Maria Cantwell, the newly elected senator from the state of Washington and perhaps the most technologically savvy member of the Senate. (She complains that Congressional rules prohibit her from taking her BlackBerry wireless communicator onto the Senate floor but allow her to use a spittoon.) Cantwell learned about the importance of Internet privacy as an executive for RealNetworks , which markets one of the most popular Internet music players. In 1999, RealNetworks got into trouble when privacy advocates noticed that the player could send information to RealNetworks about the music each user downloaded. RealNetworks had the capability to match this data with a Globally Unique Identifier, or GUID, that exposed the user's identity. Although RealNetworks insisted that it had never, in fact, matched the music data with the GUID, the company was eager to avoid a public-relations disaster, and so it quickly disabled the GUID. The experience helped turn Cantwell into a crusader for privacy, but her time in the Senate has made her more pessimistic that her colleagues in Congress have the understanding or inclination to regulate technology in a meaningful way. ''What I don't think people realize is that we are just at the tip of the iceberg,'' she told me. ''I think they're trying to be prescriptive on some very basic things, not understanding the world that's yet to come. I try to explain some of the new technology to my colleagues'' -- by which she means her fellow senators. ''You're going to be able to be driving and say, 'Hey, take me to the nearest Starbucks ,' and they all think that's great. And then I say, but it also might be stored in a database that may also be able to track where you were at 2 o'clock in the morning.'' Cantwell worries that her Senate colleagues are so swept up in the search for a technological solution to our security problems that regulating access to the databases isn't on their agenda. ''I mean, databases can become a threat in themselves if you don't think through the right safeguards,'' she said. ''People are getting enamored with the power of the technology and not thinking through the privacy issues and how they might apply.'' In the face of Congressional indifference and judicial passivity, it has fallen to the technologists to sort out the appropriate balance between liberty and security. But this is a challenge that the technologists are ill equipped -- by culture and temperament -- to meet. The gonzo entrepreneurs of Silicon Valley like to think of themselves as antigovernment libertarians; the business nostrums of the precrash era assumed that the Internet would lead inevitably to the end of hierarchy and centralized authority and the flourishing of individual creativity. When the e-business technologies of tracking, classifying, profiling and monitoring were used to identify the preferences of American consumers and to mirror back to each of us a market-segmented version of ourselves, Silicon Valley could argue that it was serving the cause of freedom and individual choice. But when the same software applications are used by the government to track, classify, profile and monitor American citizens, they become not technologies of liberty but technologies of state surveillance and discrimination. They threaten the ability of Americans to define their identity in the future free from government predictions based on their behavior in the past. Far from leading inevitably to the end of centralized authority, the age of the Internet turns out to include powerful economic and political forces that are determined to centralize as much information about individuals as possible. The technology for integrated databases already exists, waiting to be activated by the flip of a switch. In the wake of Sept. 11, few politicians or judges seem willing to keep the forces of centralization in check. And no one should count on the technologists to police themselves. I had one last question for Larry Ellison. ''In 20 years, do you think the global database is going to exist, and will it be run by Oracle?'' I asked. ''I do think it will exist, and I think it is going to be an Oracle database,'' he replied. ''And we're going to track everything.'' -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5189 From: Date: Sun Apr 14, 2002 3:07am Subject: File - mission.txt TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 5190 From: Date: Sun Apr 14, 2002 3:07am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. This file is set to automatically go out to list members every two weeks, Please review it, and ensure that you are listed properly (correct address, phone, etc). ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (including AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (425) 489-0446 Telephone URL: http://www.bug-killer.com/ E-mail: gordonm@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 5191 From: James M. Atkinson Date: Sun Apr 14, 2002 9:28am Subject: Re: Wanted 2nd hand CPM-700 At 6:45 PM +0200 4/13/02, Paolo Sfriso wrote: >Dear Colleagues. > >A friend has asked me to find (for purchase) a 2nd hand CPM-700 or >similar broadband countermeasures receiver. > >Is there anybody out there with a spare one on sale ? > >Kind Regards. > >Paul Sfriso >Director >GRUPPO S.I.T. >Security, Investigations & Technology >Quarto d'Altino, Venice >ITALY > >phone +39 0422 828517 >fax +39 0422 823224 >24hr GSM cellphone +39 335 5257308 >www.grupposit.com >paulsfriso@t... The used ones are fine, but you will be much happier with a new one with all the probes. The price difference between a new and used one is minimal, and you will get everything you need at once. If you buy a used system you may or may not get all the items you need to use the instrument (ie: the magnetic and infrared probes). If cost is an issue let me know and I will arrange for you to get a NEW one for a good price, and we will pick the shipping and handling to your location in Italy. This way you will save quite a bit of money on shipping, and will get new equipment for a good price. We have details on the following page on our website: http://www.tscm.com/cpm700a.html You may also find the Kaiser 2044 and/or 2057 to be helpful as well. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5192 From: Steve Whitehead Date: Sun Apr 14, 2002 2:01pm Subject: Denel theft puts security establishment at risk " Johannesburg - South Africa's security establishment could be at risk after last week's theft of key equipment from state-owned arms company Denel. Thieves broke into Denel headquarters and stole computer disks containing production information on the Rooivalk attack helicopter. Security analysts said that although it would be futile to point fingers at any particular group for the theft, the incident had exposed shortcomings in the security of key national institutions. "It is unimaginable that somebody could break into a key institution like that and take such vital data without being detected," said an analyst, who wanted to remain anonymous. Thieves forcibly entered the Denel Aviation Military Aircraft division's premises in Kempton Park last weekend and stole 22 desktop computers, three laptops and an overhead projector. The stolen computer hard drive apparently contained data on the top-secret Rooivalk helicopter and some information on Hawk jet fighter components, which Denel was manufacturing for UK-based BAE Systems. Peter Gastrow, the director of the Institute for Security Studies, said the motive for the burglary appeared to be far more than met the eye. "One must assume that far more sophisticated motives were behind it, including espionage. That information could be used by Denel competitors or rivals," he said. "We should not underestimate the extend of such criminal acts." Denel deputy chief executive Max Sisulu said entry was gained by digging a trench beneath an electrified, concrete-base, triple perimeter fence. He said the theft must have been carried out by people who knew the premises very well, because the power for the electric fencing had been on during and after the burglary. "The Denel Aviation site is a national key point and conforms to the security requirements of the National Key Point Act. "All relevant security systems were in operational order at the time of the burglary," he said. Sisulu said the information stolen on the computers related to operational production and logistic support issues such as parts lists, production routing and schedules. However, he said no blueprints had been stolen. "No secret information such as performance specifications, operational abilities or commercially sensitive information was contained in these computers. "It has been confirmed that all information which could be considered sensitive is intact and appropriately protected," said Sisulu. The police and the National Intelligence Agency were investigating the theft and an internal probe had been launched, the company said. The Rooivalk - Afrikaans for "red hawk" - is a modern attack helicopter manufactured exclusively by Denel. It carries a comprehensive range of state-of-the-art weaponry. It can engage multiple targets at short and long range, using its nose-mounted cannon and a range of underwing-mounted munitions. The SA Air Force has ordered 16 Rooivalk AH-2s, the first of which entered service in July 1999. The final delivery is scheduled for June 2002" Story at http://www.busrep.co.za/html/busrep/br_frame_decider.php?click_id=343&art_id=ct20020413184050918S535235&set_id=60 Steve Whitehead E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa [Non-text portions of this message have been removed] From: Michael Puchol Date: Thu Apr 10, 2003 1:26pm Subject: Re: Re: Cell Phone Bug Also, bear in mind that a lot of the new generation phones have voice recording capabilities, some to a limited internal memory, and others to insertable memory card. One notable example (with which one of my clients had an incident) is the Nokia 9210 which features an MMC card slot, which can host cards of up 128MB, allowing a very long recording time. Since the "computer" side of the phone always works if a battery is inserted, even if the phone is switched off (and thus the front LCD will be blank), you can silently start the recorder, close the lid, and have it record everything going on around a conference table. So, it may not be as simple as asking people to turn off the phones, or installing detectors. Phones stay outside, period. Cheers, Mike ----- Original Message ----- From: "Steve Uhrig" To: Sent: Thursday, April 10, 2003 6:46 AM Subject: [TSCM-L] Re: Cell Phone Bug > On 9 Apr 2003 at 21:18, Hawkspirit wrote: > > > This one looks like big trouble > > > http://www.cctv-city.com/erol.html#1317x0 > > Their site seems to have errors and the above link won't open for me. > Errors on page. Just get an endless message 'Please Wait. Store > Loading.' May be my antique browser. > > Don't overlook the fact that spy shops almost always exaggerate. Spy > shops define the word 'hyperbole'. > > > A bugging device that you can dial into from anywhere in the world... > > All Motorola cell phones I've owned from the first flip phone to the > current V70 has this ability. Activate auto answer and disable ring. > You can call it from anywhere, it will answer silently and you can > listen. > > Nothing new. Most of us have been preaching this to our clients for > years. > > > Have the ability to listen to conversations from anywhere in the > > world. Looks Exactly The Same As Normal Siemens Phones. > > It is a normal phone. That's why it looks and works like a normal > phone. > > However, since the company is in the U.K. the phone almost certainly > is GSM which will not work here in the U.S. but may be a problem in > countries where GSM mobile telephone is deployed. > > > Since the first release of the Mobile Phone Bug back in August 2001 > > this amazing technology has now be advanced with our Brand New > > Releases that now come in the form of standard Seimens Mobile phones > > as pictured here. You then have the ability to dial into the phone > > from anywhere in the world and listen to what is happening and being > > said around that phone. And not only that but you can also use this > > Mobile Phone Bug as an ordinary phone. > > All they are selling is a stock unmodified cell phone. > > Yes, it is a problem, which is another reason to try to keep cell > phones from being carried into critical meetings. Especially be > cautious if someone exits the room but leaves their cell phone on the > table. They may be calling it from the pay phone in the lobby or > another cell phone to hear what is being said in their absence. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 7204 From: 4phun 2oo3 Date: Thu Apr 10, 2003 5:46am Subject: Just about any cell phone can be a bug was RE: Cell Phone Bug I described in the private 4phun mailing list several times over the last two years how to do turn just about any cell phone into a more or less covert bug using the advanced features found in the setup menus. You don't need a Seimens phone to accomplish a remote bugging feat! You turn off the ringer, set it to auto answer, set the mike sensitivity high, turn down the display contrast so nothing appears to the eye when in use, turn off beeps, rings and other user feed back sounds, set it to auto answer, set it not to display light on incoming call etc. It hangs up when you break the connection. Just drop the phone where it will do the most good, even under a couch or a car seat if necessary and go to town. I know for a fact you can do it with the Qualcomm phones sold by Sprint and Verizon. Take one like the Kyocera 6035 which has an extremely long talk time on that big battery and you are good for hours if not days of potential monitoring, especially if you call in and use it only when you expect to your target to be saying something useful. The Kyocera 6035 has one flaw for this use in that the big led indicates it is in use by not pulsing during a connected call. That could be remedied by painting or taping over it, or clipping it internally. The point is that just about any decent cell phone probably could be programmed to act like a bugging device if it allows for a rich set of set up features. It just takes an active mind to realize how to set it up as a bug. The reason most people don't try it is that many probably don't even comprehend all the features built into their phone nor do they take the time to figure out how they may be useful if applied in an unexpected way. You could also carry such a phone into a meeting in your jacket pocket or purse and have an associate call and record the conversation it picks up on a standard answering machine at their end. Truly a no brainer for simplicity. Have 'phun' playing with this idea today if you haven't before. I am sure some phones and some cellular services (coverage of target area) may be better suited for covert monitoring than others, you need to experiment. The only counter protection I am aware of is to ban cell phones at your location, jam them, or scan for their use. Vic Healey ki4je ---------------------------------------------------------------------------- ---- I've stopped 133 spam messages. You can too! Get your free, safe spam protection at www.cloudmark.com -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Thursday, April 10, 2003 12:18 AM To: TSCM Subject: [TSCM-L] Cell Phone Bug This one looks like big trouble http://www.cctv-city.com/erol.html#1317x0 A bugging device that you can dial into from anywhere in the world... Have the ability to listen to conversations from anywhere in the world. Looks Exactly The Same As Normal Siemens Phones. Versatile for Covert Solutions Professional Equipment Can Also Be Used As A Normal Mobile Phone. Completely Undetectable That Someone May be Listening Since the first release of the Mobile Phone Bug back in August 2001 this amazing technology has now be advanced with our Brand New Releases that now come in the form of standard Seimens Mobile phones as pictured here. You then have the ability to dial into the phone from anywhere in the world and listen to what is happening and being said around that phone. And not only that but you can also use this Mobile Phone Bug as an ordinary phone. [Non-text portions of this message have been removed] 7205 From: 4phun ≤∫∫≥ Date: Fri Apr 11, 2003 1:38pm Subject: PDA's make good covert recorders also RE: Re: Cell Phone Bug Mike You hit on another item in your post when you referred to the computer function of some new cell phones. Computers and MP3 recorders, especially the tiny Pocket PC make for good covert recording devices for simple people like me. I ran across a large group of young male Islamics last week, all under the age of 30, who are running two new fast food businesses near my location in Atlanta GA. There were many warning signs that this may be another group up to no good on my first visit. As a customer, I turned on my Toshiba E335 PPC's recording function and spoke to them getting the names of three of them. I have programmed the Toshiba to store digital voice files to the SD plug in card. I later played that file which I transferred to my PC for a agent from the Joint Terrorism Task force while passing him a heads up. It makes it easier to remember their assumed alias then trying to remember all those Arabic names. Each one was from a different Islamic country and all admitted they were trying to pass for Italians. I told them I understood their anxiety as I am sure that if any locals recognized their true origin there may be business problems. I always ask any foreigners about themselves as I genuinely have a great interest them and their background. I always eventually ask them why they choose to move to the USA and what life was like where they are from. Unfortunately since I spoke to that agent there has been even more warning signs like that fact they all have relocated from the NY /NJ area in the last few months, they appear to all live together as roommates, they clearly have radical Islamic views, they have left wives behind to come here, large sums of cash on hand even though they do almost virtually no business at all, the unfamiliarity with their own menu of products they claim to sell, and a perceived undercurrent of intense anger on my last visit Thursday. Did the quick fall of Saddam's government Tuesday have a bearing on their new attitude? I also own another device called an Archos Jukebox recorder which fits in your shirt pocket. It records up to 900 hours of audio in MP3 format on a 20 G hard drive. While in the shirt pocket you are limited to about 9 or 10 hours based on the limit of the internal rechargeable batteries. Add an external power supply of some sort and you are good to go for much longer. I use a tiny 12 volt rechargeable battery ($30 retail) and a power cord converting that to 9 volts DC to provide a continuous power boost to the Archos while recording at a convention. I just turn it on and forget it until everything is over with. The Archos has one defect when using its internal mike, it picks up the memory dump to hard disk every couple of minutes as a sound like a bilge pump kicking on. One solution is to use one of the line in inputs and a suitable dynamic mike. At conventions I see if I can plug into the sound system and use that high level input. No one seems to mind as the Archos is the size of a pack of cigarettes and has its own internal power. Apple makes an IPod and Creative Labs makes a Nomad which more or less do the same thing. Vic ki4je I've stopped 151 spam messages. You can too! Get your free, safe spam protection at http://www.cloudmark.com/spamnetsig/ -- -----Original Message----- From: Michael Puchol [mailto:mpuchol@s...] Sent: Thursday, April 10, 2003 2:27 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Re: Cell Phone Bug Also, bear in mind that a lot of the new generation phones have voice recording capabilities, some to a limited internal memory, and others to insertable memory card. One notable example (with which one of my clients had an incident) is the Nokia 9210 which features an MMC card slot, which can host cards of up 128MB, allowing a very long recording time. Since the "computer" side of the phone always works if a battery is inserted, even if the phone is switched off (and thus the front LCD will be blank), you can silently start the recorder, close the lid, and have it record everything going on around a conference table. So, it may not be as simple as asking people to turn off the phones, or installing detectors. Phones stay outside, period. Cheers, Mike 7206 From: Times Enemy Date: Fri Apr 11, 2003 8:37pm Subject: Re: PDA's make good covert recorders also RE: Re: Cell Phone Bug Greets. This is a reason i have an interest in security ... not because of the alleged Islamic radicals, but because of their unknown antagonist. ciao .times enemy > Mike > You hit on another item in your post when you referred to the computer > function of some new cell phones. > Computers and MP3 recorders, especially the tiny Pocket PC make for good > covert recording devices for simple people like me. > > I ran across a large group of young male Islamics last week, all under > the age of 30, who are running two new fast food businesses near my > location in Atlanta GA. > > There were many warning signs that this may be another group up to no > good on my first visit. > As a customer, I turned on my Toshiba E335 PPC's recording function and > spoke to them getting the names of three of them. I have programmed the > Toshiba to store digital voice files to the SD plug in card. > > I later played that file which I transferred to my PC for a agent from > the Joint Terrorism Task force while passing him a heads up. It makes it > easier to remember their assumed alias then trying to remember all those > Arabic names. Each one was from a different Islamic country and all > admitted they were trying to pass for Italians. I told them I understood > their anxiety as I am sure that if any locals recognized their true > origin there may be business problems. I always ask any foreigners > about themselves as I genuinely have a great interest them and their > background. I always eventually ask them why they choose to move to the > USA and what life was like where they are from. > > Unfortunately since I spoke to that agent there has been even more > warning signs like that fact they all have relocated from the NY /NJ > area in the last few months, they appear to all live together as > roommates, they clearly have radical Islamic views, they have left wives > behind to come here, large sums of cash on hand even though they do > almost virtually no business at all, the unfamiliarity with their own > menu of products they claim to sell, and a perceived undercurrent of > intense anger on my last visit Thursday. Did the quick fall of Saddam's > government Tuesday have a bearing on their new attitude? > > > I also own another device called an Archos Jukebox recorder which fits > in your shirt pocket. It records up to 900 hours of audio in MP3 format > on a 20 G hard drive. While in the shirt pocket you are limited to about > 9 or 10 hours based on the limit of the internal rechargeable batteries. > Add an external power supply of some sort and you are good to go for > much longer. I use a tiny 12 volt rechargeable battery ($30 retail) and > a power cord converting that to 9 volts DC to provide a continuous power > boost to the Archos while recording at a convention. I just turn it on > and forget it until everything is over with. The Archos has one defect > when using its internal mike, it picks up the memory dump to hard disk > every couple of minutes as a sound like a bilge pump kicking on. One > solution is to use one of the line in inputs and a suitable dynamic > mike. At conventions I see if I can plug into the sound system and use > that high level input. No one seems to mind as the Archos is the size of > a pack of cigarettes and has its own internal power. > > Apple makes an IPod and Creative Labs makes a Nomad which more or less > do the same thing. > > Vic > ki4je > > > I've stopped 151 spam messages. You can too! > Get your free, safe spam protection at > http://www.cloudmark.com/spamnetsig/ > > -- > > -----Original Message----- > From: Michael Puchol [mailto:mpuchol@s...] > Sent: Thursday, April 10, 2003 2:27 PM > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] Re: Cell Phone Bug > > > Also, bear in mind that a lot of the new generation phones have voice > recording capabilities, some to a limited internal memory, and others to > insertable memory card. One notable example (with which one of my > clients had an incident) is the Nokia 9210 which features an MMC card > slot, which can host cards of up 128MB, allowing a very long recording > time. > > Since the "computer" side of the phone always works if a battery is > inserted, even if the phone is switched off (and thus the front LCD will > be blank), you can silently start the recorder, close the lid, and have > it record everything going on around a conference table. > > So, it may not be as simple as asking people to turn off the phones, or > installing detectors. Phones stay outside, period. > > Cheers, > > Mike 7207 From: Steve Uhrig Date: Sat Apr 12, 2003 2:30pm Subject: Computer security stuff FOR YOU From something I wrote for the MD PI list where I am the resident web weenie. Probably most people here will know more than I do about this sort of thing, but at least the links may be worth something. ..... Steve =========== Firewalls are programs which prevent persons you do not invite from accessing your computer. They are mandatory if you have a full time internet connection, and highly advisable for anyone. My firewall stops perhaps a few hundred attempts for hackers to get into my computer each day. Without a firewall, they would. I use Zone Alarm. They have a free version which works fine *unless* you are running a network. If you are running a network, you need the paid Zone Alarm Pro. Zone Alarm Pro is not a bad idea even if you do not run a network, as it is a lot more flexible. If you do run a network, your network guy should have some sort of firewall implemented. http://www.zonelabs.com/store/content/home.jsp There is an update out to the Zone Alarm Pro firewall which is *much* more flexible with cookie blocking. Also has some bug fixes and a simpler user interface. You need to allow session and persistent cookies for places like ebay, Fedex, yahoo, etc. Some people seem to think all cookies are evil. They're appropriate in certain circumstances, and very convenient, and NOT a security threat if you manage things properly Before, you had to allow or deny cookies globally. If you visit the online wire services, for example, you'll add a persistent cookie for each news item you read. Every day or two, I'd have to manually clean out dozens of cookies. Don't clean cookies for a month or two and tons of spam and things would bog down when you visit certain sites. Was ready to write a macro to automate removing annoying cookies. Now with the new ZA Pro, you can make exceptions + or - on a site by site basis. I've been running it for a few days now, and have not had a *single* cookie written where before I would have had maybe a hundred. If you're a registered ZA Pro user, it's a free painless upgrade. Click on 'upgrade' in the control panel and go from there. Also, Spybot is a utility for finding and removing malicious code in your machine which sends info you don't want sent, like your personal info, sites you visit, stuff you download, etc. It was rated #1 last month by PC Magazine, and is FREE. You donate if you think the thing helps you, like Mailwasher. The info collected is sold and resold and resold to spammers. Since they then know who you are and what you do, what your interests are, etc., they can send targeted spam to you. http://security.kolla.de/ There are three built in things in Windows which report your configuration, identity and activity with certain applications to Microsoft and somewhere else. They're there just by virtue of your having the operating system. All my machines had the same three hidden 'spy' routines to built-in Windows applications, on both W98 and Windows 2000 operating systems. Spybot found them and pulled them out. I have inspected a number of machines for others with Spybot and found usually between a dozen and three dozen malicious applications. One guy had over 100, because he lets his kids play with his computer unsupervised. It's nearly impossible to be active on the web without having some of these things infect you unless you happen to be extremely anal and paranoid and run all sorts of security. If you let kids use your machine or you use it as a toy, it's not wise to use it for business. Computers can be a tool or a toy, and if you try to mix the two, you're almost guaranteed problems. Be sure to read and understand the instructions. Removing the malicious code attached to some free sites and programs, like Kazaa, will disable them. If some site or program seems to give you a lot of stuff for free, look closely. It's not free. They're gathering info on you and your web activities, and selling it to spammers. Use a utility like Spybot to deny them that info, and they'll refuse to run unless you reinstall them. If you run into that, that should tell you something. Spybot is very easy to use in beginner mode, and you don't have to understand anything. It will hold your hand and walk you through things and explain what is and is not a problem and suggest what action to take and any potential consequences of that action. And anything you do is reversible. Be sure to donate something to the author if you use the thing. There are ways around all these problems in the first place, but they take some effort and skill to implement. Absent that, you can fix the problems after they occur. The utilities mentioned above will help you both prevent and repair problems. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7208 From: Matt Paulsen Date: Sat Apr 12, 2003 8:57pm Subject: Cold War Espionage page http://www.cnn.com/SPECIALS/cold.war/experience/spies/ 7209 From: Date: Sun Apr 13, 2003 4:25am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7210 From: Date: Sun Apr 13, 2003 4:25am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7211 From: Mitch D Date: Tue Apr 15, 2003 11:50am Subject: Intl. Spy Museum, Washington, D.C. mini report To all who were curious; I just completed the tour of the International Spy Museum in Washington DC. There are 3 areas,the museum,the store,and the cafe. For entry to the museum,I suggest purchasing tickets before hand as one may have to wait in line for over an hour to enter. No photography allowed,"PTZ Domes" patrol the interior. You enter the museum,and watch small interviews of former intelligence officers who describe the motives,and challenges of spying then proceed to an elevator,which will take you up to an area where you will learn about covers and obtain a cover identity,and begin the tour. A small theatre is setup where you watch a small,brief narrative about the reasons for spying. Various tools and gadgets are on display,as well as interactive touch screen terminals to learn about surveillance,analysis,and observation. Many of the gadgets are older devices,which include transmitters,receivers,encyption/decryption devices,an enigma,hollow coins,a replica of the "Thing" that was placed in the US embassy in Moscow,a US mailbox that was well scraped and marked, that was used for signalling "drops",some delco mini transmitters from the cold war,hidden video devices,an explanation of micro dots,tool kits that could be hidden in body cavities,old night vision gear,lockpicking tools,etc... No where on display did I see a TDR or Spec A, A lot of emphasis was given throughout the museum on how,and why spies had to supply their goverments with accurate information that of course would influence decisions that were going to be made that would alter history. Included was a display of the tunnel that was built between east and west germany,the history of its construction,how it was disovered before it was finished,and its final demise. Aircraft used for intelligence,manned and un manned were shown along with capabilities,and periods of operation,and purpose,as well as incidents involving such aircraft.An area was dedicated to the use of pidgeons that carried cameras for forward observation use,and displayed photos of and from the birds while working. There were terminals that allowed visitors to test their codebreaking skills,in addition to displays that told stories of spies both male and female from the days of Moses,all the way to Aldrich Ames and Robert Hanssen, their motives and their defeats. One thing I found particularly interesting,was a briefcase on display that contained "rf detection equipment" that I believe was used by Ames. Two Silver boxes,each with analog meters scaled from 1 to 10,several toggle switches,along with a speaker covered with silver mesh, were mounted side by side in a briefcase,along with a wand.A CCS Decal (Communications Control Systems)or (Control Communication Systems) was affixed to the gear,white letters with a black background. The museum was worth the admittance fee (12 bucks) and took a couple of hours to go through.Not recommended for kids under 12,as it seemed like they were more interested in the toys in the gift shop. Cheers MitchD __________________________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo http://search.yahoo.com 7212 From: Date: Tue Apr 15, 2003 7:54am Subject: Re: Intl. Spy Museum, Washington, D.C. mini report In a message dated 4/15/2003 9:52:11 AM Pacific Standard Time, rockdriver@y... writes: > A CCS Decal (Communications Control Systems)or (Control > Communication Systems) was affixed to the gear,white letters > with a black background. > Wow, very impressive. [Non-text portions of this message have been removed] 7213 From: Steve Uhrig Date: Tue Apr 15, 2003 0:07pm Subject: Re: Spy Museum > rockdriver@y... writes: > > A CCS Decal (Communications Control Systems)or (Control > > Communication Systems) was affixed to the gear,white letters > > with a black background. On 15 Apr 2003 at 12:54, MACCFound@a... wrote: > Wow, very impressive. He got caught! Now we know why. 7214 From: Mitch D Date: Tue Apr 15, 2003 6:12pm Subject: Museum The Enigma could have been a "Hollywood model",as its authenticity was never declared,It just sat there in a glass case. After almost getting tossed out of Graceland several years ago for taking photos,I took heed to the IS Museum warning. The CCS device gave me the same impression that Steve U had.As mentioned earlier, there was little in the form of countermeasures equipment,except for the "Ames blinky box",and a Vietnam era rf jammer that self destructed as the batteries weakened..... Most of the non-military issue devices had little indication as to their respective manufacturers,although supercircuits and a few others came to mind in the covert video display.There were a few ancient devices that probably worked well considering the technology at hand during their era. The museum was worth the trip anyhow........ __________________________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo http://search.yahoo.com 7215 From: Date: Sat Apr 12, 2003 10:19pm Subject: Supplier Advice Please Hi all Can anybody in the group recommend a Far Eastern supplier perhaps Hong Kong or Taiwan of Video Transmitter/Receiver modules on the 1.2 or 2.4Ghz range Thanks Regards To All Dave TSCM [Technical Surveillance and Countermeasures] David McGauley Demtec Electronic Surveillance and Counter Measures Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L39 0HF UK 01695 558544 07866206112 demtec@a... www.demtec.co.uk [under construction] The manufacture and installation of custom made covert electronic audio and video devices Professional physical and electronic counter measures [sweep] services. Note: any fellow UKPIN members welcome to call in to discuss applications. Workshop located alongside the M58 junc 3 [Non-text portions of this message have been removed] 7216 From: Ocean Group - MU TSD Date: Tue Apr 15, 2003 2:50pm Subject: Re: Spy trip Yeah but hang on a second....did his KGB handlers give him the stuff? Or did he go off and buy the stuff himself. I really really doubt the KGB recommend this kind of gear....they have/had their own state tech companies. Or worse yet, maybe they gave Ames some disocunt coupons they had left over to buy some gear from CCS....! Is it a wonder that the US is so spy free!! They may as well offer butter vouchers. Message: 3 Date: Tue, 15 Apr 2003 13:07:08 -0400 From: "Steve Uhrig" Subject: Re: Spy Museum > rockdriver@y... writes: > > A CCS Decal (Communications Control Systems)or (Control > > Communication Systems) was affixed to the gear,white letters > > with a black background. On 15 Apr 2003 at 12:54, MACCFound@a... wrote: > Wow, very impressive. He got caught! Now we know why. 7217 From: Charles P. Date: Tue Apr 15, 2003 11:30pm Subject: Re: Museum I really got a kick out of the remote trigger drain pipe microphone, and the remote self-drilling self-inserting wall mic! If I recall correctly, the drain pipe mic was installed during building construction, mic had audio pickup through the room wall. When it was time to start monitoring, they remotely triggered something that popped out into the drain pipe. It resembled an upside down umbrella, attached to a reel of very fine, very strong wires. Rain coming through the drain would catch the umbrella and wash it out into the sewer. There it would be retrieved and connected to the listening post. That's pretty clever. Charles ----- Original Message ----- From: "Mitch D" To: Sent: Tuesday, April 15, 2003 7:12 PM Subject: [TSCM-L] Museum > The Enigma could have been a "Hollywood model",as its > authenticity was never declared,It just sat there in a glass > case. > After almost getting tossed out of Graceland several years ago > for taking photos,I took heed to the IS Museum warning. > > The CCS device gave me the same impression that Steve U had.As > mentioned earlier, there was little in the form of > countermeasures equipment,except for the "Ames blinky box",and a > Vietnam era rf jammer that self destructed as the batteries > weakened..... > > Most of the non-military issue devices had little indication as > to their respective manufacturers,although supercircuits and a > few others came to mind in the covert video display.There were a > few ancient devices that probably worked well considering the > technology at hand during their era. > > The museum was worth the trip anyhow........ > > > > __________________________________________________ > Do you Yahoo!? > The New Yahoo! Search - Faster. Easier. Bingo > http://search.yahoo.com > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 7218 From: Andre Holmes <1ach@g...> Date: Wed Apr 16, 2003 2:13am Subject: Re: Re: Spy trip Hello group Don't think that the USA is SPY free. There was a encounter with a guy in Deer country that hosted a major car company and the guy had a foreign voice that asked for cables,which raised my eye browes when I heard his voice. First thing that came to mind was Spy. He was driving a van older guy busness appearel but stuck out in deer country with accsent.I would bet any day that he was Russien. Andre Holmes Neptune Enterprise Security USA ----- Original Message ----- From: "Ocean Group - MU TSD" To: "TSCM Yahoogroup" Sent: 15 April, 2003 03:50 PM Subject: [TSCM-L] Re: Spy trip > Yeah but hang on a second....did his KGB handlers give him the stuff? Or did > he go off and buy the stuff himself. > > I really really doubt the KGB recommend this kind of gear....they have/had > their own state tech companies. > > Or worse yet, maybe they gave Ames some disocunt coupons they had left over > to buy some gear from CCS....! > > Is it a wonder that the US is so spy free!! > > They may as well offer butter vouchers. > > > > > Message: 3 > Date: Tue, 15 Apr 2003 13:07:08 -0400 > From: "Steve Uhrig" > Subject: Re: Spy Museum > > > rockdriver@y... writes: > > > > A CCS Decal (Communications Control Systems)or (Control > > > Communication Systems) was affixed to the gear,white letters > > > with a black background. > > On 15 Apr 2003 at 12:54, MACCFound@a... wrote: > > > Wow, very impressive. > > He got caught! > > Now we know why. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 7219 From: Date: Wed Apr 16, 2003 10:30am Subject: Old Scam Resurging Voicemail Hacking Leaves Ears Ringing Customers and their long-distance providers are at odds over who is liable for charges rung up by scammers. By Kathy M. Kristof L.A. Times Staff Writer April 16, 2003 Voicemail can cost you. Just ask K.C. Hatcher, a San Francisco-based graphic artist. AT&T wants her to pay $12,000 in long-distance charges rung up by a hacker who apparently changed Hatcher's voicemail message to accept third-party billed calls to Saudi Arabia and the Philippines. "I am totally obsessing about this," said Hatcher, whose normal long-distance bill runs $35 a month. "I'm getting married in June. I want to buy a house, and I'm worried that this fraud is going to ruin my credit." Such voicemail hacking is on the rise -- and phone customers are wrongly being held liable for it, according to San Francisco-based Consumer Action. AT&T acknowledges that the scamming has become all too common and that people rarely know they have been had until company fraud investigators alert them to unusual activity on their phones. But AT&T, like some other long-distance providers, insists that consumers foot most of the bill. "It is the responsibility of the customer to secure their voicemail system," said Gordon Diamond, a spokesman for AT&T in San Francisco. Maureen Claridge, a San Francisco travel agent, doesn't see it that way but has been unable to persuade AT&T to let her off the hook. The company has sent her $8,000 long-distance bill -- generated by a voicemail hacker -- to a collection agent, Claridge said. Linda Sherry of Consumer Action maintains that telephone companies are largely to blame. Hackers take advantage of the voicemail offered by local phone companies -- including SBC Communications Inc., which provides the system Hatcher and Claridge use -- and long-distance companies' voice-activated operator services. What a hacker does is break into a person's voicemail and record a message so that it will respond affirmatively to an automated operator that calls the person's home phone seeking approval for third-party billing of a long-distance call. Sherry noted that at AT&T, the automated system always asks the same questions and waits a set interval for a response, making it fairly easy for a hacker to synchronize his fraudulent voicemail message. "That AT&T would permit third-party phone charges based only on the authority of a recorded message is beyond belief," Sherry said. "Third-party billing should be allowed only when a real person answers the phone and is able to verify that they approve the charges." AT&T's Diamond countered that the company's automated system is "fairly sophisticated," adding: "If it was a live operator, I don't know that it would turn out any differently." AT&T suggests that consumers change their pass codes regularly; avoid pass codes that are intuitive, such as birth dates and addresses; and check their announcements to make sure they haven't been changed. Diamond said AT&T works on a case-by-case basis with customers who believe they have been defrauded but doesn't necessarily write off fraudulent charges. MCI Communications also offers automated operator assistance and has a similar policy, spokeswoman Audrey Waters said. Sprint Corp. handles calls billed to a third party manually, which Sprint says has stymied this particular fraud. Meanwhile, SBC said it recently changed its voicemail system so that default pass codes aren't so easy to guess. The company says it has a policy of reversing charges when a consumer is willing to file a police report claiming fraud. Copyright 2003 Los Angeles Times [Non-text portions of this message have been removed] 7220 From: Ocean Group - MU TSD Date: Wed Apr 16, 2003 7:51am Subject: Funny War... Sure enough, the only guy you could rely on in the Iraqi war.... http://www.welovetheiraqiinformationminister.com/ 7221 From: David Alexander Date: Thu Apr 17, 2003 2:27am Subject: RE: Funny War... There was an item about him on BBC radio this morning, saying that there were reports that he hung himself as the Americans entered Baghdad. -----Original Message----- From: Ocean Group - MU TSD [mailto:inertia@o...] Sent:16 April 2003 13:51 To:TSCM Yahoogroup Subject:[TSCM-L] Funny War... Sure enough, the only guy you could rely on in the Iraqi war.... http://www.welovetheiraqiinformationminister.com/ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7222 From: James M. Atkinson Date: Thu Apr 17, 2003 11:15am Subject: U.S.: Leung may have tipped Chinese to spy investigation http://www.cnn.com/2003/LAW/04/16/crime.spy/index.html U.S.: Leung may have tipped Chinese to spy investigation From Kelli Arena CNN Justice Correspondent WASHINGTON (CNN) --An FBI informer in Los Angeles, accused of being a Chinese double agent, may have compromised a nuclear espionage investigation by revealing the identities of two FBI agents working on the case, according to U.S. government officials. Officials said Katrina Leung also might have tipped off the Chinese government about the United States' bugging of China's version of Air Force One. The continuing damage assessment in the Leung case includes an FBI internal review and the investigation of a second agent for possible misconduct. Leung, recruited by the FBI in 1982 as an informer, has been charged with espionage. Her FBI handler, retired agent James Smith, has been charged with gross negligence. Officials allege Leung also had an affair with another agent, now retired. That agent, William Cleveland, has not been charged. Leung was denied bail Tuesday after prosecutors argued she was a flight risk. The 49-year-old Leung is a well-known Republican activist in Los Angeles who raised thousands of dollars in political campaigns and arranged numerous California events -- including a 1997 state banquet for former Chinese President Jiang Zemin. In a criminal complaint, prosecutors said they believe that in one case during their alleged affair, Smith came to Leung's home with classified documents, and then left his briefcase open where she surreptitiously photocopied them without his consent, intending to share them with Chinese officials. One of the documents forming the basis of the felony charge is a June 12, 1997 memorandum about Chinese fugitives and the discussion of national defense information by a confidential FBI source. Leung admitted to investigators she obtained information from Smith without his consent at times and turned them over to the Ministry of State Security, a Chinese intelligence service. Smith, a 30-year FBI veteran who retired in 2000, remains free on $250,000 bond. He faces 10 years in prison if convicted. Lawyers for Leung argued FBI agents fed information to her for nearly two decades and encouraged her to give it to the Chinese government in order to obtain the trust of the Chinese in return. Prosecutors contend Leung established at least 2,100 Chinese government contacts, including top-level officials, during her 71 visits to the People's Republic of China. In his ruling Tuesday, U.S. Magistrate Victor Kenton said he had "substantial and serious questions" about Leung's foreign assets after she acknowledged receiving $1.2 million dollars as a consultant to a Hong Kong business but admitted committing tax fraud by allegedly hiding the money in overseas accounts. In denying bail, Kenton also said he cannot conclude Leung "does not still have classified information" that may be vital to U.S. national security and expressed concerns Leung may seek asylum. Leung who is being held at the Metropolitan Detention Center in downtown Los Angeles faces 10 years in prison if convicted. -- CNN Producer Stan Wilson and CNN Correspondent Charles Feldman contributed to this report. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7223 From: kondrak Date: Thu Apr 17, 2003 7:31pm Subject: RE: Funny War... You are correct, Comical Ali assumed room temperature! He was a funny guy..... At 08:27 4/17/2003 +0100, you wrote: >There was an item about him on BBC radio this morning, saying that there >were reports that he hung himself as the Americans entered Baghdad. > > -----Original Message----- >From: Ocean Group - MU TSD [mailto:inertia@o...] >Sent: 16 April 2003 13:51 >To: TSCM Yahoogroup >Subject: [TSCM-L] Funny War... > > >Sure enough, the only guy you could rely on in the Iraqi war.... > > >http://www.welovetheiraqiinformationminister.com/ > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7224 From: Marcel Date: Thu Apr 17, 2003 5:08am Subject: [WFHSG] Russian KGB surveillance short wave belt mounted portable receiver 'SOYKA'] -------- Original Message -------- From: Marcelrf@B... Subject: [WFHSG] Russian KGB surveillance short wave belt mounted portable receiver 'SOYKA' To: WFHSG Russian KGB surveillance short wave belt mounted portable receiver 'SOYKA' "WIRELESS FORUM HOMELAND SECURITY GROUP" Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG or Via E-Mail WFHSG-subscribe@yahoogroups.com [Non-text portions of this message have been removed] 7225 From: human being Date: Thu Apr 17, 2003 2:49pm Subject: Saddam's spywares [Saddam's spywares, via gizmodo.net] Bond-style cache reveals regime's deadly gadgetry By Raymond Whitaker 7226 From: A Grudko Date: Sat Apr 19, 2003 4:14am Subject: Re: Funny War... - Original Message - From: David Alexander > There was an item about him on BBC radio this morning, saying that there > were reports that he hung himself as the Americans entered Baghdad. It was probably the thought of having to eat McDonnalds and KFC and having Jerry Springer and the WWE on Iraqi TV that drove him to it. > -----Original Message----- > From: Ocean Group - MU TSD [mailto:inertia@o...] > Sure enough, the only guy you could rely on in the Iraqi war.... Yeah, he was a hoot - nearly as funny as Co-line Powell and his drawings of trucks that were mobile chemical weapon plants; and those satellite photos of oversize missile launch ramps that they can't find now. And my favourite one was the Arabs' phone tap - that - was hilarious, real 'Saturday Night Live from the Pentagon' stuff - fade to Jimmy Fallon..... Err, studio, please add some scratchy sixties tape noises on the back of the CIA secret wav file, take 5. OK, Ahmed and Ali, try again - action: "Get rid of the secret chemical weapons" "What?" "Get-rid-of-the-secret-chemical-weapons" "You mean, get rid of the secret chemical weapons" "Yes, the order is get rid of the secret chemical weapons" "Oh, OK, the SECRET chemical weapons" "Yes - and remember - it's a SECRET" Cut! Can't we get Jim Carey to do an A-rab accent?.......... Happy Easter Peaceful Pasach 'Toe the line' Syria Andy Grudko (British), Grad I.S, South Africa Registered as a security service provider by the Private Security Industry Regulatory Authority, registration number 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time . , 7227 From: Steve Uhrig Date: Sat Apr 19, 2003 7:06pm Subject: Stalin's spy service - SMERSH http://news.bbc.co.uk/2/hi/europe/2960709.stm Happy and blessed Easter everyone. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7228 From: Steve Uhrig Date: Sun Apr 20, 2003 9:31pm Subject: Telephone sweeping - excellent book Time to make another mention of an excellent resource for any new members of this list. Ted Swift in Maryland wrote an excellent book on telephone TSCM a while back. The book is about halfway between total novice and serious fledgling sweeper. Practically anyone from raw beginner to experienced pro will learn something from the book. It's high on the list of my recommendations to persons interested in the profession. Anyone considering getting into TSCM at any level would do well to start with this book. Definitely read it before you buy equipment. RF (radiated) threats get the majority of the attention because it's glamourous. Everybody likes the idea of hidden transmitters. The plethora of $15 and $15,000 RF sweep devices bear this out. However, the majority of threats are to telephones (conducted). These are ignored for the most part because there's far less profit in selling the relatively inexpensive equipment needed for telephone TSCM. However, far more important than equipment is knowledge. That's what Ted's book will give you, for a price so low it's barely a factor. http://www.angelfire.com/biz/investigator/index.html I did a review on this book some time back, and it's on Ted's webpage above. I keep my copy convenient on the bookshelf. I don't have any financial or other interest in Ted's book and he doesn't know I'm doing this post which I do about twice a year for the benefit of new members to this list. ====== WIRETAP DETECTION TECHNIQUES A Guide to Checking Telephone Lines Testing Procedures for Eavesdropping Countermeasures Surveys ====== Check it out. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7229 From: L A Date: Sat Apr 19, 2003 1:54pm Subject: Police and Security Expo The 17th Annual Police and Security Expo is scheduled for June 24th - 25th in Atlantic City NJ. You can register at: http://www.police-security.com/home.htm . This is a god place to see the latest in LE and Security equipment and they have a few seminars that might be of interest. If you are going to be there, please let me know as it would be good to meet some of my fellow List members! ===== L. Altman Caliber Investigation Agency (NYC) http://www.cia1.bravepages.com cia@i... Ph# 1-718-318-2214 Fax 1-718-318-2866 Newsletters: http://cia1.bravepages.com/nwsltr/Archives.html __________________________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo http://search.yahoo.com 7230 From: Julie Burger Date: Sun Apr 20, 2003 5:11pm Subject: Stalin's spy service - SMERSH Laughing, my maiden name is Smersh. My great grandfather came from Prague (the Czech spelling is Smrz) where Smersh/Smrz is actually just a mushroom with toxic qualities in high doses (this is where Smersh gets its connection with the meaning "death") and has medicinal qualities at lower doses (no, real medicinal qualities - not "happy mushrooms"). For generations, my ancestors ran an apothocary of sorts in Prague with a sign that used this mushroom (for the many people who couldn't read at the time) to designate that it was a place of remedies and herbs. Throughout many European countries, Smersh (and derivations of the word Smersh) have come to mean death and pain, but the original meaning going back much further is that of a simple mushroom that can used to heal as well as to hurt/kill. Like the old saying... the difference between pharmacology and toxicology is usually just dosage. Best wishes, Julie Topics in this digest: 1. Stalin's spy service - SMERSH From: "Steve Uhrig" ________________________________________________________________________ ________________________________________________________________________ Message: 1 Date: Sat, 19 Apr 2003 20:06:50 -0400 From: "Steve Uhrig" Subject: Stalin's spy service - SMERSH http://news.bbc.co.uk/2/hi/europe/2960709.stm Happy and blessed Easter everyone. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ________________________________________________________________________ ________________________________________________________________________ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ _________________________________________________________________ MSN 8 helps eliminate e-mail viruses. Get 2 months FREE*. http://join.msn.com/?page=features/virus 7231 From: kondrak Date: Tue Apr 22, 2003 3:45am Subject: Fwd: [ISN] New spy tools--for good or evil? > > >http://zdnet.com.com/2100-1107-997590.html > >By Declan McCullagh >CNET News.com >April 21, 2003 > >COMMENTARY -- Cisco Systems has created a more efficient and targeted >way for police and intelligence agencies to eavesdrop on people whose >Internet service provider uses their company's routers. > >The company recently published a proposal that describes how it plans >to embed "lawful interception" capability into its products. Among the >highlights: Eavesdropping "must be undetectable," and multiple police >agencies conducting simultaneous wiretaps must not learn of one >another. If an Internet provider uses encryption to preserve its >customers' privacy and has access to the encryption keys, it must turn >over the intercepted communications to police in a descrambled form. > >Cisco's decision to begin offering "lawful interception" capability as >an option to its customers could turn out to be either good or bad >news for privacy. > >Because Cisco's routers currently aren't designed to target an >individual, it's easy for an Internet service provider (ISP) to comply >with a police request today by turning over all the traffic that flows >through a router or switch. Cisco's "lawful interception" capability >thus might help limit the amount of data that gets scooped up in the >process. > >On the other hand, the argument that it hinders privacy goes like >this: By making wiretapping more efficient, Cisco will permit >governments in other countries--where court oversight of police >eavesdropping is even more limited than in the United States--snoop on >far more communications than they could have otherwise. > >Marc Rotenberg, head of the Electronic Privacy Information Center, >says: "I don't see why the technical community should hardwire >surveillance standards and not also hardwire accountability standards >like audit logs and public reporting. The laws that permit 'lawful >interception' typically incorporate both components--the >(interception) authority and the means of oversight--but the (Cisco) >implementation seems to have only the surveillance component. That is >no guarantee that the authority will be used in a 'lawful' manner." > >U.S. history provides many examples of government and police agencies >conducting illegal wiretaps. The FBI unlawfully spied on Eleanor >Roosevelt, Martin Luther King Jr., feminists, gay rights leaders and >Catholic priests. During its dark days, the bureau used secret files >and hidden microphones to blackmail the Kennedy brothers, sway the >Supreme Court and influence presidential elections. Cisco's Internet >draft may be titled "lawful interception," but there's no guarantee >that the capability will always be used legally. > >Still, if you don't like Cisco's decision, remember that they're not >the ones doing the snooping. Cisco is responding to its customers' >requests, and if they don't, other hardware vendors will. If you're >looking for someone to blame, consider Attorney General John Ashcroft, >who asked for and received sweeping surveillance powers in the USA >Patriot Act, along with your elected representatives in Congress, who >gave those powers to him with virtually no debate. > >I talked with Fred Baker, a Cisco fellow and former chairman of the >Internet Engineering Task Force (IETF), about his work on the "lawful >interception" draft. > > >Q: Why did Cisco decide to build "lawful interception" into its >products? What prompted this? > >A: Cisco's customers, not just in United States but in many countries, >are finding themselves served with subpoenas to mandate lawful >intercept functionality. Cisco received requests from its customers >for this capability. > >When I found out about the project, I asked to be involved because I >wanted to ensure that it was done in a manner that was as close to >balanced as I could get. From an engineering perspective, the easiest >thing is to give everything to law enforcement and let them sort it >out. But I wanted to do better than that. > > >When was that? > >The actual development of this document started probably seven to >eight months ago. > > >What was the reaction of the Internet community and the IETF after you >released the draft? > >I've seen very little reaction so far. We have been contacted by >Verisign, with which we had an NDA relationship. They said, "We'd like >to work with you on this." That's about all we've had. John Gilmore >(of the Electronic Privacy Information Center) posted comments to an >IETF mailing list. He wanted to ensure that the capability would be as >difficult to use as possible. > > >When will Cisco's customers be able to buy "lawful interception" >products or an upgrade? > >We haven't yet announced anything. Any product that a service provider >is likely to purchase will have an option to provide lawful >interception. That's not for all of our products but for a fairly >broad subset. > >We're in the process of doing early field trials on that capability. >In most cases it's a software upgrade. What we're doing is putting the >capability in a separate image so you know what you're getting when >you get it. Under U.S. law, if you have that ability, you could be >required to use it. Our service provider customers have asked us not >to put it in the standard image, so that they can't be forced to use >it. > > >How much will it cost? > >We haven't announced that. There was some discussion at some point >about putting in a nuisance fee. > > >What percentage of your customers who have asked for "lawful >interception" capability are within the United States? > >We have service provider customers in a number of countries that have >asked us for it. Some have been more insistent than others. > > >Do you have any moral problems with helping to make surveillance >technology more efficient? > >I have some moral and ethical issues, but I think quite frankly that >the place to argue this is in Congress and in the courtroom, not a >service provider's machine room when he's staring down the barrel of a >subpoena. > >There are two sides. One is that Cisco as a company needs to let its >customers abide by the law. The other is the moral and ethical issues. >There are two very separate questions. > > >The current draft does not include an audit trail. Could you do that >by having your equipment digitally sign a file that says who's been >intercepted and for how long? That could be turned over to a judge. It >could indicate whether the cops were or weren't staying within the >bounds of the law. > >I'm not entirely sure that the machine we're looking at could make >that assurance... In fact, the way lawful interception works, a >warrant comes out saying, "We want to look at a person." That's the >way it works in Europe, the United States, Australia and in other >western countries. The quest then becomes figuring out which equipment >a person is reasonably likely to use, and it becomes law enforcement's >responsibility to discard any information that's irrelevant to the >warrant. That kind of a thing would probably be maintained on the >mediation device. > > >Who controls the mediation device? > >The Internet provider. The mediation device picks out the subset that >relates to a particular warrant. > > >A few years ago (in RFC 2804) the IETF rejected the idea of building >eavesdropping capability into Internet protocols. The FBI supported >the idea, but the IETF said, no way. You were chair of the IETF at the >time. How do you reconcile your proposal with the decision made then? > >I thought that what the IETF decided to do was actually the right >thing to decide. What it said is that the IETF would not modify >protocols that were designed for some other purpose in order to >support lawful interception. > > >Will you discuss this at the next IETF meeting in Austria in July? > >We're hoping for community review. If people see any problems with >what we're doing on a technical level, we're all ears. We want to >produce the best possible capability in terms of security and the >capability required. > > >Have you had requests for this capability, directly or indirectly, >from government agencies? > >Yes and no. We got the request from our customers. The laws relate to >the ISPs, which are our customers. Certainly, if we get a request from >our customers that we can't support, there are penalties that accrue. > >We've had direct contact with the FBI and other agencies. When I was >in Holland I (spoke at a conference with the head of the equivalent of >the country's Central Intelligence Agency). The fact that he came out >and said something made the 8 o'clock news. I had a meeting with him >and some of his people a few days later to figure out what he wanted >and what he intended to do with this. As an engineer I wanted to >understand a customer's problem. > >We've had discussions with government agencies, but (they're generally >not) asking us to build a product. They do that with ISPs, who then >come to us. > > >What other companies are going a similar route? > >We're a little bit more open than everyone else. It really wouldn't be >appropriate for me to talk about other companies. It's not like we're >coming out and saying, "Hey, this is the reason you should buy a Cisco >router." This is something we're doing because our customers want it. > > >What do you think of governments with scant respect for privacy rights >using "lawful interception" technology to become more efficient >eavesdroppers? Do you ever stay up late at night worrying about what >they might do with it? > >Of course I do. But that problem is the reason I got involved. We have >some capabilities in some of our equipment that will allow you to take >all the traffic that goes across an interface and send it to another >interface. Right now that is used in some cases as a lawful >interception technology. > >When we first started talking, some engineers said, "Let's turn this >on and use that." I said, "Heavens no, if we can narrow the range of >information, let's do it." Let's let our customers meet their >requirements in as privacy-protecting a way as possible. So yes, >there's a conflict, but the conflict is why I got involved. 7232 From: Fernando Martins Date: Tue Apr 22, 2003 1:19pm Subject: open/public consultation in europe about video surveillance http://europa.eu.int/yourvoice/consultations/index_en.htm Working Document on the Processing of Personal Data by means of Video Surveillance European Data Protection Commissioners seek public opinion's view on video-surveillance. For the sake of transparency and efficiency the Art. 29 Data Protection Working Party launches a public consultation. http://europa.eu.int/comm/internal_market/privacy/workingroup/consultations/ consultation_en.htm - online consultation and draft documents FM From: Date: Tue Apr 13, 2004 4:25pm Subject: Feds seek limits on wiretap costs Feds seek limits on wiretap costs By Ben Charny CNET News.com April 13, 2004, 4:29 PM PT Hoping to contain "skyrocketing" costs, New York Attorney General Eliot Spitzer has asked the Federal Communications Commission to limit how much U.S. cell phone service providers charge law enforcement to wiretap calls. After a period of spiking prices, Spitzer's office now spends a budget-busting $400,000 to $500,000 annually on wiretaps, while some smaller law enforcement agencies aren't using the basic crime-fighting tactic at all, according to a document Spitzer filed Monday with the FCC. "Such a cost-recovery scheme (makes) intercepts prohibitively expensive for virtually all law enforcement agencies, and result in depriving law enforcement of an essential crime-fighting and anti-terror tool," he added. Cell phone service providers have warned for more than a decade that wiretapping would be an expensive proposition, much more so than traditional phone networks. Furthermore, there are mechanisms in place that allow law enforcement agencies to dispute any wiretapping costs if they feel they are being overcharged, a representative for the Cellular Telecommunications & Internet Association (CTIA), a cell phone industry trade group, said in response to Spitzer's request to the FCC. According to Spitzer, a yearlong wiretap costs between $5,000 to $26,400, depending on which U.S. cell phone service provider is doing the setup and maintenance. The CTIA representative did not comment on figures Spitzer's office provided. Spitzer's request is likely to be supported by the FBI, which has complained in the past of the high costs of wiretapping a cell phone call. An FBI representative had no immediate comment. URL: http://zdnet.com.com/2100-1105-5190899.html [Non-text portions of this message have been removed] 8447 From: James M. Atkinson Date: Tue Apr 13, 2004 9:45pm Subject: Re: Feds seek limits on wiretap costs So has anybody bothered to compare the amount of money his office is expending, to the actual number of wiretaps, and then chasing down the court orders behind the wiretaps as opposed to the number of illegal, non-court ordered wiretaps (being the difference between the two)? -jma At 09:25 PM 4/13/2004, NoPositiveWork@a... wrote: > Feds seek limits on wiretap costs >By Ben Charny >CNET News.com >April 13, 2004, 4:29 PM PT > >Hoping to contain "skyrocketing" costs, New York Attorney General Eliot >Spitzer has asked the Federal Communications Commission to limit how much >U.S. cell >phone service providers charge law enforcement to wiretap calls. > >After a period of spiking prices, Spitzer's office now spends a >budget-busting $400,000 to $500,000 annually on wiretaps, while some >smaller law >enforcement agencies aren't using the basic crime-fighting tactic at all, >according to a >document Spitzer filed Monday with the FCC. > >"Such a cost-recovery scheme (makes) intercepts prohibitively expensive for >virtually all law enforcement agencies, and result in depriving law >enforcement >of an essential crime-fighting and anti-terror tool," he added. > >Cell phone service providers have warned for more than a decade that >wiretapping would be an expensive proposition, much more so than >traditional phone >networks. Furthermore, there are mechanisms in place that allow law >enforcement >agencies to dispute any wiretapping costs if they feel they are being >overcharged, a representative for the Cellular Telecommunications & Internet >Association (CTIA), a cell phone industry trade group, said in response to >Spitzer's >request to the FCC. > >According to Spitzer, a yearlong wiretap costs between $5,000 to $26,400, >depending on which U.S. cell phone service provider is doing the setup and >maintenance. The CTIA representative did not comment on figures Spitzer's >office >provided. > >Spitzer's request is likely to be supported by the FBI, which has complained >in the past of the high costs of wiretapping a cell phone call. An FBI >representative had no immediate comment. > >URL: http://zdnet.com.com/2100-1105-5190899.html > > > > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8448 From: Steve Uhrig Date: Tue Apr 13, 2004 10:18pm Subject: Re: Feds seek limits on wiretap costs > Hoping to contain "skyrocketing" costs, New York Attorney General Eliot > Spitzer has asked the Federal Communications Commission to limit how > much U.S. cell phone service providers charge law enforcement to > wiretap calls. The cost comes out of the citizens' pockets however they juggle the books. > After a period of spiking prices, Spitzer's office now spends a > budget-busting $400,000 to $500,000 annually on wiretaps I expect the manpower cost for monitoring is the largest chunk of the cost here, as wiretaps must be monitored in realtime. The hardware isn't that expensive especially if the cost is amortized over many intercepts or a long time period. Software development and implementation to comply with CALEA was costly, however, and the cell carriers have every right to charge for that service, and not just until it's paid off either. Much of government, when complaining of costs, overlook the obvious: consume less. That's frequently a more effective method, but the thought apparently never has occurred to government. A cellular 'wiretap' actually requires three separate intercepts. One is mobile to mobile, another is base to mobile, and the third is mobile to base. Each is a separate data path and needs a separate slave and path to the LP. All three slaves are on a single plug in card now, though. Software still has to be custom written for the switch, and conform to industry standard output formats such as Penlink. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8449 From: David Alexander Date: Wed Apr 14, 2004 1:55am Subject: RE: Re: Tempest...No SpyShop BS, Just Science In my line of work (Information Security) we have produced what we call a "Statement of Security Capability" and it includes a few examples of what we can do and have done (suitably anonymised). It's a promotional 'freebie' that helps get us that first appointment. I would certainly include a sample 'debunk' of this nature in my Statement if it was in my field of expertise. My 2c. David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent:13 April 2004 20:49 To:tscm-l@yahoogroups.com Subject:[TSCM-L] Re: Tempest...No SpyShop BS, Just Science Once upon a midnight dreary, cornali@r... pondered, weak and weary: > What about outlining just the first few errors, as a pre-sales effort? > *pre-sales efforts are of course free of charge* Wrong. I know you're joking, but this leads into a serious point. ------------- Pre-sales efforts are paid for on a consulting arrangement, via a retainer paid in advance. If a sale results, the pre-sale consulting fees are credited in full thus costing the customer nothing. If the customer doesn't buy and is wasting our time, the fee covers our time, overhead and expenses. Position yourself as a technical specialist, not a salesperson. People waste less of your time that way. Does your attorney grant the first legal session free? Not reputable ones. Does he ever work out of his own pocket? Only on contingencies, and then you pay expenses usually anyway. He's only gambling his fees. You want to be positioned in the minds of potential clients as a professional, not a car salesman. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8450 From: Cornolio Date: Wed Apr 14, 2004 3:27am Subject: Re: Why do my posting not appear ? Dear Noel, > On to your Tetrascanner: > > I have developed a simple piece of equipment for the quick detection > and finding of Gps based devices, > > Quick Detection you say? Define "Quick" considering it takes 2 seconds (your > words) to go through the range of frequencies in your little "box", and what > you are looking for is a radiating signal or harmonic from a timing circuit, > I would suggest that to cover a small car properly would take you the best > part of half an hour...IF YO KNEW WHAT YO WERE DOING, which according to > this........ I know if you want to do it right, you dismantle the entire car. This takes much more than half an hour, but if done right gives you the most reliable result (if you know what to look for that is ;). Spending half an hour with Tetrascanner's box before doing so makes a lot of sense to me :) Personally I like his idea. Remember, he is not trying to sell you anything, he just tried to start a conversation about how easy and reliable finding the harmonics would be. If I remember well people on the list claimed it could not be done without expensive equipment. Now Tetrascanner proves them wrong using a $200 radio shack scanner? Can you show us at least one model GPS receiver where the harmonics could not be picked up from? > It can be operated by non skilled operators with just a little > understanding of radio-signals > > ........ isn't a given. I can only assume from the above that your chosen > market isn't TSCM professionals, because lets face it, all you've done is > take something like an old Bearcat 200 XLT, made it smaller, taken a few > things out, changed the frequency and VOILLA, a GSM detecter.... now...... You seem to mix-up GSM and GPS. > However there is one common frequency rediated from every Gps > receiver...this frequency is allways the same and is neccesary > to make the receiver work...without it a Gps receiver cannot > function....this frequency is : 1,023 Mhz wich is called > the "CHIPRATE" sometimes called "CHIPPING RATE" or "CA CODE" > > O.K. Oscillators giving chips a frequency of 1,023 Mhz. It could be true, > there are hundreds if not thousands of combinations you can use to get that > frequency. HOWEVER, considering that any radio circuit will be very well > shielded as per FCC regulations, that frequency will not escape the device, > and if it does it won't go more than a few inches.... so again I ask, how > long to check every inch of a vehicle? Compared to dismantling the entire car it saves a lot of time ... that is for sure... > Now I have some questions. My Nextel has a GPS receiver built in.... will > your "box" detect that? You could do a small test yourself, or send him your phone.... > WHY would someone use a GPS tracking system with GSM? GSM technology is on > the whole more accurate than GPS AND works quite nicely underground, inside > buildings and pretty much anywhere. Ask my staff, they get a bit annoyed > when I query their phones every half hour..... Finally someting in your posting that makes me smile ;) I know a lot of list members spend a good part of their lives learning about TSCM. And I know I could never reach this level of knowledge. But this does not give you the right to be so unfriendly to newcomers. Thinking about how to describe the attitude on this list best, I came up with comparing some people here to rock stars. Some people have the same attitude, and there sure are a lot of groupies here.... But from time to time I learn something here. Mostly from someone who is new here. The so-called rock-stars can only show their expertise by using strong words to piss off other peoples research, without explaining what is wrong. And of course they will try to sell you stuff (in mint condition, almost new, we accept credit cards ... bla bla) Greetings, Barry Wels Amsterdam The Netherlands 8451 From: savanted1 Date: Wed Apr 14, 2004 7:53am Subject: Chat, Copy, Paste, Prison The key evidence in a pedophile case in New Hampshire was thrown out by the judge as a violation of the state's wiretap statute. New Hampshire, like such other states as California, Connecticut, Delaware, Florida, Illinois, Maryland, Massachusetts, Michigan, Montana, Pennsylvania and Washington, requires all parties in a conversation to consent to recording the conversation. The evidence in question was a record of an America Online chat conversation in which a detective posing as a fourteen year old girl was solicited for sex by an adult. The judge ruled that since the defendant did not consent to the chat being recorded, its was not admissible as evidence. This contrasts with a pedophile case in Washington; there the conversation was conducted over ICQ, which saves conversations by default. A Washington court found that the defendant in that case should have known about the default setting, effectively consenting to the permanent record. This further contrasts with an employer's right to monitor employees' communications from company machines. In that case, the employer's right is considered part of an employee's contract, however, this does not address an employee's e-mails and phone calls with non-employees. The privacy implications are further confused since multiple copies of data packets are made as they traverse the Internet. http://www.securityfocus.com/columnists/233 8452 From: Fernando Martins Date: Wed Apr 14, 2004 3:47pm Subject: Re: Re: Tempest...No SpyShop BS, Just Science portuguese saying: "chicken broth and holy water, each one knows his mark" FM --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.657 / Virus Database: 422 - Release Date: 13-04-2004 8453 From: Date: Wed Apr 14, 2004 7:44pm Subject: Re: Approved Please have a look at the attached file. [Non-text portions of this message have been removed] 8454 From: Hawkspirit Date: Thu Apr 15, 2004 0:15pm Subject: GPS detection Sorry Monty, Tetrascanner has it right, the way to detect a covert GPS unit is by detecting its processor noise. Roger Tolces www.bugsweeps.com Date: Sat, 10 Apr 2004 20:51:46 -0700 (PDT) From: Monty Subject: Re: Gps Detection (detecting Gps trackers/devices) Have to say this from the beginning WHAT A PIECE OF BULLSHIT. Can what he says be done ? Yes But only in the quite of RF clean room. Could you ever rely on this in the field? NO !!! The problem is that people will buy this trash and this will just encourage him (and others like him) to continue to build crap. With a little more effort they could be building equipment that we could really use. Monty [Non-text portions of this message have been removed] 8455 From: Hawkspirit Date: Thu Apr 15, 2004 0:25pm Subject: Feds seek limits on wiretap costs The real joke is that Abdul and his buddies slide down to 7-11 for a new $49.00 cellular go phone every few days and the Fed's and the tax payers dance with zero results. Roger The cost comes out of the citizens' pockets however they juggle the books. > After a period of spiking prices, Spitzer's office now spends a > budget-busting $400,000 to $500,000 annually on wiretaps [Non-text portions of this message have been removed] 8456 From: CP Date: Thu Apr 15, 2004 5:06pm Subject: Re: RF Jamming - Stadium Protection I don't think I would want to attend an event where I knew that law enforcement and security personel did not have use of their radio systems! Rather self-defeating don't you think? ----- Original Message ----- From: Russ To: TSCM-L@yahoogroups.com Sent: Monday, April 12, 2004 5:21 PM Subject: [TSCM-L] RF Jamming - Stadium Protection Law enforcement in Washington State has asked me about the effectiveness of this system. Anyone have experience or knowledge? What about the ability of groups with a nefarious purpose gaining access to such a system and rendering law enforcement or first responders ineffective? Respectfully, Russ PROTECTION OF OLYMPIC SIZE STADIUMS AND LARGE ARENAS FROM IMPROVISED RADIO-CONTROLLED EXPLOSIVE DEVICES FOR IMMEDIATE RELEASE: New York, New York - April 2, 2004, Security Intelligence Technologies, Inc., today announced the launch of its new product, the STADIUM FREQUENCY SPECTRUM JAMMING SYSTEM (SJ5000). The SJ5000 is a bomb jammer that uses tower mounted stations in combination with mobile stations to provide protection for stadiums and temporarily crowded areas around the stadium from radio frequency (RF) operated explosive devices. RF receiving equipment in light towers and minibuses transmit and receive signals to detect, locate and jam RF spectrum within the preset vicinity.. The SJ5000 prevents the use of RF explosive triggering objects including cell phones, pagers or similar electronic products used in terrorist operations as well as jam almost any radio-controlled device smuggled into virtually any stadium, rendering them inoperable. "Radio Frequency controlled bombs and suicide bombers generally operate from a considerably short distance using transmitters with an output of less than 5 watts." States Brady Geril, VIP of Product Management at SITG." Their primary terrorist tactic is creating fear of an attack more than the attack itself. A large, crowded, public space presents an obvious target because it allows terrorists to blend into their surroundings and choose their desired moment of detonation. Without the SJ5000, defense in this situation would be quite limited and the detonation of even one isolated bomb within the perimeter would cause panic and chaos." A stadium-centered computer serves as the main control of the SJ5000's operations and executes all frequency-finding procedures. Jamming stations providing local jamming to all entrance areas can be extended by the addition of mobile stations driven around the stadium. The towers and mobile units may serve as observation posts for security teams who are also able to communicate by programming communication windows into the system, allowing security personnel to speak with each other throughout the stadium during frequency jamming. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 8457 From: Date: Thu Apr 15, 2004 3:54pm Subject: Can gov't secretly track workers in Oregon? Can gov't secretly track workers in Oregon? 03:41 PM PDT on Thursday, April 15, 2004 By CHARLES E. BEGGS, Associated Press Writer SALEM, Ore. -- The Oregon Supreme Court confronted the issue Thursday of whether the government can secretly track its workers without search warrants if they're using government vehicles. The court heard arguments in an appeal by former U.S. Forest Service worker Tamera Meredith, convicted of two arson counts involving forest fires set in 1998 in the Umpqua National Forest. It did not say when it might rule. Authorities said Meredith, a fire prevention technician, set fires so she could earn overtime fighting them. Investigators put an electronic tracking device on her Forest Service truck, and she was seen setting one fire by people in a surveillance plane who tracked the vehicle. Meredith is challenging her convictions on grounds that secretly tracking her amounted to a warrantless search that violated her protection against unreasonable searches under the state constitution. The state Court of Appeals in a 5-4 ruling rejected her claims. The court said tracking her didn't amount to a search because she had no legally protected "privacy interest in the location of her employer's vehicles while she was working on public land." But a lawyer for Meredith told the Supreme Court the fact that "government owns piece of property doesn't mean the government can use any means to track it." Rebecca Duncan, a state public defender, said the surveillance without a search warrant was intrusive enough to have violated Meredith's "right to be free from surreptitious tracking." Justice Thomas Balmer asked if her argument means government employees have more rights than private workers. Duncan said private employees have the same protections against government surveillance and that tracking Meredith was a police action because it was done by law enforcement agents for the Forest Service. The state contends that Meredith's privacy rights weren't violated because her agency was just exercising its authority to know where she was. "Any employer is entitled to know where an employee is in work hours when using government equipment," said Douglas Zier, an assistant state attorney general. More than 30 fires were set around the Tiller Ranger District of the Umpqua forest, totaling fewer than 250 acres. Meredith also was found guilty of setting a blaze in which Forest Service employees had recognized her voice reporting the fire on 911 tapes and linked cell phone records to the call. She was acquitted on 31 counts. [Non-text portions of this message have been removed] 8458 From: Date: Fri Apr 16, 2004 4:45am Subject: Wiretap equipment gets Lottery official fired Wiretap equipment gets Lottery official fired 04/16/04 Mark Rollenhagen Plain Dealer Reporter Ohio Lottery Director Dennis Kennedy was only kidding. Told last month that a technician was working on a better fingerprint system, Kennedy quipped that the next thing the technician would want is wiretapping equipment. To Kennedy's surprise, the Lottery's security director told him that the agency already had phone-tap equipment and had used it to secretly record conversations on a phone at Lottery headquarters in Cleveland. The revelation sparked an internal investigation that led to the April 2 firing of the Lottery's human resource director and a continuing criminal probe by the State Highway Patrol. Details about how the wiretap became known to top Lottery officials and why Human Resources Director Renee Bianchi asked for it in the first place are contained in a security report that the Lottery released this week. Bianchi, 47, of Parma, had worked for the Lottery for 13 years. In a letter to Bianchi, Kennedy said Bianchi was being terminated from her $69,000-a-year post because of "dishonesty, insubordination" and other actions. She has denied any wrongdoing and is considering legal action against the Lottery. In the report, Security Director Jack O'Donnell said Bianchi told him she wanted to record calls because she believed a former Lottery worker had made threats against members of the human resources staff. A human resources staff lawyer, who had told Bianchi it was OK to monitor business conversations, told O'Donnell that Bianchi said she wanted to tap the phone because she suspected a worker was providing "business information" to the former worker. The report doesn't state what information the worker was suspected of providing, but Lottery officials said it dealt with personnel issues. O'Donnell said in the report that, until Kennedy joked about wiretap equipment last month, he had assumed Kennedy had signed off on secretly recording telephone calls. [Non-text portions of this message have been removed] 8459 From: Steve Uhrig Date: Fri Apr 16, 2004 11:10pm Subject: Test - ignore Tetra reply. 8460 From: Ocean Group Date: Mon Apr 19, 2004 1:49pm Subject: IP Wiretapping I'd be interested to know how they will differentiate from private (household) and corporate used DSL lines, especially since they are often all run on the same circuits. If not they will be monitoring corporate email, pretty much a good reason for EU companies to use encrypted email "at least" within their own organisation. ******** Belgian police to snoop internet lines 16 April 2004 BRUSSELS - The League of Human Rights has slammed a "scandalous" move by the Belgian government to begin snooping on private email communications on the country's high-speed internet lines. The Computer Crime Unit of the federal Belgian police is to begin testing an Israeli system of so-called 'e-taps' on Belgacom high-speed internet connections on Monday, Belgian daily La Derniere Heure revealed. They then plan to install the system, which is capable of intercepting, reading and recording email messages, across all high-speed 'ADSL' lines in Belgium. "The legitimate fight against terrorism can in no way justify a practice which will see each citizen connected become liable to bugging," said a statement published Friday by the Belgian committee of the League of Human Rights (LHR). Belgium's federal police authorities said the testing of the tapping system, due to last several days, will not involve private internet lines but will only be carried out on Belgacom high-speed lines within the police administration. The LHR said it was "scandalised" by the move and "calls on the minister of the interior not to proceed with the tests of interception and recording and to definitively halt any introduction of this illegal system." The eavesdropping "constitutes a flagrant violation of the right to privacy as defined by both the European Convention on Human Rights and the Belgian constitution," the LHR added. Belgian press reports Friday claimed that unlike phone taps, which are applied to a specific line, the snooping on high-speed internet lines would involve the filtering of all email traffic in order to intercept the targeted user. The system, called Nice, can also moniter all internet activity on an individual computer, including which websites he or she is visiting. Belgacom onb Friday refused any comment on the plans. [Copyright Expatica News 2004] 8461 From: Michael Puchol Date: Mon Apr 19, 2004 3:55pm Subject: Re: IP Wiretapping Well - I am personally very worried about this new broadband-over-powerlines, in a switched system such as DSL, you can't "sniff" your neighbour's DSL traffic, as each one runs on their own pair to the switch - so you need to tap their line specifically. At the switch and beyond, more mass monitoring like these belgians are doing is easy, with the right access, but still, sniffing would be rather limited by design. However, with powerlines, as soon as I leave the doorstep, I am sharing a big, fat, 11kV line with the neighbourhood. Yes, filters at your inlet could be installed which would do the packet filtering so only your data gets through, but that would be so easy to circumvent. I wonder if NAI will come up with "Sniffer Powerline", with a special 360kV tap accessory which would let you sniff most of the countie's traffic. Spooks dangling from high-voltage towers? Maybe... Regards, Mike ----- Original Message ----- From: "Ocean Group" To: Sent: Monday, April 19, 2004 8:49 PM Subject: [TSCM-L] IP Wiretapping > I'd be interested to know how they will differentiate from private > (household) and corporate used DSL lines, especially since they are often > all run on the same circuits. > > If not they will be monitoring corporate email, pretty much a good reason > for EU companies to use encrypted email "at least" within their own > organisation. > > > > ******** > > > Belgian police to snoop internet lines > > 16 April 2004 > > BRUSSELS - The League of Human Rights has slammed a "scandalous" move by the > Belgian government to begin snooping on private email communications on the > country's high-speed internet lines. > > The Computer Crime Unit of the federal Belgian police is to begin testing an > Israeli system of so-called 'e-taps' on Belgacom high-speed internet > connections on Monday, Belgian daily La Derniere Heure revealed. > > They then plan to install the system, which is capable of intercepting, > reading and recording email messages, across all high-speed 'ADSL' lines in > Belgium. > > "The legitimate fight against terrorism can in no way justify a practice > which will see each citizen connected become liable to bugging," said a > statement published Friday by the Belgian committee of the League of Human > Rights (LHR). > > Belgium's federal police authorities said the testing of the tapping system, > due to last several days, will not involve private internet lines but will > only be carried out on Belgacom high-speed lines within the police > administration. > > The LHR said it was "scandalised" by the move and "calls on the minister of > the interior not to proceed with the tests of interception and recording and > to definitively halt any introduction of this illegal system." > > The eavesdropping "constitutes a flagrant violation of the right to privacy > as defined by both the European Convention on Human Rights and the Belgian > constitution," the LHR added. > > Belgian press reports Friday claimed that unlike phone taps, which are > applied to a specific line, the snooping on high-speed internet lines would > involve the filtering of all email traffic in order to intercept the > targeted user. > > The system, called Nice, can also moniter all internet activity on an > individual computer, including which websites he or she is visiting. > > Belgacom onb Friday refused any comment on the plans. > > [Copyright Expatica News 2004] > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > 8462 From: Ocean Group Date: Mon Apr 19, 2004 5:07pm Subject: RE: IP Wiretapping In reply to the often quoted, "If intelligence angencies want to crack commercial encryption, there are no obstacles". That may be so, but in the days where mass data storage and analysis is becoming more and more frequent, encryption stops questionable organisations finding gold nuggets the easy way, ie string searches, company targeting etc. No one is arguing that the security can't be broken, but it may be enough to stop the NSA* picking up on some new research and handing it to the US Dept of Commerce* office for distribution to their own companies in the "natural security" interest within a reasonable time frame. Time frame being the operative word in the modern world of fast moving business, and unfortunately terrorism as we saw from the admission from GCHQ and the NSA they they had 911 data but that it was never analysised and flagged till they went looking for it after the attack. * These are purely hypothetical and fictional representations and are not meant to reflect an actual organisation or office. -----Original Message----- From: Thomas Shaddack [mailto:shaddack@s...] Sent: 19 April 2004 21:40 To: Ocean Group Cc: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] IP Wiretapping On Mon, 19 Apr 2004, Ocean Group wrote: > I'd be interested to know how they will differentiate from private > (household) and corporate used DSL lines, especially since they are > often all run on the same circuits. History contains numerous examples from both sides of the Iron Curtain that the Powers-that-be are more limited by technical, cost, and manpower boundaries than by the legal ones. I suppose the assumption that the differentiation, if any, will be less meaningful that the CSOs would like. Numerous examples of various abuses may be found in Diffie, Landau: Privacy on the Line - the politics of wiretapping and encryption, MIT Press. Easy book, I read it in two cross-Ireland train rides. (Yes, it's THAT Diffie of Diffie-Hellman fame.) > If not they will be monitoring corporate email, pretty much a good > reason for EU companies to use encrypted email "at least" within their > own organisation. Especially if the required measures can be as low-cost as enabling support of STARTTLS extension of SMTP protocol (most SMTP servers support it already) on the mailservers. (I am responsible for the patch for the TLS patch for qmail, which adds support for Diffie-Hellman ephemeral-key ciphers for qmail 1.3. (Well... I borrowed it en block from stunnel, blessed be open-source.) The author of the original version later used it as an inspiration for better-solved implementation in version 1.4.) At least occassional regeneration of the DH prime on the server is advised for a degree of backward security, so the adversary won't be able to decode the tapped communication after seizing or hacking the machine[1]. Another advantage of STARTTLS support is that once deployed on your server, the communication with all other servers with this feature enabled runs encrypted as well. Exactly how opportunistic crypto should work. It is also strongly advisable to use SSL for POP/IMAP/SMTP connection to the servers (again, most email clients offer this, including Outlook and Outlook Express, the lousiest ones of them). Even if the client itself doesn't support SSL at all, or doesn't support a feature we'd want to use (Outlooks are famous for ignoring the existence of eg. client-side certificates), we can proxy the TCP connection through stunnel running on the client machine. (Again, installation is easy; it's a well-written non-Microsoft software, so just drop the configuration files, executables and libraries to the required directories.) As far as I know, the contemporary telecom infrastructure is designed to easily support only requests for passive wiretaps - recording only. Even the "cheapest" implementation of SSL on the email links then can make the spooks' coffee taste noticeably more bitter[2]; you don't need any fancy stuff like signed certificates and a CA for this purpose, and the stuff runs even with expired certificates, even if some mail clients - the better ones that do the checks, I know about Mozilla - tend to complain. (A properly set up system, that includes enforced checking of the signed certificates, can protect you also against MITM attacks (which can be as easy for the adversary as spoofing your DNS server or resolver). However, this system has more variables in it and can be more prone to failure and misconfiguration, which costs time. Another possibility is to use the certificates, and just log any disagreement with required reality. This provides the flexibility of an "insecured" system together with the assurance nobody is attempting MITM. Which brings me the idea of implementing something that arpwatch is for MAC addresses, but for IP addresses and SSL certificates; a daemon that listens on the connections and keep the database of server certificates vs their IP addresses, and logs any addition and change.) [1] Rumours say the advent of quantum computers will make it possible to bruteforce the encrypted data. There may be some truth on this; the PKI infrastructure relies on three parts: symmetric ciphers (eg. AES256), asymmetric ciphers (eg. 2048-bit RSA), and hash functions (eg. SHA1). More advanced rumours say that the structure of contemporary symmetric ciphers may be to large degree resistant to quantum computing, the asymmetric ciphers that rely on big primes may become easy to get compromised, and my gut feeling says that the hash functions are a big unknown; there is not much published research on this topic and they get often forgotten in the great scheme of things, where ciphers get all the attention. There is a potential to survive even this - but until a new public/private key scheme that doesn't depend on primes gets published, it will be necessary to brush off the thick layer of dust from the old and trusty Vernam cipher. Its potential to quickly deplete the keyspace may be alleviated by combining it with eg. AES (or Serpent, which is reportedly more robust, but due to other technical considerations was rejected for AES in favor of Rijndael) and use only 32 bytes of the key material per message. [2] It's still possible, but it requires more resources on the routers, may affect their reliability (if the operator screws up, the routing tables may get broken for all the downstream "clients" of the router), adds delays on the connection (which may make it potentially possible for the wiretap to get disclosed), requires more experience and is more expensive. More sophisticated methods can protect against this too. We can count "cyberattacks" as a form of an active attack, together with MITM - standard measures of computer security apply here; omitting this possibility would, in the words of Bruce Schneier, equal to mounting bank vault door on a tent. 8463 From: Eric Leonard Date: Sun Apr 18, 2004 0:31pm Subject: DOJ Can't Process FISA Fast Enough AP: FBI said buried by security demands The number of secret surveillance warrants sought by the FBI has increased 85 percent in the past three years, a pace that has outstripped the Justice Department's ability to process them quickly. Even after warrants are approved, the FBI often doesn't have enough agents or other personnel with the expertise to conduct the surveillance. And the agency still is trying to build a cadre of translators who can understand conversations intercepted in such languages as Arabic, Pashto and Farsi. These are among the findings of investigators for the commission probing the September 11 attacks, which has criticized the intelligence-gathering efforts of the CIA and FBI. FBI and Justice Department officials said yesterday that they are working to address all three issues, which limit the government's ability to gather the kind of intelligence needed to head off terrorist attacks. The warrants, authorized by the Foreign Intelligence Surveillance Act, allow for wiretaps, video surveillance, property searches and other spying on people thought to be terrorists or spies. After the 2001 Patriot Act and a key 2002 court decision crumbled the legal wall separating the FBI's criminal and intelligence investigations, use of FISA warrants has soared as sharing of information has become easier. The number of warrant requests has risen from 934 in 2001 to more than 1,700 in 2003, according to the FBI. The agency adopted streamlined procedures to move the requests quickly from the field offices to headquarters after the September 11 attacks. But a report by the National Commission on Terrorist Attacks Upon the United States released this week found that the Justice Department approval process "continues to be long and slow" and that the mounting requests "are overwhelming the ability of the system to process them." 8464 From: JANVIER SÈbastien Date: Sat Apr 17, 2004 6:27am Subject: L'observatoire des sources ouvertes “ The Open Source Monitor “ www.lobservatoire.net (bilingual message!) Bonjour, Pour plus de justesse, le site voit son nom Èvoluer et devient bilingue (dÈpot lÈgal n∞ 04 3284829). Pour vous offrir une information encore plus lisible, le site fait l'objet d'une rÈorganisation. Les changements, partiels, seront dÈsormais hebdomadaires et reconnaissables au N ! Le site va aussi dÈsormais vous offrir des services de qualitÈ. Merci pour votre visite et votre fidÈlitÈ ! L'Èquipe de l'Observatoire des sources ouvertes Site dÈclarÈ ‡ la CNIL sous le n∞ 1008823 Merci de pardonner les petites imperfections que vous ne manquerez pas de constater ! ----------------------------------------------------------------- Hello, The name of the site gets with this change closer to what it is and becomes bilingual (legal deposit n∞ 04 3284829). To offer you a more visible information, the site undergoes reorganization. The changes will happend now weekly and easy to recognize with the N ! The site will also offer you services of value. Thank You for your visit and your fidelity! The team of The Open Source Monitor 8465 From: Thomas Shaddack Date: Mon Apr 19, 2004 4:29pm Subject: Re: IP Wiretapping On Mon, 19 Apr 2004, Michael Puchol wrote: > Well - I am personally very worried about this new > broadband-over-powerlines, in a switched system such as DSL, you can't > "sniff" your neighbour's DSL traffic, as each one runs on their own pair to > the switch - so you need to tap their line specifically. At the switch and > beyond, more mass monitoring like these belgians are doing is easy, with the > right access, but still, sniffing would be rather limited by design. > > However, with powerlines, as soon as I leave the doorstep, I am sharing a > big, fat, 11kV line with the neighbourhood. Yes, filters at your inlet could > be installed which would do the packet filtering so only your data gets > through, but that would be so easy to circumvent. > > I wonder if NAI will come up with "Sniffer Powerline", with a special 360kV > tap accessory which would let you sniff most of the countie's traffic. > Spooks dangling from high-voltage towers? Maybe... Not even spooks can circumvent the laws of physics. The transformers serve as big chokes that don't let the high-frequency signal through, so the neighbourhood segments are separated. I also suppose coils will be installed in the power lines, in order to split the area to smaller areas, because the whole area will share the maximum available bandwidth of the technology. In this aspect, it is very similar to the old 10Base2 thin-coax Ethernet or a 10BaseT with a dumb hub, a WiFi channel, or the cable modems (which you often can use to sniff on the traffic of your neighbours on the segment; a quick test if you can is to run tcpdump on the interface with the cable modem connected. If you see a lot of ARP requests, you are on such shared segment with many neighbours. (In contrast, DSL resembles more the 10/100/1000BaseT architecture with a switch, where the packets go only to the port where they belong, increasing both security and performance.) Passive fingerprinting of such traffic is fun (one of the best tools is p0f), you can get a good profile of what systems your neighbours run without sending out a single packet.) On such shared medium you can also perform ARP spoofing, by sending out fake ARP responses for the IP/MAC mapping of the network gateway and your target, convincing each of them that the other of them is you[1] - then you can mount any of the rich arsenal of possible MITM attacks. (You can also run your own DHCP server, with mostly the same effect. As a bonus, you can down an entire segment, by just one single wrong click of mouse, if you manage to enable it accidentally on a W2k machine. Ask any cable ISP tech for such stories; the men with too much grey hair for their age know the best ones.) However, if your ISP techs are worth their salt and their salt is worth their position[2], your behavior will be quickly detected and you will get a warning, get booted off the segment for TOS violation, or worse. (Passive listening will let you find about their policy about scanning and worms. Rich activity of port scanners and worm signatures in the traffic shows an ISP that does not care much. I maintain a friend's firewall on one such segment, there are days when his IDS console shines like a Christmas tree. No books can teach you what you can learn in such network neighbourhood.) [1] Presuming both the gateway and the client computer don't have ARP table hardcoded, which is possible but AFAIK very unusual. [2] Which excludes a great deal of low-wage Minesweeper-Certified Solitaire Experts and their kin, in accordance with Sturgeon's law populating about 90% of the IT positions in the wild. 8466 From: contranl Date: Mon Apr 19, 2004 4:58pm Subject: Through wall imaging ? (test ignore) . FCC says: " Wall Imaging Systems: Wall-imaging systems must be operated below 960 MHz or in the frequency band 3.1-10.6 GHz. Wall-imaging systems are designed to detect the location of objects contained within a "wall," such as a concrete structure, the side of a bridge, or the wall of a mine. Operation is restricted to law enforcement, fire and rescue organizations, to scientific research institutions, to commercial mining companies, and to construction companies. Through-wall Imaging Systems: These systems must be operated below 960 MHz or in the frequency band 1.99-10.6 GHz. Through-wall imaging systems detect the location or movement of persons or objects that are located on the other side of a structure such as a wall. Operation is limited to law enforcement, fire and rescue organizations. " They also mention that they are part of: Ultrawide Wideband Technology (UWB) Why is that so? (why are they UWB ?) is that "spread spectrum" or is it "frequency sweeped signals" ? I am refering to the use of this technique for surveillance purposes So either: A) the used frequency determines the degree of "penetration" trough the different materials...and therefore different frequencies are needed ? for example 6 frequencies for 6 different materials or B) all frequencies are used (not fixed channels) so the whole range is swept...sweeping is stopped when the results on the monitor are satisfying or C) or it's similar to spreadspectrum..where in this case the spreadspectrum could be a few ghz ? (instead of a few mhz or a few 100 mhz that is used for spreadspectrum communications ) that way there would always be some "good" frequencies that give the wanted picture...and at the same would make it more difficult to detect ? Who knows more ? have'nt seen such a unit advertised yet still classified ?...scary it is ! would that be detectable (i love detectors :):) as rf energy ? i suppose that reasonable power is needed What happened to the supreme court case that involved police using infrared to look for possible heat coming from marijuana-lamps the point there was if they where looking "of the wall" ,"in the wall" or "through the wall"...and if such evidence could be used By the way a "In Wall Imager" would be handy to find any electronics stuff that you normally would use a NLJ for (Broom) ? Tetrascanner -------------- this is a test message to see if it appears on the groups web-page if it does you may ofcourse reply. -------------- . 8467 From: Thomas Shaddack Date: Mon Apr 19, 2004 3:39pm Subject: Re: IP Wiretapping On Mon, 19 Apr 2004, Ocean Group wrote: > I'd be interested to know how they will differentiate from private > (household) and corporate used DSL lines, especially since they are often > all run on the same circuits. History contains numerous examples from both sides of the Iron Curtain that the Powers-that-be are more limited by technical, cost, and manpower boundaries than by the legal ones. I suppose the assumption that the differentiation, if any, will be less meaningful that the CSOs would like. Numerous examples of various abuses may be found in Diffie, Landau: Privacy on the Line - the politics of wiretapping and encryption, MIT Press. Easy book, I read it in two cross-Ireland train rides. (Yes, it's THAT Diffie of Diffie-Hellman fame.) > If not they will be monitoring corporate email, pretty much a good reason > for EU companies to use encrypted email "at least" within their own > organisation. Especially if the required measures can be as low-cost as enabling support of STARTTLS extension of SMTP protocol (most SMTP servers support it already) on the mailservers. (I am responsible for the patch for the TLS patch for qmail, which adds support for Diffie-Hellman ephemeral-key ciphers for qmail 1.3. (Well... I borrowed it en block from stunnel, blessed be open-source.) The author of the original version later used it as an inspiration for better-solved implementation in version 1.4.) At least occassional regeneration of the DH prime on the server is advised for a degree of backward security, so the adversary won't be able to decode the tapped communication after seizing or hacking the machine[1]. Another advantage of STARTTLS support is that once deployed on your server, the communication with all other servers with this feature enabled runs encrypted as well. Exactly how opportunistic crypto should work. It is also strongly advisable to use SSL for POP/IMAP/SMTP connection to the servers (again, most email clients offer this, including Outlook and Outlook Express, the lousiest ones of them). Even if the client itself doesn't support SSL at all, or doesn't support a feature we'd want to use (Outlooks are famous for ignoring the existence of eg. client-side certificates), we can proxy the TCP connection through stunnel running on the client machine. (Again, installation is easy; it's a well-written non-Microsoft software, so just drop the configuration files, executables and libraries to the required directories.) As far as I know, the contemporary telecom infrastructure is designed to easily support only requests for passive wiretaps - recording only. Even the "cheapest" implementation of SSL on the email links then can make the spooks' coffee taste noticeably more bitter[2]; you don't need any fancy stuff like signed certificates and a CA for this purpose, and the stuff runs even with expired certificates, even if some mail clients - the better ones that do the checks, I know about Mozilla - tend to complain. (A properly set up system, that includes enforced checking of the signed certificates, can protect you also against MITM attacks (which can be as easy for the adversary as spoofing your DNS server or resolver). However, this system has more variables in it and can be more prone to failure and misconfiguration, which costs time. Another possibility is to use the certificates, and just log any disagreement with required reality. This provides the flexibility of an "insecured" system together with the assurance nobody is attempting MITM. Which brings me the idea of implementing something that arpwatch is for MAC addresses, but for IP addresses and SSL certificates; a daemon that listens on the connections and keep the database of server certificates vs their IP addresses, and logs any addition and change.) [1] Rumours say the advent of quantum computers will make it possible to bruteforce the encrypted data. There may be some truth on this; the PKI infrastructure relies on three parts: symmetric ciphers (eg. AES256), asymmetric ciphers (eg. 2048-bit RSA), and hash functions (eg. SHA1). More advanced rumours say that the structure of contemporary symmetric ciphers may be to large degree resistant to quantum computing, the asymmetric ciphers that rely on big primes may become easy to get compromised, and my gut feeling says that the hash functions are a big unknown; there is not much published research on this topic and they get often forgotten in the great scheme of things, where ciphers get all the attention. There is a potential to survive even this - but until a new public/private key scheme that doesn't depend on primes gets published, it will be necessary to brush off the thick layer of dust from the old and trusty Vernam cipher. Its potential to quickly deplete the keyspace may be alleviated by combining it with eg. AES (or Serpent, which is reportedly more robust, but due to other technical considerations was rejected for AES in favor of Rijndael) and use only 32 bytes of the key material per message. [2] It's still possible, but it requires more resources on the routers, may affect their reliability (if the operator screws up, the routing tables may get broken for all the downstream "clients" of the router), adds delays on the connection (which may make it potentially possible for the wiretap to get disclosed), requires more experience and is more expensive. More sophisticated methods can protect against this too. We can count "cyberattacks" as a form of an active attack, together with MITM - standard measures of computer security apply here; omitting this possibility would, in the words of Bruce Schneier, equal to mounting bank vault door on a tent. 8468 From: Thomas Shaddack Date: Mon Apr 19, 2004 5:06pm Subject: Re: IP Wiretapping On Mon, 19 Apr 2004, Michael Puchol wrote: > I wonder if NAI will come up with "Sniffer Powerline", with a special 360kV > tap accessory which would let you sniff most of the countie's traffic. > Spooks dangling from high-voltage towers? Maybe... I forgot to mention a big concern of Broadband-over-Powerlines - the associated electromagnetic emissions. The impact is not only EMSEC, but also - and much more importantly - potential for jamming of all kinds of radio communication, including but not limited to emergency services one. But I *think* this aspect of the problematics was mentioned on this list already. I also forgot to mention that the same countermeasures against spooks with passive taps on the ISP routers can be effectively used against the nosy neighbours with tcpdump or Ethertap. At least until Walmart starts selling quantum computers. (Regarding quantum computers, there are rumours they already exist and are in use. However, I suppose that if that's true, they won't be used in less-worthy cases for now, as the potential disclosure of hints of their existence may be of too high strategical importance to undergo such risk. Remember that during World War 2 many thousands lives were sacrificed despite of knowledge of the upcoming raids or roundups. The bombing of Coventry in November 1940 can serve as a nice example how the mere possibility of hinting the adversary about the ability to decode their messages may be worth of an entire city, including the strategical manufacturing plants there.) 8469 From: Eric Leonard Date: Sun Apr 18, 2004 2:01am Subject: Fluke 990 Folks: Has anyone checked out the Fluke 990DSL/WT "Copperpro" test set? Seems to package DMM, TDR, and some basic digital service analysis into one small - pretty inexpensive - box. -Eric Leonard (glad to be back) 8470 From: Ocean Group Date: Tue Apr 20, 2004 7:45am Subject: EMSEC Funny little site, anyone with a couple of minutes and a few quids worth of parts may get some interesting results.... http://eckbox.sourceforge.net/ 8471 From: Steve Uhrig Date: Wed Apr 21, 2004 1:41am Subject: Question on wireless LANs Questions on basic security for you wireless data guys out there. Not my area and I'm trying to learn at least enough to discuss it intelligently: ---------- I imagine it would be fairly easy to steal an access point. People drop them down behind desks and such. Do access points contain encryption keys and other security settings? If not, where is the decryption done, presuming the user enables it to start with? Could a thief could take an access point back to their place, and take their time to extract security settings of the AP, MAC address of other network devices, etc.? How difficult might this be for a reasonably capable operator with some funding? Unless someone physically noticed the lesser coverage, I imagine a theft of one might go unnoticed, esp in places where someone bootlegged one which I understand is not unusual. ------------ Would appreciate info on this. Then will prob have more questions. Tks .. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8472 From: David Alexander Date: Wed Apr 21, 2004 5:29am Subject: RE: Question on wireless LANs Hi Steve -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: 21 April 2004 07:41 To: tscm-l@yahoogroups.com Subject: [TSCM-L] Question on wireless LANs Questions on basic security for you wireless data guys out there. Not my area and I'm trying to learn at least enough to discuss it intelligently: This is one of my areas of expertise, and I'm glad to be able to help. ---------- I imagine it would be fairly easy to steal an access point. People drop them down behind desks and such. Most places, if they have more than one access point you might get away without them noticing. An intelligent install (such as a proper CISCO setup) runs 24x7 monitoring both through the cabling and by monitoring signal strength from other devices. A good install will have turned down the power from maximum to half or a quarter to reduce the effective range and make it harder for those outside the immediate area to detect or connect to the device (In spite of what you might believe, the current record for an 802.11 link is 72 miles - with good aerials and some amplification). The only way to provide adequate security across a wireless LAN at the moment is to use encryption - IPSec can be made to work if properly configured, or a commercial product to provide an IP tunnel from the Client PC to a VPN server that sits in a DMZ before being allowed access to the internal domain, merely using the Wireless access as an (OSI model) low level transport layer. Oh yes, don't allow split tunnelling either. You can protect the Confidentiality and Integrity this way, but you can't stop a Denial of Service attack taking out your availability (see below). Do access points contain encryption keys and other security settings? It does contain these settings for the 802.11 security, but you don't need to steal a device in order to obtain the information you are after. If not, where is the decryption done, presuming the user enables it to start with? Could a thief could take an access point back to their place, and take their time to extract security settings of the AP, MAC address of other network devices, etc.? How difficult might this be for a reasonably capable operator with some funding? Unless someone physically noticed the lesser coverage, I imagine a theft of one might go unnoticed, esp in places where someone bootlegged one which I understand is not unusual. It does contain these settings, but you don't need to steal a device in order to obtain the information you are after. Get an 802.11 card then use software like Netstumbler, which runs on PCs, or Kismet which will run on a PDA (with a 802.11 card attached) for unobtrusive 'war driving' or 'war walking' when doing surveys. These will gather everything you need to make a successful attack. The are also tools like Airsnort which come in handy - that collects packets and runs a brute force attack - it normally takes about 3 hours to give you an 'in' to the network. You can also get a tool called Wepcrack, which can break the cipher once you have captured about 2 gigs of traffic. The cipher used at the moment are all based on RC4, which is quite weak. You will have network and MAC addresses, keys, everything. In most cases you won't even need to do this, most places don't configure anything but leave the 'out of the box' default settings. It's not even a challenge. Just walk up to the building with a wireless enabled device and you will automatically connect - about 4 times out of 5. The frightening thing is that Paedophiles and the like are now doing this - using wireless to down load their material through other peoples IP addresses. Terrorists can do the same. This process gives you the information you need without the tell-tale evidence of a missing node. ------------ Would appreciate info on this. Then will prob have more questions. Guessing what you will want to know next: It is easy to conduct a 'man in the middle' attack against an 802.11 system. The protocols used by wireless (which take up approximately half the quoted bandwidth of 55 Mbits/sec in 802.11g @ 2.4 GHz) are contained in what are called Management Frames. There is a flaw in the security model so that you can force a client to disconnect from the node by sending a spoofed disconnect instruction in a management frame. Set up your own node with a good strength and then send the disconnect frame. The client will drop its' connection and try to re-establish - capture the traffic it sends to your node when it does so. There are projects under way to address these issues - 802.11i and 802.1x, which are works in progress (maybe the end of this year if the committee pull their finger out),. They will use Temporal Key Integrity Protocol and also address other wireless protocol weaknesses. My professional advice at the moment, if anyone is thinking of using 802.11 right now, is don't touch with somebody else's ten foot pole, let alone yours. Leave it until we have stable, secure products next year. If you have to do it, use the CISCO products and the security management tools they have to go with it - which costs almost as much as hard wiring I the first place. Tks .. Steve Hopes this helps Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 8473 From: Rick Hofmann Date: Wed Apr 21, 2004 0:09pm Subject: Passing of a legend I am sorry to report the passing of Sergio (Sarge) Borquez at approximately 4:30 a.m. on April 20,2004. Sarge died of heart failure. For those who did not have the pleasure of knowing him, Sarge was one of the early TSCM professionals. He joined the Drug Enforcement Agency shortly after separating from the U.S. Army where he served with the 101st Airborne (if I recall correctly) during the Korean Conflict. While with the DEA he studied technical surveillance and became a specialist. At one time Sarge was in charge of providing technical surveillance in the 7 western states. He was also responsible for installing the DEA's very first wiretap. There is a photo of Sarge climbing a telephone pole to reach the ready access boot to install the tap. It is a terrific picture. Sarge was a humble man who did not discuss his exploits with many people. I am privileged to have known him, and to have benefited by his instruction. He will be missed by all who knew him. Very truly yours, Rick Hofmann MICROSEARCH, LLC - Counter-eavesdropping specialists California PI License number PI16998 714-952-3812 www.microsearchllc.com [Non-text portions of this message have been removed] 8474 From: Thomas Shaddack Date: Wed Apr 21, 2004 5:21am Subject: [wearables] mobile phone exploits: bluejacking and remote monitoring (fwd) Quite unpleasant. Looks like there is certain wisdom in using old, obsolete phones without too many features. (I wish to have an open-source phone that I could pepper with monitoring devices in order to watch its operations (and learn more about the network operation during that - just a transmitter monitor LED, and even such simple thing can say a lot when one gets used to its patterns).) The backscatter from the phone as RFID is very interesting thing. Could be of interest for you. ---------- Forwarded message ---------- Subject: [wearables] mobile phone exploits: bluejacking and remote monitoring Date: Wed, 21 Apr 2004 01:57:57 -0400 From: R. A. Hettinga To: cypherpunks@a... --- begin forwarded text Date: Wed, 21 Apr 2004 01:28:11 -0400 (EDT) From: "Thad E. Starner" To: wearables@c... Subject: [wearables] mobile phone exploits: bluejacking and remote monitoring Sender: owner-wearables@c... Folks- I'm getting interview requests on the (lack-of) privacy aspects on mobile phones and need some help formalizing my ideas. I've included an article on bluejacking (exploiting bluetooth to extract info from mobile phones) below, but what I'm really interested in is methods to turn on the microphone on a mobile phone without the owner's awareness. Has anyone done this or heard of an exploit to do this yet? I can see three methods off-hand: 1) Bluejacking the phone, sending over a Java app, turning on the mic, and either a) sending the audio over bluetooth b) actually calling back the cracker's phone directly (either immediately or in a time-delayed fashion) c) storing the audio on the owner's phone and then uploading the data at a later time (with PDA cell phones with 4G flash cards, you could store a full year's worth of speech) 2) Having a Java (J2ME) trojan horse app on a website that, when the owner clicks on it, does variants of 1 3) The "service provider" remote downloads software "updates" that do the same thing as #1. (Does anyone have specific knowledge of service providers uploading software updates remotely) a) because the service provider is being forced to do so by a government agency (e.g. in the US based on a subpoena using the FBI wiretap law, for example) b) because the service provider is actually a cracker who got the appropriate software update codes c) because the service provider just thinks this is a good idea for some reason (I can put together some pretty paranoid scenarios for this, but nothing that is really compelling yet) (Note with some of these scenarios, the phone could actually look "off" because almost all phones use soft switches instead of actually disconnecting the power) Other things I'm interested in are 1) When the mobile phone is off, exciting the phone at the carrier frequency, looking at the back scatter, characterizing the specific characteristics of the phone, and then using these as a unique signature that I can use the phone like a passive RFID. I have a pretty good source that says this is actually being done now, but I can't use this info publicly. Anyone have a source I can quote or point to? 2) Using clusters of phones as phased array microphones. Sumit Basu did a phased array microphone based on mics in clothing where the topology was changing. Does anyone know if the math works well enough to do this on a room full of cell phones in people's pockets? Thad ------------ Bluetooth May Put You At Risk of Getting 'Snarfed' By JEREMY WAGSTAFF Staff Reporter of THE WALL STREET JOURNAL April 15, 2004; Page D3 If you spot someone tailgating you on the road or standing next to you wearing a backpack, then watch out: You may have been "snarfed." All the data on your cellphone, including addresses, calendars, whom you called and who called you, may now be in that person's computer. Many cellphones use Bluetooth technology, which allows them to communicate wirelessly with other Bluetooth-equipped devices -- computers, personal-digital assistants and other cellphones. This means you don't need a cable, for example, to synchronize the address books on your laptop and your cellphone. It is convenient, but that makes it possible for someone to steal your data, or even hijack your cellphone for their own purposes. Last year, London security consultant AL Digital spotted flaws in the way some Bluetooth cellphones swapped data with one another -- flaws that could be used to gain unauthorized access to everything stored on that phone without the user ever knowing. AL Digital's Adam Laurie, who discovered the problem, shared his findings with cellphone makers and with the public (leaving out the detail that might allow ne'er-do-wells to copy his experiments at street level). He termed the trick Bluesnarfing. Not a lot has happened since then. Nokia Corp., the market leader in the cellphone industry, acknowledges the flaw but says in an e-mail response to questions that it is "not aware of any attacks against Bluetooth-enabled phones." Sony Ericsson, a joint venture of Telefon AB L.M. Ericsson and Sony Corp., didn't reply to an e-mail. Even those highlighting the danger say they haven't heard of specific attacks. Still, these attacks -- also known as Bluejacking -- nevertheless are possible. Mr. Laurie cites a scenario in which paparazzi could steal celebrity data. He says he was able, with permission, to snarf from a friend's phone details of her company's shops, door codes and safe combinations. "There's any number of angles you can look at, and they are all bad as far as I can see," he says. Martin Herfurt, a 27-year-old German student at Salzburg's Research Forschungsgesellschaft, last month set up a laptop at a technology trade fair in Hannover, Germany, and ran a snarf attack. He found nearly 100 cellphones from which he could have stolen data, sent text messages or even made calls. He has published his findings to prove that this kind of thing can be done easily. How does it work? The attacker can use a Bluetooth-enabled laptop to discover other Bluetooth gadgets within range. Anything with Bluetooth activated and set to "discoverable" will show up, usually identified by its default device name. Being "discoverable" means your gadget is visible to anyone searching, but even if it isn't, an attacker still can find it, using software freely available on the Internet. The attacker then can use more software to take, delete, change or add data. So what is a consumer to do? Turn off Bluetooth on your phone unless you really need it to communicate with your other gadgets. In most cases, phones that have Bluetooth will have prominently displayed the fact on the box the phone came in, or you can expect to find "Bluetooth" in the index of your phone's manual. Otherwise, the Bluetooth settings can usually be found in the "Communications" or "Connections" menu on your phone. More importantly, there shouldn't be anything on your phone that you don't want someone else to have. Write to Jeremy Wagstaff at jeremy.wagstaff@f... --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' 8475 From: cismic Date: Wed Apr 21, 2004 11:49am Subject: Re: Question on wireless LANs Hi Steve, Wireless access points into a network can be a scary thing if not setup properly. A thief could hijack an IP via the MAC address, but only for the segment that they reside on. And when you have a wireless device the way it communicates with your network to let the network know it exists is via the MAC address. Any wireless device that you use to connect to your network should attach to a DMZ first. these articas shouldl shed some light on MAC hijacking. http://www.securiteam.com/tools/5QP0I2AC0I.html http://www.cigitallabs.com/resources/papers/download/arppoison.pdf Thank you, Joseph ----- Original Message ----- From: "Steve Uhrig" To: Sent: Tuesday, April 20, 2004 11:41 PM Subject: [TSCM-L] Question on wireless LANs Questions on basic security for you wireless data guys out there. Not my area and I'm trying to learn at least enough to discuss it intelligently: ---------- I imagine it would be fairly easy to steal an access point. People drop them down behind desks and such. Do access points contain encryption keys and other security settings? If not, where is the decryption done, presuming the user enables it to start with? Could a thief could take an access point back to their place, and take their time to extract security settings of the AP, MAC address of other network devices, etc.? How difficult might this be for a reasonably capable operator with some funding? Unless someone physically noticed the lesser coverage, I imagine a theft of one might go unnoticed, esp in places where someone bootlegged one which I understand is not unusual. ------------ Would appreciate info on this. Then will prob have more questions. Tks .. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS From: Craig Snedden Date: Sat Apr 14, 2001 4:29am Subject: Re: Career: Debugging Consultant Interesting... but I don't think I'd pick up much work from commercial clients with the monicker "debugging consultant". Easily confused with a "debug tech" in electronics/programming. A totally different field of expertise entirely. Craig ----- Original Message ----- From: "Dawn Star" To: Sent: Friday, April 13, 2001 7:01 PM Subject: [TSCM-L] Career: Debugging Consultant > http://www.jobprofiles.com/alldebugger.htm > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 2913 From: Steve Weinert Date: Sun Apr 15, 2001 6:42am Subject: Everybody can be "Big Brother" now Noticed this in the UK Telegraph: http://www.telegraph.co.uk/et? ac=004784377523311&rtmo=0xJi2Gsq&atmo=rrrrrrrq&pg=/et/01/4/12/ecfspy12 .html Not only do 'they' know a lot about 'us', we are increasingly willing to give up our privacy, too. And DIY gadgets widely available enable us to spy on others, reports Wendy Grossman BIG BROTHER - the Orwellian variety - is closer than we think. It's not just that closed-circuit TV cameras have popped up on every street corner to watch and record our movements. It is also the arrival of an entire generation of electronic devices that are internet-enabled or hooked up to phone lines. These can collect data about us and pass it on using their internet connections. Even though many promise to use the data they collect only for good, not for evil, the fact is that all kinds of data are being collected, and we don't know where this information will end up. ---- more at the URL ---- Here's looking at you: Casio's Wrist Camera watch , eSniff e-monitor Linux Computer, Xray Vision Wireless Internet Kit, TravelEyes2.... All consumer products that could affect our clients. - full text at the URL 2914 From: William Knowles Date: Mon Apr 16, 2001 4:08am Subject: Israel advertises for spies http://www.nandotimes.com/noframes/story/0,2107,500473706-500726634-504101922-0,00.html By PAMELA SAMPSON, Associated Press JERUSALEM (April 15, 2001 6:17 p.m. EDT) - Israel's spy agency is seeking a few good engineers - who can keep a secret. The Mossad took the unusual step Sunday of advertising in the help-wanted sections of newspapers in search of 13 engineers for its technology unit. The ad - which depicts heavy blue doors emblazoned with the state insignia of the Menorah, a seven-branch candelabra - is similar to one that ran last July, when the Mossad openly recruited for the first time in its three-decade history. Prime Minister Ariel Sharon's office issued a statement Sunday acknowledging the agency was having difficulty recruiting high-tech specialists. "The goal is to raise public awareness, especially among potential employees, of the existence of the unit and the special employment opportunities being offered to quality engineers in software and hardware development," the statement said. The ad says the Mossad is seeking male and female candidates with degrees in electronic or computer engineering and computer science. Candidates are invited to fax or e-mail in their resume. Other top intelligence agencies, including the United States' Central Intelligence Agency and Britain's MI5, also hold open recruitment. To draw candidates who might otherwise go to higher-paying private companies, salaries offered by the Mossad technology unit are being "updated," the statement said. It gave no figures. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 2915 From: William Knowles Date: Mon Apr 16, 2001 4:10am Subject: "Top secret" laptop reported missing http://uk.news.yahoo.com/010416/80/bkwiz.html For the life of me, I can't understand how the British seem to lose so many laptops with sensitve information on them, When I travel with a laptop I watch it better than some of my fellow travelers watch their own children, and my laptop isn't packed with national defence secrets. If memory serves me correctly, this is the second laptop reported lost in the back of a taxi. About now it would seem like a good idea to have the MoD use their own drivers shuttling personnel around over taking a cab. William Knowles wk@c... Monday April 16, 08:01 AM LONDON (Reuters) - A Defence Ministry laptop computer packed with national security secrets has gone missing after an official left it in the back of a taxi, the Mirror has reported. The laptop was thought to contain vital information about new weapons systems, it said. The Mirror said the official had notified police about the missing laptop. No immediate comment was available from the Defence Ministry or police. It was the latest of several laptops with military or intelligence information reported lost in Britain in just over a year. In March last year there were reports that agents of MI5, the domestic security service, and MI6, the overseas security service, had lost laptops containing secret information. The MI5 laptop, said to contain confidential information on Northern Ireland, was snatched at a London railway station. Before the start of the 1991 Gulf War, a laptop said to have contained combat plans was stolen from the car of a air force officer, who lost his job as a result. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 2916 From: James M. Atkinson, Comm-Eng Date: Mon Apr 16, 2001 6:57pm Subject: The cost of... being a spy The cost of... being a spy http://observer.co.uk/life/story/0,6903,473336,00.html Colin Eastwood Sunday April 15, 2001 The Observer It looks like the good old days are back for the espionage community. Spies were out of the news for much of the 90s, but recent arrests in China, Russia and the US have brought them, so to speak, out of the cold. Although most MI5 and MI6 operatives are recruited by their Oxbridge tutors, budding spies can easily become private eyes. So what do you put in that innocuous briefcase? Surveillance is all about information gathering, or eavesdropping. At a basic level, this requires a transmitter (or bug) which can be disguised in any number of ways: a calculator bug costs L644, a credit card-shaped bug, with 20 hours of battery power, costs L668. Or you can get a L652 pen bug. Bugging a telephone line is a little more complicated - a transmitter capable of tapping networked office telephones costs L850. A receiver will pick up signals from your transmitter: a standard pocket-sized model is L620, while serious surveillance will necessitate a L1,030 radio-controlled recorder. For your telephone tap, you will require a L995 receiver. If you have to work with your targets in person, use a body-worn recording system costing L895 - you may wish to team this with a disguise to enhance the subterfuge. As an agent, you won't be immune to bugging, either. Sweep the room with a RFD-Pro bug detector, which is worth every penny of its L2,750 price. As the catalogue says: 'Ideal if your potential adversary is sophisticated, well-funded and highly motivated.' Further defensive precautions include a voice changer, with eight voice-masking settings, for just L69. To scan the airwaves, invest in a DJX-10 scanner costing L249 and capable of scanning frequencies from 100KHz to 2000MHz. Another piece of kit, of the kind that Q might entrust to 007, is a wireless, pinhole spy camera. The tiny device can be hidden in clocks, mobile phones and smoke detectors, and is just L345. Move into the big league, international espionage, and you will need rather more expensive spying kit - something like an EP-3 ARIES II spy plane, for example. Manufactured by Lockheed Martin and retailing for at least L25m, it can monitor electronic signals from deep within another country. But the superspy is the US's Echelon network of satellite listening stations (including one based at Menwith Hill, Yorkshire). Annual budget estimates stretch from L0.5bn to L3bn. Transmitter L644 Receiver L620 Body recording system L895 Bug detector L2,750 Voice changer L69 Scanner L249 Wireless camera L345 EP-3 spy plane L25m -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2917 From: James M. Atkinson, Comm-Eng Date: Mon Apr 16, 2001 7:16pm Subject: FCC Nixes FBI's Plan To Change Wiretap Law FCC Nixes FBI's Plan To Change Wiretap Law http://www.newsbytes.com/news/01/164541.html By Brian Krebs, Newsbytes WASHINGTON, D.C., U.S.A., 16 Apr 2001, 3:02 PM CST The Federal Communications Commission (FCC) today denied an FBI request to change a federal eavesdropping statute, a move that would have forced telecom carriers to keep a tighter leash on employees who carry out court-ordered wiretaps. The FBI had asked the commission for "more effective personnel security obligations" at telecom companies to "ensure the trustworthiness of the private-company employees who have become increasingly responsible for implementing electronic surveillance." The additional security steps would have required carriers to maintain a list of personal information on employees who conduct wiretaps. Carrier employees would also have to sign nondisclosure agreements and agree to undergo thorough background checks by the FBI. The added rules also would have required carriers to report breaches of systems security within two hours. In justifying its refusal to implement the FBI's request, the FCC said most carriers already have adequate employee security measures in place. "Several carriers object to the suggestion they might not be responsible in controlling their own employees or that their employees might present security risks," the commission said. At issue is the Communications Assistance for Law Enforcement Act (CALEA), a 1994 statute that required wire-line and wireless telephone companies to build law enforcement surveillance capabilities into their newer digital communications systems. In 1998, the FCC granted an FBI request to include a punch list of four additional eavesdropping capabilities, to keep up with changes in technology - most notably digital or wireless transmission modes, or features and services such as call forwarding, speed dialing and conference calling. Several privacy groups and telecom industry associations later sued to overturn the law. Last August, the Federal Court of Appeals for the District of Columbia ruled that in implementing the punch list requirements, the FCC did not adequately consider the privacy or cost implications of the requirements. The court overturned the punch list items and ordered the FCC to justify the new items in light of the privacy and cost concerns. The FCC solicited and received comments on both issues last December, but it has yet to issue its justification as ordered by the court. "They have whatever time they choose to take and come up with justification for costs and the privacy issue," said Michael Warren, former chief of the FBI's CALEA Implementation Bureau, and director of Telecommunications and Law Enforcement Associates, consulting firm. Warren said while the deadline for compliance with the punch list requirements had been set at Sept. 31, that date would almost certainly be pushed back. He noted that most companies have yet to fully comply with even the basic statutes required by CALEA, let alone those that have been overturned by an appeals court. "The good thing is they haven't imposed new, more burdensome requirements that in our view added nothing to the integrity of this whole process," said Michael Altschul, vice president and general counsel for the Cellular Telecommunications Industry Association (CTIA). FCC officials were unavailable for comment on this story. But industry sources note that the punch list remand is being handled by the FCC's Wireless Bureau, which now has more deadline-oriented spectrum issues to resolve before even considering industry comments on the matter. Sources say the FCC could issue its revised rulemaking on the punch list items as early as this fall. To view the FCC release on this topic, visit: http://www.fcc.gov/Daily_Releases/Daily_Business/2001/db0416/fcc01126.txt Reported by Newsbytes, http://www.newsbytes.com 15:02 CST C 2001 The Washington Post Company -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2918 From: Steve Weinert Date: Mon Apr 16, 2001 11:47pm Subject: UK Article on Technical Surveilance Methods - NO HIDING PLACE http://www.sunday- times.co.uk/news/pages/sti/2001/04/15/magazine1.html?1007000 Actually the whole article " NO HIDING PLACE " is interestingly provocative. Only main area not covered in routing data/comms internationally to allow the actual monitoring from a second or third country (often with legal angle considerations). A short quote: "Police in the US, and some private agencies here, now have machines - called IMSI catchers - in their cars that fool your mobile phone into thinking they are base stations on your network. They can even tell your phone not to use any form of encryption. So they can listen to every mobile call you make. In addition, all big companies in the City of London routinely have to attach devices to their windows to prevent sensitive meetings being overheard through remote sensors that pick up voices from vibrations of the glass. Or there are Van Eck devices, which can read everything on your computer screen from a street away from your house. It is rumoured that one of these machines has been refined to the point where it can pick out one computer screen at the top of Canary Wharf from street level. Or tiny airborne devices the size of butterflies are being developed that can watch every move you make. And so on and so on. " 2919 From: David Alexander Date: Tue Apr 17, 2001 3:40am Subject: re: Top secret laptop missing >For the life of me, I can't understand how the British seem to lose so many laptops with sensitive information on them Perhaps we are just more open about reporting these things. Anyway, it's easier to lose a laptop in a taxi than it is to lose a hard disk in the secure vaults at Sandia. We leave the really hard things to the Americans . >If memory serves me correctly, this is the second laptop reported lost in the back of a taxi. About now it would seem like a good idea to have the MoD use their own drivers shuttling personnel around over taking a cab. The idea of the cost spend would give the bean-counters heart-attacks. They don't care about security. >Before the start of the 1991 Gulf War, a laptop said to have contained >combat plans was stolen from the car of a air force officer, who lost >his job as a result. For the record. The officer did not lose his job, and was later promoted to the equivalent of Full Colonel. I suspect this particular event may have been a dis-information exercise. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 2920 From: James M. Atkinson, Comm-Eng Date: Tue Apr 17, 2001 11:03am Subject: A blonde decides to try horseback riding A blonde decides to try horseback riding, even though she has had no lessons, or prior experience. She mounts the horse unassisted and the horse immediately springs into motion. It gallops along at a steady and rhythmic pace, but she begins to slip from the saddle. In terror, she grabs for the horse's mane, but cannot seem to get a firm grip. She tries to throw her arms around the horse's neck, but she slides down the side of the horse anyway. The horse gallops along, seemingly impervious to its slipping rider. Finally, giving up her frail grip, she leaps away from the horse to try and throw herself to safety. Unfortunately, her foot has become entangled in the stirrup. She is now at the mercy of the horse's pounding hooves as her head is struck against the ground over and over again. As her head is battered against the ground, she is mere moments away from unconsciousness when to her great fortune...... The Wal-Mart manager sees her and shuts the horse off. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2921 From: James M. Atkinson, Comm-Eng Date: Tue Apr 17, 2001 11:10am Subject: The Spy Who Lost Me The Spy Who Lost Me http://www.wired.com/news/politics/0,1283,43088,00.html by Michelle Delio 2:00 a.m. Apr. 17, 2001 PDT British intelligence officers have developed a rather worrying tendency of forgetting that they are carrying a computer, leaving a trail littered with lost laptops. The British Defense Ministry has reported 205 laptops missing since 1997 -- most of which contained classified information. That's an average of 51 lost laptops per year. The latest was reported missing on Monday. This one reportedly contained data about new weapons systems. Its owner left it in the back of a taxi. To combat this spate of missing-in-action machines, the Defense Ministry plans to outfit their absent-minded workers with secret-agent-style briefcases that protect national secrets by automatically destroying the contents of lost laptops' hard drives. Thieves have been blamed for some of the laptop losses, but the majority of the missing machines were simply mislaid by tipsy or distracted agents. Several dozen other laptops were lost when their owners forgot them on public transportation. An agent with MI6, Britain's international intelligence agency, lost her computer after getting drunk in a London tapas bar. She believes she may have left it in the bar. "For the life of me, I really can't understand how the British seem to lose so many laptops with sensitive information on them," said William Knowles, a senior analyst with security firm C4I and the moderator of the InfoSec security news mailing list. "When I travel with a laptop I watch it better than some of my fellow travelers watch their children. And my laptop isn't packed with national defense secrets." The Ministry did not respond immediately to a request for comment, but said in a press release that it plans to protect its laptops by purchasing 15,000 thief-proof briefcases, each priced at 1,000 pounds apiece (about $1,438). The cases open only when supplied with the proper codes. Hopefully, those forgetful agents will manage to remember the codes, since the cases have a built-in electronic self-destruct mechanism that erases a laptop's hard drive if the case is opened by force. The briefcases also have a tracking feature that allows a computer gone astray to call home for help. And while the machine waits for rescue, the case will shield it from damage by rain, cold, heat and bombs. The Ministry of Defense has not said who will be supplying them with the cases. This information might be useful, since the U.K. isn't alone when it comes to losing important laptops, Knowles said. The U.S. State Department recently lost two laptops with information on weapons of mass destruction, one owned by an agent in the Department's Bureau of Intelligence and Research, which contained highly sensitive encryption information. It was lost in April 2000, when it disappeared from the State Department's headquarters. Another, which contained nuclear secrets, also mysteriously vanished from the department's offices in December of 2000, prompting then-Secretary of State Madeleine Albright to impose strict new security procedures at the State Department. But British defense workers and security agents seem to have a goal of setting a world record for laptops-on-the-loose. Pentagon officials had to warn the Ministry of Defense to tighten up their security after a laptop -- containing details of a warplane being designed in tandem with the United States -- was snatched last May from a British navy officer while he was fumbling for change at the Paddington train station. Some of the laptops have been recovered, and it doesn't appear that any have been sold or given to enemies of the British Empire, unless you count the country's tabloid press. "I believe that most people, upon discovering that they have stolen or found a laptop with classified information, do return it to the Ministry," said Ian Murray, a London lawyer. "But, with roughly about half of those lost machines, we have heard reports of people trying to sell the contents to our tabloid press. I suspect that several of the thefts were carried out in the hopes of getting money for the computer's contents from the tabs," said Murray, whose firm was anonymously approached on several occasions by would-be clients asking him about the penalties for selling lost computers to the newspapers, rather than turning them in. "I advised them that they should simply give whatever they had found back to the Ministry, as there was a chance that some poor sod's job was on the line," Murray said. The Ministry attempts to keep its laptop losses private, but Murray says there are sometimes "obvious, understated but rather frantic" notices in the back of British newspapers, offering rewards for the return of lost laptops. "One Ministry of defense laptop that was pinched ended up at a pawn broker, who returned it after seeing an ad, and another was recovered after the British Security Services placed an ad in the Times as a student begging for return of the laptop with 'vital research notes' to the 'academic' that lost it, in return for a reward. That computer was recovered on March of 2000," said Knowles. Recently, the Mirror, a British tabloid, has begun running its own ads offering rewards for missing Ministry machines. The Mirror retrieved and eventually returned the laptop that contained the plans for the British-U.S. fighter plane to the Ministry of Defense. "All of this does rather make you wonder about the basic common-sense abilities of the people who are carrying our nation's secrets around in their briefcases," said Murray. Murray believes the Ministry could have solved the missing laptop problem far more cheaply by simply handcuffing its agents to their old briefcases. "I advise the use of handcuffs not out of meanness, but for their own good. Because, and mark my words, one of those witless agents is going to blow his computer or himself up whilst using one of the high-tech spy briefcases," Murray said. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2922 From: David Alexander Date: Tue Apr 17, 2001 9:26am Subject: US loses laptops too Further to my earlier posting - I knew I had seen a piece on US laptop lapses This is from the July 2000 edition of Secure Computing (West Coast Publishing) quote The Federal Bureau of Investigation has launched an intense examination into the January disappearance of a state department laptop, confirmed to have held highly classified information. The FBI is trying to determine whether the laptop was stolen or simply lost. As a result of this and other embarrassing security breaches for the federal agency, some members of the House of Representatives, including Chair of the House International Relations Committee Benjamin Gilman, have been leading hearings into what they consider to be lacking security controls in the department. For her part, Albright requested that a security review be conducted. As part of this assessment, an agency inventory has revealed that 15 of its 1,913 unclassified laptops are missing. All 60 classified notebooks, other than the freshly vanished one, have been accounted for. "The missing laptop is the latest in a long string of security failures at the state department," Gilman said in a released statement. "It is obvious that the department lacks a professional environment that is sensitive to security concerns." unquote One all, I think David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 2923 From: Aimee Farr Date: Tue Apr 17, 2001 10:52am Subject: RE: UK Article on Technical Surveilance Methods - NO HIDING PLACE Steve said: > Only main area not covered in routing data/comms internationally to > allow the actual monitoring from a second or third country (often > with legal angle considerations). "Huh?," asked the curious lawyer, inviting somebody to clue her in.... ~Aimee Aimee E. Farr Law Office of Aimee E. Farr 5400 Bosque, Suite 675 Waco, Texas 76710-4418 E: mailto:aimfarr@p... Outlook/Lotus click-to Contacts: http://my.infotriever.com/aimeefarr 2924 From: Talisker Date: Tue Apr 17, 2001 2:05pm Subject: Re: UK Article on Technical Surveilance Methods - NO HIDING PLACE Aimee I can think of 2 possibilities 1. There was much talk about 12 months ago of the possibility for a country to buy very fast communications to 2 countries which it wishes to monitor. Communications between these countries would then, using this quicker option, route through this third country, allowing said country to snoop on the traffic. 2. Or how about phreaking an exchange, changing it's configuration to route communications through this third country. A little more detectable. If anyone can think of any other methods I'd love to hear them, and yes perhaps I need to get out more Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List Security Tools Notification http://groups.yahoo.com/group/security-tools/join ----- Original Message ----- From: "Aimee Farr" To: "Steve Weinert" Cc: Sent: Tuesday, April 17, 2001 4:52 PM Subject: RE: [TSCM-L] UK Article on Technical Surveilance Methods - NO HIDING PLACE > > Steve said: > > > Only main area not covered in routing data/comms internationally to > > allow the actual monitoring from a second or third country (often > > with legal angle considerations). > > "Huh?," asked the curious lawyer, inviting somebody to clue her in.... > > ~Aimee > > Aimee E. Farr > Law Office of Aimee E. Farr > 5400 Bosque, Suite 675 > Waco, Texas 76710-4418 > E: mailto:aimfarr@p... > Outlook/Lotus click-to Contacts: > http://my.infotriever.com/aimeefarr > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 2925 From: Robert G. Ferrell Date: Tue Apr 17, 2001 2:53pm Subject: Re: US loses laptops too >One all, I think Well, in fact, for a while the US and Canada were keeping up with the UK tit for tat in the laptop loss race. I can remember at least three instances reported in the press in the last 18 months or so. It's just that we like to leave ours in pubs or phone booths, rather than in taxis. Different strokes for different folks... Cheerio, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2926 From: Date: Wed Apr 18, 2001 0:28am Subject: Humor; Lawyer / Witness Reported in the Massachusetts Bar Association Lawyers Journal, the following are questions actually asked of witnesses by attorneys during trials and, in certain cases, the responses given by insightful witnesses: 1. "Now doctor, isn't it true that when a person dies in his sleep, he doesn't know about it until the next morning?" 2. "The youngest son, the twenty-year old, how old is he?" 3. "Were you present when your picture was taken?" 4. "Were you alone or by yourself?" 5. "Was it you or your younger brother who was killed in the war?" 6. "Did he kill you?" 7. "How far apart were the vehicles at the time of the collision?" 8. "You were there until the time you left, is that true?" 9. "How many times have you committed suicide?" 10. Q: "So the date of conception (of the baby) was August 8th?" A: "Yes." Q: "And what were you doing at that time?" 11. Q: "She had three children, right?" A: "Yes." Q: "How many were boys?" A: "None." Q: "Were there any girls?" 12. Q: "You say the stairs went down to the basement?" A: "Yes." Q: "And these stairs, did they go up also?" 13. Q: "Mr. Slatery, you went on a rather elaborate honeymoon, didn't you? A: "I went to Europe, sir." Q: "And you took your new wife?" 14. Q: "How was your first marriage terminated?" A: "By death." Q: "And by whose death was it terminated?" 15. Q: "Can you describe the individual?" A: "He was about medium height and had a beard." Q: "Was this a male or female?" 16. Q: "Is your appearance here this morning pursuant to a deposition notice which I sent to your attorney?" A: "No, this is how I dress when I go to work." 17. Q: "Doctor, how many autopsies have you performed on dead people?" A: "All my autopsies are performed on dead people." 18. Q: "All your responses must be oral, OK? What school did you go to?" A: "Oral." 19. Q: "Do you recall the time that you examined the body?" A: "The autopsy started around 8:30 p.m." Q: "And Mr. Dennington was dead at the time?" A: "No, he was sitting on the table wondering why I was doing an autopsy." 20. Q: "You were not shot in the fracas?" A: "No, I was shot midway between the fracas and the naval." 21. Q: "Are you qualified to give a urine sample?" A: "I have been since early childhood." 22. Q: "Doctor, before you performed the autopsy, did you check for a pulse?" A: "No." Q: "Did you check for blood pressure?" A: "No." Q: "Did you check for breathing?" A: "No." Q: "So, then it is possible that the patient was alive when you began the autopsy?" A: "No." Q: "How can you be so sure, doctor?" A: "Because his brain was sitting on my desk in a jar." Q: "But could the patient have still been alive nevertheless?" A: "It is possible that he could have been alive and practicing law somewhere." 23. Q: What is your date of birth? A: July 15th. Q: What year? A: Every year. 24. Q: What gear were you in at the moment of the impact? A: Gucci sweats and Reeboks. 25. Q: How old is your son, the one living with you. A: Thirty-eight or thirty-five, I can't remember which. Q: How long has he lived with you? A: Forty-five years. 26. Q: What was the first thing your husband said to you when he woke that morning? A: He said, "Where am I, Cathy?" Q: And why did that upset you? A: My name is Susan. 27. Q: Where was the location of the accident? A: Approximately milepost 499. Q: And where is milepost 499? A: Probably between milepost 498 and 500. 28. Q: Sir, what is your IQ? A: Well, I can see pretty well, I think. 29. Q: Did you blow your horn or anything? A: After the accident? Q: Before the accident. A: Sure, I played for ten years. I even went to school for it. 30. Q: Do you know if your daughter has ever been involved in the voodoo or occult? A: We both do. Q: Voodoo? A: We do. Q: You do? A: Yes, voodoo. HAVE A GREAT DAY !!! 2927 From: A Grudko Date: Wed Apr 18, 2001 4:07am Subject: Re: re: Top secret laptop missing ----- Original Message ----- > Perhaps we are just more open about reporting these things. Anyway, it's > easier to lose a laptop in a taxi than it is to lose a hard disk in the > secure vaults at Sandia. We leave the really hard things to the Americans > . In the days before laptops it was briefcases that went missing in taxis and on train station platforms- sometimes not so accidentally. Firstly, why is an intelligence officer taking classified data - be it on paper or on a hard disk - out of the office? Most modern laptops have removable hard drives, so the drive with the classified data should be left in a secure area, not taken out on the street if the officer has to take a lap top home. Second, is it possible that the laptop was not lost but handed over - imagine the fun Philby would have had with today's technology? Third, maybe the data was meant to get out - I think disinformation is still used; even by British gentlemen sitting in London clubs. -------------------------------------------------------- About 5 years ago I investigated leaks in a (South African) government department (draft reports were being leaked to a SA scandal sheet). Their info. security - physical and procedural - was appalling. Classified documents were being worked on on network linked PCs and saved by hitting the 'save' button, storing the document by default into a common folder! All they had to do to introduce even minimal security was use 'save as' and select a private folder - or use stand alone PCs. That took about 3 minutes to discover. Not much billable time there! So I kept digging, and 4 minutes later I found that no-one had a printer. All documents were printed on a queue facility to shared printers in the hallway... (I had visions of nosey buggers lifting the print out of the printer tray and the writer going to collect his 'missing' report saying to himself, 'Oh dear - it didn't print. Darn computers, I'll have to print it again'....) So now I had 7 minutes of billable time and had found 2 huge security problems. If I had hair I'd have pulled most of it out. Incidentally, criminal record checks of their 147 staff came up with 12 criminal convictions. 4 HumInt leaks were also discovered, including one classic 'honey trap' where the lady in question would get up in the middle of the night and switch on the employees laptop, use MS 'Find File' to quickly locate every file modified that day and save them onto a 3.5" disk. It took minutes. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom - "When you need it done right - first time" 2928 From: James M. Atkinson, Comm-Eng Date: Wed Apr 18, 2001 6:43am Subject: Polygraph Statement of "No Such Author" [An interesting perspective on the counterintelligence polygraph issue] Polygraph Statement of "No Such Author" http://antipolygraph.org/statements.shtml The following is an account of my application to the Central Intelligence Agency and subsequent polygraph interrogation. The Central Intelligence Agency polygraph interrogation is administered as part of a three-day preliminary selection process at various sites in the Washington D.C. area subsequent to a personal interview and written test. The polygraph is only one element in the selection process, but is probably considered the most pivotal. Interrogators from the Office of Security administer the polygraph. Polygraph interrogation takes place in a textbook undecorated sound-proofed room furnished with a table and two chairs, the ubiquitous two-way mirror and of course, the polygraph apparatus. To the extent I have read about the polygraph I think of the "test" as a thirty-minute affair. I never consider it an obstacle and readily participate in the process. I have nothing to hide. There is nothing unusual about the polygraph hook-up. Finger clamp on the index finger, two plastic tubes loosely connected around the torso: one around the chest, one around the lower abdomen. A blood-pressure arm-cuff is secured too tight for comfort. Once the various devices are connected they remain in place for the duration of the interrogation. The arm cuff is only inflated when the apparatus is on. The interrogation is conducted over two days by two different interrogators. Each interrogation lasts between three-four hours. I'm not told about the second interrogation. The impression the first interrogator gives me is "this is it." One of the most striking things about the interrogation is my interrogator. He seems two years younger than I, and I am quite young. This would have not been such a big issue were it not that, perhaps to compensate for his youth, my interrogator tries to boost his own accomplishments by making an outrageous claim. Before administering the polygraph, the interrogator covers the workings of the mechanism in some detail and then goes over the various areas in the personal questionnaire. The interrogator makes great pains to emphasize that the box is infallible and will readily detect deception. He urges over and over not to lie. Then he makes an astounding boast. Wrapping up his spiel he adds a little something about his own acumen: "I have conducted literally thousands of polygraph examinations..." he drones. And on and on. I tune him out. "Literally thousands." It's a boast of such phenomenal magnitude and seems so out of place in the setting of the small interrogation room I'm dumbfounded. I calculate how long it would take to conduct "thousands" of polygraph interrogations. The sum I reach has only one answer: his childish boasting is eroding his credibility. His overboard presentation is disingenuous and reeks of cheap showmanship. The young interrogator suddenly seems foolish. Bragging about his accomplishments. Urging me, almost threatening me to come clean with him. I dub him Poly Babe. I am becoming increasingly reluctant to trust him as the ordeal drags on. The interrogation covers areas from the lengthy application materials. The questions break down into roughly three areas: professional background, personal background and criminal background. The professional issues cover matters of loyalty to the United States and previous employment. The personal background questions have a component of questions called lifestyle questions, a euphemism for sexual history. After the lengthy spiel selling the capabilities of the box, the interrogator calibrates the box. He instructs me how to sit. Not to move. Face straight ahead. Not to turn my head. Not to cough. To take relaxed, measured breaths. But sitting so still without moving at all becomes irritating. And after being instructed not to cough or sneeze, suddenly coughing and sneezing are the only things on my mind. I'm struck by an incongruity. The interrogator boasts about the box's infallibility, yet instructs me to sit rigidly still. Movement affects the results? It makes no sense. We cover the questions. Have you ever lied to an employer? Have you ever stolen from an employer? Have you been contacted by a foreign intelligence service? Are you currently a member of or associated with a foreign intelligence service? To every yes response, we go into the particulars to eliminate the incident in question. I explain away incongruities in my character and conduct. The interrogator pretends his focus is on getting a good read; that "passing the test" is the focus of the inquisition. Of course, getting the applicant to volunteer wrongdoing is the focus of the interrogation. After covering the questions, never more than twenty, the interrogator turns the machine on and goes through the questions in random order. The pace is unhurried. Several questions are covered repeatedly. At the end of the read, he removes paper from the box and leaves the room to interpret the results. Before leaving he admonishes me to come clean, not to lie, the same mantra, over and over. I sit in the room for about twenty minutes. He returns. Looks grave. "You're showing signs of deception in response to some of the questions." He runs through his whole spiel about being honest for what must be the tenth time. But oddly, instead of going back over the questions again we proceed with the next batch of questions: the lifestyle questions. During this series of questions I really lose it. The interrogation focuses on deviant sexual behavior. I'm unsure what he's fishing for and ask him to clarify. He explains deviant sexual behavior as any sex acts other than what is known as the missionary position. That strikes me as ridiculous and I ask him if he's kidding. Of course, he's not. The interrogator wants to know how many sex partners I have had; how many of them are married; if I have ever contracted sexually transmitted diseases, if so, how often, where, when. Have I ever paid for sex, when, where. Have I ever participated in sm., bondage, bestiality. What sort of positions. You name it, he wants to know. I get really worked up over this. I'm put on the spot to divulge the most intimate secrets of my own sex life, for the sake of clearing the test. I'm reluctant to discuss anything at all about my sex life and decide it's none of their business. Job or no job. I know many people will disagree with me and decide to submit [to] anything in the name of getting the dream career. It's your choice. If you wish the CIA to have detailed records of every sex act you've ever performed, and the manner in which you performed it, be my guest. Bill Clinton, as the most senior officer in the federal bureaucracy seems to think such standards don't apply to him either. But hey, you go for it. Another matter arises that should be remembered: for the past hour-and-half in the interrogation room I am badgered with threats of the box's infallibility and sensitivity. Yet, after the very contentious exchange I have with the interrogator, I am so riled up, the subsequent reading must be useless. Nevertheless, the examiner goes through the same routine at the end of the questions, removes the paper, leaves the room for twenty minutes, returns and announces we are having serious problems. The CIA's interpretation of outrage over their none-too-delicate attempt to dig into your sexual history is interpreted entirely as deception. I suppose the box doesn't register rage. The interrogator tries to work through the questions again. I explain I am uncomfortable discussing details of my personal sex life with a total stranger with the implication the information will be recorded and a matter of record. He assures me everything said in the polygraph interrogation remains within the polygraph room (lie). I attempt to inquire whether the test is valid, since I have become noticeably aggravated. He reassures me it's a normal response and irrelevant to the detection of deception. This is another patent lie. He conveys it so poorly I think I catch him lying. We should both be rigged up to the machine. After an attempt to secure more information on my sexual history we run through the questions again and do another polygraph read. At the end of the session he removes the paper and leaves the room for the third time. Twenty minutes pass. He returns and says that although we're still having problems we are going to proceed to the final segment of questions: the criminal background questions. I calm down considerably. This is another area that is irrelevant to me. We run through the questions. My answers are all straight no's. It goes quick. We do a read. Same questions, random order. He removes the paper, leaves again. This time the wait seems longer. After about thirty minutes he returns. He's sullen. "We're having a very serious problem." Now what I wonder? "It's obvious you're withholding information on your past history with use of illegal narcotics." I am utterly stupefied. The entire polygraph experience has turned from surreal to farce to nightmare within an hour. I have lived overseas for over a decade. I have hundreds of foreign relatives and acquaintances. Some of them have lived in communist countries. One person is a registered card-carrying member of the communist party in his country. I had expected the most serious scrutiny would be directed to this area of my life. Instead, that area is covered in fewer than a handful of questions and never revisited. Instead I become embroiled in a very contentious exchange over my sexual past. And I have to admit, I'm utterly unprepared for the entire sexual inquisition and very reluctant to give them one iota. I have no criminal history and nothing to do with drugs. Yet, by the final segment of questions, the entire polygraph interrogation is a hoax. The most complicated area of my life is glanced over, I'm badgered to volunteer intimate details of my sex life, and as if things couldn't get any worse, finally, accused of concealing information on narcotics use. I'm struck by an acute realization there is no way to dissuade him from his beliefs. A mere two hours ago I almost swaggered into the polygraph interrogation room. Two hours later I'm fatigued, humiliated, outraged, frustrated and now, dumbstruck. And then the badgering over drugs commences. My mind detaches itself. The entire issue is irrelevant to me. I'm attempting to rationalize how the entire process could have gone so wrong. We do another run with his box, and again he returns alleging I am showing deception. At this point the polygraph is nothing but a bad joke. I look at him as if he's an idiot. My best friends would laugh at the thought of me "lighting a joint", let alone the insinuation I am doing hard drugs. Poly Babe takes it a step further. Wants to know if I'm trafficking. The farce becomes a parody. It goes nowhere. Now Poly Babe reminds me without a good polygraph there is no employment offer. What can I tell him? At one point I consider manufacturing a story about some pot smoking, then laugh it off as preposterous. Poly Babe leaves. I'm devastated. My dreams are in shatters. I run through the entire session in my mind, unable to understand how the interrogator could have screwed up so badly. He returns. Here it comes I think. To my surprise he announces he has spoken to a supervisor about my case. I am being allowed a chance to retest. I'm ecstatic. "Because we want you to pass your polygraph, we are going to go ahead and schedule another polygraph exam tomorrow to see if we can't help you clear the test. You have to understand, this is a rare second chance. We don't do this often. We're doing this because we want to try to work with you. I want you to think very carefully about what has happened here today and reconsider some of the answers you have given." I return to the waiting area. Other applicants are there, waiting. I'm surprised to hear from their conversations that nearly all of them have been offered "rare" second chances to retake the polygraph the next day. I don't sleep at all that night. By the next morning, I'm exhausted, doubtful and unsure how the entire thing is going to turn out. I tell myself the interrogator screwed up because he was young. Inexperienced. I was upset. The reading was off. Surely today they'll get a good read. They'll figure this out. The second polygraph interrogation is a farce from the start. The interrogator is quiet and serious. Says little. Explains nothing. He fits the attachments and launches into calibrating with little preparation. The tone of the entire affair is different from the previous day. His attitude seems to be, "You're withholding information. I'm going to get it out of you." After calibrating the machine something odd happens. He removes the arm cuff, leaves the room and returns with a gigantic rubber ring he fits around my thigh. I've never seen anything like it before. He runs the apparatus again. With the leg cuff inflated my leg goes numb. It gets weirder. He removes the leg cuff, leaves the room and comes back with a tiny little rubber that resembles a donut. He fits the donut onto my thumb and repeats the calibrating routine. I realize he's having a problem getting a good blood pressure read. I ask him about it. He ignores me. He announces we're ready and launches straight into the narcotics issue. This isn't retaking the test at all: the entire interrogation focuses entirely on the narcotics issue. As far as I'm concerned, the "test" is over before it has even started. But I stick to it for at least two more hours, attempting to get through it and somehow salvage my candidacy. It's hopeless. The interrogator talks to me as if I'm a drug kingpin awaiting trial. Any attempt I make to direct the interrogation back to the language that was used the previous day about clearing the polygraph is gone. Apparently, the second polygraph isn't about clearing the polygraph at all. The interrogator wants a confession. Over the course of two hours he becomes even more sullen. I become outraged. Struggle not to hurl obscenities at him. At one point I ask him his name, attempting to ratchet down the hostility. Attempting to salvage my application. "I'm sorry, I didn't catch your name." His response almost sends me lunging for his throat: "My name is irrelevant. What's relevant is that you start cooperating and telling us about your drug use." I persist. "Look, what do I call you?" It gets more outrageous: "This is irrelevant to answering my questions about your drug use." Nothing. I'm livid. I mean white hot. I've never been treated like this before in my life. A day ago I had considered myself an applicant to a prestigious executive entry-level federal job and now I'm being treated as a drug suspect in an ongoing DEA investigation. I terminate the "interview." Interrogator Ass does the same song and dance about my application status. My hopes of still securing a job had died two hours ago. But within those two hours, a new sentiment is forged. Where yesterday I was devastated at seeing my dreams in tatters before my eyes, the second interrogation is so patently abusive I start to wonder if I even want to be a part of an organization that treats people with such callous contempt. It takes some doing for me to actually say it, but once I make up my mind, I go for it. Call off the interrogation. Rip the gadgets off. Screw you. Screw your incompetent little secret society and FUCK your polygraph. That sums up my polygraph experience. I fretted a good deal about how the polygraph results could have been so completely wrong. Before going into the polygraph I was what you might call a believer. I must have been an ideal candidate for the polygraph since I bought into the institutional myths about its abilities. And yet, the entire polygraph experience was a catastrophe. Quite aside from the assumption of the interrogators I was being deceptive simply because I got worked up over intrusive questions that were far beyond the realm of decency, I am curious how the entire drug issue is brought up. Of all the accusations they could have come up with, they chose the one that was so far off to be almost comical. And I was also curious why the session on the second day had no pretense of being a polygraph session at all. The interrogator demonstrated to me with the rubber cuff routine he was experiencing difficulties getting a proper reading, and assumed such a hostile attitude from the start the entire second day's polygraph was invalid. I was seriously pissed off, especially when it became clear he had no intention of leaving the narcotics issue. His attitude was confess or fail. No amount of arguing with him was going to change it. Yet he persisted with the polygraph farce, in spite of my open hostility. Months later I learned about Voice Stress Analysis. That inquiry lit a bulb in my memory, and almost a year after my polygraph, I was able to figure out what had happened. Approximately a month before my three-day trip I got a phone call. It was so brief it was hardly worth remembering. But the call had been noteworthy for one reason. The caller said he was with the Office of Security. He wanted to go over the answers on my questionnaire to make sure there were no mistakes. I said fine. He said he would read the questions to me and asked me to answer with a simple yes or no. We ran through the questions. He thanked me for my cooperation and that was that. The whole call lasted no more than seven minutes. Why was it relevant almost a year later? It suddenly struck me that that one call had gone rather smoothly except for one question. And only one question. The caller had garbled it. Instead of responding immediately, I hesitated and asked him to repeat the question. He did so. I replied no and thought no more of it. Until I came across information on Voice Stress Analysis. According to the literature, VSA can be administered by telephone. I got to thinking. If I were asked over the phone, "Have you ever tried or used illegal narcotics at any time?" and my response appeared hesitant, would that be enough to focus on that singular issue while administering a polygraph in which the interrogator is having an extremely difficult time interpreting his results? I have no conclusive answer. Nothing in literature I have read indicates the CIA administers a surreptitious VSA as part of its screening process. But based on my personal experiences I am virtually certain a surreptitious VSA was administered, I must emphasize, without my knowledge, and that assumptions were made based on the VSA during subsequent polygraph testing. VSA as a tool for truth telling is even more disreputable than the polygraph. Even the American Polygraph Association distances itself from VSA. This is but one of many problems with the CIA polygraph process. The most troubling aspect of the polygraph interrogation is the sexual inquisition. And while applicants must fill out ponderous and lengthy questionnaires going into painstaking detail on their lives and backgrounds, the sexual inquisition is merely alluded to in one sentence. It's almost glanced over. Added as some sort of afterthought. Until they get you in that room. It is the one area where the applicant is ambushed and then required to make the fullest disclosures of the most intimate nature. Allegedly for the sake of national security. After observing the antics of the Clinton White House for eight years, I am convinced the CIA polygraph is without any validity. Mere GS-7 applicants must explain away the most intimate details of their sex lives while the commander in chief plays goose the cigar with young female assistants in the Oval Office. It's a double standard that is utterly unpalatable to me. I will never subject myself to another polygraph again. And consider anyone who does a fool and a boob. The humiliation you will experience comes at your own expense. The Office of Security uses the polygraph to catch criminals. Not weed out unfit applicants. When a certain percentage of applicants are rejected for being unable to pass their polygraphs, the Office of Security is unable to point to any successes. It can merely claim to have protected the organization from foreign agent penetration. But with the emphasis on catching criminals, they can uphold a record. "See? This box works. We get drug confessions. Rape confessions. Theft confessions." The cases they pass along to the FBI at least create a paper trail that substantiates the "validity" of their methodology and bolsters institutional faith in the box. It's all a scam. I don't see the box disappearing anytime soon. As a scientific tool, it is without any validity. But as an interrogation tool that forces coerced statements from fearful subjects, it works wonders. Maybe they can't rig electrodes to your testicles, but they sure as hell can rig you up with other gadgets that operate on other human fears. Small wonder then that the agency's inept security apparatus swears by it. Instilling fear by suggestion is after all their specialty. It is a tragic irony that it is considered detrimental to the security of the United States if even one mole can penetrate an intelligence organization, while it is considered part of doing business when hundreds of highly motivated and skilled applicants are summarily written off as unfortunate losses simply because of the ineptitude of interrogators. And all the while Aldrich Ames sits in his cell laughing. prepared by No Such Author -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2929 From: David Alexander Date: Wed Apr 18, 2001 4:23am Subject: snooping on other countries >> Only main area not covered in routing data/comms internationally to >> allow the actual monitoring from a second or third country (often >> with legal angle considerations). > >"Huh?," asked the curious lawyer, inviting somebody to clue her in.... Every country has safeguards on how and why it can snoop on its' own citizens. It's much easier, with somthing like ECHELON, to get one of your partners in the scheme to snoop on your own people and then give you the information. You haven't broken your own laws, but just happen to receive useful information 'from a friend'. There's a quid pro quo so that you do the same for them. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 2930 From: Robert Dyk Date: Wed Apr 18, 2001 9:43am Subject: Re: Polygraph Statement of "No Such Author" I have some limited experience with VSA and my experience shows it to be worthless as far as detecting deception. It is however, like many other interrogation tools, an excellent intimidator. I have long doubted the reliability of polygraph, because any number of factors can indicate deception, yet a calm cool, but deceptive individual can pass with flying colours. As an intimidation tool however.... My 2 cents worth, Robert Dyk Worldwide Security Ltd. Mississauga, Ontario, Canada (888) 4-COVERT > > >[An interesting perspective on the counterintelligence polygraph issue] 2931 From: James M. Atkinson, Comm-Eng Date: Wed Apr 18, 2001 10:33am Subject: Re: Polygraph Statement of "No Such Author" At 10:43 AM -0400 4/18/01, Robert Dyk wrote: >I have some limited experience with VSA and my experience shows it to be >worthless as far as detecting deception. It is however, like many other >interrogation tools, an excellent intimidator. > >I have long doubted the reliability of polygraph, because any number of >factors can indicate deception, yet a calm cool, but deceptive individual >can pass with flying colours. As an intimidation tool however.... > >My 2 cents worth, > >Robert Dyk >Worldwide Security Ltd. >Mississauga, Ontario, Canada >(888) 4-COVERT > > >> >> > >[An interesting perspective on the counterintelligence polygraph issue] The polygraph is actually nothing more then a technical prop used to assist an interrogator in intimidating a subject. Nothing, not a polygraph, VSA, VSE, or any other technical tool can tell if someone is lying, but only if the person is experiencing "physiological changes", nothing more. However, a good poly operator can pick up of these things and manipulate the subject into a confession. A good interrogator does not need a polygraph or any other prop. Keep in mind that poly's are only used for interrogations.... not for interviews (in an interview you are passively asking questions, not presenting stimuli). The poly is used to monitor response to the various stimuli (usually lies and intimidation) presented in an attempt to break down the subject (which is why it is an interrogation, and not an interview). The goal of any poly operator is to obtain a confession, period... not to prove the subject is being truthful or untruthful, but to dig around and break down whatever defenses to get that all important confession. The needles can shudder, and the paper can purr, but unless the poly operator leaves the room with a confession they have failed. If the polygraph operator is incompetent (most are) then they will claim the results were "inconclusive", or that "deception was detected". A competent polygraph operator however, will leave the interrogation room with a formal confession, or will report that the subject was "truthful".. period. You right about a calm, cool person being able to pass a poly. In fact if the person has a strong backbone, and is tough or impossible to intimidate the polygraph is worthless. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2932 From: Robert G. Ferrell Date: Wed Apr 18, 2001 10:37am Subject: Re: Humor; Lawyer / Witness >Reported in the Massachusetts Bar Association Lawyers Journal, the >following are questions actually asked of witnesses by attorneys during >trials and, in certain cases, the responses given by insightful >witnesses: Anyone know the best way to get spewed coffee out of a keyboard? ;-) RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2933 From: Steve Uhrig Date: Wed Apr 18, 2001 0:05pm Subject: Polygraph? An old sergeant, who did not trust any of this newfangled technology, taught me how to obtain the facts of the matter. Officer to subject: "You walked in here with information and a pretty face. You can't leave with both." He was quite effective. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2934 From: Robert G. Ferrell Date: Wed Apr 18, 2001 0:09pm Subject: Re: Polygraph? >An old sergeant, who did not trust any of this newfangled >technology, taught me how to obtain the facts of the matter. Maybe it's just the hacker in me, but I can't resist messing with what little exists of the minds of polygraph examiners. I make myself react strongly to innocuous questions like "What is your name?" and remain absolutely impassive to the serious inquiries about drugs or illegal activities. The object is to flatline the trace. I also find it strangely satisfying to laugh loudly at inappropriate moments, hold my breath, or meditate. Or answer with non sequiturs: Him: "Have you ever smoked marijuana?" Me: "My hedgehog is bigger than yours." Him: "Have you ever lied to an employer?" Me: "How many pecks in a standard cranberry barrel?" It gets them riled, but it's a lot of fun. C'est la guerre. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2935 From: James M. Atkinson, Comm-Eng Date: Wed Apr 18, 2001 0:38pm Subject: Re: Polygraph? At 5:09 PM +0000 4/18/01, Robert G. Ferrell wrote: > >An old sergeant, who did not trust any of this newfangled >>technology, taught me how to obtain the facts of the matter. > >Maybe it's just the hacker in me, but I can't resist messing with >what little exists of the minds of polygraph examiners. I make myself >react strongly to innocuous questions like "What is your name?" and >remain absolutely impassive to the serious inquiries about drugs or >illegal activities. The object is to flatline the trace. > >I also find it strangely satisfying to laugh loudly at inappropriate >moments, hold my breath, or meditate. Or answer with non sequiturs: > >Him: "Have you ever smoked marijuana?" > >Me: "My hedgehog is bigger than yours." > >Him: "Have you ever lied to an employer?" > >Me: "How many pecks in a standard cranberry barrel?" > >It gets them riled, but it's a lot of fun. >C'est la guerre. > >Cheers, > >RGF > >Robert G. Ferrell, CISSP >Information Systems Security Officer >National Business Center >U. S. Dept. of the Interior >Robert_G_Ferrell@n... IMHO: Passing voluminous amounts of garlic scented gas also tends to make the examiner loose their cool. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2936 From: James M. Atkinson, Comm-Eng Date: Wed Apr 18, 2001 5:51pm Subject: Russian Scientist Charged As Spy Russian Scientist Charged As Spy http://cbsnews.com/now/story/0,1597,286326-412,00.shtml Agency Claims He Tried To Sell Space Secrets To China Colleagues Say He's Innocent Latest In Series Of Spy Scandals In Russia NOVOSIBIRSK, Russia, April 18, 2001 AP / CBS (CBS) Russia's domestic security service said Wednesday it had charged a scientist with trying to sell space research secrets to China, but colleagues said the accused man was innocent. The FSB in the Siberian town of Krasnoyarsk said scientist Valentin Danilov was arrested and charged with treason for trying to sell information on the effects of space on satellites. Danilov, head of the Thermo-Physics Center of Krasnoyarsk State Technical University, is the latest scientist to fall foul of the FSB, a successor to the Soviet-era KGB, in a spate of spy scandals that has hit Russia. Colleagues, who have written an open letter to local prosecutors demanding that Danilov be released from detention, said he was arrested in connection with work carried out under contract for a Chinese research center. One fellow researcher said Danilov's work dealt with the effects of solar activity on satellites, which the FSB might see as sensitive due to its relation to the development of anti-satellite weapons. "This is Star Wars stuff...But anyone with experience in the field could have put together what he was doing," said the man, who declined to be named for fear of implication in the case. But FSB spokeswoman Stella Alekseyeva said by telephone from Krasnoyarsk that investigators had clear grounds for the arrest. "Damage has been done to Russia's external security," she said. "Danilov's actions have allowed foreign countries to significantly cut the amount of time (and) money spent on the development and creation of space craft." Danilov's fellow workers said his research had been secret until 1992, but its security status was then lifted. "There is really nothing at all secret about the work. Virtually all his research has long been in the public domain," the colleague said. "A mistake is being made here." He said Danilov was arrested on February 16 but was first detained and questioned for three days last May. Danilov's lawyer, Yelena Yevmenova, said she had expert testimony that her client had revealed no state secrets. She said Danilov "felt as well as can be expected for a man in prison" but that she hoped to see him granted bail in the case, which was unlikely to go to court before September. "Within two weeks I hope to be able to again ask (for bail)...It is even possible that we could see this case dismissed altogether," she said. His colleagues demanded any trial be held in public and not behind closed doors as is usually the case in secrets trials. Some of Russia's recent spy scandals have involved scientists working with foreigners. One involved U.S. businessman Edmond Pope, who was sentenced to 20 years for allegedly stealing secrets of an underwater missile but later pardoned by President Vladimir Putin and freed. Igor Sutyagin, an arms expert at Russia's respected USA-Canada Institute, is still on trial on charges of passing secrets about Russian nuclear submarines to the United States and Britain. Sutyagin was arrested by the FSB in October 1999 and faces up to 20 years in prison if found guilty. He denies the charges. The FSB has said the Sutyagin case should serve as a warning to other researchers to consider carefully any work they do for foreign firms. Military researchers in Russia say they run a daily risk of being accused of espionage because the guidelines regulating their work are so vague. By Yelena Smirnova CMMI The Associated Press. All Rights Reserved. This material may not be published, broadcast, rewritten, or redistributed. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2937 From: James M. Atkinson, Comm-Eng Date: Wed Apr 18, 2001 5:57pm Subject: Charges Filed in Failed Spy Probe... he must have left bruises Moderators note: Gee... a counter-intelligence investigator engaging in unethical conduct while interrogating a suspected spy... it boggles the mind... he must have left bruises. ;-) Charges Filed in Failed Spy Probe http://www.washingtonpost.com/wp-dyn/articles/A30390-2001Apr18.html Defense Says Client's Rights Violated by Military Lawyers By Vernon Loeb Washington Post Staff Writer Wednesday, April 18, 2001; Page A19 Attorneys for Navy Petty Officer 1st Class Daniel M. King filed military charges this week against three Navy attorneys and a Navy spokeswoman for their actions in a failed espionage prosecution brought against King in the fall of 1999. King, 41, a cryptologic analyst who worked decoding other countries' secret communications, was held for more than 500 days on suspicion of divulging highly classified information to Russia before the case against him was dropped in March for lack of evidence. In legal papers filed Monday, King's court-appointed military defense attorneys initiated a variety of charges against Cmdr. Lara L. Jowers, the Navy's chief prosecutor, and Lt. Mindi D. Seafer, a staff attorney, for allegedly denying King his constitutional right to counsel and failing to divulge relevant statements King made during an October 1999 interrogation. A third Navy lawyer, Cmdr. Mark E. Newcomb, was charged by King's attorneys with allegedly making false statements and failing to divulge relevant information to the defense. King's lawyers also filed charges against Cmdr. Roxie Merritt, a Navy spokeswoman, for allegedly telling reporters that King was a "self-confessed traitor" after the case against him was dropped on March 9. Lt. Cmdr. Cate Mueller, a Navy spokeswoman, declined comment on behalf of the four officers other than to say that "anyone who is subject to the [Uniform Code of Military Justice] can swear out charges against other people subject to the UCMJ." Mueller said now that charges have been filed against Jowers, Seafer, Newcomb and Merritt, their commanding officers must conduct preliminary inquiries to determine whether further disciplinary action -- from mild rebukes to courts-martial -- is warranted. In related action this week, a civilian member of King's defense team, George Washington University law professor Jonathan Turley, filed a complaint with the American Psychological Association against Michael Gelles, chief psychologist with the Naval Criminal Investigative Service. The complaint alleges that Gelles engaged in unethical conduct while interrogating King in October 1999. Gelles declined comment, according to Mueller. C 2001 The Washington Post Company -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2938 From: Aimee Farr Date: Wed Apr 18, 2001 10:57am Subject: RE: re: Top secret laptop missing Andy Grudko said: > ....4 HumInt leaks were also discovered, including one classic 'honey trap'.... > ...the lady in question would get up in the middle of the night... > ...and switch on the employees.... > ...quickly... > ...3.5" ... > ...It took minutes.... Clearly, the poor woman was under compensated. Regards, Aimee E. Farr Law Office of Aimee E. Farr 5400 Bosque, Suite 675 Waco, Texas 76710-4418 T: 254.751.0030 F: 254.751.0963 E: mailto:aimfarr@p... Outlook/Lotus click-to Contacts: http://my.infotriever.com/aimeefarr 2939 From: Craig Snedden Date: Wed Apr 18, 2001 11:02am Subject: Re: Humor; Lawyer / Witness A statement put to the accused on the stand in a murder trial by his defence counsel when trying to get him to account for his movements at the material time: Counsel: "You got to the bus stop at 8.00 p.m.?" Accused: "Yes." Counsel: "And got on the bus at "8.30?" Accused: "Yes." Counsel: "So you had 30 minutes to kill......" And this guy was supposed to be on the accused's side.... :-) Craig ----- Original Message ----- From: "Robert G. Ferrell" To: Sent: Wednesday, April 18, 2001 4:37 PM Subject: Re: [TSCM-L] Humor; Lawyer / Witness > >Reported in the Massachusetts Bar Association Lawyers Journal, the > >following are questions actually asked of witnesses by attorneys during > >trials and, in certain cases, the responses given by insightful > >witnesses: > > Anyone know the best way to get spewed coffee out of a keyboard? > > ;-) > > RGF > > Robert G. Ferrell, CISSP > Information Systems Security Officer > National Business Center > U. S. Dept. of the Interior > Robert_G_Ferrell@n... > ======================================== > Who goeth without humor goeth unarmed. > ======================================== > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 2940 From: Date: Wed Apr 18, 2001 1:56pm Subject: Re: Equipment and Manual Hello everyone. Hope everyone's enjoying the fall weather on the east coast today. I'm looking for a source for the operating manual for a Tek 492. Photocopies are fine, or a reasonable price. I know it's old and hopefully it'll check out fine after I find someone to calibrate it, but for now, any help with a manual and front cover is appreciated. Thanks Harry Kastrinakis Springfield MA Quebec100@a... 2941 From: Miguel Puchol Date: Thu Apr 19, 2001 4:39am Subject: RE: Re: Equipment and Manual Hi Harry, I have the manual for our 492PGM (10kHz to 21GHz), but it's in Spanish - if it will do I could send you a photocopied version. I also have the Programmer's Guide for GPIB. All the best, Mike > -----Mensaje original----- > De: Quebec100@a... [mailto:Quebec100@a...] > Enviado el: miercoles, 18 de abril de 2001 20:56 > Para: TSCM-L@yahoogroups.com > Asunto: [TSCM-L] Re: Equipment and Manual > > > Hello everyone. > > Hope everyone's enjoying the fall weather on the east coast > today. I'm looking for a source for the operating manual for > a Tek 492. Photocopies are fine, or a reasonable price. I know > it's old and hopefully it'll check out fine after I find someone > to calibrate it, but for now, any help with a manual and front > cover is appreciated. > > Thanks > > Harry Kastrinakis > Springfield MA > Quebec100@a... > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > From: Steve Whitehead Date: Sun Apr 14, 2002 2:05pm Subject: Re: File - Gold List James What about an international list. Would appreciate some comments from other international members on this list outside the US. Regards Steve Whitehead E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa ----- Original Message ----- From: To: Sent: Sunday, April 14, 2002 10:07 AM Subject: [TSCM-L] File - Gold List > > The current version of this list may be found at: http://www.tscm.com/goldlist.html > > Recommended U.S. TSCM Firms > > The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). > > While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). > > These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. > > TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. > > The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). > > An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. > > On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. > > If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. > > ------------------------------------------------------------------------ > > Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. > > Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. > > It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. > > Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. > > If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. > > It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. > > Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. > > Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. > > When you contact any of the following firms please mention that you saw them listed on this web site. > > This file is set to automatically go out to list members every two weeks, Please review it, and ensure that you are listed properly (correct address, phone, etc). > > ------------------------------------------------------------------------ > > All of New England, Upstate New York, and the Boston Metropolitan Area > (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) > > > James M. Atkinson > Granite Island Group > 127 Eastern Avenue #291 > Gloucester, MA 01931-8008 > > (978) 381-9111 Telephone > > URL: http://www.tscm.com/ > E-mail: jmatk@tscm.com > ------------------------------------------------------------------------ > > Stamford, Connecticut Metropolitan Area > (also, Manhattan, Long Island, and New Jersey) > > Sam Daskam > Information Security Associates, Inc. > 38 Settlers Trail > Stamford, CT 06903 > > (203) 329-8387 Telephone > > URL: http://www.isa-tscm.com/ > E-mail:sales@i... > ------------------------------------------------------------------------ > > Norwalk, and Lower Fairfield Country Area > (also, Manhattan, Long Island, Philadelphia, and New Jersey) > > Rob Muessel > TSCM Technical Services > 11 Bayberry Lane > Norwalk, CT 06851 > > (203) 354-9040 Telephone > > URL: http://www.tscmtech.com/ > E-mail:rmuessel@t... > ------------------------------------------------------------------------ > > Greater Philadelphia and Harrisburg Metropolitan Area > (also, serving South-Eastern and Central Pennsylvania) > > Bob Motzer > RCM and Associates > 609 Sandra Lane > Phoenixville, PA 19460 > > (888) 990-6265 Telephone > > E-mail: 1RCM@M... > ------------------------------------------------------------------------ > > Washington DC and Baltimore Metropolitan Area > (also, Virginia, Delaware, and Pennsylvania) > > Steve Uhrig > SWS Security > 1300 Boyd Road > Street, MD 21154-1836 > > (410) 879-4035 Telephone > > URL: http://www.swssec.com/ > E-mail: steve@s... > ------------------------------------------------------------------------ > > Houston, Dallas, Austin, and Galveston > (also, Gulf Coast of Texas and Louisiana) > > Rick Udovich > Communication Security, Inc. > 2 Shadow Lane > Bay City, TX 77414 > > (979) 244-4920 Telephone > > URL: http://www.bugsweep.com/ > E-mail: rjudo@s... > ------------------------------------------------------------------------ > > Lexington KY Metropolitan Area > (also, Louisville, Cincinnati, and Central Midwest) > > Bill G. Rhoads > Intelcom, Inc. > 121 Prosperous Place, Suite 4B > Lexington, KY 40509 > > (859) 263-9425 Telephone > > E-mail: bgr101@a... > ------------------------------------------------------------------------ > > Atlanta Metropolitan Area, Southeastern US > (including AL, FL, GA, NC, SC, TN) > > Buzz Benson > Executive World Services, Inc. > P.O. Box 33 > Braselton, Georgia 30517-0033 > (678) 316-7002 Telephone > > URL: http://www.executiveworldservices.com/ > E-mail: sales@e... > ------------------------------------------------------------------------ > > Washington State and Seattle WA Metropolitan Area > (also, Oregon, and the Pacific North West) > > Gordon Mitchell > Future Focus, Inc. > P.O. Box 2547 > Woodinville, WA 98072 > > (425) 489-0446 Telephone > > URL: http://www.bug-killer.com/ > E-mail: gordonm@b... > ------------------------------------------------------------------------ > > San Francisco and all of Northern California > (also, Silicon Valley Area) > > William Bennett > Walsingham Associates, Inc. > P.O. Box 4264 > San Rafael, CA 94913 > > (415) 492-1594 Telephone > > E-mail: walsingham@c... > ------------------------------------------------------------------------ > > Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County > (also, Riverside County, and Ventura County) > > Rick Hofmann > Microsearch LLC > P.O. Box 2084 > Cypress, CA 90630 > > (714) 952-3812 Telephone > > URL: http://home.earthlink.net/~microsearch > E-mail: tscmsweeps@e... > > ------------------------------------------------------------------------ > > Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County > (also, Riverside County, and Ventura County) > > Roger Tolces > Electronic Security > 6646 Hollywood Blvd. #212 > Los Angeles, CA 90028 > > (323) 462-1351 Telephone > > URL: http://www.bugsweeps.com/ > E-mail: info@b... > > ------------------------------------------------------------------------ > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5194 From: Fernando Martins Date: Sun Apr 14, 2002 4:40pm Subject: RE: File - Gold List As an european, seems fine to me. Also, if it is not just about bug sweep and wiretap, better. Even regarding US, I think there is a gap between "the mission" and "the gold list", for example regarding physical security. May be a clarification on this is needed (at least for me, because I'm new in the list, and I may be wrong) regarding what "the mission" refers as "physical security weaknesses" - anti intrusion, cctv or access control systems problems? FM > -----Original Message----- > From: Steve Whitehead [mailto:sceptre@m...] > Sent: domingo, 14 de Abril de 2002 20:06 > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] File - Gold List > > > James > > What about an international list. Would appreciate some > comments from other international members on this list outside the US. > > Regards > > Steve Whitehead > E-mail : sceptre@m... > Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) > P O Box 16063, Lyttelton, 0140, Centurion, South Africa 5195 From: James M. Atkinson Date: Sun Apr 14, 2002 10:31pm Subject: RE: File - Gold List I would be happy to clarify, A client simply can not establish an effective TSCM program until they have their physical security issues under control. Sure, we can go out, set up two tons of equipment and crawl their every inch the the building, but if their security is full of holes they are wasting their money by having sweeps performed. One of the disciplines we have to master in the TSCM profession is that of vulnerability analysis, and more specifically be able to understand how all of the various sub-disciplines overlap with one another to provide air-tight security... of lack of same. If you focus too much on one particular discipline (like alarms or access control) you risk missing external lighting issues, door issues, the 96 inch rule, and even locks. During any bug sweep, step back for a second and see if there holes are, and include these holes in your report with very specific things you client can do to fix it. I would however, caution you not to "find the problem" and then offer to fix it. By doing this you will likely blow your credibility with the client and they will think your trying to con them. If (during a sweep) you feel they need an alarm system, then send them to an alarm company, ditto for CCTV systems, IDS, lighting, and so on. -jma At 10:40 PM +0100 4/14/02, Fernando Martins wrote: >As an european, seems fine to me. Also, if it is not just about bug >sweep and wiretap, better. >Even regarding US, I think there is a gap between "the mission" and "the >gold list", for example regarding physical security. > >May be a clarification on this is needed (at least for me, because I'm >new in the list, and I may be wrong) regarding what "the mission" refers >as "physical security weaknesses" - anti intrusion, cctv or access >control systems problems? > >FM > >> -----Original Message----- >> From: Steve Whitehead [mailto:sceptre@m...] >> Sent: domingo, 14 de Abril de 2002 20:06 >> To: TSCM-L@yahoogroups.com >> Subject: Re: [TSCM-L] File - Gold List >> >> >> James >> >> What about an international list. Would appreciate some >> comments from other international members on this list outside the US. >> >> Regards >> >> Steve Whitehead >> E-mail : sceptre@m... >> Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) > > P O Box 16063, Lyttelton, 0140, Centurion, South Africa -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5196 From: Secdep Date: Mon Apr 15, 2002 9:43am Subject: BEWARE SNOOPING SOFTWARE THE INDEPENDENT ON SATURDAY 13 APRIL 2002 Beware: SNOOPING SOFTWARE Big Brother is Watching Thanks to a new piece of sleuthing computer software, illicit online lovers, adolescent porn site surfers and employees abusing company computers have no place to hide writes WENDY KNOWLER IMAGINE someone being able to see absolutely everything on your computer screen; a complete slide show of every e-mail, web page and image, down to the last keystroke. A US-designed software program called Spector makes that possible for the Big Brothers of the world - as errant e-mailers are discovering. Suspicious spouses use it to check on their partners; companies use it to check on their employees' net activities and parents use it to make sure their children aren't accessing adult web sites. It's been causing havoc in companies and homes across America for a couple of years and now thanks to Durban private investigator Mr. Raymond van Staden, who has sole agency for Spector in South Africa, it's likely to do the same here. For the few local bosses and parents who have installed it, the shock factor has been huge. A prominent member of the security industry got "the fright of my life" after installing it on his home PC out of curiosity "My teenage son was having a very raunchy chat with an American woman. I sent her an e-mail telling her to back off and then informed my son." He also put a block on a certain spanking web site, which was being regularly visited by the children in his home. And a Durban employer discovered that his secretary was spending hours each day downloading web site information for her husband. "She has since moved on, and my Telkom bill is better for it," he said. According to US research, employees with Internet access at work spend at least an hour a day net surfing. From the bosses' perspective, this means lost productivity at best: and at worst, legal liability should an employee be sending offensive e-mails or accessing child pornography -- or massive losses if someone is passing on trade secrets. Spector nails the culprits good and proper. "Even the most computer literate users won't know it's there and, even if they did. They wouldn't be able to uninstall it," Van Staden says. But what about our Constitutional right to privacy? "Well, exactly," says Mr. Wayne Lurie, an e- commerce lawyer with Durban's Garlicke and Bousfield. "Our right to privacy goes beyond the Constitution. The Interception and Monitoring Prohibition Act makes it an offence to monitor someone's personal communication without their knowledge. Employers who monitor their employees that closely, without getting their consent in writing could face a fine or two-year prison sentence. "Whatever the motives, it's a diabolical invasion of privacy" Van Staden, of course, disagrees. `An individual's right to privacy has to be balanced with the employer's right to know what's happening in his own business. It's no different from having a camera aimed at a production line. But yes, they should know it's there." For more information: visit; http://www.vanstaden.co.za --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 5197 From: Secdep Date: Mon Apr 15, 2002 9:42am Subject: No secrets are safe . . . THE INDEPENDENT ON SATURDAY 13 APRIL 2002 No secrets are safe . . . By WENDY KNOWLER IT TAKES just two minutes to install, and immediately begins to deliver life≠ changing information in spell-binding detail. It's a computer program called Spector and it goes where no other computer monitoring device has gone before, secretly recording everything which appears on a person's screen and delivering it in slide show form to the spy, be it a boss, parent or spouse. It was developed primarily for corporate use - to root out abuse of internet facilities as well as espionage - and as a tool for parents to monitor their children's internet use. But in the US, more than half of the sales are to suspicious spouses or lovers in need of heartrending proof. And, boy, have they found it, as the company's web site reveals. "I was curious about why my wife was spending so much time on the computer," wrote Mr M Bandy of Cleveland. "My first use of Spector revealed her boyfriend and what she really thought of me." Spector is also giving many a parent a wake-up call. "The day after installing Spector I caught a grown man, a parent of a local child, using extreme sexual language online with my 14-year-old daughter," wrote Ms Christine Abbott of Pennsylvania. SpectorSoft President Doug Fowler has his own favourite anecdotes about what people discovered after using Spector, including a story about a husband who learned that his wife and her lover were plotting to murder him. There are three forms of the system available in SA: SpectorPro (the most intrusive, for corporate use), Spector and eBlaster, which performs many of the same functions as Spector but sends the information via e-mail to the spy who installed it. They range in price from Rl 200 to Rl 600. --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 5198 From: Graham Bignell Date: Mon Apr 15, 2002 10:26am Subject: "Tempest Shielded Mac" http://www.wired.com/news/mac/0,2125,51670,00.html In a drafty shed in rural northern California is perhaps the rarest Macintosh ever made: an electronically shielded Mac used by a spy or military agency. The machine appears to be unique, and is so secret, no one knows anything about it. Sitting on a dusty shelf in an old Boulder Creek, California, barn owned by programmer and author Bruce Damer, the Macintosh SE 30 1891 ST at first appears to be a standard all-in-one Mac from the mid-1980s. ... --- Graham "Lorax" Bignell - 416 366 9755 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 5199 From: Date: Mon Apr 15, 2002 0:46pm Subject: Worth viewing potential threats! The following web sight contains threats a TSCM pro should be aware of. Video and Audio Communications for Business or http://www.mgteurope.co.uk/index.html 5200 From: Marcel Date: Mon Apr 15, 2002 6:25pm Subject: NCIC U.S. Attorney General John Ashcroft has ordered that the FBI's NCIC database be loaded up with the names of 100,000+ suspected terrorists. Interestingly, the list violates NCIC's previous policy of listing only those persons who have warrants or are considered missing. In this case, Ashcroft says, each "information" record on a terrorist suspect will contain instructions for the "hit" agency: arrest, follow or notify the FBI. Oh, the same list will be tacked on to the separate databases maintained by the Customs Service and State Department. -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 5201 From: Marcel Date: Mon Apr 15, 2002 7:01pm Subject: Carriers Snarl At CALEA Order http://www.wirelessweek.com/index.asp?layout=print_page&articleID=&doc_id=81050 -- [Non-text portions of this message have been removed] 5202 From: Marcel Date: Mon Apr 15, 2002 6:58pm Subject: Wireless 'Nanny Cams' Provide Window For Voyeurs Wireless 'Nanny Cams' Provide Window For Voyeurs http://www.wirelessweek.com/index.asp?layout=print_page&articleID=&doc_id=81192 -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 5203 From: James M. Atkinson Date: Mon Apr 15, 2002 9:08pm Subject: Wireless 'Nanny Cams' Provide Window For Voyeurs http://www.wirelessweek.com/index.asp?layout=print_page&articleID=&doc_id=81192 Wireless 'Nanny Cams' Provide Window For Voyeurs April 14, 2002 Thousands of people who have installed a popular wireless-video camera, intending to increase the security of their homes and offices, have unknowingly opened a window on their activities to anyone equipped with a cheap receiver. The wireless-video camera, heavily advertised on the Internet, is intended to send its signal to a nearby base station and be viewed on a computer or a television. But its signal can be intercepted from more than a quarter-mile away by off-the-shelf electronic equipment costing less than $ 250. A drive in New Jersey with two security experts underscored the ease with which a digital eavesdropper can peek into homes where the cameras are put to use as video baby monitors and inexpensive security cameras. The rangy young driver pulled his truck around a corner in the well-to-do suburban town of Chatham and stopped in front of an unpretentious home. A window on his laptop's screen that had been flickering suddenly showed a crisp black-and-white video image: a living room, seen from somewhere near the floor. Baby toys were strewn across the floor, and a woman sat on a couch. After showing the nanny-cam images, the man, a privacy advocate who asked that his name not be used, drove on, scanning homes and finding a view from above a back door and of an empty crib. In the nearby town of Madison, from the parking lot of a Staples store, workers could be observed behind the cash register. Such peeping is apparently legal, said Clifford Fishman, a law professor at the Catholic University of America and the author of "Wiretapping and Eavesdropping." When told of the novel form of high-technology prying, Fishman said, "That is astonishing and appalling." But he said that wiretap laws generally apply to intercepting sound, not video. Legal prohibitions on telephone eavesdropping, he said, were passed at the urging of the telecommunications industry, which wanted to reassure customers about their products. "There's no corresponding lobby out there protecting people from digital surveillance," he said. Some states have passed laws that prohibit placing surreptitious cameras in places like dressing rooms, but legislatures have generally not considered the legality of signal interception. Nor have they considered that signals would be intercepted from cameras that people planted themselves. "There's no clear law that protects us," Fishman said. "You put it all together, the implications are pretty horrifying." With no federal law and no consensus among the states on the legality of tapping video signals, Fishman said, "The nanny who decided to take off her dress and clean up the house in her underwear would probably have no recourse" against someone tapping the signal. Police with search warrants could use the technology for investigative purposes as well, he suggested. Surveillance has been a growing part of American life, especially since Sept. 11. Privacy activists argue that the benefit to security is questionable and the cost to privacy is high. But the cameras continue to proliferate -- with many people buying them for personal use. Surveillance cameras have also sprouted at intersections to catch drivers who speed or run red lights and as a part of many voyeur-oriented pornographic Web sites. Ads for the "Amazing X10 Camera" have been on the Internet for months. The ads for the device, the XCam2, carry a taste of cheesecake -- usually a photo of a glamorous-looking woman. But many people have bought the cameras for more pedestrian purposes. "Frankly, a lot of it is kind of dull," and most of the women being surreptitiously observed are probably nannies, said Marc Rotenberg, the executive director of the Electronic Privacy Information Center in Washington. The company that sells the cameras, Seattle-based X10 Wireless Technology, was created in 1999 by an American subsidiary of X10 Ltd., a Hong Kong company. It is privately held and does not release sales figures. A spokesman, Jeff Denenholz, said the company had no comment for this article. Filings with the Securities and Exchange Commission for an initial public-stock offering that was later withdrawn provide some figures, however. X10 lost $ 8.1 million on revenue of $ 21.3 million for the nine months ended Sept. 30, 2000, and said that 52 percent of its revenue came from wireless-camera kits. At the camera's retail price of about $ 80, that would translate to sales of more than 138,000 cameras in those nine months alone. Rob Enderle, a research fellow with the Giga Information Group, a consulting business in Cambridge, Mass., that studies technology companies, said he was a big fan of X10 -- which sells the most popular wireless cameras on the consumer market -- and its wares. "Theirs is the least expensive option out there, and they actually do a good job," he said. Enderle was surprised to hear of the cameras' lack of security, but said he did not see it as a cause for great concern. "Clearly, if you are pointing that at areas like your bathroom or shower, there may be people enjoying that view with you," he said. "But fundamentally, you shouldn't be pointing it that way anyway." The vulnerability of wireless products has been well understood by manufacturers and privacy advocates for decades. The radio spectrum is crowded, and broadcast is an inherently leaky medium, as former House Speaker Newt Gingrich discovered when recordings of a 1996 cell-phone conference call were released by Democratic foes. In the case of the XCam2, the cameras transmit an unscrambled analog radio signal that can be picked up by receivers sold with the cameras. Replacing the receiver's small antenna with a more powerful one and adding a signal amplifier to pick up transmissions over greater distances is a trivial task for anyone who knows his way around a RadioShack and can use a soldering iron. Products designed for the consumer market rarely include strong security, because security costs money, said Gary McGraw, the chief technology officer of Cigital, a software risk-management company. "When you're talking about a cheap thing that's consumer grade that you're supposed to sell lots and lots of copies of, that really matters," he said. Refitting an X10 camera with encryption technology would be beyond the skills of most consumers. It is best for manufacturers to design security features into products from the start, McGraw said. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5204 From: Shawn Hughes Date: Tue Apr 16, 2002 4:03pm Subject: Re: NannyCAM Monitor At 01:41 PM 4/16/02 , the list quoth: >.............A window on his laptop's screen that had been >flickering suddenly showed a crisp black-and-white video image: What's he using? I have a PCR-1000, and I've seen some software driven scanners, but how would one go about making a video monitor / scanner out of a PC? If he is just using the PC as a monitor, would've seemed cheaper to get one of the LCD monitors I use to set up cameras. Thanks, Shawn 5205 From: Fernando Martins Date: Tue Apr 16, 2002 2:08am Subject: RE: Worth viewing potential threats! http://www.mgteurope.co.uk/vmd_960mm.htm "For direct computer control the unit needs a RS 2323 level converter" wow :> FM > -----Original Message----- > From: MACCFound@a... [mailto:MACCFound@a...] > Sent: segunda-feira, 15 de Abril de 2002 22:47 > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Worth viewing potential threats! > > > > The following web sight contains threats a TSCM pro should be > aware of. > > Video and Audio > Communications for Business or > http://www.mgteurope.co.uk/index.html > > > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> HOT! PRICE BREAKTHROUGH! SUPER Tiny > Wireless Video Camera UNDER $80 BUCKS --> ORDER NOW! > http://us.click.yahoo.com/y7toOC/8o6DAA/yigFAA> /kgFolB/TM > > > -------------------------------------------------------------- > -------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire > speed, the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > 5206 From: Gil Zimmerman Date: Tue Apr 16, 2002 5:37pm Subject: RE: Re: NannyCAM Monitor It could be something as simple as the Nogitech USB video capture cable that I use. It allows for continuous feed from any video source with screen shot ability. Recording can be done with any number of available utilities. Just have to have enough room on the disk to store them! I have the capture package and an X-10 receiver, will have to give it a try! Regards, Gil Gil Zimmerman Director of Business Development Erhart Sawyer International, Inc. 676A Ninth Avenue, #207 New York, NY 10036-3602 gilz@o... (646) 261-7378 mobile/GSM (646) 349-1485 fax (877) 856-1774 US toll free (33) (0)1 43 66 81 05 Paris (bureau) (011) (507) 220-1026 Panama City, Panama (office) Worldwide service in English, French & Spanish languages -----Original Message----- From: Shawn Hughes [mailto:srh@e...] Subject: [TSCM-L] Re: NannyCAM Monitor What's he using? --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.349 / Virus Database: 195 - Release Date: 4/15/2002 5207 From: James M. Atkinson Date: Tue Apr 16, 2002 9:31pm Subject: Re: NannyCAM Monitor At 5:03 PM -0400 4/16/02, Shawn Hughes wrote: >At 01:41 PM 4/16/02 , the list quoth: >>.............A window on his laptop's screen that had been >>flickering suddenly showed a crisp black-and-white video image: > > >What's he using? I have a PCR-1000, and I've seen some software driven >scanners, but how would one go about making a video monitor / scanner out >of a PC? If he is just using the PC as a monitor, would've seemed cheaper >to get one of the LCD monitors I use to set up cameras. > >Thanks, > >Shawn Bah, it was bullshit theatrics. The guy used a laptop for a prop, nothing more, and nothing less. All he did was take the video from a Wavecom receiver and squirt it into the laptops video input port or USB port... This way it would "look cool" and he wouldn't be trying to balance a laptop on the dash of the car. The use of the laptop would also tend to indicate that the guy hacks wireless LAN's; as the WLAN hackers very commonly use the laptop video interface to help sniff out WLAN's being used. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5208 From: Justin T. Fanning Date: Wed Apr 17, 2002 3:38am Subject: Re: Worth viewing potential threats! Did anyone else pickup page: http://www.mgteurope.co.uk/trv_14_uk.htm "operating on the licence exempt MPT1394 band". Would that be MPT1349 (I-ETS 300 440) by any chance?! http://www.radio.gov.uk/publication/mpt/mpt_pdf/mpt1349.pdf JF --- Fernando Martins wrote: > > http://www.mgteurope.co.uk/vmd_960mm.htm > > "For direct computer control the unit needs a RS 2323 level converter" > wow :> > > FM > > > -----Original Message----- > > From: MACCFound@a... [mailto:MACCFound@a...] > > Sent: segunda-feira, 15 de Abril de 2002 22:47 > > To: TSCM-L@yahoogroups.com > > Subject: [TSCM-L] Worth viewing potential threats! > > > > > > > > The following web sight contains threats a TSCM pro should be > > aware of. > > > > Video and Audio > > Communications for Business or > > http://www.mgteurope.co.uk/index.html > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > ---------------------~--> HOT! PRICE BREAKTHROUGH! SUPER Tiny > > Wireless Video Camera UNDER $80 BUCKS --> ORDER NOW! > > http://us.click.yahoo.com/y7toOC/8o6DAA/yigFAA> /kgFolB/TM > > > > > > -------------------------------------------------------------- > > -------~-> > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire > > speed, the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to > > http://docs.yahoo.com/info/terms/ > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5209 From: Graham Bignell Date: Tue Apr 16, 2002 8:16am Subject: Re: Wireless 'Nanny Cams' Provide Window For Voyeurs On Mon, 15 Apr 2002, James M. Atkinson wrote: > http://www.wirelessweek.com/index.asp?layout=print_page&articleID=&doc_id=81192 > Wireless 'Nanny Cams' Provide Window For Voyeurs [snip] > Rob Enderle, a research fellow with the Giga Information Group, a > consulting business in Cambridge, Mass., that studies technology > companies, said he was a big fan of X10 -- which sells the most > popular wireless cameras on the consumer market -- and its wares. > > "Theirs is the least expensive option out there, and they actually do > a good job," he said. [snip] > Refitting an X10 camera with encryption technology would be beyond > the skills of most consumers. It is best for manufacturers to design > security features into products from the start, McGraw said. [snip] [snipe] ;) --- Graham "Lorax" Bignell - 416 366 9755 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 5210 From: Lists Date: Wed Apr 17, 2002 7:26am Subject: Re: Re: NannyCAM Monitor How do you use the video input on a laptop to help sniff out WLANs? All of the tools I am familiar with have no options that work in this way. Kismet, Netstumbler, Airopeek, Sniffer Pro Wireless, etc. Could you clarify what you meant by this? 5211 From: James M. Atkinson Date: Wed Apr 17, 2002 9:05am Subject: RE: File - Gold List At 8:57 PM -0600 4/16/02, Christopher E. Brown wrote: >On Sun, 14 Apr 2002, James M. Atkinson wrote: >> >> If you focus too much on one particular discipline (like alarms or >> access control) you risk missing external lighting issues, door >> issues, the 96 inch rule, and even locks. > >The 96 inch rule? > >Have to admit, I am sufferint from a mental gap on this one. The "The 96 inch rule" concerns the meticulous documentation of any opening in the building which exceeds 96 square inches, or area being subjected to TSCM, or specific secure area. Basically, you document any opening that exceeds 96 square inches, and apply some type of security measure to stop intruders. In some case you may want to apply a standard of 36 or 64 square rule instead. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5212 From: Christopher E. Brown Date: Tue Apr 16, 2002 9:55pm Subject: Re: Re: NannyCAM Monitor On Tue, 16 Apr 2002, Shawn Hughes wrote: > At 01:41 PM 4/16/02 , the list quoth: > >.............A window on his laptop's screen that had been > >flickering suddenly showed a crisp black-and-white video image: > > What's he using? I have a PCR-1000, and I've seen some software driven > scanners, but how would one go about making a video monitor / scanner out > of a PC? If he is just using the PC as a monitor, would've seemed cheaper > to get one of the LCD monitors I use to set up cameras. Well, if I remember their marketing fluff from before I started routing it all to /dev/null... One of the things they went on about was remote monitoring via the internet. In addition to a standard receiver they offered one for the computer, and some software for remote view (bosed off of a mutant H.323 stack IIRC). Little module with a USB interface, exports to the computer, and accepts a few control items (channel/fine tuning/etc). I would assume he picked up the comp interface kit for the X10 cam. That or there are pccard based NTSC/PAL capture/view cards and/or full TV tuner cards available in pccard format. The non computer receiver output is standard NTSC baseband via RCA connector. 5213 From: charly.white Date: Tue Apr 16, 2002 10:44pm Subject: Re: Re: NannyCAM Monitor Yeah,,,,I do alittle Whacking (wireless hacking). It would be nice to flip back and fourth..... Subject: [TSCM-L] Re: NannyCAM Monitor At 01:41 PM 4/16/02 , the list quoth: >.............A window on his laptop's screen that had been >flickering suddenly showed a crisp black-and-white video image: What's he using? I have a PCR-1000, and I've seen some software driven scanners, but how would one go about making a video monitor / scanner out of a PC? If he is just using the PC as a monitor, would've seemed cheaper to get one of the LCD monitors I use to set up cameras. Thanks, Shawn Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5214 From: James M. Atkinson Date: Wed Apr 17, 2002 4:13pm Subject: Hidden sex cameras may soon be banned http://www.cnn.com/2002/TECH/internet/04/17/surveillance.reut/index.html Hidden sex cameras may soon be banned WASHINGTON (Reuters) --Hidden video cameras in bedrooms, bathrooms and other private places would be outlawed under a bill introduced in Congress Tuesday that would also limit pornographic Web sites to an online red-light district. Television star Angie Harmon and privacy activist Susan Wilson joined Louisiana Democratic Sen. Mary Landrieu to announce a bill that would make it illegal to film someone for a "lewd or lascivious purpose" without that person's consent. Violators would face an unspecified fine and up to three years of jail time, or 10 years if the filmed subject was under 18. The bill would not apply to security cameras in private places such as department store dressing rooms, nor would it penalize those filming on city streets or other public places where privacy does not exist. Landrieu said she wrote the bill after hearing from Wilson, a Monroe, Louisiana, homemaker who found hidden video cameras above her bed and in her shower nearly four years ago. Wilson found she could not pursue criminal charges against the voyeur because secret video taping, unlike audio surveillance, is illegal in only a handful of states. "It's an outrageous, outrageous violation of someone's privacy and it's outrageous we don't have laws prohibiting this," Landrieu said. Harmon, best known for her role on the hit TV series "Law and Order," played Wilson in a TV movie for the Lifetime network. A privacy expert said the bill would provide a needed update to existing laws, but should be extended to cover potential abuses by government or private surveillance systems. "It's getting to the point where every aspect of our lives is now subject to this kind of surveillance ... and there's a lack of procedures governing the use of that technology," said David Sobel, general counsel at the Electronic Privacy Information Center. Adults-only Internet domain The bill would also require Web sites containing pornography, hate speech or other material deemed harmful to minors to give up their ".com" Web addresses and register under an adults-only Internet domain such as ".prn." Such an approach could prove troublesome, as other congressional attempts to regulate online content have been struck down in the courts or run aground on free-speech concerns. Moreover, Internet domains are created and approved not by the Congress but by an independent, international body. A bill approved last week by the House Commerce Committee would seek to protect children from inappropriate online content by creating a kid-safe Internet space within the United States' ".us" domain. A House staffer who has worked on the issue said that Commerce Committee members decided their approach was workable because it would not limit speech online, nor would it seek to impose decency standards on other countries. Copyright 2002 Reuters. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5215 From: James M. Atkinson Date: Wed Apr 17, 2002 4:17pm Subject: Peeping Tom Crackdown Proposed Federal Law Targets Video Voyeurs http://more.abcnews.go.com/sections/gma/goodmorningamerica/gma020416video_voyeur_bill.html Peeping Tom Crackdown Proposed Federal Law Targets Video Voyeurs W A S H I N G T O N, April 16 - Susan Wilson's family went about their everyday business in their home - believing they were alone. Meanwhile, a neighbor had been videotaping their most intimate moments. MORE ON THIS STORY The man who secretly videotaped the Wilsons violated their trust and created a private nightmare. Now the invasion of privacy that the Wilson family experienced will become the subject of public scrutiny, as Congress looks at a bill that would make video voyeurism a federal crime. The Wilsons, who were secretly videotaped in their Monroe, La., home, inspired the proposed legislation. Their story became the basis for a Lifetime TV movie that aired in January called Video Voyeur: the Susan Wilson Story. Wilson told ABCNEWS' Good Morning America her family couldn't believe an established punishment didn't exist for those who videotaped others without their knowledge. "Well, I was already feeling vulnerable and unprotected and then when I found there was no law against it, I felt even more so," she said. Actress Angie Harmon played Susan Wilson in the TV movie and has joined Wilson and Sen. Mary Landrieu, a Democrat from Louisiana, in announcing the bill on Capitol Hill today. "What's even creepier about it is that it's not just celebrities anymore that are victimized in this way, it's everyone," Harmon said on Good Morning America. The actress said privacy laws need to be developed to regulate the latest developments in technology, whether it relates to videotape or live feeds on the Internet. Creepy Feeling Lingers The federal bill targets anyone who uses a camera or similar recording device to record another person "either for a lewd or lascivious purpose without that person's consent," placing them in violation of the law. The penalty would be a fine or imprisonment up to three years. If a minor were the one recorded, the imprisonment would be up to 10 years, under the bill's provisions. In a 1999 interview with ABCNEWS, Wilson said her image of her own home changed drastically after she found out a neighbor was spying on her with a video camera. "It gives me the creeps still," Wilson said. The violator of the family's privacy, Steve Glover, had been a longtime family friend and fellow church member of the Wilsons. "He seemed to know everything about me," Wilson said. "Everything that I'd done. He just knew everything." She became so convinced that Glover was spying on her, that she searched his home one day while visiting, and found a videotape. After pressing play, Wilson watched in horror as her bedroom filled the screen. Video Cameras in Bedroom Ceiling It turns out there was hidden recording equipment in the Wilsons' attic, and holes cut into the ceiling above their bedroom and master bathroom. But what shocked Wilson even more was learning that Glover had broken no laws with his voyeuristic videotaping. He eventually pleaded guilty to unauthorized entry into the Wilson home, received probation and was ordered to pay $2,000 for damages done to his neighbor's home. Wilson went on a crusade, and convinced state lawmakers in Louisiana to pass a law against video voyeurism, making it a federal crime. Only five states have similar laws against video voyeurism: California, Louisiana, Michigan, Mississippi and Ohio, though Louisiana's is the broadest in scope. Connecticut prohibits video surveillance in employee locker rooms and rest rooms, while New York prohibits concealed cameras in fitting rooms. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5216 From: Hawkspirit Date: Wed Apr 17, 2002 6:55pm Subject: NannyCAM Monitor Jim, How does the video interface help sniff out WLAN's? Roger "The use of the laptop would also tend to indicate that the guy hacks wireless LAN's; as the WLAN hackers very commonly use the laptop video interface to help sniff out WLAN's being used." -jma 5217 From: Steve Uhrig Date: Thu Apr 18, 2002 0:03am Subject: Riser Bond's new address + TDRs If anyone cares, Riser Bond (TDR manufacturer) has been absorbed by SPX's Dialectric Communications Facility and has the following new contact info: Radiodetection Group 35 Whitney Road Mahwah NJ 07430 201-848-8070 800-688-8377 201-848-1303 fax The above is the new address for sales and customer support. Engineering will move to Lincoln, NE and manufacturing will move to Bridgeton, ME. If you own a Riser Bond TDR, you may wish to print this message, cut out the above, and tape it inside the cover of your manual against future need. I still have some 1205CX, 1205CXA and 1205T-OSP 'yellow box' TDRs with the LCD screen, and some 2401B+ and the very latest model 1000. This last is new in box never used. Contact me for prices if interested. Mine are *very* aggressive prices, guaranteed pieces, most with new batteries or very recent at least. Most of the ones listed are in current production. Unllike Tek TDRs, Riser Bond are perfectly OK on wet lines up to 400 volts, and extremely easy to use. Riser Bond has an excellent tutorial at www.riserbond.com. A TDR is mandatory for sweeping telephone lines. Jim Ross doesn't like them which is all the more proof they are needed. Holler if interested. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5218 From: Christopher E. Brown Date: Tue Apr 16, 2002 9:57pm Subject: RE: File - Gold List On Sun, 14 Apr 2002, James M. Atkinson wrote: > > If you focus too much on one particular discipline (like alarms or > access control) you risk missing external lighting issues, door > issues, the 96 inch rule, and even locks. The 96 inch rule? Have to admit, I am sufferint from a mental gap on this one. 5219 From: Michael Puchol Date: Thu Apr 18, 2002 2:57am Subject: Re: Re: NannyCAM Monitor ----- Original Message ----- From: "James M. Atkinson" To: Sent: Wednesday, April 17, 2002 4:31 AM Subject: [TSCM-L] Re: NannyCAM Monitor > Bah, it was bullshit theatrics. Agreed. > The guy used a laptop for a prop, nothing more, and nothing less. Agreed too. :-) > All he did was take the video from a Wavecom receiver and squirt it > into the laptops video input port or USB port... This way it would > "look cool" and he wouldn't be trying to balance a laptop on the dash > of the car. Well, your usual flash show for TV. You see this kind of stuff all the time. > The use of the laptop would also tend to indicate that the guy hacks > wireless LAN's; as the WLAN hackers very commonly use the laptop > video interface to help sniff out WLAN's being used. Well, this is one I'll comment on - why use the video interface to find WLANs, when you have available a much better set of tools for that job, which range from 'hacker' tools to software that costs over $35k like NAI Sniffer Pro? I take it that in your scenario, you'd get a 2.4GHz wideband receiver, and use it to look for signals on the designated 802.11b 'channels', which would show up on the video input not as a video signal - custom written software could look for particular DSSS signatures rather than actual video. All you need to look for WLANs is a laptop, PCMCIA WiFi card, and some software (take your pick, Windows or Linux-based), there's no need to get as complicated as using video equipment & such. All the best, Mike 5220 From: Michael Puchol Date: Wed Apr 17, 2002 10:49am Subject: Re: Re: NannyCAM Monitor ----- Original Message ----- From: "James M. Atkinson" To: Sent: Wednesday, April 17, 2002 4:31 AM Subject: [TSCM-L] Re: NannyCAM Monitor > Bah, it was bullshit theatrics. Agreed. > The guy used a laptop for a prop, nothing more, and nothing less. Agreed too. :-) > All he did was take the video from a Wavecom receiver and squirt it > into the laptops video input port or USB port... This way it would > "look cool" and he wouldn't be trying to balance a laptop on the dash > of the car. Well, your usual flash show for TV. You see this kind of stuff all the time. > The use of the laptop would also tend to indicate that the guy hacks > wireless LAN's; as the WLAN hackers very commonly use the laptop > video interface to help sniff out WLAN's being used. Well, this is one I'll comment on - why use the video interface to find WLANs, when you have available a much better set of tools for that job, which range from 'hacker' tools to software that costs over $35k like NAI Sniffer Pro? I take it that in your scenario, you'd get a 2.4GHz wideband receiver, and use it to look for signals on the designated 802.11b 'channels', which would show up on the video input not as a video signal - custom written software could look for particular DSSS signatures rather than actual video. All you need to look for WLANs is a laptop, PCMCIA WiFi card, and some software (take your pick, Windows or Linux-based), there's no need to get as complicated as using video equipment & such. All the best, Mike 5221 From: Date: Thu Apr 18, 2002 6:28am Subject: Re: Re: NannyCAM Monitor Michael Puchol wrote: > ----- Original Message ----- > From: "James M. Atkinson" > To: > Sent: Wednesday, April 17, 2002 4:31 AM > Subject: [TSCM-L] Re: NannyCAM Monitor > > > Bah, it was bullshit theatrics. > > Agreed. > > > The guy used a laptop for a prop, nothing more, and nothing less. > > Agreed too. :-) I disagree. http://www.spybusters.com/RRSA.html Cheers, Kevin 5222 From: James M. Atkinson Date: Thu Apr 18, 2002 8:08am Subject: FBI Tech Jobs https://www.fbijobs.com/joblist.asp Electronics Engineer (Amended 4/2/2002) Announcement Number: 02-07-325 Salary Range: $36,615 - $86,095 (GS 7/9/11/12/13) Promotion Potential: GS 14 POSITION IS LOCATED AT THE ENGINEERING RESEARCH FACILITY, QUANTICO, VIRGINIA. NO PUBLIC TRANSPORTATION IS AVAILABLE. Duties and Responsibilities: Serves as project manager, and/or performs research, test and evaluation, and/or developmental engineering studies on projects in the field of advanced telephony, encryption, intercept capabilities and wireline digital voice/data communications. Research, develop, test and evaluate new innovative software and hardware, not commercially available, to assist law enforcement and intelligence agencies in the interception of Wireline data communications and encryption areas of telecommunications and computer networks. Performs engineering analysis and evaluations of existing technologies to include the use of a wide variety of public switch telephone network (wireline), cellular and personal communications services (PCS) networks (wireless) and/or data networking and communications networks. Designs and develops techniques, methods and equipment to enhance, modify or compromise existing or developing technology within the field of telephony, specifically, wireline or wireless networks, data networks and digital communications. Isolates and defines specific engineering problems and possible modifications and solutions. ---------------------------------------------------------------- https://www.fbijobs.com/joblist.asp Electronics Engineer (Amended 4/2/2002) Announcement Number: 02-07-326 Salary Range: $36,615-$86,095 (GS 7/9/11/12/13) Promotion Potential: GS 14 Open Period: 2/7/2002- 5/10/2002 This announcement will close at 5/10/2002 12:00 am CST. To be considered for employment, you must submit your application before that time. Duty Location: Quantico, Virginia Area of Consideration: All Sources *Cut-off date: 4/12/2002. Applicants who apply by this date will received consideration in filling positions through this vacancy. Who May Apply: 1.Current federal employees serving under a career or career-conditional appointment, current federal employees in an excepted service position, and former employees with reinstatement eligibility may apply. 2.All others qualified candidates may apply. EXPENSES INCURRED WILL BE BORNE BY THE SELECTEE. POSITION IS LOCATED AT THE ENGINEERING RESEARCH FACILITY, QUANTICO, VIRGINIA. NO PUBLIC TRANSPORTATION IS AVAILABLE. Duties and Responsibilities: Performs studies, research, analysis and /or development on a wide variety of technical projects in one or more of the following areas: Audio Collection, Audio/Video and Image processing and Signal Analysis, Radio Frequency Communications, Signal Intelligence, Technical Countermeasures, Covert Mobile and Physical Surveillance, Information Systems Networks/Platforms. Work involves development, design, test, analysis, evaluation, implementation, and maintenance of advanced electronic devices, systems and technologies as well as program/project management at the senior levels. Travel may be required. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python From: Steve Uhrig Date: Wed Apr 17, 2002 0:31pm Subject: Re: NannyCAM Monitor > >What's he using? I have a PCR-1000, and I've seen some software > >driven scanners, but how would one go about making a video monitor / > >scanner out of a PC? If he is just using the PC as a monitor, > >would've seemed cheaper to get one of the LCD monitors I use to set > >up cameras. The entire thing was staged. I pretty much proved this in a telephone conversation with one of the TV stations who wanted to do a similar scenario. The range of an X10 transmitter is advertised as 'up to' 100 feet. Read that as 100 feet line of sight on the surface of the moon. Going through walls, especially exterior walls, would attentuate the signal down to near nothing. The chances of someone randomly driving around and finding a decent video signal on 2.4 with a consumer receiver and antenna are slim to none. The article did not state the clowns doing this knew in advance where the transmitters were located. When pushed and asked this specific question, they refused to answer. Remember the media's job is to sensationalize things, not to report accurately. Anyone who has tried to sweep for 2.4 video knows of the short ranges, the directional antennas, skill, amount of effort, and a bit of luck needed to intercept video at any distance. Intercepting it driving down the street at random is extremely unlikely to happen with any FCC-legal product. The average Joe Sixpack is not going to know how to install a larger antenna, properly jump out the pads in the transmitters or add a MMIC amplifier to pump up the ERP. Improving the receive antenna will increase the range at the expense of directivity. The story was staged if it even happened at all, which I doubt. 2.4 and other microwave video is suitable only for fixed point to point links where nothing is between the transmit and receive antennas other than atmosphere. If either end is moving, multipath is so severe it will kill your signal. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5224 From: Date: Thu Apr 18, 2002 5:30am Subject: CCS Counter Spy Shops Go Public! The CCS Counter Spy Shops Go Public! Real Spy Technology & Spy Toys Go Mainstream NEW YORK--(BUSINESS WIRE)--April 17, 2002--CCS International, Ltd., the parent company of The Counter Spy Shops of Mayfair, London(TM) and operator of www.spyzone.com, became a public company today via a reverse merger with Security Intelligence Technology Group (OTCBB:SITG ). Financial details were not disclosed. CCS and The Counter Spy Shops(TM) manufacture and/or provide state-of-the-art security, surveillance, countersurveillance and counter-measure equipment and/or systems for the private citizen, corporations, law enforcement agencies, NATO member countries' armed forces, the international security marketplace and governments worldwide. The company specializes in anti-bugging, anti-wiretapping, covert video & CCTV, night vision, digital lie-detection, scramblers, encryption systems, bullet-resistant clothing, armored vehicles, GPS and RF tracking, cellular monitoring systems and security seminars. Thomas Felice, chief operating officer and general manager of CCS's Counter Spy Shop retail marketing centers, explained that the decision to become a public company stems from CCS's rapid growth as a result of the new worldwide emphasis on security. Further, he believes that as a public company it will now have the resources to expand it's marketing efforts and distribution network to bring security equipment and personal protection into the mainstream domestic and international markets. He added, "The unfortunate tragedies have literally forced people to rethink their own personal safety and realize that the doorman, gatekeeper, bodygaurd and/or home security system is no longer the final line in personal protection or corporate security. It is literally a new psychological defense posture that Americans are now taking on, worldwide. "We have been thrust forward into a precarious age, where businesses and private citizens are now dealing with information as their most valuable asset, the theft of which could alter their business, livelihood or even their lifestyle. From internal security threats to personal security surrounding terrorism to identity theft, this new unstable climate fosters an obligation and responsibility to safeguard the things in life that one works so hard to achieve, and can assist in explaining why this business may be the right business to be in at the right time to be in it." CCS plans to expand using the additional capital generated by the merger with Security Intelligence Technology Group into franchising additional retail locations, (already located in New York, Washington DC, Miami, Beverly Hills, London, Hong Kong, Mexico City & Israel), bringing security equipment and personal protection into the mainstream American market and enlarging it's research & development to produce and/or provide unique security solutions in the everchanging security marketplace. It also plans to widely market the brand name The Counter Spy Shops(TM) as well as Spyzone.com, the company's corporate Website and catalog. CCS & The Counter Spy Shops(TM) have more than 40 years' experience in the international security field, helping businesses and catering to professionals and lamen alike who demand leading equipment for protection of clients, voice, data and proprietary information. More than just a chain selling James Bond-like gadgets and "boy's toys," the Counter Spy Shops(TM) and it's parent company, CCS International, Ltd., have assisted numerous organizations and events, including the Apollo 11 space mission, Radio Free Europe, major motion picture and television productions (prop, tech and set design), Aston Martin promotions, Fortune 500 Companies concerned about threats to proprietary information, The International Spy Museum, game show prizing and many national and international federal and state government and law enforcement agencies. Safe Harbor Statement Statements in this press release and oral statements that may be made by the Company or by officers, directors or employees of the Company acting on the Company's behalf that are not statements of historical or current fact constitute "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995. Such forward-looking statements involve known and unknown risks, uncertainties and other unknown factors that could cause the actual results of the Company to be materially different from the historical results or from any future results expressed or implied by such forward-looking statements. In addition to statements which explicitly describe such risks and uncertainties, readers are urged to consider statements labeled with the terms "believes," "expects," "intends," "may," "should," or "anticipates" to be uncertain forward-looking statements. The forward looking statements contained herein are also subject generally to other risks and uncertainties that are described from time to time in the Company's reports and registration statements filed with the Securities and Exchange Commission. Interviews, investor & media/press kits available CONTACT: CCS International, Ltd. The Counter Spy Shops Investor and Media Relations: Arielle Jamil, 212/688-8500 cell: 917/449-USPY www.spyzone.com SOURCE: CCS International, Ltd. 5225 From: James M. Atkinson Date: Thu Apr 18, 2002 9:14pm Subject: More States Loosening Wiretap Restrictions - Study http://www.newsbytes.com/news/02/175952.html More States Loosening Wiretap Restrictions - Study By Dick Kelsey, Newsbytes WASHINGTON, D.C., U.S.A., 17 Apr 2002, 3:34 PM CST Proposed changes to state wiretap laws triggered by the terrorist attacks on Sept. 11 would give states added surveillance power that could erode civil liberties, said a review of state-level legislation released today. The review, conducted by a Washington-based non-profit that tracks legal and constitutional issues, examined how states approve and implement wiretaps. The Constitution Project seeks to determine whether laws compromise individual liberties. Many states have proposed that law officers have more leeway to tap criminal suspects' telephones or intercept electronic communications, be given enhanced subpoena power, and receive the authority to conduct "roving" statewide wiretaps, the group said. As of April 8, wiretap law legislation was pending in 22 states and bills had been passed in 3 states, while no legislative action was pending in 25 states and the District of Columbia, according to the review, which is part of the Constitution Project Liberty and Security Initiative. "We must make sure that the benefits of these wiretaps are accompanied by continuing protection of civil liberties," said Peter Swire, a professor at Ohio State University law school and initiative adviser. More than half of the nation's wiretaps are conducted at the state level, said Swire, who served as chief privacy officer for the Clinton administration. While the federal government has oversight regarding such matters in congressional committee hearings, states have little or none, initiative director, Joseph Onek, told Newsbytes. "When you have 50 state governments doing the same thing without some capabilities for oversight, that's what concerns us," Onek said. Arizona lawmakers, for example, may do away with the requirement that a wiretap application specify the crime for which the surveillance is sought, Onek said. Constitution Project - http://www.constitutionproject.org Reported by Newsbytes.com, http://www.newsbytes.com 15:34 CST Reposted 17:19 CST (20020417/WIRES TOP, ONLINE, TELECOM, LEGAL/SURVEILLANCE/PHOTO) © 2002 The Washington Post Company -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5226 From: James M. Atkinson Date: Thu Apr 18, 2002 9:15pm Subject: Wiretap Survey Sounds Privacy Alarms http://www.extremetech.com/article/0,3396,s=201&a=25671,00.asp April 17, 2002 Wiretap Survey Sounds Privacy Alarms By Scot Petersen, eWEEK New posts: 1 SAN FRANCISCO--The Constitution Project today released a nationwide survey of state wiretap statutes, a representative of the organization announced here at the Computers Freedom and Privacy Conference. The survey is the first of its kind and includes all 50 states and the District of Columbia, said Peter Swire, a law professor at Ohio State University and a member of the Constitution Project Committee at Georgetown University. The project was done in the wake of the Sept. 11 terrorist attacks and of the passing of the USA PATRIOT Act last October, which gives states broad freedoms in allowing the interception of oral, wire or electronic communications of citizens. Many privacy experts are concerned that widespread ignorance of new wiretap laws could lead to unprecedented breaches of privacy. "The PATRIOT Act has created a homework assignment for all of us," said Swire. "We all need a debate about the nature of security in the future." Also at the conference, a panel debated the potential and possibility of a national ID card system, another proposal made in the wake of Sept. 11. Most experts agree that a system would solve a lot of problems, but none agreed on the feasibility of a system. Dierdre Mulligan of the National Research Council detailed a report which outlines the problems and challenges of establishing a national ID system. The main problem, she said, is that there has been no debate about the goals of such a system, nor how it would work. "Everybody is focusing on the card aspect of the system, but the card is a trival part of a much larger infrastructure," she said. Another speaker, Andrew Schulman, pointed out that the biggest problem in creating an ID systems is that so far the debate is being led by technology vendors, such as Oracle Corp., who stand to benefit from the adoption of a system. "The national ID card system is major pork for the IT industry," he said. "There's a lot of talk about sliding the scale from privacy to security, but no discussion about how it would work, and would it work in the [Sept. 11] sense. Would a national ID card system have kept [suspected hijacker]Mohamed Atta from getting on that airplane?" -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5227 From: James M. Atkinson Date: Thu Apr 18, 2002 9:16pm Subject: Bill would outlaw hidden home video cameras http://www.usatoday.com/life/cyber/tech/2002/04/18/hidden-video.htm 04/18/2002 - Updated 09:15 AM ET Bill would outlaw hidden home video cameras WASHINGTON (Reuters) - Hidden video cameras in bedrooms, bathrooms and other private places would be outlawed under a bill introduced in Congress Tuesday that would also limit pornographic Web sites to an online red-light district. Television star Angie Harmon and privacy activist Susan Wilson joined Louisiana Democratic Sen. Mary Landrieu to announce a bill that would make it illegal to film someone for a "lewd or lascivious purpose" without that person's consent. Violators would face an unspecified fine and up to three years of jail time, or 10 years if the filmed subject was under 18. The bill would not apply to security cameras in private places such as department store dressing rooms, nor would it penalize those filming on city streets or other public places where privacy does not exist. Landrieu said she wrote the bill after hearing from Wilson, a Monroe, La, homemaker who found hidden video cameras above her bed and in her shower nearly four years ago. Wilson found she could not pursue criminal charges against the voyeur because secret video taping, unlike audio surveillance, is illegal in only a handful of states. "It's an outrageous, outrageous violation of someone's privacy and it's outrageous we don't have laws prohibiting this," Landrieu said. Harmon, best known for her role on the hit TV series Law and Order, played Wilson in a TV movie for the Lifetime network. A privacy expert said the bill would provide a needed update to existing laws, but should be extended to cover potential abuses by government or private surveillance systems. "It's getting to the point where every aspect of our lives is now subject to this kind of surveillance ... and there's a lack of procedures governing the use of that technology," said David Sobel, general counsel at the Electronic Privacy Information Center. Adults-only Internet domain The bill also would require Web sites that contain pornography, hate speech or other material deemed harmful to minors to give up their dot-com Web addresses and register under an adults-only Internet domain. Such an approach could prove troublesome, as other congressional attempts to regulate online content have been struck down in the courts or run aground on free-speech concerns. Moreover, Internet domains are created and approved not by the Congress but by an independent, international body. A bill approved last week by the House Commerce Committee would seek to protect children from inappropriate online content by creating a kid-safe Internet space within the United States' dot-us domain. A House staffer who has worked on the issue said that Commerce Committee members decided their approach was workable because it would not limit speech online, nor would it seek to impose decency standards on other countries. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5228 From: James M. Atkinson Date: Thu Apr 18, 2002 9:31pm Subject: Federal Peeping Tom Law http://www.access.gpo.gov/su_docs/aces/aaces002.html [Congressional Record: April 16, 2002 (Senate)] [Page S2723-S2730] From the Congressional Record Online via GPO Access [wais.access.gpo.gov] [DOCID:cr16ap02-161] STATEMENTS ON INTRODUCED BILLS AND JOINT RESOLUTIONS [Excerpt] By Ms. LANDRIEU: S. 2137. A bill to facilitate the protection of minors using the Internet from [[Page S2729]] material that is harmful to minors, and for other purposes; to the Committee on Commerce, Science, and Transportation. Ms. LANDRIEU. Mr. President, today I want to introduce a very important piece of legislation, the Family Privacy Protection Act. Let me just take a few minutes to explain this bill to my colleagues. In this age of high-technology, we are blessed with many things that our ancestors did not have. Cell phones and e-mail allow us to communicate quickly. Advances in medical science are allowing our citizens to live much longer and healthier lives. And advances in computers and other equipment help make workers and businesses many times more productive. However, technology is a double-edged sword. Sometimes the bad comes with the good. This fact hit home in the most tragic way when it was learned that the September 11 hijackers had communicated through e-mail and cell phones. As frightening as this is, it is not the only example of the problems associated with advances in technology. There are day-to-day issues that must be resolved. For instance, technology has exposed our citizens to breaches of privacy that could never have taken place before the days of the Internet and other advances. Former Chief Justice Earl Warren once said, ``The fantastic advances in the field of communication constitute a grave danger to the privacy of the individual.'' If Chief Justice Warren were alive today to offer his remarks, he might substitute the word ``technology'' for ``communication.'' Let me give one example of an incident which highlights this fact. In the early 1990's, a shocking thing happened to a family in Monroe, Louisiana. Monroe is a relatively small city, at least by the standards of most parts of the country, but it is the largest city in the northeastern section of my state. I want to talk about a family who lives in Monroe, the Wilsons. Susan Wilson was just an average woman with an average family. Unfortunately, something terrible happened, which tore apart the quiet life of this family. A family friend, a former deacon at the Wilson's church, did something despicable. While the Wilson's weren't home, this man broke into their house and planted a video camera in their bathroom. The Wilson's eventually learned that, for almost 2 years, video cameras had been filming everything in their bathroom. This man filmed all of their private moments for the past years for his own sick and twisted purposes. But even then, the family's nightmare wasn't over. You see, under Louisiana state law, and the law of most States, there was no crime under which this man could be charged for filming the family without their consent. Although he was eventually charged with unauthorized entry, there was no way to punish this man for the more serious crime he committed. The State legislature remedied this in 1999, passing a law making video voyeurism a crime. This was thanks in large part to Susan Wilson, who spoke with the media, testified before committees--in short, give up her privacy and put her life on public display, doing everything she had to do to call attention to this problem. In short, she has sacrificed so that women such as herself will not have to experience the pain of watching the individuals who devastated their lives walk away virtually untouched by the law. And she continues to make this sacrifice to this day. There was even a recent movie detailing Susan's story, some of my colleagues may have seen it. It aired February 6 on Lifetime, starring Angie Harmon. It was a very compelling, though obviously disturbing, film, and if my colleagues have not seen it I would urge them to do so. Since the law was passed in Louisiana, several individuals have been prosecuted under it. Let me just give a couple of examples. Two years ago, a New Orleans man was arrested under the law after a video camera was found in his neighbor's air conditioning vent. In nearby Marrero just a couple of months before, a man was arrested for allegedly pointing a video camera in someone's window. And just before that, a man was arrested under the video voyeurism law and charged with videotaping a woman during intercourse and then trying to sell the tape. And, just over a month ago in Lafayette, LA, a man was charged for undressing a sleeping woman and videotaping her in his apartment. This law has also be used in conjunction with laws already on the books, to give police another tool with which to charge offenders. For instance, last year in Slidell, LA, a man was charged with seven counts of video voyeurism in addition to various pornography-related charges. And in Leesville, LA, a year ago, three people, including a Sheriff's deputy, were arrested and charged with video voyeurism and juvenile pornography. Louisiana is not the only State to pass this law, or to charge offenders with violating it. A principal in Arkansas was charged with the crime, although the charges were later dropped. And in Milwaukee, a man was arrested late last year and charged with videotaping guests in his house while they showered and undressed. These are terrible crimes; they are a violation of privacy, and more. They strike at the very heart of one of our most cherished personal freedoms, the right to live our lives free of the fear of people watching us perform the most regular of tasks, bathing, getting dressed, or sleeping. In the past, someone who looked in another person's window at night was called a ``Peeping Tom.'' We are not dealing with people looking in windows anymore, we are dealing with technologies like video cameras small enough to fit in an air conditioning vent. In the past, that person looking in the window could be caught by police and charged with a crime. Unfortunately, for the person who plants the camera in the air conditioning duct, as things stand now, except for a few states that have passed this type of legislation, that person can at best only be charged with a crime like unlawful entry. This brings me to the first provision of the legislation that I am introducing today. I met with Susan last year, and promised her I would introduce Federal legislation addressing this crime. Currently, only five states have laws dealing with video voyeurism. This is one of the reasons I am here today to introduce my legislation, the Family Privacy Protection Act. This measure contains several important provisions, but the first one I want to focus on today is the video voyeurism section. This bill will make it a Federal crime to film someone in these circumstances without their consent. The bill provides exceptions for legitimate purposes such as police investigations and security; but the bottom line is that this legislation would hold these individuals responsible for their actions. Actress Judy Garland, speaking of her lack of privacy, once said, ``I've never looked through a keyhole without finding someone was looking back.'' How frightening it would be for all of our citizens to feel this way; that they are not safe from prying eyes in their own home. The video voyeurism component, while important, is only one part of this bill. This bill also contains a provision to protect children from Internet websites with pornographic material. A recent study showed that 31 percent of children aged 10-17 who used the Internet have accidentally come across a pornographic website. That includes 75 percent ages 15-17. One of the problems is that companies and individuals who have websites make money from ``hits'' by Internet users. It doesn't matter whether someone intentionally visits a website or does so on accident, it still counts as a ``hit''. So some of these companies that set up pornographic websites specifically choose names that will cause people to accidentally find them. Let me give a quick example. As I'm sure all of my colleagues know, the web address for the White House is www.whitehouse.gov. But if you make a mistake--and it's not a difficult mistake, I know many people who have made it, and type a slightly different address, www.whitehouse.com, you will access a different site altogether, a pornographic website. While I'm sure these companies are not targeting children specifically, they inevitably come across these inappropriate sites. I have already mentioned some statistics on how many children have accidentally visited inappropriate [[Page S2730]] websites. I just want to share a few examples. An 11-year-old boy was searching for game sites, typed in ``fun.com'', and a pornographic site came up. A 15-year-old boy was looking for info on cars, did a search for ``escort'', and an escort service site came up. And, in one of the most disturbing examples that I came across, in one instance a 15-year-old boy was doing a report on wolves, and found a site on bestiality. I just want my colleagues to imagine for a moment this happening to their son or daughter. I think we can all agree that this is something that we need to be concerned about. The American people are certainly concerned about it. In the same Kaiser study, 84 percent of the American people worry about the availability of pornography online, and 61 percent say the government should regulate it. Sixty-one percent. And I am certain that number is much higher among parents. That is why I believe this legislation is so important. I understand that these websites are protected by the First Amendment. This bill does not intrude upon these sites' right to free speech. Instead, it would set up a whole new domain name for pornographic material. A domain name, as my colleagues know, is the three letters at the end of the web address. Dot-com, dot-gov, dot-org, dot-net--these are all domain names. My legislation would instruct the Internet Corporation for Assigned Names and Numbers to set up a new domain name for pornographic websites. The owners of these sites would have 12 months to move their sites to the new domain. This is a very simple yet effective method of protecting our children from these sites. A new domain would make ``filter'' programs, which screen out these pornographic sites, much more effective. It would eliminate mistakes like the whitehouse dot-gov, dot-com, problem that I mentioned earlier. And, I firmly believe this bill passes First Amendment tests for freedom of speech. I understand that some people will not agree with me, saying that this bill does not go far enough and that this type of material should be banned altogether. But the First Amendment to the Constitution protects even material of this kind, whether or not we may agree with it. My bill would not infringe on the right of free speech, but would simply restrict where this type of speech could be presented on the Internet. As one of my constituents from Louisiana said, ``We need to put it where the people who want to see it can get to it, and the ones who don't want to see it don't have to.'' That is all this provision does. Finally, a similar provision in the bill provides protection for children from pornographic e-mails. This language is very similar to a bill that was introduced in the House of Representatives by Congresswoman Zoe Lofgren of California. I wanted to take a second to acknowledge Congresswoman Lofgren for her efforts, and I hope to work with her on this initiative. In short, the bill would require that e-mail advertisements be clearly labeled as containing sexually oriented material. We are all familiar with receive e-mails with subjects that say ``Lose weight now'' or ``You have won!'' that in reality contain pornographic material. Many of us simply delete these e-mails without look at them, knowing them to be deceptive or junk. However, it is easy to be fooled. I have received letters from several constituents who were offended, and rightly so, after opening falsely labeled e-mails. As you can imagine, children are particularly vulnerable to this type of deceptive e-mail. In a study done for Congress by the Crimes Against Children Research Center, 25 percent of children studied were exposed to unwanted sexual pictures in the previous year. Of these exposures, 28 percent occurred by opening or clicking on an e-mail. There is one case that upsets me in particular. A 12-year-old girl, a little girl who collects Beanie Babies, received an e-mail with a subject line saying ``Free Beanie Babies.'' As you can imagine, this excited little girl quickly opened the e-mail, only to be confronted with pictures of naked people. Again, I'd like my colleagues to stop for a moment and imagine that this was their child. Let me just conclude with a few more facts. The Kaiser study also looked at the consequence on these children from encountering these pornographic websites and e-mails. Fifty-seven percent of those age 15- 17 who were studied believed that exposure to online pornography could have a serious impact on those under 18. And 76 percent of children surveyed by Kaiser said that pornography that kids can see is a ``big problem.'' I just want to add that I am hopeful that, in the future, we can take even stronger steps to address the problem of pornographic e-mails. However, at the moment, this bill will at least ensure that Internet users, particularly children, know that an e-mail contains sexually oriented material before opening it. I hope that my colleagues will join me in support of this important legislation. It is intended to protect our most vulnerable citizens, our children, while protecting the right of individuals to free speech. I believe this is something that we can all support. ____________________ ----------------------------------------------------------------------- [DOCID: f:s2137is.txt] 107th CONGRESS 2d Session S. 2137 To facilitate the protection of minors using the Internet from material that is harmful to minors, and for other purposes. _______________________________________________________________________ IN THE SENATE OF THE UNITED STATES April 16, 2002 Ms. Landrieu introduced the following bill; which was read twice and referred to the Committee on Commerce, Science, and Transportation _______________________________________________________________________ A BILL To facilitate the protection of minors using the Internet from material that is harmful to minors, and for other purposes. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the ``Family Privacy and Security Act of 2002''. TITLE I--INTERNET DOMAIN FOR MATERIAL HARMFUL TO MINORS SEC. 101. ESTABLISHMENT OF TOP-LEVEL INTERNET DOMAIN NAME. (a) NTIA Action.--Not later than 30 days after the date of the enactment of this Act, the Secretary of Commerce, acting through the National Telecommunications and Information Administration, shall-- (1) pursuant to the authority under section II.B. of the Memorandum of Understanding Between the U.S. Department of Commerce and the Internet Corporation for Assigned Names and Numbers, entered into on November 25, 1998, regarding oversight of the policy for determining the circumstances under which new top-level Internet domains are added to the root system, jointly with ICANN, develop a plan in accordance with section 102 for ICANN to establish a new domain meeting the requirements in subsection (b) of this section; (2) upon completion of the plan, make the plan publicly available; and (3) enter into any memorandums of understanding, agreements, and contracts with ICANN, and any amendments to existing such memorandums, agreements, and contracts, as may be necessary to provide for ICANN to carry out the plan. (b) Requirements for New Domain.--The new domain shall be subject to the following requirements: (1) Top-level, international domain.--The new domain shall be established as a top-level, International domain having a domain name appropriate for its purpose. (2) Operator of domain.--The entity selected pursuant to section 102 to establish, operate, and maintain the new domain shall-- (A) establish, operate, and maintain the new domain in accordance with this subsection; and (B) provide for the creation of an independent board, with diverse membership, which shall be responsible for-- (i) establishing written criteria for accepting registrants for the new domain and for any limitations applicable to the new domain; and (ii) ensuring that subscription rates or fees for obtaining a name for the new domain are as minimal as possible. (3) Other requirements.--The plan developed under section 102 may include such other requirements with respect to the new domain as the National Telecommunications and Information Administration and ICANN jointly consider appropriate. SEC. 102. SELECTION OF OPERATOR OF NEW DOMAIN. (a) Application Process.--The plan under this section shall establish a process for soliciting applications for the establishment of the new domain, which process shall-- (1) commence and complete not later than 60 days after the expiration of the 30-day period referred to in section 101(a); (2) provide adequate notice to prospective applicants of-- (A) the opportunity to submit an application; and (B) the criteria for selection under subsection (b)(1); (3) include a fee for filing an application that does not exceed the minimum amount reasonably estimated by ICANN to be necessary to recover its expenses under section 101 and this section; and (4) provide for reimbursement to applicants of any amounts collected in filing fees that exceed the actual amount of expenses of ICANN under section 101 and this section. (b) Selection Process.--The plan under this section shall establish a process for selection, from applications submitted pursuant to subsection (a), of an application for the establishment of the new domain meeting the requirements under section 101(b). Such selection process shall comply with the following requirements: (1) Criteria.--The selection shall be made pursuant to written, objective criteria designed to ensure that-- (A) the new domain is established, operated, and maintained in accordance with the requirements under section 101(b); and (B) the entity selected to establish, operate, and maintain the new domain is the applicant most capable and qualified to do so. (2) Initial review.--Not later than 60 days after the completion of the application period under subsection (a)(1), ICANN shall-- (A) review and apply the selection criteria established under paragraph (1) to each application submitted; and (B) based upon such criteria, select an application and award to the applicant a contract for the establishment, operation, and maintenance of the new domain, unless ICANN determines that no applicant could minimally provide for the establishment, operation, and maintenance of the new domain in accordance with the requirements under section 101(b). (3) Second application period.--If no applicant is selected pursuant to paragraph (2), not later than 30 days after the expiration of the 60-day period under paragraph (2), ICANN shall commence another application and selection process that complies with the requirements under subsection (a) and this subsection. (4) Report.--If the second application and selection process under paragraph (3) does not result in the award of a contract for the establishment, operation, and maintenance of the new domain, not later than 30 days after the conclusion of the 60-day period under paragraph (3), ICANN shall-- (A) notify the Secretary of Commerce in writing of the failure to award a contract under paragraph (3); and (B) submit to the Secretary a report describing the application and selection process and setting forth the reasons for the failure to award the contract. (c) Full Operation.--The plan under this section shall provide for ICANN to take all actions necessary to facilitate the full operation of the new domain within six months after the award of the contract for the establishment, operation, and maintenance of the new domain. (d) Annual Oversight.--The plan under this section shall provide that ICANN shall, on an annual basis, review the actions of the entity selected to establish, operate, and maintain the new domain to ensure that such entity is complying with the requirements under section 101(b). SEC. 103. USE OF NEW DOMAIN. Commencing not later than 12 months after the establishment of the new domain under section 102, any operator of a commercial Internet web site or online service that has as its principal or primary business the making available of material that is harmful to minors shall register such web site or online service with the new domain and operate such web site or online service under the new domain. SEC. 104. LIABILITY PROTECTIONS. (a) Treatment of Publisher or Speaker.--No person or entity that operates or maintains the new domain shall be treated as the publisher or speaker of any information or material provided by another registrant under the domain. (b) Civil Liability.--No person or entity that operates or maintains the new domain shall be held liable because of-- (1) any action voluntarily taken in good faith to restrict to minors access through the new domain to, or availability through the new domain of, material that is harmful to minors; or (2) any action taken to enable or make available to registrants to the new domain or others the technical means to restrict access by minors to material described in paragraph (1). SEC. 105. ENFORCEMENT. (a) Violation.--Any person who violates section 103, or any requirement, registration criteria, or limitation applicable to a registrant to the new domain under section 101(b), shall be subject to such civil penalties as the Secretary of Commerce shall prescribe for purposes of this title. (b) Enforcement.--The Secretary shall have the power to enforce the provisions of this title, including any requirements or limitations applicable to a registrant to the new domain under section 101(b) and the imposition and collection of civil penalties under subsection (a). (c) Periodic Audits.--The Secretary shall conduct periodic audits to ensure compliance with requirements, registration criteria, and limitations applicable to the new domain under this title. SEC. 106. OUTREACH. (a) In General.--The Secretary of Commerce, acting through the National Telecommunications and Information Administration, shall carry out a program to publicize the availability of the new domain under this title. (b) Commencement.--The program under subsection (a) shall commence not later than 30 days after the date that the new domain first becomes operational and accessible by the public. SEC. 107. DEFINITIONS. In this title: (1) ICANN.--The term ``ICANN'' means the Internet Corporation for Assigned Names and Numbers. (2) Material that is harmful to minors.--The term ``material that is harmful to minors'' means any communication, picture, image, graphic image file, article, recording, writing, or other matter of any kind that is obscene, or that a reasonable person would find-- (A) taking the material as a whole and with respect to minors, is designed to appeal to, or is designed to pander to, the prurient interest; (B) depicts, describes, or represents, in a manner patently offensive with respect to minors, an actual or simulated sexual act or sexual contact, an actual or simulated normal or perverted sexual act, or a lewd exhibition of the genitals or post-pubescent female breast; and (C) taking the material as a whole, lacks serious literary, artistic, political, or scientific value for minors. (3) Minor.--The term ``minor'' means any person under 17 years of age. (4) New domain.--The term ``new domain'' means the Internet domain established pursuant to this title. TITLE II--OTHER MATTERS SEC. 201. PROHIBITION ON E-MAIL OF SEXUALLY ORIENTED ADVERTISEMENTS TO MINORS WITHOUT PRESCRIBED MARKS OR NOTICE. (a) In General.--Chapter 71 of title 18, United States Code, is amended by adding at the end the following new section: ``Sec. 1471. E-mail of sexually oriented advertisements to minors ``(a) Prescription of Marks or Notices.-- ``(1) In general.--Not later than 120 days after the date of the enactment of this section, the National Institute of Standards and Technology shall prescribe marks or notices to be included in or affixed to the subject line of any e-mail that contains a sexually oriented advertisement sent to minors. ``(2) Specific requirement.--Marks or notices prescribed under paragraph (1) shall, to the extent possible, be made so that they may not be removed or altered. ``(b) Sending E-Mail Without Mark or Notice.--Whoever in the business of selling sexually oriented products or materials knowingly sends, through an instrumentality in or affecting interstate or foreign commerce, an e-mail that includes a sexually oriented advertisement but does not include a mark or notice prescribed under subsection (a) shall be fined under this title, imprisoned not more than one year, or both. ``(c) Production of Mail Matter Intended for E-Mail to Minors Without Mark or Notice.--Whoever produces, reproduces, or manufactures any sexually related mail matter, intending or knowing that such mail matter will be sent to a minor in an e-mail in violation of subsection (b)-- ``(1), shall be fined under this title, imprisoned not more than 5 years, or both, in the case of an offense which does not occur after another offense under this subsection; and ``(2) shall be fined under this title, imprisoned not more than 10 years, or both, in the case of an offense which occurs after another offense under this subsection. ``(d) Definitions.--In this section: ``(1) Minor.--The term `minor' means any individual who has not yet attained the age of 18 years. ``(2) Sexually oriented advertisement.--The term `sexually oriented advertisement' means any advertisement that depicts, in actual or simulated form, or explicitly describes, in a predominantly sexual context, human genitalia, any act of natural or unnatural sexual intercourse, any act of sadism or masochism, or any other erotic subject directly related to the foregoing, except that material otherwise within the definition of this paragraph shall be deemed not to constitute a sexually oriented advertisement if such material constitutes only a small and insignificant part of the whole, the remainder of which is not primarily devoted to sexual matters. ``(3) Sexually related mail matter.--The term `sexually related mail matter' means any mail matter containing a sexually oriented advertisement.''. (b) Clerical Amendment.--The table of sections at the beginning of chapter 71 of title 18, United States Code, is amended by adding at the end the following new item: ``1471. E-mail of sexually oriented advertisements to minors.''. SEC. 202. PROHIBITION ON VIDEO VOYEURISM. (a) In General.--Chapter 71 of title 18, United States Code, as amended by section 201 of this Act, is further amended by adding at the end the following new section: ``Sec. 1472. Video voyeurism ``(a) In General.--Whoever-- ``(1) uses a camera, videotape, photo-optical, photo- electric, or other image recording device that has been transported, shipped, or received in interstate or foreign commerce to observe, view, photograph, film, or videotape for a lewd or lascivious purpose an image of another person involving actual or simulated vaginal, anal, oral, or manual sexual intercourse, masturbation, any unclothed portion of the female breast below the top of the areola, or any unclothed portion of the anus, vulva, or genitals, without the consent of such other person to such observation, viewing, photographing, filming, or videotaping; or ``(2) uses a camera, videotape, photo-optical, photo- electric, or other image recording device that has been transported, shipped, or received in interstate or foreign commerce to observe, view, photograph, film, or videotape for a lewd or lascivious purpose an image of a person under the age of 18 years involving actual or simulated vaginal, anal, oral, or manual sexual intercourse, masturbation, any unclothed portion of the female breast below the top of the areola, or any unclothed portion of the anus, vulva, or genitals, shall be punished as provided in subsection (d). ``(b) Exceptions.--Subsection (a) shall not in the case of-- ``(1) observation, viewing, photographing, filming, or videotaping for legitimate security purposes, if the material is used only for such purposes; ``(2) observation, viewing, photographing, filming, or videotaping in the course of a legitimate law enforcement or private investigation, if the material is used only for purposes of such investigation; or ``(3) the transfer of an image by-- ``(A) a telecommunications carrier engaged in the provision of a telecommunications service; ``(B) a person engaged in the business of providing an Internet access service; ``(C) a person engaged in the business of providing access to an interactive computer service; or ``(D) any other person engaged in the transmission, storage, retrieval, hosting, formatting, or transmission (or any combination thereof) of a communication made by another person, without selection or alteration of the content of the communication. ``(c) Defense.--It shall be a defense to prosecution under subsection (a)(1) that the observation, viewing, photographing, filming, or videotaping in question was done in a public place where there was no reasonable expectation of privacy. ``(d) Penalties.--The penalty for an offense under subsection (a) is-- ``(1) a fine under this title, imprisonment for not more three years, or both, in the case of an offense under paragraph (1) of that subsection; and ``(2) a fine under this title, imprisonment for not more than ten years, or both, in the case of an offense under paragraph (2) of that subsection. ``(e) Seal or Destruction of Images.--The court may, upon its own motion or the motion of the Attorney General, order the following: ``(1) The seal of any images introduced as evidence in a trial for an offense under this section. ``(2) The destruction of any images held by the United States for purposes of a prosecution under this section in the event of an acquittal, dismissal, plea agreement, or decision not to prosecute. ``(3) The destruction of any images held by the United States for purposes of a prosecution under this section if prosecution is not commenced within the statute of limitations for the offense. ``(4) The destruction of any images introduced as evidence in a trial for an offense under this section that are held by the United States after conviction upon the release of the offender from incarceration for the offense.''. (b) Clerical Amendment.--The table of sections at the beginning of chapter 71 of title 18, United States Code, as amended by section 201(b) of this Act, is further amended by adding at the end the following new item: ``1472. Video voyeurism.''. SEC. 203. SEVERABILITY. If any provision of an amendment made by this title, or the application thereof to any person or circumstances, is held invalid, the remainder of the provisions of the amendments made by this title, and the applications of such provisions to other persons not similarly situated or to other circumstances, shall not be affected thereby. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5229 From: Matthew Paulsen Date: Wed Apr 17, 2002 0:45pm Subject: RE: Re: NannyCAM Monitor It's two separate devices. 1 sniffs, 1 squirts. Messy little toys aren't they. -----Original Message----- From: Lists [mailto:lists@i...] Sent: Wednesday, April 17, 2002 5:26 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Re: NannyCAM Monitor How do you use the video input on a laptop to help sniff out WLANs? All of the tools I am familiar with have no options that work in this way. Kismet, Netstumbler, Airopeek, Sniffer Pro Wireless, etc. Could you clarify what you meant by this? Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5230 From: Matthew Paulsen Date: Fri Apr 19, 2002 3:16am Subject: CNet scorecard on privacy invasion software Saw this on CNet and remembered previous posts. It looks like CNet is trying to make a quick buck off the privacy scare issue - http://catchup.cnet.com/catchup/cu/index/index.html?tag=txt Their website ( ps - this link really is real) http://download.com.com/2001-20-0.html states: "We rate the software designed to make money off your surfing, judging how annoying it is and how much it compromises your privacy. Our scorecard shows the more notorious adware and rates it based on its behavior." That scorecard is located here - http://download.com.com/1200-20-884830.html?tag=sptlt, I put it in the body as well, but frames are lost, but it is space delimited, so have fun with your spreadsheet if you want to cut & paste the table below. " (4/18/02) Adware takes many forms, from the benign free e-mail client that displays ads in its interface to the stealth utility you didn't know you installed that causes browser pop-ups and sends statistics on your Internet usage back to a central server. Our scorecard shows the more notorious adware and rates it based on its behavior. Find out what's on your system by running CNET CatchUp's Adware Detect service or Lavasoft's Ad-aware. Software or company title Install disclosure Displays ads Causes browser pop-ups Tracks usage Collects personal info Still live? Severity Alexa Yes No No Yes Yes Yes 4 Annotate.net Yes Yes No Yes No Yes 2 AOL SmartDownload/ Real RealDownload/ Download Demon Yes Yes No Yes Yes Yes 5 Blackstone Data Transponder\VX2 No Yes Yes Yes Yes Yes 10 Brilliant Digital Entertainment No Yes No Yes Yes Yes 8 Conducent\Timesink No Yes Yes Yes Yes No n/a Creative Labs News Update No Yes No Yes No No n/a Cydoor Yes Yes Yes No No Yes 3 EverAd Yes Yes No No No No n/a Expedioware Yes Yes No No No No n/a eZula TopText/ContextPro/ HOTText Yes Yes No Yes Yes Yes 5 Flyswat/ NBCi QuickClick Yes Yes No Yes No ? 2 FTapp/FlashTrack No Yes Yes Yes Yes Yes 10 Gator OfferCompanion Yes Yes Yes Yes Yes Yes 7 GoHip/InternetFuel Yes Yes Yes Yes Yes Yes 7 Hotbar Yes Yes No Yes Yes Yes 5 Marketscore (Netsetter) Yes No No Yes Yes Yes 4 Mattel BrOdcast Yes Yes No No No Yes 1 Message Mates Yes Yes No Yes Yes Yes 5 NetAngel (Mirazo) Yes Yes No Yes No Yes 2 NewDotNet No No No No No Yes 3 Onflow No No No Yes No Yes 4 Radiate (Aureate) No Yes Yes No No Yes 6 RealJukebox Yes Yes No Yes No Yes 2 SaveNow No Yes Yes Yes Yes Yes 10 SpediaBar Yes Yes No Yes Yes Yes 5 SpeedBit -Download Accelerator Yes Yes No Yes Yes Yes 5 Web3000 No Yes Yes Yes Yes Yes 10 Webhancer Yes No No Yes No Yes 1 WNAD No Yes Yes No No Yes 6 Severity reference No=3 Yes=1 Yes=2 Yes=1 Yes=3 No=n/a Max=10 Category key Install disclosure: Does the application ask permission to be installed? Some adware installs surreptitiously, piggybacking on another installation that you've agreed to. A single mention of the adware in a license for another application isn't enough to consider installation has been disclosed. Displays ads: Does the application display ads somehow? An ad can be a traditional banner or a link to an advertiser site that was not coded into the original Web page being viewed. Causes browser pop-ups: Does the application trigger browser pop-up windows separate from any coded into the site being viewed? Pop-up ads are annoying, especially when you know the site you're on doesn't use them. Tracks usage: Does the application record what sites you visit and what links you click? Usage tracking is nothing new, and many Web sites keep track of internal traffic. But an application on your computer can track usage across multiple sites. Collects personal info: Does the application store your name, e-mail address, IP address, or other personal info? This insidious feature can be devastating to privacy, especially when combined with usage tracking. Many adware companies don't consider IP addresses personal information, but since that address is unique to your computer, we do. Still live: Does the company that the application reports back to still exist? Adware makers tend to be fly-by-night companies that appear and disappear pretty rapidly. The software may still be out there, but if it's reporting back to a server that's been taken offline then it is not much of a threat. " 5231 From: James M. Atkinson Date: Wed Apr 17, 2002 0:42pm Subject: Re: Re: NannyCAM Monitor At 8:26 AM -0400 4/17/02, Lists wrote: >How do you use the video input on a laptop to help sniff out WLANs? > >All of the tools I am familiar with have no options that work in this way. > >Kismet, Netstumbler, Airopeek, Sniffer Pro Wireless, etc. > >Could you clarify what you meant by this? No problem, Bypass the bandpass filters on the secondary IF, and then rework the demodulator circuit so it is performing simple AM detection and not FM demodulation. Then ground out the receiver input, and adjust the black level with reference to a grounded load on the antenna input. Then reconnect the antenna and use the video monitor as a wide-band video display that raster everything from 2.3 to 2.7 GHz. Remove the biasing resistors that set up the varactor, and replace with a slowly changing sin wave or ramp circuit. This way the receiver will scan for you, and will "light up and flash" when you detect something on the 2.4 GHz band... At which time you stop the vehicle, and manually DF for the signal in wide-band mode, then switch in a bandpass filter to tune up the varactor for max signal. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5232 From: Date: Wed Apr 17, 2002 10:59am Subject: CCS Counter Spy Shops Go Public! The CCS Counter Spy Shops Go Public! Real Spy Technology & Spy Toys Go Mainstream NEW YORK--(BUSINESS WIRE)--April 17, 2002--CCS International, Ltd., the parent company of The Counter Spy Shops of Mayfair, London(TM) and operator of www.spyzone.com, became a public company today via a reverse merger with Security Intelligence Technology Group (OTCBB:SITG ). Financial details were not disclosed. CCS and The Counter Spy Shops(TM) manufacture and/or provide state-of-the-art security, surveillance, countersurveillance and counter-measure equipment and/or systems for the private citizen, corporations, law enforcement agencies, NATO member countries' armed forces, the international security marketplace and governments worldwide. The company specializes in anti-bugging, anti-wiretapping, covert video & CCTV, night vision, digital lie-detection, scramblers, encryption systems, bullet-resistant clothing, armored vehicles, GPS and RF tracking, cellular monitoring systems and security seminars. Thomas Felice, chief operating officer and general manager of CCS's Counter Spy Shop retail marketing centers, explained that the decision to become a public company stems from CCS's rapid growth as a result of the new worldwide emphasis on security. Further, he believes that as a public company it will now have the resources to expand it's marketing efforts and distribution network to bring security equipment and personal protection into the mainstream domestic and international markets. He added, "The unfortunate tragedies have literally forced people to rethink their own personal safety and realize that the doorman, gatekeeper, bodygaurd and/or home security system is no longer the final line in personal protection or corporate security. It is literally a new psychological defense posture that Americans are now taking on, worldwide. "We have been thrust forward into a precarious age, where businesses and private citizens are now dealing with information as their most valuable asset, the theft of which could alter their business, livelihood or even their lifestyle. From internal security threats to personal security surrounding terrorism to identity theft, this new unstable climate fosters an obligation and responsibility to safeguard the things in life that one works so hard to achieve, and can assist in explaining why this business may be the right business to be in at the right time to be in it." CCS plans to expand using the additional capital generated by the merger with Security Intelligence Technology Group into franchising additional retail locations, (already located in New York, Washington DC, Miami, Beverly Hills, London, Hong Kong, Mexico City & Israel), bringing security equipment and personal protection into the mainstream American market and enlarging it's research & development to produce and/or provide unique security solutions in the everchanging security marketplace. It also plans to widely market the brand name The Counter Spy Shops(TM) as well as Spyzone.com, the company's corporate Website and catalog. CCS & The Counter Spy Shops(TM) have more than 40 years' experience in the international security field, helping businesses and catering to professionals and lamen alike who demand leading equipment for protection of clients, voice, data and proprietary information. More than just a chain selling James Bond-like gadgets and "boy's toys," the Counter Spy Shops(TM) and it's parent company, CCS International, Ltd., have assisted numerous organizations and events, including the Apollo 11 space mission, Radio Free Europe, major motion picture and television productions (prop, tech and set design), Aston Martin promotions, Fortune 500 Companies concerned about threats to proprietary information, The International Spy Museum, game show prizing and many national and international federal and state government and law enforcement agencies. Safe Harbor Statement Statements in this press release and oral statements that may be made by the Company or by officers, directors or employees of the Company acting on the Company's behalf that are not statements of historical or current fact constitute "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995. Such forward-looking statements involve known and unknown risks, uncertainties and other unknown factors that could cause the actual results of the Company to be materially different from the historical results or from any future results expressed or implied by such forward-looking statements. In addition to statements which explicitly describe such risks and uncertainties, readers are urged to consider statements labeled with the terms "believes," "expects," "intends," "may," "should," or "anticipates" to be uncertain forward-looking statements. The forward looking statements contained herein are also subject generally to other risks and uncertainties that are described from time to time in the Company's reports and registration statements filed with the Securities and Exchange Commission. Interviews, investor & media/press kits available CONTACT: CCS International, Ltd. The Counter Spy Shops Investor and Media Relations: Arielle Jamil, 212/688-8500 cell: 917/449-USPY www.spyzone.com SOURCE: CCS International, Ltd. 5233 From: Lists Date: Fri Apr 19, 2002 9:22am Subject: Re: Re: NannyCAM Monitor Why in the world would you want to go to all of this trouble to locate a WLAN when you could just use Netstumbler with an omni? If the AP was set to closed mode, you could use Kismet. And if all else fails, use a wireless sniffer like Sniffer Pro from NAI that sniffs all WLAN traffic in passive (monitoring) mode. I assume you are referring to a sweep for such devices rather than just abject searching like with wardriving. While I have a little bit of experience on the WLAN side of the house, I do not have any experience on the TSCM side and will defer to your experience. 5234 From: Matthew Paulsen Date: Sat Apr 20, 2002 4:38am Subject: OCIPEP Alert - Terrorist Threat to U.S. Financial Institutions See below. -m ************************************************************************** ********************************************************** THE OFFICE OF CRITICAL INFRASTRUCTURE PROTECTION AND EMERGENCY PREPAREDNESS ************************ INFORMATION NOTE ************************ Number: IN02-004 Date: 19 April 2002 ***************************** Terrorist Threat to U.S. Financial Institutions ***************************** The U.S. Federal Bureau of Investigation has issued a press release indicating that the U.S. Government has received unsubstantiated information that unspecific terrorists are considering physical attacks against American financial institutions in the U.S. Northeast. The full FBI press release can be found at: http://www.fbi.gov/pressrel/pressrel02/banks041802.htm ASSESSMENT OCIPEP has no information regarding similar threats to Canadian financial institutions. Canadian interests in the U.S. could be at risk due to their proximity to potential U.S. targets. CONTACT US For urgent matters or to report any incidents, please contact OCIPEP's Emergency Operations Centre at: Phone: (613) 991-7000 Fax: (613) 996-0995 Secure Fax: (613) 991-7094 Email: opscen@o... For general information, please contact OCIPEP's Communications Division at: Phone: (613) 991-7066 or 1-800-830-3118 Fax: (613) 998-9589 Email: communications@o... Web Site: www.ocipep-bpiepc.gc.ca NOTICE TO READERS Information Notes are used to draw attention to information relating to significant threats and vulnerabilities. Information Notes may contain information not readily available in the public domain. OCIPEP publications are based on information obtained from a variety of sources. The organisation makes every reasonable effort to ensure the accuracy, reliability, completeness and validity of the contents in its publications. However, it cannot guarantee the veracity of the information nor can it assume responsibility or liability for any consequences related to that information. It is recommended that OCIPEP publications be carefully considered within a proper context and in conjunction with information available from other sources, as appropriate. Unauthorized use of computer systems and mischief in relation to data are serious Criminal Code offences in Canada. Upon conviction of an indictable offence, an individual is liable to imprisonment for a term not to exceed ten years. All offences should be reported immediately to your local police service. ================================================== 5235 From: Dave Emery Date: Sat Apr 20, 2002 0:58am Subject: Re: Re: NannyCAM Monitor On Wed, Apr 17, 2002 at 01:42:53PM -0400, James M. Atkinson wrote: > At 8:26 AM -0400 4/17/02, Lists wrote: > >How do you use the video input on a laptop to help sniff out WLANs? > > > >All of the tools I am familiar with have no options that work in this way. > > > >Kismet, Netstumbler, Airopeek, Sniffer Pro Wireless, etc. > > > >Could you clarify what you meant by this? > > > > No problem, > > Bypass the bandpass filters on the secondary IF, and then rework the > demodulator circuit so it is performing simple AM detection and not > FM demodulation. > > Then ground out the receiver input, and adjust the black level with > reference to a grounded load on the antenna input. > > Then reconnect the antenna and use the video monitor as a wide-band > video display that raster everything from 2.3 to 2.7 GHz. > > Remove the biasing resistors that set up the varactor, and replace > with a slowly changing sin wave or ramp circuit. > > This way the receiver will scan for you, and will "light up and > flash" when you detect something on the 2.4 GHz band... At which time > you stop the vehicle, and manually DF for the signal in wide-band > mode, then switch in a bandpass filter to tune up the varactor for > max signal. > > -jma While this would work, just using a fm video receiver as-is works fairly well to detect pulsed broadband signals as patterns (shading and bars) in the salt and pepper snow on the screen, though the band searching would have to be done either manually or with some scheme such as you propose. Anyone who has played with older analog type satellite TV receivers or other tunable microwave video receivers may have noticed this effect from time to time - one can see quite weak signals as subtle shifts in the salt and pepper snow as one tunes across the signal. All of this of course is just a means of creating a crude spectrum analyzer capable of detecting energy and locating its direction, particularly when the signals are weak enough to not be reliably detectable as packets of data using 802.11b modems. > -- > > -------------------------------------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------------------------------- > James M. AtkinsonPh: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com > -------------------------------------------------------------------------------------------------- > "...three shall be the number to count, and the number to be counted shall > be three.....four shall thou not count......five is right out". - M. Python > -------------------------------------------------------------------------------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 5236 From: Fernando Martins Date: Sat Apr 20, 2002 6:20am Subject: RE: Bill would outlaw hidden home video cameras I think that Kid Rock is behind all this new hype about hidden caneras :> FM 5237 From: James M. Atkinson Date: Sat Apr 20, 2002 7:52am Subject: Gov't to Seek Death in Spy Case Gov't to Seek Death in Spy Case Fri Apr 19, 6:29 PM ET By TED BRIDIS, Associated Press Writer WASHINGTON (AP) - Government lawyers told a federal judge Friday they intend to seek the death penalty against a retired Air Force master sergeant accused of trying to spy for Iraq, Libya and China. The government accused Brian Patrick Regan, 39, of creating a "grave risk of death" to U.S. military pilots patrolling the no-fly zone over Iraq. Regan allegedly intended to sell Iraqi president Saddam Hussein secret details about American satellites that could help Iraq hide its anti-aircraft missiles. Regan has pleaded innocent to the charges in federal court. His lawyer, Nina J. Ginsberg, could not be reached Friday despite several messages left at her office. A hearing was set for Monday morning in U.S. District Court in Alexandria, Va. U.S. Attorney Paul J. McNulty accused Regan in court papers of "exceptional planning and premeditation" in plotting his espionage. Prosecutors said Regan apparently used a form letter to solicit money from at least two foreign countries. McNulty also accused Regan of using the threat of the death penalty as a "marketing tool" when he demanded $13 million in Swiss currency from Saddam. Investigators said Regan told Hussein in a letter, "If I am caught, I will be imprisoned for the rest of my life, if not executed for this deed." Authorities said that a debt-ridden Regan hoped to strike a bargain with Saddam, allegedly writing that his payment demand was a "small price" compared with the salaries of movie stars and athletes. Justice Department officials had previously declined to say whether Regan turned over any secret or otherwise classified information to foreign governments, or whether Regan actually delivered the letter he is accused of writing to Saddam. But in court papers filed Friday, McNulty said Regan "actually committed espionage, not just attempted espionage." McNulty cautioned, however, that the evidence of actual espionage the government intends to cite during sentencing may not be admissible during the trial itself. The indictment previously indicated that Regan flew last June to Berlin and possibly Munich before returning to Washington seven days later, and the trip was "not in connection with any official duties." U.S. officials have said Regan worked at the National Reconnaissance Office in Chantilly, Va., a U.S. intelligence agency that designs, builds and operates the nation's vast network of spy satellites. He worked at the NRO from July 1995 ≠ first for the Air Force, then as a defense contractor for TRW Inc. from October 2000 until his arrest last August. Prosecutors said Regan wrote a letter to Saddam sometime between 1999 and 2001 asking for $13 million to provide information about U.S. satellites and other military secrets. They said he offered to send a sample of secrets for $1 million, with additional information to come afterward for $3 million and $5 million payments. "There are many people from movie stars to (athletes) in the U.S. who are receiving tens of millions of dollars a year for their trivial contributions," Regan allegedly wrote, falsely describing himself as a CIA officer near retirement. "If I am going to risk my life and the future of my family, I am going to get paid a fair price." Court records indicated that Regan carried debts of at least $53,000 earlier this year. He told a federal judge in November that he could not afford to hire a lawyer. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5238 From: charly.white Date: Sat Apr 20, 2002 8:30am Subject: Re: Re: NannyCAM Monitor Do they make a scanning type of Video Rec'r? ----- Original Message ----- From: Dave Emery To: James M. Atkinson Cc: TSCM-L@yahoogroups.com Sent: Friday, April 19, 2002 11:58 PM Subject: Re: [TSCM-L] Re: NannyCAM Monitor On Wed, Apr 17, 2002 at 01:42:53PM -0400, James M. Atkinson wrote: > At 8:26 AM -0400 4/17/02, Lists wrote: > >How do you use the video input on a laptop to help sniff out WLANs? > > > >All of the tools I am familiar with have no options that work in this way. > > > >Kismet, Netstumbler, Airopeek, Sniffer Pro Wireless, etc. > > > >Could you clarify what you meant by this? > > > > No problem, > > Bypass the bandpass filters on the secondary IF, and then rework the > demodulator circuit so it is performing simple AM detection and not > FM demodulation. > > Then ground out the receiver input, and adjust the black level with > reference to a grounded load on the antenna input. > > Then reconnect the antenna and use the video monitor as a wide-band > video display that raster everything from 2.3 to 2.7 GHz. > > Remove the biasing resistors that set up the varactor, and replace > with a slowly changing sin wave or ramp circuit. > > This way the receiver will scan for you, and will "light up and > flash" when you detect something on the 2.4 GHz band... At which time > you stop the vehicle, and manually DF for the signal in wide-band > mode, then switch in a bandpass filter to tune up the varactor for > max signal. > > -jma While this would work, just using a fm video receiver as-is works fairly well to detect pulsed broadband signals as patterns (shading and bars) in the salt and pepper snow on the screen, though the band searching would have to be done either manually or with some scheme such as you propose. Anyone who has played with older analog type satellite TV receivers or other tunable microwave video receivers may have noticed this effect from time to time - one can see quite weak signals as subtle shifts in the salt and pepper snow as one tunes across the signal. All of this of course is just a means of creating a crude spectrum analyzer capable of detecting energy and locating its direction, particularly when the signals are weak enough to not be reliably detectable as packets of data using 802.11b modems. > -- > > -------------------------------------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------------------------------- > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > -------------------------------------------------------------------------------------------------- > "...three shall be the number to count, and the number to be counted shall > be three.....four shall thou not count......five is right out". - M. Python > -------------------------------------------------------------------------------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5239 From: Dave Emery Date: Sat Apr 20, 2002 9:19pm Subject: Re: Re: NannyCAM Monitor On Sat, Apr 20, 2002 at 07:30:16AM -0600, charly.white wrote: > Do they make a scanning type of Video Rec'r? The existing cheap video receivers are apparently mostly channelized, but there are several published hacks to create a tunable receiver tuned by a pot by simple modifications to the circuit. There is also a (unauthorized) modification available to the microprocessor in one such receiver to create a digitial scanning receiver by replacing the micro... True scanning with stop on signal detect is not available in any cheap video equipment I have seen (but I am hardly an expert on the market). However, some ex-spook type microwave surveillance receivers do have the ability to scan a frequency range and stop on finding a signal. > ----- Original Message ----- > From: Dave Emery > To: James M. Atkinson > Cc: TSCM-L@yahoogroups.com > Sent: Friday, April 19, 2002 11:58 PM > Subject: Re: [TSCM-L] Re: NannyCAM Monitor > > > On Wed, Apr 17, 2002 at 01:42:53PM -0400, James M. Atkinson wrote: > > At 8:26 AM -0400 4/17/02, Lists wrote: > > >How do you use the video input on a laptop to help sniff out WLANs? > > > > > >All of the tools I am familiar with have no options that work in this way. > > > > > >Kismet, Netstumbler, Airopeek, Sniffer Pro Wireless, etc. > > > > > >Could you clarify what you meant by this? > > > > > > > > No problem, > > > > Bypass the bandpass filters on the secondary IF, and then rework the > > demodulator circuit so it is performing simple AM detection and not > > FM demodulation. > > > > Then ground out the receiver input, and adjust the black level with > > reference to a grounded load on the antenna input. > > > > Then reconnect the antenna and use the video monitor as a wide-band > > video display that raster everything from 2.3 to 2.7 GHz. > > > > Remove the biasing resistors that set up the varactor, and replace > > with a slowly changing sin wave or ramp circuit. > > > > This way the receiver will scan for you, and will "light up and > > flash" when you detect something on the 2.4 GHz band... At which time > > you stop the vehicle, and manually DF for the signal in wide-band > > mode, then switch in a bandpass filter to tune up the varactor for > > max signal. > > > > -jma > > While this would work, just using a fm video receiver as-is > works fairly well to detect pulsed broadband signals as patterns > (shading and bars) in the salt and pepper snow on the screen, though the > band searching would have to be done either manually or with some scheme > such as you propose. > > Anyone who has played with older analog type satellite TV > receivers or other tunable microwave video receivers may have noticed > this effect from time to time - one can see quite weak signals as subtle > shifts in the salt and pepper snow as one tunes across the signal. > > All of this of course is just a means of creating a crude > spectrum analyzer capable of detecting energy and locating its direction, > particularly when the signals are weak enough to not be reliably detectable > as packets of data using 802.11b modems. > > > > > > > -- > > > > -------------------------------------------------------------------------------------------------- > > The First, The Largest, The Most Popular, and The Most Complete TSCM, > > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > > -------------------------------------------------------------------------------------------------- > > James M. Atkinson Ph: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 http://www.tscm.com/ > > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > > -------------------------------------------------------------------------------------------------- > > "...three shall be the number to count, and the number to be counted shall > > be three.....four shall thou not count......five is right out". - M. Python > > -------------------------------------------------------------------------------------------------- > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > -- > Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. > PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 5240 From: Justin T. Fanning Date: Sun Apr 21, 2002 8:43am Subject: Re: Re: NannyCAM Monitor Dave Emery wrote: Dave, what a charming Email you have "die@d..." > On Sat, Apr 20, 2002 at 07:30:16AM -0600, charly.white wrote: >> Do they make a scanning type of Video Rec'r? > The existing cheap video receivers are apparently mostly > channelized, but there are several published hacks to create a > tunable receiver tuned by a pot by simple modifications to the > circuit. There is also a (unauthorized) modification available to > the microprocessor in one such receiver to create a digitial > scanning receiver by replacing the micro... Unauthorized in what sense, warranty, copyright or law? > True scanning with stop on signal detect is not available in > any cheap video equipment I have seen (but I am hardly an expert on > the market). However, some ex-spook type microwave surveillance > receivers do have the ability to scan a frequency range and stop on > finding a signal. I posted a message last year on Icom's handheld with 2" screen the ICOM IC-R3. JMA & several list members said the unit was poor, though I believe it offered AM/FM video scanning ability up to 2.45 Ghz (from my message 24 Jun 2001 & no I don't have any interests in Icom) | Icom has a new hand held receiver (2.4W x 4.7H x 1.3D in) with a | built in 2" video screen, covering up to 2.45 Ghz. All your normal | receiver features plus, AM & FM TV (NTSC M, PAL B or PAL G systems). | To quote Icom, they are aiming at the ..."Experimenting with | wireless video" market. | http://www.icomamerica.com/receivers/handheld/icr3main.html Kind Regards, JF 5241 From: James M. Atkinson Date: Sun Apr 21, 2002 8:57am Subject: Re: Re: NannyCAM Monitor I have personally developed a number of different mods for the receivers including adding both a pot, extending the frequency coverage, beefing up the AGC, and adding a sweep circuit that stops when a video or raster carrier is detected. Check the group archives for details. -jma At 10:19 PM -0400 4/20/02, Dave Emery wrote: >On Sat, Apr 20, 2002 at 07:30:16AM -0600, charly.white wrote: >> Do they make a scanning type of Video Rec'r? > > >The existing cheap video receivers are apparently mostly >channelized, but there are several published hacks to create a tunable >receiver tuned by a pot by simple modifications to the circuit. There >is also a (unauthorized) modification available to the microprocessor in >one such receiver to create a digitial scanning receiver by replacing >the micro... > >True scanning with stop on signal detect is not available in any >cheap video equipment I have seen (but I am hardly an expert on the >market). However, some ex-spook type microwave surveillance receivers do >have the ability to scan a frequency range and stop on finding a signal. > > > > >> ----- Original Message ----- >> From: Dave Emery >> To: James M. Atkinson >> Cc: TSCM-L@yahoogroups.com >> Sent: Friday, April 19, 2002 11:58 PM >> Subject: Re: [TSCM-L] Re: NannyCAM Monitor >> >> >> On Wed, Apr 17, 2002 at 01:42:53PM -0400, James M. Atkinson wrote: >> > At 8:26 AM -0400 4/17/02, Lists wrote: >> > >How do you use the video input on a laptop to help sniff out WLANs? >> > > >> > >All of the tools I am familiar with have no options that work >>in this way. >> > > >> > >Kismet, Netstumbler, Airopeek, Sniffer Pro Wireless, etc. >> > > >> > >Could you clarify what you meant by this? >> > >> > >> > >> > No problem, >> > >> > Bypass the bandpass filters on the secondary IF, and then rework the >> > demodulator circuit so it is performing simple AM detection and not >> > FM demodulation. >> > >> > Then ground out the receiver input, and adjust the black level with >> > reference to a grounded load on the antenna input. >> > >> > Then reconnect the antenna and use the video monitor as a wide-band >> > video display that raster everything from 2.3 to 2.7 GHz. >> > >> > Remove the biasing resistors that set up the varactor, and replace >> > with a slowly changing sin wave or ramp circuit. >> > >> > This way the receiver will scan for you, and will "light up and >> > flash" when you detect something on the 2.4 GHz band... At which time >> > you stop the vehicle, and manually DF for the signal in wide-band >> > mode, then switch in a bandpass filter to tune up the varactor for >> > max signal. >> > >> > -jma >> >> While this would work, just using a fm video receiver as-is >> works fairly well to detect pulsed broadband signals as patterns >> (shading and bars) in the salt and pepper snow on the screen, though the >> band searching would have to be done either manually or with some scheme >> such as you propose. >> >> Anyone who has played with older analog type satellite TV >> receivers or other tunable microwave video receivers may have noticed >> this effect from time to time - one can see quite weak signals as subtle >> shifts in the salt and pepper snow as one tunes across the signal. >> >> All of this of course is just a means of creating a crude >> spectrum analyzer capable of detecting energy and locating its direction, >> particularly when the signals are weak enough to not be reliably >>detectable >> as packets of data using 802.11b modems. >> >> >> >> >> >> > -- >> > >> > >>-------------------------------------------------------------------------------------------------- > > > The First, The Largest, The Most Popular, and The Most Complete TSCM, >> > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. >> > >>-------------------------------------------------------------------------------------------------- >> > James M. Atkinson Ph: (978) 381-9111 > > > Granite Island Group Fax: >> > 127 Eastern Avenue #291 http://www.tscm.com/ >> > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com >> > >>-------------------------------------------------------------------------------------------------- >> > "...three shall be the number to count, and the number to be >>counted shall >> > be three.....four shall thou not count......five is right >>out". - M. Python >> > >>-------------------------------------------------------------------------------------------------- >> > >> > >> > ======================================================== >> > TSCM-L Technical Security Mailing List >> > "In a multitude of counselors there is strength" >> > >> > To subscribe to the TSCM-L mailing list visit: >> > http://www.yahoogroups.com/community/TSCM-L >> > >> > It is by caffeine alone I set my mind in motion. >> > It is by the juice of Star Bucks that thoughts acquire speed, >> > the hands acquire shaking, the shaking is a warning. >> > It is by caffeine alone I set my mind in motion. >> > =================================================== TSKS >> > >> > Your use of Yahoo! Groups is subject to >>http://docs.yahoo.com/info/terms/ >> > >> >> -- >> Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. >> PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 >>BD B0 24 88 C3 18 >> >> >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== TSKS >> >> Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. >> >> >> >> [Non-text portions of this message have been removed] >> >> >> >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >>http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== TSKS >> >> Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ >> > >-- >Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. >PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 >24 88 C3 18 > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5242 From: George Shaw Date: Sun Apr 21, 2002 6:28am Subject: RE: Re: NannyCAM Monitor Maplin in UK sell a Video receiver (part of a Tx/Rx pair) that will scan several channels (those that are normally used for 2.4 video) plug it into the Video in on a laptop and attach a external antenna. It will lift any 2.4 activity in the area. Total cost ($80) George Shaw Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... 5243 From: smartoldwolf Date: Sun Apr 21, 2002 0:13pm Subject: CE232 Does anyone have a copy of Bill Cheeks software for his CE232 ? There was another program made by his friend for it but I've been told that it too is no longer available anywhere, so I'm also looking for a copy of that. Finally, has anyone fully utilized all the extra features that Bill secretly built into the CE232 before he died a few years ago? Some were secret DA channels. Thanks, Smartoldwolf 5244 From: Secdep Date: Sun Apr 21, 2002 0:56pm Subject: Spies & taxmen stoke tobacco war - South Africa Spies and taxmen stoke tobacco war http://www.suntimes.co.za/2002/04/21/news/news08.asp A small South African cigarette manufacturer accuses multinational group of using tax authorities in its bid to conduct 'industrial espionage'. JESSICA BEZUIDENHOUT A SMALL company has won an extraordinary court order to raid the offices of South Africa's leading tobacco firm, as well as the headquarters of the tax authorities. Three High Court judges ordered the Johannesburg, Durban and Cape Town premises of British American Tobacco, the SA Revenue Services and two private investigating firms to be raided. The SARS raid took place 24 hours after simultaneous in-camera applications were granted on April 9. Apollo Tobacco, a local cigarette manufacturer and distributor, claimed Batsa had used SARS in its bid to conduct "industrial espionage" and sabotage the company. Apollo also said the giant multinational firm, which controls 90% of the SA tobacco market, hired private detectives and used bugging devices to conduct industrial spying activity. But Batsa, whose parent company, Bat Plc, merged with the tobacco interests of SA's Rembrandt empire two years ago, denies it wanted to undermine its fledgling rival, saying its actions were aimed at bringing alleged illegal activity to the attention of authorities. Apollo introduced a new cigarette brand, Exclusive, to the market 20 months ago and holds a licence to distribute Batsa products, including Dunhill, Peter Stuyvesant, Benson & Hedges and Winfield. It also distributes Batsa's value brand, Royal. Apollo owner Hendrik Delport took Batsa to court when he found out that it had employed a team of private investigators to collect confidential information about him and his company. Delport won the rare court order - an Anton Piller - which allowed him to raid Batsa and SARS without having to notify them in advance, as he feared documents would be destroyed. The cases were heard within hours of each other at the three courts and interim orders were granted for the raids on Batsa, SARS and two private investigating firms. In court papers, Delport claims Batsa collected information from its investigators, sometimes in the presence of SARS officials. He claimed SARS was withholding about R15-million in VAT returns from him on the basis of the information Batsa's investigators had obtained illegally. In his affidavit, Delport said Batsa employed the investigators to: Plant bugging devices at his various business premises; Hand illegally obtained information to SARS; Obtain a client list of his company under the pretext that they were SARS officials; Track aircraft transporting his goods between SA and warehouses in Zimbabwe; and Arrange for SARS inspectors to be present when Batsa security personnel were debriefed by the investigators on various occasions. Batsa, in a statement to the Sunday Times on Friday, said it had a standing agreement with SARS that it would forward any allegations or suspicious of illegal activity in the cigarette market. Private investigator Petrus Casparus Snyders, in an affidavit before the judges, said he and his colleagues planted listening devices with the approval of Batsa representatives. Phones were bugged for up to two months. He said it was also agreed in meetings with Batsa that Delport and his agents were to be monitored. "There were at least three instances where Batsa representatives ordered us to follow the distributors. Such observations lasted between one and two weeks." Information was forwarded to the investigating firm, where it was processed before being forwarded to Batsa, Snyders said. He was initially under the impression that he was investigating alleged illegal activity on the part of Delport or his company. "I later realised that Batsa was using us to conduct industrial espionage and sabotage and that Batsa, for this purpose, had also used the SARS." Batsa has until May 14 to inform the court of its intention to defend the action and to show why the order should not be made final. --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za * The information contained within this message is confidential and is legally privileged. It is intended solely for the addressee(s). Access to this message by anyone other than the addressee(s) is unauthorised. If you are not the intended recipient, any disclosure, copying, distribution, or action taken or omitted in reliance on it is prohibited and may be unlawful. While all reasonable steps are taken to ensure the accuracy and the integrity of information, date transmitted electronically and to preserve the confidentiality thereof, no liability or responsibility whatsoever is accepted by us, should information or data for whatever reason or cause be corrupted or fail to reach it's intended destination. [Non-text portions of this message have been removed] 5245 From: Dave Emery Date: Sun Apr 21, 2002 2:16pm Subject: Re: Re: NannyCAM Monitor On Sun, Apr 21, 2002 at 02:43:45PM +0100, Justin T. Fanning wrote: > > Dave Emery wrote: > > Dave, what a charming Email you have "die@d..." > I really do own the domain die.com (my initials are David I. Emery). Comes from being on the net since 1984... and (get this) the gateway machine for die.com is pig.die.com so my gateway email is die@p.... (And yes I am a very tame cypherpunk radical libertarian in my politics - and a child of the 60s who was very much around during the anti-Vietnam war student protests). > > On Sat, Apr 20, 2002 at 07:30:16AM -0600, charly.white wrote: > >> Do they make a scanning type of Video Rec'r? > > > The existing cheap video receivers are apparently mostly > > channelized, but there are several published hacks to create a > > tunable receiver tuned by a pot by simple modifications to the > > circuit. There is also a (unauthorized) modification available to > > the microprocessor in one such receiver to create a digitial > > scanning receiver by replacing the micro... > > Unauthorized in what sense, warranty, copyright or law? My information is limited, but as I understand it this is an individual who reverse engineered the firmware for a PIC controlled video receiver and rewrote it to provide scanning and tuning in small steps (1 mhz or so) from 2.3 to 2.7 ghz. As far as the legalities go, I suppose this violates FCC type approval/certification if such is required (certainly is for the transmit side). And it may or may not violate copyright or enforceable software license terms. I don't know of any specific privacy laws violated. And I am pretty sure it voids the warranty ;:> Certain modifications such as this are quite legal for ham radio purposes - the law is much stricter about modifying general consumer electronics than modifying anything used for ham purposes. And there is a ham allocation in this frequency range .... But I am pretty sure that the modification is UNAUTHORIZED as far as the manufacturer is concerned.... I very much doubt that they would regard someone rewriting the firmware in their product as creating an Authorized modification. > I posted a message last year on Icom's handheld with 2" screen the > ICOM IC-R3. JMA & several list members said the unit was poor, though > I believe it offered AM/FM video scanning ability up to 2.45 Ghz > (from my message 24 Jun 2001 & no I don't have any interests in Icom) My understanding is that the ICOM unit was deliberately castrated so it only receives FM video in certain bands and not all the way from DC to 2.45 ghz. What bands are included is not clear from the information I have seen. Nobody seems to like the ICOM, and I see them on Ebay real cheap.... > > | Icom has a new hand held receiver (2.4W x 4.7H x 1.3D in) with a > | built in 2" video screen, covering up to 2.45 Ghz. All your normal > | receiver features plus, AM & FM TV (NTSC M, PAL B or PAL G systems). > | To quote Icom, they are aiming at the ..."Experimenting with > | wireless video" market. > > | http://www.icomamerica.com/receivers/handheld/icr3main.html -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 5246 From: James M. Atkinson Date: Mon Apr 22, 2002 8:22pm Subject: THE COMPLEAT SPY: TRADECRAFT http://www.converge.org.nz/abc/spycraft.htm THE COMPLEAT SPY: TRADECRAFT This is an extract from Richard Tomlinson's book, "The Big Breach: From Top Secret To Maximum Security", which was extensively serialised in the UK Sunday Times, in January 2001. Tomlinson has been familiar to Peace Researcher readers for the past few years (see previous issues). He is the New Zealand-born former MI6 agent (MI6 is Britain's foreign spy agency) who got sacked, spat the dummy (he loved being a spy, and was pissed off at being sacked. There was no noble principle motivating him). To shut him up, he was imprisoned in Britain and then hounded, persecuted, injuncted, locked up, bashed up and kicked out of more countries (including the gutless land of his birth) than he'd had hot dinners. Eventually his book was published in Russia (where else?) and proved a great hit in Britain. He still continues to generate much current media coverage in NZ (for example, see Listener, 12/5/01; "007's lament: The spy who wants to come in from the cold", Mark Revington). Tradecraft means the practical skills that enable a spy to communicate with an agent without arousing the suspicion of counterintelligence. An intelligence officer cannot go to a clandestine meeting with an informer without first ensuring that he or she is not being followed. This "dry-cleaning" involves an innocuous cover activity such as a shopping trip on a planned route that contains "surveillance traps". Another tradecraft technique, the "dead letter box", involves hiding a message to be picked up by the other party. On a training exercise, James Barking chose a high-level toilet cistern in the gents in the Mr Pickwick pub in Portsmouth. A former Army officer called Andy Mare, picking up the message, had to climb up on the toilet seat to reach it - causing the enraged gentleman in the next cubicle to call the police. Unable to explain the truth, Mare admitted to cottaging (unknown UK slang, but the meaning seems clear. Ed.). He was fortunate to be let off with a caution. Secret Writing (SW) still plays a role in spying. There is a three-man joint *MI5/MI6 section known as TS/SW, which is responsible for research and training. The method now used ubiquitously by MI6 officers in the field is miraculously simple. Like many great inventions, it was discovered by accident. * MI5 - British internal spy agency. The problem with early invisible inks was that the writer could not see what he had just written. The solution came in the mid-1980s, when a technician was developing a SW message written on the back of an envelope posted from Moscow. As the technician swabbed it with developing fluid, the secret writing began to emerge. But other writing, in a different hand and mirror-written, also started to develop. There was only one explanation. In the post box, the envelope must have pressed against another addressed with a commercial ink possessing the invisible chemical. If the pen responsible could be identified, it would be a simple and deniable SW implement that would allow an agent or officer to see what he was writing before taking an "offset" copy. MI6 mounted a worldwide search. Every MI6 station was asked to buy every make of pen available. The magic pen turned out to be the Pentel Rollerball. This is now used routinely by MI6 officers. Clandestine communication systems were the responsibility of TOS/AC (Technical and Operations Support, Agent Comms). Their gadgets are virtually indistinguishable from commercially available equipment. Pettle recorders were particularly ingenious. Any normal audio cassette has two tracks running parallel to each other, one for each "side" of the cassette. Pettle recorders exploited the unused part of the magnetic tape between the two strips. TOS/AC also demonstrated modified laptop computers. The removable floppy disks used in ordinary computers have a hidden space which is just big enough to hide a simple word-processing system and file retrieval system. Watch Out For Garfield We also learnt how to use SRAC (Short Range Agent Communication). The agent writes a message on a laptop computer, then downloads it into the SRAC transmitter, the size of a cigarette packet. A receiver, usually in the British embassy, sends out a low-power interrogation signal that triggers the transmitter when the agent is close enough. For many years "Garfield the Cat" toys were popular with agents as their sucker feet allowed an agent to stick the transmitter on the side window of a car, giving a clear signal driving past the embassy. The lecturers also taught us how to mount bugging operations, although this is not the job of the IB. TOS/AC has about 100 officers trained as locksmiths, clandestine entry specialists, sound engineers, electricians. Dell, our chief trainer, gave us an exercise in which we had to imagine that the Irish Republican Army had acquired a safe house that was to be used to plan a bombing campaign. We had to draw up a detailed portfolio of the house, its layout, its occupants, their movements, then recommend how and when the house should be entered to place covert listening devices. Each of us was to reconnoitre a different house in Gosport owned by an innocent member of the public. "You can do whatever you want," said Dell. "Just don't get caught." I borrowed a covert shoulder bag-mounted camera from the photographic laboratories and photographed my target, a medium- sized home in a small garden. A visit to Gosport Town Hall yielded a copy of the electoral roll, giving the names of the occupants. Posing as an architectural student, I looked at the plans of the house in the building regulations department and covertly photographed them. The best place for the listening device would be in the kitchen, where the family socialised. But more detailed information was needed. One evening I jogged round to the house and found that it was empty. I climbed a fence and scuttled the few metres to the back of the house. There was silence, so I peered through the window and sketched the kitchen layout in a notebook. I noticed a key in the door. I turned it and pushed the door open. My intrusion was illegal, but in the euphoria of the Ionec (meaning unknown. Ed.) it seemed justified. Dell rewarded my efforts with full marks. Although the core activity of MI6 is agent running, its charter, known as the Order Book, requires it to maintain a capability to plan and mount Special Operations of a quasi-military nature. MI6 officers set the objectives of the operation and obtain clearance for it from the foreign secretary. Thereafter the operation is executed by specially trained officers and men from the three branches of the armed forces. The RAF provides a small detachment of about 10 pilots known as the "S&D flight". They operate a Hercules C-130 transport aircraft and a Puma helicopter, are trained on many other military aircraft and also have commercial pilot's licences. The Army provides an Special Air Service (SAS) detachment called Revolutionary Warfare Wing, and the Navy provides a small detachment from its Special Boat Service (SBS). Both are known collectively within MI6 as the "Increment". SAS and SBS personnel learn how to use improvised explosives and sabotage techniques and advanced VIP protection skills. They study guerrilla warfare organisation, and advanced insertion techniques are practised, including high-altitude parachuting from commercial aircraft or covert landings from submarines. The SBS Increment also operates MI6's mini-submarine. This is about the length of two cars; the pilot and navigator sit astride the cylindrical forward hull. The rear half of the craft flattens into a passenger compartment to carry four persons, packed together like sardines. The mini-sub is used for infiltrating specialist agents into a hostile country and for exfiltrating compromised agents. Another specialist cadre occasionally participates in operations. These 20 or so men and women, known collectively as UKN, encompass a diverse range of specialist skills. A small core who are on call full-time draw a modest salary from MI6. The rest work unpaid and take time off from their real jobs. Their core skill is surveillance and countersurveillance. Other skills are diverse; one is an air-taxi pilot who is prepared to drop everything to help out in an MI6 operation. Another is a yachtmaster who provides his boat when required. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5247 From: Hawkspirit Date: Tue Apr 23, 2002 0:55am Subject: Re: NannyCAM Monitor For similar reasons after I could not find anyone who had schematics for the wavcom video receivers I had them drawn into schematics so I could optimize their performance in just such an application. Roger My information is limited, but as I understand it this is an individual who reverse engineered the firmware for a PIC controlled video receiver and rewrote it to provide scanning and tuning in small steps (1 mhz or so) from 2.3 to 2.7 ghz. As far as the legalities go, I suppose this violates FCC type approval/certification if such is required (certainly is for the transmit side). And it may or may not violate copyright or enforceable software license terms. I don't know of any specific privacy laws violated. And I am pretty sure it voids the warranty ;:> 5248 From: D.A.Linsky Date: Tue Apr 23, 2002 11:49am Subject: news release SSC, Inc. News Release-22-April-2002 ________________________________________________________________________ SSC,Inc. Appoints Michael Priore Sr. V.P. of Investigations Division Hartford- April 22, 2002 -SSC, Inc. a leading investigations and security consulting firm, today announced that Michael Priore has been appointed Senior Vice President of the firms Investigative division. SSC, Inc. conducts a variety of investigative, consulting, computer security and forensic assignments for corporations and institutions throughout the northeast corridor. Priore, who joined SSC, Inc. has previously held positions in the private sector managing investigations for one of the nation's top insurance companies and has been a Senior Executive with the United States Justice Department. Mr. Priore has more than 25 years experience managing complex and sophisticated criminal investigations and has extensive global experience. Mr. Priore is an expert in translating investigative challenges into solutions with quantifiable results. A resident of the Hartford area, Priore is a graduate of Antioch University, School of Law and the state University of New York. SSC, Inc's Investigations Division serves corporate, individual and manufacturing businesses throughout the northeast, offering a full range of asset protection and investigative solutions SSC's investigative offerings include personal and corporate security, litigation support, and forensic examination of computers, insurance fraud investigation, internal surveys, and undercover operations, due diligence, business intelligence and pre-employment backgrounds. Contact: SSC, Inc. Bridgeport. David A. Linsky President 203-333-1707 dlinsky@s... **************************************************************************** "The truth is incontrovertible. Malice may attack it. Ignorance may deride it. But in the end, there it is. " - Winston Churchill [Non-text portions of this message have been removed] 5249 From: Steve Uhrig Date: Tue Apr 23, 2002 0:24pm Subject: Re: THE COMPLEAT SPY: TRADECRAFT On 22 Apr 2002 at 21:22, James M. Atkinson wrote: > Another tradecraft technique, the "dead letter box", involves hiding a > message to be picked up by the other party. This is not ancient history. Dead letter boxes still are very much in use. Here: http://swssec.com/jpegs/Minoxstuph/MinoxDLB.jpg is a Dead Letter Box designed for one cassette of Minox film. If necessary, only about 1/3 the space would actually be needed for the film, if unprocessed. If processed, perhaps only 1/10th. Minox film is not microfilm although it is fairly small. Processed Minox negatives were concealed behind a glass eye in one real life instance. As a size reference, the Minox 'coffin' could hide behind your thumb. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5250 From: Date: Tue Apr 23, 2002 1:07pm Subject: These Nets Have Security Holes Safeguards: Hackers can easily break into many networks. Experts advise the use of common sense. By CHARLES PILLER TIMES STAFF WRITER April 18 2002 They call it "war driving." Hackers plug an antenna into a laptop computer, jump into a car, and then the fun begins. They easily break into wireless computer networks, which often spew unencrypted information into the airwaves for anyone to pick up. "There are two kinds of people doing wireless security assessments in Silicon Valley: people like me, and the 19-year-old kids who do it for sport," said Jonas Luster, president of D-fensive Networks Inc., a Campbell, Calif., security consulting firm. During a recent security audit in a Silicon Valley parking lot, Luster's electronic "sniffer" detected 169 wireless networks using the most popular standard, known as "Wi-Fi." Just six had any form of security. The experience with Wi-Fi is just the tip of the iceberg. The coming of so-called 3G wireless networks, which will allow cell phones and hand-held computers to access the Internet at high speeds, is creating a new realm of vulnerabilities. Though wireless networks differ in their strengths and vulnerabilities, none escapes the fact that they transmit information through the air and are designed to traverse the infamously insecure expanses of the Internet. Despite such concerns, the push for wireless convenience, mobility and commerce is racing ahead. Last year, about 7.5 million devices were sold that connect personal computers, laptops and hand-held computers to Wi-Fi networks, which dominate the home and business markets, according to market research firm Allied Business Intelligence. Research firm EMarketer Inc. forecasts that by 2004, 63 million people in the U.S. will be connecting to the Internet by using cell phones or personal digital assistants. Businesspeople use Wi-Fi to view documents from distant conference rooms. Forklift drivers use wireless hand-helds to monitor inventory in warehouses. Shoppers browse Amazon.com or answer e-mail over wireless links while sipping a cafe latte at Starbucks. The coffee chain has equipped hundreds of outlets with Wi-Fi, and many other restaurants and airports have done likewise. That mobility comes at a price. During an audit for a Silicon Valley company, "we picked up signals from a nearby hospital," Luster said. "It was a large amount of patient data, completely in clear text," meaning the information was not scrambled or encrypted. "We approached this hospital, and I offered to [plug the gap] for free," he said. The hospital refused to talk to him, Luster said. "It would have been an admission of a problem, and people don't want to do that," he said. On another occasion, he stumbled across a Nevada casino that was broadcasting unencrypted details of its security operations. Call it the "if I can't see it, it can't hurt me" effect. Computer-savvy businesses take at least basic steps to protect wired networks, such as using anti-virus programs and installing software "firewalls" to block hackers. Yet unwired vigilance is rare. Wi-Fi security is among the most leaky in the wireless world, and because its nodes often connect to standard networks, they can expose all manner of company secrets. The root of the problem, experts said, is the same one that has plagued standard computer networks for decades. Wi-Fi was designed for convenience and economy, not security. Default Wi-Fi security settings are next to useless. Few users bother to learn about advanced settings for wired equivalent privacy, or WEP, which is built into Wi-Fi devices. Manufacturers don't ship products with the most secure settings turned on because that causes conflicts with Wi-Fi products from other vendors. WEP is meant to encrypt data traveling over the airwaves and patch holes in company networks through wireless access points, or hubs. But even when set up properly, WEP provides weak protection on both fronts. Hacking software called AirSnort and WEPCrack, freely available online, allow even inexperienced hackers to obtain WEP's encryption "key" to unscramble airborne text. Ease of use has led to another big problem: "rogue" access points. A multitude of technically savvy but careless employees set up ad hoc wireless connections to their company networks. "Companies say, 'We don't need wireless security because we don't have a wireless network,'" said Christopher W. Klaus, chief technology officer of Internet Security Systems Inc., an Atlanta-based security company. "But just sniffing around their office, we find four or five access points." Large businesses can install virtual private networks, which block hackers fairly reliably. But that solution can be prohibitively costly and complex. Experts advise common sense: Turn on WEP to deter casual eavesdroppers, and shut down rogue hubs. They also urge caution in setting up authorized hubs. Wi-Fi is meant to broadcast only 150 feet, effectively within one building. But if hubs are set inside windows on the building's periphery--where no walls impede signal strength--networks become open to remote hackers, Klaus said. He has picked up Wi-Fi signals six miles from a network access point. Bad guys do the same, using a popular hacking tool, a Pringles potato chip can, as the antenna. Ultimately, Wi-Fi security should improve as new standards upgrade WEP over the next couple of years. The first of these, called 802.1x, will be finalized within a couple of months. It changes the WEP encryption keys about every five minutes, rendering common hacking tools ineffective. As consumers adopt high-speed 3G cellular phones, they may want to consider Wi-Fi's cautionary tale. The 3G networks will fix voice encryption problems that make many of today's cell phones easy to tap. But 3G mobile commerce will require interaction with Web sites and networks whose security may not be so reliable. Such glitches have plagued PC-based e-commerce from its inception. "3G services will all be insecure," said Bruce Schneier, a cryptographer and chief technology officer of Counterpane Internet Security Inc. in Cupertino, Calif. "We'll be patching it up as we go." \ http://www.latimes.com/technology/la-000027532apr18.story If you want other stories on this topic, search the Archives at latimes.com/archives. For information about reprinting this article, go to www.lats.com/rights. 5251 From: intothemirror Date: Wed Apr 24, 2002 4:53pm Subject: Re: Gov't to Seek Death in Spy Case Robert P. Hanssen has been called one of the most dangerous double agents in history, and will face sentencing next month for 15 counts of espionage against the United States government. He narrowly avoided a death penalty case. Hanssen's double life was more far- reaching than selling secrets to the Soviets. This double life extended to his marriage, his sex life and even his religion. Into The Mirror: The Life of Master Spy Robert P. Hanssen is the upcoming book from New York Times best-selling author Lawrence Schiller. The book, based on an investigation by Lawrence Schiller and Norman Mailer, will be available in stores and online on April 30, 2002 from HarperCollins. Into The Mirror: The Life of Master Spy Robert P. Hanssen is embargoed, but here are early excerpts of the text for you to read and review, if you'd like: Espionage: http://www.electricartists.com/itm/intothemirror-espionage.pdf Infidelity: http://www.electricartists.com/itm/intothemirror-infidelity.pdf Catholicism: http://www.electricartists.com/itm/intothemirror-catholicism.pdf Sex & Drugs: http://www.electricartists.com/itm/intothemirror-sexanddrugs.pdf Kinky: http://www.electricartists.com/itm/intothemirror-kinky.pdf Lawrence Schiller's past work includes Perfect Murder, Perfect Town: The Uncensored Story of the JonBenet Murder and the Grand Jury's Search for the Final Truth, American Tragedy: The Uncensored Story of the Simpson Defense, as well as partnering with Norman Mailer on The Executioner's Song. Enjoy -- and I look forward to hearing your thoughts on Into The Mirror! Best, Melissa intothemirror @ yahoo.com --- In TSCM-L@y..., "James M. Atkinson" wrote: > > Gov't to Seek Death in Spy Case > > Fri Apr 19, 6:29 PM ET > > By TED BRIDIS, Associated Press Writer > > WASHINGTON (AP) - Government lawyers told a federal judge Friday they > intend to seek the death penalty against a retired Air Force master > sergeant accused of trying to spy for Iraq, Libya and China. > > > The government accused Brian Patrick Regan, 39, of creating a "grave > risk of death" to U.S. military pilots patrolling the no-fly zone > over Iraq. Regan allegedly intended to sell Iraqi president Saddam > Hussein secret details about American satellites that could help Iraq > hide its anti-aircraft missiles. > > Regan has pleaded innocent to the charges in federal court. His > lawyer, Nina J. Ginsberg, could not be reached Friday despite several > messages left at her office. A hearing was set for Monday morning in > U.S. District Court in Alexandria, Va. > > U.S. Attorney Paul J. McNulty accused Regan in court papers > of "exceptional planning and premeditation" in plotting his > espionage. Prosecutors said Regan apparently used a form letter to > solicit money from at least two foreign countries. > > McNulty also accused Regan of using the threat of the death penalty > as a "marketing tool" when he demanded $13 million in Swiss currency > from Saddam. Investigators said Regan told Hussein in a letter, "If I > am caught, I will be imprisoned for the rest of my life, if not > executed for this deed." > > Authorities said that a debt-ridden Regan hoped to strike a bargain > with Saddam, allegedly writing that his payment demand was a "small > price" compared with the salaries of movie stars and athletes. > > Justice Department officials had previously declined to say whether > Regan turned over any secret or otherwise classified information to > foreign governments, or whether Regan actually delivered the letter > he is accused of writing to Saddam. > > But in court papers filed Friday, McNulty said Regan "actually > committed espionage, not just attempted espionage." McNulty > cautioned, however, that the evidence of actual espionage the > government intends to cite during sentencing may not be admissible > during the trial itself. > > The indictment previously indicated that Regan flew last June to > Berlin and possibly Munich before returning to Washington seven days > later, and the trip was "not in connection with any official duties." > > U.S. officials have said Regan worked at the National Reconnaissance > Office in Chantilly, Va., a U.S. intelligence agency that designs, > builds and operates the nation's vast network of spy satellites. He > worked at the NRO from July 1995 ≠ first for the Air Force, then as a > defense contractor for TRW Inc. from October 2000 until his arrest > last August. > > Prosecutors said Regan wrote a letter to Saddam sometime between 1999 > and 2001 asking for $13 million to provide information about U.S. > satellites and other military secrets. They said he offered to send a > sample of secrets for $1 million, with additional information to come > afterward for $3 million and $5 million payments. > > "There are many people from movie stars to (athletes) in the U.S. who > are receiving tens of millions of dollars a year for their trivial > contributions," Regan allegedly wrote, falsely describing himself as > a CIA officer near retirement. "If I am going to risk my life and the > future of my family, I am going to get paid a fair price." > > Court records indicated that Regan carried debts of at least $53,000 > earlier this year. He told a federal judge in November that he could > not afford to hire a lawyer. > > -- > > -------------------------------------------------------------------- ------------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------- ------------------------------ > James M. Atkinson Ph: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com > -------------------------------------------------------------------- ------------------------------ > "...three shall be the number to count, and the number to be counted shall > be three.....four shall thou not count......five is right out". - M. Python > ------------------------------------------------------------------ -------------------------------- 5252 From: James M. Atkinson Date: Thu Apr 25, 2002 7:22am Subject: Spy networks being rebuilt for terror war Spy networks being rebuilt for terror war Head of military intelligence calls for 'more aggressive, offensive attitude.' By Ann Scott Tyson | Special correspondent of The Christian Science Monitor April 24, 2002 WASHINGTON - Flooded with more than 60,000 applications since Sept. 11, the Central Intelligence Agency and its Pentagon counterpart are beefing up the ranks of spies - reversing a decade of cutbacks to hire hundreds of new recruits - from Arabic speakers to counterterrorism experts. The CIA plans to increase the number of "case officers" who work for the agency's clandestine side - the Directorate of Operations - by 30 percent over the next five years. Already, since September, it has doubled the manpower of its counterterrorism center. The Pentagon is also enlarging its corps of covert intelligence officers who specialize in gathering military secrets. "We want to both expand and enhance our capabilities to go after tough targets," says Vice Admiral Thomas Wilson, who heads the Pentagon's intelligence effort and directs one of its largest wings: the Defense Intelligence Agency (DIA). "We have a rush of people interested in applying for jobs in the intelligence community - it's true across the board," he said in an interview. The buildup reflects a dramatic shift of emphasis for the US intelligence community - from an imperfect, warnings-based approach to the terrorist threat to a more robust, wartime offense, senior officials say. "The big change for us is not only being concerned about warning and defending, but how we put together the intelligence necessary to attack worldwide," says Admiral Wilson, adding that future warning failures may be inevitable. "On the collection side, a more aggressive, offensive attitude is important." No overnight fix Yet critics say the intelligence shortfalls symbolized by the successful Sept. 11 attacks are symptomatic of deep, longstanding deficiencies in the clandestine networks of the CIA and DIA, and improving their capabilities will require more than a quick fix of new bodies and funds. Agents need both exhaustive training and support to pursue difficult and obscure targets for the long haul. After the end of the cold war, US human-intelligence capability - "HUMINT" in spy talk - atrophied. Since 1991, the CIA's manpower has fallen 20 percent, while the Pentagon's intelligence workforce has shrunk 33 percent, from roughly 24,000 posts to 16,000. "From 1991 to 1998, we virtually ceased hiring," says CIA spokesman Tom Crispell. The Pentagon downsized its HUMINT services and consolidated them under DIA in 1995. The move divorced the agents from their role of supporting warfighters and "depleted morale," says a senior DIA official whose identity is protected. At the CIA, critics say a diminished Directorate of Operations grew risk-averse and complacent, with some operatives filling quotas by recruiting worthless field agents. The agency operated "less like a hard-core intelligence organization and more like a back-channel State Department," writes Bruce Berkowitz, a government intelligence consultant and former CIA analyst. "HUMINT is very important. It's something we ignored," says one defense-intelligence official. Meanwhile, agencies made dramatic technological leaps in gathering and sharing intelligence, but these advances often overshadowed and outpaced the work of spies and analysts. Over the past decade, the quantity of data collected by satellites and spy planes has surged. Moreover, the Pentagon has installed an elaborate information-network - including secure online links for thousands of intelligence officials and users - and a videoconferencing system connecting hundreds of officials from the Secretary of Defense down to soldiers in the field. The system allows for real-time sharing of maps, photos, and other data, so disparate officials can collaborate on targeting, battle damage assessment, and other analysis. Deficiencies before Sept. 11 Yet, while more information is moving more places faster, progress in understanding it has lagged behind. Analysts are "stretched too thin" to mine it, Wilson says. As a result, the US spy service was ill-prepared to counter an array of new, unconventional threats, including terrorism. In Jan. 2001, for example, an official probe of the Oct. 2000 bombing of the USS Cole in Yemen concluded that Pentagon intelligence priorities had shifted from the cold war to emerging threats "only at the margins." Today, with the overall US intelligence budget expected to rise 7 percent in fiscal year 2002, the CIA and DIA are bolstering their ranks, poring over hundreds of new online applications a week to find Americans with everything from obscure language skills to chemistry backgrounds and MBAs. Scores of ex-CIA veterans are back, Mr. Crispell says. Yet nurturing skilled agents requires years of mentoring, and the CIA's more aggressive approach, while welcome, is already leading to mishaps in the field, says Robert Baer, a veteran Middle East operative who worked at the CIA until 1997. "The CIA is taking many more risks now," he says. "A lot of people are going out and making mistakes and being sent back to Washington." So far, calls to centralize US intelligence-gathering by placing three Defense Department agencies under the director of Central Intelligence have been resisted by top Pentagon officials, who say more intelligence sources are better. Says Wilson: "I don't see any need for a big reorganization." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] From: A Grudko Date: Thu Apr 19, 2001 4:59am Subject: Re: Humor; Lawyer / Witness ----- Original Message ----- From: Robert G. Ferrell > Anyone know the best way to get spewed coffee out of a keyboard? One late night after a long day I spilled half a glass of white wine right into my keyboard. Three seconds later my PC went berserk to the point that I had to pull the big plug. I spent the next hour and a half dissassembling my keyboard, attacking it's innards with tissue paper and the reassembling it. Don't forget, I do not have a left hand, so this was a tricky operation and I was sure I'd have to buy a new keyboard. But I was amazed that it actually worked first time booted, and still works 3 months later. Now, if I could just work out how to get the pizza out of my Scanlock......... Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom - "When you need it done right - first time" 2943 From: Dawn Star Date: Thu Apr 19, 2001 11:53am Subject: Tektronix TDR parts I just took apart my Tektronix 1503 TDR chart recorder to replace the motor drive belt and when I called Tektronix to order the part they told me they will no longer carry parts for this unit. That includes chart paper. Does anyone know of a source for parts for this unit or perhaps a independent repair company that services Tektronix that may have a secondary parts source. Roger Tolces Electronic Security, Los Angeles 2944 From: Miguel Puchol Date: Thu Apr 19, 2001 5:09pm Subject: RE: Tektronix TDR parts Dawn, Sometimes spares like these are no longer made by the original manufacturer, but in the case of drive belts you can usually find an equivalent from a VCR repair specialist (unless it's a special gear-toothed one). Just another option. A couple of weeks ago, a Compaq laptop that we use for some older MS-DOS programs (that won't run on anything faster than a 486 or slow Pentium), failed. The flat ribbon cable that attaches the main PCB to the LCD screen had broken due to fatigue, and when we opened the case, we found a label specifiying the exact Compaq part # to use as a replacement. Call to Compaq, answer "we don't carry that spare anymore" - the PC is about 6 years old. Solution: solder, pad to pad, the 18-ish tracks between the main PCB and the LCD with thin gauge wire. Tells you something about trusting 'serious' manufacturers. All the best, Mike > -----Mensaje original----- > De: Dawn Star [mailto:bratkid@e...] > Enviado el: jueves, 19 de abril de 2001 18:53 > Para: TSCM-L@yahoogroups.com > Asunto: [TSCM-L] Tektronix TDR parts > > > I just took apart my Tektronix 1503 TDR chart recorder to replace > the motor > drive belt and when I called Tektronix to order the part they > told me they > will no longer carry parts for this unit. That includes chart paper. Does > anyone know of a source for parts for this unit or perhaps a independent > repair company that services Tektronix that may have a secondary > parts source. > Roger Tolces > Electronic > Security, Los Angeles > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 2945 From: Guy Urbina Date: Thu Apr 19, 2001 0:03pm Subject: RE: Tektronix TDR parts Hi Roger, I was in the same situation with my 1502. Tektronix doesn't support their old TDR's. What I did is I bought a spare non-working 1502 off of ebay and I am saving it for spare parts for the future. Check this link: http://www.sphere.bc.ca/ This outfit has a large inventory of used Tek instruments, I purchased a new CRT for my 1502 and they did a real good job of packing it. Their engineer, Walter, I believe his name is, he is very knowledgeable. They might have some chart paper or a spare chart recorder, you can check it out. best regards, -Guy -----Original Message----- From: Dawn Star [mailto:bratkid@e...] Sent: Thursday, April 19, 2001 9:53 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Tektronix TDR parts I just took apart my Tektronix 1503 TDR chart recorder to replace the motor drive belt and when I called Tektronix to order the part they told me they will no longer carry parts for this unit. That includes chart paper. Does anyone know of a source for parts for this unit or perhaps a independent repair company that services Tektronix that may have a secondary parts source. Roger Tolces Electronic Security, Los Angeles 2946 From: Steve Uhrig Date: Thu Apr 19, 2001 7:41pm Subject: Re: Tektronix TDR parts Once upon a midnight dreary, Dawn Star pondered, weak and weary: > I just took apart my Tektronix 1503 TDR chart recorder to replace > the motor drive belt and when I called Tektronix to order the > part they told me they will no longer carry parts for this unit. > That includes chart paper. Does anyone know of a source for parts > for this unit or perhaps a independent repair company that > services Tektronix that may have a secondary parts source. Hi Roger, Try MCM Electronics. www.mcm.com or something similar. They stock belts for VCRs as well as universal belt kits. One of them would probably fit. As for chart paper, most of it is relatively universal although it may not be preprinted with graph lines. I buy OSCOR chart recorder paper from Quill, the mail order office supply company. www.quill.com. Both MCM and Quill are excellent vendors, BTW. Couldn't ask for more polite, efficient people. You also might try some of the used test equipment places and see if they have any wrecked units you could cannibalize for parts. Also post to some of the appropriate test equipment newsgroups. You might well find a dead one you could salvage the whole chart recorder from. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2947 From: James M. Atkinson, Comm-Eng Date: Fri Apr 20, 2001 11:26am Subject: Advice To Give Your Daughters Advice To Give Your Daughters 1. Don't imagine you can change a man, unless he's in diapers. 2. What do you do if your boyfriend walks out? You shut the door. 3. If they put a man on the moon, they should be able to put them all up there. 4. Never let your man's mind wander, it's too little to be out alone. 5. Go for younger men. You might as well, they never mature anyway. 6. Men are all the same, they just have different faces, so that you can tell them apart. 7. Definition of a bachelor; a man who has missed the opportunity to make some woman miserable. 8. Women don't make fools of men, most of them are the do it yourself types. 9. Best way to get a man to do something is to suggest they are too old for it. 10. Love is blind, but marriage is a real eye-opener. 11. If you want a committed man, look in a mental hospital. 12. The children of Israel wandered around the desert for 40 years. Even in biblical times, men wouldn't ask for directions. 13. If he asks what sort of books you're interested in, tell him checkbooks. 14. Remember a sense of humor does not mean that you tell him jokes, it means that you laugh at his. 15. Sadly, all men are created equal. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2948 From: James M. Atkinson, Comm-Eng Date: Fri Apr 20, 2001 11:28am Subject: The New Serenity Prayer The New Serenity Prayer Grant me the serenity to accept the things I cannot change, the courage to change the things I cannot accept, and the wisdom to hide the bodies of those people I had to kill today because they pissed me off. And also, help me to be careful of the toes I step on today as they be connected to the butt that I may have to kiss tomorrow. Help me to always give 100% at work... 12% on Monday. 23% on Tuesday. 40% on Wednesday. 20% on Thursday. 5% on Friday. And help me to remember...When I'm having a really bad day, and it seems that people are trying to piss me off, that it takes 42 muscles to frown and only 4...to extend my middle finger and tell them to bite me! Amen. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2949 From: Dawn Star Date: Fri Apr 20, 2001 11:32am Subject: Tektronix TDR parts From: "Miguel Puchol" Subject: RE: Tektronix TDR parts Dawn, Sometimes spares like these are no longer made by the original manufacturer, but in the case of drive belts you can usually find an equivalent from a VCR repair specialist (unless it's a special gear-toothed one). Just another option. Yes it is a rubber/plastic gear tooth belt, any other sources for this type of belt? Thanks, Roger Tolces 2950 From: Miguel Puchol Date: Fri Apr 20, 2001 3:35pm Subject: RE: Tektronix TDR parts Roger, The tooth belt is harder to find, you need to know the exact tooth pitch, belt width and length, etc. It could be easier to find another set of pulleys that fit a standard rubber belt, with circular or vee section, and with a higher tension than the tooth version. This way you can compensate the loss of traction from the belt. Good luck, Mike > -----Mensaje original----- > De: Dawn Star [mailto:bratkid@e...] > Enviado el: viernes, 20 de abril de 2001 18:33 > Para: TSCM-L@yahoogroups.com > Asunto: [TSCM-L] Tektronix TDR parts > > > From: "Miguel Puchol" > Subject: RE: Tektronix TDR parts > Dawn, > Sometimes spares like these are no longer made by the original > manufacturer, > but in the case of drive belts you can usually find an equivalent > from a VCR > repair specialist (unless it's a special gear-toothed one). Just another > option. > > Yes it is a rubber/plastic gear tooth belt, any other sources for > this type > of belt? > > Thanks, Roger Tolces > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 2951 From: Elliott & Associates, Ltd. Date: Fri Apr 20, 2001 3:48pm Subject: Virus Alert for list members Hi group, First off I need to apologize as I may have transmitted a computer virus to various members of the group. I was notified by Roger Tolces and took immediate steps to clean the disk. I need to take a moment of your time to alert you to a fairly new computer virus first seen about April 11 in New Zealand. The virus has various names: Backdoor-NK.svr BradTrans (F-Secure) I-Worm.Badtrans(AVP) W32.Badtrans.13312@mm (NAV) I received it the other day in an email attachment. When I attempted to download the attachment (hamster.ZIP.scr) I received a message reading "install error" "File data corrupt: probably due to bad data transmission or bad disk access" I was later informed by the sender that he had not sent any attachments and the email was probably a computer virus. I was not too concerned as the attachment had not been downloaded, WRONG. It had been downloaded and when I went to reboot my computer the virus went to work. Please update your virus scans and do a probe before you reboot your computers. For those of you without a virus scan here is an address for details on what to look for in your computer http://vil.nai.com/vil/dispVirus.asp?virus_k=99069 Also the other day I again received a copy of snowwhite from some place in the Cayman Islands. This is also a computer virus, but most virus detectors will spot this. Thanks, Bill Elliott, CII ELLIOTT & ASSOCIATES, Ltd. (GMT -7) http://www.prvt-eye.com 2952 From: Jay Coote Date: Fri Apr 20, 2001 5:39pm Subject: 1502/3 YT-1 chart recorder info This may help the person looking for paper rolls and parts for their Tek 1502 or 1503 TDR. Tektronics' model for the chart recorder in my TDR is a YT-1S. I had a look inside, and my YT-1S appears to have been made by someone for Tek. The label inside reads: Astro-Med, Inc 600 E. Greenwich Ave West Warwick, RI 02893 401-828-2000 Maybe tracking down this company will provide better results than Tektronics... for paper rolls or parts. J. 2953 From: Jim Conrad Date: Sat Apr 21, 2001 1:02pm Subject: Multiple Radio Audio Panel Rackmount Hi you are building or want to upgrade a communications monitoring station or van you need one of these; http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=1231200404 Used by the US Army at they COMINT centers. <:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:> Jim Conrad - jjc@o... or jimc1790@a... (backup) 757-560-5970 Office/Voicemail/Pager - 757-587-8251 Fax CAGE 0UD60 - http://www.oceanviewcom.com/ 2954 From: James M. Atkinson, Comm-Eng Date: Sun Apr 22, 2001 9:06am Subject: Spy Bugs Found at British Defense Ministry Spy Bugs Found at British Defense Ministry http://www.europeaninternet.com/russia/news.php3?id=384570 LONDON, Apr 22, 2001 -- (Agence France Presse) About 30 electronic listening devices have been found at the British defense ministry headquarters here, the Sunday Times reported. The newspaper said the bugs were probably planted by visitors such as overseas journalists working for foreign intelligence services, adding that the Russians were the most likely culprits. A defense ministry spokesman refused to confirm or deny the reports of the find, but said: "We always remain vigilant in these areas. We are confident with our security procedures." The Sunday Times said that the existence of some of the listening devices was uncovered during refurbishment work and that ministry staff had subsequently been ordered to be on their guard. ((c) 2001 Agence France Presse) -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2955 From: James M. Atkinson, Comm-Eng Date: Sun Apr 22, 2001 9:09am Subject: Listening in: bugs have been discovered at the MoD headquarters April 22 2001 BRITAIN Listening in: bugs have been discovered at the MoD headquarters Spy bugs found in Whitehall http://www.sunday-times.co.uk/news/pages/sti/2001/04/22/stinwenws02022.html? James Clark, Home Affairs Correspondent A typical bug ABOUT 30 electronic listening bugs have been found in Ministry of Defence (MoD) buildings, including its Whitehall headquarters in London. The devices are understood to have been hidden in offices, including rooms used by intelligence staff, within the past 10 years. They were uncovered during recent refurbishment work, having remained in place despite regular sweeps by security staff. Visitors such as builders and foreign journalists, many of them working for foreign intelligence agencies, are believed to have planted them in walls, ventilation systems and other hiding places. Despite the end of the cold war, the Russians are the most likely culprits. The disclosure has prompted warnings to MoD staff to be vigilant. They have been told they are still being targeted by foreign intelligence agencies and must not drop their guard. The scale of the bugging was revealed at a lecture for senior MoD staff on electronic security. It was given by an expert from RAF Digby in Lincolnshire, which is linked to GCHQ, the government's eavesdropping centre in Cheltenham. According to ministry sources, some devices had been bought from specialist firms. Others were custom-made, possibly by foreign intelligence services. Most were battery operated and capable of transmitting for at least a month. Two of the bugs were found at Turnstile House, an MoD building in London where electronics experts designed surveillance devices used for covert operations by intelligence agents. The bugs were discovered by workmen renovating the property after it was sold by the MoD to developers. The company which carried out the refurbishment said last week that it had been told not to say anything about the find. An unspecified number of devices was also found at MoD headquarters in Whitehall where ministers, chiefs of staff and about 3,000 staff are based. The offices sit above a secret underground nerve centre from which operations around the world can be directed. Last week a senior MoD source said: "There have certainly been finds, mostly during work to modernise the building. We are a prime target and from time to time we accept that things will get in. It's why we spend so much time and money making sure we can find them." None of the bugs was in the most sensitive areas of the building. The sixth-floor offices of senior officials and ministers have in-built equipment which sweeps constantly for the radio signals and magnetic pulses that are emitted by listening devices. The offices cannot be entered without security clearance. Security elsewhere in the building is less tight. Visitors' bags are searched at entrances, but workmen and foreign journalists with valid credentials are admitted. Although electronic sweep teams tour the building, it can be more than a month between visits. Visitors are not swept with hand-held devices that could detect bugs - a practice used at the headquarters of MI5 and MI6. One of the most recent finds came during an MoD sweep of a room at the Royal College of Surgeons, which was being used for a meeting between MoD procurement staff and a British defence company. The MoD rents such rooms for business meetings because of the poor state of its headquarters. Details of the find, made last year, were passed to MI5. The MoD's head of security refused last week to confirm or deny that agents had managed to plant the devices. A spokesman said the MoD would not comment on specific security issues, but kept its procedures under permanent review: "We have rigorous security procedures and we update them constantly." Defence sources suspect that Russians planted the bugs. Only three weeks ago Tony Blair complained to President Vladimir Putin about aggressive spying. Putin, a former head of the now-defunct KGB, recently told senior Russian intelligence officers to get back to work, promising that they would be crucial to "the development of the new Russia". The disclosures raise the question of whether the bugs were missed. One explanation may be that they were active for only a few days. Most bugs are placed for a specific purpose at a set time because of the difficulty of having to lurk nearby to receive the signal. The haul is not thought to include long-term bugs which can be wired into the electric mains and operate for years. Geoff Hoon, the defence secretary, said he was unaware of the finds, adding that he was not routinely informed of security incidents unless there was a known breach of secrets. "I will certainly be asking about this," he said. "I am confident that we do not have a problem." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2956 From: Steve Weinert Date: Sun Apr 22, 2001 6:36am Subject: Spy bugs found in Whitehall (UK) http://www.sunday- times.co.uk/news/pages/sti/2001/04/22/stinwenws02022.html Spy bugs found in Whitehall James Clark, Home Affairs Correspondent A typical bug ABOUT 30 electronic listening bugs have been found in Ministry of Defence (MoD) buildings, including its Whitehall headquarters in London. The devices are understood to have been hidden in offices, including rooms used by intelligence staff, within the past 10 years. They were uncovered during recent refurbishment work, having remained in place despite regular sweeps by security staff. Visitors such as builders and foreign journalists, many of them working for foreign intelligence agencies, are believed to have planted them in walls, ventilation systems and other hiding places. Despite the end of the cold war, the Russians are the most likely culprits. The disclosure has prompted warnings to MoD staff to be vigilant. They have been told they are still being targeted by foreign intelligence agencies and must not drop their guard. The scale of the bugging was revealed at a lecture for senior MoD staff on electronic security. It was given by an expert from RAF Digby in Lincolnshire, which is linked to GCHQ, the government's eavesdropping centre in Cheltenham. According to ministry sources, some devices had been bought from specialist firms. Others were custom-made, possibly by foreign intelligence services. Most were batteryoperated and capable of transmitting for at least a month. Two of the bugs were found at Turnstile House, an MoD building in London where electronics experts designed surveillance devices used for covert operations by intelligence agents. The bugs were discovered by workmen renovating the property after it was sold by the MoD to developers. The company which carried out the refurbishment said last week that it had been told not to say anything about the find. An unspecified number of devices was also found at MoD headquarters in Whitehall where ministers, chiefs of staff and about 3,000 staff are based. The offices sit above a secret underground nerve centre from which operations around the world can be directed. Last week a senior MoD source said: "There have certainly been finds, mostly during work to modernise the building. We are a prime target and from time to time we accept that things will get in. It's why we spend so much time and money making sure we can find them." None of the bugs was in the most sensitive areas of the building. The sixth-floor offices of senior officials and ministers have in-built equipment which sweeps constantly for the radio signals and magnetic pulses that are emitted by listening devices. The offices cannot be entered without security clearance. Security elsewhere in the building is less tight. Visitors' bags are searched at entrances, but workmen and foreign journalists with valid credentials are admitted. Although electronic sweep teams tour the building, it can be more than a month between visits. Visitors are not swept with hand-held devices that could detect bugs - a practice used at the headquarters of MI5 and MI6. One of the most recent finds came during an MoD sweep of a room at the Royal College of Surgeons, which was being used for a meeting between MoD procurement staff and a British defence company. The MoD rents such rooms for business meetings because of the poor state of its headquarters. Details of the find, made last year, were passed to MI5. The MoD's head of security refused last week to confirm or deny that agents had managed to plant the devices. A spokesman said the MoD would not comment on specific security issues, but kept its procedures under permanent review: "We have rigorous security procedures and we update them constantly." Defence sources suspect that Russians planted the bugs. Only three weeks ago Tony Blair complained to President Vladimir Putin about aggressive spying. Putin, a former head of the now-defunct KGB, recently told senior Russian intelligence officers to get back to work, promising that they would be crucial to "the development of the new Russia". The disclosures raise the question of whether the bugs were missed. One explanation may be that they were active for only a few days. Most bugs are placed for a specific purpose at a set time because of the difficulty of having to lurk nearby to receive the signal. The haul is not thought to include long-term bugs which can be wired into the electric mains and operate for years. Geoff Hoon, the defence secretary, said he was unaware of the finds, adding that he was not routinely informed of security incidents unless there was a known breach of secrets. "I will certainly be asking about this," he said. "I am confident that we do not have a problem." 2957 From: James M. Atkinson, Comm-Eng Date: Sun Apr 22, 2001 11:35am Subject: Re: Listening in: bugs have been discovered at the MoD headquarters See inserted comments: At 10:09 AM -0400 4/22/01, James M. Atkinson, Comm-Eng wrote: >April 22 2001 BRITAIN > >Listening in: bugs have been discovered at the MoD headquarters > >Spy bugs found in Whitehall > >http://www.sunday-times.co.uk/news/pages/sti/2001/04/22/stinwenws02022.html? > >James Clark, Home Affairs Correspondent > >A typical bug > >ABOUT 30 electronic listening bugs have been found in Ministry of Defence >(MoD) buildings, including its Whitehall headquarters in London. Big surprise... the methods used by the British government to find bugs and and wiretaps have long been flawed and ineffective. To this day they still refuse to put on the grubbies and crawl around on their hands and knees or clammer though false ceilings. Of course they give it a boat load of lip service, but when it comes right down to it they have problems finding even simple spy shop devices. >The devices are understood to have been hidden in offices, including rooms >used by intelligence staff, within the past 10 years. They were uncovered >during recent refurbishment work, having remained in place despite regular >sweeps by security staff. So let's see... they were found by construction crews when they opened up a wall. It should be interesting to see what the U.S. State Department will find when they redecorate "mahogany row" or the DOE NN offices. >Visitors such as builders and foreign journalists, many of them working for >foreign intelligence agencies, are believed to have planted them in walls, >ventilation systems and other hiding places. Despite the end of the cold >war, the Russians are the most likely culprits. Oh heavens, let's blame it all on the Russian, of course why would ANYBODY other then the Russian want to Spy on the British. In reality every nation spies on every other nation. Since when is a "foreign journalist" going to be given enough time ALONE in a classified area to open up a wall cavity and hardwire a listening device. The investigators (who are known to be on this list) should be focusing on their own people, and not those outside of the agency. A device that is hardwired in any fashion requires time, and escorted journalists simply would not have enough time. A BUILDER or construction worker on the other hand would have more then enough time, as would a network administrator, electrician, plumber, carpet installer, painter, or even a janitor. >The disclosure has prompted warnings to MoD staff to be vigilant. They have >been told they are still being targeted by foreign intelligence agencies and >must not drop their guard. Right... vigilant after the fact... like that is going to do any good. Reality is that "if you have, handle, or have access to classified information your WILL BE TARGETED by an intelligence activity, period". Any other mind-set is sheer naivety and insanity. >The scale of the bugging was revealed at a lecture for senior MoD staff on >electronic security. It was given by an expert from RAF Digby in >Lincolnshire, which is linked to GCHQ, the government's eavesdropping centre >in Cheltenham. Ten bugs is by no means "large scale"... but why is GCHQ mucking around in the issue? they are hardly the people to look at the issue objectively. >According to ministry sources, some devices had been bought from specialist >firms. Others were custom-made, possibly by foreign intelligence services. >Most were battery operated and capable of transmitting for at least a month. Yes, and in all likelihood they were all easy to detect is a properly trained person had taken the time to look for them (but then of course a graduate of Oxford can get their hands dirty when hunting for bugs) >Two of the bugs were found at Turnstile House, an MoD building in London >where electronics experts designed surveillance devices used for covert >operations by intelligence agents. What? only two? they obviously didn't check properly. >The bugs were discovered by workmen renovating the property after it was >sold by the MoD to developers. The company which carried out the >refurbishment said last week that it had been told not to say anything about >the find. Again... construction workers.... hmm, could this be a clue that TSCM people should pay more attention to construction skills as well as electronics skills? >An unspecified number of devices was also found at MoD headquarters in >Whitehall where ministers, chiefs of staff and about 3,000 staff are based. >The offices sit above a secret underground nerve centre from which >operations around the world can be directed. The "unspecified number" is probably several hundred if the construction people found them, but only three if a TSCM team ferreted them out. >Last week a senior MoD source said: "There have certainly been finds, mostly >during work to modernise the building. We are a prime target and from time >to time we accept that things will get in. It's why we spend so much time >and money making sure we can find them." Note: "... mostly during work to modernise the building...." This screams that their TSCM people have some issues they need to deal with. >None of the bugs was in the most sensitive areas of the building. The >sixth-floor offices of senior officials and ministers have in-built >equipment which sweeps constantly for the radio signals and magnetic pulses >that are emitted by listening devices. The offices cannot be entered without >security clearance. Security elsewhere in the building is less tight. >Visitors' bags are searched at entrances, but workmen and foreign >journalists with valid credentials are admitted. Ah, but someone CAN gain access to other parts of the building and introduce listening devices into secure areas from the non-secure areas. Also, permanently installed TSCM equipment is only of marginal value, and I would point out that it obviously did not detect the bugs elsewhere in the building. >Although electronic sweep teams tour the building, it can be more than a >month between visits. Visitors are not swept with hand-held devices that >could detect bugs - a practice used at the headquarters of MI5 and MI6. It probably would have been more helpful if the "electronic sweep teams" did more then just "tour" the building and actually performed a proper sweep. >One of the most recent finds came during an MoD sweep of a room at the Royal >College of Surgeons, which was being used for a meeting between MoD >procurement staff and a British defence company. The MoD rents such rooms >for business meetings because of the poor state of its headquarters. Details >of the find, made last year, were passed to MI5. What... they actually expected a leased area to be secure? >The MoD's head of security refused last week to confirm or deny that agents >had managed to plant the devices. A spokesman said the MoD would not comment >on specific security issues, but kept its procedures under permanent review: >"We have rigorous security procedures and we update them constantly." The comment about "updating them constantly" must mean they just change the date periodically as British TSCM has changed little in 25 years. >Defence sources suspect that Russians planted the bugs. Only three weeks ago >Tony Blair complained to President Vladimir Putin about aggressive spying. >Putin, a former head of the now-defunct KGB, recently told senior Russian >intelligence officers to get back to work, promising that they would be >crucial to "the development of the new Russia". But of course the French, Swiss, Italian, US, Chinese, Japanese, etc government would never consider bugging a UK facility, heavens forbid. >The disclosures raise the question of whether the bugs were missed. One >explanation may be that they were active for only a few days. Most bugs are >placed for a specific purpose at a set time because of the difficulty of >having to lurk nearby to receive the signal. The haul is not thought to >include long-term bugs which can be wired into the electric mains and >operate for years. The Brits are finding about one bug for every 75+ The bugs would be detectable by a competent TSCMer even if the batteries are shot or it is in a dormant state. >Geoff Hoon, the defence secretary, said he was unaware of the finds, adding >that he was not routinely informed of security incidents unless there was a >known breach of secrets. "I will certainly be asking about this," he said. >"I am confident that we do not have a problem." > One hand has no idea what the other hand is up to. Please excuse me fro a moments while I make some very loud, and very rude noises towards Whitehall: PPPPHHHHTTTTT -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2958 From: Mike F Date: Sun Apr 22, 2001 3:40pm Subject: cOMPUTER fORENSICS COMPUTER FORENSICS:tracking down the clues http://www.scmagazine.com/scmagazine/2001_04/cover/cover.html FORENSIC SOFTWARE RATED http://www.scmagazine.com/scmagazine/2001_04/testc/testc.html mAIN pAGE http://www.scmagazine.com/scmagazine/2001_04/main.html Later 4,Mike Fiorentino Master Links 4 Master Investigators http://ml4mi.com "CONFIDENTIALITY WARNING" <==== BE AWARE This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by theindividual(s)or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of thismessage/information is prohibited. If you are not the indicated recipientor havereceived this message in error contact our offices immediately for instructions." --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.250 / Virus Database: 123 - Release Date: 4/18/01 2959 From: James M. Atkinson, Comm-Eng Date: Sun Apr 22, 2001 4:03pm Subject: Report: FBI knew of mole suspicions 2 years ago April 22, 2001, 10:12AM Report: FBI knew of mole suspicions 2 years ago http://www.chron.com/cs/CDA/story.hts/nation/885555 By JAMES RISEN and DAVID JOHNSTON New York Times WASHINGTON -- Two years before the arrest of a veteran FBI agent accused of spying for Russia, a senior investigator at the FBI concluded in a still-classified report that Moscow might have recruited a mole in the bureau's ranks, current and former bureau officials say. In early 1999, FBI Director Louis Freeh was told by Thomas Kimmel, the investigator, about his findings. In response, the officials said, senior bureau officials convinced Freeh that Kimmel's reasoning was flawed, and investigators focused their hunt for a mole at the CIA, not the bureau. But with the arrest in February of the bureau agent Robert P. Hanssen on charges of spying for Moscow, Kimmel's suspicions proved correct. In the aftermath of Hanssen's arrest, Kimmel's findings, which have not been previously disclosed, have emerged as a warning within the bureau. The warning first came even as the bureau's spy hunters were searching in the wrong place. Since the arrest, the bureau and its director have been criticized for failing to detect the betrayal within the agency's ranks for so long. The case has forced senior bureau officials to re-examine their performance in their search for a mole. And, in a series of recent interviews to discuss their actions, they provided new insights into the investigative effort that ultimately led to Hanssen. Hanssen, a 25-year FBI veteran and counterintelligence expert, was arrested in a Virginia park on Feb. 18, after the government said he left a package of secret documents for his Russian handlers at an agreed-upon spot, known as a dead drop site. The government said he handed over some of the nation's most closely guarded secrets to the Russians, including the existence of a tunnel burrowed under the Russian Embassy in Washington. The government has charged that Hanssen began to spy for Moscow in October 1985, about five months after a CIA officer, Aldrich H. Ames, offered his services as a spy for the Soviet Union. Yet Hanssen eluded investigators for another seven years after Ames' arrest in 1994. Kimmel said in an interview that he had never warned Freeh or other bureau officials that he suspected that Hanssen was a spy. "I wasn't saying that I knew there was a mole in the FBI," Kimmel said. "I was saying, in effect, you can't rule out that possibility. I thought it was more of a possibility than they did. They were saying that we think the focus of our investigative efforts should be on the CIA." Yet Kimmel said he did believe strongly that the evidence was persuasive enough to have prompted an intensive counterintelligence examination of bureau operations. Neal Gallagher, the bureau's assistant director for national security who has jurisdiction over all counterintelligence investigations, said in an interview that Kimmel's belief that there was a spy in the FBI was "a gut instinct," not a well-reasoned position. Gallagher said that Kimmel never provided substantive evidence or investigative leads to support his assertion. "There was nothing there that we could use for investigative purposes to open a case," he said. At the time, he added, bureau officials had considered the possibility of a mole within the senior ranks of the FBI, but discounted it because the strongest available evidence indicated that there was a spy at the CIA. John Collingwood, an FBI spokesman, said that Kimmel's ideas were taken seriously. He said that Freeh asked Kimmel "to organize his thoughts and provide them" to the bureau's National Security Division. "At Freeh's instruction," Collingwood said, "experienced senior counterintelligence experts analyzed Tom's hypothesis and concluded his observations were already explained and his hunches being pursued in other ongoing investigations within the intelligence community." Publicly, after Ames was sentenced to life in prison in 1994, Freeh and his advisers celebrated their success. But privately, they were unsettled by new intelligence showing that it was highly likely there were more Russian spies in the U.S. intelligence bureaucracy, the officials said. The information came in bits and pieces from several Russian agents. But when taken together, the evidence led the spy hunters to suspect that there were at least two more moles. One was believed to have burrowed into the CIA; another was thought to be at the FBI. The reports seemed to confirm the growing suspicions among U.S. counterintelligence experts that Ames could not have been responsible for all of the losses that U.S. intelligence had suffered, since he did not have access to all of the secrets that had been compromised. In response, senior bureau officials organized a new mole-hunting unit, recruiting more than 60 agents from the bureau's offices around the country. The existence of the secret unit was kept from all but a few top officials at the FBI and the CIA. A new mole-hunting team, similar to one that helped uncover Ames, was also created inside the CIA's counterespionage group within months of Ames' 1994 arrest. The mole hunters' search included a look for possible suspects in the FBI's New York office. As the New York investigation wore on, at least one Russian source provided enough information to identify Earl Edwin Pitts, an FBI agent who had offered his services as a spy for Moscow in 1987. Pitts was arrested in 1996, and in 1997 was sentenced to 27 years in prison after pleading guilty to espionage. Russian sources also provided enough information to lead to the arrest of a CIA officer, Harold J. Nicholson, in 1996. Nicholson, who had volunteered to spy for Moscow in 1994, was sentenced in 1997 to more than 23 years in prison after pleading guilty to espionage. But investigators were bothered by a nagging problem. The Russian sources were pointing to still another penetration, and their own analysis suggested that Ames, Pitts and Nicholson were not aware of some of the programs that appeared to have been compromised, including the tunnel under the Russian Embassy. In 1997, Robert Bryant, who was then the bureau's deputy director, asked Kimmel to conduct a damage-assessment study of the Pitts case. The bureau was particularly concerned about information Pitts had turned over to the Russians related to his work in counterintelligence in New York in the late 1980s, bureau officials said. Kimmel, experienced in organized-crime investigations, was viewed as an outsider by the bureau's spy hunters. So he recruited an FBI agent experienced in counterintelligence, Peter O'Donnell, to help him in his review. Reading the bureau's files on the Pitts case, O'Donnell was the first to notice discrepancies in the way the Russians had dealt with Pitts, Kimmel recalled. The case did not appear to bear the marks of the way in which a professional intelligence service would handle a valued spy, O'Donnell told Kimmel. Kimmel also discovered that Pitts had told bureau officials after he pleaded guilty that he thought the Russians might have another spy in the FBI. In his debriefings, Pitts had said that the Russians had treated him so casually that he had wondered whether he was not their only bureau source. He said that the KGB, the Soviet intelligence agency, had not regularly directed him to seek specific information from the bureau, and instead usually seemed content to accept without complaint whatever material he handed over. Other evidence in the Pitts case also prompted Kimmel to believe that Pitts might be right about another Russian spy in the bureau. For example, the FBI's broad counterintelligence investigation in its New York office was largely abandoned after the information from a Russian source pointed more directly to Pitts, who had left New York and was working at the bureau's training facility in Quantico, Va. Kimmel and O'Donnell began to wonder whether Pitts might have been a Moscow "throwaway," a marginally important agent whose existence was deliberately revealed by the Russians to protect the identity of a more important asset, Kimmel recalled. Kimmel added that there was other, even stronger evidence, which he declined to disclose, because it remains classified, that led him to believe there might be a mole in the FBI. But when he sought even more classified information, senior counterintelligence officials resisted. He had "doors slammed in his face," Gallagher acknowledges. That was at least partly because he had unwittingly stumbled into another mole hunt, this one focused within ranks of the CIA, bureau officials said. Russian agents had reported that Moscow had yet another spy, one at the CIA, who had accepted money and diamonds for secrets. Counterintelligence officials had learned to trust these Russian informants, since they had already provided crucial leads in the Nicholson, Pitts and Ames cases, officials said. Kimmel was finally shown many of the Russian agent reports that had convinced bureau officials to focus on the CIA. But Kimmel continued to argue that an investigation should also be conducted at the bureau. On Feb. 12, 1999, his work completed, Kimmel was ushered into a seventh-floor conference room at the bureau's headquarters here to discuss his findings on the Pitts case with Freeh, FBI officials said. At the meeting, which was also attended by Gallagher and other senior FBI officials, Freeh asked Kimmel whether he believed there were other spies in the bureau, according to Kimmel's notes from the meeting, which were provided by the bureau. Kimmel sought to answer the question, but said that he was not fully prepared to address the issue. His notes on the meeting show he told Freeh that he had not had sufficient access to classified information to form a judgment. Kimmel said in an interview that he also told Freeh he had been precluded from raising the matter in his report on the Pitts case. Freeh ordered Kimmel to look into the matter and get back to him, FBI officials said. Freeh also authorized Gallagher to give Kimmel wider access to secret information, including reports from Russian agents, although Kimmel was still not shown the full details of individual counterintelligence cases. "Mr. Kimmel was not told the details of the other investigations," Collingwood, the FBI spokesman, said, because of the need to limit access to the information. On March 11, Kimmel met with Freeh again, and told him he believed the facts suggested that there was another spy in the bureau. Freeh then told Gallagher and the bureau's National Security Division to review Kimmel's conclusions, FBI officials said. In April, Kimmel handed in a 15-page memo laying out his case. On May 6, officials in the National Security Division issued a 28-page analysis of Kimmel's work in which they concluded that Kimmel had failed to provide hard evidence or a logical analysis to back up his hypothesis. The analysis also said that many of the issues raised by Kimmel had already been factored into their inquiries at the CIA and other agencies. Senior officials at the bureau found that rebuttal persuasive, and a classified study by a joint FBI-CIA team buttressed the belief in June 1999, finding that the CIA, not the FBI, was the right place to seek a mole. "Neither Tom nor the subsequent analysis surfaced anything new," Collingwood said. By the summer of 1999, with no sign that the FBI was taking his reports seriously, Kimmel said he wrote a personal letter to Freeh. Kimmel said he wrote that he had provided a more detailed briefing on his findings to counterintelligence officials since he had last seen Freeh, and he offered to brief Freeh again. Kimmel said he never received a response. FBI officials said Freeh does not recall such a letter. The CIA remained the focus of the spy hunt until late 2000. At that point, another secret FBI operation to find new Russian agents by offering big cash rewards in exchange for information produced startling results. The cash-reward operation was similar to an earlier one, "Buck Lure," begun years earlier when investigators were hunting for the spy that turned out to be Ames. The program turned up a new Russian informant, one with access to the most closely held files in the SVR, the Russian successor to the KGB. Unlike the other Russian agents, who had been providing fragmentary leads, the new source, whose existence has been a tightly held secret, handed over a copy of the SVR's case file on their American spy. Soon after providing the file in the fall of 2000, the source also handed over a plastic bag that was stored in Moscow's files. The bag had been used by the American agent for documents left for his handlers at the Virginia drop site. The FBI laboratory quickly checked the bag for fingerprints. FBI counterintelligence officials were astonished to discover that the prints pointed indisputably to one of their own -- Hanssen. On Sunday, Feb. 18, the day Hanssen was arrested, Thomas Pickard, the FBI's deputy director, telephoned Kimmel. Pickard told Kimmel that he had been right, Kimmel recalled. Pickard then ordered the National Security Division to conduct another review of Kimmel's work, FBI officials said. That review once again concluded that there was nothing in Kimmel's work that could have pointed to Hanssen earlier. "He was right," Gallagher said. "But for the wrong reasons." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2960 From: James M. Atkinson, Comm-Eng Date: Sun Apr 22, 2001 9:35pm Subject: UK: French firms may have bugged MoD UK: French firms may have bugged MoD Monday 23 April 2001 French firms may have bugged MoD http://www.telegraph.co.uk/et?ac=000579381554028&rtmo=qxbqupe9&atmo=99999999&pg=/et/01/4/23/nbug23.html By Michael Smith, Defence Correspondent FRENCH arms companies attempting to elbow British competitors aside are suspected of planting electronic bugs uncovered inside Ministry of Defence buildings. Defence officials said that a number of devices had been found during the current refurbishment of the MoD's main building off Whitehall. Officials said MI5, the lead agency on security in any government buildings and departments, had not been informed of the discovery. Geoff Hoon, the Defence Secretary, appeared to confirm that about 30 devices had been discovered in various MoD properties. He said this showed the effectiveness of the MoD's regular scans to uncover electronic devices. One official said: "There have definitely been some found. I would be surprised if there weren't to be honest. That's why we scan the buildings so regularly." MoD workers said the bugs were thought to have been planted by a number of different people, some of whom may have been working for the Russians who have continued spying despite the end of the Cold War. But they said there was a suspicion that many were planted for the purpose of "industrial espionage" with French companies among the most likely suspects. French firms are among the leading suppliers of defence equipment and, apart from the Americans, are the main rivals to British companies seeking lucrative MoD contracts. The Americans were not thought to have been involved. MoD premises are regularly scanned and in high-security areas electronic jamming is employed to neutralise espionage attempts. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2961 From: Phillip H. Waters Date: Sun Apr 22, 2001 5:38pm Subject: Any recent "finds" A friend of mine is head of security for a large Telecommunications Corp. Joe (not his real name) is frustrated that upper management is not security conscious regarding sensitive meetings, phone calls, future plans, etc., a not uncommon attitude I gather in the Corporate world. Joe would like to be able to present some examples of when TSCM surveys have paid off and prevented loss of, or further loss of sensitive information by discovering taps, bugs, whatever in the last few years. Although I am new to this forum, it seems that those who frequent this site may be a good source of this type of anecdotal information. I would appreciate a brief summary of any examples of the value of TSCM surveys that is either specific or sanitized that Joe may present to his bosses in order to 'encourage' them to become more security conscious. Thanks, Phil Waters 2962 From: Paolo Sfriso Date: Mon Apr 23, 2001 3:41am Subject: TSCM Brochure photos and suggestions requested Dear Collegues. I am preparing some material for my TSCM and Computer Forensics services brochure. My intention is to distribute this brochure to PIs and Corporate Security Managers. Any suggestions on what to/not to write and photos of bugs found (jpegs please) would be greatly appreciated. Best regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 paulsfriso@t... www.grupposit.com 2963 From: David Alexander Date: Tue Apr 24, 2001 6:06am Subject: cautionary tale This is not exactly on-topic, but it is very amusing. beware new technology and shiny things ! http://www.theregister.co.uk/content/2/18438.html regards David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 2964 From: Dawn Star Date: Tue Apr 24, 2001 11:54am Subject: Any recent "finds Although I am new to this forum, it seems that those who frequent this site may be a good source of this type of anecdotal information. I would appreciate a brief summary of any examples of the value of TSCM surveys that is either specific or sanitized that Joe may present to his bosses in order to 'encourage' them to become more security conscious. Thanks, Phil Waters Phil you might look at the article from Business Week posted on my website, it is not recent but it has good info from a major source. www.bugsweeps.com Roger Tolces, Electronic Security, Los Angeles 2965 From: Dawn Star Date: Tue Apr 24, 2001 8:17pm Subject: Phone spy Didn't anyone tell these guys that wiring phone lines is against the law! It shows you that us sweepers have a lot to do out there. Roger http://www.phonespy.com/ 2966 From: Dawn Star Date: Tue Apr 24, 2001 8:28pm Subject: Creative Packaging at 2.4 GHZ At 2.4 GHZ they now come in all flavors http://www.aegi.com/store/covert_devices.html 2967 From: Dawn Star Date: Tue Apr 24, 2001 8:51pm Subject: More Spy Cam http://www.spygate.com/Portable.html 2968 From: Miguel Puchol Date: Wed Apr 25, 2001 2:30am Subject: RE: Phone spy Roger, From these guy's website: "The products and equipment that are described and contained herein are to be used only in a legal and lawful manner in accordance with all applicable laws and regulations. It is the purchaser's responsibility to ascertain the legality of these products and equipment for the country and/or the state of residence." I think someone should pay them a visit, to tell them that applicable laws say you can't even sell or advertise such equipment, never mind trusting the buyer about not breaking the law. In any case, how is this applied in the U.S., is it Federal law? Or do states regulate what can and cannot be sold? All the best, Mike > -----Mensaje original----- > De: Dawn Star [mailto:bratkid@e...] > Enviado el: miercoles, 25 de abril de 2001 3:17 > Para: TSCM-L@yahoogroups.com > Asunto: [TSCM-L] Phone spy > > > Didn't anyone tell these guys that wiring phone lines is against the law! > It shows you that us sweepers have a lot to do out there. Roger > > http://www.phonespy.com/ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 2969 From: Craig Snedden Date: Wed Apr 25, 2001 3:26am Subject: Re: Phone spy > I think someone should pay them a visit, to tell them that applicable laws > say you can't even sell or advertise such equipment, never mind trusting the > buyer about not breaking the law. > > In any case, how is this applied in the U.S., is it Federal law? Or do > states regulate what can and cannot be sold? Now here we have an example of the "law" as applicable to the web at work..... This guy is located in the US, so presumably is subject to applicable State and Federal laws. However, where is his website located? If it is outside the US is he commiting an offence? None of the products I saw on his site (I didn't look at them all) would be illegal to advertise, purchase or own within the United Kingdom. Relevant statute laws make it an offence only to use certain types of equipment in certain circumstances. e.g. To possess a transmitter capable of TX on 113 Mhz without being licenced to TX on that freq is not an offence, but switch it on and you would commit an offence. Whilst you ponder that one, consider this. Statute law in the UK makes it an offence to listen to radio transmissions unless you are licenced to do so........ There are "exceptions" for broadcast radio, amateur radio and maritime safety broadcasts (technically you should also possess a licence to receive those broadcasts too, but there is a "dispensation" made for them(Airband is also generally overlooked. I've not heard of anyone being charged with an offence for listening to airband). ). If you are tuning your scanner and happen to drift to a police or utility frequency, you must not listen, but must tune off immediately! So where does that leave me as a TSCM operative, carrying out a sweep and I come across a bug TX on say 130 Mhz? Listening to it I'm commiting an offence as I don't have a licence for that freq.....!!!??? I suppose I might argue in my defence that in finding the bug and stopping it transmitting I'm performing a public service by removing an illegal transmitter that may be causing interference to transmissions connected with public safety......? Until recently it was perfectly legal in the UK to fit a non transmitting intercept to the "private" side of a PBX system, so long as you had the system owners consent to do so. e.g. Within a business organisation, monitoring a target extension. That has changed to some degree with the implimentation of "human rights" legislation if you are a "public authority" and other recent legislation including the Data Protection Act & Interception of Communications Act & "Anti Stalking" legislation. There are still ways around this, like installing "quality monitoring" systems as used in call centre operations & warning all employees that thier calls may be recorded etc. but you must provide a non monitored phone for employees private use....!! I give up, I'm going home.......!! :-) Have a nice day Craig The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 2970 From: Robert G. Ferrell Date: Wed Apr 25, 2001 9:34am Subject: Re: Creative Packaging at 2.4 GHZ >At 2.4 GHZ they now come in all flavors Myself, I'm waiting for the one that fits on your dog's collar. You can just send Fido into the room and listen to your heart's content. Of course, depending on breed you'll need some sort of 'pant and bark' bandpass filter. Drool can be problematic, also. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2971 From: Robert G. Ferrell Date: Wed Apr 25, 2001 9:38am Subject: Re: Phone spy >This guy is located in the US, so presumably is subject to applicable State >and Federal laws. However, where is his website located? If it is outside >the US is he commiting an offence? Traceroute shows his Web server is also physically located in Spokane, WA. RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== From: Lawrence Dillard Date: Wed Apr 21, 2004 1:59pm Subject: A translation! Words Women Use. Pay attention gentlemen and Women. FINE This is the word women use to end an argument when they feel they are right and you need to shut up. Never use "fine" to describe how a woman looks -- this will cause you to have one of those arguments. FIVE MINUTES This is half an hour. It is equivalent to the five minutes that your football game is going to last before you take out the trash, so it's an even trade. NOTHING This means "something," and you should be on your toes. "Nothing" is usually used to describe the feeling a woman has of wanting to turn you inside out, upside down, and backwards. "Nothing" usually signifies an argument that will last "Five Minutes" and end with "Fine" GO AHEAD (With Raised Eyebrows! ) This is a dare. One that will result in a woman getting upset over "Nothing" and will end with the word "Fine" GO AHEAD (Normal Eyebrows) This means "I give up" or "do what you want because I don't care" You will get a "Raised Eyebrow Go Ahead" in just a few minutes, followed by "Nothing" and "Fine" and she will talk to you in about "Five Minutes" when she cools off. LOUD SIGH This is not actually a word, but is a nonverbal statement often misunderstood by men. A "Loud Sigh" means she thinks you are an idiot at that moment, and wonders why she is wasting her time standing here and arguing with you over "Nothing" SOFT SIGH Again, not a word, but a nonverbal statement. "Soft Sighs" mean that she is content. Your best bet is to not move or breathe, and she will stay content. THAT'S OKAY This is one of the most dangerous statements that a woman can make to a man. "That's Okay" means that she wants to think long and hard before paying you back for whatever it is that you have done. "That's Okay" is often used with the word "Fine" and in conjunction with a "Raised Eyebrow." GO AHEAD! At some point in the near future, you are going to be in some mighty big trouble. PLEASE DO This is not a statement, it is an offer. A woman is giving you the chance to come up with whatever excuse or reason you have for doing whatever it is that you have done. You have a fair chance with the truth, so be careful and you shouldn't get a "That's Okay" THANKS A woman is thanking you. Do not faint! Just say you're welcome. THANKS A LOT This is much different from "Thanks." A woman will say, "Thanks A Lot" when she is really ticked off at you. It signifies that you have offended her in some callous way, and will be followed by the "Loud Sigh." Be careful not to ask what is wrong after the "Loud Sigh," as she will only tell you "Nothing" Send this to the men you know to warn them about future arguments they can avoid if they remember the terminology! 8477 From: Gerald Date: Tue Apr 20, 2004 1:51am Subject: been a long time Anyone remember building your own wheatstone bridge for TX lines?? Catch up time for me. I do computer, internet, email, tracking, personal computer security. Just finished research on Internet Orginized crime. the Internet Fraud Factory: http://cigars.bravepages.com/fraudfactory.htm I'm getting to "them" my computer gets 20,000 attacks a month. Gerald Chief Forensics Computer Researcher (tracking & Research) 8478 From: Thomas Shaddack Date: Wed Apr 21, 2004 5:46am Subject: Re: Question on wireless LANs On Wed, 21 Apr 2004, Steve Uhrig wrote: > Questions on basic security for you wireless data guys out there. Not > my area and I'm trying to learn at least enough to discuss it > intelligently: > > ---------- > > I imagine it would be fairly easy to steal an access point. People > drop them down behind desks and such. If it's physically stealing them, then yes, it's about as difficult as unplugging a small box (my D-Link is about 5x3.5x1 inch or so, I got borrowed also a pocket version about 3x4x0.5 in). > Do access points contain encryption keys and other security settings? Yes, they contain WEP keys. (WEP is the encryption/authentication technology used in WiFi. Nothing strong, there are programs in the wild to crack the encryption using logs of intercepted wireless traffic, for which you need just a laptop with a WiFi adapter and an appropriate software, eg. Kismet - it even supports automatic logging of the discovered access points, and when you connect a GPS unit to the laptop, it creates a coverage map for you. Just power on the laptop and drive through the city.) Don't ask me why they didn't use some real encryption - I suppose that it was either a display of terminal stupidity, possibly combined with Not-Invented-Here syndrom, or serious politics (which is a kind of stupidity as well). > If not, where is the decryption done, presuming the user enables it > to start with? The difficult way is to obtain the keys from the access point. The easier way is to listen for long enough on the traffic, then bruteforce the keys. > Could a thief could take an access point back to their place, and > take their time to extract security settings of the AP, MAC address > of other network devices, etc.? Yes, but it's easier to do it wirelessly. Another way is to look at the box, find the manual for its type, and try to use the default admin password - most boxes have web interface inside. If it lets you in, you have all the data accessible in the web forms as plaintext. You can also try to bruteforce the password, or sniff the network and wait until the admin tries to log in - I didn't see a single box yet that allows admin login over HTTPS. > How difficult might this be for a reasonably capable operator with some > funding? Intercepting the WiFi comm is routinely being done. The software is free, the hardware is cheap if we use older laptop. When time permits, I am going to do some experiments with my $300 ancient laptop and $45 PCMCIA card (and a $50 car inverter as the laptop battery is dying). Will be a nice reason and a testbed for learning design and construction of 2.4 GHz antennas. > Unless someone physically noticed the lesser coverage, I imagine a theft > of one might go unnoticed, esp in places where someone bootlegged one > which I understand is not unusual. Considering it's much easier to attack the system without physically touching the box, stealing the AP is more of commercial than intelligence value. > ------------ > > Would appreciate info on this. Then will prob have more questions. > Tks .. Steve You're welcome. I'll do my best. :) 8479 From: Ocean Group Date: Wed Apr 21, 2004 3:17pm Subject: RE: Through wall imaging ? >>Why is that so? (why are they UWB ?) is that "spread spectrum" or is it "frequency sweeped signals" ? I am refering to the use of this technique for surveillance purposes ### UWB, or ultra wideband is not a new technology. However it is an emerging one in the field of RF communications. I'm not familiar with these "in wall imagers" however I presume it is siimilar to the new style microwave body scanners that are being developed for detection of hidden objects on humans. UWB technology slowly emerged from classified radar technology were it was used very successfully due to its difficulty in jamming. However now it is being applied to RF communications for the following reason: The UWB signal uses a very large bandwidth, which when compared to DSS think of it like this: DSS sends packets of data on various frequencies sequentially, in other words, the same size packet jumps from frequency to frequency within a given frequency range at high speed. That's why when you use a signal analyser you'll see a DSS signal as millions of little dots or blocks in a given frequency range. UWB, which is lower output power, uses all the frequency space in a given bandwidth, hence its popularity for sending ultra fast high bandwidth data over small distnaces(10m approx.) However because of this, the signal virtually "lies" in the noise floor of the spectrum when looked at through a standard spectrum analyser. Hence its brilliance for use in surveillance devices, ultra low power means standard narrow FM signal seekers are useless, and even people with super spectrum analysers are rendered useless as well. I attended an IEE seminar recently on UWB and discussed various methods of signal detection with the person giving the talk, he was fairly stumped and he said the only thing to his knowledge that would be of anyuse in detcetion was another uwb receiver. However, there is one drawback, once TSCM people start getting their hands on properly designed UWB receivers for detection they will literally be able to trace the device down to the centimetre. Due to the format of the signal it allows very accurate RDF of the emitter. As always, there are always pro's and cons. I have asked a few people however no one has been able to give me an adequate response on methods to adapt standard RF detection equipment to detect UWB equipment, properly because samples of the devices are mostly restricted to RF developers at the moment. >>So either: A) the used frequency determines the degree of "penetration" trough the different materials...and therefore different frequencies are needed ? for example 6 frequencies for 6 different materials ### Different frequencies have different pentration properties, hence 2.4ghz lans are so shite when it rains! Water penetration is woeful, and vice versa the fundamentals of a microwave oven, the less penetration, the more friction, the more heat. Hot soup! >>B) all frequencies are used (not fixed channels) so the whole range is swept...sweeping is stopped when the results on the monitor are satisfying ### This is most likely what happens. Because otherwise if the wall was made of say concrete that was immune to high freq's all you'd get is a black screen! >>Who knows more ? ### I have some more info on the stuff but you'll have to contact me off list as I'm not prepared to discuss it here. >>What happened to the supreme court case that involved police using infrared to look for possible heat coming from marijuana-lamps the point there was if they where looking "of the wall" ,"in the wall" or "through the wall"...and if such evidence could be used ### The evidence was deemed a violation of right to privacy or something and classes inadmissable, but I may be mistaken. >>By the way a "In Wall Imager" would be handy to find any electronics stuff that you normally would use a NLJ for (Broom) ? ### LOL. What the hell do you think people have been using X-ray for!!! Regards Oisin 8480 From: Steve Uhrig Date: Wed Apr 21, 2004 6:35pm Subject: Wireless data security Thanks to the many who replied on and off list. Too many to thank individually. It's very nice to see a number of people here really know their stuff, are willing to share it, and can put it down on paper intelligently. Am reviewing all. Will ask more questions as they bubble up through the haze. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8481 From: Steve Whitehead Date: Thu Apr 22, 2004 1:44am Subject: Fw: WWW Form Submission Perhaps a US list member can assist? ----- Original Message ----- From: To: Sent: Thursday, April 22, 2004 12:08 AM Subject: WWW Form Submission > Below is the result of your feedback form. It was submitted by > (teredo8@a...) on Thursday, April 22, 2004 at 00:08:10 > -------------------------------------------------------------------------- - > > comments: I think your website is terrific and certainly much needed.My name is Teresa Dohr and I have been so afraid for my life in the past 31/2 months. Someone is following me and has also tapped my phone,parents phone and our cars.They have changed dead bolts that use to be metal now they are plastic our peeky hole you can see in and out instead of just out .On my purse it seemed like something was lasered or heated into my shoes and purse possibly my coat also,it was makeing all kinds of strange tones and I know for a fact someone is trying to either kill me or kidknapp me. I am a 43 yr.old women w/a 14 year old son .I dont know what these people want or who they are,it seems like they are waiting for a window of opportunity to kill me and dispose of my bodt.All of this started after I had a spinal fusion that did get staph infection in it,I think the Drs. put a hit out on my life.Maybe they think I am goining to sue them .I am not,but maybe that's what dr.Frank Phillips and Dr. Doolas (general surgeon)at Rush Presbaterian St.Lukes in Chicago Il.Please for the sake of my little boy could you please tell me what to do I am so frightened.My son needs his mother he has no brothers or sisters or a father.I am begging for your help.Please e-mail me at teredo8@a... or write me at 840 rolling pass,Glenview,Il.60025 All the phones are tapped even at my parents house and the cars. > > category: website > > name: Teresa Dohr > > company: A mother 43 years of age w/14 yr.old son > > Address: 840 Rolling Pass ,Glenview Il 60025.Thankyou .Please Don't forget this.sincerly teresa L Dohr > > tel_number: 847-251-5441 This is my girl friend Paulas > > fax_number: # you may call. > > -------------------------------------------------------------------------- - > > > 8482 From: David Alexander Date: Thu Apr 22, 2004 3:08am Subject: RE: [wearables] mobile phone exploits: bluejacking and remote monitoring (fwd) The best precaution with a modern phone is to go into the Bluetooth configuration menu and ensure that you select the option to hide your phone's visibility. That way it doesn't advertise its' presence and bluejackers can't find it when they do a search. regards David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: Thomas Shaddack [mailto:tscm-l@s...] Sent: 21 April 2004 11:21 To: tscm-l@yahoogroups.com Subject: [TSCM-L] [wearables] mobile phone exploits: bluejacking and remote monitoring (fwd) Quite unpleasant. Looks like there is certain wisdom in using old, obsolete phones without too many features. (I wish to have an open-source phone that I could pepper with monitoring devices in order to watch its operations (and learn more about the network operation during that - just a transmitter monitor LED, and even such simple thing can say a lot when one gets used to its patterns).) The backscatter from the phone as RFID is very interesting thing. Could be of interest for you. ---------- Forwarded message ---------- Subject: [wearables] mobile phone exploits: bluejacking and remote monitoring Date: Wed, 21 Apr 2004 01:57:57 -0400 From: R. A. Hettinga To: cypherpunks@a... --- begin forwarded text Date: Wed, 21 Apr 2004 01:28:11 -0400 (EDT) From: "Thad E. Starner" To: wearables@c... Subject: [wearables] mobile phone exploits: bluejacking and remote monitoring Sender: owner-wearables@c... Folks- I'm getting interview requests on the (lack-of) privacy aspects on mobile phones and need some help formalizing my ideas. I've included an article on bluejacking (exploiting bluetooth to extract info from mobile phones) below, but what I'm really interested in is methods to turn on the microphone on a mobile phone without the owner's awareness. Has anyone done this or heard of an exploit to do this yet? I can see three methods off-hand: 1) Bluejacking the phone, sending over a Java app, turning on the mic, and either a) sending the audio over bluetooth b) actually calling back the cracker's phone directly (either immediately or in a time-delayed fashion) c) storing the audio on the owner's phone and then uploading the data at a later time (with PDA cell phones with 4G flash cards, you could store a full year's worth of speech) 2) Having a Java (J2ME) trojan horse app on a website that, when the owner clicks on it, does variants of 1 3) The "service provider" remote downloads software "updates" that do the same thing as #1. (Does anyone have specific knowledge of service providers uploading software updates remotely) a) because the service provider is being forced to do so by a government agency (e.g. in the US based on a subpoena using the FBI wiretap law, for example) b) because the service provider is actually a cracker who got the appropriate software update codes c) because the service provider just thinks this is a good idea for some reason (I can put together some pretty paranoid scenarios for this, but nothing that is really compelling yet) (Note with some of these scenarios, the phone could actually look "off" because almost all phones use soft switches instead of actually disconnecting the power) Other things I'm interested in are 1) When the mobile phone is off, exciting the phone at the carrier frequency, looking at the back scatter, characterizing the specific characteristics of the phone, and then using these as a unique signature that I can use the phone like a passive RFID. I have a pretty good source that says this is actually being done now, but I can't use this info publicly. Anyone have a source I can quote or point to? 2) Using clusters of phones as phased array microphones. Sumit Basu did a phased array microphone based on mics in clothing where the topology was changing. Does anyone know if the math works well enough to do this on a room full of cell phones in people's pockets? Thad ------------ Bluetooth May Put You At Risk of Getting 'Snarfed' By JEREMY WAGSTAFF Staff Reporter of THE WALL STREET JOURNAL April 15, 2004; Page D3 If you spot someone tailgating you on the road or standing next to you wearing a backpack, then watch out: You may have been "snarfed." All the data on your cellphone, including addresses, calendars, whom you called and who called you, may now be in that person's computer. Many cellphones use Bluetooth technology, which allows them to communicate wirelessly with other Bluetooth-equipped devices -- computers, personal-digital assistants and other cellphones. This means you don't need a cable, for example, to synchronize the address books on your laptop and your cellphone. It is convenient, but that makes it possible for someone to steal your data, or even hijack your cellphone for their own purposes. Last year, London security consultant AL Digital spotted flaws in the way some Bluetooth cellphones swapped data with one another -- flaws that could be used to gain unauthorized access to everything stored on that phone without the user ever knowing. AL Digital's Adam Laurie, who discovered the problem, shared his findings with cellphone makers and with the public (leaving out the detail that might allow ne'er-do-wells to copy his experiments at street level). He termed the trick Bluesnarfing. Not a lot has happened since then. Nokia Corp., the market leader in the cellphone industry, acknowledges the flaw but says in an e-mail response to questions that it is "not aware of any attacks against Bluetooth-enabled phones." Sony Ericsson, a joint venture of Telefon AB L.M. Ericsson and Sony Corp., didn't reply to an e-mail. Even those highlighting the danger say they haven't heard of specific attacks. Still, these attacks -- also known as Bluejacking -- nevertheless are possible. Mr. Laurie cites a scenario in which paparazzi could steal celebrity data. He says he was able, with permission, to snarf from a friend's phone details of her company's shops, door codes and safe combinations. "There's any number of angles you can look at, and they are all bad as far as I can see," he says. Martin Herfurt, a 27-year-old German student at Salzburg's Research Forschungsgesellschaft, last month set up a laptop at a technology trade fair in Hannover, Germany, and ran a snarf attack. He found nearly 100 cellphones from which he could have stolen data, sent text messages or even made calls. He has published his findings to prove that this kind of thing can be done easily. How does it work? The attacker can use a Bluetooth-enabled laptop to discover other Bluetooth gadgets within range. Anything with Bluetooth activated and set to "discoverable" will show up, usually identified by its default device name. Being "discoverable" means your gadget is visible to anyone searching, but even if it isn't, an attacker still can find it, using software freely available on the Internet. The attacker then can use more software to take, delete, change or add data. So what is a consumer to do? Turn off Bluetooth on your phone unless you really need it to communicate with your other gadgets. In most cases, phones that have Bluetooth will have prominently displayed the fact on the box the phone came in, or you can expect to find "Bluetooth" in the index of your phone's manual. Otherwise, the Bluetooth settings can usually be found in the "Communications" or "Connections" menu on your phone. More importantly, there shouldn't be anything on your phone that you don't want someone else to have. Write to Jeremy Wagstaff at jeremy.wagstaff@f... --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8483 From: Ocean Group Date: Thu Apr 22, 2004 0:54pm Subject: RE: Wireless LANSEC Just to add to that Dave/Steve Cisco uses LEAP encryption, however this was cracked over a year ago, they have just launched another format, something like WLEAP or another. Anyway, my point is that Cisco holds no added true security benefits to any other manufacturer. As Dave said, if your looking at using these in a location that requires "real" security, then stay away from it. If your looking into exploiting the system, then you should have no problem! :) The best way to secure remains the software/vpn/encrypted options which uses some sort of secure key exchange system, not my expertise which exactly, however Mr. Shaddack our in house ITS expert would be able to pinpoint what you'd need exactly! ;) Hope this sheds light Steve, however if you want to hold truly intelligent conversation then there are piles of docs/faqs available, just google wifisecurity/wireless security etc. >> My professional advice at the moment, if anyone is thinking of using 802.11 right now, is don't touch with somebody else's ten foot pole, let alone yours. Leave it until we have stable, secure products next year. If you have to do it, use the CISCO products and the security management tools they have to go with it - which costs almost as much as hard wiring I the first place. 8484 From: Spook Date: Thu Apr 22, 2004 1:06pm Subject: Re: Fw: WWW Form Submission She needs to seek immediate psychiatric psychologic help, NOT waste money on TSCM or deal with anyone other then someone in the medical community. -jma At 02:44 AM 4/22/2004, Steve Whitehead wrote: >Perhaps a US list member can assist? > > >----- Original Message ----- >From: >To: >Sent: Thursday, April 22, 2004 12:08 AM >Subject: WWW Form Submission > > > > Below is the result of your feedback form. It was submitted by > > (teredo8@a...) on Thursday, April 22, 2004 at 00:08:10 > > -------------------------------------------------------------------------- >- > > > > comments: I think your website is terrific and certainly much needed.My >name is Teresa Dohr and I have been so afraid for my life in the past 31/2 >months. Someone is following me and has also tapped my phone,parents phone >and our cars.They have changed dead bolts that use to be metal now they are >plastic our peeky hole you can see in and out instead of just out .On my >purse it seemed like something was lasered or heated into my shoes and purse >possibly my coat also,it was makeing all kinds of strange tones and I know >for a fact someone is trying to either kill me or kidknapp me. I am a 43 >yr.old women w/a 14 year old son .I dont know what these people want or who >they are,it seems like they are waiting for a window of opportunity to kill >me and dispose of my bodt.All of this started after I had a spinal fusion >that did get staph infection in it,I think the Drs. put a hit out on my >life.Maybe they think I am goining to sue them .I am not,but maybe that's >what dr.Frank Phillips and Dr. Doolas (general surgeon)at Rush Presbaterian >St.Lukes in Chicago Il.Please for the sake of my little boy could you please >tell me what to do I am so frightened.My son needs his mother he has no >brothers or sisters or a father.I am begging for your help.Please e-mail me >at teredo8@a... or write me at 840 rolling pass,Glenview,Il.60025 All the >phones are tapped even at my parents house and the cars. > > > > category: website > > > > name: Teresa Dohr > > > > company: A mother 43 years of age w/14 yr.old son > > > > Address: 840 Rolling Pass ,Glenview Il 60025.Thankyou .Please Don't forget >this.sincerly teresa L Dohr > > > > tel_number: 847-251-5441 This is my girl friend Paulas > > > > fax_number: # you may call. > > > > -------------------------------------------------------------------------- >- > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 8485 From: A Grudko Date: Thu Apr 22, 2004 4:38pm Subject: Zartec Anyone have the 5 standard freqs for Zartec portables at hand - looks like they are 463.975 to 464.375? Andy Grudko (British), DPM, Grad IS (South Africa) Consulting Investigator, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , andy@g... Pretoria (+27 12) 244 0255 - 244 0256 (Fax) Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.654 / Virus Database: 419 - Release Date: 2004/04/06 [Non-text portions of this message have been removed] 8486 From: kondrak Date: Thu Apr 22, 2004 6:05pm Subject: Re: Question on wireless LANs I use exactly that setup...a P233 running w2k, a 500 watt inverter to keep the lappy charged (know its overkill, but I use if for tools in the field as well) Netstumbler to audit access points, LinkFerret for packet capture/analysis...and yes, the decryption programs for WEP work...it only takes me twice as long to decode 128 bit as 40 bit. The PCMCIA card is a $23 Zonet (which is hotter than a firecracker on receive) a close coupled 5db panel below the card, and a pringles cantenna for directionality on the other end of the cable (passive repeater confguration). This allows me to greatly vary antenna gain/attenuation in congested places. Anyone NOT using VPN and RAS over their link is a sitting duck...the worst offenders I find are Lawyers. Their egos make them very stupid I find..... >Intercepting the WiFi comm is routinely being done. The software is free, >the hardware is cheap if we use older laptop. When time permits, I am >going to do some experiments with my $300 ancient laptop and $45 PCMCIA >card (and a $50 car inverter as the laptop battery is dying). Will be a >nice reason and a testbed for learning design and construction of 2.4 GHz >antennas. 8487 From: kondrak Date: Thu Apr 22, 2004 6:10pm Subject: Re: Fw: WWW Form Submission That's what I got out of it as well..... At 14:06 4/22/2004, you wrote: >She needs to seek immediate psychiatric psychologic help, NOT waste money >on TSCM or deal with anyone other then someone in the medical community. > >-jma > > > >At 02:44 AM 4/22/2004, Steve Whitehead wrote: > >Perhaps a US list member can assist? > > > > > >----- Original Message ----- > >From: > >To: > >Sent: Thursday, April 22, 2004 12:08 AM > >Subject: WWW Form Submission > > > > > > > Below is the result of your feedback form. It was submitted by > > > (teredo8@a...) on Thursday, April 22, 2004 at 00:08:10 > > > > -------------------------------------------------------------------------- > >- > > > > > > comments: I think your website is terrific and certainly much needed.My > >name is Teresa Dohr and I have been so afraid for my life in the past 31/2 > >months. Someone is following me and has also tapped my phone,parents phone > >and our cars.They have changed dead bolts that use to be metal now they are > >plastic our peeky hole you can see in and out instead of just out .On my > >purse it seemed like something was lasered or heated into my shoes and purse > >possibly my coat also,it was makeing all kinds of strange tones and I know > >for a fact someone is trying to either kill me or kidknapp me. I am a 43 > >yr.old women w/a 14 year old son .I dont know what these people want or who > >they are,it seems like they are waiting for a window of opportunity to kill > >me and dispose of my bodt.All of this started after I had a spinal fusion > >that did get staph infection in it,I think the Drs. put a hit out on my > >life.Maybe they think I am goining to sue them .I am not,but maybe that's > >what dr.Frank Phillips and Dr. Doolas (general surgeon)at Rush Presbaterian > >St.Lukes in Chicago Il.Please for the sake of my little boy could you please > >tell me what to do I am so frightened.My son needs his mother he has no > >brothers or sisters or a father.I am begging for your help.Please e-mail me > >at teredo8@a... or write me at 840 rolling pass,Glenview,Il.60025 All the > >phones are tapped even at my parents house and the cars. > > > > > > category: website > > > > > > name: Teresa Dohr > > > > > > company: A mother 43 years of age w/14 yr.old son > > > > > > Address: 840 Rolling Pass ,Glenview Il 60025.Thankyou .Please Don't > forget > >this.sincerly teresa L Dohr > > > > > > tel_number: 847-251-5441 This is my girl friend Paulas > > > > > > fax_number: # you may call. > > > > > > > -------------------------------------------------------------------------- > >- > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 8488 From: Brian Varine Date: Wed Apr 21, 2004 7:26pm Subject: Re: Question on wireless LANs David pretty much summed it up but you should be aware that even Cisco LEAP has been exploited. Just from what I've seen in the last few years it seems like most 802.11 security features turn up flawed. What is even more amazing is that 70% of Wireless networks have no security turned on at all. It's one of the first things I look for (and find) when performing a network security audit. I like to tell people that 90% of corporations have wireless networks.....20% actually know about it. Asleap - Cisco Attack Tool http://www.securiteam.com/tools/5TP012ACKE.html A quick summary of asleap features are as follows: + Can read live from any wireless interface in RFMON mode with libpcap. + Can monitor a single channel, or perform channel hopping to look for target networks running LEAP. + Will actively de-authenticate users on LEAP networks, forcing them to re-authenticate. This makes the capture of LEAP passwords very fast. + Will only de-authenticate users who have not already been seen, doesn't waste time on users who are not running LEAP. + Can read from stored libpcap files, or AiroPeek NX files (1.X or 2.X files). + Uses a dynamic database table and index to make lookups on large files very fast. Reduces the worst-case search time to .0015% as opposed to lookups in a flat file. + Can write *just* the LEAP exchange information to a libpcap file. This could be used to capture LEAP credentials with a device short on disk space (like an iPaq), and then process the LEAP credentials stored in the libpcap file on a system with more storage resources to mount the dictionary attack. Upon advising the Cisco PSIRT team, Joshua was asked to wait for six months until February 2004 before making the tool publicly available. In the end of January 2004, Cisco PSIRT asked me to wait another few months while they finished testing the EAP-FAST protocol, the designated replacement for the flawed LEAP protocol. After working out a release date with Cisco, Joshua is making the source for asleap v1.0 available including a partial-functionality Win32 port. Joshua encourages LEAP users to install and use asleap to evaluate the risks of using LEAP as a mechanism to protect the security of wireless networks. Windows users can use third-party wireless sniffer tools including AiroPeek NX to capture the LEAP authentication exchange to test the security of LEAP user passwords. 8489 From: Thomas Shaddack Date: Thu Apr 22, 2004 6:05pm Subject: RE: Wireless LANSEC On Thu, 22 Apr 2004, Ocean Group wrote: > Just to add to that Dave/Steve > > Cisco uses LEAP encryption, however this was cracked over a year ago, they > have just launched another format, something like WLEAP or another. Well-designed security is rare these days. :( The vendors, including the big name ones, mostly refuse to accept that security by obscurity doesn't work for long enough to be practical. I personally prefer to rely on open systems with accessible source and as complete documentation as possible, as then I have the option to check it myself (or if stakes are high, hiring a team to do so), or strip it down to bare minimum and recompile, removing possible bugs in areas I don't need. > Anyway, my point is that Cisco holds no added true security benefits to any > other manufacturer. As Dave said, if your looking at using these in a > location that requires "real" security, then stay away from it. If your > looking into exploiting the system, then you should have no problem! :) Cisco is a big name, with less substance than the size of their name would suggest. They have good hardware, but not THAT good. Newest developments on open-source design could derail even Cisco, though. Check the Liberouter project, http://www.liberouter.org/ - the Combo6 is an FPGA-based IPv6 accelerator board for PC with projected throughput of 10 Gbps. Designed for CESNET2 Network and are used in EU projects 6NET and SCAMPI. Complete documentation is available, including the blueprints for the circuitboards. > The best way to secure remains the software/vpn/encrypted options which uses > some sort of secure key exchange system, not my expertise which exactly, > however Mr. Shaddack our in house ITS expert would be able to pinpoint what > you'd need exactly! ;) I know far less than I would like to and that I should, and the more I know, the more "greenhornish" I feel. Maybe it's normal. Regarding 802.11, I suppose it's safe to consider it to be an unsecured medium not entirely under our control, and has to be handled in similar way to a network line that goes through the adversary's land, where it can be cut off (DoS), intercepted both passively and as MITM, subject to traffic analysis, or even used to connect adversary's computer into our LAN. (Similarly, beware of network jacks in eg. conference rooms where potential laptop-toting adversaries can have access to them.) If a packet hits the wireless interface, it should be considered as being up to grab. A more reliable and secure layer of encryption/authentication, being it a full-blown VPN or at least "mere" SSL, is more than advised. > Hope this sheds light Steve, however if you want to hold truly intelligent > conversation then there are piles of docs/faqs available, just google > wifisecurity/wireless security etc. I enjoy answering good questions. It's a welcomed opportunity to write down what I know about the issue, see the eventual inconsistencies, look up the details, and expose them to the other experts who can spot and correct my eventual mistakes. A pleasant light challenge. The questions themselves give me insight into how seasoned professionals approach unfamiliar areas. Plus it's a training in presenting what I know in an understandable (hope!) form. > >> My professional advice at the moment, if anyone is thinking of using > 802.11 right now, is don't touch with somebody else's ten foot pole, let > alone yours. Leave it until we have stable, secure products next year. If > you have to do it, use the CISCO products and the security management tools > they have to go with it - which costs almost as much as hard wiring I the > first place. Or you may use any other brand of hardware that fits your requirements, and secure it in an underlying layer. I believe in an onion-like model - where the adversary has to fight for every step, for every layer, if possible tripping all kinds of alarms in the process - when the adversary breaks through WiFi, he finds IPSec, and possibly some decoy plaintext traffic, attracting an attempt to port-scan the endpoints, which is rather easy to detect and log. Luring the adversary into an ambush. The knowledge about somebody attempting an attack can have strategical value. It's important, though, to keep in mind that a security system can be two-edged, that a decoy service/honeypot may become a security hole itself if it is buggy (which is better to presume it is), that an active firewall without a whitelist can cut off friendlies if they are spoofed as attackers and in turn, if whitelisted, can permit attack from a compromised formerly friendly system. A closely monitored demilitarized zone is a friend here. Of course, things that you don't expect are what at the end gets you. A formatted-but-not-overwritten harddrive with an access certificate sold with a discarded machine as a scrap. A stolen laptop. A stolen or lost-and-"found" backup tape. A keylogger. Or even sensitive printouts in trash. Perfectly secured network then only maskes the injury hurt more. 8490 From: Thomas Shaddack Date: Thu Apr 22, 2004 8:09pm Subject: Re: Fw: WWW Form Submission Quoting the source: > > >All of this started after I had a spinal fusion > > >that did get staph infection in it, This backs the theory with a plausible explanation: post-infection organic brain damage. (Brain malfunctions, especially localized ones like tumors and injuries, are very interesting area to read about.) Brain is a fascinating combination of excitative and inhibitive systems in mutual balance - subtle changes in any of them, which can be caused by anything from exposition to chemicals or drugs to cancer or injuries, or even hormonal changes (leading to eg. postpartum psychosis (with incidence of about 0.1%) which may include paranoia), can have interesting results. Infections can change personality. Looking around, I found a mention of a research done on a local university, correlation infection with toxoplasma gondii acquired from domestic cats with personality profiles: newspapers: http://www.timesonline.co.uk/article/0,,8122-826557,00.html researcher's publications: http://www.natur.cuni.cz/~flegr/publpar.htm some third-party opinion: http://signalplusnoise.blogspot.com/2003_10_05_signalplusnoise_archive.html The research also mentions the effect of the parasite on rats, who seem to be slower in reaction, more risky in behavior, and start being attracted with the scent of cat urine, thus becoming more likely to get caught by a cat (and infecting the cat with t.gondii, providing it with another phase of its life cycle). Paranoia is also a symptom of many bacterial infections; a well-researched example is syphilis, other well-known ones are Lyme borelliosis, and just about every second microorganism and virus that's out there and infects CNS or affects it by its toxins. I didn't manage to find any specific mentions of staphylococcus-related alterations of mental states, but it's possible the person in question mistook staph for strep, or that I didn't look well enough. But then, I am not a medical pro, only happen to know enough to be somehow able to search and to certain extent interpret the books and the Net, if the problem is easy. On Thu, 22 Apr 2004, kondrak wrote: > That's what I got out of it as well..... > > At 14:06 4/22/2004, you wrote: > >She needs to seek immediate psychiatric psychologic help, NOT waste money > >on TSCM or deal with anyone other then someone in the medical community. > > > >-jma > > > > > > > >At 02:44 AM 4/22/2004, Steve Whitehead wrote: > > >Perhaps a US list member can assist? > > > > > > > > >----- Original Message ----- > > >From: > > >To: > > >Sent: Thursday, April 22, 2004 12:08 AM > > >Subject: WWW Form Submission > > > > > > > > > > Below is the result of your feedback form. It was submitted by > > > > (teredo8@a...) on Thursday, April 22, 2004 at 00:08:10 > > > > > > -------------------------------------------------------------------------- > > >- > > > > > > > > comments: I think your website is terrific and certainly much needed.My > > >name is Teresa Dohr and I have been so afraid for my life in the past 31/2 > > >months. Someone is following me and has also tapped my phone,parents phone > > >and our cars.They have changed dead bolts that use to be metal now they are > > >plastic our peeky hole you can see in and out instead of just out .On my > > >purse it seemed like something was lasered or heated into my shoes and purse > > >possibly my coat also,it was makeing all kinds of strange tones and I know > > >for a fact someone is trying to either kill me or kidknapp me. I am a 43 > > >yr.old women w/a 14 year old son .I dont know what these people want or who > > >they are,it seems like they are waiting for a window of opportunity to kill > > >me and dispose of my bodt.All of this started after I had a spinal fusion > > >that did get staph infection in it,I think the Drs. put a hit out on my > > >life.Maybe they think I am goining to sue them .I am not,but maybe that's > > >what dr.Frank Phillips and Dr. Doolas (general surgeon)at Rush Presbaterian > > >St.Lukes in Chicago Il.Please for the sake of my little boy could you please > > >tell me what to do I am so frightened.My son needs his mother he has no > > >brothers or sisters or a father.I am begging for your help.Please e-mail me > > >at teredo8@a... or write me at 840 rolling pass,Glenview,Il.60025 All the > > >phones are tapped even at my parents house and the cars. > > > > > > > > category: website > > > > > > > > name: Teresa Dohr > > > > > > > > company: A mother 43 years of age w/14 yr.old son > > > > > > > > Address: 840 Rolling Pass ,Glenview Il 60025.Thankyou .Please Don't > > forget > > >this.sincerly teresa L Dohr > > > > > > > > tel_number: 847-251-5441 This is my girl friend Paulas > > > > > > > > fax_number: # you may call. > > > > > > > > > > -------------------------------------------------------------------------- > > >- > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > the hands acquire shaking, the shaking is a warning. > > > It is by caffeine alone I set my mind in motion. > > >=================================================== TSKS > > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 8491 From: G P Date: Thu Apr 22, 2004 11:54am Subject: Re: Question on wireless LANs If Wired Equivalent Privacy (WEP) is enabled on the access point, physical access to and forensic analysis of the AP could yield the WEP keys. Most common APs are in reality embedded linux devices, so the standard tools used for linux forensics could be used against the AP to recover memory contents. On a scale of difficulty, doing a post-mortem analysis on a linux SOC-based AP would be a 1-2 difficulty on a scale of 10. As APs are typically used for public access applications, little (if any) tamper resistent features are built into the device. WEP was never intended to offer confidentiality or integrity of communications, only the "equivalent privacy" of a conventional wired LAN. The bigger issue with WEP is the ability to recover the encryption keys "from the air", based on a weakness in the key scheduling algorithm used in RC4 (the RSA encryption algorithm used by WEP). After capturing 1-2 million packets, the WEP encryption key/passphrase can be recovered in less than 1 second; 1-2 million packets might sound like a lot of info, but is in reality only a few hours worth of traffic analysis on a semi-busy WLAN. The latest 802.11g standard offers greater than 54 Mbp/s of bandwidth, many vendor specific implementations push that to more than 100 Mbp/s, which opens the door for brute force and encrypt/compare attacks as well. Recent vulnerabilities in Cisco's proprietary LEAP-derived encryption suffers from this type of brute force attack. Rogue AP attacks are possible with WEP; deploying an access point with higher output power than the target AP results in "overriding" the initial AP's signal, resulting in the potential for a man in the middle attack (e.g., override the initial AP, act as a MITM intermediary, then intercept privileged authentication credentials). Rogue AP attacks are the hardest to defend against. MAC-based authentication is useless as well, when IEEE was smoking crack and ratifying the initial 802.11 security spec, they chose transport layer encryption instead of an encapsulation method - which means the MAC address of 802.11x traffic is "in the clear" regardless of whether WEP is turned on or not - MAC authentication is useless at best, there are many tools out there which can be used to change the MAC address of your wireless card, relying on MAC-based authentication is an exercise in futility. Not to mention the fact that 802.11b and 802.11g all live in the junk 2.4 Ghz ISM band, which is shared by the microwave oven. $20 in parts from Radio Shack, a crude 2.4 Ghz waveguide, and the magnetron from a microwave oven, and... you get the idea. There are many more advanced attacks against 802.11x/WEP, as 802.11x is a simple extension to standard Ethernet (all of the same layer-2 attacks that are possible with Ethernet directly apply to 802.11x - MAC spoofing/flooding, ARP cache redirection and poisoning, MITM attacks etc.). If you must use wireless, at the very least have a VPN capability with the AP on the outside of the firewall; make sure to use x.509 client certs, conventionally keyed VPNs are relatively easy to compromise these days. Steve Uhrig wrote: Questions on basic security for you wireless data guys out there. Not my area and I'm trying to learn at least enough to discuss it intelligently: ---------- I imagine it would be fairly easy to steal an access point. People drop them down behind desks and such. Do access points contain encryption keys and other security settings? If not, where is the decryption done, presuming the user enables it to start with? Could a thief could take an access point back to their place, and take their time to extract security settings of the AP, MAC address of other network devices, etc.? How difficult might this be for a reasonably capable operator with some funding? Unless someone physically noticed the lesser coverage, I imagine a theft of one might go unnoticed, esp in places where someone bootlegged one which I understand is not unusual. ------------ Would appreciate info on this. Then will prob have more questions. Tks .. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links --------------------------------- Do you Yahoo!? Yahoo! Photos: High-quality 4x6 digital prints for 25¢ [Non-text portions of this message have been removed] 8492 From: David Alexander Date: Fri Apr 23, 2004 3:36am Subject: RE: Re: Question on wireless LANs Sorry folks, I should have made myself clear and I apologise for not doing so. Even if you implement CISCO 802.11, you should still use a client-based VPN tunnelling tool running to a VPN concentrator in a DMZ outside the internal domain. I did mention it, but didn't say you should do this no matter what. I throw myself on the mercy of the group David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: Brian Varine [mailto:bvarine@p...] Sent: 22 April 2004 01:27 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Question on wireless LANs David pretty much summed it up but you should be aware that even Cisco LEAP has been exploited. Just from what I've seen in the last few years it seems like most 802.11 security features turn up flawed. What is even more amazing is that 70% of Wireless networks have no security turned on at all. It's one of the first things I look for (and find) when performing a network security audit. I like to tell people that 90% of corporations have wireless networks.....20% actually know about it. Asleap - Cisco Attack Tool http://www.securiteam.com/tools/5TP012ACKE.html A quick summary of asleap features are as follows: + Can read live from any wireless interface in RFMON mode with libpcap. + Can monitor a single channel, or perform channel hopping to look for target networks running LEAP. + Will actively de-authenticate users on LEAP networks, forcing them to re-authenticate. This makes the capture of LEAP passwords very fast. + Will only de-authenticate users who have not already been seen, doesn't waste time on users who are not running LEAP. + Can read from stored libpcap files, or AiroPeek NX files (1.X or 2.X files). + Uses a dynamic database table and index to make lookups on large files very fast. Reduces the worst-case search time to .0015% as opposed to lookups in a flat file. + Can write *just* the LEAP exchange information to a libpcap file. This could be used to capture LEAP credentials with a device short on disk space (like an iPaq), and then process the LEAP credentials stored in the libpcap file on a system with more storage resources to mount the dictionary attack. Upon advising the Cisco PSIRT team, Joshua was asked to wait for six months until February 2004 before making the tool publicly available. In the end of January 2004, Cisco PSIRT asked me to wait another few months while they finished testing the EAP-FAST protocol, the designated replacement for the flawed LEAP protocol. After working out a release date with Cisco, Joshua is making the source for asleap v1.0 available including a partial-functionality Win32 port. Joshua encourages LEAP users to install and use asleap to evaluate the risks of using LEAP as a mechanism to protect the security of wireless networks. Windows users can use third-party wireless sniffer tools including AiroPeek NX to capture the LEAP authentication exchange to test the security of LEAP user passwords. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8493 From: Shawn Hughes Date: Fri Apr 23, 2004 3:41pm Subject: Re: Digest Number 1545 I've often wondered about this. Do you really experience any gains, or should I continue to consider getting a card with an antenna jack? Also, At those frequencies, isn't any cable use at all very lossy? Without spending a bundle, can anybody suggest which card to buy? Which format? I got out of mobile computing for a while, but I am interested in WiFi and want to tinker with it a little..... -Shawn Tactical Response, Inc. At 01:04 PM 4/23/04 , you wrote: >The PCMCIA card is a $23 Zonet (which is hotter than a firecracker on >receive) a close coupled 5db panel below the card, and a pringles cantenna >for directionality on the other end of the cable (passive repeater >confguration). This allows me to greatly vary antenna gain/attenuation in >congested places. 8494 From: kondrak Date: Sat Apr 24, 2004 3:42am Subject: Re: Digest Number 1545 No sir, gain is not an issue here....the de-coupleing of having the PCMCIA card sit on the 5db panel is lossy, the cable (RG-213U is lossy) and the can-tenna is gainful, and directional. This is NOT a design for gain, more an ability to couple to a directional assembly for that purpose, directionality is the prime directive.....I cant document the losses..nor do I need to for this application. In severe cases, where a LOT of signal is there, a cover of aluminium foil over the PCMCIA card and the 5db panel is used to minimize extraneous input to the feed path. (one might need to introduce added losses via an attenuator in severe environments, which I can do). All I can say is results may vary, and yours may or may not perform as mine does...experience will determine the ability of any card with this situation to perform as mine does. After using it for a while, one becomes familiar with its nuances, its a cobble job, that seems to work for me. I'm an experimenter, and this worked for me.. At 16:41 4/23/2004, you wrote: >I've often wondered about this. Do you really experience any gains, or >should I continue to consider getting a card with an antenna jack? Also, >At those frequencies, isn't any cable use at all very lossy? > >Without spending a bundle, can anybody suggest which card to buy? Which >format? I got out of mobile computing for a while, but I am interested in >WiFi and want to tinker with it a little..... > >-Shawn >Tactical Response, Inc. > > >At 01:04 PM 4/23/04 , you wrote: > >The PCMCIA card is a $23 Zonet (which is hotter than a firecracker on > >receive) a close coupled 5db panel below the card, and a pringles cantenna > >for directionality on the other end of the cable (passive repeater > >confguration). This allows me to greatly vary antenna gain/attenuation in > >congested places. > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 8495 From: Steve Weinert Date: Fri Apr 23, 2004 1:27pm Subject: RE: Re: Fw: WWW Form Submission Our SAIC gave me one like this to interview when I was newly assigned to the FO. I did a Medical Referal on the spot. The person had such a huge drug problem in this case that they need extended inpatient treatment. Of course it could be a simple wind-up hoax too... Steve W > -----Original Message----- > Date: Thu, 22 Apr 2004 14:06:55 -0400 > From: Spook > Subject: Re: Fw: WWW Form Submission > > She needs to seek immediate psychiatric psychologic help, NOT waste money > on TSCM or deal with anyone other then someone in the medical community. > > -jma > > > > At 02:44 AM 4/22/2004, Steve Whitehead wrote: > >Perhaps a US list member can assist? > > > > > >----- Original Message ----- > >From: > >To: > >Sent: Thursday, April 22, 2004 12:08 AM > >Subject: WWW Form Submission > > > > > > > Below is the result of your feedback form. It was submitted by > > > (teredo8@a...) on Thursday, April 22, 2004 at 00:08:10 > > > > -------------------------------------------------------------------------- > >- > > > > > > comments: I think your website is terrific and certainly much > needed.My > >name is Teresa Dohr and I have been so afraid for my life in the > past 31/2 > >months. Someone is following me and has also tapped my > phone,parents phone > >and our cars.They have changed dead bolts that use to be metal > now they are > >plastic our peeky hole you can see in and out instead of just out .On my > >purse it seemed like something was lasered or heated into my > shoes and purse > >possibly my coat also,it was makeing all kinds of strange tones > and I know > >for a fact someone is trying to either kill me or kidknapp me. I am a 43 > >yr.old women w/a 14 year old son .I dont know what these people > want or who > >they are,it seems like they are waiting for a window of > opportunity to kill > >me and dispose of my bodt.All of this started after I had a spinal fusion > >that did get staph infection in it,I think the Drs. put a hit out on my > >life.Maybe they think I am goining to sue them .I am not,but maybe that's > >what dr.Frank Phillips and Dr. Doolas (general surgeon)at Rush > Presbaterian > >St.Lukes in Chicago Il.Please for the sake of my little boy > could you please > >tell me what to do I am so frightened.My son needs his mother he has no > >brothers or sisters or a father.I am begging for your > help.Please e-mail me > >at teredo8@a... or write me at 840 rolling > pass,Glenview,Il.60025 All the > >phones are tapped even at my parents house and the cars. > > > > > > category: website > > > > > > name: Teresa Dohr > > > > > > company: A mother 43 years of age w/14 yr.old son > > > > > > Address: 840 Rolling Pass ,Glenview Il 60025.Thankyou .Please > Don't forget > >this.sincerly teresa L Dohr > > > > > > tel_number: 847-251-5441 This is my girl friend Paulas > > > > > > fax_number: # you may call. > > > > > > > 8496 From: William Knowles Date: Sat Apr 24, 2004 10:39pm Subject: RE: Re: Fw: WWW Form Submission She's less than ten minutes from me, & its a fairly nice neighborhood. I can only imagine her state of mind if the Naval Air Station was still operational, she would be blaming the C-130's for relaying her thoughts back to the NSA. I'll be happy to forward the note to the local police or mental health professionals if you guys think it will help. William Knowles wk@c... On Fri, 23 Apr 2004, Steve Weinert wrote: > Our SAIC gave me one like this to interview when I was newly > assigned to the FO. I did a Medical Referal on the spot. The > person had such a huge drug problem in this case that they need > extended inpatient treatment. > > Of course it could be a simple wind-up hoax too... > > Steve W > > > -----Original Message----- > > Date: Thu, 22 Apr 2004 14:06:55 -0400 > > From: Spook > > Subject: Re: Fw: WWW Form Submission > > > > She needs to seek immediate psychiatric psychologic help, NOT > > waste money on TSCM or deal with anyone other then someone in the > > medical community. > > > > -jma > > > > > > > > At 02:44 AM 4/22/2004, Steve Whitehead wrote: > > >Perhaps a US list member can assist? > > > > > > > > >----- Original Message ----- > > >From: > > >To: > > >Sent: Thursday, April 22, 2004 12:08 AM > > >Subject: WWW Form Submission > > > > > > > > > > Below is the result of your feedback form. It was submitted by > > > > (teredo8@a...) on Thursday, April 22, 2004 at 00:08:10 > > > > > > -------------------------------------------------------------------------- > > >- > > > > > > comments: I think your website is terrific and certainly much > > > needed.My name is Teresa Dohr and I have been so afraid for my > > > life in the past 31/2 months. Someone is following me and has > > > also tapped my phone,parents phone and our cars.They have > > > changed dead bolts that use to be metal now they are plastic our > > > peeky hole you can see in and out instead of just out .On my > > > purse it seemed like something was lasered or heated into my > > > shoes and purse possibly my coat also,it was makeing all kinds > > > of strange tones and I know for a fact someone is trying to > > > either kill me or kidknapp me. I am a 43 yr.old women w/a 14 > > > year old son .I dont know what these people want or who they > > > are,it seems like they are waiting for a window of opportunity > > > to kill me and dispose of my bodt.All of this started after I > > > had a spinal fusion that did get staph infection in it,I think > > > the Drs. put a hit out on my life.Maybe they think I am goining > > > to sue them .I am not,but maybe that's what dr.Frank Phillips > > > and Dr. Doolas (general surgeon)at Rush Presbaterian St.Lukes in > > > Chicago Il.Please for the sake of my little boy could you please > > > tell me what to do I am so frightened.My son needs his mother he > > > has no brothers or sisters or a father.I am begging for your > > > help.Please e-mail me at teredo8@a... or write me at 840 > > > rolling pass,Glenview,Il.60025 All the phones are tapped even at > > > my parents house and the cars. > > > > > > > category: website > > > > > > > > name: Teresa Dohr > > > > > > > > company: A mother 43 years of age w/14 yr.old son > > > > > > > > Address: 840 Rolling Pass ,Glenview Il 60025.Thankyou .Please > > > > Don't forget > > > > this.sincerly teresa L Dohr > > > > > > > > tel_number: 847-251-5441 This is my girl friend Paulas > > > > > > > > fax_number: # you may call. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ---------------------------------------------------------------- C4I.org - Computer Security, & Intelligence - http://www.c4i.org ================================================================ Help C4I.org with a donation: http://www.c4i.org/contribute.html *==============================================================* 8497 From: steveuhrig Date: Sat Apr 24, 2004 10:45pm Subject: Re: Fw: WWW Form Submission --- In TSCM-L@yahoogroups.com, William Knowles wrote: > She's less than ten minutes from me, & its a fairly nice neighborhood. > I'll be happy to forward the note to the local police or mental health > professionals if you guys think it will help. Why not sit across the street from her place and play games with a laser pointer? 8498 From: Hawkspirit Date: Sun Apr 25, 2004 10:56am Subject: Sergio's Passing Sorry to hear about Sergio's passing, he used to come over to my office in Hollywood many years ago and talk shop. I always appreciated how he was always willing to share info and techniques. A very nice guy! Roger Tolces Electronic Security Co www.bugsweeps.com Sergio Borquez is a retired DEA agent who was the agent-in-charge of electronic surveillance for that federal agency in the southwestern United States and northern Mexico. Sergio's 31 years of experience in the field and his continuing contact with federal and local law enforcement provide him with extra insight into how your room and telephone conversations can be compromised, and how to ferret out the methods and devices currently being used to monitor your private communications. Sergio's background includes a B.S. degree from San Francisco State University and military service during the Korean War as an artillery forward observer with the Army's 82nd Airborne Division. [Non-text portions of this message have been removed] 8499 From: Date: Sun Apr 25, 2004 2:37pm Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 8500 From: Shawn Hughes Date: Sun Apr 25, 2004 7:23pm Subject: Re: WiFi Thanks to all who responded on and off line. One last off-topic question, with so many standards (a,b,g,n, others) in order to be as compatible as possible with as many systems as possible, how many systems should my card be compatible with? I fear the VHS vs. Beta issue.... -Shawn 8501 From: Robert Dyk Date: Sun Apr 25, 2004 9:37pm Subject: RE: Sergio's Passing I am saddened to hear about the death of Sergio Borquez. I was fortunate enough spend a work week together with him (and others) on a course in Texas a few years ago. I remember him as a jovial, forthcoming and generous individual who was happy to regale us all with stories about his days in the service and with the DEA. It was an honour to have known him. Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: April 25, 2004 11:57 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Sergio's Passing Sorry to hear about Sergio's passing, he used to come over to my office in Hollywood many years ago and talk shop. I always appreciated how he was always willing to share info and techniques. A very nice guy! Roger Tolces Electronic Security Co www.bugsweeps.com Sergio Borquez is a retired DEA agent who was the agent-in-charge of electronic surveillance for that federal agency in the southwestern United States and northern Mexico. Sergio's 31 years of experience in the field and his continuing contact with federal and local law enforcement provide him with extra insight into how your room and telephone conversations can be compromised, and how to ferret out the methods and devices currently being used to monitor your private communications. Sergio's background includes a B.S. degree from San Francisco State University and military service during the Korean War as an artillery forward observer with the Army's 82nd Airborne Division. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8502 From: William Knowles Date: Mon Apr 26, 2004 0:09am Subject: Re: Re: Fw: WWW Form Submission On Sun, 25 Apr 2004, steveuhrig wrote: > --- In TSCM-L@yahoogroups.com, William Knowles wrote: > > > She's less than ten minutes from me, & its a fairly nice > > neighborhood. > > > I'll be happy to forward the note to the local police or mental > > health professionals if you guys think it will help. > > Why not sit across the street from her place and play games with a > laser pointer? Heh, quite alright, I hate explaining shotgun blasts to my insurance company. From the messages of some of the local members, it appears this lady is a frequent flyer with the local doctors, and really should be consulting the local Rubber Ramada over the local TCSM practitioners. William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ---------------------------------------------------------------- C4I.org - Computer Security, & Intelligence - http://www.c4i.org ================================================================ Help C4I.org with a donation: http://www.c4i.org/contribute.html *==============================================================* 8503 From: David Alexander Date: Mon Apr 26, 2004 5:15am Subject: RE: Re: WiFi Shawn Make sure you buy a card that has the ability to accept firmware upgrades to the latest version - once one is approved that deals properly with security (maybe the end of the year). Buy a card and perform the upgrade when the firmware is released. Regards Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: Shawn Hughes [mailto:srh@e...] Sent: 26 April 2004 01:24 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: WiFi Thanks to all who responded on and off line. One last off-topic question, with so many standards (a,b,g,n, others) in order to be as compatible as possible with as many systems as possible, how many systems should my card be compatible with? I fear the VHS vs. Beta issue.... -Shawn ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8504 From: radioencryption Date: Sun Apr 25, 2004 0:49am Subject: Cavity Bug (Great Seal Bug) Tech Questions. Hi, I have some questions regarding the great Seal Bug. This was a "bug" planted in the Great Seal behind the ambassadors desk in Moscow. The device consisted of a small metal cyclinder containing an internal metal adjustable height mushroom. The endwall opposite the mushroom was made of a thin metallic diaphragm which would vibrate when exposed to audio. A small antenna entered the cylinder. The device was totally passive. It contained no power source.(See URL at end of my message). *Apparently the "howl" frequency was 1800Mhz however the operating frequency of the device was found to be 800Mhz (info from Spycatcher book). What are the maths for determining the dimensions/resonant frequency of such a device? It seems that Peter Wright determined the frequency by sweeping the device...there must be some maths that would be able to better predict the "operating" frequency. *Why isn't the howl frequency the same as the operating frequency? *What kind of modulation would result when the "diaphragm" vibrates with audio. Is it AM? Would the modulation be very low (ie 5%)? My interest is purely academic. I have read conflicting accounts of this device and would like some "expert" opinion. Regards From, Henry. PS:Here is a URL related to the Great Seal. http://www.spybusters.com/Great_Seal_Bug.html PPS: There is a bit written about this device (nicknamed "The Thing" in the Peter Wright biography titled "Spycatcher"). Also some mention in Keith Meltons book on spy gadgets. 8505 From: Thomas Shaddack Date: Sun Apr 25, 2004 8:59pm Subject: Re: Re: WiFi > One last off-topic question, with so many standards (a,b,g,n, others) in > order to be as compatible as possible with as many systems as possible, > how many systems should my card be compatible with? I am afraid nobody knows now. The possibility of multistandard cards, or simultaneous use of two cards and USB adapters, should substantially alleviate the painfulness of this question. My scientific wild-ass guess would be to focus on 802.11b/g. 802.11g is backwards compatible with 802.11b, both in card-accesspoint and accesspoint-card combination. 802.11g is faster (up to 54 Mbps) than 802.11b (up to 11 Mbps), both use the 2.4 GHz band. There is an active web of community wireless networks here, known as CZFree; their infrastructure is built on 802.11b and 802.11g. Part of the infrastructure is also built on a peculiar technology, Ronja optical transceivers - 10 Mb over standard LEDs, open-source hardware, because of rather narrow directionality suitable for fixed installations only. (Should prod at Clock to run some tests with the new ultra-bright Luxeon modules.) I personally got a cheap 802.11b card, the XI-325 one (there is a variant of it with a 100 mW transmitter, but I would advise against it unless you need the power, as its output power can't be regulated, which can be a big disadvantage); it has a Prism-II chipset that is well-supported in both Windows and Linux. Bigger issue is the card's chipset. Prism/2 and Prism/2.5 tend to be well-supported and used by many vendors. There is a list of cards known to be supported by Kismet: http://www.kismetwireless.net/cards.shtml - a list of all known cards to work/not work with Linux drivers is linked from there. Windows compatibility should be a smaller issue as the card vendors bundle the necessary drivers. 802.11a is too rare to see in the wild (at least here, and I didn't hear people talk about it much, nor met any equipment in mainstream sale), so it's likely to be difficult to find and more expensive. It works in the 5 GHz band, so won't be susceptible to the interference in the increasingly overcrowded 2.4 GHz band, which is IMHO about its only advantage. I wouldn't worry about 802.11n yet - the standardization efforts barely began and it seems it won't be ratified before 2005 or 2006. It is likely to run in 5 GHz anyway, so will be physically incompatible with b/g. > I fear the VHS vs. Beta issue.... Shouldn't be that bad. The same problem was with DVD writers, with DVD+R/RW and DVD-R/RW standards - the solution had the form of writers supporting both (I got a MSI one, after much deciding which standard will be better). (The other standard, DVD-RAM, seems to be dead, or heading there.) If the VHS and Beta tapes would have the same physical medium, I suppose the same thing would happen there too. There will be an interesting situation of the same kind in the emerging field of blue-laser DVD writers... From: Steve Uhrig Date: Tue Apr 22, 2003 10:02pm Subject: Enemy of the State If anyone cares, movie is starting now (2300 local EDT) on FX channel. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7234 From: Date: Wed Apr 23, 2003 4:13am Subject: CALEA responsibilities fiducianet Signs Cbeyond Communications HERNDON, Va.--(BUSINESS WIRE)--April 23, 2003--fiducianet, inc.(TM) the nation's first service bureau designed to allow telecommunications carriers to outsource their subpoena processing and court ordered technical assistance in support of law enforcement, achieved another milestone by signing Cbeyond Communications, a telecommunications service provider based in Atlanta, Georgia. Cbeyond, a Cisco Powered Network provider, has been providing small businesses an integrated package of local, long distance and broadband Internet since March 2001. "Cbeyond is our second customer to provide advanced voice and data services to their customers utilizing Cisco Architecture," said Mike Warren, President of fiducianet. "This customer win, when added to others from the TDMA and wireless carrier market, provides us with a broad and deepening experience base," Warren continued. "fiducianet will be using equipment from its lawful intercept partner, SS8 Networks, to assure Cbeyond is meeting their CALEA responsibilities, in addition to our own innovative document production system, to respond to subpoenas and court orders for customer records," Warren added. "We chose fiducianet because they offered a comprehensive service that addressed not just our CALEA needs but also the potentially significant burden of responding to legal demands for customer records," said Chris Gatch, Cbeyond's Chief Technology Officer. "They have deep domain knowledge, a good grasp on the engineering challenges of intercepts in a VoIP network and a history of providing these services to telecommunications carriers. We wanted to tap into that expertise," continued Gatch. fiducianet has customers ranging from large carriers with tens of millions of customers to small local exchange carriers who have provided rural telephone service for more than 80 years. "At this juncture our operations group has successfully handled literally thousands of subpoenas for multiple customers. And, the records production team's work has drawn strong accolades from law enforcement and our customers," offered Doug McCollum, fiducianet's General Counsel and VP of Services. "Where we have differentiated ourselves from our competition is in the practical application of technology, which limits the carriers' cost for CALEA implementation and provides a comprehensive service to handle the avalanche of subpoenas and court orders carriers are receiving from law enforcement and civil litigants," added Mike Warren. About Cbeyond Communications Cbeyond Communications, the world's first 100% Internet Protocol (IP) local phone network, is a privately held, telecom service provider. Using Internet Protocol (IP) architecture and a 100% Cisco network, Cbeyond delivers to small business customers an integrated package of carrier-grade local and long distance telephony services, high-speed Internet access and Internet-based applications. Cbeyond serves customers in Atlanta, Dallas and Denver. Cbeyond is fully funded for the markets it operates in, with investment being led by Madison Dearborn Partners. Additional investors include Battery Ventures, Vantage Point Venture Partners, Morgan Stanley Capital Partners, and company management. For more information on Cbeyond Communications, visit the website at www.cbeyond.net. About fiducianet, inc.(SM) fiducianet, inc.(SM) is headed by Michael Warren, a 29 year veteran of the FBI who was in charge of CALEA implementation for the Bureau before retiring in September 2000. The name fiducianet derives from the Latin word fiducia or "trust" in English. As Carrier Agent fiducianet, inc.(SM) provides full-service outsourcing for the management of a carrier's compliance with subpoenas and court ordered records production, and it can also handle a carrier's obligations under lawful electronic surveillance law, including CALEA, USA PATRIOT Act, ECPA, T-III, and FISA. fiducianet, inc.(SM) frees carriers to focus on their core business of running a telecommunications company. Visit the website at www.fiducianet.biz. CONTACT: fiducianet, inc. Brian Durham, 703/796-1100 ext 12 www.fiducianet.biz SOURCE: fiducianet, inc. Today's News On The Net - Business Wire's full file on the Internet with Hyperlinks to your home page. URL: http://www.businesswire.com 04/23/2003 06:00 EASTERN [Non-text portions of this message have been removed] 7235 From: Vic Healey Date: Mon Apr 21, 2003 10:47pm Subject: FW: Now Digital, Spy Camera Technology Widens Gaze -----Original Message----- From: 4phun ≤∫∫≥ [ Subject: Now Digital, Spy Camera Technology Widens Gaze Vis Media Digital video clips of suspects are displayed. The I.B.M. system images can be shown at a police station or sent across networks for others to see. ---------------------------------------------------------------------------- ---- April 21, 2003 Now Digital, Spy Camera Technology Widens Gaze By LAURIE J. FLYNN ceiling-mounted electronic eye captures every transaction at the cash register. In the parking garage, more tiny cameras record every arrival and departure. To many business owners, these aspects of modern life seem a small price to pay for personal safety. But to some customers, they are new examples of Big Brother run amok. The use of surveillance cameras in private businesses and public spaces has been a matter of debate for some time. But even as the controversy becomes more heated, the use of surveillance equipment is surging, driven by new digital technology, falling prices and terrorism jitters. Sales of digital surveillance systems and the services required to install them are growing rapidly at a time sales of many other technologies are limited by tight corporate budgets. In the United States, annual sales of digital surveillance products and services is expected to reach $8.5 billion by the end of 2005. That is up from $5.7 billion in 2002, according to J. P. Freeman, a market research company in Newtown, Conn. One indication this trend will accelerate was the announcement by I.B.M. last month that it would offer a new package of consulting and system-design services for digital network-based video surveillance systems. I.B.M. evidently thinks that retail stores, corporations and government agencies will soon abandon older analog videotape systems and move the management of these surveillance operations to corporate information technology departments. "Corporations need to reduce costs and become more effective," said Michael Maas, vice president for marketing at I.B.M.'s communications sector in Armonk, N.Y. "Digitization of security does that." While many companies are switching to digital video security, most retail and hotel businesses are still using videotape systems. Law enforcement appears to be making the transition somewhat faster. As part of its new strategy, I.B.M. said, it now has 3,000 consultants to help customers incorporate digital video security into their existing information technology operations. The hope is that the businesses that have hired I.B.M. to protect their data will use its services for digital surveillance and buy more of its hardware, as well. "This gives I.B.M. the opportunity to be a one-stop operation," said Joseph Freeman, J. P. Freeman's chief executive. But selling physical security systems to information technology departments may prove hard even for I.B.M. Most security systems are still managed by old-school security officers. Managing security "has been going on in an ad hoc way down in the basement," said Lou Latham, an analyst at Gartner, a consulting firm. "It's a business that's industrial, and not considered an information technology thing." But now it is possible to integrate surveillance systems into corporate networks and databases. Unlike videotape systems, digital images stored on DVD's or CD's can be indexed and searched easily. Using digital video, investigators can, for instance, nearly instantly retrieve images of every person who passed through a door on a certain day. Digital video's other advantage is that its images can be quickly transmitted over networks. Police officers responding to a robbery can view surveillance images in their squad cars. And digital video systems can be used in conjunction with other corporate security systems, like badge readers and alarms. With criminal databases and pattern-matching algorithms, new digital equipment can analyze activity caught on camera, even as it is taking place, and can detect the presence of weapons. Compared to these features, analog video looks downright rudimentary. Videotape deteriorates over time, posing significant storage problems and requires the installation of a video recorder on every camera. And tape can be painstakingly slow and inefficient to use in a criminal investigation, Mr. Latham said. National Car Parks of London has already upgraded to digital video surveillance equipment, having installed 400 cameras in its parking lots throughout Britain. Each garage can be monitored from a control room using a digital network, reducing crime, according to I.B.M. And having the ability to monitor traffic and crime patterns in each garage allows the company to use its staff better to focus on trouble spots. The digital surveillance equipment market is fiercely competitive, with many specialized manufacturers and systems integrators. CCS International and Pelco, leaders in the surveillance equipment industry, have sold to corporations and government agencies for more than a decade. Panasonic, Sony, Sanyo and other camera and equipment makers have also succeeded in finding their own niches in the security field. ---------------------------------------------------------------------------- ---- I've stopped 276 spam messages. You can too! Get your free, safe spam protection at www.cloudmark.com [Non-text portions of this message have been removed] 7236 From: Gregory Perry Date: Tue Apr 22, 2003 11:48am Subject: Re: Fwd: [ISN] New spy tools--for good or evil? Wow, big surprise. Cisco also made billions creating the Great Firewall of China, chocked full of neato things like transparent DNS redirection, realtime traffic analysis, and keyword search capability to help quash political dissent. Unfortunately, political dissent in China is an offense punishable by firing squad. And your family gets a bill for the bullet they use. But not to worry, those type of inconveniences only happen in countries with facist dictatorships and a willing populace. Gregory Perry --------------------------------- "Nuclear war would really set back cable." -- Ted Turner The following message was sent by kondrak on Tue, 22 Apr 2003 04:45:23 -0400. > > > > > > >http://zdnet.com.com/2100-1107-997590.html > > > >By Declan McCullagh > >CNET News.com > >April 21, 2003 > > > >COMMENTARY -- Cisco Systems has created a more efficient and targeted > >way for police and intelligence agencies to eavesdrop on people whose > >Internet service provider uses their company's routers. > > > >The company recently published a proposal that describes how it plans > >to embed "lawful interception" capability into its products. Among the > >highlights: Eavesdropping "must be undetectable," and multiple police > >agencies conducting simultaneous wiretaps must not learn of one > >another. If an Internet provider uses encryption to preserve its > >customers' privacy and has access to the encryption keys, it must turn > >over the intercepted communications to police in a descrambled form. > > > >Cisco's decision to begin offering "lawful interception" capability as > >an option to its customers could turn out to be either good or bad > >news for privacy. > > > >Because Cisco's routers currently aren't designed to target an > >individual, it's easy for an Internet service provider (ISP) to comply > >with a police request today by turning over all the traffic that flows > >through a router or switch. Cisco's "lawful interception" capability > >thus might help limit the amount of data that gets scooped up in the > >process. > > > >On the other hand, the argument that it hinders privacy goes like > >this: By making wiretapping more efficient, Cisco will permit > >governments in other countries--where court oversight of police > >eavesdropping is even more limited than in the United States--snoop on > >far more communications than they could have otherwise. > > > >Marc Rotenberg, head of the Electronic Privacy Information Center, > >says: "I don't see why the technical community should hardwire > >surveillance standards and not also hardwire accountability standards > >like audit logs and public reporting. The laws that permit 'lawful > >interception' typically incorporate both components--the > >(interception) authority and the means of oversight--but the (Cisco) > >implementation seems to have only the surveillance component. That is > >no guarantee that the authority will be used in a 'lawful' manner." > > > >U.S. history provides many examples of government and police agencies > >conducting illegal wiretaps. The FBI unlawfully spied on Eleanor > >Roosevelt, Martin Luther King Jr., feminists, gay rights leaders and > >Catholic priests. During its dark days, the bureau used secret files > >and hidden microphones to blackmail the Kennedy brothers, sway the > >Supreme Court and influence presidential elections. Cisco's Internet > >draft may be titled "lawful interception," but there's no guarantee > >that the capability will always be used legally. > > > >Still, if you don't like Cisco's decision, remember that they're not > >the ones doing the snooping. Cisco is responding to its customers' > >requests, and if they don't, other hardware vendors will. If you're > >looking for someone to blame, consider Attorney General John Ashcroft, > >who asked for and received sweeping surveillance powers in the USA > >Patriot Act, along with your elected representatives in Congress, who > >gave those powers to him with virtually no debate. > > > >I talked with Fred Baker, a Cisco fellow and former chairman of the > >Internet Engineering Task Force (IETF), about his work on the "lawful > >interception" draft. > > > > > >Q: Why did Cisco decide to build "lawful interception" into its > >products? What prompted this? > > > >A: Cisco's customers, not just in United States but in many countries, > >are finding themselves served with subpoenas to mandate lawful > >intercept functionality. Cisco received requests from its customers > >for this capability. > > > >When I found out about the project, I asked to be involved because I > >wanted to ensure that it was done in a manner that was as close to > >balanced as I could get. From an engineering perspective, the easiest > >thing is to give everything to law enforcement and let them sort it > >out. But I wanted to do better than that. > > > > > >When was that? > > > >The actual development of this document started probably seven to > >eight months ago. > > > > > >What was the reaction of the Internet community and the IETF after you > >released the draft? > > > >I've seen very little reaction so far. We have been contacted by > >Verisign, with which we had an NDA relationship. They said, "We'd like > >to work with you on this." That's about all we've had. John Gilmore > >(of the Electronic Privacy Information Center) posted comments to an > >IETF mailing list. He wanted to ensure that the capability would be as > >difficult to use as possible. > > > > > >When will Cisco's customers be able to buy "lawful interception" > >products or an upgrade? > > > >We haven't yet announced anything. Any product that a service provider > >is likely to purchase will have an option to provide lawful > >interception. That's not for all of our products but for a fairly > >broad subset. > > > >We're in the process of doing early field trials on that capability. > >In most cases it's a software upgrade. What we're doing is putting the > >capability in a separate image so you know what you're getting when > >you get it. Under U.S. law, if you have that ability, you could be > >required to use it. Our service provider customers have asked us not > >to put it in the standard image, so that they can't be forced to use > >it. > > > > > >How much will it cost? > > > >We haven't announced that. There was some discussion at some point > >about putting in a nuisance fee. > > > > > >What percentage of your customers who have asked for "lawful > >interception" capability are within the United States? > > > >We have service provider customers in a number of countries that have > >asked us for it. Some have been more insistent than others. > > > > > >Do you have any moral problems with helping to make surveillance > >technology more efficient? > > > >I have some moral and ethical issues, but I think quite frankly that > >the place to argue this is in Congress and in the courtroom, not a > >service provider's machine room when he's staring down the barrel of a > >subpoena. > > > >There are two sides. One is that Cisco as a company needs to let its > >customers abide by the law. The other is the moral and ethical issues. > >There are two very separate questions. > > > > > >The current draft does not include an audit trail. Could you do that > >by having your equipment digitally sign a file that says who's been > >intercepted and for how long? That could be turned over to a judge. It > >could indicate whether the cops were or weren't staying within the > >bounds of the law. > > > >I'm not entirely sure that the machine we're looking at could make > >that assurance... In fact, the way lawful interception works, a > >warrant comes out saying, "We want to look at a person." That's the > >way it works in Europe, the United States, Australia and in other > >western countries. The quest then becomes figuring out which equipment > >a person is reasonably likely to use, and it becomes law enforcement's > >responsibility to discard any information that's irrelevant to the > >warrant. That kind of a thing would probably be maintained on the > >mediation device. > > > > > >Who controls the mediation device? > > > >The Internet provider. The mediation device picks out the subset that > >relates to a particular warrant. > > > > > >A few years ago (in RFC 2804) the IETF rejected the idea of building > >eavesdropping capability into Internet protocols. The FBI supported > >the idea, but the IETF said, no way. You were chair of the IETF at the > >time. How do you reconcile your proposal with the decision made then? > > > >I thought that what the IETF decided to do was actually the right > >thing to decide. What it said is that the IETF would not modify > >protocols that were designed for some other purpose in order to > >support lawful interception. > > > > > >Will you discuss this at the next IETF meeting in Austria in July? > > > >We're hoping for community review. If people see any problems with > >what we're doing on a technical level, we're all ears. We want to > >produce the best possible capability in terms of security and the > >capability required. > > > > > >Have you had requests for this capability, directly or indirectly, > >from government agencies? > > > >Yes and no. We got the request from our customers. The laws relate to > >the ISPs, which are our customers. Certainly, if we get a request from > >our customers that we can't support, there are penalties that accrue. > > > >We've had direct contact with the FBI and other agencies. When I was > >in Holland I (spoke at a conference with the head of the equivalent of > >the country's Central Intelligence Agency). The fact that he came out > >and said something made the 8 o'clock news. I had a meeting with him > >and some of his people a few days later to figure out what he wanted > >and what he intended to do with this. As an engineer I wanted to > >understand a customer's problem. > > > >We've had discussions with government agencies, but (they're generally > >not) asking us to build a product. They do that with ISPs, who then > >come to us. > > > > > >What other companies are going a similar route? > > > >We're a little bit more open than everyone else. It really wouldn't be > >appropriate for me to talk about other companies. It's not like we're > >coming out and saying, "Hey, this is the reason you should buy a Cisco > >router." This is something we're doing because our customers want it. > > > > > >What do you think of governments with scant respect for privacy rights > >using "lawful interception" technology to become more efficient > >eavesdroppers? Do you ever stay up late at night worrying about what > >they might do with it? > > > >Of course I do. But that problem is the reason I got involved. We have > >some capabilities in some of our equipment that will allow you to take > >all the traffic that goes across an interface and send it to another > >interface. Right now that is used in some cases as a lawful > >interception technology. > > > >When we first started talking, some engineers said, "Let's turn this > >on and use that." I said, "Heavens no, if we can narrow the range of > >information, let's do it." Let's let our customers meet their > >requirements in as privacy-protecting a way as possible. So yes, > >there's a conflict, but the conflict is why I got involved. > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 7237 From: Ocean Group - MU TSD Date: Tue Apr 22, 2003 0:57pm Subject: Passwords and Books.... Could everyone just email me your login and passwords and I'll pop the pen in the post. PS. Re: Steve's post about the good book.... Steve, wouldn't it be a good idea to maybe send out a list of say 10 "should have" tscm books, ones that you know are good and worth the money. I know JMA has alot of books listed but even he said some of the ones he has listed are rubbish, so why doesn't someone do out a list of the good ones. Say a couple from each sector of tscm ,ie,telephone, RF tx, lan, video etc....Like a good tscm reference library. When I say someone....I mean "someone" who knows!! Hint hint Steve!! :) http://www.theregister.co.uk/content/55/30324.html By John Leyden Posted: 17/04/2003 Workers are prepared to give away their passwords for a cheap pen, according to a somewhat unscientific - but still illuminating - survey published today. Cheers Oisin 7238 From: dj browne Date: Tue Apr 22, 2003 2:48pm Subject: Cisco Tapping for LEA Interesting RFC .... http://www.rfc-editor.org/internet-drafts/draft-baker-slem-architecture-00.txt __________________________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo http://search.yahoo.com 7239 From: Steve Uhrig Date: Wed Apr 23, 2003 10:45pm Subject: Recommended TSCM Books ? On 22 Apr 2003 at 18:57, Ocean Group - MU TSD wrote: > PS. Re: Steve's post about the good book.... > Steve, wouldn't it be a good idea to maybe send out a list of say 10 > "should have" tscm books, ones that you know are good and worth the > money. I know JMA has a lot of books listed but even he said some of the > ones he has listed are rubbish, so why doesn't someone do out a list of > the good ones. Say a couple from each sector of tscm ,ie,telephone, RF > tx, lan, video etc....Like a good tscm reference library. There aren't that many good books specific to TSCM. Ted's book on telephone countermeasures is a rare exception. I'm quick to speak my mind, both positive and negative. Ted did an excellent job on his book and I would recommend it to anyone. http://www.angelfire.com/biz/investigator/index.html for anyone who missed the beginning of the thread. Most of the ones recommended by various people are highly specialized, very narrow texts. They are for people who spend their entire careers on one aspect of something. For the most part, they will be a complete waste of time and money, especially for someone who doesn't have a firm grasp of the basics. I do understand the basics, have seen and studied many of the recommended books, and they were a waste of time for me. And narrow specialties go out of date so quickly, older books may be of little value even if you can absorb the info. If you're into history, fine. If you want practical info which will help the typical TSCMer novice or intermediate, they're generally not worth the money. I recommend *general* electronics and communications texts. Very VERY few people in this business have even rudimentary basic electronics understanding. They run around screaming gigahertz and lasers and know all the buzzwords, but they can't draw the schematic of a flashlight much less explain any of the terms they throw around so freely. I recommend Ted's book to all. I also recommend any relatively recent (last 10 years) of the annual Radio Amateur's Handbook published by the American Radio Relay League aka ARRL, www.arrl.org. You don't need the latest issue. Older copies go on ebay or newsgroups for $10 or $15. I have maybe 30 copies I use in training, as basic textbooks. These books were written as a universal reference for ham radio types, and start with basic DC theory and advance through AC theory, communications including audio, different types of modulation, transmitters, receivers, antennas, digital modes, video, etc. The whole schmear. This is exactly what most need. *Basic electronics theory* and *basic communications theory*. The ARRL handbooks can help you learn as much or as little as you want. As your interests or needs change, you can read a few more chapters. There also are construction projects to assist you in learning. Theory is good, but you need hands-on also. It's not a coincidence virtually all of the competent sweepers are hams. You don't have to get into ham radio to be a sweeper, but the same theory covers both. You might become interested in radio as a hobby, and many of us have enjoyed the ham radio hobby for much of our lives -- over 30 years in my case. Browsing some amateur radio (ham radio) magazines will be a good learning experience. 73 Magazine is my all time favorite, but I have known the publisher since I was a kid so I admit I am prejudiced. Another superb resource is the U.S. Navy basic electronics course. A fellow was selling the entire course scanned to CD a year ago. I don't know if he still is. I bought a few of the CDs from him. His website is down and his email address is no good, so he may be out of the business. I have a few of these CDs left for $50 shipped in the U.S., USD $60 shipped outside the U.S. if anyone wants one. Here's a review I wrote on the CD for one of the newsgroups a year ago: ========= > I took this exact course 30 years ago, except apparently it has been > updated as we did not cover fiber optics. Glad to see they left vacuum > tubes in though. > We did it all with slide rules. Solid state was around, but just > becoming popular. I was there at the fortunate time when they taught > vacuum tube theory because there were still a lot of tube stuff in the > field back then, but we were introduced to solid state also because it > was a transition time. Some of us grumbled, but we got more than the > earlier fellows who didn't get any solid state. > Was supposed to take 2 years at 9 months a year to complete the course, > but we had a cram course in 1 year. Lab, lecture, homework. > I don't see how it could have been any better. The instructor was > superb, the course material challenging but logical, and you learned > the basics from atomic theory and electrons up to large system level. > So few people know the basics, and knowing them makes everything easier > in electronics. I believe I spent perhaps a week learning the ham radio > rules and regs, got my Novice around then, then my Advanced only a few > months later. That course taught everything I needed to know, plus 99% > more as far as the technical aspects went. > I have no relationship with the seller, and he doesn't even know who I > am, but I highly recommend this course to anyone. Being on CD, you can > study at your own pace, not have it crammed down your throat. And now > you have calculators, although in the original course I took, > we used slide rules aka slipsticks. You can do more with a $3 plastic Pickett > than with a $100 calculator, except the calculator will not melt in the > heat of the car like my Pickett slide rule did when I missed the morning session FCC > test for Advanced and waited 'till the afternoon session. Ate lunch, > left my stuff in the car during a hot summer day, and returned to find > my beloved Pickett melted into an arc. I borrowed one and passed the > test. > Everyone I've ever worked with who went through Navy electronics > training was a superb tech, and when I hire techs, if I see Navy training I > don't look any further. > I can still hear the grizzled old Navy chief grouching over and over in > his gravelly voice, "Index to the first side, hairline to the other > two" when referring to the sides of a right triangle for calculating > phase angles and stuff with a slide rule. And the resistor color code. > How many of us learned it as "Bad Boys Rape Our Young Girls ..."? > Pleasant memories. Tough while I was in it, but rewarding and has > served me well throughout my career. Where the average tech guy I run > into anymore can not even draw the schematic of a flashlight, guys who > completed this Navy course can discuss phase angles and cosines and > the angle Theta and how individual voltage drops across components in > series can add up to more than the total applied voltage, etc. > Probably brings back memories for many of us. > Steve WA3SWS ========== My basic (formal) electronics training was the Navy electronics course in a vocational electronics program in high school. It's not easy. But make it through that, and you'll REALLY know what you're doing. And not many can say that. Get the basics out of the way, then worry about the specifics of the TSCM profession. There are some tricks to the trade, but until you have a firm grasp of the basics they will be of limited value. Even Ted's book will make more sense if you understand resistance, current flow and simple DC series circuits. You don't need to do calculus in your head. You do need to be able to do basic Ohm's law problems instinctively. You need to know the characteristics of capacitance and inductance and resistance. There also are some online electronics quizzes which are entertaining, maybe humbling, and educational. One set is here: http://twysted-pair.com/downloads.htm The first online lesson is free as a teaser to get you to buy additional ones. I don't have the URL, but there are online ham radio license exam quizzes for the various classes of licenses. Search for them and you'll find them. You don't need to know the band limits, legal stuff pertaining to ham radio, etc. (unless you'd like to try for a ham license) but you should know ALL the electronics and theory questions. 1)What's the period of a megahertz? 2)Which way does current flow using a battery? 3)What's the definition of a resonant circuit? (answers below) If you can't answer these instinctively in the time it takes to draw a breath, you don't understand the basics. And without basics, you really have no business in TSCM. If you're an enthusiast, learning or just curious, that's fine. If you make any pretense at practicing, though, you need knowledge. And you need to put something between your ears a lot worse than you need to buy equipment. A competent man who understands what he is doing can exist with less elaborate equipment. Fancier equipment is little more than playpen toys to someone who doesn't know what's really happening. And every competent TSCMer I've met is well capable of repairing his own equipment to the component level. Re hobby level books as opposed to formal texts, anything by M.L. Shannon is excellent. Available from better online stores. Info probably still on his website www.fusionsites.com. Surveillance and countersurveillance books. I would avoid the pure fiction, extreme prevarication and groupie bleatings by other authors, with books or tapes by Scott French/Lee Lapin (same person) being one glaring example not worth the postage it takes to ship. Same comment about the videotapes offered by Jim Ross, spy shops and others. They're OK if you need some amusement in your life, but as factual information they're not that. I think I'm getting the point across. And buying books doesn't teach you electronics any more than buying a diet book makes you lose weight. Buying stuff may give you a warm, wet feeling, but unless you learn it and apply it, you're only fooling yourself. Forget buying hardware. Put your money between your ears. You also could do as list member Andre Holmes did. He enrolled in local electronics courses, formal classroom teaching. I've known him a few years, we've discussed a lot of things offline, and he's come a long way, still on the fast track, and I'm proud of him. If you have the time, consider formal training. Check local community colleges and tech schools. I generally cannot recommend TSCM-specific training offered by various sources, especially any conducted by equipment manufacturers or resellers. Others may have different opinions and they are entitled to them. And I'd avoid any of the mail order things advertised in TV commercials. Answers to above: 1)A microsecond 2)Negative to positive external to the source, positive to negative internal to the source 3)When inductive reactance equals capacitive reactance Comments welcome. Temper tantrums or defending sacred cows are not. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7240 From: James M. Atkinson Date: Wed Apr 23, 2003 10:59pm Subject: Re: Passwords and Books.... At 6:57 PM +0100 4/22/03, Ocean Group - MU TSD wrote: >Could everyone just email me your login and passwords and I'll pop the pen >in the post. > > >PS. Re: Steve's post about the good book.... > >Steve, wouldn't it be a good idea to maybe send out a list of say 10 "should >have" tscm books, ones that you know are good and worth the money. >I know JMA has alot of books listed but even he said some of the ones he has >listed are rubbish, so why doesn't someone do out a list of the good ones. >Say a couple from each sector of tscm ,ie,telephone, RF tx, lan, video >etc....Like a good tscm reference library. > >When I say someone....I mean "someone" who knows!! Hint hint Steve!! :) Here are several tens of thousand of pages of stuff regarding TSCM: http://www.tscm.com/reference.html The library has been raided by others to hawk CD's or books... yet none of them give me credit for originally assembling the library. Also, if you go to my website: http://www.tscm.com/ you will find a huge mother-lode of free material all about TSCM. You can actually get more information regarding TSCM from my website for free; then you can from buying all the TSCM books ever written combined. More to follow... just watch what gets added to the site later this month. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7241 From: Charles P. Date: Wed Apr 23, 2003 11:03pm Subject: digit grabber auction A while back I seem to remember someone asking about a dtmf digit grabber... I just put one up on ebay if anyone is interested. http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category=3309&item=3020468016& rd=1 (free shipping if you mention that you're on this list) Charles 7242 From: Fernando Martins Date: Fri Apr 25, 2003 5:28pm Subject: Computer Associates Teams up With Pinkertons [this remind me the sadness that I felt when I read my avaliation from last year, saying that my ideas were not realistic, and that I should follow our core business ... I left IT security to join a physical and electronic security company, thinking that I could be an added value, but hell, who am I to know ?....] http://www.infosecnews.com/sgold/news/2003/04/23_01.htm Computer Associates Teams up With Pinkertons Computer Associates (CA) has become the latest IT company to forge a link with Pinkertons, the famous U.S. detective agency. The trend was first started back in 1996 by SAIC, since when several firms have teamed up with the agency for joint services. This month's deal - between CA and Pinkerton Consulting and Investigations - is described as a strategic alliance to allow customers to mitigate their business risks by protecting both cyber and physical assets. Under the agreement, Pinkerton will offer CA's range of eTrust security management offerings to its customers as part of an integrated risk mitigation program. www.ca.com www.ci-pinkerton.com CA press release http://www3.ca.com/press/PressRelease.asp?CID=41743 [...hmmm ... in my last job, CA gave me the complete eTrust software package to test and some trainning... will they (=where i work now) think this can be a added value? naaa ...FM] 7243 From: Date: Sun Apr 27, 2003 5:34am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7244 From: Date: Sun Apr 27, 2003 5:34am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7245 From: Robin Hunter Date: Fri Apr 25, 2003 0:14pm Subject: Far East Anybody out there who has done TSCM work in the Far East? We have just been asked to tender for a job there, might be flying out next week. Any advice on local infrastructure would be greatly appreciated. regards from Scotland, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. [Non-text portions of this message have been removed] 7246 From: Gil Zimmerman Date: Fri Apr 25, 2003 6:06pm Subject: RE: Computer Associates Teams up With Pinkertons I suppose this might be interesting...too bad Computer Associates didn't partner with a company with a better reputation. Just my 2-cents, though. Regards, Gil Zimmerman Erhart Sawyer International, Inc. gil@e... : www.esipi.com +(646) 872-5893 : +(646) 349-1485 (Fax) +(33) 01 53 01 65 92 Paris (Voice & Fax) NJ PI License No. 6869 Your "French (and global) Connection" -----Original Message----- From: Fernando Martins [mailto:fernando.martins@e...] Subject: [TSCM-L] Computer Associates Teams up With Pinkertons http://www.infosecnews.com/sgold/news/2003/04/23_01.htm Computer Associates Teams up With Pinkertons --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.474 / Virus Database: 272 - Release Date: 4/18/2003 7247 From: Date: Sat Apr 26, 2003 7:58am Subject: Regulators expand airwaves for emergency communication Federal regulators doubled the airwaves available for emergency and public safety workers Wednesday, giving a boost to police seeking better crisis communications and firefighters wanting to send video from inside burning buildings. The Federal Communications Commission voted 5-0 to allow local and federal safety agencies to sign up for a chunk of airwaves set aside last year for emergency and homeland security efforts. http://www.usatoday.com/tech/news/techpolicy/2003-04-24-airwaves_x.htm 7248 From: Steve Weinert Date: Thu Apr 24, 2003 10:25am Subject: RE: Re: Passwords and Books.... > Here are several tens of thousand of pages of stuff regarding TSCM: > http://www.tscm.com/reference.html The library has been raided by > others to hawk CD's or books... yet none of them give me credit for > originally assembling the library. > > Also, if you go to my website: http://www.tscm.com/ you will find a > huge mother-lode of free material all about TSCM. You can actually > get more information regarding TSCM from my website for free; then > you can from buying all the TSCM books ever written combined. > > More to follow... just watch what gets added to the site later this month. > I think may be simply saying the obvious - that I for one appreciate the huge efforts of good people like Atkinson and Uhrig for sharing their accumlated experience and resources. James Atkison's Granite Island Group site must be earning a percentage on the ink cartridges I'll need to print out just a fraction of the excellent resource materials to use in self-study!! What a great resource for reviewing & refreshing ones training! Many thanks! These resources are a job well done! Steve W --- "Obscurity and competence: That is the life that is worth living." - Mark Twain 7249 From: A.Lizard Date: Sun Apr 27, 2003 7:27pm Subject: smart dust coming out of the lab Any of you guys worked on/with this stuff or have had it used *on* you yet? A.Lizard >AS PRIVACY VS. SECURITY DEBATE HEATS UP, NSF PRIMES SENSOR PUMP >By Michael Fitzgerald >Small Times Correspondent > http://smalltimes.com/document_display.cfm?document_id=5904 >PALO ALTO, Calif., April 25, 2003 ≠ When the Palo Alto Research Center >(PARC) celebrates its 30th anniversary this May, Ethernet networking and >the personal computer will be its stars. For its 35th anniversary, >wireless sensor networks may join the cast. > >The famed research center, spun off by Xerox Corp. in 2002, hosted the >second Information Processing in Sensor Networks workshop this week amid >anticipation of significant funding grants from the National Science >Foundation. > >ìThis is the hot areaî for research funding at the NSF, John Cozzens, >program director of NSFís Signal Processing Sensor Program, told Small Times. [snip] >Pister also said that sensors with high-resolution, 1sq.mm video cameras >may come to market within two years, but it isnít clear that customers >will pay more for these than for current 5sq.mm cameras on the market. another relevant URL: http://www.ieee802.org/15/pub/TG4.html new IEEE wireless sensor networking standard ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -Benjamin Franklin, Historical Review of Pennsylvania, 1753 Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... PGP 8.0 key available by request,keyserver,or on my Web site Download PGP from http://www.pgpi.org for e-mail privacy. PGPfone v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ Disaster prep info: http://www.ecis.com/~alizard/y2k.html ************************************************************************ 7250 From: Ocean Group - MU TSD Date: Thu Apr 24, 2003 8:41am Subject: Passwords and books.... Thanks for that Steve, wise words and rightly noted. Cheers Oisin PS. I am disappointed at the lack of passwords I have received.....! Did I mention the free pen? Re: JMA's post....I will give you credit for putting the whole reference area together...your doing a fine job, keep it up! 7251 From: Fernando Martins Date: Tue Apr 29, 2003 1:59pm Subject: Re: Computer Associates Teams up With Pinkertons From: "Gil Zimmerman" > I suppose this might be interesting...too bad Computer Associates didn't > partner with a company with a better reputation. Just my 2-cents, though. As a Securitas competitor, I must agree ;) Well, CA also have some solutions that ... cof cof ... hmmm ... errr ... nevermind ... ;> FM 7252 From: Fernando Martins Date: Tue Apr 29, 2003 2:05pm Subject: Re: Passwords and books.... > PS. I am disappointed at the lack of passwords I have received.....! Did I > mention the free pen? People just wondered if you have enough pens :> FM 7253 From: Date: Tue Apr 29, 2003 10:28am Subject: Wiretap Applications Drop in 2002 Wiretap Applications Drop in 2002 By EUN-KYUNG KIM .c The Associated Press WASHINGTON (AP) - Law enforcement officials sought fewer court orders last year for eavesdropping on private conversations, a report says, but that doesn't include hundreds of wiretaps approved by a special court to track down suspected terrorists and spies. Federal and state judges authorized all but one of the 1,359 wiretap applications submitted in 2002. The requests represented a 9 percent decrease from the 1,491 applications logged the previous year, according to the annual report by the Administrative Office of the U.S. Courts. Federal wiretaps rose by 2 percent, to 497, while the number of applications filed by state officials dropped 14 percent to 861. Nearly all the nonfederal applications came from seven states: New York, with 404 applications; California, 143; New Jersey, 81; Pennsylvania, 79; Maryland, 54; Florida, 37; and Illinois, 25. The numbers in the report don't reflect wiretap applications overseen by the Foreign Intelligence Surveillance Act court, which has approved thousands of warrants since it was established in 1978 by Congress. The FISA court is known to have denied only two government applications, and both of those involved test cases over the court's legal authority. In one of the two cases, the Reagan administration Justice Department actually asked that its application be denied as part of an effort to curtail the court's authority. The ``spy court'' approves wiretaps and other surveillance of suspected spies, terrorists or foreign agents in the United States. It approved 934 applications in 2001. The number of applications it approved last year will be submitted in a report to Congress in the next few weeks. According to the administrative office's annual report, the bulk of the wiretap requests - 77 percent - emerged from narcotics investigations. Gambling, racketeering and homicides were the other crimes cited most often in applications. The telephone wiretap was the most common type of surveillance used, according to the report, with 77 percent of the locations being ``portable devices'' such as cellular phones and digital pagers. Ed Cogswell, an FBI spokesman, said he couldn't explain the decrease in wiretap applications. One possible reason might be a shift from wiretap applications from state and federal courts to those submitted in the spy court because ``certainly, we have shifted a priority into the counterterrorism arena.'' Stephen Dycus, a Vermont Law School professor who specializes in national security, said more information is needed before any explanation could be made. ``It could be because Americans are behaving themselves and law enforcement investigations have dropped as a result,'' he said. ``Or, it could be that FBI's resources have been rediverted from ordinary law enforcement to Homeland Security duties. We really need more data to have some sense of why.'' On The Net: 2002 Wiretap Report: http://www.uscourts.gov/wiretap.html 04/29/03 15:18 EDT Copyright 2003 The Associated Press. The information contained in the AP news report may not be published, broadcast, rewritten or otherwise distributed without the prior written authority of The Associated Press. All active hyperlinks have been inserted by AOL. [Non-text portions of this message have been removed] 7254 From: Date: Tue Apr 29, 2003 3:31pm Subject: operators of wireless networks must secure them - Licensed to War Drive in N.H. By Brian McWilliams Story location: http://www.wired.com/news/wireless/0,1382,58651,00.html 02:00 AM Apr. 29, 2003 PT DURHAM, New Hampshire -- A land where white pines easily outnumber wireless computer users, New Hampshire may seem an unlikely haven for the free networking movement. But the state, known for its Live Free or Die motto, could become the first in the United States to provide legal protection for people who tap into insecure wireless networks. A bill that's breezing through New Hampshire's legislature says operators of wireless networks must secure them -- or lose some of their ability to prosecute anyone who gains access to the networks. House Bill 495 would, experts say, effectively legalize many forms of what's known as war driving -- motoring through an inhabited area while scanning for open wireless access points. Increasingly popular with businesses and consumers, wireless networks use radio waves to transmit data between computers in a network. The convenient, low-cost equipment often is deployed to allow employees or household members to share a single Internet connection. To simplify installation, wireless systems typically ship without any security features enabled. Because the radio waves broadcast by wireless base stations are relatively powerful, it's not uncommon for residential neighbors or adjacent businesses to inadvertently connect to each other's wireless networks. Some wireless owners leave their access points unsecured on purpose. A grassroots effort known as the open network movement is attempting to create a worldwide grid of Internet-connected wireless access points. A computer enthusiast with a DSL or cable modem at home may, for example, intentionally provide free wireless access to the connection while he's away at work. New Hampshire's proposed wireless law was hailed as "enlightened" by the Electronic Frontier Foundation, a California-based digital rights advocacy group. Lee Tien, a lawyer for the EFF, said the bill would help clarify the legality of the open networking movement. "It seems like a fairly clean way of accommodating the geek-culture practice of having open wireless access points without doing anything bad for security," said Tien. The appeal of tapping into free Internet connections while on the go has led to an activity known as war chalking, in which wireless fans scratch special markings on pavement to indicate open connections. Thousands of wireless "hotspots" offered by hotels, restaurants and other commercial establishments also are listed in online databases such as 80211hotspots.com. To understand the genesis of New Hampshire's proposed law, just boot up a wireless-enabled laptop at the Fusion Internet Cafe and Espresso Bar on Elm Street in Manchester, the state's largest city. Fusion has been offering free wireless access to coffee drinkers for the past four months. But co-owner Carlos Pineda said he sometimes turns on his laptop at the cafe and finds himself connected instead to a wireless local-area network, or WLAN, operated by the CVS drugstore located across the street. "I don't even think their employees are aware the signal from their Internet is being broadcast outside of their space," said Pineda. "That means I have access to their (Internet protocol) address so I can break into their system. Personally I can't, but other, more-savvy people could do it." The legality of such inadvertent wireless network intrusions is murky. Last year, a Texas man was indicted, but later cleared, on charges that he illegally gained access to the wireless network of the Harris County district clerk. Like most state and federal computer crime laws, New Hampshire's existing statute says it is a crime to knowingly access any computer network without authorization. By analogy, just because someone leaves his house unlocked doesn't mean you are authorized to walk inside, sit on the couch or help yourself to the contents of the fridge. But HB 495 turns that thinking upside down, experts said. It defines an operator's failure to secure a wireless network as a form of negligence. According to the proposed amendment, "the owner of a wireless computer network shall be responsible for securing such computer network." What's more, if an alleged intruder can prove he gained access to an insecure wireless network believing it was intended to be open, the defendant may be able to get off the hook using an "affirmative defense" provision of the existing law. As a result, some legal experts contend that New Hampshire's proposed amendment to its computer laws could make it harder to throw the book at criminals who take advantage of insecure wireless systems. "If (wireless network operators) want to be able to prosecute people for hacking into their wireless networks, they need to have done something to have secured the networks," said Mark Rasch, a former head of the Justice Department's computer crime unit. Despite repeated warnings from experts, at present many wireless users haven't secured their systems. A 10-minute war drive down the main business district of Manchester earlier this month using a laptop with a standard wireless card revealed nearly two dozen open wireless access points, including some operated by banks and other businesses. A variety of techniques can deter, if not eliminate, unauthorized access to wireless networks. For example, enabling a technology called Wired Equivalent Privacy, or WEP, can provide some security by encrypting wirelessly transmitted data. Wireless networks also can require users to provide a password before connecting. Another technique, called MAC address filtering, only allows access to computers on a designated list. But according to Jeff Stutzman, CEO of ZNQ3, a provider of information security services, such security techniques are beyond the ken of many home and small-business users. "When I do a vulnerability assessment for a client, one of the first things I do is test for open (wireless) access points. And I've been in places where every access point I've picked up is un-WEPed," said Stutzman. Pineda said the salesman at Best Buy who sold Fusion Internet Cafe its wireless gear didn't even bring up the subject of enabling security features. "People talk about wireless technology but no one talks about the security problems ... people stealing the signal, hacking your system," said Pineda. "That's not their concern. Their concern is to push a product out of the store." Passed by the New Hampshire House last month, HB 495 currently is being reviewed by the state's Senate Judiciary Committee. If signed into law, it would take effect in January 2004. Committee Chairman Andrew Peterson said the goal of the proposed law is to protect those who innocently stumble upon insecure wireless networks. But Peterson said the committee is open to arguments from anyone who believes the bill could undercut existing protection for victims of wireless hacking. "We want to be sure that it wasn't the case that, through trying to protect people under certain circumstances, we were opening up greater opportunity for criminal activity," said Peterson. [Non-text portions of this message have been removed] 7255 From: Date: Thu May 1, 2003 7:59am Subject: Court Approved 1,228 Terror Warrants U.S. Court Approved 1,228 Terror Warrants By TED BRIDIS .c The Associated Press WASHINGTON (AP) - The government disclosed Thursday it requested and won approval for a record 1,228 warrants last year for secret wiretaps and searches of suspected terrorists and spies, a reflection of aggressive efforts to prevent terror attacks in the United States. U.S. Attorney General John Ashcroft disclosed the figures in a mandatory, two-paragraph report to the administrative office of the U.S. courts. Last year's total was significantly higher than the 934 warrants approved in 2001 and the 1,003 approved in 2000. The FBI often uses these specialized warrants - issued under the 1978 Foreign Intelligence Surveillance Act - to record the telephone calls and e-mails of citizens and immigrants believed to be agents of a foreign power. Experts said the increase in this special category of warrants offsets a significant drop in traditional wiretaps in criminal cases. The federal courts administrator disclosed earlier this week that judges had authorized all but one of the 1,359 wiretap applications submitted in 2002. That was a 9 percent decrease from the 1,491 applications logged the previous year. ``People had wondered why there was a decrease in criminal wiretaps, and we thought it was most likely due to the increased use of FISA court-ordered surveillance,'' said Beryl A. Howell, former general counsel for the Senate Judiciary Committee. ``This is consistent and bears out that view.'' Operating with permission from a secretive federal court that meets regularly at Justice Department headquarters, the FBI has broken into homes, offices, hotel rooms and automobiles, installed hidden cameras, rummaged through luggage and eavesdropped on telephone conversations. Besides break-ins, agents also have pried into safe deposit boxes, watched from afar with video cameras and binoculars and intercepted e-mails. They have planted microphones, computer bugs and other high-tech tracking devices. Details about some FBI techniques emerge from court records spread across dozens of cases. But only a fraction of these surveillances each year result in any kind of public disclosure, so little is known outside classified circles about how they work. The Patriot Act, which became law in October 2001, broadened the 1978 surveillance law by allowing the FBI to request warrants in investigations that aren't mostly focused on foreign intelligence. 05/01/03 12:43 EDT Copyright 2003 The Associated Press. The information contained in the AP news report may not be published, broadcast, rewritten or otherwise distributed without the prior written authority of The Associated Press. All active hyperlinks have been inserted by AOL. [Non-text portions of this message have been removed] 7256 From: Steve Uhrig Date: Thu May 1, 2003 9:46pm Subject: Surveillance & Reconnaissance Conference 9-10 June 03 - Washington, DC - 8th Annual Intelligence Surveillance & Reconnaissance Conference. This conference will examine the emerging mission-driven requirements across the broad spectrum of surveillance and reconnaissance needs, plans, technologies, and business opportunities. Speakers from HQDA, PEO-IEWS, ACC, CNO/N6, CECOM, ESC, DARPA, DoD CDTDPO, SAF/USAC, NIMA, ARL, NIMA, FPBL, NAIC, Northrop Grumman, Lockheed Martin, SAIC, J.O.T., Wagner, Sarnoff, ACS, YarCom and Mitre. Organization: TECHNOLOGY TRAINING CORP Website: www.TechnologyTraining.com Contact: Dana Marcus Phone: (310) 563-1223 Fax: (310) 563-1220 Email: marcusd@t... Sponsors: National Military Intelligence Association American Institute of Engineers Association of Naval Aviation ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7257 From: rockdriver Date: Thu May 1, 2003 10:49pm Subject: GSM intercept While doing some research,I stumbled across this: www.spyworld.net/Cellular_Interceptor.htm The big question: Would this qualify for the Guiness Book on the most expensive item ever sold by a spy shop?? at 420K or The most blatant abuse of "spy shop physics"...... MD 7258 From: Marty Date: Mon May 5, 2003 7:34am Subject: Fw: Politically Correct? Subject: Politically Correct? The other day I heard that the Iraqis and Syrians are getting upset because people keep referring to them as "towel heads." Apparently, they do not wear towels on their heads, they wear sheets. In the future, when you refer to them, please use their correct name "sheet heads." [Non-text portions of this message have been removed] 7259 From: James M. Atkinson Date: Mon May 5, 2003 8:50am Subject: Editor arrested over 'phone tap' Editor arrested over 'phone tap' The Sunday Times' Northern Ireland editor has been arrested in connection with the publication of alleged transcripts of telephone conversations between Sinn Fein's Martin McGuinness and senior UK Government figures. Liam Clarke was detained along with his wife, Kathryn Johnston, on Thursday morning. A number of documents were also seized. Mr Clarke and his wife co-wrote a biography of Martin McGuinness and an updated version contains extracts from transcripts of telephone conversations between the Sinn Fein MP and former Northern Ireland Secretary Mo Mowlam and Tony Blair's Chief of Staff Jonathan Powell. On Wednesday, police arrested a 48-year-old man in connection with the investigation. Officers have been examining a number of items seized during a house search. Earlier on Wednesday, Mr McGuinness said he would refer allegations that his telephone conversations were monitored to Downing Street. The allegation that the party chief negotiator's phone conversations were being tapped were carried in Wednesday's edition of the Times. The new edition of a biography of Mr McGuinness, entitled From Guns To Government, contains what are said to be transcripts of calls bugged by MI5. One features former Northern Ireland Secretary Mo Mowlam telling Mr McGuinness of her battle to stop the prime minister sacking her, the Times said. Another features Mr Blair's chief of staff Jonathan Powell joking to the Sinn Fein negotiator about unionist politicians who were "asses", the newspaper reported. The editor of the Sunday Times, John Witherow, said Mr Clarke's account posed no threat to national security and merely embarrassed ministers. He called for Mr Clarke and his wife to be released immediately. Mr McGuinness blamed Special Branch for the tapping and described it as disgraceful. "The information that has been obtained has been provided by British agents through them to unionist death squads who have killed hundreds of nationalists throughout the north so the war is not over for the securocrats," he said. Downing Street refused to comment on the claims in the Times. A spokesman for Tony Blair said they did not comment on intelligence matters or on leaked documents. He said Jonathan Powell had worked very hard on the peace process and continued to put in a huge amount of effort . He added that the governments' energies were engaged in finding a way forward. Lagan Valley MP Jeffrey Donaldson is one of the Ulster Unionists alleged to have been the butt of Mr Powell's joke. He told the paper the supposed comments showed "how low Downing Street is prepared to stoop to curry favour with those who have been responsible for the destruction of lives and property in Northern Ireland". The newspaper said the bugging was part of a security services operation called "Narcotic1" and had started in the summer of 1997 and was still running. Story from BBC NEWS: http://news.bbc.co.uk/go/pr/fr/-/1/hi/northern_ireland/2988629.stm Published: 2003/05/01 16:12:35 © BBC MMIII -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7260 From: frost_bitten_ca Date: Tue Apr 29, 2003 11:57pm Subject: Police get their Fluffi Bunni Police get their Fluffi Bunni Associated Press Washington ≠ British authorities arrested a man Tuesday believed to head a group of hackers known as "Fluffi Bunni," which used a stuffed pink rabbit to mark attacks that humiliated some of the world's premier computer security organizations ... http://www.globeandmail.com/servlet/story/RTGAM.20030429.wfluf429/BNSt ory/Technology 7261 From: human being Date: Thu May 1, 2003 11:55pm Subject: Fwd: **need small broadcasting transmitters, home broadcasters, pirate broadcasters, phono oscillators, and electronic babysitters and assoc. stuff for museum display! contact the requester directly, at: ed sharpe Begin forwarded message: From: ed sharpe Date: Thu May 1, 2003 11:37:29 PM US/Central To: MUSEUM-L@H... Subject: **need small broadcasting transmitters, home broadcasters, pirate broadcasters, phono oscillators, and electronic babysitters and assoc. stuff for museum display! Reply-To: Museum discussion list Ok the latest tangent for a future display are: Home Broadcasters, Phone Oscillators and Babysitters! looking for the actual items of course, but to go along with that, advertisements, and some first hand oral history about your early experiences and fun and trouble you got into etc etc regarding these devices! It would be interesting to now how many folks that enjoyed these went into some form of broadcasting..... Three that I remember myself were the knight kit little blue unit with the 50c5's in it ( had loads of fun with one of these! This baby would be fun to play with again!) the RCA Unit ( I almost remember this having a pentode or a pentagrid tube in it..... Lafayette unit... Did not have one but always looked in the catalog at it. Was there also a heathkit unit? I seem to think so but a catalog check will fill in the details of it's existence. a close brother to the home broadcaster was the 'baby sitter' and knew people when I was young that kludged extra inputs and preamps onto these..... Yep want examples of all of them! cash, trade, free... whatever! But most of all want some history of peoples involvement with them to add to the section on the web site. please respond offlist... Thanks Ed Sharpe archivist for SMECC Please check our web site at http://www.smecc.org to see other engineering fields, communications and computation stuff we buy, and by all means when in Arizona drop in and see us. address: coury house / smecc 5802 w palmaire ave glendale az 85301 7262 From: Date: Fri May 2, 2003 8:01am Subject: Re: GSM intercept While doing some research,I stumbled across this: www.spyworld.net/Cellular_Interceptor.htm The big question: Would this qualify for the Guiness Book on the most expensive item ever sold by a spy shop?? at 420K or The most blatant abuse of "spy shop physics"...... Excellent question. Why don't you ask the owner? http://kepler.ss.ca.gov/corpdata/ShowAllList?QueryCorpNumber=C2147873 (Embedded image moved to file: pic17958.pcx) ******************* N O T I C E ******************* The information contained in this e-mail, and in any accompanying documents, may constitute confidential and/or legally privileged information. The information is intended only for use by the designated recipient. If you are not the intended recipient (or responsible for the delivery of the message to the intended recipient), you are hereby notified that any dissemination, distribution, copying, or other use of, or taking of any action in reliance on this e-mail is strictly prohibited. If you have received this e-mail communication in error, please notify the sender immediately and delete the message from your system. *************************************************** From: 211 Date: Tue Apr 25, 2000 6:03pm Subject: Re: Another ANI-ANAC Question In a message dated 4/25/00 4:27:07 PM, TSCM@j... writes: << I am still looking for some more good ANI - ANAC numbers for California and Southwestern US area codes. >> National ANAC: 800-346-0152--don't abuse it...have not found a loc in the US where it doesn't wk. Bill Schneid Director of Special Operations Global Projects, Ltd. 310.314.8760 ICQ48007716 http://globalprojectsltd.com PI15860 212 From: kmart thou cynic Date: Wed Apr 26, 2000 2:29pm Subject: Re: Another ANI-ANAC Question And boy, oh boy, do ANAC numbers tend to get abused :-/ They are quite useful. My experience has been that simply asking a lineman for one usualy works. Guys in the field are pretty friendly and if you have a ligitimate use for one they usually have no problems giving you ANAC numbers. Local ANAC circuits are best. 213 From: G. Hoxie Date: Thu Apr 27, 2000 9:16pm Subject: Hello and... My name is George Hoxie, Sr. and I am the owner of Speculor consulting, a TSCM firm in Richardson, TX. I want to thank James for allowing me to participate in this forum and, use this first post to tell you a little about myself and my firm. I have been in the electronics industry for over 25 years: Seven of those years with Army Intelligence as a 33S (Electronic Warefare Tech.). My first tour of duty was with the 902nd MI in San Francisco, CA, where I was a TEMPEST Operator/Repairman. After that I spent the rest of my days with Uncle Sam in Panama working for the 402nd MI Btn, mostly doing missions with 3rd/7th SF out of Honduras, spending all of President Regan's money they would let us have! Any old 33s out there??? After leaving the military I went to work for Electrospace Systems (formally Collins Radio) as an EMI/EMC/TEMPEST Engineer. For the last five yrs I have been teaching for the Ericsson Compentence Development Center, specializing in DATACOM, Switching, and RBS. I currently run my TSCM business as a side line and have done so for several years. I work with law enforcment and PI's, limiting myself to the DFW area. I conduct sweeps, perform physical security investigations, and general PI surveillance jobs as they come along, all by word of mouth. I am currently limited in my capabilities to 2GHz. I am trying to give the business a jump start with a new web page and local ad campaign. If things take off, and a job warrents it, I may need to hire someone to cover 2GHz and up, provide Non-Linear junction testing, and other specialized testing that I currently cannot perform. The expense/business recovery ratio is just to far out of whack right now to justify additional expenditure on new equipment. If any of you would be interested in working in the DFW area, I would be happy to hear from you. As it has been said many times, we are indeed a small group and networking, I believe, is vital. I am always honest with my customers concerning my capabilities and have had to clean up more than one spy shop rain dance. Again, thanks for letting me be part of the group. I will do my best to be a positive contributor. Sincerely, George D. Hoxie, Sr. Speculor Consulting 214 From: Mike F Date: Thu Apr 27, 2000 1:48pm Subject: RE: Orphan Ani Jay,here is what I have, AC-213=114 AC-213=1223 AC-213=61056 AC-213=211-2345 AC-323=? AC-626=? AC-714=114 AC-714=211-2121 AC-714=211-2222 AC-805=114 AC-805=211-2345 AC-805=211-2346 AC-805=830 AC-818=1223 AC-818=211-2345 AC-818=114 AC-818=211-2346 LATER4,mike f. PS-check your computer clock. -----Original Message----- From: Jay Coote [mailto:TSCM@j...] Sent: Friday, July 10, 2893 6:44 PM To: Mike F Subject: Re: [TSCM-L] Orphan Ani Thanks. I am in the Los Angeles area. The AC's I use a lot are: 213, 323, 626, 818, 714, 949, 805, Some pacBell and some GTE Jay Jay here is ANAC,Automatic Number Announcement Circuit. > 1-800-346-0152 , > If you give me the area codes ,I might be able to send the local 3 digit > ANAC,nunbers which are better to use. > later4,mike fiorentino > > -----Original Message----- > From: Jay Coote [mailto:TSCM@j...] > Sent: Friday, July 10, 2893 6:44 PM > To: TSCM-L@egroups.com > Subject: [TSCM-L] Orphan Ani > > > Can someone post me the ANI numbers and any other useful telephone numbers? > I am in the Southern CA area (usually). > Thanks, > Jay Coote > Los Angeles > 215 From: Doug Ellsworth Date: Fri Apr 28, 2000 1:04pm Subject: ANAC alternative Hi Group, In every sweep I've done throughout the midwest, and a recent one in Long Island, I simply dial my own SprintPCS number to ID loops. SprintPCS service is available in most towns of any size. All that long distance can be expensive, but it's billed on as a necessary expense. This works for me in a pinch when I don't have a local ANAC. Moreover, it is more secure...If the bad guys happen to monitor a tap in real time, they'll be on alert as caused by the ANAC announcement. Not so much if a loop number is dialed and nobody answers. ...just a thought... -Doug Ellsworth Secure Communications Corp. [Non-text portions of this message have been removed] 216 From: Jay Coote Date: Fri Apr 28, 2000 6:28pm Subject: Re: Hello and... George, I would like to compare notes with you on 'jump starting' and other stuff. Jay Los Angeles TSCM@j... ---------- > My name is George Hoxie, Sr. and I am the owner of Speculor > consulting, a TSCM firm in Richardson, TX. I want to thank James for > allowing me to participate in this forum and, use this first post to > tell you a little about myself and my firm. > > I have been in the electronics industry for over 25 years: Seven > of those years with Army Intelligence as a 33S (Electronic Warefare > Tech.). My first tour of duty was with the 902nd MI in San > Francisco, CA, where I was a TEMPEST Operator/Repairman. After that > I spent the rest of my days with Uncle Sam in Panama working for the > 402nd MI Btn, mostly doing missions with 3rd/7th SF out of Honduras, > spending all of President Regan's money they would let us have! Any > old 33s out there??? > > After leaving the military I went to work for Electrospace Systems > (formally Collins Radio) as an EMI/EMC/TEMPEST Engineer. For the > last five yrs I have been teaching for the Ericsson Compentence > Development Center, specializing in DATACOM, Switching, and RBS. > > I currently run my TSCM business as a side line and have done so > for several years. I work with law enforcment and PI's, limiting > myself to the DFW area. I conduct sweeps, perform physical security > investigations, and general PI surveillance jobs as they come along, > all by word of mouth. > > I am currently limited in my capabilities to 2GHz. I am trying to > give the business a jump start with a new web page and local ad > campaign. If things take off, and a job warrents it, I may need to > hire someone to cover 2GHz and up, provide Non-Linear junction > testing, and other specialized testing that I currently cannot > perform. The expense/business recovery ratio is just to far out of > whack right now to justify additional expenditure on new equipment. > > If any of you would be interested in working in the DFW area, I > would be happy to hear from you. As it has been said many times, we > are indeed a small group and networking, I believe, is vital. I am > always honest with my customers concerning my capabilities and have > had to clean up more than one spy shop rain dance. > > Again, thanks for letting me be part of the group. I will do my > best to be a positive contributor. > > Sincerely, > > George D. Hoxie, Sr. > Speculor Consulting > > > ------------------------------------------------------------------------ > Accurate impartial advice on everything from laptops to table saws. > http://click.egroups.com/1/3020/0/_/507420/_/956888191/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 217 From: Jay Coote Date: Fri Apr 28, 2000 6:38pm Subject: Tel breakout boxes & resistor values I'm still slowly obtaining the parts and info on making an adequate breakout box (BOB) for telephone and other twisted pair monitoring and testing. A few months ago, other list-ees posted some great ideas, such as not forgetting to have your matrix switches look at shield and ground as well as the other pairs.... A few questions- What value resistance do you like to use in your voltage divider (matched pair of resistors) for POTS line balance tests? What R value do you like to use for current tests (without going off-hook)? What R value do you use to simulate a phone's internal R, so that off-hook tests can all be compared to this same R value? Thanks, Jay Coote Los Angeles TSCM@j... 218 From: James M. Atkinson, Comm-Eng Date: Fri Apr 28, 2000 6:54pm Subject: Re: Tel breakout boxes & resistor values At 7:40 PM -0400 4/28/00, Jay Coote wrote: >I'm still slowly obtaining the parts and info on making an adequate >breakout box (BOB) >for telephone and other twisted pair monitoring and testing. A few >months ago, >other list-ees posted some great ideas, such as not forgetting to >have your matrix switches >look at shield and ground as well as the other pairs.... > >A few questions- >What value resistance do you like to use in your voltage divider >(matched pair of resistors) for POTS line balance tests? >What R value do you like to use for current tests (without going off-hook)? >What R value do you use to simulate a phone's internal R, so that >off-hook tests >can all be compared to this same R value? > >Thanks, > >Jay Coote >Los Angeles >TSCM@j... I use a 2.2 K ohm 1% resistor for each segment, and add a 200 ohm 20 turn pot between them to "tune up" the circuit for a near perfect match. Tap the wiper on the pot for the "mid-point" connection. I've wired a rotary switch up with the six basic measurement configurations so I don't have to move any test leads during the test. I've found it helpful to tape a small calculator to the box so you don't have to fish around in the middle of the job to do the conversion calculations. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 219 From: Gordon Mitchell Date: Sat Apr 29, 2000 1:02am Subject: Software radios, who knows about them? I am looking for a way to automate the traditional receiver operation function. Does anyone have experience with software radios? It would be nice to find something that is: 1. Much cheaper than, but with much of the functionality of a Watkins-Johnson PC driven radio 2. Provided with hooks for Visual Basic 6, preferably through COM 3. Able to go at least up to 3 GHz with a scan of 100 samples/second or more 4. DSP demodulation including common digital data and TDMA Any ideas? My first glance says that: WinRadio looks slow and modulation limited. Pentek is great but needs a front end and is expensive. Oscor is expensive for the limited performance delivered. Gordon Mitchell Future Focus, Inc Woodinville, WA toll free (888) BUG-KILR 220 From: G. Hoxie Date: Sat Apr 29, 2000 9:02pm Subject: Win32 FunLove is NO **$#@ Fun! My computer network was recently infected with the Win32 FunLove Virus and it has taken nearly two days and that many reloads of operating systems to get rid of it. The virus supposedly does no "real" harm as it only adds a little over 4Kbytes to every file you open. My problem was that the version of detection software I was running had not picked it up and my hard drives got so full they began to create error on top of error. I downloaded a new virus detection program called InoculateIT PE (Personal Edition). It is free and it does have the ability to remove this critter from files. The only problem is that as soon as you delete it from one program, due to the nature of windows always trying to "open the world", it replicates in 2,3, or 10 other files. Also, it is very difficult to delete the source (virus) file because it is always "in use" and windows won't let you. Nasty. It is my understanding that it does not transmit over email and that the real targets for the bug are windows NT machines, where it removes admin protection, thus allowing anyone access to the server. Even nastier! There is a bunch of info out there on it. Just search for "FunLove virus" on Google or your favorite Search engine. But for now, "These pipes are Clean" George Hoxie Speculor Consulting Richardson, TX speculor@h... 221 From: James M. Atkinson, Comm-Eng Date: Sat Apr 29, 2000 10:14pm Subject: Re: Software radios, who knows about them? At 11:02 PM -0700 4/28/00, Gordon Mitchell wrote: >I am looking for a way to automate the traditional receiver >operation function. Does anyone have experience with software >radios? It would be nice to find something that is: > >1. Much cheaper than, but with much of the functionality of a >Watkins-Johnson PC driven radio >2. Provided with hooks for Visual Basic 6, preferably through COM >3. Able to go at least up to 3 GHz with a scan of 100 samples/second or more >4. DSP demodulation including common digital data and TDMA > >Any ideas? My first glance says that: WinRadio looks slow and >modulation limited. Pentek is great but needs a front end and is >expensive. Oscor is expensive for the limited performance delivered. > >Gordon Mitchell >Future Focus, Inc >Woodinville, WA > >toll free (888) BUG-KILR The WJ radios are great, however; they are very costly (and you have to do a ton of sweeps to pay for it). I would lean towards the Miniceptor or Microceptor as I have owned both and have had good results. I really like the ability to have DOZENS of BW bandwidths available. Rhode and Shwartz make several units suitable for TSCM, but they actually end up costing more then the WJ equipment (for the same performance) Ma-Com, Sanders, and E-systems have good gear for TSCM but the equipment is virtually worthless below 200 MHz as it's primarily targeted toward microwave (it also costs more then the WJ gear). The SWRI OmniScan is excellent (but it's based around a HP spectrum analyzer instead of an actual receivers). It's VERY costly, and really only suitable for permanently installed systems. I really like the Micro-Tel, Collins, and Rockwell radios but they take forever to purchase, and are bulky, heavy, and oh so expensive. I've had really good results with the WinRadio 3000i-DSP. DO NOT use an external WinRadio, or work with anything other then the 3000 (I've had seriously bad experience with the 1000). They have excellent developer support, and their interface drivers are easy to modify. The ICOM radios are "OK", and are really poor quality compared to the professional radio such as the R-95, WJ, Micro-Tel and so on. Most modern spectrum analyzers can actually be adapted with a tuner section, and as a result they can actually provide operation superior to that of most professional receivers. To perform any kind of TDMA, CDMA, etc you will need a vector signal analyzer such as the 89400. Of course you can add a CDMA or digital section to your spectrum analyzer but they are usually aimed towards GSM,, etc but rarely allow you to pull apart a TDM or SS type of signal. The OSCOR is great for cases where "you need an extra set of hands", or when you have to travel light, and simply want an automated solution you can let run while you work on other parts of the sweep. I've used the OSCOR for years, and use it as a "belt and suspenders" type of function. I simply set up one or two in the area/office I am sweeping and let them run unattended while I perform the rest of the sweep using a spectrum analyzers, scopes, and other "heavy iron". Each instrument has it's specific function, it's own capabilities, strengths, weaknesses, and vulnerabilities. I would never consider using a Miniceptor for evaluating 10 GHz signals, and wouldn't use the OSCOR to find frequency hopping or burst devices. I would lean towards an OSCOR (or two), two modern spectrum analyzers with tuner cards and VSA (one to 3 GHz, and the second with a mixer interface, a laptop with a miniceptor, and a desktop machine with several WinRadio cards. Throw in several threat specific radio's, a CPM-700 or other broadband detection system, two SCD-5, a 2030, and several audio amps. -jma . =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 222 From: James M. Atkinson, Comm-Eng Date: Sat Apr 29, 2000 10:45pm Subject: Carlos Ghigliotti Passed Away Good Evening, I regret to inform the list that Carlos Ghigliotti has just passed away (under very suspicious conditions). The following was sent to me by another list member (who asked to remain anonymous). -jma ------------------ April 29, 2000 4:20 am Arizona Time I just called the Laurel Police Department and got this statement: "At 1:27 PM officers were called to 608 Washington Blvd., Laurel, Maryland, in response to a phone call about a man who had been missing for several weeks. When officers arrived they found no signs of forced entry. Inside the apartment they found a badly decomposed body of a male, appearing to be in his 40's. No sign of a struggle was observed at that time. The body was processed and sent to the chief medical examiner in Baltimore. The body was of Carlos Ghigliotti, 42 yrs. of age, who resided at the same address where he was found." Public Relations Officer Jim Collins 350 Municipal Square Laurel, MD 20707 Phone: 301-498-0092 This is all I have for now... there should be a full story from Dallas Morning News and The Washington Post in a few hours. ------------------ Attorney David T. Hardy writes: What follows is something I have not been able to reveal prior to this point. As I mention at the end, I am now released from my promise of secrecy. Please forgive the length--I think you'll find it worthwhile. This covers many months of evidence and conversations, which I've had to keep quiet. The House Gov't Reform Committee had retained an infrared expert named Carlos Ghigliotti, of Laurel, Md. Carlos had been working on the FLIR for months, and shared a lot of his results with me. I'd pass him data when he needed it, and he knew he could count on me to keep my mouth shut. Carlos had done a lot of IR work -- including using it to spot polluters contaminating Chesapeake Bay, and diagnosing electronic errors (a bad connection or phase mismatch heats up). He loved his work, and was proud of some electronic inventions which enabled him to link together visual and IR imaging into a single image. He got into some courtroom work--chiefly determining if FLIR used to justify a drug search warrant was properly used or not. He had two principles: (1) if retained, he would tell the absolute truth as to everything and (2) he would never accept a second retainer from a drug suspect. No matter how egregious the misuse a second time around, he wasn't interested in being of assistance to a man who violated the law a second time. He'd just had a case where an attorney tried to grill him... but the more questions the guy asked, the deeper he got into the hole, until the courtroom security guards were all wandering in and sitting in the back, amusing themselves at the attorney's expense. Carlos knew his stuff, and he laid it right on the line. I talked with Carlos over the phone a lot, and visited him in his lab a couple of times. I now forget the first one, but the second visit was the day Mike McNulty previewed his latest film in DC. Thru the committee, Carlos was able to obtain a much better quality tape than any anyone else had. He discovered that, when FBI gave out "first generation copies," it was in fact giving out copies of a digitized "master," not of the original analog tape. Digitization compresses the image, and loses some of its quality. He demanded and got, thru the Committee, a copy of the original tape, on Super VHS, with some other tweakings to make it the most perfect copy possible. He said they brought out the envelope with the original--it had about twenty chain-of-custody signatures on it. He figured that his copy was as close to identical to the original tape as it was possible to have--whereas the ones everyone else has been using are a few generations down. Then he imported the video into his lab equipment (which I've seen--VERY impressive--four big monitors, Super VHS decks, two computers with more speed, RAM, and hard drive than I ever thought possible.). He was thorough, refusing to make a finding until he had it pinned down from every angle. In one case, he told me last month, he'd finally managed to link by time and location an image of a person shouldering a weapon, shown on the regular media videotapes made from the media locations, with a flash on the FLIR. He found nearly 200 suspected gunshots, and had done the work necessary to verify that many of these were genuine. Understand that his idea of "verify" wasn't just to see the image. He wanted to find the shooters, as well, and to plot their movement from one flash location to another. And he wanted to correlate the FLIR images to every possible ordinary video image, to see if he could link up what the media filmed from the side with what the FLIR registered from overhead. He was really hot on getting some footage shot by DPS from a site behind the building, so that he could tie that in as well. This man was thorough--no rushing to judgment on anything. His normal standard was to study everything from every possible angle or potential critique, until he could lay all the cards on the table, be absolutely clear, and defend his conclusions against any criticism. And he knew this was no normal case... as he once said, the Waco FLIR was probably going to be the next Zapuder film, and he wasn't going to say something that he couldn't prove against any criticism. On the side (and I have no idea why he was analyzing this) he said it had been determined that almost the entire Waco operation, not only 2/28 but the siege, had been improperly financed from money that law enforcement was supposed to use only in the war on drugs. He said there was plenty of documentation here, showing flow of money. In the 2/28 videotape, the ATF agents are all trying on new uniforms, new equipment -- everything down to the computers in the media area of the raid HQ were bought out of money supposed to be used only in drug enforcement. He said that much or all of the siege had been financed the same way. There were written standards in the gov't for when the drug enforcement money could be used, and these could be shown to have been violated in black and white terms. A considerable amount of money had been, well, embezzled, to support the effort. Carlos also told me, last month, that he'd seen FLIRs from nights before 4/19, and that it was apparent that the FLIR aircraft was being used to monitor the Davidians' water supply. The water was stored in those big plastic tanks at the rear of the building, and the coolness of the water inside showed up as a darker area. It was apparent that the water supply was shrinking, and by 4/19 was almost gone. He had heard the aircraft crew talking about it, and noting that the level was going down. So, essentially, they knew that thirst would force an end to the siege within a few days of 4/19. While I was in his lab, he showed me some footage where it was clear, beyond any doubt, that a man was moving in the wreckage of the gym. The guy gets up from behind one pile of cover and races to another. In between, you see a very long flash that exists only for an instant -- much longer in terms of physical length than could be attributed to a gunshot. He said that was a bullet imaged in flight--he'd imaged them before, while flying past shooting ranges. (Shooters know that a bullet after firing is too hot to pick up in the hand, a product of being rammed down a barrel ahead of burning powder, and then of air resistance as it travels at Mach 2-3 thru the air. I'd never suspected that one would show up on IR.). These scenes I saw with my own eyes, on his equipment--it was clear there was a person there. He'd done a preliminary report for the House committee before they had a falling out--he wanted to do a really throrough job, which he said would take months, and they wanted him to do a final report quickly. (He also mentioned that they'd been slow in payment, and he'd needed their check to buy some more equipment that he wanted to devote to the final analysis.). He said that someone (I think he said Rep. Burton himself) had called and threatened that they'd sue him for what he'd already been paid, and he decided he wouldn't take that guff from anyone. He would finalize his report, brief everyone, and that would be it. The prelim report I have here (he wanted to keep it secret for the time being, and faxed me a copy with instructions to keep my mouth shut. As will be set out below, I think I have been released from that promise.). To summarize: 11:24:16 to 36: shots from two locations into hole made by CEV in gym. 11:24:50 to 11:25:04 apparent return fire from inside of gym. 11:26:13 to 11:26:27 additional return fire. If the dark objects behind the tank are indeed shooters, this may have pinned them down. Following this, the tank backs over the dark spots. 11:26:39 "One of the two unknown subjects is clearly visible exiting out of the hole in the front wall of the gym which the tank previously made. The unknown subject turns to the right into the courtyard." 11:28:04 to 11:28:14: gunfire from this person's approximate position, directed toward building. 11:28:18 to 11:28:22: return fire from structure. 11:30:09 to 11:30:15: gunfire from shooter in courtyard, toward building. 11:33:51: gunfire between gym wall and swimming pool, into the structure. The infrared signature of these shots differs from those seen earlier in courtyard area. 11:34:32: one shot at unknown subject that is running and hiding between gym and swimming pool. [This may be the one he showed me] 11:38:34: unknown subject is seen hiding in front of tank. 11:43:36 to 11:59:03: gunshots from 2d story of building directed at tank (I believe he is here referring to the tank penetrating the front). 12:03:59: An unknown subject appears next to the tank in rear of structure. 12:07:42: fire is visible in 2nd story tower. 12:08:12: Unknown subject comes out of tank and shows up at 12:08:51 shooting at another unknown subject that appears at 12:08:34. 12:08:31 to 12:08:32: "A cluster of thermal anomalies appears at the corner of the gym." 12:08:34 and 12:08:44: unknown subject runs from the area where the thermal anomalies were seen, hops over rubble, and hides in gym. 12:08:51: automatic gunfire into area where previous subject hides. 12:10:41 to 12:11:15 numerous rounds shot from center of courtyard, directed at structure. Past this point, nothing of importance since fire overloads FLIR, but visible media and the soundtrack of FLIR indicates that gunfire did continue. He notes that events at 11:24:31, 11:24:35 and 11:28:14 may have involved more than one shot. He notes that a pattern was apparent: Davidian return fire only occurred following penetration of the building by an armored vehicle. "Total number of events that occurred between 10:41:57 and 12:16:13: 198." He told me, in late March, that he'd met with both the majority and the minority of the committee (after they sorta broke off relations) and shown them his results. Each briefing was in detail and consumed several hours. I forget the exact numbers, but somewhere around 3-8 people, mostly attorneys for the committee, were present at each briefing. He was still working on a final report when last I spoke with him. He was rather miffed that they had not given him time to analyze everything, and said he intended to insert a final section outlining all the things he had wanted to analyze when relations were broken off. He added that the minority staff had been rather surprised to see the data, since apparently the majority had been informing them only of a minimal amount of his results. Some of them suggested that maybe both the Demos and Republicans could hire him on jointly, to do a really thorough piece of work. He was rather flattered at the idea (if Carlos had any politics, I never heard of it) altho he said he was suffering from "Waco fatigue" and wanted to get back to his regular work, or even a long overdue vacation. My memory may be imperfect here, but as I recall he talked about the scene at the rear, where there is that big flash near the "dog house." His interpretation: The flash appeared to be multiple flash-bangs. It was possible they were actually thrown by a Davidian, altho not certain. But right after it, a person can be see running back into the building. A hatch opens on the CEV. When it opens, the cooler, darker interior of the vehicle is visible. A person exits the hatch. This is not totally clear, and some people agreed with his interpretation and others did not. But the person who dismounts then fires, the shots going toward the last location where the suspected Davidian is seen. He added that the Committee knew exactly who was under that hatch, so they could actually name the guy who did it. He could afterward track at least two suspected FBI shooters. He could spot their location--one stayed in the gym wreckage, and the other moved out into the courtyard, where he shoots. Ian Goddard had spotted what he thought was a structure, alongside the gym, and from which some shots come. I checked a color photo, and the structure is actually a big chunk of gym wall that the tank has knocked over and falls outward into the courtyard. I mentioned that to Carlos, and Carlos said it was more complex than that. The shooter had been in the courtyard to begin with, and the tank knocked the wall segment atop him. If there hadn't been other wreckage to catch it and hold it up a bit, he would have been squashed. I believe Carlos said that the gunshot images from that location were a little distorted, probably because the wall segment was cutting off part of the image at times. Carlos also found indications that shots were being fired into the underground storm shelter after the fire began. On one of the regular media videotapes, you could see a long, bright flash going down into the pit, from in front of one of the armored vehicles. He said it was no sunlight flash, he'd imaged it on three different media tapes from slightly different angles. His best assessment was that it was the fuse on a pyrotechnic round. I saw this tape, also, with my own eyes. His view was that they were gassing the underground vault to pin Davidians in place during the fire. Carlos was about as credible as they come. He'd done work for the FBI in the past, in fact, and often worked with gov't agencies. He had no particular ax to grind with regard to Waco: he once told me "the only thing that makes me mad about this is when I can see government officials making statements, and know for an absolute fact that they are lying." He also told me that that the House Gov't Reform Committee had even more data than he did, that he knew only part of it and couldn't talk about it, but that it was really shocking. He said that the big problem the Committee seemed to see was the question of how they could get the information out, while at the same time preventing another Oklahoma City type reprisal--it was that shocking. This conversation came shortly after Carlos' name had first been mentioned in the press, and the Committee rather played down his statements, saying they were based on visual video rather than FLIR (which was true only in small part). I asked about that--was the Committee getting cold feet over his evidence, or just playing their cards close to the chest. He said it was the latter -- they just hadn't figured out how to let the info out yet. (He was then meeting with the majority on a weekly basis, to brief them on his latest results.). I talked to him after the recreation, and his assessment was that it was pure junk -- the aircraft wasn't even at the right altitude, they didn't have the right procedures to verify that the sensor was functioning comparable to the one of 4/19, etc. The best thing that could be done with any resulting tape (and this is BEFORE the results were known) was to drop it in the wastecan. Whether it showed gunshots or did not, it'd be useless for proving anything, whether for the Davidians or the FBI. I remember talking to him outside his office, after the first visit, standing there in the parking lot after dark. He'd mentioned that the guy with Infraspection Institute, who had analyzed the FLIR for 60 Minutes back in '95 or '96, and found FBI gunshots and shooters on it, had been terrified. In fact, he'd sent copies of the tape to Carlos and to several others in the IR field, with notes saying "If anything happens to me, you'll know why." (The same guy later called me, said he didn't want his name used, that "there are too many people already in their graves over this." I wrote him off as him being rather nervous.). I asked Carlos, there in the parking lot, if he'd ever been fearful. He said only for a while, between the time he made his findings and the time he reported them to the Committee. Then he had been worried, because he was looking at clear evidence that would nail a LOT of FBI agents on perjury, and perhaps much worse. But once he told others of his results, he figured the cat was out of the bag. This is a rather long post, but there is a reason. It's in part a memorial for a feisty and totally honest guy I came to like a good deal. On April 19 of this year, from the hotel room in Waco, I called Carlos to report a minor discovery (the roof of the storm shelter, which glows bright white on the FLIR, wasn't just plywood--it was covered in black asphalt, which explained why it got so hot in the sun.). I got his answering machine, but when it came time to leave a message, the tape just said "tape finished. Thank you for calling." I thought he'd run out of tape--never happened before, but who knows? I tried again from time to time -- same result. I sent email asking him to call. Well, maybe he was out of town. Early today I tried again, and this time nothing picked up, the phone just rang off the hook. Then this afternoon I received a call. Carlos was found dead in his apartment. Perhaps the guy with Infraspection was right. I've got a call in to Laurel PD to tell them what little I know.... my phone records show calls to him up thru 3/30, after that he must have called me but there's no record, and I was unable to reach him on 4/19 and thereafter. Too damn bad. He was a good man, and I'd come rather to like him. He was rigorously honest -- his own man, and no one elses'. Since the Committee has his results (and has had information on it for months now), I guess we'll soon know how serious they are about investigating Waco. Carlos Ghigliotti was the owner of Infrared Technologies Corp. in Laurel, Maryland. Washington Post reports that from 1991 to 1995, Ghigliotti, 42, was paid by the FBI as a thermal imaging expert on an array of environmental dumping cases, according to an FBI document. Ghigliotti "performed reliable work for the FBI," the 1995 document states. http://www.waco93.com/washingtonpost10_6_99.htm ------------------ From The Washington Post, http://www.washingtonpost.com/wp-dyn/articles/A38496-2000Apr29.html - Waco Siege Investigator Found Dead In His Home By Cindy Loose Washington Post Staff Writer Saturday, April 29, 2000; Page B03 Carlos Ghigliotti, who had been retained by a U.S. House committee to help investigate the 1993 siege of the Branch Davidian compound in Waco, Tex., was found dead in Laurel under unexplained circumstances yesterday. "We're investigating it as a homicide," said Laurel police spokesman Jim Collins. Ghigliotti, 42, was found about 1:30 p.m. in the 600 block of Washington Boulevard. His body was badly decomposed, said police. There were no signs of a break-in or a struggle at the home, where Ghigliotti ran his business, Infrared Technologies Corp., police said. An expert in thermal imaging and videotape, Ghigliotti told the House Government Reform Committee in October that his analysis of tapes at Waco indicated that an FBI agent fired shots at the compound on April 19, the final day of the siege--a view disputed by the FBI. Michael Caddell, lead lawyer in a $100 million wrongful death lawsuit stemming from the Waco siege, said last night that he recently had discussed the findings with Ghigliotti and intended to retain him--not only because his work was impressive but also because Caddell's first expert had suffered a stoke recently. Caddell said that two weeks ago he wrote to Waco Special Counsel John C. Danforth, urging that he interview Ghigliotti immediately. Caddell said he'd heard of Ghigliotti's death yesterday from Rep. Dan Burton (R-Ind.), chair of the committee that retained Ghigliotti. Police called Burton, Caddell said, because his business card was found in Ghigliotti's pocket. A building manager, concerned that no one had seen Ghigliotti for some weeks, contacted police, who found the body. Michael McNulty, who made a documentary film about Waco that was instrumental in reopening the investigation, said he had been looking forward to seeing Ghigliotti's conclusions. He added, "My impression is that the work he did was significant and important." Ghigliotti's body was transported to the chief medical examiner's office in Baltimore for an autopsy. =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 223 From: James M. Atkinson, Comm-Eng Date: Sun Apr 30, 2000 9:18am Subject: What every good spy should know Sunday, April 30, 2000 Guardian Newspapers by Oleg Gordievsky What every good spy should know Friday April 28, 2000 There are few absolutes in the world of espionage, but some things never change. When I joined the KGB in the early 60s, the prevailing view was the same as that expressed yesterday by Sergei Ivanov, head of the Russian security council: British spies are some of the best in the world. This perception was partly based on myth. Early on, Soviet intelligence became convinced that the head of the British consul in Moscow was plotting a coup d'»tat against Lenin and the Bolsheviks, and that he had nearly prevailed; the Russians believed they had only disrupted the conspiracy at the very last moment. From that moment on, they had an exaggerated awe for the British. Later, though, their awe proved more justified. During the second world war, when the KGB had to cooperate with the British services, they found them highly impressive: attractive, intelligent, dedicated, imaginative. When the cold war broke out, surveillance in Moscow was so penetrating that they assumed it would be impossible for foreign agents to operate; they were amazed to discover that the British were managing. And they were even more impressed when Kim Philby told them there were fewer than 10 British agents operating in the Soviet section of head office. The Russians - who had hundreds of spies themselves - had assumed they were up against a huge directorate. They couldn't understand how so few people could achieve such a wonderful result. Charm is a key qualification for a successful agent: a good spy, fundamentally, is somebody who knows how to persuade other humans to give him what he wants. You need to be charismatic, charming, clever, interesting and well-spoken - but that is not enough. You have to have arguments at your disposal, to be able to persuade your targets to become your contacts. Most British schools and universities - not just Oxbridge, as Philby claimed - seem to produce such people; smooth, courageous types who don't need to be told what to do. The great drawback for the Russians was that fear of defection and betrayal led to the purging in the 30s and 40s from the agency of people with cosmopolitan attitudes - people who spoke languages, who knew Europe and the US. The KGB became much like the rest of Soviet society: free from any liberal, intelligent elements and full of bureaucrats. I remember coming back to Moscow to report my results and being told to be quiet because there were far more important things to worry about - the restructuring of a department, the filling of a middle-ranking position. Internal bureaucracy meant the Russians lost sight of the real targets - although even when they did get orders, Russian agents could often be lazy, unsystematic and disorganised. Travelling west after years in the Soviet system, they would become intoxicated by freedom and start drinking, womanising and engaging in petty corruption, and start lying to their superiors about how many contacts they had made. The CIA is different again. It's a huge organisation with a huge budget, and simply too many people to get the job done. Departments overlap; in some smaller Latin American countries, US intelligence officers seem to be tripping over themselves. The importance of the private sector in the US means the best brains are recruited by big corporations for good money; the CIA must make do with second-rate material. Where the proportion of clever, charming officers in MI6 is nine out of 10, in the CIA it is closer to one out of 10. But the most incompetent agents in recent history have to be the French military intelligence officers who blew up the ship Rainbow Warrior in an exercise against Greenpeace in New Zealand in 1985. One person died for nothing. The two officers, using false documents, attempted to leave New Zealand but were caught. It was a very awkward situation. Gossip with former French agents and you get the impression this is typical of the military intelligence agency there - although not of their excellent counterintelligence service, which is unjustifiably held in contempt by the military people because its staff are technically policemen. But modern technology is changing the game. American and British spies now produce so many documents on computer that it is increasingly difficult to stop them leaking out; the KGB, meanwhile, is restricting use of modern technology - and remains very efficient in protecting its secrecy. For the 11 years I worked for Britain, I was unable to spirit a single enciphered cable from the KGB; today David Shayler and Richard Tomlinson can get dozens of top-secret documents out of the building simply because they were stored electronically. I find it all very strange, but I don't know what to do about it. I'm told nothing can be done to stop it - but if it continues, the secret services eventually won't be secret at all. Oleg Gordievsky, a former KGB officer, defected to MI6 in 1985. =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 224 From: James M. Atkinson, Comm-Eng Date: Sun Apr 30, 2000 11:24am Subject: Phone BOB and Analyzer The following is based on my own research and designs so please give appropriate credit. I have been using variations on the following circuit (18th evolution currently) now for several years, and simply Velcro the box to the back of a hand-held Oscilloscope (a Fluke 199 for the time being). The controls are mounted on the sides/edges of the box. A elastic backstrap is added across the bottom, with a removable panel for battery access. First Setup Switch Bank (2 ea) 12 position rotary switch to select which pin becomes of the RJ-45 becomes tip, and which becomes ring in your circuit. Positions 1-8 are simply the 8 pins. Position 9 is Electrical Ground, Position 10 is Structural, Sheath, or Station Ground, Position 11 is a passive aerial (Condor rubber ducky), and Position 12 is an active antenna circuit/preamplifier that uses the rubber ducky. (Position 11 and 12 are primarily for RF analysis). Normally you will only be using a single setting (for a single line) and you will not need to these set-up switches. Optionally you may want to use 10 ea 12 position miniature rotary switches to set up the conditions of each of 5 pairs (remember the 5th is ground) and then another full sized six position switch to choose which of the five pairs to examine. You should add a mini WECO jack between the first and second switch to plug your J.S. Popper/Craft cables into. A second Mini WECO jack can be added to insert your Craft or Buttset into the circuit. Second Switch (DPDT, center off) Position A - Apply TDR Pulsers or Tone Generator Position B - Measure/Monitor Switch Third Switch (12 position rotary) Allows dial tone to be forced, and seizing current to be measured 00 ohms (open) 25 50 100 150 200 250 300 350 400 450 Variable Linear Pot (10 turn 0-5k ohms) Fourth Measure/Monitor Switch (12 Position Rotary) Uses an external DVM or O'scope in DVM mode. TRV - Tip to Ring Volts TGV - Tip to Ground Volts RGV - Ring to Ground Volts TRC - Tip to Ring Current (Dead Short) TGC - Tip to Ground Current (Dead Short) RGC - Ring to Ground Current (Dead Short) TRC - Tip to Ring Current (through 2.2 divider resistors) TGC - Tip to Ground Current (through 2.2 divider resistors) RGC - Ring to Ground Current (through 2.2 divider resistors) VDV - Voltage between Resistor Divider Center and Earth Ground AUD - Raw audio to Amplifier RF1 - Raw RF to Tunable Detector Modules Add an Isolated BNC to Monitor the Line via Oscilloscope (before Switches) The next switch controls the TDR pulser and tone generator and chooses between various TDR setups, and Tone generation. Add a DPDT (w/ center lock) to switch between a single tone, a warbling tone, and the center lock for a swept tone. Be sure to use a switched impedance matching circuit with at least 8 positions (0, 50, 72, 100, 135, 300, 600, 900, 1200 ohms, etc). Also be sure to de-couple loop DC, and add a high pass (Capacitive Reactance) circuit to suppress the ring voltages at 20 Hz. Tone1 - 500 Hz to 2.5 kHz (Audible) Tone2 - 20 to 60 kHz (Ultrasonic) Tone3 - 550 kHz to 2 MHz (AM BCB RF - use a AM radio to rcvr) Tone4 - Variable Frequency TDR1 - Short Range (out to 150 Feet) TDR2 - Medium Range (out to 1,500 Feet) TDR3 - Short Range (out to 15,000 Feet) TDR4 - Variable Pulse Repetition Rate The TDR circuit will require a voltage adjustment, and a variable cap to pre-load the signal (to make it lean into the line condition). Also, it will be helpful to make the TDR with an adjustable pulse duration. The CC/VLF detector circuit should be tunable from 3 kHz and 500 kHz, and RF from 500 kHz to 400 MHz. Use a 12 position rotary switch for each band, with the 12th position being a variable circuit. The audio circuit uses AGC and a voice bandpass circuit from 300 Hz to 3000 Hz for normal telco voice, and 100 Hz to 10 kHz for hi-fidelity voice. You will need at least 100 dB of gain for the audio with a 90-110 dB filtering of 60 Hz and related harmonics. You can add a few other functions depending on the procedure you follow for TSCM (my box performs all of the TSG test measurements). Adding connections for an external LCR meter is helpful, as is a variable power supply to "power up" the line or biasing voltages to activate microphones. Try to avoid using hot packs until you can verify that all elements of the system can withstand higher voltages (most modern PBX systems can not) A noise or swept tone generator is helpful for measuring the frequency response of various components of the telephone system, and a quad tone sweep generator may be added if you feel you needed it. A PBX blipper is helpful when you want to remotely activate or open the microphone of remote digital telephone. A digital conversion circuit or command capture circuit is also be helpful, but really isn't required unless you dealing with higher threat situations. Let me know if you have any questions. If there is enough interest in my box I may offer copies of it to other TSCM'ers -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved =================================================================== 225 From: Miguel Puchol Date: Sun Apr 30, 2000 6:43pm Subject: RE: Software radios, who knows about them? Hi Gordon, If there is interest in this, all one needs is the radio's protocol. I have written a software program that runs AOR receivers and the Icom PCR1000, but if needed, could run a R&S or similar receiver that has serial port control. Cheers, Mike > -----Mensaje original----- > De: Gordon Mitchell [mailto:gordonm@b...] > Enviado el: s·bado, 29 de abril de 2000 8:02 > Para: TSCM listserv > Asunto: [TSCM-L] Software radios, who knows about them? > > > I am looking for a way to automate the traditional receiver > operation function. Does anyone have experience with software > radios? It would be nice to find something that is: > > 1. Much cheaper than, but with much of the functionality of a > Watkins-Johnson PC driven radio > 2. Provided with hooks for Visual Basic 6, preferably through COM > 3. Able to go at least up to 3 GHz with a scan of 100 > samples/second or more > 4. DSP demodulation including common digital data and TDMA > > Any ideas? My first glance says that: WinRadio looks slow and > modulation limited. Pentek is great but needs a front end and is > expensive. Oscor is expensive for the limited performance delivered. > > Gordon Mitchell > Future Focus, Inc > Woodinville, WA > > toll free (888) BUG-KILR > > > ------------------------------------------------------------------------ > Was the salesman clueless? Productopia has the answers. > http://click.egroups.com/1/3019/0/_/507420/_/956988017/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 226 From: Jordan Ulery Date: Sun Apr 30, 2000 9:45pm Subject: Re: Win32 FunLove is NO **$#@ Fun! Good program "InoculateIT PE" you got. What, pray tell, was the system you were using earlier? "G. Hoxie" wrote: > My computer network was recently infected with the Win32 FunLove > Virus and it has taken nearly two days and that many reloads of > operating systems to get rid of it. > > The virus supposedly does no "real" harm as it only adds a little > over 4Kbytes to every file you open. My problem was that the version > of detection software I was running had not picked it up and my hard > drives got so full they began to create error on top of error. > > I downloaded a new virus detection program called InoculateIT PE > (Personal Edition). It is free and it does have the ability to > remove this critter from files. The only problem is that as soon as > you delete it from one program, due to the nature of windows always > trying to "open the world", it replicates in 2,3, or 10 other files. > > Also, it is very difficult to delete the source (virus) file because > it is always "in use" and windows won't let you. Nasty. > > It is my understanding that it does not transmit over email and that > the real targets for the bug are windows NT machines, where it > removes admin protection, thus allowing anyone access to the server. > Even nastier! > > There is a bunch of info out there on it. Just search for "FunLove > virus" on Google or your favorite Search engine. > > But for now, "These pipes are Clean" > > George Hoxie > Speculor Consulting > Richardson, TX > speculor@h... > > ------------------------------------------------------------------------ > Accurate impartial advice on everything from laptops to table saws. > http://click.egroups.com/1/3020/0/_/507420/_/957060129/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 227 From: Andre Holmes <1ach@g...> Date: Mon May 1, 2000 0:02am Subject: Re: Win32 FunLove is NO **$#@ Fun! Hello G. Hoxie I have intelligance on this virus it appears to be a new virus called w32 funlove.4099 infects programs also applications with exe,scr,or ocx extensions .Replicates under windows 95&NT.Characterisitcs = memory resident,size stealth,full stealth,triggered event,encrypting,polymorphic you might want to go out and buy a anti virus program that can defeat your attacker let me know if you need a trojan horse defense I distribute the product and it works. Recommend it if you have a tcp connection to the http//www. it also has free updates for life to the licensed computer. -----Original Message----- From: G. Hoxie To: TSCM-L@egroups.com Date: Saturday, April 29, 2000 10:02 PM Subject: [TSCM-L] Win32 FunLove is NO **$#@ Fun! >My computer network was recently infected with the Win32 FunLove >Virus and it has taken nearly two days and that many reloads of >operating systems to get rid of it. > >The virus supposedly does no "real" harm as it only adds a little >over 4Kbytes to every file you open. My problem was that the version >of detection software I was running had not picked it up and my hard >drives got so full they began to create error on top of error. > >I downloaded a new virus detection program called InoculateIT PE >(Personal Edition). It is free and it does have the ability to >remove this critter from files. The only problem is that as soon as >you delete it from one program, due to the nature of windows always >trying to "open the world", it replicates in 2,3, or 10 other files. > >Also, it is very difficult to delete the source (virus) file because >it is always "in use" and windows won't let you. Nasty. > >It is my understanding that it does not transmit over email and that >the real targets for the bug are windows NT machines, where it >removes admin protection, thus allowing anyone access to the server. >Even nastier! > >There is a bunch of info out there on it. Just search for "FunLove >virus" on Google or your favorite Search engine. > >But for now, "These pipes are Clean" > >George Hoxie >Speculor Consulting >Richardson, TX >speculor@h... > > >------------------------------------------------------------------------ >Accurate impartial advice on everything from laptops to table saws. >http://click.egroups.com/1/3020/0/_/507420/_/957060129/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > 228 From: William Knowles Date: Sun Apr 30, 2000 11:07pm Subject: Re: Win32 FunLove is NO **$#@ Fun! It goes without saying that you should always, always, ALWAYS! have your virus definations updated on a weekly and sometimes daily basis, and since you're likely going to be using your computer for 6-12+ hours a day online you should be taking some precautions and managing some risk, I know that every day that the computer is down for me, is a day that will not be billing any hours. I can highly recommend that those of you using Windows 95 & 98 (My condolences) :) look into Norton Internet Security 2000, I understand they make one for the NT networks but I have yet to play around with it. http://www.amazon.com/exec/obidos/ASIN/B00003JAOZ/qid=957163190/sr=1-1/103-0368359-4119056 The Norton package bundles a personal firewall (Ideal for those of you on the list with Cable or DSL) with Norton AntiVirus 2000 for just under $60.00 Cheers! William Knowles wk@c... On Mon, 1 May 2000, Andre Holmes wrote: > Hello G. Hoxie I have intelligance on this virus it appears to > be a new virus called w32 funlove.4099 infects programs also > applications with exe,scr,or ocx extensions .Replicates under > windows 95&NT.Characterisitcs = memory resident,size stealth,full > stealth,triggered event,encrypting,polymorphic you might want to > go out and buy a anti virus program that can defeat your attacker > let me know if you need a trojan horse defense I distribute the > product and it works. Recommend it if you have a tcp connection to > the http//www. it also has free updates for life to the licensed > computer. > > > > -----Original Message----- > From: G. Hoxie > To: TSCM-L@egroups.com > Date: Saturday, April 29, 2000 10:02 PM > Subject: [TSCM-L] Win32 FunLove is NO **$#@ Fun! > > > >My computer network was recently infected with the Win32 FunLove > >Virus and it has taken nearly two days and that many reloads of > >operating systems to get rid of it. > > > >The virus supposedly does no "real" harm as it only adds a little > >over 4Kbytes to every file you open. My problem was that the version > >of detection software I was running had not picked it up and my hard > >drives got so full they began to create error on top of error. 4Kbytes here, 4Kbytes there adds up pretty quickly on a large network and had a few really on their knees. William Knowles wk@c... *-------------------------------------------------* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen. Alfred. M. Gray, USMC --------------------------------------------------- C4I Secure Solutions http://www.c4i.org *-------------------------------------------------* 229 From: Jordan Ulery Date: Mon May 1, 2000 8:46am Subject: Re: Win32 FunLove is NO **$#@ Fun! Another site to look at is ZoneAlarm. This is a freeware site, but has upgrades. The firewall is very, very good and fits in well as a more in-depth protection device that neither Norton nor McAfee offer. William Knowles wrote: > It goes without saying that you should always, always, ALWAYS! have > your virus definations updated on a weekly and sometimes daily basis, > and since you're likely going to be using your computer for 6-12+ > hours a day online you should be taking some precautions and managing > some risk, I know that every day that the computer is down for me, is > a day that will not be billing any hours. > > I can highly recommend that those of you using Windows 95 & 98 > (My condolences) :) look into Norton Internet Security 2000, I > understand they make one for the NT networks but I have yet to > play around with it. > > http://www.amazon.com/exec/obidos/ASIN/B00003JAOZ/qid=957163190/sr=1-1/103-0368359-4119056 > > The Norton package bundles a personal firewall (Ideal for those of you > on the list with Cable or DSL) with Norton AntiVirus 2000 for > just under $60.00 > > Cheers! > > William Knowles > wk@c... > > On Mon, 1 May 2000, Andre Holmes wrote: > > > Hello G. Hoxie I have intelligance on this virus it appears to > > be a new virus called w32 funlove.4099 infects programs also > > applications with exe,scr,or ocx extensions .Replicates under > > windows 95&NT.Characterisitcs = memory resident,size stealth,full > > stealth,triggered event,encrypting,polymorphic you might want to > > go out and buy a anti virus program that can defeat your attacker > > let me know if you need a trojan horse defense I distribute the > > product and it works. Recommend it if you have a tcp connection to > > the http//www. it also has free updates for life to the licensed > > computer. > > > > > > > > -----Original Message----- > > From: G. Hoxie > > To: TSCM-L@egroups.com > > Date: Saturday, April 29, 2000 10:02 PM > > Subject: [TSCM-L] Win32 FunLove is NO **$#@ Fun! > > > > > > >My computer network was recently infected with the Win32 FunLove > > >Virus and it has taken nearly two days and that many reloads of > > >operating systems to get rid of it. > > > > > >The virus supposedly does no "real" harm as it only adds a little > > >over 4Kbytes to every file you open. My problem was that the version > > >of detection software I was running had not picked it up and my hard > > >drives got so full they began to create error on top of error. > > 4Kbytes here, 4Kbytes there adds up pretty quickly on a large network > and had a few really on their knees. > > William Knowles > wk@c... > > > *-------------------------------------------------* > "Communications without intelligence is noise; > Intelligence without communications is irrelevant." > Gen. Alfred. M. Gray, USMC > --------------------------------------------------- > C4I Secure Solutions http://www.c4i.org > *-------------------------------------------------* > > ------------------------------------------------------------------------ > Would you like to save big on your phone bill -- and keep on saving > more each month? Join beMANY! Our huge buying group gives you Long Distance > rates which fall monthly, plus an extra $60 in FREE calls! > http://click.egroups.com/1/2567/0/_/507420/_/957164403/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 230 From: Lachlan.h Date: Tue May 2, 2000 5:10am Subject: Fw: [2600-AU] [LINK] GPS now for tracking people not targetting missiles (fwd) Hi guys, I just thought you may be interested in the following mail that I received from the 2600 mailing list. I'm new to this list, and I'm not sure if this information has already been posted - If so, please except my apologies. Just some background on myself :- I'm a 19 year old male, Australian I.T Student. ----- Original Message ----- From: Grant Bayley To: <2600-list@w...> Sent: Tuesday, May 02, 2000 12:11 PM Subject: [2600-AU] [LINK] GPS now for tracking people not targetting missiles (fwd) > > Nice.... > > ---------- Forwarded message ---------- > Date: Tue, 02 May 2000 11:24:14 +1000 > From: Gordon Keith > To: link@w... > Subject: [LINK] GPS now for tracking people not targetting missiles > > > THE NET NEWS > >From Alan Farrelly > May 2, 2000 > > GPS SCRAMBLING TURNED OFF > President Clinton today ordered that as at 8pm EDT the US military stop > scrambling the Global Position System satellite signals. This means GPS > navigation will improve, from an error factor of more than 100 metres > to under 20 metres. The White House says the accuracy of GPS will exceed > the resolution of US Geological Survey topographical quad maps. Net News > will never get lost in the wilderness again! See > http://www.whitehouse.gov/library/PressReleases.cgi?date=0&briefing=4 > > > >From the press release: > > The improved, non-degraded signal > will increase civilian accuracy by an order of magnitude, and have > immediate implications in areas such as: > > Enhanced-911: The FCC will soon require that all new cellular phones be > equipped with more accurate location determination technology to improve > responses to emergency 911 calls. Removing SA will boost the accuracy > of > GPS to such a degree that it could become the method of choice for > implementing the 911 requirement. A GPS-based solution might be simpler > and more economical than alternative techniques such as radio tower > triangulation, leading to lower consumer costs. > > > --------------------------------------------------------------------- > The name of this list is: 2600-list@w... > To unsubscribe, e-mail: 2600-list-unsubscribe@w... > For additional commands, e-mail: 2600-list-help@w... > > 231 From: Date: Sat Apr 29, 2000 4:04am Subject: Re: A.N.A.C. Greetings. At the risk of seeming like a dolt, of what use is an automatic number announcement circut in a t.s.c.m. land line sweep? Negative- 232 From: James M. Atkinson, Comm-Eng Date: Tue May 2, 2000 6:24am Subject: GPS Precision I seem to recall that on a stationary target the precision GPS signal has accuracy of under one inch, and that the "20 foot" accuracy number relates to targets moving at a high rate of speed. -jma May 1, 2000 STATEMENT BY THE PRESIDENT REGARDING THE UNITED STATES? DECISION TO STOP DEGRADING GLOBAL POSITIONING SYSTEM ACCURACY THE WHITE HOUSE Office of the Press Secretary _______________________________________________________ For Immediate Release May 1, 2000 STATEMENT BY THE PRESIDENT REGARDING THE UNITED STATES? DECISION TO STOP DEGRADING GLOBAL POSITIONING SYSTEM ACCURACY Today, I am pleased to announce that the United States will stop the intentional degradation of the Global Positioning System (GPS) signals available to the public beginning at midnight tonight. We call this degradation feature Selective Availability (SA). This will mean that civilian users of GPS will be able to pinpoint locations up to ten times more accurately than they do now. GPS is a dual-use, satellite-based system that provides accurate location and timing data to users worldwide. My March 1996 Presidential Decision Directive included in the goals for GPS to: ?encourage acceptance and integration of GPS into peaceful civil, commercial and scientific applications worldwide; and to encourage private sector investment in and use of U.S. GPS technologies and services.? To meet these goals, I committed the U.S. to discontinuing the use of SA by 2006 with an annual assessment of its continued use beginning this year. The decision to discontinue SA is the latest measure in an on-going effort to make GPS more responsive to civil and commercial users worldwide. Last year, Vice President Gore announced our plans to modernize GPS by adding two new civilian signals to enhance the civil and commercial service. This initiative is on-track and the budget further advances modernization by incorporating some of the new features on up to 18 additional satellites that are already awaiting launch or are in production. We will continue to provide all of these capabilities to worldwide users free of charge. My decision to discontinue SA was based upon a recommendation by the Secretary of Defense in coordination with the Departments of State, Transportation, Commerce, the Director of Central Intelligence, and other Executive Branch Departments and Agencies. They realized that worldwide transportation safety, scientific, and commercial interests could best be served by discontinuation of SA. Along with our commitment to enhance GPS for peaceful applications, my administration is committed to preserving fully the military utility of GPS. The decision to discontinue SA is coupled with our continuing efforts to upgrade the military utility of our systems that use GPS, and is supported by threat assessments which conclude that setting SA to zero at this time would have minimal impact on national security. Additionally, we have demonstrated the capability to selectively deny GPS signals on a regional basis when our national security is threatened. This regional approach to denying navigation services is consistent with the 1996 plan to discontinue the degradation of civil and commercial GPS service globally through the SA technique. Originally developed by the Department of Defense as a military system, GPS has become a global utility. It benefits users around the world in many different applications, including air, road, marine, and rail navigation, telecommunications, emergency response, oil exploration, mining, and many more. Civilian users will realize a dramatic improvement in GPS accuracy with the discontinuation of SA. For example, emergency teams responding to a cry for help can now determine what side of the highway they must respond to, thereby saving precious minutes. This increase in accuracy will allow new GPS applications to emerge and continue to enhance the lives of people around the world. 30-30-30 At 8:10 PM +1000 5/2/00, Lachlan.h wrote: >Hi guys, > >I just thought you may be interested in the following mail that I received >from the 2600 mailing list. > >I'm new to this list, and I'm not sure if this information has already been >posted - If so, please except my apologies. > >Just some background on myself :- >I'm a 19 year old male, Australian I.T Student. > >----- Original Message ----- >From: Grant Bayley >To: <2600-list@w...> >Sent: Tuesday, May 02, 2000 12:11 PM >Subject: [2600-AU] [LINK] GPS now for tracking people not targetting >missiles (fwd) > > > > > > Nice.... > > > > ---------- Forwarded message ---------- > > Date: Tue, 02 May 2000 11:24:14 +1000 > > From: Gordon Keith > > To: link@w... > > Subject: [LINK] GPS now for tracking people not targetting missiles > > > > > > THE NET NEWS > > >From Alan Farrelly > > May 2, 2000 > > > > GPS SCRAMBLING TURNED OFF > > President Clinton today ordered that as at 8pm EDT the US military stop > > scrambling the Global Position System satellite signals. This means GPS > > navigation will improve, from an error factor of more than 100 metres > > to under 20 metres. The White House says the accuracy of GPS will exceed > > the resolution of US Geological Survey topographical quad maps. Net News > > will never get lost in the wilderness again! See > > http://www.whitehouse.gov/library/PressReleases.cgi?date=0&briefing=4 > > > > > > >From the press release: > > > > The improved, non-degraded signal > > will increase civilian accuracy by an order of magnitude, and have > > immediate implications in areas such as: > > > > Enhanced-911: The FCC will soon require that all new cellular phones be > > equipped with more accurate location determination technology to improve > > responses to emergency 911 calls. Removing SA will boost the accuracy > > of > > GPS to such a degree that it could become the method of choice for > > implementing the 911 requirement. A GPS-based solution might be simpler > > and more economical than alternative techniques such as radio tower > > triangulation, leading to lower consumer costs. > > > > > > --------------------------------------------------------------------- =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 233 From: Ed Naylor Date: Tue May 2, 2000 10:31am Subject: Re: Re: A.N.A.C. I've had several situations where there were extra unidentified lines on premise. Ed (Engineered Systems, Arroyo Grande, CA) ============================ At 05:04 AM 4/29/00 -0400, you wrote: >Greetings. >At the risk of seeming like a dolt, of what use is an automatic number >announcement circut in a t.s.c.m. land line sweep? >Negative- 234 From: Mike F Date: Tue May 2, 2000 10:44am Subject: RE: Re: A.N.A.C. The use is for identification of a particular phone line. If customer is in office building,where there are say another 50 businesses. When you get to where the phone lines enter building,you would want ot identify customers phone line(s),with the linesmans phone or any phone. Therefore you would be checking the phone lines of your customer not the other 50 businesses. Then,the correct phone line(s) identified,you could follow correct wires for physical inspection. Connect other equipment you have to detect possible phone taps. later4,mike f. -----Original Message----- From: Negative-@w... [mailto:Negative-@w...] Sent: Saturday, April 29, 2000 5:05 AM To: TSCM-L@egroups.com Subject: [TSCM-L] Re: A.N.A.C. Greetings. At the risk of seeming like a dolt, of what use is an automatic number announcement circut in a t.s.c.m. land line sweep? Negative- ------------------------------------------------------------------------ Do you love your Mother? Click Here http://click.egroups.com/1/3652/0/_/507420/_/957266768/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 235 From: Guy Urbina Date: Tue May 2, 2000 11:54am Subject: RE: GPS Precision My two cents worth on GPS precision.... (by the way, I think it's great SA is finally taken off) typical errors and their degradation to accuracy: satellite clock error --- 2 ft. ephemeris errors -------- 2 ft. receiver errors --------- 4 ft. atmospheric/ionospheric --12 ft. Total = 20ft. Don't forget to multiply your PDOP (position dilution of Precision) to this number. Good PDOPS are between 3 and 6. (PDOP is basically a ranging error that depends on the SV's relative angles in the sky. The wider the angle between the satellites, the better the measurement) with SA gone now, your typical walmart GPS receiver will have an accuracy of anywhere between 60 to 120 ft. But with the GPS chipsets coming out now especially with the WAAS (wide area augmentation system) you can get accuracy within 2 meters or less. The tracking systems I design, I was getting 15 meter accuracy with SA on, closer to 15 ft, now....I'm even anticipating better resolution when I switch over to the SIRF 2 chipsets in the next few months. BTW, some of the OEM receiver vendors have imbedded in their firmware limits to tracking above a certain velocity........I believe it has something to do with preventing their receivers for use in GPS guided munitions. They call it *anti missile limit* -Guy -----Original Message----- From: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] Sent: Tuesday, May 02, 2000 4:24 AM To: TSCM-L@egroups.com Subject: [TSCM-L] GPS Precision I seem to recall that on a stationary target the precision GPS signal has accuracy of under one inch, and that the "20 foot" accuracy number relates to targets moving at a high rate of speed. -jma May 1, 2000 STATEMENT BY THE PRESIDENT REGARDING THE UNITED STATES? DECISION TO STOP DEGRADING GLOBAL POSITIONING SYSTEM ACCURACY THE WHITE HOUSE Office of the Press Secretary _______________________________________________________ For Immediate Release May 1, 2000 STATEMENT BY THE PRESIDENT REGARDING THE UNITED STATES? DECISION TO STOP DEGRADING GLOBAL POSITIONING SYSTEM ACCURACY Today, I am pleased to announce that the United States will stop the intentional degradation of the Global Positioning System (GPS) signals available to the public beginning at midnight tonight. We call this degradation feature Selective Availability (SA). This will mean that civilian users of GPS will be able to pinpoint locations up to ten times more accurately than they do now. GPS is a dual-use, satellite-based system that provides accurate location and timing data to users worldwide. My March 1996 Presidential Decision Directive included in the goals for GPS to: ?encourage acceptance and integration of GPS into peaceful civil, commercial and scientific applications worldwide; and to encourage private sector investment in and use of U.S. GPS technologies and services.? To meet these goals, I committed the U.S. to discontinuing the use of SA by 2006 with an annual assessment of its continued use beginning this year. The decision to discontinue SA is the latest measure in an on-going effort to make GPS more responsive to civil and commercial users worldwide. Last year, Vice President Gore announced our plans to modernize GPS by adding two new civilian signals to enhance the civil and commercial service. This initiative is on-track and the budget further advances modernization by incorporating some of the new features on up to 18 additional satellites that are already awaiting launch or are in production. We will continue to provide all of these capabilities to worldwide users free of charge. My decision to discontinue SA was based upon a recommendation by the Secretary of Defense in coordination with the Departments of State, Transportation, Commerce, the Director of Central Intelligence, and other Executive Branch Departments and Agencies. They realized that worldwide transportation safety, scientific, and commercial interests could best be served by discontinuation of SA. Along with our commitment to enhance GPS for peaceful applications, my administration is committed to preserving fully the military utility of GPS. The decision to discontinue SA is coupled with our continuing efforts to upgrade the military utility of our systems that use GPS, and is supported by threat assessments which conclude that setting SA to zero at this time would have minimal impact on national security. Additionally, we have demonstrated the capability to selectively deny GPS signals on a regional basis when our national security is threatened. This regional approach to denying navigation services is consistent with the 1996 plan to discontinue the degradation of civil and commercial GPS service globally through the SA technique. Originally developed by the Department of Defense as a military system, GPS has become a global utility. It benefits users around the world in many different applications, including air, road, marine, and rail navigation, telecommunications, emergency response, oil exploration, mining, and many more. Civilian users will realize a dramatic improvement in GPS accuracy with the discontinuation of SA. For example, emergency teams responding to a cry for help can now determine what side of the highway they must respond to, thereby saving precious minutes. This increase in accuracy will allow new GPS applications to emerge and continue to enhance the lives of people around the world. 30-30-30 At 8:10 PM +1000 5/2/00, Lachlan.h wrote: >Hi guys, > >I just thought you may be interested in the following mail that I received >from the 2600 mailing list. > >I'm new to this list, and I'm not sure if this information has already been >posted - If so, please except my apologies. > >Just some background on myself :- >I'm a 19 year old male, Australian I.T Student. > >----- Original Message ----- >From: Grant Bayley >To: <2600-list@w...> >Sent: Tuesday, May 02, 2000 12:11 PM >Subject: [2600-AU] [LINK] GPS now for tracking people not targetting >missiles (fwd) > > > > > > Nice.... > > > > ---------- Forwarded message ---------- > > Date: Tue, 02 May 2000 11:24:14 +1000 > > From: Gordon Keith > > To: link@w... > > Subject: [LINK] GPS now for tracking people not targetting missiles > > > > > > THE NET NEWS > > >From Alan Farrelly > > May 2, 2000 > > > > GPS SCRAMBLING TURNED OFF > > President Clinton today ordered that as at 8pm EDT the US military stop > > scrambling the Global Position System satellite signals. This means GPS > > navigation will improve, from an error factor of more than 100 metres > > to under 20 metres. The White House says the accuracy of GPS will exceed > > the resolution of US Geological Survey topographical quad maps. Net News > > will never get lost in the wilderness again! See > > http://www.whitehouse.gov/library/PressReleases.cgi?date=0&briefing=4 > > > > > > >From the press release: > > > > The improved, non-degraded signal > > will increase civilian accuracy by an order of magnitude, and have > > immediate implications in areas such as: > > > > Enhanced-911: The FCC will soon require that all new cellular phones be > > equipped with more accurate location determination technology to improve > > responses to emergency 911 calls. Removing SA will boost the accuracy > > of > > GPS to such a degree that it could become the method of choice for > > implementing the 911 requirement. A GPS-based solution might be simpler > > and more economical than alternative techniques such as radio tower > > triangulation, leading to lower consumer costs. > > > > > > --------------------------------------------------------------------- =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== ------------------------------------------------------------------------ High rates giving you headaches? The 0% APR Introductory Rate from Capital One. 9.9% Fixed thereafter! http://click.egroups.com/1/3010/0/_/507420/_/957266954/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 236 From: Jordan Ulery Date: Tue May 2, 2000 5:06pm Subject: Re: GPS Precision GPS is great, unless you are on the receiving end of a guided missile. Yes, compensation & correction is relatively easy for the sophisticated, but the slam, bam, blow 'em up man is now armed with a delivery system that had previously been denied. Also, tracking of individuals with "On*" and like systems is now much more accurate, in an emergency, or if your just spying on your fellow man. There are pluses and minuses in ever action and I am not too certain the pluses outweigh the minuses here. Guy Urbina wrote: > My two cents worth on GPS precision.... > (by the way, I think it's great SA is finally taken off) > > typical errors and their degradation to accuracy: > > satellite clock error --- 2 ft. > ephemeris errors -------- 2 ft. > receiver errors --------- 4 ft. > atmospheric/ionospheric --12 ft. > > Total = 20ft. > > Don't forget to multiply your PDOP (position dilution of Precision) to this > number. Good PDOPS are between 3 and 6. > > (PDOP is basically a ranging error that depends on the SV's relative angles > in the sky. The wider the angle between the satellites, the better the > measurement) > > with SA gone now, your typical walmart GPS receiver will have an accuracy of > anywhere between 60 to 120 ft. > > But with the GPS chipsets coming out now especially with the WAAS (wide area > augmentation system) you can get accuracy within 2 meters or less. > > The tracking systems I design, I was getting 15 meter accuracy with SA on, > closer to 15 ft, now....I'm even anticipating better resolution when I > switch over to the SIRF 2 chipsets in the next few months. > > BTW, some of the OEM receiver vendors have imbedded in their firmware limits > to tracking above a certain velocity........I believe it has something to do > with preventing their receivers for use in GPS guided munitions. They call > it *anti missile limit* > > -Guy > > -----Original Message----- > From: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] > Sent: Tuesday, May 02, 2000 4:24 AM > To: TSCM-L@egroups.com > Subject: [TSCM-L] GPS Precision > > I seem to recall that on a stationary target the precision GPS signal > has accuracy of under one inch, and that the "20 foot" accuracy > number relates to targets moving at a high rate of speed. > > -jma > > > May 1, 2000 > > STATEMENT BY THE PRESIDENT REGARDING THE UNITED STATES? DECISION TO > STOP DEGRADING GLOBAL POSITIONING SYSTEM ACCURACY > > THE WHITE HOUSE > > Office of the Press Secretary > > _______________________________________________________ > For Immediate Release May 1, 2000 > > STATEMENT BY THE PRESIDENT REGARDING > THE UNITED STATES? DECISION TO STOP DEGRADING > GLOBAL POSITIONING SYSTEM ACCURACY > > Today, I am pleased to announce that the United States will stop the > intentional degradation of the Global Positioning System (GPS) signals > available to the public beginning at midnight tonight. We call this > degradation feature Selective Availability (SA). This will mean that > civilian users of GPS will be able to pinpoint locations up to ten times > more accurately than they do now. GPS is a dual-use, satellite-based > system that provides accurate location and timing data to users worldwide. > My March 1996 Presidential Decision Directive included in the goals for GPS > to: ?encourage acceptance and integration of GPS into peaceful civil, > commercial and scientific applications worldwide; and to encourage private > sector investment in and use of U.S. GPS technologies and services.? To > meet these goals, I committed the U.S. to discontinuing the use of SA by > 2006 with an annual assessment of its continued use beginning this year. > > The decision to discontinue SA is the latest measure in an on-going effort > to make GPS more responsive to civil and commercial users worldwide. Last > year, Vice President Gore announced our plans to modernize GPS by adding > two new civilian signals to enhance the civil and commercial service. This > initiative is on-track and the budget further advances modernization by > incorporating some of the new features on up to 18 additional satellites > that are already awaiting launch or are in production. We will continue to > provide all of these capabilities to worldwide users free of charge. > > My decision to discontinue SA was based upon a recommendation by the > Secretary of Defense in coordination with the Departments of State, > Transportation, Commerce, the Director of Central Intelligence, and other > Executive Branch Departments and Agencies. They realized that worldwide > transportation safety, scientific, and commercial interests could best be > served by discontinuation of SA. Along with our commitment to enhance GPS > for peaceful applications, my administration is committed to preserving > fully the military utility of GPS. The decision to discontinue SA is > coupled with our continuing efforts to upgrade the military utility of our > systems that use GPS, and is supported by threat assessments which conclude > that setting SA to zero at this time would have minimal impact on national > security. Additionally, we have demonstrated the capability to selectively > deny GPS signals on a regional basis when our national security is > threatened. This regional approach to denying navigation services is > consistent with the 1996 plan to discontinue the degradation of civil and > commercial GPS service globally through the SA technique. > > Originally developed by the Department of Defense as a military system, GPS > has become a global utility. It benefits users around the world in many > different applications, including air, road, marine, and rail navigation, > telecommunications, emergency response, oil exploration, mining, and many > more. Civilian users will realize a dramatic improvement in GPS accuracy > with the discontinuation of SA. For example, emergency teams responding to > a cry for help can now determine what side of the highway they must respond > to, thereby saving precious minutes. This increase in accuracy will allow > new GPS applications to emerge and continue to enhance the lives of people > around the world. > > 30-30-30 > > At 8:10 PM +1000 5/2/00, Lachlan.h wrote: > >Hi guys, > > > >I just thought you may be interested in the following mail that I received > >from the 2600 mailing list. > > > >I'm new to this list, and I'm not sure if this information has already been > >posted - If so, please except my apologies. > > > >Just some background on myself :- > >I'm a 19 year old male, Australian I.T Student. > > > >----- Original Message ----- > >From: Grant Bayley > >To: <2600-list@w...> > >Sent: Tuesday, May 02, 2000 12:11 PM > >Subject: [2600-AU] [LINK] GPS now for tracking people not targetting > >missiles (fwd) > > > > > > > > > > Nice.... > > > > > > ---------- Forwarded message ---------- > > > Date: Tue, 02 May 2000 11:24:14 +1000 > > > From: Gordon Keith > > > To: link@w... > > > Subject: [LINK] GPS now for tracking people not targetting missiles > > > > > > > > > THE NET NEWS > > > >From Alan Farrelly > > > May 2, 2000 > > > > > > GPS SCRAMBLING TURNED OFF > > > President Clinton today ordered that as at 8pm EDT the US military stop > > > scrambling the Global Position System satellite signals. This means GPS > > > navigation will improve, from an error factor of more than 100 metres > > > to under 20 metres. The White House says the accuracy of GPS will exceed > > > the resolution of US Geological Survey topographical quad maps. Net News > > > will never get lost in the wilderness again! See > > > http://www.whitehouse.gov/library/PressReleases.cgi?date=0&briefing=4 > > > > > > > > > >From the press release: > > > > > > The improved, non-degraded signal > > > will increase civilian accuracy by an order of magnitude, and have > > > immediate implications in areas such as: > > > > > > Enhanced-911: The FCC will soon require that all new cellular phones be > > > equipped with more accurate location determination technology to improve > > > responses to emergency 911 calls. Removing SA will boost the accuracy > > > of > > > GPS to such a degree that it could become the method of choice for > > > implementing the 911 requirement. A GPS-based solution might be simpler > > > and more economical than alternative techniques such as radio tower > > > triangulation, leading to lower consumer costs. > > > > > > > > > --------------------------------------------------------------------- > > =================================================================== > Sed quis custodiet ipsos Custodes? > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > "...any sufficiently advanced technology is > indistinguishable from magic." - Arthur C. Clarke > =================================================================== > > ------------------------------------------------------------------------ > High rates giving you headaches? The 0% APR Introductory Rate from > Capital One. 9.9% Fixed thereafter! > http://click.egroups.com/1/3010/0/_/507420/_/957266954/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > ------------------------------------------------------------------------ > Now the best and coolest websites come right to you based on your > unique interests. eTour.com is surfing without searching. > And, it's FREE! > http://click.egroups.com/1/3013/0/_/507420/_/957300712/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS [Non-text portions of this message have been removed] 237 From: Jay Coote Date: Tue May 2, 2000 6:49pm Subject: Wet TDRs I would like to hear from anyone who has used any of the following TDRs on active or "wet" POTS phonelines in North America. What do you think?: Biddle- Riser-Bond- Tektronix TS-90 Tektronix TS-100 Tektronix TS-200 Thanks, Jay Coote Los Angeles 238 From: Trace Carpenter Date: Tue May 2, 2000 9:34pm Subject: Re: Wet TDRs Jay we use Riser Bond 1270s and LOVE them. Furthermore their repair and customer service is wonderful. Jay Coote wrote: > I would like to hear from anyone who has used any of the following TDRs on > active or "wet" POTS phonelines in North America. What do you think?: > Biddle- > Riser-Bond- > Tektronix TS-90 > Tektronix TS-100 > Tektronix TS-200 > Thanks, > Jay Coote > Los Angeles > > ------------------------------------------------------------------------ > You have a voice mail message waiting for you at iHello.com: > http://click.egroups.com/1/3555/0/_/507420/_/957311360/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- *Trace Carpenter *2926 Maple Ave., Ste. 200 *Dallas, Texas 75201 *214.828.4520; 214.740-0112 Facsimile *Because the fly on the wall might not be the only bug in the room.ô 239 From: Date: Wed May 3, 2000 7:15am Subject: New Member Allow me to introduce myself. I am Jim Douglas, I run a small Investigation Company specialising in fraud (investigations) mainly within the banking industry. I live and have an office in St Peter Port on the Island of Guernsey and ëhave a deskí in a major City of London financial institution who monopolise most of my services. I work with a number of London Investigators, which is where I have regularly viewed TSCM Onelist. In common with many people in this industry, I have a Government background. I then worked for a couple of years as a full time TSCM Operator in partnership with an ex-telephone engineer and although I enjoyed both the work and the level of remuneration, the unsocial hours lacked appeal. I like to keep up with whatís happening in the TSCM world and now turnout for a former colleagueís sweep team to cover for holidays etc. One of my reasons for joining the group was to ascertain if any of you TSCM Ops could explain to me how someone can get a TSCM (US) Patent granted relating to : 'detecting single/multiple spectra at different locations and collating these records to distinguish spectral features associated with one specific location from other locations in the site of interest' Isn't that the basis of all TSCM/TEMPEST Sweeps? A similar application was disallowed in Europe, although someone told me the US system allows the Patent, pending objections, true or not? Check it out, there are over 40 claims. US Patent # 6,021,269 of 1/2/2000. Jim Douglas Douglas Security Consultants PO Box 122 Fosse Andres St Peter Port Guernsey Channel Isles Cellnet: 44(0)802 510216 email: Dugconsult@a... 240 From: Andy Grudko Date: Tue May 2, 2000 2:39pm Subject: Re: GPS Precision ----- Original Message ----- Subject: [TSCM-L] GPS Precision > I seem to recall that on a stationary target the precision GPS signal > has accuracy of under one inch, and that the "20 foot" accuracy > number relates to targets moving at a high rate of speed. > May 1, 2000 > STATEMENT BY THE PRESIDENT REGARDING THE UNITED STATES? DECISION TO STOP DEGRADING GLOBAL POSITIONING SYSTEM ACCURACY I've been using GPS for 6 years for tracking suspects and never needed more than the +- 20mr accuracy offered by the existing commercial system. Perhaps the President can use this extra accuracy to establish exactly where his cigar was on a particular date, to - within an inch. Aggh, I'm just being cynical - we all know a US President has never written a press release! Andy Grudko --------------------------------------------------- Bid for your own politician on send$$$@g... ---------------------------------------------------From: Miguel Puchol Date: Wed Apr 25, 2001 10:48am Subject: RE: Phone spy Craig, Here in Spain there has recently been some uproar over a case where an employee was fired for using the company's email system to send personal messages, and more exactly 180 pornographic, offensive or joke messages to other colleagues in the same office/building, and to some outside the company - over a period of one week. This company was monitoring email use, and also monitoring the contents of messages sent via their email server. The employee took the company to court, for unfair dismissal, and he lost - the court agreed that the employee had no right to expect privacy when using company communication lines (phone/email/fax, etc.). The unions have since banged on about privacy laws, as can be applied to normal written mail - to be applied to email. But my question is - if a company has no right whatsoever to monitor what their employees are communicating to the outside (or inside) world, then how can they be sure that one of them is not sending all the plans for the next super-secret product to a competitor? I believe that when you are at work, your time belongs to your employer (always within common sense practice and no abuse), and so do the communication systems that he lets you use to perform your work - so if he wants to monitor them, for security or quality control, I think he's entitled to do it. If you want to email or call and want it's content 'private' then do it from home...and even then you never know who may be listening... As always, just my oppinion :-) All the best, Mike > -----Mensaje original----- > De: Craig Snedden [mailto:craig@d...] > Enviado el: miercoles, 25 de abril de 2001 10:26 > Para: TSCM-L@yahoogroups.com > Asunto: Re: [TSCM-L] Phone spy > > > > I think someone should pay them a visit, to tell them that > applicable laws > > say you can't even sell or advertise such equipment, never mind trusting > the > > buyer about not breaking the law. > > > > In any case, how is this applied in the U.S., is it Federal law? Or do > > states regulate what can and cannot be sold? > > > Now here we have an example of the "law" as applicable to the web at > work..... > > This guy is located in the US, so presumably is subject to > applicable State > and Federal laws. However, where is his website located? If it > is outside > the US is he commiting an offence? > > None of the products I saw on his site (I didn't look at them > all) would be > illegal to advertise, purchase or own within the United Kingdom. Relevant > statute laws make it an offence only to use certain types of equipment in > certain circumstances. > > e.g. To possess a transmitter capable of TX on 113 Mhz without being > licenced to TX on that freq is not an offence, but switch it on and you > would commit an offence. > > Whilst you ponder that one, consider this. Statute law in the UK > makes it an > offence to listen to radio transmissions unless you are licenced to do > so........ There are "exceptions" for broadcast radio, amateur radio and > maritime safety broadcasts (technically you should also possess a > licence to > receive those broadcasts too, but there is a "dispensation" made for > them(Airband is also generally overlooked. I've not heard of anyone being > charged with an offence for listening to airband). > ). If you are tuning your scanner and happen to drift to a police or > utility frequency, you must not listen, but must tune off immediately! > > So where does that leave me as a TSCM operative, carrying out a > sweep and I > come across a bug TX on say 130 Mhz? Listening to it I'm commiting an > offence as I don't have a licence for that freq.....!!!??? I suppose I > might argue in my defence that in finding the bug and stopping it > transmitting I'm performing a public service by removing an illegal > transmitter that may be causing interference to transmissions > connected with > public safety......? > > Until recently it was perfectly legal in the UK to fit a non transmitting > intercept to the "private" side of a PBX system, so long as you had the > system owners consent to do so. e.g. Within a business organisation, > monitoring a target extension. That has changed to some degree with the > implimentation of "human rights" legislation if you are a "public > authority" > and other recent legislation including the Data Protection Act & > Interception of Communications Act & "Anti Stalking" legislation. > There are still ways around this, like installing "quality monitoring" > systems as used in call centre operations & warning all employees > that thier > calls may be recorded etc. but you must provide a non monitored phone for > employees private use....!! > > I give up, I'm going home.......!! > > :-) > > Have a nice day > > Craig > > > The data contained herein is confidential. Unauthorised dissemination > of the contents of this e-mail may be in breach of Criminal and Civil law > and may lead to prosecution. > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 2973 From: James M. Atkinson, Comm-Eng Date: Wed Apr 25, 2001 3:32pm Subject: Russians accused of bugging MoD Russians accused of bugging MoD http://www.guardian.co.uk/uk_news/story/0,3604,476772,00.html Richard Norton-Taylor Monday April 23, 2001 The Guardian Mystery last night surrounded reports that as many as 30 eavesdropping devices had been discovered in Ministry of Defence buildings, including its headquarters in Whitehall. The ministry said the Sunday newspaper reports could not be confirmed but it was "always vigilant about security" and "regularly" swept the buildings for devices. Defence sources suggested that the bugs were planted over the past 10 years by Russian spies and, more recently, by representatives of foreign arms companies, including French ones. According to the Sunday Times, two bugs were found at Turnstile House, an MoD building in London where surveillance devices were designed and tested for British agents. Another bug was said to have been found at the Royal College of Surgeons, used by the MoD for a meeting between its arms procurers and a British defence firm. However, it emerged later that the MoD had never told MI5 - which is responsible for advising Whitehall departments about security - about the bugs. MI5 would have known if devices had been found, Whitehall sources said. The bugging scare was said by security sources to have been unwittingly started by a sergeant from RAF Digby in Lincolnshire where military personnel attached to GCHQ, the government's electronic eavesdropping centre, are trained. The sergeant was lecturing MoD officials about the need to be vigilant as part of a briefing on "threat awareness," a Whitehall source said. He was deliberately quoting "frightened bureaucrats", the source added. The sergeant's warnings about bugs and where they might be placed were taken at face value by MoD officials. Geoff Hoon, the defence secretary, muddied the waters when he told BBC1's Breakfast with Frost programme: "These reports were over a 10-year period and if we weren't able to find these bugs and deal with them in the way we have, then we might have a problem. My security experts tell me the fact that we can detect these things does indicate that security remains at the very highest level in the MoD." Mr Hoon will have the opportunity to explain the mystery when he is questioned by MPs in the Commons today. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2974 From: James M. Atkinson, Comm-Eng Date: Wed Apr 25, 2001 3:42pm Subject: French firms may have bugged MoD [Moderators Note: Ok, let me get this straight... first it's the Russians, then it's the French, then the Chinese... what next; leprechauns installed the bugs? The funny thing is that just last week the British government said the bugs were accidently found by construction workers tearing out walls, but that NOW they were found by sweepers (which they of course claim "shows how effective their sweepers are..." ) Does anybody else out there find the damage control on this situation more then just a little fishy?] [Moderators Note #2: "Nations do not have friends... they have interests"]. Monday 23 April 2001 French firms may have bugged MoD http://www.telegraph.co.uk/et?ac=000579381554028&rtmo=qxbqupe9&atmo=99999999&pg=/et/01/4/23/nbug23.html By Michael Smith, Defence Correspondent FRENCH arms companies attempting to elbow British competitors aside are suspected of planting electronic bugs uncovered inside Ministry of Defence buildings. Defence officials said that a number of devices had been found during the current refurbishment of the MoD's main building off Whitehall. Officials said MI5, the lead agency on security in any government buildings and departments, had not been informed of the discovery. Geoff Hoon, the Defence Secretary, appeared to confirm that about 30 devices had been discovered in various MoD properties. He said this showed the effectiveness of the MoD's regular scans to uncover electronic devices. One official said: "There have definitely been some found. I would be surprised if there weren't to be honest. That's why we scan the buildings so regularly." MoD workers said the bugs were thought to have been planted by a number of different people, some of whom may have been working for the Russians who have continued spying despite the end of the Cold War. But they said there was a suspicion that many were planted for the purpose of "industrial espionage" with French companies among the most likely suspects. French firms are among the leading suppliers of defence equipment and, apart from the Americans, are the main rivals to British companies seeking lucrative MoD contracts. The Americans were not thought to have been involved. MoD premises are regularly scanned and in high-security areas electronic jamming is employed to neutralise espionage attempts. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2975 From: DrPepper Date: Wed Apr 25, 2001 0:06pm Subject: RE: Selling of spy stuff If you think that selling such things as hidden transmitters is legal in the US, just ask the folks at Ramsey Electronics. They were shut down for doing just that. Also, the Customs service is alert to packages coming into a US address from certain foreign companies, and have been known to stop and confiscate items. 2976 From: Phillip H. Waters Date: Wed Apr 25, 2001 1:10pm Subject: Concerning 'Phone Spy' Robert W. Doms, Sr. has done a pretty good job of setting out the legal considerations of phone tapping and bugging in his book "Practical Countermeasures for Law Enforcement", website . While the title implies that this publication is intended for LE, he may make exceptions. You may find a companion book interesting, "As I Recall" documenting the beginnings and progression of spying and TSCM. Phil Waters 2977 From: James M. Atkinson, Comm-Eng Date: Wed Apr 25, 2001 5:21pm Subject: Bus Tour Reveals Spy Hot Spots in U.S. Capital [Walter Mitty would be proud] Wednesday April 25 11:59 AM ET Bus Tour Reveals Spy Hot Spots in U.S. Capital http://dailynews.yahoo.com/h/nm/20010425/lf/life_spies_dc_1.html By Tabassum Zakaria WASHINGTON (Reuters) - Innocuous restaurants, an iron fence, and an ordinary mailbox are brought to life as sites of espionage on a bus tour that looks at the U.S. capital through spy-colored glasses. ``SpyDrive'' is conducted by former intelligence officers of the Soviet KGB and the U.S. Central Intelligence Agency (news - web sites) who recount the flip sides of legendary exploits, mainly during the Cold War, in a two-hour tour. ``While we drive through the city, there is espionage going on right now. Somebody is developing somebody for recruitment, someone is putting down a dead drop, someone is passing information. It does not stop,'' former CIA (news - web sites) officer Peter Earnest, one of the tour guides, said. The recent spy case of former FBI (news - web sites) agent Robert Hanssen, accused of selling U.S. secrets to Moscow over 15 years for $1.4 million in money and diamonds, has increased demand for the tour which costs $55 per person. But the tour has not altered its course to include new Hanssen-related sites. He was arrested Feb. 18 after allegedly dropping off a package of secret material in a Virginia park. The bus passes by the FBI building where the spy hunters, Hanssen's former colleagues, work on the fourth floor. It also makes an extensive circle of the Russian embassy -- but there is no tunnel viewing. U.S. officials believe Hanssen told Moscow about a secret eavesdropping tunnel built during the Cold War beneath the Soviet embassy. Marked Mailbox A U.S. mailbox on the corner of 37th and R streets was code-named ``smile'' by the KGB and used by Aldrich Ames to signal with a horizontal chalk mark that he had information. Ames, a former CIA officer, was convicted of spying for Moscow. ``The KGB regularly drove down 37th Street because it goes up to the Soviet Embassy,'' Oleg Kalugin, a former KGB general who was the other tour guide, said. ``All they had to do was glance across and see if there was a sign.'' ``In this particular case we do know how stable and solid the United States postal service is. They will never remove their boxes from where they are,'' Kalugin said. ``Putting signals on utility poles, mailboxes, some public buildings, bridges, was a favorite choice for the intelligence operators,'' he added. Earnest said ``everything short of skywriting'' has been used for signaling, but the simplest method is putting a mark on a place regularly visited by the intelligence service. Hanssen allegedly used white adhesive tape on a ``pedestrian crossing'' signpost near his northern Virginia home to signal. Vertical meant ready to receive a package, a horizontal marking by the KGB meant the drop had occurred, and a subsequent vertical meant the package was received. ``It is a very, very difficult crime to uncover. It is very difficult to prove. And the reason is unlike many thefts there is nothing gone,'' Earnest said of espionage. ``Someone steals your secrets, what's missing? If all the paper is still there, all your information is still there, your safes are closed, how do you know anything is missing?'' Failed Fence Attempt The bus stops at a black iron fence at the back of the Russian Embassy to show the spot where in 1976, CIA employee Edwin Moore threw a package onto the grounds of the embassy offering to spy for the Soviets. The Soviet security officer contacted local police thinking it might be a bomb. One of the policemen noticed classified documents in the package and immediately told the Soviet security officer ``it's a bomb, it's a bomb,'' Earnest said. The FBI followed enclosed instructions for contacting Moore and set a trap that caught him within 24 hours. Dumbarton Oaks in Georgetown, an estate with rolling gardens, was ``a wonderful place to have agent meetings,'' and was where Israeli intelligence officer Avi Sella met Jonathan Pollard, Earnest said. Pollard, a former Navy intelligence analyst, was arrested in 1985 and convicted of spying for Israel, which has repeatedly pressed the United States for his release. The bus passes the house where Ronald Pelton, a disgruntled National Security Agency employee, lived when arrested in 1986 for selling secrets about U.S. electronic eavesdropping techniques to the Soviets for $30,000. He revealed an extensive, sensitive eavesdropping operation in the waters off the Soviet Union that had cost the U.S. government $3 billion to develop and run, Earnest said. The former Soviet Embassy on 16th Street, currently the Russian ambassador's residence, had an FBI observation post across the street known to the KGB, Kalugin said. John Walker, a former Navy officer who gave military secrets to the Soviet Union, used to duck into the embassy through a side door. Watering Holes Restaurants played a major role in spy escapades. La Nicoise was a favorite spot for James Angleton's mainly liquid lunch. The former CIA chief of counterintelligence who brought a reign of paranoia to the agency in which everyone was a suspected mole was fired in 1974. ``If you went to lunch with him at 11:30 or so, you pretty much had to write off the afternoon, hope that you could find your car, hope you were wearing the right coat and hat and that no one stopped you on the way home,'' Earnest said. These days, local spy hangouts near CIA headquarters in Virginia range from the trendy eCiti Cafe and Bar, to Irish fare at McKeever's Pub, to French style at Le Petit Mistral -- the latter favored by those just back from overseas stints. In Georgetown, Chadwicks was where Ames delivered ``six pounds'' of secret documents in a plastic bag to the KGB that led directly to the deaths of about 10 Soviets spying for the United States and compromised hundreds of cases, Earnest said. At St. Martin's Tavern KGB officers would cultivate agents from western embassies, while the Occidental Grill was for semi-official contacts from the diplomatic corp, Kalugin said. Vitaly Yurchenko, a KGB intelligence officer who defected to the United States, re-defected to the Soviet Union after ditching his CIA security guard in 1985 at Au Pied de Cochon restaurant in Georgetown. The place named a drink for the incident -- the ``Yurchenko shooter.'' On G Street just blocks from the White House is ``The Exchange'' restaurant which once was a spouse-swapping club frequented by Karl and Hanna Koecher, deep undercover agents for the Czechoslovakian intelligence service, Earnest said. Later, an FBI investigation found at least 10 CIA employees, 10 Defense Department employees and one senator frequented that club, he said. SpyDrive information is available at 1-866-spy-drive or http://www.spydrive.com -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2978 From: Aimee Farr Date: Wed Apr 25, 2001 4:45pm Subject: RE: Phone spy ((((reporter)))) 1. WHERE ARE THESE LAWS IN THE US? Don't make me look it up, I'm new to this... 2. I've got a reporter on the other line due to a computer spyware post - he follows these issues...lemme know if you want to scream bloody murder about these hardware sites, and I'll give him your contact info. Seems related, and the public is really being led into trouble... all over the place... ~Aimee Aimee E. Farr Law Office of Aimee E. Farr mailto:aimfarr@p... Outlook/Lotus click-to Contacts: http://my.infotriever.com/aimeefarr : > > "The products and equipment that are described and contained herein are to > be used only in a legal and lawful manner in accordance with all > applicable > laws and regulations. It is the purchaser's responsibility to > ascertain the > legality of these products and equipment for the country and/or > the state of > residence." > > I think someone should pay them a visit, to tell them that applicable laws > say you can't even sell or advertise such equipment, never mind > trusting the > buyer about not breaking the law. > > In any case, how is this applied in the U.S., is it Federal law? Or do > states regulate what can and cannot be sold? > > All the best,> 2979 From: Steve Uhrig Date: Wed Apr 25, 2001 9:50pm Subject: RE: Phone spy Once upon a midnight dreary, Aimee Farr pondered, weak and weary: > 1. WHERE ARE THESE LAWS IN THE US? Don't make me look it up, I'm > new to this... You're an attorney and you want us to Sheperdize the cases for you? Try 18 USC 2511 and 2512 for starters. Plug them into a search engine and you'll get the exact text. Also Jim has them on his website http://www.tscm.com. Most states also have their own laws. Most violations, like mere possession by a non-government entity, is a felony. Every day is a separate count. Justice Dept moves slowly, but when they move they tend to step on a lot of ears simultaneously. Get someone to forward you some old messages on the mass raid on spy shops a few years ago. The FCC has a relatively new person solely responsible for enforcement of anything where they might have jurisdiction, like illegal frequencies, power levels, non type approved transmitters, etc. He is only one man, but he has been *very* aggressive and currently working on making a major example of a few companies who illegally sell wireless video on amateur (ham radio) frequencies as surveillance equipment (amateur frequencies are limited to hobby use only, no commercial applications, by licensed hams only, in two way communications only). FCC Riley Hollingsworth rholling@f.... General complaints to fccinfo@f.... Regards .... Steve (long time expert witness on these matters with a 100% win record if you ever need anyone). ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2980 From: Aimee Farr Date: Thu Apr 26, 2001 0:56am Subject: RE: Phone spy Steve: ...and thanks to those that responded offlist. :) > Once upon a midnight dreary, Aimee Farr pondered, weak and weary: > > > 1. WHERE ARE THESE LAWS IN THE US? Don't make me look it up, I'm > > new to this... > > You're an attorney and you want us to Sheperdize the cases for > you? Well...like MEN, Steve, et. al. ... lawyers often don't like to ask for directions, thinking that this detracts from their 'lawyerness.' However, when they do, it saves time and reduces the possibility of error. Women have no resistance to speaking up and saying, "I don't know where in the hell I am going..." instead of driving around in circles.... or, as is often the case with me, billing for something silly like 'reading a map,' when you can just stop and ask somebody for directions. *grin* > Try 18 USC 2511 and 2512 for starters. Plug them into a search > engine and you'll get the exact text. > > Also Jim has them on his website http://www.tscm.com. Cool of him. > Most states also have their own laws. Most violations, like mere > possession by a non-government entity, is a felony. Every day is > a separate count. Ah. 'the marriage penalty' > Justice Dept moves slowly, but when they move they tend to step > on a lot of ears simultaneously. Get someone to forward you some > old messages on the mass raid on spy shops a few years ago. > > The FCC has a relatively new person solely responsible for > enforcement of anything where they might have jurisdiction, like > illegal frequencies, power levels, non type approved > transmitters, etc. He is only one man, but he has been *very* > aggressive and currently working on making a major example of a > few companies who illegally sell wireless video on amateur (ham > radio) frequencies as surveillance equipment (amateur > frequencies are limited to hobby use only, no commercial > applications, by licensed hams only, in two way communications > only). FCC Riley Hollingsworth rholling@f.... General > complaints to fccinfo@f.... > > Regards .... Steve (long time expert witness on these matters > with a 100% win record if you ever need anyone). THIS is why I ask these questions. See all that up there? That's not in 'the law.' I come from the frame of mind that if my 'client' gets in a courtroom, I screwed up. > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* Steve wins 'best sig quote contest.' And he's a goodlookin' dog in a turban, too. Everybody in this business has a great sense of humor - disturbingly refreshing...puzzling from a psychological standpoint....I will continue to ponder this...and continue my observation. ~Aimee Aimee E. Farr Law Office of Aimee E. Farr mailto:aimfarr@p... Outlook/Lotus click-to Contacts: http://my.infotriever.com/aimeefarr 2981 From: James M. Atkinson, Comm-Eng Date: Fri Apr 27, 2001 11:52am Subject: What Your Car Says About You What Your Car Says About You... Audi 90- I enjoy putting out engine fires. Buick Park Avenue- I am older than 34 of the 50 states. Cadillac Eldorado- I am a very good Mary Kay salesman. Chevrolet Camaro- I enjoy beating up people. Chevrolet Chevette- I like seeing people's reactions when I tell them I have a 'Vette. Chevrolet Corvette- I'm in a mid-life crisis. Dodge Daytona- I delivered pizza for four years to get this car. Ford Mustang- I slow down to 85 in school zones. Ford Crown Victoria- I enjoy having people slow to 55 mph and change lanes when I pull up behind them. Geo Tracker- I will start the 12th grade in the Fall. Honda Civic- I have just graduated and have no credit. Infiniti Q45- I am a doctor with 17 malpractice suits pending. Jaguar- I am so rich I will pay 60K for a car that is in the shop 280 days per year. Lincoln Town Car- I live for bingo and covered dish suppers. Plymouth Neon- I enjoy doing the Macarena. Porsche 944- I am dating a model who would otherwise wouldn't look at me. Volkswagen Beetle- I still watch Partridge Family reruns. Volvo 740 Wagon- I am afraid of my wife. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2982 From: Robert G. Ferrell Date: Fri Apr 27, 2001 0:20pm Subject: Re: What Your Car Says About You >What Your Car Says About You... I bought a brand new bright red Pontiac Trans Am in 1995. When I brought it home, a good friend of mine came over to see it. He looked at it for a moment, then said, "Nice car, Robert. Sorry about your penis." ;-) Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2983 From: Brad Hayes Date: Fri Apr 27, 2001 1:08pm Subject: Security Specialist Good Afternoon Group, Thought some of you may enjoy this. Happy Friday. Regards, Brad BOEING JOB OPPORTUNITY Requisition Number 01-1007916 Job Title INDUSTL SECURITY SPEC, INDUSTRIAL SECURITY Level NONEXEMPT Business Component SSG Puget Sound Job Location Seattle, Washington Job Description Perform Communication Security (Comsec) for National Security Agency (NSA) materials entrusted to The Boeing Company. Order, receive, store, issue, ship, inventory, destroy, and track accountable comsec equipment and keying materials as described in the National Security Program Manual (NISPOM)Comsec Annex and Boeing Security Manual. Provide briefings to filekeepers on the proper handling of Comsec material issued to them. Coordinate with external government agencies and internal government programs on all Comsec related issues. Job Skills & Qualifications Use NSA computing software to track all accountable materials. Operate Local Management Device, Key Processor and Data Transfer Device for Comsec Electronic Key. Prefer knowledge of UNIX operating system and basic hardware configuration. Some UNIX programing knowledge would be advantageous. A Department Of Defense (DoD) security clearance will be required to perform the above assignment, Top Secret clearance is preferred. Requires ability to work in both teams and independently. Requires good written and communication skills. Education Prefer associate's degree or equivalent with 1 to 3 years experience in Comsec accountability and or other related Industrial Security fields. Note Applicants selected for this position may be subject to a Government Security Investigation and must meet eligibility for access to classified information. -------------------------------------------------------------------------------- As an equal opportunity employer, it is the policy of the Boeing Company to attract and retain the best qualified people available without regard to race, color, religion, national origin, gender, sexual orientation, age, disability or status as a special disabled veteran, Vietnam Era Veteran or other qualifying veteran. We offer competitive salaries, advancement opportunities, and a full range of benefits including an education assistance program. -------------------------------------------------------------------------------- Note: Current employees of The Boeing Company must apply through the internal process. -------------------------------------------------------------------------------- Boeing uses an electronic resume handling system that requires resumes to be submitted in a plain text format (without lines, bullets, formatting or special characters). To expedite the processing of your resume, please submit only one resume per job search session. Include all requisition numbers you wish to apply for at the bottom of your resume. You may use one of the following methods: Submit your resume online: Goto Online Resume Builder Note: Include the Requisition Number (above) in the Advertisement Code field. Send your resume by E-mail to: submit.resume@b... Note: Include the Requisition Number (above) in your resume and send it as the body of the e-mail (not as an attachment). Mail your resume to: The Boeing Company Employment Office P.O. Box 3707 MailCode: 6H-PL Seattle, WA 98124-2207. Note: Include the requisition number (above) in the bottom center of your resume and follow the instructions about maximizing the scanability of your resume. -------------------------------------------------------------------------------- Brad Hayes/Owner American Investigation Group Indianapolis,Indiana ===== __________________________________________________ Do You Yahoo!? Yahoo! Auctions - buy the things you want at great prices http://auctions.yahoo.com/ 2984 From: Steve McAlexander Date: Fri Apr 27, 2001 4:40pm Subject: FW: The Future???? Gawd I hope NOT. MUST read! Thursday, April 26, 2001 Click on the URL below for the rest of this story: http://www.foxnews.com/story/0,2933,17515,00.html 2985 From: Shawn Hughes Date: Sat Apr 28, 2001 0:30pm Subject: Hmmmmmm..... Got this from another group... Bugged While in Moscow for a concert, pianist Arthur Rubenstein carefully searched his hotel room for electronic bugs. He found some wires under the carpet and cut them with a scissors. The following day he learned from a chambermaid that a funny thing had happened the night before - a chandelier had fallen down in the room below his. 2986 From: James M. Atkinson, Comm-Eng Date: Sun Apr 29, 2001 9:18am Subject: Chinese Crackdown on Espionage Chinese Crackdown on Espionage http://www.asianweek.com/2001_04_27/news4_chinesedetainees.html By Christopher Bodeen/AP When Chinese police on April 8 detained author Wu Jianmin, a U.S. citizen, he became the fifth Chinese-born intellectual with foreign ties to be held in what Americans are calling China's sweeping anti-espionage campaign. Observers say the detentions show a disturbing new pattern of seizing not only political dissidents, but anyone with access to sensitive information about the government. In response, the U.S. State Department issued a travel warning, cautioning Chinese-born Americans that they risk being detained in China if they have been involved in dissident activities or published writings critical of the Chinese government. It also warned of risks to those who have traveled to Taiwan, which China regards as a rebel province, or had contact with Taiwanese media organizations. China protested the U.S. State Department warning, calling it "irresponsible" and an attempt to sabotage Chinese Americans' relations with Beijing. Foreign Ministry spokeswoman Zhang Qiyue demanded Washington "correct the mistake and take measures to eliminate the negative effects created by the so-called warning," the government's Xinhua News Agency said. "The announcement of the so-called 'risk' is an attempt to sow discord in relations between Chinese Americans and others and China. This is extremely wrong and irresponsible," Zhang was quoted as saying. Wu is the latest in a string of U.S. citizens and permanent residents detained in China on suspicion of spying. The U.S. Embassy in Beijing said police informed them of Wu's detention on April 14, saying he was under investigation for spying on behalf of Taiwan. Authorities suspect Wu was involved in the publication of The Tiananmen Papers, a book about the 1989 crackdown on pro-democracy demonstrators, said Frank Lu, a former dissident who runs a human rights monitoring group in Hong Kong. The book, which depicts Chinese leaders at odds over how to handle the protests, is said to be based on Communist Party records smuggled out of China by a disaffected official. Xiao Qiang, executive director of New York-based Human Rights in China, said Wu lived in New York City, has a son in college and other family still in China. Wu wrote frequently for Hong Kong news magazines on Chinese politics and other subjects, Xiao said. An official in the government's Foreign Affairs Office in Guangdong province confirmed Wu had been detained, but would provide no further information. Xiao, of Human Rights in China, said the detentions of intellectuals with foreign ties show a new pattern of targeting not only known political dissidents, but also those with family or professional contacts providing them access to sensitive information. That reflects Chinese nervousness about the leak of politically sensitive information, especially following the publication of The Tiananmen Papers. Many of those detained had felt they had no reason for concern because they considered themselves pro-China, Xiao said. Their need to maintain family, business and academic ties with China makes them vulnerable to manipulation and abuse, he said. Besides those cases that have been publicized, another 20-30 have been hushed up by those involved. Earlier this week, more than 350 prominent China scholars warned that the crackdown threatened to set back thriving academic exchanges. They issued an open appeal to President Jiang Zemin to release the detainees, or at least to provide them fair legal protection. John Holden, president of the National Committee on U.S.-China Relations, said the detentions risk disrupting ties, and will likely receive more attention when the U.S. Congress gets back to work next week. ------------------------- The five writers and scholars detained by China Wu Jianmin, an American citizen from New York City, was detained April 8 on suspicion of spying on behalf of Taiwan. According to democracy activists, the 46-year-old Wu was a former teacher at the Communist Party's Central Party School and a reporter who left for the United States in 1988. Wu wrote frequently for Hong Kong news magazines on Chinese politics, and published a book about the Chinese government after the 1989 pro-democracy protests. Li Shaomin, an American citizen and business professor in Hong Kong, disappeared Feb. 25 after going to China to see a friend. His wife says he was picked up by security agents. Chinese authorities have not commented on the case. Gao Zhan, an American University researcher and U.S. permanent resident, was detained Feb. 11 and faces espionage charges. Gao's husband and 5-year-old son, a U.S. citizen, were detained with her and held for 26 days before being released. Chinese officials failed to inform the U.S. Embassy of the son's detention as required by law. Tan Guangguang, a Chinese intellectual and permanent U.S. resident who has taught at top U.S. universities and worked for a U.S. medical group in Beijing, was detained in December. Xu Zerong, a historian who works in Hong Kong, was detained in August in Guangdong. Xu, a permanent resident of Hong Kong, reportedly had published articles containing sensitive information about Chinese support for communist insurgents in Malaysia in the 1950s. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2987 From: Dawn Star Date: Mon Apr 30, 2001 0:19pm Subject: Wiretap analyzer for sale I have put a model debug 360 telephone impedance analyzer on e-bay for sale. the URL is: http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=1234311770 Here is the description from the sales/spec sheet: "This unit is a DE-BUG Model 360 IMPEDANCE ANALYZER/TELEPHONE WIRETAP DETECTOR. Check these features: 1. The only impedance analyzer designed specifically for debugging of telephone lines. 2. Extra sensitive because of the very high gain solid state circuits. This unit will give readings where all others fail. 3. Simple to use, only a few minutes of instructions required. 4. Line tested at all important frequencies, including 80 Hz, 210 Hz, 530 Hz, 1.3 KHz, 3.3 KHz, 8.3 KHz. 5. Digital readout (LCD). 6. Handsome and yet very rugged. 7. A-C operated 115/230 or self contained rechargeable batteries. 8. Computer quality parts and components used throughout. There has never been a more practical or better designed telephone line impedance analyzer than the De-Bug - 360, specifically designed for counter surveillance work, it will find even high impedance a/c or d/c coupled devices. The unit was designed with the unskilled operator in mind. It is extremely simple to use and understand, only a few minutes of instruction will make anyone an expert operator. The unique highly sophisticated circuit will give results where other instruments fail to give any reading at all. Of all telephone line testing techniques, impedance testing is the only technique that will find sophisticated high impedance hard wiretaps. The testing procedure is extremely simple. Tests are made on each line of each instrument to be examined. Readings are taken at various frequencies and all lines within a local area are compared for deviations. These results are permanently recorded and compared to all subsequent tests made on these lines. Do not take a chance with make shift testing devices or with instruments not designed specifically for quality counter surveillance work. Use an instrument designed from the ground up for this very exacting science." This unit cost me over a $1,000 used, when I bought it. The unit is in excellent cosmetic condition. One segment of one digit of the LCD digital readout is inoperable -- it is a horizontal segment, so it does not interfere with character determination. Nicad batteries will need to be replaced. Unit was sold by Law Enforcement Associates and they may still service it. Sold in operating, but as-is, condition. Thanks, Roger 2988 From: Date: Tue May 1, 2001 4:59am Subject: U.S. privacy advocates seek "Carnivore" rollback PRIVACY-U.S. privacy advocates seek "Carnivore" rollback By Jim Wolf WASHINGTON, May 1 (Reuters) - As police around the world search for ways to monitor criminal activity on the Internet without trampling privacy rights, the powerful tool adopted in the United States faces persistent scrutiny and opposition. At issue is the Federal Bureau of Investigation's Carnivore software, so-called for its vaunted ability to cut to the "meat" of court-ordered electronic communications intercepts. A broad range of U.S. privacy advocates has launched a new drive to de-fang Carnivore, which the FBI says skims online traffic and stores only the information the government is allowed to intercept under federal wiretap authority. If they succeed, it could be an important milestone in the growing international cyber-crime dilemma -- how to balance security and privacy interests in the digital era. The United States is just one of a number of countries where government efforts to modernize their wire-tapping capacity have provoked outcries among both civil liberties activists Internet firms. The Netherlands has been criticized by privacy advoctes for developing a centralized digital surveillance system capable of handling not only thousands of traditional phone calls, but also tracking mobile phones, e-mail and Web-surfing habits. Typically installed on a criminal suspect's Internet service provider, Carnivore may be used to monitor everything from the suspect's e-mail to Web browsing, according to an independent technical review by the Illinois Institute of Technology Research Institute released in December. U.S. law enforcers have argued they need it to battle a wide range of threats -- possibly sharpened by rapid technology advances -- including terrorism, spying, fraud, child pornography and other crimes. But congressional critics and privacy experts say it is impossible to square Carnivore with the U.S. Constitution's Fourth Amendment protections against unreasonable searches and seizures, the 1986 Electronic Communications Privacy Act and the 1978 Foreign Intelligence Surveillance Act. "Unlike traditional electronic surveillance techniques, ...Carnivore provides law enforcement with access to the private communications of all subscribers of a particular service provider," according to the Electronic Privacy Information Center, a Washington group that monitors civil liberties issues on the Internet. USING NET TO FISH David Sobel, the group's general counsel, compared it to throwing a big net in the ocean to capture a single targeted fish from a school. "It's as if the government is saying, 'Don't worry. We'll let all the other fish go after we search through what we've collected'," he said. Arguing that this threatens everyone's privacy, Sobel and other civil liberties advocates met Attorney General John Ashcroft on April 19 to seek to curb the way Carnivore and its variants are deployed. Internet service providers should carry out court-ordered intercepts, not law enforcers, Sobel told Ashcroft on behalf of the group. The companies should be given the software and hardware when needed, he said, in line with ways of going after crooks and spies in the pre-digital world. "The ISP would be required to turn over to law enforcement only the communications of the target of a court order, and provide law enforcement access to no others," the groups wrote in a follow-up letter to the top U.S. law enforcer. This would cut the risk of abuse, they said, and bring surveillance of online communications in line with the high level of evidence of probable cause needed to tap an actual conversation. In the predigital age, the government presented its warrant or court order to a telephone company, which in turn routed the required information to the government listening post. The FBI did not attach the tap itself, and the common carrier was responsible to the court to make sure the government got only what the court authorized. "Carnivore changes that relationship and with it several independent checks on government action," said Michael O'Neill, a privacy expert at the law firm of Preston Gates Ellis & Rouvelas Meeds. Joining in the appeal to Ashcroft were the American Civil Liberties Union, Center for Democracy and Technology, Electronic Frontier Foundation, Free Congress Foundation and Law Enforcement Alliance of America. Ashcroft, regarded as a strong privacy rights backer from his Senate days as a Missouri Republican, was noncommittal on this point, Sobel said in a telephone interview. But FBI spokesman Paul Bresson voiced qualms, saying law enforcers needed to have a clear understanding of the "chain of custody" of evidence to win convictions. In addition, he said: "It's not like we knock on the door, tell everyone to move aside and install this black box on their network. It's always done with the cooperation of the ISP." Ashcroft is studying a Justice Department task force's report on possible changes to Carnivore, which the FBI has renamed DCS1000, a name it says has no significance. The in-house task force was assembled by Ashcroft's predecessor, Janet Reno, under pressure from House Republican leader Dick Armey of Texas and other lawmakers. 2989 From: James M. Atkinson, Comm-Eng Date: Wed May 2, 2001 7:27am Subject: RULES OF THE AIR RULES OF THE AIR: 1. Every takeoff is optional. Every landing is mandatory. 2. If you push the stick forward, the houses get bigger. If you pull the stick back, they get smaller. That is, unless you keep pulling the stick all the way back, then they get bigger again. 3. Flying isn't dangerous. Crashing is what's dangerous. 4. It's always better to be down here wishing you were up there than up there wishing you were down here. 5. The ONLY time you have too much fuel is when you're on fire. 6. The propeller is just a big fan in front of the plane used to keep the pilot cool. When it stops, you can actually watch the pilot start sweating. 7. When in doubt, hold on to your altitude. No one has ever collided with the sky. 8. A 'good' landing is one from which you can walk away. A 'great' landing is one after which they can use the plane again. 9. Learn from the mistakes of others. You won't live long enough to make all of them yourself. 10. You know you've landed with the wheels up if it takes full power to taxi to the ramp. (I love this one)! 11. The probability of survival is inversely proportional to the angle of arrival. Large angle of arrival, small probability of survival and vice versa. 12. Never let an aircraft take you somewhere your brain didn't get to five minutes earlier. 13. Stay out of clouds. The silver lining everyone keeps talking about might be another airplane going in the opposite direction. Reliable sources also report that mountains have been known to hide out in clouds. 14. Always try to keep the number of landings you make equal to the number of take offs you've made. 15. There are three simple rules for making a smooth landing. Unfortunately no one knows what they are. 16. You start with a bag full of luck and an empty bag of experience. The trick is to fill the bag of experience before you empty the bag of luck. 17. Helicopters can't fly; they're just so ugly the earth repels them. 18. If all you can see out of the window is ground that's going round and round and all you can hear is commotion coming from the passenger compartment, things are not at all as they should be. 19. In the ongoing battle between objects made of aluminum going hundreds of miles per hour and the ground going zero miles per hour, the ground has yet to lose. 20. Good judgment comes from experience. Unfortunately, the experience usually comes from bad judgment. 21. It's always a good idea to keep the pointy end going forward as much as possible. 22. Keep looking around. There's always something you've missed. 23. Remember, gravity is not just a good idea. It's the law. And it's not subject to appeal. 24. The three most useless things to a pilot are the altitude above you, runway behind you, and a tenth of a second ago. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2990 From: James M. Atkinson, Comm-Eng Date: Thu May 3, 2001 4:18pm Subject: China Blames U. S. for Yet Another Mid-Air Collision China Blames U. S. for Yet Another Mid-Air Collision BEIJING (Reuters) - Chinese officials have stated that they are holding the United States, "fully responsible" for today's mid-air collision, involving several Chinese aircraft and one American craft. This comes just weeks after a similar incident involving a U. S. spy plane. Officials have stated that at approximately 8:25 a. m., GMT, a squadron of Chinese F-8 fighters collided with an American Goodyear Blimp. The crash left over a dozen Chinese planes downed and the blimp's electronic billboard damaged. Sources say the billboard's scrolling marquee had been advertising the soft drink 7-UP, but after the collision, only the words "Up yours" could be seen. A Chinese pilot who witnessed the collision between his squadron, nicknamed, "Panda Rash" told China's Xinhua news agency that he saw the American blimp dive out of the clouds and crash into wingman Sum Yung Gui's F-8 jet. "I told Yung Gui his tail was all broken. 'Keep it straight. Keep it straight'", said the pilot. "He just couldn't shake the American foreign-devil!" The blimp then reportedly veered hard left and then right, taking out the rest of the squadron. Pilot Chawp Suey told Xinhua the American blimp is "fully responsible for the incident", repeating the language Beijing has used in the earlier incident. China blames this new accident on the Goodyear blimp, saying it rammed the supersonic fighters, and has demanded an apology. Officials from the Goodyear Company have said it is unlikely that the slow propeller-driven blimp could turn inside and ram a dozen nimble fighters, unless the Chinese were testing chimp pilots. "The direct cause of the collision was that the American blimp made a sudden big move toward the Chinese planes, making it impossible for the Chinese planes to get out of the way", Suey was quoted as saying. "The savage act of American blimps colliding with Chinese planes while conducting spying activities at sporting events makes us indignant", he was quoted as saying. Tongue in Cheek ;-) -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2991 From: David Miller Date: Thu May 3, 2001 4:23pm Subject: RE: China Blames U. S. for Yet Another Mid-Air Collision Classic ! ! -----Original Message----- From: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] Sent:Thursday, May 03, 2001 4:18 PM To:TSCM-L Mailing List Subject:[TSCM-L] China Blames U. S. for Yet Another Mid-Air Collision China Blames U. S. for Yet Another Mid-Air Collision BEIJING (Reuters) - Chinese officials have stated that they are holding the United States, "fully responsible" for today's mid-air collision, involving several Chinese aircraft and one American craft. This comes just weeks after a similar incident involving a U. S. spy plane. Officials have stated that at approximately 8:25 a. m., GMT, a squadron of Chinese F-8 fighters collided with an American Goodyear Blimp. The crash left over a dozen Chinese planes downed and the blimp's electronic billboard damaged. Sources say the billboard's scrolling marquee had been advertising the soft drink 7-UP, but after the collision, only the words "Up yours" could be seen. A Chinese pilot who witnessed the collision between his squadron, nicknamed, "Panda Rash" told China's Xinhua news agency that he saw the American blimp dive out of the clouds and crash into wingman Sum Yung Gui's F-8 jet. "I told Yung Gui his tail was all broken. 'Keep it straight. Keep it straight'", said the pilot. "He just couldn't shake the American foreign-devil!" The blimp then reportedly veered hard left and then right, taking out the rest of the squadron. Pilot Chawp Suey told Xinhua the American blimp is "fully responsible for the incident", repeating the language Beijing has used in the earlier incident. China blames this new accident on the Goodyear blimp, saying it rammed the supersonic fighters, and has demanded an apology. Officials from the Goodyear Company have said it is unlikely that the slow propeller-driven blimp could turn inside and ram a dozen nimble fighters, unless the Chinese were testing chimp pilots. "The direct cause of the collision was that the American blimp made a sudden big move toward the Chinese planes, making it impossible for the Chinese planes to get out of the way", Suey was quoted as saying. "The savage act of American blimps colliding with Chinese planes while conducting spying activities at sporting events makes us indignant", he was quoted as saying. Tongue in Cheek ;-) -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 2992 From: Steve Uhrig Date: Thu May 3, 2001 11:07pm Subject: Stuff for auction Hi all, I have several items up for auction on ebay. While not directly TSCM related (in fact, not related to TSCM at all), there are some antique radio items, some firearms, spy and similar books. Also an antique fingerprint kit (I am dating myself), some aluminum chassis and some reloading equipment. And some other stuff we found when we started our annual spring cleaning of the shop last week. BTW, dumpsters are expensive! Go here to see the list: http://cgi6.ebay.com/aw- cgi/eBayISAPI.dll?ViewListedItems&userid=steve@s... Patch the above line together if it breaks in your email window, or just go to ebay.com and do a search on my email address as a seller. Inquiries on any item invited. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2993 From: Date: Fri May 4, 2001 2:49am Subject: Torricelli Captured on Crime Wire Torricelli Captured on Crime Wire By JOHN SOLOMON .c The Associated Press WASHINGTON (AP) - Just weeks before he was elected to the Senate in 1996, Robert Torricelli was recorded on an FBI wiretap discussing fund-raising over the telephone with supporters at a Florida pizza restaurant under surveillance for ties with organized crime. The intercepted conversation between Torricelli and two relatives of a convicted Chicago crime figure surprised FBI agents and they alerted the Justice Department. Prosecutors and agents reviewed the tape in the fall of 1996 and concluded there was no reason for further investigation, law enforcement officials said. But the call received new scrutiny two years later when allegations surfaced about thousands of dollars in illegal donations to Torricelli's campaign, the officials told The Associated Press, speaking only on condition of anonymity. The New Jersey Democrat has steadfastly denied wrongdoing. On Wednesday, Torricelli said that when he hears about allegations against him, ``I have to smile to myself, knowing in the end the truth is going to come out.'' The operators of the Sarasota, Fla., bakery and pizza shop where the call was intercepted in early September 1996 eventually pleaded guilty to conspiring to defraud the government of taxes. In the intercept, three supporters from Chicago, who were visiting the bakery, called and left a message for Torricelli in New Jersey, and the lawmaker returned the call. They discussed the need for donations to fuel his Senate bid down the stretch, according to law enforcement officials, who have listened to the tape or seen its transcript. At one point, Torricelli makes a comment suggesting he needs individual donations, which by law are limited to $1,000. ``Each individual check,'' the soon-to-be senator is captured as saying, according to officials. One of the supporters indicates he has raised or plans to donate a few thousand dollars. They also discuss that the Chicago area is a potentially good area for a Democrat like Torricelli to raise money, according to the officials. Among those on the phone call are Chicago-area developers Francis and Sam Roti, a father and son who were nephews of Fred Roti, a colorful Chicago alderman whose association with organized crime ended with his imprisonment in the 1990s for racketeering and extortion. Sam Roti helped raise money for Torricelli in Illinois, and both he and his father donated a total of $1,500 to the New Jersey Democrat. Sam Roti was indicted on tax charges in 1993 related to an investigation of federal housing grants, but the charges were dropped after only 17 days. ``We donated some to Bob,'' Sam Roti said in an interview Thursday. ``We don't have anything to do with New Jersey and there's no affiliation at all. It was just nice to see an Italian guy. That's all it was.'' Francis Roti said he later was asked to appear before a grand jury and was interviewed by prosecutors about his relationship with the Florida pizzeria owners and the donation to Torricelli. ``They (prosecutors) did mention Sen. Torricelli. I don't know exactly what I said. I did contribute to his campaign. They asked, do you know if there was anything. I don't remember the term they used, but it was about money. And I said I was not involved with that,'' the elder Roti said. Both Rotis questioned whether they were singled out by authorities because of their uncle's conviction. Sam Roti said the discussion of money during the intercept was supposed to be lighthearted. ``We were in a bakery that my dad had become friendly with - the guy that runs it - because he was Italian,'' he said. ``My dad gets on the phone and starts joking around about there being money here or something. I don't remember exactly what was said. It was one of my dad's off-handed jokes,'' he said. Federal Election Commission records show Torricelli's campaign received more than $30,000 in donations in September and October 1996 from donors in the Chicago area. Guy Ackermann, a Chicago accountant, said he wrote Torricelli a check for $500 around that time as a favor to a friend who knew Sam Roti. Ackermann said he attended a wine-and-cheese reception that Roti held for Torricelli. After the call was intercepted, the transcript was referred both to the New Jersey U.S. attorney's office and the Justice Department's public integrity division. Prosecutors and the FBI jointly agreed in the fall of 1996 that the intercept was intriguing but ambiguous, and that there was no reason for further investigation, law enforcement officials said. But when the Justice Department's campaign task force began receiving information in late 1997 and 1998 about possible illegal donations to Torricelli's campaign, they revisited the transcript, the sources said. Seven people have pleaded guilty to making illegal donations to Torricelli's 1996 campaign. The FBI also is looking into whether supporters showered Torricelli with improper personal gifts. A source close to Torricelli said the senator was notified that he had been ``coincidentally'' intercepted on the wiretap and that his lawyers ``inquired and were told there were absolutely no issues involving the senator, including the campaign contributions issue.'' Nicholas Castronuovo, who operates the Sarasota pizza and bakery shop, recalled talking briefly to Torricelli on the phone in September 1996. ``We exchanged salutations,'' he said. Castronuovo said he used to be involved in local New Jersey politics before moving to Florida and ``I know Bob.'' He said one of the Chicago businessmen decided to call the lawmaker. ``He called from here. And when he called, Bob was not in. We left a message that 'when you come in, call your old friend' and he (Torricelli) called here,'' Castronuovo said. Castronuovo's lawyer, Thomas Ostrander, said his client's pizza shop was being monitored in 1996 because the FBI thought it was ``being visited by big organized crime figures.'' Castronuovo, a grandson and a third man involved with the bakery pleaded guilty in 1999 to conspiracy to defraud the government on taxes. Castronuovo was sentenced to 24 months' probation, his grandson was sentenced to four months in prison and both were ordered to pay back taxes and cooperate with federal investigators. 2994 From: David Alexander Date: Fri May 4, 2001 2:44am Subject: re: rules of the air I liked the rules of the air, but as an ex F4 pilot I feel constrained to add comments RULES OF THE AIR: 1. Every takeoff is optional. Every landing is mandatory (unless your name is Dave). 2. If you push the stick forward, the houses get bigger. If you pull the stick back, they get smaller. That is, unless you keep pulling the stick all the way back, then they get bigger again. And if you push the other lever forward, it gets louder, pull it back, it gets quieter 3. Flying isn't dangerous. Crashing is what's dangerous (I can prove this). 4. It's always better to be down here wishing you were up there than up there wishing you were down here. Never, ever in a million years. 5. The ONLY time you have too much fuel is when you're on fire. 6. The propeller is just a big fan in front of the plane used to keep the pilot cool. When it stops, you can actually watch the pilot start sweating. What's a propeller ? 7. When in doubt, hold on to your altitude. No one has ever collided with the sky. 8. A 'good' landing is one from which you can walk away. A 'great' landing is one after which they can use the plane again. An acceptable landing is one you can't walk away from, but you do live (I can prove this, too) 9. Learn from the mistakes of others. You won't live long enough to make all of them yourself. 10. You know you've landed with the wheels up if it takes full power to taxi to the ramp. (I love this one) 11. The probability of survival is inversely proportional to the angle of arrival. Large angle of arrival, small probability of survival and vice versa. Not in an F4 it isn't - designed to land on carriers. And what about the vertical landing Harrier ? 12. Never let an aircraft take you somewhere your brain didn't get to five minutes earlier. 13. Stay out of clouds. The silver lining everyone keeps talking about might be another aeroplane going in the opposite direction. Reliable sources also report that mountains have been known to hide out in clouds. Cumulo granite, nasty. 14. Always try to keep the number of landings you make equal to the number of take offs you've made. Oops, that's where I went wrong. 15. There are three simple rules for making a smooth landing. Unfortunately no one knows what they are. 16. You start with a bag full of luck and an empty bag of experience. The trick is to fill the bag of experience before you empty the bag of luck. 17. Helicopters can't fly; they're just so ugly the earth repels them. 18. If all you can see out of the window is ground that's going round and round and all you can hear is commotion coming from the back seat, things are not at all as they should be. 19. In the ongoing battle between objects made of aluminium going hundreds of miles per hour and the ground going zero miles per hour, the ground has yet to lose. 20. Good judgement comes from experience. Unfortunately, the experience usually comes from bad judgement. 21. It's always a good idea to keep the pointy end going forward as much as possible. 22. Keep looking around. There's always something you've missed. 23. Remember, gravity is not just a good idea. It's the law. And it's not subject to appeal. 24. The three most useless things to a pilot are the altitude above you, runway behind you, and a tenth of a second ago. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 2995 From: James M. Atkinson, Comm-Eng Date: Fri May 4, 2001 8:25am Subject: ORIGIN OF THE INTERNET ORIGIN OF THE INTERNET An old, bearded shepherd with a crooked staff walked up to a stone pulpit and said, "Lo, it came to pass that a merchant by the name of Abraham Com didst take unto himself a young wife by the name of Dot." And Dot Com was a comely woman, broad of shoulder and long of leg. Indeed, she had been called Amazon Dot Com. And she said unto Abraham, her husband, "Why dost thou travel so far, from town to town, with thy goods when thou can trade without ever leaving thy tent?" And Abraham did look at her as though she were several saddle bags short of a camel load, but simply said, "How, Dear?" And Dot replied, "I will place drums in all the towns and drums in between to send messages saying what you have for sale and they will reply telling you which hath the best price. And the sale can be made on the drums and delivery made by Uriah's Pony Stable (UPS)." Abraham thought long and decided he would let Dot have her way with the drums. And the drums rang out and were an immediate success. Abraham sold all the goods he had at the top price, without ever moving from his tent. But this success did arouse envy amongst the multitudes. A man named Maccabia did secret himself inside Abraham's drum and was accused of insider trading. And the young man did take to Dot Com's trading as doth the greedy horsefly take to camel dung. They were called Nomadic Ecclesiastical Rich Dominican Siderites, or NERDS for short. And lo, the land was so feverish with joy at the new riches and the deafening sound of drums, that no one noticed that the real riches were going to the drum maker, one William of Gates, who bought up every drum company in the land. And indeed did insist on making drums that would work only if you bought Brother Gates' drumsticks. And Dot did say, "Oh, Abraham, what we have started is being taken over by others." And as Abraham looked out over the Bay of Ezekiel, or as it came to be known, "eBay," he said, "we need a name that reflects what we are," and Dot replied, "How about Young Ambitious Hebrew Owner Operators." "Whoopee!", said Abraham. "No, YAHOO!" said Dot Com.. .and that is how it all came to pass. See, it wasn't Al Gore after all. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2996 From: Robert G. Ferrell Date: Fri May 4, 2001 8:52am Subject: Re: China Blames U. S. for Yet Another Mid-Air Collision >Officials have stated that at approximately 8:25 a. m., GMT, a squadron of >Chinese F-8 fighters collided with an American Goodyear Blimp. Funny. Just a couple of days ago I was discussing the incident details with a friend and I likened the idea that the EP-3E deliberately rammed the F-8 to an elephant deliberately ramming a hummingbird (ingnoring, for the sake of simile, the fact that hummingbirds and elephants are native to different hemispheres. Maybe this happened in a zoo or something). Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2997 From: Date: Fri May 4, 2001 10:33am Subject: Documents Show FBI Web Surveillance Documents Show FBI Web Surveillance By D. IAN HOPPER .c The Associated Press WASHINGTON (AP) - The FBI has used Internet eavesdropping tools to track fugitives, drug dealers, extortionists, computer hackers and suspected foreign intelligence agents, documents show. The documents, obtained by The Associated Press under the Freedom of Information Act, also detail how the FBI scurried last year to prove it wasn't ``randomly looking at everyone's e-mail'' once its Web surveillance practices came under attack. The FBI records show the agency used its controversial Carnivore system 13 times between October 1999 and August 2000 to monitor Internet communications, and a similar device, Etherpeek, another 11 times. Carnivore is a set of software programs for monitoring Internet traffic - e-mails, Web pages, chat room conversations and other signals - going to or from a suspect under investigation. Etherpeek is a commercially available network monitoring program that is far less precise in filtering the information collected. Civil liberties groups contend that Carnivore can collect too much information and put ordinary citizens at risk. Some Internet service providers have raised concerns that since Carnivore's inner workings are secret, it may damage or slow down their networks while it's capturing e-mails. While large portions of the FBI documents are blacked out to protect national security and investigative secrets, they reveal new details about the agency's Internet surveillance program. In January 2000, for example, FBI agents got a wide-ranging order to use a computer wiretap in a gambling and money laundering investigation. The wiretap was successful, according to an e-mail to Marcus Thomas, head of the FBI's cybertechnology lab. ``We got bank accounts, where money was hidden and other information,'' reads the e-mail from an unknown agent. ``Some of the data sent ... was instrumental in tying several of the conspirators to the crime. One of the conspirators is offering to pay ... as part of a plea bargain.'' The following month FBI investigators used Carnivore to catch a fugitive for the U.S. Marshals Service. The Internet provider involved protested in court, but was ordered to cooperate. The 24 instances of Internet surveillance also included four investigations of computer hacking, three drug probes, one extortion investigation and an intellectual property case. The nature of the other cases was not disclosed. The FBI has said that Carnivore has been used in investigations involving national security and attempted domestic terrorism. One July 2000 e-mail about Carnivore, with the names of both the author and recipient deleted, contains the only reference to national security matters: ``We have a pending FISA order there and as soon as we get authority to test our (software) we will be installing it.'' FISA stands for the Foreign Intelligence Surveillance Act, which enables the FBI to wiretap foreigners for espionage cases. E-mails between FBI agents show how determined the bureau was to justify Carnivore's existence after the disclosure of it last year raised protests from lawmakers and privacy advocates. In July, the Tampa, Fla., field office sent an e-mail to other agents, including Thomas at the FBI lab, offering a slide show explaining how a militia group used the Internet to communicate. The group's leader pleaded guilty and was sentenced last year for planning to break into military facilities to steal explosives and blow up energy facilities in southeastern states. ``This might be used to show why Carnivore is necessary and essential for law enforcement to combat terrorism,'' reads the e-mail from an unspecified Tampa agent. Thomas replied: ``This kind of information would be very helpful in fighting the idea that we are randomly looking at everyone's e-mail.'' Also during July, FBI officials found an Internet service provider that was willing to convince other Internet firms that Carnivore was safe. The provider's identity was not disclosed. The provider ``is available to you as an ISP to address/counter any issues that other ISPs may have in installing Carnivore,'' the e-mail reads, adding that the company ``is aware of issues that national providers need to address for wiretapping.'' The FBI 2002 budget request includes more than $13 million for Internet surveillance, $2.5 million more than this year. Most of the new money would go for research and development. In justifying the budget, the FBI cybertechnology lab said the number of requests for Internet wiretaps from FBI field offices increased by 1,850 percent from 1997 to 1999. The exact number of requests was not disclosed. On the Net: Federal Bureau of Investigation: http://www.fbi.gov 2998 From: Robert G. Ferrell Date: Fri May 4, 2001 2:37pm Subject: Re: Documents Show FBI Web Surveillance >Civil liberties groups contend that Carnivore can collect too much >information and put ordinary citizens at risk. Um, at risk of what? If they're not doing anything wrong, how does reading their email put them at risk? I'm not advocating the practice, mind you, but my reasoning is simply that it's an invasion of my privacy, not that it puts me at some sort of risk. Heck, just receiving any email at all these days is a risk (especially if you're a Microsoft Outlook user). ;-) Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2999 From: James M. Atkinson, Comm-Eng Date: Fri May 4, 2001 2:45pm Subject: Re: Documents Show FBI Web Surveillance In case anybody is interested... The Etherpeek item mentioned in the below article is a commercially available network administration software tool that has been around for at least a decade. I personally use Etherpeek (and other related programs) during TSCM services, have been formally trained by the factory on it, and have personally been using it while it was still in Beta ten years ago. -jma At 3:33 PM -0400 5/4/01, MACCFound@a... wrote: >Documents Show FBI Web Surveillance > >By D. IAN HOPPER >.c The Associated Press > > >WASHINGTON (AP) - The FBI has used Internet eavesdropping tools to track >fugitives, drug dealers, extortionists, computer hackers and suspected >foreign intelligence agents, documents show. > >The documents, obtained by The Associated Press under the Freedom of >Information Act, also detail how the FBI scurried last year to prove it >wasn't ``randomly looking at everyone's e-mail'' once its Web surveillance >practices came under attack. > >The FBI records show the agency used its controversial Carnivore system 13 >times between October 1999 and August 2000 to monitor Internet >communications, and a similar device, Etherpeek, another 11 times. > >Carnivore is a set of software programs for monitoring Internet traffic - >e-mails, Web pages, chat room conversations and other signals - going to or >from a suspect under investigation. Etherpeek is a commercially available >network monitoring program that is far less precise in filtering the >information collected. > >Civil liberties groups contend that Carnivore can collect too much >information and put ordinary citizens at risk. Some Internet service >providers have raised concerns that since Carnivore's inner workings are >secret, it may damage or slow down their networks while it's capturing >e-mails. > >While large portions of the FBI documents are blacked out to protect national >security and investigative secrets, they reveal new details about the >agency's Internet surveillance program. > >In January 2000, for example, FBI agents got a wide-ranging order to use a >computer wiretap in a gambling and money laundering investigation. The >wiretap was successful, according to an e-mail to Marcus Thomas, head of the >FBI's cybertechnology lab. > >``We got bank accounts, where money was hidden and other information,'' reads >the e-mail from an unknown agent. ``Some of the data sent ... was >instrumental in tying several of the conspirators to the crime. One of the >conspirators is offering to pay ... as part of a plea bargain.'' > >The following month FBI investigators used Carnivore to catch a fugitive for >the U.S. Marshals Service. The Internet provider involved protested in court, >but was ordered to cooperate. > >The 24 instances of Internet surveillance also included four investigations >of computer hacking, three drug probes, one extortion investigation and an >intellectual property case. The nature of the other cases was not disclosed. >The FBI has said that Carnivore has been used in investigations involving >national security and attempted domestic terrorism. > >One July 2000 e-mail about Carnivore, with the names of both the author and >recipient deleted, contains the only reference to national security matters: >``We have a pending FISA order there and as soon as we get authority to test >our (software) we will be installing it.'' > >FISA stands for the Foreign Intelligence Surveillance Act, which enables the >FBI to wiretap foreigners for espionage cases. > >E-mails between FBI agents show how determined the bureau was to justify >Carnivore's existence after the disclosure of it last year raised protests >from lawmakers and privacy advocates. > >In July, the Tampa, Fla., field office sent an e-mail to other agents, >including Thomas at the FBI lab, offering a slide show explaining how a >militia group used the Internet to communicate. > >The group's leader pleaded guilty and was sentenced last year for planning to >break into military facilities to steal explosives and blow up energy >facilities in southeastern states. > >``This might be used to show why Carnivore is necessary and essential for law >enforcement to combat terrorism,'' reads the e-mail from an unspecified Tampa >agent. > >Thomas replied: ``This kind of information would be very helpful in fighting >the idea that we are randomly looking at everyone's e-mail.'' > >Also during July, FBI officials found an Internet service provider that was >willing to convince other Internet firms that Carnivore was safe. The >provider's identity was not disclosed. > >The provider ``is available to you as an ISP to address/counter any issues >that other ISPs may have in installing Carnivore,'' the e-mail reads, adding >that the company ``is aware of issues that national providers need to address >for wiretapping.'' > >The FBI 2002 budget request includes more than $13 million for Internet >surveillance, $2.5 million more than this year. Most of the new money would >go for research and development. > >In justifying the budget, the FBI cybertechnology lab said the number of >requests for Internet wiretaps from FBI field offices increased by 1,850 >percent from 1997 to 1999. The exact number of requests was not disclosed. > >On the Net: > >Federal Bureau of Investigation: http://www.fbi.gov -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3000 From: Robert G. Ferrell Date: Fri May 4, 2001 2:44pm Subject: Re: Documents Show FBI Web Surveillance >I personally use Etherpeek (and other related programs) during TSCM >services, have been formally trained by the factory on it, and have >personally been using it while it was still in Beta ten years ago. Yeah, I used it a lot when I was a Mac admin. Back then it only ran on Macs. RGF 3001 From: Aimee Farr Date: Fri May 4, 2001 1:59pm Subject: Robo-bug > Who wants an android to spy on their kids? > That's what some people are wondering with the introduction of iRobot. This > device, according to the manufacturer, is a "multi-purpose home robot that > can be controlled from anywhere in the world." iRobot includes a live-action > camera and microphone mounted on a six-wheel chassis. Images and sounds > collected by the robot are then broadcast along the Internet by wireless. > Computer users can control this device through their web browser. The entire > package is being marketed as a way for parents to monitor their children, > but is also being supplied to the United States Defense Advanced Projects > Research Agency (DARPA) and various corporations for surveillance purposes. http://www.irobot.com Aimee E. Farr Attorney At Law mailto:aimfarr@p... Outlook/Lotus click-to Contacts: http://my.infotriever.com/aimeefarr From: Marcel Date: Thu Apr 25, 2002 4:09pm Subject: Low-Cost Spectrum Analyzer Monitors Environments For RF Signals, Giving Confidence To 2.4 GHz Developers And OEMs Low-Cost Spectrum Analyzer Monitors Environments For RF Signals, Giving Confidence To 2.4 GHz Developers And OEMs http://cnniw.yellowbrix.com/pages/cnniw/Story.nsp?story_id=29491881&ID=cnniw&scategory=Telecommunications%3AWireless& -- [Non-text portions of this message have been removed] 5254 From: James M. Atkinson Date: Thu Apr 25, 2002 1:28pm Subject: Updated Seminar Schedule Good afternoon, Here is our updated seminar list: http://www.tscm.com/seminars.html Includes the following open enrollment seminar scheduled for June 2002 in Washington DC. http://www.tscm.com/seminar02159.html SEMINAR ANNOUNCEMENT Granite Island Group Title: "What to do after you discover the bug..." Date: Early June, 2002 [Exact Date TBD] Duration: Twelve (12) classroom hours Location: Washington, DC Who Should Attend: Government, corporate, and private TSCM specialists, counter intelligence technicians, private investigators, law enforcement officers, and security personnel who are, have been, or may be involved finding an eavesdropping device or anyone involved in investigating an eavesdropping incident. Prerequisites: There are no formal prerequisites, however; this seminar assumes the attendee has knowledge of basic TSCM, counterintelligence, or investigative skills. Scope: This seminar will cover the protocols to follow when an eavesdropping device (or suspected eavesdropping device) is discovered to ensure that the eavesdropper or device can be identified. The seminar will also cover making proper notifications, documentation procedures, collection of evidence, establishing a chain of custody, evaluating the device, and measures taken to protect the discovery, and yet identify the spy. Note: Following this seminar will be a special four hour lecture concerning the effective marketing of TSCM services [ Seminar 02160]. Security Classification: This seminar is unclassified, however; the material presented will cover highly proprietary materials, specialized methods, and trade secrets. As such all attendees will be required to sign a trade secret non-disclosure agreement. Instructor: James M. Atkinson, President and Sr. Engineer, Granite Island Group; Mr. Atkinson is a TSCM specialist, counter-surveillance expert, communications engineer, security consultant, and instructor with a reputation for designing and installing some of the most powerful secure communications systems used by both government agencies and major corporations. He has personally performed hundreds of TSCM inspections and is one of the most respected names in the industry. Registration: Attendance is limited and the seminar is expected to fill up fast so complete and return the attached registration and payment as soon as possible to guarantee your seat. All registrations will be acknowledged, and each attendee will be sent an agenda, hotel registration instructions, maps, and directions to the seminar site. Registration closes 14 days before the seminar. Seminar Fee: The fee for this seminar is $1295.00 USD per attendee. Includes: The seminar fee will include over 12 hours of formal instruction, 100+ page "Discovery Protocol" workbook, and certificate of attendance. Attendees will also receive copious proprietary handouts, worksheets, charts, various tools, forensic items, and related materials (so reserve some extra space in your luggage). The seminar fee also includes a continental breakfast and catered lunch each day, beverages, and snacks (during the class). However, attendees will be on their own for dinner, drinks, lodging, travel, etc. Payment Options: The seminar fee is payable in full in advance at the time of registration, and at least 21 days in advance either by a check, money order, PayPal payment, or credit card via PayPal to: http://www.paypal.com). If your agency or company requires an invoice to facilitate payment we are happy to provide same, but the invoice will still have to paid at least 21+ days in advance of the seminar. Seminar Registration Form Full payment must be received at least 21 days before seminar date Name:______________________________________________ Company:______________________________________________ Address:______________________________________________ City:__________________State: _____Zip Code:_____ Phone: __________________Fax: ___________________ E-Mail______________________________ Signature______________________________Date _________ Form of Payment Check ____ Money Order ____ PayPal ____ Credit Card (via PayPal) ____ Please complete this form and email, fax, or mail, along with your payment to: Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 http://www.tscm.com/ -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5255 From: George Shaw Date: Thu Apr 25, 2002 4:17pm Subject: Shadow 10 tracking device? Anyone got any info on the Shadow 10 direction finder display/tracking device? Manufacturer or Web site. George Shaw Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... 5256 From: Shawn Hughes Date: Fri Apr 26, 2002 9:32am Subject: Re: AeroComm Specan Here's the blurb on the unit: http://www.aerocomm.com/whats_new/whats_new.htm the picture of the item doesn't inspire much confidence. >AeroComm's new SA3000 Spectrum >Analyzer enables monitoring and analysis >of local RF signals in and around the >license-free 2.4 GHz ISM band. SA3000 >captures and displays potential in-band >interference and helps OEMs identify >optimal locations for wireless equipment. > >Before placing ConnexRF transceivers on >site, use SA3000 to observe existing RF >signals. If competing signals are found, >use SA3000 to track them to the source >and evaluate their interference strength. > >SA3000 is comprised of a sensitive RF detector -- which connects to a >desktop or laptop computer via RS232 serial port -- and proprietary >application software. On-screen displays are user-friendly, so OEMs of all >experience levels can evaluate installation sites with confidence. Contact >your AeroComm Sales Representative for details and pricing, sales@a.... > > 5257 From: James M. Atkinson Date: Fri Apr 26, 2002 11:21am Subject: ADL FOUND GUILTY OF SPYING BY CALIFORNIA COURT Publisher: http://www.ArabNews.com Friday, April 26, 2002 ADL FOUND GUILTY OF SPYING BY CALIFORNIA COURT http://www.arabnews.com/Article.asp?ID=14650 - Criminal Israeli Spies illegally Spy in the USA http://www.rense.com/Datapages/Israeldata.html by BARBARA FERGUSON Arab News Correspondent WASHINGTON DC, USA, 25 April 2002 -- The San Francisco Superior Court has awarded former Congressman Pete McCloskey, R-California, a $150,000 court judgment against the [pro-Israel] Anti-Defamation League (ADL). McCloskey, the attorney in the case, represented one of three civil lawsuits filed in San Francisco against the ADL in 1993. The lawsuit came after raids were made by the San Francisco Police Department (SFPD) and the FBI on offices of the ADL in both San Francisco and Los Angeles, which found that the ADL was engaged in extensive domestic spying operations on a vast number of individuals and institutions around the country. During the course of the inquiry in San Francisco, the SFPD and FBI determined the ADL had computerized files on nearly 10,000 people across the country (USA), and that more than 75 percent of the information had been illegally obtained from police, FBI files and state drivers' license data banks. Much of the stolen information had been provided by Tom Gerard of the San Francisco Police Department, who sold, or gave, the information to Ray Bullock, ADL's top undercover operative. The investigation also determined that the ADL conduit, Gerard, was also working with the CIA. Two other similar suits against ADL were settled some years ago, and the ADL was found guilty in both cases, but the McCloskey suit continued to drag through the courts until last month. In the McCloskey case, the ADL agreed to pay (from its annual multi-million budget) $50,000 to each of the three plaintiffs -- Jeffrey Blankfort, Steve Zeltzer and Anne Poirier -- who continued to press charges against the ADL, despite a continuing series of judicial roadblocks that forced 14 of the original defendants to withdraw. Another two died during the proceedings. The ADL, which calls itself a civil rights group, continued to claim it did nothing wrong in monitoring their activities. Although the ADL presents itself as a group that defends the interests of Jews, two of three ADL victims are Jewish. Blankfort and Zeltzer were targeted by the ADL because they were critical of Israel's policies toward the Palestinians. The third ADL victim in the McCloskey case, Poirier, was not involved in any activities related to Israel or the Middle East. Poirier ran a scholarship program for South African exiles who were fighting the apartheid system in South Africa. At the time, the ADL worked closely with the then apartheid government of South Africa, and ADL's operative Bullock provided ADL with illegally obtained data on Poirier and her associates to the South African government. But the conclusion of McCloskey's case does not mean the end to the ADL's legal problems. On March 31, 2001, U.S. District Judge Edward Nottingham of Denver, Colorado, upheld most of a $10.5 million defamation judgment that a federal jury in Denver had levied against the ADL in April of 2000. The jury hit the ADL with the massive judgment after finding it had falsely labeled Evergreen, Colorado residents -- William and Dorothy Quigley -- as "anti-Semites." The ADL is appealing the judgment. [Copyright © 2002 ArabNews.com] -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5258 From: Joseph Date: Fri Apr 26, 2002 4:08pm Subject: Michigan and Nevada It seems that privacy and monitoring is going out the window. http://www.rense.com/general24/dev.htm. Any thoughts about What the average citizen can do to protect them selves and on the Other side of things what If we are hired to scan cars? Do we Have a right to remove these devices? Thank you, Joseph 5259 From: Steve Uhrig Date: Fri Apr 26, 2002 6:36pm Subject: Re: LEO use of vehicle tracking On 26 Apr 2002 at 14:08, Joseph wrote: > It seems that privacy and monitoring is going out the window. > http://www.rense.com/general24/dev.htm. Most states do not restrict law enforcement use of vehicle tracking systems, for any reason and for any length of time. There even is an FCC provision granting essentially unrestricted use of low powered (under 1 watt) surveillance devices on nearly any frequency, under the provisions of the LE station license for their two way radio system. LE = Law Enforcement. LEO = Law Enforcement Officer. As far as I know, only Michigan, California and Tennessee even restrict use of vehicle trackers at all. Florida may have a relatively recent restriction; I don't recall. In these states only LEOs can use them. I do not know if any judicial sanction is necessary. The courts and LEO agencies consider a vehicle's presence on public roads as nonprivileged information. All the tracker does is helps LEO confirm what their eyes would see anyway. > Any thoughts about What the average citizen can do to protect > themselves? Well, law enforcement generally does not waste expensive hardware and manpower without a reason. The sky is not falling; Big Brother is not monitoring the movement of political dissidents in their autos en masse. We manufacture tracking systems and have for nearly 20 years, and I'll say there are not that many of them out there. I would estimate less than a few thousand nationwide, and even that may be generous, in local, state and federal hands combined. I am not counting the essentially worthless GPS-based tracking systems widely sold by spy shops and toy stores. > and on the other side of things what If we are hired to scan cars? > Do we Have a right to remove these devices? Experienced sweepers have a pretty good nose for who is and who is not legitimate. If you feel your potential client may be under law enforcement surveillance, you do *not* want to be involved. People in private security have a hard enough time with law enforcement, and being considered to have obstructed justice, whether legal charges are brought or not, is not the way to a long and happy career in the private sector. There are *very* few genuine tracking systems in private hands. Should you locate a professional beacon transmitter on a subject's car, chances are excellent it is a law enforcement unit. While professional units are in private hands, they are very scarce. For a picture of a typical professional beacon transmitter, see the photo on our webpage: http://swssec.com/tracker99.html It would be safer to refuse the job than to take it, find something then have to decide what to do. If you're one of the very few in this business who lives in the real world, you will realize the chances of finding a real bug, tracking beacon or whatever are extremely small. Most sweepers never will see a real bug, much less locate it through their own efforts. So the entire thing largely is a non-issue. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5260 From: Matthew Paulsen Date: Fri Apr 26, 2002 6:41pm Subject: RE: "Tempest Shielded Mac" An update to the story, and maybe an ending? http://www.wired.com/news/mac/0,2125,51983,00.html The manufacturer - http://members.aol.com/tempestcsi/ -----Original Message----- From: Graham Bignell [mailto:lorax@e...] Sent: Monday, April 15, 2002 8:27 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] "Tempest Shielded Mac" http://www.wired.com/news/mac/0,2125,51670,00.html In a drafty shed in rural northern California is perhaps the rarest Macintosh ever made: an electronically shielded Mac used by a spy or military agency. The machine appears to be unique, and is so secret, no one knows anything about it. Sitting on a dusty shelf in an old Boulder Creek, California, barn owned by programmer and author Bruce Damer, the Macintosh SE 30 1891 ST at first appears to be a standard all-in-one Mac from the mid-1980s. ... --- Graham "Lorax" Bignell - 416 366 9755 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5261 From: James M. Atkinson Date: Fri Apr 26, 2002 10:25pm Subject: Simple Video Camera Detector Use a tuned 15.735 kHz small loop resonant antenna with an E-field shield and using Litzenstein wire (40-50 loops). Then pass the signal though an 80+ dB 8+ pole bandpass filter with a bandpass of 3 kHz or less (a 130+ dB filter is ideal). Next tune the filter and the loop to compensate for any impedance mismatch (between the filter and the loop). You basically want the circuit to give you a peak signal at 15.734 kHz. Attach a low noise amplifier of at least 40-60 dB to the output of the amplifier and directly drive a simple 30 dB logarithmic display, and optionally a tone generator that shifts based on the logarithmic display. Set up the lowest element of the log display for the KTB for the entire circuit so that a 3 dB increase over the KTB noise illuminates the second element. Next attach the loop antenna to a non-metallic, non conductive collapsible pole and pass antenna over all surfaces in the area being inspected. If you get within 2-3 feet of any concealed video camera or wiring carrying a video signal you will detect it. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5262 From: Date: Sun Apr 28, 2002 2:18am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. This file is set to automatically go out to list members every two weeks, Please review it, and ensure that you are listed properly (correct address, phone, etc). ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (including AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (425) 489-0446 Telephone URL: http://www.bug-killer.com/ E-mail: gordonm@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 5263 From: Date: Sun Apr 28, 2002 2:18am Subject: File - mission.txt TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 5264 From: George Shaw Date: Sun Apr 28, 2002 3:35am Subject: Shadow & A5 David R still no details on the tracker can you re-email thanks. George Shaw Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... 5265 From: James M. Atkinson Date: Sun Apr 28, 2002 0:17pm Subject: Helpful Factoids Mosquito repellents don't repel. They hide you. The spray blocks the mosquito's sensors so they don't know you're there. Dentists have recommended that a toothbrush be kept at least 6 feet away from a toilet to avoid airborne fecal particles resulting from the flush. The liquid inside young coconuts can be used as substitute for blood plasma. No piece of paper can be folded in half more than 7 times. Donkeys kill more people annually than plane crashes. You burn more calories sleeping than you do watching television. Oak trees do not produce acorns until they are fifty years of age or older. The first product to have a bar code was Wrigley's gum. The king of hearts is the only king without a mustache A Boeing 747s wingspan is longer than the Wright brother's first flight. American Airlines saved $40,000 in 1987 by eliminating 1 olive from each salad served in first-class. Venus is the only planet that rotates clockwise. Apples, not caffeine, are more efficient at waking you up in the morning. The plastic things on the end of shoelaces are called aglets. Most dust particles in your house are made from dead skin. The first owner of the Marlboro Company died of lung cancer. Barbie's full name is Barbara Millicent Roberts. Michael Jordan makes more money from Nike annually than all of the Nike factory workers in Malaysia combined. Marilyn Monroe had six toes. All US Presidents have worn glasses. Some just didn't like being seen wearing them in public. Walt Disney was afraid of mice. Pearls melt in vinegar. Thirty-five percent of the people who use personal ads for dating are already married. The three most valuable brand names on earth: Marlboro, Coca Cola, and Budweiser, in that order. It is possible to lead a cow upstairs... but not downstairs. A duck's quack doesn't echo and no one knows why. The reason firehouses had circular stairways is from the days when the engines were pulled by horses. The horses were stabled on the ground floor and figured out how to walk up straight staircases. Richard Millhouse Nixon was the first US president whose name contains all the letters from the word "criminal." The second? William Jefferson Clinton. And, the best for last.. Turtles can breathe through their butts. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5266 From: Fernando Martins Date: Sun Apr 28, 2002 3:51pm Subject: RE: Simple Video Camera Detector > Next attach the loop antenna to a non-metallic, non conductive > collapsible pole and pass antenna over all surfaces in the area being > inspected. If you get within 2-3 feet of any concealed video camera > or wiring carrying a video signal you will detect it. It doesn't matter the type of cable used or box (enclosure) where the camera may be? Also, if the answer is "yeah, it doesn't matter", how a CCTV system can be protected from that technic? FM 5267 From: Marcel Date: Mon Apr 29, 2002 3:56pm Subject: Outsiders Can Easily Tap into Wireless Networks Outsiders Can Easily Tap into Wireless Networks http://cnniw.yellowbrix.com/pages/cnniw/Story.nsp?story_id=29541316&ID=cnniw&scategory=Telecommunications%3AWireless& -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 5268 From: Date: Mon Apr 29, 2002 9:01am Subject: 2002 Investigators Mid-America Regional Conference The Kansas Association of Licensed Investigators (KALI) will be presenting their annual conference in Topeka on July 19 & 20. For complete information go to www.k-a-l-i.org Kansas Association of Licensed Investigators . In addition to training seminars and venders, this is a great opportunity to network with investigators from the midwest. We still have vendor opening if you are interested. Meals are included and a hospitality room is open in the evening. Last year's conference was a great success and I found the information I obtained to be very useful. Special room rates are available to attendees. If you have any questions that are not addressed at the web site, give me a shout. Jack Kelley C. E. "Jack" Kelley, III, MBA C. E. Kelley & Associates Investigations P. O. Box 395, Baxter Springs, KS 66713 (620) 856-4460 Email: kelleypi@a... http://www.angelfire.com/ks/investigations/ Kansas Detective License: D-064 Board Member, Kansas Association of Licensed Investigators Member, American Society for Industrial Security Member, Association of Former Office of Special Investigations Special Agents Member, INTELNET (International organization of private investigators) [Non-text portions of this message have been removed] 5269 From: Mitch D Date: Mon Apr 29, 2002 3:05pm Subject: Re: Low-Cost Spectrum Analyzer Monitors Environments For RF Signals, Giving Confidence To 2.4 GHz Developers And OEMs Must be the mini mysteryband wrapped fixed bi polarized micronic discone antenna that makes it so efficient ;) __________________________________________________ Do You Yahoo!? Yahoo! Health - your guide to health and wellness http://health.yahoo.com 5270 From: Aimee Farr Date: Mon Apr 29, 2002 11:10pm Subject: Prehistoric Counterintelligence Okay, I was looking at counterintelligence in the Royal Houses and ancient regimes, seems it goes further back than I thought. COUNTERINTELLIGENCE 15,000 BC (?) 17,000? "The Sorcerer" http://portalproductions.com/spiritnature/paleolithic_nature.htm "This sorcerer is one of the most striking images in all prehistoric art. He is the Animal Master, the one who controls the hunt and the multiplication of game. This mythic being has the full beard and dancing legs of a man, the antlers and pricked ears of a stag, the paws and sex organ of a lion." "The purpose was to increasing [sic] the game while meditating about the mystical relationship between humans and their natural environment." "It appears that beasts were considered to be willing participants in a sacrificial act bound by a covenant." "....Guilty consciences probably had developed when they saw the animals they had killed come back in their dreams, apparently for revenge. In order to prevent this, covenants were made. A mythology emerged in which the beasts would willingly submit themselves to being killed if--and only if--proper protocol was followed. Hunters had to engage with the spirits of the game in rituals, thinking as the animals thought, honoring their gods, thanking the animals for their sacrifice, singing their songs, and dancing their dances. If this was done properly and if meat and skin were taken reverently while not violating the souls of the animals, the Animal Master would take the souls of the slain back to the dark womb of Mother Nature where they could be regenerated." (better picture --> ) To hunt, to trap, and to make your enemy -- "supernatural powers" in 17,000 BC. Well, it sure doesn't sound like..... http://www.disneyana-exchange.com/Downloads/Mkt.html ~Aimee 5271 From: Aimee Farr Date: Mon Apr 29, 2002 10:31pm Subject: RE: Re: Gov't to Seek Death in Spy Case [Meaningless rant follows, ignore it, it's part of my therapy. ~Aimee] > Robert P. Hanssen has been called one of the most dangerous double > agents in history, and will face sentencing next month for 15 counts > of espionage against the United States government. He narrowly > avoided a death penalty case. Hanssen's double life was more far- > reaching than selling secrets to the Soviets. This double life > extended to his marriage, his sex life and even his religion. [and book reference] The way this is structured seems to risk sensationalism. We attribute character traits as the cause of inappropriate behavior, and situational factors to our own behavior. The focus on deception and "double lives" can be misleading. Good "deceivers" have the ability to take on the mind of the adversary. They are more situational than others -- they think as the enemy anticipating themselves anticipating the enemy, not themselves as the enemy. Decentering to deceive the enemy seems to be the essence of stratagem. I worry that we are encouraging selection processes that net people that can't ever understand this. (It will probably appear as a "training failure," but it's probably a selection failure.) I tend to think we need more deception, and that our inability to see this, because of our warped mental images, is the source of the problem. Western notions of deception-morality connections are screwy. People are situational. (e.g., experiments of "good people" supposedly giving electrical shock treatment to test subjects in the "danger range," when directed to do so. BZZZZT!!!) A bigger problem might be the capacity for self-deception. ''I cannot live under pressures from patrons, let alone paint.'' -- Michelangelo, who thought he was only a sculptor. Maybe one day, he just re-defined himself as a painter, when offered the opportunity. People do that. Michelangelo: a double life. *gasp!* Look at the Sistine Chapel: http://sun.science.wayne.edu/~mcogan/Humanities/Sistine/Ceiling/index.html (Do you see a measure of a man's character, or just his magnificence?) Morality is relative to your position. Capability is constant. What seems to be an over-focus on character issues related to these events, risks disparaging the whole (the agencies) by encouraging the fallacy of composition, which is often an implicit suggestion, or something that readers will just infer. (Also, things being relative, some accounts making fun of errors is calling attention to what they thought of adversarial capabilities.) As in our past, black propaganda (seemingly on your side) outlets would "patriotically" demonize spies and deserters. It really said --- "Here's how to do it." Maybe we are effectively doing the same thing, because we can't control the media frames. (We wonder while the American public now equivocates treason-espionage with "theft" -- look at the frames: "he stole information," "theft of trade secrets," etc.) These recent people were "sellers" (let me spy for you) and not a "buyers" (hey, spy for us). It is a bargaining relationship (usually piecemeal to establish the tradition of trust), so it offers a lot of ways to attack the exchange. Refusal, unavailability, and inability are primarily countermeasures against extortion. I don't mean to suggest that these strategies are not effective, but it could suggest a historic false presumption that might be limiting us in our search for answers, or our emphasis. Maybe the way we attack the problem hasn't shifted enough. As your adversary's expectations change, so do their actions. In at least a few respects, we are forcing mutual destruction strategies, and "hastening the act" (response to defuse the threat or change of situation) etc.-etc....at a time when we want the opposite. Kings drink from the same cups. Take the ancient practice of unilateral hostages -- not just a coercive measure or a binding -- but a tool, since they allowed you to see each other's expectations of what the other expects you to be expected to do. (Strategically placed mirrors.) They were burdened gifts, and strategists knew how to use them, because they were the "keys" that unlocked the gate of stratagem. The most-honored gift was the trusted traitor, as long as you were smarter than the other guy. (Which both parties assumed.) "Information superiority" was gained through the maximization of information exchanges. They were able to think past "the problem," or "the answer," into the game. In contrast, most of the commentary about our troubles looks like puddle-deep thinking, smacking of self-reflection ("how we see the problem"), because it ignores the countermove(s) [those "disturbing trends"] and treats these problems as if they were immutable, fixed targets -- the products of uncontrollable, irrational forces. To say you should judge a man by his enemies, makes sense -- they are the result of his decision-making. YOUR ADVERSARY : YOUR PRODUCT. YOUR ENEMY : YOUR DECISIONS. In looking some countries with Royal Traditions (most of them), it seems to me that the counterintelligence was about making the enemy. ("Enemy Production.") Instead of an "intelligence failure," based on the failure to predict, or collect information, etc. -- they saw a failure to shape the enemy. Because of this framework, they took responsibility for their enemy, and so emplotted -- for years, if not generations. They preferred prediction via authority and control, rather than risk the perils of acumen or probability. For the Royal House, offensive counterintelligence was King. (Seems to be a superior strategy.) The concern with puddle-deep thinking, and stuff that acts as "fact-finding," is that it since it frames the questions, it suggests the answers -- often the wrong ones. ~Aimee 5272 From: Hawkspirit Date: Tue Apr 30, 2002 11:44am Subject: Nevada Bumper Beeping Nevada Cops Can Hide Monitoring Devices On Peoples' Cars 4-25-2 CARSON CITY, Nev. - In a 5-2 decision, the Nevada Supreme Court ruled Thursday that police can hide electronic monitoring devices on peoples' cars - without a warrant and for as long as they want. The majority opinion, written by Justice Deborah Agosti, said that attaching the device to the bumper of a Las Vegas man's car to track his movements "did not constitute an unreasonable search or seizure under the Nevada Constitution." Frederick Osburn was sentenced in 2000 to up to 10 years in prison after pleading guilty to open or gross lewdness, possession of burglary tools and four counts of possession of child pornography. He appealed, arguing evidence against him should be barred because it was based, in part, on information police were able to gather from the electronic monitoring. Osburn said federal law may permit warrantless monitoring, but asked for a finding that the Nevada Constitution provides greater protection. The majority cited a 9th Circuit Court of Appeals ruling that there's "no reasonable expectation of privacy" when it involves the exterior of a car - especially in Osburn's case since the car was parked on a public street. Justices Bob Rose and Cliff Young dissented, with Rose writing that the majority ruling gives too much authority to police. "The police will be able to place a vehicle monitor on any vehicle, for any reason, and leave it there for as long as they want," Rose said. "There will be no requirement that the monitor be used only when probable cause - or even a reasonable suspicion - is shown, and there will be no time limit on how long the monitor will remain." He added that in some cases such devices "will be used to continually monitor individuals only because law enforcement considers them 'dirty.'" "In the future, innocent citizens, and perhaps elected officials or even a police officer's girlfriend or boyfriend, will have their whereabouts continually monitored simply because someone in law enforcement decided to take such action," Rose said. In Osburn's case, he had been placed under surveillance after police questioned him about a prowler call several weeks before his arrest. The surveillance increased the week before the arrest after Osburn was reported masturbating outside a home. After his arrest in September 1997, police searched his home and found child pornography. http://www.lasvegassun.com/sunbin/stories/nevada/2002/apr/25/042510142.html Email This Article MainPage http://www.rense.com This Site Served by TheHostPros 5273 From: Hawkspirit Date: Tue Apr 30, 2002 0:03pm Subject: Simple Video Camera Detector Jim, Are most CCD chip cameras scanning at this rate (15.735 kHz)? Roger Date: Fri, 26 Apr 2002 23:25:18 -0400 From: "James M. Atkinson" Subject: Simple Video Camera Detector Use a tuned 15.735 kHz small loop resonant antenna with an E-field shield and using Litzenstein wire (40-50 loops). Then pass the signal though an 80+ dB 8+ pole bandpass filter with a bandpass of 3 kHz or less (a 130+ dB filter is ideal). Next tune the filter and the loop to compensate for any impedance mismatch (between the filter and the loop). You basically want the circuit to give you a peak signal at 15.734 kHz. Attach a low noise amplifier of at least 40-60 dB to the output of the amplifier and directly drive a simple 30 dB logarithmic display, and optionally a tone generator that shifts based on the logarithmic display. Set up the lowest element of the log display for the KTB for the entire circuit so that a 3 dB increase over the KTB noise illuminates the second element. Next attach the loop antenna to a non-metallic, non conductive collapsible pole and pass antenna over all surfaces in the area being inspected. If you get within 2-3 feet of any concealed video camera or wiring carrying a video signal you will detect it. -jma -- 5274 From: James M. Atkinson Date: Tue Apr 30, 2002 1:25pm Subject: Re: Simple Video Camera Detector The actual "dumping" of the CCD array can occur at a number of different rates, but almost all cameras utilize a horizontal sync signal at either 15 or 15.734 kHz. Since the sync signals fairly standard we can wind a small loop antenna and tune it dead on for the signal (remember it is a shielded small loop unit). If you have an extra $500 buck sitting around you can buy an EMCO ELF loop antenna, then add a small cap to tune it up, and a VLF preamp. Set your SA to 15.734 or 15 kHz, and set it on your narrowest Bandwidth (usually under 300 Hz), and optimize the display to 1 or 3 dB per division, with the noise floor taking up the lower 2 graticles. Optionally, you can grab the Z axis of the SA, amplify it and shoot it to a set of headphones. -jma At 10:03 AM -0700 4/30/02, Hawkspirit wrote: >Jim, Are most CCD chip cameras scanning at this rate (15.735 kHz)? Roger > > > >Date: Fri, 26 Apr 2002 23:25:18 -0400 >From: "James M. Atkinson" >Subject: Simple Video Camera Detector > >Use a tuned 15.735 kHz small loop resonant antenna with an E-field >shield and using Litzenstein wire (40-50 loops). Then pass the >signal though an 80+ dB 8+ pole bandpass filter with a bandpass of 3 >kHz or less (a 130+ dB filter is ideal). Next tune the filter and >the loop to compensate for any impedance mismatch (between the filter >and the loop). You basically want the circuit to give you a peak >signal at 15.734 kHz. >Attach a low noise amplifier of at least 40-60 dB to the output of >the amplifier and directly drive a simple 30 dB logarithmic display, >and optionally a tone generator that shifts based on the logarithmic >display. Set up the lowest element of the log display for the KTB for >the entire circuit so that a 3 dB increase over the KTB noise >illuminates the second element. >Next attach the loop antenna to a non-metallic, non conductive >collapsible pole and pass antenna over all surfaces in the area being >inspected. If you get within 2-3 feet of any concealed video camera >or wiring carrying a video signal you will detect it. >-jma >-- > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5275 From: Date: Tue Apr 30, 2002 1:01pm Subject: Number of US Wiretaps Down Last Year Number of US Wiretaps Down Last Year By TED BRIDIS .c The Associated Press WASHINGTON (AP) - The government requested and won approval of fewer warrants last year for secret wiretaps and searches of suspected terrorists and spies, attributing a slight decline to streamlined procedures that became law after the Sept. 11 terror attacks. The government received court approval for 934 of the secret warrants, down from 1,003 in 2000. Attorney General John Ashcroft said Tuesday the new Patriot Act, which amended the 1978 surveillance statute, made it easier for authorities to request fewer warrants since they don't expire as quickly and can be used in some cases across jurisdictions. ``The Patriot Act provides some measures of efficiency that can be of assistance to us, and I think it would be fair to interpret the data in light of that,'' Ashcroft said. Experts puzzled over the slight decline in a measure of the war on terrorism inside the United States. They said it probably reflected warrants that covered many surveillance requests under a single investigation - plus increased use by the FBI of tools other than these warrants, such as subpoenas for a suspect's financial records. ``There's no question the number of investigations went up in 2001 - it's unthinkable it would be otherwise,'' said Steven Aftergood of the Washington-based Federation of American Scientists. Experts believe many of the warrants approved last year under the 1978 Foreign Intelligence Surveillance Act were driven by the Sept. 11 attacks and by the changes to the law by Congress in the aftermath. The FBI often uses these specialized warrants to record the telephone calls and e-mails of citizens and immigrants believed to be agents of a foreign power. Authorities also can plant eavesdropping devices in a suspect's home or office or secretly search a suspect's property. In one rare case where details have emerged of FBI surveillance under the 1978 law, authorities for more than 18 months secretly tapped the telephones - and planted bugs in the bedroom - of a husband and wife who were convicted in 1998 on espionage charges. An appeals court upheld the FBI's actions. The government said it asked for 932 warrants for electronic surveillance and physical searches that the court approved in 2001 along with two requests made in December 2000. It said judges modified two warrants and two orders. The judges have never denied a request outright. But in an unusual flap that became public after Sept. 11, the FBI was unable to gain approval in the weeks before the terror attacks for a surveillance warrant against Zacarias Moussaoui, the only person so far to be indicted as a conspirator in attacks. FBI Director Robert Mueller has expressed frustration at how well the hijackers managed to evade authorities. ``The hijackers had no computers, no laptops, no storage media of any kind,'' Mueller said in a speech this month. ``They used hundreds of different pay phones and cell phones, often with prepaid calling cards that are extremely difficult to trace. And they made sure that all the money sent to them to fund their attacks was wired in small amounts to avoid detection.'' While some experts said the figures offered an unusual glimpse of the scope of the war on terrorism, others said the numbers were too vague to be meaningful. ``It's really difficult to read too much into these figures,'' said David Sobel of the Washington-based Electronic Privacy Information Center, urging more detailed disclosure about how the warrants were sought and used. The government disclosed Tuesday that it used such a surveillance warrant in December to search the offices and director's home of a charity with ties to Osama bin Laden, the Benevolence International Foundation in suburban Chicago. Court records suggest the FBI also used the special warrants last year in its espionage investigation of a retired Air Force master sergeant accused of offering to spy for Iraq, China and Libya. U.S. spy-catchers, for example, quietly searched the luggage of Brian Patrick Regan when he flew to Germany from Dulles International Airport last June and said they found glue and packing tape inside. The Patriot Act, which became law on Oct. 26, broadened the 1978 surveillance law by allowing the FBI to request warrants in investigations that aren't mostly focused on foreign intelligence. The law also expanded the number of judges who may approve the warrants from seven to 11, though the additional four have not yet been appointed by the chief justice. The seven U.S. district judges on the court are: Presiding Judge Royce C. Lamberth of Washington; William H. Stafford Jr. of northern Florida; Stanley S. Brotman of New Jersey; Harold A. Baker of central Illinois; Michael J. Davis of Minnesota; Claude M. Hilton of eastern Virginia and Nathaniel M. Gorton of Massachusetts. Lamberth's term expires May 18. 04/30/02 16:05 EDT 5276 From: Date: Tue Apr 30, 2002 8:01am Subject: Re: Simple Video Camera Detector In a message dated 4/30/02 10:00:06 AM Pacific Daylight Time, hawkspirit@e... writes: > > Jim, Are most CCD chip cameras scanning at this rate (15.735 kHz)? Roger > > With such a low frequency, wouldn't a diode detector pick that up? Robert Pickett Pickett Investigative Agency Open 24/7 503-589-0268 or 866-589-4 A PI (4274) Fax: (561) 431-2621 http://www.pickettinvestigativeagency.com We accept PayPal! [Non-text portions of this message have been removed] 5277 From: ed Date: Tue Apr 30, 2002 5:22pm Subject: Re: Number of US Wiretaps Down Last Year correction: number of court-approved wiretaps down last year 5278 From: NOT GIVEN Date: Tue Apr 30, 2002 11:14pm Subject: Hello, by name is Bryan. I am new to the list and would just like to say hi. I run a small department of intelligence. The Department Of Intelligence, or D.O.I. I live in Ohio and like outdoor sports and digging for information. Look forward to talking to you all. Bryan F. Department Of Intelligence --------------------------------- Do You Yahoo!? Yahoo! Tax Center - online filing with TurboTax [Non-text portions of this message have been removed] 5279 From: James M. Atkinson Date: Wed May 1, 2002 1:12pm Subject: Paradigm Shift in the Profession of Hunting Spies. Here is our updated "Spy Hunting" course and seminar list. About half of the seminars are open enrollment, with the next one coming up in DC next month. http://www.tscm.com/seminars.html Seminars and Courses Executive Briefings The Modern Eavesdropping Threat, [Executive Briefing], 1 day (6 hours) Weekend Seminar Series Seminar 02080 - What to do after you discover the bug [March 2002 - Nashua, NH] - Closed Enrollment Seminar 02087 - What to do after you discover the bug [April 2002 - Lexington, MA] - Closed Enrollment Seminar 02116 - What to do after you discover the bug [April 2002 - Boston, MA] - Seminar Full Seminar 02159 - What to do after you discover the bug [June 2002 - Washington, DC] - Open Granite Island Group Presents a Major Paradigm Shift in the Profession of Hunting Spies. The term "paradigm shift" was first coined by science historian Thomas Kuhn in his 1962 book, "The Structure of Scientific Revolution". Kuhn defined a paradigm is a certain set of beliefs. Often these beliefs are so fundamentally ingrained that even when flawed they are accepted as a given, with religious fervor. It is only when these beliefs are completely deconstructed and literally rebuilt from scratch using completely new methodologies and proven science do we experience a paradigm shift. The program consists of seven separate core classes, with a variety of optional advanced courses. The core courses are scheduled in such a way so as to permit students to take them all at one time in sequence, or to complete them over a period of several years in one and two week segments to minimize time away from work. Students will spend a maximum amount of time in training, can expect a minimum of a 12-14 hour training day, and will not have any "down time" during weekends or holidays (these should be considered fast track courses). 1.Introduction to Technical Counter-Intelligence Operations, 7 days (80 hours), Very basic TSCM course, what it is all about, the detail it demands, and review of methods used to find bugs, wiretaps, and technical surveillance threats. This course was developed to orient non-technical people with what a TSCM project involves, and how to maximize the effectiveness of any TSCM efforts. This particular course affords the student only minimal exposure to TSCM equipment. While it is fairly non-technical it provides suitable coverage of essential elements for the management of a bug sweep and technical counterintelligence program. This course is most suitable for senior executives, executive protection agents, military officers, and others who require a basic understanding of how to run a realistic technical counter-intelligence program. [Tuition for this course is: $5,250.00] 2.TSCM Fundamentals Course, 15 days (200 hours), Extensive work with entry level instruments and methods such as the OSCOR, CPM-700, ORION, and related instruments suitable for lower threat situations. This course is a highly technical, hands-on, and heavy exposure to equipment and methods. The student will completely master the equipment and techniques required to find most Spy Shop devices, and those devices used by most amateur spies. This course is most appropriate for private investigators, executive protection details and those corporate security departments who need the capability to perform a limited scope basic "in-house" bug sweep. This course is designed for students who do not possess an extensive background in electronics, and for those who WILL NOT BE performing TSCM services on a regular basis (less then three sweep days a month). [Tuition for this course is: $11,250.00] 3.RF Threat Course, 15 days (200 hours), Extensive work with sophisticated laboratory grade instruments including microwave spectrum analysers, search receivers, EMI/EMC antennas, raster generators, and related gear used to address higher threat situations. This course is a highly technical, hands-on, with heavy exposure to equipment and methods. This course is only appropriate for students who will be providing full time TSCM services to either corporate or government clients. This course addresses both radiated and conducted signals analysis and concentrates on making extraordinarily sensitive laboratory grade measurements in the field. This course is for technical security and counterintelligence specialists who will be providing TSCM services on a regular basis (five or more sweep days a month). [Tuition for this course is: $11,250.00] 4.Telephone Threat Course, 15 days (200 hours), Extensive work with Time Domain Reflectometers, Telephone Analysers, Wiring and Distribution Methods, and related gear used to address higher threat situations. This course is a highly technical, hands-on, with heavy exposure to equipment and methods. This course focuses on detecting hostile modifications to telephone wiring, phone instrument, switch or PBX. This course is for technical security and counterintelligence specialists who will be providing TSCM services on a regular basis. [Tuition for this course is: $11,250.00] 5.Physical Inspection Course, 15 days (200 hours), Extensive work with portable X-ray Equipment, Non-Linear Junction Detectors, Ultra-Violet Lighting, Borescopes, Forensic Lighting, Inspection Mirrors, and related gear used to address higher threat situations. This course is a highly technical, hands-on, and heavy exposure to equipment and methods. This course is for technical security and counterintelligence specialists who will be providing TSCM services on a regular basis. [Tuition for this course is: $11,250.00] 6.Automotive TSCM Inspections, 15 days (200 hours), This course addresses the specialized methods, protocols, equipment, and techniques that can be used to find eavesdropping devices concealed in various motor vehicles. This course is a highly technical, hands-on, and heavy exposure to equipment and methods. This course is for technical security and counterintelligence specialists who will be providing TSCM services on a regular basis. [Tuition for this course is: $11,250.00] 7.Annual Re-certification, 7 days (80 hours), Each year the TSCM specialist is encouraged to attend a re-certification course to facilitate being brought up to date on the latest threats, to learn new methods, and to refresh skills. This course is a highly technical, hands-on, and heavy exposure to equipment and methods. This course is for technical security and counterintelligence specialists who will be providing TSCM services on a regular basis. [Tuition for this course is: $5,250.00] Tuition for all open enrollment courses is $750.00 per student per day (plus expenses). Private or closed enrollment courses are also available, but at a higher rate of $1,000.00 per student per day with a 8 student minimum (plus expenses). Course tuition does not include travel expenses, lodging, or meals. A 50% non-refundable deposit is required at the time of registration to reserve the course slot, with the balance payable at least 45 days prior to the actual course start date. All materials presented during all courses is considered highly restricted trade secrets and as such students will be required to sign a formal non-disclosure agreement on the first day of class. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 5280 From: Aimee Farr Date: Wed May 1, 2002 6:13pm Subject: Smokey The Bear: "Only you can prevent...." [On the topic of "Paradigm shifts" and set-breaking, I offer this handout from an 8th grade school report. ;) Well, when you only have a penny, it's the most you can give. ~Aimee] -------------------------------------- Forest fires: The U.S. Forest Service. -------------------------------------- A put-out fire was a success. A prevented fire was a success. They protected the forest. Fire was EVIL. It was the harm. At some point, they had a series of big fires. The problem was crystal-clear: "Fires burning out of control that nobody caught early enough, crappy fire-fighters and not enough fire awareness." The answers were equally clear: "Fight fires better -- more fire fighters, more education, more this and that, identification of a 100 special obstacles, and a hundred mistakes in good fire-fighting, etc. and so on." Until entire forests burned up, they could not see the value of "controlled burn" strategies. Controlled burns reduced the chance of massive, fast-spreading forest fires by burning out the most suitable underbrush and creating fire breaks. By stamping some fires out, they made bigger ones. The blindspot was a natural result of bureaucratic conditioning, training, and standardized operating procedures. Most of all, it was the result of categorization, which influences how the event is seen and handled. After all, what would people think if they forest service went around letting fires burn? How would they explain starting fires to the American public? Not only were they completely oblivious to harmful practices which undermined their highest goal -- protecting the forest -- they were highly resistant to the idea of controlled burning, since their reward-system was centered around the opposite proposition. Forest fires, being a natural hazard, can't always be prevented. It's a natural and expected phenomenon. Fire is as much a part of the forest as the trees, so even fire deserved a form of protection. The problem wasn't too many forest fires, but too few of them. We were pretty good at putting them out, fires being what they are. We just weren't very good at making them work for us. (BTW, he's still called "Smokey The Bear," and not "Sparky.") ------- Morals ------- 1. Question failure. Question it outside of the problem. The problem sets the frame. So, when you question failure, question the problem. 2. Question success. For the same reasons, it is just as important to question a perceived success, as it is to question a perceived failure. 3. Measure by gain. In conflict, morality is not a result. So, it is no measure. Themis, not a thermal emission, but the original Lady Justice, was not blind. Her sword fell after she weighted the gain against the loss. 4. Measure by loss. When you measure by what was not lost, identify what was not gained. That is a loss. 5. Trust. Check your sub-goal fulfillment against your HIGHEST goals. Trust in THEM. Be sensitive to any divergence. 6. Trust not. What we know is only a judgment of a past time. Truth is about your position relative to a something, which is never the same. The piecemeal development of objectives can give objectives a sub-goal life of their own, and subvert the ultimate goals over time. The worst failures are built on success, which cultivates over-trust in procedure, form or frame, as a substitute for knowledge and understanding. 7. Work the burn. The moment of destruction is the genesis of creation. A dead, charred forest is a new forest being born. The contingency isn't just destruction, but rebirth. Borrow the power of your adversary to maximize the creative force of destruction, not just to prevent "the last fire." The next fire may not so closely resemble the last one. 8. Turn the burn. Every element can be turned, every essence divided into its opposite, and every situation met with its opposite -- to your advantage. The object in conflict is to control your adversary so as to have him serve your interests. To borrow the enemy. Consider the universe of opportunity in the unity of opposites -- the yin and yang of opposition, interdependence, mutual creation, intertransformation and infinite subdivision. Even the problem can be the solution. 9. Don't loose sight of the forest for the trees. 10. Fight fire with fire. 5281 From: Steve Uhrig Date: Thu May 2, 2002 10:35am Subject: Rhetorical question - CIA The CIA does not permit cameras (electronic or film), mechanical or digital audio recorders, etc. to be brought into their HQ at Langley. Can't even take my Minox in. They're pretty strict. No nonsense. Not lip service. The employee store, inside the secure area, sells 35mm disposable cameras like you'd buy at the 7-11. ??? Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5282 From: Mitch D Date: Thu May 2, 2002 4:29am Subject: The evil Pringles can strikes again! I watched a report on MSNBC last night, that entailed a NBC reporter riding around an area of NJ, with an employee of AT&T.Both in a car,with a laptop, that was equipped w a vid card,and was connected to a Pringles can, w a Yagi type antenna indside of it,roving for video signals generated by a known X-10 camera system source. What aroused my curiosity was: Why and how,did MSNBC get someone from AT&T to demonstrate interception of a x-10 cam system? Why did MSNBC utilize a ATT employee specifically to provide this demonstration? Did X-10 beat AT&T to the marketing of "off the shelf" consumer type wireless video products? With privacy laws currently being re"disfigured"(pun)why would MSNBC along with AT&T exploit the fact that X-10 signals are easy to intercept? Last but not least,How did a AT&T Engineer justify the expense of a can of Pringles on a lab expense report?with a zillion bucks worth of gear hanging around the lab????? Note: It was noted at the end of the report that the family utilizing the X-10 system to watch the kids would no longer use the X-10 system.......... __________________________________________________ Do You Yahoo!? Yahoo! Health - your guide to health and wellness http://health.yahoo.com From: kondrak Date: Mon Apr 26, 2004 5:35pm Subject: Re: Cavity Bug (Great Seal Bug) Tech Questions. Off the top of my head, a moving "vane" inside a resonate cavity at any frequency would tend to introduce frequency/phase deviation on the returned signal...maybe it was simple FM? Or more likely Phase Modulation. I dont think it was that elaborate... At 01:49 4/25/2004, you wrote: >Hi, > >I have some questions regarding the great Seal Bug. This was a "bug" >planted in the Great Seal behind the ambassadors desk in Moscow. > >The device consisted of a small metal cyclinder containing an >internal metal adjustable height mushroom. The endwall opposite the >mushroom was made of a thin metallic diaphragm which would vibrate >when exposed to audio. A small antenna entered the cylinder. The >device was totally passive. It contained no power source.(See URL at >end of my message). > >*Apparently the "howl" frequency was 1800Mhz however the operating >frequency of the device was found to be 800Mhz (info from Spycatcher >book). What are the maths for determining the dimensions/resonant >frequency of such a device? It seems that Peter Wright determined the >frequency by sweeping the device...there must be some maths that >would be able to better predict the "operating" frequency. > >*Why isn't the howl frequency the same as the operating frequency? > >*What kind of modulation would result when the "diaphragm" vibrates >with audio. Is it AM? Would the modulation be very low (ie 5%)? > >My interest is purely academic. I have read conflicting accounts of >this device and would like some "expert" opinion. > >Regards From, >Henry. > >PS:Here is a URL related to the Great Seal. >http://www.spybusters.com/Great_Seal_Bug.html > > >PPS: There is a bit written about this device (nicknamed "The Thing" >in the Peter Wright biography titled "Spycatcher"). Also some mention >in Keith Meltons book on spy gadgets. > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 8507 From: James M. Atkinson Date: Tue Apr 27, 2004 10:40am Subject: Special Item on E-Bay Here is a very special item on E-Bay that list members should check out. http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=4146756343#ebayphotohosting -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8508 From: Robin Hunter Date: Tue Apr 27, 2004 11:22am Subject: Re-Special item on E-Bay Excellent Jim, has fairly brightened what had been an otherwise dull day. I would also like to make it clear I am not the guy from Scotland who contacted the seller. regards from Edinburgh, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. [Non-text portions of this message have been removed] 8509 From: Tom Lee Byron Date: Tue Apr 27, 2004 4:46pm Subject: Laser Monitoring Systems A quick question, are Laser Monitoring Systems the only option if the operator is not able to enter the target room in order to place a transmitter. I have heard, the are not reliable , and damm expensive too. Any good manufacturer? 8510 From: contranl Date: Tue Apr 27, 2004 4:54pm Subject: Gps tracker detection.....Amazing ! ! . [GPS-TRACKER-DETECTION ] The weather was nice and sunny ... so i went to the beach. I decided to bring along my "Yupiteru" radioscanner and a "Protrak- Scout" to do some testing A beach is a fairly good area to do some radio experiments since it's far from any manmade radio-noises I'ts a flat area too with no obstacles and no reflections . PROTRAK-SCOUT: ----------------------------- The "Protrak-Scout" is by far the most popular and most sold 'covert" gps tracker in the world It's simple to use and very lowcost (500 US $)...For that price you can't expect a top tracker and it will (most of the time) not be used by the real professionals such as police etc. But it does the job The unit is build in a plastic housing and contains 2 boards... 1 is the gps receiver-board (furuno gn79) 1 microprocessor-board A vibration sensor is included and will put the unit in sleepmode when no vibrations are detected The "Protrak-Scout" is a "logger" wich means it will only collect and store the data...in order to read this data you will have to remove it from the object and connect it to a PC Depending on the position sampling rate it can store max 18 days of tracked positions. Powersupply is from 4 built-in penlitebatteries (1,5 V) A seperate Gps patch antenna with a 5 meter coax-cable is included YUPITERU MVT 7100: --------------------------------- The Yupiteru mvt 7100 is a low cost ( 350 Us $) radioscanner , it's far from perfect and can't be compared with highend equipment starting from 8000 Us $......but it's small and handy...and most important it has 1 khz tuning steps and a SSB mode (single sideband),a signal-strength meter is included too. THE TEST: ---------------- The purpose of the test was to see if there was any radiation coming from the "Protrak-Scout" in order to establish if the unit would be "detectable" when covertly installed in a car. Since it's only a receiver one cannot expect strong signals. So i put the "Protrak-Scout" on the ground in the middle of the beach...the antenna was not rolled out ...it was left like it came in the package ( rolled out about 35 cm's ) After i switched it on i took my "Yupiteru" and sat down in 2 meters distance while keeping the 50cm telescopic antenna in parallel with the "Protrak-Scout" I then did a search from 1 mhz to 500 mhz in 1 khz steps .....every 2 minutes i gave the "Protrak-Scout" a little kick to make shure it would'nt go into sleep-mode) RESULTS: ---------------- Immidiatly i started to receive the harmonics...i was shocked ! .......there where.....!!!!!! THOUSANDS !!!!!! ( on a spectrum analyzer closeby it might even look like a spreadspectrum transmitter... LOL :) :) :) After a while i determined wich where the strongest harmonics and how far (distance) they could be received Below is a small list with some of the strongest frequencies (harmonics) that showed up followed by the maximum distance they could be heard...first in Narrow Band FM (NFM)...then in Single Side Band (SSB) 34,8140 Mhz 3 meters (NFM) 8 meters (SSB) 69,6280 Mhz 6 meters (NFM) 25 meters (SSB) 75,7500 Mhz 4 meters (NFM) 20 meters (SSB) 81,6300 Mhz 7 meters (NFM) 18 meters (SSB) 99,5350 Mhz 12 meters (NFM) 50 meters (SSB) 110,5930 Mhz 18 meters (NFM) 54 meters (SSB) 116,0480 Mhz 14 meters (NFM) 30 meters (SSB) 121,6530 Mhz 23 meters (NFM) 52 meters (SSB) 127,1830 Mhz 28 meters (NFM) 74 meters (SSB) 127,6530 Mhz 26 meters (NFM) 72 meters (SSB) 191,6970 Mhz 25 meters (NFM) 82 meters (SSB) 255,3080 Mhz 24 meters (NFM) 71 meters (SSB) Now is'nt that amazing ?....it's ridiculous ! this unit has so many strong radiations that it could never be approved by the FCC or EC. REMARKS / OBSERVATIONS: ---------------------------------------------- One of the crystals (on the microprocessor board) says FS11.05 wich probably stands for 11,05 mhz and its the main cause of the strongest harmonics. Once again the "Protrak-Scout" is a low cost unit and does what it does...but it's detectable like hell ! Placing the unit in a car will ofcourse affect it's maximum radiation range ..but there will be more then enough radiation left to find it in less then 2 minutes ! As you see from the table...it radiates strongly in the FM-broadcast band...so a victim might even hear it on his own radio ! (sounds like a bumper beeper...a steady carrier with 1 sec tone- pulses) Some reasons why it radiates so strong are: 1) No metal housing 2) No filtering 3) Very big microprocessor 4) 2 different high-level quarz oszillators 5) Unnecessary large pcb tracks 6) No internal screenings and not designed for low emissions 7) To long antenna cable GARMIN eTREX: -------------------------- As reference i did a quick test on a "Garmin Etrex" A "Garmin Etrex" is a much smaller Gps unit...it's not a tracker but just a handheld navigation tool I assume its quality is much better..it has an internal antenna and probably only 1 crystal oscillator It is not build to be covert (allthough very much usable as such...for a 1 day only tracking job) Here are some results: (this time only in SSB) 32,7350 Mhz 5 meters (SSB) 65,4720 Mhz 30 meters (SSB) 98,2080 Mhz 10 meters (SSB) 130,9450 Mhz 25 meters (SSB) 163,6810 Mhz 26 meters (SSB) 196,4180 Mhz 24 meters (SSB) 229,1560 Mhz 30 meters (SSB) 261,8930 Mhz 20 meters (SSB) 392,8390 Mhz 16 meters (SSB) All the Garmin units have a service-mode...wich can be acessed by holding down 1 of the buttons and pressing the power-button at the same time, You will then see various values such as: serial-number , battery-voltage , temperature , etc also you will see "Frequency" wich in this case was around 16368342 This must be the frequency of the crystal at the processor (16,368342 Mhz) As you can see the above frequencies are exact multiples (harmonics) of this crystal-frequency RESUMING ----------------- With simple and lowcost methods i have shown that Gps-receivers are detectable over a respectable distance When hidden in a car the distances are shorter but more than enough for detection ( the metal body of a car causes reflections and conducting...just touching a metal part (blank or painted) might increase reception considerably) Do'nt forget that in this test i used a cheap receiver...a better receiver might give 20~30 % better results A good designed "Covert-Gps-Tracker will have much less radiation but still enough to be detectable. ... they wil cost at least 8000 US $ and are not easely available.... and therefore will only be used by government I am still working on a device to quickly find all Gps-trackers... i have now incorporated a guided step by step "elimination-process" this will let you quickly eliminate all "false" alarms ( caused by other electronics or "outside-broadcasts" ) A "template" (spectrum of a car) maybe stored for later reference using the car's numberplate or code Eventually the unit might also be usable as a bugdetector with some features specially for cars Comments and ideas are welcome (here or private) Greetings Tetrascanner www.tetrascanner.com . 8511 From: Steve Uhrig Date: Tue Apr 27, 2004 10:01pm Subject: Re: Laser Monitoring Systems Once upon a midnight dreary, Tom Lee Byron pondered, weak and weary: > A quick question, are Laser Monitoring Systems the only option if the > operator is not able to enter the target room in order to place a > transmitter. There are many other options, however this is not the venue to discuss them. Persons with authority to do this will have access to channels to obtain the info. > I have heard, the are not reliable , and damm expensive too. Short of laboratory curiosities in staged phony demos, laser eavesdropping is worthless for any real world application. Whether cheap or expensive, if you buy something purporting to be one you will be cheated. > Any good manufacturer? No. Plenty of places who will make claims, throw buzzwords and fancy lit at you, and take your money however. This list discusses defensive practices against eavesdropping. It is not the place to seek information on eavesdropping equipment or technique. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8512 From: James M. Atkinson Date: Tue Apr 27, 2004 10:15pm Subject: Upcoming Price Uncrease on OSC-5000 Effective 1 May 2004 the price for an OSC-5000 is jumping by $2750, so if you want to same some serious money you have to get the order on our books before the end of the day on this coming Friday. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8513 From: Hawkspirit Date: Wed Apr 28, 2004 11:33am Subject: GPS Detection Very good, you now have some feeling for the detection of processor noise; now take a guess about the technique to differentiate GPS processor noise from other processor noise and display strobe noise in a dashboard. Roger Tolces www.bugsweeps.com Date: Tue, 27 Apr 2004 21:54:11 -0000 From: "contranl" Subject: Gps tracker detection.....Amazing ! ! [GPS-TRACKER-DETECTION ] The weather was nice and sunny ... so i went to the beach. I decided to bring along my "Yupiteru" radioscanner and a "Protrak- Scout" to do some testing A beach is a fairly good area to do some radio experiments since it's far from any manmade radio-noises I'ts a flat area too with no obstacles and no reflections . [Non-text portions of this message have been removed] 8514 From: Shawn Hughes Date: Wed Apr 28, 2004 11:57am Subject: Re: GPS Detection I see you are really making an effort, so, let me throw you a bone here. You have determined you can locate a device in basically a lab setting ( reduced but not eliminated RF sources and most reflecting surfaces). Keep in mind that some frequencies carry for many, many miles based on the atmospheric conditions. Did you do a reference test of the area prior to testing your device? You might be surprised.....even your receiver may have a similar set of harmonics ( scanner people call them 'birdies' ). However, what happens to these signals when you raise the noise floor? As in a typical sweep, in an urban area. In a typical installation? Now that you have your baseline readings, put the thing in a vehicle like you are going to use it, then take readings 360 degrees around the vehicle, and in several arcs from the horizontal to the vertical plane. Use an omni antenna initially, then pick the strongest spur and use some notch filtering and directional antennas and repeat the process. See if you can obtain repeatable results. Good luck! -Shawn Shawn Hughes Tactical Response Inc. USA At 09:54 AM 4/28/04 , TSCM-L@yahoogroups.com wrote: >From: "contranl" >Subject: Gps tracker detection.....Amazing ! ! 8515 From: Date: Wed Apr 28, 2004 10:16am Subject: Hello to old friends Just a quick note to say ìHello!î to old friends with whom I havenít spoken in many moons. Some of you know me from my former life with the gov, and others when I owned Robert Douglas Associates. Anyhow, the new life now (since about 2 years ago) is as Dean of Technology programs at DeVryís Crystal City campus in Arlington, VA. Iíve just finished spearheading development of a new regionally accredited Bachelorís program in Security Engineering Technology. Itís rolling out at Arlington this summer, and should hit the other 26 campuses across the country over the course of about a year. Itís a good program where the various courses were suggested by a focus group consisting of friends at CIA, NSA, DOE, State, and several commercial entities. Steve Uhrig should have been there and was missed (he had a problem at the time that precluded his attending). Anyway, Iím currently writing a textbook titled ìPhysical and Technical Security: An Introductionî. The book will be released by Thomson Delmar publishers early in 2005. Iím just in chapter 11 out of 12 now, and this is what brings me to you. This chapter is dedicated to TSCM (introductory only!). If anyone would like to contribute a short blurb or two, let me know, and Iíll email a permission to republish form to you. The book should get good coverage, mainly for programs in physical security at community colleges. So ---- Hello again and thanks for letting me be a part of the group. Best regards, Bob Gruber 8516 From: Hawkspirit Date: Thu Apr 29, 2004 10:14am Subject: GPS Detection Here's a bone for you. Ambient signals and noise floors are fairly irrelevant here because what you are doing is making near field measurements to a device that will at times during the inspection be within a foot of the measuring antenna. Roger Tolces www.bugsweeps.com Date: Wed, 28 Apr 2004 12:57:43 -0400 From: Shawn Hughes Subject: Re: GPS Detection I see you are really making an effort, so, let me throw you a bone here. You have determined you can locate a device in basically a lab setting ( reduced but not eliminated RF sources and most reflecting surfaces). Keep in mind that some frequencies carry for many, many miles based on the atmospheric conditions. Did you do a reference test of the area prior to testing your device? You might be surprised.....even your receiver may have a similar set of harmonics ( scanner people call them 'birdies' ). However, what happens to these signals when you raise the noise floor? As in a typical sweep, in an urban area. In a typical installation? Now that you have your baseline readings, put the thing in a vehicle like you are going to use it, then take readings 360 degrees around the vehicle, and in several arcs from the horizontal to the vertical plane. Use an omni antenna initially, then pick the strongest spur and use some notch filtering and directional antennas and repeat the process. See if you can obtain repeatable results. Good luck! -Shawn Shawn Hughes Tactical Response Inc. USA [Non-text portions of this message have been removed] 8517 From: Date: Thu Apr 29, 2004 1:01pm Subject: TV producer charged over taping incident TV producer charged over taping incident Thursday, April 29, 2004 By Ken Kolker and Barton Deiters The Grand Rapids Press A local TV station producer is facing a felony charge after allegedly setting up a hidden video camera in his roommate's bedroom. Daniel Gallagher, 28, who has produced the Daybreak early morning news program at WOOD-TV (Channel 8) is to appear in Grand Rapids District Court next week for a preliminary hearing on a charge of installing an eavesdropping device, according to court records. "The defendant allegedly installed video and audio equipment over his roommate's bed in an attempt to disclose his promiscuity," police wrote in court records. The alleged victim, who also worked at the station, discovered the device last weekend and reported it to police. The men lived together in a fourth-floor apartment at Boardwalk Apartments, an upscale development in an old factory at 940 Monroe Ave. NW. Adam Budnick, who is listed as a witness in court records, said Gallagher allowed the alleged victim to live with him for about a fourth of the rent. The two knew each other from college. "I told (the alleged victim), there's no free lunch," Budnick said. "This guy wants something." Budnick said suspicion arose when Gallagher was aware of events in his roommate's life that they had not talked about. On Saturday, the alleged victim, 23, found a laundry hamper covering an audio and video recording device in Gallagher's bedroom with wires leading to duct work in the other bedroom, Budnick said. A video tape allegedly was brought to police. The apartment was searched and numerous tapes of the roommate were found. Grand Rapids Police Lt. Paul Warwick said detectives were trying to determine how long ago the device was installed. "It's been going on over the last few weeks," he said. He said police seized some recordings. It wasn't known if any of the recordings were distributed. "Those are things that are being investigated," Warwick said. Gallagher was arrested on Saturday, the same day his roommate called police. He was released on a $5,000 cash-surety bond with the condition that he "not possess any computer, camera or digital device capable of recording fixed or moving images," court records show. If convicted, he faces up to two years in prison. He could not be reached for comment. Gallagher, a Detroit native, moved to Grand Rapids four months ago for the job at WOOD, according to court records. He was in charge of creating and putting together the Daybreak news program, WOOD-TV news director Patti McGettigan said. She declined to say what action, if any, the station has taken regarding Gallagher. "The situation is under review," she said. "It's a personnel matter." The station reported the story Wednesday on its noon broadcast. McGettigan said there was no indication Gallagher used equipment from the station. [Non-text portions of this message have been removed] 8518 From: Date: Thu Apr 29, 2004 1:05pm Subject: London Times claims it bugged UK politians with Bluetooth Times claims it bugged UK politians with Bluetooth More amazing claims for 'Bluesnarfing' By Tony Dennis: Monday 26 April 2004, 06:03 IN GOOD old fashioned sensationalist style The Times has gone to the British Palace of Westminster to prove that 'bluesnarfing' is a threat to the country's security. The claims are based on software developed by Adam Laurie of A.L. Digital that software running on his ordinary Panasonic notebook can break the security of Bluetooth on standard mobile handsets. And in this case turn Bluetooth handsets into 'bugs'. He seems to maintain that the Nokia 6310 and Sony Ericsson T610 are the most vulnerable. Laurie refuses to say how the attacks actually work but presumably it exploits a flaw whereby a default 'pairing' password (probably only four characters) is guessed and the handset owner has left the device with Bluetooth switched on and visibility set to 'all'. What is amasing is that Laurie appears to suggest that he can seize control of such a handset and then listen to what's going on around the owner at the time. Curiously Laurie appears to have tested his software against the Sony Ericsson Z1010 - a device which isn't shipping yet. Sony Ericsson did tell The Times that software upgrades are available to counteract some aspects of malicious attacks. Nokia has admitted to examining the risks to certain models. Rather than worry about leaky Bluetooth handsets, the INQ suggest the government investigates how Mr Laurie 'smuggled his laptop' into the Central Lobby of our Parliament. © 2004 Breakthrough Publishing Ltd. [Non-text portions of this message have been removed] 8519 From: Date: Thu Apr 29, 2004 1:10pm Subject: MOGUL FACING TAP RAP MOGUL FACING TAP RAP By KIERAN CROWLEY NY Post April 23, 2004 -- A wealthy real-estate mogul has been arrested and charged with wiretapping - for allegedly bugging his estranged wife's phone calls at their Long Island mansion. Mark Laffey, 34, was arrested Wednesday and charged with criminal eavesdropping for allegedly rigging a hidden tape recorder to record wife Maureen's phone calls at their Oyster Bay estate. Maureen Laffey, 35, called police after she uncovered the hidden recorder inside her bedroom closet, said Nassau Detective Lt. Steven Skrynecki. "This is a domestic situation. They are involved in a divorce," said Skrynecki. "We have reason to believe that the husband was taping conversations between the wife and other people. " Skrynecki said detectives recovered "an audio recording device" from the bedroom. "The charge is that he was eavesdropping on telephonic conversations," Skrynecki said. Mark Laffey, the chief operating officer of Century 21 Laffey Associates Fine Homes, spent the night in jail and was arraigned on the charge yesterday morning at Nassau County 1st District Court in Hempstead. A prosecutor asked the judge to issue an order of protection to keep Mark away from his wife - even though they both still live in the same home. Defense lawyer Dominic Barbara objected, saying his client had never been arrested before and had no history of violence. Barbara said his client was not guilty. "I'm not suggesting he did tap the phone," Barbara said in court. "How do you know he put the recorder there?" The judge did not issue an order of protection, and he set Laffey free on his own recognizance. "My client categorically denies that he was taping any phone calls," Barbara said after the court appearance. A lawyer for Mrs. Laffey declined to comment on the arrest. Mark is charged with a felony and faces up to four years behind bars if convicted. Mrs. Laffey filed for divorce last year. The couple are also battling for custody of their 7-year-old daughter. Mark's firm, which sells in Queens and on Long Island, "is one of the fastest-growing real estate companies in the country," according to company promotional material. He has been a real-estate broker for 14 years. [Non-text portions of this message have been removed] 8520 From: Lawrence Dillard Date: Thu Apr 29, 2004 11:59am Subject: virus? NEW VIRUS Just got this in from a reliable source. It seems there is a virus called the "Senile Virus" that even the most advanced programs of Norton and McAfee cannot take care of it .... so be warned. The virus appears to affect those of us who were born before 1950! Symptoms of the Senile Virus: 1. Causes you to send the same e-mail twice. 2. Causes you to send blank e-mail. 3. Causes you to send e-mail to the wrong person. 4. Causes you to send e-mail back to the person who sent it to you. 5. Causes you to forget to attach attachments. 6. Causes you to hit "SEND" before you've finished the e-mail. Now that I'm 'older' (but refuse to grow up), here's what I've discovered: 1. I started out with nothing, and I still have most of it. 2. My wild oats have turned into prunes and All Bran. 3. I finally got my head together; now my body is falling apart. 5. Funny, I don't remember being absent minded... 6. All reports are in; life is now officially unfair. 7. If all is not lost, where is it? 8. It is easier to get older than it is to get wiser. 10. Some days you're the dog; some days you're the hydrant. 11. I wish the buck stopped here; I sure could use a few... 12. Kids in the back seat cause accidents. 13. Accidents in the back seat cause kids. 15. It's hard to make a come back when you haven't been anywhere. 16. The only time the world beats a path to your door is when you're in the bathroom. 17. If God wanted me to touch my toes, he would have put them on my knees. 18. When I'm finally holding all the cards, why does everyone decide to play chess? 19. Funny, I don't remember being absent minded... 20. It's not hard to meet expenses... they're everywhere. 21. The only difference between a rut and a grave is the rut is open ended. 23. I AM UNABLE TO REMEMBER why the difference makes any difference. 24. Funny, I don't remember being . . . . . absent minded... Now, I think you're supposed to send this to ... oh, heck, just send it to a bunch of your friends if you can remember who they are. Then something is supposed to happen...... I think. Maybe you get your memory back or something! 8521 From: Steve Uhrig Date: Fri Apr 30, 2004 0:35am Subject: Congrats to Ed Michaels KC2MWI Belated congrats to list member Ed Michaels, who got his first ham license recently and now signs the call KC2MWI on 2 meters and UHF. Like most of us, he was checking the FCC database every few hours after he passed the test waiting to see what his new call would be. In my training and mentoring, I've always encouraged persons interested in surveillance and countersurveillance to consider ham radio as a hobby. It's no coincidence most of the highly respected sweepers and surveillance operators are hams. In fact, it's unusual to find one who isn't. It's not just for kids. Ed is one of the more geriatric members of this list! He's got a few years on me. Much of the technology you'd use for the ham radio hobby transfers directly to commercial applications. You learn communications and electronics theory and practice painlessly while enjoying it as a hobby. And, in the U.S. at least, I believe some licenses now are Morse-code- free which never was the case before, so any remaining excuse not to get a license has been removed. And it's not necessarily an expensive hobby, especially if you build the majority of your equipment as many of us have done. Drop a handful of parts from a wrecked television on the floor, and someone like Marty Kaiser W3VCG will be on the air by the time he picks them up. A lot of Marty's skills were developed as a direct result of his lifelong ham radio hobby, as were mine and those of many other respected surveillance types. If you run into someone who really, truly knows his stuff, it's almost a sure bet he's a ham. You can do anything from micro powered CW (code) to work worldwide, to data, to television, to moonbounce, to extremely low frequencies, to microwave, to the latest spread spectrum, to military backup commo support, Civil Defense backup commo, Civil Air Patrol backup commo, to standard AM or SSB voice, to chasing rare stations and countries some of which have no hams (and some of which are underwater part of the day) but are visited by hams once in a while, to contesting, to remote control, VHF, UHF, mobile telephone, repeaters, micro-sized gear, super high and legal power, antenna experimenting, high fidelity voice, Internet/radio links for worldwide communications using an inexpensive handheld radio to communications with the Russian Space Station or U.S. Shuttles almost all of which have amateur stations (I have a QSL card from one shuttle verifying I spoke with Owen Garriott as the shuttle passed over Maryland, and I was using an antique handheld radio), to amateur satellite communication, remote command, teletype, manual or automatic Morse Code, radio direction finding and hidden transmitter hunts, public service backing up government communications during times of emergency, weather spotting, microprocessor radios, vacuum tube radios, tuna can radios, converting old military equipment, software- controlled radios, boatanchor radios (generally pre WW2 commercial or military), and much more. You get the idea. My personal favorite happens to be CW (Morse Code) on the 10 meter/28 megacycle band, using extremely low power with a homebuilt transceiver chasing rare stations when the sunspots are favorable. I put less RF power into the antenna than into the dial lights, and far less than a CB radio uses. Using generally between 50 milliwatts and a few hundred milliwatts, I've worked around 30 states and 33 countries. You don't need high power or expensive equipment to have a lot of fun and learn a lot! Part of my career kind of got started in 1972 when the ham radio magazine called 73 Magazine purchased my first article for $40. It was on designing and building a logic probe for digital troubleshooting back when digital was just starting. That was 333 published articles ago. Magazines pay well and are desperate for an ongoing supply of technical articles, and having a ham license gets you a certain amount of instant credibility in certain circles. Another area to consider. If you can write, you can sell articles to the tech magazines. Good work Ed. The FCC doesn't give those licenses away (actually you have to pay for them). Not really; just study up some on rules and regs, make sure you know your basics in electronics, AC and DC theory and communications, some basic formulas like Ohm's law, reactances and massaging decibels and stuff like that, then take the sample tests at www.qrz.com or www.nemarc.org, and when you're doing well on a regular basis you're ready for the test. Most of the electronics will be no real challenge for persons involved in the TSCM profession. You do need to memorize some simple regulations, frequency and band limits, privileges of various license classes, etc. The sample exams available free draw from the identical question pool used in the real exam, so if you take the practice exams enough times you will have seen every question and answer you would on a test. Tests in the U.S. are given by volunteer examiners usually attached to a radio club. There are thousands of radio clubs all over the U.S. Tests also frequently are given at 'hamfests' which are electronics flea markets run by clubs as fund raisers usually at a fairgrounds or similar. Visit one if you hear of one in your area. If anyone is interested in getting into ham radio, there are a very large number of resources on the web, local clubs in many areas, and national organizations. You can start with www.arrl.org and www.qrz.com for a few. Training software which I highly recommend can be found at www.N3FJP.com if you decide to go that route. It's really not difficult. If Ed got licensed, you *know* it's not difficult! Once you have a license, it's yours for life. Ham radio will benefit your career if you do anything in electronics or communications. And, it's FUN! Steve (WA3SWS since 1971). ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8522 From: kondrak Date: Fri Apr 30, 2004 3:25am Subject: Re: Congrats to Ed Michaels KC2MWI A hearty congratz to Ed... Steve...somehow I get the feeling you were somehow his "Elmer"... At 01:35 4/30/2004, you wrote: >Belated congrats to list member Ed Michaels, who got his first ham >license recently and now signs the call KC2MWI on 2 meters and UHF. >In my training and mentoring, I've always encouraged persons >interested in surveillance and countersurveillance to consider ham >radio as a hobby. It's no coincidence most of the highly respected >sweepers and surveillance operators are hams. In fact, it's unusual >to find one who isn't. > >It's not just for kids. Ed is one of the more geriatric members of >this list! He's got a few years on me. Hey, I've got a 8 year old nephew who's doing 5wpm now, I've got to wheel him up to a hamfest soon to a VEC...he asked and got a soldering iron last Christmas.... >Much of the technology you'd use for the ham radio hobby transfers >directly to commercial applications. You learn communications and >electronics theory and practice painlessly while enjoying it as a >hobby. Its seamless, many of us who are in telephony, broadcast, satellite, land mobile, and yes, TSCM are avowed hams, and many have been for a while...took me to age 14 to get my general...and that was back in the days when radioman were men and power supplies were lethal... >And, in the U.S. at least, I believe some licenses now are Morse-code- >free which never was the case before, so any remaining excuse not to >get a license has been removed. Yes, to this date they've resisted dumbing them down to a vending machine item, but with what we call our "FCC" that may not last for long, as soon as they figure a way to auction them off for political profit, I'm sure that will be the way they go. >And it's not necessarily an expensive >hobby, especially if you build the majority of your equipment as many >of us have done. Cof..."BUILD"? Please Steve, don't scare them off just yet....(My first CW [thats code for the lurkers] transmitter was built out of an old TV set, using 6CD6's for a push-pull output stage. (60w with the wind blowing from the right direction) My first CW contact after being licensed was 20 miles away...ho hum...(on 40 meters) >Drop a handful of parts from a wrecked television on >the floor, and someone like Marty Kaiser W3VCG will be on the air by >the time he picks them up. A lot of Marty's skills were developed as >a direct result of his lifelong ham radio hobby, as were mine and >those of many other respected surveillance types. If you run into >someone who really, truly knows his stuff, it's almost a sure bet >he's a ham. Not out of todays TV's. Maybe an old Admiral, or a Silvertone (if you didn't mind tubes with alien filament voltages). But out of today's crap that passes for a TV, you'd be lucky to get a signal out on 3.5879... or 1575 khz.... >You can do anything from micro powered CW (code) to work worldwide, >to data, to television, to moonbounce, to extremely low frequencies, >to microwave, to the latest spread spectrum, to military backup commo >support, Civil Defense backup commo, Civil Air Patrol backup commo, >to standard AM or SSB voice, to chasing rare stations and countries >some of which have no hams (and some of which are underwater part of >the day) but are visited by hams once in a while, to contesting, to >remote control, VHF, UHF, mobile telephone, repeaters, micro-sized >gear, super high and legal power, antenna experimenting, high >fidelity voice, Internet/radio links for worldwide communications >using an inexpensive handheld radio to communications with the >Russian Space Station or U.S. Shuttles almost all of which have >amateur stations (I have a QSL card from one shuttle verifying I >spoke with Owen Garriott as the shuttle passed over Maryland, and I >was using an antique handheld radio), to amateur satellite >communication, remote command, teletype, manual or automatic Morse >Code, radio direction finding and hidden transmitter hunts, public >service backing up government communications during times of >emergency, weather spotting, microprocessor radios, vacuum tube >radios, tuna can radios, converting old military equipment, software- >controlled radios, boatanchor radios (generally pre WW2 commercial or >military), and much more. You get the idea. Yup, done most of that....don't forget microwave, the last frontier, where hams are setting world distance records the commercial guys only drool over...packet networks rivaling the internet for reach as well. >My personal favorite happens to be CW (Morse Code) on the 10 meter/28 >megacycle band, using extremely low power with a homebuilt >transceiver chasing rare stations when the sunspots are favorable. Mine is 6m CW, with 2 watts, battery operated. QSL'ed 28 states now... > I >put less RF power into the antenna than into the dial lights, and far >less than a CB radio uses. Using generally between 50 milliwatts and >a few hundred milliwatts, I've worked around 30 states and 33 >countries. You don't need high power or expensive equipment to have a >lot of fun and learn a lot! > >Part of my career kind of got started in 1972 when the ham radio >magazine called 73 Magazine purchased my first article for $40. Bless Wayne Green... >It >was on designing and building a logic probe for digital >troubleshooting back when digital was just starting. That was 333 >published articles ago. Magazines pay well and are desperate for an >ongoing supply of technical articles, and having a ham license gets >you a certain amount of instant credibility in certain circles. >Another area to consider. If you can write, you can sell articles to >the tech magazines. > >Good work Ed. The FCC doesn't give those licenses away (actually you >have to pay for them). yes, again welcome Ed... >Not really; just study up some on rules and regs, make sure you know >your basics in electronics, AC and DC theory and communications, some >basic formulas like Ohm's law, reactances and massaging decibels and >stuff like that, then take the sample tests at www.qrz.com or >www.nemarc.org, and when you're doing well on a regular basis you're >ready for the test. Most of the electronics will be no real challenge >for persons involved in the TSCM profession. You do need to memorize >some simple regulations, frequency and band limits, privileges of >various license classes, etc. The sample exams available free draw >from the identical question pool used in the real exam, so if you >take the practice exams enough times you will have seen every >question and answer you would on a test. Tests in the U.S. are given >by volunteer examiners usually attached to a radio club. There are >thousands of radio clubs all over the U.S. Tests also frequently are >given at 'hamfests' which are electronics flea markets run by clubs >as fund raisers usually at a fairgrounds or similar. Visit one if you >hear of one in your area. mention...commitment....its not something you do on a whim, its a lifestyle, and you've got to admit that's true...Its one of the biggest fraternity/sororities in the world....in the heart of the cold war, some of the warmest receptions, and possibly the forerunners to glasnost were ham to ham visits between US and USSR hams. Its the one hobby that can affect world relations, even tho it might seem small potatoes. You can travel the world, and a ham will always extend the hand of friendship to another ham. Its an un-written rule. >If anyone is interested in getting into ham radio, there are a very >large number of resources on the web, local clubs in many areas, and >national organizations. You can start with www.arrl.org and >www.qrz.com for a few. Training software which I highly recommend can >be found at www.N3FJP.com if you decide to go that route. It's really >not difficult. > >If Ed got licensed, you *know* it's not difficult! > >Once you have a license, it's yours for life. > >Ham radio will benefit your career if you do anything in electronics >or communications. And, it's FUN! > >Steve (WA3SWS since 1971). Oh man, I know we've talked, but I cant say my call because of my position, but Ive been a ham since 1964... Good Promo Steve, I can echo everything you say...and I'll add, ham radio can be everytihng to everyone because of the diversity of the many facets of the hobby. Its a cerebral hobby, one I encourage anyone with a keen exploring mind to look into. Some of the greatest people I've ever met were or are hams. It's was a neat thing to call CQ on 15 meters one day (at the tender age of 16) and find myself talking to the king of Jordan, or Arthur Godfrey, or Barry Goldwater...all of whom I have verified QSL cards from. I passed emergency traffic during any number of incidents over the years, from car accidents to blizzards to power outages. Emergency communications and organizations like RACES, ARES, Red Cross and SATERN are all worthy callings, as is the MARS services (Military Affiliated Radio System) and CAP. Its a lifelong hobby, and I can say I'm very glad I spent a summer a long time ago learning CW and a plate from a grid...I built a career on it as well.... 8523 From: Shawn Hughes Date: Fri Apr 30, 2004 9:43am Subject: Re: GPS Roger, Thanks for the bone, but I'm having a little difficulty chewing on it...... Sure, it's a near field measurement, but if it's ALSO near the clock, stereo, ECM, PCM, ABS, or any of the other systems on a modern vehicle with an oscillator, how are you going to know which is which? Worse, if one of those has a similar clk freq as the GPS, the GPS could snuggle in behind the other items' signature. Having an attenuator and directional antennas would help, but are you saying you're gonna find a GPS reliably and repeatably based on the oscillator and harmonics alone? V/R, Shawn Shawn Hughes Tactical Response, Inc. USA At 10:10 AM 4/30/04 , you wrote: > > > > >Here's a bone for you. > > > >Ambient signals and noise floors are fairly irrelevant here because what you >are doing is making near field measurements to a device that will at times >during the inspection be within a foot of the measuring antenna. > >Roger Tolces 8524 From: Date: Fri Apr 30, 2004 9:24am Subject: In this wealthy town, cameras record every visitor Posted on Fri, Apr. 30, 2004 In this wealthy town, cameras record every visitor BY NOAH BIERMAN Knight Ridder Newspapers MANALAPAN, Fla. - (KRT) - One of the nation's richest towns has decided to digitally record the license plate of every car that meanders through its small stretch of mansions on the Palm Beach County, Fla., coast and to run an automatic background check on each driver. Strategically placed cameras will take infrared photos that record a driver's tag number. Software will automatically run the numbers through law enforcement databases and alert a 911 dispatcher if the driver is in a stolen car or is the subject of a "be on the lookout" warning. If there's a robbery, police will be able to comb records to determine who drove through town on a given afternoon or evening. Next to the tag number, police will have a picture of the driver, taken with another set of cameras, upgraded versions of the standard surveillance cameras already in place. Manalapan's town council authorized $60,000 in security upgrades last week after three burglaries this winter robbed residents of $400,000 in jewelry. The town averages two or three burglaries per year and residents demanded swift response, said Town Manager Gregory Dunham. The 2000 Census listed Manalapan among the nation's richest cities, with two out of every three homes worth more than $500,000. Enter the PIPS Technology camera, developed in England with a large operation in Knoxville, Tenn. PIPS is among several companies that claim their machines can capture license plate digits from cars speeding faster than 100 mph through rain, sleet, snow, darkness or fog. Manalapan is the second Florida city that will put the PIPS equipment on a public road. PIPS Vice President Craig Cantrell said the town of Palm Beach has been testing it since December. A spokeswoman for the department declined to comment. England's bobbies have been more aggressive, mounting plate cameras on patrol cars to scan for outlaws since the 1990s. Experts say bold and simple European tags are easier for a camera to interpret than America's busy and varied tags. The PIPS system, for example, has trouble distinguishing between states because that information may be printed lightly or not at all on the tag. "It is a very daunting task to teach a machine to recognize numbers," said Lee J. Nelson, principal systems consultant for Electro-Optical Technologies, Inc. in Falls Church, Va. Police Chief Clay Walker said his dispatchers will look at the plate numbers that trigger their alarm system to make sure they match the corresponding photos of the cars before sending police after them. They'd better be right. Agencies around the country have been forced to offer sheepish apologies after misreading license plates and chasing down innocent people. Walker says that if all goes well with the first phase - placing two cameras on a quiet road that leads to the island's "point" neighborhood - he'll put a camera directly on the A1A highway, so that everyone who passes through the busy area will be recorded. It's one of the more extreme examples of how technology - be it a home computer, a SunPass transponder, or a cellphone - is changing the nature of personal privacy. The technology planned for Manalapan, Fla., has been in development for decades but is just emerging as a security tool in this country. SunPass has been using license plate cameras since 1999 to make sure people pay turnpike tolls. Miami International Airport began using them in November to make sure people don't underpay for long-term parking. Miami-Dade police are looking into using the technology but could not provide details about their plans. "Courts have ruled that in a public area, you have no expectation of privacy," said Walker, one of 11 sworn officers who protects Manalapan's 321 residents. Walker is no J. Edgar Hoover. He has his own concerns about the freedoms Americans gave up with the passage of the USA Patriot Act. He says Manalapan's data will be destroyed every three months and that his officers are sensitive to discrimination concerns. Still, civil libertarians worry about the potential to put innocent drivers on an electronic lineup just because they happen to drive along the beach. "It's just more of the Big Brother act," said Maria Laneve, 29, a bartender at Callaro's Prime Steak and Seafood, in the town's only shopping center. Rich Wishart, a 40-year-old waiter, said, "If you're not doing anything wrong, you've got nothing to worry about." "These people have a lot invested in this community," he added. In Tampa, Fla.'s, Ybor City neighborhood, police installed facial recognition technology in 2001. Cameras and software were designed to match facial features of passers-by with a database of wanted persons. They scrapped the program last year after it raised the ire of privacy advocates but failed to catch a single criminal. © 2004, The Miami Herald. [Non-text portions of this message have been removed] 8525 From: Vercingetorix Vercingetorix Date: Fri Apr 30, 2004 9:10am Subject: Welcome to the Fraternity Ed! Welcome to the fraternity Ed! I hope to have the opportunity to run in to you some day on PSK31 or somewhere else in QRP land. I concur with Steve, I know very few people in the business that are not hams or at least who want to become one. There are indeed very diverse opportunities and unique challenges afforded in "amateur" radio. In addition to the technical challenges and camaraderie, I particularly enjoy the emergency preparedness and response aspects of the hobby that truly has become a way of life as well. Every once in a while you do manage to get published in something like 73 or QST http://www.arrl.org/news/features/2001/05/08/1/?nc=1 I find the amateur community extremely robust in the depth of knowledge, experience and for answers to those annoying questions that I do not have the answer to. Again, welcome to the club! Russ N7HOV --------------------------------- Do you Yahoo!? Win a $20,000 Career Makeover at Yahoo! HotJobs [Non-text portions of this message have been removed] 8526 From: Date: Fri Apr 30, 2004 6:00pm Subject: Robber caught by GPS Robber caught by GPS By Chau Lam Staff Writer Newsday April 30, 2004, 8:40 PM EDT On a summer night in 2002, a Nassau police detective secretly planted an electronic tracking device on the undercarriage of a car driven by a Lawrence man suspected of a string of burglaries. For nearly a month, every car trip taken by Richard D. Lacey, 27, a security guard, was recorded by the tracking device -- a global positioning system commonly known as GPS. Lacey didn't have a clue. However, in a case that has broad implications for law enforcement, Lacey's lawyer is challenging the police department's high-tech tactics. In fact, in what is believed to be the first challenge of its kind in the state -- and one of only a handful in the nation -- defense attorney Bruce A. Barket of Garden City is asking a Nassau County Court judge to suppress evidence police gathered with the GPS, saying Lacey's privacy rights were violated. At the heart of Barket's objection is whether police should have been allowed to tag Lacey's black, 1996 Mitsubishi Eclipse, which had Tennessee license plates, with the GPS without first obtaining a court order. "It's somewhat disconcerting to have the law enforcement community assert that they can electronically monitor any person they feel like, at anytime they want to," Barket said. Civil liberties advocates agree. "It makes my skin crawl. That's so shocking," said Barbara Bernstein, executive director of the Nassau chapter of the American Civil Liberties Union. "It's like having an invisible police officer sitting in the back seat of every car." However, Nassau prosecutors, hoping to use data from the GPS to make a case against Lacey, who has been charged with six burglaries, contend they didn't need a court order because the Eclipse was parked on a public road. A ruling by Judge Joseph C. Calabrese in Mineola is expected any day. Last September, the Washington state Supreme Court was the first in the nation to issue a ruling on law enforcement's use of GPS to investigate crimes. In a unanimous decision, the court ruled that a GPS tracking device is an intrusive method of surveillance and said law enforcement officials in that state must get a warrant before attaching one to a suspect's car. However, the court refused to overturn the murder conviction of the man who brought the appeal, saying Spokane County sheriff's deputies did get a valid warrant even though the deputies argued they did not need one. In February, a California judge in the Scott Peterson murder case ruled that prosecutors can use data gathered by GPS with a court order as evidence in Peterson's trial. On Long Island, Bernstein and Jared Feuer, executive director of the Suffolk chapter of the American Civil Liberties Union, said the practice of attaching GPS devices on peoples' cars without their knowledge raises a host of concerns. They said the device gives police the ability to track someone's every move -- to the doctor's office, political meetings and places of worship, among others. Currently, there is nothing to stop police from putting the GPS on anyone's car, Bernstein and Feuer said. "We live our lives under the constant threat of surveillance," Feuer said. The GPS system, a network of 24 satellites that hover above the Earth, is a navigational tool that allows users to determine their location anywhere, anytime, in any weather condition. The satellites transmit signals that can be detected by anyone with a GPS receiver. The technology was originally developed by the military to aid in navigation, but has since been used by the public, such as those installed in some cars. The Nassau County Probation Department has been using GPS technology to track high-risk probationers, such as sex offenders, by requiring them to wear electronic bracelets. Although the GPS tracking device has been used for investigations in the Nassau and Suffolk police departments, officials would not discuss the matter, refusing to even say how long it's been in use or how many GPS units the departments own. "The Suffolk County Police Department has access to that technology," said Suffolk Chief of Detectives Kenneth Rau, who would not confirm that police in that county are using GPS technology to investigate crimes. However, Philip Ro bilotto, former chief of the department, said they are. Det. Walter Burnes of the New York City Police Department said it has access to GPS technology and uses it to investigate crimes. But he would not discuss details. What little information there is about how the device is used by Nassau police came from testimony given at hearings in the Lacey case. According to a court transcript, police formed a task force to deal with about 25 unsolved burglaries with the same pattern that had occurred in Nassau's Third and Sixth Precincts, which cover most of the Town of North Hempstead. Witnesses told police they saw two men dressed in suits walking up to homes and knocking on doors. In some cases, witnesses said they saw a black car with a Tennessee tags in the area. In one case, a witness jotted down the plate number. Items stolen were mostly jewelry, police said, as well as cash and computer equipment. Det. Edward Goller of the Nassau Electronics Bureau testified at one of the hearings that on Aug. 21, 2002, at around 3 a.m., he went to Beach 61st Street in Far Rockaway, where Lacey's wife lived and where the Eclipse was parked. With a police lieutenant and a detective acting as lookouts, Goller attached a GPS device to the Eclipse, which belonged to Lacey's wife, who had lived in Tennessee. It took him about 6 minutes to complete the job, Goller said. The GPS device is the size of a pack of cigarettes andis powered by two battery packs, Goller testified. The unit, which is attached to the car by magnets, has three antennae. Police can tell where the car is in real time or where it has been by downloading the information from the GPS. The GPS is so precise that it not only gives the address of the car's location, it also gives the longitude and the latitude. According to Goller's testimony, the Nassau County Police Department owns six GPS units and has been using them for investigations for about 18 months. Goller said he and nine other detectives in his bureau are able to install the GPS, and he alone has installed 15 GPS devices for a variety of investigations. They can be retrieved in minutes. Michael Montesano, president of the Criminal Courts Bar Association of Nassau County, said he doesn't object to the police using GPS technology to investigate crimes, only that they should get a court order first. When a court issues an order allowing police to use a surveillance device, police have to give a reason and the court has to decide that it's sufficient. And a court order is good for a limited time. "The GPS," Montesano said, "has to withstand the same scrutiny as any other surveillance device." Copyright © 2004, Newsday, Inc. [Non-text portions of this message have been removed] 8527 From: Mitch D Date: Sat May 1, 2004 4:17am Subject: GPS LOcate The research posted was interesting,but looking at locating gps units placed on a vehicle,practically,consider keeping things simple. Typically a flashlight, along with a creeper and a floor jack w jackstands( we are safety minded) may be the best tools for locating a gps unit on a vehicle....... More in depth studies involve higher grade equipment and controlled test enviroments,as well as techniques. As another list member once quoted: "when you hear hoofbeats,think horses not zebras" and congrats to Ed Michaels on getting his "ticket" MD KB2YOD __________________________________ Do you Yahoo!? Win a $20,000 Career Makeover at Yahoo! HotJobs http://hotjobs.sweepstakes.yahoo.com/careermakeover 8528 From: Steve Whitehead Date: Sat May 1, 2004 8:48am Subject: Basic Course in Electronic Eavesdropping Countermeasures 05 - 16 July 2004 - South Africa The basic course, presented since 1998 is suitable for the individual who has no or little previous experience in technical surveillance countermeasures. The 90-hour course is presented over ten (10) working days. The course has been designed to allow prospective technical surveillance countermeasures practitioners to develop the necessary basic knowledge and skill to provide countermeasures consultation for their companies. The course is endorsed by CASA and recorded at the South African Qualifications Authority (SAQA). The course will introduce the attendee to the technical and real life status of current eavesdropping threats and ways to detect and counter them. Various phases of electronic countermeasures are covered and hands-on experience is acquired through the use of various manufacturers' equipment. An additional advantage is that attendees also get the opportunity to work, test and experiment with a variety of offensive equipment such as audio and video transmitters (analogue/digital/encrypted) at the training venue. At the completion of the course the attendee will be able to : Analyse electronic vulnerabilities in office and residential environments; Evaluate equipment performance; Be able to select and appoint outside technical surveillance countermeasures consultants; Perform electronic eavesdropping surveys (sweeps); Advise management/clients/customers regarding technical countermeasures policies/procedures. This is a unique course aimed at assisting companies to protect their information against electronic espionage and snooping. TSCM Services is one of a few institutions in the World offering this training and is known for their excellent courses and services. The company is recognised globally for it's innovation and commitment in the technical surveillance countermeasures training field. Many from the UK, Middle and Far East, Europe, Africa and South Africa have attended this course. You should attend this course if you are Responsible for the protection of information; Offering technical surveillance countermeasures services; Employ or sub-contract technical surveillance countermeasures service providers; Responsible for Risk or Loss Control functions in your company; Interested to learn more about this specialised field. You are welcome to contact us for additional information or a registration form. The final registration date is 18 June 2004. Seating is limited. Read more about the course by visiting 'Training' on our web pages at www.tscm.co.za We are also presenting an Advanced Course in technical surveillance countermeasures. TSCM Services Pretoria South Africa Phone: (012) 664-3157 International (002712) Fax: (012) 664-3180 Web site: http://www.tscm.co.za E-mail: info@t... -------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 8529 From: Hawkspirit Date: Sat May 1, 2004 3:19pm Subject: GPS Detection Have a look again at my original posting Wed, 28 Apr 2004 "Very good, you now have some feeling for the detection of processor noise; now take a guess about the technique to differentiate GPS processor noise from other processor noise and display strobe noise in a dashboard." Now I know you are an experienced TSCM practitioner, take a shot at some possible techniques, also the rest of you top guns let's hear your opinions. Roger Tolces www.bugsweeps.com Date: Fri, 30 Apr 2004 10:43:34 -0400 From: Shawn Hughes Subject: Re: GPS Roger, Thanks for the bone, but I'm having a little difficulty chewing on it...... Sure, it's a near field measurement, but if it's ALSO near the clock, stereo, ECM, PCM, ABS, or any of the other systems on a modern vehicle with an oscillator, how are you going to know which is which? Worse, if one of those has a similar clk freq as the GPS, the GPS could snuggle in behind the other items' signature. Having an attenuator and directional antennas would help, but are you saying you're gonna find a GPS reliably and repeatably based on the oscillator and harmonics alone? V/R, Shawn Shawn Hughes Tactical Response, Inc. USA [Non-text portions of this message have been removed] 8530 From: Steve Uhrig Date: Sat May 1, 2004 8:27pm Subject: Re: GPS Detection Once upon a midnight dreary, Hawkspirit pondered, weak and weary: > "Very good, you now have some feeling for the detection of processor > noise; now take a guess about the technique to differentiate GPS > processor noise from other processor noise and display strobe noise in > a dashboard." Tetra's effort is admirable. He's actually doing something rather than just talking about it. That's more than the majority of us can say. I see problems in the procedure myself, but remember back in WW2 a lot of DFing was done with the most crude equipment, little knowledge, a lot of patience and a lot of experimenting. Finding something by sniffing radiation from intermediate stages is an effective technique used at the highest levels. A possible approach at this point would be for Tetra to document his test setup fairly accurately, post his test results, and several of us try the same thing and see if we can reproduce the results. That will be the ultimate challenge. The stray RF from many other systems is indeed a factor. If something radiating from *any* GPS receiver is unique to where it can be quantified and fingerprinted, then there may well be possibilities. And, Tetra's work may be theoretically possible but not necessarily practical on the street. Can't say until others repeat his tests and report their results. I'm the ultimate cynic, but I commend Tetra for working in the field, trying to simulate real world conditions and reporting his results in the appropriate place. Everything starts somewhere. Each technique every one of us uses in our inspections was developed by someone. I'm very willing to listen to someone with foresight to realize a problem, identify a possible solution, and work on it until it's either proven or disproven as practical. With 1120 technically-minded members on this list, how many useful new techniques have been posted over the years? Not many. We just rehash the same old stuff or discuss why something won't work. Someone had the idea for a nonlin, and for other devices and techniques we've come to accept as standard. Tetra's doing it and I'm not, so regardless of the outcome, he has my respect. And regardless of the outcome, he's using and learning valuable skills and broadening his horizons. Can we all say that? Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8531 From: Lawrence Dillard Date: Sat May 1, 2004 9:35am Subject: Kidz Two little kids are in a hospital, lying on stretchers next to each other, outside the operating room. The first kid leans over and asks, "What are you in here for?" The second kid says, "I'm in here to get my tonsils out and I'm a little nervous." The first kid says, "You've got nothing to worry about. I had that done when I was four. They put you to sleep, and when you wake up they give you lots of Jell-O and ice cream. It's a breeze" The second kid then asks, "What are you here for?" The first kid says, "A Circumcision." And the second kid says, "Whoa, Good luck buddy, I had that done when I was born. Couldn't walk for a year. 8532 From: Thomas Shaddack Date: Sat May 1, 2004 9:33am Subject: Bullet Points A nice example that excrement occurs. (from the Furthermore section, www.wired.com, May 1, 2004) Bullet Points During a presentation in Florida, a hapless Drug Enforcement Administration agent inadvertently hammered home the importance of gun safety. The agent was lecturing 50 students and adults when he drew his ..40-caliber weapon and removed the magazine. The agent pulled back the slide and asked an audience member to confirm that the gun was not loaded, then pointed the pistol toward the floor, released the slide and -- woopsie! -- fired a shot into the top of his left thigh. "Everyone was pretty shaken up," said an audience member. "But the point of gun safety hit home. Unfortunately, the agent had to get shot. But after seeing that, my nephew doesn't want to have anything to do with guns." -- Jenny McKeel 8533 From: Date: Sat May 1, 2004 8:28am Subject: Re: Congrats to Ed Michaels KC2MWI Congratulations Ed. Start working on your General. Al Kelly KB3KNW [Non-text portions of this message have been removed] 8534 From: contranl Date: Sat May 1, 2004 7:38pm Subject: . Some responses to the last few "Gps-tracker-detector" postings starting with the last one: >>>>> "Typically a flashlight, along with a creeper and a floor jack w jackstands ( we are safety minded ) may be the best tools for locating a gps unit on a vehicle " <<<<< Shure.....But you still wo'nt see them if they are hidden inside the car or external enclosings.... there are lots of places to hide such a device and you will have to take the car apart ! Specially with the new and upcoming "indoor" gps trackers that do'nt need direct satellite sight anymore. To hide a tracker inside a car 2 things are needed: a) Access to the car b) Time to install it There are thousand ways to get access and time to install such a tracker,here's just a few that i can quickly imagine right now: 1) Let's say your wife wants to "track" you...she will have access and time 2) Someone else could get access and time by obtaining the carkeys or a copy of them and then wait for the right moment where he would be shure that you wont use the car for a few hours....while you are sleeping...while you are at the movies...when you are on hollidays... etc 3) A towing service might remove your car and bring it to a place where they would have all the time to install it...later you would get it back with a tracker installed...including some bla bla explaining why it was removed 4) It could be someone else his car that was temporareley "given" to you by your friendly friend 5) It could be a rental car 6) It could be a company car A "secret of the trade" is to obtain a similar car as the victim's car...that will give them all the time to find the best place to hide a tracker..."they" may even prepare a complete part with the unit already pre-installed........in the same colors ofcourse :) RESUMING : A pure and quick physical inspection is not enough ! ofcourse a complete 2 day dismanteling could do the job....do you enjoy removing the dashboard from a 150.000 US $ Mercedes ? or what about a 15 meters long truck ? They wont bring you a bicycle :) >>>> "clock, stereo, ECM, PCM, ABS, or any of the other systems on a modern vehicle with an oscillator, how are you going to know which is which? " <<<<< A good practice would be the way of "ELIMINATION" ... the step by step method of eliminating/disabling all "false" signals Ofcourse you will switch off all equipment in the car...that will eliminate most "false" signals. ...things that will still work are the clock and alarmsystems... they are easely eliminated. You may also disconnect the power leads to the car's battery.....that will disable all equipment ! except possibly battery-backupped alarmsystems....wich could be easely eliminated by finding it and disconnecting it. Ofcourse disconnecting the battery-powerleads might also disable a possible Gps-tracker that uses only the car's battery as a power supply....(in practice this is very rarely done with temporarely and covert trackers wich come most of the time with built-in batteries)... The above measures will help but are not really necessary...since "my method" uses the principle of scanning only the frequencies related to Gps-trackers...wich are the harmonics of 1,023 mhz..and some other "known frequencies"....that way chances of receiving other non "Gps-related" signals are practically very low...and if they coincidentally occur they can be easely eliminated/recognized My unit will work like this: It's a fast scanning receiver...controlled by a small computer with a little harddisk,it incorporates a touchscreen-display...all of this is contained in a small and very portable unit. On the display you will have a simple menu that guides you trough the "elimination-process" The Gps-tracker "search-menu" will show 20 vertical bars indicating the strengths of the 20 strongest(gps harmonic) signals It scans only gps-related signals (a few hundred)...and only in a certain frequency range...this already eliminates most false signals. and speeds up the process too By clicking on one of these bars you stop the scanning and you can listen to the signal... you may then locate it's origin while listening to it and observing it's fieldstrength (fieldstrength is also audible as tone-clicks)...once found you can disable the source by switching it off or remove it's power leads or fuse...if that is problematic you can "eliminate" the false signal by locking it out from the scanning process...it will then be replaced by the next strongest signal This process can be repeated untill all false signals are eliminated. What is left ...has a very high probabilty of being a Gps-tracker. A Gps related signal most of the time shows up as more then only one bar ( since there are more harmonics at different frequencies) chances of both being from a false source are very minimal A similar bahaviour (increase/decrease) of 2 or more bars while moving the antenna over some distance is another indication of it coming from the same (Gps) source There is a big horizontal bar too...(while scanning) this bar displays the sum of all 20 signals...its value is also audible as a tone ... This is useable as a very fast way of finding any sources of radiation (on the gps-related frequencies)....multiple signals coming from the same source will increase/decrease (enlarge) the sum- value very quickly...and therefore make the unit appear to be very sensitive. a single signal on only 1 frequency will not increase the sum-value that much i still have to test this feature and fine tune it... An attenuator comes in automatically when certain levels exceed a predifined value After some practice ...... just looking at the overall picture (the dynamic search screen with 20 moving bars ) and some screen clicks (eliminations...if any) will be enough to find your Gps-tracker. To complete things a cable is included that connects to the car's cigarettelighter or battery,to measure any harmonics that may exist on the positive or negative power leads To give you a rough idea of how such a "search screen" could look like have a look at: www.tetrascanner.com/gpssearchscreen.html Since the unit is microprocessor controlled and contains a fast scanning receiver (100 + channels /sec and a frequency range up tp 3000 mhz)...and also includes a 8~11 inch color touchscreen- display ....i could later easely add other functions such as: Custom harmonics scanner ( to find other receivers with known harmonics for example pagers) Videoscanner (to detect and see video-transmissions) Gsm/CDMA detector (to detect cellphone bugs and devices) Scanning rf spectrum analyzer (oscor 5000 style but better) Longtime audio recorder (1000 hours ++) Longtime videorecorder with motionsensor (100 hours ++), Wlan/Wifi-/Bluetoooth-scanner Radiocommunications receiver/scanner with full features such as spectrumdisplay 16 band equaliser.diversity reception and so on...anything that could be done with a receiver and computer most functions would only need a software update >>>> "what happens to these signals when you raise the noise floor? As in a typical sweep, in an urban area. In a typical installation? <<<< Before i went to the beach...i have done other tests in my backgarden...my backgarden is very small...it's located in the center of AMSTERDAM and surrounded by hundreds of other peoples houses with computers...tv-sets...wireless phones...there are 5 cellphone-masts within 300 meters distance...each of them transmitting at least 5 rf freqencies at 50 watts ERP..... and so on...i did place both gps-units in the CLOSED...METAL trunk of my car and.....i had no problem receiving the harmonics from both units at a few meters distance ! i was not "tricked" by interference wich was either not present on the harmonic frequencies or easy recognisable as interference >>>>> "then take readings 360 degrees around the vehicle, and in several arcs from the horizontal to the vertical plane" <<<<<< I have done all test using a simple (not tuned to frequency) standard telescopic antenna about 45 cm long...that length would make it best for 150~170 mhz...allthough it was not very critical at all even at higher frequencies the rule was the longer the better I have walked around the car...the full 380 degrees (when i was on the beach i noticed that highest reception levels occured when the antenna was kept in the same direction as the largest part of the tracker (in this case the antenna wire)....nothing special but basic polarisation effect By keeping the antenna horizontal and slowly making a 380 degree turn i was able to determine the direction from the signal...nothing special either and basic directional effect With the units in the car's trunk you get a fairly unpredictable pattern....at a distance ! when close to the car you will notice a signal increase when approaching the trunk. Touching the front of the car with the antenna ( painted parts ! ) gave a sudden increase of one of the strongest signals...it also made an other harmonic appear that i could'nt hear from a distance. All nothing new here and common knowledge >>>> "you might be surprised.....even your receiver may have a similar set of harmonics ( scanner people call them 'birdies' <<<<< Birdies ??? you are kidding me ! (there where lots of them at the beach...big and white...some of them where very noisy.......fighting over some pieces of bread that i threw at them :) Just joking there...do'nt worry i know "birdies" and "birdies" knows me ! i am a licensed radioamateur for 32 years know i have posessed half the scanners ever made...starting with "midland" 4 channel handhelds...then the "revolutionairy" "Optoscanner' wich you had to program with plastic "punchhole-cards"...i quickly discovered that you could make these from carton as well...i probably sold a 10.000 carton cards ! ( by the way that was a real "birdies" scanner compared to that Alfred Hitchcock was nothing) Later i even owned a scannershop !...then i went on to the surveillance business (1983) I still repair them...i modify them...from some of the later models i even know the birdie-frequencies off head !!!...you could call me the "Bill Cheek" of Europe BIRDIES ????? ......this whole subject is about birdies ! (unwanted spurious rf interference caused by mixing,oscillation and distortion of radiosignals ) --------------------------------------------- Some more observations on Gps trackers: In general they consist of minimal 2 boards 1: The gps receiver-board wich does the receiving and calculating of the position 2: The controller-board wich handles all other tasks like: vibration-detection,battery management ,storing and uploading the data,geofencing....etc The Gps receivers have there own crystal controlled processor The processor board also has it's own crystal controlled processor So a Gps-tracker radiates 2 (different) sets of harmonics...caused by the 2 different oscillators ! Usually the radiation from the controllerboard is even more stronger then that from the gps-receiver...simply because...the sizes of the pcb tracks are bigger ...and the oscillators have higher power levels. A gps receiver baord inside a tracker is usually not manufactured by the gps-tracker manafacturer himself...they use ready available gps (OEM) receiver-boards (modules)....so they purchase these somewhere else The manufacturers of these gps-receiver boards use so called chipsets (1 or 2 integrated circuits)wich they in turn purchase from chipsets manufacturers Making a chip for gps processing is not something that everybody does..it is limited to a few manufacturers...you can count them on 1 pair of hands !!!!! Looking at the specs of these chipsets will leave you with only a few oscillator-frequencies wich are used in ALL gps receivers ...these frequencies are choosen carefully to interface easely with data-rates in the Gps processing Have a look at this page from a crystal manufacturer ( biggest one that specializes in gps crystals) you will see a nice list with frequencies...and who uses them ! (The url's are shortened to make them fit here) gps crystal frequencies: http://tinyurl.com/2nh47 and from the same manufacturer the TXCO's (wich have better stability and therefore suitable for the newer "Indoor" trackers wich obviously need that http://tinyurl.com/3f4zd Nice is'nt it ? ......have a good look at the frequencies and do some comparings and calculations you may look at more Gps crystal manufacturers...and find out that they produce the same frequencies That's it for now...more "secrets" when it's ready.... I am happy to get some responses...wich is a better then the "absolutly impossible" from a few months ago, Allthough it takes some effort to convince some of you but that is ok...it forces me to formulate and consider all aspects of the issue. I am off now designing my gps-tracker-detector and trying to get some financing for the project. Thanks and Greetings Tetrascanner www.tetrascanner.com 8535 From: peter eglemont Date: Sat May 1, 2004 5:47pm Subject: SEA SpyFinder Over on; http://www.tentacle.franken.de/papers/hiddencams.pdf which deals with finding hidden cameras, there is mention (page 26) of a device called SpyFinder by SEA Inc, which lives on the interweb at; http://store.yahoo.com/shop-seatech/spyfinder.html and is also to be mentioned on 3/May/2004's episode of CSI: Miami, according to; http://www.seabase.com/page.asp?PageId=130 Roessler's paper guesses that the device works by detecting curved glass objects, which includes camera lenses. The device is said to work even if the camera is inoperative. According to SEA pages there is a patent pending for its technology. The current device has a price tag of $2,300. So, list: have you tried this device or seen it demonstrated, and does it work? What is the technology/method employed? Would it work against cases where for example the lens is separated from the camera itself, eg optical fiber type "http://www.fiberspy.com" devices, which are claimed to be otherwise undetectable by their manufacturer? From: Steve Uhrig Date: Sat May 1, 2004 10:51pm Subject: Re: SEA SpyFinder Once upon a midnight dreary, peter eglemont pondered, weak and weary: > So, list: have you tried this device or seen it demonstrated, and does > it work? What is the technology/method employed? Check the archives for this list. The device has been around for years and has been reviewed and discussed here. Basically it works by the image sensor in a camera being a retroreflector, meaning it reflects light back at whatever angle it arrived, I believe. I am repeating the words of a knowledgeable gentleman in the profession without understanding what they mean, and it's been several years ago. I am not certain this info is completely correct. In controlled demonstrations the thing appeared to work well. Surprised me. A different experienced gentleman than the one in the above paragraph reports it works poorly in the field and has some weaknesses which may render it less than totally reliable. SEA has been claiming for years they would make a substantially cheaper version of the thing, but that has not occurred. They had a website for some time announcing the identical product in a consumer version, but it has been closed for some time. I don't know if the expensive one is still in production. Some resellers may have bought one piece and are still advertising it trying to sell it. The piece contains two lasers. One is steady and one is blinking. You paint the walls and ceiling of the area being inspected from across the room, and theoretically a camera will be seen by your eye seeing a reflection of the blinking red light. In the demo in which I participated it did exactly this, in normal light, from the far end of a decent sized classroom, on several unpowered cameras the instructor had placed in the front of the room. I've never used the thing in the field, though, but several others have and report mixed results. Check the archives. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8537 From: Steve Uhrig Date: Sat May 1, 2004 10:54pm Subject: Re: Congrats to Ed Michaels KC2MWI Once upon a midnight dreary, Amcorinternational@C... pondered, weak and weary: > Congratulations Ed. Start working on your General. Start working on your Extra, Al! According to a thread on www.qrz.com, one can start from zero and walk away with a license in six hours. Things have changed. Steve WA3SWS ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8538 From: kondrak Date: Sun May 2, 2004 5:04am Subject: Re: Bullet Points Indeed!! I can say I've been around firearms for a LONG, LONG time, and what grandpappy taught me, and I teach each and every kid I instruct (and many adults as well) is EVERY gun is loaded until YOU determine its unloaded and safe. Point in demonstration: A good friend,(who will remain nameless) a police officer at the time, an ex-Army-ranger armorer walked into his computer room, where me, his wife and daughter were at the time. He says to me, "Hey, got a new .45, have a look", he proceeds to remove his sidearm from its holster, removes the clip, and hands it to me. Instinctively, I take the arm, point it in a safe direction, (at the floor away from everyone in the room) rack the slide, and a round ejects. I of course rack it again, to make sure, and put it on slide open lock. Breathless... I look at him, and mention something about that's NOT what you were trained to do it, was it? His sheepish response was, OH, I knew you were going to do that anyway.... BLATT! WRONG ANSWER! STEAM PRESSURE RISING.... You DID NOT, nor SHOULD of assumed that. What's the first thing I would want to do with a NEW sidearm? Test the trigger feel...of course. NOT a proper gun handling move was it old buddy? He had NO reason to expect I would do the right thing, those are NOT things one "assumes" under ANY circumstances. Of course, I would of never pointed it anywhere near anyone when I DID try the trigger pull, but that's NOT a valid assumption to make. I DO NOT assume that, under ANY circumstances. No way, I thought that showed incompetent disrespect for his family at the VERY least, and I read him the riot act in private over it. Of course, he agreed. Just goes to show, even those that SHOULD know, have been trained to know, make mistakes....lets not let it happen to any of us. It's said there are only two types of people who handle guns, those that have had an AD (Accidental discharge) and those who haven't had one yet. I know one person, whom I sincerely respect, who's a NRA instructor, who had one, (fortunately in a safely pointed direction) who seriously considered turning in his instructors credentials because he was so personally upset over the incident. I asked him if he learned anything, he said of course. I told him he needs to continue, if for no other reason than to tell others of the situation, and hopefully prevent them from having a similar incident. His measure of embarrassment might save someone from doing likewise. THAT was his job as an instructor. Me? Yes, I've had one, a long time ago when I was a teen. My training was to always point the muzzle in a safe direction, and except for the embarrassment of doing it, and some hearing trauma from the rifle discharging without ear protection, it was not near anyone, and did no damage other than to my own psyche. I always remember it, I never will forget it, and I remember my own personal feeling of failure at neglecting the most basic of the rules. No one saw me do it, I endangered no one or anything, the round did no more than kick up some dirt, when I thought the gun was unloaded...but I still consider it a most grievous of personal violations of my own rules and training. I can tell you undoubtedly it led to some serious introspection and review. I readily share it with the hope no one else will ever do it. I've also never even come close to having another ever since. It also probably led to my hard-ass view on gun safety I still have today. We who handle firearms have to take it deadly f*CKING seriously.....no exceptions! NO accidents! That's all "I" have to say on the subject...I sympathize with that DEA agent, I hate to hear anyone accidently shoots anyone, including himself, but bottom line IS, he didn't follow the rulez! Shame on him. His embarrassment will be the least of the lessons he learned that day. IT CAN happen to anyone. Job #1 is safety. No if's, and's or but's....I don't want to be around anyone handling a firearm who doesn't feel that way, training and attitude...Period! Now lets be careful out there... Point taken.... At 10:33 5/1/2004, you wrote: >A nice example that excrement occurs. >(from the Furthermore section, www.wired.com, May 1, 2004) > > >Bullet Points > >During a presentation in Florida, a hapless Drug Enforcement >Administration agent inadvertently hammered home the importance of gun >safety. The agent was lecturing 50 students and adults when he drew his >..40-caliber weapon and removed the magazine. The agent pulled back the >slide and asked an audience member to confirm that the gun was not loaded, >then pointed the pistol toward the floor, released the slide and -- >woopsie! -- fired a shot into the top of his left thigh. "Everyone was >pretty shaken up," said an audience member. "But the point of gun safety >hit home. Unfortunately, the agent had to get shot. But after seeing that, >my nephew doesn't want to have anything to do with guns." > > -- Jenny McKeel > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 8539 From: Hawkspirit Date: Sun May 2, 2004 11:12am Subject: GPS DEtection, a few more hints I am going to give a few more hints on this. The technique to find GPS units that I have been using for the past two years that I am asking you to guess uses off the self test equipment. Keep in mind that if the GPS unit is not programmed for real time tracking reporting and most are not for battery consumption reasons, that it may only report in using the cell bands once a day reporting the days data in a burst transmission. So it would be unlikely you will be scanning/sweeping the moment it sends a 30 second transmission. So we are not looking for the devices intended RF transmission communication. We are only looking for processor noise. Now most dash instruments that are non digital, meters that rotate like a conventional clock don't put out any processor or display strobe noise so it is real easy. The ones with digital displays and digital clocks are the problem. The cars on board computer can also be a problem but the location on that can be determined from the service manual. Pulling the battery lead is the way to go on eliminating all other localized interference and finding a battery powered GPS easily. But we are talking about finding the one powered by the cars battery that will power down on a battery disconnect. Also when you are sweeping for these units you must have an associate rock the car every five minutes so that the GPS motion sensor is keeping the unit in operation and not sleep mode. Once again the question: "Very good, you now have some feeling for the detection of processor noise; now take a guess about the technique to differentiate GPS processor noise from other processor noise and display strobe noise in a dashboard." Roger Tolces www.bugsweeps.com "contranl" contranl@y... Said: "The above measures will help but are not really necessary...since "my method" uses the principle of scanning only the frequencies related to Gps-trackers...wich are the harmonics of 1,023 mhz..and some other "known frequencies"....that way chances of receiving other non "Gps-related" signals are practically very low...and if they coincidentally occur they can be easely eliminated/recognized" [Non-text portions of this message have been removed] 8540 From: Rob Muessel Date: Sun May 2, 2004 11:29am Subject: RE: Basic Course in Electronic Eavesdropping Countermeasures If anyone is considering training, look into the courses these guys offer. The course content and practical exercises are quite good. The range of equipment they provide for classroom use is second to none: major products from every manufacturer are on hand. I'm writing this with a bit of experience- I've known Steve Whitehead for many years and Lorenzo Lombard, his business partner, for about 14, and I lucky enough to assist in teaching their advanced training courses. I'm always pleasantly surprised when I have students who have attended TSCM Services' basic course. They actually have a clue as to what they're doing. The 4-5 day courses offered by a couple of companies in the states aren't long enough, if they are even held as scheduled. There just isn't enough time to cover the technology and to provide enough hands-on equipment usage to become proficient. I have taught in this field for over close to 20 years, so I'm writing from experience. Training from major manufacturers is good, if you have some grounding in theory and want to have practical knob turning instruction on specific products, but at present in the US, there really isn't a good place to receive a good grounding. For theory and all-round practical applications, these guys are the best bet. The training facility is very nice, the instructors are dedicated, and the country is a great place to visit. It's a long way to travel, but if you look at the cost, it's the best deal on the planet. -- -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 www.tscmtech.com USA -----Original Message----- From: Steve Whitehead [mailto:sceptre@m...] Sent: Saturday, May 01, 2004 9:49 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Basic Course in Electronic Eavesdropping Countermeasures 05 - 16 July 2004 - South Africa The basic course, presented since 1998 is suitable for the individual who has no or little previous experience in technical surveillance countermeasures. The 90-hour course is presented over ten (10) working days. The course has been designed to allow prospective technical surveillance countermeasures practitioners to develop the necessary basic knowledge and skill to provide countermeasures consultation for their companies. The course is endorsed by CASA and recorded at the South African Qualifications Authority (SAQA). The course will introduce the attendee to the technical and real life status of current eavesdropping threats and ways to detect and counter them. Various phases of electronic countermeasures are covered and hands-on experience is acquired through the use of various manufacturers' equipment. An additional advantage is that attendees also get the opportunity to work, test and experiment with a variety of offensive equipment such as audio and video transmitters (analogue/digital/encrypted) at the training venue. At the completion of the course the attendee will be able to : Analyse electronic vulnerabilities in office and residential environments; Evaluate equipment performance; Be able to select and appoint outside technical surveillance countermeasures consultants; Perform electronic eavesdropping surveys (sweeps); Advise management/clients/customers regarding technical countermeasures policies/procedures. This is a unique course aimed at assisting companies to protect their information against electronic espionage and snooping. TSCM Services is one of a few institutions in the World offering this training and is known for their excellent courses and services. The company is recognised globally for it's innovation and commitment in the technical surveillance countermeasures training field. Many from the UK, Middle and Far East, Europe, Africa and South Africa have attended this course. You should attend this course if you are Responsible for the protection of information; Offering technical surveillance countermeasures services; Employ or sub-contract technical surveillance countermeasures service providers; Responsible for Risk or Loss Control functions in your company; Interested to learn more about this specialised field. You are welcome to contact us for additional information or a registration form. The final registration date is 18 June 2004. Seating is limited. Read more about the course by visiting 'Training' on our web pages at www.tscm.co.za We are also presenting an Advanced Course in technical surveillance countermeasures. TSCM Services Pretoria South Africa Phone: (012) 664-3157 International (002712) Fax: (012) 664-3180 Web site: http://www.tscm.co.za E-mail: info@t... -------------------------------------------------------------------------- ------ [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 8541 From: James M. Atkinson Date: Sun May 2, 2004 5:13pm Subject: An Offer You Can't Refuse This is a really excellent article, and it holds several lessons on how NOT to perform a bug sweep. -jma ------------------------------------------------------------------------------------- washingtonpost.com An Offer You Can't Refuse Nice little computer you got there, heh heh By Gene Weingarten Sunday, May 2, 2004; Page W19 I was working at home on my computer the other day when a pop-up ad commandeered my screen. "ARE YOU BEING BOTHERED BY POP-UP ADS?" it asked, offering to sell me a product to solve this problem. The day before, I'd gotten a similar screen-immobilizing message, inside a giant, scary exclamation point. This one warned me that it had detected an alarming infestation of spyware on my computer. Spyware is a gremlin, unleashed by Internet marketers, that lurks inside your computer and reports back pertinent facts about you. What kind of pertinent facts? Say, the fact that you have an alarming infestation of spyware and might need to buy . . . protection. These messages made me feel like some grocer on the South Side of Chicago, circa 1928 -- as if a man in a fedora and a shiny suit had just walked in, picked up a jar of pickles and accidentally dropped it on the floor to get my attention, saying: "Nice little place you got here. It sure would be a shame if something happened to it." I liked typing that last line. When you talk like a gangster -- in the conditional mood, filled with equivocation and supposition -- they can't pin nothing on you. For example, supposing I wanted to suggest that there is a vast computer-industry protection racket operating right under our noses? No one could sue me for libel, see, on account of I'm just supposing. So, did you ever wonder why no one ever catches most of the people who are said to be responsible for computer viruses that have caused billions of dollars of damage to our economy -- and birthed a lucrative virus protection industry? The thing I am supposing is: What if the reason that these virus makers are seldom caught is that they are not, as we are led to believe, pimply 17-year-old teenagers from dysfunctional families who are motivated solely by boredom and malice? What if it is, you know, a more organized crime than that, with more understandable motives? Can it possibly be that there exists some unholy nexus between the people who are filling our computers with bad stuff, and the people whose business depends on our staying afraid of the bad stuff? Maybe not. I confess there is a lot about the Web that I do not understand, such as why spammers think anyone will click on an e-mail with a subject line like "0i0!9u5*elbow08jrg." ("Better open this one fast! It sounds like my cute neighbor Phoebe is hitting on me, utilizing encrypted alphanumeric ciphers!") Still, one wonders about how a company can stay in business if its long-term goal, its sworn duty, is to gradually eliminate the need for itself. Many years ago, when I was but a lad, I saw my first cockroach in the kitchen. I alerted my parents, who were horrified. It was their first cockroach, too. It had probably crawled from a supermarket bag. The prudent thing for my parents to do would have been to wait until they saw a second cockroach. But initial cockroach sightings are traumatic events in New York, and my parents did what any normal half-crazed lunatics would have done: They immediately called an exterminator. The exterminator arrived promptly, did his thing, and left. For about a month afterward we were fine, and then, suddenly, our house was overrun with cockroaches. We had to call the exterminator again, and pretty soon we had him on a monthly retainer. It was not until years later that I did some research: Cockroach eggs take a month to hatch. It is possible to leave eggs behind after you exterminate. It wasn't a completely unheard-of practice, in the industry. Anyway, I am writing this on a laptop. My main computer is currently being euthanized -- its memory completely erased -- because of an interlocking network of viruses and spyware that had slowed its mental processes so profoundly that the computer appeared to be operating on quaaludes. (True fact: It took 24 seconds between "Welcome" and "You've Got Mail.") I know there is free software to seek and destroy spyware, and I have friends who have used it effectively. But I also know that the single thing that viruses and spyware are most often attached to is . . . downloaded free software. Spammed if you do, and spammed if you don't. Gene Weingarten's e-mail address is weingarten@w.... Chat with him online Tuesdays at noon at www.washingtonpost.com. © 2004 The Washington Post Company ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8542 From: Eric Leonard Date: Sun May 2, 2004 0:53pm Subject: FISA Okays More Black Bag Jobs From the L.A. Times... -EL Covert Searches Are Increasing Under Patriot Act Civil liberties groups see a dangerous trend, but the Justice Department says added surveillance shows improvements in fighting terrorism. By Richard Schmitt Times Staff Writer May 2, 2004 WASHINGTON ≠ Underscoring changes in domestic surveillance allowed under the Patriot Act, the Justice Department said in a report released today that it had conducted hundreds more secret searches around the country last year. The department said the use of covert search powers, which were enhanced under the Patriot Act, showed how federal investigators had stepped up the war against terrorism in the United States over the last 32 months. But civil liberties groups expressed concern over the increase because the targets of the searches were given fewer legal protections than suspects in normal criminal cases. The process of obtaining approval and executing the searches and surveillance is also shrouded in secrecy. In an annual report to Congress, the Justice Department said it obtained approval to conduct electronic surveillance and physical searches in more than 1,700 intelligence cases last year. According to the department, the number of searches had surged 85% in the last two years; about 1,200 searches were authorized in 2002, and 900 in 2001. The report did not identify or discuss specific cases. U.S. Atty. Gen. John Ashcroft said in a statement that the data illustrated how the Justice Department and the FBI were "acting judiciously and moving aggressively" to uncover and prevent terrorist attacks. "These court-approved surveillance and search orders are vital to keeping America safe from terror," Ashcroft asserted. The burst of activity was a direct result of the easing of standards for intelligence-gathering that was authorized by the Patriot Act, the terrorism-fighting law enacted by Congress six weeks after the attacks on the Pentagon and World Trade Center. Under the new law, the government can obtain secret warrants by showing that a significant purpose of the search has to do with intelligence-gathering, as opposed to a criminal investigation. Before the change, the law was interpreted as requiring the government to show that intelligence-gathering was the primary reason for the request. Many experts think the old rules were too restrictive, and unduly impeded the hunt for potential terrorists. The new procedures were upheld in court in November 2002. The search applications are reviewed by a federal tribunal known as the Foreign Intelligence Surveillance Court. The court was set up in the mid-1970s as a check on government power amid revelations of massive illegal spying on political dissidents and other citizens by the FBI. But the court, which conducts secret proceedings, has become a lightning rod for civil liberties concerns in the post-Sept. 11 era as the number of surveillance applications and the volume of the court's work has rapidly grown. A major fear is that investigators are using the so-called FISA procedures to bypass the stricter requirements that cover the issuance of search warrants in criminal cases, in which the government must show probable cause that a crime was committed. The concern is that the process is enabling the government to chip away at protections afforded defendants under the 4th Amendment prohibition against illegal searches. Information gleaned from the intelligence searches can later be used in criminal prosecutions, but defendants in such proceedings have fewer rights to attack the basis of the searches or to obtain intercepted information. Moreover, if the intelligence searches do not lead to criminal prosecutions, the targets are never told that they were under surveillance; in criminal cases, suspects must receive notice of any surveillance even if they are never charged. "The real mistakes never come to light" in intelligence cases, said James X. Dempsey, executive director of the Center for Democracy & Technology, a Washington think tank. He said he was concerned that "an increasing number [of the FISA cases] are likely to end up in criminal prosecutions." "I am troubled by the secrecy." Dempsey said. "There is no way to know whether the pendulum has swung too far." Adding to the concern is the fact that the number of intelligence searches in recent years has come to rival and possibly exceed the number of searches in criminal cases, as the government has marshaled federal resources against fighting terrorism instead of other crimes. According to the Administrative Office of the U.S. Courts, federal and state courts authorized the use of wiretaps and other electronic surveillance in about 1,400 cases last year, compared with the 1,700 FISA warrants, which also cover physical searches. "They are shifting the government apparatus for surveillance to a much more secret process with much less judicial oversight," said Timothy Edgar, legislative counsel for the American Civil Liberties Union in Washington. By classifying cases as intelligence cases, he said, "they are doing an end run around the 4th Amendment." 8543 From: contranl Date: Sun May 2, 2004 3:43pm Subject: Gps tracker detection . Hi Roger, Most of your comments i have already replied to in my previous message wich i did forget to give a subject name (no subject) >>>> " Off the shelf equipment " <<<< If you are referring to a: WIDEBAND (AM) DETECTOR .....not sensitive enough !...and overloaded by other (false) signals coming from outside sources and inside sources ! not able to distinguish between signals..taped to a Garmin gps nothing ! Not usable ! SPECTRUM ANALYZER .....expensive....will show (to) many other signals.....has no lockout facilties......you can't tell it to only show "Gps related signals" (harmonics)...no total value indication of only "gps related signals"....not maximised for 30~300 mhz....can't do any software tricks to improve detection... You could say " but it's realtime....my unit is practically realtime also: scanning speed is 100 channels per second...wich is 0,2 second for the 20 channels..wich is a screen refresh-rate of 5 per second...that is realtime enough. Not purpose made so will always be more slow and clumsy to work with A spectrum analyzer is not an easy piece of equipment and only useable by top professionals Purpose made "Gps-tracker-detector: much better ! Now i have to think very deep to come up with some other equipment that you could use......................................... ...................zzzzzz.................................. .....................................zzzzzz................ ...zzzzz................................................... NEARFIELD RECEIVERS ? (like the Optoelectronics/ Aseco sweepers) nothing...Garmin Gps and a nearfield receiver taped together....nothing ! AUDIOTEL-SIGNET ? It's a Am wideband detector same as above Garmin Gps and Signet receiver taped together !....nothing ! FREQUENCY COUNTERS ? Useless SCANLOCK ?...DATONG ?....bugdetection receivers Not sensitive enough...no exact frequency indications...there fore cant lock out false sigs...audiofeedback is useless good equipment i guess but not purpose made OSCOR 5000 ? Same as spectrumanalyzer NLJ / BROOM ? useless ! metal allover the place METALDETECTOR ?.....INFRARED DETECTOR ? useless ! Maybe i am forgetting some equipment...there are probably a few more very expensive highquality pieces around with super specs...but a purpose made "Gps-tracker-detector" will always be BETTER... MORE SENSITIVE... EASIER TO WORK WITH... FASTER... CHEAPER... etc provided it is designed good ofcourse You can't swim as good as a fish.... you can do a million things that a fish ca'nt do but swimming you will always loose ! >>>> "So it would be unlikely you will be scanning/sweeping the moment it sends a 30 second transmission." <<<<< >>>>>" So we are not looking for the devices intended RF transmission communication" <<<< Right so lets not mention that anymore to avoid confusion The way the data is stored or uploaded is not relevant. Whe are looking for the processor noise coming from the gps-receiver- board + the processor noise coming from the controller board... (those controllerboard frequencies will be added when they are known ...thy are not neccesary but if known could be helpful...you can add them yourself or from a list that i will keep uptodate) >>>>> " The ones with digital displays and digital clocks are the problem" <<<<< Not that much since the chances of them being on one or more "Gps- related" harmonics are very small...the displays in a car are off when the car is switched off correct ? As said eliminating them would be easy...you only need to know that a certain frequency is coming from a certain device ...then you either switch it off....disconnect it....or lock it out from the scanning process....again chances are very low that they are exactly on one of the "Gps-related frequencies".... and even lower on more then one "Gps-related frequency" Real covert units most of the time have there own batteries...from my findings wich are: i have seen a few....i have found a few.... i have even seen some top-trackers with an estimated value of over 8000 US $ they had there own batteries too. most units that are wired to the electrical systems are not intended to be "covert" Trackers connected to the battery would most likely be the ones installed in rental or company cars or trucks,Since these are wired to the cars electrical system they will probably radiate more harmonics at much higher levels..Any idea of the total length of electrical wires in a modern car ?.....must be more then a mile !...all at different lenghts so the will nicely radiate at various different frequencies......these wires are all over the car...they run from left to right ....and from the front to the back.... such a tracker is probably much easier to detect ...wich is exactly a good reason to not connect a covert tracker to the battery. A included cable that can be plugged in the cigarette lighter or connected to the battery will improve detection even more... (SPECIALLY of those that run of the car's battery...the tracker and detector would be practically directly connected ! almost a ideal situation !) again a good covert tracker runs of it's own batteries I have seen very professional trackers with all features including power-consuming gsm/cellphone-modules...the still ran from there own batteries....and believe me they were not placed by husbands to track there cheating wives cigarette-lighter -cable is capacatively coupled to the antenna- input of the "Gps-tracker-detector"....similar to detecting devices that are connected to the mains wiring in a house. >>>> " Also when you are sweeping for these units you must have an associate rock the car every five minutes so that the GPS motion sensor is keeping the unit in operation and not sleep mode" <<<<<< Correct....such a sleepmode-activation will probably have a time out of at least a few minutes since you are working in and around the car...you wo'nt need anyone else to do that for you since you self would make enough vibrations to keep the unit awake If you want to be absolutly shure...you could kick the car every 2 minutes or hit it with your hand a small "knock" at the body where you happen to be at that moment would be enough...if you are still to lazy to do that...i could make a small box the size of a cigarette-pack with a little speaker....that will produce some audio similar to "knocks' or "engine running" kind of sounds.....i could even incooperate that in my Gps-tracker detector I know that the noises needed to wake up a Gps-tracker are minimal...for example a "protrak-scout" will wake up when somebody enters or leaves a car wich is parked next to the car with the tracker on it.... This is no problem at all...almost not worth to mention it...but you are right it is necessary. Now i have some questions: What would be a good antenna design for my "Gps-tracker-detector ? It should : 1) Be small as possible (for comfortable working...and being able to reach every spot) 2) Maximum effiencency (gain) between 30 and 300 mhz 3) Be omniderectional and directional at the same time 4) Do various kinds of polarisation ? I know a thousand types of antennas...and i could come up with some fancy " phased array circular polarised patch panel logperiodic " kind of antenna but i have the feeling that a simple retractable telescope would be fine...since you can hold that in all directions...and change it's length easely ...it can also reach every spot...it's also easely transported inside a compartment in the housing...it's low cost to...and easely replacable A filtered amplifier (max 10dB's ?) at the antenna will increase wanted signal levels and attenuate any out of band signals...on the other hand it could introduce fake signals caused by (inband) overloading...so i am not shure about that yet...maybe just a filter (30~300 mhz) will be fine So: what antenna ? amplifier yes or no ? Greetings Tetrascanner www.tetrascanner.com 8544 From: James M. Atkinson Date: Sun May 2, 2004 6:18pm Subject: City goes bug happy New York Daily News - http://www.nydailynews.com City goes bug happy By GREG B. SMITH DAILY NEWS STAFF WRITER Sunday, May 2nd, 2004 Welcome to Bug City. New York City's cell phones, pagers, landlines and even computers were wiretapped by investigators more than in any other city in the country last year, new statistics show. And it's not the FBI doing most of the listening. Local law enforcement agencies are leading the pack when it comes to getting a judge's okay to tap into New York's private chatter. Last year, judges approved 246 wiretap orders - covering thousands of people - for New York City law enforcement, compared with 118 in Los Angeles, seven in Miami, five in Chicago and 117 in the entire state of New Jersey. Almost all the locally sought wiretaps were part of drug probes. "Without the wiretap, we would not be able to apprehend those at the upper levels of narcotics trafficking organizations," said Bridget Brennan, the city's special narcotics prosecutor, whose power allows her to probe across borough lines. Queens was the most-bugged borough, with 5,808 people tapped by District Attorney Richard Brown in 2003. Brown called wiretaps a "critical weapon in the war on crime" that "allows us to infiltrate sophisticated criminal organizations whose members might otherwise escape prosecution." Staten Island was bug-free, with former District Attorney William Murphy using not a single wiretap in 2003. That's according to statistics released Friday by the Administrative Office of U.S. Courts, which tracks eavesdropping by federal, state and local law enforcement. Local detectives have plenty of company. Statewide, New York leads the nation in authorized wiretaps, with 328 orders approved for state and local investigators last year, including the 246 in New York City. That was far more than in California (188), New Jersey (117) or anywhere else. In fact, 22 states, from Maine to Hawaii, reported no wiretaps at all in 2003, statistics showed. Nationally, the use of wiretaps increased 6% last year, with 1,442 secret interceptions given the thumbs-up by judges for all law enforcement agencies. The jump was due mostly to a rise in eavesdropping by federal prosecutors going after narcotics, money laundering and organized crime. Federal investigators got approval for 90 wiretap orders in New York City, Long Island and northern suburbs in 2003. The numbers do not include 1,700 ultra-secret terrorist wiretaps obtained under the Foreign Intelligence Surveillance Act, officials said. Eavesdropping isn't cheap. The Queens district attorney spent $1.2 million on wiretaps, just a bit more than the $1.1 million spent by the special narcotics prosecutor. But nobody across the nation spent as much as the New York State Organized Crime Task Force, which investigates Mafia and drug cases statewide. Last year, the task force spent $7.4 million to tap the chatter of 21,852 people, more than the No. 2 spender, Los Angeles, which spent $4.8 million to bug 16,536 people, records show. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8545 From: James M. Atkinson Date: Sun May 2, 2004 6:26pm Subject: Spy game secrecy increasing Spy game secrecy increasing Report shows record warrants in 2003 By SHANNON MCCAFFREY KNIGHT RIDDER NEWSPAPERS WASHINGTON - The government's use of secret surveillance warrants to track spies and terrorists surged to a record high in 2003, surpassing for the first time the number of wiretaps sought by law enforcement in traditional criminal cases. The new figures released Saturday show the extent to which the Justice Department and the FBI have shifted their focus to battling terrorism in the wake of the Sept. 11 attacks and, in the process, turned to the nation's secret "spy court" for legal permission to do so. "There's been a fundamental change in the way the government conducts surveillance," said David Sobel, general counsel for the Electronic Privacy Information Center. "And the result is a lot more secrecy and lot less accountability." Federal agents sought 1,727 warrants from the Foreign Intelligence Surveillance Court for electronic eavesdropping and physical searches last year, according to a Justice Department filing with Congress. Just four applications were rejected, although two of them were later revised and approved. The number of so-called FISA warrants jumped by 500 from 2002 and has almost doubled since 2001 when 934 applications were approved. By comparison, there were 1,442 wiretap petitions in federal and state courts for crimes such as drugs and racketeering, according to a separate report from the Administrative Office of U.S. Courts. Attorney General John Ashcroft said the new FISA figures show the Justice Department "is deploying its legal resources to uncover and prevent terrorist attacks on Americans." "To keep the United States and its people safe, it is critical that the Department of Justice use every legal means to detect, deter and disrupt foreign terrorists and their activities here in America," Ashcroft said. But critics of the government's surveillance efforts called the sharp increase worrisome because the work of the FISA court is conducted in secret and allows a lower standard of proof. It's generally tougher for a prosecutor to get permission for traditional wiretaps because they must demonstrate that there is probable cause that a suspect engaged in a crime. There's no such requirement when agents are seeking to gather intelligence from a suspected spy or terrorist. "It's alarming," said Timothy Edgar, legislative counsel for the American Civil Liberties Union. "We now know that most government surveillance today is supervised by a secret court that does not operate under the parameters of probable cause." The number of FISA applications has grown so dramatically that a recent report by the commission investigating the Sept. 11 attacks warned that federal prosecutors in the Justice Department had fallen behind in processing the deluge of applications. Passed in 1978, the Foreign Intelligence Surveillance Act created a new court to oversee highly sensitive law enforcement activities related to espionage or terrorism. The Patriot Act, passed in the aftermath of the Sept. 11 attacks, broadened the government's ability to seek warrants through the secretive 11-member court by essentially knocking down the wall that divided intelligence and law enforcement. The Patriot Act has become controversial, with critics accusing it of infringing on civil liberties. President Bush has said it is essential to the war on terrorism and, in a recent series of public appearances, urged Congress to renew some portions of the law that are set to expire in 2005. The new secret eavesdrop statistics were disclosed as the House Judiciary Committee prepares to take up a bill in the coming week that would expand the government's police surveillance powers even further. The Anti-Terrorism Intelligence Tools Improvement Act is sponsored by two powerful Republicans in the House of Representatives, Reps. James Sensenbrenner, R-Wis., chairman of the Judiciary Committee and Porter Goss, R-Fla., chairman of the Permanent Select Committee on Intelligence. Among other things the bill would make it a crime for a business or person who receives a national security letter from the FBI demanding information to disclose that contact. The government could prosecute the recipient if he or she failed to comply. National security letters, which are used to obtain financial records, telephone logs and other data, are not subject to judicial oversight. The ACLU is suing over the letters' use. The FBI has declined to say how often they use them. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8546 From: Steve Uhrig Date: Sun May 2, 2004 9:34pm Subject: Re: Gps tracker detection Once upon a midnight dreary, contranl pondered, weak and weary: > Real covert units most of the time have there own batteries...from my > findings wich are: i have seen a few....i have found a few.... i have > even seen some top-trackers with an estimated value of over 8000 US $ > they had there own batteries too. most units that are wired to the > electrical systems are not intended to be "covert" As a point of interest, in the United States, powering a covert tracking device from the target vehicle's power system is considered a 4th Amendment violation. > Now i have some questions: > What would be a good antenna design for my "Gps-tracker-detector ? > It should : > 1) Be small as possible (for comfortable working...and being able to > reach every spot) Look at a Scanlock-style antenna. > 3) Be omniderectional and directional at the same time ? > 4) Do various kinds of polarisation ? ? Polarization in the real world changes with the first bounce. Cross polarization theory is fine for fixed point to point where nothing is in the path to create multipath and a shift in polarization. I don't think it would matter. Remember the inverse square law for field strength. Halving the distance between the radiator and the receive antenna quadruples field strength, which is 6dB. You're probably best off with a simple telescoping whip with an insulated handle which you will move in close proximity to as much surface as you can on the vehicle under inspection. Getting a few inches/centimeters closer is free and ultimately will be a lot more effective than fancy antennas. Fancy antennas always are a compromise somewhere. With your project, I get the feeling simple, with as few constraints and personalities as possible, is the way to go. > I know a thousand types of antennas...and i could come up with some > fancy " phased array circular polarised patch panel logperiodic " kind > of antenna but i have the feeling that a simple retractable telescope > would be fine...since you can hold that in all directions...and change > it's length easely ...it can also reach every spot...it's also easely > transported inside a compartment in the housing...it's low cost > to...and easely replacable I completely agree. And I've found in this type of work, making the receive antenna resonant is less effective than just putting more metal out there to have a larger capture area. You may want to verify this by empirical testing. Gain sacrifices a wide pattern, and I don't think you want to do this. > A filtered amplifier (max 10dB's ?) at the antenna will increase > wanted signal levels and attenuate any out of band signals...on the > other hand it could introduce fake signals caused by (inband) > overloading...so i am not shure about that yet...maybe just a filter > (30~300 mhz) will be fine Amplifiers generate noise too, don't forget. Nothing is free. There's always a trade off. It's your job as the system engineer to determine through theory or testing which tradeoffs are worth the corresponding advantages. You use an amp when you need to overcome feedline loss. GPS antennas fed with feedline almost always have an amp in them, with gain to overcome the feedline loss from that tiny coax. Putting the amp at the antenna lets you amplify desired signal, not noise you will pick up with a post-amplifier. Amp is powered by DC fed up the coax. ---------- I've been saving all your messages to cogitate on when my mind is clear, which it isn't tonight. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8547 From: mpaulsen6 Date: Mon May 3, 2004 0:46am Subject: Re: Bullet Points Ran into a similar issue with a rifle. It's your life you're putting in their hands. Imagine my surprise when a 30 30 round popped out when I'm sitting on a bed talking to a buddy. Check it once. Check it twice. And for gods sake, make sure there aren't any left after the first surprise round comes out. --- In TSCM -L@yahoogroups.com, kondrak wrote: > Indeed!! > I can say I've been around firearms for a LONG, LONG time, and what > grandpappy taught me, and I teach each and every kid I instruct (and many > adults as well) is EVERY gun is loaded until YOU determine its unloaded and > safe. > > Point in demonstration: > A good friend,(who will remain nameless) a police officer at the time, an > ex-Army-ranger armorer walked into his computer room, where me, his wife > and daughter were at the time. He says to me, "Hey, got a new .45, have a > look", he proceeds to remove his sidearm from its holster, removes the > clip, and hands it to me. > Instinctively, I take the arm, point it in a safe direction, (at the floor > away from everyone in the room) rack the slide, and a round ejects. I of > course rack it again, to make sure, and put it on slide open lock. > Breathless... > I look at him, and mention something about that's NOT what you were trained > to do it, was it? > His sheepish response was, OH, I knew you were going to do that anyway.... > BLATT! WRONG ANSWER! STEAM PRESSURE RISING.... > You DID NOT, nor SHOULD of assumed that. > What's the first thing I would want to do with a NEW sidearm? Test the > trigger feel...of course. > NOT a proper gun handling move was it old buddy? > He had NO reason to expect I would do the right thing, those are NOT things > one "assumes" under ANY circumstances. Of course, I would of never pointed > it anywhere near anyone when I DID try the trigger pull, but that's NOT a > valid assumption to make. > I DO NOT assume that, under ANY circumstances. No way, I thought that > showed incompetent disrespect for his family at the VERY least, and I read > him the riot act in private over it. Of course, he agreed. > Just goes to show, even those that SHOULD know, have been trained to know, > make mistakes....lets not let it happen to any of us. > > It's said there are only two types of people who handle guns, those that > have had an AD (Accidental discharge) and those who haven't had one yet. I > know one person, whom I sincerely respect, who's a NRA instructor, who had > one, (fortunately in a safely pointed direction) who seriously considered > turning in his instructors credentials because he was so personally upset > over the incident. > I asked him if he learned anything, he said of course. I told him he needs > to continue, if for no other reason than to tell others of the situation, > and hopefully prevent them from having a similar incident. > His measure of embarrassment might save someone from doing likewise. THAT > was his job as an instructor. > Me? Yes, I've had one, a long time ago when I was a teen. My training was > to always point the muzzle in a safe direction, and except for the > embarrassment of doing it, and some hearing trauma from the rifle > discharging without ear protection, it was not near anyone, and did no > damage other than to my own psyche. I always remember it, I never will > forget it, and I remember my own personal feeling of failure at neglecting > the most basic of the rules. No one saw me do it, I endangered no one or > anything, the round did no more than kick up some dirt, when I thought the > gun was unloaded...but I still consider it a most grievous of personal > violations of my own rules and training. I can tell you undoubtedly it led > to some serious introspection and review. I readily share it with the hope > no one else will ever do it. I've also never even come close to having > another ever since. It also probably led to my hard-ass view on gun safety > I still have today. > > We who handle firearms have to take it deadly f*CKING seriously.....no > exceptions! NO accidents! > That's all "I" have to say on the subject...I sympathize with that DEA > agent, I hate to hear anyone accidently shoots anyone, including himself, > but bottom line IS, he didn't follow the rulez! Shame on him. His > embarrassment will be the least of the lessons he learned that day. IT CAN > happen to anyone. > Job #1 is safety. No if's, and's or but's....I don't want to be around > anyone handling a firearm who doesn't feel that way, training and > attitude...Period! > > Now lets be careful out there... > > > > Point taken.... > > > At 10:33 5/1/2004, you wrote: > > >A nice example that excrement occurs. > >(from the Furthermore section, www.wired.com, May 1, 2004) > > > > > >Bullet Points > > > >During a presentation in Florida, a hapless Drug Enforcement > >Administration agent inadvertently hammered home the importance of gun > >safety. The agent was lecturing 50 students and adults when he drew his > >..40-caliber weapon and removed the magazine. The agent pulled back the > >slide and asked an audience member to confirm that the gun was not loaded, > >then pointed the pistol toward the floor, released the slide and -- > >woopsie! -- fired a shot into the top of his left thigh. "Everyone was > >pretty shaken up," said an audience member. "But the point of gun safety > >hit home. Unfortunately, the agent had to get shot. But after seeing that, > >my nephew doesn't want to have anything to do with guns." > > > > -- Jenny McKeel > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > 8548 From: mpaulsen6 Date: Mon May 3, 2004 0:52am Subject: redsiren comments? I'm reviewing this company for services I may purchase. Any individuals that are on the list that have any information about their services firsthand beyond marketing please contact. I am not responding via my attbi.com account at this time. You can reach me at my mpaulsen6 /at/ yahoo . com account. Thanks in advance, Matt 8549 From: Jordan Ulery Date: Mon May 3, 2004 9:51am Subject: "basic" basic training? Gentlemen: The description of the basic training course recently has piqued my interest in this, to me, exciting, field yet again. I would offer the following view point, however, as one firmly convinced that TSCM is work not for the generalist, but for the specialists. Having attended numerous shows and programs and classes there is apparently a widely held and general perception among many PIs that TSCM consists merely of walking into to a room with a black box with some red and green lights, poking the antenna in several directions, getting a green light and leaving with a big check. As you know, that perception is wrong, yet it persists. The perception is almost as, if not more, strongly held as the public perception that all PIs do is poke around in others' bedrooms. It occurs to me that the purveyors of training would do themselves, the profession and the associated PI profession a great deal of good by creating a training program that does not focus on how a "bug" is detected or what tools are needed; but on the exacting aspects of "bug" detection and how it takes technical skill, training and knowledge to actually undertake the work. In short a brief course that explains, in non-technical words, not in jargon and not in an 'I've got a PhD and you don't' manner, that there are serious consequences to not doing the job right, that there are certain basic elements that need to be observed, that there are industry protocols for reporting found devices and that there are resources for referral. Personally such a course should, to me, be part of basic PI licensing requirements, but that's just me. At any rate there is my $0.02 (which I believe is worth about $0.35 in cooper value alone, but that's another story) Jordan G. Ulery Chief Investigator Ulrich Litigation Support 603-231-7867 "Your New Hampshire Connection" This message and all incoming or out going messages are Scanned by Norton Anti Virus software This message is confidential and protected by federal law and various state statutes. If you are not the intended recepient of this message you are to destroy it. Unauthorized viewing, reading, copying or distribution of this message will incure civil and possible criminal sanctions. [Non-text portions of this message have been removed] 8550 From: James M. Atkinson Date: Mon May 3, 2004 1:41pm Subject: Free Presentations for Professional and Investigative Groups As several list member are aware I offer several free seminars to industry groups, PI groups, and so on to help educate the public about the modern eavesdropping threat and what can be done to counter the threat. If you are a member of a professional, academic, industrial, LE, or PI organization and your interested in having me attend one of your meetings and speaking for a few hours on the topics of TSCM please drop me a private email. I can demonstrate what is involved in a real bug sweep, show you REAL sweep equipment (and not spy shop toys), cover realistic threat models, and show you have to manage a sweep to be radically more effective. I do not push equipment, my services, or any specific product or service; but provide the information from a fairly neutral position.. but I don't pull any punches either. All I ask is that you cover my travel/per diem expense as you would any other guest speaker. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8551 From: Date: Mon May 3, 2004 10:35am Subject: Terrorist Alert ATTN: All Employees Recently we have received credible intelligence that there have been seven terrorists working in your office. Six of the seven have been apprehended. Bin Sleepin, Bin Loafin, Bin Goofin, Bin Lunchin, Bin Drinkin, and Bin Ass-Kissin have been taken into custody. At this time, no one fitting the description of the seventh cell member, Bin Workin, has been found at your office. We are confident that anyone who looks like he's Bin Workin will be ery easy to spot. You are OBVIOUSLY not a suspect at this time so keep doing what you Bin Doin. [Non-text portions of this message have been removed] 8552 From: James M. Atkinson Date: Mon May 3, 2004 1:13pm Subject: Mogul Facing Tap Rap MOGUL FACING TAP RAP By KIERAN CROWLEY -------------------------------------------------------------------------------- April 23, 2004 -- A wealthy real-estate mogul has been arrested and charged with wiretapping - for allegedly bugging his estranged wife's phone calls at their Long Island mansion. Mark Laffey, 34, was arrested Wednesday and charged with criminal eavesdropping for allegedly rigging a hidden tape recorder to record wife Maureen's phone calls at their Oyster Bay estate. Maureen Laffey, 35, called police after she uncovered the hidden recorder inside her bedroom closet, said Nassau Detective Lt. Steven Skrynecki. "This is a domestic situation. They are involved in a divorce," said Skrynecki. "We have reason to believe that the husband was taping conversations between the wife and other people." Skrynecki said detectives recovered "an audio recording device" from the bedroom. "The charge is that he was eavesdropping on telephonic conversations," Skrynecki said. Mark Laffey, the chief operating officer of Century 21 Laffey Associates Fine Homes, spent the night in jail and was arraigned on the charge yesterday morning at Nassau County 1st District Court in Hempstead. A prosecutor asked the judge to issue an order of protection to keep Mark away from his wife - even though they both still live in the same home. Defense lawyer Dominic Barbara objected, saying his client had never been arrested before and had no history of violence. Barbara said his client was not guilty. "I'm not suggesting he did tap the phone," Barbara said in court. "How do you know he put the recorder there?" The judge did not issue an order of protection, and he set Laffey free on his own recognizance. "My client categorically denies that he was taping any phone calls," Barbara said after the court appearance. A lawyer for Mrs. Laffey declined to comment on the arrest. Mark is charged with a felony and faces up to four years behind bars if convicted. Mrs. Laffey filed for divorce last year. The couple are also battling for custody of their 7-year-old daughter. Mark's firm, which sells in Queens and on Long Island, "is one of the fastest-growing real estate companies in the country," according to company promotional material. He has been a real-estate broker for 14 years. ------------------------------------------------- ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8553 From: Date: Mon May 3, 2004 5:41pm Subject: Re: Terrorist Alert > NoPositiveWork AKA Bin RIF'd [Non-text portions of this message have been removed] 8554 From: James M. Atkinson Date: Mon May 3, 2004 10:16pm Subject: Re: Terrorist Alert Don't forget the terrorist called "Bin Buggin", commonly caught by "Bin Sweeping" -jma At 03:35 PM 5/3/2004, NoPositiveWork@a... wrote: >ATTN: All Employees > >Recently we have received credible intelligence that there have been seven >terrorists working in your office. Six of the seven have been apprehended. > >Bin Sleepin, Bin Loafin, Bin Goofin, Bin Lunchin, Bin Drinkin, and Bin >Ass-Kissin have been taken into custody. At this time, no one fitting >the description of the seventh cell member, Bin Workin, has been found at >your office. We are confident that anyone who looks like he's Bin Workin >will be ery easy to spot. You are OBVIOUSLY not a suspect at this time so >keep >doing what you Bin Doin. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8555 From: David Alexander Date: Tue May 4, 2004 3:54am Subject: RE: An Offer You Can't Refuse If you want to stop pop-ups from as Windows Messenger you can turn it off permanently. Click on start Click on settings Click on Control Panel Double click on Administrative tools Double click on Services Double click on Messenger If the service is running, stop it with the 'Stop' button In the start-up type drop down box select 'disabled' The service will no longer run, even upon reboot. You can undo your actions by returning to this menu and selecting start, either as a one-off or on reboot. Ignore what MS description says about the messenger service. I stopped it months ago and haven't had a problem with any other services. I haven't had a single pop-up either. Hope this helps Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: 02 May 2004 23:13 To: TSCM-L Subject: [TSCM-L] An Offer You Can't Refuse This is a really excellent article, and it holds several lessons on how NOT to perform a bug sweep. -jma ---------------------------------------------------------------------------- --------- washingtonpost.com An Offer You Can't Refuse Nice little computer you got there, heh heh By Gene Weingarten Sunday, May 2, 2004; Page W19 I was working at home on my computer the other day when a pop-up ad commandeered my screen. "ARE YOU BEING BOTHERED BY POP-UP ADS?" it asked, offering to sell me a product to solve this problem. The day before, I'd gotten a similar screen-immobilizing message, inside a giant, scary exclamation point. This one warned me that it had detected an alarming infestation of spyware on my computer. Spyware is a gremlin, unleashed by Internet marketers, that lurks inside your computer and reports back pertinent facts about you. What kind of pertinent facts? Say, the fact that you have an alarming infestation of spyware and might need to buy . . . protection. These messages made me feel like some grocer on the South Side of Chicago, circa 1928 -- as if a man in a fedora and a shiny suit had just walked in, picked up a jar of pickles and accidentally dropped it on the floor to get my attention, saying: "Nice little place you got here. It sure would be a shame if something happened to it." I liked typing that last line. When you talk like a gangster -- in the conditional mood, filled with equivocation and supposition -- they can't pin nothing on you. For example, supposing I wanted to suggest that there is a vast computer-industry protection racket operating right under our noses? No one could sue me for libel, see, on account of I'm just supposing. So, did you ever wonder why no one ever catches most of the people who are said to be responsible for computer viruses that have caused billions of dollars of damage to our economy -- and birthed a lucrative virus protection industry? The thing I am supposing is: What if the reason that these virus makers are seldom caught is that they are not, as we are led to believe, pimply 17-year-old teenagers from dysfunctional families who are motivated solely by boredom and malice? What if it is, you know, a more organized crime than that, with more understandable motives? Can it possibly be that there exists some unholy nexus between the people who are filling our computers with bad stuff, and the people whose business depends on our staying afraid of the bad stuff? Maybe not. I confess there is a lot about the Web that I do not understand, such as why spammers think anyone will click on an e-mail with a subject line like "0i0!9u5*elbow08jrg." ("Better open this one fast! It sounds like my cute neighbor Phoebe is hitting on me, utilizing encrypted alphanumeric ciphers!") Still, one wonders about how a company can stay in business if its long-term goal, its sworn duty, is to gradually eliminate the need for itself. Many years ago, when I was but a lad, I saw my first cockroach in the kitchen. I alerted my parents, who were horrified. It was their first cockroach, too. It had probably crawled from a supermarket bag. The prudent thing for my parents to do would have been to wait until they saw a second cockroach. But initial cockroach sightings are traumatic events in New York, and my parents did what any normal half-crazed lunatics would have done: They immediately called an exterminator. The exterminator arrived promptly, did his thing, and left. For about a month afterward we were fine, and then, suddenly, our house was overrun with cockroaches. We had to call the exterminator again, and pretty soon we had him on a monthly retainer. It was not until years later that I did some research: Cockroach eggs take a month to hatch. It is possible to leave eggs behind after you exterminate. It wasn't a completely unheard-of practice, in the industry. Anyway, I am writing this on a laptop. My main computer is currently being euthanized -- its memory completely erased -- because of an interlocking network of viruses and spyware that had slowed its mental processes so profoundly that the computer appeared to be operating on quaaludes. (True fact: It took 24 seconds between "Welcome" and "You've Got Mail.") I know there is free software to seek and destroy spyware, and I have friends who have used it effectively. But I also know that the single thing that viruses and spyware are most often attached to is . . . downloaded free software. Spammed if you do, and spammed if you don't. Gene Weingarten's e-mail address is weingarten@w.... Chat with him online Tuesdays at noon at www.washingtonpost.com. (c) 2004 The Washington Post Company ---------------------------------------------------------------------------- ------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8556 From: kondrak Date: Tue May 4, 2004 4:36am Subject: Re: Re: Bullet Points Yes, I imagine a big WHOAH! was in order....and as an adjunct, the old rifles, typically a tube feed, are prone to this...a bit of dirt, gummy/waxey ammo lube, and not all the shells were ejected, even though the feed rod was completely removed, one round stayed stuck in the gunk. Replacing the tension rod dislodged the sticky round, and it of course was available to fire. (this was found after the tube was re-inserted, and I performed a mechanism recycle, with muzzle downrange), plop, out ejects a 22lr. Hmm...How many people clean the feed tube? Not many I'd bet. This happened on an old savage rifle, one I use for training, a bolt action .22 (which I might add, has one of the finest set of Iron sights Ive ever used) Needless to say, the entire gun (metal parts alone after stock was removed) went into the parts washer and was left overnight. It was then cleaned and lubed up. I make metal note to clean the tube every so often for that reason now. A 30cal brush dipped in Hoppes does a nice job on the feed tube. Due to the design of the newer guns, with detachable clips or drums, checking for an extra round stuck somewhere is usually not a problem if standard safety procedures are employed. When handed a gun, even one that was just checked in front of your eyes by another, I always check myself. LOOK in the chamber, cycle, feel, whatever it takes. I'm sure all revolver handlers have seen or had a sticky one at one time or another as well. I know its happened to me...sometimes that ejector just doesn't get them all...and that means unfired as well...especially if you reload like I do. At 01:46 5/3/2004, you wrote: >Ran into a similar issue with a rifle. It's your life you're putting >in their hands. Imagine my surprise when a 30 30 round popped out >when I'm sitting on a bed talking to a buddy. Check it once. Check >it twice. And for gods sake, make sure there aren't any left after >the first surprise round comes out. 8557 From: Michael Puchol Date: Tue May 4, 2004 4:59am Subject: Re: An Offer You Can't Refuse Hi David, I went a step further, and lobotomised XP by deleting the Windows Messenger folder (not to be confused with MSN Messenger), and manually cleaning the registry. It is not permanently gone, just in case a windows update has the temptation to turn it back on. Regard, great tip! Mike ----- Original Message ----- From: "David Alexander" To: "'TSCM-L submissions'" Sent: Tuesday, May 04, 2004 10:54 AM Subject: RE: [TSCM-L] An Offer You Can't Refuse > If you want to stop pop-ups from as Windows Messenger you can turn it off > permanently. > > Click on start > Click on settings > Click on Control Panel > Double click on Administrative tools > Double click on Services > Double click on Messenger > > If the service is running, stop it with the 'Stop' button > In the start-up type drop down box select 'disabled' > The service will no longer run, even upon reboot. You can undo your actions > by returning to this menu and selecting start, either as a one-off or on > reboot. > > Ignore what MS description says about the messenger service. I stopped it > months ago and haven't had a problem with any other services. I haven't had > a single pop-up either. > > Hope this helps > > Dave > > David Alexander > Dbi Consulting Ltd > Stoneleigh Park Mews > Stoneleigh Abbey > Kenilworth > Warwickshire > CV8 2DB > > Office : 01926 515515 > Mobile: 07836 332576 > Email : David.Alexander@d... > > Have you visited our website? > http://www.dbiconsulting.co.uk > > -----Original Message----- > From: James M. Atkinson [mailto:jmatk@tscm.com] > Sent: 02 May 2004 23:13 > To: TSCM-L > Subject: [TSCM-L] An Offer You Can't Refuse > > This is a really excellent article, and it holds several lessons on how > NOT to perform a bug sweep. > > -jma > > > -------------------------------------------------------------------------- -- > --------- > > washingtonpost.com > An Offer You Can't Refuse > Nice little computer you got there, heh heh > > By Gene Weingarten > > Sunday, May 2, 2004; Page W19 > > > I was working at home on my computer the other day when a pop-up ad > commandeered my screen. "ARE YOU BEING BOTHERED BY POP-UP ADS?" it asked, > offering to sell me a product to solve this problem. > > The day before, I'd gotten a similar screen-immobilizing message, inside a > giant, scary exclamation point. This one warned me that it had detected an > alarming infestation of spyware on my computer. Spyware is a gremlin, > unleashed by Internet marketers, that lurks inside your computer and > reports back pertinent facts about you. What kind of pertinent facts? Say, > the fact that you have an alarming infestation of spyware and might need to > buy . . . protection. > > These messages made me feel like some grocer on the South Side of Chicago, > circa 1928 -- as if a man in a fedora and a shiny suit had just walked in, > picked up a jar of pickles and accidentally dropped it on the floor to get > my attention, saying: "Nice little place you got here. It sure would be a > shame if something happened to it." > > I liked typing that last line. When you talk like a gangster -- in the > conditional mood, filled with equivocation and supposition -- they can't > pin nothing on you. For example, supposing I wanted to suggest that there > is a vast computer-industry protection racket operating right under our > noses? No one could sue me for libel, see, on account of I'm just supposing. > > So, did you ever wonder why no one ever catches most of the people who are > said to be responsible for computer viruses that have caused billions of > dollars of damage to our economy -- and birthed a lucrative virus > protection industry? The thing I am supposing is: What if the reason that > these virus makers are seldom caught is that they are not, as we are led to > believe, pimply 17-year-old teenagers from dysfunctional families who are > motivated solely by boredom and malice? What if it is, you know, a more > organized crime than that, with more understandable motives? > > Can it possibly be that there exists some unholy nexus between the people > who are filling our computers with bad stuff, and the people whose business > depends on our staying afraid of the bad stuff? > > Maybe not. I confess there is a lot about the Web that I do not understand, > such as why spammers think anyone will click on an e-mail with a subject > line like "0i0!9u5*elbow08jrg." ("Better open this one fast! It sounds like > my cute neighbor Phoebe is hitting on me, utilizing encrypted alphanumeric > ciphers!") > > Still, one wonders about how a company can stay in business if its > long-term goal, its sworn duty, is to gradually eliminate the need for > itself. > > Many years ago, when I was but a lad, I saw my first cockroach in the > kitchen. I alerted my parents, who were horrified. It was their first > cockroach, too. It had probably crawled from a supermarket bag. > > The prudent thing for my parents to do would have been to wait until they > saw a second cockroach. But initial cockroach sightings are traumatic > events in New York, and my parents did what any normal half-crazed lunatics > would have done: They immediately called an exterminator. The exterminator > arrived promptly, did his thing, and left. For about a month afterward we > were fine, and then, suddenly, our house was overrun with cockroaches. We > had to call the exterminator again, and pretty soon we had him on a monthly > retainer. > > It was not until years later that I did some research: Cockroach eggs take > a month to hatch. It is possible to leave eggs behind after you > exterminate. It wasn't a completely unheard-of practice, in the industry. > > Anyway, I am writing this on a laptop. My main computer is currently being > euthanized -- its memory completely erased -- because of an interlocking > network of viruses and spyware that had slowed its mental processes so > profoundly that the computer appeared to be operating on quaaludes. (True > fact: It took 24 seconds between "Welcome" and "You've Got Mail.") > > I know there is free software to seek and destroy spyware, and I have > friends who have used it effectively. But I also know that the single thing > that viruses and spyware are most often attached to is . . . downloaded > free software. > > Spammed if you do, and spammed if you don't. > > Gene Weingarten's e-mail address is weingarten@w.... Chat with him > online Tuesdays at noon at www.washingtonpost.com. > > (c) 2004 The Washington Post Company > > > > > -------------------------------------------------------------------------- -- > ------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > -------------------------------------------------------------------------- -- > ------------------------- > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: > http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------------- -- > ------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------------- -- > ------------------------- > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 8558 From: kondrak Date: Tue May 4, 2004 5:45am Subject: Re: An Offer You Can't Refuse On XP, this is how I did it: Worked like a charm... Click [Start] [Run] and in the [Open:] box type or copy/paste the following command RunDll32 advpack.dll,LaunchINFSection %windir%\INF\msmsgs.inf,BLC.Remove Click [OK] Snipped from: http://www.theeldergeek.com/messenger_removal.htm At 05:59 5/4/2004, you wrote: >Hi David, > >I went a step further, and lobotomised XP by deleting the Windows Messenger >folder (not to be confused with MSN Messenger), and manually cleaning the >registry. It is not permanently gone, just in case a windows update has the >temptation to turn it back on. > >Regard, great tip! > >Mike > >----- Original Message ----- >From: "David Alexander" >To: "'TSCM-L submissions'" >Sent: Tuesday, May 04, 2004 10:54 AM >Subject: RE: [TSCM-L] An Offer You Can't Refuse > > > > If you want to stop pop-ups from as Windows Messenger you can turn it off > > permanently. > > > > Click on start > > Click on settings > > Click on Control Panel > > Double click on Administrative tools > > Double click on Services > > Double click on Messenger > > > > If the service is running, stop it with the 'Stop' button > > In the start-up type drop down box select 'disabled' > > The service will no longer run, even upon reboot. You can undo your >actions > > by returning to this menu and selecting start, either as a one-off or on > > reboot. > > > > Ignore what MS description says about the messenger service. I stopped it > > months ago and haven't had a problem with any other services. I haven't >had > > a single pop-up either. > > > > Hope this helps > > > > Dave > > > > David Alexander > > Dbi Consulting Ltd > > Stoneleigh Park Mews > > Stoneleigh Abbey > > Kenilworth > > Warwickshire > > CV8 2DB > > > > Office : 01926 515515 > > Mobile: 07836 332576 > > Email : David.Alexander@d... > > > > Have you visited our website? > > http://www.dbiconsulting.co.uk > > > > -----Original Message----- > > From: James M. Atkinson [mailto:jmatk@tscm.com] > > Sent: 02 May 2004 23:13 > > To: TSCM-L > > Subject: [TSCM-L] An Offer You Can't Refuse > > > > This is a really excellent article, and it holds several lessons on how > > NOT to perform a bug sweep. > > > > -jma > > > > > > -------------------------------------------------------------------------- >-- > > --------- > > > > washingtonpost.com > > An Offer You Can't Refuse > > Nice little computer you got there, heh heh > > > > By Gene Weingarten > > > > Sunday, May 2, 2004; Page W19 > > > > > > I was working at home on my computer the other day when a pop-up ad > > commandeered my screen. "ARE YOU BEING BOTHERED BY POP-UP ADS?" it asked, > > offering to sell me a product to solve this problem. > > > > The day before, I'd gotten a similar screen-immobilizing message, inside a > > giant, scary exclamation point. This one warned me that it had detected an > > alarming infestation of spyware on my computer. Spyware is a gremlin, > > unleashed by Internet marketers, that lurks inside your computer and > > reports back pertinent facts about you. What kind of pertinent facts? Say, > > the fact that you have an alarming infestation of spyware and might need >to > > buy . . . protection. > > > > These messages made me feel like some grocer on the South Side of Chicago, > > circa 1928 -- as if a man in a fedora and a shiny suit had just walked in, > > picked up a jar of pickles and accidentally dropped it on the floor to get > > my attention, saying: "Nice little place you got here. It sure would be a > > shame if something happened to it." > > > > I liked typing that last line. When you talk like a gangster -- in the > > conditional mood, filled with equivocation and supposition -- they can't > > pin nothing on you. For example, supposing I wanted to suggest that there > > is a vast computer-industry protection racket operating right under our > > noses? No one could sue me for libel, see, on account of I'm just >supposing. > > > > So, did you ever wonder why no one ever catches most of the people who are > > said to be responsible for computer viruses that have caused billions of > > dollars of damage to our economy -- and birthed a lucrative virus > > protection industry? The thing I am supposing is: What if the reason that > > these virus makers are seldom caught is that they are not, as we are led >to > > believe, pimply 17-year-old teenagers from dysfunctional families who are > > motivated solely by boredom and malice? What if it is, you know, a more > > organized crime than that, with more understandable motives? > > > > Can it possibly be that there exists some unholy nexus between the people > > who are filling our computers with bad stuff, and the people whose >business > > depends on our staying afraid of the bad stuff? > > > > Maybe not. I confess there is a lot about the Web that I do not >understand, > > such as why spammers think anyone will click on an e-mail with a subject > > line like "0i0!9u5*elbow08jrg." ("Better open this one fast! It sounds >like > > my cute neighbor Phoebe is hitting on me, utilizing encrypted alphanumeric > > ciphers!") > > > > Still, one wonders about how a company can stay in business if its > > long-term goal, its sworn duty, is to gradually eliminate the need for > > itself. > > > > Many years ago, when I was but a lad, I saw my first cockroach in the > > kitchen. I alerted my parents, who were horrified. It was their first > > cockroach, too. It had probably crawled from a supermarket bag. > > > > The prudent thing for my parents to do would have been to wait until they > > saw a second cockroach. But initial cockroach sightings are traumatic > > events in New York, and my parents did what any normal half-crazed >lunatics > > would have done: They immediately called an exterminator. The exterminator > > arrived promptly, did his thing, and left. For about a month afterward we > > were fine, and then, suddenly, our house was overrun with cockroaches. We > > had to call the exterminator again, and pretty soon we had him on a >monthly > > retainer. > > > > It was not until years later that I did some research: Cockroach eggs take > > a month to hatch. It is possible to leave eggs behind after you > > exterminate. It wasn't a completely unheard-of practice, in the industry. > > > > Anyway, I am writing this on a laptop. My main computer is currently being > > euthanized -- its memory completely erased -- because of an interlocking > > network of viruses and spyware that had slowed its mental processes so > > profoundly that the computer appeared to be operating on quaaludes. (True > > fact: It took 24 seconds between "Welcome" and "You've Got Mail.") > > > > I know there is free software to seek and destroy spyware, and I have > > friends who have used it effectively. But I also know that the single >thing > > that viruses and spyware are most often attached to is . . . downloaded > > free software. > > > > Spammed if you do, and spammed if you don't. > > > > Gene Weingarten's e-mail address is weingarten@w.... Chat with him > > online Tuesdays at noon at www.washingtonpost.com. > > > > (c) 2004 The Washington Post Company > > > > > > > > > > -------------------------------------------------------------------------- >-- > > ------------------------- > > > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > > -------------------------------------------------------------------------- >-- > > ------------------------- > > > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 Web: > > http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > > -------------------------------------------------------------------------- >-- > > ------------------------- > > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > > -------------------------------------------------------------------------- >-- > > ------------------------- > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > [Non-text portions of this message have been removed] 8559 From: Steve Uhrig Date: Tue May 4, 2004 7:54am Subject: Avcom spectrum analyzer kit for sale Avcom Spectrum Analyzer & Freq Extender & More Avcom PSA-65C spectrum analyzer, 1-1250 megacycle coverage. For full specs, go here: http://www.avcomofva.com/cover.asp and click on Spectrum Analyzers and Analyzer Accessories. This package has an interesting history. It is a -65C analyzer with V2.1 firmware, optional accessory plastic cover, carrying handle aka bail, padded carrying case, AC and DC power cords, RFP-24 low noise 22dB gain preamp, BNC antenna, BNC>F coaxial adapter, *and* a MFC- 2000/5000 frequency extender which covers 2.0 - 3.0 gigs and 5.0 - 6.0 gigs. Also included is a military-grade BNC jumper cable to connect the extender to the spectrum analyzer. Note the two extended bands are the popular ISM (Industrial, Scientific & Medical) bands where inexpensive consumer grade wireless video is prevalent. Oh, an instruction manual is included. The package was purchased by a small cable TV operation in Virginia who was experiencing terrestrial interference on one of their satellite downlinks and needed this to find the problem. They purchased everything in a panic, but by the time the extender was specially made and the equipment shipped, the problem had gone away. They never used the system, stacked it in their shop, and after a short while resold it to me to recover some of their investment. They never even attached the optional bail. They paid USD $5099 for the package. Avcom threw in the hard cover for nothing. You would pay that plus shipping anywhere you purchased the equipment. Look it up yourself on the web and see. The -65C has the AM and FM demodulators but does not have the 10 KC bandwidth filter or the video demodulator. If you feel you need these, you can purchase them yourself from an Avcom distributor. Any TSCMer will recognize the friendly, easy to operate yet potent PSA-65C as the most popular spectrum analyzer ever in TSCM. Thousands of them are in use by professional sweepers. The unit is instinctive to use and capable, in the hands of a competent user, of identifying nearly any RF threat within its coverage range of 1-6 gigs (except 4 - 5 gigs where the extenders do not overlap and I have never heard of a surveillance device being found in that region). If you are just starting and need something you can grow with, an experienced professional needing a spare unit, a peripatetic sweeper (look it up) needing a spare kit to leave at a regular customer's location or anyone who needs a complete, inexpensive, capable RF kit, here it is. A fellow TSCMer commented when reading the above listing he works for a Fortune 50 defense contractor, does TSCM as part of his duties, has access to an entire lab full of equipment, and uses an Avcom for sweeping because it does the job and is easier to use than gear costing one hundred times as much. Unit is in perfect operating condition and correlates properly with my $50,000 Tek unit which was calibrated this year and cost more when it was new than my house did. I've had a number of these Avcom pieces before, and they generally sell quickly. If you're interested, don't hesitate. Almost every time I advertise a decent piece, it sells quickly and I have to disappoint a number of friends, which makes me sad. New price is $5099. Your price for the complete package as described above is $3500. Save $1600. Not bad. Price includes domestic insured shipping so $3500 is the total you pay. I will credit international buyers with the equivalent of domestic shipping. Comes with my guarantee -- check the references section of my website or ask anyone in the TSCM business if you have any concerns. I take credit cards and can ship internationally. If you are outside the U.S., please let me know if you will need a 220V to 110V converter as this unit is set up for 110VAC. This is a rare opportunity. Someone will get a real nice piece in perfect condition and save a large chunk of change. Holler if questions. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8560 From: James M. Atkinson Date: Tue May 4, 2004 0:52pm Subject: ...and now a word from our sponsors As a favor to me, I would really appreciate it if list members ***CONTACTED ME DIRECTLY*** for their any of their sweep gear requirements, BEFORE they contact anybody else. I can save you a lot of headaches, hassles, and money and can point you in the right direction as to which equipment is best for what you trying to do... and more importantly, I'll let you know if you might be wasting money on a certain piece of equipment, or if you might get in over your head on a piece of equipment. Unlike other people you deal with I shoot straight on equipment, I don't hype up equipment, and I am not going to jerk you around. Even if you intend to buy the equipment from someone else, at least contact me first. Thank You, -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8561 From: Ocean Group Date: Tue May 4, 2004 3:49pm Subject: RE: "basic" basic training? This seems to raise the time old question, what qualifies someone to carry out TSCM services? Some people, conveniently hide behind a host of government awarded qualifications so secret that the very mention of the name can have you rendered on your countries black list. While many in the industry come from former government roles, and are fully qualified, this should never stop one questioning a possible service provider. There is a list of questions you can ask to ascertain the experince of the person your hiring, this can be found on most good tscm company websites. There are many people that can provide an equally thorough and experienced service and whom did not benefit from a government up bringing. These people often come from technical backgrounds, some having military experience, and some that have simply followed the commercial route, that is, not commercial tscm courses, but students that come from RF/Telecoms/ITS backgrounds that can cope equally well as the person who came from a gov tscm school. Technical characteristics of these required skills are often mimicked throughout other various technical engineering disciplines. I do agree that there are many PI's that offer a sub standard service in this area, I see this alone in Ireland. It's rampant. They make big money, but couldn't give you ohm's law. That doesn't stop them from walking away with a big cheque. In regards to TSCM South Africa's courses, I'm in no position to offer a personal opinion, however from colleagues that I know, they speak very highly of them as practical courses. And that is what they are, they will give you a basic theory with some good hands on learning, which is rare in this day and age. However, remember, you're not going to walk away from these courses with a degree in communications theory. These require further learning and experience if you want to master the trade. Here, an electrician has to do a 3 year appreticeship before they get certified, why should ECM services be any different? It does baffle me to see some course providers, some in the US, but they're not alone, I've seen them here too, that promise all the required counter eavesdropping skills in a two day course for an obnoxious price. You'd be better off enrolling in a night time HAM course or comms qualification from a 3rd level institution. Day after day, people complain about the lack of standards, the lack of proper commercially available training etc etc etc. Well, if you really want to make a difference, then drop me an email at secretary@t... and I'll arrange it so that you can actually make a real contribution to a TSCM standards development discussion, one that, is moving alone, but at snails pace due to the lack of technical input from the existing community. This standard once finalised, will be proposed as the industry benchmark for the new private security legislation in the UK, hence making it solid and enforceable. People are happy to complain about the state of their industry, but when it actually comes to working towards a better one, they aren't so vocal. Kind regards Oisin ****************************** Message: 1 Date: Mon, 3 May 2004 10:51:37 -0400 From: "Jordan Ulery" Subject: "basic" basic training? Gentlemen: The description of the basic training course recently has piqued my interest in this, to me, exciting, field yet again. I would offer the following view point, however, as one firmly convinced that TSCM is work not for the generalist, but for the specialists. Having attended numerous shows and programs and classes there is apparently a widely held and general perception among many PIs that TSCM consists merely of walking into to a room with a black box with some red and green lights, poking the antenna in several directions, getting a green light and leaving with a big check. As you know, that perception is wrong, yet it persists. The perception is almost as, if not more, strongly held as the public perception that all PIs do is poke around in others' bedrooms. It occurs to me that the purveyors of training would do themselves, the profession and the associated PI profession a great deal of good by creating a training program that does not focus on how a "bug" is detected or what tools are needed; but on the exacting aspects of "bug" detection and how it takes technical skill, training and knowledge to actually undertake the work. In short a brief course that explains, in non-technical words, not in jargon and not in an 'I've got a PhD and you don't' manner, that there are serious consequences to not doing the job right, that there are certain basic elements that need to be observed, that there are industry protocols for reporting found devices and that there are resources for referral. Personally such a course should, to me, be part of basic PI licensing requirements, but that's just me. At any rate there is my $0.02 (which I believe is worth about $0.35 in cooper value alone, but that's another story) Jordan G. Ulery Chief Investigator Ulrich Litigation Support 603-231-7867 "Your New Hampshire Connection" 8562 From: srhayes3 Date: Tue May 4, 2004 3:57pm Subject: TSCM Education Are there any list members who can advise me as to what specific elective courses I should pursue as an Electrical Engineering major, that DIRECTLY relate to TSCM. I have spent the last 5 years taking electronics courses as well in addition to quite a few communications engineering courses at my local vocational technical college. The courses I have completed include: AM and SSB Circuit Analysis FM Circuit Analysis Advanced Modulation techniques Antennas and Transmission Lines Optical Communications Techniques In these classes I was exposed to alot of the lab grade equipment that I often see refered to on this list. My objective now is to earn a degree in Electrical Engineering with the goal in mind of seeking employment with the U.S. State Department as a Security Engineering Officer (TSCM is specifically mentioned in the job duties of the vacancy announcement). The job is not currently open, which gives me some time to work with to complete my education. I would like to make sure I am making the best possible choices in my selection of coursework. Any help you guys can offer would be most appreciated. 8563 From: James M. Atkinson Date: Tue May 4, 2004 4:13pm Subject: Re: TSCM Education But Sam, you don't need to know anything about electronics to do TSCM for the U.S. Government ;-) [duck] Just kidding folks... you have to be able to put batteries in a flashlight 8-) [duck] ...and if your working out of Ft. Belvoir you have to be able to change the lamp in the flashlight as well (but you can follow the printed instruction sheets with the step-by-step pictures on how to do it, along with an 800 number you can call for technical support) :-> [duck] Whew, Rough crowd. -jma PS: Keep up the good work Sam, your doing great., we need more people in the business like you. At 04:57 PM 5/4/2004, srhayes3 wrote: >Are there any list members who can advise me as to what specific >elective courses I should pursue as an Electrical Engineering major, >that DIRECTLY relate to TSCM. I have spent the last 5 years taking >electronics courses as well in addition to quite a few >communications engineering courses at my local vocational technical >college. The courses I have completed include: >AM and SSB Circuit Analysis >FM Circuit Analysis >Advanced Modulation techniques >Antennas and Transmission Lines >Optical Communications Techniques >In these classes I was exposed to alot of the lab grade equipment >that I often see refered to on this list. My objective now is to >earn a degree in Electrical Engineering with the goal in mind of >seeking employment with the U.S. State Department as a Security >Engineering Officer (TSCM is specifically mentioned in the job >duties of the vacancy announcement). The job is not currently open, >which gives me some time to work with to complete my education. I >would like to make sure I am making the best possible choices in my >selection of coursework. Any help you guys can offer would be most >appreciated. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8564 From: Steve Uhrig Date: Tue May 4, 2004 5:07pm Subject: Re: TSCM Education Once upon a midnight dreary, srhayes3 pondered, weak and weary: > The courses I have completed include: AM and SSB Circuit Analysis FM > Circuit Analysis Advanced Modulation techniques Antennas and > Transmission Lines Optical Communications Techniques If you have *mastered* this information, as opposed to putting in your time and getting a ticket, you are doing well. The ability to communicate is critical. Know how to draft and write a report. Have *perfect* grammar, spelling and punctuation skills. The very few who can communicate well on paper really stand out. Have oral presentation skills. Be able to communicate concepts clearly to persons of varying education and intelligence levels. There's a very good chance working in government your GS-15 section head will have the equivalent of a 6th grade education and you'll have to dumb yourself down to his level without appearing to do so. Frankly, from reading your post, you need work in this area. I'm sure I've committed some sins in my reply also. Write white papers and have them published. That will build your confidence, credentials and put some money in your pocket. Every one of these monthly trade magazines needs a constant feed of editorial information. Write for them and help them solve their problems. Be certain you have a solid foundation and working knowledge of basic electronics. Many are into the exotic stuff without having a working knowledge of DC and AC theory. Not saying this about you, just observing. Everything builds on the basics. Consider surveillance threats can be broken down into two basic groups: radiated and conducted. Most of us, including many instructors, live 20 years in the past. Know the latest techniques in both these areas. Radiated -- learn as much as you can about various modulation techniques. Know digital, which is how the world is moving. SSB is nice to know but I doubt sideband is a real threat. However, spread spectrum is. Grab everything you can on this. Conducted -- take one or more courses in and know telephone systems. The modern digital ones are wide open to compromise by software manipulation sometimes at an operator level, most of which leave no trail. See if you can arrange to attend manufacturer's training for a modern PBX. The details vary between makes and models but the basics of digital wireline communications are the same. Know how to program a common brand of switch. It would be nice to be able to dump and verify programming, to look for things which aren't proper. We all claim we do that. We're all lying. Take some construction courses. Know how a building is put together. Know what's supposed to be behind that wall and above that ceiling. Know something about electrical. Know some carpentry. Learn something about acoustic leakage. Know how to install and remove carpeting. Study something on optics. Learn about fiber. Know video, and digital video. Know real world RF propogation, multipath, gain. Know antennas. Note I do not say 'take a course in'. I say 'KNOW'. People get the two confused. > In these classes I was exposed to alot of the lab grade equipment that > I often see refered to on this list. The real world you will be entering is quite a bit different from what you'll see on this list. You of course want to be comfortable with standard test equipment, TDR, spectrum analyzer, FFT. You need to be able to operate this stuff with little instruction. You won't know every piece out there, but if you *undestand* the basics as opposed to memorizing knob twisting, you'll be able to walk up to an unfamiliar piece and do something intelligent with it. Get hands on. You don't do this in a classroom. Go to work for a burglar alarm installer, a video systems installer, a telephone systems installer, a two way radio firm. Work hard for them and get all sweaty and get the practical experience at their expense. Exposure to basic investigation and forensics wouldn't hurt. If you want to defeat spies, learn to think like one. There's a limit to how much 'positive' work you can do in the private sector. If you can get employed by any government agency, doors will open in training in areas otherwise restricted. If you can get employed by any enforcement agency, you will be eligible to join associations such as NATIA www.natia.org and participate in their training which will be very valuable. Get a commercial or amateur radio license. Even if you have no interest in communications other than as a profession, a license of some sort is a credential. I haven't kept up with commercial licensing, but you want whatever is the current equivalent of a first class radiotelephone license. Know microwave. Antennas. Be able to do path loss calculations. Know how to manipulate decibels instinctively. Do some web research and you'll find a lot of government documents on their work in the TSCM field. Learn one or more foreign languages. If you can speak Arabic you'll have a serious leg up on the competition. Stay away from anything in any area of your life which could cause you legal problems. Again not referring to you, but in general. One drug bust will undo a college degree. Have no skeletons in the closet. Consider every act you do and how it may affect your eligibility for a security clearance. Make sure you're in excellent physical condition. If you get into the real world of TSCM, which very few ever do, you'll need to be in good shape. Most of the above is in the 'do what I say, not what I do' category. It sounds as if you are serious, have a defined goal and willing to pay your dues. That's great. You seem to have the proper attitude. That will be in your favor when the selection process begins. Good luck with your work. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8565 From: Steven Donnell WA1YKL Date: Mon May 3, 2004 6:33pm Subject: Re: Terrorist Alert Bin Workin (has)Bin Outsourced,,,, SD NoPositiveWork@a... wrote: > ATTN: All Employees > > Recently we have received credible intelligence that there have been seven > terrorists working in your office. Six of the seven have been apprehended. > > Bin Sleepin, Bin Loafin, Bin Goofin, Bin Lunchin, Bin Drinkin, and Bin > Ass-Kissin have been taken into custody. At this time, no one fitting > the description of the seventh cell member, Bin Workin, has been found at > your office. We are confident that anyone who looks like he's Bin Workin > will be ery easy to spot. You are OBVIOUSLY not a suspect at this time so > keep > doing what you Bin Doin. From: ed Date: Thu May 2, 2002 10:04am Subject: Government wiretap figures are misleading >X-Sender: declan@m... >X-Mailer: QUALCOMM Windows Eudora Version 5.1 >Date: Wed, 01 May 2002 22:57:20 -0400 >To: politech@p... >From: Declan McCullagh >Subject: FC: EPIC's David Sobel: Government wiretap figures are misleading >Sender: owner-politech@p... >Reply-To: declan@w... >X-URL: Politech is at http://www.politechbot.com/ >X-Author: Declan McCullagh is at http://www.mccullagh.org/ >X-News-Site: Cluebot is at http://www.cluebot.com/ >X-Status: > >Previous Politech message: > >"Secret FISA court approved fewer surveillance applications in 2001" >http://www.politechbot.com/p-03468.html > >--- > >Date: Wed, 1 May 2002 11:35:17 -0400 >To: declan@w... >From: David Sobel >Subject: Re: FC: Secret FISA court approved fewer surveillance >applications in 2001 > >Declan - > >These numbers need to be taken with a very large grain of salt. >Ashcroft himself pretty much acknowledged this in Ted Bridis' AP >report: > > >Attorney General John Ashcroft said Tuesday the new Patriot Act, which > >amended the 1978 surveillance statute, made it easier for authorities > >to request fewer warrants since they don't expire as quickly and can > >be used in some cases across jurisdictions. > > > >"The Patriot Act provides some measures of efficiency that can be of > >assistance to us, and I think it would be fair to interpret the data > >in light of that," Ashcroft said. > >http://story.news.yahoo.com/news?tmpl=story&u=/ap/20020430/ap_on_go_ca_st_pe/terror_wiretaps_2 > >Among other things, the PATRIOT Act also authorizes what DOJ has >characterized as "generic" FISA orders which allow one warrant to >be served on multiple service providers. These new numbers underscore >the inadequacy of the current reporting requirements; we really need >to know how many individuals and how many communications facilities >were covered by these orders. > >- David > > > >Politech archive on FISA: > >http://www.politechbot.com/cgi-bin/politech.cgi?name=fisa > > > >EFF "frequently asked questions" on FISA: > >http://www.eff.org/Censorship/Terrorism_militias/fisa_faq.html > > > >--- > > > >http://www.fas.org/irp/news/2002/04/fisa01.html > > > > > > Office of the Attorney General > > Washington, DC 20530 > > > > April 29, 2002 > > > > Mr. L. Ralph Meacham > > Director, Administrative Office of the United States Courts > > Washington, D.C. 20544 > > > > Dear Mr. Meacham: > > > > This report is submitted pursuant to the Foreign Intelligence > > Surveillance Act of 1978, Title 50, United States Code, Section > > 1807, as amended. > > > > During calendar year 2001, 932 applications were made to the > > Foreign Intelligence Surveillance Court for electronic surveillance > > and physical search. The Court approved 934 applications in 2001. > > Two of the 934 applications were filed with the Foreign > > Intelligence Surveillance Court in December 2000 and approved in > > January 2001. Two orders and two warrants were modified by the > > Court. No orders were entered which denied the requested authority. > > > > Sincerely, > > Larry D. Thompson > > Acting Attorney General > > _________________________________________________________________ > > > > Source: Justice Department hardcopy; HTML by FAS > > > > > > > > > >------------------------------------------------------------------------- > >POLITECH -- Declan McCullagh's politics and technology mailing list > >You may redistribute this message freely if you include this notice. > >To subscribe to Politech: http://www.politechbot.com/info/subscribe.html > >This message is archived at http://www.politechbot.com/ > >Declan McCullagh's photographs are at http://www.mccullagh.org/ > >------------------------------------------------------------------------- > >Sign this pro-therapeutic cloning petition: http://www.franklinsociety.org > >------------------------------------------------------------------------- > > >-- >....................................................................... >David L. Sobel, General Counsel * +1 202 483 1140 (tel) >Electronic Privacy Information Center * +1 202 483 1248 (fax) >1718 Connecticut Ave., N.W. Suite 200 * sobel@e... >Washington, DC 20009 USA * http://www.epic.org > > >------------------------------------------------------------------------- >POLITECH -- Declan McCullagh's politics and technology mailing list >You may redistribute this message freely if you include this notice. >To subscribe to Politech: http://www.politechbot.com/info/subscribe.html >This message is archived at http://www.politechbot.com/ >Declan McCullagh's photographs are at http://www.mccullagh.org/ >------------------------------------------------------------------------- >Sign this pro-therapeutic cloning petition: http://www.franklinsociety.org >------------------------------------------------------------------------- > 5284 From: Date: Thu May 2, 2002 7:56am Subject: Recorder Used in Priest Probe Recorder Used in Priest Probe Investigation: Man who says he was molested as a boy wears a wire when he confronts cleric. By WILLIAM LOBDELL, RICHARD WINTON and BETH SHUSTER Times Staff Writer May 2 2002 An alleged victim of priestly sexual abuse said Wednesday he wore a hidden recording device to confront the cleric in an effort to help prosecutors and detectives develop evidence against the priest. The move was intended to overcome statute-of-limitations problems that could compromise prosecution in some cases of priest abuse, a law enforcement source said. It demonstrated the difficulty authorities face in cases in which the alleged crime is often a decade or more old. Jeff Griswold, 31, who asked that The Times publish his name, said he made his story public because he is frustrated by state statute-of-limitation laws and the possibility that his complaint against an Azusa priest won't be prosecuted. The Los Angeles County Sheriff's Department said Wednesday that Griswold's allegation against Father David Granadino, who until recently worked at St. Frances of Rome Catholic Church, is one of 18 investigations of 16 Catholic priests involving about 50 victims. It was the first accounting by the Sheriff's Department. The Los Angeles Police Department has said it is investigating 50 allegations of priestly abuse. Sgt. Dan Scott of the department's Family Crimes Bureau said some of the cases stem from years-old allegations and that some could fall victim to statute-of-limitations laws. Currently, there is a 10-year statute of limitations on cases involving most types of molestation of children 15 and younger. However, prosecutors can pursue these older cases if they have "clear and convincing" contemporary corroborating evidence. Examples include additional victims, a confession, letters or diaries--and evidence of substantial sexual conduct, Scott said. In Griswold's case, Scott said, no decision has been made about whether to move ahead with criminal charges. However, sheriff's officials were privately upset that an alleged victim had taken his case to the media before they completed the investigation. Griswold, a Norwalk resident, told sheriff's investigators in December that he had been sexually abused by the priest beginning when he was 13 and continuing into his early 20s. Detectives also are investigating allegations by two others against Granadino that allegedly occurred beginning more than 15 years ago. The Sheriff's Department opened a second investigation into sexual abuse accusations against Granadino in March, after an alleged victim reported the abuse to the Los Angeles Archdiocese's hotline. Cardinal Roger M. Mahony has said he moved Granadino from St. Frances of Rome after that anonymous allegation was made. Sheriff's detectives have interviewed about 100 children and adults in that probe. When the allegations became public, Granadino was transferred to a retreat at an abbey south of Palmdale. Detectives say they have not interviewed the priest, and they say his attorney has told them he has "relocated" from the abbey to an undisclosed location. Sheriff's officials said they were unsure when the archdiocese was notified about the December allegations. Asked whether the archdiocese was cooperating with the Sheriff's Department, Scott said he had "no comment." Granadino, who is also a Sheriff's Department chaplain, has "forcefully denied any misconduct," according to an exchange of e-mails by top archdiocese officials. His attorney, Don Steier, said, "Father Granadino is upset, but more upset for what is going on in his parish than for himself." Scott would not confirm the contents of the recording Griswold made but added, "We aren't going to deny what the victim said about helping us." Griswold, who conducted media interviews in the Irvine office of attorney Katherine K. Freberg, said he wore a small tape recorder--disguised as a pager--while meeting with Granadino in the rectory of St. Frances of Rome. Griswold said he began the short conversation with the priest by saying, "I'm trying to understand some things that happened in the past." He said he went on to detail some alleged molestations and the priest replied: "It's not your fault." Griswold said he didn't remember the priest apologizing, but recalled the priest saying more than once, "It's not your fault. It's my fault." He said he made contact with the police Dec. 10, before a national sex abuse scandal erupted in Catholic parishes across the country. Griswold said he came forward after receiving "a gift from God" that told him to make sure other children would not be molested. "I finally realized what [Granadino] did was wrong," Griswold said. "It was time. I didn't want any other kids to be hurt." Griswold said his father died when he was 7, and when he was a young teen, Granadino, then a priest at St. John of God Catholic Church in Norwalk, became like a second father to him. He said the priest took him to dinners, movies and on overnight trips. Griswold said the relationship continued even after Granadino was transferred to parishes in Pacific Palisades and Azusa. "He told me, 'You're my godson,'" Griswold said. "He told me that he loved me. My father wasn't around. He definitely filled the father void. I just didn't understand it." Sheriff's officials and prosecutors would not comment on whether Griswold's case would be harmed by the disclosure of the recording device. Los Angeles County Deputy Dist. Atty. Steve Katz, who works in the sex crimes unit, said prosecutors won't discuss the case until they decide whether to press charges. The Archdiocese of Los Angeles has forwarded the names of at least eight priests removed from the ministry this spring to police as well as several others reported to its hotline. On Monday, Mahony and the archdiocese were named in two racketeering lawsuits filed by four men who allege that they were molested as boys by the Rev. Carl Sutphin. They allege church officials promised to remove Sutphin from the church in 1991, but instead transferred him to the new downtown cathedral before forcing him to retire recently. http://www.latimes.com/news/local/la-050202probe.story?coll=la%2Dheadlines%2Dc alifornia 5285 From: Steve Uhrig Date: Thu May 2, 2002 0:28pm Subject: Re: Recorder Used in Priest Probe On 2 May 2002 at 12:56, MACCFound@a... wrote: > An alleged victim of priestly sexual abuse said Wednesday he wore a > hidden recording device to confront the cleric in an effort to help > prosecutors and detectives develop evidence against the priest. > ... The Los Angeles County Sheriff's Department ... California is a 2 party consent state. Cal. Penal Code ß 631, 632 First offense punishable by up to $2500 and up to one year. Second offense up to $10,000 but same one year. Anyone injured by a violation of the wiretapping laws can recover civil damages of $5,000 or three times actual damages, whichever is greater. Cal. Penal Code ß 637.2(a) (Deering 1999). So is the victim admitting to a crime, in conspiracy with the police and prosecutors? Can the priest sue for civil damages? (note I most definitely am *not* defending any Catholic priest). Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5286 From: Date: Thu May 2, 2002 3:22pm Subject: CIA, Cameras etc. Just to follow up on Steve's comments.. back low those many years ago when I worked for or lets say drew a check from that infamous agency, I visited the store Steve mentioned on one of my only three actual visits to HQ at Langley. The store was selling then sets of walkie-talkies (then they were 27mhz or mcs then but they only kept them in the store for a while due to employees took them back to their desks and gave one of them to a friend on the thrid or fourth floor and used them for friendly conversations. The fact was that the agency had broken its own rules and also was allowing its own Headquarters staff to operate unlicensed and unauthorized radios inside the complex. It finally smoothed out and the dust settled and no one got fired (I think so anyway). I havent visited the store in a few years but they might stock some of the new FRS family radios but probably not. Bill 5287 From: sdonnell Date: Thu May 2, 2002 4:20pm Subject: Re: The evil Pringles can strikes again! Hi, Yeah I caught that one too, cute. Anyone have the dimensions on the Pringles Antenna. Looks like a fairly simple "disc yagi". We recently took a look inside a Radio Snack 15-1971 Video tx/rx link(2.4G); Its pretty easy to mod for full 2.4 - 2.5GHz tuning, as its uses a voltage tuned LO. It can go wider than 2.4-2.5(2.2G for the low end, didnt try higher, but 2.6,2.7 is likely; Just use +8v instead of +5v for bias source). There is also RSSI available and it might be useful to tap the IF(480 MHz) and feed into a scanner set for WFM. Could be useful as a quick and dirty way to sweep 2.4G for low-level threats,,. The 15-1971 has CH3 RF signal out, whereas the x10 only has baseband video. Not sure about the AT&T connection. Maybe MSNBC uses them as "technology consultants"(?) Off hand it sounds more like too many engineers w/ far too much time on their hands. Sort of reminds me of some time spent at The (Merrimac) Valley, NAndover. Also see Dilbert. Wonder how long it will be till we see a (consumer)video link that includes scrambling... Steve DE WA1YKL Mitch D wrote: > I watched a report on MSNBC last night, that entailed a NBC reporter > riding around an area of NJ, with an employee of AT&T.Both in a > car,with a > laptop, that was equipped w a vid card,and was connected to a Pringles > > can, w a Yagi type antenna indside of it,roving for video signals > generated by a known X-10 camera system source. [Non-text portions of this message have been removed] 5288 From: William Knowles Date: Thu May 2, 2002 9:34pm Subject: Re: The evil Pringles can strikes again! On Thu, 2 May 2002, sdonnell wrote: > Hi, Yeah I caught that one too, cute. Anyone have the dimensions on > the Pringles Antenna. Looks like a fairly simple "disc yagi". I haven't got around to building one yet, too many other projects around here needing my attention... These are the two sources for building one. http://www.netscum.com/~clapp/wireless.html http://www.oreillynet.com/cs/weblog/view/wlg/448/ Cheers! William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 5289 From: Matthew Paulsen Date: Fri May 3, 2002 10:46am Subject: RE: Rhetorical question - CIA I wonder if the reverse is true. Can you take them out? -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Thursday, May 02, 2002 8:36 AM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Rhetorical question - CIA The CIA does not permit cameras (electronic or film), mechanical or digital audio recorders, etc. to be brought into their HQ at Langley. Can't even take my Minox in. They're pretty strict. No nonsense. Not lip service. The employee store, inside the secure area, sells 35mm disposable cameras like you'd buy at the 7-11. ??? Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5290 From: James M. Atkinson Date: Fri May 3, 2002 4:15pm Subject: Funeral Arrangements A well known cardiologist recently died, and an elaborate funeral service was planned. A huge heart covered in flowers stood behind the casket during the service. Following the eulogy, the heart opened, and the casket rolled inside. The heart then closed sealing the doctor in the beautiful heart forever. At that point one of the mourners burst into hysterical laughter. When confronted, he said, " I'm sorry, I was just thinking of my own funeral... I'm a proctologist." -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5291 From: James M. Atkinson Date: Sun May 5, 2002 9:25pm Subject: New Star Wars video Here is a New Star Wars video the list may find of interest. http://www.wired.com/news/print/0,1294,52231,00.html Click on the video on the far upper right hand side of the page. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5292 From: Aimee Farr Date: Mon May 6, 2002 9:29am Subject: Bill to criminalize fraudulent domain registration info Bill would impose criminal penalties for those who knowingly submit incorrect contact information when registering domain names. Fines/up to 5 years. (knowingly and with intent to defraud) http://www.lextext.com/coble.pdf http://www.newsbytes.com/news/02/176371.html ~Aimee 5293 From: Matthew Paulsen Date: Mon May 6, 2002 11:03am Subject: RE: Bill to criminalize fraudulent domain registration info Good step, it would also be nice to see fines imposed on ISP's that allow domain parking and email services to unverified entities that initiate fradulent actions. For example, Verisign is horribly abused and yet they don't take any hard course of action to resolve this issue. A bit extreme perhaps, perhaps if we started at that side we'd find a good medium that would work out for everyone involved to resolve this issue. -----Original Message----- From: Aimee Farr [mailto:aimee.farr@p...] Sent: Monday, May 06, 2002 7:29 AM To: TSCM-L Mailing List Subject: [TSCM-L] Bill to criminalize fraudulent domain registration info Bill would impose criminal penalties for those who knowingly submit incorrect contact information when registering domain names. Fines/up to 5 years. (knowingly and with intent to defraud) http://www.lextext.com/coble.pdf http://www.newsbytes.com/news/02/176371.html ~Aimee Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5294 From: Aimee Farr Date: Mon May 6, 2002 0:30pm Subject: RE: Bill to criminalize fraudulent domain registration info Is it? I'm not so sure, and certainly open-ended. The object of criminal law is a deterrence function, and I don't know that it will DETER THE CRIME OF FRAUD. The recent drop mailbox regs came under a lot of fire, some of which was pretty well-reasoned. BTW, did I say we needed more deception in here? I might have ruffled some feathers. I am receiving a lot of "replies" and "legal queries" in regard to child pornography this morning. Apparently, I'm being spoofed, even into a "hot" practice area, by a "master of deception." People have the tendency to equivocate deception with the likes of past domestic COINTELPROish nonsense. (Strange, considering my political leanings and academic interests.) ~Aimee > -----Original Message----- > From: Matthew Paulsen [mailto:mpaulsen6@a...] > Good step, it would also be nice to see fines imposed on ISP's that allow > domain parking and email services to unverified entities that initiate > fradulent actions. For example, Verisign is horribly abused and yet they > don't take any hard course of action to resolve this issue. A bit extreme > perhaps, perhaps if we started at that side we'd find a good medium that > would work out for everyone involved to resolve this issue. 5295 From: Matthew Paulsen Date: Mon May 6, 2002 1:20pm Subject: RE: Bill to criminalize fraudulent domain registration info In my opinion (of what worth it is.. anyone have spare change?) yes. it is. I'd agree it's open-ended, but it is a good point in its basis. This is a common problem. It does need to be dealt with. ISP's and Registrars have proven they have a lack of interest in a: knowing who their customers really are, b: protecting their namespaces/ip blocks from abuse and c: working internally to actively support investigations of suspects with other organizations both government and private based. If ISP's and Registrars aren't going to self police themselves and work with others outside their organizations to protect others from the abuses of their clients - be they criminals or not - policymakers and government should enact laws to protect the innocent - the people who are victims of identity theft and the retailers losing capital due to the theft. I do believe that it WILL deter the crime of fraud IN THIS MEDIUM if enacted and enforced properly, granted, it may just move somewhere else. It would also help if retailers followed specific steps to deter the fraud themselves and there should be a working for companies to look to to enable good practices towards deterring fraud and I'm not talking about some grassroots website, but specifics from policymakers that software firms and other parties that are involved, should follow. Companies that do automatic bill payment through payment gateways for example are not setting a good standard, just as companies that OFFER the service to retailers aren't setting a good example. But, setting laws here in the United States is only a portion of the battle. As I have previously said, there needs to be unilateral support from all governments involved to properly enforce these acts (haha yea right, in a perfect world, right..). Having laws here doesn't do anyone a bit of good when the perpetrators are crossing international boundaries, for example - from the US to Saudi Arabia to Pakistan, when the US doesn't have the support of the local policing force(s) (if there is one at all ( or one not corrupted to the point of incompetence)) to apprehend these criminals. Matt -----Original Message----- From: Aimee Farr [mailto:aimee.farr@p...] Sent: Monday, May 06, 2002 10:30 AM To: TSCM-L Mailing List Subject: RE: [TSCM-L] Bill to criminalize fraudulent domain registration info Is it? I'm not so sure, and certainly open-ended. The object of criminal law is a deterrence function, and I don't know that it will DETER THE CRIME OF FRAUD. The recent drop mailbox regs came under a lot of fire, some of which was pretty well-reasoned. BTW, did I say we needed more deception in here? I might have ruffled some feathers. I am receiving a lot of "replies" and "legal queries" in regard to child pornography this morning. Apparently, I'm being spoofed, even into a "hot" practice area, by a "master of deception." People have the tendency to equivocate deception with the likes of past domestic COINTELPROish nonsense. (Strange, considering my political leanings and academic interests.) ~Aimee > -----Original Message----- > From: Matthew Paulsen [mailto:mpaulsen6@a...] > Good step, it would also be nice to see fines imposed on ISP's that allow > domain parking and email services to unverified entities that initiate > fradulent actions. For example, Verisign is horribly abused and yet they > don't take any hard course of action to resolve this issue. A bit extreme > perhaps, perhaps if we started at that side we'd find a good medium that > would work out for everyone involved to resolve this issue. Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5296 From: Matthew Paulsen Date: Mon May 6, 2002 1:24pm Subject: RE: Bill to criminalize fraudulent domain registration info That should say... working body for companies .. not working for companies -----Original Message----- From: Matthew Paulsen [mailto:mpaulsen6@a...] Sent: Monday, May 06, 2002 11:20 AM To: 'TSCM submissions' Subject: RE: [TSCM-L] Bill to criminalize fraudulent domain registration info In my opinion (of what worth it is.. anyone have spare change?) yes. it is. I'd agree it's open-ended, but it is a good point in its basis. This is a common problem. It does need to be dealt with. ISP's and Registrars have proven they have a lack of interest in a: knowing who their customers really are, b: protecting their namespaces/ip blocks from abuse and c: working internally to actively support investigations of suspects with other organizations both government and private based. If ISP's and Registrars aren't going to self police themselves and work with others outside their organizations to protect others from the abuses of their clients - be they criminals or not - policymakers and government should enact laws to protect the innocent - the people who are victims of identity theft and the retailers losing capital due to the theft. I do believe that it WILL deter the crime of fraud IN THIS MEDIUM if enacted and enforced properly, granted, it may just move somewhere else. It would also help if retailers followed specific steps to deter the fraud themselves and there should be a working for companies to look to to enable good practices towards deterring fraud and I'm not talking about some grassroots website, but specifics from policymakers that software firms and other parties that are involved, should follow. Companies that do automatic bill payment through payment gateways for example are not setting a good standard, just as companies that OFFER the service to retailers aren't setting a good example. But, setting laws here in the United States is only a portion of the battle. As I have previously said, there needs to be unilateral support from all governments involved to properly enforce these acts (haha yea right, in a perfect world, right..). Having laws here doesn't do anyone a bit of good when the perpetrators are crossing international boundaries, for example - from the US to Saudi Arabia to Pakistan, when the US doesn't have the support of the local policing force(s) (if there is one at all ( or one not corrupted to the point of incompetence)) to apprehend these criminals. Matt -----Original Message----- From: Aimee Farr [mailto:aimee.farr@p...] Sent: Monday, May 06, 2002 10:30 AM To: TSCM-L Mailing List Subject: RE: [TSCM-L] Bill to criminalize fraudulent domain registration info Is it? I'm not so sure, and certainly open-ended. The object of criminal law is a deterrence function, and I don't know that it will DETER THE CRIME OF FRAUD. The recent drop mailbox regs came under a lot of fire, some of which was pretty well-reasoned. BTW, did I say we needed more deception in here? I might have ruffled some feathers. I am receiving a lot of "replies" and "legal queries" in regard to child pornography this morning. Apparently, I'm being spoofed, even into a "hot" practice area, by a "master of deception." People have the tendency to equivocate deception with the likes of past domestic COINTELPROish nonsense. (Strange, considering my political leanings and academic interests.) ~Aimee > -----Original Message----- > From: Matthew Paulsen [mailto:mpaulsen6@a...] > Good step, it would also be nice to see fines imposed on ISP's that allow > domain parking and email services to unverified entities that initiate > fradulent actions. For example, Verisign is horribly abused and yet they > don't take any hard course of action to resolve this issue. A bit extreme > perhaps, perhaps if we started at that side we'd find a good medium that > would work out for everyone involved to resolve this issue. Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5297 From: Date: Mon May 6, 2002 7:12pm Subject: Electronic Harassment Licensed investigator researching claims of individuals that aspects of their physiology and even mental states are being effected by the actions of others in access of a "neuro-influencing technology". This investigator is seeking reports of direct experiences of the countermeaures community in this regard. This is a pro bono issue. "....acquaintances, they ask me how I am. I reply I can't complain. I wouldn't know where to." Ludvik Vaculik (a banned and destitute writer during the occupation of Prague.) 5298 From: Hawkspirit Date: Tue May 7, 2002 0:43pm Subject: Sweep Any one in the Charlotte North Carolina area that can handle a sweep contact me. You must have sweep gear that will go out at least 18GHZ, ether spectrum analyzer or surveillance receiver. This is a requirement. Roger Tolces 5299 From: Aimee Farr Date: Tue May 7, 2002 3:17pm Subject: RE: Bill to criminalize fraudulent domain registration info M Paulsen wrote: > I do believe that it WILL > deter > the crime of fraud IN THIS MEDIUM if enacted and enforced properly, > granted, move elsewhere Conditions for Deception o Parties in contention on interest/resource, or some form rivalry o Parties acquire and process information o Information can be transmitted to parties via channels, linkage o Parties operating under uncertainty (lack complete knowledge) o Parties possess flexibility in decision-making and their courses of action Future o Increased virtual exchanges and networked structures place actors in contention more often o Non-traditional conflicts and new actors in complex environment o Information transmittal, channels, linkages enhanced and ìarmchair generalsî o ìInformation overloadî ambiguity problem o New ìurbanî terrain of complexity and cover o Time pressure for decision-making People pay more attention to the "what" than the "why." Identity-assurance is not THE PROBLEM. We just can't seem to bite the problem, so we treat a symptom. Not necessarily wrong, and sometimes a good strategy, but not necessarily effective. Maybe "sign up here to be arrested laws," increase the certainty in punishment, with a low deterrence value, rather than increasing the uncertainty of detection, offering a higher deterrence value? (Just a question in some contexts.) The way decision-makers see the importance of the objective/answer affects their probability determination as to whether or not it will solve the problem and can be obtained. In other words, people who think identity assurance is important, will believe: 1. it will work 2. it doesn't cost too much and vice-versa. Ponder the relevance to private security measures, and our intelligence emphasis. Our constitutional, statutory and procedural protections also serve a strategic purpose -- your limit can limit your adversary by controlling evolutionary pressures. Certainty in stepped or limited response can sometimes be better than 'all of nothing' shotgun solutions. For this reason, "surveillance brinkmanship," (whatever the form) unless thought through, comes with a built-in boomerang due to the nature of strategic interaction: the fruit moves up the tree. Concealment is a reflexive, survival response. Crime is competitive and networked. The result is a counterdeception spiral -- and one that we must learn to consider in policy decisions and the fielding of technology (marked by wasted shots, short half-life, too-quick blue paint, and so on.) We don't catch more criminals if we make them harder to catch. ~Aimee 5300 From: Date: Tue May 7, 2002 1:30pm Subject: Schools turn to 'smart lockers' to track student activity From the May 07, 2002 edition - http://www.csmonitor.com Schools turn to 'smart lockers' to track student activity To the chagrin of privacy advocates, card-swipe system allows principals to access student storage areas. By Patrik Jonsson | Special to The Christian Science Monitor ROBERTA, GA. - Next to a picture of his girlfriend, Demario Smith has an illegal stash in his locker at Crawford County High School. It's not a pen-knife or a baggie of pot. It's a cache of magazines with glossy pictures of low-rider cars which, at this school in rural Georgia, is forbidden. The locker has long been viewed by students as their own two square feet of personal space in schools. But that may soon change. A new invention called the "smart locker" would allow principals across the country easy access to lockers and even monitor how often students use them. Opened with "swipe cards," rather than padlocks, these lockers can be operated from a computer in the central office where they can be opened individually or all at once. It would even be possible to conduct a "schoolwide lockdown." And if a student uses his locker when he should be in class, the school will soon know about it. Officials may even be tipped off as to whether a student is using his storage space for drug dealing. "If a principal notices that a student is going in and out of his locker 18 times a day, that can raise suspicions," says Harry Popolow, senior project manager of Penco, a manufacturer of the smart lockers. Already, four major school districts have already lined up to buy and some techno-keen kids call the idea "way cool." Yet critics say that these devices whittle away at the tiny sliver of privacy students have at school. Proponents argue it's a necessary step to keep guns and drugs out of schools. "It's an idea whose time, unfortunately, has come," says John Locke, CEO of Digitech International, the Asheville, N.C., firm that developed the software. It's also an idea with a potentially huge market considering that there are some 150 million school lockers in the US. And, although each locker can cost as much as $300 each, studies show that most principals consider "security" a top priority. But many principals, though cognizant of student-privacy rights, will likely take a hard look at the new system. It would allow them, for example to search lockers for guns. The idea of keeping closer tabs on individual students for the safety of the whole is catching on. "Public schools have to become safer," Mr. Popolow says. Proponents say the courts have ruled that, essentially, the school can do "anything it wants" with school property. But others say that principals still have to apply the basic tenets of the Fourth Amendment's guarantees against warrantless searches and seizures. "You're definitely invading privacy when you're talking about tracking their comings and goings," says C.L. Lindsay III, the director of the Coalition for Student and Academic Rights (COSTAR) in Solebury, Pa. "Whether that's an invasion that's too invasive, that's still up in the air." The irony, many say, is that these efforts often target kids who aren't doing anything wrong. "It's sort of the idea of you and I having homes and the local police having the keys," says Michael Carr, a spokesman for the National Association of Secondary School Principals in Reston, Va. For now, Penco has received more applause than resistance. Indeed, most college dorms in America now have replaced metal keys with plastic cards. Many teens would love to flash cards. At Southwest Magnet High School and Law Academy in Macon, Ga., Sharda Davis, a freshman, says students there would love such lockers, since they could stop a problem of students breaking into each other's lockers. But here in Roberta, Smith says he'd rather keep his own personal combination lock and private access. "These smart lockers would allow a school to fool around where they're not supposed to be." The locker is a glimmer of personality in a gray institution, he says. In a way, the lockers here are the front porch of the hallway, where students gather to flirt and pin up pictures of Linkin Park and Shaq. "In these huge schools of 3,000 and 4,000 students, the only things that make you an individual are the way you dress and your personal locker space," says Carr. Other critics see smart lockers as part of a trend where spy gadgets like surveillance cameras, metal detectors and profiling technology are tested on a young generation at the stage where they're taking on the mantle of citizens. "There does seem to be an assumption that it's OK to impose these kinds of technologies on students when other citizens certainly wouldn't put up with it," says Ann Beeson, a lawyer at the American Civil Liberties Union in Washington, D.C. For now, at least, Demario Smith doesn't have to worry too much. Ken Copenhaver, the assistant principal at Crawford County High says, "It sounds like a great idea, but there's no way our rural school district could afford those kinds of lockers. We have too many other things to worry about, like getting new textbooks." Full HTML version of this story which may include photos, graphics, and related links http://www.csmonitor.com/2002/0507/p02s02-ussc.html 5301 From: James M. Atkinson Date: Tue May 7, 2002 10:01pm Subject: Supporters line up behind eavesdropping township clerk http://www.mlive.com/news/bctimes/index.ssf?/xml/story.ssf/html_standard.xsl?/base/news/1019576701196195.xml Supporters line up behind eavesdropping township clerk Tuesday, April 23, 2002 By Helen Lounsbury TIMES WRITER Supporters for a Sims Township clerk accused of eavesdropping have taken a stand, circulating petitions that urge Arenac County's prosecutor not to force their elected clerk from office. Sims Township Clerk Jennifer Maser had been scheduled for an evidence hearing on the felony eavesdropping charge Monday in Arenac District Court. Police allege that Maser listened in on two private telephone conversations last November. But a judge postponed Monday's hearing because Maser's attorney had a scheduling conflict. The change didn't stop the clerk's supporters from turning in 50-plus township signatures on Maser's behalf at the county building. "The Prosecuting Attorney should not have the right to supersede the will of the majority of voters in the last election," the petition reads. Maser's attorney, James Brisbois Jr. of Saginaw, said the signatures validate his belief that the case against the clerk is politically motivated. "It think it's all political," Brisbois said. "It's clear the victim wants her out of office." According to investigators, Maser overheard the victim talking by telephone about the clerk's role in a township sidewalk project. During the conversation, the speaker suggested that Maser had accepted a bribe for the project. The victim became aware that Maser had heard their conversation uninvited when the clerk confronted the speaker to deny she'd ever taken a bribe. Prosecutor Curtis Broughton and Brisbois discussed a potential plea agreement that involved Maser's resignation from office. The agreement was rejected by Maser and her attorney. State law says it's illegal to use a device to listen in on phone conversations without the parties' consent. Brisbois maintains that the statute also requires the listener to eavesdrop "on purpose." Maser told police she overheard the conversations inadvertently. Her scanner broadcast the phone calls while her daughter was trying to get information about a nearby traffic accident, Brisbois said. Maser is scheduled for a hearing on the evidence at 2:30 p.m. Monday. © 2002 Bay City Times. Used with permission Copyright 2002 Michigan Live. All Rights Reserved. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5302 From: Perry Myers Date: Tue May 7, 2002 8:01am Subject: Panasonic Toner & Drums I have several new boxes of toner for a Panasonic Fax Model #KXA 145. If anyone is interested please send me a note. Perry D. Myers, CFE President & CEO E-mail: perry@d... MSI Detective Services Myers Service, Inc. Corporate Headquarters 2076 N. Elston Ave. Suite 200 Chicago, IL. 60614-3940 Phone 773-342-8300 Facsimile 773-486-4430 Professional Investigators Since 1959 Investigations Nationwide 24 Hour Availability www.detectiveservices.com Process Service Division - Downtown Chicago 205 W. Randolph St., Ste. 1210 Chicago, IL. 60606 Phone 312-782-4000 Fax 312-853-3119 For Security, Surveillance & Privacy Products U-Spy Store Chicago - Orlando - Internet Sales www.u-spystore.com Orlando Warehouse - (800) 393-4779 Chicago Sales - (773) 395-0220 For more information on our investigative services please visit our web site at www.detectiveservices.com This e-mail is strictly confidential. If you receive this e-mail in error, please forward immediately to info@d... --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.351 / Virus Database: 197 - Release Date: 4/19/2002 5303 From: Steve Uhrig Date: Tue May 7, 2002 11:15pm Subject: Are you a wizard? OK one and all - here's a question to separate the men from the boys. Anyone even thinking of working in the TSCM industry should have no trouble solving this simple technical riddle. Basic electricity and electronics training is a prerequisite to running around with expensive toys taking people's money trying to find hidden bug transmitters and wiretaps. ================= Here's the scenario. A suspicious-looking box was discovered in the boss's office the morning after a burglary in the electronics lab. You are tasked with identifying the box, and whether it is a surveillance threat or not. Picture a small black box. Aimee may picture a small pink box. While the physical size doesn't matter, let's say it's about the size of your fist. Plastic. Not connected to anything. However, there are 4 terminals on different sides of the box. The terminals are labeled A, B, C and D. Total of four terminals. You're not sure what's in the box. Your job is to decide what wiring, components, circuitry or whatever is in the box. There are no markings on the box. You are not able to open it. No visible or invisible clues. No tricks. No gimmicks. No lids, kids or space cadets. Guaranteed not to rust, bust or gather dust. If a condition or parameter is not specified here, it is irrelevant. You do not have access to an X-ray machine or any specialized tools or equipment beyond a standard VOM and junk most would have laying around a hobby workshop. If you aren't a ham or electronics experimenter and don't have a junk box, let's say you can have access to any components in a Radio Shack store. In testing, you happen to notice if you apply 1 volt AC at 60 cycles to any combination of two terminals, you get that same 1 volt AC coming out of the two remaining terminals. Doesn't matter which two you put AC into. Same thing comes out the other two. << The $64,000 question -- What's in the box? >> For the purposes of this discussion, assume perfect components, i.e., wire has no resistance, capacitors have no leakage, inductors have no DC resistance, diodes have no reverse current flow, etc. There are something in excess of 1300 members of this list, of which half will claim to be professional sweepers. I can name about ten people who I know will solve this immediately. I'd be real thrilled if a few hundred solved it. Do NOT post your answer to the list! Mail them to me directly. An important part of sweeping is the ability to write decent reports documenting the work you did. So here's a chance to write your findings in a short report. While the answer can be described in a few text sentences (it took me longer to type this message than it should take most to solve the riddle), feel free to fax me a drawing if you are like me and can communicate more easily with a drawing than with words. In a week or so, I will post the names of persons who provided the correct answer. I probably won't acknowledge incorrect ones unless you are close. Please indicate if you would prefer I *not* publish your name if you supply a correct answer. If list members enjoy this bit of electronic challenge, I'll work up some additional ones. My father, who is a long ago retired engineer, instantly knew the answer. It's not hard. It's basic electronics. If few are able to provide the correct answer, I'll post one or two clues, but they shouldn't be necessary. So -- are you a WIZARD? Or a LIZARD? Mail me the secret of what's in the box and be listed as a competent electronics man to more than a thousand members of this list. Be a hero. Get chicks. EMAIL REPLIES TO ME ONLY. DO NOT POST ANSWERS TO THE LIST OR THAT WILL SPOIL IT FOR EVERYONE! Please include the word WIZARD (case insensitive) in the subject line of your reply so I can filter responses. Merely replying to this email is adequate. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5304 From: William Knowles Date: Wed May 8, 2002 9:18pm Subject: Bomb Suspect Traced by Cell Phone http://www.wired.com/news/technology/0,1282,52396,00.html Associated Press 1:25 p.m. May 8, 2002 PDT SAN JOSE, California -- Mailbox bomb suspect Luke Helder made a crucial mistake while on the run: He turned on his cell phone. As soon as he activated it, FBI agents quickly triangulated his position between two rural towns and had him in handcuffs within an hour Tuesday, according to Nevada authorities. The fact that another motorist spotted Helder in passing helped authorities, but the cell phone signal like a locator beacon was a dead giveaway. "We got a call from the FBI at approximately 3:20 p.m. that the cell phone that (Helder) had been known to have had been activated somewhere between Battle Mountain and Golconda," said Maj. Rick Bradley of the Nevada Highway Patrol. "We started hitting Interstate 80." The Highway Patrol flooded the area with officers and quickly had Helder in custody, Bradley said Wednesday. Bradley said tracking down Helder without the pinpoint location provided by the FBI would have made the task tougher, given the sprawling region. "It's really a rural area. There's not that much police presence," Bradley said. Helder also placed a call to his parents' Minnesota home, and spoke with an FBI agent they handed the phone to. But the technology trick used by the FBI helped seal Helder's fate. Gayle Jacobs, a spokeswoman for the FBI's Las Vegas office, refused to go into detail about how the bureau did it, or even to acknowledge what it did. "As far as investigative technique, we don't disclose that information," Jacobs said. Cell phone triangulation is a well-known tracking method within the wireless industry, said Michael Barker, an equipment sales manager for Cell-Loc, based in Calgary, Alberta. His company provides tracking services to help people who are incapacitated and unable to dial for help. "Every time the cell phone is on, it periodically sends a little registration message to the phone company, 'Here I am! Here I am!'" Barker said. That message contains the cell phone's electronic serial number and tells the service provider when the phone has drifted in and out of cell tower range. Federal agents then easily can get in contact with the cell phone service company and get the location of the nearest cell tower in contact with the activated phone, Barker said. Law enforcement then can equip agents with devices designed to triangulate the signal and determine its location within about a third of a mile and the direction it was traveling in, Barker said. Handheld equipment for such a search is not sold to the general public, he said. Robin Gross, an attorney at the Electronic Frontier Foundation, warned that the technology could be abused. She said cell phone tracking could be used to follow the movements of political dissenters or politicians and other people in power. "I think it's inappropriate to be tracking people under some kind of assumption that they might do something illegal," Gross said. "I just think it's ripe for abuse by law enforcement and by government." *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 5305 From: Steve Uhrig Date: Wed May 8, 2002 9:42pm Subject: TDRs for sale Hello all, If you are serious about sweeping phone lines and do not have a TDR, you need one. Don't fool yourself. I've got several available, all Riser Bond, most current production, all working perfectly with new or very recent batteries, chargers, manuals, carrying cases etc. Info on using them as well as specific product info can be found on Riser Bond's excellent website http://www.riserbond.com. Available are quite a number of each of the following models: 2401B+ (little ping box with digital readout; possibly one of the most common TDRs used in TSCM). Must be used with an external oscilloscope with at least 100 Megacycle frequency response. Nicad powered. Best for beginners and/or anyone who already owns a decent oscilloscope. One of the more compact units; will fit in a briefcase where most of the others will not. 1205C -- has large LCD display built in, auto setting, very simple front panel, variable pulse widths, variable velocity factor, variable impedance. Backlit screen. Battery gauge. Automatically calculates and displays fault on the screen as well as distance to the fault and dB loss through the fault. Very nice unit, one of the Cadillacs of TDRs. Digital storage of traces can be downloaded to a computer or printer later. Very easy to use. Connect the line to test, turn it on, and it does it all automatically. Has automatic noise filters which switch in automatically to give you the cleanest trace. Waterproof Pelican case. 1205CX - later model than 1205C, no meaningful differences. 1205CXA -- now uses nickel metal battery instead of lead acid like in the 1205 and 1205C and 1205CX series, for lighter weight, longer life per charge. Has sub nanosecond pulse for finding intermittents or very quick happenings on digital lines. The absolute Cadillac of TDRs. Current model; see Riser Bond's website for details. 1300 -- Latest design, more compact, rugged packaging and made for someone who uses the thing extensively and wants an executive quality instrument to carry around. Designed especially for twisted pair, and can read through loading coils and a lot of other garbage. Seems to be the same specs and menu as 1205CXA, just in different packaging. Can read and display two metallic pairs at a time, so you easily can compare differences between one line and another. This particular TDR may be the best model for TSCM of all. See website. Model 1000 -- any type of cable, for length and faults only. Not especially suited for TSCM since there are no provisions for viewing a trace either internally or externally. Great for people who install cable and need to measure lengths or find faults but do not particularly care about TSCM. Digital readout to fault. Smallest TDR made by Riser Bond, and latest model. Contact me if you have an interest in picking up a top quality TDR that will last the rest of your career. Now is the best time since I have more in house now than I have had in years. Call me with your needs or to discuss where you are, and I will recommend the best one for your level of experience, your budget and your personal capabilities. A TDR is easy to use, can read rat piss on the lines, and separates the men from the boys. You'll need one eventually. Here's your chance to save a lot of money and probably buy a better unit than you will be able to afford in the future. Practice some with these things, get confident in it, and you will be a major reckoning force in the industry. Few professional sweepers have TDRs as nice as are described on this page. Most also come with leads, all come with manuals and chargers. All come with a padded carrying case OR a Pelican waterproof case (depending on model). Most also come with an outboard accessory pouch to hold extra sets of leads, jumper cables, the charger, etc. Most models have a place inside the lid to hold the instruction manual, a coax jumper and an alligator clip set of input leads. I can take credit cards and ship overnight if necessary. Call if interested in breaking through the equipment barrier from novice to journeyman. Are you going to play games all your life on telephone lines where the majority of the threats target, or are you going to equip yourself and learn to use the same silver bullet professionals use but like to keep quiet? Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5306 From: Aimee Farr Date: Thu May 9, 2002 7:59am Subject: Species recognition. [was....fraudulent domain..blah] The nature of communication exchange and mobility has thrown us back into "the jungle." Our range of vision is cut to nothing. We don't know what's out there, and everything can blend in, suddenly appear, and fade away. Nothing is what it seems. I pick the equivalent of a pretty flower and it bites me. That's upsetting. Rather than admitting I was stupid, I tell you it was mislabeled. Clearly, whoever is in charge of labeling things screwed up. Not me. We want to clear the jungle so we can "see" the predators. We aim for early recognition. It's our survival skill. However, the problem in many contexts isn't what we can't see, but how we interpret what we do see. And, we want everything to "be" what it looks like. So, we have taken to make that happen, but the rules of nature are of broad application. Some of you have grown an extra set of eyes and ears for certain parts of this jungle. A techno-aided evolution of -- enhanced senses and survival skills. I want to SHOW you what some people "SEE" when they meet an intelligent life-form with enhanced senses and survival skills: http://starshipmodeler.net/gallery3/vm_var_alien_1.jpg You immediately know that creature has only 1 idea in mind for you -- and it's a baddie. Instant recognition. Predator signature. You sense that it isn't just "different," it's "better." You won't be best friends. It's the oldest human story, and you KNOW how it turns out. Therein may lie one small answer to that puzzling question of why some people will hire that "less-proficient" guy over you, everything else being equal. At an instinctual level, some are increasing their chances of surviving the inevitable encounter. The "man-eating aliens from outer-space" schema is just a composite of our fears. Ever notice that when you say, "I WANT TO SHOW YOU SOMETHING REALLY INTERESTING...." or, "LET ME GIVE YOU SOME BACKGROUND INFORMATION...." it will cause some people's eyes to flicker toward an exit route, and you sense irrational discomfort that can't be explained by the context? Well, would you want THIS --> http://starshipmodeler.net/gallery3/vm_var_alien_1.jpg ...to show you "something really interesting?" Give you "background information?" Of course not. It all means one thing.... and it's a baddie. And, try not to smile too much. ~Aimee 5307 From: Hawkspirit Date: Thu May 9, 2002 8:16am Subject: History of Bugging I have just added to my website one of the best old group of articles's on the history of bugging and the great former personalities of our business. In my thirty years in the business, I have collected many filing cabinets of information. I especially want to thank Michael Adler formally of Sherwood Communications for a massive contribution to this collection over the years. He is the guy I call when I want to know anything about our business. Anyway, every one enjoy this reading. Roger Tolces Electronic Security, Los Angeles http://www.bugsweeps.com/info/telephone_taps.html http://www.bugsweeps.com/info/wonder_if_bugged.html http://www.bugsweeps.com/info/ways_to_tap_telephone.html 5308 From: Hawkspirit Date: Thu May 9, 2002 8:24am Subject: Cell Triangulator Any one know who makes this gear? "Law enforcement then can equip agents with devices designed to triangulate the signal and determine its location within about a third of a mile and the direction it was traveling in, Barker said. Handheld equipment for such a search is not sold to the general public, he said." 5309 From: Steve Uhrig Date: Thu May 9, 2002 8:52am Subject: Cell intercept case going to Supreme Court http://www.cnn.com/2000/LAW/12/04/scotus.wiretapping/ WASHINGTON (CNN) -- In a case involving the privacy of cellular- telephone conversations, the U.S. Supreme Court will decide if federal and state laws preventing people from using information obtained through illegal wiretaps violate the First Amendment. ... The cases arose out of an intercepted cell-phone conversation in 1993 between Pennsylvania teacher's union officials Gloria Bartnicki and Anthony Kane... ============ Steve's suppository remarks: Interesting case. TSCM marketers, take note. Management/union negotiations are one of the more common scenarios where electronic eavesdropping is used. Remember, in 1993, virtually all cellular communications was analog, and cell-capable scanners were much more readily available. The majority of mobile telephone now is digital, and cell-capable scanners for the few remaining analog phones are quite scarce. The instant case is an appeal to the Supreme Court from a PA federal court where: "In June 1996, the trial court ruled in favor of Bartnicki and Kane. The defendants can be held liable because the wiretapping laws do not violate the First Amendment, the judge ruled ... " If the Supreme Court upholds this twisted logic, I'll have to agree with Larry Flynt's analysis of the Supreme Court. Read the article. It's directly pertinent to our mission. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5310 From: Marcel Date: Thu May 9, 2002 9:32am Subject: Re: Cell Triangulator It is most likely a doppler unit. Check ramsey electronics,. for the "economy version" Hawkspirit wrote: > Any one know who makes this gear? > > "Law enforcement then can equip agents with devices designed to > triangulate the signal and determine its location within about a third > of a mile and the direction it was traveling in, Barker said. Handheld > equipment for such a search is not sold to the general public, he > said." > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 5311 From: James M. Atkinson Date: Thu May 9, 2002 10:49am Subject: Re: Cell Triangulator At 6:24 AM -0700 5/9/02, Hawkspirit wrote: >Any one know who makes this gear? > >"Law enforcement then can equip agents with devices designed to >triangulate the signal and determine its location within about a third >of a mile and the direction it was traveling in, Barker said. Handheld >equipment for such a search is not sold to the general public, he >said." Actually many of the cellular service providers can provide a pretty good fix by watching the customer via the sector antennas used on the tower. Quite literally as you change sectors, and eventually change towers the cellular company can watch the phone moving on a map (I have personally seen this, been formally trained on this, and have been involved in projects where this was done). The DF resolution is dependent on the range of the cells (created by the sector antennas), and by the density of the cells. When the system consists of "microcells" and the person is moving resolution is a matter of feet. If the system is a "small cell" such as that found in most urban areas, and the person is moving the resolution is usually better then a few hundred feet. In rural areas if the person is moving (and there is good cellular coverage) resolution of 1000 feet of so can be expected. Now when the cellular coverage is marginal the resolution may only be a mile or so. The user of the phone only needs to have the phone turned on, but not actually on a call for the location attempt to work. If the subject is actually using the phone the job is even easier. Digital phones are easier to track then the older analog systems. Nextel phones are perhaps the easiest of all to trace, then Sprint digital. The higher the data rate the easier it is to track. Phones using Time Division multiplexing are by far the easiest to track. In many cases the phone can not only be tracked, but the phone can be invisibly activated, the microphone can be remotely turned on and the phone forced into a low power mode thus turning it into a low powered bug. When any button on the phone is touched it forces it back into normal mode so to not alert the user. Now considering all of the above, it is still helpful to supplement the trace with one or two mobile platforms in addition to the "Sector Tracing" described above. To facilitate this a small briefcase sized system is placed on the seat of a mobile vehicle (like a police car) and the vehicle goes to the area where the suspect phone is expected to be. The switch used by the cellular provider then exchanges location information to the mobile system, and further determines the resolution to a finer level. If you can use 3-4 mobile systems (to supplement the switch) the location resolution is amazing. Once the phone is located to the close proximity those performing the trace can switch to a small hand-held system to make "close contact" with the phone. An example of this would be a mad hermit bomber living out in the country (lets say living in Gap Mills, WV) who uses a cellphone to talk to the media as he is approaching the target, planting the bomb, and then leaving the site. The bomber turns on his phone when he gets 1 hour away from his target. Lets say that this bomber has been planting small satchel bombs all over Washington DC, and that he likes to call a DC radio station about an hour before he gets to DC. Then he calls another station the moment the bomb is planted, and continues to talk to the radio station for about an hour after the device is in place. He always stays on the phone long until the initial reports of the blast come in. DC is in terror every time his calls come in as the public knows that his voice on the radio means that a blast will kill someone within 90 minutes. The bomber always selects a different type of target, sometimes it's a hospital, a subway station, a monument, and so on. her has pulled off 3 dozen bombings, killing hundred of people including many cops, and 6 EOD techs. Each of the bombs are slightly different, and are very carefully built with multiple traps in case someone tries to disarm it.. Detonation delay is anywhere from 15 minutes to 60 minutes. The only weakness in the MO is that the bomber craves the limelight, and starts whipping up terrors prior to the blasts. To facilitate this he has purchased several dozen prepaid cellular phones under an alias in DC six months before his terror campaign started. He uses the refill cards to top off the phones on a regular basis, and always does this in a way which make it appear that he is in DC. Everything points to the bomber being local to the DC area, but initial traces of the phone show him approaching DC from afar. Each time he makes a bombing run he is on a different angle of approach, stay on the phone for less then 15 minutes a call. One time they traced his cell phone to Baltimore, then Richmond, then Winchester, CIA headquarters, Ft Meade, and another time in Charlottesville. When a radio station gets a call, the station calls the FBI, who then contact the cellular provider who then starts tracking which cell/tower/sector the bomber is in. By the time the FBI gets the trace back the bomber has already terminated his call. After a few minutes he switches to another phone, and calls a different radio station to continue his rant. The FBI arms several dozen teams of agents and military SIGINT folks in unmarked vehicles to canvas all the major roads and rest stops around DC. The systems are interfaced to a central command post, which in turned is tied in to every cellular provider in the DC area. When any cellular phone calls in to any radio station within 60 miles of DC the cell/tower/sector location appears at the command post and the customers record is pulled up to see if it is a pre-paid account. When the command post determine that it is indeed a pre-paid account the cellular provider provides an audio circuit and monitor the call to see if it is the bomber. If the bomber is detected on the call then a cellular provider faxes a affidavit to the CP, who faxes carries it to a judges who approves it and gives it back to the FBI (who can then intercept the call). The FBI may already have a "John Doe" court order that permits them to start the intercept once the cellular company detects the bomber on their system. By law the cellular company can eavesdrop on their own systems, but the FBI can not until "the court order goes live". On the other hand the FBI can monitor "telemetry and signalling" with minor paperwork, but not the actual content (without some serious paperwork). So the suspect is on the phone, the radio station calls the FBI, who then confirm everything, and the chase is on. The mobile units get general location from the service provider and use their briefcase systems to track the signal to the DC area Metro/Subway system inside the beltway. The cellular provider can indicates which mirocell the caller is on, and the exact location on the metro is determined. A quick call to the Metro office confirms where the cars are at and slows everything down to make it easier to track. Using hand-held DF units the FBI traces the calls to a specific car on the train, and quietly inserts a half dozen plain clothes agents (with pocket sized near-field receivers). The suspect the determined to be the actual person with the suspect phone is his possession by monitoring the telemetry, and when he stands up to walk to the door the agents pounce, arrest him, and evacuate all the cars. The satchel bomb is disrupted in place, and score one for the good guys. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 5312 From: Steve Uhrig Date: Thu May 9, 2002 5:04pm Subject: Neat application for GPS "Defender at the Gate" CIO Insight (04/02) No. 12, P. 16; Epstein, Keith Geo-encryption technology being pioneered by Georgetown University professor Dorothy Denning is a cryptographic method by which data is scrambled and stays that way until it reaches specific locations with the aid of Global Positioning System (GPS) satellites. For instance, a movie studio could send encrypted content to a video- on-demand distributor without disclosing the decoding key. Denning is co-developing the location-authentication technology with the assistance of Internet entrepreneur Barry Glick and Hollywood film executive Mark Seiler, but intellectual property owners are not the only ones who could benefit from it. The Pentagon could use it to keep coded messages secret, while medical records could be transmitted with patients' privacy ensured. The company Denning and her two partners formed, GeoCodex, aims to develop geo-encryption devices, and currently has three joint ventures in the works: One of them will protect entertainment broadcasts, while the others will safeguard medical records and classified information. Denning's partners say the GeoCodex chip could also be incorporated into HDTV sets, although Denning estimates it will be years before they become widely distributed. Denning, who has been branded "America's cyberwarrior" by Time magazine, has pioneered many hackproof technologies and exerts influence on national security and technology policy. She also sits on the new White House Advisory Group on Homeland Security. www.cioinsight.com/article/0,3658,s=303&a=24831,00.asp ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: Ocean Group - TSD Date: Fri May 2, 2003 8:37am Subject: Irish Cell Blockers... Ah, good old com-reg, our own in country FCC who are more than happy to help you find police frequencies...! At least now we know the situation regarding these units here, under the wireless telegraphy act it is an offence to interfere with licensed signals....there you go! ************************** BBC.co.uk News Cinema banned from blocking mobiles Cinema owners in Dublin have come under fire for stopping customers from receiving calls on their mobiles in the middle of a movie. Ireland's communications regulator told bosses at Mark Anderson, the company that owns the Savoy cinema, they were breaking the law after they installed a signal blocker. Mark Anderson would have been penalised with a hefty fine - or seen employees facing a jail sentence - if they had not removed the blocking device immediately. Ward Anderson, which owns 200 of Ireland's cinemas, installed the signal blocker after the disruption caused by people talking or receiving text messages became a "problem". "(It was) an increasing, persistent problem," said Mark Anderson, the chain's operations manager. Mr Anderson said the Savoy got a visit from two inspectors from Ireland's communications regulator, or ComReg, after a local paper published a story about the blocker. "They told us to cease and desist," he said. "The possibility of a fine and jail time got us to decide to remove the unit." 'Injustice' Mr Anderson was told it was illegal to have a blocker, let alone put one into operation. The offence carries a fine of up to 25,000 euros (£17,400) or a maximum prison sentence of a year. "It has been disposed of, essentially thrown in the bin," Mr Anderson said. "I am disappointed. I think it is an injustice not only to the Savoy but to patrons of cinemas all around the country." No one had lodged a complaint to ComReg. Ward Anderson spent £499 to import the signal blocker from the US to the Savoy, its flagship cinema in Ireland. The blocker works by emitting a low-power signal that occupies the broadcasting spectrum used by mobile phone operators. It keeps out calls within a 30m (100 ft) range. 7264 From: Ocean Group - TSD Date: Fri May 2, 2003 1:03pm Subject: News Group..? Hey what ever happened to.... news:alt.security.tscm ???? Cheers 7265 From: Ocean Group - TSD Date: Sun May 4, 2003 2:28pm Subject: Thermal Imager... Hi there everyone, Recent to a little trip I took I managed to see for the first time by far one of the neatest Thermal Imagers ever... Most of the stuff I have ever seen or handled was FLIR stuff, but I was so impressed by this baby that I took the name and make, if anyone knows where I can get a price for a Thomson Sophie TI portable unit can you let me know, onlist or offlist. The unit I saw was bought 2nd hand in France and is by far the most tough and ruggedised unit I have actually 'touched'!! Kind regards Vance Deran Ocean Group, Technical Security Division, Ireland. 7266 From: Ocean Group - TSD Date: Mon May 5, 2003 8:25am Subject: TSCM CD http://www.investigativetechnology.net/products/software/tscm.html Kind of looks like someone was busy on the net. That or ol' Jim's website is being sold on CD. 7267 From: A.Lizard Date: Tue Apr 29, 2003 10:41pm Subject: Fwd: VIP - 1, ANTI-TERRORIST BRIEFCASE Presented for your entertainment... A.Lizard >4X-From_: 16037-return-14-27587222@l... Tue Apr 29 20:27:15 2003 >Return-Path: <16037-return-14-27587222@l...> >Received: from tybclbsmtpa05.PROD.TYBCENTRAL.COM >(tybclbsmtpa05.listbuilder.com [204.71.191.31]) > by ecis.com (8.12.9/8.12.9) with ESMTP id h3U3RFYS013984 > for ; Tue, 29 Apr 2003 20:27:15 -0700 >Received: from mail pickup service by tybclbsmtpa05.PROD.TYBCENTRAL.COM >with Microsoft SMTPSVC; > Tue, 29 Apr 2003 20:27:15 -0700 >Reply-To: <16037-feedback-14@l...> >From: GCOM Technologies >Sender: <16037-return-14-27587222@l...> >To: List Member >Subject: VIP - 1, ANTI-TERRORIST BRIEFCASE >Date: Tue, 29 Apr 2003 20:24:48 -0700 >MIME-Version: 1.0 >Content-Type: text/plain; charset="utf-8" >Message-ID: >X-OriginalArrivalTime: 30 Apr 2003 03:27:15.0009 (UTC) >FILETIME=[652B4B10:01C30EC8] >Content-Transfer-Encoding: 8bit >X-MIME-Autoconverted: from quoted-printable to 8bit by ecis.com id >h3U3RFYS013984 >X-Spam-Status: No, hits=1.5 required=5.0 > tests=MAILTO_TO_SPAM_ADDR,SUBJ_ALL_CAPS > version=2.53 >X-Spam-Level: * >X-Spam-Checker-Version: SpamAssassin 2.53 (1.174.2.15-2003-03-30-exp) > > >New Detection & Prevention Unit for High Profile Individuals >- Prevents activation of radio-controlled bombs >- Prevents activation of unauthorized transmissions including covert video >cameras, hidden bugs & other unsanctioned communication devices. > >Here is a portable countermeasure system that searches for unauthorized >transmitting devices in the frequency range of 20 to 2,000 MHz. It will >not only detect, analyze and jam radio-controlled bombs, the weapon of >choice for most terrorists, but also identifies and jams hidden video >cameras, and/or eavesdropping devices transmitting from your home, car, >office, hotel conference rooms, etc. > >Optionally, your VIP -1 ANTI-TERRORIST BRIEFCASE can be delivered with a >choice of such accessories as an NBC (nuclear, biological, chemical) gas >mask, and bomb blanket. > >Anti-terrorist specialists confirm that terrorists as well as criminals >are adopting hi-tech tools to exploit and further their illicit >activities. Subversive, political, and industrial sabotage networks can >now be defined by their proficiency in data intelligence acquisitions, >mobile transmitting stations, invisible caches of ammunition, remote >controlled bombs for ambush or street crime, tactical operation commands >armed with modern commercial and military radio communications, and >perhaps the simplest of all, bugs and wiretaps for the theft of >information that will help promote their goals. > >The VIP - 1 BRIEFCASE is being used by security companies and security >professionals, high profile individuals, celebrities, wealthy individuals, >corporate CEO's, judges and politicians, etc. -- people who are at risk of >attack by dissidents, ruthless competitors, and disloyal insiders. > >See www.spyzone.com, contact Mark Rogers at our CCS/G-Com service center, >in London, U.K., fax: 33.207.629.9536, or e-mail CCSNY37@A.... This >unit is not FCC approved for use in the United States and this is not an >offer to sell. Such offer can only be considered when an authorized agent >presents an official government letterhead. > > >CCS International Ltd. >145 Huguenot Street >New Rochelle, NY 10801 >(914) 654-8700 >(914) 654-1701 Fax >Internet addresses: www.spyzone.com > www.gcomtech.com > >ATTENTION: >Law enforcement, agents, dealers, security professionals & business >executives, inquire about our year 2003 technology seminars. > >_______________________________________________________________________ >Powered by List Builder >To unsubscribe follow the link: >http://lb.bcentral.com/ex/sp?c=16037&s=FCFC4D1DC3D33E2A&m=14 ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -Benjamin Franklin, Historical Review of Pennsylvania, 1753 Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... PGP 8.0 key available by request,keyserver,or on my Web site Download PGP from http://www.pgpi.org for e-mail privacy. PGPfone v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ Disaster prep info: http://www.ecis.com/~alizard/y2k.html ************************************************************************ 7268 From: Fernando Pereira Date: Tue Apr 29, 2003 8:15am Subject: Introduction Dear Moderator: Let introduce myself to the TSCM community. My name is FERNANDO, and I am a member from BRAZILIAN ARMY, serving in this present time at the EMBASSY OF BRAZIL, in WASHINGTON,DC. I am Aide of the Military AttachÈ, identified by the US DEPARTMENT OF STATE AND US ARMY. I am 25 years in the Brazilian Army working as Electronic Technician and Telecommunication Maintenance among others. Before I came to the USA I had been working with the Security Team of the President of Brazil. My role in the Presidential Security was TSCM, so that I intend to improve and, if possible, exchange knowledge in this magnific area and in a short future to open my own TSCM business in my country. Yours Sicerely, Pereira, Fernando Mr. _________________________________________________________________ MSN Messenger: converse com os seus amigos online. http://messenger.msn.com.br 7269 From: Michael Puchol Date: Mon May 5, 2003 0:06pm Subject: Re: Fwd: VIP - 1, ANTI-TERRORIST BRIEFCASE ----- Original Message ----- From: "A.Lizard" To: "TSCM-L-yahoogroups.com" Sent: Wednesday, April 30, 2003 5:41 AM Subject: [TSCM-L] Fwd: VIP - 1, ANTI-TERRORIST BRIEFCASE > Presented for your entertainment... > A.Lizard > The saddest part about this is that the poor soul who buys this and trusts it to save him from a remote-controlled detonation, will only find out about his mistake when he's staring a light at the end of a long dark tunnel... This kind of stuff should be criminally punishable, it's not only unethical, but playing with people's lifes. Here VIPs use interference generators, which go from kHz all the way up to 3GHz, but leaving out gaps such as GSM, TETRAPol radio used by the bodyguards, etc. which makes one wonder what effect it really has apart from getting on people's nerves when the car's remote stops working. ETA hideouts with dozens of modified GSM phones to act as triggers have been found, so I can't think of why they still leave these gaps open. Cheers, Mike 7270 From: Steve Uhrig Date: Mon May 5, 2003 10:25pm Subject: Mason doc needed MWT-1 freq extender Would anyone have or know where to obtain any info on the Mason MWT-1 freq extender? This is for a collector friend who is into the historic aspect and preserving the history, rather than for TSCM use. Would appreciate any leads. Tks ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7271 From: Hawkspirit Date: Mon May 5, 2003 11:40pm Subject: Mistress A husband and wife were having dinner at a very fine restaurant, when this absolutely stunning young woman comes over to their table, gives the husband a big open mouthed kiss, then says she'll see him later and walks away. The wife glares at her husband and says, "Who the hell was that?" "Oh," replies the husband, "she's my mistress." "Well, that's the last straw," says the wife. "I've had enough, I want a divorce!" "I can understand that," replies her husband, "but remember, if we get a divorce it will mean no more shopping trips to Paris, no more wintering in Barbados, no more summers in Tuscany, no more Infiniti or Lexus in the garage and no more yacht club. But the decision is yours." Just then, a mutual friend enters the restaurant with a gorgeous babe on his arm. "Who's that woman with Jim?" asks the wife. "That's his mistress," says her husband. "Ours is prettier," she replies. 7272 From: Date: Tue May 6, 2003 7:07am Subject: New police tool: neighborhood watch by Web from the May 05, 2003 edition - http://www.csmonitor.com/2003/0505/p01s03-ussc.html New police tool: neighborhood watch by Web By Dean Paton | Special to The Christian Science Monitor SEATTLE - When someone burgled a home in De Pere, Wis., last July, they stole - among other things - a child's plastic Coke-bottle coin bank, bursting with about 1,200 quarters. Three days later the culprit entered a Green Bay bank to convert this silver into folding green - and was immediately arrested. What fingered this guy? The hottest policing tool since lie detectors and squad cars: the Internet. The thief had been operating in a jurisdiction which uses computer software that sends out alerts to businesses within a 30-mile radius. By the time the crook walked into the bank, tellers were already on the lookout for anyone with too many quarters. Indeed, police and sheriffs departments from Florida to Washington State are discovering that ordinary citizens by the thousands seem eager to team with police in fighting crime - provided their partnership is geared around e-mails and Web pages. "Over the last few years there's been a lot more use of citizens in police work," explains Jacqueline Helfgott, associate professor of criminal justice at Seattle University. "Police cannot do it all, so now the Internet can help citizens get involved with their community's police force." Look, for example, at the small city of Fairmont, Minn. In late 2001, police created a "Fairmont's Most Wanted" list, posted it on their website, and called public attention to it through a newspaper article. "When we first publicized it we had a real big response - and we apprehended four of those people in the first week," reports Sgt. Corey Klanderud, who handles technology issues for the department. In fact, during the list's first year, "ten or eleven" persons with warrants were arrested directly because of citizens who studied the website. In one of those cases the department received an e-mail from a resident of Duluth, 300 miles north, who provided the address of a suspect that lived on the same street. "This technology is going to help us have more eyes and ears in the community," says the sergeant. At the center of this crime-fighting evolution is a Minnesota firm, Citizen Observer. The company, whose software sent out an alert to the community that caught the burglar with the quarters in the Coke bottle, offers police agencies a four-part package to galvanize communities: ‚Ä¢ The Business Alert Network, which permits police to contact participating businesses with warnings of scams, bad check artists, and profiles of burglaries. ‚Ä¢ The Residential Crime Alert, where anyone can register to receive police bulletins, including suspect descriptions and photos. ‚Ä¢ A School Alert Network that would communicate with parents in event of Columbine-like emergencies. ‚Ä¢ Fugitives, Missing Persons & Unsolved Crimes - a virtual bulletin board posted with descriptions and photos, including a way for citizens to send police information. "Before this, police response was much slower," explains Terry Halsch, president of Citizen Observer. "Most of the time the police would make a couple hundred photocopies of a poster, then someone would drive around and drop them on the porches of block-watch captains, and by that time the criminal could be two states away." In business just three years, Citizen Observer contracts with about 130 police agencies in Minnesota, North Dakota, Wisconsin, Illinois, Michigan, Ohio, Arkansas, and Florida. About 50,000 businesses have signed on to receive crime alerts from departments using Citizen Observer services. Often, the service costs local police little or nothing, because a community business will routinely cover the costs in exchange for promotional considerations and links on Web pages. "Our goal is to be nationwide with about 5,000 departments registered in the next three years - and millions of businesses," says Mr. Halsch. Even without entrepreneurial crime-fighters, other police departments are discovering the Internet's promise. Michael Knapp, police chief for Medina, Wash., a wealthy bedroom community east of Seattle, had never heard of Citizen Observer. A couple of years ago, Chief Knapp acted on an idea from a resident to start up a Community E-Lert program which send e-mails to 1,200 subscribers. Knapp likes his system's ability to target specific neighborhoods about specific problems. If bicycles are being stolen from Elm Street between 1st and 3rd Avenues, E-lerts go out to residents of the affected blocks. "It changes policing because we involve the community in a partnership - in addressing the criminal problems of our city," Chief Knapp says. "When you do that you're going to become more efficient." The E-lerts have also opened a dialogue that provides Medina's law enforcement officers with valuable insights into what citizens think of their police work. Bill Berger, police chief of North Miami Beach, Fla., and a past president of the International Association of Chiefs of Police, believes the Internet itself fosters citizen involvement not seen before. "A lot of times people don't want to get involved," he says. "But something about the anonymity of the internet makes citizen participation easier. They can e-mail information, say to us, 'Here - check this out.' It's almost like it creates a veil, an extra level of distance and safety." Today, some 3,000 businesses and 10,000 residents use Citizen Observer's interface to actively ally with North Miami Beach police. Chief Berger says his officers embrace the Internet in their work. "These guys would rather have their laptops than their weapons." Full HTML version of this story which may include photos, graphics, and related links www.csmonitor.com | Copyright ¬© 2003 The Christian Science Monitor. All rights reserved. For permission to reprint/republish this article, please email copyright@c... [Non-text portions of this message have been removed] 7273 From: Monty Date: Mon May 5, 2003 10:49pm Subject: Re: TSCM CD I wonder if REI knows someone is selling (making money) CD's with there copyrighted work on them. Monty --- Ocean Group - TSD wrote: > > http://www.investigativetechnology.net/products/software/tscm.html > > Kind of looks like someone was busy on the net. That > or ol' Jim's website is > being sold on CD. > > > __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com 7274 From: The Dog's Bollix Date: Tue May 6, 2003 2:54pm Subject: Re: Thermal Imager... Here you go: http://www.thalesgroup-optronics.com/dos/products/land/details/sophie.shtml --- Ocean Group - TSD wrote: > Hi there everyone, > > Recent to a little trip I took I managed to see for > the first time by far > one of the neatest Thermal Imagers ever... > Most of the stuff I have ever seen or handled was > FLIR stuff, but I was so > impressed by this baby that I took the name and > make, if anyone knows where > I can get a price for a Thomson Sophie TI portable > unit can you let me know, > onlist or offlist. The unit I saw was bought 2nd > hand in France and is by > far the most tough and ruggedised unit I have > actually 'touched'!! > > Kind regards > > Vance Deran > > Ocean Group, > Technical Security Division, > Ireland. > > > __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com 7275 From: Ocean Group Date: Tue May 6, 2003 3:03pm Subject: Re: Thermal Imager... Hmm...having the wrong company name probably explains why I couldn't find any details on it. Could have sworn the unit said Thomson on it, but the unit looks exactly the same as on the webpage you gave me, except the one I saw was all green. Cheers ----- Original Message ----- From: The Dog's Bollix Date: Tuesday, May 6, 2003 8:54 pm Subject: Re: [TSCM-L] Thermal Imager... > Here you go: > > http://www.thalesgroup- > optronics.com/dos/products/land/details/sophie.shtml > > --- Ocean Group - TSD wrote: > > Hi there everyone, > > > > Recent to a little trip I took I managed to see for > > the first time by far > > one of the neatest Thermal Imagers ever... > > Most of the stuff I have ever seen or handled was > > FLIR stuff, but I was so > > impressed by this baby that I took the name and > > make, if anyone knows where > > I can get a price for a Thomson Sophie TI portable > > unit can you let me know, > > onlist or offlist. The unit I saw was bought 2nd > > hand in France and is by > > far the most tough and ruggedised unit I have > > actually 'touched'!! > > > > Kind regards > > > > Vance Deran > > > > Ocean Group, > > Technical Security Division, > > Ireland. > > > > > > > > > __________________________________ > Do you Yahoo!? > The New Yahoo! Search - Faster. Easier. Bingo. > http://search.yahoo.com > 7276 From: Fernando Date: Tue May 6, 2003 2:08pm Subject: Link with Irak's Intellegence. FROM MSNBC NEWS - MAY 6, 2003. THE "LONDON TELEGRAPH" reports that top secret documents uncovered in the headquarters of Iraq's intelligence service in Baghdad now show that Russia provided Saddam Hussein with the following: Intelligence on private conversations between British prime minister Tony Blair and the Italian prime minister; lists of assassins available for hits in the west; and agreements to share intelligence and help each other to obtain visas for intelligence agents. In addition, the "San Francisco Chronicle" has uncovered Iraqi documents in a Baghdad office of the Iraqi secret police that indicate that at least five Iraqi agents completed a two-week course in surveillance and eavesdropping in Moscow. Meanwhile, recent discoveries in Iraq also seem to implicate France for providing assistance to Saddam's regime. "Newsweek" is reporting that U.S. forces in Iraq have found French-made missiles and a launcher that seemed to be produced within the past year. They also found radios used in military trucks, RPG night sights and a new Nissan pickup truck driven by an Iraqi officer. Ibrahim Marashi is with the center for Non-Proliferation Studies at the Monterey Institute of International Studies, and Frank Gaffney is the president of the Center for Security Policy. MATTHEWS: What you know about the shipment of goods, of ordinance, of contraband to Iraq from Russia and from France? IBRAHIM MARASHI, CENTER FOR NON-PROLIFERATION STUDIES: Well, in the Russian case, the cooperation between the Russian intelligence services or then the Soviet intelligence services and Iraq's intelligence services dates back-up to-from 1973 to the present. MATTHEWS: How do you know about the present? Why didn't they stop at the end of the Cold War-the period when the whole world decided that Iraq was an outlaw nation? Why do you still have Soviet, or Russian intelligence now called≠maybe it's the same cast of characters helping Saddam Hussein spy on the west? MARASHI: Russia still had interests in Iraq despite the end of the Cold War in terms of investments in its oil infrastructure, in terms of getting its debts paid back from Iraq, so that a Russian investment in Iraq still existed from the Cold War up to the present. MATTHEWS: Do you believe, based upon what you heard, that the Iraqis benefited militarily in any way in the last three weeks from the Russian help? MARASHI: In terms of military, probably intelligence≠ not necessarily in a military way. MATTHEWS: Any way they endangered or cost the lives of American service people? Did the Russians cost the lives of any of our people by their actions on behalf of Iraq, based upon what you know of this? MARASHI: It's really hard to make a connection in the sense of how the Russian intelligence training help the Iraqi intelligence, in the sense that we saw Iraqi intelligence pretty much collapse during the course of Operation Iraqi Freedom. I think that probably if you're going to make a connection, it's French military hardware that was provided to the Iraqis could have caused the death of American soldiers. If you remember in 1987, when the USS Stark was hit in the Persian Gulf, it was hit by a French missile launched from an French Mirage F-1. MATTHEWS: Was that in violation of the sanctions since '91? MARASHI: No. That was in 1987, but proves the point that France was the primary supplier of military arms to Iraq. MATTHEWS: And has France continued to arm Iraq through or right up until these hostilities or through these hostilities, do you know? MARASHI: That information wasn't publicly available, but it wouldn't surprise me. French military industry had an interest in the Iraq in the past. It wouldn't surprise me if they had violated Iraqi sanctions still to keep those connections alive. MATTHEWS: The bottom line is that have the Russians, first of all, and secondly the French done to harm our military effort over there in the last three weeks? MARASHI: Well, in terms of training the military, the techniques, and providing the hardware... if you add all those together in a lump sum, whatever aid they did provide is going to eventually hurt the American military that was deployed in Iraq. MATTHEWS: Did they do so after the time it was clear we were going to fight in Iraq? MARASHI: Well, looking at those documents, and I saw the "San Francisco Chronicle" documents from the Iraqi intelligence services and they looked authentic to me. So upon more careful examination, I think that's going to be the link. MATTHEWS: Frank Gaffney, what can you offer in terms of the facts of this case, do you have any evidence regarding France or Russia and their relations with Iraq? FRANK GAFFNEY, CENTER FOR SECURITY POLICY: Well, I think you've laid out a pretty damming case already, Chris. It's the tip of the iceberg, however. I'm quite sure that as these documents (and more where they came from) emerge, we're going to find that the French and the Russians had ample reason not want to us to go into Iraq...for fearing that this kind of information would be disclosed. MATTHEWS: What's the rest of the iceberg? GAFFNEY: I'm telling you that I suspect what you're going to find elsewhere in Iraq, whether it's with respect to this kind of cooperation between France, Russia, perhaps the Chinese, the Germans and others, is more evidence of involvement in conventional weapons and in intelligence. Probably in weapons of mass destruction. We don't have the documents yet, Chris. All I'm saying is I suspect what you're going to find is there's a great deal more there. MATTHEWS: What leads you to that? GAFFNEY: Because partly this is the nature of the relationships; what we saw was not limited to these relatively small kinds of transfers and interactions. This has been going on for decades, as my colleague has pointed out. And what I'm confident you're going to see is the reason that we were finding so much resistance on the part of the French and the Russians and so on, has been there's more there they don't want to have come out. It's that clear. MATTHEWS: How do you identify that particular motive? I mean, there are a lot of other motives, the people of Germany, the people of France have opposed our operation in Iraq. There's lots of other reasons. Why do you believe that that is the reason that stopped them from helping us? GAFFNEY: I don't think that's the only reason. I think that there are commercial reasons. I think that there were some reasons, as you say, on the part of the sentiments of the peoples in these countries. But let's face it, those sentiments, the last of those, the sentiments about the people of these countries have got to have shifted as they've seen now the joy of the people in Iraq at being liberated from... MATTHEWS: I would hope so. I agree with you completely on that point. It's got to move some hearts. 7277 From: Monty Date: Tue May 6, 2003 9:56pm Subject: Re: News Group..? Just checked google and you are correct. Do not know why it is not on Google. I am on Verizon an they have the news:alt.security.tscm listed on there servers. Monty --- Ocean Group wrote: > ?? How come it doesn't come up in google groups....? > > ----- Original Message ----- > From: Monty > Date: Tuesday, May 6, 2003 4:41 am > Subject: Re: [TSCM-L] News Group..? > > > It's still there. I have it load on my > > Free Agent, but no one ever seems to use > > it any more. What a waste. > > > > Monty > > > > > > --- Ocean Group - TSD wrote: > > > Hey what ever happened to.... > > > > > > news:alt.security.tscm > > > > > > ???? > > > > > > Cheers > > > > > > > > > > > > __________________________________ > > Do you Yahoo!? > > The New Yahoo! Search - Faster. Easier. Bingo. > > http://search.yahoo.com > > > __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com 7278 From: Peter Psarouthakis Date: Wed May 7, 2003 8:25am Subject: The National Counterintelligence Executive Colleagues: The National Counterintelligence Executive is pleased to announce the release of its Annual Report to Congress on Foreign Economic Collection and Industrial Espionage - 2002. The document may be viewed and downloaded by linking to http://www.ncix.gov/ Peter Psarouthakis -- This message is intended only for the individual or entity to which it is addressed. It may contain privileged, confidential information, which is exempt from disclosure under applicable laws. If you are not the intended recipient, please note that you are strictly prohibited from disseminating or distributing this information (other than to the intended recipient) or copying this information. If you have received this communication in error, please notify us immediately by e-mail or by telephone at 888-737-3636. Thank you. [Non-text portions of this message have been removed] 7279 From: allan ginsberg Date: Wed May 7, 2003 11:12am Subject: Need help boys Where do you often find GPS tracking devices?...I have checked the bumpers and underside and cannot find anything?....Must be inside the car somewhere....Also where do you find bugs inside the car?...Help me out boys....I wonder if the feds weren't using the speakers as microphones!...Anybody got a clue on this? __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com 7280 From: Charles P. Date: Wed May 7, 2003 5:28pm Subject: Re: News Group..? There never seemed to be any intelligent life on that newsgroup, so I stopped checking it years ago. Charles ----- Original Message ----- From: "Monty" To: Sent: Tuesday, May 06, 2003 10:56 PM Subject: Re: [TSCM-L] News Group..? > Just checked google and you are correct. Do > not know why it is not on Google. > > I am on Verizon an they have the > news:alt.security.tscm > listed on there servers. > > > Monty > > --- Ocean Group wrote: > > ?? How come it doesn't come up in google groups....? > > > > ----- Original Message ----- > > From: Monty > > Date: Tuesday, May 6, 2003 4:41 am > > Subject: Re: [TSCM-L] News Group..? > > > > > It's still there. I have it load on my > > > Free Agent, but no one ever seems to use > > > it any more. What a waste. > > > > > > Monty > > > > > > > > > --- Ocean Group - TSD wrote: > > > > Hey what ever happened to.... > > > > > > > > news:alt.security.tscm > > > > > > > > ???? > > > > > > > > Cheers > > > > > > > > > > > > > > > > > __________________________________ > > > Do you Yahoo!? > > > The New Yahoo! Search - Faster. Easier. Bingo. > > > http://search.yahoo.com > > > > > > > > __________________________________ > Do you Yahoo!? > The New Yahoo! Search - Faster. Easier. Bingo. > http://search.yahoo.com > > > Yahoo! Groups Sponsor > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 7281 From: James M. Atkinson Date: Wed May 7, 2003 7:47pm Subject: Re: News Group..? I was the guy who actually created the group years ago... it flourished for a while, but eventually everybody moved to this group. -jma At 6:28 PM -0400 5/7/03, Charles P. wrote: >There never seemed to be any intelligent life on that newsgroup, so I >stopped checking it years ago. > >Charles > >----- Original Message ----- >From: "Monty" >To: >Sent: Tuesday, May 06, 2003 10:56 PM >Subject: Re: [TSCM-L] News Group..? > > >> Just checked google and you are correct. Do >> not know why it is not on Google. >> >> I am on Verizon an they have the >> news:alt.security.tscm >> listed on there servers. >> >> >> Monty >> >> --- Ocean Group wrote: >> > ?? How come it doesn't come up in google groups....? >> > >> > ----- Original Message ----- >> > From: Monty >> > Date: Tuesday, May 6, 2003 4:41 am >> > Subject: Re: [TSCM-L] News Group..? >> > >> > > It's still there. I have it load on my >> > > Free Agent, but no one ever seems to use >> > > it any more. What a waste. >> > > > > > > Monty -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7282 From: James M. Atkinson Date: Wed May 7, 2003 7:51pm Subject: Re: Need help boys At 9:12 AM -0700 5/7/03, allan ginsberg wrote: > Where do you often find GPS tracking devices?...I >have checked the bumpers and underside and cannot find >anything?....Must be inside the car somewhere....Also >where do you find bugs inside the car?...Help me out >boys....I wonder if the feds weren't using the >speakers as microphones!...Anybody got a clue on this? The feds usually hide the GPS systems inside one of the engine pistons, inside the carburetor float bowl, or inside the vehicle transmission chambers ;--] -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7283 From: Date: Wed May 7, 2003 4:38pm Subject: Re: Need help boys In a message dated 5/7/2003 5:54:57 PM Pacific Standard Time, jmatk@tscm.com writes: > The feds usually hide the GPS systems inside one of the engine > pistons, inside the carburetor float bowl, or inside the vehicle > transmission chambers ;--] > They use the sparkplug wire from piston two on a four cylinder, piston three on a six cylinder and piston four on an eight cylinder car as the antenna. I'm not familiar with what they use on diesels or hybrid vehicles. [Non-text portions of this message have been removed] 7284 From: Matt Paulsen Date: Wed May 7, 2003 9:26pm Subject: RE: Need help boys It's between batteries 3 and 9 on a 12x6 volt setup. If you get the motor up to 6135 rpm, it begins transmitting from the oscillation between the tires and motor. PS - This applies to >200 amp/hr batteries only. -----Original Message----- From: MACCFound@a... [mailto:MACCFound@a...] Sent: Wednesday, May 07, 2003 6:38 PM To: jmatk@tscm.com; TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Need help boys In a message dated 5/7/2003 5:54:57 PM Pacific Standard Time, jmatk@tscm.com writes: > The feds usually hide the GPS systems inside one of the engine > pistons, inside the carburetor float bowl, or inside the vehicle > transmission chambers ;--] > They use the sparkplug wire from piston two on a four cylinder, piston three on a six cylinder and piston four on an eight cylinder car as the antenna. I'm not familiar with what they use on diesels or hybrid vehicles. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7285 From: Hawkspirit Date: Thu May 8, 2003 7:24am Subject: Historical TSCM article Here is a new addition to my historical articles section Bug Thy Neighbor TIME, March 6, 1964 Science/Electronics http://www.bugsweeps.com/info/time_article.html Roger Tolces Electronic Security Los Angeles, Ca. www.bugsweeps.com 7286 From: Date: Thu May 8, 2003 8:19am Subject: TSCM vituperation Subj: Re: [TSCM-L] Need help boys Date: 5/8/2003 10:08:40 AM Pacific Standard Time From: negrodawn2003@y... To: MACCFound@a... Sent from the Internet (Details) VERY FUNNY PAL....I AM A CIVIL RIGHTS ATTORNEY WHO PROVIDES AFFORDABLE LEGAL RELIEF FOR SOCIAL ACTIVISTS IN AUSTIN, TEXAS, WHO ARE VICTIMS OF THE COVERT WAR...I DID NOT SELL OUT FOR MONEY BY IGNORING MY DUTY TO DEFEND AND SUPPORT THE LITTLE PEOPLE WHO ARE FOR THE MOST PART SHUT OUT OF THE LEGAL SYSTEM BY THEIR POVERTY....MANY OF MY CLIENTS ARE GOOD PEOPLE WHO HAVE HAD MENTAL BREAKDOWNS FROM ALL THE COINTELPRO DIRTY TRICKS AND DEPRIVATIONS OF PRIVACY RESULTING FROM THEIR LEGAL SOCIAL ACTIVISM AND FIRST AMENDMENT RIGHTS...THIS IS NO JOKING MATTER....THE TSCMERS ARE IN A VALUABLE POSITION TO HELP INNNOCENT, POOR PEOPLE RECOVER PUNITIVE DAMAGES FOR NUMEROUS AND EGREGIOUS CONSTITUTIONAL VIOLATIONS....IF YOU ARE WONDERING WHAT INFO I CAN OFFER TO THIS GROUP REMEMBER "IT IS ALWAYS A GOOD IDEA TO KNOW AN HONEST ATTORNEY WILLING TO GIVE FREE LEGAL ADVICE" TO THOSE WHO CANNOT AFFORD THE HIGH COST OF ACCESSING LEGAL INFORMATION..... __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com [Non-text portions of this message have been removed] 7287 From: Date: Thu May 8, 2003 8:39am Subject: TSCM vituperation - needs help Subj: Re: [TSCM-L] TSCM vituperation Date: 5/8/2003 10:33:13 AM Pacific Standard Time From: kireau@c... To: MACCFound@a... Sent from the Internet (Details) oh wow, sorry, but i could use a civil rights attorney in TX right now. i am in woodville, tx, 60 miles N of beaumont in Tyler County. i am kinda poor...i dont have much to pay, but i have a great case where the sheriff deputies keep breaking into my home w/o any warrant after they have falsely arrested me for some petty class c misdemeanor and stolen my keys and locked me up. they never lock the door when they leave and people break in and now i have stolen about 25,000 worth of my belongings and furnishings. and if i report it to them, they lock me up again. i called the dallas fbi and they are taking the case, but i need a lawyer to help. can you? oh that is just a fraction of it too, there is tons more... [Non-text portions of this message have been removed] 7288 From: Steve Uhrig Date: Thu May 8, 2003 0:55pm Subject: TSCM vituperation - one response On 8 May 2003 at 13:19, negrodawn2003@y... wrote: > VERY FUNNY PAL....I AM A CIVIL RIGHTS ATTORNEY WHO > PROVIDES AFFORDABLE LEGAL RELIEF FOR SOCIAL ACTIVISTS > IN AUSTIN, TEXAS, WHO ARE VICTIMS OF THE COVERT > WAR. Copping an attitude doesn't work here. Maybe it works in the circles you frequent. Wouldn't surprise me. I recommend you seek competent psychiatric care. (*) Or look in the mirror and seriously consider your ethics. Probably both. > I DID NOT SELL OUT FOR MONEY BY IGNORING MY DUTY TO DEFEND AND SUPPORT > THE LITTLE PEOPLE Are you implying any of us have a duty to give away our work product? The Bible says 'A laborer is worthy of his hire.' I suppose you disagree with that too? Find me a Little People who doesn't drink, smoke, do drugs, own a better car than I do, eat better than I do, own more televisions and video games than I do, take more vacations than I do, who pays a greater percentage of their medical care than I do, who's never bought a lottery ticket, *and produces more than they consume* ad nauseam, and I'll consider providing them discounted services. We're already involuntarily supporting many of these types via entitlement programs. We'll pick our own charities, if it's OK with you. If you're a Democrat, it's probably not OK with you. You could hire a competent TSCM firm and pay them out of your own pocket if you feel that strong a responsibility towards your clients/victims. > MANY OF MY CLIENTS ARE GOOD PEOPLE WHO HAVE HAD MENTAL BREAKDOWNS FROM > ALL THE COINTELPRO DIRTY TRICKS AND DEPRIVATIONS OF PRIVACY RESULTING > FROM THEIR LEGAL SOCIAL ACTIVISM AND FIRST AMENDMENT RIGHTS. And likely dealing with persons such as yourself who manage by emotion rather than logic being a contributing factor. See my comment above.(*) > THIS IS NO JOKING MATTER. To the mentally ill, we agree on this point. The rest of us hear more stories like these in a month than you will in a lifetime. > THE TSCMERS ARE IN A VALUABLE POSITION TO HELP INNNOCENT, POOR PEOPLE > RECOVER PUNITIVE DAMAGES FOR NUMEROUS AND EGREGIOUS CONSTITUTIONAL > VIOLATIONS. You're mistaken. TSCM professionals locate technical surveillance devices and efforts. Investigators follow up. Attorneys help 'innnocent (sic), poor people recover punitive damages' ... So you're pointing the finger at your profession, not ours. We don't *owe* you or them or anyone anything other than to treat them with respect as a human being. And no one else has the 'right' to demand *anything* from us other than the same. You seem to be confused here. We are a capitalist society. That's what provided the Internet where you can spew your verbal diarrhea. Are you sure you're not from Kalifornia? > IF YOU ARE WONDERING WHAT INFO I CAN OFFER TO THIS GROUP REMEMBER "IT > IS ALWAYS A GOOD IDEA TO KNOW AN HONEST ATTORNEY WILLING TO GIVE FREE > LEGAL ADVICE" TO THOSE WHO CANNOT AFFORD THE HIGH COST OF ACCESSING > LEGAL INFORMATION..... So far you've offered nothing, only attempted to obtain free work product from persons who make their livings doing the work. There are more lawyers within 10 miles of me than there are competent TSCM practitioners in the world. Every professional I know lends a hand in many ways to people truly in need -- in need by OUR standards, not yours. You're welcome to give free legal advice. Anyone who takes it probably is not too bright. Hope you get your broken caps lock key fixed. Kind of ruins your reputation as a 'professional' by not maintaining or knowing how to use common business tools. Or a spell checker, which shouldn't be necessary for someone with a law degree unless you got yours through some virtue other than actually learning how to spell and construct sentences. Or construct grammatically correct sentences. This is not a political forum. It is not a place for leeches. It is a forum for discussion of technical surveillance matters, and specifically countermeasures. Feel free to participate at that level. Otherwise we invite you to take your invective and your attitude somewhere else. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7289 From: Date: Thu May 8, 2003 0:59pm Subject: TSCM vituperation - needs help Subj: Re: [TSCM-L] Date: 5/8/2003 12:50:26 PM Pacific Standard Time From: negrodawn2003@y... To: MACCFound@a... Sent from the Internet (Details) --- MACCFound@a... wrote: > Subj: Re: [TSCM-L] TSCM vituperation > Date: 5/8/2003 10:33:13 AM Pacific Standard Time > From: HREF="mailto:kireau@c...">kireau@c... > > To: HREF="mailto:MACCFound@a...">MACCFound@a... > > Sent from the Internet (Details) > > > > > oh wow, sorry, but i could use a civil rights > attorney in TX right now. i am in woodville, > tx, 60 miles N of beaumont in Tyler County. > i am kinda poor...i dont have much to pay, > but i have a great case where the sheriff > deputies keep breaking into my home w/o > any warrant after they have falsely arrested > me for some petty class c misdemeanor > and stolen my keys and locked me up. > they never lock the door when they leave and > people break in and now i have stolen about > 25,000 worth of my belongings and > furnishings. and if i report it to > them, they lock me up again. i called the dallas fbi > and they are taking the case, but i need a lawyer > to help. can you? > > oh that is just a fraction of it too, there is tons > more... > > > [Non-text portions of this message have been > removed]REPLY: I WOULD BE HAPPY TO HELP FREE OF CHARGE...UNLIKE MOST MONEY SUCKING LAWYERS, I DO NOT AGREE WITH THE LEGAL COMMUNITIY'S MONOPOLY ON LEGAL INFORMATION....IF ANY AREA OF KNOWLEDGE SHOULD BE READILY AVAILABLE TO ALL PEOPLE FREE OF CHARGE IT IS LEGAL KNOWLEDGE THAT SHOULD BE FREE AND UNFETTERED FROM THE BRUTAL HANDS OF CAPITALISM WHICH EFFECTIVELY MAKES JUSTICE SOMETHING ONLY THE RICH CAN AFFORD. GOOD LUCK. > > [Non-text portions of this message have been removed] 7290 From: Date: Thu May 8, 2003 3:36pm Subject: Senate Broadens Terror Surveillance Law Senate Broadens Terror Surveillance Law By TED BRIDIS .c The Associated Press WASHINGTON (AP) - The Senate easily passed a measure Thursday expanding a powerful surveillance law, used in spy and terrorism investigations, to allow U.S. agents to wiretap lone foreigners who can't be linked to a terror organization or government. Currently, U.S. law enforcement officers can get warrants authorizing intelligence-gathering wiretaps from a secret court, but only if they can establish a reasonable belief the target is an ``agent of a foreign power `` or group. The bill, which passed 90 to 4, would amend the 1978 Foreign Intelligence Surveillance Act to remove that requirement. As used in the act, the term ``agent of a foreign power'' includes those controlled by governments, political organizations or terrorist groups. But lawmakers feared that this requirement could hinder the FBI when its investigators can't make such a link to a known terror organization or a foreign government. The bill, introduced by Sens. Charles Schumer, D-N.Y., and Jon Kyl, R-Ariz., has become known in Washington as the ``Lone Wolf'' measure. It still must be passed in the House. Proponents also have described the bill as the ``Moussaoui fix'' because investigators in the weeks preceding the Sept. 11 attacks were unable to establish any connection between al-Qaida and Zacarias Moussaoui, the lone defendant charged as a conspirator with the 19 hijackers. Without that link, FBI headquarters believed they could not get a warrant targeting him. ``This is a reasonable provision that deals with change in the post 9-11 world,'' Schumer said after the vote. ``Even individuals are empowered by technology and can do huge damage here to the homeland.'' Sen. Patrick Leahy of Vermont, ranking Democrat on the Judiciary Committee, criticized the bill as a ``quick fix'' that the FBI hadn't even sought. ``This is aimed at making Americans feel safer, but it doesn't make them safer,'' Leahy said. Senators rejected 35-59 an amendment by Sen. Dianne Feinstein, D-Calif., that would have given federal judges more discretion when to approve such surveillance warrants against foreigners believed to be acting on their own. Feinstein said the change sought by Schumer and Kyl goes too far because it gives federal prosecutors too powerful a tool with far less judicial oversight than traditional criminal wiretap laws. In a compromise reached last week, the bill was changed to include a provision by Sen. Russell Feingold, D-Wis., requiring that the Justice Department report to lawmakers how often that ``lone wolf'' provision is employed. Feingold said Thursday that he worried the Senate changes ``may well result in FISA serving as a substitute'' for traditional wiretaps, which are harder for prosecutors to obtain and include more civil rights protections for citizens. 05/08/03 20:25 EDT [Non-text portions of this message have been removed] 7291 From: Matt Paulsen Date: Thu May 8, 2003 7:16pm Subject: FW: RE: Need help boys Best is in bold, 3rd par down - m -----Original Message----- From: allan ginsberg [mailto:negrodawn2003@y...] Sent: Thursday, May 08, 2003 10:03 AM To: mpaulsSeeen6@a... Subject: RE: [TSCM-L] Need help boys --- Matt Paulsen wrote: > It's between batteries 3 and 9 on a 12x6 volt setup.I SUPPOSE THAT IS POSSIBLE AND YOU WOULD KNOW HOWEVER I BELIEVE IT IS WIRED INTO THE ELECTRICAL SYSTEM TO SAVE THE MAINTENENCE AND REPLACEMENT OF THE BATTERIES > If you get the motor up > to 6135 rpm, it begins transmitting from the > oscillation between the tires > and motor.OSCILLATION BETWEEN THE TIRES AND MOTOR?...ARE YOU SURE...BECAUSE AT 3,000 RPM MY FORD RANGER IS ALREADY TRAVELING DOWN THE HIGHWAY AT 60MPH? PS - This applies to >200 amp/hr > batteries only. > > -----Original Message----- > From: MACCFound@a... [mailto:MACCFound@a...] > Sent: Wednesday, May 07, 2003 6:38 PM > To: jmatk@tscm.com; TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] Need help boys > > > In a message dated 5/7/2003 5:54:57 PM Pacific > Standard Time, jmatk@tscm.com > writes: > > > > The feds usually hide the GPS systems inside one > of the engine > > pistons, inside the carburetor float bowl, or > inside the vehicle > > transmission chambers ;--]HA HA...VERY FUNNY PAL...IF YOU DON'T WANT TO HELP THAT IS YOUR BUSINESS AND I UNDERSTAND THAT THE TSCMER STOCK IN TRADE IS HIS SECRET SPECIFIC KNOWLEDGE > > > > They use the sparkplug wire from piston two on a > four cylinder, piston three > on a > six cylinder and piston four on an eight cylinder > car as the antenna. I'm > not > familiar > with what they use on diesels or hybrid vehicles. > > > [Non-text portions of this message have been > removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com 7292 From: James M. Atkinson Date: Thu May 8, 2003 7:47pm Subject: Former FBI agent indicted in double agent case Alleged Chinese double agent indicted Former FBI agent indicted in double agent case LOS ANGELES, California (CNN) --A federal grand jury Thursday indicted alleged Chinese double agent Katrina Leung on charges that she illegally took, copied and kept secret documents obtained from an FBI agent who was both her handler and lover. Leung was charged in a five-count indictment most notable for its omission of the more serious charge of espionage. The indictment was returned by a grand jury in Los Angeles, where Leung has been jailed without bond since her April 9 arrest. The charges follow a six-count indictment returned Wednesday against Leung's longtime FBI handler, James J. Smith. The six-count indictment returned against Smith, 59, of Westlake Village, a Los Angeles suburb, included charges of wire fraud and gross negligence with national defense material, authorities announced. If convicted of all the charges, Smith faces 40 years in prison. His arraignment is scheduled for May 12. The charges against Smith stem from his recruitment and nearly two-decade role as the "handler" of FBI "asset" Leung, who was tasked with obtaining information about the People's Republic of China (PRC) and its intelligence service. During an FBI interrogation in December, Smith admitted having a 20-year sexual affair with Leung, a prominent Chinese-American businesswoman who had access to top Chinese leaders including President Jiang Zemin, Premier Zhu Rongji and the late President Yang Shangkun. Leung, 49, was arrested last month and charged with obtaining an unauthorized, classified FBI document with the purpose of passing it on to China. She remains in jail without bail. Allegations in the indictment against Smith allege that he: * Had an improper sexual relationship with Leung * Failed to disclose to the FBI his sexual relationship with Leung * Failed to tell the FBI the full extent of Leung's admissions regarding her contacts with officials from the People's Republic of China * Filed reports and caused other FBI agents to file reports that failed to report information about Leung * Mishandled classified information and information relating to the national defense FBI suspicious of couple's continued meetings Smith allegedly was told in 1991 that Chinese intelligence officials had discovered that Leung was working for the FBI, but he did not make truthful and complete reports of this revelation to the FBI, according to documents. The four wire fraud counts relate to the transmission of evaluations of Leung that Smith sent to FBI headquarters in Washington in 1998, 1999 and 2000. According to the indictment, Smith improperly removed two documents from the FBI offices and took them to meetings with Leung, enabling her to get access to them. One document concerned a classified location of an FBI investigation called "Royal Tourist." The second document concerned an FBI electronic communication that had been marked and classified as "secret" and concerned Chinese fugitives. Smith, a married man, retired in 2000 after nearly 30 years in the FBI. He became the center of a criminal investigation after authorities began secretly monitoring meetings between him and Leung long after his official business association with her ended, according to court documents. Authorities suspect Leung was a "double agent" who routinely stole unauthorized secret U.S. national defense documents and handed them to China's Ministry of State Security, the country's intelligence service. One of the documents is a June 12, 1997 memorandum about Chinese fugitives and national defense information obtained by a confidential FBI source. Leung admitted to investigators that she got information from Smith and another FBI agent over several years without their consent and passed it on to Chinese agents. Smith was charged with gross negligence in handling those documents. Wednesday's indictment superseded the previous gross negligence charge lodged against Smith in the criminal complaint. He was released from jail in April on $250,000 bail. U.S. paid Leung $1.7 million An attorney for Smith said he's disappointed that prosecutors decided to pursue more charges against him, but declined further comment. Prosecutors say Leung may have provided PRC officials with other confidential details on FBI personnel, an array of secret intelligence cases and spying tactics that may have compromised U.S. intelligence gathering. Lawyers for Leung argued that FBI agents fed information to her for nearly two decades and encouraged her to give it to the Chinese government in order to obtain the trust of the Chinese in return. From 1983 to 2002, Leung was paid $1.7 million for providing information about China, according to affidavits. In 1991, prosecutors contend, a San Francisco-based FBI agent told Smith that Leung may be a double agent, but Smith continued using her as a working informant despite assurances that he would investigate the allegations. That same San-Francisco-based agent, whose identity was sealed in the FBI indictments, also admitted having a long-term sexual relationship with Leung. He is not charged in the case. "We put into place an asset validation program that has a number of aspects to it that will prevent this happening in the future," said FBI Director Robert Mueller on the CNN program "The Novak Zone." "We are putting in place and have put in place over the last several months and year management reviews that will prevent this from happening again." Smith joined the FBI in 1970 after serving in the U.S. Army. He was assigned to the Los Angeles bureau in 1971 and worked almost exclusively on foreign counterintelligence focusing on the PRC until his retirement. Find this article at: http://www.cnn.com/2003/LAW/05/08/double.agent.charges/index.html -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- From: Gordon Mitchell Date: Wed May 3, 2000 3:08pm Subject: Re: Patent on finding transmitters Well, the patent examiners don't always catch prior art. Reading claim 1 of the patent, my guess is that you are right. The patent was issued on a familiar procedure. I have reviewed patents for a journal for the last 10 years and see quite a few of these problems. Most patent offices don't have young Einsteins at their desks. The interesting part of this is that a method (as contrasted to an apparatus) patent is not always enforceable. Imagine that you have a patent on the method of finding bugs and hope to use it to secure a market for your product. Most of the infringers will be users. Oops! Taking potential clients to court isn't a really good idea. The patent disclosure can be viewed at: http://patent.womplex.ibm.com/details?&pn=US06021269__ The redeeming feature of our system of patents here is that a patent is only license to go to court. Once in court it is certain that written material predating the 4/97 filing date could be found. Since it took 2.5 years to issue it is likely that the examiner did beat back some of the claims. Gordon Mitchell Future Focus, Inc Electronic eavesdropping detection & finding clues in computers. Dugconsult@a... wrote: > Allow me to introduce myself. > > I am Jim Douglas, I run a small Investigation Company specialising in > fraud (investigations) mainly within the banking industry. > > I live and have an office in St Peter Port on the Island of Guernsey and > ëhave a deskí in a major City of London financial institution who > monopolise most of my services. I work with a number of London > Investigators, which is where I have regularly viewed TSCM Onelist. > > In common with many people in this industry, I have a Government > background. I then worked for a couple of years as a full time TSCM > Operator in partnership with an ex-telephone engineer and although I > enjoyed both the work and the level of remuneration, the unsocial hours > lacked appeal. I like to keep up with whatís happening in the TSCM world > and now turnout for a former colleagueís sweep team to cover for holidays > etc. > > One of my reasons for joining the group was to ascertain if any of you TSCM > Ops could explain to me how someone can get a TSCM (US) Patent granted > relating to : > > 'detecting single/multiple spectra at different locations and collating these > records to distinguish spectral features associated with one specific > location from other locations in the site of interest' > > Isn't that the basis of all TSCM/TEMPEST Sweeps? > > A similar application was disallowed in Europe, although someone told me the > US system allows the Patent, pending objections, true or not? > > Check it out, there are over 40 claims. > > US Patent # 6,021,269 of 1/2/2000. > > Jim Douglas > Douglas Security Consultants > PO Box 122 > Fosse Andres > St Peter Port > Guernsey > Channel Isles > > Cellnet: 44(0)802 510216 email: Dugconsult@a... > > ------------------------------------------------------------------------ > SHOPPING for DEALS? The merchants at BuyItOnline.com are offering up > to 30% OFF great gear, wear, gadgets and more, now through April 15, > 2000. Real stores. Real Deals. Real Easy. Go get something great! > http://click.egroups.com/1/3025/0/_/507420/_/957370514/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 242 From: Jay Coote Date: Wed May 3, 2000 3:33pm Subject: Sweep Tone Gen & CC Receiver? I would like to include an audio sweeping tone generator (200-4000 Hz?) and a carrier current receiver (5-600 Khz?) into a telephone breakout box I hope to build. Can any "home brewers" fax me schematics for these? Thanks, Jay Coote Los Angeles (Fax) 626-574-5176 243 From: Guy Urbina Date: Wed May 3, 2000 3:35pm Subject: bugs using UWB time domain or micropower impulse I'm starting to see a lot of applications for UWB (ultra wide band) time domain and micro power impulse for extremely low power communication devices. It's only a matter of time before these start popping up as high end bugs. What can we do to start some research on countermeasures for these devices? can current spectrum analyzing methods be used? I was looking at one website www.time-domain.com they are claiming detectability ranges of 3ft or less... The technology seems to be eerily familiar as MIR (micropower impulse radar) at LLNL. see: lasers.llnl.gov/idp/mir/mir.html Just wanted to throw this out to the group, been brooding in my mind for awhile..... -Guy 244 From: Rocco Rosano Date: Wed May 3, 2000 5:21pm Subject: Re: Patent on finding transmitters Et Al I have to agree that there is very little merit to the claim. I am a graduate of the Inter-Agency Training Center (ITC)(The Federal Academy that teaches TSCM to CI/LEOs). I graduated the course over a decade before the first claim and know Agents (long since retired) that graduated decades before me. In fact, the national procedural guides, pre-date these claims. I don't think these patents claims are worth the paper they are written on. Rocco Rosano Reynoldsburg, Ohio mailto:RoccoRosano@a... Gordon Mitchell wrote: > Well, the patent examiners don't always catch prior art. > Gordon Mitchell > Future Focus, Inc > Electronic eavesdropping detection & finding clues in computers. > > Dugconsult@a... wrote: > > > > US Patent # 6,021,269 of 1/2/2000. > > > > Jim Douglas > > Douglas Security Consultants > > PO Box 122 > > Fosse Andres > > St Peter Port > > Guernsey > > Channel Isles > > > > Cellnet: 44(0)802 510216 email: Dugconsult@a... > > > > 245 From: Doug Ellsworth Date: Wed May 3, 2000 9:30pm Subject: resource for old equipment manuals Hi group, I recently purchased an older model communications test system which functions on T-1 systems. I think it might be an asset to my toolset but I cannot find a user's manual. The manufacturer (Hekimian Laboratories) is searching right now, but I thought someone in the group might know of a resource or clearinghouse for manuals pertaining to outdated electronics gear. Am I correct that there is a business in this? Anything will be of help. Thanks, -doug [Non-text portions of this message have been removed] 246 From: Lachlan.h Date: Thu May 4, 2000 0:53am Subject: Fw: [2600-AU] [ISN] Cybercrime Solution Has Bugs (fwd) ----- Original Message ----- From: Grant Bayley To: ; <2600-list@w...> Sent: Thursday, May 04, 2000 2:24 PM Subject: [2600-AU] [ISN] Cybercrime Solution Has Bugs (fwd) > ---------- Forwarded message ---------- > Date: Wed, 3 May 2000 17:48:51 -0500 > From: William Knowles > To: ISN@S... > Subject: [ISN] Cybercrime Solution Has Bugs > > http://www.wired.com/news/politics/0,1283,36047,00.html > > by Declan McCullagh > > 3:00 a.m. May. 3, 2000 PDT > > WASHINGTON -- U.S. and European police agencies will receive new > powers to investigate and prosecute computer crimes, according to a > preliminary draft of a treaty being circulated among over 40 nations. > > The Council of Europe's 65KB proposal is designed to aid police in > investigations of online miscreants in cases where attacks or > intrusions cross national borders. > > But the details of the "Draft Convention on Cybercrime" worry U.S. > civil libertarians. They warn that the plan would violate longstanding > privacy rights and grant the government far too much power. > > The proposal, which is expected to be finalized by December 2000 and > appears to be the first computer crime treaty, would: > > Make it a crime to create, download, or post on a website any > computer program that is "designed or adapted" primarily to gain > access to a computer system without permission. Also banned is > software designed to interfere with the "functioning of a computer > system" by deleting or altering data. > > Allow authorities to order someone to reveal his or her > passphrase for an encryption key. According to a recent > survey, only Singapore and Malaysia have enacted such a > requirement into law, and experts say that in the United States > it could run afoul of constitutional protections against > self-incrimination. > > Internationalize a U.S. law that makes it a crime to possess > even digital images that "appear" to represent children's genitals > or children engaged in sexual conduct. Linking to such a site also > would be a crime. > > Require websites and Internet providers to collect information > about their users, a rule that would potentially limit > anonymous remailers. > > U.S. law enforcement officials helped to write the document, which was > released for public comment last Thursday, and the Justice Department > is expected to urge the Senate to approve it next year. Other > non-European countries actively involved in negotiations include > Canada, Japan, and South Africa. > > During recent testimony before Congress, Attorney General Janet Reno > warned of international computer crime, a claim that gained more > credibility last month with the arrest of alleged denial-of-service > culprit Mafiaboy in Canada. > > "The damage that can be done by somebody sitting halfway around the > world is immense. We have got to be able to trace them, and we have > made real progress with our discussions with our colleagues in the G-8 > and in the Council of Europe," Reno told a Senate appropriations > subcommittee in February, the week after the denial-of-service attacks > took place. > > "Some countries have weak laws, or no laws, against computer crimes, > creating a major obstacle to solving and to prosecuting computer > crimes. I am quite concerned that one or more nations will become > 'safe havens' for cyber-criminals," Reno said. > > Civil libertarians say the Justice Department will try to pressure the > Senate to approve the treaty even if it violates Americans' privacy > rights. > > "The Council of Europe in this case has just been taken over by the > U.S. Justice Department and is only considering law enforcement > demands," says Dave Banisar, co-author of The Electronic Privacy > Papers. "They're using one more international organization to launder > U.S. policy." > > Banisar says Article 6 of the measure, titled "Illegal Devices," could > ban commonplace network security tools like crack and nmap, which is > included with Linux as a standard utility. "Companies would be able to > criminalize people who reveal security holes about their products," > Banisar said. > > "I think it's dangerous for the Internet," says Barry Steinhardt, > associate director of the American Civil Liberties Union and a founder > of the Global Internet Liberty Campaign. "I think it will interfere > with the ability to speak anonymously." > > "It will interfere with the ability of hackers -- using that term in a > favorable light -- to test their own security and the security of > others," Steinhardt said. > > Solveig Singleton, director of information studies at the libertarian > Cato Institute says it's likely -- although because of the vague > language not certain -- that anonymous remailers will be imperiled. > > The draft document says countries must pass laws to "ensure the > expeditious preservation of that traffic data, regardless whether one > or more service providers were involved in the transmission of that > communication." A service provider is defined as any entity that sends > or receives electronic communications. > > Representing the U.S. in the drafting process is the Justice > Department's Computer Crime and Intellectual Property section, which > chairs the G-8 subgroup on high-tech crime and also is involved with a > cybercrime project at the Organization of American States. In December > 1997 Reno convened the first meeting on computer crime of the G-8 > nations. > > A recent White House working group, which includes representatives > from the Justice Department, FBI, and Secret Service has called for > restrictions on anonymity online, saying it can provide criminals with > an impenetrable shield. So has a report from a committee of the > European Parliament. > > Other portions of the treaty include fairly detailed descriptions of > extradition procedures and requirements for countries to establish > around-the-clock computer-crime centers that police groups in other > countries may contact for immediate help. > > The Council of Europe is not affiliated with the European Union, and > includes over 40 member nations, including Russia, which joined in > 1996. > > After the Council of Europe's expert group finalizes the proposed > treaty, the full committee of ministers must adopt the text. Then it > will be sent to countries for their signatures. Comments can be sent > to daj@c.... > > > *-------------------------------------------------* > "Communications without intelligence is noise; > Intelligence without communications is irrelevant." > Gen. Alfred. M. Gray, USMC > --------------------------------------------------- > C4I Secure Solutions http://www.c4i.org > *-------------------------------------------------* > > ISN is sponsored by SecurityFocus.com > --- > To unsubscribe email LISTSERV@S... with a message body of > "SIGNOFF ISN". > > > --------------------------------------------------------------------- > The name of this list is: 2600-list@w... > To unsubscribe, e-mail: 2600-list-unsubscribe@w... > For additional commands, e-mail: 2600-list-help@w... > > 247 From: Doug Ellsworth Date: Thu May 4, 2000 3:21am Subject: Re: Fw: [2600-AU] [ISN] Cybercrime Solution Has Bugs (fwd) Hi Group, As an aside, I gave a one-day presentation on computer security on March 16 with Supervisory Special Agent Jim Christy, of The Office of The Assistant Secretary of Defense for Command, Control, and Intelligence (ASDC3I). Jim is regarded as the original cyber-cop for his role as case manager in the Hanover Hacker Case, WHICH OCCURRED IN 1986, and chronicled in The Cuckoo's Egg by Clifford Stoll. What's interesting is that Jim told us that TO THIS DAY - that case (1986) is still the ONLY case that's been ADJUDICATED in which a nation-state levied an attack against another nation-state through cyber manipulation. ...something to ponder within the context of the whole picture... -doug ----- Original Message ----- From: Lachlan.h To: Cc: Sent: Wednesday, May 03, 2000 10:53 PM Subject: [TSCM-L] Fw: [2600-AU] [ISN] Cybercrime Solution Has Bugs (fwd) > > ----- Original Message ----- > From: Grant Bayley > To: ; <2600-list@w...> > Sent: Thursday, May 04, 2000 2:24 PM > Subject: [2600-AU] [ISN] Cybercrime Solution Has Bugs (fwd) > > > > ---------- Forwarded message ---------- > > Date: Wed, 3 May 2000 17:48:51 -0500 > > From: William Knowles > > To: ISN@S... > > Subject: [ISN] Cybercrime Solution Has Bugs > > > > http://www.wired.com/news/politics/0,1283,36047,00.html > > > > by Declan McCullagh > > > > 3:00 a.m. May. 3, 2000 PDT > > > > WASHINGTON -- U.S. and European police agencies will receive new > > powers to investigate and prosecute computer crimes, according to a > > preliminary draft of a treaty being circulated among over 40 nations. > > > > The Council of Europe's 65KB proposal is designed to aid police in > > investigations of online miscreants in cases where attacks or > > intrusions cross national borders. > > > > But the details of the "Draft Convention on Cybercrime" worry U.S. > > civil libertarians. They warn that the plan would violate longstanding > > privacy rights and grant the government far too much power. > > > > The proposal, which is expected to be finalized by December 2000 and > > appears to be the first computer crime treaty, would: > > > > Make it a crime to create, download, or post on a website any > > computer program that is "designed or adapted" primarily to gain > > access to a computer system without permission. Also banned is > > software designed to interfere with the "functioning of a computer > > system" by deleting or altering data. > > > > Allow authorities to order someone to reveal his or her > > passphrase for an encryption key. According to a recent > > survey, only Singapore and Malaysia have enacted such a > > requirement into law, and experts say that in the United States > > it could run afoul of constitutional protections against > > self-incrimination. > > > > Internationalize a U.S. law that makes it a crime to possess > > even digital images that "appear" to represent children's genitals > > or children engaged in sexual conduct. Linking to such a site also > > would be a crime. > > > > Require websites and Internet providers to collect information > > about their users, a rule that would potentially limit > > anonymous remailers. > > > > U.S. law enforcement officials helped to write the document, which was > > released for public comment last Thursday, and the Justice Department > > is expected to urge the Senate to approve it next year. Other > > non-European countries actively involved in negotiations include > > Canada, Japan, and South Africa. > > > > During recent testimony before Congress, Attorney General Janet Reno > > warned of international computer crime, a claim that gained more > > credibility last month with the arrest of alleged denial-of-service > > culprit Mafiaboy in Canada. > > > > "The damage that can be done by somebody sitting halfway around the > > world is immense. We have got to be able to trace them, and we have > > made real progress with our discussions with our colleagues in the G-8 > > and in the Council of Europe," Reno told a Senate appropriations > > subcommittee in February, the week after the denial-of-service attacks > > took place. > > > > "Some countries have weak laws, or no laws, against computer crimes, > > creating a major obstacle to solving and to prosecuting computer > > crimes. I am quite concerned that one or more nations will become > > 'safe havens' for cyber-criminals," Reno said. > > > > Civil libertarians say the Justice Department will try to pressure the > > Senate to approve the treaty even if it violates Americans' privacy > > rights. > > > > "The Council of Europe in this case has just been taken over by the > > U.S. Justice Department and is only considering law enforcement > > demands," says Dave Banisar, co-author of The Electronic Privacy > > Papers. "They're using one more international organization to launder > > U.S. policy." > > > > Banisar says Article 6 of the measure, titled "Illegal Devices," could > > ban commonplace network security tools like crack and nmap, which is > > included with Linux as a standard utility. "Companies would be able to > > criminalize people who reveal security holes about their products," > > Banisar said. > > > > "I think it's dangerous for the Internet," says Barry Steinhardt, > > associate director of the American Civil Liberties Union and a founder > > of the Global Internet Liberty Campaign. "I think it will interfere > > with the ability to speak anonymously." > > > > "It will interfere with the ability of hackers -- using that term in a > > favorable light -- to test their own security and the security of > > others," Steinhardt said. > > > > Solveig Singleton, director of information studies at the libertarian > > Cato Institute says it's likely -- although because of the vague > > language not certain -- that anonymous remailers will be imperiled. > > > > The draft document says countries must pass laws to "ensure the > > expeditious preservation of that traffic data, regardless whether one > > or more service providers were involved in the transmission of that > > communication." A service provider is defined as any entity that sends > > or receives electronic communications. > > > > Representing the U.S. in the drafting process is the Justice > > Department's Computer Crime and Intellectual Property section, which > > chairs the G-8 subgroup on high-tech crime and also is involved with a > > cybercrime project at the Organization of American States. In December > > 1997 Reno convened the first meeting on computer crime of the G-8 > > nations. > > > > A recent White House working group, which includes representatives > > from the Justice Department, FBI, and Secret Service has called for > > restrictions on anonymity online, saying it can provide criminals with > > an impenetrable shield. So has a report from a committee of the > > European Parliament. > > > > Other portions of the treaty include fairly detailed descriptions of > > extradition procedures and requirements for countries to establish > > around-the-clock computer-crime centers that police groups in other > > countries may contact for immediate help. > > > > The Council of Europe is not affiliated with the European Union, and > > includes over 40 member nations, including Russia, which joined in > > 1996. > > > > After the Council of Europe's expert group finalizes the proposed > > treaty, the full committee of ministers must adopt the text. Then it > > will be sent to countries for their signatures. Comments can be sent > > to daj@c.... > > > > > > *-------------------------------------------------* > > "Communications without intelligence is noise; > > Intelligence without communications is irrelevant." > > Gen. Alfred. M. Gray, USMC > > --------------------------------------------------- > > C4I Secure Solutions http://www.c4i.org > > *-------------------------------------------------* > > > > ISN is sponsored by SecurityFocus.com > > --- > > To unsubscribe email LISTSERV@S... with a message body of > > "SIGNOFF ISN". > > > > > > --------------------------------------------------------------------- > > The name of this list is: 2600-list@w... > > To unsubscribe, e-mail: 2600-list-unsubscribe@w... > > For additional commands, e-mail: 2600-list-help@w... > > > > > > > ------------------------------------------------------------------------ > GET WHO WANTS TO BE A MILLIONAIRE FREE! GET THE OFFICIAL COMPANION > TO TELEVISION'S HOTTEST GAME SHOW PHENOMENON PLUS 5 MORE BOOKS FOR > $2. Click for details. > http://click.egroups.com/1/3014/0/_/507420/_/957419602/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 248 From: Hoffman Date: Thu May 4, 2000 9:49am Subject: Trial for Pager Interception An interesting new article. Waste of taxpayer money, in my opinion, prosecuting this nonesense. The laws of this country really should not be designed to protect the "lowest common denominator". People should simply accept the premise that there is no reasonable expectation of privacy when utilizing any form of electromagnetic communications, particularly when a signal is isotropic and not low divergence or directed (not that it makes a difference either way). hoffman@n... --------------------------- Pager Eavesdropping Trial OK'd BY MARK HAMBLETT New York Law Journal Tuesday, May 2, 2000 A CHALLENGE to a federal prosecution under the Electronics Communications Privacy Act involving eavesdropping of alphanumeric pagers has been rejected by a Southern District judge. Senior Judge Shirley Wohl Kram refused to dismiss a case against a New York City police officer who allegedly used software to read paging messages by the police department. Judge Kram rejected arguments by the officer that reading the pages is not forbidden under the act, and that he was the victim of selective prosecution in the case, United States v. Sills, 99 Cr. 1133. Kevin Sills, a police officer for the city since 1996, was the subject of a sting operation in 1998 by a criminal investigator working for the U.S. Attorney's Office. The two-count indictment charged that between 1996 and 1998, Mr. Sills possessed software that was programmed to intercept alphanumeric pager messages ≠ a violation of ß2512(1)(b) of the act. It also charged Mr. Sills with violating ß2511(1)(a) of the act by intercepting such messages. The software, called "Message Tracker," is manufactured by a Texas company called K & L Technology. When used in conjunction with a radio scanner, Message Tracker can be used to intercept messages from the targeted pager and display them on a computer. In phone conversations with an employee of K & L Technology who was cooperating with the investigator, Mr. Sills allegedly said that he had been reading other pagers, asked the employee if the company would modify his scanner so it worked in conjunction with a more advanced version of Message Tracker and then ordered the modifications to be done. Investigator Ronald G. Gardella, posing as a Federal Express delivery man, then delivered to Mr. Sills' home his newly modified scanner and the latest version of Message Tracker software. An ensuing search of the premises allegedly turned up a computer file containing "Capcodes," which, along with specific radio frequency, make up the electronic address for pagers and distinguishes them from other pagers. Prosecutors charged that one of the Capcodes in that file belonged to the pager used by the body guard and driver for Police Commissioner Howard Safir. Mr. Sills moved to dismiss the charges before Judge Kram. First, he said his conduct was exempt under ß2511(g) of the act, which excludes any radio communication transmitted by any governmental, law enforcement or public communications system "readily accessible to the general public." Quoting the statute, Judge Kram said the act defines "readily accessible" as radio communications that are not "transmitted over a communication system provided by a common carrier, unless the communication is a tone only paging system communication." Not 'Tone Only' She said it was "undisputed" that the communications being intercepted by Mr. Sills were not "tone only" transmissions, and therefore, the transmissions at issue were not "readily accessible to the general public." Mr. Sills argued that he was singled out because he was a police officer and said that "this case appears to be the first prosecution, in this district or anywhere, involving alphanumeric pager interceptions when there is no dissemination of the intercepted information." He said the equipment he used was advertised on the open market and the government has never chosen to prosecute news organizations and private individuals who "knowingly pay for intercepted police pager communications." Mr. Sills said that when the government prosecuted the Breaking News Network for profiting from the dissemination of intercepted pager information, including police messages, the government did not prosecute people or news organizations who paid for BNN's service. Judge Kram disagreed. "Whereas BNN's customers obtained pager messages through a purported 'service provider,' Sills directly intercepted them," she said. Assistant U.S. Attorney David Raskin represented the government. Bradley D. Simon represented Mr. Sills. [eof] 249 From: J Gomez <1upserv@g...> Date: Wed Apr 26, 2000 6:47am Subject: new PC virus detected Not on tscm matters but important.. A new computer virus believed to originate in asia is going around. Watch out. It appears as a file attachment to an e-mail titled " I LOVE YOU " though it has not been proven to damage your system it will certainly rob you of vast amount of space it will send itself to everyone you have listed in your directory plus everyone you've contacted recently. AVOID THE HASSLE DELETE WITHOUT OPENING USING SHIFT+DELETE COMMAND P.S. being in a small community I really enjoy sharing with a similar minded group a subject of mutual interest. Particularly since my particular "wizard" passed away not so long ago. I wish I'd paid more attention... joe 250 From: T E Date: Thu May 4, 2000 4:16am Subject: Re: GPS Precision Date: Tue, 2 May 2000 20:39:46 +0100 From: "Andy Grudko" Subject: Re: GPS Precision ----- Original Message ----- Subject: [TSCM-L] GPS Precision >> I seem to recall that on a stationary target the precision GPS signal >> has accuracy of under one inch, and that the "20 foot" accuracy >> number relates to targets moving at a high rate of speed. >> May 1, 2000 >> STATEMENT BY THE PRESIDENT REGARDING THE UNITED STATES? DECISION TO >> STOPDEGRADING GLOBAL POSITIONING SYSTEM ACCURACY > I've been using GPS for 6 years for tracking suspects and never needed > more than the +- 20mr accuracy offered by the existing commercial > system. > Perhaps the President can use this extra accuracy to establish exactly > where his cigar was on a particular date, to - within an inch. > Aggh, I'm just being cynical - we all know a US President has never > written a press release! > Andy Grudko > --------------------------------------------------- > Bid for your own politician on send$$$@g... > --------------------------------------------------- Greetings. For some really spiffy accuracy, i know that the civil engineering world has some nice toys. The present level of private GPSin' accuracy, imho, does the job. Although, i am at a little bit of a loss, and perhaps will delve into it after i fix some NFS/networking problems i've bumped into, but the little Garmin piece that i have the pleasure to play with seems to know at which bar stool i may be sitting, depending. It's probably just like the above, concerning stationary and non-stationary placement(s). Oh, bother ... ------------------------------------------------------- .---..-..-.-.-..---..---. .---..-..-..---..-.-.-..-..-. `| |'| || | | || |- \ \ | |- | .` || |- | | | | > / `-' `-'`-'-'-'`---'`---' `---'`-'`-'`---'`-'-'-' `-' T I M E S E N E M Y ------------------------------------------------------- times@n... krr.org We Exist. ____________________________________________________________________ Get your own FREE, personal Netscape WebMail account today at http://webmail.netscape.com. 251 From: James M. Atkinson, Comm-Eng Date: Thu May 4, 2000 0:54pm Subject: Crypto Stats - Section 2519(2)(b)(iv) of title 18 THE WHITE HOUSE Office of the Press Secretary _______________________________________________________________ For Immediate Release May 2, 2000 STATEMENT BY THE PRESIDENT Today I signed into law S. 1769, a bill to continue a number of existing Federal reports scheduled to expire on May 15 of this year, as well as modify certain reporting requirements related to two of these reports. New section 2519(2)(b)(iv) of title 18 of the United States Code provides for general reporting by the Department of Justice of law enforcement encounters with encrypted communications in the execution of wiretap orders. In signing S. 1769, I state my understanding that the reporting required by section 2519(2)(b)(iv) is limited to general aggregate data concerning the total number of times law enforcement encountered encryption and the total number of instances in which encryption prevented access to plain text. The reporting requirement of S. 1769 does not require specific case-by-case or order-by-order reporting, which could jeopardize law enforcement sources and methods and provide clear direction to criminals seeking to use encryption to hide their unlawful conduct. WILLIAM J. CLINTON THE WHITE HOUSE, May 2, 2000. =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 252 From: Robert G. Ferrell Date: Thu May 4, 2000 1:55pm Subject: Re: new PC virus detected >Not on tscm matters but important.. >A new computer virus believed to originate in asia is going around. Watch >out. It appears as a file attachment to an e-mail titled " I LOVE YOU " >though it has not been proven to damage your system it will certainly rob >you of vast amount of space it will send itself to everyone you have listed >in your directory plus everyone you've contacted recently. > >AVOID THE HASSLE DELETE WITHOUT OPENING USING SHIFT+DELETE COMMAND I should add that this is a Visual Basic macro 'virus' that as far as I can tell won't do anything if you aren't using a Microsoft operating system. RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center, US DoI Robert_G_Ferrell@n... ------------------------------------------------------------ Nothing I have ever said should be construed as even vaguely representing an official statement by the NBC or DoI. ------------------------------------------------------------ 253 From: James M. Atkinson, Comm-Eng Date: Thu May 4, 2000 2:04pm Subject: 1999 Wiretap Reports I've got the new 1999 Wiretap reports mirrored on my website if anybody needs them: http://www.ostgate.com/DOJWiretap/ -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 254 From: Frank Stratton Date: Thu May 4, 2000 6:43pm Subject: Destructive 'ILOVEYOU' computer virus strikes worldwide Just thought that I would jump on the bandwagon and pass on information regarding the "ILOVEYOU" virus posted. ("Shift+Delete" I tried it -- works pretty good -- Thanks) CNN Website shows a sample of what it may look like, which is listed below. http://www.cnn.com/2000/TECH/computing/05/04/iloveyou/index.html The below remaining information I received, but don't know how correct it may be, so take if for whatever it is worth. Frank Stratton, PI#19258 STRATTON INVESTIGATIONS P.O. Box 402 Alta Loma, CA 91701-8402 Phn(909) 945-2049 Fax(909) 945-5450 ============================================================================ ===================== Sent: May 4, 2000 4:07:50 PM GMT Subject: CALI- VIRUS-ADDITIONAL ++++++++++++++++++++++++++++++++++++++++++++++ Everyone should have heard or will be hearing about the I LOVE YOU email virus. This is a virus that mails itself out to everyone on your mail list, but it needs windows to work. It uses the Windows Scripting host to run, which is found on NT boxes and any Windows machine with Internet Explorer 5. Here is the information about what it does: When the worm is first run it drops copies of itself in the following places: C:\WINDOWS\SYSTEM\MSKERNEL32.VBS C:\WINDOWS\WIN32DLL.VBS C:\WINDOWS\SYSTEM\LOVE-LETTER-FOR-YOU.TXT.VBS It also adds the registry keys :- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\ MSKernel32=C:\WINDOWS\SYSTEM\MSKernel32.vbs HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices\ Win32DLL=C:\WINDOWS\Win32DLL.vbs in order to run the worm at system startup. The worm replaces the following files :- *.JPG *.JPEG *.MP3 *.MP2 with copies of itself and it adds the extension .VBS to the original filename. So PICT.JPG would be replaced with PICT.JPG.VBS and this would contain the worm. The worm will also connect to the IRC if it can, and broadcast the file if it can. Also, it will try and connect to the net and download a password stealing program to collect your passwords. Joseph Seanor CIBIR Corporation Computer Crime Investigators http://www.pimall.com/cibir/ 255 From: Rocco Rosano Date: Thu May 4, 2000 6:19pm Subject: What Timing!! Et Al: No sooner did I write this, then the "ILOVEYOU" virus hits. What great timing! May 1st: """∑ Exploit the fragmentation in Information Operations/Assurance programs; particularly as they are exhibited in the US Army (as an example). ∑ Using US national infrastructure supported commercial wireless broadband devices to improve espionage communications and defeat the various military and national level counterintelligence programs. ∑ Identify network seams for exploitation. ∑ Develop virile software techniques to reduce bandwidth potential. ∑ Inhibit transfer rates and processor speeds. ∑ Conduct short-term deception and cyber infiltration operations to measure response times of investigative action, the threshold for counterintelligence interest and disguise FIS activity as prankster events. Successful exploitation of the military inability to detect, exploit and neutralize FIS IO/IA and R&D espionage will provide them an asymmetrical advantage over the traditional thinking of the senior MCS.""" The Extremely Slow Learner: Rocco 256 From: Rocco Rosano Date: Thu May 4, 2000 7:24pm Subject: Re: bugs using UWB time domain or micropower impulse Good Evening Guy, Et Al: Yes, this is an interesting subject. It's best applications are, of course, in the fiber optic transmission arena. UWB free-space transmitters need a lot of power and will not last long on battery technology. Guy Urbina wrote: > I'm starting to see a lot of applications for UWB (ultra wide band) time > domain and micro power impulse for extremely low power communication > devices. It's only a matter of time before these start popping up as high > end bugs. > > What can we do to start some research on countermeasures for these devices? > > can current spectrum analyzing methods be used? You have to know exactly what you are looking for and where in the spectrum to find it. UWB activity leaves a footprint. Like many of the current technology threats, a standard TSCM search receiver can not see the entire signal (3db point to 3db point). Spectrum Analysis can be used - but you need two more things. A Ghz Receiver that has the ability to down convert the signal through the WB Output (optimally 2Ghz bandwidth IF - useable) of the receiver; or an ultra clean baseband output with a UW bandwidth. And of course you need a sensor that is able to be excited in WB mode. All this is very expensive. > I was looking at one website www.time-domain.com > they are claiming detectability ranges of 3ft or less... If you explore a little further, this technology is not (really) what I would call UWB (with bandwidths of 1 to 10 GHz). This is high frequency stuff. But it can be detected with the standard TSCM Search Receiver with the help of a standard spectrum analyzer. The footprint is well within range and this particular stuff can (forensic ally) be fingerprinted by the % of BW used over the median threshold (in this case about 116%). Because of the "pulse" characteristics, this stuff is very, very susceptible to RASTER Analysis investigative techniques using standard equipment (COTS). Time Domain Corporation (TDC) has developed a wireless technology which enables many new products in the fields of communications, positioning and radar. The PulsON TM technology is based upon the Time Modulated Ultra Wideband (TM-UWB) architecture. The TM-UWB architecture is characterized by: ïUltra-short duration pulses which yield ultrawide bandwidth signals; ïExtremely low power spectral densities; ïCenter frequencies typically between 650 MHz and 5 GHz; ïMulti-mile ranges with sub-milliWatt average power levels (even with low gain antennas); ïExcellent immunity to interference from other radio systems; On the imagery issue, it has great potential. And I've seen some of the work done, really neat stuff. > The technology seems to be eerily familiar as MIR (micropower impulse radar) > at LLNL. > > see: lasers.llnl.gov/idp/mir/mir.html Yes it is micro-millimeter stuff. And it takes advantage of some of the new Stealth technology finding and discovery's. > Just wanted to throw this out to the group, been brooding in my mind for > awhile..... Very interesting stuff. But it has its vulnerabilities; as you can see. Rocco Rosano Reynoldsburg, Ohio mailto:RoccoRosano@a... 257 From: Date: Fri May 5, 2000 2:29am Subject: TSCM Patents My final comments on the TSCM Patent thing: I take Mr Mitchellís point about suing potential clients. The Company or person granted the Patent may simply be trying to put one over on their competitors. I could understand if anyone was selling a whole bunch of them. Generally the TSCM business moves quickly to keep up with new developments and reputable Sweepers share information and adapt their equipment to meet the threat. It is also my understanding (at least in Europe) that you cannot take a known technique, replicate it in software and acquire a patent. Iím also not convinced that the Patent will hold up. As Mr Rosano informed us, there is prior art, however most sweep techniques have filtered down from Government users and may not be sufficiently documented in the US or regarded as being ëin the public domainí. A member recently asked about software radio, an obvious way forward, restrictive Patents like these could easily discourage receiver manufacturers from introducing new technology to the TSCM market. Jim Douglas Douglas Security Consultants 258 From: Date: Fri May 5, 2000 11:21am Subject: Re: Destructive 'ILOVEYOU' computer virus strikes worldwide more on " i love you vius"; article How about this one, it could affect you? By some estimates, the ''ILOVEYOU'' software virus on Thursday infected tens of millions of computers, crippled government and corporate computer networks around the world and destroyed personal files of music and pictures. Disabling e-mail systems on Capitol Hill and in British parliament the virus not only spread by e-mail, like last year's Melissa virus, but also through instant messaging systems that let people chat on the Internet. The FBI quickly opened a criminal investigation, and agents were trying to verify reports that the outbreak may have begun in Asia, possibly the Philippines. ''It's almost like Melissa on steroids,'' Internet security expert Srivats Sampath says of the virus. ''It's the fastest propagating virus we've seen.'' HAVE A GREAT DAY !!! 259 From: Date: Fri May 5, 2000 10:11am Subject: *READ: HOTSITES FORUM/MODERATOR* MODERATOR COMMENT: The following forum has been set up and now contains over 500 hotsites in its archives. They are "subj field" arranged for ease of viewing. We consider these to be some of the best investigative sites on the net. The forum is dependent on YOUR submissions as well and we encourage your submissions. There is NO dialogue. Just "sites" and a brief description of them. I am certain you will find it worthwhile. The forum IS moderated and the membership is RESTRICTED. SUBSCRIPTION INSTRUCTIONS ARE SIMPLE AND FOLLOW THIS MSG. JUST SEND YOUR REQUEST TO THE BELOW NOTED E-MAIL ADDY. IN THE SUBJ FIELD INDICATE "SUBSCRIBE." NOTHING ELSE! Bill Schneid Moderator Director of Special Operations Global Projects, Ltd. 310.314.8760 ICQ48007716 http://globalprojectsltd.com PI15860 Due to the constant quest, by investigators and various agencies, for internet "hot sites" and "links" the following forum has been dedicated. This should also help the investigator who has had a "crash" and lost their sites. This forum is moderated and ONLY investigators shall be permitted to access the archives. PLEASE MAKE YOUR SUBJECT FIELD REPRESENTATIVE OF THE MSG CONTENT. ------------------------------------------------------------------------ Addresses: Post message: Hotsites@egroups.com Subscribe: Hotsites-subscribe@egroups.com Unsubscribe: Hotsites-unsubscribe@egroups.com List owner: Hotsites-owner@egroups.com URL to this page: http://www.egroups.com/group/Hotsites 260 From: James M. Atkinson, Comm-Eng Date: Fri May 5, 2000 2:34pm Subject: Re: *READ: HOTSITES FORUM/MODERATOR* I would like to take a moment and apologize to the group for letting this piece of SPAM slip though onto the list. Due to a screw-up on the mail server the subscriber was accidentally given posting privileges (which have now been revoked to stop future abuse). -jma At 3:11 PM -0400 5/5/00, sleuthone@a... wrote: >MODERATOR COMMENT: > >The following forum has been set up and now contains over 500 hotsites in its >archives. They are "subj field" arranged for ease of viewing. We consider >these to be some of the best investigative sites on the net. The forum is >dependent on YOUR submissions as well and we encourage your submissions. > >There is NO dialogue. Just "sites" and a brief description of them. I am >certain you will find it worthwhile. > >The forum IS moderated and the membership is RESTRICTED. > >SUBSCRIPTION INSTRUCTIONS ARE SIMPLE AND FOLLOW THIS MSG. > >JUST SEND YOUR REQUEST TO THE BELOW NOTED E-MAIL ADDY. IN THE SUBJ FIELD >INDICATE "SUBSCRIBE." > >NOTHING ELSE! > >Bill Schneid >Moderator > >Director of Special Operations >Global Projects, Ltd. >310.314.8760 >ICQ48007716 >http://globalprojectsltd.com >PI15860 > > >Due to the constant quest, by investigators and various agencies, for >internet "hot sites" and "links" the following forum has been >dedicated. This should also help the investigator who has had a "crash" and >lost their sites. This forum is moderated and ONLY investigators shall be >permitted to access the archives. PLEASE MAKE YOUR SUBJECT FIELD >REPRESENTATIVE OF THE MSG CONTENT. > >------------------------------------------------------------------------ > > >Addresses: > >Post message: Hotsites@egroups.com >Subscribe: Hotsites-subscribe@egroups.com >Unsubscribe: Hotsites-unsubscribe@egroups.com >List owner: Hotsites-owner@egroups.com >URL to this page: http://www.egroups.com/group/Hotsites > >------------------------------------------------------------------------ >Would you like to save big on your phone bill -- and keep on saving >more each month? Join beMANY! Our huge buying group gives you Long Distance >rates which fall monthly, plus an extra $60 in FREE calls! >http://click.egroups.com/1/2567/1/_/507420/_/957554032/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 261 From: Andre Holmes <1ach@g...> Date: Fri May 5, 2000 2:43pm Subject: Re: TSCM Patents Mr Douglas you say that reputable Sweepers share information and adapt their equipment to meet the threat. What is considered reputable if you look in the PI listings some say they are tscm people if you ask them to show you some equipment one or more will not be able to and might even ask you the client what level of threat are you facing, majority here will not show you properitory technique that they mastered they will not show there weaknesses as to equipment they lack like a vector analysier or modulation analyser and a optical tdr a telephone analyser etc etc.There are reputable raindancers all over we need to be cautious as to what we say because there are people out there trying to defeat countermeasures. I could tell you about new theats concernig wavecom ecryption that will rending countersurveilance a problem and give the opposition a chance to continue there crimes, will a reputable Sweeper tell you how hes going to turn that threat around.When it comes to shared information most talk about it privately.As far as introducing new technology to the tscm market do you have anything to offer? -----Original Message----- From: Dugconsult@a... To: TSCM-L@egroups.com Cc: gordon@b... ; roccorosano@a... Date: Friday, May 05, 2000 7:29 AM Subject: [TSCM-L] TSCM Patents My final comments on the TSCM Patent thing: I take Mr Mitchellís point about suing potential clients. The Company or person granted the Patent may simply be trying to put one over on their competitors. I could understand if anyone was selling a whole bunch of them. Generally the TSCM business moves quickly to keep up with new developments and reputable Sweepers share information and adapt their equipment to meet the threat. It is also my understanding (at least in Europe) that you cannot take a known technique, replicate it in software and acquire a patent. Iím also not convinced that the Patent will hold up. As Mr Rosano informed us, there is prior art, however most sweep techniques have filtered down from Government users and may not be sufficiently documented in the US or regarded as being ëin the public domainí. A member recently asked about software radio, an obvious way forward, restrictive Patents like these could easily discourage receiver manufacturers from introducing new technology to the TSCM market. Jim Douglas Douglas Security Consultants ------------------------------------------------------------------------ Up to 60% OFF food! Buy Now and Shipping is Free. http://click.egroups.com/1/4016/1/_/507420/_/957526185/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 262 From: James M. Atkinson, Comm-Eng Date: Fri May 5, 2000 4:23pm Subject: Re: TSCM Patents Andre has a good point (but should include some spaces between his paragraphs). Each TSCM firm or consultants must be evaluated from several different facets The TSCM'er must of course be ethical, honest, shoot straight, and must always have their clients best interest at heart. This is of course the most important of all issues. The TSCM must be honest to a fault both with himself, and his client, and must be beyond reproach. The TSCM'er simply can not play Walter Mitty games, inflame paranoia, attempt to manipulate the client, or to prey on their fears. Always tell the client the unvarnished truth, even if it's not what they want to hear. It is critical that the TSCM not "sugar coat" their findings or opinions simply to provide the customer "a warm feeling", but must be brutally honest. The first issue (after ethics) is technical competency. This is a fairly touchy area as a rain dancing private investigator may feel "in his heart of hearts" that he is an honest fellow who is using nothing more then a Capri or Southern Security "rain maker box". While he may be honest, he is rarely competent. Of course there are PI's who are also extremely competent in TSCM, but the majority are not. The second issue is to gain technical competency in TSCM, the TSCM'er must first obtain formal TSCM training and experience (such as the ITC or related civilian courses). Third, Of course the TSCM student must first have a strong technical background and experience to begin with. But beware of a TSCM "expert" who runs around trumpeting his academic credentials or technical experience, but has little or no actual TSCM training (except in his own mind). Fourth, The TSCM'er must have a hefty investment in test equipment and related support gear. This is usually a fairly painful proposition, but a necessary one often involving hundreds of thousands of dollars. It is compared to trying to build a house using nothing more then a hammer and screwdriver. To perform TSCM services you simply have to have the appropriate test equipment (Just try finding a ELF Digital device at 32 kHz on the power lines using just an AVCOM). Fifth, the TSCM should have a formal written procedure or guide that they follow for every element of a sweep (not just a ten page checklist). This helps to ensure that the work is comprehensive, and that minute details are not missed. Sixth, The TSCM should only be "playing side of the fence". Simply put, either do TSCM or do surveillance, but not both (at least until your established). One of the biggest career killers is the new TSCM'er who starts dabbling in technical surveillance, then to get hauled up on charges years later. If you have a government contract in place that's one thing, but do not place games with 2512 that you may regret later. (TSCM'er have no legitimate reason to buy, build, possess, or otherwise screw around with bugs, or even anything resembling a bug, period) Seventh, the TSCM'er must be intimately familiar with the technology being used (or about to be used) for technical surveillance. This does not mean that you should go out and play with naughty toys, but that you should study the technical specifications of what is out there and modify you own formal procedures to adapt. If you are unable to study a technical specification and interpret the implications the have for TSCM you should really consider other employment. Eighth, Can the TSCM'er actually (physically) perform a sweep? Climbing ladders, dragging around hundreds (often thousands) of pounds of equipment, crawling around on your hands and knees, moving desks is all physically intensive (and exhausting). TSCM'ers get dirty, get dusty, have to crawl around in nasty ceilings, wiring closets, and so on. If the TSCM'er can't "hump a ruck" they are not going to be able to perform very well on a sweep. Of course you can use helpers, or an apprentice to help out, but it's tough to find good help (and it gets expensive real quick). Ninth, The TSCM must be certified, bondable, or insurable, or at least be able to get others (who are legitimate) to vouch for him or work under them until he can obtain a such a credential. Interfacing with other TSCM'ers is critical, as is sharing what knowledge you have with other TSCM people. Just my humble opinion, -jma At 3:43 PM -0400 5/5/00, Andre Holmes wrote: >Mr Douglas you say that reputable Sweepers share information and adapt their >equipment to meet the threat. What is considered reputable if you look in >the PI listings some say they are tscm people if you ask them to show you >some equipment one or more will not be able to and might even ask you the >client what level of threat are you facing, majority here will not show you >properitory technique that they mastered they will not show there weaknesses >as to equipment they lack like a vector analysier or modulation analyser and >a optical tdr a telephone analyser etc etc.There are reputable raindancers >all over we need to be cautious as to what we say because there are people >out there trying to defeat countermeasures. I could tell you about new >theats concernig wavecom ecryption that will rending countersurveilance a >problem and give the opposition a chance to continue there crimes, will a >reputable Sweeper tell you how hes going to turn that threat around.When it >comes to shared information most talk about it privately.As far as >introducing new technology to the tscm market do you have anything to offer? >-----Original Message----- >From: Dugconsult@a... >To: TSCM-L@egroups.com >Cc: gordon@b... ; roccorosano@a... > >Date: Friday, May 05, 2000 7:29 AM >Subject: [TSCM-L] TSCM Patents > > >My final comments on the TSCM Patent thing: > >I take Mr Mitchellís point about suing potential clients. The Company or >person granted the Patent may simply be trying to put one over on their >competitors. > >I could understand if anyone was selling a whole bunch of them. Generally >the TSCM business moves quickly to keep up with new developments and >reputable Sweepers share information and adapt their equipment to meet the >threat. It is also my understanding (at least in Europe) that you cannot >take a known technique, replicate it in software and acquire a patent. > >Iím also not convinced that the Patent will hold up. As Mr Rosano informed >us, there is prior art, however most sweep techniques have filtered down >from Government users and may not be sufficiently documented in the US or >regarded as being ëin the public domainí. > >A member recently asked about software radio, an obvious way forward, >restrictive Patents like these could easily discourage receiver >manufacturers from introducing new technology to the TSCM market. > >Jim Douglas >Douglas Security Consultants =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 263 From: James M. Atkinson, Comm-Eng Date: Fri May 5, 2000 9:25pm Subject: FBI probing Israeli wiretapping at White House >Sent: Friday, May 05, 2000 5:09 PM >Subject: FC: FBI probing Israeli wiretapping at White House --Insight mag > > INSIGHT MAGAZINE > > 5/5/00 > > **EXCLUSIVE** > > > > FBI Probes Espionage at Clinton White House > > > > A foreign spy service appears to have penetrated secret communications in > > the Clinton administration, which has discounted security and intelligence > > threats. > > > > By J. Michael Waller and Paul M. Rodriguez > > > > The FBI is probing an explosive foreign-espionage operation that could > > dwarf the other spy scandals plaguing the U.S. government. Insight has > > learned that FBI counterintelligence is tracking a daring operation to spy > > on high-level U.S. officials by hacking into supposedly secure telephone > > networks. The espionage was facilitated, federal officials say, by lax > > telephone-security procedures at the White House, State Department and > > other high-level government offices and by a Justice Department > > unwillingness to seek an indictment against a suspect. > > > > The espionage operation may have serious ramifications because the FBI has > > identified Israel as the culprit. It risks undermining U.S. public support > > for the Jewish state at a time Israel is seeking billions of tax dollars > > for the return of land to Syria. It certainly will add to perceptions that > > the Clinton-Gore administration is not serious about national security. > > Most important, it could further erode international confidence in the > > ability of the United States to keep secrets and effectively lead as the > > world^“s only superpower. > > > > More than two dozen U.S. intelligence, counterintelligence, >law-enforcement > > and other officials have told Insight that the FBI believes Israel has > > intercepted telephone and modem communications on some of the most > > sensitive lines of the U.S. government on an ongoing basis. The worst > > penetrations are believed to be in the State Department. But others say >the > > supposedly secure telephone systems in the White House, Defense Department > > and Justice Department may have been compromised as well. > > > > The problem for FBI agents in the famed Division 5, however, isn^“t just > > what they have uncovered, which is substantial, but what they don^“t yet > > know, according to Insight^“s sources interviewed during a year-long > > investigation by the magazine. Of special concern is how to confirm and > > deal with the potentially sweeping espionage penetration of key U.S. > > government telecommunications systems allowing foreign eavesdropping on > > calls to and from the White House, the National Security Council, or NSC, > > the Pentagon and the State Department. > > > > The directors of the FBI and the CIA have been kept informed of the >ongoing > > counterintelligence operation, as have the president and top officials at > > the departments of Defense, State and Justice and the NSC. A ^”heads up^‘ >has > > been given to the House and Senate Intelligence Committees, but no > > government official would speak for the record. > > > > ^”It^“s a huge security nightmare,^‘ says a senior U.S. official familiar >with > > the super-secret counterintelligence operation. ^”The implications are > > severe,^‘ confirms a second with direct knowledge. ^”We^“re not even sure >we > > know the extent of it,^‘ says a third high-ranking intelligence official. > > ^”All I can tell you is that we think we know how it was done,^‘ this >third > > intelligence executive tells Insight. ^”That alone is serious enough, but > > it^“s the unknown that has such deep consequences. > > > > A senior government official who would go no further than to admit > > awareness of the FBI probe, says: ^”It is a politically sensitive matter. >I > > can^“t comment on it beyond telling you that anything involving Israel on > > this particular matter is off-limits. It^“s that hot. > > > > It is very hot indeed. For nearly a year, FBI agents had been tracking an > > Israeli businessman working for a local phone company. The man^“s wife is > > alleged to be a Mossad officer under diplomatic cover at the Israeli > > Embassy in Washington. Mossad ^◊ the Israeli intelligence service ^◊ is >known > > to station husband-and-wife teams abroad, but it was not known whether the > > husband is a full-fledged officer, an agent or something else. When >federal > > agents made a search of his work area they found a list of the FBI^“s most > > sensitive telephone numbers, including the Bureau^“s ^”black^‘ lines used >for > > wiretapping. Some of the listed numbers were lines that FBI > > counterintelligence used to keep track of the suspected Israeli spy > > operation. The hunted were tracking the hunters. > > > > ^”It was a shock,^‘ says an intelligence professional familiar with the >FBI > > phone list. ^”It called into question the entire operation. We had been > > compromised. But for how long? > > > > This discovery by Division 5 should have come as no surprise, given what > > its agents had been tracking for many months. But the FBI discovered >enough > > information to make it believe that, somehow, the highest levels of the > > State Department were compromised, as well as the White House and the NSC. > > According to Insight^“s sources with direct knowledge, other secure > > government telephone systems and/or phones to which government officials > > called also appear to have been compromised. > > > > The tip-off about these operations ^◊ the pursuit of which sometimes has >led > > the FBI on some wild-goose chases ^◊ appears to have come from the CIA, >says > > an Insight source. A local phone manager had become suspicious in late >1996 > > or early 1997 about activities by a subcontractor working on phone-billing > > software and hardware designs for the CIA. > > > > The subcontractor was employed by an Israeli-based company and cleared for > > such work. But suspicious behavior raised red flags. After a fairly quick > > review, the CIA handed the problem to the FBI for follow-up. This was not > > the first time the FBI had been asked to investigate such matters and, > > though it was politically explosive because it involved Israel, Division 5 > > ran with the ball. ^”This is always a sensitive issue for the Bureau,^‘ >says > > a former U.S. intelligence officer. ^”When it has anything to do with > > Israel, it^“s something you just never want to poke your nose into. But >this > > one had too much potential to ignore because it involved a potential > > systemwide penetration. > > > > Seasoned counterintelligence veterans are not surprised. ^”The Israelis > > conduct intelligence as if they are at war. That^“s something we have to > > realize,^‘ says David Major, a retired FBI supervisory special agent and > > former director of counterintelligence at the NSC. While the U.S. approach > > to intelligence is much more relaxed, says Major, the very existence of > > Israel is threatened and it regards itself as is in a permanent state of > > war. ^”There are a lot less handcuffs on intelligence for a nation that >sees > > itself at war,^‘ Major observes, but ^”that doesn^“t excuse it from our > > perspective. > > > > For years, U.S. intelligence chiefs have worried about moles burrowed into > > their agencies, but detecting them was fruitless. The activities of >Israeli > > spy Jonathan Pollard were uncovered by accident, but there remains > > puzzlement to this day as to how he was able to ascertain which documents > > to search, how he did so on so many occasions without detection, or how he > > ever obtained the security clearances that opened the doors to such > > secrets. In all, it is suspected, Pollard turned over to his Israeli > > handlers about 500,000 documents, including photographs, names and > > locations of overseas agents. ^”The damage was incredible,^‘ a current >U.S. > > intelligence officer tells Insight. ^”We^“re still recovering from it. > > > > Also there has been concern for years that a mole was operating in the NSC > > and, while not necessarily supplying highly secret materials to foreign > > agents, has been turning over precious details on meetings and policy > > briefings that are being used to track or otherwise monitor government > > activities. The current hush-hush probe by the FBI, and what its agents > > believe to be a serious but amorphous security breach involving telephone > > and modem lines that are being monitored by Israeli agents, has even more > > serious ramifications. ^”It has been an eye opener,^‘ says one >high-ranking > > U.S. government official, shaking his head in horror as to the potential > > level and scope of penetration. > > > > As for how this may have been done technologically, the FBI believes it >has > > uncovered a means using telephone-company equipment at remote sites to > > track calls placed to or received from high-ranking government officials, > > possibly including the president himself, according to Insight^“s >top-level > > sources. One of the methods suspected is use of a private company that > > provides record-keeping software and support services for major telephone > > utilities in the United States. > > > > A local telephone company director of security Roger Kochman tells >Insight, > > ^”I don^“t know anything about it, which would be highly unusual. I am not > > familiar with anything in that area. > > > > U.S. officials believe that an Israeli penetration of that telephone > > utility in the Washington area was coordinated with a penetration of >agents > > using another telephone support-services company to target select >telephone > > lines. Suspected penetration includes lines and systems at the White House > > and NSC, where it is believed that about four specific phones were > > monitored ^◊ either directly or through remote sites that may involve > > numbers dialed from the complex. > > > > ^”[The FBI] uncovered what appears to be a sophisticated means to listen >in > > on conversations from remote telephone sites with capabilities of >providing > > real-time audio feeds directly to Tel Aviv,^‘ says a U.S. official >familiar > > with the FBI investigation. Details of how this could have been pulled off > > are highly guarded. However, a high-level U.S. intelligence source tells > > Insight: ^”The access had to be done in such a way as to evade our > > countermeasures ^≈ That^“s what^“s most disconcerting. > > > > Another senior U.S. intelligence source adds: ^”How long this has been >going > > on is something we don^“t know. How many phones or telephone systems we > > don^“t know either, but the best guess is that it^“s no more than 24 at a > > time ^≈ as far as we can tell. > > > > And has President Clinton been briefed? ^”Yes, he has. After all, he^“s >had > > meetings with his Israeli counterparts,^‘ says a senior U.S. official with > > direct knowledge. Whether the president or his national-security aides, > > including NSC chief Sandy Berger, have shared or communicated U.S. > > suspicions and alarm is unclear, as is the matter of any Israeli response. > > ^”This is the first I^“ve heard of it,^‘ White House National Security >Council > > spokesman Dave Stockwell tells Insight. ^”That doesn^“t mean it doesn^“t >exist > > or that someone else doesn^“t know.^‘ > > > > Despite elaborate precautions by the U.S. agencies involved, say >Insight^“s > > sources, this alleged Israeli intelligence coup came down to the weakest > > link in the security chain: the human element. The technical key appears >to > > be software designs for telephone billing records and support equipment > > required for interfacing with local telephone company hardware installed >in > > some federal agencies. The FBI has deduced that it was this sophisticated > > computer-related equipment and software could provide real-time audio > > feeds. In fact, according to Insight^“s sources, the FBI believes that at > > least one secure T-1 line routed to Tel Aviv has been used in the >suspected > > espionage. > > > > The potential loss of U.S. secrets is incalculable. So is the possibility > > that senior U.S. officials could be blackmailed for indiscreet telephone > > talk. Many officials do not like to bother with using secure, encrypted > > phones and have classified discussions on open lines. > > > > Which brings the story back to some obvious questions involving the > > indiscreet telephone conversations of the president himself. Were they > > tapped, and, if so did they involve national-security issues or just > > matters of the flesh? Monica Lewinsky told Kenneth Starr, as recounted in > > his report to Congress, that Lewinsky and Clinton devised cover stories > > should their trysts be uncovered and/or their phone-sex capers be >overheard. > > > > Specifically, she said that on March 29, 1997, she and Clinton were >huddled > > in the Oval Office suite engaging in a sexual act. It was not the first > > time. But, according to Lewinsky as revealed under oath to the > > investigators for the Office of Independent Counsel, it was unusual >because > > of what the president told her. ^”He suspected that a foreign embassy was > > tapping his telephones, and he proposed cover stories,^‘ the Starr report > > says. ^”If ever questioned, she should say that the two of them were just > > friends. If anyone ever asked about their phone sex, she should say that > > they knew their calls were being monitored all along, and the phone sex >was > > just a put on.^‘ > > > > In his own testimony before a federal grand jury, Clinton denied the > > incident. But later ^◊ much later ^◊ he admitted to improper behavior and >was > > impeached but not convicted. U.S. District Court Judge Susan Webber Wright > > found him to have obstructed justice. Curiously, Starr never informed > > Congress whether the Lewinsky tale was true. For that matter, according to > > Insight^“s sources, Starr never bothered to find out from appropriate > > agencies, such as the FBI or the CIA, whether the monitoring by a foreign > > government of the president^“s conversations with Lewinsky occurred. > > > > Insight has learned that House and Senate investigators did ask questions > > about these matters and in late 1998 were told directly by the FBI and the > > CIA (among others) that there was no truth to the Lewinsky claim of >foreign > > tapping of White House phones. Moreover, Congress was told there was no > > investigation of any kind involving any foreign embassy or foreign > > government espionage in such areas. > > > > But that was not true. In fact, the FBI and other U.S. agencies, including > > the Pentagon, had been working furiously and painstakingly for well over a > > year on just such a secret probe, and fears were rampant of the damage >that > > could ensue if the American public found out that even the remotest > > possibility existed that the president^“s phone conversations could be > > monitored and the president subject to foreign blackmail. To the FBI >agents > > involved, that chance seemed less and less remote. > > > > The FBI has become increasingly frustrated by both the pace of its > > investigation and its failure to gain Justice Department cooperation to > > seek an indictment of at least one individual suspected of involvement in > > the alleged Israeli telephone intercepts. National security is being > > invoked to cover an espionage outrage. But, as a high law-enforcement > > source says, ^”To bring this to trial would require we reveal our methods >of > > operation, and we can^“t do that at this point ^÷ the FBI has not made the > > case strong enough.^‘ Moreover, says a senior U.S. policy official with > > knowledge of the case: ^”This is a hugely political issue, not just a > > law-enforcement matter.^‘ > > > > ^—You^“ve Got the Crown Jewels^“ > > > > If spies wanted to penetrate the White House, a facility widely considered > > the most secure in the world, how might it be done? For that matter, how > > might any agency or department of government be penetrated by spies? > > > > ^”Actually, it^“s pretty easy if you know what you^“re doing,^‘ says a >retired > > U.S. intelligence expert who has helped (along with other government > > sources) to guide Insight through the many and often complicated pathways > > of government security and counterespionage. > > > > Access to designs, databases, ^”blueprints,^‘ memos, telephone numbers, >lists > > of personnel and passwords all can be obtained. And from surprising > > sources. Several years ago this magazine was able to review from a remote > > site information on the supposedly secret and inaccessible White House > > Office Data Base, or WHODB (see ^”More Personal Secrets on File @ the >White > > House,^‘ July 15, 1996). > > > > Despite the spending of additional millions to beef up security when the > > White House installed a modern $30 million computerized telephone system a > > few years ago, communications security remains a big problem. Whatever the > > level of sophistication employed, there are soft underbellies that raise > > significant national-security problems. And potential for espionage, such > > as electronic intercepting of phone calls, is very great. > > > > Calls to or from the White House dealing with classified information are > > supposed to be handled on secure lines, but it doesn^“t always happen. > > Sometimes, according to Insight^“s sources, despite the existence of >special > > phones at the White House and elsewhere to handle such calls, some don^“t > > use them or only one side of the call does. An Insight editor recently was > > allowed for demonstration purposes to overhear a conversation placed over > > an unsecured line involving a ^”classified^‘ topic. > > > > Carelessness always has been a problem, but former and current FBI special > > agents say that under the Clinton administration the disregard for >security > > has been epidemic. Many officials simply don^“t like the bother of > > communicating on secure phones. > > > > In another instance, Insight was provided access to virtually every > > telephone number within the White House, including those used by outside > > agencies with employees in the complex, and even the types of computers > > used and who uses them. Just by way of illustration, this information > > allowed direct access to communications instruments located in the Oval > > Office, the residence, bathrooms and grounds. > > > > With such information, according to security and intelligence experts, a > > hacker or spy could target individual telephone lines and write software > > codes enabling the conversations to be forwarded in real-time for remote > > recording and transcribing. The White House complex contains approximately > > 5,800 voice, fax and modem lines. > > > > ^”Having a phone number in and of itself will not necessarily gain you > > access for monitoring purposes,^‘ Insight was told by a senior >intelligence > > official with regular contact at the White House. ^”The systems are >designed > > to electronically mask routes and generate secure connections.^‘ That >said, > > coupling a known phone number to routing sequences and trunk lines would > > pose a security risk, this official says. > > > > Add to that detailed knowledge of computer codes used to move call traffic > > and your hacker or spy is in a very strong position. ^”That^“s why we have >so > > many redundancies and security devices on the systems ^◊ so we can tell if > > someone is trying to hack in,^‘ says a current security official at the > > White House. > > > > Shown a sampling of the hoard of data collected over just a few months of > > digging, the security official^“s face went flush: ^”How the hell did you >get > > that! This is what we are supposed to guard against. This is not supposed > > to be public.^‘ > > > > Indeed. Nor should the telephone numbers or locations of remote sites or > > trunk lines or other sundry telecommunications be accessible. What^“s > > surprising is that most of this specialized information reviewed by >Insight > > is unclassified in its separate pieces. When you put it together, the > > solved puzzle is considered a national-security secret. And for very good > > reason. > > > > Consider the following: Insight not only was provided secure current phone > > numbers to the most sensitive lines in the world, but it discovered a > > remote telephone site in the Washington area which plugs into the White > > House telecommunications system. Given national-security concerns, Insight > > has been asked not to divulge any telephone number, location of > > high-security equipment, or similar data not directly necessary for this > > news story. > > > > Concerning the remote telecommunications site, Insight discovered not only > > its location and access telephone numbers but other information, including > > the existence of a secret ^”back door^‘ to the computer system that had >been > > left open for upward of two years without anyone knowing about the >security > > lapse. This back door, common to large computer systems, is used for a > > variety of services, including those involving technicians, supervisors, > > contractors and security officers to run diagnostic checks, make repairs > > and review system operations. > > > > ^”This is more than just a technical blunder,^‘ says a well-placed source > > with detailed knowledge of White House security issues. ^”This is a very > > serious security failure with unimaginable consequences. Anyone could have > > accessed that [back door] and gotten into the entire White House phone > > system and obtained numbers and passwords that we never could track,^‘ the > > source said, echoing yet another source familiar with the issue. > > > > Although it is not the responsibility of the Secret Service to manage > > equipment systems, the agency does provide substantial security controls > > over telecommunications and support service into or out of the White >House. > > In fact, the Secret Service maintains its own electronic devices on the > > phone system to help protect against penetration. ^”That^“s what is so > > troubling about this,^‘ says a security expert with ties to the White >House. > > ^”There are redundant systems to catch such errors and this was not >caught. > > It^“s quite troubling.^≈ It^“s not supposed to happen.^‘ > > > > Insight asked a senior federal law-enforcement official with knowledge of > > the suspected Israeli spying case about the open electronic door. ^”I >didn^“t > > know about this incident. It certainly is something we should have known > > given the scope of what^“s at stake,^‘ the official says. > > > > Then Insight raised the matter of obtaining phone numbers, routing >systems, > > equipment sites, passwords and other data on the telecommunications >systems > > used by the White House: How hard would it be for a foreign intelligence > > service to get this information? ^”Obviously not as hard as we thought,^‘ >a > > senior government official said. ^”Now you understand what we^“re facing >and > > why we are so concerned.^‘ > > > > That^“s one reason, Insight is told, the White House phone system is > > designed to mask all outgoing calls to prevent outsiders from tracing back > > into the system to set up taps. However, knowing the numbers called > > frequently by the White House, foreign agents could set up listening > > devices on those lines to capture incoming or outgoing calls. Another way > > of doing it, according to security experts, is to get inside the White > > House system. And, though it^“s considered impossible, that^“s what they >said > > about getting the phone numbers that the president uses in his office and > > residence. Like trash, information is everywhere ^◊ and often is >overlooked > > when trying to tidy up a mess. > > > > ^◊ PMR and JMW > > > > ^—So What, It^“s Only Israel!^“ > > > > There is a tendency in and out of government to minimize the impact of > > Israeli espionage against the United States because Israel is a friendly > > country. That overlooks the gravity of the espionage threat, says David > > Major, former director of counterintelligence programs at the National > > Security Council. ^”This ^—don^“t worry about allied spying, it^“s okay^“ > > attitude is harmful,^‘ he warns. ^”The U.S. should expect that the rest of > > the world is bent on rooting out its national-security secrets and the > > secrets that could subject its leaders to blackmail.^‘ Minimizing or > > excusing ^”friendly spying,^‘ he argues, only discourages vigilance and > > encourages more attacks on U.S. national security. ^”I^“m not outraged by > > nations that find it in their interests to collect intelligence but by our > > unwillingness to seriously pursue counterintelligence.^‘ > > > > Major, now dean of the private Center for Counterintelligence and Security > > Studies, asks: ^”What price should Israel pay for this? My predictions are > > that there will be no impact whatsoever. Do we put our heads in the sand >or > > do we take it as a wake-up call?^‘ > > > > Others observe that Israel has passed stolen U.S. secrets to America^“s > > adversaries. The government of Yitzhak Shamir reportedly provided the > > Soviet Union with valuable U.S. documents stolen by Israeli spy Jonathan > > Pollard. ^”It^“s the security equivalent of herpes,^‘ says a former U.S. > > antiterrorism official now at a pro-Israel think tank who requested > > anonymity. ^”Who gets it [beyond Israel] nobody knows.... Once we let it > > happen, the word gets out that ^—you can get away with this.^“^‘ > > =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 265 From: G. Hoxie Date: Sat May 6, 2000 11:27am Subject: Mason Engineering Receiver Set I need some information on a Mason Receiving set. I think the model is 510. It is a briefcase mounted set with battery operated receiver, spectrum display and individual tuning heads. I saw one of these at a local electronics flea mkt. First one I have seen since my M.I. days in the Army. The TSCM Inspector had one. I am wondering what they might be worth now. The fellow has no idea what he has and has just made up a price. I have found pictures and a more detailed writeup of the unit at: http://www.halted.com/gizmo/gz020298.htm He is willing to let me put a test set on it and ck functionality which, of course, I must do due to the age of the unit. Mechanically (Tuning slugs, etc.) the unit seems sound. If nothing else, I think it would be a nice historical piece. Thanks, George 266 From: Stephen Spring, Attorney at Law Date: Sat May 6, 2000 11:33am Subject: Re: Mason Countermeasures Set Dear George: At $750.00 for a working model that's a great deal. The units sold for around $10,000 new. They're a little bulky but they are excellent receivers. all the best stephen spring ----- Original Message ----- From: "G. Hoxie" To: Sent: Saturday, May 06, 2000 10:51 AM Subject: [TSCM-L] Mason Countermeasures Set > I need some information on a Mason Receiving set. I think the model > is 510. It is a briefcase mounted set with battery operated > receiver, spectrum display and individual tuning heads. > > I saw one of these at a local electronics flea mkt. First one I have > seen since my M.I. days in the Army. I am wondering what they might > be worth now. The fellow has no idea what he has and has just made > up a price of $750.00. > > He is willing to let me put a test set on it and ck functionality > which, of course, I must do due to the age of the unit. Mechanically > (Tuning slugs, etc.) the unit seems sound. > > Thanks, > > George > > > ------------------------------------------------------------------------ > *--- FREE VOICEMAIL FOR YOUR HOME PHONE! ---* > With eVoice Now you can keep in touch with clients, vendors, co-workers, > friends and family ANYTIME, ANYWHERE. Sign Up Today for FREE! > http://click.egroups.com/1/3426/1/_/507420/_/957628298/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 267 From: James M. Atkinson, Comm-Eng Date: Sat May 6, 2000 2:32pm Subject: Re: Mason Countermeasures Set In reality it's worth $350 to $500, but only if the case is on good shape, and the unit is complete. It may be worth more to someone who collects TSCM antiques, but the unit is of minimal value in modern TSCM. The Mason equipment was great years ago (when all radios weight 150 pounds), but times have changed. An AR-8200 is actually more useful and more sensitive then the old Mason gear. The noise figure is very high, sensitivity is poor, selectivity even worse. I found that the units ran hot, and very very sensitive to vibration. Offer the guy $250 in cash, but don't pay more then $350 or so for it. -jma At 3:51 PM +0000 5/6/00, G. Hoxie wrote: >I need some information on a Mason Receiving set. I think the model >is 510. It is a briefcase mounted set with battery operated >receiver, spectrum display and individual tuning heads. > >I saw one of these at a local electronics flea mkt. First one I have >seen since my M.I. days in the Army. I am wondering what they might >be worth now. The fellow has no idea what he has and has just made >up a price of $750.00. > >He is willing to let me put a test set on it and ck functionality >which, of course, I must do due to the age of the unit. Mechanically >(Tuning slugs, etc.) the unit seems sound. > >Thanks, > >George =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 268 From: James M. Atkinson, Comm-Eng Date: Sat May 6, 2000 4:32pm Subject: White House Bugged? Several media channels are starting to pick up in the White House eavesdropping fiasco. http://foxnews.com/national/050500/phonebreach.sml Since this morning there has been heavy damage control relative to the initial leaks to the media and the entire incident is being downplayed by White House media contacts. Curious, -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 269 From: James M. Atkinson, Comm-Eng Date: Sat May 6, 2000 4:50pm Subject: URGENT - Microtel PR-700B For Sale on E-Bay If you are (or were) involved with Government TSCM then you know what this piece of equipment does (spit, curse, moan, grumble, spit, spit, spit). Yes, it's big, it's bulky, and it's nasty... (and a bitch to maintain) but if you can scoop it up for a few grand it's a great deal (I have copies of the government operations manuals for $50.00 if you need them). The Microtel PR-700B is a 3 kHz to 2 GHz synthesized receiver. Some of the features are: 3 kHz to 2 GHz frequency range tunable in 1 kHz steps Has spectrum display for signal analysis Has AM, FM, CW, LSB, USB modulation Has 3 kHz, 15 kHz, 75 kHz, 300 kHz and 2 MHz bandwidths Has Video in, blanking in, sweep in, narrow band (AM and FM), wide band (AM and FM), SC out and 21.4 MHz out. The equipment was found on E-Bay, and it looks like the sale is over on Sunday night (so you have one day to pick it up). http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=322016958 Ah, before anybody asks, the radio is worth a few hundred bucks if you already have a countermeasures search radio (most of us already do). If you don't already have such a unit this radio could save you 10-15 grand and radically increase your TSCM capabilities (note the SubCarrier Receiver Segment) -jma It was my understanding that all of the TSCM units were stripped to the chassis prior to being scrapped, so I would be curious as to this units pedigree. =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 270 From: Rocco Rosano Date: Sat May 6, 2000 0:27pm Subject: Re: Mason Countermeasures Set George: I seem to recall that unit. If my memory severs me correctly, the tuner is a plug-in module; about 8-10" long and about 2x3" (maybe a little smaller). I seem to recall a tuning crank. In any even, I always found Paul Mason's stuff (of that era) to be a little high on the noise figure. (Personal opinion!) You need to help it a lot with high performance RF pre-amps on the input are support it with something like the SAS-1D or the SAS-2 series. That - those will cost a whole lot more than the receiver set. Although, in its time, that thing was a very good - given an overhaul it could be useful. But you would have to hang a lot of ancillary equipment on it. I wouldn't pay more than a $150 - depending on the overall condition. By now, there will be a lot of discrete component degradation. Those things date back to the 70's and 80's. Rocco Rosano Reynoldsburg, Ohio mailto:RoccoRosano@a... "G. Hoxie" wrote: > I need some information on a Mason Receiving set. I think the model > is 510. It is a briefcase mounted set with battery operated > receiver, spectrum display and individual tuning heads. > > I saw one of these at a local electronics flea mkt. First one I have > seen since my M.I. days in the Army. I am wondering what they might > be worth now. The fellow has no idea what he has and has just made > up a price of $750.00. > > He is willing to let me put a test set on it and ck functionality > which, of course, I must do due to the age of the unit. Mechanically > (Tuning slugs, etc.) the unit seems sound. > > Thanks, > > George > > ------------------------------------------------------------------------ > *--- FREE VOICEMAIL FOR YOUR HOME PHONE! ---* > With eVoice Now you can keep in touch with clients, vendors, co-workers, > friends and family ANYTIME, ANYWHERE. Sign Up Today for FREE! > http://click.egroups.com/1/3426/1/_/507420/_/957628298/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 271 From: Rocco Rosano Date: Sat May 6, 2000 10:27pm Subject: Re: URGENT - Microtel PR-700B For Sale on E-Bay Et Al: I used this type of unit for over 8 years. These unites became popular in the mid-80's. It was the the standard replacement for the WR-550. The PR-700 series was the base companion to the MSR-902 (A microwave receiver.) The PR-700B will operate on 24vdc Battery power. It is specifically designed to use in a non-alerting fashion with a suppressed IF (21.4Mhz) radiation. In the battery mode, it is very hard to detect by ECM aspect trigger. It will RASTER in off the WB output in the 2Mhz Bandwidth mode. I have RASTERed both PAL and SECAN signals. It was the standard before TSCM Teams shifted to Spectrum Analyzers. Rocco Rosano Reynoldsburg, Ohio mailto:RoccoRosano@a... "James M. Atkinson, Comm-Eng" wrote: > If you are (or were) involved with Government TSCM then you know what > this piece of equipment does (spit, curse, moan, grumble, spit, spit, > spit). > > Yes, it's big, it's bulky, and it's nasty... (and a bitch to > maintain) but if you can scoop it up for a few grand it's a great > deal (I have copies of the government operations manuals for $50.00 > if you need them). > > The Microtel PR-700B is a 3 kHz to 2 GHz synthesized receiver. Some > of the features are: > > 3 kHz to 2 GHz frequency range tunable in 1 kHz steps > > Has spectrum display for signal analysis > > Has AM, FM, CW, LSB, USB modulation > > Has 3 kHz, 15 kHz, 75 kHz, 300 kHz and 2 MHz bandwidths > > Has Video in, blanking in, sweep in, narrow band (AM and FM), wide > band (AM and FM), SC out and 21.4 MHz out. > > The equipment was found on E-Bay, and it looks like the sale is over > on Sunday night (so you have one day to pick it up). > > http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=322016958 > > Ah, before anybody asks, the radio is worth a few hundred bucks if > you already have a countermeasures search radio (most of us already > do). If you don't already have such a unit this radio could save you > 10-15 grand and radically increase your TSCM capabilities (note the > SubCarrier Receiver Segment) > > -jma > > It was my understanding that all of the TSCM units were stripped to > the chassis prior to being scrapped, so I would be curious as to this > units pedigree. > > =================================================================== > Sed quis custodiet ipsos Custodes? > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > "...any sufficiently advanced technology is > indistinguishable from magic." - Arthur C. Clarke > =================================================================== > > ------------------------------------------------------------------------ > Sign up for the free zZounds.com newsletter for the latest and > greatest music gear savings, musician tips and hot contests. > http://click.egroups.com/1/3738/1/_/507420/_/957662841/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS [Non-text portions of this message have been removed] From: Steve Whitehead Date: Fri May 4, 2001 2:52pm Subject: Selebi mute on claim he helped bug Phosa [Comments - Steve Whitehead. A year ago the National Commissioner denied that he called a policewoman a chimpanzee but later admitted he called her a baboon. This issue is all part of the internal squabble and in fighting in the ruling party the ANC. The commissioner and his party is becoming an embarrassment to good policing and what is left of our beautiful country's name. Since Selebi's appointment last year, the Independent Complaints Directorate had investigated him twice] "Cape Town - National Police Commissioner Jackie Selebi has declined to comment on a newspaper report alleging he gave a bugging device disguised as a cellphone to controversial former youth leader James Nkambule to spy on former Mpumalanga premier Mathews Phosa. Selebi's spokesperson Commissioner Joseph Ngobeni told Sapa on Friday: "We will not be commenting on the article". The Mail and Guardian reported that Selebi personally met Nkambule at Pretoria station before Nkambule's meeting on February 10 this year with Phosa's former adviser Pieter Rootman. Selebi is said to have listened to a conversation between Nkambule and Rootman "real time" from police headquarters. Nkambule is at the centre of allegations that there is a plot to oust President Thabo Mbeki. Phosa, former Gauteng Premier Tokyo Sexwale and former ANC secretary general Cyril Ramaphosa, are under investigation for allegedly being behind the plot. The three have dismissed the claims. DA shocked at Selebi's personal role Meanwhile, Democratic Alliance MP Andre Gaum said he was shocked by the newspaper allegations, which included that the ANC had an undeclared intelligence unit which had played a key role in unearthing the so-called plot against Mbeki. "We are astonished about James Nkambule's revelation that Police Commissioner Jackie Selebi played an extraordinary personal part in the investigation by meeting with Nkambule in person, and handing him a recording device to enable him (Selebi) to listen to conversations Nkambule had with suspects. "The investigation by the ANC's intelligence unit, followed by Selebi's personal participation, confirms the suspicion that party and state lines were blurred." The involvement of an ANC intelligence unit which apparently alerted the police to the so-called plot, made Tshwete's statement to Parliament's safety and security committee unbelievable, he said. Tshwete told MPs that Mbeki was not consulted about investigating the alleged plot. 'Police probing ANC's internal squabbles' Gaum said Nkambule's statement that he had no proof that Ramaphosa, Sexwale and Phosa planned to physically harm Mbeki, strengthened the DA's contention that the police were investigating internal squabbles within the ANC, and not criminal activity. "This is further confirmed by Tshwete's failure to name the criminal charges that are being investigated against the three. "The only possible criminal charge now appears to be that against the President for his alleged part in the murder of Chris Hani. This is so ludicrous that no intelligent person can be expected to believe it," he said. Due to the new evidence of Selebi's personal involvement, the DA would request safety and security committee chair Mluleki George to call Selebi and the head of police intelligence, Commissioner Williams, to appear before the committee, Gaum said. - Sapa" Story at http://www.news24.co.za/News24/South_Africa/WesternCape/0,1113,2-7-830_1019600,00.html Steve Whitehead E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa TSCM Services URL : http://www.tscm.co.za [Non-text portions of this message have been removed] 3003 From: Larry Hountz Date: Fri May 4, 2001 4:30pm Subject: I am looking for this or something along this line LX3000 Compute rized Polygraph System Hello: I am looking for LX3000 Computerized Polygraph System so something like it... anyone have any ideas Larry 3004 From: Steve Whitehead Date: Sat May 5, 2001 4:03am Subject: Secret Mufamadi papers found in quarry "May 04 2001 at 07:55PM By Dianne Smith Highly confidential documents, private papers and magazines belonging to Provincial and Local Government Minister Sydney Mufamadi, and dated prior to 1999 when he was still safety and security minister, were discovered dumped at a quarry in Knoppieslaagte near Centurion in Gauteng on Friday. The pile of documents, including Mufamadi's payslips, cheques and private African National Congress documents - some stating they were "top secret" and "confidential" - were dumped on Calco Sand's site and haphazardly covered with sand. A Calco Sand employee said the documents were discovered by a quarry worker in a section of the property not visited often. Some were labelled 'top secret' and 'confidential' He said it was suspected that someone was bribed to hide the documents as there was evidence that one of the company's front-end loaders had been used. The quarry worker who made the find tried to ascertain who was responsible for the illegal dumping by sifting through the papers in search of a name. He then realised he was dealing with important documents, and after a few futile attempts to contact police in the surrounding area, Midrand police were informed. Midrand station commander Gerhard Olivier in turn alerted the provincial police, and forensic experts and the head of provincial detective services, assistant commissioner Godfrey Lebeya, soon converged on the scene. "These are scrap documents mainly on internal communication and not for public information. There are also private documents," said Lebeya.. "They were supposed to have been destroyed. We have not yet managed to determine if they came from the minister's home or his office." The documents would be stored at a police station He refused to reveal any further information or allow the media to scrutinise the documents. Director Henriette Bester, spokesperson for the office of the provincial police commissioner, said the documents would be stored at a police station over the weekend, whereafter Mufamadi would go through them before making a public statement. She added that the investigation would be placed on hold until then. Mufamadi said from Northern Province, where he was attending his sister's funeral, that police had informed him of the find but he was unable to comment further until he had seen the documents" Story at http://www.iol.co.za/html/frame_news.php?art_id=ct20010504195509347M100548&set_id=1&click_id=79 Steve Whitehead E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa TSCM Services URL : http://www.tscm.co.za [Non-text portions of this message have been removed] 3005 From: Steve Uhrig Date: Sat May 5, 2001 8:32pm Subject: Kevin on teevee FNC / Fox News Channel Saturday evening 2130 (RIGHT NOW) or Sunday May 6 (tomorrow) at 10 AM. Short segment on sweeping. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3006 From: James M. Atkinson, Comm-Eng Date: Sun May 6, 2001 7:14am Subject: Man Busted For Installing Spy Cams Saturday May 05 02:22 AM EDT Man Busted For Installing Spy Cams Police arrested a worker at a local spa company for allegedly spying on female co-workers using hidden cameras under their desks. http://dailynews.yahoo.com/h/wdiv/20010504/lo/393528_1.html The man was fired by Temo Spas in Clinton Township after managers found out about the allegations. The accusations began after a female office worker who was having a problem with her mouse, looking under her desk to check the wiring. The woman discovered a small camera taped underneath her desk and held with velcro. She traced the wiring and found that it lead to other women's desks and fed into the man's office. He also had a television in his office. Temo management said that the man admitted that he had recently began watching the women, and that he was fired within 30 minutes of the discovery. They said that he expressed remorse. The man faces charges of using an electronic device to eavesdrop on the women. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 3007 From: Dawn Star Date: Sun May 6, 2001 9:06am Subject: GPS Tracker Well here's a little unit that could be a real problem, any ideas on how to find this thing electronically? http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=584372222 3008 From: Steve Uhrig Date: Sun May 6, 2001 9:31am Subject: Re: GPS Tracker Once upon a midnight dreary, Dawn Star pondered, weak and weary: > Well here's a little unit that could be a real problem, any ideas > on how to find this thing electronically? With an LEA telephone impedance ANALyzer? Ooops, wrong message. As you were. Re the GPS tracker: Remove the incredible hype, especially from this particular vendor, and not a problem for anyone not afraid to get dirty. The weakness in all GPS-based trackers is the antenna. There are only a few locations which work at all, and in general the things are toeing the line of being hoaxes. Not many are sold, and of the ones that are, once the buyer tries once or twice to use them, they give up, so there are not many actually out on the street. The antennas will be mounted generally between the rear bumper and the car body, underneath the plastic skirt. You can look up in there with a mirror, possibly directly, possibly needing a flashlight. Maybe you can feel up in there also, although you run the risk of cutting yourself on the edge of the material. The above is essentially the only place the GPS antenna (about the size of a slightly melted ice cube) has any real chance of working, if the installer does not have access to the inside of the target auto, which generally they do not. If the installer does have access to the interior, the location of choice in most cars is under the rear deck behind the back seat, usually over the trunk. 90% of any GPS tracker, whether passive like the one you mentioned or active, will be in one or the other of the above locations. If an active tracker is used, it's even easier as you get to look for a cell transmit antenna too. The nonsense about active GPS receive antennas being able to grab a signal reflected off the pavement underneath is pure fiction and hyperbole on the part of the sellers. The GPS tracker antenna needs a 360 degree view of the horizon essentially all the time in order to be effective. Lacking that view, which nearly always is the case, the things revert to dead reckoning mode which is designed into the GPS engine. Dead reckoning is fine if you are a ship or a plane generally going in a straight line, but useless for autos which don't. Yeah, you get a nice attractive printout, but it's inaccurate. The sellers don't know this because most of them have never used the things. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3009 From: Greg H. Walker, Attorney At Law Date: Sun May 6, 2001 1:51pm Subject: RE: GPS Tracker Folks, I very seldom say anything on this list because you all are so far advanced past my electronic skills that I know all I will do is embarass myself. But as to Steve Urhig's remarks about the GPS units, let me say that he is so very very right. I am sort of the "tracking guru" in the Greater Houston Area and because TeleTrac has an excellent infrastructure here we are lucky and can utilize their system quite effectively for what is legally permitted by Texas Law. I must get two to three calls a month from Investigators who have bought GPS systems and now want to sell them to me at greatly reduced prices just to get a part of their "investment" back. Why, they simply don't work as well as advertised and when they do work they do so only because a competent technician in such technology installs them (PI's doing it themselves and car stereo installers blotch it almost 100% of the time). Oh, by the way, I never buy the units that they call to want to sell to me. As Steve says, the placement of the GPS antenna is everything and the number of places to put it are highly limited. The plastic bumpers, the rear deck, and sometimes, if enough room is available and the dash is of the right materials, you can put them up in the dash, but very very high up in the dash. The long and the short of it is that Steve is such a good source of info for this kind of thing that before you waste any monies you might be wise to talk with him first. Things just don't work like is shown on TV and they certainly don't work like the sellers of the items claim they do! Just my thoughts. GREG -- Greg H. Walker Attorney At Law President RisKontroL -- Risk Management, Security Consulting & Investigations Houston, Texas (713) 850-0061 3010 From: Dawn Star Date: Sun May 6, 2001 9:56pm Subject: ICOM IC -R3 Does anyone know how well the ICOM IC-R3 does on detecting and viewing 2.4GHZ wavecom flavor video transmissions? http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=1234717356 3011 From: Miguel Puchol Date: Mon May 7, 2001 4:30am Subject: RE: GPS Tracker Since you need physical access to the device to retrieve the position logs, then I would assume that it's not placed anywhere too complex to get to. So, again, careful visual inspection, specially look for the antenna in places covered with plastic but with good skyview (dashboard, etc.) Cheers, Mike -----Mensaje original----- De: Dawn Star [mailto:bratkid@e...] Enviado el: domingo, 06 de mayo de 2001 16:07 Para: TSCM-L@yahoogroups.com Asunto: [TSCM-L] GPS Tracker Well here's a little unit that could be a real problem, any ideas on how to find this thing electronically? http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=584372222 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3012 From: Robert G. Ferrell Date: Mon May 7, 2001 10:45am Subject: Re: Robo-bug >> This device, according to the manufacturer, is a "multi-purpose home robot >>that can be controlled from anywhere in the world." iRobot includes a >live-action >> camera and microphone mounted on a six-wheel chassis. Images and sounds >> collected by the robot are then broadcast along the Internet by wireless. >> Computer users can control this device through their web browser. The >>entire >> package is being marketed as a way for parents to monitor their children, >> but is also being supplied to the United States Defense Advanced Projects >> Research Agency (DARPA) and various corporations for surveillance This smacks of that horrifying remote-controlled attack bot reported last summer in New Scientist (http://newscientist.com/news/news.jsp?id=ns225425, but the link seems to be down right now). There was a guy who invented a remotely-activated automatic pistol, for all practical purposes, that could track and fire on an intruder. The inventor was sending it commands via TCP/IP and claimed that the system was 'hack-proof.' I nearly lost my lunch. Big Brother is back, and this time he's armed to the cybernetic teeth... RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 3013 From: Date: Wed May 9, 2001 2:20am Subject: Humor; How To Identify Where A Driver Is From HOW TO IDENTIFY WHERE A DRIVER IS FROM 1. One hand on wheel, one hand on horn: Chicago. 2. One hand on wheel, one finger out window: New York. 3. One hand on wheel, one finger out window, cutting across all lanes of traffic: New Jersey. 4. One hand on wheel, one hand on newspaper, foot solidly on accelerator: Boston. 5. One hand on wheel, one hand on nonfat double decaf cappuccino, cradling cell phone, brick on accelerator, with gun in lap: Los Angeles. 6. Both hands on wheel, eyes shut, both feet on brake, quivering in terror: Ohio, but driving in California. 7. Both hands in air, gesturing, both feet on accelerator, head turned to talk to someone in back seat: Italy. 8. One hand on latte, one knee on wheel, cradling cell phone, foot on brake, mind on radio game: Seattle. 9. One hand on wheel, one hand on hunting rifle, alternating between both feet being on the accelerator and both feet on brake, throwing McDonald's bag out the window: Texas. 10. Four-wheel drive pick-up truck, shotgun mounted in rear window, beer cans on floor, squirrel tails attached to antenna: West Virginia. 11. Two hands gripping wheel, blue hair barely visible above the steering wheel, driving in the left lane at 35 on the Interstate with the left blinker on: Florida. HAVE A GREAT DAY !!! 3014 From: Mike F Date: Thu May 10, 2001 6:53am Subject: Record 'National Security' surveillance in 2000 Secret court authorizes more FBI taps, bugs and black bag jobs than ever before. http://www.securityfocus.com/news/201 Later4,mike f. http://ml4mi.com This electronic message contains information that may be legally confidential and/or privileged. The information is intended solely for the individual or entity named above and access by anyone else is unauthorized. If you are not the intended recipient, any disclosure, copying, distribution, or use of the contents of this information is prohibited and may be unlawful. If you have received this electronic transmission in error, please reply immediately to the sender that you have received the message in error, and delete it. 3015 From: Mike F Date: Fri May 11, 2001 4:46pm Subject: New Intelligence Reports -- New Intelligence Reports -- CIA _Global Growing Migration and Its Implications for the US_ http://www.odci.gov/nic/graphics/migration.pdf _The Global Technology Revolution: Bio/Nano/Materials Trends and Their Synergies with Information Technology by 2015_ http://www.odci.gov/nic/nic_publications/2015_files/rand.htm .pdf version [87 pages] http://www.odci.gov/nic/graphics/rand.pdf The CIA recently posted on its Website two new reports presenting an intelligence perspective on two globalization issues. The first, _Global Growing Migration and Its Implications for the US_, is a follow-up study to the publication, _Global Trends 2015: A Dialogue About the Future With Non-government Experts_, (see the December 22, 2000 _Scout Report_). This latest study examines "the growing global movement of people and its implications for the United States." The study examines the political, economic, social, and security issues raised by increased migration, including "the extent to which some countries may try to use migration as leverage in bilateral relations." The second report, written by RAND for the National Intelligence Council, examines the implications of the revolutions in biotechnology and information technology and the challenges and questions likely to be raised in these fields between now and 2015. Both reports are offered in .pdf format; the RAND report is also available in an .html version. [DC] Later4,mike f. http://ml4mi.com This electronic message contains information that may be legally confidential and/or privileged. The information is intended solely for the individual or entity named above and access by anyone else is unauthorized. If you are not the intended recipient, any disclosure, copying, distribution, or use of the contents of this information is prohibited and may be unlawful. If you have received this electronic transmission in error, please reply immediately to the sender that you have received the message in error, and delete it. 3016 From: Steve Uhrig Date: Sat May 12, 2001 10:43pm Subject: Complete RF kit for sale - SPECIAL Hello list dudes and dudettes, Read down for a << SPECIAL OFFER >> on this kit. I have for sale some decent RF sweep gear. Anyone getting started, or needing a spare kit, would do well with this. Most seasoned TSCMers don't have an RF kit this nice. The key piece is an Avcom PSA-65B (spectrum analyzer) upgraded to 65C specs by Marty Kaiser. Unit has the following factory options: +FM demodulator +10 kc bandwidth resolution filter +AM demodulator +RFP-24 preamp (the better one) +Downconverter to extend upper range to 2.5 gigs +DC power cord +Telescoping whip antenna, 90 degrees, with BNC. +Padded carrying case with pouch +Plastic lid which protects front panel while shipping +All AVCOM manuals In addition, this unit has a number of Marty Kaiser mods to improve its effectiveness in TSCM and to allow use of certain TSCM-specific accessories: +Subcarrier detection mod +Video transmission recovery mod +Front panel aux jack for these accessories and interfacing others. Provides +12VDC for accessories so you don't have to use separate power supplies. Nice when in the field. This piece is in superb condition and probably unused when it came to me. I ran it only long enough to check all functions and verify operation against my IFR. The Avcom is more sensitive than my $15,000 IFR service monitor. (I don't use or recommend a service monitor for sweeping; it is just a lab piece I use as a reference. A service monitor is a piece of test equipment generally used for repairing two way radio equipment). This kit also includes some Kaiser accessories intended to work with the modified Avcom: +SCD-5 subcarrier receiver. This can be used standalone. Tunable to let you listen to any subcarriers riding on a primary signal. Not possible to listen without this, although you can see the subcarrier. Same unit is used to read subcarriers on power or telco lines. Can use with other receivers. +Kaiser matrix switch. Lets you switch between SCD-5 and headphones without having to plug and unplug jacks. Use when switching from carrier to subcarrier mode. Convenient and elegant. +VLF converter to let you tune from 10kc to 500 kc. You monitor, tune and view through the Avcom. Use for RF or power line subcarrier. +Miniature TV about the size of a cigar box, used as a video monitor for the video demodulator. Very nice little unit tunes VHF and UHF broadcast channels as well as AM and FM broadcast. Can be a sound source also while sweeping. +Kaiser RAS 515 Raster Analysis Display box. Connects to any oscilloscope having a Z axis input and lets you monitor any form of video transmission. Also monitors "radiation from computers". All parameters are tunable making this an extremely versatile unit. If there is anything usable for sniffing stuff radiating from computer screens, this is it. This is a *very* rare unit. Packed in a separate small Pelican case. As a side observation, if anything would be capable of intercepting radiation from computers or video screens along the lines of what Tempest tries to prevent, this is the piece. All the above is in superb condition and will be sold as a lot. Instructions included for most. If you need a complete RF kit, here it is. Good kit for a beginner or spare for a professional, and one you would not outgrow for a long time, if ever. Also a good backup set or one to leave in a particular country where you sweep a lot so you don't have to deal with the expense and hassles of carrying equipment all over the world. Fairly priced for what this is, and it is all assembled and integrated in one place. You don't have to run all over, buy a bunch of boxes and make them all work together and find the right cables and adapters. It's all here, and all done by a professional (Marty Kaiser). And no long delivery times. Can ship this package overnight if an emergency. The current cost of all this according to the respective catalogs, is $9300. I will let this set go for $7500 plus freight. I will ship anywhere in the world and can take credit cards for payment. Anyone wanting to get into sweeping would be very well equipped with this package. The work is already done in selecting the appropriate and compatible equipment, and you are buying from a known and experienced sweeper, not a spy shop or an unknown somewhere. See the above at the following websites: http://www.avcomofva.com http://www.martykaiser.com << SPECIAL OFFER >>. I need the room and this kit is a lot of equipment taking up valuable space. To sweeten the deal, I will include with the above, at no extra charge, an ICOM R100 full coverage receiver. I normally sell these for between $650 and $750 depending on condition. The buyer of this RF kit will receive an excellent condition FULL COVERAGE receiver (100 kilocycles to 1856 megacycles, including cellular). These have been discontinued by ICOM and there is no replacement. A full coverage receiver is a necessary basic item in any sweep kit, and here is an excellent one at no extra charge. I also will include, at no extra charge, a wide coverage portable discone antenna which is a perfect companion for both the spectrum analyzer and the R100 receiver. The antenna sets up and knocks down in about 2 minutes, is lightweight and rugged stainless steel, and will be shipped in a heavy duty mailing tube which can be used for storage and transporting in the field. Credit cards accepted. Persons or companies with sufficient credit may qualify for financing through a local leasing company who I will connect you with. Call to inquire about financing for up to 5 years for this equipment. Arrangements can be made for financing in one or two days if your need is urgent. See my used equipment page for more TSCM, surveillance, commo and electronic gear: http://www.swssec.com/used.html Also Minox submini "spy" cameras at: http://www.swssec.com/minox.html Questions certainly welcome. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3017 From: Marcelrf Date: Sun May 6, 2001 11:12am Subject: Lucent Scientists Arrested, Charged with Stealing Tech Secrets for JointVenture with China-controlled Company http://www.njusao.org/files/co0513_r.htm -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 [Non-text portions of this message have been removed] 3018 From: DrPepper Date: Sun May 6, 2001 2:22pm Subject: Re: RE: GPS Tracker Actually, You are right, The Amateur Radio community is far and away more advanced in this subject than what I've seen in commercial applications. They use APRS, Which is Amateur Packet Reporting System. And it is unbelievable. Of course they are not concerned with having a concealed antenna. :-} -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my shack LIVE at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ============================================ "Greg H. Walker, Attorney At Law" wrote: > Folks, > > I very seldom say anything on this list because you all are so far > advanced past my electronic skills that I know all I will do is embarass > myself. > > But as to Steve Urhig's remarks about the GPS units, let me say that he > is so very very right. I am sort of the "tracking guru" in the Greater > Houston Area and because TeleTrac has an excellent infrastructure here > we are lucky and can utilize their system quite effectively for what is > legally permitted by Texas Law. > > I must get two to three calls a month from Investigators who have bought > GPS systems and now want to sell them to me at greatly reduced prices > just to get a part of their "investment" back. Why, they simply don't > work as well as advertised and when they do work they do so only because > a competent technician in such technology installs them (PI's doing it > themselves and car stereo installers blotch it almost 100% of the > time). Oh, by the way, I never buy the units that they call to want to > sell to me. > > As Steve says, the placement of the GPS antenna is everything and the > number of places to put it are highly limited. The plastic bumpers, the > rear deck, and sometimes, if enough room is available and the dash is of > the right materials, you can put them up in the dash, but very very high > up in the dash. > > The long and the short of it is that Steve is such a good source of info > for this kind of thing that before you waste any monies you might be > wise to talk with him first. Things just don't work like is shown on TV > and they certainly don't work like the sellers of the items claim they > do! > > Just my thoughts. > > GREG > -- > Greg H. Walker > Attorney At Law > President > RisKontroL -- Risk Management, Security Consulting & Investigations > Houston, Texas > (713) 850-0061 > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3019 From: Aimee Farr Date: Sun May 6, 2001 3:32pm Subject: Wireless webcam newslink http://www.wirelessnewsfactor.com/perl/story/6938.html Naturally, the story ends with ends with a consumer detection kit. Suggests adopting the "moral" Golden Rule test, without mention of legalities. Curious to hear your predictions on DIY spyware.... ~Aimee 3020 From: Date: Mon May 7, 2001 8:53am Subject: Re: ICOM IC -R3 It's a fun little toy. ;-) Dawn Star on 05/06/2001 10:56:32 PM To: TSCM-L@yahoogroups.com cc: Subject: [TSCM-L] ICOM IC -R3 Does anyone know how well the ICOM IC-R3 does on detecting and viewing 2.4GHZ wavecom flavor video transmissions? http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=1234717356 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3021 From: e cummings Date: Mon May 7, 2001 10:31am Subject: Re: GPS Tracker--compromising OnStar? while the subject of GPS tracking is hot, it brings up another vulnerability. GM's OnStar system is so commonly preinstalled in new vehicles these days, (even Lexus has licensed it) i wonder if anyone has encountered a vehicle in which the factory-installed GPS/cellular tracking system has been compromised? law-enforcement obviously has access to the company's vehicle tracking database, but private parties might also take advantage of the pre-existing, factory-installed vehicle tracking system. if a target vehicle's OnStar computer were covertly reprogrammed, this method of surveillance would be more difficult to detect than simply looking for suspicious new hardware added to the vehicle. cellular calls with dumps of logged tracking data would, of course, show up on the customer's bill--but not all targeted individuals/vehicle drivers have access to that bill. -e cummings At 01:51 PM 5/6/01 -0500, you wrote: >Folks, > >I very seldom say anything on this list because you all are so far >advanced past my electronic skills that I know all I will do is embarass >myself. > >But as to Steve Urhig's remarks about the GPS units, let me say that he >is so very very right. I am sort of the "tracking guru" in the Greater >Houston Area and because TeleTrac has an excellent infrastructure here >we are lucky and can utilize their system quite effectively for what is >legally permitted by Texas Law. > >I must get two to three calls a month from Investigators who have bought >GPS systems and now want to sell them to me at greatly reduced prices >just to get a part of their "investment" back. Why, they simply don't >work as well as advertised and when they do work they do so only because >a competent technician in such technology installs them (PI's doing it >themselves and car stereo installers blotch it almost 100% of the >time). Oh, by the way, I never buy the units that they call to want to >sell to me. > >As Steve says, the placement of the GPS antenna is everything and the >number of places to put it are highly limited. The plastic bumpers, the >rear deck, and sometimes, if enough room is available and the dash is of >the right materials, you can put them up in the dash, but very very high >up in the dash. > >The long and the short of it is that Steve is such a good source of info >for this kind of thing that before you waste any monies you might be >wise to talk with him first. Things just don't work like is shown on TV >and they certainly don't work like the sellers of the items claim they >do! > >Just my thoughts. > >GREG 3022 From: Laarence Dillaard Date: Tue May 8, 2001 1:41pm Subject: Spect. Anal. A small, handheld, unit is described at: http://www.chipcenter.com/TestandMeasurement/products_201-300/prod218.html It might be usefill to some. Larry 3023 From: Aimee Farr Date: Fri May 11, 2001 6:46pm Subject: The "new" burglar tools... in a surveillance society The TX Leg in session ...better than high school football. ============================================ Office of House Bill AnalysisS.B. 966 By: Staples Criminal Jurisprudence 4/8/2001 Engrossed ENROLLED 05/01/2001 E Sent to the Governor ============================================ BACKGROUND AND PURPOSE There is concern that the number of retail thefts committed in mercantile establishments is on the rise. In response to this increase in retail thefts, many retailers have installed electronic article surveillance systems. However, some of these thefts may be committed by thieves who have homemade tools and devices for retail theft including metal or foil-lined shopping bags that override and evade these surveillance systems. Senate Bill 966 provides that a person commits a Class A misdemeanor if the person possesses, sells, manufactures, or distributes a device intended to shield merchandise from detection by a retail theft detector. ANALYSIS Senate Bill 966 amends the Penal Code to provide that a person commits a Class A misdemeanor if, with the intent to use the instrument to commit theft, the person possesses a shielding or deactivation instrument that evades a retail theft detector or knowingly manufactures, sells, offers for sale, or otherwise distributes such an instrument. ======================================== Office of House Bill Analysis H.B. 1729 By: Goolsby Criminal Jurisprudence 4/12/2001 Introduced ======================================== BACKGROUND AND PURPOSE Retail theft offenses committed in mercantile establishments are increasing. Many retailers combat these increases in retail theft offenses by installing complex and expensive electronic article surveillance systems. However, there does exist "professional" retail thieves who travel to different cities in order to commit such offenses, and despite increasingly complex surveillance systems some shoplifters are using tools and devices to override the electronic systems. House Bill 1729 provides that possession, sale, manufacturing, and distribution of a device intended to shield merchandise from detection by an electronic or magnetic theft detector without the permission of the merchant or person owning the merchandise is a Class A misdemeanor. ANALYSIS House Bill 1729 amends the Penal Code to provide that a person commits a Class A misdemeanor if the person possesses a shielding or deactivation instrument with the intent to use the instrument to commit a theft, or knowingly manufactures, sells, offers for sale, or otherwise distributes a shielding or deactivation instrument. The bill also specifies that if notice is provided, the activation of an electrical, mechanical, electronic, or magnetic device used by a retail establishment to prevent or detect shoplifting is grounds for a person to reasonably believe a person has stolen or is attempting to steal property. The notice must be posted on the premises of the retail establishment in a manner that is reasonably likely to come to the attention of the public and must state that the establishment uses retail theft detectors to prevent or detect shoplifting. The bill provides that an individual or retail establishment is not liable for any damage that may arise from conduct authorized by the provisions of this bill. The bill also sets forth provisions for the prevention of the consequences of theft. ===== o Any legitimate purposes for foil/metal-lined parcel bags, etc.? I will accept hypothetical wanderings. o What types of anti-surveillance devices have been criminalized to the modern-day equivalent of "burglar tools" -- anything else? It seemed worthwhile social commentary as surveillance plays an increasingly important role in crime prevention.... so I commented on it. Of course, now I'm being asked about it...so I thought I would ask for some info. Your comments are held in confidence, of course. Aimee E. Farr Attorney At Law Texas mailto:aimfarr@p... Outlook/Lotus click-to Contacts: http://my.infotriever.com/aimeefarr 3024 From: Marcelrf Date: Sat May 12, 2001 1:47pm Subject: The Department of Defense The Department of Defense is holding their annual terrorism disaster drill at the US Military Academy at West Point on Monday and Tuesday. The main event will be a simulated chemical weapons attack at USMA's Michie Football Stadium on Tuesday at 9AM. Last year's drill was good (a staged hostage taking at the stadium) and numerous agencies participated including the US Mint Police SRT. Some of the involved agencies this year are: USMA Military Police and FD, Keller Army Hospital EMS, Highland Falls and Town of Highlands Police, STAT Flight, State Police Aviation, 2nd Civil Support Team - NY Nat'l Guard, Rockland County AIR-1, and the NYS Emergency Management Office. Here are the frequencies to monitor if interested: USMA military police TAC-1......149.575 RPTR TAC-2......143.125 RPTR TAC-3......141.100 USMA FIRE DEPT 139.200 RPTR 143.025 TALKAROUND USMA AVIATION OPS.....126.200 KELLER ARMY HOSPITAL EMS........150.700 STAT FLIGHT..........463.000 468.000 US MINT POLICE....415.875 SIMPLEX HIGHLAND FALLS POLICE.....160.215 RPTR TOWN OF HIGHLANDS EMS....158.940 STATEWIDE Police...155.370 [for the interop minded - notice only 2 bands are involved] Orange County NY New York -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 3025 From: Date: Sat May 12, 2001 10:29pm Subject: Re: Humor; How To Identify Where A Driver Is From nice to find humor in the least thought places Mr. Jack D. Garcia' de Azcarate 3026 From: Craig Date: Sun May 13, 2001 9:29am Subject: info needed on ICOM Radio Good Morning I hope someone here can help.. i have aquired a few ICOM U12 radios but have no idea about the specs or re-programing. I have tried the usual ways and links. Hany one ever heard of these?. Many Thanks 3027 From: Mike F Date: Sun May 13, 2001 11:40am Subject: Re: info needed on ICOM Radio Craig you should contact Steve Uhrig,He knows alot about Icom radios. Here is is web site and email address ==> steve@s... http://www.swssec.com later4,mike fiorentino ----- Original Message ----- From: Craig ] info needed on ICOM Radio > Good Morning > > I hope someone here can help.. > > i have aquired a few ICOM U12 radios but have no idea about the specs > or re-programing. I have tried the usual ways and links. > > Hany one ever heard of these?. > > Many Thanks > 3028 From: MARCELRF Date: Sun May 13, 2001 11:25am Subject: Re: info needed on ICOM Radio Here is the link to buy the manual http://www.sarrio.com/sarrio/rsman2.html Craig wrote: > Good Morning > > I hope someone here can help.. > > i have aquired a few ICOM U12 radios but have no idea about the specs > or re-programing. I have tried the usual ways and links. > > Hany one ever heard of these?. > > Many Thanks > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 3029 From: MARCELRF Date: Sun May 13, 2001 0:07pm Subject: Re: info needed on ICOM Radio Here is the Schematic http://search.lycos.com/raf/default.asp Craig wrote: > Good Morning > > I hope someone here can help.. > > i have aquired a few ICOM U12 radios but have no idea about the specs > or re-programing. I have tried the usual ways and links. > > Hany one ever heard of these?. > > Many Thanks > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 3030 From: Steve McAlexander Date: Sun May 13, 2001 0:51pm Subject: check out the archived broadcasts...these didn't make the national news in the US Steve McAlexander Technology Architect and Business Process Engineer 830-627-7669 OFC 210-316-6489 Cellular "There is nothing more difficult to plan, more doubtful of success, nor more dangerous to manage than the creation of a new system. For the initiator has the enmity of all who would profit by the preservation of the old system and merely lukewarm defenders in those who would gain by the new one." --Machiavelli, 1513 [Non-text portions of this message have been removed] 3031 From: DrPepper Date: Sun May 13, 2001 0:51pm Subject: Re: info needed on ICOM Radio Check out this URL: http://www.rigpix.com/protrx/icom_icu12.htm -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my shack LIVE at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ========================================== Craig wrote: > Good Morning > > I hope someone here can help.. > > i have aquired a few ICOM U12 radios but have no idea about the specs > or re-programing. I have tried the usual ways and links. > > Hany one ever heard of these?. > > Many Thanks > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ From: Thomas Shaddack Date: Tue May 4, 2004 8:53am Subject: Re: An Offer You Can't Refuse > I was working at home on my computer the other day when a pop-up ad > commandeered my screen. "ARE YOU BEING BOTHERED BY POP-UP ADS?" it asked, > offering to sell me a product to solve this problem. Presence of such popups isn't just annoying; it's an indicator of a potentially much more serious problem: accessibility of TCP/UDP ports exposed to the Wild Internet. Which, in comparison with Microsoft's bug record, doesn't promise anything good. Removing Messenger takes care of the annoying popups, but not of the underlying dangerous situation; cures the symptom, not the cause. It's better to be aware about this. The ports in question are UDP ports 135, 137, and 238, and TCP ports 135, 139, and 445. For an example what risk such exposition can bring, let's remember Blaster worm last year (which used a hole in RPC, port TCP/135) or the new Sasser worm, using port TCP/445. (The 139/445 ports are also used for exposing network shares. There are worms scanning for them, trying to guess the access passwords when the user bothered to set them up, then putting their executables into the run-on-startup folder - next restart then brings a little surprise. There is not technical difference in the first phase of attack between a Messenger-spammer and a worm; both sit on the attacking machine and scan vast IP ranges for machines with required ports accessible. The difference is in the second phase; a worm tries to break in through an eventually present vulnerability and then spreads from there, a spammer just delivers the payload to the user's desktop without breaking into and running code; but the scanning-connecting phase is exactly the same and the same countermeasures apply. In comparison with email spam, the Messenger campaigns can be in many cases precisely targeted to a location; WHOIS records (and routing tables) can indicate the IP ranges belonging to residential ISPs located in certain cities (or even parts of cities) or countries. I didn't get in contact with such messages, until recently; all the installations I did were behind the firewall that took care of this. Found the problem exists and is very annoying after being called to a small office in the UK where there was only one computer and no firewall (dumb!) and nobody bothered to tell me until Blaster decided to come to a visit. Saw the popups there, several per hour, and it was ANNOYING. A copy of Kerio firewall took care of it, hopefully forever. (Well, I used a now obsolete copy of Tiny Personal Firewall, which is what Kerio was later developed from, on the basis that it was on my service CD and I couldn't download a patch without getting the machine reinfected. TPFW is an old software, but still useful, even if obsoleted. Works nicely on W9x and W2k machines, but on the Xtremely Problematic version of Windows it often protest about some string length mismatch and would probably want something newer.) > The day before, I'd gotten a similar screen-immobilizing message, inside a > giant, scary exclamation point. This one warned me that it had detected an > alarming infestation of spyware on my computer. Spyware is a gremlin, > unleashed by Internet marketers, that lurks inside your computer and > reports back pertinent facts about you. What kind of pertinent facts? Say, > the fact that you have an alarming infestation of spyware and might need to > buy . . . protection. Same for antispam software. My filters show a lot of such "offers". (My solution is using SpamAssassin with a whitelist automatically generated from addressbook and a Bayesian engine taught automatically with both mails from whitelisted addresses (certified non-spam) and mails from spamtrap addresses (certified spam). Only once per a blue moon a heir of an as-wealthy-as-dead Nigerian general manages to get his offer through.) > These messages made me feel like some grocer on the South Side of Chicago, > circa 1928 -- as if a man in a fedora and a shiny suit had just walked in, > picked up a jar of pickles and accidentally dropped it on the floor to get > my attention, saying: "Nice little place you got here. It sure would be a > shame if something happened to it." Reminds me of "wine bricks", blocks of raisins with label saying it's forbidden by law to add this much of sugar and that much of water and yeast and keep it in so high temperature for so long. > So, did you ever wonder why no one ever catches most of the people who are > said to be responsible for computer viruses that have caused billions of > dollars of damage to our economy -- and birthed a lucrative virus > protection industry? The thing I am supposing is: What if the reason that > these virus makers are seldom caught is that they are not, as we are led to > believe, pimply 17-year-old teenagers from dysfunctional families who are > motivated solely by boredom and malice? What if it is, you know, a more > organized crime than that, with more understandable motives? There is not a straight answer here. The Net is so complicated it became a kind of ecosystem (one wouldn't expect 10 years ago that the plant biology lectures would get handy). The keys to survival in both the Net and the nature, when there are all kinds of adversaries from predators to spam filters are adaptability and diversity. > Can it possibly be that there exists some unholy nexus between the people > who are filling our computers with bad stuff, and the people whose business > depends on our staying afraid of the bad stuff? Symbiosis, for sure. Highly probably without direct "conspiration". Same like buggers/sweepers, or herbivores/carnivores - the "higher" ones can't live long and prosper without the "lower" ones. I often argue for the importance of virus writers and script kiddies. It's because of them why we have so many various organizations specialized for identifying and dealing with various kinds of network security threats. Imagine the world without them: no problems of this kind at all, plethora of security holes in every machine and nobody cares (why?), the only places where worm code is are the military labs, and the very knowledge of network security issues belongs under the veil of national security issues. That's all good until a threat appears, sweeps over the unprepared ecosystem of the Net like a wildfire (or, if it's a military/paramilitary action, only over the IP ranges belonging to the adversary, similar to the way how Messenger ads are delivered to geographically specified targets), and the people who have at least some clue of what's happening are too few and too far between to be of much help - if they're permitted to talk. Next time a worm hits, remember it's a rather negligible price we pay for being at least somehow prepared. > Maybe not. I confess there is a lot about the Web that I do not understand, > such as why spammers think anyone will click on an e-mail with a subject > line like "0i0!9u5*elbow08jrg." ("Better open this one fast! It sounds like > my cute neighbor Phoebe is hitting on me, utilizing encrypted alphanumeric > ciphers!") People are dumb. At least some do. Some others are curious, maybe because the email software typically shows only the Name part of the Name sender; spam often uses randomly generated "real" names, and the names then can collide with the name of one of the recipient's friends. (Even some worms exploit this - some borrow the sender names from the victims' addressbooks, some generate them automagically, yet others appeal to the people's perception of authorities and send themselves from administrator@r.... Given the low cost of spam per million of messages, even as low as 1 ppm of responses may be high enough concentration to make it profitable. > Still, one wonders about how a company can stay in business if its > long-term goal, its sworn duty, is to gradually eliminate the need for itself. Pump-and-dump. There is a problem, so make money on it while there's still one. This includes making it worse, exploiting the problem itself for offering a solution - usually incomplete, overpriced, and aimed at symptoms instead at the cause. > Many years ago, when I was but a lad, I saw my first cockroach in the > kitchen. I alerted my parents, who were horrified. It was their first > cockroach, too. It had probably crawled from a supermarket bag. Mom brought them from work when CKD Semiconductors that folded after being bought and later "downsized" by Cegelec after botched privatization (like many other companies, because the glorified accountant-turned-politician that now became local president (most likely because of lack of less-bad choices) insisted that the new owners will take care of the factories, completely oblivious to the fact acquisition can be also a method to get rid of competition. Goodbye semiconductors, farewell special steels, adieu research, but I digress.) We got rid of them using pyrethroids-based bug spray. Wasn't a big infestation, we caught it soon enough and brick houses offer less places to hide than drywall ones. They were quite cute. I should've kept one for dissection, but I didn't have a microscope back then. > It was not until years later that I did some research: Cockroach eggs > take a month to hatch. It is possible to leave eggs behind after you > exterminate. It wasn't a completely unheard-of practice, in the > industry. Oops. > I know there is free software to seek and destroy spyware, and I have > friends who have used it effectively. But I also know that the single thing > that viruses and spyware are most often attached to is . . . downloaded > free software. > Spammed if you do, and spammed if you don't. "Freeness" of the software is orthogonal to its risks. Reputation of the vendors is an important factor here. Even non-free software can pose serious risk for privacy and security: Windows with their holes, unique identifiers in all kinds of user-created documents, and tendency to report installed software (and possibly other stuff) to the Mothership can be considered a rather extreme example. Some free tools you may find useful: AdAware, "virus scanner" for adware/spyware, one of the best; requires next to no knowledge for use, regularly updated, free version is powerful enough to be useful. http://www.lavasoft.de/ HijackThis!, a "scanner" that shows the browser helper objects, browser home and search pages, what runs on startup, and other settings of Windows and Explorer. Very very useful to combat even unknown problems, but requires knowledge what belongs where. Google is a friend - looking up suspicious file/process/object names often tells you all you need to know for deciding if it's a friend or a foe. http://www.spychecker.com/program/hijackthis.html StartupMonitor and StartupCPL, a pair of programs for real-time guarding and control of processes that run on machine startup. StartupMonitor runs on background and asks for confirmation when a request to start something is inserted into the Registry or into the startup directory. StartupCPL is a control-panel applet for editing what is permitted to run. http://www.mlin.net/StartupMonitor.shtml http://www.mlin.net/StartupCPL.shtml Browser Hijack Blaster, a program for real-time monitoring of changes in setting of the browser's home/search pages and helper objects. The author now suggests to use Spyware Guard instead, which I have no experience with but on the first glance looks as an interesting functional superset of the BHB. http://www.wilderssecurity.com/bhblaster.html http://www.javacoolsoftware.com/spywareguard.html All of them I routinely use and can swear by them. I should make a webpage with them... > > Gene Weingarten's e-mail address is weingarten@w.... Chat with him > online Tuesdays at noon at www.washingtonpost.com. > > ? 2004 The Washington Post Company > > > > > ----------------------------------------------------------------------------------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ----------------------------------------------------------------------------------------------------- > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ----------------------------------------------------------------------------------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ----------------------------------------------------------------------------------------------------- > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 8567 From: contranl Date: Mon May 3, 2004 3:02pm Subject: Gps tracker detector . Thanks Steve, >>>>>" powering a covert tracking device from the target vehicle's power system is considered a 4th Amendment violation" <<<<<<< So even with a permit they can't connect it to the battery ? and therefore would render all this evidence not usable in court ? Such a law probably only exists in the US...i have not heard of any thing like that somewhere else... Now these are government installations...a private person or criminal would not care about such amendments ofcourse Anyway It would'nt matter that much....wired or not wired to the battery. >>>>" I completely agree"<<< (with a simple telescopic antenna) Thanks ...and i agree with your motivation why that is so >>>>" Amplifiers generate noise too" <<<< If it helps to make a previously "invisible" signal "visible" then a amplifier could be a pro...with or without (a little) noise <<<<<<"You use an amp when you need to overcome feedline loss. GPS antennasfed with feedline almost always have an amp in them" <<<<< Agree...In this case the feedline is no more then 1,5 meters...using high quality double screened coax would introduce minimal loss (not significant) Also we are receiving at a relative low frequency (30 ~ 300 mhz) modern coax cables have very low loss at these frequencies...a amplifier (at the antenna) would not be usefull for that reason. It very much depends on what receiver is used..if the receiver is maximized for the wanted frequency band then i guess it would be better to not use a amplifier.... my experience however tells me that this is not always the case... I have installed some amplifiers in receivers that where used with small "whip" antennas on cars...and many times they would make a difference between not hearing a distant and weak signal...and just being able to hear such a signal...i have to say that a filter was used in front of the amplifier...without the filter the receiver would overload and introduce noise wich was stronger then the wanted signal. I think i start with just a sharp as possible filter (30~300mhz) at the receiver or the antenna...i'll check minicircuits to see if they have any filters that i could use..later i could make them myself Question: --------- It's all a matter of $$$... What would be better a expensive unit that would work perfectbut fairly expensive or A cheap unit that will work fine but not always.....and with many false alarms I guess you go for the expensive one ? I do prefer to make serious and good working equipment...instead of (still expensive) James Bond / CCS kind of stuff Any idea of what a professional high quality "gps-tracker-detector" might/should cost ? That would depend on: 1) The price of the components wich are: receiver computerboard display with touchscreen (vga) hardisk windows xp software powersupply housing (metal custom made) various small (current total of over 2800 Euro's) 2) Labor of software writing 3) Labor of building the unit (electronics / mechanical) 4) Research time spend ( 2 people 5 months now 10 hours a day...not every day....pffffffff) 5) Uniqueness and useability of the product 6) Price of comparable equipment 7) Marketing and sales cost 8) And last but not least a little profit ofcourse Do'nt forget that it's a complete PC also and that many innovative apllications can be added late.r A preliminary (front) design you can see here: http://www.tetrascanner.com/gpssearchscreen.html Greetings Tetrascanner www.tetrascanner.com 8568 From: Lawrence Dillard Date: Tue May 4, 2004 11:20am Subject: blond Very first Blond guy joke It was bound to happen sooner or later! And this one is good. The very first ever Blond GUY Joke... and well worth the wait! An Irishman, a Mexican and a blond guy were doing construction work on scaffolding on the 20th floor of a building. They were eating lunch and the Irishman said, "Corned beef and cabbage! If I get corned beef and cabbage one more time for lunch, I'm going to jump off this building." The Mexican opened his lunch box and exclaimed,"Burritos again! If I get burritos one more time I'm going to jump off, too." The blond opened his lunch and said, "Bologna again. If I get a bologna sandwich one more time, I'm jumping too." The next day the Irishman opened his lunch box, saw corned beef and cabbage and jumped to his death. The Mexican opened his lunch, saw a burrito and jumped too. The blond guy opened his lunch, saw the bologna and jumped to his death as well. At the funeral the Irishman's wife was weeping. She said, "If I'd known how really tired he was of corned beef and cabbage, I never would have given it to him again!" The Mexican's wife also wept and said, "I could have given him tacos or enchiladas! I didn't realize he hated burritos so much." Everyone turned and stared at the blond's wife. "Hey, don't look at me," she said, "He makes his own lunch." 8569 From: Jon Asdourian Date: Tue May 4, 2004 5:25pm Subject: Re: TSCM Education I served as a Security Engineering Officer with the Department of State both in CONUS and overseas at the embassies as well as working on the Secretaries protective detail. I am a EE with a background in communications including microwave, tropo, Hf and fiber-optic systems, everything from the telephone handset to the feedhorn on a microwave or tropo tower. I also had an extensive background in computers that was very useful including programming. There are all sorts of vulnerabilities in computers as well as a facility. It appears as though your taking the right approach as far as education. Many of the engineers are from other disciplines and the training is extensive and comprehensive. You will learn things not available to the civilian commercial community and see things that you can only imagine or saw in a spy movie. Much of the work is tedious and repetitious, but rewarding. I have done everything from designing security system for the embassy to hanging doors and building walls in secure areas as well as installing and maintaining all types of locks, cameras, access denial systems and alarms. I recommend you take programming courses and become familiar with networks and operating systems. I have found the programming very helpful in writing programs for scanners and spectrum analyzers and populating databases with information to be analyzed. I envy you and the opportunity of working for one of the best agencies in the government. I waited on a list for 3 years to finally be offered a position. Good luck to you. Jon Asdourian Senior Forensics Investigator Data Forensics Engineering __________________________________ Do you Yahoo!? Win a $20,000 Career Makeover at Yahoo! HotJobs http://hotjobs.sweepstakes.yahoo.com/careermakeover 8570 From: kondrak Date: Tue May 4, 2004 10:48pm Subject: GPS Leads Police to Car Despite Thieves' Efforts > > >GPS Leads Police to Car Despite Thieves' Efforts >Link to Associated Press story via USA Today: > >http://www.usatoday.com/tech/news/2004-05-04-gps-goofuses_x.htm > [Non-text portions of this message have been removed] 8571 From: kondrak Date: Tue May 4, 2004 10:53pm Subject: Re: An Offer You Can't Refuse Yes, FIREWALL!! Theres NO reason those ports should ever be exposed to the Internet. Bad...theres a whole plethora of evil things that munch on those ports... At 09:53 5/4/2004, you wrote: > > I was working at home on my computer the other day when a pop-up ad > > commandeered my screen. "ARE YOU BEING BOTHERED BY POP-UP ADS?" it asked, > > offering to sell me a product to solve this problem. > >Presence of such popups isn't just annoying; it's an indicator of a >potentially much more serious problem: accessibility of TCP/UDP ports >exposed to the Wild Internet. Which, in comparison with Microsoft's bug >record, doesn't promise anything good. > >Removing Messenger takes care of the annoying popups, but not of the >underlying dangerous situation; cures the symptom, not the cause. It's >better to be aware about this. > >The ports in question are UDP ports 135, 137, and 238, and TCP ports 135, >139, and 445. > >For an example what risk such exposition can bring, let's remember Blaster >worm last year (which used a hole in RPC, port TCP/135) or the new Sasser >worm, using port TCP/445. (The 139/445 ports are also used for exposing >network shares. There are worms scanning for them, trying to guess the >access passwords when the user bothered to set them up, then putting >their executables into the run-on-startup folder - next restart then >brings a little surprise. > >There is not technical difference in the first phase of attack between a >Messenger-spammer and a worm; both sit on the attacking machine and scan >vast IP ranges for machines with required ports accessible. The difference >is in the second phase; a worm tries to break in through an eventually >present vulnerability and then spreads from there, a spammer just delivers >the payload to the user's desktop without breaking into and running code; >but the scanning-connecting phase is exactly the same and the same >countermeasures apply. > >In comparison with email spam, the Messenger campaigns can be in many >cases precisely targeted to a location; WHOIS records (and routing tables) >can indicate the IP ranges belonging to residential ISPs located in >certain cities (or even parts of cities) or countries. > > >I didn't get in contact with such messages, until recently; all the >installations I did were behind the firewall that took care of this. Found >the problem exists and is very annoying after being called to a small >office in the UK where there was only one computer and no firewall (dumb!) >and nobody bothered to tell me until Blaster decided to come to a visit. >Saw the popups there, several per hour, and it was ANNOYING. A copy of >Kerio firewall took care of it, hopefully forever. (Well, I used a now >obsolete copy of Tiny Personal Firewall, which is what Kerio was later >developed from, on the basis that it was on my service CD and I couldn't >download a patch without getting the machine reinfected. TPFW is an old >software, but still useful, even if obsoleted. Works nicely on W9x and W2k >machines, but on the Xtremely Problematic version of Windows it often >protest about some string length mismatch and would probably want >something newer.) > > > > The day before, I'd gotten a similar screen-immobilizing message, inside a > > giant, scary exclamation point. This one warned me that it had detected an > > alarming infestation of spyware on my computer. Spyware is a gremlin, > > unleashed by Internet marketers, that lurks inside your computer and > > reports back pertinent facts about you. What kind of pertinent facts? Say, > > the fact that you have an alarming infestation of spyware and might need to > > buy . . . protection. > >Same for antispam software. My filters show a lot of such "offers". > >(My solution is using SpamAssassin with a whitelist automatically >generated from addressbook and a Bayesian engine taught automatically with >both mails from whitelisted addresses (certified non-spam) and mails from >spamtrap addresses (certified spam). Only once per a blue moon a heir of >an as-wealthy-as-dead Nigerian general manages to get his offer through.) > > > These messages made me feel like some grocer on the South Side of Chicago, > > circa 1928 -- as if a man in a fedora and a shiny suit had just walked in, > > picked up a jar of pickles and accidentally dropped it on the floor to get > > my attention, saying: "Nice little place you got here. It sure would be a > > shame if something happened to it." > >Reminds me of "wine bricks", blocks of raisins with label saying it's >forbidden by law to add this much of sugar and that much of water and >yeast and keep it in so high temperature for so long. > > > So, did you ever wonder why no one ever catches most of the people who are > > said to be responsible for computer viruses that have caused billions of > > dollars of damage to our economy -- and birthed a lucrative virus > > protection industry? The thing I am supposing is: What if the reason that > > these virus makers are seldom caught is that they are not, as we are led to > > believe, pimply 17-year-old teenagers from dysfunctional families who are > > motivated solely by boredom and malice? What if it is, you know, a more > > organized crime than that, with more understandable motives? > >There is not a straight answer here. The Net is so complicated it became a >kind of ecosystem (one wouldn't expect 10 years ago that the plant biology >lectures would get handy). The keys to survival in both the Net and the >nature, when there are all kinds of adversaries from predators to spam >filters are adaptability and diversity. > > > Can it possibly be that there exists some unholy nexus between the people > > who are filling our computers with bad stuff, and the people whose business > > depends on our staying afraid of the bad stuff? > >Symbiosis, for sure. Highly probably without direct "conspiration". Same >like buggers/sweepers, or herbivores/carnivores - the "higher" ones can't >live long and prosper without the "lower" ones. > >I often argue for the importance of virus writers and script kiddies. It's >because of them why we have so many various organizations specialized for >identifying and dealing with various kinds of network security threats. >Imagine the world without them: no problems of this kind at all, plethora >of security holes in every machine and nobody cares (why?), the only >places where worm code is are the military labs, and the very knowledge of >network security issues belongs under the veil of national security >issues. That's all good until a threat appears, sweeps over the unprepared >ecosystem of the Net like a wildfire (or, if it's a military/paramilitary >action, only over the IP ranges belonging to the adversary, similar to the >way how Messenger ads are delivered to geographically specified targets), >and the people who have at least some clue of what's happening are too few >and too far between to be of much help - if they're permitted to talk. > >Next time a worm hits, remember it's a rather negligible price we pay for >being at least somehow prepared. > > > Maybe not. I confess there is a lot about the Web that I do not understand, > > such as why spammers think anyone will click on an e-mail with a subject > > line like "0i0!9u5*elbow08jrg." ("Better open this one fast! It sounds like > > my cute neighbor Phoebe is hitting on me, utilizing encrypted alphanumeric > > ciphers!") > >People are dumb. At least some do. Some others are curious, maybe because >the email software typically shows only the Name part of the Name >sender; spam often uses randomly generated "real" names, and the names >then can collide with the name of one of the recipient's friends. (Even >some worms exploit this - some borrow the sender names from the victims' >addressbooks, some generate them automagically, yet others appeal to the >people's perception of authorities and send themselves from >administrator@r.... > >Given the low cost of spam per million of messages, even as low as 1 ppm >of responses may be high enough concentration to make it profitable. > > > Still, one wonders about how a company can stay in business if its > > long-term goal, its sworn duty, is to gradually eliminate the need for > itself. > >Pump-and-dump. There is a problem, so make money on it while there's still >one. This includes making it worse, exploiting the problem itself for >offering a solution - usually incomplete, overpriced, and aimed at >symptoms instead at the cause. > > > Many years ago, when I was but a lad, I saw my first cockroach in the > > kitchen. I alerted my parents, who were horrified. It was their first > > cockroach, too. It had probably crawled from a supermarket bag. > >Mom brought them from work when CKD Semiconductors that folded after being >bought and later "downsized" by Cegelec after botched privatization (like >many other companies, because the glorified accountant-turned-politician >that now became local president (most likely because of lack of less-bad >choices) insisted that the new owners will take care of the factories, >completely oblivious to the fact acquisition can be also a method to get >rid of competition. Goodbye semiconductors, farewell special steels, adieu >research, but I digress.) > >We got rid of them using pyrethroids-based bug spray. Wasn't a big >infestation, we caught it soon enough and brick houses offer less places >to hide than drywall ones. > >They were quite cute. I should've kept one for dissection, but I didn't >have a microscope back then. > > > It was not until years later that I did some research: Cockroach eggs > > take a month to hatch. It is possible to leave eggs behind after you > > exterminate. It wasn't a completely unheard-of practice, in the > > industry. > >Oops. > > > I know there is free software to seek and destroy spyware, and I have > > friends who have used it effectively. But I also know that the single thing > > that viruses and spyware are most often attached to is . . . downloaded > > free software. > > Spammed if you do, and spammed if you don't. > >"Freeness" of the software is orthogonal to its risks. Reputation of the >vendors is an important factor here. Even non-free software can pose >serious risk for privacy and security: Windows with their holes, unique >identifiers in all kinds of user-created documents, and tendency to report >installed software (and possibly other stuff) to the Mothership can be >considered a rather extreme example. > > >Some free tools you may find useful: > >AdAware, "virus scanner" for adware/spyware, one of the best; requires >next to no knowledge for use, regularly updated, free version is powerful >enough to be useful. >http://www.lavasoft.de/ > >HijackThis!, a "scanner" that shows the browser helper objects, browser >home and search pages, what runs on startup, and other settings of Windows >and Explorer. Very very useful to combat even unknown problems, but >requires knowledge what belongs where. Google is a friend - looking up >suspicious file/process/object names often tells you all you need to know >for deciding if it's a friend or a foe. >http://www.spychecker.com/program/hijackthis.html > >StartupMonitor and StartupCPL, a pair of programs for real-time guarding >and control of processes that run on machine startup. StartupMonitor runs >on background and asks for confirmation when a request to start something >is inserted into the Registry or into the startup directory. StartupCPL is >a control-panel applet for editing what is permitted to run. >http://www.mlin.net/StartupMonitor.shtml >http://www.mlin.net/StartupCPL.shtml > >Browser Hijack Blaster, a program for real-time monitoring of changes in >setting of the browser's home/search pages and helper objects. >The author now suggests to use Spyware Guard instead, which I have no >experience with but on the first glance looks as an interesting functional >superset of the BHB. >http://www.wilderssecurity.com/bhblaster.html >http://www.javacoolsoftware.com/spywareguard.html > >All of them I routinely use and can swear by them. > >I should make a webpage with them... > > > > > > > > > Gene Weingarten's e-mail address is weingarten@w.... Chat with him > > online Tuesdays at noon at www.washingtonpost.com. > > > > ? 2004 The Washington Post Company > > > > > > > > > > > ----------------------------------------------------------------------------------------------------- > > > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > > > ----------------------------------------------------------------------------------------------------- > > > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue > #291 Web: http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > > > ----------------------------------------------------------------------------------------------------- > > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > > > ----------------------------------------------------------------------------------------------------- > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 8572 From: Date: Tue May 4, 2004 7:08pm Subject: Report reveals scope of wiretaps e|flRæ©_6¯*ˇ Posted on Sun, May. 02, 2004 e|flRæ©_6¯*ˇ e|flRæ©_6¯*ˇ Report reveals scope of wiretaps The FBI's probe in Phila. uncovered more than 5,000 of what the U.S. considers to be incriminating discussions. By Jacqueline Soteropoulos and Emilie Lounsberry Inquirer Staff Writers The FBI secretly recorded what a federal report described as more than 5,000 "incriminating intercepts" during two years of wiretapping and bugging in an investigation into alleged corruption in Philadelphia. An "incriminating intercept" is defined as a discussion that could result in prosecution. The numbers come from a newly released federal wiretap report that provides an unusual glimpse into the potentially damaging evidence gathered from court-authorized electronic surveillance that centered mostly on lawyer Ronald A. White and Imam Shamsud-din Ali, the two key figures in the inquiry. The report, along with documents sent to people whose conversations were intercepted, show that wiretaps and bugs that started on Ali's home phone and later led to taps on phones of a City Council aide and a deputy in Mayor Street's office produced 2,994 such incriminating intercepts. Taps that started on White's office phone and led elsewhere resulted in an additional 2,233 "incriminating intercepts," according to the report, which listed racketeering as the offense under investigation. The annual report, released Friday by the Administrative Office of U.S. Courts, suggests that the investigation has relied on what may be the most extensive use of electronic surveillance in the nation. The report, which covers nationwide wiretaps concluded in 2003, is based on information filed by judges and prosecutors. The Ali-related electronic surveillance, dating to June 2001, picked up conversations among 855 people, with the FBI listening to 36,668 conversations - an average of 94 a day, according to the report. The report shows that the Ali surveillance was kept in place for the longest time among any of the 578 bugs and taps authorized by federal judges nationwide. The number of "incriminating intercepts" also was substantial, though some investigations tallied even greater numbers. No charges have been filed in the Philadelphia inquiry, and federal prosecutors and the FBI have repeatedly declined to comment on any aspect of the investigation. The big question in political and legal circles these days is what, exactly, was picked up during more than two years of tapping. Some defense lawyers who have heard portions of tapes or had them summarized say they have found them less than damning. The report does not identify the investigations by name, but it is clear from reading the document, along with the wiretap notices, that the Ali and White wiretaps are among the 10 approved by federal judges in Philadelphia and listed in the 2003 report. The inquiry became public last October with the discovery of a bug in Mayor Street's City Hall office, though prosecutors later disclosed that no conversations were recorded during the two weeks it was in place. Philadelphia police found the hidden device in the ceiling during what they said was a routine sweep for electronic recording devices. Since then, the inquiry has reached into many corners of city government as the FBI and the IRS have traced the flow of money that drives city business and examined a range of contracts involving demolition, insurance, bonds, debt collection and work done by "disadvantaged" subcontractors. Along the way, federal prosecutors were required to notify people whose conversations were intercepted. One notification described the electronic surveillance that began when a federal judge, on June 13, 2001, authorized a wiretap at the home of Ali and his wife in Cheltenham Township. In July, the same judge permitted a new tap on Ali's cell phone. In February 2002, the electronic surveillance of Ali's home ended, but the judge allowed the FBI to tap the cell phone of Steven A. Vaughn, who is an aide to City Councilwoman Donna Reed Miller, and the office phone of John Christmas, a deputy chief of staff to Street. The judge also allowed the FBI to place a bug at Ali's business, Keystone Information and Financial Services. That investigation had its origins in a 2000 FBI probe of an alleged multimillion-dollar cocaine-distribution network in North Philadelphia. But the inquiry turned into a corruption investigation as the FBI later heard Ali talk with city officials and politicians about work he hoped to obtain. The document lists the offense in the Ali-related surveillance as narcotics. According to the report, the surveillance cost $235,956, mostly for the investigative staffing needed to monitor the intercepts. According to another notification to those picked up on taps, the judge, on Jan. 29, 2003, approved a wiretap at White's Center City law office and on his cell phone. In June, the judge allowed the FBI to add a tap on the office phone of then-City Treasurer Corey Kemp. In July, agents were allowed to place a bug in White's office. And in September, they won approval to place a bug in the mayor's office, as well as tap the mobile phone of James Tyrrell, an official at Philadelphia International Airport. In all, FBI agents listened in on conversations involving White for a 240-day period, monitoring verbal exchanges involving 281 people. Out of those 26,391 conversations, federal authorities deemed 2,233 exchanges as incriminating. The cost was $43,000, including paying for the staff who monitored the recording devices. The nationwide wiretap report includes tallies only for investigations that have either led to charges or are no longer secret. Contact staff writer Emilie Lounsberry at 215-854-4828 or elounsberry@p.... © 2004 Philadelphia Inquirer and wire service sources. All Rights Reserved. http://www.philly.com [Non-text portions of this message have been removed] 8573 From: James M. Atkinson Date: Tue May 4, 2004 11:08pm Subject: Their Mothers Must Be So Proud Usually our troops do things that make us proud, sometime not... this is a case of the later. Funny how the MP's are going to take the fall, but that the Military Intelligence officers who were directing their efforts will never be held accountable. Curious that the Army tried (unsuccessfully) to keep classified the actual methods of torture and abuse they were using on the prisoners... methods that are forbidden under U.S. Law, and directly forbidden by the UCMJ. What is really sad is how the Army denied anything of this nature ever happened... until somebody gave copies of the incriminating photographs to the media. It doesn't help that Brigadier General Janis Karpinski has a history of supporting this kind of activity, and actually has received formal training in torture and interrogation, and has a history of working closely with FBI and CIA while assigned to a military intelligence group in the first Gulf War. Nor is it a good sign that she is actually an operations and intelligence officer who has attended CIA and DIA training, and that THIS is the first time she has ever run a prison. So why would the Army have an intelligence officer run a prison, staff it with other intelligence officers, who in turn torture, rape, and abuse the prisoners unless it was to exploit them and force intelligence from them. If this was a case of those being held in the prison actually committing criminal acts, the MP's alone would have involved in the prison. But in this case the prison was being run by Military Intelligence, the FBI, DIA, and CIA... human exploitation, torture, and abuse was the mission, period. Curious that THIS is the same prison that U.S. Citizens were being unlawfully detained at, and that the atrocities reported here are the same ones being reported out of Guantanamo Bay, and the Naval Brig in South Carolina, and others. Truly sad... but what else do you expect... some of the people involved are also counterintelligence agents who do TSCM for the U.S. Government. Their Mothers Must Be So Proud, -jma ------------------------------------------------------------------------------------------------------------------------------------------------------ 4 May 2004 Classifications: (U) Unclassified (S/NF) Secret, No Foreign (S) Secret Source: http://www.msnbc.msn.com/id/4894001/ U.S. Army report on Iraqi prisoner abuse Complete text of Article 15-6 Investigation of the 800th Military Police Brigade by Maj. Gen. Antonio M. Taguba Updated: 7:09 p.m. ET May 04, 2004 The following is the text of the Taguba report with only the names of the witnesses removed for the sake of privacy. The report was prepared by Maj. Gen. Antonio M. Taguba on alleged abuse of prisoners by members of the 800th Military Police Brigade at the Abu Ghraib Prison in Baghdad. It was ordered by Lt. Gen. Ricardo Sanchez, commander of Joint Task Force-7, the senior U.S. military official in Iraq, following persistent allegations of human rights abuses at the prison. The official name of the report is: ARTICLE 15-6 INVESTIGATION OF THE 800th MILITARY POLICE BRIGADE TABLE OF CONTENTS References ÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖ 3 Background ÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖ 6 Assessment of DoD Counter-Terrorism Interrogation and Detention Operations In Iraq (MG Millerís Assessment).ÖÖÖ.ÖÖÖÖ........... 8 IO Comments on MG Millerís Assessment..ÖÖÖ 8 Report on Detention and Corrections In Iraq (MG Ryderís Report).................................... 9 IO Comments on MG Ryderís ReportÖ...ÖÖÖÖ 12 Preliminary Investigative Actions ÖÖÖÖÖÖ.. 12 Findings and Recommendations Part One (Detainee Abuse). ÖÖÖÖÖÖÖÖÖÖ 15 Findings ÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖ. 15 Recommendations ÖÖÖÖÖÖÖÖÖÖÖ 20 Part Two (Escapes and Accountability) ÖÖ.. 22 Findings ÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖ. 22 Recommendations. ÖÖÖÖÖÖÖÖÖÖ 31 Part Three (Command Climate, EtcÖ). ÖÖÖ 34 Findings ÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖ Ö 36 Recommendations ÖÖ ÖÖÖÖÖÖÖÖ 44 Other Findings/Observations ÖÖÖÖÖÖÖÖÖ 49 Conclusion ÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖ ÖÖÖÖ 50 Annexes ÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖÖ 51 References 1. Geneva Convention Relative to the Treatment of Prisoners of War, 12 August 1949 2. Geneva Convention for the Amelioration of the Condition of the Wounded and Sick in the Armed Forces in the Field, 12 August 1949 3. Geneva Convention for the Amelioration of the Condition of the Wounded, Sick and Shipwrecked Members of Armed Forces at Sea, 12 August 1949 4. Geneva Convention Protocol Relative to the Status of Refugees, 1967 5. Geneva Convention Relative to the Status of Refugees, 1951 6. Geneva Convention for the Protection of War Victims, 12 August 1949 7. Geneva Convention Relative to the Protection of Civilian Persons in Time of War, 12 August 1949 8. DOD Directive 5100.69, ìDOD Program for Prisoners of War and other Detainees,î 27 December 1972 9. DOD Directive 5100.77 ìDOD Law of War Program,î 10 July 1979 10. STANAG No. 2044, Procedures for Dealing with Prisoners of War (PW) (Edition 5), 28 June 1994 11. STANAG No. 2033, Interrogation of Prisoners of War (PW) (Edition 6), 6 December 1994 12. AR 190-8, Enemy Prisoners of War, Retained Personnel, Civilian Internees, and Other Detainees, 1 October 1997 13. AR 190-47, The Army Corrections System, 15 August 1996 14. AR 190-14, Carrying of Firearms and Use of Force for Law Enforcement and Security Duties, 12 March 1993 15. AR 195-5, Evidence Procedures, 28 August 1992 16. AR 190-11, Physical Security of Arms, Ammunition and Explosives, 12 February 1998 17. AR 190-12, Military Police Working Dogs, 30 September 1993 18. AR 190-13, The Army Physical Security Program, 30 September 1993 19. AR 380-67, Personnel Security Program, 9 September 1988 20. AR 380-5, Department of the Army Information Security, 31 September 2000 21. AR 670-1, Wear and Appearance of Army Uniforms and Insignia, 5 September 2003 22. AR 190-40, Serious Incident Report, 30 November 1993 23. AR 15-6, Procedures for Investigating Officers and Boards of Officers, 11 May 1988 24. AR 27-10, Military Justice, 6 September 2002 25. AR 635-200, Enlisted Personnel, 1 November 2000 26. AR 600-8-24, Officer Transfers and Discharges, 29 June 2002 27. AR 500-5, Army Mobilization, 6 July 1996 28. AR 600-20, Army Command Policy, 13 May 2002 29. AR 623-105, Officer Evaluation Reports, 1 April 1998 30. AR 175-9, Contractors Accompanying the Force, 29 October 1999 31. FM 3-19.40, Military Police Internment/Resettlement Operations, 1 August 2001 32. FM 3-19.1, Military Police Operations, 22 March 2001 33. FM 3-19.4, Military Police Leaders' Handbook, 4 March 2002 34. FM 3-05.30, Psychological Operations, 19 June 2000 35. FM 33-1-1, Psychological Operations Techniques and Procedures, 5 May 1994 36. FM 34-52, Intelligence Interrogation, 28 September 1992 37. FM 19-15, Civil Disturbances, 25 November 1985 38. FM 3-0, Operations, 14 June 2001 39. FM 101-5, Staff Organizations and Functions, 23 May 1984 40. FM 3-19.30, Physical Security, 8 January 2001 41. FM 3-21.5, Drill and Ceremonies, 7 July 2003 42. ARTEP 19-546-30 MTP, Mission Training Plan for Military Police Battalion (IR) 43. ARTEP 19-667-30 MTP, Mission Training Plan for Military Police Guard Company 44. ARTEP 19-647-30 MTP, Mission Training Plan for Military Police Escort Guard Company 45. STP 19-95B1-SM, Soldierís Manual, MOS 95B, Military Police, Skill Level 1, 6 August 2002 46. STP 19-95C14-SM-TG, Soldierís Manual and Trainerís Guide for MOS 95C Internment/Resettlement Specialist, Skill Levels 1/2/3/4, 26 March 1999 47. STP 19-95C1-SM MOS 95C, Corrections Specialist, Skill Level 1, Soldier's Manual, 30 September 2003 48. STP 19-95C24-SM-TG MOS 95C, Corrections Specialist, Skill Levels 2/3/4, Soldier's Manual and Trainer's Guide, 30 September 2003 49. Assessment of DOD Counter-Terrorism Interrogation and Detention Operations in Iraq, (MG Geoffrey D. Miller, Commander JTF-GTMO, Guantanamo Bay, Cuba), 9 September 2003 50. Assessment of Detention and Corrections Operations in Iraq, (MG Donald J. Ryder, Provost Marshal General), 6 November 2003 51. CJTF-7 FRAGO #1108, Subject: includes- para 3.C.8 & 3.C.8.A.1, Assignment of 205 MI BDE CDR Responsibilities for the Baghdad Central Confinement Facility (BCCF), 19 November 2003 52. CJTF-7 FRAGO #749, Subject: Intelligence and Evidence-Led Detention Operations Relating to Detainees, 24 August 2003 53. 800th MP BDE FRAGO # 89, Subject: Rules of Engagement, 26 December 2003 54. CG CJTF-7 Memo: CJTF-7 Interrogation and Counter-Resistance Policy, 12 October 2003 55. CG CJTF-7 Memo: Dignity and Respect While Conducting Operations, 13 December 2003 56. Uniform Code of Military Justice and Manual for Courts Martial, 2002 Edition ARTICLE 15-6 INVESTIGATION OF THE 800th MILITARY POLICE BRIGADE BACKGROUND 1. (U) On 19 January 2004, Lieutenant General (LTG) Ricardo S. Sanchez, Commander, Combined Joint Task Force Seven (CJTF-7) requested that the Commander, US Central Command, appoint an Investigating Officer (IO) in the grade of Major General (MG) or above to investigate the conduct of operations within the 800th Military Police (MP) Brigade. LTG Sanchez requested an investigation of detention and internment operations by the Brigade from 1 November 2003 to present. LTG Sanchez cited recent reports of detainee abuse, escapes from confinement facilities, and accountability lapses, which indicated systemic problems within the brigade and suggested a lack of clear standards, proficiency, and leadership. LTG Sanchez requested a comprehensive and all-encompassing inquiry to make findings and recommendations concerning the fitness and performance of the 800th MP Brigade. (ANNEX 2) 2. (U) On 24 January 2003, the Chief of Staff of US Central Command (CENTCOM), MG R. Steven Whitcomb, on behalf of the CENTCOM Commander, directed that the Commander, Coalition Forces Land Component Command (CFLCC), LTG David D. McKiernan, conduct an investigation into the 800th MP Brigadeís detention and internment operations from 1 November 2003 to present. CENTCOM directed that the investigation should inquire into all facts and circumstances surrounding recent reports of suspected detainee abuse in Iraq. It also directed that the investigation inquire into detainee escapes and accountability lapses as reported by CJTF-7, and to gain a more comprehensive and all-encompassing inquiry into the fitness and performance of the 800th MP Brigade. (ANNEX 3) 3. (U) On 31 January 2004, the Commander, CFLCC, appointed MG Antonio M. Taguba, Deputy Commanding General Support, CFLCC, to conduct this investigation. MG Taguba was directed to conduct an informal investigation under AR 15-6 into the 800th MP Brigadeís detention and internment operations. Specifically, MG Taguba was tasked to: a. (U) Inquire into all the facts and circumstances surrounding recent allegations of detainee abuse, specifically allegations of maltreatment at the Abu Ghraib Prison (Baghdad Central Confinement Facility (BCCF)); b. (U) Inquire into detainee escapes and accountability lapses as reported by CJTF-7, specifically allegations concerning these events at the Abu Ghraib Prison; c. (U) Investigate the training, standards, employment, command policies, internal procedures, and command climate in the 800th MP Brigade, as appropriate; d. (U) Make specific findings of fact concerning all aspects of the investigation, and make any recommendations for corrective action, as appropriate. (ANNEX 4) 4. (U) LTG Sanchezís request to investigate the 800th MP Brigade followed the initiation of a criminal investigation by the US Army Criminal Investigation Command (USACIDC) into specific allegations of detainee abuse committed by members of the 372nd MP Company, 320th MP Battalion in Iraq. These units are part of the 800th MP Brigade. The Brigade is an Iraq Theater asset, TACON to CJTF-7, but OPCON to CFLCC at the time this investigation was initiated. In addition, CJTF-7 had several reports of detainee escapes from US/Coalition Confinement Facilities in Iraq over the past several months. These include Camp Bucca, Camp Ashraf, Abu Ghraib, and the High Value Detainee (HVD) Complex/Camp Cropper. The 800th MP Brigade operated these facilities. In addition, four Soldiers from the 320th MP Battalion had been formally charged under the Uniform Code of Military Justice (UCMJ) with detainee abuse in May 2003 at the Theater Internment Facility (TIF) at Camp Bucca, Iraq. (ANNEXES 5-18, 34 and 35) 5. (U) I began assembling my investigation team prior to the actual appointment by the CFLCC Commander. I assembled subject matter experts from the CFLCC Provost Marshal (PM) and the CFLCC Staff Judge Advocate (SJA). I selected COL Kinard J. La Fate, CFLCC Provost Marshal to be my Deputy for this investigation. I also contacted the Provost Marshal General of the Army, MG Donald J. Ryder, to enlist the support of MP subject matter experts in the areas of detention and internment operations. (ANNEXES 4 and 19) 6. (U) The Investigating Team also reviewed the Assessment of DoD Counter-Terrorism Interrogation and Detention Operations in Iraq conducted by MG Geoffrey D. Miller, Commander, Joint Task Force Guantanamo (JTF-GTMO). From 31 August to 9 September 2003, MG Miller led a team of personnel experienced in strategic interrogation to HQ, CJTF-7 and the Iraqi Survey Group (ISG) to review current Iraqi Theater ability to rapidly exploit internees for actionable intelligence. MG Millerís team focused on three areas: intelligence integration, synchronization, and fusion; interrogation operations; and detention operations. MG Millerís team used JTF-GTMO procedures and interrogation authorities as baselines. (ANNEX 20) 7. (U) The Investigating Team began its inquiry with an in-depth analysis of the Report on Detention and Corrections in Iraq, dated 5 November 2003, conducted by MG Ryder and a team of military police, legal, medical, and automation experts. The CJTF-7 Commander, LTG Sanchez, had previously requested a team of subject matter experts to assess, and make specific recommendations concerning detention and corrections operations. From 13 October to 6 November 2003, MG Ryder personally led this assessment/assistance team in Iraq. (ANNEX 19) ASSESSMENT OF DoD COUNTER-TERRORISM INTERROGATION AND DETENTION OPERATIONS IN IRAQ (MG MILLERíS ASSESSMENT) 1. (S/NF) The principal focus of MG Millerís team was on the strategic interrogation of detainees/internees in Iraq. Among its conclusions in its Executive Summary were that CJTF-7 did not have authorities and procedures in place to affect a unified strategy to detain, interrogate, and report information from detainees/internees in Iraq. The Executive Summary also stated that detention operations must act as an enabler for interrogation. (ANNEX 20) 2. (S/NF) With respect to interrogation, MG Millerís Team recommended that CJTF-7 dedicate and train a detention guard force subordinate to the Joint Interrogation Debriefing Center (JIDC) Commander that ìsets the conditions for the successful interrogation and exploitation of internees/detainees.î Regarding Detention Operations, MG Millerís team stated that the function of Detention Operations is to provide a safe, secure, and humane environment that supports the expeditious collection of intelligence. However, it also stated ìit is essential that the guard force be actively engaged in setting the conditions for successful exploitation of the internees.î (ANNEX 20) 3. (S/NF) MG Millerís team also concluded that Joint Strategic Interrogation Operations (within CJTF-7) are hampered by lack of active control of the internees within the detention environment. The Miller Team also stated that establishment of the Theater Joint Interrogation and Detention Center (JIDC) at Abu Ghraib (BCCF) will consolidate both detention and strategic interrogation operations and result in synergy between MP and MI resources and an integrated, synchronized, and focused strategic interrogation effort. (ANNEX 20) 4. (S/NF) MG Millerís team also observed that the application of emerging strategic interrogation strategies and techniques contain new approaches and operational art. The Miller Team also concluded that a legal review and recommendations on internee interrogation operations by a dedicated Command Judge Advocate is required to maximize interrogation effectiveness. (ANNEX 20) IO COMMENTS ON MG MILLERíS ASSESSMENT 1. (S/NF) MG Millerís team recognized that they were using JTF-GTMO operational procedures and interrogation authorities as baselines for its observations and recommendations. There is a strong argument that the intelligence value of detainees held at JTF-Guantanamo (GTMO) is different than that of the detainees/internees held at Abu Ghraib (BCCF) and other detention facilities in Iraq. Currently, there are a large number of Iraqi criminals held at Abu Ghraib (BCCF). These are not believed to be international terrorists or members of Al Qaida, Anser Al Islam, Taliban, and other international terrorist organizations. (ANNEX 20) 2. (S/NF) The recommendations of MG Millerís team that the ìguard forceî be actively engaged in setting the conditions for successful exploitation of the internees would appear to be in conflict with the recommendations of MG Ryderís Team and AR 190-8 that military police ìdo not participate in military intelligence supervised interrogation sessions.î The Ryder Report concluded that the OEF template whereby military police actively set the favorable conditions for subsequent interviews runs counter to the smooth operation of a detention facility. (ANNEX 20) REPORT ON DETENTION AND CORRECTIONS IN IRAQ (MG RYDERíS REPORT) 1. (U) MG Ryder and his assessment team conducted a comprehensive review of the entire detainee and corrections system in Iraq and provided recommendations addressing each of the following areas as requested by the Commander CJTF-7: a. (U) Detainee and corrections system management b. (U) Detainee management, including detainee movement, segregation, and accountability c. (U) Means of command and control of the detention and corrections system d. (U) Integration of military detention and corrections with the Coalition Provisional Authority (CPA) and adequacy of plans for transition to an Iraqi-run corrections system e. (U) Detainee medical care and health management f. (U) Detention facilities that meet required health, hygiene, and sanitation standards g. (U) Court integration and docket management for criminal detainees h. (U) Detainee legal processing i. (U) Detainee databases and records, including integration with law enforcement and court databases (ANNEX 19) 2. (U) Many of the findings and recommendations of MG Ryderís team are beyond the scope of this investigation. However, several important findings are clearly relevant to this inquiry and are summarized below (emphasis is added in certain areas): A. (U) Detainee Management (including movement, segregation, and accountability) 1. (U) There is a wide variance in standards and approaches at the various detention facilities. Several Division/Brigade collection points and US monitored Iraqi prisons had flawed or insufficiently detailed use of force and other standing operating procedures or policies (e.g. weapons in the facility, improper restraint techniques, detainee management, etc.) Though, there were no military police units purposely applying inappropriate confinement practices. (ANNEX 19) 2. (U) Currently, due to lack of adequate Iraqi facilities, Iraqi criminals (generally Iraqi-on-Iraqi crimes) are detained with security internees (generally Iraqi-on-Coalition offenses) and EPWs in the same facilities, though segregated in different cells/compounds. (ANNEX 19) 3. (U) The management of multiple disparate groups of detained people in a single location by members of the same unit invites confusion about handling, processing, and treatment, and typically facilitates the transfer of information between different categories of detainees. (ANNEX 19) 4. (U) The 800th MP (I/R) units did not receive Internment/Resettlement (I/R) and corrections specific training during their mobilization period. Corrections training is only on the METL of two MP (I/R) Confinement Battalions throughout the Army, one currently serving in Afghanistan, and elements of the other are at Camp Arifjan, Kuwait. MP units supporting JTF-GTMO received ten days of training in detention facility operations, to include two days of unarmed self-defense, training in interpersonal communication skills, forced cell moves, and correctional officer safety. (ANNEX 19) B. (U) Means of Command and Control of the Detention and Corrections System 1. (U) The 800th MP Brigade was originally task organized with eight MP(I/R) Battalions consisting of both MP Guard and Combat Support companies. Due to force rotation plans, the 800th redeployed two Battalion HHCs in December 2003, the 115th MP Battalion and the 324th MP Battalion. In December 2003, the 400th MP Battalion was relieved of its mission and redeployed in January 2004. The 724thMP Battalion redeployed on 11 February 2004 and the remainder is scheduled to redeploy in March and April 2004. They are the 310th MP Battalion, 320th MP Battalion, 530th MP Battalion, and 744th MP Battalion. The units that remain are generally understrength, as Reserve Component units do not have an individual personnel replacement system to mitigate medical losses or the departure of individual Soldiers that have reached 24 months of Federal active duty in a five-year period. (ANNEX 19) 2. (U) The 800thMP Brigade (I/R) is currently a CFLCC asset, TACON to CJTF-7 to conduct Internment/Resettlement (I/R) operations in Iraq. All detention operations are conducted in the CJTF-7 AO; Camps Ganci, Vigilant, Bucca, TSP Whitford, and a separate High Value Detention (HVD) site. (ANNEX 19) 3. (U) The 800th MP Brigade has experienced challenges adapting its task organizational structure, training, and equipment resources from a unit designed to conduct standard EPW operations in the COMMZ (Kuwait). Further, the doctrinally trained MP Soldier-to-detainee population ratio and facility layout templates are predicated on a compliant, self-disciplining EPW population, and not criminals or high-risk security internees. (ANNEX 19) 4. (U) EPWs and Civilian Internees should receive the full protections of the Geneva Conventions, unless the denial of these protections is due to specifically articulated military necessity (e.g., no visitation to preclude the direction of insurgency operations). (ANNEXES 19 and 24) 5. (U) AR 190-8, Enemy Prisoners of War, Retained Personnel, Civilian Internees, and other Detainees, FM 3-19.40, Military Police Internment and Resettlement Operations, and FM 34-52, Intelligence Interrogations, require military police to provide an area for intelligence collection efforts within EPW facilities. Military Police, though adept at passive collection of intelligence within a facility, do not participate in Military Intelligence supervised interrogation sessions. Recent intelligence collection in support of Operation Enduring Freedom posited a template whereby military police actively set favorable conditions for subsequent interviews. Such actions generally run counter to the smooth operation of a detention facility, attempting to maintain its population in a compliant and docile state. The 800th MP Brigade has not been directed to change its facility procedures to set the conditions for MI interrogations, nor participate in those interrogations. (ANNEXES 19 and 21-23) 6. MG Ryderís Report also made the following, inter alia, near-term and mid-term recommendations regarding the command and control of detainees: a. (U) Align the release process for security internees with DoD Policy. The process of screening security internees should include intelligence findings, interrogation results, and current threat assessment. b. (U) Determine the scope of intelligence collection that will occur at Camp Vigilant. Refurbish the Northeast Compound to separate the screening operation from the Iraqi run Baghdad Central Correctional Facility. Establish procedures that define the role of military police Soldiers securing the compound, clearly separating the actions of the guards from those of the military intelligence personnel. c. (U) Consolidate all Security Internee Operations, except the MEK security mission, under a single Military Police Brigade Headquarters for OIF 2. d. (U) Insist that all units identified to rotate into the Iraqi Theater of Operations (ITO) to conduct internment and confinement operations in support of OIF 2 be organic to CJTF-7. (ANNEX 19) IO COMMENTS REGARDING MG RYDERíS REPORT 1. (U) The objective of MG Ryderís Team was to observe detention and prison operations, identify potential systemic and human rights issues, and provide near-term, mid-term, and long-term recommendations to improve CJTF-7 operations and transition of the Iraqi prison system from US military control/oversight to the Coalition Provisional Authority and eventually to the Iraqi Government. The Findings and Recommendations of MG Ryderís Team are thorough and precise and should be implemented immediately. (ANNEX 19) 2. (U) Unfortunately, many of the systemic problems that surfaced during MG Ryderís Teamís assessment are the very same issues that are the subject of this investigation. In fact, many of the abuses suffered by detainees occurred during, or near to, the time of that assessment. As will be pointed out in detail in subsequent portions of this report, I disagree with the conclusion of MG Ryderís Team in one critical aspect, that being its conclusion that the 800th MP Brigade had not been asked to change its facility procedures to set the conditions for MI interviews. While clearly the 800th MP Brigade and its commanders were not tasked to set conditions for detainees for subsequent MI interrogations, it is obvious from a review of comprehensive CID interviews of suspects and witnesses that this was done at lower levels. (ANNEX 19) 3. (U) I concur fully with MG Ryderís conclusion regarding the effect of AR 190-8. Military Police, though adept at passive collection of intelligence within a facility, should not participate in Military Intelligence supervised interrogation sessions. Moreover, Military Police should not be involved with setting ìfavorable conditionsî for subsequent interviews. These actions, as will be outlined in this investigation, clearly run counter to the smooth operation of a detention facility. (ANNEX 19) PRELIMINARY INVESTIGATIVE ACTIONS 1. (U) Following our review of MG Ryderís Report and MG Millerís Report, my investigation team immediately began an in-depth review of all available documents regarding the 800th MP Brigade. We reviewed in detail the voluminous CID investigation regarding alleged detainee abuses at detention facilities in Iraq, particularly the Abu Ghraib (BCCF) Detention Facility. We analyzed approximately fifty witness statements from military police and military intelligence personnel, potential suspects, and detainees. We reviewed numerous photos and videos of actual detainee abuse taken by detention facility personnel, which are now in the custody and control of the US Army Criminal Investigation Command and the CJTF-7 prosecution team. The photos and videos are not contained in this investigation. We obtained copies of the 800th MP Brigade roster, rating chain, and assorted internal investigations and disciplinary actions involving that command for the past several months. (All ANNEXES Reviewed by Investigation Team) 2. (U) In addition to military police and legal officers from the CFLCC PMO and SJA Offices we also obtained the services of two individuals who are experts in military police detention practices and training. These were LTC Timothy Weathersbee, Commander, 705th MP Battalion, United States Disciplinary Barracks, Fort Leavenworth, and SFC Edward Baldwin, Senior Corrections Advisor, US Army Military Police School, Fort Leonard Wood. I also requested and received the services of Col (Dr) Henry Nelson, a trained US Air Force psychiatrist assigned to assist my investigation team. (ANNEX 4) 3. (U) In addition to MG Ryderís and MG Millerís Reports, the team reviewed numerous reference materials including the 12 October 2003 CJTF-7 Interrogation and Counter-Resistance Policy, the AR 15-6 Investigation on Riot and Shootings at Abu Ghraib on 24 November 2003, the 205thMI Brigadeís Interrogation Rules of Engagement (IROE), facility staff logs/journals and numerous records of AR 15-6 investigations and Serious Incident Reports (SIRs) on detainee escapes/shootings and disciplinary matters from the 800th MP Brigade. (ANNEXES 5-20, 37, 93, and 94) 4. (U) On 2 February 2004, I took my team to Baghdad for a one-day inspection of the Abu Ghraib Prison (BCCF) and the High Value Detainee (HVD) Complex in order to become familiar with those facilities. We also met with COL Jerry Mocello, Commander, 3rd MP Criminal Investigation Group (CID), COL Dave Quantock, Commander, 16th MP Brigade, COL Dave Phillips, Commander, 89th MP Brigade, and COL Ed Sannwaldt, CJTF-7 Provost Marshal. On 7 February 2004, the team visited the Camp Bucca Detention Facility to familiarize itself with the facility and operating structure. In addition, on 6 and 7 February 2004, at Camp Doha, Kuwait, we conducted extensive training sessions on approved detention practices. We continued our preparation by reviewing the ongoing CID investigation and were briefed by the Special Agent in Charge, CW2 Paul Arthur. We refreshed ourselves on the applicable reference materials within each team memberís area of expertise, and practiced investigative techniques. I met with the team on numerous occasions to finalize appropriate witness lists, review existing witness statements, arrange logistics, and collect potential evidence. We also coordinated with CJTF-7 to arrange witness attendance, force protection measures, and general logistics for the teamís move to Baghdad on 8 February 2004. (ANNEXES 4 and 25) 5. (U) At the same time, due to the Transfer of Authority on 1 February 2004 between III Corps and V Corps, and the upcoming demobilization of the 800th MP Brigade Command, I directed that several critical witnesses who were preparing to leave the theater remain at Camp Arifjan, Kuwait until they could be interviewed (ANNEX 29). My team deployed to Baghdad on 8 February 2004 and conducted a series of interviews with a variety of witnesses (ANNEX 30). We returned to Camp Doha, Kuwait on 13 February 2004. On 14 and 15 February we interviewed a number of witnesses from the 800th MP Brigade. On 17 February we returned to Camp Bucca, Iraq to complete interviews of witnesses at that location. From 18 February thru 28 February we collected documents, compiled references, did follow-up interviews, and completed a detailed analysis of the volumes of materials accumulated throughout our investigation. On 29 February we finalized our executive summary and out-briefing slides. On 9 March we submitted the AR 15-6 written report with findings and recommendations to the CFLCC Deputy SJA, LTC Mark Johnson, for a legal sufficiency review. The out-brief to the appointing authority, LTG McKiernan, took place on 3 March 2004. (ANNEXES 26 and 45-91) FINDINGS AND RECOMMENDATIONS (PART ONE) (U) The investigation should inquire into all of the facts and circumstances surrounding recent allegations of detainee abuse, specifically, allegations of maltreatment at the Abu Ghraib Prison (Baghdad Central Confinement Facility). 1. (U) The US Army Criminal Investigation Command (CID), led by COL Jerry Mocello, and a team of highly trained professional agents have done a superb job of investigating several complex and extremely disturbing incidents of detainee abuse at the Abu Ghraib Prison. They conducted over 50 interviews of witnesses, potential criminal suspects, and detainees. They also uncovered numerous photos and videos portraying in graphic detail detainee abuse by Military Police personnel on numerous occasions from October to December 2003. Several potential suspects rendered full and complete confessions regarding their personal involvement and the involvement of fellow Soldiers in this abuse. Several potential suspects invoked their rights under Article 31 of the Uniform Code of Military Justice (UCMJ) and the 5th Amendment of the U.S. Constitution. (ANNEX 25) 2. (U) In addition to a comprehensive and exhaustive review of all of these statements and documentary evidence, we also interviewed numerous officers, NCOs, and junior enlisted Soldiers in the 800th MP Brigade, as well as members of the 205th Military Intelligence Brigade working at the prison. We did not believe it was necessary to re-interview all the numerous witnesses who had previously provided comprehensive statements to CID, and I have adopted those statements for the purposes of this investigation. (ANNEXES 26, 34, 35, and 45-91) REGARDING PART ONE OF THE INVESTIGATION, I MAKE THE FOLLOWING SPECIFIC FINDINGS OF FACT: 1. (U) That Forward Operating Base (FOB) Abu Ghraib (BCCF) provides security of both criminal and security detainees at the Baghdad Central Correctional Facility, facilitates the conducting of interrogations for CJTF-7, supports other CPA operations at the prison, and enhances the force protection/quality of life of Soldiers assigned in order to ensure the success of ongoing operations to secure a free Iraq. (ANNEX 31) 2. (U) That the Commander, 205th Military Intelligence Brigade, was designated by CJTF-7 as the Commander of FOB Abu Ghraib (BCCF) effective 19 November 2003. That the 205th MI Brigade conducts operational and strategic interrogations for CJTF-7. That from 19 November 2003 until Transfer of Authority (TOA) on 6 February 2004, COL Thomas M. Pappas was the Commander of the 205th MI Brigade and the Commander of FOB Abu Ghraib (BCCF). (ANNEX 31) 3. (U) That the 320th Military Police Battalion of the 800th MP Brigade is responsible for the Guard Force at Camp Ganci, Camp Vigilant, & Cellblock 1 of FOB Abu Ghraib (BCCF). That from February 2003 to until he was suspended from his duties on 17 January 2004, LTC Jerry Phillabaum served as the Battalion Commander of the 320th MP Battalion. That from December 2002 until he was suspended from his duties, on 17 January 2004, CPT Donald Reese served as the Company Commander of the 372ndMP Company, which was in charge of guarding detainees at FOB Abu Ghraib. I further find that both the 320th MP Battalion and the 372ndMP Company were located within the confines of FOB Abu Ghraib. (ANNEXES 32 and 45) 4. (U) That from July of 2003 to the present, BG Janis L. Karpinski was the Commander of the 800th MP Brigade. (ANNEX 45) 5. (S) That between October and December 2003, at the Abu Ghraib Confinement Facility (BCCF), numerous incidents of sadistic, blatant, and wanton criminal abuses were inflicted on several detainees. This systemic and illegal abuse of detainees was intentionally perpetrated by several members of the military police guard force (372nd Military Police Company, 320thMilitary Police Battalion, 800th MP Brigade), in Tier (section) 1-A of the Abu Ghraib Prison (BCCF). The allegations of abuse were substantiated by detailed witness statements (ANNEX 26) and the discovery of extremely graphic photographic evidence. Due to the extremely sensitive nature of these photographs and videos, the ongoing CID investigation, and the potential for the criminal prosecution of several suspects, the photographic evidence is not included in the body of my investigation. The pictures and videos are available from the Criminal Investigative Command and the CTJF-7 prosecution team. In addition to the aforementioned crimes, there were also abuses committed by members of the 325th MI Battalion, 205th MI Brigade, and Joint Interrogation and Debriefing Center (JIDC). Specifically, on 24 November 2003, SPC Luciana Spencer, 205th MI Brigade, sought to degrade a detainee by having him strip and returned to cell naked. (ANNEXES 26 and 53) 6. (S) I find that the intentional abuse of detainees by military police personnel included the following acts: a. (S) Punching, slapping, and kicking detainees; jumping on their naked feet; b. (S) Videotaping and photographing naked male and female detainees; c. (S) Forcibly arranging detainees in various sexually explicit positions for photographing; d. (S) Forcing detainees to remove their clothing and keeping them naked for several days at a time; e. (S) Forcing naked male detainees to wear womenís underwear; f. (S) Forcing groups of male detainees to masturbate themselves while being photographed and videotaped; g. (S) Arranging naked male detainees in a pile and then jumping on them; h. (S) Positioning a naked detainee on a MRE Box, with a sandbag on his head, and attaching wires to his fingers, toes, and penis to simulate electric torture; i. (S) Writing ìI am a Rapestî (sic) on the leg of a detainee alleged to have forcibly raped a 15-year old fellow detainee, and then photographing him naked; j. (S) Placing a dog chain or strap around a naked detaineeís neck and having a female Soldier pose for a picture; k. (S) A male MP guard having sex with a female detainee; l. (S) Using military working dogs (without muzzles) to intimidate and frighten detainees, and in at least one case biting and severely injuring a detainee; m. (S) Taking photographs of dead Iraqi detainees. (ANNEXES 25 and 26) 7.(U) These findings are amply supported by written confessions provided by several of the suspects, written statements provided by detainees, and witness statements. In reaching my findings, I have carefully considered the pre-existing statements of the following witnesses and suspects (ANNEX 26): a. (U) SPC Jeremy Sivits, 372nd MP Company - Suspect b. (U) SPC Sabrina Harman, 372nd MP Company ñ Suspect c. (U) SGT Javal S. Davis, 372nd MP Company - Suspect c. (U) PFC Lynndie R. England, 372nd MP Company - Suspect d. (U) Adel Nakhla, Civilian Translator, Titan Corp., Assigned to the 205th MI Brigade- Suspect (Names deleted) 8. (U) In addition, several detainees also described the following acts of abuse, which under the circumstances, I find credible based on the clarity of their statements and supporting evidence provided by other witnesses (ANNEX 26): a. (U) Breaking chemical lights and pouring the phosphoric liquid on detainees; b. (U) Threatening detainees with a charged 9mm pistol; c. (U) Pouring cold water on naked detainees; d. (U) Beating detainees with a broom handle and a chair; e. (U) Threatening male detainees with rape; f. (U) Allowing a military police guard to stitch the wound of a detainee who was injured after being slammed against the wall in his cell; g. (U) Sodomizing a detainee with a chemical light and perhaps a broom stick. h. (U) Using military working dogs to frighten and intimidate detainees with threats of attack, and in one instance actually biting a detainee. 9. (U) I have carefully considered the statements provided by the following detainees, which under the circumstances I find credible based on the clarity of their statements and supporting evidence provided by other witnesses: a. (U) Amjed Isail Waleed, Detainee # 151365 b. (U) Hiadar Saber Abed Miktub-Aboodi, Detainee # 13077 c. (U) Huessin Mohssein Al-Zayiadi, Detainee # 19446 d. (U) Kasim Mehaddi Hilas, Detainee # 151108 e. (U) Mohanded Juma Juma (sic), Detainee # 152307 f. (U) Mustafa Jassim Mustafa, Detainee # 150542 g. (U) Shalan Said Alsharoni, Detainee, # 150422 h. (U) Abd Alwhab Youss, Detainee # 150425 i. (U) Asad Hamza Hanfosh, Detainee # 152529 j. (U) Nori Samir Gunbar Al-Yasseri, Detainee # 7787 k. (U) Thaar Salman Dawod, Detainee # 150427 l. (U) Ameen Saíeed Al-Sheikh, Detainee # 151362 m. (U) Abdou Hussain Saad Faleh, Detainee # 18470 (ANNEX 26) 10. (U) I find that contrary to the provision of AR 190-8, and the findings found in MG Ryderís Report, Military Intelligence (MI) interrogators and Other US Government Agencyís (OGA) interrogators actively requested that MP guards set physical and mental conditions for favorable interrogation of witnesses. Contrary to the findings of MG Ryderís Report, I find that personnel assigned to the 372ndMP Company, 800th MP Brigade were directed to change facility procedures to ìset the conditionsî for MI interrogations. I find no direct evidence that MP personnel actually participated in those MI interrogations. (ANNEXES 19, 21, 25, and 26). 11. (U) I reach this finding based on the actual proven abuse that I find was inflicted on detainees and by the following witness statements. (ANNEXES 25 and 26): a. (U) SPC Sabrina Harman, 372nd MP Company, stated in her sworn statement regarding the incident where a detainee was placed on a box with wires attached to his fingers, toes, and penis, ìthat her job was to keep detainees awake.î She stated that MI was talking to CPL Grainer. She stated: ìMI wanted to get them to talk. It is Grainer and Frederickís job to do things for MI and OGA to get these people to talk.î b. (U) SGT Javal S. Davis, 372nd MP Company, stated in his sworn statement as follows: ìI witnessed prisoners in the MI hold section, wing 1A being made to do various things that I would question morally. In Wing 1A we were told that they had different rules and different SOP for treatment. I never saw a set of rules or SOP for that section just word of mouth. The Soldier in charge of 1A was Corporal Granier. He stated that the Agents and MI Soldiers would ask him to do things, but nothing was ever in writing he would complain (sic).î When asked why the rules in 1A/1B were different than the rest of the wings, SGT Davis stated: ìThe rest of the wings are regular prisoners and 1A/B are Military Intelligence (MI) holds.î When asked why he did not inform his chain of command about this abuse, SGT Davis stated: ì Because I assumed that if they were doing things out of the ordinary or outside the guidelines, someone would have said something. Also the wing belongs to MI and it appeared MI personnel approved of the abuse.î SGT Davis also stated that he had heard MI insinuate to the guards to abuse the inmates. When asked what MI said he stated: ìLoosen this guy up for us.î Make sure he has abad night.î ìMake sure he gets the treatment.î He claimed these comments were made to CPL Granier and SSG Frederick. Finally, SGT Davis stated that (sic): ìthe MI staffs to my understanding have been giving Granier compliments on the way he has been handling the MI holds. Example being statements like, ìGood job, theyíre breaking down real fast. They answer every question. Theyíre giving out good information, Finally, and Keep up the good work . Stuff like that.î c. (U) SPC Jason Kennel, 372nd MP Company, was asked if he were present when any detainees were abused. He stated: ìI saw them nude, but MI would tell us to take away their mattresses, sheets, and clothes.î He could not recall who in MI had instructed him to do this, but commented that, ìif they wanted me to do that they needed to give me paperwork.î He was later informed that ìwe could not do anything to embarrass the prisoners.î d. (U) Mr. Adel L. Nakhla, a US civilian contract translator was questioned about several detainees accused of rape. He observed (sic): ìThey (detainees) were all naked, a bunch of people from MI, the MP were there that night and the inmates were ordered by SGT Granier and SGT Frederick ordered the guys while questioning them to admit what they did. They made them do strange exercises by sliding on their stomach, jump up and down, throw water on them and made them some wet, called them all kinds of names such as ìgaysî do they like to make love to guys, then they handcuffed their hands together and their legs with shackles and started to stack them on top of each other by insuring that the bottom guys penis will touch the guy on tops butt.î e. (U) SPC Neil A Wallin, 109th Area Support Medical Battalion, a medic testified that: ìCell 1A was used to house high priority detainees and cell 1B was used to house the high risk or trouble making detainees. During my tour at the prison I observed that when the male detainees were first brought to the facility, some of them were made to wear female underwear, which I think was to somehow break them down.î 12. (U) I find that prior to its deployment to Iraq for Operation Iraqi Freedom, the 320th MP Battalion and the 372nd MP Company had received no training in detention/internee operations. I also find that very little instruction or training was provided to MP personnel on the applicable rules of the Geneva Convention Relative to the Treatment of Prisoners of War, FM 27-10, AR 190-8, or FM 3-19.40. Moreover, I find that few, if any, copies of the Geneva Conventions were ever made available to MP personnel or detainees. (ANNEXES 21-24, 33, and multiple witness statements) 13.(U) Another obvious example of the Brigade Leadership not communicating with its Soldiers or ensuring their tactical proficiency concerns the incident of detainee abuse that occurred at Camp Bucca, Iraq, on May 12, 2003. Soldiers from the 223rd MP Company reported to the 800th MP Brigade Command at Camp Bucca, that four Military Police Soldiers from the 320th MP Battalion had abused a number of detainees during inprocessing at Camp Bucca. An extensive CID investigation determined that four soldiers from the 320th MP Battalion had kicked and beaten these detainees following a transport mission from Talil Air Base. (ANNEXES 34 and 35) 14. (U) Formal charges under the UCMJ were preferred against these Soldiers and an Article-32 Investigation conducted by LTC Gentry. He recommended a general court martial for the four accused, which BG Karpinski supported. Despite this documented abuse, there is no evidence that BG Karpinski ever attempted to remind 800th MP Soldiers of the requirements of the Geneva Conventions regarding detainee treatment or took any steps to ensure that such abuse was not repeated. Nor is there any evidence that LTC(P) Phillabaum, the commander of the Soldiers involved in the Camp Bucca abuse incident, took any initiative to ensure his Soldiers were properly trained regarding detainee treatment. (ANNEXES 35 and 62) RECOMMENDATIONS AS TO PART ONE OF THE INVESTIGATION: 1. (U) Immediately deploy to the Iraq Theater an integrated multi-discipline Mobile Training Team (MTT) comprised of subject matter experts in internment/resettlement operations, international and operational law, information technology, facility management, interrogation and intelligence gathering techniques, chaplains, Arab cultural awareness, and medical practices as it pertains to I/R activities. This team needs to oversee and conduct comprehensive training in all aspects of detainee and confinement operations. 2. (U) That all military police and military intelligence personnel involved in any aspect of detainee operations or interrogation operations in CJTF-7, and subordinate units, be immediately provided with training by an international/operational law attorney on the specific provisions of The Law of Land Warfare FM 27-10, specifically the Geneva Convention Relative to the Treatment of Prisoners of War, Enemy Prisoners of War, Retained Personnel, Civilian Internees, and Other Detainees, and AR 190-8. 3. (U) That a single commander in CJTF-7 be responsible for overall detainee operations throughout the Iraq Theater of Operations. I also recommend that the Provost Marshal General of the Army assign a minimum of two (2) subject matter experts, one officer and one NCO, to assist CJTF-7 in coordinating detainee operations. 4. (U) That detention facility commanders and interrogation facility commanders ensure that appropriate copies of the Geneva Convention Relative to the Treatment of Prisoners of War and notice of protections be made available in both English and the detaineesí language and be prominently displayed in all detention facilities. Detainees with questions regarding their treatment should be given the full opportunity to read the Convention. 5. (U) That each detention facility commander and interrogation facility commander publish a complete and comprehensive set of Standing Operating Procedures (SOPs) regarding treatment of detainees, and that all personnel be required to read the SOPs and sign a document indicating that they have read and understand the SOPs. 6. (U) That in accordance with the recommendations of MG Ryderís Assessment Report, and my findings and recommendations in this investigation, all units in the Iraq Theater of Operations conducting internment/confinement/detainment operations in support of Operation Iraqi Freedom be OPCON for all purposes, to include action under the UCMJ, to CJTF-7. 7. (U) Appoint the C3, CJTF as the staff proponent for detainee operations in the Iraq Joint Operations Area (JOA). (MG Tom Miller, C3, CJTF-7, has been appointed by COMCJTF-7). 8. (U) That an inquiry UP AR 381-10, Procedure 15 be conducted to determine the extent of culpability of Military Intelligence personnel, assigned to the 205th MI Brigade and the Joint Interrogation and Debriefing Center (JIDC) regarding abuse of detainees at Abu Ghraib (BCCF). 9. (U) That it is critical that the proponent for detainee operations is assigned a dedicated Senior Judge Advocate, with specialized training and knowledge of international and operational law, to assist and advise on matters of detainee operations. FINDINGS AND RECOMMENDATIONS (PART TWO) (U) The Investigation inquire into detainee escapes and accountability lapses as reported by CJTF-7, specifically allegations concerning these events at the Abu Ghraib Prison: REGARDING PART TWO OF THE INVESTIGATION, I MAKE THE FOLLOWING SPECIFIC FINDINGS OF FACT: 1. The 800th MP Brigade was responsible for theater-wide Internment and Resettlement (I/R) operations. (ANNEXES 45 and 95) 2. (U) The 320th MP Battalion, 800th MP Brigade was tasked with detainee operations at the Abu Ghraib Prison Complex during the time period covered in this investigation. (ANNEXES 41, 45, and 59) 3. (U) The 310th MP Battalion, 800th MP Brigade was tasked with detainee operations and Forward Operating Base (FOB) Operations at the Camp Bucca Detention Facility until TOA on 26 February 2004. (ANNEXES 41 and 52) 4. (U) The 744th MP Battalion, 800th MP Brigade was tasked with detainee operations and FOB Operations at the HVD Detention Facility until TOA on 4 March 2004. (ANNEXES 41 and 55) 5. (U) The 530th MP Battalion, 800th MP Brigade was tasked with detainee operations and FOB Operations at the MEK holding facility until TOA on 15 March 2004. (ANNEXES 41 and 97) 6. (U) Detainee operations include accountability, care, and well being of Enemy Prisoners of War, Retained Person, Civilian Detainees, and Other Detainees, as well as Iraqi criminal prisoners. (ANNEX 22) 7. (U) The accountability for detainees is doctrinally an MP task IAW FM 3-19.40. (ANNEX 22) 8. (U) There is a general lack of knowledge, implementation, and emphasis of basic legal, regulatory, doctrinal, and command requirements within the 800th MP Brigade and its subordinate units. (Multiple witness statements in ANNEXES 45-91). 9. (U) The handling of detainees and criminal prisoners after in-processing was inconsistent from detention facility to detention facility, compound to compound, encampment to encampment, and even shift to shift throughout the 800th MP Brigade AOR. (ANNEX 37) 10. (U) Camp Bucca, operated by the 310th MP Battalion, had a ìCriminal Detainee In-Processing SOPî and a ìTraining Outlineî for transferring and releasing detainees, which appears to have been followed. (ANNEXES 38 and 52) 11. (U) Incoming and outgoing detainees are being documented in the National Detainee Reporting System (NDRS) and Biometric Automated Toolset System (BATS) as required by regulation at all detention facilities. However, it is underutilized and often does not give a ìreal timeî accurate picture of the detainee population due to untimely updating. (ANNEX 56) 12. (U) There was a severe lapse in the accountability of detainees at the Abu Ghraib Prison Complex. The 320th MP Battalion used a self-created ìchange sheetî to document the transfer of a detainee from one location to another. For proper accountability, it is imperative that these change sheets be processed and the detainee manifest be updated within 24 hours of movement. At Abu Ghraib, this process would often take as long as 4 days to complete. This lag-time resulted in inaccurate detainee Internment Serial Number (ISN) counts, gross differences in the detainee manifest and the actual occupants of an individual compound, and significant confusion of the MP Soldiers. The 320th MP Battalion S-1, CPT Theresa Delbalso, and the S-3, MAJ David DiNenna, explained that this breakdown was due to the lack of manpower to process change sheets in a timely manner. (ANNEXES 39 and 98) 13. (U) The 320th Battalion TACSOP requires detainee accountability at least 4 times daily at Abu Ghraib. However, a detailed review of their operational journals revealed that these accounts were often not done or not documented by the unit. Additionally, there is no indication that accounting errors or the loss of a detainee in the accounting process triggered any immediate corrective action by the Battalion TOC. (ANNEX 44) 14. (U) There is a lack of standardization in the way the 320th MP Battalion conducted physical counts of their detainees. Each compound within a given encampment did their headcounts differently. Some compounds had detainees line up in lines of 10, some had them sit in rows, and some moved all the detainees to one end of the compound and counted them as they passed to the other end of the compound. (ANNEX 98) 15. (U) FM 3-19.40 outlines the need for 2 roll calls (100% ISN band checks) per day. The 320th MP Battalion did this check only 2 times per week. Due to the lack of real-time updates to the system, these checks were regularly inaccurate. (ANNEXES 22 and 98) 16. (U) The 800th MP Brigade and subordinate units adopted non-doctrinal terms such as ìband checks,î ìroll-ups,î and ìcall-ups,î which contributed to the lapses in accountability and confusion at the soldier level. (Annexes 63, 88, and 98) 17. (U) Operational journals at the various compounds and the 320th Battalion TOC contained numerous unprofessional entries and flippant comments, which highlighted the lack of discipline within the unit. There was no indication that the journals were ever reviewed by anyone in their chain of command. (Annex 37) 18. (U) Accountability SOPs were not fully developed and standing TACSOPs were widely ignored. Any SOPs that did exist were not trained on, and were never distributed to the lowest level. Most procedures were shelved at the unit TOC, rather than at the subordinate units and guards mount sites. (Annexes 44, 67, 71, and 85) 19. (U) Accountability and facility operations SOPs lacked specificity, implementation measures, and a system of checks and balances to ensure compliance. (AnnexES 76 and 82) 20. (U) Basic Army Doctrine was not widely referenced or utilized to develop the accountability practices throughout the 800th MP Brigadeís subordinate units. Daily processing, accountability, and detainee care appears to have been made up as the operations developed with reliance on, and guidance from, junior members of the unit who had civilian corrections experience. (Annex 21) 21. (U) Soldiers were poorly prepared and untrained to conduct I/R operations prior to deployment, at the mobilization site, upon arrival in theater, and throughout their mission. (ANNEXES 62, 63, and 69) 22. (U) The documentation provided to this investigation identified 27 escapes or attempted escapes from the detention facilities throughout the 800th MP Brigadeís AOR. Based on my assessment and detailed analysis of the substandard accountability process maintained by the 800th MP Brigade, it is highly likely that there were several more unreported cases of escape that were probably ìwritten offî as administrative errors or otherwise undocumented. 1LT Lewis Raeder, Platoon Leader, 372nd MP Company, reported knowing about at least two additional escapes (one from a work detail and one from a window) from Abu Ghraib (BCCF) that were not documented. LTC Dennis McGlone, Commander, 744th MP Battalion, detailed the escape of one detainee at the High Value Detainee Facility who went to the latrine and then outran the guards and escaped. Lastly, BG Janis Karpinski, Commander, 800th MP Brigade, stated that there were more than 32 escapes from her holding facilities, which does not match the number derived from the investigation materials. (ANNEXES 5-10, 45, 55, and 71) 23. (U) The Abu Ghraib and Camp Bucca detention facilities are significantly over their intended maximum capacity while the guard force is undermanned and under resourced. This imbalance has contributed to the poor living conditions, escapes, and accountability lapses at the various facilities. The overcrowding of the facilities also limits the ability to identify and segregate leaders in the detainee population who may be organizing escapes and riots within the facility. (ANNEXES 6, 22, and 92) 24. (U) The screening, processing, and release of detainees who should not be in custody takes too long and contributes to the overcrowding and unrest in the detention facilities. There are currently three separate release mechanisms in the theater-wide internment operations. First, the apprehending unit can release a detainee if there is a determination that their continued detention is not warranted. Secondly, a criminal detainee can be released after it has been determined that the detainee has no intelligence value, and that their release would not be detrimental to society. BG Karpinski had signature authority to release detainees in this second category. Lastly, detainees accused of committing ìCrimes Against the Coalition,î who are held throughout the separate facilities in the CJTF-7 AOR, can be released upon a determination that they are of no intelligence value and no longer pose a significant threat to Coalition Forces. The release process for this category of detainee is a screening by the local US Forces Magistrate Cell and a review by a Detainee Release Board consisting of BG Karpinski, COL Marc Warren, SJA, CJTF-7, and MG Barbara Fast, C-2, CJTF-7. MG Fast is the ìDetainee Release Authorityî for detainees being held for committing crimes against the coalition. According to BG Karpinski, this category of detainee makes up more than 60% of the total detainee population, and is the fastest growing category. However, MG Fast, according to BG Karpinski, routinely denied the boardís recommendations to release detainees in this category who were no longer deemed a threat and clearly met the requirements for release. According to BG Karpinski, the extremely slow and ineffective release process has significantly contributed to the overcrowding of the facilities. (ANNEXES 40, 45, and 46) 25. (U) After Action Reviews (AARs) are not routinely being conducted after an escape or other serious incident. No lessons learned seem to have been disseminated to subordinate units to enable corrective action at the lowest level. The Investigation Team requested copies of AARs, and none were provided. (Multiple Witness Statements) 26. (U) Lessons learned (i.e. Findings and Recommendations from various 15-6 Investigations concerning escapes and accountability lapses) were rubber stamped as approved and ordered implemented by BG Karpinski. There is no evidence that the majority of her orders directing the implementation of substantive changes were ever acted upon. Additionally, there was no follow-up by the command to verify the corrective actions were taken. Had the findings and recommendations contained within their own investigations been analyzed and actually implemented by BG Karpinski, many of the subsequent escapes, accountability lapses, and cases of abuse may have been prevented. (ANNEXES 5-10) 27. (U) The perimeter lighting around Abu Ghraib and the detention facility at Camp Bucca is inadequate and needs to be improved to illuminate dark areas that have routinely become avenues of escape. (ANNEX 6) 28. (U) Neither the camp rules nor the provisions of the Geneva Conventions are posted in English or in the language of the detainees at any of the detention facilities in the 800th MP Brigadeís AOR, even after several investigations had annotated the lack of this critical requirement. (Multiple Witness Statements and the Personal Observations of the Investigation Team) 29. (U) The Iraqi guards at Abu Ghraib BCCF) demonstrate questionable work ethics and loyalties, and are a potentially dangerous contingent within the Hard-Site. These guards have furnished the Iraqi criminal inmates with contraband, weapons, and information. Additionally, they have facilitated the escape of at least one detainee. (ANNEX 8 and 26-SPC Polakís Statement) 30. (U) In general, US civilian contract personnel (Titan Corporation, CACI, etcÖ), third country nationals, and local contractors do not appear to be properly supervised within the detention facility at Abu Ghraib. During our on-site inspection, they wandered about with too much unsupervised free access in the detainee area. Having civilians in various outfits (civilian and DCUs) in and about the detainee area causes confusion and may have contributed to the difficulties in the accountability process and with detecting escapes. (ANNEX 51, Multiple Witness Statements, and the Personal Observations of the Investigation Team) 31. (U) SGM Marc Emerson, Operations SGM, 320th MP Battalion, contended that the Detainee Rules of Engagement (DROE) and the general principles of the Geneva Convention were briefed at every guard mount and shift change on Abu Ghraib. However, none of our witnesses, nor our personal observations, support his contention. I find that SGM Emerson was not a credible witness. (ANNEXES 45, 80, and the Personal Observations of the Investigation Team) 32. (U) Several interviewees insisted that the MP and MI Soldiers at Abu Ghraib (BCCF) received regular training on the basics of detainee operations; however, they have been unable to produce any verifying documentation, sign-in rosters, or soldiers who can recall the content of this training. (Annexes 59, 80, and the Absence of any Training Records) 33. (S/NF) The various detention facilities operated by the 800th MP Brigade have routinely held persons brought to them by Other Government Agencies (OGAs) without accounting for them, knowing their identities, or even the reason for their detention. The Joint Interrogation and Debriefing Center (JIDC) at Abu Ghraib called these detainees ìghost detainees.î On at least one occasion, the 320th MP Battalion at Abu Ghraib held a handful of ìghost detaineesî (6-8) for OGAs that they moved around within the facility to hide them from a visiting International Committee of the Red Cross (ICRC) survey team. This maneuver was deceptive, contrary to Army Doctrine, and in violation of international law. (Annex 53) 34. (U) The following riots, escapes, and shootings have been documented and reported to this Investigation Team. Although there is no data from other missions of similar size and duration to compare the number of escapes with, the most significant factors derived from these reports are twofold. First, investigations and SIRs lacked critical data needed to evaluate the details of each incident. Second, each investigation seems to have pointed to the same types of deficiencies; however, little to nothing was done to correct the problems and to implement the recommendations as was ordered by BG Karpinski, nor was there any command emphasis to ensure these deficiencies were corrected: a. (U) 4 June 03- This escape was mentioned in the 15-6 Investigation covering the 13 June 03 escape, recapture, and shootings of detainees at Camp Vigilant (320th MP Battalion). However, no investigation or additional information was provided as requested by this investigation team. (ANNEX 7) b. (U) 9 June 03- Riot and shootings of five detainees at Camp Cropper. (115th MP Battalion) Several detainees allegedly rioted after a detainee was subdued by MPs of the 115th MP Battalion after striking a guard in compound B of Camp Cropper. A 15-6 investigation by 1LT Magowan (115th MP Battalion, Platoon Leader) concluded that a detainee had acted up and hit an MP. After being subdued, one of the MPs took off his DCU top and flexed his muscles to the detainees, which further escalated the riot. The MPs were overwhelmed and the guards fired lethal rounds to protect the life of the compound MPs, whereby 5 detainees were wounded. Contributing factors were poor communications, no clear chain of command, facility-obstructed views of posted guards, the QRF did not have non-lethal equipment, and the SOP was inadequate and outdated. (ANNEX 5) c. (U) 12 June 03- Escape and recapture of detainee #8399, escape and shooting of detainee # 7166, and attempted escape of an unidentified detainee from Camp Cropper Holding Area (115th MP Battalion). Several detainees allegedly made their escape in the nighttime hours prior to 0300. A 15-6 investigation by CPT Wendlandt (115th MP Battalion, S-2) concluded that the detainees allegedly escaped by crawling under the wire at a location with inadequate lighting. One detainee was stopped prior to escape. An MP of the 115th MP Battalion search team recaptured detainee # 8399, and detainee # 7166 was shot and killed by a Soldier during the recapture process. Contributing factors were overcrowding, poor lighting, and the nature of the hardened criminal detainees at that location. It is of particular note that the command was informed at least 24 hours in advance of the upcoming escape attempt and started doing amplified announcements in Arabic stating the camp rules. The investigation pointed out that rules and guidelines were not posted in the camps in the detaineesí native languages. (ANNEX 6) d. (U) 13 June 03- Escape and recapture of detainee # 8968 and the shooting of eight detainees at Abu Ghraib (BCCF) (320th MP Battalion). Several detainees allegedly attempted to escape at about 1400 hours from the Camp Vigilant Compound, Abu Ghraib (BCCF). A 15-6 investigation by CPT Wyks (400th MP Battalion, S-1) concluded that the detainee allegedly escaped by sliding under the wire while the tower guard was turned in the other direction. This detainee was subsequently apprehended by the QRF. At about 1600 the same day, 30-40 detainees rioted and pelted three interior MP guards with rocks. One guard was injured and the tower guards fired lethal rounds at the rioters injuring 7 and killing 1 detainee. (ANNEX 7) e. (U) 05 November 03- Escape of detainees # 9877 and # 10739 from Abu Ghraib (320th MP Battalion). Several detainees allegedly escaped at 0345 from the Hard-Site, Abu Ghraib (BCCF). An SIR was initiated by SPC Warner (320th MP Battalion, S-3 RTO). The SIR indicated that 2 criminal prisoners escaped through their cell window in tier 3A of the Hard-Site. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 11) f. (U) 07 November 03- Escape of detainee # 14239 from Abu Ghraib (320th MP Battalion). A detainee allegedly escaped at 1330 from Compound 2 of the Ganci Encampment, Abu Ghraib (BCCF). An SIR was initiated by SSG Hydro (320th MP Battalion, S-3 Asst. NCOIC). The SIR indicated that a detainee escaped from the North end of the compound and was discovered missing during distribution of the noon meal, but there is no method of escape listed in the SIR. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 12) g. (U) 08 November 03- Escape of detainees # 115089, # 151623, # 151624, # 116734, # 116735, and # 116738 from Abu Ghraib (320th MP Battalion). Several detainees allegedly escaped at 2022 from Compound 8 of the Ganci encampment, Abu Ghraib. An SIR was initiated by MAJ DiNenna (320th MP Battalion, S-3). The SIR indicated that 5-6 prisoners escaped from the North end of the compound, but there is no method of escape listed in the SIR. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 13) h. (U) 24 November 03- Riot and shooting of 12 detainees # 150216, #150894, #153096, 153165, #153169, #116361, #153399, #20257, #150348, #152616, #116146, and #152156 at Abu Ghraib(320th MP Battalion). Several detainees allegedly began to riot at about 1300 in all of the compounds at the Ganci encampment. This resulted in the shooting deaths of 3 detainees, 9 wounded detainees, and 9 injured US Soldiers. A 15-6 investigation by COL Bruce Falcone (220th MP Brigade, Deputy Commander) concluded that the detainees rioted in protest of their living conditions, that the riot turned violent, the use of non-lethal force was ineffective, and, after the 320th MP Battalion CDR executed ìGolden Spike,î the emergency containment plan, the use of deadly force was authorized. Contributing factors were lack of comprehensive training of guards, poor or non-existent SOPs, no formal guard-mount conducted prior to shift, no rehearsals or ongoing training, the mix of less than lethal rounds with lethal rounds in weapons, no AARs being conducted after incidents, ROE not posted and not understood, overcrowding, uniforms not standardized, and poor communication between the command and Soldiers. (ANNEX 8) i. (U) 24 November 03- Shooting of detainee at Abu Ghraib(320th MP Battalion). A detainee allegedly had a pistol in his cell and around 1830 an extraction team shot him with less than lethal and lethal rounds in the process of recovering the weapon. A 15-6 investigation by COL Bruce Falcone (220th Brigade, Deputy Commander) concluded that one of the detainees in tier 1A of the Hard Site had gotten a pistol and a couple of knives from an Iraqi Guard working in the encampment. Immediately upon receipt of this information, an ad-hoc extraction team consisting of MP and MI personnel conducted what they called a routine cell search, which resulted in the shooting of an MP and the detainee. Contributing factors were a corrupt Iraqi Guard, inadequate SOPs, the Detention ROE in place at the time was ineffective due to the numerous levels of authorization needed for use of lethal force, poorly trained MPs, unclear lanes of responsibility, and ambiguous relationship between the MI and MP assets. (ANNEX 8) j. (U) 13 December 03- Shooting by non-lethal means into crowd at Abu Ghraib(320th MP Battalion). Several detainees allegedly got into a detainee-on-detainee fight around 1030 in Compound 8 of the Ganci encampment, Abu Ghraib. An SIR was initiated by SSG Matash (320th MP Battalion, S-3 Section). The SIR indicated that there was a fight in the compound and the MPs used a non-lethal crowd-dispersing round to break up the fight, which was successful. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 14) k. (U) 13 December 03- Shooting by non-lethal means into crowd at Abu Ghraib(320th MP Battalion). Several detainees allegedly got into a detainee-on-detainee fight around 1120 in Compound 2 of the Ganci encampment, Abu Ghraib. An SIR was initiated by SSG Matash (320th MP Battalion, S-3 Section). The SIR indicated that there was a fight in the compound and the MPs used two non-lethal shots to disperse the crowd, which was successful. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 15) l. (U) 13 December 03- Shooting by non-lethal means into crowd at Abu Ghraib(320th MP Battalion). Approximately 30-40 detainees allegedly got into a detainee-on-detainee fight around 1642 in Compound 3 of the Ganci encampment, Abu Ghraib (BCCF). An SIR was initiated by SSG Matash (320th MP Battalion, S-3 Section). The SIR indicates that there was a fight in the compound and the MPs used a non-lethal crowd-dispersing round to break up the fight, which was successful. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 16) m. (U) 17 December 03- Shooting by non-lethal means of detainee from Abu Ghraib(320th MP Battalion). Several detainees allegedly assaulted an MP at 1459 inside the Ganci Encampment, Abu Ghraib (BCCF). An SIR was initiated by SSG Matash (320th MP BRIGADE, S-3 Section). The SIR indicated that three detainees assaulted an MP, which resulted in the use of a non-lethal shot that calmed the situation. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 17) n. (U) 07 January 04- Escape of detainee #115032 from Camp Bucca(310th MP Battalion). A detainee allegedly escaped between the hours of 0445 and 0640 from Compound 12, of Camp Bucca. Investigation by CPT Kaires (310th MP Battalion S-3) and CPT Holsombeck (724th MP Battalion S-3) concluded that the detainee escaped through an undetected weakness in the wire. Contributing factors were inexperienced guards, lapses in accountability, complacency, lack of leadership presence, poor visibility, and lack of clear and concise communication between the guards and the leadership. (ANNEX 9) o. (U) 12 January 04- Escape of Detainees #115314 and #109950 as well as the escape and recapture of 5 unknown detainees at the Camp Bucca Detention Facility (310th MP Battalion). Several detainees allegedly escaped around 0300 from Compound 12, of Camp Bucca. An AR 15-6 Investigation by LTC Leigh Coulter (800th MP Brigade, OIC Camp Arifjan Detachment) concluded that three of the detainees escaped through the front holding cell during conditions of limited visibility due to fog. One of the detainees was noticed, shot with a non-lethal round, and returned to his holding compound. That same night, 4 detainees exited through the wire on the South side of the camp and were seen and apprehended by the QRF. Contributing factors were the lack of a coordinated effort for emplacement of MPs during implementation of the fog plan, overcrowding, and poor communications. (ANNEX 10) p. (U) 14 January 04- Escape of detainee #12436 and missing Iraqi guard from Hard-Site, Abu Ghraib (320th MP Battalion). A detainee allegedly escaped at 1335 from the Hard Site at Abu Ghraib (BCCF). An SIR was initiated by SSG Hydro (320th MP Battalion, S-3 Asst. NCOIC). The SIR indicates that an Iraqi guard assisted a detainee to escape by signing him out on a work detail and disappearing with him. At the time of the second SIR, neither missing person had been located. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 99) q. (U) 26 January 04- Escape of detainees #s 115236, 116272, and 151933 from Camp Bucca(310th MP Battalion). Several Detainees allegedly escaped between the hours of 0440 and 0700 during a period of intense fog. Investigation by CPT Kaires (310th MP Battalion S-3) concluded that the detainees crawled under a fence when visibility was only 10-15 meters due to fog. Contributing factors were the limited visibility (darkness under foggy conditions), lack of proper accountability reporting, inadequate number of guards, commencement of detainee feeding during low visibility operations, and poorly rested MPs. (ANNEX 18) 36. (U) As I have previously indicated, this investigation determined that there was virtually a complete lack of detailed SOPs at any of the detention facilities. Moreover, despite the fact that there were numerous reported escapes at detention facilities throughout Iraq (in excess of 35), AR 15-6 Investigations following these escapes were simply forgotten or ignored by the Brigade Commander with no dissemination to other facilities. After-Action Reports and Lessons Learned, if done at all, remained at individual facilities and were not shared among other commanders or soldiers throughout the Brigade. The Command never issued standard TTPs for handling escape incidents. (AnnexES 5-10, Multiple Witness Statements, and the Personal Observations of the Investigation Team) RECOMMENDATIONS REGARDING PART TWO OF THE INVESTIGATION: (U) ANNEX 100 of this investigation contains a detailed and referenced series of recommendations for improving the detainee accountability practices throughout the OIF area of operations. (U) Accountability practices throughout any particular detention facility must be standardized and in accordance with applicable regulations and international law. (U) The NDRS and BATS accounting systems must be expanded and used to their fullest extent to facilitate real time updating when detainees are moved and or transferred from one location to another. (U) ìChange sheets,î or their doctrinal equivalent must be immediately processed and updated into the system to ensure accurate accountability. The detainee roll call or ISN counts must match the manifest provided to the compound guards to ensure proper accountability of detainees. (U) Develop, staff, and implement comprehensive and detailed SOPs utilizing the lessons learned from this investigation as well as any previous findings, recommendations, and reports. (U) SOPs must be written, disseminated, trained on, and understood at the lowest level.(U) Iraqi criminal prisoners must be held in separate facilities from any other category of detainee. (U) All of the compounds should be wired into the master manifest whereby MP Soldiers can account for their detainees in real time and without waiting for their change sheets to be processed. This would also have the change sheet serve as a way to check up on the accuracy of the manifest as updated by each compound. The BATS and NDRS system can be utilized for this function.(U) Accountability lapses, escapes, and disturbances within the detainment facilities must be immediately reported through both the operational and administrative Chain of Command via a Serious Incident Report (SIR). The SIRs must then be tracked and followed by daily SITREPs until the situation is resolved. (U) Detention Rules of Engagement (DROE), Interrogation Rules of Engagement (IROE), and the principles of the Geneva Conventions need to be briefed at every shift change and guard mount. (U) AARs must be conducted after serious incidents at any given facility. The observations and corrective actions that develop from the AARs must be analyzed by the respective MP Battalion S-3 section, developed into a plan of action, shared with the other facilities, and implemented as a matter of policy. (U) There must be significant structural improvements at each of the detention facilities. The needed changes include significant enhancement of perimeter lighting, additional chain link fencing, staking down of all concertina wire, hard site development, and expansion of Abu Ghraib (BCCF) . (U) The Geneva Conventions and the facility rules must be prominently displayed in English and the language of the detainees at each compound and encampment at every detention facility IAW AR 190-8. (U) Further restrict US civilians and other contractorsí access throughout the facility. Contractors and civilians must be in an authorized and easily identifiable uniform to be more easily distinguished from the masses of detainees in civilian clothes. (U) Facilities must have a stop movement/transfer period of at least 1 hour prior to every 100% detainee roll call and ISN counts to ensure accurate accountability.(U) The method for doing head counts of detainees within a given compound must be standardized. (U) Those military units conducting I/R operations must know of, train on, and constantly reference the applicable Army Doctrine and CJTF command policies. The references provided in this report cover nearly every deficiency I have enumerated. Although they do not, and cannot, make up for leadership shortfalls, all soldiers, at all levels, can use them to maintain standardized operating procedures and efficient accountability practices. FINDINGS AND RECOMMENDATIONS (PART THREE) (U) Investigate the training, standards, employment, command policies, internal procedures, and command climate in the 800th MP Brigade, as appropriate: (Names deleted) (ANNEXES 45-91) REGARDING PART THREE OF THE INVESTIGATION, I MAKE THE FOLLOWING SPECIFIC FINDINGS OF FACT: 1. (U) I find that BG Janis Karpinski took command of the 800th MP Brigade on 30 June 2003 from BG Paul Hill. BG Karpinski has remained in command since that date. The 800th MP Brigade is comprised of eight MP battalions in the Iraqi TOR: 115th MP Battalion, 310th MP Battalion, 320th MP Battalion, 324th MP Battalion, 400th MP Battalion, 530th MP Battalion, 724th MP Battalion, and 744th MP Battalion. (ANNEXES 41 and 45) 2. (U) Prior to BG Karpinski taking command, members of the 800th MP Brigade believed they would be allowed to go home when all the detainees were released from the Camp Bucca Theater Internment Facility following the cessation of major ground combat on 1 May 2003. At one point, approximately 7,000 to 8,000 detainees were held at Camp Bucca. Through Article-5 Tribunals and a screening process, several thousand detainees were released. Many in the command believed they would go home when the detainees were released. In late May-early June 2003 the 800th MPBrigade was given a new mission to manage the Iraqi penal system and several detention centers. This new mission meant Soldiers would not redeploy to CONUS when anticipated. Morale suffered, and over the next few months there did not appear to have been any attempt by the Command to mitigate this morale problem. (ANNEXES 45 and 96) 3. (U) There is abundant evidence in the statements of numerous witnesses that soldiers throughout the 800th MP Brigade were not proficient in their basic MOS skills, particularly regarding internment/resettlement operations. Moreover, there is no evidence that the command, although aware of these deficiencies, attempted to correct them in any systemic manner other than ad hoc training by individuals with civilian corrections experience. (Multiple Witness Statements and the Personal Observations of the Investigation Team) 4. (U) I find that the 800th MP Brigade was not adequately trained for a mission that included operating a prison or penal institution at Abu Ghraib Prison Complex. As the Ryder Assessment found, I also concur that units of the 800th MP Brigade did not receive corrections-specific training during their mobilization period. MP units did not receive pinpoint assignments prior to mobilization and during the post mobilization training, and thus could not train for specific missions. The training that was accomplished at the mobilization sites were developed and implemented at the company level with little or no direction or supervision at the Battalion and Brigade levels, and consisted primarily of common tasks and law enforcement training. However, I found no evidence that the Command, although aware of this deficiency, ever requested specific corrections training from the Commandant of the Military Police School, the US Army Confinement Facility at Mannheim, Germany, the Provost Marshal General of the Army, or the US Army Disciplinary Barracks at Fort Leavenworth, Kansas. (ANNEXES 19 and 76) 5. (U) I find that without adequate training for a civilian internee detention mission, Brigade personnel relied heavily on individuals within the Brigade who had civilian corrections experience, including many who worked as prison guards or corrections officials in their civilian jobs. Almost every witness we interviewed had no familiarity with the provisions of AR 190-8 or FM 3-19.40. It does not appear that a Mission Essential Task List (METL) based on in-theater missions was ever developed nor was a training plan implemented throughout the Brigade. (ANNEXES 21, 22, 67, and 81) 6. (U) I also find, as did MG Ryderís Team, that the 800th MP Brigade as a whole, was understrength for the mission for which it was tasked. Army Doctrine dictates that an I/R Brigade can be organized with between 7 and 21 battalions, and that the average battalion size element should be able to handle approximately 4000 detainees at a time. This investigation indicates that BG Karpinski and her staff did a poor job allocating resources throughout the Iraq JOA. Abu Ghraib (BCCF) normally housed between 6000 and 7000 detainees, yet it was operated by only one battalion. In contrast, the HVD Facility maintains only about 100 detainees, and is also run by an entire battalion. (ANNEXES 19, 22, and 96) 7. (U) Reserve Component units do not have an individual replacement system to mitigate medical or other losses. Over time, the 800th MP Brigade clearly suffered from personnel shortages through release from active duty (REFRAD) actions, medical evacuation, and demobilization. In addition to being severely undermanned, the quality of life for Soldiers assigned to Abu Ghraib (BCCF) was extremely poor. There was no DFAC, PX, barbershop, or MWR facilities. There were numerous mortar attacks, random rifle and RPG attacks, and a serious threat to Soldiers and detainees in the facility. The prison complex was also severely overcrowded and the Brigade lacked adequate resources and personnel to resolve serious logistical problems. Finally, because of past associations and familiarity of Soldiers within the Brigade, it appears that friendship often took precedence over appropriate leader and subordinate relationships. (ANNEX 101, Multiple Witness Statements, and the Personal Observations of the Investigation Team) 8. (U) With respect to the 800th MP Brigade mission at Abu Ghraib (BCCF), I find that there was clear friction and lack of effective communication between the Commander, 205th MI Brigade, who controlled FOB Abu Ghraib (BCCF) after 19 November 2003, and the Commander, 800th MP Brigade, who controlled detainee operations inside the FOB. There was no clear delineation of responsibility between commands, little coordination at the command level, and no integration of the two functions. Coordination occurred at the lowest possible levels with little oversight by commanders. (ANNEXES 31, 45, and 46) 9. (U) I find that this ambiguous command relationship was exacerbated by a CJTF-7 Fragmentary Order (FRAGO) 1108 issued on 19 November 2003. Paragraph 3.C.8, Assignment of 205th MI Brigade Commanderís Responsibilities for the Baghdad Central Confinement Facility, states as follows: 3.C.8. A. (U) 205 MI BRIGADE. 3.C.8. A. 1. (U) EFFECTIVE IMMEDIATELY COMMANDER 205 MI BRIGADE ASSUMES RESPONSIBILITY FOR THE BAGHDAD CONFINEMENT FACILITY (BCCF) AND IS APPOINTED THE FOB COMMANDER. UNITS CURRENTLY AT ABU GHRAIB (BCCF) ARE TACON TO 205 MI BRIGADE FOR ìSECURITY OF DETAINEES AND FOB PROTECTION.î Although not supported by BG Karpinski, FRAGO 1108 made all of the MP units at Abu Ghraib TACON to the Commander, 205th MI Brigade. This effectively made an MI Officer, rather than an MP Officer, responsible for the MP units conducting detainee operations at that facility. This is not doctrinally sound due to the different missions and agendas assigned to each of these respective specialties. (ANNEX 31) 10 (U) Joint Publication 0-2, Unified Action Armed Forces (UNAAF), 10 July 2001 defines Tactical Control (TACON) as the detailed direction and control of movements or maneuvers within the operational area necessary to accomplish assigned missions or tasks. (ANNEX 42) ìTACON is the command authority over assigned or attached forces or commands or military capability made available for tasking that is limited to the detailed direction and control of movements or maneuvers within the operational area necessary to accomplish assigned missions or tasks. TACON is inherent in OPCON and may be delegated to and exercised by commanders at any echelon at or below the level of combatant commander.î 11. (U) Based on all the facts and circumstances in this investigation, I find that there was little, if any, recognition of this TACON Order by the 800th MP Brigade or the 205th MI Brigade. Further, there was no evidence if the Commander, 205th MI Brigade clearly informed the Commander, 800th MP Brigade, and specifically the Commander, 320th MP Battalion assigned at Abu Ghraib (BCCF), on the specific requirements of this TACON relationship. (ANNEXES 45 and 46) 12. (U) It is clear from a comprehensive review of witness statements and personal interviews that the 320th MP Battalion and 800th MP Brigade continued to function as if they were responsible for the security, health and welfare, and overall security of detainees within Abu Ghraib (BCCF) prison. Both BG Karpinski and COL Pappas clearly behaved as if this were still the case. (ANNEXES 45 and 46) 13. (U) With respect to the 320th MP Battalion, I find that the Battalion Commander, LTC (P) Jerry Phillabaum, was an extremely ineffective commander and leader. Numerous witnesses confirm that the Battalion S-3, MAJ David W. DiNenna, basically ran the battalion on a day-to-day basis. At one point, BG Karpinski sent LTC (P) Phillabaum to Camp Arifjan, Kuwait for approximately two weeks, apparently to give him some relief from the pressure he was experiencing as the 320th Battalion Commander. This movement to Camp Arifjan immediately followed a briefing provided by LTC (P) Phillabaum to the CJTF-7 Commander, LTG Sanchez, near the end of October 2003. BG Karpinski placed LTC Ronald Chew, Commander of the 115th MP Battalion, in charge of the 320th MP Battalion for a period of approximately two weeks. LTC Chew was also in command of the 115th MP Battalion assigned to Camp Cropper, BIAP, Iraq. I could find no orders, either suspending or relieving LTC (P) Phillabaum from command, nor any orders placing LTC Chew in command of the 320th. In addition, there was no indication this removal and search for a replacement was communicated to the Commander CJTF-7, the Commander 377th TSC, or to Soldiers in the 320th MP Battalion. Temporarily removing one commander and replacing him with another serving Battalion Commander without an order and without notifying superior or subordinate commands is without precedent in my military career. LTC (P) Phillabaum was also reprimanded for lapses in accountability that resulted in several escapes. The 320th MP Battalion was stigmatized as a unit due to previous detainee abuse which occurred in May 2003 at the Bucca Theater Internment Facility (TIF), while under the command of LTC (P) Phillabaum. Despite his proven deficiencies as both a commander and leader, BG Karpinski allowed LTC (P) Phillabaum to remain in command of her most troubled battalion guarding, by far, the largest number of detainees in the 800th MP Brigade. LTC (P) Phillabaum was suspended from his duties by LTG Sanchez, CJTF-7 Commander on 17 January 2004. (ANNEXES 43, 45, and 61) 14. (U) During the course of this investigation I conducted a lengthy interview with BG Karpinski that lasted over four hours, and is included verbatim in the investigation Annexes. BG Karpinski was extremely emotional during much of her testimony. What I found particularly disturbing in her testimony was her complete unwillingness to either understand or accept that many of the problems inherent in the 800th MP Brigade were caused or exacerbated by poor leadership and the refusal of her command to both establish and enforce basic standards and principles among its soldiers. (ANNEX 45 and the Personal Observations of the Interview Team) 15. (U) BG Karpinski alleged that she received no help from the Civil Affairs Command, specifically, no assistance from either BG John Kern or COL Tim Regan. She blames much of the abuse that occurred in Abu Ghraib (BCCF) on MI personnel and stated that MI personnel had given the MPs ìideasî that led to detainee abuse. In addition, she blamed the 372nd Company Platoon Sergeant, SFC Snider, the Company Commander, CPT Reese, and the First Sergeant, MSG Lipinski, for the abuse. She argued that problems in Abu Ghraib were the fault of COL Pappas and LTC Jordan because COL Pappas was in charge of FOB Abu Ghraib. (ANNEX 45) 16. (U) BG Karpinski also implied during her testimony that the criminal abuses that occurred at Abu Ghraib (BCCF) might have been caused by the ultimate disposition of the detainee abuse cases that originally occurred at Camp Bucca in May 2003. She stated that ìabout the same time those incidents were taking place out of Baghdad Central, the decisions were made to give the guilty people at Bucca plea bargains. So, the system communicated to the soldiers, the worst thatís gonna happen is, youíre gonna go home.î I think it important to point out that almost every witness testified that the serious criminal abuse of detainees at Abu Ghraib (BCCF) occurred in late October and early November 2003. The photographs and statements clearly support that the abuses occurred during this time period. The Bucca cases were set for trial in January 2004 and were not finally disposed of until 29 December 2003. There is entirely no evidence that the decision of numerous MP personnel to intentionally abuse detainees at Abu Ghrabid (BCCF) was influenced in any respect by the Camp Bucca cases. (ANNEXES 25, 26, and 45) 17. (U) Numerous witnesses stated that the 800th MP Brigade S-1, MAJ Hinzman and S-4, MAJ Green, were essentially dysfunctional, but that despite numerous complaints, these officers were not replaced. This had a detrimental effect on the Brigade Staffís effectiveness and morale. Moreover, the Brigade Command Judge Advocate, LTC James OíHare, appears to lack initiative and was unwilling to accept responsibility for any of his actions. LTC Gary Maddocks, the Brigade XO did not properly supervise the Brigade staff by failing to lay out staff priorities, take overt corrective action when needed, and supervise their daily functions. (ANNEXES 45, 47, 48, 62, and 67) 18. (U) In addition to poor morale and staff inefficiencies, I find that the 800th MP Brigade did not articulate or enforce clear and basic Soldier and Army standards. I specifically found these examples of unenforced standards: a. There was no clear uniform standard for any MP Soldiers assigned detention duties. Despite the fact that hundreds of former Iraqi soldiers and officers were detainees, MP personnel were allowed to wear civilian clothes in the FOB after duty hours while carrying weapons. (ANNEXES 51 and 74) b. Some Soldiers wrote poems and other sayings on their helmets and soft caps. (ANNEXES 51 and 74) c. In addition, numerous officers and senior NCOs have been reprimanded/disciplined for misconduct during this period. Those disciplined include; (ANNEXES 43 and 102) 1). (U) BG Janis Karpinski, Commander, 800th MP Brigade * Memorandum of Admonishment by LTG Sanchez, Commander, CJTF-7, on 17 January 2004. 2). (U) LTC (P) Jerry Phillabaum, Commander, 320th MP Battalion * GOMOR from BG Karpinski, Commander 800th MP Brigade, on 10 November 2003, for lack of leadership and for failing to take corrective security measures as ordered by the Brigade Commander; filed locally * Suspended by BG Karpinski, Commander 800th MP Brigade, 17 January 2004; Pending Relief for Cause, for dereliction of duty 3). (U) LTC Dale Burtyk, Commander, 400th MP Battalion * GOMOR from BG Karpinski, Commander 800th MP Brigade, on 20 August 2003, for failure to properly train his Soldiers. (Soldier had negligent discharge of M-16 while exiting his vehicle, round went into fuel tank); filed locally. 4). (U) MAJ David DiNenna, S-3, 320th MP Battalion * GOMOR from LTG McKiernan, Commander CFLCC, on 25 May 2003, for dereliction of duty for failing to report a violation of CENTCOM General Order #1 by a subordinate Field Grade Officer and Senior Noncommissioned Officer, which he personally observed; returned to soldier unfiled. * GOMOR from BG Karpinski, Commander 800th MP Brigade, on 10 November 03, for failing to take corrective security measures as ordered by the Brigade Commander; filed locally. 5). (U) MAJ Stacy Garrity, Finance Officer, 800th MP Brigade * GOMOR from LTG McKiernan, Commander CFLCC, on 25 May 2003, for violation of CENTCOM General Order #1, consuming alcohol with an NCO; filed locally. 6). (U) CPT Leo Merck, Commander, 870th MP Company * Court-Martial Charges Preferred, for Conduct Unbecoming an Officer and Unauthorized Use of Government Computer in that he was alleged to have taken nude pictures of his female Soldiers without their knowledge; Trial date to be announced. 7). (U) CPT Damaris Morales, Commander, 770th MP Company * GOMOR from BG Karpinski, Commander 800th MP Brigade, on 20 August 2003, for failing to properly train his Soldiers (Soldier had negligent discharge of M-16 while exiting his vehicle, round went into fuel tank); filed locally. 8). (U) CSM Roy Clement, Command Sergeant Major, 800th MP Brigade * GOMOR and Relief for Cause from BG Janis Karpinski, Commander 800th MP Brigade, for fraternization and dereliction of duty for fraternizing with junior enlisted soldiers within his unit; GOMOR officially filed and he was removed from the CSM list. 9). (U) CSM Edward Stotts, Command Sergeant Major, 400th MP Battalion * GOMOR from BG Karpinski, Commander 800th MP Brigade, on 20 August 2003, for failing to properly train his Soldiers (Soldier had negligent discharge of M-16 while exiting his vehicle, round went into fuel tank); filed locally. 10). (U) 1SG Carlos Villanueva, First Sergeant, 770th MP Company * GOMOR from BG Karpinski, Commander 800th MP Brigade, on 20 August 2003, for failing to properly train his Soldiers (Soldier had negligent discharge of M-16 while exiting his vehicle, round went into fuel tank); filed locally. 11). (U) MSG David Maffett, NBC NCO, 800th MP Brigade, * GOMOR from LTG McKiernan, Commander CFLCC, on 25 May 2003, for violation of CENTCOM General Order #1, consuming alcohol; filed locally. 12) (U) SGM Marc Emerson, Operations SGM, 320th MP Battalion, * Two GO Letters of Concern and a verbal reprimand from BG Karpinski, Commander 800th MP Brigade, for failing to adhere to the guidance/directives given to him by BG Karpinski; filed locally. d. (U) Saluting of officers was sporadic and not enforced. LTC Robert P. Walters, Jr., Commander of the 165th Military Intelligence Battalion (Tactical Exploitation), testified that the saluting policy was enforced by COL Pappas for all MI personnel, and that BG Karpinski approached COL Pappas to reverse the saluting policy back to a no-saluting policy as previously existed. (ANNEX 53) 19. (U) I find that individual Soldiers within the 800th MP Brigade and the 320th Battalion stationed throughout Iraq had very little contact during their tour of duty with either LTC (P) Phillabaum or BG Karpinski. BG Karpinski claimed, during her testimony, that she paid regular visits to the various detention facilities where her Soldiers were stationed. However, the detailed calendar provided by her Aide-de-Camp, 1LT Mabry, does not support her contention. Moreover, numerous witnesses stated that they rarely saw BG Karpinski or LTC (P) Phillabaum. (Multiple Witness Statements) 20. (U) In addition I find that psychological factors, such as the difference in culture, the Soldiersí quality of life, the real presence of mortal danger over an extended time period, and the failure of commanders to recognize these pressures contributed to the perversive atmosphere that existed at Abu Ghraib (BCCF) Detention Facility and throughout the 800th MP Brigade. (ANNEX 1). 21. As I have documented in other parts of this investigation, I find that there was no clear emphasis by BG Karpinski to ensure that the 800th MP Brigade Staff, Commanders, and Soldiers were trained to standard in detainee operations and proficiency or that serious accountability lapses that occurred over a significant period of time, particularly at Abu Ghraib (BCCF), were corrected. AR 15-6 Investigations regarding detainee escapes were not acted upon, followed up with corrective action, or disseminated to subordinate commanders or Soldiers. Brigade and unit SOPs for dealing with detainees if they existed at all, were not read or understood by MP Soldiers assigned the difficult mission of detainee operations. Following the abuse of several detainees at Camp Bucca in May 2003, I could find no evidence that BG Karpinski ever directed corrective training for her soldiers or ensured that MP Soldiers throughout Iraq clearly understood the requirements of the Geneva Conventions relating to the treatment of detainees. (Multiple Witness Statements and the Personal Observations of the Investigation Team ) 22. On 17 January 2004 BG Karpinski was formally admonished in writing by LTG Sanchez regarding the serious deficiencies in her Brigade. LTG Sanchez found that the performance of the 800th MP Brigade had not met the standards set by the Army or by CJTF-7. He found that incidents in the preceding six months had occurred that reflected a lack of clear standards, proficiency and leadership within the Brigade. LTG Sanchez also cited the recent detainee abuse at Abu Ghraib (BCCF) as the most recent example of a poor leadership climate that ìpermeates the Brigade.î I totally concur with LTG Sanchezí opinion regarding the performance of BG Karpinski and the 800th MP Brigade. (ANNEX 102 and the Personal Observations of the Investigating Officer) RECOMMENDATIONS AS TO PART THREE OF THE INVESTIGATION: 1. (U) That BG Janis L. Karpinski, Commander, 800th MP Brigade be Relieved from Command and given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: * Failing to ensure that MP Soldiers at theater-level detention facilities throughout Iraq had appropriate SOPs for dealing with detainees and that Commanders and Soldiers had read, understood, and would adhere to these SOPs. * Failing to ensure that MP Soldiers in the 800th MP Brigade knew, understood, and adhered to the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. * Making material misrepresentations to the Investigation Team as to the frequency of her visits to her subordinate commands. * Failing to obey an order from the CFLCC Commander, LTG McKiernan, regarding the withholding of disciplinary authority for Officer and Senior Noncommissioned Officer misconduct. * Failing to take appropriate action regarding the ineffectiveness of a subordinate Commander, LTC (P) Jerry Phillabaum. * Failing to take appropriate action regarding the ineffectiveness of numerous members of her Brigade Staff including her XO, S-1, S-3, and S-4. * Failing to properly ensure the results and recommendations of the AARs and numerous 15-6 Investigation reports on escapes and shootings (over a period of several months) were properly disseminated to, and understood by, subordinate commanders. * Failing to ensure and enforce basic Soldier standards throughout her command. * Failing to establish a Brigade METL. * Failing to establish basic proficiency in assigned tasks for Soldiers throughout the 800th MP Brigade. * Failing to ensure that numerous and reported accountability lapses at detention facilities throughout Iraq were corrected. 2. (U) That COL Thomas M. Pappas, Commander, 205th MI Brigade, be given a General Officer Memorandum of Reprimand and Investigated UP Procedure 15, AR 381-10, US Army Intelligence Activities for the following acts which have been previously referred to in the aforementioned findings: * Failing to ensure that Soldiers under his direct command were properly trained in and followed the IROE. * Failing to ensure that Soldiers under his direct command knew, understood, and followed the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. * Failing to properly supervise his soldiers working and ìvisitingî Tier 1 of the Hard-Site at Abu Ghraib (BCCF). 3. (U) That LTC (P) Jerry L. Phillabaum, Commander, 320th MP Battalion, be Relieved from Command, be given a General Officer Memorandum of Reprimand, and be removed from the Colonel/O-6 Promotion List for the following acts which have been previously referred to in the aforementioned findings: * Failing to properly ensure the results, recommendations, and AARs from numerous reports on escapes and shootings over a period of several months were properly disseminated to, and understood by, subordinates. * Failing to implement the appropriate recommendations from various 15-6 Investigations as specifically directed by BG Karpinski. * Failing to ensure that Soldiers under his direct command were properly trained in Internment and Resettlement Operations. * Failing to ensure that Soldiers under his direct command knew and understood the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. * Failing to properly supervise his soldiers working and ìvisitingî Tier 1 of the Hard-Site at Abu Ghraib (BCCF). * Failing to properly establish and enforce basic soldier standards, proficiency, and accountability. * Failure to conduct an appropriate Mission Analysis and to task organize to accomplish his mission. 4. (U) That LTC Steven L. Jordan, Former Director, Joint Interrogation and Debriefing Center and Liaison Officer to 205th Military Intelligence Brigade, be relieved from duty and be given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: * Making material misrepresentations to the Investigating Team, including his leadership roll at Abu Ghraib (BCCF). * Failing to ensure that Soldiers under his direct control were properly trained in and followed the IROE. * Failing to ensure that Soldiers under his direct control knew, understood, and followed the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. * Failing to properly supervise soldiers under his direct authority working and ìvisitingî Tier 1 of the Hard-Site at Abu Ghraib (BCCF). 5. (U) That MAJ David W. DiNenna, Sr., S-3, 320th MP Battalion, be Relieved from his position as the Battalion S-3 and be given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: * Received a GOMOR from LTG McKiernan, Commander CFLCC, on 25 May 2003, for dereliction of duty for failing to report a violation of CENTCOM General Order #1 by a subordinate Field Grade Officer and Senior Noncommissioned Officer, which he personally observed; GOMOR was returned to Soldier and not filed. * Failing to take corrective action and implement recommendations from various 15-6 investigations even after receiving a GOMOR from BG Karpinski, Commander 800th MP Brigade, on 10 November 03, for failing to take corrective security measures as ordered; GOMOR was filed locally. * Failing to take appropriate action and report an incident of detainee abuse, whereby he personally witnessed a Soldier throw a detainee from the back of a truck. 6. (U) That CPT Donald J. Reese, Commander, 372nd MP Company, be Relieved from Command and be given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: * Failing to ensure that Soldiers under his direct command knew and understood the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. * Failing to properly supervise his Soldiers working and ìvisitingî Tier 1 of the Hard-Site at Abu Ghraib (BCCF). * Failing to properly establish and enforce basic soldier standards, proficiency, and accountability. * Failing to ensure that Soldiers under his direct command were properly trained in Internment and Resettlement Operations. 7. (U) That 1LT Lewis C. Raeder, Platoon Leader, 372nd MP Company, be Relieved from his duties as Platoon Leader and be given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: * Failing to ensure that Soldiers under his direct command knew and understood the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. * Failing to properly supervise his soldiers working and ìvisitingî Tier 1 of the Hard-Site at Abu Ghraib (BCCF). * Failing to properly establish and enforce basic Soldier standards, proficiency, and accountability. * Failing to ensure that Soldiers under his direct command were properly trained in Internment and Resettlement Operations. 8. (U) That SGM Marc Emerson, Operations SGM, 320th MP Battalion, be Relieved from his duties and given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: * Making a material misrepresentation to the Investigation Team stating that he had ìneverî been admonished or reprimanded by BG Karpinski, when in fact he had been admonished for failing to obey an order from BG Karpinski to ìstay out of the towersî at the holding facility. * Making a material misrepresentation to the Investigation Team stating that he had attended every shift change/guard-mount conducted at the 320th MP Battalion, and that he personally briefed his Soldiers on the proper treatment of detainees, when in fact numerous statements contradict this assertion. * Failing to ensure that Soldiers in the 320th MP Battalion knew and understood the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. * Failing to properly supervise his soldiers working and ìvisitingî Tier 1 of the Hard-Site at Abu Ghraib (BCCF). * Failing to properly establish and enforce basic soldier standards, proficiency, and accountability. * Failing to ensure that his Soldiers were properly trained in Internment and Resettlement Operations. 9. (U) That 1SG Brian G. Lipinski, First Sergeant, 372nd MP Company, be Relieved from his duties as First Sergeant of the 372nd MP Company and given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: * Failing to ensure that Soldiers in the 372nd MP Company knew and understood the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. * Failing to properly supervise his soldiers working and ìvisitingî Tier 1 of the Hard-Site at Abu Ghraib (BCCF). * Failing to properly establish and enforce basic soldier standards, proficiency, and accountability. * Failing to ensure that his Soldiers were properly trained in Internment and Resettlement Operations. 10. (U) That SFC Shannon K. Snider, Platoon Sergeant, 372nd MP Company, be Relieved from his duties, receive a General Officer Memorandum of Reprimand, and receive action under the Uniform Code of Military Justice for the following acts which have been previously referred to in the aforementioned findings: * Failing to ensure that Soldiers in his platoon knew and understood the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. * Failing to properly supervise his soldiers working and ìvisitingî Tier 1 of the Hard-Site at Abu Ghraib (BCCF). * Failing to properly establish and enforce basic soldier standards, proficiency, and accountability. * Failing to ensure that his Soldiers were properly trained in Internment and Resettlement Operations. * Failing to report a Soldier, who under his direct control, abused detainees by stomping on their bare hands and feet in his presence. 11. (U) That Mr. Steven Stephanowicz, Contract US Civilian Interrogator, CACI, 205th Military Intelligence Brigade, be given an Official Reprimand to be placed in his employment file, termination of employment, and generation of a derogatory report to revoke his security clearance for the following acts which have been previously referred to in the aforementioned findings: * Made a false statement to the investigation team regarding the locations of his interrogations, the activities during his interrogations, and his knowledge of abuses. * Allowed and/or instructed MPs, who were not trained in interrogation techniques, to facilitate interrogations by ìsetting conditionsî which were neither authorized and in accordance with applicable regulations/policy. He clearly knew his instructions equated to physical abuse. 12. (U) That Mr. John Israel,Contract US Civilian Interpreter, CACI, 205th Military Intelligence Brigade, be given an Official Reprimand to be placed in his employment file and have his security clearance reviewed by competent authority for the following acts or concerns which have been previously referred to in the aforementioned findings: * Denied ever having seen interrogation processes in violation of the IROE, which is contrary to several witness statements. * Did not have a security clearance. 13. (U) I find that there is sufficient credible information to warrant an Inquiry UP Procedure 15, AR 381-10, US Army Intelligence Activities, be conducted to determine the extent of culpability of MI personnel, assigned to the 205th MI Brigade and the Joint Interrogation and Debriefing Center (JIDC) at Abu Ghraib (BCCF). Specifically, I suspect that COL Thomas M. Pappas, LTC Steve L. Jordan, Mr. Steven Stephanowicz, and Mr. John Israel were either directly or indirectly responsible for the abuses at Abu Ghraib (BCCF) and strongly recommend immediate disciplinary action as described in the preceding paragraphs as well as the initiation of a Procedure 15 Inquiry to determine the full extent of their culpability. (Annex 36) OTHER FINDINGS/OBSERVATIONS 1. (U) Due to the nature and scope of this investigation, I acquired the assistance of Col (Dr.) Henry Nelson, a USAF Psychiatrist, to analyze the investigation materials from a psychological perspective. He determined that there was evidence that the horrific abuses suffered by the detainees at Abu Ghraib (BCCF) were wanton acts of select soldiers in an unsupervised and dangerous setting. There was a complex interplay of many psychological factors and command insufficiencies. A more detailed analysis is contained in ANNEX 1 of this investigation. 2. (U) During the course of this investigation I conducted a lengthy interview with BG Karpinski that lasted over four hours, and is included verbatim in the investigation Annexes. BG Karpinski was extremely emotional during much of her testimony. What I found particularly disturbing in her testimony was her complete unwillingness to either understand or accept that many of the problems inherent in the 800th MP Brigade were caused or exacerbated by poor leadership and the refusal of her command to both establish and enforce basic standards and principles among its Soldiers. (ANNEX 45) 3. (U) Throughout the investigation, we observed many individual Soldiers and some subordinate units under the 800th MP Brigade that overcame significant obstacles, persevered in extremely poor conditions, and upheld the Army Values. We discovered numerous examples of Soldiers and Sailors taking the initiative in the absence of leadership and accomplishing their assigned tasks. a. (U) The 744th MP Battalion, commanded by LTC Dennis McGlone, efficiently operated the HVD Detention Facility at Camp Cropper and met mission requirements with little to no guidance from the 800th MP Brigade. The unit was disciplined, proficient, and appeared to understand their basic tasks. b. (U) The 530th MP Battalion, commanded by LTC Stephen J. Novotny, effectively maintained the MEK Detention Facility at Camp Ashraf. His Soldiers were proficient in their individual tasks and adapted well to this highly unique and non-doctrinal operation. c. (U) The 165th MI Battalion excelled in providing perimeter security and force protection at Abu Ghraib (BCCF). LTC Robert P. Walters, Jr., demanded standards be enforced and worked endlessly to improve discipline throughout the FOB. 4. (U) The individual Soldiers and Sailors that we observed and believe should be favorably noted include: a. (U) Master-at-Arms First Class William J. Kimbro, US Navy Dog Handler, knew his duties and refused to participate in improper interrogations despite significant pressure from the MI personnel at Abu Ghraib. b. (U) SPC Joseph M. Darby, 372nd MP Company discovered evidence of abuse and turned it over to military law enforcement. c. (U) 1LT David O. Sutton, 229th MP Company, took immediate action and stopped an abuse, then reported the incident to the chain of command. CONCLUSION 1. (U) Several US Army Soldiers have committed egregious acts and grave breaches of international law at Abu Ghraib/BCCF and Camp Bucca, Iraq. Furthermore, key senior leaders in both the 800th MP Brigade and the 205th MI Brigade failed to comply with established regulations, policies, and command directives in preventing detainee abuses at Abu Ghraib (BCCF) and at Camp Bucca during the period August 2003 to February 2004. 2. (U) Approval and implementation of the recommendations of this AR 15-6 Investigation and those highlighted in previous assessments are essential to establish the conditions with the resources and personnel required to prevent future occurrences of detainee abuse. Annexes 1. Psychological Assessment 2. Request for investigation from CJTF-7 to CENTCOM 3. Directive to CFLCC from CENTCOM directing investigation 4. Appointment Memo from CFLCC CDR to MG Taguba 5. 15-6 Investigation 9 June 2003 6. 15-6 Investigation 12 June 2003 7. 15-6 Investigation 13 June 2003 8. 15-6 Investigation 24 November 2003 9. 15-6 Investigation 7 January 2004 10. 15-6 Investigation 12 January 2004 11. SIR 5 November 2003 12. SIR 7 November 2003 13. SIR 8 November 2003 14. SIR 13 December 2003 15. SIR 13 December 2003 16. SIR 13 December 2003 17. SIR 17 December 2003 18. Commanderís Inquiry 26 January 2004 19. MG Ryderís Report, 6 November 2003 20. MG Millerís Report, 9 September 2003 21. AR 190-8, Enemy Prisoners of War, Retained Personnel, Civilian Internees, and Other Detainees, 1 October 1997 22. FM 3-19.40, Military Police Internment/Resettlement Operations, 1 August 2001 23. FM 34-52, Intelligence Interrogation, 28 September 1992 24. Fourth Geneva Convention, 12 August 1949 25. CID Report on criminal abuses at Abu Ghraib, 28 January 2004 26. CID Interviews, 10-25 January 2004 27. 800th MP Brigade Roster, 29 January 2004 28. 205th MI Brigadeís IROE, Undated 29. TOA Order (800th MP Brigade) and letter holding witnesses 30. Investigation Teamís witness list 31. FRAGO #1108 32. Letters suspending several key leaders in the 800th MP Brigade and Rating Chain with suspensions annotated 33. FM 27-10, Military Justice, 6 September 2002 34. CID Report on abuse of detainees at Camp Bucca, 8 June 2003 35. Article 32 Findings on abuse of detainees at Camp Bucca, 26 August 2003 36. AR 381-10, 1 July 1984 37. Excerpts from log books, 320th MP Battalion 38. 310th MP Battalionís Inprocessing SOP 39. 320th MP Battalionís ìChange Sheetî 40. Joint Interrogation and Debriefing Centerís (JIDC) Slides, Undated 41. Order of Battle Slides, 12 January 2004 42. Joint Publication 0-2, Unified Actions Armed Forces, 10 July 2001 43. General Officer Memorandums of Reprimand 44. 800th MP Battalionís TACSOP 45. BG Janis Karpinski, Commander, 800th MP Brigade 46. COL Thomas Pappas, Commander, 205th MI Brigade 47. COL Ralph Sabatino, CFLCC Judge Advocate, CPA Ministry of Justice 48. LTC Gary W. Maddocks, S-5 and Executive Officer, 800th MP Brigade 49. LTC James OíHare, Command Judge Advocate, 800th MP Brigade 50. LTC Robert P. Walters Jr., Commander, 165th MI Battalion (Tactical exploitation) 51. LTC James D. Edwards, Commander, 202nd MI Battalion 52. LTC Vincent Montera, Commander 310th MP Battalion 53. LTC Steve Jordan, former Director, Joint Interrogation and Debriefing Center/LNO to the 205th MI Brigade 54. LTC Leigh A. Coulter, Commander 724th MP Battalion and OIC Arifjan Detachment, 800th MP Brigade 55. LTC Dennis McGlone, Commander, 744th MP Battalion 56. MAJ David Hinzman, S-1, 800th MP Brigade 57. MAJ William D. Proietto, Deputy CJA, 800th MP Brigade 58. MAJ Stacy L. Garrity, S-1 (FWD), 800th MP Brigade 59. MAJ David W. DiNenna, S-3, 320th MP Battalion 60. MAJ Michael Sheridan, XO, 320th MP Battalion 61. MAJ Anthony Cavallaro, S-3, 800th MP Brigade 62. CPT Marc C. Hale, Commander, 670th MP Company 63. CPT Donald Reese, Commander, 372nd MP Company 64. CPT Darren Hampton, Assistant S-3, 320th MP Battalion 65. CPT John Kaires, S-3, 310th MP Battalion 66. CPT Ed Diamantis, S-2, 800th MP Brigade 67. LTC Jerry L. Phillabaum, Commander, 320th MP Battalion 68. CPT James G. Jones, Commander, 229th MP Company 69. CPT Michael A. Mastrangelo, Jr., Commander, 310th MP Company 70. CPT Lawrence Bush, IG, 800th MP Brigade 71. 1LT Lewis C. Raeder, Platoon Leader, 372nd MP Company 72. 1LT Elvis Mabry, Aide-de-Camp to Brigade Commander, 800th MP Brigade 73. 1LT Warren E. Ford, II, Commander, HHC 320th MP Battalion 74. 2LT David O. Sutton, Platoon Leader, 229th MP Company 75. CW2 Edward J. Rivas, 205th MI Brigade 76. CSM Joseph P. Arrison, Command Sergeant Major, 320th MP Battalion 77. SGM Pascual Cartagena, Command Sergeant Major, 800th MP Brigade 78. CSM Timothy L. Woodcock, Command Sergeant Major, 310th MP Battalion 79. 1SG Dawn J. Rippelmeyer, First Sergeant, 977th MP Company 80. SGM Mark Emerson, Operations SGM, 320th MP Battalion 81. MSG Brian G. Lipinski, First Sergeant, 372nd MP Company 82. MSG Andrew J. Lombardo, Operations Sergeant, 310th MP Battalion 83. SFC Daryl J. Plude, Platoon Sergeant, 229th MP Company 84. SFC Shannon K. Snider, Platoon SGT, 372nd MP Company 85. SFC Keith A. Comer, 372nd MP Company 86. SSG Robert Elliot, Squad Leader, 372nd MP Company 87. SSG Santos A. Cardona, Army Dog Handler 88. SGT Michael Smith, Army Dog Handler 89. MA1 William J. Kimbro, USN Dog Handler 90. Mr. Steve Stephanowicz, US civilian contract Interrogator, CACI, 205th MI Brigade 91. Mr. John Israel, US civilian contract Interpreter, Titan Corporation, 205th MI Brigade 92. FM 3-19.1, Military Police Operations, 22 March 2001 93. CJTF-7 IROE and DROE, Undated 94. CJTF-7 Interrogation and Counter Resistance Policy, 12 October 2003 95. 800th MP Brigade Mobilization Orders 96. Sample Detainee Status Report, 13 March 2004 97. 530th MP Battalion Mission Brief, 11 February 2004 98. Memorandum for Record, CPT Ed Ray, Chief of Military Justice, CFLCC, 9 March 2004 99. SIR 14 January 2004 100. Accountability Plan Recommendations, 9 March 2004 101. 2LT Michael R. Osterhout, S-2, 320th MP Battalion 102. Memorandum of Admonishment from LTG Sanchez to BG Karpinski, 17 January 2004 103. Various SIRs from the 800th MP Brigade/320th MP Battalion 104. 205th MI Brigade SITREP to MG Miller, 12 December 2003 105. SGT William A. Cathcart, 372nd MP Company 106. 1LT Michael A. Drayton, Commander, 870th MP Company -------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------------------------ http://www.melbourne.indymedia.org/news/2004/04/68363_comment.php Karpinski says. "At one point we were concerned they wouldn't want to leave." by st petersburg times Friday April 30, 2004 at 09:34 PM ...soldiers credit Brig. Gen. Janis Karpinski for making their tours here a little more palatable. "She's really caring," says Sgt. 1st Class Philip J. May of Pinellas Park. "She doesn't just talk the talk, she walks the walk." Iraq Her job: Lock up Iraq's bad guys Army Brig. Gen. Janis Karpinski, the lone female commander in Iraq, runs the prison system that once was an apparatus of terror. By SUSAN TAYLOR MARTIN, Times Senior Correspondent Published December 14, 2003 BAGHDAD - A few weeks ago, Janis Karpinski was in the middle of a briefing when a man suddenly reached out and grabbed her. Crass? No, just a nervous soldier trying to protect the commanding officer as an Iraqi mortar exploded a few dozen yards away. "A mortar will get your attention real fast," Karpinski says, "and it can be an indication of other things to come." Such are the daily distractions for Karpinski, a brigadier general and the only female U.S. commander in Iraq. Since June, the 50-year-old Karpinski has been in charge of the country's prison system, including the once-infamous Abu Ghraib, where Saddam Hussein's political opponents were tortured and hanged. Karpinski is also responsible for 3,400 National Guard and Army reservists deployed from the Persian Gulf to the northern city of Mosul. Among them is a military police unit from St. Petersburg that helps guard Abu Ghraib, renamed Baghdad Central and now housing hundreds of garden-variety criminals as well as those accused of violence against coalition troops. "The threat level has increased all through the country," Karpinski says. "They're getting smarter, they're more capable of these little insurgencies and attacks." Given the constant threat of danger, Karpinski is quick to admit that "nobody wants to stay in Iraq a day longer than he has to." But soldiers credit her for making their tours here a little more palatable. "She's really caring," says Sgt. 1st Class Philip J. May of Pinellas Park. "She doesn't just talk the talk, she walks the walk." So far, Karpinski has lost 15 people under her command to combat-related incidents, including a father killed by a mortar before he got to see his 2-month-old baby. She sends personal letters to the families and tries to attend all memorial services in Iraq. Karpinski also does what she can to make life easier for troops on a day-to-day basis. "I love my soldiers," she says. "When I ask if there's a problem or I hear of a problem, I make every effort to resolve it, and if I can't, I tell them why I can't or why the system can't. There's no lip service." Karpinski understands the trials of separation. She has no children, but her husband of 29 years, a lieutenant colonel, works with the U.S. Embassy in the small Arab nation of Oman. Among the few times she has seen him in recent months was last summer when he presented her with flowers as she assumed command of the 800th Military Police Brigade. Like her colleagues, Karpinski lives in desert camouflage, Kevlar vest and combat boots. Her blond hair is braided and coiled in a tight bun; her ice blue eyes, devoid of makeup, fix listeners with a friendly, if unflinching gaze. The brigade is based near Baghdad International Airport in what used to be Hussein's private sports preserve. The setting is almost paradisiacal with small palaces surrounding a man-made lake. "Everyone assigned here carries on the tradition of fishing," Karpinski notes, leading the way across a narrow footbridge as the setting sun casts a golden light over palms and rushes. "It's beautiful, but in the summer it's every bit as hot as elsewhere - 140 degrees." Karpinski's operations center is in a former "love nest" of one of Hussein's sons. Instead of lurid murals, the walls are now covered with giant maps of Baghdad Central Correctional Facility and the Middle East. The room used to be bright and sunny; after the mortar attacks, all the windows were boarded with plywood. From here, Karpinski oversees 15 prisons and detention facilities throughout southern and central Iraq. During Hussein's day, it was not a corrections system but one of "intimidation and torture," she says. At Abu Ghraib, the most notorious prison, 150 inmates were crammed into cells designed for 24. The torture chamber was next to the hanging chamber, whose clanging iron trap doors were a vivid reminder of the fate awaiting those who refused to pledge loyalty to the regime. In the fall of 2002, Hussein unexpectedly released thousands of rapists, murderers and other criminals for reasons still not totally clear. Left virtually unoccupied, the prisons were plundered after the war. "Looters had a field day. They stole all the doors, the windows and in some locations, they took the bricks out of the walls and the tile off the floor. They even pulled out the wiring. The prisons were in absolute disrepair when we came into Iraq." Baghdad Central and other prisons are undergoing extensive renovation, including the addition of ceiling fans, toilets and showers. Whereas detainees used to cry at the very thought of Abu Ghraib, for many the "living conditions now are better in prison than at home," Karpinski says. "At one point we were concerned they wouldn't want to leave." About 9,000 of the men, women and juveniles in custody throughout Iraq are "civilian prisoners" charged with theft and other common crimes. In all but the most serious cases, they are released within a few weeks or months. Other prisoners, said to number a few thousand Iraqis and foreigners, are "security detainees" suspected of crimes against the coalition. Within 72 hours, they are informed of the charges against them. They also are entitled to a review by a coalition military committee, with followup reviews every six months. "It's really a different situation from Guantanamo," says Karpinski, referring to the U.S. military base on Cuba where hundreds of terrorist suspects have been held for more than two years without charge. There is a third, even more closely guarded group of inmates - top officials of Hussein's regime, including Deputy Prime Minister Tariq Aziz. They are housed together under "appropriate arrangements;" Karpinski won't say more about them. At least once every three months, Karpinski tries to visit each prison, although she scaled back a bit as attacks against the coalition increased. "Make no mistake, I have the same concern for personal safety as everybody else, but I put a lot of other people at risk - my driver, my team. . . . But we can't put soldiers out there and say it's too dangerous to come see you." At most prisons, Iraqi guards now work side by side with coalition troops. There have been problems; some Iraqis failed to show up for work while others have been canned for taking bribes. One was fired for raping female inmates. It will be three to five years, Karpinski predicts, before Iraqis can completely take over the prison systems. "A lot of time the question is, "How do you feel about being in command of the unit in possibly the most important mission in Iraq?' I say, "A lot of the time I feel tired.' " Yet even as a 5-year-old, Karpinski wanted to be a soldier. One summer, she lined up her dolls in the back yard of her Rahway, N.J., home and wrote, "A-OK-U.S. Army" on them. Neighbors were startled to see her sitting on the sill of her second-floor bedroom window; Karpinski was imagining what it would be like to jump out of an airplane. "I think what attracted me originally was that the Army offered the opportunities to do all the exciting things I could never do as a school teacher or in any other capacity." Over a quarter-century career, Karpinski has made more than 100 parachute jumps, won a Bronze Star and served in Saudi Arabia during the Persian Gulf War. In 1987, she moved from the regular Army to the Reserves, but continued working in intelligence and MP positions in the United States and the Mideast. Karpinski notes, with pride, that female soldiers under her command do the same kind of work as men. "Over the last 10 years, (the Army) has become an example of how men and women of every religion and ethnic background are offered the same opportunities. Occasionally the good old boy network is in place, but it used to be 90 percent of the time. Now it's 10 percent of the time." But Karpinski knows many people still regard female soldiers as a different breed, as shown by the attention to the story of Pvt. Jessica Lynch. "It did seem like a lot of hype, but she was probably the only female prisoner of war who was injured and dramatically rescued. . . . I don't think she wanted to be singled out other than as an example of a young soldier" - Karpinski stresses the word soldier - "caught in an unlikely scenario and rescued." In her civilian life, Karpinski is a consultant who runs grueling executive training programs for those hoping to scale the corporate ladder. The courses, which put participants under various kinds of stress, are "not a lot of fun . . . but are a true test of the toughness of an individual's mettle." An avid golfer, Karpinski and her husband, George, make their home on the resort island of Hilton Head, S.C. When a fire heavily damaged the house in 2001, he arrived from the Mideast two weeks later - after the cleanup was almost finished, she says with spousal bemusement. Now, the couple keeps in touch by e-mail and satellite phone. In her limited free time, Karpinski reads. She just finished Leadership by former New York City Mayor Rudolph Giuliani. "No matter how you slice it, it's all about leadership. . . . If anyone tells you they're not afraid, they're lying. Everybody is afraid, everybody is concerned, but they have confidence in their training and the commanders reinforce that." www.sptimes.com/2003/12/14/Worldandnation/Her_job__Lock_up_Iraq.shtml ------------------------------------------------------------------------------------------------------------------ Torture At Abu Ghraib May 3, 2004 Seymour M. Hersh /The New Yorker America is faced with the horrifying fact that US soldiers brutalized and sexually humiliated imprisoned Iraqis. The question remains: How far up the chain of command does the responsibility go? http://www.newyorker.com/fact/content/?040510fa_fact "A year ago I did give the speech from the carrier saying we had achieved an important objective, accomplished a mission, which was the removal of Saddam Hussein. And as a result, there are no longer torture chambers or rape rooms or mass graves in Iraq." -- George W. Bush (April 30, 2004) Torture At Abu Ghraib Seymour M. Hersh / The New Yorker (May 10, 2004) -- Last June, Janis Karpinski, an Army reserve brigadier general, was named commander of the 800th Military Police Brigade and put in charge of military prisons in Iraq. General Karpinski, the only female commander in the war zone, was an experienced operations and intelligence officer who had served with the Special Forces and in the 1991 Gulf War, but she had never run a prison system. Now she was in charge of three large jails, eight battalions, and thirty-four hundred Army reservists, most of whom, like her, had no training in handling prisoners. General Karpinski, who had wanted to be a soldier since she was five, is a business consultant in civilian life, and was enthusiastic about her new job. In an interview last December with the St. Petersburg Times, she said that, for many of the Iraqi inmates at Abu Ghraib, "living conditions now are better in prison than at home. At one point we were concerned that they wouldn't want to leave." A month later, General Karpinski was formally admonished and quietly suspended, and a major investigation into the Army's prison system, authorized by Lieutenant General Ricardo S. Sanchez, the senior commander in Iraq, was under way. A fifty-three-page report, obtained by The New Yorker, written by Major General Antonio M. Taguba and not meant for public release, was completed in late February. Its conclusions about the institutional failures of the Army prison system were devastating. Specifically, Taguba found that between October and December of 2003 there were numerous instances of "sadistic, blatant, and wanton criminal abuses" at Abu Ghraib. This systematic and illegal abuse of detainees, Taguba reported, was perpetrated by soldiers of the 372nd Military Police Company, and also by members of the American intelligence community... See entire article at: http://www.newyorker.com/fact/content/?040510fa_fact ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8574 From: James M. Atkinson Date: Tue May 4, 2004 11:14pm Subject: Report reveals scope of wiretaps Posted on Sun, May. 02, 2004 Report reveals scope of wiretaps The FBI's probe in Phila. uncovered more than 5,000 of what the U.S. considers to be incriminating discussions. By Jacqueline Soteropoulos and Emilie Lounsberry Inquirer Staff Writers The FBI secretly recorded what a federal report described as more than 5,000 "incriminating intercepts" during two years of wiretapping and bugging in an investigation into alleged corruption in Philadelphia. An "incriminating intercept" is defined as a discussion that could result in prosecution. The numbers come from a newly released federal wiretap report that provides an unusual glimpse into the potentially damaging evidence gathered from court-authorized electronic surveillance that centered mostly on lawyer Ronald A. White and Imam Shamsud-din Ali, the two key figures in the inquiry. The report, along with documents sent to people whose conversations were intercepted, show that wiretaps and bugs that started on Ali's home phone and later led to taps on phones of a City Council aide and a deputy in Mayor Street's office produced 2,994 such incriminating intercepts. Taps that started on White's office phone and led elsewhere resulted in an additional 2,233 "incriminating intercepts," according to the report, which listed racketeering as the offense under investigation. The annual report, released Friday by the Administrative Office of U.S. Courts, suggests that the investigation has relied on what may be the most extensive use of electronic surveillance in the nation. The report, which covers nationwide wiretaps concluded in 2003, is based on information filed by judges and prosecutors. The Ali-related electronic surveillance, dating to June 2001, picked up conversations among 855 people, with the FBI listening to 36,668 conversations - an average of 94 a day, according to the report. The report shows that the Ali surveillance was kept in place for the longest time among any of the 578 bugs and taps authorized by federal judges nationwide. The number of "incriminating intercepts" also was substantial, though some investigations tallied even greater numbers. No charges have been filed in the Philadelphia inquiry, and federal prosecutors and the FBI have repeatedly declined to comment on any aspect of the investigation. The big question in political and legal circles these days is what, exactly, was picked up during more than two years of tapping. Some defense lawyers who have heard portions of tapes or had them summarized say they have found them less than damning. The report does not identify the investigations by name, but it is clear from reading the document, along with the wiretap notices, that the Ali and White wiretaps are among the 10 approved by federal judges in Philadelphia and listed in the 2003 report. The inquiry became public last October with the discovery of a bug in Mayor Street's City Hall office, though prosecutors later disclosed that no conversations were recorded during the two weeks it was in place. Philadelphia police found the hidden device in the ceiling during what they said was a routine sweep for electronic recording devices. Since then, the inquiry has reached into many corners of city government as the FBI and the IRS have traced the flow of money that drives city business and examined a range of contracts involving demolition, insurance, bonds, debt collection and work done by "disadvantaged" subcontractors. Along the way, federal prosecutors were required to notify people whose conversations were intercepted. One notification described the electronic surveillance that began when a federal judge, on June 13, 2001, authorized a wiretap at the home of Ali and his wife in Cheltenham Township. In July, the same judge permitted a new tap on Ali's cell phone. In February 2002, the electronic surveillance of Ali's home ended, but the judge allowed the FBI to tap the cell phone of Steven A. Vaughn, who is an aide to City Councilwoman Donna Reed Miller, and the office phone of John Christmas, a deputy chief of staff to Street. The judge also allowed the FBI to place a bug at Ali's business, Keystone Information and Financial Services. That investigation had its origins in a 2000 FBI probe of an alleged multimillion-dollar cocaine-distribution network in North Philadelphia. But the inquiry turned into a corruption investigation as the FBI later heard Ali talk with city officials and politicians about work he hoped to obtain. The document lists the offense in the Ali-related surveillance as narcotics. According to the report, the surveillance cost $235,956, mostly for the investigative staffing needed to monitor the intercepts. According to another notification to those picked up on taps, the judge, on Jan. 29, 2003, approved a wiretap at White's Center City law office and on his cell phone. In June, the judge allowed the FBI to add a tap on the office phone of then-City Treasurer Corey Kemp. In July, agents were allowed to place a bug in White's office. And in September, they won approval to place a bug in the mayor's office, as well as tap the mobile phone of James Tyrrell, an official at Philadelphia International Airport. In all, FBI agents listened in on conversations involving White for a 240-day period, monitoring verbal exchanges involving 281 people. Out of those 26,391 conversations, federal authorities deemed 2,233 exchanges as incriminating. The cost was $43,000, including paying for the staff who monitored the recording devices. The nationwide wiretap report includes tallies only for investigations that have either led to charges or are no longer secret. -------------------------------------------------------------------------------- Contact staff writer Emilie Lounsberry at 215-854-4828 or elounsberry@p.... ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8575 From: kondrak Date: Wed May 5, 2004 4:36am Subject: FBI's probe in Phila- Report reveals scope of wiretaps > >Report reveals scope of wiretaps > >The FBI's probe in Phila. uncovered more than 5,000 of what the U.S. >considers to be incriminating discussions. > >By Jacqueline Soteropoulos and Emilie Lounsberry >Inquirer Staff Writers > >The FBI secretly recorded what a federal report described as more than >5,000 >"incriminating intercepts" during two years of wiretapping and bugging >in an >investigation into alleged corruption in Philadelphia. > >An "incriminating intercept" is defined as a discussion that could >result in >prosecution. > >The numbers come from a newly released federal wiretap report that >provides >an unusual glimpse into the potentially damaging evidence gathered from >court-authorized electronic surveillance that centered mostly on lawyer >Ronald A. >White and Imam Shamsud-din Ali, the two key figures in the inquiry. > >The report, along with documents sent to people whose conversations were >intercepted, show that wiretaps and bugs that started on Ali's home >phone and >later led to taps on phones of a City Council aide and a deputy in Mayor >Street's >office produced 2,994 such incriminating intercepts. > >Taps that started on White's office phone and led elsewhere resulted in >an >additional 2,233 "incriminating intercepts," according to the report, >which >listed racketeering as the offense under investigation. > >The annual report, released Friday by the Administrative Office of U.S. >Courts, suggests that the investigation has relied on what may be the >most >extensive use of electronic surveillance in the nation. > >The report, which covers nationwide wiretaps concluded in 2003, is based >on >information filed by judges and prosecutors. > >The Ali-related electronic surveillance, dating to June 2001, picked up >conversations among 855 people, with the FBI listening to 36,668 >conversations - an >average of 94 a day, according to the report. > >The report shows that the Ali surveillance was kept in place for the >longest >time among any of the 578 bugs and taps authorized by federal judges >nationwide. The number of "incriminating intercepts" also was >substantial, though some >investigations tallied even greater numbers. > >No charges have been filed in the Philadelphia inquiry, and federal >prosecutors and the FBI have repeatedly declined to comment on any >aspect of the >investigation. > >The big question in political and legal circles these days is what, >exactly, >was picked up during more than two years of tapping. > >Some defense lawyers who have heard portions of tapes or had them >summarized >say they have found them less than damning. > >The report does not identify the investigations by name, but it is clear >from >reading the document, along with the wiretap notices, that the Ali and >White >wiretaps are among the 10 approved by federal judges in Philadelphia and >listed in the 2003 report. > >The inquiry became public last October with the discovery of a bug in >Mayor >Street's City Hall office, though prosecutors later disclosed that no >conversations were recorded during the two weeks it was in place. > >Philadelphia police found the hidden device in the ceiling during what >they >said was a routine sweep for electronic recording devices. > >Since then, the inquiry has reached into many corners of city government >as >the FBI and the IRS have traced the flow of money that drives city >business and >examined a range of contracts involving demolition, insurance, bonds, >debt >collection and work done by "disadvantaged" subcontractors. > >Along the way, federal prosecutors were required to notify people whose >conversations were intercepted. > >One notification described the electronic surveillance that began when a >federal judge, on June 13, 2001, authorized a wiretap at the home of Ali >and his >wife in Cheltenham Township. In July, the same judge permitted a new tap >on >Ali's cell phone. > >In February 2002, the electronic surveillance of Ali's home ended, but >the >judge allowed the FBI to tap the cell phone of Steven A. Vaughn, who is >an aide >to City Councilwoman Donna Reed Miller, and the office phone of John >Christmas, a deputy chief of staff to Street. The judge also allowed the >FBI to place a >bug at Ali's business, Keystone Information and Financial Services. > >That investigation had its origins in a 2000 FBI probe of an alleged >multimillion-dollar cocaine-distribution network in North Philadelphia. > >But the inquiry turned into a corruption investigation as the FBI later >heard >Ali talk with city officials and politicians about work he hoped to >obtain. > >The document lists the offense in the Ali-related surveillance as >narcotics. >According to the report, the surveillance cost $235,956, mostly for the >investigative staffing needed to monitor the intercepts. > >According to another notification to those picked up on taps, the judge, >on >Jan. 29, 2003, approved a wiretap at White's Center City law office and >on his >cell phone. > >In June, the judge allowed the FBI to add a tap on the office phone of >then-City Treasurer Corey Kemp. In July, agents were allowed to place a >bug in >White's office. > >And in September, they won approval to place a bug in the mayor's >office, as >well as tap the mobile phone of James Tyrrell, an official at >Philadelphia >International Airport. > >In all, FBI agents listened in on conversations involving White for a >240-day >period, monitoring verbal exchanges involving 281 people. > >Out of those 26,391 conversations, federal authorities deemed 2,233 >exchanges >as incriminating. > >The cost was $43,000, including paying for the staff who monitored the >recording devices. > >The nationwide wiretap report includes tallies only for investigations >that >have either led to charges or are no longer secret. > > >http://www.philly.com/mld/inquirer/news/local/states/pennsylvania/8567712.htm?1c 8576 From: kondrak Date: Wed May 5, 2004 4:39am Subject: Re: Report reveals scope of wiretaps We must of all got the same mailing, at the same time, mine follows immediately (already sent) sorry for the duplicious dupes of duplicates...;) At 00:14 5/5/2004, you wrote: >Posted on Sun, May. 02, 2004 > >Report reveals scope of wiretaps 8577 From: David Alexander Date: Wed May 5, 2004 5:06am Subject: RE: Their Mothers Must Be So Proud I can't believe that this behaviour was sanctioned. A blind eye turned, possibly. I trained as a military pilot and that included resistance to interrogation techniques. We were always taught that we (NATO) don't use physical techniques such as this because the prisoner will say what he thinks wants you hear just to make the pain and humiliation stop. You can't trust what you are told if you extract information this way. Psychological techniques, coupled with sleep deprivation and fatigue are the sure-fire winners every time. Most break in less than 36 hours under this regime. David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: 05 May 2004 05:09 To: TSCM-L Subject: [TSCM-L] Their Mothers Must Be So Proud Usually our troops do things that make us proud, sometime not... this is a case of the later. Funny how the MP's are going to take the fall, but that the Military Intelligence officers who were directing their efforts will never be held accountable. Curious that the Army tried (unsuccessfully) to keep classified the actual methods of torture and abuse they were using on the prisoners... methods that are forbidden under U.S. Law, and directly forbidden by the UCMJ. What is really sad is how the Army denied anything of this nature ever happened... until somebody gave copies of the incriminating photographs to the media. It doesn't help that Brigadier General Janis Karpinski has a history of supporting this kind of activity, and actually has received formal training in torture and interrogation, and has a history of working closely with FBI and CIA while assigned to a military intelligence group in the first Gulf War. Nor is it a good sign that she is actually an operations and intelligence officer who has attended CIA and DIA training, and that THIS is the first time she has ever run a prison. So why would the Army have an intelligence officer run a prison, staff it with other intelligence officers, who in turn torture, rape, and abuse the prisoners unless it was to exploit them and force intelligence from them. If this was a case of those being held in the prison actually committing criminal acts, the MP's alone would have involved in the prison. But in this case the prison was being run by Military Intelligence, the FBI, DIA, and CIA... human exploitation, torture, and abuse was the mission, period. Curious that THIS is the same prison that U.S. Citizens were being unlawfully detained at, and that the atrocities reported here are the same ones being reported out of Guantanamo Bay, and the Naval Brig in South Carolina, and others. Truly sad... but what else do you expect... some of the people involved are also counterintelligence agents who do TSCM for the U.S. Government. Their Mothers Must Be So Proud, -jma ---------------------------------------------------------------------------- -------------------------------------------------------------------------- 4 May 2004 Classifications: (U) Unclassified (S/NF) Secret, No Foreign (S) Secret Source: http://www.msnbc.msn.com/id/4894001/ U.S. Army report on Iraqi prisoner abuse Complete text of Article 15-6 Investigation of the 800th Military Police Brigade by Maj. Gen. Antonio M. Taguba Updated: 7:09 p.m. ET May 04, 2004 The following is the text of the Taguba report with only the names of the witnesses removed for the sake of privacy. The report was prepared by Maj. Gen. Antonio M. Taguba on alleged abuse of prisoners by members of the 800th Military Police Brigade at the Abu Ghraib Prison in Baghdad. It was ordered by Lt. Gen. Ricardo Sanchez, commander of Joint Task Force-7, the senior U.S. military official in Iraq, following persistent allegations of human rights abuses at the prison. The official name of the report is: ARTICLE 15-6 INVESTIGATION OF THE 800th MILITARY POLICE BRIGADE TABLE OF CONTENTS References .................................................................. 3 Background ............................................................... 6 Assessment of DoD Counter-Terrorism Interrogation and Detention Operations In Iraq (MG Miller's Assessment).................................. 8 IO Comments on MG Miller's Assessment........... 8 Report on Detention and Corrections In Iraq (MG Ryder's Report).................................... 9 IO Comments on MG Ryder's Report.................. 12 Preliminary Investigative Actions .................... 12 Findings and Recommendations Part One (Detainee Abuse). .............................. 15 Findings ................................................. 15 Recommendations ................................. 20 Part Two (Escapes and Accountability) ........ 22 Findings ................................................. 22 Recommendations. .............................. 31 Part Three (Command Climate, Etc...). ......... 34 Findings ............................................. ... 36 Recommendations ...... ........................ 44 Other Findings/Observations ........................... 49 Conclusion ................................................ ............ 50 Annexes .................................................................. 51 References 1. Geneva Convention Relative to the Treatment of Prisoners of War, 12 August 1949 2. Geneva Convention for the Amelioration of the Condition of the Wounded and Sick in the Armed Forces in the Field, 12 August 1949 3. Geneva Convention for the Amelioration of the Condition of the Wounded, Sick and Shipwrecked Members of Armed Forces at Sea, 12 August 1949 4. Geneva Convention Protocol Relative to the Status of Refugees, 1967 5. Geneva Convention Relative to the Status of Refugees, 1951 6. Geneva Convention for the Protection of War Victims, 12 August 1949 7. Geneva Convention Relative to the Protection of Civilian Persons in Time of War, 12 August 1949 8. DOD Directive 5100.69, "DOD Program for Prisoners of War and other Detainees," 27 December 1972 9. DOD Directive 5100.77 "DOD Law of War Program," 10 July 1979 10. STANAG No. 2044, Procedures for Dealing with Prisoners of War (PW) (Edition 5), 28 June 1994 11. STANAG No. 2033, Interrogation of Prisoners of War (PW) (Edition 6), 6 December 1994 12. AR 190-8, Enemy Prisoners of War, Retained Personnel, Civilian Internees, and Other Detainees, 1 October 1997 13. AR 190-47, The Army Corrections System, 15 August 1996 14. AR 190-14, Carrying of Firearms and Use of Force for Law Enforcement and Security Duties, 12 March 1993 15. AR 195-5, Evidence Procedures, 28 August 1992 16. AR 190-11, Physical Security of Arms, Ammunition and Explosives, 12 February 1998 17. AR 190-12, Military Police Working Dogs, 30 September 1993 18. AR 190-13, The Army Physical Security Program, 30 September 1993 19. AR 380-67, Personnel Security Program, 9 September 1988 20. AR 380-5, Department of the Army Information Security, 31 September 2000 21. AR 670-1, Wear and Appearance of Army Uniforms and Insignia, 5 September 2003 22. AR 190-40, Serious Incident Report, 30 November 1993 23. AR 15-6, Procedures for Investigating Officers and Boards of Officers, 11 May 1988 24. AR 27-10, Military Justice, 6 September 2002 25. AR 635-200, Enlisted Personnel, 1 November 2000 26. AR 600-8-24, Officer Transfers and Discharges, 29 June 2002 27. AR 500-5, Army Mobilization, 6 July 1996 28. AR 600-20, Army Command Policy, 13 May 2002 29. AR 623-105, Officer Evaluation Reports, 1 April 1998 30. AR 175-9, Contractors Accompanying the Force, 29 October 1999 31. FM 3-19.40, Military Police Internment/Resettlement Operations, 1 August 2001 32. FM 3-19.1, Military Police Operations, 22 March 2001 33. FM 3-19.4, Military Police Leaders' Handbook, 4 March 2002 34. FM 3-05.30, Psychological Operations, 19 June 2000 35. FM 33-1-1, Psychological Operations Techniques and Procedures, 5 May 1994 36. FM 34-52, Intelligence Interrogation, 28 September 1992 37. FM 19-15, Civil Disturbances, 25 November 1985 38. FM 3-0, Operations, 14 June 2001 39. FM 101-5, Staff Organizations and Functions, 23 May 1984 40. FM 3-19.30, Physical Security, 8 January 2001 41. FM 3-21.5, Drill and Ceremonies, 7 July 2003 42. ARTEP 19-546-30 MTP, Mission Training Plan for Military Police Battalion (IR) 43. ARTEP 19-667-30 MTP, Mission Training Plan for Military Police Guard Company 44. ARTEP 19-647-30 MTP, Mission Training Plan for Military Police Escort Guard Company 45. STP 19-95B1-SM, Soldier's Manual, MOS 95B, Military Police, Skill Level 1, 6 August 2002 46. STP 19-95C14-SM-TG, Soldier's Manual and Trainer's Guide for MOS 95C Internment/Resettlement Specialist, Skill Levels 1/2/3/4, 26 March 1999 47. STP 19-95C1-SM MOS 95C, Corrections Specialist, Skill Level 1, Soldier's Manual, 30 September 2003 48. STP 19-95C24-SM-TG MOS 95C, Corrections Specialist, Skill Levels 2/3/4, Soldier's Manual and Trainer's Guide, 30 September 2003 49. Assessment of DOD Counter-Terrorism Interrogation and Detention Operations in Iraq, (MG Geoffrey D. Miller, Commander JTF-GTMO, Guantanamo Bay, Cuba), 9 September 2003 50. Assessment of Detention and Corrections Operations in Iraq, (MG Donald J. Ryder, Provost Marshal General), 6 November 2003 51. CJTF-7 FRAGO #1108, Subject: includes- para 3.C.8 & 3.C.8.A.1, Assignment of 205 MI BDE CDR Responsibilities for the Baghdad Central Confinement Facility (BCCF), 19 November 2003 52. CJTF-7 FRAGO #749, Subject: Intelligence and Evidence-Led Detention Operations Relating to Detainees, 24 August 2003 53. 800th MP BDE FRAGO # 89, Subject: Rules of Engagement, 26 December 2003 54. CG CJTF-7 Memo: CJTF-7 Interrogation and Counter-Resistance Policy, 12 October 2003 55. CG CJTF-7 Memo: Dignity and Respect While Conducting Operations, 13 December 2003 56. Uniform Code of Military Justice and Manual for Courts Martial, 2002 Edition ARTICLE 15-6 INVESTIGATION OF THE 800th MILITARY POLICE BRIGADE BACKGROUND 1. (U) On 19 January 2004, Lieutenant General (LTG) Ricardo S. Sanchez, Commander, Combined Joint Task Force Seven (CJTF-7) requested that the Commander, US Central Command, appoint an Investigating Officer (IO) in the grade of Major General (MG) or above to investigate the conduct of operations within the 800th Military Police (MP) Brigade. LTG Sanchez requested an investigation of detention and internment operations by the Brigade from 1 November 2003 to present. LTG Sanchez cited recent reports of detainee abuse, escapes from confinement facilities, and accountability lapses, which indicated systemic problems within the brigade and suggested a lack of clear standards, proficiency, and leadership. LTG Sanchez requested a comprehensive and all-encompassing inquiry to make findings and recommendations concerning the fitness and performance of the 800th MP Brigade. (ANNEX 2) 2. (U) On 24 January 2003, the Chief of Staff of US Central Command (CENTCOM), MG R. Steven Whitcomb, on behalf of the CENTCOM Commander, directed that the Commander, Coalition Forces Land Component Command (CFLCC), LTG David D. McKiernan, conduct an investigation into the 800th MP Brigade's detention and internment operations from 1 November 2003 to present. CENTCOM directed that the investigation should inquire into all facts and circumstances surrounding recent reports of suspected detainee abuse in Iraq. It also directed that the investigation inquire into detainee escapes and accountability lapses as reported by CJTF-7, and to gain a more comprehensive and all-encompassing inquiry into the fitness and performance of the 800th MP Brigade. (ANNEX 3) 3. (U) On 31 January 2004, the Commander, CFLCC, appointed MG Antonio M. Taguba, Deputy Commanding General Support, CFLCC, to conduct this investigation. MG Taguba was directed to conduct an informal investigation under AR 15-6 into the 800th MP Brigade's detention and internment operations. Specifically, MG Taguba was tasked to: a. (U) Inquire into all the facts and circumstances surrounding recent allegations of detainee abuse, specifically allegations of maltreatment at the Abu Ghraib Prison (Baghdad Central Confinement Facility (BCCF)); b. (U) Inquire into detainee escapes and accountability lapses as reported by CJTF-7, specifically allegations concerning these events at the Abu Ghraib Prison; c. (U) Investigate the training, standards, employment, command policies, internal procedures, and command climate in the 800th MP Brigade, as appropriate; d. (U) Make specific findings of fact concerning all aspects of the investigation, and make any recommendations for corrective action, as appropriate. (ANNEX 4) 4. (U) LTG Sanchez's request to investigate the 800th MP Brigade followed the initiation of a criminal investigation by the US Army Criminal Investigation Command (USACIDC) into specific allegations of detainee abuse committed by members of the 372nd MP Company, 320th MP Battalion in Iraq. These units are part of the 800th MP Brigade. The Brigade is an Iraq Theater asset, TACON to CJTF-7, but OPCON to CFLCC at the time this investigation was initiated. In addition, CJTF-7 had several reports of detainee escapes from US/Coalition Confinement Facilities in Iraq over the past several months. These include Camp Bucca, Camp Ashraf, Abu Ghraib, and the High Value Detainee (HVD) Complex/Camp Cropper. The 800th MP Brigade operated these facilities. In addition, four Soldiers from the 320th MP Battalion had been formally charged under the Uniform Code of Military Justice (UCMJ) with detainee abuse in May 2003 at the Theater Internment Facility (TIF) at Camp Bucca, Iraq. (ANNEXES 5-18, 34 and 35) 5. (U) I began assembling my investigation team prior to the actual appointment by the CFLCC Commander. I assembled subject matter experts from the CFLCC Provost Marshal (PM) and the CFLCC Staff Judge Advocate (SJA). I selected COL Kinard J. La Fate, CFLCC Provost Marshal to be my Deputy for this investigation. I also contacted the Provost Marshal General of the Army, MG Donald J. Ryder, to enlist the support of MP subject matter experts in the areas of detention and internment operations. (ANNEXES 4 and 19) 6. (U) The Investigating Team also reviewed the Assessment of DoD Counter-Terrorism Interrogation and Detention Operations in Iraq conducted by MG Geoffrey D. Miller, Commander, Joint Task Force Guantanamo (JTF-GTMO). From 31 August to 9 September 2003, MG Miller led a team of personnel experienced in strategic interrogation to HQ, CJTF-7 and the Iraqi Survey Group (ISG) to review current Iraqi Theater ability to rapidly exploit internees for actionable intelligence. MG Miller's team focused on three areas: intelligence integration, synchronization, and fusion; interrogation operations; and detention operations. MG Miller's team used JTF-GTMO procedures and interrogation authorities as baselines. (ANNEX 20) 7. (U) The Investigating Team began its inquiry with an in-depth analysis of the Report on Detention and Corrections in Iraq, dated 5 November 2003, conducted by MG Ryder and a team of military police, legal, medical, and automation experts. The CJTF-7 Commander, LTG Sanchez, had previously requested a team of subject matter experts to assess, and make specific recommendations concerning detention and corrections operations. From 13 October to 6 November 2003, MG Ryder personally led this assessment/assistance team in Iraq. (ANNEX 19) ASSESSMENT OF DoD COUNTER-TERRORISM INTERROGATION AND DETENTION OPERATIONS IN IRAQ (MG MILLER'S ASSESSMENT) 1. (S/NF) The principal focus of MG Miller's team was on the strategic interrogation of detainees/internees in Iraq. Among its conclusions in its Executive Summary were that CJTF-7 did not have authorities and procedures in place to affect a unified strategy to detain, interrogate, and report information from detainees/internees in Iraq. The Executive Summary also stated that detention operations must act as an enabler for interrogation. (ANNEX 20) 2. (S/NF) With respect to interrogation, MG Miller's Team recommended that CJTF-7 dedicate and train a detention guard force subordinate to the Joint Interrogation Debriefing Center (JIDC) Commander that "sets the conditions for the successful interrogation and exploitation of internees/detainees." Regarding Detention Operations, MG Miller's team stated that the function of Detention Operations is to provide a safe, secure, and humane environment that supports the expeditious collection of intelligence. However, it also stated "it is essential that the guard force be actively engaged in setting the conditions for successful exploitation of the internees." (ANNEX 20) 3. (S/NF) MG Miller's team also concluded that Joint Strategic Interrogation Operations (within CJTF-7) are hampered by lack of active control of the internees within the detention environment. The Miller Team also stated that establishment of the Theater Joint Interrogation and Detention Center (JIDC) at Abu Ghraib (BCCF) will consolidate both detention and strategic interrogation operations and result in synergy between MP and MI resources and an integrated, synchronized, and focused strategic interrogation effort. (ANNEX 20) 4. (S/NF) MG Miller's team also observed that the application of emerging strategic interrogation strategies and techniques contain new approaches and operational art. The Miller Team also concluded that a legal review and recommendations on internee interrogation operations by a dedicated Command Judge Advocate is required to maximize interrogation effectiveness. (ANNEX 20) IO COMMENTS ON MG MILLER'S ASSESSMENT 1. (S/NF) MG Miller's team recognized that they were using JTF-GTMO operational procedures and interrogation authorities as baselines for its observations and recommendations. There is a strong argument that the intelligence value of detainees held at JTF-Guantanamo (GTMO) is different than that of the detainees/internees held at Abu Ghraib (BCCF) and other detention facilities in Iraq. Currently, there are a large number of Iraqi criminals held at Abu Ghraib (BCCF). These are not believed to be international terrorists or members of Al Qaida, Anser Al Islam, Taliban, and other international terrorist organizations. (ANNEX 20) 2. (S/NF) The recommendations of MG Miller's team that the "guard force" be actively engaged in setting the conditions for successful exploitation of the internees would appear to be in conflict with the recommendations of MG Ryder's Team and AR 190-8 that military police "do not participate in military intelligence supervised interrogation sessions." The Ryder Report concluded that the OEF template whereby military police actively set the favorable conditions for subsequent interviews runs counter to the smooth operation of a detention facility. (ANNEX 20) REPORT ON DETENTION AND CORRECTIONS IN IRAQ (MG RYDER'S REPORT) 1. (U) MG Ryder and his assessment team conducted a comprehensive review of the entire detainee and corrections system in Iraq and provided recommendations addressing each of the following areas as requested by the Commander CJTF-7: a. (U) Detainee and corrections system management b. (U) Detainee management, including detainee movement, segregation, and accountability c. (U) Means of command and control of the detention and corrections system d. (U) Integration of military detention and corrections with the Coalition Provisional Authority (CPA) and adequacy of plans for transition to an Iraqi-run corrections system e. (U) Detainee medical care and health management f. (U) Detention facilities that meet required health, hygiene, and sanitation standards g. (U) Court integration and docket management for criminal detainees h. (U) Detainee legal processing i. (U) Detainee databases and records, including integration with law enforcement and court databases (ANNEX 19) 2. (U) Many of the findings and recommendations of MG Ryder's team are beyond the scope of this investigation. However, several important findings are clearly relevant to this inquiry and are summarized below (emphasis is added in certain areas): A. (U) Detainee Management (including movement, segregation, and accountability) 1. (U) There is a wide variance in standards and approaches at the various detention facilities. Several Division/Brigade collection points and US monitored Iraqi prisons had flawed or insufficiently detailed use of force and other standing operating procedures or policies (e.g. weapons in the facility, improper restraint techniques, detainee management, etc.) Though, there were no military police units purposely applying inappropriate confinement practices. (ANNEX 19) 2. (U) Currently, due to lack of adequate Iraqi facilities, Iraqi criminals (generally Iraqi-on-Iraqi crimes) are detained with security internees (generally Iraqi-on-Coalition offenses) and EPWs in the same facilities, though segregated in different cells/compounds. (ANNEX 19) 3. (U) The management of multiple disparate groups of detained people in a single location by members of the same unit invites confusion about handling, processing, and treatment, and typically facilitates the transfer of information between different categories of detainees. (ANNEX 19) 4. (U) The 800th MP (I/R) units did not receive Internment/Resettlement (I/R) and corrections specific training during their mobilization period. Corrections training is only on the METL of two MP (I/R) Confinement Battalions throughout the Army, one currently serving in Afghanistan, and elements of the other are at Camp Arifjan, Kuwait. MP units supporting JTF-GTMO received ten days of training in detention facility operations, to include two days of unarmed self-defense, training in interpersonal communication skills, forced cell moves, and correctional officer safety. (ANNEX 19) B. (U) Means of Command and Control of the Detention and Corrections System 1. (U) The 800th MP Brigade was originally task organized with eight MP(I/R) Battalions consisting of both MP Guard and Combat Support companies. Due to force rotation plans, the 800th redeployed two Battalion HHCs in December 2003, the 115th MP Battalion and the 324th MP Battalion. In December 2003, the 400th MP Battalion was relieved of its mission and redeployed in January 2004. The 724thMP Battalion redeployed on 11 February 2004 and the remainder is scheduled to redeploy in March and April 2004. They are the 310th MP Battalion, 320th MP Battalion, 530th MP Battalion, and 744th MP Battalion. The units that remain are generally understrength, as Reserve Component units do not have an individual personnel replacement system to mitigate medical losses or the departure of individual Soldiers that have reached 24 months of Federal active duty in a five-year period. (ANNEX 19) 2. (U) The 800thMP Brigade (I/R) is currently a CFLCC asset, TACON to CJTF-7 to conduct Internment/Resettlement (I/R) operations in Iraq. All detention operations are conducted in the CJTF-7 AO; Camps Ganci, Vigilant, Bucca, TSP Whitford, and a separate High Value Detention (HVD) site. (ANNEX 19) 3. (U) The 800th MP Brigade has experienced challenges adapting its task organizational structure, training, and equipment resources from a unit designed to conduct standard EPW operations in the COMMZ (Kuwait). Further, the doctrinally trained MP Soldier-to-detainee population ratio and facility layout templates are predicated on a compliant, self-disciplining EPW population, and not criminals or high-risk security internees. (ANNEX 19) 4. (U) EPWs and Civilian Internees should receive the full protections of the Geneva Conventions, unless the denial of these protections is due to specifically articulated military necessity (e.g., no visitation to preclude the direction of insurgency operations). (ANNEXES 19 and 24) 5. (U) AR 190-8, Enemy Prisoners of War, Retained Personnel, Civilian Internees, and other Detainees, FM 3-19.40, Military Police Internment and Resettlement Operations, and FM 34-52, Intelligence Interrogations, require military police to provide an area for intelligence collection efforts within EPW facilities. Military Police, though adept at passive collection of intelligence within a facility, do not participate in Military Intelligence supervised interrogation sessions. Recent intelligence collection in support of Operation Enduring Freedom posited a template whereby military police actively set favorable conditions for subsequent interviews. Such actions generally run counter to the smooth operation of a detention facility, attempting to maintain its population in a compliant and docile state. The 800th MP Brigade has not been directed to change its facility procedures to set the conditions for MI interrogations, nor participate in those interrogations. (ANNEXES 19 and 21-23) 6. MG Ryder's Report also made the following, inter alia, near-term and mid-term recommendations regarding the command and control of detainees: a. (U) Align the release process for security internees with DoD Policy. The process of screening security internees should include intelligence findings, interrogation results, and current threat assessment. b. (U) Determine the scope of intelligence collection that will occur at Camp Vigilant. Refurbish the Northeast Compound to separate the screening operation from the Iraqi run Baghdad Central Correctional Facility. Establish procedures that define the role of military police Soldiers securing the compound, clearly separating the actions of the guards from those of the military intelligence personnel. c. (U) Consolidate all Security Internee Operations, except the MEK security mission, under a single Military Police Brigade Headquarters for OIF 2. d. (U) Insist that all units identified to rotate into the Iraqi Theater of Operations (ITO) to conduct internment and confinement operations in support of OIF 2 be organic to CJTF-7. (ANNEX 19) IO COMMENTS REGARDING MG RYDER'S REPORT 1. (U) The objective of MG Ryder's Team was to observe detention and prison operations, identify potential systemic and human rights issues, and provide near-term, mid-term, and long-term recommendations to improve CJTF-7 operations and transition of the Iraqi prison system from US military control/oversight to the Coalition Provisional Authority and eventually to the Iraqi Government. The Findings and Recommendations of MG Ryder's Team are thorough and precise and should be implemented immediately. (ANNEX 19) 2. (U) Unfortunately, many of the systemic problems that surfaced during MG Ryder's Team's assessment are the very same issues that are the subject of this investigation. In fact, many of the abuses suffered by detainees occurred during, or near to, the time of that assessment. As will be pointed out in detail in subsequent portions of this report, I disagree with the conclusion of MG Ryder's Team in one critical aspect, that being its conclusion that the 800th MP Brigade had not been asked to change its facility procedures to set the conditions for MI interviews. While clearly the 800th MP Brigade and its commanders were not tasked to set conditions for detainees for subsequent MI interrogations, it is obvious from a review of comprehensive CID interviews of suspects and witnesses that this was done at lower levels. (ANNEX 19) 3. (U) I concur fully with MG Ryder's conclusion regarding the effect of AR 190-8. Military Police, though adept at passive collection of intelligence within a facility, should not participate in Military Intelligence supervised interrogation sessions. Moreover, Military Police should not be involved with setting "favorable conditions" for subsequent interviews. These actions, as will be outlined in this investigation, clearly run counter to the smooth operation of a detention facility. (ANNEX 19) PRELIMINARY INVESTIGATIVE ACTIONS 1. (U) Following our review of MG Ryder's Report and MG Miller's Report, my investigation team immediately began an in-depth review of all available documents regarding the 800th MP Brigade. We reviewed in detail the voluminous CID investigation regarding alleged detainee abuses at detention facilities in Iraq, particularly the Abu Ghraib (BCCF) Detention Facility. We analyzed approximately fifty witness statements from military police and military intelligence personnel, potential suspects, and detainees. We reviewed numerous photos and videos of actual detainee abuse taken by detention facility personnel, which are now in the custody and control of the US Army Criminal Investigation Command and the CJTF-7 prosecution team. The photos and videos are not contained in this investigation. We obtained copies of the 800th MP Brigade roster, rating chain, and assorted internal investigations and disciplinary actions involving that command for the past several months. (All ANNEXES Reviewed by Investigation Team) 2. (U) In addition to military police and legal officers from the CFLCC PMO and SJA Offices we also obtained the services of two individuals who are experts in military police detention practices and training. These were LTC Timothy Weathersbee, Commander, 705th MP Battalion, United States Disciplinary Barracks, Fort Leavenworth, and SFC Edward Baldwin, Senior Corrections Advisor, US Army Military Police School, Fort Leonard Wood. I also requested and received the services of Col (Dr) Henry Nelson, a trained US Air Force psychiatrist assigned to assist my investigation team. (ANNEX 4) 3. (U) In addition to MG Ryder's and MG Miller's Reports, the team reviewed numerous reference materials including the 12 October 2003 CJTF-7 Interrogation and Counter-Resistance Policy, the AR 15-6 Investigation on Riot and Shootings at Abu Ghraib on 24 November 2003, the 205thMI Brigade's Interrogation Rules of Engagement (IROE), facility staff logs/journals and numerous records of AR 15-6 investigations and Serious Incident Reports (SIRs) on detainee escapes/shootings and disciplinary matters from the 800th MP Brigade. (ANNEXES 5-20, 37, 93, and 94) 4. (U) On 2 February 2004, I took my team to Baghdad for a one-day inspection of the Abu Ghraib Prison (BCCF) and the High Value Detainee (HVD) Complex in order to become familiar with those facilities. We also met with COL Jerry Mocello, Commander, 3rd MP Criminal Investigation Group (CID), COL Dave Quantock, Commander, 16th MP Brigade, COL Dave Phillips, Commander, 89th MP Brigade, and COL Ed Sannwaldt, CJTF-7 Provost Marshal. On 7 February 2004, the team visited the Camp Bucca Detention Facility to familiarize itself with the facility and operating structure. In addition, on 6 and 7 February 2004, at Camp Doha, Kuwait, we conducted extensive training sessions on approved detention practices. We continued our preparation by reviewing the ongoing CID investigation and were briefed by the Special Agent in Charge, CW2 Paul Arthur. We refreshed ourselves on the applicable reference materials within each team member's area of expertise, and practiced investigative techniques. I met with the team on numerous occasions to finalize appropriate witness lists, review existing witness statements, arrange logistics, and collect potential evidence. We also coordinated with CJTF-7 to arrange witness attendance, force protection measures, and general logistics for the team's move to Baghdad on 8 February 2004. (ANNEXES 4 and 25) 5. (U) At the same time, due to the Transfer of Authority on 1 February 2004 between III Corps and V Corps, and the upcoming demobilization of the 800th MP Brigade Command, I directed that several critical witnesses who were preparing to leave the theater remain at Camp Arifjan, Kuwait until they could be interviewed (ANNEX 29). My team deployed to Baghdad on 8 February 2004 and conducted a series of interviews with a variety of witnesses (ANNEX 30). We returned to Camp Doha, Kuwait on 13 February 2004. On 14 and 15 February we interviewed a number of witnesses from the 800th MP Brigade. On 17 February we returned to Camp Bucca, Iraq to complete interviews of witnesses at that location. From 18 February thru 28 February we collected documents, compiled references, did follow-up interviews, and completed a detailed analysis of the volumes of materials accumulated throughout our investigation. On 29 February we finalized our executive summary and out-briefing slides. On 9 March we submitted the AR 15-6 written report with findings and recommendations to the CFLCC Deputy SJA, LTC Mark Johnson, for a legal sufficiency review. The out-brief to the appointing authority, LTG McKiernan, took place on 3 March 2004. (ANNEXES 26 and 45-91) FINDINGS AND RECOMMENDATIONS (PART ONE) (U) The investigation should inquire into all of the facts and circumstances surrounding recent allegations of detainee abuse, specifically, allegations of maltreatment at the Abu Ghraib Prison (Baghdad Central Confinement Facility). 1. (U) The US Army Criminal Investigation Command (CID), led by COL Jerry Mocello, and a team of highly trained professional agents have done a superb job of investigating several complex and extremely disturbing incidents of detainee abuse at the Abu Ghraib Prison. They conducted over 50 interviews of witnesses, potential criminal suspects, and detainees. They also uncovered numerous photos and videos portraying in graphic detail detainee abuse by Military Police personnel on numerous occasions from October to December 2003. Several potential suspects rendered full and complete confessions regarding their personal involvement and the involvement of fellow Soldiers in this abuse. Several potential suspects invoked their rights under Article 31 of the Uniform Code of Military Justice (UCMJ) and the 5th Amendment of the U.S. Constitution. (ANNEX 25) 2. (U) In addition to a comprehensive and exhaustive review of all of these statements and documentary evidence, we also interviewed numerous officers, NCOs, and junior enlisted Soldiers in the 800th MP Brigade, as well as members of the 205th Military Intelligence Brigade working at the prison. We did not believe it was necessary to re-interview all the numerous witnesses who had previously provided comprehensive statements to CID, and I have adopted those statements for the purposes of this investigation. (ANNEXES 26, 34, 35, and 45-91) REGARDING PART ONE OF THE INVESTIGATION, I MAKE THE FOLLOWING SPECIFIC FINDINGS OF FACT: 1. (U) That Forward Operating Base (FOB) Abu Ghraib (BCCF) provides security of both criminal and security detainees at the Baghdad Central Correctional Facility, facilitates the conducting of interrogations for CJTF-7, supports other CPA operations at the prison, and enhances the force protection/quality of life of Soldiers assigned in order to ensure the success of ongoing operations to secure a free Iraq. (ANNEX 31) 2. (U) That the Commander, 205th Military Intelligence Brigade, was designated by CJTF-7 as the Commander of FOB Abu Ghraib (BCCF) effective 19 November 2003. That the 205th MI Brigade conducts operational and strategic interrogations for CJTF-7. That from 19 November 2003 until Transfer of Authority (TOA) on 6 February 2004, COL Thomas M. Pappas was the Commander of the 205th MI Brigade and the Commander of FOB Abu Ghraib (BCCF). (ANNEX 31) 3. (U) That the 320th Military Police Battalion of the 800th MP Brigade is responsible for the Guard Force at Camp Ganci, Camp Vigilant, & Cellblock 1 of FOB Abu Ghraib (BCCF). That from February 2003 to until he was suspended from his duties on 17 January 2004, LTC Jerry Phillabaum served as the Battalion Commander of the 320th MP Battalion. That from December 2002 until he was suspended from his duties, on 17 January 2004, CPT Donald Reese served as the Company Commander of the 372ndMP Company, which was in charge of guarding detainees at FOB Abu Ghraib. I further find that both the 320th MP Battalion and the 372ndMP Company were located within the confines of FOB Abu Ghraib. (ANNEXES 32 and 45) 4. (U) That from July of 2003 to the present, BG Janis L. Karpinski was the Commander of the 800th MP Brigade. (ANNEX 45) 5. (S) That between October and December 2003, at the Abu Ghraib Confinement Facility (BCCF), numerous incidents of sadistic, blatant, and wanton criminal abuses were inflicted on several detainees. This systemic and illegal abuse of detainees was intentionally perpetrated by several members of the military police guard force (372nd Military Police Company, 320thMilitary Police Battalion, 800th MP Brigade), in Tier (section) 1-A of the Abu Ghraib Prison (BCCF). The allegations of abuse were substantiated by detailed witness statements (ANNEX 26) and the discovery of extremely graphic photographic evidence. Due to the extremely sensitive nature of these photographs and videos, the ongoing CID investigation, and the potential for the criminal prosecution of several suspects, the photographic evidence is not included in the body of my investigation. The pictures and videos are available from the Criminal Investigative Command and the CTJF-7 prosecution team. In addition to the aforementioned crimes, there were also abuses committed by members of the 325th MI Battalion, 205th MI Brigade, and Joint Interrogation and Debriefing Center (JIDC). Specifically, on 24 November 2003, SPC Luciana Spencer, 205th MI Brigade, sought to degrade a detainee by having him strip and returned to cell naked. (ANNEXES 26 and 53) 6. (S) I find that the intentional abuse of detainees by military police personnel included the following acts: a. (S) Punching, slapping, and kicking detainees; jumping on their naked feet; b. (S) Videotaping and photographing naked male and female detainees; c. (S) Forcibly arranging detainees in various sexually explicit positions for photographing; d. (S) Forcing detainees to remove their clothing and keeping them naked for several days at a time; e. (S) Forcing naked male detainees to wear women's underwear; f. (S) Forcing groups of male detainees to masturbate themselves while being photographed and videotaped; g. (S) Arranging naked male detainees in a pile and then jumping on them; h. (S) Positioning a naked detainee on a MRE Box, with a sandbag on his head, and attaching wires to his fingers, toes, and penis to simulate electric torture; i. (S) Writing "I am a Rapest" (sic) on the leg of a detainee alleged to have forcibly raped a 15-year old fellow detainee, and then photographing him naked; j. (S) Placing a dog chain or strap around a naked detainee's neck and having a female Soldier pose for a picture; k. (S) A male MP guard having sex with a female detainee; l. (S) Using military working dogs (without muzzles) to intimidate and frighten detainees, and in at least one case biting and severely injuring a detainee; m. (S) Taking photographs of dead Iraqi detainees. (ANNEXES 25 and 26) 7.(U) These findings are amply supported by written confessions provided by several of the suspects, written statements provided by detainees, and witness statements. In reaching my findings, I have carefully considered the pre-existing statements of the following witnesses and suspects (ANNEX 26): a. (U) SPC Jeremy Sivits, 372nd MP Company - Suspect b. (U) SPC Sabrina Harman, 372nd MP Company - Suspect c. (U) SGT Javal S. Davis, 372nd MP Company - Suspect c. (U) PFC Lynndie R. England, 372nd MP Company - Suspect d. (U) Adel Nakhla, Civilian Translator, Titan Corp., Assigned to the 205th MI Brigade- Suspect (Names deleted) 8. (U) In addition, several detainees also described the following acts of abuse, which under the circumstances, I find credible based on the clarity of their statements and supporting evidence provided by other witnesses (ANNEX 26): a. (U) Breaking chemical lights and pouring the phosphoric liquid on detainees; b. (U) Threatening detainees with a charged 9mm pistol; c. (U) Pouring cold water on naked detainees; d. (U) Beating detainees with a broom handle and a chair; e. (U) Threatening male detainees with rape; f. (U) Allowing a military police guard to stitch the wound of a detainee who was injured after being slammed against the wall in his cell; g. (U) Sodomizing a detainee with a chemical light and perhaps a broom stick. h. (U) Using military working dogs to frighten and intimidate detainees with threats of attack, and in one instance actually biting a detainee. 9. (U) I have carefully considered the statements provided by the following detainees, which under the circumstances I find credible based on the clarity of their statements and supporting evidence provided by other witnesses: a. (U) Amjed Isail Waleed, Detainee # 151365 b. (U) Hiadar Saber Abed Miktub-Aboodi, Detainee # 13077 c. (U) Huessin Mohssein Al-Zayiadi, Detainee # 19446 d. (U) Kasim Mehaddi Hilas, Detainee # 151108 e. (U) Mohanded Juma Juma (sic), Detainee # 152307 f. (U) Mustafa Jassim Mustafa, Detainee # 150542 g. (U) Shalan Said Alsharoni, Detainee, # 150422 h. (U) Abd Alwhab Youss, Detainee # 150425 i. (U) Asad Hamza Hanfosh, Detainee # 152529 j. (U) Nori Samir Gunbar Al-Yasseri, Detainee # 7787 k. (U) Thaar Salman Dawod, Detainee # 150427 l. (U) Ameen Sa'eed Al-Sheikh, Detainee # 151362 m. (U) Abdou Hussain Saad Faleh, Detainee # 18470 (ANNEX 26) 10. (U) I find that contrary to the provision of AR 190-8, and the findings found in MG Ryder's Report, Military Intelligence (MI) interrogators and Other US Government Agency's (OGA) interrogators actively requested that MP guards set physical and mental conditions for favorable interrogation of witnesses. Contrary to the findings of MG Ryder's Report, I find that personnel assigned to the 372ndMP Company, 800th MP Brigade were directed to change facility procedures to "set the conditions" for MI interrogations. I find no direct evidence that MP personnel actually participated in those MI interrogations. (ANNEXES 19, 21, 25, and 26). 11. (U) I reach this finding based on the actual proven abuse that I find was inflicted on detainees and by the following witness statements. (ANNEXES 25 and 26): a. (U) SPC Sabrina Harman, 372nd MP Company, stated in her sworn statement regarding the incident where a detainee was placed on a box with wires attached to his fingers, toes, and penis, "that her job was to keep detainees awake." She stated that MI was talking to CPL Grainer. She stated: "MI wanted to get them to talk. It is Grainer and Frederick's job to do things for MI and OGA to get these people to talk." b. (U) SGT Javal S. Davis, 372nd MP Company, stated in his sworn statement as follows: "I witnessed prisoners in the MI hold section, wing 1A being made to do various things that I would question morally. In Wing 1A we were told that they had different rules and different SOP for treatment. I never saw a set of rules or SOP for that section just word of mouth. The Soldier in charge of 1A was Corporal Granier. He stated that the Agents and MI Soldiers would ask him to do things, but nothing was ever in writing he would complain (sic)." When asked why the rules in 1A/1B were different than the rest of the wings, SGT Davis stated: "The rest of the wings are regular prisoners and 1A/B are Military Intelligence (MI) holds." When asked why he did not inform his chain of command about this abuse, SGT Davis stated: " Because I assumed that if they were doing things out of the ordinary or outside the guidelines, someone would have said something. Also the wing belongs to MI and it appeared MI personnel approved of the abuse." SGT Davis also stated that he had heard MI insinuate to the guards to abuse the inmates. When asked what MI said he stated: "Loosen this guy up for us." Make sure he has abad night." "Make sure he gets the treatment." He claimed these comments were made to CPL Granier and SSG Frederick. Finally, SGT Davis stated that (sic): "the MI staffs to my understanding have been giving Granier compliments on the way he has been handling the MI holds. Example being statements like, "Good job, they're breaking down real fast. They answer every question. They're giving out good information, Finally, and Keep up the good work . Stuff like that." c. (U) SPC Jason Kennel, 372nd MP Company, was asked if he were present when any detainees were abused. He stated: "I saw them nude, but MI would tell us to take away their mattresses, sheets, and clothes." He could not recall who in MI had instructed him to do this, but commented that, "if they wanted me to do that they needed to give me paperwork." He was later informed that "we could not do anything to embarrass the prisoners." d. (U) Mr. Adel L. Nakhla, a US civilian contract translator was questioned about several detainees accused of rape. He observed (sic): "They (detainees) were all naked, a bunch of people from MI, the MP were there that night and the inmates were ordered by SGT Granier and SGT Frederick ordered the guys while questioning them to admit what they did. They made them do strange exercises by sliding on their stomach, jump up and down, throw water on them and made them some wet, called them all kinds of names such as "gays" do they like to make love to guys, then they handcuffed their hands together and their legs with shackles and started to stack them on top of each other by insuring that the bottom guys penis will touch the guy on tops butt." e. (U) SPC Neil A Wallin, 109th Area Support Medical Battalion, a medic testified that: "Cell 1A was used to house high priority detainees and cell 1B was used to house the high risk or trouble making detainees. During my tour at the prison I observed that when the male detainees were first brought to the facility, some of them were made to wear female underwear, which I think was to somehow break them down." 12. (U) I find that prior to its deployment to Iraq for Operation Iraqi Freedom, the 320th MP Battalion and the 372nd MP Company had received no training in detention/internee operations. I also find that very little instruction or training was provided to MP personnel on the applicable rules of the Geneva Convention Relative to the Treatment of Prisoners of War, FM 27-10, AR 190-8, or FM 3-19.40. Moreover, I find that few, if any, copies of the Geneva Conventions were ever made available to MP personnel or detainees. (ANNEXES 21-24, 33, and multiple witness statements) 13.(U) Another obvious example of the Brigade Leadership not communicating with its Soldiers or ensuring their tactical proficiency concerns the incident of detainee abuse that occurred at Camp Bucca, Iraq, on May 12, 2003. Soldiers from the 223rd MP Company reported to the 800th MP Brigade Command at Camp Bucca, that four Military Police Soldiers from the 320th MP Battalion had abused a number of detainees during inprocessing at Camp Bucca. An extensive CID investigation determined that four soldiers from the 320th MP Battalion had kicked and beaten these detainees following a transport mission from Talil Air Base. (ANNEXES 34 and 35) 14. (U) Formal charges under the UCMJ were preferred against these Soldiers and an Article-32 Investigation conducted by LTC Gentry. He recommended a general court martial for the four accused, which BG Karpinski supported. Despite this documented abuse, there is no evidence that BG Karpinski ever attempted to remind 800th MP Soldiers of the requirements of the Geneva Conventions regarding detainee treatment or took any steps to ensure that such abuse was not repeated. Nor is there any evidence that LTC(P) Phillabaum, the commander of the Soldiers involved in the Camp Bucca abuse incident, took any initiative to ensure his Soldiers were properly trained regarding detainee treatment. (ANNEXES 35 and 62) RECOMMENDATIONS AS TO PART ONE OF THE INVESTIGATION: 1. (U) Immediately deploy to the Iraq Theater an integrated multi-discipline Mobile Training Team (MTT) comprised of subject matter experts in internment/resettlement operations, international and operational law, information technology, facility management, interrogation and intelligence gathering techniques, chaplains, Arab cultural awareness, and medical practices as it pertains to I/R activities. This team needs to oversee and conduct comprehensive training in all aspects of detainee and confinement operations. 2. (U) That all military police and military intelligence personnel involved in any aspect of detainee operations or interrogation operations in CJTF-7, and subordinate units, be immediately provided with training by an international/operational law attorney on the specific provisions of The Law of Land Warfare FM 27-10, specifically the Geneva Convention Relative to the Treatment of Prisoners of War, Enemy Prisoners of War, Retained Personnel, Civilian Internees, and Other Detainees, and AR 190-8. 3. (U) That a single commander in CJTF-7 be responsible for overall detainee operations throughout the Iraq Theater of Operations. I also recommend that the Provost Marshal General of the Army assign a minimum of two (2) subject matter experts, one officer and one NCO, to assist CJTF-7 in coordinating detainee operations. 4. (U) That detention facility commanders and interrogation facility commanders ensure that appropriate copies of the Geneva Convention Relative to the Treatment of Prisoners of War and notice of protections be made available in both English and the detainees' language and be prominently displayed in all detention facilities. Detainees with questions regarding their treatment should be given the full opportunity to read the Convention. 5. (U) That each detention facility commander and interrogation facility commander publish a complete and comprehensive set of Standing Operating Procedures (SOPs) regarding treatment of detainees, and that all personnel be required to read the SOPs and sign a document indicating that they have read and understand the SOPs. 6. (U) That in accordance with the recommendations of MG Ryder's Assessment Report, and my findings and recommendations in this investigation, all units in the Iraq Theater of Operations conducting internment/confinement/detainment operations in support of Operation Iraqi Freedom be OPCON for all purposes, to include action under the UCMJ, to CJTF-7. 7. (U) Appoint the C3, CJTF as the staff proponent for detainee operations in the Iraq Joint Operations Area (JOA). (MG Tom Miller, C3, CJTF-7, has been appointed by COMCJTF-7). 8. (U) That an inquiry UP AR 381-10, Procedure 15 be conducted to determine the extent of culpability of Military Intelligence personnel, assigned to the 205th MI Brigade and the Joint Interrogation and Debriefing Center (JIDC) regarding abuse of detainees at Abu Ghraib (BCCF). 9. (U) That it is critical that the proponent for detainee operations is assigned a dedicated Senior Judge Advocate, with specialized training and knowledge of international and operational law, to assist and advise on matters of detainee operations. FINDINGS AND RECOMMENDATIONS (PART TWO) (U) The Investigation inquire into detainee escapes and accountability lapses as reported by CJTF-7, specifically allegations concerning these events at the Abu Ghraib Prison: REGARDING PART TWO OF THE INVESTIGATION, I MAKE THE FOLLOWING SPECIFIC FINDINGS OF FACT: 1. The 800th MP Brigade was responsible for theater-wide Internment and Resettlement (I/R) operations. (ANNEXES 45 and 95) 2. (U) The 320th MP Battalion, 800th MP Brigade was tasked with detainee operations at the Abu Ghraib Prison Complex during the time period covered in this investigation. (ANNEXES 41, 45, and 59) 3. (U) The 310th MP Battalion, 800th MP Brigade was tasked with detainee operations and Forward Operating Base (FOB) Operations at the Camp Bucca Detention Facility until TOA on 26 February 2004. (ANNEXES 41 and 52) 4. (U) The 744th MP Battalion, 800th MP Brigade was tasked with detainee operations and FOB Operations at the HVD Detention Facility until TOA on 4 March 2004. (ANNEXES 41 and 55) 5. (U) The 530th MP Battalion, 800th MP Brigade was tasked with detainee operations and FOB Operations at the MEK holding facility until TOA on 15 March 2004. (ANNEXES 41 and 97) 6. (U) Detainee operations include accountability, care, and well being of Enemy Prisoners of War, Retained Person, Civilian Detainees, and Other Detainees, as well as Iraqi criminal prisoners. (ANNEX 22) 7. (U) The accountability for detainees is doctrinally an MP task IAW FM 3-19.40. (ANNEX 22) 8. (U) There is a general lack of knowledge, implementation, and emphasis of basic legal, regulatory, doctrinal, and command requirements within the 800th MP Brigade and its subordinate units. (Multiple witness statements in ANNEXES 45-91). 9. (U) The handling of detainees and criminal prisoners after in-processing was inconsistent from detention facility to detention facility, compound to compound, encampment to encampment, and even shift to shift throughout the 800th MP Brigade AOR. (ANNEX 37) 10. (U) Camp Bucca, operated by the 310th MP Battalion, had a "Criminal Detainee In-Processing SOP" and a "Training Outline" for transferring and releasing detainees, which appears to have been followed. (ANNEXES 38 and 52) 11. (U) Incoming and outgoing detainees are being documented in the National Detainee Reporting System (NDRS) and Biometric Automated Toolset System (BATS) as required by regulation at all detention facilities. However, it is underutilized and often does not give a "real time" accurate picture of the detainee population due to untimely updating. (ANNEX 56) 12. (U) There was a severe lapse in the accountability of detainees at the Abu Ghraib Prison Complex. The 320th MP Battalion used a self-created "change sheet" to document the transfer of a detainee from one location to another. For proper accountability, it is imperative that these change sheets be processed and the detainee manifest be updated within 24 hours of movement. At Abu Ghraib, this process would often take as long as 4 days to complete. This lag-time resulted in inaccurate detainee Internment Serial Number (ISN) counts, gross differences in the detainee manifest and the actual occupants of an individual compound, and significant confusion of the MP Soldiers. The 320th MP Battalion S-1, CPT Theresa Delbalso, and the S-3, MAJ David DiNenna, explained that this breakdown was due to the lack of manpower to process change sheets in a timely manner. (ANNEXES 39 and 98) 13. (U) The 320th Battalion TACSOP requires detainee accountability at least 4 times daily at Abu Ghraib. However, a detailed review of their operational journals revealed that these accounts were often not done or not documented by the unit. Additionally, there is no indication that accounting errors or the loss of a detainee in the accounting process triggered any immediate corrective action by the Battalion TOC. (ANNEX 44) 14. (U) There is a lack of standardization in the way the 320th MP Battalion conducted physical counts of their detainees. Each compound within a given encampment did their headcounts differently. Some compounds had detainees line up in lines of 10, some had them sit in rows, and some moved all the detainees to one end of the compound and counted them as they passed to the other end of the compound. (ANNEX 98) 15. (U) FM 3-19.40 outlines the need for 2 roll calls (100% ISN band checks) per day. The 320th MP Battalion did this check only 2 times per week. Due to the lack of real-time updates to the system, these checks were regularly inaccurate. (ANNEXES 22 and 98) 16. (U) The 800th MP Brigade and subordinate units adopted non-doctrinal terms such as "band checks," "roll-ups," and "call-ups," which contributed to the lapses in accountability and confusion at the soldier level. (Annexes 63, 88, and 98) 17. (U) Operational journals at the various compounds and the 320th Battalion TOC contained numerous unprofessional entries and flippant comments, which highlighted the lack of discipline within the unit. There was no indication that the journals were ever reviewed by anyone in their chain of command. (Annex 37) 18. (U) Accountability SOPs were not fully developed and standing TACSOPs were widely ignored. Any SOPs that did exist were not trained on, and were never distributed to the lowest level. Most procedures were shelved at the unit TOC, rather than at the subordinate units and guards mount sites. (Annexes 44, 67, 71, and 85) 19. (U) Accountability and facility operations SOPs lacked specificity, implementation measures, and a system of checks and balances to ensure compliance. (AnnexES 76 and 82) 20. (U) Basic Army Doctrine was not widely referenced or utilized to develop the accountability practices throughout the 800th MP Brigade's subordinate units. Daily processing, accountability, and detainee care appears to have been made up as the operations developed with reliance on, and guidance from, junior members of the unit who had civilian corrections experience. (Annex 21) 21. (U) Soldiers were poorly prepared and untrained to conduct I/R operations prior to deployment, at the mobilization site, upon arrival in theater, and throughout their mission. (ANNEXES 62, 63, and 69) 22. (U) The documentation provided to this investigation identified 27 escapes or attempted escapes from the detention facilities throughout the 800th MP Brigade's AOR. Based on my assessment and detailed analysis of the substandard accountability process maintained by the 800th MP Brigade, it is highly likely that there were several more unreported cases of escape that were probably "written off" as administrative errors or otherwise undocumented. 1LT Lewis Raeder, Platoon Leader, 372nd MP Company, reported knowing about at least two additional escapes (one from a work detail and one from a window) from Abu Ghraib (BCCF) that were not documented. LTC Dennis McGlone, Commander, 744th MP Battalion, detailed the escape of one detainee at the High Value Detainee Facility who went to the latrine and then outran the guards and escaped. Lastly, BG Janis Karpinski, Commander, 800th MP Brigade, stated that there were more than 32 escapes from her holding facilities, which does not match the number derived from the investigation materials. (ANNEXES 5-10, 45, 55, and 71) 23. (U) The Abu Ghraib and Camp Bucca detention facilities are significantly over their intended maximum capacity while the guard force is undermanned and under resourced. This imbalance has contributed to the poor living conditions, escapes, and accountability lapses at the various facilities. The overcrowding of the facilities also limits the ability to identify and segregate leaders in the detainee population who may be organizing escapes and riots within the facility. (ANNEXES 6, 22, and 92) 24. (U) The screening, processing, and release of detainees who should not be in custody takes too long and contributes to the overcrowding and unrest in the detention facilities. There are currently three separate release mechanisms in the theater-wide internment operations. First, the apprehending unit can release a detainee if there is a determination that their continued detention is not warranted. Secondly, a criminal detainee can be released after it has been determined that the detainee has no intelligence value, and that their release would not be detrimental to society. BG Karpinski had signature authority to release detainees in this second category. Lastly, detainees accused of committing "Crimes Against the Coalition," who are held throughout the separate facilities in the CJTF-7 AOR, can be released upon a determination that they are of no intelligence value and no longer pose a significant threat to Coalition Forces. The release process for this category of detainee is a screening by the local US Forces Magistrate Cell and a review by a Detainee Release Board consisting of BG Karpinski, COL Marc Warren, SJA, CJTF-7, and MG Barbara Fast, C-2, CJTF-7. MG Fast is the "Detainee Release Authority" for detainees being held for committing crimes against the coalition. According to BG Karpinski, this category of detainee makes up more than 60% of the total detainee population, and is the fastest growing category. However, MG Fast, according to BG Karpinski, routinely denied the board's recommendations to release detainees in this category who were no longer deemed a threat and clearly met the requirements for release. According to BG Karpinski, the extremely slow and ineffective release process has significantly contributed to the overcrowding of the facilities. (ANNEXES 40, 45, and 46) 25. (U) After Action Reviews (AARs) are not routinely being conducted after an escape or other serious incident. No lessons learned seem to have been disseminated to subordinate units to enable corrective action at the lowest level. The Investigation Team requested copies of AARs, and none were provided. (Multiple Witness Statements) 26. (U) Lessons learned (i.e. Findings and Recommendations from various 15-6 Investigations concerning escapes and accountability lapses) were rubber stamped as approved and ordered implemented by BG Karpinski. There is no evidence that the majority of her orders directing the implementation of substantive changes were ever acted upon. Additionally, there was no follow-up by the command to verify the corrective actions were taken. Had the findings and recommendations contained within their own investigations been analyzed and actually implemented by BG Karpinski, many of the subsequent escapes, accountability lapses, and cases of abuse may have been prevented. (ANNEXES 5-10) 27. (U) The perimeter lighting around Abu Ghraib and the detention facility at Camp Bucca is inadequate and needs to be improved to illuminate dark areas that have routinely become avenues of escape. (ANNEX 6) 28. (U) Neither the camp rules nor the provisions of the Geneva Conventions are posted in English or in the language of the detainees at any of the detention facilities in the 800th MP Brigade's AOR, even after several investigations had annotated the lack of this critical requirement. (Multiple Witness Statements and the Personal Observations of the Investigation Team) 29. (U) The Iraqi guards at Abu Ghraib BCCF) demonstrate questionable work ethics and loyalties, and are a potentially dangerous contingent within the Hard-Site. These guards have furnished the Iraqi criminal inmates with contraband, weapons, and information. Additionally, they have facilitated the escape of at least one detainee. (ANNEX 8 and 26-SPC Polak's Statement) 30. (U) In general, US civilian contract personnel (Titan Corporation, CACI, etc...), third country nationals, and local contractors do not appear to be properly supervised within the detention facility at Abu Ghraib. During our on-site inspection, they wandered about with too much unsupervised free access in the detainee area. Having civilians in various outfits (civilian and DCUs) in and about the detainee area causes confusion and may have contributed to the difficulties in the accountability process and with detecting escapes. (ANNEX 51, Multiple Witness Statements, and the Personal Observations of the Investigation Team) 31. (U) SGM Marc Emerson, Operations SGM, 320th MP Battalion, contended that the Detainee Rules of Engagement (DROE) and the general principles of the Geneva Convention were briefed at every guard mount and shift change on Abu Ghraib. However, none of our witnesses, nor our personal observations, support his contention. I find that SGM Emerson was not a credible witness. (ANNEXES 45, 80, and the Personal Observations of the Investigation Team) 32. (U) Several interviewees insisted that the MP and MI Soldiers at Abu Ghraib (BCCF) received regular training on the basics of detainee operations; however, they have been unable to produce any verifying documentation, sign-in rosters, or soldiers who can recall the content of this training. (Annexes 59, 80, and the Absence of any Training Records) 33. (S/NF) The various detention facilities operated by the 800th MP Brigade have routinely held persons brought to them by Other Government Agencies (OGAs) without accounting for them, knowing their identities, or even the reason for their detention. The Joint Interrogation and Debriefing Center (JIDC) at Abu Ghraib called these detainees "ghost detainees." On at least one occasion, the 320th MP Battalion at Abu Ghraib held a handful of "ghost detainees" (6-8) for OGAs that they moved around within the facility to hide them from a visiting International Committee of the Red Cross (ICRC) survey team. This maneuver was deceptive, contrary to Army Doctrine, and in violation of international law. (Annex 53) 34. (U) The following riots, escapes, and shootings have been documented and reported to this Investigation Team. Although there is no data from other missions of similar size and duration to compare the number of escapes with, the most significant factors derived from these reports are twofold. First, investigations and SIRs lacked critical data needed to evaluate the details of each incident. Second, each investigation seems to have pointed to the same types of deficiencies; however, little to nothing was done to correct the problems and to implement the recommendations as was ordered by BG Karpinski, nor was there any command emphasis to ensure these deficiencies were corrected: a. (U) 4 June 03- This escape was mentioned in the 15-6 Investigation covering the 13 June 03 escape, recapture, and shootings of detainees at Camp Vigilant (320th MP Battalion). However, no investigation or additional information was provided as requested by this investigation team. (ANNEX 7) b. (U) 9 June 03- Riot and shootings of five detainees at Camp Cropper. (115th MP Battalion) Several detainees allegedly rioted after a detainee was subdued by MPs of the 115th MP Battalion after striking a guard in compound B of Camp Cropper. A 15-6 investigation by 1LT Magowan (115th MP Battalion, Platoon Leader) concluded that a detainee had acted up and hit an MP. After being subdued, one of the MPs took off his DCU top and flexed his muscles to the detainees, which further escalated the riot. The MPs were overwhelmed and the guards fired lethal rounds to protect the life of the compound MPs, whereby 5 detainees were wounded. Contributing factors were poor communications, no clear chain of command, facility-obstructed views of posted guards, the QRF did not have non-lethal equipment, and the SOP was inadequate and outdated. (ANNEX 5) c. (U) 12 June 03- Escape and recapture of detainee #8399, escape and shooting of detainee # 7166, and attempted escape of an unidentified detainee from Camp Cropper Holding Area (115th MP Battalion). Several detainees allegedly made their escape in the nighttime hours prior to 0300. A 15-6 investigation by CPT Wendlandt (115th MP Battalion, S-2) concluded that the detainees allegedly escaped by crawling under the wire at a location with inadequate lighting. One detainee was stopped prior to escape. An MP of the 115th MP Battalion search team recaptured detainee # 8399, and detainee # 7166 was shot and killed by a Soldier during the recapture process. Contributing factors were overcrowding, poor lighting, and the nature of the hardened criminal detainees at that location. It is of particular note that the command was informed at least 24 hours in advance of the upcoming escape attempt and started doing amplified announcements in Arabic stating the camp rules. The investigation pointed out that rules and guidelines were not posted in the camps in the detainees' native languages. (ANNEX 6) d. (U) 13 June 03- Escape and recapture of detainee # 8968 and the shooting of eight detainees at Abu Ghraib (BCCF) (320th MP Battalion). Several detainees allegedly attempted to escape at about 1400 hours from the Camp Vigilant Compound, Abu Ghraib (BCCF). A 15-6 investigation by CPT Wyks (400th MP Battalion, S-1) concluded that the detainee allegedly escaped by sliding under the wire while the tower guard was turned in the other direction. This detainee was subsequently apprehended by the QRF. At about 1600 the same day, 30-40 detainees rioted and pelted three interior MP guards with rocks. One guard was injured and the tower guards fired lethal rounds at the rioters injuring 7 and killing 1 detainee. (ANNEX 7) e. (U) 05 November 03- Escape of detainees # 9877 and # 10739 from Abu Ghraib (320th MP Battalion). Several detainees allegedly escaped at 0345 from the Hard-Site, Abu Ghraib (BCCF). An SIR was initiated by SPC Warner (320th MP Battalion, S-3 RTO). The SIR indicated that 2 criminal prisoners escaped through their cell window in tier 3A of the Hard-Site. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 11) f. (U) 07 November 03- Escape of detainee # 14239 from Abu Ghraib (320th MP Battalion). A detainee allegedly escaped at 1330 from Compound 2 of the Ganci Encampment, Abu Ghraib (BCCF). An SIR was initiated by SSG Hydro (320th MP Battalion, S-3 Asst. NCOIC). The SIR indicated that a detainee escaped from the North end of the compound and was discovered missing during distribution of the noon meal, but there is no method of escape listed in the SIR. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 12) g. (U) 08 November 03- Escape of detainees # 115089, # 151623, # 151624, # 116734, # 116735, and # 116738 from Abu Ghraib (320th MP Battalion). Several detainees allegedly escaped at 2022 from Compound 8 of the Ganci encampment, Abu Ghraib. An SIR was initiated by MAJ DiNenna (320th MP Battalion, S-3). The SIR indicated that 5-6 prisoners escaped from the North end of the compound, but there is no method of escape listed in the SIR. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 13) h. (U) 24 November 03- Riot and shooting of 12 detainees # 150216, #150894, #153096, 153165, #153169, #116361, #153399, #20257, #150348, #152616, #116146, and #152156 at Abu Ghraib(320th MP Battalion). Several detainees allegedly began to riot at about 1300 in all of the compounds at the Ganci encampment. This resulted in the shooting deaths of 3 detainees, 9 wounded detainees, and 9 injured US Soldiers. A 15-6 investigation by COL Bruce Falcone (220th MP Brigade, Deputy Commander) concluded that the detainees rioted in protest of their living conditions, that the riot turned violent, the use of non-lethal force was ineffective, and, after the 320th MP Battalion CDR executed "Golden Spike," the emergency containment plan, the use of deadly force was authorized. Contributing factors were lack of comprehensive training of guards, poor or non-existent SOPs, no formal guard-mount conducted prior to shift, no rehearsals or ongoing training, the mix of less than lethal rounds with lethal rounds in weapons, no AARs being conducted after incidents, ROE not posted and not understood, overcrowding, uniforms not standardized, and poor communication between the command and Soldiers. (ANNEX 8) i. (U) 24 November 03- Shooting of detainee at Abu Ghraib(320th MP Battalion). A detainee allegedly had a pistol in his cell and around 1830 an extraction team shot him with less than lethal and lethal rounds in the process of recovering the weapon. A 15-6 investigation by COL Bruce Falcone (220th Brigade, Deputy Commander) concluded that one of the detainees in tier 1A of the Hard Site had gotten a pistol and a couple of knives from an Iraqi Guard working in the encampment. Immediately upon receipt of this information, an ad-hoc extraction team consisting of MP and MI personnel conducted what they called a routine cell search, which resulted in the shooting of an MP and the detainee. Contributing factors were a corrupt Iraqi Guard, inadequate SOPs, the Detention ROE in place at the time was ineffective due to the numerous levels of authorization needed for use of lethal force, poorly trained MPs, unclear lanes of responsibility, and ambiguous relationship between the MI and MP assets. (ANNEX 8) j. (U) 13 December 03- Shooting by non-lethal means into crowd at Abu Ghraib(320th MP Battalion). Several detainees allegedly got into a detainee-on-detainee fight around 1030 in Compound 8 of the Ganci encampment, Abu Ghraib. An SIR was initiated by SSG Matash (320th MP Battalion, S-3 Section). The SIR indicated that there was a fight in the compound and the MPs used a non-lethal crowd-dispersing round to break up the fight, which was successful. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 14) k. (U) 13 December 03- Shooting by non-lethal means into crowd at Abu Ghraib(320th MP Battalion). Several detainees allegedly got into a detainee-on-detainee fight around 1120 in Compound 2 of the Ganci encampment, Abu Ghraib. An SIR was initiated by SSG Matash (320th MP Battalion, S-3 Section). The SIR indicated that there was a fight in the compound and the MPs used two non-lethal shots to disperse the crowd, which was successful. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 15) l. (U) 13 December 03- Shooting by non-lethal means into crowd at Abu Ghraib(320th MP Battalion). Approximately 30-40 detainees allegedly got into a detainee-on-detainee fight around 1642 in Compound 3 of the Ganci encampment, Abu Ghraib (BCCF). An SIR was initiated by SSG Matash (320th MP Battalion, S-3 Section). The SIR indicates that there was a fight in the compound and the MPs used a non-lethal crowd-dispersing round to break up the fight, which was successful. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 16) m. (U) 17 December 03- Shooting by non-lethal means of detainee from Abu Ghraib(320th MP Battalion). Several detainees allegedly assaulted an MP at 1459 inside the Ganci Encampment, Abu Ghraib (BCCF). An SIR was initiated by SSG Matash (320th MP BRIGADE, S-3 Section). The SIR indicated that three detainees assaulted an MP, which resulted in the use of a non-lethal shot that calmed the situation. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 17) n. (U) 07 January 04- Escape of detainee #115032 from Camp Bucca(310th MP Battalion). A detainee allegedly escaped between the hours of 0445 and 0640 from Compound 12, of Camp Bucca. Investigation by CPT Kaires (310th MP Battalion S-3) and CPT Holsombeck (724th MP Battalion S-3) concluded that the detainee escaped through an undetected weakness in the wire. Contributing factors were inexperienced guards, lapses in accountability, complacency, lack of leadership presence, poor visibility, and lack of clear and concise communication between the guards and the leadership. (ANNEX 9) o. (U) 12 January 04- Escape of Detainees #115314 and #109950 as well as the escape and recapture of 5 unknown detainees at the Camp Bucca Detention Facility (310th MP Battalion). Several detainees allegedly escaped around 0300 from Compound 12, of Camp Bucca. An AR 15-6 Investigation by LTC Leigh Coulter (800th MP Brigade, OIC Camp Arifjan Detachment) concluded that three of the detainees escaped through the front holding cell during conditions of limited visibility due to fog. One of the detainees was noticed, shot with a non-lethal round, and returned to his holding compound. That same night, 4 detainees exited through the wire on the South side of the camp and were seen and apprehended by the QRF. Contributing factors were the lack of a coordinated effort for emplacement of MPs during implementation of the fog plan, overcrowding, and poor communications. (ANNEX 10) p. (U) 14 January 04- Escape of detainee #12436 and missing Iraqi guard from Hard-Site, Abu Ghraib (320th MP Battalion). A detainee allegedly escaped at 1335 from the Hard Site at Abu Ghraib (BCCF). An SIR was initiated by SSG Hydro (320th MP Battalion, S-3 Asst. NCOIC). The SIR indicates that an Iraqi guard assisted a detainee to escape by signing him out on a work detail and disappearing with him. At the time of the second SIR, neither missing person had been located. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 99) q. (U) 26 January 04- Escape of detainees #s 115236, 116272, and 151933 from Camp Bucca(310th MP Battalion). Several Detainees allegedly escaped between the hours of 0440 and 0700 during a period of intense fog. Investigation by CPT Kaires (310th MP Battalion S-3) concluded that the detainees crawled under a fence when visibility was only 10-15 meters due to fog. Contributing factors were the limited visibility (darkness under foggy conditions), lack of proper accountability reporting, inadequate number of guards, commencement of detainee feeding during low visibility operations, and poorly rested MPs. (ANNEX 18) 36. (U) As I have previously indicated, this investigation determined that there was virtually a complete lack of detailed SOPs at any of the detention facilities. Moreover, despite the fact that there were numerous reported escapes at detention facilities throughout Iraq (in excess of 35), AR 15-6 Investigations following these escapes were simply forgotten or ignored by the Brigade Commander with no dissemination to other facilities. After-Action Reports and Lessons Learned, if done at all, remained at individual facilities and were not shared among other commanders or soldiers throughout the Brigade. The Command never issued standard TTPs for handling escape incidents. (AnnexES 5-10, Multiple Witness Statements, and the Personal Observations of the Investigation Team) RECOMMENDATIONS REGARDING PART TWO OF THE INVESTIGATION: (U) ANNEX 100 of this investigation contains a detailed and referenced series of recommendations for improving the detainee accountability practices throughout the OIF area of operations. (U) Accountability practices throughout any particular detention facility must be standardized and in accordance with applicable regulations and international law. (U) The NDRS and BATS accounting systems must be expanded and used to their fullest extent to facilitate real time updating when detainees are moved and or transferred from one location to another. (U) "Change sheets," or their doctrinal equivalent must be immediately processed and updated into the system to ensure accurate accountability. The detainee roll call or ISN counts must match the manifest provided to the compound guards to ensure proper accountability of detainees. (U) Develop, staff, and implement comprehensive and detailed SOPs utilizing the lessons learned from this investigation as well as any previous findings, recommendations, and reports. (U) SOPs must be written, disseminated, trained on, and understood at the lowest level.(U) Iraqi criminal prisoners must be held in separate facilities from any other category of detainee. (U) All of the compounds should be wired into the master manifest whereby MP Soldiers can account for their detainees in real time and without waiting for their change sheets to be processed. This would also have the change sheet serve as a way to check up on the accuracy of the manifest as updated by each compound. The BATS and NDRS system can be utilized for this function.(U) Accountability lapses, escapes, and disturbances within the detainment facilities must be immediately reported through both the operational and administrative Chain of Command via a Serious Incident Report (SIR). The SIRs must then be tracked and followed by daily SITREPs until the situation is resolved. (U) Detention Rules of Engagement (DROE), Interrogation Rules of Engagement (IROE), and the principles of the Geneva Conventions need to be briefed at every shift change and guard mount. (U) AARs must be conducted after serious incidents at any given facility. The observations and corrective actions that develop from the AARs must be analyzed by the respective MP Battalion S-3 section, developed into a plan of action, shared with the other facilities, and implemented as a matter of policy. (U) There must be significant structural improvements at each of the detention facilities. The needed changes include significant enhancement of perimeter lighting, additional chain link fencing, staking down of all concertina wire, hard site development, and expansion of Abu Ghraib (BCCF) . (U) The Geneva Conventions and the facility rules must be prominently displayed in English and the language of the detainees at each compound and encampment at every detention facility IAW AR 190-8. (U) Further restrict US civilians and other contractors' access throughout the facility. Contractors and civilians must be in an authorized and easily identifiable uniform to be more easily distinguished from the masses of detainees in civilian clothes. (U) Facilities must have a stop movement/transfer period of at least 1 hour prior to every 100% detainee roll call and ISN counts to ensure accurate accountability.(U) The method for doing head counts of detainees within a given compound must be standardized. (U) Those military units conducting I/R operations must know of, train on, and constantly reference the applicable Army Doctrine and CJTF command policies. The references provided in this report cover nearly every deficiency I have enumerated. Although they do not, and cannot, make up for leadership shortfalls, all soldiers, at all levels, can use them to maintain standardized operating procedures and efficient accountability practices. FINDINGS AND RECOMMENDATIONS (PART THREE) (U) Investigate the training, standards, employment, command policies, internal procedures, and command climate in the 800th MP Brigade, as appropriate: (Names deleted) (ANNEXES 45-91) REGARDING PART THREE OF THE INVESTIGATION, I MAKE THE FOLLOWING SPECIFIC FINDINGS OF FACT: 1. (U) I find that BG Janis Karpinski took command of the 800th MP Brigade on 30 June 2003 from BG Paul Hill. BG Karpinski has remained in command since that date. The 800th MP Brigade is comprised of eight MP battalions in the Iraqi TOR: 115th MP Battalion, 310th MP Battalion, 320th MP Battalion, 324th MP Battalion, 400th MP Battalion, 530th MP Battalion, 724th MP Battalion, and 744th MP Battalion. (ANNEXES 41 and 45) 2. (U) Prior to BG Karpinski taking command, members of the 800th MP Brigade believed they would be allowed to go home when all the detainees were released from the Camp Bucca Theater Internment Facility following the cessation of major ground combat on 1 May 2003. At one point, approximately 7,000 to 8,000 detainees were held at Camp Bucca. Through Article-5 Tribunals and a screening process, several thousand detainees were released. Many in the command believed they would go home when the detainees were released. In late May-early June 2003 the 800th MPBrigade was given a new mission to manage the Iraqi penal system and several detention centers. This new mission meant Soldiers would not redeploy to CONUS when anticipated. Morale suffered, and over the next few months there did not appear to have been any attempt by the Command to mitigate this morale problem. (ANNEXES 45 and 96) 3. (U) There is abundant evidence in the statements of numerous witnesses that soldiers throughout the 800th MP Brigade were not proficient in their basic MOS skills, particularly regarding internment/resettlement operations. Moreover, there is no evidence that the command, although aware of these deficiencies, attempted to correct them in any systemic manner other than ad hoc training by individuals with civilian corrections experience. (Multiple Witness Statements and the Personal Observations of the Investigation Team) 4. (U) I find that the 800th MP Brigade was not adequately trained for a mission that included operating a prison or penal institution at Abu Ghraib Prison Complex. As the Ryder Assessment found, I also concur that units of the 800th MP Brigade did not receive corrections-specific training during their mobilization period. MP units did not receive pinpoint assignments prior to mobilization and during the post mobilization training, and thus could not train for specific missions. The training that was accomplished at the mobilization sites were developed and implemented at the company level with little or no direction or supervision at the Battalion and Brigade levels, and consisted primarily of common tasks and law enforcement training. However, I found no evidence that the Command, although aware of this deficiency, ever requested specific corrections training from the Commandant of the Military Police School, the US Army Confinement Facility at Mannheim, Germany, the Provost Marshal General of the Army, or the US Army Disciplinary Barracks at Fort Leavenworth, Kansas. (ANNEXES 19 and 76) 5. (U) I find that without adequate training for a civilian internee detention mission, Brigade personnel relied heavily on individuals within the Brigade who had civilian corrections experience, including many who worked as prison guards or corrections officials in their civilian jobs. Almost every witness we interviewed had no familiarity with the provisions of AR 190-8 or FM 3-19.40. It does not appear that a Mission Essential Task List (METL) based on in-theater missions was ever developed nor was a training plan implemented throughout the Brigade. (ANNEXES 21, 22, 67, and 81) 6. (U) I also find, as did MG Ryder's Team, that the 800th MP Brigade as a whole, was understrength for the mission for which it was tasked. Army Doctrine dictates that an I/R Brigade can be organized with between 7 and 21 battalions, and that the average battalion size element should be able to handle approximately 4000 detainees at a time. This investigation indicates that BG Karpinski and her staff did a poor job allocating resources throughout the Iraq JOA. Abu Ghraib (BCCF) normally housed between 6000 and 7000 detainees, yet it was operated by only one battalion. In contrast, the HVD Facility maintains only about 100 detainees, and is also run by an entire battalion. (ANNEXES 19, 22, and 96) 7. (U) Reserve Component units do not have an individual replacement system to mitigate medical or other losses. Over time, the 800th MP Brigade clearly suffered from personnel shortages through release from active duty (REFRAD) actions, medical evacuation, and demobilization. In addition to being severely undermanned, the quality of life for Soldiers assigned to Abu Ghraib (BCCF) was extremely poor. There was no DFAC, PX, barbershop, or MWR facilities. There were numerous mortar attacks, random rifle and RPG attacks, and a serious threat to Soldiers and detainees in the facility. The prison complex was also severely overcrowded and the Brigade lacked adequate resources and personnel to resolve serious logistical problems. Finally, because of past associations and familiarity of Soldiers within the Brigade, it appears that friendship often took precedence over appropriate leader and subordinate relationships. (ANNEX 101, Multiple Witness Statements, and the Personal Observations of the Investigation Team) 8. (U) With respect to the 800th MP Brigade mission at Abu Ghraib (BCCF), I find that there was clear friction and lack of effective communication between the Commander, 205th MI Brigade, who controlled FOB Abu Ghraib (BCCF) after 19 November 2003, and the Commander, 800th MP Brigade, who controlled detainee operations inside the FOB. There was no clear delineation of responsibility between commands, little coordination at the command level, and no integration of the two functions. Coordination occurred at the lowest possible levels with little oversight by commanders. (ANNEXES 31, 45, and 46) 9. (U) I find that this ambiguous command relationship was exacerbated by a CJTF-7 Fragmentary Order (FRAGO) 1108 issued on 19 November 2003. Paragraph 3.C.8, Assignment of 205th MI Brigade Commander's Responsibilities for the Baghdad Central Confinement Facility, states as follows: 3.C.8. A. (U) 205 MI BRIGADE. 3.C.8. A. 1. (U) EFFECTIVE IMMEDIATELY COMMANDER 205 MI BRIGADE ASSUMES RESPONSIBILITY FOR THE BAGHDAD CONFINEMENT FACILITY (BCCF) AND IS APPOINTED THE FOB COMMANDER. UNITS CURRENTLY AT ABU GHRAIB (BCCF) ARE TACON TO 205 MI BRIGADE FOR "SECURITY OF DETAINEES AND FOB PROTECTION." Although not supported by BG Karpinski, FRAGO 1108 made all of the MP units at Abu Ghraib TACON to the Commander, 205th MI Brigade. This effectively made an MI Officer, rather than an MP Officer, responsible for the MP units conducting detainee operations at that facility. This is not doctrinally sound due to the different missions and agendas assigned to each of these respective specialties. (ANNEX 31) 10 (U) Joint Publication 0-2, Unified Action Armed Forces (UNAAF), 10 July 2001 defines Tactical Control (TACON) as the detailed direction and control of movements or maneuvers within the operational area necessary to accomplish assigned missions or tasks. (ANNEX 42) "TACON is the command authority over assigned or attached forces or commands or military capability made available for tasking that is limited to the detailed direction and control of movements or maneuvers within the operational area necessary to accomplish assigned missions or tasks. TACON is inherent in OPCON and may be delegated to and exercised by commanders at any echelon at or below the level of combatant commander." 11. (U) Based on all the facts and circumstances in this investigation, I find that there was little, if any, recognition of this TACON Order by the 800th MP Brigade or the 205th MI Brigade. Further, there was no evidence if the Commander, 205th MI Brigade clearly informed the Commander, 800th MP Brigade, and specifically the Commander, 320th MP Battalion assigned at Abu Ghraib (BCCF), on the specific requirements of this TACON relationship. (ANNEXES 45 and 46) 12. (U) It is clear from a comprehensive review of witness statements and personal interviews that the 320th MP Battalion and 800th MP Brigade continued to function as if they were responsible for the security, health and welfare, and overall security of detainees within Abu Ghraib (BCCF) prison. Both BG Karpinski and COL Pappas clearly behaved as if this were still the case. (ANNEXES 45 and 46) 13. (U) With respect to the 320th MP Battalion, I find that the Battalion Commander, LTC (P) Jerry Phillabaum, was an extremely ineffective commander and leader. Numerous witnesses confirm that the Battalion S-3, MAJ David W. DiNenna, basically ran the battalion on a day-to-day basis. At one point, BG Karpinski sent LTC (P) Phillabaum to Camp Arifjan, Kuwait for approximately two weeks, apparently to give him some relief from the pressure he was experiencing as the 320th Battalion Commander. This movement to Camp Arifjan immediately followed a briefing provided by LTC (P) Phillabaum to the CJTF-7 Commander, LTG Sanchez, near the end of October 2003. BG Karpinski placed LTC Ronald Chew, Commander of the 115th MP Battalion, in charge of the 320th MP Battalion for a period of approximately two weeks. LTC Chew was also in command of the 115th MP Battalion assigned to Camp Cropper, BIAP, Iraq. I could find no orders, either suspending or relieving LTC (P) Phillabaum from command, nor any orders placing LTC Chew in command of the 320th. In addition, there was no indication this removal and search for a replacement was communicated to the Commander CJTF-7, the Commander 377th TSC, or to Soldiers in the 320th MP Battalion. Temporarily removing one commander and replacing him with another serving Battalion Commander without an order and without notifying superior or subordinate commands is without precedent in my military career. LTC (P) Phillabaum was also reprimanded for lapses in accountability that resulted in several escapes. The 320th MP Battalion was stigmatized as a unit due to previous detainee abuse which occurred in May 2003 at the Bucca Theater Internment Facility (TIF), while under the command of LTC (P) Phillabaum. Despite his proven deficiencies as both a commander and leader, BG Karpinski allowed LTC (P) Phillabaum to remain in command of her most troubled battalion guarding, by far, the largest number of detainees in the 800th MP Brigade. LTC (P) Phillabaum was suspended from his duties by LTG Sanchez, CJTF-7 Commander on 17 January 2004. (ANNEXES 43, 45, and 61) 14. (U) During the course of this investigation I conducted a lengthy interview with BG Karpinski that lasted over four hours, and is included verbatim in the investigation Annexes. BG Karpinski was extremely emotional during much of her testimony. What I found particularly disturbing in her testimony was her complete unwillingness to either understand or accept that many of the problems inherent in the 800th MP Brigade were caused or exacerbated by poor leadership and the refusal of her command to both establish and enforce basic standards and principles among its soldiers. (ANNEX 45 and the Personal Observations of the Interview Team) 15. (U) BG Karpinski alleged that she received no help from the Civil Affairs Command, specifically, no assistance from either BG John Kern or COL Tim Regan. She blames much of the abuse that occurred in Abu Ghraib (BCCF) on MI personnel and stated that MI personnel had given the MPs "ideas" that led to detainee abuse. In addition, she blamed the 372nd Company Platoon Sergeant, SFC Snider, the Company Commander, CPT Reese, and the First Sergeant, MSG Lipinski, for the abuse. She argued that problems in Abu Ghraib were the fault of COL Pappas and LTC Jordan because COL Pappas was in charge of FOB Abu Ghraib. (ANNEX 45) 16. (U) BG Karpinski also implied during her testimony that the criminal abuses that occurred at Abu Ghraib (BCCF) might have been caused by the ultimate disposition of the detainee abuse cases that originally occurred at Camp Bucca in May 2003. She stated that "about the same time those incidents were taking place out of Baghdad Central, the decisions were made to give the guilty people at Bucca plea bargains. So, the system communicated to the soldiers, the worst that's gonna happen is, you're gonna go home." I think it important to point out that almost every witness testified that the serious criminal abuse of detainees at Abu Ghraib (BCCF) occurred in late October and early November 2003. The photographs and statements clearly support that the abuses occurred during this time period. The Bucca cases were set for trial in January 2004 and were not finally disposed of until 29 December 2003. There is entirely no evidence that the decision of numerous MP personnel to intentionally abuse detainees at Abu Ghrabid (BCCF) was influenced in any respect by the Camp Bucca cases. (ANNEXES 25, 26, and 45) 17. (U) Numerous witnesses stated that the 800th MP Brigade S-1, MAJ Hinzman and S-4, MAJ Green, were essentially dysfunctional, but that despite numerous complaints, these officers were not replaced. This had a detrimental effect on the Brigade Staff's effectiveness and morale. Moreover, the Brigade Command Judge Advocate, LTC James O'Hare, appears to lack initiative and was unwilling to accept responsibility for any of his actions. LTC Gary Maddocks, the Brigade XO did not properly supervise the Brigade staff by failing to lay out staff priorities, take overt corrective action when needed, and supervise their daily functions. (ANNEXES 45, 47, 48, 62, and 67) 18. (U) In addition to poor morale and staff inefficiencies, I find that the 800th MP Brigade did not articulate or enforce clear and basic Soldier and Army standards. I specifically found these examples of unenforced standards: a. There was no clear uniform standard for any MP Soldiers assigned detention duties. Despite the fact that hundreds of former Iraqi soldiers and officers were detainees, MP personnel were allowed to wear civilian clothes in the FOB after duty hours while carrying weapons. (ANNEXES 51 and 74) b. Some Soldiers wrote poems and other sayings on their helmets and soft caps. (ANNEXES 51 and 74) c. In addition, numerous officers and senior NCOs have been reprimanded/disciplined for misconduct during this period. Those disciplined include; (ANNEXES 43 and 102) 1). (U) BG Janis Karpinski, Commander, 800th MP Brigade * Memorandum of Admonishment by LTG Sanchez, Commander, CJTF-7, on 17 January 2004. 2). (U) LTC (P) Jerry Phillabaum, Commander, 320th MP Battalion * GOMOR from BG Karpinski, Commander 800th MP Brigade, on 10 November 2003, for lack of leadership and for failing to take corrective security measures as ordered by the Brigade Commander; filed locally * Suspended by BG Karpinski, Commander 800th MP Brigade, 17 January 2004; Pending Relief for Cause, for dereliction of duty 3). (U) LTC Dale Burtyk, Commander, 400th MP Battalion * GOMOR from BG Karpinski, Commander 800th MP Brigade, on 20 August 2003, for failure to properly train his Soldiers. (Soldier had negligent discharge of M-16 while exiting his vehicle, round went into fuel tank); filed locally. 4). (U) MAJ David DiNenna, S-3, 320th MP Battalion * GOMOR from LTG McKiernan, Commander CFLCC, on 25 May 2003, for dereliction of duty for failing to report a violation of CENTCOM General Order #1 by a subordinate Field Grade Officer and Senior Noncommissioned Officer, which he personally observed; returned to soldier unfiled. * GOMOR from BG Karpinski, Commander 800th MP Brigade, on 10 November 03, for failing to take corrective security measures as ordered by the Brigade Commander; filed locally. 5). (U) MAJ Stacy Garrity, Finance Officer, 800th MP Brigade * GOMOR from LTG McKiernan, Commander CFLCC, on 25 May 2003, for violation of CENTCOM General Order #1, consuming alcohol with an NCO; filed locally. 6). (U) CPT Leo Merck, Commander, 870th MP Company * Court-Martial Charges Preferred, for Conduct Unbecoming an Officer and Unauthorized Use of Government Computer in that he was alleged to have taken nude pictures of his female Soldiers without their knowledge; Trial date to be announced. 7). (U) CPT Damaris Morales, Commander, 770th MP Company * GOMOR from BG Karpinski, Commander 800th MP Brigade, on 20 August 2003, for failing to properly train his Soldiers (Soldier had negligent discharge of M-16 while exiting his vehicle, round went into fuel tank); filed locally. 8). (U) CSM Roy Clement, Command Sergeant Major, 800th MP Brigade * GOMOR and Relief for Cause from BG Janis Karpinski, Commander 800th MP Brigade, for fraternization and dereliction of duty for fraternizing with junior enlisted soldiers within his unit; GOMOR officially filed and he was removed from the CSM list. 9). (U) CSM Edward Stotts, Command Sergeant Major, 400th MP Battalion * GOMOR from BG Karpinski, Commander 800th MP Brigade, on 20 August 2003, for failing to properly train his Soldiers (Soldier had negligent discharge of M-16 while exiting his vehicle, round went into fuel tank); filed locally. 10). (U) 1SG Carlos Villanueva, First Sergeant, 770th MP Company * GOMOR from BG Karpinski, Commander 800th MP Brigade, on 20 August 2003, for failing to properly train his Soldiers (Soldier had negligent discharge of M-16 while exiting his vehicle, round went into fuel tank); filed locally. 11). (U) MSG David Maffett, NBC NCO, 800th MP Brigade, * GOMOR from LTG McKiernan, Commander CFLCC, on 25 May 2003, for violation of CENTCOM General Order #1, consuming alcohol; filed locally. 12) (U) SGM Marc Emerson, Operations SGM, 320th MP Battalion, * Two GO Letters of Concern and a verbal reprimand from BG Karpinski, Commander 800th MP Brigade, for failing to adhere to the guidance/directives given to him by BG Karpinski; filed locally. d. (U) Saluting of officers was sporadic and not enforced. LTC Robert P. Walters, Jr., Commander of the 165th Military Intelligence Battalion (Tactical Exploitation), testified that the saluting policy was enforced by COL Pappas for all MI personnel, and that BG Karpinski approached COL Pappas to reverse the saluting policy back to a no-saluting policy as previously existed. (ANNEX 53) 19. (U) I find that individual Soldiers within the 800th MP Brigade and the 320th Battalion stationed throughout Iraq had very little contact during their tour of duty with either LTC (P) Phillabaum or BG Karpinski. BG Karpinski claimed, during her testimony, that she paid regular visits to the various detention facilities where her Soldiers were stationed. However, the detailed calendar provided by her Aide-de-Camp, 1LT Mabry, does not support her contention. Moreover, numerous witnesses stated that they rarely saw BG Karpinski or LTC (P) Phillabaum. (Multiple Witness Statements) 20. (U) In addition I find that psychological factors, such as the difference in culture, the Soldiers' quality of life, the real presence of mortal danger over an extended time period, and the failure of commanders to recognize these pressures contributed to the perversive atmosphere that existed at Abu Ghraib (BCCF) Detention Facility and throughout the 800th MP Brigade. (ANNEX 1). 21. As I have documented in other parts of this investigation, I find that there was no clear emphasis by BG Karpinski to ensure that the 800th MP Brigade Staff, Commanders, and Soldiers were trained to standard in detainee operations and proficiency or that serious accountability lapses that occurred over a significant period of time, particularly at Abu Ghraib (BCCF), were corrected. AR 15-6 Investigations regarding detainee escapes were not acted upon, followed up with corrective action, or disseminated to subordinate commanders or Soldiers. Brigade and unit SOPs for dealing with detainees if they existed at all, were not read or understood by MP Soldiers assigned the difficult mission of detainee operations. Following the abuse of several detainees at Camp Bucca in May 2003, I could find no evidence that BG Karpinski ever directed corrective training for her soldiers or ensured that MP Soldiers throughout Iraq clearly understood the requirements of the Geneva Conventions relating to the treatment of detainees. (Multiple Witness Statements and the Personal Observations of the Investigation Team ) 22. On 17 January 2004 BG Karpinski was formally admonished in writing by LTG Sanchez regarding the serious deficiencies in her Brigade. LTG Sanchez found that the performance of the 800th MP Brigade had not met the standards set by the Army or by CJTF-7. He found that incidents in the preceding six months had occurred that reflected a lack of clear standards, proficiency and leadership within the Brigade. LTG Sanchez also cited the recent detainee abuse at Abu Ghraib (BCCF) as the most recent example of a poor leadership climate that "permeates the Brigade." I totally concur with LTG Sanchez' opinion regarding the performance of BG Karpinski and the 800th MP Brigade. (ANNEX 102 and the Personal Observations of the Investigating Officer) RECOMMENDATIONS AS TO PART THREE OF THE INVESTIGATION: 1. (U) That BG Janis L. Karpinski, Commander, 800th MP Brigade be Relieved from Command and given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: * Failing to ensure that MP Soldiers at theater-level detention facilities throughout Iraq had appropriate SOPs for dealing with detainees and that Commanders and Soldiers had read, understood, and would adhere to these SOPs. * Failing to ensure that MP Soldiers in the 800th MP Brigade knew, understood, and adhered to the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. * Making material misrepresentations to the Investigation Team as to the frequency of her visits to her subordinate commands. * Failing to obey an order from the CFLCC Commander, LTG McKiernan, regarding the withholding of disciplinary authority for Officer and Senior Noncommissioned Officer misconduct. * Failing to take appropriate action regarding the ineffectiveness of a subordinate Commander, LTC (P) Jerry Phillabaum. * Failing to take appropriate action regarding the ineffectiveness of numerous members of her Brigade Staff including her XO, S-1, S-3, and S-4. * Failing to properly ensure the results and recommendations of the AARs and numerous 15-6 Investigation reports on escapes and shootings (over a period of several months) were properly disseminated to, and understood by, subordinate commanders. * Failing to ensure and enforce basic Soldier standards throughout her command. * Failing to establish a Brigade METL. * Failing to establish basic proficiency in assigned tasks for Soldiers throughout the 800th MP Brigade. * Failing to ensure that numerous and reported accountability lapses at detention facilities throughout Iraq were corrected. 2. (U) That COL Thomas M. Pappas, Commander, 205th MI Brigade, be given a General Officer Memorandum of Reprimand and Investigated UP Procedure 15, AR 381-10, US Army Intelligence Activities for the following acts which have been previously referred to in the aforementioned findings: * Failing to ensure that Soldiers under his direct command were properly trained in and followed the IROE. * Failing to ensure that Soldiers under his direct command knew, understood, and followed the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. * Failing to properly supervise his soldiers working and "visiting" Tier 1 of the Hard-Site at Abu Ghraib (BCCF). 3. (U) That LTC (P) Jerry L. Phillabaum, Commander, 320th MP Battalion, be Relieved from Command, be given a General Officer Memorandum of Reprimand, and be removed from the Colonel/O-6 Promotion List for the following acts which have been previously referred to in the aforementioned findings: * Failing to properly ensure the results, recommendations, and AARs from numerous reports on escapes and shootings over a period of several months were properly disseminated to, and understood by, subordinates. * Failing to implement the appropriate recommendations from various 15-6 Investigations as specifically directed by BG Karpinski. * Failing to ensure that Soldiers under his direct command were properly trained in Internment and Resettlement Operations. * Failing to ensure that Soldiers under his direct command knew and understood the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. * Failing to properly supervise his soldiers working and "visiting" Tier 1 of the Hard-Site at Abu Ghraib (BCCF). * Failing to properly establish and enforce basic soldier standards, proficiency, and accountability. * Failure to conduct an appropriate Mission Analysis and to task organize to accomplish his mission. 4. (U) That LTC Steven L. Jordan, Former Director, Joint Interrogation and Debriefing Center and Liaison Officer to 205th Military Intelligence Brigade, be relieved from duty and be given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: * Making material misrepresentations to the Investigating Team, including his leadership roll at Abu Ghraib (BCCF). * Failing to ensure that Soldiers under his direct control were properly trained in and followed the IROE. * Failing to ensure that Soldiers under his direct control knew, understood, and followed the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. * Failing to properly supervise soldiers under his direct authority working and "visiting" Tier 1 of the Hard-Site at Abu Ghraib (BCCF). 5. (U) That MAJ David W. DiNenna, Sr., S-3, 320th MP Battalion, be Relieved from his position as the Battalion S-3 and be given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: * Received a GOMOR from LTG McKiernan, Commander CFLCC, on 25 May 2003, for dereliction of duty for failing to report a violation of CENTCOM General Order #1 by a subordinate Field Grade Officer and Senior Noncommissioned Officer, which he personally observed; GOMOR was returned to Soldier and not filed. * Failing to take corrective action and implement recommendations from various 15-6 investigations even after receiving a GOMOR from BG Karpinski, Commander 800th MP Brigade, on 10 November 03, for failing to take corrective security measures as ordered; GOMOR was filed locally. * Failing to take appropriate action and report an incident of detainee abuse, whereby he personally witnessed a Soldier throw a detainee from the back of a truck. 6. (U) That CPT Donald J. Reese, Commander, 372nd MP Company, be Relieved from Command and be given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: * Failing to ensure that Soldiers under his direct command knew and understood the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. * Failing to properly supervise his Soldiers working and "visiting" Tier 1 of the Hard-Site at Abu Ghraib (BCCF). * Failing to properly establish and enforce basic soldier standards, proficiency, and accountability. * Failing to ensure that Soldiers under his direct command were properly trained in Internment and Resettlement Operations. 7. (U) That 1LT Lewis C. Raeder, Platoon Leader, 372nd MP Company, be Relieved from his duties as Platoon Leader and be given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: * Failing to ensure that Soldiers under his direct command knew and understood the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. * Failing to properly supervise his soldiers working and "visiting" Tier 1 of the Hard-Site at Abu Ghraib (BCCF). * Failing to properly establish and enforce basic Soldier standards, proficiency, and accountability. * Failing to ensure that Soldiers under his direct command were properly trained in Internment and Resettlement Operations. 8. (U) That SGM Marc Emerson, Operations SGM, 320th MP Battalion, be Relieved from his duties and given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: * Making a material misrepresentation to the Investigation Team stating that he had "never" been admonished or reprimanded by BG Karpinski, when in fact he had been admonished for failing to obey an order from BG Karpinski to "stay out of the towers" at the holding facility. * Making a material misrepresentation to the Investigation Team stating that he had attended every shift change/guard-mount conducted at the 320th MP Battalion, and that he personally briefed his Soldiers on the proper treatment of detainees, when in fact numerous statements contradict this assertion. * Failing to ensure that Soldiers in the 320th MP Battalion knew and understood the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. * Failing to properly supervise his soldiers working and "visiting" Tier 1 of the Hard-Site at Abu Ghraib (BCCF). * Failing to properly establish and enforce basic soldier standards, proficiency, and accountability. * Failing to ensure that his Soldiers were properly trained in Internment and Resettlement Operations. 9. (U) That 1SG Brian G. Lipinski, First Sergeant, 372nd MP Company, be Relieved from his duties as First Sergeant of the 372nd MP Company and given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: * Failing to ensure that Soldiers in the 372nd MP Company knew and understood the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. * Failing to properly supervise his soldiers working and "visiting" Tier 1 of the Hard-Site at Abu Ghraib (BCCF). * Failing to properly establish and enforce basic soldier standards, proficiency, and accountability. * Failing to ensure that his Soldiers were properly trained in Internment and Resettlement Operations. 10. (U) That SFC Shannon K. Snider, Platoon Sergeant, 372nd MP Company, be Relieved from his duties, receive a General Officer Memorandum of Reprimand, and receive action under the Uniform Code of Military Justice for the following acts which have been previously referred to in the aforementioned findings: * Failing to ensure that Soldiers in his platoon knew and understood the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. * Failing to properly supervise his soldiers working and "visiting" Tier 1 of the Hard-Site at Abu Ghraib (BCCF). * Failing to properly establish and enforce basic soldier standards, proficiency, and accountability. * Failing to ensure that his Soldiers were properly trained in Internment and Resettlement Operations. * Failing to report a Soldier, who under his direct control, abused detainees by stomping on their bare hands and feet in his presence. 11. (U) That Mr. Steven Stephanowicz, Contract US Civilian Interrogator, CACI, 205th Military Intelligence Brigade, be given an Official Reprimand to be placed in his employment file, termination of employment, and generation of a derogatory report to revoke his security clearance for the following acts which have been previously referred to in the aforementioned findings: * Made a false statement to the investigation team regarding the locations of his interrogations, the activities during his interrogations, and his knowledge of abuses. * Allowed and/or instructed MPs, who were not trained in interrogation techniques, to facilitate interrogations by "setting conditions" which were neither authorized and in accordance with applicable regulations/policy. He clearly knew his instructions equated to physical abuse. 12. (U) That Mr. John Israel,Contract US Civilian Interpreter, CACI, 205th Military Intelligence Brigade, be given an Official Reprimand to be placed in his employment file and have his security clearance reviewed by competent authority for the following acts or concerns which have been previously referred to in the aforementioned findings: * Denied ever having seen interrogation processes in violation of the IROE, which is contrary to several witness statements. * Did not have a security clearance. 13. (U) I find that there is sufficient credible information to warrant an Inquiry UP Procedure 15, AR 381-10, US Army Intelligence Activities, be conducted to determine the extent of culpability of MI personnel, assigned to the 205th MI Brigade and the Joint Interrogation and Debriefing Center (JIDC) at Abu Ghraib (BCCF). Specifically, I suspect that COL Thomas M. Pappas, LTC Steve L. Jordan, Mr. Steven Stephanowicz, and Mr. John Israel were either directly or indirectly responsible for the abuses at Abu Ghraib (BCCF) and strongly recommend immediate disciplinary action as described in the preceding paragraphs as well as the initiation of a Procedure 15 Inquiry to determine the full extent of their culpability. (Annex 36) OTHER FINDINGS/OBSERVATIONS 1. (U) Due to the nature and scope of this investigation, I acquired the assistance of Col (Dr.) Henry Nelson, a USAF Psychiatrist, to analyze the investigation materials from a psychological perspective. He determined that there was evidence that the horrific abuses suffered by the detainees at Abu Ghraib (BCCF) were wanton acts of select soldiers in an unsupervised and dangerous setting. There was a complex interplay of many psychological factors and command insufficiencies. A more detailed analysis is contained in ANNEX 1 of this investigation. 2. (U) During the course of this investigation I conducted a lengthy interview with BG Karpinski that lasted over four hours, and is included verbatim in the investigation Annexes. BG Karpinski was extremely emotional during much of her testimony. What I found particularly disturbing in her testimony was her complete unwillingness to either understand or accept that many of the problems inherent in the 800th MP Brigade were caused or exacerbated by poor leadership and the refusal of her command to both establish and enforce basic standards and principles among its Soldiers. (ANNEX 45) 3. (U) Throughout the investigation, we observed many individual Soldiers and some subordinate units under the 800th MP Brigade that overcame significant obstacles, persevered in extremely poor conditions, and upheld the Army Values. We discovered numerous examples of Soldiers and Sailors taking the initiative in the absence of leadership and accomplishing their assigned tasks. a. (U) The 744th MP Battalion, commanded by LTC Dennis McGlone, efficiently operated the HVD Detention Facility at Camp Cropper and met mission requirements with little to no guidance from the 800th MP Brigade. The unit was disciplined, proficient, and appeared to understand their basic tasks. b. (U) The 530th MP Battalion, commanded by LTC Stephen J. Novotny, effectively maintained the MEK Detention Facility at Camp Ashraf. His Soldiers were proficient in their individual tasks and adapted well to this highly unique and non-doctrinal operation. c. (U) The 165th MI Battalion excelled in providing perimeter security and force protection at Abu Ghraib (BCCF). LTC Robert P. Walters, Jr., demanded standards be enforced and worked endlessly to improve discipline throughout the FOB. 4. (U) The individual Soldiers and Sailors that we observed and believe should be favorably noted include: a. (U) Master-at-Arms First Class William J. Kimbro, US Navy Dog Handler, knew his duties and refused to participate in improper interrogations despite significant pressure from the MI personnel at Abu Ghraib. b. (U) SPC Joseph M. Darby, 372nd MP Company discovered evidence of abuse and turned it over to military law enforcement. c. (U) 1LT David O. Sutton, 229th MP Company, took immediate action and stopped an abuse, then reported the incident to the chain of command. CONCLUSION 1. (U) Several US Army Soldiers have committed egregious acts and grave breaches of international law at Abu Ghraib/BCCF and Camp Bucca, Iraq. Furthermore, key senior leaders in both the 800th MP Brigade and the 205th MI Brigade failed to comply with established regulations, policies, and command directives in preventing detainee abuses at Abu Ghraib (BCCF) and at Camp Bucca during the period August 2003 to February 2004. 2. (U) Approval and implementation of the recommendations of this AR 15-6 Investigation and those highlighted in previous assessments are essential to establish the conditions with the resources and personnel required to prevent future occurrences of detainee abuse. Annexes 1. Psychological Assessment 2. Request for investigation from CJTF-7 to CENTCOM 3. Directive to CFLCC from CENTCOM directing investigation 4. Appointment Memo from CFLCC CDR to MG Taguba 5. 15-6 Investigation 9 June 2003 6. 15-6 Investigation 12 June 2003 7. 15-6 Investigation 13 June 2003 8. 15-6 Investigation 24 November 2003 9. 15-6 Investigation 7 January 2004 10. 15-6 Investigation 12 January 2004 11. SIR 5 November 2003 12. SIR 7 November 2003 13. SIR 8 November 2003 14. SIR 13 December 2003 15. SIR 13 December 2003 16. SIR 13 December 2003 17. SIR 17 December 2003 18. Commander's Inquiry 26 January 2004 19. MG Ryder's Report, 6 November 2003 20. MG Miller's Report, 9 September 2003 21. AR 190-8, Enemy Prisoners of War, Retained Personnel, Civilian Internees, and Other Detainees, 1 October 1997 22. FM 3-19.40, Military Police Internment/Resettlement Operations, 1 August 2001 23. FM 34-52, Intelligence Interrogation, 28 September 1992 24. Fourth Geneva Convention, 12 August 1949 25. CID Report on criminal abuses at Abu Ghraib, 28 January 2004 26. CID Interviews, 10-25 January 2004 27. 800th MP Brigade Roster, 29 January 2004 28. 205th MI Brigade's IROE, Undated 29. TOA Order (800th MP Brigade) and letter holding witnesses 30. Investigation Team's witness list 31. FRAGO #1108 32. Letters suspending several key leaders in the 800th MP Brigade and Rating Chain with suspensions annotated 33. FM 27-10, Military Justice, 6 September 2002 34. CID Report on abuse of detainees at Camp Bucca, 8 June 2003 35. Article 32 Findings on abuse of detainees at Camp Bucca, 26 August 2003 36. AR 381-10, 1 July 1984 37. Excerpts from log books, 320th MP Battalion 38. 310th MP Battalion's Inprocessing SOP 39. 320th MP Battalion's "Change Sheet" 40. Joint Interrogation and Debriefing Center's (JIDC) Slides, Undated 41. Order of Battle Slides, 12 January 2004 42. Joint Publication 0-2, Unified Actions Armed Forces, 10 July 2001 43. General Officer Memorandums of Reprimand 44. 800th MP Battalion's TACSOP 45. BG Janis Karpinski, Commander, 800th MP Brigade 46. COL Thomas Pappas, Commander, 205th MI Brigade 47. COL Ralph Sabatino, CFLCC Judge Advocate, CPA Ministry of Justice 48. LTC Gary W. Maddocks, S-5 and Executive Officer, 800th MP Brigade 49. LTC James O'Hare, Command Judge Advocate, 800th MP Brigade 50. LTC Robert P. Walters Jr., Commander, 165th MI Battalion (Tactical exploitation) 51. LTC James D. Edwards, Commander, 202nd MI Battalion 52. LTC Vincent Montera, Commander 310th MP Battalion 53. LTC Steve Jordan, former Director, Joint Interrogation and Debriefing Center/LNO to the 205th MI Brigade 54. LTC Leigh A. Coulter, Commander 724th MP Battalion and OIC Arifjan Detachment, 800th MP Brigade 55. LTC Dennis McGlone, Commander, 744th MP Battalion 56. MAJ David Hinzman, S-1, 800th MP Brigade 57. MAJ William D. Proietto, Deputy CJA, 800th MP Brigade 58. MAJ Stacy L. Garrity, S-1 (FWD), 800th MP Brigade 59. MAJ David W. DiNenna, S-3, 320th MP Battalion 60. MAJ Michael Sheridan, XO, 320th MP Battalion 61. MAJ Anthony Cavallaro, S-3, 800th MP Brigade 62. CPT Marc C. Hale, Commander, 670th MP Company 63. CPT Donald Reese, Commander, 372nd MP Company 64. CPT Darren Hampton, Assistant S-3, 320th MP Battalion 65. CPT John Kaires, S-3, 310th MP Battalion 66. CPT Ed Diamantis, S-2, 800th MP Brigade 67. LTC Jerry L. Phillabaum, Commander, 320th MP Battalion 68. CPT James G. Jones, Commander, 229th MP Company 69. CPT Michael A. Mastrangelo, Jr., Commander, 310th MP Company 70. CPT Lawrence Bush, IG, 800th MP Brigade 71. 1LT Lewis C. Raeder, Platoon Leader, 372nd MP Company 72. 1LT Elvis Mabry, Aide-de-Camp to Brigade Commander, 800th MP Brigade 73. 1LT Warren E. Ford, II, Commander, HHC 320th MP Battalion 74. 2LT David O. Sutton, Platoon Leader, 229th MP Company 75. CW2 Edward J. Rivas, 205th MI Brigade 76. CSM Joseph P. Arrison, Command Sergeant Major, 320th MP Battalion 77. SGM Pascual Cartagena, Command Sergeant Major, 800th MP Brigade 78. CSM Timothy L. Woodcock, Command Sergeant Major, 310th MP Battalion 79. 1SG Dawn J. Rippelmeyer, First Sergeant, 977th MP Company 80. SGM Mark Emerson, Operations SGM, 320th MP Battalion 81. MSG Brian G. Lipinski, First Sergeant, 372nd MP Company 82. MSG Andrew J. Lombardo, Operations Sergeant, 310th MP Battalion 83. SFC Daryl J. Plude, Platoon Sergeant, 229th MP Company 84. SFC Shannon K. Snider, Platoon SGT, 372nd MP Company 85. SFC Keith A. Comer, 372nd MP Company 86. SSG Robert Elliot, Squad Leader, 372nd MP Company 87. SSG Santos A. Cardona, Army Dog Handler 88. SGT Michael Smith, Army Dog Handler 89. MA1 William J. Kimbro, USN Dog Handler 90. Mr. Steve Stephanowicz, US civilian contract Interrogator, CACI, 205th MI Brigade 91. Mr. John Israel, US civilian contract Interpreter, Titan Corporation, 205th MI Brigade 92. FM 3-19.1, Military Police Operations, 22 March 2001 93. CJTF-7 IROE and DROE, Undated 94. CJTF-7 Interrogation and Counter Resistance Policy, 12 October 2003 95. 800th MP Brigade Mobilization Orders 96. Sample Detainee Status Report, 13 March 2004 97. 530th MP Battalion Mission Brief, 11 February 2004 98. Memorandum for Record, CPT Ed Ray, Chief of Military Justice, CFLCC, 9 March 2004 99. SIR 14 January 2004 100. Accountability Plan Recommendations, 9 March 2004 101. 2LT Michael R. Osterhout, S-2, 320th MP Battalion 102. Memorandum of Admonishment from LTG Sanchez to BG Karpinski, 17 January 2004 103. Various SIRs from the 800th MP Brigade/320th MP Battalion 104. 205th MI Brigade SITREP to MG Miller, 12 December 2003 105. SGT William A. Cathcart, 372nd MP Company 106. 1LT Michael A. Drayton, Commander, 870th MP Company ---------------------------------------------------------------------------- ---- ---------------------------------------------------------------------------- -------------------------------------------------------------------------- http://www.melbourne.indymedia.org/news/2004/04/68363_comment.php Karpinski says. "At one point we were concerned they wouldn't want to leave." by st petersburg times Friday April 30, 2004 at 09:34 PM ...soldiers credit Brig. Gen. Janis Karpinski for making their tours here a little more palatable. "She's really caring," says Sgt. 1st Class Philip J. May of Pinellas Park. "She doesn't just talk the talk, she walks the walk." Iraq Her job: Lock up Iraq's bad guys Army Brig. Gen. Janis Karpinski, the lone female commander in Iraq, runs the prison system that once was an apparatus of terror. By SUSAN TAYLOR MARTIN, Times Senior Correspondent Published December 14, 2003 BAGHDAD - A few weeks ago, Janis Karpinski was in the middle of a briefing when a man suddenly reached out and grabbed her. Crass? No, just a nervous soldier trying to protect the commanding officer as an Iraqi mortar exploded a few dozen yards away. "A mortar will get your attention real fast," Karpinski says, "and it can be an indication of other things to come." Such are the daily distractions for Karpinski, a brigadier general and the only female U.S. commander in Iraq. Since June, the 50-year-old Karpinski has been in charge of the country's prison system, including the once-infamous Abu Ghraib, where Saddam Hussein's political opponents were tortured and hanged. Karpinski is also responsible for 3,400 National Guard and Army reservists deployed from the Persian Gulf to the northern city of Mosul. Among them is a military police unit from St. Petersburg that helps guard Abu Ghraib, renamed Baghdad Central and now housing hundreds of garden-variety criminals as well as those accused of violence against coalition troops. "The threat level has increased all through the country," Karpinski says. "They're getting smarter, they're more capable of these little insurgencies and attacks." Given the constant threat of danger, Karpinski is quick to admit that "nobody wants to stay in Iraq a day longer than he has to." But soldiers credit her for making their tours here a little more palatable. "She's really caring," says Sgt. 1st Class Philip J. May of Pinellas Park. "She doesn't just talk the talk, she walks the walk." So far, Karpinski has lost 15 people under her command to combat-related incidents, including a father killed by a mortar before he got to see his 2-month-old baby. She sends personal letters to the families and tries to attend all memorial services in Iraq. Karpinski also does what she can to make life easier for troops on a day-to-day basis. "I love my soldiers," she says. "When I ask if there's a problem or I hear of a problem, I make every effort to resolve it, and if I can't, I tell them why I can't or why the system can't. There's no lip service." Karpinski understands the trials of separation. She has no children, but her husband of 29 years, a lieutenant colonel, works with the U.S. Embassy in the small Arab nation of Oman. Among the few times she has seen him in recent months was last summer when he presented her with flowers as she assumed command of the 800th Military Police Brigade. Like her colleagues, Karpinski lives in desert camouflage, Kevlar vest and combat boots. Her blond hair is braided and coiled in a tight bun; her ice blue eyes, devoid of makeup, fix listeners with a friendly, if unflinching gaze. The brigade is based near Baghdad International Airport in what used to be Hussein's private sports preserve. The setting is almost paradisiacal with small palaces surrounding a man-made lake. "Everyone assigned here carries on the tradition of fishing," Karpinski notes, leading the way across a narrow footbridge as the setting sun casts a golden light over palms and rushes. "It's beautiful, but in the summer it's every bit as hot as elsewhere - 140 degrees." Karpinski's operations center is in a former "love nest" of one of Hussein's sons. Instead of lurid murals, the walls are now covered with giant maps of Baghdad Central Correctional Facility and the Middle East. The room used to be bright and sunny; after the mortar attacks, all the windows were boarded with plywood. From here, Karpinski oversees 15 prisons and detention facilities throughout southern and central Iraq. During Hussein's day, it was not a corrections system but one of "intimidation and torture," she says. At Abu Ghraib, the most notorious prison, 150 inmates were crammed into cells designed for 24. The torture chamber was next to the hanging chamber, whose clanging iron trap doors were a vivid reminder of the fate awaiting those who refused to pledge loyalty to the regime. In the fall of 2002, Hussein unexpectedly released thousands of rapists, murderers and other criminals for reasons still not totally clear. Left virtually unoccupied, the prisons were plundered after the war. "Looters had a field day. They stole all the doors, the windows and in some locations, they took the bricks out of the walls and the tile off the floor. They even pulled out the wiring. The prisons were in absolute disrepair when we came into Iraq." Baghdad Central and other prisons are undergoing extensive renovation, including the addition of ceiling fans, toilets and showers. Whereas detainees used to cry at the very thought of Abu Ghraib, for many the "living conditions now are better in prison than at home," Karpinski says. "At one point we were concerned they wouldn't want to leave." About 9,000 of the men, women and juveniles in custody throughout Iraq are "civilian prisoners" charged with theft and other common crimes. In all but the most serious cases, they are released within a few weeks or months. Other prisoners, said to number a few thousand Iraqis and foreigners, are "security detainees" suspected of crimes against the coalition. Within 72 hours, they are informed of the charges against them. They also are entitled to a review by a coalition military committee, with followup reviews every six months. "It's really a different situation from Guantanamo," says Karpinski, referring to the U.S. military base on Cuba where hundreds of terrorist suspects have been held for more than two years without charge. There is a third, even more closely guarded group of inmates - top officials of Hussein's regime, including Deputy Prime Minister Tariq Aziz. They are housed together under "appropriate arrangements;" Karpinski won't say more about them. At least once every three months, Karpinski tries to visit each prison, although she scaled back a bit as attacks against the coalition increased. "Make no mistake, I have the same concern for personal safety as everybody else, but I put a lot of other people at risk - my driver, my team. . . . But we can't put soldiers out there and say it's too dangerous to come see you." At most prisons, Iraqi guards now work side by side with coalition troops. There have been problems; some Iraqis failed to show up for work while others have been canned for taking bribes. One was fired for raping female inmates. It will be three to five years, Karpinski predicts, before Iraqis can completely take over the prison systems. "A lot of time the question is, "How do you feel about being in command of the unit in possibly the most important mission in Iraq?' I say, "A lot of the time I feel tired.' " Yet even as a 5-year-old, Karpinski wanted to be a soldier. One summer, she lined up her dolls in the back yard of her Rahway, N.J., home and wrote, "A-OK-U.S. Army" on them. Neighbors were startled to see her sitting on the sill of her second-floor bedroom window; Karpinski was imagining what it would be like to jump out of an airplane. "I think what attracted me originally was that the Army offered the opportunities to do all the exciting things I could never do as a school teacher or in any other capacity." Over a quarter-century career, Karpinski has made more than 100 parachute jumps, won a Bronze Star and served in Saudi Arabia during the Persian Gulf War. In 1987, she moved from the regular Army to the Reserves, but continued working in intelligence and MP positions in the United States and the Mideast. Karpinski notes, with pride, that female soldiers under her command do the same kind of work as men. "Over the last 10 years, (the Army) has become an example of how men and women of every religion and ethnic background are offered the same opportunities. Occasionally the good old boy network is in place, but it used to be 90 percent of the time. Now it's 10 percent of the time." But Karpinski knows many people still regard female soldiers as a different breed, as shown by the attention to the story of Pvt. Jessica Lynch. "It did seem like a lot of hype, but she was probably the only female prisoner of war who was injured and dramatically rescued. . . . I don't think she wanted to be singled out other than as an example of a young soldier" - Karpinski stresses the word soldier - "caught in an unlikely scenario and rescued." In her civilian life, Karpinski is a consultant who runs grueling executive training programs for those hoping to scale the corporate ladder. The courses, which put participants under various kinds of stress, are "not a lot of fun . . . but are a true test of the toughness of an individual's mettle." An avid golfer, Karpinski and her husband, George, make their home on the resort island of Hilton Head, S.C. When a fire heavily damaged the house in 2001, he arrived from the Mideast two weeks later - after the cleanup was almost finished, she says with spousal bemusement. Now, the couple keeps in touch by e-mail and satellite phone. In her limited free time, Karpinski reads. She just finished Leadership by former New York City Mayor Rudolph Giuliani. "No matter how you slice it, it's all about leadership. . . . If anyone tells you they're not afraid, they're lying. Everybody is afraid, everybody is concerned, but they have confidence in their training and the commanders reinforce that." www.sptimes.com/2003/12/14/Worldandnation/Her_job__Lock_up_Iraq.shtml ---------------------------------------------------------------------------- -------------------------------------- Torture At Abu Ghraib May 3, 2004 Seymour M. Hersh /The New Yorker America is faced with the horrifying fact that US soldiers brutalized and sexually humiliated imprisoned Iraqis. The question remains: How far up the chain of command does the responsibility go? http://www.newyorker.com/fact/content/?040510fa_fact "A year ago I did give the speech from the carrier saying we had achieved an important objective, accomplished a mission, which was the removal of Saddam Hussein. And as a result, there are no longer torture chambers or rape rooms or mass graves in Iraq." -- George W. Bush (April 30, 2004) Torture At Abu Ghraib Seymour M. Hersh / The New Yorker (May 10, 2004) -- Last June, Janis Karpinski, an Army reserve brigadier general, was named commander of the 800th Military Police Brigade and put in charge of military prisons in Iraq. General Karpinski, the only female commander in the war zone, was an experienced operations and intelligence officer who had served with the Special Forces and in the 1991 Gulf War, but she had never run a prison system. Now she was in charge of three large jails, eight battalions, and thirty-four hundred Army reservists, most of whom, like her, had no training in handling prisoners. General Karpinski, who had wanted to be a soldier since she was five, is a business consultant in civilian life, and was enthusiastic about her new job. In an interview last December with the St. Petersburg Times, she said that, for many of the Iraqi inmates at Abu Ghraib, "living conditions now are better in prison than at home. At one point we were concerned that they wouldn't want to leave." A month later, General Karpinski was formally admonished and quietly suspended, and a major investigation into the Army's prison system, authorized by Lieutenant General Ricardo S. Sanchez, the senior commander in Iraq, was under way. A fifty-three-page report, obtained by The New Yorker, written by Major General Antonio M. Taguba and not meant for public release, was completed in late February. Its conclusions about the institutional failures of the Army prison system were devastating. Specifically, Taguba found that between October and December of 2003 there were numerous instances of "sadistic, blatant, and wanton criminal abuses" at Abu Ghraib. This systematic and illegal abuse of detainees, Taguba reported, was perpetrated by soldiers of the 372nd Military Police Company, and also by members of the American intelligence community... See entire article at: http://www.newyorker.com/fact/content/?040510fa_fact ---------------------------------------------------------------------------- ------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8578 From: James M. Atkinson Date: Wed May 5, 2004 6:20am Subject: Contractors Implicated in Prison Abuse Remain on the Job http://www.truthout.org/docs_04/050504C.shtml Contractors Implicated in Prison Abuse Remain on the Job By Joel Brinkley and James Glanz New York Times Wednesday 04 May 2004 More than two months after a classified Army report found that two contract workers were implicated in the abuse of Iraqis at a prison outside Baghdad, the companies that employ them say that they have heard nothing from the Pentagon, and that they have not removed any employees from Iraq. For one of the employees, the Army report recommended "termination of employment" and revocation of his security clearance. For the other, it urged an official reprimand and review of his security clearance. But J. P. London, chief executive of CACI, one of the companies involved, said in an interview on Monday that "we have not received any information or direction from the client regarding our work in country - no charges, no communications, no citations, no calls to appear at the Pentagon." Ralph Williams, vice president for communications for Titan, the other company, also said Monday that the company has heard nothing, and that none of Titan's workers have been recalled. Military spokesmen in Washington and Baghdad said Monday evening that they had no information on whether the workers were still on the job or why the report had not been conveyed to the companies. In a statement issued Monday, CACI defended its employees, saying they are well-trained former military personnel. The classified Army report asserted that at least one employee of CACI was among those "either directly or indirectly responsible for the abuses at Abu Ghraib," the Iraqi prison. It is unclear whether the second employee implicated works for CACI or Titan, since the Army report mentions both companies. Neither company would comment. CACI said in its statement that one of the men listed in the report "is not and never has been a CACI employee," but the statement did not name him. Companies with employees in Iraq usually refuse to identify them, citing security concerns. CACI International, a 41-year-old public company whose main business is information technology - it manages the State Department's e-mail system, for example - said it has opened its own investigation. But Dr. London noted with apparent irritation that the military still had not provided the company with a copy of the classified military report, completed Feb. 26, that makes allegations about CACI's employees. Two civilian contractors were cited in the report. One of them, Steven Stephaniwicz, is described as a civilian interrogator, an employee of CACI assigned to the 205th Military Intelligence Brigade. Dr. London said the company opened an intelligence service division in the late 1990's whose mission is "intelligence information collection, analysis, field support and human intelligence that could include these types of interviews." It remains a small part of the business, he added. Still, Joe Vafi, an analyst who follows the company for Jeffries & Company in San Francisco, said CACI "has hired a lot of former military, former intelligence." CACI was founded in 1962 as the California Analysis Center, Inc. But as its mission grew more diverse, it changed its name simply to CACI Inc., in 1973. It has about 9,400 employees and revenues of $843 million last year. About 63 percent of the company's business is under contract to the Defense Department and 29 percent to other federal agencies. The other contractor implicated, John Israel, identified as a civilian translator assigned to the same brigade, is described in one place in the Army report as a CACI employee and in another as an employee of Titan, which provides translators for the Army throughout Iraq. They and other civilian contractors, the report says, were allowed to "wander about" the prison "with too much unsupervised, free access to the detainee area." It further states that both Mr. Israel and Mr. Stephanowicz made false statements to investigators about their knowledge or participation in the abuses, and that Mr. Israel apparently did not have security clearance. Mr. Williams said Titan would not identify its employees working in Iraq but added, "we have no contracts that involve the physical handling of prisoners. The only service we provide is linguistic services." Though he would not confirm that Mr. Israel worked for Titan, he said all of Titan's employees are still on the job in Iraq. Titan, like CACI, is a public company that provides information and communication services under contract to federal defense and intelligence agencies. Founded in 1981, it has about 12,000 employees and revenues of about $2 billion a year. Neither Mr. Israel nor Mr. Stephanowicz could be located on Monday. The contracts for these workers are classified, the companies said. But Angela Styles, who served as an administrator for federal procurement policy in the Office of Management and Budget from 2001 to 2003, said the rules and statements of work governing federal contractors in this context are usually are quite broad. "I would be shocked if there was anything more specific than you will assist the D.O.D. with the detention of prisoners," she said. Allen Weiner, a professor of international law and diplomacy at Stanford University law school, said that ultimately the military commanders are responsible for the contractors' behavior. "The law of war which applies in times of intense brutality assumes a high degree of control by commanders for the acts of their subordinates," he said. But he added that, even with that responsibility, the commanders may not have had as much control as they would like. "One can assume," he said "that once the contract is let, there may not be the same formal operational control that one would expect through the chain of command." ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8579 From: Steven Donnell WA1YKL Date: Wed May 5, 2004 9:22am Subject: Re: Their Mothers Must Be So Proud Saddened, yes. Surprised,,, NO! Its what can ebe expected whenever you setup some group/person in a position of absolute power,,. Anyone taking bets as to if anyone above the rank of Col will take a hit for this? Most likely they will get the Military version of a "golden parachute"; Early retirement(w/ full pension of course,,)(then become a "private contractor" or consulatant). Steve "James M. Atkinson" wrote: > Usually our troops do things that make us proud, sometime not... this is a > case of the later. > > Funny how the MP's are going to take the fall, but that the Military > Intelligence officers who were directing their efforts will never be held > accountable. Curious that the Army tried (unsuccessfully) to keep > classified the actual methods of torture and abuse they were using on the > prisoners... methods that are forbidden under U.S. Law, and directly > forbidden by the UCMJ. ################################################################# ################################################################# ################################################################# ##### ##### ##### ################################################################# ################################################################# ################################################################# 8580 From: A Grudko Date: Wed May 5, 2004 10:34am Subject: RE: Report reveals scope of wiretaps -----Original Message----- From: NoPositiveWork@a... [mailto:NoPositiveWork@a...] > The Ali-related electronic surveillance, dating to June 2001, picked up conversations among 855 people, with the FBI listening to 36,668 conversations - an average of 94 a day, according to the report. I feel sorry for agents, special agents or precious agents who might be tasked with monitoring my phones - I have 2 teenage daughters! The endless discussions about Brittany, Brad, Days of Our Lives and Survivor must surely drive even the most hardened of agents to suck on their Glock. But if they persist they will probably hear me plot the overthrow of the US government using a fiendish device called an election or WMD (Willing Mass Democracy). Now that I have confessed, if I am found tomorrow with a 9mm round from a Glock in my head you will know that THEY caught up with me (Unlike some US agents, I don't own a Glock - I prefer good old S&W and Colt). Andy Grudko (British), DPM, Grad IS (South Africa) Consulting Investigator, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , andy@g... Pretoria (+27 12) 244 0255 - 244 0256 (Fax) Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.667 / Virus Database: 429 - Release Date: 2004/04/23 [Non-text portions of this message have been removed] 8581 From: Ocean Group Date: Wed May 5, 2004 2:47pm Subject: RE: Their Mothers Must Be So Proud People that don't accept that torture is used by intell officers to generate leads seems pretty naÔve to me. I'm sure the generals don't get glossy photos of their men kicking the crap outta some poor Iraqi, but I'll be damned if they don't have a good idea on what goes on. This went on up north for a long time with the british services, in Iraqi, well, actually in all Arab nations, the US have piss poor HUMINT. Bar when they offer 20 million quid, and well, forceful interrogation is just a way to get the info they need. If I was an iraqi and my family "accidently" became a civilian casualty from precision strikes and the marines picked my ass up for questioning to ask the whereabouts of some of my colleagues, I wouldn't give up a word. Unless they hooked wires up to me and smashed my teeth out, then I would reconsider the request. Sure, sometimes they are fed bull, but every man has their breaking point. Every man. Pain has a funny way of making people look at things in a different light. Ask the Israelis, the masters at near killing someone and getting the info they want. This stuff goes on, especially by world leading nations intell people. School of americas etc, it wasn't a play school you know. Why should anything have changed.....? **************** Message: 18 Date: Wed, 5 May 2004 11:06:47 +0100 From: "David Alexander" Subject: RE: Their Mothers Must Be So Proud I can't believe that this behaviour was sanctioned. A blind eye turned, possibly. I trained as a military pilot and that included resistance to interrogation techniques. We were always taught that we (NATO) don't use physical techniques such as this because the prisoner will say what he thinks wants you hear just to make the pain and humiliation stop. You can't trust what you are told if you extract information this way. Psychological techniques, coupled with sleep deprivation and fatigue are the sure-fire winners every time. Most break in less than 36 hours under this regime. David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 8582 From: srhayes3 Date: Wed May 5, 2004 3:34pm Subject: Looking for additional mentors Are there any other list members who currently work for or have in the past(5-10 years)been employed in the intelligence community performing TSCM, that would be interested in corresponding with me directly? 8583 From: Robin Hunter Date: Wed May 5, 2004 7:27am Subject: RE-Their Mothers Must Be So Proud Ocean Group said; "This went on up north for a long time with the british services" I would be interested to know from what standpoint and personal experience you are making a statement like that? ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. [Non-text portions of this message have been removed] 8584 From: James M. Atkinson Date: Thu May 6, 2004 5:19am Subject: Torture report may have broken classification rules From the FAS Project on Government Secrecy Volume 2004, Issue No. 42 Wednesday 05 May 2004 Torture report may have broken classification rules By classifying an explosive report on the torture of Iraqi prisoners as "Secret," the Pentagon may have violated official secrecy policies, which prohibit the use of classification to conceal illegal activities. The report, authored by Maj. Gen. Antonio Taguba, found that "between October and December 2003, at the Abu Ghraib Confinement Facility, numerous incidents of sadistic, blatant, and wanton criminal abuses were inflicted on several detainees." "The allegations of abuse were substantiated by detailed witness statements and the discovery of extremely graphic photographic evidence," Gen. Taguba wrote. These specific observations, and the report as a whole, were classified "Secret / No Foreign Dissemination." Why the secrecy? "There's clearly nothing in there that's inherently secret, such as intelligence sources and methods or troop movements," an astute reporter noted at a Pentagon press briefing on May 4. "Was this kept secret because it would be embarrassing to the world, particularly the Arab world?" "I do not know specifically why it was labeled Secret," replied Gen. Peter Pace. Defense Secretary Donald Rumsfeld said he did not know why it was classified, either. "You'd have to ask the classifier," he said. But the classification may have been more than simply unnecessary. It might have been a violation of official policy, which forbids the use of secrecy to cover up crimes: "In no case shall information be classified in order to ... conceal violations of law, inefficiency, or administrative error [or to] prevent embarrassment to a person, organization, or agency...," according to Section 1.7 of Executive Order 12958, as amended by President Bush (EO 13292). In a lawyerly reading, the Pentagon might respond that the document was not specifically classified "in order" to conceal violations of law, even though that was the direct consequence, but for some other purpose. The fact remains that classification served to conceal illegal activity for months, if not longer. Furthermore, there is no effective mechanism to enforce even the executive branch's own standards and policies on classification. Rather, the Abu Ghraib torture scandal came to light through an unauthorized disclosure of classified information, for which one must be sadly grateful. The report on torture at Abu Ghraib prison is apparently still classified. But it is now widely available on the internet, including here: Abu Ghraib and the failure of strategic influence Disclosure of the torture of Iraqi prisoners by American soldiers at Abu Ghraib prison in Iraq has dealt a profound blow to U.S. government efforts to communicate a positive, constructive message to the Islamic world. The excellence of current communications technologies was supposed to give the U.S. an advantage in exercising influence abroad. Instead, all of the latest technologies of global communication have been harnessed to transmit images of U.S. torture and sexual humiliation to every corner of the globe. Probably never before has such documentation of human rights abuses been disseminated so widely and so quickly. That wasn't part of the plan. The development of "information operations" as a tool of American foreign policy was discussed and critiqued in two research reports written last year by U.S. Army officers. "No wizardry in communications can make bad policy decisions or actions palatable [to foreign audiences]. However, having a competent strategic influence campaign is essential to U.S. victory in the War on Terrorism," wrote Lt. Col. Susan L. Gough. Yet "the initial strategic influence efforts of the Bush Administration ... revealed a typically American myopic viewpoint: Americans assume that other people think as they do and want the same things that American do -- that other people want to be like Americans." See "The Evolution of Strategic Influence by Lt. Col. Susan L. Gough, U.S. Army War College, April 2003. In a more upbeat assessment, Col. Brad M. Ward asserted in another Army War College study that "The Department of Defense maintains very robust and relatively sophisticated influence mechanisms to inform and influence foreign audiences at the operational and tactical levels during peacetime and in war." See "Strategic Influence Operations -- The Information Connection," by Col. Brad M. Ward, April 2003. But it is not clear that the Bush Administration has a compelling message to offer the Arab world. The new U.S.-funded Arabic satellite TV station, Al Hurra, last week included in its programming a profile of actress Goldie Hawn, "which will certainly do little to advance the cause of democracy in the Arab and Muslim worlds," wrote independent critic Stephen Schwartz. See "Mideast Media Mess" by Stephen Schwartz, TechCentralStation.com, May 3. Congress performed classification policy review (or not) Congress has completed the review of classification policy that was recommended last year by the Congressional Joint Inquiry into September 11, said Senate Intelligence Committee chairman Pat Roberts in a speech this week. But he may be mistaken. The classification system is in need of significant reform, the Congressional Joint Inquiry indicated in one of its nineteen recommendations, made public in July 2003. "Congress should ... review the statutes, policies and procedures that govern the national security classification of intelligence information and its protection from unauthorized disclosure. Among other matters, Congress should consider the degree to which excessive classification has been used in the past and the extent to which the emerging threat environment has greatly increased the need for real-time sharing of sensitive information," according to Recommendation Number 15. That has now been accomplished, said Sen. Roberts in a May 3 speech at Kansas State University. "Congress has implemented four [of the 19] changes: a national watch-list center, a terrorist information fusion center, oversight of the Patriot Act, and a review of classification policy." This is "good news," he said. But it's not good news, because intelligence classification policy is unchanged. CIA classification practices are as arbitrary and poorly justified as ever. The Congressional review of classification, if it occurred, has left the world as it was. However, it may not have occurred. "I am not aware of any classification policy review having been done," said Bill Duhnke, the staff director of the Senate Intelligence Committee. "I think the Chairman must have misspoken," he told Secrecy News. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8585 From: Steve Weinert Date: Thu May 6, 2004 4:34pm Subject: Fluke Recall List Members - Just an FYI Steve W --- Subject: News from CPSC - Recall NEWS from CPSC U.S. Consumer Product Safety Commission Office of Information and Public Affairs Washington, DC 20207 FOR IMMEDIATE RELEASE May 3, 2004 Release # 04-131 Firm's Hotline: (888) 401-9940 CPSC Consumer Hotline: (800) 638-2772 CPSC Media Contact: (301) 504-7908 CPSC, Fluke Corp. Announce Recall of Electrical Testing Components WASHINGTON, D.C. - The U.S. Consumer Product Safety Commission announces the following recall in voluntary cooperation with the firm below. Consumers should stop using recalled products immediately unless otherwise instructed. Name of product: Modular Test Leads used for Electrical Testing Multimeters Units: About 110,000 Manufacturer: Fluke Corporation, of Everett, Wash. Hazard: The leads, which are used to connect probes to handheld digital multimeters when testing for the presence and amount of voltage present in electrical circuitry, can result in incorrect multimeter readings. This poses a serious shock or electrocution hazard if the consumer touches live wires that the meter has read as having no electrical current. Fluke has received 29 reports of the leads for Fluke multimeters operating improperly, though no injuries have been reported. Incidents/Injuries: Fluke has received 29 reports of the leads for Fluke multimeters operating improperly, though no injuries have been reported. Description: The recalled test leads are red and black with no permanent probes attached. They have the Fluke logo on the connector ends. They were sold individually, as well as with a variety of Fluke multimeters and accessory kits. The recall includes only Fluke Model TL221, TL222 and TL224 test leads. The model numbers are not written on the test leads, but are written on the packaging or on product documents. The recall does not include Fluke test leads with permanently attached test probes, and does not include test leads with a SureGrip(tm) symbol, shown below, either on a tag around the silicon wire or molded onto the connector end. Fluke test leads with a SureGrip(tm) symbol are not included in the recall. Sold at: Home and hardware stores and electrical distributors nationwide from December 2002 through March 2004. The leads sold individually for about $18. Fluke multimeters and accessory kits containing these leads sold for between $45 and $450. Manufactured in: China Remedy: Consumers should stop using the recalled modular test leads immediately and contact Fluke for information on getting free replacement components. Consumer Contact: Consumers should call Fluke toll-free at (888) 401-9940 between 5 a.m. and 4 pm PT Monday through Friday. Consumers also can access Fluke's Web site at www.fluke.com. Fluke has sent direct notice to known purchasers. To see a picture of the recalled product please go to: http://www.cpsc.gov/cpscpub/prerel/prhtml04/04131.html The U.S. Consumer Product Safety Commission is charged with protecting the public from unreasonable risks of serious injury or death from more than 15,000 types of consumer products under the agency's jurisdiction. Deaths, injuries and property damage from consumer product incidents cost the nation more than $700 billion annually. The CPSC is committed to protecting consumers and families from products that pose a fire, electrical, chemical, or mechanical hazard or can injure children. The CPSC's work to ensure the safety of consumer products - such as toys, cribs, power tools, cigarette lighters, and household chemicals - contributed significantly to the 30 percent decline in the rate of deaths and injuries associated with consumer products over the past 30 years. To report a dangerous product or a product-related injury, call CPSC's hotline at (800) 638-2772 or CPSC's teletypewriter at (800) 638-8270, or visit CPSC's web site at www.cpsc.gov/talk.html. Consumers can obtain this release and recall information at CPSC's Web site at www.cpsc.gov. 8586 From: kondrak Date: Thu May 6, 2004 6:49pm Subject: Re: Torture report may have broken classification rules Sad part is some Army grunts are going to get the shaft for this, and the Intel people who did all the torture are going to so typically walk... At 06:19 5/6/2004, you wrote: > From the FAS Project on Government Secrecy > Volume 2004, Issue No. 42 > > Wednesday 05 May 2004 > > Torture report may have broken classification rules > > By classifying an explosive report on the torture of Iraqi prisoners >as "Secret," the Pentagon may have violated official secrecy policies, >which prohibit the use of classification to conceal illegal activities. > > The report, authored by Maj. Gen. Antonio Taguba, found that "between >October and December 2003, at the Abu Ghraib Confinement Facility, >numerous incidents of sadistic, blatant, and wanton criminal abuses were >inflicted on several detainees." > > "The allegations of abuse were substantiated by detailed witness >statements and the discovery of extremely graphic photographic evidence," >Gen. Taguba wrote. > > These specific observations, and the report as a whole, were >classified "Secret / No Foreign Dissemination." > > Why the secrecy? > "There's clearly nothing in there that's inherently secret, such as >intelligence sources and methods or troop movements," an astute reporter >noted at a Pentagon press briefing on May 4. "Was this kept secret because >it would be embarrassing to the world, particularly the Arab world?" > > "I do not know specifically why it was labeled Secret," replied Gen. >Peter Pace. > > Defense Secretary Donald Rumsfeld said he did not know why it was >classified, either. "You'd have to ask the classifier," he said. > > But the classification may have been more than simply unnecessary. It >might have been a violation of official policy, which forbids the use of >secrecy to cover up crimes: > >"In no case shall information be classified in order to ... conceal >violations of law, inefficiency, or administrative error [or to] prevent >embarrassment to a person, organization, or agency...," according to >Section 1.7 of Executive Order 12958, as amended by President Bush (EO >13292). > > In a lawyerly reading, the Pentagon might respond that the document >was not specifically classified "in order" to conceal violations of law, >even though that was the direct consequence, but for some other purpose. > > The fact remains that classification served to conceal illegal >activity for months, if not longer. > > Furthermore, there is no effective mechanism to enforce even the >executive branch's own standards and policies on classification. Rather, >the Abu Ghraib torture scandal came to light through an unauthorized >disclosure of classified information, for which one must be sadly >grateful. > > The report on torture at Abu Ghraib prison is apparently still >classified. But it is now widely available on the internet, including >here: > > Abu Ghraib and the failure of strategic influence > Disclosure of the torture of Iraqi prisoners by American soldiers at >Abu Ghraib prison in Iraq has dealt a profound blow to U.S. government >efforts to communicate a positive, constructive message to the Islamic >world. > > The excellence of current communications technologies was supposed to >give the U.S. an advantage in exercising influence abroad. > > Instead, all of the latest technologies of global communication have >been harnessed to transmit images of U.S. torture and sexual humiliation >to every corner of the globe. Probably never before has such documentation >of human rights abuses been disseminated so widely and so quickly. > > That wasn't part of the plan. > > The development of "information operations" as a tool of American >foreign policy was discussed and critiqued in two research reports written >last year by U.S. Army officers. > > "No wizardry in communications can make bad policy decisions or >actions palatable [to foreign audiences]. However, having a competent >strategic influence campaign is essential to U.S. victory in the War on >Terrorism," wrote Lt. Col. Susan L. Gough. > > Yet "the initial strategic influence efforts of the Bush >Administration ... revealed a typically American myopic viewpoint: >Americans assume that other people think as they do and want the same >things that American do -- that other people want to be like Americans." > > See "The Evolution of Strategic Influence by Lt. Col. Susan L. Gough, >U.S. Army War College, April 2003. > > In a more upbeat assessment, Col. Brad M. Ward asserted in another >Army War College study that "The Department of Defense maintains very >robust and relatively sophisticated influence mechanisms to inform and >influence foreign audiences at the operational and tactical levels during >peacetime and in war." > > See "Strategic Influence Operations -- The Information Connection," by >Col. Brad M. Ward, April 2003. > > But it is not clear that the Bush Administration has a compelling >message to offer the Arab world. > > The new U.S.-funded Arabic satellite TV station, Al Hurra, last week >included in its programming a profile of actress Goldie Hawn, "which will >certainly do little to advance the cause of democracy in the Arab and >Muslim worlds," wrote independent critic Stephen Schwartz. > > See "Mideast Media Mess" by Stephen Schwartz, TechCentralStation.com, >May 3. > > Congress performed classification policy review (or not) > Congress has completed the review of classification policy that was >recommended last year by the Congressional Joint Inquiry into September >11, said Senate Intelligence Committee chairman Pat Roberts in a speech >this week. But he may be mistaken. > > The classification system is in need of significant reform, the >Congressional Joint Inquiry indicated in one of its nineteen >recommendations, made public in July 2003. > > "Congress should ... review the statutes, policies and procedures that >govern the national security classification of intelligence information >and its protection from unauthorized disclosure. Among other matters, >Congress should consider the degree to which excessive classification has >been used in the past and the extent to which the emerging threat >environment has greatly increased the need for real-time sharing of >sensitive information," according to Recommendation Number 15. > > That has now been accomplished, said Sen. Roberts in a May 3 speech at >Kansas State University. > > "Congress has implemented four [of the 19] changes: a national >watch-list center, a terrorist information fusion center, oversight of the >Patriot Act, and a review of classification policy." > > This is "good news," he said. > > But it's not good news, because intelligence classification policy is >unchanged. CIA classification practices are as arbitrary and poorly >justified as ever. The Congressional review of classification, if it >occurred, has left the world as it was. > > However, it may not have occurred. > > "I am not aware of any classification policy review having been done," >said Bill Duhnke, the staff director of the Senate Intelligence Committee. > > "I think the Chairman must have misspoken," he told Secrecy News. > > > > > > > > >----------------------------------------------------------------------------------------------------- > > >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >----------------------------------------------------------------------------------------------------- > > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >----------------------------------------------------------------------------------------------------- > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 8587 From: Date: Thu May 6, 2004 3:53pm Subject: Re: Torture report may have broken classification rules In a message dated 5/6/2004 5:06:02 PM Pacific Standard Time, kondrak@s... writes: > Sad part is some Army grunts are going to get the shaft for this, and the > Intel people who did all the torture are going to so typically walk... "And this has what to do with TSCM?" [Non-text portions of this message have been removed] 8588 From: savanted1 Date: Thu May 6, 2004 3:09pm Subject: Officials take surveillance STEPs During the 2004 Kentucky Derby, federal, state, and local law enforcement and emergency responders tested the Spatial Templates for Emergency Preparedness (STEPs) system, a geospatial application linking handheld devices and surveillance cameras over wireless. The software, developed by PlanGraphics of Frankfort, Kentucky, collects geographic information form various databases to provide a web portal. Officials used STEPs to access maps of Churchill Downs with three-dimensional visualization, weather data, location of emergency personnel and vehicles, and video streams of traffic going to and from the race track in louisville and nearby Indiana. The exercise is a prelude to the Joint Warrior Interoperability Demonstration in 2005 involving military, state, and local officials. http://www.fcw.com/geb/articles/2004/0503/web-derby-05-05-04.asp 8589 From: James M. Atkinson Date: Thu May 6, 2004 8:58pm Subject: Think YOUR having a bad day? C:\Documents and Settings\User1\Application Data\Qualcomm\Eudora\attach\New Attachment Folder - Sec\gazelle.mpg ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8590 From: Ocean Group Date: Fri May 7, 2004 1:52pm Subject: How military radio communications are intercepted? This was an interesting read... ********* March 21, 2003 www.aeronautics.ru The US military is using SINCGARS (Single Channel Ground And Airborne Radio System) frequency-hopping radios in the field. These radio sets are categorized as Low Probability of Intercept (LPI) Frequency Hopping Spread Spectrum (FHSS) transceivers. The FHSS method is not new: it originated from the Second World War and, simply stated, it employs a narrow band carrier, shifting frequency in a pattern known only to the transmitter and the receiver. The frequency can be changed several hundred times per second. The FHSS military radios are synchronized daily to use the same frequency modulation algorithm. The synchronization process occurs either through a direct physical connection of the radio sets to each other or to a special device known as the programmer. Some radios can also synchronize frequency modulation algorithms via an encrypted transmission of the frequency modulation algorithm in a non-frequency-hopping mode, although this method is generally considered to be less secure. The military radios in the US armed forces commonly use encryption and the frequency hopping methods provide an additional layer of security during transmission of the encrypted signal. An example of a frequency-hopping field VHF/FM transceiver used by US Special Forces would be the Caracal RPM 4740 manufactured by Thales Communications of France. The Caracal covers the 30 to 87.975 MHz frequency range. It also has 10 programmable simplex or half-duplex channels out of its repertoire of 2,320. Hopping in narrowband (6.4 MHz) and wideband (30 to 87.975 MHz) orthogonal modes, Caracal contains high-grade internal digital encryption and has an output of 1 W. Insertion of frequency and security codes is accomplished using the MA 4073B programmer or MA 4083B fill gun. A reset switch on each radio is used to erase codes rapidly. The synchronization function is broadcast, requiring about 6 seconds. Other features include receive-only selective calling, frequency barring and `hailing' by fixed-frequency radios when in the hopping mode. However, security afforded by frequency-hopping methods is very dependant on the strict adherence to protocols for operating such radios. The US troops and other operators of frequency-hopping radio sets frequently disregard these protocols. An example would be an artillery unit passing digital traffic in the frequency-hopping mode, which would enable an unauthorized listener to determine the frequency-hopping algorithm and eavesdrop on the transmission. Even when proper protocols for using frequency-hopping radios are being adhered to interception and decryption of these signals is still possible. The frequency-hopping interceptors are special advanced reconnaissance wideband receivers capable of simultaneously tracking a large number of frequency-hopping encrypted transmissions even in high background noise environments. An example of such a reconnaissance device would be the FH-1 frequency-hopping interceptor manufactured by VIDEOTON-MECHLABOR Manufacturing and Development Ltd of Hungary. The FH-1 frequency-hopping interceptor is a modern reconnaissance system based on parallel signal processing technology. The equipment has 160 independent receiving channels covering a 4 MHz wide IF band with 25 kHz channel spacing, 60 dB channel selection and 60 dB intermodulation suppression. The 4 MHz wide IF band is the IF output of a special high-speed front-end receiver which has a 20 to 1,000 MHz frequency range. The digitized output signals of the channels are multiplexed and fed as 1 Mbits/s data to a fast dedicated signal-processing computer. As the processing time of the 160 channels is 200 µs with the front-end receiver 4 MHz frequency setting time, the processing speed of this interceptor is 4 MHz/200 µs or 20 GHz/s. This high speed makes it possible to process the complete 30 to 80 MHz ground-to-ground VHF band within a 2.5 ms time slot. The system's processing algorithm filters out noise spikes and stationary transmissions and in this way hopping transmissions can be classified either in the traditional frequency versus amplitude mode or in a waterfall-like frequency versus time display mode. Optional software modules are available for direction-finding the FH transmission and for controlling a remote follower/jammer. 8591 From: James M. Atkinson Date: Fri May 7, 2004 2:22pm Subject: Re: How military radio communications are intercepted? Good article, thanks for posting it. It brings up the point about how any LPI communications can be intercepted. Since detection is easier than reconstruction we need to be sensitive to how to detect this kind of threat, and should model such efforts on not just known threats (ie: 750-950 MHz), but also on root technologies and methodologies/trade craft used by the spy. My preferred method is to use a wide bandwidth spectrum analyzer (or receiver), directional antennas, and some good pre-amps... it makes short work of finding even the most classified of covert eavesdropping systems. -jma At 02:52 PM 5/7/2004, Ocean Group wrote: >This was an interesting read... > > >********* > >March 21, 2003 >www.aeronautics.ru > >The US military is using SINCGARS (Single Channel Ground And Airborne Radio >System) frequency-hopping radios in the field. These radio sets are >categorized as Low Probability of Intercept (LPI) Frequency Hopping Spread >Spectrum (FHSS) transceivers. The FHSS method is not new: it originated from >the Second World War and, simply stated, it employs a narrow band carrier, >shifting frequency in a pattern known only to the transmitter and the >receiver. The frequency can be changed several hundred times per second. > >The FHSS military radios are synchronized daily to use the same frequency >modulation algorithm. The synchronization process occurs either through a >direct physical connection of the radio sets to each other or to a special >device known as the programmer. Some radios can also synchronize frequency >modulation algorithms via an encrypted transmission of the frequency >modulation algorithm in a non-frequency-hopping mode, although this method >is generally considered to be less secure. > >The military radios in the US armed forces commonly use encryption and the >frequency hopping methods provide an additional layer of security during >transmission of the encrypted signal. An example of a frequency-hopping >field VHF/FM transceiver used by US Special Forces would be the Caracal RPM >4740 manufactured by Thales Communications of France. > >The Caracal covers the 30 to 87.975 MHz frequency range. It also has 10 >programmable simplex or half-duplex channels out of its repertoire of 2,320. >Hopping in narrowband (6.4 MHz) and wideband (30 to 87.975 MHz) orthogonal >modes, Caracal contains high-grade internal digital encryption and has an >output of 1 W. Insertion of frequency and security codes is accomplished >using the MA 4073B programmer or MA 4083B fill gun. A reset switch on each >radio is used to erase codes rapidly. The synchronization function is >broadcast, requiring about 6 seconds. Other features include receive-only >selective calling, frequency barring and `hailing' by fixed-frequency radios >when in the hopping mode. > >However, security afforded by frequency-hopping methods is very dependant on >the strict adherence to protocols for operating such radios. The US troops >and other operators of frequency-hopping radio sets frequently disregard >these protocols. An example would be an artillery unit passing digital >traffic in the frequency-hopping mode, which would enable an unauthorized >listener to determine the frequency-hopping algorithm and eavesdrop on the >transmission. > >Even when proper protocols for using frequency-hopping radios are being >adhered to interception and decryption of these signals is still possible. >The frequency-hopping interceptors are special advanced reconnaissance >wideband receivers capable of simultaneously tracking a large number of >frequency-hopping encrypted transmissions even in high background noise >environments. > >An example of such a reconnaissance device would be the FH-1 >frequency-hopping interceptor manufactured by VIDEOTON-MECHLABOR >Manufacturing and Development Ltd of Hungary. The FH-1 frequency-hopping >interceptor is a modern reconnaissance system based on parallel signal >processing technology. > >The equipment has 160 independent receiving channels covering a 4 MHz wide >IF band with 25 kHz channel spacing, 60 dB channel selection and 60 dB >intermodulation suppression. The 4 MHz wide IF band is the IF output of a >special high-speed front-end receiver which has a 20 to 1,000 MHz frequency >range. > >The digitized output signals of the channels are multiplexed and fed as 1 >Mbits/s data to a fast dedicated signal-processing computer. As the >processing time of the 160 channels is 200 µs with the front-end receiver 4 >MHz frequency setting time, the processing speed of this interceptor is 4 >MHz/200 µs or 20 GHz/s. This high speed makes it possible to process the >complete 30 to 80 MHz ground-to-ground VHF band within a 2.5 ms time slot. > >The system's processing algorithm filters out noise spikes and stationary >transmissions and in this way hopping transmissions can be classified either >in the traditional frequency versus amplitude mode or in a waterfall-like >frequency versus time display mode. Optional software modules are available >for direction-finding the FH transmission and for controlling a remote >follower/jammer. > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8592 From: James M. Atkinson Date: Fri May 7, 2004 2:11pm Subject: Passing the Hat I have had a number of list members ask me to provide some method by which donations can be made to my TSCM website to help defray the costs of maintaining it, and to help encourage it to grow. The site has become wildly successful, it gives away tens of thousands of pages of free information, and it has become the biggest repository on earth dedicated to finding bugs, and hunting spies. I have set up the following with Paypal to facilitate donations for the site: https://www.paypal.com/xclick/business=jmatk%40tscm.com&item_name=tscm.com&item_number=May+2004&no_note=1&tax=0¤cy_code=USD Many thanks go out to those who choose to donate. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8593 From: Ocean Group Date: Sat May 8, 2004 10:56am Subject: RE: Re: How military radio communications are intercepted? No problem, its one of those tech articles that give you a warm and fuzzy feeling on the inside! It regards to your post: I would agree that signal detection generally speaking is an easier process than signal data deconstruction, namely because of the many methods to code data, either through encryption or....some other methods which don't spring to mind! :) However, it gets to the state where eventually signal generators (tx's) are just too advanced for the equipment used to detect them. I had a look at a government sold detection system (basic system cost ~125k) recently with a sweep rate of 2.5Ghz/sec and I thought that was pretty good, I'd be interested to hear if anyone thinks this is good or whether they feel there are faster systems available...? Jim, I'd be interested to hear how you'd manage to detect an UWB system operating with the equipment suggested below? All the best O ******************* Message: 2 Date: Fri, 07 May 2004 15:22:51 -0400 From: "James M. Atkinson" Subject: Re: How military radio communications are intercepted? Good article, thanks for posting it. It brings up the point about how any LPI communications can be intercepted. Since detection is easier than reconstruction we need to be sensitive to how to detect this kind of threat, and should model such efforts on not just known threats (ie: 750-950 MHz), but also on root technologies and methodologies/trade craft used by the spy. My preferred method is to use a wide bandwidth spectrum analyzer (or receiver), directional antennas, and some good pre-amps... it makes short work of finding even the most classified of covert eavesdropping systems. -jma 8594 From: James M. Atkinson Date: Sat May 8, 2004 3:24pm Subject: Wildlife Warning For Golfers Wildlife Warning For Golfers The Montana State Department of Fish and Wildlife is advising golfers to take extra precautions and be on the alert for bears while in the Gallatin, Helena and Lewis and Clark National Forests golf courses. They advise golfers to wear noise-producing devices such as little bells on their clothing to alert, but not startle the bears unexpectedly. They also advise you to carry pepper spray in case of an encounter with a bear. It is also a good idea to watch for signs of bear activity. Golfers should be able to recognize the difference between black bear and grizzly bear droppings on the golf course. Black bear droppings are smaller and contain berries and possibly squirrel fur. Grizzly bear droppings have bells in them and smell like pepper spray. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8595 From: James M. Atkinson Date: Sat May 8, 2004 1:24pm Subject: CACI Stock Price will likely plummet CACI is trying to get involved in TSCM, and are scrambling to hire warm bodies to fill slots to compete with ITT. I wouldn't at all be surprised to see the stock price plummet into the single digit numbers as the investigation into prisoner torture fingers CACI being involved, and that this is not the only location where this has happened (only the first place it got caught on a camera). The book value of the stock is about 2.59 per share, and yet it is trading around 20 times that amount. Curiously, the company has good numbers for a computer consulting company (which they claim to be), but very, very bad numbers for a defense contractor (which they actually are). Historically, when a companies like this starts to hemorrhage bad news (such as employees getting torturing people) the book value drops to about an 1/8th the book value (which in this case works out to be $0.32 per share). Curious that 88% of the stock is held by institutions, including the British Government, and holding companies with strong links and/or controlled by U.S. intelligence agencies. A lot of the institutions are holding the stock for their mutual funds, which is a very, very bad idea due to the volatility of CACI's business operations. Given that 92% of the stock owned involves insider or mutual fund investments, and that mutual funds companies dump stocks on bad news I wouldn't be surprised to see the mutual funds dumping the stock in huge amounts around the end of the fiscal year for CACI on June 30. Sure CACI may be flush with cash for a while, which may provide some inflated numbers on paper, but it is extremely difficult for a company such as this to maintain long term strength when they are providing services instead of long term goods. --------------------------------- According to several Internet job sites, CACI has been recruiting interrogators, senior counterintelligence agents and intelligence analysts for work in Iraq for more than a year, requiring some to have active and current top-secret security clearances. An ad posted on Yahoo's HotJobs Web site in February, under the headline "Exciting intelligence opportunities in Iraq!," sought to recruit interrogators with two or more years "conducting tactical and strategic interrogations." Another posting on IntelligenceCareers.com lists opening for senior counterintelligence agent with 10 years experience and intelligence analysts with a minimum of three years' experience. Here is a typical example of one of their listings: This listing opened 07-May-04 and is valid for 90 days. Category: Analysts (Intelligence) & Knowledge Specialists Employment Type: full-time Security Requirements: Top Secret Job Description: Will analyze CI/HUMINT data pertinent to counter-terrorism, subversion, sabotage, espionage, paramilitary/insurgency, organized crime and threats to force protection and personnel and physical infrastructure security. Operates threat analysis systems. Provides mission essential continuity during transition of authority and throughout day to day operations. Coordinates with external CI/HUMINT activities (e.g. CJ2X, national elements, planning staffs). Produces reports, studies and briefings, and maintains CI database. Works all leads received from sources including CI/HUMINT teams, national level HUMINT platforms, Locally Employed Personnel (LEP) screening cell, host nation CI elements, and CID for possible exploitation. Utilizes multiple intelligence disciplines to support HUMINT reporting. Assists with technical control of the Tactical HUMINT Teams (THT); counterintelligence (CI) team with CI issues. Updates and maintains files, SOP's, and calendars. Assists to ensure Requests for Information, Source Directed Requirements, and HUMINT Collection Requirements are forwarded to appropriate HUMINT collection assets. Ensures that the HUMINT Collection focus is updated and routed for authorization prior to publication. Reviews collection products to ensure the collection focus is being met. Quality control of CI/HUMINT reports before release. Subject matter expert on HUMINT/CI related issues. CI/HUMINT Analyst/ASAS-L Data Base Manager: Primary duty as ASAS-Light Databaser. Receives HUMINT reports from CHAMS and other systems and imports in to ASAS-L. Receives other source reporting, performs link analysis, and links to existing ASAS-L records. Maintains all-source database integrity. REQUIREMENTS: Bachelor's degree in related field with military Intelligence training and 5 years technical experience OR 6 years' technical related experience and training. Ability to communicate effectively in writing and orally; work as a member of a team. Previous experience as a BN or BDE-level intelligence staff officer or NCO (35D, 96B) as or CI/HUMINT officer or NCO (35E, 97B, or 97E) is desired experience. Must have a current Top Secret with SCI Access. Some locations require individuals to work and live in a field environment with minimum medical facilities. Must possess the ability to work extended work hours in difficult surroundings for up to one year. Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information If you are ready to join a fast growing defense industry leader in overseas and wish to be considered for current opportunities, please send your resume today to Tina Ganoe at cacijobs@c.... CACI offers extremely competitive salaries and a comprehensive benefits packages to all our full time employees. All candidates must meet eligibility requirements to obtain a security clearance. CACI is an Equal Opportunity Employer M/F/D/V. Contact Information: How to Apply: You can submit your resume by any of the methods below. If you use one of these please reference the job requisition number in the subject line of your correspondence. Email to cacijobs@c... Counterintelligence/Human Intelligence Analyst Organization Profile: CACI is an established and highly respected technical and scientific consulting organization. Our 7500 employees are located at over 100 locations worldwide. Company Benefits: Highly competitive Benefits Package including Insurance (Medical, Dental, Vision, and Life), 10 paid holidays, vacation, tuition reimbursement and 401K programs. Overview of Opportunities: All disciplines with major emphasis on Information Technology skills; security clearances required for many positions. Company Locations: Corporate headquarters is in Arlington, VA. Have worldwide representation Also, Screeners/Interrogators - Iraq (JobNr 75764) CACI, International Job Number: -OCONUS IC JobID: 75764 Location of Position: Baghdad, Baghdad (Iraq) This listing opened 20-Aug-03 and is valid for 540 days. Category: Analysts (Intelligence) & Knowledge Specialists CyberCrime, Law Enforcement, Criminal Intelligence Linguistics and Translation Services Logistics & Transportation Systems Military Arts, Operations and Science Misc - Graphic Arts, Administration, etc. Security Management - Facility and Personnel Employment Type: full-time Security Requirements: US Citizen-Clearable Advertisement Job Description: Exciting OCONUS Positions Available!!! CACI, a leading provider of information technology, logistics, intelligence analysis, and security services for today's new era of defense, intelligence and e-government, is currently seeking top performers for exciting positions in Iraq. Current opportunities include: Screeners- Minimum requires include a Bachelor's degree or equivalent and 4 years of related law enforcement experience. Must be able to use a computer and efficient with Microsoft Word and Excel and be able to develop and present reports and briefings to the Military Chain of Command. Must possess a security clearance at the Secret Level. Interrogators- Minimum requires include a Bachelor's degree or equivalent and 7 years of conducting tactical and strategic interrogations. Must be able to use a computer and efficient with Microsoft Word and Excel and be able to review the data collected and cross-reference intelligence collection priorities and plans. Must possess a TS/SCI security clearance. Location requires individuals to work and live in a field environment with minimum medical facilities. Must possess the ability to work extended work hours in difficult surroundings for up to one year. CACI offers extremely competitive salaries and a comprehensive benefits package. If you are ready to join a growing defense industry leader current overseas opportunities, please send your resume today to: OCONUSjobs@c... CACI is an Equal Opportunity Employer M/F/D/V Here an interesting SEC extract from a recent annual report: SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 8-K/A CURRENT REPORT Pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934 November 18, 2003 (Date of Report) CACI International Inc (Exact name of registrant as specified in its Charter) Delaware 0-8401 54-1345899 (State of other jurisdiction of incorporation) (Commission File Number) (IRS Employer Identification Number) 1100 N. Glebe Road Arlington, Virginia 22201 (Address of principal executive offices)(ZIP code) (703) 841-7800 (Registrant's telephone number, including area code) ---------- ITEM 9: REGULATION FD DISCLOSURE On August 13, 2003 the Registrant released its financial results for the fourth quarter and full fiscal year 2003. A copy of the Registrant's press release announcing the financial results as well as the schedule for a conference call and "web cast" on August 14, 2003 are attached as Exhibit 99 to this current report on Form 8-K. EXHIBITS Exhibit Number 99.a Press Release dated August 13, 2003, announcing CACI's fourth quarter and fiscal year financial results. 99.b Transcript of August 14, 2003 conference call. SIGNATURE Pursuant to the requirements of the Securities Exchange Act of 1934, the Registrant has duly caused this report to be signed on its behalf by the undersigned hereunto duly authorized. CACI International Inc Registrant By: /s/ Jeffrey P. Elefante Jeffrey P. Elefante Executive Vice President, General Counsel and Secretary ---------- Exhibit 99.a CACI Reports Record Fourth Quarter and Full Fiscal Year 2003 Income from continuing operations up 43% in the quarter to $13.3 million; for the year, up 40% to $44.7 million Diluted earnings per share of $0.45 for the quarter, up 41%; $1.52 diluted earnings per share for the year, up 23% Operating cash flow of $34 million in the quarter; $76 million for the year, up 111% over FY2002 Revenue up 20% for the quarter to $228.6 million; for the year, up 24% to $843.1 million Arlington, VA, August 13, 2003 - CACI International Inc (NYSE: CAI), a leading information technology and network solutions provider to the federal government, announced today record results for its fourth quarter and fiscal year ending June 30, 2003 (FY03). Income from continuing operations in the quarter increased 43 percent while revenue was up 20 percent compared to the fourth quarter of fiscal year 2002 (FY02). For all of FY03, income from continuing operations was up 40 percent while revenue was up 24 percent versus a year ago. The increase in earnings and revenue in the quarter and for the full year resulted from continuing growth in all of the company's service offerings through its domestic operations. Fourth Quarter Results Reflect Higher Margins and Strong Cash Flow Net income for the fourth quarter of FY03 was $13.3 million, or $0.45 per diluted share, an increase of 43 percent over net income of $9.3 million, or $0.32 per diluted share, reported in the fourth quarter of FY02. Revenue for the quarter was $228.6 million, an increase of 20 percent over fourth quarter FY02 revenue of $191.0 million. Operating income in the quarter was $21.1 million, an increase of 43 percent over fourth quarter FY02 operating income of $14.7 million. For the fourth quarter the operating margin increased to 9.2 percent from 7.7 percent a year earlier. The higher operating margin was driven primarily by a favorable contract mix, specifically increased professional services revenue on higher margin time and material and fixed price contracts. The growth in net income was primarily attributable to increased sales to the company's federal customers and improved margin performance. Operating cash flow of $33.9 million was primarily driven by net income and cash collections. The growth of the company's operations continued to be driven by increased demand for C 4 ISR (command, control, communications, computers, intelligence, surveillance, and reconnaissance) work for intelligence and logistical support for ongoing Department of Defense (DoD) operations and by domestic acquisitions. Fourth Quarter Highlights The following highlights occurred during the fourth fiscal quarter: Revenue from DoD customers increased 19 percent, driven primarily by higher demand from customers such as the Defense Information Systems Agency (DISA), the U.S. Army's Communications-Electronics Command (CECOM), and the defense intelligence community. Federal civilian agency revenue grew 28 percent primarily from higher volumes of work for customers such as the Department of Justice (DoJ), Department of Veterans Affairs (VA), the Securities and Exchange Commission (SEC), the U.S. Customs Service, and the national intelligence community. The acquisition of Premier Technology Group, Inc. (PTG), which closed on May 15, 2003, broadened CACI's capabilities in intelligence analysis and security services, information technology, training, program management and logistics for clients in the DoD and the intelligence community. Full Year FY03 Results Reflect Continued Margin Expansion and Strong Revenue Growth Income from continuing operations for FY03 was $44.7 million, or $1.52 per diluted share, an increase of 40 percent over income from continuing operations of $31.9 million, or $1.24 per diluted share, reported for FY02. For all of FY03, revenue increased 24 percent, to $843.1 million, compared with $681.9 million reported in FY02. Operating income for FY03 was $70.4 million, up 33 percent over operating income of $53.1 million reported a year earlier. For the full year, the operating margin improved to 8.4 percent from 7.8 percent a year earlier. The higher operating margin was driven primarily by a favorable contract mix, specifically increased professional services revenue on higher margin time and material and fixed price contracts. Revenue growth was driven primarily by increased demand from federal government customers. Revenue from DoD customers increased 24 percent, driven primarily by higher demand from customers such as the Defense Information Systems Agency (DISA), the U.S. Army's Communications-Electronics Command (CECOM), and the defense intelligence community. Federal civilian agency revenue grew 31 percent primarily from higher volumes of work for customers such as the Department of Justice (DoJ), Department of Veterans Affairs (VA), the Securities and Exchange Commission (SEC), the U.S. Customs Service, and the national intelligence community. FY03 Highlights In addition to record revenue and earnings, major highlights and accomplishments during fiscal year 2003 include: Operating cash flow of $75.9 million. Revenue from the federal government increased 26 percent, 16 percent organically. Overall, internal revenue growth for the company for the fiscal year was 15 percent. Contract awards of up to eight years in length for over $1.1 billion from federal customers. Backlog at year-end of $2.5 billion, up from $1.9 billion a year earlier. Acquisition and full integration of four domestic businesses--the Government Services Division of Condor, Acton Burnell, Inc., Applied Technology Solutions of Northern VA, Inc., and Premier Technology Group, Inc. Common stock listed on the New York Stock Exchange. Commentary Commenting on the results, Dr. J.P. London, CACI's Chairman, President, and Chief Executive Officer, said, "Our record year and fourth quarter results are driven by high ongoing demand from those government agencies and spending initiatives that are presently involved with our country's highest national priorities: defense, intelligence, and homeland security. By responding to our customers' needs related to those priorities and delivering to them timely, critical support, we experienced growth in our profitability as well as the overall business. We experienced record cash flow from operations. We received over $1.1 billion in contract awards and maintained our historically high win rate in customer retention. And we gained new customers and broadened our capabilities through our acquisition program. All of this combined to produce solid growth of 24 percent for the year and 15 percent internally, exceeding our stated growth objectives." Dr. London continued, "We have a well-diversified business base between DoD and federal civilian agencies. We continue to experience strong demand across the federal government market. As we begin our new fiscal year, we are actively hiring additional staff in our domestic operations. Our bid backlog of submitted proposals has increased to over $1 billion, plus we have no additional major contracts being recompeted this fiscal year. And we have recently signed a Letter of Intent for our next potential acquisition. We believe we are well on our way to becoming a $1 billion in annual revenue company in FY04, reaching our goal a year ahead of schedule. We continue to anticipate strong growth across all areas of our core business, including systems integration, engineering services, knowledge management, and managed network services. As we move forward, CACI remains ever vigilant in helping our country secure its future both domestically and abroad. We are extremely pleased with our results and excited about the prospects of achieving another record year of growth and profitability while continuing to enhance shareholder value." Company Outlook The company reiterated its guidance for FY04 as originally issued on July 8, 2003. For the full year, there is no change to the range of guidance for revenue, net income and diluted earnings per share. The company's guidance excludes results from any additional acquisitions, including that resulting from the above-mentioned Letter of Intent. The company will update its full year guidance upon successful completion of the acquisition, which is anticipated to close in September. The company continues to target its overall growth at a 20 percent or better compound annual growth rate, through a combination of organic growth ranging between 12 and 15 percent and acquired growth of between five and eight percent. The table below summarizes the guidance ranges for the first quarter and full fiscal year 2004: (In millions except for earnings per share) Q1 FY04 Total FY04 Revenue $233 - $240 $985 - $1,015 Net Income $12.3 - $12.7 $53.1 - $54.7 Diluted earnings per share $0.41 - $0.43 $1.77 - $1.82 Diluted weighted average shares 29.7 30.0 Should the company perform in accordance with these estimates, revenue for the first quarter is expected to be up 24 to 28 percent over revenue of $188 million reported in the first quarter of FY03. Net income is anticipated to be up 31 to 35 percent over net income of $9.4 million in the corresponding prior year quarter. Diluted earnings per share are expected to be up 29 to 34 percent over $0.32 reported a year earlier. Investors are reminded that actual results may differ from these estimates for the reasons described below. Conference Call Information The company has scheduled a conference call for 9 AM Eastern time Thursday, August 14 th , during which management will be making a brief presentation focusing on fourth quarter and full-year results, operating trends and its expectations. A question-and-answer session will follow to allow further discussion of the results and the company's future expectations. Interested parties can listen to the conference call and view accompanying exhibits over the Internet by logging on to CACI's Internet site at http://www.caci.com at the scheduled time. A replay of the call will also be available over the Internet beginning at 1:00 p.m. Eastern Time Thursday, August 14 th , and can be accessed through CACI's homepage ( www.caci.com ) by clicking on the CACI Investor Info button. About CACI CACI International Inc provides the IT and network solutions needed to prevail in today's new era of defense, intelligence, and e-government. From systems integration and managed network solutions to knowledge management, engineering, simulation, and information assurance, we deliver the IT applications and infrastructures our federal customers use to improve communications and collaboration, secure the integrity of information systems and networks, enhance data collection and analysis, and increase efficiency and mission effectiveness. Our solutions lead the transformation of defense and intelligence, assure homeland security, enhance decision-making, and help government to work smarter, faster, and more responsively. CACI, a member of the Russell 2000 and S&P SmallCap 600 indices, provides dynamic careers for more than 6,400 employees working in 90 offices in the U.S. and Europe. CACI is the IT provider for a networked world. Visit CACI on the web at www.caci.com . Forward Looking Statements There are statements made herein which may not address historical facts and, therefore, could be interpreted to be forward-looking statements as that term is defined in the Private Securities Litigation Reform Act of 1995. Such statements are subject to factors that could cause actual results to differ materially from anticipated results. The factors that could cause actual results to differ materially from those anticipated include, but are not limited to, the following: regional and national economic conditions in the United States and United Kingdom, (the UK economy is experiencing a downturn that affects the Registrant's UK operations) including conditions that result from terrorist activities or war; changes in interest rates; currency fluctuations; failure to achieve contract awards in connection with recompetes for present business and/or competition for new business; the risks and uncertainties associated with client interest in and purchases of new products and/or services; continued funding of U.S. Government or other public sector projects, particularly in the event of a priority need for funds, such as homeland security, the war on terrorism or rebuilding Iraq; government contract procurement (such as bid protest, small business set asides, etc.) and termination risks; the results of the amended appeal of CACI International Inc, ASBCA No. 53058; the financial condition of our clients; paradigm shifts in technology; competitive factors such as pricing pressures and competition to hire and retain employees; our ability to complete and successfully integrate acquisitions appropriate to achievement of our strategic plans; our ability to complete performance of fixed price contracts within contract value; material changes in laws or regulations applicable to our businesses, particularly legislation affecting (i) outsourcing of activities that have been performed by the government; and (ii) competition for task orders under Government Wide Acquisition Contracts ("GWACs") and/or schedule contracts with the General Services Administration; our own ability to achieve the objectives of near term or long range business plans; and other risks described in the Company's Securities and Exchange Commission filings. # # # For investor information contact: David Dragics Vice President, Investor Relations (703) 841-7835 ddragics@c... For other information contact: Jody Brown Senior Vice President, Public Relations (703) 841-7801 jbrown@c... (Financial tables follow) # # # # Summary Financial Tables CACI International Inc Consolidated Statements of Operations (Amounts in thousands, except per share amounts) Quarter Ended Twelve Months Ended 6/30/2003 6/30/2002 6/30/2003 6/30/2002 (Unaudited) (Audited) (Unaudited) (Audited) Revenue $ 228,633 $ 190,980 $ 843,138 $ 681,942 Costs and Expenses Direct Costs 137,937 119,341 517,975 421,540 Indirect costs and selling expenses 65,440 53,451 241,838 195,167 Depreciation and amortization 4,189 3,496 12,919 12,131 Operating expenses 207,566 176,288 772,732 628,838 Operating income 21,067 14,692 70,406 53,104 Interest (income) expense (416 ) (317 ) (1,374 ) 1,622 Income from continuing operations before income taxes 21,483 15,009 71,780 51,482 Income taxes on continuing operations 8,206 5,702 27,069 19,558 Income from continuing operations 13,277 9,307 44,711 31,924 Discontinued Operations Loss from operations from discontinued Marketing Systems Group (less applicable income tax benefit of $128) - - - (209 ) Loss on disposal of Marketing Systems Group including provision of $284 for operating losses during phase-out period (less applicable income tax benefit of $766) - - - (1,250 ) Net income $ 13,277 $ 9,307 $ 44,711 $ 30,465 Basic earnings per share Income from continuing operations $ 0.46 $ 0.33 $ 1.56 $ 1.28 Loss from discontinued operations $ - $ - $ - $ (0.01 ) Loss on disposal $ - $ - $ - $ (0.05 ) Basic earnings per share $ 0.46 $ 0.33 $ 1.56 $ 1.22 Diluted earnings per share Income from continuing operations $ 0.45 $ 0.32 $ 1.52 $ 1.24 Loss from discontinued operations $ - $ - $ - $ (0.01 ) Loss on disposal $ - $ - $ - $ (0.05 ) Diluted earnings per share $ 0.45 $ 0.32 $ 1.52 $ 1.18 Weighted average shares used in per share computations: Basic 28,727 28,417 28,647 24,992 Diluted 29,441 29,265 29,425 25,814 Summary Financial Tables (continued) CACI International Inc Condensed Consolidated Balance Sheets (Amounts in thousands) 6/30/2003 (Unaudited) 6/30/2002 (Audited) ASSETS Current assets Cash and marketable securities $ 89,025 $ 151,068 Accounts receivable Billed 179,427 137,296 Unbilled 18,891 10,482 Total accounts receivable 198,318 147,778 Other current assets 10,791 7,283 Total current assets 298,134 306,129 Property and equipment, net 18,319 14,973 Goodwill & intangible assets 218,178 134,447 Other 27,329 25,115 Total assets $ 561,960 $ 480,664 LIABILITIES & SHAREHOLDERS' EQUITY Current Liabilities Notes Payable $ 4,558 $ 8,667 Accounts payable 20,964 6,482 Accrued compensation & benefits 44,460 33,644 Other current liabilities 45,516 28,572 Total current liabilities 115,498 77,365 Notes payable, long-term - 26,500 Postretirement & other long-term obligations 14,619 7,891 Other long-term liabilities 10,308 1,749 Shareholders' equity 421,535 367,159 Total liabilities & shareholders' equity $ 561,960 $ 480,664 Summary Financial Tables (continued) CACI International Inc Condensed Consolidated Statements of Cash Flows (Amounts in thousands) Twelve Months Ended 6/30/2003 (Unaudited) 6/30/2002 (Audited) CASH FLOWS FROM OPERATING ACTIVITIES: Net income $ 44,711 $ 30,465 Reconciliation of net income to net cash provided by operating activities Depreciation and amortization 12,919 12,255 Loss on sale of property & equipment 5 5 Provision for deferred income taxes 1,824 (5,410 ) Loss from sale of business - 966 Changes in operating assets and liabilities Accounts receivable (22,820 ) (6,226 ) Other current assets (3,592 ) 4,177 Accounts payable and accrued expenses 19,287 (10,408 ) Accrued compensation & benefits 7,335 3,848 Other current liabilities 14,645 6,755 Other 1,573 (444 ) Net cash provided by operating activities 75,887 35,983 CASH FLOWS FROM INVESTING ACTIVITIES: Net acquisitions of property & equipment (12,161 ) (8,161 ) Purchases of businesses, net of cash acquired (107,202 ) (41,945 ) Net proceeds from (purchases of) marketable securities 4,728 (20,019 ) Other assets 1,391 (898 ) Net cash used in investing activities (113,244 ) (71,023 ) CASH FLOWS FROM FINANCING ACTIVITIES Net payments under line of credit (25,000 ) (23,888 ) Proceeds from stock options 3,603 13,173 Proceeds from secondary offering - 161,475 Other (105 ) (488 ) Net cash (used in) provided by financing activities (21,502 ) 150,272 Effect of exchange rates on cash and equivalents 1,544 975 Net (decrease) increase in cash and equivalents (57,315 ) 116,207 Cash and equivalents, beginning of period 131,049 14,842 Cash and equivalents, end of period $ 73,734 $ 131,049 Summary Financial Tables (Continued) Income From Continuing Operations Margin Data Quarter Ended Twelve Months Ended 6/30/2003 6/30/2002 6/30/2003 6/30/2002 Gross profit margin 39.7% 37.5% 38.6% 38.2% Operating profit margin 9.2% 7.7% 8.4% 7.8% Continuing operations margin 5.8% 4.9% 5.3% 4.7% Net margin 5.8% 4.9% 5.3% 4.5% Revenue From Continuing Operations by Customer Type Quarter Ended (dollars in thousands) 6/30/2003 6/30/2002 $ Change % Change Department of Defense $ 144,928 63.4% $ 122,167 64.0% $ 22,761 18.6% Federal Civilian Agencies 67,622 29.6% 52,780 27.6% 14,842 28.1% Commercial 12,028 5.2% 12,356 6.5% (328 ) -2.7% State and Local Government 4,055 1.8% 3,677 1.9% 378 10.3% Total $ 228,633 100.0% $ 190,980 100.0% $ 37,653 19.7% Twelve Months Ended (dollars in thousands) 6/30/2003 6/30/2002 $ Change % Change Department of Defense $ 536,269 63.6% $ 433,927 63.7% $ 102,342 23.6% Federal Civilian Agencies 241,490 28.6% 184,392 27.0% 57,098 31.0% Commercial 51,414 6.1% 49,369 7.2% 2045 4.1% State and Local Government 13,965 1.7% 14,254 2.1% (289 ) -2.0% Total $ 843,138 100.0% $ 681,942 100.0% $ 161,196 23.6% Exhibit 99(b) CACI INTERNATIONAL Moderator: David Dragics 08-14-03/8:00 a.m. CT Confirmation # 742470 CACI INTERNATIONAL Moderator: David Dragics August 14, 2003 8:00 a.m. CT Operator Good day everyone and welcome to the CACI International Fourth Quarter and Year-end 2003 Earnings conference call. Today's call is being recorded. For opening remarks and introductions, I would like to turn the call over to the Vice President of Investor Relations, Mr. David Dragics. Please go ahead, sir. David Dragics Thank you, David, and good morning, ladies and gentlemen. I'm Dave Dragics, Vice President of Investor Relations of CACI International. And we're pleased that you're able to participate with us today. And for those of you who are with us for the first time either by telephone or via the Internet, we welcome you to this call. Let's go to the first exhibit. As you know, yesterday after the market closed, we released our fourth quarter and Fiscal Year 2003 results. And we hope that most of you have had the opportunity to review our announcement and the results and they are summarized on this exhibit. Once again, we are including exhibits with our presentation. And I hope that you will find them helpful in reviewing our financial results and trends in the discussion of our operations. And as we progress this morning, we'll make every effort to keep all of you on the same page as we are. Now, moving to the next exhibit before we begin our discussion this morning, I would like to make our customary but very important statement regarding CACI's written and oral disclosures and commentary. And there will be statements in this call that do not address historical facts and as such, do represent forward-looking statements under current law. These statements are subject to important factors that could cause actual results to differ materially from the statements made today. And the primary factors that could cause actual results to differ materially from those anticipated are listed at the bottom of this mornings - of yesterday's earnings release as well as in the Company's Securities and Exchange Commission filing. And our full Safe Harbor Statement is on this slide and will also be incorporated as part of the transcript of this call, which we will post on our Web site. I would remind and refer those who might be listening to the replay of this call to review the full Safe Harbor Statement there. Now, let's turn to the next exhibit and to open up the discussion this morning, here is Jack London, Chairman, President and CEO of CACI International. Jack. Jack London Thank you, Dave, and good morning, ladies and gentlemen. First, let me welcome many of you who are new to CACI and to our call this morning. We appreciate you interest and hope you'll find this call informative. We're very pleased to report record fourth quarter and record full year results for CACI in Fiscal Year 2003. By all measures, this past year has been an extremely successful one for the corporation. Our revenue increased 24-percent over Fiscal Year '02, reaching 843 million. Diluted earnings per share were a $1.52, 23-percent higher than last year. We had record profits of 44.7 million, 40-percent higher than last year. Our margins increased at both the operating and the net income line. Operating cash flow were 76 million, 111-percent above last year's level. Internal growth for the year was approximately 15-percent, at the upper end of our objective range of 12 to 15-percent per year. We augmented our internal growth by completing four successful acquisitions. They brought us new relationships and customers and expanded our presence in the U.S. intelligence community. All are profitable and have been immediately accretive to our bottom line. In effect, our continued focus on national defense, homeland security and intelligence community has resulted in our delivering solid growth and record profitable performance. As we move in to the 2004 fiscal year, CACI's well positioned to continue it's rapid growth and profitability, supporting our government clients. Let's move to the next exhibit please. With me today to discuss our operating results in more detail and to answer your questions, Ken Johnson, President of CACI's U.S. Operations, and Stephen Waechter, our Chief Financial Officer. Greg Bradford, President of CACI Limited in the United Kingdom, is also on the line ready to answer any questions that you may have about our U.K. operations at that time. As is our custom on these calls, we will discuss three principal items. First, the - Stephen Waechter will discuss some details of our financial results. Second, Ken Johnson will discuss our domestic operations and their outlook. Finally, I'll have some closing comments. After that, I'll open up the call to your questions. So, the first item on our agenda is our financial results, so here's Stephen Waechter, our Chief Financial Officer discussing them. Stephen, over to you. Stephen Waechter Thank you, Jack. And good morning, everyone. Let's go to the next exhibit number six. Last evening, we reported record four-quarter and full fiscal-year revenue and earnings. Revenue for the fourth quarter increased 20-percent to $228.6 million versus $191 million a year ago. Net income was 13.3 million or 45 cents per diluted share; up 43-percent over last year's $9.3 million or 32 cents per diluted share. We had excellent operating leverage this quarter with net income increasing at a rate more than twice the revenue growth rate. For the year, our diluted earnings per share were $1.52, 23-percent above diluted earnings per share of $1.24 last year. Income from continuing operations was $44.7 million, 40-percent higher than the $31.9 million reported a year ago. Revenue was $843 million up 24-percent over Fiscal Year '02 revenue, up $682 million. Now let me give you more detail on some of these results. Moving to the next exhibit, our federal government business grew 21-and-a-half-percent during the fourth quarter and represented 93-percent of our total revenue. The internal growth of our federal business was just over nine-percent with approximately 14-percent growth in our higher margin professional services related revenue offset by flat lower margin revenue from sub contractors and other direct costs. For the year, internal growth of our federal business was 16-percent. And as Jack reported, for all of CACI 15-percent well within our goal of 12 to 15-percent per year. The strong growth in our domestic operations was somewhat offset by our United Kingdom operations. Our international segment reported $9.6 million of revenue in the quarter down approximately seven-percent from last year. Pre tax margins were approximately nine-and-a-half-percent this quarter. As we've noted in past calls, our operations that are being effected by the lower demand for commercial IT services in the U.K., particularly in the telecommunications industry. For the year, revenue was virtually the same as last year, $40.4 million and pre tax margin profits were -profit margins were 11-percent. Moving to exhibit eight, let's take a look at some of the key metrics most of which were included in the expanded financial exhibits in our press release. This was an extremely profitable quarter for us. Our operating margin was 9.2-percent compared to 7.7-percent in the fourth quarter of last year. As we indicated in our release, the growth in our operating margin was driven primarily by contract mix with a significantly higher fixed price and time and materials work during the quarter. Our acquisitions also contributed favorably to the improvement. We experienced an extremely strong quarter of operating cash flow over $34 million compared to just over $23 million a year ago. This cash flow was produced primarily by the increase in net income and timing of cash disbursements. Operating cash flow for Fiscal Year '03 was $75.9 million compared with $36 million for Fiscal Year '02 and 111-percent. Just a couple of other metrics almost 90-percent of the revenue this past quarter was earned as a prime contractor about the same as the fourth quarter of Fiscal Year '02. For the year, we derived 87-percent of our revenue from prime contracts, and also for the year, 64-percent of our revenue came from time and materials work, 17-percent from cost plus works and 19-percent from fix price works. Last year, the mix was 61-percent, 19-percent and 20-percent respectively. Moving to the next exhibit nine, days sales out standing at June 30th were 78 days compared with 71 days a year ago. The increase in days out standing was driven probably by the acquisition of PTG in May and higher U.K. unbilled receivables. This exhibit also shows our cash and marketable securities and debt at June 30th. The next exhibit is our guidance for revenue, net income and diluted shares for the first quarter. As you can see, we estimate that our revenue for the quarter will increase 24 to 28-percent over the first quarter of Fiscal Year '03. For the next quarter, we expect operating margins to be in the 8.3 to 8.4 range. This compares favorably to last year's 7.8-percent. Compared to last quarter's margin of 9.2-percent, the rate will be lower primarily as a result of a lower mix of revenue from fixed price contracts in the first quarter relative to last quarter. We anticipate that our net income will be up 31 to 36-percent, higher than a year ago. And we expect diluted earnings per share to be up 29 to 34-percent over the year earlier period. We believe that our internal growth in the next quarter will be in the range of 10 to 12-percent. And finally, we estimate the diluted weighted average shares for the first quarter will be 29.7 million. For the full year, there is no change to the range of guidance for revenue, net income and diluted EPS as reported on July eighth. The Company's guidance excludes results from any additional acquisitions including that resulting from the announced signed letter of intent. For the year, we anticipate revenues to be between 985 million to over 1,015,000,000. That income will range between 53.1 and $54.7 million. And dilute earnings per share will range between $1.77 and a $1.82. We will update the full year guidance upon successful completion of the acquisition, which is anticipated to close in September. The Company continues to target it's overall growth at a 20-percent or better compound annual growth rate through a combination of organic growth rates ranging between 12 and 15-percent and acquired growth rates between five to eight-percent. With regard to the target company, it compliments our service offerings and expands our customer relationships. More importantly, it is in line with our previous stated acquisition criteria concerning accretion and valuation. Even though Dave mentioned the Safe Harbor statement at the beginning of this call, I want to again state that these projections are forward-looking. And that listeners on the call and readers of the transcript should be advised that our actual results may differ materially from the statements we are making today. That completes the financial overview. Now here's Ken Johnson who will cover our domestic operations. Ken. Kenneth Johnson Thanks, Stephen, and good morning, everybody. Let's go to exhibit number 11, please. Stephen spoke about how profitable the past quarter was and I'd like to add these remarks by giving you a feel for our operations during the quarter and more importantly talk about what we see ahead. As we've already noted our organic direct labor for the quarter was up an impressive 14-percent. Over and above that growth is the addition of some 200 plus people to our operation staff during just the first six weeks of this fiscal year. The vast majority of that staff is revenue producing, I might point out. This increase came from not only our core operations but also from the acquisitions we have made over the last 12 months. In particular, our acquisition or PTG has increased our footprint in supporting tactical intelligence needs for many war fighting units throughout the United States army. We continue to be very excited about what this organization has brought the CAPI and the potential opportunities for continued expansion. There were a couple of other noteworthy areas in our operations for the quarter as well as for the year. Our C4ISR work, much of which we provide to the United States army's communications and electronics command, was up 22-percent in the quarter and 37-percent for the year. Revenue from our intelligence community customers both national and military intelligence agencies was up significantly in the quarter and represents almost 20-percent of our business today. I'd like to focus on our federal civilian agency business. You might have noted from the information in our release that the revenue growth from those customers increased some 28-percent this quarter. A large part of that increase came from our support of the Department of Justice's litigation support requirements. We generated approximately $27.4 million in revenue as we continue to perform on a wide variety of tax orders under the Mega2 contract. This work is involved with major tobacco litigation, work for the Securities and Exchange Commission and support for several other unnamed government agencies. Most important, however, is the growth in our business from several other federal civilian agencies. A year ago in the fourth quarter, work from our highly valued DOJ customer represented approximately 50-percent of federal civilian agency business. This year while our DOJ work has grown significantly it now only represents approximately 40-percent of our federal civilian agency business. We've been able to not only expand the work we've been doing for years for our current clientele but have added new ones like the Department of Veteran's Affairs, the Drug Enforcement Administration amongst others. In the next exhibit, let me give you a quick recap of the revenue we generate from our federal, commercial and state and local customers from our services offerings. These percentages are approximately. Systems integration work as you know includes our U.K. operations grew to almost 50-percent of our revenue. Engineering services remains in the 20 to 25-percent range while managed network services now represents approximately 20-percent. Knowledge management was in the 12 to 15-percent range of our revenue. Let's move to the next exhibit. Let's take a look at what's ahead for our domestic operations. Our pipeline of opportunities today is about $4.8 billion. That's up from $4.3 billion when we spoke to you in April. More importantly, as we exited FY '03, proposal activity had increased significantly leaving us with approximately $950 million in proposals out standing being evaluated by customers. In the six weeks since that time, that number has grown to in excess of $1.2 billion. And we anticipate that several of these awards will be decided on our before September 30th, 2003. Overall, we're quite pleased with the current pace of our operations as you might imagine. And we're excited about the prospects ahead for the reasons I have just covered. We continue to experience strong demand from our government customers that support the needs of national defense, intelligence and homeland security. We're also involved with helping many of them folks on transformation initiatives addressing the structural issues of improving the delivery of services by the federal government, information sharing as one as well as many of other initiatives you've heard us talk about for the last several quarters. We believe this will be reflected in growth. Very profitable growth in not just the coming quarter, but throughout the fiscal year. Jack that concludes my remarks; over to you. Jack London Well, thank you, Ken. And thank you Stephen for your updates. Let's please move to the next exhibit. We've concluded another successful year here at CACI of record earnings and increased revenue. CACI has again sustained its positions as a leading provider of information technology services to the United States federal government. While the last year has been marked by world turmoil, the war in Iraq, ongoing terrorist threats and the emergence of hot spots like Liberia and North Korea. What's certain is the gravity of these events and the ongoing emergence of new trends. National security remains a top priority of this administration. Information technology continues to power the ongoing transformation of our military and federal government and has become the front line for America's homeland security. CACI's advanced IT and network solutions are part of that front line and the forefront of today's new era of defense intelligence and e-government. As we pointed out in our guidance release for fiscal year '04 in early July, we believe that we can achieve our earnings and growth objectives by leveraging our on ongoing customer relationships. Our basic strategy is to successfully deliver mission critical support to our current clients of many years. And our many new potential federal clients involved with national security and intelligence. As Ken mentioned, we are expecting a significant part of our growth to come from our abilities to support our customers in the transformation of the DODE and civilian federal government operations. In fact, we're already doing so. As we work to help secure the nation's future both domestically and abroad, CACI is committed to remaining every vigilant in providing innovating technology and solutions that will support our great nation's future. We believe that commitment will reward our customers and our shareholders. So, at this point, we're ready to open our discussions to your questions. So, David, I'll turn the mike back over to your for our first question if you would please. Operator Thank you sir. Today's question-and-answer will be conducted electronically. If you would like to ask a question, please press the star key followed by the digit one on your touch-tone telephone. Today's question-and-answer session will be limited to one question and one follow-up per person after which you may re-queue for any further questions. If you're on a speakerphone, please unmute your line before signaling for your question. Once again, that will be star one for questions. We'll go first to Laura Lederman at William Blair. Laura Lederman Yes, a few questions. One, can you talk about the pricing environment for acquisitions out there and how it's changed over the last several months? And also, could you talk a little bit about competition and the different segments? Who you're seeing more of? Who you're seeing less of? And the final question is in terms of contracting, are you seeing consolidation of contracts from several to single contracts. Thanks. Jack London That's a nice question with three important parts. Thank you, Laura. I think I'll just talk to in general here a couple of minutes, and then I think Stephen and Ken will have some thoughts. Certainly, we are still saying an active M&A base. I'd say pricing in that area is pretty much consistent at least at the market segment we're looking at, maybe pushing a little bit above what we've seen over the last year or two. But outside of perhaps some outliers and some of the larger transaction perhaps we've seen pretty consistent market pricing. There's always a give and take, a little bit of push back and fourth, depending on what particular properties are looking better to certain companies. But that's our general impression of it. Competition, I think pretty much the ones we've seen in the space. I don't think we've had any new significant major surprises coming in to the sector, but let me turn it over to Stephen to address a couple of items. And then Ken will follow up I'm sure. Stephen Waechter Yes, Laura, this is Stephen. Just on the acquisition a front, we still are seeing a number of properties out there. I think the valuations will range depending on one if it's a big company say, you know, north of 100 million in revenues. They are getting a premium. If you see an Intel kind of a company with a heavy concentration of intelligence related work, it's also getting somewhat of a premium or step up in valuation. There's also, you know, a core in that kind of the 35 to $75 million range that fit very nicely with our management network services within the systems integration kind of work in that - very similar work to what we do. We're finding, you know, good ranges. You know, last year we bought four businesses and paid in kind of the six to eight times trailing 12-months range. And we think that they can still be done in that range. With that Ken, competition. Jack London Competition, maybe Ken can address that in more detail. Kenneth Johnson No, Laura, are you talking about competition in our bid world or competition for acquisitions? Jack London Bid world. Kenneth Johnson Really no particular change. We continue to see the usual suspects. I think if there was one change, I consider of consequence and it's not a real time changed based on your question, we're seeing a lot more of IBM. IBM has emerged again now as one of the large-scale systems integrators. And IBM over the course of the last four or years has not been as active with a recent award, recent like two years ago of a big modernization contract down in customers. We're seeing more and more of IBM. And we're partnering with them and competing against them, and they're a real wanted competitor. But other than that, there really have been no material changes in the space. Operator And we'll go next to Cindy Shaw at Soundview. Cindy Shaw Congratulations on a great quarter. One of the things I wanted to ask you, margin expansion, the guidance for next year suggests we're going to see a continuation but fairly modest. I wanted to just get your sense for where you see that going, where you think it could go over time? Jack London I'd like to say first of all, Cindy, that margin management if you will, margin targets and cash flow are two primary focal points for CACI. And we pay a lot of attention to it. I want Stephen to discuss a big to the detail here. But I just you to know that from a strategic and senior management perspective our goals always are shareholder focused on the leverage from margin expansion and meaningful margins in our business space. ' Stephen Waechter Cindy, Stephen here. We did about 8.4-percent this year and would anticipate somewhere in that - hopefully north of that range, maybe as much as 8.6 is kind of what we've targeted at this point in time. The drivers that are going to push that up are going to be the continued use of more time and material types of contracts. And also our acquisitions have also brought us a higher margin mix type of business. So, if the stars and the moon all align here, we could have a, as we did in the fourth quarter, you know, a very nice alignment. Primarily also we had a very strong fixed price contract mix that really helped us in the quarter. So, you know, we can get upwards of nine-percent here at some point in the future if everything comes together. But the guidance that we've given out again is somewhere in that 8.3 to 8.6-percent range is where we are. Cindy Shaw Great. Thank you and congratulations. Jack London Thanks. Stephen Waechter Thanks, Cindy. Operator And we'll go to Julie Santoriello at Morgan Stanley. Julie Santoriello Good morning. Jack London Hi, Julie. Stephen Waechter Hi, Julie. Julie Santoriello Hello. Stephen, I was wondering if you could comment on the expectations for internal growth in the first quarter. It seemed a little bit light compared to what your targets are. And I'm just wondering if it's a seasonal issue or an issue of comparisons versus last year? Jack London Let me just say to lead off with we have a continuing objective over the long hall to deliver a 10 to 15-percent internal growth performance. And we want to do it obviously at good margins. A lot of the internal growth will ensue after acquisitions as we go along. So, we encourage our investors to conceive and view CACI as an internal growing operation with augmented through acquisitions. In terms of the lumpiness from time-to-time, quarter-to-quarter those are going to be some variations, but let me turn it over to Stephen to - or Ken to amplify who ever would like. Kenneth Johnson Yes, Julie, a couple of things, I think, that I'd like you to consider. Typically our Q1 over our Q4 for, you know, I'm not the veteran of this crowd here, Jack knows better probably for the last 30 years. But our Q1-over-Q4 typically has a little bit of a dip largely because we're a labor driven company and there's just an awful lot of vacations being taken. So, our - the direct labor portion of our growth tends to take a couple of weeks off between July first and the end of September. What you're seeing this year, however, is you're seeing not only a dip, but you're seeing some meaningful growth. So, I believe as you look at our organic growth for the - for Q1 you're going to see a meaningful movement north of that organic growth that we offered in this quarter. And I further believe that one of the things - one of the points that we attempt to make about this difference between organic and acquired growth that needs to be taken in two account and we try as hard as we can to convince each and everyone of your. With our recent acquisition of PTC that we believe is performing behind our original expectation, we're comfortable that a lot of those new positions that we've spoken - that I talked about in my text and on a going forward basis will be added to what was then PTG. But as we hire these new people we're hiring them as CACI employees. And well we have to report that our as acquired growth because that's the way we count the beans and we report the difference between organic and acquired. They really are new CACI employees. And in my management team I can assure your works equally as hard at hiring new people at an accelerated rate in PTG as much as they do inside of our core operations. So, for us internally, the way we manage our business is - we don't care about the difference because as far as we're concerned they - they're on an equal footing. I hope I'm making myself clear. I'm using an awful lot of words to do it. We believe you're going to see a continued improvement through the first quarter and throughout the year on the organic growth line. Stephen Waechter Julie, it's Stephen. The other consideration if you look at our fourth quarter, and I think it's going to continue into the first. If you look at the professional services revenue segment, we think the mix of that versus ODC types of subcontractor cost that flow through is going to be a little richer, and that's what drives the margins up. Last year, we were at 7.8-percent, and we think we'll do between 8.3 and 8.4 as we go forward. So, that's - if you break the pieces out the part where we make good money is growing actually at a higher rate than that kind of 10 to 12-percent we indicated earlier. Julie Santoriello OK. Great. If I can get one quick follow up on that. Would you be able to provide us with the headcount at the fiscal year end? And also, if you could discuss potential hiring numbers for this fiscal year? Especially knowing that it's an important meeting indicator? Jack London Stephen, you have the ... Stephen Waechter Yes, we're just a tick under 6,400. I don't have the exact number, Julie, but they're in that order of magnitude. And for next year, we're going to have to add somewhere between seven to 800 additional people to hit the internal kind of targets that we're looking. Julie Santoriello OK. Thank you very much. Jack London : might add that over the years we've moved more in to a system integration kind of business where you have a sub contract activity and more and more ODC. I think that's a favorable feature of our growth plan and since, we've been able to take on larger jobs. So, these ODCs and subcontractor values are going to have their peaks and valleys like any other outside vendor related or contractually related activity. But the internal growth in terms of our internal staffing, I think, has been very good on the professional services side. And I think that's our overall trend line that we've to be able to sustain and that's our goal. Operator And we'll go to Joseph Vafi at Jefferies & Company. Joseph Vafi Hi, good morning and great quarter. Just a few quick questions here. First, I was following up on the previous question; give a little more color on premier and what might be going on there to be driving better than expected performance? And then secondly, to the extent you can on your LOI, maybe perhaps talk about maybe the size of the transaction you might be considering? And then third, just a housekeeping item, if we could get funded backlog ending for the year. Thanks. Jack London Fine. It was Joe was it? Male Yes, Joe Vafi. Jack London I would just say that we're continuing, I think, to look and examine a number of these issues that you're related to. But I want to turn it over to Stephen he'll have some comments. And then for PTG, I'm sure that Ken will. Stephen Waechter With regard to the acquisition, you know, we've given some general comments that we prefer not to give out numbers at this point in time, Joe, only because people start rolling those in to their forecast. And it's not - we're still in a very early phase of due diligence. And I think it would be inappropriate to kind of give numbers because people start rolling them in. And we don't want to get people out ahead of us. So, I think as we get closer and when we sign a final definitive agreement, we'll obviously come out with updated guidance and information regarding that. With regard to the backlog, the funded piece is about $485 million here at the end of the year. And Ken if you want to talk about PTG, I think ... Kenneth Johnson Yes, Joe, thanks for the question on PTG. I was trying to figure out how I was going to get this answer in if nobody asked this question. Our delight comes in this PTG operation. As you know, when we advertise the closing of this, it provided us a presence inside the intelligence community supporting what we describe as tactical intelligence. And those are the people that support the intelligence function down at the war fighting level whether it's the core, or the vision or a brigade or a battalion. PTG had a significant presence over in the European theater both western Europe and parts of eastern Europe. What we've been able to do as a result of situations that are occurring in Korea and possibly with what's occurring over in the war zone is we're addressing ourselves to requirements that these customers have in both of those areas. And it appears as though there are some substantive staffing requirements to help provide additional, tactical intelligence support, additional support to the G4 or the logistics/supply function. And while we don't have a create deal of lucidity on those requirements right now, the level of activity given that these folks have only been with us for about a month-and-a-half, two months is peaking for us. And we're looking at a number of different opportunities. So, we're very, very confident that we're going to see continued top end bottom line expansion emanating primarily out of what we used to know as PTG. Operator And we'll go next to Bill Loomis at Legg Mason. Bill Loomis Hi, strong quarter, guys. Looking at the fourth quarter operating margin it was even more particularly strong given the fall off in the U.K., usually higher U.K. margins. What attributed to that? I know you talked about some broader things that were driving that margin improvement. Was there any one time contract true ups, or kind of one time events at the end of your fiscal year? And then, the second question on the U.K. business is what's the outlook in the first quarter? How should be modeling and thinking about that as far as revenue and profitability sequentially? Jack London Good morning, Bill. Some good questions. I'm going to ask Greg to discuss the U.K. side of it. But you know, our business is full of interesting opportunities that pop to us. So, the idea of one off reoccurring, non-reoccurring is part of this business. I think we had some interesting things that happened in the fourth quarter, for example, and some of our work in the justice area, some of the fixed price contract work. I'll let Stephen talk to that. And then, for the overall reflection on where we are in the U.K. and the margin activity and a little bit of the prospects, we'll turn it over to Greg. So, Stephen. Stephen Waechter Yes. With regard to the fourth quarter margins, Bill, we did have some tasking under one fixed price contract which was a little bit out of the norm, a little bit heavier than what we would normally see. And it was very good margin kind of business for us. Additionally, we did have a little bit of PTG in the numbers for the quarter. That also was a little bit of a positive for us. But other than that it just a - kind of an alignment of everything coming together very nicely for us. But nothing unusual if you will in terms of any kinds of true-ups or anything like that. Jack London Greg. Greg Bradford Hi, Bill. In our first quarter here in the U.K., we see that tracking pretty much in line with what we did in quarter four, revenue and profits remaining roughly the same. Historically, it's a more challenging - it's the most challenging of the four quarters in that summer holidays, clients out and some of our staff out, of course. We've got a number of proposals on the table with government clients that were part of our efforts over here is to shift more of our business to the public sector including health which is a nationalized health medical system here. And we see awards coming out towards the end of the summer, September-October timeframe. So, looking forward to the balance sheet, we see things picking up there after. Operator And we'll go next to Mollie Sandusky and Friedman Billings. Mollie Sandusky Good morning, thanks for taking my question. Jack London Hi, Mollie. Mollie Sandusky Hi. I was wondering if you guys could talk a little bit more about your proposal backlog. And maybe some of the specific programs that you might be focusing on? Or some just more specifics on what you're competing for in your backlog? Jack London Well, I would just say that we've been gaining momentum as we indicated in our statistics. We got a powerhouse of bid opportunities out there anticipating some awards, we believe, by the end of this quarter. But let me turnover to Ken for a little amplifying detail. Kenneth Johnson Mollie, as I'm sure you can appreciate, we don't discuss individual programs that we're bidding on, to try to give you a little bit more granularity. Basically at the April call and the call after the second quarter - and I can't even remember when we did - probably January, we were whining about the lack of opportunities that in the form of requirements that were being issued out of the federal government largely due to that continuing resolution there was a huge bubble in the line in terms of requirements issuance. Well that kind of all came together in kind of a perfect storm in the April-May timeframe. And we wound up writing several many hundred million dollar proposals and a variety of opportunities in the 40 to 60-$70 million range. And so, out bit backlog grew dramatically in the fourth quarter. And that momentum has carried over in to our first quarter here. I fully expect that we will sustain this proposal writing business through the first quarter in to the second quarter. And the quite possibly, see a little bit of a slow down in that. But given the bit backlog that's been created, we're very bullish. Now obviously, you get nothing in our business for writing these proposals except tired. We're just quite hopeful that between now and September 30th that - knock wood, and we know you're rooting for us that we'll create a quality win/loss percentage, and that's kind of where we're going. Mollie Sandusky OK. Would you say that it's fair to say that your backlog of the civilian programs is kind of increasing relative to your DOD business? Kenneth Johnson DOD continues to grow at a little greater rate. As you know, two out of every three of our dollars are - come out of the Department of Defense. So, we identify a heck of a lot of more with irrespective of how many there are that come out of the federal government, we identify and qualify a heck of a lot more requirements out of the defense space largely because we spend more time there all day every day. We're very conversant with those missions. We are cautiously optimistic however that a number of these opportunities are emanating out of the federal civil, and that's why we took the time in the text and in the discussion to make you get an appreciation that this growth platform that we've kind of put in place is happening nicely on both sides of that question. We think that there's really nice balance growth going forward both in DOD, the intelligence sector and the federal civilian sector. Operator And we'll go next to Brett Manderfeld at Piper Jaffray. Brett Manderfeld My congratulations as well, especially on the free cash flow side. Stephen, can you talk about the main increase in other current liabilities during the year? And then thoughts on free cash flow for next year, will that track EPS growth? Thanks. Jack London OK. Thank you, Brett. Stephen, take that one, please. Stephen Waechter Yes, Brett. The increase in the liability side is really just a timing issue related to the payment of, you know, subcontractors and taxes and things like that. So, it's really just a timing issue in terms of an increase that you're seeing there. As far as next year, we'd anticipate hopefully very similar performance on our cash flow. As far as cap ex, somewhere probably between 10 to $12 million of cap ex next year. And again, hopefully in the same kind of numbers, 60 to $70 million of cash flows is what we hope to do. Operator And we'll go to Tom Meagher, BB&T Capital Markets. Tom Meagher Yes, good morning. Congratulations on the quarter. Let me just start out - Dave, I see you have a new title here. Did you get a promotion? David Dragics Yes, I did. Thank you. Tom Meagher Well congratulations. I just hope - I know that big raise that Jack is going to give you I hope it doesn't take a penny out of the estimates for next year. But ... David Dragics There goes the quarter. Tom Meagher Stephen, since you finally anticipated by DOJ question, let me move on to the next one. Stephen Waechter ... by the way. Tom Meagher What's that? Stephen Waechter That was Ken that did that. Tom Meagher Ken that did that. OK. Although we really can't get a specific guidance, now that we're at the end of '03, obviously people are going to put '05 estimates out there. To that end, I was wondering if the organic growth rate of the 12 to 15-percent and some of the incremental margin improvement in FY '04 is generally sustainable through '05 as well. Jack London I would just say to you on that one Tom that's going to be our mantra, if you will, our set of goals and objectives going forward. It's a market space out there. It's a matter of being - having distinctions and a sharp edge on our delivery philosophy and cultures. And I don't anticipate any reason that we should lower our objectives in the near term, meaning the next couple of years or so. And you were talking about guidance for '05. But generally speaking, I would see those growth objectives sustaining themselves. We would like to think in terms of moving to a $2 billion platform within a few years. Tom Meagher OK. And then, Ken, maybe one question for you. Any competitive impact from ACS's impending departure from the sector in Lockheed Martin picking up that operation? Kenneth Johnson No. I don't think so. As we've spoken in the past, Tom, the big keep getting bigger. And we've indicated to you and to everybody bigger is better in this space. That's just going to make them a bigger, better company, give them a broader footprint. It will make them a bit more competitive. On the real positive note, though, it will make them a lot better partner on a couple of things we're doing - where we're doing business with them, but I don't think it will have any appreciative or material impact on what we do Tom. Operator And we'll go to Cynthia Houlton at RBC Capital Markets. Cynthia Houlton Hi, good morning. Congratulations. I've just got a couple of questions. I know you talked a little bit about ODCs, but did we get the percentage of ODCs during the quarter? Stephen Waechter No. We generally don't give that out Cynthia. Cynthia Houlton OK. On PTG, for I know that it closed mid quarter. Would you be willing to separate that revenue out just so we have a sense of what for the current quarter, [inaudible] half quarter? Or should we think about the - I know you have last year's revenue. Should we try to back in to that way? Jack London I think we feel like that PTG has a very robust future. We can talk a little bit, perhaps about some of the attributes when we acquired it. But we're eager to see a significant growth profile from that part of our business as that integrates with the other lines and activities. But Stephen, maybe you could talk a little bit about the financial profile as we saw it when we consummated the transaction. Stephen Waechter Yes, PTG, we said it did about $43 million in their last fiscal year. We're anticipating that they're going to be up significantly over there, more on a 50 to $55 million range. And hopefully, as Ken indicated, certainly there are some signs here that they might even exceed that. And again we'll - as we get better clarity on that, we'll get back to you on it. But right now, again, they're 50 to 55 million. And that's up from their kind of 43 million last year. Jack London I might just add that we know that some recent reports of their key executives in the field coming back and after some customer visits indicating some perhaps significant staffing up opportunities. And I think Ken mentioned some of those a little bit earlier. So, we're enthusiastic about the opportunities with PTG. Operator And we'll go to John Mahoney at Raymond James. John Mahoney Hi. I don't know if you're going to - Stephen mentioned he didn't want to talk about the exact amount of ODCs in the quarter. But could I ask the question a different way? What was the growth year-over-year sequentially in your direct labor costs? Stephen Waechter If you can hold on a second I'll ... John Mahoney Or maybe ... Stephen Waechter Are you looking for the quarter or in the ... John Mahoney In the quarter, and possibly - maybe if you could break that down organically. Jack London We may be able to do that. Stephen Waechter I gave it to you. John, it was - the organic deal was 14-percent. John Mahoney In the quarter? Stephen Waechter That was - let me rephrase it a little differently. It's kind of [inaudible]. On the labor side on the direct cost grew about 19-percent year-over-year in the quarter. John Mahoney And that really speaks to the big margin improvement? Stephen Waechter Yes. John Mahoney Could you give us some feel about, you know, historically, I guess there was always - there was a lot of fourth quarter, you know, ODCs going on. Your fourth quarter gross margin was one of your lowest. How - we've been talking on the operating margins. On the gross margin line, what's that going to look like throughout a seasonal basis in '04? Stephen Waechter Well if you look over the last three year John, we've been doing about in a 38, 37-and-a-half to 38-percent kind of range. And I think it's going to be - it's going to stay there. I don't know of anything that's going to significantly change that. I think we've been fairly consistent. After we acquired Net.com it came down a little bit and that was due to the mix of that business. But I don't think that's going to change dramatically. Operator And we'll go next to David Garrity at American Technology Research. David Garrity Yes, hi. Good morning and congratulations on your quarter. Jack London Thanks, David. David Garrity Nice job on the mix there. Quick question, can you just review for me what the new order bookings were in your fiscal fourth quarter. I was sort of taking your number of new order wins of about 1.1 billion for the year, kind of backing in to a number of about 164 million? Jack London I don't know if we mentioned that one, David. Stephen, are you in a position to address that? Stephen Waechter Yes, it was $140 million, David. David Garrity OK. And that was just on kind of down year-over-year and quarter over quarter? Stephen Waechter We won't be down that road, David. We actually don't have - we don't control the schedule of the issuance of these requirements or the award. Now one of the things, I think, you would take away from the 140 awards and the increase in the bid back log is that there was just a slow down in awards. The fact that all of those opportunities are still out there to be decided upon, the take away for you would be that we haven't lost a huge slug of work in that there's significant opportunity. But on a quarter to quarter basis, year-over-year it's very, very difficult to compare the number of awards, because it's just a very lumpy business. Jack London Yes, I would emphasize that. A long time in this business looking at the quarterly flow of bookings is always lumpy. It's not even seasonal. I've had people that have tried to correlate it to the seasonality. About the only thing in this business that I've been able to discover over the years in our business as a reasonably seasonal feature is the first quarter each fiscal year. And it's because of the reason these chaps have just laid out and that is primarily customers taking holidays and a lot of our employees. And we're a revenue generating organization based on our labor basis. So, when labor is off those - that seasonality will be taken down. The other thing I might mention is that the sub contract and vendor contact and ODC content had steadily risen over the last, I'd say six or eight years because we've moved in to a different business platform. The system integration business is not a significant showcase piece of what we do. And in that market space, you're going to be doing a lot of acquiring of other equipment and materials and so forth and putting them together in these deals. So, you're going to see some continued involvement in that line. And that again is going to be a lump thing because it depends on the flow of the job as when the deliverable is due, when the equipment is delivered and so on. So, I wouldn't calculate too much correlation on these parameters and the ODC part of this thing. I think it's the overlying, over long trend line, which has been very sustainable which you can look back over the history of the performance quarter-over-quarter, year-over-year. I think those are the kinds of things that seem to me to be more interesting things to keep in review. Stephen, do you want to add... Stephen Waechter The other thing I'd add is if you look when we had 140 million in new contract awards during the quarter, we also get significant funding on existing contract vehicles. And you don't really see - we don't report that out every quarter. But you can see it from the backlog statistics that's up, and also the funded backlog of the 485 million. If you look at that relative to last year, you'll see significant growth in that. And that's what really drives the overall growth for us. Again, we don't report that every quarter, but we are getting - and we don't come out with a press release on every tasking order that we get under an existing contract vehicle. Jack London I have another comment, actually, in this area. And that is that the contract base that we announce is very conservative. And we have been very conservative on our award announcements and values that we put out for the obvious reasons. The trend line though is that those values have been expanding. Those ceilings have been moving up in a great variety of our contracts. And we don't make it a custom to announce those kinds of things because we never know what those values are going to reach to. So, there's a variety of ways that we're bringing revenue in to the Company that isn't always just simply announceable through our news release process. Operator And we'll go next to Michael Coady at Sidoti & Company. Michael Coady Thanks. Very nice quarter guys. All my questions have been answered. Thanks. Jack London Thank you, Michael. Operator Just a reminder, that will be star one if you have a question. We'll go to Tim Quillon at Stephens, Inc. Tim Quillon Good morning. Jack London Good morning. Stephen Waechter Good morning. Tim Quillon A couple of questions here. First, your DOJ business appeared to be up about $5 million quarter-to-quarter. I'm assuming that's related to this tasking you're talking about that was fixed price. I was wondering if you could just shed a little bit more light on that. Jack London Yes. Do you want to speak to that a bit Stephen or Ken? Either one. Ken, would you? Stephen Waechter Well, it certainly had to do some - excuse me -the fixed price tasking just at the overall level of activity on that particular contract that increased significantly. So, it was really across the board with the support that we're providing for that particular customer. There are a couple, as I indicated, unnamed agencies that we provide support for that - who were increasing their requirements, and the - we were responding to those in real time, Tim. So, it was across the entire platform for that very important customer of ours. Tim Quillon And is that, the most recent quarter is that a sustainable level of revenue? Kenneth Johnson I think - I don't know that the growth is sustainable, but I think because of the drama of the growth, that I believe that the revenue in the near term is in fact sustainable. We see an increased level of activity. And as we've indicated to all of our shareholders and prospective shareholders. If there's a deal of some consequence where it's a sizeable piece of litigation, we get a very good long hard look by the customer. We're sort of their go to customer. And we value that relationship greatly. And we're very, very responsive. And we'll go that extra mile to make sure that we can help them support the variety of litigation that they're involved in. Operator And we'll go to Joy Mukherjee at AG Edwards. Joy Mukherjee Good morning. I'm stepping in here for Mark Jordan. Question on - you mentioned that in the last six weeks you've seen an increased flurry of contract activity going on and you expect that to continue probably, you know, through the first quarter end. It seems reasonable to expect that those would probably translate in to revenue beyond the first quarter. I was wondering how much of that you've already baked in to your guidance, that you developed, I guess sometime in July. Ken Johnson I'll take that, Jack, OK. Let me make sure I clarify. The first six weeks, the flurry of activity has been the continued proposal writing that we saw a huge up tick in FYI - in the fourth quarter of FY '03. Basically, our bid backlog in the first six weeks grew from the approximate $950 million to a little over $1.2 billion. So, basically we've written more proposals. There are more opportunities out there being evaluated. As you would expect, if we're writing a proposal, we - we're continually doing the ration kind of forecast on a success profile, many of those, in fact, have been baked in to our requirement. Now, it's very rare for us to write a competitive proposal and put that in to the stylist and say we've got a 100-percent chance. In fact, it's so rare that it's never happened. What - we have all of those opportunities baked in our forecast at some probability. Now if win a little more than our fair share, life will be extremely good. If we lose a little more than our fair share, I'm the one that has to go tell Jack not you and life will not be very good around here. But we're cautiously optimistic that of that $1.2 billion that we have evaluated we're going to win more than our fair share. Joy Mukherjee That's fair. Another housekeeping question. What should we model in terms of D&A and tax rate for 2004? Stephen Waechter On the tax rate side, 37-and-a-half-percent in line with where we are this year. We're going to be reviewing that. But I think that, for right now, I think it's a good assumption. And as far as D&A, I would use pretty much the same kind of rate that we had this past year. Operator And we'll got to David Garrity at American Technology Research. David Garrity Hi, just a follow up question I had from earlier. Can you give any comment on your run rate in terms of ... Kenneth Johnson It broke up David. Stephen Waechter Yes, we're not hearing you. David Garrity Yes, comment and question I had was the win rate that you've had on your bidding. Jack London Ken, do you want to go ahead and take that one? Kenneth Johnson Sure yes. We're - I hate to even give you this number here in front of my boss, but our win rate is north - has bee north of 40-percent. And that's on - that doesn't count incumbent contracts. And that's new, new stuff, and so that's kind of what we look to establish on a going forward basis. That's kind of the marker that we've set up for ourselves. David Garrity OK. Thank you. Kenneth Johnson I think Jack has a... Jack London I just wanted to chime in and emphasize what Ken said about the re-compete, the incumbency situation. We have a wonderful track record over the year of being able to sustain and retain our business. In fact, one of the proud records I think [inaudible] certainly north of 95-percent on the rewin on the dollar level. So, I just would amplify that as opposed to the new initiatives, which Ken addressed. Operator And showing no further questions, I would like to turn call back over to Dr. London for any additional or closing remarks. Jack London Thank you, David. Thank you very much. Ladies and gentlemen, we certainly appreciate your participation here. And David, we thank you for your help on our call. And certainly thanks to everyone for your questions and your answers. We want to thank you for your participation certain today. We believe and we hope we've provided you with a clear picture of our results for this last year and our expectations for the coming year. The quarter, obviously, will be participating in at least to more conference out in New York and the Midwest and the West Coast among other places. So, we'll be on the road seeing many of you, I'm sure. On the other hand, if you have the opportunity to be in the Washington area, we certainly invite anyone of our investors or security analysts or organizations so indicated to stop by and give us a call, come by and visit with us. We're always interested with the opportunity to meet people that are interested CACI. We also know that there may be a few other questions that you had - some of you might have had that you'd like to follow up with. And is our customer and tradition here within about 15 minutes - let's call it a quarter after 10 - we'll open up the lines to Stephen Waechter and David Dragics for any special issues that you would like to call in and check on that you might have missed or otherwise information you'd like to get. So, again, thank you for your interest. We appreciate you tuning in. And we wish everyone a very fine morning. Thank you very much, ladies and gentlemen. Operator Thank you for your participation in today's conference, and you may disconnect at this time. END And an extract from an 8K about the current tortured fiasco: SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 8-K CURRENT REPORT Pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934 May 5, 2004 (Date of Report) CACI International Inc (Exact name of registrant as specified in its Charter) Delaware 0-8401 54-1345899 (State of other jurisdiction of incorporation) (Commission File Number) (IRS Employer Identification Number) 1100 N. Glebe Road Arlington, Virginia 22201 (Address of principal executive offices)(ZIP code) (703) 841-7800 (Registrant's telephone number, including area code) -------------------------------------------------------------------------------- ITEM 5: OTHER EVENTS AND REGULATION FD DISCLOSURE On May 5, 2004 the Registrant responded to allegations in the media regarding the company's employees in Iraq and to financial community interests. A copy of the Registrant's press release is attached as Exhibit 99 to this current report on Form 8-K. -------------------------------------------------------------------------------- EXHIBITS Exhibit Number 99 Press Release dated May 5, 2004, responding to allegations in the media about the company's employees in Iraq and to financial community interests. -------------------------------------------------------------------------------- SIGNATURE Pursuant to the requirements of the Securities Exchange Act of 1934, the Registrant has duly caused this report to be signed on its behalf by the undersigned hereunto duly authorized. CACI International Inc -------------------------------------------------------------------------------- Registrant By: /s/ Jeffrey P. Elefante -------------------------------------------------------------------------------- Jeffrey P. Elefante Executive Vice President, General Counsel and Secretary -------------------------------------------------------------------------------- Exhibit 99 News Release CACI International Inc - 1100 North Glebe Road - Arlington Virginia 22201 CACI Responds to Allegations in the Media About Its Employees in Iraq and to Financial Community Interests Arlington VA, May 5, 2004 -- CACI International Inc (NYSE: CAI) announced that its Chairman, President, and CEO Dr. J.P. (Jack) London issued the following statement in a conference call to the investment community earlier today: "First, I want to share our expression of disappointment, outrage and disgust on behalf of all of the employees at CACI regarding the allegations of abuse at the Abu Ghraib prison. In being responsive to our investors and the public, two of the biggest challenges we're facing are the lack of information that has been provided from the US Government to our company in these matters and the fact that we are dealing with significant amounts of classified information. We are also dealing with the security and safety of CACI people in the theater at-large. We have received no information from the Department of Defense and the US Government on this matter. The information that we have been getting comes from the news media. They are, in turn, quoting from a leaked classified document. We have also formally requested a copy of the Taguba report that was reported and discussed in the article in The New Yorker magazine. We are intending to follow up with our own investigations as previously indicated. That report, however, remains a classified document. It has not been declassified and has not been provided to us despite the fact that we've requested it. It is also true that the report has been published widely, is on the Internet and is available otherwise. We have taken advantage of that fact and have become familiar with the document, and have read it in detail. We know what is in the report even though it has not been provided to us in a formal way. The fact remains that we are simply not able to confirm in any fashion that any CACI employee was involved in prisoner abuse at Abu Ghraib prison, notwithstanding allegations reported through the media. Because of our relationship as a contractor for the Department of Defense, we must rely on formal communications from the department in this matter in terms of our work activity, the scope of work, the continuation of work, and the quality of our performance. We have no reports of any adverse nature. At present, all CACI employees continue to work on site providing the contracted for services to our clients in that location and around the world. CACI does not condone or tolerate or endorse in any fashion any illegal, inappropriate behavior on the part of any of its employees in any circumstance at any time anywhere. If, regrettably, any CACI employee was involved in any way at any time in any of the alleged behavior that occurred in Iraq and has been reported in the media and elsewhere, for those employees I will certainly personally take immediate, appropriate action. We will be relentless in identifying and punishing any improper behavior that damages this company's image and reputation, which is significant in our marketplace, or impugns the reputation of any of its hard-working, honorable employees. If there is illegal behavior on the part of any employee, it is not indicative of the mode of operation of this corporation or of the patriotic service of thousands of CACI's honorable, hardworking people diligently pursuing their assignments. I must report that we have not received any information to stop any of our work, to terminate or suspend any of our employees, or otherwise show cause for any inability to perform in any fashion regarding the alleged, discussed and repeated issues in the press. We are eager to find out as soon as possible what has happened, and we have taken steps to inquire. Furthermore, CACI employees have volunteered and were interviewed at the beginning of the investigations months ago. As a result of some of these alleged activities, we have launched our own independent investigation, supported by competent, outside legal counsel. And our Board of Directors has been informed. If we are asked to participate in any investigations by the US Government, you must be assured that we will fully cooperate. Meanwhile, CACI continues to support the Army's mission in Iraq and around the world, as well as our other military service clients. There has been no immediate economic impact on CACI as a result of any of these allegations in terms of contracts or ongoing business in any form whatsoever. We are still aggressively recruiting to fill urgent and important assignments and requirements on our contracts based throughout the world. To date we have received no communication from the Defense Department concerning termination of any contracts, any delivery orders, any activities, any where in the world. And we do not expect any. CACI employees are supporting our efforts in Iraq, and they provide valuable skill augmentations in important critical areas in support of the US military's wartime mission activities in this critical combat zone. As I have said many times before, the government is shorthanded in some of these critical skill set areas, and relies on qualified contractors to provide a wide variety of competent, professional services related to the global war on terrorism. We have been proud to support those initiatives and requirements. The people we have recruited have been competent and capable. Their credentials meet the professional expectations of the assignments to which they are dedicated. CACI people in Iraq meet or exceed those qualifications in all cases. The fact is that the majority of our work is providing information technology and technology solutions to the US government. The interrogation services fit within the portfolio of our service offerings within the intelligence community that includes equipment sensing devices, communications needs and requirements, maintenance and training, as well as data collection, evaluation, analysis, product development, and decision support tools. Interrogation services are simply one small element of that portfolio broadly categorized as data collection. They are much less than one percent of our entire business base. Our work throughout the intelligence community spans many of these other areas as I have indicated. This support is from the tactical level all the way to the national and strategic level. We are all appalled by the reported actions of a few--and actually grieved--when so many professional and patriotic Americans are sacrificing so much to defend our country against terror and to support the freedom of Iraq." About CACI CACI International Inc provides the IT and network solutions needed to prevail in today's new era of defense, intelligence, and e-government. From systems integration and managed network solutions to knowledge management, engineering, simulation, and information assurance, we deliver the IT applications and infrastructures our federal customers use to improve communications and collaboration, secure the integrity of information systems and networks, enhance data collection and analysis, and increase efficiency and mission effectiveness. Our solutions lead the transformation of defense and intelligence, assure homeland security, enhance decision-making, and help government to work smarter, faster, and more responsively. CACI, a member of the Russell 2000 and S&P SmallCap 600 indices, provides dynamic careers for approximately 9,400 employees working in over 100 offices in the U.S. and Europe. CACI is the IT provider for a networked world. Visit CACI on the web at www.caci.com . Forward Looking Statements There are statements made herein which may not address historical facts and, therefore, could be interpreted to be forward-looking statements as that term is defined in the Private Securities Litigation Reform Act of 1995. Such statements are subject to factors that could cause actual results to differ materially from anticipated results. The factors that could cause actual results to differ materially from those anticipated include, but are not limited to, the following: regional and national economic conditions in the United States and United Kingdom, (the UK economy is experiencing a downturn that affects the Registrant's UK operations) including conditions that result from terrorist activities or war; changes in interest rates; currency fluctuations; failure to achieve contract awards in connection with recompetes for present business and/or competition for new business; the risks and uncertainties associated with client interest in and purchases of new products and/or services; continued funding of U.S. Government or other public sector projects, particularly in the event of a priority need for funds, such as homeland security, the war on terrorism or rebuilding Iraq; government contract procurement (such as bid protest, small business set asides, etc.) and termination risks; the results of the amended appeal of CACI International Inc, ASBCA No. 53058; the financial condition of our clients; paradigm shifts in technology; competitive factors such as pricing pressures and competition to hire and retain employees; our ability to complete and successfully integrate acquisitions appropriate to achievement of our strategic plans; our ability to complete performance of fixed price contracts within contract value; material changes in laws or regulations applicable to our businesses, particularly legislation affecting (i) outsourcing of activities that have been performed by the government; and (ii) competition for task orders under Government Wide Acquisition Contracts ("GWACs") and/or schedule contracts with the General Services Administration; our own ability to achieve the objectives of near term or long range business plans; and other risks described in the Company's Securities and Exchange Commission filings. # # # For investor information contact: David Dragics Vice President, Investor Relations (703) 841-7835 ddragics@c... For other information contact: Jody Brown Senior Vice President, Public Relations (703) 841-7801 jbrown@c... -------------------------------------------------------------------------------- End of Filing © 2004 | EDGAR Online, Inc. powered by EDGAR Online ------------------------------------------------------------------------------------------------------------------ Insider tells of 'cooks, truck drivers' used to interrogate May 8, 2004 http://www.theage.com.au/articles/2004/05/07/1083911403437.html# A former intelligence officer exposes the flaws in the system. Julian Borger reports from Washington. Many of the prisoners abused at the Abu Ghraib prison were innocent, picked up at random by US troops and incarcerated by underqualified intelligence officers, a former US interrogator says. Speaking to The Guardian, Torin Nelson, who served as a military intelligence officer at Guantanamo Bay before moving to Abu Ghraib as a private contractor last year, blamed the abuses on a failure of command in US military intelligence and too much reliance on private firms. He said those companies were so anxious to meet the demand for their services that they sent "cooks and truck drivers" to work as interrogators. "Military intelligence operations need to drastically change in order for something like this not to happen again," Mr Nelson said. He claimed that many of the detainees were "innocent of any acts" against the coalition. Mr Nelson said that the same systemic problems were also responsible for large numbers of Afghans being mistakenly swept into Guantanamo Bay. He estimated that a third or more of the inmates at the controversial prison camp had no connection to terrorism. "There are people who should never have been sent over there," he said. "I was involved in the process of reviewing people for possible release, and I can say definitely that they should have been released, and released a lot sooner." Such allegations have been made before by victims' families and human rights groups, but Mr Nelson's is the first insider's account by a US interrogator. It amounts to an indictment of a system gone awry, and contradicts claims by the White House and the Pentagon that Abu Ghraib does not represent a systemic problem. Mr Nelson denies any involvement in the physical and sexual abuse of Iraqis at Abu Ghraib, and is listed in the official military report into the scandal as a witness rather than a suspect. He said he resigned from his job in February in fear of his life, because Abu Ghraib was coming under increasing attack by Iraqi insurgents, and because of his disillusionment with the military leadership there. Mr Nelson said the nature of the detention system made the imprisonment and abuse of the innocent all but inevitable. Much of the problem lay in the quality of the interrogators, Mr Nelson said. Only the youngest and least-experienced intelligence officers were actually used to question detainees. Mr Nelson was just one of a roughly 30-strong team in Abu Ghraib employed by a Virginia-based firm, CACI International. - Guardian ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- From: James M. Atkinson, Comm-Eng Date: Sat May 6, 2000 9:58pm Subject: Re: URGENT - Microtel PR-700B For Sale on E-Bay 'aint modern technology a wonderful thing. Ten years ago it was a 494 A/P, a PR-700, MSR-902, a Tek 500 rack, various black boxes, and a whole rats nest of cross connect cables. Now a days, its a single 40 pound instrument (and a laptop) that out performs all of it (with a set of wave guides and mixers to 110 GHz in a briefcase). Gads, I remember when I was able to add a IEEE-488 controller to a PR-700, AND was able to get it to talk to the 8566 and 494 at the same time (from the Z-148). It was a really major advance in performing TSCM under computer control. I really loved the 2782/2784 series, but was sad it never really got fully exploited in TSCM for raster analysis. -jma At 10:27 PM -0500 5/6/00, Rocco Rosano wrote: >Et Al: > >I used this type of unit for over 8 years. These unites became popular in >the mid-80's. It was the the standard replacement for the WR-550. The >PR-700 series was the base companion to the MSR-902 (A microwave receiver.) > >The PR-700B will operate on 24vdc Battery power. It is specifically >designed to use in a non-alerting fashion with a suppressed IF (21.4Mhz) >radiation. In the battery mode, it is very hard to detect by ECM aspect >trigger. It will RASTER in off the WB output in the 2Mhz Bandwidth mode. >I have RASTERed both PAL and SECAN signals. It was the standard before >TSCM Teams shifted to Spectrum Analyzers. > >Rocco Rosano >Reynoldsburg, Ohio >mailto:RoccoRosano@a... > >"James M. Atkinson, Comm-Eng" wrote: > > > If you are (or were) involved with Government TSCM then you know what > > this piece of equipment does (spit, curse, moan, grumble, spit, spit, > > spit). > > > > Yes, it's big, it's bulky, and it's nasty... (and a bitch to > > maintain) but if you can scoop it up for a few grand it's a great > > deal (I have copies of the government operations manuals for $50.00 > > if you need them). > > > > The Microtel PR-700B is a 3 kHz to 2 GHz synthesized receiver. Some > > of the features are: > > > > 3 kHz to 2 GHz frequency range tunable in 1 kHz steps > > > > Has spectrum display for signal analysis > > > > Has AM, FM, CW, LSB, USB modulation > > > > Has 3 kHz, 15 kHz, 75 kHz, 300 kHz and 2 MHz bandwidths > > > > Has Video in, blanking in, sweep in, narrow band (AM and FM), wide > > band (AM and FM), SC out and 21.4 MHz out. > > > > The equipment was found on E-Bay, and it looks like the sale is over > > on Sunday night (so you have one day to pick it up). > > > > http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=322016958 > > > > Ah, before anybody asks, the radio is worth a few hundred bucks if > > you already have a countermeasures search radio (most of us already > > do). If you don't already have such a unit this radio could save you > > 10-15 grand and radically increase your TSCM capabilities (note the > > SubCarrier Receiver Segment) > > > > -jma > > > > It was my understanding that all of the TSCM units were stripped to > > the chassis prior to being scrapped, so I would be curious as to this > > units pedigree. =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 273 From: Rocco Rosano Date: Sat May 6, 2000 11:31pm Subject: Re: URGENT - Microtel PR-700B For Sale on E-Bay Jim It is really hard to be discrete entering a hotel and trying to carry a Tektronix 492 or 494 in a suitcase and not look conspicuous! Damn that thing was heavy; especially the longer 492. You know, I never did have any luck with the computer control systems of that era. I would sit with that controller and record the spectrum to a Winchester and then try to identify a threat. Hell, I spent more time trying to zoom-in on threats then I would have spent just doing a real-time, signal-by-signal analysis. The HP-8566 and 8568 where, in my opinion, not rugged and portable. I tried all different ways of transporting it, but it was never really practical. It is a superior machine, but should remain in the forensics lab. The demodulator box for the 494AP was, in my opinion again, worthless. I would never use it if I could get away from it. My favorite was the WR-550 (junk today) but that thing was impressive in its day. I especially loved the distinctive sound it made when you fired that badboy-up. Boy, does that bring back memories. To this day, I still carry a 2001 key on my key chain. Rocco Rosano Reynoldsburg, Ohio mailto:RoccoRosano@a... "James M. Atkinson, Comm-Eng" wrote: > 'aint modern technology a wonderful thing. > > Ten years ago it was a 494 A/P, a PR-700, MSR-902, a Tek 500 rack, > various black boxes, and a whole rats nest of cross connect cables. > > Now a days, its a single 40 pound instrument (and a laptop) that out > performs all of it (with a set of wave guides and mixers to 110 GHz > in a briefcase). > > Gads, I remember when I was able to add a IEEE-488 controller to a > PR-700, AND was able to get it to talk to the 8566 and 494 at the > same time (from the Z-148). It was a really major advance in > performing TSCM under computer control. > > I really loved the 2782/2784 series, but was sad it never really got > fully exploited in TSCM for raster analysis. > > -jma > > At 10:27 PM -0500 5/6/00, Rocco Rosano wrote: > >Et Al: > > > >I used this type of unit for over 8 years. These unites became popular in > >the mid-80's. It was the the standard replacement for the WR-550. The > >PR-700 series was the base companion to the MSR-902 (A microwave receiver.) > > > >The PR-700B will operate on 24vdc Battery power. It is specifically > >designed to use in a non-alerting fashion with a suppressed IF (21.4Mhz) > >radiation. In the battery mode, it is very hard to detect by ECM aspect > >trigger. It will RASTER in off the WB output in the 2Mhz Bandwidth mode. > >I have RASTERed both PAL and SECAN signals. It was the standard before > >TSCM Teams shifted to Spectrum Analyzers. > > > >Rocco Rosano > >Reynoldsburg, Ohio > >mailto:RoccoRosano@a... > > > >"James M. Atkinson, Comm-Eng" wrote: > > > > > If you are (or were) involved with Government TSCM then you know what > > > this piece of equipment does (spit, curse, moan, grumble, spit, spit, > > > spit). > > > > > > Yes, it's big, it's bulky, and it's nasty... (and a bitch to > > > maintain) but if you can scoop it up for a few grand it's a great > > > deal (I have copies of the government operations manuals for $50.00 > > > if you need them). > > > > > > The Microtel PR-700B is a 3 kHz to 2 GHz synthesized receiver. Some > > > of the features are: > > > > > > 3 kHz to 2 GHz frequency range tunable in 1 kHz steps > > > > > > Has spectrum display for signal analysis > > > > > > Has AM, FM, CW, LSB, USB modulation > > > > > > Has 3 kHz, 15 kHz, 75 kHz, 300 kHz and 2 MHz bandwidths > > > > > > Has Video in, blanking in, sweep in, narrow band (AM and FM), wide > > > band (AM and FM), SC out and 21.4 MHz out. > > > > > > The equipment was found on E-Bay, and it looks like the sale is over > > > on Sunday night (so you have one day to pick it up). > > > > > > http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=322016958 > > > > > > Ah, before anybody asks, the radio is worth a few hundred bucks if > > > you already have a countermeasures search radio (most of us already > > > do). If you don't already have such a unit this radio could save you > > > 10-15 grand and radically increase your TSCM capabilities (note the > > > SubCarrier Receiver Segment) > > > > > > -jma > > > > > > It was my understanding that all of the TSCM units were stripped to > > > the chassis prior to being scrapped, so I would be curious as to this > > > units pedigree. > > =================================================================== > Sed quis custodiet ipsos Custodes? > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > "...any sufficiently advanced technology is > indistinguishable from magic." - Arthur C. Clarke > =================================================================== > > ------------------------------------------------------------------------ > You have a voice mail message waiting for you at iHello.com: > http://click.egroups.com/1/3555/1/_/507420/_/957668462/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS [Non-text portions of this message have been removed] 274 From: James M. Atkinson, Comm-Eng Date: Sat May 6, 2000 11:11pm Subject: Re: URGENT - Microtel PR-700B For Sale on E-Bay I've used (and have personally owned) both the 494, 496, and 492 and was never really happy with them for TSCM usage. Tek "almost had a good idea" they the suckers were heavier then they needed to be, and they tended to light up the RF spectrum (thus blowing the "non alerting" stage of the sweep). The 494 A/P was the only one that had any kind of real use in TSCM, as you could expand it using mixers, along with limited computer control (but you still had to drag around 300 pounds of support gear). Snatching the IF and routing to an external WJ box was cute, and running the Y-Axis video to a secondary SA or RAID box was even more fun. With modern technology a MSS, laptop, and ESA replace all of that AND permits you to carry most of the RF equipment on to the aircraft as carry on baggage. Ten years ago it was close to 100 pounds... today its under 100... perhaps even less then 50 lbs for the basic instruments. I'll be delighted when I can get a SA with a Firewire port and a series of removable 30 GB hard drives (488 and serial is painfully slow). Now if someone would just come out with a compact 25-pair/4-pair phone analyzer that was worth a hoot I would be quite happy. I would also like to see a briefcase imaging system that integrates a visual/IR spectra, 5 um precision Xray, and a 3-5/8-15 um thermal imaging system all into one system. -jma At 11:31 PM -0500 5/6/00, Rocco Rosano wrote: >Jim > >It is really hard to be discrete entering a hotel and trying to carry a >Tektronix 492 or 494 in a suitcase and not look conspicuous! Damn that thing >was heavy; especially the longer 492. > >You know, I never did have any luck with the computer control systems of that >era. I would sit with that controller and record the spectrum to a Winchester >and then try to identify a threat. Hell, I spent more time trying to zoom-in >on threats then I would have spent just doing a real-time, signal-by-signal >analysis. > >The HP-8566 and 8568 where, in my opinion, not rugged and portable. I tried >all different ways of transporting it, but it was never really practical. It >is a superior machine, but should remain in the forensics lab. > >The demodulator box for the 494AP was, in my opinion again, >worthless. I would >never use it if I could get away from it. > >My favorite was the WR-550 (junk today) but that thing was impressive in its >day. I especially loved the distinctive sound it made when you fired that >badboy-up. Boy, does that bring back memories. To this day, I still carry a >2001 key on my key chain. > >Rocco Rosano >Reynoldsburg, Ohio >mailto:RoccoRosano@a... > >"James M. Atkinson, Comm-Eng" wrote: > > > 'aint modern technology a wonderful thing. > > > > Ten years ago it was a 494 A/P, a PR-700, MSR-902, a Tek 500 rack, > > various black boxes, and a whole rats nest of cross connect cables. > > > > Now a days, its a single 40 pound instrument (and a laptop) that out > > performs all of it (with a set of wave guides and mixers to 110 GHz > > in a briefcase). > > > > Gads, I remember when I was able to add a IEEE-488 controller to a > > PR-700, AND was able to get it to talk to the 8566 and 494 at the > > same time (from the Z-148). It was a really major advance in > > performing TSCM under computer control. > > > > I really loved the 2782/2784 series, but was sad it never really got > > fully exploited in TSCM for raster analysis. > > > > -jma > > > > At 10:27 PM -0500 5/6/00, Rocco Rosano wrote: > > >Et Al: > > > > > >I used this type of unit for over 8 years. These unites became popular in > > >the mid-80's. It was the the standard replacement for the WR-550. The > > >PR-700 series was the base companion to the MSR-902 (A microwave >receiver.) > > > > > >The PR-700B will operate on 24vdc Battery power. It is specifically > > >designed to use in a non-alerting fashion with a suppressed IF (21.4Mhz) > > >radiation. In the battery mode, it is very hard to detect by ECM aspect > > >trigger. It will RASTER in off the WB output in the 2Mhz Bandwidth mode. > > >I have RASTERed both PAL and SECAN signals. It was the standard before > > >TSCM Teams shifted to Spectrum Analyzers. > > > > > >Rocco Rosano > > >Reynoldsburg, Ohio > > >mailto:RoccoRosano@a... > > > > > >"James M. Atkinson, Comm-Eng" wrote: > > > > > > > If you are (or were) involved with Government TSCM then you know what > > > > this piece of equipment does (spit, curse, moan, grumble, spit, spit, > > > > spit). > > > > > > > > Yes, it's big, it's bulky, and it's nasty... (and a bitch to > > > > maintain) but if you can scoop it up for a few grand it's a great > > > > deal (I have copies of the government operations manuals for $50.00 > > > > if you need them). > > > > > > > > The Microtel PR-700B is a 3 kHz to 2 GHz synthesized receiver. Some > > > > of the features are: > > > > > > > > 3 kHz to 2 GHz frequency range tunable in 1 kHz steps > > > > > > > > Has spectrum display for signal analysis > > > > > > > > Has AM, FM, CW, LSB, USB modulation > > > > > > > > Has 3 kHz, 15 kHz, 75 kHz, 300 kHz and 2 MHz bandwidths > > > > > > > > Has Video in, blanking in, sweep in, narrow band (AM and FM), wide > > > > band (AM and FM), SC out and 21.4 MHz out. > > > > > > > > The equipment was found on E-Bay, and it looks like the sale is over > > > > on Sunday night (so you have one day to pick it up). > > > > > > > > http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=322016958 > > > > > > > > Ah, before anybody asks, the radio is worth a few hundred bucks if > > > > you already have a countermeasures search radio (most of us already > > > > do). If you don't already have such a unit this radio could save you > > > > 10-15 grand and radically increase your TSCM capabilities (note the > > > > SubCarrier Receiver Segment) > > > > > > > > -jma > > > > > > > > It was my understanding that all of the TSCM units were stripped to > > > > the chassis prior to being scrapped, so I would be curious as to this > > > > units pedigree. > =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 275 From: G. Hoxie Date: Sun May 7, 2000 1:13am Subject: Thanks for the Feedback (Mason Rcvr) I want to thank everyone for their feedback. It was just one of those things that you really don't expect to find at a flea mkt. I need the thing like a hole in the head, and I know it would be noisy, out of tune, or worse but, having not seen a unit like that in such a long time made me wax nostalgic. And well...it really tempted me. Thanks for talkin me down man!!!! G 276 From: Date: Mon May 8, 2000 9:52am Subject: eBay: SALES OF RESTRICTED ITEMS Jim, et al: As consultants/investigators for eBay-we appreciate being made aware of US18Title2511-2512 possible violation(s) re the sale(s) of Audio/Video equipment having descriptors such as "spy, covert, surveillance, espionage". This appears mostly as 2.4 Ghz merchandise. Should anyone come across sumerchandise, on the eBay site, we would appreciate being immediately notified in order to take the appropriate action as well as noting buyer/seller info. Please refer to the specific auction number. Bill Schneid Director of Special Operations Global Projects, Ltd. 310.314.8760 ICQ48007716 sleuthone@a... bsmith@e... PI15860 277 From: James M. Atkinson, Comm-Eng Date: Mon May 8, 2000 2:03pm Subject: Israelis Bugging White House >President, Senior Officials Briefed on Possible 'Penetration' of White House >Phones > >6:57 p.m. ET (2257 GMT) May 5, 2000 > >By Carl Cameron > >WASHINGTON íƒÓ The White House telephone system may have been penetrated by an >employee of an Israeli-owned telecommunications billing company that helped >install new telephone lines there three years ago, Fox News has learned. > >FOX News > >Sources say a senior-level employee of Amdocs had a separate T1 data phone >line installed from his base outside St. Louis connected directly to Israel > >The FBI, which has briefed President Clinton, CIA Director George Tenet, FBI >Director Louis Freeh and Attorney General Janet Reno, is investigating what >sources told Fox News was a "penetration of the U.S. government telephone >system." > >The breach may have involved the "real time" interception of telephone >conversations inside the White House and other government offices. It does >not involve the secure lines that the president uses for calls to foreign >leaders or the military, the sources said. > >For the past 18 months, the FBI has been investigating Bell Atlantic and >Amdocs, a Chesterfield, Mo., telecommunications billing company, Fox News has >learned. Amdocs helped Bell Atlantic install new telephone lines in the White >House in 1997. > >Amdocs, once a small Israeli software company, is the world's leader in the >$20 billion telecommunications billing software industry, with expected >revenues this year of $1.1 billion, > >snip snip > >Pull up link to read rest of story > > >http://foxnews.com/national/050500/phonebreach.sml > >Fox News =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 278 From: Steve Uhrig Date: Mon May 8, 2000 9:11pm Subject: Re: eBay: SALES OF RESTRICTED ITEMS Once upon a midnight dreary, sleuthone@a... pondered, weak and weary: > As consultants/investigators for eBay-we appreciate being made > aware of US18Title2511-2512 possible violation(s) re the sale(s) > of Audio/Video equipment having descriptors such as "spy, covert, > surveillance, espionage". This appears mostly as 2.4 Ghz > merchandise. Any ebay user can be a "consultant/investigator". When ebay was forming, I worked extensively with ebay's general counsel Rob Cherry concerning devices in violation of 2512. I wrote word for word their published policy restricting the sale of these devices: http://pages.ebay.com/help/community/png-elec.html " eBay does not permit the sale of products that are designed primarily to record the private oral, wire, or electronic conversations of others without their knowledge or permission. These items (for example, small, easily hidden transmitting devices such as telephone "bugs", "wiretap" devices, "miniature transmitters", and "surveillance microphones") are illegal to possess or sell under Title 18, United States Code Section 2512, and their use also violates the law in many states and countries." Ebay cannot police the many millions of items listed every day on their site. They have the policy. They also have a form: http://cgi3.ebay.com/aw-cgi/eBayISAPI.dll?ReportInfringing where any user can report an illegal item. That form goes to a 24/7 team of live users, and an offending item will be pulled within minutes. I personally reported an electronic surveillance item manufactured by us which I knew had been stolen from NYPD, and the listing was killed within 15 minutes. A few volunteer NATIA members (federal agents) periodically scan ebay and report blatantly illegal items. You would see a lot more if it weren't for their efforts. They don't waste their time on toys however. Anyone can report anything in violation. Report it directly to ebay. No need to go through anyone else. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 279 From: Jay Coote Date: Wed May 10, 2000 10:43am Subject: Riser-Bond TDR Catalog Some readers may be interested in the latest hardcopy TDR catalog from Riser-Bond. There is a good beginner TDR tutorial in the catalog complete with waveforms and other tips. There is a model 1205TX TDR which is supposed to be able to "see through" load coils. www.riserbond.com (This is not an ad or endorsement, etc etc) Jay Coote Los Angeles 280 From: Date: Tue May 9, 2000 6:56pm Subject: eBay investigator/consultant In a message dated 5/9/00 5:32:03 PM, steve@s... writes: << Any ebay user can be a "consultant/investigator >> Perhaps I didn't find it necessary to indicate the word PAID. Perhaps some thought might have gone to your assertion that we are not paid by eBay. In any case, our NDA prohibits me for discussing our relationship further. Feel free to correspond with us at "bsmith@e..." Bill Schneid Director of Special Operations Global Projects, Ltd. 310.314.8760 ICQ48007716 http://globalprojectsltd.com PI15860 281 From: EDT Date: Wed May 10, 2000 11:41am Subject: Re: Riser-Bond TDR Catalog Mr. Coote, Would you please fix your computer date? You are always at the end of the line! Thanks, Evan Townsley Los Angeles 282 From: James M. Atkinson, Comm-Eng Date: Wed May 10, 2000 11:25pm Subject: NEW PROVERBS NEW PROVERBS If you're too open minded, your brains will fall out. Age is a very high price to pay for maturity. Before you criticize someone, walk a mile in his shoes. That way, if he gets angry, he'll be a mile away - and barefoot. Going to church doesn't make you a Christian any more than going to a garage makes you a mechanic. Artificial intelligence is no match for natural stupidity. A clear conscience is usually the sign of a bad memory. A closed mouth gathers no feet. If you must choose between two evils, pick the one you've never tried before. My idea of housework is to sweep the room with a glance. Not one shred of evidence supports the notion that life is serious. It is easier to get forgiveness than permission. I have found at my age going bra-less pulls all the wrinkles out of my face. For every action, there is an equal and opposite government program. If you look like your passport picture, you probably need the trip. Always yield to temptation, because it may not pass your way again. Bills travel through the mail at twice the speed of checks. A conscience is what hurts when all your other parts feel so good. Eat well, stay fit, die anyway. Men are from earth. Women are from earth. Deal with it. No husband has ever been shot while doing the dishes. =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 283 From: Date: Thu May 11, 2000 1:26am Subject: Re: NEW PROVERBS Jim, thanks ; a little humor goes a long way!! HAVE A GREAT DAY !!! 284 From: Mike F Date: Thu May 11, 2000 0:14pm Subject: PSYCHIC SPY The site does have some useful Links,below this a HUuuGE LIST! It is worth a look and a bookmark. http://www.seasurf.com/~radioman/index.html later4,mike fiorentino Michael T. Fiorentino Syracuse,NY 13206-2945 "CONFIDENTIALITY WARNING This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 285 From: Mike F Date: Thu May 11, 2000 7:20pm Subject: ARMY FIELD MANUALS The Site Below is One of my Favorites. There is an Incredible Wealth of Information 4 FREEEE!!!! ARMY FIELD MANUALS, http://155.217.58.58/cgi-bin/atdl.dll?type=fm mikie.....he likes it! later4,mike f Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 286 From: gerry Date: Fri May 12, 2000 1:44am Subject: Re: J.A. hey james, read you at wired. i'm in manila, in case you need any legwork to be done on your fun project - tracking down that "love you" gang. regards www.pldt.com You can now read the site and even say NO TO METERING in six (6) languages 287 From: Mike F Date: Fri May 12, 2000 5:40am Subject: A STARTING POINT 4 DIFFERANT TYPES OF ELECTRONIC'S REPAIR SITE AN XXX-CELLANT STARTING POINT,SILICON SAM'S SITE & SAM'S LASER FAQ CAN BE REACHED: ELECTRONIC'S REPAIR SITE http://www.repairfaq.org/ L8R4,Mike F. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 288 From: James M. Atkinson, Comm-Eng Date: Fri May 12, 2000 8:51am Subject: State Department Hemorrhaging Secrets "The State Department suffers from a systemic failure to protect secrets that is long standing and far broader than the recent series of lapses..." according to a story by Christopher Marquis in today's (11 May) New York Times: http://www.nytimes.com/library/politics/051100state-secure.html A September 1999 report by the State Department's Inspector General (IG), cited by the Times, found that "Classified information in the Department, including Sensitive Compartmented Information, is vulnerable to compromise," and that "once every 3 days there were instances of mishandled SCI." Security infractions involving information at lower classification levels occurred, on average, over four times per day. The IG report is available here: http://www.fas.org/sgp/othergov/stateoig.html The correlation between poor security and over classification of information is a subject that is rarely acknowledged or discussed in official circles. But in 1998, the same State Department Inspector General auditor found that the Department was being unduly conservative in its classification policies, particularly when CIA cooperation was required in order to declassify information. "[A]bout half of the documents referred to CIA could be routinely declassified and ... some of the documents the Department has exempted [from declassification] do not clearly pose a danger to national security if they were released.... OIG [Office of Inspector General] recognizes there may be sensitive documents that if released and widely disseminated could pose a threat to lives, intelligence sources, and relations with other nations, but we found few compelling examples of this...." The 1998 audit report is posted here: http://www.fas.org/sgp/advisory/state/oig.html In a none-too-subtle poke at the CIA, Rep. Curt Weldon (R-PA) is proposing to establish a new intelligence agency to "integrate all of the databases, networks, imagery and analyses available across the government." You might call it kind of a ... central intelligence agency. Oh wait. Weldon's proposal was reported by Dan Verton in Federal Computer Week, here: http://www.fcw.com/fcw/articles/2000/0508/news-noah-05-08-00.asp =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 289 From: James M. Atkinson, Comm-Eng Date: Sat May 13, 2000 1:30pm Subject: How many West Point graduates does it take How many West Point graduates does it take to screw in a light bulb? One. ONE!! And do you know WHY it only takes ONE? Because no one else in this office knows HOW to change a light bulb. They don't even know the bulb is BURNED OUT. They would sit in this office in the dark for THREE DAYS before they figured it OUT. And once they figured it out they wouldn't be able to find the light bulbs despite the fact that they've been in the SAME CABNIET for the past SEVENTEEN *^*&% YEARS. But if they did, by some miracle, find the light bulbs, TWO DAYS LATER the chair that they dragged from two rooms over to stand on to change the STUPID light bulb would STILL BE IN THE SAME SPOT!!!!! AND UNDERNEATH IT WOULD BE THE CRUMPLED WRAPPER THE STUPID #)#(*(*^*&% LIGHT BULBS CAME IN. WHY??? BECAUSE NO ONE IN THIS office EVER CARRIES OUT THE GARBAGE!!!! IT'S A WONDER WE HAVEN'T ALL SUFFOCATED FROM THE PILES OF GARBAGE THAT ARE 12 FEET DEEP THROUGHOUT THE ENTIRE OFFICE. THE OFFICE!! THE OFFICE!!! IT WOULD TAKE AN ARMY TO CLEAN THIS....... That's how many. =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 290 From: Paul Curtis Date: Sat May 13, 2000 10:13pm Subject: RE: How many West Point graduates does it take Isn't it too bad that we take the brightest and best, send them off to West Point and the other service academies, teach them engineering, tactics, law, physics, math, etc., and then send them out into the field to lead people who now are not even required to finish high school? What is wrong with this picture? PC 291 From: James M. Atkinson, Comm-Eng Date: Sat May 13, 2000 10:19pm Subject: RE: How many West Point graduates does it take At 8:13 PM -0700 5/13/00, Paul Curtis wrote: >Isn't it too bad that we take the brightest and best, send them off to West >Point and the other service academies, teach them engineering, tactics, law, >physics, math, etc., and then send them out into the field to lead people >who now are not even required to finish high school? What is wrong with >this picture? > >PC What's is even funnier are those academy graduates who got admitted but never even completed high school (I am not kidding). -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 292 From: Jay Coote Date: Sat May 13, 2000 11:03pm Subject: RF Preamps and Downconvertors Anyone have sources in the US for "kit" or hobby RF preamps and microwave downconvertors? I am looking for a 2000-4000 Mhz to 0-2000 MHz D/C, as well as 4000-6000 MHz to 0-2000 MHz. Also looking for wideband RF preamps, hopefully to cover 5-10 KHz through 3000 MHz or higher, with 15-25 dB gain. Thanks Jay Coote Los Angeles TSCM@j... 293 From: Date: Sat May 13, 2000 7:45pm Subject: Re: How many West Point graduates does it take Jim Ross of Ross Engineering is a West Point Graduate 294 From: Mike F Date: Fri May 12, 2000 9:05am Subject: a quick question A person asked me about covert camera that ANTENNA. This person said he saw it on a web site. Do you know the web address? Have you ever heard of camera in ANTENNA? I know the are in Pagers,wristwatches and even eyeglasses but I cannot recall seeing a camera in an ANTENNA. Any help would be appreciated. Later4,mike f Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 295 From: gerard p. keenan Date: Sun May 14, 2000 10:01am Subject: West Point Hi All, I don't often post to the list since I'm not a professional in TSCM. I enjoy learning about it all from all you real professionals, though. I find it extremely interesting andinformative. It's amazing how much you realize you DON'T know when you're listening to those who DO know. However, I was reading the posts regarding the West Point thing this morning and just had to put in my $0.02 worth (or maybe that's up to $0.04 now with inflation :)) I retired after 20 years in the Navy with another five years (nearly) in Naval Security and Investigative Command (as a "local" hire). My entire family has been Navy, with few exceptions. An uncle who was a tank driver in the Army in WWII, a brother in the NJ Guard, two ex-brothers-in-law (first marrige) in the Royal Air Force. Even my wife is retired USN-R. So while I can't comment directly on the Army, I can on the military in general (I specialize in military research). While it's true that Academy grads, with all their training, etc., are sent out lead enlisted personnel, it is not true that these enlisteds are high-school drop-outs, or lack a high school diploma for some other reason. In fact, it's only been in the last 12 months or so that the military in general has lowered standards to accept a LIMITED number of people without high school diplomas. I believe the Army will accept 20,000 such this year, and the Navy 15,000. But this was forced on the services by the present administration. The military has been decreased nearly 33% since Clinton came into office, while the tempo of operations has increased 3 or 4 fold. Our troops are deployed further afield, and for much longer periods in "brush-fire" wars or peacekeeping missions than at any time in our history -- including the 50 years of the cold war. With our economy on fire like it's been, with the high-paying civilian jobs and benefits, the military recruiting efforts are resulting in less than encouraging numbers each year. Even the Reserve components are suffering since Clinton took office because he's relying more and more on Reservists to bolster the active duty force. Entire Reserve units are being called up for service in the Balkans and elsewhere -- which means these people are having to leave their jobs and families for 6-12 months, or more, at a time. Most of them will find no job when they come home. With this op tempo it's no wonder the all-volunteer is suffering. That, and low pay, quality of life, etc. are all taking their toll. The only way the services can maintain anything even close to combat readiness is to look elsewhere. So enlistment requirements are loosened up. Even the officers, the West Point, Annapolis, AF Academy grads, are leaving after their obligated service. A recent report showed upward of 10%-15% of Army officers are leaving each year. Commanders of combat helicopter units now have an average of something around 1,000 hours of flying time; 10 years ago the average was over 3,000. Political correctness is also a big factor. Clinton has used the military as a social experiment and now there are VERY few people in the military (officer or enlisted) who aren't more concerned about their careers than their people. Everyone is constantly looking over their shoulders and walking on eggs because their afraid that something they say or do might indicate "sexual harassment" or "gay-bashing" or some other socially unacceptable behavior as dictacted by the Clinton administration. It's impossible to maintain military discipline, unit pride, self-pride, in these conditions. Having said all that I should also say that some of the best officers I ever worked for were neither high school nor Academy grads. They were high school drop-outs who joined the service, got their GEDs, went on to get their degrees, and subsequently their bars. Some I knew personally achieved the rank of Navy Captain (O-6) -- no mean feat for anyone. When I enlisted in '63 there were, in fact, still a few enlisted combat pilots flying. These were usually Chief Petty Officers (E-7s) and all had flown fighter aircraft in combat in Korea. To my knowledge, none of these had ever attended college. I don't dispute Jim's comments about the light bulb, garbage, etc. That sort of thing has been around the military since the first soldier picked up arms. It is down to leadership. Or lack of. But then, that also stems from the "touchy-feely" military we have today where everyone is afraid of their own shadow because even a wrong look can bring charges of sexual harassment or some other stupid charge simply because one person dosen't like another person using the word "damn". This applies to officers and enlisteds alike. A superior can not chastise, or even counsel a junior one-on-one in a closed session like they did in my day because that junior can come out of the meeting and immediately charge the superior with something. The real pity is that it's one's word against the other and the accused is under suspicion until a full investigation is completed -- and usually suspended from duty during the investigation. Even if found innocent of all charges, the stigma remains, ultimately stagnating that person's career at best. If the superior has a witness present, it is to cover his/her butt so these charges won't be brought. But then that also defeats the purpose of counselling because it erodes the discipline and the authority of both parties involved. Particularly if it's a "chewing out." The erosion of benfits is another reason we're not getting the best in the military today. When I retired in '83 I did so under the impression that I and my family would have lifetime medical and dental care -- just like all the retirees before and after me. But that's been taken away, too. About the only benefits I have left are my retirement pay and that my family and I can travel anywhere in the world on military aircraft for just $10.00 a head as often as we like. Apart from that, my wife has a real good health plan from her company and we're backed up by TriCare, MilCarePlus, Champus which picks up nearly all of what is not covered under her plan. But we have to pay into them. Why? Most people today figure if they're going to have to pay into their military coverage, why not get a job that pays 3X what the military pays for the same work, except you only have to do it 5 days a week, 8 hours a day, and not 24/7 for your entire career? And your medical/dental benefits in many cases are even better than those offered by the military. Is it any wonder the military has been forced to lower standards just to maintain combat readiness? Jerry Keenan GPKeenan Co., Int'l Security Services 1005 Celia St. West Islip, NY 11795-2503 (631) 587-4020 (ph) (516) 768-9602 (mobile) (530) 323-6832 (jfax) secureops@e... gkeenan@s... [Non-text portions of this message have been removed] 296 From: William L. McCrory Date: Sun May 14, 2000 10:44am Subject: Re: How many West Point graduates does it take Well, since you asked... 1. The assertion that "the brightest and best" are the ones that get sent to the service academies is debatable if not arrogant. 2. The assumption that a graduate from a service academy is automatically a "leader" is an overstatement. Being well-educated does not automatically equate with being a leader. 3. If the service academy graduates are unable to lead those who now are not even required to finish high school, and presumably who are in need of leadership as distinguished from management, then perhaps the service academies are not turning out leaders after all. 4. During their four years in a service academy, the graduates lived in a very rigid, very structured, very demanding academic environment of peers. They have also been relatively isolated from day-to-day interaction with the very people they will be expected to lead...you know, those who are not even required to finish high school. To answer your question, "What is wrong with this picture," my answer is: We take service academy graduates and commission them as officers. My opinion is that service academy graduates should be required to serve a hitch as an E-4 or E-5 NCO and demonstrate that they have the necessary traits of loyalty, integrity, discretion, morals, character and leadership (not to mention humility) before being commissioned. If they are truly devoted to a career of military service, they won't allow themselves to lose their academic edge during their enlistment, and they will gain a much improved understanding of human interaction. That's important, because the "people who are now not even required to finish high school" are human, a rather important fact that more than one "instant officer" has failed to acquire in a service academy or OCS. It is also worth pointing out that in combat, more than one officer has had his bacon (and career) saved by people who were not then even required to finish high school either. Paul Curtis wrote: > Isn't it too bad that we take the brightest and best, send them off to > West > Point and the other service academies, teach them engineering, tactics, > law, > physics, math, etc., and then send them out into the field to lead people > > who now are not even required to finish high school? What is wrong with > this picture? > > PC > > > > -------------------------------------------------------------------------- > > -------------------------------------------------------------------------- > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 297 From: Ray Fitgerald Date: Sun May 14, 2000 11:02am Subject: Re: a quick question Mike; I recall seeing one a few years back. the lens was in the tip and was able to cover a 360' area. It also worked as a regular radio antenna. I'll try to dig it out of my disorganized filling system on product inf.. Regards, Raymond J. Fitzgerald Bureau Of Special Services bosspi@i... http://business.inc.com/bosspi 914-543-6487 --- 914-534-1060 FAX Licensed & Bonded Investigators in N.Y. since 1973 Member: NALI,ALDONYS,NAPPS,COIN,EPIC. " Truth Never Fears Detection " -----Original Message----- From: Mike F To: TSCM- Date: Sunday, May 14, 2000 12:00 PM Subject: [TSCM-L] a quick question >A person asked me about covert camera that ANTENNA. >This person said he saw it on a web site. >Do you know the web address? >Have you ever heard of camera in ANTENNA? >I know the are in Pagers,wristwatches and even eyeglasses but I cannot >recall seeing a camera in an ANTENNA. >Any help would be appreciated. >Later4,mike f > > > >Michael T. Fiorentino >Syracuse,NY 13206 > >"CONFIDENTIALITY WARNING" >This electronic message contains information which may be privileged >and/or confidential. The information is intended for use only by the >individual(s) >or entity named/indicated above. If you are not the identified/intended >recipient, be aware that >any disclosure, copying, distribution, or use of the contents of this >message/information is prohibited. If you are not the indicated recipient or >have >received this message in error contact our offices immediately for >instructions." > > > >------------------------------------------------------------------------ >IT Professionals: Match your unique skills with the best IT projects at >http://click.egroups.com/1/3381/1/_/507420/_/958320041/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > 298 From: James M. Atkinson, Comm-Eng Date: Sun May 14, 2000 11:10am Subject: Re: a quick question At 10:05 AM -0400 5/12/00, Mike F wrote: >A person asked me about covert camera that ANTENNA. >This person said he saw it on a web site. >Do you know the web address? >Have you ever heard of camera in ANTENNA? >I know the are in Pagers,wristwatches and even eyeglasses but I cannot >recall seeing a camera in an ANTENNA. >Any help would be appreciated. >Later4,mike f Several companies offer what is effectively a borescope concealed inside a telescoping AM/FM automobile antenna. It is of little practical value, but gets all kinds of "oohs and ahhs" from the public. There are also magnetic mount antennas which have a camera installed in the based. In reality is makes better tradecraft to simply install several CCD cameras inside the vehicle and to switch between them as needed. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 299 From: James M. Atkinson, Comm-Eng Date: Sun May 14, 2000 11:32am Subject: Re: How many West Point graduates does it take At 8:44 AM -0700 5/14/00, William L. McCrory wrote: >Well, since you asked... >1. The assertion that "the brightest and best" are the ones that get sent >to the service academies is debatable if not arrogant. True, most academy appointment are due to political connections, and rarely academic achievement of active duty service. After a war they also reduce admission requirement to simply "fill the ranks" and there have been many cases where someone with a sixth grade education got into a service academy simply to fill a slot. >2. The assumption that a graduate from a service academy is automatically >a "leader" is an overstatement. Being well-educated does not automatically >equate with being a leader. I've meet many people over the years that were graduates of a service academy or the ivy covered halls of academia who were quite unable to function. Being educated at such a facility does not ensure competency, just arrogance. That said, there are many fine graduates of these places, but simply attending a 50k per year school looks good on your resume when your 25, but becomes a curiosity when your 30, and minimal value when your 35. It really tickles me when someone over 40 wants to crow about the education they got when they were 20 (when in facts they have really done little of value with the education). Over the years I have seen dozens of Harvard, Yale, Air Force Academy, etc graduates who did very well in school, but couldn't keep a job for any length of time due to a lack of competency. >3. If the service academy graduates are unable to lead those who now are >not even required to finish high school, and presumably who are in need of >leadership as distinguished from management, then perhaps the service >academies are not turning out leaders after all. IMHO: Before anybody can attend a service academy a prospective student should have spent 6-8 years in the enlisted ranks and have been selected for academy attendance based strictly on demonstrated leadership skills (and not the connections of their parents). >4. During their four years in a service academy, the graduates lived in a >very rigid, very structured, very demanding academic environment of peers. >They have also been relatively isolated from day-to-day interaction with >the very people they will be expected to lead...you know, those who are not >even required to finish high school. So true, it used to really tickle me when the summer time hit, and all the "Ca-dinks" would be assigned to summer internships at the major SAC bases. They used to get busy work projects (like counting fence posts, coffee pot duty, procuring prop wash) just to keep them out of everyones hair. >To answer your question, "What is wrong with this picture," my answer is: >We take service academy graduates and commission them as officers. My >opinion is that service academy graduates should be required to serve a >hitch as an E-4 or E-5 NCO and demonstrate that they have the necessary >traits of loyalty, integrity, discretion, morals, character and leadership >(not to mention humility) before being commissioned. If they are truly >devoted to a career of military service, they won't allow themselves to >lose their academic edge during their enlistment, and they will gain a much >improved understanding of human interaction. That's important, because the >"people who are now not even required to finish high school" are human, a >rather important fact that more than one "instant officer" has failed to >acquire in a service academy or OCS. It is also worth pointing out that in >combat, more than one officer has had his bacon (and career) saved by >people who were not then even required to finish high school either. > I would also point out that new graduates are often the first to die when they reach the battle field, and that more then a few service academy graduates have had accidents involving "friendly fire". > > >Paul Curtis wrote: > > > Isn't it too bad that we take the brightest and best, send them off to > > West > > Point and the other service academies, teach them engineering, tactics, > > law, > > physics, math, etc., and then send them out into the field to lead people > > > > who now are not even required to finish high school? What is wrong with > > this picture? > > > > PC =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 300 From: William Knowles Date: Sun May 14, 2000 0:31pm Subject: Re: a quick question On Fri, 12 May 2000, Mike F wrote: > A person asked me about covert camera that ANTENNA. This person > said he saw it on a web site. Do you know the web address? Have > you ever heard of camera in ANTENNA? I know the are in Pagers, > wristwatches and even eyeglasses but I cannot recall seeing a > camera in an ANTENNA. Any help would be appreciated. Later4, mike > f Many years ago I saw the antenna camera in CCS' catalog, No idea what kind of price or where to find them on the Internet, and I never looked any farther than that, The fire-sprinkler cameras spooked me a bit and had me looking at normal ones a little more closer for a few years afterward. William Knowles wk@c... *-------------------------------------------------* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen. Alfred. M. Gray, USMC --------------------------------------------------- C4I Secure Solutions http://www.c4i.org *-------------------------------------------------* 301 From: James M. Atkinson, Comm-Eng Date: Sun May 14, 2000 3:39pm Subject: Pharmaceutical Research From time to time I speak with a pharmaceutical researcher who is my client. The other day a Glaxo rep told him of a drug that her company has under development. This drug sounds so promising that I want to suggest to my friends that they consider buying stock in the company. The drug is called "Gingko Viagra" and its function is to help you remember what the f**k you are doing. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== From: Justin T. Fanning Date: Thu May 9, 2002 7:27pm Subject: Re: Neat application for GPS This concept has been discussed for almost 10 years. The main problems include (but are not limited to): A) If it's a straight Lat/Long being fed into the unit as a key, assuming a resolution of 5m (15") that's only 511,185,932,522,525 combinations (4*pi*6378000^2). In traditional crypto terms that's ~ 49 bits, smaller than DES (56 bits) which is now widely considered insecure. B) The above is cut dramatically when you consider ~ 80% of the planet surface area is water and it would sure make sense to search the land parts first. Even this could be improved by searching the most likely countries first. C) Feeding in a false GPS signal doesn't seem overly hard if the attackers motivation was high enough, the specification & hardware are readily available. D) The creators claim they have got around (C) by making the data "path" dependant. I.E. the data is crypted and re-crypted as the unit moves. This takes care of (C) but you have now introduced a new problem, as the GPS system jitters and satellites come in and out of view, the only real way to ensure you don't get junk at the other end is to lower the overall resolution. Which brings us back to (a) & (b) except now path dependant but with much smaller numbers. I think there are very valid reasons why this has stayed as a theory (only) for so many years. If you want to do more research try: http://slashdot.org/articles/02/04/01/1853214.shtml?tid=93 I'm also sure Bruce Schneier from Counterpane has done a piece on this in his Crypto-Gram Newsletter http://www.counterpane.com/crypto-gram.html Kind Regards, JF --- Steve Uhrig wrote: > "Defender at the Gate" > CIO Insight (04/02) No. 12, P. 16; Epstein, Keith > Geo-encryption technology being pioneered by Georgetown University > professor Dorothy Denning is a cryptographic method by which data is > scrambled and stays that way until it reaches specific locations with > the aid of Global Positioning System (GPS) satellites. > For instance, a movie studio could send encrypted content to a video- > on-demand distributor without disclosing the decoding key. Denning is > co-developing the location-authentication technology with the > assistance of Internet entrepreneur Barry Glick and Hollywood film > executive Mark Seiler, but intellectual property owners are not the > only ones who could benefit from it. The Pentagon could use it to > keep coded messages secret, while medical records could be > transmitted with patients' privacy ensured. > The company Denning and her two partners formed, GeoCodex, aims to > develop geo-encryption devices, and currently has three joint > ventures in the works: One of them will protect entertainment > broadcasts, while the others will safeguard medical records and > classified information. Denning's partners say the GeoCodex chip > could also be incorporated into HDTV sets, although Denning estimates > it will be years before they become widely distributed. > Denning, who has been branded "America's cyberwarrior" by Time > magazine, has pioneered many hackproof technologies and exerts > influence on national security and technology policy. She also sits > on the new White House Advisory Group on Homeland Security. > www.cioinsight.com/article/0,3658,s=303&a=24831,00.asp > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* 5314 From: miketompkins2000 Date: Thu May 9, 2002 8:14pm Subject: The The Owl and the Doughnut - UK input Re: Cell Triangulation As a long time resident of the sleepy Cotswold town of Cheltenham, I thought I would throw a few logs on this fire. Firstly it has been a good joke around these parts over the last several years that you could never find a plumber or electrician when you needed one - they were all sucked into working 24/366 on the now legendary 'Doughnut' - part of the multi billion dollar extensions to GCHQ. Also worthwhile pointing out that there are several other projects of similar scale in the UK. Secondly (and it was not my remark, honest gov) Britains are the most spied upon people on the planet. Of course we have had a continual counter terrorist excuse on our doorstep driving this since the sixties, one which has provided all sorts of sympathies and support amongst our temporarily appointed leaders to allow our un-elected, more permanent leaders to have their way - and we too have had the occasional complete lunatic at the tiller. We adopted the digital GSM system a long while back, and our state 'monitors' are only marginally fettered by a need to seek judicial approval for 'measures' on the basis of our long term anti- terrorist campaign. There are many rubber-stamps, shortcuts and loopholes to having the authority required - for almost anything. Yes James, I saw a very effective demonstration in London of mobile phone tracking nearly five years ago, occasionally resolution was lost, but in general it was spot on and with the computer 'smoothing' added, was near perfect. Our mobile telecoms providers here work hand in hand with the security services to provide near instant data, and the paperwork is sorted out later. Anyway now to add the logs to the fire. Our continual and sizeable expenditure on the technical security infrastructure encompasses facilities to store and analyse massive amounts of historic mobile phone data. We have long realised that terrorists and criminals use the very same techniques that the good guys use to cover tracks. James mentions the use of multiple 'throw away' handsets, false registration and the like in the immediate run up to and during the operation by his hypothetical bomber. We would adopt broadly similar methods to those he describes on an operation to catch him. The problem on our doostep (and many others of interest to the state - drugs, arms and I did not say tax fraud) in general involves more than one person. When historical data is analysed it throws up all sorts of possibilities. Generally speaking in the pre-operational phase (or in intial contact) tradecraft and comms security is minimal. What is the probability of target 'A' being in close proximity to someone who today we decide to call target 'B' in Oxford Street on April 3rd at 10.31 three years ago? And then again in Wentworth on August 12th at 13.00 that same year, and again in Dorset (where 'A' has a home) the following June 8th at 20.20 and ... and .... Then we ask who else was in the same proximity on some or all of these occasions as well. See where this is going? We have the ability to re-construct past events on a probability driven basis using mobile phone data. It is not a panacea but another part of the picture. Nuff said. Finally, not inconsiderable effort has gone into turning selected members of our population into walking 'bugs'. It is very simple to discover the ID of a mobile phone (or phones) on the fly and simply program them to listen. Want to know what is going on in Meeting Room '202' at Simple and Simple, Merchant Bankers (and money launderers) ... cherchez le mobile! Of course this is limited to government level intervention (or is it?!?). A number of our merchant banks are now taking the very sensible precaution of making clients deposit their mobiles with the saloon keeper before meetings - simply turning them off doesn't do the trick either! Some clever souls produce a substitute SIM card with all the normal functions and a few secret menus. The main thrust of this is to alert you to occasions when your phone is being remotely reprogrammed. Good one for the terminally paranoid and only $200 ! Thanks for listening, Mike The Owl 5315 From: miketompkins2000 Date: Thu May 9, 2002 8:16pm Subject: SMS Printouts in the UK This is a bit off-subject for this group but worth a mention I thought. A few weeks back I was handed a printout (on innocuous plain 'Z' paper) of what purported to be all the SMS messages passing between 5 mobile phones and stretching back over 12 months +. Judging by the format, search fields etc, it was a standard report type and had easily been pulled off a database. I am aware of some of our government capability in this area, but the person who consulted me (who was one of the targets) said it had come via a detective agency. Anyone know how far down the pecking order this information can be accessed? Mike The Owl 5316 From: William Knowles Date: Thu May 9, 2002 10:22pm Subject: Nextel, investigators form agreement http://news.com.com/2100-1033-904259.html?tag=fd_top By Ben Charny Staff Writer, CNET News.com May 9, 2002, 4:30 PM PT update - Drug investigators in Baltimore reached an agreement Thursday with Nextel Communications after the two clashed over how the carrier was shutting off stolen cell phones used by drug dealers, despite court orders to keep the phones turned on. Nextel usually realizes its error and turns the phones back on, but the disruptions and resurrections tipped at least one alleged drug kingpin to a wiretap on the phone and destroyed months of work, attorneys for the city of Baltimore told a judge Thursday. "Something wrong with these joints here," an alleged Baltimore-area dealer is caught on a wiretap saying after his phone is shut off, and turned back on, for the second time. "Yo, for real. You know they on that hot sheet," his alleged accomplice answers back, according to court records. "Nextel and other carriers need to take these warrants more seriously," said Margaret Burns, a spokeswoman for the Baltimore City State's Attorney's Office, which had asked the judge to find Nextel in contempt of court for not cooperating with them on a wiretap request. "They don't recognize it, though." Thursday's proceeding in a Baltimore Circuit Court was to determine if Nextel should be punished for not obeying a court order to "keep these phones on, no matter what," which is written into the language of the wiretap approval by a judge in a particular drug case. The two sides told the judge on Thursday that they had agreed to drop the case in exchange for Nextel promising to put in place fixes for the problems. Nextel also promised to perform more in-house testing of the way it handles wiretap demands. Burns said both AT&T Wireless and Sprint PCS have had similar problems. The problem isn't just limited to Baltimore, either, sources said. The New York City Police Department has had similar complaints about wireless carriers in the past, according to one source there. Sprint and AT&T Wireless are not part of today's legal action. A representative for Nextel said the company has an entire unit devoted to tracking court-ordered wiretaps. She declined to discuss today's court action. At the heart of the problem seems to be the automated billing systems that carriers are using. They have replaced employees with more efficient computers capable of churning out thousands of bills at a time. But that has come at a price, said AT&T Wireless spokeswoman Alexa Graf. Stolen phones, or phones with long-overdue accounts--favorite tools for drug dealers--are "red-flagged" by the system for shut down. It's up to the carrier to catch this before the computer completes its task and ends service, Graf said. She said the company had similar problems in the past and continues to try and find a fix. She said one of the problems is the nature of a wiretap itself. No one is supposed to know about it, not even the employees whose decision to turn off the account could jeopardize a major drug investigation. "If someone sees they haven't paid their bill, we'd disconnect it," she said. "But the person responsible for all that doesn't know there's a wiretap request. The request often says 'don't tell anybody' there's a wiretap on this line." She adds that the effort to keep these phones working might eventually tip off drug dealers that the cops are listening in. "If you haven't paid your bill in six months, and you keep getting service, then you're going to start thinking something's up anyway," she said. A Sprint PCS representative did not return a call for comment. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 5317 From: James M. Atkinson Date: Thu May 9, 2002 10:19pm Subject: ENGINEERS ARE A SPECIAL BREED ENGINEERS ARE A SPECIAL BREED - Submitted by Doug L. Comprehending Engineers - Lesson One Two engineering students were walking across campus when one said, "Where did you get such a great bike?" The second engineer replied, "Well, I was walking along yesterday minding my own business when a beautiful woman rode up on this bike. She threw the bike to the ground, took off all her clothes and said, "Take what you want." The first engineer nodded approvingly, "Good choice; the clothes probably wouldn't have fit." Comprehending Engineers - Lesson Two To the optimist, the glass is half full. To the pessimist, the glass is half empty. To the engineer, the glass is twice as big as it needs to be. Comprehending Engineers - Lesson Three A pastor, a doctor and an engineer were waiting one morning for a particularly slow group of golfers. The engineer fumed, " What's with these guys? We must have been waiting for 15 minutes!" The doctor chimed in, "I don't know, but I've never seen such ineptitude!" The pastor said, ''Hey, here comes the greens keeper. Let's have a word with him." "Hi George. Say, what's with that group ahead of us? They're rather slow, aren't they?" The greens keeper replied, "Oh, yes, that's a group of blind fire-fighters. They lost their sight saving our clubhouse from a fire last year, so we always let them play for free anytime." The group was silent for a moment. The pastor said, "That's so sad. I think I will say a special prayer for them tonight." The doctor said, "Good idea. And I'm going to contact my ophthalmologist buddy and see if there's anything he can do for them." The engineer said, "Why can't these guys play at night?" Comprehending Engineers - Lesson Four There was an engineer who had an exceptional gift for fixing all things mechanical. After serving his company loyally for over 30 years, he happily retired. Several years later the company contacted him regarding a seemingly impossible problem they were having with one of their multi-million dollar machines. They had tried everything and everyone else to get the machine to work but to no avail. In desperation, they called on the retired engineer who had solved so many of their problems in the past. The engineer reluctantly took the challenge. He spent a day studying the huge machine. At the end of the day, he marked a small "X" in chalk on a particular component of the machine and stated, "This is where your problem is" The part was replaced and the machine worked perfectly again. The company received a bill for $50,000 from the engineer for his service. They demanded an itemized accounting of his charges. The engineer responded briefly: One chalk mark $1. Knowing where to put it, $49,999. Comprehending Engineers - Lesson Five What is the difference between Mechanical Engineers and Civil Engineers? Mechanical Engineers build weapons. Civil Engineers build targets. Comprehending Engineers - Lesson Six Three engineering students were gathered together discussing the possible designers of the human body. One said, "It was a mechanical engineer. Just look at all the joints." Another said, " No, it was an electrical engineer. The nervous system has many thousands of electrical connections." The last said, "Actually it was a civil engineer. Who else would run a toxic waste pipeline through a recreational area?" Comprehending Engineers - Lesson Seven Normal people believe that if it isn't broke, don't fix it. Engineers believe that if it isn't broke, it doesn't have enough features yet." Comprehending Engineers- Lesson Eight An engineer was crossing a road one day when a frog called out to him and said, "If you kiss me, I'll turn into a beautiful princess." He bent over, picked up the frog and put it in his pocket. The frog spoke up again and said, "If you kiss me and turn me back into a beautiful princess, I will stay with you for one week." The engineer took the frog out of his pocket, smiled at it and returned it to the pocket. The frog then cried out, "If you kiss me and turn me back into a princess, I'll stay with you and do ANYTHING you want." Again, the engineer took the frog out, smiled at it and put it back into his pocket. Finally, the frog asked, "What is the matter? I've told you I'm a beautiful princess, that I'll stay with you for a week and do anything you want. Why won't you kiss me?" The engineer said, "Look I'm an engineer. I don't have time for a girlfriend, but a talking frog, now that's cool." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5318 From: James M. Atkinson Date: Fri May 10, 2002 10:50am Subject: Hanssen Sentenced to Life in Prison (I am annoyed he didn't get the death sentence) Ex-FBI Agent Robert Hanssen Sentenced to Life in Prison Without Parole for Spying By Ted Bridis Associated Press Writer Friday, May 10, 2002; 9:20 AM A federal judge in Alexandria, Va., today sentenced former FBI agent Robert Hanssen to life in prison without parole for spying for Moscow, closing a chapter in one of America's most-damaging espionage scandals. The 58-year-old Hanssen, standing in a green prison uniform before U.S. District Judge Claude Hilton, thanked his family, friends and co-workers who have expressed support. "I am humbled by your generosity, your goodness and your charity," Hanssen said to a hushed, packed courtroom audience that included many of former FBI colleagues. The sentencing ended the Hanssen courtroom saga. But the effects of what authorities describe as his extraordinary betrayal for cash and diamonds will resonate for years through the FBI and the U.S. intelligence community. Chastened FBI officials already have broadened the use of lie detectors and financial checks into the backgrounds of agents to try to prevent a recurrence. "I apologize for my behavior. I am shamed by it," Hanssen told the judge. "I have opened the door for calumny against my totally innocent wife and children. I have hurt so many deeply." Hilton told Hanssen he believed that life in prison was appropriate under sentencing guidelines and under a plea agreement that Hanssen reached with prosecutors. The sentence will not allow parole or early release. Before Hanssen was sentenced, Assistant U.S. Attorney Randy Bellows told the judge that Hanssen "broke every major promise he made" and that he "took the nation's most critical secrets ... and used them as personal merchandise. He was in essence the cruelest kind of thief." Authorities said that over a period of two decades, Moscow paid Hanssen with two Rolex watches and $600,000 in cash and diamonds, and promised that $800,000 more had been deposited in a bank there on his family's behalf. The FBI also recovered $50,000 from the Russians when it arrested Hanssen in February 2001. Hanssen's spying peaked at the height of the Cold War, and officials said his activities were at least in part responsible for the deaths of at least three spies overseas. They included a Russian Army general code-named "Top Hat" who was one of America's best intelligence sources and who was executed in 1986. Prosecutor Bellows said the value of secrets that Hanssen compromised made the purchase by the Russians "the bargain of a lifetime." Hanssen's lawyer, Plato Cacheris, noted that Hanssen had cooperated with investigators since his arrest in February 2001 and has undergone 200 hours of questioning over 75 days. He said Hanssen had waived his priest's privilege and his attorney's privilege and has undergone psychoanalysis. Cacheris said the sentence of life in prison was appropriate. Speaking to reporters outside, Hanssen's lawyer was asked to assess the intelligence damage from his client's activities. "I would leave that, really, for the intelligence community," Cacheris replied. "Obviously, this is a serious case. Otherwise, the punishment wouldn't have been as extreme as it is," Cacheris said. "There wouldn't have been threats of the death penalty." The government had filed court papers Monday saying it would stand by its agreement not to seek the death penalty for Hanssen, despite "serious reservations" from the CIA and Justice Department about his cooperation with interrogators. This came after CIA officials told prosecutors they were displeased with Hanssen's claims that he suffers from a poor memory. And Justice's Office of Inspector General said Hanssen's answers to its investigators often were "contradictory, inconsistent or illogical." But FBI investigators said they thought Hanssen had sufficiently met the terms of the plea agreement, saying he "provided information during the debriefings that was identical or consistent with independent investigative results, and in some cases was previously unknown to us and damaging to himself." Cacheris said earlier that Hanssen had been candid and forthright during his interviews. © 2002 The Associated Press -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5319 From: George Shaw Date: Fri May 10, 2002 4:08am Subject: ATT: STEVE SWSSEC Steve I have tried to email you and get back a failed message as below???? This message was created automatically by mail delivery software (Exim). A message that you sent could not be delivered to one or more of its recipients. This is a permanent error. The following address(es) failed: Steve@s... SMTP error from remote mailer after MAIL FROM:: host mail.istep.com [216.200.217.71]: 550 Access denied George Shaw MI3GTO Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... 5320 From: Justin T. Fanning Date: Fri May 10, 2002 6:00pm Subject: Re: The The Owl and the Doughnut - UK input Re: Cell Triangulation miketompkins2000 wrote: > As a long time resident of the sleepy Cotswold town of Cheltenham, I > thought I would throw a few logs on this fire. [text removed] > We adopted the digital GSM system a long while back, [text removed] > Yes James, I saw a very effective demonstration in London of mobile > phone tracking nearly five years ago, occasionally resolution was > lost, but in general it was spot on and with the computer 'smoothing' > added, was near perfect. This I can immediately accept at face value as base station proximity is built into the GSM protocol. So from the telco's perspective all this information is readily available from the network, thus drawing a real time map of a mobile is trivial. This would work a lot better if the mobile was actually on a call, otherwise the updates are much less frequent which would impact overall resolution, keeping in mind a unit on the move will make contact with new cells on a regular basis and the telco also has the option to poll handset if necessary). [text removed] > Finally, not inconsiderable effort has gone into turning selected > members of our population into walking 'bugs'. It is very simple to > discover the ID of a mobile phone (or phones) on the fly and simply > program them to listen. Now this is the part where my ears pricked up. Can you show me in the 6,000 pages of GSM spec, how you are going to (off-air) put a handset into call answer mode without (A) the phone ringing, (B) the display changing and (C) or the user having to do anything. I don't claim to be an authority on the GSM protocol, but for this to be of any practical law enforcement use, it would have to be built into the GSM specifications, not simply a software fault on any single handset vendor. I know cell phones are increasingly being used as audio bugging tools, but these handsets are programmed in advance to silent ring & auto answer by the perpetrator. > A number of our merchant banks are now taking the very sensible > precaution of making clients deposit their mobiles with the saloon > keeper before meetings - simply turning them off doesn't do the trick > either! You are saying not only does the GSM specification have a hidden back door, but it can be activated even when the unit is supposedly powered down? This would imply the handset has the receiver and logic circuitry active at all times, I find this a dubious claim I would like to see backed up in the official 6,000 pages of GSM specifications. > Some clever souls produce a substitute SIM card with all the normal > functions and a few secret menus. The main thrust of this is to alert > you to occasions when your phone is being remotely reprogrammed. The phone's core operating software is stored in the handset itself, (usually in EEprom). The only software on the SIM is the encryption routine as specified by the carrier. The other information on the card simply refers to billing, old SMS's, phone directories etc. The technical SIM layout is openly available. I don't believe modifying *anything* on the SIM even if you could gain physical access to the handset), let alone via the air, would allow the backdoors as mentioned above. Sure you may be able to weaken or even remove the crypt routine (with physical SIM access) to allow for easier off-air monitoring of call traffic, but this still doesn't allow you remote control over the handset as described above. > Good one for the terminally paranoid and only $200 ! Is this kind of thing done in the pub by any chance? I can only conclude that one (or more) of this list is true: A) There are gaping back doors in the GSM specification; B) This story has been passed along Chinese whispers style; C) The bad guys have been tricked into carrying modified handsets. > Thanks for listening, > Mike > The Owl Kind Regards, JF 5321 From: Michael Puchol Date: Fri May 10, 2002 7:50pm Subject: Re: SMS Printouts in the UK The easiest way I could think of is to "make friends" in the telecom operator that would have access to SMS & call logs. This wouldn't be too hard - I have many friends in the technical departments of one of the GSM operators in my country, and while I sometimes consult technical network details that have to do with one of my lines of work (AVL systems) with them, I could imagine someone with bad intentions trying to go a little "further"... SMS logs are kept by operators, and it's as simple to get them as logging onto the system and asking for them. All the best, Mike ----- Original Message ----- From: "miketompkins2000" To: Sent: Friday, May 10, 2002 3:16 AM Subject: [TSCM-L] SMS Printouts in the UK > This is a bit off-subject for this group but worth a mention I > thought. > > A few weeks back I was handed a printout (on innocuous plain 'Z' > paper) of what purported to be all the SMS messages passing between 5 > mobile phones and stretching back over 12 months +. > > Judging by the format, search fields etc, it was a standard report > type and had easily been pulled off a database. > > I am aware of some of our government capability in this area, but the > person who consulted me (who was one of the targets) said it had come > via a detective agency. > > Anyone know how far down the pecking order this information can be > accessed? > > Mike > The Owl > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5322 From: Date: Fri May 10, 2002 8:06pm Subject: FBI spy sentenced to life in prison Plea bargain spares Hanssen from death penaltyMay 10 -- The secrets Robert Hanssen sold to Moscow led to the deaths of U.S. operatives and still compromise America's counter-intelligence efforts. NBC's Pete Williams reports. MSNBC NEWS SERVICES WASHINGTON, May 10 ≠ A federal judge sentenced former FBI agent Robert Hanssen to life in prison without parole Friday for spying for Moscow, closing a chapter in one of America's most-damaging espionage scandals. Under the plea agreement, Hanssen promised to discuss his espionage activities in which he sold U.S. secrets to the Soviet Union during the Cold War and then to Russia for cash and diamonds. THE 58-YEAR-OLD Hanssen, standing in a green prison uniform before U.S. District Judge Claude Hilton, thanked his family, friends and co-workers who have expressed support. "I am humbled by your generosity, your goodness and your charity," Hanssen said to a hushed, packed courtroom audience that included many of his former FBI colleagues. Hilton told Hanssen he believed that life in prison was appropriate under sentencing guidelines and under a plea agreement that Hanssen reached with prosecutors. The sentence will not allow parole or early release. The sentencing ended the Hanssen courtroom saga. But the effects of what authorities describe as his extraordinary betrayal for cash and diamonds will resonate for years through the FBI and the U.S. intelligence community. "I apologize for my behavior. I am shamed by it," Hanssen told the judge. "I have opened the door for calumny against my totally innocent wife and children. I have hurt so many deeply." Before Hanssen was sentenced, Assistant U.S. Attorney Randy Bellows told the judge that Hanssen "broke every major promise he made" and that he "took the nation's most critical secrets ... and used them as personal merchandise. He was in essence the cruelest kind of thief." COLD WAR SPY Hanssen's spying peaked at the height of the Cold War, and officials said his activities were at least in part responsible for the deaths of at least three spies overseas. They included a Russian Army general code-named "Top Hat" who was one of America's best intelligence sources and who was executed in 1986. Prosecutors and defense attorneys asked Hilton to sentence Hanssen to life in prison despite some division within the government over how well he has cooperated in discussing two decades of spying ≠ thus keeping his side of a plea agreement that spared him the death penalty. Hanssen, a staunch Roman Catholic and father of six, was arrested in a Virginia suburb last year after dropping off a bundle of classified material at a park near his home to be picked up by his Russian handlers. A grand jury brought a 21-count indictment against him, and in July Hanssen pleaded guilty to 15 counts of spying for Moscow as part of the plea agreement made with the government. Hanssen's lawyer, Plato Cacheris, said the sentence of life in prison was appropriate. Speaking to reporters outside, Hanssen's lawyer was asked to assess the intelligence damage from his client's activities. "I would leave that, really, for the intelligence community," Cacheris replied. "Obviously, this is a serious case. Otherwise, the punishment wouldn't have been as extreme as it is," Cacheris said. "There wouldn't have been threats of the death penalty." PLEA AGREEMENT Under terms of the plea agreement, Hanssen promised to discuss truthfully his espionage activities in which he sold U.S. secrets and intelligence to the Soviet Union during the Cold War and then to Russia for two Rolex watches, $600,000 in cash and diamonds, and $800,000 more promised to be deposited in a Moscow bank on his family's behalf. The FBI also recovered $50,000 from the Russians when it arrested Hanssen in February 2001. In exchange for his cooperation, prosecutors said they would not seek the death penalty. After several hundred hours of debriefings, authorities were divided over whether Hanssen had cooperated fully in discussing more than two decades of spying for Moscow. Advertisement The deal could be declared null if it could be proven that Hanssen was not cooperating fully. In a sentencing memo filed Monday, prosecutors said two of the four government groups that questioned Hanssen in about 75 interviews over 10 months felt he had not fully cooperated while the FBI and a special commission reviewing FBI security said they had received the information needed. NOT ENOUGH EVIDENCE But prosecutors decided they did not have enough hard evidence that Hanssen did not cooperate to rescind the plea agreement. Cacheris said both sides agreed that the 25-year FBI agent and counter-intelligence specialist had fulfilled his side of the deal. "We both are seeking the same thing ≠ we both believe the plea agreement has been adhered to, and we expect he will get a life sentence," Cacheris said on the eve of the sentencing, adding that there was "no question" that Hanssen had cooperated fully with investigators. Investigators have not been able to trace all of the money Hanssen received from the Soviets and the Russians. Some of it was likely used to pay bills and costly tuition fees at private Catholic schools for his children, and investigators have confirmed that he gave some money and a car to a stripper. "There is no way that I can justify what I have done," Hanssen told investigators during those interviews. "It's criminal and deceitful and wrong and sinful." But Hanssen also has sought to characterize the damage from his spying as less serious than it could have been. "I could have been a devastating spy, but I didn't want to be a devastating spy," he said. "I wanted to get a little money and to get out of it." Under the same plea agreement, Hanssen's wife, Bonnie, also was permitted to receive the survivor's portion of his FBI pension and keep the family's home in Vienna, Va. PROSECUTORS HARSH Prosecutors were harsh in their description of Hanssen, who began selling sensitive national security secrets to Moscow in 1979 ≠ just three years after he became an agent. "Robert Philip Hanssen is a traitor," they said in the memo. "He is a traitor and that singular truth is his legacy." "For his betrayal of our country, and for the unpardonable consequences of his misconduct, Hanssen deserves to forfeit his right ever to live again within our community and with our society." Chastened FBI officials already have broadened the use of lie-detectors and financial checks into the backgrounds of agents. The Associated Press and Reuters contributed to this report HAVE A GREAT DAY !!! ---------- http://www.msnbc.com/news/750235.asp?pne=msntv [Non-text portions of this message have been removed] 5323 From: George Shaw Date: Fri May 10, 2002 3:32pm Subject: RE: ATT: STEVE SWSSEC Can you supply an alternate address for me to send the headers. Mail still bouncing... George Shaw MI3GTO Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... 5324 From: Justin T. Fanning Date: Sat May 11, 2002 4:57am Subject: [Fwd: The The Owl and the Doughnut - UK input Re: Cell Triangulation] Just for the record, Greg asked me to forward his message to the group I'm not forwarding private mail. Kind Regards, JF [Non-text portions of this message have been removed] 5325 From: Justin T. Fanning Date: Sat May 11, 2002 5:09am Subject: Re: [Fwd: The The Owl and the Doughnut - UK input Re: Cell Triangulation] Whoops, forgot the group strips attachments. JF --- > Now this is the part where my ears pricked up. Can you show me in the > 6,000 pages of GSM spec, how you are going to (off-air) put a handset > into call answer mode without (A) the phone ringing, (B) the display > changing and (C) or the user having to do anything. I don't claim to > be an authority on the GSM protocol, but for this to be of any > practical law enforcement use, it would have to be built into the GSM > specifications, not simply a software fault on any single handset > vendor. I know cell phones are increasingly being used as audio > bugging tools, but these handsets are programmed in advance to > silent ring & auto answer by the perpetrator. Several providers support updating a phone's firmware and/or installation of third party applications from the tower. With access to the phone in question's firmware source code (or decent assembly kung fu), it is very much possible to remotely flash a handset's firmware with a backdoored version. There is speculation that many domestic (as in US) phone manufacturers have already included this capability in current generation handsets; with modified firmware, it would be trivial to key up the mic using a variety of methods, for example CLID access lists or embedded commands in forward control channel/paging channel communications. This wouldn't necessarily require complicity on the provider's part; at this time there are several companies that manufacture cell site simulators capable of overriding and/or masquerading as the local MTSO. The feds didn't give a damn about Mitnick until he broke into Motorola and grabbed cellular source, before that he was a nobody that noone cared about. Another thing to think about is conventional phones with CLID capability, I've got a Polycom speakerphone here that occasionally pukes on ill-timed call waiting CLID (the phone literally has to be unplugged and turned back on before it will go on hook); whether it was sloppy programming practice on the part of Polycom, or scraps of Clipper snuck into the CLID asic, the end result is still the same - if you can crash it, you can more than likely use a buffer overflow to control the phone's firmware (go off hook, speakerphone on etc) > You are saying not only does the GSM specification have a hidden back > door, but it can be activated even when the unit is supposedly powered > down? This would imply the handset has the receiver and logic circuitry > active at all times, I find this a dubious claim I would like to see > backed up in the official 6,000 pages of GSM specifications. This has nothing to do with the GSM spec, and yes most current generation handsets are never _really_ turned off, only in a sleep mode of sorts. I had a Timeport that I did some testing with some time ago, I basically powered it down and strapped a Digital Scout to it with the squelch all the way up, and sure enough logged activity out of the phone within minutes. The only surefire way to ensure your phone is in fact turned off is to remove the battery, or install a manual switch at the power source. I've got a magnetic switch attached to the battery pack on my Ericsson, whenever it goes into its case (which has a small magnet on the interior) its battery is completely disconnected until it comes back out of the case. For the truly paranoid, you could always dump your handset's firmware and run an MD5 or SHA-1 hash across it, and check it periodically for changes; lots of domestic phones (as well as some Nokias if I am not mistaken) support accessing/updating your handset's firmware with a special cable. 5326 From: Date: Sat May 11, 2002 11:00am Subject: (no subject) To ensure we Americans never offend anyone -- particularly fanatics intent on killing us -- airport screeners are not allowed to profile people. They will, however, continue to perform random searches of 80-year-old women, little kids, airline pilots with proper identification, Secret Service agents who are members of the President's security detail, 85-year old Congressmen with metal hips. Let's pause a moment and take the following test... In 1972, 11 Israeli athletes were killed at the Munich Olympics by: (a) Grandma Moses; (b) The night cleaning crew at Rockefeller Center; (c) Invaders from Mars; or (d) Muslim male extremists mostly between the ages of 17 and 40. In 1979, the US embassy in Iran was taken over by: (a) Norwegians from the Lichen Herbarium of the University of Oslo; (b) Elvis; (c) A tour bus full of 80-year-old women; or (d) Muslim male extremists mostly between the ages of 17 and 40. In 1983, the US Marine barracks in Beirut was blown up by: (a) A pizza delivery boy; (b) Crazed feminists complaining that having to throw a grenade beyond its own burst radius in basic training was an unfair and sexist job requirement; (c) Geraldo Rivera making up for a slow news day; or (d) Muslim male extremists mostly between the ages of 17 and 40. In 1988, Pan Am Flight 103 was bombed by: (a) Luca Brazzi, for not being given a part in "Godfather 2"; (b) The Tooth Fairy; (c) Butch and Sundance, who had a few sticks of dynamite left over from their train mission; or, (d) Muslim male extremists mostly between the ages of 17 and 40. In 1993, the World Trade Center was bombed by: (a) The entire cast of "Cats"; (b) Martha Stewart; (c) Cheese-crazed tourists from Wisconsin; or (d) Muslim male extremists mostly between the ages of 17 and 40. In 1998, the US embassies in Kenya and Tanzania a were bombed by: (a) Mr. Rogers; (b) Hillary, to distract attention from Wild Bill's women problems; (c) The World Wrestling Federation to promote its next villain: "Mustapha the Merciless"; or (d) Muslim male extremists mostly between the ages of 17 and 40. On 9/11/01, four airliners were hijacked and destroyed by: (a) Bugs Bunny, Wile E. Coyote, Daffy Duck, and Elmer Fudd. (b) The US Supreme Court, (c) Barney; or (d) Muslim male extremists mostly between the ages of 17 and 40. Hmmm...nope, Ain't no patterns here. Darned if I know why we should ever even think about profiling. 5327 From: Aimee Farr Date: Sat May 11, 2002 5:37pm Subject: WARNING: "Falling Leprechauns." ....WATCH OUT! > Hmmm...nope, Ain't no patterns here. Darned if I know why we should > ever even think about profiling. Because it's another word for an indirect conditioning strategy cloaked in the form of standard operating procedure. I would plant a story on our enemies to fear falling Leprechauns, because your enemy image is central to your threat perception. It's probably one of the strongest of evoked sets, and while helpful, some forms will cause people to ignore anything outside of it. A terrorist can anybody. Might even be The Chinese Tooth Fairy in a pink tutu tailgating "Muslim male extremists mostly between the ages of 17 and 40." Not everybody is in your context or has the opportunity to develop your level of acumen, Mr. Wizards. :-] I don't like that email that's been going around. Explicitly and in terms of implicit suggestions, and whether by accident or design....that's some waaaaaaaay evil mojo. *SNIFF* That's black, back to back. As in black propaganda. I don't care where it came from. It's evil. Don't touch it. Fallacies of distraction X False Dilemma X From Ignorance X Slippery Slope X Complex Question Appeal to motive in place of support X Appeal to Force X Appeal to Pity X Dangerous Consequences X Prejudicial Language X Popularity/Bandwagon Fallacies which change the subject X Personal Attack (character, circumstances) X Appeal to Faux Authority/Experts X Anonymous Authority X Style over Substance Inductive Fallacies X Hasty Generalization X False Analogy X Slothful Induction X Fallacy of Exclusion Statistical X Accident X Converse Accident Causal Fallacies X Post Hoc X Joint Effect X Insignificant/Minimal Cause X Wrong Direction X Complex Cause Missing the Point X Begging the Question X Irrelevant Conclusion X Straw Man Category Errors X Composition X Division Non Sequitur X Affirming the Consequent X Denying the Antecedent X Inconsistency Syllogistic X Undistributed Middle X Illicit Major X Illicit Minor X Fallacy of Exclusive Premises X Fallacy of Drawing an Affirmative Conclusion from a Negative Premise X Existential Fallacy 5328 From: Rick Hofmann - MICROSEARCH Date: Sat May 11, 2002 6:51pm Subject: Minox cameras Every serious infosec practitioner should own a Minox camera, if for no other reason than they are extremely cool. Most of us are "gadget freaks" anyway and the things are great toys. Take a Minox with you on a corporate penetration test and take photos of proprietary material. Give your security contact the undeveloped roll of film and a prepaid mailer to the Minox lab (www.minoxlab.com) for development. This is a simple and effective way to make your point about things like clean desk policies and the use of shredders. At the risk of sounding like a commercial, one of the best places to buy a used Minox is SWS Security (www.swssec.com). All the used cameras have been professionally serviced and are in good working condition. Additionally, Steve Uhrig at SWS Security stands behind everything he sells. Very truly yours, Rick Hofmann, CCO, CPP, PI16998 MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 http://home.earthlink.net/~microsearch [Non-text portions of this message have been removed] 5329 From: Justin T. Fanning Date: Sun May 12, 2002 10:45am Subject: Re: [Fwd: The The Owl and the Doughnut - UK input Re: Cell Triangulation] gvp wrote: > Several providers support updating a phone's firmware and/or > installation of third party applications from the tower. I am trying to keep an open mind to this, but am extremely sceptical of this claim. Why aren't carriers promoting this as a "feature" and why hasn't this been used for fraudulent means to extract the IMSI (username) / KI (password) out of handsets (as well as other uses). > With access to the phone in question's firmware source code > (or decent assembly kung fu), it is very much possible to remotely > flash a handset's firmware with a backdoored version. If the GSM specification supports remote programming, then yes, the code could be patched to perform any function the handset electronics was physically capable of performing. You could use the IMEI to determine the make/model and then upload the appropriate modified firmware for that unit, this presupposes that remote handset programming is a feature of the GSM protocol which it yet to be proven. > There is speculation that many domestic (as in US) phone > manufacturers have already included this capability in current > generation handsets; with modified firmware, it would be trivial to > key up the mic using a variety of methods, for example CLID access > lists or embedded commands in forward control channel/paging channel > communications. Now that you are talking USA, are we still talking of the GSM protocol, on last count the USA had about 6 or more cellphone standards. (Isn't that the great thing about standards, so many to choose from!) > This wouldn't necessarily require complicity on the provider's part; > at this time there are several companies that manufacture cell site > simulators capable of overriding and/or masquerading as the local > MTSO. Accepted, though I think for political and technical reasons if remote programming is possible, it would be done from the telco. I don't think many telco's or frequency co-ordinators would be thrilled at the concept of non licensed, non frequency co-ordinated, high power portable cellular TX's in use. > The feds didn't give a damn about Mitnick until he broke into > Motorola and grabbed cellular source, before that he was a nobody > that noone cared about. The full GSM specification is in the open, you can simply purchase it. While I don't know the Mitnick case in detail, wasn't it more the case that the feds didn't care until a large corporate started whining, up until then hasn't it been predominantly universities and research labs (not exactly political heavy hitters), but when Motorola a large government supplier and volume employer got involved suddenly the call to action was given, this is simple economics. > Another thing to think about is conventional phones with CLID > capability, I've got a Polycom speakerphone here that occasionally > pukes on ill-timed call waiting CLID (the phone literally has to be > unplugged and turned back on before it will go on hook); whether it > was sloppy programming practice on the part of Polycom, or scraps of > Clipper snuck into the CLID asic, the end result is still the same - > if you can crash it, you can more than likely use a buffer overflow > to control the phone's firmware (go off hook, speakerphone on etc) Unless it's parts of the telco approval process, I would personally put this down to bad coding on the manufactures part and bad compliance testing on the telco testing house's part. Interesting concept though, a buffer overflow attack on CLID, I believe I have actually read articles about this in 2600/phrack or similar style magazines. >> You are saying not only does the GSM specification have a hidden >> back door, but it can be activated even when the unit is supposedly >> powered down? This would imply the handset has the receiver and >> logic circuitry active at all times, I find this a dubious claim I >> would like to see backed up in the official 6,000 pages of GSM >> specifications. > This has nothing to do with the GSM spec, and yes most current > generation handsets are never _really_ turned off, only in a sleep > mode of sorts. My point was to be of any practical law enforcement use, it would have to be part of the GSM specification and tested as part of the GSM type approval & compliance process, otherwise it becomes a specific vendor anomaly. > I had a Timeport that I did some testing with some time ago, I > basically powered it down and strapped a Digital Scout to it with the > squelch all the way up, and sure enough logged activity out of the > phone within minutes. Obviously some logic circuitry is always active, like memory, time, scanning the keypad etc. But is the *receiver* active, that's what we need to know. If the receiver is active you've discovered a potential GSM backdoor. Perhaps it's time to crack that unit open, power it down and strap a logging meter on the receiver for 24 hours, if power is applied to the receiver at any stage, you may be onto something. > The only surefire way to ensure your phone is in fact turned off > is to remove the battery, or install a manual switch at the power > source. Power could be supplied to the handset via close field RF, but something this complex would surely be noticed by now in the GSM specifications. > I've got a magnetic switch attached to the battery pack on my > Ericsson, whenever it goes into its case (which has a small magnet > on the interior) its battery is completely disconnected until it > comes back out of the case. Technically interesting, but why have you done this, what functionality are you hoping to achieve (or avoid)? > For the truly paranoid, you could always dump your handset's firmware > and run an MD5 or SHA-1 hash across it, and check it periodically for > changes; lots of domestic phones (as well as some Nokias if I am not > mistaken) support accessing/updating your handset's firmware with a > special cable. Interesting concept, this could be taken one step further with a challenge response system. The phone generates a key based on it's internal checksum, the user supplies the second half through the keypad, the key pair then decodes the Eeprom. > greg JF 5330 From: Aimee Farr Date: Sun May 12, 2002 0:08pm Subject: RE: WARNING: "Falling Leprechauns." ....WATCH OUT! Some think I have evidenced "bad behavior." I usually do. In an attempt to make up for this, I offer the following "report." _ON AUTHORITY_: A man was suffering from an infected right ear. His doctor wrote out an order for antibiotic drops to be placed in his ear by the nurse. The doctor had poor handwriting, and abbreviated his script to read "...place 6 drops in R.ear." The nurse complied. The nurse had never heard of treating an ear infection anally -- but an expert should not be questioned. Cialdini, R. B. (1993). Influence: Science and practice. Third Edition. New York: HarperCollins. Of relevance to authority exploitation in espionage, so my apology is even on-topic. ~Aimee 5331 From: Justin T. Fanning Date: Sun May 12, 2002 4:09pm Subject: Re: [Fwd: The The Owl and the Doughnut - UK input Re: Cell Triangulation] Thomas Habets wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > On Sunday 12 May 2002 17:45, you wrote: >> why hasn't this been used for fraudulent means to extract the >> IMSI (username) / KI (password) out of handsets (as well as other >> uses). > Because the Ki is stored on the SIM, the phone does not have access > to it. > Except for the cryptanalytic attack against the SIM which will > extract the Ki from the SIM in about 8 hours, but that only applies > to comp128 versions of A3/A8. Your totally correct, GSM uses a third party dual blind authentication system. Ki was a bad example for me to use. > If it's possible for a third party to replace the programming in the > phone, the attack can be mounted without physical access to the > phone, which would be very interesting indeed. I'm not sure what computing power the average handset has, but if you could (remotely) program the handset to challenge it's own SIM until you had enough "crypt collisions" to compute Ki, this would be very interesting indeed. > Without this functionality the attack would have to either require > physical access to the SIM, or by fooling the phone into > authenticating against a base station of your own for those 8 hours. I think the second (over the air attach from fake base) is the biggest threat faced by the GSM authentication system today. I personally think it's only a matter of time until GSM fraud becomes widespread. Perhaps that's why countries like the UK are pushing towards GPRS and 3G so quickly. > Mounting the attack on the phone itself would make it much much more > invisible, considering telco people don't like it when you use their > cellphone frequencies for your own "projects". The biggest GSM authentication flaw (aside from the use of the narrow pipe in comp128) is the fact the base never has to authenticate to the handset (a 5 digit ID number I believe is all that's supplied). All the authentication is the other way. I have never heard of anyone mounting an over the air attach on a GSM handset, though everything is in place, it's only a matter of time. If the attacker used low power TX with a high gain antenna system, especially in a weak signal area to target a block of flats or a single house for example, I doubt the telco would ever notice. I don't believe cell bases check on each other in such a way that a "new cell" would be noticed. I think the key would be to make the output power as low as possible (to only cover the required ground) and make the new base not fully GSM compliant, in that it would not honour hand-off requests etc. > Feel free to reply to this to the list if you want, I haven't yet > subscribed with this address so it'll probably bounce if I sent it > there. Thanks for your message, you're right on the ball. Look forward to seeing you on the list! > - --------- > typedef struct me_s { > char name[] = { "Thomas Habets" }; > char email[] = { "thomas@h..." }; > char kernel[] = { "Linux 2.4" }; > char *pgpKey[] = { "http://darkface.pp.se/~thompa/pubkey.txt" }; > char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; > char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; > } me_t; > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.6 (GNU/Linux) > Comment: For info see http://www.gnupg.org > > iD8DBQE83qqRKGrpCq1I6FQRAm4+AJ9c2u/dxkAwiRHYMQ0xdSJAMyoiewCfTTnC > bFBOS/20BTA7KOxH3qYxQtI= > =tP2V > -----END PGP SIGNATURE----- Kind Regards, JF 5332 From: Justin T. Fanning Date: Sun May 12, 2002 8:18pm Subject: Re: Cell Triangulation] Gregory Perry wrote: >>> Several providers support updating a phone's firmware and/or >>> installation of third party applications from the tower. [text removed] > Nextel and Verizon both support over air remote updates, > including 3rd party applications (Java widgets and the like). Neither are GSM networks, from my (brief) research they are a "iDEN" TDMA and CDMA respectfully. The software update feature is a deliberate (promoted) feature of the handset. (What is "iDEN" exactly, I couldn't get a clear answer. Is it an RF modulation method in it's own right, a protocol or simply a software layer? Motorola was trying to imply it was a modulation method (by going on about spectral efficiency), but it looked more like a software/application layer to me (like java). >> concept of non licensed, non frequency co-ordinated, high power >> portable cellular TX's in use. > It happens, and there are several companies that make briefcase-sized > BSS/cell site simulators capable of this. Uniden (more known for CB fame) use to make an AMPS unit for the Hotel market, the concept being you would register your handset on check-in and calls made while in the hotel complex would simply be billed to your room. (I've never actually seen one of these implemented, but that was the theory). Do you have any websites for these briefcase bandits? Are they sold as legitimate testing tools like a GSM test-set of sorts, a law enforcement tool or are they strictly for the grey market? >> (not exactly political heavy hitters), but when Motorola a large >> government supplier and volume employer got involved suddenly the call >> to action was given, this is simple economics. > It was a bit more than that, Mitnick in collusion with an Israeli > national retrieved handset source code from Motorola. Shimmy tracked > him down with a modified Oki-900 handset and CTEK cable (also very > much illegal). Congress had to give Shimmy immunity in order to > testify about the case. I don't know the specific details to comment here, though it sounds fascinating. Perhaps you could enlighten us, what was the cellphone modified to do exactly? >> approval & compliance process, otherwise it becomes a specific >> vendor anomaly. > Vendor specific "anomalies" are the bread and butter of the > intelligence community. Tons of commercial products contain > backdoors^H^H^H^H^H^H^H^H^H undocumented features. And con men, why else would some handset manufactures allow the IMSI serial number to be changed via a hidden menu, just to name one "feature". >>> I've got a magnetic switch attached to the battery pack on my >>> Ericsson, whenever it goes into its case (which has a small magnet >>> on the interior) its battery is completely disconnected [text removed] > I am trying to avoid the US E911 bill, the one that says my cellular > provider can poll my phone (regardless of if it is in use or not), > obtain location information, and store that information indefinitely > without my "opt in" or express written consent. So you are saying TDMA/CDMA handsets keep the receiver active even when powered down and can be "pinged" by the telco. The handset I assume doesn't know where it is and relies on the telco to triangulate, or is this a special packet that the handset dumps it's list of close cells & signal readings? (I'm assuming TDMA/CDMA like GSM maintains a list of half a dozen close cells and ranks them constantly). The second "feature" you mentioned is this location information is logged indefinitely. The UK has been increasingly using cellular location data in law enforcement for some years now, including some very high profile cases. I said it when cellular phones first came out, it's a law enforcement dream, a nation of voluntary bumper beepers. > 'Social structure becomes actually visible in an anthill; the > movements and contacts one sees are not random but patterned. We > should also be able to see structure in the life of an American > community if we had a sufficiently remote vantage point, a point from > which persons would appear to be small moving dots... We should see > that these dots do not randomly approach one another, that some are > usually together, some meet often, some never... If one could get > far enough away from it, human life would become pure pattern.' Spooky analogy. > -- Roger Brown, INSNA website. JF 5333 From: Gregory Perry Date: Sun May 12, 2002 0:54pm Subject: RE: Cell Triangulation] > > Several providers support updating a phone's firmware and/or > > installation of third party applications from the tower. > > I am trying to keep an open mind to this, but am extremely sceptical > of this claim. Why aren't carriers promoting this as a "feature" and > why hasn't this been used for fraudulent means to extract the > IMSI (username) / KI (password) out of handsets (as well as other > uses). Nextel and Verizon both support over air remote updates, including 3rd party applications (Java widgets and the like). > concept of non licensed, non frequency co-ordinated, high power > portable cellular TX's in use. It happens, and there are several companies that make briefcase-sized BSS/cell site simulators capable of this. > (not exactly political heavy hitters), but when Motorola a large > government supplier and volume employer got involved suddenly the call > to action was given, this is simple economics. It was a bit more than that, Mitnick in collusion with an Israeli national retrieved handset source code from Motorola. Shimmy tracked him down with a modified Oki-900 handset and CTEK cable (also very much illegal). Congress had to give Shimmy immunity in order to testify about the case. > approval & compliance process, otherwise it becomes a specific vendor > anomaly. Vendor specific "anomalies" are the bread and butter of the intelligence community. Tons of commercial products contain backdoors^H^H^H^H^H^H^H^H^H undocumented features. > > I've got a magnetic switch attached to the battery pack on my > > Ericsson, whenever it goes into its case (which has a small magnet > > on the interior) its battery is completely disconnected until it > > comes back out of the case. > > Technically interesting, but why have you done this, what functionality > are you hoping to achieve (or avoid)? I am trying to avoid the US E911 bill, the one that says my cellular provider can poll my phone (regardless of if it is in use or not), obtain location information, and store that information indefinitely without my "opt in" or express written consent. 'Social structure becomes actually visible in an anthill; the movements and contacts one sees are not random but patterned. We should also be able to see structure in the life of an American community if we had a sufficiently remote vantage point, a point from which persons would appear to be small moving dots... We should see that these dots do not randomly approach one another, that some are usually together, some meet often, some never... If one could get far enough away from it, human life would become pure pattern.' -- Roger Brown, INSNA website. 5334 From: George Shaw Date: Sun May 12, 2002 4:29pm Subject: RE: [Fwd: The The Owl and the Doughnut - UK input Re: Cell Triangulation] Out of curiosity tonight I took apart a Nokia 3210e (Orange) powered down and took readings across the range on the Rx side of the circuits and YES it is powered even when the "switch" is off. I am running further tests now to see what exactly it is capable of receiving but all indications are that it can indeed Rx when in "off" mode which really is a standby mode I guess. I have several other phones here I can hack this week. Now if Nokia are doing it I guess the others are as well, whether its in the spec or not. 5335 From: Wanja Eric Naef [IWS] Date: Sun May 12, 2002 5:07pm Subject: RE: [Fwd: The The Owl and the Doughnut - UK input Re: Cell Triangulation] Have a look at the article below. It is quite interesting. Regards, WEN Wanja Eric Naef Webmaster & Principal Researcher IWS - The Information Warfare Site http://www.iwar.org.uk Attack of the clones By John Leyden Posted: 09/05/2002 at 13:05 GMT http://www.theregister.co.uk/content/59/25216.html Hackers can clone mobile phone SIM cards in minutes, and make calls at their victims' expense. In theory, at any rate: IBM researchers have uncovered a process, dubbed partitioning attacks, which lets crackers extract secret key information from SIM cards by monitoring side-channels, such as power consumption and electromagnetic emanations. This is much easier than breaking the cryptographic algorithms used by the card or using intrusive attacks to extract the key from the microchip. According to IBM, key information can be extracted in minutes using partitioning attacks - against hours needed for older attacks. Codebreaker Some information about the internal working of computing devices can be derived by looking at power consumption and electromagnetic emanations. This is well known. Many chip cards which perform cryptographic algorithms are designed to resist such information leakage. SIM cards deployed in many GSM networks use the COMP128 cryptographic algorithms or its derivatives for user identification and for achieving communications and transaction security. The IBM Research team discovered a new way to quickly extract the COMP128 keys in SIM cards using side channels - despite existing protections. The COMP128 algorithm requires the lookup of large tables, which is achieved only in a complicated way on simple devices, such as SIM cards, so that sensitive information can leak into side channels. Because of this an attack is accomplished easily by making the card perform the algorithm just seven times with the unknown key, IBM researchers say. To combat this, IBM has designed a way of protecting table lookup operations from side channel attacks. IBM say this is easy to implement in cell phones as the proposed technique uses little RAM for the ancillary table. Cell phone users can also protect themselves against such attacks by taking precautions such as: not lending their phones to strangers; or leaving them unattended. A technical paper on IBM's work, Partitioning Attacks: Or how to rapidly clone some GSM cards, by Josyula R Rao, Pankaj Rohatgi, Helmut Scherzer and Stefan Tinguely will be presented at the IEEE Symposium on Security and Privacy, in Oakland, California next week. R 5336 From: Marcel Date: Sun May 12, 2002 11:42pm Subject: Re: Cell Triangulation] Nextel uses Java via OTA (Over The Air) and Verizon uses Brew. Here is some info on iDEN if you need more let me know. Nextel's E-911 PhaseII is A-GPS (Assisted GPS) which use the network and SiRF chips imbedded in the handset. I had a beta model the i100 that is a 1st gen unit. Roll out is due Oct 2002 according to Nextel & the FCC. iDEN= Integrated Dispatch Enhanced Network > > > > iDEN (Integrated Dispatch Enhanced Network) is > > functionally the same as MIRS (Motorola Integrated Radio > > System) except for difference in signaling characteristics. > > iDEN is a high-capacity digital trunked radio system > > providing integrated voice and data services to its users. The > > iDEN system uses M16-QAM digital modulation and VSELP > > (Vector Sum Excited Linear Predictor) speech coding > > techniques coupled with Time Division Multiple Access > > (TDMA) channel access methodology to enhance channel > > capacity and system services. > > > > System Characteristics > > > > The following paragraphs highlight significant characteristics > > and features of iDEN digital trunked radio systems. In these > > descriptions, the term "fixed end system" refers to all > > infrastructure equipment, including base radio repeaters, site > > controllers and switching equipment. The term "mobile radio" > > is used as a general term referring to both mobile and portable > > radio equipment. > > > > TDMA/Channel Definition > > > > Conventional trunking systems define a control or traffic > > channel by specifying a set of inbound and outbound > > frequencies to a user. The outbound frequency is the > > transmitter frequency of the base radio repeater, and the > > inbound frequency is the mobile radio transmitter frequency. > > In the iDEN system, a single inbound/outbound frequency > > pair is shared among six users through the creation and use > > of six 15-millisecond time slots. Each user transmits and > > receives during (and only during) one of the time slot > > intervals, so that the transmission from any given mobile > > radio is a pulsed RF signal with a 1/6 or 1/3 duty cycle. The base > > radio is able to transmit and receive during any of the six or three > > time slots. Each mobile radio user is assigned a unique channel > > designation, which is defined by both a carrier number and a > > time slot definition. The carrier number specifies the inbound/ > > outbound frequency pair. > > > > M16-QAM Digital Modulation > > > > The iDEN system uses M16-QAM modulation, a Motorola > > proprietary digital format utilizing M16-QAM modulation on > > four subcarriers. This format involves both amplitude and > > phase modulation. > > > > Signal Formats Carrier Numbers vs. > > Frequencies > > > > Three different signal formats are used in iDEN systems: > > iDEN, DJSMR, and DMCA. DJSMR and DMCA are > > international formats. > > > > The frequency plan for domestic iDEN systems (i.e., those > > using the iDEN signal format) employs carrier numbers to > > designate channel frequencies. The relationships of carrier > > numbers to inbound and outbound frequencies are as follow: > > > > Inbound frequency (mobile transmit) = [(0.0125 x carrier > > number) + 806] MHz > > > > Outbound frequency (fixed end transmit) = [(0.0125 x carrier > > number) + 851] MHz > > > > Audio Digitization and Compression > > > > Since iDEN is a digital trunking system, the audio coming > > from a user's microphone is digitized to produce a digital bit > > stream that becomes the modulating signal for the RF carrier. > > To make more efficient use of the channel, the digitized audio > > is compressed using a VSELP vocoder prior to being fed to > > the modulator. > > > > iDEN Mobile Operations > > > > Control Channel Acquisition > > When first powered up, an iDEN mobile radio scans selected > > iDEN frequencies and locks on to the designated control > > channel. The control channel carries information > > continuously broadcast by the fixed end system regarding > > system identification and timing parameters for the mobile > > radio to use when it operates on the system. The control > > channel also defines the maximum transmit power that radios > > on the system may use. > > > > Mobile Synchronization > > In its operational mode, the mobile radio aligns its frequency > > and transmit timing to the outbound signal received from the > > fixed end system. > > > > Mobile Registration > > Each mobile radio in an iDEN system is identified by an > > international mobile station identifier (IMSI), which is > > assigned to it when it is first placed in service and performs > > an initial registration with the fixed end system. When making > > its registration request, the mobile radio supplies its > > international mobile equipment identifier (IMEI) to the fixed > > end system. After determining the validity of the IMEI, the > > fixed end station assigns an IMSI to the subscriber radio. > > > > Mobile Assisted Handovers > > The assignment of an IMSI and dispatch IDs are important > > concepts in testing iDEN mobile radios, since a radio that has > > not been assigned appropriate IDs cannot place a dispatch or > > interconnect call. A radio that has not yet been placed in > > service, or one that has been subjected to a master reset since > > it was in service, will not contain IMSI and dispatch ID > > assignments. > > > > When operating in a moving vehicle, an iDEN mobile radio > > can assist the fixed end system in determining when a > > handover to another cell should be executed. Whenever the > > mobile radio is not actually transmitting or receiving a signal > > from the fixed end system, it monitors outbound signals from > > neighboring cells and measures the received power and signal > > quality of these signals. When it determines that the signal > > from a neighboring cell is of higher quality than the signal > > from the fixed end system in its currently assigned cell, it > > transmits a handover request to the fixed end system. The > > iDEN infrastructure can also query a mobile radio for a > > measurement report. The mobile radio then transmits data > > back to the fixed end system indicating the received signal > > strength detected and measured by the mobile radio. > > > > iDEN Call Scenario > > > > When a mobile radio places a call on an iDEN system, it goes > > through a series of system handshakes to establish the call. > > An example of an interconnect call follows: > > > > 1. When the mobile radio is powered up, it scans and > > locks on to a control channel. > > 2. The mobile radio registers on the system. > > 3. When it initiates a call, the mobile radio places a > > service request on the control channel. > > 4. The fixed end system assigns the mobile radio to > > dedicated control channel. > > 5. The mobile radio uses the dedicated control channel > > to transmit the information required by the fixed end > > system to complete the call. > > 6. The fixed end system assigns the mobile radio to a > > traffic channel to be used for communication of voice > > or data. > > > > iDEN Mobile Transmit Power Control > > > > 1. The maximum power to be transmitted by a mobile > > radio on the system is defined in the control channel > > system information. Under no circumstances will the > > mobile radio's transmitted power ever exceed this > > limit. > > 2. However, the mobile radio does not always transmit > > at the maximum power allowed on the system. Each > > time it initiates or receives a call, the mobile radio > > determines the signal strength of its received signal. > > Based on this measurement and the power control > > constant defined on the control channel, it then adjusts > > its transmit power level to a level just high enough to > > ensure clear reception of its signal by its intended > > recipients. > > "Justin T. Fanning" wrote: > Gregory Perry wrote: > > Nextel and Verizon both support over air remote updates, > > including 3rd party applications (Java widgets and the like). > > Neither are GSM networks, from my (brief) research they are a "iDEN" > TDMA and CDMA respectfully. The software update feature is a > deliberate (promoted) feature of the handset. (What is "iDEN" exactly, > I couldn't get a clear answer. Is it an RF modulation method in it's > own right, a protocol or simply a software layer? Motorola was trying > to imply it was a modulation method (by going on about spectral > efficiency), but it looked more like a software/application layer to > me (like java). -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 5337 From: Dave Emery Date: Sun May 12, 2002 11:30pm Subject: Re: Cell Triangulator On Thu, May 09, 2002 at 11:49:47AM -0400, James M. Atkinson wrote: > At 6:24 AM -0700 5/9/02, Hawkspirit wrote: > >Any one know who makes this gear? > > Actually many of the cellular service providers can provide a pretty > good fix by watching the customer via the sector antennas used on the > tower. Quite literally as you change sectors, and eventually change > towers the cellular company can watch the phone moving on a map (I > have personally seen this, been formally trained on this, and have > been involved in projects where this was done). > Of course you guys all realize that such capability to DF to an individual cell is required as part of Phase 1 E911 under FCC rules. That is, all this stuff must be in place essentailly everywhere to locate someone who dials 911 in an emergency under a FCC edict of several years back. Thus the special capabilities exist not under the guise of LEA tracking, but finding stranded victims of traffic accidents and the like. And Phase 2 E911 will require location ability to 125 meters or better most of the time. It is true that phase 2 E911 has been delayed (even though it is officially currently required) and is actually not operational on several carrier's systems much of anywhere. And it is also true that E911 phase 2 is allowed to use GPS or other techniques other than TDOA or AOA DF'ing to find phones and as such may not actually always work unless the caller is actually making a call or even a E911 call. And I am sure everyone is aware that the carriers have been exploring using such tracking capablity to provided telemarketers with lists of customers near a particular place (like a mall or restaurant) so they can call or send messages advertising local specials and directed at people in the area. So if you want to be invisible, don't carry a powered on cellphone. -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 5338 From: Secdep Date: Mon May 13, 2002 0:31am Subject: PROGRAMME TO ID PAST E-MAIL I have a client who has a large computer network, with 900+ employees linked to the internet. The client has had a leak of information. Is there a programme available that can identify E-Mails sent in past, by putting in certain ''Key Words'' then trawling the E-Mails to see if there is match, or the ''Key Words'' were used in the past. Raymond --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 5339 From: Justin T. Fanning Date: Mon May 13, 2002 8:32am Subject: Re: PROGRAMME TO ID PAST E-MAIL Raymond, Not as such, Emails typically move over the data network in real time, if you want to catch suspicious emails you have to do it while they are in transit. There are a number of packages that do this and it's becoming increasingly common especially in banks, law firms etc. The horse has bolted, though some clever forensic work may still give you enough information to go on. 1) If the company has a central SMTP server, you could try looking through the logs of who's been sending mail to whom. This won't usually supply a copy of the message, but will often supply the size of the message. So if the information leakage was a customer list or technical drawing etc. You can narrow the list down very quickly to only messages of appropriate size. 2) If the company uses an external ISP's SMTP server, you'll have to ask them to supply you (a customer filtered version) of the above. Most ISP's turn their logs over very quickly and are not necessarily under any legal onus to retain the data. (From the ISP's perspective they are only keeping records for technical errors & statistics, not to play policeman). 3) Look in the clients outbox and deleted mailbox. It may sound silly, but you would be surprised at how many people send incriminating emails and forget that a copy is left on their local machine. I personally would do this as a disk search for the offending term. Depending on the type of network, this may be able to be performed from a central point. 4) If the offending Email(s) were sent via a web based Email provider your options are limited. Generally the logs will not be available to you (unless the matter is extremely serious, even then you will most likely have cross boarder jurisdiction matters to deal with). If your client uses a proxy for web access, you may be able to go through the proxy log looking for users who have issued large HTTP "POST"'s to a web mail server address and then track the offending internal machine down by it's IP address. 5) If the party used encryption you may not find the message in a disk search, but you may still find the encrypted version of the document on the offending PC. An encrypted document the size of the customer list or technical drawing for example (keep in mind some encryption packages employ compression also, so a predominantly text document may end up much smaller, but a binary document will stay fairly much the same size). You would be surprised how many people encrypt a document, but then forget to delete the unencrypted version from their machine. I would suggest your client look at an Email filter for the future and possibly also an IDS system that looks at outward WWW traffic. Kind Regards, JF --- Secdep wrote: > I have a client who has a large computer network, with 900+ employees > linked to the internet. > The client has had a leak of information. > Is there a programme available that can identify E-Mails sent in > past, by putting in certain ''Key Words'' then trawling the E-Mails > to see if there is match, or the ''Key Words'' were used in the past. > Raymond > --- > >From the desk of Raymond van Staden > Van Staden and Associates cc > P.O. Box 1150 > Amanzimtoti > 4125 > South Africa > Tel: +27 (0)31 916-1262 > Fax: +27 (0)31 916-1263 > Email: raymond@v... > Internet: http://www.vanstaden.co.za > [Non-text portions of this message have been removed] 5340 From: Fernando Martins Date: Mon May 13, 2002 8:39am Subject: Bugs & Bees http://www.nytimes.com/2002/05/13/science/13BEES.html What if the next step is to find bugs ... Lets learn about bees!! :> FM 5341 From: Craig Snedden Date: Mon May 13, 2002 2:26am Subject: RE: PROGRAMME TO ID PAST E-MAIL Is your client using Microsoft Exchange? The facility exists within the Exchange Server to trawl messages as described. I've no experience on Lotus products, Notes, Domino etc., but I'd be surprised if they don't have something hidden away in the software. I know there is other software to do this, but can't for the life of me remember any names at the moment. I'll get back to you if I do recall them. (Mild case of Monday morning blues....) :-) Craig -----Original Message----- From: Secdep [mailto:secdep@v...] Sent: 13 May 2002 06:32 To: TSCM-L Subject: [TSCM-L] PROGRAMME TO ID PAST E-MAIL I have a client who has a large computer network, with 900+ employees linked to the internet. The client has had a leak of information. Is there a programme available that can identify E-Mails sent in past, by putting in certain ''Key Words'' then trawling the E-Mails to see if there is match, or the ''Key Words'' were used in the past. Raymond --- >From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5342 From: Hawkspirit Date: Mon May 13, 2002 2:04pm Subject: Detection of cell-phone-based bugging devices >Anybody know what this is about and how it works? Roger > >Detection of cell-phone-based bugging devices > > > >The New Threat > > > >image001.pngimage002.gif > >[ Cellular phone technology has dramatically changed eavesdropping >techniques. While a decade ago performing illegal eavesdropping was a >complicated task requiring professional expertise (involving the >installation of concealed transmitters and receivers on-site), today >cellular phones can be easily converted into bugs and placed anywhere. > > > >Popular cell-phone models made by Nokia, Motorola and other market >leaders, can transform into sophisticated, easily operated bugging devices >through a small modification > >By a simple press of a button, a seemingly standard cell-phone device >switches into a mode in which it seems to be turned-off. However, in this >deceitful mode the phone will automatically answer incoming calls, without >any visual or audio indications whatsoever. > > >Since the airwaves are full with cellular phone transmissions, it is >almost impossible to locate such cell-phone-based bugging devices. This >task becomes even harder since transmission occurs only when the >eavesdropper calls the cellular bug; hence practically - unless one knows >where to look for - there is no way of detecting such bugs. > > > > > >The Solution > > > >image003.jpgimage003.jpgAcknowledging this threat, Netline Communications >Technologies releases the Cellular Activity Analyzer (CAA). Designed to >fight cellular-based bugs, the Cellular Activity Analyzer detects active >and dormant cellular phones. > > > >The CAA device is based on a modified handheld computer, used to monitor >and detect all cellular communication activity in a given area (such as an >office or yard). Whenever cellular transmission is detected, the CAA >provides the user with real-time audio and visual alerts. CAA also creates >a log-report of cellular activity that took place during a certain period >of time, logging the exact time of every cellular-transmission, as well as >transmissions duration, type & strength. > > > >Netline is currently looking for worldwide distributors for the CAA. > >As a company that deals with security solutions, offering an answer to >cellular-based bugging devices would position you as an updated expert, >aware of the most recent innovations. >The CAA will join your existing line of products enabling you to continue >to provide your clients with the most advanced technology available in the >battle against bugging devices. > > > > > >For further information, brochures, or any question, please contact: > > > >Ms. Loreen Haim > >Netline communications Technologies > >Tel: +972-3-5109855 Ext. 119 > >Fax: +972-3-5109821 > >Email: loreen@n... > >Website: www.netline.co.il > > > [Non-text portions of this message have been removed] From: Date: Fri May 9, 2003 10:49am Subject: are you really an attorney after all? - I'm not! - three times is a charm Subj: Re: [TSCM-L] TSCM vituperation - needs help Date: 5/9/2003 11:49:15 AM Pacific Standard Time From: kireau@c... To: MACCFound@a... Sent from the Internet (Details) are you really an attorney after all? you just broke attorney-client privilege by sending my private email to this group, TWICE! you cannot post a client consultation online. On Thu, 8 May 2003 5:59pm, MACCFound@a... wrote: > Subj: Re: [TSCM-L] > Date: 5/8/2003 12:50:26 PM Pacific Standard Time > From: HREF="mailto:negrodawn2003@y...">negrodawn2003@y... > To: MACCFound@a... > Sent from the Internet (Details) > > > > --- MACCFound@a... wrote: > > Subj: Re: [TSCM-L] TSCM vituperation > > Date: 5/8/2003 10:33:13 AM Pacific Standard Time > > From: > > HREF="mailto:kireau@c...">kireau@c... > > > > To: > > HREF="mailto:MACCFound@a...">MACCFound@a... > > > > Sent from the Internet (Details) > > > > > > > > > > oh wow, sorry, but i could use a civil rights > > attorney in TX right now. i am in woodville, > > tx, 60 miles N of beaumont in Tyler County. > > i am kinda poor...i dont have much to pay, > > but i have a great case where the sheriff > > deputies keep breaking into my home w/o > > any warrant after they have falsely arrested > > me for some petty class c misdemeanor > > and stolen my keys and locked me up. > > they never lock the door when they leave and > > people break in and now i have stolen about > > 25,000 worth of my belongings and > > furnishings. and if i report it to > > them, they lock me up again. i called the dallas fbi > > and they are taking the case, but i need a lawyer > > to help. can you? > > > > oh that is just a fraction of it too, there is tons > > more... > > > > > > [Non-text portions of this message have been > > removed]REPLY: I WOULD BE HAPPY TO HELP FREE OF > CHARGE...UNLIKE MOST MONEY SUCKING LAWYERS, I DO NOT > AGREE WITH THE LEGAL COMMUNITIY'S MONOPOLY ON LEGAL > INFORMATION....IF ANY AREA OF KNOWLEDGE SHOULD BE > READILY AVAILABLE TO ALL PEOPLE FREE OF CHARGE IT IS > LEGAL KNOWLEDGE THAT SHOULD BE FREE AND UNFETTERED > FROM THE BRUTAL HANDS OF CAPITALISM WHICH EFFECTIVELY > MAKES JUSTICE SOMETHING ONLY THE RICH CAN AFFORD. GOOD > LUCK. > > > > > > > [Non-text portions of this message have been removed] > > > Yahoo! Groups Sponsor > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > [Non-text portions of this message have been removed] 7294 From: Johnston, Richard Date: Wed May 7, 2003 0:52pm Subject: RE: Need help boys Please explain in detail why you think the "Feds" are/should be tracking/bugging your vehicle. Don't leave out any details or dates. Tell us a really good story and maybe someone will tell you where they hid the goods. Or maybe NOT. Many of the "Boys" in this group are Feds. I am sure someone's "got a clue on this." But I doubt you will ever get it. ;>} -----Original Message----- From: allan ginsberg [mailto:negrodawn2003@y...] Sent: Wednesday, May 07, 2003 10:12 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Need help boys Where do you often find GPS tracking devices?...I have checked the bumpers and underside and cannot find anything?....Must be inside the car somewhere....Also where do you find bugs inside the car?...Help me out boys....I wonder if the feds weren't using the speakers as microphones!...Anybody got a clue on this? __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 7295 From: Ocean Group Date: Wed May 7, 2003 9:49am Subject: Murphys Laws of Combat Thought all you military boys(& girls?) on the list would like this! Murphys Laws of Combat If the enemy is in range, so are you. Incoming fire has the right of way. Don't look conspicuous, it draws fire. There is always a way. The easy way is always mined. Try to look unimportant, they may be low on ammo. Professionals are predictable, it's the amateurs that are dangerous. The enemy invariably attacks on two occasions: (a) when you're ready for them and (b) when you're not ready for them. Teamwork is essential, it gives them someone else to shoot at. If you can't remember, then the claymore is pointed at you. The enemy diversion you have been ignoring will be the main attack. A "sucking chest wound" is nature's way of telling you to slow down. If your attack is going well, you have walked into an ambush. Never draw fire, it irritates everyone around you. Anything you do can get you shot, including nothing. Make it tough enough for the enemy to get in and you won't be able to get out. Never share a foxhole with anyone braver than yourself. If you're short of everything but the enemy, you're in a combat zone. When you have secured an area, don't forget to tell the enemy. Never forget that your weapon is made by the lowest bidder. 7296 From: Monty Date: Wed May 7, 2003 2:19pm Subject: Re: Need help boys Allan There is several questions that need to be answered first. Such a generic question as yours could never be answered. 1. How much time would someone have with the vehicle. ie time on target. 2. What level of interest / capabilities are the target. 3. Who is the advisary.What are there capabilities. 4. What kind of vehicle. (notice this is listed last). As always, you have to do your research first. Monty --- allan ginsberg wrote: > Where do you often find GPS tracking devices?...I > have checked the bumpers and underside and cannot > find > anything?....Must be inside the car > somewhere....Also > where do you find bugs inside the car?...Help me out > boys....I wonder if the feds weren't using the > speakers as microphones!...Anybody got a clue on > this? > > __________________________________ > Do you Yahoo!? > The New Yahoo! Search - Faster. Easier. Bingo. > http://search.yahoo.com > > __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com 7297 From: Date: Wed May 7, 2003 3:55pm Subject: Re: Need help boys Hey, are you the same guy who wrote "Howl"? allan ginsberg wrote: > Where do you often find GPS tracking devices?...I > have checked the bumpers and underside and cannot find > anything?....Must be inside the car somewhere....Also > where do you find bugs inside the car?...Help me out > boys....I wonder if the feds weren't using the > speakers as microphones!...Anybody got a clue on this? > > __________________________________ > Do you Yahoo!? > The New Yahoo! Search - Faster. Easier. Bingo. > http://search.yahoo.com > > > Yahoo! Groups Sponsor > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service > . [Non-text portions of this message have been removed] 7298 From: Cornolio Date: Wed May 7, 2003 5:07pm Subject: Re: Need help boys On Wed, May 07, 2003 at 09:12:02AM -0700, allan ginsberg wrote: > Where do you often find GPS tracking devices?...I > have checked the bumpers and underside and cannot find > anything?....Must be inside the car somewhere....Also > where do you find bugs inside the car?...Help me out > boys....I wonder if the feds weren't using the > speakers as microphones!...Anybody got a clue on this? Did you check under the dashboard, near the car radio? The plastic of the dashboard will alow the GPS signal to go trough, and to power the device there is no problem too. And check the housing of the outside mirrors. Some of the mirrors use rotors to adjust them, so power could be tapped from there. This gives a whole new meaning to :"OBJECTS IN MIRROR MAY BE CLOSER THAN THEY APPEAR" ;) Good luck, Barry Wels. 7299 From: John Dresden Date: Wed May 7, 2003 9:08pm Subject: RE: Need help boys I was under the distinct impression the FEDS usually conceal GPS tracking devices inside the vehicles battery, thereby giving it a constant power source. It is further my understanding that this is an excellent method as they make the install beforehand, and then only require having the vehicle in their possession for a matter of seconds to swap out batteries. John Dresden PI-5948; PPO-8898 8519-8521 West Sunset Blvd. West Hollywood, CA 90069 USA t: 310.657.6333 f: 310.657.8714 e: mailto:jad@s... w: http://www.spytechagency.com/ PROBE, INC d/b/a SPY TECH AGENCY Est: 1974 Services: Investigation; Surveillance; CounterMeasures (TSCM); Threat Assessment Control (TAC); Executive - Celebrity V.I.P Protection. Spy Shop: Retail and catalogue sales of investigative-surveillance products, publications, and countermeasures equipment. Custom designed spec-ops systems and rental equipment available. Discounts to licensed private investigators, media, law enforcement, selected governmental agencies. Member : C.A.L.I.; A.O.P.A.; Screen Actor's Guild; A.F.T.R.A.; A.S.I.S. -----Original Message----- From: MACCFound@a... [mailto:MACCFound@a...] Sent: Wednesday, May 07, 2003 6:38 PM To: jmatk@tscm.com; TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Need help boys In a message dated 5/7/2003 5:54:57 PM Pacific Standard Time, jmatk@tscm.com writes: > The feds usually hide the GPS systems inside one of the engine > pistons, inside the carburetor float bowl, or inside the vehicle > transmission chambers ;--] > They use the sparkplug wire from piston two on a four cylinder, piston three on a six cylinder and piston four on an eight cylinder car as the antenna. I'm not familiar with what they use on diesels or hybrid vehicles. [Non-text portions of this message have been removed] Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 7300 From: Vangelis Date: Wed May 7, 2003 11:50pm Subject: Re: Need help boys At 09:38 PM 5/7/2003 -0400, you wrote: > > The feds usually hide the GPS systems inside one of the engine pistons, > inside the carburetor float bowl, or inside the vehicle transmission > chambers ;--] > > > >They use the sparkplug wire from piston two on a four cylinder, piston >three on a six cylinder and piston four on an eight cylinder car as the >antenna. I'm not familiar with what they use on diesels or hybrid vehicles. On that note, my rotary RX-7 apparently made this impossible with the counter-rotation of the two ferous rotors (no pistons here!). Probably something to do with the inevitable pretzeling of the magnetic envelope. A reputable sweeper from this list found an unpowered govt-issue GPS tracker embedded in the rotor housing *from the Mazda factory in Japan* that induced power from the passage of the magnetic apex seals they'd swapped in for the standard Moly seals. The bastards! They'd rather play footsie with a foreign government than obtain the appropriate domestic warrants, apparently. They'll probably continue this procedure with the upcoming RX-8. Just thought I'd drip something into the pool of communal knowledge. -Van 7301 From: Jason Dibley Date: Thu May 8, 2003 11:23am Subject: need help boys Where do the feds hide the antenna. It has to be up-looking not through metal to pick up the signals from the satellites. In the UK the antennas are not in the engine bay unless concealed behind plastic trim. If the rear or front windscreen is heated and contains tiny heating wires this acts as a block to the signal also. If it is a GPS tracking system then it must employ a secondary transmission device usually GSM to broadcast the fixes or live audio if mics are attached to the device. This means a second antenna that also has deployment restrictions. Also interference with the cars audio system at 900MHz usually prevents the GSM antenna being concealed within the vehicle. So look in the wings, bumper, and light clusters for a start. Look for GSM antennas and GPS antennas then look deeper but bear in mind the limitations of receiving the satellite signal and transmitting the data, will determine where the antennas are located. Mr Jason M Dibley Dip Eng (hons) TSCM Director. QCC Interscan Ltd. Please visit our Web site at http:\\www.qcc.co.uk You can view our digitally signed reports and other documents using Adobe Acrobat Version 4 or greater. You can obtain this for free from the following web site: http://www.adobe.co.uk/products/acrobat/readstep.html This message is intended only for the use of the person(s) to whom it is addressed. It may contain information which is privileged and confidential or material which is protected under attorney-client privilege. In addition, this message may not necessarily represent the views of QCC. Accordingly any unauthorised use is strictly prohibited. If you are not the Intended Recipient, please contact QCC Interscan as soon as possible or send mail to contact@q.... QCC Interscan Ltd. Registered in England and Wales No. 03773029 7302 From: Blake Bowers Date: Thu May 8, 2003 0:56pm Subject: Re: TSCM vituperation > IN A VALUABLE POSITION TO HELP INNNOCENT, POOR PEOPLE > RECOVER PUNITIVE DAMAGES FOR NUMEROUS AND EGREGIOUS > CONSTITUTIONAL VIOLATIONS....IF YOU ARE WONDERING WHAT Hmmm. Great. Good for you. But could you stop yelling??????????????? 7303 From: Date: Fri May 9, 2003 3:13pm Subject: Re: are you really an attorney after all? - I'm not! - three times is a charm This is becoming a Twin Peaks type of funky soap opera thread........ I'm waiting for the wall to my left to dissolve and a character like Mulder to ask me if I still think it's a dream. :-) At 14:49 5/9/2003, MACCFound@a... wrote: >Subj: Re: [TSCM-L] TSCM vituperation - needs help >Date: 5/9/2003 11:49:15 AM Pacific Standard Time >From: kireau@c... >To: MACCFound@a... >Sent from the Internet (Details) > >are you really an attorney after all? >you just broke attorney-client privilege >by sending my private email to this group, >TWICE! you cannot post a client consultation >online. > > >On Thu, 8 May 2003 5:59pm, MACCFound@a... wrote: > > > Subj: Re: [TSCM-L] > > Date: 5/8/2003 12:50:26 PM Pacific Standard Time > > From: > HREF="mailto:negrodawn2003@y...">negrodawn2003@y... > > To: MACCFound@a... > > Sent from the Internet (Details) > > > > > > > > --- MACCFound@a... wrote: > > > Subj: Re: [TSCM-L] TSCM vituperation > > > Date: 5/8/2003 10:33:13 AM Pacific Standard Time > > > From: > > > > HREF="mailto:kireau@c...">kireau@c... > > > > > > To: > > > > HREF="mailto:MACCFound@a...">MACCFound@a... > > > > > > Sent from the Internet (Details) > > > > > > > > > > > > > > > oh wow, sorry, but i could use a civil rights > > > attorney in TX right now. i am in woodville, > > > tx, 60 miles N of beaumont in Tyler County. > > > i am kinda poor...i dont have much to pay, > > > but i have a great case where the sheriff > > > deputies keep breaking into my home w/o > > > any warrant after they have falsely arrested > > > me for some petty class c misdemeanor > > > and stolen my keys and locked me up. > > > they never lock the door when they leave and > > > people break in and now i have stolen about > > > 25,000 worth of my belongings and > > > furnishings. and if i report it to > > > them, they lock me up again. i called the dallas fbi > > > and they are taking the case, but i need a lawyer > > > to help. can you? > > > > > > oh that is just a fraction of it too, there is tons > > > more... > > > > > > > > > [Non-text portions of this message have been > > > removed]REPLY: I WOULD BE HAPPY TO HELP FREE OF > > CHARGE...UNLIKE MOST MONEY SUCKING LAWYERS, I DO NOT > > AGREE WITH THE LEGAL COMMUNITIY'S MONOPOLY ON LEGAL > > INFORMATION....IF ANY AREA OF KNOWLEDGE SHOULD BE > > READILY AVAILABLE TO ALL PEOPLE FREE OF CHARGE IT IS > > LEGAL KNOWLEDGE THAT SHOULD BE FREE AND UNFETTERED > > FROM THE BRUTAL HANDS OF CAPITALISM WHICH EFFECTIVELY > > MAKES JUSTICE SOMETHING ONLY THE RICH CAN AFFORD. GOOD > > LUCK. > > > > > > > > > > > > [Non-text portions of this message have been removed] > > > > > > Yahoo! Groups Sponsor > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > > > > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7304 From: do5ugie Date: Fri May 9, 2003 8:53pm Subject: Re: are you really an attorney after all? - I'm not! - three times is a charm I don't know who started this thread, but... for atty/client privilege (or atty/client work-product privilege) to exist there must be an arranged [fee] agreement between/among parties. Requires offer and acceptance and consideration. Now, (in my most gentle phrasing): "Go peddle your papers elsewhere." Or fold your papers into a kite and "go fly your kite". You have found no "paper tigers" on this list. Get it? [from the quietest guy on THE LIST] -Doug 7305 From: Shawn Hughes Date: Sat May 10, 2003 2:48pm Subject: Re: Digest Number 1263 >Re: are you really an attorney after all? - I'm not! - three times is a charm > >I don't know who started this thread, but... I don't clearly recall, either. But this is the first time I have ever had trepidations about responding to questions posed by list members. At one time, this list was chock full of information, history, and trivia, with an occasional humorous bit thrown in for good measure. I am seeing this list swirling around the bowl now, with questions like " Where do Feds hide the antennas ", and people claiming to be victims of 'covert wars '. I am humbly requesting that we take a different tack on these types of postings, lest we run the people off who are the true knowledge database that make up the reason why we subscribe to one more listserv. I realize JMA wouldn't ditch his own list, but he sure could (and would) pull the plug on it. Could we instead do this? ~If you feel you are a victim of eavesdropping or related issues, contact a Gold List member via their public business number during business hours. ~If you are wanting to learn countersurveillance techniques with a core concentration in US GOV gear and methodology, please don't post at all. Just lurk. No one who truly has these answers will tell you, anyway. To take a line from Mr. Uhrig, pick up a book and learn, or buy a GPS and try to hide it in your Mom's car or something. If these stopgap methods fail, could we possibly #kick repeat offenders? I came here to learn. These types of threads I can get virtually everywhere else, and it's refreshing not to have my bandwidth wasted here. I am afraid the noise floor is rising, so let's all do our part not to detune the antenna. Humble Regards, Shawn Formerly, Head, Technical and Electronic Surveillance Unit; Knox County (TN) Sheriff's Office Currently, Sergeant Shawn Hughes Patrolman / Technician, Union County (TN) Sheriff's Office Uncertified Public Safety Bomb Technician Hazardous Materials Technician Grants Coordinator Subject Matter Expert; CBIRNE Operations, Technical Surveillance Operations Member, International Association of Bomb Technicians Region VI ORI - TN0870000 Ph. - (865)992-5212 email - srh@e... / shughes3@l... ---------------------------------------------------------------------------- ------------------------------------------------ [Non-text portions of this message have been removed] 7306 From: kondrak Date: Sat May 10, 2003 6:56pm Subject: Re: Digest Number 1263 Isn't it obvious he was a TROLL? We're just having some fun with him..... At 15:48 5/10/2003 -0400, you wrote: > >Re: are you really an attorney after all? - I'm not! - three times is a > charm > > > >I don't know who started this thread, but... > > > >I don't clearly recall, either. But this is the first time I have ever had >trepidations about responding to questions posed by list members. > >At one time, this list was chock full of information, history, and trivia, >with an occasional humorous bit thrown in for good measure. > > >I am seeing this list swirling around the bowl now, with questions like " >Where do Feds hide the antennas ", and people claiming to be victims of >'covert wars '. > > >I am humbly requesting that we take a different tack on these types of >postings, lest we run the people off who are the true knowledge database >that make up the reason why we subscribe to one more listserv. I realize >JMA wouldn't ditch his own list, but he sure could (and would) pull the >plug on it. > > >Could we instead do this? > >~If you feel you are a victim of eavesdropping or related issues, contact a >Gold List member via their public business number during business hours. >~If you are wanting to learn countersurveillance techniques with a core >concentration in US GOV gear and methodology, please don't post at all. >Just lurk. No one who truly has these answers will tell you, anyway. To >take a line from Mr. Uhrig, pick up a book and learn, or buy a GPS and try >to hide it in your Mom's car or something. > >If these stopgap methods fail, could we possibly #kick repeat offenders? I >came here to learn. These types of threads I can get virtually everywhere >else, and it's refreshing not to have my bandwidth wasted here. > >I am afraid the noise floor is rising, so let's all do our part not to >detune the antenna. > > >Humble Regards, > > >Shawn > > > >Formerly, >Head, Technical and Electronic Surveillance Unit; Knox County (TN) >Sheriff's Office >Currently, >Sergeant Shawn Hughes >Patrolman / Technician, Union County (TN) Sheriff's Office >Uncertified Public Safety Bomb Technician >Hazardous Materials Technician >Grants Coordinator >Subject Matter Expert; CBIRNE Operations, Technical Surveillance Operations >Member, International Association of Bomb Technicians Region VI >ORI - TN0870000 Ph. - (865)992-5212 email - srh@e... / >shughes3@l... >---------------------------------------------------------------------------- >------------------------------------------------ > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7307 From: gkeenan Date: Sun May 11, 2003 7:45am Subject: Adoption information Sorry for the cross-postings, but I'm sure this will be of interest to those of you who handle adoption cases. Jerry State helps adoptee and mom reunite Court program marks 10th year Carol Sowers The Arizona Republic May. 11, 2003 12:00 AM Every day Colleen Hill wrote in her diary about her love for the crinkly-eyed Army Air Corps mechanic she was dating in the waning days of World War II. Stationed in Savannah, Ga., they laughed and loved and she was sure of a future with him. But when the 23-year-old private first class told him she was pregnant in the summer of 1945, he stopped taking her calls. Adoption connection ARIZONA SUPREME COURT'S CONFIDENTIAL INTERMEDIARIES WHAT: The service, which conducts searches for adults who wish to find either the children they placed for adoption or their biological parents, began 10 years ago and has assisted 2,000 families, making connections in 71 percent of the cases. Of those, 50 percent opted to share identifying information. The program's $192,800 budget comes from a surcharge on adoptions, birth certificates, and training fees. HOW: Under the auspices of the Arizona Supreme Court, 38 certified intermediaries statewide, unlike private investigators, have the authority to look at confidential adoption records. They cannot release information outright, but can use it and court records to locate parties. Identifying information can only be exchanged with mutual consent, to protect those who want the adoption to remain closed. COST: An average search costs $220, with more than 30 percent of billing hours waived by the intermediaries. INFORMATION: Visit the program's Web site at www.supreme.state.az.us/cip or call the Parent Assistance Hotline at 1-800-732-8193 or (602) 542-9580. Years later, after she'd moved to Pacifica, Calif., married and raised three children, she learned her wartime sweetheart was already married during their affair. Only her parents and a few close relatives knew about the 8-pound boy born March 1, 1946, in the then-Phoenix Florence Crittendon Home for Unwed Mothers. She named him Dennis Edward before she placed him for adoption, and cried as she held him for the last time. She spoke no more about it for more than half a century. Then, three years ago, she was contacted by one of the Arizona Supreme Court's confidential intermediaries, specialists who search court, adoption, birth and a wide array of other records for adults who want to be reunited with their birth parents, or biological parents anxious to find children they placed for adoption. The program, celebrating its 10th anniversary this month, has assisted about 2,000 families and made connections in 71 percent of its cases. Of those, about 50 percent exchange information. When the letter came to Colleen Hill Hughes it was Christmastime 2000. As her daughter, Linda, read it to her, Hughes, now 81, knew her wartime secret was out. "Mom, does this mean you have another child?" Linda Hughes asked her mother. "Would it matter to you if I did?" Colleen asked. "No," Linda replied. "There's always room for one more." In the next few months, that answer would introduce Dennis McGinn, 57, of Phoenix, to the woman who gave him life. He would discover that his maternal grandparents lived within a few blocks of his family, and he likely passed them on his way to his family's pew at St. Francis Catholic Church. He also would meet some of the children of his late natural father, Maurice Scott. Today will be the third Mother's Day that McGinn will spend with Hughes, the woman he believes loved him best by giving him to another family. "My thoughts growing up was that my mother thought enough of me to put me in an orphanage because she knew I would be better off," McGinn said. He was adopted when he was 8 months old by Mickey and Catherine McGinn, who had a biological son and two adopted daughters. Mickey McGinn was a well-known figure in downtown Phoenix, a buyer of men's clothing at the long-gone Hanny's store and a regular at Durant's restaurant, still open on Central Avenue. "I had a good childhood," said McGinn, a tall, burly equipment operator who said he never thought about finding his biological parents. But his wife, Bonnie, and a daughter from an earlier marriage pushed him, saying he should at least find out about his medical history because it could be important one day. Bonnie started the search on her own about nine years ago, spending hundreds of dollars with private investigators who turned up nothing. Then about three years ago, she learned about the Arizona Supreme Court's confidential intermediaries. "When you find someone it is such a thrill," said intermediary Marjane McDougall, who tracked down Colleen and sent the Christmastime letter asking if she wanted to meet her son. At first, Hughes was cautious. "I didn't want to fool with it until after the holidays," Hughes said by phone from Pacifica. But in February 2001, she made the call. By St. Patrick's Day, McGinn was on a California-bound plane, greeted at the airport by his two half sisters and a half brother, and flooded with facts about his English-Irish heritage. The reunion was a surprise for Hughes, who gasped when she saw her 6-foot-3-inch son. "I was so thrilled," she said of the first meeting.. Before long, McGinn was stretched out on Hughes' floor in his stocking feet, playing board games with the family and easily calling her Mom. "They just fit so right," McGinn's wife, Bonnie, said, "like they belonged together." "He has the same sense of humor, the same smile," Linda said of her half brother. Now the families talk on the phone, visit, and plan to spend their second Thanksgiving together this year. McGinn, at first reluctant to find his biological mother, now has advice for others in his situation. "Don't close the door on finding your family." Reach the reporter at carol.sowers@a... or (602) 444-8058. GPKeenan Co., Int'l Security Services 1005 Celia St. West Islip, NY 11795-2053 (631) 587-4020 (ph) (516) 768-9602 (cell) (530) 323-6832 (Jfax) gkeenan@s... secureops@e... [Non-text portions of this message have been removed] 7308 From: Cornolio Date: Sat May 10, 2003 10:00am Subject: Dutch firm gave Iraqis training for spying on Nato Hi All, I did not see this article pass by here, and think you might like it. --- TIMES ONLINE: May 04, 2003 Dutch firm gave Iraqis training for spying on Nato Matthew Campbell, Baghdad and Jon Ungoed-Thomas A DUTCH electronics firm provided Iraq with technology and training that were used to spy on Nato, documents unearthed in Baghdad have revealed. Hoka Electronic, which makes data decoding equipment, supplied items to Baghdad as recently as 2000. It taught Iraqi intelligence officers how to use them in a Bulgarian security service ìsafe houseî. Horst Diesperger, the companyís director in Oude Pekela, a village in northeastern Holland, confirmed last week that he had travelled to Bulgaria to carry out training, but said the clients had told him they came from Jordan and Syria. He said Hoka ìsupplied the equipment not directly to the end userî. Knowingly providing Iraq with such equipment would have constituted a violation of United Nations sanctions, which prohibited the sale to Baghdad of items with potential military uses. CODE30, as one of the Hoka programmes is known, ìoffers military, government and . . . monitoring installations the ability to enhance operatorsí search and monitor operations in the HF radio spectrumî, says the companyís website, quoting from a reference in Janeís Military Communications. According to Hoka, the companyís main business is ìdevelopment and distribution of software-based decodersî such as CODE30, CODE300 and CODE3-GOLD. An Iraqi who helped to broker the Hoka deal said Saddam Husseinís ousted regime had acquired all three. According to the Iraqi source, Hoka products were used with communications equipment provided by other countries to eavesdrop on military traffic in Turkey, a Nato member. The documents show that discussions went on for some time about a training session with Hoka in which a Bulgarian company acted as an intermediary between Diesperger and Iraq. In November 1996 Diesperger wrote to Bulgaria saying the course would be run by ìone or two engineers from our sideî and that ìthe most easy wayî would be to conduct the training in Oude Pekela ìwith all the necessary equipmentî. This apparently did not suit the Iraqis and it was not until March 1998 that a group of intelligence officers was dispatched from Baghdad to Bulgaria to meet Diesperger. The Iraqi source said Bulgarian intelligence officials had helped by providing the safe house in Sofia for training. They had organised the import of Hoka products to Bulgaria, after which the equipment had been transferred to Baghdad through Iraqi ìfrontî companies in Cyprus and Jordan. Diesperger acknowledged the visit to Bulgaria. ìThe training was for a small group of customers of this Bulgarian company,î he said. ìThe guys came from Amman, Jordan, and one of them, as far as I remember, came from Damascus, Syria.î Diesperger said Hoka would have had ìno problemî supplying Iraq in spite of UN sanctions because no applications were rejected. ìIf we have a customer in whatever country and he wants a disk, we send it to him,î he said. He said it never occurred to him that his products might violate sanctions: ìItís software and we sell it worldwide.î Asked if he had ever knowingly dealt with Iraq, Diesperger said: ìNo, never. I guess never. Iím nearly sure never. I donít think so.î Among the documents, however, was a letter he had faxed to a number in Baghdad in which he wrote: ìAbout the mentioned disks. This will give no problems.î UN resolution 661 makes clear that supplying software that has a potential military use without its approval would be a breach of the sanctions. --- Greetings, Barry Wels. 7309 From: atsi999 Date: Sat May 10, 2003 11:57am Subject: New Portable Receiver Optoelectronics new Graphical Nearfield Receiver. May be worthwhile to add to your bag. http://www.optoelectronics.com/tech/pdf/Xplorer/xsweeper.PDF J.Evert AZ Technical Security 7310 From: The Dog's Bollix Date: Sat May 10, 2003 3:51pm Subject: RE: Need help boys This has to be myth. I install these types of devices every week. These devices, while they have been around a while, are still far from a developed product. They are tempermental, sensitive bastards. The antenna must see the sky. No two ways about it. Most batteries (with the exception of the BMW convertibles) have ametal layer over them. As advanced as the Feds may be they can't push signals through metal. Niall. --- John Dresden wrote: > I was under the distinct impression the FEDS usually > conceal GPS tracking > devices inside the vehicles battery, thereby giving > it a constant power > source. It is further my understanding that this is > an excellent method as > they make the install beforehand, and then only > require having the vehicle > in their possession for a matter of seconds to swap > out batteries. > > John Dresden > PI-5948; PPO-8898 > > 8519-8521 West Sunset Blvd. > West Hollywood, CA 90069 USA > t: 310.657.6333 > f: 310.657.8714 > e: mailto:jad@s... > w: http://www.spytechagency.com/ > > > PROBE, INC > > d/b/a > SPY TECH > AGENCY > > Est: 1974 > Services: Investigation; Surveillance; > CounterMeasures (TSCM); > Threat Assessment Control (TAC); > Executive - Celebrity > V.I.P Protection. > Spy Shop: Retail and catalogue sales of > investigative-surveillance > products, publications, and > countermeasures equipment. > Custom designed spec-ops systems > and rental equipment > available. Discounts to licensed > private investigators, > media, law enforcement, selected > governmental agencies. > > Member : C.A.L.I.; A.O.P.A.; Screen Actor's Guild; > A.F.T.R.A.; A.S.I.S. > > -----Original Message----- > From: MACCFound@a... [mailto:MACCFound@a...] > Sent: Wednesday, May 07, 2003 6:38 PM > To: jmatk@tscm.com; TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] Need help boys > > In a message dated 5/7/2003 5:54:57 PM Pacific > Standard Time, jmatk@tscm.com > writes: > > > > The feds usually hide the GPS systems inside one > of the engine > > pistons, inside the carburetor float bowl, or > inside the vehicle > > transmission chambers ;--] > > > > They use the sparkplug wire from piston two on a > four cylinder, piston three > on a > six cylinder and piston four on an eight cylinder > car as the antenna. I'm > not > familiar > with what they use on diesels or hybrid vehicles. > > > [Non-text portions of this message have been > removed] > > > > > Yahoo! Groups Sponsor > > 40:HM/A=1564415/R=0/*http://www.netflix.com/Default?mqso=60164784&partid=317 > 0658> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! > Terms of Service > . > > > [Non-text portions of this message have been > removed] > > > __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com 7311 From: The Dog's Bollix Date: Sat May 10, 2003 3:59pm Subject: RE: Need help boys Any good stereo installer will locate a working, transmitting GPS device within minutes, if he is familair with the vehicle's stereo and wiring layout. There's limited space in a vehicle, most active realtime GPS devices are 3-wire installs (the reliable ones anyway) - true 12V, ground, and ignition starter (momentary 12V). Someone mentioned car mirrors. You're not always guaranteed that you have true 12V at the mirror. You're not always guaranteed true 12v at the radio either. It's a faxcinating, annotying process to install GPS tracking devices on a regular basis. There's also some real limitations to where you can put the device itself. SUV's demand that you place it (the device or the antenna if separate) either in the front dash, or under the windshield wiper plastic cover. THe antenna must see at least 4 sattelites to get a "GPS lock". So an unbostructed view of the sky is essential. The easiest place to get all of your power needs is from the ignition harness. This message applies ONLY to realtime reporting devices. Passive recording devices are a different story. Niall. --- "Johnston, Richard" wrote: > Please explain in detail why you think the "Feds" > are/should be > tracking/bugging your vehicle. Don't leave out any > details or dates. Tell > us a really good story and maybe someone will tell > you where they hid the > goods. Or maybe NOT. Many of the "Boys" in this > group are Feds. I am sure > someone's "got a clue on this." But I doubt you > will ever get it. ;>} > > -----Original Message----- > From: allan ginsberg > [mailto:negrodawn2003@y...] > Sent: Wednesday, May 07, 2003 10:12 AM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Need help boys > > > Where do you often find GPS tracking devices?...I > have checked the bumpers and underside and cannot > find > anything?....Must be inside the car > somewhere....Also > where do you find bugs inside the car?...Help me out > boys....I wonder if the feds weren't using the > speakers as microphones!...Anybody got a clue on > this? > > __________________________________ > Do you Yahoo!? > The New Yahoo! Search - Faster. Easier. Bingo. > http://search.yahoo.com > > > > Yahoo! Groups Sponsor > > > > > l/S=:HM/A=1482387/rand=302906793> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! > Terms of Service > . > > > > > [Non-text portions of this message have been > removed] > > > __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com 7312 From: Date: Sun May 11, 2003 0:35am Subject: Time Wasters Well put Shawn the weirdo's are to a point entertaining but this group is an information exchange. TSCM [Technical Surveillance and Countermeasures] David McGauley Demtec Electronic Surveillance and Counter Measures Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L39 0HF UK 01695 558544 07866206112 demtec@a... www.demtec.co.uk [under construction] The manufacture and installation of custom made covert electronic audio and video devices Professional physical and electronic counter measures [sweep] services. Note: any fellow UKPIN members welcome to call in to discuss applications. Workshop located alongside the M58 junc 3 [Non-text portions of this message have been removed] 7313 From: Date: Sun May 11, 2003 8:03am Subject: Lets just give out all clasified info to the idiots on this list, or wrap some foil around your head to keep the " rays " from taking over your mind. Back to lurking......... <<>> 7314 From: Matt Paulsen Date: Sun May 11, 2003 1:03pm Subject: RE: (unknown) >or wrap some foil around your head to keep the " rays " from taking over your mind. Correction - Major League Baseball is watching you all reference: http://www.nationalreview.com/murdock/murdock110802.asp "After doctors prescribe Bart a new drug called Focusyn for his attention deficit disorder, he becomes a model student. But he quickly devolves into paranoia, wrapping himself in foil and donning a metal garbage-can lid to shield himself from a surveillance satellite operated by Major League Baseball." 7315 From: Matt Paulsen Date: Sun May 11, 2003 1:14pm Subject: RE: Digest Number 1263 Ok, sure... I have tw0 questions regarding DSx vs Tx signaling and how to determine if non-CPE is faulty upstream from CPE. CPE is the same, but network equipment from telco doesn't appear to be different, yet they (IE: Verizon) state it is. I've had an OC48 card and a DS3 card go bad @ Verizon's end, but they kept insisting that timing on CPE was incorrect (Which it wasn't, as has been proven by their swapping out a DS3 and OC48 card on their end, 'FIXING' the timing issues on my end.. snort.). I've tried pretty much everything on my end with these 2 occurrances, including swapping out telco equipment at demarc where I could get ahold of it, and enabling performance monitoring on telco switch, but I always found that this didn't isolate the fault until a few months of troubleshooting goes by with the telco. Tried scoping the lines - t-berd, packet analyzer, no help there. In fact, one T1 scoped as a 56k only line, even though we were passing 1.5ishk data through it + had 3 voice channels lit. The Tx vs DSx was the second line, where they swapped me from copper to fiber on their end, but they didn't change network equipment at demarc. Sounds fishy to me... I think I'm getting my leg pulled - their using hyprercards on the demarc. Do these support Tx and DSx signalling concurrently? Back to you Charlie Brown. At 15:48 5/10/2003 -0400, you wrote: > >Re: are you really an attorney after all? - I'm not! - three times is a > charm > > > >I don't know who started this thread, but... > > > >I don't clearly recall, either. But this is the first time I have ever had >trepidations about responding to questions posed by list members. > >At one time, this list was chock full of information, history, and trivia, >with an occasional humorous bit thrown in for good measure. > > >I am seeing this list swirling around the bowl now, with questions like " >Where do Feds hide the antennas ", and people claiming to be victims of >'covert wars '. > > >I am humbly requesting that we take a different tack on these types of >postings, lest we run the people off who are the true knowledge database >that make up the reason why we subscribe to one more listserv. I realize >JMA wouldn't ditch his own list, but he sure could (and would) pull the >plug on it. > > >Could we instead do this? > >~If you feel you are a victim of eavesdropping or related issues, contact a >Gold List member via their public business number during business hours. >~If you are wanting to learn countersurveillance techniques with a core >concentration in US GOV gear and methodology, please don't post at all. >Just lurk. No one who truly has these answers will tell you, anyway. To >take a line from Mr. Uhrig, pick up a book and learn, or buy a GPS and try >to hide it in your Mom's car or something. > >If these stopgap methods fail, could we possibly #kick repeat offenders? I >came here to learn. These types of threads I can get virtually everywhere >else, and it's refreshing not to have my bandwidth wasted here. > >I am afraid the noise floor is rising, so let's all do our part not to >detune the antenna. > > >Humble Regards, > > >Shawn > > > >Formerly, >Head, Technical and Electronic Surveillance Unit; Knox County (TN) >Sheriff's Office >Currently, >Sergeant Shawn Hughes >Patrolman / Technician, Union County (TN) Sheriff's Office >Uncertified Public Safety Bomb Technician >Hazardous Materials Technician >Grants Coordinator >Subject Matter Expert; CBIRNE Operations, Technical Surveillance Operations >Member, International Association of Bomb Technicians Region VI >ORI - TN0870000 Ph. - (865)992-5212 email - srh@e... / >shughes3@l... >--------------------------------------------------------------------------- - >------------------------------------------------ > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7316 From: kondrak Date: Sun May 11, 2003 3:12pm Subject: Re: Dutch firm gave Iraqis training for spying on Nato Don't know what to make of this, Holka code is used by Amateur radio operators round the world, and thus is very common. It should be considered public domain even if it isn't. At 17:00 5/10/2003 +0200, you wrote: >Hi All, > >I did not see this article pass by here, and think you might like it. > >--- >TIMES ONLINE: > >May 04, 2003 > >Dutch firm gave Iraqis training for spying on Nato >Matthew Campbell, Baghdad and Jon Ungoed-Thomas > >A DUTCH electronics firm provided Iraq with technology and training >that were used to spy on Nato, documents unearthed in Baghdad have >revealed. Hoka Electronic, which makes data decoding equipment, >supplied items to Baghdad as recently as 2000. It taught Iraqi >intelligence officers how to use them in a Bulgarian security service >"safe house". > >Horst Diesperger, the company's director in Oude Pekela, a village in >northeastern Holland, confirmed last week that he had travelled to >Bulgaria to carry out training, but said the clients had told him they >came from Jordan and Syria. He said Hoka "supplied the equipment not >directly to the end user". > >Knowingly providing Iraq with such equipment would have constituted a >violation of United Nations sanctions, which prohibited the sale to >Baghdad of items with potential military uses. > >CODE30, as one of the Hoka programmes is known, "offers military, >government and . . . monitoring installations the ability to enhance >operators' search and monitor operations in the HF radio spectrum", >says the company's website, quoting from a reference in Jane's >Military Communications. > >According to Hoka, the company's main business is "development and >distribution of software-based decoders" such as CODE30, CODE300 and >CODE3-GOLD. An Iraqi who helped to broker the Hoka deal said Saddam >Hussein's ousted regime had acquired all three. > >According to the Iraqi source, Hoka products were used with >communications equipment provided by other countries to eavesdrop on >military traffic in Turkey, a Nato member. > >The documents show that discussions went on for some time about a >training session with Hoka in which a Bulgarian company acted as an >intermediary between Diesperger and Iraq. > >In November 1996 Diesperger wrote to Bulgaria saying the course would >be run by "one or two engineers from our side" and that "the most easy >way" would be to conduct the training in Oude Pekela "with all the >necessary equipment". > >This apparently did not suit the Iraqis and it was not until March >1998 that a group of intelligence officers was dispatched from Baghdad >to Bulgaria to meet Diesperger. > >The Iraqi source said Bulgarian intelligence officials had helped by >providing the safe house in Sofia for training. They had organised the >import of Hoka products to Bulgaria, after which the equipment had >been transferred to Baghdad through Iraqi "front" companies in Cyprus >and Jordan. > >Diesperger acknowledged the visit to Bulgaria. "The training was for a >small group of customers of this Bulgarian company," he said. "The >guys came from Amman, Jordan, and one of them, as far as I remember, >came from Damascus, Syria." > >Diesperger said Hoka would have had "no problem" supplying Iraq in >spite of UN sanctions because no applications were rejected. "If we >have a customer in whatever country and he wants a disk, we send it to >him," he said. > >He said it never occurred to him that his products might violate >sanctions: "It's software and we sell it worldwide." > >Asked if he had ever knowingly dealt with Iraq, Diesperger said: "No, >never. I guess never. I'm nearly sure never. I don't think so." Among >the documents, however, was a letter he had faxed to a number in >Baghdad in which he wrote: "About the mentioned disks. This will give >no problems." > >UN resolution 661 makes clear that supplying software that has a >potential military use without its approval would be a breach of the >sanctions. >--- > >Greetings, > >Barry Wels. > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7317 From: Mitch D Date: Sun May 11, 2003 8:42pm Subject: Re: New Portable Receiver I always liked OPTO's gear. If anyone on the list indulges in this item,a short performance report would be nice to see! thanks --- atsi999 wrote: > Optoelectronics new Graphical Nearfield Receiver. May be > worthwhile > to add to your bag. > > http://www.optoelectronics.com/tech/pdf/Xplorer/xsweeper.PDF > > J.Evert > AZ Technical Security > > > __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com 7318 From: Matt Paulsen Date: Sun May 11, 2003 10:02pm Subject: RE: Digest Number 1263 A few pointers, but first, I'm still interested in finding out how to remote scan the telco to find hardware faults in their equipment from my end..... -m.. now to the details: A: The equipment has all been discovered at this point to be faulty telco equipment. B: Hardware loop back from router to CSU/DSU was performed on both ends where both circuits were direct t1's on 'private' network. IE: No internet, classic old school t1, point to point. C: These are 2 separate issues, not interrelated. The DS3's/Tx's etc. do not cross the same OC48 paths, different originating CO's, different circuit ID's all the way through. D: Both sites experienced same errors - frequent voice/data interruption, from seconds to hours of downtime. E: Both sites were under performance monitoring at telco switch center. Both showed errors up to the link down, then both would run clean for a month or so, then error out. Telco can only hold 7 days, that being an issue, of performance monitors before it FIFO's. F: Timing is served from Verizon using symmetricom time servers, cdpd/gps/nist dialback, rubidium and quartz oscillators, we're pulling from them, csu/dsu's are set to read one from network, one from remote/"local". G: ONE of our CSU/DSU sources is running at +10Db from it to them, showing a total of +28-+32Db at the hypercard. Not good, but not the cause, I suspect it's been programmed that way, haven't pinned out a cable to check yet. H: Both ends of CSU/DSU's are synching to network but not telco, and are deframing after 1 second of frame establishment. I: One of the CSU/DSU's showed traffic as inverse on channel 13 only, but was passing a full T1 of traffic even though it showed channel 13 only active. J: Loops run at ping ip, count 1500, rate 1500, 0x0000, 0x1111, 0xffff, 0xaaaa all clean from routers to CSU/DSU's (used a cat5e, my teeth and fingers to make a loopback.. yea, we're rolling in cash over here.) K: Verizon's ends all look clean through and through, they have not initiated a point to point - a-z loop test, just a-m and z-n. L: Peoples lives depend on our network being up so no, no one would be cleared to a room unless escorted by security / myself / my group. Verizon BRC is cleared for intrusive testing from remote center. I have their 3rd level field tech's cellphone... we're buds at this point. M: Circuits have been running for 2+ years each but are now exhibiting these problems. N: They put a card in slot2 at one site and left the card in slot1 'just in case' - I get opportunistic when troubleshooting. We had that site narrowed to a 3' cable at one point as being the only probable cause for the issue until I was passing data by swapping out a data only CSU for the voice/data CSU. -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: Sunday, May 11, 2003 2:18 PM To: mpaulsen6@a... Subject: RE: [TSCM-L] Digest Number 1263 Ok, Matt, IF its your equipment on your end, (as they allege) and you do a hard loopback for them and they report timing issues, its got to be them right? If theyre sending improperly framed packets, and they see it looped back, its got to be their origination. Im talking intrusive, cable loopback, not softswitched. I definitely smell a timing problem from them, or a framing problem. Can you loop them up to you from your end? Errors? This would verify your CPE. I sense a mux problem between their OC48 and the T3 card. Do you have any other circuits on different T3's from the same OC48?? Are they working? If so, they can check the settings in the MUX to see theyre the same, that IS of course, assuming theyre using the same equipment on both paths. Do they (Verizon) look ok to themselves, looped up at their end, then loop up from your end to them, do they still look ok? Proof of path, no transport errors. Reverse procedure, loop yourself locally, and assure what youre transmitting is the same as the circuit spec. THen have them loop their end to you, this should identify the single leg thats falling over. Are they OK'ed for intrusive testing? If its down, feel free, but make them report innie-outies, so someone doesn't leave a cable in a jack. Did this circuit ever pass 24 hour burnin? Ive seen circuits run fine, and frame slip all over the place...error correction fixes much, but they wont hold up when the circuit gets loaded. Any other equipment errors on either ends? If they changed out cards, and the problem went away, why did they put the old cards back? They should of went to testlab or the mfgr for proofing. At 11:14 5/11/2003 -0700, you wrote: >Ok, sure... I have tw0 questions regarding DSx vs Tx signaling and how to >determine if non-CPE is faulty upstream from CPE. CPE is the same, but >network equipment from telco doesn't appear to be different, yet they (IE: >Verizon) state it is. I've had an OC48 card and a DS3 card go bad @ >Verizon's end, but they kept insisting that timing on CPE was incorrect >(Which it wasn't, as has been proven by their swapping out a DS3 and OC48 >card on their end, 'FIXING' the timing issues on my end.. snort.). I've >tried pretty much everything on my end with these 2 occurrances, including >swapping out telco equipment at demarc where I could get ahold of it, and >enabling performance monitoring on telco switch, but I always found that >this didn't isolate the fault until a few months of troubleshooting goes by >with the telco. Tried scoping the lines - t-berd, packet analyzer, no help >there. In fact, one T1 scoped as a 56k only line, even though we were >passing 1.5ishk data through it + had 3 voice channels lit. The Tx vs DSx >was the second line, where they swapped me from copper to fiber on their >end, but they didn't change network equipment at demarc. Sounds fishy to >me... I think I'm getting my leg pulled - their using hyprercards on the >demarc. Do these support Tx and DSx signalling concurrently? 7319 From: Matt Paulsen Date: Sun May 11, 2003 10:10pm Subject: FW: (unknown) Get help. Here's a start. http://www.psychiatrymatters.md/search/index.asp?sec=sres&scope=Entire+Site& x=14&y=8&QU=geriatric+AND+psychiatry&overture=geriatric%20psychiatry -----Original Message----- From: allan ginsberg [mailto:negrodawn2003@y...] Sent: Sunday, May 11, 2003 7:12 PM To: mpaulsen6@a... Subject: RE: [TSCM-L] (unknown) --- Matt Paulsen wrote: > >or wrap some foil around your head to keep the " > rays " from taking over > your mind. > Correction - Major League Baseball is watching you >VERY FUNNY MATT...BUT IF YOU HAD BEEN HARASSED, STALKED, SABOTAGED AND THREATENED AS LONG AS I WAS, THEN YOU WOULD UNDERSTAND...GO AHEAD AND LAUGH BECAUSE I HAVE HEARD IT BEFORE AND GROWN USED TO BEING HATED, VILLIFIED, DEMONIZED, SCAPEGOATED AND ALIENATED BY ALL THE NAIVE UNINFORMED PEOPLE WHO PAY TAXES TO A BRUTAL REGIME....DON'T BELIEVE ME?...GO TO A WEBSITE OUT OF AUSTIN, TEXAS, CALLED "STOPCOVERTWAR" BASED ON THE HUNDREDS OF TRUE LIFE VICTIMS OF POLICE COINTELPRO HARASSMENT....THE VICTIMS CRIME?...THEY EXERCIZED FREE SPEACH AND ASSEMBLY. THEY EXERCIZED THEIR CONSTITUTIONAL RIGHTS. DON'T BELIEVE ME. GO TO "GERAL SOSBEE" WEBSITE ABOUT AN FBI WHISTLEBLOWER UNDER CONSTANT HARASSMENT TO THIS DAY. STILL DON'T BELIEVE ME? SEARCH ON GOOGLE FOR "POLICE HARASSMENT"....STILL DON'T BELIEVE ME? SEARCH "COINTELPRO"....STILL DON'T BELIEVE ME? SEARCH "JUDI BARI WEBSITE"....STILL DON'T BELIEVE ME?...I GIVE UP. __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com 7320 From: Matt Paulsen Date: Sun May 11, 2003 10:04pm Subject: speaking of t-berds.. Anyone have a good recommendation for a scope to troubleshoot/manage IDSN, FR/T1, DS & OC lines? Looking to budget no more than say $3-5K. 7321 From: James M. Atkinson Date: Mon May 12, 2003 9:42am Subject: Exposed spy flees Ireland Reports: Exposed spy flees Ireland LONDON, England (CNN) --Britain's top spy inside the Irish Republican Army has fled Ireland after being exposed, according to several newspapers in the United Kingdom and Ireland. The reports say the IRA's long-time director of internal security, Alfredo Scappaticci, was for 25 years a British spy codenamed "Stakeknife" who is suspected of being allowed by an army intelligence unit to get away with up to 40 murders. The revelations have provoked debate about how British security services infiltrated the IRA -- and the role of paid informers. CNN's Senior International Correspondent Nic Robertson said: "For the British government it means not just the loss of a top agent but possibly the beginning of trouble accounting for what one well-placed security source told me could be at least 25 murders Scappaticci was responsible for." Scappaticci was in charge of the IRA's so-called "Nutting Squad" -- which had the job of tracing informers -- and the head of its northern command security for almost two decades, several newspapers reported Sunday and Monday. According to reports, he was paid about £80,000 ($128,000) a year to be an informer. The identity of a suspected mole within the guerilla group -- which has waged a 30-year campaign against British rule in Northern Ireland -- has been the subject of speculation for years. A Northern Ireland Office spokeswoman refused to discuss the disclosures. "We wouldn't comment on anything of an intelligence or security nature," she said. Scappaticci has lived at addresses both in Belfast and Dublin. Some newspapers say he is now in a safe house in England. Accused by several IRA members and security sources of killing to save his own cover, Scappaticci, from Belfast, is reported to have risen quickly during his decades as an informer to the upper echelons of the organization. "His name was tremendously well known and it did inspire fear, so leadership's enforcer was how he was known," former IRA commander Sean O'Callaghan told CNN. A former British undercover agent in the IRA -- who prefers to be called Kevin Fulton to protect his identity -- said Stakeknife had access to vast troves of information. "He was one of the leading members of the IRA internal security unit," said Fulton. "He would have had access to people all over Ireland. He would have interrogated anybody north or south that the IRA thought were handing over secrets." Fulton said this position gave Stakeknife power over life and death. "He would have been able to save many lives -- there is no doubt about that but he would also have been able to take lives or redirect pressure from one agent or make someone else look like an agent and basically get them executed." Security sources said it was these killings that made Scappaticci a target for an inquiry by Sir John Stephens, the British police officer investigating allegations of murder and malpractice by the British Army's force research unit that ran agents. Fulton denies he tipped the newspapers off to Stakeknife's identity. CNN's Robertson added: "Whatever the truth, the implications of this latest revelation go beyond Fulton's and Scappaticci's immediate safety." * A "small incendiary device" packed in an envelope sent to the Ulster Unionist Party headquarters in Belfast exploded but injured no one Monday, police said. The padded envelope, addressed to Ulster Unionist Party leader David Trimble, was being opened by Trimble's secretary when the device went off, police said. Police say the blast was weak and the bomb did not completely explode. An Army bomb disposal unit was called to the scene to remove the device. No one has claimed responsibility for sending the envelope to the Trimble's office. -- CNN Senior International Correspondent Nic Robertson contributed to this report Find this article at: http://www.cnn.com/2003/WORLD/europe/05/12/nireland.spy/index.html -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7322 From: Matt Paulsen Date: Mon May 12, 2003 8:05pm Subject: RE: FW: (unknown) Hi, If I were a police officer, I'd say thanks for calling me one, that's quite a compliment. As it is nope, I'm not, but I do work with hospitals. As someone that does do TSCM related to LAN/WAN architecture and infosec/commsec, psychology, not pysciatry (sic) is more apt to be employed as part of an overall security plan for HIPAA compliance, with respects to social engineering during live intrusion testing, but that compliance requirement won't be instituted for nearly 2 years, so I'm not really focusing directly on it right now, moreso, just getting medical organizations used to the ideas of security, even though it is probably one of the larger areas of concern for organizations facing security threats. Speaking of TSCM'ing a LAN... a question for the group - I'm currently running VTP/DOT1Q encap on some switches and using some 4908g-l3 switches as 'core routers' (yes, I know it's not core for those Cisco purists in the group) running HSRP. IE: HRSP core, to DOT1Q / VTP network - full mesh, and am bringing up some ip based security servers to replace / augment the existing CCTV installion under a VLAN, say ID # 100, where the rest of the local VLAN will be the same. Now, since security should have it's own network, I'm contemplating subnetting and VLAN'ing it out to its own VLAN through the devices. Here's the question.. How hard would it be for someone to intrude upon the IP stream and subsequently get an IP on a non-assigned port for that VLAN. I've never heard of such an occurrance. So it seems that it would be more likely that a tap in the fiber or copper streams that are either trunking or non-trunking would be a problem... In that case, I've got nearly 2/3 of a mile to look at securing. For example: 4908 - 3508 - 3548, vlan id 100 carried down on 192.168.1/24 network, where the ip video server will sit, on port 4 of the 3548, which has gbics up to the 3508, which goes to the 4908. The viewing station will be connected differently, in a different building, for example: 4908 - 3508 - 2950 - vlan id 100 carried down on 192.168.1/24 network, on port 4 for example, on the 2950, with gbics all through to the top as before. SO.... IF VLAN 100 is only associated on the GBICs of the 4908's, 3508's, 2950, and 3548 on both ends of the physical plant, as well as the two 10/100 copper drops from the 2950 and the 3548 respectively, how could someone intrude upon the IP subnet or the IP stream - I assume that a sniffer can assemble/disassemble, but can a snooping device actually plant itself on the VLAN 100 if there is no associated port activated for it, and view live streams of data? Thanks, Matt PS - For the Crazy Psych Dude getting a fixation on me... Do yourself and us a favor, get checked in. Also, will you PLEASE FIND THE CAPS LOCK KEY on your keyboard, should be right next to that other one called TAB with the arrows on it and use it, works wonders when typing. Yes, I know the shift keys can be formidable objects during those early stages of learning how to type properly, but the benefits will outweigh the hardships in the long run and who knows, maybe at some point your dementia will be under control and you'll get a lovely job as a typist in a law firm. Unless you have a mac... try next to the option or apple looking keys and get a job as an artist, or better yet a sci-fi / mystery writer... The eight ball says... IT COULD BE RIGHT. -----Original Message----- From: allan ginsberg [mailto:negrodawn2003@y...] Sent: Monday, May 12, 2003 5:36 PM To: mpaulsen6@a... Subject: Re: FW: [TSCM-L] (unknown) --- Matt Paulsen wrote: > Get help. Here's a start. REPLY: MATT MUST BE A COP...SINCE WHEN DO TSCM ERS PRACTICE PYSCHIATRY?...STICK TO WHAT YOU KNOW BEST, STEALING PEOPLE'S PRIVACY THROUGH ELECTRONICS. __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com From: Date: Sun May 9, 2004 2:56am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 8597 From: James M. Atkinson Date: Sun May 9, 2004 3:55pm Subject: Re: Directional Antennae I have had god results with a 16-18 dB panel antenna for the application you mention -jma At 04:34 PM 5/9/2004, Dragos Ruiu wrote: >On May 7, 2004 12:22 pm, James M. Atkinson wrote: > > My preferred method is to use a wide bandwidth spectrum analyzer (or > > receiver), directional antennas, and some good pre-amps... it makes short > > work of finding even the most classified of covert eavesdropping systems. > >Which brings up a good question: > >Is there a concensus on the best directional antennae to use >to get a 1 spot directional reading? I think this requires the >most directional signal amplification (i.e. amplify signal from >one direction though not the others). > >Specifics: >- This is for indoor applications at 2.4 Ghz. Size is a factor. > I'm lookign for specific obtainable real products, and > hypotherical ideal answer. > >Hypothesis: >- Tin can style Yagi. > >Corollary: >- Assumed directional is the only solution rather than > multiple readings, omnidirectionals, and some math > because interior is populated with multiple sources > and you are trying to locate a single one in a noisy > field. > >-- >pgpkey http://dragos.com/ kyxpgp ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8598 From: James M. Atkinson Date: Sun May 9, 2004 4:48pm Subject: Re: Re: Directional Antennae No problem, Use a parabolic dish with a gain of at least 30 dB To DF on something like this you want an angle of less than 5 degree's, under 3 degree's is best. -jma At 05:11 PM 5/9/2004, Dragos Ruiu wrote: >On May 9, 2004 01:55 pm, James M. Atkinson wrote: > > I have had god results with a 16-18 dB panel antenna for the application > > you mention > >We've been using panel antennae at our canadian conference (which >year after year proves that it's the definitive torture test for ANY network >application wireless or not :-) with good success as a general application >this year. Combined witha 200mw transceiver, they were able to go through two >concrete walls reliably. They however have a 45 degree coverage >angle. I was thinking of even tighter. The tighter the better, imagine >trying to identify which laptops are transmitting in a room full of laptops >with transceivers. > >--dr > >-- >pgpkey http://dragos.com/ kyxpgp ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8599 From: James M. Atkinson Date: Mon May 10, 2004 9:02pm Subject: Square Footage at AID Does anybody have an idea as to how square feet AID had when they were at their largest? And go you have any idea how the functional areas were divided up (ie: how many sqft for what)? Please send to me privately -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8600 From: Dragos Ruiu Date: Sun May 9, 2004 3:34pm Subject: Directional Antennae On May 7, 2004 12:22 pm, James M. Atkinson wrote: > My preferred method is to use a wide bandwidth spectrum analyzer (or > receiver), directional antennas, and some good pre-amps... it makes short > work of finding even the most classified of covert eavesdropping systems. Which brings up a good question: Is there a concensus on the best directional antennae to use to get a 1 spot directional reading? I think this requires the most directional signal amplification (i.e. amplify signal from one direction though not the others). Specifics: - This is for indoor applications at 2.4 Ghz. Size is a factor. I'm lookign for specific obtainable real products, and hypotherical ideal answer. Hypothesis: - Tin can style Yagi. Corollary: - Assumed directional is the only solution rather than multiple readings, omnidirectionals, and some math because interior is populated with multiple sources and you are trying to locate a single one in a noisy field. -- pgpkey http://dragos.com/ kyxpgp 8601 From: Dragos Ruiu Date: Sun May 9, 2004 3:41pm Subject: Re: Directional Antennae On May 9, 2004 01:34 pm, Dragos Ruiu wrote: > On May 7, 2004 12:22 pm, James M. Atkinson wrote: > > My preferred method is to use a wide bandwidth spectrum analyzer (or > > receiver), directional antennas, and some good pre-amps... it makes short > > work of finding even the most classified of covert eavesdropping systems. > > Which brings up a good question: > > Is there a concensus on the best directional antennae to use > to get a 1 spot directional reading? I think this requires the > most directional signal amplification (i.e. amplify signal from > one direction though not the others). > > Specifics: > - This is for indoor applications at 2.4 Ghz. Size is a factor. > I'm lookign for specific obtainable real products, and > hypotherical ideal answer. > > Hypothesis: > - Tin can style Yagi. > > Corollary: > - Assumed directional is the only solution rather than > multiple readings, omnidirectionals, and some math > because interior is populated with multiple sources > and you are trying to locate a single one in a noisy > field. P.S. only care about reception at this point. -- Top security experts. Cutting edge tools, techniques and information. Vancouver, CanadaApril 21-23 2004 http://cansecwest.com pgpkey http://dragos.com/ kyxpgp 8602 From: Dragos Ruiu Date: Sun May 9, 2004 4:11pm Subject: Re: Re: Directional Antennae On May 9, 2004 01:55 pm, James M. Atkinson wrote: > I have had god results with a 16-18 dB panel antenna for the application > you mention We've been using panel antennae at our canadian conference (which year after year proves that it's the definitive torture test for ANY network application wireless or not :-) with good success as a general application this year. Combined witha 200mw transceiver, they were able to go through two concrete walls reliably. They however have a 45 degree coverage angle. I was thinking of even tighter. The tighter the better, imagine trying to identify which laptops are transmitting in a room full of laptops with transceivers. --dr -- pgpkey http://dragos.com/ kyxpgp 8603 From: contranl Date: Mon May 10, 2004 1:49pm Subject: Gps Tracker Detector "new trick" question . For my "Gps-Tracker-Detector" project i am constantly looking for additional "tricks" to shorten the time to find a Gps-tracker. My latest idea might be usefull..and i like to hear if this idea works or is being used somewehere This is the idea....let's call it : "resonance modulated feedback" it could be that there is an other name for it. The theory is like this: You have a Fm-transmitter in a plastic box.. the transmitter does ! NOT ! have a microphone it only transmit's a "silent carrier" or some data On a spectrumanalyzer or receiver you can see or hear the carrier. Now i would apply some vibrations to the plastic box, for example an audio-tone at 1000 hz To apply this sound to the box i would use a transducer or speaker or some kind of vibrator The question is: Would i be able to find back this 1000 hz audio on the carrier that i receive from the transmitter.......? This might well be the case since the vibrations might cause some modulation at the the transmitter If the transmitter can be put in to vibration...there might be some parts inside this transmitter that cause some kind of Frequency- Modulation (FM) or Amplitude Modulation (AM) This effect is sometimes called "microphone effect" it sometimes occurs when you have for example a receiver/scanner opened up and you touch or tick a metal screened part you will then hear this back trough the speaker Parts that could cause such a modulation are for example: Metal screens Coils Tuned circuits Crystals Wires If this effect occurs depends on many things like: If there are any parts inside the transmitter that could cause such a modulation The material of wich the housing of the transmitter is made of The distance between the transmitter and the "vibrator" The damping-factor of anything in between the the transmitter and the "vibrator" The strength (level) of the apllied vibration The frequency of the vibration To get the best results i could have a "sweeping" tone that would sweep quickly between for example 50 and 2000 hz... At a certain point "resonance" might occur...this could be at a certain frequency that would cause maximum "microphone effect" of one of the parts So my theory is that if the right vibrations are apllied to a transmitter it might be possible to find back that vibration as frequency-variations (FM) or as strength-variations (AM) at the receiver I am asking this because this technique might be usefull for my "Gps- Tracker-Detector" It might go like this: I have found something transmitting in a car... I can't reach it without having to take the car apart... So i apply the "vibrator" to the part where i suspect the transmitter to be in or behind I switch on the sweeping tone wich is generated by my blackbox This blackbox is receiving the rf-signal (carrier) and at the same time listening for that same specific tone (it knows wich tone to look for since it generates the vibrations itself ...it knows the frequency ) If it finds back the tone (as Am or Fm) it would sound an alarm...telling me that there is a transmitter right there where i put the vibrator...i could then lower the output from the "vibrator" in order to "pinpoint" the transmitter The same could be applied to see if any radiation is coming from receivers wich radiate also, like for example a carrier coming from an electronic-clock or radio Now this is all theory and i have have no idea if it works..as said it depends on many factors (as mentioned above) Maybe the above looks familiar with some other techniques like: 1) Audio-feedback as used in some bugdetectors where the bugdetector emits a tone into the suspected room...and then looks at the received signals to see if the same tone comes back it's similair but not the same since there is no microphone on "my" transmitter 2) Or the technique used in the famous "Great Seal" transmitter where a metal object is "hit" by strong microwaves and reflects back some microwaves containing sound-modulation It's similair but not the same since "my" transmitter contains no big surfaces to catch any sounds but only small "sensitive" objects ...but on the other hand it does contain "active" electronics wich amplify and modulate a already available carrier Instead of "acoustic" or "mechanical" vibrations one could also apply different vibrations like: a) Ultrasonic sound (40 khz carrier pulsed at 1000 hz) b) Electromagnetic field (a coil instead of a speaker ,100 khz carrier pulsed at 1000 hz) c) RF energy pulsed at 1000 hz (needs a licence like NLJ ...and might interfere with my receiver so not preferred) d) A combination of above or something i am forgetting The advantage for my "Gps-Tracker-Detector" would be 2 things: 1) Since my detector will show many carriers on it's screen..i could easely identify wich source is responseable for them...i probably could identify more carriers at once (harmonics) coming from the same source since they all would have the same 1000 hz modulation (i could also identify them by disabling a suspected device..or by observing the fieldstrengths while moving the antenna) 2) I could use it as an extra pinpointing device to make shure that the source is hidden in or behind a certain panel in the car...before i start to dismantle the car. The whole idea will run automatically under microprocessor- control...all you would have to do is press a "vibrate" button and look at the screen ...affected carriers will be highlighted and an alarm-tone will sound I like to know what the radio-technical members of this group know or think about this idea. Thanks in advance Tetrascanner www.tetrascanner.com 8604 From: Steve Uhrig Date: Mon May 10, 2004 11:43pm Subject: Re: Gps Tracker Detector "new trick" question Once upon a midnight dreary, contranl pondered, weak and weary: > This is the idea....let's call it : "resonance modulated feedback" > it could be that there is an other name for it. > Now i would apply some vibrations to the plastic box, > for example an audio-tone at 1000 hz > To apply this sound to the box i would use a transducer or speaker or > some kind of vibrator > The question is: > Would i be able to find back this 1000 hz audio on the carrier that i > receive from the transmitter.......? A properly designed and constructed circuit will not be microphonic. There are entire engineering specialties devoted to the mechanics of packaging, heat transfer, environmental stability, etc. For something to be microphonic, it generally needs some mass and be able to move, and be in a point in the circuit where movement changes something (capacitance) to cause a frequency or phase modulation. Most modern electronics is mighty small and not much to actually *be* microphonic. Audio wavelengths are relatively long, and resonance will be high for most small devices. The military bolts devices being tested to a 'shake table' and vibrates it on several different axes on a sweep up of frequencies. Instrumentation tells the resonant frequency. Adding mass can balance the device or move resonant frequencies falling in dangerous areas out of dangerous areas. Your hypothesis certainly would be simple enough to test. Use an audio function generator which can be built with a few ICs, into one side of a stereo amplifier. You can buy interesting transducers which basically are a speaker without a cone, driving a screw. You thread the transducer into sheetrock between studs, and the theory is to drive the entire wall. I've made ultrasonic cleaners out of them. They have good frequency response. Find some way to clamp the device under test to the transducer, then vary the frequency and power of the oscillator and amplifier throughout its range. Use a passive separate microphone into a scope or something looking for resonance. Use the device you're developing to see if there's any change in the I.F. or microprocessor radiation or whatever you're sniffing. Document everything so someone else can repeat it. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8605 From: David Rom Date: Tue May 11, 2004 1:25am Subject: PBX - pdf manuals Hi all I need the manuals of 3 PBX's: Alkatel 4400. Meridian (Nortel) Coral (Tadiran) Do any of you have the manuals on pdf files?????? Regards David Rom (david@g...) CTO GD Intelligence Security LTD. ( www.gdis.co.il) [Non-text portions of this message have been removed] 8606 From: James M. Atkinson Date: Tue May 11, 2004 8:54am Subject: FBI Investigating Cyber-extortion http://thewhir.com/marketwatch/fbi051004.cfm FBI Investigating Cyber-extortion May 10, 2004 -- (WEB HOST INDUSTRY REVIEW) -- The FBI is investigating the claims of a Kentucky business owner who appears to have been the target of a cyber-extortion, according to the Associated Press. Jay Broder, the owner of CSI Mid-South, also known as Card Solutions International, claimed his company's Web site (authorizeit.com) went down for about a week after he refused to pay $10,000 to the sender of the email extortion threat. The email threatened to cripple the site if the money was not sent. Broder said in the report that he thought the threats were idle and believed the emails to be spam. He said he is not aware of any reason why he would be targeted. The alleged attack, unleashed a few hours after Broder received a second threatening email, was a distributed denial of service attack (DDoS), an assault that overloads a system with a flood of incoming messages forcing it to shut down. According to the Courier-Journal, CSI Mid-South's Web site is hosted with Boston-based Web hosting provider Hosting.com (hosting.com), who did not return requests for comment. Broder said the attacks stopped when he switched Web hosting providers and got a new IP address. Card Solutions International processes credit card payments online. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8607 From: James M. Atkinson Date: Tue May 11, 2004 9:10am Subject: Israeli link possible in US torture techniques http://www.dailystar.com.lb/article.asp?edition_id=10&categ_id=2&article_id=3446 Israeli link possible in US torture techniques In exchange for interrogation training, did Washington award security contracts? By Ali Abunimah Special to The Daily Star Tuesday, May 11, 2004 CHICAGO, Illinois: The head of the American defense contracting firm implicated in the torture of Iraqis at Abu Ghraib prison has close ties to Israel and visited an Israeli "anti-terror" training camp in the occupied West Bank earlier this year. Jack London, chairman, president and CEO of CACI International Incorporated, traveled to Israel in January this year as part of a high-level delegation of US Congressmen, defense contractors and pro-Israel lobbyists, sponsored and paid for in part by the Jerusalem Fund of Aish HaTorah, a pro-Israel lobbying and fundraising group, and Greenberg Traurig, LLP, a prominent Washington law and lobby firm. The purpose of the visit, according to a CACI press release, was "to promote opportunities for strategic partnerships and joint ventures between US and Israeli defense and homeland security companies." As one of the highlights of the visit, London was presented with the Albert Einstein Technology Award by Israeli Defense Minister Shaul Mofaz at a gala dinner at Jerusalem city hall, for "achievements in the field of defense and national security." Delegates also spent several hours in the occupied Syrian Golan Heights with Housing and Construction Minister Effie Eitam, a former Israeli general, who is notorious for his view that Israel should "transfer" - that is, expel - all the Palestinians. According to the official itinerary for the Jan. 11-17 Defense Aerospace Homeland Security Mission, obtained from the Jerusalem Fund of Aish HaTorah, London's trip included a visit to Beit Horon, "the central training camp for the anti-terrorist forces of the Israeli police and the border police," in the occupied West Bank. The visitors were also "briefed by top experts," and were able to "witness exercises related to anti-terror warfare." Two CACI employees, Steven Stephanowicz and John Israel, were named in the leaked report by US Major General Antonio M. Taguba on the abuses at Abu Ghraib prison. Taguba wrote that Stephanowicz, a "contract US civilian interrogator," "allowed and/or instructed MPs (military police), who were not trained in interrogation techniques, to facilitate interrogations by 'setting conditions' which were neither authorized or in accordance with applicable regulations/policy. He clearly knew his instructions equated to physical abuse." John Israel, an interpreter, did not have the appropriate security clearance, according to Taguba. Although Taguba recommended that Stephanowicz be terminated and his security clearance revoked, a May 5 statement from CACI confirmed, "at present, all CACI employees continue to work on site providing the contracted for services to our clients in that location." It added: "We have not received any information to stop any of our work, to terminate or suspend any of our employees." Although no evidence has emerged directly linking CACI's involvement in the Abu Ghraib atrocities to Israel, it has long been known that the US military has been interested in "learning" from Israel's experience attempting to suppress the Palestinian uprising. In March 2003, for example, the AP reported that the "the (US) military has been listening closely to Israeli experts and picking up tips from years of Israeli Army operations in Palestinian areas and Lebanese towns." This cooperation has included briefings of US personnel by Israeli officers, and, according to AP, "In January and February (2003), Israeli and American troops trained together in southern Israel's Negev Desert ... Israel has also hosted senior law enforcement officials from the United States for a seminar on counterterrorism." Meanwhile, more evidence has emerged undermining the US thesis that the abuses at Abu Ghraib was the work of a "few bad apples." The Guardian reported that the "sexual humiliation of Iraqi prisoners at Abu Ghraib prison was not an invention of maverick guards, but part of a system of ill-treatment and degradation used by special forces soldiers that is now being disseminated among ordinary troops and contractors." This system, known to insiders as "R2I," short for resistance to interrogation, also includes such methods as "hooding, sleep deprivation, time disorientation and depriving prisoners not only of dignity, but of fundamental human needs, such as warmth, water and food." These are all techniques long employed by Israel. The visit of the US delegation that included the CACI head exposes a rarefied web of influence sharing in which US government officials and congressmen, defense contractors and lobbyists parcel out huge contracts, and siphon significant portions off to Israel. As Batya Feldman of Israel's Globes financial news service put it, the visit provided Israeli companies with "an excellent opportunity to encounter big bucks in homeland security." To help Israeli companies pry some of these "big bucks" loose, the visit included seminars for Israeli companies given by US pro-Israel lobbyists called "How to Approach the Homeland Security Department," and "How to Sell to the US Defense Department." Israeli participants would have had a chance to test the helpful tips, since present on the trip were Assistant Secretary for Homeland SecurityRobert Liscouski and many leading US legislators, including top members of the US House and Senate Armed Services Committees, which jointly oversee tens of billions of dollars in military spending. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8608 From: James M. Atkinson Date: Tue May 11, 2004 9:15am Subject: An American tragedy http://www.atimes.com/atimes/Front_Page/FE11Aa05.html An American tragedy "Let all the poisons that lurk in the mud, hatch out." - Robert Graves, I, Claudius, 1934 AUSTIN, Texas - It is radioactive. It is a PR Pearl Harbor. But most of all, the Abu Ghraib scandal is an American tragedy. The Bush administration's key talking point - repeated ad infinitum for days by everybody from Condoleezza Rice to a gallery of generals - is that the "abuse" was an aberration by a group of rogue soldiers. It should fall into the Donald Rumsfeld-coined theory of "known knowns, unknown knowns". General Richard Myers insists life as a scary porno movie in Abu Ghraib "was not a systemic pattern": it was the fault of a few individuals. Not true. Trespassing on the rigid International Committee of the Red Cross code of silence, Pierre Krahenbuhl, its director of operations, confirmed in Geneva the veracity of a leaked Red Cross report characterizing the prison abuse as part of "a model, and a general system". Red Cross spokeswoman Antonella Notari emphasized to Asia Times Online that the report details "serious violations" of the Geneva Convention on the treatment of prisoners of war. In the context of humanitarian international law, "serious violations" mean nothing other than war crimes. Officially, shame is spread all over the United States, a whole nation humiliated. It may be a little more complicated than that. Philip Zimbardo, a psychologist at Stanford University, confesses how he can still be amazed at US innocence and naivete, a whole nation still not able to deal with human nature's darker side, especially as revealed not by insidious foreigners but by fellow Americans. Asia Times Online was faced with the new American tragedy deep in the heart of Texas. Even the road signs seemed not to believe it: Shall it be Highway 87 south to Eden or Highway 277 south to Eldorado? In Brady, self-described "in the heart of Texas", a pickup heaven populated with "Don't Mess with Texas" T-shirts and flag-decorated burrito stands remembering September 11, 2001, radio preachers call, in anguish: "Deliver us from evil!" while the rest of the dial is occupied by satanic rock, from Alice Cooper to George Thorogood. From Midland to Austin, from families at the local McDonald's to Harley fanatics kissing the joy of the open road, everybody we talk to converges to a few key points. Rumsfeld is "a champion", "a volcano", "the linchpin in the war on terra". He simply "should not resign". The whole thing is part of a "partisan, crass, politically motivated campaign against Republicans". Some say they "can't wait for the anti-Democratic backlash". There's a justification that "more people were killed in Waco than in this [Abu Ghraib] prison, and nobody made a fuss". Vietnam veterans say that "some things" done by the interrogators were wrong, but the rest was "understandable". There's a solid esprit de corps: for the brave folks in the heart of Texas, every official in the administration of President George W Bush who volunteers any criticism is considered a Judas itching to get a book contract. Every intervention by a top Bush administration official is lauded as "statesmanlike". The media are basically "out of control, full of communists". None of America's allies - European, Asian, whatever - has the right to criticize US policies. If there was any mistake committed in Iraq, it pales compared to the fact that Saddam Hussein "used weapons of mass destruction against his own people" and kept a close, intimate relationship with Osama bin Laden. There's an almost religious belief on an equation that could be resumed this way: September 11 equals radical Islam equals Patriot Act equals Saddam equals war equals orange alert forever. This may be as faithful a survey as any of what middle America - not those corrupt Gomorras New York, San Francisco, Los Angeles, Boston - think about the whole "war on terra". Compare it to what popular talk-show host Rush Limbaugh said on the air late last week: "It could well be that the whole purpose here, which has been said, was to humiliate these prisoners. And there's no better way of doing it than what was done. These are Arab males - what better way to humiliate them than to have a woman have authority over them? What's the purpose here? What's the objective of this? The objective is to soften them up for interrogation later, later on. As I said, there was no horror, there was no terror, there was no death, there was no injuries, nothing." The pattern Democrats and Bush critics say Abu Ghraib is something like the perfect storm: repulsive methods employed in a secret universe run amok by a bunch of amateurs, detainees treated not as human beings, everything fully orchestrated and choreographed, and the whole matter treated with supreme indifference in Washington. The endless debate by the chattering classes, live and over the media, and full-time network noise may leave the impression that the porcelain may not be broken. But few admit in the talk shows that the whole chain of command is in question - not to mention the whole strategy of neo-con Washington. It's impossible to believe the official White House-Pentagon story, according to which Rumsfeld did not brief Bush on Abu Ghraib while at the same time General Myers, for two long weeks, was frantically stonewalling the release of the S&M material with CBS's Dan Rather. As late as early last week, Myers, chairman of the Joint Chiefs of Staff, had not read the report he had been trying to censor for more than two weeks. In case the official version was true, this would mean that the president of the United States is kept fully oblivious of crucial matters of his own "war on terra" by the neo-cons' non-stop manipulations. In terms of the big picture, or big tragedy, Defense Secretary Rumsfeld - the architect of both Bush wars - resigning or not, along with his warrior minion Paul Wolfowitz, is a peripheral issue. Rumsfeld's obsession with secrecy - such as his admission in front of congressmen that "the real issue is that a secret report was given to the press" - would probably be transferred to the next Pentagon head. But the situation is unraveling very fast. Even Major-General Charles Swannack, the commander of the 82nd Airborne Division, has admitted that the United States is strategically losing the war in Iraq. The Washington Post reports that "a profound anger is building within the army at Rumsfeld and those around him". Rumsfeld and Deputy Defense Secretary Wolfowitz, from the summit of their ideological infallibility, always worked for "their" Pentagon to run Iraq. The idea of a huge private army of unaccountable commandos engaged in all sorts of operations in Iraq comes from Rumsfeld (there are at least 20,000, many more than British soldiers in the coalition). The patronage of convicted fraud, zero-credibility, Ahmad "our Saddam" Chalabi comes from Rumsfeld. The heavy-handed military approach and the absolute disregard of civilian casualties are trademark Rumsfeld. The Pentagon controlling the US$18 billion in Iraqi reconstruction funds is a Rumsfeld-enforced policy. Hubris was inevitable. Without any counter-power to refrain the Rumsfeld-Wolfowitz machine, once again the logic of war - this creepy, out-of-control monster - has engulfed its practitioners. Finished by the end of February, the report by Major-General Antonio Taguba detailing abuses in Abu Ghraib had not even been opened by Myers by early May. Repeated Red Cross warnings were dismissed. Bush was oblivious of everything. And Congress was kept in the dark. Help won't be forthcoming. Because of initial overwhelming opposition to the war, the mess in Fallujah and Najaf, and now the Abu Ghraib scandal, European public opinion is now even more against Bush's policies than a year ago. Asia Times Online has confirmed with European diplomats: the North Atlantic Treaty Organization (NATO) won't go to Iraq after the June 30 "handover". The Europeans will wait until the result of this November's US presidential election. No wonder some are dubbing the whole US operation in Iraq "Dead Men Walking". The techniques Specialist Sabrina D Harman, a military police officer already charged with prisoner abuse at Abu Ghraib and now the world's most infamous dominatrix, was in essence under command of US Army military intelligence officers, Central Intelligence Agency (CIA) operatives, and private civilian contractors specializing in conducting Ariel Sharon-sanctioned, Israeli-style interrogations. An average soldier such as Harman is not culturally equipped to assess how degrading nakedness and sexual humiliation may be to a follower of Islam. Rosemary Gartner of the American Sociological Association offers a clue of why that happened: "US rhetoric very effectively dehumanized Saddam Hussein, his regime and what remained of his supporters. This was a powerful subliminal message for all soldiers." Abu Ghraib is the son of Guantanamo in terms of prison abuse. In April 2003 the Pentagon approved the use of hardcore interrogation techniques in Guantanamo. General Geoffrey Miller, the previous head of Guantanamo, is now the head of Abu Ghraib. In sublimely convoluted military jargon, he had recommended last August and September that US military police in Abu Ghraib should become "actively engaged in setting the conditions for successful exploitation of internees". Two months later some of the guards began to humiliate prisoners systematically. Army intelligence officers who apparently oversaw interrogations at Abu Ghraib are now saying that commanders were insatiable for any kind of intelligence. Even Lieutenant-General Ricardo Sanchez, the top ground commander in Iraq, always wanted more, no matter how. The system of inducing human degradation generally used by Special Forces in the United States and the United Kingdom has become a routine practice among rank-and-file soldiers and contractors. The British call these techniques R2I - resistance to interrogation. When unsophisticated US troops still thinking that Iraqis were directly connected to September 11 apply it, the result is what happened in Abu Ghraib. Another crucial example is what happened to Jamal al-Harith, 37, a British citizen from Manchester released from Camp X-Ray in Guantanamo. In an exclusive interview to London's Daily Mirror on March 12, he said he was beaten with fists, feet and batons after refusing a mystery injection. He said detainees were shackled for up to 15 hours straight in hand and leg cuffs with metal links cutting into their skin. He described their "cells" as wire cages with concrete floors with no privacy or protection from rats, snakes and scorpions. The prisoners were regularly beaten by a certain Extreme Reaction Force, always dressed in full riot gear. He revealed how (US) prostitutes were brought to degrade the most religiously devout Muslims, forced to watch as they touched their own naked bodies or smeared menstrual blood across their faces. There was psychological torture aplenty to force prisoners to confess to something they may never have done. Techniques adopted from Israeli Prime Minister Ariel Sharon's finest in Palestine include barring access to the Red Cross; not charging the prisoners with any crimes, but keeping them in prison anyway; arresting hundreds of Iraqi women, not allowing them to see their families, always without charges and under appalling sanitary conditions; and keeping prisoners hooded, as in the Abu Ghraib photos, beaten, threatened and sometimes sexually abused. The cover-up Transforming Abu Ghraib into a Guantanamo-style intelligence factory was the job of General Miller until these inconvenient S&M photos intervened. The entire system - Guantanamo in Cuba, Bagram and Kandahar prisons in Afghanistan - is part of what the New York Times politely referred to as "the military archipelago" and is in fact a gulag archipelago. As far as Abu Ghraib is concerned, the Pentagon strategy was to let the military investigations run their long, secret course, and meanwhile let the March 9 Taguba report sleep in the deep recesses of military bureaucracy. As late as his performance last Friday, Rumsfeld had not read the Taguba report, which mentions, among other things, "pouring cold water on naked detainees; beating detainees with a broom handle and a chair; threatening male detainees with rape ... sodomizing a detainee with a chemical light and perhaps a broomstick". There's ample speculation that an exasperated General Taguba himself may have leaked his report to Seymour Hersh of the New Yorker - the same Hersh who revealed to the world the My Lai massacre in November 1969. Rumsfeld in the next few days - or hours - may become the new John Mitchell of Watergate infamy, the fall guy if the Abu Ghraib scandal can't be stopped in Baghdad. Anyway, the scandal has already taken Washington by storm. When Rumsfeld says "it will get worse", this may even function as an instigation for some US soldiers with high moral standards to slip to the media more S&M, this time coming from Guantanamo or Bagram. The gulag Almost everything one needs to know about America's military archipelago is contained in one of the most devastating books published in recent years, all the most striking when read on the road in Texas in the middle of the Abu Ghraib scandal: Chalmers Johnson's The Sorrows of Empire - Militarism, Secrecy and the End of the Republic (Metropolitan Books, New York. More on Johnson and his book later in this series). Johnson, the author of the best-selling Blowback and professor emeritus at the University of California, San Diego, says that "crime and racism are ubiquitous in the military. Although the military invariably tries to portray all reported criminal or radical incidents as unique events, perpetrated by an infinitesimally small number of 'bad apples' and with officers taking determined remedial action, a different reality is apparent at military bases around the globe." The thrust of Johnson's book is an analysis of the more than 725 military bases that configure the empire, "permanent naval bases, military airfields, army garrisons, espionage listening posts, and strategic enclaves on every continent of the globe". He makes the case that the United States is "a military empire, a consumerist Sparta, a warrior culture that flaunts the air-conditioned housing, movie theaters, supermarkets, golf courses, and swimming pools of its legionnaires". Johnson could be talking about Abu Ghraib, although he wrote it months if not years in advance, when he says that "the military's extreme fetish for secrecy and disinformation makes a farce of congressional oversight". He also proves how "America's real business is covert activities, not intelligence collecting and analysis". Why do people join the military? According to Johnson, "they often enlist because of a lack of good jobs in the civilian economy and thus take refuge in the military's long-established system of state socialism - steady paychecks, decent housing, medical and dental benefits, job training, and the promise of a college education". He could be talking about trailer-park trash dominatrix Harman. "The Americans with whom foreigners come into contact most frequently tend to be late adolescents or 20-year-old youths, almost totally ignorant of foreign cultures and languages but indoctrinated to think that they represent a nation that President George W Bush has called 'the greatest force for good in history'." This totally fits the profile of US soldiers this correspondent met in both Afghanistan and Iraq. It's extremely painful for average, law-abiding Americans to admit they live in a hyperpower that establishes, owns and operates its own gulag archipelago - instead of hiring contractors (Rumsfeld-style) in the form of good old friendly dictators Suharto, Augusto Pinochet, Manuel Noriega and company, always willing to take care of the dirty work. The American gulag - from Guantanamo to Bagram and to countless "secret" CIA prisons around the world - includes at least 10,000 prisoners in Iraq, 1,000 in Afghanistan and almost 700 in Guantanamo. Nobody has the exact numbers for the rest of the world. Guantanamo prisoners were defined by the Bush administration as "enemy combatants". Rumsfeld then amplified the designation to everybody else, totally snubbing the Geneva Conventions. Human Rights Watch calls it "a legal black hole". By a process we might call "arrogance of virtue", to defend the rule of law against terrorism the neo-cons created a system beyond any law. This was justified, in their minds, because the United States by definition - or by a law of nature - is the supreme arbiter of freedom. So the law then only exists against "evildoers". But the Abu Ghraib scandal is now sedimenting an even deeper polarization across the US. This correspondent's travels in the US for the past three weeks have led to the conclusion there is now a tremendous conflict in the soul of many Americans about two conceptions of democracy. Shall we have a democracy that respects and evaluates shades of gray, and recognizes paradox and debate? Or shall we have a democracy ruled by omniscience, a Messiah-donated instrument that requires no checks and balances because it's pure by definition ("you're either with us or without us") and so cannot but treat any accountability with contempt? Reality is a cruel pill to swallow. But Republicans will have to take it, no matter how. It's not reasonable - but nothing is reasonable in such an emotional case as the whole Iraq tragedy - and it may not even be fair, but anybody who knows the Arab and Islamic world is aware that no apologies, no prosecution, no court martial, no firing at the highest level will appease the anger composed by the perception that the United States somehow approves of the torture and sexual humiliation of Muslims. Abu Ghraib has elevated the presidential election to a much-larger-than-life proposition. It now concerns nothing less than whether the United States will recover any moral standing or moral authority to lecture the rest of the world on its Higher Manifest Destiny. Some of the brave folks in the heart of Texas and people in daily communion with Fox News may be able to manage the cognitive dissonance between them and the rest of the world, but it's doubtful billions in the rest of the world will. This dovetails with the devastating conclusions of Johnson's book. They're worth quoting at length: Roman imperial sorrows mounted up over hundreds of years. Ours are likely to arrive with the speed of FedEx. If present trends continue, four sorrows, it seems to me, are certain to be visited on the United States. Their cumulative impact guarantees that the United States will cease to bear any resemblance to the country once outlined in our constitution. First, there will be a state of perpetual war, leading to more terrorism against Americans wherever they may be and a growing reliance on weapons of mass destruction among smaller nations as they try to ward off the imperial juggernaut. Second, there will be a loss of democracy and constitutional rights as the presidency fully eclipses Congress and is itself transformed from an "executive branch" of government into something more like a Pentagonized presidency. Third, an already well-shredded principle of truthfulness will increasingly be replaced by a system of propaganda, disinformation and glorification of war, power and the military legions. Lastly, there will be bankruptcy, as we pour our economic resources into ever more grandiose military projects and short-change the education, health and safety of our fellow citizens. Some 260 million Arabs and 1.5 billion followers of Islam are still asking why the US kept using - and even spruced up - Saddam Hussein's main chamber of torture while it allowed the Iraqi Museum and Baghdad's National Library - with priceless records of Mesopotamia's 6,000-year-old history - to be looted and burned. The war in Iraq is a war of images and perception. The Abu Ghraib scandal may be the endgame of US defeat, or "may be the point at which the United States lost Iraq", as University of Michigan professor and Iraq expert Juan Cole puts it. There could not be a more incendiary affront to Iraq and the Islamic world. Compared with Osama's gold offerings, this is really Radical Islam's Holy Grail. Anyone who loves the best of America cannot but be appalled at how so much imperial arrogance and incompetence has produced such an American tragedy. (Copyright 2004 Asia Times Online Co, Ltd. All rights reserved. Please contact content@a... for information on our sales and syndication policies.) ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8609 From: James M. Atkinson Date: Tue May 11, 2004 9:01am Subject: Spy catcher focuses on economic espionage http://www.usatoday.com/money/2004-05-10-espionage_x.htm Posted 5/10/2004 2:18 AM Spy catcher focuses on economic espionage By Edward Iwata, USA TODAY MOUNTAIN VIEW, Calif. - The former Cold War warrior was fired up. His mandatory retirement at 57 had been waived, and FBI Director Robert Mueller had asked him to strengthen the counterintelligence operation, which had lost much luster in recent years. Decades ago, the biggest danger to U.S. national security came from the Soviet Union, said 60-year-old David Szady, the FBI's top spy catcher and assistant director of counterintelligence. Now, he warned, some of the worst threats involve economic espionage from dozens of enemy and ally nations spying quietly on U.S. companies and swiping technology and trade secrets. "We can put an umbrella around our national assets," said Szady, speaking last week in Silicon Valley at the FBI's first conference on economic spying. "We can prosecute criminally if we have to. We can neutralize it if we have to. It's crucial that we do this." What spies are after Economic spying by foreign nations - enemies and allies alike - is on the rise. Here's what they were after in 2003: Technology Countries targeting Pct. of reported suspicious incidents Information systems 63 22% Sensors and lasers 46 17% Electronics 32 9% Armaments, energetic materials 44 9% Aeronautics 35 10% Source: Office of the National Counterintelligence Executive The event at Moffett Federal Airfield drew 250 corporate security and law enforcement officials nationwide. After his talk, Szady sat down with USA TODAY for an hour-long interview. In the past, corporations feared investigations and bad publicity, or worried that trade secrets might emerge in court. But now more high-tech firms and other companies are starting to work with the FBI, the CIA, the military and other government bodies to choke espionage cases before they worsen. Economic spying by foreign industries and governments - such as China, South Korea, India, Pakistan, France, Israel, Japan and others - has increased in recent years and is costing U.S. firms billions of dollars, say Szady and other experts. Spies are targeting defense firms, research centers and universities in California, Texas, Arkansas, Colorado, Iowa, Kansas, Connecticut and other states where military and commercial trade secrets can be found. "The threat is huge," Szady says. Their favorite spy methods? Posing as foreign business people and scientists. Paying off U.S. citizens who are already inside corporations and research centers. Hacking into computers to steal data. Or setting up bogus companies that export technology. China has the largest spy program, Szady says, with 3,500 suspected front companies and many business and academic delegations visiting the USA. Take the federal sting operation disclosed last week by the Department of Homeland Security and the Justice Department. According to criminal complaints, a California man and a Chinese national were arrested Thursday at a Los Angeles airport and charged with conspiring to buy and export to China electronic parts used in radar and satellites. John Chu, a 44-year-old Pasadena resident, and Zhu Zhaoxin, 55, of Shenzhen, China, were charged in federal court in Boston after meeting with undercover agents who posed as arms dealers. Chu and Zhaoxin allegedly had negotiated for several months to purchase the parts, called traveling wave tubes. The lanky Szady joined the FBI in 1972, investigating murder and gambling cases in Alabama. Over the next three decades, Szady became an expert on Soviet espionage and other intelligence subjects in Washington, Silicon Valley, San Francisco and Portland, Ore. He also served as a CIA counterespionage chief seven years ago. His biggest FBI case: the investigation of John Walker, the American who spied for the Soviet Union's KGB for nearly 20 years. Now, Szady is sweating to revive the FBI's counterintelligence, which has taken hits in recent years. Critics have blasted the FBI for bumbling the case of Wen Ho Lee, the Chinese-American scientist wrongly accused of espionage. And since the Sept. 11 terrorist attacks, the FBI, other law enforcement agencies and the White House have come under fire for not anticipating the attack on the World Trade Center. Funding and staffing were cut for counterintelligence in recent years. Morale was low, and intelligence was seen as a dead-end career move for FBI agents, who favored hunting killers and bank robbers. But now counterintelligence is hot, with squads in every FBI field office. About 270 agents have been transferred or hired to work intelligence, and the FBI is recruiting analysts and experts on foreign cultures. Szady estimates the FBI needs an additional 800 agents to handle counterintelligence matters. "Counterintelligence is our No. 2 priority after terrorism," he says. "If we need the resources, we will get them." A ChevronTexaco security official who attended the Silicon Valley conference says that most companies are very concerned about espionage and terrorism. Since the Sept. 11 attacks, ChevronTexaco has doubled its security against spy and terrorist threats worldwide. The oil giant also works closely with the FBI and Homeland Security to strengthen security at its refineries, R&D centers and other facilities, says Steve Steinhauser, a ChevronTexaco manager of global security and a former FBI agent. Szady says that companies teaming with law enforcement won't totally stop economic espionage. But they can slow the spies and nab more of them. Meanwhile, Szady, who shares a Washington apartment with another FBI agent, plans to retire one day with his mathematician wife at their Cape Cod home. Says Szady, grinning, "I think I'm the oldest, gun-toting agent at the FBI." ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8610 From: James M. Atkinson Date: Tue May 11, 2004 9:16am Subject: More wiretaps in espionage, terror cases alarms ACLU http://www.dailystar.com/dailystar/news/21477.php More wiretaps in espionage, terror cases alarms ACLU COX NEWS SERVICE WASHINGTON - New government statistics showing that secret surveillance warrants in terror and espionage cases have eclipsed criminal wiretaps for the first time are raising red flags among open-government advocates. Federal and state courts approved a total of 1,442 interceptions of wire, oral or electronic communications for criminal cases in 2003, according to statistics released by the Administrative Office of the U.S. Courts last week. By comparison, the Foreign Intelligence Surveillance Court issued 1,724 warrants in terrorism and espionage cases last year, according to recently released Justice Department figures. The statistics reveal a trend toward more government secrecy, said Tim Edgar, legislative director of the American Civil Liberties Union's Washington office. The targets of the terrorism and espionage warrants approved by the ultrasecret Foreign Intelligence Surveillance Court are never informed about their surveillance. The warrants last far longer with little oversight to ensure they are gathering intelligence. And they can be approved even if law enforcement agents do not meet standards of probable cause for a criminal case. "That these warrants are becoming the major form of surveillance in this country is very troubling," Edgar said. "They are shifting surveillance from a court where there is less secrecy, more oversight and a probable cause standard to a court where there is more secrecy, no oversight and no probable cause statute." The Justice Department interprets the dramatic increase in surveillance warrants for terror and espionage cases in a far different light. Attorney General John Ashcroft said it shows that the department is aggressively hunting suspected terrorists. In a formal statement announcing the increase, Ashcroft highlighted the fact that the number of secret surveillance warrants for terrorism and espionage has almost doubled since 2001, the year al-Qaida struck New York and Washington, killing nearly 3,000 people. "To keep the United States and its people safe, it is critical that the Department of Justice use every legal means to detect, deter and disrupt foreign terrorists and their activities here in America," Ashcroft said. "As this report to Congress shows, the department is deploying its legal resources to uncover and prevent terrorist attacks on Americans." But critics say the only thing the report to Congress shows is that the raw numbers of warrants to surveil suspected terrorists and spies for foreign governments has increased. There is much less accountability in the surveillance warrants issued by the FISA court than there is in the warrants issued by a criminal court, said David L. Sobel, general counsel at a nonprofit organization that tracks government secrecy issues. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8611 From: Ocean Group Date: Tue May 11, 2004 2:28pm Subject: RE: Israeli link possible in US torture techniques LOL, what a surprise, see my last email on torture issue! *************** Message: 10 Date: Tue, 11 May 2004 10:10:12 -0400 From: "James M. Atkinson" Subject: Israeli link possible in US torture techniques http://www.dailystar.com.lb/article.asp?edition_id=10&categ_id=2&article_id= 3446 Israeli link possible in US torture techniques In exchange for interrogation training, did Washington award security contracts? By Ali Abunimah Special to The Daily Star Tuesday, May 11, 2004 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.679 / Virus Database: 441 - Release Date: 07/05/2004 8612 From: Bruce Date: Tue May 11, 2004 4:09pm Subject: Acoustic evesdropping on PC's - Interesting Read Dont know if this has been posted yet or not, but this is very interesting. http://www.wisdom.weizmann.ac.il/~tromer/acoustic/ 8613 From: Date: Wed May 12, 2004 6:08am Subject: 'Whispering keyboards' could be next attack trend 'Whispering keyboards' could be next attack trend By Niall McKay, Contributing Writer 11 May 2004 | SearchSecurity.com OAKLAND -- Listen to this: Eavesdroppers can decipher what is typed by simply listening to the sound of a keystroke, according to a scientist at this week's IEEE Symposium of Security and Privacy in Oakland, Calif. Each key on computer keyboards, telephones and even ATM machines makes a unique sound as each key is depressed and released, according to a paper entitled "Keyboard Acoustic Emanations" presented Monday by IBM research scientist Dmitri Asonov. All that is needed is about $200 worth of microphones and sound processing and PC neural networking software. Today's keyboard, telephone keypads, ATM machines and even door locks have a rubber membrane underneath the keys. "This membrane acts like a drum, and each key hits the drum in a different location and produces a unique frequency or sound that the neural networking software can decipher," said Asonov. Asonov found that by recording the same sound of a keystroke about 30 times and feeding it into a PC running standard neural networking software, he could decipher the keys with an 80% accuracy rate. He was also able to train the software on one keyboard to decipher the keystrokes on any other keyboard of the same make and model. Good sound quality is not required to recognize the acoustic signature or frequency of the key. In fact, Asonov was able to extract the audio captured by a cellular phone and still decipher the signal. "But don't panic," Asonov cautioned. "There are some easy ways to fix the problem." First, close the door in the room where you're working. Second, buy a rubber keyboard coffee guard that will dampen the sound enough to make eavesdropping difficult. However, Asonov said that he believed it was possible to use acoustical analysis algorithms to decipher key sounds based simply on gathering the data from just a couple of keys and extrapolating what other keys should sound like. Asonov warned that his work was almost entirely based on the evidence from his experiments and that he has little or no theoretical information to back up his theories. For example, he discovered that it was the membrane that was providing the unique signature simply by cutting a keyboard in two and finding that the neural networking software no longer worked. [Non-text portions of this message have been removed] 8614 From: Ocean Group Date: Wed May 12, 2004 0:35pm Subject: PRISONER ABUSE: PATTERNS FROM THE PAST National Security Archive Update, May 12, 2004 PRISONER ABUSE: PATTERNS FROM THE PAST Cold War U.S. Interrogation Manuals Counseled "Coercive Techniques" Cheney Informed of "Objectionable" Interrogation Guides in 1992 "Inconsistent with U.S. Government Policy" National Security Archive Posts CIA Training Manuals from 60s, 80s, and Investigative memos on earlier controversy on human rights abuses For more information: Thomas Blanton - 202/994-7000 Peter Kornbluh - 202/994-7116 http://www.nsarchive.org Washington D.C. May 12, 2004: CIA interrogation manuals written in the 1960s and 1980s described "coercive techniques" such as those used to mistreat detainees at the Abu Ghraib prison in Iraq, according to the declassified documents posted today by the National Security Archive. The Archive also posted a secret 1992 report written for then Secretary of Defense Richard Cheney warning that U.S. Army intelligence manuals that incorporated the earlier work of the CIA for training Latin American military officers in interrogation and counterintelligence techniques contained "offensive and objectionable material" that "undermines U.S. credibility, and could result in significant embarrassment." The two CIA manuals, "Human Resource Exploitation Training Manual-1983" and "KUBARK Counterintelligence Interrogation-July 1963," were originally obtained under the Freedom of Information Act by the Baltimore Sun in 1997. The KUBARK manual includes a detailed section on "The Coercive Counterintelligence Interrogation of Resistant Sources," with concrete assessments on employing "Threats and Fear," "Pain," and "Debility." The language of the 1983 "Exploitation" manual drew heavily on the language of the earlier manual, as well as on Army Intelligence field manuals from the mid 1960s generated by "Project X"--a military effort to create training guides drawn from counterinsurgency experience in Vietnam. Recommendations on prisoner interrogation included the threat of violence and deprivation and noted that no threat should be made unless the questioner "has approval to carry out the threat." The interrogator "is able to manipulate the subject's environment," the 1983 manual states, "to create unpleasant or intolerable situation, to disrupt patterns of time, space, and sensory perception." After Congress began investigating reports of Central American atrocities in the mid 1980s, particularly in Honduras, the CIA's "Human Resource Exploitation" manual was hand edited to alter passages that appeared to advocate coercion and stress techniques to be used on prisoners. CIA officials attached a new prologue page on the manual stating: "The use of force, mental torture, threats, insults or exposure to inhumane treatment of any kind as an aid to interrogation is prohibited by law, both international and domestic; it is neither authorized nor condoned"--making it clear that authorities were well aware these abusive practices were illegal and immoral, even as they continued then and now. Indeed, similar material had already been incorporated into seven Spanish-language training guides. More than a thousand copies of these manuals were distributed for use in countries such as El Salvador, Guatemala, Ecuador and Peru, and at the School of the Americas between 1987 and 1991. An inquiry was triggered in mid 1991 when the Southern Command evaluated the manuals for use in expanding military support programs in Colombia. In March 1992 Cheney received an investigative report on "Improper Material in Spanish-Language Intelligence Training Manuals." Classified SECRET, the report noted that five of the seven manuals "contained language and statements in violation of legal, regulatory or policy prohibitions" and recommended they be recalled. The memo is stamped: "SECDEF HAS SEEN." The Archive also posted a declassified memorandum of conversation with a Southern Command officer, Major Victor Tise, who was responsible for assembling the Latin American manuals at School of the Americas for counterintelligence training in 1982. Tise stated that the manuals had been forwarded to DOD headquarters for clearance "and came back approved but UNCHANGED." (Emphasis in original) --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.680 / Virus Database: 442 - Release Date: 09/05/2004 8615 From: delta Date: Fri May 12, 2000 9:36am Subject: thanks hello everybody i m a private investigator in paris france very interrested in tscm since 15 years ago. i joined this group to learn more about this . many thanks for the welcome and i ll try to be actif on this group. david 8616 From: Ocean Group Date: Thu May 13, 2004 8:08am Subject: Aviation Question Highly unrelated but annoying me: Why is it airlines allow you to use electrical goods (laptop) but not electro-optical goods (dvd player)? Why oh why...? Surely if your little minidisc players going to down the airplane then your laptop would as well....!!! --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.680 / Virus Database: 442 - Release Date: 09/05/2004 8617 From: DJ Date: Wed May 12, 2004 8:36pm Subject: CFE Does anyone have any information on Computer Forensics Expert certification? Also any experience with good training materials? IT2 Garrett USN-NSWC Crane 8618 From: G P Date: Wed May 12, 2004 11:43pm Subject: Re: PRISONER ABUSE: PATTERNS FROM THE PAST And this surprises anyone why? Cheney and Rumsfeld have been implicated in so many different scandals and coverups from prior administrations you can't even keep track of them crazy boys. They've surrounded themselves with ex-Iran/Contra folks with overt ties to organized crime and drug running and God knows what else. Doesn't everyone remember what the hell that Iran/Contra thing was about??? Something about swapping BLOW for WEAPONS to fund off-budget black ops? Or my personal fave, google +barry +seal +mena BCCI ring a bell? What about Carlyle Group? How about the violent overthrow of the democratically-elected Iranian government to install that facist Shah, the timid puppet for Anglo-Iranian Oil/British Petro? The 911 attacks can be traced back to that exact event, the middle east used to have great respect for the United States until we decided petrochemicals were more important than democracy. Doesn't anybody remember the name "Frank Olsen"? google +cheney +rumsfeld +lsd +coverup Maybe we should hire Dr. Stranglelove Kissinger, whom by conservative estimate is _personally_ responsible for more than 1,000,000 deaths, to investigate the 911 attacks? Oh wait, we already let that happen. But not to worry, we've got Skull & Bones member George W. Bush and Skull & Bones member John Kerry to choose from with this upcoming election. Less than 800 living members in that thar secret fraternity, but nothing to worry about ok kids? Eat your T.V. and be quiet. These people are animals, and have made the United States of America a mockery with their faux patriotism and bullshit religious rhetoric. Cheney, Rumsfeld, Wolfowitz and talking head W. Bush are nothing more than puppets for international banking cartels, with their sights set on destruction of the U.S.A. to pave the way for one big happy Marxist EU salad bowl. Rest assured, all four horsemen each have their very own personalized spit in the bowels of hell for what they've done to this planet, it's just a matter of time. Gotta run, haven't had a chance to watch reruns of the final "Survivor" show yet - I hear Amber got a million bucks and a diamond ring. "AMY GOODMAN: Weíre talking to Ray McGovern and David MacMichael, two former CIA analysts with the agency for more than a quarter of a century. Weíll be right back with that in a minute. (MUSIC BREAK) You are listening to Democracy Now! Ray McGovern, our guest, former CIA analyst. You were with the CIA forÖ RAY MCGOVERN: 27 years. AMY GOODMAN: And you worked directly under George Bush RAY MCGOVERN: I did when he was director for CIA and later I saw him every other morning for a couple of years in the 80ís when he was Vice President. AMY GOODMAN: Doing what? RAY MCGOVERN: I was one of the briefers who prepared the Presidentís daily brief and delivered it and briefed people one on one with the senior officials downtown. AMY GOODMAN:Now one of the things we are talking about a lot and seeing a lot is that the same people that were there during the Reagan-Bush years and even before, the Wolfowitzes the Rumsfelds, Cheneys were there then. What was George Bushís view of these people then? RAY MCGOVERN: Well, you know itís really interesting. When we saw these people coming back in town, all of us said who were around in those days said, oh my god, ëthe craziesí are back ñ ëthe craziesí ñ thatís how we referred to these people. AMY GOODMAN: Did George Bush refer to them that way? RAY MCGOVERN: Thatís the way everyone referred to them. AMY GOODMAN: Including George Bush? RAY MCGOVERN: Well, when Wolfowitz prepared that defense posture statement in 1991, where he elucidated the strategic vision that has now been implemented, Jim Baker, Secretary of State, Brent Scowcroft, security advisor to George Bush, and George Bush said hey, that thing goes right into the circular file. Suppress that thing, get rid of it. Somebody had the presence of mind to leak it and so that was suppressed. But now to see that arise out of the ashes and be implemented. while we start a war against Iraq, I wonder what Bush the first is really thinking. Because these were the same guys that all of us referred to as ëthe craziesí. AMY GOODMAN: Including George Bush" Ocean Group wrote: National Security Archive Update, May 12, 2004 PRISONER ABUSE: PATTERNS FROM THE PAST Cold War U.S. Interrogation Manuals Counseled "Coercive Techniques" Cheney Informed of "Objectionable" Interrogation Guides in 1992 "Inconsistent with U.S. Government Policy" National Security Archive Posts CIA Training Manuals from 60s, 80s, and Investigative memos on earlier controversy on human rights abuses For more information: Thomas Blanton - 202/994-7000 Peter Kornbluh - 202/994-7116 http://www.nsarchive.org Washington D.C. May 12, 2004: CIA interrogation manuals written in the 1960s and 1980s described "coercive techniques" such as those used to mistreat detainees at the Abu Ghraib prison in Iraq, according to the declassified documents posted today by the National Security Archive. The Archive also posted a secret 1992 report written for then Secretary of Defense Richard Cheney warning that U.S. Army intelligence manuals that incorporated the earlier work of the CIA for training Latin American military officers in interrogation and counterintelligence techniques contained "offensive and objectionable material" that "undermines U.S. credibility, and could result in significant embarrassment." The two CIA manuals, "Human Resource Exploitation Training Manual-1983" and "KUBARK Counterintelligence Interrogation-July 1963," were originally obtained under the Freedom of Information Act by the Baltimore Sun in 1997. The KUBARK manual includes a detailed section on "The Coercive Counterintelligence Interrogation of Resistant Sources," with concrete assessments on employing "Threats and Fear," "Pain," and "Debility." The language of the 1983 "Exploitation" manual drew heavily on the language of the earlier manual, as well as on Army Intelligence field manuals from the mid 1960s generated by "Project X"--a military effort to create training guides drawn from counterinsurgency experience in Vietnam. Recommendations on prisoner interrogation included the threat of violence and deprivation and noted that no threat should be made unless the questioner "has approval to carry out the threat." The interrogator "is able to manipulate the subject's environment," the 1983 manual states, "to create unpleasant or intolerable situation, to disrupt patterns of time, space, and sensory perception." After Congress began investigating reports of Central American atrocities in the mid 1980s, particularly in Honduras, the CIA's "Human Resource Exploitation" manual was hand edited to alter passages that appeared to advocate coercion and stress techniques to be used on prisoners. CIA officials attached a new prologue page on the manual stating: "The use of force, mental torture, threats, insults or exposure to inhumane treatment of any kind as an aid to interrogation is prohibited by law, both international and domestic; it is neither authorized nor condoned"--making it clear that authorities were well aware these abusive practices were illegal and immoral, even as they continued then and now. Indeed, similar material had already been incorporated into seven Spanish-language training guides. More than a thousand copies of these manuals were distributed for use in countries such as El Salvador, Guatemala, Ecuador and Peru, and at the School of the Americas between 1987 and 1991. An inquiry was triggered in mid 1991 when the Southern Command evaluated the manuals for use in expanding military support programs in Colombia. In March 1992 Cheney received an investigative report on "Improper Material in Spanish-Language Intelligence Training Manuals." Classified SECRET, the report noted that five of the seven manuals "contained language and statements in violation of legal, regulatory or policy prohibitions" and recommended they be recalled. The memo is stamped: "SECDEF HAS SEEN." The Archive also posted a declassified memorandum of conversation with a Southern Command officer, Major Victor Tise, who was responsible for assembling the Latin American manuals at School of the Americas for counterintelligence training in 1982. Tise stated that the manuals had been forwarded to DOD headquarters for clearance "and came back approved but UNCHANGED." (Emphasis in original) --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.680 / Virus Database: 442 - Release Date: 09/05/2004 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links --------------------------------- Do you Yahoo!? Yahoo! Movies - Buy advance tickets for 'Shrek 2' [Non-text portions of this message have been removed] 8619 From: Michael Puchol Date: Thu May 13, 2004 9:23am Subject: Re: Aviation Question Hi, Some interference tests done by aviation firms (manufacturers and airlines) have shown that such devices, or more accurately, the motors they contain, emmit interference on particular frequencies that are liable to cause problems in aircraft instruments. I believe the electronics that run the laser beams also produce interference, which may be even worse than that of the motors. This is all very theoretical, and there is no solid proof that a passenger-operated device has caused interference enough to be of any serious danger to the aircraft, but they are not taking any chances. Any electronic equipment that is installed on a plane has to be certified for that particular model, in case of airliners and certain categories of aircraft (light aircraft usually have a more wide-ranging certification which allows installation in any model, for example, a GPS receiver). This is to ensure that full EMC compatibility between the rest of systems and the device is achieved, and no problems will arise under normal operation. When you introduce a piece of unknown, uncertified and untested equipment in the aircraft, you could theoretically run amok a lot of things. Makes you wish back canvas and steel control wires... Regards, Mike ----- Original Message ----- From: "Ocean Group" To: Sent: Thursday, May 13, 2004 3:08 PM Subject: [TSCM-L] Aviation Question > Highly unrelated but annoying me: > > Why is it airlines allow you to use electrical goods (laptop) but not > electro-optical goods (dvd player)? > > Why oh why...? > > Surely if your little minidisc players going to down the airplane then your > laptop would as well....!!! > > --- > Outgoing mail is certified Virus Free. > Checked by AVG anti-virus system (http://www.grisoft.com). > Version: 6.0.680 / Virus Database: 442 - Release Date: 09/05/2004 > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > 8620 From: Ocean Group Date: Thu May 13, 2004 11:47am Subject: RE: PRISONER ABUSE: PATTERNS FROM THE PAST I just don't understand why the US people keep re-electing the same people... _____ From: G P [mailto:telos888@y...] Sent: 13 May 2004 05:43 To: Ocean Group; TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] PRISONER ABUSE: PATTERNS FROM THE PAST And this surprises anyone why? --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.680 / Virus Database: 442 - Release Date: 09/05/2004 [Non-text portions of this message have been removed] 8621 From: gkeenan Date: Thu May 13, 2004 0:07pm Subject: Re: PRISONER ABUSE: PATTERNS FROM THE PAST Maybe we should elect al-Zarqawi? He's a real nice fella and certainly hasn't a violent bone in his body. Jerry GPKeenan Co. 1005 Celia St. West Islip, NY 11795-2503 (631) 587-4020 (ph) (631) 587-4020 (fax1) (530) 323-6832 (Fax2) (516) 587-4020 (cell) secureops@o... gkeenan@s... ----- Original Message ----- From: Ocean Group To: 'G P' ; TSCM-L@yahoogroups.com Sent: Thursday, May 13, 2004 12:47 PM Subject: RE: [TSCM-L] PRISONER ABUSE: PATTERNS FROM THE PAST I just don't understand why the US people keep re-electing the same people... _____ From: G P [mailto:telos888@y...] Sent: 13 May 2004 05:43 To: Ocean Group; TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] PRISONER ABUSE: PATTERNS FROM THE PAST And this surprises anyone why? --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.680 / Virus Database: 442 - Release Date: 09/05/2004 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 8622 From: Ocean Group Date: Thu May 13, 2004 0:37pm Subject: RE: PRISONER ABUSE: PATTERNS FROM THE PAST Well Gerry, clearly that is a very silly comment to make. Obviously you take your right to vote very seriously and never miss an opportunity to convey your proud and well thought out opinions. _____ From: gkeenan [mailto:gkeenan@s...] Sent: 13 May 2004 18:08 To: 'G P'; TSCM-L@yahoogroups.com; Ocean Group Subject: Re: [TSCM-L] PRISONER ABUSE: PATTERNS FROM THE PAST Maybe we should elect al-Zarqawi? He's a real nice fella and certainly hasn't a violent bone in his body. Jerry GPKeenan Co. 1005 Celia St. West Islip, NY 11795-2503 (631) 587-4020 (ph) (631) 587-4020 (fax1) (530) 323-6832 (Fax2) (516) 587-4020 (cell) HYPERLINK "mailto:secureops@o..."secureops@o... HYPERLINK "mailto:gkeenan@s..."gkeenan@s... --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.680 / Virus Database: 442 - Release Date: 09/05/2004 [Non-text portions of this message have been removed] 8623 From: James M. Atkinson Date: Thu May 13, 2004 3:09pm Subject: Ex-Boeing official charged http://www.guardian.co.uk/business/story/0,3604,1214849,00.html Ex-Boeing official charged David Teather Wednesday May 12, 2004 The Guardian United States prosecutors last night charged a third former Boeing official in the alleged theft of secret materials from defence rival Lockheed Martin during the contest for a $1.9bn (£1.1bn) satellite launching contract in 1998. Larry Satchell, 65, of Newport Beach, California, was charged with conspiracy, obstruction of justice, theft of trade secrets and violation of the procurement integrity act. Two other former Boeing workers last August pleaded innocent to charges that they plotted to get hold of secrets from Lockheed Martin. They were fired in 1999 after an internal investigation. Boeing has been banned by the US air force from bidding for satellite launches. The company has maintained that only a small number of employees were involved in the corporate espionage. Mr Satchell, who is now retired, left Boeing after being criticised for having Lockheed Martin documents in his possession. He had been the manager of strategic analysis and marketing for Boeing's rocket programme. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8624 From: Jon Asdourian Date: Thu May 13, 2004 11:30am Subject: Re: CFE If you look under Computer Investigation at this URl you will see forensic information and links http://forensic.to/forensic.html If your command can get you into SCERS at FLETC, their training is excellant. I use and have received training from: www.guidancesoftware.com www.accessdata.com www.techpathways.com http://www.maresware.com http://www.forensics-intl.com good luck Jon Asdourian Data Forensics Engineering www.dataforensicsengineering.com --- DJ wrote: > Does anyone have any information on Computer > Forensics Expert > certification? Also any experience with good > training materials? > > IT2 Garrett > USN-NSWC Crane > > > > __________________________________ Do you Yahoo!? Yahoo! Movies - Buy advance tickets for 'Shrek 2' http://movies.yahoo.com/showtimes/movie?mid=1808405861 8625 From: Gerald Michael Wieczorek Date: Thu May 13, 2004 4:57pm Subject: Re: Digest Number 1565 Dirty secret, Israeli Ordering our Troops to abuse secret behind Investigations -Israel Although it is still largely undocumented if any of the contractor named in the report of General Antonio Taguba were associated with the Israeli military or intelligence services, it is noteworthy that one, John Israel, who was identified in the report as being employed by both CACI International of Arlington, Virginia, and Titan, Inc., of San Diego, may not have even been a U.S. citizen. The Taguba report states that Israel did not have a security clearance, a requirement for employment as an interrogator for CACI. According to CACI's web site, "a Top Secret Clearance (TS) that is current and US citizenship" are required for CACI interrogators working in Iraq. In addition, CACI requires that its interrogators "have at least two years experience as a military policeman or similar type of law enforcement/intelligence agency whereby the individual utilized interviewing techniques." Speculation that "John Israel" may be an intelligence cover name has fueled speculation whether this individual could have been one of a number of Israeli interrogators hired under a classified contract. Because U.S. citizenship and documentation thereof are requirements for a U.S. security clearance, Israeli citizens would not be permitted to hold a Top Secret clearance. However, dual U.S.-Israeli citizens could have satisfied Pentagon requirements that interrogators hold U.S. citizenship and a Top Secret clearance. Although the Taguba report refers twice to Israel as an employee of Titan, the company claims he is one of their sub-contractors. CACI stated that one of the men listed in the report "is not and never has been a CACI employee" without providing more detail. A U.S. intelligence source revealed that in the world of intelligence "carve out" subcontracts such confusion is often the case with "plausible deniability" being a foremost concern. In fact, the Taguba report does reference the presence of non-U.S. and non-Iraqi interrogators at Abu Ghraib. The report states, "In general, US civilian contract personnel (Titan Corporation, CACI, etc), third country nationals, and local contractors do not appear to be properly supervised within the detention facility at Abu Ghraib." The Pentagon is clearly concerned about the outing of the Taguba report and its references to CACI, Titan, and third country nationals, which could permanently damage U.S. relations with Arab and Islamic nations. The Pentagon's angst may explain why the Taguba report is classified Secret No Foreign Dissemination. The leak of the Taguba report was so radioactive, Daniel R. Dunn, the Information Assurance Officer for Douglas Feith's Office of the Under Secretary of Defense, Policy (Policy Automation Services Security Team), sent a May 6, 2004, For Official Use Only Urgent E-mail to Pentagon staffers stating, "THE INFORMATION CONTAINED IN THIS REPORT IS CLASSIFIED; DO NOT GO TO FOX NEWS TO READ OR OBTAIN A COPY." Considering Feith's close ties to the Israelis, such a reaction by his top computer security officer, a Certified Information System Security Professional (CISSP), is understandable, although considering the fact that CISSPs are to act on behalf of the public good, it is also regrettable.. The reference to "third country nationals" in a report that restricts its dissemination to U.S. coalition partners (Great Britain, Poland, Italy, etc.) is another indication of the possible involvement of Israelis in the interrogation of Iraqi prisoners. Knowledge that the U.S. may have been using Israeli interrogators could have severely fractured the Bush administration's tenuous "coalition of the willing' in Iraq. General Taguba's findings were transmitted to the Coalition Forces Land Component Command on March 9, 2004, just six days before the Spanish general election, one that the opposition anti-Iraq war Socialists won. The Spanish ultimately withdrew their forces from Iraq. During his testimony before the Senate Armed Service Committee, Rumsfeld was pressed upon by Senator John McCain about the role of the private contractors in the interrogations and abuse. McCain asked Rumsfeld four pertinent questions, ". . . who was in charge? What agency or private contractor was in charge of the interrogations? Did they have authority over the guards? And what were the instructions that they gave to the guards?" When Rumsfeld had problems answering McCain's question, Lt. Gen. Lance Smith, the Deputy Commander of the U.S. Central Command, said there were 37 contract interrogators used in Abu Ghraib. The two named contractors, CACI and Titan, have close ties to the Israeli military and technology communities. Last January 14, after Provost Marshal General of the Army, Major General Donald Ryder, had already uncovered abuse at Abu Ghraib, CACI's President and CEO, Dr. J.P. (Jack) London was receiving the Jerusalem Fund of Aish HaTorah's Albert Einstein Technology award at the Jerusalem City Hall, with right-wing Likud politician Israeli Defense Minister Shaul Mofaz and ultra-Orthodox United Torah Judaism party Jerusalem Mayor Uri Lupolianski in attendance. Oddly, CACI waited until February 2 to publicly announce the award in a press release. CACI has also received grants from U.S.-Israeli bi-national foundations. Titan also has had close connections to Israeli interests. After his stint as CIA Director, James Woolsey served as a Titan director. Woolsey is an architect of America's Iraq policy and the chief proponent of and lobbyist for Ahmad Chalabi of the Iraqi National Congress. An adviser to the neo-conservative Foundation for the Defense of Democracies, Jewish Institute of National Security Affairs, Project for the New American Century, Center for Security Policy, Freedom House, and Committee for the Liberation of Iraq, Woolsey is close to Stephen Cambone, the Undersecretary of Defense for Intelligence, a key person in the chain of command who would have not only known about the torture tactics used by U.S. and Israeli interrogators in Iraq but who would have also approved them. Cambone was associated with the Project for the New American Century and is viewed as a member of Rumsfeld's neo-conservative "cabal" within the Pentagon. Another person considered by Pentagon insiders to have been knowledgeable about the treatment of Iraqi prisoners is U.S. Army Col. Steven Bucci, a Green Beret and Rumsfeld's military assistant and chief traffic cop for the information flow to the Defense Secretary. According to Pentagon insiders, Bucci was involved in the direction of a special covert operations unit composed of former U.S. special operations personnel who answered to the Pentagon rather than the CIA's Special Activities Division, the agency's own paramilitary group. The Pentagon group included Arabic linguists and former members of the Green Berets and Delta Force who operated covertly in Iraq, Afghanistan, Iran, Pakistan, and Uzbekistan. Titan also uses linguists trained in the languages (Arabic, Dari, Farsi, Pashto, Urdu, and Tajik) of those same countries. It is not known if a link exists between Rumsfeld's covert operations unit and Titan's covert operations linguists. full article: http://www.counterpunch.org/madsen05102004.html Titan & Lockheed NEW YORK, May 12 (Reuters) - UBS AG on Wednesday said it has acquired more than 5 percent of Titan Corp. (nyse: TTN - news - people), a U.S. government contractor whose deal to be acquired by Lockheed Martin Corp. (nyse: LMT - news - people) has been delayed by a bribery probe. Titan, which last month was forced to accept a lowered offer price from Lockheed because of the bribery probe, more recently has been linked to the investigation of abuse of prisoners in Iraq. Its stock has fallen further below Lockheed's revised offer of $20 per share. Titan was one of two U.S. contractors named in a U.S. Army report that detailed the abuse of inmates held in the Abu Ghraib prison in Baghdad. The other is CACI International Inc. (nyse: CAI - news - people). Gerald wieczorek Chief Forensics Fraud Investigator (tracking & Research) From: Matt Paulsen Date: Mon May 12, 2003 8:31pm Subject: FW: FW: (unknown) http://www.tscm.com/threatlvl-X.html I was just rereading this page and I offer Mr. Ginsberg an apology. According to JMA's assessment page, there is a good potential that Mr. Ginsberg may have an issue rooted in a factual incident which has been blown out of proportion - hypothetical, then misunderstood, then delusional, which has become obscured due to a possible mental illness by Mr. Ginsberg. That being said, Mr. Ginsberg should still be evaluated by a medical professional given the ramblings seen to date, yet Mr. Ginsberg should still employ (IE: Pay for) the services of a gold list member to evaluate the possibility of being surveilled (sp?), at Mr. Ginsberg's expense. Thanks, Matt -----Original Message----- From: allan ginsberg [mailto:negrodawn2003@y...] Sent: Monday, May 12, 2003 5:36 PM To: mpaulsen6@a... Subject: Re: FW: [TSCM-L] (unknown) --- Matt Paulsen wrote: > Get help. Here's a start. REPLY: MATT MUST BE A COP...SINCE WHEN DO TSCM ERS PRACTICE PYSCHIATRY?...STICK TO WHAT YOU KNOW BEST, STEALING PEOPLE'S PRIVACY THROUGH ELECTRONICS. __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com 7324 From: Matt Paulsen Date: Mon May 12, 2003 8:39pm Subject: pirate radios Hi, Have a few pirate radios I'd like to isolate down, does anyone have a good antenna design, portable, handheld, that would let me 'ping' the location of the pirate radios easily using a laptop / antenna interface. (Yes, I know I'm not providing much 'pirate radio' detail.) 7325 From: kondrak Date: Mon May 12, 2003 9:23pm Subject: Court will decide if police need warrant for GPS 'tracking' Monday, May 12, 2003 Court will decide if police need warrant for GPS 'tracking' http://seattlepi.nwsource.com/local/121572_gps12.html 7326 From: Matt Paulsen Date: Mon May 12, 2003 8:34pm Subject: advanced countermeasure compilation database? I've been knocking the idea around to create a database / website interface in my spare time that would trap know events with location / countermeasure used, and publishing it for free access to view which countermeasures are most effective against which threats, and having the database update via a simplified client interface, perhaps a .NET setup of some sort. For those interested in such a system please list response. 7327 From: Matt Paulsen Date: Mon May 12, 2003 11:36pm Subject: RE: FW: (unknown) A question from a listmember came in as far as which IOS's are in use. 12.1.13.EA1b and down, a lot of 12.05's of various versions and some 12.1's depending on the devices. reference: >Speaking of TSCM'ing a LAN... a question for the group - I'm currently >running VTP/DOT1Q encap on some switches and using some 4908g-l3 switches as >'core routers' (yes, I know it's not core for those Cisco purists in the >group) r 7328 From: James M. Atkinson Date: Tue May 13, 2003 9:08am Subject: Life Lessons A good time to keep your mouth shut is when you're in deep water. Anyone who thinks old age is golden must not have had a very exciting youth. How come it takes so little time for a child who is afraid of the dark to become a teen-ager who wants to stay out all night? Business conventions are important because they demonstrate how many people a company can operate without. Why is it that at class reunions you feel younger than everyone else looks? Scratch a dog and you'll find a permanent job. No one has more driving ambition than the boy who wants to buy a car. There are worse things than getting a call for a wrong number at 4 AM. It could be a right number. Think about this..... No one ever says "It's only a game" when their team is winning. How come we choose from just two people for president and 50 for Miss America? Money will buy a fine dog, but only kindness will make him wag his tail. Learn from the mistakes of others. You won't live long enough to make them all yourself. One of the quickest ways for a young man to fail in life is to work so hard the boss will think he's after his job. A backyard barbecue draws two things....flies and relatives. The nicest thing about the future is that it always starts tomorrow. If you don't have a sense of humor, you probably don't have any sense at all. Seat belts are not as confining as wheelchairs. You know you're old when you reach down to get the wrinkles out of your panty hose and realize you aren't wearing any. I've reached the age where the happy hour is a nap. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7329 From: John McCain Date: Mon May 12, 2003 3:44pm Subject: RE: T1 problem ( I didn't snip any of the history because there's lots of tech details I didn't want to forget) First thing I notice is the classic symptoms of clock slippage. Check for jitter, and I'd quickly look to make sure someone didn't change the clock source on any one piece of equipment. The "runs poorly for hours/days, craps out, then works fine for a while, and repeats" is classic for clock problems. As a general rule, all CPE should source clock from the telco in North America... always. We find exceptions, but they are rare and the people installing them are usually well versed in the issues. We've also found lots of problems when using Cat 3 or Cat 5 cable for T1 cable. T1 specs are pretty loose, but call for a mythical 19 gauge ABAM cable. I recommend be using telco cable instead of tightly twisted cat 3/5. I've seen lots of installations where a 3' 10BaseT jumper rolled the T1 signals to the point where they were unusable, and a huge number of installations where Cat 5 simply killed it. Look at a T1 signal after 50' of 10baseT cable, and you will see what I mean. Another problem is that much lower category cable is actually intentionally mis-marked down from cat 5 or better. Sometimes, we've had customers split pairs on cat 3 and solve some of the capacitance problems though. Another place to look would be one's density. We've sometimes found telco COs that were misprogrammed and a heavy one's density would cause it to jump clock. Hope I gave you a few new avenues to explore. At least we're back onto tech discussions on the list. And for others, here are a couple of good references for T1 stuff: All You Wanted to Know About T1 But Were Afraid to Ask, http://www.dcbnet.com/notes/9611t1.html T-1 /E1 / PRI Technology Overview http://www.patton.com/support/pdf/t1-e1-pri_tech_over_lo-res.pdf Cheers, JohnM At 08:02 PM 5/11/2003 -0700, you wrote: >A few pointers, but first, I'm still interested in finding out how to remote >scan the telco to find hardware faults in their equipment from my >end..... -m.. now to the details: >A: The equipment has all been discovered at this point to be faulty telco >equipment. >B: Hardware loop back from router to CSU/DSU was performed on both ends >where both circuits were direct t1's on 'private' network. IE: No internet, >classic old school t1, point to point. >C: These are 2 separate issues, not interrelated. The DS3's/Tx's etc. do >not cross the same OC48 paths, different originating CO's, different circuit >ID's all the way through. >D: Both sites experienced same errors - frequent voice/data interruption, >from seconds to hours of downtime. >E: Both sites were under performance monitoring at telco switch center. >Both showed errors up to the link down, then both would run clean for a >month or so, then error out. Telco can only hold 7 days, that being an >issue, of performance monitors before it FIFO's. >F: Timing is served from Verizon using symmetricom time servers, >cdpd/gps/nist dialback, rubidium and quartz oscillators, we're pulling from >them, csu/dsu's are set to read one from network, one from remote/"local". >G: ONE of our CSU/DSU sources is running at +10Db from it to them, showing a >total of +28-+32Db at the hypercard. Not good, but not the cause, I suspect >it's been programmed that way, haven't pinned out a cable to check yet. >H: Both ends of CSU/DSU's are synching to network but not telco, and are >deframing after 1 second of frame establishment. >I: One of the CSU/DSU's showed traffic as inverse on channel 13 only, but >was passing a full T1 of traffic even though it showed channel 13 only >active. >J: Loops run at ping ip, count 1500, rate 1500, 0x0000, 0x1111, 0xffff, >0xaaaa all clean from routers to CSU/DSU's (used a cat5e, my teeth and >fingers to make a loopback.. yea, we're rolling in cash over here.) >K: Verizon's ends all look clean through and through, they have not >initiated a point to point - a-z loop test, just a-m and z-n. >L: Peoples lives depend on our network being up so no, no one would be >cleared to a room unless escorted by security / myself / my group. Verizon >BRC is cleared for intrusive testing from remote center. I have their 3rd >level field tech's cellphone... we're buds at this point. >M: Circuits have been running for 2+ years each but are now exhibiting these >problems. >N: They put a card in slot2 at one site and left the card in slot1 'just in >case' - I get opportunistic when troubleshooting. We had that site narrowed >to a 3' cable at one point as being the only probable cause for the issue >until I was passing data by swapping out a data only CSU for the voice/data >CSU. > >-----Original Message----- >From: kondrak [mailto:kondrak@s...] >Sent: Sunday, May 11, 2003 2:18 PM >To: mpaulsen6@a... >Subject: RE: [TSCM-L] Digest Number 1263 > > >Ok, Matt, IF its your equipment on your end, (as they allege) and you do a >hard loopback for them and they report timing issues, its got to be them >right? If theyre sending improperly framed packets, and they see it looped >back, its got to be their origination. Im talking intrusive, cable >loopback, not softswitched. >I definitely smell a timing problem from them, or a framing problem. Can >you loop them up to you from your end? Errors? This would verify your CPE. >I sense a mux problem between their OC48 and the T3 card. >Do you have any other circuits on different T3's from the same OC48?? Are >they working? If so, they can check the settings in the MUX to see theyre >the same, that IS of course, assuming theyre using the same equipment on >both paths. >Do they (Verizon) look ok to themselves, looped up at their end, then loop >up from your end to them, do they still look ok? Proof of path, no >transport errors. >Reverse procedure, loop yourself locally, and assure what youre >transmitting is the same as the circuit spec. THen have them loop their end >to you, this should identify the single leg thats falling over. >Are they OK'ed for intrusive testing? If its down, feel free, but make them >report innie-outies, so someone doesn't leave a cable in a jack. >Did this circuit ever pass 24 hour burnin? Ive seen circuits run fine, and >frame slip all over the place...error correction fixes much, but they wont >hold up when the circuit gets loaded. >Any other equipment errors on either ends? >If they changed out cards, and the problem went away, why did they put the >old cards back? They should of went to testlab or the mfgr for proofing. > > > >At 11:14 5/11/2003 -0700, you wrote: > >Ok, sure... I have tw0 questions regarding DSx vs Tx signaling and how to > >determine if non-CPE is faulty upstream from CPE. CPE is the same, but > >network equipment from telco doesn't appear to be different, yet they (IE: > >Verizon) state it is. I've had an OC48 card and a DS3 card go bad @ > >Verizon's end, but they kept insisting that timing on CPE was incorrect > >(Which it wasn't, as has been proven by their swapping out a DS3 and OC48 > >card on their end, 'FIXING' the timing issues on my end.. snort.). I've > >tried pretty much everything on my end with these 2 occurrances, including > >swapping out telco equipment at demarc where I could get ahold of it, and > >enabling performance monitoring on telco switch, but I always found that > >this didn't isolate the fault until a few months of troubleshooting goes by > >with the telco. Tried scoping the lines - t-berd, packet analyzer, no help > >there. In fact, one T1 scoped as a 56k only line, even though we were > >passing 1.5ishk data through it + had 3 voice channels lit. The Tx vs DSx > >was the second line, where they swapped me from copper to fiber on their > >end, but they didn't change network equipment at demarc. Sounds fishy to > >me... I think I'm getting my leg pulled - their using hyprercards on the > >demarc. Do these support Tx and DSx signalling concurrently? Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-897-6600 2949 CR 1000N Web: http://www.dcbnet.com Dewey, IL. 61840 Email: Jmccain@d... 7330 From: Thomas Shaddack Date: Tue May 13, 2003 5:21am Subject: RE: FW: (unknown) On Mon, 12 May 2003, Matt Paulsen wrote: > > Now, since security should have it's own network, I'm contemplating > subnetting and VLAN'ing it out to its own VLAN through the devices. Here's > the question.. How hard would it be for someone to intrude upon the IP > stream and subsequently get an IP on a non-assigned port for that VLAN. I've > never heard of such an occurrance. So it seems that it would be more likely > that a tap in the fiber or copper streams that are either trunking or > non-trunking would be a problem... In that case, I've got nearly 2/3 of a > mile to look at securing. I never worked with VLANs so I can't comment how good thing it is. However, if I'd have to solve this kind of problem, I'd most likely resort to brute force. Encrypt the communication, and don't care about the transport layer security in between. Anything that combines authentication and encryption should do the job; in case the data transfers are TCP-only, I'd resort to SSL (eg, Stunnel ), if other protocols (most likely UDP) would be in play, I'd use either CIPE or a full-blown IPsec (my favorite one is a combination of Linux and FreeS/WAN ). Then you have only to maintain physical security of the endpoint machines; physical access control and remote logging of the activity of the machines is very helpful here. If the adversary can't get ahold of the IPSec keys and SSL certificates, he can't decrypt the communication even if he has it completely captured and stored. (At least not without couple millions years of bruteforcing it.) Some time ago, I was setting up an ad-hoc VPN, over the Internet (a VERY untrustful environment), using a $50 secondhand PC with mentioned Linux-FreeS/WAN setup. However, this depends on how much bandwidth you need; encryption takes time. Another thing to do is running arpwatch at least on one machine inside the LAN, which will alert you about any attempt to hijack the IP address or eavesdrop on the switched LAN. This is just an early-warning measure, though, but can also catch some misconfigurations (two machines with one IP) before they become a visible problem. Yet another measure that could be useful is setting up IDS and a firewall on the machines securing the connection, even if they are inside the LAN; that could reveal eventual LAN-originated attack attempts. PS: For network eavesdropping you don't need an IP address at all. A common setup is a network card with unassigned IP which is connected to the LAN and set to promiscuous mode, running a sniffer on it. By classical packet-based network scanning you won't see this kind of tap. You should be also able to listen on both Rx and Tx pairs in the CAT5-based installations by using two such network cards, each one for one pair. You can also convince a switch to become a hub and broadcast to all its ports, if you flood its port-address table. Numerous techniques exist. Another way is ARP spoofing, which allows you hijacking the address of the computer in question; that thing, if undetected, can let you deploy a Man-in-the-middle attack against even eg. SSL connections, if they aren't authenticated. Arpwatch was designed to catch exactly this kind of attempts. (You can deploy the same kind of attack even over the Net; favorite way here is DNS spoofing. DNSsec promises help here, but its level of deployment is rather low, so we have to rely on "normal" authentication, eg. the mentioned certificates.) Hope that helps :) 7331 From: ldudlyd Date: Mon May 12, 2003 7:03am Subject: An interesting receiver From EDN magazine, May 1, 2003, Page 15. Regards, Larry Dillard Multiband receiver fits into a PCI slot By Warren Webb -- EDN, 5/1/2003 Pentek has introduced a 16-channel, multiband digital receiver for radar-pulse-analysis, satellite-communications, and signal-intelligence applications. The Model 7631 comprises a digital-receiver PMC (PCI Mezzanine Card) and a PMC-to-PCI adapter, and the company assembles and tests it as a single PCI board (Picture). A 14-bit AD6645 ADC, which can operate at sample rates as high as 105 MHz, transformer-couples and digitizes each of the board's two analog inputs. The board also includes four Graychip GC4016 quad-multiband digital-receiver chips, driven by the 100M samples/sec from both ADCs. A crossbar switch inside each GC4016 allows all 16 onboard receiver channels to independently select either of the two ADC inputs. Each receiver chip includes four receiver channels that can independently center frequency tuning from dc to 50 MHz with output bandwidths ranging from 4 kHz to 10 MHz. The board includes a factory-configured FPGA to perform standard modes of data packing, formatting, and channel selection. An optional GateFlow FPGA designer's kit is available for custom applications to take advantage of unused resources inside the FPGA. Prices for the Model 7631 start at $6795, and it is available within eight to 10 weeks after receipt of order. Pentek Inc, 1-201-818-5900, www.pentek.com. 7332 From: Date: Mon May 12, 2003 9:10pm Subject: RE: FW: (unknown) Matt, I have a question which will help me answer your vlan Question. Which IOS are you using? on each? Thanks, -james At 20:05 5/12/2003, Matt Paulsen wrote: >Hi, > >If I were a police officer, I'd say thanks for calling me one, that's quite >a compliment. As it is nope, I'm not, but I do work with hospitals. As >someone that does do TSCM related to LAN/WAN architecture and >infosec/commsec, psychology, not pysciatry (sic) is more apt to be employed >as part of an overall security plan for HIPAA compliance, with respects to >social engineering during live intrusion testing, but that compliance >requirement won't be instituted for nearly 2 years, so I'm not really >focusing directly on it right now, moreso, just getting medical >organizations used to the ideas of security, even though it is probably one >of the larger areas of concern for organizations facing security threats. > >Speaking of TSCM'ing a LAN... a question for the group - I'm currently >running VTP/DOT1Q encap on some switches and using some 4908g-l3 switches as >'core routers' (yes, I know it's not core for those Cisco purists in the >group) running HSRP. IE: HRSP core, to DOT1Q / VTP network - full mesh, and >am bringing up some ip based security servers to replace / augment the >existing CCTV installion under a VLAN, say ID # 100, where the rest of the >local VLAN will be the same. > >Now, since security should have it's own network, I'm contemplating >subnetting and VLAN'ing it out to its own VLAN through the devices. Here's >the question.. How hard would it be for someone to intrude upon the IP >stream and subsequently get an IP on a non-assigned port for that VLAN. I've >never heard of such an occurrance. So it seems that it would be more likely >that a tap in the fiber or copper streams that are either trunking or >non-trunking would be a problem... In that case, I've got nearly 2/3 of a >mile to look at securing. > >For example: 4908 - 3508 - 3548, vlan id 100 carried down on 192.168.1/24 >network, where the ip video server will sit, on port 4 of the 3548, which >has gbics up to the 3508, which goes to the 4908. > >The viewing station will be connected differently, in a different building, >for example: > >4908 - 3508 - 2950 - vlan id 100 carried down on 192.168.1/24 network, on >port 4 for example, on the 2950, with gbics all through to the top as >before. > >SO.... IF VLAN 100 is only associated on the GBICs of the 4908's, 3508's, >2950, and 3548 on both ends of the physical plant, as well as the two 10/100 >copper drops from the 2950 and the 3548 respectively, how could someone >intrude upon the IP subnet or the IP stream - I assume that a sniffer can >assemble/disassemble, but can a snooping device actually plant itself on the >VLAN 100 if there is no associated port activated for it, and view live >streams of data? > >Thanks, > >Matt > >PS - For the Crazy Psych Dude getting a fixation on me... Do yourself and us >a favor, get checked in. Also, will you PLEASE FIND THE CAPS LOCK KEY on >your keyboard, should be right next to that other one called TAB with the >arrows on it and use it, works wonders when typing. Yes, I know the shift >keys can be formidable objects during those early stages of learning how to >type properly, but the benefits will outweigh the hardships in the long run >and who knows, maybe at some point your dementia will be under control and >you'll get a lovely job as a typist in a law firm. Unless you have a mac... >try next to the option or apple looking keys and get a job as an artist, or >better yet a sci-fi / mystery writer... The eight ball says... IT COULD BE >RIGHT. > >-----Original Message----- >From: allan ginsberg [mailto:negrodawn2003@y...] >Sent: Monday, May 12, 2003 5:36 PM >To: mpaulsen6@a... >Subject: Re: FW: [TSCM-L] (unknown) > > >--- Matt Paulsen wrote: > > Get help. Here's a start. >REPLY: MATT MUST BE A COP...SINCE WHEN DO TSCM ERS >PRACTICE PYSCHIATRY?...STICK TO WHAT YOU KNOW BEST, >STEALING PEOPLE'S PRIVACY THROUGH ELECTRONICS. > >__________________________________ >Do you Yahoo!? >The New Yahoo! Search - Faster. Easier. Bingo. >http://search.yahoo.com > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7333 From: Fernando Date: Mon May 12, 2003 4:30pm Subject: Double Agent Case By Linda Deutsch The Associated Press Monday, May 12, 2003; 2:58 PM LOS ANGELES -- A retired FBI agent and the woman who allegedly was both his lover and a double agent for the Chinese government pleaded innocent Monday to national security violations. Katrina Leung, 49, who is being held without bail, was brought to court in a green prison jacket and stood before a federal magistrate a few feet away from James J. Smith, who had been her FBI handler for 20 years. Among other things, she is accused of taking classified documents from Smith's briefcase and copying them with intent to use them to benefit a foreign nation. After pleading not guilty, Leung was kept behind a glass partition in the crowded courtroom for several minutes while Smith stepped forward to enter his plea. Smith, 59, is charged with fraud for allegedly filing false reports to FBI headquarters about Leung's reliability and with gross negligence for allegedly allowing her access to classified material. He is free on $250,000 bail. Neither one is charged with the more serious crime of espionage. In court, he and Leung did not look at each other and their cases were assigned to separate judges, though both of their trials were tentatively set for July 1. Lawyers for both defendants immediately met with federal authorities privately to discuss the handling of classified information that will be central to the case. Leung faces a sentence of up to 50 years in prison if convicted on all counts, while Smith could get up to 40 years. Leung, a socialite and political activist, was paid $1.7 million by the FBI for her information as an intelligence asset code-named Parlor Maid. The indictment against Smith stressed the impropriety of the sexual relationship and said the agent should have disclosed it in the 19 reports he filed with FBI headquarters about her. Smith retired as head of the Los Angeles field office's China squad in 2000. 7334 From: kondrak Date: Tue May 13, 2003 1:47pm Subject: RE: T1 problem I tend to feel the same about the clock John. Yes, I have no problem with anyone wanting their own stratum server, but it always should be slaved to whatever the telco is sending you. When I worked at one of the big TLA telcos, we had a GPS system but it always was slaved to the reference data from ATT NYC , for all its propagation delays etc. We had a lot of sonet loops in a downtown core, and synchronous must be, well, synchronous, so timing was a priority. The fact that he sees circuits running within a supposedly bad group is indicative of a timing issue above. At 15:44 5/12/2003 -0500, you wrote: >( I didn't snip any of the history because there's lots of tech details I >didn't want to forget) > >First thing I notice is the classic symptoms of clock slippage. Check for >jitter, and I'd quickly look to make sure someone didn't change the clock >source on any one piece of equipment. The "runs poorly for hours/days, >craps out, then works fine for a while, and repeats" is classic for clock >problems. As a general rule, all CPE should source clock from the telco in >North America... always. We find exceptions, but they are rare and the >people installing them are usually well versed in the issues. > >We've also found lots of problems when using Cat 3 or Cat 5 cable for T1 >cable. T1 specs are pretty loose, but call for a mythical 19 gauge ABAM >cable. I recommend be using telco cable instead of tightly twisted cat >3/5. I've seen lots of installations where a 3' 10BaseT jumper rolled the >T1 signals to the point where they were unusable, and a huge number of >installations where Cat 5 simply killed it. Look at a T1 signal after 50' >of 10baseT cable, and you will see what I mean. Another problem is that >much lower category cable is actually intentionally mis-marked down from >cat 5 or better. >Sometimes, we've had customers split pairs on cat 3 and solve some of the >capacitance problems though. > >Another place to look would be one's density. We've sometimes found telco >COs that were misprogrammed and a heavy one's density would cause it to >jump clock. > >Hope I gave you a few new avenues to explore. At least we're back onto >tech discussions on the list. > >And for others, here are a couple of good references for T1 stuff: > >All You Wanted to Know About T1 But Were Afraid to Ask, >http://www.dcbnet.com/notes/9611t1.html > >T-1 /E1 / PRI Technology Overview >http://www.patton.com/support/pdf/t1-e1-pri_tech_over_lo-res.pdf > >Cheers, >JohnM > > > > >At 08:02 PM 5/11/2003 -0700, you wrote: > >A few pointers, but first, I'm still interested in finding out how to remote > >scan the telco to find hardware faults in their equipment from my > >end..... -m.. now to the details: > >A: The equipment has all been discovered at this point to be faulty telco > >equipment. > >B: Hardware loop back from router to CSU/DSU was performed on both ends > >where both circuits were direct t1's on 'private' network. IE: No internet, > >classic old school t1, point to point. > >C: These are 2 separate issues, not interrelated. The DS3's/Tx's etc. do > >not cross the same OC48 paths, different originating CO's, different circuit > >ID's all the way through. > >D: Both sites experienced same errors - frequent voice/data interruption, > >from seconds to hours of downtime. > >E: Both sites were under performance monitoring at telco switch center. > >Both showed errors up to the link down, then both would run clean for a > >month or so, then error out. Telco can only hold 7 days, that being an > >issue, of performance monitors before it FIFO's. > >F: Timing is served from Verizon using symmetricom time servers, > >cdpd/gps/nist dialback, rubidium and quartz oscillators, we're pulling from > >them, csu/dsu's are set to read one from network, one from remote/"local". > >G: ONE of our CSU/DSU sources is running at +10Db from it to them, showing a > >total of +28-+32Db at the hypercard. Not good, but not the cause, I suspect > >it's been programmed that way, haven't pinned out a cable to check yet. > >H: Both ends of CSU/DSU's are synching to network but not telco, and are > >deframing after 1 second of frame establishment. > >I: One of the CSU/DSU's showed traffic as inverse on channel 13 only, but > >was passing a full T1 of traffic even though it showed channel 13 only > >active. > >J: Loops run at ping ip, count 1500, rate 1500, 0x0000, 0x1111, 0xffff, > >0xaaaa all clean from routers to CSU/DSU's (used a cat5e, my teeth and > >fingers to make a loopback.. yea, we're rolling in cash over here.) > >K: Verizon's ends all look clean through and through, they have not > >initiated a point to point - a-z loop test, just a-m and z-n. > >L: Peoples lives depend on our network being up so no, no one would be > >cleared to a room unless escorted by security / myself / my group. Verizon > >BRC is cleared for intrusive testing from remote center. I have their 3rd > >level field tech's cellphone... we're buds at this point. > >M: Circuits have been running for 2+ years each but are now exhibiting these > >problems. > >N: They put a card in slot2 at one site and left the card in slot1 'just in > >case' - I get opportunistic when troubleshooting. We had that site narrowed > >to a 3' cable at one point as being the only probable cause for the issue > >until I was passing data by swapping out a data only CSU for the voice/data > >CSU. > > > >-----Original Message----- > >From: kondrak [mailto:kondrak@s...] > >Sent: Sunday, May 11, 2003 2:18 PM > >To: mpaulsen6@a... > >Subject: RE: [TSCM-L] Digest Number 1263 > > > > > >Ok, Matt, IF its your equipment on your end, (as they allege) and you do a > >hard loopback for them and they report timing issues, its got to be them > >right? If theyre sending improperly framed packets, and they see it looped > >back, its got to be their origination. Im talking intrusive, cable > >loopback, not softswitched. > >I definitely smell a timing problem from them, or a framing problem. Can > >you loop them up to you from your end? Errors? This would verify your CPE. > >I sense a mux problem between their OC48 and the T3 card. > >Do you have any other circuits on different T3's from the same OC48?? Are > >they working? If so, they can check the settings in the MUX to see theyre > >the same, that IS of course, assuming theyre using the same equipment on > >both paths. > >Do they (Verizon) look ok to themselves, looped up at their end, then loop > >up from your end to them, do they still look ok? Proof of path, no > >transport errors. > >Reverse procedure, loop yourself locally, and assure what youre > >transmitting is the same as the circuit spec. THen have them loop their end > >to you, this should identify the single leg thats falling over. > >Are they OK'ed for intrusive testing? If its down, feel free, but make them > >report innie-outies, so someone doesn't leave a cable in a jack. > >Did this circuit ever pass 24 hour burnin? Ive seen circuits run fine, and > >frame slip all over the place...error correction fixes much, but they wont > >hold up when the circuit gets loaded. > >Any other equipment errors on either ends? > >If they changed out cards, and the problem went away, why did they put the > >old cards back? They should of went to testlab or the mfgr for proofing. > > > > > > > >At 11:14 5/11/2003 -0700, you wrote: > > >Ok, sure... I have tw0 questions regarding DSx vs Tx signaling and how to > > >determine if non-CPE is faulty upstream from CPE. CPE is the same, but > > >network equipment from telco doesn't appear to be different, yet they (IE: > > >Verizon) state it is. I've had an OC48 card and a DS3 card go bad @ > > >Verizon's end, but they kept insisting that timing on CPE was incorrect > > >(Which it wasn't, as has been proven by their swapping out a DS3 and OC48 > > >card on their end, 'FIXING' the timing issues on my end.. snort.). I've > > >tried pretty much everything on my end with these 2 occurrances, including > > >swapping out telco equipment at demarc where I could get ahold of it, and > > >enabling performance monitoring on telco switch, but I always found that > > >this didn't isolate the fault until a few months of troubleshooting > goes by > > >with the telco. Tried scoping the lines - t-berd, packet analyzer, no > help > > >there. In fact, one T1 scoped as a 56k only line, even though we were > > >passing 1.5ishk data through it + had 3 voice channels lit. The Tx vs DSx > > >was the second line, where they swapped me from copper to fiber on their > > >end, but they didn't change network equipment at demarc. Sounds fishy to > > >me... I think I'm getting my leg pulled - their using hyprercards on the > > >demarc. Do these support Tx and DSx signalling concurrently? > >Manager, Corporate Security Voice: 217-352-3207 >Data Comm for Business, Inc. Fax: 217-897-6600 >2949 CR >1000N Web: http://www.dcbnet.com >Dewey, IL. 61840 Email: >Jmccain@d... > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7335 From: Matt Paulsen Date: Tue May 13, 2003 9:48pm Subject: RE: T1 problem I've told the company to pawn out the 40K for 2 source servers and we'll use the telco's time source as primary and ours as secondary with GPS/CDPD/NIST dialback. Verizon's happy because we can tower out 10 miles as so from the 1st side and extend their signal, so buyin from Verizon's not an issue, just from the company management where I'm getting buyin since "it's worked fine for years". I think clocking IS an issue, but not THE root cause for the issues seen to date on these circuits, just indications of issues upstream that are coming to light now. My concern is aging equipment within Verizon's SONET network and slipping existing circuits from Tx to DSx as their CO's are upgraded with newer switches, coupled with a 50% bankruptcy rate within the telecomm industry in Portland, OR, land of fiber, and 12ish dead telco's in 1 year. These days, telco's are pitching 100MB (not Mb) long haul at $1500/month. Makes me wonder about Verizon's, Comcast's (or anyone's) long term viability to service life systems. I'm really thinking of dropping the larger carriers and going local. Cabling is all cat6, runs are never longer than 10' in MDF's where telco equipment is, we have a lot of v35's that are WAY WAY long, which I've identified and will get fixed given budget/cycle (closing out the year). I'm investigating dropping the T1's and FR services and batching everything into an OCx, looking at costs on that now. -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: Tuesday, May 13, 2003 11:48 AM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] T1 problem I tend to feel the same about the clock John. Yes, I have no problem with anyone wanting their own stratum server, but it always should be slaved to whatever the telco is sending you. When I worked at one of the big TLA telcos, we had a GPS system but it always was slaved to the reference data from ATT NYC , for all its propagation delays etc. We had a lot of sonet loops in a downtown core, and synchronous must be, well, synchronous, so timing was a priority. The fact that he sees circuits running within a supposedly bad group is indicative of a timing issue above. At 15:44 5/12/2003 -0500, you wrote: >( I didn't snip any of the history because there's lots of tech details I >didn't want to forget) > >First thing I notice is the classic symptoms of clock slippage. Check for >jitter, and I'd quickly look to make sure someone didn't change the clock >source on any one piece of equipment. The "runs poorly for hours/days, >craps out, then works fine for a while, and repeats" is classic for clock >problems. As a general rule, all CPE should source clock from the telco in >North America... always. We find exceptions, but they are rare and the >people installing them are usually well versed in the issues. > >We've also found lots of problems when using Cat 3 or Cat 5 cable for T1 >cable. T1 specs are pretty loose, but call for a mythical 19 gauge ABAM >cable. I recommend be using telco cable instead of tightly twisted cat >3/5. I've seen lots of installations where a 3' 10BaseT jumper rolled the >T1 signals to the point where they were unusable, and a huge number of >installations where Cat 5 simply killed it. Look at a T1 signal after 50' >of 10baseT cable, and you will see what I mean. Another problem is that >much lower category cable is actually intentionally mis-marked down from >cat 5 or better. >Sometimes, we've had customers split pairs on cat 3 and solve some of the >capacitance problems though. > >Another place to look would be one's density. We've sometimes found telco >COs that were misprogrammed and a heavy one's density would cause it to >jump clock. > >Hope I gave you a few new avenues to explore. At least we're back onto >tech discussions on the list. > >And for others, here are a couple of good references for T1 stuff: > >All You Wanted to Know About T1 But Were Afraid to Ask, >http://www.dcbnet.com/notes/9611t1.html > >T-1 /E1 / PRI Technology Overview >http://www.patton.com/support/pdf/t1-e1-pri_tech_over_lo-res.pdf > >Cheers, >JohnM > > > > >At 08:02 PM 5/11/2003 -0700, you wrote: > >A few pointers, but first, I'm still interested in finding out how to remote > >scan the telco to find hardware faults in their equipment from my > >end..... -m.. now to the details: > >A: The equipment has all been discovered at this point to be faulty telco > >equipment. > >B: Hardware loop back from router to CSU/DSU was performed on both ends > >where both circuits were direct t1's on 'private' network. IE: No internet, > >classic old school t1, point to point. > >C: These are 2 separate issues, not interrelated. The DS3's/Tx's etc. do > >not cross the same OC48 paths, different originating CO's, different circuit > >ID's all the way through. > >D: Both sites experienced same errors - frequent voice/data interruption, > >from seconds to hours of downtime. > >E: Both sites were under performance monitoring at telco switch center. > >Both showed errors up to the link down, then both would run clean for a > >month or so, then error out. Telco can only hold 7 days, that being an > >issue, of performance monitors before it FIFO's. > >F: Timing is served from Verizon using symmetricom time servers, > >cdpd/gps/nist dialback, rubidium and quartz oscillators, we're pulling from > >them, csu/dsu's are set to read one from network, one from remote/"local". > >G: ONE of our CSU/DSU sources is running at +10Db from it to them, showing a > >total of +28-+32Db at the hypercard. Not good, but not the cause, I suspect > >it's been programmed that way, haven't pinned out a cable to check yet. > >H: Both ends of CSU/DSU's are synching to network but not telco, and are > >deframing after 1 second of frame establishment. > >I: One of the CSU/DSU's showed traffic as inverse on channel 13 only, but > >was passing a full T1 of traffic even though it showed channel 13 only > >active. > >J: Loops run at ping ip, count 1500, rate 1500, 0x0000, 0x1111, 0xffff, > >0xaaaa all clean from routers to CSU/DSU's (used a cat5e, my teeth and > >fingers to make a loopback.. yea, we're rolling in cash over here.) > >K: Verizon's ends all look clean through and through, they have not > >initiated a point to point - a-z loop test, just a-m and z-n. > >L: Peoples lives depend on our network being up so no, no one would be > >cleared to a room unless escorted by security / myself / my group. Verizon > >BRC is cleared for intrusive testing from remote center. I have their 3rd > >level field tech's cellphone... we're buds at this point. > >M: Circuits have been running for 2+ years each but are now exhibiting these > >problems. > >N: They put a card in slot2 at one site and left the card in slot1 'just in > >case' - I get opportunistic when troubleshooting. We had that site narrowed > >to a 3' cable at one point as being the only probable cause for the issue > >until I was passing data by swapping out a data only CSU for the voice/data > >CSU. > > > >-----Original Message----- > >From: kondrak [mailto:kondrak@s...] > >Sent: Sunday, May 11, 2003 2:18 PM > >To: mpaulsen6@a... > >Subject: RE: [TSCM-L] Digest Number 1263 > > > > > >Ok, Matt, IF its your equipment on your end, (as they allege) and you do a > >hard loopback for them and they report timing issues, its got to be them > >right? If theyre sending improperly framed packets, and they see it looped > >back, its got to be their origination. Im talking intrusive, cable > >loopback, not softswitched. > >I definitely smell a timing problem from them, or a framing problem. Can > >you loop them up to you from your end? Errors? This would verify your CPE. > >I sense a mux problem between their OC48 and the T3 card. > >Do you have any other circuits on different T3's from the same OC48?? Are > >they working? If so, they can check the settings in the MUX to see theyre > >the same, that IS of course, assuming theyre using the same equipment on > >both paths. > >Do they (Verizon) look ok to themselves, looped up at their end, then loop > >up from your end to them, do they still look ok? Proof of path, no > >transport errors. > >Reverse procedure, loop yourself locally, and assure what youre > >transmitting is the same as the circuit spec. THen have them loop their end > >to you, this should identify the single leg thats falling over. > >Are they OK'ed for intrusive testing? If its down, feel free, but make them > >report innie-outies, so someone doesn't leave a cable in a jack. > >Did this circuit ever pass 24 hour burnin? Ive seen circuits run fine, and > >frame slip all over the place...error correction fixes much, but they wont > >hold up when the circuit gets loaded. > >Any other equipment errors on either ends? > >If they changed out cards, and the problem went away, why did they put the > >old cards back? They should of went to testlab or the mfgr for proofing. > > > > > > > >At 11:14 5/11/2003 -0700, you wrote: > > >Ok, sure... I have tw0 questions regarding DSx vs Tx signaling and how to > > >determine if non-CPE is faulty upstream from CPE. CPE is the same, but > > >network equipment from telco doesn't appear to be different, yet they (IE: > > >Verizon) state it is. I've had an OC48 card and a DS3 card go bad @ > > >Verizon's end, but they kept insisting that timing on CPE was incorrect > > >(Which it wasn't, as has been proven by their swapping out a DS3 and OC48 > > >card on their end, 'FIXING' the timing issues on my end.. snort.). I've > > >tried pretty much everything on my end with these 2 occurrances, including > > >swapping out telco equipment at demarc where I could get ahold of it, and > > >enabling performance monitoring on telco switch, but I always found that > > >this didn't isolate the fault until a few months of troubleshooting > goes by > > >with the telco. Tried scoping the lines - t-berd, packet analyzer, no > help > > >there. In fact, one T1 scoped as a 56k only line, even though we were > > >passing 1.5ishk data through it + had 3 voice channels lit. The Tx vs DSx > > >was the second line, where they swapped me from copper to fiber on their > > >end, but they didn't change network equipment at demarc. Sounds fishy to > > >me... I think I'm getting my leg pulled - their using hyprercards on the > > >demarc. Do these support Tx and DSx signalling concurrently? > >Manager, Corporate Security Voice: 217-352-3207 >Data Comm for Business, Inc. Fax: 217-897-6600 >2949 CR >1000N Web: http://www.dcbnet.com >Dewey, IL. 61840 Email: >Jmccain@d... > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7336 From: Matt Paulsen Date: Tue May 13, 2003 9:51pm Subject: RE: pirate radios Looking from 800Mhz to 2.4ghz, I have a few tools on hand - spectrum analyzer from 1hz to 2ghz, airopeek/wifi, etc. for 802.11 But would like to be able to not just identify that I have these radios around, but be able to difinitively walk up to them, and be able to shut them down, don't seem to have any way of understanding how to get signal strength/location based on what I have. Should I just triangulate manually? -----Original Message----- From: John McCain [mailto:jmccain@d...] Sent: Tuesday, May 13, 2003 9:36 AM To: mpaulsen6@a... Subject: Re: [TSCM-L] pirate radios Matt, If you're trying what I think (looking for rogue access points or AP users), I'd just buy a small 2.4 Ghz yagi from ebay along with a PC card that accepts a remote antenna and works with kismet/etc. They are usually delivered within a couple of days, and the cost is under $100. Then again, you could be after something entirely different... if so, give us more clues :). Cheers, JohnM At 06:39 PM 5/12/2003 -0700, you wrote: >Hi, > >Have a few pirate radios I'd like to isolate down, does anyone have a good >antenna design, portable, handheld, that would let me 'ping' the location of >the pirate radios easily using a laptop / antenna interface. (Yes, I know >I'm not providing much 'pirate radio' detail.) > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7337 From: Matt Paulsen Date: Tue May 13, 2003 10:44pm Subject: paging system? Looking for a paging system that will integrate with lenel's onguard alarm agent system, please contact offline. I'm considering using telalert/openview integration since I have that already, any suggestions on others? 7338 From: Matt Paulsen Date: Tue May 13, 2003 10:01pm Subject: RE: FW: (unknown) 4908's - Version 12.0(7)W5(15d) 3508 side "a" - Version 12.0(5.2)XU 2950 side "a" - Version 12.1.13.EA1b 3508 side "b" - Version 12.0(5)WC3b 3548 side "b" -Version 12.0(5)WC3b -----Original Message----- From: jamesworld@i... [mailto:jamesworld@i...] Sent: Monday, May 12, 2003 7:11 PM To: mpaulsen6@a... Cc: 'TSCM submissions' Subject: RE: FW: [TSCM-L] (unknown) Matt, I have a question which will help me answer your vlan Question. Which IOS are you using? on each? Thanks, -james At 20:05 5/12/2003, Matt Paulsen wrote: >Hi, > >If I were a police officer, I'd say thanks for calling me one, that's quite >a compliment. As it is nope, I'm not, but I do work with hospitals. As >someone that does do TSCM related to LAN/WAN architecture and >infosec/commsec, psychology, not pysciatry (sic) is more apt to be employed >as part of an overall security plan for HIPAA compliance, with respects to >social engineering during live intrusion testing, but that compliance >requirement won't be instituted for nearly 2 years, so I'm not really >focusing directly on it right now, moreso, just getting medical >organizations used to the ideas of security, even though it is probably one >of the larger areas of concern for organizations facing security threats. > >Speaking of TSCM'ing a LAN... a question for the group - I'm currently >running VTP/DOT1Q encap on some switches and using some 4908g-l3 switches as >'core routers' (yes, I know it's not core for those Cisco purists in the >group) running HSRP. IE: HRSP core, to DOT1Q / VTP network - full mesh, and >am bringing up some ip based security servers to replace / augment the >existing CCTV installion under a VLAN, say ID # 100, where the rest of the >local VLAN will be the same. > >Now, since security should have it's own network, I'm contemplating >subnetting and VLAN'ing it out to its own VLAN through the devices. Here's >the question.. How hard would it be for someone to intrude upon the IP >stream and subsequently get an IP on a non-assigned port for that VLAN. I've >never heard of such an occurrance. So it seems that it would be more likely >that a tap in the fiber or copper streams that are either trunking or >non-trunking would be a problem... In that case, I've got nearly 2/3 of a >mile to look at securing. > >For example: 4908 - 3508 - 3548, vlan id 100 carried down on 192.168.1/24 >network, where the ip video server will sit, on port 4 of the 3548, which >has gbics up to the 3508, which goes to the 4908. > >The viewing station will be connected differently, in a different building, >for example: > >4908 - 3508 - 2950 - vlan id 100 carried down on 192.168.1/24 network, on >port 4 for example, on the 2950, with gbics all through to the top as >before. > >SO.... IF VLAN 100 is only associated on the GBICs of the 4908's, 3508's, >2950, and 3548 on both ends of the physical plant, as well as the two 10/100 >copper drops from the 2950 and the 3548 respectively, how could someone >intrude upon the IP subnet or the IP stream - I assume that a sniffer can >assemble/disassemble, but can a snooping device actually plant itself on the >VLAN 100 if there is no associated port activated for it, and view live >streams of data? > >Thanks, > >Matt > >PS - For the Crazy Psych Dude getting a fixation on me... Do yourself and us >a favor, get checked in. Also, will you PLEASE FIND THE CAPS LOCK KEY on >your keyboard, should be right next to that other one called TAB with the >arrows on it and use it, works wonders when typing. Yes, I know the shift >keys can be formidable objects during those early stages of learning how to >type properly, but the benefits will outweigh the hardships in the long run >and who knows, maybe at some point your dementia will be under control and >you'll get a lovely job as a typist in a law firm. Unless you have a mac... >try next to the option or apple looking keys and get a job as an artist, or >better yet a sci-fi / mystery writer... The eight ball says... IT COULD BE >RIGHT. > >-----Original Message----- >From: allan ginsberg [mailto:negrodawn2003@y...] >Sent: Monday, May 12, 2003 5:36 PM >To: mpaulsen6@a... >Subject: Re: FW: [TSCM-L] (unknown) > > >--- Matt Paulsen wrote: > > Get help. Here's a start. >REPLY: MATT MUST BE A COP...SINCE WHEN DO TSCM ERS >PRACTICE PYSCHIATRY?...STICK TO WHAT YOU KNOW BEST, >STEALING PEOPLE'S PRIVACY THROUGH ELECTRONICS. > >__________________________________ >Do you Yahoo!? >The New Yahoo! Search - Faster. Easier. Bingo. >http://search.yahoo.com > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7339 From: Matt Paulsen Date: Wed May 14, 2003 0:41am Subject: Little Melissa Got this from a friend that works at an airline.... -m Little Melissa comes home from first grade and tells her father that they learned about the history of Valentine's Day. "Since Valentine's Day is for a Christian saint and we're Jewish," she asks, "will God get mad at me for giving someone a valentine?" Melissa's father thinks a bit, then says "No, I don't think God would get mad. Who do you want to give a valentine to?" "Osama Bin Laden," she says. "Why Osama Bin Laden," her father asks in shock... "Well," she says, "I thought that if a little American Jewish girl could have enough love to give Osama a valentine, he might start to think that maybe we're not all bad, and maybe start loving people a little bit. And if other kids saw what I did and sent valentines to Osama, he'd love everyone a lot. And then he'd start going all over the place to tell everyone how much he loved them and how he didn't hate anyone anymore." Her father's heart swells and he looks at his daughter with newfound pride. "Melissa, that's the most wonderful thing I've ever heard." "I know," Melissa says, "and once that gets him out in the open, the Marines could blow the shit out of him." 7340 From: Matt Paulsen Date: Wed May 14, 2003 0:34am Subject: RE: FW: (unknown) Their smartnetted, and I've got shelved swapouts. I know their (except the 2950) out of date, just took over the site which has some serious issues to resolve. encap .1q throughout Will look into the specific version details you put down and the other items, I'm presenting a roadmap shortly to get this resolved, brought it up a few weeks ago for the 1st time. -----Original Message----- From: jamesworld@i... [mailto:jamesworld@i...] Sent: Tuesday, May 13, 2003 9:01 PM To: mpaulsen6@a... Cc: 'TSCM submissions' Subject: RE: FW: [TSCM-L] (unknown) Over all you should have smartnet and these NEED to be updated. 3500XL's should be at 120-5.WC7 4908 should be at 12.0(18)W5(22b) minimum and optimally 12.0(25)W5(27) see my previous about VLAN Trunk issues. Are you using ISL or .1q? At 22:01 5/13/2003, Matt Paulsen wrote: >4908's - Version 12.0(7)W5(15d) >3508 side "a" - Version 12.0(5.2)XU >2950 side "a" - Version 12.1.13.EA1b {{{ Current! Yea!!! >3508 side "b" - Version 12.0(5)WC3b >3548 side "b" -Version 12.0(5)WC3b > >-----Original Message----- >From: jamesworld@i... [mailto:jamesworld@i...] >Sent: Monday, May 12, 2003 7:11 PM >To: mpaulsen6@a... >Cc: 'TSCM submissions' >Subject: RE: FW: [TSCM-L] (unknown) > > >Matt, > >I have a question which will help me answer your vlan Question. Which IOS >are you using? on each? > >Thanks, >-james > > >At 20:05 5/12/2003, Matt Paulsen wrote: > >Hi, > > > >If I were a police officer, I'd say thanks for calling me one, that's quite > >a compliment. As it is nope, I'm not, but I do work with hospitals. As > >someone that does do TSCM related to LAN/WAN architecture and > >infosec/commsec, psychology, not pysciatry (sic) is more apt to be employed > >as part of an overall security plan for HIPAA compliance, with respects to > >social engineering during live intrusion testing, but that compliance > >requirement won't be instituted for nearly 2 years, so I'm not really > >focusing directly on it right now, moreso, just getting medical > >organizations used to the ideas of security, even though it is probably one > >of the larger areas of concern for organizations facing security threats. > > > >Speaking of TSCM'ing a LAN... a question for the group - I'm currently > >running VTP/DOT1Q encap on some switches and using some 4908g-l3 switches >as > >'core routers' (yes, I know it's not core for those Cisco purists in the > >group) running HSRP. IE: HRSP core, to DOT1Q / VTP network - full mesh, >and > >am bringing up some ip based security servers to replace / augment the > >existing CCTV installion under a VLAN, say ID # 100, where the rest of the > >local VLAN will be the same. > > > >Now, since security should have it's own network, I'm contemplating > >subnetting and VLAN'ing it out to its own VLAN through the devices. Here's > >the question.. How hard would it be for someone to intrude upon the IP > >stream and subsequently get an IP on a non-assigned port for that VLAN. >I've > >never heard of such an occurrance. So it seems that it would be more >likely > >that a tap in the fiber or copper streams that are either trunking or > >non-trunking would be a problem... In that case, I've got nearly 2/3 of a > >mile to look at securing. > > > >For example: 4908 - 3508 - 3548, vlan id 100 carried down on 192.168.1/24 > >network, where the ip video server will sit, on port 4 of the 3548, which > >has gbics up to the 3508, which goes to the 4908. > > > >The viewing station will be connected differently, in a different building, > >for example: > > > >4908 - 3508 - 2950 - vlan id 100 carried down on 192.168.1/24 network, on > >port 4 for example, on the 2950, with gbics all through to the top as > >before. > > > >SO.... IF VLAN 100 is only associated on the GBICs of the 4908's, 3508's, > >2950, and 3548 on both ends of the physical plant, as well as the two >10/100 > >copper drops from the 2950 and the 3548 respectively, how could someone > >intrude upon the IP subnet or the IP stream - I assume that a sniffer can > >assemble/disassemble, but can a snooping device actually plant itself on >the > >VLAN 100 if there is no associated port activated for it, and view live > >streams of data? > > > >Thanks, > > > >Matt > > > >PS - For the Crazy Psych Dude getting a fixation on me... Do yourself and >us > >a favor, get checked in. Also, will you PLEASE FIND THE CAPS LOCK KEY on > >your keyboard, should be right next to that other one called TAB with the > >arrows on it and use it, works wonders when typing. Yes, I know the shift > >keys can be formidable objects during those early stages of learning how to > >type properly, but the benefits will outweigh the hardships in the long run > >and who knows, maybe at some point your dementia will be under control and > >you'll get a lovely job as a typist in a law firm. Unless you have a >mac... > >try next to the option or apple looking keys and get a job as an artist, or > >better yet a sci-fi / mystery writer... The eight ball says... IT COULD BE > >RIGHT. > > > >-----Original Message----- > >From: allan ginsberg [mailto:negrodawn2003@y...] > >Sent: Monday, May 12, 2003 5:36 PM > >To: mpaulsen6@a... > >Subject: Re: FW: [TSCM-L] (unknown) > > > > > >--- Matt Paulsen wrote: > > > Get help. Here's a start. > >REPLY: MATT MUST BE A COP...SINCE WHEN DO TSCM ERS > >PRACTICE PYSCHIATRY?...STICK TO WHAT YOU KNOW BEST, > >STEALING PEOPLE'S PRIVACY THROUGH ELECTRONICS. > > > >__________________________________ > >Do you Yahoo!? > >The New Yahoo! Search - Faster. Easier. Bingo. > >http://search.yahoo.com > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > > > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7341 From: Date: Wed May 14, 2003 1:24pm Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7342 From: Date: Wed May 14, 2003 1:24pm Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7343 From: Date: Wed May 14, 2003 8:47pm Subject: Reporters Seeking Scott Peterson Tapes Reporters Seeking Scott Peterson Tapes By BRIAN MELLEY .c The Associated Press SACRAMENTO (AP) - Reporters recorded on wiretapped phone calls to murder suspect Scott Peterson filed a request Wednesday to listen to the tapes, and some may try to bar their conversations from being used as evidence. Lawyers representing 11 reporters filed motions in a county court in Modesto to review intercepted phone calls to determine whether they would invoke laws that protect reporters' notes. Journalists are protected by state and federal laws from revealing unpublished work, and interviews caught on wiretaps should be treated the same way as documents protected under attorney-client privilege, said Duffy Carolan, a lawyer representing reporters from The Modesto Bee, ABC and NBC. John Goold, a Stanislaus County prosecutor, said his office will not contest the motions at a June 6 hearing. A judge could allow reporters to review tapes of their own conversations, which are currently sealed by the court. Prosecutors notified 66 people whose conversations were intercepted from Jan. 10 to Feb. 4 under a court-ordered wiretap to gather evidence in the disappearance of Laci Peterson, 27, a pregnant substitute teacher. Scott Peterson, 30, has pleaded innocent to murdering his wife and unborn son. Prosecutors have said they will seek the death penalty if he is convicted. Prosecutors said interviews Scott Peterson gave reporters may have been monitored in case the fertilizer salesman confessed. Defense lawyer Kirk McAllister, one of Scott Peterson's lawyers, also was notified that investigators intercepted calls. McAllister said he is skeptical of claims that recording equipment was shut off when it became clear that it was Scott Peterson's lawyer on the other end of the line. 05/14/03 23:02 EDT [Non-text portions of this message have been removed] 7344 From: Robin Hunter Date: Tue May 13, 2003 10:59am Subject: Answer to an often asked question WHO IS JACK SCHITT ? For some time many of us have wondered who is Jack Schitt? We find ourselves at a loss when someone says "You don't know Jack Schitt!" Well, thanks to my genealogy efforts, you can now respond in an intellectual way. Jack Schitt is the only son of Awe Schitt. Awe Schitt, the fertililizer magnate, married O Schitt, the owner of Needeep N Schitt, Plc. They produced one son, Jack. In turn, Jack Schitt married Noe Schitt. The deeply religious couple produced six lovely children, namely Holie Schitt, Giva Schitt, Fulla Schitt, Bull Schitt and the twins Deap Schitt and Dip Schitt. Against her parents wishes Deap Schitt married her second cousin Dumb Schitt, a high school dropout. Unfortunately after being married 15 years, Jack and Noe Schitt divorced. Noe Schitt later married Ted Sherlock and because her kids were living with them she wanted to keep her previous name. She was then known as Noe Schitt Sherlock. Meanwhile, Dip Schitt married Loda Schitt who produced a son with a rather nervous disposition named Chicken Schitt. Two of Jack's other six children, Fulla Schitt and Giva Schitt were inseperable throughout childhood and subsequently married the Happens brothers in a dual ceremony. The local newspaper announced the Schitt Happens nuptials. The Schitt-Happens children were Dawg, Byrd and Hoarse. Their uncle Bull Schitt left home to tour the world. He recently arrived home with his new Italian bride, Pisa Schitt. Now when someone says, "You don't know Jack Schitt," you can correct them. regards from Scotland, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. [Non-text portions of this message have been removed] 7345 From: Date: Tue May 13, 2003 10:53pm Subject: RE: FW: (unknown) Make sure the trunk traffic is on it's on VLAN. Make sure that ports are disabled for trunking unless they are used explicitly in trunking. Use Fiber in an isolated conduit (old school physical sec stuff - yes fiber can be tapped but it's got a higher skill level associated to it than copper). TACACS your switches. Consider using VMPS http://www.cisco.com/en/US/products/hw/switches/ps663/products_configuration_guide_chapter09186a008007d3c2.html Use Port Security when you can. - yes it adds admin overhead, but such is the weight of good security. If you need anything else....lemme know -James At 23:36 5/12/2003, Matt Paulsen wrote: >A question from a listmember came in as far as which IOS's are in use. >12.1.13.EA1b and down, a lot of 12.05's of various versions and some 12.1's >depending on the devices. > >reference: > >Speaking of TSCM'ing a LAN... a question for the group - I'm currently > >running VTP/DOT1Q encap on some switches and using some 4908g-l3 switches >as > >'core routers' (yes, I know it's not core for those Cisco purists in the > >group) r > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7346 From: A.Lizard Date: Thu May 15, 2003 2:07pm Subject: an interesting Bruce Schneier article from Encryption and Wiretapping by Bruce Schneier CRYPTO-GRAM May 15, 2003 http://www.counterpane.com/crypto-gram.html -------------- quote [commenting on "Report of the Director of the Administrative Office of the United States Courts on Applications for Orders Authorizing or Approving the Interception of Wire, Oral, or Electronic Communications,"] Two points immediately spring forward: 1) Encryption of phone communications is very uncommon. Sixteen cases of encryption out of 1,358 wiretaps is a little more than one percent. Almost no suspected criminals use voice encryption. 2) Encryption of phone conversations isn't very effective. Every time law enforcement encountered encryption, they were able to bypass it. I assume that local law enforcement agencies don't have the means to brute-force DES keys (for example). My guess is that the voice encryption was relatively easy to bypass. These two points can be easily explained by the fact that telephones are closed devices. Users can't download software onto them like they can on computers. No one can write a free encryption program for phones. Even software manufacturers will find it more expensive to sell an added feature for a phone system than for a computer system. This means that telephone security is a narrow field. Encrypted phones are expensive. Encrypted phones are designed and manufactured by companies who believe in secrecy. Telephone encryption is closed from scrutiny; the software is not subject to peer review. It should come as no surprise that the result is a poor selection of expensive lousy telephone security products. -------------- end quote Comments? A.Lizard ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -Benjamin Franklin, Historical Review of Pennsylvania, 1753 Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... PGP 8.0 key available by request or keyserver. Download PGP from http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html For new music, try http://www.eliangedeon.com ************************************************************************ 7347 From: Damien O'Rourke Date: Fri May 16, 2003 6:14am Subject: Request for an IEEE paper Hi, I was just wondering if anyone might have a full copy of the following paper: Bevacqua, F. & Cipollone, E. & Morviducci, A. & Venditti, L.: Shielded enclosures design for EM data safety. Electromagnetic Compatibility, Symposium Record., 1989 International Symposium on, 1989. When I tried to order it in only one page came back. Also, when I got access to the IEEE papers on the Internet and downloaded it, still only one page was returned. Surely there is more to it than this? If anyone could possibly send me a copy of the full paper (or at least explain to me why I can only get one page of it) I would be very grateful. Thanks in advance. Best Regards, Damien O'Rourke. 7348 From: Date: Wed May 14, 2003 4:56pm Subject: help with cctv Need help. Have been tasked with installing new CCTV system. "They" want to use existing coax (most RG 58U, 10 years old). Longest run 1/4+mile. Need formulas for loss at splices and distance. New task for an old dog who hasn't worked with this stuff in 20 years. Hell, you guys lost me with fiber. Thanks Guppy [Non-text portions of this message have been removed] 7349 From: Date: Tue May 13, 2003 11:00pm Subject: RE: FW: (unknown) Over all you should have smartnet and these NEED to be updated. 3500XL's should be at 120-5.WC7 4908 should be at 12.0(18)W5(22b) minimum and optimally 12.0(25)W5(27) see my previous about VLAN Trunk issues. Are you using ISL or .1q? At 22:01 5/13/2003, Matt Paulsen wrote: >4908's - Version 12.0(7)W5(15d) >3508 side "a" - Version 12.0(5.2)XU >2950 side "a" - Version 12.1.13.EA1b {{{ Current! Yea!!! >3508 side "b" - Version 12.0(5)WC3b >3548 side "b" -Version 12.0(5)WC3b > >-----Original Message----- >From: jamesworld@i... [mailto:jamesworld@i...] >Sent: Monday, May 12, 2003 7:11 PM >To: mpaulsen6@a... >Cc: 'TSCM submissions' >Subject: RE: FW: [TSCM-L] (unknown) > > >Matt, > >I have a question which will help me answer your vlan Question. Which IOS >are you using? on each? > >Thanks, >-james > > >At 20:05 5/12/2003, Matt Paulsen wrote: > >Hi, > > > >If I were a police officer, I'd say thanks for calling me one, that's quite > >a compliment. As it is nope, I'm not, but I do work with hospitals. As > >someone that does do TSCM related to LAN/WAN architecture and > >infosec/commsec, psychology, not pysciatry (sic) is more apt to be employed > >as part of an overall security plan for HIPAA compliance, with respects to > >social engineering during live intrusion testing, but that compliance > >requirement won't be instituted for nearly 2 years, so I'm not really > >focusing directly on it right now, moreso, just getting medical > >organizations used to the ideas of security, even though it is probably one > >of the larger areas of concern for organizations facing security threats. > > > >Speaking of TSCM'ing a LAN... a question for the group - I'm currently > >running VTP/DOT1Q encap on some switches and using some 4908g-l3 switches >as > >'core routers' (yes, I know it's not core for those Cisco purists in the > >group) running HSRP. IE: HRSP core, to DOT1Q / VTP network - full mesh, >and > >am bringing up some ip based security servers to replace / augment the > >existing CCTV installion under a VLAN, say ID # 100, where the rest of the > >local VLAN will be the same. > > > >Now, since security should have it's own network, I'm contemplating > >subnetting and VLAN'ing it out to its own VLAN through the devices. Here's > >the question.. How hard would it be for someone to intrude upon the IP > >stream and subsequently get an IP on a non-assigned port for that VLAN. >I've > >never heard of such an occurrance. So it seems that it would be more >likely > >that a tap in the fiber or copper streams that are either trunking or > >non-trunking would be a problem... In that case, I've got nearly 2/3 of a > >mile to look at securing. > > > >For example: 4908 - 3508 - 3548, vlan id 100 carried down on 192.168.1/24 > >network, where the ip video server will sit, on port 4 of the 3548, which > >has gbics up to the 3508, which goes to the 4908. > > > >The viewing station will be connected differently, in a different building, > >for example: > > > >4908 - 3508 - 2950 - vlan id 100 carried down on 192.168.1/24 network, on > >port 4 for example, on the 2950, with gbics all through to the top as > >before. > > > >SO.... IF VLAN 100 is only associated on the GBICs of the 4908's, 3508's, > >2950, and 3548 on both ends of the physical plant, as well as the two >10/100 > >copper drops from the 2950 and the 3548 respectively, how could someone > >intrude upon the IP subnet or the IP stream - I assume that a sniffer can > >assemble/disassemble, but can a snooping device actually plant itself on >the > >VLAN 100 if there is no associated port activated for it, and view live > >streams of data? > > > >Thanks, > > > >Matt > > > >PS - For the Crazy Psych Dude getting a fixation on me... Do yourself and >us > >a favor, get checked in. Also, will you PLEASE FIND THE CAPS LOCK KEY on > >your keyboard, should be right next to that other one called TAB with the > >arrows on it and use it, works wonders when typing. Yes, I know the shift > >keys can be formidable objects during those early stages of learning how to > >type properly, but the benefits will outweigh the hardships in the long run > >and who knows, maybe at some point your dementia will be under control and > >you'll get a lovely job as a typist in a law firm. Unless you have a >mac... > >try next to the option or apple looking keys and get a job as an artist, or > >better yet a sci-fi / mystery writer... The eight ball says... IT COULD BE > >RIGHT. > > > >-----Original Message----- > >From: allan ginsberg [mailto:negrodawn2003@y...] > >Sent: Monday, May 12, 2003 5:36 PM > >To: mpaulsen6@a... > >Subject: Re: FW: [TSCM-L] (unknown) > > > > > >--- Matt Paulsen wrote: > > > Get help. Here's a start. > >REPLY: MATT MUST BE A COP...SINCE WHEN DO TSCM ERS > >PRACTICE PYSCHIATRY?...STICK TO WHAT YOU KNOW BEST, > >STEALING PEOPLE'S PRIVACY THROUGH ELECTRONICS. > > > >__________________________________ > >Do you Yahoo!? > >The New Yahoo! Search - Faster. Easier. Bingo. > >http://search.yahoo.com > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > > > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7350 From: Steve Uhrig Date: Fri May 16, 2003 11:24am Subject: Re: help with cctv On 14 May 2003 at 21:56, PGibson957@a... wrote: > Need help. Have been tasked with installing new CCTV system. "They" > want to use existing coax (most RG 58U, 10 years old). Longest run > 1/4+mile. Need formulas for loss at splices and distance. Any ten year old coax is shot. A thousand feet with good coax is pushing it. RG58 is 50 ohm coax used for antenna lines. Video prefers 75 ohm coax, typically RG59 for jumpers or short runs, or RG6 or RG11 for longer runs. Twisted pair/Cat 5 with modems has almost obsoleted coax. www.atvresearch.com for materials other than cable. www.therfc.com for coax or connectors or anything cable related. Very little coax is used anymore except for jumpers. Don't take the job if you are not allowed to do it properly. Old coax is wrong. Long coax is wrong. Improper design and installation is wrong. Formulas are valid only for new, fresh coax. The minute you pull it off the spool all bets are off. Loss through splices depends on the quality of materials and workmanship, mostly workmanship. I recommend nothing other than 3 piece crimp BNCs and strain relief boots. www.therfc.com for connectors and tools. My strongest advice, having done video for a long long time, is to get someone current, competent and qualified to design the job and oversee its installation. Anything else and you're fooling yourself. That's the state of the onion. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7351 From: human being Date: Tue May 13, 2003 10:54pm Subject: electronics resources/mailing lists curious if anyone on the TSCM-List recommends any lists or resources for persons interested in electronics (beginners level, to intermediate) to learn the basics and ask questions related to basic electronics knowledge (building a custom project on a prototype circuit board, for instance). asking here because it seems TSCM requires a lot of knowledge of how things electronic work, and yet it is unknown if TSCM people also make the things (soldering electronics, custom printed circuits) or if that is another field (not the spy-shop gear trade, either) such as EE. -- that is to say, it is wondered if TSCM deals with the whole electronic realm (making things, finding things, understanding it in great detail and in many ways) and-or if there are niche areas for focus, of which TSCM is one. thanks for any info. also, for those with an interest there is a museum online that is quite interesting in this regard: http://www.sparkmuseum.com/ thanks. brian here's one basic reference resource.... http://ourworld.compuserve.com/homepages/g_knott/index1.htm 7352 From: kondrak Date: Fri May 16, 2003 3:47pm Subject: Re: Re: help with cctv Couldn't agree with Steve more..... For your own sanity, PLEASE update the installation to current "best design".... Chances are the old RG-58 will be useful to pull new cable, and if it were me, it would be fiber. Less lossy, better security, ease of adding more 'stuff' later on, and prices, while a bit higher are worth not having the pager go off in the night..... At 12:24 5/16/2003 -0400, you wrote: >On 14 May 2003 at 21:56, PGibson957@a... wrote: > > > Need help. Have been tasked with installing new CCTV system. "They" > > want to use existing coax (most RG 58U, 10 years old). Longest run > > 1/4+mile. Need formulas for loss at splices and distance. > >Any ten year old coax is shot. > >A thousand feet with good coax is pushing it. > >RG58 is 50 ohm coax used for antenna lines. Video prefers 75 ohm >coax, typically RG59 for jumpers or short runs, or RG6 or RG11 for >longer runs. > >Twisted pair/Cat 5 with modems has almost obsoleted coax. >www.atvresearch.com for materials other than cable. www.therfc.com >for coax or connectors or anything cable related. Very little coax is >used anymore except for jumpers. > >Don't take the job if you are not allowed to do it properly. > >Old coax is wrong. > >Long coax is wrong. > >Improper design and installation is wrong. > >Formulas are valid only for new, fresh coax. The minute you pull it >off the spool all bets are off. Loss through splices depends on the >quality of materials and workmanship, mostly workmanship. I recommend >nothing other than 3 piece crimp BNCs and strain relief boots. >www.therfc.com for connectors and tools. > >My strongest advice, having done video for a long long time, is to >get someone current, competent and qualified to design the job and >oversee its installation. Anything else and you're fooling yourself. > >That's the state of the onion. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS From: Steve Uhrig Date: Sun May 13, 2001 1:36pm Subject: Re: info needed on ICOM Radio Once upon a midnight dreary, Craig pondered, weak and weary: > i have aquired a few ICOM U12 radios but have no idea about > the specs or re-programing. I have tried the usual ways and > links. The U12 is a long obsolete diode programmable portable at least 17-18 years out of production. 12 channel UHF. No tone which now is mandatory on UHF unless someone happened to add a Comspec board. To change frequencies involves building a new diode matrix board, and calculating the placement of the diodes using a Karnaugh Map. The matrix board plugs in which makes it easier to attack. Most parts for this radio have been unavailable for years, and you will be unlikely to find a dealer or shop willing to fool with them. In their day they were OK radios. They were one of ICOMs first attempts at programmable radios. I wouldn't advise spending any money on them. If you have them and they happen to work and talk to each other and you have good batteries and a charger, you're in luck. If not, I would recommend offing them for whatever you can get. Check ebay current and recent listings; these things sometimes appear and sell for $10 each or so, generally to someone who wants them for parts. I bet I haven't seen one in at least 15 years. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3033 From: Gordon Mitchell Date: Sun May 13, 2001 10:28pm Subject: Re: ICOM IC -R3 Wrong! The R3 is very insensitive. It does good to pick up the Wavecom across a room. The FM TV band on the R3 only covers about half of the 2.4 GHz allocation (for many countries including the US). Don't count on using the R3 to check for TV on your spectrum analyzer output either, they don't allow selecting that mode at low frequencies. Overall it is a piece of junk. john.daniele@c... wrote: > > It's a fun little toy. ;-) > > Dawn Star on 05/06/2001 10:56:32 PM > > To: TSCM-L@yahoogroups.com > cc: > Subject: [TSCM-L] ICOM IC -R3 > > Does anyone know how well the ICOM IC-R3 does on detecting and viewing > 2.4GHZ wavecom flavor video transmissions? > > http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=1234717356 > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ [Non-text portions of this message have been removed] 3034 From: Craig Date: Sun May 13, 2001 4:57pm Subject: Re: info needed on ICOM Radio Hi.. Thanks for all your help. I very interested in "calculating the placement of the diodes using a Karnaugh Map. The matrix board plugs in which makes it easier to attack." Has anyone got any more info on this?. I realise the radios are old but i think i can use them for packet radio (or a private little low power packet network). I did open them all up and see the board with the marix layout.. Thanks again everyone.. Craig 3035 From: Steve Uhrig Date: Sun May 13, 2001 10:54pm Subject: Re: info needed on ICOM Radio Once upon a midnight dreary, Craig pondered, weak and weary: > Thanks for all your help. I very interested in "calculating the > placement of the diodes using a Karnaugh Map. The matrix board > plugs in which makes it easier to attack." Probably any older ARRL handbook. Don't know if they cover this sort of thing anymore. I know they did back in the 1970s. > Has anyone got any more info on this?. I realise the radios are > old but i think i can use them for packet radio (or a private > little low power packet network). I did open them all up and see > the board with the marix layout.. From the above it sounds like you have an amateur license, which means you probably have the ability to back engineer the diode matrix once you find some documentation, either general on diode matrices or the ICOM service manual on this radio. The board unplugs *carefully* from the back. Lift it straight up, maybe starting at one corner. CAREFULLY, there are many pins and they are small. Basically, the synthesizer in the radio was programmed via the diode matrix. I don't recall whether the matrix came full and you clipped unneeded diodes, or it was empty and you added them where needed. The processor read the X-Y of the matrix, one section at a time for each of the selected channels, and the placement of the diodes told it what frequency to operate. I don't remember if you programmed only the receive side and there was an offset for transmit through a repeater or a whole separate path for the transmit side. Your best bet is to try to score an original manual on the thing, or just go to a different radio. Older keyboard programmable synthesized portables and mobiles are so cheap, I can't see wasting any time on these unless you are doing it for the pure enjoyment and education, which is a perfectly acceptable reason for amateur operation. One caveat, the maximum battery voltage these things could take was something like 10 volts or 10.8 or whatever the lower voltage nicad was at the time. Do NOT apply 12 volts or something will destruct inside. I don't remember what. It was not uncommon to find these radios sold with 12 volt nicads because someone thought the higher voltage would make more power. With these radios, it didn't. UHF packet? I guess if you're doing a private network you could. I've got a GE commercial mobile up on ebay right now set up for 2 meter APRS, ready to plug into a TNC. Do a search on ebay with my email as the seller for all my items. Back some years ago, we programmed repeater IDs with diode matrices. Brings back memories. The ARRL handbook had a good writeup on calculating the matrix diodes for the data needed. You'd do it three times and get three different answers, but sooner or later you'd get it working right. Steve (WA3SWS, licensed 30 years this year and starting to feel old) ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3036 From: James M. Atkinson, Comm-Eng Date: Mon May 14, 2001 10:35am Subject: The Latest Darwin Awards Update [slightly off color] The Latest Darwin Awards Update The Darwin Awards, for those not familiar, are for those individuals who contribute to the survival of the fittest by eliminating themselves from the gene pool before they have a chance to breed. 1. A young Canadian man, searching for a way of getting drunk cheaply, because he had no money with which to buy alcohol, mixed gasoline with milk. Not surprisingly, this concoction made him ill, and he vomited into the fireplace in his house. This resulting explosion and fire burned his house down, killing both him and his sister. 2. A 34-year-old white male found dead in the basement of his home died of suffocation, according to police. He was approximately 6'2" tall and weighed 225 pounds. He was wearing a pleated skirt, white bra, black and white saddle shoes, and a woman's wig. It appeared that he was trying to create a schoolgirl's uniform look. He was also wearing a military gas mask that had the filter canister removed and a rubber hose attached in its place. The other end of the hose was connected to a one end of a hollow wooden tube approx. 12" long and 3" in diameter. The tube's other end was inserted into his rear end for reasons unknown, and was the cause of his suffocation. Police found the task of explaining the circumstances of his death to his family very awkward. 3. Three Brazilian men were flying in a light aircraft at low altitude when another plane approached. It appears that they decided to moon the occupants of the other plane, but lost control of their own aircraft and crashed. They were all found dead in the wreckage with their pants around their ankles. 4. A police officer in Ohio responded to a 911 call. She had no details before arriving, except that someone had reported that his father was not breathing. Upon arrival, the officer found the man face down on the couch, naked. When she rolled him over to check for a pulse and to start CPR, she noticed burn marks around his genitals. After the ambulance arrived and removed the man - who was declared dead on arrival at the hospital - the police made a closer inspection of the couch, and noticed that the man had made a hole between the cushions. Upon flipping the couch over, they discovered what caused his death. Apparently the man had a habit of putting his penis between the cushions, down into the hole and between two electrical sanders (with the sandpaper removed, for obvious reasons). According to the story, after his orgasm the discharge shorted out one of the sanders, electrocuting him. 5. A 27-year-old French woman lost control of her car on a highway near Marseilles and crashed into a tree, seriously injuring her passenger and killing herself. As a commonplace road accident, this would not have qualified for a Darwin nomination, were it not for the fact that the driver's attention had been distracted by her Tamagotchi key ring, which had started urgently beeping for food as she drove along. In an attempt to press the correct buttons to save the Tamagotchi's life, the woman lost her own. 6. A 22-year-old Reston, VA man was found dead after he tried to use octopus straps to bungee jump off a 70-foot railroad trestle. Fairfax County police said Eric Barcia, a fast-food worker, taped a bunch of these straps together, wrapped an end around one foot, anchored the other end to the trestle at Lake Accotink Park, jumped and hit the pavement. Warren Carmichael, a police spokesman, said investigators think Barcia was alone because his car was found nearby. "The length of the cord that he had assembled was greater than the distance between the trestle and the ground," Carmichael said. Police say the apparent cause of death was "major trauma". 7. A man in Alabama died from rattlesnake bites. It seems that he and a friend were playing a game of catch, using the rattlesnake as a ball. The friend - no doubt, a future Darwin Awards candidate - was hospitalized. 8. Employees in a medium-sized warehouse in west Texas noticed the smell of a gas leak. Sensibly, management evacuated the building, extinguishing all potential sources of ignition lights, power, etc. After the building had been evacuated, two technicians from the gas company were dispatched. Upon entering the building, they found they had difficulty navigating in the dark. To their frustration, none of the lights worked (you can see what's coming, can't you....?). Witnesses later described the sight of one of the technicians reaching into his pocket and retrieving an object, that resembled a cigarette lighter. Upon operation of the lighter-like object, the gas in the warehouse exploded, sending pieces of it up to three miles away. Nothing was found of the technicians, but the lighter was virtually untouched by the explosion. The technician suspected of causing the blast had never been thought of as 'bright' by his peers. 9. A Jacksonville, Florida woman recently had to summon emergency help after dragging her husband down the street behind their pickup truck. Chief Petty Officer Roman Styles, U.S. Coast Guard Station Jacksonville, was treated and released with a slight concussion and scrapes and bruises. It seems that Styles decided to repair damaged shingles on his house himself, instead of paying a contractor to do it for him. Prior to climbing up on his steep roof, Officer Styles tied a safety rope to the trailer hitch of his truck. Once on the peak of his roof he secured the other end of the line around his waist. He then slid over the top of the roof to repair the shingles. As luck would have it, right after he started to work, his teenage son called for a ride home from a Boy Scout trip. Jane Styles yelled to her husband she'd be right back and pulled away. "I didn't see the rope," Mrs. Styles said, "until I saw it in the rear-view mirror. By then I was half-way down the street." Bill Schlimm, a next door neighbor, said, "I'll never forget the look on Roman's face as he came sailing over the peak of that house. If it hadn't been for that tall cedar tree he would have been really hurt." 10. This would-be shoplifter in London attempted to steal two lobsters. This ingenious felon stuffed the lobsters into his trousers and headed for the door of the supermarket. Near the exit, our larcenous Londoner doubled over in excruciating pain and lay on the floor screaming. It seems that the lobster's claws were not tied and one of the tasty crustaceans decided to have the thief's family jewels for lunch. The paramedics were called in to remove the carnivorous crustacean from the very sensitive portion of this thief's anatomy. After they stopped laughing, a pair of pliers successfully accomplished the removal much to the relief of our suffering suspect. No information was available on the extent of the member's injuries or his future fatherhood potential. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3037 From: James M. Atkinson, Comm-Eng Date: Tue May 15, 2001 8:13am Subject: TREASON HUNT - Spying on the spies TREASON HUNT Spying on the spies http://wnd.com/news/article.asp?ARTICLE_ID=22818 Counterintelligence experts say privacy rules hamper their work By Toby Westerman C 2001 WorldNetDaily.com U.S. spy cops are hampered by privacy restrictions in their efforts to stem the activities of Russian agents working in the United States, according to counterintelligence experts, who deem the foreign operatives a "severe danger to the national security of this country." The statements were made by counterintelligence specialists addressing a Heritage Foundation Forum, "Espionage in the New Millennium," held last week and telecast on the C-SPAN network. Attempts to thwart the activities of foreign intelligence officers working in the U.S. are often hindered by laws dating back to the 1970s and 80s, which were initially designed to safeguard the privacy of U.S. citizens. As a result, counterintelligence agents are restrained from opening mail, even if sent to a known foreign agent, and severe restrictions are placed upon U.S. agents' use of wiretaps, according to Herbert Romerstein, author and head of the Office to Counter Soviet Disinformation at the U.S. Information Agency from 1983 to 1989. Romerstein is the author of "The Venona Secrets," an examination of the super-secret operation to counter Soviet espionage in the U.S. during World War II and in the post-World War II era. Referring to the case of FBI agent Robert Hanssen, accused of spying for the Soviet Union and then the Russian Federation, Romerstein stated that, "the Hanssen case couldn't be broken through standard intelligence methods." Hanssen's file was removed from Russian intelligence and physically transferred to the U.S., Romerstein reminded his audience. It is generally acknowledged that the FBI's investigation of Hanssen was based upon his Russian file. "I knew Bob Hanssen," Romerstein said, describing the accused spy as "a very interesting, very, very smart man." Hanssen "knew every strength, every weakness of the FBI's counterintelligence program," Romerstein stated. Hanssen's knowledge of FBI procedures and legal restraints on the agency enabled him to send stolen secrets through the mail without fear of detection, according to Romerstein. In Romerstein's estimation, Hanssen caused such severe damage to the U.S. intelligence network, that he should be executed if he does not actively cooperate with U.S. authorities to repair, to some degree, that damage. Although severely restricted in funding, the SVR -- the foreign intelligence successor to the KGB -- is able to recruit "the best of the best" from Russian universities who "know precisely want they want," according to Stanislav Levchenko, a participant in the forum and former KGB senior officer who defected in 1979. Levchenko stated that Russian intelligence today has little need for large numbers of agents in "residences" -- base facilities from which intelligence agents plan and carry out their operations. Following the collapse of the Soviet Union, Russian intelligence now seeks to use the increased number of Russians who are able to come to the U.S. and attempt to utilize them in intelligence operations. The SVR also cooperates with the "Russian Mafia," which Levchenko describes as "the most vicious criminal organization in the world." According to Levchenko, the SVR and the "Russian Mafia" are "getting united" -- pooling their efforts and resources. "The larger part of the Mafia," Levchenko said, "is running the state." Russian intelligence also gains important information from those doing business in Russia, including consultants, journalists and lecturers. According to Levchenko, the practice of using foreign visitors to Russia for intelligence purposes goes back to the time of Lenin. The intelligence threat to the U.S. is not, however, limited to traditional "cloak and dagger" activities. In an interview with WorldNetDaily, Kirk Reagan Menendez, deputy executive director of the Cuban American National Foundation, stated that the Russian and Chinese agents based in Lourdes, Cuba, are intercepting cell phone, e-mail and other methods of electronic communications in the U.S. Menendez, who has been monitoring the on-going "Wasp Network" spy case in Miami, told WND that the testimony of prosecution witnesses in court confirmed the electronic surveillance activities in Lourdes, which are directed at civilian as well as military targets. The "Wasp Network" refers to a group of Cuban agents operating in the United States who attempted to obtain sensitive military information for Havana. The FBI eventually broke the ring, and the ensuing trial has continued since last year. The Cuban-American exile community remains of prime interest for Cuban surveillance. Various sources have pointed to a large, sophisticated electronic surveillance -- and warfare -- presence in Cuba, employing Russian, Chinese and Cuban operatives. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3038 From: Richard Thieme Date: Mon May 14, 2001 10:48am Subject: Re: check out the archived broadcasts...these didn't make the national news in the US interesting how translations nuance things. I quote the Machiavelli as "... nothing more difficult to take in hand, more perilous to conduct, or more uncertain in its success than to take the lead in the introduction of a new order of things." As to Greer ... I thought this was really ground-breaking. I have worked in this area (as much as any of us can) - or played - for 20+ years. I am researching an article on "The Evidence for the Evidence of UFO Phenomena" which like Greer's efforts is focused on the quality of the witnesses I am interviewing - astronauts, aerospace executives, NASA etc. as well as a few local rural people who were blown away by what came down, for example, and went into the lake at dawn when they were fishing. Here (below) is a review I just wrote of Terry Hansen's "The Missing Times." for IUR, the CUFOS journal. Not yet for publication until it comes out next month. The book is about WHY it never makes it into the national news.... Richard Thieme At 12:51 PM 05/13/2001 -0500, you wrote: > > > >Steve McAlexander >Technology Architect and Business Process Engineer >830-627-7669 OFC >210-316-6489 Cellular > >"There is nothing more difficult to plan, more doubtful of success, nor more >dangerous to manage than the creation of a new system. For the initiator has >the enmity of all who would profit by the preservation of the old system and >merely lukewarm defenders in those who would gain by the new >one." --Machiavelli, 1513 "The Missing Times: News Media Complicity in the UFO Cover-up" by Terry Hansen Xlibris. 2000. Reviewed by Richard Thieme Richard Thieme (rthieme@t..., www.thiemeworks.com) speaks, writes and consults on the human dimensions of technology and the workplace. His interest in UFO phenomena was quickened in 1978 when, in the first parish he served as an Episcopal priest, an Air Force officer responded to a query about UFOs by saying, "Yes, they're real. We chase the damned things and we can't catch them." It is a staple of the modern era of propaganda and public relations that people can best be convinced of things they already tend to believe. Our information about the larger world beyond our immediate experience is filtered through many media. An external event is like a tree falling in the forest: there is no sound until the vibrations arrive in our minds. Each stage of the journey inflects or bends the vibrations and when they reach our ears, the event has been shaped into a jigsaw puzzle piece that fits what's already there. We believe what we hear when the context that gives a story meaning is reinforced and there is no other point of reference from which to judge. Terry Hansen's "The Missing Times: News Media Complicity in the UFO Cover-up" provides another point of reference. It makes a reasonable case for the use of mass media as part of the UFO cover-up that began with the CIA's Robertson Panel in 1953. Hansen and I have seen some of the same world, talked to some of the same people. We are part of an ongoing exploration of UFO phenomena and we do not take that exploration lightly. "The Missing Times" is written in that context, within a set of shared assumptions. If the reader shares that same contextual understanding of UFO phenomena and its modern history, this book will resonate, it will more than make sense. Insights will suddenly socket formerly disconnected bits of knowledge and knit them into a script. If one does not share that context, one might find oneself translating "complicity" into "conspiracy" without noticing the difference and dismiss Hansen as just another "UFO buff." But then one would miss the point of this well-conceived, well-executed exploration of a hypothesis stated clearly on the first page: "News organizations sometimes cooperate with government authorities to deceive the public about the nature and scope of the UFO phenomenon." Understatement like that rumbles throughout this book like thunder. Hansen establishes a single probable event - the appearance of UFOs over Minuteman Intercontinental Ballistic Missile (ICBM) sites near Great Falls Montana in 1975. He documents detailed coverage of the event in local media. He further documents the way a growing intelligence establishment used mass media as willing partners in the deception of the American public. Using the Robertson Panel as a baseline, he makes a case for the same behaviors, the same techniques, being used in the Great Falls incident in particular and UFO phenomena in general. Hansen explains how subtly and effectively propaganda is managed and disseminated through the elite media, creating a climate in which influence and nuance are more important that overt actions. He shows that the "intentional forgetting" of significant events happens far too frequently not to be part of a design. He shows that one need not spin outrageous "conspiracy theories" to see how collusion and complicity can spin a web of influence far beyond its primary agents. In short, Hansen explores in depth and detail the hypothesis that the same means used effectively in other areas - self-censorship by a willing press, acceptance of government propaganda as factual news - were used to manage UFO phenomena ever since the Robertson Panel initiated decades of intentional deception. Maybe it's synchronicity that I read this book and Richard M. Dolan's "UFOs and the National Security State" about the time that Dr. Stephen Greer held a press conference at the National Press Club in Washington, DC at which twenty people, many of them breaking secrecy oaths, volunteered information about radar and visual sightings, blocked information, and various disinformation campaigns. Those of us who have explored UFO phenomena seriously were not surprised because we share the landscape described by Hansen's and Dolan's books and by the Greer witnesses. We have read many of the same cases, many of us have talked at length to witnesses or investigated similar cases, and we have come to the tentative conclusion that many witnesses are credible, sincere and mostly accurate in describing encounters with anomalous vehicles and sometimes with the intelligences that make them go. In that context, Hansen's book is a thoughtful, intelligent, deliberate exploration of a single case in light of what we know of the intelligence establishment and how it has used the news media to advance its designs for social control. The problem with journalists like Terry Hansen is that they just won't grow up. They retain the youthful idealism that motivated them to go into the truth-uncovering and truth-disclosing business in the first place. When an event occurs that deals a blow to this idealism, it is a real shock to the system. They take it personally. They feel betrayed and write books like this to even the score. Hansen may have been motivated to write this book in part because for so many years we have lived in a force field of intense deliberate disinformation. We have come to doubt our own eyes, our own ears. We have been told to believe what we are told, rather than what we experience. As a counselor with sixteen years experience, I know what this does to people, whether in families or societies. We clam up. We become almost ashamed of our own experience, like children who have been abused, as if we are responsible for what others have done to us. We struggle simply to articulate the truth we know to be true in the face of the opposition, ridicule, discouragement, and worse that we have internalized, turning ourselves from prisoners into our own guards. So beneath the understatement of this book runs an undercurrent of outrage (or am I projecting?) because our history has been taken from us by unelected officials who replaced it with a false history. It should not take so much energy and hard work, in other words, simply to affirm that something that obviously took place ... took place. That is the swamp through which an independent self-publishing journalist like Hansen must wade, step by slow step, simply to document what would otherwise be the obvious truth because it was reported by so many people in the same way at the same time and is congruent with similar reports that agree in the small details from all over the world for over fifty years. In 1975, a friend of Hansen's living in Montana told him by telephone of a series of UFO events at Minuteman ICBM silos in Great Falls, Montana. Hansen had not heard anything of these events through the media in Minnesota where he lived, yet all of his investigations then and since support his conclusion - using "the most stringent standards of evidence commonly applied in journalism, law, and science, they certainly did occur." They certainly did occur. So why, he asks, were those local reports not filtered through various media into the public mind? Local media did report the events, as Hansen shows they often do. Those local accounts constitute what Hansen calls "folk reality," things we know and believe on a level of shared experience and common sense. But between those local reports and national coverage in news media, there is a great gulf of silence. Once we know that the truth is being withheld, we wonder what other truths are being withheld. In the absence of reality, we make it up, projecting fears and hopes onto a blank screen. Before that can happen, however, the masters of deception step into the vacuum and create a "pseudo-environment," as Walter Lippman, an early twentieth century theorist of propaganda and PR called it. First censorship, then the creation of a seamless weave of images, pseudo-facts, and explanatory narrative that knits them into a coherent script, creating virtual cages in which we real birds can flap our wings and have the illusion of flying. That pseudo-environment expands like a gas until it becomes the very air we breathe. Hansen calls the pseudo-environment "official reality," a consensus manufactured by the engineers of social control. While the "folk reality" was documented and hidden in Air Force archives that didn't surface until FOIA requests unearthed them years later, the pseudo environment became a belief system. For two years, there was silence until the 1975 sighting found its way into national media. It surfaced in a story in the National Inquirer. Hansen mentions the sly reference in the movie "Men in Black" to the use of tabloids to hide the truth in plain sight and suggests that this might be exactly what happened. Now, this is where those not contextualized by years of in-depth UFO and cold war studies might snicker. Their consensus reality identifies this kind of thinking as Fantasyland. But Hansen documents CIA connections to the National Inquirer - its founder even lists the CIA in his resume - and notes that papers like it are often used by the intelligence establishment to discredit stories around the world. Planting a true story in a disreputable rag discredits the story forever. No one will quote it and anyone who repeats it is vulnerable to ridicule. Hansen's book is also testimony to another phenomena: official reality sails in a leaky boat. Through the multiplicity of communication channels that we share, enough bits of "folk reality" escape the wrap-around media filter so we can trade them in a black market in truth, eventually building a model of an alternative reality. There is a critical difference, however: Journalists like Hansen adhere to principles of documentation, corroboration, and plausible reasoned arguments, while those engaged in propaganda use every weapon in their arsenal. Alternative models of "unofficial reality" stand or fall, therefore, by virtue of the integrity, methodology and discipline of the practitioners. That's why intentional disinformation agents or "useful idiots," making UFO Studies look like the work of charlatans, con artists, and hacks, are so effective. Lacking the support of societal structures, UFO Studies are marginalized. No university has a Department of UFO Studies with government funded fellowships and grants. That's why work like Hansen's is so important. His solid methodology and judicious, deliberate reflection on what is plausible in the Alice-in-Wonderland world created for us by the culture of secrecy provide an antidote for intentional deception. The Missing Times is a question, not an answer. It asks the reader, so what do you think? Which of these scenarios makes the most sense, knowing what you now know? Hansen trusts the reader to think it through. Because reading this book must begin a process of deconstructing the seamless weave of images, ideas, and narratives that we innocently inhabit, this book is genuinely subversive. When you put it down, the echoes continue ... and you do not, you realize, love Big Brother. You do not love Big Brother at all. copyright Richard Thieme 2001. Richard Thieme ThiemeWorks ... professional speaking and business consulting: ThiemeWorks P. O. Box 170737 the impact of computer technology Milwaukee Wisconsin on people in organizations: 53217-8061 helping people stay flexible voice: 414.351.2321 and effective fax: 414.351.5779during times of accelerated change. cell: 414.704.4598 http://www.thiemeworks.com http://www.richardthieme.com - for information on Professional Speaking 3039 From: A.Lizard Date: Mon May 14, 2001 4:59pm Subject: re: The "new" burglar tools... in a surveillance society > >Message: 7 > Date: Fri, 11 May 2001 18:46:03 -0500 > From: "Aimee Farr" >Subject: The "new" burglar tools... in a surveillance society > >The TX Leg in session ...better than high school football. > >============================================ > >Office of House Bill AnalysisS.B. 966 >By: Staples >Criminal Jurisprudence >4/8/2001 >Engrossed > >ENROLLED 05/01/2001 E Sent to the Governor >============================================ > >BACKGROUND AND PURPOSE > >There is concern that the number of retail thefts committed in mercantile >establishments is on the rise. In response to this increase in retail >thefts, many retailers have installed electronic article surveillance >systems. However, some of these thefts may be committed by thieves who >have homemade tools and devices for retail theft including metal or >foil-lined shopping bags that override and evade these surveillance >systems. Senate Bill 966 provides that a person commits a Class A >misdemeanor if the person possesses, sells, manufactures, or distributes a >device intended to shield merchandise from detection by a retail theft >detector. > >ANALYSIS > >Senate Bill 966 amends the Penal Code to provide that a person commits a >Class A misdemeanor if, with the intent to use the instrument to commit >theft, the person possesses a shielding or deactivation instrument that >evades a retail theft detector or knowingly manufactures, sells, offers for >sale, or otherwise distributes such an instrument. > >======================================== > >Office of House Bill Analysis H.B. 1729 >By: Goolsby >Criminal Jurisprudence >4/12/2001 >Introduced >======================================== > > >BACKGROUND AND PURPOSE > >Retail theft offenses committed in mercantile establishments are >increasing. Many retailers combat these increases in retail theft offenses >by installing complex and expensive electronic article surveillance >systems. However, there does exist "professional" retail thieves who travel >to different cities in order to commit such offenses, and despite >increasingly complex surveillance systems some shoplifters are using tools >and devices to override the electronic systems. House Bill 1729 provides >that possession, sale, manufacturing, and distribution of a device intended >to shield merchandise from detection by an electronic or magnetic theft >detector without the permission of the merchant or person owning the >merchandise is a Class A misdemeanor. > >ANALYSIS > >House Bill 1729 amends the Penal Code to provide that a person commits a >Class A misdemeanor if the person possesses a shielding or deactivation >instrument with the intent to use the instrument to commit a theft, or >knowingly manufactures, sells, offers for sale, or otherwise distributes a >shielding or deactivation instrument. The bill also specifies that if >notice is provided, the activation of an electrical, mechanical, >electronic, or magnetic device used by a retail establishment to prevent or >detect shoplifting is grounds for a person to reasonably believe a person >has stolen or is attempting to steal property. The notice must be posted >on the premises of the retail establishment in a manner that is reasonably >likely to come to the attention of the public and must state that the >establishment uses retail theft detectors to prevent or detect shoplifting. >The bill provides that an individual or retail establishment is not liable >for any damage that may arise from conduct authorized by the provisions of >this bill. The bill also sets forth provisions for the prevention of the >consequences of theft. > >===== > >o Any legitimate purposes for foil/metal-lined parcel bags, etc.? I will >accept hypothetical wanderings. Integrated circuits and printed circuit boards frequently are packaged in metallized bags in order to protect sensitive electronic components from damage. I've got several lying around here right now, and I suspect that most of the mailing list can say the same. Anybody who builds electronic equipment probably has *many* of these bags around the workbench. If you install your own adaptor boards into your PC and you live in TX, the bill could turn you into a criminal as well. Furthermore, keeping these bags is advised, in case you need to ship your board back to the manufacturer for repair. In other words, Texas Instruments probably has millions of "burglary tools" in stock as I write this just like every other integrated circuit manufacturer and wholesaler in the state. The average consumer product repair facility probably has hundreds of thousands. It would be mildly entertaining if they all got shut down for "possessing burglary tools", though it would be funnier if the TX part of the electronics industry simply moved to California. "People always get the local government they deserve" E.E. "Doc" Smith A.Lizard ************************************************************************ Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 3040 From: James M. Atkinson, Comm-Eng Date: Tue May 15, 2001 3:58pm Subject: Biotech spy charges highlight disparate research perspectives Biotech spy charges highlight disparate research perspectives http://www.asahi.com/english/asahi/0514/asahi051412.html Many feel the United States' intention is to launch a pre-emptive strike against an emerging rival. May 14, 2001 An incident has occurred that drives home the extent of the competitive ethic in the United States. Two Japanese medical researchers studying Alzheimer's disease in the United States have been indicted by a U.S. federal grand jury on charges of violating the Economic Espionage Act. One of the scientists, a resident of the United States, has been arrested in the case. Demands for provisional detainment have been issued for the other, who has since returned to Japan and works at the Institute of Physical and Chemical Research (Riken) in Wako, Saitama Prefecture. The allegations are that genetic materials for researching Alzheimer's disease were pilfered for transfer to Riken. Both researchers deny the charges, and are girding for a court battle. In the United States, it hardly unusual for researchers to move to different institutions. The handling of research results in such cases are contractually stipulated in advance. Controls become particularly strict when national budgeting comes into play, and can go so far as to ban the removal of notebooks from laboratories. The U.S. approach is to also treat research as business. That thinking is often perplexing for the Japanese and difficult for them to fathom. Even so, it would seem sensible for disputes between researchers to be settled through rational discussions. The decision by U.S. authorities to launch a compulsory investigation in this case was totally unforeseen. We recall the 1982 IBM industrial spy scandal, in which employees of Hitachi Ltd. were arrested in a sting operation as they attempted to buy IBM secrets from undercover FBI agents. That furor came at a time when Hitachi and Fujitsu Ltd. were in hot pursuit of Big Blue in the computer field. Today, the United States reigns supreme in the life sciences. Riken has been attempting to fight back, with its achievements in the analysis of mice genes steadily drawing world attention. Japan has established the so-called New Basic Plan for Science and Technology, for which a budget of 24 trillion yen has been earmarked over five years. This vision is being advanced with the focus on research into the life sciences, information technology and other pivotal domains. None of the details of this alleged industrial espionage have yet been clarified. Nonetheless, many feel the United States' intention is to launch a pre-emptive strike against an emerging rival. Alzheimer's disease, known to cause dementia, is prevalent worldwide and is a condition for which no effective treatment is known. The development of a cure for the disease strongly motivates pharmaceutical manufacturers worldwide. If the fruits of work in this field were to lead to a patent and then to effective treatment, the researchers responsible would also stand to receive handsome financial rewards. One of the traits in genetic research is for the basic components to be directly connected to treatment of disease and other applications. This is a marked departure from the conventional framework, which views basic research as a shared and open asset of mankind. Under this traditional way of thinking, applied research guards the interests of the developer through patents. Competition in research is heating up on a genuinely global scale as regards diabetes, cancer, hypertension and other diseases. The guidelines for this rivalry vary from country to country, with many key issues remaining unaddressed. The U.S. stance, for instance, broadly recognizes patents for human genes. Resolving this issue does not lie in needlessly closing ranks or retaliation. Rather, it is important to reflect on the differences between the principles and the systems that exist in the United States and Japan, and to actively seek ways of undertaking joint research projects. Also vital, of course, will be efforts to draft a set of new international rules to prevent trouble from happening again in this key sector. (The Asahi Shimbun, May 13) -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3041 From: James M. Atkinson, Comm-Eng Date: Tue May 15, 2001 3:59pm Subject: Swept Up In Russian Spy Craze Swept Up In Russian Spy Craze http://www.washingtonpost.com/wp-dyn/articles/A23354-2001May13.html Friends Say American Guilty of Recklessness By Peter Baker Washington Post Foreign Service Monday, May 14, 2001; Page A14 VORONEZH, Russia -- It's hard not to notice the glow-in-the-dark brassieres. Or the tough-looking guys hanging out around the roulette table. Or the bouncer with the metal-detector wand screening customers for weapons. Whatever the warning signs, Jack Tobin ignored them that night back in January as he made his way into the Night Flight casino and dance club with a few Russians. He was out to have a good time, like always. Everyone who met the 24-year-old American studying in this university town knew he had a wild streak. Before the evening was out, though, the Fulbright scholar from Connecticut found himself caught up in something far more serious than another vodka-induced hangover. Rousted by police who claimed they found a matchbox containing marijuana on him -- drugs they planted, he would later say -- Tobin suddenly was ensnared in the spy craze that has seized this country under President Vladimir Putin, becoming the latest pawn in a geopolitical game of tit for tat. The Federal Security Service, the domestic successor to the KGB, boasted it had caught an American spy-in-training, essentially making Tobin its answer to the arrest of alleged double agent Robert P. Hanssen. Never mind that no espionage charges were brought against Tobin. Drug charges stemming from no more than one-twentieth of an ounce of marijuana would be enough to put him away for 37 months. Today John Edward Tobin sits in a jail cell, awaiting transfer to a Russian prison colony in a penal system plagued by a tuberculosis epidemic. His friends and teachers can think of no explanation other than the obvious one, that he was singled out to make a point. "Maybe some winds of the Cold War have come again to visit us," said Zhanna Sokolova, dean of international students at Voronezh State University. The Tobin case is the latest in a flurry of spy-related episodes emerging as a former KGB colonel rules the Kremlin. In recent weeks, authorities have charged a Russian scientist with high treason for spying for China and aired a videotape purporting to show an American military attache trying to buy sensitive documents. A Russian arms control researcher remains on trial for allegedly passing state secrets to the West. A Moscow court is holding hearings in the case of a former diplomat accused of spying for South Korea. And last winter, U.S. businessman Edmond Pope was convicted of spying, the first espionage verdict against an American in 40 years. (Putin later pardoned him as a diplomatic gesture.) Maintaining that foreign spies have stepped up their activities, Russian security agencies have revived a Stalin-era practice of launching investigations, complete with searches and telephone taps, based on anonymous tips to a hot line, a policy upheld last month by the Russian Supreme Court. Here in Voronezh, about 300 miles south of Moscow, Tobin says he was a victim of the provincial zeal of the local branch of the Federal Security Service, intent on showing the bosses in the capital that they had nabbed an American spy. "My son basically fell for a trap, as far as I can tell," said his father, John Tobin Sr., a construction contractor in Ridgefield, Conn. The younger Tobin first came to Voronezh State University in 1998 during his junior year at Middlebury College and returned last autumn as a Fulbright scholar studying changing political attitudes in the decade since the fall of communism. Bright and witty, he made many friends and impressed teachers with his command of the language, right down to Russian curse words. Department head Larissa Rybacheva still has his grammar workbooks to show how few mistakes he made. But he also began skipping class. His apartment a few blocks from campus was a haven for late-night parties, with a closet filled with empty vodka bottles, according to a friend. One time, Tobin drunkenly broke a door in the dormitory, said Anatoly Leonov, the Middlebury coordinator at Voronezh. Another time, he returned from a trip with a black eye, explaining he had been in a scuffle over a woman, according to two friends. "He was definitely a really wild partier, he definitely liked to drink," said a friend who asked not to be named out of fear of the Russian police. "I like to party, too, but I like to do it once a week and he could do it maybe once a day. . . . He was wild, young, but a good guy and definitely not a spy." Neighbors in his run-down building complained. "They just kept us awake, slamming the doors," said Suzanna Kudrishova, a 78-year-old retiree who lives across the hall. "There was never any peace." Security police said they focused on Tobin because of his fluent Russian and background at U.S. military intelligence institutions. According to Tobin's account, a few days before his arrest they summoned him to their office, where he was "asked to cooperate" -- apparently to become an agent. He answered no, said Tobin's attorney, Maxim Bayev. Not long afterward, a Russian friend introduced Tobin to two young women, Bayev said, and they invited him to Night Flight. Known as a hangout for a tough crowd, Night Flight is bathed in black light, making everything white shimmer brightly in the darkness -- including the bras of the waitresses through their light blouses. On the smoky dance floor, older men sway with young women under a glittery array of colored lights. According to Bayev, the women with Tobin in the early morning hours of Jan. 26 suggested buying drugs. Accounts vary on whether Tobin agreed, but soon police were on the scene frisking him, claiming to find a small plastic bag of marijuana in a matchbox. A search of Tobin's apartment turned up another tiny amount of marijuana in a textbook, authorities said. Tobin said the drugs were not his. The case drew international attention only a month later, when Russia publicized it following Hanssen's arrest, making much of Tobin's rÈsumÈ, which included a stint in the Army and training at Fort Huachuca, the Army's intelligence center in Arizona. The proof of Tobin's espionage interests, as Russian authorities saw it: He tape-recorded interviews with political figures and was seen near the local power plant. His teachers found that laughable. Of course he taped interviews, they said. He was writing a paper on politics. And the power plant, according to Bayev, is near a park frequented by young people. Rybacheva, his grammar instructor, scoffed at the notion that Tobin was a spy. "He's either a spy or a drug addict, but these things don't go together," she said. "If he were a spy, he would have attended class and stayed out of trouble." Tobin went on trial last month only on drug charges. A police official admitted in court that she made up an amount of marijuana for a report, and the prosecutor said she was ashamed to handle the case. But the judge convicted him on possession and distribution of the drug. He has appealed, while his parents back home recruit members of Congress to pressure the State Department to do more to help. "He landed in trouble because of his foolishness," said Leonov, the Middlebury coordinator. But "all the hype around him, it's just games, games, games." C 2001 The Washington Post Company -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3042 From: James M. Atkinson, Comm-Eng Date: Tue May 15, 2001 4:03pm Subject: Spy Technology Business Sunday, May 13 Spy Technology http://www.gopbi.com/partners/pbpost/epaper/editions/sunday/business_4.html By Shelley Emling Palm Beach Post-Cox News Service Sunday, May 13, 2001 That Mont Blanc pen really is a tiny video system. Those sunglasses are also a surveillance camera. And that phone, well, it's not just a phone. It's a device that lets you know when a caller's fibbing. Nothing is as it appears at the Counter Spy Shop, part of a specialty chain that sells anything and everything for the aspiring James Bonds of the world. It used to be that only the military and police officers could get their hands on the kind of gear sold there, things like surveillance and anti-bugging equipment. Not anymore. Now everyone from suspicious parents to suspicious spouses is patronizing spy shops like never before. Arielle Jamil, director of public and media relations for CCS International Ltd., which has spy stores in several cities -- including Miami, London and New York -- says her job is to create paranoia. But she admits she doesn't have to work very hard these days. "Most of our products have gone mainstream, especially as the public has grown more and more anxious," she said. "We seem to do particularly well in a recession, when folks are worried about protecting their assets." The growing trend is to use covert video systems to monitor what's going on in your home or office while you're away. "Now you can be in your hotel room in Paris and use a covert video system to find out what's going on in your home back in New York," Jamil said. She said the system operates through a phone line, so you're essentially dialing a camera with a built-in modem. Helping to create widespread paranoia have been popular movies and television shows such as The Matrix and X-Files, as well as high-profile court cases such as that involving British au pair Louise Woodward, who was convicted of manslaughter of the infant she had been caring for in Boston. At the same time, technology has grown cheaper so that, in an era of voyeurism, a world that's grown addicted to tabloid talk shows can afford the products it needs to spy on neighbor or spouse. After all, spy shop owners contend, real life often holds more fascination than make-believe. So, it's no longer the private investigator who might be looking for a bulletproof umbrella. It's the quiet guy next door who hosts neighborhood barbecues. And the array of available products has skyrocketed. You can buy everything from a necktie with a hidden camera for less than $2,000 to a phone-tapping detective kit for more than $10,000. There are digital voice changers that sell for $300 and up that can render your voice completely unrecognizable. And there are space-age briefcases that can nab a would-be robber by triggering a shock of 100,000 volts in the case's handle. The $795 case lets you zap the robber from up to 200 feet away. At CCS, which has been around since 1959, night-vision goggles have proven to be big sellers in recent years. "These items start at only $300 or $400 and can be used for spying, or for more mundane activities like fishing and hunting at night," Jamil said. Another item, which starts at $6,000, can actually "see" through walls. "We have a device called SSR2000 that can see through concrete, and that's generally for people who want to make sure there's no one waiting for them around the corner with a gun," Jamil said. Another popular product is the "truth phone," a desktop phone priced at $3,900 that can tell whether a caller is lying by reading tremors in their vocal cords. Meanwhile, some of the most frequent customers at Quark, another spy store based in Manhattan, are anxious parents. "We sell lots of nannycams," said Anna Cavazos, a spokeswoman for Quark. Indeed, cameras tucked inside everything from plants to teddy bears have been big sellers for years. Another must-have for protective parents: Global Positioning System devices that can be placed inside cars and backpacks so parents can monitor their children's whereabouts. Parents can even activate a listening-in function so they can eavesdrop when their children are out with friends. "Basically the whole spying industry has become more socially acceptable, so we're getting all sorts of average people in here, including lots of parents, looking to buy stuff," Cavazos said. But Quark's most-asked-about item isn't a nannycam, it's a $1,200 pen that's really a tiny tape recorder. It becomes activated when pulled from a pocket. "This thing is great because people have no idea it's a recorder," Cavazos said. Like pens, cameras, too, have come a long way. Once, consumers were amazed at a device that could keep time digitally. Today a band around your wrist can do a lot more than that. Consider Casio's Wrist Camera. Sure, the device tells time, but it also takes small black-and-white photos and can store up to 100 of them. They can then be viewed on the watch's 1-by-1-inch screen or transferred to a personal computer for viewing or e-mailing. The Desk Clock Video Camera also does a lot more than tell time. Hidden inside the stylish desk clock is a camera, so users can find out what's happening in their home or office when they are away. The camera can send black-and-white video directly to a TV or VCR and can even be hooked to a wireless transmitter to send the video to another room. Other gadgets aren't so sleek, but they can still do a lot of legwork for budding spies. "There's software that can be surreptitiously installed so that you can find out what someone else is doing on the Internet," said Lauren Weinstein, co-founder of the Privacy Forum in California. "This software is often used by spouses who want to know what their partner is up to when he or she's on the Web at all hours." Spy products might be popular, but the use of secret surveillance devices does pose a serious question: Are they legal? David Sobel, general counsel for the Electronic Privacy Information Center in Washington, said the federal wiretap law doesn't prohibit the use of surveillance equipment as long as it's not recording sound. And many state laws do not specifically address whether hidden cameras violate privacy rights. "Anything captured visually seems to be OK," he said. But the law does prohibit an employer from listening to a personal phone conversation unless the employee has been notified that his or her conversations could be monitored. "You never know when someone is keeping tabs on you," Sobel said. "Don't ever assume anything." Do you have a burning desire to be a spy? You can equip yourself with everything from hidden microphones to stealthy video cameras at a store called CCS International. All items are available by calling (800) 722-4490 or going to the Web site at e-spyzone.com. SpyCam 11 is a hidden video camera system that allows you to see what's going on in your home or office when you're away -- even when in another country. It sells for $3,900 and up. The Predator night vision goggles sell for $2,400. A pair will allow you to spy on someone at night or to do things such as fish or hunt in total darkness. Nannycams start at $900 and are hidden video camera systems built into teddy bears or cribs or other objects. They let you spy on your child's caregiver. The dime-sized camera starts at $495 and can be attached to your body with Velcro or worn around your neck. `Star Wars' goes racing GAME CORNER By Troy Oxford, Palm Beach Post-Cox News Service LucasArts has delivered another fine title for the PlayStation 2 in Star Wars: Super Bombad Racing ($49.99). The first kart-style racer for the system features several pint-sized versions of characters from The Phantom Menace. The graphics are colorful and detailed. Each racer has a unique personality and set of attributes -- a nice change from cookie-cutter characters and vehicles. The control and physics also are fine-tuned. The setup makes it easy for players to jump right in. Occasionally, the game flow gets a little choppy when other players join. This is a minor problem and shouldn't distract from the action. Super Bombad Racing is the best-looking kart racer to date. The cute and familiar elements make it a perfect game for young and old alike. Power-assisted bicycles give boost to older riders By James Cummings, Palm Beach Post-Cox News Service If you enjoy bicycling but don't have the energy for long trips, for uphill grades or for keeping up with better conditioned riders, what you may need is a bit of a boost. Electric power-assist bicycles add the power of an electric motor to the power generated by you pushing the pedals. TH!NK Mobility, the Ford Motor Co.'s environmentally friendly vehicle division, is touting two power-assist bicycles as gifts for Mother's Day or Father's Day. The company says the bikes are fun to ride and make it possible for parents and grandparents to join younger family members on bike outings. They're also convenient and energy efficient for short trips around the neighborhood. The TH!NK fun is a full-size (up to 26-inch wheels) bike with a range of 22 miles at 12 miles an hour, and the TH!NK traveler is a 20-inch-wheel folding bike with a range up to 16 miles. TH!NK provided a fun bike for testing, and it worked extremely well on the bike path and on normal city streets. However, it wasn't able to climb a steep hill. Because of the battery and motor, the TH!NK fun is a fairly heavy vehicle, weighing in at up to 72.7 pounds. But the power-assisted pedaling system keeps the bike cruising along at about 12 miles an hour on most roads. The bikes can be ordered online from www.thinkmobility.com for $995 each. Shipping is free. The TH!NK traveler folds to a length of less than 28 inches. Home editing system lets you get to the good stuff Produce polished films from your video footage with the Sequel 20GB. Home video editing is becoming a popular pastime, and Applied Magic of Carlsbad, Calif., has introduced a device that it claims makes sophisticated editing as easy as using a VCR. Applied Magic makes the ScreenPlay line of video editing devices for professional videographers. The newest version of its consumer model, the Sequel 20GB, has most of the features a hobbyist might need. It's also simpler and less expensive than the company's professional models. It includes inputs to accept the same audiovisual signals as a VCR; it can record video from video cameras and VCRs as well as broadcast, cable and satellite television transmissions. The unit, which is about the size of a VCR, stores the video digitally on a 20-gigabyte hard drive. Once the desired scenes are stored, the user can retain the best possible footage, then string the scenes together using a storyboard system. The user can work on as many as 12 storyboards at once. The manufacturer's suggested retail price is $1,995 and it can be purchased through Applied Magic's Web site at www.applied-magic.com. It's also available at computer stores and online electronics merchandisers. OS relief: New Windows version XP makes significant progress The operating system for your computer is very much like a waiter. In a perfect world, you shouldn't notice it at all. It should seamlessly take care of what your computer needs without bothering you. For almost all PC users, Windows is the operating system. It's been like a waiter all right -- a nightmare waiter. It has spilled error messages on your screen like so much cybersoup splashed on your clothes, interrupted what you are doing to tell you things you don't need to know, and sometimes just refused to work. Well, there's a new Windows coming down the track that represents one of those rare occasions where the product will live up to the hype. If you've been using any of the consumer versions of Windows at home -- 95, 98 or ME -- my guess is that your computer freezes up more often than a pond in February. If heart/lung machines, cars and jet airplanes had the same amount of reliability, the world literally would be a much smaller place. This new version of Windows is built on the same computer code as the industrial-strength versions like Windows 2000 and Windows NT that business clients of Microsoft have been using for years. Besides being more stable, XP also will go a long way toward eliminating an error that you have almost certaintly seen: low system resources. Consumer-grade versions of Windows allocate just a tiny amount of memory to keep track of system resources. Even if you have one of those memory-packed computers with 256 megabytes of RAM or more, you haven't been immune, because Windows allocated such a tiny bit of memory to resources. But Microsoft expanded that specialized type of memory in XP, and that makes an enormous difference in performance and stability. XP is also going to be great for families that share a computer. One of the differences you'll see when you first boot up XP is a log-on screen. You'll be able to create an individual log-on for each family member. That means that each family member's desktop will be customized with its own array of programs. For those of you who have lived with your son's desktop filled with icons for games and Web sites, this will be a really nice change. But the best thing that I've noticed -- in the time I've used a beta (or test) version of the product -- is the fact that Windows XP really is like that good waiter. Instead of constantly messing with Windows settings, I can ignore Windows and simply use my programs. Novice computer users are going to enjoy the way XP guides you through the few instances that you will run into with Windows XP. If you've dealt with the help feature in other versions of Windows, you'll immediately recognize this as a giant leap forward. Another feature that will make computing easier and better is the built-in firewall used by XP. Firewall programs are designed to keep hackers out of your computer. Until now, you've had to install your own program. Windows XP comes with a firewall that works without much user setup or hassle. So far, you must feel as if Bill Gates has just sent me a check for $14.2 million. No program can be that perfect, you're thinking. And you're right. There are things that you won't like about this new version. For one thing, those of you who have been slugging along with an outdated PC will either have to avoid moving up to XP or buy a new machine. XP requires a 300-megahertz Pentium II or better, 128 megabytes of RAM and at least 2 gigabytes of free hard disk space. For another thing, you might find that some of your old programs don't work with Windows XP. When XP actually hits the market this fall (don't hold your breath, Microsoft is famous for missing release dates), there will be a complete list of programs that won't run. But if some of your programs are three or four years old, there's a good chance that you'll add a new word to your computing vocabulary: incompatibility. All that said, I can promise you that XP is a giant step forward in computing. Bill Husted writes about technology for Cox News Service. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3043 From: Miguel Puchol Date: Tue May 15, 2001 5:46pm Subject: RE: Spy Technology Worth to comment on? Probably not...but here it goes > Arielle Jamil, director of public and media relations for CCS > International > Ltd., which has spy stores in several cities -- including Miami, > London and > New York -- says her job is to create paranoia. But she admits she doesn't > have to work very hard these days. Yes, that's a very good tactic, convince your clients that they absolutely need everything you sell, including the fingerprint kit, because you never know when you'll need it or who will be waiting behind the corner... > You can buy everything from a necktie with a hidden camera for less than > $2,000 to a phone-tapping detective kit for more than $10,000. What the heck is a phone-tapping detective kit? An inflatable Ken that goes around your house looking for taps? > There are digital voice changers that sell for $300 and up that can render > your voice completely unrecognizable. And there are space-age briefcases > that can nab a would-be robber by triggering a shock of 100,000 > volts in the > case's handle. The $795 case lets you zap the robber from up to 200 feet > away. I'm sure there will be plenty of entries in the Darwin Awards due to these devices. > At CCS, which has been around since 1959, night-vision goggles have proven > to be big sellers in recent years. Like a saying we have in Spain, translated with a little freestyle, "Bad plants never die". > Another item, which starts at $6,000, can actually "see" through walls. > "We have a device called SSR2000 that can see through concrete, and that's > generally for people who want to make sure there's no one waiting for them > around the corner with a gun," Jamil said. Duh? I know, it's a gasoline-powered large-bore power drill. > Another popular product is the "truth phone," a desktop phone priced at > $3,900 that can tell whether a caller is lying by reading tremors in their > vocal cords. People still believe in this? > Another must-have for protective parents: Global Positioning > System devices > that can be placed inside cars and backpacks so parents can monitor their > children's whereabouts. Parents can even activate a listening-in > function so > they can eavesdrop when their children are out with friends. I think almost any kid nowadays could outgun their parents in an in-home infowar. For example, wrap the large black box they stuffed in your backpack with the foil from your lunch sandwich - how could anyone plant one in their son's backpack without them noticing? > "Basically the whole spying industry has become more socially > acceptable, so > we're getting all sorts of average people in here, including lots of > parents, looking to buy stuff," Cavazos said. Socially acceptable? That's just plain crap. Cases of cameras filming things they shouldn't have multiplied in the last couple of years... > Consider Casio's Wrist Camera. Sure, the device tells time, but it also > takes small black-and-white photos and can store up to 100 of > them. They can > then be viewed on the watch's 1-by-1-inch screen or transferred to a > personal computer for viewing or e-mailing. The pictures are crap, absolute worthless for anything else than taking pictures of your face (or others') and sending them to your friends. Just like the Casio GPS watch - worthless. > Do you have a burning desire to be a spy? You can equip yourself with > everything from hidden microphones to stealthy video cameras at a store > called CCS International. All items are available by calling > (800) 722-4490 > or going to the Web site at e-spyzone.com. Hmmmm.....nuff said. Cheers, Mike 3044 From: Date: Tue May 15, 2001 11:33am Subject: Re: Re: info needed on ICOM Radio steve tis seemingly obvious that you truelly enjoy your work... that in it's self can attian a sense weeringly outside respect.. i like you and your bedside manner,, it keeps me amused.. Mr, Jack Daniel Garcia, Owner /C.E.O. Accelerated Security Strategies Co. as a sense of a smile you may find gam in the acronym of my company's title, and a lil insitgh as to who i can be at times,,,lol 3045 From: William Knowles Date: Wed May 16, 2001 3:02am Subject: Almost a nominee for a Darwin award... Maybe an honorable mention, and keep an eye out for a future entry? - WK Yachtsman who almost hit nuclear sub fined http://www.telegraph.co.uk/et?ac=004782403739693&pg=/et/01/5/16/nyot16.html By Stewart Payne Wednesday 16 May 2001 A YACHTSMAN who failed to see a nuclear submarine escorted by a tug and two police launches with blue flashing lights has been fined 2,000 for navigating without care and caution. Paul Yates, 43, was in last place in a regatta on the Solent when he steered a racing line between the 360ft USS Oklahoma City, which was above the waterline, and the tug. The submarine, which is equipped with Tomahawk cruise missiles, took avoiding action to prevent a collision with the 36ft yacht. Yates told Portsmouth magistrates: "The sub didn't stand up against the dark skies. They are painted to disguise themselves." The yachtsman, whose main experience is in sailing dinghies, said the competition last July was his first attempt as a racing skipper. He was in charge of a crew of seven at a corporate regatta, racing from Portsmouth to Cowes on the Isle of Wight. He told the court: "I hold my hands up. I made a very serious mistake. It was a triumph of incompetence. For a long time very few nights passed without me thinking how I could have sent myself and the rest of my crew to the bottom of the ocean. Had I looked up and seen the sub I would have avoided it as I wouldn't want to be at the centre of a major international incident." He admitted navigating his yacht without care and caution in such a manner as to cause annoyance to the occupants of another vessel. Yates, of south London, failed to see the submarine, which was on a goodwill visit to Southampton, although the 29 yachts ahead of him had steered out of its way. Helen Phillips, prosecuting, said Yates did not respond to attempts by the police launches to get him to avoid the submarine. "As a result the submarine had to go hard astern to avoid a collision with the yacht, which was a matter of yards away He said he saw the blue flashing lights out of the corner of his eye but did not think that they were significant and said his attention was on the race." *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 3046 From: Paolo Sfriso Date: Wed May 16, 2001 4:21am Subject: Investigative Recording Device RT 6000 Dear Collegues. does anybody have any technical info on a (possibly digital) investigative (? covert ?) recording device known as the "RT 6000". Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 paulsfriso@t... www.grupposit.com 3047 From: David Alexander Date: Wed May 16, 2001 7:11am Subject: point of honour In the article reported by JMA titled TREASON HUNT there is a reference to the VENONA decrypts 'in the US'. For the record, the journalist has got his facts woefully wrong. The Venona project was the decryption of some of the Russian one-time pad traffic thanks to their re-use of pads by different departments. The discovery and breakthrough that made this possible, along with most of the early work and a good portion of the later work, was done by the British code-breakers. regards David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 3048 From: Charles P Date: Wed May 16, 2001 6:19pm Subject: PTSNOOP I came across pc that has a program called PTSNOOP in it's startup list. Does anyone know what program this file might be from? charles 3049 From: Kevin D. Murray Date: Wed May 16, 2001 7:46pm Subject: Re: PTSNOOP Charles P wrote: > I came across pc that has a program called PTSNOOP in it's startup list. > Does anyone know what program this file might be from? > > charles Hi Charles, "What is PTSnoop? The PTSnoop program is used by the modem to interface with your computer. The program is not actually "snooping", but is interfacing with your computer to allow the modem to function. It is also used to support modem voice functionality, if your particular modem supports that feature. PTSnoop is not a malicious program and is not gathering any data about you. You can remove the PTSnoop application, but every time you reboot your computer it will reinstall itself." -- from http://www.pctel.com/consumer_faq.htm Kevin 3050 From: Charles P Date: Wed May 16, 2001 10:19pm Subject: Re: PTSNOOP Thanks all for the quick answers. I was helping someone set up a small network in their new office, this particular pc came from someone at her former company so it was loaded with unnecessary programs. This one caught my eye. >>>> The PTSnoop program is used by the modem to interface with your computer. The program is not actually "snooping", but is interfacing with your computer to allow the modem to function. It is also used to support modem voice functionality, if your particular modem supports that feature. PTSnoop is not a malicious program and is not gathering any data about you. You can remove the PTSnoop application, but every time you reboot your computer it will reinstall itself." -- from http://www.pctel.com/consumer_faq.htm <<<< > "ptsnoop" is part of the WinModem software. Anyone installing certain modems will see this monitor program appear in their task list. It provides support for the modem operation. > If you have a WinModem, the only way to get rid of that program is to remove the modem drivers. That also disables the modem. If you see that item in the task list, and DON'T have a WinModem, it's worth looking further. ;-) > > > I came across pc that has a program called PTSNOOP in it's startup list. > Does anyone know what program this file might be from? > > charles > > 3051 From: factfind Date: Wed May 16, 2001 6:33pm Subject: Re: PTSNOOP "ptsnoop" is part of the WinModem software. Anyone installing certain modems will see this monitor program appear in their task list. It provides support for the modem operation. If you have a WinModem, the only way to get rid of that program is to remove the modem drivers. That also disables the modem. If you see that item in the task list, and DON'T have a WinModem, it's worth looking further. ;-) ----- Original Message ----- From: Charles P To: TSCM-L Mailing List Sent: Wednesday, May 16, 2001 7:19 PM Subject: [TSCM-L] PTSNOOP I came across pc that has a program called PTSNOOP in it's startup list. Does anyone know what program this file might be from? charles Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 3052 From: James M. Atkinson, Comm-Eng Date: Thu May 17, 2001 7:15am Subject: Solicitor fined for toilet spy camera Solicitor fined for toilet spy camera SYDNEY Thursday 17 May 2001 http://www.theage.com.au/news/2001/05/17/FFXVPPLETMC.html A solicitor who was convicted and fined yesterday for secretly filming female staff members going to the toilet at his law firm may be struck off by the NSW Law Society. Robert Alan Harper, 52, was fined $1,056 in Liverpool Local Court after he pleaded guilty to installing a video surveillance system in a toilet cubicle and filming 10 employees between October 1 and December 24 last year. In a handwritten letter tendered to the court, Harper, of Robert A Harper and Co Solicitors in Macquarie Street, Liverpool, apologised to staff members he caught on camera, saying his actions were "stupid" and the editing of the videotapes "inexplicable and "an aberration". "I understand the embarrassment and hurt my action has caused to the ladies concerned and respectfully apologise for my actions particularly in later viewing of the films. "I am very sorry for what I did and I hope that in the course of time my ex-staff who were very loyal to me may accept my explanation and my apology." A spokeswoman for the Law Society, which has been investigating Harper, said it would consider his right to continue practising as a solicitor. Yesterday the court was told Harper captured the women on tape via a small video camera hidden behind the toilet roll dispenser which was connected to a video cassette recorder set up in a laneway outside the building. Harper was arrested in March after a staff member found 20 video cassette tapes inside a suitcase which Harper had accidentally left outside the office. Harper said he had planned to take the tapes home and destroy them. On each tape Harper had written the initials of an employee and the tape log time. Post-it notes were attached to some of the tapes with the words "beauty", "great", and "best". In his first statement to police, Harper said he had been sexually frustrated at the time and had set up the surveillance system for "titillation" and sexual gratification. In a later statement, Harper changed his explanation, saying he installed the video cassette camera to film a female employee he suspected of using illegal drugs, and it wasn't until December 23 that he viewed the video tapes "voyeuristically". Harper said he watched the tapes in his office and had not shown them to anyone. Outside court, Mr Grant Butterfield, the lawyer representing the 10 victims, said the women would consider taking civil action against Harper. "The victims are obviously traumatised by the events and will for some years have to cope with the effect of the actions of Harper and will obviously continue to work to achieve some normality," Mr Butterfield said. Mr Butterfield said the victims had left the law firm and were receiving counselling. Some former employees had found new jobs. Harper, who had asked magistrate Kevin Flack to dismiss the charge and not record a conviction, has 28 days to lodge an appeal. - SMH Copyright © The Age Company Ltd 2001. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3053 From: Technician Man Date: Thu May 17, 2001 7:48am Subject: New Chip Technology Thought this was interesting..... Thursday, May 17 7:26 AM SGT Intel creates chip with cell phone, computer components. SAN FRANCISCO, May 16 (AFP) - Computer chip giant Intel said Thursday it has succeeded in creating a computer chip that includes the core circuitry of a cell phone and a hand-held computer etched into its surface. The components are embedded onto a single silicon wafer using a single manufacturing process, the company said. Traditionally, these different components are incorporated separately in a cell phone or hand-held device, and manufactured and assembled in different plants. The company said the cell phone circuits will be five times more powerful than existing, stand-alone cell phone circuits, while consuming a fraction of the battery power required for today's devices. The company hopes the chip will power next-generation ultraportable hand-held computers and cell phones with fast Internet connections, a market the depressed computing industry has been rushing to capture. "Within the next five to 10 years, we should not be surprised to see devices such as wearable computers or even video watch phones become widely available," said Ron Smith, senior vice president of Intel's wireless division. "We believe Intel's new process technology will extend this trend." Intel, based in Santa Clara, California, was to unveil the chip at its developers forum in Amsterdam Thursday. __________________________________________________ Do You Yahoo!? Yahoo! Auctions - buy the things you want at great prices http://auctions.yahoo.com/ 3054 From: Date: Thu May 17, 2001 6:41am Subject: Video encryption for surveillance From Jane's News Briefs - 17 May 2001- Video encryption for surveillance To combat the threat of insecure microwave and RF video surveillance links being intercepted, Ovation Systems Ltd has launched the Viewlock II. The equipment safeguards sensitive surveillance links by scrambling the video during transmission, making it impossible to intercept and decrypt. Viewlock II's digital video scrambling coupled with multiple encryption keys offers a high degree of security. The unit has been developed for covert installations, is waterproof and miniaturised. Advanced features include on screen status display and optional digital audio scrambling. John R. Angier II M-Group P.O. Box 721388 Norman, OK 73070-8070 USA 405.321.1015 A fundamental principle is never to remain completely passive, but to attack the enemy frontally and from the flank, even while he is attacking us. - Clausewitz:Principles of War, 1812 3055 From: James M. Atkinson, Comm-Eng Date: Thu May 17, 2001 6:42pm Subject: Hanssen Espionage Case Update Hanssen Espionage Case Update May 17, 2001 Hanssen Indicted As Spy for Moscow http://www.washingtonpost.com/wp-dyn/articles/A35603-2001May16.html Former F.B.I. Agent Indicted in Spy Case http://www.nytimes.com/2001/05/17/national/17SPY.html Hanssen trial could air sensitive U.S. spy secrets http://www.nj.com/newsflash/index.ssf?/cgi-free/getstory_ssf.cgi?a0445_BC_FBI-AccusedSpy&&news&newsflash-washington Ex-FBI Agent Charged With Spying http://www.sky.com/skynews/storytemplate/storytoppic/0,,30200-1016303,00.html Indicted FBI agent could face death penalty http://www.thestar.com/cgi-bin/gx.cgi/AppLogic+FTContentServer?pagename=thestar/Layout/Article_Type1&c=Article&cid=989983998197&call_page=TS_World&call_pageid=968332188854&call_pagepath=News/World&col=968350060724 Government indicts Hanssen, charging he spied for Moscow http://www.wtsp.com/news/2001_05/16_spy.htm FBI veteran indicted on espionage charges http://www.katu.com/news/news_story.asp?ID=10181 http://cold.jrnl.com/cfdocs/new/pg/story.cfm?paper=pg§ion=fp&snumber=21 Hanssen indicted on spying charges http://cold.jrnl.com/cfdocs/new/pg/story.cfm?paper=pg§ion=fp&snumber=10 Hanssen faces 21 counts of espionage http://www.jacksonville.com/tu-online/stories/051701/met_6195959.html http://www.usatoday.com/news/washdc/2001-05-16-hanssen.htm Hanssen trial could lead to airing of U-S secrets http://home.abc28.com/Global/story.asp?S=339166&nav=0zGK2RaY Robert Hanssen (FBI photo) http://graphics.nytimes.com/images/2001/05/17/national/17spy.1.jpg http://www.jacksonville.com/images/051701/wx101_fbi_accusedLR.jpg Game over for FBI spy Hanssen http://news.ninemsn.com.au/world/story_13151.asp For more information: FBI investigation report http://www.fbi.gov/majcases/hanssen/hanssenmaj.htm The case against Robert Hanssen http://www.usatoday.com/news/washdc/spyindex.htm ================================ Hanssen Indicted As Spy for Moscow http://www.washingtonpost.com/wp-dyn/articles/A35603-2001May16.html Security Damage Cited in 21 Counts By Brooke A. Masters and Vernon Loeb Washington Post Staff Writers Thursday, May 17, 2001; Page A01 A federal grand jury indicted Robert P. Hanssen yesterday on 21 counts of spying, alleging that the former FBI counterintelligence officer betrayed to Moscow nine double agents, several top-secret communications programs and U.S. preparations to keep the government running in case of nuclear attack. The 57-page indictment handed up in Alexandria provides new details of the damage that Hanssen allegedly caused to national security during 15 years of spying and begins to lay out the evidence prosecutors might use to seek the death penalty. The grand jury charged Hanssen with conspiracy to commit espionage, attempted espionage and 19 specific acts of spying. The indictment also demands that he turn over $1.43 million in alleged proceeds. The conspiracy count and 13 of the specific acts make Hanssen eligible for the death penalty, federal prosecutors said. "This indictment alleges that Hanssen betrayed his country for over 15 years and knowingly caused grave injury to the security of the United States," U.S. Attorney Kenneth E. Melson said in a statement. Plato Cacheris, Hanssen's lead attorney, said he would not discuss the indictment. "We are withholding all comment until court appearances," he said. The indictment moves Hanssen, 57, who was a 25-year veteran of the FBI, one step closer to trial -- a rarity in major espionage cases. It also offers new details about the dozens of programs, documents and people Hanssen allegedly imperiled for $600,000 in cash and diamonds and $800,000 escrowed in Russian bank accounts. Among the allegations: . In 1986, Hanssen told Moscow that the United States was "exploiting" a technical weakness in Soviet satellites to intercept transmissions. . Two years later, he helped the Soviets protect their communications by disclosing a limitation on what the National Security Agency could read. . In 1989, he turned over a top-secret analysis of U.S. plans to "ensure the continuity of government in the event of a Soviet military attack." . He betrayed six Soviet citizens and agents who were secretly working for the United States, in addition to three KGB double agents mentioned in earlier filings. James Bamford, an intelligence expert and author of two books about the National Security Agency, characterized the alleged compromises as "one of the worst espionage losses by NSA ever." Hanssen, of Vienna, will be arraigned June 1 in front of U.S. District Judge Claude M. Hilton. He has been held without bond since his Feb. 18 arrest. FBI agents picked up the father of six after observing him allegedly leaving a package for his Russian handlers in a Fairfax County park. The indictment comes after plea negotiations between Hanssen's attorneys and the government broke down. The sticking point, sources said, was over Justice Department officials' unwillingness to take the death penalty off the table before knowing what Hanssen would tell them about his alleged spying. Some high-ranking members of the Bush administration also believe that Hanssen's alleged treachery was so vile that execution is the only acceptable punishment, sources said. Former CIA official Jack Devine said he supported use of the death penalty as both a bargaining tool and legitimate punishment. Calling the damage Hanssen caused "massive," Devine, who retired in 1999 as London station chief after serving as associate deputy director of operations, said that treason "meets my threshold" for use of the death penalty. "We can tick off enough traitors that there needs to be a counterweight to the monetary temptations," he said. Facing a Monday deadline for an indictment, prosecutors went to the grand jury yesterday after Cacheris refused to agree to a 30-day extension that would have allowed plea negotiations to continue. However, the indictment does not rule out a deal. Harold James Nicholson, a CIA case officer, and Earl E. Pitts, an FBI counterintelligence agent, pleaded guilty to espionage after their indictments. Attorney General John D. Ashcroft told some senators Tuesday that prosecutors "were within a hair's-breadth" of an agreement, according to a congressional source. A senior intelligence official said that an agreement had been expected this week but that "Justice just waited too long." Many counterintelligence professionals continue to argue that the United States would be better served by a full debriefing that would reveal exactly what programs and people were compromised. Rep. Porter J. Goss (R-Fla.), chairman of the House Permanent Select Committee on Intelligence, said he still expects a deal. "You want to bring the man to justice," Goss said. "But you want to get the maximum amount of cooperation from him." In plea discussions, Hanssen's best bargaining chip may be his activities from 1992 to 1999. The indictment and other court filings contain no information on that period. The timing of Hanssen's activities also poses a hurdle for prosecutors, should they choose to seek the death penalty. Operations described in the indictment date from 1985 to 1991, a period when the federal death penalty process had been declared unconstitutional. Congress fixed the espionage statute in 1994, but it is unclear whether the law, which has never been tested, can be applied retroactively. Moreover, the indictment does not address another death penalty issue. Federal officials have previously said that Hanssen could qualify for execution because two of the KGB double agents he allegedly betrayed were put to death by the Soviets. However, those two men also were compromised by Aldrich H. Ames, a CIA counterintelligence officer convicted of espionage, forcing prosecutors to prove that Hanssen's information, rather than Ames's word alone, caused the agents' deaths. Prosecutors also are invoking the part of the espionage statute that permits the death penalty if a spy discloses classified information about, among other things, satellites, "communications intelligence" and "means of defense or retaliation against large-scale attack." Ten of the 14 death penalty-eligible counts in the indictment appear to stem entirely from electronic intelligence. They include betrayal of satellite interceptions and nuclear war preparations. The grand jury also cited eight examples of compromised "communications intelligence," including Hanssen's very first letter to a KGB official's home in Northern Virginia. In that letter, Hanssen named the two agents who were later executed and told Moscow of the existence, location and methods of "an FBI technical penetration of a particular Soviet establishment." Sources said this appears to be the multimillion-dollar tunnel beneath the Soviet Embassy in Washington. "It's all serious stuff," said one intelligence official. Hanssen's technical compromises cost the government millions and rendered entire eavesdropping operations "useless -- or worse," he said. During the Cold War, Bamford said, the U.S. intelligence community -- always concerned about traitors -- considered intercepts of electronic communications to be beyond compromise and, thus, far more authoritative. But since the programs allegedly compromised by Hanssen would have given the Russians opportunities for feeding disinformation, Bamford said, that confidence now seems misplaced. "They had a great opportunity to deceive the U.S. on what they were actually doing," Bamford said. "So if we went to war, there's a good chance we would have had false information." Based on the indictment, former CIA director R. James Woolsey said that Hanssen appears to rank behind Ames in terms of "the people he got killed." "But in terms of technical compromise, he may rank with, or ahead of, the Walkers," Woolsey said, referring to a family spy ring, headed by former Navy warrant officer John A. Walker Jr., that told the Soviets about spy satellites and provided keys that enabled Moscow to break U.S. codes. The current official declined to rank Hanssen among recent spies, but he said, "He's right up there." Staff writer Walter Pincus contributed to this report. C 2001 The Washington Post Company ================================ May 17, 2001 Former F.B.I. Agent Indicted in Spy Case http://www.nytimes.com/2001/05/17/national/17SPY.html By JAMES RISEN WASHINGTON, May 16 - A federal grand jury indicted the former F.B.I. agent Robert P. Hanssen today on charges that he had spied for Moscow for more than 15 years, revealing the identities of Russian agents working for the United States and other secrets. The 21-count indictment, returned in Alexandria, Va., came after negotiations over a possible plea agreement between the government and Mr. Hanssen's lawyers had broken down over prosecutors' refusal to negotiate a deal that would spare Mr. Hanssen's life. Mr. Hanssen, 57, was indicted on one count of conspiracy to commit espionage, 19 counts of espionage and one count of attempted espionage. The government also wants Mr. Hanssen to forfeit the money he was paid for spying, said Kenneth E. Melson, United States attorney for the Eastern District of Virginia. An arraignment is scheduled for June 1. If convicted, Mr. Hanssen faces a possible death sentence. Mr. Hanssen's lawyer, Plato Cacheris, did not return telephone calls this evening. The government charges that Mr. Hanssen, a counterintelligence expert with the F.B.I. for 25 years, volunteered to spy for the Soviet Union in October 1985, by sending an anonymous letter to a K.G.B. officer in Washington. Prosecutors charge that Mr. Hanssen's espionage continued until February of this year. He was arrested on Feb. 18 at a park in suburban Virginia after leaving classified documents for his Russian handlers under a bridge, prosecutors said. The government charged that over the years Moscow gave Mr. Hanssen about $600,000 in cash and diamonds and maintained a reserve account of $800,000 for him. The indictment includes new details about the extent of what the government believes it knows about Mr. Hanssen's espionage and indicates that Mr. Hanssen revealed the identities of more Russian agents working for the United States than officials had previously stated. The indictment also indicates that Mr. Hanssen revealed in his first letter to the K.G.B. in October 1985 the existence of an eavesdropping tunnel constructed by the United States under the Soviet Embassy in Washington. While the indictment does not mention the tunnel, it states that the letter on Oct. 1, 1985 also revealed "the existence of an F.B.I. technical penetration of a particular Soviet establishment, as well as the specific location of the penetration device, and the methods and technology utilized." Previously, United States officials had not disclosed when they believed that Mr. Hanssen had compromised the tunnel operation. In that first letter, Mr. Hanssen also revealed that three K.G.B. officers, Valery F. Martinov, Sergei Motorin and Boris Yuzhin, were secretly working for the United States, the government said. Aldrich H. Ames, a former C.I.A. officer who is imprisoned for spying for Moscow, had already identified the three to the Russians earlier in 1985. The indictment also includes what appear to be newly public references to other Russian spies that the government believes Mr. Hanssen compromised. For example, it states that on Feb. 8, 1988, he left information at a drop site in Virginia that revealed the identity of a K.G.B. "illegal" who was working as a double agent for the F.B.I. An "illegal" is usually a spy working under false cover, often without diplomatic immunity. The indictment does not identify the double agent, or say what happened to the agent after Mr. Hanssen passed the information. The indictment also states that on March 5, 1990, Mr. Hanssen left information at a drop site in Virginia that confirmed the identity of a "Soviet person" who had been recruited by the F.B.I., as well as revealed that a Soviet Embassy employee was working for the F.B.I. On Feb. 2, 1991, the indictment charges, Mr. Hanssen again confirmed the identity of a "Soviet person" in the United States who was working for the F.B.I. On Aug. 19, 1991, the government said, he revealed that the F.B.I. was starting a "dangle" operation against Soviet intelligence at a United States military site. A "dangle" is typically a double- agent operation in which United States intelligence sends someone to meet with a rival intelligence service to gain insight into that operations. Mr. Hanssen also revealed several other technical intelligence operations, the indictment asserts. For example, the government says he revealed in 1991 that the National Security Agency, the nation's secret eavesdropping and code-breaking agency, was reading the communications of a foreign country, which the indictment did not identify. The indictment reveals an extensive gap in the government's knowledge of Mr. Hanssen's activities, however. It does not include specific information about what he might have provided to Moscow between 1991 and 2001, but it does include information concerning his computer use in 1999 and 2000. It says that when he was arrested, he had just left at a drop site seven internal F.B.I. documents that disclosed details of current and proposed F.B.I. counterintelligence operations against the Russians. United States officials have previously indicated that the gap in their knowledge of Mr. Hanssen's activities related directly to how the F.B.I. uncovered the case. Officials say that late last year, a Russian provided the F.B.I. with a copy of Russian intelligence's file on Mr. Hanssen. In the file, he was identified by the code names he used with the Russians to protect his identity. The file obtained by the F.B.I. apparently went through 1991 only. The government's desire to fill in that gap and its interest in finding out what Mr. Hanssen did with the money he was paid, may figure in efforts to restart plea negotiations. ================================ Ex-FBI Agent Charged With Spying http://www.sky.com/skynews/storytemplate/storytoppic/0,,30200-1016303,00.html A former FBI agent has been charged with spying for Russia over a period of 15 years. Robert Hanssen faces 21 counts of espionage, 14 of which carry a maximum punishment of death. Eavesdropping Fifty-seven year-old Hanssen is accused of selling state secrets to Moscow, including classified information on satellites, early warning systems, communications intelligence and nuclear technology. US officials claim Hanssen also revealed to the Soviet Union the existence of an eavesdropping tunnel beneath the Russian embassy in Washington. Hanssen is said to have told Soviet authorities the names of three Russian agents spying for the United States, two of whom were later executed. Diamonds Hanssen was arrested on his way to drop off a bundle of classified information at a park in Virginia to be picked up by his Russian counterparts. An FBI agent for 25 years, Hanssen is said to have been paid $1.4 million in money and diamonds for selling secrets since 1985. US Attorney Kenneth Melson said: "This indictment alleges that Hanssen betrayed his country for over 15 years and knowingly caused grave injury to the security of the United States." Hanssen's attorneys have been trying to secure a guarantee from the government that it will not seek the death penalty before allowing Hanssen to reveal the extent of his activities. Last Modified: 17 May 2001 ================================ Indicted FBI agent could face death penalty http://www.thestar.com/cgi-bin/gx.cgi/AppLogic+FTContentServer?pagename=thestar/Layout/Article_Type1&c=Article&cid=989983998197&call_page=TS_World&call_pageid=968332188854&call_pagepath=News/World&col=968350060724 Arrested last February, Robert Hanssen accused of being Russian spy WASHINGTON (AP) - Robert Hanssen, a veteran FBI counterintelligence agent, was indicted by a federal grand jury Wednesday on charges of spying for Moscow and causing ''grave injury to the security of the United States.'' If convicted, he could get the death penalty. Arrested last February by federal agents while allegedly delivering a package for pickup in a northern Virginia park, Hanssen was indicted on 21 counts of espionage, including conspiracy to commit espionage, and one forfeiture count, the Justice Department said. Hanssen is only the third FBI agent ever accused of espionage. At the time of his arrest, the FBI said that Hanssen, 57, had passed along to Soviet and later Russian agents 6,000 pages of documents on secret programs that described how the United States gathers intelligence, technologies used for listening, people who work as double agents and other highly sensitive matters. The bureau said this activity occurred over a 15-year period starting in 1985. The conspiracy count and the espionage charges carry a maximum penalty of death or life imprisonment. Each charge also carries a potential fine of not more than $250,000 US or double what Hanssen gained from the alleged spying. Discussing the indictment on the steps of the U.S. Courthouse in suburban Alexandria, Va., U.S. Attorney Ken Melson refused to comment on the impact the indictment would have on plea negotiations between Hanssen and the government. ''I can't comment on any plea negotiations or the existence of them or the status of them,'' Melson told reporters, a day after Hanssen's lawyers confirmed that such talks had stalled. Melson also said the 21-count indictment was filed Wednesday - five days before a scheduled hearing for Hanssen - because ''the grand jury sits this week and does not sit on Monday.'' The indictment came after plea discussions between Hanssen's lawyers and federal prosecutors broke down over the issue of the death penalty. Hanssen's lawyers said the government wanted Hanssen to provide information about what secrets he revealed but would not agree to waive the death penalty in exchange for the information. Hanssen's lawyers have said Hansen will plead not guilty. An arraignment was scheduled for June 1. The indictment alleges that Hanssen ''betrayed his country for over 15 years and knowingly caused grave injury to the security of the United States,'' Melson said. The indictment charges Hanssen with conspiring with officers of the KGB and its successor intelligence agency, the SVR, to deliver to Moscow ''information relating to the national defence of the United States'' with the intent of harming the United States and benefiting Moscow, the Justice Department said. The indictment also says that Hanssen's spying led to the identification by Moscow of U.S. agents and consequently in the deaths of two of them. The indictment seeks $1.4 million from Hanssen that he allegedly received in cash and diamonds, along and two Rolex watches. It alleges the spying began on Oct. 1, 1985, and continued until his arrest. Among the highly classified documents and information Hanssen allegedly revealed: satellites, early warning systems, means of defence or retaliation against large-scale attack, communications intelligence and major elements of defence strategy, the Justice Department said in a statement. Melson said, ''We will continue to vigorously pursue this case until Mr. Hanssen is properly brought to justice.'' Plato Cacheris, Hanssen's lawyer, had said Tuesday that he expected his client to be indicted. ''We felt they had more than enough time to resolve the issue of the death penalty. We do not think the death penalty is justified.'' Hanssen's lawyers rejected the government's offer to extend the discussions for another 30 days. A preliminary hearing in the case had been scheduled for Monday, the deadline for the grand jury to hand down an indictment. The hearing was cancelled in light of the indictment. The FBI began investigating Hanssen only last year. He has been held in jail at an undisclosed location. ================================ Government indicts Hanssen, charging he spied for Moscow http://www.wtsp.com/news/2001_05/16_spy.htm WASHINGTON - Robert Hanssen, a veteran FBI counterintelligence agent, was indicted Wednesday on charges of spying for Moscow and causing "grave injury to the security of the United States." If convicted, he could get the death penalty. Arrested last February by federal agents while allegedly delivering a package for pickup in a northern Virginia park, Hanssen was indicted on 21 counts of espionage, including conspiracy to commit espionage, and one forfeiture count, the Justice Department said. Hanssen is only the third FBI agent ever accused of espionage. At the time of his arrest, the FBI said that Hanssen, 57, passed along to Soviet and later Russian agents 6,000 pages of documents on secret programs that described how the United States gathers intelligence, technologies used for listening, people who work as double agents and other highly sensitive matters. The bureau said this activity occurred over a 15-year period starting in 1985. The conspiracy count and the espionage charges carry a maximum penalty of death or life imprisonment. Each charge also carries a potential fine of not more than $250,000 or double what Hanssen gained from the alleged spying. Discussing the indictment on the steps of the U.S. Courthouse in suburban Alexandria, Va., U.S. Attorney Ken Melson refused to comment on the impact the indictment would have on plea negotiations between Hanssen and the government. "I can't comment on any plea negotiations or the existence of them or the status of them," Melson told reporters, a day after Hanssen's lawyers confirmed that such talks had stalled. Melson also said the 21-count indictment was filed Wednesday - five days before a scheduled hearing for Hanssen - because "the grand jury sits this week and does not sit on Monday." The indictment came after plea discussions between Hanssen's lawyers and federal prosecutors broke down over the issue of the death penalty. Hanssen's lawyers said the government wanted Hanssen to provide information about what secrets he revealed but would not agree to waive the death penalty in exchange for the information. Hanssen's lawyers have said Hansen will plead innocent. An arraignment was scheduled for June 1. The indictment alleges that Hanssen "betrayed his country for over 15 years and knowingly caused grave injury to the security of the United States," Melson said. The indictment charges Hanssen with conspiring with officers of the KGB and its successor intelligence agency, the SVR, to deliver to Moscow "information relating to the national defense of the United States" with the intent of harming the United States and benefiting Moscow, the Justice Department said. The indictment also says that Hanssen's spying led to the identification by Moscow of U.S. agents and consequently in the deaths of two of them. The indictment seeks $1.4 million from Hanssen that he allegedly received in cash and diamonds, along and two Rolex watches. It alleges the spying began on Oct. 1, 1985, and continued until his arrest. Among the highly classified documents and information Hanssen allegedly revealed: satellites, early warning systems, means of defense or retaliation against large-scale attack, communications intelligence and major elements of defense strategy, the Justice Department said in a statement. Melson said, "We will continue to vigorously pursue this case until Mr. Hanssen is properly brought to justice." Hanssen attorney Plato Cacheris had said Tuesday that he expected his client to be indicted. "We felt they had more than enough time to resolve the issue of the death penalty. We do not think the death penalty is justified." Cacheris could not be immediately reached. Hanssen's lawyers rejected the government's offer to extend the discussions for another 30 days. A preliminary hearing in the case had been scheduled for Monday, the deadline for the grand jury to hand down an indictment. The hearing was canceled in light of the indictment. The FBI began investigating Hanssen only last year. He has been held in jail at an undisclosed location. Copyright 2001 by The Associated Press. All Rights Reserved. ================================ May 16, 2001 FBI veteran indicted on espionage charges http://www.katu.com/news/news_story.asp?ID=10181 WASHINGTON (AP) - Robert Hanssen, a 25-year veteran FBI agent, was indicted Wednesday on espionage charges. Federal prosecutors said the father of six "betrayed his country for over 15 years" and seriously compromised the security of the United States. If convicted, he could be sentenced to death. Arrested by federal agents in February as he allegedly delivered a package in a northern Virginia park for pickup by his handlers, Hanssen was indicted on 21 espionage counts, including conspiracy to commit espionage, according to the 57-page indictment. Starting in 1985, Hanssen gave U.S. secrets to the Soviet Union, and later to Russia, by dropping documents and computer disks wrapped in plastic garbage bags at "drop dead" sites in parks near his home in suburban Virginia, said the indictment handed up by a grand jury at U.S. District Court in Alexandria, Va. Hanssen's Moscow contacts would leave bags with cash and sometimes diamonds at the drop sites and deposited hundreds of thousands of dollars in banks for him, the indictment said. In all, Hanssen allegedly was paid $1.4 million. The indictment said Hanssen provided Moscow with information about U.S. satellites, early warning systems, means of defense or retaliation against large-scale nuclear attack, communications intelligence and major elements of defense strategy. One count accuses Hanssen of providing information to Moscow that led to the executions of two KGB officers recruited by U.S. intelligence. The government can seek the death penalty in espionage cases in which a spy is proved to have caused deaths of agents of the United States. Hanssen, 57, is only the third FBI agent to be accused of espionage. The conspiracy count and the espionage charges carry maximum penalties of death or life imprisonment. Each charge also carries a potential fine of not more than $250,000 or double the defendant's gains from spying. Hanssen's arraignment was scheduled for June 1. Hanssen's lawyers have said he will plead innocent. Hanssen's lawyers said Tuesday talks on a plea bargain had broken down in a disagreement over the death penalty: the government wanted Hanssen to provide information about secrets he revealed but would not agree to waive the death penalty in exchange. The indictment seeks $1.4 million from Hanssen and $50,000 recovered by the FBI from a package left for Hanssen on the day he was arrested. Hanssen attorney Plato Cacheris said Tuesday he expected his client to be indicted. "We felt they had more than enough time to resolve the issue of the death penalty," Cacheris said. "We do not think the death penalty is justified." Cacheris could not be immediately reached Wednesday. A preliminary hearing in the case had been scheduled for Monday, and an indictment could not have been handed up after that. The hearing was canceled considering Wednesday's indictment. The FBI began investigating Hanssen only last year. He has been held at an undisclosed location since his arrest. ================================ Hanssen indicted on spying charges http://cold.jrnl.com/cfdocs/new/pg/story.cfm?paper=pg§ion=fp&snumber=10 By SHANE WALTER Journal staff writer Robert Philip Hanssen, the FBI counterintelligence agent accused of spying for Russia, was indicted for espionage yesterday by a federal grand jury at the U.S. District Court in Alexandria, Va. Hanssen, 57, of Vienna, was indicted on 19 counts of espionage, and one count each of conspiracy to commit espionage, attempted espionage and forfeiture of property obtained from espionage activity. If convicted, Hanssen could face life imprisonment or the death penalty. An arraignment has been scheduled for June 1. Hanssen plans to plead not guilty. U.S. District Attorney Kenneth E. Melson said ``this indictment alleges that Hanssen betrayed his country for over 15 years and knowingly caused grave injury to the security of the United States." The indictment charges Hanssen with conspiring with the Soviet KGB and its Russian successor, the SVR, by transmitting documents and information concerning the ``national defense of the United States, with intent and reason to believe that they would be used to the injury of the United States and to the advantage of the USSR and its successor, the Russian Federation." Hanssen's actions, according to the indictment, led to the identification and subsequent deaths of two Russian agents. Hanssen has remained in prison since his arrest on Feb. 18, when Arlington police and federal agents caught him allegedly dropping off a package at an Arlington County park containing top secret information. On March 5, Hanssen was ordered to remain in jail until the time of his trial because authorities consider him a great risk of flight. The FBI stated at the time of his arrest that Hanssen, a specialist in counterintelligence at the bureau working primarily with the Soviet Union, had delivered more than 6,000 pages of information to Russia since 1985. Included in these documents is believed to have been information about space satellites, early-warning defense systems, means of defense or retaliation against large-scale attack, communications intelligence and major elements of defense strategy. ``We will continue to vigorously pursue this case," Melson said, ``until Mr. Hanssen is properly brought to justice." The conspiracy count and 13 of the espionage counts all carry a maximum penalty of death or life imprisonment, and the remaining espionage counts and the attempted espionage count all have a life imprisonment maximum penalty. Each charge also carries a fine of not more than $250,000 or twice the amount he was paid for spying. The forfeiture count would force Hanssen to give up the $1.4 million in cash and diamonds, as well as two Rolex watches, he allegedly received from spying. Hanssen allegedly was paid $600,000 in cash and diamonds and another $800,000 was deposited into a foreign bank account. ================================ Thursday, May 17, 2001 Story last updated at 10:21 p.m. on Wednesday, May 16, 2001 Robert Hanssen (FBI photo) http://www.jacksonville.com/images/051701/wx101_fbi_accusedLR.jpg Hanssen faces 21 counts of espionage http://www.jacksonville.com/tu-online/stories/051701/met_6195959.html Indictment alleges 15 years of spying By Karen Gullo Associated Press WASHINGTON -- Robert Hanssen, a 25-year veteran FBI agent, was indicted yesterday on espionage charges. Federal prosecutors said the father of six ''betrayed his country for over 15 years'' and seriously compromised the security of the United States. If convicted, he could be sentenced to death. Arrested by federal agents in February as he allegedly delivered a package in a Northern Virginia park for pickup by his handlers, Hanssen was indicted on 21 espionage counts, including conspiracy to commit espionage, according to the 57-page indictment. Starting in 1985, Hanssen gave U.S. secrets to the Soviet Union, and later to Russia, by dropping documents and computer disks wrapped in plastic garbage bags at ''drop dead'' sites in parks near his home in suburban Virginia, said the indictment handed up by a grand jury at U.S. District Court in Alexandria, Va. Hanssen's Moscow contacts would leave bags with cash and sometimes diamonds at the drop sites and deposited hundreds of thousands of dollars in banks for him, the indictment said. In all, Hanssen allegedly was paid $1.4 million. The indictment said Hanssen provided Moscow with information about U.S. satellites, early warning systems, means of defense or retaliation against large-scale nuclear attack, communications intelligence and major elements of defense strategy. One count accuses Hanssen of providing information to Moscow that led to the executions of two KGB officers recruited by U.S. intelligence. The government can seek the death penalty in espionage cases in which a spy is proved to have caused deaths of agents of the United States. The agents compromised by Hanssen, who were tried on espionage charges in Moscow and executed, were identified first by Aldrich Ames, a CIA officer who pleaded guilty to spying for the Soviet Union in 1994. Hanssen, 57, is only the third FBI agent ever to be accused of espionage. The indictment lists a series of contacts between Hanssen and his handlers, starting in October 1985 and ending on Feb. 18, the day of his arrest. The indictment lists no activity between December 1991 and August 1999. The conspiracy count and the espionage charges carry maximum penalties of death or life imprisonment. Each charge also carries a potential fine of not more than $250,000 or double the defendant's gains from spying. Hanssen's arraignment was scheduled for June 1. Hanssen's lawyers have said he will plead innocent. Discussing the indictment on the steps of the U.S. Courthouse in suburban Alexandria, U.S. Attorney Ken Melson said the 21-count indictment was filed only five days before a scheduled hearing for Hanssen because ''the grand jury sits this week and does not sit on Monday.'' Melson would not say whether the indictment might affect plea negotiations between Hanssen and the government. ''I can't comment on any plea negotiations or the existence of them or the status of them,'' he told reporters. Hanssen's lawyers said Tuesday talks on a plea bargain had broken down in a disagreement over the death penalty: the government wanted Hanssen to provide information about secrets he revealed but would not agree to waive the death penalty in exchange. The indictment alleges that Hanssen ''betrayed his country for over 15 years and knowingly caused grave injury to the security of the United States,'' Melson said. The indictment also accuses Hanssen of: Revealing the existence of ''an FBI technical penetration of a particular Soviet establishment.'' Law enforcement officials believe Hanssen may have alerted Moscow to a secret tunnel that American intelligence agencies built under the Russian Embassy in Washington for eavesdropping. Disclosing the United States knew of a particular technical vulnerability in Soviet satellite transmissions and was actively exploiting it. Revealing information about a recruited KGB officer who secretly defected to the United States and a KGB agent recruited as a double agent. Disclosing the FBI investigation into State Department officer Felix Bloch. Telling Moscow the National Security Agency was reading communications of a foreign country and how the NSA did it. The indictment seeks $1.4 million from Hanssen and $50,000 recovered by the FBI from a package left for Hanssen on the day he was arrested. Hanssen attorney Plato Cacheris said Tuesday he expected his client to be indicted. ''We felt they had more than enough time to resolve the issue of the death penalty,'' Cacheris said. ''We do not think the death penalty is justified.'' Cacheris could not be immediately reached yesterday. A preliminary hearing in the case had been scheduled for Monday, and an indictment could not have been handed up after that. The hearing was canceled considering yesterday's indictment. The FBI began investigating Hanssen only last year. He has been held at an undisclosed location since his arrest. C The Florida Times-Union ================================ US FBI Veteran Indicted for Spying for Moscow http://english.peopledaily.com.cn/200105/17/eng20010517_70180.html People's Daily Online A US federal grand jury on Wednesday indicted Robert Hanssen, a veteran Federal Bureau of Investigation (FBI) counterintelligence agent, on charges of spying for Moscow. Hanssen, was indicted on one count of conspiracy to commit espionage, 19 counts of espionage and one count of attempted espionage, the US Justice Department said. Hanssen "betrayed his country for over 15 years and knowingly caused grave injury to the security of the United States," U.S. Attorney Ken Melson said. The indictment also seeks 1.4 million dollars from Hanssen that he allegedly received in cash, diamonds and two Rolex watches. Hanssen was arrested in February while allegedly delivering a package for pickup in a park in Virginia. The FBI said that Hanssen, 57, had passed to Soviet Union and Russia 6,000 pages of documents on secret programs during a period of 15 years starting in 1985. If convicted on these charges, Hanssen could be sentenced to death or life imprisonment and each count also carries a potential fine of about 250,000 dollars. Hanssen was the third Federal Bureau of Investigation agent ever accused of espionage. Wednesday's indictment came after plea discussions between Hanssen's lawyers and federal prosecutors broke down over the issue of death penalty. A trial was scheduled for June 1. Copyright by People's Daily Online, all rights reserved ================================ Hanssen trial could lead to airing of U-S secrets http://home.abc28.com/Global/story.asp?S=339166&nav=0zGK2RaY Washington-AP -- Government officials say some of the U-S' most sensitive secrets could become public knowledge during former F-B-I agent Robert Hanssen's trial. Hanssen was indicted yesterday on 21 counts of espionage. He is accused of spying for the Soviet Union and later Russia. In the past, the government has entered plea bargain agreements to avoid espionage trials that could air national security secrets. But plea bargain talks with Hanssen's attorneys broke down earlier this week over whether Hanssen would be eligible for the death penalty. Federal officials had to file charges by Monday. Prosecutors offered to extend that deadline, but Hanssen's attorneys refused. He is scheduled to be arraigned June first. Copyright 2001 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed. ================================ Game over for FBI spy Hanssen http://news.ninemsn.com.au/world/story_13151.asp Robert Hanssen, a veteran FBI counter-intelligence agent, was indicted by a federal grand jury today on charges of spying for Russia. Discussing the indictment on the steps of the US Courthouse in suburban Alexandria, Virginia, US Attorney Ken Melton refused to comment on the impact the indictment would have on plea negotiations between Hanssen and the government. "I can't comment on any plea negotiations or the existence of them or the status of them," said Melton, a day after Hanssen's lawyers confirmed that such talks had stalled. Melton also said the 21-count indictment was filed today - five days before a scheduled hearing for Hanssen - because "the grand jury sits this week and does not sit on Monday". Hanssen, who was arrested by federal agents while allegedly delivering a package for pickup in a northern Virginia park, was indicted on one count of conspiracy to commit espionage, 19 counts of espionage and one count of attempted espionage, the Justice Department said. Hanssen was only the third FBI agent ever accused of espionage. At the time of his arrest in February, the FBI said Hanssen, 56, had passed along to Soviet and later Russian agents 6,000 pages of documents on secret programs that described how the United States gathers intelligence, technologies used for listening, people who work as double agents and other highly sensitive matters. The bureau said this activity occurred over a 15-year period starting in 1985. The indictment came after plea discussions between Hanssen's lawyers and federal prosecutors broke down over the issue of the death penalty. Hanssen's lawyers said the government wanted Hanssen to provide information about what secrets he revealed but would not agree to waive the death penalty in exchange for the information. Hanssen's lawyers have said Hansen will plead innocent. An arraignment was scheduled for June 1. The indictment alleges that Hanssen "betrayed his country for over 15 years and knowingly caused grave injury to the security of the United States," Melton said. The indictment charges Hanssen with conspiring with officers of the KGB and its successor intelligence agency the SVR to deliver to Moscow "information relating to the national defence of the United States" with the intent of harming the United States and benefiting Moscow, the Justice Department said. The indictment also says that Hanssen's spying led to the identification by Moscow of individuals who were agents of the US and consequently in the deaths of two of them. The indictment seeks $US1.4 million ($A2.7 million) from Hanssen that he allegedly received in cash and diamonds, along and two Rolex watches. It alleges the spying began on October 1, 1985 and continued until his arrest. Hanssen's attorney Plato Cacheris had said yesterday that he expected his client to be indicted. "We felt they had more than enough time to resolve the issue of the death penalty. We do not think the death penalty is justified." Hanssen's lawyers rejected the government's offer to extend the discussions for another 30 days. A preliminary hearing in the case had been scheduled for Monday, the deadline for the grand jury to hand down an indictment. The FBI began investigating Hanssen only last year. He has been held in jail at an undisclosed location. AP ================================ Hanssen trial could air sensitive U.S. spy secrets http://www.nj.com/newsflash/index.ssf?/cgi-free/getstory_ssf.cgi?a0445_BC_FBI-AccusedSpy&&news&newsflash-washington By KAREN GULLO The Associated Press 5/17/01 3:15 AM WASHINGTON (AP) -- Indictment of veteran FBI agent Robert Hanssen sets the stage for an espionage trial that would focus on some of the United States' most sensitive secrets and how the government says Hanssen passed them to Moscow. The 57-year-old father of six was indicted Wednesday on 21 counts of espionage, accused of betraying his country for about $1.4 million in cash and diamonds. Hanssen revealed identities of double agents, disclosed details of U.S. spying and eavesdropping on people and other countries and gave Moscow information about how America would retaliate for a nuclear attack, the 57-page indictment handed up by a federal grand jury in Alexandria, Va., said. In the past, the government has avoided espionage trials that could air national security secrets by entering plea bargain agreements in which people accused of spying would agree to outline their crimes to authorities in exchange for lighter sentence. For instance, Aldrich Ames, a veteran CIA officer accused of spying more than eight years for the former Soviet Union, pleaded guilty in 1994 and was sentenced to life in prison, avoiding a trial and the prospect that the CIA would be pressured to disclose sensitive information. "To prove espionage, you have to prove that it was harmful. That puts at issue what was disclosed," said Mark Hulkower, the prosecutor in the Ames case. "As part of its proof, the government could be forced to disclose classified information." Plea bargain talks between Hanssen's lawyers and federal prosecutors broke down over the issue of the death penalty, said Plato Cacheris, Hanssen's attorney. The government wanted Hanssen to provide information about what secrets he revealed but would not agree to waive the death penalty in exchange for the information, Cacheris said. Government officials would not comment. The government had until Monday to indict Hanssen. Prosecutors offered to extend the deadline for 30 days to continue negotiations, Cacheris said. He refused. One count accuses Hanssen of providing information to Moscow that led to the deaths of two KGB officers recruited by U.S. intelligence. The government can seek the death penalty in espionage cases in which spying is proved to have caused the deaths of agents of the United States. It's not clear whether that would apply to Hanssen, since the agents were already compromised by Ames. Another potential hurdle if prosecutors want to seek the death penalty is that Hanssen allegedly revealed the agents in 1985, when the federal death penalty was not in effect. An arraignment is scheduled for June 1. The indictment doesn't preclude further plea negotiations, Hulkower said. "You can have plea negotiations up to and including going to trial," he said. "Some cases plead out on the day of the trial." The indictment provided a fresh look at Hanssen's alleged activities. It accused Hanssen of: --Revealing existence of "an FBI technical penetration of a particular Soviet establishment." Law enforcement officials believe Hanssen may have alerted Moscow to a secret tunnel built by American intelligence agencies under the Russian Embassy in Washington for eavesdropping. --Disclosing that the United States knew of a technical vulnerability in Soviet satellite transmissions and was actively exploiting it. --Revealing information about a recruited KGB officer who secretly defected to the United States and a KGB agent recruited as a double agent. --Disclosing the FBI investigation into State Department officer Felix Bloch. --Telling Moscow that the National Security Agency was reading the communications of a foreign country and how the NSA was doing it. ------ On the Net: FBI investigation report: http://www.fbi.gov/majcases/hanssen/hanssenmaj.htm Copyright 2001 Associated Press. All rights reserved. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3056 From: Date: Sun May 20, 2001 9:00pm Subject: Humor ; "Things I'd Wish I Had Known...... "Things I Wish I'd Known ... Before I Went Out In The Real World" 1. Any and all compliments can be handled by simply saying "Why, thank you" though it helps if you say it with a Southern accent). 2. Some people are working backstage, some are playing in the orchestra, some are on stage singing, some are in the audience as critics and some are there to applaud. Know who and where you are. 3. Never give yourself a haircut after three margaritas. 4. When baking, follow directions. When cooking, go by your own taste. 5. Never continue dating anyone who is rude to the waiters and doesn't like dogs/cats. 6. Good sex should involve laughter. Because think about it, it is funny. 7. You need only two tools. WD-40 and duct tape. If it doesn't move and it should, use WD-40. If it moves and shouldn't, use the tape. 8. The five most essential words for a healthy, vital relationship "I apologize" and "You are right." 9. Everyone seems normal until you get to know them. 10. When you make a mistake, make amends immediately. It's easier to eat crow while it's still warm. 11. The only really good advice that I remember my mother ever gave me was, "Go! You might meet somebody!" 12. If he/she says that you are too good for him/her- -believe it. 13. I've learned to pick my battles; I ask myself, 'Will this matter one year from now? How about one month? One week? One day?' 14. If you woke up breathing, congratulations! You have another chance! 15. Living well really is the best revenge. Being miserable because of a bad or former relationship just might mean that the other person was right about you. 16. Knowing how to listen to music is as great a talent as knowing how to make it. 17. Never underestimate the kindness of your fellow man. HAVE A GREAT DAY !!! 3057 From: Dawn Star Date: Mon May 21, 2001 10:33am Subject: Not so funky chicken Scientists at NASA built a gun specifically designed to launch dead chickens at the windshields of airlines, military jets, and the space shuttle, all traveling at maximum velocity. The idea is to simulate the frequent collisions with airborne fowl in order to test the strength of the windshields. British engineers heard about the gun and were eager to test it on the windshields of their new high-speed trains. Arrangements were made, and a gun was sent to the British engineers. When the gun was fired, the engineers stood shocked as the chicken hurled out of the barrel, crashed into the shatterproof shield, smashed it to smithereens, blasted through the control console, snapped the engineer's backrest in two, and embedded itself in the back wall of the cabin, like an arrow shot from a bow. The horrified Brits sent NASA the disastrous results of the experiment, along with the designs of the windshield, and begged the US scientists for suggestions. NASA responded with a one-line memo: "Thaw the chicken" 3058 From: Miguel Puchol Date: Mon May 21, 2001 11:27am Subject: RE: Not so funky chicken I am testimony that this could in fact be true - at least the existance of the chicken-firing gun. They were used to test the Rolls Royce Trent engines against bird impact, and it was curious to see the post-impact high-velocity film that was made from one side of the compressor bypass fan - the chicken was chopped into perfect, thin slices as it passed through the blades. The slices remained 'flying' in formation toghether until hitting the compressor, really finishing the job. Cheers, Mike P.S. The real test for turbine blades was the cheddar cheese served by the catering companies in the in-flight meals. There used to be an alternative table of material strengths, relating them to various elements of such meals. Cheddar-grade titanium was the strongest... > -----Mensaje original----- > De: Dawn Star [mailto:bratkid@e...] > Enviado el: lunes, 21 de mayo de 2001 17:33 > Para: TSCM-L@yahoogroups.com > Asunto: [TSCM-L] Not so funky chicken > > > Scientists at NASA built a gun specifically designed to > launch dead chickens at the windshields of airlines, > military jets, and the space shuttle, all traveling at > maximum velocity. > The idea is to simulate the frequent collisions with > airborne fowl in order to test the strength of the > windshields. > > British engineers heard about the gun and were eager to > test it on the windshields of their new high-speed trains. > Arrangements were made, and a gun was sent to the British > engineers. > > When the gun was fired, the engineers stood shocked as the > chicken hurled out of the barrel, crashed into the > shatterproof shield, smashed it to smithereens, blasted > through the control console, snapped the engineer's backrest > in two, and embedded itself in the back wall of the cabin, > like an arrow shot from a bow. > The horrified Brits sent NASA the disastrous results of > the experiment, along with the designs of the > windshield, and begged the US scientists for suggestions. > NASA responded with a one-line memo: "Thaw the chicken" > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3059 From: A Grudko Date: Mon May 21, 2001 11:44am Subject: UK Labour supports email spy policy ----- Original Message ----- > More snooping to come > http://www.pcadvisor.co.uk/news/display_news.cfm?NewsID=1124 > > by Wendy Brewer > Friday, 18 May 2001 > > Labour supports email spy policy > > The government is backing EU plans to extend the state's power to snoop at > private emails. > > Under the proposals, all email communications will have to be retained by > ISPs for a seven-year period. > > "Only people who have something to hide should be worried," said a > spokesperson at the Department of Trade and Industry. "The government will > only have cause to browse emails if they have their suspicions about a user. > They simply don't have the time or money to check every email sent." > > The proposals were revealed in a leaked EU report earlier this week. > > But Human Rights groups are enraged by the proposals claiming they breach a > fundamental right to privacy. > > Having already campaigned against RIPA (the Regulation of Investigatory > Powers Act), which gives government the right to demand encryption codes, > protestors are now infuriated these powers may be extended. > > "This was meant to strike a balance," said a press officer for the EC. > "Governments need maximum powers to catch cyber criminals, but there will > always be people who are unhappy." > > The European Union's Justice and Home Affairs Committee will consider the > proposals on 28 May. 3060 From: Miguel Puchol Date: Mon May 21, 2001 4:32pm Subject: RE: UK Labour supports email spy policy Hi Andy, Well... > "Only people who have something to hide should be worried," said a > spokesperson at the Department of Trade and Industry. "The government will > only have cause to browse emails if they have their suspicions about a > user. That's what they always say, isn't it? I don't mind CCTV cameras in public spaces, I agree that I've no expectation of privacy out on the street - just the same as if I started shouting my bank details. But, when it comes to conversations or exchanges that I want to perform with other people, and I use a method with which I want to have some expectation of privacy (I know a lot of people say that email is the analogy of shouting in the street, but I'll take some liberties here...), then I think that nobody has the right to snoop into them, at least without a court order, even if 'random' checking is used. The only thing I foresee with all this is increased use of strong cryptography, a lot more snake oil, and so much more government spending in technology to crack the increasing amount of encrypted traffic. Just my two cent's worth, all the best, Mike 3061 From: Dawn Star Date: Mon May 21, 2001 4:49pm Subject: Eavesdropping Law Supreme Court Protects Press From Eavesdropping Law WASHINGTON (Reuters) - The U.S. Supreme Court ruled on Monday that the news media may not be held liable for disclosing the contents of telephone calls that have been illegally intercepted and recorded by someone else. The high court by a 6-3 vote said free speech and freedom of the press protections under the First Amendment prevent such liability from being imposed under a federal wiretapping law designed to prevent the interception of private conversations. Justice John Paul Stevens said for the court majority that when a publisher has lawfully obtained information from a source who has obtained it unlawfully, the government may not punish the ensuing publication. In a case pitting free-speech concerns against privacy interests, Stevens said a stranger's illegal conduct does not suffice to remove the First Amendment shield from speech about a matter of public concern. The ruling was a setback for the U.S. Justice Department, which had defended the law aimed at protecting the privacy of telephone and other electronic conversations. The ruling in a case from Pennsylvania involved a tape recording made illegally of a cell phone conversation between two union officials that was later given to a radio station, which broadcast it repeatedly. The case began in 1993, when a conversation between the Pennsylvania teachers' union officials -- one of whom was speaking on a cell phone -- was recorded by an unknown person. Gloria Bartnicki was the chief negotiator for a teacher's union during protracted contract talks with the Wyoming Valley West School District in Pennsylvania in the early 1990s. In the 1993 telephone conversation with Anthony Kane, the union's president, Bartnicki complained about the school board's reluctance to approve a proposal for a 3 percent pay raise. They discussed the prospect of blowing up the front porches of uncooperative school board members. A copy of the taped conversation was placed in the mailbox of Jack Yocum, who led a group opposed to the union's wage proposals. Yocum gave a copy of the tape to Frederick Vopper, a radio talk show host, who repeatedly played it on his show. Bartnicki and Kane sued Yocum, Vopper and two radio stations under both the state and federal laws for disclosing the tape of the intercepted phone conversation. LAWSUIT WAS CORRECTLY DISMISSED The Supreme Court said a U.S. appeals court had been right in dismissing the suit on free-speech grounds. It said the First Amendment protects the disclosures at issue. Stevens said there was no evidence that Congress thought in adopting the eavesdropping law that the prohibition against disclosure would deter illegal interceptions or reduce the number of such interceptions. He said the privacy of communications and minimizing harm to persons whose conversations have been illegally intercepted represented a strong government interest, but did not outweigh the interest in publishing matters of public importance. One of the costs associated with participation in public affairs is a loss of privacy, Stevens said, citing the ''profound national commitment'' to the principle that debate on public issues should be uninhibited, robust and wide open. The court's three most conservative members -- Chief Justice William Rehnquist and Justices Antonin Scalia and Clarence Thomas -- dissented. Rehnquist cited concern for privacy in electronic communications such as cordless and cellular telephone conversations, as well as personal and business e-mails and medical and financial records. He said the ruling means the federal law and the laws in 40 states violate the First Amendment when the illegally intercepted conversation involved a matter of public concern. From: Perry Myers Date: Mon May 13, 2002 11:31am Subject: Cell Phone Bug Locater Just passing this along as the company has been soliciting this device. Thank you for your interest in the CAA. The CAA is a Cellular Activity Analyzer, based on a modified HP Jornada hand held computer. Its main purpose is to detect active and dormant hidden cellular phones, mainly cell-phones based bugging devices. The CAA is user-friendly, simply operated and easy to use. Performing bug-detection using the CAA completes the "traditional" detection operations. Its relatively low cost enables a quick return-on-investment: It can be sold to executives who are aware of information security importance, or rented to clients who can discreetly leave it at their office for several days or during important meetings. A report of detected cellular activity can be easily loaded to a Word document, providing a customer a with professional report and precise data: were there any cellular-based eavesdropping attempts, when did they take place, estimated location of the cellular-bugs, etc. This will provide an accurate, comprehensive investigation as well position the investigator as an updated, professional expert, who is aware of the most recent innovations, providing clients with state-of-the-art solutions. Please note that in addition to detecting cell-phone-based bugging devices, the CAA also functions as a handheld computer. Based on Windows Pocket PC operating system, the CAA enables you to synchronize your e-mails, colander, address book, Word and Excel files, MP3 music player etc. Enclosed you will find a PDF file containing further information about the CAA. You can view the file using Adobe Acrobat Reader. You may download the Acrobat Reader for free at the following website: <>. Netline is currently looking for worldwide distributors for the CAA, and would be glad to cooperate with your your company. Cellular phone technology has dramatically changed eavesdropping techniques. While a decade ago performing illegal eavesdropping was a complicated task requiring professional expertise (involving the installation of concealed transmitters and receivers on-site), today cellular phones can be easily converted into bugs and placed anywhere. Popular cell-phone models made by Nokia, Motorola and other market leaders, can transform into sophisticated, easily operated bugging devices through a small modification By a simple press of a button, a seemingly standard cell-phone device switches into a mode in which it seems to be turned-off. However, in this deceitful mode the phone will automatically answer incoming calls, without any visual or audio indications whatsoever. Since the airwaves are full with cellular phone transmissions, it is almost impossible to locate such cell-phone-based bugging devices. This task becomes even harder since transmission occurs only when the eavesdropper calls the cellular bug; hence practically - unless one knows where to look for - there is no way of detecting such bugs. The Solution <> Acknowledging this threat, Netline Communications Technologies releases the Cellular Activity Analyzer (CAA). Designed to fight cellular-based bugs, the Cellular Activity Analyzer detects active and dormant cellular phones. The CAA device is based on a modified handheld computer, used to monitor and detect all cellular communication activity in a given area (such as an office or yard). Whenever cellular transmission is detected, the CAA provides the user with real-time audio and visual alerts. CAA also creates a log-report of cellular activity that took place during a certain period of time, logging the exact time of every cellular-transmission, as well as transmissions' duration, type & strength. Using the CAA would enable you to detect active and dormant bugging devices. Based on a handheld computer, the CAA can be discreetly left at your customer's office for several days or during important meetings. Upon request, you will be able to provide your client with precise data: were there any cellular-based eavesdropping attempts, when did they take place, estimated location of the bugs, etc. As a professional in the private investigation field, offering a solution for cellular-based bugging-devices would position you as an updated expert - an expert aware of the most recent innovations, providing clients with state-of-the-art solutions. Perry D. Myers, CFE President & CEO E-mail: perry@d... MSI Detective Services Myers Service, Inc. Corporate Headquarters 2076 N. Elston Ave. Suite 200 Chicago, IL. 60614-3940 Phone 773-342-8300 Facsimile 773-486-4430 Professional Investigators Since 1959 Investigations Nationwide 24 Hour Availability www.detectiveservices.com Process Service Division - Downtown Chicago 205 W. Randolph St., Ste. 1210 Chicago, IL. 60606 Phone 312-782-4000 Fax 312-853-3119 For Security, Surveillance & Privacy Products U-Spy Store Chicago - Orlando - Internet Sales www.u-spystore.com Orlando Warehouse - (800) 393-4779 Chicago Sales - (773) 395-0220 For more information on our investigative services please visit our web site at www.detectiveservices.com This e-mail is strictly confidential. If you receive this e-mail in error, please forward immediately to info@d... --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.361 / Virus Database: 199 - Release Date: 5/7/2002 [Non-text portions of this message have been removed] 5344 From: Hawkspirit Date: Mon May 13, 2002 4:35pm Subject: Call for Sweep Articles Here is another historical article about bug sweeping that appeared in Popular Science August 1987. If anyone has this original article I would like to scan the pictures. My copy was a xerox. Also if you have any sweep articles that would be of interest for putting on my website as historical information or just educational material let me know. Roger Tolces Electronic Security Los Angeles http://www.bugsweeps.com/info/bugsweepers.html 5345 From: Justin T. Fanning Date: Mon May 13, 2002 4:27pm Subject: Re: PROGRAMME TO ID PAST E-MAIL Craig Snedden wrote: > Is your client using Microsoft Exchange? The facility exists within > the Exchange Server to trawl messages as described. Exchange can be "kludged" (via registry modifications) to copy incoming and outgoing messages to a "journal" e-mail box, but there is no such default behaviour as you described. [text removed] > Craig JF 5346 From: Justin T. Fanning Date: Mon May 13, 2002 5:24pm Subject: Re: [Fwd: The The Owl and the Doughnut - UK input Re: Cell Triangulation] George Shaw wrote: > Out of curiosity tonight I took apart a Nokia 3210e (Orange) powered > down and took readings across the range on the Rx side of the circuits > and YES it is powered even when the "switch" is off. Now that's interesting research! > I am running further tests now to see what exactly it is capable of > receiving but all indications are that it can indeed Rx when in "off" > mode which really is a standby mode I guess. What equipment do you have access to? Can you see data on the BUS? Can you probe the IF or is this within an IC? If you can confirm it's monitoring the control channel of your closest cell, that's a major discovery. I would probably go to the software level next and find exactly what functionality is available when in this mode. > I have several other phones here I can hack this week. Now if Nokia > are doing it I guess the others are as well, whether it's in the > spec or not. Look forward to hearing of your findings. JF 5347 From: Aimee Farr Date: Mon May 13, 2002 5:31pm Subject: The Dogs of Tierra del Fuego > WASHINGTON, May 10 ≠ A federal judge sentenced former FBI agent > Robert Hanssen to life in prison without parole Friday for spying for > Moscow, closing a chapter in one of America's most-damaging espionage > scandals. That was a big story, but as the world turns, so is the press. People can focus on negative facts, and loose sight of the wisdom. CHARLES DARWIN, ON THE ORIGIN OF SPECIES (A parsed simile) Nor ought we to think that the occasional destruction of an animal of any particular colour would produce little effect: we should remember how essential it is in a flock of white sheep to destroy every lamb with the faintest trace of black. ....Let us take the case of a wolf, which preys on various animals, securing some by craft, some by strength, and some by fleetness; and let us suppose that the fleetest prey, a deer for instance, had from any change in the country increased in numbers, or that other prey had decreased in numbers, during that season of the year when the wolf is hardest pressed for food. Under such circumstances the swiftest and slimmest wolves would have the best chance of surviving, and so be preserved or selected, -- provided always that they retained strength to master their prey at this or at some other period of the year, when they might be compelled to prey on other animals. I can see no more reason to doubt this, than that man can improve the fleetness of his greyhounds by careful and methodical selection, or by that unconscious selection which results from each man trying to keep the best dogs.... ....the wolves inhabiting a mountainous district, and those inhabiting the lowlands, would naturally be forced to hunt different prey; and from the continued preservation of the individuals best fitted for the two sites, two varieties would slowly be formed. These varieties would cross and blend where they met.... according to Mr. Pierce, there are two varieties of the wolf inhabiting the Catskill Mountains in the United States, one with a light greyhound-like form, which pursues deer, and the other more bulky, with shorter legs, which more frequently attacks the shepherd's flocks. ....there exist savages so barbarous as never to think... yet any one animal particularly useful to them, for any special purpose, would be carefully preserved during famines...and such choice animals would thus generally leave more offspring than inferior ones; so that in this case there would be a kind of unconscious selection going on. We see the value set on animals even by the barbarians of Tierra del Fuego, by their killing and devouring of old women, in times of dearth, as of less value than their dogs. [...] 'Doggies catch otters, old women, no'. -- VOYAGE OF THE BEAGLE 5348 From: Justin T. Fanning Date: Mon May 13, 2002 6:18pm Subject: Re: Detection of cell-phone-based bugging devices Hawkspirit wrote: >> Anybody know what this is about and how it works? Roger >> Detection of cell-phone-based bugging devices >> The New Threat >>image001.pngimage002.gif not very much help on a group that strips binary attachments >> Cellular phone technology has dramatically changed eavesdropping >> techniques. While a decade ago performing illegal eavesdropping was >> a complicated task requiring professional expertise (involving the >> installation of concealed transmitters and receivers on-site), today >> cellular phones can be easily converted into bugs and placed >> anywhere. >> Popular cell-phone models made by Nokia, Motorola and other market >> leaders, can transform into sophisticated, easily operated bugging >> devices through a small modification >> By a simple press of a button, a seemingly standard cell-phone >> device switches into a mode in which it seems to be turned-off. >> However, in this deceitful mode the phone will automatically answer >> incoming calls, without any visual or audio indications whatsoever. This is through the use of the hands free feature. When in hands free mode, most handsets assume they are in a cradle of sorts and are probably non visible to the eye. Thus the display is shut down and instead display information is sent to the control lines (which assume they are talking to a car kit). Most handsets can be programmed to auto answer in hands free (car kit) mode (to answer the phone while you are driving). Most handsets can be put into this mode by shorting select pins on the base of the handset, or via a keypad command. Once in hands free mode the handset will answer incoming calls without ringing or displaying anything (as all this data is sent only to the control lines). As no external mic/speaker is connected the existing mic/speaker are used. The perpetrator simply then needs to call the handset (usually from a phone with audio amplification ability - a speaker phone (on local mute) may suffice) and they will be piped room audio from the cell phone. >> Since the airwaves are full with cellular phone transmissions, it is >> almost impossible to locate such cell-phone-based bugging devices. >> This task becomes even harder since transmission occurs only when >> the eavesdropper calls the cellular bug; hence practically - unless >> one knows where to look for - there is no way of detecting such >> bugs. The 'bug' would poll the closest base station just like any other cellular device. I would like to think any TSCM'er worth their salt would detect a 2W burst of wide band data ~ every 20 minutes. Isn't one of JMA's favourite tricks to catch the really sneaky ones to leave a wide band peek logging spectrum analyser active for 24 hrs+ to catch burst transmitters etc. A cell phone would be picked up in under 30 minutes. >> The Solution >> image003.jpgimage003.jpg Again more images. >> Acknowledging this threat, Netline Communications Technologies >> releases the Cellular Activity Analyzer (CAA). Designed to fight >> cellular-based bugs, the Cellular Activity Analyzer detects active >> and dormant cellular phones. Dormant meaning switched on, but not actively on a call. >> The CAA device is based on a modified handheld computer, used to >> monitor and detect all cellular communication activity in a given >> area (such as an office or yard). Whenever cellular transmission is >> detected, the CAA provides the user with real-time audio and visual >> alerts. CAA also creates a log-report of cellular activity that took >> place during a certain period of time, logging the exact time of >> every cellular-transmission, as well as transmissions duration, >> type & strength. So it's a hardware receiver/decoder with a software logging back end. A poor mans cellular test/logging spectrum analyser of sorts. I was expecting more whiz bang, like a unit that scanned through the major cellular standards (TDMA, CDMA, GSM, AMPS etc.) emulating a base. Or even a unit that once it detected a bit stream, decrypted and decoded the stream in real time. This is just a smokescreen for a narrow band logging SA. >> Netline is currently looking for worldwide distributors for the CAA. The Spy Shop is pretty cashed up after their reverse-IPO... >> As a company that deals with security solutions, offering an answer >> to cellular-based bugging devices would position you as an updated >> expert, aware of the most recent innovations. Snake oil. If you've got a wide band spectrum analyser, by the time you've had your first coffee the 'bug' has already identified itself to the nearest cellular base. Just out of interest, while performing sweeps, do people ask clients to switch off all cellular devices (including staff etc. if the building is manned at the time)? or do people simply ignore this part of the spectrum? I guess no one will after reading this list the past few days! >> The CAA will join your existing line of products enabling you to >> continue to provide your clients with the most advanced technology >> available in the battle against bugging devices. Ockham's Razor... JF 5349 From: James M. Atkinson Date: Mon May 13, 2002 9:43pm Subject: Re: Detection of cell-phone-based bugging devices Curtis makes (or made) a similar unit. It scans the frequencies emitted from the mobile, and logs where the energy pops up on the spectrum. It then builds a chart of the signals while you move the instrument over the area being tested. You can then "hone in on" a specific signal by using a directional antenna. Next a small signal is generated (much to the FCC's annoyance) to make the cell phone think it just changed towers and the operator fools the suspect phone unto actually answering, and get a hard lock on the location. The instruments are totally inappropriate for eavesdropping, but are great for finding cellular phones being used in naughty ways. Always use an small loop antenna or equiangular unit to keep the unit highly directional. -jma At 12:04 PM -0700 5/13/02, Hawkspirit wrote: > >Anybody know what this is about and how it works? Roger >> >>Detection of cell-phone-based bugging devices >> >> >> >>The New Threat >> >> >> >>image001.pngimage002.gif >> >>[ Cellular phone technology has dramatically changed eavesdropping >>techniques. While a decade ago performing illegal eavesdropping was a >>complicated task requiring professional expertise (involving the >>installation of concealed transmitters and receivers on-site), today >>cellular phones can be easily converted into bugs and placed anywhere. >> >> >> >>Popular cell-phone models made by Nokia, Motorola and other market >>leaders, can transform into sophisticated, easily operated bugging devices >>through a small modification >> >>By a simple press of a button, a seemingly standard cell-phone device >>switches into a mode in which it seems to be turned-off. However, in this >>deceitful mode the phone will automatically answer incoming calls, without >>any visual or audio indications whatsoever. >> >> >>Since the airwaves are full with cellular phone transmissions, it is >>almost impossible to locate such cell-phone-based bugging devices. This >>task becomes even harder since transmission occurs only when the >>eavesdropper calls the cellular bug; hence practically - unless one knows >>where to look for - there is no way of detecting such bugs. >> >> >> >> >> >>The Solution >> >> >> >>image003.jpgimage003.jpgAcknowledging this threat, Netline Communications >>Technologies releases the Cellular Activity Analyzer (CAA). Designed to >>fight cellular-based bugs, the Cellular Activity Analyzer detects active >>and dormant cellular phones. >> >> >> >>The CAA device is based on a modified handheld computer, used to monitor >>and detect all cellular communication activity in a given area (such as an >>office or yard). Whenever cellular transmission is detected, the CAA >>provides the user with real-time audio and visual alerts. CAA also creates >>a log-report of cellular activity that took place during a certain period >>of time, logging the exact time of every cellular-transmission, as well as >>transmissions duration, type & strength. >> >> >> >>Netline is currently looking for worldwide distributors for the CAA. >> >>As a company that deals with security solutions, offering an answer to >>cellular-based bugging devices would position you as an updated expert, >>aware of the most recent innovations. >>The CAA will join your existing line of products enabling you to continue >>to provide your clients with the most advanced technology available in the >>battle against bugging devices. >> >> >> >> >> >>For further information, brochures, or any question, please contact: >> >> >> >>Ms. Loreen Haim >> >>Netline communications Technologies >> >>Tel: +972-3-5109855 Ext. 119 >> >>Fax: +972-3-5109821 >> >>Email: loreen@n... >> >>Website: www.netline.co.il >> >> >> > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5350 From: Steve Uhrig Date: Mon May 13, 2002 9:52pm Subject: Barry McCleary front and center Barry, if you have not been getting my emails, please call me Tuesday sometime. I need to settle with you, but it appears as if your email may be blocked by our anti spam measures. I have been replying to your mails but have not heard back from you. If you have been getting my mails, please acknowledge so I can settle up with you. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5351 From: John M Date: Mon May 13, 2002 6:01pm Subject: Dangers of profiling While were all getting busy nailing Arabs, lets not forget: Who detonated a car bomb in Oklahoma City killing 168 persons? A) A muslim extremist male B) A pizza guy C) A white male, aged 25-35 Who attacked the USS Liberty, an unarmed, clearly marked US spy ship? A) A country full of muslim extremist males B) A country full of pizza guys C) Israel Who cost the United States taxpayers close to $500 billion dollars in the Saving & Loan looting spree in the 1990's? A) A bunch of poor blacks in the ghetto B) A bunch of poor muslim extemists in the ghetto C) A bunch of very wealthy, predominantly white-male businessmen Who ran the most power national security agency in the world for 50 years, collected dossiers on thousands of individuals, used said dossiers for blackmail purposes, while at the same time, was a drag queen thus exposing himself (and the most powerful national security agency in the world) to being blackmailed itself? A) A muslim extremist B) A pizza guy C) J. Edgar Hoover That's the tricky bit with the profiling, while your busy putting a stereotype under the microscope, there goes your twin brother carrying a bomb... __________________________________________________ Do You Yahoo!? LAUNCH - Your Yahoo! Music Experience http://launch.yahoo.com 5352 From: dr_chevalier2002 Date: Mon May 13, 2002 9:27pm Subject: hello all Hello all, I wanted to introduce myself and agency( both can be found in the Email signature. I've been in the business for over 22 years both (public and private combined). If anyone needs Criminal Profiling performed on some cases, don't hesitate to make contact. Doc Dr. Dennis H. Chevalier PhD, LPI, APA, AABP DIRECTOR The CONSORTIUM of SCIENTIFIC INVESTIGATION & RESEARCH in cooperation with CHEVALIER AND ASSOCIATES Lic.# A07811 Web site: http://www.behavioral-sciences.org Email: doc@b... Main direct 817.263.9599 Fax 817.314.8092 Pager 817.432.6058 Cell 817.992.8993 Join a team for a cure for Cancer, Alzheimer disease and Genetics mutations at: http://members.ud.com/services/teams/team.htm?id=1E52EF2C-86C4-407B- 9209-B7FC63800495 5353 From: Gregory Perry Date: Mon May 13, 2002 11:09pm Subject: Re: Cell Triangulation] > Do you have any websites for these briefcase bandits? Are they sold as > legitimate testing tools like a GSM test-set of sorts, a law > enforcement tool or are they strictly for the grey market? I'll dig around tonight and see if I can find the German company that makes the briefcase model, it is not a grey market product but rather a modified cell site/BSS used for legitimate law enforcement interception. With a properly modified BSS, one could wreak havok in GSM networks. There are several niche spectrum analyzers that include similar functionality, but are not specifically tailored for interception capability... > > It was a bit more than that, Mitnick in collusion with an Israeli > > national retrieved handset source code from Motorola. Shimmy tracked > > him down with a modified Oki-900 handset and CTEK cable (also very > > much illegal). Congress had to give Shimmy immunity in order to > > testify about the case. > > I don't know the specific details to comment here, though it sounds > fascinating. Perhaps you could enlighten us, what was the cellphone > modified to do exactly? The original Oki-900 actually had several "vendor specific anomalies" that allowed you to put it into debug mode, and do pretty much anything you wanted with an analog AMPS system (scanning cell freqs, forward control channel dumps, specific frequency overrides etc.). There was a company (called Network Wizards I recall) that developed a special cable that you could augment the Oki-9 with a handheld or PDA to do illegal neat things, like monitor various control and paging channels to watch handoffs, track calls (a first gen trunk tracker if you will), grab reverse control channel info (ESN/MIN pairs, dtmf digits dialed field etc). In addition, the early model Oki's had a socketed PROM which made custom mods trivial; the first mod was 4006, a tumbler modification that generated a new ESN/MIN pair each time you turned the phone on. At that time, few MTSOs were real time connected to the network, so if you came up with a correct manufacturer code + random ESN + out of area M! IN, you could validate with the network and make one call before your ESN/MIN pair was blacklisted. Some MTSOs would accept whatever MIN you gave them, so you could on boot punch in the number you wanted the phone call to appear from (say the payphone in front of the FBI building) and that would be your ANI information. One company that initially developed a cellular digital data interpreter (DDI) that was similar to the Curtis ESN grabber eventually made their millions by selling retrofits for cell sites that did only one thing - look for tumbled calls, and forge a disconnect from the handset to the cell site. Early generation cell sites did not have the capability to disconnect calls, e.g. once you pulled off a tumbled call you could ride out on the line for hours (or days), even after the ESN/MIN was blacklisted, simply because the cell site had never been built with the capability of disconnecting calls in progress. Later generation mods for the Oki-9 became increasi! ngly more advanced, including one (called the vampire mod) that put the phone into Rx mode while on hook, monitored the reverse control channel, did the necessary manchester decoding, and stored each ESN/MIN pair in memory to be used one time for each call (basically piggy backing on captured ESN/MIN pairs). Shimmy got a CTEK cable, Oki-9 and handheld loaded with indial numbers for the ISP Mitnick was using, and used that with help from a telco to triangulate Mitnick (as he was using a modified Oki-900 with an RJ-11 interface to dial into his ISP and break into networks over cellular data connections). Anyway, Mitnick got a federal prison sentence, Shimmy got immunity, and the devil is in the details. Two wrongs might not make a right, but they made for a book and movie deal for Shimmy. Thank God all of those problems have been fixed with current generation digital and GSM networks. Ahem. 5354 From: James M. Atkinson Date: Mon May 13, 2002 11:25pm Subject: Re: hello all I would like to invite you to kiss my ass Dennis... both cheeks, and then the pucker, and please take your time. If you recall, you came to my website about 2 years ago, stole my entire bio and simply replaced my name with your own and plastered it all over your website at www.realspy.com claiming it was your own. You also stole dozens of my graphics, and completely ignored my requests to delete them. It wasn't until I confronted you on the phone, and got you stop lying that you even admitted that the website was even yours. Quite a few respect members of the TSCM and security all visited the site in question, and will confirm that the page you had up as your own BIO was grossly pilfered from my own website. Several of these people also contacted you and discussed the credentials that were presented on your site (and even got you to confess that the bio was yours, and that you do all you own html coding, etc). In a nutshell you were acknowledging that you knew that not only was the meters there, but only claimed they where YOUR credentials, and that YOU were the one who placed them there. On top of that you actually had the balls to print our the stolen materials and pawn it off on your clients, and claim that it was your own credentials. Clients where not amused by your prancing around their office for 30 minutes with a Bearcat scanner and a broadband diode detector only to have you claim that you detected four bugs (but couldn't tell the victim where the bugs were, provide a bearing, or even what frequencies they were on). Where you ever curious why your contact there tossed you out of the building after less then two hours on site. Of course when you realized that you had been caught lying and stealing you claimed that someone had hacked you website; and yet you felt it was OK to borrow or even steal anothers creditably. So why would a group of hackers break in to your website and upload a modified BIO they swiped from someone else, and yet you didn't detect it for over seven months. Not only did you not detect it, but you even printed it up, reproduced it, and used it as a sales tool... Of course it must have been the evil hackers doing all these things. Dennis, we both know that you stole from me, and that you are full of shit.. We also both know that you still owe me over $300,000 dollars for the period of time you were unlawfully using my materials. On top of that it shames the real veterans, the military, and even the honor of the uniform when you try to make people thing that you were some kind of a colonel in the USAF. It is a disgrace what you are doing, and you need to stop. No doubt you claim to have a medal of Honor, or even a SEAL Budweiser. We do not need posers such as yourself making the entire industry look bad. So kindly go fuck your self, -jma At 2:27 AM +0000 5/14/02, dr_chevalier2002 wrote: >Hello all, I wanted to introduce myself and agency( both can be >found in the Email signature. >I've been in the business for over 22 years both (public and private >combined). >If anyone needs Criminal Profiling performed on some cases, don't >hesitate to make contact. >Doc > >Dr. Dennis H. Chevalier PhD, LPI, APA, AABP > >DIRECTOR > > > >The CONSORTIUM of SCIENTIFIC INVESTIGATION & RESEARCH >in cooperation with CHEVALIER AND ASSOCIATES Lic.# A07811 >Web site: http://www.behavioral-sciences.org >Email: doc@b... >Main direct 817.263.9599 >Fax 817.314.8092 >Pager 817.432.6058 >Cell 817.992.8993 > >Join a team for a cure for Cancer, Alzheimer disease and Genetics >mutations at: >http://members.ud.com/services/teams/team.htm?id=1E52EF2C-86C4-407B- >9209-B7FC63800495 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5355 From: Matthew Paulsen Date: Tue May 14, 2002 0:34am Subject: RE: Dangers of profiling Hey this is fun. Here's one I just thought up. Who turned over 'classified secrets' (Heard that on the news the other night. As opposed to those non-classifed secrets. Or non-secret classifieds? It's a want ad :P) to US enemies for 22 years, earning $1.4 million and killing at least 3 operatives in the field. A) A muslim extremist male B) A pizza guy C) A middle aged white male working for the FBI, with a home, wife and kids (and stripper on the side). Anyone else got one cooking? Thanks, Matt Paulsen Orange Networks LLC - Computers, Networks, Internet and Security http://www.orange-networks.com 503.533.4767 -----Original Message----- From: John M [mailto:johnem101@y...] Sent: Monday, May 13, 2002 4:01 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Dangers of profiling While were all getting busy nailing Arabs, lets not forget: Who detonated a car bomb in Oklahoma City killing 168 persons? A) A muslim extremist male B) A pizza guy C) A white male, aged 25-35 Who attacked the USS Liberty, an unarmed, clearly marked US spy ship? A) A country full of muslim extremist males B) A country full of pizza guys C) Israel Who cost the United States taxpayers close to $500 billion dollars in the Saving & Loan looting spree in the 1990's? A) A bunch of poor blacks in the ghetto B) A bunch of poor muslim extemists in the ghetto C) A bunch of very wealthy, predominantly white-male businessmen Who ran the most power national security agency in the world for 50 years, collected dossiers on thousands of individuals, used said dossiers for blackmail purposes, while at the same time, was a drag queen thus exposing himself (and the most powerful national security agency in the world) to being blackmailed itself? A) A muslim extremist B) A pizza guy C) J. Edgar Hoover That's the tricky bit with the profiling, while your busy putting a stereotype under the microscope, there goes your twin brother carrying a bomb... __________________________________________________ Do You Yahoo!? LAUNCH - Your Yahoo! Music Experience http://launch.yahoo.com Yahoo! Groups Sponsor ADVERTISEMENT Height: 4567 ft 01234567891011 in Weight: Sex: F M ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 5356 From: Matthew Paulsen Date: Tue May 14, 2002 1:13am Subject: RE: Dangers of profiling >> As a former pizza guy, I object to the stereotyping... Now, lawyers... They're fair game... Stereotyping? I only see profiling going on here. Matt (note: Received the above quote directly from someone. Reposting w/o their creds. We wouldn't want to profile the pizza guy's background too much. It could lead to "demographic data mining" Wait.. I hear the marketing hounds approaching :) [Non-text portions of this message have been removed] 5357 From: David Alexander Date: Tue May 14, 2002 8:27am Subject: UK input Re: Cell Triangulation >Can you show me in the 6,000 pages of GSM spec... This is precisely the kind of information that would not be included in the published specifications, similar to the fact that there is a back door built into the GSM encryption algorithm so that the authorities can monitor conversations. To my knowledge that is not published anywhere either, other than by Ross Anderson. My 2C. _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 5358 From: Hawkspirit Date: Tue May 14, 2002 8:37am Subject: Curtis Jim, Is there web information on this unit? Roger From: "James M. Atkinson" Subject: Re: Detection of cell-phone-based bugging devices Curtis makes (or made) a similar unit. 5359 From: David Alexander Date: Tue May 14, 2002 9:20am Subject: re: tracing e-mail Raymond Further to your query. If the company in question are any good they will be making backups of their servers, including the e-mail server, on a daily basis. It is a time-consuming but often useful exercise to look through the backup tapes for any traffic logs that may have been overwritten, deleted, etc, to see if the message or addressee is lurking in the tapes. To avoid web mail being used for such purposes (and to prevent viruses and Trojans getting in this way, which is almost impossible to scan effectively) we block access to all webmail services on our firewall and proxy servers. I may not be a TSCM professional, but when it comes to computer security, I'm your man. If you want any more advice on this then feel free to e-mail me offline. regards _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 5360 From: Marcel Date: Tue May 14, 2002 9:27am Subject: WAS-UK input Re: Cell Triangulation Now-Motorola Files for GSM Bugging Patents Motorola Files for GSM Bugging Patents Motorola http://www.mot.com Summary: 7:54:01 AM 4/13/2000 Britain's "New Scientist" magazine has revealed some insight into how secure GSM phones can be monitored by police and security agencies via Motorola technology that now is in the patent process. The Motorola patent says the weak point comes when the caller logs on and has to make his or her details known to a central computer handshake to check the ID and to arrange billing. If a caller or recipient is on a wanted list, the call is diverted to the authorities. The patent reportedly makes no mention of how the coded calls are deciphered; presumably, the authorities have a back-door key. In Australia, GSM was delayed until such agencies as the Defense Signals Directorate could decode it. Reported by Newsbytes. Further information available. Full Article: SYDNEY, AUSTRALIA, 2000 APR 12 (NB) -- By John Stackhouse, Computer Daily News. Now that much of the world is using supposedly "secure" GSM (Global System for Mobile communications) mobile phones, did you ever wonder how the police and security services manage to bug the calls? Britain's New Scientist magazine found the answers in patents which US-based Motorola [NYSE:MOT] filed recently. As long suspected, ordinary mobiles are tapped at the land interface. Each caller has to log on to a cell and most go through another cell or a switch to complete the call, depending on whether they're mobile-to-mobile or mobile-to-line calls. Monitors can arrange to nominate callers and listen in. The question of satellites was more intriguing. Many calls will go on satellite-to-satellite relays (as in the late, lamented Iridium) and be re-broadcast direct from near space to the recipient on Earth. The Motorola patent says that, as with terrestrial mobiles, the weak point comes when the caller logs on and has to make his or her details known to a central computer handshake to check the ID and to arrange billing. If a caller or recipient is on a wanted list, the whole call is diverted to the authorities. The patent makes no mention of how the coded calls are deciphered. Presumably the authorities have a back-door key. GSM is the world's most common mobile phone system with around 250 million users around the globe, or more than two thirds of all users. In Australia, introduction of GSM was delayed until services such as the government's shadowy Defence Signals Directorate could be sure that it could decode GSM. David Alexander wrote: > >Can you show me in the 6,000 pages of GSM spec... > > This is precisely the kind of information that would not be included in the > published specifications, similar to the fact that there is a back door > built into the GSM encryption algorithm so that the authorities can monitor > conversations. To my knowledge that is not published anywhere either, other > than by Ross Anderson. > > My 2C. > > _______________________________ > David Alexander M.INSTIS > Global Infrastructure Director > Bookham Technology plc > Tel: +44 (0) 1327 356264 > Mobile: +44 (0) 7799 881284 > Fax: +44 (0) 1327 356775 > http://www.bookham.com > > > ======================================================================= > This e-mail is intended for the person it is addressed to only. The > information contained in it may be confidential and/or protected by > law. If you are not the intended recipient of this message, you must > not make any use of this information, or copy or show it to any > person. Please contact us immediately to tell us that you have > received this e-mail, and return the original to us. Any use, > forwarding, printing or copying of this message is strictly prohibited. > > No part of this message can be considered a request for goods or > services. > ======================================================================= > Any questions about Bookham's E-Mail service should be directed to postmaster@b.... > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 5361 From: James M. Atkinson Date: Tue May 14, 2002 9:38am Subject: Smarter Spying http://www.nytimes.com/2002/05/14/opinion/14KRIS.html?todaysheadlines=&pagewanted=print&position=top MCLEAN, Va. - While visiting the C.I.A.'s headquarters here and admiring the high-tech perimeter fence as well as displays of gadgetry like a K.G.B. electrical plug that doubles as a bug, I've been thinking back on my first encounter with the Spooky World. It was 1988, and my wife, Sheryl WuDunn, and I had just moved to Beijing. While I was on a ladder hanging pictures in our new apartment, I found a cubbyhole covered with wire mesh. Taking a hammer, I smashed the mesh and found a nest of electrical devices. On one of them was a row of Chinese characters that translated literally as "electric sound-carrying device." So our apartment had been bugged! Sheryl and I disappeared into the bathroom, turned on the shower to drown out the bugs and whispered into each other's ears. Should we smash the bugs? No! We would leave them there to feed disinformation to Chinese State Security. For example, we would praise the willingness of the leading hard-liner, Li Peng, to leak documents to us. For now, it seems as if Congress will also wield a hammer soon. It is launching a major investigation of America's spooks in the coming weeks. A tough investigation is essential, for this is a rare chance to diagnose and fix deep problems in the $30-billion-a-year intelligence apparatus. Conversations with people in this shadowy world suggest that America's spies, nurtured on cold-war tasks like monitoring the Soviet Army, are struggling to adapt to newer threats like Al Qaeda. The spies are hobbled by a culture of timidity and by the proclivity of any ponderous bureaucracy to eschew risk and waddle behind the curve. "You had to get permission to talk to anybody who wasn't in the Rotary Club," said Senator Richard Shelby, vice chairman of the Senate's Intelligence Committee, speaking of pre-9/11 constraints on C.I.A. officers. George Tenet, the C.I.A. director, denies that 9/11 reflects an "intelligence failure." Mr. Tenet, who in the last few years has made progress in fixing the problems, knows better. As early as 1995, Philippine police spent weeks extinguishing cigarettes into the flesh of a terrorist named Abdul Hakim Murad, who had taken flying lessons in Texas, New York and North Carolina. It turned out that he was plotting to bomb 11 commercial planes and crash another into C.I.A. headquarters. A year earlier, Islamic terrorists had hijacked a plane in a plot to crash it into the Eiffel Tower. Ashton Carter, a former assistant secretary of defense, notes that a standard preventive approach in the military is to assign a "red team" to come up with methods of attack, and a "blue team" to design countermeasures. If this had been done, then the red team might have dreamed up something like 9/11 - while the blue team might have thought of steps like reinforced cockpit doors. Robert Baer, in his recent C.I.A. memoir, "See No Evil," describes being based in Tajikistan during the Afghan civil war and pleading for a speaker of Dari or Pashto to interview Afghan refugees and collect intelligence on Afghanistan. Headquarters instead offered to send him a four-member team to brief him on sexual harassment. Today's touchy-feely C.I.A. even has Take Our Daughters to Work Day, although children are closely monitored so that they do not overthrow small African governments. And, in the ultimate indignity of small-minded civilian oversight, C.I.A. employees must not exceed a 25 mile per hour speed limit within their own headquarters compound - for, a sign warns, it is "radar-enforced." To his credit, Mr. Tenet has moved aggressively since 9/11 to take risks and redeploy against terrorist threats. The head of operations, Jim Pavitt, claims that 10 times as many operations people are being trained now as six years ago. The new emphasis on human intelligence is essential, for it is much better than electronic intercepts to answer the crucial questions for American foreign policy: Will China become a military threat? Will the Saudi monarchy collapse? How can we better control Russian nukes? Oh, and another reason to cultivate spies who really know foreign societies, rather than dilettantes who get excited at the first gadget they find: As Sheryl and I discussed our plans to release disinformation to the Chinese, a friend arrived at the front door, and we learned the colloquial meaning of "electric sound-carrying device." It's "doorbell buzzer." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 5362 From: James M. Atkinson Date: Tue May 14, 2002 10:33am Subject: Apology to the list Good morning, The below posting was supposed to have been sent to Dennis privately, and was not intended to be public. Such material is inappropriate for posting to the list, and should sent privately. I was tired when I made the post and somehow accidently cross posted it to the list, but I feel that it is an accurate account of the facts concerning Dennis ripping me off by plagiarizing off my website. I apologize for posting it to the list as it was supposed to be a private message to Dennis. -jma At 12:25 AM -0400 5/14/02, James M. Atkinson wrote: >I would like to invite you to kiss my ass Dennis... both cheeks, and >then the pucker, and please take your time. > >If you recall, you came to my website about 2 years ago, stole my >entire bio and simply replaced my name with your own and plastered it >all over your website at www.realspy.com claiming it was your own. >You also stole dozens of my graphics, and completely ignored my >requests to delete them. It wasn't until I confronted you on the >phone, and got you stop lying that you even admitted that the website >was even yours. > >Quite a few respect members of the TSCM and security all visited the >site in question, and will confirm that the page you had up as your >own BIO was grossly pilfered from my own website. Several of these >people also contacted you and discussed the credentials that were >presented on your site (and even got you to confess that the bio was >yours, and that you do all you own html coding, etc). In a nutshell >you were acknowledging that you knew that not only was the meters >there, but only claimed they where YOUR credentials, and that YOU >were the one who placed them there. > >On top of that you actually had the balls to print our the stolen >materials and pawn it off on your clients, and claim that it was your >own credentials. Clients where not amused by your prancing around >their office for 30 minutes with a Bearcat scanner and a broadband >diode detector only to have you claim that you detected four bugs >(but couldn't tell the victim where the bugs were, provide a bearing, >or even what frequencies they were on). Where you ever curious why >your contact there tossed you out of the building after less then two >hours on site. > >Of course when you realized that you had been caught lying and >stealing you claimed that someone had hacked you website; and yet you >felt it was OK to borrow or even steal anothers creditably. So why >would a group of hackers break in to your website and upload a >modified BIO they swiped from someone else, and yet you didn't detect >it for over seven months. Not only did you not detect it, but you >even printed it up, reproduced it, and used it as a sales tool... Of >course it must have been the evil hackers doing all these things. > >Dennis, we both know that you stole from me, and that you are full of >shit.. We also both know that you still owe me over $300,000 dollars >for the period of time you were unlawfully using my materials. > >On top of that it shames the real veterans, the military, and even >the honor of the uniform when you try to make people thing that you >were some kind of a colonel in the USAF. It is a disgrace what you >are doing, and you need to stop. No doubt you claim to have a medal >of Honor, or even a SEAL Budweiser. > >We do not need posers such as yourself making the entire industry look bad. > >So kindly go fuck your self, > >-jma > > > >At 2:27 AM +0000 5/14/02, dr_chevalier2002 wrote: >>Hello all, I wanted to introduce myself and agency( both can be >>found in the Email signature. >>I've been in the business for over 22 years both (public and private >>combined). >>If anyone needs Criminal Profiling performed on some cases, don't >>hesitate to make contact. >>Doc >> >>Dr. Dennis H. Chevalier PhD, LPI, APA, AABP >> >>DIRECTOR >> >> >> >>The CONSORTIUM of SCIENTIFIC INVESTIGATION & RESEARCH >>in cooperation with CHEVALIER AND ASSOCIATES Lic.# A07811 >>Web site: http://www.behavioral-sciences.org >>Email: doc@b... > >Main direct 817.263.9599 >>Fax 817.314.8092 >>Pager 817.432.6058 >>Cell 817.992.8993 >> >>Join a team for a cure for Cancer, Alzheimer disease and Genetics >>mutations at: >>http://members.ud.com/services/teams/team.htm?id=1E52EF2C-86C4-407B- >>9209-B7FC63800495 >-- > >-------------------------------------------------------------------------------------------------- >The First, The Largest, The Most Popular, and The Most Complete TSCM, >Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. >-------------------------------------------------------------------------------------------------- > James M. Atkinson Ph: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com >-------------------------------------------------------------------------------------------------- >"...three shall be the number to count, and the number to be counted shall >be three.....four shall thou not count......five is right out". - M. Python > >-------------------------------------------------------------------------------------------------- > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5363 From: Date: Tue May 14, 2002 0:57pm Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. This file is set to automatically go out to list members every two weeks, Please review it, and ensure that you are listed properly (correct address, phone, etc). ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (including AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (425) 489-0446 Telephone URL: http://www.bug-killer.com/ E-mail: gordonm@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 5364 From: Date: Tue May 14, 2002 0:57pm Subject: File - mission.txt TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 5365 From: Aimee Farr Date: Tue May 14, 2002 2:53pm Subject: RE: Dangers of profiling > >> As a former pizza guy, I object to the stereotyping... Now, lawyers... > They're fair game... Tough crowd. I already profiled myself as "the mindless nurse." An order, alert, or even advice, will seem 100% clear to you, and not ambiguous at all...until I prove to you JUST HOW DUMB I AM (assuming it was in doubt) -- by following it to the letter, or putting some insane context on it. The authority bias in warnings can be dangerous, because of perceptual ambiguity. Forms and checklists carry that same bias. In a general warning, people will not rely on the warning, but on their own expectations and perceptions. This includes distortions from other channels. One of the strongest biases we have is to assimilate new information into the context of prevailing expectations, and people will twist very clear directions and information so as to fit that preconception. Pearl Harbor -- mind boggling examples. I've been looking at those hearings/studies lately, so that email just set me off (inordinately), even though it was tongue-in-cheek. There are professionals that can "help" us make these mistakes. They're opportunistic mischievous pigtail pullers. Our terrorist image, admitted or not, might ice somebody's cake. (Piggy-backing on terrorist events comes to mind.) In a world of zero warning span, channel/signal distortion, etc., somebody might capitalize on this perceptual cover, alerting weaknesses, opportunities for post-event distortion.....as your lists grow longer, so do theirs. You create more expectations. Democracy is important, because the consensus-building that precedes an offensive act requiring public sacrifice, gives other nations a threat perception. Democracy is not "voting." When you see a country growing intolerant of dissent, and engaging in high-level close decision-making -- it's ominous, and more so if decision-makers have known success with "trickery."* Democracy has a flipside: it tends to give away your expectations & goals -- the most deadly weapons of all. ~Aimee *Blatant Cold War jab. 5366 From: Aimee Farr Date: Tue May 14, 2002 2:57pm Subject: RE: The Dogs of Tierra del Fuego > What's your point? Barbarians of Tierra del Fuego: no gadgets, different values. Scholars suggest they didn't really eat their old women, but I think Darwin's interviews still point to a different value system. They didn't rely on gadgetry for defense, or see their world through purely inventionist eyes. Their dogs were an evolutionary product. They could always "get new dogs," but they wouldn't be *The Dogs of Tierra del Fuego* -- because they were irreplaceable. They were the result of selection from wild stock and training, but through generational passage, they took on a different character. -Maybe some of our protectors are like The Dogs of Tierra del Fuego? -Maybe we didn't see this character so as to value them as we should have? -As opposed to toaster ovens, which can be mass manufactured to spec the minute we need them? There always comes a time when you have to call the dogs. ~Aimee 5367 From: Craig Snedden Date: Tue May 14, 2002 3:49am Subject: RE: PROGRAMME TO ID PAST E-MAIL S' funny, I just trawled my Exchange server (MAPI setup) to do just that.....(Just to check, I thought I was going daft. I found I was the only person subscribing to the TSCM list.) Of course the messages have to still be in the server somewhere, but it can trawl all the server side mailboxes (public and private) and the Message Store), which is where they should be in an MAPI setup otherwise MAPI aint gonna work the way it is intended to and then there is absolutely no point spending money buying and setting up Exchange, if you just want a POP server there are many (far) cheaper (better implementations for POP) applications available..... ...... Simple searching of mailboxes (From/To/Text/Date Range) is a built in function in Exchange. For more detailed searching you need to download the mdbviewer from Microsoft (Go to the Technet Exchange pages). mdbviewer allows very detailed analysis of mailbox contents. From the "forensic" point of view it is invaluable, as it also gives access to the other functions stored on MAPI such as Calendar, contacts, Inbox, Outbox, Drafts, Sent Items, Tasks & Deleted Items for individual users. Using this just to find email messages containing a specific text is a slightly sledgehammer approach, but luckily there is another way to do this using Exmerge. See Microsoft XADM "How to Find Mailboxes That Contain a Specific Message" (Knowledge Base Q246916) covering Exchange server versions 4.0 , 5.0 , 5.5, Exchange 2000 Server. (http://support.microsoft.com/default.aspx?scid=kb;EN-US;q246916) Exchange Server is a beast. I've yet to meet few who know all the in's & out's of setting up and administering Exchange properly and that includes a number of so called "Microsoft Certified Professionals". By "default" setup you'd be very lucky to get Exchange to work at all. Germain to all of the above is that the mailboxes are on the server. Otherwise you'd have to go to each workstation and copy the local mailbox files, hack the password if any, then scan the mail within. A fairly simple task, but if you have 900 plus potentials, quite a long one...... From what I do know of the structure of Lotus Notes, it is put together with a very different approach to Microsoft Exchange. I spoke to my Notes expert this morning, who assures me it is a relatively easy task to write a script to trawl the mailboxes in a similar way to above. Further, all the mail servers (whatever flavour) that I have come across (and that's been quite a number) have an admin setup enabling the server admin to "sample" messages incoming/outgoing, usually by individual user or all traffic. Generate log reports, intercept all incoming/outgoing mail before delivery etc. etc... This is just about standard. No need for registry "hacks" or "kludging".... :-( Confused..........! Peace and love. -----Original Message----- From: Justin T. Fanning [mailto:Justin@f...] Sent: 13 May 2002 22:28 To: tscm-l@yahoogroups.com Subject: Re: [TSCM-L] PROGRAMME TO ID PAST E-MAIL Craig Snedden wrote: > Is your client using Microsoft Exchange? The facility exists within > the Exchange Server to trawl messages as described. Exchange can be "kludged" (via registry modifications) to copy incoming and outgoing messages to a "journal" e-mail box, but there is no such default behaviour as you described. [text removed] > Craig JF ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5368 From: Brian Dugan Date: Tue May 14, 2002 7:00am Subject: Re: hello all Well said, James. >>> "James M. Atkinson" 05/14/02 12:25AM >>> I would like to invite you to kiss my ass Dennis... both cheeks, and then the pucker, and please take your time. If you recall, you came to my website about 2 years ago, stole my entire bio and simply replaced my name with your own and plastered it all over your website at www.realspy.com claiming it was your own. You also stole dozens of my graphics, and completely ignored my requests to delete them. It wasn't until I confronted you on the phone, and got you stop lying that you even admitted that the website was even yours. Quite a few respect members of the TSCM and security all visited the site in question, and will confirm that the page you had up as your own BIO was grossly pilfered from my own website. Several of these people also contacted you and discussed the credentials that were presented on your site (and even got you to confess that the bio was yours, and that you do all you own html coding, etc). In a nutshell you were acknowledging that you knew that not only was the meters there, but only claimed they where YOUR credentials, and that YOU were the one who placed them there. On top of that you actually had the balls to print our the stolen materials and pawn it off on your clients, and claim that it was your own credentials. Clients where not amused by your prancing around their office for 30 minutes with a Bearcat scanner and a broadband diode detector only to have you claim that you detected four bugs (but couldn't tell the victim where the bugs were, provide a bearing, or even what frequencies they were on). Where you ever curious why your contact there tossed you out of the building after less then two hours on site. Of course when you realized that you had been caught lying and stealing you claimed that someone had hacked you website; and yet you felt it was OK to borrow or even steal anothers creditably. So why would a group of hackers break in to your website and upload a modified BIO they swiped from someone else, and yet you didn't detect it for over seven months. Not only did you not detect it, but you even printed it up, reproduced it, and used it as a sales tool... Of course it must have been the evil hackers doing all these things. Dennis, we both know that you stole from me, and that you are full of shit.. We also both know that you still owe me over $300,000 dollars for the period of time you were unlawfully using my materials. On top of that it shames the real veterans, the military, and even the honor of the uniform when you try to make people thing that you were some kind of a colonel in the USAF. It is a disgrace what you are doing, and you need to stop. No doubt you claim to have a medal of Honor, or even a SEAL Budweiser. We do not need posers such as yourself making the entire industry look bad. So kindly go fuck your self, -jma At 2:27 AM +0000 5/14/02, dr_chevalier2002 wrote: >Hello all, I wanted to introduce myself and agency( both can be >found in the Email signature. >I've been in the business for over 22 years both (public and private >combined). >If anyone needs Criminal Profiling performed on some cases, don't >hesitate to make contact. >Doc > >Dr. Dennis H. Chevalier PhD, LPI, APA, AABP > >DIRECTOR > > > >The CONSORTIUM of SCIENTIFIC INVESTIGATION & RESEARCH >in cooperation with CHEVALIER AND ASSOCIATES Lic.# A07811 >Web site: http://www.behavioral-sciences.org >Email: doc@b... >Main direct 817.263.9599 >Fax 817.314.8092 >Pager 817.432.6058 >Cell 817.992.8993 > >Join a team for a cure for Cancer, Alzheimer disease and Genetics >mutations at: >http://members.ud.com/services/teams/team.htm?id=1E52EF2C-86C4-407B- >9209-B7FC63800495 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5369 From: Hawkspirit Date: Tue May 14, 2002 7:27pm Subject: Addcom Performance comparison simulation Among the test and measurements products on show at the recent CDMA International Congress in Korea were Addcom's mobile call simulators (MCS) for CDMA systems-MCS-III and MCS-IV. Both evaluate call processing capacity and system performance and provide simultaneous RF data logging and call generation test function in either a lab test or field test environment. Whilst the MCS-III enables the user to collect RF parameter data across different CDMA service providers (PCS/cellular) for performance comparison testing, the MCS-IV offers the same capability but is able to collect data from an additional 24 mobile units-to a maximum of 40. According to Addcom, both simulators offer a number of advantages such as testing of bench marking and call processing capability, CDMA parameter and RF optimization, and equipment and manpower reduction. Also on display was the new Land Call Generator (LCG ) which can be used with both MCS-III and MCS-IV to evaluate the call processing capacity of the CDMA system. It has automatic local call generation and local call answer function to aid service quality assessment in the case of mobile-to-land call or land-to-mobile call. Addcom has also introduced its CDMA Air Link Analysis System (CALAS) which is a post-processing tool for simultaneous forward and reverse air link data analysis of RF problems affecting CDMA mobile communications networks. CALAS allows the user to evaluate system performance relating to power control, handoff and forward/reverse link balance. 5370 From: Hawkspirit Date: Tue May 14, 2002 8:13pm Subject: Cell Phone Remote Update One aspect of the deal with Ericsson and Red Hat will be development of software that allows gadgets to be updated by the company that sells them--a big change from the PC practice of making people responsible for downloading and installing patches. The remote update method is used by cell phone companies to enable new services without customers having to install new software. The remote update and management software requires that software be developed not only for the client but also for the telecommunications company's server that's in charge of doing the updating. Knuttila said he believes it's "extremely likely" that such servers will run Red Hat's Linux. http://news.com.com/2100-1001-243925.html?legacy=cnet 5371 From: Hawkspirit Date: Tue May 14, 2002 8:32pm Subject: Cell Phone Flaw Cell phone flaw opens security hole By Sara Robinson Interactive Week September 18, 2000 4:01 AM PT Your cell phone may be multilingual -- and that could be detrimental to your privacy. Computer security researchers said a design flaw in the protocol used in global system for mobile communication cell phones could allow eavesdropping. The trick: Just make the cell phone think it's somewhere else. Only 6.5 million people in North America use global system for mobile communications cell phones -- through providers such as Pacific Bell Wireless and VoiceStream Wireless -- but worldwide, it's the most widely used standard, accounting for 65 percent of the total wireless digital market. GSM phones are increasingly popular in the United States because they allow roaming in Asia and Europe upon insertion of the appropriate smart card. Since Western Europe can't export encryption products to certain countries, such as targets of United Nations sanctions, the default version of the GSM protocol does not use encryption. This in itself isn't necessarily a problem, said David Wagner, a professor of computer science at the University of California-Berkeley, but GSM also does not authenticate its base stations, the hardware that communicates with the handsets -- and that is potentially troublesome. Experts said it is possible to build a phony base station that jams the signal from the real base station and forces the cell phone to connect to it. The base station then tells the cell phone, in essence, "You're in Iraq, don't use encryption," and the call proceeds unprotected with the false base station relaying information between the real base station and the handset. A handful of researchers have been aware of the loophole for several years now, but it's been "a well-kept secret," Wagner said. Security experts call this a "man-in-the-middle" attack because the phony base station sits between the handset and the real base station, intercepting their communications, but neither the real base station nor the handset knows it's there. "We know about it as a technical issue, but we haven't seen it demonstrated," said James Moran, fraud and security director at the GSM Association. He added that building an interception device would require considerable technical skill. Moran said the next GSM standard would address the problem. Other cell phone standards probably don't authenticate base stations either, Wagner said, perhaps because their designers were more concerned with preventing handset cloning, which allows someone to bill his or her calls to someone else's number. But the phony-base-station trick is a particular problem for GSM because different strengths of encryption are used in different places. "Whenever you have to support both weak and strong cryptography, one very real risk is that you end up with 'least common denominator' security," Wagner said. Cracking different pieces of the cryptography that protects GSM cell phones from eavesdropping has long been a favorite pastime for computer security researchers. Just last December, two Israeli researchers announced that they had found a fast method of cracking the A5/1 algorithm, the strong encryption used to protect GSM phone calls in Europe and the United States. But the phony-base-station strategy obviates the need for any encryption busting. 5372 From: Gordon Mitchell Date: Tue May 14, 2002 9:02pm Subject: Re: Addcom Since CDMA coverage has grown to most of the US I have recommended it to clients who want cellphone call security. What do you see in terms of threats to CDMA users? Are on-air intercept sets becoming available outside government operations? Reading your posting it seems that these are commercial tools that can do traffic analysis or cell site simulation but not interception. -- Gordon (800) 284-5457 or +1 (425) 489-0446 see cases we have worked on at www.FutureFocus.com eSleuth.com finding clues in computers Bug-Killer.com preventing electronic eavesdropping Hawkspirit wrote: > > Performance comparison simulation > Among the test and measurements products on show at the recent CDMA > International Congress in Korea were Addcom's mobile call simulators (MCS) > for CDMA systems-MCS-III and MCS-IV. Both evaluate call processing capacity > and system performance and provide simultaneous RF data logging and call > generation test function in either a lab test or field test environment. > Whilst the MCS-III enables the user to collect RF parameter data across > different CDMA service providers (PCS/cellular) for performance comparison > testing, the MCS-IV offers the same capability but is able to collect data > from an additional 24 mobile units-to a maximum of 40. According to Addcom, > both simulators offer a number of advantages such as testing of bench > marking and call processing capability, CDMA parameter and RF optimization, > and equipment and manpower reduction. Also on display was the new Land Call > Generator (LCG ) which can be used with both MCS-III and MCS-IV to evaluate > the call processing capacity of the CDMA system. It has automatic local > call generation and local call answer function to aid service quality > assessment in the case of mobile-to-land call or land-to-mobile call. > Addcom has also introduced its CDMA Air Link Analysis System (CALAS) which > is a post-processing tool for simultaneous forward and reverse air link > data analysis of RF problems affecting CDMA mobile communications networks. > CALAS allows the user to evaluate system performance relating to power > control, handoff and forward/reverse link balance. > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ From: James M. Atkinson, Comm-Eng Date: Sun May 14, 2000 3:42pm Subject: Just in case you thought you were having a bad day!! 1. The average cost of rehabilitating a seal after the Exxon Valdez oil spill in Alaska was $80,000. At a special ceremony, two of the most expensively saved animals were released back into the wild amid cheers and applause from onlookers. A minute later, in full view, they were both eaten by a killer whale. 2. A psychology student in New York rented out her spare room to a carpenter in order to nag him constantly and study his reactions. After weeks of needling, he snapped and beat her repeatedly with an axe leaving her mentally retarded. 3. In 1992, Frank Perkins of Los Angeles made an attempt on the world flagpole-sitting record. Suffering from the flu he came down eight hours short of the 400 day record, his sponsor had gone bust, his girlfriend had left him and his phone and electricity had been cut off. 4. A woman came home to find her husband in the kitchen, shaking frantically with what looked like a wire running from his waist towards the electric kettle. Intending to jolt him away from the deadly current, she whacked him with a handy plank of wood by the back door, breaking his arm in two places. Until that moment, he had been happily listening to his walkman. 5. Two animal rights protesters were protesting at the cruelty of sending pigs to a slaughterhouse in Bonn. Suddenly the pigs, all two thousand of them, escaped through a broken fence and stampeded, trampling the two hapless protesters to death. And finally....... 6. Iraqi terrorist, Khay Rahnajet, didn't pay enough postage on a letter bomb. It came back with "return to sender" stamped on it. Forgetting it was the bomb, he opened it and was blown to bits. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 303 From: Date: Sun May 14, 2000 11:49am Subject: Re: a quick question The manufacturer of the antenna cam viewing through the antenna shaft was/is the Olympus corporation. M. 304 From: James M. Atkinson, Comm-Eng Date: Sun May 14, 2000 3:51pm Subject: HOW TO KEEP A HEALTHY LEVEL OF INSANITY HOW TO KEEP A HEALTHY LEVEL OF INSANITY 1) At lunch time, sit in your parked car and point a hair dryer at passing cars to see if they slow down. 2) Page yourself over the intercom. (Don't disguise your voice) 3) Insist that your e mail address is: Xena-goddess-of-fire@c... Elvis-the-King@c.... 4) Every time someone asks you to do something, ask if they want fries with that. 5) Encourage your colleagues to join you in a little synchronized chair dancing. 6) Put your garbage can on your desk and label it "IN." 7) Develop an unnatural fear of staplers. 8) Put decaf in the coffee maker for 3 weeks. Once everyone has gotten over their caffeine addictions, switch to espresso. 9) In the memo field of all your checks, write 'for sexual favors.' 10) Reply to everything someone says with, "That's what you think." 11) Finish all your sentences with "In accordance with the prophecy." 12) Adjust the tint on your monitor so that the brightness level lights up the entire work area. Insist to others that you like it that way. 13) Don't use any punctuation 14) As often as possible, skip rather than walk. 15) Ask people what sex they are. 16) Specify that your drive-through order is "to go." 17) Sing Along at the opera. 18) Go to a poetry recital and ask why the poems don't rhyme. 19) Find out where your boss shops and buy exactly the same outfits. Wear them one day after your boss does. (This is especially effective if your boss is the opposite gender.) 20) Send e-mail to the rest of the company to tell them what you're doing. For example: If anyone needs me, I'll be in the bathroom. 21) Put mosquito netting around your cubicle. 22) Five days in advance, tell your friends you can't attend their party because you're not in the mood 23) Call 911 and ask if 911 is for emergencies 24) Call the psychic hotline and just say, "Guess" 25) Have your coworkers address you by your wrestling name, Rock Hard. 26) When the money comes out of the ATM, scream "I Won!", "I Won!" "3rd time this week!!!" 27) When leaving the Zoo, start running towards the parking lot, yelling "Run for your lives, they're loose!" 28) Tell your boss, "It's not the voices in my head that bother me, its the voices in your head that do" 29) Tell your children over dinner. "Due to the economy, we are going to have to let one of you go" 30) Every time you see a broom yell "Honey, your mother is here" =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 305 From: Mike F Date: Sun May 14, 2000 11:06am Subject: RE: How many West Point graduates does it take Hey guys Chill. My Best Exfriend's Son is at West Point,he made the DEAN's List. I think thats GREAT. But thats just my opinion. L8R4,Mike f. How many West Point graduates does it take Well, since you asked... 1. The assertion that "the brightest and best" are the ones that get sent to the service academies is debatable if not arrogant. 2. The assumption that a graduate from a service academy is automatically a "leader" is an overstatement. Being well-educated does not automatically equate with being a leader. 3. If the service academy graduates are unable to lead those who now are not even required to finish high school, and presumably who are in need of leadership as distinguished from management, then perhaps the service academies are not turning out leaders after all. 4. During their four years in a service academy, the graduates lived in a very rigid, very structured, very demanding academic environment of peers. They have also been relatively isolated from day-to-day interaction with the very people they will be expected to lead...you know, those who are not even required to finish high school. To answer your question, "What is wrong with this picture," my answer is: We take service academy graduates and commission them as officers. My opinion is that service academy graduates should be required to serve a hitch as an E-4 or E-5 NCO and demonstrate that they have the necessary traits of loyalty, integrity, discretion, morals, character and leadership (not to mention humility) before being commissioned. If they are truly devoted to a career of military service, they won't allow themselves to lose their academic edge during their enlistment, and they will gain a much improved understanding of human interaction. That's important, because the "people who are now not even required to finish high school" are human, a rather important fact that more than one "instant officer" has failed to acquire in a service academy or OCS. It is also worth pointing out that in combat, more than one officer has had his bacon (and career) saved by people who were not then even required to finish high school either. Paul Curtis wrote: > Isn't it too bad that we take the brightest and best, send them off to > West > Point and the other service academies, teach them engineering, tactics, > law, > physics, math, etc., and then send them out into the field to lead people > > who now are not even required to finish high school? What is wrong with > this picture? > > PC > > > > -------------------------------------------------------------------------- > > -------------------------------------------------------------------------- > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS ------------------------------------------------------------------------ Did you know that eGroups offers calendars, group polls, storage files and more. Check out these great features at: http://click.egroups.com/1/3938/1/_/507420/_/958320043/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 306 From: Andre Holmes <1ach@g...> Date: Sun May 14, 2000 1:23pm Subject: Re: a quick question Hello Mike F it is true the camera can see 360 degrees is mounted on top of the antenna. It is designed to look like a car radio antenna and is sold to police types. -----Original Message----- From: Mike F To: TSCM- Date: Sunday, May 14, 2000 12:00 PM Subject: [TSCM-L] a quick question >A person asked me about covert camera that ANTENNA. >This person said he saw it on a web site. >Do you know the web address? >Have you ever heard of camera in ANTENNA? >I know the are in Pagers,wristwatches and even eyeglasses but I cannot >recall seeing a camera in an ANTENNA. >Any help would be appreciated. >Later4,mike f > > > >Michael T. Fiorentino >Syracuse,NY 13206 > >"CONFIDENTIALITY WARNING" >This electronic message contains information which may be privileged >and/or confidential. The information is intended for use only by the >individual(s) >or entity named/indicated above. If you are not the identified/intended >recipient, be aware that >any disclosure, copying, distribution, or use of the contents of this >message/information is prohibited. If you are not the indicated recipient or >have >received this message in error contact our offices immediately for >instructions." > > > >------------------------------------------------------------------------ >IT Professionals: Match your unique skills with the best IT projects at >http://click.egroups.com/1/3381/1/_/507420/_/958320041/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > 307 From: Andre Holmes <1ach@g...> Date: Sun May 14, 2000 1:23pm Subject: Re: a quick question Hello Mike F it is true the camera can see 360 degrees is mounted on top of the antenna. It is designed to look like a car radio antenna and is sold to police types. -----Original Message----- From: Mike F To: TSCM- Date: Sunday, May 14, 2000 12:00 PM Subject: [TSCM-L] a quick question >A person asked me about covert camera that ANTENNA. >This person said he saw it on a web site. >Do you know the web address? >Have you ever heard of camera in ANTENNA? >I know the are in Pagers,wristwatches and even eyeglasses but I cannot >recall seeing a camera in an ANTENNA. >Any help would be appreciated. >Later4,mike f > > > >Michael T. Fiorentino >Syracuse,NY 13206 > >"CONFIDENTIALITY WARNING" >This electronic message contains information which may be privileged >and/or confidential. The information is intended for use only by the >individual(s) >or entity named/indicated above. If you are not the identified/intended >recipient, be aware that >any disclosure, copying, distribution, or use of the contents of this >message/information is prohibited. If you are not the indicated recipient or >have >received this message in error contact our offices immediately for >instructions." > > > >------------------------------------------------------------------------ >IT Professionals: Match your unique skills with the best IT projects at >http://click.egroups.com/1/3381/1/_/507420/_/958320041/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > 308 From: J Gomez <1upserv@g...> Date: Mon May 1, 2000 6:02am Subject: Re: a quick question CCS International develop?market such a piece of kit. Surely well overpriced, anyone is able to buy the components and fit them to the application required. Not too tough, we do it all the time, furthermore the basic components are used over and over again... Joe ---------- > From: James M. Atkinson, Comm-Eng > To: TSCM-L@egroups.com > Subject: Re: [TSCM-L] a quick question > Date: 14 May 2000 18:10 > > At 10:05 AM -0400 5/12/00, Mike F wrote: > >A person asked me about covert camera that ANTENNA. > >This person said he saw it on a web site. > >Do you know the web address? > >Have you ever heard of camera in ANTENNA? > >I know the are in Pagers,wristwatches and even eyeglasses but I cannot > >recall seeing a camera in an ANTENNA. > >Any help would be appreciated. > >Later4,mike f > > > > Several companies offer what is effectively a borescope concealed > inside a telescoping AM/FM automobile antenna. It is of little > practical value, but gets all kinds of "oohs and ahhs" from the > public. > > There are also magnetic mount antennas which have a camera installed > in the based. > > In reality is makes better tradecraft to simply install several CCD > cameras inside the vehicle and to switch between them as needed. > > -jma > > > =================================================================== > Sed quis custodiet ipsos Custodes? > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > "...any sufficiently advanced technology is > indistinguishable from magic." - Arthur C. Clarke > =================================================================== > > ------------------------------------------------------------------------ > Special Offer-Earn 300 Points from MyPoints.com for trying @Backup > Get automatic protection and access to your important computer files. > Install today: > http://click.egroups.com/1/2344/1/_/507420/_/958320949/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 309 From: Date: Sun May 14, 2000 4:15pm Subject: Re: a quick question Bill; a long time back i remember viewing some articles that showed a KGB camera hidden inside a woman's nipple. that had to be the best subterfuge ever! micro tech has come a long way, would not be surprised to see cameras on the head of a needle! move over angels! by the way the new US embassy is set to open in Moscow soon after years of delay ,as the Russians had completely bugged the old one so efficiently that it was essentially worthless to America! the price tag on the new embassy came to something like $200 million and supplies had to be shipped surrepticiously,to hinder bugging. soon, Russia will hopefully taste the fruits of economic freedom that they have so long deserved. who would have thought that the Berlin wall would be dismantled,in our century? change is rapid and swift. thanks for all the great sites, people! hey Jim your humor is much appreciated! HAVE A GREAT DAY !!! 310 From: Date: Sun May 14, 2000 4:24pm Subject: Re: a quick question Bill, Re fire-water sprinkler cameras. there was an interesting story . years ago, one of Conrad Hilton's [ founder of Hilton Hotel chain.], sons lost a significant amount of money in a Las Vegas poker/ gin rummy game.$200k ,whatever . the father was furious and contacted knowledgeable friends who hired a TSCM guy. turns out hidden cameras in the Sprinkler system aided the gambling opponents and thus the money was refunded!! you just never know! HAVE A GREAT DAY !!! 311 From: Date: Sun May 14, 2000 4:34pm Subject: Re: HOW TO KEEP A HEALTHY LEVEL OF INSANITY Jim; appreciate the humor. my girlfriend is having major surgery and laughing helps. can't wait to try some of the antics. i have held my calculator up and talked into it like a cell phone when driving. that always gets a second look! HAVE A GREAT DAY !!! 312 From: James M. Atkinson, Comm-Eng Date: Sun May 14, 2000 4:44pm Subject: Re: a quick question At 5:15 PM -0400 5/14/00, patedwards@w... wrote: >Bill; > a long time back i remember viewing some articles that showed a >KGB > camera hidden inside a woman's nipple. that had to be the best >subterfuge ever! > micro tech has come a long way, would not be surprised >to see cameras on the head of a needle! move over angels! > by the way the new US embassy is set to open in Moscow >soon after years of delay ,as the Russians had completely bugged the >old one so efficiently that it was essentially worthless to America! the >price tag on the new embassy came to something like $200 million and >supplies had to be shipped surrepticiously,to hinder bugging. > soon, Russia will hopefully >taste the fruits of economic freedom >that they have so long deserved. > who would have thought that the Berlin wall would be >dismantled,in our century? change is rapid and swift. > thanks for all the great sites, people! > hey Jim your humor is much appreciated! > > HAVE A GREAT DAY !!! Might I point out the following. As per someone who was active instructor at the Red Banner Institute (KGB School) for several decade. The Soviet government did not "bug" the concrete in the embassy in Moscow, but instead "salted it" with hundreds of thousands of scrap diodes and transistors (the raw dice, not the complete component) to cause the Non Linear Junction Detectors (Superscouts) the U.S. TSCM'ers were using to get massive false hits. The purpose was frustrate the TSCM'ers as the Soviets knew the American sweep teams were putting too much faith in the instrumented part of the sweep, and not paying enough attention to the actual physical inspection. The Soviets knew that if the U.S. TSCM people got "hits all over the wall" that they would X-Ray what they could, but that they were easy to discourage and would not detect a properly concealed device (when the wall was hot). Knowing this the Soviets salted the raw concrete (actually the cement) at the mixing stations, which was eventually poured at the embassy to created the building structure. It's very similar to what happen at the facilities in China, Jordan, and Israel where huge amounts of fiber optic cable was found inside the poured concrete walls (woven and secured though the re-bar rods). -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 313 From: Date: Sun May 14, 2000 5:13pm Subject: Re: a quick question thanks Jim ! re the quick overview of the embassy structure. pretty tricky! HAVE A GREAT DAY !!! 314 From: Jay Coote Date: Sun May 14, 2000 8:19pm Subject: Re: a quick question I think AID or one of those LEA surveillance vendors had it. It looks like a 6 inch commo antenna but with a larger base mount or coil. Jay Coote Los Angeles ---------- > A person asked me about covert camera that ANTENNA. > This person said he saw it on a web site. > Do you know the web address? > Have you ever heard of camera in ANTENNA? > I know the are in Pagers,wristwatches and even eyeglasses but I cannot > recall seeing a camera in an ANTENNA. > Any help would be appreciated. > Later4,mike f > > > > Michael T. Fiorentino > Syracuse,NY 13206 > > "CONFIDENTIALITY WARNING" > This electronic message contains information which may be privileged > and/or confidential. The information is intended for use only by the > individual(s) > or entity named/indicated above. If you are not the identified/intended > recipient, be aware that > any disclosure, copying, distribution, or use of the contents of this > message/information is prohibited. If you are not the indicated recipient or > have > received this message in error contact our offices immediately for > instructions." > > > > ------------------------------------------------------------------------ > IT Professionals: Match your unique skills with the best IT projects at > http://click.egroups.com/1/3381/1/_/507420/_/958320041/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 315 From: Date: Sun May 14, 2000 5:37pm Subject: Re: a quick question In a message dated 5/14/00 6:20:08 PM Pacific Daylight Time, TSCM@j... writes: << It looks like a 6 inch commo antenna but with a larger base mount or coil. >> Visual Methods or Security Products Intl. 800-DIAL-SPI 316 From: Jordan Ulery Date: Sun May 14, 2000 10:25pm Subject: Re: a quick question You may wish to check Super Circuits for information regarding such a devise. Mike F wrote: > A person asked me about covert camera that ANTENNA. > This person said he saw it on a web site. > Do you know the web address? > Have you ever heard of camera in ANTENNA? > I know the are in Pagers,wristwatches and even eyeglasses but I cannot > recall seeing a camera in an ANTENNA. > Any help would be appreciated. > Later4,mike f > > Michael T. Fiorentino > Syracuse,NY 13206 > > "CONFIDENTIALITY WARNING" > This electronic message contains information which may be privileged > and/or confidential. The information is intended for use only by the > individual(s) > or entity named/indicated above. If you are not the identified/intended > recipient, be aware that > any disclosure, copying, distribution, or use of the contents of this > message/information is prohibited. If you are not the indicated recipient or > have > received this message in error contact our offices immediately for > instructions." > > ------------------------------------------------------------------------ > IT Professionals: Match your unique skills with the best IT projects at > http://click.egroups.com/1/3381/1/_/507420/_/958320041/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 317 From: Andy Grudko Date: Mon May 15, 2000 2:03am Subject: Re: a quick question ----- Original Message ----- > A person asked me about covert camera that ANTENNA. > This person said he saw it on a web site. > Do you know the web address? > Have you ever heard of camera in ANTENNA? > I know the are in Pagers,wristwatches and even eyeglasses but I cannot > recall seeing a camera in an ANTENNA. About 15 years ago PK Electronics in Germany had a car antenna camera. Actually the bulbous tip of the antenna contained a lense, connected by optic fibre to a video camera at the base, in the wing. A remote control vesion was available to 'pan'. Picture erformance was poor by today's standatrds. There may be somthing better on the market by now. PK's prices were so inflated I never got another catalogue from them. Regards Andy Grudko Johannesburg 318 From: James M. Atkinson, Comm-Eng Date: Mon May 15, 2000 10:22am Subject: http://www.realspy.com/ Good Morning, Over the last few months I have received a number of comments from visitors to the following website: http://www.realspy.com/ It would appear that the website author blatantly ripped off materials from my website, and went to far to swipe a copy of by bio and other materials and effectively just added his name. I would appreciate it if other list members could visit the site in question, and privately email me their thoughts on the matter. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 319 From: Gregory Horton Date: Mon May 15, 2000 1:22pm Subject: Re: West Point While I agree with Mr. Keenan that the military is in an abused state under the Clinton administration, I must correct some of his statements. I just retired from an Army Reserve unit where I was the Operations Sergeant Major, and the OpTempo is very busy. We deployed and are deploying soldiers to Bosnia and Kosovo (among other places) for six month rotations. With train-up and debriefing periods on the front and end of the tour, the total time is usually close to 9 months. Once they are deployed to Bosnia or Kosovo, they can't, by law, be sent back to that region again. There are laws protecting the service members from termination (I believe it falls under the Soldier, Sailor, Airmen Relief Act) and this has successfully been used to protect them. This information in no way is meant to minimize the strain put on the reserve system by the high OpTempo. The kids are brought in with the promise of college funds and no mention of 9 month deployments right in the middle of their scholastic endeavors. There have been some pretty unhappy campers, but for the most part, the young men and women have taken the challenge and risen to the occasion. You might (and probably should) fault the system, but you can be damn proud of the patriotic kids this country still produces. Greg Horton 320 From: James M. Atkinson, Comm-Eng Date: Mon May 15, 2000 1:45pm Subject: Re: West Point At 11:22 AM -0700 5/15/00, Gregory Horton wrote: >While I agree with Mr. Keenan that the military is in an abused state >under the Clinton administration, I must correct some of his >statements. I just retired from an Army Reserve unit where I was the >Operations Sergeant Major, and the OpTempo is very busy. We deployed >and are deploying soldiers to Bosnia and Kosovo (among other places) for >six month rotations. With train-up and debriefing periods on the front >and end of the tour, the total time is usually close to 9 months. Once >they are deployed to Bosnia or Kosovo, they can't, by law, be sent back >to that region again. There are laws protecting the service members from >termination (I believe it falls under the Soldier, Sailor, Airmen Relief >Act) and this has successfully been used to protect them. This >information in no way is meant to minimize the strain put on the reserve >system by the high OpTempo. The kids are brought in with the promise of >college funds and no mention of 9 month deployments right in the middle >of their scholastic endeavors. There have been some pretty unhappy >campers, but for the most part, the young men and women have taken the >challenge and risen to the occasion. You might (and probably should) >fault the system, but you can be damn proud of the patriotic kids this >country still produces. >Greg Horton That is a very good point Greg, Personally I would like to see the rules changes so that no service member (including officers) was sent outside of the US (unless it's wartime) until they are on their second 4 year enlistment. I feel strongly that officers should not be commissioned until they have several at least 4 years of active duty, completed 4 years of college, then completed several years as an NCO and attended a SERIES of leadership academies (not just ROTC, OCS, or a service academy). Sadly, the US has officers that are very poor leaders who tend to be more skilled in paperwork, then in battlefield tactics. Years ago they used to tell us that the only thing that would get an officer out of a foxhole was a pissed off NCO holding a bayonet at his back. Of course there are good officer out there, but they are really hard to find. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 321 From: Date: Mon May 15, 2000 10:58am Subject: News Spy vs. Spy Suits against ex-employees shed light on a little-known Florida firm that trains agents for the feds Dan Christensen Miami Daily Business Review May 15, 2000 It's real life spy vs. spy, tucked away in a quiet northern section of Broward County, Fla. Audio Intelligence Devices, a super-secret Coral Springs, Fla., company that sells surveillance equipment and operates secret agent training courses to law enforcement agencies worldwide -- including the FBI, CIA, Drug Enforcement Administration and the Internal Revenue Service -- has gone to court claiming it's a victim of corporate espionage. In two civil cases, one of which recently was sealed by a judge, Audio Intelligence accuses former company executives who now work for competitors of swiping highly sensitive corporate trade secrets on their way out the door. Meanwhile, one of the executives accuses the company of illegally selling spying equipment to the New York City Police Department. If the equipment was used to gather evidence, the executive claims, the evidence may be tainted. Little is known about the company, Audio Intelligence, which has been manufacturing and selling surveillance equipment to the government for nearly three decades. The company originally was operated by owner Jack Holcomb, a mysterious businessman who ran the company out of offices at Fort Lauderdale Executive Airport. Then, in 1992, Holcomb sold his business to a unit of giant Westinghouse Electric. In January 1998, Delaware-based Audio Intelligence was sold again. The seller was CBS, which earlier had merged with Westinghouse. Audio Intelligence is owned by privately held Liberty Associates Management Group L.C., a holding company that in turn is owned by ex-Army officer, Joseph Wortley, according to Wortley's business partner, William R. Gates. Gates -- no, not Microsoft's Bill Gates -- recently served as president of Audio Intelligence, but now oversees AID as managing member of Liberty Associates. He said he was a Naval officer in the submarine program. He declined to give his former rank. The company, with gross annual sales Gates said were $12 million to $15 million, is involved in a trade whose course work includes teaching police officers and agents from around the nation up-to-the-minute lock-picking techniques and covert entry skills. Clients include unlikely agencies such as the Department of Housing and Urban Development. Products include transmitters and "video surveillance kits" disguised to look like briefcases, surge protectors, cigarettes, billfolds, smoke alarms and tape measures. (In an interview, Gates said the CIA is no longer a company client. Court papers filed by the company last November, and now sealed, say the company does work for the CIA.) Helping the company maintain its low profile is the fact that the surveillance devices sought by the government are so exotic that Audio Intelligence often is the sole source of the supply. Federal rules allow government buyers to use so-called "simplified acquisition procedures" when making sole-source purchases ‚Äî a practice that eliminates the need to follow public bidding requirements. But while little is known about the company, a dispute now taking place could affect the company's ability to maintain some of that secrecy. In addition, it raises questions about the propriety and legality of some of the company's activity. Charles W. Goforth, one of two former Audio Intelligence executives who've been sued, says in court papers that he quit last September after learning the company unlawfully sold about 60 spy transmitters to the New York City Police Department. Kim Douglas Sherman, Goforth's Fort Lauderdale attorney, said in court papers that those electronic bugs weren't legal at the time because they were not sanctioned by the Federal Communications Commission. If police used the devices to make cases without getting approval, he said in a brief interview, any evidence they produced would be tainted. At the New York Police Department, spokesman Alan Krawitz said the department is not aware of any problems with its devices. "But we would not even comment about something like this, even if we were aware," he said. In the court documents, Goforth claims that when he objected to the sale, the senior vice president of operations responded, "I like to live dangerously." Goforth, via his attorney, declined to comment for this story. Goforth, who's now president of his own surveillance device firm, Digital Security Solutions Inc. of Pompano Beach, also says in court documents that the company's chief operating officer told him the action was approved despite the illegality. The company officials in question aren't identified by name in court papers. Gates said there "was no basis" for Goforth's allegations and they were untrue. He said Goforth, whom he accused of trying to swipe AID's international business, was in charge of the department that handled those kinds of sales. The dispute with Goforth isn't the company's only battle with a former employee. Audio Intelligence is involved in a civil case against the former administrator of its National Intelligence Academy, a spy school for law enforcement types. Laurie Thurmond, who ran the academy from December 1997 until last May, is accused by Audio Intelligence of breach of contract and violating Florida's Trade Secrets Act. Thurmond now helps run the similar Law Enforcement Technology Centre -- a division of a rival Coral Springs firm, Innovative Surveillance Technology. Audio Intelligence, in a complaint now sealed by Broward Circuit Judge Jeffrey E. Streitfeld, alleges Thurmond stole the company's secrets -- including the names and address of its government customers and students -- and gave them to her new bosses at Innovative Surveillance. "In disseminating those names either by herself or through a third party, [Thurmond] has or is attempting to destroy the credibility of [Audio Intelligence] in maintaining the anonymity of the law enforcement officers that are trained," say court papers filed by the company. "In so doing, [Audio Intelligence] will lose its customers due to the impression that [it] cannot protect the people that it trains." The suit, similar to the one brought against Goforth, sought unspecified damages and an injunction to halt the "misappropriation" of Audio Intelligence's trade secrets. Thurmond declined to comment for this story. Plantation, Fla., attorney Robert D. Klausner, who represents Thurmond, was unavailable for comment. An attorney in his office, Adam Levinson, would not comment. Gates and AID's Boca Raton lawyer, Carol A. Kartagener, also declined to comment on the Thurmond suit. Ira Libanoff, a Fort Lauderdale lawyer who represents Innovative Surveillance, indicated he'd like to talk, but said he was "prevented" from doing so by the seal order imposed at the company's request. 322 From: James M. Atkinson, Comm-Eng Date: Mon May 15, 2000 3:56pm Subject: Re: News At 3:58 PM -0400 5/15/00, MACCFound@a... wrote: >Spy vs. Spy >Suits against ex-employees shed light on a little-known Florida firm that >trains agents for the feds >Dan Christensen >Miami Daily Business Review >May 15, 2000 >It's real life spy vs. spy, tucked away in a quiet northern section of >Broward County, Fla. >Audio Intelligence Devices, a super-secret Coral Springs, Fla., company >that sells surveillance equipment and operates secret agent training >courses to law enforcement agencies worldwide -- including the FBI, CIA, >Drug Enforcement Administration and the Internal Revenue Service -- has >gone to court claiming it's a victim of corporate espionage. Hee, Hee... It's kind of poetic that they are bitching about being the victim of espionage. AID was hardly "tucked away", and was/is actually very well known within law enforcement circles (and Jack was a character). Like most LE suppliers, trainers, and so on they are "kept tucked away from the public eye). >In two civil cases, one of which recently was sealed by a judge, Audio >Intelligence accuses former company executives who now work for competitors >of swiping highly sensitive corporate trade secrets on their way out the door. Also, rather poetic. >Meanwhile, one of the executives accuses the company of illegally selling >spying equipment to the New York City Police Department. If the equipment >was used to gather evidence, the executive claims, the evidence may be >tainted. Well the law states (and the courts have ruled) that if the bug doesn't have FCC approval then the evidence is tainted, and the agency is violating peoples civil rights. >Little is known about the company, Audio Intelligence, which has been >manufacturing and selling surveillance equipment to the government for >nearly three decades. Not true... I have a four foot stack of materials about every product they have produced over the last 15 years, and almost 1000 database entries on every variation of every product and frequency they offered during that time. None the products they offered was ever "secret squirrel" stuff, and was rather unsophisticated products designed to cater to the whims of law enforcement. The only "special thing" they did was their ability to build high quality concealments, and to produce equipment capable of being abused. Law enforcement surveillance equipment tends not to be very sophisticated simply because the users are generally not sophisticated themselves (with a few exceptions). >The company originally was operated by owner Jack Holcomb, a mysterious >businessman who ran the company out of offices at Fort Lauderdale Executive >Airport. Then, in 1992, Holcomb sold his business to a unit of giant >Westinghouse Electric. In January 1998, Delaware-based Audio Intelligence >was sold again. The seller was CBS, which earlier had merged with >Westinghouse. Holcomb sold it to Westinghouse who installed a poor management team who almost ran the company into the ground. The business (at least the shell of what was left) was sold off strictly to get it off the books. I have heard from several other people in the business that AID is up for sale again (with an asking price of just over 4 million). If anybody wants to buy what is left of the company, integrate it into Granite Island Group, move it to Gloucester, and revive the product lines (legitimately, with FCC approvals on everything) let me know. >Audio Intelligence is owned by privately held Liberty Associates Management >Group L.C., a holding company that in turn is owned by ex-Army officer, >Joseph Wortley, according to Wortley's business partner, William R. Gates. >Gates -- no, not Microsoft's Bill Gates -- recently served as president of >Audio Intelligence, but now oversees AID as managing member of Liberty >Associates. He said he was a Naval officer in the submarine program. He >declined to give his former rank. >The company, with gross annual sales Gates said were $12 million to $15 >million, is involved in a trade whose course work includes teaching police >officers and agents from around the nation up-to-the-minute lock-picking >techniques and covert entry skills. Actual the NIA courses have been getting farmed out to outside contractors recently. Product sales may have PREVIOUSLY been 12-15 million, but they are a fraction of that now. >Clients include unlikely agencies such as the Department of Housing and >Urban Development. Products include transmitters and "video surveillance >kits" disguised to look like briefcases, surge protectors, cigarettes, >billfolds, smoke alarms and tape measures. >(In an interview, Gates said the CIA is no longer a company client. Court >papers filed by the company last November, and now sealed, say the company >does work for the CIA.) Uh, right... since when does the CIA buy unsophisticated, unsecured, spy shop frequency, wireless microphone, law enforcement grade surveillance equipment. Right... and the Army is going to start buying Twinkies due to their excellent shelf life. >Helping the company maintain its low profile is the fact that the >surveillance devices sought by the government are so exotic that Audio >Intelligence often is the sole source of the supply. Nothing that AID sells is (or has ever been) exotic... The claims that they are the sole source comes from the fact people laying out a requisition would often bias the specification to a specific AID product when an equivalent product from a AID competitor would cost a fraction. This resulted in the procurement process being abused, which in turned ended up in officers getting a reprimand, which in turn got them fired. >Federal rules allow government buyers to use so-called "simplified >acquisition procedures" when making sole-source purchases íƒÓ a practice that >eliminates the need to follow public bidding requirements. Ah, but NOTHING AID offers is sole source. >But while little is known about the company, a dispute now taking place >could affect the company's ability to maintain some of that secrecy. In >addition, it raises questions about the propriety and legality of some of >the company's activity. What secrecy? >Charles W. Goforth, one of two former Audio Intelligence executives who've >been sued, says in court papers that he quit last September after learning >the company unlawfully sold about 60 spy transmitters to the New York City >Police Department. ...and when did THIS become a problem? Only a small fraction of what AID was selling was FCC approved, which would in turn mean that the majority of the equipment they sold to Non Federal Law Enforcement channels was illegal. There is of course a lot of "nudge-nudge-wink-wink" that goes on in law enforcement, and this is just one such case. >Kim Douglas Sherman, Goforth's Fort Lauderdale attorney, said in court >papers that those electronic bugs weren't legal at the time because they >were not sanctioned by the Federal Communications Commission. If police >used the devices to make cases without getting approval, he said in a brief >interview, any evidence they produced would be tainted. >At the New York Police Department, spokesman Alan Krawitz said the >department is not aware of any problems with its devices. "But we would not >even comment about something like this, even if we were aware," he said. >In the court documents, Goforth claims that when he objected to the sale, >the senior vice president of operations responded, "I like to live >dangerously." That is the general attitude >Goforth, via his attorney, declined to comment for this story. >Goforth, who's now president of his own surveillance device firm, Digital >Security Solutions Inc. of Pompano Beach, also says in court documents that >the company's chief operating officer told him the action was approved >despite the illegality. Like someone said... "It's only illegal if you get caught" >The company officials in question aren't identified by name in court papers. >Gates said there "was no basis" for Goforth's allegations and they were >untrue. He said Goforth, whom he accused of trying to swipe AID's >international business, was in charge of the department that handled those >kinds of sales. >The dispute with Goforth isn't the company's only battle with a former >employee. Audio Intelligence is involved in a civil case against the former >administrator of its National Intelligence Academy, a spy school for law >enforcement types. >Laurie Thurmond, who ran the academy from December 1997 until last May, is >accused by Audio Intelligence of breach of contract and violating Florida's >Trade Secrets Act. Thurmond now helps run the similar Law Enforcement >Technology Centre -- a division of a rival Coral Springs firm, Innovative >Surveillance Technology. >Audio Intelligence, in a complaint now sealed by Broward Circuit Judge >Jeffrey E. Streitfeld, alleges Thurmond stole the company's secrets -- >including the names and address of its government customers and students -- >and gave them to her new bosses at Innovative Surveillance. >"In disseminating those names either by herself or through a third party, >[Thurmond] has or is attempting to destroy the credibility of [Audio >Intelligence] in maintaining the anonymity of the law enforcement officers >that are trained," say court papers filed by the company. "In so doing, >[Audio Intelligence] will lose its customers due to the impression that >[it] cannot protect the people that it trains." >The suit, similar to the one brought against Goforth, sought unspecified >damages and an injunction to halt the "misappropriation" of Audio >Intelligence's trade secrets. Like AID mooching business off of industry membership rosters isn't the same thing. The identities of the "officer trained at AID" are a matter of public record, as public money was used to pay for the schools. >Thurmond declined to comment for this story. Plantation, Fla., attorney >Robert D. Klausner, who represents Thurmond, was unavailable for comment. >An attorney in his office, Adam Levinson, would not comment. >Gates and AID's Boca Raton lawyer, Carol A. Kartagener, also declined to >comment on the Thurmond suit. >Ira Libanoff, a Fort Lauderdale lawyer who represents Innovative >Surveillance, indicated he'd like to talk, but said he was "prevented" from >doing so by the seal order imposed at the company's request. Once the case is over there will be a push to unseal the sealed court records to expose what REALLY happened. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 323 From: Steve Uhrig Date: Mon May 15, 2000 6:21pm Subject: AID > Not true... I have a four foot stack of materials about every > product they have produced over the last 15 years, and almost > 1000 database entries on every variation of every product and > frequency they offered during that time. You are the exception, not the rule. The industry, as a whole, knew little of AID. In years past (Jack Holcomb days), EVERY catalog was hand delilvered. NONE mailed. EVERY previous years' catalog was returned or that agency was cut off. How do you know frequencies? AID manufactured their own crystals. In many if not most cases, the users did not even know the frequencies of operation. Every agency was given a different assignment. There was no such thing as "house" frequencies. Frequencies were not re-used. I have serviced many pieces of AID gear, and I have never seen the same frequency more than once. > Law enforcement surveillance equipment tends not to be very > sophisticated simply because the users are generally not > sophisticated themselves (with a few exceptions). You apparently have never spent a week at NATIA. > Actual the NIA courses have been getting farmed out to outside > contractors recently. NIA has been closed for a year at least. > Ah, but NOTHING AID offers is sole source. AID manufactured many products for which there was no equivalent from any manufacturer. They did others for which the only competition was inferior quality converted hobby toys. At least half of what AID offered was not available anywhere else on the planet. Who else made an audio transmitter into the base of an automatic pistol magazine, which would still operate the weapon with 5 rounds? Several reputable companies tried and were unable to make anything withstand the recoil forces and still maintain a reasonable price level. > Only a small fraction of what AID was selling was FCC approved, > which would in turn mean that the majority of the equipment they > sold to Non Federal Law Enforcement channels was illegal. NOT true. 100% of AID's audio transmitters were type accepted. That was a niche only they had, for a good while. For many years, the only LEGAL transmitter was AID. If they did indeed sell non-type-accepted stuff to NYPD, that was a recent decision not involving any of the former management. AID stuff was marvelous quality, very good performing, well engineered by people who had used the stuff in the streets. Their RF gear was superb. Their receivers had specs so good most of the industry test equipment could not be used to measure it. AID set industry standards in antenna efficiency. Their one watt transmitter (for example) would talk substantially further than anyone else's. The difference was in the antennas. I have yet to be able to match their beacon transmitter antenna performance, even with one in front of me and copying the circuit with identical values. There is something in their design *and fabrication* no one else has been able to duplicate. AID is like Motorola is to two way radios. Top performers, super rugged, very high level of support, top prices. The stuff works so well, is so rugged and so reliable that you do not care about the high prices. I could buy 4 ICOM portables for what I pay for encrypted Sabers, but the Sabers are worth far more than the ICOMs. I've changed my opinions over the last several years. I'm back in the Motorola camp where I started, and not fooling with competitive surveillance equipment where another company (TTI now that AID is defunct) makes an acceptable product. Charley Goforth is a good friend and in fact my agent in Brazil. He is as honest and competent as they come. IST (Innovative Surveillance Technology) now has most of the former AID types, the same market, similar products, even similar location, similar training. IST will step in where AID was, and in 5 years no one will remember AID and the wannabees and frustrated competitors will be whining about IST. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 324 From: Newbie Couple Date: Sun May 14, 2000 10:50am Subject: Re: a quick question Try Spook Tech's site. This is the first place we saw them. Also, make sure they have them in stock before you order, we are still waiting for oures! >From: William Knowles >Reply-To: TSCM-L@egroups.com >To: TSCM- >Subject: Re: [TSCM-L] a quick question >Date: Sun, 14 May 2000 12:31:50 -0500 (CDT) > >On Fri, 12 May 2000, Mike F wrote: > > > A person asked me about covert camera that ANTENNA. This person > > said he saw it on a web site. Do you know the web address? Have > > you ever heard of camera in ANTENNA? I know the are in Pagers, > > wristwatches and even eyeglasses but I cannot recall seeing a > > camera in an ANTENNA. Any help would be appreciated. Later4, mike > > f > >Many years ago I saw the antenna camera in CCS' catalog, No idea what >kind of price or where to find them on the Internet, and I never >looked any farther than that, The fire-sprinkler cameras spooked me a >bit and had me looking at normal ones a little more closer for a few >years afterward. > >William Knowles >wk@c... > > >*-------------------------------------------------* >"Communications without intelligence is noise; >Intelligence without communications is irrelevant." >Gen. Alfred. M. Gray, USMC >--------------------------------------------------- >C4I Secure Solutions http://www.c4i.org >*-------------------------------------------------* > > ________________________________________________________________________ Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com 325 From: Robert G. Ferrell Date: Mon May 15, 2000 10:29am Subject: Re: Pharmaceutical Research > The drug is called "Gingko Viagra" and its function is to help you > remember what the f**k you are doing. I saw an amusing related anecdote the other day. Q: What drugs or vitamins, if any, do you take on a daily basis? A: I take Gingko to improve my memory, Viagra to improve my sex life, and Gingko to improve my memory. RGF 326 From: Mike F Date: Sun May 14, 2000 9:44pm Subject: RE: a quick question Thank you very much,I do really appreciatte the HELP YOU and OTHER ON THE LIST PROVIDED! Thanks again, mike fiorentino -----Original Message----- From: MACCFound@a... [mailto:MACCFound@a...] Sent: Sunday, May 14, 2000 10:37 PM To: TSCM-L@egroups.com Subject: Re: [TSCM-L] a quick question In a message dated 5/14/00 6:20:08 PM Pacific Daylight Time, TSCM@j... writes: << It looks like a 6 inch commo antenna but with a larger base mount or coil. >> Visual Methods or Security Products Intl. 800-DIAL-SPI ------------------------------------------------------------------------ Best friends, most artistic, class clown Find 'em here: http://click.egroups.com/1/4054/1/_/507420/_/958358335/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 327 From: Mike F Date: Mon May 15, 2000 0:39pm Subject: Intelligence & Spy Links There are some very useful Intelligence links: http://www.intellpros.com/links.html Be sure to check out intellpros Library,they have some good info there. Since it is the same basic url, I am sure you will find it. later4,mike f. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 328 From: Date: Mon May 15, 2000 4:03pm Subject: Re: http://www.realspy.com/ James, your point got through... I went to check his web site out and found this -> <--------clipped from realspy.com--------------> Due to hackers rewriting my pages from others websites, we will be down for 1 to 2 weeks to reconfigure a hardware firewall and newly designed web page. We are sorry for this inconvenience On another note, to all you harmfull hscker and crakers---YOU CAN KISS MY ASS! I am a member of the FBI's ANSIR program and I will be turning IP address from my server logs over to them to (5-15-2000) today. Just remember, don't pick up the soap! On Mon, 15 May 2000, "James M. Atkinson, Comm-Eng" wrote: > Content-Transfer-Encoding: 7bit > To: TSCM-L Mailing List > Delivered-To: mailing list TSCM-L@egroups.com > mailing list TSCM-L@egroups.com > X-Sender: spook@c... > Received: from [209.113.167.52] (ppp020.cape.cove.com [209.113.167.52]) by ns.cove.com (8.9.3/8.9.3) with ESMTP id LAA07026 for ; Mon, 15 May 2000 11:31:27 -0400 (EDT) > from ej.egroups.com (208.50.144.75) > by smtp.c012.sfo.cp.net with SMTP; 15 May 2000 08:32:13 -0700 > from [10.1.10.38] by ej.egroups.com with NNFMP; 15 May 2000 15:32:12 -0000 > (qmail 25665 invoked from network); 15 May 2000 15:29:14 -0000 > from unknown (10.1.10.142) by m4.onelist.org with QMQP; 15 May 2000 15:29:14 -0000 > from unknown (HELO ns.cove.com) (209.113.166.1) by mta3 with SMTP; 15 May 2000 15:29:09 -0000 > from [209.113.167.52] (ppp020.cape.cove.com [209.113.167.52]) by ns.cove.com (8.9.3/8.9.3) with ESMTP id LAA07026 for ; Mon, 15 May 2000 11:31:27 -0400 (EDT) > Content-Length: 1836 > Content-Type: text/plain; charset=US-ASCII > Mailing-List: list TSCM-L@egroups.com; contact TSCM-L-owner@egroups.com > X-Received: 15 May 2000 15:32:13 GMT > List-Unsubscribe: > Precedence: bulk > Subject: [TSCM-L] http://www.realspy.com/ > From: "James M. Atkinson, Comm-Eng" > X-Egroups-Return: sentto-49964-767-eric=ragingbull.com@returns.onelist.com > Return-Path: > Mime-Version: 1.0 > Reply-To: TSCM-L@egroups.com > Date: Mon, 15 May 2000 11:22:54 -0400 > Message-Id: > > Good Morning, > > Over the last few months I have received a number of comments from > visitors to the following website: http://www.realspy.com/ > > It would appear that the website author blatantly ripped off > materials from my website, and went to far to swipe a copy of by bio > and other materials and effectively just added his name. > > I would appreciate it if other list members could visit the site in > question, and privately email me their thoughts on the matter. > > -jma > > =================================================================== > Sed quis custodiet ipsos Custodes? > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > "...any sufficiently advanced technology is > indistinguishable from magic." - Arthur C. Clarke > =================================================================== > > ------------------------------------------------------------------------ > eGroups members: $60 in FREE calls! Join beMANY! > And pay less each month for long distance. > http://click.egroups.com/1/4122/1/_/507420/_/958404731/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -------------------------------------------------- Rage with the Bulls... Get your FREE @ragingbull.com Email Address Visit http://www.ragingbull.com/ 329 From: Date: Mon May 15, 2000 3:22pm Subject: Re: http://www.realspy.com/ sounds like someone forgot to take their meds 330 From: James M. Atkinson, Comm-Eng Date: Mon May 15, 2000 8:04pm Subject: Re: http://www.realspy.com/ It's curious that the website was up for up with the swiped materials for 7 months, and that my progressively nastier email to the webmaster went completely ignored. But's it's funny that he didn't notice that 99% of everything on his website just happen to have been lifted right off my website ( with his name replacing mine), AND that it just just happened to be on-line (supposedly with out his knowledge) for 7 months. Then, when I was finally able to get thought the guy he claims that hacker had hacked him 7 months ago, claimed to have no knowledge of any of the materials (webpage?, what webpage?). I appreciate the observations of the other list members including the one who pointed out that the commercial exploitation of someone's copyrighted materials for commercial purposes (without permission) is a serious federal felony. Ok, Ok, Ok... so I'll be a gentleman and give the guy a break, we'll call it an "unfortunate misunderstanding" and "breach of security on his website". Arghh, (mumble, grumble, fume, grump) -jma At 2:03 PM -0700 5/15/00, eric@r... wrote: >James, your point got through... I went to check his web site out >and found this -> > ><--------clipped from realspy.com--------------> >Due to hackers rewriting my pages from others websites, we will be >down for 1 to 2 weeks to reconfigure a hardware firewall and newly >designed web page. > > > >We are sorry for this inconvenience > >On another note, to all you harmfull hscker and crakers---YOU CAN >KISS MY ASS! > >I am a member of the FBI's ANSIR program and I will be turning IP >address from my server logs over to them to (5-15-2000) today. > > > >Just remember, don't pick up the soap! > > > >On Mon, 15 May 2000, "James M. Atkinson, Comm-Eng" wrote: > > > > Good Morning, > > > > Over the last few months I have received a number of comments from > > visitors to the following website: http://www.realspy.com/ > > > > It would appear that the website author blatantly ripped off > > materials from my website, and went to far to swipe a copy of by bio > > and other materials and effectively just added his name. > > > > I would appreciate it if other list members could visit the site in > > question, and privately email me their thoughts on the matter. > > > > -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 331 From: Date: Mon May 15, 2000 5:22pm Subject: Re: http://www.realspy.com/ Forgive Your Enemies, Forget Not Their Names! From: Hawkspirit Date: Tue May 14, 2002 9:36pm Subject: Cellular Phone Security Cracked New Digital Cellular Phone Security Cracked! No privacy on new systems either. Was NSA to blame? See NSA's Response Telecommunications Industry Association algorithm for digital telephones fails under simple cryptanalysis MINNEAPOLIS, MN. AND BERKELEY, CA., March 20, 1997 - Counterpane Systems and UC Berkeley jointly announced today that researchers have discovered a flaw in the privacy protection used in today's most advanced digital cellular phones. This discovery points to serious problems in the chosed-door process used to develop these privacy measuers. This announcement is a setback to the US cellular telephone industry, said Bruce Schneier of Counterpane Systems, a Minneapolis, MN consulting firm specializing in cryptography. The attack can be carried out in a few minutes on a conventional personal computer. Schneier and John Kelsey of Counterpane Systems, along with graduate student David Wagner of the University of California at Berkeley, plan to publish their analysis in a paper entitled "Cryptanalysis of the Cellular Message Encryption Algorithm (CMEA)." Legislators are scheduled to hold hearings today on Rep. Goodlatte's "SAFE" (Security And Freedom Through Encryption) bill, HR695. The problem affects numbers dialed on the key pad of a cellular handset, including any telephone, PIN, or credit cards numbers dialed. The system was supposed to protect the privacy of those dialed digits, but the encryption is weak enough that those digits are accessible to eavesdroppers with a digital scanner. The cryptographers blame the closed-door design process and excessive pressure from U.S. military interests for problems with the privacy standard. The cellular industry attempted to balance national security with consumer privacy concerns. In an attempt to eliminate recurring security problems, the cellular standards arm of the Telecommunications Industry Association (TIA) privately designed this new framework for protecting cellular phones. The system uses encryption to prevent fraud, scramble voice communications, and protect users' privacy. These new protections are being deployed in today's digital cell phones, including CDMA, NAMPS, and TDMA. Not a new problem As early as 1992, others - including noted security expert Whitfield Diffie - pointed out fatal flaws in the new standard's voice privacy feature. The two flaws provide a crucial lesson for policy makers and consumers, the researchers said. These weaknesses are symptomatic of broad underlying problems in the design process, according to Wagner. Many have criticized the National Security Agency (the U.S. military intelligence agency in charge of electronically monitoring foreign powers) for insinuating itself into the design process, pressuring designers to cripple the security of the cellular encryption technique and hamstringing emerging cellular security technology. "The result is weaker protection for everybody," Kelsey said. "This is another illustration of how U.S. government efforts to control cryptography threaten the security and privacy of Americans," said David Banisar, attorney for the Electronic Privacy Information Center in Washington, D.C. This is not the first report of security flaws in cellular telephony. Today, most cellular phone calls can be intercepted by anyone in the area listening to a scanner, as House Speaker Newt Gingrich learned this past January when someone with a scanner recorded one of his cellular calls. According to FCC estimates, the cellular telephony industry lost more that $400 million to fraud and security problems last year. CMEA Technology CMEA is a symmetric cipher, like the Digital Encryption Standard (DES). It uses a 64-bit key, but weaknesses in the algorithm reduce the key to an effective length of 24 or 32 bits, significantly shorter than even the weak keys the U.S. government allows for export. Greg Rose, program chair of the 1996 USENIX Security Symposium, put the results in context: "This break does not weaken the digital cellular fraud protections. And it's still true that digital cellular systems are much harder to casually eavesdrop on than analog phones. But it's clear from this break that a determined criminal with technical resources can intercept these systems." Counterpane Systems is a Minneapolis, MN-based consulting firm specializing in cryptography and computer security. Bruce Schneier is president of Counterpane and author of three books on cryptography and security. David Wagner is a founding member of the ISAAC computer security research group at UC Berkeley. In the Fall of 1995, the ISAAC group made headlines by revealing a major flaw in Netscape's web browser. The authors also hasten to thank Greg Rose for his advice. CONTACTS: Bruce SchneierRobert Sanders, PR Counterpane SystemsUniversity of California. Berkeley 612 823-1098 (voice)510-643-6998 (voice) 612 823-1590 (fax)510-643-7461 (fax) schneier@c... (email)rls@p... (email) David WagnerLori Sinton University of California, BerkeleyJump Start Communications 510-643-9435 (voice)415-938-2234 (voice) 510-642-5775 (fax)415-938-2237 (fax) daw@c... (email)lsinton@a... (email) More information is on my website: http://www.counterpane.com/ NSA's Response from Dorothy Denning NSA has released the following statement with regards to the news today about the cryptographers who found the flaw in the digital cellular code. "NSA had no role in the design or selection of the encryption algorithm chosen by the Telecommunications Industry Association (TIA). NSA also had no role in the design or manufacture of the telephones themselves. As we understand the researchers' claim, it appears that the algorithm selected and the way it was implemented in the system has led to the stated flaws. NSA provided the TIA with technical advice on the exportability of these devices under U.S. export regulations and processes." Return to top 5374 From: Steve Uhrig Date: Wed May 15, 2002 1:28pm Subject: TV spot tomorrow on telephone theft of service Hi all, Tomorrow evening, Thursday May16th, at 11PM on Baltimore TV channel 11 (WBAL) there will be a taped segment airing where presumably a maintenance man accessed dozens of residential telephone lines in an apartment complex in Owings Mills, and ran up thousands of dollars in calls to 900 number psychic hotlines. The calls were charged to the various residents. I demonstrated, live for tape, how this was done. Nothing more than a penknife and a telephone needed. Interesting segment on security, or lack of, in telephone service at apartments. Anyone in the Baltimore coverage area is invited to watch it. Shouldn't be more than 3 minutes or so. Unfortunately I will be out of town and my house is too far from Baltimore to get their TV, so I won't even see it. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5375 From: James M. Atkinson Date: Wed May 15, 2002 8:45pm Subject: Court deadline in 'spying' case http://news.bbc.co.uk/hi/english/uk/england/newsid_1989000/1989027.stm Wednesday, 15 May, 2002, 12:29 GMT 13:29 UK Court deadline in 'spying' case BAe Systems is a leading defence equipment maker Prosecutors have been given until July to build their case against a man accused of offering top secret documents to the Russians. Ian Parr, from Rochford, Essex, is alleged to have offered documents to a man claiming to be from the Russian Embassy. The offences are said to have happened while Mr Parr was working for BAe Systems and Avionics based in Basildon, Essex. Mr Parr, who faces nine charges under the Official Secrets Act and one theft charge, was not at the Old Bailey hearing on Wednesday which was adjourned until July. 'Useful to enemy' The former soldier is accused of nine charges of obtaining information "prejudicial to the safety or interests of the state" between 1 January and 23 March of this year. Mr Parr, 45, is also accused of stealing a CD-Rom containing sensitive data relating to the Hostile Artillery Locator (Halo) project. The data could be "useful to an enemy contrary to Section 1 of the Official Secrets Act". The prosecution was given until 12 July to serve papers on the defence at Wednesday's hearing. Mr Parr, a father-of-two and former test co-ordinator for BAe, was arrested on 22 March in a joint operation involving police and the security services. The charges Mr Parr faces carry a maximum of 14 years in prison. BAe Systems and Avionics employs 1,300 people and is one of the UK's leading suppliers of civil and military electronic systems. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5376 From: Paolo Sfriso Date: Wed May 15, 2002 2:47am Subject: GSM Interception Dear Colleagues. Following is an interesting link on GSM interception: http://www.dia.unisa.it/ads.dir/corso-security/www/CORSO-9900/a5/Netsec/netsec.html Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 5377 From: HAMZA MUTLU fiAH›N Date: Wed May 15, 2002 3:00am Subject: lens dedection I would be very glad if anybody inform me about lens dedection theory & producst. with my best wishes __________________________________________________ Do You Yahoo!? Everything you'll ever need on one web page from News and Sport to Email and Music Charts http://uk.my.yahoo.com 5378 From: Fernando Martins Date: Wed May 15, 2002 10:52am Subject: RE: Cell Phone Remote Update hi2all > -----Original Message----- > From: Hawkspirit [mailto:hawkspirit@e...] > Sent: quarta-feira, 15 de Maio de 2002 2:14 > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Cell Phone Remote Update > > > > One aspect of the deal with Ericsson and Red Hat will be > development of > software that allows gadgets to be updated by the company that sells > them--a big change from the PC practice of making people > responsible for > downloading and installing patches. Please ... Ask to linux users how many of them want that update without their explicit action ... For better success I advice Ericssion to make a partnership with Microsoft ... > believes it's "extremely likely" that such servers will run > Red Hat's Linux. Also it's "extremely likely" that other unsolucited things will happend ... FM 5379 From: James M. Atkinson Date: Wed May 15, 2002 8:46pm Subject: Court told spy apologetic after passing on document http://www.theage.com.au/breaking/2002/05/15/FFXEVZ977UC.html Court told spy apologetic after passing on document CANBERRA, May 15 AAP|Published: Wednesday May 15, 6:35 PM A spy who gave a woman top-secret Defence Intelligence Organisation (DIO) documents broke down as he made his admission to a security chief, a court was told today. The former DIO employee, Simon Lappas, aged 27, also became depressed, smoked more and felt stupid for what he had done, one of his ex-colleagues said. Lappas first made the admission over lunch with his colleague in a crowded Defence Department cafeteria on a Friday afternoon in July 2000, the court was told. He confided about his troubled relationship with his fiancee before revealing he had done the wrong thing. "He said he'd given some information out," the former colleague told the ACT Supreme Court. Neither his name, nor the name of the security chief, can be released because they worked for the spy agency. "He said he gave some classified information out to a woman he'd recently met," the colleague said. "He said he'd given her a couple of reports." Lappas then emailed the security chief that afternoon and requested a meeting but the two did not end up finding each other. Lappas later phoned the officer at home on the Sunday to arrange to meet him to make a full admission that night. When the pair met at their workplace, Lappas broke down after saying he had troubles with his fiancee, the officer said. "He said: `I've taken three documents out - two of them are very sensitive'," the officer said. Lappas's colleague said Lappas apologised to various people in the office, including his bosses. The colleague said he then drove Lappas home to help him explain the situation to his father. He also said he noticed Lappas then starting smoking more, was always tired, more depressed, had a low self-esteem and felt stupid for what he had done. When asked if Lappas was embarrassed, the officer told the court: "I don't know about embarrassed, more sorry for what he had done". The trial, before Justice Malcolm Gray, is continuing. While Lappas admitted to passing on the photocopied documents to a woman, he pleaded not (not) guilty to supplying top-secret information to a foreign power with intent to prejudice the safety or defence of Australia. By Linda McSweeny -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5380 From: Fernando Martins Date: Wed May 15, 2002 11:25am Subject: RE: Cell Phone Flaw Hi2all That was also 17's Sep00 news on ZDNET ... And I can add something here ... Can't remember dates, but about 2/3 weeks before that I was asked for help a friend that seems like he was a victim of that problem. For obvious reasons (ignorance and fear included) I'll not tell much details, but, I tried to help my friend ... The short version of the story is that I was able to trace the 'artits' (like, who they are, where they live, who are their friends, where they use to drink coffee after dinner, ...), and then, since I'm not a law agent nor a hero, I asked for help to some local and international entities (the right/obvious ones, and some others). I only had 2 replies, and both from the other side of the ocean. Both (kindly) said: "that is a local police problem, sorry but we can't help" (or something like that). At the time I had the feeling that nobody did care about it ... Or could not tell me so (wich I understand). The only measures I could adivice was, along with "please don't go for anything stupid", "after your dog, your hammer is your best friend ... Please change cell and cell provider, and just destroy the old phone(s)" Some mails ago, somebody warned about the risks regarding phone calls with eastern european accent ... Yeah, tell me about it ... FM > -----Original Message----- > From: Hawkspirit [mailto:hawkspirit@e...] > Sent: quarta-feira, 15 de Maio de 2002 2:33 > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Cell Phone Flaw > > > Cell phone flaw opens security hole > > By Sara Robinson > Interactive Week > September 18, 2000 4:01 AM PT > Your cell phone may be multilingual -- and that could be > detrimental to > your privacy. Computer security researchers said a design flaw in the > protocol used in global system for mobile communication cell > phones could > allow eavesdropping. The trick: Just make the cell phone think it's > somewhere else. > Only 6.5 million people in North America use global system for mobile > communications cell phones -- through providers such as Pacific Bell > Wireless and VoiceStream Wireless -- but worldwide, it's the > most widely > used standard, accounting for 65 percent of the total > wireless digital > market. GSM phones are increasingly popular in the United > States because > they allow roaming in Asia and Europe upon insertion of the > appropriate > smart card. > > Since Western Europe can't export encryption products to > certain countries, > such as targets of United Nations sanctions, the default > version of the GSM > protocol does not use encryption. This in itself isn't necessarily a > problem, said David Wagner, a professor of computer science at the > University of California-Berkeley, but GSM also does not > authenticate its > base stations, the hardware that communicates with the > handsets -- and that > is potentially troublesome. > Experts said it is possible to build a phony base station > that jams the > signal from the real base station and forces the cell phone > to connect to > it. The base station then tells the cell phone, in essence, > "You're in > Iraq, don't use encryption," and the call proceeds > unprotected with the > false base station relaying information between the real base > station and > the handset. > A handful of researchers have been aware of the loophole for > several years > now, but it's been "a well-kept secret," Wagner said. > Security experts call this a "man-in-the-middle" attack > because the phony > base station sits between the handset and the real base station, > intercepting their communications, but neither the real base > station nor > the handset knows it's there. > "We know about it as a technical issue, but we haven't seen it > demonstrated," said James Moran, fraud and security director > at the GSM > Association. He added that building an interception device > would require > considerable technical skill. Moran said the next GSM standard would > address the problem. > Other cell phone standards probably don't authenticate base stations > either, Wagner said, perhaps because their designers were > more concerned > with preventing handset cloning, which allows someone to bill > his or her > calls to someone else's number. But the phony-base-station trick is a > particular problem for GSM because different strengths of > encryption are > used in different places. > "Whenever you have to support both weak and strong > cryptography, one very > real risk is that you end up with 'least common denominator' > security," > Wagner said. > Cracking different pieces of the cryptography that protects > GSM cell phones > from eavesdropping has long been a favorite pastime for > computer security > researchers. Just last December, two Israeli researchers > announced that > they had found a fast method of cracking the A5/1 algorithm, > the strong > encryption used to protect GSM phone calls in Europe and the > United States. > But the phony-base-station strategy obviates the need for any > encryption > busting. > > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> Tied to your PC? Cut Loose and Stay > connected with Yahoo! Mobile > http://us.click.yahoo.com/QBCcSD/o1CEAA/sXBHAA> /kgFolB/TM > > > -------------------------------------------------------------- > -------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire > speed, the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > 5381 From: Marcel Date: Wed May 15, 2002 9:24pm Subject: Bush Was Warned of Hijacking Plot Bush Was Warned of Hijacking Plot Wed May 15, 9:41 PM ET By RON FOURNIER, AP White House Correspondent WASHINGTON (AP) - In the weeks before the Sept. 11 attacks, President Bush (news - web sites) was told by U.S. intelligence that Osama bin Laden (news - web sites)'s terrorist network might hijack American airplanes, prompting the administration to issue a private warning to federal agencies, the White House acknowledged Wednesday night. But officials said the president and U.S. intelligence did not know that suicide hijackers were plotting to use planes as missiles, as they did against the World Trade Center and the Pentagon (news - web sites). "There has been long-standing speculation, shared with the president, about the potential of hijackings in the traditional sense," White House press secretary Ari Fleischer (news - web sites) said. "We had general threats involving Osama bin Laden around the world and including in the United States." He said the administration, acting on the information received last summer, notified the "appropriate agencies" that hijackings "in the traditional sense" were possible. The warning was never made public, he said. The development, first reported by CBS News, comes as congressional investigators intensify their study of whether the government failed to adequately respond to warnings of a suicide hijackings before Sept. 11. It is the first direct link between Bush and intelligence gathered before Sept. 11 about the attacks. Fleischer would not discuss when or how the information was given to Bush, but a senior administration official, speaking on condition of anonymity, said the president was made aware of the potential for hijackings of U.S. planes during one or more routine intelligence briefings last summer. The CIA (news - web sites) would not confirm what it told Bush, but the agency said the issue of bin Laden's attempting an airline hijacking was among a number of terrorist methods raised to U.S. government officials at the time. But there was no information that suggested hijackers would crash planes into American landmarks and there was no mention of a date, a CIA official said. The information was based on intelligence obtained by the U.S. government, the official said, without specifying. "I will tell you there was, of course, a general awareness of Osama bin Laden and threats around the world, including the United States; and if you recall, last summer we publicly alerted and gave a warning about potential threats on the Arabian peninsula," Fleischer said. But he said Bush had never been told about the potential for suicide hijackers steering the planes toward U.S targets. Still, acting on the information the government did have, the administration "notified the appropriate agencies. I think that's one of the reasons that we saw the people who committed the 9-11 attacks used box cutters and plastic knives to get around America's system of protecting against hijackers," he said. Fleischer said he did not know what agencies were notified or what they were told. The Associated Press reported earlier this month that FBI (news - web sites) headquarters did not act on a memo last July from its Arizona office warning there were a large number of Arabs seeking pilot, security and airport operations training at at least one U.S. flight school and which urged a check of all flight schools to identify more possible Middle Eastern students. A section of that classified memo also makes a passing reference to Osama bin Laden, speculating that al-Qaida and other such groups could organize such flight training, officials said. The officials said, however, that the memo offered no evidence bin Laden was behind the students that raised the concern. Sen. Bob Graham (news, bio, voting record), D-Fla., the Senate Intelligence Committee chairman, said through a spokesman Wednesday that the revelations in the memos marked an important discovery in Congress' investigation into why the FBI, CIA and other U.S. agencies failed to learn of and prevent the Sept. 11 plot. "It represents a failure to connect the dots," said Graham spokesman Paul Anderson. "This was dismissed rather lightly at FBI headquarters." The FBI also has faced tough questioning about whether it failed to act aggressively enough after arresting Zacarias Moussaoui, a Frenchman of Moroccan descent, in August after he raised concerns by seeking flight training at a Minnesota flight school. Moussaoui has emerged as the lone defendant charged in the aftermath of the attacks, which killed more than 3,000 people in New York, Washington and Pennsylvania. He is charged with conspiring with bin Laden and the 19 suicide hijackers to attack Americans. FBI Director Robert Mueller repeatedly has said he wished the FBI had acted more aggressively in addressing the Arizona and Minnesota leads but said nothing the FBI possessed before Sept. 11 pointed to the multiple-airliner hijacking plot. -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 5382 From: Marcel Date: Wed May 15, 2002 9:24pm Subject: ooks like the GA Gov & other owe Rep.Mckinney an apology. Looks like the GA Gov & other owe Rep.Mckinney an apology. Mckinney said weeks ago that Bush knew about the 9/11 attacks. ================================================================ Some of McKinney's opinions are so far out there that even fellow Democrats scratch their heads and wonder how to work with her. McKinney's most recent claim ≠ that Bush administration officials may have ignored warnings of the Sept. 11 attacks and that their political allies have profited from the war on terrorism ≠ drew rebukes in Washington but tapped into a surprising undercurrent in her home district. http://story.news.yahoo.com/news?tmpl=story&u=/ap/20020511/ap_on_go_co/mckinney_country_2 -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 5383 From: Aimee Farr Date: Wed May 15, 2002 11:00pm Subject: Skeleton effect ("they knew about it" phenomena) THE SKELETON EFFECT (as in closets, rattling or walking) Every surprise attack produces indicators seen in hindsight. In the context of people's evoked sets post event, stale information will be seen to have greater relevance than it might otherwise warrant. And, it's always the "troops" that see the indicators, and they get lost in bureaucratic channels. Happens every time. Whatever the gravity of the perceived mistake, the "skeleton effect" will accentuate it. I don't know that 9-11 was a "fundamental" surprise. (That would be like Spain attacking Finland tomorrow.) Of relevance to government and private clients? I would think so. Anything that resembles a "snapshot" has the attributes of iconicity ("it is") and indexicality ("it was"). ~Aimee 5384 From: Hawkspirit Date: Thu May 16, 2002 0:13am Subject: Cell Phone Crypto Penetrated Cell Phone Crypto Penetrated by Declan McCullagh 10:55 a.m. Dec. 6, 1999 PST Israeli researchers have discovered design flaws that allow the descrambling of supposedly private conversations carried by hundreds of millions of wireless phones. Alex Biryukov and Adi Shamir describe in a paper to be published this week how a PC with 128 MB RAM and large hard drives can penetrate the security of a phone call or data transmission in less than one second. The flawed algorithm appears in digital GSM phones made by companies such as Motorola, Ericsson, and Siemens, and used by well over 100 million customers in Europe and the United States. Recent estimates say there are over 230 million users worldwide who account for 65 percent of the digital wireless market. Although the paper describes how the GSM scrambling algorithm can be deciphered if a call is intercepted, plucking a transmission from the air is not yet practical for individuals to do. James Moran, the fraud and security director of the GSM Association in Dublin, says that "nowhere in the world has it been demonstrated --an ability to intercept a call on the GSM network. That's a fact.... To our knowledge there's no hardware capable of intercepting." The GSM Association, an industry group, Date: Thu May 16, 2002 0:32am Subject: Cell-Phone Security Cell-Phone Security Far From Airtight by Annaliza Savage 9:59am 13.Apr.98.PDT A group of California-based computer experts claims to have compromised the cryptographic security behind the world's most popular digital cell-phone system, making it possible to clone any phone using the GSM standard. The Smartcard Developer Association says it cracked the algorithm used as the basis for the The Global System for Mobile Communications (GSM) -- a digital cellular phone system that is used in about 80 million cell phones, primarily in Europe and Asia. Many US networks are starting to implement GSM standards, too, and this attack was launched against a card issued by Pacific Bell. If the group's claims are true, it could lead to a recall or reissue of the smart cards used in GSM-based phones. "GSM is likely to face fraud problems of the same magnitude as analog systems have had," said Marc Briceno, a member of the SDA who said that analog systems have lost billions of dollars because of cellular phone cloning. GSM-based cell phones work with a small card containing an electronic chip called a Subscriber Identity Module card. The SIM card inserts into the back of the cellular phone and contains information that is used to identify subscribers and their account information to the GSM network. The SIM card must be inserted into a GSM Mobile handset to obtain access to the network, and one of the primary benefits of the technology is that cell phones have access to GSM networks worldwide. However, to clone a SIM card, a would-be cracker would have to have physical possession of one. Unlike the cloning used in analog systems, the crack does not yet include being able to listen in on peoples phone calls or obtain a SIM ID via the airwaves, although the SDA has stated that an "over-the-air attack should not be ruled out." The SIM uses encryption to keep the identity of the phone secret, and the encryption algorithm used on most of the GSM network is called COMP128. The SDA was able to obtain the secret ciphers used by the GSM network. After verifying authenticity, the group turned them over to UC Berkeley researchers David Wagner and Ian Goldberg, who were able to crack the COMP128 algorithm within a day. In 1995, Wagner and Goldberg succeeded in another high-profile hack when they compromised the crypto code used in Netscape's Navigator browser, which was supposed to secure credit-card transactions. "Within hours they discovered a fatal flaw," said Briceno. "The attack that we have done is based on sending a large number of challenges to the authorization module in the phone. The key can be deduced and recovered in about 10 hours." A group of hackers gathered with security and crypto experts Friday evening at a San Francisco hacker club called New Hack City, for a demonstration of the hack, but it never came off. Eric Hughes, a member of the SDA and founder of the Cypherpunks cryptography group, discussed the technical aspects of the hack, but had to give up the planned demonstration after threats of legal action from Pac Bell and other telephone company executives. It is illegal in the United States to possess cellular phone cloning equipment, although legitimate businesses are exempted. The telephone companies dispute SDA's claims to legitimacy. Wagner blames the ease of the crack on the secrecy with which the ciphers were kept. "There is no way that we would have been able to break the cryptography so quickly if the design had been subjected to public scrutiny," said Wagner. The GSM standard was developed and designed by the European Telecommunications Standard Institute, an organization that has about 500 members from 33 countries, representing administrations, network operators, manufacturers, service providers, and users. "There's going to be an orgy of finger pointing," said Hughes, referring to all the engineers and other people associated with the design of the GSM network. The SDA say that they were able to crack the GSM network algorithm due to weak encryption in the original design. When the system was being designed, several European government agencies were successful in their demands to weaken encryption standards for government surveillance purposes. The SDA also claimed that the GSM security cipher that keeps eavesdroppers from listening to a conversation called A5 was also made deliberately weaker. The A5 cipher uses a 64-bit key, but only 54 of the bits are actually in use -- 10 of the bits have been replaced with zeroes. The SDA's Briceno blames government interference. "The only party who has an interest in weakening voice privacy is the National Security Agency," he said. The SDA said that a proper demo will be taking place soon from somewhere outside the United States. The group has also released the source code for COMP128 and A5 for further testing. 5386 From: Steve McAlexander Date: Thu May 16, 2002 0:25am Subject: FW: http://www.paknews.com/headingNews.php?id=1106&date1=2002-05-06 Anyone see this or miss this? _____ Top News Main News News Flash Home News City News Business Sports News Articles Editorials Letters Authors My PNSSupport PNS Matrimonial Ranks PakWood Urdu NewsWeb Radio Message Board Internet Services FRONT PAGE Support PakNews Register/ MY PNS Referendum 2002 Islam FAQ Daniel Pearl Basant Festival Slogan Pakistan Musharraf in USA Urdu Service Web Radio Entertainment Internet Services Message Board Matrimonial Rank Ur Site Syndicate News Ticker PNS Mobile Newsletters Archives Payment Advertise Donate History Columnists Contact us Feedback News Alert Event Calendar May 2002 < May > SMTWTFS 1234 567891011 121314151617 18 19202122232425 262728293031 < May > _____ _____ Community Alert About Us Picture Archives Exclusive Books Pakistan Kashmir Calendar Classified e-Cards Free E-Mail FAQ Featured Links Heritage Tours & Travel Subscribe Top News Main News News Flash Kashmir News Business Sports Articles Letters India War Threat Afghanistan Global News Review _____ PakWood Current Affairs PNS In-depth PNS Studios Pakistan on Video Song of the Week PNS Wire _____ Most Discussed Most Emailed Most Printed Most Visited Register .pk Domain Featured Vendors Currency Exchange Awards Weather Deals Lower Graphics E-MAIL: Subscription Services Subscribe to PNS News Letter. Enter your address: DISCUSSION: Message board Chat Feedback PNS Bazar PNS Bazar (c) Copyright & Legal Info Site Designed and Maintained by PakCyber.Com Operation Snipe aimed at to rescue 76 US hostages Updated on 2002-05-06 11:05:12 Send this Article to your friend Printer-Friendly Version!!! Post your Comments Most Popular ISLAMABAD, May 06 (PNS): Local News wire service "Online" claims that more than 2000 British-led Special Commando forces, joined by the US and Canadian troops, under "Operation Snipe" are gearing up efforts to launch a major attack to rescue around 76 soldiers who were arrested by the Taliban and Al Qaida forces during the battle in the snow covered Arma Peaks of Paktia Province in March this year. Both Diplomatic and Afghan sources have said, "the majority of the soldiers are of American nationality but there are some Canadian troops also". US believe that the Taliban forces are keeping them in hide in the south eastern part of Afghanistan. Earlier reports had suggested that 18 allied soldiers were taken hostage by the Taliban forces during severest clashes which took place during March at Shah-e-Kot in Gardez where the fighting came to an end only when 400 US-led Allied troops had to withdraw in order to provide safe passage to the Al Qaida and Taliban forces to ensure the safety of US soldiers arrested by the opposition forces. Afghan sources said that the US led forces had agreed to withdraw yielding to the three conditions forwarded by the Taliban forces. One that the all US-led forces will withdraw with no aerial attacks to ensure safe passage to all Taliban forces and that all more than 350 Taliban and pro-Taliban prisoners held at Guantanamu Bay in Cuba will be set free. While United States did not act on releasing the Afghan and non-Afghans alleged to have links with Al Qaida, it did provide a safe passage. So far the fate of the 76 US soldiers is not known despite all efforts to trace them through satellite, diplomatic sources added. These sources said during the Operation Snipe each and every area in the tribal belt will be combed where aerial military strike could not be ruled out. But Pakistan has ruled this out in categorical terms. Foreign Office Spokesman Aziz Ahmed Khan said "no question" of military air strikes in the tribal areas. "Neither US has asked nor we have given any such permission, it is out of question," he said while talking PNS. President General Pervez Musharraf Saturday ruled out any possibility of Al Qaida regrouping in Pakistan believing that alleged terrorist mastermind Osama bin Laden was still in Afghanistan but might be dead already. The Pakistani and WE forces have charged the political situation in the tribal areas particularly in North Waziristan on religious institutions in pursuit of Taliban and Al Qaida members. Though United States has admitted very less casualties during her seven-month war against terrorism since October 7, 2001 but it is estimated that it has suffered around 400 casualties in Afghanistan and many dead bodies of the soldiers are lying on the US combat ships in the Arabian Sea. Afghan sources maintained that on October 20, 2001 during a night commando operation in Kandahar, US had suffered more than 90 casualties. Later, Al Qaida and Taliban have caused more than 50 casualties at Tahktapul, which lies between Kandahar and Spin Boldak. In March this year, during bloodiest battle at Shahi-e-Kot of Paktia Province, the Taliban forces claimed to have destroyed 13 military helicopters and killed 180 US soldiers. End. Post your Comments *Really? .....Canadian Guy *Yeah, Right.....ethan *Prisoners of Taliban/Al Qaeda?.....Mike *Prisoners of Taliban/Al Qaeda?.....Mike *Prisoners of Taliban/Al Qaeda?.....Mike *Prisoners of Taliban/Al Qaeda?.....Mike *nonsense .....mohammed *garbage .....RD *U have that backwards........give me a break *Is this true?.....Al Andrews *The Washington Post........Steve in US *Taliban math.....Jerry *US hostages?.....pooo *The Snipe Hunt:A Classic American Joke.....jack brown *Its not imposible as you think.....jhonny *You guys are full of crap.....Ben *US Pres Taken Hostage.....Jazz *USA ppl are brain washed.....Farooq Rabbani *Might this be true?.....L R *This is a make believe news site.....EdwardC *credibility .....Scott *Mike .....Fahad *Rubbish .....Darren *Phantom war.....geoff *Hard to accept truth.....M. Khan *WHAT!!!! .....Sucker free *Crazy Americans.....Albert *The Muslim world is so bankrupt........Shawn *amazing... .....zahar *RE; Khan.....sucker free *NO IMMUNITY.....Y.L.. *it talts some sence.....babu *The truth!.....Musa Shami *Musa Shami: 2 words said with pity......EdwardC *Bullcrap! .....Yebo GoGo *they do .....karen *VeryDispleased. .....JoeinLA *Morons .....JoeinLA *The begining of the end.....Zack *All I want to know is........Jesse *Where's the Video?.....hyu *Ignorant Savages.....Enigma *The truth is usually........EJ *18 >76>118>Watch this space.....Michael1 *Another "blackout!".....Doug *Al Qaeda Capture US POW's.....Kirk Manor *Illierate Americans.....Victor Howard *Illierate Americans.....Victor Howard *ADVISE TO AMERICANS.....Victor Howard *Pure nonsense.....Vijay *You smoked too much.....Rick *AMERICAN FUCKERS.....Proud pathan *To EJ.....IN YOUR FACE *Re: Farooq Rabbani.....Courtney Phials *Shocking! .....RealAmerican *RE; Victor Howard.....sucker free *In your face..........EJ *Proud Pathan & Victor Howard.....EdwardC *be muslim or be damned.....kifirkiller *be muslim or be damned.....kifirkiller *Hey Farooq.....K-Dogg *The story may or.....Ralph *gimmeabreak!!!!!!! .....Shane Gentry *TO SCOTT: Jenin Massacre that happened!.....Purple *Americans ignorant of history. Pt 1.....Not an Ignorant American *Americans ignorant of history. Pt 2.....Not an Ignorant American *The Real Reason.....Dave *Don't Waste Your Time.....Alice *Victor Howard Re: Advise.....IN YOUR FACE *Pathetic proud pathan.....IN YOUR FACE *censored US press.....mike [Non-text portions of this message have been removed] 5387 From: Steve McAlexander Date: Thu May 16, 2002 1:38am Subject: Have you guys heard or seen this? Operation Snipe aimed at to rescue 76 US hostages Maybe this coincides with the camp x-ray hotel upgrades in accomodations? http://www.paknews.com/PrintPage.php?id=1106&date1=2002-05-06&news2=head ingNews ISLAMABAD, May 06 (PNS): Local News wire service "Online" claims that more than 2000 British-led Special Commando forces, joined by the US and Canadian troops, under "Operation Snipe" are gearing up efforts to launch a major attack to rescue around 76 soldiers who were arrested by the Taliban and Al Qaida forces during the battle in the snow covered Arma Peaks of Paktia Province in March this year. Both Diplomatic and Afghan sources have said, "the majority of the soldiers are of American nationality but there are some Canadian troops also". US believe that the Taliban forces are keeping them in hide in the south eastern part of Afghanistan. Earlier reports had suggested that 18 allied soldiers were taken hostage by the Taliban forces during severest clashes which took place during March at Shah-e-Kot in Gardez where the fighting came to an end only when 400 US-led Allied troops had to withdraw in order to provide safe passage to the Al Qaida and Taliban forces to ensure the safety of US soldiers arrested by the opposition forces. Afghan sources said that the US led forces had agreed to withdraw yielding to the three conditions forwarded by the Taliban forces. One that the all US-led forces will withdraw with no aerial attacks to ensure safe passage to all Taliban forces and that all more than 350 Taliban and pro-Taliban prisoners held at Guantanamu Bay in Cuba will be set free. While United States did not act on releasing the Afghan and non-Afghans alleged to have links with Al Qaida, it did provide a safe passage. So far the fate of the 76 US soldiers is not known despite all efforts to trace them through satellite, diplomatic sources added. These sources said during the Operation Snipe each and every area in the tribal belt will be combed where aerial military strike could not be ruled out. But Pakistan has ruled this out in categorical terms. Foreign Office Spokesman Aziz Ahmed Khan said "no question" of military air strikes in the tribal areas. "Neither US has asked nor we have given any such permission, it is out of question," he said while talking PNS. President General Pervez Musharraf Saturday ruled out any possibility of Al Qaida regrouping in Pakistan believing that alleged terrorist mastermind Osama bin Laden was still in Afghanistan but might be dead already. The Pakistani and WE forces have charged the political situation in the tribal areas particularly in North Waziristan on religious institutions in pursuit of Taliban and Al Qaida members. Though United States has admitted very less casualties during her seven-month war against terrorism since October 7, 2001 but it is estimated that it has suffered around 400 casualties in Afghanistan and many dead bodies of the soldiers are lying on the US combat ships in the Arabian Sea. Afghan sources maintained that on October 20, 2001 during a night commando operation in Kandahar, US had suffered more than 90 casualties. Later, Al Qaida and Taliban have caused more than 50 casualties at Tahktapul, which lies between Kandahar and Spin Boldak. In March this year, during bloodiest battle at Shahi-e-Kot of Paktia Province, the Taliban forces claimed to have destroyed 13 military helicopters and killed 180 US soldiers. End. [Non-text portions of this message have been removed] 5388 From: Paolo Sfriso Date: Thu May 16, 2002 1:57am Subject: Thermal Imaging and TSCM Dear Colleagues. Has anybody had experience with the "Hughes Probeye" for TSCM Thermal Imaging applications ? In your opinion is this piece of equipment suitable for TSCM Thermal Imaging ? Any further comments on this TSCM technique and suitable instrumentation would be greatly appreciated. Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 5389 From: George Shaw Date: Thu May 16, 2002 3:30am Subject: RE: Cell Phone Crypto Penetrated """James Moran, the fraud and security director of the GSM Association in Dublin, says that "nowhere in the world has it been demonstrated --an ability to intercept a call on the GSM network. That's a fact.... To our knowledge there's no hardware capable of intercepting.""" Not true there is hardware available to do this, its costly but exists. The reason they make this statement is to cover the holes in the system and protect share prices. -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: 16 May 2002 06:13 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Cell Phone Crypto Penetrated Cell Phone Crypto Penetrated by Declan McCullagh 10:55 a.m. Dec. 6, 1999 PST Israeli researchers have discovered design flaws that allow the descrambling of supposedly private conversations carried by hundreds of millions of wireless phones. Alex Biryukov and Adi Shamir describe in a paper to be published this week how a PC with 128 MB RAM and large hard drives can penetrate the security of a phone call or data transmission in less than one second. The flawed algorithm appears in digital GSM phones made by companies such as Motorola, Ericsson, and Siemens, and used by well over 100 million customers in Europe and the United States. Recent estimates say there are over 230 million users worldwide who account for 65 percent of the digital wireless market. >>>>>>>>>>CUT>>>>>>>>>>>>> 5390 From: Hawkspirit Date: Thu May 16, 2002 7:41am Subject: Internet Surveillance Patent Watch: AT&T is listening by Eric Schneider Who's listening to your internet phone call? AT&T Corp. has received a patent for the monitoring and surveillance of internet telephone voice calls. The patent was one of 56 issued to New York City area inventors and organizations this week by the U.S. Patent and Trademark Office. 6,389,474 Method and apparatus for accessing a shared channel in a wireless network using a time slot allocation technique based on detecting the usage of the channel during a Assignee: AT&T Corp.|AT&T Wireless Services, Inc. (New York|Redmond, NY |WA) Issue Date: 05/14/2002 Filing Date: 09/04/1998 Class: 709/232 Legal: Kenyon & Kenyon Abstract: A method and an apparatus provide for controlled access to a shared communication medium. Time slots on a forward channel include information regarding status useful for remote units to determine whether a reverse channel is available for seizure. Additionally, information along the forward channel provides guidance to the remote units to control attempts to seize the reverse channel. In one embodiment a remote unit divides a data package into a plurality of portions and attempts to seize the reverse channel using a single portion of the data package which corresponds to one time slot on the reverse channel. It then waits until it receives notification along the forward channel that the first data portion was successfully received before it attempts to send any of the remainder of its data in consecutive time slots on the reverse channel. 5391 From: Matthew Paulsen Date: Thu May 16, 2002 1:41pm Subject: a PDX wifi project For those that are interested. http://www.personaltelco.net/index.cgi/FrontPage http://maps.personaltelco.net/ [Non-text portions of this message have been removed] 5392 From: Fernando Martins Date: Thu May 16, 2002 0:16pm Subject: RE: Internet Surveillance > Who's listening to your internet phone call? Let me see ... the british, the americans, the canadians, the russians, the arabs, the israelits, the brazilians, the spanish, my wife ... Ops, no, not those ones :> FM 5393 From: Bergstrom, Dennis Date: Fri May 17, 2002 4:13am Subject: Intro and question about "Electronic harassment" Hi everybody, My name is Dennis Bergstrom and I live in Stockholm, Sweden. I work as an IT Security Consultant (doing pen-testing of systems, security audits, forensics etc.) and frankly I am not really sure how I ended up on this mailinglist concerning survellance. But I am not complaining, on the contrary, reading the posts have been quite interesting for me. It is not entirely within my own area of specialisation though , but maybe I can contribute to this list if and when surveillance of computersystems questions comes up. That's the intro. Now my question... This may sound stupid to you guys (since my area of knowledge is elsewhere - as stated above! - the question may be basic to you) but I would like to know if someone could explain the phrase "electronic harassment"? Best Regards, Dennis Bergstrom That guy in Sweden. This message contains information that may be privileged or confidential and is the property of the Cap Gemini Ernst & Young Group. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain, copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. 5394 From: alcook309 Date: Fri May 17, 2002 5:49am Subject: Optical and Opto-Electronic Camera Detection After searching fruitfully for information, I have drawn a blank. The information in question is about two devices that can apparantly detect any cameras (from pinhole to standard photographic) or optics (Binos, scopes etc), whether passive or active, thermal or just lens based, up to 300 mtrs away. These are the Myth-300 and Mirage-1200. I have seome tech sheets that give nothing away. Does anyone have information on whether these are genuine surveillance devices that actually work? Or just flights of fancy that remove several hundreds (or thousands) of Dollars from your pocket? Whilst not detecting a thing. I have no manufacturer details yet, just the model names. Appreciate the help. Alan Cook. 5395 From: Aimee Farr Date: Fri May 17, 2002 10:42am Subject: Washington Post: FUROR ALERT http://www.washingtonpost.com/wp-dyn/articles/A30219-2002May16.html?referer= email Bush Aides Seek To Contain Furor Sept. 11 Not Envisioned, Rice Says But Rice said Bush was not told, and U.S. intelligence analysts never envisioned, that terrorists would use jetliners in the type of suicide attacks carried out in New York and Washington on Sept. 11. Rice and other administration officials said that the threat was not specific enough to warrant a public warning, but that the Federal Aviation Administration urged the airlines to be cautious. Shelby called the Phoenix memo "an explosive document" that, when combined with information from the Moussaoui case, amounts to a "botched opportunity" to stop terrorism. "The FBI didn't serve the country well," said Shelby. "They were either asleep or inept." ----- The wording over strategic warnings is probably the most common complaint. I believe this was more of a transmittal of passive information in a briefing to the President (few conclusions, few orders). Technical surprise: the possibility was known, but the way in which it was used and the impact came as a surprise. (Sound familiar?) ....SUUUUURPISE! 1. Not consistent with expectations and assumptions 2. failure of advance warning 3. failure to take countermeasures MORALS? o A tactical indicator is more important than a strategic assumption. The tendency is for analysts/decision-makers to ignore/distort tactical indicators when they conflict with strategic assumptions (preconceptions). o A threat perception of a possible technical surprise is not "speculation" in the usual sense. (Technical people are prone to over-focus on technical surprise speculation.) o In a general warning, people will interpret familiar in terms of most-probable occurrences, which are also usually the least stressful. o The inconvenience factor is a sizable barrier for decision-makers. o Incremental analysis can hurt you, because you become acclimated to the picture too early, and are unable to see the importance of significant developments and indicators. o The biases impacting the prediction of low-probability/high-impact events is affected by the availability/imaginability bias. If it's easy to imagine, we over-rate the possibility. If it's hard to imagine (no recall of precursors, no imagination sensitivity) we tend to under-rate it. o See generally: Pearl Harbor, BARBAROSSA, Chinese intervention in Korean War, Chinese attack on Indian in 1962, Arab attack on Israel 1973....and for some of you -- your business. ---- Our past experiences with surprise attacks carrying HEAVY military indicators -- not encouraging. Due to the nature of terrorists, it's actually encouraging that we picked up any at all. I know it is hard to see this in light of events, the current focus on the mishandling of information, and the state of intelligence. Our causal biases force people to look for "THE REASON" and "THE PATTERN." They work heavily in the favor of people attacking the President, a decision-maker for which there is the highest signal competition. Our orientation is 10X more front-loaded than it was before, and the CYA-fed ambiguity is more conducive to surprise. We're probably experiencing a post-surprise information crash and we can't get out of it. I wish D.C. decision-makers would do something so as to save lives. I just had to rant....you were close, and "surprises" are topical. ~Aimee 5396 From: Aimee Farr Date: Fri May 17, 2002 0:19pm Subject: RE: Washington Post: FUROR ALERT Whew....blowback offlist. I support learning from any errors, but with a future-focus. And, "never trust a man that doesn't bet on his own horses." I'm watching the breaks let off in gridlock. Historically, it's a bad time-window. > o A threat perception of a possible technical surprise is not > "speculation" > in the usual sense. (Technical people are prone to over-focus on technical > surprise speculation.) Addendum: Identify the observables and indicators that go with that. Otherwise, it might not be actionable. It's surprising, but the mistakes here are comical. If that process isn't institutionalized, I wouldn't bet on the results, even if the possibility is brought to the attention of.... everybody. A strong "watcher mentality," begets cry-wolf alert strategies. Speaking of, 9-11 played like a story, offering a sequence of observables, attached to a deep lure. I accept random effects, but view sequences as suspect. ~Aimee 5397 From: Charles P Date: Fri May 17, 2002 10:32am Subject: Re: Optical and Opto-Electronic Camera Detection There is a device that can do what you are describing. Although I'm not sure of the 300 meter claim, it does a good job of pinpointing cctv camera lens locations. see: http://store.yahoo.com/shop-seatech/spyfinder.html List member Gordon Mitchell has one, I'm sure he'll be happy to offer a technical explanation of how it operates. When trying out his unit, we could detect optics at about 60 feet in a well lit room. Perhaps it could go longer in a dark area, but 300 meters seems a bit much. Charles Charles Patterson charles@t... Global Communications Tarrytown, NY www.telephonesecurity.com ----- Original Message ----- From: "alcook309" To: Sent: Friday, May 17, 2002 6:49 AM Subject: [TSCM-L] Optical and Opto-Electronic Camera Detection > After searching fruitfully for information, I have drawn a blank. The > information in question is about two devices that can apparantly > detect any cameras (from pinhole to standard photographic) or optics > (Binos, scopes etc), whether passive or active, thermal or just lens > based, up to 300 mtrs away. > > These are the Myth-300 and Mirage-1200. > I have seome tech sheets that give nothing away. > Does anyone have information on whether these are genuine > surveillance devices that actually work? > Or just flights of fancy that remove several hundreds (or thousands) > of Dollars from your pocket? Whilst not detecting a thing. > > I have no manufacturer details yet, just the model names. > > Appreciate the help. > > Alan Cook. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 5398 From: Date: Fri May 17, 2002 7:29am Subject: RE: Washington Post: FUROR ALERT In a message dated 5/17/2002 9:20:29 AM Pacific Daylight Time, aimee.farr@p... writes: > > I wish D.C. decision-makers would do something so as to save lives. > One problem I see the President had was the fact that a "threat" was forthcoming. That's pretty vague, and we are a HUGE country with open boarders, and free people walking around. I liken his dilemna to our possiblity of an astroid hitting earth. It's due to happen soon, but our world is sphere, with 360 degrees by 360 degrees for something to hit us. Where do you look? How far out do you look?? We have close calls a few times every decade because space is so expansive. The FBI SHOULD have been more aware. The INS SHOULD have been more keen to the people entering the country. But, what can be done without depriving the innocent and free citizens unfettered access within our own boarders. This question will remain for some time. > I just had to rant....you were close, and "surprises" are topical. > I couldn't agree more. Have a good weekend! Robert Pickett Pickett Investigative Agency 503-589-0268 or 866-589-4 A PI (4274) Fax: (561) 431-2621 Member: The PI Group, NCMEC Poster Partner http://www.pickettinvestigativeagency.com We accept PayPal! [Non-text portions of this message have been removed] 5399 From: Hawkspirit Date: Fri May 17, 2002 3:05pm Subject: Sweep Needed Is there a sweeper out there that can sweep a meeting room in Oslo, Norway on or just before Tuesday, May 21, that would be this upcoming week. Roger Tolces Electronic Security, Los Angeles 5400 From: Steve McAlexander Date: Fri May 17, 2002 4:18pm Subject: Oddities of 9/11 Little-known facts of the world's best-known event Petition Petition to the Senate to Investigate Oddities Involving 9/11 Terrorist Attacks We, the undersigned, do hereby petition the Senate of the United States of America to thoroughly investigate the events surrounding the acts of terrorism that transpired in the United States on September 11, 2001 12,079 Total Signatures! (May 16) Advance Warnings of Attack Bush Administration Explanations for Pre-9-11 Warnings Fail the Smell Test Never in the history of scandals involving the United States government has an attempt to conceal criminal conduct by an administration been more transparently dishonest or more easily exposed. On May 15 White House Press Secretary Ari Fleischer -- while making the startling admission that President Bush received CIA and FBI intelligence briefings in August indicating Osama bin Laden might be planning hijackings -- told major news sources including CBS News, ìAll appropriate action was taken based on the threat information we had,î Fleischer said. ìThe president did not -- not -- receive information about the use of airplanes as missiles by suicide bombers.î Every major position taken by an administration in full retreat and on the defensive can be easily deconstructed and shown to be false. For more than seven months FTW has been documenting specific warnings received by the U.S. government from both foreign intelligence services and, in one case, from Russian President Vladimir Putin, indicating commercial airliners were going to be used by terrorists to attack -- among other things -- the World Trade Center in the week of Sept. 9. In order for Fleischerís statement to be credible he would have to assert then that George W. Bush either ignored or was not informed of a direct warning from a head of state and also from the German intelligence service, the BND. Bush Was Warned of Hijacking Plot In the weeks before the Sept. 11 attacks, President [sic] Bush was told by U.S. intelligence that Osama bin Laden's terrorist network might hijack American airplanes, prompting the administration to issue a private warning to federal agencies, the White House acknowledged Wednesday night. But officials said the president and his advisers had no way of knowing that suicide hijackers would use the planes as missiles, as they did against the World Trade Center and the Pentagon. In the absence of the legitimate president, nothing much was done about it... CIA admits foreknowledge of 9/11 On April 11, 2002, CIA Deputy Director James Pavitt delivered an address to the Duke University Law School Conference. This speech was covered by AgenceFrance-Presse (AFP) on Sunday April 28, 10:59 AM in an article titled "Top CIA official warns next terror attack unavoidable." The CIA has released the transcript of Pavitt's speech, which is posted at the CIA web site. In this speech, Pavitt states clearly that the CIA had foreknowledge of the September 11 attacks. Mysterious Premonitions and Enigmatic Early Signs A calendar which was printed in Egypt for the month of September shows a crashing passenger plane with Manhattan and the Statue of Liberty as a backdrop. The calendar was printed in May, a full three months before the Sept. 11 terrorist attacks on America, and has caused an uproar in the Dutch town of Almere, Netherlands. "I am supported by Allah, to die for Allah" is quoted on the September calendar ... Less than an hour before the WTC attacks Donald Rumsfeld told a congressional delegation that a "shocking" event would occur soon. FBI agent warned last July that Middle Easterners training at U.S. flight schools Two months before the suicide hijackings, an FBI agent in Arizona alerted Washington headquarters that several Middle Easterners were training at a U.S. aviation school and recommended contacting other schools nationwide where Arabs might be studying. The FBI's concerns about the U.S. flight schools is the latest revelation about information, much of it sketchy, that the government possessed before Sept. 11 concerning the possibility of terrorism in the skies. AP reported last month that Filipino authorities alerted the FBI as early as 1995 that several Middle Eastern pilots were training at American flight schools and at least one had proposed hijacking a commercial jet and crashing it into federal buildings. A month after the 2001 memo from Arizona to FBI headquarters, FBI agents in Minnesota arrested a French citizen of Moroccan descent, Zacarias Moussaoui, after a flight school instructor became suspicious of his desire to learn to fly a commercial jet. WSWS Series: Was the US government alerted to September 11 attack? Part 1: Warnings in advance Certainly the least likely and least credible explanation of that dayís events is that the vast US national security apparatus was entirely unaware of the activities of the hijackers until the airliners slammed into the World Trade Center and Pentagon. Part 2: Watching the hijackers What has emerged over the past four months, however, is a much different picture of the events of September 11 and the relation of the US military-intelligence complex to them. Not only were there frequent advance warnings, derived both from foreign intelligence services and US investigations into previous terrorist attacks but the US government was itself in possession of considerable information from contemporaneous electronic and physical surveillance of Osama bin Laden and his associates in the Al Qaeda organization. Echelon Gave Authorities Warning Of Attacks Germany's daily Frankfurter Allgemeine Zeitung (FAZ), quoting unnamed German intelligence sources, said that the Echelon spy network was being used to collect information about the terrorist threats, and that U.K. intelligence services apparently also had advance warning. The FAZ, one of Germany's most respected dailies, said that even as far back as six months ago western and near-east press services were receiving information that such attacks were being planned. A White Knight Talking Backwards On August 11 or 12 of 2001, after trying to verbally alert his Canadian jailers to the coming World Trade Center attacks, he ["Mike" Vreeland, an American citizen claiming to be a U.S. Naval Lieutenant assigned to the Office of Naval Intelligence (ONI)] wrote down key information and sealed it in an envelope which he then had placed in jailers' custody. This event is not disputed by Canadian authorities. The letter specifically listed a number of targets including The Sears Towers, The World Trade Center, The White House, The Pentagon, The World Bank, The Canadian parliament building in Ottawa and the Royal Bank in Toronto. A chilling sentence follows the list of targets, "Let one happen. Stop the rest!!!" Anthrax Oddities Government By Anthrax A chronology of events suggests that the motivation was to boost passage of controversial legislation in Congress last October, called the USA Patriot Act. A number of unlikely ìcoincidencesî associated with the anthrax attacks makes it hard to believe that they were random. Anthrax attack bug "identical" to army strain The DNA sequence of the anthrax sent through the US mail in 2001 has been revealed and confirms suspicions that the bacteria originally came from a US military laboratory. The data released uses codenames for the reference strains against which the attack strain was compared. But New Scientist can reveal that the two reference strains that appear identical to the attack strain most likely originated at the US Army Medical Research Institute for Infectious Diseases at Fort Detrick (USAMRIID), Maryland. Patricia Doyle Update - Battelle, Alibek And Anthrax The anthrax letters were intended to bring attention to the need for bioterrorism preparedness, and more funding for bioterrorism projects, vaccines, as well as research. Furthermore, the letters were intended to prepare a public to be sufficiently scared and ready to accept public health laws that would virtually subvert the US Constitution. The anthrax letters were also used to open the purse strings of Congress. Of course, ulterior motives were to aid financially distressed bio/pharmaceutical companies who had taken some hard hits as tech stocks plummited. ... A few weeks after I did the Feb. 26th Rense Show and was in the process of continuing my investigations, making FOIA requests, problems began. My computer was hit with an extremely sophisticated computer virus. I had 4 experts working on the computer and after 4 weeks they finally had to give up and I lost virtually all of my research and documentation. Needles to say this was very upsetting. I had a plethora of very expensive antivirus software protection, but, the boot virus was unable to be overcome. One of the techs told me that the virus was an unidentified virus and he had never seen it before. He also said that it appeared to be one that the Government might have used. We could not even figure out how the computer became infected. Years of my life's work is all gone. This was extremely disheartening, yet, was not the only event to take place. The Enemy Within? The FBI's anthrax investigation turns on itself. This lack of full disclosure may not just be a matter of stonewalling, one former FBI investigator suggested. Rather, FBI investigators may not have the top level security clearances that would allow CIA or Pentagon officials to disclose all they know. The result is an almost comical impasse of mutual distrust and bureaucratic red tape. If the FBI can't investigate the U.S. bio-defense establishment, who can? Why Was Cipro Administered in White House on Sept 11? The first terrorist anthrax case, in Florida, was revealed early October. Why was the specific antibiotic for it administered on Sept 11 to Cheney's staff? Anthrax and the Agency -- Thinking the Unthinkable Now that the Federal Bureau of Investigation (FBI) has officially put the anthrax investigation on a back burner, it is time for Americans to think the unthinkable: that the FBI has never been keen to identify the perpetrator because that perpetrator may, in fact, be the U.S. Government itself. Evidence is mounting that the source of the anthrax was a top secret U.S. Army laboratory in Maryland and that the perpetrators involve high-level officials in the U.S. military and intelligence infrastructure. No Suspects, Few Clues But what they do have is a fear that the person responsible could be one of the very government scientists they have relied on for help, and a concern that the U.S. military is not telling them everything about secret anthrax research programs. Holes in the Official Explanation Why? - An Extraordinary Series Of 911 Questions Wherdy Go? I remember my fatherís words: ìCanít tell if youíre being fooled? You are.î Bush Flubs it Again -- Details and Confirmation of Prior Knowledge If we say the CIA was the terrorist who committed the WTC disaster ≠ very likely ≠ then it is also very likely that the CIA would want Bush to have the 'guilty knowledge' of seeing the first tower hit... via a private TV link prepared by the CIA... Here is the confirmation that President George Bush watched the first plane hit the WTC when no television cameras were trained on the buildings since nothing had happened yet. This is the second time he has stated this clearly and publicly. Footprints in the dust: signs of connections between CIA and WTC attack Anyway, it is beginning to look like events around September 11 may well offer this generation of Americans a repeat performance [of the official explanation of the Kennedy assassination]. Recent discoveries concerning those events bring that same sure but murky sense of the CIA's presence leading up to the attack. Perhaps another operation gone very sour. INTERVIEW WITH Andreas Von Buelow IN GERMAN DAILY, TAGESSPIEGEL Jan. 13 If this Atta was the decisive man in the operation, it's really strange that he took such a risk of taking a plane that would reach Boston such a short time before the connecting flight. Had his flight been a few minutes late, he would not have been in the plane that was hijacked. Why should a sophisticated terrorist do this? ... like assailants who, in their preparations, leave tracks behind them like a herd of stampeding elephants? They made payments with credit cards with their own names; they reported to their flight instructors with their own names. They left behind rented cars with flight manuals in Arabic for jumbo jets. They took with them, on their suicide trip, wills and farewell letters, which fall into the hands of the FBI, because they were stored in the wrong place and wrongly addressed. Clues were left behind like in a child's game of hide-and-seek, which were to be followed! Bush Claims He Saw The First Plane Hit Near the bottom of this official transcript, Bush lies that he saw the first plane on live TV -- or is it a lie? There was no live video coverage of the World Trade Towers at the time the first plane hit because there was no reason for it. Video of the first impact supposedly taken by a bystander did not surface and become available for broadcast until long AFTER the second impact. The only way for Bush to have been telling the truth that he watched the first impact on TV is if he had a closed circuit feed, which of course proves foreknowledge. One more point to keep in mind. After being told that America was under attack by his Chief of Staff, Bush continued to read to the schoolchildren for almost another half hour, a strange reaction indeed for the President of a nation supposedly under attack by a supposedly unknown enemy. Mysterious "Escapes" from the US after 9/11 Phantom Flight From Florida The federal government says the flight never took place. In the end, the son of a Saudi Arabian prince who is the nation's defense minister and the son of a Saudi army commander made it to Kentucky for a waiting 747 and a trip to their homeland. The hastily arranged flight out of Raytheon Airport Services, a private hangar on the outskirts of Tampa International Airport, was anything but ordinary. It lifted off the tarmac at a time when every private plane in the nation was grounded due to safety concerns after the Sept. 11 attacks. Bin Laden Family Escapes US after 9/11 with FBI "Approval" Around two dozen other American-based members of the bin Laden family, most of them here to study in colleges and prep schools, were said to be in the United States at the time of the attacks. The New York Times reported that they were quickly called together by officials from the Saudi Embassy, which feared that they might become the victims of American reprisals. With approval from the F.B.I., according to a Saudi official, the bin Ladens flew by private jet from Los Angeles to Orlando, then on to Washington, and finally to Boston. Once the F.A.A. permitted overseas flights, the jet flew to Europe. United States officials apparently needed little persuasion from the Saudi Ambassador in Washington, Prince Bandar bin Sultan, that the extended bin Laden family included no material witnesses. Bin Laden's relatives made a first-class escape It's like finding out that Lyndon Johnson's daddy and Ho Chi Minh's papa used to go fishing together in the Gulf of Tonkin... The timeline Overview: 9 Unpopular Ideas On 9/11 "Here are nine for the moment relatively unpopular but nevertheless compelling ideas to consider about the attack. Americans who tend to believe in any or all them are in the minority right now. Perhaps they won't be in the near future." Oh Lucy!You Gotta Lotta 'Splainin' To Do A Timeline Surrounding September 11th - If CIA and The Government Weren't Involved In The September 11 Attacks What Were They Doing? Boom, Bust and Echo: A Dark Theory Behind Black Tuesday From the moment it happened we began hearing the name Osama bin Laden and there is an enormous body of evidence building already that Osama bin Laden is not and was not capable of pulling this off by himself. Period. Historically, it is extremely well documented that Osama bin Laden is and was a creation of the Central Intelligence Agency 9-11 Insider Trading Suppressed Details of Criminal Insider Trading Lead Directly into the CIA's Highest Ranks CIA Executive Director "Buzzy" Krongard Managed Firm That Handled "Put" Options On UAL Suspicious trading points to advance knowledge by big investors of 9/11 attacks In the two weeks preceding the September 11 terror attacks on New York and Washington, there was a sudden and unaccountable rush of speculative trades on the US stock and bond markets that indicate some wealthy and well-connected investors had advance knowledge of the impending catastrophe The Planes Da Planes!, Da Planes! - National Security and Interception Procedures From the FAA's website Mother of All Lies About 9/11 This is a story about a little white lie that bred dozens of other little white lies, then hundreds of bigger white lies and so on, to the point where the first little white lie must be credited as the ìMother of All Liesî about events on 11 September 2001. For this was the little white lie that first activated the American psyche, generated mass loathing, and enabled media manipulation of the global population. Without this little white lie there would have been no Arab Hijackers, no Osama Bin Laden directing operations from afar, and no ìWar on Terrorî in Afghanistan and occupied Palestine. Though at the time the little white lie was flagged with a powerful political name, there was and remains no evidence to support the connection. Guilty For 9-11: Bush, Rumsfeld, Myers Introduction and Part 1 On 11 September there were two entire squadrons of combat-ready fighter jets at Andrews Air Force Base, 10 miles from Washington. Their job was to protect the skies over Washington D.C. They failed to do their job. Despite over one hour's advance warning of a terrorist attack in progress, not a single Andrews fighter tried to protect the city. Update to Part 1 The Andrews Air Force Base Website went down after 9-11 and now is back online. Web pages have been removed that made it clear that Andrews had combat-ready fighter jets. This contradicts official claims... Part 2: Mr. Cheney's Cover Story During a Meet The Press interview Dick Cheney created the impression that the military would have needed presidential authorization to scramble fighter jets to intercept American Airlines Flight 77 before it hit the Pentagon Then based on this false foundation, ... Part 3: Bush in the Open Normal air safety and air defense measures were not employed on September 11th... that this stand-down of the air protection systems could not have occurred absent the involvement of top officials -- George Walker Bush, Donald Rumsfeld and General Richard B. Myers. Willie Brown got low-key early warning about air travel For Mayor Willie Brown, the first signs that something was amiss came late Monday when he got a call from what he described as his airport security -- a full eight hours before yesterday's string of terrorist attacks -- advising him that Americans should be cautious about their air travel. Scrambled Messages a Sept. 15 Boston Globe story, which stated: "[T]he command did not immediately scramble any fighters even though it was alerted to a hijacking 10 minutes before the first planeslammed into the first World Trade Center tower... The spokesman said the fighters remained on the ground until after the Pentagon was hit..." U.S. inaction was all the more astonishing because the same story had Snyder admitting that "fighters routinely intercept aircraft." How Did United Flight 93 Crash? "If you were here to see it, you'd have no doubt," Decker said. "It was a jet plane, and it had to be flying real close when that 757 went down. If I was the FBI, I'd find out who was driving that plane." Late Thursday afternoon, federal agents who spoke to reporters at the crash site said "there was no evidence as of yet" that a second plane was nearby when Flight 93 plunged into a strip mine. Operation 911: NO SUICIDE PILOTS There were no "suicide" pilots on those September 11 jets. The jets were controlled by advanced robotics and remote-control technology, not hijackers. Fantastic? Before I explain, read about the history-making robot/remote-controlled jet plane. The Towers World Trade Center Demolition There were always problems with the "Arab hijackers" theory, but since only those ready to die for their cause would deliberately kill themselves by flying planes into the Twin Towers there seemed no alternative. New evidence, however, has emerged, and it now seems that it was entirely an inside job, with no Arabs directly involved (except those who happened to be innocent passengers on the doomed planes). Hard to believe, perhaps (especially because of the constant repetition in the mainstream media, in the weeks following the event, of the term "suicide attack"). Shocking, yes. But if one looks at the evidence, and thinks about it, this is what emerges...New evidence suggests that in fact only one of these Boeings crashed ≠ the one that crashed in Pennsylvania. Wag The WTC The contractor whose people were the first on the WTC collapse scene --to cart away the rubble that remains-- is the same contractor who demolished and hauled away the shell of the bombed Oklahoma City Murrah building. The name of the contractor is Controlled Demolition! Their WTC cleanup contract is worth over $7 Billion. Are you getting the picture? NYC Firefighter Says Bombs Went Off in the WTC We were the first ones in the second tower after the plane struck. I was taking firefighters up in the elevator to the 24th floor to get in position to evacuate workers. On the last trip up a bomb went off. We think there was bombs set in the building. I had just asked another firefighter to stay with me, which was a good thing because we were trapped inside the elevator and he had the tools to get out. An argument for explosive demolition at the South Tower Early reports were that the hot fire was responsible for the collapse, but other observers pointed out that no kerosene fire can burn hot enough to melt steel. In point of fact, most of the fuel in the jets was contained in their wing tanks. The thin aluminum of the tanks was pierced or stripped as the airplanes penetrated the walls of the towers, and the result was the huge fireball which was seen on national TV, where most of this fuel was burned. A hot, vigorous fire would have blown out many windows in the building and would have burned a red or white color. This was not what happened. The fire in the World Trade Center was an ordinary smoldering office fire. But let's suppose that the fire was hot enough to melt steel. What would have happened in that case? Before it breaks, hot steel begins to bend. This redistributes the forces in the structure and puts elastic stress on those parts that are still cool. The process is asymmetric, so that the structure should visibly bend before breaking. Muslims Suspend Laws of Physics! I tried to believe. I watched those quarter mile high buildings fall through their jaw-dropping catastrophes over and over again. I listened to the announcer and the experts explain what had happened. And I worked at my pitiful lack of faith, pounding my skull with the remote control and staring at the flickering images on the TV screen In Curious Battle: An Expert Recants on Why WTC Collapsed on September 14th an interview with Van Romero, the director of research at the New Mexico Institute of Mining and Technology. Van Romero studied the videos of the WTC collapse and concluded that the towers were most likely destroyed by carefully placed demolition charges... We posted the 'Journal' story with a link to its Web address. But if you go to that address now, you will find something has been added. The 'Journal' has placed a rebuttal above the original story. Unless you read almost the entire rebuttal, you won't see the original story. The most striking thing about the rebuttal article is not that Romero changed his analysis. Indeed, Van Romero is barely quoted. Rather, the 'Journal' speaks for him. What we found most striking is the obviously partisan way the article is written, the intensity of the retraction and the atmosphere of panic. One gets the impression that somebody came down very hard on this scientist and perhaps on the 'Journal' as well. The Pentagon Analysis of the Attack of the Pentagon The first and most important task after arriving at the scene of a crime would be to examine the plane wreckage and determine the point of impact, the trajectory, angle and speed of the aircraft at the point of impact. There is only one problem. There is no trace of recognizable wreckage from a Boeing 757! There is no fuselage, no tail section, there are no wheels, engines, wings, luggage or passenger seats, nor are there any bodies to be found. This leads us to our first and foremost question, if a Boeing 757 crashed into the Pentagon as was reported by the media and government officials, where did it go? What evidence is there to support the theory of an airliner careening into the building? Independent Flight 77 - Pentagon Event Investigation It has occurred to me that my theory has taken a turn toward the 'extreme.' This was not intentional. I merely started out to debunk the French site, a seemingly simple task with the data available. I rejected most of the 'radical' theories out-right, but research has compelled me to look at some very disturbing circumstantial evidence. I still hold a more pro-American viewpoint and at the same time realize the extreme nature of the situation I propose requires the most extreme of measures to be taken only in an emergency as grave as war. This is war-time thinking. This is only a theory The Pentagon Crash Pictures It is my guess that the intended target was the fuel tanks for the helicopter pad, but that the jet was fractionally off course. Another theory is going around that the new Naval Intelligence section was the target. It all depends on the level of planning and the cynicism of those that planned it. Without a full investigation, we will never know. Un Boeing 757 s'est-il vraiment ÈcrasÈ sur le Pentagone le 11 septembre 2001? French site with different photos with many 1st hand accounts in English w/links to original sources. Signs of a Cover-up at the Pentagon Yet what can be said of the plane crash at the Pentagon ñ we heard about it soon enough, but very few images were forthcoming on the day, and the bulk of what we saw afterwards were still photos of the collapsed portion of the pentagon and a few pictures of fire-fighters attempting to extinguish the blaze. No sign of any video recordings, very few witness reports and definitely nothing to show us the event as it happened. Criminal Negligence or Treason If it was difficult to believe that the third plane was not spotted, then it is a good deal harder to believe that it was spotted and tracked for over half an hour and yet nothing was done because officials "didn't know what to do." Paul Wolfowitz, the deputy defense secretary, said that the Pentagon had been tracking the fourth plane and could have shot it down if necessary. If they "could have shot" down the fourth plane, why did they not shoot down the third? Once they knew these were suicide hijackings - and surely they knew that by around 9:00 am - why would they wait? War with Afghanistan Planned Before 9-11 US planned war in Afghanistan long before September 11 Insider accounts published in the British, French and Indian media have revealed that US officials threatened war against Afghanistan during the summer of 2001. These reports include the prediction, made in July, that ìif the military action went ahead, it would take place before the snows started falling in Afghanistan, by the middle of October at the latest.î US 'planned attack on Taliban' A former Pakistani diplomat has told the BBC that the US was planning military action against Osama Bin Laden and the Taliban even before last week's attacks. Niaz Naik, a former Pakistani Foreign Secretary, was told by senior American officials in mid-July that military action against Afghanistan would go ahead by the middle of October. BBC Radio Report Why Washington Wants Afghanistan It has also served to obscure a most important question: does Washington have a hidden agenda here, a strategy other than hurling bombs? If so, what is it, and what does it mean for the world? The History US pulls the plug on Muslim websites Reported Monday September 10, 2001 -- Five hundred websites - many of them with an Arab or Muslim connection - crashed last Wednesday when an anti-terrorism taskforce raided InfoCom Corporation in Texas. The 80-strong taskforce that descended upon the IT company included FBI agents, Secret Service agents, Diplomatic Security agents, tax inspectors, immigration officials, customs officials, department of commerce officials and computer experts. Enron Pipedreams Buried in Afghanistan But if the White House, Enron, and Dabhol timelines are combined, curious details appear. On November 6, 2001, a top official in the Bush Administration tells India that a payoff to Enron had risen "to the highest levels of the United States government." Five days earlier, Bush had signed Executive Order 13233, which limits public access to papers of all presidents since 1980--including George W. Bush. Giuliani Invokes Hitler-Rockefeller-Bush Conspiracy to Explain 9/11 Hitler, Saddam and bin Laden have much in common besides being mass murderers. All worked for, were financed by and were armed at the direction of America's top corporate interests, most conspicuously among them corporations and individuals associated with the Rockefeller and Bush families and with the men who created CIA policy. WSWS Series: Was the US government alerted to September 11 attack? Part 3:The United States and Mideast terrorism There are two assumptions here: first, that US agents could not penetrate the terrorist circles; and second, that American agents would have intervened to stop an attack had they learned of it in advance. Both these assumptions are questionable. Why would Osama bin Laden want to kill Dubya, his former business partner? Online Journal's Editor's note: In light of last week's horrific events and the Bush administration's reaction to them, we are reprising the following from the last column Jim Hatfield wrote for Online Journal prior to his tragic death on July 18. An Overview of The War on Terrorism As questions remain over the attacks of September 11, so too must questions be asked about the vested interests behind the US-led push for a war on terrorism. US State Department Sponsors Training of Would-Be Terrorists According to a reliable source, one of the Iranians involved in the bombing of the World Trade Center in New York, took training courses at the Redstone Arsenal's school of explosives. He enrolled in this course under the guise of a Pakistani military officer with Pakistani uniform and credentials. This is important to note because Al Martin Raw has previously reported that many hostile nations have a visible presence at the US Redstone Arsenal. Evidently "terrorists," as well as regular armed forces and intelligence officers, are also being "trained" at the Redstone Arsenal. Laura Flanders: 'Bush Sr., Cheney have big stakes in Saudi status quo' "If bin Laden takes over and becomes king of Saudi Arabia, he'd turn off the tap," Roger Diwan, a managing director of the Petroleum Finance Company, a consulting firm in Washington, told Banerjee. "He said at one point that he wants oil to be $144 a barrel - about six times what it sells for now." And Saudi Arabia, the Times reminds us, is Osama bin Laden's Enemy No. 1: "Mr. bin Laden has long made clear that his ultimate goal, more than wreaking havoc in the West, is toppling the Saud family. And Saudi Arabia would be a crucial target for anyone seeking to cut deeply into the world oil flow." The FBI Agent Alleges FBI Ignored Hamas Activities, Sues An FBI agent in Chicago has accused his superiors of ignoring the pre-Sept. 11 criminal activities of alleged U.S. associates of the Islamic Resistance Movement, the terrorist organization also known as Hamas. The agent also alleged that the bureau steered agents away from filing criminal cases that he believes could have disrupted Hamas's operations in this country. Agent Robert G. Wright Jr. made the accusations last fall in a complaint filed with the Justice Department's inspector general -- an internal watchdog -- and the FBI's Office of Professional Responsibility, the internal affairs unit that investigates the conduct of agents, said sources familiar with the matter. On Thursday, Wright, a 12-year FBI veteran, filed a lawsuit against the bureau in U.S. District Court in Washington. He accused the FBI of violating his First Amendment rights byprohibiting him from making his complaints public. He also has written a 500-page manuscript he wants to publish as a book titled "Fatal Betrayals of the Intelligence Mission." FBI Director Comments on the Hijackers' Sophistication in Covering Trail "The hijackers also left no paper trail. In our investigation, we have not uncovered a single piece of paper - either here in the U.S. or in the treasure trove of information that has turned up in Afghanistan and elsewhere - that mentioned any aspect of the September 11th plot. The hijackers had no computers, no laptops, no storage media of any kind. They used hundreds of different pay phones and cell phones, often with prepaid calling cards that are extremely difficult to trace. And they made sure that all the money sent to them to fund their attacks was wired in small amounts to avoid detection." Scandal Inside the FBI: Did G-Men Miss the Boat on 9/11? [Newsmax, the source of this item, and Judicial Watch are right wing organizations.] Prior to putting off the news conference, Judicial Watch said that "based on the evidence, the FBI Special Agent believes that if certain investigations had been allowed to run their course, Osama bin Ladenís network might have been prevented from committing the September 11, 2001 terrorist attacks which resulted in the deaths of nearly 3,000 innocents.î Mysterious Hole in FBI Investigation of the Terror Pilots Long after the FBIís official chronology asserts that Attaís Hamburg cadre had left Venice, their initial port of entry into American pilot training, the core of the terrorist group was still moving in and out of town, asserts "Mohamed Atta ∓ the Venice Flying Circus," a new documentary investigating the Florida flight schools training terrorist pilots. An eight-minute segment is airing this week at www.theconspiracychannel.com. Though it was said to be the most massive investigation in FBI history, it is a scene the FBI doesnít even know occurred. Even though the restaurant is located barely a block from the terrorists rented home, agents never bothered to question anyone there. Opposition to Investigation and Manufactured Evidence 9/11 Widow Looks for Answers in Court Nearly eight months to the day after the attacks of September 11th, few details have emerged about how hijackers were able to overtake the four aircraft they crashed that day. A Derry, New Hampshire widow is trying to use the courts to get answers, but she is finding her search frustrated by a series of stumbling blocks. ... From the audio: "for some reason we're being blocked". United's lawyers have asked the judge that even the requests for evidence be kept secret! "They're scared of something, let's have the truth." ... Also see NH widow of 9-11 victim sues United over crash Inquiry of Intelligence Failures Hits Obstacles Lawmakers leading the investigation of intelligence agencies' failures surrounding the Sept. 11 terrorist attacks are increasingly concerned that tactics by the CIA and the Justice Department are actively impeding their efforts, congressional sources said Friday. Members of the Senate and House intelligence committees are so frustrated with the tactics, sources said, that they intend to complain directly to CIA Director George J. Tenet and Atty. Gen. John Ashcroft. Head of Congressional Probe Into Sept. 11 Quits The head of a joint congressional investigation into why U.S. intelligence agencies failed to detect the plot that led to the Sept. 11 attacks on America has resigned. Britt Snider, a retired CIA inspector general, was hired in February to conduct the review for the Senate and House intelligence committees. Some members of the panels had objected to his selection, saying Snider was too closely tied to the spy agency and CIA Director George Tenet to conduct an impartial review. Mohamed Atta's E-Mail List Mohamed Atta sent polemical emails, including one containing a gruesome photo of a dead Palestinian child, to a regular email list of some 40 individuals, all of whom became the focus of intense scrutiny from the FBI after the listís existence became known last September, the MadCow Morning News has learned. Alarmingly, the email addresses of several of the names on Attaís ëterrorist e-listí appear to have been, or still are, employees of US defense contractors. What Muslim would write: 'The time of fun and waste is gone'? Fearful, chilling, grotesque - but also very, very odd. If the handwritten, five-page document which the FBI says it found in the baggage of Mohamed Atta, the suicide bomber from Egypt, is genuine, then the men who murdered more than 7,000 innocent people believed in a very exclusive version of Islam - or were surprisingly unfamiliar with their religion. Uncle Sam's lucky finds Of course you could interpret these discoveries differently. You could detect in them the clear hand of American propaganda. This isn't, of course, to claim a dirty tricks department somewhere in the heart of Washington. That would have you immediately accused of peddling conspiracy theories, though I'm coming to think that conspiracy theories have had a bad press. What are they, after all, but "joined-up government" by another name? Flight School Owner Changes Story Again While the media spotlight was on the mis-cues at the perennially "troubled" INS, the real news this week was that Rudi Dekkers was telling reporters a significantly different version of his relationship with terrorist ringleader Mohamed Atta than he gave in the wake of the September 11 disaster. Several key details in Dekker's public account of Mohamed Atta's stay in this country changed, even as, claiming to feel "vindicated," Dekkers tried to use the INS snafu to his public relations advantage. What no one has noted till now is that this is the third mutually-contradictory account Dekkers has given so far on the simple question of how much the two paid for their flight lessons. WTC Probe Ills Bared About 80% of the structural steel from the World Trade Center was scrapped without being examined by even one fire expert, mostly because investigators did not have the authority to preserve the wreckage as evidence, the experts said. "The lack of significant amounts of steel for examination will make it difficult, if not impossible, to make a definitive statement as to the specific cause and chronology of the collapse," Good Morning America interviews Julie Sirrs, former DIA analyst All I know is what people at DIA told me that the State Department also had a large role in wanting very harsh measures to be taken against me to get me kicked out of DIA, basically. And that, to this day, I'm honestly not sure exactly why other than regional sensitivities, particularly with Pakistan, as we saw even pre--after September 11th, not wanting us to be involved there. The truth is out there ... right? "The right wing benefited so much from September 11 that, if I were still a conspiratorialist, I would believe they'd done it." -- Norman Mailer [To anyone who makes a blanket dismissal of "conspiracy theories" -- remind them that the official Bush party line is itself a massive conspiracy theory: a worldwide network of religious fanatics, led and trained by a billionaire's son who lives in caves, protected by a feudal government in one of the most backwards places on earth, funded to the tens of millions of dollars by a worldwide network of crime and covert transactions, leading to suicide hijackings and bombings.] WSWS Series: Was the US government alerted to September 11 attack? Part4: The refusal to investigate More than four months after the largest single act of mass murder ever to take place on US soil, there have been no congressional hearings, no investigating commission has been announced, and calls for such a panel have been largely ignored. Even internal FBI investigations have been shelved. This inaction is extraordinary and has no legitimate political explanation. It stinks of political cover-up. The strange case of Zacarias Moussaoui: FBI refused to investigate man charged in September 11 attacks The case of Zacarias Moussaoui raises many questions about the conduct of the FBI and other US intelligence agencies in the period leading up the September11. It is the clearest example of the almost inexplicable refusal on the part of these agencies to take any action that could have prevented the bloodiest terrorist attack in American history. "Has Someone Been Sitting On The FBI?" Osama went to Afghanistan not as some lone fanatic, but rather as the representative of Saudi royalty, because his billionaire family is part of the ruling class of Saudi Arabia. US agents told: Back off bin Ladens US special agents were told to back off the bin Laden family and the Saudi royals soon after George Bush became president [sic], although that has all changed since September 11, it was reported today. And the BBC2's Newsnight program also said the younger George Bush made his first million 20 years ago with an oil company partly funded by the chief US representative of Salem bin Laden, Osama's brother, who took over as head of the family after his father Mohammed's death in a plane crash in 1968. The So-Called Evidence Is a Farce Goff cites two premises that should not, that must not, be accepted at this hour without more convincing proof: "One, there is the premise that what this de facto administration is doing now is a 'response' to September 11th. Two, there is the premise that this attack on the World Trade Center and the Pentagon was done by people based in Afghanistan. In my opinion, neither of these is sound." Seven of the WTC Hijackers found alive! Some of the men the FBI claims hijacked planes on Sept. 11 and crashed them into the World Trade Center in New York, the Pentagon, and Stony Creek Township, Pennsylvania are still alive. No they weren't pulled from the rubble, they were never on the planes. The Strange Death ofJohn O'Neill, The Counter-Terrorist http://www.rememberjohn.com/ Had he survived, the events since then would have unfolded quite differently...and a President would be embroiled in a scandal like the country has never seen! John O'Neill was an F.B.I. agent with an obsession: the growing threat of Al Qaeda. The legend of John P. O'Neill, who lost his life at the World Trade Center on September 11th, begins with a story by Richard A. Clarke, the national coordinator for counter-terrorism in the White House from the first Bush Administration until last year. On a Sunday morning in February, 1995, Clarke went to his office to review intelligence cables that had come in over the weekend. One of the cables reported that Ramzi Yousef, the suspected mastermind behind the first World Trade Center bombing, two years earlier, had been spotted in Pakistan. Clarke immediately called the F.B.I. A man whose voice was unfamiliar to him answered the phone. "O'Neill," he growled. "Who are you?" Clarke said. "I'm John O'Neill," the man replied. "Who the hell are you?" O'Neill had just been appointed chief of the F.B.I.'s counter-terrorism section, in Washington. Foreign Media Can Ask the Questions the US Media Can't VisionTV Insight Mediafile with Barrie Zwicker: "The Great Deception" Transcript: Part 1 (Broadcast Date: Mon Jan 21) In the almost two hours of the total drama not a single U.S. Air Force interceptor turns a wheel until itís too late. Why? Was it total incompetence on the part of aircrews trained and equipped to scramble in minutes? Transcript: Part 2 (Broadcast Date: Mon Jan 28) The day the chartered Learjet carrying golfer Payne Stewart crashes, killing all on board, the air traffic controller calls in the military. Itís standard procedure, followed routinely, to call in the Air Force when radio contact with a commercial passenger jet is lost, or the plane departs from its flight path, or anything along those lines occurs. 9:54 ñ 16 minutes later -- the F-16 reaches the Learjet at 46,000 feet and conducts a visual inspection. Total elapsed time: 21 minutes. Transcript: Part 3 (Broadcast Date: Mon Feb 4) bin Laden is merely a piece in a chess game. The stakes of the game are the last of the worldís oil reserves and ì the Bush administrationís(consolidation of power) to pursue a drastic unlimited militarization of foreign policy on a massive and unprecedented scale required by long-standing elite planning, while crushing domestic dissent and criminalizing legitimate protest.î Transcript: Part 4 (Broadcast Date: Mon Feb 11) The psychological trick at the heart of September 11th, by the way, is that people confuse their compassion for the victims with their certainty about who the perpetrators are. The public was presented with instant perpetrators. The trick will most likely continue working for all future planned invasions ñ looks as if Iraq is next ñ so long as the public remains blindfolded by the media. Transcript: Part 5 (Broadcast Date: Mon Feb 18) Wait a minute! The president tells us he saw the incredible image of the first plane going in. [which video wasn't found and broadcast until much later] He went ahead with an easily-cancelable appointment. Why? He tells us he knew his country was under attack, yet he continued to listen to a student talk about her pet goat, and such, for another 25 minutes. Why? Transcript: Part 6 (Broadcast Date: Mon Feb 25) The less people ask themselves questions about deceit the more it clears the way for organizations such as the CIA to continue to receive seemingly unending billions of dollars. Taxpayer money used to train terrorists, as the CIA acknowledges it has. To destabilize governments, as former CIA agent John Stockwell writes in his book In Search of Enemies. And to inject toxic grey, white and black disinformation into the worldís information systems, as William Blum spells out in Killing Hope. All with barely a whisper of dissent. General 9-11 Sites and Articles The Case For Bush Administration Advance Knowledge Of 9/11 Attacks A dispassionate examination of existing reliable, open-source evidence on advance warnings of the Sept. 11 attacks provides strong and sustainable grounds to conclude the Bush Administration was in possession of sufficient advance intelligence to have prevented the attacks, had it wished to do so. With a known intelligence budget of approximately $30 billion, it must be assumed there are classified files that only add to the weight of the available data presented here. Online Journalô Part 1 of a four-part series -- September 11: The circumstantial case It is precisely for reasons of patriotism that these avenues need to be pursued. If they are true, they represent a clear and present danger to the United States from within our borders and from the very people we entrust to protect us. A failure to listen to facts and conclusions that are unpleasant or disturbing will not help us, rather it will only play into the hands of those who want to make us less free. Facts for 911-Beginners At least 100 Webpages are working 24/7 on collecting details, which can prove that there have been at least 10, 15 early warnings about an attack on America, which was ignored by CIA and Pentagon. It's also obvious, that prior knowledge was ignored to get an official reason to start a war against the Taliban and "war against terrorism". Therefore since January 2002 a petition is collecting signatures to start a public investigation to investigate the 911-oddities. This petition is already known at the US Congress who decided to start a investigation with the help of a former CIA inspector. But this hasn't been made public enough yet and it will probably not be a public one. Momentum growing for inquiry into "oddities" of September 11 In January 2000, Bob Gipson of El Dorado County, California, wrote his congressman expressing his fear that the U.S. government would orchestrate a terrorist attack on "certain" U.S. cities and blame the attacks on "Islamic terrorists." Gipson told Rep. John T. Doolittle (R-Ca) he thought the "operation" would be a platform for declaring martial law in the U.S. When the World Trade Center and Pentagon attacks occurred on September 11, 2001, Gipson had a sickening feeling this was the event he feared. ... A congressional investigation cannot come soon enough for Bob Gipson. Now, he has renewed dread that his government is planning another attack on U.S. citizens, this time leaving Saddam Hussein's fingerprints as a pretext to garner public support to attack Iraqi citizens. ìIt was a pretty cheap price to pay for unifying the countryî Anyone wondering how American military and intelligence officers could have looked the other way in the months leading up to the massacre of some 3,200 people in three states can ponder the words of Lt. Commander Joseph J. Rochefort. Referring to the deaths of more than 3,000 American military personnel whom he helped betray one sunny Sunday morning after using code-broken communications intercepts to track Japanese carriers to the island of Oahu, Rochefort remarked to a naval historian: ìIt was a pretty cheap price to pay for unifying the country.î Back to Index Revised: 16 May 2002 http://falloutshelternews.com Copyright © 2002 by Fallout Shelter News All rights reserved 5401 From: James M. Atkinson Date: Fri May 17, 2002 3:57pm Subject: Re: Sweep Needed I can cover it on Tuesday. Airline fare looks like about $6,200 USD, $2,600 for equipment shipping, $1,800 for per diem (four days), $3,500 for travel time, and $20,000 for the actual sweep (not to exceed 2 days of sweep time). Plus a detailed written report sent to the client once I return the to US ($3,000). Total due would be $37,100 USD, payable in advance (preferably by wire). I will be bringing only a limited amount of equipment (about 800 pounds in six transit cases), and as such would have to handle it as a lower threat sweep. I will need the client to have the security detail meet me at the cargo facility at the airport with a low profile panel truck or cube van so we can get the equipment from my freight container/pallet thorough customs, and then to the initial staging area at the hotel. -jma At 1:05 PM -0700 5/17/02, Hawkspirit wrote: >Is there a sweeper out there that can sweep a meeting room in Oslo, Norway >on or just before Tuesday, May 21, that would be this upcoming week. > >Roger Tolces >Electronic Security, Los Angeles -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5402 From: James M. Atkinson Date: Fri May 17, 2002 5:27pm Subject: Re: Oddities of 9/11 Little-known facts of the world's best-known event No offense, but please try to keep postings relevant to TSCM. -jma At 4:18 PM -0500 5/17/02, Steve McAlexander wrote: >Petition >Petition to the Senate to Investigate Oddities Involving 9/11 Terrorist >Attacks >We, the undersigned, do hereby petition the Senate of the United States >of America to thoroughly investigate the events surrounding the acts of >terrorism that transpired in the United States on September 11, 2001 >12,079 Total Signatures! (May 16) > > > > >Advance Warnings of Attack >Bush Administration Explanations for Pre-9-11 Warnings Fail the Smell >Test >Never in the history of scandals involving the United States government >has an attempt to conceal criminal conduct by an administration been >more transparently dishonest or more easily exposed. On May 15 White >House Press Secretary Ari Fleischer -- while making the startling >admission that President Bush received CIA and FBI intelligence >briefings in August indicating Osama bin Laden might be planning >hijackings -- told major news sources including CBS News, ìAll >appropriate action was taken based on the threat information we had,î >Fleischer said. ìThe president did not -- not -- receive information >about the use of airplanes as missiles by suicide bombers.î Every major >position taken by an administration in full retreat and on the defensive >can be easily deconstructed and shown to be false. For more than seven >months FTW has been documenting specific warnings received by the U.S. >government from both foreign intelligence services and, in one case, >from Russian President Vladimir Putin, indicating commercial airliners >were going to be used by terrorists to attack -- among other things -- >the World Trade Center in the week of Sept. 9. In order for Fleischerís >statement to be credible he would have to assert then that George W. >Bush either ignored or was not informed of a direct warning from a head >of state and also from the German intelligence service, the BND. > >Bush Was Warned of Hijacking Plot >In the weeks before the Sept. 11 attacks, President [sic] Bush was told >by U.S. intelligence that Osama bin Laden's terrorist network might >hijack American airplanes, prompting the administration to issue a >private warning to federal agencies, the White House acknowledged >Wednesday night. But officials said the president and his advisers had >no way of knowing that suicide hijackers would use the planes as >missiles, as they did against the World Trade Center and the Pentagon. >In the absence of the legitimate president, nothing much was done about >it... > >CIA admits foreknowledge of 9/11 >On April 11, 2002, CIA Deputy Director James Pavitt delivered an address >to the Duke University Law School Conference. This speech was covered by >AgenceFrance-Presse (AFP) on Sunday April 28, 10:59 AM in an article >titled "Top CIA official warns next terror attack unavoidable." The CIA >has released the transcript of Pavitt's speech, which is posted at the >CIA web site. In this speech, Pavitt states clearly that the CIA had >foreknowledge of the September 11 attacks. > >Mysterious Premonitions and Enigmatic Early Signs > A calendar which was printed in Egypt for the month of September shows >a crashing passenger plane with Manhattan and the Statue of Liberty as >a backdrop. The calendar was printed in May, a full three months >before the Sept. 11 terrorist attacks on America, and has caused an >uproar in the Dutch town of Almere, Netherlands. "I am supported by >Allah, to die for Allah" is quoted on the September calendar >... Less than an hour before the WTC attacks Donald Rumsfeld told a >congressional delegation that a "shocking" event would occur soon. > >FBI agent warned last July that Middle Easterners training at U.S. >flight schools >Two months before the suicide hijackings, an FBI agent in Arizona >alerted Washington headquarters that several Middle Easterners were >training at a U.S. aviation school and recommended contacting other >schools nationwide where Arabs might be studying. The FBI's concerns >about the U.S. flight schools is the latest revelation about >information, much of it sketchy, that the government possessed before >Sept. 11 concerning the possibility of terrorism in the skies. AP >reported last month that Filipino authorities alerted the FBI as early >as 1995 that several Middle Eastern pilots were training at American >flight schools and at least one had proposed hijacking a commercial jet >and crashing it into federal buildings. A month after the 2001 memo >from Arizona to FBI headquarters, FBI agents in Minnesota arrested a >French citizen of Moroccan descent, Zacarias Moussaoui, after a flight >school instructor became suspicious of his desire to learn to fly a >commercial jet. > >WSWS Series: Was the US government alerted to September 11 attack? >Part 1: Warnings in advance Certainly the least likely and least >credible explanation of that dayís events is that the vast US national >security apparatus was entirely unaware of the activities of the >hijackers until the airliners slammed into the World Trade Center and >Pentagon. Part 2: Watching the hijackers What has emerged over the past >four months, however, is a much different picture of the events of >September 11 and the relation of the US military-intelligence complex to >them. Not only were there frequent advance warnings, derived both from >foreign intelligence services and US investigations into previous >terrorist attacks but the US government was itself in possession of >considerable information from contemporaneous electronic and physical >surveillance of Osama bin Laden and his associates in the Al Qaeda >organization. > >Echelon Gave Authorities Warning Of Attacks > Germany's daily Frankfurter Allgemeine Zeitung (FAZ), quoting unnamed >German intelligence sources, said that the Echelon spy network was being >used to collect information about the terrorist threats, and that U.K. >intelligence services apparently also had advance warning. The FAZ, one >of Germany's most respected dailies, said that even as far back as six >months ago western and near-east press services were receiving >information that such attacks were being planned. > >A White Knight Talking Backwards >On August 11 or 12 of 2001, after trying to verbally alert his Canadian >jailers to the coming World Trade Center attacks, he ["Mike" Vreeland, >an American citizen claiming to be a U.S. Naval Lieutenant assigned to >the Office of Naval Intelligence (ONI)] wrote down key information and >sealed it in an envelope which he then had placed in jailers' custody. >This event is not disputed by Canadian authorities. The letter >specifically listed a number of targets including The Sears Towers, The >World Trade Center, The White House, The Pentagon, The World Bank, The >Canadian parliament building in Ottawa and the Royal Bank in Toronto. A >chilling sentence follows the list of targets, "Let one happen. Stop the >rest!!!" > > > >Anthrax Oddities >Government By Anthrax > A chronology of events suggests that the motivation was to boost >passage of controversial legislation in Congress last October, called >the USA Patriot Act. A number of unlikely ìcoincidencesî associated with >the anthrax attacks makes it hard to believe that they were random. > >Anthrax attack bug "identical" to army strain > The DNA sequence of the anthrax sent through the US mail in 2001 has >been revealed and confirms suspicions that the bacteria originally came >from a US military laboratory. The data released uses codenames for the >reference strains against which the attack strain was compared. But New >Scientist can reveal that the two reference strains that appear >identical to the attack strain most likely originated at the US Army >Medical Research Institute for Infectious Diseases at Fort Detrick >(USAMRIID), Maryland. > >Patricia Doyle Update - Battelle, Alibek And Anthrax >The anthrax letters were intended to bring attention to the need for >bioterrorism preparedness, and more funding for bioterrorism projects, >vaccines, as well as research. Furthermore, the letters were intended to >prepare a public to be sufficiently scared and ready to accept public >health laws that would virtually subvert the US Constitution. The >anthrax letters were also used to open the purse strings of Congress. Of >course, ulterior motives were to aid financially distressed >bio/pharmaceutical companies who had taken some hard hits as tech stocks >plummited. ... A few weeks after I did the Feb. 26th Rense Show and was >in the process of continuing my investigations, making FOIA requests, >problems began. My computer was hit with an extremely sophisticated >computer virus. I had 4 experts working on the computer and after 4 >weeks they finally had to give up and I lost virtually all of my >research and documentation. Needles to say this was very upsetting. I >had a plethora of very expensive antivirus software protection, but, the >boot virus was unable to be overcome. One of the techs told me that the >virus was an unidentified virus and he had never seen it before. He also >said that it appeared to be one that the Government might have used. We >could not even figure out how the computer became infected. Years of my >life's work is all gone. This was extremely disheartening, yet, was not >the only event to take place. > >The Enemy Within? The FBI's anthrax investigation turns on itself. >This lack of full disclosure may not just be a matter of stonewalling, >one former FBI investigator suggested. Rather, FBI investigators may not >have the top level security clearances that would allow CIA or Pentagon >officials to disclose all they know. The result is an almost comical >impasse of mutual distrust and bureaucratic red tape. If the FBI can't >investigate the U.S. bio-defense establishment, who can? > >Why Was Cipro Administered in White House on Sept 11? >The first terrorist anthrax case, in Florida, was revealed early >October. Why was the specific antibiotic for it administered on Sept 11 >to Cheney's staff? > >Anthrax and the Agency -- Thinking the Unthinkable >Now that the Federal Bureau of Investigation (FBI) has officially put >the anthrax investigation on a back burner, it is time for Americans to >think the unthinkable: that the FBI has never been keen to identify the >perpetrator because that perpetrator may, in fact, be the U.S. >Government itself. Evidence is mounting that the source of the anthrax >was a top secret U.S. Army laboratory in Maryland and that the >perpetrators involve high-level officials in the U.S. military and >intelligence infrastructure. >No Suspects, Few Clues > But what they do have is a fear that the person responsible could be >one of the very government scientists they have relied on for help, and >a concern that the U.S. military is not telling them everything about >secret anthrax research programs. > > > > > >Holes in the Official Explanation >Why? - An Extraordinary Series Of 911 Questions > >Wherdy Go? >I remember my fatherís words: ìCanít tell if youíre being fooled? You >are.î >Bush Flubs it Again -- Details and Confirmation of Prior Knowledge >If we say the CIA was the terrorist who committed the WTC disaster ≠ >very likely ≠ then it is also very likely that the CIA would want Bush >to have the 'guilty knowledge' of seeing the first tower hit... via a >private TV link prepared by the CIA... Here is the confirmation that >President George Bush watched the first plane hit the WTC when no >television cameras were trained on the buildings since nothing had >happened yet. This is the second time he has stated this clearly and >publicly. > >Footprints in the dust: signs of connections between CIA and WTC attack >Anyway, it is beginning to look like events around September 11 may well >offer this generation of Americans a repeat performance [of the official >explanation of the Kennedy assassination]. Recent discoveries concerning >those events bring that same sure but murky sense of the CIA's presence >leading up to the attack. Perhaps another operation gone very sour. > >INTERVIEW WITH Andreas Von Buelow IN GERMAN DAILY, TAGESSPIEGEL Jan. 13 >If this Atta was the decisive man in the operation, it's really strange >that he took such a risk of taking a plane that would reach Boston such >a short time before the connecting flight. Had his flight been a few >minutes late, he would not have been in the plane that was hijacked. Why >should a sophisticated terrorist do this? ... like assailants who, in >their preparations, leave tracks behind them like a herd of stampeding >elephants? They made payments with credit cards with their own names; >they reported to their flight instructors with their own names. They >left behind rented cars with flight manuals in Arabic for jumbo jets. >They took with them, on their suicide trip, wills and farewell letters, >which fall into the hands of the FBI, because they were stored in the >wrong place and wrongly addressed. Clues were left behind like in a >child's game of hide-and-seek, which were to be followed! > >Bush Claims He Saw The First Plane Hit >Near the bottom of this official transcript, Bush lies that he saw the >first plane on live TV -- or is it a lie? There was no live video >coverage of the World Trade Towers at the time the first plane hit >because there was no reason for it. Video of the first impact supposedly >taken by a bystander did not surface and become available for broadcast >until long AFTER the second impact. The only way for Bush to have been >telling the truth that he watched the first impact on TV is if he had a >closed circuit feed, which of course proves foreknowledge. One more >point to keep in mind. After being told that America was under attack by >his Chief of Staff, Bush continued to read to the schoolchildren for >almost another half hour, a strange reaction indeed for the President of >a nation supposedly under attack by a supposedly unknown enemy. > > > > > >Mysterious "Escapes" from the US after 9/11 >Phantom Flight From Florida >The federal government says the flight never took place. In the end, the >son of a Saudi Arabian prince who is the nation's defense minister and >the son of a Saudi army commander made it to Kentucky for a waiting 747 >and a trip to their homeland. The hastily arranged flight out of >Raytheon Airport Services, a private hangar on the outskirts of Tampa >International Airport, was anything but ordinary. It lifted off the >tarmac at a time when every private plane in the nation was grounded due >to safety concerns after the Sept. 11 attacks. >Bin Laden Family Escapes US after 9/11 with FBI "Approval" >Around two dozen other American-based members of the bin Laden family, >most of them here to study in colleges and prep schools, were said to be >in the United States at the time of the attacks. The New York Times >reported that they were quickly called together by officials from the >Saudi Embassy, which feared that they might become the victims of >American reprisals. With approval from the F.B.I., according to a Saudi >official, the bin Ladens flew by private jet from Los Angeles to >Orlando, then on to Washington, and finally to Boston. Once the F.A.A. >permitted overseas flights, the jet flew to Europe. United States >officials apparently needed little persuasion from the Saudi Ambassador >in Washington, Prince Bandar bin Sultan, that the extended bin Laden >family included no material witnesses. > >Bin Laden's relatives made a first-class escape >It's like finding out that Lyndon Johnson's daddy and Ho Chi Minh's papa >used to go fishing together in the Gulf of Tonkin... > > > >The timeline >Overview: 9 Unpopular Ideas On 9/11 >"Here are nine for the moment relatively unpopular but nevertheless >compelling ideas to consider about the attack. Americans who tend to >believe in any or all them are in the minority right now. Perhaps they >won't be in the near future." >Oh Lucy!You Gotta Lotta 'Splainin' To Do >A Timeline Surrounding September 11th - If CIA and The Government >Weren't Involved In The September 11 Attacks What Were They Doing? > >Boom, Bust and Echo: A Dark Theory Behind Black Tuesday > >From the moment it happened we began hearing the name Osama bin Laden >and there is an enormous body of evidence building already that Osama >bin Laden is not and was not capable of pulling this off by himself. >Period. Historically, it is extremely well documented that Osama bin >Laden is and was a creation of the Central Intelligence Agency > > > > > >9-11 Insider Trading >Suppressed Details of Criminal Insider Trading Lead Directly into the >CIA's Highest Ranks >CIA Executive Director "Buzzy" Krongard Managed Firm That Handled "Put" >Options On UAL >Suspicious trading points to advance knowledge by big investors of 9/11 >attacks >In the two weeks preceding the September 11 terror attacks on New York >and Washington, there was a sudden and unaccountable rush of speculative >trades on the US stock and bond markets that indicate some wealthy and >well-connected investors had advance knowledge of the impending >catastrophe > > > > > >The Planes >Da Planes!, Da Planes! - National Security and Interception Procedures >>From the FAA's website > >Mother of All Lies About 9/11 > >This is a story about a little white lie that bred dozens of other >little white lies, then hundreds of bigger white lies and so on, to the >point where the first little white lie must be credited as the ìMother >of All Liesî about events on 11 September 2001. For this was the little >white lie that first activated the American psyche, generated mass >loathing, and enabled media manipulation of the global population. >Without this little white lie there would have been no Arab Hijackers, >no Osama Bin Laden directing operations from afar, and no ìWar on >Terrorî in Afghanistan and occupied Palestine. Though at the time the >little white lie was flagged with a powerful political name, there was >and remains no evidence to support the connection. >Guilty For 9-11: Bush, Rumsfeld, Myers > >Introduction and Part 1 On 11 September there were two entire squadrons >of combat-ready fighter jets at Andrews Air Force Base, 10 miles from >Washington. Their job was to protect the skies over Washington D.C. They >failed to do their job. Despite over one hour's advance warning of a >terrorist attack in progress, not a single Andrews fighter tried to >protect the city. Update to Part 1 The Andrews Air Force Base Website >went down after 9-11 and now is back online. Web pages have been removed >that made it clear that Andrews had combat-ready fighter jets. This >contradicts official claims... Part 2: Mr. Cheney's Cover Story During a >Meet The Press interview Dick Cheney created the impression that the >military would have needed presidential authorization to scramble >fighter jets to intercept American Airlines Flight 77 before it hit the >Pentagon Then based on this false foundation, ... Part 3: Bush in the >Open Normal air safety and air defense measures were not employed on >September 11th... that this stand-down of the air protection systems >could not have occurred absent the involvement of top officials -- >George Walker Bush, Donald Rumsfeld and General Richard B. Myers. > >Willie Brown got low-key early warning about air travel >For Mayor Willie Brown, the first signs that something was amiss came >late Monday when he got a call from what he described as his airport >security -- a full eight hours before yesterday's string of terrorist >attacks -- advising him that Americans should be cautious about their >air travel. > >Scrambled Messages >a Sept. 15 Boston Globe story, which stated: "[T]he command did not >immediately scramble any fighters even though it was alerted to a >hijacking 10 minutes before the first planeslammed into the first World >Trade Center tower... The spokesman said the fighters remained on the >ground until after the Pentagon was hit..." U.S. inaction was all the >more astonishing because the same story had Snyder admitting that >"fighters routinely intercept aircraft." > >How Did United Flight 93 Crash? >"If you were here to see it, you'd have no doubt," Decker said. "It was >a jet plane, and it had to be flying real close when that 757 went down. >If I was the FBI, I'd find out who was driving that plane." Late >Thursday afternoon, federal agents who spoke to reporters at the crash >site said "there was no evidence as of yet" that a second plane was >nearby when Flight 93 plunged into a strip mine. > >Operation 911: NO SUICIDE PILOTS >There were no "suicide" pilots on those September 11 jets. The jets were >controlled by advanced robotics and remote-control technology, not >hijackers. Fantastic? Before I explain, read about the history-making >robot/remote-controlled jet plane. > > > > > >The Towers >World Trade Center Demolition >There were always problems with the "Arab hijackers" theory, but since >only those ready to die for their cause would deliberately kill >themselves by flying planes into the Twin Towers there seemed no >alternative. New evidence, however, has emerged, and it now seems that >it was entirely an inside job, with no Arabs directly involved (except >those who happened to be innocent passengers on the doomed planes). Hard >to believe, perhaps (especially because of the constant repetition in >the mainstream media, in the weeks following the event, of the term >"suicide attack"). Shocking, yes. But if one looks at the evidence, and >thinks about it, this is what emerges...New evidence suggests that in >fact only one of these Boeings crashed ≠ the one that crashed in >Pennsylvania. > >Wag The WTC >The contractor whose people were the first on the WTC collapse scene >--to cart away the rubble that remains-- is the same contractor who >demolished and hauled away the shell of the bombed Oklahoma City Murrah >building. The name of the contractor is Controlled Demolition! Their WTC >cleanup contract is worth over $7 Billion. Are you getting the picture? > >NYC Firefighter Says Bombs Went Off in the WTC >We were the first ones in the second tower after the plane struck. I was >taking firefighters up in the elevator to the 24th floor to get in >position to evacuate workers. On the last trip up a bomb went off. We >think there was bombs set in the building. I had just asked another >firefighter to stay with me, which was a good thing because we were >trapped inside the elevator and he had the tools to get out. > > >An argument for explosive demolition at the South Tower >Early reports were that the hot fire was responsible for the collapse, >but other observers pointed out that no kerosene fire can burn hot >enough to melt steel. In point of fact, most of the fuel in the jets was >contained in their wing tanks. The thin aluminum of the tanks was >pierced or stripped as the airplanes penetrated the walls of the towers, >and the result was the huge fireball which was seen on national TV, >where most of this fuel was burned. A hot, vigorous fire would have >blown out many windows in the building and would have burned a red or >white color. This was not what happened. The fire in the World Trade >Center was an ordinary smoldering office fire. But let's suppose that >the fire was hot enough to melt steel. What would have happened in that >case? Before it breaks, hot steel begins to bend. This redistributes the >forces in the structure and puts elastic stress on those parts that are >still cool. The process is asymmetric, so that the structure should >visibly bend before breaking. > >Muslims Suspend Laws of Physics! >I tried to believe. I watched those quarter mile high buildings fall >through their jaw-dropping catastrophes over and over again. I listened >to the announcer and the experts explain what had happened. And I worked >at my pitiful lack of faith, pounding my skull with the remote control >and staring at the flickering images on the TV screen >In Curious Battle: An Expert Recants on Why WTC Collapsed >on September 14th an interview with Van Romero, the director of research >at the New Mexico Institute of Mining and Technology. Van Romero >studied the videos of the WTC collapse and concluded that the towers >were most likely destroyed by carefully placed demolition charges... We >posted the 'Journal' story with a link to its Web address. But if you go >to that address now, you will find something has been added. The >'Journal' has placed a rebuttal above the original story. Unless you >read almost the entire rebuttal, you won't see the original story. The >most striking thing about the rebuttal article is not that Romero >changed his analysis. Indeed, Van Romero is barely quoted. Rather, the >'Journal' speaks for him. What we found most striking is the obviously >partisan way the article is written, the intensity of the retraction and >the atmosphere of panic. One gets the impression that somebody came down >very hard on this scientist and perhaps on the 'Journal' as well. > > > >The Pentagon >Analysis of the Attack of the Pentagon >The first and most important task after arriving at the scene of a crime >would be to examine the plane wreckage and determine the point of >impact, the trajectory, angle and speed of the aircraft at the point of >impact. There is only one problem. There is no trace of recognizable >wreckage from a Boeing 757! There is no fuselage, no tail section, there >are no wheels, engines, wings, luggage or passenger seats, nor are there >any bodies to be found. This leads us to our first and foremost >question, if a Boeing 757 crashed into the Pentagon as was reported by >the media and government officials, where did it go? What evidence is >there to support the theory of an airliner careening into the building? > >Independent Flight 77 - Pentagon Event Investigation >It has occurred to me that my theory has taken a turn toward the >'extreme.' This was not intentional. I merely started out to debunk the >French site, a seemingly simple task with the data available. I rejected >most of the 'radical' theories out-right, but research has compelled me >to look at some very disturbing circumstantial evidence. I still hold a >more pro-American viewpoint and at the same time realize the extreme >nature of the situation I propose requires the most extreme of measures >to be taken only in an emergency as grave as war. This is war-time >thinking. This is only a theory > >The Pentagon Crash Pictures >It is my guess that the intended target was the fuel tanks for the >helicopter pad, but that the jet was fractionally off course. Another >theory is going around that the new Naval Intelligence section was the >target. It all depends on the level of planning and the cynicism of >those that planned it. Without a full investigation, we will never know. > >Un Boeing 757 s'est-il vraiment ÈcrasÈ sur le Pentagone le 11 septembre >2001? >French site with different photos with many 1st hand accounts in English >w/links to original sources. > >Signs of a Cover-up at the Pentagon >Yet what can be said of the plane crash at the Pentagon ñ we heard about >it soon enough, but very few images were forthcoming on the day, and the >bulk of what we saw afterwards were still photos of the collapsed >portion of the pentagon and a few pictures of fire-fighters attempting >to extinguish the blaze. No sign of any video recordings, very few >witness reports and definitely nothing to show us the event as it >happened. > >Criminal Negligence or Treason >If it was difficult to believe that the third plane was not spotted, >then it is a good deal harder to believe that it was spotted and tracked >for over half an hour and yet nothing was done because officials "didn't >know what to do." Paul Wolfowitz, the deputy defense secretary, said >that the Pentagon had been tracking the fourth plane and could have shot >it down if necessary. If they "could have shot" down the fourth plane, >why did they not shoot down the third? Once they knew these were suicide >hijackings - and surely they knew that by around 9:00 am - why would >they wait? > > > > War with Afghanistan Planned Before 9-11 >US planned war in Afghanistan long before September 11 >Insider accounts published in the British, French and Indian media have >revealed that US officials threatened war against Afghanistan during the >summer of 2001. These reports include the prediction, made in July, that >ìif the military action went ahead, it would take place before the snows >started falling in Afghanistan, by the middle of October at the latest.î > >US 'planned attack on Taliban' >A former Pakistani diplomat has told the BBC that the US was planning >military action against Osama Bin Laden and the Taliban even before last >week's attacks. Niaz Naik, a former Pakistani Foreign Secretary, was >told by senior American officials in mid-July that military action >against Afghanistan would go ahead by the middle of October. > >BBC Radio Report > >Why Washington Wants Afghanistan >It has also served to obscure a most important question: does Washington >have a hidden agenda here, a strategy other than hurling bombs? If so, >what is it, and what does it mean for the world? > > > > > >The History >US pulls the plug on Muslim websites >Reported Monday September 10, 2001 -- Five hundred websites - many of >them with an Arab or Muslim connection - crashed last Wednesday when an >anti-terrorism taskforce raided InfoCom Corporation in Texas. The >80-strong taskforce that descended upon the IT company included FBI >agents, Secret Service agents, Diplomatic Security agents, tax >inspectors, immigration officials, customs officials, department of >commerce officials and computer experts. > >Enron Pipedreams Buried in Afghanistan >But if the White House, Enron, and Dabhol timelines are combined, >curious details appear. On November 6, 2001, a top official in the Bush >Administration tells India that a payoff to Enron had risen "to the >highest levels of the United States government." Five days earlier, Bush >had signed Executive Order 13233, which limits public access to papers >of all presidents since 1980--including George W. Bush. >Giuliani Invokes Hitler-Rockefeller-Bush Conspiracy to Explain 9/11 >Hitler, Saddam and bin Laden have much in common besides being mass >murderers. All worked for, were financed by and were armed at the >direction of America's top corporate interests, most conspicuously among >them corporations and individuals associated with the Rockefeller and >Bush families and with the men who created CIA policy. > >WSWS Series: Was the US government alerted to September 11 attack? >Part 3:The United States and Mideast terrorism There are two assumptions >here: first, that US agents could not penetrate the terrorist circles; >and second, that American agents would have intervened to stop an attack >had they learned of it in advance. Both these assumptions are >questionable. > >Why would Osama bin Laden want to kill Dubya, his former business >partner? > Online Journal's Editor's note: In light of last week's horrific >events and the Bush administration's reaction to them, we are reprising >the following from the last column Jim Hatfield wrote for Online Journal >prior to his tragic death on July 18. > >An Overview of The War on Terrorism >As questions remain over the attacks of September 11, so too must >questions be asked about the vested interests behind the US-led push for >a war on terrorism. > >US State Department Sponsors Training of Would-Be Terrorists >According to a reliable source, one of the Iranians involved in the >bombing of the World Trade Center in New York, took training courses at >the Redstone Arsenal's school of explosives. He enrolled in this course >under the guise of a Pakistani military officer with Pakistani uniform >and credentials. This is important to note because Al Martin Raw has >previously reported that many hostile nations have a visible presence at >the US Redstone Arsenal. Evidently "terrorists," as well as regular >armed forces and intelligence officers, are also being "trained" at the >Redstone Arsenal. > >Laura Flanders: 'Bush Sr., Cheney have big stakes in Saudi status quo' >"If bin Laden takes over and becomes king of Saudi Arabia, he'd turn off >the tap," Roger Diwan, a managing director of the Petroleum Finance >Company, a consulting firm in Washington, told Banerjee. "He said at one >point that he wants oil to be $144 a barrel - about six times what it >sells for now." And Saudi Arabia, the Times reminds us, is Osama bin >Laden's Enemy No. 1: "Mr. bin Laden has long made clear that his >ultimate goal, more than wreaking havoc in the West, is toppling the >Saud family. And Saudi Arabia would be a crucial target for anyone >seeking to cut deeply into the world oil flow." > > > > > >The FBI >Agent Alleges FBI Ignored Hamas Activities, Sues > An FBI agent in Chicago has accused his superiors of ignoring the >pre-Sept. 11 criminal activities of alleged U.S. associates of the >Islamic Resistance Movement, the terrorist organization also known as >Hamas. The agent also alleged that the bureau steered agents away from >filing criminal cases that he believes could have disrupted Hamas's >operations in this country. Agent Robert G. Wright Jr. made the >accusations last fall in a complaint filed with the Justice Department's >inspector general -- an internal watchdog -- and the FBI's Office of >Professional Responsibility, the internal affairs unit that investigates >the conduct of agents, said sources familiar with the matter. On >Thursday, Wright, a 12-year FBI veteran, filed a lawsuit against the >bureau in U.S. District Court in Washington. He accused the FBI of >violating his First Amendment rights byprohibiting him from making his >complaints public. He also has written a 500-page manuscript he wants to >publish as a book titled "Fatal Betrayals of the Intelligence Mission." > >FBI Director Comments on the Hijackers' Sophistication in Covering Trail >"The hijackers also left no paper trail. In our investigation, we have >not uncovered a single piece of paper - either here in the U.S. or in >the treasure trove of information that has turned up in Afghanistan and >elsewhere - that mentioned any aspect of the September 11th plot. The >hijackers had no computers, no laptops, no storage media of any kind. >They used hundreds of different pay phones and cell phones, often with >prepaid calling cards that are extremely difficult to trace. And they >made sure that all the money sent to them to fund their attacks was >wired in small amounts to avoid detection." > >Scandal Inside the FBI: Did G-Men Miss the Boat on 9/11? >[Newsmax, the source of this item, and Judicial Watch are right wing >organizations.] Prior to putting off the news conference, Judicial Watch >said that "based on the evidence, the FBI Special Agent believes that if >certain investigations had been allowed to run their course, Osama bin >Ladenís network might have been prevented from committing the September >11, 2001 terrorist attacks which resulted in the deaths of nearly 3,000 >innocents.î > >Mysterious Hole in FBI Investigation of the Terror Pilots >Long after the FBIís official chronology asserts that Attaís Hamburg >cadre had left Venice, their initial port of entry into American pilot >training, the core of the terrorist group was still moving in and out of >town, asserts "Mohamed Atta ∓ the Venice Flying Circus," a new >documentary investigating the Florida flight schools training terrorist >pilots. An eight-minute segment is airing this week at >www.theconspiracychannel.com. Though it was said to be the most massive >investigation in FBI history, it is a scene the FBI doesnít even know >occurred. Even though the restaurant is located barely a block from the >terrorists rented home, agents never bothered to question anyone there. > > > > >Opposition to Investigation and Manufactured Evidence >9/11 Widow Looks for Answers in Court > Nearly eight months to the day after the attacks of September 11th, few >details have emerged about how hijackers were able to overtake the four >aircraft they crashed that day. A Derry, New Hampshire widow is trying >to use the courts to get answers, but she is finding her search >frustrated by a series of stumbling blocks. ... From the audio: "for >some reason we're being blocked". United's lawyers have asked the judge >that even the requests for evidence be kept secret! "They're scared of >something, let's have the truth." ... Also see NH widow of 9-11 victim >sues United over crash > >Inquiry of Intelligence Failures Hits Obstacles >Lawmakers leading the investigation of intelligence agencies' failures >surrounding the Sept. 11 terrorist attacks are increasingly concerned >that tactics by the CIA and the Justice Department are actively impeding >their efforts, congressional sources said Friday. Members of the Senate >and House intelligence committees are so frustrated with the tactics, >sources said, that they intend to complain directly to CIA Director >George J. Tenet and Atty. Gen. John Ashcroft. > >Head of Congressional Probe Into Sept. 11 Quits >The head of a joint congressional investigation into why U.S. >intelligence agencies failed to detect the plot that led to the Sept. 11 >attacks on America has resigned. Britt Snider, a retired CIA inspector >general, was hired in February to conduct the review for the Senate and >House intelligence committees. Some members of the panels had objected >to his selection, saying Snider was too closely tied to the spy agency >and CIA Director George Tenet to conduct an impartial review. > >Mohamed Atta's E-Mail List > Mohamed Atta sent polemical emails, including one containing a >gruesome photo of a dead Palestinian child, to a regular email list of >some 40 individuals, all of whom became the focus of intense scrutiny >from the FBI after the listís existence became known last September, >the MadCow Morning News has learned. Alarmingly, the email addresses >of several of the names on Attaís ëterrorist e-listí appear to have >been, or still are, employees of US defense contractors. > >What Muslim would write: 'The time of fun and waste is gone'? >Fearful, chilling, grotesque - but also very, very odd. If the >handwritten, five-page document which the FBI says it found in the >baggage of Mohamed Atta, the suicide bomber from Egypt, is genuine, then >the men who murdered more than 7,000 innocent people believed in a very >exclusive version of Islam - or were surprisingly unfamiliar with their >religion. >Uncle Sam's lucky finds >Of course you could interpret these discoveries differently. You could >detect in them the clear hand of American propaganda. This isn't, of >course, to claim a dirty tricks department somewhere in the heart of >Washington. That would have you immediately accused of peddling >conspiracy theories, though I'm coming to think that conspiracy theories >have had a bad press. What are they, after all, but "joined-up >government" by another name? > >Flight School Owner Changes Story Again >While the media spotlight was on the mis-cues at the perennially >"troubled" INS, the real news this week was that Rudi Dekkers was >telling reporters a significantly different version of his relationship >with terrorist ringleader Mohamed Atta than he gave in the wake of the >September 11 disaster. Several key details in Dekker's public account of >Mohamed Atta's stay in this country changed, even as, claiming to feel >"vindicated," Dekkers tried to use the INS snafu to his public relations >advantage. What no one has noted till now is that this is the third >mutually-contradictory account Dekkers has given so far on the simple >question of how much the two paid for their flight lessons. > >WTC Probe Ills Bared >About 80% of the structural steel from the World Trade Center was >scrapped without being examined by even one fire expert, mostly because >investigators did not have the authority to preserve the wreckage as >evidence, the experts said. "The lack of significant amounts of steel >for examination will make it difficult, if not impossible, to make a >definitive statement as to the specific cause and chronology of the >collapse," > >Good Morning America interviews Julie Sirrs, former DIA analyst >All I know is what people at DIA told me that the State Department also >had a large role in wanting very harsh measures to be taken against me >to get me kicked out of DIA, basically. And that, to this day, I'm >honestly not sure exactly why other than regional sensitivities, >particularly with Pakistan, as we saw even pre--after September 11th, >not wanting us to be involved there. > >The truth is out there ... right? >"The right wing benefited so much from September 11 that, if I were >still a conspiratorialist, I would believe they'd done it." -- Norman >Mailer > >[To anyone who makes a blanket dismissal of "conspiracy theories" -- >remind them that the official Bush party line is itself a massive >conspiracy theory: a worldwide network of religious fanatics, led and >trained by a billionaire's son who lives in caves, protected by a feudal >government in one of the most backwards places on earth, funded to the >tens of millions of dollars by a worldwide network of crime and covert >transactions, leading to suicide hijackings and bombings.] > >WSWS Series: Was the US government alerted to September 11 attack? >Part4: The refusal to investigate More than four months after the >largest single act of mass murder ever to take place on US soil, there >have been no congressional hearings, no investigating commission has >been announced, and calls for such a panel have been largely ignored. >Even internal FBI investigations have been shelved. This inaction is >extraordinary and has no legitimate political explanation. It stinks of >political cover-up. > >The strange case of Zacarias Moussaoui: FBI refused to investigate man >charged in September 11 attacks >The case of Zacarias Moussaoui raises many questions about the conduct >of the FBI and other US intelligence agencies in the period leading up >the September11. It is the clearest example of the almost inexplicable >refusal on the part of these agencies to take any action that could have >prevented the bloodiest terrorist attack in American history. > >"Has Someone Been Sitting On The FBI?" >Osama went to Afghanistan not as some lone fanatic, but rather as the >representative of Saudi royalty, because his billionaire family is part >of the ruling class of Saudi Arabia. > >US agents told: Back off bin Ladens >US special agents were told to back off the bin Laden family and the >Saudi royals soon after George Bush became president [sic], although >that has all changed since September 11, it was reported today. And the >BBC2's Newsnight program also said the younger George Bush made his >first million 20 years ago with an oil company partly funded by the >chief US representative of Salem bin Laden, Osama's brother, who took >over as head of the family after his father Mohammed's death in a plane >crash in 1968. > >The So-Called Evidence Is a Farce >Goff cites two premises that should not, that must not, be accepted at >this hour without more convincing proof: "One, there is the premise that >what this de facto administration is doing now is a 'response' to >September 11th. Two, there is the premise that this attack on the World >Trade Center and the Pentagon was done by people based in Afghanistan. >In my opinion, neither of these is sound." > >Seven of the WTC Hijackers found alive! >Some of the men the FBI claims hijacked planes on Sept. 11 and crashed >them into the World Trade Center in New York, the Pentagon, and Stony >Creek Township, Pennsylvania are still alive. No they weren't pulled >from the rubble, they were never on the planes. > > > > >The Strange Death ofJohn O'Neill, The Counter-Terrorist >http://www.rememberjohn.com/ >Had he survived, the events since then would have unfolded quite >differently...and a President would be embroiled in a scandal like the >country has never seen! > >John O'Neill was an F.B.I. agent with an obsession: the growing threat >of Al Qaeda. >The legend of John P. O'Neill, who lost his life at the World Trade >Center on September 11th, begins with a story by Richard A. Clarke, the >national coordinator for counter-terrorism in the White House from the >first Bush Administration until last year. On a Sunday morning in >February, 1995, Clarke went to his office to review intelligence cables >that had come in over the weekend. One of the cables reported that Ramzi >Yousef, the suspected mastermind behind the first World Trade Center >bombing, two years earlier, had been spotted in Pakistan. Clarke >immediately called the F.B.I. A man whose voice was unfamiliar to him >answered the phone. "O'Neill," he growled. "Who are you?" Clarke said. >"I'm John O'Neill," the man replied. "Who the hell are you?" O'Neill had >just been appointed chief of the F.B.I.'s counter-terrorism section, in >Washington. > > > > > >Foreign Media Can Ask the Questions the US Media Can't >VisionTV Insight Mediafile with Barrie Zwicker: "The Great Deception" >Transcript: Part 1 (Broadcast Date: Mon Jan 21) In the almost two hours >of the total drama not a single U.S. Air Force interceptor turns a wheel >until itís too late. Why? Was it total incompetence on the part of >aircrews trained and equipped to scramble in minutes? Transcript: Part 2 >(Broadcast Date: Mon Jan 28) The day the chartered Learjet carrying >golfer Payne Stewart crashes, killing all on board, the air traffic >controller calls in the military. Itís standard procedure, followed >routinely, to call in the Air Force when radio contact with a commercial >passenger jet is lost, or the plane departs from its flight path, or >anything along those lines occurs. 9:54 ñ 16 minutes later -- the F-16 >reaches the Learjet at 46,000 feet and conducts a visual inspection. >Total elapsed time: 21 minutes. > >Transcript: Part 3 (Broadcast Date: Mon Feb 4) bin Laden is merely a >piece in a chess game. The stakes of the game are the last of the >worldís oil reserves and ì the Bush administrationís(consolidation of >power) to pursue a drastic unlimited militarization of foreign policy on >a massive and unprecedented scale required by long-standing elite >planning, while crushing domestic dissent and criminalizing legitimate >protest.î Transcript: Part 4 (Broadcast Date: Mon Feb 11) The >psychological trick at the heart of September 11th, by the way, is that >people confuse their compassion for the victims with their certainty >about who the perpetrators are. The public was presented with instant >perpetrators. The trick will most likely continue working for all future >planned invasions ñ looks as if Iraq is next ñ so long as the public >remains blindfolded by the media. > >Transcript: Part 5 (Broadcast Date: Mon Feb 18) Wait a minute! The >president tells us he saw the incredible image of the first plane going >in. [which video wasn't found and broadcast until much later] He went >ahead with an easily-cancelable appointment. Why? He tells us he knew >his country was under attack, yet he continued to listen to a student >talk about her pet goat, and such, for another 25 minutes. Why? >Transcript: Part 6 (Broadcast Date: Mon Feb 25) The less people ask >themselves questions about deceit the more it clears the way for >organizations such as the CIA to continue to receive seemingly unending >billions of dollars. Taxpayer money used to train terrorists, as the CIA >acknowledges it has. To destabilize governments, as former CIA agent >John Stockwell writes in his book In Search of Enemies. And to inject >toxic grey, white and black disinformation into the worldís information >systems, as William Blum spells out in Killing Hope. All with barely a >whisper of dissent. > > > >General 9-11 Sites and Articles >The Case For Bush Administration Advance Knowledge Of 9/11 Attacks >A dispassionate examination of existing reliable, open-source evidence >on advance warnings of the Sept. 11 attacks provides strong and >sustainable grounds to conclude the Bush Administration was in >possession of sufficient advance intelligence to have prevented the >attacks, had it wished to do so. With a known intelligence budget of >approximately $30 billion, it must be assumed there are classified files >that only add to the weight of the available data presented here. > >Online Journalô Part 1 of a four-part series -- September 11: The >circumstantial case >It is precisely for reasons of patriotism that these avenues need to be >pursued. If they are true, they represent a clear and present danger to >the United States from within our borders and from the very people we >entrust to protect us. A failure to listen to facts and conclusions that >are unpleasant or disturbing will not help us, rather it will only play >into the hands of those who want to make us less free. > >Facts for 911-Beginners >At least 100 Webpages are working 24/7 on collecting details, which can >prove that there have been at least 10, 15 early warnings about an >attack on America, which was ignored by CIA and Pentagon. It's also >obvious, that prior knowledge was ignored to get an official reason to >start a war against the Taliban and "war against terrorism". Therefore >since January 2002 a petition is collecting signatures to start a public >investigation to investigate the 911-oddities. This petition is already >known at the US Congress who decided to start a investigation with the >help of a former CIA inspector. But this hasn't been made public enough >yet and it will probably not be a public one. > >Momentum growing for inquiry into "oddities" of September 11 >In January 2000, Bob Gipson of El Dorado County, California, wrote his >congressman expressing his fear that the U.S. government would >orchestrate a terrorist attack on "certain" U.S. cities and blame the >attacks on "Islamic terrorists." Gipson told Rep. John T. Doolittle >(R-Ca) he thought the "operation" would be a platform for declaring >martial law in the U.S. When the World Trade Center and Pentagon >attacks occurred on September 11, 2001, Gipson had a sickening feeling >this was the event he feared. ... A congressional investigation cannot >come soon enough for Bob Gipson. Now, he has renewed dread that his >government is planning another attack on U.S. citizens, this time >leaving Saddam Hussein's fingerprints as a pretext to garner public >support to attack Iraqi citizens. > >ìIt was a pretty cheap price to pay for unifying the countryî >Anyone wondering how American military and intelligence officers could >have looked the other way in the months leading up to the massacre of >some 3,200 people in three states can ponder the words of Lt. Commander >Joseph J. Rochefort. Referring to the deaths of more than 3,000 American >military personnel whom he helped betray one sunny Sunday morning after >using code-broken communications intercepts to track Japanese carriers >to the island of Oahu, Rochefort remarked to a naval historian: ìIt was >a pretty cheap price to pay for unifying the country.î > > > >Back to Index >Revised: 16 May 2002 > > > >http://falloutshelternews.com Copyright © 2002 by Fallout Shelter News >All rights reserved -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- From: Steve Weinert Date: Fri May 14, 2004 6:38am Subject: RE: PRISONER ABUSE: PATTERNS FROM THE PAST TSCM List Members, The initial posting of this thread "RE: PRISONER ABUSE: PATTERNS FROM THE PAST" had squat-all to do with are shared area of interests. The follow-ups are no better focused on our list topic. I can suggest dozens of more appropriate forums for conspiracy theory discusions and left/right political debate. I for one learn much from this list and would welcome some self-disipline to keep on task. Seems odd that an off-topic message to "get on topic" like this is needed, but it needs saying. Thanks in advance, Steve W 8627 From: Steve Weinert Date: Fri May 14, 2004 7:07am Subject: Security Holes Make VOIP a Risky Business Interesting article reminding us that VOIP is rather public. Skype, Vonage, eQSO, EchoLink, MCI Advantage are some of the products out there. http://www.eweek.com/print_article/0,1761,a=126940,00.asp --- Security Holes Make VOIP a Risky Business May 12, 2004 By Jim Louderback It's the latest technology craze. Turn your phones digital, and use the Internet to bypass pricey long-distance providers. Individuals and businesses can slash phone costs by 50 percent or more, with little or no loss of quality. But there's a very dark lining inside this silver cloud. VOIP (voice over IP) is just as vulnerable to hackers as other digital networking technologies. But it's just far less protected≠which can put your entire company at risk. According to a prominent networking and security pal of mine≠who wished to remain nameless≠"SIP is a very weak protocol." It uses edge-style servers, similar to FTP, e-mail and HTTP, to initiate connections between users. According to my buddy, just as hackers have attacked those servers, they're coming after VOIP too. What sorts of vulnerabilities exist? {full text is at the URL} 8628 From: Gregory Horton Date: Fri May 14, 2004 11:39am Subject: Re: Aviation Question Michael Puchol wrote: >Hi, > >Some interference tests done by aviation firms (manufacturers and airlines) >have shown that such devices, or more accurately, the motors they contain, >emit interference on particular frequencies that are liable to cause >problems in aircraft instruments. I believe the electronics that run the >laser beams also produce interference, which may be even worse than that of >the motors. > > > >Correct me if I am wrong, but doesn't the laptop have the same general set up in their DVD-CD player as the portable DVD player? Motor, lasers etc. have the same functions, why doesn't the laptop cause the same problems as the other? Could it be that the airlines has to pay a huge fee for the in-flight movies and music tracks and they don't want everyone bringing their own and not pay the $5 fee for the head set? If you have a thousand people a day not paying the fee when they used to, that would be a good size hit. Maybe I am a little cynical regarding the airline's motives. Sorry > Greg Horton 8629 From: kondrak Date: Fri May 14, 2004 4:32pm Subject: Re: Security Holes Make VOIP a Risky Business I do considerable VOIP and its all VPN and encrypted point to point. Do it in hardware, as much as possible, its much faster. At 08:07 5/14/2004, you wrote: >Interesting article reminding us that VOIP is rather public. > >Skype, Vonage, eQSO, EchoLink, MCI Advantage are some of the products out >there. > >http://www.eweek.com/print_article/0,1761,a=126940,00.asp > >--- > >Security Holes Make VOIP a Risky Business > >May 12, 2004 >By Jim Louderback > >It's the latest technology craze. Turn your phones digital, and use the >Internet to bypass pricey long-distance providers. Individuals and >businesses can slash phone costs by 50 percent or more, with little or no >loss of quality. > >But there's a very dark lining inside this silver cloud. VOIP (voice over >IP) is just as vulnerable to hackers as other digital networking >technologies. But it's just far less protected≠which can put your entire >company at risk. > >According to a prominent networking and security pal of mine≠who wished to >remain nameless≠"SIP is a very weak protocol." It uses edge-style servers, >similar to FTP, e-mail and HTTP, to initiate connections between users. >According to my buddy, just as hackers have attacked those servers, they're >coming after VOIP too. > >What sorts of vulnerabilities exist? > >{full text is at the URL} > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 8630 From: Steve Weinert at Excel.Net Date: Fri May 14, 2004 4:53pm Subject: Re: Security Holes Make VOIP a Risky Business One computer professional emailed me: "Now we are talkin my kind of stuff that I work on. I do not agree with everything this guy is saying. I did some research on my voip setup and to my joy I do not have the security holes the artical describes. I have Cisco routers with the new code which take into account the security holes.We also use H.235 protocol which uses encryption and authentication in the call process. It is very hard to intercept an encrypted voice tunnel and decode it with the latest firmware installed. I spent hours to get things running properly between Mexico and nnnn. We now save around $3000.00 per month with Voip over the Internet. As far as down time it is very minimal. I think this year so far 2 times and it was T1 problems. As far as echo link and some sip products, they are free services on the Internet. I don't see much incentive to secure them they do work well. If someone hacked into my echo link conversion I could just disconnect the connection. And with that in mind you watch what you say. The internet is a wild and crazy place." ----- Original Message ----- From: "kondrak" To: "Steve Weinert" Cc: Sent: Friday, May 14, 2004 4:32 PM Subject: Re: [TSCM-L] Security Holes Make VOIP a Risky Business > I do considerable VOIP and its all VPN and encrypted point to point. Do it > in hardware, as much as possible, its much faster. > > > At 08:07 5/14/2004, you wrote: > >Interesting article reminding us that VOIP is rather public. > > > >Skype, Vonage, eQSO, EchoLink, MCI Advantage are some of the products out > >there. > > > >http://www.eweek.com/print_article/0,1761,a=126940,00.asp > > > >--- > > > >Security Holes Make VOIP a Risky Business > > > >May 12, 2004 > >By Jim Louderback > > > >It's the latest technology craze. Turn your phones digital, and use the > >Internet to bypass pricey long-distance providers. Individuals and > >businesses can slash phone costs by 50 percent or more, with little or no > >loss of quality. > > > >But there's a very dark lining inside this silver cloud. VOIP (voice over > >IP) is just as vulnerable to hackers as other digital networking > >technologies. But it's just far less protected-which can put your entire > >company at risk. > > > >According to a prominent networking and security pal of mine-who wished to > >remain nameless-"SIP is a very weak protocol." It uses edge-style servers, > >similar to FTP, e-mail and HTTP, to initiate connections between users. > >According to my buddy, just as hackers have attacked those servers, they're > >coming after VOIP too. > > > >What sorts of vulnerabilities exist? > > > >{full text is at the URL} > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > 8631 From: kondrak Date: Sat May 15, 2004 4:07am Subject: Re: Security Holes Make VOIP a Risky Business Ah, then you must be familiar with my latest love, Asterisk.....open source PBX. All my links are VPN, I've got free calling to the entire world, and it costs me the cost of my broadband connection. I get phone, cable TV, and Internet for $40 a month. The phone companies are doomed. Canada gives full access to their phone PSTN for $20 a month. Germany, FREE, Japan, FREE...US FREE...Bye bye bell...I pay $8.00 for a number anyone on the planet can call, I only pay for outgoing, I make NO outgoing over the toll links, only over the free services. (least cost routing) Oh, big deal, I have to route through Germany or Japan to call local, ho hum. VOIP RULES! At 17:53 5/14/2004, you wrote: >One computer professional emailed me: > >"Now we are talkin my kind of stuff that I work on. I do not agree with >everything this guy is saying. I did some research on my voip setup and to >my joy I do not have the security holes the artical describes. I have Cisco >routers with the new code which take into account the security holes.We also >use H.235 protocol which uses encryption and authentication in the call >process. It is very hard to intercept an encrypted voice tunnel and decode >it with the latest firmware installed. I spent hours to get things running >properly between Mexico and nnnn. We now save around $3000.00 per month with >Voip over the Internet. As far as down time it is very minimal. I think this >year so far 2 times and it was T1 problems. As far as echo link and some sip >products, they are free services on the Internet. I don't see much incentive >to secure them they do work well. If someone hacked into my echo link >conversion I could just disconnect the connection. And with that in mind you >watch what you say. The internet is a wild and crazy place." > > > > > >----- Original Message ----- >From: "kondrak" >To: "Steve Weinert" >Cc: >Sent: Friday, May 14, 2004 4:32 PM >Subject: Re: [TSCM-L] Security Holes Make VOIP a Risky Business > > > > I do considerable VOIP and its all VPN and encrypted point to point. Do it > > in hardware, as much as possible, its much faster. > > > > > > At 08:07 5/14/2004, you wrote: > > >Interesting article reminding us that VOIP is rather public. > > > > > >Skype, Vonage, eQSO, EchoLink, MCI Advantage are some of the products out > > >there. > > > > > >http://www.eweek.com/print_article/0,1761,a=126940,00.asp > > > > > >--- > > > > > >Security Holes Make VOIP a Risky Business > > > > > >May 12, 2004 > > >By Jim Louderback > > > > > >It's the latest technology craze. Turn your phones digital, and use the > > >Internet to bypass pricey long-distance providers. Individuals and > > >businesses can slash phone costs by 50 percent or more, with little or no > > >loss of quality. > > > > > >But there's a very dark lining inside this silver cloud. VOIP (voice over > > >IP) is just as vulnerable to hackers as other digital networking > > >technologies. But it's just far less protected-which can put your entire > > >company at risk. > > > > > >According to a prominent networking and security pal of mine-who wished >to > > >remain nameless-"SIP is a very weak protocol." It uses edge-style >servers, > > >similar to FTP, e-mail and HTTP, to initiate connections between users. > > >According to my buddy, just as hackers have attacked those servers, >they're > > >coming after VOIP too. > > > > > >What sorts of vulnerabilities exist? > > > > > >{full text is at the URL} > > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > the hands acquire shaking, the shaking is a warning. > > > It is by caffeine alone I set my mind in motion. > > >=================================================== TSKS > > >Yahoo! Groups Links > > > > > > > > > > > > > > 8632 From: Ocean Group Date: Sat May 15, 2004 10:50am Subject: Mobile Phone Anonymous Bluetooth Access Vulnerability Note: The OBEX exploit refers to the "Bluesnarf" attack. Regards Oisin Ocean Group Technical Security Division Ireland *************** Upcoming Advisories Description The Bluetooth implementation of some widespread mobile phone devices contains a vulnerability which allows anyone with a Bluetooth device to connect to the phone without the need to pair or to authorize. Vulnerable devices (status from March 27th 2004) Vendor Model Firmware Version Nokia 6310i 5.50 Sony Ericsson T610 R1A081 Details There is no need to pair/bond or to authenticate / become authorized. Also there is no need to have physical access to the device beforehand. This vulnerability has nothing to do with any other previously discovered vulnerability (OBEX vulnerability). Disabling the visible mode will prevent you from being discovered but will not prevent you from being hacked. If an attacker knows the BDADDR of a device he can perform the following actions : - Disrupt a phone call - Initiate a voice/data/fax call to any number - Hijack a phone call by forwarding speaker and microphone to the attackers machine - Read / Write Phonebook entries from/to either SIM or Phone-Memory - Read / Write Messages from/to either SIM or Phone-Memory - Send SMS to any number - Send Fax to any number Recommendation You should switch off Bluetooth if not needed. Use Bluetooth only in a "safe" environment and avoid public places. The radius is defined by the Bluetooth capabilities of the device and can go up to 100 metres. In any case you should disable the visible mode. --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.684 / Virus Database: 446 - Release Date: 13/05/2004 8633 From: James M. Atkinson Date: Sat May 15, 2004 4:25pm Subject: Red Cross report documents US torture of Iraqi prisoners http://www.wsws.org/articles/2004/may2004/icrc-m14.shtml Red Cross report documents US torture of Iraqi prisoners By Kate Randall 14 May 2004 In the wake of the publication of photos depicting the brutal and humiliating treatment of Iraqi prisoners at the hands of US troops at the Abu Ghraib prison, the International Committee of the Red Cross (ICRC) has released to the press its February 2003 report on the handling of prisoners and other detainees by Coalition Forces (CF) in Iraq. The report covers the period between March and November 2003, and deals with treatment of Iraqi detainees "during arrest, internment and interrogation." The document details gross violations of numerous articles of the Geneva Conventions by US and British forces and paints a picture of widespread and systemic abuse of prisoners-particularly those "persons arrested in connection with suspected security offences or deemed to have an 'intelligence' value." The executive summary of the ICRC report says that these so-called "High Value Detainees" "were at high risk of being subjected to a variety of harsh treatments ranging from insults, threats and humiliations to both physical and psychological coercion, which in some cases was tantamount to torture, in order to force cooperation with their interrogators." In contradiction to military and Bush administration officials' claims that the abuse depicted in the Abu Ghraib photos came as a shock, the report explains how numerous memoranda on Geneva Conventions violations were sent to the Coalition Forces, with recommendations for correcting the abusive treatment of prisoners. In most cases, however, the abuse continued and appeared to have been sanctioned at high levels of the military. At every stage-from arrest to final internment in regular prison facilities-violations of the Geneva Conventions occurred. The Third and Fourth conventions mandate that prisoners be protected against acts of violence, intimidation and insults and that the human dignity, physical integrity and cultural sensitivity of captured individuals be protected at all times. The ICRC states, however, that during arrests the rights of the vast majority of arrestees were violated and that these procedures "tended to follow a pattern": "Arresting authorities entered houses usually after dark, breaking down doors, waking up residents roughly, yelling orders, forcing family members into one room under military guard while searching the rest of the house.... They arrested suspects, tying their hands in the back with flexi-cuffs, hooding them, and taking them away. Sometimes they arrested all adult males present in a house, including elderly, handicapped or sick people. Treatment often included pushing people around, insulting, taking aim with rifles, punching and kicking and striking with rifles. Individuals were often led away in whatever they happened to be wearing at the time of arrest-sometimes in pyjamas or underwear-and were denied the opportunity to gather a few essential belongings, such as clothing, hygiene items, medicine or eyeglasses." Furthermore, "certain CF military intelligence officers" told the ICRC they estimated that between 70 and 90 percent of those rounded up in these terror raids were arrested by mistake. The Geneva Conventions also require that within one week of capture prisoners must be allowed to fill out capture or internment cards, indicating their arrest, the address of their current place of internment and their health. This has been routinely violated by the Coalition Forces, resulting in what the ICRC describes as the "de facto 'disappearance'" of the vast majority of detainees. The report states, "Nine months into the present conflict, there is still no satisfactorily functioning system of notification to the families of captured or arrested persons, even though hundreds of arrests continue to be carried out every week." Family members go for weeks and months with no information about their loved ones, often fearing they may be dead. Many only learn about the condition and whereabouts of their relatives when they return home or through word from released detainees. The ICRC has repeatedly raised this issue with detaining authorities since March 2003, "including at the highest level of the CF in August 2003," but there has been little improvement in the notification system. The report next addresses the treatment of prisoners during their transfer and initial custody. Witnesses described to the ICRC the arrest of nine men in a Basra hotel on September 13, 2003. According the report, they "were made to kneel, face and hands against the ground, as if in a prayer position. The soldiers stamped on the back of the neck of those raising their head. They confiscated their money without issuing a receipt. The suspects were taken to Al-Hakimiya [an office formerly used by the Iraqi secret police] ... and then beaten severely by CP personnel." One of the men, a 28-year-old father of two, subsequently died. "His co-arrestees heard him screaming and asking for assistance," according to the report. His International Death Certificate indicated "cardio-respiratory arrest-asphyxia" as the condition leading to death-with the cause "unknown." The ICRC also heard allegations of other deaths as a result of "harsh internment conditions, ill-treatment, lack of medical attention," particularly in the Tikrit holding area known formerly as the Saddam Hussein Islamic School. Some of the most egregious violations of prisoners' rights are detailed in the section of the document on treatment during interrogation. Prisoners of "intelligence" value whose interrogation was supervised by military intelligence "were subjected to a variety of ill-treatments ranging from insults and humiliation to both physical and psychological coercion that in some cases might amount to torture in order to force them to cooperate with their interrogators," according to the report. The ICRC states that in some interrogation locations, such as the Abu Ghraib military intelligence section, these methods of torture "appeared to be part of the standard operating procedures by military intelligence personnel to obtain confessions and extract information." The brutal procedures utilized by interrogators are too numerous to list, but include the following: * Hooding of prisoners for periods lasting from a few hours to four consecutive days, "during which hoods were lifted only for drinking, eating or going to the toilets." This allowed the interrogators to remain anonymous and also heightened the anxiety in conjunction with beatings, as prisoners would be unsure when blows would be delivered. * Handcuffing with tight (plastic) flexi-cuffs, in some cases resulting in permanent bodily damage; * Pressing the face into the ground with boots; * Threats, including "ill-treatment, reprisals against family members, imminent execution or transfer to Guantanamo"; * Being held naked in solitary confinement, with insufficient sleep, food or water deprivation, minimal access to showers, denial of access to open air; * Being paraded naked before other prisoners, sometimes hooded or with women 's underwear over the head; * Exposure to loud music, prolonged exposure to the sun in temperatures reaching as high as 50 degrees Celsius (122 degrees Fahrenheit). Prisoners examined by ICRC medical personal presented physical marks and psychological symptoms consistent with such treatment. When the Red Cross visited the "isolation section" of Abu Ghraib in mid-October 2003, "they witnessed the practice of keeping persons deprived of their liberty completely naked in totally empty concrete cells and in total darkness, allegedly for several consecutive days." When the ICRC investigators requested an explanation from the authorities, the report states, "The military intelligence officer in charge of the interrogation explained that this practice was 'part of the process.'" According to information collected by the ICRC, prisoners were regularly questioned without knowing the reason for their arrest or the charges against them. The Red Cross also visited Umm Qasr camp and its successor, Camp Bucca. Prisoners selected for interrogation-whether arrested by British, Danish, Dutch or Italian armed forces-were segregated in a separate section of the facility for investigation. There they were "routinely treated by their guards with general contempt, with petty violence such as having orders screamed at them and being cursed, kicked, struck with rifle butts, roughed up or pushed around." They were also threatened with indefinite internment or transfer to Guantanamo. A former prisoner at Camp Cropper alleged that he had been "hooded and cuffed with flexi-cuffs, threatened to be tortured and killed, urinated on, kicked in the head, lower back and groin, force-fed a baseball ... and deprived of sleep for four consecutive days. Interrogators would allegedly take turns ill-treating him. When he said he would complain to the ICRC he was allegedly beaten more." The Red Cross report makes clear that Coalition Authority officials were repeatedly informed of these violations of the human rights of prisoners. In May 2003, the ICRC sent the CF a memorandum reporting on more than 200 allegations of mistreatment of prisoners during capture and interrogation. In early July the ICRC also sent the CF a working paper detailing about 50 allegations of ill-treatment in the military intelligence section of Camp Cropper. The ICRC also documented the widespread abuse of power and mistreatment of prisoners in the custody of Iraqi police. This included the practice of threatening to hand them over to the CF, or extorting money to prevent it. Former detainees reported Iraqi police whipped them with cables, and kicked them in the lower parts of the body, including the testicles. Prisoners alleged they were also burned with cigarettes, a claim substantiated by marks found on their bodies by ICRC delegates. Detainees often drew parallels between Iraqi police practices and those of the former Saddam Hussein regime. The report also describes instances when detaining authorities fired on prisoners with live ammunition. On June 13, 2003, at Abu Ghraib, guards from three watchtowers opened fire on demonstrating prisoners, injuring seven and killing one. In another incident on November 24, 2003, at Abu Ghraib, deadly force was applied in response to a riot by prisoners, who were protesting inadequate food and clothing, lack of judicial guarantees and lack of family contact. The detainees allegedly attempted to force open the gate to the camp. After firing with non-lethal weapons, the guards opened fire with lethal ammunition, resulting in the deaths of four detainees. The Third Geneva Convention stipulates that use of firearms is an extreme measure which should only be used in response to armed resistance or threat to the lives of detaining personnel or other prisoners. These incidents were summarily investigated by the CF, which concluded that legitimate use of firearms had been made. The Red Cross also reports the September 3, 2003, case of three detainees who were severely injured by the explosion of what seemed to be a cluster bomb while they were working to clear rubbish along the barbed-wire fence of Camp Bucca. All three required limb amputations. The ICRC also collected numerous allegations of outright theft by Coalition Forces, who confiscated money, cars and other valuables during arrests, without providing receipts-a violation of the Fourth Geneva Convention. One individual alleged that upon arrest at his home in May 2003 the CF seized "71,450,000 Iraqi dinars, 14,000 US dollars, two wedding rings, a video camera, a watch, real-estate property documents, his wife's residential documents, his father's will, his private diaries, as well as most of the family private documents and personal identification and other papers." ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8634 From: James M. Atkinson Date: Sat May 15, 2004 4:34pm Subject: ARTICLE 15-6 INVESTIGATION OF THE 800th MILITARY POLICE BRIGADE -------------------------------------------------------------------------------- HEARING ARTICLE 15-6 INVESTIGATION OF THE 800th MILITARY POLICE BRIGADE SECRET/NO FOREIGN DISSEMINATION TABLE OF CONTENTS References .......................... 3 Background ......................... 6 Assessment of DoD Counter-Terrorism Interrogation and Detention Operations In Iraq (MG Miller's Assessment).................. 8 IO Comments on MG Miller's Assessment.............. 8 Report on Detention and Corrections In Iraq (MG Ryder's Report).................. 9 IO Comments on MG Ryder's Report.................. 12 Preliminary Investigative Actions .................. 12 Findings and Recommendations Part One (Detainee Abuse). .................. 15 Findings ...................... 15 Recommendations .................. 20 Part Two (Escapes and Accountability) ............... 22 Findings ...................... 22 Recommendations. ................... 31 Part Three (Command Climate, Etc.). ............... 34 Findings ...................... 36 Recommendations .................. 44 Other Findings/Observations ................... 49 Conclusion ........................ 50 Annexes ......................... 51 References 1. Geneva Convention Relative to the Treatment of Prisoners of War, 12 August 1949 2. Geneva Convention for the Amelioration of the Condition of the Wounded and Sick in the Armed Forces in the Field, 12 August 1949 3. Geneva Convention for the Amelioration of the Condition of the Wounded, Sick and Shipwrecked Members of Armed Forces at Sea, 12 August 1949 4. Geneva Convention Protocol Relative to the Status of Refugees, 1967 5. Geneva Convention Relative to the Status of Refugees, 1951 6. Geneva Convention for the Protection of War Victims, 12 August 1949 7. Geneva Convention Relative to the Protection of Civilian Persons in Time of War, 12 August 1949 8. DOD Directive 5100.69, "DOD Program for Prisoners of War and other Detainees," 27 December 1972 9. DOD Directive 5100.77 "DOD Law of War Program," 10 July 1979 10. STANAG No. 2044, Procedures for Dealing with Prisoners of War (PW) (Edition 5), 28 June 1994 11. STANAG No. 2033, Interrogation of Prisoners of War (PW) (Edition 6), 6 December 1994 12. AR 190-8, Enemy Prisoners of War, Retained Personnel, Civilian Internees, and Other Detainees, 1 October 1997 13. AR 190-47, The Army Corrections System, 15 August 1996 14. AR 190-14, Carrying of Firearms and Use of Force for Law Enforcement and Security Duties, 12 March 1993 15. AR 195-5, Evidence Procedures, 28 August 1992 16. AR 190-11, Physical Security of Arms, Ammunition and Explosives, 12 February 1998 17. AR 190-12, Military Police Working Dogs, 30 September 1993 18. AR 190-13, The Army Physical Security Program, 30 September 1993 19. AR 380-67, Personnel Security Program, 9 September 1988 20. AR 380-5, Department of the Army Information Security, 31 September 2000 21. AR 670-1, Wear and Appearance of Army Uniforms and Insignia, 5 September 2003 22. AR 190-40, Serious Incident Report, 30 November 1993 23. AR 15-6, Procedures for Investigating Officers and Boards of Officers, 11 May 1988 24. AR 27-10, Military Justice, 6 September 2002 25. AR 635-200, Enlisted Personnel, 1 November 2000 26. AR 600-8-24, Officer Transfers and Discharges, 29 June 2002 27. AR 500-5, Army Mobilization, 6 July 1996 28. AR 600-20, Army Command Policy, 13 May 2002 29. AR 623-105, Officer Evaluation Reports, 1 April 1998 30. AR 175-9, Contractors Accompanying the Force, 29 October 1999 31. FM 3-19.40, Military Police Internment/Resettlement Operations, 1 August 2001 32. FM 3-19.1, Military Police Operations, 22 March 2001 33. FM 3-19.4, Military Police Leaders' Handbook, 4 March 2002 34. FM 3-05.30, Psychological Operations, 19 June 2000 35. FM 33-1-1, Psychological Operations Techniques and Procedures, 5 May 1994 36. FM 34-52, Intelligence Interrogation, 28 September 1992 37. FM 19-15, Civil Disturbances, 25 November 1985 38. FM 3-0, Operations, 14 June 2001 39. FM 101-5, Staff Organizations and Functions, 23 May 1984 40. FM 3-19.30, Physical Security, 8 January 2001 41. FM 3-21.5, Drill and Ceremonies, 7 July 2003 42. ARTEP 19-546-30 MTP, Mission Training Plan for Military Police Battalion (IR) 43. ARTEP 19-667-30 MTP, Mission Training Plan for Military Police Guard Company 44. ARTEP 19-647-30 MTP, Mission Training Plan for Military Police Escort Guard Company 45. STP 19-95B1-SM, Soldier's Manual, MOS 95B, Military Police, Skill Level 1, 6 August 2002 46. STP 19-95C14-SM-TG, Soldier's Manual and Trainer's Guide for MOS 95C Internment/Resettlement Specialist, Skill Levels 1/2/3/4, 26 March 1999 47. STP 19-95C1-SM MOS 95C, Corrections Specialist, Skill Level 1, Soldier's Manual, 30 September 2003 48. STP 19-95C24-SM-TG MOS 95C, Corrections Specialist, Skill Levels 2/3/4, Soldier's Manual and Trainer's Guide, 30 September 2003 49. Assessment of DOD Counter-Terrorism Interrogation and Detention Operations in Iraq, (MG Geoffrey D. Miller, Commander JTF-GTMO, Guantanamo Bay, Cuba), 9 September 2003 50. Assessment of Detention and Corrections Operations in Iraq, (MG Donald J. Ryder, Provost Marshal General), 6 November 2003 51. CJTF-7 FRAGO #1108, Subject: includes- para 3.C.8 & 3.C.8.A.1, Assignment of 205 MI BDE CDR Responsibilities for the Baghdad Central Confinement Facility (BCCF), 19 November 2003 52. CJTF-7 FRAGO #749, Subject: Intelligence and Evidence- Led Detention Operations Relating to Detainees, 24 August 2003 53. 800th MP BDE FRAGO # 89, Subject: Rules of Engagement, 26 December 2003 54. CG CJTF-7 Memo: CJTF-7 Interrogation and Counter- Resistance Policy, 12 October 2003 55. CG CJTF-7 Memo: Dignity and Respect While Conducting Operations, 13 December 2003 56. Uniform Code of Military Justice and Manual for Courts Martial, 2002 Edition ARTICLE 15-6 INVESTIGATION OF THE 800th military police brigade BACKGROUND 1. (U) On 19 January 2004, Lieutenant General (LTG) Ricardo S. Sanchez, Commander, Combined Joint Task Force Seven (CJTF-7) requested that the Commander, US Central Command, appoint an Investigating Officer (IO) in the grade of Major General (MG) or above to investigate the conduct of operations within the 800th Military Police (MP) Brigade. LTG Sanchez requested an investigation of detention and internment operations by the Brigade from 1 November 2003 to present. LTG Sanchez cited recent reports of detainee abuse, escapes from confinement facilities, and accountability lapses, which indicated systemic problems within the brigade and suggested a lack of clear standards, proficiency, and leadership. LTG Sanchez requested a comprehensive and all-encompassing inquiry to make findings and recommendations concerning the fitness and performance of the 800th MP Brigade. (ANNEX 2) 2. (U) On 24 January 2003, the Chief of Staff of US Central Command (CENTCOM), MG R. Steven Whitcomb, on behalf of the CENTCOM Commander, directed that the Commander, Coalition Forces Land Component Command (CFLCC), LTG David D. McKiernan, conduct an investigation into the 800th MP Brigade's detention and internment operations from 1 November 2003 to present. CENTCOM directed that the investigation should inquire into all facts and circumstances surrounding recent reports of suspected detainee abuse in Iraq. It also directed that the investigation inquire into detainee escapes and accountability lapses as reported by CJTF-7, and to gain a more comprehensive and all-encompassing inquiry into the fitness and performance of the 800th MP Brigade. (ANNEX 3) 3. (U) On 31 January 2004, the Commander, CFLCC, appointed MG Antonio M. Taguba, Deputy Commanding General Support, CFLCC, to conduct this investigation. MG Taguba was directed to conduct an informal investigation under AR 15- 6 into the 800th MP Brigade's detention and internment operations. Specifically, MG Taguba was tasked to: a. (U) Inquire into all the facts and circumstances surrounding recent allegations of detainee abuse, specifically allegations of maltreatment at the Abu Ghraib Prison (Baghdad Central Confinement Facility (BCCF)); b. (U) Inquire into detainee escapes and accountability lapses as reported by CJTF-7, specifically allegations concerning these events at the Abu Ghraib Prison; c. (U) Investigate the training, standards, employment, command policies, internal procedures, and command climate in the 800th MP Brigade, as appropriate; d. (U) Make specific findings of fact concerning all aspects of the investigation, and make any recommendations for corrective action, as appropriate. (ANNEX 4) 4. (U) LTG Sanchez's request to investigate the 800th MP Brigade followed the initiation of a criminal investigation by the US Army Criminal Investigation Command (USACIDC) into specific allegations of detainee abuse committed by members of the 372nd MP Company, 320th MP Battalion in Iraq. These units are part of the 800th MP Brigade. The Brigade is an Iraq Theater asset, TACON to CJTF-7, but OPCON to CFLCC at the time this investigation was initiated. In addition, CJTF-7 had several reports of detainee escapes from US/Coalition Confinement Facilities in Iraq over the past several months. These include Camp Bucca, Camp Ashraf, Abu Ghraib, and the High Value Detainee (HVD) Complex/Camp Cropper. The 800th MP Brigade operated these facilities. In addition, four Soldiers from the 320th MP Battalion had been formally charged under the Uniform Code of Military Justice (UCMJ) with detainee abuse in May 2003 at the Theater Internment Facility (TIF) at Camp Bucca, Iraq. (ANNEXES 5-18, 34 and 35) 5. (U) I began assembling my investigation team prior to the actual appointment by the CFLCC Commander. I assembled subject matter experts from the CFLCC Provost Marshal (PM) and the CFLCC Staff Judge Advocate (SJA). I selected COL Kinard J. La Fate, CFLCC Provost Marshal to be my Deputy for this investigation. I also contacted the Provost Marshal General of the Army, MG Donald J. Ryder, to enlist the support of MP subject matter experts in the areas of detention and internment operations. (ANNEXES 4 and 19) 6. (U) The Investigating Team also reviewed the Assessment of DoD Counter-Terrorism Interrogation and Detention Operations in Iraq conducted by MG Geoffrey D. Miller, Commander, Joint Task Force Guantanamo (JTF-GTMO). From 31 August to 9 September 2003, MG Miller led a team of personnel experienced in strategic interrogation to HQ, CJTF-7 and the Iraqi Survey Group (ISG) to review current Iraqi Theater ability to rapidly exploit internees for actionable intelligence. MG Miller's team focused on three areas: intelligence integration, synchronization, and fusion; interrogation operations; and detention operations. MG Miller's team used JTF-GTMO procedures and interrogation authorities as baselines. (ANNEX 20) 7. (U) The Investigating Team began its inquiry with an in- depth analysis of the Report on Detention and Corrections in Iraq, dated 5 November 2003, conducted by MG Ryder and a team of military police, legal, medical, and automation experts. The CJTF-7 Commander, LTG Sanchez, had previously requested a team of subject matter experts to assess, and make specific recommendations concerning detention and corrections operations. From 13 October to 6 November 2003, MG Ryder personally led this assessment/assistance team in Iraq. (ANNEX 19) ASSESSMENT OF DoD COUNTER-TERRORISM INTERROGATION AND DETENTION OPERATIONS IN IRAQ (MG MILLER'S ASSESSMENT) 1. (S/NF) The principal focus of MG Miller's team was on the strategic interrogation of detainees/internees in Iraq. Among its conclusions in its Executive Summary were that CJTF-7 did not have authorities and procedures in place to affect a unified strategy to detain, interrogate, and report information from detainees/internees in Iraq. The Executive Summary also stated that detention operations must act as an enabler for interrogation. (ANNEX 20) 2. (S/NF) With respect to interrogation, MG Miller's Team recommended that CJTF-7 dedicate and train a detention guard force subordinate to the Joint Interrogation Debriefing Center (JIDC) Commander that "sets the conditions for the successful interrogation and exploitation of internees/detainees." Regarding Detention Operations, MG Miller's team stated that the function of Detention Operations is to provide a safe, secure, and humane environment that supports the expeditious collection of intelligence. However, it also stated "it is essential that the guard force be actively engaged in setting the conditions for successful exploitation of the internees." (ANNEX 20) 3. (S/NF) MG Miller's team also concluded that Joint Strategic Interrogation Operations (within CJTF-7) are hampered by lack of active control of the internees within the detention environment. The Miller Team also stated that establishment of the Theater Joint Interrogation and Detention Center (JIDC) at Abu Ghraib (BCCF) will consolidate both detention and strategic interrogation operations and result in synergy between MP and MI resources and an integrated, synchronized, and focused strategic interrogation effort. (ANNEX 20) 4. (S/NF) MG Miller's team also observed that the application of emerging strategic interrogation strategies and techniques contain new approaches and operational art. The Miller Team also concluded that a legal review and recommendations on internee interrogation operations by a dedicated Command Judge Advocate is required to maximize interrogation effectiveness. (ANNEX 20) IO COMMENTS ON MG MILLER'S ASSESSMENT 1. (S/NF) MG Miller's team recognized that they were using JTF-GTMO operational procedures and interrogation authorities as baselines for its observations and recommendations. There is a strong argument that the intelligence value of detainees held at JTF-Guantanamo (GTMO) is different than that of the detainees/internees held at Abu Ghraib (BCCF) and other detention facilities in Iraq. Currently, there are a large number of Iraqi criminals held at Abu Ghraib (BCCF). These are not believed to be international terrorists or members of Al Qaida, Anser Al Islam, Taliban, and other international terrorist organizations. (ANNEX 20) 2. (S/NF) The recommendations of MG Miller's team that the "guard force" be actively engaged in setting the conditions for successful exploitation of the internees would appear to be in conflict with the recommendations of MG Ryder's Team and AR 190-8 that military police "do not participate in military intelligence supervised interrogation sessions." The Ryder Report concluded that the OEF template whereby military police actively set the favorable conditions for subsequent interviews runs counter to the smooth operation of a detention facility. (ANNEX 20) REPORT ON DETENTION AND CORRECTIONS IN IRAQ (MG RYDER'S REPORT) 1. (U) MG Ryder and his assessment team conducted a comprehensive review of the entire detainee and corrections system in Iraq and provided recommendations addressing each of the following areas as requested by the Commander CJTF-7: a. (U) Detainee and corrections system management b. (U) Detainee management, including detainee movement, segregation, and accountability c. (U) Means of command and control of the detention and corrections system d. (U) Integration of military detention and corrections with the Coalition Provisional Authority (CPA) and adequacy of plans for transition to an Iraqi- run corrections system e. (U) Detainee medical care and health management f. (U) Detention facilities that meet required health, hygiene, and sanitation standards g. (U) Court integration and docket management for criminal detainees h. (U) Detainee legal processing i. (U) Detainee databases and records, including integration with law enforcement and court databases (ANNEX 19) 2. (U) Many of the findings and recommendations of MG Ryder's team are beyond the scope of this investigation. However, several important findings are clearly relevant to this inquiry and are summarized below (emphasis is added in certain areas): A. (U) Detainee Management (including movement, segregation, and accountability) 1. (U) There is a wide variance in standards and approaches at the various detention facilities. Several Division/Brigade collection points and US monitored Iraqi prisons had flawed or insufficiently detailed use of force and other standing operating procedures or policies (e.g. weapons in the facility, improper restraint techniques, detainee management, etc.) Though, there were no military police units purposely applying inappropriate confinement practices. (ANNEX 19) 2. (U) Currently, due to lack of adequate Iraqi facilities, Iraqi criminals (generally Iraqi-on-Iraqi crimes) are detained with security internees (generally Iraqi-on-Coalition offenses) and EPWs in the same facilities, though segregated in different cells/compounds. (ANNEX 19) 3. (U) The management of multiple disparate groups of detained people in a single location by members of the same unit invites confusion about handling, processing, and treatment, and typically facilitates the transfer of information between different categories of detainees. (ANNEX 19) 4. (U) The 800th MP (I/R) units did not receive Internment/Resettlement (I/R) and corrections specific training during their mobilization period. Corrections training is only on the METL of two MP (I/R) Confinement Battalions throughout the Army, one currently serving in Afghanistan, and elements of the other are at Camp Arifjan, Kuwait. MP units supporting JTF-GTMO received ten days of training in detention facility operations, to include two days of unarmed self-defense, training in interpersonal communication skills, forced cell moves, and correctional officer safety. (ANNEX 19) B. (U) Means of Command and Control of the Detention and Corrections System 1. (U) The 800th MP Brigade was originally task organized with eight MP(I/R) Battalions consisting of both MP Guard and Combat Support companies. Due to force rotation plans, the 800th redeployed two Battalion HHCs in December 2003, the 115th MP Battalion and the 324th MP Battalion. In December 2003, the 400th MP Battalion was relieved of its mission and redeployed in January 2004. The 724th MP Battalion redeployed on 11 February 2004 and the remainder is scheduled to redeploy in March and April 2004. They are the 310th MP Battalion, 320th MP Battalion, 530th MP Battalion, and 744th MP Battalion. The units that remain are generally understrength, as Reserve Component units do not have an individual personnel replacement system to mitigate medical losses or the departure of individual Soldiers that have reached 24 months of Federal active duty in a five-year period. (ANNEX 19) 2. (U) The 800th MP Brigade (I/R) is currently a CFLCC asset, TACON to CJTF-7 to conduct Internment/Resettlement (I/R) operations in Iraq. All detention operations are conducted in the CJTF-7 AO; Camps Ganci, Vigilant, Bucca, TSP Whitford, and a separate High Value Detention (HVD) site. (ANNEX 19) 3. (U) The 800th MP Brigade has experienced challenges adapting its task organizational structure, training, and equipment resources from a unit designed to conduct standard EPW operations in the COMMZ (Kuwait). Further, the doctrinally trained MP Soldier-to-detainee population ratio and facility layout templates are predicated on a compliant, self-disciplining EPW population, and not criminals or high-risk security internees. (ANNEX 19) 4. (U) EPWs and Civilian Internees should receive the full protections of the Geneva Conventions, unless the denial of these protections is due to specifically articulated military necessity (e.g., no visitation to preclude the direction of insurgency operations). (ANNEXES 19 and 24) 5. (U) AR 190-8, Enemy Prisoners of War, Retained Personnel, Civilian Internees, and other Detainees, FM 3-19.40, Military Police Internment and Resettlement Operations, and FM 34-52, Intelligence Interrogations, require military police to provide an area for intelligence collection efforts within EPW facilities. Military Police, though adept at passive collection of intelligence within a facility, do not participate in Military Intelligence supervised interrogation sessions. Recent intelligence collection in support of Operation Enduring Freedom posited a template whereby military police actively set favorable conditions for subsequent interviews. Such actions generally run counter to the smooth operation of a detention facility, attempting to maintain its population in a compliant and docile state. The 800th MP Brigade has not been directed to change its facility procedures to set the conditions for MI interrogations, nor participate in those interrogations. (ANNEXES 19 and 21-23) 6. MG Ryder's Report also made the following, inter alia, near-term and mid-term recommendations regarding the command and control of detainees: a. (U) Align the release process for security internees with DoD Policy. The process of screening security internees should include intelligence findings, interrogation results, and current threat assessment. b. (U) Determine the scope of intelligence collection that will occur at Camp Vigilant. Refurbish the Northeast Compound to separate the screening operation from the Iraqi run Baghdad Central Correctional Facility. Establish procedures that define the role of military police Soldiers securing the compound, clearly separating the actions of the guards from those of the military intelligence personnel. c. (U) Consolidate all Security Internee Operations, except the MEK security mission, under a single Military Police Brigade Headquarters for OIF 2. d. (U) Insist that all units identified to rotate into the Iraqi Theater of Operations (ITO) to conduct internment and confinement operations in support of OIF 2 be organic to CJTF-7. (ANNEX 19) IO COMMENTS REGARDING MG RYDER'S REPORT 1. (U) The objective of MG Ryder's Team was to observe detention and prison operations, identify potential systemic and human rights issues, and provide near-term, mid-term, and long-term recommendations to improve CJTF-7 operations and transition of the Iraqi prison system from US military control/oversight to the Coalition Provisional Authority and eventually to the Iraqi Government. The Findings and Recommendations of MG Ryder's Team are thorough and precise and should be implemented immediately. (ANNEX 19) 2. (U) Unfortunately, many of the systemic problems that surfaced during MG Ryder's Team's assessment are the very same issues that are the subject of this investigation. In fact, many of the abuses suffered by detainees occurred during, or near to, the time of that assessment. As will be pointed out in detail in subsequent portions of this report, I disagree with the conclusion of MG Ryder's Team in one critical aspect, that being its conclusion that the 800th MP Brigade had not been asked to change its facility procedures to set the conditions for MI interviews. While clearly the 800th MP Brigade and its commanders were not tasked to set conditions for detainees for subsequent MI interrogations, it is obvious from a review of comprehensive CID interviews of suspects and witnesses that this was done at lower levels. (ANNEX 19) 3. (U) I concur fully with MG Ryder's conclusion regarding the effect of AR 190-8. Military Police, though adept at passive collection of intelligence within a facility, should not participate in Military Intelligence supervised interrogation sessions. Moreover, Military Police should not be involved with setting "favorable conditions" for subsequent interviews. These actions, as will be outlined in this investigation, clearly run counter to the smooth operation of a detention facility. (ANNEX 19) PRELIMINARY INVESTIGATIVE ACTIONS 1. (U) Following our review of MG Ryder's Report and MG Miller's Report, my investigation team immediately began an in-depth review of all available documents regarding the 800th MP Brigade. We reviewed in detail the voluminous CID investigation regarding alleged detainee abuses at detention facilities in Iraq, particularly the Abu Ghraib (BCCF) Detention Facility. We analyzed approximately fifty witness statements from military police and military intelligence personnel, potential suspects, and detainees. We reviewed numerous photos and videos of actual detainee abuse taken by detention facility personnel, which are now in the custody and control of the US Army Criminal Investigation Command and the CJTF-7 prosecution team. The photos and videos are not contained in this investigation. We obtained copies of the 800th MP Brigade roster, rating chain, and assorted internal investigations and disciplinary actions involving that command for the past several months. (All ANNEXES Reviewed by Investigation Team) 2. (U) In addition to military police and legal officers from the CFLCC PMO and SJA Offices we also obtained the services of two individuals who are experts in military police detention practices and training. These were LTC Timothy Weathersbee, Commander, 705th MP Battalion, United States Disciplinary Barracks, Fort Leavenworth, and SFC Edward Baldwin, Senior Corrections Advisor, US Army Military Police School, Fort Leonard Wood. I also requested and received the services of Col (Dr) Henry Nelson, a trained US Air Force psychiatrist assigned to assist my investigation team. (ANNEX 4) 3. (U) In addition to MG Ryder's and MG Miller's Reports, the team reviewed numerous reference materials including the 12 October 2003 CJTF-7 Interrogation and Counter- Resistance Policy, the AR 15-6 Investigation on Riot and Shootings at Abu Ghraib on 24 November 2003, the 205th MI Brigade's Interrogation Rules of Engagement (IROE), facility staff logs/journals and numerous records of AR 15-6 investigations and Serious Incident Reports (SIRs) on detainee escapes/shootings and disciplinary matters from the 800th MP Brigade. (ANNEXES 5-20, 37, 93, and 94) 4. (U) On 2 February 2004, I took my team to Baghdad for a one-day inspection of the Abu Ghraib Prison (BCCF) and the High Value Detainee (HVD) Complex in order to become familiar with those facilities. We also met with COL Jerry Mocello, Commander, 3rd MP Criminal Investigation Group (CID), COL Dave Quantock, Commander, 16th MP Brigade, COL Dave Phillips, Commander, 89th MP Brigade, and COL Ed Sannwaldt, CJTF-7 Provost Marshal. On 7 February 2004, the team visited the Camp Bucca Detention Facility to familiarize itself with the facility and operating structure. In addition, on 6 and 7 February 2004, at Camp Doha, Kuwait, we conducted extensive training sessions on approved detention practices. We continued our preparation by reviewing the ongoing CID investigation and were briefed by the Special Agent in Charge, CW2 Paul Arthur. We refreshed ourselves on the applicable reference materials within each team member's area of expertise, and practiced investigative techniques. I met with the team on numerous occasions to finalize appropriate witness lists, review existing witness statements, arrange logistics, and collect potential evidence. We also coordinated with CJTF-7 to arrange witness attendance, force protection measures, and general logistics for the team's move to Baghdad on 8 February 2004. (ANNEXES 4 and 25) 5. (U) At the same time, due to the Transfer of Authority on 1 February 2004 between III Corps and V Corps, and the upcoming demobilization of the 800th MP Brigade Command, I directed that several critical witnesses who were preparing to leave the theater remain at Camp Arifjan, Kuwait until they could be interviewed (ANNEX 29). My team deployed to Baghdad on 8 February 2004 and conducted a series of interviews with a variety of witnesses (ANNEX 30). We returned to Camp Doha, Kuwait on 13 February 2004. On 14 and 15 February we interviewed a number of witnesses from the 800th MP Brigade. On 17 February we returned to Camp Bucca, Iraq to complete interviews of witnesses at that location. From 18 February thru 28 February we collected documents, compiled references, did follow-up interviews, and completed a detailed analysis of the volumes of materials accumulated throughout our investigation. On 29 February we finalized our executive summary and out-briefing slides. On 9 March we submitted the AR 15-6 written report with findings and recommendations to the CFLCC Deputy SJA, LTC Mark Johnson, for a legal sufficiency review. The out-brief to the appointing authority, LTG McKiernan, took place on 3 March 2004. (ANNEXES 26 and 45-91) FINDINGS AND RECOMMENDATIONS (PART ONE) (U) The investigation should inquire into all of the facts and circumstances surrounding recent allegations of detainee abuse, specifically, allegations of maltreatment at the Abu Ghraib Prison (Baghdad Central Confinement Facility). 1. (U) The US Army Criminal Investigation Command (CID), led by COL Jerry Mocello, and a team of highly trained professional agents have done a superb job of investigating several complex and extremely disturbing incidents of detainee abuse at the Abu Ghraib Prison. They conducted over 50 interviews of witnesses, potential criminal suspects, and detainees. They also uncovered numerous photos and videos portraying in graphic detail detainee abuse by Military Police personnel on numerous occasions from October to December 2003. Several potential suspects rendered full and complete confessions regarding their personal involvement and the involvement of fellow Soldiers in this abuse. Several potential suspects invoked their rights under Article 31 of the Uniform Code of Military Justice (UCMJ) and the 5th Amendment of the U.S. Constitution. (ANNEX 25) 2. (U) In addition to a comprehensive and exhaustive review of all of these statements and documentary evidence, we also interviewed numerous officers, NCOs, and junior enlisted Soldiers in the 800th MP Brigade, as well as members of the 205th Military Intelligence Brigade working at the prison. We did not believe it was necessary to re-interview all the numerous witnesses who had previously provided comprehensive statements to CID, and I have adopted those statements for the purposes of this investigation. (ANNEXES 26, 34, 35, and 45-91) REGARDING PART ONE OF THE INVESTIGATION, I MAKE THE FOLLOWING SPECIFIC FINDINGS OF FACT: 1. (U) That Forward Operating Base (FOB) Abu Ghraib (BCCF) provides security of both criminal and security detainees at the Baghdad Central Correctional Facility, facilitates the conducting of interrogations for CJTF-7, supports other CPA operations at the prison, and enhances the force protection/quality of life of Soldiers assigned in order to ensure the success of ongoing operations to secure a free Iraq. (ANNEX 31) 2. (U) That the Commander, 205th Military Intelligence Brigade, was designated by CJTF-7 as the Commander of FOB Abu Ghraib (BCCF) effective 19 November 2003. That the 205th MI Brigade conducts operational and strategic interrogations for CJTF-7. That from 19 November 2003 until Transfer of Authority (TOA) on 6 February 2004, COL Thomas M. Pappas was the Commander of the 205th MI Brigade and the Commander of FOB Abu Ghraib (BCCF). (ANNEX 31) 3. (U) That the 320th Military Police Battalion of the 800th MP Brigade is responsible for the Guard Force at Camp Ganci, Camp Vigilant, & Cellblock 1 of FOB Abu Ghraib (BCCF). That from February 2003 to until he was suspended from his duties on 17 January 2004, LTC Jerry Phillabaum served as the Battalion Commander of the 320th MP Battalion. That from December 2002 until he was suspended from his duties, on 17 January 2004, CPT Donald Reese served as the Company Commander of the 372nd MP Company, which was in charge of guarding detainees at FOB Abu Ghraib. I further find that both the 320th MP Battalion and the 372nd MP Company were located within the confines of FOB Abu Ghraib. (ANNEXES 32 and 45) 4. (U) That from July of 2003 to the present, BG Janis L. Karpinski was the Commander of the 800th MP Brigade. (ANNEX 45) 5. (S) That between October and December 2003, at the Abu Ghraib Confinement Facility (BCCF), numerous incidents of sadistic, blatant, and wanton criminal abuses were inflicted on several detainees. This systemic and illegal abuse of detainees was intentionally perpetrated by several members of the military police guard force (372nd Military Police Company, 320th Military Police Battalion, 800th MP Brigade), in Tier (section) 1-A of the Abu Ghraib Prison (BCCF). The allegations of abuse were substantiated by detailed witness statements (ANNEX 26) and the discovery of extremely graphic photographic evidence. Due to the extremely sensitive nature of these photographs and videos, the ongoing CID investigation, and the potential for the criminal prosecution of several suspects, the photographic evidence is not included in the body of my investigation. The pictures and videos are available from the Criminal Investigative Command and the CTJF-7 prosecution team. In addition to the aforementioned crimes, there were also abuses committed by members of the 325th MI Battalion, 205th MI Brigade, and Joint Interrogation and Debriefing Center (JIDC). Specifically, on 24 November 2003, SPC Luciana Spencer, 205th MI Brigade, sought to degrade a detainee by having him strip and returned to cell naked. (ANNEXES 26 and 53) 6. (S) I find that the intentional abuse of detainees by military police personnel included the following acts: a. (S) Punching, slapping, and kicking detainees; jumping on their naked feet; b. (S) Videotaping and photographing naked male and female detainees; c. (S) Forcibly arranging detainees in various sexually explicit positions for photographing; d. (S) Forcing detainees to remove their clothing and keeping them naked for several days at a time; e. (S) Forcing naked male detainees to wear women's underwear; f. (S) Forcing groups of male detainees to masturbate themselves while being photographed and videotaped; g. (S) Arranging naked male detainees in a pile and then jumping on them; h. (S) Positioning a naked detainee on a MRE Box, with a sandbag on his head, and attaching wires to his fingers, toes, and penis to simulate electric torture; i. (S) Writing "I am a Rapest" (sic) on the leg of a detainee alleged to have forcibly raped a 15-year old fellow detainee, and then photographing him naked; j. (S) Placing a dog chain or strap around a naked detainee's neck and having a female Soldier pose for a picture; k. (S) A male MP guard having sex with a female detainee; l. (S) Using military working dogs (without muzzles) to intimidate and frighten detainees, and in at least one case biting and severely injuring a detainee; m. (S) Taking photographs of dead Iraqi detainees. (ANNEXES 25 and 26) 7. (U) These findings are amply supported by written confessions provided by several of the suspects, written statements provided by detainees, and witness statements. In reaching my findings, I have carefully considered the pre-existing statements of the following witnesses and suspects (ANNEX 26): a. (U) SPC Jeremy Sivits, 372nd MP Company - Suspect b. (U) SPC Sabrina Harman, 372nd MP Company - Suspect c. (U) SGT Javal S. Davis, 372nd MP Company - Suspect c. (U) PFC Lynndie R. England, 372nd MP Company - Suspect d. (U) Adel Nakhla, Civilian Translator, Titan Corp., Assigned to the 205th MI Brigade- Suspect e. (U) SPC Joseph M. Darby, 372nd MP Company f. (U) SGT Neil A. Wallin, 109th Area Support Medical Battalion g (U) SGT Samuel Jefferson Provance, 302nd MI Battalion h (U) Torin S. Nelson, Contractor, Titan Corp., Assigned to the 205th MI Brigade j. (U) CPL Matthew Scott Bolanger, 372nd MP Company k. (U) SPC Mathew C. Wisdom, 372nd MP Company l. (U) SSG Reuben R. Layton, Medic, 109th Medical Detachment m. (U) SPC John V. Polak, 229th MP Company 8. (U) In addition, several detainees also described the following acts of abuse, which under the circumstances, I find credible based on the clarity of their statements and supporting evidence provided by other witnesses (ANNEX 26): a. (U) Breaking chemical lights and pouring the phosphoric liquid on detainees; b. (U) Threatening detainees with a charged 9mm pistol; c. (U) Pouring cold water on naked detainees; d. (U) Beating detainees with a broom handle and a chair; e. (U) Threatening male detainees with rape; f. (U) Allowing a military police guard to stitch the wound of a detainee who was injured after being slammed against the wall in his cell; g. (U) Sodomizing a detainee with a chemical light and perhaps a broom stick. h. (U) Using military working dogs to frighten and intimidate detainees with threats of attack, and in one instance actually biting a detainee. 9. (U) I have carefully considered the statements provided by the following detainees, which under the circumstances I find credible based on the clarity of their statements and supporting evidence provided by other witnesses: a. (U) Amjed Isail Waleed, Detainee # 151365 b. (U) Hiadar Saber Abed Miktub-Aboodi, Detainee # 13077 c. (U) Huessin Mohssein Al-Zayiadi, Detainee # 19446 d. (U) Kasim Mehaddi Hilas, Detainee # 151108 e. (U) Mohanded Juma Juma (sic), Detainee # 152307 f. (U) Mustafa Jassim Mustafa, Detainee # 150542 g. (U) Shalan Said Alsharoni, Detainee, # 150422 h. (U) Abd Alwhab Youss, Detainee # 150425 i. (U) Asad Hamza Hanfosh, Detainee # 152529 j. (U) Nori Samir Gunbar Al-Yasseri, Detainee # 7787 k. (U) Thaar Salman Dawod, Detainee # 150427 l. (U) Ameen Sa'eed Al-Sheikh, Detainee # 151362 m. (U) Abdou Hussain Saad Faleh, Detainee # 18470 (ANNEX 26) 10. (U) I find that contrary to the provision of AR 190-8, and the findings found in MG Ryder's Report, Military Intelligence (MI) interrogators and Other US Government Agency's (OGA) interrogators actively requested that MP guards set physical and mental conditions for favorable interrogation of witnesses. Contrary to the findings of MG Ryder's Report, I find that personnel assigned to the 372nd MP Company, 800th MP Brigade were directed to change facility procedures to "set the conditions" for MI interrogations. I find no direct evidence that MP personnel actually participated in those MI interrogations. (ANNEXES 19, 21, 25, and 26). 11. (U) I reach this finding based on the actual proven abuse that I find was inflicted on detainees and by the following witness statements. (ANNEXES 25 and 26): a. (U) SPC Sabrina Harman, 372nd MP Company, stated in her sworn statement regarding the incident where a detainee was placed on a box with wires attached to his fingers, toes, and penis, "that her job was to keep detainees awake." She stated that MI was talking to CPL Grainer. She stated: "MI wanted to get them to talk. It is Grainer and Frederick's job to do things for MI and OGA to get these people to talk." b. (U) SGT Javal S. Davis, 372nd MP Company, stated in his sworn statement as follows: "I witnessed prisoners in the MI hold section, wing 1A being made to do various things that I would question morally. In Wing 1A we were told that they had different rules and different SOP for treatment. I never saw a set of rules or SOP for that section just word of mouth. The Soldier in charge of 1A was Corporal Granier. He stated that the Agents and MI Soldiers would ask him to do things, but nothing was ever in writing he would complain (sic)." When asked why the rules in 1A/1B were different than the rest of the wings, SGT Davis stated: "The rest of the wings are regular prisoners and 1A/B are Military Intelligence (MI) holds." When asked why he did not inform his chain of command about this abuse, SGT Davis stated: " Because I assumed that if they were doing things out of the ordinary or outside the guidelines, someone would have said something. Also the wing belongs to MI and it appeared MI personnel approved of the abuse." SGT Davis also stated that he had heard MI insinuate to the guards to abuse the inmates. When asked what MI said he stated: "Loosen this guy up for us." Make sure he has a bad night." "Make sure he gets the treatment." He claimed these comments were made to CPL Granier and SSG Frederick. Finally, SGT Davis stated that (sic): "the MI staffs to my understanding have been giving Granier compliments on the way he has been handling the MI holds. Example being statements like, "Good job, they're breaking down real fast. They answer every question. They're giving out good information, Finally, and Keep up the good work . Stuff like that." c. (U) SPC Jason Kennel, 372nd MP Company, was asked if he were present when any detainees were abused. He stated: "I saw them nude, but MI would tell us to take away their mattresses, sheets, and clothes." He could not recall who in MI had instructed him to do this, but commented that, "if they wanted me to do that they needed to give me paperwork." He was later informed that "we could not do anything to embarrass the prisoners." d. (U) Mr. Adel L. Nakhla, a US civilian contract translator was questioned about several detainees accused of rape. He observed (sic): "They (detainees) were all naked, a bunch of people from MI, the MP were there that night and the inmates were ordered by SGT Granier and SGT Frederick ordered the guys while questioning them to admit what they did. They made them do strange exercises by sliding on their stomach, jump up and down, throw water on them and made them some wet, called them all kinds of names such as "gays" do they like to make love to guys, then they handcuffed their hands together and their legs with shackles and started to stack them on top of each other by insuring that the bottom guys penis will touch the guy on tops butt." e. (U) SPC Neil A Wallin, 109th Area Support Medical Battalion, a medic testified that: "Cell 1A was used to house high priority detainees and cell 1B was used to house the high risk or trouble making detainees. During my tour at the prison I observed that when the male detainees were first brought to the facility, some of them were made to wear female underwear, which I think was to somehow break them down." 12. (U) I find that prior to its deployment to Iraq for Operation Iraqi Freedom, the 320th MP Battalion and the 372nd MP Company had received no training in detention/internee operations. I also find that very little instruction or training was provided to MP personnel on the applicable rules of the Geneva Convention Relative to the Treatment of Prisoners of War, FM 27-10, AR 190-8, or FM 3-19.40. Moreover, I find that few, if any, copies of the Geneva Conventions were ever made available to MP personnel or detainees. (ANNEXES 21- 24, 33, and multiple witness statements) 13. (U) Another obvious example of the Brigade Leadership not communicating with its Soldiers or ensuring their tactical proficiency concerns the incident of detainee abuse that occurred at Camp Bucca, Iraq, on May 12, 2003. Soldiers from the 223rd MP Company reported to the 800th MP Brigade Command at Camp Bucca, that four Military Police Soldiers from the 320th MP Battalion had abused a number of detainees during inprocessing at Camp Bucca. An extensive CID investigation determined that four soldiers from the 320th MP Battalion had kicked and beaten these detainees following a transport mission from Talil Air Base. (ANNEXES 34 and 35) 14. (U) Formal charges under the UCMJ were preferred against these Soldiers and an Article-32 Investigation conducted by LTC Gentry. He recommended a general court martial for the four accused, which BG Karpinski supported. Despite this documented abuse, there is no evidence that BG Karpinski ever attempted to remind 800th MP Soldiers of the requirements of the Geneva Conventions regarding detainee treatment or took any steps to ensure that such abuse was not repeated. Nor is there any evidence that LTC(P) Phillabaum, the commander of the Soldiers involved in the Camp Bucca abuse incident, took any initiative to ensure his Soldiers were properly trained regarding detainee treatment. (ANNEXES 35 and 62) RECOMMENDATIONS AS TO PART ONE OF THE INVESTIGATION: 1. (U) Immediately deploy to the Iraq Theater an integrated multi-discipline Mobile Training Team (MTT) comprised of subject matter experts in internment/resettlement operations, international and operational law, information technology, facility management, interrogation and intelligence gathering techniques, chaplains, Arab cultural awareness, and medical practices as it pertains to I/R activities. This team needs to oversee and conduct comprehensive training in all aspects of detainee and confinement operations. 2. (U) That all military police and military intelligence personnel involved in any aspect of detainee operations or interrogation operations in CJTF-7, and subordinate units, be immediately provided with training by an international/operational law attorney on the specific provisions of The Law of Land Warfare FM 27-10, specifically the Geneva Convention Relative to the Treatment of Prisoners of War, Enemy Prisoners of War, Retained Personnel, Civilian Internees, and Other Detainees, and AR 190-8. 3. (U) That a single commander in CJTF-7 be responsible for overall detainee operations throughout the Iraq Theater of Operations. I also recommend that the Provost Marshal General of the Army assign a minimum of two (2) subject matter experts, one officer and one NCO, to assist CJTF-7 in coordinating detainee operations. 4. (U) That detention facility commanders and interrogation facility commanders ensure that appropriate copies of the Geneva Convention Relative to the Treatment of Prisoners of War and notice of protections be made available in both English and the detainees' language and be prominently displayed in all detention facilities. Detainees with questions regarding their treatment should be given the full opportunity to read the Convention. 5. (U) That each detention facility commander and interrogation facility commander publish a complete and comprehensive set of Standing Operating Procedures (SOPs) regarding treatment of detainees, and that all personnel be required to read the SOPs and sign a document indicating that they have read and understand the SOPs. 6. (U) That in accordance with the recommendations of MG Ryder's Assessment Report, and my findings and recommendations in this investigation, all units in the Iraq Theater of Operations conducting internment/confinement/detainment operations in support of Operation Iraqi Freedom be OPCON for all purposes, to include action under the UCMJ, to CJTF-7. 7. (U) Appoint the C3, CJTF as the staff proponent for detainee operations in the Iraq Joint Operations Area (JOA). (MG Tom Miller, C3, CJTF-7, has been appointed by COMCJTF-7). 8. (U) That an inquiry UP AR 381-10, Procedure 15 be conducted to determine the extent of culpability of Military Intelligence personnel, assigned to the 205th MI Brigade and the Joint Interrogation and Debriefing Center (JIDC) regarding abuse of detainees at Abu Ghraib (BCCF). 9. (U) That it is critical that the proponent for detainee operations is assigned a dedicated Senior Judge Advocate, with specialized training and knowledge of international and operational law, to assist and advise on matters of detainee operations. FINDINGS AND RECOMMENDATIONS (PART TWO) (U) The Investigation inquire into detainee escapes and accountability lapses as reported by CJTF-7, specifically allegations concerning these events at the Abu Ghraib Prison: REGARDING PART TWO OF THE INVESTIGATION, I MAKE THE FOLLOWING SPECIFIC FINDINGS OF FACT: 1. The 800th MP Brigade was responsible for theater-wide Internment and Resettlement (I/R) operations. (ANNEXES 45 and 95) 2. (U) The 320th MP Battalion, 800th MP Brigade was tasked with detainee operations at the Abu Ghraib Prison Complex during the time period covered in this investigation. (ANNEXES 41, 45, and 59) 3. (U) The 310th MP Battalion, 800th MP Brigade was tasked with detainee operations and Forward Operating Base (FOB) Operations at the Camp Bucca Detention Facility until TOA on 26 February 2004. (ANNEXES 41 and 52) 4. (U) The 744th MP Battalion, 800th MP Brigade was tasked with detainee operations and FOB Operations at the HVD Detention Facility until TOA on 4 March 2004. (ANNEXES 41 and 55) 5. (U) The 530th MP Battalion, 800th MP Brigade was tasked with detainee operations and FOB Operations at the MEK holding facility until TOA on 15 March 2004. (ANNEXES 41 and 97) 6. (U) Detainee operations include accountability, care, and well being of Enemy Prisoners of War, Retained Person, Civilian Detainees, and Other Detainees, as well as Iraqi criminal prisoners. (ANNEX 22) 7. (U) The accountability for detainees is doctrinally an MP task IAW FM 3-19.40. (ANNEX 22) 8. (U) There is a general lack of knowledge, implementation, and emphasis of basic legal, regulatory, doctrinal, and command requirements within the 800th MP Brigade and its subordinate units. (Multiple witness statements in ANNEXES 45-91). 9. (U) The handling of detainees and criminal prisoners after in-processing was inconsistent from detention facility to detention facility, compound to compound, encampment to encampment, and even shift to shift throughout the 800th MP Brigade AOR. (ANNEX 37) 10. (U) Camp Bucca, operated by the 310th MP Battalion, had a "Criminal Detainee In-Processing SOP" and a "Training Outline" for transferring and releasing detainees, which appears to have been followed. (ANNEXES 38 and 52) 11. (U) Incoming and outgoing detainees are being documented in the National Detainee Reporting System (NDRS) and Biometric Automated Toolset System (BATS) as required by regulation at all detention facilities. However, it is underutilized and often does not give a "real time" accurate picture of the detainee population due to untimely updating. (ANNEX 56) 12. (U) There was a severe lapse in the accountability of detainees at the Abu Ghraib Prison Complex. The 320th MP Battalion used a self-created "change sheet" to document the transfer of a detainee from one location to another. For proper accountability, it is imperative that these change sheets be processed and the detainee manifest be updated within 24 hours of movement. At Abu Ghraib, this process would often take as long as 4 days to complete. This lag- time resulted in inaccurate detainee Internment Serial Number (ISN) counts, gross differences in the detainee manifest and the actual occupants of an individual compound, and significant confusion of the MP Soldiers. The 320th MP Battalion S-1, CPT Theresa Delbalso, and the S-3, MAJ David DiNenna, explained that this breakdown was due to the lack of manpower to process change sheets in a timely manner. (ANNEXES 39 and 98) 13. (U) The 320th Battalion TACSOP requires detainee accountability at least 4 times daily at Abu Ghraib. However, a detailed review of their operational journals revealed that these accounts were often not done or not documented by the unit. Additionally, there is no indication that accounting errors or the loss of a detainee in the accounting process triggered any immediate corrective action by the Battalion TOC. (ANNEX 44) 14. (U) There is a lack of standardization in the way the 320th MP Battalion conducted physical counts of their detainees. Each compound within a given encampment did their headcounts differently. Some compounds had detainees line up in lines of 10, some had them sit in rows, and some moved all the detainees to one end of the compound and counted them as they passed to the other end of the compound. (ANNEX 98) 15. (U) FM 3-19.40 outlines the need for 2 roll calls (100% ISN band checks) per day. The 320th MP Battalion did this check only 2 times per week. Due to the lack of real-time updates to the system, these checks were regularly inaccurate. (ANNEXES 22 and 98) 16. (U) The 800th MP Brigade and subordinate units adopted non-doctrinal terms such as "band checks," "roll-ups," and "call-ups," which contributed to the lapses in accountability and confusion at the soldier level. (ANNEXES 63, 88, and 98) 17. (U) Operational journals at the various compounds and the 320th Battalion TOC contained numerous unprofessional entries and flippant comments, which highlighted the lack of discipline within the unit. There was no indication that the journals were ever reviewed by anyone in their chain of command. (ANNEX 37) 18. (U) Accountability SOPs were not fully developed and standing TACSOPs were widely ignored. Any SOPs that did exist were not trained on, and were never distributed to the lowest level. Most procedures were shelved at the unit TOC, rather than at the subordinate units and guards mount sites. (ANNEXES 44, 67, 71, and 85) 19. (U) Accountability and facility operations SOPs lacked specificity, implementation measures, and a system of checks and balances to ensure compliance. (ANNEXES 76 and 82) 20. (U) Basic Army Doctrine was not widely referenced or utilized to develop the accountability practices throughout the 800th MP Brigade's subordinate units. Daily processing, accountability, and detainee care appears to have been made up as the operations developed with reliance on, and guidance from, junior members of the unit who had civilian corrections experience. (ANNEX 21) 21. (U) Soldiers were poorly prepared and untrained to conduct I/R operations prior to deployment, at the mobilization site, upon arrival in theater, and throughout their mission. (ANNEXES 62, 63, and 69) 22. (U) The documentation provided to this investigation identified 27 escapes or attempted escapes from the detention facilities throughout the 800th MP Brigade's AOR. Based on my assessment and detailed analysis of the substandard accountability process maintained by the 800th MP Brigade, it is highly likely that there were several more unreported cases of escape that were probably "written off" as administrative errors or otherwise undocumented. 1LT Lewis Raeder, Platoon Leader, 372nd MP Company, reported knowing about at least two additional escapes (one from a work detail and one from a window) from Abu Ghraib (BCCF) that were not documented. LTC Dennis McGlone, Commander, 744th MP Battalion, detailed the escape of one detainee at the High Value Detainee Facility who went to the latrine and then outran the guards and escaped. Lastly, BG Janis Karpinski, Commander, 800th MP Brigade, stated that there were more than 32 escapes from her holding facilities, which does not match the number derived from the investigation materials. (ANNEXES 5-10, 45, 55, and 71) 23. (U) The Abu Ghraib and Camp Bucca detention facilities are significantly over their intended maximum capacity while the guard force is undermanned and under resourced. This imbalance has contributed to the poor living conditions, escapes, and accountability lapses at the various facilities. The overcrowding of the facilities also limits the ability to identify and segregate leaders in the detainee population who may be organizing escapes and riots within the facility. (ANNEXES 6, 22, and 92) 24. (U) The screening, processing, and release of detainees who should not be in custody takes too long and contributes to the overcrowding and unrest in the detention facilities. There are currently three separate release mechanisms in the theater-wide internment operations. First, the apprehending unit can release a detainee if there is a determination that their continued detention is not warranted. Secondly, a criminal detainee can be released after it has been determined that the detainee has no intelligence value, and that their release would not be detrimental to society. BG Karpinski had signature authority to release detainees in this second category. Lastly, detainees accused of committing "Crimes Against the Coalition," who are held throughout the separate facilities in the CJTF-7 AOR, can be released upon a determination that they are of no intelligence value and no longer pose a significant threat to Coalition Forces. The release process for this category of detainee is a screening by the local US Forces Magistrate Cell and a review by a Detainee Release Board consisting of BG Karpinski, COL Marc Warren, SJA, CJTF-7, and MG Barbara Fast, C-2, CJTF-7. MG Fast is the "Detainee Release Authority" for detainees being held for committing crimes against the coalition. According to BG Karpinski, this category of detainee makes up more than 60% of the total detainee population, and is the fastest growing category. However, MG Fast, according to BG Karpinski, routinely denied the board's recommendations to release detainees in this category who were no longer deemed a threat and clearly met the requirements for release. According to BG Karpinski, the extremely slow and ineffective release process has significantly contributed to the overcrowding of the facilities. (ANNEXES 40, 45, and 46) 25. (U) After Action Reviews (AARs) are not routinely being conducted after an escape or other serious incident. No lessons learned seem to have been disseminated to subordinate units to enable corrective action at the lowest level. The Investigation Team requested copies of AARs, and none were provided. (Multiple Witness Statements) 26. (U) Lessons learned (i.e. Findings and Recommendations from various 15-6 Investigations concerning escapes and accountability lapses) were rubber stamped as approved and ordered implemented by BG Karpinski. There is no evidence that the majority of her orders directing the implementation of substantive changes were ever acted upon. Additionally, there was no follow-up by the command to verify the corrective actions were taken. Had the findings and recommendations contained within their own investigations been analyzed and actually implemented by BG Karpinski, many of the subsequent escapes, accountability lapses, and cases of abuse may have been prevented. (ANNEXES 5-10) 27. (U) The perimeter lighting around Abu Ghraib and the detention facility at Camp Bucca is inadequate and needs to be improved to illuminate dark areas that have routinely become avenues of escape. (ANNEX 6) 28. (U) Neither the camp rules nor the provisions of the Geneva Conventions are posted in English or in the language of the detainees at any of the detention facilities in the 800th MP Brigade's AOR, even after several investigations had annotated the lack of this critical requirement. (Multiple Witness Statements and the Personal Observations of the Investigation Team) 29. (U) The Iraqi guards at Abu Ghraib BCCF) demonstrate questionable work ethics and loyalties, and are a potentially dangerous contingent within the Hard-Site. These guards have furnished the Iraqi criminal inmates with contraband, weapons, and information. Additionally, they have facilitated the escape of at least one detainee. (ANNEX 8 and 26-SPC Polak's Statement) 30. (U) In general, US civilian contract personnel (Titan Corporation, CACI, etc.), third country nationals, and local contractors do not appear to be properly supervised within the detention facility at Abu Ghraib. During our on-site inspection, they wandered about with too much unsupervised free access in the detainee area. Having civilians in various outfits (civilian and DCUs) in and about the detainee area causes confusion and may have contributed to the difficulties in the accountability process and with detecting escapes. (ANNEX 51, Multiple Witness Statements, and the Personal Observations of the Investigation Team) 31. (U) SGM Marc Emerson, Operations SGM, 320th MP Battalion, contended that the Detainee Rules of Engagement (DROE) and the general principles of the Geneva Convention were briefed at every guard mount and shift change on Abu Ghraib. However, none of our witnesses, nor our personal observations, support his contention. I find that SGM Emerson was not a credible witness. (ANNEXES 45, 80, and the Personal Observations of the Investigation Team) 32. (U) Several interviewees insisted that the MP and MI Soldiers at Abu Ghraib (BCCF) received regular training on the basics of detainee operations; however, they have been unable to produce any verifying documentation, sign-in rosters, or soldiers who can recall the content of this training. (ANNEXES 59, 80, and the Absence of any Training Records) 33. (S/NF) The various detention facilities operated by the 800th MP Brigade have routinely held persons brought to them by Other Government Agencies (OGAs) without accounting for them, knowing their identities, or even the reason for their detention. The Joint Interrogation and Debriefing Center (JIDC) at Abu Ghraib called these detainees "ghost detainees." On at least one occasion, the 320th MP Battalion at Abu Ghraib held a handful of "ghost detainees" (6-8) for OGAs that they moved around within the facility to hide them from a visiting International Committee of the Red Cross (ICRC) survey team. This maneuver was deceptive, contrary to Army Doctrine, and in violation of international law. (ANNEX 53) 34. (U) The following riots, escapes, and shootings have been documented and reported to this Investigation Team. Although there is no data from other missions of similar size and duration to compare the number of escapes with, the most significant factors derived from these reports are twofold. First, investigations and SIRs lacked critical data needed to evaluate the details of each incident. Second, each investigation seems to have pointed to the same types of deficiencies; however, little to nothing was done to correct the problems and to implement the recommendations as was ordered by BG Karpinski, nor was there any command emphasis to ensure these deficiencies were corrected: a. (U) 4 June 03- This escape was mentioned in the 15-6 Investigation covering the 13 June 03 escape, recapture, and shootings of detainees at Camp Vigilant (320th MP Battalion). However, no investigation or additional information was provided as requested by this investigation team. (ANNEX 7) b. (U) 9 June 03- Riot and shootings of five detainees at Camp Cropper. (115th MP Battalion) Several detainees allegedly rioted after a detainee was subdued by MPs of the 115th MP Battalion after striking a guard in compound B of Camp Cropper. A 15-6 investigation by 1LT Magowan (115th MP Battalion, Platoon Leader) concluded that a detainee had acted up and hit an MP. After being subdued, one of the MPs took off his DCU top and flexed his muscles to the detainees, which further escalated the riot. The MPs were overwhelmed and the guards fired lethal rounds to protect the life of the compound MPs, whereby 5 detainees were wounded. Contributing factors were poor communications, no clear chain of command, facility-obstructed views of posted guards, the QRF did not have non-lethal equipment, and the SOP was inadequate and outdated. (ANNEX 5) c. (U) 12 June 03- Escape and recapture of detainee #8399, escape and shooting of detainee # 7166, and attempted escape of an unidentified detainee from Camp Cropper Holding Area (115th MP Battalion). Several detainees allegedly made their escape in the nighttime hours prior to 0300. A 15-6 investigation by CPT Wendlandt (115th MP Battalion, S-2) concluded that the detainees allegedly escaped by crawling under the wire at a location with inadequate lighting. One detainee was stopped prior to escape. An MP of the 115th MP Battalion search team recaptured detainee # 8399, and detainee # 7166 was shot and killed by a Soldier during the recapture process. Contributing factors were overcrowding, poor lighting, and the nature of the hardened criminal detainees at that location. It is of particular note that the command was informed at least 24 hours in advance of the upcoming escape attempt and started doing amplified announcements in Arabic stating the camp rules. The investigation pointed out that rules and guidelines were not posted in the camps in the detainees' native languages. (ANNEX 6) d. (U) 13 June 03- Escape and recapture of detainee # 8968 and the shooting of eight detainees at Abu Ghraib (BCCF) (320th MP Battalion). Several detainees allegedly attempted to escape at about 1400 hours from the Camp Vigilant Compound, Abu Ghraib (BCCF). A 15-6 investigation by CPT Wyks (400th MP Battalion, S-1) concluded that the detainee allegedly escaped by sliding under the wire while the tower guard was turned in the other direction. This detainee was subsequently apprehended by the QRF. At about 1600 the same day, 30-40 detainees rioted and pelted three interior MP guards with rocks. One guard was injured and the tower guards fired lethal rounds at the rioters injuring 7 and killing 1 detainee. (ANNEX 7) e. (U) 05 November 03- Escape of detainees # 9877 and # 10739 from Abu Ghraib (320th MP Battalion). Several detainees allegedly escaped at 0345 from the Hard-Site, Abu Ghraib (BCCF). An SIR was initiated by SPC Warner (320th MP Battalion, S-3 RTO). The SIR indicated that 2 criminal prisoners escaped through their cell window in tier 3A of the Hard-Site. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 11) f. (U) 07 November 03- Escape of detainee # 14239 from Abu Ghraib (320th MP Battalion). A detainee allegedly escaped at 1330 from Compound 2 of the Ganci Encampment, Abu Ghraib (BCCF). An SIR was initiated by SSG Hydro (320th MP Battalion, S-3 Asst. NCOIC). The SIR indicated that a detainee escaped from the North end of the compound and was discovered missing during distribution of the noon meal, but there is no method of escape listed in the SIR. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 12) g. (U) 08 November 03- Escape of detainees # 115089, # 151623, # 151624, # 116734, # 116735, and # 116738 from Abu Ghraib (320th MP Battalion). Several detainees allegedly escaped at 2022 from Compound 8 of the Ganci encampment, Abu Ghraib. An SIR was initiated by MAJ DiNenna (320th MP Battalion, S-3). The SIR indicated that 5-6 prisoners escaped from the North end of the compound, but there is no method of escape listed in the SIR. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 13) h. (U) 24 November 03- Riot and shooting of 12 detainees # 150216, #150894, #153096, 153165, #153169, #116361, #153399, #20257, #150348, #152616, #116146, and #152156 at Abu Ghraib (320th MP Battalion). Several detainees allegedly began to riot at about 1300 in all of the compounds at the Ganci encampment. This resulted in the shooting deaths of 3 detainees, 9 wounded detainees, and 9 injured US Soldiers. A 15-6 investigation by COL Bruce Falcone (220th MP Brigade, Deputy Commander) concluded that the detainees rioted in protest of their living conditions, that the riot turned violent, the use of non-lethal force was ineffective, and, after the 320th MP Battalion CDR executed "Golden Spike," the emergency containment plan, the use of deadly force was authorized. Contributing factors were lack of comprehensive training of guards, poor or non-existent SOPs, no formal guard-mount conducted prior to shift, no rehearsals or ongoing training, the mix of less than lethal rounds with lethal rounds in weapons, no AARs being conducted after incidents, ROE not posted and not understood, overcrowding, uniforms not standardized, and poor communication between the command and Soldiers. (ANNEX 8) i. (U) 24 November 03- Shooting of detainee at Abu Ghraib (320th MP Battalion). A detainee allegedly had a pistol in his cell and around 1830 an extraction team shot him with less than lethal and lethal rounds in the process of recovering the weapon. A 15-6 investigation by COL Bruce Falcone (220th Brigade, Deputy Commander) concluded that one of the detainees in tier 1A of the Hard Site had gotten a pistol and a couple of knives from an Iraqi Guard working in the encampment. Immediately upon receipt of this information, an ad-hoc extraction team consisting of MP and MI personnel conducted what they called a routine cell search, which resulted in the shooting of an MP and the detainee. Contributing factors were a corrupt Iraqi Guard, inadequate SOPs, the Detention ROE in place at the time was ineffective due to the numerous levels of authorization needed for use of lethal force, poorly trained MPs, unclear lanes of responsibility, and ambiguous relationship between the MI and MP assets. (ANNEX 8) j. (U) 13 December 03- Shooting by non-lethal means into crowd at Abu Ghraib (320th MP Battalion). Several detainees allegedly got into a detainee-on-detainee fight around 1030 in Compound 8 of the Ganci encampment, Abu Ghraib. An SIR was initiated by SSG Matash (320th MP Battalion, S-3 Section). The SIR indicated that there was a fight in the compound and the MPs used a non-lethal crowd- dispersing round to break up the fight, which was successful. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 14) k. (U) 13 December 03- Shooting by non-lethal means into crowd at Abu Ghraib (320th MP Battalion). Several detainees allegedly got into a detainee-on-detainee fight around 1120 in Compound 2 of the Ganci encampment, Abu Ghraib. An SIR was initiated by SSG Matash (320th MP Battalion, S-3 Section). The SIR indicated that there was a fight in the compound and the MPs used two non-lethal shots to disperse the crowd, which was successful. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 15) l. (U) 13 December 03- Shooting by non-lethal means into crowd at Abu Ghraib (320th MP Battalion). Approximately 30- 40 detainees allegedly got into a detainee-on-detainee fight around 1642 in Compound 3 of the Ganci encampment, Abu Ghraib (BCCF). An SIR was initiated by SSG Matash (320th MP Battalion, S-3 Section). The SIR indicates that there was a fight in the compound and the MPs used a non-lethal crowd- dispersing round to break up the fight, which was successful. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 16) m. (U) 17 December 03- Shooting by non-lethal means of detainee from Abu Ghraib (320th MP Battalion). Several detainees allegedly assaulted an MP at 1459 inside the Ganci Encampment, Abu Ghraib (BCCF). An SIR was initiated by SSG Matash (320th MP BRIGADE, S-3 Section). The SIR indicated that three detainees assaulted an MP, which resulted in the use of a non-lethal shot that calmed the situation. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 17) n. (U) 07 January 04- Escape of detainee #115032 from Camp Bucca (310th MP Battalion). A detainee allegedly escaped between the hours of 0445 and 0640 from Compound 12, of Camp Bucca. Investigation by CPT Kaires (310th MP Battalion S-3) and CPT Holsombeck (724th MP Battalion S-3) concluded that the detainee escaped through an undetected weakness in the wire. Contributing factors were inexperienced guards, lapses in accountability, complacency, lack of leadership presence, poor visibility, and lack of clear and concise communication between the guards and the leadership. (ANNEX 9) o. (U) 12 January 04- Escape of Detainees #115314 and #109950 as well as the escape and recapture of 5 unknown detainees at the Camp Bucca Detention Facility (310th MP Battalion). Several detainees allegedly escaped around 0300 from Compound 12, of Camp Bucca. An AR 15-6 Investigation by LTC Leigh Coulter (800th MP Brigade, OIC Camp Arifjan Detachment) concluded that three of the detainees escaped through the front holding cell during conditions of limited visibility due to fog. One of the detainees was noticed, shot with a non-lethal round, and returned to his holding compound. That same night, 4 detainees exited through the wire on the South side of the camp and were seen and apprehended by the QRF. Contributing factors were the lack of a coordinated effort for emplacement of MPs during implementation of the fog plan, overcrowding, and poor communications. (ANNEX 10) p. (U) 14 January 04- Escape of detainee #12436 and missing Iraqi guard from Hard-Site, Abu Ghraib (320th MP Battalion). A detainee allegedly escaped at 1335 from the Hard Site at Abu Ghraib (BCCF). An SIR was initiated by SSG Hydro (320th MP Battalion, S-3 Asst. NCOIC). The SIR indicates that an Iraqi guard assisted a detainee to escape by signing him out on a work detail and disappearing with him. At the time of the second SIR, neither missing person had been located. No information on findings, contributing factors, or corrective action has been provided to this investigation team. (ANNEX 99) q. (U) 26 January 04- Escape of detainees #s 115236, 116272, and 151933 from Camp Bucca (310th MP Battalion). Several Detainees allegedly escaped between the hours of 0440 and 0700 during a period of intense fog. Investigation by CPT Kaires (310th MP Battalion S-3) concluded that the detainees crawled under a fence when visibility was only 10- 15 meters due to fog. Contributing factors were the limited visibility (darkness under foggy conditions), lack of proper accountability reporting, inadequate number of guards, commencement of detainee feeding during low visibility operations, and poorly rested MPs. (ANNEX 18) 36. (U) As I have previously indicated, this investigation determined that there was virtually a complete lack of detailed SOPs at any of the detention facilities. Moreover, despite the fact that there were numerous reported escapes at detention facilities throughout Iraq (in excess of 35), AR 15-6 Investigations following these escapes were simply forgotten or ignored by the Brigade Commander with no dissemination to other facilities. After-Action Reports and Lessons Learned, if done at all, remained at individual facilities and were not shared among other commanders or soldiers throughout the Brigade. The Command never issued standard TTPs for handling escape incidents. (ANNEXES 5-10, Multiple Witness Statements, and the Personal Observations of the Investigation Team) RECOMMENDATIONS REGARDING PART TWO OF THE INVESTIGATION: 1. (U) ANNEX 100 of this investigation contains a detailed and referenced series of recommendations for improving the detainee accountability practices throughout the OIF area of operations. 2. (U) Accountability practices throughout any particular detention facility must be standardized and in accordance with applicable regulations and international law. 3. (U) The NDRS and BATS accounting systems must be expanded and used to their fullest extent to facilitate real time updating when detainees are moved and or transferred from one location to another. 4. (U) "Change sheets," or their doctrinal equivalent must be immediately processed and updated into the system to ensure accurate accountability. The detainee roll call or ISN counts must match the manifest provided to the compound guards to ensure proper accountability of detainees. 5. (U) Develop, staff, and implement comprehensive and detailed SOPs utilizing the lessons learned from this investigation as well as any previous findings, recommendations, and reports. 6. (U) SOPs must be written, disseminated, trained on, and understood at the lowest level. 7. (U) Iraqi criminal prisoners must be held in separate facilities from any other category of detainee. 8. (U) All of the compounds should be wired into the master manifest whereby MP Soldiers can account for their detainees in real time and without waiting for their change sheets to be processed. This would also have the change sheet serve as a way to check up on the accuracy of the manifest as updated by each compound. The BATS and NDRS system can be utilized for this function. 9. (U) Accountability lapses, escapes, and disturbances within the detainment facilities must be immediately reported through both the operational and administrative Chain of Command via a Serious Incident Report (SIR). The SIRs must then be tracked and followed by daily SITREPs until the situation is resolved. 10. (U) Detention Rules of Engagement (DROE), Interrogation Rules of Engagement (IROE), and the principles of the Geneva Conventions need to be briefed at every shift change and guard mount. 11. (U) AARs must be conducted after serious incidents at any given facility. The observations and corrective actions that develop from the AARs must be analyzed by the respective MP Battalion S-3 section, developed into a plan of action, shared with the other facilities, and implemented as a matter of policy. 12. (U) There must be significant structural improvements at each of the detention facilities. The needed changes include significant enhancement of perimeter lighting, additional chain link fencing, staking down of all concertina wire, hard site development, and expansion of Abu Ghraib (BCCF) . 13. (U) The Geneva Conventions and the facility rules must be prominently displayed in English and the language of the detainees at each compound and encampment at every detention facility IAW AR 190-8. 14. (U) Further restrict US civilians and other contractors' access throughout the facility. Contractors and civilians must be in an authorized and easily identifiable uniform to be more easily distinguished from the masses of detainees in civilian clothes. 15. (U) Facilities must have a stop movement/transfer period of at least 1 hour prior to every 100% detainee roll call and ISN counts to ensure accurate accountability. 16. (U) The method for doing head counts of detainees within a given compound must be standardized. 17. (U) Those military units conducting I/R operations must know of, train on, and constantly reference the applicable Army Doctrine and CJTF command policies. The references provided in this report cover nearly every deficiency I have enumerated. Although they do not, and cannot, make up for leadership shortfalls, all soldiers, at all levels, can use them to maintain standardized operating procedures and efficient accountability practices. FINDINGS AND RECOMMENDATIONS (PART THREE) (U) Investigate the training, standards, employment, command policies, internal procedures, and command climate in the 800th MP Brigade, as appropriate: Pursuant to Part Three of the Investigation, select members of the Investigation team (Primarily COL La Fate and I) personally interviewed the following witnesses: 1. (U) BG Janis Karpinski, Commander, 800th MP Brigade 2. (U) COL Thomas Pappas, Commander, 205th MI Brigade 3. (U) COL Ralph Sabatino, CFLCC Judge Advocate, CPA Ministry of Justice (Interviewed by COL Richard Gordon, CFLCC SJA) 4. (U) LTC Gary W. Maddocks, S-5 and Executive Officer, 800th MP Brigade 5. (U) LTC James O'Hare, Command Judge Advocate, 800th MP Brigade 6. (U) LTC Robert P. Walters Jr., Commander, 165th MI Battalion (Tactical Exploitation) 7. (U) LTC James D. Edwards, Commander, 202nd MI Battalion 8. (U) LTC Vincent Montera, Commander, 310th MP Battalion 9. (U) LTC Steve Jordan, former Director, Joint Interrogation and Debriefing Center/LNO to the 205th MI Brigade 10. (U) LTC Leigh A. Coulter, Commander, 724th MP Battalion and OIC Arifjan Detachment, 800th MP Brigade 11. (U) LTC Dennis McGlone, Commander, 744th MP Battalion 12. (U) MAJ David Hinzman, S-1, 800th MP Brigade 13. (U) MAJ William D. Proietto, Deputy CJA, 800th MP Brigade 14. (U) MAJ Stacy L. Garrity, S-1 (FWD), 800th MP Brigade 15. (U) MAJ David W. DiNenna, S-3, 320th MP Battalion 16. (U) MAJ Michael Sheridan, XO, 320th MP Battalion 17. (U) MAJ Anthony Cavallaro, S-3, 800th MP Brigade 18. (U) CPT Marc C. Hale, Commander, 670th MP Company 19. (U) CPT Donald Reese, Commander, 372nd MP Company 20. (U) CPT Darren Hampton, Assistant S-3, 320th MP Battalion 21. (U) CPT John Kaires, S-3, 310th MP Battalion 22. (U) CPT Ed Diamantis, S-2, 800th MP Brigade 23. (U) CPT Marc C. Hale, Commander, 670th MP Company 24. (U) CPT Donald Reese, Commander, 372nd MP Company 25. (U) CPT James G. Jones, Commander, 229th MP Company 26. (U) CPT Michael Anthony Mastrangelo, Jr., Commander, 310th MP Company 27. (U) CPT Lawrence Bush, IG, 800th MP Brigade 28. (U) 1LT Lewis C. Raeder, Platoon Leader, 372nd MP Company 29. (U) 1LT Elvis Mabry, Aide-de-camp to Brigade Commander, 800th MP Brigade 30. (U) 1LT Warren E. Ford, II, Commander, HHC 320th MP Battalion 31. (U) 2LT David O. Sutton, Platoon Leader, 229th MP Company 32. (U) CW2 Edward J. Rivas, 205th MI Brigade 33. (U) CSM Joseph P. Arrington, Command Sergeant Major, 320th MP Battalion 34. (U) SGM Pascual Cartagena, Acting Command Sergeant Major, 800th MP Brigade 35. (U) CSM Timothy L. Woodcock, Command Sergeant Major, 310th MP Battalion 36. (U) 1SG Dawn J. Rippelmeyer, First Sergeant, 977th MP Company 37. (U) SGM Mark Emerson, Operations SGM, 320th MP Battalion 38. (U) MSG Brian G. Lipinski, First Sergeant, 372nd MP Company 39. (U) MSG Andrew J. Lombardo, Operations Sergeant, 310th MP Battalion 40. (U) SFC Daryl J. Plude, Platoon Sergeant, 229th MP Company 41. (U) SFC Shannon K. Snider, Platoon SGT, 372nd MP Company 42. (U) SFC Keith A. Comer, 372nd MP Company 43. (U) SSG Robert Elliot, Squad Leader, 372nd MP Company 44. (U) SSG Santos A. Cardona, Army Dog Handler, 42nd MP Detachment, 16th MP Brigade 45. (U) SGT Michael Smith, Army Dog Handler, 523rd MP Detachment, 937th Engineer Group 46. (U) MA1 William J. Kimbro, USN Dog Handler, NAS Signal and Canine Unit 47. (U) Mr. Steve Stephanowicz, US civilian Contract Interrogator, CACI, 205th MI Brigade 48. (U) Mr. John Israel, US civilian Contract Interpreter, Titan Corporation, 205th MI Brigade (ANNEXES 45-91) REGARDING PART THREE OF THE INVESTIGATION, I MAKE THE FOLLOWING SPECIFIC FINDINGS OF FACT: 1. (U) I find that BG Janis Karpinski took command of the 800th MP Brigade on 30 June 2003 from BG Paul Hill. BG Karpinski has remained in command since that date. The 800th MP Brigade is comprised of eight MP battalions in the Iraqi TOR: 115th MP Battalion, 310th MP Battalion, 320th MP Battalion, 324th MP Battalion, 400th MP Battalion, 530th MP Battalion, 724th MP Battalion, and 744th MP Battalion. (ANNEXES 41 and 45) 2. (U) Prior to BG Karpinski taking command, members of the 800th MP Brigade believed they would be allowed to go home when all the detainees were released from the Camp Bucca Theater Internment Facility following the cessation of major ground combat on 1 May 2003. At one point, approximately 7,000 to 8,000 detainees were held at Camp Bucca. Through Article-5 Tribunals and a screening process, several thousand detainees were released. Many in the command believed they would go home when the detainees were released. In late May-early June 2003 the 800th MP Brigade was given a new mission to manage the Iraqi penal system and several detention centers. This new mission meant Soldiers would not redeploy to CONUS when anticipated. Morale suffered, and over the next few months there did not appear to have been any attempt by the Command to mitigate this morale problem. (ANNEXES 45 and 96) 3. (U) There is abundant evidence in the statements of numerous witnesses that soldiers throughout the 800th MP Brigade were not proficient in their basic MOS skills, particularly regarding internment/resettlement operations. Moreover, there is no evidence that the command, although aware of these deficiencies, attempted to correct them in any systemic manner other than ad hoc training by individuals with civilian corrections experience. (Multiple Witness Statements and the Personal Observations of the Investigation Team) 4. (U) I find that the 800th MP Brigade was not adequately trained for a mission that included operating a prison or penal institution at Abu Ghraib Prison Complex. As the Ryder Assessment found, I also concur that units of the 800th MP Brigade did not receive corrections-specific training during their mobilization period. MP units did not receive pinpoint assignments prior to mobilization and during the post mobilization training, and thus could not train for specific missions. The training that was accomplished at the mobilization sites were developed and implemented at the company level with little or no direction or supervision at the Battalion and Brigade levels, and consisted primarily of common tasks and law enforcement training. However, I found no evidence that the Command, although aware of this deficiency, ever requested specific corrections training from the Commandant of the Military Police School, the US Army Confinement Facility at Mannheim, Germany, the Provost Marshal General of the Army, or the US Army Disciplinary Barracks at Fort Leavenworth, Kansas. (ANNEXES 19 and 76) 5. (U) I find that without adequate training for a civilian internee detention mission, Brigade personnel relied heavily on individuals within the Brigade who had civilian corrections experience, including many who worked as prison guards or corrections officials in their civilian jobs. Almost every witness we interviewed had no familiarity with the provisions of AR 190-8 or FM 3- 19.40. It does not appear that a Mission Essential Task List (METL) based on in-theater missions was ever developed nor was a training plan implemented throughout the Brigade. (ANNEXES 21, 22, 67, and 81) 6. (U) I also find, as did MG Ryder's Team, that the 800th MP Brigade as a whole, was understrength for the mission for which it was tasked. Army Doctrine dictates that an I/R Brigade can be organized with between 7 and 21 battalions, and that the average battalion size element should be able to handle approximately 4000 detainees at a time. This investigation indicates that BG Karpinski and her staff did a poor job allocating resources throughout the Iraq JOA. Abu Ghraib (BCCF) normally housed between 6000 and 7000 detainees, yet it was operated by only one battalion. In contrast, the HVD Facility maintains only about 100 detainees, and is also run by an entire battalion. (ANNEXES 19, 22, and 96) 7. (U) Reserve Component units do not have an individual replacement system to mitigate medical or other losses. Over time, the 800th MP Brigade clearly suffered from personnel shortages through release from active duty (REFRAD) actions, medical evacuation, and demobilization. In addition to being severely undermanned, the quality of life for Soldiers assigned to Abu Ghraib (BCCF) was extremely poor. There was no DFAC, PX, barbershop, or MWR facilities. There were numerous mortar attacks, random rifle and RPG attacks, and a serious threat to Soldiers and detainees in the facility. The prison complex was also severely overcrowded and the Brigade lacked adequate resources and personnel to resolve serious logistical problems. Finally, because of past associations and familiarity of Soldiers within the Brigade, it appears that friendship often took precedence over appropriate leader and subordinate relationships. (ANNEX 101, Multiple Witness Statements, and the Personal Observations of the Investigation Team) 8. (U) With respect to the 800th MP Brigade mission at Abu Ghraib (BCCF), I find that there was clear friction and lack of effective communication between the Commander, 205th MI Brigade, who controlled FOB Abu Ghraib (BCCF) after 19 November 2003, and the Commander, 800th MP Brigade, who controlled detainee operations inside the FOB. There was no clear delineation of responsibility between commands, little coordination at the command level, and no integration of the two functions. Coordination occurred at the lowest possible levels with little oversight by commanders. (ANNEXES 31, 45, and 46) 9. (U) I find that this ambiguous command relationship was exacerbated by a CJTF-7 Fragmentary Order (FRAGO) 1108 issued on 19 November 2003. Paragraph 3.C.8, Assignment of 205th MI Brigade Commander's Responsibilities for the Baghdad Central Confinement Facility, states as follows: 3.C.8. A. (U) 205 MI BRIGADE. 3.C.8. A. 1. (U) EFFECTIVE IMMEDIATELY COMMANDER 205 MI BRIGADE ASSUMES RESPONSIBILITY FOR THE BAGHDAD CONFINEMENT FACILITY (BCCF) AND IS APPOINTED THE FOB COMMANDER. UNITS CURRENTLY AT ABU GHRAIB (BCCF) ARE TACON TO 205 MI BRIGADE FOR "SECURITY OF DETAINEES AND FOB PROTECTION." Although not supported by BG Karpinski, FRAGO 1108 made all of the MP units at Abu Ghraib TACON to the Commander, 205th MI Brigade. This effectively made an MI Officer, rather than an MP Officer, responsible for the MP units conducting detainee operations at that facility. This is not doctrinally sound due to the different missions and agendas assigned to each of these respective specialties. (ANNEX 31) 10 (U) Joint Publication 0-2, Unified Action Armed Forces (UNAAF), 10 July 2001 defines Tactical Control (TACON) as the detailed direction and control of movements or maneuvers within the operational area necessary to accomplish assigned missions or tasks. (ANNEX 42) "TACON is the command authority over assigned or attached forces or commands or military capability made available for tasking that is limited to the detailed direction and control of movements or maneuvers within the operational area necessary to accomplish assigned missions or tasks. TACON is inherent in OPCON and may be delegated to and exercised by commanders at any echelon at or below the level of combatant commander." 11. (U) Based on all the facts and circumstances in this investigation, I find that there was little, if any, recognition of this TACON Order by the 800th MP Brigade or the 205th MI Brigade. Further, there was no evidence if the Commander, 205th MI Brigade clearly informed the Commander, 800th MP Brigade, and specifically the Commander, 320th MP Battalion assigned at Abu Ghraib (BCCF), on the specific requirements of this TACON relationship. (ANNEXES 45 and 46) 12. (U) It is clear from a comprehensive review of witness statements and personal interviews that the 320th MP Battalion and 800th MP Brigade continued to function as if they were responsible for the security, health and welfare, and overall security of detainees within Abu Ghraib (BCCF) prison. Both BG Karpinski and COL Pappas clearly behaved as if this were still the case. (ANNEXES 45 and 46) 13. (U) With respect to the 320th MP Battalion, I find that the Battalion Commander, LTC (P) Jerry Phillabaum, was an extremely ineffective commander and leader. Numerous witnesses confirm that the Battalion S-3, MAJ David W. DiNenna, basically ran the battalion on a day-to-day basis. At one point, BG Karpinski sent LTC (P) Phillabaum to Camp Arifjan, Kuwait for approximately two weeks, apparently to give him some relief from the pressure he was experiencing as the 320th Battalion Commander. This movement to Camp Arifjan immediately followed a briefing provided by LTC (P) Phillabaum to the CJTF-7 Commander, LTG Sanchez, near the end of October 2003. BG Karpinski placed LTC Ronald Chew, Commander of the 115th MP Battalion, in charge of the 320th MP Battalion for a period of approximately two weeks. LTC Chew was also in command of the 115th MP Battalion assigned to Camp Cropper, BIAP, Iraq. I could find no orders, either suspending or relieving LTC (P) Phillabaum from command, nor any orders placing LTC Chew in command of the 320th. In addition, there was no indication this removal and search for a replacement was communicated to the Commander CJTF-7, the Commander 377th TSC, or to Soldiers in the 320th MP Battalion. Temporarily removing one commander and replacing him with another serving Battalion Commander without an order and without notifying superior or subordinate commands is without precedent in my military career. LTC (P) Phillabaum was also reprimanded for lapses in accountability that resulted in several escapes. The 320th MP Battalion was stigmatized as a unit due to previous detainee abuse which occurred in May 2003 at the Bucca Theater Internment Facility (TIF), while under the command of LTC (P) Phillabaum. Despite his proven deficiencies as both a commander and leader, BG Karpinski allowed LTC (P) Phillabaum to remain in command of her most troubled battalion guarding, by far, the largest number of detainees in the 800th MP Brigade. LTC (P) Phillabaum was suspended from his duties by LTG Sanchez, CJTF-7 Commander on 17 January 2004. (ANNEXES 43, 45, and 61) 14. (U) During the course of this investigation I conducted a lengthy interview with BG Karpinski that lasted over four hours, and is included verbatim in the investigation Annexes. BG Karpinski was extremely emotional during much of her testimony. What I found particularly disturbing in her testimony was her complete unwillingness to either understand or accept that many of the problems inherent in the 800th MP Brigade were caused or exacerbated by poor leadership and the refusal of her command to both establish and enforce basic standards and principles among its soldiers. (ANNEX 45 and the Personal Observations of the Interview Team) 15. (U) BG Karpinski alleged that she received no help from the Civil Affairs Command, specifically, no assistance from either BG John Kern or COL Tim Regan. She blames much of the abuse that occurred in Abu Ghraib (BCCF) on MI personnel and stated that MI personnel had given the MPs "ideas" that led to detainee abuse. In addition, she blamed the 372nd Company Platoon Sergeant, SFC Snider, the Company Commander, CPT Reese, and the First Sergeant, MSG Lipinski, for the abuse. She argued that problems in Abu Ghraib were the fault of COL Pappas and LTC Jordan because COL Pappas was in charge of FOB Abu Ghraib. (ANNEX 45) 16. (U) BG Karpinski also implied during her testimony that the criminal abuses that occurred at Abu Ghraib (BCCF) might have been caused by the ultimate disposition of the detainee abuse cases that originally occurred at Camp Bucca in May 2003. She stated that "about the same time those incidents were taking place out of Baghdad Central, the decisions were made to give the guilty people at Bucca plea bargains. So, the system communicated to the soldiers, the worst that's gonna happen is, you're gonna go home." I think it important to point out that almost every witness testified that the serious criminal abuse of detainees at Abu Ghraib (BCCF) occurred in late October and early November 2003. The photographs and statements clearly support that the abuses occurred during this time period. The Bucca cases were set for trial in January 2004 and were not finally disposed of until 29 December 2003. There is entirely no evidence that the decision of numerous MP personnel to intentionally abuse detainees at Abu Ghrabid (BCCF) was influenced in any respect by the Camp Bucca cases. (ANNEXES 25, 26, and 45) 17. (U) Numerous witnesses stated that the 800th MP Brigade S-1, MAJ Hinzman and S-4, MAJ Green, were essentially dysfunctional, but that despite numerous complaints, these officers were not replaced. This had a detrimental effect on the Brigade Staff's effectiveness and morale. Moreover, the Brigade Command Judge Advocate, LTC James O'Hare, appears to lack initiative and was unwilling to accept responsibility for any of his actions. LTC Gary Maddocks, the Brigade XO did not properly supervise the Brigade staff by failing to lay out staff priorities, take overt corrective action when needed, and supervise their daily functions. (ANNEXES 45, 47, 48, 62, and 67) 18. (U) In addition to poor morale and staff inefficiencies, I find that the 800th MP Brigade did not articulate or enforce clear and basic Soldier and Army standards. I specifically found these examples of unenforced standards: a. There was no clear uniform standard for any MP Soldiers assigned detention duties. Despite the fact that hundreds of former Iraqi soldiers and officers were detainees, MP personnel were allowed to wear civilian clothes in the FOB after duty hours while carrying weapons. (ANNEXES 51 and 74) b. Some Soldiers wrote poems and other sayings on their helmets and soft caps. (ANNEXES 51 and 74) c. In addition, numerous officers and senior NCOs have been reprimanded/disciplined for misconduct during this period. Those disciplined include; (ANNEXES 43 and 102) 1). (U) BG Janis Karpinski, Commander, 800th MP Brigade ˙ Memorandum of Admonishment by LTG Sanchez, Commander, CJTF-7, on 17 January 2004. 2). (U) LTC (P) Jerry Phillabaum, Commander, 320th MP Battalion ˙ GOMOR from BG Karpinski, Commander 800th MP Brigade, on 10 November 2003, for lack of leadership and for failing to take corrective security measures as ordered by the Brigade Commander; filed locally ˙ Suspended by BG Karpinski, Commander 800th MP Brigade, 17 January 2004; Pending Relief for Cause, for dereliction of duty 3). (U) LTC Dale Burtyk, Commander, 400th MP Battalion ˙ GOMOR from BG Karpinski, Commander 800th MP Brigade, on 20 August 2003, for failure to properly train his Soldiers. (Soldier had negligent discharge of M-16 while exiting his vehicle, round went into fuel tank); filed locally. 4). (U) MAJ David DiNenna, S-3, 320th MP Battalion ˙ GOMOR from LTG McKiernan, Commander CFLCC, on 25 May 2003, for dereliction of duty for failing to report a violation of CENTCOM General Order #1 by a subordinate Field Grade Officer and Senior Noncommissioned Officer, which he personally observed; returned to soldier unfiled. ˙ GOMOR from BG Karpinski, Commander 800th MP Brigade, on 10 November 03, for failing to take corrective security measures as ordered by the Brigade Commander; filed locally. 5). (U) MAJ Stacy Garrity, Finance Officer, 800th MP Brigade ˙ GOMOR from LTG McKiernan, Commander CFLCC, on 25 May 2003, for violation of CENTCOM General Order #1, consuming alcohol with an NCO; filed locally. 6). (U) CPT Leo Merck, Commander, 870th MP Company ˙ Court-Martial Charges Preferred, for Conduct Unbecoming an Officer and Unauthorized Use of Government Computer in that he was alleged to have taken nude pictures of his female Soldiers without their knowledge; Trial date to be announced. 7). (U) CPT Damaris Morales, Commander, 770th MP Company ˙ GOMOR from BG Karpinski, Commander 800th MP Brigade, on 20 August 2003, for failing to properly train his Soldiers (Soldier had negligent discharge of M-16 while exiting his vehicle, round went into fuel tank); filed locally. 8). (U) CSM Roy Clement, Command Sergeant Major, 800th MP Brigade ˙ GOMOR and Relief for Cause from BG Janis Karpinski, Commander 800th MP Brigade, for fraternization and dereliction of duty for fraternizing with junior enlisted soldiers within his unit; GOMOR officially filed and he was removed from the CSM list. 9). (U) CSM Edward Stotts, Command Sergeant Major, 400th MP Battalion ˙ GOMOR from BG Karpinski, Commander 800th MP Brigade, on 20 August 2003, for failing to properly train his Soldiers (Soldier had negligent discharge of M-16 while exiting his vehicle, round went into fuel tank); filed locally 10). (U) 1SG Carlos Villanueva, First Sergeant, 770th MP Company ˙ GOMOR from BG Karpinski, Commander 800th MP Brigade, on 20 August 2003, for failing to properly train his Soldiers (Soldier had negligent discharge of M-16 while exiting his vehicle, round went into fuel tank); filed locally. 11). (U) MSG David Maffett, NBC NCO, 800th MP Brigade, ˙ GOMOR from LTG McKiernan, Commander CFLCC, on 25 May 2003, for violation of CENTCOM General Order #1, consuming alcohol; filed locally. 12) (U) SGM Marc Emerson, Operations SGM, 320th MP Battalion, ˙ Two GO Letters of Concern and a verbal reprimand from BG Karpinski, Commander 800th MP Brigade, for failing to adhere to the guidance/directives given to him by BG Karpinski; filed locally. d. (U) Saluting of officers was sporadic and not enforced. LTC Robert P. Walters, Jr., Commander of the 165th Military Intelligence Battalion (Tactical Exploitation), testified that the saluting policy was enforced by COL Pappas for all MI personnel, and that BG Karpinski approached COL Pappas to reverse the saluting policy back to a no-saluting policy as previously existed. (ANNEX 53) 19. (U) I find that individual Soldiers within the 800th MP Brigade and the 320th Battalion stationed throughout Iraq had very little contact during their tour of duty with either LTC (P) Phillabaum or BG Karpinski. BG Karpinski claimed, during her testimony, that she paid regular visits to the various detention facilities where her Soldiers were stationed. However, the detailed calendar provided by her Aide-de-Camp, 1LT Mabry, does not support her contention. Moreover, numerous witnesses stated that they rarely saw BG Karpinski or LTC (P) Phillabaum. (Multiple Witness Statements) 20. (U) In addition I find that psychological factors, such as the difference in culture, the Soldiers' quality of life, the real presence of mortal danger over an extended time period, and the failure of commanders to recognize these pressures contributed to the perversive atmosphere that existed at Abu Ghraib (BCCF) Detention Facility and throughout the 800th MP Brigade. (ANNEX 1). 21. As I have documented in other parts of this investigation, I find that there was no clear emphasis by BG Karpinski to ensure that the 800th MP Brigade Staff, Commanders, and Soldiers were trained to standard in detainee operations and proficiency or that serious accountability lapses that occurred over a significant period of time, particularly at Abu Ghraib (BCCF), were corrected. AR 15-6 Investigations regarding detainee escapes were not acted upon, followed up with corrective action, or disseminated to subordinate commanders or Soldiers. Brigade and unit SOPs for dealing with detainees if they existed at all, were not read or understood by MP Soldiers assigned the difficult mission of detainee operations. Following the abuse of several detainees at Camp Bucca in May 2003, I could find no evidence that BG Karpinski ever directed corrective training for her soldiers or ensured that MP Soldiers throughout Iraq clearly understood the requirements of the Geneva Conventions relating to the treatment of detainees. (Multiple Witness Statements and the Personal Observations of the Investigation Team ) 22. On 17 January 2004 BG Karpinski was formally admonished in writing by LTG Sanchez regarding the serious deficiencies in her Brigade. LTG Sanchez found that the performance of the 800th MP Brigade had not met the standards set by the Army or by CJTF-7. He found that incidents in the preceding six months had occurred that reflected a lack of clear standards, proficiency and leadership within the Brigade. LTG Sanchez also cited the recent detainee abuse at Abu Ghraib (BCCF) as the most recent example of a poor leadership climate that "permeates the Brigade." I totally concur with LTG Sanchez' opinion regarding the performance of BG Karpinski and the 800th MP Brigade. (ANNEX 102 and the Personal Observations of the Investigating Officer) RECOMMENDATIONS AS TO PART THREE OF THE INVESTIGATION: 1. (U) That BG Janis L. Karpinski, Commander, 800th MP Brigade be Relieved from Command and given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: ˙ Failing to ensure that MP Soldiers at theater-level detention facilities throughout Iraq had appropriate SOPs for dealing with detainees and that Commanders and Soldiers had read, understood, and would adhere to these SOPs. ˙ Failing to ensure that MP Soldiers in the 800th MP Brigade knew, understood, and adhered to the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. ˙ Making material misrepresentations to the Investigation Team as to the frequency of her visits to her subordinate commands. ˙ Failing to obey an order from the CFLCC Commander, LTG McKiernan, regarding the withholding of disciplinary authority for Officer and Senior Noncommissioned Officer misconduct. ˙ Failing to take appropriate action regarding the ineffectiveness of a subordinate Commander, LTC (P) Jerry Phillabaum. ˙ Failing to take appropriate action regarding the ineffectiveness of numerous members of her Brigade Staff including her XO, S-1, S-3, and S-4. ˙ Failing to properly ensure the results and recommendations of the AARs and numerous 15-6 Investigation reports on escapes and shootings (over a period of several months) were properly disseminated to, and understood by, subordinate commanders. ˙ Failing to ensure and enforce basic Soldier standards throughout her command. ˙ Failing to establish a Brigade METL. ˙ Failing to establish basic proficiency in assigned tasks for Soldiers throughout the 800th MP Brigade. ˙ Failing to ensure that numerous and reported accountability lapses at detention facilities throughout Iraq were corrected. 2. (U) That COL Thomas M. Pappas, Commander, 205th MI Brigade, be given a General Officer Memorandum of Reprimand and Investigated UP Procedure 15, AR 381-10, US Army Intelligence Activities for the following acts which have been previously referred to in the aforementioned findings: ˙ Failing to ensure that Soldiers under his direct command were properly trained in and followed the IROE. ˙ Failing to ensure that Soldiers under his direct command knew, understood, and followed the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. ˙ Failing to properly supervise his soldiers working and "visiting" Tier 1 of the Hard-Site at Abu Ghraib (BCCF). 3.(U) That LTC (P) Jerry L. Phillabaum, Commander, 320th MP Battalion, be Relieved from Command, be given a General Officer Memorandum of Reprimand, and be removed from the Colonel/O-6 Promotion List for the following acts which have been previously referred to in the aforementioned findings: ˙ Failing to properly ensure the results, recommendations, and AARs from numerous reports on escapes and shootings over a period of several months were properly disseminated to, and understood by, subordinates. ˙ Failing to implement the appropriate recommendations from various 15-6 Investigations as specifically directed by BG Karpinski. ˙ Failing to ensure that Soldiers under his direct command were properly trained in Internment and Resettlement Operations. ˙ Failing to ensure that Soldiers under his direct command knew and understood the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. ˙ Failing to properly supervise his soldiers working and "visiting" Tier 1 of the Hard-Site at Abu Ghraib (BCCF). ˙ Failing to properly establish and enforce basic soldier standards, proficiency, and accountability. ˙ Failure to conduct an appropriate Mission Analysis and to task organize to accomplish his mission. 4. (U) That LTC Steven L. Jordan, Former Director, Joint Interrogation and Debriefing Center and Liaison Officer to 205th Military Intelligence Brigade, be relieved from duty and be given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: ˙ Making material misrepresentations to the Investigating Team, including his leadership roll at Abu Ghraib (BCCF). ˙ Failing to ensure that Soldiers under his direct control were properly trained in and followed the IROE. ˙ Failing to ensure that Soldiers under his direct control knew, understood, and followed the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. ˙ Failing to properly supervise soldiers under his direct authority working and "visiting" Tier 1 of the Hard-Site at Abu Ghraib (BCCF). 5. (U) That MAJ David W. DiNenna, Sr., S-3, 320th MP Battalion, be Relieved from his position as the Battalion S-3 and be given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: ˙ Received a GOMOR from LTG McKiernan, Commander CFLCC, on 25 May 2003, for dereliction of duty for failing to report a violation of CENTCOM General Order #1 by a subordinate Field Grade Officer and Senior Noncommissioned Officer, which he personally observed; GOMOR was returned to Soldier and not filed. ˙ Failing to take corrective action and implement recommendations from various 15-6 investigations even after receiving a GOMOR from BG Karpinski, Commander 800th MP Brigade, on 10 November 03, for failing to take corrective security measures as ordered; GOMOR was filed locally. ˙ Failing to take appropriate action and report an incident of detainee abuse, whereby he personally witnessed a Soldier throw a detainee from the back of a truck. 6. (U) That CPT Donald J. Reese, Commander, 372nd MP Company, be Relieved from Command and be given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: ˙ Failing to ensure that Soldiers under his direct command knew and understood the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. ˙ Failing to properly supervise his Soldiers working and "visiting" Tier 1 of the Hard-Site at Abu Ghraib (BCCF). ˙ Failing to properly establish and enforce basic soldier standards, proficiency, and accountability. ˙ Failing to ensure that Soldiers under his direct command were properly trained in Internment and Resettlement Operations. 7. (U) That 1LT Lewis C. Raeder, Platoon Leader, 372nd MP Company, be Relieved from his duties as Platoon Leader and be given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: ˙ Failing to ensure that Soldiers under his direct command knew and understood the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. ˙ Failing to properly supervise his soldiers working and "visiting" Tier 1 of the Hard-Site at Abu Ghraib (BCCF). ˙ Failing to properly establish and enforce basic Soldier standards, proficiency, and accountability. ˙ Failing to ensure that Soldiers under his direct command were properly trained in Internment and Resettlement Operations. 8. (U) That SGM Marc Emerson, Operations SGM, 320th MP Battalion, be Relieved from his duties and given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: ˙ Making a material misrepresentation to the Investigation Team stating that he had "never" been admonished or reprimanded by BG Karpinski, when in fact he had been admonished for failing to obey an order from BG Karpinski to "stay out of the towers" at the holding facility. ˙ Making a material misrepresentation to the Investigation Team stating that he had attended every shift change/guard-mount conducted at the 320th MP Battalion, and that he personally briefed his Soldiers on the proper treatment of detainees, when in fact numerous statements contradict this assertion. ˙ Failing to ensure that Soldiers in the 320th MP Battalion knew and understood the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. ˙ Failing to properly supervise his soldiers working and "visiting" Tier 1 of the Hard-Site at Abu Ghraib (BCCF). ˙ Failing to properly establish and enforce basic soldier standards, proficiency, and accountability. ˙ Failing to ensure that his Soldiers were properly trained in Internment and Resettlement Operations. 9. (U) That 1SG Brian G. Lipinski, First Sergeant, 372nd MP Company, be Relieved from his duties as First Sergeant of the 372nd MP Company and given a General Officer Memorandum of Reprimand for the following acts which have been previously referred to in the aforementioned findings: ˙ Failing to ensure that Soldiers in the 372nd MP Company knew and understood the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. ˙ Failing to properly supervise his soldiers working and "visiting" Tier 1 of the Hard-Site at Abu Ghraib (BCCF). ˙ Failing to properly establish and enforce basic soldier standards, proficiency, and accountability. ˙ Failing to ensure that his Soldiers were properly trained in Internment and Resettlement Operations. 10. (U) That SFC Shannon K. Snider, Platoon Sergeant, 372nd MP Company, be Relieved from his duties, receive a General Officer Memorandum of Reprimand, and receive action under the Uniform Code of Military Justice for the following acts which have been previously referred to in the aforementioned findings: ˙ Failing to ensure that Soldiers in his platoon knew and understood the protections afforded to detainees in the Geneva Convention Relative to the Treatment of Prisoners of War. ˙ Failing to properly supervise his soldiers working and "visiting" Tier 1 of the Hard-Site at Abu Ghraib (BCCF). ˙ Failing to properly establish and enforce basic soldier standards, proficiency, and accountability. ˙ Failing to ensure that his Soldiers were properly trained in Internment and Resettlement Operations. ˙ Failing to report a Soldier, who under his direct control, abused detainees by stomping on their bare hands and feet in his presence. 11. (U) That Mr. Steven Stephanowicz, Contract US Civilian Interrogator, CACI, 205th Military Intelligence Brigade, be given an Official Reprimand to be placed in his employment file, termination of employment, and generation of a derogatory report to revoke his security clearance for the following acts which have been previously referred to in the aforementioned findings: ˙ Made a false statement to the investigation team regarding the locations of his interrogations, the activities during his interrogations, and his knowledge of abuses. ˙ Allowed and/or instructed MPs, who were not trained in interrogation techniques, to facilitate interrogations by "setting conditions" which were neither authorized and in accordance with applicable regulations/policy. He clearly knew his instructions equated to physical abuse. 12. (U) That Mr. John Israel, Contract US Civilian Interpreter, CACI, 205th Military Intelligence Brigade, be given an Official Reprimand to be placed in his employment file and have his security clearance reviewed by competent authority for the following acts or concerns which have been previously referred to in the aforementioned findings: ˙ Denied ever having seen interrogation processes in violation of the IROE, which is contrary to several witness statements. ˙ ˙ Did not have a security clearance. 13. (U) I find that there is sufficient credible information to warrant an Inquiry UP Procedure 15, AR 381-10, US Army Intelligence Activities, be conducted to determine the extent of culpability of MI personnel, assigned to the 205th MI Brigade and the Joint Interrogation and Debriefing Center (JIDC) at Abu Ghraib (BCCF). Specifically, I suspect that COL Thomas M. Pappas, LTC Steve L. Jordan, Mr. Steven Stephanowicz, and Mr. John Israel were either directly or indirectly responsible for the abuses at Abu Ghraib (BCCF) and strongly recommend immediate disciplinary action as described in the preceding paragraphs as well as the initiation of a Procedure 15 Inquiry to determine the full extent of their culpability. (ANNEX 36) OTHER FINDINGS/OBSERVATIONS 1. (U) Due to the nature and scope of this investigation, I acquired the assistance of Col (Dr.) Henry Nelson, a USAF Psychiatrist, to analyze the investigation materials from a psychological perspective. He determined that there was evidence that the horrific abuses suffered by the detainees at Abu Ghraib (BCCF) were wanton acts of select soldiers in an unsupervised and dangerous setting. There was a complex interplay of many psychological factors and command insufficiencies. A more detailed analysis is contained in ANNEX 1 of this investigation. 2. (U) During the course of this investigation I conducted a lengthy interview with BG Karpinski that lasted over four hours, and is included verbatim in the investigation Annexes. BG Karpinski was extremely emotional during much of her testimony. What I found particularly disturbing in her testimony was her complete unwillingness to either understand or accept that many of the problems inherent in the 800th MP Brigade were caused or exacerbated by poor leadership and the refusal of her command to both establish and enforce basic standards and principles among its Soldiers. (ANNEX 45) 3. (U) Throughout the investigation, we observed many individual Soldiers and some subordinate units under the 800th MP Brigade that overcame significant obstacles, persevered in extremely poor conditions, and upheld the Army Values. We discovered numerous examples of Soldiers and Sailors taking the initiative in the absence of leadership and accomplishing their assigned tasks. a. (U) The 744th MP Battalion, commanded by LTC Dennis McGlone, efficiently operated the HVD Detention Facility at Camp Cropper and met mission requirements with little to no guidance from the 800th MP Brigade. The unit was disciplined, proficient, and appeared to understand their basic tasks. b. (U) The 530th MP Battalion, commanded by LTC Stephen J. Novotny, effectively maintained the MEK Detention Facility at Camp Ashraf. His Soldiers were proficient in their individual tasks and adapted well to this highly unique and non-doctrinal operation. c. (U) The 165th MI Battalion excelled in providing perimeter security and force protection at Abu Ghraib (BCCF). LTC Robert P. Walters, Jr., demanded standards be enforced and worked endlessly to improve discipline throughout the FOB. 4. (U) The individual Soldiers and Sailors that we observed and believe should be favorably noted include: a. (U) Master-at-Arms First Class William J. Kimbro, US Navy Dog Handler, knew his duties and refused to participate in improper interrogations despite significant pressure from the MI personnel at Abu Ghraib. b. (U) SPC Joseph M. Darby, 372nd MP Company discovered evidence of abuse and turned it over to military law enforcement. c. (U) 1LT David O. Sutton, 229th MP Company, took immediate action and stopped an abuse, then reported the incident to the chain of command. CONCLUSION 1. (U) Several US Army Soldiers have committed egregious acts and grave breaches of international law at Abu Ghraib/BCCF and Camp Bucca, Iraq. Furthermore, key senior leaders in both the 800th MP Brigade and the 205th MI Brigade failed to comply with established regulations, policies, and command directives in preventing detainee abuses at Abu Ghraib (BCCF) and at Camp Bucca during the period August 2003 to February 2004. 2. (U) Approval and implementation of the recommendations of this AR 15-6 Investigation and those highlighted in previous assessments are essential to establish the conditions with the resources and personnel required to prevent future occurrences of detainee abuse. Annexes 1. Psychological Assessment 2. Request for investigation from CJTF-7 to CENTCOM 3. Directive to CFLCC from CENTCOM directing investigation 4. Appointment Memo from CFLCC CDR to MG Taguba 5. 15-6 Investigation 9 June 2003 6. 15-6 Investigation 12 June 2003 7. 15-6 Investigation 13 June 2003 8. 15-6 Investigation 24 November 2003 9. 15-6 Investigation 7 January 2004 10. 15-6 Investigation 12 January 2004 11. SIR 5 November 2003 12. SIR 7 November 2003 13. SIR 8 November 2003 14. SIR 13 December 2003 15. SIR 13 December 2003 16. SIR 13 December 2003 17. SIR 17 December 2003 18. Commander's Inquiry 26 January 2004 19. MG Ryder's Report, 6 November 2003 20. MG Miller's Report, 9 September 2003 21. AR 190-8, Enemy Prisoners of War, Retained Personnel, Civilian Internees, and Other Detainees, 1 October 1997 22. FM 3-19.40, Military Police Internment/Resettlement Operations, 1 August 2001 23. FM 34-52, Intelligence Interrogation, 28 September 1992 24. Fourth Geneva Convention, 12 August 1949 25. CID Report on criminal abuses at Abu Ghraib, 28 January 2004 26. CID Interviews, 10-25 January 2004 27. 800th MP Brigade Roster, 29 January 2004 28. 205th MI Brigade's IROE, Undated 29. TOA Order (800th MP Brigade) and letter holding witnesses 30. Investigation Team's witness list 31. FRAGO #1108 32. Letters suspending several key leaders in the 800th MP Brigade and Rating Chain with suspensions annotated 33. FM 27-10, Military Justice, 6 September 2002 34. CID Report on abuse of detainees at Camp Bucca, 8 June 2003 35. Article 32 Findings on abuse of detainees at Camp Bucca, 26 August 2003 36. AR 381-10, 1 July 1984 37. Excerpts from log books, 320th MP Battalion 38. 310th MP Battalion's Inprocessing SOP 39. 320th MP Battalion's "Change Sheet" 40. Joint Interrogation and Debriefing Center's (JIDC) Slides, Undated 41. Order of Battle Slides, 12 January 2004 42. Joint Publication 0-2, Unified Actions Armed Forces, 10 July 2001 43. General Officer Memorandums of Reprimand 44. 800th MP Battalion's TACSOP 45. BG Janis Karpinski, Commander, 800th MP Brigade 46. COL Thomas Pappas, Commander, 205th MI Brigade 47. COL Ralph Sabatino, CFLCC Judge Advocate, CPA Ministry of Justice 48. LTC Gary W. Maddocks, S-5 and Executive Officer, 800th MP Brigade 49. LTC James O'Hare, Command Judge Advocate, 800th MP Brigade 50. LTC Robert P. Walters Jr., Commander, 165th MI Battalion (Tactical exploitation) 51. LTC James D. Edwards, Commander, 202nd MI Battalion 52. LTC Vincent Montera, Commander 310th MP Battalion 53. LTC Steve Jordan, former Director, Joint Interrogation and Debriefing Center/LNO to the 205th MI Brigade 54. LTC Leigh A. Coulter, Commander 724th MP Battalion and OIC Arifjan Detachment, 800th MP Brigade 55. LTC Dennis McGlone, Commander, 744th MP Battalion 56. MAJ David Hinzman, S-1, 800th MP Brigade 57. MAJ William D. Proietto, Deputy CJA, 800th MP Brigade 58. MAJ Stacy L. Garrity, S-1 (FWD), 800th MP Brigade 59. MAJ David W. DiNenna, S-3, 320th MP Battalion 60. MAJ Michael Sheridan, XO, 320th MP Battalion 61. MAJ Anthony Cavallaro, S-3, 800th MP Brigade 62. CPT Marc C. Hale, Commander, 670th MP Company 63. CPT Donald Reese, Commander, 372nd MP Company 64. CPT Darren Hampton, Assistant S-3, 320th MP Battalion 65. CPT John Kaires, S-3, 310th MP Battalion 66. CPT Ed Diamantis, S-2, 800th MP Brigade 67. LTC Jerry L. Phillabaum, Commander, 320th MP Battalion 68. CPT James G. Jones, Commander, 229th MP Company 69. CPT Michael A. Mastrangelo, Jr., Commander, 310th MP Company 70. CPT Lawrence Bush, IG, 800th MP Brigade 71. 1LT Lewis C. Raeder, Platoon Leader, 372nd MP Company 72. 1LT Elvis Mabry, Aide-de-Camp to Brigade Commander, 800th MP Brigade 73. 1LT Warren E. Ford, II, Commander, HHC 320th MP Battalion 74. 2LT David O. Sutton, Platoon Leader, 229th MP Company 75. CW2 Edward J. Rivas, 205th MI Brigade 76. CSM Joseph P. Arrison, Command Sergeant Major, 320th MP Battalion 77. SGM Pascual Cartagena, Command Sergeant Major, 800th MP Brigade 78. CSM Timothy L. Woodcock, Command Sergeant Major, 310th MP Battalion 79. 1SG Dawn J. Rippelmeyer, First Sergeant, 977th MP Company 80. SGM Mark Emerson, Operations SGM, 320th MP Battalion 81. MSG Brian G. Lipinski, First Sergeant, 372nd MP Company 82. MSG Andrew J. Lombardo, Operations Sergeant, 310th MP Battalion 83. SFC Daryl J. Plude, Platoon Sergeant, 229th MP Company 84. SFC Shannon K. Snider, Platoon SGT, 372nd MP Company 85. SFC Keith A. Comer, 372nd MP Company 86. SSG Robert Elliot, Squad Leader, 372nd MP Company 87. SSG Santos A. Cardona, Army Dog Handler 88. SGT Michael Smith, Army Dog Handler 89. MA1 William J. Kimbro, USN Dog Handler 90. Mr. Steve Stephanowicz, US civilian contract Interrogator, CACI, 205th MI Brigade 91. Mr. John Israel, US civilian contract Interpreter, Titan Corporation, 205th MI Brigade 92. FM 3-19.1, Military Police Operations, 22 March 2001 93. CJTF-7 IROE and DROE, Undated 94. CJTF-7 Interrogation and Counter Resistance Policy, 12 October 2003 95. 800th MP Brigade Mobilization Orders 96. Sample Detainee Status Report, 13 March 2004 97. 530th MP Battalion Mission Brief, 11 February 2004 98. Memorandum for Record, CPT Ed Ray, Chief of Military Justice, CFLCC, 9 March 2004 99. SIR 14 January 2004 100. Accountability Plan Recommendations, 9 March 2004 101. 2LT Michael R. Osterhout, S-2, 320th MP Battalion 102. Memorandum of Admonishment from LTG Sanchez to BG Karpinski, 17 January 2004 103. Various SIRs from the 800th MP Brigade/320th MP Battalion 104. 205th MI Brigade SITREP to MG Miller, 12 December 2003 105. SGT William A. Cathcart, 372nd MP Company 106. 1LT Michael A. Drayton, Commander, 870th MP Company ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8635 From: Steve Uhrig Date: Sat May 15, 2004 5:07pm Subject: Timelapse video surveillance recorders for sale I am seriously trying to clean out my shop and am willing to sacrifice these to get the room. Use these for lease jobs, for permanent installation at your facility or a client's. I can supply cameras of various sorts also if needed. Below is clipped from my website: ----------- Panasonic Top Grade Time Lapse Video Recorder Panasonic AG6740p Time Lapse VCR. Commercial grade, designed from the ground up for serious surveillance applications. Not a converted consumer machine. The AG6740 is the standard U.S. FBI surveillance video recorder and are very difficult to find as the FBI absorbs nearly all production. Call around and try to find any in stock. Everyone advertises them for the image, but very few actually can get them. These machines are very rugged, made with a heavy cast aluminum chassis, not bent sheet metal. Video format is standard VHS or S-Video, providing 400 lines of resolution (broadcast video is only 240 lines so this machine will give you surveillance video significantly better than the quality of your home television). 4 head machine, various recording times from realtime to 960 hours (over one month on a single videotape). NTSC. Has alarm inputs and event record capability. Brushless motors. High density recording with a special head provides twice the information as in normal recorders. Audio record capability up to 24 hours. Multiple alarms, both audible and terminal strip outputs for fault, tape end, humidity, etc. Integral time/date generator. On-screen display. Maintains programming for one month without power, meaning you can program the machine at your office and take it to a job and install it with no onsite programming. Composite and S-Video outputs. Automatic schedules for daily and weekly timer programming. Super fast 3 minute rewind time. Can be synchronized with other machines to lock time/date to one recorder as master and others as slaves if more than one are used. BNC or S-VHS inputs and outputs. Draws 30 watts at 110VAC. 46dB signal to noise ratio. Weight 15 pounds. Has input to sync with any multiplexer. And with all this is simple menu-driven operation. All latest factory upgrades have been installed. Click here: http://www.swssec.com/timelaps/ag-6740.pdf for photo and full specs. This is a PDF file which requires Adobe Acrobat. Contact me if you don't have the reader and would like it free. If you need the very finest surveillance/CCTV tape machine currently available, here it is. These are zero hour machines in perfect condition. Instruction manual is included. There still is a place for analog tape. If you have a quick surveillance and need to pull a tape for review offsite, analog is still the only practical option. You can't hand a client or the police a disk drive and expect them to do anything with it. This is the same model recorder we use in embassies, armories and VIP residences where cost is no object and the work is deadly serious. Apparently the FBI agrees, with this as their standard machine. When you can even find these recorders, they run about $2100. Two available, my price $1400 each. Once these are gone there will be no more available. ------------------ I will let these go for the absolutely sacrificial price of $1000 each, or $1850 if you take both. You will make that the first time you lease them. Look them up anywhere and you will see them priced to DEALERS at $2100 if you even can find them. The last place I knew had them in stock was Graybar. Can take credit cards and ship internationally. I also will provide email or telephone assistance setting them up and operating if needed. Note video format is NTSC, which is the standard in the U.S. but not necessarily in other countries. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8636 From: G P Date: Fri May 14, 2004 4:45pm Subject: Completely off-topic humor http://www.commondreams.org/views04/0512-13.htm --------------------------------- Do you Yahoo!? SBC Yahoo! - Internet access at a great low price. [Non-text portions of this message have been removed] 8637 From: savanted1 Date: Fri May 14, 2004 5:43pm Subject: Student uncovers US military secrets Claire Whelan, a graduate student at the Dublin City University in Ireland, has found a way to recover blacked out text from US military documents using a dictionary and text analysis software. Ms. Whelan was given two documents, a memo to George Bush and a document about converting civilian helicopters for military uses, by cryptographer David Naccache, with the challenge to read the blacked out text. First, she identified the font and font size of a document, then did a dictionary search for words that would fit the blacked out space, give or take three pixels. Given the sentence "An Egyptian Islamic Jihad (EIJ) operative told an XXXXXXXX service at the same time that Bin Ladin was planning to exploit the operative's access to the US to mount a terrorist strike," the dictionary was able to find 1,530 possibilities for the blacked out text. The text analysis software used context to narrow the selection to 346 words. Ms. Whelan then examined the list to narrow it down to seven: Ugandan, Ukrainian, Egyptian, uninvited, incursive, indebted and unofficial. Mr. Naccache argues for 'Egyptian' given the context. The helicopter memo suggested that South Korea provided helicopter technology to Iraq after going through the process. Intelligence experts are considering changes to how they handle sensitive documents to avoid such techniques. http://www.theregister.co.uk/2004/05/13/student_unlocks_military_secr ets 8638 From: Dragos Ruiu Date: Sat May 15, 2004 2:27pm Subject: Re: Mobile Phone Anonymous Bluetooth Access Vulnerability http://cansecwest.com/csw04/csw04-Whitehouse.pdf Ollie Whitehouse's presentation on Bluetooth at CanSecWest/core04 recently. Ollie's fearsomely sharp :-). Keep your bluetooth stuff away from him :). cheers, --dr -- World Security Pros. Cutting Edge Training, Tools, and Techniques Tokyo, JapanNov 11-12 2004 http://pacsec.jp pgpkey http://dragos.com/ kyxpgp 8639 From: Gerald Michael Wieczorek Date: Sat May 15, 2004 8:43pm Subject: Re: Digest Number 1567 Doctored bEHEADING VIDEO:LINK NEWBIE THANKS FOR THE LINK: http://s2.yousendit.com/d.aspx?id=E...56C53D8C64DF2F7 Streaming video (LONGER THAT THE ONE ABOVE) http://www.dilby.com/ sHORT VERSION, IN THIS ONE THE MOUTH ON THE DISMEMBERED HEAD POPS OPEN. http://www.5tickets.com/nickbergdilbycom.wmv Higher quality streaming video: http://www.davva.com/beheaded.wmv sTILL PHOTOS: http://www.dilby.com/ EACH VERSION HAS SOMETHING THE OTHERS DON'T. SO i DON'T HAVE THE FULL VERSION YET. the Guy talks for almost 4 min. We have not seen 4 min worth of text any where on the news. The film is 30 seconds out of sync with sound. It is composed of 4 different cuts. He has no Idea what is comming. he even yawns at one point. And there are not the 5 clean cuts as described in the news. There is a continual sawing. UPDATE Why isn't ther more blood? Why isn't the head bleeding? Why can't we hear the papes the speaker is holding as he rattles and snaps and folds them?? There is a 6 second pause in the middle as the speaker folds and shuffels the papers, BUT the voice never pauses for 6 secs. I THINK ITS BECAUSE THE SOUND IS LAID IN AFTER THE VIDEO... iT MAY NOT BE Abu Musab al-Zarqawi, ONLY HIS VOICE...... tHE SPEAKER IS HOLDING 2 (TWO) SHEETS OF PAPER, BUT HE TURNS THEM OVER 5 (FIVE) TIMES??? IS HE READING THE SAME MATERIAL over again???? gUY ON FILM AND SPEAKER ARE TWO DIFFERENT PEOPLE..... Are the two on the viewers right and the speaker even moslems? Both use their left hands to adjust the masks near their mouths??? I the Middle east is is a custom to use your left hand for the bathroom, one would never use it to eat or touch ones mouth!!!! UPDATE END We have his body, so we know it happened. I am wondering about the 30 sec out of sync, and about the cuts, what was cut and why? and why we haven't seen the full text? I hope all voters see this. I hope this video steels everyone who sees it to the conviction these terrorists need to be CRUSHED. right now we have an oppurtunity to fight this there in the middle east.. We have the TROOPS there now. I don't want my kids and grand kids fighting this HERE in 20 years. We need to crush them over there NOW. Gerald Wieczorek Chief Forensics Fraud Investigator (tracking & Research) Follow up: CIA confirms it is Abu Musab al-Zarqawi voice! Why does he have his face covered? we know what he looks like, is this related to 30 sec out of sync? 8640 From: David Rom Date: Fri May 14, 2004 5:49am Subject: PBX - pdf manuals Hi all I need the manuals of 3 PBX's: Alkatel 4400. Meridian (Nortel) Coral (Tadiran) Do any of you have the manuals on pdf files?????? Regards David Rom (david@g...) CTO GD Intelligence Security LTD. ( www.gdis.co.il) [Non-text portions of this message have been removed] 8641 From: Steve Uhrig Date: Sat May 15, 2004 11:46pm Subject: Off topic Once upon a midnight dreary, Gerald Michael Wieczorek pondered, weak and weary: > Doctored bEHEADING VIDEO:LINK > NEWBIE THANKS FOR THE LINK: > http://s2.yousendit.com/d.aspx?id=E...56C53D8C64DF2F7 > Streaming video (LONGER THAT THE ONE ABOVE) > http://www.dilby.com/ I am speaking only for myself and no one else. Could we PLEASE keep this list on topic, reasonably close to TSCM or directly related technical topics? Anyone who spends any amount of time on the web sees all the same news items as anyone else. There virtually never is something here most of us have not seen elsewhere. Many lists have strayed so far off topic they're becoming useless and annoying. If you have something pertinent to TSCM, please post it. Political commentary, reposting of non-TSCM related news items, jokes and that sort of thing I find objectionable and I am certain I am speaking for the majority. This also includes lunatic fringe bleatings and thinly disguised requests for information on do-it-yourself bugging. Go somewhere else please. There are plenty of Usenet groups for all of the above. I am ashamed to recommend this list to my government associates any longer. A number have signed on, then a week later signed off because very little of the traffic was TSCM related. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8642 From: A Grudko Date: Sat May 15, 2004 9:56pm Subject: RE: Off topic ----Original Message----- From: Steve Uhrig [mailto:steve@s...] > Could we PLEASE keep this list on topic, reasonably close to TSCM or directly related technical topics? SECONDED Andy Grudko (British), DPM, Grad IS (South Africa) Consulting Investigator, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , andy@g... Pretoria (+27 12) 244 0255 - 244 0256 (Fax) Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.667 / Virus Database: 429 - Release Date: 2004/04/23 [Non-text portions of this message have been removed] 8643 From: Hawkspirit Date: Sun May 16, 2004 10:38am Subject: Off Topic I am with you Steve, where's the beef? Am I the only working sweeper in America? No one has any field activity to talk about? How about this, last week I did a sweep and the clients phone lines we fed digitally through the Cox network cable system. The digital service unit was on the side of the house. The perpetrators used an old telephone drop cable feed to bridge the analog side of the DSU and feed the analog back out to the street an up to an RF transmitter on a pole about a block away. Creative! Now let's get back talking some TSCM! Roger Tolces www.bugsweeps.com Steve Uhrig said: "Could we PLEASE keep this list on topic, reasonably close to TSCM or directly related technical topics? Anyone who spends any amount of time on the web sees all the same news items as anyone else. There virtually never is something here most of us have not seen elsewhere. Many lists have strayed so far off topic they're becoming useless and annoying. If you have something pertinent to TSCM, please post it. Political commentary, reposting of non-TSCM related news items, jokes and that sort of thing I find objectionable and I am certain I am speaking for the majority. This also includes lunatic fringe bleatings and thinly disguised requests for information on do-it-yourself bugging. Go somewhere else please." [Non-text portions of this message have been removed] 8644 From: James M. Atkinson Date: Sun May 16, 2004 1:40pm Subject: Micro-Tel Manuals and MSR-904 Controller If anybody is interested I have photocopies of Manuals for the Micro-Tel 700B and Micro-Tel MSR-904 available for $185 each, and include schematics. I also have a USB controller for the MSR-904 of my own design that replaces the original controller, and allows the MSR-904 to be controlled from a Windows XP laptop for $8300 each. This includesthe controller software written by me in Visual C++, and designed for specifically TSCM. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8645 From: James M. Atkinson Date: Sun May 16, 2004 1:43pm Subject: Reports of Spy Shop Visits I would like to invite list members to visit Spy Shops and post a report of their visit to this list will all the details of what they saw, who they talked to, what they were selling, and the lies they were told by the staff. Of particular interest to the list will be the bugs ad eavesdropping devices they are offering. Also of interest will be the rhetoric they are using to push their warez. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8646 From: CP Date: Sun May 16, 2004 7:48pm Subject: Re: PBX - pdf manuals Here is a link to one company that has some user guides for some Alcatel and Coral, proabably not the details you need, though. http://www.terratele.com/Business/productsbusiness/productcatalogbusiness/productpagebusiness/Toshiba_User.htm Do you know which Meridian system you're looking for? Charles Charles Patterson Global Communications Tarrytown, NY cp@t... ----- Original Message ----- From: David Rom To: TSCM-L@yahoogroups.com Sent: Friday, May 14, 2004 6:49 AM Subject: [TSCM-L] PBX - pdf manuals Hi all I need the manuals of 3 PBX's: Alkatel 4400. Meridian (Nortel) Coral (Tadiran) Do any of you have the manuals on pdf files?????? Regards David Rom (david@g...) CTO GD Intelligence Security LTD. ( www.gdis.co.il) [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 8647 From: Ocean Group Date: Mon May 17, 2004 11:43am Subject: RE: Telco Sweeps... Roger Was the telecom system wired using co-ax or was that an unauthorised addition? If that is the install, I presume it operates the same as a standard twisted pair.....why use co-ax...? What kind of telco systems are used over there in the US? In that, here we've got pots and isdn as the most used, however corporate wise you'll start to see VOIP. What's a "block" in engineering terms? Cheers Ois ************ Message: 2 Date: Sun, 16 May 2004 08:38:34 -0700 From: "Hawkspirit" Subject: Off Topic I am with you Steve, where's the beef? Am I the only working sweeper in America? No one has any field activity to talk about? How about this, last week I did a sweep and the clients phone lines we fed digitally through the Cox network cable system. The digital service unit was on the side of the house. The perpetrators used an old telephone drop cable feed to bridge the analog side of the DSU and feed the analog back out to the street an up to an RF transmitter on a pole about a block away. Creative! Now let's get back talking some TSCM! Roger Tolces --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.684 / Virus Database: 446 - Release Date: 13/05/2004 8648 From: Hawkspirit Date: Mon May 17, 2004 0:24pm Subject: Historical Bug Sweep Article Here is another historical bug sweep article just added. http://www.bugsweeps.com/info/hitech_snooping.html The Art of High-Tech Snooping (Time - April 20, 1987) How nigh-invisible devices can get under an embassy's skin by George J. Church Reported by Jay Peterzell/Washington and Raji Samghabadi/New York, with other bureaus Roger [Non-text portions of this message have been removed] 8649 From: Hawkspirit Date: Mon May 17, 2004 4:04pm Subject: Sweep needed Sweep of a residence is needed in Chicago area, contact me asap. Roger Tolces 760-329-4404 www.bugsweeps.com [Non-text portions of this message have been removed] 8650 From: G P Date: Mon May 17, 2004 6:00pm Subject: sweep needed Sweep needed ASAP for the Ministry of Truth in Oceania, please respond off-list for details. --------------------------------- Do you Yahoo!? SBC Yahoo! - Internet access at a great low price. [Non-text portions of this message have been removed] 8651 From: Ocean Group Date: Tue May 18, 2004 4:41am Subject: E.U. seeks quantum cryptography response to Echelon While I think the research is a good idea, I think the article itself is over hyped in that they deem the result to be an unbreakable code... However with advances in quantum computing going the way it is I wouldn't be surprised if the life of standard factoring encryption is over or almost so and therefore this can't happen too soon. ******************* IDG News Service 5/17/04 Philip Willan, IDG News Service, Rome Bureau The European Union is to invest Ä11 million (US $13 million) over the next four years to develop a secure communication system based on quantum cryptography, using physical laws governing the universe on the smallest scale to create and distribute unbreakable encryption keys, project coordinators said Monday. If successful, the project will produce the cryptographer's holy grail -- absolutely unbreakable code -- and thwart the eavesdropping efforts of espionage systems such as Echelon, which intercepts electronic messages on behalf of the intelligence services of the U.S., Britain, Canada, New Zealand and Australia. "The aim is to produce a communication system that cannot be intercepted by anyone, and that includes Echelon," said Sergio Cova, a professor from the electronics department of Milan Polytechnic and one of the project's coordinators. "We are talking about a system that requires significant technological innovations. We have to prove that it is workable, which is not the case at the moment." Major improvements in geographic range and speed of data transmission will be required before the system becomes a commercial reality, Cova said. "The report of the European Parliament on Echelon recommends using quantum cryptography as a solution to electronic eavesdropping. This is an effort to cope with Echelon," said Christian Monyk, the director of quantum technologies at the Austrian company ARC Seibersdorf Research GmbH and overall coordinator of the project. Economic espionage has caused serious harm to European companies in the past, Monyk said. "With this project we will be making an essential contribution to the economic independence of Europe." Quantum cryptography takes advantage of the physical properties of light particles, known as photons, to create and transmit binary messages. The angle of vibration of a photon as it travels through space -- its polarization -- can be used to represent a zero or a one under a system first devised by scientists Charles H. Bennett and Gilles Brassard in 1984. It has the advantage that any attempt to intercept the photons is liable to interfere with their polarization and can therefore be detected by those operating the system, the project coordinators said. An intercepted key would therefore be discarded and a new one created for use in its place. The new system, known as SECOQC (Secure Communication based on Quantum Cryptography), is intended for use by the secure generation and exchange of encryption keys, rather than for the actual exchange of data, Monyk said. "The encrypted data would then be transmitted by normal methods," he said. Messages encrypted using quantum mechanics can currently be transmitted over optical fibers for tens of kilometers. The European project intends to extend that range by combining quantum physics with other technologies, Monyk said. "The important thing about this project is that it is not based solely on quantum cryptography but on a combination with all the other components that are necessary to achieve an economic application," he said. "We are taking a really broad approach to quantum cryptography, which other countries haven't done." Experts in quantum physics, cryptography, software and network development from universities, research institutes and private companies in Austria, Belgium, Britain, Canada, the Czech Republic, Denmark, France, Germany, Italy, Russia, Sweden and Switzerland will be contributing to the project, Monyk said. In 18 months project participants will assess progress on a number of alternative solutions and decide which technologies are the most promising and merit further development, project coordinators said. SECOQC aims to have a workable technology ready in four years, but will probably require three to four years of work beyond that before commercial use, Monyk said. Cova was more cautious: "This is the equivalent of the first flight of the Wright brothers, so it is too early to be talking already about supersonic transatlantic travel." The technological challenges facing the project include the creation of sensors capable of recording the arrival of photons at high speed and photon generators that produce a single photon at a time, Cova said. "If two or three photons are released simultaneously they become vulnerable to interception," he said. Monyk believes there will be a global market of several million users once a workable solution has been developed. A political decision will have to be taken as to who those users will be in order to prevent terrorists and criminals from taking advantage of the completely secure communication network, he said. "In my view it should not be limited to senior government officials and the military, but made available to all users who need really secure communications," Monyk said. Banks, insurance companies and law firms could be potential clients, Monyk said, and a decision will have to be made as to whether and how a key could be made available to law enforcement authorities under exceptional circumstances. "It won't be up to us to decide who uses our results," said Milan Polytechnic's Cova. --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.684 / Virus Database: 446 - Release Date: 13/05/2004 8652 From: Ocean Group Date: Tue May 18, 2004 1:33pm Subject: RE: E.U. seeks quantum cryptography response to Echelon It is, but as you said, would require point to point implementation, which is just not a logistic viability at this time. I would imagine that the research will look into user to user implementations however this would be a question for the research group. If anyone has any sources of info on this research group I would welcome any contact details etc. Regards Ois -----Original Message----- From: shrevie@n... [mailto:shrevie@n...] Sent: 18 May 2004 16:50 To: Ocean Group Cc: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] E.U. seeks quantum cryptography response to Echelon Ok, stupid question time: Is it possible to implement a quantum cryptographic system over the public internet? It would seem not.... because if I understand this correctly, you'd need a proprietary box sitting at either end of a fiber transport to do communications.... in effect, back to the "bad old days" of dedicated point-to-point communications. Is this correct, or am I missing something? Moe Ocean Group wrote: > While I think the research is a good idea, I think the article itself > is over hyped in that they deem the result to be an unbreakable code... > > However with advances in quantum computing going the way it is I > wouldn't be surprised if the life of standard factoring encryption is > over or almost so and therefore this can't happen too soon. > > ******************* > > IDG News Service 5/17/04 > > Philip Willan, IDG News Service, Rome Bureau > > The European Union is to invest Ä11 million (US $13 million) over the > next four years to develop a secure communication system based on > quantum cryptography, using physical laws governing the universe on > the smallest scale to create and distribute unbreakable encryption > keys, project coordinators said Monday. > > If successful, the project will produce the cryptographer's holy grail > -- absolutely unbreakable code -- and thwart the eavesdropping efforts > of espionage systems such as Echelon, which intercepts electronic > messages on behalf of the intelligence services of the U.S., Britain, > Canada, New Zealand and Australia. > > "The aim is to produce a communication system that cannot be > intercepted by anyone, and that includes Echelon," said Sergio Cova, a > professor from the electronics department of Milan Polytechnic and one > of the project's coordinators. "We are talking about a system that > requires significant technological innovations. We have to prove that > it is workable, which is not the case at the moment." Major > improvements in geographic range and speed of data transmission will > be required before the system becomes a commercial reality, Cova said. > > "The report of the European Parliament on Echelon recommends using > quantum cryptography as a solution to electronic eavesdropping. This > is an effort to cope with Echelon," said Christian Monyk, the director > of quantum technologies at the Austrian company ARC Seibersdorf > Research GmbH and overall coordinator of the project. Economic > espionage has caused serious harm to European companies in the past, > Monyk said. "With this project we will be making an essential > contribution to the economic independence of Europe." > > Quantum cryptography takes advantage of the physical properties of > light particles, known as photons, to create and transmit binary > messages. The angle of vibration of a photon as it travels through > space -- its polarization -- can be used to represent a zero or a one > under a system first devised by scientists Charles H. Bennett and Gilles Brassard in 1984. > It has the advantage that any attempt to intercept the photons is > liable to interfere with their polarization and can therefore be > detected by those operating the system, the project coordinators said. > An intercepted key would therefore be discarded and a new one created for use in its place. > > The new system, known as SECOQC (Secure Communication based on Quantum > Cryptography), is intended for use by the secure generation and > exchange of encryption keys, rather than for the actual exchange of data, Monyk said. > > "The encrypted data would then be transmitted by normal methods," he said. > Messages encrypted using quantum mechanics can currently be > transmitted over optical fibers for tens of kilometers. The European > project intends to extend that range by combining quantum physics with > other technologies, Monyk said. "The important thing about this > project is that it is not based solely on quantum cryptography but on > a combination with all the other components that are necessary to achieve an economic application," he said. > "We are taking a really broad approach to quantum cryptography, which > other countries haven't done." > > Experts in quantum physics, cryptography, software and network > development from universities, research institutes and private > companies in Austria, Belgium, Britain, Canada, the Czech Republic, > Denmark, France, Germany, Italy, Russia, Sweden and Switzerland will > be contributing to the project, Monyk said. > > In 18 months project participants will assess progress on a number of > alternative solutions and decide which technologies are the most > promising and merit further development, project coordinators said. > SECOQC aims to have a workable technology ready in four years, but > will probably require three to four years of work beyond that before commercial use, Monyk said. > > Cova was more cautious: "This is the equivalent of the first flight of > the Wright brothers, so it is too early to be talking already about > supersonic transatlantic travel." > > The technological challenges facing the project include the creation > of sensors capable of recording the arrival of photons at high speed > and photon generators that produce a single photon at a time, Cova > said. "If two or three photons are released simultaneously they become > vulnerable to interception," he said. > > Monyk believes there will be a global market of several million users > once a workable solution has been developed. A political decision will > have to be taken as to who those users will be in order to prevent > terrorists and criminals from taking advantage of the completely > secure communication network, he said. > > "In my view it should not be limited to senior government officials > and the military, but made available to all users who need really > secure communications," Monyk said. Banks, insurance companies and law > firms could be potential clients, Monyk said, and a decision will have > to be made as to whether and how a key could be made available to law > enforcement authorities under exceptional circumstances. "It won't be > up to us to decide who uses our results," said Milan Polytechnic's Cova. > > --- > Outgoing mail is certified Virus Free. > Checked by AVG anti-virus system (http://www.grisoft.com). > Version: 6.0.684 / Virus Database: 446 - Release Date: 13/05/2004 > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, the > hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS Yahoo! Groups > Links > > > > > > --- Incoming mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.684 / Virus Database: 446 - Release Date: 13/05/2004 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.684 / Virus Database: 446 - Release Date: 13/05/2004 8653 From: Ocean Group Date: Tue May 18, 2004 1:40pm Subject: FW: Does anyone else get this message everytime they post to the list....? Jma maybe you can stop these bounces by removing the unused account from the list....? -----Original Message----- From: rtass@t... [mailto:rtass@t...] Sent: 18 May 2004 19:35 To: inertia@o... Subject: This email address is invalid. --- Incoming mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.684 / Virus Database: 446 - Release Date: 13/05/2004 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.684 / Virus Database: 446 - Release Date: 13/05/2004 8654 From: shrevie@n... Date: Tue May 18, 2004 10:50am Subject: Re: E.U. seeks quantum cryptography response to Echelon Ok, stupid question time: Is it possible to implement a quantum cryptographic system over the public internet? It would seem not.... because if I understand this correctly, you'd need a proprietary box sitting at either end of a fiber transport to do communications.... in effect, back to the "bad old days" of dedicated point-to-point communications. Is this correct, or am I missing something? Moe Ocean Group wrote: > While I think the research is a good idea, I think the article itself is > over hyped in that they deem the result to be an unbreakable code... > > However with advances in quantum computing going the way it is I wouldn't be > surprised if the life of standard factoring encryption is over or almost so > and therefore this can't happen too soon. > > ******************* > > IDG News Service 5/17/04 > > Philip Willan, IDG News Service, Rome Bureau > > The European Union is to invest Ä11 million (US $13 million) over the next > four years to develop a secure communication system based on quantum > cryptography, using physical laws governing the universe on the smallest > scale to create and distribute unbreakable encryption keys, project > coordinators said Monday. > > If successful, the project will produce the cryptographer's holy grail -- > absolutely unbreakable code -- and thwart the eavesdropping efforts of > espionage systems such as Echelon, which intercepts electronic messages on > behalf of the intelligence services of the U.S., Britain, Canada, New > Zealand and Australia. > > "The aim is to produce a communication system that cannot be intercepted by > anyone, and that includes Echelon," said Sergio Cova, a professor from the > electronics department of Milan Polytechnic and one of the project's > coordinators. "We are talking about a system that requires significant > technological innovations. We have to prove that it is workable, which is > not the case at the moment." Major improvements in geographic range and > speed of data transmission will be required before the system becomes a > commercial reality, Cova said. > > "The report of the European Parliament on Echelon recommends using quantum > cryptography as a solution to electronic eavesdropping. This is an effort to > cope with Echelon," said Christian Monyk, the director of quantum > technologies at the Austrian company ARC Seibersdorf Research GmbH and > overall coordinator of the project. Economic espionage has caused serious > harm to European companies in the past, Monyk said. "With this project we > will be making an essential contribution to the economic independence of > Europe." > > Quantum cryptography takes advantage of the physical properties of light > particles, known as photons, to create and transmit binary messages. The > angle of vibration of a photon as it travels through space -- its > polarization -- can be used to represent a zero or a one under a system > first devised by scientists Charles H. Bennett and Gilles Brassard in 1984. > It has the advantage that any attempt to intercept the photons is liable to > interfere with their polarization and can therefore be detected by those > operating the system, the project coordinators said. An intercepted key > would therefore be discarded and a new one created for use in its place. > > The new system, known as SECOQC (Secure Communication based on Quantum > Cryptography), is intended for use by the secure generation and exchange of > encryption keys, rather than for the actual exchange of data, Monyk said. > > "The encrypted data would then be transmitted by normal methods," he said. > Messages encrypted using quantum mechanics can currently be transmitted over > optical fibers for tens of kilometers. The European project intends to > extend that range by combining quantum physics with other technologies, > Monyk said. "The important thing about this project is that it is not based > solely on quantum cryptography but on a combination with all the other > components that are necessary to achieve an economic application," he said. > "We are taking a really broad approach to quantum cryptography, which other > countries haven't done." > > Experts in quantum physics, cryptography, software and network development > from universities, research institutes and private companies in Austria, > Belgium, Britain, Canada, the Czech Republic, Denmark, France, Germany, > Italy, Russia, Sweden and Switzerland will be contributing to the project, > Monyk said. > > In 18 months project participants will assess progress on a number of > alternative solutions and decide which technologies are the most promising > and merit further development, project coordinators said. SECOQC aims to > have a workable technology ready in four years, but will probably require > three to four years of work beyond that before commercial use, Monyk said. > > Cova was more cautious: "This is the equivalent of the first flight of the > Wright brothers, so it is too early to be talking already about supersonic > transatlantic travel." > > The technological challenges facing the project include the creation of > sensors capable of recording the arrival of photons at high speed and photon > generators that produce a single photon at a time, Cova said. "If two or > three photons are released simultaneously they become vulnerable to > interception," he said. > > Monyk believes there will be a global market of several million users once a > workable solution has been developed. A political decision will have to be > taken as to who those users will be in order to prevent terrorists and > criminals from taking advantage of the completely secure communication > network, he said. > > "In my view it should not be limited to senior government officials and the > military, but made available to all users who need really secure > communications," Monyk said. Banks, insurance companies and law firms could > be potential clients, Monyk said, and a decision will have to be made as to > whether and how a key could be made available to law enforcement authorities > under exceptional circumstances. "It won't be up to us to decide who uses > our results," said Milan Polytechnic's Cova. > > --- > Outgoing mail is certified Virus Free. > Checked by AVG anti-virus system (http://www.grisoft.com). > Version: 6.0.684 / Virus Database: 446 - Release Date: 13/05/2004 > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > 8655 From: savanted1 Date: Tue May 18, 2004 11:14am Subject: Terror Wiretap Warrants Outpace Those for Criminal Cases According to government statistics recently released by the Administrative Office of the U.S. Courts, federal and state courts approved a total of 1,442 wiretap warrants for criminal cases in 2003. The Foreign Intelligence Surveillance Court statistics show 1,724 wiretap warrants in terrorism and espionage cases within the same time period. Tim Edgar, legislative director of the American Civil Liberties Union's Washington office, asserts the statistics are disturbing in that they reveal a trend towards more government secrecy. Edgar notes "That these warrants [related to terrorism and espionage] are becoming the major form of surveillance in this country is very troubling. The Justice Department has a different opinion of the statistics. Attorney General John Ashcroft maintains that the increase in surveillance warrants for terror and espionage cases shows that the department is aggressively hunting suspected terrorists. http://seattlepi.nwsource.com/national/172625_wiretaps10.html Related Article: Terrorism Wiretaps Outnumber Criminal Ones http://www.washtimes.com/upi-breaking/20040510-012853-8911r.htm From: James M. Atkinson, Comm-Eng Date: Mon May 15, 2000 9:33pm Subject: Re: http://www.realspy.com/ At 10:22 PM -0400 5/15/00, MACCFound@a... wrote: >Forgive Your Enemies, Forget Not Their Names! Amen... -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 333 From: James M. Atkinson, Comm-Eng Date: Tue May 16, 2000 10:56am Subject: Chinese spy posing as reporter caught at NBA playoff >Tuesday, May 16, 2000 > >Chinese spy posing as reporter caught at NBA playoff > >By David M. Bresnahan >C 2000 WorldNetDaily.com > >Although recent FBI reports allege that >foreign spies have been gaining access to >U.S. secrets by posing as reporters, it >turns out that this may be nothing new. >In fact, one hard-working Chinese spy was >caught working as a journalist covering an >NBA playoff game a few seasons back. > >Security staff from the Utah Jazz basketball >team were asked by the FBI to help capture >a spy from China who was at a 1997 game in >Salt Lake City as an accredited member of >the press. It happened during the fourth >game of the series between the Jazz and the >Chicago Bulls. [snip] > >"Over the last 15 years, no foreign intelligence >service officer under media cover has been >declared persona non grata for engaging in >espionage activities," said Timothy D. Bereznay, >section chief from the National Security Division >of the FBI as he testified before the house >committee last week. > >Maybe not, but then, no one seems to know what >happened to the Chinese spy who liked basketball. > >"When our photographer got ready to shoot the >pictures, the spy was gone. It was just prior >to the beginning of half time. What happened >was that this guy had left his seat because he >wanted to see the half time. The half time was >when AT&T gave away a million dollars, or they >were attempting to give away a million dollars," >recalled Allred. [snip] >Bereznay told the committee that many spies pretend >to be reporters, but none have been forced to leave >the country. > >"Historically, hostile intelligence services have >utilized media cover for intelligence activities >in the United States. However, because intelligence >officers under media cover do not have diplomatic >immunity, they normally perform in-depth but overt >intelligence collection. Clandestine handling of >agents or other covert activity is usually assigned >to intelligence officers under diplomatic cover," >he said. > >"In addition to overt intelligence collection, >intelligence officers under correspondent cover >have been engaged in active measures campaigns >designed to support their national interests and >to influence United States policy makers. Active >measures campaigns take the form of oral persuasions >or the dissemination of written information favorable >to their national policy -- both of which are >facilitated by intelligence officers under media cover. >Hostile intelligence services use active measures as >an inexpensive and relatively low-risk way to advance >their international positions," explained Bereznay in >his testimony last week. The entire article may be found at: http://www.worldnetdaily.com/bluesky_bresnahan/20000516_xnbre_red_journa.shtml -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 334 From: William Knowles Date: Tue May 16, 2000 0:00pm Subject: Arbitrary rant of the day. James & Group... I thought you might appreciate this one, as its being posted to a few security lists now. William Knowles wk@c... ---------- Forwarded message ---------- Date: Mon, 15 May 2000 19:34:55 -0600 (MDT) From: cult hero To: cult hero Subject: Arbitrary rant of the day. William Knowles pointed me to www.realspy.com today, as they had apparently changed their web page after a recent defacement. Below is the message currently up on their server: Due to hackers rewriting my pages from others websites, we will be down for 1 to 2 weeks to reconfigure a hardware firewall and newly designed web page. We are sorry for this inconvenience On another note, to all you harmfull hscker and crakers---YOU CAN KISS MY ASS! I am a member of the FBI's ANSIR program and I will be turning IP address from my server logs over to them to (5-15-2000) today. Just remember, don't pick up the soap! This pathetic and unprofessional message demands several points be made. Due to hackers rewriting my pages from others websites, we will be down for 1 to 2 weeks to reconfigure a hardware firewall and newly designed web page. Perhaps this is how some companies reach exceptionally large damage figures. Rather than hiring a security consultant for one day of work, patching the hole and getting back to business, they use it as an excuse to redesign the site. The charges associated with web design no doubt get lumped into the 'hacker damage' figure. If the down time is 2 weeks to "reconfigure" a hardware firewall, this shows a complete lack of technical proficiency in applying basic security to a web site. On another note, to all you harmfull hscker and crakers---YOU CAN KISS MY ASS! Great encouragement here. I am sure a 'real spy' would say exactly this. You've already proven you are vulnerable and the computer criminals have one upped you. Challenging them to do it again can only serve to hurt you further and subject you to more attacks. Even if it is a trap with FBI agents lying in wait, it is still taking away from your business. When the next computer criminal breaches this site, do you think they will stop with a simple web page defacement? I won't even go into the whole 'hscker vs craker' debate. I am a member of the FBI's ANSIR program and I will be turning IP address from my server logs over to them to (5-15-2000) today. This is an exceptional advertisement for the FBI ANSIR team, really. What is ANSIR exactly, and what do they do? http://www.fbi.gov/programs/ansir/ansir.htm The program is designed to provide unclassified national security threat and warning information to U.S. corporate security directors and executives, law enforcement, and other government agencies. Looking at a few of their advisories: 99-002 Upcoming Significant Anniversary Dates 99-007 China Cyber Activity Advisory 99-010 Well-publicized Hacker Activity Against U.S. Government Sites Wow, what a truly relevant program to tout to hackers. Why not proclaim your membership with a tennis club and threaten hackers with that too? In case you aren't aware, ANYONE can report computer crime to the FBI. They make it quite simple really. Here is a list of all their field offices in case you'd like to report some crime yourself: http://www.fbi.gov/fo/fo.htm This of course begs the questions, why didn't ANSIR warn him about the vulnerability used to exploit and deface the web site. Oh wait... And the last comment from www.realspy.com: Just remember, don't pick up the soap! This sounds like something straight off the 'Happy Hacker' web site. The vague threat that the computer criminal will not only be caught, but prosecuted and sentenced to time in prison where they will have less than pleasant relations with other prisoners. Given the rash of web defacers who have taunted the FBI and proclaimed they would never be caught, this hardly seems a deterent. More so that few of them ever see the inside of a jail or prison. So what does this kind of message really accomplish? Absolutely nothing productive. It only serves to encourage more attacks, waste time and resources that should be spent on business, and generally make the owner look like a fool. Why am I writing and picking on this site? Because in the course of mirroring over a thousand defaced web pages, I have seen this reaction before. What I haven't seen is a productive result following this kind of obnoxious note being posted. I have only seen it cause further hassle, further embarassment, and further work for the FBI. Please, swallow your pride and respond to these incidents in a better fashion. Starting pissing wars with people that know computer security better than you doesn't seem too bright. Brian Martin ATTRITION Staff 335 From: Jordan Ulery Date: Tue May 16, 2000 1:54pm Subject: Re: West Point Jim makes an excellent point. My father served as a Corp USMC WWII. At the end of the war he was discharged and applied to USAR as an enlisted man. They made him an officer instead (after OCS). The rational was that an NCO in the Corps is worth and Officer in the Army. My son is in the Corps now. MARINES magazine and Leatherneck have both published articles about the quality of NCO training. I am sure it is similar in the other branches. In the Corps the NCO junior and senior staff training is rated equivalent to an MBA. Some of that is just hype. The Corps has a differing approach to leadership that I am certain may will attest to. It begins with the squad members and proceed up from there. Leadership is go given, nor is it taught (at least not completely). Leadership is a skill that is learned. You would think that after all the wars fought, the management team of teh services would realize that a 90 second combat life expectance is not a good thing for a "leader" to experience. Teach the skill, weed out those who are academic and put them where they can help, not harm our men and women. Find teh people who can learn the skill. When leadership is learned well, the salute that goes with the rank is then earned. "James M. Atkinson, Comm-Eng" wrote: > At 11:22 AM -0700 5/15/00, Gregory Horton wrote: > >While I agree with Mr. Keenan that the military is in an abused state > >under the Clinton administration, I must correct some of his > >statements. I just retired from an Army Reserve unit where I was the > >Operations Sergeant Major, and the OpTempo is very busy. We deployed > >and are deploying soldiers to Bosnia and Kosovo (among other places) for > >six month rotations. With train-up and debriefing periods on the front > >and end of the tour, the total time is usually close to 9 months. Once > >they are deployed to Bosnia or Kosovo, they can't, by law, be sent back > >to that region again. There are laws protecting the service members from > >termination (I believe it falls under the Soldier, Sailor, Airmen Relief > >Act) and this has successfully been used to protect them. This > >information in no way is meant to minimize the strain put on the reserve > >system by the high OpTempo. The kids are brought in with the promise of > >college funds and no mention of 9 month deployments right in the middle > >of their scholastic endeavors. There have been some pretty unhappy > >campers, but for the most part, the young men and women have taken the > >challenge and risen to the occasion. You might (and probably should) > >fault the system, but you can be damn proud of the patriotic kids this > >country still produces. > >Greg Horton > > That is a very good point Greg, > > Personally I would like to see the rules changes so that no service > member (including officers) was sent outside of the US (unless it's > wartime) until they are on their second 4 year enlistment. > > I feel strongly that officers should not be commissioned until they > have several at least 4 years of active duty, completed 4 years of > college, then completed several years as an NCO and attended a SERIES > of leadership academies (not just ROTC, OCS, or a service academy). > > Sadly, the US has officers that are very poor leaders who tend to be > more skilled in paperwork, then in battlefield tactics. Years ago > they used to tell us that the only thing that would get an officer > out of a foxhole was a pissed off NCO holding a bayonet at his back. > > Of course there are good officer out there, but they are really hard to find. > > -jma > > =================================================================== > Sed quis custodiet ipsos Custodes? > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > "...any sufficiently advanced technology is > indistinguishable from magic." - Arthur C. Clarke > =================================================================== > > ------------------------------------------------------------------------ > Best friends, most artistic, class clown Find 'em here: > http://click.egroups.com/1/4054/1/_/507420/_/958417536/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS [Non-text portions of this message have been removed] 336 From: Jordan Ulery Date: Tue May 16, 2000 3:53pm Subject: Re: Arbitrary rant of the day. Too well stated for further comment William Knowles wrote: > James & Group... > > I thought you might appreciate this one, as its being posted to a few > security lists now. > > William Knowles > wk@c... > > ---------- Forwarded message ---------- > Date: Mon, 15 May 2000 19:34:55 -0600 (MDT) > From: cult hero > To: cult hero > Subject: Arbitrary rant of the day. > > William Knowles pointed me to www.realspy.com today, as they had > apparently changed their web page after a recent defacement. > > Below is the message currently up on their server: > > Due to hackers rewriting my pages from others websites, we will be > down for 1 to 2 weeks to reconfigure a hardware firewall and newly > designed web page. > > We are sorry for this inconvenience > > On another note, to all you harmfull hscker and crakers---YOU CAN KISS > MY ASS! > > I am a member of the FBI's ANSIR program and I will be turning IP > address from my server logs over to them to (5-15-2000) today. > > Just remember, don't pick up the soap! > > This pathetic and unprofessional message demands several points be made. > > Due to hackers rewriting my pages from others websites, we will be > down for 1 to 2 weeks to reconfigure a hardware firewall and newly > designed web page. > > Perhaps this is how some companies reach exceptionally large damage > figures. Rather than hiring a security consultant for one day of work, > patching the hole and getting back to business, they use it as an excuse > to redesign the site. The charges associated with web design no doubt get > lumped into the 'hacker damage' figure. If the down time is 2 weeks to > "reconfigure" a hardware firewall, this shows a complete lack of technical > proficiency in applying basic security to a web site. > > On another note, to all you harmfull hscker and crakers---YOU CAN KISS > MY ASS! > > Great encouragement here. I am sure a 'real spy' would say exactly this. > You've already proven you are vulnerable and the computer criminals have > one upped you. Challenging them to do it again can only serve to hurt you > further and subject you to more attacks. Even if it is a trap with FBI > agents lying in wait, it is still taking away from your business. When the > next computer criminal breaches this site, do you think they will stop > with a simple web page defacement? > > I won't even go into the whole 'hscker vs craker' debate. > > I am a member of the FBI's ANSIR program and I will be turning IP > address from my server logs over to them to (5-15-2000) today. > > This is an exceptional advertisement for the FBI ANSIR team, really. What > is ANSIR exactly, and what do they do? > > http://www.fbi.gov/programs/ansir/ansir.htm > > The program is designed to provide unclassified national security > threat and warning information to U.S. corporate security directors > and executives, law enforcement, and other government agencies. > > Looking at a few of their advisories: > > 99-002 Upcoming Significant Anniversary Dates > 99-007 China Cyber Activity Advisory > 99-010 Well-publicized Hacker Activity Against U.S. Government Sites > > Wow, what a truly relevant program to tout to hackers. Why not proclaim > your membership with a tennis club and threaten hackers with that too? In > case you aren't aware, ANYONE can report computer crime to the FBI. They > make it quite simple really. Here is a list of all their field offices in > case you'd like to report some crime yourself: > > http://www.fbi.gov/fo/fo.htm > > This of course begs the questions, why didn't ANSIR warn him about the > vulnerability used to exploit and deface the web site. Oh wait... > > And the last comment from www.realspy.com: > > Just remember, don't pick up the soap! > > This sounds like something straight off the 'Happy Hacker' web site. The > vague threat that the computer criminal will not only be caught, but > prosecuted and sentenced to time in prison where they will have less than > pleasant relations with other prisoners. Given the rash of web defacers > who have taunted the FBI and proclaimed they would never be caught, this > hardly seems a deterent. More so that few of them ever see the inside of a > jail or prison. > > So what does this kind of message really accomplish? Absolutely nothing > productive. It only serves to encourage more attacks, waste time and > resources that should be spent on business, and generally make the owner > look like a fool. > > Why am I writing and picking on this site? Because in the course of > mirroring over a thousand defaced web pages, I have seen this reaction > before. What I haven't seen is a productive result following this kind of > obnoxious note being posted. I have only seen it cause further hassle, > further embarassment, and further work for the FBI. > > Please, swallow your pride and respond to these incidents in a better > fashion. Starting pissing wars with people that know computer security > better than you doesn't seem too bright. > > Brian Martin > ATTRITION Staff > > ------------------------------------------------------------------------ > Save 75% on Products! > Find incredible deals on overstocked items with Free shipping! > http://click.egroups.com/1/4013/1/_/507420/_/958506798/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 337 From: spies Date: Tue May 16, 2000 4:50pm Subject: Re: AID I,am not even in this line of work and I had two A.I.D. catalogs.They where very easy to get. Steve Uhrig wrote: > > Not true... I have a four foot stack of materials about every > > product they have produced over the last 15 years, and almost > > 1000 database entries on every variation of every product and > > frequency they offered during that time. > > You are the exception, not the rule. > > The industry, as a whole, knew little of AID. > > In years past (Jack Holcomb days), EVERY catalog was hand > delilvered. NONE mailed. EVERY previous years' catalog was > returned or that agency was cut off. > > How do you know frequencies? AID manufactured their own > crystals. In many if not most cases, the users did not even know > the frequencies of operation. > > Every agency was given a different assignment. There was no such > thing as "house" frequencies. Frequencies were not re-used. I > have serviced many pieces of AID gear, and I have never seen the > same frequency more than once. > > > Law enforcement surveillance equipment tends not to be very > > sophisticated simply because the users are generally not > > sophisticated themselves (with a few exceptions). > > You apparently have never spent a week at NATIA. > > > Actual the NIA courses have been getting farmed out to outside > > contractors recently. > > NIA has been closed for a year at least. > > > Ah, but NOTHING AID offers is sole source. > > AID manufactured many products for which there was no equivalent > from any manufacturer. They did others for which the only > competition was inferior quality converted hobby toys. At least > half of what AID offered was not available anywhere else on the > planet. > > Who else made an audio transmitter into the base of an automatic > pistol magazine, which would still operate the weapon with 5 > rounds? Several reputable companies tried and were unable to > make anything withstand the recoil forces and still maintain a > reasonable price level. > > > Only a small fraction of what AID was selling was FCC approved, > > which would in turn mean that the majority of the equipment they > > sold to Non Federal Law Enforcement channels was illegal. > > NOT true. 100% of AID's audio transmitters were type accepted. > That was a niche only they had, for a good while. For many > years, the only LEGAL transmitter was AID. > > If they did indeed sell non-type-accepted stuff to NYPD, that > was a recent decision not involving any of the former > management. > > AID stuff was marvelous quality, very good performing, well > engineered by people who had used the stuff in the streets. > Their RF gear was superb. Their receivers had specs so good most > of the industry test equipment could not be used to measure it. > > AID set industry standards in antenna efficiency. Their one watt > transmitter (for example) would talk substantially further than > anyone else's. The difference was in the antennas. > > I have yet to be able to match their beacon transmitter antenna > performance, even with one in front of me and copying the > circuit with identical values. There is something in their > design *and fabrication* no one else has been able to duplicate. > > AID is like Motorola is to two way radios. Top performers, super > rugged, very high level of support, top prices. The stuff works > so well, is so rugged and so reliable that you do not care about > the high prices. I could buy 4 ICOM portables for what I pay for > encrypted Sabers, but the Sabers are worth far more than the > ICOMs. > > I've changed my opinions over the last several years. I'm back > in the Motorola camp where I started, and not fooling with > competitive surveillance equipment where another company (TTI > now that AID is defunct) makes an acceptable product. > > Charley Goforth is a good friend and in fact my agent in Brazil. > He is as honest and competent as they come. > > IST (Innovative Surveillance Technology) now has most of the > former AID types, the same market, similar products, even > similar location, similar training. IST will step in where AID > was, and in 5 years no one will remember AID and the wannabees > and frustrated competitors will be whining about IST. > > Steve > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > ------------------------------------------------------------------------ > 72% off on Name brand Watches! > Come and buy today and get free shipping! > http://click.egroups.com/1/4011/1/_/507420/_/958435967/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 338 From: Date: Tue May 16, 2000 2:37pm Subject: Re: AID In a message dated 5/16/00 3:09:21 PM Pacific Daylight Time, spies@m... writes: << They where very easy to get. >> Please tell me how? 339 From: Tommy Bridges Date: Tue May 16, 2000 8:33pm Subject: Re: AID MACCFound@a... wrote: > > In a message dated 5/16/00 3:09:21 PM Pacific Daylight Time, > spies@m... writes: > > << They where very easy to get. >> > > Please tell me how? Cut and paste the links AID Audio Intelligence Devices, Inc. 12301 N.W. 39th Street Coral Springs, Florida 33065 (954)255-2600 800-243-4642 FAX(954)255-2621 http://www.aid-nia.com/ http://www.millercc.com/factsht/paids.htm Catalog Request http://www.aid-nia.com/catalog.htm WARNING! This site is intended for use solely by officers and agents of official governmental investigative or law enforcement agencies and departments. NIA National Intelligence Academy 12301 N.W. 39th Street Coral Springs, Florida 33065 (954)255-2640 800-243-1249 FAX(954)255-2641 _______________________________________________ Tommy Bridges Jefferson County Sheriff's Department Birmingham, Alabama 35203 205-325-5911 Office 205-325-5864 Fax 205-542-9965 Cellular FBI-BHAM Innocent Images Task Force 205-715-0370 ________________________________________________ [Non-text portions of this message have been removed] 340 From: Jay Coote Date: Tue May 16, 2000 9:34pm Subject: Experiences with Transit Cases? I'd like to hear anyone's comments on cases for equipment such as receivers, spectrum analyzers and other test equipment, inspection equipment and tools.... What do US airlines require in transit cases for "electronic equipment"? I'm thinking of Pelican cases or something similar. Some of my equipment I would like to stay in the case (receivers, etc). Comments and Southern California sources appreciated. (FYI- Aardvark Tactical in Arcadia, CA is one Pelican source) Thanks, Jay Coote Los Angeles 341 From: Ed Naylor Date: Tue May 16, 2000 9:52pm Subject: Re: Experiences with Transit Cases? Jay, I've moved a lot of specialized equipment via airlines over the past 30 years. They have never imposed any requirements per se. The Pelican cases are excellent. Jensen Tools out of Phoenix www.jensentools.com sells a wide variety of suitable cases and containers. Ed (Engineered Systems) ============================================: >I'd like to hear anyone's comments on cases for equipment such as receivers, >spectrum analyzers and other test equipment, inspection equipment and >tools.... 342 From: spies Date: Tue May 16, 2000 9:42pm Subject: Re: AID It's,who you know. MACCFound@a... wrote: > In a message dated 5/16/00 3:09:21 PM Pacific Daylight Time, > spies@m... writes: > > << They where very easy to get. >> > > Please tell me how? > > ------------------------------------------------------------------------ > Join Garden.com's affiliate program and enjoy numerous benefits. > To learn more click here: > http://click.egroups.com/1/2955/1/_/507420/_/958520518/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 343 From: spies Date: Tue May 16, 2000 9:59pm Subject: Re: AID Anyway ,I saw nothing in either catalog that impressed me so I,trashed them.I,was looking for something more exotic. Tommy Bridges wrote: > MACCFound@a... wrote: > > > > In a message dated 5/16/00 3:09:21 PM Pacific Daylight Time, > > spies@m... writes: > > > > << They where very easy to get. >> > > > > Please tell me how? > > Cut and paste the links > > AID Audio Intelligence Devices, Inc. > 12301 N.W. 39th Street Coral Springs, Florida 33065 > (954)255-2600 800-243-4642 FAX(954)255-2621 > http://www.aid-nia.com/ > http://www.millercc.com/factsht/paids.htm > > Catalog Request http://www.aid-nia.com/catalog.htm > WARNING! This site is intended for use solely by officers > and agents of official governmental investigative or > law enforcement agencies and departments. > > NIA National Intelligence Academy > 12301 N.W. 39th Street Coral Springs, Florida 33065 > (954)255-2640 800-243-1249 FAX(954)255-2641 > > _______________________________________________ > Tommy Bridges > Jefferson County Sheriff's Department > Birmingham, Alabama 35203 > 205-325-5911 Office > 205-325-5864 Fax > 205-542-9965 Cellular > > FBI-BHAM > Innocent Images > Task Force > 205-715-0370 > ________________________________________________ > > [Non-text portions of this message have been removed] > > ------------------------------------------------------------------------ > Old school buds here: > http://click.egroups.com/1/4057/1/_/507420/_/958529782/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 344 From: Date: Tue May 16, 2000 8:39pm Subject: Re: AID In a message dated 5/16/00 8:18:03 PM Pacific Daylight Time, spies@m... writes: << It's,who you know. >> I wonder where Jim R. got two extras to give you? 345 From: Date: Tue May 16, 2000 8:53pm Subject: Re: AID In a message dated 5/16/00 8:18:03 PM Pacific Daylight Time, spies@m... writes: << It's,who you know. >> I bet you don't have an SWS catalog. They are far more rare than Aid and almost always sent to federal agencies only I bet you've never even seen one and if you had, You wouldn't throw it away. Last I heard they were issued at NATIA only 346 From: G. Hoxie Date: Wed May 17, 2000 7:07am Subject: http://www.realspy.com/ has been HACKED Jim, I didn't know if you had seen but, it appears that the person running this site has pissed off more than just you. Unfortunatly he appears to have offended someone with some computer skills and a little time on their hands. His site is down for the count and he seems a little , shall we say, miffed. I guess the old sying is true: "What goes around, comes around sooner or later". Cheers, George --- In TSCM-L@egroups.com, "James M. Atkinson, Comm-Eng" wrote: > At 10:22 PM -0400 5/15/00, MACCFound@a... wrote: > >Forgive Your Enemies, Forget Not Their Names! > > > > Amen... > > > -jma > > > =================================================================== > Sed quis custodiet ipsos Custodes? > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > "...any sufficiently advanced technology is > indistinguishable from magic." - Arthur C. Clarke > =================================================================== 347 From: G. Hoxie Date: Wed May 17, 2000 7:21am Subject: Re: Experiences with Transit Cases? I found several large photo / video cases that I have used recently. They are the "Seal Tight" brand made by DOSKOCIL, P.O. Box 1246, Arlington, TX76004-1246. The cases I purchased were the 19 3/8" X 14 1/4" X 8" and only cost $59.95 each. They come with the pre-cut foam so you can custom fit your gear, they have a lifetime warrenty and, most importantly, they were less than HALF the cost of the Pelican cases. They look just like the Pelican and even have a pressure bleeder on the bottom so you can equalize the air pressure inside the case. Hope this is of some help to you, George --- In TSCM-L@egroups.com, Ed Naylor wrote: > Jay, > > I've moved a lot of specialized equipment via airlines over the past 30 > years. They have never imposed any requirements per se. > > The Pelican cases are excellent. Jensen Tools out of Phoenix > www.jensentools.com sells a wide variety of suitable cases and containers. > > Ed (Engineered Systems) > > > ============================================: > >I'd like to hear anyone's comments on cases for equipment such as receivers, > >spectrum analyzers and other test equipment, inspection equipment and > >tools.... 348 From: spies Date: Wed May 17, 2000 9:29am Subject: Re: AID Your,right I do not have one of those.But it was not Mr.Ross.Wrong,guess.And now for who wants to be a millionare is that your final answer? MACCFound@a... wrote: > In a message dated 5/16/00 8:18:03 PM Pacific Daylight Time, > spies@m... writes: > > << It's,who you know. >> > > I bet you don't have an SWS catalog. They are far > more rare than Aid and almost always sent to federal agencies only > > I bet you've never even seen one and if you had, You wouldn't throw it > away. > > Last I heard they were issued at NATIA only > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 349 From: Robert G. Ferrell Date: Tue May 16, 2000 0:15pm Subject: Re: http://www.realspy.com/ >>Forgive Your Enemies, Forget Not Their Names! When James Thurber's uncle Jake Fisher was lying on his death bed, the minister asked if he would like to forgive his enemies. "I ain't got any," the old man replied, "I licked 'em all." RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center, US DoI Robert_G_Ferrell@n... ------------------------------------------------------------ Nothing I have ever said should be construed as even vaguely representing an official statement by the NBC or DoI. ------------------------------------------------------------ 350 From: Mike F Date: Wed May 17, 2000 7:20am Subject: Electronic devices To:All the members of this list who responded to my antenna camera request, THANK YOU! Below I have listed one of my favorite places to find electronic stuff. Nuts & Volts Magazine has an XXX-CELL-ANT RESOURCE of Links for ALL TYPES of ELECTRONICS: http://www.nutsvolts.com/adlinks.htm At the webpage you can sign up get free sample copy of nuts & volts: http://www.nutsvolts.com/smplecpy.htm later4,mike f. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 351 From: Mike F Date: Wed May 17, 2000 7:33am Subject: smoke detectors Does any one know where I can purchase the Housing for smoke detectors? I need a smoke detecter with nothing in it so I can put in camera. I can purchase smoke detecters & take the guts out, but that would be a waste of time & my money. If any one knows where i could purchase this I would appreciatte any & all info. later4,mike f. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 352 From: Mike F Date: Wed May 17, 2000 9:22am Subject: Intelligence & CounterIntelligence Resources ""Listed below are links to some of the best sources of information relating to intelligence. We hope you find them useful. -- SLR"" http://www.silverlance.com/audiover/intel.htm The 2 sentences above the URL,are from the web page. I agree that they are some best sources,and located on one page. later4,mike f Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 353 From: Date: Wed May 17, 2000 9:12am Subject: Re: http://www.realspy.com/ has been HACKED Don't know if this is exactly right..please correct me. "The greatest form of flattery is imitation." Pat yourself on the back James! Guppy 354 From: James M. Atkinson, Comm-Eng Date: Wed May 17, 2000 1:44pm Subject: AID Catalogs Ok, as a favor to me lets squelch the banter about how easy/hard the AID catalogs are to get. Some of us have them, and some of us don't, but the bottom line is that AID is a totally different company these days and is doing little more then pimping other companies products, having killed off most of their own product lines. Their latest catalog is seriously watered down, and in a few years the company name itself will become little more then a memory. Of course if they get some aggressive R&D established, and some strong management they could be a serious force once again. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 355 From: Jay Coote Date: Wed May 17, 2000 3:26pm Subject: Some downconvertor info: I had a few answers to my queries regarding microwave downconvertors and RF preamplifiers for TSCM receivers and SA's. If anyone is interested, Avcom has a 2 Ghz 22dB preamp. ISA has 1-3 and 1-7 Ghz handheld range extenders (w LP antenna) for their ECR countermeasures receiver. I'm still looking for kit or module "do-it-yourself" downconvertors for 2-4 GHz, 4-6, GHz, 6-8 GHz with a 0-2 GHz IF (output) Thanks, Jay Coote Los Angeles TSCM@j... 356 From: Jay Coote Date: Wed May 17, 2000 3:51pm Subject: Vehicle Tracking Transmitters This may seem like old hat to some, but could be of interest. There are some vehicle tracking "subscription services" which use a cellular-like form of vehicle tracking. No GPS is involved; time or phase is used instead. One such system uses a small (6" x 4" x 1.5") transceiver. Some of these services may charge each time the subscriber logs on via modem, or, may charge for each transmission. With the cost factor, many users will want their systems to squirt data as little as possible. The TSCMist may not find one of these with a receiver or SA search (Though I haven't checked one of these units for LO radiation). It may be a long wait until the transmitter goes on-air! This unit transmits somewhere between 904 and 916 MHz, receives somewhere in 923 to 931 MHz. Receive or idle current is around 25-35 mA, transmit current between 2 and 3 Amps! The unit may have other inputs for motion detector, ignition sense, cargo or tamper alarms. The antenna may be a 3" x 3" x 1/2" black plastic "patch" with pyramid-shaped sides, or may be a round patch. The feedline will probably be standard black RG-58 type coaxial cable. A TSCM search for one of these in a vehicle would require current measurements from the battery out. Also, this unit may have a battery of it's own which could be trickle-charged from vehicle ignition. The TSCM search should include shaking or moving the vehicle, opening doors, starting the engine (with the RF equipment nearby) in case the the transmitter may be programmed to fire if the status of the vehicle changes. Just a "heads-up" Jay Coote Los Angeles 357 From: spies Date: Wed May 17, 2000 3:55pm Subject: Re: AID Catalogs Thanks "James M. Atkinson, Comm-Eng" wrote: > Ok, as a favor to me lets squelch the banter about > how easy/hard the AID catalogs are to get. > > Some of us have them, and some of us don't, but the bottom > line is that AID is a totally different company these > days and is doing little more then pimping other > companies products, having killed off most of their own > product lines. > > Their latest catalog is seriously watered down, and in > a few years the company name itself will become little > more then a memory. > > Of course if they get some aggressive R&D established, and > some strong management they could be a serious force > once again. > > -jma > > =================================================================== > Sed quis custodiet ipsos Custodes? > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > "...any sufficiently advanced technology is > indistinguishable from magic." - Arthur C. Clarke > =================================================================== > > ------------------------------------------------------------------------ > Was the salesman clueless? Productopia has the answers. > http://click.egroups.com/1/3019/1/_/507420/_/958589273/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 358 From: Jay Coote Date: Wed May 17, 2000 5:43pm Subject: AOR-7000-B Question I saw a (new?) model from AOR, the AOR-7000-B. It looks like a lower-cost allmode (??!!) receiver with built-in LCD aplhanumeric, spectral and PAL or NTSC (selectable) displays. Anyone have info on this new toy? Thanks, Jay Coote 359 From: James M. Atkinson, Comm-Eng Date: Wed May 17, 2000 6:24pm Subject: Re: http://www.realspy.com/ has been HACKED At 2:12 PM -0400 5/17/00, PGibson957@a... wrote: > Don't know if this is exactly right..please correct me. "The greatest >form of flattery is imitation." Pat yourself on the back James! >Guppy Hmm... since Monday I have been directed to over 30 similar sites that have swiped my graphics, photographs, and text. Some of them just pinched one or two of my animations or a photograph... but others stole hundred of lines of text, and slapped their own name on it. I simply can not belive how much plagiarism of my materials there is out there... but, I like what you said about "imitation being a form a flattery" (now if they would just ask, and pay me first that would be a different story). Several people suggested that I "go on a holy crusade" and go after criminal complaints against them, but I would prefer just to be a gentleman about it (and let most of them save face). I will post a few links of the major offenders to the list in a few days (unless the copyrighted materials are removed by Monday). This way other TSCM'ers can see who is ripping me off (you may be quite startled). If you find a site that you feel has swiped materials or graphics from me, please let me know so i can check it out. But then again, a whole bunch of people must be the victims of a whole boatload of hacking, and there ore dozens of sites out there with my own materials on them (without permission). -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 360 From: Paul Curtis Date: Wed May 17, 2000 6:38pm Subject: RE: http://www.realspy.com/ has been HACKED They won't take flattery as part of my bank deposit as far as I know. Besides, there is enough imitation in the world without the thieves having to add to it. PC -----Original Message----- From: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] Sent: Wednesday, May 17, 2000 4:24 PM To: TSCM-L@egroups.com Subject: Re: [TSCM-L] http://www.realspy.com/ has been HACKED At 2:12 PM -0400 5/17/00, PGibson957@a... wrote: > Don't know if this is exactly right..please correct me. "The greatest >form of flattery is imitation." Pat yourself on the back James! >Guppy Hmm... since Monday I have been directed to over 30 similar sites that have swiped my graphics, photographs, and text. Some of them just pinched one or two of my animations or a photograph... but others stole hundred of lines of text, and slapped their own name on it. I simply can not belive how much plagiarism of my materials there is out there... but, I like what you said about "imitation being a form a flattery" (now if they would just ask, and pay me first that would be a different story). Several people suggested that I "go on a holy crusade" and go after criminal complaints against them, but I would prefer just to be a gentleman about it (and let most of them save face). I will post a few links of the major offenders to the list in a few days (unless the copyrighted materials are removed by Monday). This way other TSCM'ers can see who is ripping me off (you may be quite startled). If you find a site that you feel has swiped materials or graphics from me, please let me know so i can check it out. But then again, a whole bunch of people must be the victims of a whole boatload of hacking, and there ore dozens of sites out there with my own materials on them (without permission). -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== ------------------------------------------------------------------------ IT Professionals: Match your unique skills with the best IT projects at http://click.egroups.com/1/3381/1/_/507420/_/958605942/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 361 From: James M. Atkinson, Comm-Eng Date: Wed May 17, 2000 6:54pm Subject: Copyright Violations Well, lets see.... This morning I counted several dozen websites, involving well over 400 copyright violations. Now if I wanted to be a jerk I could sue all of them and collect several thousands dollar in damages for each violation (at least a million dollars total). Heck... if each violator just sent me $250 for each violation and an apology I would be a happy camper (hint, hint, hint). -jma At 4:38 PM -0700 5/17/00, Paul Curtis wrote: >They won't take flattery as part of my bank deposit as far as I know. >Besides, there is enough imitation in the world without the thieves having >to add to it. > >PC > >-----Original Message----- >From: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] >Sent: Wednesday, May 17, 2000 4:24 PM >To: TSCM-L@egroups.com >Subject: Re: [TSCM-L] http://www.realspy.com/ has been HACKED > >At 2:12 PM -0400 5/17/00, PGibson957@a... wrote: > > Don't know if this is exactly right..please correct me. "The greatest > >form of flattery is imitation." Pat yourself on the back James! > >Guppy > > > >Hmm... since Monday I have been directed to over 30 similar sites >that have swiped my graphics, photographs, and text. Some of them >just pinched one or two of my animations or a photograph... but >others stole hundred of lines of text, and slapped their own name on >it. > >I simply can not belive how much plagiarism of my materials there is >out there... but, I like what you said about "imitation being a form >a flattery" (now if they would just ask, and pay me first that would >be a different story). > >Several people suggested that I "go on a holy crusade" and go after >criminal complaints against them, but I would prefer just to be a >gentleman about it (and let most of them save face). > >I will post a few links of the major offenders to the list in a few >days (unless the copyrighted materials are removed by Monday). This >way other TSCM'ers can see who is ripping me off (you may be quite >startled). > >If you find a site that you feel has swiped materials or graphics >from me, please let me know so i can check it out. > >But then again, a whole bunch of people must be the victims of a >whole boatload of hacking, and there ore dozens of sites out there >with my own materials on them (without permission). > > >-jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== From: James M. Atkinson, Comm-Eng Date: Wed May 17, 2000 7:58pm Subject: Re: AOR-7000-B Question At 6:45 PM -0400 5/17/00, Jay Coote wrote: >I saw a (new?) model from AOR, the AOR-7000-B. It looks like a >lower-cost allmode (??!!) receiver with built-in LCD aplhanumeric, >spectral and PAL or NTSC (selectable) displays. >Anyone have info on this new toy? >Thanks, >Jay Coote Jay, Are you perhaps referring to the Trans View? http://www.aorusa.com/visual.html -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 363 From: James M. Atkinson, Comm-Eng Date: Wed May 17, 2000 9:43pm Subject: Mace and Chemical Weapons for Personal Protection If anybody is interested: As many of you know I am involved in several disciplines other then TSCM and technical security. Some of those include tactical training, chemical weapons, riot control, armorer skills, and related topics involving things that go boom, bump, crack, and hiss. Several years ago (93-97) I wrote a rather comprehensive text on the use of Aerosol chemical weapons such as CS, CN, and OC sprays. The text was just over 130 pages, and was designed to serve as a student text for a 1 to 2 day course (depending on the student) I teach. The text title is "Mace and Chemical Weapons for Personal Protection; Everything you ever wanted to know about Mace... But didn't know who, what, or where to ask" If any list members are interested I am offering copies of it to subscribers for $49.95 per copy, plus $10.00 for shipping and handling within the United States. Let me know if your interested. I have several other titles I have written, and may start offering them to list members as well if there is enough interest. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 364 From: James M. Atkinson, Comm-Eng Date: Wed May 17, 2000 9:51pm Subject: FM Broadcast Measurement Protocol (repost) The following "FM Broadcast Measurement Protocol" is a proprietary method I developed to ferret out kit bugs, and other related devices being used for eavesdropping inside or just outside the FM broadcast band. As we all know any 10 year old kid can by kit bugs at Radio Shack for ten bucks, solder them together and have a fairly decent eavesdropping device. I have developed a similar protocol for TV stations, SW stations, WX, AM stations, and so on which provide a series of over 2500 measured broadcast signals that can be used as an index during sweeps. Deviations (no pun intended) in any of these signals may indicate an eavesdropping device (such as a broadcast TV frequency with audio in the wrong place, and no video carrier). Minimum Instrumentation: Digital Spectrum Analyzer Laptop computer to control SA and download data sets Biconical or Double Discone Antenna (30-300 MHz) Log Periodic or Directional Loop Lab Grade Low Noise Amplifier (+30 dB on Antenna) Low Loss Cables with N Type Connectors Antenna Stand Conducted Signals Box (Line Impedance Coupler/Filter) Pre-Sweep Readings: 1) External at 5 points, at least 1/4 mile away to profile local "friendly signals" active from 70 MHz to 135 MHz. Criss-cross with FCC databases. 2) Multiple (at least 3) readings internally before approaching the sound stage. 3) Conducted signals analysis at Elec. closets, IDF and MDF 4) Actual RF analysis of the sound stage with the antenna being moved at least 5-6 times inside each room When in doubt use a 6*6 or smaller search grid. 5) Conducted Signals Analysis. Primary Evaluations - Actual Measurements via laptop The primary function is to hunt for signals that do not conform to common standards (such as 200 kHz spacing) RBW 1 kHz VBW1 kHz Sweep5 Seconds Ref Level-65 dBm (a function of BW) Log5 dB/division Amplitude PAPreamp On (+15 dB) AverageTrace Averaging OFF HoldPeak Hold on Trace 2 HoldMinimum Hold on Trace 3 Samples1024 points (or more) for each trace Span2 MHz (10 stations, centered on graticule axis) 1st Start Freq.86.9 (Channel 200, minus 1 MHz) 1st Center87.9 (Channel 200) 1st End Freq.88.9 (Channel 200, plus 1 MHz) Step Size1600 kHz (8 channels) Last Start Freq106.5 (Channel 300, minus 1 MHz) Last Center107.5 (Channel 300) Last End Freq.108.5 (Channel 300, plus 1 MHz) Note: The noise floor should be just above the lowest graticule marking on the screen. Hostile Signal Indicators (non-alerting) 1) 200 kHz Channel Spacing Corrupted Commonly caused by variable capacitor tuning, or similar analog tuning circuits used by eavesdropping devices. Watch out for any energy present in the 25 kHz guard band between stations. 2) "Drifty" Carrier The devices are typically not crystal controlled, however; broadcast stations will be rock solid. 3) No Sub Carriers, or not a 150 kHz BW To increase range some devices may use NFM instead of WFM or may not generate sub-carrier such as the pilot tone. 4) Narrow Bandwidth Commercial stations will usually have a deviation of +/- 75 kHz. Bugs tend not to be so picky and are often less then less than +/- 75 kHz. It's not uncommon fro such bugs to use a bandwidth of less then 20 kHz. 5) Incorrect Polarization It could be a device taped horizontally under a table, and will help minimize detection. Remember to swivel your antennas to check all polarizations. 6) Little or no modulation Remember broadcasting is expensive, and commercial stations rarely make money from dead air time. On the other hand most bugs create tons of dead air. 7) FM Deviation is not symmetrical Radio Shack, Cony, Xandi, Rainbow, and Ramsey bugs do not use a balanced deviation and are typically - 90 kHz to + 45 kHz, Lower deviation is often twice the upper deviation. Beware of any Assymetrical Deviations. 8) Amplitude abnormally high Anything over -70 dBm is suspect, and anything over -50 should be considered highly hostile. I've seen some of these little devils cranked up as hot as +15 dBm at 20 feet (Remember to move your antenna around). Hostile Signal Indicators (alerting) 1) Feedback or Regenerative Signal Detection - WFM/NFM with Clicker 2) Sensitivity to thumping 3) Sensitivity to "loading effects" 4) Sensitivity to tone generation. Force widest deviation with 25-45 watt audio amp, cross over filters, and three speakers while generating a single tone, or LOUD pink noise (such as a vacuum cleaner). The goal is to exceed this acoustical limits of the bugs design, and to cause it to "flip out". Many device to start creating massive harmonics if you can overload the front end with noise or a single tone (1 kHz works well). Secondary Evaluations - Actual Measurements via laptop The primary function is to evaluate the guard band area between FM stations (which should not have any energy other then thermal noise present) RBW 1 kHz (300 Hz optional) VBW1 kHz (300 Hz optional) Sweep5 Seconds (10-15 seconds optional) Ref Level-65 dBm (a function of BW, -80 optional) Log5 dB/division Amplitude, (2 dB optional) PAPreamp On (+15 dB) AverageTrace Averaging OFF HoldPeak Hold on Trace 2 HoldMinimum Hold on Trace 3 Samples1024 points (or more) for each trace Span25 kHz (Centered on on guard band) 1st Start Freq.87.7850 (Channel 200, minus 1 MHz) 1st Center88.8000 (Channel 200) 1st End Freq.88.8125 (Channel 200, plus 1 MHz) Step Size200 kHz (1 channels) Last Start Freq108.5850 (Channel 300+) Last Center107.6000 (Channel 300+) Last End Freq.108.6125 (Channel 300+) Third Evaluation - Actual Measurements via laptop The function is to identify RF energy just outside the FM broadcast band which may or may not be hostile. Watch out for TV-6 audio signals, and for wireless microphones in the 72-75 MHz area. RBW 1 kHz VBW1 kHz Sweep5 Seconds Ref Level-65 dBm (a function of BW) Log5 dB/division Amplitude PAPreamp On (+15 dB) AverageTrace Averaging OFF HoldPeak Hold on Trace 2 HoldMinimum Hold on Trace 3 Samples1024 points (or more) for each trace Span2 MHz 1st Start Freq.69 1st Center70 1st End Freq.71 Step Size1000 kHz Last Start Freq134 Last Center135 Last End Freq.136 Of course you still will need to check from DC to light, but the above methods help to find eavesdropping device inside the FM broadcast band. If you find the above protocol helpful then you can at least buy me a cup of coffee. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 365 From: James M. Atkinson, Comm-Eng Date: Wed May 17, 2000 9:59pm Subject: Telephone Analyzer Greetings, I am trying to assemble a "wish list" of the practical things that TSCM'ers would like to see in a compact phone analyzer, and the priority they put on each. Please send me you comments, Thanks, -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 366 From: Date: Thu May 18, 2000 1:27am Subject: Re: Copyright Violations Jim; you could tell them ,that they must post a link to your site,or cease and desist! a little extra advertising, for what it is worth ! good luck! HAVE A GREAT DAY !!! 367 From: A Grudko Date: Thu May 18, 2000 8:22am Subject: Re: Copyright Violations James, please visit my site and tell me if there is any of your stuff on there. Parts of my site have been compiled by someone else and I cannot verify the origins of all pics. Most have come from my personal collection but I will remove any you think have been plagerised. In particular look at the 'Technical' and 'Photo Gallery' pages. Thanks Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia Israel - www.grudko.com. - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 Members of : SCIP (Gauteng Chairman), SACI (President), GIN (Charter), WAD, CALI, SASFed, SASA, SAMLF, UKPIN, Prisoners' Rehabilitation & Education Trust --- "When you need it done right - first time" --- 368 From: Jay Coote Date: Thu May 18, 2000 10:52am Subject: Re: AOR-7000-B Question No, it is a scanner/receiver, and one person told me the output PAL or NTSC signal is only to put the receiver alpha display on a video monitor; not for demodulating TV signals....bah, humbug! Jay Coote ---------- > At 6:45 PM -0400 5/17/00, Jay Coote wrote: > >I saw a (new?) model from AOR, the AOR-7000-B. It looks like a > >lower-cost allmode (??!!) receiver with built-in LCD aplhanumeric, > >spectral and PAL or NTSC (selectable) displays. > >Anyone have info on this new toy? > >Thanks, > >Jay Coote > > > > Jay, > > Are you perhaps referring to the Trans View? > > http://www.aorusa.com/visual.html > > > -jma > > > =================================================================== > Sed quis custodiet ipsos Custodes? > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > "...any sufficiently advanced technology is > indistinguishable from magic." - Arthur C. Clarke > =================================================================== > > ------------------------------------------------------------------------ > IT Professionals: Match your unique skills with the best IT projects at > http://click.egroups.com/1/3381/1/_/507420/_/958611620/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 369 From: J Gomez <1upserv@g...> Date: Mon May 1, 2000 10:15pm Subject: Re: smoke detectors Recce first. there are many differrent types of smoke detectors, all with diff housings. Do a recce, then try to match by buying a similar and using your minicraft to fit. Joe ---------- > From: Mike F > To: PRIVATE-EYE ; PI-GROUP ; NIA ; Comtel ; TSCM- > Subject: [TSCM-L] smoke detectors > Date: 17 May 2000 14:33 > > Does any one know where I can purchase the Housing for smoke detectors? > I need a smoke detecter with nothing in it so I can put in camera. > I can purchase smoke detecters & take the guts out, > but that would be a waste of time & my money. > If any one knows where i could purchase this I would appreciatte any & all > info. > later4,mike f. > > > > Michael T. Fiorentino > Syracuse,NY 13206 > > "CONFIDENTIALITY WARNING" > This electronic message contains information which may be privileged > and/or confidential. The information is intended for use only by the > individual(s) > or entity named/indicated above. If you are not the identified/intended > recipient, be aware that > any disclosure, copying, distribution, or use of the contents of this > message/information is prohibited. If you are not the indicated recipient or > have > received this message in error contact our offices immediately for > instructions." > > > > ------------------------------------------------------------------------ > @Backup- Protect and Access your data any time, any where on the net. > Try @Backup FREE and recieve 300 points from mypoints.com Install now: > http://click.egroups.com/1/2345/1/_/507420/_/958577414/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 370 From: Jay Coote Date: Thu May 18, 2000 1:58pm Subject: Response to Jim's TA wish-list query Jim may have started some lively "You're crazy to do it that way" debate when he requested member wish-lists for a telephone analyzer. I would like to see the following.... credit should go to Jim and other list members I have discussed breakout boxes with. I know there are other functions I may have overlooked that other list members can contribute. Matrix Switches: Select any of 8 wires, as well as wire against earth. Test Switches: Select tests such as off-hook volts/mA, on-hook volts/mA Ring-to-earth, tip-to-earth, balanced load center-tap to earth, Off-hook load resistance (simulates instrument resistance or other precision values possibly 100, 150, 200, 300 and variable multi-turn pot), operated by combination momentary and latching toggle switch. Sweep Tones: Sweep tones to enable audio tone, DTMF, etc controlled devices on the line(s). Make tones usable for tracing wires, as well as upconverting the tone(s) to ultrasonic for silent wire detection by external probes. High-Z Audio Amplifier: Balanced, high-Z ampl to monitor any pair combination or wire vs. earth connection. Isolated and possibly filtered for 50/60 Hz. 3.5 mm, 1/4" and RJ-11 (buttset) connectors for various types of earphones or buttset monitoring. Metering: Built-in 4 1/2 digit LCD meter(s) to read on/off-hook Volts, short current, current through loads, also resistance >300 Megs, possibly include capacitance meter. Direct readings, no calculations required. Banana posts for external meters. VLF: Built-in VLF/LF receiver; 5-500 kHz, using internal audio amp (above) or else internal VLF upconvertor to feed external HF all-mode receiver, convertor IF on 4, 5, 10 or convenient HF freq so that a "bug" on 172 KHz would read 4172 or 10172 on the (IF) receiver display. Convertor filtered against AM (medium-wave) interference. Line Driver: "Safe" method for injecting a low DC voltage into a pair (both polarities) to activate any mikes or low-powered DC switching. Throughputs: RJ-45 input and output so that instrument may be tested/operated with the analyzer in-line, if needed. Connectors on the analyzer could be twist-on military type if RJ-45 are too fragile, but jumpers could be flexible with RJ-11 or RJ-45 on the ends. Connectors: Standard connectors (such as BNC, banana, and 3.5 MM for phones) enough to allow connection of external devices more than one at a time, such as scope, TDR, SA, DVM, LC meter, receiver. Switches: Metal "cans" or shrouds around the toggle switches to prevent accidental activation of DC , tones, or off-hook tests . Housing: Small Pelican case or a plain aluminum Bud-box?. Remarks: Some of us might like to assemble and package our own, plus or minus some features. Perhaps schematics or modules/PC boards might be of interest rather than a manufactured unit? As for a deluxe, PC-controlled, automated 51-wire telephone analyzer, that's another story... Jay Coote Los Angeles 371 From: James M. Atkinson, Comm-Eng Date: Thu May 18, 2000 3:42pm Subject: Re: Response to Jim's TA wish-list query At 3:02 PM -0400 5/18/00, Jay Coote wrote: >Jim may have started some lively "You're crazy to do it that way" debate >when he requested member wish-lists for a telephone analyzer. > >I would like to see the following.... credit should go to Jim and other >list members I have discussed breakout boxes with. I know there >are other functions I may have overlooked that other list members >can contribute. > >Matrix Switches: >Select any of 8 wires, as well as wire against earth. How about a series of 8 position rotary switches to select which pin comprises which circuit. Since the pairs will be/should be standard though out the installation (ie: 258A) then you would only need to configure the switches once for the job. Then two rotary switches to select which TWO pairs were under test at the same time (ie: a two line TDR). I would lean towards adding four jacks for ground, antenna, or whatever and allow then to be as reference points (I tend to like have at least two ground test points available). >Test Switches: >Select tests such as off-hook volts/mA, on-hook volts/mA >Ring-to-earth, tip-to-earth, balanced load center-tap to earth, >Off-hook load resistance (simulates instrument resistance or >other precision values possibly 100, 150, 200, 300 and variable >multi-turn pot), operated by combination momentary and latching >toggle switch. How about a capacitance test (connection to an external meter) VLF/RF detector? Ring voltage detector? Basic audio spectrum analyzer? Basic VLF detector and display? >Sweep Tones: >Sweep tones to enable audio tone, DTMF, etc controlled >devices on the line(s). Make tones usable for tracing wires, >as well as upconverting the tone(s) to ultrasonic for silent wire >detection by external probes. How about random DTMF tone generation, plus polyphonic (5 tone) sweeping. I would lean towards a swept tone, stable tone, and warbling tone (actual freq would be adjustable). What frequency would you prefer for the ultrasonic probe... by preference is to put it above 15 kHz, but below 100 kHz. Dual lead TDR pulser would be fairly simple to add ad this point, just re-tune the oscillator and amply the signal. >High-Z Audio Amplifier: >Balanced, high-Z ampl to monitor any pair combination or wire >vs. earth connection. Isolated and possibly filtered for 50/60 Hz. >3.5 mm, 1/4" and RJ-11 (buttset) connectors for various types >of earphones or buttset monitoring. How about a 50/60 Hz comb filter, AGC? ... how about just using a butt set instead? Internal speaker? How about a "Sing around tone", a series of precision tones, or a pink noise generator. >Metering: >Built-in 4 1/2 digit LCD meter(s) to read on/off-hook Volts, >short current, current through loads, also resistance >300 Megs, >possibly include capacitance meter. Direct readings, no >calculations required. Banana posts for external meters. Hmm... I lean more towards an external meter... it will reduce the cost by about 500 bucks, and allow more versatility. "Direct readings" could be a function of the load used across the meter. Gotta, have some way (IMHO) to connect a Spectrum Analyzer to all wire combinations, but also knock out any hostile voltage which could hurt the instrument. >VLF: >Built-in VLF/LF receiver; 5-500 kHz, using internal audio amp (above) >or else internal VLF upconvertor to feed external HF all-mode receiver, >convertor IF on 4, 5, 10 or convenient HF freq so that a "bug" on >172 KHz would read 4172 or 10172 on the (IF) receiver display. >Convertor filtered against AM (medium-wave) interference. An internal tuner with 12 switched bandpass filters from 9 kHz to 550 kHz (50 kHz wide). up convert it to an IF of 10.7 MHz (so you can use most scanners, or related items). The 10.7 IF could also be dumped into a tunable demod/short wave receiver so that each band could be checked for signals. How about position one of the rotary switch simply block converts the audio from 300 Hz to 3 kHz to 10.7 MHz. Position two covers 3 kHz to 10 kHz Position 3 - 12 covers 9 kHz to 550 kHz >Line Driver: >"Safe" method for injecting a low DC voltage into a pair >(both polarities) >to activate any mikes or low-powered DC switching. Ah, but what voltage? and should there be some kind of current limiting? >Throughputs: >RJ-45 input and output so that instrument may be tested/operated >with the analyzer in-line, if needed. Connectors on the analyzer could >be twist-on military type if RJ-45 are too fragile, but jumpers could >be flexible with RJ-11 or RJ-45 on the ends. I would lean towards using mini-WECO jacks for all primary inputs, and an RJ-45 for secondary outputs. The jumpers could be replaced by the rotary switches. >Connectors: >Standard connectors (such as BNC, banana, and 3.5 MM for phones) >enough to allow connection of external devices more than one at a time, >such as scope, TDR, SA, DVM, LC meter, receiver. This is I am using now). WECO and RJ-45 for "raw signals" input and output (with probe tip jacks added) Mueller safety jacks for leads to DVM, Isolated BNC for scope connections, (TDR circuit) N-Style for SA/RF out (to prevent someone hooking a TDR up to a SA), RCA for line (un amplified) audio outputs, 3.5 mm for amplified audio >Switches: >Metal "cans" or shrouds around the toggle switches to prevent >accidental activation of DC , tones, or off-hook tests . Good point >Housing: >Small Pelican case or a plain aluminum Bud-box?. I am leaning towards a 4 * 6 * 1.5 inch hand held box about the same size as a hand held DVM. I want to keep it simple, small, and portable so you can toss it into a briefcase, and it will not look like "any thing special" >Remarks: >Some of us might like to assemble and package our own, plus or >minus some features. Perhaps schematics or modules/PC boards >might be of interest rather than a manufactured unit? >As for a deluxe, PC-controlled, automated 51-wire telephone >analyzer, that's another story... > >Jay Coote >Los Angeles I currently have the capability to offer it as a complete finished product (all I have to due is cut some PCBs, and screen some panels). I am considering offering a small hand held "single line" unit that uses external instruments (I already have a completely functional prototype of this unit that I have been using in the field for a while). The critical aspect of the first product is to rely on external instruments, and the user turning knobs and pushing buttons. -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 372 From: John McCain Date: Thu May 18, 2000 4:24pm Subject: Re:Telephone Analyzer wish list A lurker speaks on the telephone analyzer "project".... Let's not forget about that notebook PC everyone carries... By now, I hope everyone is using a notebook computer that has a marginally good sound card capable of audio spectrum analysis and audio multi-tone generation. By using some pretty simple cross-bar electronics in the add-on dream box, it's a parallel-port/software-controlled electronic or dip-relay cross bar switching system. With this, automate some of that switching and button-pushing activity as well as create "project profiles" to simplify return visits. Just watch for the noise the computer generates. If you can tolerate the computer's EMF, it's a quite useful tool. Cheers, John M. 373 From: James M. Atkinson, Comm-Eng Date: Thu May 18, 2000 5:10pm Subject: Re:Telephone Analyzer wish list At 4:24 PM -0500 5/18/00, John McCain wrote: >A lurker speaks on the telephone analyzer "project".... > >Let's not forget about that notebook PC everyone carries... > >By now, I hope everyone is using a notebook computer that has a marginally >good sound card capable of audio spectrum analysis and audio multi-tone >generation. > >By using some pretty simple cross-bar electronics in the add-on dream box, >it's a parallel-port/software-controlled electronic or dip-relay cross bar >switching system. With this, automate some of that switching and >button-pushing activity as well as create "project profiles" to simplify >return visits. > >Just watch for the noise the computer generates. If you can tolerate the >computer's EMF, it's a quite useful tool. > >Cheers, >John M. > I was actually considering a USB type of interface, as this would allow multiple instruments to be ganged up and would allow dozens of instruments to be used in parallel to cut down on the time used. I would add that the parallel port is "bad medicine" for TSCM and it tends to create massive EMI. -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 374 From: Jordan Ulery Date: Thu May 18, 2000 7:37pm Subject: Re: smoke detectors Pardon the question, but there are so many commercial models available at low price, why take the time to build? J Gomez wrote: > Recce first. there are many differrent types of smoke detectors, all with > diff housings. Do a recce, then try to match by buying a similar and using > your minicraft to fit. > Joe > > ---------- > > From: Mike F > > To: PRIVATE-EYE ; PI-GROUP > ; NIA ; Comtel > ; TSCM- > > Subject: [TSCM-L] smoke detectors > > Date: 17 May 2000 14:33 > > > > Does any one know where I can purchase the Housing for smoke detectors? > > I need a smoke detecter with nothing in it so I can put in camera. > > I can purchase smoke detecters & take the guts out, > > but that would be a waste of time & my money. > > If any one knows where i could purchase this I would appreciatte any & > all > > info. > > later4,mike f. > > > > > > > > Michael T. Fiorentino > > Syracuse,NY 13206 > > > > "CONFIDENTIALITY WARNING" > > This electronic message contains information which may be privileged > > and/or confidential. The information is intended for use only by the > > individual(s) > > or entity named/indicated above. If you are not the identified/intended > > recipient, be aware that > > any disclosure, copying, distribution, or use of the contents of this > > message/information is prohibited. If you are not the indicated recipient > or > > have > > received this message in error contact our offices immediately for > > instructions." > > > > > > > > ------------------------------------------------------------------------ > > @Backup- Protect and Access your data any time, any where on the net. > > Try @Backup FREE and recieve 300 points from mypoints.com Install now: > > http://click.egroups.com/1/2345/1/_/507420/_/958577414/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > ------------------------------------------------------------------------ > Make new friends, find the old at Classmates.com: > http://click.egroups.com/1/4052/1/_/507420/_/958670313/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 375 From: James M. Atkinson, Comm-Eng Date: Thu May 18, 2000 7:54pm Subject: Re: smoke detectors Uh Mike..... I would direct you attention to your local Home Depot, buy several of each model and simply build around what is already there. You might also want to take a look at the thermostats, carbon monoxide alarms, timers, and related gadgets that can be used for interesting things. Of course I am not condoning any kind of illicit surveillance, or other kinds of nefarious mischief. (ahem) -jma At 5:15 AM +0200 5/2/00, J Gomez wrote: >Recce first. there are many differrent types of smoke detectors, all with >diff housings. Do a recce, then try to match by buying a similar and using >your minicraft to fit. >Joe > >---------- > > From: Mike F > > To: PRIVATE-EYE ; PI-GROUP >; NIA ; Comtel >; TSCM- > > Subject: [TSCM-L] smoke detectors > > Date: 17 May 2000 14:33 > > > > Does any one know where I can purchase the Housing for smoke detectors? > > I need a smoke detecter with nothing in it so I can put in camera. > > I can purchase smoke detecters & take the guts out, > > but that would be a waste of time & my money. > > If any one knows where i could purchase this I would appreciatte any & >all > > info. > > later4,mike f. > > > > > > > > Michael T. Fiorentino > > Syracuse,NY 13206 =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 376 From: Mike F Date: Fri May 19, 2000 7:13am Subject: More Info On New VIrus Subject: This new polymorphic variant will erase ALL files http://www.symantec.com/avcenter/venc/data/vbs.loveletter.fw.a.html This new polymorphic variant will erase ALL files. Currently no vendor has a solution. Do not open anything with a .VBS extension. The .VBS will not be in the subject line, and the worm uses your most recently used documents lists to generate the filename. later4,mike f. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 377 From: Mike F Date: Fri May 19, 2000 8:12am Subject: US Intelligence links listed at columbia University US Intelligence Sites Columbia University http://www.columbia.edu/cu/libraries/indiv/dsc/intell.html later4,mike fiorentino Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 378 From: Mike F Date: Fri May 19, 2000 8:20am Subject: Security On the Net Security On the Net http://securityportal.com/ later4,mike fiorentino Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 379 From: Mike F Date: Fri May 19, 2000 8:35am Subject: RF Preamps and Downconvertors Jay I find that Nuts&volts has one Compiled one of most useful Lists of Electronics. They have listed Ramsey electronics & supercircuits plus many more Good sites. http://www.nutsvolts.com/adlinks.htm Check with RF Preamps and Downconvertors Anyone have sources in the US for "kit" or hobby RF preamps and microwave downconvertors? I am looking for a 2000-4000 Mhz to 0-2000 MHz D/C, as well as 4000-6000 MHz to 0-2000 MHz. Also looking for wideband RF preamps, hopefully to cover 5-10 KHz through 3000 MHz or higher, with 15-25 dB gain. Thanks Jay Coote Los Angeles TSCM@j... ------------------------------------------------------------------------ Make new friends, find the old at Classmates.com: http://click.egroups.com/1/4052/1/_/507420/_/958277044/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 380 From: Robert G. Ferrell Date: Fri May 19, 2000 10:58am Subject: Re: More Info On New VIrus >This new polymorphic variant will erase ALL files. >------------------------------------------------------------------------ Quite frankly, folks, especially if you're using any Microsoft-based Mail User Agent, you should really go grab yourselves a Hex Editor off the net and examine any attachment before you open it. If you can't read it, it's binary. If it's binary and there's no header information as to its format (.gif, .jpg, etc.), then just delete it. I redirect all my suspicious mail to a Unix box with no VBS available and look at it there. If it's clean, I can then send it back to the Windoze box. A lot of trouble to go through, admittedly, but then so is restoring your entire hard disk... Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center, US DoI Robert_G_Ferrell@n... ------------------------------------------------------------ Nothing I have ever said should be construed as even vaguely representing an official statement by the NBC or DoI. ------------------------------------------------------------ 381 From: James M. Atkinson, Comm-Eng Date: Fri May 19, 2000 1:08pm Subject: One Stop TSCM Outfitter - Shameless Plug Good afternoon, If you are considering upgrading your TSCM capabilities I would high encourage you to look at the CPM-700, OSCOR, and ORION, and also the 2044, 1080H, SCD-5, 2030, and related equipment. The equipment is very high quality, and customers are really happy with the results they obtain using it. If any list members is interesting TSCM equipment please let me know as we can offer very favorable availability, great product selection (of real TSCM gear, not spy shop toys), and very attractive pricing. We can offer solutions range from simple broadband diode field detectors, basic sweep instruments such as the 1059, 2030, SCD-5, 2044 and CPM-700, to products such as sophisticated spectrum analyzers, broadband sweep receivers, MSS gear, and related equipment. If you need any kind of real world TSCM gear, let us be your one stop supplier. -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 382 From: James M. Atkinson, Comm-Eng Date: Fri May 19, 2000 1:22pm Subject: Bears in Bars [humor] Bears in Bars ------------ A bear walks into a bar in Billings, Montana and sits down. He bangs on the bar with his paw and demands a beer. The bartender approaches and says, "We don't serve beer to bears in bars in Billings." The bear, becoming angry, demands again that he be served a beer. The bartender tells him again, more forcefully, "We don't serve beer to belligerent bears in bars in Billings." The bear, very angry now, says, "If you don't serve me a beer, I'm going to eat that lady sitting at the end of the bar." The bartender says, "Sorry, we don't serve beer to belligerent, bully bears in bars in Billings." The bear goes to the end of the bar, and as promised, eats woman. He comes back to his seat and again demands a beer. The bartender states, "Sorry, we don't serve beer to belligerent, bully bears in bars in Billings who are on drugs." The bear says, "I'm not on drugs." The bartender says, "You are now. That was a bar-bitch-you-ate." =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 383 From: Mike Dever Date: Fri May 19, 2000 7:09pm Subject: Re: Response to Jim's TA wish-list query Mr Atkinson IMHO the "external instruments" or "modular" TA is the preferred method as it allows flexibility in configuration of instrumentation for different applications, allows reuse of certain instruments (thereby reducing total inventory) and also allows the TSCMer to chose the best instrument(s) available for the job. We use this approach to telephone analysers ourselves. I have even considered designing and building a similar unit to the one you describe, however, I generally don't believe in "re-inventing" the wheel if a product is commercially available. Have you considered any further offering your " single line" TA/BOB (as mentioned below) for sale to other TSCMers? If so any idea of the order of cost and when would it be available? Regards Mike Dever CPP Dever Clark & Associates Canberra, Australia e-mail: deverclark@b... > From: "James M. Atkinson, Comm-Eng" > Reply-To: TSCM-L@egroups.com > Date: Thu, 18 May 2000 16:42:14 -0400 > To: TSCM-L@egroups.com > Subject: Re: [TSCM-L] Response to Jim's TA wish-list query > > ....... I currently have the capability to offer it as a complete finished > product (all I have to due is cut some PCBs, and screen some panels). > I am considering offering a small hand held "single line" unit that > uses external instruments (I already have a completely functional > prototype of this unit that I have been using in the field for a > while). 384 From: James M. Atkinson, Comm-Eng Date: Fri May 19, 2000 10:03pm Subject: Re: Response to Jim's TA wish-list query "Years ago" I used to drag around a big bulky telephone analyzer such as the older Winklemann unit, or a Bell/Mason/Dektor box. The only problem is while they were all handy not a single one of them could address modifications to modern PBX systems unless there was parasitic current draw, or obvious audio signals. I hacked, chopped, modified, and squeezed a gizmo in here and there to help the instruments, but finally gave up on it a few years back and entered up designing several boxes that would let me interconnect a number of laboratory grade instruments. I little ping circuit here, a voltage divider there, some simple demod circuits, a PCM circuit, some TSG measurement parameters, mix in a few VU meters, and so on. The only problem is the boxes would get larger and unwieldy as an extra gizmo was added, which it turn resulted in the box being reworked to keep it into a hand held box. I found that by keeping it small I could get the instrument into phone rooms with more ease, and could perform a more comprehensive evaluation of the phone system (something simply not possible with the older units). Of course I was still using a SA, O'scope, DVM, etc for other elements of my exam, so I simply built a box to cross connect everything together. The old Winklemann, Bell/Mason/Dektor boxes are find for the old 25 pair Key systems, but they are virtually worthless for really serious TSCM on modern PBX systems. While I have played around with a totally automated solution I really have to be suspicious of such a solution, (but it may just be that I like to be "hands on" for all my measurements). A simple analog test box would run about a grand or less, and would be hand held using external instruments for the most part. -jma At 10:09 AM +1000 5/20/00, Mike Dever wrote: >Mr Atkinson > >IMHO the "external instruments" or "modular" TA is the preferred method as >it allows flexibility in configuration of instrumentation for different >applications, allows reuse of certain instruments (thereby reducing total >inventory) and also allows the TSCMer to chose the best instrument(s) >available for the job. > >We use this approach to telephone analysers ourselves. > >I have even considered designing and building a similar unit to the one you >describe, however, I generally don't believe in "re-inventing" the wheel if >a product is commercially available. > >Have you considered any further offering your " single line" TA/BOB (as >mentioned below) for sale to other TSCMers? If so any idea of the order of >cost and when would it be available? > >Regards >Mike Dever CPP >Dever Clark & Associates >Canberra, Australia >e-mail: deverclark@b... > > > From: "James M. Atkinson, Comm-Eng" > > Reply-To: TSCM-L@egroups.com > > Date: Thu, 18 May 2000 16:42:14 -0400 > > To: TSCM-L@egroups.com > > Subject: Re: [TSCM-L] Response to Jim's TA wish-list query > > > > ....... I currently have the capability to offer it as a complete finished > > product (all I have to due is cut some PCBs, and screen some panels). > > I am considering offering a small hand held "single line" unit that > > uses external instruments (I already have a completely functional > > prototype of this unit that I have been using in the field for a > > while). =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 385 From: Jay Coote Date: Fri May 19, 2000 10:24pm Subject: Tone Sweepers Does anyone have a schematic for an audio tone sweeper they might wish to share with me? I think I'll need two separate sweeping tones, probably 0 to -10 dBm level, voiceband. Thanks, J. Coote 386 From: James M. Atkinson, Comm-Eng Date: Fri May 19, 2000 10:32pm Subject: Re: Tone Sweepers At 11:29 PM -0400 5/19/00, Jay Coote wrote: >Does anyone have a schematic for an audio tone sweeper they might wish >to share with me? I think I'll need two separate sweeping tones, probably >0 to -10 dBm level, voiceband. >Thanks, >J. Coote First, how fast do you want it to sweep? Second, what frequency range do you want to cover? -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 387 From: Rocco Rosano Date: Sat May 20, 2000 0:04am Subject: Re: Tone Sweepers Et Al: I assume that you talking about a "Correlator". The last time I heard, the "correlator frequencies" were classified (those used by federal level agencies). In general, they are synchronize frequency hoping tones in to separate ranges; one for power voice grade lines and free-space. The power of voice is 300Hz - 3Kh (generally). Obviously, you would want to avoid this particular range. You would also want to hop and sample at a rate greater than 10 times the top end of the voice range (for the same reason). Rocco Rosano Reynoldsburg, Ohio mailto:roccorosano@a... Jay Coote wrote: > Does anyone have a schematic for an audio tone sweeper they might wish > to share with me? I think I'll need two separate sweeping tones, probably > 0 to -10 dBm level, voiceband. > Thanks, > J. Coote > > ------------------------------------------------------------------------ > High rates giving you headaches? The 0% APR Introductory Rate from > Capital One. 9.9% Fixed thereafter! > http://click.egroups.com/1/3010/1/_/507420/_/958793087/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 388 From: Rocco Rosano Date: Sat May 20, 2000 0:08am Subject: Re: Tone Sweepers Et Al: Sorry for the spelling. I should never write these memo's this late at night. rrr Rocco Rosano wrote: > Et Al: > > I assume that you talking about a "Correlator". The last time I heard, the > "correlator frequencies" were classified (those used by federal level > agencies). > > In general, they are synchronize frequency hoping tones in to separate > ranges; one for power voice grade lines and free-space. > > The power of voice is 300Hz - 3Kh (generally). Obviously, you would want to > avoid this particular range. You would also want to hop and sample at a rate > greater than 10 times the top end of the voice range (for the same reason). > > Rocco Rosano > Reynoldsburg, Ohio > mailto:roccorosano@a... > > Jay Coote wrote: > > > Does anyone have a schematic for an audio tone sweeper they might wish > > to share with me? I think I'll need two separate sweeping tones, probably > > 0 to -10 dBm level, voiceband. > > Thanks, > > J. Coote > > > > ------------------------------------------------------------------------ > > High rates giving you headaches? The 0% APR Introductory Rate from > > Capital One. 9.9% Fixed thereafter! > > http://click.egroups.com/1/3010/1/_/507420/_/958793087/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > ------------------------------------------------------------------------ > 72% off on Name brand Watches! > Come and buy today and get free shipping! > http://click.egroups.com/1/4011/1/_/507420/_/958798883/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 389 From: Jay Coote Date: Sat May 20, 2000 8:31am Subject: Re: Tone Sweepers (See thread below) Jim and the List; I was interested in adding two sweeping tones to my breakout box, if anyone has a schematic. I am guessing voiceband, 200-4000 Hz. Jim brings up a good point. Speed of the sweep tones. If too slow, it will take all night to sweep one POTS line. Too fast and the sweep may not stay on any frequency long enough to trigger a control device on the line. Another speed issue is how often will the tones cross over each other (to simulate DTMF or other dual tones) Jay Coote Los Angeles ---------- > At 11:29 PM -0400 5/19/00, Jay Coote wrote: > >Does anyone have a schematic for an audio tone sweeper they might wish > >to share with me? I think I'll need two separate sweeping tones, probably > >0 to -10 dBm level, voiceband. > >Thanks, > >J. Coote > > > > First, how fast do you want it to sweep? > > Second, what frequency range do you want to cover? > > -jma > > > =================================================================== > Do not meddle in the affairs of dragons, > for you are crunchy and taste good with ketchup. > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Nil carborundum illigitimi > =================================================================== > > ------------------------------------------------------------------------ > Buy and sell used, rare and vintage gear at the Web's best > music gear auction. Register to enter the weekly gear giveaway! > http://click.egroups.com/1/3735/1/_/507420/_/958793705/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 390 From: James M. Atkinson, Comm-Eng Date: Sat May 20, 2000 8:48am Subject: Re: Tone Sweepers I have had good results by keeping the DTMF tone bursts at 150 mS or longer, and the single tones at 100 mS or longer. The primary VF "cross over" sweeps should take about 45, 15, 5, 1.6, and .5 seconds (assuming 5 tones are used). -jma At 9:34 AM -0400 5/20/00, Jay Coote wrote: >(See thread below) >Jim and the List; >I was interested in adding two sweeping tones to my breakout box, if >anyone has a schematic. >I am guessing voiceband, 200-4000 Hz. >Jim brings up a good point. Speed of the sweep tones. If too slow, >it will take all night to sweep one POTS line. Too fast and the sweep >may not stay on any frequency long enough to trigger a control >device on the line. Another speed issue is how often will the tones >cross over each other (to simulate DTMF or other dual tones) > >Jay Coote >Los Angeles > > >---------- > > At 11:29 PM -0400 5/19/00, Jay Coote wrote: > > >Does anyone have a schematic for an audio tone sweeper they might wish > > >to share with me? I think I'll need two separate sweeping tones, probably > > >0 to -10 dBm level, voiceband. > > >Thanks, > > >J. Coote > > > > > > > > First, how fast do you want it to sweep? > > > > Second, what frequency range do you want to cover? > > > > -jma > > =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 391 From: J Gomez <1upserv@g...> Date: Wed May 3, 2000 6:36am Subject: Re: smoke detectors Simple- to match what is on the ground, sorry...ceiling. Can't make it too obvious now can we? ---------- > From: Jordan Ulery > To: TSCM-L@egroups.com > Subject: Re: [TSCM-L] smoke detectors > Date: 19 May 2000 02:37 > > Pardon the question, but there are so many commercial models available at low > price, why take the time to build? > > J Gomez wrote: > > > Recce first. there are many differrent types of smoke detectors, all with > > diff housings. Do a recce, then try to match by buying a similar and using > > your minicraft to fit. > > Joe > > > > ---------- > > > From: Mike F > > > To: PRIVATE-EYE ; PI-GROUP > > ; NIA ; Comtel > > ; TSCM- > > > Subject: [TSCM-L] smoke detectors > > > Date: 17 May 2000 14:33 > > > > > > Does any one know where I can purchase the Housing for smoke detectors? > > > I need a smoke detecter with nothing in it so I can put in camera. > > > I can purchase smoke detecters & take the guts out, > > > but that would be a waste of time & my money. > > > If any one knows where i could purchase this I would appreciatte any & > > all > > > info. > > > later4,mike f. > > > > > > > > > > > > Michael T. Fiorentino > > > Syracuse,NY 13206 > > > > > > "CONFIDENTIALITY WARNING" > > > This electronic message contains information which may be privileged > > > and/or confidential. The information is intended for use only by the > > > individual(s) > > > or entity named/indicated above. If you are not the identified/intended > > > recipient, be aware that > > > any disclosure, copying, distribution, or use of the contents of this > > > message/information is prohibited. If you are not the indicated recipient > > or > > > have > > > received this message in error contact our offices immediately for > > > instructions." > > > > > > > > > > > > ------------------------------------------------------------------------ > > > @Backup- Protect and Access your data any time, any where on the net. > > > Try @Backup FREE and recieve 300 points from mypoints.com Install now: > > > http://click.egroups.com/1/2345/1/_/507420/_/958577414/ > > > ------------------------------------------------------------------------ > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > ------------------------------------------------------------------------ > > Make new friends, find the old at Classmates.com: > > http://click.egroups.com/1/4052/1/_/507420/_/958670313/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > ------------------------------------------------------------------------ > Make new friends, find the old at Classmates.com: > http://click.egroups.com/1/4052/1/_/507420/_/958696780/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS From: Steve Uhrig Date: Fri May 17, 2002 8:55pm Subject: Re: Optical and Opto-Electronic Camera Detection On 17 May 2002 at 10:49, alcook309 wrote: > After searching fruitfully for information, I have drawn a blank. The > information in question is about two devices that can apparantly detect > any cameras (from pinhole to standard photographic) or optics (Binos, > scopes etc), whether passive or active, thermal or just lens based, up > to 300 mtrs away. Seek and ye shall find. Knock and the door shall open. Ask and it shall be given unto you. They're real. They work. And they work well. I've seen a demo of one owned by a friend who is a list member and has posted on the piece here before. Check the list archives for a device called 'Spyfinder'. Yes. The name stinks. The friend who owns it covered the name with a piece of tape. I doubt they would be practical outdoors, and where are you going to be sweeping indoors where you are trying to locate a covert camera at 300 meters? I would expect that figure to be an exaggeration by an order of magnitude. They are expensive, in the 4 figures (several thousand USD). There is the original high precision well constructed unit. Then there allegedly is or is soon to be a cheaper version by the same manufacturer. I suspect, though the concept is valid and works, few are paying the price for the expensive unit but the manufacturer (speaking as one) does not want to reduce the price without cutting something. Here, not features but apparently physical construction. Here is the link to the cheaper version: http://www.spyfinder.org It has been in the current 'proposed' stage for over a year. I have tried contacting the manufacturer asking about pricing and availability and have not received a reply. The things do exist, though, and they work. The expensive one used to be advertised by spy shops. I do not recall seeing them advertised lately. If they are still being manufactured, make every effort to find the original source and avoid dealing with spy shops at all costs. The thing uses two lasers -- one steady on and one blinking as I recall -- and exploits a principle common to cameras called 'retroreflection.' As I understand it, the image sensing element in an electronic camera is a retroreflector, which means it reflects light back from any angle of incidence. Beyond that I do not recall how it operates. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5404 From: James M. Atkinson Date: Fri May 17, 2002 10:23pm Subject: ...and now for something completely different Since there are quite a few Monty Python Fans on the list I thought I would post the link to: The Complete Monty Python's Flying Circus Collection http://www.amazon.com/exec/obidos/ASIN/B00004ZEU5/graniteisland-20 Let me know if you have any dead parrots that need to be nailed back in place ;-) -jma ps: Here is a similar Star Wars Collection Star Wars - Episode I, The Phantom Menace (1999) DVD http://www.amazon.com/exec/obidos/ASIN/B00003CX5P/graniteisland-20 Star Wars - Episode V, The Empire Strikes Back (1980) DVD http://www.amazon.com/exec/obidos/ASIN/B00003CX9T/graniteisland-20 Star Wars - Episode VI, Return of the Jedi (1983) DVD http://www.amazon.com/exec/obidos/ASIN/B00003CXCB/graniteisland-20 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5405 From: George Shaw Date: Sat May 18, 2002 10:52am Subject: RE: Re: Optical and Opto-Electronic Camera Detection Just a thought after reading through a few detail sheets on CCDs has anyone heard of "blinding" cameras with an exposure of high intensity light before a meeting? According to the data I have read it should be possible to blind cameras permanently with a high intensity light pulse? Just if it worked it would be an easy way to disable devices before a room was used, sort of MIB :-) for cameras. George Shaw MI3GTO Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: 18 May 2002 02:56 To: tscm-l@yahoogroups.com Subject: [TSCM-L] Re: Optical and Opto-Electronic Camera Detection On 17 May 2002 at 10:49, alcook309 wrote: > After searching fruitfully for information, I have drawn a blank. The > information in question is about two devices that can apparantly detect > any cameras (from pinhole to standard photographic) or optics (Binos, > scopes etc), whether passive or active, thermal or just lens based, up > to 300 mtrs away. Seek and ye shall find. Knock and the door shall open. Ask and it shall be given unto you. They're real. They work. And they work well. I've seen a demo of one owned by a friend who is a list member and has posted on the piece here before. Check the list archives for a device called 'Spyfinder'. Yes. The name stinks. The friend who owns it covered the name with a piece of tape. I doubt they would be practical outdoors, and where are you going to be sweeping indoors where you are trying to locate a covert camera at 300 meters? I would expect that figure to be an exaggeration by an order of magnitude. They are expensive, in the 4 figures (several thousand USD). There is the original high precision well constructed unit. Then there allegedly is or is soon to be a cheaper version by the same manufacturer. I suspect, though the concept is valid and works, few are paying the price for the expensive unit but the manufacturer (speaking as one) does not want to reduce the price without cutting something. Here, not features but apparently physical construction. Here is the link to the cheaper version: http://www.spyfinder.org It has been in the current 'proposed' stage for over a year. I have tried contacting the manufacturer asking about pricing and availability and have not received a reply. The things do exist, though, and they work. The expensive one used to be advertised by spy shops. I do not recall seeing them advertised lately. If they are still being manufactured, make every effort to find the original source and avoid dealing with spy shops at all costs. The thing uses two lasers -- one steady on and one blinking as I recall -- and exploits a principle common to cameras called 'retroreflection.' As I understand it, the image sensing element in an electronic camera is a retroreflector, which means it reflects light back from any angle of incidence. Beyond that I do not recall how it operates. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5406 From: James M. Atkinson Date: Sat May 18, 2002 1:57pm Subject: Kuhn's Optical Intercept LATEST PRIVACY THREAT: MONITOR GLOW By Robert Lemos Staff Writer, CNET News.com May 14, 2002, 6:05 AM PT http://news.com.com/2100-1001-912785.html BERKELEY, Calif.--Law enforcement and intelligence agents may have a new tool to read the data displayed on a suspect's computer monitor, even when they can't see the screen. Marcus Kuhn, an associate professor at Cambridge University in England, presented research Monday showing how anybody with a brawny PC, a special light detector and some lab hardware could reconstruct what a person sees on the screen by catching the reflected glow from the monitor. The results surprised many security researchers gathered here at the Institute of Electrical and Electronics Engineers' (IEEE) Symposium on Security and Privacy because they had assumed that discerning such detail was impossible. "No one even thought about the optical issues" of computer information "leakage," said Fred Cohen, security practitioner in residence for the University of New Haven. "This guy didn't just publish, he blew (the assumptions) apart." Many intelligence agencies have worried about data leaking from classified computers through telltale radio waves produced by internal devices. And a recent research paper outlined the threat of an adversary reading data from the blinking LED lights on a modem. Kuhn's research adds the glow of a monitor to the list of dangers. Eavesdropping on a monitor's glow takes advantage of the way that cathode-ray tubes, the technology behind the screen, work. In most computer monitors, a beam of electrons is shot at the inside of the screen, which is covered in various phosphors, causing each pixel to glow red, green or blue, thereby producing an image. The beam scans from side to side, hitting every pixel -- more than 786,000 of them at 1024-by-768 resolution -- in sequence; the screen is completely scanned anywhere from 60 to 100 times every second. The light emitted from each pixel of phosphor will peak as the pixel is hit with electrons, creating a pulsating signal that bathes a room. By averaging the signal that reflects from a particular wall over nearly a second and doing some fancy mathematical footwork, Kuhn is able to reconstruct the screen image. Not so fast Yet Kuhn, who is still completing his doctoral thesis, is quick to underscore the problems with the system. "At this point, this is a curiosity," he said. "It's not a revolution." First off, Kuhn performed the experiments in a lab at a short distance--the screen faced a white wall 1 meter away, and the detector was a half meter behind the monitor. There have been no real-world tests where, for example, other light sources are present and the detector is 30 feet across a street. Other light sources, including the sun, make things much more difficult if not impossible. Normal incandescent lighting, for example, has a lot of red and yellow components and tends to wipe out any reflections of red from the image on a screen. And several countermeasures are effective, including having a room with black walls and using a flat-panel liquid-crystal display. LCD monitors activate a whole horizontal line of pixels at once, making it immune to this type of attack. Still, other researchers believe that Kuhn may be on to something. "Anyone who has gone for a walk around their neighborhood knows that a lot of people have a flickering blue glow emanating from (their) living rooms and dens," said Joe Loughry, senior software engineer for Lockheed Martin. While Kuhn calculated that the technique could be used at a range of 50 meters at twilight using a small telescope, a satellite with the appropriate sensors could, theoretically, detect the patterns from orbit, said several security experts. That could open a whole new can of worms for privacy. If Kuhn's technique proves to be practical, the result of the research could be a new round of battles between law enforcement agencies and privacy advocates in the courts over whether capturing the faint blue glow from a home office is a breach of privacy. Until that's resolved, the safest solution is to compute with the lights on. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5407 From: Aimee Farr Date: Sat May 18, 2002 4:37pm Subject: Threat perception Picket wrote: > One problem I see the President had was the fact that a "threat" was > forthcoming. Yes, but generic threat perception and specific threat recognition differ. (I assume this is relevant, for obvious reasons.) Adversarial decision --> indicators --> threat perception --> warning (warning span starts HERE) --> countermeasures It blurs. Most early indicators are masked by activity that is considered normal, so they are usually not recognized as having a special character. Another way of looking at it: Somebody constructed a very clear and competitive signal to reach top-level decision-makers, and it reached the President. It was fed so as to load the expectations. Which confirmed our known preconceptions, and played into goal agendas and roles. Then we pan over to the WTC as the foundational linkage to Laden, offering confirmation... High (and redundant) salience as to basic goals and threat amelioration, so as to evoke an action under extreme time-pressure. (Assume they planned for "3." 3 _really is_ a magic number.) We all eat from a tree of 9-11 tainted fruit, orchestrated by some invisible adversary to spark a reaction, load our defensive orientation and operational allocations, and cause a crash in internal information processes ending in ultimate ambiguity so as to....*TWILIGHT ZONE* (I'm no Tom Clancy.) I'm just gaming.... but my game might have more causal support than any "handful of critical mistakes" theory, and scenarios like this have been hypothesized for many years. (Terrorism is a situational variable that is easy to manipulate.) Events are the subject of complex causes, yet we are predisposed to see simple ones, and this is reinforced by motivational biases to see your past decisions/actions as consistent with your self-image. _Relevance to TSCM_: Some people suffer from over sensitivity to causal biases, perceiving random events as (a) related (b) a plot. (Over sensitivity to consistency and bias toward coordination/conspiracy.) Surveillance "explains so much." It ranks right up there with demon possession. We are statistically subject to the influence of these biases. It stems from a deep need to explain our world. How you see/explain your world is your mind-set, shaping your beliefs. Your beliefs determine the information you are interested in. You ignore or distort non-conforming information. We do not perceive reality, we construct it, and we have a "blueprint." It creates blind spots. To give you an idea of the size....(paraphrased)....a group of early scientists looked through a telescope at a colleague's newly-discovered planet. The discoverer was really excited. He was soon deflated, however, as his colleagues all "saw it" as something other than a planet, because it conflicted with their beliefs about the universe. That blind spot can hide entire planets from view, a strategic deception, or an itsy-bitsy spy. ~Aimee 5408 From: Steve Uhrig Date: Sat May 18, 2002 6:26pm Subject: Another cell phone privacy leak Forwarded from a law enforcement newsletter ========================================== NEW GENERATION CELL PHONE 'AUTO-ANSWER' COULD TIP OFF POTENTIAL SUSPECTS It has been brought to our attention that many new generation cellular phones have an 'auto-answer' feature that allows the phone to answer a call automatically without the user's physical contact. Apparently, this feature is designed for 'hands free' operation for disabled individuals, and individuals operating their phones while driving. Further, it was posted in a Louisiana State Police Special Bulletin (dated May 2) that DEA contacts in New York have received reports from agents that their CI's know of drug gang members who are indeed aware of this feature and use it to gather intelligence from law enforcement. "They will allow themselves to be picked up and then 'leave' a phone in their vehicle to gather intelligence from them later or they will secretly hide a phone in an officer's vehicle or in a spot that they know that law enforcement gathers at to glean intelligence," the bulletin reads. Further, an April 2 edition of the bulletin detailed a scenario involving one of these cellular phones, but at the time the Louisiana State Police were unable to confirm the origin of the scenario. However, representatives from the department told Xxxxxx that they have since been contacted by the Phelps County (Missouri) Sheriff's Department identifying that department as the origin for the scenario. The scenario featured a Nextel phone, in particular, that was found in a truck that officers were searching. There were 65 pounds of marijuana in the sleeper. During the search, the cellular phone began ringing while it sat in the holster on the dashboard. When the phone stopped ringing, the officers assumed that voicemail kicked in, however, they learned later that the phone was set in auto-answer. The caller was the intended recipient of the marijuana. Incidentally, he was able to overhear the officers during their search of the vehicle. Not only did this give away details of the search to the individual on the phone, but it also potentially jeopardized the safety of the officers. Louisiana State Police has confirmed the details of the auto-sound feature through Nextel. The feature can be accessed by pressing the * key and then the # key. Then hit the arrow key until you see the auto-answer option. You can also find out whether or not the feature is actually on, and you can program how many rings it will take to activate it, or to ring silently. As stated in the Louisiana State Police Special Bulletin, April 2 edition: "This is a potentially serious threat to agents especially in a controlled delivery environment. Always check cell phones to make sure what kind they are. Be especially careful of Nextel phones when found and make sure the auto-answer feature is turned off or at least no one says anything near it that can be heard and tip off a potential suspect." We have sent this warning out strictly to inform you of the POTENTIAL danger you could face if you find yourself in a similar situation. The phone itself poses no threat, but as with any device featured in our Weapons Warnings, in the hands of the wrong people it could be used in a potentially dangerous way. Specifically, these phones could be used as a communication device that could release official law enforcement information to a potential suspect. ============= ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5409 From: Administrator Date: Sat May 18, 2002 5:28pm Subject: RE: Re: Optical and Opto-Electronic Camera Detection The ill-named "SpyFinder" does work and works well. We have been using one for almost two years and it performs as advertised. As Steve mentioned, I can not imagine where you might use it at 300 yards and personally from our experience I don't see how you could get enough of a reflection to recognize a reading from that distance. We have never had the occasion to try it at anywhere near this range but I have located a pinhole camera at 85 feet in daylight and indoors. The laser reflects back from the camera's imager at what ever angle you are from the camera as long as you are in the field of view. Basically, if the camera can see you - you can see the camera. When it "sees" a camera a red dot or flare appears in the imager of the SpyFinder pinpointing the camera. It is a very sturdy and well manufactured piece of equipment and should last many years. The opinions above are based on personal use of this equipment in the field but as a matter of fairness I must disclose that we also sell this unit to our government and law enforcement clients. The manufacturer's list price is $2995. Jei Wheeler Director TACTRONIX "Tactical Electronics For Critical Missions" 468 Camden Drive Beverly Hills, CA 90210 E: jei@t... T: 323-650-2880 F: 310-388-5886 W: www.tactronix.com California IACSP Director - (International Association for Counterterrorism and Security Professionals) ASIS - American Society for Industrial Security ------------------------------------------------------------------------ See us at: INTERPOL European Conference, June 5th - 7th, Tallinn, Estonia SEGURITEC 2002, June 20th -22nd, Lima, Peru MILIPOL 2002, October 28th - 30th, Doha, Qatar ------------------------------------------------------------------------ -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Friday, May 17, 2002 6:56 PM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Re: Optical and Opto-Electronic Camera Detection On 17 May 2002 at 10:49, alcook309 wrote: > After searching fruitfully for information, I have drawn a blank. The > information in question is about two devices that can apparantly detect > any cameras (from pinhole to standard photographic) or optics (Binos, > scopes etc), whether passive or active, thermal or just lens based, up > to 300 mtrs away. Seek and ye shall find. Knock and the door shall open. Ask and it shall be given unto you. They're real. They work. And they work well. I've seen a demo of one owned by a friend who is a list member and has posted on the piece here before. Check the list archives for a device called 'Spyfinder'. Yes. The name stinks. The friend who owns it covered the name with a piece of tape. I doubt they would be practical outdoors, and where are you going to be sweeping indoors where you are trying to locate a covert camera at 300 meters? I would expect that figure to be an exaggeration by an order of magnitude. They are expensive, in the 4 figures (several thousand USD). There is the original high precision well constructed unit. Then there allegedly is or is soon to be a cheaper version by the same manufacturer. I suspect, though the concept is valid and works, few are paying the price for the expensive unit but the manufacturer (speaking as one) does not want to reduce the price without cutting something. Here, not features but apparently physical construction. Here is the link to the cheaper version: http://www.spyfinder.org It has been in the current 'proposed' stage for over a year. I have tried contacting the manufacturer asking about pricing and availability and have not received a reply. The things do exist, though, and they work. The expensive one used to be advertised by spy shops. I do not recall seeing them advertised lately. If they are still being manufactured, make every effort to find the original source and avoid dealing with spy shops at all costs. The thing uses two lasers -- one steady on and one blinking as I recall -- and exploits a principle common to cameras called 'retroreflection.' As I understand it, the image sensing element in an electronic camera is a retroreflector, which means it reflects light back from any angle of incidence. Beyond that I do not recall how it operates. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5410 From: bwhite424us Date: Sat May 18, 2002 10:42pm Subject: Thermal Imaging Hello. To what extent will a thermal imaging camera detect eavesdropping devices? 5411 From: James M. Atkinson Date: Sat May 18, 2002 11:24pm Subject: Re: Thermal Imaging At 3:42 AM +0000 5/19/02, bwhite424us wrote: >Hello. To what extent will a thermal imaging camera detect >eavesdropping devices? Thermal imaging does not actually "find" an eavesdropping device, but instead locates thermal anomalies caused by the modification to the physical structure and/or heat being conducted from the device to the surrounding area. If you drill a small cavity into sheet rock, prick the paint to create a pinhole, and then mount a small microphone in the cavity you will get a thermal mismatch between the surrounding area and the area behind the pinhole. A TSCM professional can use passive thermal imaging, or they can heat the area up with a heat lamp (or 500 watt shop light), watch the wall area heating up, and observe thermal anomalies where the wall structure has been breached. Thermal imaging devices are pricey, and unless you do a ton of sweeps on a regular basis they are not worth the money. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5412 From: Date: Sun May 19, 2002 0:10pm Subject: Enemy Of The State movie Enemy of the State movie will be on Monday night 8pm EST,USA, on NBC network ,starring Steve Uhrig and Marty Kaiser as technical consultants . Be sure to catch it. Steve has a cameo as spy shop owner. Great flik! HAVE A GREAT DAY !!! 5413 From: Steve Uhrig Date: Sun May 19, 2002 0:45pm Subject: Enemy of the State patedwards@w... wrote: > Enemy of the State movie will be on Monday night 8pm EST,USA, on NBC > network ,starring Steve Uhrig and Marty Kaiser as technical > consultants . Be sure to catch it. Steve has a cameo as spy shop owner. Here is text from the press kit which will explain a bit about the talent and the filmmakers. Marty and I technically were filmmakers. http://movieweb.com/movie/enemystate/enemy.txt Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5414 From: Aimee Farr Date: Sun May 19, 2002 1:38pm Subject: RE: Threat perception versus REALITY REALITY: Whatever YOUR reality, (we all have our own) we have to be creative enough to mesh it so that your post is linked topically to this forum. ;-] RELEVANCE: Reality is something we can never fully perceive. There is only beliefs (perceptions) about reality. Beliefs make for actions. Actions, in turn, make beliefs. Which make counteractions. In conflict or contention, to predict your actions, so as to optimize my actions, I need to know your stimulus set. Then, I can take actions which send corrective signals (informational or physical actions) so as to induce your "compliance" with my aims in terms of an action or nonaction. Crisis and transition breeds uncertainty, because the event stream is unpredictable and transitory. Ideally, what I want is a "direct feedback channel" to reduce my uncertainty. ∑Feinsteinís Chagrin Theory ßPeople chose the course of action that will minimize the risk of burn ∑Kahneman & Tverskyís Prospect Theory ßPeople will avoid risks if the outcome is viewed as a gain ßPeople will seek out risks if the outcome is viewed as a loss I gather this is where some of you come in. If I don't have that capability or seek another option, I might aim for controversy, because it makes leaks. 9-11 continues to elicit intelligence, this controversy is going to need a tourniquet. In government, our direct feedback channels and interception capabilities can be divined by reading the _Washington Post_, probably allowing our adversaries to probe our ("new") channels, sources, collection capabilities, communication attributes, decision making matrixes, salience standards, message attributes, informational processing procedures......blah. The fact of intercept exploitation is also known, and is often all an adversary needs to have us chasing scratch like chickens. These recent "un-named sources" are giving people the impression our intercept capabilities produce many indicators. It contributes to the "flood feeling." Warnings will be taken less seriously, because people will assume there will be a "final, final warning." Also, the credibility of warnings is undermined, contributing to alert fatigue and cry wolf conditioning strategies. That kills people. People will not take away what you think they will: "vague, non-specific" in the Washington Post, and other stories about intercepts pointing to future attacks. In other contexts, that would be suggestive, since the way to deal with "watchers" is to introduce ambiguity to convince you that what is happening isn't, or to encourage you to wait for more information so as to bubble your resolution point. This story suggests a high ambiguity tolerance, and that is not a message I would choose to send. So, even if that could be viewed as some sort of counterdeception plant, it would be a really bad one. (I assume our "counterterrorism people" take courses in military deception and have people that have operational experience. Otherwise, in today's environment, "counterterrorism" would be a word without meaning.) ~Aimee 5415 From: invmpi Date: Sun May 19, 2002 4:05pm Subject: Staff Investigator (Entry Level), Woodbridge, VA Registered DCJS Individuals for Entry Level Full time Position Available!! Staff Investigator (Entry Level), Woodbridge, VA Well established Investigative/Security Consulting Firm is seeking a DCJS Registered Investigator (preferred, but not required) with analytical mind, detail oriented, one to two years experience in the area of corporate investigations, fraud, due diligence, and litigation support services. Exceptional report-writing skills required. JOB RESPONSIBILITIES: Development and implementation of a comprehensive investigative plan of action. Specific duties of the position includes but is not limited to: - Investigates assigned cases involving suspected insurance fraud and other irregularities. Conducts timely, thorough and accurate inquiry of the relevant facts. Maintains assigned case files in a confidential manner; documents allrelevant facts pertaining to those files. - Ensures that assigned cases are investigated and reported back to the Assistant Director in a timely. Prepares and submits initial and follow-upreports of findings and actions taken on each assigned case file. - Keep supervisors/ management informed of developments that impact investigative results. - Develops and maintains rapport with federal, state and local government agencies as well as private information bureaus that can assist in investigative efforts. - Testifies in civil and criminal court proceeding. - Maintains all assigned company equipment. - Submits expense reports and other administrative reports as required. - Performs other duties as assigned. - Approximately 25% - 35% field investigation and travel required. DESIRED SKILLS: - Demonstrated investigative ability in complex investigations coupled with the ability to make appropriate decisions within the scope of the position's responsibility. - Intermediate to advanced computer skills to include strong working knowledge of Windows 95/ NT,Microsoft Office products and Internet applications. - Strong knowledge and experience in Investigative/litigation support Database research. - Strong organizational skills and the flexibility to work independently as well as in a team environment. REQUIREMENTS: - Undergraduate Degree in Business - One (1) year prior fraud investigation a plus - Excellent writing,researching and interviewing skills required. - Knowledge of online commercial databases preferred Excellent compensation, companybenefits, pension plan, etc. For consideration please email cover letters and resumes to rgiadva@p.... Please indicate Salary Requirements in your letter. 5416 From: Steve Uhrig Date: Sun May 19, 2002 5:26pm Subject: Re: Thermal Imaging On 19 May 2002 at 3:42, bwhite424us wrote: > Hello. To what extent will a thermal imaging camera detect > eavesdropping devices? A *good* thermal imager, which will not be available used or on ebay or as government surplus and will cost about what a small house does, will indeed be an effective TSCM tool. Remember, tools are useful in the hands of those trained to use them, and useless to dangerous in the hands of those not. See this site for specifics: http://www.spybusters.com It is *not* my site nor am I affiliated with it in any way. It is the website of a professional TSCM practitioner. Follow the links for static photos or movies of a thermal imager in use in TSCM. Children, don't try this at home. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5417 From: William Knowles Date: Mon May 20, 2002 3:51am Subject: Computer whiz still faces second lawsuit http://www.mlive.com/news/bctimes/index.ssf?/xml/story.ssf/html_standard.xsl?/base/news/1021648510270760.xml Friday, May 17, 2002 By Crystal Harmon TIMES WRITER A teen-age computer wizard has won his legal battle to get the label "hacker" removed from his school record, but now the label "eavesdropper" may be added to his criminal record. Nicholas J. Suchyta, 19, allegedly recorded his roommate and her boyfriend having sex and also beamed live broadcasts of the activities on the Internet early this year. The couple told police they had no idea that the five computers in the living room were rigged with a Web cam. Bay County District Judge Scott J. Newcombe arraigned Suchyta on two counts of installing eavesdropping devices and two counts of divulging information obtained by eavesdropping. Each felony count carries a maximum penalty of two years in prison and $2,000 in fines. Suchyta was released from the Bay County Jail on May 8 after posting a $5,000 bond. Suchyta had shared an apartment on North Hampton Road with an 18-year-old woman who said the two had been best friends since grade school. But she said she became concerned when acquaintances said they'd seen her having sex on the Internet with her 18-year-old boyfriend. She told police she found the recordings on one of the computers, but as she attempted to download the images for evidence, the computer was shut down, apparently from one of the two laptop computers she said Suchyta carries with him. On Feb. 2, police searched the apartment and found a camera hidden on top of one of the computers. With the help of a computer crimes expert, they also found four files containing images of the two teens having sex that apparently had been broadcast on the Internet. Bay City Police also found 14 modems that they determined had been taken from Charter Communications, where Suchyta had worked as a high-speed data technician. Suchyta, who now resides on South Euclid Avenue, declined to comment to The Times about the cases. Meanwhile, Suchyta and Bay City Public Schools have settled a civil suit Suchyta brought against school officials who disciplined him for downloading a "hacking" program. The program included instructions for capturing log-ins and passwords of system users. Suchyta was a co-op student who worked in the student records office and the computer lab, and helped make the transition from one type of system to the other. Staff turned to Suchyta for help with many computer glitches, and, Suchyta said, a secretary gave him the password to the student-record program so he could help her update vaccination records. Later a teacher reported seeing Suchyta browsing student records in class, according to testimony given during depositions for the lawsuit. Co-op supervisor Michael Kehrier said school officials warned Suchyta to stay away from sensitive material, but they allowed him to continue his work in the school computer lab. The district's technology director said he's reviewed security and made some changes. "No data is ever going to be 100-percent secure," John Strycker said this morning. "But a system is only going to be as secure as the user. People that are new to using technology - and in this district it's relatively new - might not understand that passwords are like keys and you don't just hand them out." In November 2000, according to depositions, a Central teacher was having trouble with his computer and school technicians ran a virus program, which found several files saved on Suchyta's hard drive. Suchyta claimed he was simply collecting such information to evaluate possible threats to the network, he said. Assistant Principal Jonathan Whan suspended Suchyta for five days in November 2000, fired him from his co-op job and kicked him out of advanced computer classes. In written memos, Whan classified Suchyta's actions as "hacking" the computer system. Suchyta and his parents, Richard and Shannan, sued the school and Whan for defamation of character, invasion of privacy, intentional infliction of emotional distress and gross negligence. They also accuse school officials of failing to provide copies of computer data they requested under Michigan's Freedom of Information Act. The Suchytas asked for more than $25,000 each. Their attorney, David Skinner, said Thursday that the settlement - forged with help of a mediator and yet to be approved by a judge - was amicable. He wouldn't comment on a monetary settlement, but acknowledged that the schools removed all records of the alleged "hacking" incident from Suchyta's permanent record. In the suit, Skinner described school officials' handling of the incident as "open and hostile." "The school district's agents accused a teen-age high school student of being a hacker, removed him from the classes found most interesting," the complaint reads. "The allegation that Nicholas is a hacker creates the presumption in the community that he committed a crime, that he is now a criminal." *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 5418 From: sebastien rittner Date: Sun May 19, 2002 11:38pm Subject: signal analysis courses Hi, Signal analysis courses are available for military people. It's not a news. Where can we find equivalent courses in the private sector and/or by correspondence? Thanks for your help, comments welcome. Sebastien. ===== email : sebastien@t... web : http://www.tscm-technician.net Learning stops only with ignorance...SR __________________________________________________ Do You Yahoo!? LAUNCH - Your Yahoo! Music Experience http://launch.yahoo.com 5419 From: Rob Muessel Date: Mon May 20, 2002 7:59am Subject: Re: Re: Thermal Imaging Take a look at this page on my site, too. http://www.tscmtech.com/new_technology.htm -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 5420 From: Secdep Date: Mon May 20, 2002 9:59am Subject: STRANGE REQUEST If someone is pulling a fast one on me, they doing a good job. I have had one of the strangest request ever. I have been requested to perform a TSCM Investigation on a client. He believes International Intelligence Agencies are monitoring his brain waves. to steal his ideas. 5 Years ago they drugged him and now control him through satellite Television. He also has Satellite Tracking Device in a tooth cavity. He now wants to get the frequencies they operating on. The one in his brain & the other in the tooth cavity. The scary thing is the man appeared very normal, & spoke very seriously about his problem. I have got to provide a quote by Wednesday. Maybe I should send him to the USA for evaluation !!!!!!!!!!!!!!!!!!!!! This beats the one I had from the woman who wanted to fit a listening device in her husbands watch & wanted to have the conversations monitored from 100 km's. Raymond --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 5421 From: Michael Puchol Date: Mon May 20, 2002 10:26am Subject: Re: STRANGE REQUEST I would cuote him 10.000 Federation Credits, plus a free ride in his spaceship when he comes to pick him back up... Seriously, this is either someone pulling your leg, a reporter looking to investigate P.I. firms (which may get you in the same bag as them), or someone seriously mentally ill. In any case, maybe just say you don't interfere with government affaires - it's what I did once, and worked, with this guy who wanted a GPS tracking device implanted *inside* his body, so when the government intel agencies kidnapped him he could be found. All the best, Mike ----- Original Message ----- From: "Secdep" To: "TSCM-L" Sent: Monday, May 20, 2002 4:59 PM Subject: [TSCM-L] STRANGE REQUEST > If someone is pulling a fast one on me, they doing a good job. > > I have had one of the strangest request ever. I have been requested to perform a TSCM Investigation on a client. > > He believes International Intelligence Agencies are monitoring his brain waves. to steal his ideas. 5 Years ago they drugged him and now control him through satellite Television. > > He also has Satellite Tracking Device in a tooth cavity. He now wants to get the frequencies they operating on. The one in his brain & the other in the tooth cavity. > > The scary thing is the man appeared very normal, & spoke very seriously about his problem. > > I have got to provide a quote by Wednesday. Maybe I should send him to the USA for evaluation !!!!!!!!!!!!!!!!!!!!! > > This beats the one I had from the woman who wanted to fit a listening device in her husbands watch & wanted to have the conversations monitored from 100 km's. > > Raymond > --- > > From the desk of Raymond van Staden > Van Staden and Associates cc > > P.O. Box 1150 > Amanzimtoti > 4125 > South Africa > > Tel: +27 (0)31 916-1262 > Fax: +27 (0)31 916-1263 > > Email: raymond@v... > Internet: http://www.vanstaden.co.za > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5422 From: Steve Whitehead Date: Mon May 20, 2002 11:41am Subject: Bugging Device?? Our National Intelligence Agency testifying about the discovery of the bugging device! http://www.iol.co.za/index.php?click_id=13&art_id=ct20020520131903983S120654&set_id=1 "Spies testify at hearing on city bugging May 20 2002 at 01:19PM By Elliott Sylvester It was a case of spy versus spy as the Desai Commission started its public hearings on Monday. Headed by judge Siraj Desai, the commission was set up at the request of Western Cape premier Peter Marais to probe the alleged bugging of the provincial government's offices. This followed a National Intelligence Agency sweep of the building which found a sophisticated surveillance device. First to appear at the commission hearing on Monday was the NIA's Western Cape manager, Arthur Fraser, who testified to the events which played themselves out on the night of March 6 this year. After an initial NIA bugging "sweep", the Watchdog WS 100 device was allegedly found in the office of senior provincial official Pierre Beneke. Fraser testified that when he approached Beneke in his office, he came across two women removing "sensitive official files" from the building. "I asked Mr Beneke whether he was authorised to do so and he said he had received permission from Director General (Gilbert) Lawrence. Mr Lawrence later refuted this." He said Beneke had claimed the files were to be taken to a former deputy director general no longer employed by the province, an advocate Oliver. Fraser said he had discovered the listening device had been housed in a strongroom on the legislature's mezzanine floor. The room had two entrances, both with peepholes to allow the occupant to see who was approaching. After Fraser's testimony the hearings dipped further into the world of the clandestine when John Tshabalala took to the stand. Tshabalala (not his real name) is an NIA technical expert who specialises in Technical Surveillance Counter Measures or "debugging". He said the Watchdog was a sophisticated device which could transmit, record and store conversations and track bugging devices. He said it could be linked to a computer network and the operator could eavesdrop on conversations "from as far away as England". The hearings are set to become more heated as both Cape Town mayor Gerald Morkel and his controversial acquaintance Jurgen Harksen have been subpoenaed to appear. Lead counsel for the commission is advocate Craig Webster" Steve Whitehead E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa [Non-text portions of this message have been removed] 5423 From: James M. Atkinson Date: Mon May 20, 2002 0:22pm Subject: Re: Bugging Device?? Excuse me, but isn't the "Watchdog WS 100 " a Korean made bug DETECTION toy? Yeah, sure it has a microphone, speaker, and network connection, but it's really nothing more then a cheap knock off of the OSCOR. Something funny is going on. -jma At 6:41 PM +0200 5/20/02, Steve Whitehead wrote: >Our National Intelligence Agency testifying about the discovery of >the bugging device! > >http://www.iol.co.za/index.php?click_id=13&art_id=ct20020520131903983S120654&set_id=1 > >"Spies testify at hearing on city bugging > > May 20 2002 at 01:19PM > > > > > By Elliott Sylvester > > >It was a case of spy versus spy as the Desai Commission started its >public hearings on Monday. > >Headed by judge Siraj Desai, the commission was set up at the >request of Western Cape premier Peter Marais to probe the alleged >bugging of the provincial government's offices. > >This followed a National Intelligence Agency sweep of the building >which found a sophisticated surveillance device. > >First to appear at the commission hearing on Monday was the NIA's >Western Cape manager, Arthur Fraser, who testified to the events >which played themselves out on the night of March 6 this year. > >After an initial NIA bugging "sweep", the Watchdog WS 100 device was >allegedly found in the office of senior provincial official Pierre >Beneke. > >Fraser testified that when he approached Beneke in his office, he >came across two women removing "sensitive official files" from the >building. > >"I asked Mr Beneke whether he was authorised to do so and he said he >had received permission from Director General (Gilbert) Lawrence. Mr >Lawrence later refuted this." > >He said Beneke had claimed the files were to be taken to a former >deputy director general no longer employed by the province, an >advocate Oliver. > >Fraser said he had discovered the listening device had been housed >in a strongroom on the legislature's mezzanine floor. > >The room had two entrances, both with peepholes to allow the >occupant to see who was approaching. > >After Fraser's testimony the hearings dipped further into the world >of the clandestine when John Tshabalala took to the stand. >Tshabalala (not his real name) is an NIA technical expert who >specialises in Technical Surveillance Counter Measures or >"debugging". > >He said the Watchdog was a sophisticated device which could >transmit, record and store conversations and track bugging devices. > >He said it could be linked to a computer network and the operator >could eavesdrop on conversations "from as far away as England". > >The hearings are set to become more heated as both Cape Town mayor >Gerald Morkel and his controversial acquaintance Jurgen Harksen have >been subpoenaed to appear. > >Lead counsel for the commission is advocate Craig Webster" > > > >Steve Whitehead >E-mail : sceptre@m... >Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) >P O Box 16063, Lyttelton, 0140, Centurion, South Africa > > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5424 From: Matthew Paulsen Date: Mon May 20, 2002 5:30pm Subject: Porltland sniffer experts. 802.11b Hi, If there are contractors in the PDX region that have sniffer / sniffing expertise on 802.11b with NAI or Network Instruments software, please contact me with your background experience (or a website for company reference), equipment list available, and hourly rate, I have a job coming up and need a secondary analyzer on the project. Thanks, Matt Paulsen Orange Networks LLC - Computers, Networks, Internet and Security http://www.orange-networks.com 503.533.4767 [Non-text portions of this message have been removed] 5425 From: A Grudko Date: Tue May 21, 2002 5:01pm Subject: Re: Bugging Device?? - Original Message - From: James M. Atkinson > Excuse me, but isn't the "Watchdog WS 100 " a Korean made bug DETECTION toy? > Yeah, sure it has a microphone, speaker, and network connection, but > it's really nothing more then a cheap knock off of the OSCOR. > Something funny is going on. Nope, situation normal. Tax payers' money being spent to publicise political gamesmanship. Andy Grudko (British) - D.P.M., Grad I.S, South Africa - PSIRA investigators Reg. No. 8642 Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust When you need it done right - first time 5426 From: Fernando Martins Date: Mon May 20, 2002 1:24pm Subject: RE: signal analysis courses This is, for the case, the only reference I have. Check this page http://www.afcea.org/education/index.htm There are unclassified cources for the industry, and of course confidential and secret for government and military. Since you are in France, this may be usefull: http://www.afceaparis.org/ They have also a nice magazine, SIGNAL, in paper, but with some online articles. FM > -----Original Message----- > From: sebastien rittner [mailto:seb_rittner@y...] > Sent: segunda-feira, 20 de Maio de 2002 5:38 > To: TSCM mailing list > Subject: [TSCM-L] signal analysis courses > > > Hi, > > Signal analysis courses are available for military > people. It's not a news. Where can we find equivalent > courses in the private sector and/or by > correspondence? > > Thanks for your help, comments welcome. > > Sebastien. > > ===== > email : sebastien@t... > web : http://www.tscm-technician.net > > Learning stops only with ignorance...SR > > __________________________________________________ > Do You Yahoo!? > LAUNCH - Your Yahoo! Music Experience > http://launch.yahoo.com > > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> Tied to your PC? Cut Loose and Stay > connected with Yahoo! Mobile > http://us.click.yahoo.com/QBCcSD/o1CEAA/sXBHAA> /kgFolB/TM > > > -------------------------------------------------------------- > -------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire > speed, the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > 5427 From: McIntyre Date: Mon May 20, 2002 10:17pm Subject: Re: Enemy of the State At 01:45 PM 5/19/2002 -0400, Steve Uhrig wrote: > > Enemy of the State movie will be on Monday night 8pm EST,USA, on NBC > > network ,starring Steve Uhrig and Marty Kaiser as technical > > consultants . Be sure to catch it. Steve has a cameo as spy shop owner. > >Here is text from the press kit which will explain a bit about the >talent and the filmmakers. Marty and I technically were filmmakers. > >http://movieweb.com/movie/enemystate/enemy.txt Does anyone else find it creepy that the birthday of Thomas Brian Reynolds character (played by Jon Voight) is 9/11/40 ? 5428 From: Steve Uhrig Date: Tue May 21, 2002 8:06am Subject: Re: Enemy of the State On 20 May 2002 at 23:16, B.K. DeLong wrote: > Does anyone else find it creepy that the birthday of Thomas Brian > Reynolds character (played by Jon Voight) is 9/11/40 ? Keeps me up nights. EVERYBODY has a birthday (anniversary of their birth, actually) on one of the 365 days of the year. For every disaster which occurs, on average 1/365 of the population will have been born on that day. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5429 From: Secdep Date: Tue May 21, 2002 9:31am Subject: Plot thickens in bugging scandal http://www.mg.co.za/Content/l3.jsp?a=11&o=3619 Plot thickens in bugging scandal Auditors have uncovered a string of financial irregularities in key departments in the Western Cape provincial administration, the Desai Commission heard on Monday. The irregularities include the purchase of a Watchdog, a sophisticated device which can be used to both detect electronic bugging and to monitor conversations. The commission, which began its public hearings on Monday, was appointed by premier Peter Marais to probe the discovery of the device amid fears that it had been used by the previous administration to spy on political opponents. Marais gave the former director general, Dr Niel Barnard, his marching orders soon after his New National Party-African National Congress coalition ousted the Democratic Alliance in December last year. Director of forensic audit in the provincial administration, Renay Ogle, told the commission that though the provincial cabinet in August last year approved a proposal for heightened security, this did not mention the purchase of the R27 695 Watchdog. The device had not been budgeted for, no comparative quotes had been obtained, and there was no proper documentation on the need for it. She was unable to say from the documentation who in political authority had been aware of the purchase of the device. "We have not established political involvement in terms of documents in regard to the procurement of the Watchdog," she said. Ogle said the DG's office had operated an irregular private bank account for an entertainment fund, which meant that the R96 659 that passed through it could not be audited. One withdrawal for R3 000 could not be accounted for, while receipts for some purchases made with money from the fund appeared to have been tampered with. With one of these tampered receipts, claimed as a food expense, it emerged that the money in fact went on a bicycle combination lock and a pair of girl's school shoes. Nor had there been treasury approval for an operation to sell "corporate image" items, including t-shirts, pens and umbrellas, from the office of the DG. Although R12 000 was budgeted for the operation in 2000/1, actual stock purchases were over R220 000. The budget for the following year was R14 000, and actual purchases R302 508. Ogle said her team last week discovered boxes full of official documents in the office of a messenger in the DG's office. Among the documents, which were supposed to be kept in the DG's registry, were financial records the auditors had been searching for. Earlier the head of the National Intelligence Agency in the Western Cape, Arthur Fraser, told the commission that the Watchdog was found in the possession of Pierre Beneke, a senior official in the DG's office, in March this year after an NIA sweep of the provincial legislature and administration offices. An NIA technical expert said that with the right aerial connection, the device was capable of monitoring conversations up to 4km away. A police captain also told the commission how he found two men with electronic equipment in the office of former premier Gerald Morkel late one night last year. Captain Renier Strydom, of police protection services, said one of them was sitting in the premier's chair, with a cable attached to the receiver of the premier's phone, and the other was on one side with a large black box with "a whole lot of buttons", and electronic equipment attached to it. The men, a Mr Niehamer and a Mr Lorenzo Lombard, said they were from a private security company and were sweeping the office for electronic bugs. Strydom said that when he confronted them, the men contacted Louis Steyn, a consultant to Barnard, who told him that because Morkel was "high profile", the sweeping was being done so that few people would know about it. - Sapa --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 [Non-text portions of this message have been removed] 5430 From: Secdep Date: Tue May 21, 2002 9:34am Subject: DESCRIPTION OF SA BUGGING DEVICE !!!!!!!! WATCHDOG W-100 Product Introduction The WatchDog is a network form bugging detection device that detects bugging devices and hidden cameras quickly and accurately by utilizing through search and analysis methods. The WatchDog is a high class complex system in which both frequency counter and frequency spectrum analysis features work con-currently and it is a industrial system that can be remote controlled and managed via connection to the company network(LAN) through various interfaces. All users can easily get every detailed information via graphic screen and computer s/w(MMI: Man Machine Interface) supported by WatchDog for more efficient management. By using tracking signal and FM demodulation, every users and system operators can make accurate decision and stamp out all the bugging devices. Product's Characteristics Wide Area Frequency Bandwidth Search a.. Frequency Range: 1.7MHz ~ 2.4GHz b.. Receiver Sensibility: -110dBm ~ -60dBm c.. Detection Area: Approx. 1068ft2 Detection Method a.. Comparison: average frequency value, abnormal frequency detection via frequency strength b.. Tracking surveillance: track and saves after detecting abnormal frequency c.. Tracking signal: detects the presence of latest sound activated bugging devices such as VOX by sending out entrapment signals with its internal speaker d.. Voice demodulation: 1.7MHz ~ 2.4GHz e.. Alarm step: -110dBm ~ -60dBm f.. Elimination of common use frequency : Approx. 1068ft2 Network Management a.. Interface support: Ethernet, RS-232C, RS-485, discrete input / output b.. Remote control: alarm and status inspection, environment setting, confirmation of detailed in- formation c.. Alarm confirmation: summation of alarm event along with 10 other events d.. Industrial application: possibility of remote control of units via internet or network configuration of company LAN e.. S/W provision: provides MMI (Man Machine Interface) f.. S/W specialized in computer and network management g.. Network configuration Graphic LCD a.. Onsite verification: real time search and graphic screen support. b.. Alarm verification: event indication feature c.. Environment setting: surveillance bandwidth frequency chart inquiry and editing d.. Verification of saved data: recording and verification of event occurrence time and system setting alteration time. e.. Frequency counter and spectrum f.. Automatic fixation: in case of the detection of abnormal frequency, user can listen to the sound regenerated from the detected specific abnormal frequency on corresponding warning or alarm occurred channel using earphone g.. Manual fixation: if a frequency that is in doubt is detected then user can manually lock to the specific channel and verified strength of the frequency, past data, current data and listen to the sound regenerated from the frequency h.. Environment setting: inquiry and editing of Surveillance frequency chart i.. Spectrum: One can verify the entire frequency spectrum via graphic LCD and computer s/w [Non-text portions of this message have been removed] 5431 From: Steve Uhrig Date: Tue May 21, 2002 9:52am Subject: Watchdog W-100 On 21 May 2002 at 16:34, Secdep wrote: > WATCHDOG W-100 > Product Introduction > The WatchDog is a network form bugging detection device that detects > bugging devices and hidden cameras quickly and accurately by utilizing > through search and analysis methods. When this product was introduced, evaluation units were given to a number of us. We ran it through its paces, made notes, tested it under real world as well as simulated conditions. We shared notes with each other, shared the units with those who didn't get them directly, and each submitted a report to the manufacturer. Several of us discussed the unit in person at a face to face meeting a while back. The virtually universal consensus was the thing is a piece of junk. It is a good idea, but takes a basic task and bogs it down with all sorts of bells and whistles. It doesn't work, should not be trusted, and is a waste of money. The problem is, the thing was designed by a company who knew and still knows nothing about the real world of RF surveillance. They built a product without asking the market of potential users first. This is a common mistake, most notably made in the two way radio industry by ICOM. The manufacturer did, commendably, submit early production units to a number of us for comments. They should have taken our input before the design was frozen, not after it was in production. The coverage is poor, it takes 24 hours to establish a baseline, did not detect many typical real world threats, is overly complicated to operate, has many useless features like an Ethernet port, and is the typical product deslgned to sell with bells and whistles rather than function. The difference between products from Marty Kaiser and CCS. I well expected to see the thing advertised in every spy shop by now as *the* solution to any eavesdropping concern, no longer need to pay thousands for sweeps, buy this magic box and you're protected 24/7. Frankly, I am surprised it is not sold by the schlock outfits. Maybe the manufacturer insists anyone wanting to sell it buy a demo unit, which would eliminate 99% of the spy shops since few actually carry any inventory. Maybe the manufacturer is not offering it for sale in the U.S. (or anywhere) since the professionals who evaluated it gave it a very poor rating. Maybe the manufacturer did not go into production and the unit mentioned by Raymond was an early sample that got sold to some poor innocent. Woori is/was the manufacturer. South Korean. I did not save their website, but apparently someone at Raymond's operation in S.A. got the info to post in the previous message. There are a good number of simple, cheap, dangerous surveillance devices out there used by law enforcement the Woori piece did not detect, same as the Oscor didn't when I owned one. Just because the salesmen do not know of them and do not design in the capability to detect them is not an excuse for the things not working properly. Relying on an ineffective tool well can result in a dangerous false sense of security. And in the case of the Woori (and the Oscor too, because I was factory trained on the thing) it's not operator inexperience that causes the failure. It is a shortcoming in the capability of the device. At least these newer gadgets can have firmware updated to add more user interface. I wouldn't hold my breath on the W-100 (I seem to recall it being the WS-100 at one point). I am 100% confident I could recover audio from a room via RF and the Woori piece would not detect it. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5432 From: James M. Atkinson Date: Tue May 21, 2002 11:25am Subject: Re: DESCRIPTION OF SA BUGGING DEVICE !!!!!!!! The Watchdog is as effective at finding bugs as monkey feces. I had an evaluation unit here for a while, and put it though numerous lab tests. I even opened the unit up and did a circuit analysis, and was appalled at the shoddy design. The thing was/is effectively deaf to even strong signals, and was nothing more then an overpriced toy and gimmick. -jma At 4:34 PM +0200 5/21/02, Secdep wrote: >WATCHDOG W-100 > > > >Product Introduction > >The WatchDog is a network form bugging detection device that detects >bugging devices and hidden cameras quickly and accurately by >utilizing through search and analysis methods. >The WatchDog is a high class complex system in which both frequency >counter and frequency spectrum analysis features work con-currently >and it is a industrial system that can be remote controlled and >managed via connection to the company network(LAN) through various >interfaces. >All users can easily get every detailed information via graphic >screen and computer s/w(MMI: Man Machine Interface) supported by >WatchDog for more efficient management. >By using tracking signal and FM demodulation, every users and system >operators can make accurate decision and stamp out all the bugging >devices. > > > > > >Product's Characteristics > >Wide Area Frequency Bandwidth Search > > a.. Frequency Range: 1.7MHz ~ 2.4GHz > b.. Receiver Sensibility: -110dBm ~ -60dBm > c.. Detection Area: Approx. 1068ft2 >Detection Method > > a.. Comparison: average frequency value, abnormal frequency >detection via frequency strength > b.. Tracking surveillance: track and saves after detecting >abnormal frequency > c.. Tracking signal: detects the presence of latest sound >activated bugging devices such as VOX by sending out entrapment >signals with its internal speaker > d.. Voice demodulation: 1.7MHz ~ 2.4GHz > e.. Alarm step: -110dBm ~ -60dBm > f.. Elimination of common use frequency : Approx. 1068ft2 > >Network Management > > a.. Interface support: Ethernet, RS-232C, RS-485, discrete input / output > b.. Remote control: alarm and status inspection, environment >setting, confirmation of detailed in- formation > c.. Alarm confirmation: summation of alarm event along with 10 >other events > d.. Industrial application: possibility of remote control of >units via internet or network configuration of company LAN > e.. S/W provision: provides MMI (Man Machine Interface) > f.. S/W specialized in computer and network management > g.. Network configuration > > > > > > >Graphic LCD > > a.. Onsite verification: real time search and graphic screen support. > b.. Alarm verification: event indication feature > c.. Environment setting: surveillance bandwidth frequency chart >inquiry and editing > d.. Verification of saved data: recording and verification of >event occurrence time and system setting alteration time. > e.. Frequency counter and spectrum > f.. Automatic fixation: in case of the detection of abnormal >frequency, user can listen to the sound regenerated from the >detected specific abnormal frequency on corresponding warning or >alarm occurred channel using earphone > g.. Manual fixation: if a frequency that is in doubt is detected >then user can manually lock to the specific channel and verified >strength of the frequency, past data, current data and listen to the >sound regenerated from the frequency > h.. Environment setting: inquiry and editing of Surveillance >frequency chart > i.. Spectrum: One can verify the entire frequency spectrum via >graphic LCD and computer s/w > > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- From: Fernando Martins Date: Sun May 18, 2003 6:38am Subject: Secure phones no obstacle to wiretapping - US Govt http://www.theregister.com/content/55/30746.html Secure phones no obstacle to wiretapping - US Govt By John Leyden Posted: 16/05/2003 at 14:50 GMT The use of so-called secure telephones presents almost no barrier to wiretapping, according to official US government documents. This interesting revelation is contained in a recent report on Applications for Orders Authorizing or Approving the Interception of Wire, Oral, or Electronic Communications). The report (pages 10-11 of report or 8-9 of PDF) states: Public Law 106-197 amended 18 U.S.C. 2519(2)(b) in 2001 to require that reporting should reflect the number of wiretap applications granted in which encryption was encountered and whether such encryption prevented law enforcement officials from obtaining the plain text of communications intercepted pursuant to the court orders. In 2002, no federal wiretap reports indicated that encryption was encountered. State and local jurisdictions reported that encryption was encountered in 16 wiretaps terminated in 2002; however, in none of these cases was encryption reported to have prevented law enforcement officials from obtaining the plain text of communications intercepted. In addition, state and local jurisdictions reported that encryption was encountered in 18 wiretaps that were terminated in calendar year 2001 or earlier, but were reported for the first time in 2002; in none of these cases did encryption prevent access to the plain text of communications intercepted. Bruce Schneier, the noted cryptographer, deduces from the report that encryption of phone conversations (only encountered in sixteen out of 1,358 wiretaps, so very uncommon) is ineffective at concealing conversations. "Every time law enforcement encountered encryption, they were able to bypass it," Schneier writes. "I assume that local law enforcement agencies don't have the means to brute-force DES keys (for example). My guess is that the voice encryption was relatively easy to bypass," he adds. Schneier argues that the apparently weak security of secure phones is best explained by a lack of peer review. "Telephone security is a narrow field. Encrypted phones are expensive," he writes in Cryptogram, his excellent monthly newsletter. "Telephone encryption is closed from scrutiny; the software is not subject to peer review. It should come as no surprise that the result is a poor selection of expensive lousy telephone security products." Schneier extends his argument beyond the narrow confines of telephone security to criticise the closed security approach (hello TCPA!) in general. "This wiretapping report provides hard evidence that a closed security design methodology - the 'trust us because we know these things' way of building security products - doesn't work," he concludes. Æ 7354 From: Fernando Martins Date: Sun May 18, 2003 6:43am Subject: ifsec 2003 As fas as people here may know, any "must see/must check" at this year IFSEC? (19-22 May 2003 at the NEC, Birmingham, UK - http://www.ifsec.co.uk/ ) FM 7355 From: James M. Atkinson Date: Sun May 18, 2003 0:04pm Subject: Re: Secure phones no obstacle to wiretapping - US Govt It rather depends on the kind of phone you use, and where you get the phones. -jma At 12:38 PM +0100 5/18/03, Fernando Martins wrote: >http://www.theregister.com/content/55/30746.html > >Secure phones no obstacle to wiretapping - US Govt >By John Leyden >Posted: 16/05/2003 at 14:50 GMT > > >The use of so-called secure telephones presents almost no barrier to >wiretapping, according to official US government documents. > >This interesting revelation is contained in a recent report on Applications >for Orders Authorizing or Approving the Interception of Wire, Oral, or >Electronic Communications). > >The report (pages 10-11 of report or 8-9 of PDF) states: > >Public Law 106-197 amended 18 U.S.C. 2519(2)(b) in 2001 to require that >reporting should reflect the number of wiretap applications granted in which >encryption was encountered and whether such encryption prevented law >enforcement officials from obtaining the plain text of communications >intercepted pursuant to the court orders. > >In 2002, no federal wiretap reports indicated that encryption was >encountered. State and local jurisdictions reported that encryption was >encountered in 16 wiretaps terminated in 2002; however, in none of these >cases was encryption reported to have prevented law enforcement officials >from obtaining the plain text of communications intercepted. > >In addition, state and local jurisdictions reported that encryption was >encountered in 18 wiretaps that were terminated in calendar year 2001 or >earlier, but were reported for the first time in 2002; in none of these >cases did encryption prevent access to the plain text of communications >intercepted. > >Bruce Schneier, the noted cryptographer, deduces from the report that >encryption of phone conversations (only encountered in sixteen out of 1,358 >wiretaps, so very uncommon) is ineffective at concealing conversations. > >"Every time law enforcement encountered encryption, they were able to bypass >it," Schneier writes. > >"I assume that local law enforcement agencies don't have the means to >brute-force DES keys (for example). My guess is that the voice encryption >was relatively easy to bypass," he adds. > >Schneier argues that the apparently weak security of secure phones is best >explained by a lack of peer review. > >"Telephone security is a narrow field. Encrypted phones are expensive," he >writes in Cryptogram, his excellent monthly newsletter. > >"Telephone encryption is closed from scrutiny; the software is not subject >to peer review. It should come as no surprise that the result is a poor >selection of expensive lousy telephone security products." > >Schneier extends his argument beyond the narrow confines of telephone >security to criticise the closed security approach (hello TCPA!) in general. > >"This wiretapping report provides hard evidence that a closed security >design methodology - the 'trust us because we know these things' way of >building security products - doesn't work," he concludes. Æ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7356 From: Steve Uhrig Date: Sun May 18, 2003 0:23pm Subject: For the hams on the list Check this: http://users.tellurian.com/gjurrens/famous_hams.html There, I found this: http://www.qrz.com/detail/W6FZZ 101 years old? Still licensed and listed as current? Has an email address? Only has an Advanced class license? Interesting ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7357 From: Ulrich Litigation Support Date: Sun May 18, 2003 10:23pm Subject: Support our Veterans Brother Investigators: I recently became aware of an endeavor by Senator Bob Smith (R-NH ret) to provide for the well being of the families whose head of household (mother or father) was killed/wounded in combat. You may know that as a young boy Bob Smith buried his father, a combat pilot in WWII, at Arlington National Cemetery. In the recent Iraq campaign he was struck by the similarity of Tyler Jordan of Enfield, CT to his own state of affairs as a child. Tyler's father was not coming home alive from Iraq, as Senator Smith's father had not from WWII. Senator Smith was, according to Pentagon sources, "almost single-handedly responsible" for the Army and Marines having the resources to fight the Iraq campaign. Those same Sources reported that Senator Smith was the "driving force" behind the procurement and outfitting of the essential preposition ships (USNS) used by the Navy to get the material to the men in the field on time and ready to roll. Ok, for your Air Force guys, without Pease ANGB, in Portsmouth, NH who is going to refuel those flights across The Pond? It was Senator Smith that kept Pease alive to help defend this nation. During his hiatus from political life Senator Smith has created The American Patriot Foundation. This organization has applied for 501(c)3 IRS status as a charitable organization [meaning donations will be tax deductible]. This is not a political organization of any type, it is for our Veterans! The Mission Statement of the foundation is simple: "The American Patriot Foundation is a national non-profit organization dedicated to honoring the men and women of our Armed Forces by providing a helping hand to veterans of their surviving immediate family members with scholarships, job training, assistance with medical expenses and referral services." What better way to support our veterans? Bob Smith stood proudly for a strong defense, for our veterans and we should as well. Let us support this worthwhile endeavor to assist those who fought for us - our veterans. You can reach the foundation at PO Box 247, Manchester, NH 03054 for a pamphlet. You can contact me directly as well and I will send one to you by return mail. Jordan G. Ulery Secretary NHLI: Member LPDAM Licensed in NH & MA New Hampshire Notary Public www.ulrichinvestigations.com jordan@u... Outgoing Mail Scanned by Norton Anti-Virus CONFIDENTIALITY WARNING This Email contains information that is confidential, proprietary or otherwise protected and is for the addressee only It is protected by federal law. This message may contain privileged material and may not be shared, distributed or forwarded to any person or entity not the intended recipient. If you are not the intended receiver, return this message immediately. This message is the property of the sender alone. Attempts to intercept this message are in violation of 25 U.S.C. 2511. War is an ugly thing but not the ugliest of things; the decayed and degraded state of moral and patriotic feelings which thinks that nothing is worth war is much worse. A man who has nothing for which he is willing to fight, nothing which is more important than his own personal safety, is a miserable creature and has no chance of being free unless made and kept so by the exertions of better men than himself. --John Stuart Mill [Non-text portions of this message have been removed] 7358 From: Date: Fri May 16, 2003 7:30am Subject: Need help with cctv Guppy: I hope you mean rg-59 not rg-58. Here are some specs for you. RG59/U Max recommended cable length 750 feet/230 meteres, with amp 3,400 feet/1,035 meteres, conductor gauge 22 solid copper, nominal, DC resistance (Ohms/1000ft) 10.5 RG59 mini 200feet/61 meteres, with amp 800 feet/250 meteres, conductor gauge 20 solid copper 41.0 ohms per 1000ft. RG6/U 1500 feet/455 meteres with amp 4800feet/1465 meteres, 18 solid copper 6.5 ohms. RG11/U 1800 feet/550 meteres with amp 6500 feet/1980 meteres, 14 solid copper 1.24 ohms. I hope this helps. Also, take a look at twisted pair for tight spaces. Al [Non-text portions of this message have been removed] 7359 From: Thomas Shaddack Date: Fri May 16, 2003 2:57pm Subject: News: Agricultural co-op office bugged Transcribed/translated from local (Czech Republic) TV news: http://www.prima-televize.cz/tvarchiv/video/?video=888 An eavesdropping device was discovered in the office of the chairman of the agricultural co-operative Racetice in the Chomutov district. The bug was hidden in an extension adapter plugged into the wall. The eavesdropping device was discovered accidentally. The employees managed to tune into the current conversation in the office on their radio[1]. The chairman nor the police doesn't know how long the device was in operation. The formerly richest co-op in Chomutov area is now in problems and became subject of several lawsuits. [1] According to the news, a plain FM/AM radio receiver 7360 From: Does it matter Date: Sat May 17, 2003 9:31am Subject: Re: help with cctv Son't listen to Steve go and get one of those x-10 camera's that pop up all the time while you are on the net and just keep buying bigger extension cords for the base receiver. The dollar store has a sale on extension cords in the 5 foot variety and you shouldn't need that many for 1/4 mile runs. much cheaper this way and everyone knows that the x-10 cameras are the best cameras on the market today. --- In TSCM-L@yahoogroups.com, "Steve Uhrig" wrote: > On 14 May 2003 at 21:56, PGibson957@a... wrote: > > > Need help. Have been tasked with installing new CCTV system. "They" > > want to use existing coax (most RG 58U, 10 years old). Longest run > > 1/4+mile. Need formulas for loss at splices and distance. > > Any ten year old coax is shot. > > A thousand feet with good coax is pushing it. > > RG58 is 50 ohm coax used for antenna lines. Video prefers 75 ohm > coax, typically RG59 for jumpers or short runs, or RG6 or RG11 for > longer runs. > > Twisted pair/Cat 5 with modems has almost obsoleted coax. > www.atvresearch.com for materials other than cable. www.therfc.com > for coax or connectors or anything cable related. Very little coax is > used anymore except for jumpers. > > Don't take the job if you are not allowed to do it properly. > > Old coax is wrong. > > Long coax is wrong. > > Improper design and installation is wrong. > > Formulas are valid only for new, fresh coax. The minute you pull it > off the spool all bets are off. Loss through splices depends on the > quality of materials and workmanship, mostly workmanship. I recommend > nothing other than 3 piece crimp BNCs and strain relief boots. > www.therfc.com for connectors and tools. > > My strongest advice, having done video for a long long time, is to > get someone current, competent and qualified to design the job and > oversee its installation. Anything else and you're fooling yourself. > > That's the state of the onion. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* 7361 From: A.Lizard Date: Mon May 19, 2003 3:57am Subject: Re: Secure phones no obstacle to wiretapping - US Govt At 08:37 AM 5/19/03 +0000, you wrote: >Message: 3 > Date: Sun, 18 May 2003 13:04:18 -0400 > From: "James M. Atkinson" >Subject: Re: Secure phones no obstacle to wiretapping - US Govt > >It rather depends on the kind of phone you use, and where you get the phones. > >-jma What do you recommend that isn't only available to defense and other "qualified" companies? Actually, you could throw in the ones that *are* only available to defense / intel / etc. as well, I'm sure there are people on the list in a position to use those equipment sources who don't know what you do. A.Lizard A.Lizard ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -Benjamin Franklin, Historical Review of Pennsylvania, 1753 Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... PGP 8.0 key available by request or keyserver. Download PGP from http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html For new music, try http://www.eliangedeon.com ************************************************************************ 7362 From: MailExp Date: Fri May 16, 2003 4:40pm Subject: Toshiba Strategy Systems Can anyone offer up some info on a Toshiba Strategy Phone system? I have an older one on the bench, trying to see if it will function. I have the software but it is asking me for a password. Any idea on defaults or overrides? Thanks Ed O MultiPlex Services [Non-text portions of this message have been removed] 7363 From: James M. Atkinson Date: Tue May 20, 2003 10:21am Subject: Re: Secure phones no obstacle to wiretapping - US Govt The CSD-4100F is the best all around encrypted telephone, period. http://www.tscm.com/stu.html http://www.tscm.com/csd4100broch4.pdf It's the same model we sell to defense contractors, military, etc. The proper name is a "STU-III, Type 4" and it is appropriate for sensitive, but unclassified materials. It has a removable Cryptographic Ignition Key, and is simply the best-of-the-best. Very high quality, very high performance, and extremely secure. There is plenty of factory stock, and they are available for immediate shipment You can very quietly, and discretely order online, with a credit card at: http://www.graniteislandgroup.com/buycsdonline.html -jma At 1:57 AM -0700 5/19/03, A.Lizard wrote: >At 08:37 AM 5/19/03 +0000, you wrote: >>Message: 3 >> Date: Sun, 18 May 2003 13:04:18 -0400 >> From: "James M. Atkinson" >>Subject: Re: Secure phones no obstacle to wiretapping - US Govt >> >>It rather depends on the kind of phone you use, and where you get the phones. >> >>-jma > >What do you recommend that isn't only available to defense and other >"qualified" companies? > >Actually, you could throw in the ones that *are* only available to defense >/ intel / etc. as well, I'm sure there are people on the list in a position >to use those equipment sources who don't know what you do. > >A.Lizard -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7364 From: Steve Uhrig Date: Tue May 20, 2003 10:58am Subject: Re: Secure phones On 20 May 2003 at 11:21, James M. Atkinson wrote: > The CSD-4100F is the best all around encrypted telephone, period. > http://www.tscm.com/stu.html > http://www.tscm.com/csd4100broch4.pdf > It's the same model we sell to defense contractors, military, etc. The > proper name is a "STU-III, Type 4" If you can sell it, it's not a STU-III, period. STU-IIIs can be obtained ONLY by those in contract with a U.S. Government agency, after approval by NSA, and with NSA handling key control. Although it technically is possible under the law, I've never seen private ownership of a STU-III. All I've seen, and I've been around them since they were invented, were government-furnished equipment (GFE) or contractor purchased with government funds, but with ownership remaining with and possession reverting to the government at the termination of the contract or termination of need for the device. The facility where the STU-III is installed has to have a facility clearance, and users of the STU must have individual DOD clearances. Keys must be secured physically to DOD standards, which in itself is expensive. Key control requires a full time FSO (Facilities Security Officer). Certain aspects of key control for a STU-III require two man verification, which is a pain in the butt as I can state from having been one of them for a short while. While the product mentioned above may well be a very decent security device, and I have trusted and sold TCC gear (Technical Communications Corp, the manufacturer) for almost 20 years, it definitely is not a STU-III, or even a little brother to one. The last I heard, only three companies even were permitted to manufacture STU-IIIs, (AT&T, Motorola and a third I can't remember) and any potential for using them starts with a letter from the government mandating them for your government contract, approval from the NSA, and then a big package of documentation. None of those three companies worked through resellers, even when I had government contracts with secure billets. Sales are direct from the manufacturer to the contractor or government only. Everywhere I saw them, NSA personnel installed and commissioned the units. You're probably safe from nearly anyone with the device Jim mentioned above, but unless the world has done a complete 180 in the last few months, I just wanted to point out it is NOT a STU-III. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7365 From: James M. Atkinson Date: Tue May 20, 2003 11:35am Subject: Re: Secure phones The STU-III, Type 1, and Type 4 are both identical except for one chip. The basic difference, is that the NSA supplies the chip in a Type 1, and TCC/AT&T supplies the chip on a Type 4. Both have removable keys, both have identical circuit boards, identical cases, identical power supplies, identical headsets, and so on. Type 1 STU-III's require a COMSEC account number, Type 4's do not. Type 1's are used for classified materials, Type 4's are for "Unclassified, but Sensitive". Type 1's have a 9+ MONTH lead time, Type 4's have a 24 HOUR lead time. -jma At 11:58 AM -0400 5/20/03, Steve Uhrig wrote: >On 20 May 2003 at 11:21, James M. Atkinson wrote: > >> The CSD-4100F is the best all around encrypted telephone, period. > >> http://www.tscm.com/stu.html > >> http://www.tscm.com/csd4100broch4.pdf > >> It's the same model we sell to defense contractors, military, etc. The >> proper name is a "STU-III, Type 4" > >If you can sell it, it's not a STU-III, period. > >STU-IIIs can be obtained ONLY by those in contract with a U.S. >Government agency, after approval by NSA, and with NSA handling key >control. > >Although it technically is possible under the law, I've never seen >private ownership of a STU-III. All I've seen, and I've been around >them since they were invented, were government-furnished equipment >(GFE) or contractor purchased with government funds, but with >ownership remaining with and possession reverting to the government >at the termination of the contract or termination of need for the >device. > >The facility where the STU-III is installed has to have a facility >clearance, and users of the STU must have individual DOD clearances. >Keys must be secured physically to DOD standards, which in itself is >expensive. > >Key control requires a full time FSO (Facilities Security Officer). >Certain aspects of key control for a STU-III require two man >verification, which is a pain in the butt as I can state from having >been one of them for a short while. > >While the product mentioned above may well be a very decent security >device, and I have trusted and sold TCC gear (Technical >Communications Corp, the manufacturer) for almost 20 years, it >definitely is not a STU-III, or even a little brother to one. > >The last I heard, only three companies even were permitted to >manufacture STU-IIIs, (AT&T, Motorola and a third I can't remember) >and any potential for using them starts with a letter from the >government mandating them for your government contract, approval from >the NSA, and then a big package of documentation. None of those three >companies worked through resellers, even when I had government >contracts with secure billets. Sales are direct from the manufacturer >to the contractor or government only. Everywhere I saw them, NSA >personnel installed and commissioned the units. > >You're probably safe from nearly anyone with the device Jim mentioned >above, but unless the world has done a complete 180 in the last few >months, I just wanted to point out it is NOT a STU-III. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7366 From: A Grudko Date: Tue May 20, 2003 11:27am Subject: Re: News: Agricultural co-op office bugged - Original Message - > The employees > managed to tune into the current conversation in the office on their > radio[1]. > [1] According to the news, a plain FM/AM radio receiver The Cony 146 Mhz Xtal controlled FM bugs used to have strong mixer spuri at about 98 Mhz. Andy G Joburg 7367 From: Hawkspirit Date: Tue May 20, 2003 4:18pm Subject: Serious Equipment Time for some serious equipment!!! http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=3024673274&category=14957 7368 From: Mitch D Date: Tue May 20, 2003 9:04pm Subject: Re:Serious Equipment Sad enough,The wakka zappa 5000 displayed is the same piece of whatever which was on Display at ISC 2003 West. Yes, the same one that magically picked up a signal from my A500 samsung phone that was turned off during the demonstration. Gotta love "Spy Shop Physics" and E Bay, Perfect together..... __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com 7369 From: Charles Patterson Date: Tue May 20, 2003 9:51pm Subject: Re: Toshiba Strategy Systems The Stratagy is just the voicemail system, do you have a ksu with it? Charles ----- Original Message ----- From: "MailExp" To: Sent: Friday, May 16, 2003 5:40 PM Subject: [TSCM-L] Toshiba Strategy Systems > Can anyone offer up some info on a Toshiba Strategy Phone system? I have an > older one on the bench, trying to see if it will function. I have the > software but it is asking me for a password. Any idea on defaults or > overrides? > > Thanks > > Ed O > MultiPlex Services > > > > [Non-text portions of this message have been removed] > > > > Yahoo! Groups Sponsor > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 7370 From: Steve Uhrig Date: Wed May 21, 2003 11:56am Subject: Dan G. front and center Dan, all my mails to your different addresses bounce for various fatal reasons. Pse drop me a line with a good address when you get the current matter cleared up. Others, pse disregard. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7371 From: Thomas Shaddack Date: Tue May 20, 2003 10:20am Subject: Re: Re: Secure phones no obstacle to wiretapping - US Govt On Mon, 19 May 2003, A.Lizard wrote: > What do you recommend that isn't only available to defense and other > "qualified" companies? I would suggest a possible workaround: encrypted VoIP with open-source software. My favorite software for this purpose is SpeakFreely , namely its Linux version; for which I wrote a couple of patches related to improving the security of the encryption keys . The software is free, the source code is available for both security audit and modification to suit just about any purpose. A cheap Pentium board (Via makes some nice everything-on-one-motherboard PCs), a modem, leased line, DSL, or cable, and some additional software (which has to be written/configured) for maintaining connection to the ISP, traffic shaping (it can then double as a firewall/NAT box), eventually PPP client/server, so the box would be able to receive phone calls. With Linux as the operating system of such machine (which can boot from a read-only media, eg. a CD, for added security), the cost can be as low as (guesstimate) $300, maybe even lower. My patches make it easier to integrate it with some other software that will take care of authentication of the caller (for simplicity, I would suggest something based on OpenSSL, where the identity certificates are already solved and it'd be just the matter of few library calls) and generation and exchange of session keys. SpeakFreely has 128-bit IDEA, Blowfish, 128 and 256 bit AES, and DES encryption algorithms, and supports GSM, CELP, LPC, and LPC10 codecs. It uses its own protocol, and should be compatible (though I don't know if it supports encryption then) with RTP and VAT. You can also use VPN for VoIP calls. Even exotic setups are possible, like when my ISP temporarily blocked all UDP traffic above port 1023 because of a DoS attack in progress, and I had to set up a packet forwarder on other machine to which I had VPN access. This can be used as a kind of anonymizer of the calls, eg. if the other machine is in another jurisdiction. A good free VPN software is FreeS/WAN . Hope it will be useful for someone. :) 7372 From: ed Date: Tue May 20, 2003 5:36pm Subject: Feds bar cell phones at all ports of entry Feds bar cell phones at all ports of entry Inspector: Ban went into effect after congresswoman 'wigged out' Posted: May 20, 2003 1:00 a.m. Eastern By Paul Sperry © 2003 WorldNetDaily.com WASHINGTON The Homeland Security Department has barred border agents from carrying or using cell phones or pagers at federal inspection areas after a Democratic congresswoman complained about not being allowed to use her own cell phone at a major airport, officials tell WorldNetDaily. The ban on such telecommunication devices had been in effect for foreign travelers. Now it covers federal agents in both customs and immigration services. Rep. Jan Schakowsky, D-Ill. "Supervisors, inspectors, seniors and investigators are no longer allowed to wear or have cell phones and pagers while conducting inspections," a U.S. immigration inspector at Los Angeles International Airport told WorldNetDaily. "We are not allowed to keep them in our pockets or on our belts, and we are not allowed to use them while performing ship inspections or private aircraft inspections." The strict order, which took inspectors by surprise, was issued earlier this month in the form of a memo by the Homeland Security Department. "Supervisors have been assigned to daily check all inspectors for cell phones," the inspector said. "And disciplinary action will be taken against any inspector found to have a cell phone on their person or in their bags." He says the Bureau of Customs and Border Protection is not providing government cell phones for use on ships or private aircraft. "Headquarters has provided no reasons for this ban," which affects all inspectors at every port nationwide, he added. Asked about it, a Homeland Security Department spokesman explained that the ban is chiefly an internal security measure designed to prevent inspectors from colluding with immigrant smugglers, which has occurred at some major ports of entry in recent years. "There may be one bad inspector out of the thousands," said HSD spokesman Bill Anthony. "We want to make sure that nobody can use any kind of equipment to alert anybody in any of the lines as to what line they should go through." But another inspector claims the memo was triggered by a recent incident at O'Hare International Airport in Chicago involving U.S. Rep. Jan Schakowsky, D-Ill. "What happened is there was a congresswoman who came through our area and she pulled out her cell phone, and one of our guys told her, 'You know, you have to put that up,' and she wigged out, and she goes, 'I'm going to bring this to the floor of Congress,'" he said. "And that's what prompted the memo that nobody can have cell phones not even us." A spokesman for Schakowsky insists she was not rude, but merely inquired about the regulation after arriving at O'Hare from a trip abroad. "She vaguely remembers a conversation," said Schakowsky's spokesman, Nadeam Elshami. "She did not receive a satisfactory answer to why American citizens returning from abroad can't make a cell-phone call on American soil." He added: "Jan would never be abusive to any employee, but she wanted to look into the issue." 7373 From: allan ginsberg Date: Tue May 20, 2003 10:07pm Subject: Guess where the feds hid that GPS? After a wonderful and zealous hide and go seek game involving tearing apart all the plastic inside my ford ranger pickup in search of a GPS black box connected to an antennae....I realized the only possible place the feds could have put the GPS was--the factory Ford radio attached to the vehicle's antennae?!!!!...Pretty clever of old Uncle Sam to use the radio to sheild the GPS unit from prying eyes...and...this way the antennae is impossible to find since the fed GPS uses the vehicles's antennae! So I disconnected the antennae and wow...no more vehicular surveillance at 4:00 a.m.?!...imagine that? And a special thanks to all the people who responded off the discussion forum with great info that led me to the only logical conclusion left--the fed GPS is in the freaking Ford factory radio connected to the vehicular antennae. __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com 7374 From: Date: Wed May 21, 2003 5:49am Subject: New Guy Enters Arena Hi everybody, Have just joined the group and thought that I would introduce myself. I am Stephen J Beamon, known as Steve, I live near London England and retired from the Metropolitan Police service in December 2001, after 31 years service. My main role during that service was in counter terrorism and I ended up serving for a number of years in the Anti Terrorist Branch at New Scotland Yard. You may wonder what this all means in respect of TCSM...well as part of my counter terrorism work I was trained by the military and others to search for concealed munitions, missing persons etc.....I eventually was trained in TCSM carrying out a number of active searches utilising different equipment and procedures. I am no technocrat...more of a practical searcher so I look forward to hearing from you guys about some of the more technical aspects of the work. I have completed a number of assignments in the UK and Europe and look forward to many more. Best wishes Steve Principal Consultant Essen Jay Consulting PO Box 103 Aylesbury HP17 8WL United Kingdom Tel: +44(0)01296 435642 Mobile: +44(0)7949 521528 Email: enquiries@e... [Non-text portions of this message have been removed] 7375 From: Matthijs van der Wel Date: Thu May 22, 2003 3:21am Subject: Mini bug detector http://www.thinkgeek.com/gadgets/security/5a42/ Shhh...You know they're listening. Are you paranoid? Have good reason? The Mini Bug Detector offers protection against wireless microphones and transmitters. This device is perfect for securing homes, offices and hotel rooms. It has a LED signal strength display and audio tone that help pinpoint the precise location of bugs. The audio alarm can be turned off for discreet sweeps, while the sensitivity adjustment eliminates false alarms. The Mini Bug Detector features wide range circuitry that enables it to detect concealed transmitters operating on frequencies from 50 MHz to 3 GHz. The power to expose most high frequency transmitters, as well as more common VHF and UHF bugs, is now in the palm your hand. You were never paranoid...until they started coming after you... Weight: 10.5 oz. Dimensions: 5 1/2" x 3" x 7/8" Requires one 9-Volt battery (not included) Price: $99.99 7376 From: Ocean Group Date: Wed May 21, 2003 4:50pm Subject: Re: Secure Phones... Ha ha, play nice guys!! :) I'd say most of the encryption the US LEO boys came up against were basic inversion or rollover units bought in a spyshop etc(you know the deal)! Easy for any cop tech to record and analyse. Then play it back in all its glory on a 6:1 dolby surround system in the courthouse....! However as regards Jim's recommendation, I think otherwise: This is my opinion, I would rather take a bullet in the leg than recommend a US built encrypted phone unit to a European corporate customer. I'd sooner make them dish up the extra money to have encryption(using pulic source algo's) software made for a digital phone in the EU and then port it to hardware cheaply in Taiwan than buy a Motorola unit. The very fact that AT&T make the public unit would scare me from using it. These are the very guys that love escrow technology and are more than happy to jump in the sack with US Intell/Comms to help them keep an eye on their beloved corporate(er, sorry I mean terrorist! ;) data! Wasn't AT&T the guys that came up with the clipper escrow system....something like that? Anyway, the same is happening with Tetra...the supposed new eu leo radio system, no doubt there's twenty dozen US gov tech departments licking their lips with glee...they won't need CNN anymore for news. Schneider's right...there's no development being done in the area...shame really. But either way, the way the US comms companies are, I'd rather not spend people's money on rubbish. If you start making back doors into security software then you compromise the whole essence of it. It's like building a safe with two doors...sure, maybe the safe is still secure....but you just halved the security it once had. Then it's just a matter of time. Feel free to beat me down, Cheers Oisin _______________ Message: 7 Date: Tue, 20 May 2003 11:58:56 -0400 From: "Steve Uhrig" Subject: Re: Secure phones On 20 May 2003 at 11:21, James M. Atkinson wrote: > The CSD-4100F is the best all around encrypted telephone, period. > http://www.tscm.com/stu.html > http://www.tscm.com/csd4100broch4.pdf > It's the same model we sell to defense contractors, military, etc. The > proper name is a "STU-III, Type 4" If you can sell it, it's not a STU-III, period. 7377 From: Craig Snedden Date: Thu May 22, 2003 2:43am Subject: RE: Re: Secure phones Watch and dont try to use your STU in a room with an oscillating type fan in the ceiling..... Tried it once. Something in the particular frequency of the fan beats was being picked up by the mic in the STU, making the caller at our end sound as if he was already in secure and not pl.... Took us half the week to figure out why.... Klutzes that we were. :-) Rx this in the mail this morning & thought I should share it with the group: Craig A shepherd was herding his flock in a remote pasture when > suddenly a brand-new BMW advanced out of the dust cloud towards him. The > driver, a young man in a Broni suit, Gucci shoes, Ray Ban sunglasses > and YSL tie, leaned out the window and said to the shepherd, > > "If I tell you exactly how many sheep you have in your > flock, will you give me one?" > > The shepherd looked at the man, obviously a yuppie, then > looked at his peacefully-grazing flock and calmly answered, "Sure." > > The yuppie parked his car, whipped out his IBM Thinkpad and > connected it to a cell phone, then he surfed to a NASA page on the > Internet where he called up a GPS satellite navigation system, scanned the > area, and then opened up a database and an Excel spreadsheet with complex > formulas. He sent an email > on his Blackberry and, after a few minutes, received a response. Finally, > he prints out a 150 page report on his hi- tech, miniaturized > printer then turns to the shepherd and says, "You have exactly 1,586 > sheep". > > "That's correct, OK, take one of the sheep," said the > shepherd. > > He watches the young man select one of the animals and > bundle it into his car. Then the shepherd says: "If I can tell you exactly what > your business is, will you give me back my sheep?" > > "OK, why not," answered the young man. > > "Clearly, you are a consultant" said the shepherd. > > "That's correct," says the yuppie, "but how did you guess > that?" > > "No guessing required," answers the shepherd. "You turned up > here, although nobody called you. You want to get paid for an > answer I already knew, to a question I never asked, and you don't know crap > about my business..... Now give me back my dog". > --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.481 / Virus Database: 277 - Release Date: 13/05/2003 7378 From: Robert Dyk Date: Thu May 22, 2003 9:40am Subject: RE: Mini bug detector I hope the posting of this ad is an isolated event... I look forward to the exchange of useful information with the other professional members of this group. Can we keep the shameless solicitation for the sale of crap-tech out ? My two cents Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. > -----Original Message----- > From: Matthijs van der Wel [mailto:tscm@f...] > Sent: May 22, 2003 4:22 AM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Mini bug detector > > > http://www.thinkgeek.com/gadgets/security/5a42/ > > Shhh...You know they're listening. > > Are you paranoid? Have good reason? The Mini Bug Detector offers > protection against wireless microphones and transmitters. This device > is perfect for securing homes, offices and hotel rooms. It has a LED > signal strength display and audio tone that help pinpoint the precise > location of bugs. The audio alarm can be turned off for discreet > sweeps, while the sensitivity adjustment eliminates false alarms. > > The Mini Bug Detector features wide range circuitry that enables it > to detect concealed transmitters operating on frequencies from 50 MHz > to 3 GHz. The power to expose most high frequency transmitters, as > well as more common VHF and UHF bugs, is now in the palm your hand. > You were never paranoid...until they started coming after you... > > Weight: 10.5 oz. > Dimensions: 5 1/2" x 3" x 7/8" > Requires one 9-Volt battery (not included) > Price: $99.99 > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 7379 From: kondrak Date: Thu May 22, 2003 0:38pm Subject: RE: Mini bug detector I think its tongue in the cheek humor.... At 10:40 5/22/2003 -0400, you wrote: >I hope the posting of this ad is an isolated event... I look forward to the >exchange of useful information with the other professional members of this >group. Can we keep the shameless solicitation for the sale of crap-tech out >? 7380 From: Date: Thu May 22, 2003 9:24am Subject: GPS Hidden in the radio By that posting I understand that the GPS was hidden in the Ford radio and connected to the antenna ??? Or am I mistaken? Dave McGauley DEMTEC TSCM [Technical Surveillance and Countermeasures] David McGauley Demtec Electronic Surveillance and Counter Measures Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L39 0HF UK demtec@a... The manufacture and installation of custom made covert electronic audio and video devices Professional physical and electronic counter measures [sweep] services. [Non-text portions of this message have been removed] 7381 From: Mitch D Date: Thu May 22, 2003 5:23pm Subject: Re: Guess where the feds hid that GPS? I would hope that you could post some photos of your find on a site for us sounds interesting,and would more than likely be highly appreciated by members of the group. Thanks, MD --- allan ginsberg wrote: > After a wonderful and zealous hide and go seek game > involving tearing apart all the plastic inside my ford > ranger pickup in search of a GPS black box connected > to an antennae....I realized the only possible place > the feds could have put the GPS was--the factory Ford > radio attached to the vehicle's antennae?!!!!...Pretty > clever of old Uncle Sam to use the radio to sheild the > GPS unit from prying eyes...and...this way the > antennae is impossible to find since the fed GPS uses > the vehicles's antennae! > So I disconnected the antennae and wow...no more > vehicular surveillance at 4:00 a.m.?!...imagine that? > And a special thanks to all the people who > responded off the discussion forum with great info > that led me to the only logical conclusion left--the > fed GPS is in the freaking Ford factory radio > connected to the vehicular antennae. > > __________________________________ > Do you Yahoo!? > The New Yahoo! Search - Faster. Easier. Bingo. > http://search.yahoo.com > > __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com 7382 From: kondrak Date: Thu May 22, 2003 6:29pm Subject: Re: Guess where the feds hid that GPS? I for one would like to see it as well...a typical AM/FM whip isn't the best antenna for that freq range....I'm intrigued by its performance characteristics as well... At 15:23 5/22/2003 -0700, you wrote: >I would hope that you could post some photos of your find on a >site for us sounds interesting,and would more than likely be >highly appreciated by members of the group. >Thanks, >MD >--- allan ginsberg wrote: > > After a wonderful and zealous hide and go seek game > > involving tearing apart all the plastic inside my ford > > ranger pickup in search of a GPS black box connected > > to an antennae....I realized the only possible place > > the feds could have put the GPS was--the factory Ford > > radio attached to the vehicle's antennae?!!!!...Pretty > > clever of old Uncle Sam to use the radio to sheild the > > GPS unit from prying eyes...and...this way the > > antennae is impossible to find since the fed GPS uses > > the vehicles's antennae! > > So I disconnected the antennae and wow...no more > > vehicular surveillance at 4:00 a.m.?!...imagine that? > > And a special thanks to all the people who > > responded off the discussion forum with great info > > that led me to the only logical conclusion left--the > > fed GPS is in the freaking Ford factory radio > > connected to the vehicular antennae. > > > > __________________________________ > > Do you Yahoo!? > > The New Yahoo! Search - Faster. Easier. Bingo. > > http://search.yahoo.com > > > > > > >__________________________________ >Do you Yahoo!? >The New Yahoo! Search - Faster. Easier. Bingo. >http://search.yahoo.com > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS From: savanted1 Date: Tue May 18, 2004 11:15am Subject: Wiretap Reveals Terrorist Group by Roland Flamini Roland Flamini examines how one wiretapping leads to the arrest of terrorist suspects. http://www.upi.com/view.cfm?StoryID=20040510-034506-9384r 8657 From: kondrak Date: Wed May 19, 2004 2:01am Subject: G8 Summit Relies on Southern LINC for Communications > > >G8 Summit Relies on Southern LINC for Communications >Tuesday May 18, 9:58 am ET > >Southern LINC to Provide 450 Handsets and Service to G8 > >Summit Planning Committee > >ATLANTA--(BUSINESS WIRE)--May 18, 2004--Southern LINCÆ, the wireless >communications service from Southern Company (NYSE: SO - News), >announced today the G8 Summit Planning Committee will rely on the >company to provide a reliable communications solution. Southern LINC's >wireless communications solutions will keep hundreds of personnel >connected during the three-day summit, June 8-10, 2004, in Sea Island, >Ga. >The G8 Summit Planning Committee >has contracted for 450 handsets >and service to be used for the >international summit. In order to >ensure reliable coverage in the >coastal area, Southern LINC has >increased coverage and system >capacity in the region proving its >commitment to the G8 Summit >Planning Committee. The handsets >will be used by the Planning >Committee Ambassador, all >Directors, Deputy Directors, and >several hundred volunteers. > >"Southern LINC has become a vital >component of our overall Command >and Control Communications for the >G8 Summit," said Jim Ramsey, CIO of the G8 Summit Planning Committee. >"From day one all of the personnel within Southern LINC have been >professional, technically proficient and extremely helpful in supporting >my mission as the G8 CIO. All of the handsets will be deployed >throughout the G8 area of operations to coordinate all of the >operations, logistics, transportations, and many other critical aspects >for the G8 Summit Planning Committee." > >Southern LINC offers the G8 Summit Planning Committee multiple ways to >communicate. Committee members will be using Instant LINC(SM) two-way >radio to communicate to an individual or an entire group. In addition to >Instant LINC, the Committee will also use cellular phone, text messaging >and data services. All communications on the Southern LINC system are >inherently private, which means no known scanner can intercept >transmissions. > >"We are extremely honored that the G8 Summit Planning Committee is >relying on Southern LINC to ensure that hundreds of organizers are able >to communicate around the clock," said Bob Dawson, president and CEO of >Southern LINC. "We offer reliable communications solutions to a variety >of businesses, educational institutions, healthcare facilities, >government and public safety personnel, and we have the experience and >expertise to support the G8 Summit." > >About Southern LINC: > >Southern LINC, which stands for Long-range Integrated Network >Communications, covers 127,000 square miles in the Southeast, including >major metro and rural areas in Alabama, Georgia, southeastern >Mississippi and northwest Florida. Using Motorola's iDENÆ technology, >Southern LINC combines multiple communication services into one handset >or installed device including Instant LINC(SM) two-way radio, phone >service, 1-way and 2-way text messaging, wireless Internet access and >wireless data access. > >More information about Southern LINC can be obtained by calling >1-800-818-LINC >(5462) or visiting the Southern LINC Web site at www.southernlinc.com > >About Southern Company: > >With 4 million customers and nearly 39,000 megawatts of generating >capacity, Atlanta-based Southern Company (NYSE: SO - News) is the >premier super-regional energy company in the Southeast and a leading >U.S. producer of electricity. Southern Company owns electric utilities >in four states, a growing competitive generation company, an energy >services business and a competitive retail natural gas business, as well >as fiber optics and wireless communications. Southern Company brands are >known for excellent customer service, high rel iability and retail >electric prices that are 15 percent below the national average. Southern >Company has been named three consecutive years No. 1 on Fortune >magazine's "America's Most Admired Companies" list in the Electric and >Gas Utility industry. Southern Company has been ranked the nation's top >energy utility in the American Customer Satisfaction Index four years in >a row, and in the latest survey tied for the highest score among all >service industry companies. Southern Company has more than 500,000 >shareholders, making its common stock one of the most widely held in the >United States. Visit the Southern Company Web site at >www.southerncompany.com. > >About the G8 Summit > >The G8 Summit brings together the leaders of the world's major >industrial democracies: >Canada, France, Germany, Italy, Japan, Russia, the United Kingdom, and >the United States. The European Union also attends the G8 Summit, >represented by the President of the European Commission and the leader >of the country holding the Presidency of the European Council. At >previous Summits, leaders have discussed a wide range of international >economic, political, and security issues. > >Southern LINC and Instant LINC are salesmarks or registered trademarks >of Southern LINC. Motorola and iDEN are >trademarks or registered trademarks of Motorola, Inc. > >http://biz.yahoo.com/bw/040518/185623_1.html 8658 From: Date: Wed May 19, 2004 3:11am Subject: Wald was under electronic surveillance by a team of police Brooklyn man gets prison term for sexual abuse By JONATHAN BANDLER THE JOURNAL NEWS (Original publication: May 19, 2004) WHITE PLAINS ‚Äî A Brooklyn man who forced teenage girls to touch themselves during random obscene telephone calls apologized to his victims yesterday as he was sentenced to seven years in state prison. Philip Wald, a bipolar disorder sufferer whose family had tried for years to get him to stop his manic phone calling, said he needed treatment to help him understand why he does such things. "I do feel sorry for what happened," he told Westchester County Judge Joseph Alessandro, adding that he hoped "the victims and their families can at least get some kind of relaxed feeling that I'm locked away." Wald was miles from any of the victims and they were never in imminent danger when he made the phone calls during 2001 and 2002. But Assistant District Attorney Laura Murphy charged him with sexual abuse under the theory that he subjected the girls to physical contact they would not have engaged in otherwise, and his conviction was believed to be the first of that nature in New York state. The sexual abuse conviction will also force him to register as a sex offender when he is released from prison. Wald, 36, pleaded guilty to first-degree sexual abuse and first-degree coercion in February, admitting that he threatened six teenage girls if they would not take off their clothes or comply with sexual requests and that he was watching to see if they complied. The first victim was a 17-year-old New Castle girl in September 2001. He made similar calls to two 14-year-old New Castle girls, a 13-year-old Scarsdale girl, a 12-year-old Mamaroneck girl and a 15-year-old Pleasantville girl. Those were among the dozens of such calls he made from his home using prepaid phone cards. Some of the victims used call tracing techniques, which eventually helped detectives from those communities and investigators from the District Attorney's Office track him down. They were assisted by an employee of Cisco Systems, Dean DeLitta, who helped to analyze the complicated phone records. Wald was under electronic surveillance by a team of police led by New Castle Detective John D'Angelo and Mamaroneck Detective Thomas Gisin when he made a similar call on June 7 and they arrested him at his Bensonhurst apartment. Defense lawyer Clinton Calhoun said his client wanted to spare the girls from having to testify and that the most crucial thing for him was to get proper medical treatment in prison. Reach Jonathan Bandler at jbandler@t... or 914-694-3520. [Non-text portions of this message have been removed] 8659 From: Steve Uhrig Date: Wed May 19, 2004 9:32am Subject: Will BPL result in privacy issues? With the beginning of the ultimately-nationwide BPL rollout, I smell some potential for exploitation. BPL = Broadband over Power Lines. High speed web access via the power lines. Simply plug in a modem to any AC mains outlet and you'll be on the web with high speed. No phone line, no cable modem, no DSL, no satellite. Practically everywhere has at least power infrastructure. Will we start seeing Pac Rim bugs on ebay, camoflauged in cube outlet taps or power switches, or electrical outlets? A mic, a few SMD chips and its own I.P. address will make a cheap bug, and your listening post can be anywhere in the world. The high bandwidth would allow for streaming video as well as high fidelity audio. Since there will be data on all power lines anyway, we won't be able to just look for packets of data to see if we have a hostile device on the line. We'll have to decode them somehow. Who will be the first to develop a black box to plug in decode legit or clandestine data on the line, for TSCM applications? Here's a moneymaking opportunity for someone. I well admit it's way over my head. Specs on BPL are available widely on the web. ------ Everyone's thoughts? ------ Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8660 From: Ocean Group Date: Wed May 19, 2004 10:09am Subject: GCHQ FYI Those of you that get Sky News I would suggest keeping an eye out for the piece on GCHQ... They visit the old GCHQ building and show some of the old test rooms....truely remarkable.... Especially the floating room and the plastic room.... Any ideas why they'd use a room with absolutely no metal, even the wall bolts were plastic, the rest wood.... Regards --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.684 / Virus Database: 446 - Release Date: 13/05/2004 8661 From: Thomas Shaddack Date: Wed May 19, 2004 10:11am Subject: Re: Will BPL result in privacy issues? > Since there will be data on all power lines anyway, we won't be able > to just look for packets of data to see if we have a hostile device > on the line. We'll have to decode them somehow. > > Who will be the first to develop a black box to plug in decode legit > or clandestine data on the line, for TSCM applications? Not all that necessary. BPL is quite similar to a cable modem or a 10Base2 Ethernet (or a 10baseT with a dumb hub), in the aspect it broadcasts data into the cable shared with others. All the communication that happens on the segment is available to anybody who listens. The network card or the cable modem usually listens only to the packets addressed to its MAC address and to the Ethernet broadcast (and hands only such packets over to the computer), but many (most) cards can be put in so-called "promiscuous mode" and then they hear (and report to the computer) everything. (A note on the side: The dumb HUBs that receive a packet on one port and then echo it on every other port are dirt cheap today and are useful for debugging the behavior of computers; connect the hub between a computer and the LAN, connect a monitoring computer on other port of the HUB, and run a packet monitor on it that in promiscuous mode listens on the traffic between the watched computer and the LAN. A pocket-sized hub of this kind and a laptop are a good combination for a field tech. Such device can also be used as a low-cost solution if you want to watch the entire traffic between your server and the rest of the Internet, which can be important for security reasons - such "passive tap" can't be detected by the adversary, doesn't even have to have its own IP address or broadcast at all (which you can enforce by cutting the Tx pair), and can be used later to a post-mortem analysis of an eventual attack. An interesting device could be using a cheap PC with tcpdump-like program and a suitably big disk with a circular buffer for the traffic. Data there can be a security risk though, when stolen or subpoenaed, as it's de facto your own Carnivore box, but if this is a concern, they can be encrypted by a public key, so only the owner of the private key (which can be also split in m-of-n scheme between n people) can then recover the traffic when it becomes necessary. Some time ago I wrote a tcpdump-style tool (well... took a libpcap example program and hacked it up a bit) that takes the packets, isolates their content, decides if it's a binary mess or BASE64-encoded binary mess or a potentially legible text, and shows either the length and type of mess, or the text. Embarassingly trivial, and extremely useful for analysis of what's happening on the LAN or why somebody can't log on the server (just today used it to see a colleague has a wrong FTP password), and all kinds of problems that can manifest on the protocol level.) I suppose there will be BPL adapters that will be possible to configure in such way. It's fairly common feature of all network interfaces and its lack is likely to be perceived as a disadvantage than as a safety measure (because if even one vendor sells them, the people who know what it is for will get it). However, the adversary then can encrypt the data. Then we have to use traffic analysis methods. Then the adversary can use traffic balancing, sending the same amount of traffic whatever's happening on the inputs. (Which is both bad and good, because then we can try to find it by its activity, according to the rules for conducted signals. I hope I have it right here, as I am so far only theoretical in EM stuff.) Which returns the game back to the point of detecting sources of signals, tracking them down into the "physical world", and then identifying the devices themselves and deciding if their behavior is legitimate or not. 8662 From: Date: Wed May 19, 2004 6:51am Subject: Email address change Kindly change my Email address from AmcorIntl@c... to AmcorInternational@m... Thank you Al Kelly [Non-text portions of this message have been removed] 8663 From: Steve Uhrig Date: Wed May 19, 2004 4:25pm Subject: Anyone near Melbourne FL? Hi all, I need someone in or near the Melbourne, FL area sometime in the next few weeks to do an incredibly simple overt CCTV install. One camera, one analog timelapse machine, one monitor. Trying to catch and convict for the second time a lunatic neighbor vandalizing an auto in front of the residence. Installation is on a condominium. I am supplying some excess equipment to a friend, but he won't be there to install it. You'd deal with his wife directly, with me for full tech support backup via phone if needed, but I doubt it would be. I'm supplying everything down to the cable and tools. Anyone who can handle this please strobe me offlist and I'll put you in touch with the client. Tks ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8664 From: kondrak Date: Wed May 19, 2004 4:46pm Subject: Re: Will BPL result in privacy issues? Its already being worked on Steve...and countermeasures as well...bugging for voice will be inconsequential when one can capture every shard of personal data anywhere. Just imagine it as wiring the entire power grid to be one big bug. Privacy is only going to be an issue after the first big cases involving big-brother come to light. Think of it this way, setup a 2-80mhz carrier and let everything in the magnetic field modulate it. At 10:32 5/19/2004, you wrote: >With the beginning of the ultimately-nationwide BPL rollout, I smell >some potential for exploitation. > >BPL = Broadband over Power Lines. High speed web access via the power >lines. Simply plug in a modem to any AC mains outlet and you'll be on >the web with high speed. No phone line, no cable modem, no DSL, no >satellite. Practically everywhere has at least power infrastructure. > >Will we start seeing Pac Rim bugs on ebay, camoflauged in cube outlet >taps or power switches, or electrical outlets? A mic, a few SMD chips >and its own I.P. address will make a cheap bug, and your listening >post can be anywhere in the world. The high bandwidth would allow for >streaming video as well as high fidelity audio. > >Since there will be data on all power lines anyway, we won't be able >to just look for packets of data to see if we have a hostile device >on the line. We'll have to decode them somehow. > >Who will be the first to develop a black box to plug in decode legit >or clandestine data on the line, for TSCM applications? > >Here's a moneymaking opportunity for someone. I well admit it's way >over my head. > >Specs on BPL are available widely on the web. > >------ > >Everyone's thoughts? > >------ > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 8665 From: Steve Uhrig Date: Wed May 19, 2004 6:48pm Subject: Re: Will BPL result in privacy issues? Once upon a midnight dreary, kondrak pondered, weak and weary: > Its already being worked on Steve...and countermeasures as > well...bugging for voice will be inconsequential when one can capture > every shard of personal data anywhere. Just imagine it as wiring the > entire power grid to be one big bug. Privacy is only going to be an > issue after the first big cases involving big-brother come to light. > Think of it this way, setup a 2-80mhz carrier and let everything in > the magnetic field modulate it. Thanks all who replied both privately and on the list. I admit most of the technical details are over my head. Thomas S. has some very valuable insight as always. I think the matter may justify some proactive discussion, and developing procedures the common man (meaning a TSCM practitioner still living in an analog world) can use to identify a potential threat. Unless sensitive info may be shared, it would be the most beneficial if all the folks who took time to comment on the matter would echo their posts to the list. I'm asking the question but I suspect a few more than me would be interested in the benefit of others' experiences and observations. Too many replies on and off list to thank each individually, but please keep the topic alive. www.arrl.org has some videos of tests run. Not scientific and results wouldn't be much good in court, but they do demonstrate some of the potential for interference. The constant presence of data, though, I think may affect our work. Seeing data alone doesn't mean anything. Whether it's carrying intelligence it shouldn't is a different story. Obviously a few of you are well capable of disassembling the packets and analyzing them. Codifying that down to something the common man can grasp and ultimately implement on his own will be another task. Eschew obfuscation. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8666 From: Steve Weinert at Excel.Net Date: Wed May 19, 2004 7:10pm Subject: Re: GCHQ Have participated the construction of non-ferric buildings (all non-magnetic materials) and RF transparent buildings (Fiberglass beams, girders, bolts.....) Usually test and or monitoring facilities of some sort. Some were for high voltage reasons, and a couple for chemical reactivity reasons. Far from common, but less unique than one would think. Steve W ----- Original Message ----- > They visit the old GCHQ building and show some of the old test > rooms....truely remarkable.... > > Especially the floating room and the plastic room.... > > Any ideas why they'd use a room with absolutely no metal, even the wall > bolts were plastic, the rest wood.... 8667 From: Steve Weinert at Excel.Net Date: Wed May 19, 2004 7:22pm Subject: Re: Will BPL result in privacy issues? Steve, I think your concerns that BPL is loosey-goosey security-wise are very valid. Stand-off equipment can usually capture the signals at some distance, and the techniques used for "protection" appear rather modest. Most clients with any BPL on their mains will have difficulty separating out or even discovering any piggy-backed datastreams for legit or illicit data collections. Where did all the concern that lead to mains power isolation exercises suddenly get set aside to allow digital carriers unfettered two-way over power services? Makes mockery of the large rotary sets put in to isolate the wave form and anything it carried from the outside world that organizations had used as a privacy/security measure. Another area of concern is radio based remote-read meters for utilities that are becoming popular with communities looking to reduce manning costs for electrical, gas and water meter reading. Many of these systems have huge additional bandwidth available to them. Some talk about selling this bandwidth to business and home consumers, but again the potential for "buggy" uses can't be discounted. Who would think that your water meter might be collecting your email, compressing it, and squirting packets of collected data to a remote collector? Interesting area, and one that needs consideration in securing a site where BPL or remote meter reading is in place. Steve W ----- Original Message ----- > Date: Wed, 19 May 2004 10:32:03 -0400 > From: "Steve Uhrig" > Subject: Will BPL result in privacy issues? > > With the beginning of the ultimately-nationwide BPL rollout, I smell > some potential for exploitation. > 8668 From: James M. Atkinson Date: Wed May 19, 2004 8:33pm Subject: American gentleman arrived in Paris American gentleman arrived in Paris The elderly American gentleman arrived in Paris by plane. At French Customs, he fumbled for his passport. "You have been to France before, monsieur?" the customs officer asked sarcastically. The old gent admitted that he had been to France previously. "Then, you should know enough to have your passport ready for inspection." The American said, "The last time I was here, I didn't have to show it." "Impossible. You Americans always have to show your passports on arrival in France!" The American senior gave the Frenchman a long hard look. Then he quietly explained. "Well, when I came ashore at Omaha Beach on D-Day in '44, I couldn't find any Frenchmen to show it to. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8669 From: James M. Atkinson Date: Wed May 19, 2004 9:01pm Subject: Re: GCHQ A "Dielectric Room" is commonly used in EMI/EMC studies where metallic or semi-metallic isolation is required. This is the same reason we use a Teflon isolator or stand-off on TSCM antenna's as we do not want to effect the field we are trying to measure. -jma At 11:09 AM 5/19/2004, Ocean Group wrote: >FYI > >Those of you that get Sky News I would suggest keeping an eye out for the >piece on GCHQ... > >They visit the old GCHQ building and show some of the old test >rooms....truely remarkable.... > >Especially the floating room and the plastic room.... > >Any ideas why they'd use a room with absolutely no metal, even the wall >bolts were plastic, the rest wood.... > >Regards > >--- >Outgoing mail is certified Virus Free. >Checked by AVG anti-virus system (http://www.grisoft.com). >Version: 6.0.684 / Virus Database: 446 - Release Date: 13/05/2004 > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8670 From: James M. Atkinson Date: Wed May 19, 2004 10:34pm Subject: Superscout Repairs and Modifications If you have an old FXR/Microlab Superscout NLJD and would like to have it repaired, re-calibrated, or tested for proper operation let me know as I now offer this service, and can turn the instrument around to you in about 10 working days, and at minimal cost. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8671 From: Peter McCollum Date: Wed May 19, 2004 9:17pm Subject: introduction Hi all, I just joined the list at the suggestion of Jay Coote. I am an amateur historian/researcher on the topic of "clandestine radios" (i.e. spy radios). It is all 'vintage' information - nothing modern. My research is documented at www.militaryradio.com/spyradio/ . There is a "chapter" related to surveillance gear at www.militaryradio.com/spyradio/tsd.html -- the main item there is a CIA-made ST-2A transmitter from about 1957. I'm sure that many of you folks know all about this, but: I recently learned about "non-linear junction detectors". I think I can guess the general way it works, but I'd be interested in some details. Regards, Pete 8672 From: Steve Uhrig Date: Wed May 19, 2004 11:09pm Subject: Nonlins Once upon a midnight dreary, Peter McCollum pondered, weak and weary: > I'm sure that many of you folks know all about this, but: > I recently learned about "non-linear junction detectors". I think I > can guess the general way it works, but I'd be interested in some > details. Read the list archives on the website. Nearly everything which can be said about the things has been said. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8673 From: David Alexander Date: Thu May 20, 2004 1:05am Subject: RE: GCHQ non-ferric buildings Another use for structures of this kind is to house Nuclear Magnetic Resonance (NMR) scanners. They generate magnetic fields up to 10,000 Gauss (1 Tesla, I think) and that has an affect on any ferrous metal, so they tend to do without them.... David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: Steve Weinert at Excel.Net [mailto:srw@e...] Sent: 20 May 2004 01:11 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] GCHQ Have participated the construction of non-ferric buildings (all non-magnetic materials) and RF transparent buildings (Fiberglass beams, girders, bolts.....) Usually test and or monitoring facilities of some sort. Some were for high voltage reasons, and a couple for chemical reactivity reasons. Far from common, but less unique than one would think. Steve W ----- Original Message ----- > They visit the old GCHQ building and show some of the old test > rooms....truely remarkable.... > > Especially the floating room and the plastic room.... > > Any ideas why they'd use a room with absolutely no metal, even the wall > bolts were plastic, the rest wood.... ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8674 From: Hawkspirit Date: Thu May 20, 2004 10:55am Subject: RE: Telco Sweeps... The tap was implemented using all existing wire. The telephone lines came in on coax multiplexed in with television channels and internet service. This is why the bridge that they placed was on the output side of the digital service unit bridging across the analog telephone feed. "Block" in my usage was a normal city street in length. Roger Tolces www.bugsweeps.com Date: Mon, 17 May 2004 17:43:19 +0100 From: Ocean Group Subject: RE: Telco Sweeps... Roger Was the telecom system wired using co-ax or was that an unauthorised addition? If that is the install, I presume it operates the same as a standard twisted pair.....why use co-ax...? What kind of telco systems are used over there in the US? In that, here we've got pots and isdn as the most used, however corporate wise you'll start to see VOIP. What's a "block" in engineering terms? Cheers Ois [Non-text portions of this message have been removed] 8675 From: Date: Thu May 20, 2004 7:03am Subject: Child-porn probe used first live Internet wiretap Child-porn probe used first live Internet wiretap By Sam Stanton and Denny Walsh -- Bee Staff Writers - (Published May 20, 2004) Every time Jason Heath Morgan sat down in his Chico apartment and tapped a key on his computer, the law was watching. For more than three weeks, every Web site, every e-mail, every photo image, every chat room conversation he viewed or took part in was scrutinized, as the 26-year-old Morgan unwittingly became the first person in the United States to have his Internet usage monitored live by federal agents probing child pornography under a new law. Wednesday, as federal and state officers involved in the probe were honored for their efforts in Washington, D.C., fallout from the case continued. Agents are tracking 1,700 e-mail and chat-room users Morgan allegedly was in contact with as part of a massive child-pornography ring. Suspects in Live Oak, Las Vegas and Stockton have been arrested based on leads from the wiretap evidence. And although civil libertarians have raised concerns about other government efforts to monitor personal computer use, this law, passed in the shadow of the Bush administration's highly publicized USA Patriot Act, so far has attracted little opposition. "It's a noble thing," said Ronald Wilczynski, the Sacramento FBI agent overseeing the probe. "These kinds of investigations involve a child someplace." For now, the Sacramento case marks the only use of the new surveillance authority. But the investigation and its unprecedented use of a real-time Internet wiretap is being heralded by law enforcement officials and children's advocates alike. At a ceremony Wednesday in the Dirksen Senate Office Building, U.S. Sen. Barbara Boxer, D-Calif., presented an award from the National Center for Missing and Exploited Children to Sacramento-based authorities involved in the case. Assistant U.S. Attorney Laurel White, FBI special agent Reginald K. Ogata and state Department of Justice special agent Jeff Mackanin were among those honored for their efforts. "This was the first time such authority was granted," said McGregor Scott, the U.S. attorney in Sacramento, who attended the ceremony. "What we did here was in real-time follow this guy as he's entering chat rooms or exchanging information." Morgan pleaded not guilty to child pornography charges and remains in federal custody. Based on wiretap information, he was also charged in Butte County with multiple sex crimes against children. Morgan came to the attention of law enforcement last year as he allegedly cruised chat rooms frequented by suspected pedophiles. Undercover agents from the California Department of Justice were in a chat room, one of them posing as a person seeking information on how to have sex with a young girl and boy in his care. "He (Morgan) was going to train them on how to perform sex, that's what he thought he was doing with the undercover agent," Wilczynski said. "But he was very cagey with us." Frequently, pedophiles try to detect undercover agents by asking that they e-mail child pornography or take part in acts that the officers cannot legally perform. "He was very cagey with these litmus tests, and would say, 'Send me some pornography,' " Wilczynski said. "Of course, they couldn't do that. "They could see he was very active (on the Internet) but he wouldn't do the dance with law enforcement." Previously, agents would have had limited ability to go after Morgan, other than obtaining a search warrant for his computer and its contents. But, a federal law passed in April 2003 provided a new option. The PROTECT Act - officially Prosecutorial Remedies and Other Tools to End the Exploitation of Children Today - gave authorities the right to tap into a suspect's computer to catch child abusers, including Internet pornographers. Most of the publicity generated by the act has focused on provisions that increased penalties for child abusers and took much of the sentencing discretion out of the hands of federal trial judges. When Sacramento agents made their request in August 2003, the wiretap provision had not yet been used, and authorities had to convince a federal judge to grant the authority. "This is the technique of last resort," Wilczynski said. "You have to articulate and say all these other things won't work, therefore we want to go and do an interception." The court order was granted, with a requirement that two groups of agents be involved in monitoring Morgan. The first scrutinized his computer use and culled out everything not related to the investigation. The rest was turned over to the second team. Technology used in the surveillance is very similar to a phone tap. Agents attached a monitoring device to Morgan's phone line, then tracked his Internet activity from remote computers. With the wiretap in place, "it doesn't matter who you're dealing with, we're standing over the top of you watching everything that's going on," Wilczynski said. And, with Morgan, there was plenty to see, officials said. "There were almost 1,700 people intercepted," Wilczynski said. "We just got one case outside of California, where the agents went up to a guy's house and did a 'knock and talk' and he said, 'I was expecting you.'" Others snared through the wiretap include Tim Weintraut, 37, of Las Vegas; John Palmer, 35, of Live Oak; and Frank Lagomarsino, 28, of Stockton. Weintraut and Palmer have pleaded guilty and agreed to cooperate. Lagomarsino has pleaded not guilty and is awaiting trial. Officials say Morgan's arrest last September was as routine as such cases can be. Agents staked out his apartment, waited until he left to go to a convenience market for a soft drink and confronted him when he returned. "There was nothing remarkable, we just met him at the front of the apartment and said, 'This is what we're about,'" Wilczynski said. "They had some discussion and entered his apartment. "His machine was on, and on his screen was one of the chat rooms we'd been seeing." About the Writer --------------------------- The Bee's Sam Stanton can be reached at (916) 321-1091 or sstanton@s... . Web chat Lt. Bob Lozito, operations commander for the Sacramento Valley Hi-Tech Crimes Task Force, and Deputy Attorney General Robert Morgester will answer reader questions about computer crime in a live Web chat June 17 on sacbee.com. Post your questions by visiting http://forums.sacbee.com/computer_crimes. [Non-text portions of this message have been removed] 8676 From: Hawkspirit Date: Thu May 20, 2004 0:31pm Subject: Historical devices _____ Peter I think you might like to look at some of the TSCM historical articles on my website, they picture many old devices. Roger http://www.bugsweeps.com/info/index.html Look at this one http://www.bugsweeps.com/info/telephone_taps.html Roger Tolces Date: Wed, 19 May 2004 20:17:11 -0600 From: "Peter McCollum" Subject: introduction Hi all, I just joined the list at the suggestion of Jay Coote. I am an amateur historian/researcher on the topic of "clandestine radios" (i.e. spy radios). It is all 'vintage' information - nothing modern. My research is documented at www.militaryradio.com/spyradio/ . There is a "chapter" related to surveillance gear at www.militaryradio.com/spyradio/tsd.html -- the main item there is a CIA-made ST-2A transmitter from about 1957. I'm sure that many of you folks know all about this, but: I recently learned about "non-linear junction detectors". I think I can guess the general way it works, but I'd be interested in some details. Regards, Pete [Non-text portions of this message have been removed] 8677 From: Steve Uhrig Date: Thu May 20, 2004 0:51pm Subject: Mr. Fulford only, in FL Please mail me off list regarding your order. I misplaced your contact info. All others ignore. Tks .. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8678 From: Ocean Group Date: Thu May 20, 2004 1:19pm Subject: RE: Di-electric Room Jim I don't understand what you mean by di-electric room in regards to signals activity. How would metallic isolation be achieved by using a plastic room and subsequently how does that transpose into an application...? A teflon or otherwise RF Isolator can reduce the amount of RF radiating from coax feeding an antenna and stray RF can result in a loss of radiated power from the antenna, which will lead to a reduction in signal strength, which is obviously important for low power applications..... Therefore making the room act as a dielectric, it acts as an insulation layer between the conductor within the building (the test device...) and .......what...? The outer world....freespace.....what acts as the conductor on the other side....(other than air propagation, am I looking for a metallic conductor)... Appreciate any enlightment.... All the best Ois *********************** Message: 4 Date: Wed, 19 May 2004 22:01:00 -0400 From: "James M. Atkinson" Subject: Re: GCHQ A "Dielectric Room" is commonly used in EMI/EMC studies where metallic or semi-metallic isolation is required. This is the same reason we use a Teflon isolator or stand-off on TSCM antenna's as we do not want to effect the field we are trying to measure. -jma --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.684 / Virus Database: 446 - Release Date: 13/05/2004 8679 From: Ocean Group Date: Thu May 20, 2004 1:26pm Subject: RE: Telco Sweeps... Hi Roger Is the phone data running on the cable tv lines...I presume this is one of these services where you get phone, net and tv from your cable tv provider. In that case surely the line would be digital, therefore if your services are multiplexed into the house then their must be an additional decoder box within the house, what was the purpose of the unit outside the house, apart from acting as a junction box. How was the analogue line that was connected to the RF tx connect to the exterior junction box if the data is digital and multiplexed...was their an analogue port just for the phone line at the exterior connection box...? Regards Ois PS. How long is an average piece of string...? *************** Message: 9 Date: Thu, 20 May 2004 08:55:27 -0700 From: "Hawkspirit" Subject: RE: Telco Sweeps... The tap was implemented using all existing wire. The telephone lines came in on coax multiplexed in with television channels and internet service. This is why the bridge that they placed was on the output side of the digital service unit bridging across the analog telephone feed. "Block" in my usage was a normal city street in length. Roger Tolces www.bugsweeps.com --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.684 / Virus Database: 446 - Release Date: 13/05/2004 8680 From: Ocean Group Date: Thu May 20, 2004 4:06pm Subject: Courses for potential sweepers.... Someone was just commenting on the greatness of ARRL courses and how they are great value for money etc on another newsgroup.... Would I be write in saying that potential sweepers would be better off doing these ARRL courses instead of signing up for often expensive and useless 2-3 day TSCM commercial courses found in the US.... Present company excluded naturally... Anyone could any thoughts or opinions on this...Steve? Regards Ois --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.684 / Virus Database: 446 - Release Date: 13/05/2004 8681 From: Steve Uhrig Date: Thu May 20, 2004 5:28pm Subject: Re: Courses for potential sweepers.... Once upon a midnight dreary, Ocean Group pondered, weak and weary: > Someone was just commenting on the greatness of ARRL courses and how > they are great value for money etc on another newsgroup.... Yes, if you are interested in formal amateur traffic handling for volunteering your services in times of emergency, as backup communications support. The ARRL is pushing the Emergency Communications course heavily. My own ham club list has had a thread for a few days on it. ARRL courses are very vertical and presume one already is licensed and has proven their knowledge of basic electronics and communications theory and practice. My personal feeling is that presumption would not necessarily apply to many members of this list. And I don't think there's enough of a crossover to bother with the ARRL courses. If one is a ham and interested in developing his skills to volunteer during disasters, it may be worth the USD $75 or $45 depending on whether you're a member or not. www.arrl.org for info. Note I have not been an ARRL member since the early 1970s. > Would I be write in saying that potential sweepers would be better off > doing these ARRL courses instead of signing up for often expensive and > useless 2-3 day TSCM commercial courses found in the US.... I don't think the ARRL courses will be of any significant benefit to TSCMers. Amateur radio, by definition is amateur. Not professional. In fact, doing any amateur-related service for compensation specifically is prohibited by law. TSCM should be professional. *Should* be. Professionals make money at what they do. That criteria alone also eliminates the majority of people pretending to be active in TSCM. However, I agree with you on the commercial courses offered in the U.S. Having audited some of them, I feel it was a waste of time and virtually always was a thinly disguised sales pitch for the equipment peddled by the person offering the course. One could buy the equipment on their own, cheaper, from the same source, but the psychological pressure to buy from the instructor or school nearly is irresistable. I think I surprised some and broke their perfect record of selling gear to students. I don't have any other suggestions on specific quality private sector training for TSCM. In my opinion, there isn't any in the U.S. of which I am aware. I automatically eliminate any courses offered by manufacturers of equipment as you are paying your money to be given a sales pitch regardless of any claims to the contrary. You are trained on that manufacturer's gear, and you WILL buy it. Audio Intelligence Devices' National Intelligence Academy (AID/NIA) trained students on their equipment and thus had a virtual lock on the surveillance equipment market worldwide until they went under. They could have given away their training and considered it a marketing expense for their products. Govenrment training is being phased out, but that's insignificant unless you're employed by a government agency who will feed and water you and spend the money to train you. The few independent training courses I've seen peddled make a big splash then quietly disappear and never are conducted. This leads me to believe there isn't enough *genuine* interest in private sector training to support the infrastructure necessary to set them up. I had considered it to offer myself, and found there is a huge difference between people who claim they're interested and people who be willing to commit and actually spend money. Also, there is the credibility issue. Unless training is offered by a recognized and reputable institution (Bob Gruber are you listening?), it means little. Reputable means in the minds of others, not just in the mind of the person conducting the training! Recently there was a decent thread started by a gentleman preparing for a U.S. government career which will involve him in TSCM. The advice from several contributors was right on target. Off the top of my head, I would guess 75% of training in prep for TSCM should be general electronics and communications, NOT TSCM-specific. Other training would not be TSCM-specific either but would include some investigative training, English classes and *how to write a decent report* being among them. However, those classes are not glamourous, so they're neither offered nor sought. If I offered TSCM training, I'd emphasize the business side of things and the ability to communicate issue. Those skills are far too scarce in the profession. My impression is far too many people want to run before they can walk, and FAR FAR too many people start by buying equipment way before they're ready to do so. Get the training first, then the toys later. Having the violin does not make you the musician. Soapbox mode Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8682 From: Steve Weinert Date: Thu May 20, 2004 8:55pm Subject: Re: Courses for potential sweepers.... --- In TSCM-L@yahoogroups.com, "Steve Uhrig" wrote: > Once upon a midnight dreary, Ocean Group pondered, weak and weary: > > > Someone was just commenting on the greatness of ARRL courses and how > > they are great value for money etc on another newsgroup.... > > Yes, if you are interested in formal amateur traffic handling for > volunteering your services in times of emergency, as backup > communications support. The ARRL is pushing the Emergency > Communications course heavily. My own ham club list has had a thread > for a few days on it. > > ARRL courses are very vertical and presume one already is licensed > and has proven their knowledge of basic electronics and > communications theory and practice. > > My personal feeling is that presumption would not necessarily apply > to many members of this list. As a list member who has taken several of the ARRL CCE courses I 100% agree. The focus of these courses is either technical (modest level, excepting the antenna design theory course which appears intense) or administrative-procedure focused. They are decent enough courses for what they are, but in no specific sense are they TSCM targeted. > If I offered TSCM training, I'd emphasize the business side of things > and the ability to communicate issue. Those skills are far too scarce > in the profession. Actually Steve those skills are far to scarce in most professions. Attitude and communications skills seem to be innate requirements, usually the rest can be mentored or trained into the apprentice. Steve W 8683 From: Steve Weinert Date: Thu May 20, 2004 9:05pm Subject: Re: GCHQ non-ferric buildings The last couple medical examination level MRI/NRM/CAT/Scan-of-week facilities we participated in seemed to have somewhat relaxed requirements on ferrous metal contant and placement. The concern that nothing ferrous moves or is intermitantly grounded (which can act as a simple signal generation circuit) was still a focus. Has anyone else seen the systems that use lasers & targets on a structure to monitor vibrations & deflections? Used in coarse modes to monitor tankage, retaining walls, floor/roof loadings, structural system loadings, airpressure differential on large glazed structures, and so on, some of the systems appear to have the potential for exploitation in the TSCM sense. Steve W --- In TSCM-L@yahoogroups.com, "David Alexander" wrote: > Another use for structures of this kind is to house Nuclear Magnetic > Resonance (NMR) scanners. They generate magnetic fields up to 10,000 Gauss > (1 Tesla, I think) and that has an affect on any ferrous metal, so they tend > to do without them.... > 8684 From: Steve Uhrig Date: Thu May 20, 2004 9:27pm Subject: Re: GCHQ non-ferric buildings At one government agency where I worked, we had on a remote area of post a decent sized facility made completely of wood. It was about the size of a 2 story house. There was ZERO metal used in construction. Skylights provided illumination and of course the building could be used in daytime only. It was used for calibrating extremely sensitive transducers and related sensors used in intelligence applications. Workers there wore cotton jumpsuits and no jewelry. When the tests actually were being conducted, no one was in the building. The ground for perhaps 20 meters around the building was kept bare of vegetation with herbicides and had gravel laid. A fiberglass fence surrounded the building outside the cleared perimeter. Travel in was via golf cart only. We had a bit of an argument with the safety people over not having fire extinguishers in the building. Especially being wood, in a remote area and usually unmanned, it was a legitimate concern. Apparently national security won out over the safety concerns as I never saw extinguishers in there. This was back in the mid 1970s. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8685 From: Date: Fri May 21, 2004 2:40pm Subject: Folcroft Borough Police Dept. Bugged - 2 articles Folcroft Borough Police Dept. Bugged May 20, 2004 ‚Äî The DA's office is trying to figure out who planted the recording device inside the police department, what they were looking for and why. Tiny pin holes and wires were coming out of them. They mark the spots where investigators discovered and dismantled an elaborate network of hidden cameras and recording devices. They were concealed in smoke detectors and emergency lights. Investigators say for years the cameras recorded the action of the Folcroft Borough police force inside their own headquarters. Officers had heard rumors that they were being watched by borough bosses. A few months ago the police chief decided to put the rumors about the police department being bugged to rest, so he hired a private investigator to sweep the building. According to court documents, that investigators found recording devices in the evidence room the squad room and the hallway. The chief decided to go to the district attorney. On Tuesday night, the D-A's office did another search. This time, they found even more cameras, including one in the locker room where officers, including the department only female, change their clothes. The court documents suggest employees suspect two borough officials have something to do with the bugs, but so far no one is named as a suspect and no arrests have been made. Employees are watching their backs. The DA traced the equipment to a private investigative outfit in Chester County. The DA's office found invoices that indicate the firm charged the borough nearly $4000 to carry out the surveillance work. But who hired the firm and why is not known. http://abclocal.go.com/wpvi/news/052004_nw_folcroftcameras.html Recording Equipment Discovered In Folcroft Borough Hall Police: Women Were Videotaped While Dressing POSTED: 12:18 am EDT May 21, 2004 UPDATED: 12:48 am EDT May 21, 2004 FOLCROFT BOROUGH, Pa. -- Secret video and audio recordings have been discovered inside the Folcroft Borough Hall in Delaware County, and cameras and microphones were even found in rooms where women undress. Police said they discovered they were being spied on one year ago, so they set up their own surveillance equipment to determine why anyone would do it. Now, the case is in the hands of the Delaware County district attorney's office. The equipment reportedly appeared shortly after 26-year-old Folcroft Police Officer Leslie McLean was hired. She said she is devastated that someone videotaped her dressing. Other hidden cameras and recording equipment were found in the building, police said Two tapes dating back as far as 2002 and a VCR were seized from the old office of one of the suspects, which he used while serving as district judge, police said. Police said they also discovered bills showing that the borough purchased the surveillance equipment for $4,000. No charges have been filed in this case, and no arrests have been made. http://www.nbc10.com/news/3330052/detail.html From: James M. Atkinson, Comm-Eng Date: Sun May 21, 2000 7:16am Subject: Israeli spies tapped Clinton E-mail || Subject: [ISN] Israeli spies tapped Clinton e-mail | | | http://www.the-times.co.uk/news/pages/sti/2000/05/21/stifgnusa02003.html | | May 21st, 2000 | | MORE than 20 years of Israeli spying operations in Washington | culminated in the interception of e-mails from President Bill Clinton, | intelligence sources claimed last week. | | The revelations come at a sensitive time as Ehud Barak, the Israeli | prime minister, is ex-pected to fly to Washington today for talks with | Clinton about the Middle East peace process. | | The latest spying operation is said to have taken place in 1998 while | Benjamin Netanyahu was Israel's prime minister. According to the | sources, it entailed hacking into White House computer systems during | intense speculation about the direction of the peace process. | | Sources in Israel say intelligence agents infiltrated Telrad, a | company that had been subcontracted by Nortel, America's largest | telecommunications conglomerate, to help develop a communications | system for the White House. | | Company managers were said to have been unaware that virtually | undetectable chips installed during manufacture made it possible for | outside agents to tap into the flow of data from the White House. | | Information being sent from the president to his senior staff in the | National Security Council and outside government departments could be | copied into a secret Israeli computer in Washington, the sources said. | It was transferred to Tel Aviv two or three times a week. | | One opportunity for Israeli agents to mount the operation arose when | Nortel, Telrad and another firm won a 33m contract to replace | communications equipment for the Israeli air force. Members of the air | force were allowed access to manufacturing areas as a result. | | Company and White House Officials last week denied any knowledge of | the intelligence operation. "We have no information that our phone | system has been compromised," said Jake Siewert, the deputy White | House press secretary. | | An Israeli government official said that Mossad, the country's | intelligence service, was banned from conducting illicit surveillance | in America. "Spying on the US is out of the question," he said. | | However, the FBI has conducted a highly classified investigation into | previous claims that Israeli intelligence has breached White House | security. | | The inquiry was revealed earlier this month by the Washington Times | Insight magazine, which reported that Israeli agents used a software | company in Missouri to intercept telephone conversations from the | White House, State Department and other departments. | | The FBI inquiry began some years ago after an investigation by the | State Department led to suspicions that Israel might have the | technology to overhear the conversations of American officials in | their offices. | | It shifted to the White House in September 1998 when Kenneth Starr, | the independent prosecutor, reported that the Israelis may have | listened to amorous conversations between Clinton and Monica Lewinsky, | the White House trainee with whom he had an affair. The allegation was | denied by both Israel and the United States. | | Both countries have been wary of the harm that could be caused by | Israeli intelligence operations since Jonathan Pollard, a former | American navy analyst, was jailed for spying for Israel in 1986. | | Sources familiar with past operations, however, said penetration of | the White House was considered so secret that even some members of | Mossad's hierarchy were not informed. | | They cited at least three occasions on which Israel had monitored the | White House, starting shortly after Gerald Ford became president in | 1974. | | A source who participated in the infiltration of Ford's White House | said the Israelis were interested in American plans to sell the Awacs | early warning aircraft to Saudi Arabia, a prospect that would have | allowed the desert kingdom to monitor Israeli air force activity | throughout the Middle East. [snip] =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 393 From: Date: Sun May 21, 2000 10:32pm Subject: Re: Israeli spies tapped Clinton E-mail Jim; the Israelis are slick operators. i read that the Mossad once stole a whole fighter plane from the French ,that was scheduled to be scrapped. they had manifestos faked as to the destruction of the plane and shipped the whole thing out of the country in crates, to be re-assembled in Israel. apparently the plane had a piece of technology that the Israelis were quite interested in. the Clinton administration ,unfortunately has been lax in safeguarding secrets. the Chinese made off with nuclear weapon technology and barely got a hand slap. HAVE A GREAT DAY !!! 394 From: James M. Atkinson, Comm-Eng Date: Mon May 22, 2000 1:18pm Subject: You're probably from Louisiana if... [humor] You're probably from Louisiana if... The crawfish mounds in your front yard have over taken the grass. You greet people with "Howzyamomma'an'dem?" and hear back "Dey fine!" Every so often, you have waterfront property. When giving directions you use words like "uptown", "downtown", "backatown", "frontatown", "riverside", "lakeside", "other side of the bayou" or "other side of the levee. When you refer to a geographical location "way up North", you are referring to places like Shreveport, Little Rock or Memphis, "where it gets real cold"! Your burial plot is six feet over rather than six feet under. You've ever had Community Coffee You can pronounce Tchoupitoulas and can spell it. (also, Thibodeaux, Opelousas, Ponchartrain, Ouachita, Atchafalaya, and Natchitoches) You don't worry when you see ships riding higher in the river than the top of your house. You judge a po-boy by the number of napkins used. (Amen) The waitress at your local sandwich shop tells you a fried oyster po-boy "dressed" is healthier than a Caesar salad. You know the definition of "dressed". You can eat Popeye's, Haydel's and Zapp's for lunch and wash it down with Barq's and several Abitas, without losing it all on your stoop. The four seasons in your year are: crawfish, shrimp, Crab and King Cake. The smell of a crawfish boil turns you on more than HBO. You "wrench" your hands in the sink with an onion bar to get the crawfish smell off. You're not afraid when someone wants to "ax you something". You go by "ya-mom-en-`dems" on Good Friday for family supper. You don't learn until high school that Mardi Gras is not a national holiday. You don't realize until high school what a "county" is. You push little old ladies out of the way to catch Mardi Gras beads. You believe that purple, green and gold look good together (and you will even eat things those colors) You go to buy a new winter coat (what most people refer to as windbreakers) and throw your arms up in the air to make sure it allows enough room to catch Mardi Gras beads. Your last name isn't pronounced the way it's spelled. You know what a nutria rat is but you still pick it to represent your baseball team. You have spent a summer afternoon on the Lake Pontchartrain seawall catching blue crabs. You describe a color as "K&B Purple". You like your rice and politics dirty. When given the choice for Governor between a KKK leader and Edwin Edwards, it's a difficult decision. You worry about a deceased family member returning in spring floods. (Scary, but true ) You pronounce the largest city in the state as "Nawlins". A friend gets in trouble for roaches in his car and you wonder if it was palmettos or those little ones that go after the French Fries that fell under the seat. You know those big roaches can fly, but you're able to sleep at night anyway. You prefer skiing on the bayou. You assume the mosquito is your STATE BIRD. You realize the rain forest is less humid than Louisiana. =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 395 From: Alex M. Salazar Date: Mon May 22, 2000 1:30pm Subject: Re: You're probably from Louisiana if... [humor] Where did you get this one? I haven't been able to stop laughing for the past half hour. Alex M.Salazar www.CopsForHire.com ----- Original Message ----- From: "James M. Atkinson, Comm-Eng" To: "TSCM-L Mailing List" Sent: Monday, May 22, 2000 11:18 AM Subject: [TSCM-L] You're probably from Louisiana if... [humor] > > You're probably from Louisiana if... > > > The crawfish mounds in your front yard have over taken the grass. > > You greet people with "Howzyamomma'an'dem?" and hear back "Dey fine!" > > Every so often, you have waterfront property. > > When giving directions you use words like "uptown", "downtown", > "backatown", "frontatown", "riverside", "lakeside", "other side of > the bayou" or "other side of the levee. > > When you refer to a geographical location "way up North", you are > referring to places like Shreveport, Little Rock or Memphis, "where > it gets real cold"! > > Your burial plot is six feet over rather than six feet under. > > You've ever had Community Coffee > > You can pronounce Tchoupitoulas and can spell it. (also, Thibodeaux, > Opelousas, Ponchartrain, Ouachita, Atchafalaya, and Natchitoches) > > You don't worry when you see ships riding higher in the river than the top of > your house. > > You judge a po-boy by the number of napkins used. (Amen) > > The waitress at your local sandwich shop tells you a fried oyster > po-boy "dressed" is healthier than a Caesar salad. > > You know the definition of "dressed". > > You can eat Popeye's, Haydel's and Zapp's for lunch and wash it down > with Barq's and several Abitas, without losing it all on your stoop. > > The four seasons in your year are: crawfish, shrimp, Crab and King Cake. > > The smell of a crawfish boil turns you on more than HBO. > > You "wrench" your hands in the sink with an onion bar to get the > crawfish smell off. > > You're not afraid when someone wants to "ax you something". > > You go by "ya-mom-en-`dems" on Good Friday for family supper. > > You don't learn until high school that Mardi Gras is not a national holiday. > > You don't realize until high school what a "county" is. > > You push little old ladies out of the way to catch Mardi Gras beads. > > You believe that purple, green and gold look good together (and you > will even eat things those colors) > > You go to buy a new winter coat (what most people refer to as > windbreakers) and throw your arms up in the air to make sure it > allows enough room to catch Mardi Gras beads. > > Your last name isn't pronounced the way it's spelled. > > You know what a nutria rat is but you still pick it to represent your baseball > team. > > You have spent a summer afternoon on the Lake Pontchartrain seawall > catching blue crabs. > > You describe a color as "K&B Purple". > > You like your rice and politics dirty. > > When given the choice for Governor between a KKK leader and Edwin > Edwards, it's a difficult decision. > > You worry about a deceased family member returning in spring floods. > (Scary, but true ) > > You pronounce the largest city in the state as "Nawlins". > > A friend gets in trouble for roaches in his car and you wonder if it > was palmettos or those little ones that go after the French Fries > that fell under the seat. > > You know those big roaches can fly, but you're able to sleep at night anyway. > > You prefer skiing on the bayou. > > You assume the mosquito is your STATE BIRD. > > You realize the rain forest is less humid than Louisiana. > > > =================================================================== > Do not meddle in the affairs of dragons, > for you are crunchy and taste good with ketchup. > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Nil carborundum illigitimi > =================================================================== > > ------------------------------------------------------------------------ > High rates giving you headaches? The 0% APR Introductory Rate from > Capital One. 9.9% Fixed thereafter! > http://click.egroups.com/1/3010/1/_/507420/_/959019762/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 396 From: Klaxon Date: Mon May 22, 2000 7:05pm Subject: I have an attorney friend who needs a very easy to use, UN-HACKABLE answering machine. The present one has croaked. It was an older type with a regular size cassette tape for taking messages. He does not want to be able to retrieve messages from a remote phone because he believes they can be hacked. The messages he gets are of an extremely sensitive nature (aren't they all) and he's super sensitive about anyone being able to play them for nefarious or unscrupulous purposes. Does anyone have any ideas as to which one he should buy. Greg Kellerman klaxon@p... | www.plantnet.com/klaxon/gregs1st.htm [Non-text portions of this message have been removed] 397 From: James M. Atkinson, Comm-Eng Date: Mon May 22, 2000 9:01pm Subject: The Story of Mel, a Real Programmer The Story of Mel, a Real Programmer =================================== This was posted to USENET by its author, Ed Nather (utastro!nather), on May 21, 1983. A recent article devoted to the *macho* side of programming made the bald and unvarnished statement: Real Programmers write in FORTRAN. Maybe they do now, in this decadent era of Lite beer, hand calculators, and "user-friendly" software but back in the Good Old Days, when the term "software" sounded funny and Real Computers were made out of drums and vacuum tubes, Real Programmers wrote in machine code. Not FORTRAN. Not RATFOR. Not, even, assembly language. Machine Code. Raw, unadorned, inscrutable hexadecimal numbers. Directly. Lest a whole new generation of programmers grow up in ignorance of this glorious past, I feel duty-bound to describe, as best I can through the generation gap, how a Real Programmer wrote code. I'll call him Mel, because that was his name. I first met Mel when I went to work for Royal McBee Computer Corp., a now-defunct subsidiary of the typewriter company. The firm manufactured the LGP-30, a small, cheap (by the standards of the day) drum-memory computer, and had just started to manufacture the RPC-4000, a much-improved, bigger, better, faster --- drum-memory computer. Cores cost too much, and weren't here to stay, anyway. (That's why you haven't heard of the company, or the computer.) I had been hired to write a FORTRAN compiler for this new marvel and Mel was my guide to its wonders. Mel didn't approve of compilers. "If a program can't rewrite its own code", he asked, "what good is it?" Mel had written, in hexadecimal, the most popular computer program the company owned. It ran on the LGP-30 and played blackjack with potential customers at computer shows. Its effect was always dramatic. The LGP-30 booth was packed at every show, and the IBM salesmen stood around talking to each other. Whether or not this actually sold computers was a question we never discussed. Mel's job was to re-write the blackjack program for the RPC-4000. (Port? What does that mean?) The new computer had a one-plus-one addressing scheme, in which each machine instruction, in addition to the operation code and the address of the needed operand, had a second address that indicated where, on the revolving drum, the next instruction was located. In modern parlance, every single instruction was followed by a GO TO! Put *that* in Pascal's pipe and smoke it. Mel loved the RPC-4000 because he could optimize his code: that is, locate instructions on the drum so that just as one finished its job, the next would be just arriving at the "read head" and available for immediate execution. There was a program to do that job, an "optimizing assembler", but Mel refused to use it. "You never know where it's going to put things", he explained, "so you'd have to use separate constants". It was a long time before I understood that remark. Since Mel knew the numerical value of every operation code, and assigned his own drum addresses, every instruction he wrote could also be considered a numerical constant. He could pick up an earlier "add" instruction, say, and multiply by it, if it had the right numeric value. His code was not easy for someone else to modify. I compared Mel's hand-optimized programs with the same code massaged by the optimizing assembler program, and Mel's always ran faster. That was because the "top-down" method of program design hadn't been invented yet, and Mel wouldn't have used it anyway. He wrote the innermost parts of his program loops first, so they would get first choice of the optimum address locations on the drum. The optimizing assembler wasn't smart enough to do it that way. Mel never wrote time-delay loops, either, even when the balky Flexowriter required a delay between output characters to work right. He just located instructions on the drum so each successive one was just *past* the read head when it was needed; the drum had to execute another complete revolution to find the next instruction. He coined an unforgettable term for this procedure. Although "optimum" is an absolute term, like "unique", it became common verbal practice to make it relative: "not quite optimum" or "less optimum" or "not very optimum". Mel called the maximum time-delay locations the "most pessimum". After he finished the blackjack program and got it to run ("Even the initializer is optimized", he said proudly), he got a Change Request from the sales department. The program used an elegant (optimized) random number generator to shuffle the "cards" and deal from the "deck", and some of the salesmen felt it was too fair, since sometimes the customers lost. They wanted Mel to modify the program so, at the setting of a sense switch on the console, they could change the odds and let the customer win. Mel balked. He felt this was patently dishonest, which it was, and that it impinged on his personal integrity as a programmer, which it did, so he refused to do it. The Head Salesman talked to Mel, as did the Big Boss and, at the boss's urging, a few Fellow Programmers. Mel finally gave in and wrote the code, but he got the test backwards, and, when the sense switch was turned on, the program would cheat, winning every time. Mel was delighted with this, claiming his subconscious was uncontrollably ethical, and adamantly refused to fix it. After Mel had left the company for greener pa$ture$, the Big Boss asked me to look at the code and see if I could find the test and reverse it. Somewhat reluctantly, I agreed to look. Tracking Mel's code was a real adventure. I have often felt that programming is an art form, whose real value can only be appreciated by another versed in the same arcane art; there are lovely gems and brilliant coups hidden from human view and admiration, sometimes forever, by the very nature of the process. You can learn a lot about an individual just by reading through his code, even in hexadecimal. Mel was, I think, an unsung genius. Perhaps my greatest shock came when I found an innocent loop that had no test in it. No test. *None*. Common sense said it had to be a closed loop, where the program would circle, forever, endlessly. Program control passed right through it, however, and safely out the other side. It took me two weeks to figure it out. The RPC-4000 computer had a really modern facility called an index register. It allowed the programmer to write a program loop that used an indexed instruction inside; each time through, the number in the index register was added to the address of that instruction, so it would refer to the next datum in a series. He had only to increment the index register each time through. Mel never used it. Instead, he would pull the instruction into a machine register, add one to its address, and store it back. He would then execute the modified instruction right from the register. The loop was written so this additional execution time was taken into account --- just as this instruction finished, the next one was right under the drum's read head, ready to go. But the loop had no test in it. The vital clue came when I noticed the index register bit, the bit that lay between the address and the operation code in the instruction word, was turned on --- yet Mel never used the index register, leaving it zero all the time. When the light went on it nearly blinded me. He had located the data he was working on near the top of memory --- the largest locations the instructions could address --- so, after the last datum was handled, incrementing the instruction address would make it overflow. The carry would add one to the operation code, changing it to the next one in the instruction set: a jump instruction. Sure enough, the next program instruction was in address location zero, and the program went happily on its way. I haven't kept in touch with Mel, so I don't know if he ever gave in to the flood of change that has washed over programming techniques since those long-gone days. I like to think he didn't. In any event, I was impressed enough that I quit looking for the offending test, telling the Big Boss I couldn't find it. He didn't seem surprised. When I left the company, the blackjack program would still cheat if you turned on the right sense switch, and I think that's how it should be. I didn't feel comfortable hacking up the code of a Real Programmer. =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 398 From: Date: Mon May 22, 2000 9:58am Subject: Re: You're probably from Louisiana if... [humor] Very good, many apply to coastal GA! Guppy 399 From: James M. Atkinson, Comm-Eng Date: Tue May 23, 2000 1:42pm Subject: The Road not Taken [Meditation] The Road not Taken by Robert Frost - 1916 Two roads diverged in a yellow wood, And sorry I could not travel both And be one traveler, long I stood And looked down one as far as I could To where it bent in the undergrowth; Then took the other, as just as fair, And having perhaps the better claim, Because it was grassy and wanted wear; Though as for that, the passing there Had worn them really about the same, And both that morning equally lay In leaves no step had trodden black. Oh, I kept the first for another day! Yet knowing how way leads on to way, I doubted if I should ever come back. I shall be telling this with a sigh Somewhere ages and ages hence: Two roads diverged in a wood, and I- I took the one less traveled by, And that has made all the difference. =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 400 From: James M. Atkinson, Comm-Eng Date: Tue May 23, 2000 1:51pm Subject: Fwd: passing of gumshoe Frank Chisholm...... >From: Paul ANDERSON >Date: Tue, 23 May 2000 11:36:00 -0700 > >frank chisholm pi died last week.....he was in his nineties ....he was >still wrapping up cases last year when i helped him move his >office.....while moving we stumbled across old surveillance photos in >boxes that went back to the 40's...well needless to say i became >curious at these hot photos....frank said " paul i can't tell ya about >these photos.. i promised the governor (of calif @ the time) and i'll >never reveal the details"..."frank come on the governor's dead" i >pleaded and these pictures are.... frank interrupted and said "paul i'm >not going into it and that's it"...now that's a pi you could >trust....earlier this year frank came over to my office because we were >storing his stuff and at that time he arrived i was working on locating >a witness....he sat with me for a spell and was truly amazed at what >information was available online these days compared to days of >old......days when i taught you (paul) many of the tricks of the trade >when online was still mostly a dream...many of the old standard tricks >he taught me are still applicable today...methods may be different...but >somehow standards remain so...i've known and worked for frank for over >20 years.....the reason for the story is to let you know a little >something about a great pi and man frank chisholm....he outlived most of >his entire family , friends.. and peers .... the church ceremony is @ >ST. CATHERINES 1310 BAYSWATER AVE @ EL CAMINO..BURLINGAME,CA >650-344-6884 5/27/00........... paul anderson sr abc legal >investigations pi7654 415-982-3416 =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 401 From: Jordan Ulery Date: Tue May 23, 2000 4:09pm Subject: Request for assistance The following was posted on the NCISS list. Please respond directly to sender. Dear Colleagues: I need to reverse a Korean fax number. Any suggestions or contacts in Asia? As always, thank you in advance. Paul Jaeb, Managing Investigator Heartland Business Intelligence 404 Foshay Tower Minneapolis, MN 55402 pjaeb@h... www.heartlandinfo.com (800) 967-1882 402 From: Jordan Ulery Date: Tue May 23, 2000 4:11pm Subject: Korean Information The following is offered merely to advise of a resource: Dear Investigator Greetings from InterPIA (International Private Investigator's Agency). InterPIA is the first government-registered P. I. Agency in Korea, headed by a former national police inspector with 12 years career at Korea National Police. We are honored to inform you of our website at : http://www.interpia.org. We are specializing in corporate background and other business -related investigations. And we already have successfully conducted search for our overseas clients who are renowned international consulting and inteligence companies. We also have clients from Korea requesting us to conduct investigations in the U.S. and many other countries. We hope we can have a nice business relationship with you when we need a P.I. in your state. And we also look forward to hear from you when you need a P.I. in Korea. Best Regards, Jin-Ha Park. External Relations Manager. InterPIA, Seoul Korea. www.interpia.org 403 From: James M. Atkinson, Comm-Eng Date: Wed May 24, 2000 10:25am Subject: Interesting Article I thought the list might find the following article interesting: http://www.zdnet.com/zdnn/stories/comment/0,5859,2573856,00.html The incident that is being talked about is several months old, and it accurately reflects what really happened in the case, and the methods used to trace down the mischief makers. -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 404 From: Date: Wed May 24, 2000 1:13pm Subject: Re: Interesting Article Jim; great work on Mafia boy! "miles to go before i sleep, and promises to keep..." one of the latest scams is where, guys who have shorted a stock ,betting it will go down in price and thus profiting from the decline, get online and attempt to scare investors into selling their shares. they will do this in a variety of means,utilizing stockmarket message boards ,such as found at RagingBull.com ,Yahoo,SiliconInvestor.com,and MotleyFool.com,to post false,misleading,slanderous and outright fictitious information to scare,threaten and cajol imvestors into selling their holdings , or at least ,to not buy anymore stock ,to aid in decreasing the price. one recent episode involved the posting of a news article relating a mafia style execution of two stock promoters to thus indirectly affront those who were bullish on the stock in question, successfully driving the share price downward short term. the short/bashers as they are called hide behind fake aliases and hidden identities of their ISP's. although some are managed to be brought to court and to cease and desist and fined,it is still a wild -wild west with the SEC years behind and the small mom and pop investors at wits end. oftentimes ,the short / bashers work for market maker firms. the "very' firms enjoined with providing an orderly market! life goes on ,as the bulls and the bears battle it out! and the shenanigans of attempted market manipulation continue. many firms will pay for the diligence required to track down and stop those who seek to artificially deflate a company's stock price ,by posting lies and innuendo. HAVE A GREAT DAY !!! 405 From: Date: Wed May 24, 2000 9:08am Subject: Re: Request for assistance We presently have an electronic security office in Kang Nam Korea. If I can be of any help, advise. Jim Villegas VP Operations 406 From: Trace Carpenter Date: Wed May 24, 2000 1:43pm Subject: Re: Interesting Article I have run into this a LOT lately on Raging Bull. Many of the boards have blocked certain names from being posted due to manipulation. For instance if you use the name stockprowler.com in a message on Raging Bull, when you post it will read ##########.com or something similar as stockprowler is a known manipulator. patedwards@w... wrote: > Jim; > great work on Mafia boy! > > "miles to go before i sleep, and promises to keep..." > > > > one of the latest scams is where, > guys who have shorted a stock ,betting it will go down in price and > thus profiting from the decline, get online and attempt to scare > investors into selling their shares. > they will do this in a variety of means,utilizing stockmarket > message boards ,such as found at RagingBull.com > ,Yahoo,SiliconInvestor.com,and > MotleyFool.com,to post false,misleading,slanderous and outright > fictitious information to scare,threaten and cajol imvestors into > selling their holdings , or at least ,to not buy anymore stock ,to > aid in decreasing the price. > one recent episode involved the posting of a news article > relating a mafia > style execution of two stock promoters > to thus indirectly affront those who were > bullish on the stock in question, successfully driving the share price > downward short term. > the short/bashers as they are called hide behind fake aliases > and > hidden identities of their ISP's. although some are managed to be > brought to court > and to cease and desist and fined,it is still a wild -wild west with > the SEC years behind and the small mom and pop investors at wits end. > oftentimes ,the short / bashers work for market maker > firms. the "very' > firms enjoined with providing an orderly market! > life goes on ,as the bulls and the bears battle it out! > and the shenanigans > of attempted market manipulation continue. > many firms will pay for the diligence required to track > down and stop > those who seek to artificially deflate a company's stock price ,by > posting lies and innuendo. > > > > > HAVE A GREAT DAY !!! > > > > > > ------------------------------------------------------------------------ > Failed tests, classes skipped, forgotten locker combinations. > Remember the good 'ol days > http://click.egroups.com/1/4053/1/_/507420/_/959191988/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- *Trace Carpenter *2926 Maple Ave., Ste. 200 *Dallas, Texas 75201 *214.828.4520; 214.740-0112 Facsimile *Because the fly on the wall might not be the only bug in the room.ô 407 From: James M. Atkinson, Comm-Eng Date: Wed May 24, 2000 1:43pm Subject: Re: Interesting Article Thanks for the positive feedback. I am familiar with the stock manipulation scam of which you are referring to in your message. One of my first "cyber tracking" projects was back in the Fall of 1989 when I was engaged to track down who was behind the chat room manipulation of a Telephone Company Stock in Mexico. In a matter of weeks the stock went from 1/128th to 9 dollars a share (a 1000+ fold increase), and it was all traced to several brokers using an Prodigy chat room and "rumor mongering". They had taken a huge margin position in the stock and by "talking up the stock" though a half dozen alias they created a buying frenzy, which eventually collapsed on the other shareholders. One of the biggest problems with Yahoo and similar services which offer "chat board services" is that they are deliberately indifferent to security, and that by allowing customers to hide behind and alias they foster an environment of decent and fraud. People should only be allowed to post under their real name, and all of their header information (dates, times, IP address, etc) should be included in every post so that any mischief can be traced back to a specific customer. Companies who offer "chat services" are trying to capitalize on the Internet and exploit it for every penny they can. In turn they promote serious abuse on the net, and then hide behind "privacy laws" when people complain. There is no legitimate reason for someone to be posting under an alias or to be using an anonymous name (unless of course they are engaging in mischief). -jma At 2:13 PM -0400 5/24/00, patedwards@w... wrote: >Jim; > great work on Mafia boy! > > "miles to go before i sleep, and promises to keep..." > > one of the latest scams is where, > guys who have shorted a stock ,betting it will go down in price and >thus profiting from the decline, get online and attempt to scare >investors into selling their shares. > they will do this in a variety of means,utilizing stockmarket >message boards ,such as found at RagingBull.com >,Yahoo,SiliconInvestor.com,and > MotleyFool.com,to post false,misleading,slanderous and outright >fictitious information to scare,threaten and cajol imvestors into >selling their holdings , or at least ,to not buy anymore stock ,to >aid in decreasing the price. > one recent episode involved the posting of a news article >relating a mafia >style execution of two stock promoters > to thus indirectly affront those who were > bullish on the stock in question, successfully driving the share price >downward short term. > the short/bashers as they are called hide behind fake aliases >and >hidden identities of their ISP's. although some are managed to be >brought to court > and to cease and desist and fined,it is still a wild -wild west with >the SEC years behind and the small mom and pop investors at wits end. > oftentimes ,the short / bashers work for market maker >firms. the "very' >firms enjoined with providing an orderly market! > life goes on ,as the bulls and the bears battle it out! >and the shenanigans >of attempted market manipulation continue. > many firms will pay for the diligence required to track >down and stop > those who seek to artificially deflate a company's stock price ,by >posting lies and innuendo. > > > > > HAVE A GREAT DAY !!! =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 408 From: Date: Wed May 24, 2000 2:20pm Subject: Re: Interesting Article right, many of the newsletter services do in fact buy stock ahead of their reccommendations and then sell as the public buys. Jim, you are right, much of the abuse could be stopped if people were forced to use their real identities. however, sometimes the info posted is really helpful and anonymity may provide easier access to choice tidbits. even, some of the television news services seek to influence share prices. it is when people cross over the line between integrity / fairness and deceit / misinformation that problems occur and investors or firms are swindled. HAVE A GREAT DAY !!! 409 From: Steve Uhrig Date: Wed May 24, 2000 3:07pm Subject: Maryland to Drop Linda Tripp Wiretap Case Maryland to Drop Linda Tripp Wiretap Case TOWSON, Md. (Reuters) - The state of Maryland decided on Wednesday to drop its criminal wiretap case against Linda Tripp, saying a recent court ruling to suppress the testimony of Monica Lewinsky made it impossible to press ahead. The decision, which had been widely expected in political and legal circles in Maryland, ended the only criminal case against a major figure in the White House sex scandal that led to the 1998 impeachment of President Clinton. Maryland State Prosecutor Stephen Montanarelli said the case was effectively doomed on Monday when Howard County Circuit Judge Diane Leasure denied his request that would have allowed Lewinsky to provide vital testimony at a trial set to begin in July. The judge's denial followed a major May 5 ruling in which she had suppressed virtually all of Lewinsky's testimony after concluding that the former White House intern did not make a credible witness. "We believe her, the court does not and that resolves the matter," Montanarelli said in a statement issued by his office in Towson, Maryland, outside Baltimore. "There are no other witnesses to the conversation whom the state can call to testify, and Tripp cannot be compelled to testify," he added. A formal motion to dismiss the case would be made as soon as the court could schedule the case, prosecutors said. Tripp, who recorded hours of telephone conversations with Lewinsky and turned the tapes over to independent counsel Kenneth Starr, was indicted last July for allegedly violating Maryland's wiretap law by tape-recording a Dec. 22, 1997, chat from her home in Columbia, Md., and sharing its contents with Newsweek magazine. The state Wiretap and Electronic Surveillance Statute makes it a felony to record conversations without consent. But prosecutors must also prove that the accused knows that doing so is against the law. For that, Montanarelli needed Lewinsky to say in court that the tape for which Tripp had been charged was made in December. It was important to the prosecution's case to establish the date because prosecutors said they had proof Tripp knew taping the conversation was illegal as early as November. Leasure said on May 5 that she would allow Lewinsky to testify only that Tripp recorded the conversation. But she ruled that the former intern was not credible on any other topic, including the tape's date, because her memory was tainted by evidence Tripp provided Starr under a grant of federal immunity, including the contents of the Starr Report. A week after that ruling, Montanarelli asked for clarification, suggesting that Lewinsky should be allowed to authenticate the tape in order to say whether Tripp had her permission to make it. Montanarelli said on Wednesday that Lewinsky could independently recall when the taped conversation took place because she and Tripp had just received subpoenas for their depositions in the Paula Jones sexual harassment case against Clinton, she had met Vernon Jordan the same day and was about to have her employee farewell party at the Pentagon. Newsweek also published the contents of the conversation in its Feb. 2, 1998, edition. "This was an extremely important and memorable event in her life which was, shortly after it occurred, published in detail in the national news media," the Maryland prosecutor said. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 410 From: James M. Atkinson, Comm-Eng Date: Wed May 24, 2000 11:13pm Subject: Another Lawyer Goes to Hell [Humor] NASA was interviewing professionals to be sent to Mars. Only one could go-and couldn't return to Earth. The first applicant, an engineer, was asked how much he wanted to be paid for going. "A million dollars," he answered, "because I want to donate it to M.I.T." The next applicant, a doctor, was asked the same question. He asked for $2 million. "I want to give a million to my family," he explained, "and leave the other million for the advancement of medical research." The last applicant was a lawyer. When asked how much money he wanted, he whispered in the interviewer's ear, "Three million dollars." "Why so much more than the others?" asked the interviewer. The lawyer replied, "If you give me $3 million, I'll give you $1 million, I'll keep $1 million, and we'll send the engineer to Mars." -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 411 From: James M. Atkinson, Comm-Eng Date: Thu May 25, 2000 10:58am Subject: Bogus IDs gave easy access to CIA, FBI, Pentagon, State Department... http://www.theage.com.au/breaking/0005/25/A17287-2000May25.shtml WASHINGTON, May 24 - Using bogus credentials anyone can obtain from a catalogue or the Internet, armed investigators posing as federal agents or police officers easily breached security at the Pentagon, Justice Department, FBI, CIA, State Department and 14 other United States agencies and two large airports earlier this month. In one test of security, two investigators from the General Accounting Office flashing phoney IDs drove a rental van into the courtyard of the Department of Justice building. The vehicle was not searched or inspected, according to officials familiar with the investigation. "A team of undercover agents successfully penetrated (these agencies) and could have introduced weapons, explosives, chemical-biological agents, listening devices or other hazardous materials," said Robert Hast, assistant comptroller general at GAO, in a draft of prepared testimony obtained by Knight Ridder. [snip] Hast, who supervised the security tests at the request of the House subcommittee, told a closed-door meeting of federal officials yesterday that GAO employees, including two retired Secret Service agents, used counterfeit law enforcement IDs - FBI and New York Police credentials - from sources advertising on the Internet. "We did not utilise any genuine law enforcement credential," said Hast. "At least one agent always carried a briefcase or bag. In all cases, our agents were able to enter the facility by being either waved around or through a magnetometer, without their person or bag being screened." At Washington's Reagan National Airport and the Orlando (Florida) International Airport, the two GAO investigators had tickets and were able to obtain boarding passes and firearms permits to carry their weapons onto flights. Security staffers looked at their fake IDs and waved the pair through without having their briefcases go through an X-ray machine. At the CIA, FBI and the State Department, investigators were allowed to keep their weapons and unscreened bags but required to have an escort. At the CIA and FBI, the investigators were able to enter toilets with their bags, unescorted. At State they ditched their escort and walked through the building without being challenged. [snip] The security tests followed reports to the House subcommittee alleging easy access to phoney badges and other credentials on the Internet. The counterfeit IDs were not even good imitations of the real thing, said subcommittee chairman Bill McCollum, an Orlando Republican. The GAO investigation was conducted at a time when security at federal buildings is coming under increased scrutiny. The State Department has been criticised for recent breaches that include a missing laptop computer that contained classified information on nuclear and chemical weapons. [snip] =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 412 From: Jordan Ulery Date: Thu May 25, 2000 1:46pm Subject: Re: Bogus IDs gave easy access to CIA, FBI, Pentagon, State Department... And the net result will be to further isolate the people from their government rather than to address the true problem, the lack of training and comprehension that each individuals is responsible for their own actions, security and "secrets, entrusted to them. Instead, there will be a tightening of security at airports, and federal buildings making it even more difficult to conduct business or access your government. The only time a government needs tight security is when it fears its people! "James M. Atkinson, Comm-Eng" wrote: > http://www.theage.com.au/breaking/0005/25/A17287-2000May25.shtml > > WASHINGTON, May 24 - Using bogus credentials anyone can obtain from a > catalogue or the Internet, armed investigators posing as federal > agents or police officers easily breached security at the Pentagon, > Justice Department, FBI, CIA, State Department and 14 other United > States agencies and two large airports earlier this month. > > In one test of security, two investigators from the General Accounting > Office flashing phoney IDs drove a rental van into the courtyard of > the Department of Justice building. The vehicle was not searched or > inspected, according to officials familiar with the investigation. > > "A team of undercover agents successfully penetrated (these agencies) > and could have introduced weapons, explosives, chemical-biological > agents, listening devices or other hazardous materials," said Robert > Hast, assistant comptroller general at GAO, in a draft of prepared > testimony obtained by Knight Ridder. > > [snip] > > Hast, who supervised the security tests at the request of the House > subcommittee, told a closed-door meeting of federal officials > yesterday that GAO employees, including two retired Secret Service > agents, used counterfeit law enforcement IDs - FBI and New York Police > credentials - from sources advertising on the Internet. > > "We did not utilise any genuine law enforcement credential," said > Hast. "At least one agent always carried a briefcase or bag. In all > cases, our agents were able to enter the facility by being either > waved around or through a magnetometer, without their person or bag > being screened." > > At Washington's Reagan National Airport and the Orlando (Florida) > International Airport, the two GAO investigators had tickets and were > able to obtain boarding passes and firearms permits to carry their > weapons onto flights. Security staffers looked at their fake IDs and > waved the pair through without having their briefcases go through an > X-ray machine. > > At the CIA, FBI and the State Department, investigators were allowed > to keep their weapons and unscreened bags but required to have an > escort. At the CIA and FBI, the investigators were able to enter > toilets with their bags, unescorted. At State they ditched their > escort and walked through the building without being challenged. > > [snip] > > The security tests followed reports to the House subcommittee alleging > easy access to phoney badges and other credentials on the Internet. > The counterfeit IDs were not even good imitations of the real thing, > said subcommittee chairman Bill McCollum, an Orlando Republican. > > The GAO investigation was conducted at a time when security at federal > buildings is coming under increased scrutiny. The State Department has > been criticised for recent breaches that include a missing laptop > computer that contained classified information on nuclear and chemical > weapons. > > [snip] > > =================================================================== > Do not meddle in the affairs of dragons, > for you are crunchy and taste good with ketchup. > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Nil carborundum illigitimi > =================================================================== > > ------------------------------------------------------------------------ > Missing old school friends? Find them here: > http://click.egroups.com/1/4055/1/_/507420/_/959270667/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS [Non-text portions of this message have been removed] 413 From: Date: Thu May 25, 2000 9:21pm Subject: Re: Digest Number 258 Greetings Mr. Atkinson and list. I hope no one is offended by this post but I feel I should speak up for the hermits and sages. With regards to anonymous/private posting, I felt slightly put upon by the comment that only criminals use anonymity. I see it as much as a right as 'real life' anonymity/privacy is. I do not walk down the street with a sign posted on my back with my full name and address. Why should I wear one on the net? I have little enough trust for physical strangers that I can see, let alone invisible digital ones. I think that any and every privacy precaution on or of line is a basic right and necessity in this 'civilized' world we sojourn in. This is actually one of the fundamental attitude differences I see in the U.S. as compared with Northern Europe. Respect of privacy and personal space. Just thought I would chime in. Negative. "Under the heavens, those who travel long distances in isolation will defend themselves with strange arts." 414 From: William Knowles Date: Fri May 26, 2000 1:33am Subject: Taiwan added to FBI threat list http://www.USDefense.com/may2000/D/24/story4.htm Wednesday, 24 May 2000 UNITED STATES | In a move some U.S. lawmakers see as pure political hyperbole and administration pandering to China, Taiwan has been placed on the FBI's secret list of hostile intelligence threats to the United States, according to a Wednesday report in the Washington Times newspaper. The designation comes as a shock to veteran intelligence officials and members of various congressional intelligence committees. The designation is given to countries suspected of engaging in hostile espionage and spying activities against the U.S. The inclusion of Taiwan, placed on the list by Attorney General Janet Reno, is especially ominous, since many experts and congressional leaders suspect that China -- not Taiwan -- has been engaged in such espionage. The listing of Taiwan, however, places it on the same level as China. The other countries listed were, in order of priority: Russia, China, North Korea, Federal Republic of Yugoslavia, Serbian-controlled Bosnia, Vietnam, Syria, Iraq, Iran, Libya, Sudan and Taiwan. The Times said "in addition to nations, the so-called national security threat list includes eight issues that guide FBI intelligence work: terrorism, espionage, proliferation, economic espionage, infrastructure targeting, government targeting, perception management and legal intelligence gathering." Disclosure of the list comes as the House is set to begin debate on Wednesday over a controversial bill granting China permanent "normal" -- or favorable -- trade status. "It's very strange to me that Taiwan would be on this list, especially since other countries that spy on us are not," said Sen. Jon Kyl, R-AZ., and a member of Senate Intelligence Committee. "What threat?" If Taiwan is on the threat list, then Israel, India, Pakistan and France also should be added since those nations conduct spying operations against the United States, a former senior U.S. intelligence official told the newspaper. "This is just for political purposes. The Taiwanese are not in the same league as the other threats and they are the one country on the list that is not a mortal enemy of the United States," the former official said. Justice Department sources said the memorandum was written by Frances Fragos Townsend, counsel for intelligence policy and a political appointee who is close to Reno. Townsend was criticized in a recent internal Justice Department report for turning down an FBI request for a wiretap of Los Alamos National Laboratory scientist Wen Ho Lee. Lee is the chief suspect in an FBI investigation of Chinese nuclear spying. He was indicted in December for mishandling nuclear secrets. "Why isn't Israel on the list?" said a second former intelligence official, who also requested anonymity. Both former officials who spoke with the newspaper said it was inappropriate to "politicize" the threat list because it had the effect of distorting the truth and shifting FBI focus away from true threats to U.S. national security. Kyl said he would be inquiring with the Justice Department as to why Taiwan was added. Meanwhile, a current U.S. government official involved in China issues said putting Taiwan on the threat list reflects the administration's pro-Beijing and anti-Taiwan stance. "The administration clearly sees Taiwan as the problem, as a provocateur and troublemaker," he said. In addition to terrorism, spying and weapons proliferation, a relatively new issue in the issue list is the threat to the "national infrastructure" from electronic information warfare attacks. The disclosure, made by the newspaper but given to Times reporters by independent investigative reporter Scott Wheeler, marks the first time the secretive FBI list has ever been made public. FBI and Justice officials had no comment. *-------------------------------------------------* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen. Alfred. M. Gray, USMC --------------------------------------------------- C4I Secure Solutions http://www.c4i.org *-------------------------------------------------* 415 From: Robert G. Ferrell Date: Fri May 26, 2000 7:13am Subject: Re: Bogus IDs gave easy access to CIA, FBI, Pentagon, State Department... >And the net result will be to further isolate the people from their >government rather than to address the true problem, the lack of training >and comprehension that each individuals is responsible for their own >actions, security and "secrets, entrusted to them. That hits the nail pretty squarely on the head, I think. The theme this year in the Federal circus is computer security, so naturally instead of educating and empowering users, we're all scrambling around generating voluminous reports and plans and assessments that will never be read by the people whom they are supposed to affect. The OMB has stated that we must pass their IT security muster before we can get any funding for IT equipment/services for FY 2002, yet it makes no mention (AFAIK) of any requirement for user education. Cluelessness is, alas, self-perpetuating. Sic semper bureacracy. RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center, US DoI Robert_G_Ferrell@n... ------------------------------------------------------------ Nothing I have ever said should be construed as even vaguely representing an official statement by the NBC or DoI. ------------------------------------------------------------ 416 From: Date: Wed May 24, 2000 7:35pm Subject: Re: Maryland to Drop Linda Tripp Wiretap Case I just want to know who bought the judge. Monica is at least as credible as Bill is! Guppy 417 From: Hoffman Date: Thu May 25, 2000 9:05am Subject: Interesting Article- A counteropinion. ----------------------------------------------- jma> There is no legitimate reason for someone to be jma> posting under an alias or to be using an anonymous jma> name (unless of course they are engaging in mischief). What a bunch of nonesense. If I only had a penny for every time I heard somebody make that statement so authoritatively. Where exactly does the Bill of Rights deal with authentication of computer users? Where exactly is this dealt with in federal law that mandates authentication? Perhaps God him or herself told you this is the way it should be? I dont know... but there exists no law which mandates that everyone has to identify themselves. First, the notion that only "criminals" want privacy is totally asinine. As a security professional to even elude to that fact is an absurdity. That statement is just based on false logic. Being anonymous does not imply that you have criminal intent anymoreso than using voice and fascimile encryption implies that your transmissions contain illegal information which you encrypted to protect yourself. Secondly from my political standpoint, no person should ever have to justify their desire or need for online privacy anymoreso than they should have to justify the desire to own a firearms or a pack of Hostess brand Twinkees for that matter. We live in a country based on the honorable belief of "innocent until proven guilty" and thus there exists no need for any law which requires the authentication of every computer user. Such a mentality is akin' to declaring every person a potential suspect. If companies want to implement such authentication plans voluntarily in the interest of "security", then so be it. As for government mandating identification requirements; if that day ever comes it will just force more and more people to open up anonymous blinder type services both inside and outside the United States. The more you attempt to tighten the vice on peoples privacy, the stronger people will fight back with alternative schemes which protect privacy. ------------------------------- jma> One of the biggest problems with Yahoo and jma> similar services which offer "chat board services" jma> is that they are deliberately indifferent to security, jma> and that by allowing customers to hide behind and jma> alias they foster an environment of decent and fraud. This sounds like typical "anti-gun" logic at work. Once again, you have people who think it is a great idea to implement "registration" plans which will affect the privacy of all the good people, while it will do almost nothing to stop the bad people who will unquestionably find ways around the registration system. Criminals operate "outside" the law. Just as they often buy guns illegally on th black market and modify the guns; thus circumventing the 20,000 gun laws in America, you can be sure that any potential "cyber criminals" will find it a trivial task to bypass any user authentication schemes; just as they often do nowadays. ------------------------------------ jma> One of the biggest problems with Yahoo and similar jma> services which offer "chat board services" is that they jma> are deliberately indifferent to security.... ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Hoffman resplies: I think Yahoo, et al. would stronly disagree with you. Those companies DO care about security. You seem to be under the impression that Yahoo or AOL are responsible for playing big daddy for the entire world. They're not. A companies first and foremost interest is to protect itself. No company is obligated to protect everyone in the entire world. People need to be responsible and start protecting themselves. ----------------------------------------- This is an old debate. Sadly it has not been resolved yet 2 decades later. Online providers [should] ideally be given the full protection of common carriers. They should be nearly immune from the responsibilities of any content that occurs through their system. They should be viewed as conduits for that information, and should NOT be burdened with the impracticle responsibility of having to sift through every byte of data in search of potential wrongdoing by account holders and anonymous users. ---------------------------------------- jma> I am familiar with the stock manipulation scam jma> of which you are referring to in your message. jma> In a matter of weeks the stock went from 1/128th jma> to 9 dollars a share (a 1000+ fold increase), and jma> it was all traced to several brokers using an jma> Prodigy chat room and "rumor mongering". Hoffman replies: Speaking as a casual day-trader of online stocks, I realize how complex such matters can be. However, my opinion is that attempting to track down such "crime" is a waste of time, unless of course you are just in it for the money and don't really care about "justice" or common sense for that matter. The regulations of the Securities and Exchange Commision are really quite absurd and esoteric and are more akin' to some piss ante technical rule violation than any kind of ""crime"", and I do not see any need to track down such people. Knowledge people, or not so knowledgable people who have an "ounce" of common sense live by the old saying "let the buyer beware". One should always research their products or investments to a satisfactory degree before you get involved in any financial dealings. It should not matter if you are buying a used car, or stocks and commodities. There is a difference between outright fraud and deceit, versus manipulation of stock prices via rumor mongering. The former is simply wrong from a moral standpoint because it does involve deceit. The latter is a pisse ante technical violation of some SEC rule which involves no real fraud or deceit. Manipulating stock prices merely amounts to rumor mongering with a specific goal of making some money for yourself. Making money for yourself is what the world of business is about. If you make money for yourself at the expense of other investors when the scheme collapses.... oh well... thats also business. The other investors should heed the advice; buyer beware. [eof] 418 From: gerard p. keenan Date: Thu May 25, 2000 11:29pm Subject: digest 258 As most of you know, I don't often post to the list. But I just wanted to commment on "Negative's" remarks. I do agree that we all want privacy; whether it be on the internet or anywhere else in our private lives. Business is one thing -- personal is personal. However, as we all know, there's really no such thing as complete anonymity -- not for criminals, not for law-abiding citizens, not for anyone. Anyone who thinks so is living in another dimension at best, possibly another world. I, like "Negative", do not trust people very much when I can see them. But in my business I've handled assignments from people I've never seen and never even spoken to on the phone. And they've done the same. Payments have been received where appropriate -- including currency conversions. You have take a step sometime. The reason I don't trust people very much is because I spent 25 years in US government service -- 20 years active duty Navy, and 5 Naval Security and Investigative Command as a civilian. I left gov't service in 1988. Resigned. Lack of trust was part of it. I couldn't work for people who's only goals were self gratification. I thought it was bad in the military -- I had no idea how bad it really was until I entered Civil Service as a GS-7 Security Specialist. I lasted 5 years; less, actually, if you consider I had nearly a 10 month "vacation" between my Navy retirement and taking a GS-7 position that was offered to me (I retired as an E-6, so I figured it was a step up no matter how looked at it (hehe)). But one of the comments "Negative" made doesn't really hold up. He said that privacy, the attitude differences, is really different between here and Europe. And he's right. But I don't think he was right in the manner he though. I'm kinda curious about what he/she meant by this difference. I can get a criminal records check on anyone anywhere in the USA, and even Canada and Puerto Rico. But just try to get one in the United Kingdom. In that country it's actually illegal, and you can be charged with a criminal offense, just for trying to obtain a criminal records check on a subject -- unless you're a serving sworn law enforcement officer or attorney (and you have to be working on case involving that person). Not so here. And, if I remember correctly, the same is true in Germany and several other European countries. That's just one example. But there are many others. In fact, I'm sure a lot of you have already heard about the EU's Data Protection laws. This covers everything; virtually. You can't even make a snide or any kind of derogatory remark about someone over the internet (and yes, these lists and forums are covered under the law) without running the risk of being sued in a European court. Are our privacy laws really so much tighter than Europe's? I think not. Anyway, just my $0.02 worth, and a little venting (I need after the last couple of weeks I've had -- gotta take it out on someone! I'm married to an Irish girl from Brooklyn, so I'm not about to take it out on her!! (heheh). Take care. Jerry GPKeenan Co., Int'l Security Services 1005 Celia St. West Islip, NY 11795-2503 (631) 587-4020 (ph) (516) 768-9602 (mobile) (530) 323-6832 (jfax) gkeenan@s... secureops@e... [Non-text portions of this message have been removed] 419 From: Date: Fri May 26, 2000 0:17am Subject: Privacy. I feel this post is off topic so I will keep it brief. I agree that total privacy/anonymity is an impossibility. My observations on Northern Europe are from a purely social standpoint. To try to sum up what will inevitably be a long winded set of examples I will give one. If a U.S. citizen is asked what the U.S. is about he/she will most likely answer something to the effect of "freedom". If a Dutch citizen is asked what the Netherlands are about, he/she will most likely answer "tolerance". I feel that the Northern European society as a whole is trying to move forward into a more 'utopian' world. While I feel that the U.S. is moving into an Orwellian world. Or should I say has..... I would like to digress into deeper constructs for the current state of world affairs, but this is not the place. Let me state that I am a U.S. patriot and would die in its Defence. That is not to say that I do not fault it in its ways. Negative-. 420 From: Date: Fri May 26, 2000 7:51am Subject: Re: Maryland to Drop Linda Tripp Wiretap Case In a message dated 5/26/00 9:28:42 a Pacific Daylight Time, PGibson957@a... writes: > I just want to know who bought the judge. Monica is at least as credible as > Bill is! My thoughts exactly. Frustrating, isn't it? 421 From: James M. Atkinson, Comm-Eng Date: Fri May 26, 2000 4:44pm Subject: Memorial Day 2000 As most of you know Monday is memorial Day in the United States. In recognition to those who made the ultimate sacrifice for our freedom I have uploaded some materials onto the main web page on our site. http://www.tscm.com/index.html The piece I have uploaded was written by Benjamin Britten and is called "War Requiem, Opus 66" which was first performed for the rededication of St. Michael's Cathedral in Coventry (which was been destroyed during the bombings of World War Two). -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== From: Aimee Farr Date: Mon May 21, 2001 5:04pm Subject: Bartnicki Opinion link (was..Eavesdropping law) http://supct.law.cornell.edu/supct/html/99-1687.ZS.html BARTNICKI v. VOPPER "Although this case demonstrates that there may be an occasional situation in which an anonymous scanner will risk criminal prosecution by passing on information without any expectation of financial reward or public praise, surely this is the exceptional case." Never mind what you think about the opinion, that is a dumb statement. Aimee E. Farr Attorney At Law Texas mailto:aimfarr@p... 3063 From: Steve Uhrig Date: Mon May 21, 2001 5:51pm Subject: Re: Eavesdropping Law Once upon a midnight dreary, Dawn Star pondered, weak and weary: > WASHINGTON (Reuters) - The U.S. Supreme Court ruled on Monday > that the news media may not be held liable for disclosing the > contents of telephone calls that have been illegally intercepted > and recorded by someone else. The high court by a 6-3 vote said > free speech and freedom of the press protections under the First > Amendment prevent such liability from being imposed under a > federal wiretapping law designed to prevent the interception of > private conversations. Justice John Paul Stevens said for the > court majority that when a publisher has lawfully obtained > information from a source who has obtained it unlawfully, the > government may not punish the ensuing publication. I wonder if this could apply to law enforcement? If so, this nullifies the Fruit of a Poisonous Tree impeachment of evidence. All law enforcement would have to do is arrange a cutout between them and an illegal intercept. Then they could act on the info and hide behind the rationale that someone else did the illegal act, not them. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3064 From: Elliott & Associates, Ltd. Date: Mon May 21, 2001 6:44pm Subject: Re: Re: Eavesdropping Law Steve is right, this ruling from the court could have a far reaching effect on evidence which is obtained illegally. All law enforcement would need to say is they got it in the mail from an anonymous source. Bill Elliott, CII ELLIOTT & ASSOCIATES, Ltd. (GMT -7) http://www.prvt-eye.com 3065 From: Steve Whitehead Date: Sun May 20, 2001 1:24am Subject: Hackers set to get the chop "Proposed new law would jail computer criminals for offences that don't exist yet. BOBBY JORDAN COMPUTER hackers face prison sentences of up to 10 years, according to proposed new computer crime legislation. The Computer Misuse Bill, published last week in a report by the South African Law Commission, signals the biggest crackdown yet against cyber boffins who cause millions of rands in damage to the economy. Last year a 30-year-old computer programmer took revenge on a major chain store when his salary was slashed by half, crashing the company's computers at more than 600 stores and causing losses of more than R1-million. He could not be prosecuted because computer crime does not exist on the statute book. But if the long-awaited new law comes into effect, it will be illegal for an authorised person to: - Damage or tamper with a website; - Access somebody else's computer; - Tamper with, remove, or add information to somebody's computer; - Prevent access to a computer through sabotage or damage to a computer server; and - Pass on another person's computer password. In addition the law would give the police the power to seize computer hardware or access a computer and demand a person's password. Failure to provide the password could lead to arrest. The law could therefore help in the fight against material such as child pornography by allowing police to check any computer to see what material has been downloaded. The Law Commission has called for public comment on the Bill, after which it could be amended and submitted to the Justice Ministry. "As technology advances, the risk of computers either becoming the instruments of crime or targets thereof increases. Consequently, computers are becoming particularly vulnerable to crime," the Law Commission report said. "The option of introducing new offences by way of legislation should be seriously considered." Researcher Pieter Smit, who helped to draft the report, said the Computer Misuse Bill was intended to complement existing criminal law to deal with abstract property "that does not exist in the physical world". "Information stored on a computer is something abstract - for that reason the commission suggests that new offences be placed on the statute books," Smit said. "What was just abuse in the past can now be an offence." The Law Commission would also be looking at crimes committed over the Internet, such as spreading a computer virus, Smit said. South Africa's top cyber cops have reported a dramatic increase in cyber-terrorist attacks both locally and elsewhere in the world. Last year a virus called "I love you" caused an estimated $6-billion of damage to global markets, prompting many countries to bolster computer security. More recently hackers infiltrated the World Economic Forum systems at Davos, Switzerland. There have also been attacks on the official website of the Johannesburg Stock Exchange and other South African sites, prompting the military to protect sensitive information on its computer sites. South Africa's top cyber cop, Ian Melamed, said the new law would require prosecutors, investigators and judges to be up to date on technology. "Two of the latest computer viruses that had an enormous disruptive effect in South Africa were written right here," he added" Story at http://www.suntimes.co.za/2001/05/20/politics/pol01.htm Steve Whitehead E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa TSCM Services URL : http://www.tscm.co.za [Non-text portions of this message have been removed] 3066 From: Dragos Ruiu Date: Mon May 21, 2001 7:39am Subject: RF propagation in Rebar Concrete (video/802.11) I was wondering if anyone knows the depth in feet (or parkade levels :-) that consumer level transmitters(i.e. 802.11 wlan, 2.4ghz, etc) can transmit through north american building code rebar concrete? And.... are who manufactures the highest power integrated rf camera (or gretest tx depth through rebar anyway, I'm not sure if that means highest power :-)? thanks for any info, --dr 3067 From: Greg H. Walker, Attorney At Law Date: Tue May 22, 2001 8:26am Subject: Eavesdropping Decision Dawn Star wrote: > > Supreme Court Protects Press From Eavesdropping Law > > WASHINGTON (Reuters) - The U.S. Supreme Court ruled on Monday that the news media may not be held liable for disclosing the contents of telephone calls that have been illegally intercepted and recorded by someone else... GREG REPLY'S, Actually this is more of a warning than a reply -- Please, Please, Please do not interpret this decision too broadly. Remember the matter was disclosed by the news media (historically has held a special place in the hearts of the Court) concerned a conversation by some people that had thrust themselves into the public arena dealing with a public matter (public school teachers' pay) and concerned a serious matter (blowing up someone's porch). The Court normally rules very very narrowly, i.e., a fairly specific set of facts and they may view another set of facts, even though they appear the same to you and I, quite differently. So, before you do anything or refrain from doing anything based upon this decision, please consult an Attorney of your own choosing, with whom you have established an Attorney/Client relationship by mutual agreement, and have him/her read the case and apply it to your then specific set of facts. Don't guess on your own as guessing ends up causing lawsuits. Remember the basic rule of Risk Management: Don't Risk a Lot For a Little" GREG -- Greg H. Walker Attorney At Law President RisKontroL -- Risk Management, Security Consulting & Investigations Houston, Texas (713) 850-0061 3068 From: Agent Lovato Date: Tue May 22, 2001 0:32am Subject: RE: UK Labour supports email spy policy

 All this from Governmental agencies that practice, "Plausible Denial".  See the attached and at least arm yourself with some sort of strong encryption.


 

  Miguel Puchol <mpuchol@w...> wrote:

__________________________________________________ Do You Yahoo!? Yahoo! Auctions - buy the things you want at great prices http://auctions.yahoo.com/ [Non-text portions of this message have been removed] 3069 From: DrPepper Date: Tue May 22, 2001 9:56am Subject: Re: RF propagation in Rebar Concrete (video/802.11) Dragos Ruiu wrote: > I was wondering if anyone knows the depth in feet (or parkade levels :-) that > consumer level transmitters(i.e. 802.11 wlan, 2.4ghz, etc) can transmit > through north american building code rebar concrete? > As far as I know, there have been no specific imperical tests for that particular situation. However, this kind of penetration will require a combination of both higher power and frequency adjustment. The only way to find that answer is to test it yourself. Right now, with the propagation the way it is, you will see some variations in the QRN, (atmospheric static) particularly at the higher frequencies. I have seen some problems with my X10 camera transmitting a signal at 2.4 gHz 30 feet through two stucco building walls. Sometimes it's great, other times it just turns to kaka. (a technical term:) It's the propagattion, more than the materials it goes through, at least at those frequencies.If you have problems, you might try increasing the voltage to the transmitter, say from 6v to 9 or even 12 volts. Be careful not to take it too far, though. Do this at your own risk. Results will vary. -- Dr Pepper aka WB6GKI in the High Desert of California. ACI Engineering Check out my LIVE Ham Shack at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ================================================= > > And.... are who manufactures the highest power integrated rf camera (or > gretest tx depth through rebar anyway, I'm not sure if that means highest > power :-)? > > thanks for any info, > --dr > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3070 From: Steve Uhrig Date: Tue May 22, 2001 7:33pm Subject: Interesting procurement http://www.bidradar.com/2001/05/23/aoy4116.fcbd Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3071 From: James M. Atkinson, Comm-Eng Date: Wed May 23, 2001 9:24am Subject: The Three Sons Three sons left home, went out on their own and prospered. Getting back together, they discussed the gifts they were able to give their elderly mother. The first said, "I built a big house for our mother." The second said, "I sent her a Mercedes with a driver." The third smiled and said, "I've got you both beat. You remember how mom enjoyed reading the Bible? And you know she can't see very well. So I sent her a remarkable parrot that recites the entire Bible. It took elders of the church twelve years to teach him. He's one of a kind. Mama just has to name the chapter and verse, and the parrot recites it." Soon thereafter mom sent out her letters of thanks: "Milton," she wrote one son, "The house you built is so huge. I live in one room, but I have to clean the whole house." "Gerald," she wrote to another, "I am too old to travel. I stay home most of the time, so I rarely use the Mercedes. And the driver is so rude!" "Dearest Donald." She wrote to her third son, "You have the good sense to know what your mother likes. The chicken was delicious. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3072 From: David Alexander Date: Wed May 23, 2001 3:36am Subject: re: not-so funky chicken I read Dawn Star's submission with a groan. I've heard and seen wildly varying versions of this so many times over the last 20 years, here's the true story. A friend of mine from my Cambridge days, Alan, worked for the R&D part of the UK Ministry of Defence back in 1983, as part of his Engineering degree course. The UK had, at the time, just built this 'airgun' for doing 'birdstrike' testing (that's the technical term for a bird hitting an aircraft) at their main facility in Farnborough, Hampshire (where the big International Air Show is held). I am sure the US also built one, I would not like to venture a guess about who had the idea first. The part about the trains is true, it was a British Rail team testing what would happen if a Swan or some such large mass object hit the front of one of their new high-speed (150 mph) trains. They did use a frozen chicken and it did make a hell of a mess. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 3073 From: James Kilgallen Date: Wed May 23, 2001 4:54am Subject: urban propagation (re-bar etc.) Folks- I would suggest that those of you interested in propagation modelling for urban environments do a quick search with Google. There are a lot of ray-based propagation techniques that have already examined and catalogued empirical data for concrete, re-bar, etc. Some of the software available will accurately predict paths between objects, buildings, etc. Jim James Kilgallen jekilga1@h... PGP - 0xFDCDE75C Fax 508-526-2656 3074 From: Shannon Mishey Date: Wed May 23, 2001 9:12am Subject: Keyless remote outages Keyless remotes affected by the March and April outages share a common frequency used primarily by the U.S. military. http://www.bremertonsun.com/news/2001/may/05131keyless.html 3075 From: DrPepper Date: Wed May 23, 2001 10:31am Subject: FOIA problem question Last year, our School District (In California), Purchased a ìVideo systemî for our High School.. Basically, it covers both the areas inside the buildings, as well as the area outside,on the grounds. Since Iím kinda in this business, I went to the District Office and requested to see the file on this procurement, under the California Open Records Act (similar to the federal FOIA). They hemmed and hawed, and gave me a stack of blank forms, then stalled some more. Finally, they refused to let me see the information, and had their lawyer tell me that if Imade any further requests, I would be ignored! MY POINT IS:, , , , , They used public tax dollars to spend $78,000.00 for this system, and now they wonít allow the people who paid for it to see where the money went. Does anyone have any comments or suggestions? Thanx -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my shack LIVE at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 3076 From: Charles P Date: Wed May 23, 2001 5:49pm Subject: Re: Keyless remote outages Interesting dilemma they had. >>>>>>>>>>>> Outages of the type that hit Bremerton, affecting a 50-square-mile area for several days or several hours, are a rarity and too large to be caused by amateur radio operations, he said. "That takes a lot of power," he said. "I'd say it would take at least 100 watts to take out something that large." By contrast, a ham radio signal operates at about 10 watts and a citizens band radio operates at about 4 watts. <<<<<<<<<<<<<<<<<< They may need a bit more understanding of what's available in ham radio, my 2 meter mobile is 25 w low power and 45 w high power, throw on a linear amp and 100 watts is not a problem. charles ----- Original Message ----- From: "Shannon Mishey" To: Sent: Wednesday, May 23, 2001 10:12 AM Subject: [TSCM-L] Keyless remote outages > > Keyless remotes affected by the March and April outages share a common > frequency used primarily by the U.S. military. > > http://www.bremertonsun.com/news/2001/may/05131keyless.html > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3077 From: Aimee Farr Date: Thu May 24, 2001 10:59am Subject: Wireless freq. jamming "for God" From: http://www.wirelessnewsfactor.com/perl/story/9856.html (Black-letter illegal in the US.) ''ISS has released its Mobile Blocker jamming device that can block wireless phone and pager signals within a 40-meter (135-foot) circle. Using an encoded signal from a base transmitter that is emitted at the same frequency of pager and cellular communications, the ISS blocker prevents calls from being received or initiated and delivers a text message such as "No Service" or "Out of Range" to the devices, the company explained.'' _Q_: Is there a "thingie" ...*batty eyelashes*...that tells you when your cellie is being "JAMMED," asks the TSCM-L twit? ''Mobile Blocker was developed at the request of an international customer, which the company declined to name, that wanted to block mobile phone and pager use during religious services, ISS said.'' Says so in their FAQ, too: http://www.mobileblocker.com/faqs.htm Hm...a 'CUSTOMER' who has 'religious services' and avails themselves of a "complete suite of wireless video and data transmission systems and covert/overt video surveillance systems." Hm. "This is a cost-effective solution to maintain a quiet environment for places of worship, theaters, restaurants, boardrooms and museums," said Bill Sowell, vice president of business development at ISS. (Special modifications available for qualifying parties.) 5,000 went to the Middle East. _Q_: Uhm, places of worship? Aimee E. Farr Attorney At Law Texas aimfarr@p... Misc. background media on cell jamming: http://www.msnbc.com/news/544178.asp?cp1=1 http://www.newhousenews.com/archive/story1a092200.html 3078 From: Dawn Star Date: Thu May 24, 2001 11:17am Subject: Information Practices Act Request the information under the Information Practices Act of 1977 California Civil Code section 1798 From: DrPepper Subject: FOIA problem question Last year, our School District (In California), Purchased a "Video system" for our High School.. Basically, it covers both the areas inside the buildings, as well as the area outside,on the grounds. Since I'm kinda in this business, I went to the District Office and requested to see the file on this procurement, under the California Open Records Act (similar to the federal FOIA). They hemmed and hawed, and gave me a stack of blank forms, then stalled some more. Finally, they refused to let me see the information, and had their lawyer tell me that if Imade any further requests, I would be ignored! MY POINT IS:, , , , , They used public tax dollars to spend $78,000.00 for this system, and now they won't allow the people who paid for it to see where the money went. Does anyone have any comments or suggestions? Thanx 3079 From: Steve McAlexander Date: Thu May 24, 2001 0:59am Subject: RE: Keyless remote outages THREAT ASSESSMENT TOOL SERVICE--CANCELLATION OF SOLICITATION #RFP-7311 & ISSUANCE OF SOLICITATION OF RFP#-7328 [Procurement] The Federal Bureau of Investigation (FBI) has a requirement for a subscription service to a nation-wide, comprehensive socio-economic public source database, available through Contractor's website over the Internet, which contains cleaned, digitized, geocoded, spatially relevant data sets from various governmental and commercial sources. The subscription service shall provide a website-driven application for a minimum of 150 concurrent users. In addition the subscription service shall operate on any desktop or portable workstation through the Internet and shall support any version of Microsoft Explorer or Netscape. The contract will be for one (1) year with two (2) option years and contingent upon FY 2001 funding. The FBI intends to issue a Request for Proposal (RFP)- 7328 including all items and specifications. Requests for this solicitation should be submitted in writing within 15 days of this publication to Angela Kornegay, JEH-FBI Building, Room 8504, 935 Pennsylvania Avenue, NW, Washington, DC 20535. [Note vendors that submitted written requests to the previous Solicitation package RFP-7311 need not submit an additional request. Solicitation package for RFP-7328 will be issued, no sooner then 15 days after this publication.] -----Original Message----- From: Shannon Mishey [mailto:smishey@m...] Sent: Wednesday, May 23, 2001 09:12 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Keyless remote outages Keyless remotes affected by the March and April outages share a common frequency used primarily by the U.S. military. http://www.bremertonsun.com/news/2001/may/05131keyless.html Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 3080 From: DrPepper Date: Thu May 24, 2001 0:05pm Subject: Re: Information Practices Act been dere, dun dat, , They still are stonewalling me. ========================== Dawn Star wrote: > Request the information under the Information Practices Act of 1977 > California Civil Code section 1798 > > From: DrPepper > Subject: FOIA problem question > Last year, our School District (In California), Purchased > a "Video system" for our High School.. Basically, it > covers both the areas inside the buildings, as well as the > area outside,on the grounds. > Since I'm kinda in this business, I went to the District > Office and requested to see the file on this procurement, > under the California Open Records Act (similar to the > federal FOIA). > They hemmed and hawed, and gave me a stack of blank > forms, then stalled some more. Finally, they refused to > let me see the information, and had their lawyer tell me > that if Imade any further requests, I would be ignored! > MY POINT IS:, , , , , > They used public tax dollars to spend $78,000.00 > for this system, and now they won't allow the people > who paid for it to see where the money went. > Does anyone have any comments or suggestions? > Thanx > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my shack LIVE at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 3081 From: Shannon Mishey Date: Wed May 23, 2001 9:04pm Subject: Re: Keyless remote outages Well on the bright side they made a distinction between ham radio and citizens band, I don't know how many times I have been asked by neighbors about all the CB antennas at my house, if that isn't the ultimate put down. :) Hams can legally able put out up to 1500 watts in that region of the spectrum too, though the signal would not be on 315 MHz directly, but perhaps a harmonic of 2m. At 06:49 PM 5/23/01, Charles P wrote: >Interesting dilemma they had. > > >>>>>>>>>>>> >Outages of the type that hit Bremerton, affecting a 50-square-mile area for >several days or several hours, are a rarity and too large to be caused by >amateur radio operations, he said. >"That takes a lot of power," he said. "I'd say it would take at least 100 >watts to take out something that large." >By contrast, a ham radio signal operates at about 10 watts and a citizens >band radio operates at about 4 watts. ><<<<<<<<<<<<<<<<<< >They may need a bit more understanding of what's available in ham radio, my >2 meter mobile is 25 w low power and 45 w high power, throw on a linear amp >and 100 watts is not a problem. > >charles > > >----- Original Message ----- >From: "Shannon Mishey" >To: >Sent: Wednesday, May 23, 2001 10:12 AM >Subject: [TSCM-L] Keyless remote outages > > > > > > Keyless remotes affected by the March and April outages share a common > > frequency used primarily by the U.S. military. > > > > > http://www.bremertonsun.com/news/2001/may/05131keyless.html > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > >Your use of Yahoo! Groups is subject to the >Yahoo! Terms of Service. 3082 From: Robert G. Ferrell Date: Thu May 24, 2001 2:20pm Subject: Re: Wireless freq. jamming "for God" >''Mobile Blocker was developed at the request of an international customer, >which the company declined to name, that wanted to block mobile phone and >pager use during religious services, You'd think God could handle that without having to hire a contractor. Man, it seems like *everyone* is outsourcing these days. Cheers, RGF 3083 From: A Grudko Date: Thu May 24, 2001 7:48am Subject: Re: Keyless remote outages ----- Original Message ----- Sent: Thursday, May 24, 2001 12:49 AM Subject: Re: [TSCM-L] Keyless remote outages > Interesting dilemma they had. > Outages of the type that hit Bremerton, affecting a 50-square-mile area for > several days or several hours, are a rarity and too large to be caused by > amateur radio operations, he said. > "That takes a lot of power," he said. "I'd say it would take at least 100 > watts to take out something that large." > By contrast, a ham radio signal operates at about 10 watts and a citizens > band radio operates at about 4 watts. I missed the previous string on this topic and I don't know who is quoted above or the full context but, "That takes a lot of power," he said. "I'd say it would take at least 100 watts to take out something that large" Gasp - a 100 watts!....100 watts powers the average home light bulb. Most FM radio stations here pump out a comfortable 25 000 watts to cover under 50 km radius. 1kw amps are common in the CB domain. Pick a frequency and a ham can build a 10kw amp for the cost of a lunch. Rather look to the sunspot maxima which interrupted most terrestrial communications on that side of the planet that day. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Associates - Crime investigation, intelligence and protection Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom - "When you need it done right - first time" 3084 From: Steve McAlexander Date: Thu May 24, 2001 9:14pm Subject: FW: the HAARP Project Speak your mind in the Counter Intelligence Forum What are the Strangelovian knuckleheads from military intelligence cooking up in a remote corner of the Alaskan wilderness? Um... believe it or not, they're frying the ionosphere in a reckless attempt to turn the Earth's atmosphere into a giant X-Ray device... And if it weren't for the brave efforts of whistleblowers like Nick Begich and Jeane Manning, no one would be the wiser! The potential environmental Armageddon which is the HAARP Project is MAJOR news in countries like Australia, why do so few Americans know what their government is up to? And ask yourself why did the Navy feel the need to produce that spiffy 'official' HAARP website after HAARP became such a hot topic on the Internet? Disinformation? You decide.... HAARP <<...OLE_Obj...>> <<...OLE_Obj...>> <<...OLE_Obj...>> <<...OLE_Obj...>> "The High Frequency Active Auroral Research Program or HAARP for short, is being built in Gakona, AK under the auspices of the Office of Naval Research and the Air Force Philips Laboratory. Many feel that HAARP has the potential to CATACLYSMICALLY damage the earth's atmosphere by deliberately heating the ionosphere." The Military's Pandora's Box <<...OLE_Obj...>> <<...OLE_Obj...>> <<...OLE_Obj...>> <<...OLE_Obj...>> "This expose written by Drs. Nick Begich and Jeanne Manning explains how documents published by former National Security adviser (and Trilateral Commission member) Zbigniew Brzezinski regarding HAARP type research show the potential for geophysical, environmental and PSYCHOLOGICAL warfare resulting from the military budget being diverted to such efforts... SICK!" HAARP: VANDALISM IN THE SKY <<...OLE_Obj...>> <<...OLE_Obj...>> <<...OLE_Obj...>> <<...OLE_Obj...>> " From the progressive political magazine Nexus, this article by Dr. Nick Begich and Jeanne Manning gives an update on their book 'Angles Don't Play This HAARP.' ESSENTIAL READING." Alternative HAARP Page <<...OLE_Obj...>> <<...OLE_Obj...>> <<...OLE_Obj...>> <<...OLE_Obj...>> "The anti-HAARP counterpoint to the 'offical' HAARP site from Naval Intelligence... Notice the clever parody of the offical site's design. Impressive." In Search of... <<...OLE_Obj...>> <<...OLE_Obj...>> <<...OLE_Obj...>> <<...OLE_Obj...>> "One of the best HAARP resources on the WWW. Period. This has tons of high quality links too." ARCO, Eastlund and the Roots of HAARP: <<...OLE_Obj...>> <<...OLE_Obj...>> <<...OLE_Obj...>> " Short article by tireless HAARP whistle blower Gar Smith from Earth Island Journal, gives the background on how ARCO's desire to profit from natural gas resources in a remote area of Alaska led to the Navy's launching of HAARP." HAARP: Are There Issues to Concern Physicists? <<...OLE_Obj...>> <<...OLE_Obj...>> <<...OLE_Obj...>> "From Physics and Society (April 1994), this editorial points out that the scientific community needs to keep a close eye on the HAARP project and how the technology and technology resulting from the HAARP research is used." <<...OLE_Obj...>> <<...OLE_Obj...>> <<...OLE_Obj...>> If you enjoyed this DisInformation dossier on The HAARP Project you can send an email bomb of it to your friends (or your enemies for that matter, be creative!) with our patented DisInformation Flame Tool (tm) Please complete the following form and fire away! Top of Form 1 <<...OLE_Obj...>> <<...OLE_Obj...>> <<...OLE_Obj...>> <<...OLE_Obj...>> <<...OLE_Obj...>> <<...OLE_Obj...>> <<...OLE_Obj...>> Your Name * <<...OLE_Obj...>> Your E-Mail Address * <<...OLE_Obj...>> Recipient 1's Email * <<...OLE_Obj...>> Recipient 4's Email <<...OLE_Obj...>> Recipient 2's Email <<...OLE_Obj...>> Recipient 5's Email <<...OLE_Obj...>> Recipient 3's Email <<...OLE_Obj...>> Recipient 6's Email <<...OLE_Obj...>> <<...OLE_Obj...>> * = required Use of the Disinfo Flame Tool(tm) is subject to these conditions of use . Please click here before using the Flame Tool(tm). Bottom of Form 1 Steve McAlexander AT2 800-208-9838 Toll Free 210-493-6050 x103 210-316-6489 Cellular 3085 From: DrPepper Date: Fri May 25, 2001 10:08am Subject: Propagation This is why the short range, high frequency stuff has been terrible lately, , , , ============================================ B PROP ARL ARLP022 ARLP022 Propagation de K7VVV Geomagnetic conditions were quieter this week, and solar flux and sunspot numbers were a little higher. Average solar flux was up nearly 10 points and average sunspot numbers were up by about 7. Last Saturday had unsettled to active geomagnetic conditions, with both the planetary and mid-latitude K indices at 4 over two of the eight three-hour reporting periods, but the planetary A index for the day was only 12. Solar flux is expected to peak over the next week. Solar flux for Friday is predicted at 165, and then 170 for Saturday through Tuesday. The predicted planetary A index for Friday through Monday is 8, 10, 20 and 12. The earth is currently inside a solar wind stream flowing from a coronal hole. Sunspot 9463 is rapidly growing at the center of the disk, and holds the greatest chance of emitting solar flares. A holographic image of the far side of the sun shows no substantial sunspots that might rotate into view in the next couple of weeks. This weekend HF contesters will be enjoying the CQ Worldwide WPX CW Contest. Conditions should be good on Saturday, but may get rough on Sunday with higher geomagnetic activity. Sunspot numbers for May 17 through 23 were 137, 109, 92, 99, 118, 159 and 192 with a mean of 129.4. 10.7 cm flux was 147.4, 138.2, 141.3, 141.5, 150.1, 152 and 158.7, with a mean of 147, and estimated planetary A indices were 9, 11, 12, 10, 8, 9 and 11 with a mean of 10. NNNN /EX -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my shack LIVE at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 3086 From: zack <10-33@c...> Date: Fri May 25, 2001 10:53am Subject: Help I would like to know if any of you can help. A persons website has been recieveing very hateful mails on their guestbook. It is CGI sript and I am trying to trace this person. The ISP says they cant help, I dont belive that, they have to log to file ?? If any of you have had this problem, please let me know, and contact me. The website is at http://www.sarahsarchangels.com visit http://www.copscops.com Join the Law Enforcement community http://anexa.com/lawenforcement/index.Ihtml Washington DC Police Department http://www.mpdc.org 3087 From: A Grudko Date: Sat May 26, 2001 4:30am Subject: Re: Wireless freq. jamming "for God" ----- Original Message ----- From: Aimee Farr >> ''ISS has released its Mobile Blocker jamming device that can block >> wireless phone and pager signals within a 40-meter (135-foot) circle. Using >> an encoded signal from a base transmitter that is emitted at the same >> frequency of pager and cellular communications, the ISS blocker prevents >> calls from being received or initiated and delivers a text message such as >> "No Service" or "Out of Range" to the devices, the company explained.'' > _Q_: Is there a "thingie" ...*batty eyelashes*...that tells you when your > cellie is being "JAMMED," asks the TSCM-L twit? Dr Smith, cardiologist, sits in the cinema, secure in the knowledge that his staff can get him on his cell phone or pager. On exiting the Mobile Blocker's 40 metre circle he learns that while he watched 'Rocky 11', 2 of his patients died because the unit's staff could not get hold of him. Possible. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Associates - Crime investigation, intelligence and protection Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom - "When you need it done right - first time" 3088 From: Steve Uhrig Date: Sat May 26, 2001 6:35am Subject: Re: Wireless freq. jamming "for God" Once upon a midnight dreary, A Grudko pondered, weak and weary: > Dr Smith, cardiologist, sits in the cinema, secure in the > knowledge that his staff can get him on his cell phone or pager. > On exiting the Mobile Blocker's 40 metre circle he learns that > while he watched 'Rocky 11', 2 of his patients died because the > unit's staff could not get hold of him. EXCELLENT point. One instance of this, with attendant legal action, and that would be the end of the jammer idea (which are illegal in the U.S. anyways). Even the potential for liability would prevent most U.S. users from doing something like this. If a restaurant or movie theater or something tried, not only would the FCC nail them, but they'd have legal exposure in the type of situation you mentioned above. People refer to 'cell jammers'. In the U.S., there are at least seven distinct systems with distinct technologies and frequencies, providing mobile telephone service, and each would require a separate jammer. Some are spread spectrum, so they would not be easy to jam. The method I can envision would be to pop some overriding or interfering carrier on the control frequencies, of which there can be up to fifteen on certain U.S. analog or digital cell systems. The idea would be to kill the control channel, and then the mobile could not register with the system and thus could not be paged with a call. That would mandate potentially up to fifteen transmitters, each output needing to be multicoupled into an antenna. This alone would be expensive, large and delicate, and that is for only one of the types of mobile phone system. I have an ongoing request from prisons in Colombia where I have an office and do commo intercept work, to provide jammers to prevent prisoners from using smuggled cell phones. I am a real customer, and would buy many, if any one of the ten or so companies I've seen who claim to manufacture these things could actually supply them. I've contacted every one I could, offered to pay for a demo or even fly to their facility to inspect a unit, and not one has even been able to send me a tech sheet on their alleged product. All I get is vague promises and descriptions of where they could be used. So I am convinced no one actually has a working one, and all they are looking for is their name in lights for a few minutes, and a lot of controversy generated and discussions like this. I really wish someone would be able to show me a working unit for at least one common technology like GSM. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3089 From: Date: Fri May 25, 2001 10:46pm Subject: New members in need of equipment I'm new myself to this group and it can be scary, wondering who you can trust for new aquisitions and upgrading of equipment. On a policeman's salary, I know this stuff can be a finacial strain. But worst of all, is being taken by someone that only wanted your money and not what's in your best interest. I've been fortunate enough to have stumbled upon an excellent, trustworthy source of new and used TSCM equipment. Those who have been in this group for any amount of time already know what I just found out. For those of you who haven't, I can whole heartedly recomend Steve Uhrig at SWS Security. I know from first hand experience that Steve will be candid and honest about what he sells. Give him a bump at www.swssec.com. To talk more about my experience with SWS or if your ever in the Detroit area, let me know; Chad offdutysecurity@h... 3090 From: Steve Whitehead Date: Sat May 26, 2001 10:01am Subject: Re: Re: Wireless freq. jamming "for God" Steve Uhrig wrote " So I am convinced no one actually has a working one, and all they are looking for is their name in lights for a few minutes, and a lot of controversy generated and discussions like this. I really wish someone would be able to show me a working unit for at least one common technology like GSM" I can assure you that there are many units in operation all around the World. The CTN-100 (http://www.sesp.co.il) as well as the BlockPhone (http://www.winkelmann.co.uk) works very well in the 925 - 960 MHz (GSM) band. Units are now also available for the 1800 MHz bands. We will soon be offering a South African manufactured cellular jammer (GSM) in a variety of options and configurations. (Export only) The units are very effective as countersurveillance and crime fighting tools on an appropriate level. Steve Whitehead E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa TSCM Services URL : http://www.tscm.co.za 3091 From: A Grudko Date: Sun May 27, 2001 3:52am Subject: GSM jamming -- Original Message -- From: Steve Uhrig > In the U.S., there are at least 7 seven distinct systems with distinct technologies & > frequencies, providing mobile telephone service, and each would require a separate > jammer. Some are spread spectrum, so they would not be easy to jam. > The method I can envision would be to pop some overriding or interfering carrier > on the control frequencies, of which there can be up to fifteen on certain U.S. analog > or digital cell systems. The idea would be to kill the control channel, and then > the mobile could not register with the system and thus could not be paged with a call. Our analog system was decommissioned about 5 years ago and totally replaced by GSM cellular. We have 2 service providers but both use identical technology and frequencies. Overseas visitors with GSM phones can use them here and we can use ours in many countries. A third licence is being negotiated on the system and a second band is on the cards, I think up at about 1.6 gigs. Anyway, my point is that at present we could jam all 900 meg cellphones with one piece of equipment. An Israeli company was offering the equipment using the method you suggest but at a very high price here. I had enquiries but the cost was prohibitive so I did not test one. I have recently been offered a locally made unit at about 20% of the price. I'll find out if it really exists, just for fun - I understand that it does not 'solve the problem' in the US but it's interesting to know if the technology exists, works and the TSCM implications. I'm also interested in the obvious implications of any jamming technology to VIP Protection details as we train and supply such persons. Regards from a cool morning (19C) in the mountains 50 km NW of Johannesburg Andy Grudko. D.P.M., Grad I.S, (S.A.) Grudko Associates - Crime investigation, intelligence and protection Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom - "When you need it done right - first time" From: john schmitt Date: Tue May 21, 2002 0:14pm Subject: Re: DESCRIPTION OF SA BUGGING DEVICE !!!!!!!! Is it that the Watchdog is good at finding monkey feces, or that monkey feces are equally good as the Watchdog at finding bugs. It really makes a difference, you know, depending on what you're trying to do and how much you wish to spend. ----- Original Message ----- From: "James M. Atkinson" To: "TSCM-L" Sent: Tuesday, May 21, 2002 12:25 PM Subject: Re: [TSCM-L] DESCRIPTION OF SA BUGGING DEVICE !!!!!!!! > > The Watchdog is as effective at finding bugs as monkey feces. > > I had an evaluation unit here for a while, and put it though numerous > lab tests. I even opened the unit up and did a circuit analysis, and > was appalled at the shoddy design. > > The thing was/is effectively deaf to even strong signals, and was > nothing more then an overpriced toy and gimmick. > > -jma > > > > > > At 4:34 PM +0200 5/21/02, Secdep wrote: > >WATCHDOG W-100 > > > > > > > >Product Introduction > > > >The WatchDog is a network form bugging detection device that detects > >bugging devices and hidden cameras quickly and accurately by > >utilizing through search and analysis methods. > >The WatchDog is a high class complex system in which both frequency > >counter and frequency spectrum analysis features work con-currently > >and it is a industrial system that can be remote controlled and > >managed via connection to the company network(LAN) through various > >interfaces. > >All users can easily get every detailed information via graphic > >screen and computer s/w(MMI: Man Machine Interface) supported by > >WatchDog for more efficient management. > >By using tracking signal and FM demodulation, every users and system > >operators can make accurate decision and stamp out all the bugging > >devices. > > > > > > > > > > > >Product's Characteristics > > > >Wide Area Frequency Bandwidth Search > > > > a.. Frequency Range: 1.7MHz ~ 2.4GHz > > b.. Receiver Sensibility: -110dBm ~ -60dBm > > c.. Detection Area: Approx. 1068ft2 > >Detection Method > > > > a.. Comparison: average frequency value, abnormal frequency > >detection via frequency strength > > b.. Tracking surveillance: track and saves after detecting > >abnormal frequency > > c.. Tracking signal: detects the presence of latest sound > >activated bugging devices such as VOX by sending out entrapment > >signals with its internal speaker > > d.. Voice demodulation: 1.7MHz ~ 2.4GHz > > e.. Alarm step: -110dBm ~ -60dBm > > f.. Elimination of common use frequency : Approx. 1068ft2 > > > >Network Management > > > > a.. Interface support: Ethernet, RS-232C, RS-485, discrete input / output > > b.. Remote control: alarm and status inspection, environment > >setting, confirmation of detailed in- formation > > c.. Alarm confirmation: summation of alarm event along with 10 > >other events > > d.. Industrial application: possibility of remote control of > >units via internet or network configuration of company LAN > > e.. S/W provision: provides MMI (Man Machine Interface) > > f.. S/W specialized in computer and network management > > g.. Network configuration > > > > > > > > > > > > > >Graphic LCD > > > > a.. Onsite verification: real time search and graphic screen support. > > b.. Alarm verification: event indication feature > > c.. Environment setting: surveillance bandwidth frequency chart > >inquiry and editing > > d.. Verification of saved data: recording and verification of > >event occurrence time and system setting alteration time. > > e.. Frequency counter and spectrum > > f.. Automatic fixation: in case of the detection of abnormal > >frequency, user can listen to the sound regenerated from the > >detected specific abnormal frequency on corresponding warning or > >alarm occurred channel using earphone > > g.. Manual fixation: if a frequency that is in doubt is detected > >then user can manually lock to the specific channel and verified > >strength of the frequency, past data, current data and listen to the > >sound regenerated from the frequency > > h.. Environment setting: inquiry and editing of Surveillance > >frequency chart > > i.. Spectrum: One can verify the entire frequency spectrum via > >graphic LCD and computer s/w > > > > > > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > > > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > -- > > -------------------------------------------------------------------------- ------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------- ------------------------ > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > -------------------------------------------------------------------------- ------------------------ > "...three shall be the number to count, and the number to be counted shall > be three.....four shall thou not count......five is right out". - M. Python > ------------------------------------------------------------------------ -------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5434 From: The Protector Date: Tue May 21, 2002 9:58am Subject: Spammers could face fines I know this is off topic but this is something I think we all should support! Spammers could face fines Reuters May 17, 2002, 12:20 PM PT A bill aimed at limiting unwanted junk e-mail was approved and sent to the floor by the Senate Commerce Committee on Friday with unanimous support from Democrats and Republicans. It would strengthen the Federal Trade Commission's enforcement authority by allowing it to impose fines of up to $10 each on e-mails that violate existing laws against spam, with a cap of $500,000. Sen. Conrad Burns, a Montana Republican and co-sponsor of the legislation, said the bill would help both e-commerce and consumers burdened by unsolicited junk or pornographic e-mails. "Rampant pornography and fraudulent credit deals were never the destiny of the Internet, but they have become commonplace fixtures in in-boxes everywhere," he said. No similar measure is pending in the U.S. House of Representatives. New Mexico Republican Rep. Heather Wilson's bill requiring spammers to use a legitimate return address--so unwanted e-mail can more easily be blocked--has not yet been scheduled for a vote. Twenty-two states have passed anti-spam legislation. Spam has especially been a problem for rural consumers, many of whom pay long-distance charges for Internet connections and waste time and money erasing their unwanted e-mails, Burns said. The Senate Commerce Committee on Friday approved an amendment by Sen. Barbara Boxer, a California Democrat, that would prohibit transmitting unwanted e-mails to addresses that were illegally obtained from Web sites. Co-sponsor Sen. Ron Wyden, an Oregon Democrat, said moving the bill would help the FTC deal with thousands of complaints it has received about spam. "The problem is, the technology is on the side of the spammer," Wyden said. The proposal would also require e-marketers to include a working return address to allow recipients the option of refusing further e-mails, and give Internet service providers the ability to bring suit to keep unlawful spam off their networks. It would also subject spammers who intentionally disguise their identities to misdemeanor criminal penalties. ===== Leopold T. Altman III Member IAPPA, ABA, IALEFI, ASLET, etc... American Institute of Executive Protection http://www.americanexecprotection.com. AIEP@s... because chance favours the prepared mind! __________________________________________________ Do You Yahoo!? LAUNCH - Your Yahoo! Music Experience http://launch.yahoo.com 5435 From: Scott Malcolm Date: Tue May 21, 2002 2:03pm Subject: Re: Enemy of the State I found it more creepy that they use Uhrig's legs in the closing shot standing on the beach . Regards, Scott Malcolm Malcolm & Associates, Inc. Your Confidential Alternative Serving the State of Wisconsin http://www.execpc.com/~conf-pi Office 262 965 4426 / Fax 262 965 4629 Message: 4 Date: Mon, 20 May 2002 23:17:44 -0400 From: McIntyre Subject: Re: Enemy of the State Does anyone else find it creepy that the birthday of Thomas Brian Reynolds character (played by Jon Voight) is 9/11/40 ? _____________________________________________ 5436 From: Michael Puchol Date: Tue May 21, 2002 3:10pm Subject: Re: Re: Enemy of the State > EVERYBODY has a birthday (anniversary of their birth, actually) on > one of the 365 days of the year. For every disaster which occurs, on > average 1/365 of the population will have been born on that day. > > Steve Never better said - I have to live with Sept. 11th being Catalonia's national celebration day, a bit like the 4th of July in the U.S. I was home with my family that day celebrating, when we watched the whole tragedy unfold, in real time, as it happened...the cake remained at the table, uneaten. Mike 5437 From: Aimee Farr Date: Tue May 21, 2002 3:55pm Subject: Cry-wolf Cure I've had it with political ya-ya and "poo-pooing" warnings....leaks, sensationalized media stories....and YUCK! Barton Whaley sampled 93 cases of strategic military deception in '69 dating to 1914 (first stroke, new front, attack on dormant front). o The probability of a warning of an attack was 78%. o In the face of a warning, 93% of "attackers" achieved surprise. o Those were traditional wars, and not clandestine warfare, or "terrorism" Are warnings not successful? No, but they're rarely perfect. It does tend to suggest a positive correlation with an "attack," however. It's also hard to tell which ones led the enemy to change their mind. Our situation is not helped by the fact that I imagine interpretation is difficult, not just in terms of what is said, but the MEANING. One of the reasons cited for the failure to predict the 1973 Middle East War was because analysts became desensitized to the bellicose nature of Arab exchanges, which tend to express ideal thoughts and represent what is hoped for as a fact, as honor and revenge is central to their culture. (Cry-wolf is built-in to some cultures.) Egypt also consciously exploited Western conceptualizations of Arab ineptness and increased the noise level to trigger false alerts, so as to precondition for a surprise attack on Israel. (Another of the reasons cited for the U.S. failure to predict was that analyst manuals referred to Arabs in less than "fighting-man" terms, which anchored analyst predictions.) As is typical, decision-makers "do their duty" to talk about "worst-case scenarios," leading initially, to a feeling of paralysis, rather than innovation and ingenuity (action). Britain didn't think anything could be done against the German rockets, bombers, or gas attacks either, and estimated they were CRAWLING with parachuted "5th Columnists." They ended up doing quite a bit -- the best of British ingenuity -- and the best solutions were cognitive. The public got into the act, recognized the true nature of the threats, and rose to the occasion. Every enemy has a mind and makes decisions. They aren't lightning. Stay on the watch, ~Aimee 5438 From: Matthew Paulsen Date: Tue May 21, 2002 5:30pm Subject: RE: Re: Enemy of the State I got married on 9/12. If I hadn't been doing that, I'd most likely have been at WTC2, fl 93 meeting with Vanessa Langer, lost in the attack, who worked at a company called Regus (a really nice class a office renting company) to open up our offices for expanding our company to New York. My old offices here in Portland were in WTC1 with them, so it made natural sense to expand from WTC1 in PDX to WTC2 in NYC. Life can be strange sometimes. But it can be fun as well. Since I've gotten married, I'm now looking forward to my first child arriving in 3 weeks. Matt -----Original Message----- From: Michael Puchol [mailto:mpuchol@s...] Sent: Tuesday, May 21, 2002 1:11 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Re: Enemy of the State > EVERYBODY has a birthday (anniversary of their birth, actually) on > one of the 365 days of the year. For every disaster which occurs, on > average 1/365 of the population will have been born on that day. > > Steve Never better said - I have to live with Sept. 11th being Catalonia's national celebration day, a bit like the 4th of July in the U.S. I was home with my family that day celebrating, when we watched the whole tragedy unfold, in real time, as it happened...the cake remained at the table, uneaten. Mike Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5439 From: James M. Atkinson Date: Tue May 21, 2002 9:23pm Subject: Probe hears of spy device http://www.bday.co.za/bday/content/direct/1,3523,1089622-6078-0,00.html Probe hears of spy device Former Western Cape community safety MEC Hennie Bester has told the Desai Commission he was aware of the controversial WatchDog electronic device in the provincial legislature. The device, which can both detect electronic bugging and monitor conversations, was discovered after a National Intelligence Agency sweep of the buildings earlier this year. Bester told Judge Siraj Desai that he had attended one meeting in a special strongroom in the legislature building where the box-like WatchDog was fixed to the wall. "I remember seeing it there. It looked like something you programme your garden irrigation with," he said. When he asked about it he was told it was "something that detects surveillance, but whether it was operational or not I can't tell you." He said those at the meeting with him had been former premier Gerald Morkel, and finance MEC Leon Markovitz, as well as then provincial director general Dr Niel Barnard, but he could not remember what the meeting was about. Bester told the judge that he thought it was "a bit odd" to be meeting in the strongroom where the only furnishing was a set of plastic coated aluminium garden furniture. However, at that time there had been an environment of intense distrust in Western Cape politics and attempts were being made to overthrow the Democratic Alliance provincial government. "It was a time of unbelievable suspicion and distrust, as times like those tend to be," he said. "We had discussions very often about whether we were being placed under surveillance or not. It was a common theme." He said he was aware that arrangements were made for the provincial offices to be swept for electronic bugs by private contractors. Asked why a private firm would be used rather than a government counter intelligence agency, he replied: "To be quite honest our suspicion was we were being surveilled (sic) by agencies of the national government". Bester said he had not been aware of the purchase of the WatchDog or the creation of the safe room. However, steps were taken from time to time to safeguard conversations from being overheard, and clearly these measures were part of those attempts. Bester, now leader of the official opposition in the Western Cape legislature, lost his MEC post when the DA was ousted by New National Party premier Peter Marais in December last year. Sapa -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5440 From: Hawkspirit Date: Wed May 22, 2002 0:59am Subject: Line Sweeps Just got this in my e-mail and it looks like there is another wiretap detecting miracle on the horizon headed our way! Roger >From: Mark Barrueta >Subject: Line Sweeps >To: info@b... > >FYI., If you offer any type of Telephone Line Check's such as wire tap >detection, Your going to love this economical TROUBLESHOOTING and Wiretap >detection device. "urn:schemas-microsoft-com:office:office" /> > > > >National Phone Check, is introducing the new device known as "Line >Detective" which deals with Privacy & Security on hard wire telephone lines. > > > >It's affordable., it's small, it's mind boggling. I understood Ross >Engineering who is pretty much the Guru's in wiretaps, qualified this >device as being the only device that actually work's., > > > >Pretty much all you do is connect it like a normal telephone device, And >it only takes seconds to detect wiretaps., > > > >It's not a scam device like those blinky lights they on those spy shops. >And you don't have to be a telephone guy to use it., the common person >with minimal training can use it. > > > >They are introducing this to Selected Inter-Connect Companies and related >telephone people in the Los Angeles area at Pacific Place 10505 Valley >Blvd, in El Monte, CA on Tuesday, ( May 28th ), "invitation only" It's >off of the 10 Fwy and the Santa Anita Exit. > > > >My friends, we are able to get in on this demo., also > > > >PLEASE DON NOT LET THIS OPPORTUIITY GO BY., > >At least show up and at least see the demo work., You make your own >decision., > >the demo is free, you can't loose. > > > >Please I beg you, not to get ripped off by all those scam blinky light >devices that don't work. Please look into this, it will revolutionize the >way we make money on line sweeps., > > > >I get people asking me why we can charge less than 300 bucks on line >check, when everyone else is charging megabucks. > > > >My Collogues, as professionals, were all in together, their is no reason >why you can't have the same technology that we have., I want you to have >it, it makes us all look good when we can do professional line sweep and >not some dog and pony show., A lot of us know our stuff on R.F sweeps, >but how reliable are were we, on line checks ? Please take the time to >just look into this device. You would be doing a dis-service to your >clients. > > > >Call 800 number and reserve your seat for free. > >If not, e-mail me and I will compose a list. > > > >The Number is 1-(800) 598 0649., tell you her you got an > >e-mail from me and that your in the security private investigative field. > > > >Good Luck ., Hope to see you all there., > > > > > >Do You Yahoo!? >LAUNCH - Your Yahoo! >Music Experience 5441 From: Matthew Paulsen Date: Wed May 22, 2002 2:26am Subject: RE: Line Sweeps I'm gonna be rich! >It's affordable., it's small, it's mind boggling. and it's NOT FOR SALE! DoH! There goes that Idea. Pic here http://www.nationalphonecheck.com/TheAnswer.htm "( DEVICE NOT FOR SALE ) Licensed technology only ...." 'It's not a scam device ' SCAM SCAM SCAM my brain cries. Why say what it isn't if it is what you say it is? >PLEASE DON NOT LET THIS OPPORTUIITY GO BY., Schlock. I can understand a typo in email, but this is supposed to be a marketing / sales pitch and looks like it was typed up by a spam remailer hosted in China. Even thinking about that makes me wonder if this was unsolicited, if so it was probably illegal. I'd rather flip burgers at McDonalds if I to choose between the two career options that this person is presenting. Buy this, sell this, or, work at McDonalds. Yep, I could make general manager in 2, 3 years tops.. And think of the fringe benefits, the fries I tell you. >like a normal telephone device Wow! A cure for my prayers. Digital or analog, powered or non, inline or tapped, US or Euro, It'll work on an Intel Blue BRI. Man, that's gotta be a good device. I gotta have one now. "It is capable of detecting problems on a phone line by checking the line from your phone all the way back to and inside the phone companyís central office." Wow.. can figure out computers too. Hey Jim, it's got a useful ethernet port! RJ48 also. not bad :) I wonder if it does SC fiber as well. Maybe ATM hmm.. maybe we can hook it up to a frame relay connection and test the line. Yea, I bet the CSU/DSU would love that. Maybe it sprouts a brand new multifunction physical adapter that switches interfaces when you feed it tribbles. Hey, does it lay golden eggs? >Please I beg you, not to get ripped off by all those scam blinky light >devices that don't work. Buy ours instead if you're going to waste the money, it has no lights, so you won't be angry when it doesn't work. You won't know. Me, I like the blinky lights... On my modems, my routers, my switches and hubs and pretty much anything else that has a light that means something worthwhile. They tell me what's going on. What a concept. RTFM and rely on a light and not a software app that's too convoluted to use. Oh, and for all you hardware engineers. I miss those non-green and red colored lights. Like blue. That was the bestus color of all. > the common person >with minimal training can use it. and.. >the demo is free, you can't loose. Cool. Send me a demo unit. Fly me to CA, I need to meet a few prospective clients in City of Industry anyways. I qualify. I know jack about 99e99% of TSCM and can be considered the common person for this test. I want to learn about your device. Send me one or bring me down. You can mail it here: PO Box 7183 Beaverton, OR 97007-7183 Heck, every reseller should have one, their so cheap, and as the manufacturer, you probably have thousands, or tens of thousands of units due to your most likely extensive manufacturing and fulfillment facilities to support a large acceptance of the product by the common person. Even AT&T will be happy to sell your product for you no doubt. You should happily give us lowly resellers NFR units to test and use to understand before we sell. After all, NAI gladly gave me complete copies of their enterprise application suites without a though, worth hundreds of thousands of dollars, which we promptly installed and sold hundreds of licenses to our clients once we got a handle on it. PS - I got 2 shirts and cool little microscope toys as well, so don't stiff me on the goodies or the slick packaging the device comes in since it'll be selling in Wal-Mart soon. >I understood Ross >Engineering who is pretty much the Guru's in wiretaps, qualified this >device as being the only device that actually work's., Wow. The Guru. Who again? >it only takes seconds to detect wiretaps., Why do I get a rat/feederbar image coming to mind. Don't electrical signals travel at roughly 1/10th the speed of light through metal(roughly folks, this isn't a physics question in a h/w lab, I'm not asking for a comparative analysis of gold vs lead.)? , isn't this device a bit slow if so. Guess it runs on rats. Oh yea.. can't wait to get my hands on one o' these.. . Maybe I'll sell one to my buddy in marketing, he'll be a good suck...er...customer. -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Tuesday, May 21, 2002 11:00 PM To: TSCM Subject: [TSCM-L] Line Sweeps Just got this in my e-mail and it looks like there is another wiretap detecting miracle on the horizon headed our way! Roger >From: Mark Barrueta >Subject: Line Sweeps >To: info@b... > >FYI., If you offer any type of Telephone Line Check's such as wire tap >detection, Your going to love this economical TROUBLESHOOTING and Wiretap >detection device. "urn:schemas-microsoft-com:office:office" /> > > > >National Phone Check, is introducing the new device known as "Line >Detective" which deals with Privacy & Security on hard wire telephone lines. > > > >It's affordable., it's small, it's mind boggling. I understood Ross >Engineering who is pretty much the Guru's in wiretaps, qualified this >device as being the only device that actually work's., > > > >Pretty much all you do is connect it like a normal telephone device, And >it only takes seconds to detect wiretaps., > > > >It's not a scam device like those blinky lights they on those spy shops. >And you don't have to be a telephone guy to use it., the common person >with minimal training can use it. > > > >They are introducing this to Selected Inter-Connect Companies and related >telephone people in the Los Angeles area at Pacific Place 10505 Valley >Blvd, in El Monte, CA on Tuesday, ( May 28th ), "invitation only" It's >off of the 10 Fwy and the Santa Anita Exit. > > > >My friends, we are able to get in on this demo., also > > > >PLEASE DON NOT LET THIS OPPORTUIITY GO BY., > >At least show up and at least see the demo work., You make your own >decision., > >the demo is free, you can't loose. > > > >Please I beg you, not to get ripped off by all those scam blinky light >devices that don't work. Please look into this, it will revolutionize the >way we make money on line sweeps., > > > >I get people asking me why we can charge less than 300 bucks on line >check, when everyone else is charging megabucks. > > > >My Collogues, as professionals, were all in together, their is no reason >why you can't have the same technology that we have., I want you to have >it, it makes us all look good when we can do professional line sweep and >not some dog and pony show., A lot of us know our stuff on R.F sweeps, >but how reliable are were we, on line checks ? Please take the time to >just look into this device. You would be doing a dis-service to your >clients. > > > >Call 800 number and reserve your seat for free. > >If not, e-mail me and I will compose a list. > > > >The Number is 1-(800) 598 0649., tell you her you got an > >e-mail from me and that your in the security private investigative field. > > > >Good Luck ., Hope to see you all there., > > > > > >Do You Yahoo!? >LAUNCH - Your Yahoo! >Music Experience Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 5442 From: William Knowles Date: Wed May 22, 2002 2:34am Subject: Security scare puts Pa. power plants on alert http://www.cnet.com/investor/news/newsitem/0-9900-1028-9940105-0.html?tag=ats 5/21/02 5:45 PM Source: Reuters NEW YORK, May 21 (Reuters) - Alarms sounded at Pennsylvania power plants this weekend, already on heightened alert after the Sept. 11 attacks, when two "Middle Eastern-looking" men unsuccessfully tried to enter a rural power plant, industry officials said on Tuesday. The two men, who told authorities they were contractors, fled from the Westwood power plant not far from the state capital of Harrisburg when guards asked them for identification before allowing them inside. The guards immediately notified local police, the FBI and PJM, the regional power grid operator. The rural, natural gas-fired power plant, owned by WPS Resources Corp., is about 35 miles (56 km) north of the state capital of Harrisburg. State and federal agencies said they either had not heard of or declined to comment on the episode. Local police said they could provide no information on the mens' identities or whereabouts. An FBI spokeswoman declined to confirm whether they had even been told of the incident. "We are cooperating fully with local authorities and the FBI," said Jim Streed, spokesman for plant owner WPS. A spokesman for the PJM power grid said they alerted local utilities and plant operators to the incident as soon as they heard about it. "We got the notice from WPS and sent it out to our other power plant and utility members," Ray Dotter, the PJM spokesman, said. Dotter said they also notified the National Infrastructure Protection Center, a branch of the FBI that deals with the nation's energy, telecommunications and water infrastructure. A spokesman for the Pennsylvania Governor's Office said the State Office of Homeland Security was not aware of the incident and had not seen any security memo on the subject. But memos of the episode describing the men as "Middle Eastern in origin" were circulated among the region's power traders and control room operators. Power plants nationwide have been on a heightened state of alert since the Sept. 11 hijacked airplane attacks on the Pentagon and New York City. Earlier Tuesday, the FBI warned New Yorkers of "general threats" against the city, its bridges and other landmarks. 5443 From: Jim Conrad Date: Wed May 22, 2002 11:31am Subject: Tempest Item 4Sale If anyone is in need of a tempest pen plotter or just wants a tempest enclosure in excellent condition I have one for sale; http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=2026258278 <:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:> Jim Conrad - jjc@o... or jimc1790@a... (backup) 757-560-5970 Office/Voicemail/Pager - 757-587-8251 Fax CAGE 0UD60 - http://www.oceanviewcom.com/ 5444 From: Jordan Ulery Date: Wed May 22, 2002 3:29pm Subject: Ross Engineering The following is a quicki check from Jeeves. Apparently there is a ROss Engineering. I wonder if they are aware their neame(s) are being used? 1. Ross Engineering Corporation Ross Engineering Corporation have specialized in producing the highest quality High Voltage, Control, Measurement, Test and Safety Equipment since 1964. Our devices are sold worldwide and ar... From: http://www.rossengineeringcorp.com/ 2. Ross Design & Engineering (C) 2001 Ross Design & Engineering, Inc. Development by Precision Design Systems, Inc. Ross Design & Engineering, Inc. has remained in the forefront of the manufacturing industry since 1... From: http://www.rossdesign.net/ 3. Welcome to The Ross Engineering Home Page Ross Engineering Associates, Inc. From: http://www.rosseng.com/ 4. ROSS Engineering Company Web Site Ross Engineering is the leading manufacturer of marine VHF Radios using the latest in Digital Selective Calling technologies From: http://www.rossdsc.com/ This email and any files transmitted with it are confidential and intended solely for the use of the individual(s) or entity to whom they are addressed. This communication may contain material protected by the attorney-client privilege and the attorney work product doctrine. If you are not an intended recipient, or the employee or agent responsible for delivering this message to an intended recipient, be advised that you have received this e-mail in error and that any disclosure, forwarding, copying, printing, or distribution of the contents of this transmission is strictly prohibited, and may carry legal sanction and/or penalties. Any unauthorized access, disclosure, copying, distribution, or use of the content of this message/information is prohibited by federal law. Attempts to intercept this message are in violation of 18 USC 2511(1) of the Electronic Communications Privacy Act, which subjects the interceptor to fines, imprisonment and/or civil damages. If received this e-mail in error, return! [Non-text portions of this message have been removed] 5445 From: Matthew Paulsen Date: Wed May 22, 2002 0:27pm Subject: RE: Ross Engineering Ross Engineering is marketing the product on their website for a convention that is TSCM related. Thanks, Matt Paulsen Orange Networks LLC - Computers, Networks, Internet and Security http://www.orange-networks.com 503.533.4767 -----Original Message----- From: Jordan Ulery [mailto:jordan@u...] Sent: Wednesday, May 22, 2002 1:29 PM To: TSCM Subject: [TSCM-L] Ross Engineering The following is a quicki check from Jeeves. Apparently there is a ROss Engineering. I wonder if they are aware their neame(s) are being used? 1. Ross Engineering Corporation Ross Engineering Corporation have specialized in producing the highest quality High Voltage, Control, Measurement, Test and Safety Equipment since 1964. Our devices are sold worldwide and ar... From: http://www.rossengineeringcorp.com/ 2. Ross Design & Engineering (C) 2001 Ross Design & Engineering, Inc. Development by Precision Design Systems, Inc. Ross Design & Engineering, Inc. has remained in the forefront of the manufacturing industry since 1... From: http://www.rossdesign.net/ 3. Welcome to The Ross Engineering Home Page Ross Engineering Associates, Inc. From: http://www.rosseng.com/ 4. ROSS Engineering Company Web Site Ross Engineering is the leading manufacturer of marine VHF Radios using the latest in Digital Selective Calling technologies From: http://www.rossdsc.com/ This email and any files transmitted with it are confidential and intended solely for the use of the individual(s) or entity to whom they are addressed. This communication may contain material protected by the attorney-client privilege and the attorney work product doctrine. If you are not an intended recipient, or the employee or agent responsible for delivering this message to an intended recipient, be advised that you have received this e-mail in error and that any disclosure, forwarding, copying, printing, or distribution of the contents of this transmission is strictly prohibited, and may carry legal sanction and/or penalties. Any unauthorized access, disclosure, copying, distribution, or use of the content of this message/information is prohibited by federal law. Attempts to intercept this message are in violation of 18 USC 2511(1) of the Electronic Communications Privacy Act, which subjects the interceptor to fines, imprisonment and/or civil damages. If received this e-mail in error, return! [Non-text portions of this message have been removed] Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5446 From: Date: Wed May 22, 2002 8:41am Subject: Re: Ross Engineering In a message dated 5/22/02 10:29:56 AM Pacific Daylight Time, jordan@u... writes: << Ross Engineering Corporation >> A name we know and trust! 5447 From: Secdep Date: Wed May 22, 2002 1:33pm Subject: INTERNATIONAL EQUIPMENT SALES Over the years I have purchased equipment from all around the world. Often with disappointing results. The past year I have been buying equipment from Steve UHRIG. He has always delivered what he has said he would. Everything he has supplied has been in good condition & according to specifications he advertised. I am prepared to recommend Steve for International Purchases. Last week I ordered a TDR from him, yesterday it arrived, at half the shipping costs I could arrange. Raymond --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 5448 From: ed Date: Wed May 22, 2002 1:31pm Subject: GSM monitoring platform early last friday at the dayton hamvention i saw a covert 900mhz (european) gsm monitoring platform. it was nicely concealed in a medium-sized black suitcase with wheels and pull-out handle. inside were several late-model w-j modules, a dat recorder, and an earphone. serial port controlled by computer, but no pc or software was with it. only got a few seconds look at it as it dawned on me what it was. unfortunately, a spooky-looking plunked down the $1200 asking price and walked off with it without a word before i could. my guess is he was taking it out of circulation. is anyone on the list familiar with this system? i seem to recall some of the relatively small, black, w-j modules were in the 9000 series, but i can't be sure. -ed 5449 From: James M. Atkinson Date: Wed May 22, 2002 2:00pm Subject: Re: INTERNATIONAL EQUIPMENT SALES SWS Security a major resource for the profession, and Steve Uhrig in particular is a very reputable person, who is very well respected, extremely honorable, and always shoots straight. That said, Steve still dresses funny, and looks priceless in his stovepipe hat. -jma At 8:33 PM +0200 5/22/02, Secdep wrote: >Over the years I have purchased equipment from all around the world. >Often with disappointing results. > >The past year I have been buying equipment from Steve UHRIG. He has >always delivered what he has said he would. Everything he has >supplied has been in good condition & according to specifications he >advertised. > >I am prepared to recommend Steve for International Purchases. Last >week I ordered a TDR from him, yesterday it arrived, at half the >shipping costs I could arrange. > >Raymond >--- > >>From the desk of Raymond van Staden >Van Staden and Associates cc > >P.O. Box 1150 >Amanzimtoti >4125 >South Africa > >Tel: +27 (0)31 916-1262 >Fax: +27 (0)31 916-1263 > >Email: raymond@v... >Internet: http://www.vanstaden.co.za -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5450 From: Michael Puchol Date: Wed May 22, 2002 3:41pm Subject: Re: GSM monitoring platform $1200? For a wheely case with some blinking lights? That's a right rip-off. Any decent GSM test tool, such as an IFR, HP, Agilent, etc. will set you back at least a five-figure amount, and all (all?) those can do is test a handset for correct configuration, modulation, etc. and/or controlled network tests. They cannot demodulate any GSM transmission off the air. They are meant for network engineers, repair shops, tech support centers, etc. So, such box you saw was most probably a con... All the best, Mike ----- Original Message ----- From: "ed" To: Sent: Wednesday, May 22, 2002 8:31 PM Subject: [TSCM-L] GSM monitoring platform > early last friday at the dayton hamvention i saw a covert 900mhz (european) > gsm monitoring platform. it was nicely concealed in a medium-sized black > suitcase with wheels and pull-out handle. inside were several late-model > w-j modules, a dat recorder, and an earphone. serial port controlled by > computer, but no pc or software was with it. > > only got a few seconds look at it as it dawned on me what it > was. unfortunately, a spooky-looking plunked down the $1200 asking price > and walked off with it without a word before i could. my guess is he was > taking it out of circulation. > > is anyone on the list familiar with this system? i seem to recall some of > the relatively small, black, w-j modules were in the 9000 series, but i > can't be sure. > > -ed > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5451 From: Matthew Paulsen Date: Wed May 22, 2002 8:39pm Subject: Computer Terms for Rednecks From Novell, for Novell, self-proclaimed Rednecks. http://developer.novell.com/research/sections/viewpoints/lwaccess/2002/May/l 020501.htm Computer Terms for Rednecks Here are some definitions for common computer terms as interpreted by our "redneck" friends. Backup. What you do when you run across a skunk in the woods Bar Code. Them's the fight'n rules down at the local tavern Bug. The reason you gave for calling in sick Byte. What your pit bull done to cousin Jethro (I think I worked with Jethro on bootpfd. Matt) Cache. Needed when you run out of food stamps Chip. Pasture muffins you try not to step in Crash. When you go to Junior's party uninvited Digital. The art of counting on your fingers Diskette. Female Disco dancer Fax. What you lie about to the IRS Hacker. Uncle Leroy after 32 years of smoking Hardcopy. Picture looked at when selecting tattoos Internet. Where cafeteria workers put their hair Keyboard. Where you hang the keys to the John Deere Mac. Big Bubba's favorite food (I think I worked with this guy on WIN2NCS after Jethro was laid off from Wordperfect group. Or maybe it's the memory of that one REALLY HUGE McDonalds that's coming back to haunt me. Or that horrible Super 8 motel. Matt) Megahertz. How your head feels after 17 beers Modem. What ya did when the grass and weeds got too tall Mouse Pad. Where Mickey and Minnie live Network. Scoop'n up a big fish before it breaks the line Online. Where to stay when taking the sobriety test ROM. Where the Pope lives Screen. Helps keep the `skeeters off the porch Serial Port. A red wine you drink with breakfast Superconductor. Amtrak's employee of the year SCSI. What you call your week-old underwear Terminal. Time to call the undertaker San Jose School Board Designates "Geekonics" as a Second Language NEWS BULLETIN: Saying it will improve the education of children who have grown up immersed in computer lingo, the school board in San Jose, Calif., has officially designated computer English, or "Geekonics", as a second language. The historic vote on Geekonics--a combination of the word "geek" and the word "phonics"--came just weeks after the Oakland school board recognized black English, or Ebonics, as a distinct language. "This entirely reconfigures our parameters," said Milton "Floppy" Macintosh, chairman of Geekonics Unlimited, after the school board became the first in the nation to recognize Geekonics. "No longer are we preformatted for failure," Macintosh said during a celebration that saw many Geekonics backers come dangerously close to smiling. "Today, we are rebooting, implementing a program to process the data we need to interface with all units of humanity." Controversial and widely misunderstood, the Geekonics movement was spawned in California's Silicon Valley, where many children have grown up in households headed by computer technicians, programmers, engineers, and scientists who have lost the ability to speak plain English and have inadvertently passed on their high-tech vernacular to their children. Warning to all computer geeks: Speak English! Disclaimer: Lightweight Access brings you humorous observations and refreshing diversions to give you a break from the daily grind. Opinions expressed here do not reflect Novell's official position on anything. 5452 From: Matthew Paulsen Date: Wed May 22, 2002 8:48pm Subject: Cigarette smuggling trial tests antiterror law http://www.cnn.com/2002/LAW/05/22/cigarette.terror.trial/index.html Cigarette smuggling trial tests antiterror law May 22, 2002 Posted: 6:52 PM EDT (2252 GMT) By Kevin Drew CNN CHARLOTTE, North Carolina (CNN) -- Opening statements are scheduled to begin Thursday in North Carolina in a cigarette smuggling trial that will put a 6-year-old federal antiterrorism law to the test in a courtroom for the first time. The trial of brothers Mohamad and Chawki Hammoud will test the 1996 law that prohibits support for terrorist organizations, the same law that accused American Taliban John Walker Lindh is charged with breaking. Additionally, the trial will be the first U.S. case employing wiretap evidence gathered by the Canadian intelligence agency, CSIS. A CSIS employee -- who will be identified only by her first name -- will testify for the U.S. government. The government alleges the Hammoud brothers took part in a conspiracy that bought cheap cigarettes in North Carolina and resold them in Michigan without paying that state's higher cigarette taxes. Both brothers face charges of cigarette smuggling, money laundering and racketeering. Additionally, Mohamad Hammoud, 28, is charged with federal immigration fraud, and providing material support to a terrorist group, the Lebanon-based Hezbollah. If convicted, Mohamad Hammoud, the first person to be tried on the terror charge, faces up to 10 years in prison. If convicted and sentenced at maximum levels on the other charges, he could spend the rest of his life in prison. Earlier this month, Chawki Hammoud pleaded guilty to a federal immigration fraud charge. The case against the brothers began on July 20, 2000, when federal authorities in Charlotte charged 18 people, most from Lebanon, in an investigation into cigarette smuggling, money laundering and immigration violations. Charges were filed against 18 suspects, all but one of whom were arrested -- 16 in Charlotte and one in Detroit, Michigan. Most of the defendants in the case have already entered pleas and will testify against the Hammouds. In court papers, the group was said to have "put aside for Hezbollah several thousand dollars in cash representing the proceeds from trafficking in contraband cigarettes" plus donations from fund-raising activities among Hezbollah members or supporters in the Charlotte area. Mohamad Hammoud, identified as the group's leader, has been described in an affidavit as "well-connected to Hezbollah leaders in Lebanon," where he received military training and became "very comfortable around weapons." According to the affidavit, he is "dangerous because he would likely assist in carrying out any action against United States interests if he were required to do so by Hezbollah." Hezbollah, an Islamic group known as the "Army of God," is active in Lebanon, with support from Syria and Iran. The affidavit described Hezbollah as a "designated foreign terrorist organization." Hezbollah led a guerrilla war against Israel's 18-year occupation of a border zone in southern Lebanon. Israel withdrew in May 2000. The group is blamed for a number of terrorist attacks on U.S. interests, including the 1983 bombing of the U.S. Embassy and a Marine barracks in Beirut that killed 241 American military personnel. Authorities have not charged the Hammouds or any other defendants in the case with committing or planning violent or terrorist acts. The U.S. government alleges the Hammouds are leaders of a Charlotte-based cell for Hezbollah. Not only are the Hammouds accused of helping buy equipment such as night vision goggles for Hezbollah military commanders, they are accused of funneling thousands of dollars to Hezbollah. Defense attorneys, however, say the Hammouds were businessmen, who sympathized with a legitimate political and social organization that the U.S. government has illegally outlawed. Five additional defendants remain at large: one is believed to be in Canada; four in Lebanon. One of those charged is identified as Sheik Abbas Harake. According to the indictment, he is Hezbollah's military commander in the southern suburbs of Beirut, which is one of Hezbollah's strongholds. -- CNN's Henry Schuster contributed to this report. 5453 From: Matthew Paulsen Date: Wed May 22, 2002 8:50pm Subject: An FBI Field Agent and an Agent Speaks Out Against the Blame Game http://www.cnn.com/2002/ALLPOLITICS/05/20/time.fieldagent/index.html May 20, 2002 Posted: 3:02 PM EDT (1902 GMT) Everyone is caught up in the blame game. But nobody talks much about the fact that the now-famous Phoenix FBI memo, which warned last July that terrorists might be studying in American flight schools, is hardly unusual. The memo raised the possibility of attacks similar to what occurred. But reams of other, equally plausible memos--written before and after 9/11--are in the files as well. A constant stream of theories and proposals comes from FBI field offices to the bureau's headquarters in Washington. We agents see things we think are worth a closer look. We recommend opening a case. We recommend a wiretap, an undercover operation or around-the-clock surveillance. But all proposals need to be reviewed for legality, practicality and the potential of public backlash. If the Holland Tunnel in New York City imploded from a terrorist attack tomorrow, you could then find official memos about the vulnerability of that tunnel. Convicted terrorists are in prison now for conspiring to take it out. But that doesn't mean we should close it down or round up the Muslims who drive through it every day. The Phoenix memo's main proposal--a nationwide sweep of flight schools in search of al-Qaeda terrorists--now appears to be solid and rational. But if I had been a unit chief at FBI headquarters reading it last summer, my first thought would have been that such a sweep would lead to a massive hue and cry over "profiling" of Muslims. I would have been disinclined to push the memo upstairs. To justify such a sweep would have required far more than knowing that bin Laden was possibly trying to hijack a plane. Politicians and the media are talking about a failure to connect the dots, and the FBI and CIA can do more to share information with each other and local police. (Since 9/11, the bureau has been sharing raw reports just so it is not accused of holding anything back.) But I have not seen any pre-9/11 dots that could have been connected, at least with the FBI operating under current laws and guidelines. If we want to throw away most of the requirements for due process, then there is a lot more the FBI and police could do. But does the country want to go there? I don't think so. The public expects FBI agents to use instinct to surgically extract terrorists from society--and to do it without inconveniencing the public or infringing on innocent lives. Americans have unrealistic expectations about what law enforcement can do in a society in which personal freedom is deemed more important than public safety. Americans say they will give anything to be safe from terrorists. They don't really mean it. They would rather live in a free society than be completely safe. That means some dots won't ever be connected. The agent, a veteran of the Federal Bureau of Investigation, asked to remain anonymous. 5454 From: Matthew Paulsen Date: Wed May 22, 2002 8:56pm Subject: Virginia Wiretap Investigation Broadened http://www.msnbc.com/local/wrc/a1188523.asp RICHMOND, Va., 4:49 p.m. EDT May 8, 2002 - Federal prosecutors announced Wednesday that they will join the investigation into claims that Republicans illegally listened to confidential Democratic conference calls in March. U.S. Attorney Paul J. McNulty will join Richmond Commonwealth's Attorney David Hicks in directing the inquiry that has already produced four felony indictments against the former executive director of the Republican Party of Virginia. In a statement he said his office's involvement came, "in response to requests received from the Superintendent of the Virginia State Police and the Commonwealth's Attorney for the City of Richmond." "This is a partnership. It's going to be just like Project Exile has been, no different than what we've been doing over the past five years," Hicks said in a press conference, referring to a joint federal-state crackdown on crimes committed with firearms. The move also brings the Richmond office of the FBI into the investigation, McNulty said. Former state GOP director Edmund Matricardi III was indicted last month on four felony counts connected with the case. He pleaded innocent and contends that he had permission to join the calls because he got the numbers from former Democratic operatives. Claudia Tucker, chief of staff to House Speaker Vance Wilkins, is on leave since investigators said her cell phone was logged into a conference call among Democratic leaders. House Majority Leader Morgan Griffith has said that his aide and spokesman for the House GOP caucus, Jeff Ryer, may have witnessed some of the eavesdropping. Neither Tucker nor Ryer is charged. 5455 From: James M. Atkinson Date: Wed May 22, 2002 11:00pm Subject: Re: GSM monitoring platform Mike, It depends on how much you pay for the instrument, but many of them allow you to actually demodulate the the actual audio (and track the remote), and some even permit you to reach out and control the phone. -jma At 10:41 PM +0200 5/22/02, Michael Puchol wrote: >$1200? For a wheely case with some blinking lights? That's a right rip-off. > >Any decent GSM test tool, such as an IFR, HP, Agilent, etc. will set you >back at least a five-figure amount, and all (all?) those can do is test a >handset for correct configuration, modulation, etc. and/or controlled >network tests. They cannot demodulate any GSM transmission off the air. They >are meant for network engineers, repair shops, tech support centers, etc. > >So, such box you saw was most probably a con... > >All the best, > >Mike > >----- Original Message ----- >From: "ed" >To: >Sent: Wednesday, May 22, 2002 8:31 PM >Subject: [TSCM-L] GSM monitoring platform > > >> early last friday at the dayton hamvention i saw a covert 900mhz >(european) >> gsm monitoring platform. it was nicely concealed in a medium-sized black >> suitcase with wheels and pull-out handle. inside were several late-model >> w-j modules, a dat recorder, and an earphone. serial port controlled by >> computer, but no pc or software was with it. >> >> only got a few seconds look at it as it dawned on me what it >> was. unfortunately, a spooky-looking plunked down the $1200 asking price >> and walked off with it without a word before i could. my guess is he was >> taking it out of circulation. >> >> is anyone on the list familiar with this system? i seem to recall some of >> the relatively small, black, w-j modules were in the 9000 series, but i >> can't be sure. >> >> -ed >> >> >> >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== TSKS >> >> Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ >> >> > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5456 From: Secdep Date: Wed May 22, 2002 11:15pm Subject: Saga of suspicion in Cape bugging fracas-South Africa http://www.mg.co.za/Content/l3.jsp?a=11&o=3679 Saga of suspicion in Cape bugging fracas Ben Maclennan A saga of suspicion and distrust, spiced by high-level computer hacking, emerged in evidence to the Desai Commission on Tuesday. Former Western Cape community safety MEC Hennie Bester described how he and provincial cabinet colleagues once met in a high-security "bunker" in the legislature building. They sat on plastic-coated aluminium garden furniture, apparently installed because magnetic listening devices would not stick to it. And screwed to the wall was the controversial WatchDog, a device which can both detect electronic bugging and monitor conversations. "I remember seeing it there. It looked like something you programme your garden irrigation with," he said. Bester told Judge Siraj Desai that he thought it was "a bit odd" to be meeting in the specially-adapted strongroom. However, at that time there had been an environment of intense political distrust and attempts were being made to overthrow the Democratic Alliance provincial government. "It was a time of unbelievable suspicion and distrust, as times like those tend to be," he said. "We had discussions very often about whether we were being placed under surveillance or not. It was a common theme." He said he was aware that arrangements were made for the provincial offices to be swept for electronic bugs by private contractors. Asked why a private firm would be used rather than a government counter intelligence agency, he replied: "To be quite honest our suspicion was we were being surveilled (sic) by agencies of the national government." Bester said that at one point, then-provincial director-general Dr Niel Barnard urged that the province withhold all co-operation with the National Intelligence Agency (NIA) until it gave an assurance in writing that it was not bugging the provincial government. Bester said he and his colleagues in the province had had serious reservations about the NIA's political impartiality. He outlined a bid to set up a strategic planning and information management unit in the province. Though the unit was never implemented, hired consultants, some of them former National Intelligence Service operatives, were tasked to gather information and make recommendations in key areas such as combating crime. The products the province received from state intelligence agencies were in many cases not up to standard. His department could get more accurate information on the ongoing gang warfare on the Cape Flats from reading daily newspapers than the intelligence community provided. After a resurgence of vigilante action, including necklacing, he had asked the agencies for information on why it was happening. "Up to the day I left office, I hadn't got the information," he said. "How can government come up with a strategy if it hasn't got decent intelligence information?" Bester, now leader of the official opposition in the Western Cape legislature, also confirmed that senior figures in the DA in the Western Cape did debate whether to accept money from German businessman Jurgen Harksen. He said that though at least one of his colleagues favoured the proposal, to the best of his knowledge no money was actually accepted. "There was no decision (to take money). I took a very strong view on that," he said. Harksen is facing a string of fraud and tax charges in South Africa and Germany. Head of human resource management in the Western Cape administration, Bertie le Roux, told the commission later on Tuesday that the R26 000 WatchDog was apparently bought and installed in the safe room because it was a cheaper option than conducting regular sweeps of all offices. He confirmed evidence given to the commission on Monday that there had apparently been no proper authority for the purchase of the device, which was discovered by the NIA after it did a sweep of the legislature in March this year. Le Roux also told the commission of senior officials' ongoing concerns about security, eavesdropping and leaks from cabinet meetings. He said hacking into the computer system of Barnard's office did take place in late 2000, and was traced to a staff member in the office of the head of internal audit. He was unsure of the outcome of the investigation into the matter, but anti-hacking software had since been installed in the DG's office. - Sapa --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 5457 From: Matthew Paulsen Date: Wed May 22, 2002 11:26pm Subject: Doesnít Ring True Thought I'd focus on other areas of the world for a moment and see what others are thinking / doing, India's a top choice for many reasons, US tech reliance, current conflicts with Pak, etc. - M http://timesofindia.indiatimes.com/articleshow.asp?art_id=10194950&sType=1 [ SATURDAY, MAY 18, 2002 12:00:01 AM ] For a country that has suffered as much from terrorism and for as long, there can be few concerns more pressing than the need to beef up national security. It would, therefore, seem perverse to question the new measures being put in place by cellular phone companies in the Capital regarding customer verification. Under the new regime, those using pre-paid phone cards ≠ nearly 60 per cent of the 6.5 million mobile subscribers across the country ≠ will be required to fill up a comprehensive verification form besides furnishing a photograph and proof of residence prior to activation of their connection. The move, initially confined to Delhi, has been evidently necessitated by the fact that, increasingly, terrorist and underworld activities are being planned and coordinated through the use of ërogueí mobiles which leave no trail. The new measures, it is argued, will allow the security agencies to monitor this pernicious usage. If in the process it also hits business volume in a leading growth industry, then that ís a price all law-abiding patriotic Indians must be prepared to pay. Yet, there are reasons more compelling than loss of business as to why the regulations must be resisted. To begin with, two points of principle. First, the mindset that has dictated the latest measures is consistent with a wider policy trend which equates security with ever greater accretion of ëextra-constitutionalí powers to the state, exemplified by the passage of legislations like POTA. Never mind the civil liberties argument or that thereís nothing to suggest that these draconian steps have achieved even a fraction of what they set out to do. Second, precisely because advances and refinements in information technology have allowed the modern state ever greater capacity for monitoring and surveillance, there is a pressing philosophical need to debate what information it can legitimately ask of its citizens. Itís simply not enough to argue that itís only criminals and the like who fear giving information to a democra- tic state. Finally, in the here and now, there are doubts about whether anyone has even considered the mind-boggling logistical implications of the new exercise. In a country, where a simple passport verification can take up to six months, who is to verify the bona fides of millions of mobile users? Unless the verification is a cosmetic farce the real purpose of which is to generate a pointless paper mountain. 5458 From: ed Date: Wed May 22, 2002 3:10pm Subject: RE: GSM monitoring platform nope, i've seen a WJ-8961 and this was definately a later model WJ system (but not yet BAE.) the WJ modules were a bit larger than ice cream sandwiches, and the DAT drive was somewhat larger. all very clean and fairly new-looking, nicely concealed in a small wheeled suitcase w'earphone. the seller had a sticker on it that said GSM 900, and confirmed that when i asked him about it afterwards. again, i think the modules were WJ 9000 series units. any other ideas? -ed At 03:55 PM 5/22/02 -0400, you wrote: >Bet it was an outdated WJ 8691 - capable of conducting tactical monitoring >of AMPS/NAMPS/DAMPS, TACS, NMT-450/900 and INMARSAT A. > >A good system, in it's time, for localized analog cell >collection.... grossly outdated now... > >JD >-----Original Message----- >From: ed [mailto:bernies@n...] >Sent: Wednesday, May 22, 2002 2:31 PM >To: TSCM-L@yahoogroups.com >Subject: [TSCM-L] GSM monitoring platform > >early last friday at the dayton hamvention i saw a covert 900mhz (european) >gsm monitoring platform. it was nicely concealed in a medium-sized black >suitcase with wheels and pull-out handle. inside were several late-model >w-j modules, a dat recorder, and an earphone. serial port controlled by >computer, but no pc or software was with it. > >only got a few seconds look at it as it dawned on me what it >was. unfortunately, a spooky-looking plunked down the $1200 asking price >and walked off with it without a word before i could. my guess is he was >taking it out of circulation. > >is anyone on the list familiar with this system? i seem to recall some of >the relatively small, black, w-j modules were in the 9000 series, but i >can't be sure. > >-ed 5459 From: ed Date: Wed May 22, 2002 3:16pm Subject: RE: GSM monitoring platform thank you. any suggestions as to what this system is? At 03:59 PM 5/22/02 -0400, sig346@n... wrote: >Maybe it looks like a "GSM monitoring platform" in the eyes of >those who never saw a real one. The reality is that a real passive >GSM surveillance system from HARRIS is much larger, the only West >European system that really exists comes from Rohde Und Schwarz >(ironically the same company sells GSM security/enhanced encryption >products) and this is an active system built into a minivan, not into >a case. The Russian system employs a hardware codebreaker and is biult >into a medium sized bus. The Israeli G-Com with an office in UK insists >it has a working passive system, but they failed to demonstrate it >working with a random GSM cellphone. Well, the price tag for that sort >of toys bears five zeros behind the first number. Needless to say they >never find their way to Ham Radio Convention. > >Gentlemen, GSM is a secure communication system IN CIVIL SENSE, that >means that eavesdropping is beyond an average man¥s ability, and that is. > > > > > > > > > > >ed wrote: > > >early last friday at the dayton hamvention i saw a covert 900mhz (european) > >gsm monitoring platform. it was nicely concealed in a medium-sized black > >suitcase with wheels and pull-out handle. inside were several late-model > >w-j modules, a dat recorder, and an earphone. serial port controlled by > >computer, but no pc or software was with it. > > > >only got a few seconds look at it as it dawned on me what it > >was. unfortunately, a spooky-looking plunked down the $1200 asking price > >and walked off with it without a word before i could. my guess is he was > >taking it out of circulation. > > > >is anyone on the list familiar with this system? i seem to recall some of > >the relatively small, black, w-j modules were in the 9000 series, but i > >can't be sure. > > > >-ed 5460 From: intothemirror Date: Wed May 22, 2002 3:48pm Subject: Re: FBI spy sentenced to life in prison --- In TSCM-L@y..., patedwards@w... wrote: > Plea bargain spares Hanssen from death penaltyMay 10 -- The secrets > Robert Hanssen sold to Moscow led to the deaths of U.S. operatives and > still compromise America's counter-intelligence efforts. NBC's Pete > Williams reports. Bonnie Hanssen, wife of convicted spy Robert P. Hanssen, insists she didn't know what her husband was doing -- http://www.nytimes.com/2002/05/16/national/16SPY.html You can read more about Hanssen's relationship with his wife in the book Into the Mirror: http://www.electricartists.com/itm/amazon.html 5461 From: ed Date: Wed May 22, 2002 6:08pm Subject: Re: WJ monitoring platform mystery again, these truly appeared to be actual late-model WJ units mounted in that case. i own some current production WJ gear, have seen and used others' WJ gear, and know what it looks like. the price of a piece of surplused gear at the annual dayton flea market doesn't necessarily belie its value (or lack thereof.) occasionally, sensitive equipment somehow shows up there that was not supposed to be in private hands, and occasionally the seller may not know what they have in theirs. anyone who's been there a few times can probably confirm this. admittedly, the small post-it note attached reading "gsm 900" was probably wrong, but the late-model WJ units, cables, and DAT drive it contained looked very real. it was definately a WJ monitoring platform of some type, very professionally mounted and concealed in that case. we can easily debate what it wasn't, but can anyone on the list offer an informed opinion at to what this system was? btw, it had no blinking lights or displays, and the seller took no active role in pitching it. if it was a fake, then it was a very good one and the guy probably deserves the $1200 for putting together such a well-made set of apparent WJ units, goldplated milspec cables & connectors, ruggedized DAT drive, etc (he'd have to spend close to that in t&m building it.) the guy also had some misc motorola 2-way gear at his table, but this was another thing entirely. -ed At 10:41 PM 5/22/02 +0200, mikepuchol wrote: >$1200? For a wheely case with some blinking lights? That's a right rip-off. > >Any decent GSM test tool, such as an IFR, HP, Agilent, etc. will set you >back at least a five-figure amount, and all (all?) those can do is test a >handset for correct configuration, modulation, etc. and/or controlled >network tests. They cannot demodulate any GSM transmission off the air. They >are meant for network engineers, repair shops, tech support centers, etc. > >So, such box you saw was most probably a con... > >All the best, > >Mike > >----- Original Message ----- >From: "ed" >To: >Sent: Wednesday, May 22, 2002 8:31 PM >Subject: [TSCM-L] GSM monitoring platform? > > > > early last friday at the dayton hamvention i saw a covert 900mhz >(european) > > gsm monitoring platform. it was nicely concealed in a medium-sized black > > suitcase with wheels and pull-out handle. inside were several late-model > > w-j modules, a dat recorder, and an earphone. serial port controlled by > > computer, but no pc or software was with it. > > > > only got a few seconds look at it as it dawned on me what it > > was. unfortunately, a spooky-looking plunked down the $1200 asking price > > and walked off with it without a word before i could. my guess is he was > > taking it out of circulation. > > > > is anyone on the list familiar with this system? i seem to recall some of > > the relatively small, black, w-j modules were in the 9000 series, but i > > can't be sure. > > > > -ed 5462 From: Matthew Paulsen Date: Wed May 22, 2002 11:35pm Subject: Skakel tutor denies killing Jury hears secret tape from motel More from around the world. - m http://www.newstimes.com/cgi-bin/dbs.cgi?db=news&view_records=1&id=28634 Skakel tutor denies killing Jury hears secret tape from motel By Karen Ali THE NEWS-TIMES 2002-05-15 NORWALK ≠ A lengthy conversation in a bugged Boston motel room between a former suspect in the Martha Moxley murder case and his ex-wife ≠ who was working for Greenwich investigators ≠ was brought to life in court. For several hours Tuesday at the trial of Kennedy relative Michael Skakel, the ex-wife of Skakel family tutor Kenneth Littleton read for jurors the words she spoke on that night of Feb. 10, 1992, at a Howard Johnson hotel. Littletonís words were read by Chris Morano, one of three prosecutors seeking to convict Skakel, a 41-year-old unemployed single father charged with killing his Greenwich neighbor in October 1975. During the taped conversation, Littleton says over and over again that he didnít kill Moxley. Littleton, who lives in Boston, testified Monday that he had admitted to his wife in 1992 that he killed Moxley. But when that statement is put into context, Littleton does not appear to have truly confessed. Instead, he claims he told a forensic psychiatrist in 1992 that he ìdid itî only because his wife told him that he had confessed during an alcoholic blackout in 1984. Littleton and Baker have both testified that he never actually confessed to the killing. Baker said that in 1992, at the request of Greenwich investigators, she repeatedly told him that he had confessed to the killing in order to get more information out of him about the Moxley case. One part of the 98-page transcript that was erased so jurors wouldnít read or hear it was Littletonís statement: ìI think Michael did it.î Superior Court Judge John Kavanewsky Jr. agreed with the defense that the statement was prejudicial. Throughout the taped conversation, Baker repeatedly tries to get Littleton to confess to the murder. The former tutor never once admits to the killing. Littleton said that if he did admit it, he did so because he was psychotic at the time. ìFirst of all, I didnít do it. Second of all, I wasnít anywhere near the murder site,î Littleton said at one point in the transcript. Once Baker and Morano finished reading the transcript, prosecutor Jonathan Benedict asked her if she spoke to Littleton after he left her room that night. Baker, who lives in Ottawa, Canada, said that he did call her once in the middle of the night and once at 6 a.m. ìHe told me that I was crazy and I should get help,î Baker said. Defense lawyer Mickey Sherman tried several times to get Baker to explain why she hadnít told Littleton until recently that he never really confessed. ìHeís been tormented by your having told him that,î Sherman said. Baker, who taped Littleton many times in the early 1990s, said that Littleton, a manic depressive, has been making progress over the past few years. He is getting married to his fiancÈe, Ann Drake, in June. He is responding well to the six medications he is taking and speaks to their children frequently, she said. ìWell, wouldnít he have made better progress if he didnít know he was a murderer?î Sherman asked loudly. ìI donít know the answer to that,î Baker replied. Prosecutors had said on Monday that Michael Skakelís brother, Thomas, who was 17 at the time of the killing and was originally a suspect, would testify on Tuesday. But prosecutors made a decision Monday night not to call Thomas Skakel to the stand. Morano declined to elaborate on the decision in comments outside the courtroom, saying only, ìWe donít need him.î However, Sherman said, ìQuite honestly, thereís nothing he was going to say that would be good for their case.î Thomas Skakelís lawyer, Emanuel Margolis of Stamford, said, ìThe state changed its mind and rethought. Iím delighted. ìWhy should I put a client through examination and cross-examination?î Margolis said that Thomas Skakel, who now lives in Stockbridge, Mass., is concerned about his brotherís case. Margolis said that the brothers are not especially close, noting that Michael lives in Windham, N.Y. Margolis said that Thomas Skakel, who has three daughters, works for a time-share corporation in Massachusetts. The defendantís father, Rushton Skakel Sr., came to court prepared to testify Tuesday, but because the trial went slower than expected, he is expected to return to court again today. Margolis is also representing Rushton Skakel and his wife, who is the Skakel childrenís stepmother. A hearing is planned today outside the presence of the jury on whether the elder Skakel is competent to testify for the state. Margolis said that his client suffers from memory loss. ìHeís with it on some things and not with it on other things,î Margolis said. Michael Skakel was charged in 2000 after making statements in the 1990s about his whereabouts the night of the crime that were different from his 1975 statements. Ever since the state began putting on evidence last week, Sherman has been trying to shift suspicion toward Littleton and Thomas Skakel. While cross-examining one of the stateís police witnesses last week, Sherman got the witness to admit in front of jurors that police had put together an affidavit in 1976 implicating Thomas Skakel. Prosecutors believed there wasn ít enough evidence to arrest him, so they never signed the affidavit. Contact Karen Ali at kali@n... or at (203) 731-3341. From: Hawkspirit Date: Fri May 21, 2004 7:29pm Subject: Telco Sweeps... The phone data, internet, and cable TV all on the same coax. The digital service unit on the side of the house was the decoder and the phone lines were broken out as analog at that point. The bridge tap wire was connected to that point as well. Roger Tolces Date: Thu, 20 May 2004 19:26:12 +0100 From: Ocean Group Subject: RE: Telco Sweeps... Hi Roger Is the phone data running on the cable tv lines...I presume this is one of these services where you get phone, net and tv from your cable tv provider. In that case surely the line would be digital, therefore if your services are multiplexed into the house then their must be an additional decoder box within the house, what was the purpose of the unit outside the house, apart from acting as a junction box. How was the analogue line that was connected to the RF tx connect to the exterior junction box if the data is digital and multiplexed...was their an analogue port just for the phone line at the exterior connection box...? Regards Ois PS. How long is an average piece of string...? [Non-text portions of this message have been removed] 8687 From: Date: Fri May 21, 2004 8:58pm Subject: County detectives looking for audio and video recording devices Recording devices found in Folcroft municipal building 05/21/2004 By ROSE QUINN rquinn@d... FOLCROFT -- County detectives looking for audio and video recording devices and tapes searched the office of Borough Manager Anthony Truscello and others in a fast-paced raid Wednesday afternoon. They were looking for evidence that the police department was a target of illegal electronic surveillance -- and they did not leave empty-handed, according to authorities and an affidavit supporting the searches. Video equipment and about a dozen videotapes were among the items confiscated by detectives Thomas Worrilow and Roger Rozsas, of the county’s Special Prosecution unit. The targeted areas of the hours-long search were the Folcroft Municipal Building, the borough secretary and manager’s offices, and locked office No. 105 on the first floor. No criminal charges have been filed. Under whose orders the equipment was installed remained under investigation, as well as whether any conversations were intercepted. Such activities could violate state wiretapping and privacy statutes. Room 105, according to a nine-page affidavit signed late Wednesday afternoon by Common Pleas Judge Charles J. Keeler, is located next to the district court office. It’s where a series of cables, which investigators found running through the ceiling and a stucco-covered wall, ended. And, it served as Truscello’s office when he was a district justice. Truscello and borough Council Vice President Joseph Zito, according to the affidavit, were seen numerous times in borough hall. As recently as three weeks ago, they were seen entering the locked room and watching what some witnesses suspected were videos, the affidavit states. "Truscello told (the witnesses) to stay out of his office unless he let them inside," the affidavit states. According to the affidavit, Truscello’s daughter, sitting District Justice Deborah Truscello McHugh, "had made statements that the police were being taped." And Zito, the affidavit states, "had made statements to various employees that they should be careful that they were being videotaped." Messages left at borough offices for the Truscellos were not returned. Zito could not be reached for comment. A message left after hours for Joseph Fioravanti, Truscello’s attorney, was not returned. News of the raid spread quickly through court circles. Folcroft Police Chief Ed Christie declined comment, noting that the affidavit "speaks for itself." When police first heard the rumors about surveillance, they "passed this off as paranoia," the affidavit states. Sentiments changed as Christie began receiving information from borough and court employees, from Zito’s statements about being videotaped to daily meetings between Truscello and Zito in the locked room. One officer speaking on the condition of anonymity said the situation was of enough concern that Christie warned a female officer hired in February not to change clothes in the locker room. In the area of the affidavit identifying items to be searched or seized, there is mention of "any videotapes or audio tape recordings or combination ..containing conversation or conduct where one party is in the state of full or partial nudity and has the expectation of privacy." According to the affidavit: Christie, who along with other officers began to hear rumors of surveillance two years ago, met May 13 with Capt. John McKenna, head of the Delaware County Criminal Investigation Unit. With Christie was Gregory J. Auld, a retired FBI agent and licensed private investigator Christie hired about two months ago to sweep the police department for bugs. Auld determined that there were several pinhole cameras placed in smoke detectors -- one in a hallway, one in the squad room and one in the evidence room. It was later determined that one of the cameras had a microphone installed in it, making it capable of eavesdropping. Auld found more devices, including a coil used to hook up a tape recorder to a telephone line. And he located a monitor room, which contained a four-camera split monitor in the health room of the police department. The FBI, the state Attorney General and the state police were contacted to determine if they had ongoing investigations in Folcroft. They did not. The FBI denied a request for an investigation before Christie sought county assistance. It was an FBI agent who suggested that Christie contact Auld. On March 19, Officer William Bair informed Christie by memo that he found an unknown male working in the ceiling of the police department. The male told Bair he was putting security lights in the ceiling, but Bair became suspicious because he appeared to be using an unsafe ladder that the man said Zito provided. Bair retrieved a ladder from the police department. On April 19, Auld and his team placed two pinhole cameras in the police department to watch the cameras in the smoke detectors, with the monitor placed in Christie’s office. On April 30, Auld reported that a review of tapes showed several males, seen in different areas of the police department, particularly the health room, on April 28. On April 29, two men arrived at the police station carrying a long box. They removed the smoke detector and put it into the box. Auld’s tape showed a man in a baseball cap in the evidence room, where wires were seen hanging from the ceiling. "The males are obviously pulling some type of cable, later determined to be coax cable marked CCTV." Cameras in the smoke detectors were replaced with cameras in emergency light fixtures. Auld’s full report to Christie contained a breakdown of the equipment, including capabilities and serial numbers. Subsequently, Christie obtained copies of five invoices submitted to the borough --requests for over $4,000 for work by two companies dating back to March 29. All the work involved lighting and wiring. According to police reports from March 29, an officer told a supervisor that he saw suspicious activity in the police parking lot, involving a man spotted two nights sneaking around the area. He and another man were later identified as employees of a private investigation firm. This past Monday, Christie provided investigators with a diagram of the police department, with locations of suspected devices. He also provided diagrams of other parts of the municipal building, including Truscello’s former office. On Tuesday of this week, Christie was told that Zito arrived at the borough hall carrying a bag, met with Truscello in the borough manager’s office and then they both walked down the hall toward the court office, out of sight. By 8 p.m. - some five hours after Keeler signed the warrant - the search was under way. Three cameras were immediately found and removed: One from an emergency light fixture in the locker room where officers change, one from the squad room and one from a smoke detector in the hallway outside the health room. A trace of the cables, which went into the ceiling above each of the cameras, went downstairs into the ceiling of a courtroom, traversed the ceiling and entered two holes in a solid brick wall covered by stucco - terminating in locked Room 105. According to the affidavit, "it’s unlikely that these wires pass through Room 105" because the court office is an addition and a large common area where any recording device could be easily seen. ©The Daily Times 2004 http://www.delcotimes.com/site/news.cfm?newsid=11764939&BRD=1675&PAG=461& dept_id=18171&rfi=6 [Non-text portions of this message have been removed] 8688 From: kondrak Date: Sat May 22, 2004 4:27am Subject: Re: County detectives looking for audio and video recording devices Just wondering here, what do YOU guys do when a corrupt municipal gooberment wants to employ you to violate civil rights at any costs like these cases? A Signed NDA? With a provision that violation is understood the "job" is authorized, (in writing) and they will take the responsibility for any repercussions? Then deny. Not my job, never been there. Dont know anything. Bond? (gives a measure of legal status?) or just gobs of cash?, in unmarked bills....and do what they want...this stinks to me. Yeah, i know that's kinds anthetical to the mission statement, we're supposed to be legal like, the good guys, but how many couldn't resist the temptation of a gob of cash to do this? Dont get me wrong, I'm sick as hell about guys who do this crap, specially in the new-police-state, I'd imagine theres plenty who will bend-over and play dumb. I personally don't see myself violating my fellow citizens rights, as I happen to believe in the Constitution myself, you know, what's left of it, that while roll of TP to the right of the toilet these days since the jackbooted thugs took power. Im interested in the findings of fellow practicitioners who've been approached by the forces of evil... Reason? I've been approached, and I simply don't. I'm just wondering how others have handled it. I simply said, if it's OK, then the DA shouldn't have any problem with me asking him if it IS ok, now would he? Of course, personal, and private, in a public place, walking thru a mall...And everyone got real tight anal... Uh huh..ain't going there, I smell, sniff? Sniff? TRAP! Homie wasn't born yesterday..... -- "Dogs wear collars, wolves do not. I am a wolf. You can shoot me, trap me, poison me - even set my brother the dog on me. But you can not pat my damn head unless I say so." 8689 From: Spook Date: Sat May 22, 2004 10:14am Subject: Re: County detectives looking for audio and video recording devices The answer is to simply and strongly tell them no, and inform them that if they continue that you will organize a Grand Jury to remove that which needs to be removed. Folks in our profession get approached frequently do perform illegal activities, ad quite a few people actually engage in either borderline or outright illegal activities under the guise of helping law enforcement... but don't do it, ever, for anything, period. Support the Constitution, obey both the letter and intent of the law, and respect the rights of others. -jma At 05:27 AM 5/22/2004, kondrak wrote: >Just wondering here, what do YOU guys do when a corrupt municipal >gooberment wants to employ you to violate civil rights at any costs like >these cases? > >A Signed NDA? With a provision that violation is understood the "job" is >authorized, (in writing) and they will take the responsibility for any >repercussions? Then deny. Not my job, never been there. Dont know anything. >Bond? (gives a measure of legal status?) >or just gobs of cash?, in unmarked bills....and do what they want...this >stinks to me. > >Yeah, i know that's kinds anthetical to the mission statement, we're >supposed to be legal like, the good guys, but how many couldn't resist the >temptation of a gob of cash to do this? > >Dont get me wrong, I'm sick as hell about guys who do this crap, specially >in the new-police-state, I'd imagine theres plenty who will bend-over and >play dumb. I personally don't see myself violating my fellow citizens >rights, as I happen to believe in the Constitution myself, you know, what's >left of it, that while roll of TP to the right of the toilet these days >since the jackbooted thugs took power. > >Im interested in the findings of fellow practicitioners who've been >approached by the forces of evil... >Reason? I've been approached, and I simply don't. I'm just wondering how >others have handled it. >I simply said, if it's OK, then the DA shouldn't have any problem with me >asking him if it IS ok, now would he? Of course, personal, and private, in >a public place, walking thru a mall...And everyone got real tight anal... > >Uh huh..ain't going there, I smell, sniff? Sniff? TRAP! > >Homie wasn't born yesterday..... > >-- > >"Dogs wear collars, wolves do not. I am a wolf. You can shoot me, trap me, >poison me - even set my brother the dog on me. But you can not pat my damn >head unless I say so." > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 8690 From: Date: Sun May 23, 2004 3:15am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 8691 From: A Grudko Date: Sun May 23, 2004 4:56am Subject: Useless radios bought by useless bureaucrats This article caught my eye on another group - the 'political' content can be ignored but in my opinion the message about emergency radios should not be. Regards from a lovely Autumn morning on the lake Andy Grudko South Africa www.grudko.com From Newsday -- http://www.newsday.com/news/columnists/ny-nybres193808986may19,0,4955551.col umn?coll=ny-news-columnists Useless radios bought by useless bureaucrats by Jimmy Breslin Always, when you put the subject in a room for ceremony or seminar, the World Trade Center becomes a religious experience. At yesterday's meeting of the Senate 9/11 commission, the theater of the New School University on West 12th Street became a church. Starting at a little before 9 in the morning, the commissioners in front of the room were solemn and deeply respectful as a report on the attack was read to them, along with films of the explosions. The commissioners then bowed their heads as three of our city's wonders of the world took the stage. First was Baghdad Bernie Kerik. He is called Baghdad because he went over and put the whole Iraqi police force into great shape. That the Iraqi police force is no more is not Kerik's fault. He is here. Next was Richie Sheirer, who was a telephone clerk until Rudy Giuliani told him that he was a courageous genius. Sheirer then stood up and told the world, "I'm smart!" He spoke yesterday and I don't know what he said. When these fellows go to this bureaucratic language, you want to maim. The last of the morning's brilliance was Thomas Von Essen, who was the fire commissioner when the planes attacked. Let me tell you about him. I sat all morning with one line from the presentation running through my mind. The presentation said: "NYPD Aviation radioed in immediately that the South Tower had collapsed. At 10:08 a.m., an aviation helicopter pilot advised that he did not believe the North Tower would last much longer. There was no way to relay this information to the fire chiefs in the North Tower." There was no way because the Fire Department radios could not get the signal from the police in the sky. The tower came down on the firefighters. If you care to count, that cost 323 lives. And it was because of radios, which were useless in the air around 110-story buildings. And when it all started with these radios, they were useless in a two-story building in Richmond Hill, in Queens, on March 19, 2001. At a break at the New School yesterday morning, I took a ride out to the house in Queens where the radios first failed. It is a two-story white frame house with a blue door and a brilliant green lawn. It is at 112-19 Myrtle Ave. On March 19 of 2001, there was a fire in the basement and Luke Healy of Engine 305 ran out of air and collapsed. He called "Mayday" on his radio, one of 2,700 new digital two-way radios bought from Motorola [CORRECTION: The Fire Department did not use digital Motorola radios at the World Trade Center on Sept. 11, 2001. The radios, which had proven faulty in March 2001, had been taken out of service. Jimmy Breslin's column Wednesday incorrectly reported that the radios had been used by firefighters on Sept. 11. pg. A08 ALL 5/21/04], with a total purchase of $14 million envisioned. Dozens of firefighters were around the house. Nobody heard him. Finally, somebody found Healy and dragged him out into the air. "In this situation, a guy could just follow the hose line out," Von Essen, the commissioner, said. "That person was probably never in any real danger. He probably just panicked." That was a beautiful statement. The commissioner and his mayor took the radios onward from the two-story house on Myrtle Avenue. Yesterday, the present owner, Marilou Montero, was watching the hearings, and particularly the conversations about radios. "We knew a firefighter was in the basement fire here, but we didn't know that when we bought the house. The real estate agent wouldn't tell us about something like that. The firefighter was hurt. He didn't die." "No, he didn't." "I got this house on a steal. It was $410,000. Today, it would go for five. Four bedrooms and the downstairs is an apartment. That's the basement where the fire was." The basement fire was on March 19, 2001. On March 25, Giuliani said the radios were good and the only thing wrong was that they needed a little more testing. He said the firefighters complaining were petulant union members. On April 3, Alan Hevesi, then the city comptroller, wrote, "I am told that the practice in the Fire Department was always to carefully test all new equipment with the cooperation of the union. This was not done with these radios. There was no competitive bidding. They didn't go out into the market to see what was available and pick the best. To avoid competition, the Fire Department bought the new radios using an existing contract that was used to buy replacements for no more than $2.9 million. They used this contract to buy an entire new communications system for $14 million." This is why political careers are so enchanting to the needy. A no-bid contract is the best way to buy a new house. Whatever they bought, whatever they paid, the Fire Department tried using these great radios on Sept. 11 and found the only thing you could hear on them was the death march. Yesterday, almost three years since men working for this city died while they stood in a building lobby and never knew what hit them, a group of cops were standing outside the New School and one of them said: "We still don't have a system that works today." Copyright 2004, Newsday, Inc. --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.667 / Virus Database: 429 - Release Date: 2004/04/23 [Non-text portions of this message have been removed] 8692 From: Thomas Shaddack Date: Sun May 23, 2004 1:06am Subject: "Mail bugs" - tracking emails This is rather old issue, but being quite commonly used in the wild. With HTML-formatted mail messages, it is possible to embed objects (most often images) from third-party servers to them. Depending on the mail client, the objects then can be fetched when the mail is opened - the server that provides the object then can perform an action triggered by the request. Spammers often use it as a way to keep track of what addresses are "alive", and it is also used by a handful of newer worms as an infection vector. The principle is the same as the "web bugs" used for tracking purposes on webpages, only the HTML mail is used instead of the webpage as the delivery vehicle for the object. Together with an ID specific for the given mail it can be used to track the mail as it is being read and forwarded. Just a while ago I finished a demo application for testing the mail clients by sending them bugs, a pet project I wanted to put together for years - even did it before, but only with messages generated manually, no docs, and no other fancy user-friendly stuff. Complete source code in PHP is offered for download. More detailed description, sources, and a live and hopefully working demo available at http://213.246.91.154/projects/mailbug/ -- Mail is a dangerous thing Big trouble it can bring. I got an attached file No clue that it was vile. Ch: I clicked once, and then the worm spread like fire Now it runs, runs, runs, and the network load grows higher My LAN crawls, crawls, crawls, The speed is dire, Worms never tire. 8693 From: John Young Date: Thu May 20, 2004 8:46pm Subject: RE: Di-electric Room One of the largest all-wood EM testing facility is located at Kirtland Air Force Base, New Mexico. It was built to test EM of aircraft as large as the B-52. There are photos of it with this collection of other unusual facilities on the base operated by Sandia National Laboratory: http://cryptome.org/6odd-eyeball.htm Other large facilities tested the EM of warships by having the ships cruise past shore-based arrays. What is not altogether clear is just how extensive EM can be used to read the signature of an object, whether aircraft, ship, satellite, vehicle, computer, cellphone, pacemaker, indeed any device that uses electricity. Intelligence to be gained from such overt and covert reading is known to be extensive but much remains classified. For example, can a computer's signature be read by its transmission on the Net as well as the easily captured readings from its emanations? Not just the IP address, its packets and traffic of a box's digital bits but its unique EM characteristic, similar to the key hand of the old telegraph operator. Can the covert EM signature of encryption be captured in addition to its visually beguiling cipher- and plaintext? It is known that any metal variously captures, radiates, reflects and modifies EM in its vicinity (thus the need for non-metallic testbeds), but could the unique capabilities of any piece or assemblage of metal be captured and analyzed to determine a unique position or target in space, as if a boomer sub being tracked by its multiple emissions of a variety of unintentional leaks across the EM spectrum -- RINT, RADINT, ACOUSINT, MASINT, ELINT, ELOPTIC, LASINT, ISINT and so on. Steel structural systems are analyzed by electronic tracking of loads and stresses on components The recent report on acoustic cryptanalysis suggests there may be a wide range of presumed-secret signals to be captured or protected with increasingly sophisticated analytical tools and programs. Recall that inadvertent signals of communications devices have long been kept secret as long as possible, even denied as science fiction or wild imaginings. In that deceptive spirit it is likely that capabilities of reading EM in unexpected ways is being done. Is there an EM smell comparable to what dogs and rats can detect in drugs, mines and weapons? Does your encryption pass phrase have a characteristic odor divertingly camouflaged by an all too obvious dongle or keystroke capturer? As with drugs, does your hair capture your keystrokes, eyeblinks, cold sweat, vengeful glee, homicidal lust -- not as biological residue but as EM signal then obeying the laws of science transmit the data down the cable hand in hand with the secret scheme to outwit the IRS? 8694 From: contranl Date: Sun May 23, 2004 0:13am Subject: Pen size ....wireless video-camera detector ? (and gsm detection) . Pen size....wireless video-camera detector ? http://www.giftsandhome.globalsources.com/am/article_id/9000000052015 /page/showarticle?action=GetArticle If link is broken up try this one: http://tiny-url.com/28 Here are some more specs: http://www.pro-pens.com/cat/p12/ak880apd-mk.jpg comes in 3 colours: http://www.pro-pens.com/cat/p12/agsk880apd.jpg Probably good enough as a non serious gift ? Looks like a simple (AM) rf-detector to me...and it probably suffers from "deafening" by local cellular base transmitters , microwaves , cellphones , wireless networks.....etc If no video-sync-detection circuit is incorporated that looks for a video-modulation then it might give lots of false alarms too. Does it use the lamp-modulating trick ? there is a LED in there! I do'nt think so... a LED would probably not emit enough light ? and would not have a wide enough color-spectrum ? (visible + infrared) Anyone have tried this one ? Probably good enough as a non serious gadget ? Will cost no more then 50 US$ ? The incorporated whistle amazes me...it's purpose would be to call the police ?... when you find a camera ? ..."wireless peeping signal"...interesting name ! -------------------------------------- I have a similar pen for Gsm-detection (cellphone) ...and amazing enough it's not that bad at all...it's been here on my desk now for 2 months and still working on the original batteries (2 buttons). It has a detection range of about 25 meters. It has not given any false alarms...not 1 time ! I am looking at it 12 hours a day ! I nicely see the "silent" updating signals from the phone to the network. There are at least 3 Gsm base stations in less then 400 meters distance !( wich could cause "deafening" or false alarms) Allthough it alarmed when i held it close to a very professional spreadspectrum-bug :) :) I guess it simply looks for fast pulsed and repeating signals Gsm is TDMA...pulses....Spreadspectrum...also pulses) The Led flashing time of this pen is extended to 15 seconds...so you will also notice very short (milliseconds) updating sgnals. The output power of my Gsm-phone would be around 0,08 Watt (19dBm) since the basestation is so close my phone will use lowest powerlevel(s). It won't be very usefull for detecting "sleeping" Gsm-bugs since they only transmit there updating signals every 4 hours or more, unless you want to stare at it for half a day... If you want to detect "sleeping" Gsm-bugs/devices you better use an automatic Gsm-signal recording device that you can leave unattended, such a device will record: Signal level Frequency band Time Needless to say that other Gsm-phones should be switched off :) :) A spectrum analyzer will detect a sleeping Gsm-bug/device but useless unless it has a some type of recording function (with time indication) A (slow) scanning type of Spectrum analyzer (not real-real-time) will probably miss the short updating signal A trick to force an updating signal from a "sleeping" Gsm device hidden in a car would be: "drive around far enough to make shure the phone will switch basestations...preferably where there is no other cars and people with phones" I guess that's a little unpractical. If you have friends at all the local Gsm-providers you could ask them to shortly switch off the networks in your area... that will do it too (when they come back on air), that's a little unpractical too. ------------------------------------- Anyone have tried this "pen-size-wireless-video-camera-detector" ? Thanks Tetrascanner www.tetrascanner.com 8695 From: Keith Farnham Date: Sat May 22, 2004 0:14pm Subject: Re: County detectives looking for audio and video recording devices You're final thoughts are well meant, I'm sure. However, reality suggests that law enforcement in this country could use more oversight from without rather than from within. I personally surveillanced a local police department (wireless mic) after I heard rumors of drugs and other seized property being sold out of the Evidence Room. I met with the FBI, who later went in and did some "interviews." They later claimed they found no wrong doing. In fact, they wanted to charge me until I threatened to send the tapes to the local press. Some time after this, I learned that the local chief was a buddy of one of the investigating special agents. How coincidental........ About six months later, a multi-county drug bust revealed thousands of dollars of bait money missing. Guess what? The money was "misplaced" at the police department I spoke of earlier. When the smoke cleared, the chief and several officers were out of a job and facing investigation. If my earlier allegations had not been on record, I sincerely doubt that any suspicion would have been cast on that department. My earlier charges proved to be true. An audit of the Evidence Room revealed significant discrepencies...missing guns, drugs and other items. How did I know all this? Because I suddenly became an asset to the Feds when the money went missing. Should I wait until someone hands me a piece of paper saying that it's OK to do what I know already to be ethically correct? I don't have a problem with the Constitution. It's the agencies that claim to protect and enforce it that tend threaten its very existence. Quite frankly, I think the average citizen is in a better position to protect and uphold these tenets. They're not being paid a salary to do it, they're not indebted to some political culture for their career advancement and more often than not, they're motivated by a respect of the law, truth and decency. An analogy: Most drug infested neighborhoods that are eventually cleaned up are done so by the people that live there and not by the police. They drive out the scum that the court systems continue to release. Border >From: Spook >To: TSCM-L >Subject: Re: [TSCM-L] County detectives looking for audio and video >recording devices >Date: Sat, 22 May 2004 11:14:47 -0400 > >The answer is to simply and strongly tell them no, and inform them that if >they continue that you will organize a Grand Jury to remove that which >needs to be removed. > >Folks in our profession get approached frequently do perform illegal >activities, ad quite a few people actually engage in either borderline or >outright illegal activities under the guise of helping law enforcement... >but don't do it, ever, for anything, period. > >Support the Constitution, obey both the letter and intent of the law, and >respect the rights of others. > >-jma > > > >At 05:27 AM 5/22/2004, kondrak wrote: > > >Just wondering here, what do YOU guys do when a corrupt municipal > >gooberment wants to employ you to violate civil rights at any costs like > >these cases? > > > >A Signed NDA? With a provision that violation is understood the "job" is > >authorized, (in writing) and they will take the responsibility for any > >repercussions? Then deny. Not my job, never been there. Dont know >anything. > >Bond? (gives a measure of legal status?) > >or just gobs of cash?, in unmarked bills....and do what they want...this > >stinks to me. > > > >Yeah, i know that's kinds anthetical to the mission statement, we're > >supposed to be legal like, the good guys, but how many couldn't resist >the > >temptation of a gob of cash to do this? > > > >Dont get me wrong, I'm sick as hell about guys who do this crap, >specially > >in the new-police-state, I'd imagine theres plenty who will bend-over and > >play dumb. I personally don't see myself violating my fellow citizens > >rights, as I happen to believe in the Constitution myself, you know, >what's > >left of it, that while roll of TP to the right of the toilet these days > >since the jackbooted thugs took power. > > > >Im interested in the findings of fellow practicitioners who've been > >approached by the forces of evil... > >Reason? I've been approached, and I simply don't. I'm just wondering how > >others have handled it. > >I simply said, if it's OK, then the DA shouldn't have any problem with me > >asking him if it IS ok, now would he? Of course, personal, and private, >in > >a public place, walking thru a mall...And everyone got real tight anal... > > > >Uh huh..ain't going there, I smell, sniff? Sniff? TRAP! > > > >Homie wasn't born yesterday..... > > > >-- > > > >"Dogs wear collars, wolves do not. I am a wolf. You can shoot me, trap >me, > >poison me - even set my brother the dog on me. But you can not pat my >damn > >head unless I say so." > > > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > 8696 From: Michael Puchol Date: Sun May 23, 2004 0:56pm Subject: Re: "Mail bugs" - tracking emails There is a simple way to prevent this behaviour, by using one of the many available (so-called) personal firewalls, such as ZoneAlarm, Tiny, etc. With these firewalls, you can write rules for individual programs, controlling the way in which they access the internet (or LAN). In my case, I have restricted Outlook to only be able to connect to ports 110 and 25 TCP (email in/out), and 53 UDP (DNS), which means that any embedded image that has to be fetched from a remote server (web bugs, activex, etc.) will not be downloaded at all, thus rendering ineffective any such spam or attack vector. If the activex or virus is embedded in the message itself, then an up-to-date antivirus software will take care of it. Best regards, Mike 8697 From: Joe Gomez <1upserv@g...> Date: Fri May 21, 2004 1:15pm Subject: e-mail change Please be advised 1upserv@g... becomes 1upserv@g... as from 01-06-04 amend address book accordingly 8698 From: Thomas Shaddack Date: Sat May 22, 2004 10:43pm Subject: VoIP: Using DNS to map telephone numbers to VoIP infrastructure: e164.org http://www.e164.org/ There is a new non-profit phone-numbers-in-DNS directory, allowing mapping phone numbers to IP addresses for placing the calls. See more on their website. It reportedly plays well with software PBX systems like eg. Asterisk. Looks promising. There is a potential threat there: the DNS requests will be susceptible to filtering (eg. by countries or ISPs who don't like to play fair with competition) and to DNS hijacking (to which the client is susceptible if its DNS resolver or any of the upward hierarchy of the resolvers and DNS servers - or even the client itself (beware of compromised hostsfile!) is compromised). DNS hijacking may allow a man-in-the-middle attack on the connection of the calling party, in addition to "standard" passive wiretaps. The DNS compromise can take place along the DNS hierarchy (if the servers are vulnerable), on the routers (by forcing the given IP to be routed differently), or - most likely - on the end-user machine itself, by specifying different DNS resolvers in the configuration, or by putting the entries to the hosts file (see lower). Scenario: Normal: Alice requests Bob's IP from the DNS. Opens call to Bob. Compromised by Eve: Alice requests Bob's IP from the compromised DNS, gets Eve's IP instead. Alice opens call to Eve instead to Bob. Eve forwards the data to Bob, and listens to everything that's passed through. However, it may pretty well happen that Eve manages to compromise only Alice's DNS, not Bob's, so she can't listen to calls originated by Bob. It should be fairly easy to spot, if Alice knows what address she should expect from Bob, or - better - if some cryptographical authentication combined with securing the call is performed (which can spoil Eve's day, though even that way she gets the who-called-whom-for-how-long traffic analysis data). Also, there will be considerable delay added to the communication, especially if the ping times between Alice and Bob and Alice-Eve+Eve-Bob considerably differ. The ease of mounting an attack by compromising the hosts file in the computer (/etc/hosts in Linux, c:\windows\hosts in W95/98, and c:\winnt\system32\drivers\etc\hosts in W2000/XP-Pro, c:\windows\system32\drivers\etc\hosts in XP Home) is disconcerting, though. Another possibility is to reconfigure the computer's DNS resolver itself, from its original one to a hostile one which logs the queries and/or answers to some of them with different-than-official answers (the same principle that is often used for "civilian" purposes in intranet DNS servers/resolvers, which supply the internal LAN IP address of the company webserver to the users from within the LAN, while the users from the "outside world" are directed to the server's public IP - eg. www.server.com is 192.168.1.1 from the office but 12.34.56.78 from the Outside). These kinds of attack are available to anybody who can even briefly get administrator privileges on the target machine (being it by a physical access or through a remote exploit) and can run his own server with the required capabilities/functions (beware - if this level of access is gained, the machine can be considered "0wned" and nothing is certain with it anymore). Another little risk is disclosing the calls to be done to everybody who controls the DNS resolvers, as the requests can (and are) being logged. The logs aren't typically kept for long, though, as they tend to grow to insane proportions, but it's possible to specifically watch certain machines, using standard packet monitoring techniques. On a side note, modification of the hosts file is an often-used method to get rid of various annoying and potentially privacy-infringing web advertisements. Many people publish the hosts lists that map the names of the best-known ad-throwing servers to 127.0.0.1 (Localhost); see eg. http://www.everythingisnt.com/hosts.html or http://www.mvps.org/winhelp2002/hosts.htm (or many many others that can be found by googling for keywords "hosts file" "windows") for an example and instructions. 8699 From: Thomas Shaddack Date: Sun May 23, 2004 2:18pm Subject: RE: Di-electric Room On Thu, 20 May 2004, John Young wrote: > Intelligence to be gained from such overt and covert > reading is known to be extensive but much remains > classified. Hopefully we'll learn more about it during our lifetimes; many cryptography-related stories from WW2 got out already, EMSEC-related stories will get out too. It will just take time. At this moment, the people are divided to two groups: the ones that don't know for sure, and the ones who won't tell. However, the laws of physics are the same for everyone, which can be exploited to discover the limits of technology and place the knowledge to public domain, where it belongs - like what Whit Diffie did with some aspects of cryptography. A lot of knowledge and equipment is already out there, just in areas not very obviously connected with EMSEC - eg. ionospheric research. Close to this problematics is the area of side-channel attacks on smartcards, especially the differential power analysis (DPA). The differences in power consumption during a request processing can reveal important information stored in the card. As current changes are closely tied with radiating EM, I suppose a good part of DPA-related knowledge will be useful in EMSEC, with added advantage of a lot of it being public. > For example, can a computer's signature be read by > its transmission on the Net as well as the easily > captured readings from its emanations? Not just > the IP address, its packets and traffic of a box's > digital bits but its unique EM characteristic, similar > to the key hand of the old telegraph operator. Unlikely, at least with modern (resp. not catastrophically obsolete) store-and-forward network switching equipment. While it's true that individual network cards could have its own signatures (most likely in minute variations of output signal shapes, influenced by tolerances in physical characteristics of the chips and boards), this characteristics will be ruined once the packet hits the switch, the minute variations are stripped, the signal is idealized back to purely digital form, and the signatures characteristic for the originating network card (and the cables) are replaced by the signatures of the output interface of the switch. Repeat dozens of times for every network route. The EM emissions of the originating equipment obey the power law, getting exponentially weaker with distance. Which doesn't mean that passive signatures aren't useful, but the information exploited is stored in the packets themselves, in digital form - different operating systems have different behavior of IP protocol. A good tool for passive fingerprinting of TCP/IP communication is "p0f". Run it on your gateway for a while to get a feel for what it's good for. The switches and even NAT gateways preserve the packets themselves intact (or, in case of NAT, almost intact). Also, a lot of intelligence about the identity of the machine can be acquired by watching the communication itself - which should be orders of magnitude easier than listening to its emissions. However, to not discount the possibility entirely, there are rumours that such "fingerprints" of high-frequency circuits of cellphones are already being used as identifiers - different phones respond differently to being irradiated by EM field of characteristical frequencies (even when powered off), not entirely dissimilar to passive RFID. This approach could be potentially used to find powered-off cellphones, WiFi and Bluetooth devices, and other kinds of transceivers whose frequency of resonator circuits is known. (Mused about it earlier when I was trying to find my misplaced cellphone.) > Can the covert EM signature of encryption be captured in > addition to its visually beguiling cipher- and plaintext? Yes. See DPA, and some cold-war SIGINT stories. See also the recent publication of electrolytic capacitors on some motherboards "singing" about the CPU activity. > The recent report on acoustic cryptanalysis suggests > there may be a wide range of presumed-secret signals > to be captured or protected with increasingly sophisticated > analytical tools and programs. Wondering how higher resolution could be achieved in the same experiment by using higher-frequency transducers and ADCs. > Recall that inadvertent signals of communications > devices have long been kept secret as long as possible, > even denied as science fiction or wild imaginings. In that > deceptive spirit it is likely that capabilities of reading > EM in unexpected ways is being done. This leads me to a design idea. Is it possible to write software (or modify compilers to produce the suitable output) that would minimize the distinctive parts of energy consumption patterns of the CPU (or FPGA)? Tweak the code, pad it with instructions leveling the power-consumption (and related EM) patterns to look the same, independent on the data the machine is handling? Eg. by doing the same operation with two sets of registers - one normal, one inverted - so the same number of bits is flipped (the state transitions are what is responsible for the tiny peaks in power consumption in modern CMOS chips) independently on what data is being processed? It would impose speed penalty on the code, but the Moore's law should take care about such consequences. The same applies to FPGA design, where "padding circuits" could be added, whose task would be to act as power-load leveling for the circuits doing the "real work" - so every operation would cause the same total pattern of state transitions on the chip, effectively ruining the EM signatures (or at least bringing them several orders of magnitude lower). I suppose a lot of related knowledge could be "borrowed" from the problematics of smartcards and secure processors. There are some laboratory-stage developments of optical chips, devices using light instead of electricity to perform logical operations. As such chips have no EM emissions by design, their widescale future deployment could make the Agencies' life a bit less easy. (Though various to-be-discovered math and physics phenomenons could change this as well, together with possible future breakthroughs in number theory. The NSA grants to some MIT math professors suggest their rather large-scale interest in many useful areas of basic research, from topology and tiling to number theory itself. But my belt in math-fu isn't sufficiently dark to see deeper into this problematics.) > Is there an EM smell comparable to what dogs and > rats can detect in drugs, mines and weapons? Does > your encryption pass phrase have a characteristic odor > divertingly camouflaged by an all too obvious dongle or > keystroke capturer? As with drugs, does your hair > capture your keystrokes, eyeblinks, cold sweat, > vengeful glee, homicidal lust -- not as biological > residue but as EM signal then obeying the laws > of science transmit the data down the cable hand > in hand with the secret scheme to outwit the IRS? As long as the (even indirect) possibility of revealing the very existence of *SEC equipment will have more worth than you and whatever you are doing, it won't be used against you. The veil of secrecy the top cream of the technology lies under is the best method restricting its wide use. 8700 From: James M. Atkinson Date: Sun May 23, 2004 2:51pm Subject: Oops, they did it again http://www.contracostatimes.com/mld/cctimes/news/8731243.htm?1c Posted on Sat, May. 22, 2004 DOE probe of lab to consider national security By James W. Brosnan SCRIPPS-MCCLATCHY NEWS SERVICE WASHINGTON - The Department of Energy is sending a team to Los Alamos National Laboratory to investigate another case of a missing classified computer disk. Rep. Tom Udall, D-Santa Fe, said he was assured that the missing disk "does not contain nuclear weapons data." Officials with the New Mexico lab said in a written statement that the disk's absence "in no way constitutes a compromise of national security." But a spokesman for DOE's National Nuclear Security Administration, Anton Franklin, said, "We're sending a team to look at those very issues." He said the National Nuclear Security administrator, Linton Brooks, had directed an independent review team to assess the incident, the lab's response and the lab's procedures for handling and destroying classified media. The lab's administrator, the University of California, admitted Thursday that a classified disk -- it did not specify the type -- turned up missing during an effort to verify the lab's destruction of 50,000 pieces of removable computer media, leaving roughly 33,000 pieces still at the lab. Lab spokesman Kevin Roark said that on Monday several classified-matter custodians were conducting a re-inventory of classified media to check on the results of the destruction efforts when they discovered "a single accounting discrepancy." Lab and DOE officials did agree that the discovery highlights the need to move quickly to the goal of a diskless computer system at the lab, in which scientists would work only with a monitor, keyboard and mouse. On May 7, Energy Secretary Spencer Abraham announced a goal of moving to a diskless environment in five years. Not fast enough, said Danielle Brian, executive director of a watchdog group, the Project on Government Oversight. She scoffed at the lab's assertion that the missing disk does not compromise national security. "The lab can try to spin it however they want," said Brian. "Classified data is missing from Los Alamos yet again." She noted that in 2000, two computer hard drives were reported missing for several weeks before mysteriously being discovered in a room that had already been searched. Some 200 computers could not be accounted for in 2002 and ten disks were reported missing last year. The security problems at the laboratory contributed to a DOE decision last year to open the contract to run the lab up for bids. The UC contract expires in 2005. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8701 From: James M. Atkinson Date: Sun May 23, 2004 3:01pm Subject: Army Captain Quits, Avoids Court-Martial http://www.newsday.com/news/nationworld/wire/sns-ap-iraq-shower-photos,0,7507292.story?coll=sns-ap-nationworld-headlines Army Captain Quits, Avoids Court-Martial By Associated Press May 21, 2004, 5:04 PM EDT FREMONT, Calif. -- An Army captain accused of taking nude photographs of female soldiers as they showered while on duty at Iraq's Abu Ghraib prison resigned to avoid a court-martial. Leo Merck, 32, who had commanded the Pittsburg, Calif.-based 870th Military Police Company since early 2002, finalized a deal with the Army on Wednesday, according to an Army spokesman at Fort Lewis in Washington state, where the 870th Company was discharged after leaving Iraq last month. "Captain Merck did resign in lieu of elimination from the service, which could have led to a court-martial," said the spokesman, Joe Hitt. "It was approved and he departed Fort Lewis on May 19." In November, three female soldiers filed a complaint accusing him of peering under a shower curtain and photographing them while they were naked. The incident took place at Abu Ghraib around the same time other American soldiers engaged in acts of sexual humiliation and abuse of Iraqi prisoners, which have led to the widely publicized prisoner-abuse scandal. The 124 members of the 870th Company were not involved in the abuse, according to an Army report. Merck, a financial analyst in civilian life, had been stationed in Kuwait until last month, pending court-martial proceedings. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8702 From: James M. Atkinson Date: Sun May 23, 2004 3:19pm Subject: Finish Line Accuses Foot Locker of Spying http://www.620ktar.com/news/article.aspx?id=378351 5/21/2004 11:34:00 AM Finish Line Accuses Foot Locker of Spying Athletic shoe retailer Finish Line Inc. has accused a larger competitor in a federal lawsuit of stealing its employees in a corporate spying scheme. The lawsuit, filed Thursday in U.S. District Court in Indianapolis, alleges that Foot Locker Inc. recruited Finish Line workers so it could obtain secret sales information. Indianapolis-based Finish Line and New York-based Foot Locker are competitors with hundreds of stores across the country selling athletic shoes and apparel. The suit alleges that Foot Locker actively recruited Finish Line's store managers, regional managers and corporate officers. These employees have access to confidential information, including sales projections, business plans and information about the profitability of individual Finish Line stores, the suit said. "If Finish Line were to lose a significant portion of that management team, it would suffer serious competitive harm," the lawsuit said. Peter Brown, a Foot Locker spokesman, said Friday the company does not comment on pending lawsuits. Foot Locker owns about 3,600 stores worldwide that operate under the names Foot Locker, Lady Foot Locker, Kids Foot Locker and Champs Sports. Finish Line operates 537 stores in 46 states. It lost out to Foot Locker last month in bidding for 192 Footaction shoe stores sold by a company in bankruptcy reorganization. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8703 From: James M. Atkinson Date: Sun May 23, 2004 3:22pm Subject: Knocking Out Wireless Networks with a PDA http://www.thefeature.com/article?articleid=100663&ref=1179035 Security: Knocking Out Wireless Networks with a PDA By Mark Frauenfelder, Fri May 21 21:15:00 GMT 2004 Over the shelf equipment as inexpensive as Wi-Fi PDAs or a cheap laptop can be used to take down a Wi-Fi base station. Time to shore up your home or office network. Some PhD students at the Queensland University of Technology's Information Security Research Center have discovered a way to use an off-the-shelf PDA to temporarily disable wireless security cameras. This Wi-Fi based system can also be used to "jam all wireless devices within a one kilometer radius using any wireless-enabled computing device and can take down an entire network in seconds if the base station is within range." Furthermore, this kind of mischief is almost impossible to trace, and even to identify, since it looks like network congestion. Associate Professor Mark Looi, deputy head of Queensland University of Technology's School of Software Engineering and Data Communications, said, "Any organization that continues to use the standard wireless technology, 802.11b, to operate critical infrastructure could be considered negligent." According to the researchers, no special software is needed. You just have to know which commands to send using the software that comes with the PDA. How soon before this nasty little hack hits the street, or airwaves? =========================== http://theage.com.au/articles/2004/05/17/1084646114738.html Attack jams spy cameras By Adam Turner May 18, 2004 Next An electronic invisibility cloak generated by nothing more than an off-the-shelf PDA would allow intruders to elude wireless security cameras using vulnerabilities in the most common wireless technologies. There is no defence against such a Mission Impossible-style attack, revealed last week, which can be used to knock out wireless networks and possibly transfer unwitting users to a spoofed wireless network. Accidentally discovered last year by PhD students at the Queensland University of Technology's Information Security Research Centre, the exploit presents obvious applications for terrorism and espionage. The vulnerability is "trivial" to exploit and only took 30 minutes to master, says Associate Professor Mark Looi, deputy head of QUT's School of Software Engineering and Data Communications. "It just uses off-the-shelf hardware and you don't need to write specific software, you just need to know the correct commands to use with the software that's supplied. On a difficulty rating of one to 10, it's probably a two," Looi says. The vulnerability exists in all flavours of the 802.11b wireless protocol and some types of 802.11g, including Apple's Airport Extreme technology. It affects equipment from all manufacturers, running with all operating systems. The exploit allows users to jam all wireless devices within a one kilometre radius using any wireless-enabled computing device and can take down an entire network in seconds if the base station is within range. The source of such an attack would be extremely difficult to trace and network recovery is immediate, making it appear to administrators as simply network congestion. A hand-held device could be used to temporarily jam wireless security cameras or disrupt a wireless network at a critical moment to create a diversion or cover unauthorised activity. Such a device could be pre-programmed or activated remotely using GPRS. As the exploit can be targeted at specific networks, it could be used to hijack users by jamming a wireless network and causing wireless devices to automatically detect and connect to a fake network, the default setting for most wireless devices. "Any organisation that continues to use the standard wireless technology, 802.11b, to operate critical infrastructure could be considered negligent," Looi says. Encryption and Medium Access Control address filtering is powerless to stop such an attack, which targets devices using Direct Sequence Spread Spectrum technology. The vulnerability takes advantage of the collision avoidance feature used to minimise the likelihood of two devices transmitting simultaneously. It causes all devices and access points within range to behave as if the channel is always busy and defer data transmission. "Normal frequency jamming needs high-powered, non-consumer grade equipment, but we're using existing wireless network infrastructure," Looi says. "Rather than jamming the whole frequency, we're tricking the network into thinking the network is unavailable." The Information Security Research Centre has been working with Australia's national computer emergency response team, AusCERT, to alert manufacturers since the discovery was made last November. After six months, a defence is yet to be found. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8704 From: James M. Atkinson Date: Sun May 23, 2004 3:18pm Subject: My Journey to Caxias http://www.counterpunch.org/reed05212004.html May 21, 2004 My Journey to Caxias How the CIA Taught the Portuguese to Torture By CHRISTOPHER REED For several days in the early summer of 1974, I had open access to a strange and terrible prison near Lisbon, then empty because of the coup that April which ended 48 years of fascist dictatorship in Portugal. My prison time in Caxias was a never forgotten experience, but I did not expect the memories to return so vividly today -- at the instigation of the United States. My recollections pose the question of whether Caxias was a beginning of the American prison gulag, the lawless penal control stretching today from Guantanamo in Cuba, to the Middle East, Afghanistan and clandestine activities in Colombia, the Philippines, and other places unknown, as well as the suspected proxy torture havens like Syria. When did political prisoners across the world begin to answer not to their peers, but to Uncle Sam? The prison of Caxias (Cuh-SHI-ash in Portuguese) was run by the secret police, the Pide (International Police for the Defence of the State), who were so feared by the Portuguese, pedestrians would cross to the opposite side of the street to pass its unmarked offices in Lisbon. Caxias was an old fortress near the sea, but inside was a modern torture chamber using the latest coercion techniques -- devised by the US Central Intelligence Agency. For decades in Caxias, thousands of political prisoners, mostly communists and socialists, were admitted for systematic torture and then released. Why were these known subversives, who had dedicated their lives to destroying the dictatorship, allowed to return to freedom? Because the success of the Pide's state-of-the-art imported torture techniques meant that their previous lives were now irrelevant. In the Pide's words, they had been "taken off the chess board". Their lives, old and new, were destroyed. My guide to Caxias was an Edinburgh-trained Portuguese psychiatrist, who for a mercifully short time had been a prisoner there himself. He told me that released prisoners, especially the communists -- regarded as the toughest ones to crack -- would often not go home. They would instead travel in the opposite direction from their families, take a simple job, or fall into alcoholism, even change their names; such were their new lives as mental zombies, created by coercion. (This was confirmed by another psychiatrist I interviewed who treated Caxias victims.) Central to the torture was sleep deprivation, a newish discovery enshrined in a 128-page secret manual produced by the CIA in July 1963 called Kubark Counterintelligence Interrogation. I was told several times at Caxias that the Pide's methods came from the CIA, although I did not knowingly see a copy of Kubark (the word is a code name for the agency itself). However, Portugal is and was a member of Nato, and as its secretive communist party was regarded as the nation's most dangerous security threat, and the Cold War rumbled on, there seems no doubt that the US intelligence agency, ordered to fight communism everywhere, was the source. It also had the latest information on "coercive interrogation." This becomes plainer on perusal of the Kubark manual, which was declassified in 1997 when the Baltimore Sun threatened a suit under the US Freedom of Information Act. It clearly describes what I saw as the methods at Caxias, and read about in the Pide's internal reports during my 1974 prison visits. In chapter nine of Kubark, titled Coercive Counterintelligence Interrogation of Resistant Sources, it recommends sleep and sensory deprivation to produce the "DDD syndrome" of "debility, dependence, and dread" in "interrogatees." (Note the dehumanisation of that word.) Victims could be reduced to compliance in a matter of hours or days, it said, but then warned against "applying duress past the point of irreversible psychological damage." This sentence confirms what the Pide were doing. The objective of CIA interrogation, as Kubark repeatedly emphasises, was information, hence the warning. But how conveniently this assisted the Pide, who were less interested in their victims' information, than in their destruction. Caxias adopted Kubark, but deliberately took its methods to the extreme it warned against. But as the mind torturers' manifesto carefully remarks: "The validity of the ethical arguments about coercion exceeds the scope of this paper." Complying with the manual's recommendations, the sound-proofed Caxias cells contained no distractions. Walls and ceilings were white but scuff marks remained -- they were excellent sources to stimulate the hallucinations that prisoners experienced after the first few days of sleeplessness. The light, as Kubark urges, was weak, artificial, and its source invisible. Huge concealed air-conditioner-heaters could turn the room in minutes from icy cold to a desert scorch. Such furniture as there was, mostly a table and a few chairs, was rounded at the edges to prevent a prisoner trying to kill himself by running his head into them, as some had tried. Cell ceilings contained speakers which broadcast loud and terrifying sounds, or sometimes the cries and sobs of their wives or children. The Pide had recorded these and played them from a central "studio" which I saw. Meals came at random, deliberately. An apparent breakfast might arrive at 4 pm; dinner in the middle of the night. No clocks or watches were allowed. Oh yes -- and cells had no beds. The record for prisoner sleeplessness was a young engineer, a communist, kept awake for a full month. He committed suicide upon his release. How can you keep someone awake for weeks? My psychiatrist friend sat me at the plastic-topped table and asked me to pretend to nod off. I closed my eyes -- to be jerked out of it by a sharp but penetrating metallic series of sounds. He had taken out an escudo coin and simply rapped it on the table top. Astonishingly, this was usually sufficient, and guards took turns through the endless hours. Another method was to throw a mug of icy water in a prisoner's face. And of course the tape recordings were always available. In former times the Pide was notorious for brutal torture. But it mellowed under its benevolent CIA guides; violence was eschewed. I saw a report on a Pide officer demoted for striking a prisoner, thus renewing his resistance. As Kubark-CIA says: "Direct physical brutality creates only resentment, hostility, and further defiance." The report on the Pide officer complained that his violence had "set back the treatment." Caxias prisoners were not left naked and suffered no systematic sex coercion. That came years later -- in 1983 when the CIA updated Kubark and recommended stripping prisoners and keeping them blindfolded. Presumably the additon of sexual manipulation is the latest thinking among US torture intellectuals. The 1983 manual, enthusiastically used by CIA clients in the vicious "contra" war against Central American leftist nationalists in President Reagan's years, was changed in 1985 after unfavourable publicity. An inserted page stated: "The use of force, mental torture, threats, insults, or exposure to inhumane treatment of any kind as an aid to interrogation is prohibited by law both internationally and domestically; it is neither authorised nor condoned." But as they say, what goes around, comes around. Christopher Reed was a correspondent for the London Guardian in Portugal from 1974-76. He now writes for the London Observer and other papers. He can be reached at: christopherreed@e.... ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8705 From: David Alexander Date: Sun May 23, 2004 5:28pm Subject: RE: Knocking Out Wireless Networks with a PDA There are actually 2 problems, and the knowledge of what they are is spreading. There was a CERT/UNIRAS alert about one of them 2 weeks ago. The other is still under wraps and I'm not going to divulge it. All I will say is it's easy, and there is no way to guard against it with the current protocols. It needs a complete re-design of 802.11 to stop the denial of service attack. It can also be used to launch a 'man in the middle' attack too. David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: 23 May 2004 21:23 To: TSCM-L Subject: [TSCM-L] Knocking Out Wireless Networks with a PDA http://www.thefeature.com/article?articleid=100663&ref=1179035 Security: Knocking Out Wireless Networks with a PDA By Mark Frauenfelder, Fri May 21 21:15:00 GMT 2004 Over the shelf equipment as inexpensive as Wi-Fi PDAs or a cheap laptop can be used to take down a Wi-Fi base station. Time to shore up your home or office network. Some PhD students at the Queensland University of Technology's Information Security Research Center have discovered a way to use an off-the-shelf PDA to temporarily disable wireless security cameras. This Wi-Fi based system can also be used to "jam all wireless devices within a one kilometer radius using any wireless-enabled computing device and can take down an entire network in seconds if the base station is within range." Furthermore, this kind of mischief is almost impossible to trace, and even to identify, since it looks like network congestion. Associate Professor Mark Looi, deputy head of Queensland University of Technology's School of Software Engineering and Data Communications, said, "Any organization that continues to use the standard wireless technology, 802.11b, to operate critical infrastructure could be considered negligent." According to the researchers, no special software is needed. You just have to know which commands to send using the software that comes with the PDA. How soon before this nasty little hack hits the street, or airwaves? =========================== http://theage.com.au/articles/2004/05/17/1084646114738.html Attack jams spy cameras By Adam Turner May 18, 2004 Next An electronic invisibility cloak generated by nothing more than an off-the-shelf PDA would allow intruders to elude wireless security cameras using vulnerabilities in the most common wireless technologies. There is no defence against such a Mission Impossible-style attack, revealed last week, which can be used to knock out wireless networks and possibly transfer unwitting users to a spoofed wireless network. Accidentally discovered last year by PhD students at the Queensland University of Technology's Information Security Research Centre, the exploit presents obvious applications for terrorism and espionage. The vulnerability is "trivial" to exploit and only took 30 minutes to master, says Associate Professor Mark Looi, deputy head of QUT's School of Software Engineering and Data Communications. "It just uses off-the-shelf hardware and you don't need to write specific software, you just need to know the correct commands to use with the software that's supplied. On a difficulty rating of one to 10, it's probably a two," Looi says. The vulnerability exists in all flavours of the 802.11b wireless protocol and some types of 802.11g, including Apple's Airport Extreme technology. It affects equipment from all manufacturers, running with all operating systems. The exploit allows users to jam all wireless devices within a one kilometre radius using any wireless-enabled computing device and can take down an entire network in seconds if the base station is within range. The source of such an attack would be extremely difficult to trace and network recovery is immediate, making it appear to administrators as simply network congestion. A hand-held device could be used to temporarily jam wireless security cameras or disrupt a wireless network at a critical moment to create a diversion or cover unauthorised activity. Such a device could be pre-programmed or activated remotely using GPRS. As the exploit can be targeted at specific networks, it could be used to hijack users by jamming a wireless network and causing wireless devices to automatically detect and connect to a fake network, the default setting for most wireless devices. "Any organisation that continues to use the standard wireless technology, 802.11b, to operate critical infrastructure could be considered negligent," Looi says. Encryption and Medium Access Control address filtering is powerless to stop such an attack, which targets devices using Direct Sequence Spread Spectrum technology. The vulnerability takes advantage of the collision avoidance feature used to minimise the likelihood of two devices transmitting simultaneously. It causes all devices and access points within range to behave as if the channel is always busy and defer data transmission. "Normal frequency jamming needs high-powered, non-consumer grade equipment, but we're using existing wireless network infrastructure," Looi says. "Rather than jamming the whole frequency, we're tricking the network into thinking the network is unavailable." The Information Security Research Centre has been working with Australia's national computer emergency response team, AusCERT, to alert manufacturers since the discovery was made last November. After six months, a defence is yet to be found. ---------------------------------------------------------------------------- ------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8706 From: John and Sheryl Date: Sun May 23, 2004 1:02pm Subject: RE: Superscout NLJD Hello, I am trying to locate any information on a Microlab FXR Superscout C1 NLJD. Any specification information, service manual, cut sheet, schematic would be helpful. I need to repair this unit and any assistance would be appreciated. John a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 8707 From: contranl Date: Mon May 24, 2004 7:40pm Subject: Another (optical) video camera detector. . Recently someone in this group asked about a laser based video-camera-detector Wich can be found here: http://shop.store.yahoo.com/shop-seatech/spyfinder.html You probably know that one already since it was mentioned in a reply Now the same company is marketing a lowcost device at only 119 US $ wich can be found here: http://www.spyfinderpersonal.com/company.html It also works on the principle of light being reflected back I have my doubts...the "looking angle" is very critical, as i understand it right you would have to sweep all the walls and ceilings...since you have to be exactly in front of the camera (90 degrees to the wall) in order to get any reflections from the camera lens (horizontally and vertically that is !) So you point the device at the wall and slowly displace your feet to the side untill you have done the whole wall ?....and then put a phone book or 2 on the floor...stand on them and repeat the whole thing again ? After that you put 4 phonebooks on the floor to do the next level untill you reach the ceiling ? If the camera is a pinhole type mounted at a 3 meters height (and mounted more or less flat to the wall)...you would have to climb a ladder ? and hold the detector right in front of it ?...i do'nt get it ...is this serious or not ? I cant see how you can have a reflection from a pinhole camera lens mounted behind a wall or board of let's say 5 mm thick... In order to get a reflection from that you will have to be right in front of the lens since the angle from where you can see the lens would be small...if the lens surface is reasonable flat (not rounded) then things are even worse ! A visual (eyes only) inspection would have the same result in the same amount of time ? So...useless ? Same goes for the more expensive one...wich obviously uses the same principle...only difference would be that it uses a real laserbeam with more light-power so you could keep more distance from the wall. I do'nt think that you can put your self in the middle of a room and sweep the walls from there by simply turning around your own axis On the other hand you would place yourself there where the video-ed target would be (if you now where that is) so a possible camera lens could be pointed at that location...and therefore be at a good angle to cause reflections.. (if it is mounted at an angle...wich is not necessary) I do'nt know...do you ? Thanks. tetrascanner www.tetrascanner.com 8708 From: contranl Date: Mon May 24, 2004 7:55pm Subject: More camera stuff ( laser camera zapper) . How to zap (blind) a videocamera with laser. Nothing new..but interesting reading and contains some video-demo's and links. http://www.naimark.net/projects/zap/howto.html Tetrascanner 8709 From: contranl Date: Mon May 24, 2004 7:59pm Subject: Moderation of this group gone ? . I noticed today that my messages appear immidiatly 4 seconds after i post them ! Error ? No more moderation ? tetrascanner www.tetrascanner.com 8710 From: James M. Atkinson Date: Mon May 24, 2004 8:26pm Subject: Re: Moderation of this group gone ? By default all new members of the group are moderated; however, once someone demonstrates that they have something constructive to offer, and can behave like a gentleman I upgrade their posting privileges so that they can openly post and benefit the group. -jma At 08:59 PM 5/24/2004, contranl wrote: >. > > >I noticed today that my messages appear immidiatly > >4 seconds after i post them ! > >Error ? > >No more moderation ? > > >tetrascanner >www.tetrascanner.com > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8711 From: contranl Date: Mon May 24, 2004 10:48pm Subject: Re; Moderation of this group is gone ? . Thanks !!! :) :) :) :) :) :) Tetrascanner www.tetrascanner.com 8712 From: James M. Atkinson Date: Tue May 25, 2004 0:46am Subject: Re: Re; Moderation of this group is gone ? Now make me proud ;-) -jma At 11:48 PM 5/24/2004, contranl wrote: >. > > >Thanks !!! :) :) :) :) :) :) > >Tetrascanner >www.tetrascanner.com ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8713 From: Fernando Martins Date: Tue May 25, 2004 1:55am Subject: Re: My Journey to Caxias Caxias is still a prison, a common one now, with the same problems as others. http://www.dgsp.mj.pt/eps/epcaxias/corpo_estabelec_53.html There was worse prisons then Caxias here, as we use to say, "at the times of the old lady" (the dictatourship), as Tarrafal in the island of Cabo Verde, that at the time was a portuguese colony. Was the exile for political prisioners. http://images.google.pt/images?hl=pt-PT&lr=&ie=UTF-8&q=+site:www.siljanet.com+tarrafal I was recently at the building (unoccupied now) where it was other of the torture prisons of the facist regime, the prison of Trafaria Fortress, on the waterside of Tejo river, where in the lowest floor the cells are full of water in the flood tide. Still makes shivers walking on those galleries imaging how much pain and suffering was there ... http://www.m-almada.pt/website/pic/i83.2.jpg http://www.terravista.pt/baiagatas/1053/trafax05.jpg [some crazy soul was asking for advice to protect the fortress, cctv and the usual stuff ... my recommendation was for implosion] I just have links in portuguese, but anyway ... this one is regarding the history of PIDE http://www.sis.pt/historia/pide-dgs.htm Aside of all the horror stories, one of the strong points of PIDE was the 'intelligence' job, gathering and collecting all kinds of information regarding anybody. In our days, with all the electronic and computerized equipment for that, things many times go wrong (as bombimg a wedding in Iraq) because intelligence many times is no longer based on people on the field. FM 8714 From: Manjunath Shastry Date: Mon May 24, 2004 10:53pm Subject: Please help, I habe been Bugged Greetings, I am a Scientist based in India, my former employer HCL Technologies, is spying all my activities round the clock and I am also experiencing pain, numbness, shock, irritation and such sensations randomly in all parts of my Body. This suspect this is done using electronic gadgets, though I have been able to find none. How best can I stop this, would highly appreciate your help. Regards, Manjunath. __________________________________ Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger. http://messenger.yahoo.com/ 8715 From: redelst Date: Mon May 24, 2004 11:07pm Subject: The Practical uses of Thermography inTSCM Some years ago I had done some training with the folks at Audiotel in the UK, and had asked about the practical uses of thermography in the location of embedded devices. At the time, the concept was dismissed as impractical. I now realize that considering this was the early 90's, thermography was very primative as compared to present technology. I have noticed that there are TSCM teams advertising their adoption of what they call TESA, and it seems that they rely heavily on this thermography as a core technology in the location of hidden devices. In a search of the messages in this group, I have uncovered no refernce to this technology, and likewise a cursory review of the TSCM.COM site nets nothing. From my understanding the US Marshall service works with the Raytheon units for the location of devices once a signal is detected. This sounds like a responsible approach for the use of such a device. Does anyone have any comments on the use of Thermography as a tool for TSCM? Would anyone be able to assign a value to such a tool? Before I drop ~$10k on a unit for research purposes, I would like to hear what others might have tried. From: Matthew Paulsen Date: Wed May 22, 2002 11:40pm Subject: Judge to rule Monday on playing of surveillance tape http://www.projo.com/trial/content/projo-20020517-ruling.96054611.html 05/17/2002 Associated Press PROVIDENCE / 10:15 a.m. -- The judge in the federal corruption trial of Mayor Vincent A. Cianci Jr. said he'll issue a ruling Monday on whether prosecutors can play a controversial surveillance tape. The tape is said to feature two of Cianci's former top aides, Thomas Rossi and Frank Corrente, discussing a range of charges against the mayor as well as Cianci's sex life. U.S. District Court Judge Ernest C. Torres said this morning it may be a partial ruling and could depend on prosecutors establishing that Corrente, Rossi and Cianci were part of a criminal conspiracy in City Hall. Federal prosecutors contend the tape shows Cianci and co-defendants Corrente, Richard Autiello and Edward Voccola were involved in a racketeering conspiracy. They have pleaded innocent to a 29-count indictment that charges them with bribery, extortion, racketeering, witness tampering and mail fraud. Defense lawyers said the tape is nothing more than hearsay punctuated by locker-room banter. The meeting at a Dunkin' Donuts in Cranston in July 1999 was captured on audiotape by Rossi, an aide to Cianci in the early 1990s who wore a wire for federal investigators. 5464 From: Hawkspirit Date: Thu May 23, 2002 10:23am Subject: Book Does anyone know the title of the book, by I think Tom Clancy, which was written a few years ago where in the plot terrorists hijack a plane and smash it into a structure? thanks, Roger 5465 From: ed Date: Thu May 23, 2002 10:49am Subject: RE: GSM monitoring platform At 04:34 AM 5/23/02 -0400, sig346@n... wrote: >Well, most probably it was an analog or digital cellular monitoring >system,- again MINOTORING in technical sense, not SURVEILLANCE - in other >words a some kind of emulator for checking the protocol, eye diagrams etc, >not for message substraction. again, there was a high-quality earphone velcroed with a strap inside the suitcase and connected to one of the WJ units. no displays or indicators, either. another one of the WJ units in this covert monitoring system had a RS232 interface for control and display purposes. -ed 5466 From: William Knowles Date: Thu May 23, 2002 11:41am Subject: Re: Book On Thu, 23 May 2002, Hawkspirit wrote: > Does anyone know the title of the book, by I think Tom Clancy, which > was written a few years ago where in the plot terrorists hijack a > plane and smash it into a structure? thanks, Roger The office Clancy fan points out that the two books were... Debt of Honor http://www.amazon.com/exec/obidos/ASIN/0425147584/c4iorg and... Executive Orders http://www.amazon.com/exec/obidos/ASIN/0425158632/c4iorg Debt of Honor covers the crash, and Executive Orders touches on the aftermath. Cheers! William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 5467 From: gkeenan Date: Thu May 23, 2002 11:44am Subject: Re: Book That would probably be "the Sum of All Fears" where a Japanese commercial pilot hijacks his own plane out of BWI (I think), but before any passengers were aboard, and dives it into the Capitol Building wiping out all of Congress, the Senate, the President, etc. It's also an upcoming movie staring Ben Afflick and Lou Gossett. Jerry Keenan ----- Original Message ----- From: "Hawkspirit" To: "TSCM" Sent: Thursday, May 23, 2002 11:23 AM Subject: [TSCM-L] Book > Does anyone know the title of the book, by I think Tom Clancy, which was > written a few years ago where in the plot terrorists hijack a plane and > smash it into a structure? thanks, Roger > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5468 From: gkeenan Date: Thu May 23, 2002 0:01pm Subject: Re: Book Yup - got my titles mixed up. The crash did happen in Debt of Honor. My mistake (I'll slap myself later! :)) Jerry ----- Original Message ----- From: "William Knowles" To: "Hawkspirit" Cc: "TSCM" Sent: Thursday, May 23, 2002 12:41 PM Subject: Re: [TSCM-L] Book > On Thu, 23 May 2002, Hawkspirit wrote: > > > Does anyone know the title of the book, by I think Tom Clancy, which > > was written a few years ago where in the plot terrorists hijack a > > plane and smash it into a structure? thanks, Roger > > The office Clancy fan points out that the two books were... > > Debt of Honor > http://www.amazon.com/exec/obidos/ASIN/0425147584/c4iorg > > and... > > Executive Orders > http://www.amazon.com/exec/obidos/ASIN/0425158632/c4iorg > > Debt of Honor covers the crash, and Executive Orders touches on the > aftermath. > > Cheers! > > William Knowles > wk@c... > > > > *==============================================================* > "Communications without intelligence is noise; Intelligence > without communications is irrelevant." Gen Alfred. M. Gray, USMC > ================================================================ > C4I.org - Computer Security, & Intelligence - http://www.c4i.org > *==============================================================* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5469 From: john schmitt Date: Thu May 23, 2002 10:56am Subject: Re: Book The following is from www.clancyfaq.com ************************ Want to read Clancy's book that had an airplane crashing into the Capitol? See Debt of Honor for the crash (and why it happened) and Executive Orders for the aftermath (in which JPR responds in much the same way that our President is now responding). ----- Original Message ----- From: "Hawkspirit" To: "TSCM" Sent: Thursday, May 23, 2002 11:23 AM Subject: [TSCM-L] Book > Does anyone know the title of the book, by I think Tom Clancy, which was > written a few years ago where in the plot terrorists hijack a plane and > smash it into a structure? thanks, Roger > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5470 From: James M. Atkinson Date: Thu May 23, 2002 3:11pm Subject: Memorial Day 2002 At the very top of my website I have added a memorial day message and prayer that list members may find of interest: http://www.tscm.com/ I am profoundly grateful to those who gave their all so that we could be a free nation. God bless this nation, -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5471 From: Date: Thu May 23, 2002 10:54pm Subject: New file uploaded to TSCM-L Hello, This email message is a notification to let you know that a file has been uploaded to the Files area of the TSCM-L group. File : /CL-tomtakingstevespix.JPG Uploaded by : graniteislandgroup Description : Steve Uhrig and Tom Clancy1 You can access this file at the URL http://groups.yahoo.com/group/TSCM-L/files/CL-tomtakingstevespix.JPG To learn more about file sharing for your group, please visit http://help.yahoo.com/help/us/groups/files Regards, graniteislandgroup 5472 From: Date: Thu May 23, 2002 10:56pm Subject: New file uploaded to TSCM-L Hello, This email message is a notification to let you know that a file has been uploaded to the Files area of the TSCM-L group. File : /CL-tomwithsteveslx.jpg Uploaded by : graniteislandgroup Description : More of Steve and Tom 3 You can access this file at the URL http://groups.yahoo.com/group/TSCM-L/files/CL-tomwithsteveslx.jpg To learn more about file sharing for your group, please visit http://help.yahoo.com/help/us/groups/files Regards, graniteislandgroup 5473 From: Hawkspirit Date: Thu May 23, 2002 11:30pm Subject: Connecting the dots Thanks for the help gang, the Tom Clancy book was: Executive Orders (July 1987) by Tom Clancy Tom Clancy goes to the White House in this thriller of political terror and global disaster. The American political situation takes a disturbing turn as the President, Congress, and Supreme Court are obliterated when a Japanese terrorist lands a 747 on the Capitol. So Tom was connecting the dots back in 1987. Amazing, Roger 5474 From: kondrak Date: Fri May 24, 2002 3:44am Subject: test #2 while I receive this list, all of a sudden, I cant seem to post. This is a test. 5475 From: Fernando Martins Date: Fri May 24, 2002 3:09pm Subject: X-ray machines Even if a bit off topic, I hope I can get some help. I need references (tech info and vendors URL's) about X-ray machines and metal detection portals. The use of this devices is for prisons. Advices about system design, and common mistakes, are also wellcome. Thanks in advance FM 5476 From: Secdep Date: Fri May 24, 2002 11:40pm Subject: Re: X-ray machines Fernando Contact Steve UHRIG, steve@s... I know he sells portable X-Ray Machines. He should be able to point you in the right direction. Raymond ----- Original Message ----- From: "Fernando Martins" To: Sent: Friday, May 24, 2002 10:09 PM Subject: [TSCM-L] X-ray machines > Even if a bit off topic, I hope I can get some help. > I need references (tech info and vendors URL's) about X-ray machines and > metal detection portals. > The use of this devices is for prisons. > Advices about system design, and common mistakes, are also wellcome. > > Thanks in advance > > FM > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 5477 From: A Grudko Date: Sat May 25, 2002 3:36pm Subject: Note the date - Terrorist training OK, I've pulled out my own whistle and I am blowing it - see below - but heck, it's a lovely Saturday morning here in the mountains. I'm thinking of changing my name to Nostradamus ;-) Andy Grudko South Africa --------------- To: Sent: Thursday September 13, 2001 From : agrudko@i... > > There is evidence emerging that the hijackers had some flight > > training, but is that necessary? Once a modern aircraft is in the air, cruising, all > > that's required are small adjustments. Playing Microsoft's Flight Simulator, > > where you can choose any plane and condition, can very > > effectively learn to control an aircraft. Not only can you choose almost any Boeing craft but > > FLYING BETWEEN THE WTC TWIN TOWERS is a standard exercise on the New York > > version ! I recall that aeronautical engineer & pilot Miguel Pichol supported my theory on this list at that time. So yesterday: Handheld GPS devices may have been key to attack By Nicholas Wapshott / The Times of London 24 May 2002 New York - Credit card records of suicide hijacker Mohammed Atta show that he was in Manhattan the day before he crashed an aircraft into the World Trade Center. Through the records of the 27 credit cards the FBI has learnt that the four GPS devices probably used were bought from Sporty's Pilot Shop in Ohio. Atta also bought a number of flight simulator video games in the shop Prosecutors of Zacarias Moussaoui, who is on trial in Virginia for his alleged part in the hijackings, say that on June 25, 2000, he too visited the shop and bought a GPS receiver and flight simulation software for two types of Boeing 747s. Andy Grudko (British) - D.P.M., Grad I.S, South Africa - PSIRA investigators Reg. No. 8642 Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust When you need it done right - first time 5478 From: Date: Sat May 25, 2002 7:06am Subject: Military.com Content Extremist Stowaways Sneak Into US United Press International May 13, 2002 LOS ANGELES, May 13, 2002 (United Press International via COMTEX) -- The Coast Guard has reportedly determined that 25 Islamic extremists have entered the United States since late March inside cargo containers aboard commercial freighters, arriving at three major seaports. Fox News reported Monday that a May 10 Coast Guard intelligence report indicated that the stowaways made landfall in Miami, Long Beach, Calif., and Savannah, Ga. Coast Guard officials in Washington and Los Angeles had no immediate comment on the Fox report, however the Journal of Commerce said a Coast Guard captain told them that the information had not been substantiated to the degree that a higher state of alert was being instituted. Fox said that a classified briefing scheduled for Tuesday would provide law enforcement officials with details about the suspects and their possible intentions. American seaports have been considered a possible entry point for terrorists or a weapon of mass destruction ever since Sept. 11 because of the thousands of cargo containers that arrive every day from around the world. The number of containers is simply too high for Customs inspectors to check each one individually and make sure there is no contraband hidden inside. Asian smugglers frequently use containers to transport illegal Chinese immigrants into the United States. The containers are large enough to hold several individuals and enough supplies to last the approximately 10 days it takes for a ship to sail from Asia to the West Coast. The Coast Guard routinely boards and inspects several arriving commercial ships per day, giving tankers and other vessels carrying hazardous cargoes top priority. Copyright 2002 by United Press International HAVE A GREAT DAY !!! ---------- http://www.military.com/Content/MoreContent?ESRC=airforce.nl&file=FL_stow_051402 [Non-text portions of this message have been removed] 5479 From: Fernando Martins Date: Sat May 25, 2002 5:31am Subject: RE: X-ray machines Hi, I checked Steve's site, but used portable X-ray machines is not what I need. He's in the list, so I'll wait for those wize directions ;) Thanks FM P.S. - thus, I may know somebody that may be is interested in used Audiotel products, since the quotes from ifsec2002 audiotel stand probably aren't as good as Steve's ... They have nice catalogs, but nasty prices ;) ª -----Original Message----- ª From: Secdep [mailto:secdep@v...] ª Sent: s·bado, 25 de Maio de 2002 5:40 ª To: TSCM-L; fernando.martins@e... ª Subject: Re: [TSCM-L] X-ray machines ª ª ª Fernando ª ª Contact Steve UHRIG, steve@s... I know he sells ª portable X-Ray Machines. He should be able to point you in ª the right direction. ª ª Raymond ª ª ----- Original Message ----- ª From: "Fernando Martins" ª To: ª Sent: Friday, May 24, 2002 10:09 PM ª Subject: [TSCM-L] X-ray machines ª ª ª > Even if a bit off topic, I hope I can get some help. ª > I need references (tech info and vendors URL's) about X-ray ª machines ª > and metal detection portals. The use of this devices is for prisons. ª > Advices about system design, and common mistakes, are also wellcome. ª > ª > Thanks in advance ª > ª > FM ª > ª > ª > ª > ª > ª > ------------------------ Yahoo! Groups Sponsor ª > ---------------------~--> Download VeriSign's FREE guide, "Securing ª > Your Web Site for Business" and ª learn everything you need to know about using SSL to encrypt ª your e-commerce transactions for serious online security. Click here! ª > http://us.click.yahoo.com/P62TUC/MyKEAA/sXBHAA/kgFolB/TM ª > ª ---------------------------------------------------------------------~ ª > -> ª > ª > ======================================================== ª > TSCM-L Technical Security Mailing List ª > "In a multitude of counselors there is strength" ª > ª > To subscribe to the TSCM-L mailing list visit: ª > http://www.yahoogroups.com/community/TSCM-L ª > ª > It is by caffeine alone I set my mind in motion. ª > It is by the juice of Star Bucks that thoughts acquire speed, the ª > hands acquire shaking, the shaking is a warning. It is by caffeine ª > alone I set my mind in motion. ª > =================================================== TSKS ª > ª > Your use of Yahoo! Groups is subject to ª > http://docs.yahoo.com/info/terms/ ª > ª > ª > ª > ª ª ª 5480 From: Fernando Martins Date: Sat May 25, 2002 5:47am Subject: RE: X-ray machines http://www.heimannsystems.com/ (from Germany) <- I liked this ones, because they cover everything (product, installation, trainning, support, ...), and since they are, like me, in Europe, probably the prices are better. I may be wrong of course ... http://www.bombdetection.com/prison_security.shtml (from US) <- members of IACSP (http://www.iacsp.com/), complete support service, seems nice and expensive. Again, I may be wrong of course ... Anybody had business with any of this corps? Good/Bad experiences? FM 5481 From: Thomas Conlon Date: Sat May 25, 2002 7:47am Subject: Re: cargo ships Don't hear anything these days about the 4 that got into NJ on INS approved "shore leave" ... -tc _________________________________________________________________ MSN Photos is the easiest way to share and print your photos: http://photos.msn.com/support/worldwide.aspx [Non-text portions of this message have been removed] 5482 From: Date: Sat May 25, 2002 0:38pm Subject: Memorial Day Have a great weekend , as we remember our fallen heroes....... [Non-text portions of this message have been removed] 5483 From: Robert Dyk Date: Sun May 26, 2002 8:19am Subject: RE: X-ray machines I have experience with Metor 200 walkthrough metal detection. Most systems today are designed for large weapons in order to cut down on false positives. Metor makes a 200HS system specifically designed for the prison environment where the subjects (prisoners) are all wearing the same uniform with likely little to no metal. It will detect razor blades etc. It has a vertical bank of indicators which that show the operator at what height a threat has been detected. This a very useful real world feature. Look for remote control programming, networking etc. These systems usually need at least 2 feet of free air on all sides and top in order to work to maximum sensitivity. I have experience with Rapiscan x-ray systems. They have proven fairly reliable. Look for a networked system that allows an operator to be supervised from a remote station. Rapiscan has a feature in their software that runs a training program of randomly stored bag images and then superimposes an image of a threat into the image. This training routine is very effective for new operators. Think about a dual view system that allows two image aspects of the same item to be viewed simultaneously. Remember that the x-ray image on the screen does not give you any indication of depth. The contents of a scanned image look like they have been flattened into a single layer. Depending on the orientation of the treat object within the bag to be scanned, this can mean the difference between detection and non-detection. (due to operator error or inexperience) Hope this helps Robert Dyk Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. 5484 From: A.Lizard Date: Sun May 26, 2002 1:59am Subject: biometrics - not ready for prime time http://www.heise.de/ct/english/02/11/114/ Body Check (c't magazine) This article shows tests of a stack of off-the-shelf consumer-level biometric ID devices using various technologies (fingerprint, retina scan, facial recognition) which demonstrate that they can be beaten by various methods that are fairly easy and using fairly common materials and computer hardware. It concludes that depending on biometrics alone without at least use of a password or other secondary ID method is a VERY BAD IDEA. A brief summary can be found at: http://www.theregister.co.uk/content/55/25400.html Biometric sensors beaten senseless in tests A.Lizard ************************************************************************ new voicemail number,ask if you need it. Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@C... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 5485 From: Fernando Martins Date: Sun May 26, 2002 4:12pm Subject: RE: X-ray machines http://www.rapiscan.com/index.html I'm reading now the products details ... They have a UK office, that is good news for me ... That was a nice tip, thanks FM > -----Original Message----- > From: Robert Dyk [mailto:dyk@c...] > Sent: domingo, 26 de Maio de 2002 14:20 > To: TSCM-L-yahoogroups. com > Subject: RE: [TSCM-L] X-ray machines > > > > I have experience with Metor 200 walkthrough metal detection. > Most systems today are designed for large weapons in order > to cut down on false positives. Metor makes a 200HS system > specifically designed for the prison environment where the > subjects (prisoners) are all wearing the same uniform with > likely little to no metal. It will detect razor blades etc. > It has a vertical bank of indicators which that show the > operator at what height a > threat has been detected. This a very useful real world > feature. Look for > remote control programming, networking etc. These systems > usually need at least 2 feet of free air on all sides and top > in order to work to maximum sensitivity. > > I have experience with Rapiscan x-ray systems. They have > proven fairly reliable. Look for a networked system that > allows an operator to be supervised from a remote station. > Rapiscan has a feature in their software that runs a training > program of randomly stored bag images and then superimposes > an image of a threat into the image. This training routine > is very effective for new operators. Think about a dual view > system that allows two image aspects of the same item to be > viewed simultaneously. Remember that the x-ray image on the > screen does not give you any indication of depth. The > contents of a scanned image look like they have been > flattened into a single layer. Depending on the orientation > of the treat object within the bag to be scanned, this can > mean the difference between detection and non-detection. (due > to operator error or inexperience) > > Hope this helps > > Robert Dyk > > Worldwide Security Ltd. > Mississauga, Ontario > Canada > > This e-mail is confidential and may contain privileged > information. If you are not the addressee it may be unlawful > for you to read, copy, distribute, disclose or otherwise use > the information in this e-mail. If you are not the intended > recipient please notify us immediately. 5486 From: monty399 Date: Sun May 26, 2002 9:31pm Subject: Oscar Steve Uhrig On Tue, 21 May 2002 you message... Subject: Watchdog W-100 You talked a little about the Oscar short comings. What do you recommend instead. I just got back from Europe on a job and one of the many tools we carry is the Oscar (not the only tool). >There are a good number of simple, cheap, dangerous surveillance >devices out there used by law enforcement the Woori piece did not >detect, same as the Oscor didn't when I owned one. Just because the >salesmen do not know of them and do not design in the capability to >detect them is not an excuse for the things not working properly. >Relying on an ineffective tool well can result in a dangerous false >sense of security. And in the case of the Woori (and the Oscor too, >because I was factory trained on the thing) it's not operator >inexperience that causes the failure. It is a shortcoming in the >capability of the device. Monty 5487 From: James M. Atkinson Date: Sun May 26, 2002 11:10pm Subject: Re: Oscar The best system to hunt for bugs is a modern microwave spectrum analyzer, laboratory grade omni-directional and directional antennas, low noise high gain preamplifiers, and premium cables. The OSCOR is OK for low end sweeps where you have minimal time for the sweep, or you can not bring hundreds of pounds of equipment to the sweep. The OSCOR is also good for unskilled users, and for cases where someone with little or no technical training has to perform a limited sweep (say for example a bodyguard or PI). One the one hand you can buy an OSCOR for 15k or so, or you can spend a 100K+ for a laboratory grade microwave spectrum analyzer, antennas, amplifiers, filters, and cables. Personally I prefer both, and own several OSCORs, and numerous microwave spectrum analyzers with supporting gear. Yes, the OSCOR is not perfect, but for the money it is a fairly good deal. Now if you have a cool half million to spend on equipment that you can start looking at higher end equipment. The following page should answer some of you questions about equipment: http://www.tscm.com/TSCM102sweepgear.html -jma At 2:31 AM +0000 5/27/02, monty399 wrote: >Steve Uhrig > >On Tue, 21 May 2002 you message... >Subject: Watchdog W-100 > >You talked a little about the Oscar short comings. >What do you recommend instead. I just got back >from Europe on a job and one of the many tools we >carry is the Oscar (not the only tool). > >>There are a good number of simple, cheap, dangerous surveillance >>devices out there used by law enforcement the Woori piece did not >>detect, same as the Oscor didn't when I owned one. Just because the >>salesmen do not know of them and do not design in the capability to >>detect them is not an excuse for the things not working properly. >>Relying on an ineffective tool well can result in a dangerous false >>sense of security. And in the case of the Woori (and the Oscor too, >>because I was factory trained on the thing) it's not operator >>inexperience that causes the failure. It is a shortcoming in the >>capability of the device. > >Monty -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5488 From: Gil Zimmerman Date: Mon May 27, 2002 6:26am Subject: RE: FBI memo re 9-11 investigation More "inside" information regarding the FBI's handling of events, courtesy of Time magazine. Coleen Rowley's Memo to FBI Director Robert Mueller An edited version of the agent's 13-page letter http://www.time.com/time/covers/1101020603/memo.html Regards, Gil Gil Zimmerman New York City (646) 261-7378 mobile (646) 349-1485 fax --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.365 / Virus Database: 202 - Release Date: 5/24/2002 5489 From: sentinelfi Date: Mon May 27, 2002 7:37am Subject: Jamming I have made a prototype of jamming unit and I like to know what you think about it. It jamms all microphones in close range and also disturbes infrared to ultraviolet light transmissions. Against stethoscopes it contains also vibrator units. It dosen't make any audible noise, but ir-remote controllers might not work in the room. I'm trying to solve that problem. Istalling and measuring the system takes almost one day and it is not easy, but it is only prototype at this moment. Is there any future to this kind of system or not? 5490 From: Justin T. Fanning Date: Mon May 27, 2002 3:30pm Subject: Re: Jamming Ok I'll bite ... sentinelfi wrote: > I have made a prototype of jamming unit and I like to know what you > think about it. > It jamms all microphones in close range ??? I've seen consumer units operating from the AM broadcast band of 1.8 Mhz to the 2.4 Ghz ISM band. Professional units can go even higher and can have significant output, not to mention spread spectrum etc. I think you'll find such broadband "noise" is illegal in almost any civilized country. Some countries would have it illegal to even buy, sell or posses such a device. > and also disturbes infrared to ultraviolet light transmissions. You do realise that VISIBLE LIGHT is in-between infrared and ultraviolet? A lot of countries are regulating the IR/UV part of the spectrum now. > Against stethoscopes it contains also vibrator units. > It dosen't make any audible noise, but ir-remote controllers might > not work in the room. I'm trying to solve that problem. > Istalling and measuring the system takes almost one day and it is > not easy, but it is only prototype at this moment. Is there any > future to this kind of system or not? 1) It's use would be illegal almost everywhere; 2) Even it's possession could be illegal in some locations; 3) It has the potential to interfere with legitimate spectrum users; 4) It has the potential to harm the eyes/skin of close users with UV. etc etc etc Can I ask what your interest is here? If it's a science fair project it's novel, if it's a serious commercial project, I think you'll run into a wall of legal and compliance issues. JF 5491 From: Date: Mon May 27, 2002 11:55am Subject: Re: Jamming In a message dated 5/27/02 8:09:49 AM Pacific Daylight Time, jami.huuska@m... writes: << It jamms all microphones in close range and also disturbs infrared to ultraviolet light transmissions. Against stethoscopes it contains also vibrator units. It doesn't make any audible noise, but ir-remote controllers might not work in the room. >> I'll believe it works when you go to patent it and the government slaps a secrecy order on it. Please keep the list advised. 5492 From: buzzben Date: Mon May 27, 2002 9:12pm Subject: TDRs and SWS Security Recently I decided to purchase another TDR. Since my primary use is for twisted pair, I initially considered another Riser Bond 1205T. I contacted Steve Uhrig with SWS Security, www.swssec.com , tel: (410) 879-4035, fax: (410) 836-1190. Steve recommended a Riser Bond Model 3300, which he said was in "perfect but slightly used" condition, and at a significant savings over a new one. He also said that he favored the compact packaging, accuracy, and dual trace features of the 3300. This one also had the extended memory option. I decided to give it a try. The 3300 arrived two days later. It was in absolutely "like new" condition, and was accompanied by all factory accessories. The unit works perfectly and I am very pleased. Anyone wishing to purchase a TDR or other TSCM equipment would do well to contact Steve at SWS Security. I recommend him without hesitation. Thank you Steve. Best Regards, Buzz Benson EWS-Atlanta buzzben@m... Tel: (678) 316-7002 Fax: (706) 654-2080 [Non-text portions of this message have been removed] From: Date: Thu May 22, 2003 3:42pm Subject: Re: Guess where the feds hid that GPS? In a message dated 5/22/2003 5:06:43 PM Pacific Standard Time, kondrak@s... writes: > ...a typical AM/FM whip isn't the best antenna for that freq range. Obviously they replaced the antenna with a disguise antenna specifically manufactured for the purpose. I'm sure that money was no object. [Non-text portions of this message have been removed] 7384 From: Jay Coote Date: Thu May 22, 2003 9:10pm Subject: Re: Mini bug detector Oh, no... we're all out of a job! Jay ---------- http://www.thinkgeek.com/gadgets/security/5a42/ Shhh...You know they're listening. Are you paranoid? Have good reason? The Mini Bug Detector offers protection against wireless microphones and transmitters. This device is perfect for securing homes, offices and hotel rooms. It has a LED signal strength display and audio tone that help pinpoint the precise location of bugs. The audio alarm can be turned off for discreet sweeps, while the sensitivity adjustment eliminates false alarms. The Mini Bug Detector features wide range circuitry that enables it to detect concealed transmitters operating on frequencies from 50 MHz to 3 GHz. The power to expose most high frequency transmitters, as well as more common VHF and UHF bugs, is now in the palm your hand. You were never paranoid...until they started coming after you... Weight: 10.5 oz. Dimensions: 5 1/2" x 3" x 7/8" Requires one 9-Volt battery (not included) Price: $99.99 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7385 From: William Knowles Date: Thu May 22, 2003 9:19pm Subject: Re: Re: Secure Phones... On Wed, 21 May 2003, Ocean Group wrote: > Ha ha, play nice guys!! :) > > I'd say most of the encryption the US LEO boys came up against were > basic inversion or rollover units bought in a spyshop etc(you know > the deal)! Easy for any cop tech to record and analyse. Then play it > back in all its glory on a 6:1 dolby surround system in the > courthouse....! > > However as regards Jim's recommendation, I think otherwise: This is > my opinion, I would rather take a bullet in the leg than recommend a > US built encrypted phone unit to a European corporate customer. > > I'd sooner make them dish up the extra money to have > encryption(using pulic source algo's) software made for a digital > phone in the EU and then port it to hardware cheaply in Taiwan than > buy a Motorola unit. The only device I have heard of that fits the bill almost completely, but I have yet to evaluate, is the Starium 100 http://www.starium.com/pics.htm Anyone else know anything about this, besides that the directors and advisors read like a who's who of information security? Cheers! William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 7386 From: Date: Thu May 22, 2003 7:27pm Subject: Re: Re: Secure Phones... In a message dated 5/22/2003 7:15:17 PM Pacific Standard Time, wk@c... writes: > http://www.starium.com I believe the company is not operating and the units are unavailable. I had hands on with their first run units and I wouldn't recommend them to anyone. [Non-text portions of this message have been removed] 7387 From: kondrak Date: Thu May 22, 2003 11:44pm Subject: Re: Guess where the feds hid that GPS? Im thinking more along the line of polarity...a whip is vertically polarized with respect to the earth surface, you almost never see a vertical polarized GPS antenna. Most are patch or slotted cavity radiators. At 20:42 5/22/2003 -0400, you wrote: >In a message dated 5/22/2003 5:06:43 PM Pacific Standard Time, >kondrak@s... writes: > > >>...a typical AM/FM whip isn't the best antenna for that freq range. > > > > Obviously they replaced the antenna with a disguise antenna specifically >manufactured for the purpose. I'm sure that money was no object. [Non-text portions of this message have been removed] 7388 From: Steve Uhrig Date: Fri May 23, 2003 9:07am Subject: Stupid Security http://www.privacyinternational.org/activities/stupidsecurity/ 7389 From: Date: Fri May 23, 2003 7:43am Subject: CCTV help Just a quick line to thank all that offered advice and formulas regarding my request. While I was unable to convince management that they needed to rethink their approach, at least I was able to tell them "I told you so." Some runs will have new cable pulled, and all data wire will be shielded vs. twisted pair ... lots of wasted time. At least after the Dog and Pony show I can go back and do it right! Many thanks, Paul "Guppy" Gibson [Non-text portions of this message have been removed] 7390 From: Ervin S. Odisho Date: Fri May 23, 2003 2:01pm Subject: Recently Joined Hi All! Just in a similar way as Steve did I would also like to introduce myself to the group. My name is Ervin Sarkisov, I live in Madrid, Spain. I am working for an IT company in hardware and software security area. Personally I am running a project focusing on the forensic research on compromised or manipulated hardware (servers, firewalls, crypto-gateways access units, sensors, etc). My interest in TSCM area is highly related to analysis of equipment found during the sweeps in order to establish its detailed functionality and specifications. My background has nothing to do with neither IT nor TSCM as I have graduated in Psychology, but it did not stop me from working since 5 years in IT security industry in Spain. I am looking forward to be able to contribute to the discussion as well as learn from TSCM professionals on the list. Yours faithfully, Ervin -- Ervin S. Odisho The Activa Link Project (activalink) 7391 From: Thomas Conlon Date: Sat May 24, 2003 3:07am Subject: RE: Stupid Security What is this thing? I don't think it fell out of one of my cassette decks, which was my first thought. Maybe an old floppy bus tape drive, it's possible. It was in my office. Thanks. -tc syseng@m... [Non-text portions of this message have been removed] 7392 From: kondrak Date: Sun May 25, 2003 1:56pm Subject: Re: CCTV help GOOD!!! Hey, that's why they asked YOU, they wanted a good job, and we're always happy to help someone do the job right..... At 12:43 5/23/2003 -0400, you wrote: >Just a quick line to thank all that offered advice and formulas regarding my >request. > >While I was unable to convince management that they needed to rethink their >approach, at least I was able to tell them "I told you so." > >Some runs will have new cable pulled, and all data wire will be shielded vs. >twisted pair ... lots of wasted time. > >At least after the Dog and Pony show I can go back and do it right! > >Many thanks, >Paul "Guppy" Gibson > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7393 From: Robert Motzer <1RCM@M...> Date: Sun May 25, 2003 2:17pm Subject: General Information regarding REI CPM-700 Hi List, I, like many on this list, tend to shy away from jumping into the churning waters of recommending any particular piece of equipment or vendor. However, I thought it might be beneficial to any list members who might have an REI CPM-700 somewhere in their toy chest to read this information. Recently I blew out two CPM-700 probes at the same job (magnificent sparks I must say). Not having a reason to pay any attention to the postings on the boards regarding this topic for my past five years of ownership I wasn't quite sure what to do. So I contacted REI's Customer Service Department. Without going into the details let me just say that they were extremely responsive and helpful as to repair and replacement. As I have now found with the two pieces of REI equipment that I own REI stands behind their products fully and seems quite willing to work with their customers to 'make things right' to the best degree that they can. While talking with one of REI's techs the topic of their optional 'hardened' probe was brought up. I was told right up front that if I used this probe I might experience some degree of loss of sensitivity. But not wanting to take undue advantage of their hospitality as to repairs of blown probes in the future I ordered one to use in known areas of high static discharge. I haven't tested it in the field yet but a simple bench test I conducted showed some interesting results. While attempting to 'find' a Marty Kaiser 2040 test transmitter the hardened probe didn't 'see' the signal quite as well as the standard probe (as evidenced by looking at the bar scale on the CPM-700 at measured distances) but it did "hear' the thing at a farther distance (as evidence by what was heard via the earphones at marked distances). So at least from my initial tests if one uses the CPM-700 as instructed (combining the viewed scale and the audio function) there seems to effectively be virtually no loss of sensitivity. However, be forewarned, the hardened probe is significantly shorter than its standard cousin. So the user gets cheated out of the full feeling of 'wand waving' that one gets when employing a broad-band 'sniffer' like the CPM-700 under conditions where its use is called for. But I guess that's a small price to pay when the sparks fly :) Bob Motzer _________________________________________________________________ The new MSN 8: advanced junk mail protection and 2 months FREE* http://join.msn.com/?page=features/junkmail 7394 From: James M. Atkinson Date: Mon May 26, 2003 1:04pm Subject: Patients in a Mental Hospital. Jim and Mary were both patients in a Mental Hospital. One day while they were walking past the hospital swimming pool, Jim suddenly jumped into the deep end. He sunk to the bottom & stayed there. Mary promptly jumped in to save him. She swam to the bottom and pulled Jim out. When the medical director became aware of Mary's heroic act he immediately ordered her to be discharged from the hospital, as he now considered her to be mentally stable. When he went to tell Mary the news he said, "Mary, I have good news& bad news. The good news is you're being discharged because since you were able to Jump in and save the life of another patient, I think you've regained your senses." "The bad news is, Jim, the patient you saved, hung himself with his bathrobe belt in the bathroom. I am so sorry, but he's dead." Mary replied "He didn't hang himself, I put him there to dry." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7395 From: Date: Wed May 28, 2003 1:18am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7396 From: Date: Wed May 28, 2003 1:18am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7397 From: Steve Uhrig Date: Wed May 28, 2003 0:59pm Subject: Quick spectrum analyzer tutorial http://www.science-workshop.com/tutorial.pdf Rude and crude, but excellent info. If you own a SA and are not totally up to speed on it in all areas, the above article will help. May also plant the seeds in your mind for additional uses for your SA. If you're new to the things, the above will explain how they operate and explain what they're showing you. Simple read, recommended for anyone. The fellow who wrote it sells low cost (real low cost) spectrum analyzer kits for hobby applications. Very basic, but great for an electronics hobbyist on a budget who likes to build and tinker. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7398 From: Robin Hunter Date: Mon May 26, 2003 1:53pm Subject: PRAYERS FEMALE PRAYER Before I lay me down to sleep, I pray for a man who's not a creep. One who's handsome, smart and strong. One who loves to listen long, One who thinks before he speaks, When he says he'll call, he won't wait weeks. I pray that he is gainfully employed, When I spend his cash, won't be annoyed. Pulls out my chair and opens my door, Massages my back and begs to do more. Oh! Send me a man who'll make love to my mind. Knows what to answer to "How big is my behind?" I pray that this man will love me to no end. And never attempt to hit on my friend. And as I kneel and pray by my bed. I look at the creep you sent me instead. Amen. MALE PRAYER: I pray for a deaf-mute nymphomaniac with huge boobs who owns a liquor store. Amen. regards from Scotland, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. [Non-text portions of this message have been removed] 7399 From: ed Date: Tue May 27, 2003 1:46pm Subject: Re: Secure phones no obstacle to wiretapping - US Govt "Secure phones no obstacle to wiretapping - US Govt" that headline *should* have read: "INsecure phones no obstacle to wiretapping - US Govt" by definition, they were not secure phones. it would be interesting if that gov't report detailed specifically what products produced the "encrypted" communications they supposedly encountered. they were probably nearly all spy shop toys, very few of which use any actual encryption at all. while no defense contractor will risk alienating the hand that feeds it by manufacturing a "secure" phone device that isn't fairly simple for their main customer to compromise, it's noteworthy that AT&T did not come up with the Clipper Chip. that was proposed by the NSA and FBI, and was manufactured by NSA's contractor, Mykotronx (and strongly pitched by 'privacy advocate' Al Gore.) AT&T's first manufacturing run of their 3600 DES Surity device did *not* incorporate the backdoor-enabled Clipper Chip. it was secure insofar as it used DES (although it's widely believed NSA put a backdoor in DES and can brute-force a key.) still, the FBI was so concerned about the AT&T 3600 that it bought AT&T's *entire* first run to keep them off the market--and convinced AT&T to incorporate the Clipper Chip in all future 3600 models. an excellent book detailing how this all happened is "The Electronic Privacy Papers", by Bruce Schneier and David Banisar. it contains numerous FOIA documents from the FBI, NSA, and White House that provide unparalleled insight as to how the U.S. gov't views the availability of communications security to it own citizens. http://www.wiley.com/legacy/compbooks/catalog/12297-1.htm http://www.philzimmermann.com/essays-SnakeOil.shtml -ed At 10:50 PM 5/21/03 +0100, Ocean Group wrote: >Ha ha, play nice guys!! :) > >I'd say most of the encryption the US LEO boys came up against were basic >inversion or rollover units bought in a spyshop etc(you know the deal)! Easy >for any cop tech to record and analyse. Then play it back in all its glory >on a 6:1 dolby surround system in the courthouse....! > >However as regards Jim's recommendation, I think otherwise: This is my >opinion, I would rather take a bullet in the leg than recommend a US built >encrypted phone unit to a European corporate customer. > >I'd sooner make them dish up the extra money to have encryption(using pulic >source algo's) software made for a digital phone in the EU and then port it >to hardware cheaply in Taiwan than buy a Motorola unit. > >The very fact that AT&T make the public unit would scare me from using it. >These are the very guys that love escrow technology and are more than happy >to jump in the sack with US Intell/Comms to help them keep an eye on their >beloved corporate(er, sorry I mean terrorist! ;) data! Wasn't AT&T the guys >that came up with the clipper escrow system....something like that? Anyway, >the same is happening with Tetra...the supposed new eu leo radio system, no >doubt there's twenty dozen US gov tech departments licking their lips with >glee...they won't need CNN anymore for news. > >Schneider's right...there's no development being done in the area...shame >really. But either way, the way the US comms companies are, I'd rather not >spend people's money on rubbish. If you start making back doors into >security software then you compromise the whole essence of it. > >It's like building a safe with two doors...sure, maybe the safe is still >secure....but you just halved the security it once had. Then it's just a >matter of time. > >Feel free to beat me down, > >Cheers > >Oisin 7400 From: James M. Atkinson Date: Thu May 29, 2003 8:48pm Subject: Helpful Hint #9 Helpful Hint #9 If you have a bad cough, take a large dose of laxatives. Then you'll be afraid to cough. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7401 From: Fernando Martins Date: Sat May 31, 2003 11:56am Subject: CSI/FBI 2003 survey http://www.gocsi.com/press/20030528.html It's out the eighth annual CSI/FBI survey. The first without Mr Richard Power ... anyone know any particular reason for that? hmmm ... is he writing the Tangled RF? =;o) FM 7402 From: Ocean Group Date: Sat May 31, 2003 10:18am Subject: Spam... I know this is slightly off-topic and I apologise for that.... But I reckoned everyone on the list was fairly tech savy! Can anyone recommend a good anti spam software. I tried using Cloudmarks Spamnet and that worked brilliantly, but alas I found out that you had to pay a monthly fee if you wanted to keep using it, which I'm not too gone on. I'd pay a once off price for some software though, can anyone resommend one that works? Cheers Oisin 7403 From: Thomas Conlon Date: Sat May 31, 2003 10:14pm Subject: FW: Stupid Security Sorry I am not really thinking too clearly as I just did a 10 hour shift in the rain fixing cars outside. Also I would like to note that my computer is seriously hacked as in my control panel won't even open and yes I am a systems administrator by trade, have been for bout 7-8 years. This whole script kiddie thing is becoming a real headache. I am just wondering where these people meet as it is not on the web or in yahoo. I think you really have to delve in the world of those brazen felon hackers to learn the methods to defend from penetration as I tried talking to the rep at the Technical Sales seminar about security at the Windows 2003 server launch and I am just tired of knowing you hit the right button when people start shutting up (try mentioning wustat or shatter attack to your Microsoft TAM) thank you and have a pleasant day. -tc syseng@m... -----Original Message----- From: Thomas Conlon [mailto:syseng@m...] Sent: Saturday, May 31, 2003 11:10 PM To: 'kondrak' Subject: RE: [TSCM-L] Stupid Security Sure it's on my dorky homepage which is not well maintained. www.geocities.com/conlonte/back.zip I definitely attached a 58k .zip file!!! There a little blurry as it was 4:10 AM and my camera wasn't cooperating. I will try to update it with better pix. Thank you! -tc syseng@m... -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: Sunday, May 25, 2003 3:12 PM To: Thomas Conlon Subject: RE: [TSCM-L] Stupid Security No pix or link here? Care to resend? At 04:07 5/24/2003 -0400, you wrote: >What is this thing? >I don't think it fell out of one of my cassette decks, which was my >first thought. Maybe an old floppy bus tape drive, it's possible. > >It was in my office. > >Thanks. > >-tc 7404 From: Andrus Aaslaid Date: Mon Jun 2, 2003 2:51am Subject: RE: Spam... > Can anyone recommend a good anti spam software. I tried using > Cloudmarks Spamnet and that worked brilliantly, but alas I > found out that you had to pay a monthly fee if you wanted to > keep using it, which I'm not too gone on. Still - cloudmark works like a charm and taking in account, how the system is built up (comparing e-mail fingerprints against the central database), it is probably as good as it can get. Keeping such initiative up and running is worth of some financial support from its users in my opinion. Regards, Andrus. 7405 From: Scott Malcolm Date: Mon Jun 2, 2003 10:03am Subject: Re: Spam Oisin & List, I found a handy free Utility Called Mail Wash that works well for me. Supposedly it's a filter that lets you Delete and Bounce Spam back to the sender (like any spammer isn't going to munge the header) but some don't. This filter program is suppose to process and filter before you download from your ISP. Check it out at: http://www.webattack.com/freeware/comm/fwspam.shtml http://www.webattack.com/download/dlmailwasher.shtml Regards, Scott Malcolm Malcolm & Associates, Inc. Serving the State of Wisconsin http://www.execpc.com/~conf-pi Office 262 965 4426 / Fax 262 965 4629 ____________________________________________________ > Message: 1 > Date: Sat, 31 May 2003 16:18:36 +0100 > From: "Ocean Group" > Subject: Spam... > > I know this is slightly off-topic and I apologise for that.... > > But I reckoned everyone on the list was fairly tech savy! > > Can anyone recommend a good anti spam software. I tried using Cloudmarks > Spamnet and that worked brilliantly, but alas I found out that you had to > pay a monthly fee if you wanted to keep using it, which I'm not too gone on. > > I'd pay a once off price for some software though, can anyone resommend one > that works? > > Cheers > > Oisin 7406 From: William Knowles Date: Mon Jun 2, 2003 10:39pm Subject: Clancy Urges CIOs: Seek Out the 'Smart People' http://www.eweek.com/article2/0,3959,1114813,00.asp By Dennis Fisher June 2, 2003 WASHINGTON - In a rambling and somewhat odd keynote speech at the Gartner IT Security Expo here Monday, author Tom Clancy urged the assembled security specialists and CIOs in the audience to seek out experts in other fields and apply their knowledge to the IT world. "The world is full of smart people, and when you find out what some of them are doing, you get smarter," Clancy said. "Everyone knows at least one thing you can learn from them. So go learn." Asked where he gets the information on the gadgets and technologies that populate his novels, Clancy said that it's all out in the open, and it's simply a matter of legwork and research. In the age of information, when virtually anything you want to know is a few clicks away, Clancy said there is no excuse for not finding what you need to do your job better. "There are no secrets in the world. The only hard part is finding the right person to ask," he said. "If you have a phone, you can find out anything you want in under 60 minutes. With the Internet, it's even faster." The idea, Clancy said, is to not limit yourself to one subject, to broaden the scope of your intellectual activity. "Fortune favors the prepared mind, as Louis Pasteur said. The best guys are the ones who can cross disciplines," Clancy said. "The smartest ones look at other fields and apply them to their own." As Clancy veered from subject to subject - touching on issues as diverse as Bill Clinton, baseball, the charm of Macs, and the relative levels of corruption in Washington and Hollywood- the Gartner analysts tasked to moderate his talk tried to steer him back to technology topics. But they had little luck. In what amounted to more of a collection of one-liners and anecdotes than a speech, Clancy revealed himself to be a master name-dropper and a man who is perpetually unhappy with the people on Capitol Hill. After relating an anecdote about a congressman who dismissed an expert's objections to a particular technology by saying, "Don't give that laws of physics stuff," Clancy had this to say: "They don't have an intelligence test for members of Congress. But I guess that's kind of obvious." After his monologue, two Gartner analysts came on stage and asked Clancy to sit down with them for a discussion. "I have to sit down, huh? I'll be on the extreme right," Clancy quipped. Among Clancy's other verbal gems: * "The one nice thing about being rich and famous is you get to meet all kinds of interesting people. Actually, you meet all sorts of idiots too, but you discard them." * "An extremist is someone who doesn't agree with you and does so loudly." * "The president of the United States wanted to do away with Fidel Castro, and he asked the CIA to do it. They of course failed because they hired the Mafia to do it, and Castro wouldn't sit in the front seat." * "That's why I'm a Mac driver: You don't have to know anything about computers." *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 7407 From: fiber boy Date: Mon Jun 2, 2003 6:24am Subject: RE: Stupid Security Sir anyone who uses windows for any type of service is begging to get messed with. Only reason we have so many wannabe types is becouse of the media.The media paints a picture of those in the know as if they are unlike anyone else, As if they have power over everything. In many ways that is wrong. Noone has supreme reign. I will say that depending on your area you are proficent in you could do some damage. Rarely do people with a large know how ever do something stupid. A true geek is not going to waste his time looking or making some code to smack IIS around. A large majority of the people you would take an Interest in are those you would never suspect. They setup your PBX. They run your ISP. They code your inferior GUI run WIN32 applications. They read the same mailing lists as you :). What ever pays the bills right? Far as where techno savy peeps go, in my opinion I think it would be best left that those who are not savy need not apply nor try to blend into a sitaution you can not possibly blend into. Better for those who are to find their path. Not to say you are not. I am just saying that it is better for one to find his own way there. Like any group of people it is very political. Someone dislikes this person for simply not knowing how a VCSEL works, or someone thinks someone is leet becouse they code all their applications in ASM for SPARC64 etc etc. Like anything you have many hierarchies with multiple Political parties. Some parties are literally at war with eachother all the time. Some hierarchies band together to literally feud with one common party. The media only picks up on what is going on when the collateral damage numbers get high enuff for a story. Anyway sorry if I have been harsh as that is not my intention at all. I usually never say anything when people bring up this subject , but I just had a feeling I should. Hope you resolve the problem. By the way to get around those problems change oses. Try FreeBSD you might like it. Best regards, FiberOps fiberops@h... ~We read your email~ Yahoo : Powered by FreeBSD FreeBSD : The power to serve. Freebsd.org >From: Thomas Conlon >To: tscm-l@yahoogroups.com >Sent: Saturday, May 31, 2003 10:14 PM >Subject: FW: [TSCM-L] Stupid Security >Sorry I am not really thinking too clearly as I just did a 10 hour shift >in the rain fixing cars outside. >Also I would like to note that my computer is seriously hacked as in my >control panel won't even open and yes I am a systems administrator by >trade, have been for bout 7-8 years. >This whole script kiddie thing is becoming a real headache. >I am just wondering where these people meet as it is not on the web or >in yahoo. >I think you really have to delve in the world of those brazen felon >hackers to learn the methods to defend from penetration as I tried >talking to the rep at the Technical Sales seminar about security at the >Windows 2003 server launch and I am just tired of knowing you hit the >right button when people start shutting up (try mentioning wustat or >shatter attack to your Microsoft TAM) thank you and have a pleasant day. _________________________________________________________________ Add photos to your e-mail with MSN 8. Get 2 months FREE*. http://join.msn.com/?page=features/featuredemail 7408 From: Date: Mon Jun 2, 2003 7:52am Subject: Re: Spam... http://www.mcafee.com/myapps/msk/default.asp Works great. At 10:18 5/31/2003, Ocean Group wrote: >I know this is slightly off-topic and I apologise for that.... > >But I reckoned everyone on the list was fairly tech savy! > >Can anyone recommend a good anti spam software. I tried using Cloudmarks >Spamnet and that worked brilliantly, but alas I found out that you had to >pay a monthly fee if you wanted to keep using it, which I'm not too gone on. > >I'd pay a once off price for some software though, can anyone resommend one >that works? > >Cheers > >Oisin 7409 From: Julie Burger Date: Mon Jun 2, 2003 2:43pm Subject: Re: Digest Number 1280 "Hackers" maintain contact by utilizing methods such as chat groups, other people's computers/accounts, web sites, free-mail, IRC, etc. Here is a place where you can find many of the "white hats" lurking to educate themselves: http://internetmaster.com/htruths/ I believe that it is maintained partly by the gentleman who wrote "Hacking Truths" - a very good book. If you want to avoid quite a few hackers, try running a non-MS box. I realize this will miff a few on this list, but the latest version of OSX has good security and is very stable. For those who can't quite swallow buying a Mac, there is always Linux (Red Hat and Mandrake are good) and Unix. Happy hunting! Message: 2 Date: Sat, 31 May 2003 23:14:49 -0400 From: "Thomas Conlon" Subject: FW: Stupid Security Sorry I am not really thinking too clearly as I just did a 10 hour shift in the rain fixing cars outside. Also I would like to note that my computer is seriously hacked as in my control panel won't even open and yes I am a systems administrator by trade, have been for bout 7-8 years. This whole script kiddie thing is becoming a real headache. I am just wondering where these people meet as it is not on the web or in yahoo. I think you really have to delve in the world of those brazen felon hackers to learn the methods to defend from penetration as I tried talking to the rep at the Technical Sales seminar about security at the Windows 2003 server launch and I am just tired of knowing you hit the right button when people start shutting up (try mentioning wustat or shatter attack to your Microsoft TAM) thank you and have a pleasant day. -tc syseng@m... _________________________________________________________________ The new MSN 8: advanced junk mail protection and 2 months FREE* http://join.msn.com/?page=features/junkmail 7410 From: A.Lizard Date: Mon Jun 2, 2003 3:12pm Subject: Re: FW: Stupid Security At 10:15 AM 6/2/03 +0000, you wrote: >Message: 2 > Date: Sat, 31 May 2003 23:14:49 -0400 > From: "Thomas Conlon" >Subject: FW: Stupid Security > >Sorry I am not really thinking too clearly as I just did a 10 hour shift >in the rain fixing cars outside. >Also I would like to note that my computer is seriously hacked as in my >control panel won't even open and yes I am a systems administrator by >trade, have been for bout 7-8 years. > >This whole script kiddie thing is becoming a real headache. I just dumped 4 copies of the latest Sobig virus into my "virus-contaminated" mail folder. >I am just wondering where these people meet as it is not on the web or >in yahoo. Ever heard of IRC (Internet Relay Chat)? The most popular Windows client is mIRC. Are you an MCSE by any chance? >I think you really have to delve in the world of those brazen felon >hackers to learn the methods to defend from penetration as I tried >talking to the rep at the Technical Sales seminar about security at the >Windows 2003 server launch and I am just tired of knowing you hit the >right button when people start shutting up (try mentioning wustat or >shatter attack to your Microsoft TAM) thank you and have a pleasant day. > >-tc >syseng@m... If you want to learn network security, start here with this interview with the inventor of nmap: http://interviews.slashdot.org/article.pl?sid=03/05/30/1148235&mode=thread&tid=126&tid=172&tid=95&threshold=1 and *READ THE DISCUSSION*. And go here: The Open Source Security Testing Methodology Manual (OSSTMM) http://www.isecom.org/projects/osstmm.htm I'm not trying to start a religious war here, the answer to "What kind of operating system should I use?" always has to start with "Just what is it are you trying to do?", and that was as true back in the BBS days when the argument was MacIntosh vs Windows as it is now, when the argument is "Microsoft vs whichever flavor of *nix". There are no "one size fits all" solutions. Get a Linux box, much of what you'll be exposed to in learning security are learning about network tools, and most of the interesting ones run on Linux. This will enhance your future career prospects as well. For instance, Microsoft just lost 14,000 seats in Munich. http://theregister.co.uk/content/4/30912.html As you've already found out, there's a big world out there that Microsloth sales presentations just don't cover. You may notice I'm posting this via a Windows app, the other drive of this dual boot box runs Red Hat 9 because I've decided it's time to learn Linux. More to the point, Microsoft isn't exactly the first example that comes to mind when I think about "best practices" in the field of security. However, remember, "security is a process". It isn't just about the tools and technology, it's about end users and business functionality and priorities. While this mailing list doesn't specialize in network security, it's a great place to learn about *the security process*. A.Lizard ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -Benjamin Franklin, Historical Review of Pennsylvania, 1753 Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... PGP 8.0 key available by request or keyserver. Download PGP from http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html For new music, try http://www.eliangedeon.com ************************************************************************ 7411 From: Thomas Shaddack Date: Mon Jun 2, 2003 8:44pm Subject: Re: FW: Stupid Security On Sat, 31 May 2003, Thomas Conlon wrote: > This whole script kiddie thing is becoming a real headache. They are annoying. Luckily, the vast majority of them is inexperienced, relying on third-party "click-and-crash" software, known (and usually old) exploits, and trojans. Disallowing executable attachments from mails, ActiveX from the web, and port access through the outside (a good firewall is Tiny Personal Firewall, people also report good experiences with ZoneAlarm, my personal favorite is a small dedicated Linux machine which then also can run an IDS and optionally a honeypot[1]) and a healthy dose of paranoia usually takes care of most such insects. [1] If you like to have some fun with those script losers - they are good self-advertising practice targets for getting experiences with their art (a message left in autoexec.bat to show up and pause after next reboot usually cures a lot of their brazen impunity feelings, they still can be an innocent victim used as a proxy for further attacks by some more experienced adversary, so it's unfair to be destructive; another way is to find what messaging they have installed and pull them up for a chat). > I am just wondering where these people meet as it is not on the web or > in yahoo. A favorite hangout of many of them is IRC. However, there is nothing as "hacker community" or a "script kiddie community" in the common sense of the word - no defined rigid organization, no official structure. Many of them don't even commonly communicate with the others. Especially on the lower end, fights and popularity contests are common. A lot about it was said on the pages of 2600. Because of such fights, you won't see the experienced ones on IRC often, or at least not on public channels and channels like #hack. The best place to meet some high-class ones is usually on a convention like DefCon or BlackHatCon, or on some security seminars. The noisy "better-than-thou" ones are the low-end, look for the quiet ones. > I think you really have to delve in the world of those brazen felon > hackers to learn the methods to defend from penetration as I tried > talking to the rep at the Technical Sales seminar about security at the > Windows 2003 server launch and I am just tired of knowing you hit the > right button when people start shutting up (try mentioning wustat or > shatter attack to your Microsoft TAM) thank you and have a pleasant day. Windows isn't secure. It takes a LOT of effort to make it at least moderately so, and it seems it will stay this way for at least a couple more years. Have luck :) 7412 From: Hawkspirit Date: Tue Jun 3, 2003 4:19pm Subject: Help on Mason equipment Can anyone help this fellow out? Roger From: "Brent Martin" To: Subject: Re: Info on Mason MPR-5 Reciever Date: Tue, 3 Jun 2003 18:26:18 -0700 X-Mailer: Microsoft Outlook Express 5.50.4133.2400 Good afternoon from Engand UK. I am looking for service information on the F G Mason Engineering MPR-5 mini-probe TSCM kit. I wonder do you have any technical info on this equipment and if so would you consider selling me a copy. Also, May I ask would you have any contact info for Mr Francis G Mason. I hope you will excuse my uninvited approach. Thanking You, Brent M Martin, Brent Electronics & Comms, ENGLAND, UNITED KINGDOM. From: delta Date: Thu May 25, 2000 2:41am Subject: bug frequence in france hello everybody since 10 years i practice sweep. i can tell you that : the most often frequencies found for bugs here in france are in vhf frequencies 140 mhz to 144 and 146 to 150 mhz sometimes 430 to 440 juste in the amateur radio band sometimes 88 to 108 mhz juste in the wfm radio bande but now the more popular listenning is realised with a simple phone gsm in 900 mhz with the open mic configuration. many thanks for this liste and sorry for my poor language !!! david from paris http://www.deltafrance.com 8717 From: savanted1 Date: Tue May 25, 2004 10:30am Subject: Judge Says Police Need Warrant to Use GPS Nassau County Court judge Joseph Calabrese has ruled police should have obtained a warrant before using a GPS device to track Richard Lacey. According to Calabrese, in order to use a GPS device in an investigation, police must show a judge that they have "probable cause to believe evidence of a crime is likely to be found." At the center of the controversy over the use of GPS devices by law enforcement officials is the expectation of privacy when walking on the sidewalk or driving down a public street. Calabrese asserted that Lacey did not have an expectation of privacy in that he was driving someone else's car "for the sole purpose of furthering a criminal enterprise." However, despite his ruling that police should have obtained a warrant, Calabrese said that prosecutors would be allowed to use the incriminating GPS evidence against Lacey at his trial. Currently, more than a half-dozen states are dealing with legal challenges to police use of GPS devices. http://www.newsday.com/news/local/longisland/ny-li gps123810064may20,0,4656641.story?coll=ny-linews-headlines 8718 From: Steve Uhrig Date: Tue May 25, 2004 0:06pm Subject: Re: Thermography in TSCM Once upon a midnight dreary, redelst pondered, weak and weary: > Some years ago I had done some training with the folks at Audiotel in > the UK, and had asked about the practical uses of thermography in the > location of embedded devices. At the time, the concept was dismissed as > impractical. I now realize that considering this was the early 90's, > thermography was very primative as compared to present technology. True. Present capability is exponentially more effective than even a few years ago. > I have noticed that there are TSCM teams advertising their adoption of > what they call TESA, There should be only ONE company advertising TESA as that is a trademarked term to that company who developed the technology. > and it seems that they rely heavily on this thermography as a core > technology in the location of hidden devices. In a search of the > messages in this group, I have uncovered no refernce to this > technology, and likewise a cursory review of the TSCM.COM site nets > nothing. The information is proprietary to the company who developed TESA (Murray & Associates, www.spybusters.com) but you did the right thing in checking the archives before posting your question and I commend you for that. > From my understanding the US Marshall service works with the Raytheon > units for the location of devices once a signal is detected. What understanding is that? If what you describe is all there is to it, they're using the equipment improperly. > Before I drop ~$10k on a unit for research purposes, I would like to > hear what others might have tried. $10K in USD is way below the entry point for this technology for TSCM. Any research you perform on a $10K unit will mean little. You need a high end professional device with low noise and a cooled sensor. As the information is proprietary to Kevin Murray who developed it, and it works (I have seen it), I will not say any more. Kevin monitors this list and it is up to him whether or not he wishes to comment on his firm's capabilities and practices. That's not my option. I recommend if you have only $10K you keep it in your pocket. You can buy a lot of thermal imagers for that price, but they won't do the job. The manufacturers don't know what job you want to do so they're really of little help, and their job is to sell equipment. Or contract Kevin Murray to train you on the principles of TESA. That would be the best use of your money. Steve with no thermal imagers to sell ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8719 From: Kevin D. Murray Date: Tue May 25, 2004 0:05pm Subject: Re: The Practical uses of Thermography inTSCM Hi, The good news is that you don't have to spend $10k to research. Companies are willing to loan or rent IR units to qualified buyers for evaluation. It took me 18 months to do my research. It was an excellent learning experience. In the end, I purchased a Merlin-Mid from Indigo. Since then, I have purchased another one of their units for our overseas work. You will enjoy the research part. Lots of surprises. Personally, I don't see any one piece of detection technology as being "core." We use a layered approach in our testing with some technologies overlapping in effectiveness with others. Small point... TESAÆ is our registered trademark for Thermal Emissions Spectrum Analysis rather than a generic term like TSCM. Always feel to contact me directly if I can help. Kevin Kevin D. Murray - CPP, CFE, BCFE Murray Associates Eavesdropping Detection and Counterespionage Consultants to Business & Government http://www.spybusters.com On May 25, 2004, at 12:07 AM, redelst wrote: > Some years ago I had done some training with the folks at Audiotel > in the UK, and had asked about the practical uses of thermography in > the location of embedded devices. At the time, the concept was > dismissed as impractical. I now realize that considering this was > the early 90's, thermography was very primative as compared to > present technology. > > I have noticed that there are TSCM teams advertising their adoption > of what they call TESA, and it seems that they rely heavily on this > thermography as a core technology in the location of hidden devices. > In a search of the messages in this group, I have uncovered no > refernce to this technology, and likewise a cursory review of the > TSCM.COM site nets nothing. > >> From my understanding the US Marshall service works with the > Raytheon units for the location of devices once a signal is > detected. This sounds like a responsible approach for the use of > such a device. Does anyone have any comments on the use of > Thermography as a tool for TSCM? Would anyone be able to assign a > value to such a tool? > > Before I drop ~$10k on a unit for research purposes, I would like to > hear what others might have tried. > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > 8720 From: David Colton Date: Tue May 25, 2004 0:08pm Subject: Re: Please help, I habe been Bugged >By default all new members of the group are moderated; however, once >someone demonstrates that they have something constructive to offer, and >can behave like a gentleman I upgrade their posting privileges so that they >can openly post and benefit the group. >-jma Any way to ask you to reconsider? :-) ----- Original Message ----- From: Manjunath Shastry To: tscm-l@yahoogroups.com Sent: Monday, May 24, 2004 11:53 PM Subject: [TSCM-L] Please help, I habe been Bugged Greetings, I am a Scientist based in India, my former employer HCL Technologies, is spying all my activities round the clock and I am also experiencing pain, numbness, shock, irritation and such sensations randomly in all parts of my Body. This suspect this is done using electronic gadgets, though I have been able to find none. How best can I stop this, would highly appreciate your help. Regards, Manjunath. __________________________________ Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger. http://messenger.yahoo.com/ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 8721 From: kondrak Date: Tue May 25, 2004 5:21pm Subject: Re: Please help, I habe been Bugged Must be the Americans getting even with you for stealing their jobs. At 23:53 5/24/2004, you wrote: >Greetings, > > >I am a Scientist based in India, my former employer >HCL Technologies, is spying all my activities round >the clock and I am also experiencing pain, numbness, >shock, irritation and such sensations randomly in all >parts of my Body. This suspect this is done using >electronic gadgets, though I have been able to find >none. > > >How best can I stop this, would highly appreciate your >help. > > > >Regards, >Manjunath. > > > > >__________________________________ >Do you Yahoo!? >Friends. Fun. Try the all-new Yahoo! Messenger. >http://messenger.yahoo.com/ > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 8722 From: Craig Meldrum Date: Tue May 25, 2004 5:56pm Subject: Postings to TSCM Can I make a small request of people posting to this forum, that you do not include the previous messages that you are responding to in your postings other than where it is necessary to comment on a particular statement. I don't know if anyone else is bothered by this but I find I spend half my time wading through repetitive text. Thanks Craig =============================== Craig Meldrum, Managing Director Communications Security Ltd PO Box 8314, Symonds St Auckland, New Zealand Ph: 64-9-3093386 Fax: 64-9-3021148 =============================== 8723 From: mark de Boer Date: Tue May 25, 2004 1:03pm Subject: wlan access point detection Does anyone on this list use(or used) a WLAN analyser such as the Fluke "waverunner" for detecting or viewing unauthorised access points on a client's network. We detect WLAN almost every time we do a sweep so a little help from Fluke would perhaps make it easier. M.de Boer RRB security Archimedestraat 12 Dordrecht Netherlands http://www.flukenetworks.com/us/LAN/Handheld+Testers/WaveRunner/Overview.htm --------------------------------- Yahoo! Messenger - Communicate instantly..."Ping" your friends today! Download Messenger Now [Non-text portions of this message have been removed] 8724 From: David Alexander Date: Wed May 26, 2004 1:30am Subject: RE: wlan access point detection Mark I do audits of this type. I have a Compaq ipaq PDA with an 802.11 card and the Kismet/netstumbler/airsnort/wepcrack tools for performing Wi-Fi audits. You could use a laptop, but the PDA is easier for covert detection if the client doesn't want their staff to know, just leave it in your pocket and walk round. Wi-Fi access points are not hard to spot, once you know there is one. Hope this helps David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: mark de Boer [mailto:vincent2707662000@y...] Sent: 25 May 2004 19:04 To: tscm-l@yahoogroups.com Subject: [TSCM-L] wlan access point detection Does anyone on this list use(or used) a WLAN analyser such as the Fluke "waverunner" for detecting or viewing unauthorised access points on a client's network. We detect WLAN almost every time we do a sweep so a little help from Fluke would perhaps make it easier. M.de Boer RRB security Archimedestraat 12 Dordrecht Netherlands http://www.flukenetworks.com/us/LAN/Handheld+Testers/WaveRunner/Overview.htm --------------------------------- Yahoo! Messenger - Communicate instantly..."Ping" your friends today! Download Messenger Now [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8725 From: William Knowles Date: Wed May 26, 2004 2:28am Subject: Area 51 hackers dig up trouble http://www.theregister.co.uk/2004/05/25/area_51_hackers/ By Kevin Poulsen SecurityFocus 25th May 2004 To the Area 51 buffs who journey to the Nevada desert in the hopes of catching a glimpse of unexplained lights in the sky or to bask in the mythic allure of the region, 58-year-old Chuck Clark is almost as much a part of the local color as the Black Mailbox. A resident of tiny Rachel, Nevada - 100 miles north of Las Vegas along the Extraterrestrial Highway - the amateur astronomer and author has spent years keeping an eye on the spot the government calls the "operating location near Groom Lake, Nevada." He's said to be a frequent presence at the Little A'Le'Inn, where you can purchase post cards and tee shirts, enjoy an "Alien Burger," and walk out with a copy of Clark's "Area 51 & S-4 Handbook" to guide you on your journey into the desert. But this self-appointed military watchdog is harder to find these days: messages left for him at the Inn go unreturned, and his media appearances have dried up like Groom Lake itself. "I think he's really not as motivated to talk to the media anymore as he used to be," says friend and fellow base-watcher Joerg Arnu. The reason: it turns out the truth really was out there, and the government didn't appreciate Clark digging it up. Clark didn't find the Roswell craft or an alien autopsy room - in fact, while officially shrouded in secrecy, the 50-year-old base is generally believed to be dedicated to the terrestrial mission of testing classified aircraft. "The U2 spy plane, the SR-71, the F-117A stealth fighter, all were flight-tested out of the Groom Lake facility," says Steven Aftergood, director of the Federation of American Scientists' Project on Government Secrecy. The myth of Area 51 memorialized in films, T.V. shows and novels is a function of the secrecy that surrounds it. "It is a concrete manifestation of official secrecy at its most intense, and that invites a mixture of paranoia and speculative fantasy that has become ingrained in popular culture," says Aftergood. Even without aliens, the facility has its secrets, and last year while roaming the desert outside the Groom Lake base Clark stumbled upon one of them: an electronic device packed in a rugged case and buried in the dirt. Marked "US Government Property," the device turned out to be a wireless transmitter, connected by an underground cable to a sensor buried nearby next to one of the unpaved roads that vein the public land surrounding the base. Together, the units act as a surveillance system, warning someone - somewhere - whenever a vehicle drives down that stretch of road. Similar devices had been spotted in the area in the early 90s, but they were crude and bulky, stashed in the bushes and easily spotted. They were later withdrawn. The new road sensors are more clandestine, given away only by a slender antenna poking up through the dirt. "They're very, very hard to find, because there's just this little wire, like a blade of grass," says Arnu. Sniffing Out Surveillance Arnu, a Las Vegas software engineer, has shared Clark's preoccupation with the Groom Lake base since 1999, when he made a trip to the area to see what all the fuss was about. "I thought, okay, I'll give it a try, see what's out there... A couple of days turned into a couple of weeks and before I knew it I started developing a website about Area 51," says Arnu. So when Clark found the new generation of road sensor, Arnu drove out to help investigate further. The pair found that, at close range, they could use a handheld frequency counter to pick up the wireless signals given off by the devices as a car passes. Over the following month and half, Clark and Arnu engaged in a kind of geocaching game with the Men in Black, systematically sniffing out the road sensors with the frequency counter, exhuming them, and opening them up. They discovered that each device was coded with three-digit identifier that could be read off an internal dial, allowing Arnu to make a list that correlated each unit's ID number with its GPS coordinates, creating a virtual map of a portion of the surveillance network surrounding the Groom Lake facility. Some of the sensors were miles away from the base. "We dug up about 30 or 40 of them on various access roads leading to the base on public land," Arnu says, insisting that he and Clark always carefully reburied each unit after logging it, and even tested it with the frequency counter to make sure it was still working before moving on to the next one. Based on their survey, Clark and Arnu have estimated that there are between 75 and 100 sensors, on public land used by hikers and photographers in addition to curiosity seekers. "I think it is absolutely inappropriate," says Arnu. "You have to understand that people going out there - not everybody is interested in Area 51...They track these tourists on public land going about their hobby." When they'd gathered sufficient evidence that the Air Force was bugging the desert, Arnu and Clark revealed the road sensors on Arnu's website, Dreamland Resort, a forum and information site for Area 51 aficionados and the "Official Home Page of the world-famous Little A'Le'Inn." The reaction from the government was immediate, according to Arnu: the road sensors were fitted with a new feature aimed at better eluding detection. Now the transmitters would wait a minute or two before broadcasting an alarm, so that desert wardrivers are out of range before the transmission takes place - at least, using relatively insensitive detection equipment like a frequency counter. Undeterred by the innovation, in June of last year Clark led a news crew from Las Vegas' KLAS television station into the desert and showed them some of the road sensors. The following week, according to the station's report, FBI and Air Force agents raided Clark's trailer home in Rachel, and carted off his computer, photographs and records. The next day, Arnu got a call at work from the FBI. "They demanded that I speak with them the very same day," he says. The Case of the Missing Sensor The investigation sparked something of a backlash in Nevada. The Las Vegas Review Journal editorialized against the FBI's tactics. In the Las Vegas Mercury, George Knapp, the newsman who filmed the KLAS segment, asked how far the government should be allowed to go in protecting the secret base. "If you or I accidentally kick one of these hidden transmitters, should the feds be able to seize our Macintosh and photos of Aunt Betty?" Arnu describes the probe as an intimidation tactic. "It didn't lead anywhere," he says. "It was basically a dead-end from the beginning because we didn't break any law... We dug [the sensors] up without damaging them or destroying them." But court documents unsealed earlier this year reveal that there was an unsolved mystery lurking around Groom Lake. It seems that a month prior to the raid, one of the road sensors went missing - vanished, like an abductee pulled into a flying saucer. The government didn't charge anyone with stealing US property, but last December it charged Clark with a single count of interfering with a communications system used for the national defense. On March 12th, 2003 Clark allegedly obstructed, hindered and delayed "a signal from a mini intrusion device" located outside "the Nevada Test and Training Range" -- a reference to the government land that encompasses the Groom Lake site. "He removed one," says Natalie Collins, a spokesperson for the U.S. Attorney's Office in Las Vegas. "It says that there, so it's fine for me to confirm that." In a deal quietly reached with prosecutors last January, Clark agreed to "either locate and return the sensor removed on March 12, 2003 or pay restitution to the United States Air Force to replace the missing sensor." In exchange, the government agreed to suspend proceedings against Clark and to place him on a kind of probation called "pretrial diversion": if Clark goes a year without interfering with any of the road sensors, and doesn't otherwise break the law, the government will drop the felony charge. Clark's phone number is unlisted, and he didn't respond to repeated messages left for him at the Little A'Le'Inn over the course of several months, and inquiries passed through Arnu. His attorney also declined to return repeated phone calls on the case. Arnu says his friend never told him about a missing sensor, or his agreement to return it. "I refuse to believe that Chuck would be stupid enough to remove one," says Arnu. "I know... that he agreed to lay low for a year." Clark's adventures near the most famously secret patch of real estate in the world appear to have pulled him beneath the very cloak of secrecy he poked and scratched at for so many years. He has, in a sense, become a part of Area 51. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ---------------------------------------------------------------- C4I.org - Computer Security, & Intelligence - http://www.c4i.org ================================================================ Help C4I.org with a donation: http://www.c4i.org/contribute.html *==============================================================* 8726 From: kondrak Date: Wed May 26, 2004 6:12am Subject: Fwd: SpyBot >FYI: > >There is a new SpyBot Search and Destroy out with close 14,000 >definitions.......Get it! NO EXCUSES! NO SPYWARE! http://www.safer-networking.org/ [Non-text portions of this message have been removed] 8727 From: contranl Date: Wed May 26, 2004 0:09pm Subject: UK police to use Bluetooth to contact their databases. . UK police will use Bluetooth to contact their national police computers... there new hightech digital communicators (Tetra) dont have enough facilities (to small display/no keyboard)to do that. They probably will wear an extra device (PDA ?) that connects to there digital handheld radio (using a wireless bluetooth link) O2(the network operator)say they have developed a secure Bluetooth protocol for that. In a while there will be 1000's of policemen on the street walking around with 1000's of direct acces point's to the national police computers.... I shurely hope there "sucure bluetooth" is of high quality ! Source: http://networks.silicon.com/mobile/0,39024665,39120886,00.htm While you are there you might as well click on the link at the bottom "British police say new radios hurt there brains" To get a taste of the ongoing controversy on the "possible health effects" of there new digital radio network. Tetrascanner www.tetrascanner.com 8728 From: Ocean Group Date: Wed May 26, 2004 1:25pm Subject: RE: wlan access point detection Mark I would be inclined to agree with David. Just buy a wi-fi enabled (include 5 ghz if required) pda and use open source tools found on the net. Look at the psion portables for instance, there is a huge range to chose from. Cost wise you'll save, fluke gear is premium, and the widely used software like netstumbler will update itself when new systems appear. Plus there are huge support forums if you're unsure about something. If someone else is paying then why not buy some fluke gear...! However, their add-ons are pricey, and as people will tell you, they're prices are fixed so you won't find cut price gear, and never new kit second hand. Regards Ois ********************************* Message: 4 Date: Wed, 26 May 2004 07:30:19 +0100 From: "David Alexander" Subject: RE: wlan access point detection Mark I do audits of this type. I have a Compaq ipaq PDA with an 802.11 card and the Kismet/netstumbler/airsnort/wepcrack tools for performing Wi-Fi audits. You could use a laptop, but the PDA is easier for covert detection if the client doesn't want their staff to know, just leave it in your pocket and walk round. Wi-Fi access points are not hard to spot, once you know there is one. Hope this helps David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: mark de Boer [mailto:vincent2707662000@y...] Sent: 25 May 2004 19:04 To: tscm-l@yahoogroups.com Subject: [TSCM-L] wlan access point detection Does anyone on this list use(or used) a WLAN analyser such as the Fluke "waverunner" for detecting or viewing unauthorised access points on a client's network. We detect WLAN almost every time we do a sweep so a little help from Fluke would perhaps make it easier. M.de Boer RRB security Archimedestraat 12 Dordrecht Netherlands http://www.flukenetworks.com/us/LAN/Handheld+Testers/WaveRunner/Overview.htm --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.690 / Virus Database: 451 - Release Date: 22/05/2004 8729 From: kondrak Date: Wed May 26, 2004 5:03pm Subject: IP here, IP there, IP everywhere.....BPL Stealth AHH, the ulterior motive for BPL now Surfaces.... They want to bombard you with garbage advertising every second of the day.... Ad people should be rounded up and buried alive...I know there was no reason they'd undertake a billion dollar project like this to send to Internet to some farmer in Pigslop, ND...its to further invade your space with advertising.....the cat is out of the bag now, now theres a reason for EVERYONE to HATE It! We were just handed a key to victory in our fight.....we can exploit the people's worst fears, advertisement and SURVEILLANCE as well....reading all those RFID tags on stuff you bought from Walmart. Tracking your every move....reading your credit cards, etc. The sheeple will blow a gasket once this is out.... This is MAJOR...now we need to exploit it to the max....WE CAN KILL BPL WITH THIS! >NEW KID ON THE BLOCK >HAS A WHOLE BAG OF NEW SPARKS FOR THE COMMUTER > > >IP Everywhere(tm) have patent applied technology whereby > broadband internet will be available on moving vehicles. > >This technology promises to change the face of advertising >on vehicles and how commuters travel to and from work. > >San Francisco, CA > >IP Everywhere(tm) have patent applied technology whereby >broadband internet will be available on moving vehicles such >as trains, trams, trolleys, metros, subways, undergrounds, >trams and monorails. The technology feeds the internet to the >vehicle using the electrical power lines that power the vehicle. > >This next generation of Broadband over Power Line (BPL) >technology (also known as Power Line Communications - PLC) >will change the way the traveler uses their time on any moving >vehicle. With satellite being slow and relatively expensive, this >generation of BPL promises to bring a breath of fresh air to the >public transport industry and create brand new revenue streams >for ailing sectors needing a boost. > >The company is at the Proof of Concept stage and is looking >for partners to pilot this brand new technology. They are currently >talking to giants in the BPL arena such as Ameren, Current >Technologies and Cinergy and also partners like San Francisco`s >own BART along with PG&E. > >IP Everywhere is also in negotiations with utilities and companies >in South America, Germany, Japan and the United Kingdom >regarding their technologies. > >Broadband internet to vehicles is only one of the irons in their fire. >There are new exciting concepts underway and under patent >application that will literally change the face of advertising on a >moving vehicle. > >For more information http://www.ip-everywhere.com > >Source: http://www.hometoys.com/news.php4?section=view&id=13649435 > > > > > > > > >The Private Wireless Forum for Mobile Communication Professionals >Private Radio & Wireless Industry News, Views, Information & More >________________________________________________________ > >Have you checked out the growing collection of PWF Links, Files, and >graphics on the Forums' website recently? > >http://groups.yahoo.com/group/PrivateWirelessForum >________________________________________________________ > > >Each PWF member is solely responsible for the content of any post >they make to the Forum. Please review and proof-read your comments >BEFORE you send them, try to keep them as professional as possible >and, remember to TRIM (edit/cut/delete) any unnecessary portions of >all messages you choose to reply to. You never know just WHO might >be reading them or WHERE they may end up! Thanks for your help. > >________________________________________________________ > >If you know of other wireless professionals who might enjoy the PWF, >why not invite them to join us via the following subscription links: > >via email: PrivateWirelessForum-subscribe@yahoogroups.com >via the web: http://groups.yahoo.com/group/PrivateWirelessForum >________________________________________________________ > >What have YOU done today to help support, protect, and preserve >the PRIVATE Radio and Wireless community? > >Yahoo! Groups Links > > > > 8730 From: contranl Date: Wed May 26, 2004 10:58pm Subject: Video camera detection , including temporarely switched off !! . I like to ask the members of this group what they think of this: Automatic video-camera-detection ( including those switched off !!! ) --------------------------------------------------------------------- Why is it that most video-camera-detectors use such small antennas ? Antennas i've seen are : Telescope Rubberduckie (helical) Ferrite + coil I could imagine that a longer antenna would be better matched to the very long wavelenghths of the line-sync-frequencies wich are: NTSC 15,734 Khz PAL,PAL-N,SECAM 15,625 Khz PAL-M 15,750 Khz That's a very long wavelength (hundreds of meters !)...so: A telescope would be hundreds of times to short to be effective A rubber duckie should be even worse The Ferrite+coil is a little different..i assume this is supposed to pick op the electromagnetical part of the radiation...it might be in resonance with the frequency but still not very effective (you can make everything resonate to any frequency...including a nail...but that does'nt mean it is very effective).. Every radio-signal consists of 2 components: 1) The electrical component 2) The magnetical component Wich component is the strongest may depend on many things Most antennas are made to pick up the electrical waves...some are made to pick up the magnetical part...this is mostly done when long antennas are unpractical or if you specificly want to pick up only the magnetic part. -------------------------------------------------------- Question 1) What about the line-sync-radiation from video cameras... mostly electrical or mostly magnetic ? (wich one would have a longer detection range ?) -------------------------------------------------------- I could imagine 2 reasons for using very small antennas to sweep for videocameras: A) It is unpractical to have long antennas. B) You want to avoid the reception of (false) outside signals. Problem 1) You will have to sweep the whole wall...inch by inch... since detection range would be no more then max 25 inch(55cm) at most Problem 2) You can't detect switched off camera's this way you would need other expensive equipment ...like an NLJ wich has other problems. Solution ? ---------- Antenna: Why not take a longwire antenna and hang it on the walls ?....lets say you make 2 big turns, one at 1 ,5 meter high...the next turn at 2,5 meters high...like that you would have an antenna much better matched to the VLF frequency...in fact you are sitting in a big coil..wich will pick up both electrical and magnetical components. Only problem would be that you now pick might up more (false) radiation from outside. A solution to that would be to have a reference antenna outside and distract the received signals from those inside...wich will leave you with only inside signals. This you could do by counter-phase them (similar to a device sold by MFJ-electronics wich does exactly the opposite) Since we are only looking for only maximum 3 different frequencies chances of steady interference from outside are very small...also these frequencies are not used a lot since a receiver could easely have interference from any video equipment. So an outside sig substraction might not be neccesary. Outside signals might also have fading (slow increase and decrease of fieldstrength) a signal from a video camera would not have fading, Also an outside signal from a broadcast station would not have a video modulation. Receiver: Many VLF receivers that i have seen dont have a real front-end (the first stage in a receiver) They mainly consist of a roughly tuned circuit that lacks sensitivity and selectivity. Many of them can only do or NTSC or PAL or they "overlap" As a result they have no good detection range and might pick up other (false) signals too. So why not use a "real" receiver and scan the 3 VLF frequencies... using the above antenna ? I could use my Gps-tracker for that (wich is basically a software controlled scanner). With some clever software i could eliminate outside interference (if any) Outside signals would: Have slow fading Have a modulation that does not look like video The additional use of the "flashing lamp trick" would completely eliminate any false signals. "My" receiver could easely generate a flashing signal and at the same time look for any modulation coming back. (since it already has all the neccesary hard and software to do that) DETECTING SWITCHED OFF VIDEO CAMERAS -------------------------------------------------------------------- How to detect a switched-off camera ?.... using the above technique...impossible ? Not all roads lead to Rome ! A switched off camera will eventually be switched on again ! Unless the peeper did get "air" of you sniffing around... In real life most video cameras will be left on and a recorder would be switched on and off using a motion-detector or timer...that will save tape also. Anyway my software controlled receiver would record all signal levels at the 3 frequencies during a certain time.... and display them as a "level against time graphic". So the trick would be to do long time recording of levels. A suddenly switched on camera would show up as a sudden peak. A timed camera would show up always at the same time. A light sensor activated camera would show up as soon as you turn on the light. A PIR-detector controlled camera would go off and on again if you leave the room and come back after a few minutes. A transmission from outside will show up as non video-modulated and might have fading If you want to do long-time level recording ... let's say 24 hours you could leave the receiver in the corner of the room...the antenna would stay on the walls. To avoid that the "peeper" sees that funny wire hanging on the wall you may use a wire with the same color as the background, a "peeper" would probably not see it at the opposite wall anyway. You could even "act" like somebody is having a "birthhday party" and disguise the antenna as a "garland" kind of decoration... that might also keep nosy workers in an office asking about the wires :) :) So in practice you would enter the office hang up your decoration... connect it to the receiver and look and listen for a video-signal, if you find something you may switch on the flashing lamp trick to make absolut shure. (the lamp modulator / demodulator is already built in the receiver) If positive you would then sweep the wall in the oldfashioned way to pinpoint the camera. If you do'nt find anything...then there is either nothing... or the camera is switched off, in that case you leave your receiver on and leave the building to take a nap..... Next day you come back and inspect the recorded graphic. It will probably do "fibercams" as wel...unless they have used a very long fiber-wire exceeding the detection-range...wich might very well be at least 4~10 meters ? The above procedure has not been actually tested yet..and only lives in my brain,therefore i might have overseen something. Question 2 -------------------------------------------------------------------- What do you think of this...is this a: GOOD or BAD idea and why is that so ? -------------------------------------------------------------------- PS) The same technique could be used to detect non active: Gsm-phones / bugs / devices ...wich are sleeping most of the time to avoid detection and to save on batteries. Such a Gsm-level-recorder would be the only way to find it while not active (only receiving) An updating signal (necessary in Gsm networks) wich forces the phone to transmit shortly..might take a long time to occur(up to 24 hrs ! ) An updating signal will usually occur around the same time (network initiated) An updating signal will occur suddenly at a steady level An outside signal (from the next room) might have varying levels caused by movement/position of the person using it... An "idle" Gsm signal (when there is no speech ...from am empty room) will sound like a steady repeating data burst ...usually mic sensitivity in gsm phones is very low...any distant noise will not result in a modulation...a real conversation will sound like a non steady and varying datastream. A signal from a Gsm-phone can be easely detected at up to 200 meters using an AM detector and some high Q filters (like those used in Gsm phones)...the antenna would be a simple Gsm-antenna in the middle of the room. You may adjust the sensitivity to minimal to avoid false alarms. The microprocessor will count the typical Gsm pulses (217 Hz) thus further limiting the false alarms to 99.99 %. An active GSM-phone could be detected in less then 1 second...as soon as you switch on the detector you will hear the typical buzzzzz. This procedure will also work to detect any Gsm devices in a car (often used in combination with Gps-receivers to transmit the position, very usefull as a bug too since it has unlimited range. In the UK and many other countries you can track a Gsm-phone for less then 0,20 $ ...just hide a Gsm-phone in the car and you can see wherever it goes ...you do'nt even need Gps ! (allthough position accuracy is not as accurate as Gps but good enough for statistical/rough purposes) It will also discover Gsm cameras: (modified picture taking models or realtime video types) Gsm backed-up alarm systems also included Thanks in advance for your response Tetrascanner www.tetrascanner.com 8731 From: frost_bitten_ca Date: Wed May 26, 2004 7:11am Subject: rent a stalker Obama admits he dislikes his most loyal follower May 21, 2004 BY DAVE MCKINNEY AND SCOTT FORNEK Staff Reporters SPRINGFIELD -- For the past 10 days, U.S. Senate candidate Barack Obama hasn't been able to go to the bathroom or talk to his wife on his cell phone without having a camera-toting political gofer from his Republican rival filming a few feet away ... http://www.suntimes.com/output/elect/cst-nws-sen21.html 8732 From: Manjunath Shastry Date: Wed May 26, 2004 8:05am Subject: Re: Please help, I habe been Bugged Thank you for the reply. pls find a few answers to your questions. you appreciate your help in any way. --- Chad Margita wrote: > Manjunath: > > There are several issues here that must each be > addressed before you > should proceed down this path. Are you absolutely > sure the attack isn't pharmaceutical in nature? I don 't think any chemicals are being used. Are you sure the symptoms > aren't the result of a > diagnosable disease? Yes, I am sure that the symptoms aren 't a result of diagonsable disease. It would be a shame to pay for > an expensive sweep, > only to find nothing, and missed the real threat > entirely. When did these > symptoms start? I have been experiencing this for the past three months Why do think it's your former > employer? I am a Scientist and to exploit my Research capabilities, these things are being done by my former emmployer HCL Technologies. Is there a pattern > to the symptoms? Yes, I can typically feel the sensations in the same places of my Body I apologize for the next question > but I must, as a > professional ask it; Are you possibly suffering from > a mental or emotional > breakdown that may be causing the symptoms? No Please > describe, in as much > detail as possible, the symptoms, and any pattern in > their occurrence. Involuntary contraction of muscles, pin prick sensation, Pain in the lower feet and in the ears. When > did these symptoms first appear? On what do you > base your opinion that the > attack is electronic in nature? All my activities are being spied round the clock, I have been harassed on streets with the help of unsavoury characters. The police have been bribed corruptly using the power and influence. What do you think > the purpose or reason for > the attack would be? What result would the > perpetrator be looking to > achieve? > Commercial Motive. > Chad Margita > Off Duty Security > 18301 Eight Mile Rd > Suite 214 > Eastpointe Mi 48021 USA > Phone 586-774-1675 > Fax 586-774-1635 > > > > > > ----- Original Message ----- > From: "Manjunath Shastry" > > To: > Sent: Monday, May 24, 2004 11:53 PM > Subject: [TSCM-L] Please help, I habe been Bugged > > > > Greetings, > > > > > > I am a Scientist based in India, my former > employer > > HCL Technologies, is spying all my activities > round > > the clock and I am also experiencing pain, > numbness, > > shock, irritation and such sensations randomly in > all > > parts of my Body. This suspect this is done using > > electronic gadgets, though I have been able to > find > > none. > > > > > > How best can I stop this, would highly appreciate > your > > help. > > > > > > > > Regards, > > Manjunath. > > > > > > > > > > __________________________________ > > Do you Yahoo!? > > Friends. Fun. Try the all-new Yahoo! Messenger. > > http://messenger.yahoo.com/ > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > > > =================================================== > TSKS > > Yahoo! Groups Links > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > __________________________________ Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger. http://messenger.yahoo.com/ 8733 From: G P Date: Wed May 26, 2004 8:55pm Subject: Re: wlan access point detection The Fluke WaveRunner is nice, albeit pricey - you could accomplish the same goal with a Zaurus SL-5600 and Kismet; my personal setup is an SL-5600 with an Ambicom CF Wifi (WL1100C-CF), you can pick one up from Best Buy or CompUSA for ~$50, no drivers needed - support on the SL-5600 is already built-in. There are a few solutions out there that are more suited for finding rogue AP's in the same price range as the WaveRunner, check out the Yellow Jacket system: http://www.bvsystems.com/ It has a handheld stinger-style antenna that can be used for DF, and their software also has a triangulation addon module. Also check out http://www.airmagnet.com Both are sub-$5k and IMHO a better setup than Fluke, your mileage may vary. mark de Boer wrote: Does anyone on this list use(or used) a WLAN analyser such as the Fluke "waverunner" for detecting or viewing unauthorised access points on a client's network. We detect WLAN almost every time we do a sweep so a little help from Fluke would perhaps make it easier. M.de Boer RRB security Archimedestraat 12 Dordrecht Netherlands http://www.flukenetworks.com/us/LAN/Handheld+Testers/WaveRunner/Overview.htm --------------------------------- Yahoo! Messenger - Communicate instantly..."Ping" your friends today! Download Messenger Now [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links --------------------------------- Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger [Non-text portions of this message have been removed] 8734 From: Richard Donovan Date: Wed May 26, 2004 8:23am Subject: Area 51 Hackers Map Buried Surveillance Network Area 51 Hackers Map Buried Surveillance Network There's a story on SecurityFocus about a pair of Area 51 'hackers' who discovered a buried network of wireless motion sensors on the public land surrounding the "operating location near Groom Lake, Nevada." Using a frequency counter and a GPS receiver, they tracked down and logged 30 - 40 of the sensors, before the FBI and Air Force raided one of them, and questioned the other. Now one of the guys has been charged with a federal crime for allegedly removing one of the devices that was protecting a base that doesn't officially exist. http://www.securityfocus.com/news/8768 8735 From: javier_vc1 Date: Tue May 25, 2004 11:09pm Subject: Re: wlan access point detection Have you ever tried the most powerful hacking tool for fingerprinting wifi? http://www.kismetwireless.net/ Greetings. Javier Villanueva Chief Hacking Officer Mexico --- In TSCM-L@yahoogroups.com, mark de Boer wrote: > Does anyone on this list use(or used) a WLAN analyser such as the Fluke "waverunner" for detecting or viewing unauthorised access points on a client's network. > We detect WLAN almost every time we do a sweep so a little help from Fluke would perhaps make it easier. > > > M.de Boer > RRB security > Archimedestraat 12 > Dordrecht Netherlands > > > http://www.flukenetworks.com/us/LAN/Handheld+Testers/WaveRunner/Overvi ew.htm > > > --------------------------------- > Yahoo! Messenger - Communicate instantly..."Ping" your friends today! Download Messenger Now > > [Non-text portions of this message have been removed] 8736 From: Patrick Ryals Date: Wed May 26, 2004 1:18pm Subject: Video Surveillance Software Any recommendations on video surveillance software? I've been looking at a number of different pc based surveillance software. And no one software seems to stand out. "Video Site Monitor 4 Webcam System" from www.fgeng.com seems worth the time and energy to evaluate. I'm basically looking for something to run four cameras maybe eight, motion detection, decent frame rate, stored locally and post to a website that could be logged into and viewed from wherever. None of the ones I've found seem to be clearly marketed - meaning you'd need to spend some time with each to figure out even the most basic info. Such as frame rate, how many cameras etc. The one mentioned above seems to be the only one with an expansive support site. Please respond privately. Sincerely, Patrick Ryals ceo@n... Modus Operandi CA PI#22920 8737 From: Hawkspirit Date: Thu May 27, 2004 0:29pm Subject: Cell Phone Tracking Cell phone tracking http://www.svbxlabs.com/pages/projects/cell/ [Non-text portions of this message have been removed] 8738 From: Steve Uhrig Date: Thu May 27, 2004 2:42pm Subject: Re: Video camera detection , including temporarely switched off !! Once upon a midnight dreary, contranl pondered, weak and weary: > Why is it that most video-camera-detectors use such small antennas ? > Antennas i've seen are : > Telescope > Rubberduckie (helical) > Ferrite + coil 1)The thing needs to be practical 2)When it's phony it doesn't need to work, just look good. > What about the line-sync-radiation from video cameras... Back when cameras had vidicon or other type of image sensor TUBES (valves), they had a deflection yoke or magnetic plates and the equivalent of a flyback transformer giving a high voltage, high current pulse at 15-whatever kilocycles. That was something which, theoretically, might have been able to be sensed. Modern receivers using CRTs (mot of them) have the same thing in reverse, with large deflection coils over the neck of the CRT and a flyback transformer giving a big kick. You can try your experiments on a receiver and probably see similar results as to what you would with a TUBE camera. For all practical purposes, there are no more tube cameras. Solid state cameras work at very low signal levels. Not much radiated. Not much to sniff. A typical camera may draw 50 milliwatts at 12 volts which is regulated internally to 8 volts. That's 400 milliwatts. If you guesstimate 5% of that energy is radiating at the raster scan frequency, you'd have 20 milliwatts. Into essentially no antenna, you'd have a lot of negative antenna gain, say -30 dB at the raster scan frequency and this probably is being very generous. This would result in an effective radiated power of 20 microwatts if I did the math in my head correctly. 20 microwatts will be hard enough to detect with a resonant antenna, and as you pointed out, you won't have anywhere near a resonant antenna at these freqs. I believe the entire idea is one which sounds interesting in theory but when you apply the laws of physics it will not work in reality. > Problem 1) > You will have to sweep the whole wall...inch by inch... since > detection range would be no more then max 25 inch(55cm) at most How did you calculate this detection range? It seems extremely optimistic to me. Go over my math above and please point out if I made any errors. I didn't extrapolate path loss and receive antenna gain either, which you'd have to do to estimate a detection range. > Problem 2) > You can't detect switched off camera's this way you would need other > expensive equipment ...like an NLJ wich has other problems. A NLJ in competent hands will do the job. > Why not take a longwire antenna and hang it on the walls ?....lets say > you make 2 big turns, one at 1 ,5 meter high...the next turn at 2,5 > meters high...like that you would have an antenna much better matched > to the VLF frequency...in fact you are sitting in a big coil..wich > will pick up both electrical and magnetical components. For this effort you could do a physical search for the camera, its power supply, signal leads away from the camera, RF transmitted from the camera if wireiess and if it is, you get more of a chance to find the transmitter, transmitter power supply and transmit antenna. The longwire idea would not be practical. Submarines tow very very long wires as low frequency antennas. I won't mention the length but it's impressive. -------------- Keep thinking. We all learn from the discussion. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8739 From: J. Coote Date: Thu May 27, 2004 7:57pm Subject: RE: Video camera detection , including temporarely switched off !! It could be that some of the electrically short antennas seen on camera detectors are "active whip" antennas- A plain telescoping or rubber helical antenna at VLF without an RF preamp/matching/filters would be a P. O. S. (Piece Of Stuff)but a good active whip or loop can be really hot. I've used active whips for 10-520 kHz reception. The active whip is a meter or so of antenna (though could be less), single-stage preamp and some RF filtering and matching. I think I have seen one tape recorder or camera detector with a small loop antenna. Loops (with a preamp) are another method of receiving VLF-LF-MF. Reception- Some receivers won't go below 100 Khz, or if they do, the specs are "numb". A VLF upconvertor may be used between the active whip or loop and receiver on a higher frequency. Example: a signal on 187 Khz would up-convert to 10.187, the dial freq in your receiver. I think Kaiser has VLF UCs and detection/reception aids. I doubt that most modern cameras (CCD) will give off much signal on 15.7 Khz, so it might be rewarding to try a loop or whip, preamp, good VLF receiver around different camera types. Hmmm... same could be said for tape recorders, I wonder how many still use a 100-Khz (or so) bias? Jay Los Angeles -----Original Message----- From: contranl [mailto:contranl@y...] Sent: Wednesday, May 26, 2004 8:59 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Video camera detection , including temporarely switched off !! . I like to ask the members of this group what they think of this: Automatic video-camera-detection ( including those switched off !!! ) --------------------------------------------------------------------- Why is it that most video-camera-detectors use such small antennas ? Antennas i've seen are : Telescope Rubberduckie (helical) Ferrite + coil I could imagine that a longer antenna would be better matched to the very long wavelenghths of the line-sync-frequencies wich are: NTSC 15,734 Khz PAL,PAL-N,SECAM 15,625 Khz PAL-M 15,750 Khz That's a very long wavelength (hundreds of meters !)...so: A telescope would be hundreds of times to short to be effective A rubber duckie should be even worse The Ferrite+coil is a little different..i assume this is supposed to pick op the electromagnetical part of the radiation...it might be in resonance with the frequency but still not very effective (you can make everything resonate to any frequency...including a nail...but that does'nt mean it is very effective).. Every radio-signal consists of 2 components: 1) The electrical component 2) The magnetical component Wich component is the strongest may depend on many things Most antennas are made to pick up the electrical waves...some are made to pick up the magnetical part...this is mostly done when long antennas are unpractical or if you specificly want to pick up only the magnetic part. -------------------------------------------------------- Question 1) What about the line-sync-radiation from video cameras... mostly electrical or mostly magnetic ? (wich one would have a longer detection range ?) -------------------------------------------------------- I could imagine 2 reasons for using very small antennas to sweep for videocameras: A) It is unpractical to have long antennas. B) You want to avoid the reception of (false) outside signals. Problem 1) You will have to sweep the whole wall...inch by inch... since detection range would be no more then max 25 inch(55cm) at most Problem 2) You can't detect switched off camera's this way you would need other expensive equipment ...like an NLJ wich has other problems. Solution ? ---------- Antenna: Why not take a longwire antenna and hang it on the walls ?....lets say you make 2 big turns, one at 1 ,5 meter high...the next turn at 2,5 meters high...like that you would have an antenna much better matched to the VLF frequency...in fact you are sitting in a big coil..wich will pick up both electrical and magnetical components. Only problem would be that you now pick might up more (false) radiation from outside. A solution to that would be to have a reference antenna outside and distract the received signals from those inside...wich will leave you with only inside signals. This you could do by counter-phase them (similar to a device sold by MFJ-electronics wich does exactly the opposite) Since we are only looking for only maximum 3 different frequencies chances of steady interference from outside are very small...also these frequencies are not used a lot since a receiver could easely have interference from any video equipment. So an outside sig substraction might not be neccesary. Outside signals might also have fading (slow increase and decrease of fieldstrength) a signal from a video camera would not have fading, Also an outside signal from a broadcast station would not have a video modulation. Receiver: Many VLF receivers that i have seen dont have a real front-end (the first stage in a receiver) They mainly consist of a roughly tuned circuit that lacks sensitivity and selectivity. Many of them can only do or NTSC or PAL or they "overlap" As a result they have no good detection range and might pick up other (false) signals too. So why not use a "real" receiver and scan the 3 VLF frequencies... using the above antenna ? I could use my Gps-tracker for that (wich is basically a software controlled scanner). With some clever software i could eliminate outside interference (if any) Outside signals would: Have slow fading Have a modulation that does not look like video The additional use of the "flashing lamp trick" would completely eliminate any false signals. "My" receiver could easely generate a flashing signal and at the same time look for any modulation coming back. (since it already has all the neccesary hard and software to do that) DETECTING SWITCHED OFF VIDEO CAMERAS -------------------------------------------------------------------- How to detect a switched-off camera ?.... using the above technique...impossible ? Not all roads lead to Rome ! A switched off camera will eventually be switched on again ! Unless the peeper did get "air" of you sniffing around... In real life most video cameras will be left on and a recorder would be switched on and off using a motion-detector or timer...that will save tape also. Anyway my software controlled receiver would record all signal levels at the 3 frequencies during a certain time.... and display them as a "level against time graphic". So the trick would be to do long time recording of levels. A suddenly switched on camera would show up as a sudden peak. A timed camera would show up always at the same time. A light sensor activated camera would show up as soon as you turn on the light. A PIR-detector controlled camera would go off and on again if you leave the room and come back after a few minutes. A transmission from outside will show up as non video-modulated and might have fading If you want to do long-time level recording ... let's say 24 hours you could leave the receiver in the corner of the room...the antenna would stay on the walls. To avoid that the "peeper" sees that funny wire hanging on the wall you may use a wire with the same color as the background, a "peeper" would probably not see it at the opposite wall anyway. You could even "act" like somebody is having a "birthhday party" and disguise the antenna as a "garland" kind of decoration... that might also keep nosy workers in an office asking about the wires :) :) So in practice you would enter the office hang up your decoration... connect it to the receiver and look and listen for a video-signal, if you find something you may switch on the flashing lamp trick to make absolut shure. (the lamp modulator / demodulator is already built in the receiver) If positive you would then sweep the wall in the oldfashioned way to pinpoint the camera. If you do'nt find anything...then there is either nothing... or the camera is switched off, in that case you leave your receiver on and leave the building to take a nap..... Next day you come back and inspect the recorded graphic. It will probably do "fibercams" as wel...unless they have used a very long fiber-wire exceeding the detection-range...wich might very well be at least 4~10 meters ? The above procedure has not been actually tested yet..and only lives in my brain,therefore i might have overseen something. Question 2 -------------------------------------------------------------------- What do you think of this...is this a: GOOD or BAD idea and why is that so ? -------------------------------------------------------------------- PS) The same technique could be used to detect non active: Gsm-phones / bugs / devices ...wich are sleeping most of the time to avoid detection and to save on batteries. Such a Gsm-level-recorder would be the only way to find it while not active (only receiving) An updating signal (necessary in Gsm networks) wich forces the phone to transmit shortly..might take a long time to occur(up to 24 hrs ! ) An updating signal will usually occur around the same time (network initiated) An updating signal will occur suddenly at a steady level An outside signal (from the next room) might have varying levels caused by movement/position of the person using it... An "idle" Gsm signal (when there is no speech ...from am empty room) will sound like a steady repeating data burst ...usually mic sensitivity in gsm phones is very low...any distant noise will not result in a modulation...a real conversation will sound like a non steady and varying datastream. A signal from a Gsm-phone can be easely detected at up to 200 meters using an AM detector and some high Q filters (like those used in Gsm phones)...the antenna would be a simple Gsm-antenna in the middle of the room. You may adjust the sensitivity to minimal to avoid false alarms. The microprocessor will count the typical Gsm pulses (217 Hz) thus further limiting the false alarms to 99.99 %. An active GSM-phone could be detected in less then 1 second...as soon as you switch on the detector you will hear the typical buzzzzz. This procedure will also work to detect any Gsm devices in a car (often used in combination with Gps-receivers to transmit the position, very usefull as a bug too since it has unlimited range. In the UK and many other countries you can track a Gsm-phone for less then 0,20 $ ...just hide a Gsm-phone in the car and you can see wherever it goes ...you do'nt even need Gps ! (allthough position accuracy is not as accurate as Gps but good enough for statistical/rough purposes) It will also discover Gsm cameras: (modified picture taking models or realtime video types) Gsm backed-up alarm systems also included Thanks in advance for your response Tetrascanner www.tetrascanner.com ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8740 From: contranl Date: Thu May 27, 2004 10:12pm Subject: Cellphone tracking + Gsm "spyhones" overview . Thanks for the link, (http://www.svbxlabs.com/pages/projects/cell/) I can't figure it out..after reading it 10 times. What is described is maybe only 2 procent of what would be needed to make it work. (receivers,antennas,antenna-steering/switching etc) Looks like he is trying to re-invent the wheel ( wich i also do sometimes :) that wheel would be called " Time Of Arrival" That principle wont work with only 2 antennas since you would be left with 2 ore more possible directions you need 4 antennas to get 1 clear direction. For countersurveillance purposes useless and not needed if you would try to find a hidden cellphone/gsm in use as a bug in some office. A direction finding device would be overkill. You simply take a wide band detector (AM) and locate the source by observing the field strength while sweeping the walls..very basic ! To improve things you may want to add a filter tuned to the cellphone (uplink) freq bands...that's all. You could build such a detector (in this case for Gsm) yourself using the following lowcost components: A piece of wire (antenna) Amplifier (Mar-6 Minicircuits) Gsm filters (uplink freqs 900/1800 mhz) Amplifier (Mar-6 Minicircuits) 1 Diode (Am-detector) 1 Capacitor(10 pF) Audio amplifier (LM 386) Speaker You could add a signalstrength meter using an LM3915 and 10 Led's That's all..total cost 40 US $ Different approach: get a ready built "RF-sniffer" and add the filters ...there must be a thousend of them on the net. A simple specific gsm detector-circuit with a simple (global)direction-indication can be found here: http://www.elektor-electronics.co.uk/miniproj/details/010128.htm It will take you only a few hours to build: To improve it ...add an rf amplifier and a triband gsm-filter (dielectric filter 900/1800/1900 mhz...uplink) The direction finding part is not very effective/usefull, so you could build just half of the circuit. -------- Gsm-bugs have surfaced about a year or 3 ago..they where first made by some hobbyists but are now coming out of Taiwan in huge quantities... They are being sold for "whatever price they can get" ....500~5000 US $ Gsm-bugs are modified phones that have an added microprocessor inside (Pic) wich takes care of picking up the phone when called. Some Gsm-bugs are standard phones with no modification at all ! you can find a setting in the menu that will make it pick up by itself ! Other ones are "Flashed" and have completly new system-software with built in spyphone functions. By far most popular is the trick to "forget" such a phone in someone's office..you would then call it up to hear what they say about you after you left...ofcourse such a phone won't ring or display anything...simply because the display and ringer have been disabled...so it looks like being switched off Other models now have a "freezing" display ..they look like they are switched on and in standby mode...when called they pick up but show no changes because you will see a fake display. Latest models have caller ID ...it will only go in "spymode" when a certain number calls in...if anyone else calls it will behave normal. I have seen a new sample (Taiwan) with built in recording (remote controlled) they dont even look like phones anymore..they are now small square boxes with no keypad they may run directly of the mains voltage...very usefull to plant in someones house. Newest of the newest are those that can send you a picture too ! these are still big but that will change soon. Next year you will see small Gsm-bugs that can send realtime motion video ! (A Gsm-phone can use a voice channel...but also has a data- channel available...this data-channel can transmit more information as a voice voice channel can...therefore video over gsm will be on the data channel...a data channel will sound and look the same as an audio-channel since they are both digital to detection equipment) One disadvantage of Gsm bugs is that the audioquality is very poor (they currently all on the audiochannel) This is caused by the codec (the digitising of the audio) wich causes loss of audio quality...some have 2 microphones to create a very strong directional effect (pointed at the speakers mouth) Most Gsm "spyphone" manufacturers seem to use the original microphone circuit already available in the phone and do'nt bother to give it some added amplification..wich would improve the audio. Another disadvantage would be that if such a bug would be found the "caller" might be tracable by looking up the phone companies records...to avoid that...a caller might use another Gsm-phone to call in (Gsm-phones are available at every corner of the street without any ID ),ofcourse that would decrease audio-quality even more since it would then be digitized twice. Some people now use Gsm-jammers to disable Gsm-bugs...wich is illegal...like that you will not know that you are being bugged, they also disable your own phone (and the neighbours !) A Gsm-detector will be better it will alert you (loud or silent)and they are not illegal. I am amazed that there are only 2 Gsm-detectors available specificly aimed at countersurveillance : 1) http://www.audiotel-int.com/signetmob.html 2) www.tetrascanner.com......that's me !...mine can also do "sleeping" ones ! to do that you need to record all signals over a period of time...many Gsm-bugs will be sleeping most of the time to save on batteries. Other Gsm-detectors are aimed at restaurants to stop callers annoying the public..they are not portable and don't have a fieldstrength indication...you can't hear what you are receiving either, without that they are not very usefull for countersurveillance (finding them)purposes. Scanners are to slow and have difficulties to stop on the fast pulses and the wide bandwidth...also the phone might switch channels..so you might "loose" the signal all the time A spectrum analyzer will work fine...if you have on...use it. buying one only for this purpose would be overkill... A not so technical person might be better of with a simple to use Gsm-detector..wich will fit in your pocket ! Whatever you use you will have to use something that can do 2 or sometimes 3 frequency-bands at the same (real)time these bands are 900/1800/1900 Mhz each band is at least 30 mhz wide Gsm is by far the most used cellphone standard in the world...it's available in every country ...except the US and Japan where there are stil a lot of CDMA/IDEN networks...slowly Gsm is taking over there too. Interesting enough you do'nt see any CDMA cellphones advertised that have been converted to bugs...allthough that would be easy to do...and therefore they will exist. i have never heard a CDMA-cellphone-signal...simply because the do'nt exist in Europe. Do'nt worry...finding an active Gsm bug is a piece of cake since it emits very recogniseable pulses at high enough power levels. allthough more difficult when it's "sleeping" (it might take 24 hours before it will transmit a only 2 seconds lasting "updating signal" ) --------- LINKS --------- Look here to see some Gsm-phone bugs (resellers): The 1st one uses an interesting description of what they are used for: http://www.endoacustica.com/english/spy_telephone.htm http://www.gsmfactory.com/spyphone/# http://www.spy-labs.com/spyphone.htm -------- The best one is gone..do'nt know what happened they offered a do it yourself kit that consisted of a small preprogrammed microprocessor (Pic)...and a complete instruction on CD on how to build that in. They wholesaled for only 65 British pounds. they where here: http://www.spyphonedirect.com -------- The search for Gsm Spyphones/Gsmbugs/Ghostphones has reached such high levels...that the searchterm (keyword) is now being used by many websites just to get visitors even if they do'nt have them at all ! ...they have a very high "James Bond" level and are probably many times bought for "showing off" purposes only. -------- A far east manufacturer (Taiwan) Including online user-manuals for the gsm spyphones ! Lot's of other goodies novelties/oldies/gadgets/.. They say the have a portable Gsm-monitoring unit too! a very hot item !.....i could sell 100's of them if they would be less then 20.000 US $..beware,beware,beware,beware !!!!!! 9 out 10 "companies" that offer gsm-monitors...offer them only to upgrade there "appearance" but can't deliver ! (do'nt forget that Gsm-uses encryption) Some even ask 15.000 US $ just to give a demonstration ! (prepaid that is !) http://www.unitone.com.tw --------- Gsm video cameras ( stills and real time motion) http://www.laipac.com/gsm-camera.htm http://galarm.bizland.com/store/page20.html http://www.nokia.com/nokia/0,,4654,00.html http://tiny-url.com/2g http://www.edgarsson.co.uk/dialupcctv.htm http://www.remote-vision.com.sg/products/product.html# http://www.crimereduction.gov.uk/cctv26.htm --------- All gsm networks in the world to see if you're in a Gsm-area http://www.gsmcoverage.co.uk/ --------- All standard Gsm frequency bands (mobile tx frequencies ) GSM900 880 ~ 915 MHz GSM1800 1710 ~ 1785 MHz GSM1900 1850 - 1910 MHz Newer models can do all bands ---------- A little bonus that you might know already..the Cellgun (video) they found some last year ... just a few blocks from here. http://cellular.co.za/phones/gunphone/gun-phone.htm Well that's it for today...i could go on for hours... Greetings Tetrascanner www.tetrascanner.com 8741 From: David Alexander Date: Fri May 28, 2004 4:19am Subject: RE: Video camera detection , including temporarely switched off !! I've never been in favour of wireless TV surveillance. What's to stop a criminal using a receiver to view the images and effectively 'case the joint' without ever stepping foot inside, or being able to identify the positions of security guards ? David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: J. Coote [mailto:TSCM@j...] Sent: 28 May 2004 01:58 To: contranl; TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Video camera detection , including temporarely switched off !! It could be that some of the electrically short antennas seen on camera detectors are "active whip" antennas- A plain telescoping or rubber helical antenna at VLF without an RF preamp/matching/filters would be a P. O. S. (Piece Of Stuff)but a good active whip or loop can be really hot. I've used active whips for 10-520 kHz reception. The active whip is a meter or so of antenna (though could be less), single-stage preamp and some RF filtering and matching. I think I have seen one tape recorder or camera detector with a small loop antenna. Loops (with a preamp) are another method of receiving VLF-LF-MF. Reception- Some receivers won't go below 100 Khz, or if they do, the specs are "numb". A VLF upconvertor may be used between the active whip or loop and receiver on a higher frequency. Example: a signal on 187 Khz would up-convert to 10.187, the dial freq in your receiver. I think Kaiser has VLF UCs and detection/reception aids. I doubt that most modern cameras (CCD) will give off much signal on 15.7 Khz, so it might be rewarding to try a loop or whip, preamp, good VLF receiver around different camera types. Hmmm... same could be said for tape recorders, I wonder how many still use a 100-Khz (or so) bias? Jay Los Angeles -----Original Message----- From: contranl [mailto:contranl@y...] Sent: Wednesday, May 26, 2004 8:59 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Video camera detection , including temporarely switched off !! . I like to ask the members of this group what they think of this: Automatic video-camera-detection ( including those switched off !!! ) --------------------------------------------------------------------- Why is it that most video-camera-detectors use such small antennas ? Antennas i've seen are : Telescope Rubberduckie (helical) Ferrite + coil I could imagine that a longer antenna would be better matched to the very long wavelenghths of the line-sync-frequencies wich are: NTSC 15,734 Khz PAL,PAL-N,SECAM 15,625 Khz PAL-M 15,750 Khz That's a very long wavelength (hundreds of meters !)...so: A telescope would be hundreds of times to short to be effective A rubber duckie should be even worse The Ferrite+coil is a little different..i assume this is supposed to pick op the electromagnetical part of the radiation...it might be in resonance with the frequency but still not very effective (you can make everything resonate to any frequency...including a nail...but that does'nt mean it is very effective).. Every radio-signal consists of 2 components: 1) The electrical component 2) The magnetical component Wich component is the strongest may depend on many things Most antennas are made to pick up the electrical waves...some are made to pick up the magnetical part...this is mostly done when long antennas are unpractical or if you specificly want to pick up only the magnetic part. -------------------------------------------------------- Question 1) What about the line-sync-radiation from video cameras... mostly electrical or mostly magnetic ? (wich one would have a longer detection range ?) -------------------------------------------------------- I could imagine 2 reasons for using very small antennas to sweep for videocameras: A) It is unpractical to have long antennas. B) You want to avoid the reception of (false) outside signals. Problem 1) You will have to sweep the whole wall...inch by inch... since detection range would be no more then max 25 inch(55cm) at most Problem 2) You can't detect switched off camera's this way you would need other expensive equipment ...like an NLJ wich has other problems. Solution ? ---------- Antenna: Why not take a longwire antenna and hang it on the walls ?....lets say you make 2 big turns, one at 1 ,5 meter high...the next turn at 2,5 meters high...like that you would have an antenna much better matched to the VLF frequency...in fact you are sitting in a big coil..wich will pick up both electrical and magnetical components. Only problem would be that you now pick might up more (false) radiation from outside. A solution to that would be to have a reference antenna outside and distract the received signals from those inside...wich will leave you with only inside signals. This you could do by counter-phase them (similar to a device sold by MFJ-electronics wich does exactly the opposite) Since we are only looking for only maximum 3 different frequencies chances of steady interference from outside are very small...also these frequencies are not used a lot since a receiver could easely have interference from any video equipment. So an outside sig substraction might not be neccesary. Outside signals might also have fading (slow increase and decrease of fieldstrength) a signal from a video camera would not have fading, Also an outside signal from a broadcast station would not have a video modulation. Receiver: Many VLF receivers that i have seen dont have a real front-end (the first stage in a receiver) They mainly consist of a roughly tuned circuit that lacks sensitivity and selectivity. Many of them can only do or NTSC or PAL or they "overlap" As a result they have no good detection range and might pick up other (false) signals too. So why not use a "real" receiver and scan the 3 VLF frequencies... using the above antenna ? I could use my Gps-tracker for that (wich is basically a software controlled scanner). With some clever software i could eliminate outside interference (if any) Outside signals would: Have slow fading Have a modulation that does not look like video The additional use of the "flashing lamp trick" would completely eliminate any false signals. "My" receiver could easely generate a flashing signal and at the same time look for any modulation coming back. (since it already has all the neccesary hard and software to do that) DETECTING SWITCHED OFF VIDEO CAMERAS -------------------------------------------------------------------- How to detect a switched-off camera ?.... using the above technique...impossible ? Not all roads lead to Rome ! A switched off camera will eventually be switched on again ! Unless the peeper did get "air" of you sniffing around... In real life most video cameras will be left on and a recorder would be switched on and off using a motion-detector or timer...that will save tape also. Anyway my software controlled receiver would record all signal levels at the 3 frequencies during a certain time.... and display them as a "level against time graphic". So the trick would be to do long time recording of levels. A suddenly switched on camera would show up as a sudden peak. A timed camera would show up always at the same time. A light sensor activated camera would show up as soon as you turn on the light. A PIR-detector controlled camera would go off and on again if you leave the room and come back after a few minutes. A transmission from outside will show up as non video-modulated and might have fading If you want to do long-time level recording ... let's say 24 hours you could leave the receiver in the corner of the room...the antenna would stay on the walls. To avoid that the "peeper" sees that funny wire hanging on the wall you may use a wire with the same color as the background, a "peeper" would probably not see it at the opposite wall anyway. You could even "act" like somebody is having a "birthhday party" and disguise the antenna as a "garland" kind of decoration... that might also keep nosy workers in an office asking about the wires :) :) So in practice you would enter the office hang up your decoration... connect it to the receiver and look and listen for a video-signal, if you find something you may switch on the flashing lamp trick to make absolut shure. (the lamp modulator / demodulator is already built in the receiver) If positive you would then sweep the wall in the oldfashioned way to pinpoint the camera. If you do'nt find anything...then there is either nothing... or the camera is switched off, in that case you leave your receiver on and leave the building to take a nap..... Next day you come back and inspect the recorded graphic. It will probably do "fibercams" as wel...unless they have used a very long fiber-wire exceeding the detection-range...wich might very well be at least 4~10 meters ? The above procedure has not been actually tested yet..and only lives in my brain,therefore i might have overseen something. Question 2 -------------------------------------------------------------------- What do you think of this...is this a: GOOD or BAD idea and why is that so ? -------------------------------------------------------------------- PS) The same technique could be used to detect non active: Gsm-phones / bugs / devices ...wich are sleeping most of the time to avoid detection and to save on batteries. Such a Gsm-level-recorder would be the only way to find it while not active (only receiving) An updating signal (necessary in Gsm networks) wich forces the phone to transmit shortly..might take a long time to occur(up to 24 hrs ! ) An updating signal will usually occur around the same time (network initiated) An updating signal will occur suddenly at a steady level An outside signal (from the next room) might have varying levels caused by movement/position of the person using it... An "idle" Gsm signal (when there is no speech ...from am empty room) will sound like a steady repeating data burst ...usually mic sensitivity in gsm phones is very low...any distant noise will not result in a modulation...a real conversation will sound like a non steady and varying datastream. A signal from a Gsm-phone can be easely detected at up to 200 meters using an AM detector and some high Q filters (like those used in Gsm phones)...the antenna would be a simple Gsm-antenna in the middle of the room. You may adjust the sensitivity to minimal to avoid false alarms. The microprocessor will count the typical Gsm pulses (217 Hz) thus further limiting the false alarms to 99.99 %. An active GSM-phone could be detected in less then 1 second...as soon as you switch on the detector you will hear the typical buzzzzz. This procedure will also work to detect any Gsm devices in a car (often used in combination with Gps-receivers to transmit the position, very usefull as a bug too since it has unlimited range. In the UK and many other countries you can track a Gsm-phone for less then 0,20 $ ...just hide a Gsm-phone in the car and you can see wherever it goes ...you do'nt even need Gps ! (allthough position accuracy is not as accurate as Gps but good enough for statistical/rough purposes) It will also discover Gsm cameras: (modified picture taking models or realtime video types) Gsm backed-up alarm systems also included Thanks in advance for your response Tetrascanner www.tetrascanner.com ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8742 From: Ocean Group Date: Fri May 28, 2004 6:41am Subject: RE: Aviation Following on from the aviation topic a couple of weeks ago I spotted this: *************************** www.iee.org Mobile phone use in aircraft - is it really a safety issue? 27 May 2004 Isn't it curious that the airline industry insists that using mobile phones in airborne aircraft poses a potential safety risk due to interference with the navigation systems, yet cabin crews have no way of checking for sure whether there are phones still left switched on in their aircraft? It's increasingly common for phones to be left on, either in checked-in luggage or a passenger's possession, often unintentionally. It's not unusual to begin a descent and hear someone's phone go off with a text message alert, or for a phone to ring while in mid-air. More confusion occurs with the use of phones and PDAs (personal digital assistants) which have a special 'flight mode' that is supposed to disable the wireless function so that user's can use other facilities on their gadget; some users don't even switch to this mode until they power up their phone on-board while in mid-air, which means that they are using their equipment in wireless mode for some period of time anyway. As if that wasn't enough to confuse the travelling public, there's more to come, especially with the use of wireless internet on-board. There is also the European Commission funded project, WirelessCabin (www.wirelesscabin.com), which will start trials in August on an Airbus A340-600 aircraft. The project defines system architecture for wireless access (UMTS, W-LAN and Bluetooth) in an aircraft cabin. For this, the project has developed a service integrator that maps the cabin services on a satellite bearer to be connected to the terrestrial infrastructure. The goal of the project is to allow passengers to use their own mobile phones on-board. It uses a concept called collectively mobile heterogeneous network (CMHN), which allows several mobile users with different access standards on the network. The aircraft cabin represents such a CMHN supporting several radio access networks. Airbus has already conducted pre-trials under this project, and finished the system specification. Some issues were encountered which are expected to be ironed out in the main trials - for example, if the aircraft was above a certain altitude there were instances where the network was unable to log on, or connect, to the ground network. After the trials, the project expects to conclude by creating opportunities for new services for satellite operators, mobile service providers and airlines. As we come closer to having several different wireless technologies on board, it becomes clearer that 'safety' was probably just a smokescreen for the real, commercial issue. Airlines and operators have so far been unable to work out how best to profit from the passenger's desire to be connected while in the air, so have banned the use of phones. But with projects like WirelessCabin, which will provide them with the technology as well as enable satisfactory billing systems to emerge, it surely won't be too long before airlines and service operators will be encouraging us to use phones on board. --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.690 / Virus Database: 451 - Release Date: 22/05/2004 8743 From: agenceadi Date: Fri May 28, 2004 6:05am Subject: re: spy phone gsm many thanks for this message i m very carrefull with gsm spyphone because many listennings here in france are realised with those phone . all the bugs are forbidden here and you can t buy one so a lot of people take there phone to listen what they want in a room . you place the phone in the room and you call it , of course the phone don t ring but hang up and of course you can disable the screen so that you think the gsm is off. i use a scout digital optoelectronic to inspecte a room but you only see the frequency if the phone is active of course .... the best way is the jammer . david agence delta in paris 8744 From: Hawkspirit Date: Fri May 28, 2004 11:51am Subject: Sweep needed Residential sweep needed in Hannibal, Mo contact me directly Roger Tolces www.bugsweeps.com [Non-text portions of this message have been removed] 8745 From: Michael Puchol Date: Fri May 28, 2004 0:16pm Subject: HP 8559A SA Manual needed Hi all, I have been donated (in exchange for some work) a rather heavy HP 8559A (with the 853A display unit), which lacks any form of manuals. I'd be interested in aquiring a copy of the manuals which may be available (wink wink, Steve), will pay any costs incurred. This unit appears to have been used in a place where heavy smoking took place, as it's all sticky and brown with tar. Best regards, Mike From: James M. Atkinson, Comm-Eng Date: Fri May 26, 2000 5:23pm Subject: Taiwan added to FBI threat list http://www.USDefense.com/may2000/D/24/story4.htm Wednesday, 24 May 2000 UNITED STATES | In a move some U.S. lawmakers see as pure political hyperbole and administration pandering to China, Taiwan has been placed on the FBI's secret list of hostile intelligence threats to the United States, according to a Wednesday report in the Washington Times newspaper. The designation comes as a shock to veteran intelligence officials and members of various congressional intelligence committees. The designation is given to countries suspected of engaging in hostile espionage and spying activities against the U.S. The inclusion of Taiwan, placed on the list by Attorney General Janet Reno, is especially ominous, since many experts and congressional leaders suspect that China -- not Taiwan -- has been engaged in such espionage. The listing of Taiwan, however, places it on the same level as China. The other countries listed were, in order of priority: Russia, China, North Korea, Federal Republic of Yugoslavia, Serbian-controlled Bosnia, Vietnam, Syria, Iraq, Iran, Libya, Sudan and Taiwan. The Times said "in addition to nations, the so-called national security threat list includes eight issues that guide FBI intelligence work: terrorism, espionage, proliferation, economic espionage, infrastructure targeting, government targeting, perception management and legal intelligence gathering." Disclosure of the list comes as the House is set to begin debate on Wednesday over a controversial bill granting China permanent "normal" -- or favorable -- trade status. "It's very strange to me that Taiwan would be on this list, especially since other countries that spy on us are not," said Sen. Jon Kyl, R-AZ., and a member of Senate Intelligence Committee. "What threat?" If Taiwan is on the threat list, then Israel, India, Pakistan and France also should be added since those nations conduct spying operations against the United States, a former senior U.S. intelligence official told the newspaper. "This is just for political purposes. The Taiwanese are not in the same league as the other threats and they are the one country on the list that is not a mortal enemy of the United States," the former official said. Justice Department sources said the memorandum was written by Frances Fragos Townsend, counsel for intelligence policy and a political appointee who is close to Reno. Townsend was criticized in a recent internal Justice Department report for turning down an FBI request for a wiretap of Los Alamos National Laboratory scientist Wen Ho Lee. Lee is the chief suspect in an FBI investigation of Chinese nuclear spying. He was indicted in December for mishandling nuclear secrets. "Why isn't Israel on the list?" said a second former intelligence official, who also requested anonymity. Both former officials who spoke with the newspaper said it was inappropriate to "politicize" the threat list because it had the effect of distorting the truth and shifting FBI focus away from true threats to U.S. national security. Kyl said he would be inquiring with the Justice Department as to why Taiwan was added. Meanwhile, a current U.S. government official involved in China issues said putting Taiwan on the threat list reflects the administration's pro-Beijing and anti-Taiwan stance. "The administration clearly sees Taiwan as the problem, as a provocateur and troublemaker," he said. In addition to terrorism, spying and weapons proliferation, a relatively new issue in the issue list is the threat to the "national infrastructure" from electronic information warfare attacks. The disclosure, made by the newspaper but given to Times reporters by independent investigative reporter Scott Wheeler, marks the first time the secretive FBI list has ever been made public. FBI and Justice officials had no comment. =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 423 From: Paul Curtis Date: Fri May 26, 2000 6:51pm Subject: RE: Memorial Day 2000 Jim, Thanks so much for posting your memorial to those who gave the final full measure; it is really appreciated. Paul Curtis Commander American Legion Post 291 Newport Beach, California -----Original Message----- From: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] Sent: Friday, May 26, 2000 2:45 PM To: tscm-l@t... Subject: [TSCM-L] Memorial Day 2000 As most of you know Monday is memorial Day in the United States. In recognition to those who made the ultimate sacrifice for our freedom I have uploaded some materials onto the main web page on our site. http://www.tscm.com/index.html The piece I have uploaded was written by Benjamin Britten and is called "War Requiem, Opus 66" which was first performed for the rededication of St. Michael's Cathedral in Coventry (which was been destroyed during the bombings of World War Two). -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== ------------------------------------------------------------------------ Old school buds here: http://click.egroups.com/1/4057/1/_/507420/_/959377725/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 424 From: Date: Sat May 27, 2000 0:00am Subject: Religious humor interesting...!! THREE PROOFS THAT JESUS WAS PUERTO RICAN 1.His first name was Jesus 2.He was bilingual 3.He was always being harassed by the authorities THREE PROOFS THAT JESUS WAS BLACK 1.He called everybody "brother" 2.He liked Gospel 3.He couldn't get a fair trial THREE PROOFS THAT JESUS WAS JEWISH 1.He went into his father's business 2.He lived at home until he was 33 3.He was sure his Mother was a virgin, and his Mother was sure he was God THREE PROOFS THAT JESUS WAS ITALIAN 1.He talked with his hands 2.He had wine with every meal 3.He worked in the building trades THREE PROOFS THAT JESUS WAS A CALIFORNIAN 1.He never cut his hair 2.He walked around barefoot 3.He started a new religion THREE PROOFS THAT JESUS WAS IRISH 1.He never got married 2.He was always telling stories 3.He loved green pastures (and now the MOST Compelling EVIDENCE:) THREE PROOFS THAT JESUS WAS A WOMAN 1.He had to feed a crowd, at a moments notice, when there was no food 2.He kept trying to get the message across to a bunch of men who just didn't get it 3.Even when he was dead, he had to get up because there was more work for him to do. HAVE A GREAT DAY !!! 425 From: James M. Atkinson, Comm-Eng Date: Sat May 27, 2000 0:13pm Subject: Albright Receives Security Advice Saturday, May 27, 2000 Albright Receives Security Advice http://www.latimes.com/wires/wpolitics/20000526/tCB00V0272.html By GEORGE GEDDA, Associated Press Writer WASHINGTON (AP) -Almost anybody can walk through the front door of the State Department, but with security concerns on the rise that could change. [snip] Earlier, Russian spies were caught tuned in to a listening device installed in a seventh-floor conference room. There were 43 recommendations in Carpenter's report. Among them, according to a State Department official, were: -Limiting traffic in surrounding streets to people with proper clearance. -Requiring daily trunk searches all vehicles that enter the State Department parking garage, capacity 900. -Increasing the State Department security force, which now numbers 400. [snip] Meanwhile, it was disclosed Thursday that two agents representing the investigative arm of Congress posed as New York City police officers last week and wandered the State Department unescorted for 15 minutes. Under department rules, the two should have been under escort at all times. They were testing State Department security arrangements as part of a congressionally mandated investigation to review security at 19 government installations and two commercial airports. In each case, the General Accounting Office agents used fake credentials to get past security guards. "The fact that they were not escorted out of here was a mistake," Carpenter said, referring to the security violation at State. But another official said there were mitigating circumstances, pointing out that the two, without warning, bolted the 7th floor office where they were having a meeting arranged under false pretenses. In addition to the State Department, the GAO agents faked their way into the FBI, the Pentagon, the CIA and the Justice Department, among other agencies. The exercise, conducted at the request of Rep. Bill McCollum, R-Fla., chairman of the House Judiciary crime subcommittee, exposed how age-old cop-to-cop courtesies could be a security breach. Federal security guards never challenged any of the badges of the men they thought were fellow officers and the agents' briefcases were never checked, GAO Assistant Controller General Robert Hast said. "They've just never looked at this possibility," Hast said. "I think what we found was a unique hole in the system that can be plugged up." The agents were even able to videotape their penetration of several of the agencies without the guards noticing, said Ronald Malfi, one of the GAO agents who got inside eight federal buildings in one day using fake badges. "We could have caused a lot of damage," he said before showing the videotape to a House subcommittee. Red-faced agencies scrambled to prove they had plugged their security. At the Pentagon, federal officers will no longer be allowed to walk around unescorted and will have to check their weapons. [snip] =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 426 From: James M. Atkinson, Comm-Eng Date: Sat May 27, 2000 0:17pm Subject: New Computer Virus Spreading via Resume Saturday, May 27, 2000 New Computer Virus Spreading, Says F.B.I. http://www.nytimes.com/yr/mo/day/late/27resume-virus.html By THE ASSOCIATED PRESS ASHINGTON -- A new and dangerous computer virus dubbed "Killer Resume" is spreading through e-mail systems using the Microsoft Outlook program, the FBI said Friday night. Anti-virus companies reported that several corporate e-mail systems had already been infected, and some shut down, the FBI's National Infrastructure Protection Center said. The virus is carried in a file attached to an e-mail with the subject "Resume - Janet Simons." The attachment is a Microsoft Word file called "EXPLORER.DOC" or "RESUME.DOC," according to an alert posted on the Web site of Network Associates, a computer security company. [snip] The government warning said the Memorial Day weekend could allow the virus to spread over the next three days with a potentially rapid surge in activity as business open overseas on Monday and in the United States on Tuesday. Santa Clara, Calif.-based Network Associates said the virus was known as the "Killer Resume" because it arrives pretending to be a resume from a potential job applicant. [snip] Estimates of the damage caused by that virus range up to $10 billion, mostly in lost work time. As with NewLove and the Love Bug, Killer Resume will only spread from recipients running Microsoft's Outlook e-mail program. =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 427 From: James M. Atkinson, Comm-Eng Date: Sat May 27, 2000 10:36pm Subject: Resume Virus Warning - ResumeWorm, W97M.Resume.A This is regarding the "Resume" virus that started being spread on Friday (just in time for the long weekend). The actual impact of this virus will not be fully realized in the United States until Tuesday morning (due to the three day holiday). Within 24 hours of the initial reports, over 50,000 formal infections were reported by 7 major corporate locations (one company alone got hit by over 8600 copies). The initial exposure seems to be well over 100,000 "mail bombs" within the first 4 hours on Friday. This virus is seriously damaging, but it should be considered nothing more then a Word 97 macro variant. The damage is inflicted primarily against machines using the Windows Operating System, and more specifically against machines using the Outlook Email application (but it can be considered to be OS and Email application independent due to the fact that it is an attachment). This is not a Email specific problem, and it can imbedded into almost any Microsoft Office document (however it targets the OUTLOOK address book to spread to another machine). If the machine does not use OUTLOOK for Email applications the virus will simply damage the operating system and documents on that specific machine, and will not spread to other computers. If you do not have the MAPI interface (provided with both Office and Express versions of Outlook ) installed and setup then the virus cannot read your address book and/or email itself out to others. The virus spreads by mailing itself to everyone in a users address book once the Email is opened and then it attempts to delete a number of files (including system files) when the attachment is closed. The macro contains something similar to an "OnDocumentClose" VBS module which contains the payload and deletes several files on each partition (C:\Windows\*.* etc.). The level of damage is rather severe, and victims will typically suffer moderate to heavy data loss. This initial infections took place on Friday morning, with it coming to the attention of NIPC on Friday afternoon NIPC issued a formal alert on Friday night at 2200 hrs (as usual, they were 18 hours too late). Beware any Email which mentions the word 'resume" in the subject line as this variation uses a subject line of "resumÈ - Janet Simons" or "Resume - Janet Simons" Also watch out for any attachment with a file name similar to "RESUME1.DOC," "Resume.doc", or "Explorer.doc". The virus is actually a script imbedded into the and Microsoft document attachments. In the event of a suspected infection simply deactivate your executive summary feature in Microsoft Outlook. Then delete the e-mail without opening. Sadly, if a user clicks past the Macro/VBS "May 2000 security patch" warnings (which most do) then the virus will install itself and spread into the machine. If the user actually opens the document and realizes their error they should "pull the plug" or at least perform a "force quit/panic button" via the CTRL/ALT/DEL key sequence and then manually remove the virus while in Safe Mode (or immediately call your friendly tech support person). If a user closes MS Word, the Document_Close subroutine is activated. This routine copies the virus to: C:\WINDOWS\START MENU\PROGRAMS\STARTUP directory and C:\DATA directory. After that, the virus attempts the following: Kill "C:\*.*" (deletes all files in root directory) Kill "C:\My Documents\*.*" (deletes all files in My Documents directory) Kill "C:\WINDOWS\*.*" (deletes all files in the Windows directory -- leaving the computer totally unusable) Kill "C:\WINDOWS\SYSTEM\*.*" (deletes all files in the Windows System directory -- leaving the computer unusable) Kill "C:\WINNT\*.*" (similar to the Windows lines, this line targets Windows NT files) Kill "C:\WINNT\SYSTEM32\*.*" (again, targeting all files in the WindowsNT System32 directory) It also continues to attempt to delete all files in the root directory of drive A, B, D....up to drive Z. Considering that this is the weekend then damage on Tuesday could be fairly heavy. The initial Email (which acts as the Transport mechanism) reads as follows: ------------------------------------------------------------ SUBJECT: Resume - Janet Simons TO: Director of Sales/Marketing, MESSAGE: Attached is my resume with a list of references contained within. Please feel free to call or email me if you have any further questions regarding my experience. I am looking forward to hearing from you. Sincerely, Janet Simons. ATTACHMENT: Explorer.doc ------------------------------------------------------------ -jma and now for something completely different... *** IMPORTANT VIRUS WARNING !! *** There is a new, very dangerous virus that can have disastrous consequences. Microsoft, NIPC IBM, NAI and Symantec have all confirmed it's existence! The code name of this virus is "WORK". If you receive "WORK" in any way, be it from your colleagues or from your boss, do not open it, do not look at it and do not touch it! We have had this virus in our buildings for some time and had to establish that everyone who gets in touch with "WORK" will get his complete private life erased and his brain will give up its normal functions. If you get "WORK" by E-mail, you can only delete it, by replying to it (without opening it) with another E-mail: "I have received "WORK" from you before, that's enough! I have gone to the park for a walk." This way your brain will forget "WORK". If you get "WORK" in paper form, do NOT pay attention to it! Do not read, forward it to your waste basket!!! Take your coat and hat as well as two good friends, IMMEDIATELY go to the next bar and order three glasses of beer. If you repeat this 14 times, you will notice that "WORK" will be completely erased from your brain. Forward this warning to all your friends and colleagues. If you don't have any friends and colleagues, then you are already infected and the virus "WORK" has taken your life under its control. =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 428 From: Jordan Ulery Date: Sun May 28, 2000 2:16am Subject: Re: Digest Number 258 Perhaps the phrase 'only criminals ...' is being taken too literally. The pure fact is that only someone with something to hide, [or a paranoia or legitimate fear] really needs all the special laws that are now being created. The desire to be left alone, to be respected, is not the same thing as "privacy." Today privacy has become the catch phrase for isolation and protection even public activity. As an example, In the name of Privacy Sen. Kerry of MA told a Committee that it was currently legal to get criminal history information on the internet and that should be outlawed. Using that logic the teach with numerous drug possession and felony charges in NH should be allowed to continue to teach as she told Connie Chung she wanted to do. Respect of an individual and the rule of law allows me to walk dow the street safely without an escort from Big Brother. It is that respect that seems to have been lost and thus creates an atmosphere ripe for the exploitation of the people. If I am in the public arena then I should be held accountable for what I do. When I am in my bedroom it no business but mine & God's what I do unless another person is involved and I am violating that person's rights and/or liberty. Yes there is a legitimate need for security, but again, only those with something to hide, legitimate or otherwise, profit from special legislation called 'privacy.' Negative-@w... wrote: > Greetings Mr. Atkinson and list. > > I hope no one is offended by this post but I feel I should speak up for > the hermits and sages. > > With regards to anonymous/private posting, I felt slightly put upon by > the comment that only criminals use anonymity. I see it as much as a > right as 'real life' anonymity/privacy is. I do not walk down the street > with a sign posted on my back with my full name and address. Why should > I wear one on the net? I have little enough trust for physical strangers > that I can see, let alone invisible digital ones. I think that any and > every privacy precaution on or of line is a basic right and necessity in > this 'civilized' world we sojourn in. > This is actually one of the fundamental attitude differences I see in > the U.S. as compared with Northern Europe. Respect of privacy and > personal space. > > Just thought I would chime in. > > Negative. > > "Under the heavens, those who travel long distances in isolation will > defend themselves with strange arts." > > ------------------------------------------------------------------------ > Failed tests, classes skipped, forgotten locker combinations. > Remember the good 'ol days > http://click.egroups.com/1/4053/1/_/507420/_/959308593/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 429 From: Jordan Ulery Date: Sun May 28, 2000 2:29am Subject: Re: Memorial Day 2000 Thank you Jim, it was touching and on point. Paul Curtis wrote: > Jim, > > Thanks so much for posting your memorial to those who gave the final full > measure; it is really appreciated. > > Paul Curtis > Commander > American Legion Post 291 > Newport Beach, California > > -----Original Message----- > From: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] > Sent: Friday, May 26, 2000 2:45 PM > To: tscm-l@t... > Subject: [TSCM-L] Memorial Day 2000 > > As most of you know Monday is memorial Day in the United States. > > In recognition to those who made the ultimate sacrifice for our > freedom I have uploaded some materials onto the main web page on our > site. http://www.tscm.com/index.html > > The piece I have uploaded was written by Benjamin Britten and is > called "War Requiem, Opus 66" which was first performed for the > rededication of St. Michael's Cathedral in Coventry (which was been > destroyed during the bombings of World War Two). > > -jma > > =================================================================== > Do not meddle in the affairs of dragons, > for you are crunchy and taste good with ketchup. > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Nil carborundum illigitimi > =================================================================== > > ------------------------------------------------------------------------ > Old school buds here: > http://click.egroups.com/1/4057/1/_/507420/_/959377725/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > ------------------------------------------------------------------------ > Find long lost high school friends: > http://click.egroups.com/1/4056/1/_/507420/_/959384972/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 430 From: William Knowles Date: Sun May 28, 2000 4:28am Subject: Freedom ship 'will be target for terrorists' http://www.observer.co.uk/international/story/0,6903,319397,00.html Experts warn of crime wave, security crackdown and danger of hostage-taking on mile-long vessel Jason Burke, Chief Reporter Sunday May 28, 2000 It has been billed as a maritime Utopia sailing the seven seas. But security experts are warning that the 40,000 people who are expected to buy homes on the mile-long, 300-yard wide Freedom Ship may find life closer to Blade Runner than The Good Ship Lollipop. The vessel's very name may prove deeply ironic, for there will be one security man to every 15 residents, homes will be ringed with electronic surveillance equipment, the ship's police will have access to firearms, the captain will have absolute power, and there will be a jail in which to dump miscreants. A squad of intelligence officers will monitor threats to security, both from inside the ship and externally from pirates and terrorists. The ship will be equipped with 'state-of-the art defensive weapons' to repel attacks and the system of government sounds remarkably similar to that of some of the world's least savoury regimes. Construction is to start later this summer in Honduras. More than 15,000 labourers will work for 24 hours a day to get the ship built by 2003. Already more than a fifth of the 20,000 residential units, which cost from 80,000 to 5 million, have been sold, with sales averaging 4.7m a week. Many have been sold to clients in Britain and Europe. The US businessmen and engineers behind the project are so confident they are already planning three more Freedom Ships. 'It is a new lifestyle for this new millennium,' said Roger Gooch, marketing director of the Freedom Ship. The promotional literature for the project paints a magnificent picture of a luxurious tax haven that progresses steadily across the world's oceans, served by a fleet of light aircraft and speed boats. There will be shops, parks, concert halls, schools, homes and even a university on board. A huge duty-free shopping mall will generate significant revenue, it is claimed. The ship is so big - six times larger than any other vessel ever built - that a 100ft wave will hardly affect it, the builders say. The captain will be in a position to enforce the laws of whichever country's flag under which Gooch and his colleagues decide to sail her. Traditionally, states such as Panama have provided so-called flags of convenience, though Gooch said the ship's management were considering two European Union nations as possibilities. The ship's private security force of 2,000, led by a former FBI agent, will have access to weapons, both to maintain order within the vessel and to resist external threats. They can expect to be kept busy, according to sociologists, maritime security experts, criminologists and intelligence experts consulted by The Observer last week. 'The ship will have all the problems of any small city, including crime, outbreaks of disorder, juvenile delinquency, neighbourhood disputes, everything,' said Mike Bluestone, a London-based security consultant. 'And the ship will be a prime target for terrorists. It would be perfectly possible to hold the entire vessel to ransom by seizing a few well-chosen hostages.' Residents will be cosmopolitan, and that may not help social cohesion, says Ivan Horrocks, a security specialist at the Scarman Centre at the University of Leicester. 'When you create an artificial environment involving people with very different ethical, cultural, political and legal customs and values, the potential for tension is very great. It could well be more of a dystopia than a Utopia,' he said. But others are more sanguine about the Freedom Ship's prospects. One of the major attractions of the vessel, according to Gooch, is its freedom from taxes. Professor Ken Roberts, a sociologist at Liverpool University, believes that if people merely use the ship as a mobile tax haven, then it could function socially. 'People who have an international occupational life might find it attractive, though I do not see people with that kind of money spending all their lives on a ship,' he said. Others note that residents may be preoccupied with less drastic problems than the threat of piracy. Many of the first units to be sold have gone to Germans, raising the spectre of towels already on deckchairs by the time the rest of Europe's aspirant global voyagers make it to the pool. *-------------------------------------------------* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen. Alfred. M. Gray, USMC --------------------------------------------------- C4I Secure Solutions http://www.c4i.org *-------------------------------------------------* 431 From: Andy Grudko Date: Sat May 27, 2000 10:02am Subject: Equip. I know this has been discussed before, but I did not save the messages as it was not relevant 2 me then. I now wish to buy a broad band RX for hobby use which can double as a TSCM tool. If it can TX too it's a bonus. I am a licenced radio dealer and can legally posess ANY RF equipment. I am also a radio ham (ZR6UU) and have 3 VHF frequencies licenced to me for business use. We deal at up to government level but our 'experts' there don't cast a shaddow on the US experts. I'm looking for suggestions of cost effective product combinations (RX - PC - Software). My dealer suggests: AR 8000 or 8200 + Optronics 'sniffers' or Yaesu/Icon broadbands. I think the (UK) Audiotel stuff uses Icon kit plus a 2-3 gig converter. Advice will be appriciated Andy Grudko (CEO) Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence - Est 1981 Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 countries (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) www.grudko.com - "When you need it done right -first time" 432 From: Scott Malcolm Date: Sat May 27, 2000 1:27pm Subject: Re: Maryland to Drop Linda Tripp Wiretap Case > Message: 2 > Date: Thu, 25 May 2000 00:35:54 EDT > From: PGibson957@a... > Subject: Re: Maryland to Drop Linda Tripp Wiretap Case > > I just want to know who bought the judge. Monica is at least as credible as Bill is! > Guppy Guppy, You only have to "Buy" when there is an opposition. The case should be titled: "Eyes on becoming a Federal Judge". Kind of makes Recoding Laws in the State Maryland a travesty. "Everything's legal if you don't get caught" mentality doesn't even apply here. What SHAM of Justice. Regards, Scott Malcolm Malcolm & Associates Inc. Serving the State of Wisconsin Office 262 965 4426 Fax 262 965 4629 http://www.execpc.com/~conf-pi "Your Confidential Alternative" 433 From: Jay Coote Date: Sun May 28, 2000 9:14pm Subject: Re: Equip. Andy; I am going through a receiver upgrade myself. I am considering the Icom R-8500 which covers 100 KHz - 2 GHz. I am also looking into the AOR AR-5000 which is supposed to cover 10 KHz -2 Ghz. I might consider the TVR-7100 (nomenclature correct?) TV demodulator for the R-8500. It is supposed to allow the R-8500 to demodulate NTSC or PAL video (the user supplies a small monitor). Then there are subcarriers to monitor and the question of a spectral display (although I could pipe the IF to my Tektronics microwave spectrum analyzer) I believe Icom, or inquiring on the scanner and SWL reflectors might find you some control software. I find that the cheaper handheld/mobile receivers are sometimes "numb" or else have a lot of internal spurs to stop the scan. I'm also looking for a microwave downconvertor... 2-4 Ghz input and output (IF) of 100 Khz-2 Ghz to be used with one of my receivers and extend it's coverage to 4 Ghz. Jay Coote (W6CJ) Los Angeles ---------- > I know this has been discussed before, but I did not save the messages as it > was not relevant 2 me then. > > I now wish to buy a broad band RX for hobby use which can double as a TSCM > tool. If it can TX too it's a bonus. I am a licenced radio dealer and can > legally posess ANY RF equipment. I am also a radio ham (ZR6UU) and have 3 > VHF frequencies licenced to me for business use. > > We deal at up to government level but our 'experts' there don't cast a > shaddow on the US experts. > > I'm looking for suggestions of cost effective product combinations (RX - > PC - Software). > > My dealer suggests: > > AR 8000 or 8200 + Optronics 'sniffers' > > or Yaesu/Icon broadbands. I think the (UK) Audiotel stuff uses Icon kit plus > a 2-3 gig converter. > > Advice will be appriciated > > Andy Grudko (CEO) > Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & > intelligence - Est 1981 > Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 > countries > (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, > SASFed, > SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) > www.grudko.com - "When you need it done right -first time" > > > > ------------------------------------------------------------------------ > Old school buds here: > http://click.egroups.com/1/4057/1/_/507420/_/959520816/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 434 From: A Grudko Date: Mon May 29, 2000 8:43am Subject: Re: Downconverter info. Re. downconverters, do it yourself etc. (Jay's questions) The bands that can be covered are limited only by your ingenuity, the low vhf and uhf can be covered by a multiband tv tuner, the german types are the best with 4 bands, rescued from Grundig etc, 1. low vhf 46- 120 Mhz 2 high vhf 120-260 Mhz normal european vhf 3. low uhf 260-450 mhz sometimes known as hyperband, cable band 4. high uhf 460-900 mhz standard uhf tv band Any higher range or coverage, use a surplus sat tv tuner module. They normally cover 800-1800 mhz, however the later ones sometimes cover 700-2300 mhz, Sharp and the Pace ones are an example in this country. All of these tuners can be voltage sweep tuned from the x axis ramp of an oscilloscope to provide a basic spectrum analyser function. it must be noted that the range when swept from 0-25 volts is approx 20% more than the tuning normally controlled by the cpu tuning, when locked in a phase locked loop. Demodulation is a different thing, but you can at least 'see' that there is a signal coming out of that flowerpot or clock etc. and investigate. I'm sure you know all that stuff. We recently found a modified, digital audio cordless 'phone in an office ceiling that way. Darn thing sounded just like a GSM cell phone If there is a lack of gain at 700-2400 mhz then there is a common inexpensive component available used in front of the sat tuner as an rf amplifier, at approx $20US they have a stated frequency range 950-1750 mhz at 1 db down averaging 20 db. however on the 3 I have tested, their range extends from 300-2300 at 6db down ! They are avaliable from Satellite component suppliers marketed as a "Dish cable line amp" they are designed for "line" powering i.e dc on the centre of the co-ax to power the device, so to prevent shorts caused by the sniffer antenna (if it's a loop) a small amount of surgery is required,,,,, you have to chip off the epoxy around the plate, lever off the top, then disconnect the 5-10 turn chokes on the input and output sockets. further, connect a thin red feed cable to one of the removed choke ends, this can be fed with the portable analyser supply 12-18 volt dc (0.1 amp) otherwise it can be powered from a Power plug top unregulated supply provided that the ripple is fairly low at 200 mv. Frequency extenders are a different problem , 2-3.5 ghz All the commercially produced items are very expensive from Avantek etc probably used for defence development, This is where a sat tv supplier trading to Saudi Arabia may be useful , as they use the 2.6 ghz band for their sat tv and an L.N.B. from one of their suppliers, (even a returned very deaf one) will work ok. 3-5 ghz can be catered for in exactly the same manner, as the United States have used "C" band for some time for sat TV so I guess there must be hundreds of defunkt L.N.B. s lying around in garden sheds etc ever since they started digital high band sat tv. Deaf ones or otherwise for maybe 10 bucks! 6-8 ghz may be a small problem. A "C" band LNB can be used here as well, the rationale is that these converters are a superhet i.e. there is an oscillator running at 5.12 Ghz which the signals on the input are mixed with.This provides the converted I.F. output, so if there is an output at 1000 Mhz minus 5.12 Ghz = 4.12 ghz there is also an output at 1000 Mhz Plus 5.12GHz = 6.12 ghz however the output at the higher ghz end will be 20 Db weaker due to the filtering of the RF amplifier. But when sniffing for a nearby transmitter this loss will be of no consequence 8-10 ghz this can be treated exactly the same way as previous only the L.N.B. has to be a type with a 9.75 Ghz oscillator This is known in europe as an astra 1-D L.N.B. giving coverage of 8-12 Ghz when coupled to a tuner covering 120-2300 MHz. We don't have Astra coverage here in SA, but these days you can order anything over the 'net. 11-14 Ghz same as above but using a L.N.B. known as a Telecom band used in France. The local oscillator is at 11.7 GHz this will overlap the previous band to cover up to 14.1 Ghz coupled with a 120- 2400 tuner My arrangements here give me coverage of all except the "S" band (2.6 Ghz). I have a sniffer antenna but no convertor never bothered to aquire or make one .... I do not have a problem with the full band tuner end as I have a proper spectrum analyser that covers 0-2300 Mhz. Hope this helps. Do it yourself kit can save a fortune but lugging it all round can be a problem, and it does not look as professional as some of the 'off-the-shelf' units. However, you can often beat the 'pro' equipment on performance by being more sensitive - and more importantly, selective. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigations & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia Israel - www.grudko.com. - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 Members of : SCIP (Gauteng Chairman), SACI (President), GIN (Charter), WAD, CALI, SASFed, SASA, SAMLF, UKPIN, AFIO (OS) Prisoners' Rehabilitation & Education Trust --- "When you need it done right - first time" --- 435 From: Andre Holmes <1ach@g...> Date: Mon May 29, 2000 5:31am Subject: Re: Equip. Hello Andy the aor8200 is a viable option its new and has upgrades, the software that I have investigated is scanstar industrial about 495 dollars us. The optoelectronics is a good option 3000a and scout with aps105 and the r11 test reciever. Icom has good support the 8500 is a nice reciever also but its will cost you about 2000 plus us dollars to set up the 8500. -----Original Message----- From: Andy Grudko To: TSCM-L@egroups.com Cc: Dave Wilson Date: Sunday, May 28, 2000 9:33 AM Subject: [TSCM-L] Equip. >I know this has been discussed before, but I did not save the messages as it >was not relevant 2 me then. > >I now wish to buy a broad band RX for hobby use which can double as a TSCM >tool. If it can TX too it's a bonus. I am a licenced radio dealer and can >legally posess ANY RF equipment. I am also a radio ham (ZR6UU) and have 3 >VHF frequencies licenced to me for business use. > >We deal at up to government level but our 'experts' there don't cast a >shaddow on the US experts. > >I'm looking for suggestions of cost effective product combinations (RX - >PC - Software). > >My dealer suggests: > >AR 8000 or 8200 + Optronics 'sniffers' > >or Yaesu/Icon broadbands. I think the (UK) Audiotel stuff uses Icon kit plus >a 2-3 gig converter. > >Advice will be appriciated > >Andy Grudko (CEO) >Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & >intelligence - Est 1981 >Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 >countries >(+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, >SASFed, >SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) >www.grudko.com - "When you need it done right -first time" > > > >------------------------------------------------------------------------ >Old school buds here: >http://click.egroups.com/1/4057/1/_/507420/_/959520816/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > 436 From: Miguel Puchol Date: Mon May 29, 2000 6:38pm Subject: RE: Equip. Jay, You may find that the AR5000 is more sensitive above 1300MHz than the Icom. For some reason, the Icom I had (and others I tested) seemed to go deaf above that. The AR5000 is great, and you can use the TV-R7000 or 7100 with it no problem, just fit a 7809 regulator at the power input point, disconnect the IF power lead, and away you go. Just take the signal straight out of the AR5000's IF-Out jack. It is fully RS-232 controllable, and the protocol is there, if you want to homebrew some software. You can even turn it on and off from software, something that I have not seen any other scanner do (apart from PC-driven ones like the PCR1000 etc.) Cheers, Mike > -----Mensaje original----- > De: Jay Coote [mailto:TSCM@j...] > Enviado el: lunes, 01 de enero de 1601 1:00 > Para: TSCM-L@egroups.com > Asunto: Re: [TSCM-L] Equip. > > > Andy; > I am going through a receiver upgrade myself. I am considering > the Icom R-8500 which covers 100 KHz - 2 GHz. I am also looking > into the AOR AR-5000 which is supposed to cover 10 KHz -2 Ghz. > I might consider the TVR-7100 (nomenclature correct?) TV > demodulator for the R-8500. It is supposed to allow the R-8500 > to demodulate NTSC or PAL video (the user supplies a small > monitor). Then there are subcarriers to monitor and the > question of a spectral display (although I could pipe the IF to > my Tektronics microwave spectrum analyzer) I believe Icom, or > inquiring on the scanner and SWL reflectors might find you some > control software. I find that the cheaper handheld/mobile > receivers are sometimes "numb" or else have a lot of internal > spurs to stop the scan. > > I'm also looking for a microwave downconvertor... 2-4 Ghz input > and output (IF) of 100 Khz-2 Ghz to be used with one of my > receivers and extend it's coverage to 4 Ghz. > > Jay Coote (W6CJ) > Los Angeles > > ---------- > > I know this has been discussed before, but I did not save the > messages as it > > was not relevant 2 me then. > > > > I now wish to buy a broad band RX for hobby use which can > double as a TSCM > > tool. If it can TX too it's a bonus. I am a licenced radio > dealer and can > > legally posess ANY RF equipment. I am also a radio ham (ZR6UU) > and have 3 > > VHF frequencies licenced to me for business use. > > > > We deal at up to government level but our 'experts' there don't cast a > > shaddow on the US experts. > > > > I'm looking for suggestions of cost effective product combinations (RX - > > PC - Software). > > > > My dealer suggests: > > > > AR 8000 or 8200 + Optronics 'sniffers' > > > > or Yaesu/Icon broadbands. I think the (UK) Audiotel stuff uses > Icon kit plus > > a 2-3 gig converter. > > > > Advice will be appriciated > > > > Andy Grudko (CEO) > > Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & > > intelligence - Est 1981 > > Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 > > countries > > (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), > WAD , CALI, > > SASFed, > > SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) > > www.grudko.com - "When you need it done right -first time" > > > > > > > > ------------------------------------------------------------------------ > > Old school buds here: > > http://click.egroups.com/1/4057/1/_/507420/_/959520816/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > ------------------------------------------------------------------------ > eGroups members: $60 in FREE calls! Join beMANY! > And pay less each month for long distance. > http://click.egroups.com/1/4122/1/_/507420/_/959566467/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 437 From: Jay Coote Date: Mon May 29, 2000 8:55pm Subject: Re: Equip. Miguel; Thanks for the information on R8500 vs. AR5000. I see that the AR5000 also goes down to 10 Khz while the 8500 only covers 100 khz... good for carrier current or other VLF tests. Jay ---------- > Jay, > > You may find that the AR5000 is more sensitive above 1300MHz than the Icom. > For some reason, the Icom I had (and others I tested) seemed to go deaf > above that. > The AR5000 is great, and you can use the TV-R7000 or 7100 with it no > problem, just fit a 7809 regulator at the power input point, disconnect the > IF power lead, and away you go. Just take the signal straight out of the > AR5000's IF-Out jack. > It is fully RS-232 controllable, and the protocol is there, if you want to > homebrew some software. You can even turn it on and off from software, > something that I have not seen any other scanner do (apart from PC-driven > ones like the PCR1000 etc.) > > Cheers, > > Mike > > > -----Mensaje original----- > > De: Jay Coote [mailto:TSCM@j...] > > Enviado el: lunes, 01 de enero de 1601 1:00 > > Para: TSCM-L@egroups.com > > Asunto: Re: [TSCM-L] Equip. > > > > > > Andy; > > I am going through a receiver upgrade myself. I am considering > > the Icom R-8500 which covers 100 KHz - 2 GHz. I am also looking > > into the AOR AR-5000 which is supposed to cover 10 KHz -2 Ghz. > > I might consider the TVR-7100 (nomenclature correct?) TV > > demodulator for the R-8500. It is supposed to allow the R-8500 > > to demodulate NTSC or PAL video (the user supplies a small > > monitor). Then there are subcarriers to monitor and the > > question of a spectral display (although I could pipe the IF to > > my Tektronics microwave spectrum analyzer) I believe Icom, or > > inquiring on the scanner and SWL reflectors might find you some > > control software. I find that the cheaper handheld/mobile > > receivers are sometimes "numb" or else have a lot of internal > > spurs to stop the scan. > > > > I'm also looking for a microwave downconvertor... 2-4 Ghz input > > and output (IF) of 100 Khz-2 Ghz to be used with one of my > > receivers and extend it's coverage to 4 Ghz. > > > > Jay Coote (W6CJ) > > Los Angeles > > > > ---------- > > > I know this has been discussed before, but I did not save the > > messages as it > > > was not relevant 2 me then. > > > > > > I now wish to buy a broad band RX for hobby use which can > > double as a TSCM > > > tool. If it can TX too it's a bonus. I am a licenced radio > > dealer and can > > > legally posess ANY RF equipment. I am also a radio ham (ZR6UU) > > and have 3 > > > VHF frequencies licenced to me for business use. > > > > > > We deal at up to government level but our 'experts' there don't cast a > > > shaddow on the US experts. > > > > > > I'm looking for suggestions of cost effective product combinations (RX - > > > PC - Software). > > > > > > My dealer suggests: > > > > > > AR 8000 or 8200 + Optronics 'sniffers' > > > > > > or Yaesu/Icon broadbands. I think the (UK) Audiotel stuff uses > > Icon kit plus > > > a 2-3 gig converter. > > > > > > Advice will be appriciated > > > > > > Andy Grudko (CEO) > > > Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & > > > intelligence - Est 1981 > > > Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 > > > countries > > > (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), > > WAD , CALI, > > > SASFed, > > > SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) > > > www.grudko.com - "When you need it done right -first time" > > > > > > > > > > > > ------------------------------------------------------------------------ > > > Old school buds here: > > > http://click.egroups.com/1/4057/1/_/507420/_/959520816/ > > > ------------------------------------------------------------------------ > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > > > > > > > > > ------------------------------------------------------------------------ > > eGroups members: $60 in FREE calls! Join beMANY! > > And pay less each month for long distance. > > http://click.egroups.com/1/4122/1/_/507420/_/959566467/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > ------------------------------------------------------------------------ > CLICK HERE AND START SAVING ON LONG DISTANCE BILLS TODAY! > http://click.egroups.com/1/4125/1/_/507420/_/959644590/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 438 From: Jordan Ulery Date: Mon May 29, 2000 11:21pm Subject: Re: Re: Maryland to Drop Linda Tripp Wiretap Case It ain't just Maryland. Look at the Supreme Court of NH! Scott Malcolm wrote: > > Message: 2 > > Date: Thu, 25 May 2000 00:35:54 EDT > > From: PGibson957@a... > > Subject: Re: Maryland to Drop Linda Tripp Wiretap Case > > > > I just want to know who bought the judge. Monica is at least as credible as Bill is! > > Guppy > > Guppy, > > You only have to "Buy" when there is an opposition. > The case should be titled: "Eyes on becoming a Federal Judge". > > Kind of makes Recoding Laws in the State Maryland a travesty. > "Everything's legal if you don't get caught" mentality doesn't even apply here. > > What SHAM of Justice. > > Regards, > > Scott Malcolm > Malcolm & Associates Inc. > Serving the State of Wisconsin > Office 262 965 4426 Fax 262 965 4629 > http://www.execpc.com/~conf-pi > "Your Confidential Alternative" > > ------------------------------------------------------------------------ > Missing old school friends? Find them here: > http://click.egroups.com/1/4055/1/_/507420/_/959540178/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 439 From: Andy Grudko Date: Mon May 29, 2000 2:11pm Subject: Re: Equip. ----- Original Message ----- > The aor8200 is a viable option its new and has upgrades, the > software that I have investigated is scanstar industrial about 495 dollars > us. The optoelectronics is a good option 3000a and scout with aps105 and > the r11 test reciever. Icom has good support the 8500 is a nice reciever > also but its will cost you about 2000 plus us dollars to set up. We used to have good suppliers for Icom/Kenwood/Yaesu equipment here but the 2 main 'ham' dealers recently went out of business and the commercial dealers are only interested in simple eProm etc. 2 way radios. We have other main suppliers represented here, but in limited supplies - Standard, Motorolla and Alinco. I'm leaning towards the Icom 8500 or 9000 (rack mount), which is for gov. only or export but I can get one legally here. I'm not impressed with the Opto. kit + AOR....so many false signals from these tiny devices which waste valuable search time. I've used, the Scout with AOR and Xplorer and their backup is zero here in deepest, darkest Africa, even by eMail. I've found numerous bits of software to drive the Icom and give displays/printouts but software is my weak point in this equasion - I'm an RF basics/hardware guy with some intel. contacts thrown in to get an idea of where to look for new stuff. I get my teenage kids to sort out my computers! There is no point having the gov. level 9000 if I'm using software set up by a school kid hobbyist. I had Scanstar software for the Xplorer but it didn't work and Scanstar told me they were not compatible - even though the discs came with it. I've looked at the latest Audiotel Scanlock and compared it to the RIE Oscar, and the Scanlock looks better - great tools but at such a high cost over here. Andy Grudko (CEO) Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence - Est 1981 Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 countries (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) www.grudko.com - "When you need it done right -first time" 440 From: Andy Grudko Date: Tue May 30, 2000 3:05am Subject: Re: Tone Sweepers ----- Original Message ----- > I was interested in adding two sweeping tones to my breakout box, if > anyone has a schematic. > I am guessing voiceband, 200-4000 Hz. I think 'Tiny Tim', the 70's suprano topped out at 1210 Hz. Yup - at least here in SA 'phone audio cuts out at 2 - 3.4 Khz. > Jim brings up a good point. Speed of the sweep tones. If too slow, > it will take all night to sweep one POTS line. I use a slow 'saw tooth' generator rather than a 'sign wave' because it is so rich in harmonics. A sweep takes about 2 minutes - 500 - 2100 Hz seem the most popular range. 1750 Hz is the most common tone we have seen in use. >Too fast and the sweep may not stay on any frequency long enough to trigger a control > device on the line. The commercial devices we have found take milli seconds to respond. A custom device might need longer exposure, but it is up to the TSCM operator to understand these limitations vs. the risk faced. That's why we strip suspect 'phones. >How often will the tones cross over each other (to simulate DTMF or other dual tones) taking the above into account, combining the right compination and burst time gives a combination approaching infinity. I think we all know how far infinity is and the scary fact that it exists, making our jobs ultimatly impossible. No Comm is ever 100 % safe. A State agency device requiring a trigger dual tone of a meer 250 millisecs at the accepted bandwidths and ranges could take literally days to scan (I'm too lazy & not theoretical enough to do the maths). So you still need a trained physical search. So all we (I speak for my agency) can honestly protect against are the 16 common DTMF tones (1-0, A-D, # & +), which just need a keypad (usually half second 'natural button push' burst). A little 10 second program will do it but we have never bothered with it. We just press 1, 2, 3 etc. >Andy Grudko (CEO) Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence - Est 1981 Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 countries (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) www.grudko.com - "When you need it done right -first time" 441 From: James M. Atkinson, Comm-Eng Date: Tue May 30, 2000 10:21am Subject: Re: Tone Sweepers At 9:05 AM +0100 5/30/00, Andy Grudko wrote: >----- Original Message ----- > > I was interested in adding two sweeping tones to my breakout box, if > > anyone has a schematic. > > I am guessing voiceband, 200-4000 Hz. > >I think 'Tiny Tim', the 70's suprano topped out at 1210 Hz. "Normal Range" of human hearing is 20 Hz to 20 kHz, however; a small number of people can "hear" sounds over 20 kHz. A peson of typical American/European lineage can detect up to about 12-14 kHz. Since most "sound energy" is between 300-3000 Hz the phone systems tend to be optimized for that band. >Yup - at least here in SA 'phone audio cuts out at 2 - 3.4 Khz. It varies slightly worldwide, but generally we have a maximum of 4 kHz of bandwidth to work with. I've worked with systems where it was a narrow as 1.5 kHz, but most systems will be at least 2.5 kHz wide. > > Jim brings up a good point. Speed of the sweep tones. If too slow, > > it will take all night to sweep one POTS line. > >I use a slow 'saw tooth' generator rather than a 'sign wave' because it is >so rich in harmonics. A sweep takes about 2 minutes - 500 - 2100 Hz seem >the most popular range. 1750 Hz is the most common tone we have seen in use. Ouch, ouch, ouch... The actual tones themselves should be as spectrally pure as possible or you will not trigger many devices. Try to trigger first with specific spectrally pure and stable tones before applying any kind of swept tones. > >Too fast and the sweep may not stay on any frequency long enough to trigger >a control > > device on the line. > >The commercial devices we have found take milli seconds to respond. A custom >device might need longer exposure, but it is up to the TSCM operator to >understand these limitations vs. the risk faced. That's why we strip suspect >'phones. Striping the phone is by far the optimal method, but it takes time... lots of time. It's also why a TDR is so valuable as it it tough to "physically inspect" every single inch of station wiring. > >How often will the tones cross over each other (to simulate DTMF or other >dual tones) taking the above into account, combining the right compination >and burst time gives a combination approaching infinity. > >I think we all know how far infinity is and the scary fact that it exists, >making our jobs ultimatly impossible. No Comm is ever 100 % safe. I consider the following values on each of the tone sweeps (which are based on the specific characteristics of a number of actual devices) Spectrally Pure and Stable Tones DTMF Sweep (16 tones)15% MF Sweep (32 tones)10% In-band Signaling20% Out-band Signaling10% Swept Tones (square waves, with fast rise times) Single tone sweep25% Dual Tone Sweep10% Three Tone Sweep5% Four Tone Sweep5% Be sure to watch the behavior of all other cable pairs (current) as the tones are being generated. When the power pair current suddenly increases when the talk pair is hit with 1004 Hz you might have a problem. >A State agency device requiring a trigger dual tone of a meer 250 millisecs >at the accepted bandwidths and ranges could take literally days to scan (I'm >too lazy & not theoretical enough to do the maths). So you still need a >trained physical search. But of course every instrumented sweep is strictly in preparation for a detailed physical inspection. >So all we (I speak for my agency) can honestly protect against are the 16 >common DTMF tones (1-0, A-D, # & +), which just need a keypad (usually half >second 'natural button push' burst). A little 10 second program will do it >but we have never bothered with it. We just press 1, 2, 3 etc. That will only activate about 15% of the devices out there. > >Andy Grudko (CEO) >Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & >intelligence - Est 1981 >Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 >countries >(+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, >SASFed, >SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) >www.grudko.com - "When you need it done right -first time" =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 442 From: Thomas H. Jones Date: Tue May 30, 2000 10:49am Subject: TSCM Equip and Downconverters With all of the discussion about equipment, this is a shameless plug from REI. Please consider the OSCOR from REI. It's current frequency range is from 10KHz to 3GHz with three IF bandwidths 6KHz, 15KHz, and 250KHz. It has narrow and wideband FM and AM demodulation as well as sub-carrier (double demodulation). It also has video demodulation built-in for NTSC, Pal, and SECAM. This summer, we will release our latest upgrade, the MDC-2100. This is microwave downconverter for use with the OSCOR that extends the frequency range of the OSCOR to 21GHz. It has built-in high gain antennas for complete frequency band coverage. The expense is certainly more than the suggested systems below, but we hope the packaging and performance is well worth the added expense. For more information contact REI at "sales@r..." or "www.research-electronics.com" -----Original Message----- From:A Grudko [SMTP:agrudko@i...] Sent:Tuesday, May 30, 2000 8:19 AM To:TSCM-L@egroups.com Subject:[TSCM-L] Re: Downconverter info. Re. downconverters, do it yourself etc. (Jay's questions) The bands that can be covered are limited only by your ingenuity, the low vhf and uhf can be covered by a multiband tv tuner, the german types are the best with 4 bands, rescued from Grundig etc, 1. low vhf 46- 120 Mhz 2 high vhf 120-260 Mhz normal european vhf 3. low uhf 260-450 mhz sometimes known as hyperband, cable band 4. high uhf 460-900 mhz standard uhf tv band Any higher range or coverage, use a surplus sat tv tuner module. They normally cover 800-1800 mhz, however the later ones sometimes cover 700-2300 mhz, Sharp and the Pace ones are an example in this country. All of these tuners can be voltage sweep tuned from the x axis ramp of an oscilloscope to provide a basic spectrum analyser function. it must be noted that the range when swept from 0-25 volts is approx 20% more than the tuning normally controlled by the cpu tuning, when locked in a phase locked loop. Demodulation is a different thing, but you can at least 'see' that there is a signal coming out of that flowerpot or clock etc. and investigate. I'm sure you know all that stuff. We recently found a modified, digital audio cordless 'phone in an office ceiling that way. Darn thing sounded just like a GSM cell phone If there is a lack of gain at 700-2400 mhz then there is a common inexpensive component available used in front of the sat tuner as an rf amplifier, at approx $20US they have a stated frequency range 950-1750 mhz at 1 db down averaging 20 db. however on the 3 I have tested, their range extends from 300-2300 at 6db down ! They are avaliable from Satellite component suppliers marketed as a "Dish cable line amp" they are designed for "line" powering i.e dc on the centre of the co-ax to power the device, so to prevent shorts caused by the sniffer antenna (if it's a loop) a small amount of surgery is required,,,,, you have to chip off the epoxy around the plate, lever off the top, then disconnect the 5-10 turn chokes on the input and output sockets. further, connect a thin red feed cable to one of the removed choke ends, this can be fed with the portable analyser supply 12-18 volt dc (0.1 amp) otherwise it can be powered from a Power plug top unregulated supply provided that the ripple is fairly low at 200 mv. Frequency extenders are a different problem , 2-3.5 ghz All the commercially produced items are very expensive from Avantek etc probably used for defence development, This is where a sat tv supplier trading to Saudi Arabia may be useful , as they use the 2.6 ghz band for their sat tv and an L.N.B. from one of their suppliers, (even a returned very deaf one) will work ok. 3-5 ghz can be catered for in exactly the same manner, as the United States have used "C" band for some time for sat TV so I guess there must be hundreds of defunkt L.N.B. s lying around in garden sheds etc ever since they started digital high band sat tv. Deaf ones or otherwise for maybe 10 bucks! 6-8 ghz may be a small problem. A "C" band LNB can be used here as well, the rationale is that these converters are a superhet i.e. there is an oscillator running at 5.12 Ghz which the signals on the input are mixed with.This provides the converted I.F. output, so if there is an output at 1000 Mhz minus 5.12 Ghz = 4.12 ghz there is also an output at 1000 Mhz Plus 5.12GHz = 6.12 ghz however the output at the higher ghz end will be 20 Db weaker due to the filtering of the RF amplifier. But when sniffing for a nearby transmitter this loss will be of no consequence 8-10 ghz this can be treated exactly the same way as previous only the L.N.B. has to be a type with a 9.75 Ghz oscillator This is known in europe as an astra 1-D L.N.B. giving coverage of 8-12 Ghz when coupled to a tuner covering 120-2300 MHz. We don't have Astra coverage here in SA, but these days you can order anything over the 'net. 11-14 Ghz same as above but using a L.N.B. known as a Telecom band used in France. The local oscillator is at 11.7 GHz this will overlap the previous band to cover up to 14.1 Ghz coupled with a 120- 2400 tuner My arrangements here give me coverage of all except the "S" band (2.6 Ghz). I have a sniffer antenna but no convertor never bothered to aquire or make one .... I do not have a problem with the full band tuner end as I have a proper spectrum analyser that covers 0-2300 Mhz. Hope this helps. Do it yourself kit can save a fortune but lugging it all round can be a problem, and it does not look as professional as some of the 'off-the-shelf' units. However, you can often beat the 'pro' equipment on performance by being more sensitive - and more importantly, selective. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigations & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia Israel - www.grudko.com. - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 Members of : SCIP (Gauteng Chairman), SACI (President), GIN (Charter), WAD, CALI, SASFed, SASA, SAMLF, UKPIN, AFIO (OS) Prisoners' Rehabilitation & Education Trust --- "When you need it done right - first time" --- ------------------------------------------------------------------------ Best friends, most artistic, class clown Find 'em here: http://click.egroups.com/1/4054/1/_/507420/_/959609160/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 443 From: Steve Uhrig Date: Tue May 30, 2000 10:21am Subject: Re: Equip. Once upon a midnight dreary, Andy Grudko pondered, weak and weary: > We have other main suppliers represented here, but in limited > supplies - Standard, Motorolla and Alinco. Standard was purchased by Yaesu over a year ago and is no more. There may be Standard-branded radios on someone's shelf, but they are old stock and little support will be available. > I'm leaning towards the Icom 8500 or 9000 (rack mount), which is > for gov. only or export but I can get one legally here. Stay away from the R9000 for any price. It is a piece of junk and nearly unserviceable. You cannot buy a single replacement part; you are required to purchase an entire assembly. The CRTs are all worn out by now, even if new. The radio has no test points, and no extender boards or cables ever were available. Servicing it is extremely labor intensive and you will look a long time to find a competent shop willing to tackle it. We service them in house and are probably the only facility other than ICOM to do so. An R8500 with an SM-1071 Atlantic Electronics signal monitor (www.cse-assoc.com) is a much better investment from all angles. We sold and serviced hundreds of ICOM receivers in our 17 years of selling ICOM, and am glad to have those days largely behind us. > I've looked at the latest Audiotel Scanlock and compared it > to the RIE Oscar, and the Scanlock looks better - great tools > but at such a high cost over here. This is the cost of doing business. Remember the ICOM, AOR, etc. are still amateur (hobby) products. They may be of some minimal use for TSCM if your budget is really strained but don't fool yourself. The OSCOR and Scanlock are at the low end of professional equipment but largely adequate in *trained* hands, where trained means a few days at the factory. On your own you will not pick up everything. I used the Scanlock for many years and was 100% confident in it. Largely due to unavailability of service, I switched to the OSCOR for my main piece, and it will be years before I develop the same confidence level. Factory training helped a lot, and both are capable devices. Audiotel will claim they offer service for the Scanlock line, but their absolutely outrageous repair rates basically indicate they have little interest in servicing the things. I couldn't take that on a piece I use to earn my living. And with all this, don't overlook the 2.4 gig video threat, power line devices and especially conducted threats, which none of the above can detect adequately. Radiated threats are glamourous and get the most attention, but the threats from conducted signals are far worse and deserve the lion's share of attention. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 444 From: James M. Atkinson, Comm-Eng Date: Tue May 30, 2000 11:36am Subject: Re: Equip. At 8:11 PM +0100 5/29/00, Andy Grudko wrote: > >I've looked at the latest Audiotel Scanlock and compared it to the RIE >Oscar, and the Scanlock looks better - great tools but at such a high cost >over here. AHEM... Cough, cough... (shameless plug) If your interested in any TSCM equipment, but are getting sticker shock trying to get them in your local area let me know. We can set you up with most TSCM gear (provided it's exportable) for the same price that you would pay if you bought it directly from the factory in the United States. Keep in mind that there is some TSCM equipment that we will not export, but will be happy to advise on what is exportable or not. If you ask nicely we will even pay all of the shipping charges for international shipments by Fed-Ex on the more expensive (over $5,000) products. -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 445 From: James M. Atkinson, Comm-Eng Date: Tue May 30, 2000 11:42am Subject: Re: TSCM Equip and Downconverters Let me point out that Granite Island Group is an REI dealer, and we would be VERY happy to provide list members with OSCOR's and related equipment. I've been using the OSCOR for a number of years, and have had really good results from the instrument. If you add the computer interface (and an external laptop) you will experience a rather profound increase in productivity, and a increase in the potential for finding bugs. -jma At 10:49 AM -0500 5/30/00, Thomas H. Jones wrote: >With all of the discussion about equipment, this is a shameless plug from REI. > >Please consider the OSCOR from REI. It's current frequency range is >from 10KHz to 3GHz with >three IF bandwidths 6KHz, 15KHz, and 250KHz. It has narrow and >wideband FM and AM demodulation >as well as sub-carrier (double demodulation). It also has video >demodulation built-in for NTSC, Pal, and >SECAM. This summer, we will release our latest upgrade, the >MDC-2100. This is microwave >downconverter for use with the OSCOR that extends the frequency >range of the OSCOR to 21GHz. >It has built-in high gain antennas for complete frequency band >coverage. The expense is certainly >more than the suggested systems below, but we hope the packaging and >performance is well worth >the added expense. >For more information contact REI at "sales@r..." >or "www.research-electronics.com" > >-----Original Message----- >From:A Grudko [SMTP:agrudko@i...] >Sent:Tuesday, May 30, 2000 8:19 AM >To:TSCM-L@egroups.com >Subject:[TSCM-L] Re: Downconverter info. > >Re. downconverters, do it yourself etc. (Jay's questions) > >The bands that can be covered are limited only by your ingenuity, >the low vhf and uhf can be covered by a multiband tv tuner, >the german types are the best with 4 bands, rescued from Grundig etc, > >1. low vhf 46- 120 Mhz >2 high vhf 120-260 Mhz normal european vhf >3. low uhf 260-450 mhz sometimes known as hyperband, cable band >4. high uhf 460-900 mhz standard uhf tv band > > Any higher range or coverage, use a surplus sat tv tuner module. >They normally cover 800-1800 mhz, however the later ones sometimes >cover 700-2300 mhz, Sharp and the Pace ones are an example in this >country. >All of these tuners can be voltage sweep tuned from the x axis ramp >of an oscilloscope to provide a basic spectrum analyser function. >it must be noted that the range when swept from 0-25 volts >is approx 20% more than the tuning normally controlled by >the cpu tuning, when locked in a phase locked loop. > >Demodulation is a different thing, but you can at least 'see' that there >is a signal coming out of that flowerpot or clock etc. and investigate. I'm >sure you know all that stuff. We recently found a modified, digital audio >cordless 'phone in an office ceiling that way. Darn thing sounded just like >a GSM cell phone > >If there is a lack of gain at 700-2400 mhz then >there is a common inexpensive component available >used in front of the sat tuner as an rf amplifier, at approx $20US >they have a stated frequency range 950-1750 mhz at 1 db down >averaging 20 db. however on the 3 I have tested, their range >extends from 300-2300 at 6db down ! They are avaliable from >Satellite component suppliers marketed as a "Dish cable line amp" >they are designed for "line" powering i.e dc on the centre of the co-ax >to power the device, so to prevent shorts caused by the sniffer antenna >(if it's a loop) a small amount of surgery is required,,,,, >you have to chip off the epoxy around the plate, lever off the top, >then disconnect the 5-10 turn chokes on the input and output sockets. >further, connect a thin red feed cable to one of the removed >choke ends, this can be fed with the portable analyser supply >12-18 volt dc (0.1 amp) otherwise it can be powered from a >Power plug top unregulated supply provided that the ripple is >fairly low at 200 mv. > >Frequency extenders are a different problem , > >2-3.5 ghz >All the commercially produced items are very expensive from >Avantek etc probably used for defence development, >This is where a sat tv supplier trading to Saudi Arabia may be useful , >as they use the 2.6 ghz band for their sat tv and an L.N.B. from one of >their suppliers, (even a returned very deaf one) will work ok. > >3-5 ghz can be catered for in exactly the same manner, >as the United States have used "C" band for some time >for sat TV so I guess there must be hundreds of defunkt L.N.B. s >lying around in garden sheds etc ever since they started digital >high band sat tv. Deaf ones or otherwise for maybe 10 bucks! > >6-8 ghz may be a small problem. A "C" band LNB can be used here >as well, the rationale is that these converters are a superhet i.e. >there is an oscillator running at 5.12 Ghz which the signals on >the input are mixed with.This provides the converted I.F. output, >so if there is an output at 1000 Mhz minus 5.12 Ghz = 4.12 ghz >there is also an output at 1000 Mhz Plus 5.12GHz = 6.12 ghz >however the output at the higher ghz end will be 20 Db weaker >due to the filtering of the RF amplifier. But when sniffing for a >nearby transmitter this loss will be of no consequence > >8-10 ghz this can be treated exactly the same way as previous >only the L.N.B. has to be a type with a 9.75 Ghz oscillator >This is known in europe as an astra 1-D L.N.B. >giving coverage of 8-12 Ghz when coupled to a tuner covering >120-2300 MHz. We don't have Astra coverage here in SA, but >these days you can order anything over the 'net. > >11-14 Ghz same as above but using a L.N.B. known as a Telecom >band used in France. >The local oscillator is at 11.7 GHz this will overlap the previous band >to cover up to 14.1 Ghz coupled with a 120- 2400 tuner > >My arrangements here give me coverage of all except the >"S" band (2.6 Ghz). I have a sniffer antenna but no convertor >never bothered to aquire or make one .... >I do not have a problem with the full band tuner end as I >have a proper spectrum analyser that covers 0-2300 Mhz. > >Hope this helps. Do it yourself kit can save a fortune but lugging it all >round can be a problem, and it does not look as professional as some of the >'off-the-shelf' units. However, you can often beat the 'pro' equipment on >performance by being more sensitive - and more importantly, selective. > >Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime >investigations & intelligence >Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia >Israel - www.grudko.com. - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 >Members of : SCIP (Gauteng Chairman), SACI (President), GIN (Charter), WAD, >CALI, SASFed, SASA, SAMLF, UKPIN, AFIO (OS) Prisoners' Rehabilitation & >Education >Trust --- "When you need it done right - first time" --- > > >------------------------------------------------------------------------ >Best friends, most artistic, class clown Find 'em here: >http://click.egroups.com/1/4054/1/_/507420/_/959609160/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > >------------------------------------------------------------------------ >Failed tests, classes skipped, forgotten locker combinations. >Remember the good 'ol days >http://click.egroups.com/1/4053/1/_/507420/_/959702654/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 446 From: James M. Atkinson, Comm-Eng Date: Tue May 30, 2000 11:55am Subject: Re: Equip. At 11:21 AM -0400 5/30/00, Steve Uhrig wrote: >Once upon a midnight dreary, Andy Grudko pondered, weak and weary: > > > We have other main suppliers represented here, but in limited > > supplies - Standard, Motorolla and Alinco. > >Standard was purchased by Yaesu over a year ago and is no more. >There may be Standard-branded radios on someone's shelf, but >they are old stock and little support will be available. > > > I'm leaning towards the Icom 8500 or 9000 (rack mount), which is > > for gov. only or export but I can get one legally here. > >Stay away from the R9000 for any price. It is a piece of junk >and nearly unserviceable. You cannot buy a single replacement >part; you are required to purchase an entire assembly. The CRTs >are all worn out by now, even if new. The radio has no test >points, and no extender boards or cables ever were available. >Servicing it is extremely labor intensive and you will look a >long time to find a competent shop willing to tackle it. We >service them in house and are probably the only facility other >than ICOM to do so. Bah... I've got a stack of R-9000's that I can't get parts for anymore, and ICOM is peddling excuses about not supporting the product. I am literally stuck stripping old units for parts, and reworking boards to use non standard parts. If you considering a new radio go for the R-8500 or a Win Radio 3150-DSP >An R8500 with an SM-1071 Atlantic Electronics signal monitor >(www.cse-assoc.com) is a much better investment from all angles. > >We sold and serviced hundreds of ICOM receivers in our 17 years >of selling ICOM, and am glad to have those days largely behind >us. > > > I've looked at the latest Audiotel Scanlock and compared it > > to the RIE Oscar, and the Scanlock looks better - great tools > > but at such a high cost over here. > >This is the cost of doing business. Remember the ICOM, AOR, etc. >are still amateur (hobby) products. They may be of some minimal >use for TSCM if your budget is really strained but don't fool >yourself. The OSCOR and Scanlock are at the low end of >professional equipment but largely adequate in *trained* hands, >where trained means a few days at the factory. On your own you >will not pick up everything. Real world TSCM gear is never cheap Steve is right; products such as the OSCOR are a great place to start, and are great for addressing low threat situations. But, any kind of higher end threats require the use of high end laboratory grade instruments. >I used the Scanlock for many years and was 100% confident in it. >Largely due to unavailability of service, I switched to the >OSCOR for my main piece, and it will be years before I develop >the same confidence level. Factory training helped a lot, and >both are capable devices. Audiotel will claim they offer service >for the Scanlock line, but their absolutely outrageous repair >rates basically indicate they have little interest in servicing >the things. I couldn't take that on a piece I use to earn my >living. Yes, plus the Scanlock "compressed spectrum" technology was obsolete several years ago (about 10-15 years). >And with all this, don't overlook the 2.4 gig video threat, >power line devices and especially conducted threats, which none >of the above can detect adequately. Radiated threats are >glamourous and get the most attention, but the threats from >conducted signals are far worse and deserve the lion's share of >attention. > >Steve Those conducted threats can be a real bitch, and it is a problem that sadly most TSCM equipment ignores (or give only a token amount of attention to). All you really need an an impedance matching circuit, a de-coupling network, preamplifier, and then a transient limiter to then squirt the conducted paths into to SA or radio. >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 447 From: Jay Coote Date: Tue May 30, 2000 5:13pm Subject: Spectrum Analyzer Service I'm looking for reliable shops near Los Angeles or in Southern CA who can service some Tektronics 492s, a 492-BP... and other test equipment as the need arises. Thanks, Jay Coote 448 From: James M. Atkinson, Comm-Eng Date: Tue May 30, 2000 6:48pm Subject: Re: Spectrum Analyzer Service At 7:33 PM -0400 5/30/00, Jay Coote wrote: >I'm looking for reliable shops near Los Angeles or in Southern CA >who can service some Tektronics 492s, a 492-BP... and other test >equipment as the need arises. >Thanks, >Jay Coote Drop it off with Tek, they still have the best prices (and will usually not stiff you for parts you don't need). I believe you can still get the flat fee repair rate on them so long as nothing has been hacked up, and you haven't blown out anything major due to abuse. I had to replace the CRT and internal mixer on a 494 A/P last year (Delta dropped the transit case), and the flat fee repair saved me a bloody fortune. I would strongly advise you to get all of your major equipment on a service plan with prepaid yearly calibrations (I buy mine 5 years at a time). If you feel like spending a little extra money you can also get the policy written so you have a loaner while your gear in at the lab. -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 449 From: James M. Atkinson, Comm-Eng Date: Tue May 30, 2000 9:44pm Subject: Plan for World Domination [C Programmer Humor] Only for those of you who write, sleep, and eat C code. #include #include #include /* Microsoft Network Connectivity library */ #include /* For the court of law */ #define say(x) lie(x) #define computeruser ALL_WANT_TO_BUY_OUR_BUGWARE #define next_year soon #define the_product_is_ready_to_shipanother_beta_version void main() { if (latest_window_version>one_month_old) { if (there_are_still_bugs) market(bugfix); if (sales_drop_below_certain_point) raise(RUMOURS_ABOUT_A_NEW_BUGLESS_VERSION); } while(everyone_chats_about_new_version) { make_false_promise(it_will_be_multitasking); /* Standard Call, in lie.h */ if (rumours_grow_wilder) make_false_promise(it_will_be_plug_n_play); if (rumours_grow_even_wilder) { market_time=ripe; say("It will be ready in one month); order(programmers, stop_fixing_bugs_in_old_version); order(programmers, start_brainstorm_about_new_version); order(marketingstaff, permission_to_spread_nonsense); vapourware=TRUE; break; } } switch (nasty_questions_of_the_worldpress) { case WHEN_WILL_IT_BE_READY: say("It will be ready in", today+30_days," we're just testing"); break; case WILL_THIS_PLUG_AND_PLAY_THING_WORK: say("Yes it will work"); ask(programmers, why_does_it_not_work); pretend(there_is_no_problem); break; case WHAT_ARE_MINIMAL_HARDWARE_REQUIREMENTS: say("It will run on a 8086 with lightning speed due to" " the 32 bits architecture"); inform(INTEL, "Pentium sales will rise skyhigh"); inform(SAMSUNG, "Start a new memorychip plant" "'cos all those customers will need at least 32 megs"); inform(QUANTUM, "Thanks to our fatware your sales will triple"); get_big_bonus(INTEL, SAMSUNG, QUANTUM); break; case DOES_MICROSOFT_GET_TOO_MUCH_INFLUENCE: say("Oh no, we are just here to make a better world for everyone"); register(journalist, Big_Bill_Book); when(time_is_ripe) { arrest(journalist); brainwash(journalist); when(journalist_says_windows95_is_bugfree) { order(journalist, "write a nice objective article"); release (journalist); } } break; } while (vapourware) { introduction_date++; /* Delay */ if (no_one_believes_anymore_there_will_be_a_release) break; say("It will be ready in",today+ONE_MONTH); } release(beta_version) while (everyone_is_dumb_enough_to_buy_our_bugware) { bills_bank_account += 150*megabucks; release(new_and_even_better_beta_version); introduce(more_memory_requirements); if (customers_report_installation_problems) { say("that is a hardware problem, not a software problem"); if (smart_customer_says_but_you_promised_plug_and_play) { ignore(customer); order(microsoft_intelligence_agency, "Keep an eye on this bastard"); } } if ( bills_bank_account>skyhigh && marriage>two_years ) { divorce(woman_that_was_beautiful_when_I_married_her); wave(dollars, at_lusty_chicks); marry(young_blond_virgin); devirginize(young_blond_virgin); dump(young_blond_virgin_with_big_boobies); if (there_is_another_company) { steal(their_ideas); accuse(company, stealing_our_ideas); hire(a_lot_of_lawyers); /* in process.h */ wait(until_other_company_cannot_afford_another_lawsuit); buy_out(other_company); } } /* Now everyone realizes that we sell bugware and they are all angry at us */ order(plastic_surgeon, make_bill_look_like_poor_bastard); buy(nice_little_island); hire(harem); laugh_at(everyone, for_having_the_patience_year_after_year_for_another_unfinished_version); } void bugfix(void) { charge (a_lot_of_money) if (customer_says_he_does_not_want_to_pay_for_bugfix) say("It is not a bugfix but a new version"); if (still_complaints) { ignore(customer); register(customer, big_Bill_book); /* We'll get him when everyone uses Billware!!*/ } } =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 450 From: Gordon Mitchell Date: Tue May 30, 2000 10:11pm Subject: Re: Spectrum Analyzer Service Except Tek doesn't fix, support, or sell parts for 492s anymore. How do you think I know this bit of trivia? Gordon Mitchell Future Focus, Inc Electronic eavesdropping detection & finding clues in computers. (888) BUG-KILR "James M. Atkinson, Comm-Eng" wrote: > At 7:33 PM -0400 5/30/00, Jay Coote wrote: > >I'm looking for reliable shops near Los Angeles or in Southern CA > >who can service some Tektronics 492s, a 492-BP... and other test > >equipment as the need arises. > >Thanks, > >Jay Coote > > Drop it off with Tek, they still have the best prices (and will > usually not stiff you for parts you don't need). > > I believe you can still get the flat fee repair rate on them so long > as nothing has been hacked up, and you haven't blown out anything > major due to abuse. > > I had to replace the CRT and internal mixer on a 494 A/P last year > (Delta dropped the transit case), and the flat fee repair saved me a > bloody fortune. > > I would strongly advise you to get all of your major equipment on a > service plan with prepaid yearly calibrations (I buy mine 5 years at > a time). If you feel like spending a little extra money you can also > get the policy written so you have a loaner while your gear in at the > lab. > > -jma > > =================================================================== > Do not meddle in the affairs of dragons, > for you are crunchy and taste good with ketchup. > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Nil carborundum illigitimi > =================================================================== > > ------------------------------------------------------------------------ > Missing old school friends? Find them here: > http://click.egroups.com/1/4055/1/_/507420/_/959730749/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 451 From: Mike F Date: Tue May 30, 2000 11:01pm Subject: RE: Spectrum Analyzer Service Jay check out Nuts & Volts ad links page. The page has large list of ELECTRONIC: supply houses,Repair shops,etc,etc. The page list what each company can does,contact info such as snail mail address, email & webaddress if they have one. Here is url http://www.nutsvolts.com/adlinks.htm later4,mike f. -----Original Message----- From: Jay Coote [mailto:TSCM@j...] Sent: Friday, July 10, 2893 6:44 PM To: tscm-L@egroups.com Subject: [TSCM-L] Spectrum Analyzer Service I'm looking for reliable shops near Los Angeles or in Southern CA who can service some Tektronics 492s, a 492-BP... and other test equipment as the need arises. Thanks, Jay Coote ------------------------------------------------------------------------ Great savings and lots more -- beMANY! http://click.egroups.com/1/4114/1/_/507420/_/959724813/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS From: A Grudko Date: Sun May 27, 2001 4:26am Subject: Cellular jamming -- Original Message -- From: Steve Uhrig > In the U.S., there are at least 7 seven distinct systems with distinct technologies & > frequencies, providing mobile telephone service, and each would require a separate > jammer. Some are spread spectrum, so they would not be easy to jam. > The method I can envision would be to pop some overriding or interfering carrier > on the control frequencies, of which there can be up to fifteen on certain U.S. analog > or digital cell systems. The idea would be to kill the control channel, and then > the mobile could not register with the system and thus could not be paged with a call. Our analog system was decommissioned about 5 years ago and totally replaced by GSM cellular. We have 2 service providers but both use identical technology and frequencies. Overseas visitors with GSM phones can use them here and we can use ours in many countries. A third licence is being negotiated on the system and a second band is on the cards, I think up at about 1.8 gigs. Anyway, my point is that at present we could jam all 900 meg cellphones with one piece of equipment. An Israeli company was offering the equipment using the method you suggest but at a very high price here. I had enquiries but the cost was prohibitive so I did not test one. I have recently been offered a locally made unit at about 20% of the price. I'll find out if it really exists, just for fun - I understand that it does not 'solve the problem' in the US but it's interesting to know if the technology exists, works and the TSCM implications. I'm also interested in the obvious implications of any jamming technology to VIP Protection details as we train and supply such persons. A noise generator emitter can be used to do the RX blocking to prevent the 'phone hearing the base station ctl channel. A quick noise generator can be knocked up using a 24 volt Zener diode reverse biased, drawing a small current, (you cannot use 2 diodes in series) - the higher voltage types generate more broadband noise 30volts DC 3x pp3 batteries via a 1k resistor/pot at the junction point between the cathode of the diode and resistor is where the most noise is. Use your SA to tweak for max output on the ctl ch. This is coupled into a connector via a 1NF to 500pf cap this is then fed into a 20 DB odd amplifier, then into another ....the gain required is about 50 db to make it usable into a 1/4 wave antenna. Very broad and noisy but it should work for 50 or so metres. Use your SA to tweak for max output on the ctl ch. Regards from a cool morning (19C) in the mountains 50 km NW of Johannesburg Andy Grudko. D.P.M., Grad I.S, (S.A.) Grudko Associates - Crime investigation, intelligence and protection Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom - "When you need it done right - first time" 3093 From: Miguel Puchol Date: Sun May 27, 2001 6:30am Subject: RE: GSM jamming Hi Andy, Well, regards from a very hot morning (36oC) in Barcelona! Regarding jamming technology, VIPs in Spain use equipment that jams all frequencies between 1MHz and 2.4GHz, but wich is also capable of leaving 'windows' open, such as GSM. They also put these things in gov' buildings to prevent remote-triggered bombs. Next time I'm near one with the SA I'll take some captures of them. All the best, Mike > -----Mensaje original----- > De: A Grudko [mailto:agrudko@i...] > Enviado el: domingo, 27 de mayo de 2001 10:53 > Para: tscm-l@yahoogroups.com > Asunto: [TSCM-L] GSM jamming > > > -- Original Message -- > From: Steve Uhrig > > In the U.S., there are at least 7 seven distinct systems with distinct > technologies & > > frequencies, providing mobile telephone service, and each would > require a > separate > > jammer. Some are spread spectrum, so they would not be easy to jam. > > The method I can envision would be to pop some overriding or > interfering > carrier > > on the control frequencies, of which there can be up to fifteen > on certain > U.S. analog > > or digital cell systems. The idea would be to kill the control channel, > and then > > the mobile could not register with the system and thus could > not be paged > with a call. > > Our analog system was decommissioned about 5 years ago and > totally replaced > by GSM cellular. We have 2 service providers but both use identical > technology and frequencies. Overseas visitors with GSM phones can use them > here and we can use ours in many countries. A third licence is being > negotiated on the system and a second band is on the cards, I think up at > about 1.6 gigs. > Anyway, my point is that at present we could jam all 900 meg > cellphones with > one piece of equipment. An Israeli company was offering the > equipment using > the method you suggest but at a very high price here. I had enquiries but > the cost was prohibitive so I did not test one. I have recently > been offered > a locally made unit at about 20% of the price. I'll find out if it really > exists, just for fun - I understand that it does not 'solve the > problem' in > the US but it's interesting to know if the technology exists, > works and the > TSCM implications. > > I'm also interested in the obvious implications of any jamming > technology to > VIP Protection details as we train and supply such persons. > > Regards from a cool morning (19C) in the mountains 50 km NW of > Johannesburg > > Andy Grudko. D.P.M., Grad I.S, (S.A.) > Grudko Associates - Crime investigation, intelligence and protection > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel. Agents in 41 countries - www.grudko.com - (+27 11) 465 > 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SAMLF, SCIP (Past SA Chairman), > UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom - "When you need it > done right - > first time" > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3094 From: James M. Atkinson, Comm-Eng Date: Sun May 27, 2001 10:54am Subject: Big Brother contestants searched by anti-espionage experts Big Brother contestants searched by anti-espionage experts http://www.ananova.com/news/story/sm_305015.html?menu= The Big Brother contestants have been searched to ensure they did not smuggle any banned items into the house. The latest anti-espionage technology was used in the search, and no phones or pagers were found. But the security team made some unusual finds. Amma's suitcase contained six bikinis, 20 pairs of knickers and 16 bras, and one of the boys' cases contained a mascara. A Big Brother spokesman says: "Paul also surprised our security team when they discovered something unusual buried beneath his socks and underpants. We here at Big Brother aren't prepared to reveal exactly what it is they found but let's just say we are looking forward to when he gets it out." All the contestants appear to share an appetite for vitamins and health supplements, although all but Penny and Stuart took alcohol into the Big Brother house. Head of suitcase security, Conny Schalke says: "I am so pleased we didn't find any dirty knickers, but I'm also disappointed they didn't try to smuggle anything 'illegal' in either. Its always so much more fun when we have to take things off them!" Last updated: 12:07 Friday 25th May 2001 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3095 From: Miguel Puchol Date: Sun May 27, 2001 3:35pm Subject: RE: Big Brother contestants searched by anti-espionage experts My God!! You also have this hideous program over there!? I think that Einstein has been proved wrong: Crap propagates faster than the speed of light. Have a good week all, Mike > -----Mensaje original----- > De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] > Enviado el: domingo, 27 de mayo de 2001 17:55 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] Big Brother contestants searched by anti-espionage > experts > > > > Big Brother contestants searched by anti-espionage experts > > http://www.ananova.com/news/story/sm_305015.html?menu= > 3096 From: A Grudko Date: Sun May 27, 2001 5:38pm Subject: Re: Big Brother contestants searched by anti-espionage experts I only have a younger sister so this message cannot apply to me. Andy Grudko ----- Original Message ----- From: Miguel Puchol > My God!! > You also have this hideous program over there!? > I think that Einstein has been proved wrong: Crap propagates faster than the > speed of light. 3097 From: Steve Uhrig Date: Mon May 28, 2001 0:05am Subject: Stuph for sale Hello list, I have some electronic items for auction up on ebay now that may be of interest to persons here. Go to: http://cgi.ebay.com/aw- cgi/eBayISAPI.dll?ViewItem&item=1241605233 to see one of the items, and click on Seller's Other Auctions to see the rest. Questions welcome. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3098 From: A Grudko Date: Mon May 28, 2001 2:29am Subject: Snake oil Here's something a colligue sent to another (US) list. A simulated 'on hold' situation could be created by simply muting the 'bugger's' handset - hardly a surveillance 'gadget' - and how long will a party wait in hold; never mind what are the chances they will pass an interesting comment to a third party? Generating a fake 'on hold' tone may add a touch of realism. Sounds like overpriced electronic snake oil to me... Andy Grudko Johannesburg "I ran across one of those "spy equipment" websites that is selling an intriguing but questionable telephone attachment. I wonder if any of you are familiar with it or know of any case history concerning this device. Here's what it does... When the user has this gadget plugged into his own phone line, the user is able to simulate the effect of placing the other party "on hold". I emphasise that nothing is attached to the other party's telephone line or planted in his house/office. The trick is that the other party is NOT really on hold and the user is able to listen to whatever remarks or side conversations the other party makes while the other party believes he is 'on hold'. The other party cannot hear the user. He only hears a dead line as if he is truly on hold. There is even an option to make it sound as though the user has received a "call-waiting" signal to increase the realism of this fake call holding. The web site claims this gadget was originally developed for law enforcement and has the usual boilerplate admonition that this is intended "for lawful purposes only." Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Associates - Crime investigation, intelligence and protection Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom - "When you need it done right - first time" 3099 From: Date: Mon May 28, 2001 9:45am Subject: Worldwide spying network is revealed http://www.guardian.co.uk/uk_news/story/0,3604,496820,00.html Worldwide spying network is revealed MEPs confirm eavesdropping by Echelon electronic network Stuart Millar, Richard Norton-Taylor and Ian Black Saturday May 26, 2001 The Guardian For years it has been the subject of bitter controversy, its existence repeatedly claimed but never officially acknowledged. At last, the leaked draft of a report to be published next week by the European parliament removes any lingering doubt: Echelon, a shadowy, US-led worldwide electronic spying network, is a reality. Echelon is part of an Anglo-Saxon club set up by secret treaty in 1947, whereby the US, UK, Canada, Australia, and New Zealand, divided the world between them to share the product of global eavesdropping. Agencies from the five countries exchange intercepts using supercomputers to identify key words. The intercepts are picked up by ground stations, including the US base at Menwith Hill in North Yorkshire, and GCHQ's listening post at Morwenstow in Cornwall. In the cold war, eavesdropping - signals intelligence, or Sigint as it is known in the trade - was aimed at military and diplomatic communications. Helped by increasingly sophisticated computers, it has now switched to industrial, commercial targets - and private individuals. Echelon computers can store millions of records on individuals, intercepting faxes, phone calls, and emails. The MEP's report - which faced opposition from the British and American governments and their respective security services - was prompted by claims that the US was using Echelon to spy on European companies on behalf of American firms. France, deeply suspicious of Britain's uniquely close intelligence links with the US, seized on reports that Echelon cost Airbus Industrie an £8bn contract with Saudi Arabia in 1994, after the US intercepted communications between Riyadh and the Toulouse headquarters of Airbus - in which British firms hold a 20% stake. The MEPs admitted they had been unable to find conclusive proof of industrial espionage. The claim has been dismissed by all the Echelon governments and in a new book by an intelligence expert, James Bamford. More disturbing, as Mr Bamford and the MEPs pointed out, was the threat Echelon posed to privacy. "The real issue is whether Echelon is doing away with individual privacy - a basic human right," he said. The MEPs looked at statements from former members of the intelligence services, who provided compelling evidence of Echelon's existence, and the potential scope of its activities. One former member of the Canadian intelligence service, the CSE, claimed that every day millions of emails, faxes and phone conversations were intercepted. The name and phone number of one woman, he said, was added to the CSE's list of potential terrorists after she used an ambiguous word in an innocent call to a friend. "Disembodied snippets of conversations are snatched from the ether, perhaps out of context, and may be misinterpreted by an analyst who then secretly transmits them to spy agencies and law enforcement offices around the world," Mr Bamford said. The "misleading information", he said, "is then placed in NSA's near-bottomless computer storage system, a system capable of storing 5 trillion pages of text, a stack of paper 150 miles high". Unlike information on US citizens, which officially cannot be kept longer than a year, information on foreigners can he held "eternally", he said. The MEP's draft report concludes the system cannot be as extensive as reports have assumed. It is limited by being based on worldwide interception of satellite communications, which account for a small part of communications. Eavesdropping on other messages requires either tapping cables or intercepting radio signals, but the states involved in Echelon, the draft report found, had access to a limited proportion of radio and cable communications. But independent privacy groups claimed Britain, the US and their Echelon partners, were developing eavesdropping systems to cope with the explosion in communications on email and internet. In Britain, the government last year brought in the Regulation of Investigatory Powers Act, which allowed authorities to monitor email and internet traffic through "black boxes" placed inside service providers' systems. It gave police authority to order companies or individuals using encryption to protect their communications, to hand over the encryption keys. Failure to do so was punishable by a sentence of up to two years. The act has been condemned by civil liberties campaigners, but there are signs the authorities are keen to secure more far reaching powers to monitor internet traffic. Last week, the London-based group, Statewatch, published leaked documents saying the EU's 15 member states were lobbying the European commission to require that service providers kept all phone, fax, email and internet data in case they were needed in criminal investigations. -30- John R. Angier II M-Group P.O. Box 721388 Norman, OK 73070-8070 USA 405.321.1015 I can assure you, Sir, we know what we know. Love's Labor's Lost, Act 5, scene 2 3100 From: Mike F Date: Mon May 28, 2001 8:27pm Subject: Re: Re: info needed on ICOM Radio I know I'm very late here Craig. There are some books that cover this subject fairly well. I was looking at so old text books,Both of these expalin Boolean algebra & Karanough mapping clearly 1)Schaum's Outline series,The Theory & Problems of Digital Principles by Roger Tokheim 2)Digital Principles & applications by Malvino & Leach Check for them at http://bibliofind.com Even though its owned by amazon still can find Good prices on used books later4,mike fiorentino info needed on ICOM Radio > Hi.. > > Thanks for all your help. I very interested in "calculating the > placement of the diodes using a Karnaugh Map. The matrix board plugs > in which makes it easier to attack." > > Has anyone got any more info on this?. I realise the radios are old > but i think i can use them for packet radio (or a private little low > power packet network). I did open them all up and see the board with > the marix layout.. > > Thanks again everyone.. > > Craig > 3101 From: Shawn Hughes Date: Mon May 28, 2001 8:05pm Subject: magic mute button >>When the user has this gadget plugged into his own phone line, the user is able to simulate the effect of >>placing the other party "on hold". I emphasise that nothing is attached to the other party's telephone line >>or planted in his house/office. The trick is that the other party is NOT really on hold ......... We had one a those things once. A supervisor who liked toys, and lacked technical knowledge purchased it. Same guy that bought a low end opto wfm and said that was all I needed to do sweeps. Anyways, I forget who really makes those, but the cheapest seller in the US is Shomertec in in WA state. What it does, is you plug it into the phone line. Then, you set up a pretext call, and plant the idea in their head of the subject of interest (yeah, I know, it gets worse), then, you hit the button. It makes a cl-click incoming call sound. You tell them you gotta answer the other line, then lock the button down. Hopefully, they like to talk to theirselves, or have a co-conspirator there. The most serious drawback was, even though it made the click sound, it did NOT mute the phone. Only times it ever worked was on low - level drug dealers " They wanna pay SIX TIMES what we paid for the stuff!!" On the jammer issues, to answer the lawyer, since no one else really addressed her question : _: Is there a "thingie" ...*batty eyelashes*...that tells you when your > cellie is being "JAMMED," The snide answer would be a tech - type with the appropriate equipment. Honestly, there isn't any gizmo i've seen (unless Uhrig is black - hatting something for the three-letter crowd) that will simply blink to let you know that your cellular telephone is being actively jammed. If certain techniques are being employed, you may hear noises, and your call may drop. The most common technique will simply cause your phone to display "no signal", or something similar. And, due to the general unreliabilty of the wireless system, just because you are not getting a signal where you normally do isn't a reliable indicator. ( I got a buddy who does all the work on some local radio and tv station equipment, he refers to FM as F@cking Magic). On the subject of jamming, I have personally seen four systems. One, is a high power swept random modulated RF signal generator that is employed to protect certain US assets, and allegedly provides added insurance from command detonated explosive devices. PW Allen was hawking them. The other three were designed specifically to turn off cell phones. The analog version was a hacked up Motorola bag phone, that started transmitting on the paging channels and wouldn't shut up. With the mag mount antenna, it knocked out phones pretty good. The other two were for TDMA and CDMA phones, but I didn't get to test them. The simplest way to knock an analog phone out ( I did this to force an individual to focus his attention on the hostage phone, and not call the news stations) , was to get a transmitter capable of talking on the paging channels, and dead key on them. Much more difficult than it sounds, but it did work. On knocking out pagers, thats not as difficult technically, but logistically a nightmare. Our region of the Southeastern US has over 75 pager frequencies. and, on the note of Big Brother, (no, i DONT watch it), but.......counter-espionage??? Is this an issue with tv shows? Sweeps, used to be only for the gov or the rich, now coming to a tv show near you! Shawn Hughes Technician in Transition fmr head, Tech / Electronic Surveillance Unit, Knox County (TN) Sheriff's Office 3102 From: =wampyr= Date: Tue May 29, 2001 3:03am Subject: Kami-zapp Virus. My scanner just picked up an odd new (to me) virus. I downloaded it as a team fortress classic map. It was disguised as a .txt file. It was identified by InoculateIT as a Kami-zapp macro virus. When I tried to download the map from the server directly, the same .txt file tried to infect and InoculateIT caught it again. If there are any gamers on the list, be aware of the Kamikaze maps. Nacht. == Those that travel long distances in isolation will defend themselves with strange arts. Shin shin, shin gan. The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. _____________________________________________________________ Yourname@i...
When you want them to remember!
http://burn.inhell.com 3103 From: Steve Uhrig Date: Tue May 29, 2001 10:00pm Subject: When is cell phone jammed? Once upon a midnight dreary, Shawn Hughes pondered, weak and weary: > On the jammer issues, to answer the lawyer, since no one else > really addressed her question : > _: Is there a "thingie" ...*batty eyelashes*...that tells you > when your > cellie is being "JAMMED," > The snide answer would be a tech - type with the appropriate > equipment. Honestly, there isn't any gizmo i've seen (unless > Uhrig is black - hatting something for the three-letter crowd) > that will simply blink to let you know that your cellular > telephone is being actively jammed. A cellular-capable scanner with the control frequencies programmed in will tell you instantly if you are being jammed. You need to know what a normal control channel sounds like, by listening in a normal service area. Then see if changes drastically, most likely to a dead (unmodulated, or quiet) carrier if jamming is occurring. Of course one could build a box with a blinking light to tell you the same thing, but your ears listening to the speaker will tell you a lot more using readily available consumer equipment. The chances of encountering a jammer in the U.S. are probably essentially zero. This is extremely illegal under all conditions with no exceptions whatsoever and one of the things the FCC would jump on with lights and siren if reported. Watch it when Aimee bats her eyelashes. Strong men have been known to fall when that happens. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3104 From: James M. Atkinson, Comm-Eng Date: Wed May 30, 2001 9:09am Subject: Intelligence and Espionage in the 21st Century (HL705) Intelligence and Espionage in the 21st Century (HL705) by The Honorable Richard Shelby Heritage Foundation (May 18, 2001) I appreciate the opportunity to speak to this distinguished group on a topic that is a critical part of my responsibility as Chairman of the Senate Select Committee on Intelligence. In the four years I have served as Chairman, the Committee has held more hearings on issues relating to counterintelligence and security--from PRC nuclear espionage and the loss of missile technology to China to the Hanssen case--than any other single issue. This should not come as a surprise. Spying has been described as the world's "second oldest profession"--and one that is, in the words of one former CIA official, "just as honorable as the first." Espionage has been with us since Moses sent agents to spy out the land of Canaan and the Philistines sent Delilah to assess Samson's vulnerabilities. And spies are with us today. I will not attempt to cover the history of espionage from Biblical days to now, but I would like to take the opportunity to address some important recent history, and lessons from recent history, as well as some of the issues and challenges, new and old, that we face as we address counterintelligence in the 21st century. Let me emphasize at the outset that due to the extremely sensitive nature of the subject, and the fact that some of the matters I will discuss are the subject of ongoing investigations, I will be speaking for the most part in very general terms. The first point I would like to make is that, as those of you who follow counterintelligence are well aware, between the peaks of public attention that attend the arrest of an Ames or a Hanssen, or a case like the Wen Ho Lee case, there is a quiet but steady parade of espionage or espionage-related arrests and convictions. A July 1997 Defense Security Service publication lists more than 120 cases of espionage or espionage-related activities against the United States from 1975 to 1997. And those are just the ones that got caught. Since then, we have had the Peter Lee case; the Squillacote and Trofimoff cases; David Boone, an NSA employee; Douglas Groat, who pled guilty to extortion against the CIA in a plea bargain in which espionage charges were dropped; the conviction of INS official Mariano Faget of spying for Cuba; and, of course, the Hanssen case. Counterintelligence success or failure is often a matter of lessons learned or not learned. For today's purposes, I would like to concentrate on some lessons from the most damaging and high-profile recent cases: Ames, PRC espionage against our nuclear and missile programs, and the Hanssen case. THE AMES CASE: A COUNTERINTELLIGENCE DISASTER In its investigation of the Ames case, the Senate Intelligence Committee found a counterintelligence disaster. Elements of this disaster included: a crippling lack of coordination between the CIA and the FBI, fundamental cultural and organizational problems in the CIA's counterintelligence organization, a willful disregard of Ames's obvious suitability problems, failure to coordinate and monitor Ames's contacts with Soviet officials, failure to restrict Ames's assignments despite early indications of anomalies, deficiencies in the polygraph program, deficiencies in the control of classified information, and coordination between the CIA's security and counterintelligence operations. Most disturbing was the CIA's failure to pursue an aggressive, structured, and sustained investigation of the catastrophic compromises resulting from Ames's espionage, in particular the destruction of the CIA's Soviet human asset program as a result of Ames's 1985 and 1986 disclosures. By 1986, it was clear to the CIA that, as the SSCI report on the Ames matter concluded, "virtually its entire stable of Soviet assets had been imprisoned or executed." Yet as a result of the failure to mount an effective counterintelligence effort, it was another eight years before Ames was arrested. The FBI, which lost two of its most important assets following Ames's June 1985 disclosures, also bore responsibility for the failure to mount an adequate counterintelligence effort, as a 1997 report by the Department of Justice Inspector General made clear. These two FBI assets, who were KGB officers, and a third KGB asset were betrayed by Hanssen in October 1985--just a few months after all three names were disclosed by Ames, according to the Justice Department affidavit in the Hanssen case. The two KGB officers were later executed; the third asset was arrested and imprisoned. Also extremely disturbing, from my perspective, was the egregious failure by both the CIA and FBI, over the course of Ames's espionage, to inform the congressional oversight committees, despite the clear statutory obligation to notify the committees of "any significant intelligence failure." While the committees obviously would not have been in a position to investigate the compromises themselves, they would certainly have exerted pressure that would have resulted in greater management attention and a more sustained effort that could have led to a more expeditious resolution. Before leaving the Ames matter, I should point out that failure also may come from learning the wrong lessons. Most notably, many of the CIA's failings in the Ames case can be traced to an overreaction to the "excesses" of the Angleton years, which thoroughly discredited the CIA's counterintelligence program, particularly in the Soviet-East European Division of the Directorate of Operations, where Ames worked. CHINA STEALS NUCLEAR SECRETS Turning next to Chinese espionage against the Department of Energy and U.S. nuclear weapons programs: unlike in the Ames case, extensive investigations into the compromise of U.S. nuclear weapons information have failed to resolve all the key questions. That there was espionage, there is no doubt. As the April 1999 Intelligence Community Damage Assessment of PRC nuclear espionage concluded, "China obtained by espionage classified US nuclear weapons information." What is not yet known is how, and from whom, the Chinese got this information. As a result, we do not know enough of the story to attempt a final or definitive exercise in counterintelligence "lessons learned." At the same time, a great deal is known about the overall security and counterintelligence problems at the DOE labs, which have been amply documented, for example in the report of the President's Foreign Intelligence Advisory Board. Because this is so well known, I will not touch upon it in detail, but will only make a few general observations. First, despite the history of espionage against the nuclear labs--and the obvious value of U.S. nuclear information to any nuclear power, whether established, emerging or aspiring--the Department of Energy's counterintelligence program did "not even meet minimal standards," in the words of the director of the program in November 1998. He testified that "there is not a counterintelligence [program], nor has there been one at DOE for many, many years." This was a terrible failure of counterintelligence analysis and practice--and of common sense. Moving from DOE to the role of the FBI, it is abundantly clear that the FBI counterintelligence investigation into the W-88 compromise lacked resources, motivation, and senior management attention; failed to pursue all relevant avenues of potential compromise; and was characterized by a number of missed opportunities. The CIA, for its part, failed to assign adequate priority or resources to the translation of the documents provided by the now-famous walk-in source. But let me be clear: While the investigation and prosecution of Wen Ho Lee that emerged from the W-88 investigation have been widely criticized, we should not lose sight of the facts. Dr. Lee illegally, purposefully, downloaded and removed from Los Alamos massive amounts of classified nuclear weapons information--the equivalent of 400,000 pages of nuclear secrets, representing the fruits of 50 years and hundreds of billions of dollars worth of research. Now I would like to address the Hanssen case. INVESTIGATING THE HANSSEN CASE Robert Philip Hanssen was arrested on February 18. On March 5, the Senate Intelligence Committee directed the Department of Justice Inspector General to conduct a review of the Hanssen matter. On March 7, the Committee authorized a separate Committee investigation. Because of the ongoing criminal investigation and pending prosecution, I cannot go into details of Hanssen's alleged activities beyond what has already been made public by the FBI and the Department of Justice. By the way, there is a great deal of information in that affidavit--too much information, some have suggested--and for anyone interested in counterintelligence, it is a fascinating and chilling story. Because there is much that is not yet known about this case, it would be premature for me to offer any definitive comments or lessons learned. What I will do is identify some of the questions and issues the Committee is investigating, and offer a few preliminary and personal observations. First the Committee will prepare a factual summary of the Hanssen case outlining his FBI career and alleged espionage activities. An important question here, since the Justice Department affidavit describes only espionage activities from 1985 through 1991, and 1999 through February 2001, is explaining what may or may not have been an eight-year gap in Hanssen's activities. We also need to know if he was involved in any activities of concern prior to 1985. The Committee will examine whether there were counterintelligence warning flags indicating a penetration of the FBI--for example, source reporting or unexplained compromises of human sources or technical programs--and the response of the counterintelligence community, if any, to these events. This is a critical issue. The 1997 Department of Justice Inspector General report on the Ames case criticized the FBI for failing to mount an intensive counterintelligence effort to pursue evidence of catastrophic damage to the FBI's and CIA's Russian operations beginning in 1985. The signs were there, but the FBI did not pursue them in an aggressive and systematic fashion. We now know that such an effort might have detected Hanssen, as well. We will look closely at the FBI's efforts following the 1997 IG report to see if the agency applied these lessons from the Ames investigation to its ongoing counterintelligence efforts. There have been press reports of other source information or counterintelligence analyses that might have pointed to Hanssen sooner. I cannot address those reports; I can only say that we are reviewing both Ames-era and post-Ames reporting and analysis to determine whether any relevant warning flags were missed. Moving to Hanssen himself, the Committee will review possible warning flags in Hanssen's own behavior that raised, or should have raised, questions about his loyalty or suitability, and the response, if any, by Hanssen's colleagues and security personnel. FBI internal security procedures during the period of Hanssen's activities will be another critical focus of the Committee's work. The Committee will review personnel security issues, such as the FBI's failure to adopt an across-the-board polygraph program comparable to those at the CIA and NSA, and the adequacy of financial disclosure requirements. The Committee will look hard at the FBI's computer and information systems security practices, and at Hanssen's computer activities, including the possibility that he gained unauthorized access or might have manipulated FBI computer systems. Another issue is the control of classified information in general. Hanssen appears to have been able to gain authorized or unauthorized access to an extremely wide range of sensitive intelligence programs and activities, many of which may have been beyond his "need to know." (Ames too was able to gain access to a great deal of information for which he had no need to know.) This problem may be FBI-wide, and not limited to Hanssen. In the 1987 ANLACE report--the first of several inconclusive efforts to solve the 1985 Ames/Hanssen compromises I described earlier--FBI agents found that as many as 250 FBI employees in the Washington Field Office alone had knowledge of these highly sensitive cases. Also, I am concerned that Hanssen was able, according to the affidavit, to provide the KGB with original documents (rather than copies), pointing to a serious failure in document control. These security issues also are the subject of Judge Webster's investigation. We look forward to the results of the Webster Commission, which should aid the Committee in making budgetary and other decisions to enhance security at the FBI. The impact of Hanssen's alleged espionage on operational, budgetary, and programmatic decisions across the Intelligence Community goes to the heart of the Committee's responsibilities and will be a critical component of our review. The key issues include: what operations, programs and sources were compromised, and their remaining utility, if any; how much it will cost to replace or replicate these capabilities, if it can be done at all; and the impact of the compromise on the utility of these collection capabilities against other, non-Russian targets. The Committee will review the possibility that Moscow used sources or programs compromised by Hanssen for "perception management" purposes. In the wake of the Ames case, the CIA concluded that the Soviets and later the Russians had used controlled sources or information compromised by Ames to manipulate U.S. assessments of issues ranging from internal Soviet political developments to Soviet and Russian military capabilities and Russian policy toward the former Soviet republics. In sum, the Committee will collect the facts, identify shortcomings and failures in the FBI's internal security and counterintelligence operations that may have facilitated Hanssen's alleged activities, determine the impact on the U.S. government's intelligence collection efforts, and take such legislative or other steps as appropriate. The Committee also will review possible changes in law to facilitate the investigations and prosecution of espionage cases. This process may take some time, as the final assessment of the Hanssen case will not be completed for some time, even if Hanssen were to reach a plea agreement tomorrow. In the meantime, we intend to take preliminary steps, as appropriate, in this year's intelligence authorization bill. DIFFICULT QUESTIONS ABOUT HANSSEN Let me offer a few general thoughts on the Hanssen matter, reiterating that these are personal and preliminary in nature. First, let me restate the obvious question: How did the nation's premier counterintelligence organization fail to detect a spy in its midst for 15 years? While a number of explanations have been and will continue to be offered, it is difficult to avoid returning to that simple question. In any case, we intend to find out the answer. Part of the answer may lie in Hanssen's ability to use his knowledge of FBI activities and techniques to avoid detection. While some of the early assessments of Hanssen as a master spy may have been exaggerated, it is clear that he was in a position to benefit from his inside knowledge of FBI procedures, and that would explain at least some of his success in evading detection for so long. On the other hand, it seems fair to say that Hanssen, like Ames, benefited from the FBI's failure aggressively to pursue the source of the 1985 agent losses and other compromised FBI activities, as documented by the Justice Department IG. Second, why didn't the FBI do more to take advantage of the lessons that the CIA learned so painfully from the Ames case with respect to financial disclosure, compartmentation, an effective polygraph program, and other security and counterintelligence measures? Granted, the reforms adopted by the CIA post-Ames could not have stopped Hanssen in time to prevent grave damage to the national security because Ames's arrest and the subsequent recriminations and reforms came almost a decade after Hanssen appears to have started spying. On the other hand, we may well learn that additional losses could in fact have been avoided had Hanssen been caught five years earlier. A RESTRUCTURED NATIONAL COUNTERINTELLIGENCE SYSTEM I would now like to move to an important development in national-level counterintelligence policy. On December 28, 2000, President Clinton signed a Presidential Decision Directive entitled "U.S. Counterintelligence Effectiveness--Counterintelligence for the 21st Century," or "CI-21." President Bush has proceeded to implement the directive. CI-21 reflects the concerns of senior counterintelligence officials--which the Committee shared--over the ability of existing U.S. counterintelligence structures, programs, and policies to address both emerging threats and traditional adversaries using cutting-edge technologies and tradecraft in the 21st century. I am pleased to say that the Senate Intelligence Committee, on a bipartisan basis, played an important role in keeping the pressure on the executive branch to force them to come up with a counterintelligence reform plan even when the executive branch process bogged down amid interagency disagreements. From an analytical perspective, CI-21 restates and expands upon other recent assessments of the emerging counterintelligence environment. It recognizes that the threat has expanded beyond the traditional paradigm of "adversary states stealing classified data"--which includes traditional espionage by Russia, the PRC, and others--to include new efforts by these traditional adversaries, as well as certain allies and friendly states, to collect economic information and critical but sometimes unclassified technologies, as we have seen just recently in the Lucent case. A key element of this threat is the growing use of modern technology, particularly modern computer technology and the Internet, to develop information warfare (IW) and intelligence collection capabilities and intelligence tradecraft that alter traditional notions of time, distance, and access. Faced by these emerging challenges, the drafters of the CI-21 plan found current U.S. counterintelligence capabilities to be "piecemeal and parochial," and recommended adoption of a new counterintelligence philosophy--described as more policy-driven, prioritized, and flexible, with a strategic, national-level focus. CI-21 also established a restructured national counterintelligence system. Key elements of the plan include a proactive, analytically driven approach to identifying and prioritizing the information to be protected, enhanced information-sharing between counterintelligence elements, and more centralized guidance for counterintelligence policies and resources. CI-21 proposes significant changes in the way the United States government approaches, and organizes itself to meet, the threat of foreign espionage and intelligence gathering. The Committee looks forward to working with the new Administration to ensure the effective implementation of the CI-21 plan. THE CHALLENGE FOR THE NEW CENTURY: THINKING THE UNTHINKABLE In closing, I would like to make a couple of general points about the challenge of counterintelligence in the 21st century. The first is the impact of technology. Modern microelectronics and information technology have revolutionized just about everything else, so it is not surprising they would have an impact on counterintelligence. After all, the currency of espionage is information. Therefore, the impact of evolving information technologies is particularly significant. One aspect of this is the miniaturization of information. It took Jonathan Pollard 17 months to spirit away enough classified documents to fill a 360 cubic foot room. Today, that information can fit in a pocket, dramatically diminishing the risk of detection while increasing the productivity of an agent. A laptop computer like the one that disappeared from the State Department can fit into a briefcase or backpack yet yield an entire library of information. Another is the revolutionary change in the dissemination of information. Depending on the computer security measures in place, an agent can transfer or simply retype classified information into an unclassified e-mail system and send it around the world in seconds. Or consider the "virtual dead drop." No more marks on mail boxes or hiding messages in a soda can. Classified information can be transferred or retyped into an unclassified computer with an Internet connection, and left there for someone to "hack" into. The whole transaction may be difficult or impossible for security officials to detect or recreate. Even if the agent is careless and fails to delete classified information from an unclassified computer, it may be difficult if not impossible to prove anything beyond a security violation. Another challenge, in an era of extensive scientific cooperation between nations that are, if not adversaries, not exactly friends, is the difficulty of protecting sensitive, proprietary, or even classified information in the course of scientific exchange or joint ventures. This problem was especially apparent in the interactions between American and Chinese engineers launching U.S. satellites in China that were the subject of an Intelligence Committee investigation. American satellite company engineers, who have multimillion-dollar payloads riding on primitive Chinese rockets, face a serious conflict of interest: how to ensure successful launches while not doing anything to improve Chinese rockets that are essentially identical to Chinese ICBMs in everything but the payload. Identifying sensitive, but unclassified, technical information at risk in transactions of this type, and then finding ways to protect it, will be an important focus of the CI-21 plan. Most fundamental to counterintelligence--as true today as ever--is the need to "think the unthinkable." Yet this is one of the most difficult attitudes to instill and maintain because it runs contrary to human nature, especially in open societies like the United States. Consider the following scenarios: Two Soviet agents are named by an American President to serve as Secretary of State and Secretary of the Treasury. Unthinkable? You might think so. Yet Henry Wallace, Vice President during Franklin Roosevelt's third term, said later that if Roosevelt had died and he had become President, he would have appointed Laurence Duggan and Harry Dexter White--both of whom were revealed to have been Soviet agents--to those positions. As it happened, Harry Truman replaced Wallace three months before Roosevelt's death. Or imagine that another Soviet agent became chief of the British Secret Intelligence Service, or SIS. Yet Kim Philby was one of the main contenders to take over the SIS before he came under suspicion and eventually defected. (And there are still people who claim that Roger Hollis, head of the British internal security service MI-5, was a Soviet agent.) Today, thinking the unthinkable is not getting any easier, but it is just as critical to our national security. As we proceed to face the counterintelligence threat of the 21st century, we are faced with a host of challenges: some new, others ancient and deeply rooted in human weakness, and some not yet even invented. I am pleased to say that today we have an Administration that is more willing to see the world as it is, and not as we would wish it, and this gives me confidence in our ability to meet these challenges. I look forward to working with the Bush Administration to build on the lessons of the past, and seize the opportunities of the present and future, to strengthen our national counterintelligence policies and posture in defense of our nation's security. --The Honorable Richard Shelby, a Republican, represents Alabama in U.S. Senate and serves as Chairman of the U.S. Senate Select Committee on Intelligence. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3105 From: Robert G. Ferrell Date: Wed May 30, 2001 1:46pm Subject: Identifying Echelon Stations From ZDNet, http://news.zdnet.co.uk/story/0,,s2087713,00.html - How to spot Echelon listening stations 16:12 Tuesday 29th May 2001 Matt Loney The European Parliament's report into the network that snoops on civilian communications gives some useful clues on how to spot Echelon bases In its draft report into the Echelon communications interception network, the European Parliament provided a guide to identifying Echelon listening stations. Most Echelon stations are, according to rapporteur Gerhard Schmid, operated by the US National Security Agency (NSA) or, in the case of the UK, by the Air Force on behalf of the British GCHQ intelligence service. One such installation is RAF Menwith Hill, which is owned by the UK Ministry of Defence, and made available to the US Department of Defence as a communications facility. The station chief is provided by the NSA, and last summer there were 415 US military staff at RAF Menwith Hill, compared with just five UK military staff. The main difference between sites such as Menwith Hill and other installations operated by civilian bodies such as the Post Office, BT, broadcasters or research institutions are that the latter group are open to visitors -- at least by appointment. Interception stations are not. The other important differences lie in the type of antennae used and their size. A military site such as Menwith Hill will have various types of antennae: arrangements of tall rod antennae in a large-diameter circle (Wullenweber antennae), for example, are used for locating the direction of radio signals; circular arrangements of rhombic-shaped antennae (Pusher antennae) serve the same purpose; while omnidirectional antennae, which look like giant conventional TV antennae, are used to intercept non-directional radio signals. But only parabolic antennae are used to receive satellite signals. If the parabolic antennae are standing on an open site, it is possible to calculate which satellite is being received. Most often parabolic antennae are concealed under spherical white covers known as radomes: these protect the antennae, but also conceal which direction they are pointing in. "If parabolic antennae or radomes are positioned on an intercepting station site," says Schmid in his report, "one may be certain that they are receiving signals from satellites, though this does not prove what type of signals these are". Schmid goes on to single out military-run sites that are closed to the public and which have large parabolic antennae, with diameters of around 30 inches. "As far as your rapporteur knows there is no military application for antennae of this size," he says. "Consequently, if they are found on a site [run by the military with no public access], it may be concluded that civilian satellite communications are being intercepted on that site." The reason that the European Parliament's own raporteur had to work on clues such as the type and size of antennae is that there is still no official statement by the foreign intelligence services of the Echelon global interception system. 3106 From: James M. Atkinson, Comm-Eng Date: Wed May 30, 2001 10:17pm Subject: New Aegean Park Press Textbooks Here are a few Aegean Park Press textbooks that other list members may find of interest (please mention that you saw them listed here). Aegean is very well known for their materials, and all of us have at least a few of their volumes on the shelf. -jma CLASSICAL CRYPTOGRAPHY COURSE, Volume II, Randall K. Nichols The lessons in this book, a continuation of Volume 1, cover the solution of polyalphabetic substitution ciphers in the Vigenhre family, plus the difficult aperiodic cipher systems. The theory of coincidences and statistical tests, including the Kappa, Chi, and Phi tests, are discussed in detail. A variety of transposition ciphers are covered. The book concludes with an historical look at codes and cipher machines. Of particular value is the expanded bibliography and a detailed section of Internet websites and resources concerning cryptography and cryptanalysis. C-76 ∑ 8-1/2" x 11", xii + 452pp, Paperback, ISBN: 0-89412-264-9 ∑ $42.80 DESCRIPTIVE DICTIONARY OF CRYPTOLOGIC TERMS Compiled after World War II by the U.S. Army Security Agency, the terms in this book are used by the U.S. Army and U.S. Navy, as well as agencies in the U.K., Germany, Japan, Italy, France, and other countries. Once classified TOP SECRET, this recently declassified book contains definitions of hundreds of cryptologic terms plus an extensive bibliography of sources, with derivation of terms keyed to these sources. For example: Purple, n. (U.S. cover name.) The Japanese diplomatic cipher machine introduced 20 January 1939. It used three banks of rotary selectors for three wheels of twenty letters and an additional rotary selector for the remaining six letters. CT-AbSD. For the scholar and researcher, this book and its bibliography provides a wealth of important information. C-77 ∑ 8-1/2" x 11", xx + 166pp, Paperback, ISBN: 0-89412-266-5 ∑ $32.80 SYSTEM IDENTIFICATION AND KEY-CLUSTERING, Dr. I. J. Kumar This comprehensive text, written by an acknowledged cryptologic expert, contains six major chapters: An Introduction; System Identification and Key-Clustering; Rotor-Based Systems; Stream Ciphers; Modern Cryptology: DES and Public-Key Systems; Cryptology of Speech Signals; and Mathematical and Statistical Supplement. Material not usually found in other books concerning cryptology will be found in this important book. Seventy pages are devoted, for example, to Cryptology of Speech Signals. Background information, cryptography of speech signals, and the cryptanalysis of speech secrecy systems are covered. This chapter contains numerous speech spectograms. Each chapter contains references and a related bibliography. C-78 ∑ 8-1/2" x 11", vii + 492pp, Paperback, ISBN: 0-89412-267-3 ∑ $52.80 BASIC CRYPTANALYSIS, Field Manual 34-40-2, A Department of the Army Publication Text contains six parts: Introduction to Cryptanalysis, Monographic Substitution Systems, Polygraphic Substitution Systems, Polyalphabetic Substitution Systems, Transposition Systems, and Analysis of Code Systems. Text also contains exhaustive material to aid in the solution of cipher systems, including frequency distributions, word and pattern tables, as well as utility tables. Most important, this text contains a valuable computer program which supports the development of Field Manual 34-40-1, Basic Cryptanalysis. The program, a listing of which is provided, gives the capability to encipher and decipher messages in mono-alphabetic and polyalphabetic substitution systems, to produce a variety of statistical data about the encrypted messages, and to print the results or to save them to a disk. C-79 ∑ 8-1/2" x 11", v + 360pp, Paperback, ISBN: 0-89412-272-X ∑ $28.80 U.S. ARMY SIGNALS INTELLIGENCE IN WORLD WAR II, A Documentary History, James L. Gilbert and John P. Finnegan, eds. Much of the intelligence obtained by the United States during World War II came from intercepting and deciphering the most secret communications of adversaries. For many years security considerations prevented any public mention of these successes in official histories. Now, much of the story can at last be told. Book includes 16 pages of added pictures plus a complete added personality index of all names mentioned in the text. C-80 ∑ 8-1/2" x 11", xii + 243pp, Paperback, ISBN: 0-89412-274-6 ∑ $30.80 THE STORY OF MAGIC, Memoirs of an American Cryptologic Pioneer, Frank B. Rowlett Text tells the story of Frank B. Rowlett, a codebreaker whose work was done for years before and during World War II in deepest secrecy. Although dozens of cryptographic systems of both friends and enemy were broken, the greatest triumph was perhaps that of breaking the Japanese PURPLE diplomatic cipher machine, the machine used for transmission of Japan's most secret and sensitive diplomatic messages before and after the entrance of the United States into World War II. Adding greatly to the book is its Foreword and Epilogue, written by David Kahn, author of The Codebreakers. Text includes pictures. C-81 ∑ 6" x 9", x + 266pp, Hardback, ISBN: 0-89412-273-8 ∑ $32.80 BRIEFING NOTES CONCERNING ANALYSIS OF GERMAN AIR-FORCE LOW-LEVEL COMMUNICATIONS DURING WORLD WAR II, Code & Cypher School This book contains notes made by one of the recipients of a comprehensive briefing of the analysis of German low-level cryptographic systems given by the British Code and Cypher School in Bletchley Park, England in 1944. Contains information concerning Orchestral Codes, Zenits, GAF Signal System, the Bird Book, GESCHWADER Operational prefixes. C-82 ∑ 8-1/2" x 11", iv + 94pp, Paperback, ISBN: 0-89412-275-4 ∑ $26.80 NSA CRYPTOLOGIC DOCUMENTS, National Archives Text contains a listing of some five-thousand recently released NSA documents, many previously TOP SECRET and very sensitive. A large number of the documents concern the "breaking" by the NSA of the codes of neutral and friendly governments during World War II, including the Swiss, Vatican, etc. Many British (MOST SECRET) documents provided to the NSA during World War II have also been released. Text contains a wealth of new information for the researcher and scholar with not only the titles of the many documents, but also their exact location (Box number) within the National Archives. C-83 ∑ 8-1/2" x 11", vi + 134pp, Paperback, ISBN: 0-89412-244-4 ∑ $26.80 GENERAL SOLUTION FOR THE DOUBLE TRANSPOSITION CIPHER, Solomon Kullback, Ph. D. Text contains a mathematical approach to the solution of the double transposition cipher. Classified for many years, this fine text has finally been released by the NSA. Also contains a number of problems for the student. C-84 ∑ 8-1/2" x 11", viii + 32pp, Paperback, ISBN: 0-89412-278-9 ∑ $20.80 RUSSIAN CRYPTOLOGY DURING WORLD WAR II, Alex Dettmann, Wilhelm Fenner, Wilhelm Flicke, Kurt Friederichsohn, Adolph Paschke This previously TOP SECRET (Code Word SUEDE) document is a reproduction without changes of the National Security Agency document NR 1310 CBHD15 11803A. Text contains six parts: Sources of Information, Organization of Cryptology in the Red Worker and Peasant Army, Organization of Cryptology in the People's Commissariat for Internal Affairs, Organization of Cryptology in Other Agencies, the Basic Systems as found in Russian Cryptology, and Areas and Dates of Use of the Basic Systems. C-85 ∑ 8-1/2" x 11", iv + 51pp, Paperback, ISBN: 0-89412-279-7 ∑ $26.80 VATICAN CODE SYSTEMS, National Security Agency Typeset from the original manuscript, this previously classified and highly sensitive book provides the astonishing evidence that the U.S. Government was "breaking" and reading the codes of friendly governments during World War II. Chapters provide the general characteristics of Vatican systems, information concerning the Red Code, Yellow Code, and the Green Code, plus information concerning Vatican commercial traffic, plus an overall survey of Vatican Codes and an appraisal of Vatican cryptography. C-86 ∑ 8-1/2" x 11", x + 70pp, Paperback, ISBN: 0-89412-280-0 ∑ $28.80 U.S. REVOLUTIONARY PERIOD CRYPTOGRAPHY, Signal Security Agency This is a specially edited and revised version of a previously classified paper, Secret Writing in the Revolutionary Period, prepared under the direciton of the Chief Signal Officer on 21 July 1945. Important appendices, Ciphers of the Revolutionary Period, British Secret Writing in the Revolution , and Codes and Camouflage, have been included for the reader. C-87 ∑ 8-1/2" x 11", vi + 60pp, Paperback, ISBN: 0-89412-282-7 ∑ $26.80 GENERAL SOLUTION OF THE ADFGVX CIPHER SYSTEM, J. Rives Childs During World War I, the Germans employed a combined substitution-transposition cipher system, known as the ADFGVX Cipher, because the ciphertext consisted solely of the letters A, D, F, G, V, and X. The principles involved with this solution apply not only to other ciphers of this type, but largely also to the solution of code systems which are subsequently enciphered by a columnar transposition cipher. This book of J. Rives Childs, which descibes the solution of this cipher system also contains a similar solution written by Alan G. Konheim. Adding to the value of this book are appended many dozens of actual ADFGVX messages that were transmitted by Germany in World War I, messages that the student may solve. C-88 ∑ 8-1/2" x 11", vi + 245pp, Paperback, ISBN: 0-89412-284-3 ∑ $36.80 NSA REVEALS HOW THE CODES OF MEXICO WERE BROKEN, National Security Agency It is believed that in part, largely to the prompting of the Clinton Administration to declassify across the board older classified documents - in general those over fifty years old- regardless of their degree of classification or sensitivity, the National Security Agency has now declassified some five-thousand highly sensitive documents which can now be found in the National Archives. A listing with title of these released documents can be found in book C-83, NSA CRYPTOLOGIC DOCUMENTS. The present book C-89, NSA REVEALS HOW THE CODES OF MEXICO WERE BROKEN, describes the techniques used in "breaking" the Mexican cryptographic systems. The solutions of the systems, MXC, MXD, MXE, and MXH, as titled by NSA, are described in detail. The systems include transposition, substitution, and combination transposition-substitution systems. In addition, the National Security Agency has kindly provided dozens of raw traffic which the reader or student can attempt to solve. The reader will surely wonder why the U.S. Government has permitted the release of the material found in this book. The dictum that gentlemen do not read the mail of other gentlemen has now been proven to be false. C-89 ∑ 8-1/2" x 11", vi + 157pp, Paperback, ISBN: 0-89412-289-4 ∑ $36.80 HANDBOOK FOR CRYPTANALYSIS, Army Security Agency Various versions of this book, now unclassified, were released by the Army Security Agency and its predecessor, the Signal Intelligence Agency, some fifty years ago; and recently have been furnished to the National Archives. While the use of today's computer has supplanted many cryptographic procedures previously done by hand, there are some items described in this handbook which still remain important for today's analyst. Although seemingly minor, one of the important items which affect cryptanalyst's work is the standardization of cryptographic procedures described in chapter one. This cannot be emphasized too much. The cryptanalyst must make every effort to print letters and numerals in the manner described. A few of the chapters included in this book are as follows: The Phi Test, The Solution of 2-Square Matrices, Statistical Methods in the Determination of Generatrices C-90 ∑ 8-1/2" x 11", vi + 103pp, Paperback, ISBN: 0-89412-291-6 ∑ $26.80 Thank you for your time. For a complete listing of our publications, please feel free to visit our website at www.aegeanparkpress.com. Best regards, Aegean Park Press -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 3107 From: Steve McAlexander Date: Thu May 31, 2001 0:26am Subject: E-mail users warned over spy network http://news.bbc.co.uk/hi/english/world/europe/newsid_1357000/1357264.stm -----Original Message----- From: Miguel Puchol [mailto:mpuchol@w...] Sent: Sunday, May 27, 2001 15:36 To: TSCM-L Mailing List Subject: RE: [TSCM-L] Big Brother contestants searched by anti-espionage experts My God!! You also have this hideous program over there!? I think that Einstein has been proved wrong: Crap propagates faster than the speed of light. Have a good week all, Mike > -----Mensaje original----- > De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] > Enviado el: domingo, 27 de mayo de 2001 17:55 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] Big Brother contestants searched by anti-espionage > experts > > > > Big Brother contestants searched by anti-espionage experts > > http://www.ananova.com/news/story/sm_305015.html?menu= > Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 3108 From: Craig Snedden Date: Thu May 31, 2001 3:59am Subject: Re: Identifying Echelon Stations Being bound as I am by my obligations to certain UK laws, I can't make any comment on Echelon, but I can say that in my military career, I have used parabolic antennae of around this size to access military satcoms........ > Schmid goes on to single out military-run sites that are closed to the > public and which have large parabolic antennae, with diameters of > around 30 inches. "As far as your rapporteur knows there is no > military application for antennae of this size," he says. > "Consequently, if they are found on a site [run by the military with > no public access], it may be concluded that civilian satellite > communications are being intercepted on that site." / When I worked with the satcom detatchment, we regularly used satcom equipment, static and tactical setups with varying sizes of antennae, from the huge to the hand-held, but I was amazed to see a "tactical" satcom unit of a certain NATO country appear on a deployment consisting of a large (4-6 metre) dish mounted on one truck and the TX/RX mounted on another and the associated switching systems on yet another, with the power detachment coming along for the ride as well. All our kit could be stowed in the back of a small 4X4 and did exactly the same job.....!!!! Craig Snedden The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 3109 From: James M. Atkinson, Comm-Eng Date: Thu May 31, 2001 8:41am Subject: Re: Identifying Echelon Stations At 1:46 PM -0500 5/30/01, Robert G. Ferrell wrote: > >From ZDNet, >http://news.zdnet.co.uk/story/0,,s2087713,00.html >- [snip] >But only parabolic antennae are used to receive satellite signals. If >the parabolic antennae are standing on an open site, it is possible to >calculate which satellite is being received. Most often parabolic >antennae are concealed under spherical white covers known as radomes: >these protect the antennae, but also conceal which direction they are >pointing in. > >"If parabolic antennae or radomes are positioned on an intercepting >station site," says Schmid in his report, "one may be certain that >they are receiving signals from satellites, though this does not prove >what type of signals these are". [snip] Bullshit, A parabolic dish is nothing more then a high gain antenna which are very commonly used for line of site communications all over the world. It can be pointed sideways, out towards the horizon, or up into the sky. Not all dishes look at satellites. As the frequencies climb the higher gain the antenna needs to be, and the parabolic dish simply provides the ability to focus more energy more effectively. Radomes are used to keep the dish protected, NOT to conceal what it is looking at (in fact a radome gives you a performance hit). If the article is to be taken seriously then every cell phone tower with a 22 GHz link is part of the conspiracy, and every weather radar system is scanning the brains of the the public, Utter Rubbish. The journalist who wrote the piece should be ashamed of himself for such shoddy research. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3110 From: Robert G. Ferrell Date: Thu May 31, 2001 8:51am Subject: Re: Identifying Echelon Stations >If the article is to be taken seriously then every cell phone tower >with a 22 GHz link is part of the conspiracy, and every weather radar >system is scanning the brains of the the public, Utter Rubbish. Yeah! Weather radar systems have nowhere near the resolution necessary to gather useful data from something that small... ;-) RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 3111 From: James M. Atkinson, Comm-Eng Date: Thu May 31, 2001 9:14am Subject: Re: Identifying Echelon Stations Yikes, The next urban legend that will start to circulate is that weather radar systems are being used for mind control, and that the CIA is using cell phones to mentally send covert messages to deep cover agents. I am amazed how many people with mental problems actually belive the foolishness out there, and use fragments of information to try to support their own delusions of harassment, mind control, secret messages, etc. It simply boggles the mind, and yet you have to pity the poor folks. -jma At 8:51 AM -0500 5/31/01, Robert G. Ferrell wrote: > >If the article is to be taken seriously then every cell phone tower >>with a 22 GHz link is part of the conspiracy, and every weather radar >>system is scanning the brains of the the public, Utter Rubbish. > >Yeah! Weather radar systems have nowhere near the resolution >necessary to gather useful data from something that small... > >;-) > >RGF -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3112 From: Miguel Puchol Date: Thu May 31, 2001 1:39pm Subject: RE: Identifying Echelon Stations James, In any case, I believe that for the opponent, in an intelligence war, it's useful to know towards what your dish is pointing - and this is fairly easy to find out just by looking at the antenna. So, if indeed the dishes are pointed at satellites like Intelsat, then we could safely assume that civilian traffic is being intercepted. But, again, I agree that paranoia is really taking on this article, and it should be taken with a couple of tons of salt. All the best, Mike > -----Mensaje original----- > De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] > Enviado el: jueves, 31 de mayo de 2001 16:14 > Para: TSCM-L@yahoogroups.com > Asunto: Re: [TSCM-L] Identifying Echelon Stations > > > > Yikes, > > The next urban legend that will start to circulate is that weather > radar systems > are being used for mind control, and that the CIA is using cell phones to > mentally send covert messages to deep cover agents. > > I am amazed how many people with mental problems actually belive the > foolishness out there, and use fragments of information to try to > support their own > delusions of harassment, mind control, secret messages, etc. > > It simply boggles the mind, and yet you have to pity the poor folks. > > -jma > > > > At 8:51 AM -0500 5/31/01, Robert G. Ferrell wrote: > > >If the article is to be taken seriously then every cell phone tower > >>with a 22 GHz link is part of the conspiracy, and every weather radar > >>system is scanning the brains of the the public, Utter Rubbish. > > > >Yeah! Weather radar systems have nowhere near the resolution > >necessary to gather useful data from something that small... > > > >;-) > > > >RGF > > -- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3113 From: Robert G. Ferrell Date: Thu May 31, 2001 1:45pm Subject: RE: Identifying Echelon Stations >In any case, I believe that for the opponent, in an intelligence war, it's >useful to know towards what your dish is pointing - and this is fairly easy >to find out just by looking at the antenna. So, if indeed the dishes are >pointed at satellites like Intelsat, then we could safely assume that >civilian traffic is being intercepted. You know, when I was in high school back in the 70s, I was an avid amateur radio astronomer. I built a interferometer array in my yard consisting of three 8 foot diameter parabolic dishes guided by a complex collection of garage door openers and step-down motors. There weren't any commercially available 21 cm receivers in my price range, so I had to build one out of a bunch of cobbled-together parts. This was before the days of satellite television; I often wonder just what in the heck my neighbors thought I was doing. Teenage CIA spook? Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 3114 From: James M. Atkinson, Comm-Eng Date: Thu May 31, 2001 4:18pm Subject: Evil Overlord Guidelines Evil Overlord Guidelines If I ever become an Evil Overlord: 1. My legions of terror will have helmets with clear Plexiglass visors, not face-concealing ones. 2. My ventilation ducts will be too small to crawl through. 3. My noble half-brother whose throne I usurped will be killed, not kept anonymously imprisoned in a forgotten cell of my dungeon. 4. Shooting is not too good for my enemies. 5. The artifact which is the source of my power will not be kept on the Mountain of Despair beyond the River of Fire guarded by the Dragons of Eternity. It will be in my safe-deposit box. 6. I will not gloat over my enemies' predicament before killing them. 7. When the rebel leader challenges me to fight one- on-one and asks, "Or are you afraid without your armies to back you up?" My reply will be, "No, just sensible." 8. When I've captured my adversary and he says, "Look, before you kill me, will you at least tell me what this is all about?" I'll say, "Nope" and shoot him. 9. After I kidnap the beautiful princess, we will be married immediately in a quiet civil ceremony, not a lavish spectacle in three weeks time during which the final phase of my plan will be carried out. 10. I will not include a self-destruct mechanism unless absolutely necessary. If it is necessary, it will not be a large red button labeled "Danger: Do Not Push". 11. I will not order my trusted lieutenant to kill the infant who is destined to overthrow me -- I'll do it myself. 12. I will not interrogate my enemies in the inner sanctum -- a small hotel well outside my borders will work just as well. 13. I will be secure in my superiority. Therefore, I will feel no need to prove it by leaving clues in the form of riddles or leaving my weaker enemies alive to show they pose no threat. 14. I will not waste time making my enemy's death look like an accident: I'm not accountable to anyone and my other enemies wouldn't believe it. 15. I will make it clear that I _do_ know the meaning of the word "mercy"; I simply choose not show them any. 16. One of my advisors will be an average five-year- old child. Any flaws in my plan that he is able to spot will be corrected before its implementation. 17. All slain enemies will be cremated, not left for dead at the bottom of the cliff. The announcement of their deaths, as well as any accompanying celebration, will be deferred until after the aforementioned disposal. 18. My undercover agents will not have tattoos identifying them as members of my organization, nor will they be required to wear military boots or adhere to any other dress codes. 19. The hero is not entitled to a last kiss, a last cigarette, or any other form of last request. 20. I will never employ any device with a digital countdown. If I find that such a device is absolutely unavoidable, I will set it to activate when the counter reaches 117 and the hero is just putting his plan into operation. 21. I will design all doomsday machines myself. If I must hire a mad scientist to assist me, I will make sure that he is sufficiently twisted to never regret his evil ways and seek to undo the damage he's caused. 22. I will never utter the sentence "But before I kill you, there's just one thing I want to know." 23. When I employ people as advisors, I will occasionally listen to their advice. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3115 From: James M. Atkinson, Comm-Eng Date: Thu May 31, 2001 4:20pm Subject: Discussion Item - Carry On TSCM Kit I would like to propose a topic for the list, and I belive that everyone will benefit as the issue if discussed. Here is the hypothetical situation: A set of TSCM items that completely fits inside a standard piece of ATA carry-on luggage with a maximum size of 9*14*22 (case must be small enough to fit both under a seat, AND in the overhead bin). Contents of the case must allow a single person to perform a limited scope "Bug Sweep" of a typical business office within a standard 8 hour work day. The sweep must include a detailed RF evaluation, an analysis of all conducted signals, and a limited evaluation of the phone system. The kit must be able to detect any device which radiates any RF signal which is generally available in a spyshop, Radio Shack, Walmarts, Home Depot, etc. The kit must be able to detect audio or VLF signals present on any conductor. Kit must include (as a minimum) a 100 MHz+ Oscilloscope, a digital voltmeter, audio amplifier, broadband diode detector system, a tuned receiver or scanner (with sub-carrier capability) with coverage at least 1.5 GHz, video receiver with coverage of all ATV bands (including the 433, 900, 1300 and 2400 MHz bands). Any hand tools included in the kit must be small enough to pass though airport security Xray machine without causing a problem (ie: keep the screwdrivers small). Also, the kit must be light enough to carry with one hand, and able to take a nominal amount of getting bumped around in transit. The question is: What you you include in the kit (and why), and what would you leave out (and why). Remember; it must be "carry-on", and must be able to pass airline security checkpoints. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3116 From: Bob Washburne Date: Thu May 31, 2001 5:25pm Subject: Re: Evil Overlord Guidelines The complete list has well over a hundred listings and can be found here: http://minievil.eviloverlord.com/lists/overlord.html Other lists usefull for Evil Henchmen, Daughters or Cult Members can be found here: http://www.thalia.org/henchman.html All in all, some very practical advice. It is also fun to try and guess which story each guideline came from. (Yep, that's the one that killed the Evil Overlord in "Celery Stalks at Midnight"). Bob Washburne 48. I will treat any beast which I control through magic or technology with respect and kindness. Thus if the control is ever broken, it will not immediately come after me for revenge. "James M. Atkinson, Comm-Eng" wrote: > > Evil Overlord Guidelines > > If I ever become an Evil Overlord: > (sort of like , but sounding more like a double handed axe or a guillotine). 3117 From: Aimee Farr Date: Thu May 31, 2001 6:48pm Subject: Be afraid, be very afraid. First, The "Bartnicki Kite" & now....."The Boehner Barn Door"...as to non-press publishers. Boehner is the real domino. Supreme Court Order: http://www4.law.cornell.edu/php/orderinquiry2.php3?caseid=22342 Background - Boehner media (1998): http://www.enquirer.com/editions/1998/04/21/attn-cinci.html Bartnicki Opinion: http://supct.law.cornell.edu/supct/html/99-1687.ZS.html ---------------------------------------------------------------------------- ----------------- TODAY @: http://www.freedomforum.org/templates/document.asp?documentID=14035 Ohio congressman John Boehner plans to pursue his four-year-old case against Rep. Jim McDermott for releasing the contents of an illegally intercepted cellular phone conversation even though the U.S. Supreme Court last week determined that the First Amendment trumped privacy rights in a similar case. The justices, in a 6-3 decision in the joined cases of Bartnicki v. Vopper and U.S. v. Vopper, said that a radio host cannot be sued for airing an illegally taped telephone conversation that he obtained legally. The Supreme Court appears to agree. Yesterday, it waived a ruling by the U.S. Circuit Court of Appeals for the District of Columbia that revived Boehner's lawsuit against McDermott, D-Wash. The justices instructed the lower court to resolve the case in light of the Bartnicki ruling. "Factually, there are distinctions, but there is nothing that should lead the Court of Appeals on remand to refuse to apply Bartnicki," Abrams said. "If anything, the information in Boehner is more newsworthy than the information in Bartnicki." Abrams also said he doubted that the courts would make distinctions between whether the speaker or publisher is a member of the press, the government or some other group. [....] ========== Historically, the courts have distinguished somewhat between PRESS and 'normal' First Amendment avenues. Because of the Net, the lines are blurring, since everybody can be a publisher. This is likely to get interesting, considering today's Net audio/visual capabilities, and the yet-to-be-worked-out tensions between basing decisions on the nature of the medium v. the nature of the content. "SURVEILLACTIVISM" might be a coming buzzword. ("Brand" is the corporate equivalent to The Ark Of The Covenant.) Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR Waco, Texas 3118 From: Craig Snedden Date: Thu May 31, 2001 9:22am Subject: Re: Identifying Echelon Stations > > Bullshit, > > A parabolic dish is nothing more then a high gain antenna which are > very commonly used for line of site communications all over the > world. It can be pointed sideways, out towards the horizon, or up > into the sky. Not all dishes look at satellites. > I concur! Echelon, rumours about it's capabilities and associations with certain military sites have been in the public domain for years. To my mind this is more to do with the politics of the "European Superstate" than serious reporting and "civil liberties". There are many reasons that make this report a load of worthless crap. The comment below, that by examining the bearing and azimuth of the dish you can work out which sat is being tracked is a bit wide of the mark. I don't have an up to date figure on exactly how many com-sats there are up there now, but a large fixed ground station dish, pointed vaguely in the direction of the Indian or Atlantic Oceans is bound to be within the footprint of a fairly large number of military and civil sats. You only know for sure which one is being tracked by getting access to the RX head and seeing what is being received! (It has been known for mil ops to tune in to the CNN feed from time to time>>>>! & nothing whatsover to do with eavesdropping, more boredom, wanting to watch the game etc. etc.) I think that the journo who wrote this was thinking about the guy here in the UK who managed to trace quite a number of Regional Operation Centres (or Wartime Seats of Government) about 30 to 40 years ago now. Not surprisingly, although most of these "bunkers" were built "out in the sticks", they were built (1950's) to a single design, with the antenna farm located not very far away (for some bizarre reason). By noting the direction of the antenna's on the array and plotting them on a map, then moving out along the plot until he came to another "innocuous looking farm building", finding it's associated antenna array... etc. etc. (you get the picture) he build up a pretty good picture of the location of the UK's emergency bunker system for the "cold war". Most of these places are now closed, but I did work in one or two about 15-20 years ago and I can say that what the guy claimed he did was credible and accurate. Have a nice weekend.... I'm off to update my PGP keys.... :-) Craig The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 3119 From: A Grudko Date: Fri Jun 1, 2001 6:34am Subject: Re: Identifying Echelon Stations ----- Original Message ----- From: Craig Snedden >.....I was amazed to see a "tactical" satcom unit > of a certain NATO country appear on a deployment consisting of a large (4-6 > metre) dish mounted on one truck and the TX/RX mounted on another and the > associated switching systems on yet another, with the power detachment > coming along for the ride as well. All our kit could be stowed in the back > of a small 4X4 and did exactly the same job.....!!!! Who needs night vision when all you have to look for is the glow of the 'bottles' (valves) in the second truck. I joke of course, but there was serious talk a few years ago about some Soviet military backup equipment being designed around miniature thermionic valves rather than solid state components because of being thousands of times less susceptible to EMP after a nearby nuclear strike or the use of Pulse type weapons. (in a nearby lightning groundstrike recently 4 'state-of-the art' miniaturised receivers went deaf and are in the repair shop. My 20 year old FRG-7700 is as fresh as a puppy....) Andy Grudko. D.P.M., Grad I.S, (S.A.) ZR6UU ZRAJ7795 G8RXE 3120 From: A Grudko Date: Fri Jun 1, 2001 9:15am Subject: Mmind Ccontrol humour ----- Original Message ----- From: James M. Atkinson > The next urban legend that will start to circulate is that weather > radar systems are being used for mind control. > It simply boggles the mind, and yet you have to pity the poor folks Don't tell me you haven't noticed that every other time you use your TV remote control, PysOpsDir Jerry Springer appears - proof of negative mind control. And that trigering your garage remote makes your right eye wink even if Cindy Crawford ISN'T jogging past!. My Optoelectronics Xplorer covers the frequency range of all garage type TXs but won't detect or record these short data bursts, according to the manufacurer's own specs. But for $22 I can buy an over the counter kit in downtown J*h*a*n*e*b*r* (sorry, the location is classified) that not only captures but records (one event) and can retransmit this data. I have the power to open strange garage doors. I have offered this facility to Microsoft for a one Billion Dollars licence fee. Today, Garage Control. Tomorrow, Mind Control Andy Grudko. D.P.M., Grad I.S, (S.A.) Grudko Associates - Crime investigation, intelligence and protection Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom - "When you need it done right - first time" . 3121 From: A Grudko Date: Fri Jun 1, 2001 8:32am Subject: Echelon, US culture, speed and BMW shark fins -- Original Message -- > >If the article is to be taken seriously then every cell phone tower > >with a 22 GHz link is part of the conspiracy, and every weather radar > >system is scanning the brains of the the public... I dusted off my old Radio Shack 22 gig rig and pointed the dish at my neighbours. All I see could looked like Ted Bundy and George Dubbaya fighting with Jerry Springer and Pamela Anderson. And my neighbours aren't even American! I must say, the introduction of cellphone towers seriously slowed down my Corvette. Every time I went over a rise on a highway my radar detector went balistic - and there in the distance was the ubiqutous cellphone tower ! A high percentage of BMWs round the world are built not in Germany but here in South Africa, and every BMW built in the past 10 years has SA parts. But we import the 7 series, and I've seen an interesting GSM cellular antenna on the latest models. It looks like 2 flattened black anodised rounded 'shark fins', similar to some of the Erikson 'phones, about a quarter wave high and a quarter wave apart on the horizontal, in line with the front/rear axis of the car. It appears to be a. OEM capacitive/inductive glass mount. I assume this is an attempt to 'smooth out' the wave form maxima/minima as the vehicle moves through the GSM RF field - almost the oposite of a doppler phased array which compares maxima and minima to compute a direction. I guess the object is to cancel out the phase effect, and therefore reduce 'dropped calls' and capture effect 'break-up'. I don't understand the mechanics of impedance matching 2 antennas through a glass mount but it must be similar to using a 75 ohm harness to match two 50 ohm antennas I think this kind of design could assist in detecting (as against locating) very low power suspect signals because wherever you are in the room you will get maximum signal, regardless of your position on the sine wave phase relative to the transmit antenna. Just an idea from looking at the latest BMW back windows! Andy Grudko. D.P.M., Grad I.S, (S.A.) Grudko Associates - Crime investigation, intelligence and protection Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom, IPA - "When you need it done right - first time" From: James M. Atkinson Date: Mon May 27, 2002 9:13pm Subject: Corporate Snooping on Consumers http://www.alternet.org/story.html?StoryID=13123 HIGHTOWER: Corporate Snooping on Consumers Jim Hightower, AlterNet May 14, 2002 You've heard of the Little Shop of Horrors, but now comes the Little Boutique of Retail Ethnography. "Retail ethnography" is a bit of corporate gobbledygook that essentially means spying, prying, snooping, and generally intruding into the private lives of us consumers. It sprang from a simpler, more honest process called "market research," involving taking consumer surveys and asking customers directly about their opinions of products and such. But, now, this research has gotten sneakier and darker. Instead of being aboveboard with shoppers, retail ethnography is the underhanded art of surveillance, using all of the latest technological gadgetry to monitor shoppers clandestinely. Hidden video cameras and microphones are computerized to "track" individual customers as they move through a store, identifying them by their body temperature and mapping their movements by passing them from camera to camera. If a customer lingers over a product, the cameras zoom in to record facial expressions. The latest advance in the "intrusion explosion," as columnist William Safire has dubbed it, is a recently-opened Minneapolis boutique called Once Famous. Stephanie Simon of the Los Angeles Times reports that this inviting shop, filled with artsy, upscale home furnishings is really not in the business of selling ... but of spying. It's a front, set up by Omnicom Group Inc.--a global advertising giant. Once Famous looks like a real store with clerks selling products to customers. But it's really a surveillance lab that's totally wired so analysts can watch the shoppers from a hidden control room. Manufacturers pay a fee to put a product in the store, then watch the video of customer reactions to the product. Most shoppers have no idea that their every movement is being recorded, analyzed ... and sold. This is Jim Hightower saying ... Sadly, under current law, this commercialized invasion of our privacy is legal. To change these laws, contact Privacy Rights Clearinghouse at www.privacyrights.org. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5494 From: James M. Atkinson Date: Mon May 27, 2002 9:16pm Subject: State Wiretap Usage Up 40 Percent In 2001 http://www.newsbytes.com/news/02/176750.html State Wiretap Usage Up 40 Percent In 2001 By Brian Krebs, Washtech WASHINGTON, D.C., U.S.A., 24 May 2002, 5:19 AM CST State courts authorized a dramatic increase in the use of electronic surveillance last year, mostly to listen in on cell phones, pagers and other wireless devices, according to a government report released yesterday. In its annual Wiretap Report, the Administrative Office of the U.S. Courts said state courts approved 1,005 wiretap applications last year, up from 711 in the previous year. Federal judges, by contrast, approved 486 wiretap requests, just six more than in 2000. The report indicates criminals are using anything but plain old telephone lines: 68 percent of all wiretaps last year authorized police to eavesdrop on portable communications devices such as cell phones, pagers and cordless phones. Conversely, the number of wiretaps used for eavesdropping on private residences was down from the previous year. "I think it's safe to say wiretapping has gone mobile," said Marc Rotenberg, executive director of the Electronic Privacy Information Center. "This is the sharpest increase since the first year these reports were created." Most wiretaps approved last year were for narcotics cases: Nearly 80 percent of all applications for intercepts in 2001 cited drug offenses as the most serious offense under investigation. Gambling and racketeering were the second and third most frequently cited offense in wiretap applications last year, while homicide and assault cases accounted for slightly more than 3 percent of all wiretaps. Though authorities issued 300 more wiretaps last year than in 2000, the number of convictions obtained through intercepts declined. Most intercepts in 2001 were in operation for 9 percent fewer days per wiretap than in 2000. The number of communications intercepted per wiretap fell by 12 percent. In addition, the average length of authorization was down by one day from 2000, according to the report. The report does not include surveillance obtained through so-called "trap and trace" or "pen register" orders, which allow police to view telephone numbers dialed by a suspect, for example. Antiterorrism legislation passed by Congress last year extended that authority to investigators seeking the Internet address of an e-mail's sender and recipient. Unlike wiretaps, the law does not require authorities to convince a judge to grant them pen register or trap and trace authority. Under the law, judges are obliged to grant such requests if police claim the information is "relevant" to an ongoing criminal investigation. But because authorities are not obligated to report surveillance requests obtained with the consent of at least one of the key parties to the communication, the true scope of electronic surveillance being conducted online may never be accurately known, Rotenberg said. "We could realistically be talking about hundreds of thousands - perhaps even millions - of requests from ISPs (Internet service providers) that are not recorded each year," he said. Though nearly all U.S. states have electronic surveillance laws on the books, fewer than half reported approving wiretaps in the past few years, said Jim Dempsey, associate director of the Center for Democracy and Technology. "This suggests either that some states aren't adhering to the reporting requirements or that wiretapping is not the indispensable technique that law enforcement says it is," Dempsey said. Reported By Washtech.com, http://www.washtech.com 05:19 CST (20020524/WIRES TELECOM, LEGAL/) © 2002 The Washington Post Company -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5495 From: James M. Atkinson Date: Mon May 27, 2002 9:15pm Subject: Big Brother contestants to have 'spy-proof' luggage http://www.ananova.com/news/story/sm_594096.html?menu= Big Brother contestants to have 'spy-proof' luggage The Big Brother 3 contestants will enter the house with 'spy-proof' designer luggage. The aluminium Xylem cases were used by Pierce Brosnan in the last 007 movie The World Is Not Enough. The cases are being used because they have no secret compartments and are highly secure. Bosses are clamping down because 'Nasty' Nick Bateman broke the rules by smuggling in a pen and paper in the first series. A spokeswoman for luggage-makers Samsonite said: "The cases Big Brother have chosen to use are from the top of our range. Story filed: 15:18 Thursday 23rd May 2002 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5496 From: Secdep Date: Tue May 28, 2002 0:00am Subject: MICROWAVE MIND CONTROL!!!!!!!! Passed onto me by my one client. http://www.vegan.swinternet.co.uk/articles/conspiracies/mw_mindcontrol.html MICROWAVE MIND CONTROL MICROWAVE PHONES - ARE THEY KILLING US? As a scientist researching into microwave weapons used on the general public, evidence that the GM900 microwave network as used by Vodaphone and British Telecom, is a major health hazard, has come to my attention. Defence Intelligence Agency (DIA) documents entitled: Biological Effects Of Electromagnetic Radiation (Radiowaves and Microwaves) Eurasian Communist Countries, show that microwave frequencies similar to those of the cellular phones can cause health problems in the following areas: a.. Blood. b.. Cardiovascular System. c.. Cells. d.. Central Nervous System. e.. Digestive System. f.. Glands. g.. Metabolism. h.. Reproduction. i.. Visual System. j.. Internal Sound Perception. Equipment to test the frequency and intensity of microwave phones shows that they produce signals similar to microwave ovens. Two Vodaphone cellular phones were producing 100mW/cm2 and 50 mW/cm2 respectively. The danger level for microwave ovens is 5mW/cm2 and the Russians regularly used 10 mW/cm2 for weapon research. These Vodaphones will therefore cause significant health problems if used. A variety of cell phones can be tested to see how dangerous they are. The GM1800 system used by Orange uses higher frequency microwaves. Australian scientists found this caused cancer in mice exposed to radiation of this type. The documents in my possession show that microwaves pass deeply into the body and can have a negative effect on the brain and body. The DIA research dates from 1976 and shows the dangers were known about over twenty years ago. The Soviets used the frequencies and intensities used by mobile phones, 1800 MHz and 900 MHz, as weapons. It is a rule of the intelligence community that you hide things in plain view, getting the public to accept microwave mind control weapons which effect their behaviour under the guise of mobile phones was a stroke of genius. Getting the public to pay for these microwave mind control devices, so their brains and behaviour can be damaged, to make them more docile and easy to control, was pure diabolical genius. UK INTELLIGENCE FORCES AND MICROWAVE MIND CONTROL Microwave weapons that turn people into stressed, confused, submissive zombies are being used in Britain's inner cities. Developed by the communists, microwave weapons similar to microwave ovens have since the 1980s, been targeted on inner city council estates. These weapons transmit extremely low frequency (ELF) signals which mimic natural brain waves; at the flick of a switch, all the people around these microwave transmitters are turned into submissive zombies who cannot think clearly, become depressed, apathetic and want to lounge around all day doing nothing: the inner city malaise found on Britain's streets. With the advent of new ELF detectors designed by the author's research teams, the mass mind control of the metropolitan UK population can be proved. ELF signals are officially only found at nuclear submarine communication stations, so the researchers were shocked to find microwave and UHF, mind control signals in city centres, the author's flat, being sent through mobile phones, the BT telephones and from the numerous transmitters that dot the country. The massive increase in mobile phones has enabled the UK security forces to use this network of transmitters to beam mind control signals into the brains of anyone living near these transmitters. Microwave phones use pulse modulated microwaves of the correct intensity to pass through the skull into the brain and control behaviour. Microwave transmitters are therefore the perfect medium for the transmission of ELF signals to mind control the UK population. Researchers are of the opinion that the inner city riots of the early eighties forced the Thatcher regime to deploy ELF mind control devices developed in the 1970s to turn the working class housing estates into total policing zones. In these zones, ELF transmitters turned the inhabitants into docile zombies. So successful was this technology that it was expanded to cover all major towns. Mass mind control of the UK public to make them submissive and obey authority was expanded, hand-in-hand with the mobile phone network and military and police microwave transmitters. Now the entire London conurbation is covered by UHF and microwave carrying mind numbing ELF. Research into the use of microwave weapons and their use for mind control began in 1950s at the Tavistock Institute, one of Britain's leading psychiatric research establishments. The UK institute was researching into ways of mind controlling the British population without them knowing. The monkey submission response, whereby the dominant monkey caused submissive behaviour in the underlings, was the brain state of most interest to the British scientists. Having found this specific brain rhythm for docile submissive, zombie-like behaviour, it was then recorded and used as the template for the ELF signal beamed on UK microwave transmitters. Britain was the first discoverer of microwave technology, used for radar, in the 1940s and therefore had a commanding lead over everyone else in this field. The 1970s brought a darker side to the story, with the news that the Russians were microwaving the US embassy in Moscow. One third of the staff eventually died of cancer from this microwave irradiation. Australian scientists proved in 1997, that tiny amounts of microwave produced by the very safest mobile phones, cause cancer in mice, when exposed to this radiation. Greenham Common was the first time that the Ministry of Defence was involved in the offensive microwaving of women protesters, the so called Greenham Common Women. This event showed that the UK security forces were willing to use lethal doses of microwave radiation on large groups of the general public. Equipment showed that the women peace protesters were subject to high levels of microwave radiation, some of them have subsequently died from cancer. Northern Ireland would have been a perfect proving ground for mass mind control technology. Research at the Tavistock institute enabled the Thatcher government to put into large scale use, the frequency which causes submission in humans. Radiating this ELF frequency on microwave transmitters, cellphones, BT phones and by use of other transmitters, the inner city population can be behaviourally controlled. My research group have ELF detectors, which can prove all manner of UK transmitters are being used to mind control the population. Since ELF is not found naturally, and is only used for nuclear submarine communication, its presence proves mind control weapons are being used on the general public. The author also has access to scientific documents showing the devastating effects of ELF broadcast by microwave, UHF and VHF on humans. It is alleged that Marconi put this microwave technology into full scale production, and around thirty scientists and military personnel on the project who began to ask questions committed `suicide' under mysterious circumstances. My research has found that microwave weapons are targeted on middle class troublemakers and researchers who cause problems for the establishment. Russian and American research has found that pulse modulated microwaves (as used for mobile phones) can, when modulated with ELF which mimics specific brain patterns change the behaviour of the victim at the flick of a switch. It has been found that UK security police, such as MI5 use the 450 MHz frequency used for this research (legally allowed to be used by the police) for behavioural control. A vast catalogue of mind control frequencies in the MHz range, FM radio, TV and mobile phone frequencies, have been measured, which are used in the UK for mind control and killing or disabling victims: 147, 153, 197, 199, 447, 453, 456, 466, 853, 883, 884, 887... Symptoms can be depression, befuddled thinking, loss of memory, stress, not being able to cope, manic behaviour, schizophrenia, nervous breakdowns, physical collapse, brain and nervous system damage, heart attacks, cancer... An example was Brighton police van, parked outside the Brighton Pavilion which was used to beam UHF and microwaves at vagrants to clear them from the area. All Brighton's city centres are bombarded with microwaves when vagrants congregate to make them so ill they have to flee. The Evening Argus newspaper asked the police if the white van which was parked in the Brighton Pavilion grounds for months, was their van, they replied it was one of their 'surveillance' vehicles. On Wednesday, 4th of February the author was passing Brighton Police station with a frequency counter which detects microwave weapons, and I detected a 452 MHz microwave beam being directed at two young offenders sitting on a wall opposite the station. I confronted the police with the reading, Robert Galloway, spokesperson for the police stated, "they were not interested in microwaves even if they were a danger to health." The author has uncovered widespread use of microwave weapons in Brighton by the police and MI5 as a test programme to clear vagrants from the city centre. Contacting researchers in this field of enquiry, they all complain of microwave-like symptoms, headache, nausea, giddiness, eye damage, ear problems... Readings I have taken show that the 750-1000 MHz range is used by the intelligence services for inducing nervous and physical collapse. Microwave ovens give off 1000 MHz. On the Channel 4 programme, For the Love of.New World Order, shown on Monday night at 12pm, on April 6th, the author revealed some of these facts on television. The presenter, and researchers of this programme complained of severe headaches in the days preceding filming symptomatic of microwave attack. As the foremost non-military expert microwave weapons, remote viewing (psychic spying) and Psi-warfare, the author became aware of the microwave problem when he was targeted to stop his forthcoming book on remote viewing being released. This book on psychic spying, published by Century Books, is the first book by a scientist on the subject of Psi-warfare and the techniques the superpowers developed. Subsequent to the filming of the Channel 4 programme, he was arrested by Brighton Police on February I5th outside their building and his frequency counter was confiscated to stop him recording the use of microwave weapons around the police station and in public places around the town. Even though no law was broken. It appears Brighton Police are worried that their use of microwave weapons on Brighton's vagrants is coming to light. The UK government has also bought up all the readily available frequency counters, these being the Watson FC-128 frequency counters, and the Optotronic devices, and the manufacturers now market a 'modified' model, which most probably has a digital filter so that the microwave weapon frequencies given above, cannot be shown. The author's frequency counter has still not been returned. With such high-level manipulation of events it seems that microwave mind control is part of a secret policy which is being practised on the general public in this county. As part of a covert government policy of harassing and disabling critics, this means of attack is not covered by the law and highly deniable, the perfect intelligence device for civilian control. The author's flat is targeted with a 900 MHz beam which seems to be designed to cause massive neurological damage and produce tumours. The BT phone network has the potential to be used for docilisation of the UK public. A 30-40 MHz signal is carried by the phone. When the earpiece is placed against the head, bone conduction carries the ELF component into the brain of the phone user. A ELF signal which can effect behaviour or health is therefore passed into all BT phone users. It appears from experts I have consulted on the subject that the digital phones have been designed to carry this mind control carrier frequency. Vodaphone have supplied a mobile phone to a friend of mine that pumps out an 847 MHz signal at over 100 mW/cm2, this is equivalent to 4x100 watt lightbulbs being turned on in the body of the user. This means that mobile phones can potentially be used to kill or so disable a person they no longer become a problem to the establishment. Another Vodaphone tested pumped out 50 mW/cm2. UK safe levels for microwave ovens are 5 mW/cm2 - which are not held near the head. There are reports by military researchers that 1 mW/cm2 will cause swelling of nerve cells exposed to microwave. It is obvious that a total policing of the population by means of UHF, VHF, and microwave EM radiation, amongst others, is being used to keep the UK population in a docile and submissive mental state. Mental confusion can also be added to the signal for working class inner city areas to keep them docile and confused. A land of stultified zombies, who are mind controlled to make them docile and unable to think clearly. Subversives are habitually targeted with microwaves to drive them mad or make them fatally ill On July 4th 1976 seven giant transmitters in the Ukraine, powered by the Chernobyl nuclear facility, pumped a 100 megawatt radio frequency at the West, which contained a 10 Hz ELF mind control frequency. According to a US scientist, Dr. Andrija Puharich, MD, the soviet pulses covered the human brain frequencies. With a Dr. Bob Beck Andrija proved that the Soviet transmissions were a weapon. He found that a 6.66 Hz frequency would cause depression and an 11 Hz signal would cause manic and riotous behaviour. transmissions could indeed entrain the human brain, and thereby induce behavioural modification populations can be mind controlled en masse by ELF transmissions. More importantly he found that an ELF signal could cause cancer at the flick of a switch. It did this by modifying the function of the RNA transferases so that amino acid sequences are scrambled and produce unnatural proteins. MIND CONTROL Torture is alive and well in the UK. MI5, the UK's secret police, regularly use Non-Lethal Weapons on any dissidents. Since MI5 have a well documented history of hating the Labour Party, and were instrumental in bringing down the Labour Prime Minister Harold Wilson, they naturally took to spying on, and discrediting, any group or person who did not follow their rabid right wing dogma. When Margaret Thatcher became Prime Minister of a right wing Conservative Government in 1979, she soon saw the power in recruiting MI5 to be her own secret police. During the Miner's strike in the early eighties, Arthur Scargill and his National Union of Miners nearly brought the Conservative Government down, with their year long strike. Margaret Thatcher used MI5 to spy on the Miners and to discredit Arthur Scargill. Leading police officers argued against the use of MI5 on the civilian population, they were ignored or replaced - if they proved too vociferous. Margaret Thatcher was the first Prime Minister for many a year to sit in on the Joint Intelligence Committee's meetings on a regular basis. Thatcher, as a trained scientist, would have been well aware of the usefulness of microwave weapons. They are impossible to detect unless you have a detector, dissidents have no idea these weapons exist, and best of all, they are totally deniable. It may be that MI5 kept this research secret from Margaret Thatcher, but the resources the UK has put into these fearsome, so-called non-lethal weapons, is extensive. UK intelligence runs a fleet of microwave weapon carrying vans, as well as portable microwave weapons that can be deployed near the dissident's home. The vast expense can be disguised as communications equipment, for as we all know, microwave telephone communication is all the rage in our modern world. My research shows that the microwave telephone network also has the potential to be used as a major mind control weapon system to control the behaviour of the microwave phone users. Developed under the Conservative government, which was in power from 1979-97. The UK secret, or 'black' government, has at its disposal a fearsome array of mind control weapons. These abhorrent devices are euphemistically called 'non-lethal weapons' by the UK military. In fact they kill you slowly by causing: nerve damage, cancers, mental collapse leading to suicides, or tissue failure, such as heart attacks due to the cooking effect of microwaves. Precisely modulated microwave radiation is used to influence brain function. Human behaviour and reactions can be entirely controlled by using pulse modulated microwave EM radiation. Pulse modulated microwaves are useful as the carrier for the mind control signals as they are able to pass through the skull, which is rather resistant to low level EM. The massive number of microwave antennae that dot the country, some of which are used for the microwave phone network, all use pulse modulated microwaves, which makes their use for a strategic mind control device against the civilian population in times of trouble, or rioting, crucial to modifying the behaviour of the general population. In modern democracies it is no longer viable to shoot rioters, or torture dissidents by normal means, as the bad publicity is self defeating. Thus, microwave weapons have been developed by the UK's military intelligence as they leave no marks, or gaping wounds. This pulse modulated microwave carrier beam can then be used to carry signals. These signals are extremely low frequency recordings of brain electrical potentials, which have been recorded by neuro-medical researchers such as Dr Ross Adey. Dr Ross Adey's research at the Brain Research Institute of the University of California, was funded by the CIA. In their Pandora project a catalogue of different brain signals for specific actions, emotions and pathological states of mind were recorded. It was found that when microwaves were used to fire these signals at victims' brains, they experienced the moods, behaviour, and the pathological states, carried by the signals. This meant that by mimicking natural brain frequencies, the human brain could be controlled remotely by use of extremely low frequency broadcast carried by pulse modulated microwave beams (ELF pulse modulated microwave remote mind control technology). It is now possible to broadcast mind control commands directly into the brain by use of microwave beams. All that is needed is a catalogue of every specific brain frequency for each: mood, action and thought. These catalogues of excitation potentials are available from Russian neuro-medical research institutes, so any one with enough cash can have the same technology at their disposal, as UK military mind control groups (the psychological-enforcement arm of MI5). The Aum sect bought microwave weaponry via their 50,000 Russian converts. Particular excitation potential, is then broadcast by pulse modulated microwave transmitter. This pulse modulated microwave beam has the ELF excitation potential frequency imprinted upon it. It was found that each behavioural set in humans had a distinctive frequency. There was one for: anger, suicide, hysteria, trauma, serial killing, paranoia, lust...etc. Intelligence operatives in the UK regularly park microwave transmitters outside targets' houses and beam specific mood inducing excitation potentials at the victims. To aid them, they have sophisticated millimetre wave scanners to look through the victims' walls, so they can see the targets' in their homes. Pulse modulated microwaves are regularly directed at the victims' brains, while other people in their homes are oblivious of what is going on. A leading conspiracy researcher, who looks into GCHQ at Cheltenham, found one of these vans, with two spheres on its roof parked in his road. When he took the number plate and through contacts checked who owned it, he found it was an MOD van. Hopefully he has found the microwave weapon system before it has done him too much harm. These microwave weapons were developed allegedly at Marconi. When firing microwave beams through walls at one specific target, every material in the way of the microwave beam attenuates or modifies the intensity and frequency of the beam. Since precise frequencies and intensities are needed for mind control, very sophisticated microwave arrays and computer programmes had to be developed so that the microwave beam could be changed in response to the materials which lay between the target and the weapon, as the victim moved around the house. To do this, the reflectivity and refractivity of the materials between victim and weapon had to be analysed in real-time and fed to a computer which could change the microwave array in concert with the changing environment between victim and weapon, as the target moved around his/her home. Secondly, there had to be an automatic interrupter if another person walked in front of the beam. The victim needed to be driven mad or disabled, without anyone else being aware that he or she was being targeted. The technology for this was very complex but eventually it was perfected. Twenty five or more scientists and military personnel, associated with the Marconi project, then died in mysterious circumstances. Intelligence personnel regularly kill people to keep them quiet. Maybe they killed the entire research team to keep such a diabolical weapon secret. For if it were made public, the scandal would bring down the government. Whatever the real story, by the mid to late eighties, all the problems had been ironed out and these new smart microwave weapons were deployed on the UK s streets. Northern Ireland would have proved the perfect place to test them out. Pulse modulated microwave weapons had now come of age. By this method, any mood or behavioural set, can be conditioned into the target's brain. Intelligence agents keep a log of the victim's behaviour to see if more intense 'treatment' is needed and as a guide for future mind control projects. It is alleged that by this method, UFO and conspiracy researchers, are routinely driven to commit suicide. having the excitation potential for suicide beamed into your brain day and night by microwave mind control weapons, soon resets the brain into a cycle of depression that spirals out of control ending in suicide. Many intelligence and technical officers in the UK, who have spilled the beans, or could be a potential leak, are driven to commit suicide by the special mind control teams run by MI5. If you look at the long list of UK military and intelligence experts who inexplicably commit suicide, one can see an underlying mind control logic that drives them to kill themselves. Behavioural reinforcement is used in a synergistic way with the mind control. It was found that the effect of the microwave beams could be greatly enhanced by external reinforcement. Intelligence community personnel destroy the target's property, ruin their financial affairs spread vicious rumour, make sexual peccadilloes public knowledge - such as wearing women s underwear, while checking oneself - with an orange in one's mouth. External reinforcement of pulse modulated microwave mind control technology was found to be very effective. Intelligence chiefs are now in seventh heaven; if some one becomes a problem they get the 'suicide mind control team' parked outside their house. Within weeks, the victim kills himself. This is very pleasing to the intelligence mandarins, as suicides are easy to explain away - even if the victim was a highly placed politician or military man. If the military intelligence agency does not wish you to commit suicide, they can drive you mad. This is done by beaming the excitation potential of a particular pathological mental state at your brain while you are at home. To aid in this, the intelligence operatives can place sounds and speech in the target victim's brain. This inter cerebral hearing is used to drive the victim mad, as no one else can hear the voices transmitted into the brain of the target. Transmission of auditory data directly into the targets' brains using microwave carrier beams is now common practise. Instead of using excitation potentials, one uses a transducer to modify the spoken word into ELF audiograms, that are then superimposed on the pulse modulated microwave beam. Discrediting well known people who are causing problems for the shadowy elite, by driving them mad, seems to be standard operating procedure for the intelligence community. Victims are subject to pulse modulated microwaves which carry different types of madness and behavioural aberrations, encoded as ELF excitation potentials. This makes the troublesome high profile person, display manic or insane behaviour that discredits them. Examples of this technique are allegedly: David Icke, Fergie, Princess Diana... Outside environmental reinforcement, by use of media agents in league with MI5, makes it assured that the high profile person's mind controlled madness, will be put in the worst possible light to discredit them. In this way, high profile subversives who cannot be wrongly imprisoned (unlike the Carl Bridgewater prisoners, Birmingham Six, Guilford Four...) in the normal way by Britain's police, or killed by assassination squads, such as the Pegasus group, are made to look ridiculous. Public humiliation is the finest weapon the authorities have, to make harmless, a potential well known figure, who is causing trouble. If the VIP needs to be made temporarily ill, microwave beams containing the signal the brain gives off during a vicious bout of flu can be fired at the victim. This causes the target to display all the symptoms of flu, even though they have not caught the virus. Major Ed Dames, the remote viewing specialist, who has close links with the US secret military, alluded to this device on a US TV programme. The intelligence agents can also use low level microwaves to cause mental and physical confusion that leads to illness. Beaming microwaves at victims makes them fatigued, damages their immune system, causes neurological damage that effects their thinking, and ability to carry out tasks, induces premature ageing, cancer and cataracts. Sussex Police regularly use this low level microwave to clear drunks from city centres. While researching this matter, I was subject to high levels of microwave >10mW/cm2 whenever I approached their headquarters, whilst MI5 irradiated my home continually with microwaves. It seems that I touched a raw nerve while researching mind control weapon usage in the UK. Organisations that irritate the authorities have their building turned into a 'hot spot' by microwave transmitters, so the staff all suffer sick building syndrome caused by microwave damage. Or the staff of the target organisation have their behaviour changed to cause discord. UFO Reality, a leading UFO and conspiracy magazine have complained of mysterious health problems, while another New Age group complained of eye damage, nausea and headaches brought on whenever they had a meeting, which may have been caused by microwaves. Heating the victim to death, by microwave cooking is caused by increasing the field intensity of the radiation, to cause local hot spots in the victims' eyes and gall bladder, which have poor circulation, so cannot carry away the heat. Irradiating the optic nerve of the victim with the same signal that is sent to the brain by this nerve, causes the nerve tissue to overload. In this way, subversives can be blinded by the intelligence community without them knowing what has occurred. An American researcher complained of this problem to me and warned me that this weapon system was being used on my person by MI5. Neurological research has found that the brain has specific frequencies for each voluntary movement called preparatory sets. When you pick up an object, there is a specific preparatory set for this action. By firing at your chest a microwave beam containing the ELF signals given off by the heart, this organ can be put into a chaotic state, the so called heart attack. In this way, high profile leaders of political parties, who are prone to heart attacks, can be killed off -before they cause any trouble. Neil Kinnock's Labour government was allegedly cheated out of an election victory by postal vote rigging in twenty key marginal seats. When a new even more electable Labour leader was found, it is rumoured that John Smith, the then Labour leader, was prompted to have a fatal heart attack, while walking in the country with his family, by means of a concealed microwave device which operated on the Vagus nerve to bring about a massive heart attack. Since MI5 have a long history of naked hatred toward the Labour Party, there may be some truth in the above, though no hard evidence has yet been found. Paralysis can be induced in the target by use of this method of broadcasting preparatory sets encoded on microwave beams. A pulse modulated microwave beam, carrying an ELF signal, which is identical to the one in the motor neurone centre of the brain, is used to jam the victim's motor co-ordination. This is analogous to radar jamming, using a more powerful signal at the same frequency to swamp out the enemy's radar. Motor neurone preparatory set potentials are jammed by a bigger signal carried by a microwave carrier beam, that literally overloads the brain, so it cannot control the body. Pulse modulated microwave weapons which broadcast the ELF preparatory sets of the motor cortex at the victim, will paralyse the victim without killing them. Breathing and heartbeat are involuntary actions controlled by another set of frequencies in another part of the brain. This technique can be used to abduct people for secret government mind control experiments, under the guise of alien abduction. A microwave beam of this nature will paralyse the victim, so they can be bundled into a black helicopter and airlifted away for experimentation. Once the procedure is complete, hypnosis can be used to plant false memories of alien abduction. In this way, real alien abductions can be used by the authorities to enable them to obtain a limitless supply of guinea pigs for their mind control experiments. Real memories of government involvement are erased electronically. This technique clears all short-term memories from the victim's consciousness by broadcasting microwave beams at the target which carry the signals used for memory retention. When you remember something, it is first stored in your short-term memory. After approximately twelve hours, this short-term memory is converted in the brain to long-term memory, after which you remember this information for the rest of your life. If this conversion from short-term memory to long-term memory does not occur, the data is lost. We all see details around us, but try to recall the decor in a restaurant you ate at some weeks ago and you will see how tenuous memory is. Microwave radiation of a specific frequency can interfere with the transfer of memories from short to long-term memory. Microwave radiation of a specific frequency can interfere with the synapses of the brain. By interfering with the connections between brain cells, memory of people can be disrupted. In this way, Seal special forces assassins can be brain wiped after a mission, so they have no idea of the target they killed. Using hypnosis, false memories can then be planted in the brain, so the gap left by the real memory is papered over. The latest advance in electronic mind control were discussed in my previous articles in Nexus, but for those who missed the ESP of Espionage, this equipment uses special types of microwave beams called MASERs. These are the laser equivalent of microwave beams. These MASER beams have been used to develop something called synthetic telepathy. This is the ability to read peoples' minds from a distance. Electronic scanning of victims' brains by monitoring the electromagnetic (EM) emissions from peoples' brains and using amongst other things, the brain waves (as measured on an EEG), to read the victim's subvocalised thoughts. Head of US Special Forces Major-General Schaknow, talked about synthetic telepathy during a lecture in July 1992 at Fort Bragg North Carolina. The US military is hard at work perfecting synthetic telepathy. In synthetic telepathy, the weak electromagnetic signals in the brain associated with subvocalised thought, are connected to a computer by use of electrodes, or in more advanced mechanisms by MASER beams. Sophisticated computer systems have learnt to read the subvocalised thoughts in the brain, by associating a specific brain excitation potential, with a particular word. In this case, only one specific language can be decoded, as each word in a language has a specific set of frequencies that must be discovered. Once the donkey work of finding the specific frequencies for all the words in a language has been programmed into a super computer, which can carry out massive parallel processing, fuzzy logic software is used to match this with real world excitation potential associated with subvocalised thought obtained from thousands of abductees, who are used to calibrate the synthetic telepathy devices. GCHQ Cheltenham, the intelligence gathering arm of MI5, possess the advanced computer systems needed for synthetic telepathy. Synthetic telepathy detects the l5Hz, 5 milliwatt auditory cortex brain emissions, that are linked with the excitation potentials in the brain associated with subvocalised thought. New technology, involving low frequency microwaves and RF, has enabled devices to be built which can scan through walls and look inside peoples' bodies like X-rays. This enables security personnel to see a target in his own home and to track him throughout the house. Further to this, being able to see inside the victim's head, would allow computer controlled targeting of specific brain centres in the victim's brain, even when he was walking around the house. A scan of the specific brain emissions given off when the victim subvocalises using an array of pulsed frequency MASERs fired at the specific brain centres of the subversive, while he resides in his own home, enables the victim to be scanned. By firing an array of ELF pulse modulated MASERs, which scan up and down the window of frequency emissions given off by subvocalised thought, interference effects can be measured in the MASER beam. The victim's ELF brain emissions will interact constructively or destructively with the pulsed frequency MASER carrying ELF in the ELF window associated with subvocalised thoughts. If we fire an array of pulsed MASERs, which are out of phase with each other, extraneous noise can be filtered out in the digital domain. Since the converging ELF modulated MASERs are being effected by the low level emissions in the victim's brain, the shifts in the ELF pulsed signal going into the subversive's brain can be detected. A simplistic version of this would be the LASER beam shone at the window of the person that is being bugged. The vibrations in the window cause modulations in the LASER that can be converted into electrical signals and hence into sound. In this way the subvocalised thoughts in the victim's brain can be read. Having already built up a library of excitation potential signatures for differing words and groupings of words, a sophisticated computer can begin to decode the emission signatures into word streams. In this way the subvocalised thoughts of the victim can be stored in the memory of a supercomputer and analysed to give a read out of what the target is thinking.. Using ELF audiograms carried by a single pulse-modulated Maser, subvocalised thoughts can be placed in the victim's brain. This enables UK synthetic telepathy operators the ability to enter into conversations with the subversive to drive him mad or to bring up key words which will get the victim thinking about the information they wish to find. Visual cortex excitation potentials can also be broadcast into the victim's brain so that illusory images can be projected into their brain to drive them mad, or to programme them to commit suicide. My research has led me to uncover a truly nation-wide mind control weapon system. Each UK police station is equipped with a vast array of microwave antennae. The Sussex Police headquarters has a two hundred foot antenna. The building is surrounded by a fence and is off limits to the public. This microwave complex sits in the middle of a council housing estate, which means the people in this area are being bathed in low level microwaves. New research has shown that low level microwaves give mice cancer, since the emitters tested by the scientists, were the new ultra safe mobile phones which give of much smaller intensities than the police antennae, the Police microwave system is a serious health hazard. It seems that low level microwave radiation excites the hydrogen bonds in the cell and can interfere with meiosis. This causes cell division to go wrong, which leads to cancerous cells and hence tumours. Secondly, the police have been granted the exclusive use of the 450 MHz microwave frequency range. This is exactly the frequency used by Dr Ross Adey, the CIA mind control expert, in his experiments on behavioural modification. It seems the police have the exclusive use of this mind control frequency and a vast array of antennae to broadcast this frequency all over the country. Very useful for mass mind control in times of emergency. Adey found that by using 0.75mW/cm2 intensity of pulse modulated microwave at a frequency of 450 MHz, it was discovered that an ELF modulation could be used to control all aspects of human behaviour. The Sussex police headquarters is connected to CCTV, closed circuit television cameras throughout the town. Some of these cameras have microwave telemetry devices that could easily be used to broadcast this frequency. The large antennae that bracket the town could also be used. The most insidious aspect of this, is that the entire mobile phone network could easily be used to control the behaviour of the phone users. By use of my microwave detector, I have found that mobile phones of the newer type, give off a pulse modulated microwave signal of around 0.75mW/cm2 at the earpiece. This may be coincidence, but it is exactly the intensity required form behavioural control as found by Dr Ross Adey, the pioneer of microwave mind control. So in theory, an ELF signal could be added to the microwave network to feed a precise behavioural pattern into every mobile phone user in the UK. If their were widespread riots, the ability to broadcast behavioural stimuli to mollify all the mobile phone users in the country would prove useful. Since mobile phone users are generally middle class, it means authority has a useful method of controlling the behaviour of the key voters. Microwave carrier beams are perfect for transmitting the excitation potential of docility to the phone user to keep them servile in times of trouble. When no ELF signal is broadcast the phone acts in a completely different manner on behaviour in humans. In this case the microwave phones causes the neurones to release calcium ions which makes the user tired irritable and when stresses likely to emotional outbursts such as road rage. In Brighton, the local MI5 headquarters has a large microwave array on its roof. Secret bunkers in the area also have large microwave arrays above them. It is child's play to transmit an ELF modulated signal to be broadcast by the entire mobile phone network - if need be. By this means the entire mobile phone users can be behaviourally modified. At the cost of developing cancer from low level microwave exposure from the phones they constantly use, stressing the neural network by constant calcium ion efflux and interference with bioelectric fields. It seems strange that a few milliCuries of ionising radiation will get the National Radiological Protection Board excited, whilst high intensity cancer inducing non ionising microwave radiation, goes unchecked. So high are levels near transmitters, that litter the countryside, that light bulbs will explode near them. If the intelligence community is using microwaves on a large scale as mass mind control weapons, then the NRPB's silence is easily explainable. To add to this, the numerous microwave detectors that were cheaply available to check leakage from microwave ovens are no longer made by any company in the country. It seems the UK authorities do not want the population to be able to detect when they are being microwave. In conclusion, it can be seen that the UK intelligence and police, have a dizzy array of high-tech mind control devices. They regularly target their own populations and thousands of people are made ill by microwave weapons. With the advent of synthetic telepathy, 'CCTV of the mind' becomes a reality. With the election of a New Labour government unaware of microwave weapons and untainted, as they had no part in their development and deployment, it is certain that Tony Blair's government will outlaw these abhorrent microwave weapons - as they have done land mines. The only problem will be convincing the Labour government that MI5's microwave communication equipment is in fact microwave mind control weaponry. With the total secrecy the MI5 organisation operates under, one can be sure they will be mendacious as to how their £200 million pound budget is used to hone their leading edge microwave mind control torture weapons that are used on the public. Even more disturbing is the use of EMP and microwave weapons by the police on anyone researching into this area. REFERENCES ELECTRONIC MlND CONTROL [1] Non-Lethality: John B Alexander, the Pentagon's Penguin, by Armen Victorian, Lobster June 1993. This is an excellent article on the US black government's 'hard-man' of the mind control world -recommended for those who really would like to know how these people think and work. UFO Reality No 1-3, Jon King, Mind Control. Mind Control and UFO's, by Alex Constantine, Feb 1996. [2] UFO Reality No 4. [3] Enigma Vol 2, It's All In The Mind, T Rifat. [4] Ross W Adey: Neurophysiologic Effects of Radiofrequency and Microwave Radiation, Bulletin of the New York Academy of Medicine, Vo1.55 No 1 1, Dec 1979; The Influences of Impressed Electrical Fields at EEG Frequencies on Brain and Behaviour, in Behaviour and Brain Electrical Activity, Burch, N and Altshuler, H.I., eds, Plenum press, 1975; Effects of Modulated Very High Frequency Fields on Specific Brain Rhythms in Cats, Brain Research, Vol 58, 1973; Spectral Analysis of Low Frequency Components in the Electrical Activity of the Hippocampus During Learning, Electroencephalography and Clinical Neurophysiology, Vol 23, 1967. Dr Ross Adey, formally of the Brain Research centre at the University of Southern California, Los Angeles, now at Loma Linda University Medical School, Loma Linda, California. He worked on the CIA Pandora Project and was concerned with inducing specific behaviour modification by electromagnetic means as well as induction of calcium efflux events to interfere with brain function - the so called 'confusion weaponry'. C.S. Blackman is a researcher who worked in the US on theoretical research that underlies the electronic RMCT devices now deployed world-wide. Electronics World and Wireless World: The healing face of electromagnetic fields; 1993. [5]. Martin Cannon, The Controllers. [6]. Secret and Suppressed, Jim Keith. [7]. Psychic Dictatorship in the USA, Alex Constantine. [8]. Encounters, Vol 7, Psi Spies, Marie-Louise Small. Cosmic Top Secret: America's Secret UFO Program,1992 William Hamilton III. [9] Encounters, Vol 10, Room with a Remote View, by Richard Forsyth. This is an article about the author. http://www.fastnet.co.uk/pms; Paranormal Management Systems' web site. For an information pack on RV/RI, send £3 plus a SAE to PMS, PO Box 2749, Brighton, BN2 2DR, UK. Correspondence and normal courses are available, phone 01273 690424 to book for courses. We also offer consultancy on mind control problems. Nexus Vol 3 No 6, Remote Viewing: The ESP of Espionage, by T Rifat. Nexus Vol 4 No 1 The Esp of Espionage, Part 1, by T Rifat. Nexus Vol 4 No 2, The Esp of Espionage, by T Rifat. These three articles cover the theory of RV, RI and ESP in very great detail. recommended for the serious RV/RI student. For more information contact the author. Alien Encounters No 1 1 Alien and Government Mind control, T Rifat. Sightings Nol2, Losing Your Mind! Mind control Technology, by T Rifat. UFO Reality No 8, Mind Control, Big Brother Is All In The Mind, T Rifat. Enigma 6, Mind Control, by T Rifat. Fortean Times 95, Police State of Mind, by David Guyatt. US Synthetic Telepathy info supplied by David Guyatt. Guyatt, David. "Some Aspects of Antipersonnel Electromagnetic Weapons (paper prepared for ICRC Symposium for the medical profession. --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za 5497 From: Secdep Date: Tue May 28, 2002 3:40am Subject: Detecting Internal Keyboard Key Catcher Does anyone in this group know how to detect '"Key Catchers'" installed inside a keyboard, other than having to open each keyboard & physically checking. KeyGhost II Security Keyboard Professional SE: This is an ordinary keyboard with a KeyGhost Pro SE (2,000,000 keystroke memory) hidden inside (available in flat PS/2 or Natural style keyboard). It looks and feels exactly like any ordinary keyboard. It may be used as an extra security control where the user does not want a visible KeyGhost Pro SE attached to the back of their computer. It is ideal for use in organisations that require constant, uninterrupted and transparent long-term monitoring of any number of computers. For protection of your data, keystrokes are encrypted (128 bit) and stored. Retail Price: $US 409.00Natural Style or $399.00 Quality PS/2 Style READ MORE>> http://www.keyghost.com/newproducts.htm Raymond --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za 5498 From: William Knowles Date: Tue May 28, 2002 3:50am Subject: Re: Detecting Internal Keyboard Key Catcher On Tue, 28 May 2002, Secdep wrote: The simple way around this is to make it policy that keyboards are issued to each user, tagged, and will be taken home at night by the user. If Martha in accounting shows up for work one day with a new keyboard on her desk, but Martha's is still in her bag, that might raise a little suspicion. Cheers! William Knowles wk@c... > Does anyone in this group know how to detect '"Key Catchers'" > installed inside a keyboard, other than having to open each keyboard > & physically checking. > > KeyGhost II Security Keyboard Professional SE: This is an ordinary > keyboard with a KeyGhost Pro SE (2,000,000 keystroke memory) hidden > inside (available in flat PS/2 or Natural style keyboard). It looks > and feels exactly like any ordinary keyboard. It may be used as an > extra security control where the user does not want a visible > KeyGhost Pro SE attached to the back of their computer. It is ideal > for use in organisations that require constant, uninterrupted and > transparent long-term monitoring of any number of computers. For > protection of your data, keystrokes are encrypted (128 bit) and > stored. Retail Price: $US 409.00Natural Style or $399.00 Quality > PS/2 Style READ MORE>> > > http://www.keyghost.com/newproducts.htm *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 5499 From: Steve Fulton Date: Tue May 28, 2002 0:21am Subject: Re: MICROWAVE MIND CONTROL!!!!!!!! At 07:00 28/05/2002 +0200, Secdep wrote: Passed onto me by my one client... Two points: 1. Proper netiquette involves sourcing the article, and quoting a small portion. Please don't waste list members bandwidth by posting an entire article, especially one of that length. 2. This is a TCSM list, not one for pseudo-scientific conspiracy theories populated by people who went off their medication. Again, stop wasting list members bandwidth. -- Steve. 5500 From: James M. Atkinson Date: Tue May 28, 2002 8:05am Subject: Re: MICROWAVE MIND CONTROL!!!!!!!! I apologize for having to say this, but most of the article is complete fantasy, and the author is obviously paranoid and delusionary. If the articles author would simply take is psychiatric medications, the voices in his head and other problems would stop. -jma At 7:00 AM +0200 5/28/02, Secdep wrote: >Passed onto me by my one client. > >http://www.vegan.swinternet.co.uk/articles/conspiracies/mw_mindcontrol.html > >MICROWAVE MIND CONTROL > >MICROWAVE PHONES - ARE THEY KILLING US? >As a scientist researching into microwave weapons used on the general >public, evidence that the GM900 microwave network as used by Vodaphone and >British Telecom, is a major health hazard, has come to my attention. Defence >Intelligence Agency (DIA) documents entitled: Biological Effects Of >Electromagnetic Radiation (Radiowaves and Microwaves) Eurasian Communist >Countries, show that microwave frequencies similar to those of the cellular >phones can cause health problems in the following areas: > > a.. Blood. > b.. Cardiovascular System. > c.. Cells. > d.. Central Nervous System. > e.. Digestive System. > f.. Glands. > g.. Metabolism. > h.. Reproduction. > i.. Visual System. > j.. Internal Sound Perception. >Equipment to test the frequency and intensity of microwave phones shows that >they produce signals similar to microwave ovens. Two Vodaphone cellular >phones were producing 100mW/cm2 and 50 mW/cm2 respectively. The danger level >for microwave ovens is 5mW/cm2 and the Russians regularly used 10 mW/cm2 for >weapon research. These Vodaphones will therefore cause significant health >problems if used. A variety of cell phones can be tested to see how >dangerous they are. > >The GM1800 system used by Orange uses higher frequency microwaves. >Australian scientists found this caused cancer in mice exposed to radiation >of this type. The documents in my possession show that microwaves pass >deeply into the body and can have a negative effect on the brain and body. > >The DIA research dates from 1976 and shows the dangers were known about over >twenty years ago. The Soviets used the frequencies and intensities used by >mobile phones, 1800 MHz and 900 MHz, as weapons. It is a rule of the >intelligence community that you hide things in plain view, getting the >public to accept microwave mind control weapons which effect their behaviour >under the guise of mobile phones was a stroke of genius. Getting the public >to pay for these microwave mind control devices, so their brains and >behaviour can be damaged, to make them more docile and easy to control, was >pure diabolical genius. > >UK INTELLIGENCE FORCES AND MICROWAVE MIND CONTROL >Microwave weapons that turn people into stressed, confused, submissive >zombies are being used in Britain's inner cities. Developed by the >communists, microwave weapons similar to microwave ovens have since the >1980s, been targeted on inner city council estates. These weapons transmit >extremely low frequency (ELF) signals which mimic natural brain waves; at >the flick of a switch, all the people around these microwave transmitters >are turned into submissive zombies who cannot think clearly, become >depressed, apathetic and want to lounge around all day doing nothing: the >inner city malaise found on Britain's streets. With the advent of new ELF >detectors designed by the author's research teams, the mass mind control of >the metropolitan UK population can be proved. ELF signals are officially >only found at nuclear submarine communication stations, so the researchers >were shocked to find microwave and UHF, mind control signals in city >centres, the author's flat, being sent through mobile phones, the BT >telephones and from the numerous transmitters that dot the country. > >The massive increase in mobile phones has enabled the UK security forces to >use this network of transmitters to beam mind control signals into the >brains of anyone living near these transmitters. Microwave phones use pulse >modulated microwaves of the correct intensity to pass through the skull into >the brain and control behaviour. Microwave transmitters are therefore the >perfect medium for the transmission of ELF signals to mind control the UK >population. > >Researchers are of the opinion that the inner city riots of the early >eighties forced the Thatcher regime to deploy ELF mind control devices >developed in the 1970s to turn the working class housing estates into total >policing zones. In these zones, ELF transmitters turned the inhabitants into >docile zombies. So successful was this technology that it was expanded to >cover all major towns. Mass mind control of the UK public to make them >submissive and obey authority was expanded, hand-in-hand with the mobile >phone network and military and police microwave transmitters. Now the entire >London conurbation is covered by UHF and microwave carrying mind numbing >ELF. > >Research into the use of microwave weapons and their use for mind control >began in 1950s at the Tavistock Institute, one of Britain's leading >psychiatric research establishments. The UK institute was researching into >ways of mind controlling the British population without them knowing. The >monkey submission response, whereby the dominant monkey caused submissive >behaviour in the underlings, was the brain state of most interest to the >British scientists. Having found this specific brain rhythm for docile >submissive, zombie-like behaviour, it was then recorded and used as the >template for the ELF signal beamed on UK microwave transmitters. Britain was >the first discoverer of microwave technology, used for radar, in the 1940s >and therefore had a commanding lead over everyone else in this field. > >The 1970s brought a darker side to the story, with the news that the >Russians were microwaving the US embassy in Moscow. One third of the staff >eventually died of cancer from this microwave irradiation. Australian >scientists proved in 1997, that tiny amounts of microwave produced by the >very safest mobile phones, cause cancer in mice, when exposed to this >radiation. Greenham Common was the first time that the Ministry of Defence >was involved in the offensive microwaving of women protesters, the so called >Greenham Common Women. This event showed that the UK security forces were >willing to use lethal doses of microwave radiation on large groups of the >general public. Equipment showed that the women peace protesters were >subject to high levels of microwave radiation, some of them have >subsequently died from cancer. Northern Ireland would have been a perfect >proving ground for mass mind control technology. Research at the Tavistock >institute enabled the Thatcher government to put into large scale use, the >frequency which causes submission in humans. Radiating this ELF frequency on >microwave transmitters, cellphones, BT phones and by use of other >transmitters, the inner city population can be behaviourally controlled. My >research group have ELF detectors, which can prove all manner of UK >transmitters are being used to mind control the population. Since ELF is not >found naturally, and is only used for nuclear submarine communication, its >presence proves mind control weapons are being used on the general public. >The author also has access to scientific documents showing the devastating >effects of ELF broadcast by microwave, UHF and VHF on humans. > >It is alleged that Marconi put this microwave technology into full scale >production, and around thirty scientists and military personnel on the >project who began to ask questions committed `suicide' under mysterious >circumstances. > >My research has found that microwave weapons are targeted on middle class >troublemakers and researchers who cause problems for the establishment. >Russian and American research has found that pulse modulated microwaves (as >used for mobile phones) can, when modulated with ELF which mimics specific >brain patterns change the behaviour of the victim at the flick of a switch. >It has been found that UK security police, such as MI5 use the 450 MHz >frequency used for this research (legally allowed to be used by the police) >for behavioural control. A vast catalogue of mind control frequencies in the >MHz range, FM radio, TV and mobile phone frequencies, have been measured, >which are used in the UK for mind control and killing or disabling victims: >147, 153, 197, 199, 447, 453, 456, 466, 853, 883, 884, 887... Symptoms can >be depression, befuddled thinking, loss of memory, stress, not being able to >cope, manic behaviour, schizophrenia, nervous breakdowns, physical collapse, >brain and nervous system damage, heart attacks, cancer... > >An example was Brighton police van, parked outside the Brighton Pavilion >which was used to beam UHF and microwaves at vagrants to clear them from the >area. All Brighton's city centres are bombarded with microwaves when >vagrants congregate to make them so ill they have to flee. The Evening Argus >newspaper asked the police if the white van which was parked in the Brighton >Pavilion grounds for months, was their van, they replied it was one of their >'surveillance' vehicles. On Wednesday, 4th of February the author was >passing Brighton Police station with a frequency counter which detects >microwave weapons, and I detected a 452 MHz microwave beam being directed at >two young offenders sitting on a wall opposite the station. I confronted the >police with the reading, Robert Galloway, spokesperson for the police >stated, "they were not interested in microwaves even if they were a danger >to health." The author has uncovered widespread use of microwave weapons in >Brighton by the police and MI5 as a test programme to clear vagrants from >the city centre. > >Contacting researchers in this field of enquiry, they all complain of >microwave-like symptoms, headache, nausea, giddiness, eye damage, ear >problems... Readings I have taken show that the 750-1000 MHz range is used >by the intelligence services for inducing nervous and physical collapse. >Microwave ovens give off 1000 MHz. > >On the Channel 4 programme, For the Love of.New World Order, shown on Monday >night at 12pm, on April 6th, the author revealed some of these facts on >television. The presenter, and researchers of this programme complained of >severe headaches in the days preceding filming symptomatic of microwave >attack. As the foremost non-military expert microwave weapons, remote >viewing (psychic spying) and Psi-warfare, the author became aware of the >microwave problem when he was targeted to stop his forthcoming book on >remote viewing being released. This book on psychic spying, published by >Century Books, is the first book by a scientist on the subject of >Psi-warfare and the techniques the superpowers developed. > >Subsequent to the filming of the Channel 4 programme, he was arrested by >Brighton Police on February I5th outside their building and his frequency >counter was confiscated to stop him recording the use of microwave weapons >around the police station and in public places around the town. Even though >no law was broken. It appears Brighton Police are worried that their use of >microwave weapons on Brighton's vagrants is coming to light. The UK >government has also bought up all the readily available frequency counters, >these being the Watson FC-128 frequency counters, and the Optotronic >devices, and the manufacturers now market a 'modified' model, which most >probably has a digital filter so that the microwave weapon frequencies given >above, cannot be shown. The author's frequency counter has still not been >returned. With such high-level manipulation of events it seems that >microwave mind control is part of a secret policy which is being practised >on the general public in this county. As part of a covert government policy >of harassing and disabling critics, this means of attack is not covered by >the law and highly deniable, the perfect intelligence device for civilian >control. The author's flat is targeted with a 900 MHz beam which seems to be >designed to cause massive neurological damage and produce tumours. > >The BT phone network has the potential to be used for docilisation of the UK >public. A 30-40 MHz signal is carried by the phone. When the earpiece is >placed against the head, bone conduction carries the ELF component into the >brain of the phone user. A ELF signal which can effect behaviour or health >is therefore passed into all BT phone users. It appears from experts I have >consulted on the subject that the digital phones have been designed to carry >this mind control carrier frequency. Vodaphone have supplied a mobile phone >to a friend of mine that pumps out an 847 MHz signal at over 100 mW/cm2, >this is equivalent to 4x100 watt lightbulbs being turned on in the body of >the user. This means that mobile phones can potentially be used to kill or >so disable a person they no longer become a problem to the establishment. >Another Vodaphone tested pumped out 50 mW/cm2. UK safe levels for microwave >ovens are 5 mW/cm2 - which are not held near the head. There are reports by >military researchers that 1 mW/cm2 will cause swelling of nerve cells >exposed to microwave. > >It is obvious that a total policing of the population by means of UHF, VHF, >and microwave EM radiation, amongst others, is being used to keep the UK >population in a docile and submissive mental state. Mental confusion can >also be added to the signal for working class inner city areas to keep them >docile and confused. A land of stultified zombies, who are mind controlled >to make them docile and unable to think clearly. Subversives are habitually >targeted with microwaves to drive them mad or make them fatally ill > >On July 4th 1976 seven giant transmitters in the Ukraine, powered by the >Chernobyl nuclear facility, pumped a 100 megawatt radio frequency at the >West, which contained a 10 Hz ELF mind control frequency. According to a US >scientist, Dr. Andrija Puharich, MD, the soviet pulses covered the human >brain frequencies. With a Dr. Bob Beck Andrija proved that the Soviet >transmissions were a weapon. He found that a 6.66 Hz frequency would cause >depression and an 11 Hz signal would cause manic and riotous behaviour. >transmissions could indeed entrain the human brain, and thereby induce >behavioural modification populations can be mind controlled en masse by ELF >transmissions. More importantly he found that an ELF signal could cause >cancer at the flick of a switch. It did this by modifying the function of >the RNA transferases so that amino acid sequences are scrambled and produce >unnatural proteins. > >MIND CONTROL >Torture is alive and well in the UK. MI5, the UK's secret police, regularly >use Non-Lethal Weapons on any dissidents. Since MI5 have a well documented >history of hating the Labour Party, and were instrumental in bringing down >the Labour Prime Minister Harold Wilson, they naturally took to spying on, >and discrediting, any group or person who did not follow their rabid right >wing dogma. When Margaret Thatcher became Prime Minister of a right wing >Conservative Government in 1979, she soon saw the power in recruiting MI5 to >be her own secret police. During the Miner's strike in the early eighties, >Arthur Scargill and his National Union of Miners nearly brought the >Conservative Government down, with their year long strike. Margaret Thatcher >used MI5 to spy on the Miners and to discredit Arthur Scargill. Leading >police officers argued against the use of MI5 on the civilian population, >they were ignored or replaced - if they proved too vociferous. > >Margaret Thatcher was the first Prime Minister for many a year to sit in on >the Joint Intelligence Committee's meetings on a regular basis. Thatcher, as >a trained scientist, would have been well aware of the usefulness of >microwave weapons. They are impossible to detect unless you have a detector, >dissidents have no idea these weapons exist, and best of all, they are >totally deniable. It may be that MI5 kept this research secret from Margaret >Thatcher, but the resources the UK has put into these fearsome, so-called >non-lethal weapons, is extensive. UK intelligence runs a fleet of microwave >weapon carrying vans, as well as portable microwave weapons that can be >deployed near the dissident's home. The vast expense can be disguised as >communications equipment, for as we all know, microwave telephone >communication is all the rage in our modern world. My research shows that >the microwave telephone network also has the potential to be used as a major >mind control weapon system to control the behaviour of the microwave phone >users. > >Developed under the Conservative government, which was in power from >1979-97. The UK secret, or 'black' government, has at its disposal a >fearsome array of mind control weapons. These abhorrent devices are >euphemistically called 'non-lethal weapons' by the UK military. In fact they >kill you slowly by causing: nerve damage, cancers, mental collapse leading >to suicides, or tissue failure, such as heart attacks due to the cooking >effect of microwaves. > >Precisely modulated microwave radiation is used to influence brain function. >Human behaviour and reactions can be entirely controlled by using pulse >modulated microwave EM radiation. Pulse modulated microwaves are useful as >the carrier for the mind control signals as they are able to pass through >the skull, which is rather resistant to low level EM. The massive number of >microwave antennae that dot the country, some of which are used for the >microwave phone network, all use pulse modulated microwaves, which makes >their use for a strategic mind control device against the civilian >population in times of trouble, or rioting, crucial to modifying the >behaviour of the general population. In modern democracies it is no longer >viable to shoot rioters, or torture dissidents by normal means, as the bad >publicity is self defeating. Thus, microwave weapons have been developed by >the UK's military intelligence as they leave no marks, or gaping wounds. >This pulse modulated microwave carrier beam can then be used to carry >signals. These signals are extremely low frequency recordings of brain >electrical potentials, which have been recorded by neuro-medical researchers >such as Dr Ross Adey. > >Dr Ross Adey's research at the Brain Research Institute of the University of >California, was funded by the CIA. In their Pandora project a catalogue of >different brain signals for specific actions, emotions and pathological >states of mind were recorded. It was found that when microwaves were used to >fire these signals at victims' brains, they experienced the moods, >behaviour, and the pathological states, carried by the signals. This meant >that by mimicking natural brain frequencies, the human brain could be >controlled remotely by use of extremely low frequency broadcast carried by >pulse modulated microwave beams (ELF pulse modulated microwave remote mind >control technology). > >It is now possible to broadcast mind control commands directly into the >brain by use of microwave beams. All that is needed is a catalogue of every >specific brain frequency for each: mood, action and thought. These >catalogues of excitation potentials are available from Russian neuro-medical >research institutes, so any one with enough cash can have the same >technology at their disposal, as UK military mind control groups (the >psychological-enforcement arm of MI5). The Aum sect bought microwave >weaponry via their 50,000 Russian converts. > >Particular excitation potential, is then broadcast by pulse modulated >microwave transmitter. This pulse modulated microwave beam has the ELF >excitation potential frequency imprinted upon it. It was found that each >behavioural set in humans had a distinctive frequency. There was one for: >anger, suicide, hysteria, trauma, serial killing, paranoia, lust...etc. >Intelligence operatives in the UK regularly park microwave transmitters >outside targets' houses and beam specific mood inducing excitation >potentials at the victims. To aid them, they have sophisticated millimetre >wave scanners to look through the victims' walls, so they can see the >targets' in their homes. Pulse modulated microwaves are regularly directed >at the victims' brains, while other people in their homes are oblivious of >what is going on. A leading conspiracy researcher, who looks into GCHQ at >Cheltenham, found one of these vans, with two spheres on its roof parked in >his road. When he took the number plate and through contacts checked who >owned it, he found it was an MOD van. Hopefully he has found the microwave >weapon system before it has done him too much harm. > >These microwave weapons were developed allegedly at Marconi. When firing >microwave beams through walls at one specific target, every material in the >way of the microwave beam attenuates or modifies the intensity and frequency >of the beam. Since precise frequencies and intensities are needed for mind >control, very sophisticated microwave arrays and computer programmes had to >be developed so that the microwave beam could be changed in response to the >materials which lay between the target and the weapon, as the victim moved >around the house. To do this, the reflectivity and refractivity of the >materials between victim and weapon had to be analysed in real-time and fed >to a computer which could change the microwave array in concert with the >changing environment between victim and weapon, as the target moved around >his/her home. Secondly, there had to be an automatic interrupter if another >person walked in front of the beam. The victim needed to be driven mad or >disabled, without anyone else being aware that he or she was being targeted. >The technology for this was very complex but eventually it was perfected. >Twenty five or more scientists and military personnel, associated with the >Marconi project, then died in mysterious circumstances. Intelligence >personnel regularly kill people to keep them quiet. Maybe they killed the >entire research team to keep such a diabolical weapon secret. For if it were >made public, the scandal would bring down the government. Whatever the real >story, by the mid to late eighties, all the problems had been ironed out and >these new smart microwave weapons were deployed on the UK s streets. >Northern Ireland would have proved the perfect place to test them out. Pulse >modulated microwave weapons had now come of age. > >By this method, any mood or behavioural set, can be conditioned into the >target's brain. Intelligence agents keep a log of the victim's behaviour to >see if more intense 'treatment' is needed and as a guide for future mind >control projects. It is alleged that by this method, UFO and conspiracy >researchers, are routinely driven to commit suicide. having the excitation >potential for suicide beamed into your brain day and night by microwave mind >control weapons, soon resets the brain into a cycle of depression that >spirals out of control ending in suicide. Many intelligence and technical >officers in the UK, who have spilled the beans, or could be a potential >leak, are driven to commit suicide by the special mind control teams run by >MI5. If you look at the long list of UK military and intelligence experts >who inexplicably commit suicide, one can see an underlying mind control >logic that drives them to kill themselves. > >Behavioural reinforcement is used in a synergistic way with the mind >control. It was found that the effect of the microwave beams could be >greatly enhanced by external reinforcement. Intelligence community personnel >destroy the target's property, ruin their financial affairs spread vicious >rumour, make sexual peccadilloes public knowledge - such as wearing women s >underwear, while checking oneself - with an orange in one's mouth. External >reinforcement of pulse modulated microwave mind control technology was found >to be very effective. Intelligence chiefs are now in seventh heaven; if some >one becomes a problem they get the 'suicide mind control team' parked >outside their house. Within weeks, the victim kills himself. This is very >pleasing to the intelligence mandarins, as suicides are easy to explain >away - even if the victim was a highly placed politician or military man. > >If the military intelligence agency does not wish you to commit suicide, >they can drive you mad. This is done by beaming the excitation potential of >a particular pathological mental state at your brain while you are at home. >To aid in this, the intelligence operatives can place sounds and speech in >the target victim's brain. This inter cerebral hearing is used to drive the >victim mad, as no one else can hear the voices transmitted into the brain of >the target. Transmission of auditory data directly into the targets' brains >using microwave carrier beams is now common practise. Instead of using >excitation potentials, one uses a transducer to modify the spoken word into >ELF audiograms, that are then superimposed on the pulse modulated microwave >beam. > >Discrediting well known people who are causing problems for the shadowy >elite, by driving them mad, seems to be standard operating procedure for the >intelligence community. Victims are subject to pulse modulated microwaves >which carry different types of madness and behavioural aberrations, encoded >as ELF excitation potentials. This makes the troublesome high profile >person, display manic or insane behaviour that discredits them. Examples of >this technique are allegedly: David Icke, Fergie, Princess Diana... Outside >environmental reinforcement, by use of media agents in league with MI5, >makes it assured that the high profile person's mind controlled madness, >will be put in the worst possible light to discredit them. In this way, high >profile subversives who cannot be wrongly imprisoned (unlike the Carl >Bridgewater prisoners, Birmingham Six, Guilford Four...) in the normal way >by Britain's police, or killed by assassination squads, such as the Pegasus >group, are made to look ridiculous. Public humiliation is the finest weapon >the authorities have, to make harmless, a potential well known figure, who >is causing trouble. > >If the VIP needs to be made temporarily ill, microwave beams containing the >signal the brain gives off during a vicious bout of flu can be fired at the >victim. This causes the target to display all the symptoms of flu, even >though they have not caught the virus. Major Ed Dames, the remote viewing >specialist, who has close links with the US secret military, alluded to this >device on a US TV programme. > >The intelligence agents can also use low level microwaves to cause mental >and physical confusion that leads to illness. Beaming microwaves at victims >makes them fatigued, damages their immune system, causes neurological damage >that effects their thinking, and ability to carry out tasks, induces >premature ageing, cancer and cataracts. Sussex Police regularly use this low >level microwave to clear drunks from city centres. While researching this >matter, I was subject to high levels of microwave >10mW/cm2 whenever I >approached their headquarters, whilst MI5 irradiated my home continually >with microwaves. It seems that I touched a raw nerve while researching mind >control weapon usage in the UK. > >Organisations that irritate the authorities have their building turned into >a 'hot spot' by microwave transmitters, so the staff all suffer sick >building syndrome caused by microwave damage. Or the staff of the target >organisation have their behaviour changed to cause discord. UFO Reality, a >leading UFO and conspiracy magazine have complained of mysterious health >problems, while another New Age group complained of eye damage, nausea and >headaches brought on whenever they had a meeting, which may have been caused >by microwaves. > >Heating the victim to death, by microwave cooking is caused by increasing >the field intensity of the radiation, to cause local hot spots in the >victims' eyes and gall bladder, which have poor circulation, so cannot carry >away the heat. > >Irradiating the optic nerve of the victim with the same signal that is sent >to the brain by this nerve, causes the nerve tissue to overload. In this >way, subversives can be blinded by the intelligence community without them >knowing what has occurred. An American researcher complained of this problem >to me and warned me that this weapon system was being used on my person by >MI5. > >Neurological research has found that the brain has specific frequencies for >each voluntary movement called preparatory sets. When you pick up an object, >there is a specific preparatory set for this action. By firing at your chest >a microwave beam containing the ELF signals given off by the heart, this >organ can be put into a chaotic state, the so called heart attack. In this >way, high profile leaders of political parties, who are prone to heart >attacks, can be killed off -before they cause any trouble. Neil Kinnock's >Labour government was allegedly cheated out of an election victory by postal >vote rigging in twenty key marginal seats. When a new even more electable >Labour leader was found, it is rumoured that John Smith, the then Labour >leader, was prompted to have a fatal heart attack, while walking in the >country with his family, by means of a concealed microwave device which >operated on the Vagus nerve to bring about a massive heart attack. Since MI5 >have a long history of naked hatred toward the Labour Party, there may be >some truth in the above, though no hard evidence has yet been found. > >Paralysis can be induced in the target by use of this method of broadcasting >preparatory sets encoded on microwave beams. A pulse modulated microwave >beam, carrying an ELF signal, which is identical to the one in the motor >neurone centre of the brain, is used to jam the victim's motor >co-ordination. This is analogous to radar jamming, using a more powerful >signal at the same frequency to swamp out the enemy's radar. Motor neurone >preparatory set potentials are jammed by a bigger signal carried by a >microwave carrier beam, that literally overloads the brain, so it cannot >control the body. Pulse modulated microwave weapons which broadcast the ELF >preparatory sets of the motor cortex at the victim, will paralyse the victim >without killing them. Breathing and heartbeat are involuntary actions >controlled by another set of frequencies in another part of the brain. > >This technique can be used to abduct people for secret government mind >control experiments, under the guise of alien abduction. A microwave beam of >this nature will paralyse the victim, so they can be bundled into a black >helicopter and airlifted away for experimentation. > >Once the procedure is complete, hypnosis can be used to plant false memories >of alien abduction. In this way, real alien abductions can be used by the >authorities to enable them to obtain a limitless supply of guinea pigs for >their mind control experiments. > >Real memories of government involvement are erased electronically. This >technique clears all short-term memories from the victim's consciousness by >broadcasting microwave beams at the target which carry the signals used for >memory retention. When you remember something, it is first stored in your >short-term memory. After approximately twelve hours, this short-term memory >is converted in the brain to long-term memory, after which you remember this >information for the rest of your life. If this conversion from short-term >memory to long-term memory does not occur, the data is lost. We all see >details around us, but try to recall the decor in a restaurant you ate at >some weeks ago and you will see how tenuous memory is. Microwave radiation >of a specific frequency can interfere with the transfer of memories from >short to long-term memory. Microwave radiation of a specific frequency can >interfere with the synapses of the brain. By interfering with the >connections between brain cells, memory of people can be disrupted. In this >way, Seal special forces assassins can be brain wiped after a mission, so >they have no idea of the target they killed. Using hypnosis, false memories >can then be planted in the brain, so the gap left by the real memory is >papered over. > >The latest advance in electronic mind control were discussed in my previous >articles in Nexus, but for those who missed the ESP of Espionage, this >equipment uses special types of microwave beams called MASERs. These are the >laser equivalent of microwave beams. These MASER beams have been used to >develop something called synthetic telepathy. This is the ability to read >peoples' minds from a distance. Electronic scanning of victims' brains by >monitoring the electromagnetic (EM) emissions from peoples' brains and using >amongst other things, the brain waves (as measured on an EEG), to read the >victim's subvocalised thoughts. > >Head of US Special Forces Major-General Schaknow, talked about synthetic >telepathy during a lecture in July 1992 at Fort Bragg North Carolina. The US >military is hard at work perfecting synthetic telepathy. In synthetic >telepathy, the weak electromagnetic signals in the brain associated with >subvocalised thought, are connected to a computer by use of electrodes, or >in more advanced mechanisms by MASER beams. Sophisticated computer systems >have learnt to read the subvocalised thoughts in the brain, by associating a >specific brain excitation potential, with a particular word. In this case, >only one specific language can be decoded, as each word in a language has a >specific set of frequencies that must be discovered. Once the donkey work of >finding the specific frequencies for all the words in a language has been >programmed into a super computer, which can carry out massive parallel >processing, fuzzy logic software is used to match this with real world >excitation potential associated with subvocalised thought obtained from >thousands of abductees, who are used to calibrate the synthetic telepathy >devices. GCHQ Cheltenham, the intelligence gathering arm of MI5, possess the >advanced computer systems needed for synthetic telepathy. > >Synthetic telepathy detects the l5Hz, 5 milliwatt auditory cortex brain >emissions, that are linked with the excitation potentials in the brain >associated with subvocalised thought. New technology, involving low >frequency microwaves and RF, has enabled devices to be built which can scan >through walls and look inside peoples' bodies like X-rays. This enables >security personnel to see a target in his own home and to track him >throughout the house. Further to this, being able to see inside the victim's >head, would allow computer controlled targeting of specific brain centres in >the victim's brain, even when he was walking around the house. > >A scan of the specific brain emissions given off when the victim >subvocalises using an array of pulsed frequency MASERs fired at the specific >brain centres of the subversive, while he resides in his own home, enables >the victim to be scanned. By firing an array of ELF pulse modulated MASERs, >which scan up and down the window of frequency emissions given off by >subvocalised thought, interference effects can be measured in the MASER >beam. The victim's ELF brain emissions will interact constructively or >destructively with the pulsed frequency MASER carrying ELF in the ELF window >associated with subvocalised thoughts. If we fire an array of pulsed MASERs, >which are out of phase with each other, extraneous noise can be filtered out >in the digital domain. Since the converging ELF modulated MASERs are being >effected by the low level emissions in the victim's brain, the shifts in the >ELF pulsed signal going into the subversive's brain can be detected. A >simplistic version of this would be the LASER beam shone at the window of >the person that is being bugged. The vibrations in the window cause >modulations in the LASER that can be converted into electrical signals and >hence into sound. In this way the subvocalised thoughts in the victim's >brain can be read. Having already built up a library of excitation potential >signatures for differing words and groupings of words, a sophisticated >computer can begin to decode the emission signatures into word streams. In >this way the subvocalised thoughts of the victim can be stored in the memory >of a supercomputer and analysed to give a read out of what the target is >thinking.. > >Using ELF audiograms carried by a single pulse-modulated Maser, subvocalised >thoughts can be placed in the victim's brain. This enables UK synthetic >telepathy operators the ability to enter into conversations with the >subversive to drive him mad or to bring up key words which will get the >victim thinking about the information they wish to find. Visual cortex >excitation potentials can also be broadcast into the victim's brain so that >illusory images can be projected into their brain to drive them mad, or to >programme them to commit suicide. > >My research has led me to uncover a truly nation-wide mind control weapon >system. Each UK police station is equipped with a vast array of microwave >antennae. The Sussex Police headquarters has a two hundred foot antenna. The >building is surrounded by a fence and is off limits to the public. This >microwave complex sits in the middle of a council housing estate, which >means the people in this area are being bathed in low level microwaves. New >research has shown that low level microwaves give mice cancer, since the >emitters tested by the scientists, were the new ultra safe mobile phones >which give of much smaller intensities than the police antennae, the Police >microwave system is a serious health hazard. It seems that low level >microwave radiation excites the hydrogen bonds in the cell and can interfere >with meiosis. This causes cell division to go wrong, which leads to >cancerous cells and hence tumours. > >Secondly, the police have been granted the exclusive use of the 450 MHz >microwave frequency range. This is exactly the frequency used by Dr Ross >Adey, the CIA mind control expert, in his experiments on behavioural >modification. It seems the police have the exclusive use of this mind >control frequency and a vast array of antennae to broadcast this frequency >all over the country. Very useful for mass mind control in times of >emergency. Adey found that by using 0.75mW/cm2 intensity of pulse modulated >microwave at a frequency of 450 MHz, it was discovered that an ELF >modulation could be used to control all aspects of human behaviour. The >Sussex police headquarters is connected to CCTV, closed circuit television >cameras throughout the town. Some of these cameras have microwave telemetry >devices that could easily be used to broadcast this frequency. The large >antennae that bracket the town could also be used. > >The most insidious aspect of this, is that the entire mobile phone network >could easily be used to control the behaviour of the phone users. By use of >my microwave detector, I have found that mobile phones of the newer type, >give off a pulse modulated microwave signal of around 0.75mW/cm2 at the >earpiece. This may be coincidence, but it is exactly the intensity required >form behavioural control as found by Dr Ross Adey, the pioneer of microwave >mind control. So in theory, an ELF signal could be added to the microwave >network to feed a precise behavioural pattern into every mobile phone user >in the UK. If their were widespread riots, the ability to broadcast >behavioural stimuli to mollify all the mobile phone users in the country >would prove useful. Since mobile phone users are generally middle class, it >means authority has a useful method of controlling the behaviour of the key >voters. Microwave carrier beams are perfect for transmitting the excitation >potential of docility to the phone user to keep them servile in times of >trouble. When no ELF signal is broadcast the phone acts in a completely >different manner on behaviour in humans. In this case the microwave phones >causes the neurones to release calcium ions which makes the user tired >irritable and when stresses likely to emotional outbursts such as road rage. > >In Brighton, the local MI5 headquarters has a large microwave array on its >roof. Secret bunkers in the area also have large microwave arrays above >them. It is child's play to transmit an ELF modulated signal to be broadcast >by the entire mobile phone network - if need be. By this means the entire >mobile phone users can be behaviourally modified. At the cost of developing >cancer from low level microwave exposure from the phones they constantly >use, stressing the neural network by constant calcium ion efflux and >interference with bioelectric fields. > >It seems strange that a few milliCuries of ionising radiation will get the >National Radiological Protection Board excited, whilst high intensity cancer >inducing non ionising microwave radiation, goes unchecked. So high are >levels near transmitters, that litter the countryside, that light bulbs will >explode near them. If the intelligence community is using microwaves on a >large scale as mass mind control weapons, then the NRPB's silence is easily >explainable. To add to this, the numerous microwave detectors that were >cheaply available to check leakage from microwave ovens are no longer made >by any company in the country. It seems the UK authorities do not want the >population to be able to detect when they are being microwave. > >In conclusion, it can be seen that the UK intelligence and police, have a >dizzy array of high-tech mind control devices. They regularly target their >own populations and thousands of people are made ill by microwave weapons. >With the advent of synthetic telepathy, 'CCTV of the mind' becomes a >reality. > >With the election of a New Labour government unaware of microwave weapons >and untainted, as they had no part in their development and deployment, it >is certain that Tony Blair's government will outlaw these abhorrent >microwave weapons - as they have done land mines. The only problem will be >convincing the Labour government that MI5's microwave communication >equipment is in fact microwave mind control weaponry. With the total secrecy >the MI5 organisation operates under, one can be sure they will be mendacious >as to how their £200 million pound budget is used to hone their leading edge >microwave mind control torture weapons that are used on the public. Even >more disturbing is the use of EMP and microwave weapons by the police on >anyone researching into this area. > >REFERENCES ELECTRONIC MlND CONTROL >[1] Non-Lethality: John B Alexander, the Pentagon's Penguin, by Armen >Victorian, Lobster June 1993. This is an excellent article on the US black >government's 'hard-man' of the mind control world -recommended for those who >really would like to know how these people think and work. >UFO Reality No 1-3, Jon King, Mind Control. >Mind Control and UFO's, by Alex Constantine, Feb 1996. > >[2] UFO Reality No 4. > >[3] Enigma Vol 2, It's All In The Mind, T Rifat. > >[4] Ross W Adey: Neurophysiologic Effects of Radiofrequency and Microwave >Radiation, Bulletin of the New York Academy of Medicine, Vo1.55 No 1 1, Dec >1979; The Influences of Impressed Electrical Fields at EEG Frequencies on >Brain and Behaviour, in Behaviour and Brain Electrical Activity, Burch, N >and Altshuler, H.I., eds, Plenum press, 1975; Effects of Modulated Very High >Frequency Fields on Specific Brain Rhythms in Cats, Brain Research, Vol 58, >1973; Spectral Analysis of Low Frequency Components in the Electrical >Activity of the Hippocampus During Learning, Electroencephalography and >Clinical Neurophysiology, Vol 23, 1967. >Dr Ross Adey, formally of the Brain Research centre at the University of >Southern California, Los Angeles, now at Loma Linda University Medical >School, Loma Linda, California. He worked on the CIA Pandora Project and was >concerned with inducing specific behaviour modification by electromagnetic >means as well as induction of calcium efflux events to interfere with brain >function - the so called 'confusion weaponry'. >C.S. Blackman is a researcher who worked in the US on theoretical research >that underlies the electronic RMCT devices now deployed world-wide. >Electronics World and Wireless World: The healing face of electromagnetic >fields; 1993. > >[5]. Martin Cannon, The Controllers. > >[6]. Secret and Suppressed, Jim Keith. > >[7]. Psychic Dictatorship in the USA, Alex Constantine. > >[8]. Encounters, Vol 7, Psi Spies, Marie-Louise Small. Cosmic Top Secret: >America's Secret UFO Program,1992 William Hamilton III. > >[9] Encounters, Vol 10, Room with a Remote View, by Richard Forsyth. This is >an article about the author. http://www.fastnet.co.uk/pms; Paranormal >Management Systems' web site. For an information pack on RV/RI, send £3 plus >a SAE to PMS, PO Box 2749, Brighton, BN2 2DR, UK. Correspondence and normal >courses are available, phone 01273 690424 to book for courses. We also offer >consultancy on mind control problems. >Nexus Vol 3 No 6, Remote Viewing: The ESP of Espionage, by T Rifat. Nexus >Vol 4 No 1 The Esp of Espionage, Part 1, by T Rifat. >Nexus Vol 4 No 2, The Esp of Espionage, by T Rifat. These three articles >cover the theory of RV, RI and ESP in very great detail. recommended for the >serious RV/RI student. For more information contact the author. >Alien Encounters No 1 1 Alien and Government Mind control, T Rifat. >Sightings Nol2, Losing Your Mind! Mind control Technology, by T Rifat. UFO >Reality No 8, Mind Control, Big Brother Is All In The Mind, T Rifat. Enigma >6, Mind Control, by T Rifat. >Fortean Times 95, Police State of Mind, by David Guyatt. US Synthetic >Telepathy info supplied by David Guyatt. >Guyatt, David. "Some Aspects of Antipersonnel Electromagnetic Weapons (paper >prepared for ICRC Symposium for the medical profession. > > > > >--- > >>From the desk of Raymond van Staden >Van Staden and Associates cc > >P.O. Box 1150 >Amanzimtoti >4125 >South Africa > >Tel: +27 (0)31 916-1262 >Fax: +27 (0)31 916-1263 > >Email: raymond@v... >Internet: http://www.vanstaden.co.za > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5501 From: James M. Atkinson Date: Tue May 28, 2002 8:16am Subject: Re: Detecting Internal Keyboard Key Catcher The purchase, sale, usage, or possession of a KeyGhost constitutes a serious federal felony in the United States. The unit can be detected with spectrum analyzer, ELF/VLF tuned loop antenna, and a 40 dB+ preamplifier. Simply pass the loop over both sides of the keyboard and you will pickup massive RFI from the KeyGhost. Also, a current check of the keyboard connection will show a notable spike. Just prepare an inline adapter so you can drop the pinouts to your DVM or Oscope. Also, it is VERY easy to detect with a physical inspection, and an Xray of the keyboard will catch it 100% of the time. You can also examine the screw holes and condition of the plastic of the keyboard as the installers of the device have a tough time opening the cases. On a related note: Steve Uhrig has some really nice portable X-Ray machines suitable for X-Raying keyboards, phones, etc, and you can pick one up at a really good price: http://www.swssec.com/used.html -jma At 10:40 AM +0200 5/28/02, Secdep wrote: >Does anyone in this group know how to detect '"Key Catchers'" installed >inside a keyboard, other than having to open each keyboard & physically >checking. > >KeyGhost II Security Keyboard Professional SE: This is an ordinary keyboard >with a KeyGhost Pro SE (2,000,000 keystroke memory) hidden inside (available >in flat PS/2 or Natural style keyboard). It looks and feels exactly like any >ordinary keyboard. It may be used as an extra security control where the >user does not want a visible KeyGhost Pro SE attached to the back of their >computer. It is ideal for use in organisations that require constant, >uninterrupted and transparent long-term monitoring of any number of >computers. For protection of your data, keystrokes are encrypted (128 bit) >and stored. Retail Price: $US 409.00Natural Style or $399.00 Quality PS/2 >Style READ MORE>> > >http://www.keyghost.com/newproducts.htm > >Raymond >--- > >>From the desk of Raymond van Staden >Van Staden and Associates cc > >P.O. Box 1150 >Amanzimtoti >4125 >South Africa > >Tel: +27 (0)31 916-1262 >Fax: +27 (0)31 916-1263 > >Email: raymond@v... >Internet: http://www.vanstaden.co.za > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5502 From: Date: Tue May 28, 2002 9:14am Subject: Neuro-influencing technologies I suggest rather than implying mental illness to victims of such technologies thus continuing the victimization, you read this site http://dcn.davis.ca.us/~welsh ************************************** This email is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient, you must not make any use of this information, copy or show it to any person. Any use, forwarding, printing or copying of this message is strictly prohibited. 5503 From: Steve Uhrig Date: Tue May 28, 2002 1:12pm Subject: Re: MICROWAVE MIND CONTROL!!!!!!!! On 28 May 2002 at 7:00, Secdep wrote: > MICROWAVE MIND CONTROL The guy sure has done some research, and mastered the art of technobabble. Much of his analysis is nonsequitur, and some facts plain wrong (i.e. microwave ovens operate at 2450 megacycles, not 1000 mc/s). He seems to know all these exotic frequencies, methods of modulation, delivery of the energy to the poor unfortunate being targeted, etc. I would challenge him to draw the schematic of a flashlight, which is the simplest basic DC theory. I would bet he can't. Yet he is trying to make a case for millimeter wave bombardment of the general population and all sorts of other lunacy against all known laws of physics. If you can't dazzle them with brilliance, baffle them with goat droppings. Remember, though, these people deserve compassion. Lunatics or not, they are suffering real pain. When you deal with them, don't put them down. Show some human kindness, try to give them the warm fuzzies to calm them down, and do something right. *Then* hang up on them! Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5504 From: Robert Dyk Date: Tue May 28, 2002 1:48pm Subject: Re: MICROWAVE MIND CONTROL!!!!!!!! Steve is right, In normal course of business I work for many local PI agencies. As such, I sometimes get referrals from these PI's that have not been screened or qualified. In some cases these callers frequently are being "followed", all their conversations are being recorded etc. I was once sent out of town by a PI on a pre qualified TSCM job where (once I got there) the resident felt that he was being spoken to through the earth in his basement by the neighbour who lives 1/2 mile up the road. These people genuinely believe the "Voices" are real or that they are actually being spied upon by the "man in the green Ford Taurus." Just as we have an obligation to be professional with our rational legitimate clients, we have an obligation to be responsible to the not so rational enquiring public. My first question in qualifying a questionable TSCM prospect is to ask what information "of value" they feel has been lost or compromised. Then a frank discussion about the possible costs to the "opposition" of mounting a surveillance operation against them, and the conclusion that they likely may or may not need my help. In other words, who would or could benefit from listening to hours and hours of conversation with "Auntie May about the weather". At this point depending on the answer to the first question, I have been known to suggest that they do need help, just not the kind of help that I can provide... My two cents for today. Robert Dyk dyk@c... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. 5505 From: Date: Tue May 28, 2002 2:43pm Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. This file is set to automatically go out to list members every two weeks, Please review it, and ensure that you are listed properly (correct address, phone, etc). ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (including AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (425) 489-0446 Telephone URL: http://www.bug-killer.com/ E-mail: gordonm@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 5506 From: Date: Tue May 28, 2002 2:43pm Subject: File - mission.txt TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 5507 From: Date: Tue May 28, 2002 3:06pm Subject: E-Mail Glitch Hurt bin Laden Case E-Mail Glitch Hurt bin Laden Case By D. IAN HOPPER .c The Associated Press WASHINGTON (AP) - The FBI destroyed evidence gathered in an investigation involving Osama bin Laden's network after its e-mail wiretap system mistakenly captured information to which the agency was not entitled. The FBI software not only picked up the e-mails of its target ``but also picked up e-mails on non-covered targets,'' said a March 2000 memo to agency headquarters in Washington. ``The FBI technical person was apparently so upset that he destroyed all the e-mail take, including the take on'' the suspect, the memo said. The documents were made public through a Freedom of Information Act request filed by the Electronic Privacy Information Center, a Washington advocacy group. The material was not included in an original release but became public after a federal judge ordered the bureau to give out more documents. At issue was an investigation in Denver in which the FBI's bin Laden unit was using the bureau's Carnivore system to conduct electronic surveillance of a suspect under a Foreign Intelligence Surveillance Act warrant. The suspect's name and other information identifying details of the investigation were marked out of the letter. The memo surfaced as the FBI was addressing concerns it mishandled aspects of terrorism investigation prior to the Sept. 11 attacks. Those concerns include a warning from its Phoenix office about Arab pilots training in the United States last July. FBI officials declined Tuesday to discuss the memo or the investigation it referred to. They did, however, say that the bin Laden unit at FBI headquarters handles only investigations involving suspected activity by his terror network. The memo shows FBI agents were worried about the fallout in the Denver case. The Justice Department's Office of Intelligence and Policy Review was furious after learning the evidence captured by the e-mail wiretap system was destroyed because of the glitch, the memo states. ``To state that she was unhappy at ITOS (International Terrorism Operations Center) and the UBL (bin Laden) unit is an understatement,'' the memo stated, quoting a Justice official. The memo said Justice officials worried the destruction of the evidence would signal an ``inability on the part of the FBI to manage'' the warrants that are key tools in espionage and antiterrorism cases. Privacy groups and some members of Congress have complained that Carnivore had the potential to collect more information than allowed by a warrant. ``Here's confirmation of the fact that not only did it do that, but it resulted in a loss of legitimately acquired intelligence,'' said David Sobel, general counsel of the Electronic Privacy Information Center, the group that sued to get the documents. The e-mail from an unnamed author to M.E. ``Spike'' Bowman, the FBI's associate general counsel for national security, said Denver agents installed the e-mail surveillance system in March 16, 2000, but the device did not work correctly. The technician who deleted the e-mail evidence had no supervision, the memo added. Henry H. Perritt, who led a team authorized by the FBI to review the surveillance system, said he was surprised the technician deleted the e-mails. ``The collection is supposed to be retained for judicial review,'' Perritt said. ``If an agent simply deleted a whole bunch of files without the court instructing, that's not the way it's supposed to work.'' Another document released through the privacy group's request explains the bureau's policy for overcollection on a surveillance warrant. The memo, dated just a week after the Denver e-mail, says the e-mails should be kept under seal so that senior FBI officials can figure out how the wiretap went wrong. The unintended targets of the FBI's snooping may have deserved notification that the mistake was made, the FBI memo said. Authorities have used Carnivore-type tools more than 25 times in all types of criminal cases, to catch fugitives, drug dealers, extortionists and suspected foreign intelligence agents. Carnivore is now called DCS-1000. Perritt's review panel recommended that the FBI change Carnivore so that it is more difficult to accidentally collect too much information. The FBI has not announced any changes. On the Net: Electronic Privacy Information Center: http://www.epic.org FBI: http://www.fbi.gov 05/28/02 19:55 EDT 5508 From: kondrak Date: Tue May 28, 2002 2:39pm Subject: Re: Re: MICROWAVE MIND CONTROL!!!!!!!! Back many years ago, when I ran several BBS's, we had a guy call in who was one of the "tinfoil helmet brigade". The name Russ Wertz ring a bell? He may or may not of heard voices, but youre not going to get away from microwaves, theres simply too much going on in the electromagnetic spectrum. I suggest they be given a room, wayyyy down in the basement, far from the light of day, and be heavily sedated. At 14:12 5/28/02 -0400, you wrote: >On 28 May 2002 at 7:00, Secdep wrote: > > > MICROWAVE MIND CONTROL > >The guy sure has done some research, and mastered the art of >technobabble. > >Much of his analysis is nonsequitur, and some facts plain wrong (i.e. >microwave ovens operate at 2450 megacycles, not 1000 mc/s). > >He seems to know all these exotic frequencies, methods of modulation, >delivery of the energy to the poor unfortunate being targeted, etc. > >I would challenge him to draw the schematic of a flashlight, which is >the simplest basic DC theory. I would bet he can't. Yet he is trying >to make a case for millimeter wave bombardment of the general >population and all sorts of other lunacy against all known laws of >physics. > >If you can't dazzle them with brilliance, baffle them with goat >droppings. > >Remember, though, these people deserve compassion. Lunatics or not, >they are suffering real pain. When you deal with them, don't put them >down. Show some human kindness, try to give them the warm fuzzies to >calm them down, and do something right. > >*Then* hang up on them! > >Steve > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5509 From: Date: Tue May 28, 2002 4:29pm Subject: Neuro-influencing technologies There has been no comment on this subject by those on this list with intelligence or military backgrounds, the reason being is that they are aware that such technology exists. The technology was first used against the US Embassy in Moscow. It is used for various reasons, usually political, so simply because there is no seemingly logical rhyme or reason for such attacks does not negate their existance. Again I refer skeptics to this web site for an introduction to the 'perfect political crime'. http://www.dcn.davis.ca.us/~welsh As a postscript: I have noted many many sites on this subject that are clearly designed as mis or dis information....so simply because a site is clearly flaky or technically impossible to believe do not allow yourself to discredit the entire field. ************************************** This email is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient, you must not make any use of this information, copy or show it to any person. Any use, forwarding, printing or copying of this message is strictly prohibited. 5510 From: Steve Uhrig Date: Tue May 28, 2002 8:13pm Subject: Re: Neuro-influencing technologies On 28 May 2002 at 14:29, mcresearch@w... wrote: > There has been no comment on this subject by those on this list with > intelligence or military backgrounds, the reason being is that they > are aware that such technology exists. A large percentage, if not majority, of list members here have military and/or technical intelligence backgrounds. Merely wishing it to be so does not change the laws of physics. That is what the author of the piece you posted as well as the website would have us believe. It will not be so. The military and intel types on this list have given the matter the commentary it deserves. It would be a good idea to take the topic to any of the dozens of newsgroups where such things are of interest to the membership. Enough of us here see and hear all sorts of lunacy and mental illness to where we really would appreciate not seeing any more of this sort of thing on a list intended to be technical in nature. The largest majority of us do not believe the statements made lend themselves to any degree of credibililty. This list is not the place to discuss such matters. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5511 From: Hawkspirit Date: Tue May 28, 2002 10:24pm Subject: Grandma 6 Guards 0 >Subject: Fwd: Grandma 6 Guards 0 >http://www.lewrockwell.com/wallace/wallace42.html > Grandma Beats Up Airport Security Guards by Bob Wallace > > > > Charges were dropped yesterday against Ruth "Grammy" Gordon, an > >83-year-old wheelchair-bound grandmother, who was originally charged with > >assault and battery, and assault with a deadly weapon, because an > >altercation she had last week with six airport security guards, that left > >all six hospitalized. > > > >"Justice has been served," said the 95-pound mother of three and >grandmother > >of six, as she sat in her wheelchair, aided in her breathing by an oxygen > >bottle. "Now I'm going to sue every fool in the federal government for > >ignorance, stupidity, and just plain general incompetence. I'm an >American, > >and I won't be treated like this." > > > >The problem began last month as Gordon was attempting to board an airplane. > >"These guys are supposed to be some kind of professionals," she said, "but > >they're dumber than rocks. Here they were letting guys who looked just >like > >terrorists walk through without searching them, and then they pull me aside > >and tell me they're going to search me? I don't think so." > > > >According to one witness, Bud Cort of Cuyahoga Falls, Ohio, one guard, "who > >weighed about 300 pounds, looked like he was drunk, and had his shirt out, > >told this woman she couldn't board the plane unless they searched her. He > >was really rude. That's when the trouble started." > > > >Videotapes showed that Gordon ran the guard down with her motorized > >wheelchair, then sat on top of the screaming man while spinning her chair >in > >circles. "Doofus was so fat he couldn't get up," said Gordon with a >giggle. > > > >One guard who attempted to pull Gordon's wheelchair off of the screaming >man > >from behind was hit over the head with an oxygen bottle and knocked > >unconscious. A third guard, who approached Gordon from the front, was also > >left dazed on the floor. Witnesses said she was cackling, "Put your hands > >on an old lady, will you?" as she bashed both guards. > > > >The tape also showed a fourth guard attempting to grab Gordon's wheelchair. > >Gordon removed a knitting needle from her purse and stabbed him in his left > >buttock. "What a wimp," she told reporters. "He started screaming and > >grabbing his butt and running like a puppy that someone kicked." > > > >"It was amazing," said another witness, a Scott Ryan. "The whole crowd >just > >stood there cheering and clapping. I mean, she was whupping butt." > > > >A fifth guard that attempted to grab Gordon had the seat of his pants set >on > >fire with a cigarette lighter than had escaped detection. "He just went > >whoosh across the concourse, screaming and slapping at all these flames > >flying out of his rear," said Ryan. > > > >A sixth guard did finally manage to get Gordon in a body hug. "I think >that > >was the wrong thing to do," said another witness, who declined to be > >identified. "She just grabbed him by his greasy hair with one hand and > >cracked him across the jaw with her skinny fist. And down and out he >went." > > > >After all this, Gordon's chair was still sitting on top of the first guard. > >The tapes clearly showed her leaning over and yelling, "Apologize to me, >you > >fat sumbitch, or when I'm done with you you'll just be a greasy spot on the > >floor!" > > > >As the crowd roared, the guard cried, "I'm sorry, I'm sorry! Uncle! I > >won't do it again!" > > > >Finally, Gordon surrendered without further incident, and was taken to jail > >and released on her own recognizance. "We didn't have any choice," said an > >unidentified officer of the court. "Over 200 people showed up to support > >her. I think if we had demanded bail, there would have been a riot." > > > >Over 20 lawyers offered to defend her for free. However, realizing the > >precariousness of the case, Gordon was not charged with anything. "I doubt > >there's a jury in the whole country that would have found her guilty of > >anything," said one of the lawyers. > > > >"I'm flying again tomorrow," Gordon told reporters. "And I suggest no one > >at the airport so much as look at me wrong." > > > >May 27, 2002 Bob Wallace [send him mail], a former newspaper reporter and > >editor, and an incurable lover of puns, lives in St. Louis. > >Copyright © 2002 LewRockwell.com Bob Wallace Archives 5512 From: William Knowles Date: Tue May 28, 2002 10:51pm Subject: Re: Grandma 6 Guards 0 On Tue, 28 May 2002, Hawkspirit wrote: Ruth Gordon and Bud Cort? It appears that someone really likes Harold and Maude... http://us.imdb.com/Title?0067185 This would be really scary if some of the TSA guards names were, Philo Beddoe, Orville Boggs, Tank Murdock, and Clyde. - William > >Subject: Fwd: Grandma 6 Guards 0 > >http://www.lewrockwell.com/wallace/wallace42.html > > > Grandma Beats Up Airport Security Guards by Bob Wallace > > > > >Charges were dropped yesterday against Ruth "Grammy" Gordon, an > > >83-year-old wheelchair-bound grandmother, who was originally charged with > > >assault and battery, and assault with a deadly weapon, because an > > >altercation she had last week with six airport security guards, that left > > >all six hospitalized. > > > > > >According to one witness, Bud Cort of Cuyahoga Falls, Ohio, one guard, "who > > >weighed about 300 pounds, looked like he was drunk, and had his shirt out, > > >told this woman she couldn't board the plane unless they searched her. He > > >was really rude. That's when the trouble started." *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 5513 From: Date: Tue May 28, 2002 8:05pm Subject: Italian Wiretaps Hint at 9-11 Italian Wiretaps Hint at 9-11 By PIERO VALSECCHI . c The Associated Press MILAN, Italy (AP) - Wiretapped conversations between a sheik from Yemen and the leader of a Milan mosque reveal what police say are predictions of the Sept. 11 terror attacks, including a boast of a ``terrifying'' operation by ``a madman,'' according to a newspaper report. Excerpts of the conversations, which took place in 2000 and early 2001, ran in Tuesday's editions of Milan daily Corriere della Sera. The conversations were between Abdulsalam Abdulrahman, the sheik, who had traveled to Italy, and Abdelkader Mahmoud Es Sayed, who fled Italy two months before the attacks. U.S. officials consider Es Sayed to be the organizer of a Milan cell of al-Qaida, the terrorist network of Osama bin Laden. An Egyptian national, he was convicted of the 1997 massacre at Luxor in which 58 foreign tourists were killed. The chief of the Milan office of DIGOS, Italy's anti-terrorism police, confirmed the newspaper's transcripts. Massimo Mazza told The Associated Press that his office turned the transcripts over a few days ago to prosecutor Stefano Dambruoso, who is leading Italy's probe into Italian-based al-Qaida operatives. In one conversation, in the summer of 2000, the sheik tells the mosque leader, or imam: ``In the future, listen to the news and remember these words: `above the head.''' The sheik says the action will be ``one of those strikes that you never forget.'' He added that it will be a ``terrifying thing, it will move from south to north, from east to west. He who made this plan is a madman, but a genius. It will turn you to ice.'' The sheik also says: ``Ah, yes, there are big clouds in the sky, there in that country, the fire is already lit and it's just waiting for the wing ... All the newspapers in the world will write about it.'' Before Sept. 11, investigators had few clues about what the men might be discussing, Mazza told the AP. ``After what happened, it's now easy to draw conclusions ... but before, it was difficult to understand.'' Authorities eavesdropped on the two by bugging places where they were, not by tapping telephone lines; it took a long time to remove extraneous noise from the recordings and translate them, he said. Corriere della Sera reported that the FBI helped Italian experts to decipher the bugged conversations. According to a transcript of a January 2001 conversation between the imam and a Tunisian who was later arrested in Milan by Italy's anti-terrorist police, there is discussion of false documents. The Tunisian asks: ``Are they needed for our brothers who will go in the United States?'' ``Don't ever repeat these words!'' the imam warns. 5514 From: Matthew Paulsen Date: Wed May 29, 2002 0:50am Subject: Libya offers $2.7 billion Pan Am 103 settlement Off topic. Now we know the commercial value of 259 terrorist victims, better yet, by percentage. Libya should try ebay next. - M http://www.cnn.com/2002/US/05/28/libya.lockerbie.settlement/index.html Libya offers $2.7 billion Pan Am 103 settlement May 28, 2002 Posted: 8:22 PM EDT (0022 GMT) Andrea Koppel and Elise Labott CNN Washington Bureau WASHINGTON (CNN) -- Libya has offered $2.7 billion to settle claims by the families of those killed in the Pan Am 103 bombing, with payments tied to the lifting of U.S. and U.N. sanctions, according to lawyers representing some families. The proposed settlement would work out to $10 million per family, according to a letter from the families' lawyer detailing the offer. It includes relatives of those killed on the ground in the Scottish town of Lockerbie. But compensation would be paid piecemeal, with installments tied to the lifting of sanctions. The letter says 40 percent of the money would be released when U.N. sanctions are lifted; another 40 percent when U.S. commercial sanctions are lifted; and the remaining 20 percent when Libya is removed from the State Department's list of state sponsors of terrorism. Jim Kreindler, of Kreindler & Kreindler, the firm representing 118 victims' families said the families are "seriously considering" the Libyan offer. "These are uncharted waters," Kreindler said. "It is the first time that any of the states designated as sponsors of terrorism have offered compensation to families of terror victims. " Kreindler said the families "have spent the last 13 years seeking closure and justice, and are eager to move on." But Jack Shultz, whose 21-year-old son Thomas died in the bombing, said Libyan leader Moammar Gadhafi must accept responsibility before any settlement is reached. "He has to get out of the terrorism business and take responsibility," Shultz said. "The money isn't the issue. It's his taking responsibility and swearing off terrorism. Now he has to come clean and help us." The State Department has maintained the matter of compensation is an issue to be decided between Libya and lawyers for the victims' families. "The U.S. is not directly involved," one State Department official said, adding that while "some families want cash, others say it is blood money." Pan Am Flight 103 exploded over Lockerbie on December 21, 1988, killing all 259 people aboard and 11 on the ground. Former Libyan intelligence agent Abdel Baset Ali Mohmed Al-Megrahi was convicted of blowing up the airliner and sentenced to life in prison in 2001. Sanctions against Libya were suspended -- but not lifted -- in 1999, after Libyan leader Moammar Gadhafi turned Al-Megrahi over to a Scottish court convened at a former military base in the Netherlands. Compensation for the families of the Pan Am victims is among the steps set by the United Nations for lifting its sanctions against Tripoli. Other requirements include a formal denunciation of terrorism, which Libya says it has made; and accepting responsibility for the actions of its intelligence agents. The United States says it will only lift its unilateral sanctions once Libya complies with the U.N. resolutions. 5515 From: A Grudko Date: Wed May 29, 2002 2:47am Subject: Re: Re: MICROWAVE MIND CONTROL!!!!!!!! - Original Message - From: Robert Dyk < These people genuinely believe > the "Voices" are real or that they are actually being spied upon by the "man > in the green Ford Taurus." I've been there a few times. Take a Johannesburg old age home in 1987. A man who suspected his 70+ year old wife of infidelity and that she might be monitoring him. He 'knew' from the voices that he was being watched. His appartment was RF clear but he hid an Olympus micro cassette recorder in his own dressing gown on the back of his door that I found (probably luckilly) to test me. Andy Grudko (British) - D.P.M., Grad I.S, South Africa - PSIRA investigators Reg. No. 8642 Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust When you need it done right - first time 5516 From: Marcel Date: Wed May 29, 2002 5:36am Subject: Oppps-FBIís e-mail surveillance tool flawed Opppps- FBIís e-mail surveillance tool flawed ëCarnivoreí tool picked up messages from non-suspects http://www.msnbc.com/news/758700.asp?0bl=-0 -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 5517 From: zack <10-33@c...> Date: Tue May 28, 2002 8:43pm Subject: Re: MICROWAVE MIND CONTROL!!!!!!!! Gee whiz, does that mean I have to take all that nice shinny aluminum off my head ??? <<< From: "Steve Uhrig" Subject: Re: MICROWAVE MIND CONTROL!!!!!!!! On 28 May 2002 at 7:00, Secdep wrote: > MICROWAVE MIND CONTROL The guy sure has done some research, and mastered the art of technobabble. Much of his analysis is nonsequitur, and some facts plain wrong (i.e. microwave ovens operate at 2450 megacycles, not 1000 mc/s). He seems to know all these exotic frequencies, methods of modulation, delivery of the energy to the poor unfortunate being targeted, etc. < snip > visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." George W Bush President of the United States of America God Bless The USA .. NEVER forget 9-11-01 http://www.copscops.com/blessusa.htm [Non-text portions of this message have been removed] 5518 From: James M. Atkinson Date: Wed May 29, 2002 7:27am Subject: Privacy - State Wiretap Usage Up 40 Percent In 2001 http://www.newsbytes.com/news/02/176750.html State Wiretap Usage Up 40 Percent In 2001 By Brian Krebs, Washtech WASHINGTON, D.C., U.S.A., 24 May 2002, 5:19 AM CST State courts authorized a dramatic increase in the use of electronic surveillance last year, mostly to listen in on cell phones, pagers and other wireless devices, according to a government report released yesterday. In its annual Wiretap Report, the Administrative Office of the U.S. Courts said state courts approved 1,005 wiretap applications last year, up from 711 in the previous year. Federal judges, by contrast, approved 486 wiretap requests, just six more than in 2000. The report indicates criminals are using anything but plain old telephone lines: 68 percent of all wiretaps last year authorized police to eavesdrop on portable communications devices such as cell phones, pagers and cordless phones. Conversely, the number of wiretaps used for eavesdropping on private residences was down from the previous year. "I think it's safe to say wiretapping has gone mobile," said Marc Rotenberg, executive director of the Electronic Privacy Information Center. "This is the sharpest increase since the first year these reports were created." Most wiretaps approved last year were for narcotics cases: Nearly 80 percent of all applications for intercepts in 2001 cited drug offenses as the most serious offense under investigation. Gambling and racketeering were the second and third most frequently cited offense in wiretap applications last year, while homicide and assault cases accounted for slightly more than 3 percent of all wiretaps. Though authorities issued 300 more wiretaps last year than in 2000, the number of convictions obtained through intercepts declined. Most intercepts in 2001 were in operation for 9 percent fewer days per wiretap than in 2000. The number of communications intercepted per wiretap fell by 12 percent. In addition, the average length of authorization was down by one day from 2000, according to the report. The report does not include surveillance obtained through so-called "trap and trace" or "pen register" orders, which allow police to view telephone numbers dialed by a suspect, for example. Antiterorrism legislation passed by Congress last year extended that authority to investigators seeking the Internet address of an e-mail's sender and recipient. Unlike wiretaps, the law does not require authorities to convince a judge to grant them pen register or trap and trace authority. Under the law, judges are obliged to grant such requests if police claim the information is "relevant" to an ongoing criminal investigation. But because authorities are not obligated to report surveillance requests obtained with the consent of at least one of the key parties to the communication, the true scope of electronic surveillance being conducted online may never be accurately known, Rotenberg said. "We could realistically be talking about hundreds of thousands - perhaps even millions - of requests from ISPs (Internet service providers) that are not recorded each year," he said. Though nearly all U.S. states have electronic surveillance laws on the books, fewer than half reported approving wiretaps in the past few years, said Jim Dempsey, associate director of the Center for Democracy and Technology. "This suggests either that some states aren't adhering to the reporting requirements or that wiretapping is not the indispensable technique that law enforcement says it is," Dempsey said. Reported By Washtech.com, http://www.washtech.com 05:19 CST (20020524/WIRES TELECOM, LEGAL/) -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5519 From: James M. Atkinson Date: Wed May 29, 2002 7:41am Subject: FBI to focus on analysis, intelligence FBI to focus on analysis, intelligence Mueller will announce shift of agents, resources By Susan Schmidt THE WASHINGTON POST May 29 - The FBI will shift 480 agents from drug and other criminal investigations to counterterrorism posts and plans to more than double the bureau's anti-terror forces under a major reorganization that FBI Director Robert S. Mueller III is scheduled to announce today. MUELLER'S PLAN, as outlined by law enforcement officials, would permanently devote 2,600 agents - nearly a quarter of the bureau's 11,500-agent workforce - to counterterrorism units, which were staffed by 1,000 agents before the Sept. 11 attacks. The bureau is also engaged in what it calls a "massive" effort to hire 900 linguists, computer experts, engineers and scientists over the next few months to improve intelligence-gathering and analysis. In a separate development, Attorney General John D. Ashcroft is revising department guidelines to give FBI officials in the field authority to open terrorism investigations and undercover probes without clearance from headquarters. The changes, also scheduled to be announced today, are intended to place more decision-making power in the field, even as the gathering and analysis of are increasingly centralized in Washington. FOCUS ON TERRORISM Such authority would have allowed Minnesota agents to seek a warrant to search the laptop computer of Zacarias Moussaoui last August without approval from headquarters, Justice Department officials said. Coleen Rowley, general counsel of the FBI's Minneapolis field office, charged last week in a 13-page letter to Mueller that an official in the FBI's Washington counterterror unit "seemed to have been consistently, almost deliberately, thwarting" the effort to obtain such a warrant. Moussaoui was subsequently charged as a co-conspirator in the Sept. 11 attacks. The details revealed yesterday follow other changes previously announced as part of Mueller's attempt to change the FBI from a law enforcement agency to one with a major focus on anticipating and thwarting terror attacks. Many of the proposals are focused on upgrading what Mueller has acknowledged is the FBI's limited ability to gather and analyze intelligence. Officials previously revealed Mueller's plan to establish Washington-based "flying squads" to coordinate national and international investigations. That move is opposed by some field agents, who are already skeptical about the competence of FBI headquarters managers. But Mueller, who took over the FBI Sept. 4 after shaking up the U.S. attorney's office in San Francisco, is seeking to bring top agents to headquarters, a move many of them resisted in the past. Mueller is also tapping into CIA resources, putting 50 CIA employees on Joint Terrorism Task Forces in field offices around the country, according to congressional sources briefed on his reorganization plan. Last week, congressional officials confirmed that another 25 CIA employees will join the FBI as counterterrorism analysts. Mueller's emphasis on a stronger role for headquarters in gathering and analyzing counterterror information follows scathing criticism of some Washington supervisors for failing to act on information from field agents in Phoenix and Minneapolis last summer about possible clues that a terror strike was in the works. In addition to the pleas from Minneapolis agents about Moussaoui, counterterror supervisors received a memo last July from a Phoenix agent, warning that al Qaeda terrorists might be training at U.S. aviation schools. Agent Kenneth Williams's suggestion for a wider canvass of those schools was rejected. Mueller has been briefing members of Congress about his proposed changes in closed-door meetings. Sen. Charles R. Grassley (R-Iowa) a frequent FBI critic, said he would be pleased to see agents diverted from drug investigations but is not convinced a stronger role for headquarters is wise. 'IMAGE OVER SUBSTANCE' "Director Mueller needs to reorganize and reform the FBI, but he has to fix the root of the problem: the bureau's cultural problems with preventing crimes, putting image over substance and cooperating with other agencies," Grassley said. "I think Mueller should take the advice of FBI whistleblower Coleen Rowley and not try to investigate terrorism out of bureaucrat central, FBI headquarters." One FBI agent with broad experience, including time in counterterrorism, was equally dubious yesterday. "Anything controlled by headquarters is destined to be utterly frustrated," he said. Several field agents said they are adamantly opposed to more interference from headquarters. But some said they were encouraged to learn recently that some highly respected field supervisors are moving to headquarters as part of the new effort. The restrictions on field offices that Ashcroft wants to reverse are an outgrowth of privacy laws that prohibit the government from collecting or archiving information except for law enforcement purposes. In the past, officials said, the government has developed information for individual cases, but now needs a mosaic of intelligence to prevent terrorist acts. The new rules would allow field office chiefs to conduct preliminary inquiries for a full year before seeking additional clearance from headquarters. The continued shift in FBI priorities would push some of the bureau's traditional duties onto other federal agencies and local law enforcers. The federal Drug Enforcement Administration and state and local police would have to fill the gap created by the diversion of 400 FBI agents from narcotics investigations. Mueller has told members of Congress that the FBI will no longer open a major narcotics probe if the DEA can do it instead, according to sources on Capitol Hill. DEA Director Asa Hutchinson said he believes diverting FBI agents to counterterrorism is "the right priority for them," but said the DEA may require more resources. "That will be an issue which we will have to address with Justice and with Congress," he said yesterday. In addition, 59 agents each in violent-crime and white-collar crime units will be shifted to terrorism investigations, according to an outline of Mueller's plan. Thirty-eight of the diverted agents from all three divisions will be placed in the FBI's training division at headquarters. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5520 From: kondrak Date: Wed May 29, 2002 5:51am Subject: Re: Oppps-FBIís e-mail surveillance tool flawed Why's anyone surprised?, it's a vacuum cleaner type surveillance system, they just got caught. Had the idiot not deleted the intended messages, we'd never heard about this. At 06:36 5/29/02 -0400, you wrote: >Opppps- FBI's e-mail surveillance tool flawed > 'Carnivore' tool picked up messages from non-suspects >http://www.msnbc.com/news/758700.asp?0bl=-0 5521 From: Marcel Date: Wed May 29, 2002 0:58pm Subject: Re: [scan-l] Re: "scanner users,scanner websites are scum" - new TransCrypt advertisingcampaign... They obviously bumped their head coming out of the "Bat Cave". I'm surprised that they would use scare tactics like this to sell their product. ====================================================================================== Mike Pollock wrote: > Transcrypt's website details the "THREE LEVELS OF > INFORMATION PIRATES" > > "Security experts divide information pirates into > three groups: > > "1. The hobbyist, who is a casual eavesdropper with > armed with a low cost analog scanner. Hobbyist's > listen to scanners daily to learn of good gossip and > interesting events. This tends to be a low cost form > of entertainment. They want to know the scoop on who > is doing what to whom, when, where and why. They > listen to police and fire calls as well as cellular > calls. Hobbyist's scan the airwaves for hot > information and then perhaps tape a "good one" and > share it with other hobbyist's or members of a local > scanner club. The hobbyists are sometimes police or > fire buffs, retired people, or simply the curious. > > "2. The next levels of security pirates are called the > 'Techies.' These people may be the so-called computer > hacker or other electronic buff that possesses > technical knowledge and more sophisticated equipment. > These people intercept the transmission of a targeted > individual. These types of pirates are generally very > private and very motivated, often just by the thrill > of accomplishment. > > "3. The final level of security pirates is the > 'Specialist.' These individuals have a complete range > of equipment, running the gamut from analog to digital > scanners plus sophisticated electronic surveillance > equipment. These people have no alliances and usually > contract their services to the highest bidder, whether > a hostile foreign government, organized crime or a > business competitor. These people are very serious > threats and perform very targeted operations. Recent > movies, such as "Sneakers" illustrate the > capabilities, intelligence, strategies, and ingenuity > of the 'Specialist.'" > > --Excerped from > http://www.transcryptsecure.com/techcorner/listen.html > > --Mike > > --- Harry wrote: > > FROM rec.radio.scanner: > > > > it would seem Transcrypt Secure Technologies has > > started an > > advertising campaign against the average > > scannist/volunteer > > firefighter: > > __________________________________________________ > Do You Yahoo!? > Yahoo! - Official partner of 2002 FIFA World Cup > http://fifaworldcup.yahoo.com > > -- > FAQ: http://plaws.net/scan/scan-l.txt | NO COMMERCIAL POSTS! > Signoff: send 'unsub SCAN-L' to LISTSERV@L... > This LISTSERV(tm) facility provided free of charge by the > University of Arkansas > and is subject to termination without notice -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 5522 From: Steve Uhrig Date: Wed May 29, 2002 4:02pm Subject: Congratulations WIZARDS! Hi all, Three weeks ago I offered a technical challenge to the 1300+ members of this list in the form of an electronic riddle. This is what I posed: ======================= Here's the scenario. A suspicious-looking box was discovered in the boss's office the morning after a burglary in the electronics lab. You are tasked with identifying the box, and whether it is a surveillance threat or not. Picture a small black box. Aimee may picture a small pink box. While the physical size doesn't matter, let's say it's about the size of your fist. Plastic. Not connected to anything. However, there are 4 terminals on different sides of the box. The terminals are labeled A, B, C and D. Total of four terminals. You're not sure what's in the box. Your job is to decide what wiring, components, circuitry or whatever is in the box. There are no markings on the box. You are not able to open it. No visible or invisible clues. No tricks. No gimmicks. No lids, kids or space cadets. Guaranteed not to rust, bust or gather dust. If a condition or parameter is not specified here, it is irrelevant. You do not have access to an X-ray machine or any specialized tools or equipment beyond a standard VOM and junk most would have laying around a hobby workshop. If you aren't a ham or electronics experimenter and don't have a junk box, let's say you can have access to any components in a Radio Shack store. In testing, you happen to notice if you apply 1 volt AC at 60 cycles to any combination of two terminals, you get that same 1 volt AC coming out of the two remaining terminals. Doesn't matter which two you put AC into. Same thing comes out the other two. << The $64,000 question -- What's in the box? >> ======================= AND, here are the wizards who got the correct answer: Mitch D.rockdriver@y... Andrus A.andrus@a... Dora F.sparrowh@d... Andy G.agrudko@i... Rafail K.kapustir@y... (special congrats; a new student) Shawn H.srh@e... Niallinfo@e... Robert D.dyk@c... Doug R.rehman@s... Kirk A.kirkaren@e... Jim A.jmatk@tscm.com Eleven wizards out of 1300 + members. The above number less than 1%. Congrats, to each and every one of you. This was pure and basic theory, such as ALL *must* master before venturing into the world of microseconds and microwaves and TSCM. If you couldn't answer this riddle, question whether you belong in TSCM. The correct answer to the above: a 1:1 (ratio) transformer. I got as many incorrect answers as correct ones. Those who were close I tried to steer in the proper direction without giving anything away. Everyone was required to specify either a 1:1 transformer or, as it is commonly known, an isolation transformer. Either answer was acceptable, but only one of those two. I got weird answers, one of where the person who submitted it was so insistent it was correct I had to breadboard it, to prove my suspicion it worked only because of a common path through the AC power ground, which was not a given in the question and did not meet the conditions of the riddle. And I got a smart mouthed answer, like anyone who would apply voltage to an unknown box is crazy because it could contain explosives. This is to be expected. This was a RIDDLE! Not a real world scenario. In the real world, we'd try to X-Ray the thing in place first. Look for another black box riddle soon. I'll try to think up something equally as challenging, but which should be child's play to those who have mastered basic electric and electronics theory. Anyone else is welcome to come up with something also. Good work, guys. You're less than 1%, and you proved your competence. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: contranl Date: Fri May 28, 2004 0:47pm Subject: Re:Re: Aviation . It's a trade off between money-making and security ....one guess wich is more important (to them) I don't believe that the mentioned project also includes the "hardening" of avionics against interference wich would be very expensive. I have some interesting links on this subject on the bottom of this page at my website: http://www.tetrascanner.com/gsm-tetra-detector.html Tetrascanner www.tetrascanner.com 8747 From: contranl Date: Fri May 28, 2004 0:52pm Subject: Is this product and company Ok ? . I need a small digital videorecorder: My choise for this purpose would be this very little walkman sized ! digital harddisk recorder with 20 Gb capacity and built in monitor. I have found 5 USA distributors : http://www.mjelectronics.com/pages/new/40dvr.html http://store.security-camera.com/yhst-8798598243039/portable-dvr- digitalvideorecorder.html http://www.kjbsecurity.com/default.asp http://www.pimall.com/nais/dvr40.html http://www.surveillance-spy-cameras.com/mini-digital-recorder.htm Here is the manufacturer (taiwan), including a PDF with full specs http://www.talitor.com/products/DVR/3051071/page_3051071.htm Best price (wholesale) i could get was from : http://www.kjbsecurity.com Questions: ---------- 1) Is this product ok ?...does it do what it should do... no non advertised problems that i will discover later ? 2) kjbsecurity ...are they ok ? Thanks in advance ! Tetrascanner www.tetrascanner.com 8748 From: James M. Atkinson Date: Fri May 28, 2004 0:38pm Subject: Living in 2004 You know you're living in 2004 when... 1. You accidentally enter your password on the microwave. 2. You haven't played solitaire with real cards in years. 3. You have a list of 15 phone numbers to reach your family of 3. 4. You e-mail the person who works at the desk next to you. 5. Your reason for not staying in touch with friends is that they don't have e-mail addresses. 6. When you go home after a long day at work you still answer the phone in a business manner. 7. When you make phone calls from home, you accidentally dial "0" to get an outside line. 8. You've sat at the same desk for four years and worked for three different companies. 10. You learn about your redundancy on the 11 o'clock news. 11. Your boss doesn't have the ability to do your job. 12. Contractors outnumber permanent staff and are more likely to get long! -service awards. 13. You read this entire list, and keep nodding and smiling. 14. As you read this list, you think about forwarding it to your "friends." 15. You got this email from a friend that never talks to you anymore, except to send you jokes from the net. 16. You are too busy to notice there was no #9 17. You actually scrolled back up to check that there wasn't a #9 AND NOW U R LAUGHING at yourself. Go on, forward this to your friends .....you know you Want to send it!! ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8749 From: Robin Hunter Date: Fri May 28, 2004 1:18pm Subject: Re-Is this product and company O.K. Be aware that if you buy anything from PIMALL, you are paying a premium price, they are re-sellers and add a mark-up. regards from Scotland, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. [Non-text portions of this message have been removed] 8750 From: David Miller Date: Fri May 28, 2004 11:24am Subject: RE: Courses for potential sweepers.... You might be right, but I doubt you are write...... -----Original Message----- From: Ocean Group [mailto:inertia@o...] Sent: Thursday, May 20, 2004 3:06 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Courses for potential sweepers.... Someone was just commenting on the greatness of ARRL courses and how they are great value for money etc on another newsgroup.... Would I be write in saying that potential sweepers would be better off doing these ARRL courses instead of signing up for often expensive and useless 2-3 day TSCM commercial courses found in the US.... Present company excluded naturally... Anyone could any thoughts or opinions on this...Steve? Regards Ois --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.684 / Virus Database: 446 - Release Date: 13/05/2004 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8751 From: John Papaleo Date: Fri May 28, 2004 3:05pm Subject: test test by john papaleo [Non-text portions of this message have been removed] 8752 From: James M. Atkinson Date: Fri May 28, 2004 6:17pm Subject: Govt Computer Surveillance Rings Alarm Bells http://news.yahoo.com/news?tmpl=story&cid=569&u=/nm/20040527/tc_nm/tech_surveillance_dc&printer=1 Govt Computer Surveillance Rings Alarm Bells Thu May 27,12:10 AM ET By Andy Sullivan WASHINGTON (Reuters) - Nine months after Congress shut down a controversial Pentagon (news - web sites) computer-surveillance program, the U.S. government continues to comb private records to sniff out suspicious activity, according to a congressional report obtained by Reuters. Privacy concerns prompted Congress to kill the Pentagon's $54 million Total Information Awareness program last September, but government computers are still scanning a vast array of databases for clues about criminal or terrorist activity, the General Accounting Office (news - web sites) found. Overall, 36 of the government's 199 "data mining" efforts collect personal information from the private sector, a move experts say could violate civil liberties if left unchecked. Several appear to be patterned after Total Information Awareness, which critics said could have led to an Orwellian surveillance state in which citizens have little privacy. "I believe that Total Information Awareness is continuing under other names, and the (Defense Department) projects listed here might fit that bill," said Peter Swire, an Ohio State University law professor who served as the Clinton administration's top privacy official. Defense Department officials did not respond to a request for comment. Data-mining software has been used by the government and private businesses for years to make sense of large piles of information. Banks use data-mining tools to sniff out possible credit-card fraud, for example. Most government data-mining projects aim to improve service or cut down on waste and fraud, the report said. The U.S. Navy (news - web sites) tracks each ship part ordered since 1980 to see which ones fail most frequently, while the Department of Education (news - web sites) checks its student loan records against those held by the Social Security Administration (news - web sites) to make sure it is not loaning money to dead people. Others projects raised red flags for privacy experts. The Pentagon agency that handled TIA is not working on any data-mining projects, but another agency is mining intelligence reports and Internet searches "to identify foreign terrorists or U.S. citizens connected to foreign terrorism activities," the report said. That description prompted Electronic Privacy Information Center general counsel David Sobel to file a Freedom of Information Act request to find out more about the project. "Congress now needs to take a close look at ways to oversee and regulate the use of data-mining technology within the government," he said. Hawaii Democratic Sen. Daniel Akaka said he had asked the GAO, the investigative arm of Congress, to examine some projects more closely. "The federal government collects and uses Americans' personal information and shares it with other agencies to an astonishing degree, raising serious privacy concerns," Akaka said in a statement. The report shows that data mining can be a useful tool for the government, but safeguards should be put in place to ensure that information is not abused, said Nuala O'Connor Kelly, chief privacy officer at the Department of Homeland Security. Swire said the report did not appear to list any Justice Department (news - web sites) programs that use information from data aggregators ChoicePoint Inc. and Acxiom Corp., even though the agency has signed contracts with those companies. The Justice Department did not return a call seeking comment. The report also failed to note a planned airline passenger-screening system that has drawn widespread criticism from lawmakers and air travelers. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8753 From: William Elliott Date: Fri May 28, 2004 9:13pm Subject: Looking for cellular expert This is a repost with permission from another list. They are looking for an individual to be court qualified as an expert and hopefully that person is on the east coast You can contact John LaJoie at lajoie@p... I have a client that needs the services of an expert in the field of wireless cellular telephone communication. Specifically to evaluate telephone records and Nextel tower locations to determine whether or not a user could or could not have been in a specific area when the user made 35 cell calls on a particular day. I need an expert independent of Nextel, but not a disgruntled former employee. The trial is ongoing now and we need immediate service. The location is Massachusetts. The closer the better, but it won't matter if we get the right expert. Private email responses please. Thank you, JL JOHN M. LAJOIE, CLI, CCDI, CII President, Lajoie Investigations, Inc. 287 West Boylston St. West Boylston, MA 01583 Tel: 1-508-835-2211 Fax: 1-508-835-2110 Email: Lajoie@P... Website: www.PrivateInvestigator.com MEMBER: NALI, LPDAM, LPIA, CII, NACDL, NCISS, NAIS, INTELNET Again, if you meet the necessary requirements please contact John Lajoie direct, thanks. Regards, Bill Elliott, CII ELLIOTT & ASSOCIATES, Ltd. (GMT -7) www.prvt-eye.com www.cybercrimeinternational.com "tomorrow is promised to no one" [Non-text portions of this message have been removed] 8754 From: bredalrv1 Date: Fri May 28, 2004 8:19pm Subject: Question about a Secure phones Hi, I world like to find out about some Secure Phones. The Ones IM looking at are on Ebay. they are made by CVAS would like to know if these phones Phones are any good?. Any Help would be very Appreciated http://cgi.ebay.com/ws/eBayISAPI.dll? ViewItem&item=5702005932&sspagename=STRK%3AMEWA%3AIT&rd=1 Thanks 8755 From: A Grudko Date: Sat May 29, 2004 1:29pm Subject: FW: Wartime wireless worries Pentagon, by Xeni Jardin Wartime Wireless Worries Pentagon By Xeni Jardin Story location: http://www.wired.com/news/politics/0,1283,63604,00.html 02:00 AM May. 26, 2004 PT The rapid proliferation of digital cameras, phonecams and wireless gadgets among soldiers and military contractors is giving senior military officials concern, in the wake of images that showed abuse in an Iraqi prison and snapshots that showed rows of coffins of American soldiers. The Defense Department said it hasn't banned the devices and doesn't plan to -- as the Business Times of London and two wire services have reported. But the Pentagon is telling commanders in the field to strictly monitor the use of consumer wireless technology through Directive 8100.2 -- Use of Commercial Wireless Devices, Services and Technologies in the Department of Defense Global Information Grid -- issued last month. "We're in the situation today where everyone is using a cell phone, BlackBerry or some sort of wireless device that can be carrying voice, imagery or text -- and we either need that to be highly encrypted, or off of DOD systems altogether," said Department of Defense spokesman Lt. Col. Ken McClellan. "We don't want to be in a situation where anyone with a scanner can figure what we're about to do." (Anyone with a scanner, Colonel....?) In a nutshell, the directive tells all soldiers, contractors and visitors to Defense Department facilities that they can only carry wireless devices that conform to the military's security standards. These specify that the devices use strong authentication and encryption technologies whenever possible. In addition, the devices cannot be used for storing or transmitting classified information. Deputy Defense Secretary Paul Wolfowitz signed it in April after two years of internal debate. McClellan said commanders in the field haven't been told to use the directive to stamp out the use of the gadgets in Iraq. Instead, the directive is "general guidance" passed "along to the theater commanders, and they decide how to implement it in their own commands." While Secretary of Defense Donald Rumsfeld may not have signed a ban on new consumer digital-imaging technologies, he did express clear concern about the unforeseen impact of such technologies during the Senate Armed Services Committee hearing on May 7. "People are running around with digital cameras and taking these unbelievable photographs and passing them off, against the law, to the media, to our surprise, when they had not even arrived in the Pentagon," Rumsfeld said. According to McClellan, some Defense Department lawyers may be reviewing how the spread of consumer digital-imaging technology among military contractors and enlisted personnel affects the military's obligation to abide by a Geneva Convention article against holding prisoners up to public ridicule. "Lawyers may have looked at that and said, 'It's probably a good idea to get these things out of the prisons.' There's no Pentagon-induced rule in the theater at this time ... but there may or may not be some discussion taking place as to how the directive might be supplemented in Iraq to prevent things we saw at Abu Ghraib." Regardless, bloggers and media commentators perceive the directive as hand wringing by the administration, worried that someone else will expose another scandal. Chicago Tribune columnist Clarence Page chided the military's concern and called the devices "Weapons of Mass Photography" in a recent editorial, saying he believed every soldier should have a digital camera. Blogger and media critic Jeff Jarvis called for the Pentagon to "ban stupidity, don't ban exposing it." Apart from the debate around digital cameras in the battle zone, one significant item in the directive requires all branches of the military to encrypt unclassified data sent wirelessly by using FIPS 140-2-approved encryption, a tough-to-crack standard. Other items in the April directive include mandatory implementation of antivirus software on PDAs and smartphones, a move likely to please vendors like McAfee and Symantec, both of which have military supplier contracts. And the directive recommends (but doesn't mandate) that all voice communication be encrypted. Mizuko Ito, a cultural anthropologist who researches phonecams, culture and law, said that while authorities can -- and probably will -- attempt to restrict the use of handheld digital-imaging devices in specific facilities, the technology is too ubiquitous for any broad attempts at prohibition to be effective. "The cat's already out of the bag, but what's striking about what we're seeing now is that it's very unlike the top-down, Big Brother surveillance we normally associate with the idea of other people watching you," he said. "This is a bottom-up, 'little brother,' peer-to-peer type of surveillance. "My hope is that this will ultimately be a positive development, because powerful top-down institutions, like corporations or governments, won't be the only ones controlling the circulation of information." Andy Grudko (British), DPM, Grad IS (South Africa) Consulting Investigator, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , andy@g... Pretoria (+27 12) 244 0255 - 244 0256 (Fax) Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.692 / Virus Database: 453 - Release Date: 2004/05/28 [Non-text portions of this message have been removed] 8756 From: contranl Date: Sat May 29, 2004 3:34pm Subject: Smallest videorecorder ! (harddisk !) +Gsm spyphone demo . Look at this very small videorecorder at the size of a pack of cigarettes ! it records to an (internal) harddisk. http://www.4spi.com/PDFS/sting.pdf A good demonstration of things to come In most applications the video quality will be good enough There are more similar recorders now but this one is the smallest ! Very usefull for bodyworn applications , it warns you (vibrating) when memory is full or batteries are empty,there is a power-out for the external camera. The very popular Sony video8 could be considered outdated now Anyway you could detect it by looking for the colorburst freqs: NTSC = 3,579545 Mhz PAL = 4,433619 Mhz Or the harmonics of that. The camera you could detect using a VLF detector ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ I found this simple visual spyphone-demo wich explains how easy such a device is operated: http://www.gsm-resources.com/spy/index.shtml Greetings Tetrascanner www.tetrascanner.com 8757 From: Date: Sat May 29, 2004 10:52pm Subject: Watergate Committee Chief Counsel Samuel Dash Dies Watergate Committee Chief Counsel Samuel Dash Dies By Patricia Sullivan Washington Post Staff Writer Sunday, May 30, 2004; Page C10 Samuel Dash, 79, the chief counsel of the Senate Watergate Committee whose televised interrogation into the secret audiotaping system at the White House ultimately led to President Richard M. Nixon's resignation, died of multiple organ failure May 29 at Washington Hospital Center. Mr. Dash spent months doggedly questioning Nixon administration officials before White House aide Alexander Butterfield testified in July 1973 that there was an extensive taping system that captured executive office discussions about the break-in at the Democratic national headquarters. Mr. Dash asked him who knew about it. Butterfield replied: "The president . . ." Nixon resigned a year later. Mr. Dash's 53-year legal career touched some of the most important moments in American, and sometimes world, politics. He dramatically resigned in 1998 after four years as the ethics counselor to independent prosecutor Kenneth W. Starr, charging that Starr became an "aggressive advocate" of impeaching President Clinton. He said Starr exceeded the independent counsel's mandate, which was part of a statute that he helped draft. As the first American allowed to interview the imprisoned Nelson Mandela, Mr. Dash wrote a magazine article about him and mediated discussions that helped free the future president of South Africa. He wrote a book that influenced Supreme Court decisions on electronic surveillance, and he advised governments on investigations into human rights cases in Northern Ireland, Puerto Rico and Chile. But Mr. Dash probably will always be associated with the investigation that led to Nixon's resignation. Mr. Dash was offered the Watergate committee job by Sen. Sam Ervin (D-N.C.), who promised him independence and the ability to hire his own staff. He became so well known as a result of the televised Watergate hearings that he often was mistaken for a senator, and he said he could not buy socks without clerks asking for his autograph. Opponents came to describe him as a prima donna. It took months after Butterfield's revelation to get the Nixon tapes released, but it wasn't until 1981 that Mr. Dash dropped by the National Archives to listen to them. "I didn't want to go over there just by myself," Mr. Dash told a Washington Post reporter. But when Georgetown University faculty colleagues went to listen to the tapes, he went along and said he was glad he had. "There's quite a difference between reading the cold print in the transcripts and actually hearing the voices and intonation -- the conspiratorial tone of voice." It was a point of pride for Mr. Dash that, as a result of Watergate, all accredited law schools require a course in professional responsibility. In the 1970s, he helped Chief Justice Warren E. Burger devise the American Bar Association's ethical standards for prosecutors and criminal defense lawyers. While on the Starr commission, he helped persuade White House intern Monica Lewinsky to testify. But his relationship with Starr was thorny; Mr. Dash's liberal supporters had been shocked when he agreed to take on the job, and he threatened to quit five times before he finally did on Nov. 20, 1998. It was his timing and style as much as the fact of his resignation that was dramatic; it came the day after Starr testified for 12 hours before the House Judiciary Committee, and it came in a stinging two-page letter that charged Starr with "abuse of your office" for exceeding his mandate to report to Congress any impeachable offenses he had discovered. Mr. Dash cultivated a reputation for independence and was an advocate for legal ethics throughout his career. In 1951, while a teaching fellow at Northwestern University near Chicago, he conducted an undercover investigation into corruption at the Municipal Court of Chicago that resulted in a seminal report on legal corruption. For the International League for Human Rights, he investigated the killings of Northern Ireland Catholic youths by British paratroopers in 1972, during what became known as "Bloody Sunday," and published a report that helped influence the British parliament to award compensation to the families of the dead and wounded. Twenty-five years later, the report helped influence the British prime minister's decision to reopen the inquiry. During the 1980s, Mr. Dash investigated the killing of students in Puerto Rico by government agents. He also served as a mediator in Chile during an appeal by human rights leaders who had been exiled from Chile by a court. That country's supreme court reversed the exile order. Mr. Dash joined the Philadelphia district attorney's office in 1952 and was appointed district attorney in 1955 at age 30. He went into private practice the next year and conducted a nationwide investigation of wiretapping, resulting in a 1959 book, "The Eavesdroppers," that is credited with helping change the Supreme Court's position and federal and state laws on electronic surveillance. One of his daughters, Judi Dash, said yesterday that her father, who had been in Washington Hospital Center since January because of declining health, had been able to see a copy of his next book, "The Intruders: Unreasonable Searches and Seizures from King John to John Ashcroft," which will be published in June. "It deals with the violations of individual rights and the Patriot Act," she said. He was being wheeled from dialysis to his room as they discussed President Bush's State of the Union speech in which he urged continuation of the Patriot Act. "He then lectured the orderlies on the dangerousness of the Patriot Act," she said. While in the hospital, he planned another book, to be called "The Interrogators," on the rights of witnesses, she said. In 2002, Mr. Dash served on a task force to reform the ethical standards and organization of the United Way of the National Capital Area. Mr. Dash, who was born in Camden, N.J., enlisted in the Army Air Forces during World War II and flew reconnaissance over Italy. After the war, he graduated with a bachelor's degree from Temple University and a law degree from Harvard Law School in 1950. He was a trial attorney in the Justice Department in 1951 and then went to Philadelphia. After several years in private practice, he joined Georgetown's law school in 1965 as a professor and as director of its Institute for Criminal Law and Procedures. He taught criminal law for nearly 40 years and last year was voted co-winner of the law school's top teaching award. Mr. Dash told D.C. Bar magazine in 1998 that he wanted his students to be proud of their profession. "And above all, be honest and just with themselves and have integrity. Learn to say no in situations where saying no can be difficult, where it could mean getting fired. Say no anyway, because it could lead you to greater opportunities." Survivors include his wife of 57 years, Sara Dash of Chevy Chase; and two daughters, Judi Dash of Beachwood, Ohio, and Rachel Dash of Charleston, W.Va. © 2004 The Washington Post Company [Non-text portions of this message have been removed] 8758 From: contranl Date: Sun May 30, 2004 3:31pm Subject: Sensitivity of spectrumanalyzers . For some time i have been wondering what the (RF) sensitivity of a spectrumanalyzers is So i looked at several HP / Tektronix / R&S analyzers....i did not find anything stating the sensitivity ...untill i looked at the good old Avcom analyzers...Avcom states here: http://www.avcomofva.com/products/default.asp?page=psa65c that the sensitivity of this model (psa65c)is : -90 dBm Typical wich is only 7 uV !!! (microvolts) I have always suspected spectrumanalyzers to be not very sensitive compared to "real" receivers..wich is obviously confirmed now. The sensitivity of a "real" receiver or a standard lowcost scanner is in the range of 0,3 ~ 1 uV wich is 7 to 23 times more sensitive ! So comparing the 2 you could say that a spectrumanalyzer is "DEAF" ! As a reference...the sensitivity of a Audiotel "scanlock" is: -70 dBM typical wich is 70 uV !!! (that is not deaf..that is no ears at all ! :) For example my simple Bearcat has a sensitivity of 0,4 uV ! in the VHF and UHF range wich is 17,5 times more sensitive the the Avcom. That is a lot !...i am not saying that detection range is also 17,5 times more then with a spectrumanalyzer...it does'nt work like that i guess...but a few times(at least)more seems very logical For example a single frequency that you could detect at 1 meter with a spectrumanalyzer could be detected at 3~6 meters using a receiver or scanner ! A frequency that you could detect only at max 10 cm's distance using a spectrum analyzer would be detectable at ~50 cm's using a receiver Some freqencies would still be detectable with a receiver and not with a spectrumanalalyzer. Ofcourse there is a trade off here wich is SPEED: A spectrum analyzer is realtime and can display a 1000 mhz range at once and show all frequencies at the same (real)time A scanner is far from realtime A fast scanner would have a speed of for example 100 steps / second. To cover a 1000 mhz range that would be 250 seconds ! (50 khz steps) wich is very slow and probably to slow to detect any short lasting or (slow) hopping pulses In geneneral you would be looking for transmitters that transmit at high enough power to be easely detectable with a spectrumanalyzer Things are different if you want to check only a few KNOWN frequencies with very low power...like the ones you would expect to come from videocameras or gps receivers.. It might very well be that these signals do'nt show up on your spectrumanalyzer....since they are to weak The realtime issue would not be important in that case since you only need to scan a few frequencies. for: Videocameras that would be only 3 Vlf freqs ( will take 0,03 sec) Videocameras (clockfrequencies+harmonics) max 100 (will take 1 sec) Gps-receivers harmonics max 400 (will take 4 sec) That is fast and realtime enough Resuming: --------- If you are looking for known (low power)frequencies such as harmonics from receivers,gps,cameras or other non transmitting/sleeping equipment,then a "real" scanning receiver would be better then a spectrumanalyzer. Once again only if you know the frequencies and if they are no more then a few hundred. Comments ? Thanks Tetrascanner www.tetrascanner.com 8759 From: James M. Atkinson Date: Sun May 30, 2004 10:37pm Subject: Re: Sensitivity of spectrumanalyzers The "sensitivity" of a spectrum analyzer is referred to as the "Displayed Average Noise Level", or DANL. A typical laboratory grade unit used for TSCM will have a DANL of -150 dBm, and more recently designed units will be -160 dBm or better. There are some hacks you can do to drop this even further, but your going to have to use some extremely expensive low noise amplifier, ultra high stability time base, negative peak detection, and so on. This means that the AVCOM spectrum analyzers with a DANL of -70 dBM are something like 1,000,000,000 times (90 dB) less sensitive than a "real spectrum analyzer". To hash this out in "detect the bug" terms it means that if your 12 inches away from a bug with an AVCOM and you can actually detect the bug, that a more professional instrument will pick up the same bug about 32,768 feet away (or about 6.39 miles). However, at such distances you will have to deal with various propagation problems that will drop this to about a 1/3 or so. Bottom line is that if I am sitting in the back of one of my trucks with racks of modern tweaked up spectrum analyzers 7500 feet away from an executives conference room I can detect bugs long before I even get close to the customers parking lot, let alone inside the CEO's office... of course once I unload my equipment, and set it up near the area being checked 99% of all bugs present will given themselves up to my efforts (including many remote controlled devices). -jma At 04:31 PM 5/30/2004, contranl wrote: >. > > >For some time i have been wondering what the (RF) sensitivity of >a spectrumanalyzers is > >So i looked at several HP / Tektronix / R&S analyzers....i did not >find anything stating the sensitivity ...untill i looked at the good >old Avcom analyzers...Avcom states here: > >http://www.avcomofva.com/products/default.asp?page=psa65c > >that the sensitivity of this model (psa65c)is : > >-90 dBm Typical wich is only 7 uV !!! (microvolts) > >I have always suspected spectrumanalyzers to be not very sensitive >compared to "real" receivers..wich is obviously confirmed now. > >The sensitivity of a "real" receiver or a standard lowcost scanner >is in the range of 0,3 ~ 1 uV >wich is 7 to 23 times more sensitive ! > >So comparing the 2 you could say that a spectrumanalyzer is "DEAF" ! > >As a reference...the sensitivity of a Audiotel "scanlock" is: >-70 dBM typical wich is 70 uV !!! (that is not deaf..that is no >ears at all ! :) > >For example my simple Bearcat has a sensitivity of 0,4 uV ! in the >VHF and UHF range wich is 17,5 times more sensitive the the Avcom. > >That is a lot !...i am not saying that detection range is also 17,5 >times more then with a spectrumanalyzer...it does'nt work like that >i guess...but a few times(at least)more seems very logical > >For example a single frequency that you could detect at 1 meter with >a spectrumanalyzer could be detected at 3~6 meters using a >receiver or scanner ! >A frequency that you could detect only at max 10 cm's distance using >a spectrum analyzer would be detectable at ~50 cm's using a receiver >Some freqencies would still be detectable with a receiver and not >with a spectrumanalalyzer. > >Ofcourse there is a trade off here wich is SPEED: > >A spectrum analyzer is realtime and can display a 1000 mhz range at >once and show all frequencies at the same (real)time > >A scanner is far from realtime >A fast scanner would have a speed of for example 100 steps / second. >To cover a 1000 mhz range that would be 250 seconds ! (50 khz steps) >wich is very slow and probably to slow to detect any short lasting >or (slow) hopping pulses > >In geneneral you would be looking for transmitters that transmit at >high enough power to be easely detectable with a spectrumanalyzer > >Things are different if you want to check only a few KNOWN >frequencies with very low power...like the ones you would expect to >come from videocameras or gps receivers.. >It might very well be that these signals do'nt show up on your >spectrumanalyzer....since they are to weak > >The realtime issue would not be important in that case since you >only need to scan a few frequencies. > >for: > >Videocameras that would be only 3 Vlf freqs ( will take 0,03 sec) >Videocameras (clockfrequencies+harmonics) max 100 (will take 1 sec) >Gps-receivers harmonics max 400 (will take 4 sec) > >That is fast and realtime enough > >Resuming: >--------- > >If you are looking for known (low power)frequencies such as >harmonics from receivers,gps,cameras or other non >transmitting/sleeping equipment,then a "real" scanning receiver >would be better then a spectrumanalyzer. > >Once again only if you know the frequencies and if they are no more >then a few hundred. > >Comments ? > >Thanks > >Tetrascanner >www.tetrascanner.com ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8760 From: Pete Date: Sun May 30, 2004 8:59pm Subject: Re: Sensitivity of spectrumanalyzers >So i looked at several HP / Tektronix / R&S analyzers....i did not >find anything stating the sensitivity I'm quite sure than an HP or Tek manual would give the specs... But for an SA, the value is relevant to a certain display height on the CRT (i.e. uV per CM, or dbM per CM, etc.), rather than how much signal makes a discernable audio output. >I have always suspected spectrumanalyzers to be not very sensitive >compared to "real" receivers..wich is obviously confirmed now. A S.A. is not intended to be a receiver. Rather, it's a laboratory tool. For example, the SA will typically give you calibrated readings, while a receiver will not. >The sensitivity of a "real" receiver or a standard lowcost scanner >is in the range of 0,3 ~ 1 uV wich is 7 to 23 times more sensitive ! Careful there! Voltage sensitivity values do not really equate *linearly* to "sensitivity". You also need to define what exactly is meant by "detecting" a signal with a receiver. Does it have to have "n" dB of quieting? Is it OK to say "a signal is definitely there, but I can't make out the content"? >So comparing the 2 you could say that a spectrumanalyzer is "DEAF" ! No, it's designed to do something else... >As a reference...the sensitivity of a Audiotel "scanlock" is: >-70 dBM typical wich is 70 uV !!! (that is not deaf..that is no >ears at all ! :) It's probably intentional in the design. If it were too sensitive, it would lock onto all sorts of unintended signals, etc. Or, it may be intended to be used with a preamp. >For example my simple Bearcat has a sensitivity of 0,4 uV ! in the >VHF and UHF range wich is 17,5 times more sensitive the the Avcom. Careful again! There is way more to a good receiver than a plain sensitivity value. For example, I bet your Bearcat is easily overloaded by out-of-band signals. This is generally true for *any* wideband receiver, unless is has sophisticated (expensive) auto-tune filtering built in. >For example a single frequency that you could detect at 1 meter with >a spectrumanalyzer could be detected at 3~6 meters using a >receiver or scanner ! I doubt that these numbers are valid, without defining what "detection" means on the SA. Does it mean that you can see a 1 cm peak? Or 3 cm? Pete [Non-text portions of this message have been removed] 8761 From: John M Date: Sun May 30, 2004 11:09pm Subject: Re: Is this product and company Ok ? Have you checked these out? http://www.archos.com/ -- AV100 or AV300 series http://www.mobilemag.com/content/100/337/C1383/ RCA Lyra Audio/Video 20 GB Jukebox Closer to $400 and a bit less cheesy then that other one. __________________________________ Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger. http://messenger.yahoo.com/ 8762 From: Dave Emery Date: Sun May 30, 2004 4:17pm Subject: Re: Sensitivity of spectrumanalyzers On Sun, May 30, 2004 at 08:31:04PM -0000, contranl wrote: > . > > > For some time i have been wondering what the (RF) sensitivity of > a spectrumanalyzers is > > So i looked at several HP / Tektronix / R&S analyzers....i did not > find anything stating the sensitivity ...untill i looked at the good > old Avcom analyzers...Avcom states here: Spectrum analyzer sensitivity is spec'd as displayed noise floor in a specified bandwidth. ALL spectrum analyzer specs include at least some of this information. The most standard spec is noise floor with minimum video bandwidth at the narrowest resolution bandwidth. This would usually be the best case sensitivity. But for comparison with other instruments that may not have the same minimum bandwidth, the noise floor in a 1 khz bandwidth is a common number. For spectrum analyzers without preamplifiers a displayed noise floor around -115 dbm is common in a 1 khz bandwidth in the VHF/UHF range. Some modern high end instruments are significantly better than that, however. The actual thermal noise floor from a 50 ohm terminator at room temperature (20 C) is -144 dbm in 1 khz bandwidth so typical spectrum analyzers ARE very very deaf. This is because they are designed to be bulletproof and capable of handling powerful signals without adding much intermodulation or harmonic distortion rather than maximally sensitive. Many spectrum analyzers have optional built in broad band preamps that can be enabled or disabled - with preamp enabled the 1 khz noise floor may well be as low as -130-135 dbm or better. But the preamp limits the maximum signal that can be handled without distortion... In general for detecting weak signals some form of preamp/LNA is needed in front of a spectrum analyzer, bare without a preamp a spectrum analyzer is pretty deaf compared to a decent broadband receiver. -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass 02493 8763 From: kondrak Date: Sat May 29, 2004 6:07pm Subject: Re: Question about a Secure phones Who makes them? A google showed up nothing.... At 21:19 5/28/2004, you wrote: >Hi, I world like to find out about some Secure Phones. The Ones IM >looking at are on Ebay. they are made by CVAS would like to know if >these phones Phones are any good?. Any Help would be very Appreciated > >http://cgi.ebay.com/ws/eBayISAPI.dll? >ViewItem&item=5702005932&sspagename=STRK%3AMEWA%3AIT&rd=1 > > >Thanks > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 8764 From: kondrak Date: Sun May 30, 2004 4:43am Subject: How To Control Activists - I Declare You To Be A "Foreign Power" > > >TOTAL SURVEILLANCE EQUALS TOTAL TYRANNY > > > >Tom DeWeese > >August 23, 2003 > >NewsWithViews.com > >In the name of fighting terrorism a new kind of government is being >implemented in Washington, D.C. We are witnessing the birth of a powerful >multi-billion dollar surveillance lobby consisting of an army of special >interest groups, Washington lawyers, lobbyists, and high-tech firms with >wares to sell. > >The personal rights of American citizens, protected until now by the Bill >of Rights, are the farthest thing from their minds as they seek to fill >their pockets while enabling government to monitor and control our lives >to a degree unheard of prior to September 11, 2001. This army seeks riches >as it pushes for laws and regulations to spy on and control the lives of >law-abiding Americans. > >The Government Electronics and Information Technology Association (GEIA) >reports that there are more than 100 federal entities involved in forging >the largest conglomeration of government-private contractor interests >since the creation of the Pentagon. GEIA represents hundreds of corporate >members seeking to cash in on the Homeland >Security-citizen-surveillance-spending spree. > >GEIA told the news media that the "needed technologies include those >providing digital surveillance, data mining, advanced encryption, smart >cards, censors and early warning and profiling tools." In September 2002, >dozens of major high tech companies formed the "Homeland Security >Industries Association". A key objective of the association is to win a >piece of the action for the creation of national ID cards for travelers. > >The November 25 edition of Business Week reported that the SAS Institute >is among many corporations scrambling to launch a whole new line of >anti-money laundering software designed to help insurance companies, >investment banks and brokerage firms spy on their clients' financial >activities on behalf of the government in compliance with the Patriot Act. > >According to Bert Ely, the head of a consulting company for financial >institutions, the new anti-money laundering provisions of the Patriot Act >will do nothing to stop the financing of international terrorists. At >best, he says, the new provisions will actually provide evil doers with a >road map to avoid detection. > >What the new Patriot Act provisions are really about, says Ely, is to have >the United States fall into line with an international campaign being >waged by the Organization for Economic Cooperation and Development and the >Financial Action Task Force against countries that serve as tax havens. >The newly enacted regulations are being applied in the name of fighting >terrorism, but are really about a different agenda. > >In mid-September 2002, the U.S. Department of Commerce and the Office of >Homeland Security held an exposition in Washington. Medium and small firms >from across the nation were invited in to showcase the very latest in >citizen surveillance wares. This tradeshow and others like it have >attracted hundreds of corporations who've shown their high-tech products >to top government planners responsible for creating and implementing new >restrictions on privacy in the name of "national security." > >PoliticalMoneyline says that 444 groups and individuals have registered as >lobbyists to deal with "terror" and "security" issues. > >IBM has opened a "Government Solutions Center" in Vienna, Virginia. The >high-tech Unisys Corporation has established a similar exhibition for >inspection by federal surveillance planners, called the "Homeland Security >Center for Excellence." Both corporations are racing to cash in on >billions of dollars for facial recognition systems at airports, and in >anticipation of "trusted traveler" cards, a high-tech ID tied to extensive >background checks and biometric identification. > >In February 2003, it was discovered that the Department of Justice was >drafting legislation to radically expand the reach of the federal >government into the lives of every American citizen. The official title of >the document is the "Domestic Security Enhancement Act of 2003. It's been >given the nickname, Patriot 2. The bill has not yet been introduced in >Congress and only a very few key government leaders including Vice >President Cheney and House Speaker Dennis Hastert have reviewed it. > >It is suspected by many that the delay in officially offering the bill to >Congress is a direct result of public attacks on the bill by privacy >advocates, but it is feared that the Justice Department would get very >bold in rushing it through should another terrorist attack occur. > >Here are just a few of the more frightening provisions of Patriot 2. By >definition in the bill, almost any American citizen can arbitrarily be >designated a terrorist. Section 101 of this act will give the executive >branch the power to declare any American a "foreign power" and therefore >not a citizen. Those designated will be exempt from the protections of the >Constitution. > >Keep in mind that the Patriot Act was passed by Congress, sight unseen, in >the middle of an Anthrax scare. Every member of Congress was warned that >if they failed to pass it then the next terrorist attack would be on their >hands. > >That's why the Patriot Act allows for wiretaps without warrants. And it's >why all the other surveillance a-go-go is in full swing. In the name of >fighting terrorism, our government has gained the ability to see our every >movement, inspect every transaction, and walk into our homes without our >knowing it. > >For those of you who feel protected; who feel the government is just doing >its job to defeat terrorism, I'm very sad to tell you that our government >is not being honest with us. Terrorism is the excuse, not the motivation, >for the massive drive toward Big Brother. > >We are not being protected. We are being wrapped in a cocoon of tyranny. >All of the signs are there. Consider the power which we have now granted >to the federal government twenty years down the road, driven by more >technological developments that we can't even pretend to foresee. > >Imagine the America that you are allowing the government to create for >your children. What will their lives be like? Will they know freedom or >oppression? We are making those decisions for our children today. > >The only way to make sure that government doesn't abuse its power is to >not grant it in the first place. [Non-text portions of this message have been removed] 8765 From: Michael Puchol Date: Mon May 31, 2004 2:27am Subject: Re: Re: Is this product and company Ok ? Hi, I have seen the Archos units (both the large and smaller LCD models) and they seem to perform OK, albeit the video is by no means studio quality, if you get my meaning. To get meaningful recording lengths you have to go with compression, which doesn't do much good. Other than that, they are very nice little units. Regards, Mike ----- Original Message ----- From: "John M" To: Sent: Monday, May 31, 2004 6:09 AM Subject: [TSCM-L] Re: Is this product and company Ok ? > Have you checked these out? > > http://www.archos.com/ -- AV100 or AV300 series > > http://www.mobilemag.com/content/100/337/C1383/ > RCA Lyra Audio/Video 20 GB Jukebox > > Closer to $400 and a bit less cheesy then that other > one. > > > > > > > > > > > > > __________________________________ > Do you Yahoo!? > Friends. Fun. Try the all-new Yahoo! Messenger. > http://messenger.yahoo.com/ > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > 8766 From: James M. Atkinson Date: Mon May 31, 2004 10:41am Subject: RAW man turns out to be US spy http://sify.com/news/othernews/fullstory.php?id=13485065 RAW man turns out to be US spy Friday, 28 May , 2004, 03:15 Ravinder Singh, a joint secretary in the Research and Analysis Wing (RAW) who had been missing since May 14, is believed to have been spying for the US. He may have defected to America. Singh, who was being watched by RAW's counter-intelligence wing for the past one month, came under suspicion after a 'slip' by a US diplomat working under cover at the American embassy. The US official, on a routine liaison session with RAW officers, happened to mention Singh's name. It led RAW to mount a counter-surveillance operation. Singh's phones were tapped and a spy camera was fitted in his office at RAW headquarters. The spy-cam showed Singh photocopying top-secret documents and other operational details of the country's external intelligence agency, which he is believed to have later passed on to his American handlers. While the agency is trying to establish what secrets Singh compromised, what is clear is that the spy fled while RAW dithered. When RAW's bosses discussed the issue with a former top security official, they were asked not to proceed against Singh legally. That split the RAW hierarchy. While one group wanted immediate action against Singh, another refused to give the green light for Singh's arrest. The time lost gave Singh the opportunity to make a quiet getaway. Sources said his US handlers may have assisted him in his escape. They said Singh would host dinners and parties for several colleagues from whom he tried to procure secrets. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8767 From: huzypuzy Date: Mon May 31, 2004 10:04am Subject: GSM off air laptop interceptor On the internet there are rumors that the GSM phones can be monitored with a laptop and the required software. There are units in the range of 200,000 $ to 400,000$ but this one I'm talking about is said that it cost about 4,000$ and is available in Europe. Unfortunately I do not know exactly any link. Does anyone heard about this or has any link ? Kenny 8768 From: Michael Puchol Date: Tue Jun 1, 2004 1:50am Subject: Re: GSM off air laptop interceptor Try here: http://www.badbusinessbureau.com/default.asp Regards, Mike ----- Original Message ----- From: "huzypuzy" To: Sent: Monday, May 31, 2004 5:04 PM Subject: [TSCM-L] GSM off air laptop interceptor > On the internet there are rumors that the GSM phones can be > monitored with a laptop and the required software. There are units > in the range of 200,000 $ to 400,000$ but this one I'm talking about > is said that it cost about 4,000$ and is available in Europe. > Unfortunately I do not know exactly any link. Does anyone heard > about this or has any link ? > > Kenny 8769 From: Hawkspirit Date: Tue Jun 1, 2004 11:44am Subject: Nelk Anyone know anything about this company? Roger http://www.nelk.ru/eng/katalog.php?part=1&open=_86&id_parent=86 [Non-text portions of this message have been removed] 8770 From: Hawkspirit Date: Tue Jun 1, 2004 11:54am Subject: Smart Bullet Smart bullet http://www.newscientist.com/news/news.jsp?id=ns99995054 [Non-text portions of this message have been removed] 8771 From: A Grudko Date: Tue Jun 1, 2004 11:58am Subject: $30 Keychain Wi-Fi Seeker From another list... If you use Wi-Fi, you can use this $30 keychain-size (but incredibly accurate) seeker: http://www.wifiseeker.com/ Now - here's the kicker. The company will take small-quantity orders and put your logo/phone number on them or even make them in "your" colors as very unique gifts, etc. for those attorneys you work for or other big clients, etc. Not something you'd give out on the street, but neato gifts for clients can be hard to find - someone already gave them a calculator...a clock...an MP3 player...whatever. Probably not this. Andy Grudko (British), DPM, Grad IS (South Africa) Consulting Investigator, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , andy@g... Pretoria (+27 12) 244 0255 - 244 0256 (Fax) Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.692 / Virus Database: 453 - Release Date: 2004/05/28 [Non-text portions of this message have been removed] 8772 From: contranl Date: Tue Jun 1, 2004 2:15pm Subject: Re:$30 Keychain Wi-Fi Seeker . One of the links (review): http://wifinetnews.com/archives/003248.html reveals that this "wifi seeker" is nothing but a simple: 2,4 ghz rf detector. in other words it will show all kinds of signals at 2,4 ghz such as microwaves.wireless cams,bluetooth,wifi.wlan...etc You are supposed to look at the LED's By looking at the pattern of the LED's flashing (signalstength/modulation)you have to guess what it is you are receiving...very poor...not very usefull other then there is someting here at 2,4 ghz (if there is no High-Q 2,4 ghz filter in there then it will probably suffer from deafening by 1800/1900 mhz celphone/gsm stations) Another company (mentioned in a previous post) sells the same kind of thing ...but built into a pen...they advertise it as a wireless video-camera detector...that one is a simple rf-detector also Both are nice as gadgets but will give you lots of false signals or none at all (while they might be there)...ok they might be usefull as very short range indicators of something "in the air" at 2,4 ghz When they would add a simple and very small microprocessor (PIC) that recognises the modulation (pulse counting)and a lowcost dielectric/saw filter then it would be more valueable... it would probably only double the price...untill then ....Gadget ! and not very usefull in countersurveillance. Tetrascanner www.tetrascanner.com . 8773 From: Steve Uhrig Date: Tue Jun 1, 2004 4:31pm Subject: Re: GSM off air laptop interceptor Once upon a midnight dreary, huzypuzy pondered, weak and weary: > On the internet there are rumors that the GSM phones can be > monitored with a laptop and the required software. This is true only with severe restrictions. The target first must have been identified via monitoring through the infrastructure, which requires legal authorization and extensive premeditated hardware and software networking. Once a particular target has been identified with a dedicated intercept system through the network of the service provider, off air monitoring of that specific target only can be done. The system operates at 900 or 1800 MHz. However, it is useful for close in surveillance only in that the user needs line of sight to the target within about 350 meters and the distance to the cell transmitter simultaneouly within 2 km. Line of sight means nothing between the intercept antenna and the mobile telephone and cell site antennas other than air. So while it is possible, it's not practical and absolutely not a threat. Extensive coordination with both law enforcement for authorization and with the mobile telephone service provider is needed. This is not something available to other than government agencies. It's used for specialized applications only, and the system used in the field is considerably more involved than a small hardware box and a laptop. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8774 From: Ocean Group Date: Tue Jun 1, 2004 4:31pm Subject: RE: Nelk Yeah I do, what do you need to know? Ois ********************************** Message: 4 Date: Tue, 1 Jun 2004 09:44:45 -0700 From: "Hawkspirit" Subject: Nelk Anyone know anything about this company? Roger http://www.nelk.ru/eng/katalog.php?part=1&open=_86&id_parent=86 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.693 / Virus Database: 454 - Release Date: 31/05/2004 8775 From: Steve Uhrig Date: Tue Jun 1, 2004 4:46pm Subject: Sensitivity of spectrum analyzers In response to several messages, I have uploaded the data sheets for the popular Tektronix 492/494 series of spectrum analyzers here: http://www.swssec.com/jpegs/Reports/tek-sa.pdf The scans are over 660K so if you're on dialup be aware the download will take a while. I'll leave them up maybe a week. Anyone interested can download them and make their own comparisons to Avcom or whatever. Avcom's specs are on their website: www.avcomofva.com The Avcom is a perfectly usable piece for TSCM. There indeed are machines out there which cost 100 times as much, but there are plenty of Avcom units doing fine duty. Yes, others may be more sensitive than the Avcom. However, moving your receive antenna a bit closer picks up a lot in signal strength. By halving your distance, you increase signal level into your receiver by a factor of 4 (6dB). So if you're in a room with a potential hostile transmitter and your spectrum analyzer antenna is 10 meters from the hostile transmitter antenna, moving to 5 meters (or just moving around so at some point you get closer) will quadruple your signal strength, for free, and for no increase in noise level. Learning to use your equipment to its maximum potential many times can substitute for a lot of money spent on fancier hardware. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: Dries 'Doris' Bessels Date: Wed May 29, 2002 2:04pm Subject: Microwave mind control For more info on how to build a tin foil beanie to keep the rays out of your brain check out: http://zapatopi.net/afdb.html , the website about aluminum foil deflector beanies! Enjoy! Dries Dries 'Doris' Bessels Ride to work, work to ride Amsterdam, The Netherlands FLSTC '00 (Yellow) E-mail : Dries@D... http://www.driesbessels.com Cellphone: +31-6-4402-8346 http://www.flimm.com [Non-text portions of this message have been removed] 5524 From: Date: Wed May 29, 2002 5:33pm Subject: New file uploaded to TSCM-L Hello, This email message is a notification to let you know that a file has been uploaded to the Files area of the TSCM-L group. File : /chinesewaterskiing.jpg Uploaded by : graniteislandgroup Description : Chinese Water Skiing You can access this file at the URL http://groups.yahoo.com/group/TSCM-L/files/chinesewaterskiing.jpg To learn more about file sharing for your group, please visit http://help.yahoo.com/help/us/groups/files Regards, graniteislandgroup 5525 From: Steve Uhrig Date: Wed May 29, 2002 6:50pm Subject: Microwave TSCM LPA antennas for sale Hi all, I have some microwave LPA (log periodic antennas) for sale. These started with a commercial antenna, and I had special mounts machined to allow them to be used with a tabletop tripod. I have been using one in my own TSCM efforts on a Tek spectrum analyzer, and they are noticeably directional when you find a cordless phone base on 900 or 2.4. They also make a very noticeably stronger signal on 2.4 wireless signals when used on the receive end (not legal to use on the transmitter in the U.S.). Frequency coverage at 3dB down is 825 - 2600 megacycles, and the antennas have 6dBd of gain across the full frequency range. 6dB gain is the equivalent of quadrupling the transmitter power, and will double the range over the use of a unity gain antenna. If you are sweeping, this antenna will let you sniff a transmitter at double the distance of a whip, in addition to providing a bearing to the signal being inspected. Merely rotate the antenna on top of the tripod for strongest signal on whatever you are using for a receiver, and the antenna will be pointing in the direction of the transmitter or strongest reflection. The antennas are triangular shaped, about 6 inches to a side. They have 12 inches of captive feedline terminated in a male BNC. The antennas have been attached to a mount of my own design to permit them to be attached to a small tabletop tripod and pointed in any necessary direction. There is a standard female 1/4-20 threaded port, and an elevated portion to raise the antenna above the desktop so you can mount it on the desktop tripod. Of course, you can use a standard camera tripod just as easily. However, with a small tabletop tripod, this antenna and tripod easily can fit in a small Pelican case of about cigar box size. The antenna will work equally as well for transmit as receive. If you are doing either a 900 or 2.4 gig wireless video system, using one of these antennas at one end will double your range. Using one at each end will quadruple your range over unity antennas. Although I intended these specifically for TSCM, they will benefit nearly any wireless video application, or even data applications aka 802.11 type. These antennas are *not* preamped. A preamp introduces noise, significant potential for intermod, and precludes the antenna's use for transmit. I do not believe in preamps. Getting a little bit closer to the transmitter is more effective than preamping the signal and causing a lot of associated problems salesmen don't tell you about when pushing preamped antennas. Plus, you don't need to worry about batteries, power supply, or larger size. Only two are available. Price is $175 for the antenna. If you need a small tabletop tripod, inquire. I have several available which will work. Actually, I use a Minox camera tripod which is extremely high quality and packs up to about the size of a fat pencil and can be used with film or most camcorders as well. A tripod is *not* included. I imagine most in the business already would have a tripod of some sort. Holler if interested. Can ship anywhere in the world and we take credit cards for payment. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5526 From: Date: Wed May 29, 2002 8:31pm Subject: A few tips on how the experts spot a terrorist A few tips on how the experts spot a terrorist Israeli security specialists say US system looks for the weapons while Israeli system looks for the terrorist. By Ben Lynfield | Special to The Christian Science Monitor JERUSALEM - For years, a T-shirt has been on sale in downtown Jerusalem that reads: "Don't worry America, Israel is behind you." It is a slogan whose time has come ‚Äì at least for the Israeli government, which is translating American post-Sept. 11 security concerns into closer ties with the US, and for Israeli businessmen, who see an opportunity to market their army and secret-service experience. Israel's Shin Bet security service last week instructed a delegation from the New York Police Department on how to deal with suicide bombings. On Monday, eight senior law enforcement officials from Georgia arrived for a week of lectures, seminars, and scrutiny of an Israeli paramilitary border police unit. The bomb unit of the Los Angeles Police Department was here earlier this month. And Israeli police superintendent Shlomo Aharonishky met two weeks ago in Washington with Chief of Police Charles Ramsey and FBI agents to discuss how to handle suicide bombers. "There is no question the ties have gotten closer," says Gil Kleiman, an Israeli police spokes-man. "No other law enforcement agency has the experience we have in dealing with terrorism within the constraints of a Western system of law and court systems." By year's end, Israel will host a convention of police commissioners from across the US, Mr. Kleiman says. While Israel's security forces are widely reputed to be among the best in the world, not everyone in Israel agrees that the country offers a model of how to reconcile security measures with democracy. "Palestinian civilians need to prepare for their graves when they approach Israeli checkpoints," says Hashem Mahameed, a member of the Knesset for the left-wing Hadash Party. "I don't think the practices in the West Bank and Gaza are something Americans could take pride in." But Israeli security specialists say that the occupation of the West Bank and Gaza Strip, which began in 1967, as well as securing Israeli facilities in the Middle East, Europe, and Africa, have accorded decades of experience which can benefit the US. For example, they say, Israel has been grappling with how to stop suicide bombers since 1987, when the Iranian-inspired Hizbullah group began bombing Israeli targets in Lebanon. "We met with people from the World Trade Center who told us that they thought of everything except for an airplane crash," says Shlomo Dror, a security specialist who works with American clients. "I told them that we began thinking in 1983 about the possibility a plane could be hijacked and crashed into the Shalom Tower [in Tel Aviv]." Mr. Dror was spokesman for the Israeli defense ministry and before that the spokesman for an Israeli government agency responsible for Palestinians in the West Bank and Gaza Strip. He joined the Shin Bet 23 years ago, after his army service, and has been in charge of security for embassies and El Al airline on three continents. He was watching television in his office in the Defense Ministry in Tel Aviv on Sept. 11. "When I saw the second plane crashing I knew it was a terrorist attack. It made me realize that the United States is really in need of advice from Israeli professional people." "Israel has been some kind of laboratory to check how the suicide bombers work, and all the conclusions from our experience can be brought to bear in the United States," he says. Together with American partners with experience in the marines or CIA, Dror and two Israeli colleagues in January formed New World Security, a New York-based company to offer advice ranging from securing buildings to training travelers on how to protect themselves from kidnapping or abuse. No figures are available for how many Israelis have gone into security consulting for American clients since Sept. 11, but Zeev Schiff, defense correspondent for the daily newspaper Haaretz, says they are carving out niches in computer security and airport security. "These people have a lot of experience and know the tricks of the other side," he says. Dror says his company's clients include Wall Street firms and a municipality, but declines to be more specific. Israeli specialists have a low regard for American security searches. They say they tend to cause unnecessary discomfort for travelers, while being prone to missing potential assailants. "The United States does not have a security system, it has a system for bothering people," Dror says. "The difference between the Israeli and American systems is that we are looking for the terrorist, while the Americans look for the weapons," he adds. At the heart of the Israeli system is the questioning of the passenger, which Dror says is done not only to get answers, but also to gauge the passenger's behavior. "The reason we open the suitcase is to have another few minutes with the passenger, to ask some more questions," he says. The questioning also serves as a way to quickly decide who to send to the plane without probing more thoroughly, he adds. Dror advocates Israeli-style security clearances for all workers at the companies for whom he consults. They entail checking a person's history by interviewing acquaintances and family "We check the man himself, not documents." But Dror adds that Israeli methods, even if fully adopted, will not stop all attacks. "There is no 100 percent in security. If you want 100 percent security on flights, every passenger has to take all his clothes off, have his suitcase checked, and be handcuffed and tied to his seat. For sure this can never be. The idea is to enable people to continue their lives while making an attack less possible." from the May 29, 2002 edition - http://www.csmonitor.com/2002/0529/p01s03-wome.html 5527 From: D Patrick Date: Wed May 29, 2002 9:02pm Subject: Newbie Intro Hi all. Dean Patrick here. I have BS in biology and computer science. After working three years post undergrad I enrolled in law school. Following graduation I will remain in the Detroit area and most likely startup a patent firm. My interest in TSCM began way before I knew anything about the topic. A fourteen year old boy on the phone with his girlfriend. Little brother comes into his room to annoy him as ususal. No! Not this time. Little brother informed the boy that while he was in father's office he could hear his brothers' entire conversation. Father had spliced the line by the laundry chute and tucked the wires out of casual view. Evaluation of the line led the boy to behind his father's desk where a radio shack hookup of some type was activating the tape recorder everytime the phone was in use. Ouch. A crappy way to get interested, but here I am. D. Patrick ps when i go to the group page i can only post, i cannot read other messages. 5528 From: claim5 Date: Wed May 29, 2002 10:33pm Subject: Ok, I admit it, I'm a lurker.... I've been lurking in this group for many moons now, recently got state license for P/I work with a Russian and Israeli, and we're specializing in this area. (I did talk the russian out of bringing in a russian NLJD and certain other russian gadgets) Just for background, I graduated Ft. Devens in 79' did advanced signal search and development thru Goodfellow AFB, worked for ASA (N) 7 years and (in a second childhood) have obtained the entire shooting match from REI along with assorted items from ICOM, Lear and other stuff. It's an interesting living but we're making the best of it. I'm so ashamed, haven't had anything to contribute to date. Thanks, group for all the (lurked) advice, many have asked the same questions I've pondered and received stellar answers from so many, especially from the moderator without whom this group would probably not exist. Hope I haven't bored you all too much, just had to get it off my chest. Please feel free to contact me to admonish, etc.. Thanks again, Tim Van Driska Brentwood International Chicago claim5@y... (web page under development) 5529 From: Marty Kaiser Date: Thu May 30, 2002 10:45am Subject: here is the latest
FBI Vendetta Against
Martin L. Kaiser III




Initially this page consisted of a compilation of news magazine and newspaper articles.   I was under the impression that since  I  did not write these articles they would withstand the test of time.  I was wrong. Not too long ago I received a direct threat from a well known U.S. intelligence agency ordering me to remove their three initials from these articles.   Pointing out that asking me to remove their initials was essentially changing history didn't phase them...  somewhere in my argument I mentioned Adolph Hitler.

In the past I have purposely avoided making any personal observations and/or comments about these events and the stories surrounding them.  The time is now right to make those observations and comments.

The enormous damage caused to my family and me cannot be forgiven.   These events are an insult to all my friends and associates...  an insult to the United States of America...  and an insult to the world community.  Read on...

Marty


First some comments on format.  All my personal observations will be in BLUE while public records and direct quotations will be in BLACK.  Names will be mentioned, where harmless, but where mentioning them may cause problems I shall simply put either initials or XX.

Deciding where to start was the most difficult part of this story.  I decided to start at the beginning.

Born in 1935, my family and I lived in the the hard coal region of northeastern Pennsylvania.  We were surrounded by families from Czechoslovakia, Poland, Lithuania, Hungary and many other coal miner producing countries.  Having the Kaiser name didn't help me much while these countries were being torn to shreds before and during World War II.  The hatred expressed towards me by neighborhood children was enormous.  As a child I had no idea that their animosity was anything other than the norm.   My childhood obviously played a MAJOR role in what I became...  there also were some shameful events that hardened me in ways few will understand...  so I'll move on.

During my pre-teen and early teen years I was fascinated by U control model airplanes and had a large collection of them.  As radio controlled airplanes began to appear I found electronics more interesting.  Shortly after the end of WW2 I received my amateur radio license W3VCG and still hold those call letters today.

I can't say my school years were a shining beacon but at least I got through them.  In prep school XX became my co-dependent good buddy.  He was born without eyes but in spite of this I was able to get him involved in ham radio too.  I took the glass out of the meters of an old rig and XX was able to tune it by the pressure the pointer exerted.  He taught me how the loss of one sense is compensated for by the others.  We had lots of fun together with this incident being the funniest.  I had my Mom's hand-me-down 51 Caddy and would drive it to a long riverside park on the other side of the river from Wilkes-Barre.  Then I would allow XX to take the wheel and speed up and down the park usually with his left arm out of the window banging wildly on the side of the car while grinning from ear to ear.

In 1957, I was hired as a Research Technician by RCA Laboratories in Princeton,  New Jersey.  A group of 12 established scientists were my "bosses."  Dr. Morton,  co-inventor of television as we know it today...  Dr. Rudy,  inventor of many image conversion devices... one of our image intensifiers took the first pictures of the bottom of the polar ice cap and one took the picture of a single photon (one particle of light)... Dr. Forge,  co-inventor of the vidicon and other TV conversion tubes...  Dr. Sommers,  inventor of the Iconoscope,  the image conversion tube that made real time video possible...  Dr. Kleitman,  inventor of many high efficiency phosphors...  Dr. Ching,  inventor of many helical microwave amplifier tubes...  Dr. Nergard,  one of the people instrumental in the development of the Klystron oscillator that made radar possible...  Dr. Klensch (Dick),  (most of the work I did was for him)  did basic engineering on a variety of projects...  and many other truly brilliant minds.  My job was to be their "hands."  I designed and built much of the circuitry that permitted all of these men to continue with serious development.  In our group I remember four other technicians,  each with their own expertise.  We worked well together as a team and although I was always sticking my nose (comments) into many,  many projects other than mine it gave me the opportunity to be part of some incredibly interesting projects...  the end results of which became technology and products we take for granted today.

Obviously,  I turned my amateur radio interests towards amateur television.  I wrote extensively for technical journals, RCA in-house technical publications and radio amateur magazines and had my own ham TV station on the air.  Another amateur television enthusiast,  William Haldane (Bill),  and I became close friends.  He was part of RCA Service Company,  a group that put our ideas into the field for further trials.  At that time, Dr. Klensch and others, including me, were developing several schemes involving VVLF technology...  below 10HZ...  we used to call them "cycles" back then.

Since we were all pretty much playing it "by ear" we had more fun than anyone should have in one lifetime.  Here is a good example.  Several hundred yards behind the main building was a small pond.  A bridge crossed the pond and in the middle of the bridge was a small house for test equipment.  A hydrophone was lowered from the house into the pond.  Two hundred yards away a 10 foot long by four inch diameter rod was driven flush with the ground.  Next to it lay a small loudspeaker connected to a microphone in the pond house.   My job was to drop a 10 pound cannon ball onto the stake when Klensch yelled "go" and he,  in turn,  would measure the shock wave.  So there I was in the middle of a field repeatedly dropping a cannon ball on the ground.   Someone inside the main building noticed me and called authorities. Soon an ambulance was fast approaching across the field.  My explanation caused all concerned side splitting laughter.  After the ambulance left Klensch and I continued with the cannon ball dropping experiment.

One day Bill approached me and asked if I'd like to go to Trinidad. Neither he nor I knew where that was but it sounded interesting. When I got home I grabbed the Encyclopedia and found out.  After discussing it with with my wife I returned with a firm "YES."  A month or two later Bill again approached me and advised that Trinidad would not accept our presence and asked if I would like to go to Antiqua.  I didn't know where that was either but again said yes.  A month or two later he told me that Antigua wouldn't accept our presence.  He mentioned RCA had decided to set up the project on Barbados where there was a small U.S. Navy base and they simply would not tell the Barbadian government about the project.  He asked if I would go there and I responded in the affirmative even thought I had no idea what the "Project" was all about.  Finally I was given a briefing about a new high frequency (1 to 30 MHz)  "Over the Horizon Radar"  an RCA technician/ham had conceived.  My job was to see if it would work.  I later learned that the two islands had turned us down because it was during the Cuban missile crisis and they did not want to antagonize their friend, Cuba.

I was transferred to RCA Service Company and sent to Burlington,  Massachusetts to check out the hardware. When I got to Burlington,  to my astonishment,  NOTHING relating to the project was there!  Within three months I appropriated or stole (allocated but not yet delivered...  midnight raids, you know) and assembled all of the equipment needed in two 40 foot trailers. Inside of the Trailer Finally the two trailers were ready to put on ships headed towards Barbados and Jamaica.  My wife and I closed up the house and along with our 3 and 5 year old children flew, on probably one of the first 707's to take to the air, to Barbados.

As soon as we got settled I went to the Navy base to announce my presence.  The Captain of the base responded with total surprise.  No one had informed him of our intention to set up on "his" base (north coast)!  It turned out that the four RCA advance men never left Bridgetown (south coast), the capital city of Barbados,  but instead spent their time enjoying the wonderful Barbadian rum and the strikingly beautiful Barbadian women!  I was truly on my own.  After some serious negotiating,  the Captain gave me a few hundred square feet of space on which to set up my project.  The trailer finally arrived and, you guessed it, there was no tractor on the island with which to pull it.  Several trips to the junk yard solved that problem.  The tractor also had no brake release compressor so I constructed a small gasoline powered compressor to do just that.  The trailer was then towed,  without brakes,  over mountainous terrain!  My caravan consisted of myself in a 1958 VW waving a very large red flag out of the window followed by the tractor/trailer.  As I passed through villages many Barbadians ran out to the street clapping their hands and jumping wildly in joy thinking the island had been or was going to be taken over by Communist!

After the trailer was in place I began installing four HUGE log periodic antennas.  Two were 150 foot long 1 to 30 MHz vertical log periodic curtains and two were huge,  and very heavy,  3 to 30 MHz horizontal log periodic beams mounted on the 100 foot towers that supported the curtain.  They were to be supported by 1/2 inch nylon rope.  Nearly every night Barbadian fishermen would "liberate" some of my beautiful rope.  To solve that problem I made several meaningless medallions that my workmen had to hang around their necks while working at the antenna site otherwise they would become impotent.  When word got out about that, the thefts stopped IMMEDIATELY!  To see the antennas and trailers go to my NOSTALGIA  page.

My family and I settled into the wonderful Barbadian life but the peace didn't last long.  One day while working on the antennas I heard the drone of a four engine airplane.  Looking up I saw a Russian bomber at about 1,000 feet with its bomb bay doors open and a large camera sticking out.  Others obviously saw the plane too because it wasn't long before the American Ambassador was banging on my door.  Since my wife is the politician of the two of us I let her handle the incident.  Sure enough,  after a few of her special cherry-cheesecake pies we were back on track.  Those pies seemed to be the magical answer to the many other situations that would arrive.  In record breaking time I had the equipment up and running.  All of the equipment worked fine and we were ready for the next step. That phase was up to someone else.

A couple of years ago my copy of Microwave magazine arrived and lo and behold my project is STILL in operation.  Again see the NOSTALGIA  page for that article.

On my return to the U.S. I approached RCA Laboratories to change my title from Senior Technician to Associate Engineer in view of the fact that I had, under very difficult conditions and circumstances, acted as international diplomat and single handedly managed, designed, built, refined and operated a major project.  They essentially said that since I did not have an engineering degree I was a "certifiable dummy" and my title could not be changed.  That was the end of my career with RCA.

For a brief period I worked at Telerad Manufacturing, a division of the Lionel Corporation (toy trains), where I developed and oversaw the manufacturing of, among other products, the command receiver for the Atlas missile.

Petrovend Corporation asked me to develop possibly the worlds first dollar bill changer. They wanted to put the changer into all of their gas pumps. The unit worked great but soon credit cards made the scene. Petrovend dropped the project in favor of credit cards.

I returned to college to receive my degree in Business Administration.   Most likely with RCA's comment in mind along with being more mature, I totally surprised my wife and myself by spending all remaining semesters on the Deans List.  While at college I took up flying and on graduation looked for a job in the field of avionics. Narco Aviation Products hired me to work at their marine facility in Cockeysville, Maryland. The company, Enac Triton, was essentially a one man show. I eventually thought, if he can do it, so can I! That job lasted about three months.

One day, in 1964, I announced to my wife that I was starting my own company. Naturally, she went into a panic. Not knowing exactly how to start a company, I picked up the telephone book and called the maintenance department of the first industry listed... Armco Steel. They agreed to give me a try and handed me an inoperative Curtis Immerscope. An Immerscope is a device that ultrasonically looks through a steel ingot to find flaws or air bubbles. I took it home in my 57 Chevy, cleaned it up and replaced all high voltage wiring. The maintenance manager was ecstatic and told me to "sit" while he called his equivalent in other companies to tell them he had finally found the man they had been looking for. Within weeks I had over fifty industrial customers within easy driving distance. Initially, I was uncertain about how much to charge my customers. One day at 2:00 AM I received an emergency call from Armco. Their vacuum degassing furnace had been damaged by some molten steel in the wrong place. This furnace was thirty feet in diameter and forty feet deep. Its load cell system (scale) was accurate to within less than one pound at 100,000 pounds! I climbed down inside the furnace and found the burned wiring. A few quick repairs had it up and running in no time. I billed them $200.00. A few days later the maintenance manager called and asked me to stop by... I did. He told me that Armco would have lost roughly $2,000,000.00 (1965 $s) if the steel awaiting the degassing furnace had hardened were it not for my timely and prompt repairs. He handed the invoice back to me and told me to add another zero! I WAS ON MY WAY!!! Obviously, I was wrong in charging only an hourly rate for my time when I should be charging for the value of the service from the customers prospective.

My customers included steel mills, copper refineries, bottling companies, plastic companies, ice cream cone manufacturers, plastic and paper cup manufacturers, canning companies, veneer manufacturers, breweries and nearly 100 more. My 57 Chevy was a blue streak Earl Scheib Special (that was a "paint your whole car including the tires for $19.95" company... just kidding about the tires)! When called by my first brewery I learned very quickly that the "new" beer comes down the pipes very early in the morning and it is was mandatory for all employees, including me, to drink as much beer as possible while the machinery cooled down. I was on a first name basis with many famous cockroaches. In a brewery it impossible to get rid of those little critters even with soapy superheated steam. It was after one of those brewery trips that I got lost in downtown Baltimore (I can't imagine why!). I passed a gate that said "U S Army Intelligence, Fort Holabird." Hey, perhaps they too had something to fix. I drove around the property until I found a door that said "Supplies." A simple knock on that door put me into the "intelligence business." After repairing shelf upon shelf of equipment and noticing the allocation tag on each showing the value (price), I approached the powers to be and asked if they would consider my manufacturing for them exactly what they wanted... and at a greatly reduced price. My offer was immediately accepted and I was now in the intelligence equipment manufacturing business starting with the UAA-1 and 1059.

Miniature transmitters (eavesdropping/bugging devices) intrigued me and I manufactured a wide variety of them. It didn't take long after I got into the bug building business for me to see the potential danger of those little devices so I decided I'd better get busy and start manufacturing bug detectors or countermeasure equipment to find them. Marketing my products was a snap since I could walk into virtually every intelligence agency in the Baltimore/Washington/Virginia area. I also began teaching courses on bugging and bug detection at Fort Holabird and that gave me access to other good marketplaces.

By the mid-70's I had close to 200 customers (I know this because I put a list of them together for my trial). They included corporations large and small and foreign, federal, state and local governments. I did many high level sweeps that got lots of good press.

Once firmly established in the intelligence equipment manufacturing business several magazine, news magazine and newspaper articles appeared about my company. It was a VERY satisfying time but it invited many people who were mildly crazy and some who were totally insane. For those I contacted their spouses or relatives suggesting they be hospitalized... and many were. One character turned out to be a professional litigant who was seeking affidavits to incriminate the Baltimore City Police Department. He left by air route. I later learned that the City of Baltimore settled out of court with him for $33,000.00.

One sad fellow was convinced the Martians were following him. I built a Martian Ray Detector for him hoping that might ease his paranoia. He returned to my shop several times... each in a more depressed state. Finally, in desperation, he used a pair of ordinary gas pliers to pull out one of his molars thinking that was the homing device the Martians were using. He wrapped it in aluminum foil so the Martians couldn't track it and brought it to my shop. Out of curiosity I had my dentist X-ray the tooth and that revealed only a pin (antenna?). His wife joined him on his next visit and she and I decided on the obvious next step... the hospital.

In the early 70's a disheveled man wearing mismatched jacket and pant and tennis shoes showed up at my door. Thinking he was just another unbalanced person I told him I had some sensitive material on my desk and asked if he would return in an hour. I used that time trying to figure out what to do with him. It was Edwin Duncan (now deceased) owner and President/Chairman of Northwestern Bank head quartered in North Wilkesboro, North Carolina. He told me he was having security problems at his bank and was afraid the IRS was bugging him. I agreed to train his security office, Jerry Starr (also now deceased), who in turn purchased a quantity of countermeasure equipment. Jerry eventually called me from the bank's home base in North Wilkesboro and asked if I would come to the bank and go through a sweep with him. He instructed me to go to the Baltimore/Washington International (BWI) airport and a company plane would pick me up and take me to North Carolina. I was impressed. Sure enough a twin engine turboprop showed up and ferried me to North Carolina.

On landing at their home airport in North Wilkesboro I noticed the pilot push a button on the instrument panel and the doors of the very LARGE hanger ahead slid open. Inside the hanger were at least six, and probably more, beautiful white airplanes each with the Northwestern Bank logo on the tail. They ranged in size from a four engine Fairchild turboprop down to a classic Twin Beech. I was very, very impressed but wondered... what is a small North Carolina country bank doing with all these airplanes? Jerry later revealed that one of them had been set aside for North Carolina Senator Sam Irvin of Watergate fame. We performed an extensive sweep of all buildings and did indeed locate a device in the locked office of the Comptroller. I left finding the actual device to Jerry and returned to Baltimore in the same airplane.

As years went by I learned a great deal about Duncan. He turned out to be a super patriot and used the banks enormous resources to fund various special operations conducted in foreign country's (most likely that is why he kept the IRS at bay). For example, in 1972, while visiting a friend with the Dade County (Miami) Bomb Squad I passed through the airport concourse and noticed a banner saying "Fly to the Cayman Islands... $62.00 round trip." Noting that I could get there and back in one day, I grabbed a flight. On landing in Cayman I knew that this is where I wanted to be. On my return trip I began scuba diving with XX. In time, I switched to a new company run by one of his dive masters. Several years later I again switched to a new dive operation that had a dive boat more to my liking. The dive master and I became very close friends. The 'Cork' One day we got into a conversation about my work and he revealed that when he was a youngster he and several of his friends were snorkeling in a small lake located on the inland side of the main road across from where Laguna del Mar Condominiums now stands and they stumbled upon a huge underwater cache of weapons. He, and each of his friends, put a machine gun on each shoulder and marched into town. Word of the incident swiftly reached Jim Bodden, the father of the Cayman Islands, and he knew exactly who to contact to solve the problem, Duncan. Duncan grabbed plans for one of his existing banks, filled in the lake with marle (crushed limestone) and stuck one of his banks on it. SOME CORK! The bank was put up with such speed there was no time to change the design and it wound up with the drive-in-window on the wrong side (they drive on the left in Cayman).

Feeling particularly spry one day I called FBI Director J. Edgar Hoover and told him I manufactured products that might be of interest to him. He promptly invited me to visit him at headquarters. Walking into his office I immediately noticed that his desk was on a four inch pedestal and the legs on the sofa had been sawed off. I sat on the arm of the sofa and looked at him eye to eye. I think he liked that. He passed me on to their intelligence support office where I met XX. XX took me to the U.S. Recording Company and explained how to do business with the FBI through that company. Business went along fine until the Omnibus Crime Bill (Title III) was passed in 1968. Upon reading it, I immediately saw that I could not deal with apparent commercial concerns such as U.S. Recording. The FBI gave me a rubber stamp that essentially said "This order complies with the provisions of the Omnibus Crime Bill." Seeing real problems with that arrangement, any equipment ordered through U.S. Recording was delivered DIRECTLY to the FBI with the invoice going to U.S. Recording. During one of my many visits to the FBI technical section I noticed one of my invoices sitting on XX's desk and it was marked up a substantial percentage. I thought that was strange but paid no further attention to it.

In 1972 a company called Audio Intelligence Deices (AID) made its appearance. Their catalog claimed they could make "off the shelf" delivery... an apparent violation of Title III (Omnibus Crime Bill... it is illegal to manufacture, assemble, possess or offer for sale any device primarily designed for surreptitious interception of oral communications UNLESS you are under contract with a federal, state or local government). I had been warned on numerous occasions that I could not manufacture any device unless I had the contract in hand first so immediately brought this apparent conflict to the attention of the U.S. Attorney General.

Built into the Omnibus Crime Bill (Title III) was an automatic five year review period. In early 1975 I was contacted by investigators XX and XX of the U.S. House Select Committee on Intelligence. They asked that I prepare a statement detailing my observations of the effectiveness of the Omnibus Crime Bill. During our conversation I mentioned how I was dealing with the FBI through U.S. Recording, the rubber stamp and the incident about the marked up invoice. I prepared a statement primarily asking why AID was permitted to inventory and market "off the shelf" equipment while I could not. After my statement was prepared I contacted the CIA and FBI to see if there were any problems with my appearing before the Committee. The CIA asked for a days delay (a huge snowstorm saw to that) and then gave me the O.K. The statement was turned over to the investigators and a day was set for my appearance before the Committee.

Upon taking a seat to read my prepared statement, to my astonishment, it had been completely rewritten! The new statement attacked the FBI and made no mention whatsoever of AID. I immediately told XX that I was NOT going to read that statement. He instructed me to go to an ante room and repair it where ever I felt it was needed. Not anticipating this level of deception I had not brought a copy of my original statement. If I had, I most certainly would have read that instead. Given little time to repair a non-repairable statement, I did the best I could. When I read the revised statement all of the Congressmen looked at each other, me and the paper in front of them, wondering what was happening. To this day I do not know which of the three statements was read into the Congressional Record and... quite frankly, I don't give a damn.

On returning to my office I telephoned FBI Director Kelly and requested a meeting with him. Two other high level FBI officials were present. I later read the internal FBI communications about that meeting. One of the men wanted to seriously deal with the U.S. Recording problem while the other wanted to execute me on the spot!

Shortly afterwards two FBI agents showed up at my plant and tried to get me to withdraw my testimony. Every half hour one agent would leave the room to go to the "bathroom" i.e. change the tape in his recorder. He didn't even have the common sense to flush the toilet, that was on the other side of the wall from my office, to cover his activities. They tried to force me to sign their statement. I initially refused but later agreed to sign it with the statement "I have partially prepared the above statement." That got them out the door.

Shortly after that incident a "private detective" called and asked if I would show him how to three wire a telephone. We met in a conference room at a local motel in Towson. He handed me a screwdriver and I handed it right back to him and told him if he wanted to learn the process HE would have to do the work. About that time I noticed the toes of a pair of wing-tipped shoes at the bottom of the curtain that separated the room. Finally that person entered the room and, along with the other, tried to force me to make the modifications. I declined and departed. What a bunch of nonsense.

In a few weeks just about every common criminal in the Baltimore area began showing up at my plant. None got in the door. The FBI must have covertly informed these scum bags they were being wiretapped by the FBI and Kaiser could fix their problems. This type of nonsense went on for years.

In the midst of all the various intelligence agencies efforts to do me in, I received a warning from a credible agency friend that the Government was going to charge me with an unspecified crime.  That warning resulted in this letter to Attorney General Levi. 

MARTIN L. KAISER, INC.
Countersurveillance . Bomb Detection . Surveillance Electronics

March 23, 1976


Hon. Edward Levi
Attorney General of the United States
Department of Justice
Washington, D. C.

Dear Mr. Attorney General:

It is with great hesitation that I write to you, however, I believe that I am in serious trouble and that you are the only person who will be able to assist me.

For over ten years, Martin L. Kaiser, Inc. has been a major supplier of electronic countermeasure, surveillance and clandestine bomb detection equipment to law enforcement agencies from the federal level downward. Among my customers, and these but a few, were the CIA, Department of Defense, FBI, State Department, Army, Navy and Air Force Intelligence, Coast Guard, etc. In June, 1975, the National Wiretap Commission, operating under a Congressional mandate, received my business records under threat of subpoena. These records were subsequently brought to the attention of the House Select Committee on Intelligence by the National Wiretap Commission. As a result, it became publicly known that the FBI purchased its electronic countermeasure and surveillance equipment through a front known as the U. S. Recording Company. This disclosure has been of extreme embarrassment to the FBI, but I can assure you it is not an embarrassment of my making. I am sure you are well aware of the media's treatment of subsequent events.

Since this fact became known, my business has fallen to virtually zero. No federal agency or, for that matter, local agency will even discuss purchases of equipment with me. I can only assume, but cannot conclusively prove, that the FBI has "passed the word."It is not however, this event and the subsequent economic loss which are of primary concern, for I do engage in other business activities which will carry me through this trying time. Recently, a person of known reliability has pointedly warned me that I am to be made a test case under the criminal wiretap provisions of the 1968 Omnibus Crime Act. Being thoroughly familiar with the complicated and often conflicting provisions of that Act, I am fully aware of the danger existing to anyone who has committed themselves to the manufacture of electronic surveillance equipment.

I have never knowingly violated and have always strictly insisted on compliance with the provisions of the Omnibus Bill. I am firmly convinced that I am not presently violating the Bill, either. However, because of its complexity, my vulnerability, the FBI's pique, the new media's pressure, and the warning relayed to me, quite frankly, I am indeed worried. Although I know full well, based on previous attempts to receive clarification of the Bill, it is not the normal business of the Justice Department to give a "clean bill of health" to a citizen, I indeed wonder if there would be some way for you to advise me whether, under the wildest stretch of imagination, I am contravening any provision of the Omnibus Bill. Although I am reconciled to being driven out of this business, I desperately hope that I will not have to go through a trial in the process.

As mentioned previously, I also manufacture clandestine bomb detection equipment, again, having done this for federal and local agencies. Through a rather lengthy chain of events, the FBI now heads the National Bomb Program. Attempts to contact the FBI immediately after the LaGuardia explosion (which occurred well after my Congressional testimony) resulted in the most callous response I have ever received to one of my offers of assistance. The implications are hideous and further support my desire to resolve the issues as promptly as possible.

As a citizen who has consistently demonstrated his support of the law enforcement community and, therefore, his country, I need your help. Any assistance will be sincerely appreciated.

Respectfully,


Martin L. Kaiser
President

MLK:nre

Basically, Levi responded by saying... You do what you think is correct... and if you're wrong, we'll arrest you. Not very comforting.

Within months of my testimony before the House Select Committee on Intelligence my business of manufacturing eavesdropping and countermeasure equipment fell to ZERO! Fortunately, I had the ability to shift into the manufacture of bomb detection and disposal equipment, a marketplace the intelligence community couldn't and wouldn't dare try to control. Heh, heh... was I wrong... again!



Even though it is slightly out of place time wise, I'm putting the Lou Panos Evening Sun article next. Events from roughly 1975 onward attach to the FBI criminal case and I'll pick up there.

The Evening Sun
Baltimore, MD
Monday, October 25, 1976

Witness's Business Suddenly Drops

When the House Select Committee on Intelligence invited Marty L. Kaiser to testify at its hearings on illegal wiretapping by government agencies, he did the statesmen a favor and accepted the invitation.

Now they can return it by helping him answer a question: Why is it that he averaged about $200,000 annual in business from these agencies before he testified just one year ago and has averaged zilch since then?

That's what has happened to Martin Kaiser since he went to Washington last October and startled the intelligence community. He offered evidence that prices for equipment he had sold to an FBI front had apparently been marked up by about 30 per cent before delivery from the front to the FBI.

Word later came that Edward H. Levi, Attorney General, ordered an investigation of links between several top echelon FBI officials and the head of the firm serving as the original recipient of the equipment.

Citizen Kaiser is the slightly stout little fellow from Timonium who has been called "the Michelangelo of electronics" because of his uncanny talent for making things out of juiced up wires and finding such things made by others to bug their fellow man. There was a time when his marvelous little devices - all assembled by his nimble brain and nimble fingers in a small block building next to Brooks Robinson's sporting goods shop - were the rage of the FBI, Secret Service, armed forces and private customers in the world of the super-duper snoop and counter-snoop. His developments in electronic eavesdropping for law enforcement and government intelligence had made him one of the most widely publicized and sought after specialists in the field.

His equipment and techniques led to the discovery that bugs had been placed on telephones in the offices of Governor Mandel, at least four other governors, and Milton A. Allen, the Supreme Bench judge who was then state's attorney for Baltimore.

The big, red car in his driveway is known as his "President Sadat Cadillac" because he bought it after a lucrative service performed for the Egyptian chief, training his aides in electronic counterintelligence.

Such foreign work and private assignments like countering industrial espionage, says Marty Kaiser, have enabled his company to survive the withdrawal of government business.

"I'm still busy, but most of my business comes from other sources," he says. "I've tried to find out why I was dropped so suddenly. After all, I didn't ask to talk to the committee. They invited me and made it clear that I'd be subpoenaed if I didn't accept the invitation.

"I even went over and talked to (FBI Director) Clarence Kelley about it for an hour. I was only doing my duty, which is something the FBI certainly ought to understand, and he certainly seemed to understand.

At one point Citizen Kaiser brought suit against officials of several intelligent and military agencies under the Freedom of information Act in an attempt to get an official reason for his freeze-out.

"About the only thing I got out of that was word from the Army that they have no file on me. I told that they must have, became I was in the Army once. I even gave- them my Trial number, but they said my file must have burned up in a fire at the records center.

For Martin Kaiser, who is more at home in the microcosmic world of transistors and printed circuits than the mystical world of Washington politics, there is something familiar about it all.

Shortly before establishing his Timonium business 12 years ago, he helped develop a missile detection system heralded in 1964 by President Johnson using the bending beam principle in a device "seeing" beyond the horizon.

At the time, he says, he was making about $6,300 a year for Radio Corporation of America after starting at $3,900 about six years earlier. For his sterling work, he was rewarded with an assignment as manager of the anti-missile project when it was moved from Burlington, Mass., to Barbados, West Indies. But one day, be recalls, an Air Force officer asked him to compare RCA's efforts with Raytheon in similar work. "After evaluating their work against RCA, I really felt they were doing a better job, really outstanding. I said so, and the and the next thing we knew was that Raytheon had the project.

"I wasn't fired, because that wasn't the way they operate instead, they offered me a promotion - in Australia. "I said it was okay if they'd pay to move my wife and kids, too, but they said no, I'd have to pay. I calculated the costs and they came to roughly $14,000. So I didn't take the promotion."

There is something faintly similar between the Australia to which Martin Kaiser was to be assigned in 1964 for his compulsive candor with an Air Force officer and the Siberia of the intelligence world to which he has been relegated for speaking out before the House Select Committee on Intelligence in 1975.

For a man whose equipment may form the heart of the nation's defense and counterintelligence system, he seems to be getting short shrift.

The least the committee owes him in return for his service is a little help in determining why.

Obviously, I did NOT have a huge intelligence organization at my disposal so I did the best I could to uncover those who were liabling and slandering me.  I filed numerous suits under the Freedom of Information Act but, unfortunately, that was a total waste of time and money.  Here is a good example.  Note the date of my request and note the date of the response.

Central Intelligence Agency

Washington, D.C. 20505
14 March 1984

Mr. Martin Luther Kaiser III
115 Bosley Avenue
Cockeysville, MD 21030

Dear Mr. Kaiser:

This is in response to your attorney's letter, dated 29 September 1976, in which he appealed on your behalf the decision of this Agency, dated 8 July 1976, regarding your request for all Agency records which may exist concerning you.  While two documents have been released to you, we have informed you that we would not grant further access to any documents, if additional documents did exist, that might be responsive to your request.

Your appeal has been presented to the Central Intelligence Agency Information Review Committee. Pursuant to the authority under paragraph 1900.51(a) of Chapter XIX, Title 32 of the code of Federal Regulations, I, as Deputy Director for Administration have determined that the fact of the existence or nonexistence of any documents which would reveal a confidential or covert connection with or interest in matters relating to those set forth in your request is classified pursuant to the appropriate Executive order.  Further, I have determined that the fact of the existence or nonexistence of such documents would relate directly to information concerning sources and methods which the Director of Central Intelligence has the responsibility to protect from unauthorized disclosure in accordance with subsection 102 (d) (3) of the National Security Act of 1947 and section 6 of the CIA Act of 1949. Accordingly, pursuant to Freedom of Information Act (FOIA) exemptions (b) (1) and (b) {3) respectively, and Privacy Act (PA) exemptions (j) (1) and (k) (1), your appeal is denied to the extent that it concerns any such documents. By this statement we are neither confirming nor denying that such documents exist.

Material withheld under FOIA exemption (b) (1) encompasses matters which are specifically authorized under criteria established by the appropriate Executive order to be kept secret in the interest of national defense or foreign policy and which are in fact currently and properly classified. Exemption (b) (3) pertains to information exempt from disclosure by statute. The relevant statutes are subsection 102 (d) (3) of the National Security Act of 1947, as amended, 50 U.S.C. 403 (d) (3) which makes the Director of Central Intelligence responsible for protecting intelligence sources and methods from unauthorized disclosure, and section 6 of the Central Intelligence Agency Act of 1949, as amended, 50 U.S.C. 403g, which exempts from the disclosure requirement information pertaining to the organization, functions, names, official titles, salaries or numbers of personnel employed by the Agency.

Material withheld on the basis of PA exemption (j) (1) concerns intelligence sources and methods encompassed by those portions of systems of records which the Director of Central Intelligence has determined to be exempt from access by individuals pursuant to the authority granted by this sub- section and regulations promulgated thereunder (32 C.F.R. 1901.61). Information withheld on the basis of exemption (k) (1) in this instance encompasses those portions of all systems of records which the Director of Central Intelligence has determined to be exempt from access by individuals pursuant to the authority granted by this subsection and regulations promulgated thereunder (32 C.F.R. 1901.71) because the material is properly classified under the terms of the appropriate Executive order and subject to the provisions of Section 552(b) (1) of the Freedom of Information Act, as amended.

In accordance with the provisions of the Freedom of Information Act and the privacy Act you have the right to seek judicial review of the above determinations in a united States district court.

We regret that our response to your letter of appeal has been so long delayed and that we can not be of further assistance to you in this matter.

Sincerely,

[Signature]

Harry E. Fitzwater
Chairman
Information Review Committee

My success was, as you can see, limited and it wasn't until after my criminal trial that I uncovered one of the documents that provided the driving source for the incessant anger against me. As a Christian I found it difficult to believe that some individuals would continue a vendetta for such a long period of time... yet, it was true. Here is Attorney General Levi's report on the U.S. Recording scandal that Mr. Panos and I are referring to. Read it and weep.

STATEMENT BY ATTORNEY GENERAL GRIFFIN B. BELL
ON THE RELEASE OF THE U.S. RECORDING REPORT

I am today releasing a report on an investigation of allegations that certain individuals misused their official positions while employed by the Federal Bureau of Investigation. After careful consideration, I decided to issue a full public report.

When reporting on disciplinary actions taken against government employees, federal agencies have traditionally made public the administrative action taken and the nature of the conduct which caused the action to be taken, but have not always identified the particular individuals involved.

There are, however, certain instances of employee misconduct which call into question the integrity of the institution itself. If the agency's mission is particularly sensitive, the misconduct serious, or the officials of high rank, then the public interest is best served by more extensive disclosure.

It is this kind of wrongdoing which is described in the report I am releasing.

In cases such as this one, personal privacy considerations must give way to the legitimate interest of the American public in knowing how its government operates and how high-ranking officials have abused their official positions and neglected their official responsibilities.

High-ranking officials entrusted with public office simply cannot expect the same measure of privacy about the way they perform their official duties or use their offices as they could expect if they were private citizens. Moreover, the public has a legitimate interest in knowing and being able to evaluate how the heads of Executive agencies deal with official misconduct and take corrective action to ensure that similar, abuses of power and position do not recur. In this particular instance, it is my judgment that the public is entitled to know which officials engaged in the misconduct and which officials did not.

The misconduct summarized here, and reports in the news media about these allegations, have cast a shadow over a great institution and over those of its officials who engaged in no wrongdoing whatsoever. I am vitally interested in restoring public confidence in the Federal Bureau of Investigation. This report will confirm that very few individuals engaged in improper conduct. We should bear in mind that this small number of individuals in no way represents the thousands of FBI employees who are dedicated, honest public servants and whose personal and professional integrity is beyond reproach.

Today I asked Director Kelley to issue a bulletin to all Bureau officials in which it will be made clear that neither the Department of Justice nor the FBI as institutions, nor I, as Attorney General, will tolerate the kind of misuse of office or abuse of authority described in this report. I am pleased to note that Director Kelley has made the following structural reforms to prevent the recurrence of the kind of improper practices described in this report:

1. Reorganized the Inspection Division and renamed it the Planning and Inspection Division;' created the Office of Professional Responsibility, an Office of Inspections, and an Office of Planning and Evaluation; established within the Office of Inspections a separate Audit Unit, responsible for auditing all FBI funds and financial transactions; and organized the Division so that it reports directly to him, as Director.

2. Removed the Property Procurement and Management Section from the Division with budget responsibility, the Finance and Personnel Division, thereby making one Division head responsible for procurement and another responsible for the FBI budget and funds. Director Kelley has placed a Special Agent Accountant, a Certified Public Accountant, as Section Chief of the Property Procurement and Management Section.

3. Discontinued the use of the U. S. Recording Company as a "cover" or "cut-out" for confidential purposes and established controls to ensure that all purchases are made in accordance with government regulations.

4. Restructured the FBI inventory system, to provide built-in controls and audit trails, and initiated automation of the inventory system to provide better accountability.

5. Discontinued the FBI Laboratory and Exhibits Sections' practice of providing personal services to FBI officials. Director Kelley also has discontinued the use of the unauthorized cash fund once maintained in the Exhibits Section.

6. Reorganized the management and handling of the FBI Recreation Association (FBIRA) and its funds, so that FBIRA officers are aware of their responsibilities to prevent unauthorized expenditures. A new Treasurer of the FBIRA has taken office and is not responsible for any other FBI fund.

7. Replaced the FBI Confidential Fund with the Field Support Account, an imprest fund approved by the Treasury Department.

8. Developed and improved the FBI career development program for Special Agents to ensure that the best qualified individuals are selected for administrative advancement, substantially reducing the possibility that one person or group can control the selection of such candidates. In addition, Director Kelley assures me that the FBI has taken other steps to prevent the kind of misconduct described here. The Bureau has increased legal instruction within its training curriculum; held training sessions on the FBI guidelines for career agents; and issued detailed instructions to the field on legal questions concerning the legality and propriety of investigative techniques. In connection with the latter step, the FBI is seeking advice from the Department's Office of Legal Counsel with increasing frequency.

I have asked Director Kelley to bring to my attention any improper attempts to have FBI agents conduct investigations or undertake activities which are not within the Bureau's authorized jurisdiction. I have directed all Bureau personnel to bring reports of misconduct to the attention of appropriate Bureau officials and, when necessary, the Office of Professional Responsibility at the Bureau and Office of Professional Responsibility here at the Justice Department.

Recognizing the concern of Bureau personnel about threatened civil litigation., we have submitted legislation to the Congress which would protect FBI personnel against civil suits by substituting the government as defendant. I believe this approach will protect the rights of citizens without unfairly penalizing individual agents.

The release of this summary report is intended to assure the nation that the Justice Department can investigate and police itself. It will also put all officials of this Department on notice that they will be held accountable to the American people for the manner in which they discharge their official responsibilities while employed as servants of the American people.

# # #

THE DEPARTMENT OF JUSTICE REPORT
ON THE RELATIONSHIP BETWEEN
UNITED STATES RECORDING COMPANY
AND THE
FEDERAL BUREAU OF INVESTIGATION
AND
CERTAIN OTHER MATTERS
PERTAINING TO THE F.B.I.

JANUARY, 1978


THE DEPARTMENT OF JUSTICE REPORT
ON THE RELATIONSHIP
BETWEEN
UNITED STATES RECORDING COMPANY
AND THE
FEDERAL BUREAU OF INVESTIGATION,
AND
CERTAIN OTHER MATTERS
PERTAINING TO THE F.B.I.

This is a report on a Department of Justice investigation of alleged misconduct by certain past and present officials of the Federal Bureau of Investigation.

In the Fall of 1975, the House Select Committee on Intelligence provided the Department with information that certain officials of the F.B.I. were allegedly profiting from the Bureau's business transactions with its exclusive electronics equipment supplier, the United States Recording Company of Washington, D.C. On November 3, 1975, Attorney General Edward H. Levi requested F.B.I. Director Clarence M. Kelley to investigate these allegations. Director Kelley appointed an Ad Hoc Committee to oversee an inquiry by the F.B.I.'s Inspection Division, the Bureau unit ordinarily responsible for internal investigations. Attorney General Levi found the report of the Inspection Division and the Ad Hoc Committee to be incomplete and unsatisfactory. On January 2, 1976, he directed the office of Professional Responsibility and the Criminal Division to review the Inspection Division Report and conduct an independent investigation. The Deputy Attorney General requested two Criminal Division attorneys to work with the office of Professional Responsibility in supervising a special team of F.B.I. investigators, who were carefully selected from Bureau field offices for their ability and experience. I.R.S. agents were also selected to investigate the tax implications of the allegations.

Hundreds of past and present F.B.I. officials were interviewed. Agent-accountants examined vast quantities of documents and records to determine the nature of the F.B.I. U.S.R.C. relationship and the FBI's procedures for purchasing electronic equipment. As the investigation proceeded and possible criminal violations emerged, a Federal Grand Jury in the District of Columbia, raided by the Criminal Division attorneys, began to review the findings of the Department's investigators.

The investigation was completed on November 11, 1976. The findings went beyond the original allegations into other areas of misconduct uncovered by the investigation. The Criminal Division investigative report examined the use of Government material and personnel services by F.B.I. officials for their personal benefit; the administrative mishandling and misapplication of appropriated funds; the misuse of funds of the FBI Recreation Association -- a private association of FBI employees; and improprieties in the FBI's dealings with contractors other than USRC.

PART 1

A. The Relationship Between the United States
Recording Company and the
Federal Bureau of Investigation


Joseph Tait has been owner and manager of the United States Recording Company (USRC) since 1938. Incorporated in 1969 in the District of Columbia, USRC sells and distributes electronic equipment, principally to the Federal Government. Mr. Tait started doing business with the Government in 1943, when Army Intelligence asked the Bureau's Laboratory Division, then interested in purchasing two Army microphones, to use USRC as a middleman. in the late 1940's, USRC contracted with the Bureau to service amplifiers, recorders and other technical equipment used by the Laboratory Division. From 1963 to 1975, USRC was virtually the sole supplier of electronic equipment to the FBI, and bureau purchase orders were frequently directed to USRC without open bidding as required by Government procurement statutes and regulations. _1/

FBI officials justified the exclusive relationship under a specific exemption for purchases that require confidentiality for security reasons. _2/  The following facts do not support this explanation, however. For instance, from 1971 to 1975, the Bureau made $500,000 worth of exclusive purchases from USRC which were not marked as confidential. Much of the equipment, including transmitters, receivers, and microphones, clearly fell into the "sensitive" category, but it was not clear why other "nonsensitive" equipment was purchased exclusively from USRC. Also, the Bureau took few precautions to insure the security and confidentiality of the FBI-USRC relationship. A number of electronic equipment manufacturers and suppliers were aware that the FBI used USRC as a middleman. The Bureau often purchased equipment directly from the manufacturer, but always paid its bills through USRC. USRC employees did not receive security clearances. The firm was broken into on at least two occasions. USRC made equipment deliveries to the FBI during working hours in a panel truck plainly marked "U.S. Recording Company."

Moreover, the FBI failed to follow proper procedures for such "confidential" purchases. Section 252(c)(12) of Title 41 of the United States Code requires an agency head to make a determination that the purchase of certain equipment should not be publicly disclosed before public advertising and open bidding regulations can be suspended. ado evidence was found that either the Attorney General or the FBI Director ever made such a formal determination. The procurement regulations were also evaded, and the scrutiny of the Department of Justice avoided, by the "splitting" of orders to USRC so that no single order exceeded $2,500, the limit above which all purchase orders had to be advertised for open bid. _3/

From 1961 to 1973, the Bureau purchased large quantities of tape recorders, playback units, closed circuit television systems, video tape machines, laboratory test equipment and FM radio equipment under confidential contract with USRC to the virtual exclusion of all other contractors. The costs to the Government of this special relationship were considerable. From Fiscal Year 1971 through 1975, 60 percent of USRC's total sales were made to the Bureau. Department investigators examined 1,339 USRC sales invoices, compared the cost of each item, where available, to USRC to the price USRC charged the Bureau, and found an average markup of 23.8 percent from Fiscal Year 1969 through 1975. Individual markups varied widely and were as high as 40 to 70 percent. In addition to high markups, by using USRC as a middleman, the Bureau was not able to purchase equipment at discount prices offered by manufacturers for direct sales on large orders. For example, in 1971 the Bureau paid USRC $147,261.50 for burglar alarm equipment which could have been purchased from a New York supplier for $81,357.00.

USRC asserted that its overhead costs amounted to 15 to 16 percent over the price it paid to the manufacturer. Department investigators found no objective evidence supporting a figure this high.

These findings essentially confirmed allegations made by a Special Agent of the FBI's Radio Engineering Section in 1973. He reported that the FBI paid too much for USRC equipment, that USRC markups were too high, that FBI employees were forced to buy inexpensive items from USRC when they were available elsewhere, and that the FBI-USRC relationship was not confidential. An Inspection Division inquiry was made into those allegations, but this investigation found that during that inquiry key witnesses were not interviewed. One Bureau official, now retired, provided Inspection Division investigators with palpably inaccurate information. The committees which reviewed the inquiry recommended the continued use of USRC as a "cutout" (i.e. a middleman used to conceal the Bureau's identity from outsiders) for confidential procurement without any sound basis for the conclusion. The agent who made the complaint was denied promotion and then transferred to the Tampa Field office, where the Special Agent-in-Charge was told the agent was not a good "team" player and did not get along with other employees.

The officials chiefly responsible for the proper implementation of procurement requirements and procedures were John P. Mohr, Assistant to the Director for Administrative Affairs; Nicholas P. Callahan, Assistant Director, Administrative Division; and G. Speights McMichael, Chief Procurement Officer. The investigation clearly established that these officials knowingly failed to apply required procurement procedures to purchases from USRC. Two possible motives were found for their actions.

No evidence of cash kickbacks or bribes was discovered. Rather, a pattern of social contacts and minor gratuities was revealed between Mr. Tait and various FBI officials, including Messrs. Mohr, Callahan and Mc-Michael. In the 1960's, Mr. Tait and a number of high Bureau officials would get together at the Blue Ridge Rod and Gun Club (Blue Ridge Club)_4/ to play poker. The poker parties would begin on Friday evening and continue until Saturday noon. (Each participant paid the host, a Bureau official, for the cost of food and lodging.)

Mr. Tait also entertained FBI officials on occasion at the Bethesda Country Club, Billy Martin's Carriage House in Georgetown, and the Rotunda Restaurant on Capitol Hill. There was no evidence of excessive drinking, associating with the opposite sex, payoffs, big winners or losers. Nor was there evidence that official FBI files were destroyed, as alleged, at the Blue Ridge Club.

Mr. Tait often gave Laboratory Division employees small gifts at Christmas time, such as tie clasps, wallets, manicure sets, and desk calendars. In 1971, Mr. Tait gave one FBI employee a stereo playback unit for his car after he retired from the Bureau. A former USRC employee stated that in 1969 Mr. Tait purchased and paid for the installation of an eight track tape player with two speakers in John P. Mohr's Cadillac at a total cost of $172.12. There was no other evidence of any personal benefit to any other FBI official.

The investigation also disclosed another possible reason for the Bureau's special relationship with Mr. Tait and USRC. Over the years, Bureau officials came to trust. Tait's willingness to keep the FBI-USRC relationship confidential, and especially, to keep Congress in the dark about FBI eavesdropping practices. In a March 14, 1963, memorandum to Laboratory Assistant Director, Ivan W. Conrad, M. Mohr ordered that:

...no recorders are to be purchased by the Bureau outside of USRC. The reason for this is because Mr. Tait of the USRC will protect the Bureau in the event questions are asked by a Congressional committee concerning the purchase of recorders by the FBI. Other companies will not do this for the Bureau.

On May 22, 1964, after learning that Mr. Tait had been invited to testify before the Senate Subcommittee on Administrative Practice and Procedure, Mr. Mohr wrote in a memorandum:

...Mr. Tait told me he does not know at this point just what he is going to do with the letter but he does not intend to furnish the Subcommittee with any specific information. It should be noted that the Bureau purchases virtually all of its electronic eavesdropping devices from the U.S. Recording Company. Over the years bite. Tait has been an excellent friend of the Bureau and would go to any lengths to protect our interests from any sources. He is a personal friend of mine and he told me that he would most certainly furnish us with any response that he makes to the Subcommittee's letter before submitting it to the Subcommittee._5/

According to past and present employees of the Radio Engineering Section, Mr. Mohr's March 1963 order initiated the Bureau's exclusive relationship with USRC.

The Department concluded that FBI officials showed an improper favoritism to Mr. Tait and USRC in violation of specific conflict of interest regulations of the Department of Justice._6/ However, no evidence was found indicating a fraudulent intent sufficient to make out a crime under Federal bribery or fraud statutes.

B. Tax Investigation

Mr. Tait was tried and, on June 20, 1977, acquitted of all tax evasion charges under Title 26, United States Code, Section 7201, for the years 1971, 1972 and 1973.

The Department found no evidence that Mr. Mohr violated any federal tax laws.

C. Conversion of Electronic Equipment

Ivan W. Conrad, former Assistant Director of the FBI Laboratory Division, was found to have taken a large quantity of FBI electronic equipment to his home, principally, between 1964 and 1966. Conrad liked to tinker with electronic equipment and was a "ham" radio operator. The equipment included voltmeters, watt meters, battery testers, stereo amplifiers, consoles, speakers, microphones, cables, sidewinders, mixers, tape recorders, transformers, and other sorts of electronic gadgetry. This equipment was evidently delivered directly from USRC to Mr. Conrad's office at FBI headquarters and he took the equipment home. No record was made on FBI inventory files that Mr. Conrad had possession of the equipment.

In late December 1975, after being questioned by investigators from the 1975 Inspection Division inquiry about unaccounted for equipment and after denying knowledge of it, Mr. Conrad, with Mr. Tait's assistance, shipped twenty-nine packages of electronic recording "ham" radio equipment and a large recording console from his home to the USRC warehouse in Southeast Washington. This included the equipment about which he had been questioned. A USRC employee made the delivery in a USRC truck. As much as eighty percent of the equipment had never been used and was in excellent condition. This equipment was subsequently recovered for the Bureau by this investigation. Purchasing documents revealed an acquisition cost of over $20,000.

Mr. Conrad, who retired in July 1973, was interviewed four times during this investigation. He admitted that the equipment once belonged to the FBI. While head of the Laboratory Division, he ordered the equipment from USRC and then used it on "special projects" for Director Hoover, he said. He serviced the Director's television, hi-fi sets, shortwave radio, and designed a portable recording system for him. The console recorder was delivered directly to his home by Mr. Tait, and he took the other equipment home after USRC delivered it to the Bureau. He said that most of the equipment was obtained between 1964 and 1966.

Mr. Conrad asserted that he never intended to convert this equipment to his own use. After Director Hoover died in 1972, he wanted either to buy the equipment from USRC or return it to the company. He said he was "tardy" in not returning it to Mr. Tait until late December 1975. In August 1976, in response to inquiries from this investigation, he delivered another shipment of electronic equipment to the FBI. He had signed this out of FBI Laboratory stocks in the early 1960's. Auto radios, control cables, heads, speakers, antennas, assorted accessory equipment, a stereo receiver, tape recorders, microphones, and a sound recording set were included in this shipment. It is believed that all FBI equipment that was in Mr. Conrad's possession has now been recovered.

D.  Goods and Services of the FBI's Exhibits Section

The Department also investigated the allegation that FBI employees were required to provide goods and services to their superiors. The Exhibits Section of the FBI is staffed with accomplished craftsmen and artisans. Their official task is to design and construct exhibits for use in Department litigation and displays, furniture, and other exhibits for internal FBI use. The Radio Engineering Section is responsible for maintaining and servicing FBI electronic equipment. Interviews with past and present employees of those sections and an examination of photographs and personal logs maintained by some of them revealed that services were provided to FBI officials during official duty hours and that goods were produced for FBI officials with Government property and equipment._7/ This constituted a misuse of Government time and materials, contrary to federal law and regulations. 18 U.S.C. 641; 28 C.F.R.ß45.735-16. Prosecutions, where otherwise possible, are barred by the statute of limitations as virtually all of the following misconduct occurred more than five years ago. 18 U.S.C. 3282.

1. Director J. Edgar Hoover

Exhibits Section employees painted Director Hoover's house each year when he visited California during the summer. They built a front portico onto his house and dug a fish pond, equipping it with water pump and outdoor lights. They constructed shelves, telephone stands, and an oriental fruit bowl. Home appliances, air conditioners, stereo equipment, tape recorders, and television sets, and electric wiring were serviced and repaired by Radio Engineering. Section employees. Exhibits Section employees serviced his lawn mower and snow blower, maintained his yard, replaced sod twice a year, installed artificial turf, and planted and moved shrubbery. The Exhibits Section built a deck in the rear of his house, a redwood garden fence, a flagstone court and sidewalks. A power window with sliding glass doors was also designed and constructed. Clocks were reset, metal polished, wallpaper re touched, firewood provided, and furniture rearranged. Employees were on call night and day for this work.

Mr. Hoover employed one grade 15 Bureau accountant to give him tax advice, maintain his tax records, and prepare his annual Federal tax return. His secretary or two associates would generally make the work requests. Exhibits Section employees were called upon to build gifts for Director Hoover every year for Christmas, his service anniversary and other special occasions. These gifts included furniture such as tables, display cases, cabinets, a bar and valets. Assistant Directors chipped in to pay for cost of materials. Employee labor, however, was not compensated.

FBI employees called upon to perform these services did not think them proper, but felt compelled to follow orders for fear of losing their jobs, or of arbitrary transfers or promotion delays.

2.  John P. Mohr

Mr. Mohr had car radios repaired, the body of his son's MG repaired and re painted, and an elaborate dental exhibit constructed for his son, a dentist. At his home, Exhibits Section employees shaved doors to accommodate new carpeting, and Radio Engineering Section employees repaired his television numerous times, and installed phones, stereo hi-fi speakers (Mr. Mohr's property) and a burglar alarm system which required frequent servicing after installation (FBI property). They repaired his stereo and purchased and installed a new FM radio tuner in an existing cabinet which was modified by Exhibits Section employees. Mr. Mohr also received certain gifts made by the Exhibits Section, including a coat of arms, a dresser top valet, and an oak portable liquor cabinet in the shape of a wine case.

Exhibits Section employees painted a desk and made a drawing board for Mr. Mohr. They made, at his direction, a walnut cigar box, a walnut tape-cartridge rack, a walnut wine rack cabinet whose value has been estimated at $2,000, and two walnut gun cases with glass front doors.

Mr. Mohr had employees mount snow tires, wash, and transport his personal automobile to commercial garages for repairs. A battery was installed in his car and a turn signal lamp was replaced by Exhibits Section employees. Mr. Mohr also received tapes of record albums which were copied and distributed by Radio Engineering Section employees at the direction of former Assistant to the Director Cartha D. DeLoach.

Mr. Mohr received services even after he retired in June 1972. Radio Engineering Section employees were sent to his home, at his request, to repair electrical switches, televisions, and the burglar alarm system which had been . installed earlier. Mr. Mohr also asked a Radio Engineering Section employee to repair his electric blood pressure machine. At Mr. Mohr's request to former Exhibits Section Chief John P. Dunphy, the Exhibits Section built a birdhouse according to plans he provided.

3.  Nicholas P. Callahan

For Mr. Callahan, Exhibits Section employees silk screened a felt cloth used for table games, cut doors at his house to accommodate new carpeting, printed maps showing the location of his beach home and finished Styrofoam nautical objects to decorate it. They made walnut fishing rod racks for his beach home, assembled a lathe fence to prevent sand erosion at his beach home, and built a picket fence for his residence._8/ He had walnut shelves cut by section employees during official hours (he supplied the material), had a piece of plywood covered with weatherproof material for a shed roof, had Exhibits Section employees make a sign for his daughter and son-in-law with their name, and had former Exhibits Section Chief Leo J. Gauthier make a fuse box cover for the basement recreation room in his home. At his request, the exhibits section cast a desk memento in plastic for him to give to a friend and make him a set of stack tables which duplicated a set which had been made for Director Kelley (see below). Radio Engineering Section employees diagnosed troubles with his televisions and Exhibits Section employees framed his personal photographs.

Mr. Callahan also received various gifts. He received a framed plaque which recited an Irish prayer, a plaque bearing his coat of arms, a dresser top valet, a portable oak liquor cabinet in the shape of a wine cask, a decorative Christmas tree ball and a gold medallion and chain for Mrs. Callahan into which a gold-disc with the FBI seal was set by the Exhibits Section (Mr. Callahan bought the medallion and chain). The valet and liquor cabinet were duplicates of gifts given to Director Hoover, Mr. Mohr and Mr. Dunphy.

Mr. Callahan also received considerable services to his automobile. Employees test drove his personal car, did diagnostic work on it, took it out for washes, fill-ups, snow tire mounting, and servicing at garages and muffler shops. Scratches on his car were touched up. (Some employees, however, recalled that the whole trunk lid on Mr. Callahan's car was painted.)

Mr. Callahan states that Mr. McMichael provided him with a Polaroid camera which he used for personal photographs.Film for the camera was also provided at FBI expense. He has since returned the camera.____9/

4.  John P. Dunphy

On August 13, 1976, Mr. Dunphy pleaded guilty to a misdemeanor charge under Section 641, Title 18, United States Code, as part of an agreement with the United States as a result of which he voluntarily tendered his resignation from his position as Chief of the Exhibits Section and cooperated with this investigation.__10/

5. Director Clarence M. Kelley

on directions from Mr. Callahan shortly after Director Kelley and his wife moved to Washington, two sets of valances were made and installed in Director Kelley's apartment by the Exhibits Section and two television sets were purchased and installed by the Radio Engineering Section. After this investigation began, Director Kelley paid for the estimated cost of the valances. Director Kelley admitted he knew, after the job was done, that the Exhibits Section installed the first set of valances. when they proved unsatisfactory, he requested a second set to be built and installed. This set was also built and installed by Exhibits Section employees. The television sets were ordered returned by Director Kelley after this investigation revealed their source. Although Mr. Callahan said he directed that the televisions be loaned to Director Kelley, the sets were not entered on FBI equipment inventory until after their return from Director Kelley's apartment on February 19, 1976.

The Exhibits Section also built a walnut table, a set of stack tables, and a jewelry box which were given to Director Kelley as gifts from the Executive Conference. He was unaware that the Exhibits Section made the gifts, he said. The Conference, by donations from its members, paid for the materials used in these gifts.

Director Kelley's personal automobile received occasional servicing by FBI employees and his FBI-provided chauffeur performed personal errands for him. Section employees repaired a broken cabinet for Director Kelley, and mounted the FBI seal on a gold disc as a charm for the Director's wife.

6. Miscellaneous

The practice of providing FBI goods and services to high Bureau officials was not limited to the above individuals.

Clyde Tolson, long-time Associate Director under Hoover, had FBI employees develop several patented devices during official hours. These included a reusable bottle cap and a power window opener. These patents were assigned to the FBI. There was no evidence that Mr. Tolson personally benefited from the development of these devices. one of the power windows was installed for President Johnson in the White House. A second unit, designed and intended for President Johnson's ranch, was never completed.

E.  Imprest Fund

There was evidence that an FBI official received reimbursement from the FBI Imprest Fund (petty cash fund) for personal purchases.

G.  Speights McMichael, Chief Procurement officer, denied that Imprest Funds were used for the personal purchases of Bureau officials. He stated that he did not check to see whether the purchases were proper. Under Federal law he was required, as the Bureau's chief procurement officer, to certify that each disbursement was proper and correct. Each voucher reads, in part: "I certify that the disbursements claimed herein are correct and proper..." Many of the personal purchases could have been used by the Exhibits Section and, therefore, could have escaped Mr. McMichael's attention. He admitted being derelict in his responsibilities as the Imprest Fund's cashier, disbursing and certifying officer.

F.  Confidential Fund

Part of the FBI's annual appropriation is specified "not to exceed $70,000 to meet unforeseen emergencies of a confidential character to be expended under the direction of the Attorney General and to be accounted for solely on his certificate." The most common use is for payments to informants. Contrary to the appropriation language and to Federal regulations, this money was drawn from the Treasury by travel vouchers that failed to reflect the actual expenditures. Top FBI administrative officers were, therefore, able to maintain in cash form these monies over which they exercised custody and control. Field offices were given separate funds for payment of informants which were maintained in separate accounts in addition to the so-called "Confidential Fund" which was kept at headquarters. Also contrary to Federal regulations, the unspent portion of the yearly appropriation was accumulated. By 1974, the headquarters "Confidential Fund" totalled $34,000.

Nicholas P. Callahan controlled the Fund from 1946, when he was Number One man to the Assistant Director of the Administrative Division, until July 1973, when he became Associate Director. John P. Mohr, Clyde Tolson, and Director Hoover could also authorize disbursements. A 1974 inspection of the Fund concluded that "no written guidelines exist pertaining to the utilization of this fund" and that separate records for this fund were kept by FBI administrative units apart from the FBI's normal accounting system and were not subject to Treasury Department audit. This investigation revealed uses of the "Confidential Fund" maintained at headquarters by FBI administrative officers that were not within the scope of the appropriation. _l2/

This investigation revealed that between August 1956 and May 1973 the Bureau purchased over $75,000 worth of electronic equipment with money from the Confidential Fund. No memoranda, purchase orders, requisitions, vouchers or similar documentation were located indicating why the equipment was purchased or who requested it.

Mr. Callahan acknowledged that Mr. Mohr and he decided to use Confidential Fund monies to purchase electronic equipment. This was not done to disguise the nature of the equipment, he said, but to expedite large purchases of equipment.

The Confidential Fund was also used to pay for public relations expenses. Between 1961 and 1975, $23,399.15 of Confidential Funds were spent on room rentals, food, drink and gifts for the liaison officers of foreign and domestic law enforcement and intelligence gathering organizations. Mr. Callahan approved disbursements for liaison functions. There was also evidence that Mr. Mohr, and, to a far lesser extent, Assistant Director Eugene W. Walsh, and Deputy Associate Director Thomas J. Jenkins also authorized such disbursements. Director Kelley recalled such an authorization by himself on one occasion.

One of these officials stated that any expenditure which in any way aids "the detection and prosecution of crimes against the United States," including liaison functions, is justified under the FBI's total appropriation and that the Confidential Fund was used only to expedite reimbursement. He admitted, however, that the Confidential Fund had been obtained on the representation to Treasury that they would be used for "unforeseen emergencies of a confidential character." Congress had not been informed that the Bureau was incurring public relations and liaison expenses and paying them out of the Confidential Fund. The Bureau had never submitted a formal request to Congress or the Office of Management and Budget for the proper budget authority to make these Confidential Fund expenditures. Title 31, United States Code, Section 551, which prohibits the use of appropriated funds for lodging, feeding, or providing transportation to an assemblage, can be interpreted specifically to prohibit the use of the Confidential Fund for public relations and liaison purposes.

This investigation also revealed that FBI officials used the Confidential Fund to cash personal checks. This practice was stopped after Mr. Welsh was questioned about the practice on May 21, 1976.

No evidence was found indicating that any senior official applied these appropriated funds to his own use.

G.  The FBI Recreation Association

The FBI Recreation Association (FBIRA) was founded in 1931 for the purpose of promoting and encouraging athletic, social and welfare activities among its members. The FBIRA is an independent and tax exempt organization whose membership is voluntary. The Association's funds were spent on athletic and social functions, group travel, clubs, hobbies, art shows, and publication of The Investigator, a monthly magazine reporting on FBIRA activities. Its constitution and bylaws provide for the election of officers and a five-member Board of Directors.

This investigation revealed that between September 1951 and June 1972, Nicholas P. Callahan obtained $39,590.98 from the FBIRA designated for the "Library Fund." The Association's records contain no explanation or authorization for these disbursements. No disbursement requests or vouchers were found. Mr. Callahan was the Library Fund's only recipient and maintained the only records of its expenditures. Mr. Mohr periodically reviewed the records. Shortly after Mr. Hoover died, Mr. Callahan and Mr. Mohr discontinued the Fund and destroyed its records. Neither of the two FBIRA treasurers who served during this period knew why the fund was named the Library Fund in the FBIRA Disbursements Journal. The treasurers understood that these "Library Fund" disbursements were for Director Hoover's public relations expenses, such as office flowers, condolence telegrams, and for unspecified office expenses, such as books and newspapers.

Only Messrs. Hoover, Tolson, Callahan, Mohr, and the treasurers knew about the "Library Fund" and disbursements were made to the Fund without the authorization of FBI-RA officers whose approval is required under the FBIRA charter. Mr. Callahan asserted that the disbursements were for official public relations and liaison functions for which appropriated funds are unavailable under law and that they were proper under a broad interpretation of the FBIRA constitution's "general welfare" clause because money spent promoting the FBI's general welfare is in the best interest of its employees.

The investigation also revealed that $55,849.77 of FBIRA funds were expended on receptions for National Academy students and guests between April 8, 1958, and June 20, 1972. The National Academy is an FBI operated training and education facility for local law enforcement personnel around the country. The receptions were not FBIRA activities and they were not open to FBIRA members. About half the cost of the receptions was borne by those attending the receptions so that net cost to the FBIRA after offset by these donations was $29,443.67. The FBIRA constitution and bylaws do not provide for expenditures for such functions as National Academy receptions.

From July 1952 to December 1975, another $12,219.90 of FBIRA funds were spent on miscellaneous or liaison expenses and on receptions, luncheons, retirement parties, and gifts for foreign law enforcement liaison officers, and senior FBI officials. The funds also covered the cost of FBI press receptions and other public relations expenses. Director Hoover, Mr. Callahan, Mr. Mohr, Mr. DeLoach, and Mr. Walsh, not the FBIRA Board of Directors, approved these disbursements, according to the records.

The above facts established that, from 1951 to 1975, high officials of the FBI obtained funds from the FBIRA for public relations and other uses not authorized by its charter and without obtaining the approval of its Board of Directors. There is no evidence that these Bureau officials converted the money to their own use and, therefore, no evidence of criminal intent as required under Title 18, United States Code, Section 654.

H.  Special Agents Mutual Benefit Association (SAMBA)

SAMBA is an unincorporated association designed to provide life and health insurance to FBI employee members. The Prudential Insurance Company has been SAMBA's underwriter since SAMBA was founded in 1948. SAMBA is independent of the FBI, with private offices at 1325 G Street, N.W., Washington, D.C.

This investigation uncovered questionable expenses from SAMBA books and records. The amount of $635.21 was withdrawn from the SAMBA account to pay for a retirement party and gift for Mr. Mohr. $310.22 of this withdrawal covered the price of a Sears Roebuck fishing boat, which was delivered to Mr. Mohr by FBI employees. One SAMBA officer admitted that SAMBA funds were used, in disregard of its charter, to pay for retirement parties, luncheons, and gifts for outgoing SAMBA officials and Directors. Other questionable expenses included two professional football season tickets for the use of a SAr4BA official, Saturday work charges, wedding and anniversary gifts, and annual Christmas parties.

Director Kelley and his wife, along with Mr. and Mrs. Mohr, Mr. and Mrs. Thomas Jenkins, and SAMBA President Thomas J. Feeney, Jr., and his wife, attended a weekend meeting in New York City with officials of Prudential Life Insurance Company, which underwrites the SAMBA policy. Director Kelley's travel from Kansas City, Missouri, to New York and return to Washington, D.C., was by Government Travel Request (GTR). Travel for Mrs. Kelley and the others was paid by SAMBA. Prudential paid all other expenses. Director Kelley subsequently reimbursed Prudential for these expenses.

I.  FBI Officials' Relations with Firearms Suppliers

The Remington Arms Company, which bids on arms and ammunition contracts with the FBI, maintains a 300-acre working farm and game preserve in Chestertown, Maryland, called Remington Farms. On January 3 and 4, 1972, Remington hosted three FBI officials at Remington Farms and paid for their room, board, hunting licenses and stamps at a cost of $203.50. Twelve other FBI officials were hosted at the Remington Farm on three subsequent occasions, costing the arms dealer an additional $1,168 in room and board.

Remington also paid for liquor, ammunition, guides and game shot on these four weekends. Although a breakdown by individual is not available for these costs, Remington spent a total of $2,013.96 for forty seven individuals for the four weekends. Fifteen of the forty seven guests were then active FBI officials.

FBI records show that the Remington Firearms Company has not been awarded a firearms contract since 1971. The hunting weekends mentioned above all occurred after 1971. Six ammunition (not firearms) contracts have been awarded to Remington since fiscal year 1971, but each of these contracts was solicited and awarded after open bidding by the Justice Department. Although several of the FBI officials who attended the hunting weekends were in a position to influence the awarding of arms contracts, no arms contracts were awarded to Remington during the 1970's. Nor were arms contracts awarded during this time to Winchester Firearms Company which hosted a hunting weekend for three Bureau officials in 1973.

The Federal illegal gratuities statute, Title 18, United States Code, Sections 201 (f) and (g), requires that the gratuity shall be "for or because of" an official act. This investigation found no evidence that the recipients of the gratuities did anything for Remington or Winchester, and therefore, there was no evidence warranting prosecution under this statute. The evidence does indicate that the Departmental regulation prohibiting the accepting of gifts or entertainment from those having or seeking a contractual relationship with the United States was violated. 28 C.F.R. ß45.735-14(a). Moreover, the evidence shows that these employees also violated the general Departmental prohibition against conduct creating the appearance of impropriety. 28 C.F.R. ß45.735-2. The Attorney General has referred this matter to the FBI Director with instructions to take appropriate administrative action against these employees.

J. Miscellaneous Allegations

1.  Financial Dealings Between Joseph C. Palumbo and John P. Mohr

This investigation received information from the House Select Committee on Intelligence that John P. Mohr and Joseph C. Palumbo of Charlottesville, Virginia had had improper financial dealings. Mr. Palumbo and Mr. Mohr entered a financial arrangement in late 1972, after Mr. Mohr had retired from the FBI. The transaction was entirely lawful and at arms length and no evidence was found that Mr. Palumbo ever discussed the FBI or its activities with Mr. Mohr.

2.  Official and Confidential Files

During 1975, an investigation was conducted into the disposition of the "official and confidential files" of J. Edgar Hoover following his death in May 1972. The inquiry determined that the files were turned over to Assistant Director W. Mark Felt by Miss Helen W. Gandy, Executive Assistant to Mr. Hoover, on May 4, 1972, and now are located at FBI headquarters. No evidence was found that official FBI files of any kind were removed to Mr. Hoover's home following his death.

A. PART II Summary and Actions Taken Against Principal Subjects

1. John P. Mohr

(a) Mr. Mohr was Assistant Director for the Administrative Division of the FBI and the Assistant to the Director. He was primarily responsible for using USRC as an exclusive supplier of electronics equipment to the FBI. His conduct towardß,USRC violated 28 C.F.R. 045.735-2(b) and (c)(2) (prohibiting employees from giving preferential treatment to any person outside the Department). He received a few gratuities (tape deck, Christmas gifts) from Mr. Tait. No evidence was found that he was bribed, but he violated 945.735-14(a)(1), which prohibits employees from accepting gifts from those doing business with the Department. (b) FBI employees provided goods and services to him as described above. This arguably violated 18 U.S.C. 641 (conversion of government property to his own use), (prosecution barred by the statute of limitations), and 28 C.F.R. ß45.735-16 (misuse of federal property). (c) Mr. Mohr was also responsible, along with Mr. Callahan, for using FBI Recreation Association and Confidential Fund monies for unauthorized public relations purposes. This matter has been referred to the Department's office of Management and Finance for appropriate action (see footnote 12 above). In 1972, he attended an expense paid hunting weekend at Remington Farms, an FBI arms supplier. This is a violation of the Department prohibition against accepting gifts from those doing business with the Department, 28 C.F.R. ß45.735-14(a)(1). (d) No action has been taken against Mr. Mohr. He retired on June 30, 1972. Criminal action under all of the above federal provisions is barred by the five year statute of limitations.

2.  Nicholas P. Callahan 

Mr. Callahan was Assistant Director for the FBI's Administrative Division and later Associate Director. In 1976, pursuant to Attorney General Levi's order, he was asked to resign as a result of this investigation. He did resign.

(a) Mr. Callahan was responsible for improperly diverting thousands of dollars of FBIRA and Confidential Fund monies to official FBI public relations activities. The funds were not authorized or appropriated for public relations activities. There was no evidence that he converted these funds to his personal use, and therefore, no evidence warranting prosecution. This matter has been referred to the Department's Office of Management and Finance for appropriate action. (See footnote 12 above.)

(b) Mr. Callahan admitted receiving FBI goods and services. FBI employees decorated his beach house, built a fence, walnut shelves, and other furniture for his residence. The statute of limitations bars prosecution of Mr. Callahan for receiving government property in violation of 18 U.S.C. 641.

(c) No evidence was found that Mr. Callahan was bribed or that he received illegal gratuities.

(d) No further action has been taken against Mr. Callahan.

3.  Ivan W. Conrad

Mr. Conrad was employed by the FBI Laboratory in many positions from 1934 to 1973. He retired on July 12, 1973, as Assistant Director of the Laboratory.

(a) Mr. Conrad took many pieces of electronic recording and amplifying equipment home with him and used them for his own benefit. Mr. Conrad asserted he had the equipment for legitimate purposes. The Department recovered all equipment, and Mr. Conrad tendered a $1,500 cashier's check to pay for his use of the equipment.

(b) No further action has been taken against Mr. Conrad. Prosecution was barred, in the judgement of the Criminal Division, by the statute of limitations and because of the lack of evidence showing criminal intent on the part of Mr. Conrad.

4.  Clarence M. Kelley

Director Kelley received the limited amount of goods and services described above. He was not involved in any of the other matters which are the subject of this report. Attorney General Levi and Deputy Attorney General Tyler determined that no disciplinary action was called for, but that Director Kelley should reimburse the Bureau for the goods and services he received. That has been done and no further action against him has been taken. Director Kelley should be given credit for putting an end to the improper practices described in the report. His cooperation greatly assisted Departmental investigators in uncovering the facts. His cooperation made this report possible. It should also be noted that Director Kelley was primarily responsible for bringing about the internal reforms set forth in the final section of this report.

5.  G. Speights McMichael

Mr. McMichael is no longer in charge of, but continues to work in, the FBI's Property Procurement and Management Section. He is no longer cashier of the Imprest Fund, a petty cash reimbursement fund.

(a) Mr. McMichael clearly neglected his responsibilities in managing the Imprest Fund. There is some evidence that he permitted violations of procurement procedures to favor USRC in the purchase of electronic equipment. 41 U.S.C. 252(c)(12). There is no evidence of bribery.

(b) While serving as the FBI's chief procurement officer, he attended an expense paid hunting weekend at Remington Farms. This is a probable violation of the Department regulation prohibiting the receipt of gifts from those doing business with the Department. 28 C.F.R. ß45.735 14 (a) (1) .

(c) The evidence that Mr. McMichael knowingly approved Imprest Fund reimbursement for the personal purchases of an FBI employee is not substantial. There is no evidence that he converted government money to his own use. 18 U.S.C. 641 and 643.

(d) McMichael clearly failed to meet his responsibilities as the FBI's Chief Procurement officer and probably violated 28 C.F.R. 945.735-13 (misuse of official position) and 945.735-16 (misuse of federal property). His attendance at Remington Farms probably violated ß45.735-14 (gifts from Department contractors). He failed to assist Department investigators. The statute of limitations bars criminal action against Mr. McMichael. These matters have, however, been referred to the Director with instructions to institute appropriate administrative action against him.

6. Joseph X. Tait

(a) On June 20, 1977, a jury acquitted Mr. Tait of. charges that he understated his income in 1971, 1972 and 1973, in violation of 26 U.S.C. 7201.

(b) A jury acquitted Mr. Tait on all counts of charges that he violated 18 U.S.C. 287 (false claims on the United States), 371 (conspiracy to defraud), and 1341 (mail fraud).

(c) Further comment regarding Mr. Tait is considered inappropriate because, unlike the other subjects of this report, he is not a government official.

B. Possible Civil Actions

1.  U.S. Recording Company

The Department is considering taking civil action to invalidate USRC contracts and recover the excess profits obtained from the Bureau. The basis of such a suit would be the clear breach of applicable government procurement regulations. The Civil Division is now evaluating the relevant facts to determine whether the Department should institute a civil recovery action against the United States Recording Company or its president.

2. Conversion of Government Property by Bureau Officials

Civil actions may not be instituted because: the actual amounts involved are small compared to the expense of litigation; there would be substantial difficulty in fixing the government's loss with any appreciable accuracy; and, much of the government's property has already been returned. In addition, civil action may be barred by the statute of limitations.

3. Imprest Fund

Approximately, $1,700 was diverted from that fund for clearly improper purposes. The property obtained with Imprest Fund monies has been returned to the Bureau. This matter has been referred to the Department's Office of Management and Finance to review the facts, and to take necessary administrative action.

4. Confidential Fund

Approximately, $75,000 was spent to purchase electronic equipment and $23,000 was spent over a fifteen year period on public relations type matter. This matter has also been referred to the Department's Office of Management and Finance for appropriate administrative action.

5. FBI Recreation Association

Monies from the FBI Recreation Association were improperly diverted. According to the Civil Division, the Government lacks standing to initiate any civil action, except under a somewhat strained theory of parens patriae. Accordingly, no civil action will be instituted regarding this matter.

C. Action Taken to Prevent Recurrence

Within the last fifteen months, Director Kelley has taken the following corrective measures to prevent the recurrence of the improper practices described in this report.He has:

1. Reorganized the Inspection Division and renamed it the Planning and Inspection Division; created the office of Professional Responsibility, an office of Inspections, and an office of Planning and Evaluation;' established within the office of Inspections a separate Audit Unit, responsible for auditing all FBI funds and financial transactions; and organized the Division so that it reports directly to him, as Director.

2. Removed the Property Procurement and Management Section from the Division with budget responsibility, the Finance and Personnel Division, thereby making one Division head responsible for procurement and another responsible for the FBI budget and funds. Director Kelley has placed a Special Agent Accountant, a Certified Public Accountant, as Section Chief of the Property Procurement and Management Section.

3. Discontinued the use of the U.S. Recording Company as a "cover" or "cut-out" for confidential purposes and established controls to ensure that all purchases are made in accordance with government regulations.

4. Restructured the FBI inventory system, to provide built-in controls and audit trails, and initiated automation of the inventory system to provide better accountability.

5. Discontinued the FBI Laboratory and Exhibits Sections' practice of providing personal services to FBI officials. Director Kelley also has discontinued the use of the unauthorized cash fund once maintained in the Exhibits Section.

6. Reorganized the management and handling of the FBI Recreation Association (FBIRA) and its funds, so that FBIRA officers are aware of their responsibilities to prevent unauthorized expenditures. A new treasurer of the FBIRA has taken office and is not responsible for any other FBI fund.

7. Replaced the FBI Confidential Fund with the Field Support Account, an imprest fund approved by the Treasury Department and administered in accordance with Treasury and Justice Department regulations.

8.  Developed and improved the FBI career development program for Special Agents to ensure that the best qualified individuals are selected for administrative advancement, substantially reducing the possibility that one person or group can control the selection of such candidates. In addition to these administrative measures, the FBI has increased legal instruction within its training curriculum; held training sessions on the FBI guidelines for career agents; and issued detailed instructions to the field on legal questions concerning the legality and propriety of investigative techniques. The FBI is also posing such questions to the Department's Office of Legal Counsel with increasing frequency.

On January 3, 1978, the Attorney General referred the entire U.S. Recording Company matter to the FBI and instructed the Director to initiate administrative proceedings against G. Speights McMichael and other FBI employees whom the Director considers to be appropriate, subjects for administrative action. The Attorney General requested the Director to keep him advised by informing the Department's Counsel on Professional Responsibility of all administrative action taken.

Finally, the Attorney General has asked Director Kelley to bring to the Attorney General's attention any improper attempts to have FBI agents conduct investigations or undertake activities which are not within the Bureau's authorized jurisdiction. The Attorney General has also directed all Bureau personnel to bring reports of misconduct to the attention of appropriate Bureau officials, and when necessary, the office of Professional Responsibility at the Bureau and at the Department of Justice.


_1/ 41 U.S.C. 252 (c) and regulations promulgated thereunder.

_2/ 41 U.S.C. 252 (c) (12) .

_3/ The limit was raised to $10,000 by statutory amendment in 1974.

_4/ The Blue Ridge Club burned down on November 23, 1975, just before House Select Committee investigators were scheduled to interview Club employees. This investigation revealed that an eight-year-old child caused the fire while playing with matches. The child "confessed" to Department investigators. The testimony of other witnesses corroborates the confession.

_5/ A search of the transcripts of committee hearings revealed no evidence that Mr. Tait actually testified before the referenced subcommittee or any other subcommittee.

_6/ 28 C.F.R. ß45.735-2(b) and (c) prohibit the giving of favored treatment or advantage to any member of the public and any action which might result in, or create the appearance of: preferential treatment, the use of public office for private gain, or an adverse effect on public confidence in the integrity of the Government. 28 C.F.R. X45.735-14(a)(1) prohibits the acceptance by public officials of gifts or gratuities from those doing business with the Department of Justice.

_7/ No official documents, memoranda, or work orders were found which account for the work performed, the materials used, or the goods produced by Exhibits Section employees for the personal benefit of Bureau officials.

_8/ Contrary to the evidence obtained from Exhibits Section employees, Mr. Callahan stated that he paid for the material for the fences and installed them himself on personal time.

_9/ Mr. Callahan testified that agents are allowed to take home cameras for personal use to maintain their proficiency with them. Agents assigned to this investigation verified that this is the case, but indicated that the practice is intended to maintain familiarity with cameras more complex than the Polaroid.

_10/ A further term of the agreement was that he make restitution for the goods he received in an amount to be determined later between his attorney and attorneys for the United States. On September 28, 1976, Dunphy was fined $500 and placed on probation. He returned all government materials to the Bureau, in accordance with the plea agreement.

There was no footnote _11/

_12/ Title 31 U.S.C. 628, a noncriminal statute, prohibits the use of appropriated funds for a purpose not specified in the appropriation. The Counsel on Professional Responsibility has requested the Department's Office of Management and Finance to review these facts, to take necessary administrative action to prevent the recurrence of this conduct, and if appropriate, to refer the matter to the Comptroller General for possible recovery actions against responsible disbursing officers.

DOJ-1978-M

02/02


In mid 1978 an Executive Vice President (EVP) of Northwestern Bank requested a visit to my facility.  I had never dealt with this particular person but I knew Duncan was involved with other more pressing matters. The EVP told me that the FBI had replaced the IRS as Duncan's chief antagonist and the FBI was totally disrupting the functioning and operations of Northwestern Bank. The FBI was using the old "divide and conquer" routine to demoralize and frighten the employees. The FBI started at lower level employees and were working upwards towards management. Duncan felt it would be a good idea if every manager carried a pocket recorder to recorded any and all conversations with the investigating agents. The language of his intent was clearly within the confines of the law, i.e. one party consent. He also purchased three 1/3rd speed cassettes to record conference room confrontations. The EVP left my facility with one of the 1/3rd speed recorders and I ordered the remaining two for him.

Several weeks later the EVP telephoned and indicated that there was one scenario they weren't prepared for... that being the making of recordings in a Northwestern Bank office controlled by the FBI. I told the EVP that regardless of the surroundings the same one party consent rule would apply.

A few days later a Northwestern aircraft arrived at BWI airport to ferry me to North Wilkesboro.  That Sunday I was taken to the main bank building and shown the office the bank wanted to monitor. It was near a corner of the building that had glass windows all around. There was a roughly 40 foot by 40 foot open area in the corner that contained no furniture whatsoever. To the left was an office with the door open. Just outside the office were several knocked down cardboard boxes and tubes from vacuum cleaners. The inside of the office was absolutely sterile. One desk, one chair, one telephone (sitting the floor). As usual, I had brought some countermeasure equipment with me to do a quick check of any new and unfamiliar surroundings. I felt, after seeing the room, that it most likely was bugged so I set the countermeasure equipment aside. A quick glance out of the window revealed an automobile pointing directly at me in the parking lot across the street. The EVP showed me the proposed listening post and I could see that the length of the run would need a preamplifier at the microphone end of the system. Based on the EVP's earlier description, I had taken only a microphone and hank of RG-174 coaxial cable. Back at the motel I pulled a couple of resistors, capacitors and a 2N3391A out of one of my countermeasure preamps and constructed a microphone preamp. On my way back to the bank building I stopped by the car I had seen earlier. The car had no tires and was sitting on four cinder blocks. It was covered with dust and debris and obviously had been sitting somewhere for a long time... but not there. There was no drip line around the car! Out came my contact microphone and when placed on the car I heard the unmistakable sound of a time lapse camera. I thought... and probably said out loud... C'mon you guys, you can do better than this!

On returning to the target room I installed the microphone and preamp inside the telephone jack cover. In an office on the other side of the building I connected my preamp to the designated wires... turned up the volume... and I could hear myself as clear as a bell. A sense of pride came over me and I was satisfied I had earned my money. I packed my bags and left town on one of Northwestern's airplanes.


Shortly afterwards Duncan was indicted for misapplication of several hundred thousand of the banks money. He was convicted of misapplying $675.00! Thanks to one of the idiotsyncrasies of our legal system, the sentencing guidelines are base on what you are charged with, not what you are convicted of, and Duncan was given an 18 year sentence. He was now a broken man and the vultures came to feed.... and feed they did.

To thank him for all he had done for them 15,000 people came to Duncan's send off party. Do you have that many friends? Duncan was a giant of a man in North Carolina and had helped hundreds of thousands of people during his term as Chairman. Now, that was all to end.

Shortly afterwards Duncan, Starr and the EVP were charged with bugging the FBI. They had extremely bad counsel. Rather than stick with their lawful position of one party consent, counsel came up with all kinds of rinky-dink defenses and got them all convicted. I followed the trial closely and was more than slightly pissed that they did not come to me for advice and guidance.

In early December, 1978 I was subpoenaed to appear before the Grand Jury that had indicted Duncan, Starr and the EVP. My attorney, Bud Fensterwald, Para-legal Marc Feldman and I headed to North Carolina. Before leaving, I typed up two 3 X 5 cards with the fifth amendment statement on them (for you foreigners, the fifth amendment of the U.S. Constitution gives a citizen the right NOT to answer a question). Before going into the Grand Jury room Fensterward instructed me to give them my name, rank and serial number and then "read the card." I must have read the first card 60-70 times before I ceremoniously set it aside and pulled out the second card and started reading it. Of course it had on it the exact statement and one of the Grand Juror's joked that the first card must have run out of gas or something. In total, I must have taken the fifth 150-175 times. Periodically, whenever I got tired I excused myself to converse with my attorney... i.e. get a breather.. and when I reentered the room Fensterwald would say "read the card."

Immediately after I was dismissed from the Grand Jury, Marc Feldman grabbed me by the arm and took me to an empty room. He asked me to tell him exactly what I had seen in the Grand Jury room. I started to my immediate right with the U.S. Attorney, then the stenographer, then the Grand Jurors... one by one... and finally the jury foreman's table at which sat two men. One was a gray haired fellow and the other FBI Agent XX. Feldman gasped and told me to go over that part again... which I did. A couple of days later I received a copy of a motion from Fensterwald to the Court asking that the charges be dropped due to improprieties by the FBI. This was a serious issue. It is a violation of federal law for an investigating agent to be present when a witness is questioned.

The Court requested a hearing. It stood to reason that I would take the stand and say he was there and he, knowing he had violated federal law and been caught, would most certainly say he was not. The only way to solve that dilemma was to put a couple of Grand Jurors on the stand under oath and ask what they saw. To help me to decide which of the Grand Jurors we would use the court was forced to give me a list of the names and addresses of the Grand Jurors... and here are twenty of them. You will hear more about these people later.

BERNICE C POOLE
BX 8694
2159 CHARLES ST
DURHAM, NC 27707

CARL F. SPAUGH, JR.
2441 W CLEMMONSVILLE
WINSTON-SALEM, NC 27107

JARIUS J. WATSON
GENERAL DELIVERY
EFLAND, NC 27243

MS HILDA J WEAVER
1008 TWYCKENHAM DRIVE
GREENSVILLE, NC 27408

DOROTHY R MC DOUGALD
P.O. BOX 471
BROADWAY, NC 27505

REBECCA A MYERS
1530 HARDING STREET
WINSTON-SALEM, NC 27107

MABLE L PARKER
39 WALNUT STREET
CONCORD, NC 28025

LUCY J PEARSON
3707 PROSPECT DRIVE
WINSTON-SALEM, NC 27107

LEEOIST B KIME
RT 2 BOX 38
LIBERTY, NC 27298

DORI A KING
RT 3 BOX 385-A
LEXINGTON, NC 27289

JOHN W LEONARD
4502 SUMMIT AVENUE
GREENSBORO, NC 27405

JOHNNY S MASON
2706 FERRELL ROAD
DURHAM, NC 27704

EVELYN P FURR
ROUTE 3
ALBEMARLE, NC 28001

BILLY G HEGWOOD
4955 SHATTALON DRIVE
WINSTON-SALEM, NC 27106

EDITH J. JORDON
1617 EAST 23RD STREET
WINSTON-SALEM, NC 27105

PATRICIA A KENNEDY
RT. 4 BOX 1179
HIGH POINT, NC 27260

CARL H BROWN
RT 2 BOX153
TRINITY, NC 27370

RICHARD K BURR
2852 WYCLIF ROAD
RALEIGH, NC 27602

DAVID C CAMPBELL
4 CRESTVIES CIRCLE
SALISBURY, NC 28144

RANEY W FOUSHEE
1025 CHATFIELD DRIVE
GREENSBORO, NC 27410

I had transferred these names from my master list to four names and addresses per mailing label group. I have since misplaced my master list and one group of four names and addresses. As soon as I find either, those name will be added to the above list.  

SO MUCH FOR GRAND JURY SECRECY!!

I took the stand and, under oath, made my statement that the FBI agent was indeed there. The FBI agent, under oath, said he was not. He should have stopped right there but his ego simply would not let him. The FBI agent, not the court, asked Fensterwald if he had seen him go in and out of the Grand Jury room. Fensterwalds answer was no. Again, the FBI agent couldn't shut up. He commented that he was in the library while I was before the Grand Jury. The judge should have immediately responded... Hey, wait a second XX. You know as well as I that directly behind the jury foreman's desk is a door that opens into a covered corridor which ends at the library! Maybe we SHOULD hear from some of those Grand Jurors! Instead, the judge turned to me and said "Mr. Kaiser, you're mistaken, honest or otherwise." Whack went the gavel and that was that. At least my team now knew what kind of trash we were up against.

We were now on to the arraignment stage.


There are three more chapters to this story and they will be up loaded as soon as I can write them. They are...

    The criminal case...
    The civil case...
    Repercussions...


The following newspaper articles were part of the original upload. The new chapters mentioned above will fill in and expand around these articles with true events.

Journal
Tuesday, February 21, 1978

Jury May Get Case Today, Is Kaiser Object of FBI Vendetta?

Twelve jurors probably will begin deliberations today to decide whether Martin L. Kaiser is guilty of conspiracy and illegally bugging FBI agents while they investigated Northwestern Bank last year.

One thing the jury must decide is whether the FBI is carrying out a vendetta against Kaiser, one of the, country's foremost wiretap and bugging experts.

Kaiser, a manufacturer of surveillance devices - from Maryland, was once a major supplier of the FBI's surveillance equipment But his dealings with the FBI stopped when he publicly identified an FBI front company used to buy his products and resell them to government agencies at substantially higher prices.

Today, Kaiser no longer works with the FBI, but his clients include the ..., the Army, and Air Force, several foreign countries and more than 200 police departments.

Martin Kaiser is still one of the most respected makers of bugging equipment in the world - among his character references is the head of the CIA's procurement division. Kaiser still supplies the ... with a great deal of surveillance gear' and he still holds an agency rating of secret.

But Kaiser says that the FBI wants revenge on him. He alleges that the FBI seeks revenge because of his testimony before the presidentially appointed National Wiretap Commission and the House Select Committee on Intelligence in 1975. In his testimony before the panels Kaiser revealed links between the FBI and U.S. Recording Co., an electronic equipment purchasing company.

Kaiser told the committee that the recording company was actually an FBI front - an apparently legitimate private business. Which was in fact operated by high ranking FBI officials. Kaiser had done a considerable amount of business with the FBI, he said, but his business began to suffer greatly after he was instructed in 1969 to sell his equipment to U.S. Recording instead of directly to the FBI.

Kaiser testified that he first assured that the procedure was merely a security measure, - but he later discovered that the electronic devices he sold to U.S. Recording were being duplicated and resold at substantial markups.

Kaiser had sold the FBI many surveillance devices - among them the bug detection kit used to find the listening devices Kaiser is charged with installing at Northwestern's headquarters in Wilkesboro. After his testimony an investigation by the General Accounting Office revealed that the FBI front company had marked up the prices of Kaiser's gear from 12 percent to 280 percent.

Kaiser testified that the FBI was not the only group buying his products through U.S. Recording. In addition to federal agencies, Kaiser told the congressional committee foreign governments, including Canada and Iran bought the marked-up goods.

Kaiser now says that most - of his federal contracts were severed after he brought the front company to public attention. An affidavit Kaiser filed in federal court claims that his sales plummeted from $200,000 annually before his testimony to $450 afterward.

His allegations of a vendetta go beyond the U.S. Recording Co. payment scheme, though. Kaiser said that Thomas J. Brereton, the FBI agent in charge of the Northwestern investigation illegally attended grand jury proceedings while Kaiser was testifying.

Kaiser's allegations resulted in a special hearing called by Judge Hiram H. Ward in U.S. Middle District Court here last month. Ward ruled that Brereton had not improperly attended the grand jury hearings and that "a mistake had been made, honest or otherwise."

Brereton testified that he had been in the U S. attorneys law library during Kaiser's grand jury appearance.

Friction between Kaiser and Brereton seemed to continue throughout the seven days of testimony in the bugging trial. Kaiser's attorneys repeatedly asked Ward to admonish Brereton for speaking with Assistant U.S. Attorney Benjamin White during cross examination.

Brereton consulted with White before many questions were put to defense witnesses, and Kaiser's attorneys objected that the jury could overhear Brereton's comment's. Several times, Ward instructed Brereton to lower his voice when he spoke with the prosecutor.

A part of Kaiser's affidavit on the FBI vendetta matter said that two special FBI agents visited him in December 1975 to interview him on his U S. Recording Co. testimony. Kaiser said the two "literally held me for several hours hostage... to elicit a statement which repudiated my earlier congressional testimony and absolved the Bureau and U.S. Recording Co. of their wrongdoing."

The U.S. attorney's office filed a motion in federal court to deny Kaiser's allegations of a vendetta.

Kaiser's trial will continue at 9:30 a.m. today, with final arguments and instructions to the jury scheduled.


Winston-Salem Journal
Wednesday - February 22, 1978

Martin L. Kaiser has been found not guilty of bugging FBI agents, conspiracy and illegal transporting listening devices.

The verdict was returned by a jury of eight women and four men after 2.5 hours of deliberation yesterday afternoon in U.S. Federal District Court here.

Kaiser, an electronic surveillance expert from Cockeysville, MD, had been charged with helping Edwin Duncan Jr. and Gwen E. Bowers bug FBI agents who were investigating Northwestern Bank last year. Duncan, former bank board chairman, and Bowers, a former bank vice president, pleaded guilty to similar charges last November.

The bugging took place between April and July 1977 in an office in the bank's headquarters in Wilkesboro. "In all honesty," Kaiser said after the verdict was announced, "it's what we expected. Needless to say I'm satisfied."

Throughout the eight day trial Kaiser admitted installing bugging equipment in a bank office used by the FBI agents but denied knowing that Duncan and Bowers would use the equipment illegally. The government case contended that Kaiser was fully aware that bank employees would use the bugging system to illegally monitor the FBI investigation.

"What this case is really about is human rights - the right to human privacy," said Assistant U.S. attorney Benjamin White in his final argument yesterday morning. "There is nothing illegal about him installing these devices - many attorneys have them in their offices, many businessmen have them in their offices," said John Morrow, ore of Kaiser's attorneys.

Much of Kaiser's trial was marked by controversy over his past business dealings with the FBI. Kaiser, who is a major manufacturer of surveillance equipment for government agencies, filed a pretrial affidavit protesting that the FBI was seeking revenge against him.

Kaiser said the FBI wanted vengeance because of testimony he gave before congressional panels on surveillance matters. He had identified an FBI front company that bought his equipment and resold it to the FBI and other government agencies at marked-up prices.

Most of the defense witnesses were from law enforcement agencies, and most testified that Kaiser is reputable and trustworthy. Kaiser testified that at he Sells bugging equipment and bomb detection gear to more than 200 law enforcement groups. His clients, he said, include the ..., the Army and Air Force and several foreign governments.

In his closing remarks, White questioned the nature of Kaiser's relations with his clients. After saying that Kaiser had once had the trust of law enforcement groups. White said, "Mr. Kaiser sold that trust, ladies and gentlemen, for $3,500 (Kaisers fee - for the Northwestern Bank bugging)."

Shortly after the end of the trial, one of Kaiser's attorneys told reporters that Northwestern has never paid Kaiser's fee. "We hope we don't have to sue them to get it - they're a big bank," said Bernard Fensterwald, a Washington lawyer who once defended James McCord, one of the Watergate burglars.

Kaiser said he plans to visit his daughter in Florida and then return to work. "I've really been out of business since July 29 (the date of his indictment)," he said. "I'm really looking forward to getting back to it."


The Sentinel
Winston-Salem, NC
Saturday, February 5, 1983

Defendants Claim Agents Abused Process

GREENSBORO, NC - Two FBI agents abused the criminal process to strengthen their position in a $22 million lawsuit stemming from the 1977 investigation and bugging at Northwestern Bank lawyers for defendants in the suit charged in federal court yesterday.

One defendant in the civil case also accused the FBI of tampering with evidence. In an affidavit, defendant Martin L. Kaiser, an Electronics expert from Cockeysville, MD., said bureau agents or, employees altered two tape recordings and switched tape recorders. He also claimed that one agent removed documents from FBI files which have never been recovered.

The allegations were made during three hours of argument In U.S. Middle District Court Federal Judge Frank W. Bullock Jr. held a hearing on numerous motions pending in the case which began almost five years ago.

In July 1978, FBI agents Thomas J. Brereton and Zachary T. Lowe filed suit alleging that their civil rights were violated and their privacy was invaded when their conversations were electronically recorded during their investigation of Northwestern Bank from April to July 1977. Brereton and Lowe charged that Edwin Duncan Jr., then Northwestern Bank chairman, and Gwen E. Bowers, then bank vice president, conspired to intercept the agents oral and telephone communications.

They also claimed that Kaiser agreed to help Duncan and Bowers by possessing, selling, transporting, and installing electronic surveillance equipment or bugs to help them accomplish their sinister conspiratorial scheme." Northwestern Bank and Northwestern Financial Corp., the bank's holding company, also are defendants in the lawsuit.

The agents discovered they were being recorded while they were investigating financial irregularities at the North Wilkesboro-based bank. Duncan was convicted of misapplying bank funds and recording conversations of IRS agents who were reviewing bank records in October 1977, and in November 1977, he pleaded guilty to the bugging conspiracy against the FBI.

Bowers pleaded guilty to the conspiracy to record the FBI agents' conversations and to the actual bugging. However, Kaiser pleaded not guilty to charges related to the bugging and he was acquitted in federal court in Winston-Salem in February 1978.

Since Brereton and Lowe's suit was filed, it has become one of the most complicated civil cases ever in the U.S. Middle District. Three Greensboro attorneys - Bynum N. Hunter, Michael R. Abel, and Ben F. Tennille, have been released as defendants, and the remaining defendants and the plaintiffs have filed pages and pages of motions' affidavits and cross claims. There also is a similar case filed by former FBI agent Donald G. Wilson for $5.5 million in damages from Duncan, Bowers, Northwestern Bank and Northwestern Financial.

Lawyers for Duncan and Kaiser yesterday said Brereton and Lowe used the criminal investigation of their clients to prepare for their multi-million-dollar civil suit. "They were given access and power of the federal government they should not have been given," Stephen Spring, a Louisiana attorney representing Kaiser said. Duncan's attorney, Ted G. West, claimed that the former bank chairman Agreed to plead guilty to the bugging conspiracy during a meeting with Brereton and a former U.S. attorney.

"We contend that Mr. Brereton and Mr. Lowe abused the process," West said. "That's what it boils down to in instigating a guilty plea from Mr. Duncan so they could have something to hang their hat on in this civil case."

He also said, "This court must and should look closely at a situation where investigators of the U.S. government pursue their investigation knowing during the entire course of the investigation that they have a civil suit in mind".

But Mike Bailey, one of Brereton's and Lowe's lawyers, said the agents were only fulfilling their obligations by investigating and helping prosecute the cases.

Kaiser filed a $720,000 counterclaim against Brereton and Lowe in 1978 and last year he asked to add the FBI to his suit. He is seeking $10.7 million from the FBI. Kaiser claimed the bureau "actually assisted and enabled... Brereton and Lowe to gain access to Information and records while on bureau time and through bureau resources of information directly bearing to the outcome of the civil action."

Duncan also has asked the court to allow him to add the FBI, a former U. S. attorney and a former assistant U.S. attorney to his cross-claim against Brereton and Lowe. However, Bullock questioned whether the statutory limitation on adding to the cross-claims has run out.

Kaiser made other allegations against the FBI in his affidavit. He accused the bureau of fraudulently concealing and manufacturing evidence.

The Panasonic tape recorder presented at his criminal trial played at one-third normal speed, Kaiser said, but he said the recorder being used as evidence in the civil case operated at one-fourth normal speed. He also said tests showed that two tape recordings of Brereton and Lowe were not made on the tape recorder provided to Northwestern Bank in 1977 and that the two tapes were made on two different recorders, he said.

Kaiser said, "It is my belief based upon a review of tests that these modifications or manufacturing of evidence was performed by agents and/or employees of the Federal Bureau of Investigation as part of a conspiracy wherein the FBI acted in concert with plaintiffs Brereton and Lowe by attempting to convict me of a crime I did not commit ... and instituting the present civil suit as a retaliatory measure designed to drain me of funds necessarily spent in my defense."

Kaiser further charged that Brereton took documents out of the FBI files and that the bureau claims those papers are lost. He also said Brereton made misrepresentations to a grand jury which led to Kaiser's indictment on charges related to the buggings Brereton did that Kaiser said, so he could use the criminal trial to gather evidence for the civil case.

Duncan and Kaiser have filed motions for summary judgment and have asked for dismissal of the actions against them. Yesterday, attorneys for Northwestern Bank and Northwestern Financial Corp. also argued for summary judgment and dismissal.

"The bank was the one who was losing from this illegal activity" not just the customers, The bank," Richard Vanore, Northwestern attorney, said. "Because (Duncan) benefited is not sufficient to say the bank benefited and should be held responsible for his action."

He also charged that Brereton and Lowe are "seeking monetary damages as the real fruit of their criminal investigation"


The Sentinel
Winston-Salem, NC

Bugging Expert Adds FBI To His Suit Against Agents

GREENSBORO, NC - A Maryland electronics expert is asking for more than $10 million in damages from the FBI, claiming that the agency as assisted two of its agents who were planning a lawsuit against him.

Martin L. Kaiser specializes in electronic surveillance (bugging), counter-surveillance and bomb detection equipment says in a document filed in federal court here that agents Thomas J. Brereton and Zachary T. Lowe were contemplating a lawsuit against him while they were involved in prosecuting him on criminal charges.

The FBI "actually assisted and enabled... Brereton and Lowe to gain access to information and records while on bureau time and through bureau resources of information directly bearing to the outcome of their proposed civil action", Kaiser claims.

He says in the document which is an amendment to an earlier counterclaims against the agents, that the FBI's action represents a "malicious motive for the institution and prosecution" of the criminal case against him "in violation of federal statutes which require federal agents with a conflict of interest to excuse themselves from such investigation".

Brereton and Lowe sued Kaiser in U. S. Middle District Court in July 1978, five months after he was found not guilty of charges of bugging them while they were conducting an investigation at Northwestern Bank in Wilkesboro in 1977.

The agents also sued the bank and its former president Edwin Duncan Jr., claiming that their right to privacy was violated by the bugging of the room they were using at the bank head quarters. The agents claim a total of $22 million in damages.

Several months later Kaiser filed a counterclaim against the agents claiming they abused the criminal process against him and asking for $720,000 in damages. The agents responded by denying that they had acted improperly in the criminal investigation and they asked for a dismissal of the counterclaim.

Kaiser's addition to the counterclaims filed this week asks that the United States be brought into the suit to represent the FBI, and he asks for an additional $10.7 million in damages.

U. S. Attorney Kenneth W. McAllister said this morning that "I certainly wouldn't comment on any pending civil actions".

Duncan and the bank have filed motions for dismissal of the agents' suit, and Duncan has asked the court for permission to file his own counterclaim against the government and prosecutors in a 1977 criminal case against him.

Duncan pleaded guilty to charges of conspiring to bug the agents. He spent several months in prison as the result of convictions on other charges stemming from the agents investigation.

No trial dates have been set in the lawsuit, which has become one of the most complex civil cases now pending in the district.


The Daily Telegraph
London, England

Bugged FBI Men with Hemorrhoids Sue for 11 Million

A telephone tapping expert who supplied the Federal Bureau of Investigation with electronic eavesdropping devices is being sued for alleged "bugging of two FBI agents." The agents, Thomas Brereton and Zachary Lowe, are claiming eleven million pounds compensation They say their right as private citizens were "grossly violated" and they are suing Mr. Martin Kaiser and a bank in North Carolina.

They were investigating the bank's affairs after allegations that an executive was misusing funds, and according to Mr. Kaiser a vice president of the bank sought his assistance, wanting recorders installed to tape conversations and interviews in the bank involving the officers.

Devices were provided, Mr. Kaiser said, on the understanding that the equipment would be used legally with the consent of the agents.

The FBI men have now named him together with the bank in a lawsuit filed at Greensboro, North Carolina. In a court deposition Mr. Brereton tells of finding five bugging devices, including special transmitters and amplifiers, in the building.

He recalled: "That night there was tremendous anger and frustration". He remembered one of the bank's executives sitting "smirking at me when he pulled all the mikes out of the wall. He went on: "You wouldn't believe the anger that took place in here that night when I found out... you go home and all you do is think about it." "You know you've been bugged... It keeps playing on your mind".

As a result he was humiliated and embarrassed as a special agent and suffered, he said, increased hypertension and cysts in his eyes.

His colleague said in his deposition that after the incident his hemorrhoid condition worsened.

FBI AXIOM
If you lie in a court of law and get away with it, it is called "JUSTICE."
If you lie in a court of law and get caught, it is called "PERJURY."


Martin L. Kaiser in His Lab


Note: In certain government circles it is "understood" that Martin L. Kaiser inspired Francis Ford Coppola to write the manuscript for "The Conversation" back in the early seventies. Some of Marty's FBI Story formed the basis for the new Jerry Bruckheimer/Tony Scott film "Enemy of the State" starring Gene Hackman, Will Smith, John Voit and Regina King.


Now is the time to read DESIDERATA     HOME

   ©2002

06/02    [Non-text portions of this message have been removed] 5530 From: Marty Kaiser Date: Thu May 30, 2002 11:03am Subject: Fw: FBI story ----- Original Message ----- From: Marty Kaiser Sent: Thursday, May 30, 2002 12:00 PM Subject: FBI story I just pasted the latest in my FBI story to you. If you wish to see it in living color go to http://www.martykaiser.com/fbi1~1.htm There is a lot more to come. Marty [Non-text portions of this message have been removed] 5531 From: A Grudko Date: Thu May 30, 2002 10:14pm Subject: Re: Newbie Intro - Original Message - From: D Patrick > Father had spliced the line by the > laundry chute and tucked the wires out of casual view. Evaluation of the > line led the boy to behind his father's desk where a radio shack hookup of > some type was activating the tape recorder everytime the phone was in use. Ah - the good old days. I tapped my parents' phone when I was about 9, using a capacitor and an old phone earpierce on a parallel connection I ran down to my command center - the tool shed at the end of the garden. I also ridded up a big speake, hooked up to my Marconi (I wish I still had that antique) receiver. My first electronics kit (the next Xmas, in about '65) was based on a board that looked like a street map, with numbered holes and little spring connectors for the component leads. No, I did not build an illegal FM transmitter Mr Federal Agent, but I confess that was probably because - there was no commercial FM in those days.! Andy Grudko (British) - D.P.M., Grad I.S, South Africa - PSIRA investigators Reg. No. 8642 Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust When you need it done right - first time 5532 From: Date: Thu May 30, 2002 7:23am Subject: Re: Fw: FBI story In a message dated 5/30/02 9:03:36 AM Pacific Daylight Time, martykaiser@p... writes: << I just pasted the latest in my FBI story to you. If you wish to see it in living color go to http://www.martykaiser.com/fbi1~1.htm >> I just went to the URL. The bulk of the page appears the same as before. The list members who are interested have been there before and are familiar with the story. Would you please point out what's new and / or give the updates their own URL and advise us? 5533 From: Date: Thu May 30, 2002 6:17pm Subject: Pen - DNR with CID $29.99 The Radio Shack Call Accountant 200 with Caller ID Model # 43-446 is being "Silently Deleted"" from their product line and is being sold in their stores for $29.99 marked down from $69.99 in their 2002 catalog. Featured on page 36. Anyone who might ever have a use for one should consider buying one or more. These are not advertised in any ads or flyers. It's a nationwide in store only blowout. 5534 From: Steve Uhrig Date: Fri May 31, 2002 10:51am Subject: Another WIZARD - Andre Holmes Apologies to Andre Holmes. He also provided the correct answer to black box riddle #1. We were speaking on the phone when he gave me his answer. I went to my email Wizard folder and posted the names of persons who had replied correctoy via email. Didn't have a provision for verbal answers. So, congrats Andre. You're one of the real ones. I would like to point out Andre decided he was interested in learning TSCM, and decided to go about it properly by taking basic electricity and electronic theory courses. You've got to have the basics before you can get into all this exotic bug stuff, or else you're fooling no one and probably cheating anyone who pays you to sweep. All the expensive sweep toys in the world will not make up for lack of understanding of basic electronic and communications theory. How can you interpret the esoteric traces of a spectrum analyzer to determine if a signal is a threat or not, when you can't expound the basics of amplitude and frequency modulation, understand sidebands, etc. Soapbox Mode Good work to all. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5535 From: Marty Kaiser Date: Fri May 31, 2002 0:16pm Subject: here is my latest handywork

FBI Vendetta Against
Martin L. Kaiser III




Initially this page consisted of a compilation of news magazine and newspaper articles.   I was under the impression that since  I  did not write these articles they would withstand the test of time.  I was wrong. Not too long ago I received a direct threat from a well known U.S. intelligence agency ordering me to remove their three initials from these articles.   Pointing out that asking me to remove their initials was essentially changing history didn't phase them...  somewhere in my argument I mentioned Adolph Hitler.

In the past I have purposely avoided making any personal observations and/or comments about these events and the stories surrounding them.  The time is now right to make those observations and comments.

The enormous damage caused to my family and me cannot be forgiven.   These events are an insult to all my friends and associates...  an insult to the United States of America...  and an insult to the world community.  Read on...

Marty


First some comments on format.  All my personal observations will be in BLUE while public records and direct quotations will be in BLACK.  Names will be mentioned, where harmless, but where mentioning them may cause problems I shall simply put either initials or XX.

Deciding where to start was the most difficult part of this story.  I decided to start at the beginning.

Born in 1935, my family and I lived in the the hard coal region of northeastern Pennsylvania.  We were surrounded by families from Czechoslovakia, Poland, Lithuania, Hungary and many other coal miner producing countries.  Having the Kaiser name didn't help me much while these countries were being torn to shreds before and during World War II.  The hatred expressed towards me by neighborhood children was enormous.  As a child I had no idea that their animosity was anything other than the norm.   My childhood obviously played a MAJOR role in what I became...  there also were some shameful events that hardened me in ways few will understand...  so I'll move on.

During my pre-teen and early teen years I was fascinated by U control model airplanes and had a large collection of them.  As radio controlled airplanes began to appear I found electronics more interesting.  Shortly after the end of WW2 I received my amateur radio license W3VCG and still hold those call letters today.

I can't say my school years were a shining beacon but at least I got through them.  In prep school XX became my co-dependent good buddy.  He was born without eyes but in spite of this I was able to get him involved in ham radio too.  I took the glass out of the meters of an old rig and XX was able to tune it by the pressure the pointer exerted.  He taught me how the loss of one sense is compensated for by the others.  We had lots of fun together with this incident being the funniest.  I had my Mom's hand-me-down 51 Caddy and would drive it to a long riverside park on the other side of the river from Wilkes-Barre.  Then I would allow XX to take the wheel and speed up and down the park usually with his left arm out of the window banging wildly on the side of the car while grinning from ear to ear.

In 1957, I was hired as a Research Technician by RCA Laboratories in Princeton,  New Jersey.  A group of 12 established scientists were my "bosses."  Dr. Morton,  co-inventor of television as we know it today...  Dr. Rudy,  inventor of many image conversion devices... one of our image intensifiers took the first pictures of the bottom of the polar ice cap and one took the picture of a single photon (one particle of light)... Dr. Forge,  co-inventor of the vidicon and other TV conversion tubes...  Dr. Sommers,  inventor of the Iconoscope,  the image conversion tube that made real time video possible...  Dr. Kleitman,  inventor of many high efficiency phosphors...  Dr. Ching,  inventor of many helical microwave amplifier tubes...  Dr. Nergard,  one of the people instrumental in the development of the Klystron oscillator that made radar possible...  Dr. Klensch (Dick),  (most of the work I did was for him)  did basic engineering on a variety of projects...  and many other truly brilliant minds.  My job was to be their "hands."  I designed and built much of the circuitry that permitted all of these men to continue with serious development.  In our group I remember four other technicians,  each with their own expertise.  We worked well together as a team and although I was always sticking my nose (comments) into many,  many projects other than mine it gave me the opportunity to be part of some incredibly interesting projects...  the end results of which became technology and products we take for granted today.

Obviously,  I turned my amateur radio interests towards amateur television.  I wrote extensively for technical journals, RCA in-house technical publications and radio amateur magazines and had my own ham TV station on the air.  Another amateur television enthusiast,  William Haldane (Bill),  and I became close friends.  He was part of RCA Service Company,  a group that put our ideas into the field for further trials.  At that time, Dr. Klensch and others, including me, were developing several schemes involving VVLF technology...  below 10HZ...  we used to call them "cycles" back then.

Since we were all pretty much playing it "by ear" we had more fun than anyone should have in one lifetime.  Here is a good example.  Several hundred yards behind the main building was a small pond.  A bridge crossed the pond and in the middle of the bridge was a small house for test equipment.  A hydrophone was lowered from the house into the pond.  Two hundred yards away a 10 foot long by four inch diameter rod was driven flush with the ground.  Next to it lay a small loudspeaker connected to a microphone in the pond house.   My job was to drop a 10 pound cannon ball onto the stake when Klensch yelled "go" and he,  in turn,  would measure the shock wave.  So there I was in the middle of a field repeatedly dropping a cannon ball on the ground.   Someone inside the main building noticed me and called authorities. Soon an ambulance was fast approaching across the field.  My explanation caused all concerned side splitting laughter.  After the ambulance left Klensch and I continued with the cannon ball dropping experiment.

One day Bill approached me and asked if I'd like to go to Trinidad. Neither he nor I knew where that was but it sounded interesting. When I got home I grabbed the Encyclopedia and found out.  After discussing it with with my wife I returned with a firm "YES."  A month or two later Bill again approached me and advised that Trinidad would not accept our presence and asked if I would like to go to Antiqua.  I didn't know where that was either but again said yes.  A month or two later he told me that Antigua wouldn't accept our presence.  He mentioned RCA had decided to set up the project on Barbados where there was a small U.S. Navy base and they simply would not tell the Barbadian government about the project.  He asked if I would go there and I responded in the affirmative even thought I had no idea what the "Project" was all about.  Finally I was given a briefing about a new high frequency (1 to 30 MHz)  "Over the Horizon Radar"  an RCA technician/ham had conceived.  My job was to see if it would work.  I later learned that the two islands had turned us down because it was during the Cuban missile crisis and they did not want to antagonize their friend, Cuba.

I was transferred to RCA Service Company and sent to Burlington,  Massachusetts to check out the hardware. When I got to Burlington,  to my astonishment,  NOTHING relating to the project was there!  Within three months I appropriated or stole (allocated but not yet delivered...  midnight raids, you know) and assembled all of the equipment needed in two 40 foot trailers. Inside of the Trailer Finally the two trailers were ready to put on ships headed towards Barbados and Jamaica.  My wife and I closed up the house and along with our 3 and 5 year old children flew, on probably one of the first 707's to take to the air, to Barbados.

As soon as we got settled I went to the Navy base to announce my presence.  The Captain of the base responded with total surprise.  No one had informed him of our intention to set up on "his" base (north coast)!  It turned out that the four RCA advance men never left Bridgetown (south coast), the capital city of Barbados,  but instead spent their time enjoying the wonderful Barbadian rum and the strikingly beautiful Barbadian women!  I was truly on my own.  After some serious negotiating,  the Captain gave me a few hundred square feet of space on which to set up my project.  The trailer finally arrived and, you guessed it, there was no tractor on the island with which to pull it.  Several trips to the junk yard solved that problem.  The tractor also had no brake release compressor so I constructed a small gasoline powered compressor to do just that.  The trailer was then towed,  without brakes,  over mountainous terrain!  My caravan consisted of myself in a 1958 VW waving a very large red flag out of the window followed by the tractor/trailer.  As I passed through villages many Barbadians ran out to the street clapping their hands and jumping wildly in joy thinking the island had been or was going to be taken over by Communist!

After the trailer was in place I began installing four HUGE log periodic antennas.  Two were 150 foot long 1 to 30 MHz vertical log periodic curtains and two were huge,  and very heavy,  3 to 30 MHz horizontal log periodic beams mounted on the 100 foot towers that supported the curtain.  They were to be supported by 1/2 inch nylon rope.  Nearly every night Barbadian fishermen would "liberate" some of my beautiful rope.  To solve that problem I made several meaningless medallions that my workmen had to hang around their necks while working at the antenna site otherwise they would become impotent.  When word got out about that, the thefts stopped IMMEDIATELY!  To see the antennas and trailers go to my NOSTALGIA  page.

My family and I settled into the wonderful Barbadian life but the peace didn't last long.  One day while working on the antennas I heard the drone of a four engine airplane.  Looking up I saw a Russian bomber at about 1,000 feet with its bomb bay doors open and a large camera sticking out.  Others obviously saw the plane too because it wasn't long before the American Ambassador was banging on my door.  Since my wife is the politician of the two of us I let her handle the incident.  Sure enough,  after a few of her special cherry-cheesecake pies we were back on track.  Those pies seemed to be the magical answer to the many other situations that would arrive.  In record breaking time I had the equipment up and running.  All of the equipment worked fine and we were ready for the next step. That phase was up to someone else.

A couple of years ago my copy of Microwave magazine arrived and lo and behold my project is STILL in operation.  Again see the NOSTALGIA  page for that article.

On my return to the U.S. I approached RCA Laboratories to change my title from Senior Technician to Associate Engineer in view of the fact that I had, under very difficult conditions and circumstances, acted as international diplomat and single handedly managed, designed, built, refined and operated a major project.  They essentially said that since I did not have an engineering degree I was a "certifiable dummy" and my title could not be changed.  That was the end of my career with RCA.

For a brief period I worked at Telerad Manufacturing, a division of the Lionel Corporation (toy trains), where I developed and oversaw the manufacturing of, among other products, the command receiver for the Atlas missile.

Petrovend Corporation asked me to develop possibly the worlds first dollar bill changer. They wanted to put the changer into all of their gas pumps. The unit worked great but soon credit cards made the scene. Petrovend dropped the project in favor of credit cards.

I returned to college to receive my degree in Business Administration.   Most likely with RCA's comment in mind along with being more mature, I totally surprised my wife and myself by spending all remaining semesters on the Deans List.  While at college I took up flying and on graduation looked for a job in the field of avionics. Narco Aviation Products hired me to work at their marine facility in Cockeysville, Maryland. The company, Enac Triton, was essentially a one man show. I eventually thought, if he can do it, so can I! That job lasted about three months.

One day, in 1964, I announced to my wife that I was starting my own company. Naturally, she went into a panic. Not knowing exactly how to start a company, I picked up the telephone book and called the maintenance department of the first industry listed... Armco Steel. They agreed to give me a try and handed me an inoperative Curtis Immerscope. An Immerscope is a device that ultrasonically looks through a steel ingot to find flaws or air bubbles. I took it home in my 57 Chevy, cleaned it up and replaced all high voltage wiring. The maintenance manager was ecstatic and told me to "sit" while he called his equivalent in other companies to tell them he had finally found the man they had been looking for. Within weeks I had over fifty industrial customers within easy driving distance. Initially, I was uncertain about how much to charge my customers. One day at 2:00 AM I received an emergency call from Armco. Their vacuum degassing furnace had been damaged by some molten steel in the wrong place. This furnace was thirty feet in diameter and forty feet deep. Its load cell system (scale) was accurate to within less than one pound at 100,000 pounds! I climbed down inside the furnace and found the burned wiring. A few quick repairs had it up and running in no time. I billed them $200.00. A few days later the maintenance manager called and asked me to stop by... I did. He told me that Armco would have lost roughly $2,000,000.00 (1965 $s) if the steel awaiting the degassing furnace had hardened were it not for my timely and prompt repairs. He handed the invoice back to me and told me to add another zero! I WAS ON MY WAY!!! Obviously, I was wrong in charging only an hourly rate for my time when I should be charging for the value of the service from the customers prospective.

My customers included steel mills, copper refineries, bottling companies, plastic companies, ice cream cone manufacturers, plastic and paper cup manufacturers, canning companies, veneer manufacturers, breweries and nearly 100 more. My 57 Chevy was a blue streak Earl Scheib Special (that was a "paint your whole car including the tires for $19.95" company... just kidding about the tires)! When called by my first brewery I learned very quickly that the "new" beer comes down the pipes very early in the morning and it is was mandatory for all employees, including me, to drink as much beer as possible while the machinery cooled down. I was on a first name basis with many famous cockroaches. In a brewery it impossible to get rid of those little critters even with soapy superheated steam. It was after one of those brewery trips that I got lost in downtown Baltimore (I can't imagine why!). I passed a gate that said "U S Army Intelligence, Fort Holabird." Hey, perhaps they too had something to fix. I drove around the property until I found a door that said "Supplies." A simple knock on that door put me into the "intelligence business." After repairing shelf upon shelf of equipment and noticing the allocation tag on each showing the value (price), I approached the powers to be and asked if they would consider my manufacturing for them exactly what they wanted... and at a greatly reduced price. My offer was immediately accepted and I was now in the intelligence equipment manufacturing business starting with the UAA-1 and 1059.

Miniature transmitters (eavesdropping/bugging devices) intrigued me and I manufactured a wide variety of them. It didn't take long after I got into the bug building business for me to see the potential danger of those little devices so I decided I'd better get busy and start manufacturing bug detectors or countermeasure equipment to find them. Marketing my products was a snap since I could walk into virtually every intelligence agency in the Baltimore/Washington/Virginia area. I also began teaching courses on bugging and bug detection at Fort Holabird and that gave me access to other good marketplaces.

By the mid-70's I had close to 200 customers (I know this because I put a list of them together for my trial). They included corporations large and small and foreign, federal, state and local governments. I did many high level sweeps that got lots of good press.

Once firmly established in the intelligence equipment manufacturing business several magazine, news magazine and newspaper articles appeared about my company. It was a VERY satisfying time but it invited many people who were mildly crazy and some who were totally insane. For those I contacted their spouses or relatives suggesting they be hospitalized... and many were. One character turned out to be a professional litigant who was seeking affidavits to incriminate the Baltimore City Police Department. He left by air route. I later learned that the City of Baltimore settled out of court with him for $33,000.00.

One sad fellow was convinced the Martians were following him. I built a Martian Ray Detector for him hoping that might ease his paranoia. He returned to my shop several times... each in a more depressed state. Finally, in desperation, he used a pair of ordinary gas pliers to pull out one of his molars thinking that was the homing device the Martians were using. He wrapped it in aluminum foil so the Martians couldn't track it and brought it to my shop. Out of curiosity I had my dentist X-ray the tooth and that revealed only a pin (antenna?). His wife joined him on his next visit and she and I decided on the obvious next step... the hospital.

In the early 70's a disheveled man wearing mismatched jacket and pant and tennis shoes showed up at my door. Thinking he was just another unbalanced person I told him I had some sensitive material on my desk and asked if he would return in an hour. I used that time trying to figure out what to do with him. It was Edwin Duncan (now deceased) owner and President/Chairman of Northwestern Bank head quartered in North Wilkesboro, North Carolina. He told me he was having security problems at his bank and was afraid the IRS was bugging him. I agreed to train his security office, Jerry Starr (also now deceased), who in turn purchased a quantity of countermeasure equipment. Jerry eventually called me from the bank's home base in North Wilkesboro and asked if I would come to the bank and go through a sweep with him. He instructed me to go to the Baltimore/Washington International (BWI) airport and a company plane would pick me up and take me to North Carolina. I was impressed. Sure enough a twin engine turboprop showed up and ferried me to North Carolina.

On landing at their home airport in North Wilkesboro I noticed the pilot push a button on the instrument panel and the doors of the very LARGE hanger ahead slid open. Inside the hanger were at least six, and probably more, beautiful white airplanes each with the Northwestern Bank logo on the tail. They ranged in size from a four engine Fairchild turboprop down to a classic Twin Beech. I was very, very impressed but wondered... what is a small North Carolina country bank doing with all these airplanes? Jerry later revealed that one of them had been set aside for North Carolina Senator Sam Irvin of Watergate fame. We performed an extensive sweep of all buildings and did indeed locate a device in the locked office of the Comptroller. I left finding the actual device to Jerry and returned to Baltimore in the same airplane.

As years went by I learned a great deal about Duncan. He turned out to be a super patriot and used the banks enormous resources to fund various special operations conducted in foreign country's (most likely that is why he kept the IRS at bay). For example, in 1972, while visiting a friend with the Dade County (Miami) Bomb Squad I passed through the airport concourse and noticed a banner saying "Fly to the Cayman Islands... $62.00 round trip." Noting that I could get there and back in one day, I grabbed a flight. On landing in Cayman I knew that this is where I wanted to be. On my return trip I began scuba diving with XX. In time, I switched to a new company run by one of his dive masters. Several years later I again switched to a new dive operation that had a dive boat more to my liking. The dive master and I became very close friends. The 'Cork' One day we got into a conversation about my work and he revealed that when he was a youngster he and several of his friends were snorkeling in a small lake located on the inland side of the main road across from where Laguna del Mar Condominiums now stands and they stumbled upon a huge underwater cache of weapons. He, and each of his friends, put a machine gun on each shoulder and marched into town. Word of the incident swiftly reached Jim Bodden, the father of the Cayman Islands, and he knew exactly who to contact to solve the problem, Duncan. Duncan grabbed plans for one of his existing banks, filled in the lake with marle (crushed limestone) and stuck one of his banks on it. SOME CORK! The bank was put up with such speed there was no time to change the design and it wound up with the drive-in-window on the wrong side (they drive on the left in Cayman).

Feeling particularly spry one day I called FBI Director J. Edgar Hoover and told him I manufactured products that might be of interest to him. He promptly invited me to visit him at headquarters. Walking into his office I immediately noticed that his desk was on a four inch pedestal and the legs on the sofa had been sawed off. I sat on the arm of the sofa and looked at him eye to eye. I think he liked that. He passed me on to their intelligence support office where I met XX. XX took me to the U.S. Recording Company and explained how to do business with the FBI through that company. Business went along fine until the Omnibus Crime Bill (Title III) was passed in 1968. Upon reading it, I immediately saw that I could not deal with apparent commercial concerns such as U.S. Recording. The FBI gave me a rubber stamp that essentially said "This order complies with the provisions of the Omnibus Crime Bill." Seeing real problems with that arrangement, any equipment ordered through U.S. Recording was delivered DIRECTLY to the FBI with the invoice going to U.S. Recording. During one of my many visits to the FBI technical section I noticed one of my invoices sitting on XX's desk and it was marked up a substantial percentage. I thought that was strange but paid no further attention to it.

In 1972 a company called Audio Intelligence Deices (AID) made its appearance. Their catalog claimed they could make "off the shelf" delivery... an apparent violation of Title III (Omnibus Crime Bill... it is illegal to manufacture, assemble, possess or offer for sale any device primarily designed for surreptitious interception of oral communications UNLESS you are under contract with a federal, state or local government). I had been warned on numerous occasions that I could not manufacture any device unless I had the contract in hand first so immediately brought this apparent conflict to the attention of the U.S. Attorney General.

Built into the Omnibus Crime Bill (Title III) was an automatic five year review period. In early 1975 I was contacted by investigators XX and XX of the U.S. House Select Committee on Intelligence. They asked that I prepare a statement detailing my observations of the effectiveness of the Omnibus Crime Bill. During our conversation I mentioned how I was dealing with the FBI through U.S. Recording, the rubber stamp and the incident about the marked up invoice. I prepared a statement primarily asking why AID was permitted to inventory and market "off the shelf" equipment while I could not. After my statement was prepared I contacted the CIA and FBI to see if there were any problems with my appearing before the Committee. The CIA asked for a days delay (a huge snowstorm saw to that) and then gave me the O.K. The statement was turned over to the investigators and a day was set for my appearance before the Committee.

Upon taking a seat to read my prepared statement, to my astonishment, it had been completely rewritten! The new statement attacked the FBI and made no mention whatsoever of AID. I immediately told XX that I was NOT going to read that statement. He instructed me to go to an ante room and repair it where ever I felt it was needed. Not anticipating this level of deception I had not brought a copy of my original statement. If I had, I most certainly would have read that instead. Given little time to repair a non-repairable statement, I did the best I could. When I read the revised statement all of the Congressmen looked at each other, me and the paper in front of them, wondering what was happening. To this day I do not know which of the three statements was read into the Congressional Record and... quite frankly, I don't give a damn.

On returning to my office I telephoned FBI Director Kelly and requested a meeting with him. Two other high level FBI officials were present. I later read the internal FBI communications about that meeting. One of the men wanted to seriously deal with the U.S. Recording problem while the other wanted to execute me on the spot!

Shortly afterwards two FBI agents showed up at my plant and tried to get me to withdraw my testimony. Every half hour one agent would leave the room to go to the "bathroom" i.e. change the tape in his recorder. He didn't even have the common sense to flush the toilet, that was on the other side of the wall from my office, to cover his activities. They tried to force me to sign their statement. I initially refused but later agreed to sign it with the statement "I have partially prepared the above statement." That got them out the door.

Shortly after that incident a "private detective" called and asked if I would show him how to three wire a telephone. We met in a conference room at a local motel in Towson. He handed me a screwdriver and I handed it right back to him and told him if he wanted to learn the process HE would have to do the work. About that time I noticed the toes of a pair of wing-tipped shoes at the bottom of the curtain that separated the room. Finally that person entered the room and, along with the other, tried to force me to make the modifications. I declined and departed. What a bunch of nonsense.

In a few weeks just about every common criminal in the Baltimore area began showing up at my plant. None got in the door. The FBI must have covertly informed these scum bags they were being wiretapped by the FBI and Kaiser could fix their problems. This type of nonsense went on for years.

In the midst of all the various intelligence agencies efforts to do me in, I received a warning from a credible agency friend that the Government was going to charge me with an unspecified crime.  That warning resulted in this letter to Attorney General Levi. 

MARTIN L. KAISER, INC.
Countersurveillance . Bomb Detection . Surveillance Electronics

March 23, 1976


Hon. Edward Levi
Attorney General of the United States
Department of Justice
Washington, D. C.

Dear Mr. Attorney General:

It is with great hesitation that I write to you, however, I believe that I am in serious trouble and that you are the only person who will be able to assist me.

For over ten years, Martin L. Kaiser, Inc. has been a major supplier of electronic countermeasure, surveillance and clandestine bomb detection equipment to law enforcement agencies from the federal level downward. Among my customers, and these but a few, were the CIA, Department of Defense, FBI, State Department, Army, Navy and Air Force Intelligence, Coast Guard, etc. In June, 1975, the National Wiretap Commission, operating under a Congressional mandate, received my business records under threat of subpoena. These records were subsequently brought to the attention of the House Select Committee on Intelligence by the National Wiretap Commission. As a result, it became publicly known that the FBI purchased its electronic countermeasure and surveillance equipment through a front known as the U. S. Recording Company. This disclosure has been of extreme embarrassment to the FBI, but I can assure you it is not an embarrassment of my making. I am sure you are well aware of the media's treatment of subsequent events.

Since this fact became known, my business has fallen to virtually zero. No federal agency or, for that matter, local agency will even discuss purchases of equipment with me. I can only assume, but cannot conclusively prove, that the FBI has "passed the word."It is not however, this event and the subsequent economic loss which are of primary concern, for I do engage in other business activities which will carry me through this trying time. Recently, a person of known reliability has pointedly warned me that I am to be made a test case under the criminal wiretap provisions of the 1968 Omnibus Crime Act. Being thoroughly familiar with the complicated and often conflicting provisions of that Act, I am fully aware of the danger existing to anyone who has committed themselves to the manufacture of electronic surveillance equipment.

I have never knowingly violated and have always strictly insisted on compliance with the provisions of the Omnibus Bill. I am firmly convinced that I am not presently violating the Bill, either. However, because of its complexity, my vulnerability, the FBI's pique, the new media's pressure, and the warning relayed to me, quite frankly, I am indeed worried. Although I know full well, based on previous attempts to receive clarification of the Bill, it is not the normal business of the Justice Department to give a "clean bill of health" to a citizen, I indeed wonder if there would be some way for you to advise me whether, under the wildest stretch of imagination, I am contravening any provision of the Omnibus Bill. Although I am reconciled to being driven out of this business, I desperately hope that I will not have to go through a trial in the process.

As mentioned previously, I also manufacture clandestine bomb detection equipment, again, having done this for federal and local agencies. Through a rather lengthy chain of events, the FBI now heads the National Bomb Program. Attempts to contact the FBI immediately after the LaGuardia explosion (which occurred well after my Congressional testimony) resulted in the most callous response I have ever received to one of my offers of assistance. The implications are hideous and further support my desire to resolve the issues as promptly as possible.

As a citizen who has consistently demonstrated his support of the law enforcement community and, therefore, his country, I need your help. Any assistance will be sincerely appreciated.

Respectfully,


Martin L. Kaiser
President

MLK:nre

Basically, Levi responded by saying... You do what you think is correct... and if you're wrong, we'll arrest you. Not very comforting.

Within months of my testimony before the House Select Committee on Intelligence my business of manufacturing eavesdropping and countermeasure equipment fell to ZERO! Fortunately, I had the ability to shift into the manufacture of bomb detection and disposal equipment, a marketplace the intelligence community couldn't and wouldn't dare try to control. Heh, heh... was I wrong... again!



Even though it is slightly out of place time wise, I'm putting the Lou Panos Evening Sun article next. Events from roughly 1975 onward attach to the FBI criminal case and I'll pick up there.

The Evening Sun
Baltimore, MD
Monday, October 25, 1976

Witness's Business Suddenly Drops

When the House Select Committee on Intelligence invited Marty L. Kaiser to testify at its hearings on illegal wiretapping by government agencies, he did the statesmen a favor and accepted the invitation.

Now they can return it by helping him answer a question: Why is it that he averaged about $200,000 annual in business from these agencies before he testified just one year ago and has averaged zilch since then?

That's what has happened to Martin Kaiser since he went to Washington last October and startled the intelligence community. He offered evidence that prices for equipment he had sold to an FBI front had apparently been marked up by about 30 per cent before delivery from the front to the FBI.

Word later came that Edward H. Levi, Attorney General, ordered an investigation of links between several top echelon FBI officials and the head of the firm serving as the original recipient of the equipment.

Citizen Kaiser is the slightly stout little fellow from Timonium who has been called "the Michelangelo of electronics" because of his uncanny talent for making things out of juiced up wires and finding such things made by others to bug their fellow man. There was a time when his marvelous little devices - all assembled by his nimble brain and nimble fingers in a small block building next to Brooks Robinson's sporting goods shop - were the rage of the FBI, Secret Service, armed forces and private customers in the world of the super-duper snoop and counter-snoop. His developments in electronic eavesdropping for law enforcement and government intelligence had made him one of the most widely publicized and sought after specialists in the field.

His equipment and techniques led to the discovery that bugs had been placed on telephones in the offices of Governor Mandel, at least four other governors, and Milton A. Allen, the Supreme Bench judge who was then state's attorney for Baltimore.

The big, red car in his driveway is known as his "President Sadat Cadillac" because he bought it after a lucrative service performed for the Egyptian chief, training his aides in electronic counterintelligence.

Such foreign work and private assignments like countering industrial espionage, says Marty Kaiser, have enabled his company to survive the withdrawal of government business.

"I'm still busy, but most of my business comes from other sources," he says. "I've tried to find out why I was dropped so suddenly. After all, I didn't ask to talk to the committee. They invited me and made it clear that I'd be subpoenaed if I didn't accept the invitation.

"I even went over and talked to (FBI Director) Clarence Kelley about it for an hour. I was only doing my duty, which is something the FBI certainly ought to understand, and he certainly seemed to understand.

At one point Citizen Kaiser brought suit against officials of several intelligent and military agencies under the Freedom of information Act in an attempt to get an official reason for his freeze-out.

"About the only thing I got out of that was word from the Army that they have no file on me. I told that they must have, became I was in the Army once. I even gave- them my Trial number, but they said my file must have burned up in a fire at the records center.

For Martin Kaiser, who is more at home in the microcosmic world of transistors and printed circuits than the mystical world of Washington politics, there is something familiar about it all.

Shortly before establishing his Timonium business 12 years ago, he helped develop a missile detection system heralded in 1964 by President Johnson using the bending beam principle in a device "seeing" beyond the horizon.

At the time, he says, he was making about $6,300 a year for Radio Corporation of America after starting at $3,900 about six years earlier. For his sterling work, he was rewarded with an assignment as manager of the anti-missile project when it was moved from Burlington, Mass., to Barbados, West Indies. But one day, be recalls, an Air Force officer asked him to compare RCA's efforts with Raytheon in similar work. "After evaluating their work against RCA, I really felt they were doing a better job, really outstanding. I said so, and the and the next thing we knew was that Raytheon had the project.

"I wasn't fired, because that wasn't the way they operate instead, they offered me a promotion - in Australia. "I said it was okay if they'd pay to move my wife and kids, too, but they said no, I'd have to pay. I calculated the costs and they came to roughly $14,000. So I didn't take the promotion."

There is something faintly similar between the Australia to which Martin Kaiser was to be assigned in 1964 for his compulsive candor with an Air Force officer and the Siberia of the intelligence world to which he has been relegated for speaking out before the House Select Committee on Intelligence in 1975.

For a man whose equipment may form the heart of the nation's defense and counterintelligence system, he seems to be getting short shrift.

The least the committee owes him in return for his service is a little help in determining why.

Obviously, I did NOT have a huge intelligence organization at my disposal so I did the best I could to uncover those who were liabling and slandering me.  I filed numerous suits under the Freedom of Information Act but, unfortunately, that was a total waste of time and money.  Here is a good example.  Note the date of my request and note the date of the response.

Central Intelligence Agency


Washington, D.C. 20505
14 March 1984

Mr. Martin Luther Kaiser III
115 Bosley Avenue
Cockeysville, MD 21030

Dear Mr. Kaiser:

This is in response to your attorney's letter, dated 29 September 1976, in which he appealed on your behalf the decision of this Agency, dated 8 July 1976, regarding your request for all Agency records which may exist concerning you.  While two documents have been released to you, we have informed you that we would not grant further access to any documents, if additional documents did exist, that might be responsive to your request.

Your appeal has been presented to the Central Intelligence Agency Information Review Committee. Pursuant to the authority under paragraph 1900.51(a) of Chapter XIX, Title 32 of the code of Federal Regulations, I, as Deputy Director for Administration have determined that the fact of the existence or nonexistence of any documents which would reveal a confidential or covert connection with or interest in matters relating to those set forth in your request is classified pursuant to the appropriate Executive order.  Further, I have determined that the fact of the existence or nonexistence of such documents would relate directly to information concerning sources and methods which the Director of Central Intelligence has the responsibility to protect from unauthorized disclosure in accordance with subsection 102 (d) (3) of the National Security Act of 1947 and section 6 of the CIA Act of 1949. Accordingly, pursuant to Freedom of Information Act (FOIA) exemptions (b) (1) and (b) {3) respectively, and Privacy Act (PA) exemptions (j) (1) and (k) (1), your appeal is denied to the extent that it concerns any such documents. By this statement we are neither confirming nor denying that such documents exist.

Material withheld under FOIA exemption (b) (1) encompasses matters which are specifically authorized under criteria established by the appropriate Executive order to be kept secret in the interest of national defense or foreign policy and which are in fact currently and properly classified. Exemption (b) (3) pertains to information exempt from disclosure by statute. The relevant statutes are subsection 102 (d) (3) of the National Security Act of 1947, as amended, 50 U.S.C. 403 (d) (3) which makes the Director of Central Intelligence responsible for protecting intelligence sources and methods from unauthorized disclosure, and section 6 of the Central Intelligence Agency Act of 1949, as amended, 50 U.S.C. 403g, which exempts from the disclosure requirement information pertaining to the organization, functions, names, official titles, salaries or numbers of personnel employed by the Agency.

Material withheld on the basis of PA exemption (j) (1) concerns intelligence sources and methods encompassed by those portions of systems of records which the Director of Central Intelligence has determined to be exempt from access by individuals pursuant to the authority granted by this sub- section and regulations promulgated thereunder (32 C.F.R. 1901.61). Information withheld on the basis of exemption (k) (1) in this instance encompasses those portions of all systems of records which the Director of Central Intelligence has determined to be exempt from access by individuals pursuant to the authority granted by this subsection and regulations promulgated thereunder (32 C.F.R. 1901.71) because the material is properly classified under the terms of the appropriate Executive order and subject to the provisions of Section 552(b) (1) of the Freedom of Information Act, as amended.

In accordance with the provisions of the Freedom of Information Act and the privacy Act you have the right to seek judicial review of the above determinations in a united States district court.

We regret that our response to your letter of appeal has been so long delayed and that we can not be of further assistance to you in this matter.

Sincerely,

[Signature]

Harry E. Fitzwater
Chairman
Information Review Committee

My success was, as you can see, limited and it wasn't until after my criminal trial that I uncovered one of the documents that provided the driving source for the incessant anger against me. As a Christian I found it difficult to believe that some individuals would continue a vendetta for such a long period of time... yet, it was true. Here is Attorney General Levi's report on the U.S. Recording scandal that Mr. Panos and I are referring to. Read it and weep.

STATEMENT BY ATTORNEY GENERAL GRIFFIN B. BELL
ON THE RELEASE OF THE U.S. RECORDING REPORT

I am today releasing a report on an investigation of allegations that certain individuals misused their official positions while employed by the Federal Bureau of Investigation. After careful consideration, I decided to issue a full public report.

When reporting on disciplinary actions taken against government employees, federal agencies have traditionally made public the administrative action taken and the nature of the conduct which caused the action to be taken, but have not always identified the particular individuals involved.

There are, however, certain instances of employee misconduct which call into question the integrity of the institution itself. If the agency's mission is particularly sensitive, the misconduct serious, or the officials of high rank, then the public interest is best served by more extensive disclosure.

It is this kind of wrongdoing which is described in the report I am releasing.

In cases such as this one, personal privacy considerations must give way to the legitimate interest of the American public in knowing how its government operates and how high-ranking officials have abused their official positions and neglected their official responsibilities.

High-ranking officials entrusted with public office simply cannot expect the same measure of privacy about the way they perform their official duties or use their offices as they could expect if they were private citizens. Moreover, the public has a legitimate interest in knowing and being able to evaluate how the heads of Executive agencies deal with official misconduct and take corrective action to ensure that similar, abuses of power and position do not recur. In this particular instance, it is my judgment that the public is entitled to know which officials engaged in the misconduct and which officials did not.

The misconduct summarized here, and reports in the news media about these allegations, have cast a shadow over a great institution and over those of its officials who engaged in no wrongdoing whatsoever. I am vitally interested in restoring public confidence in the Federal Bureau of Investigation. This report will confirm that very few individuals engaged in improper conduct. We should bear in mind that this small number of individuals in no way represents the thousands of FBI employees who are dedicated, honest public servants and whose personal and professional integrity is beyond reproach.

Today I asked Director Kelley to issue a bulletin to all Bureau officials in which it will be made clear that neither the Department of Justice nor the FBI as institutions, nor I, as Attorney General, will tolerate the kind of misuse of office or abuse of authority described in this report. I am pleased to note that Director Kelley has made the following structural reforms to prevent the recurrence of the kind of improper practices described in this report:

1. Reorganized the Inspection Division and renamed it the Planning and Inspection Division;' created the Office of Professional Responsibility, an Office of Inspections, and an Office of Planning and Evaluation; established within the Office of Inspections a separate Audit Unit, responsible for auditing all FBI funds and financial transactions; and organized the Division so that it reports directly to him, as Director.

2. Removed the Property Procurement and Management Section from the Division with budget responsibility, the Finance and Personnel Division, thereby making one Division head responsible for procurement and another responsible for the FBI budget and funds. Director Kelley has placed a Special Agent Accountant, a Certified Public Accountant, as Section Chief of the Property Procurement and Management Section.

3. Discontinued the use of the U. S. Recording Company as a "cover" or "cut-out" for confidential purposes and established controls to ensure that all purchases are made in accordance with government regulations.

4. Restructured the FBI inventory system, to provide built-in controls and audit trails, and initiated automation of the inventory system to provide better accountability.

5. Discontinued the FBI Laboratory and Exhibits Sections' practice of providing personal services to FBI officials. Director Kelley also has discontinued the use of the unauthorized cash fund once maintained in the Exhibits Section.

6. Reorganized the management and handling of the FBI Recreation Association (FBIRA) and its funds, so that FBIRA officers are aware of their responsibilities to prevent unauthorized expenditures. A new Treasurer of the FBIRA has taken office and is not responsible for any other FBI fund.

7. Replaced the FBI Confidential Fund with the Field Support Account, an imprest fund approved by the Treasury Department.

8. Developed and improved the FBI career development program for Special Agents to ensure that the best qualified individuals are selected for administrative advancement, substantially reducing the possibility that one person or group can control the selection of such candidates. In addition, Director Kelley assures me that the FBI has taken other steps to prevent the kind of misconduct described here. The Bureau has increased legal instruction within its training curriculum; held training sessions on the FBI guidelines for career agents; and issued detailed instructions to the field on legal questions concerning the legality and propriety of investigative techniques. In connection with the latter step, the FBI is seeking advice from the Department's Office of Legal Counsel with increasing frequency.

I have asked Director Kelley to bring to my attention any improper attempts to have FBI agents conduct investigations or undertake activities which are not within the Bureau's authorized jurisdiction. I have directed all Bureau personnel to bring reports of misconduct to the attention of appropriate Bureau officials and, when necessary, the Office of Professional Responsibility at the Bureau and Office of Professional Responsibility here at the Justice Department.

Recognizing the concern of Bureau personnel about threatened civil litigation., we have submitted legislation to the Congress which would protect FBI personnel against civil suits by substituting the government as defendant. I believe this approach will protect the rights of citizens without unfairly penalizing individual agents.

The release of this summary report is intended to assure the nation that the Justice Department can investigate and police itself. It will also put all officials of this Department on notice that they will be held accountable to the American people for the manner in which they discharge their official responsibilities while employed as servants of the American people.

# # #

THE DEPARTMENT OF JUSTICE REPORT
ON THE RELATIONSHIP BETWEEN
UNITED STATES RECORDING COMPANY
AND THE
FEDERAL BUREAU OF INVESTIGATION
AND
CERTAIN OTHER MATTERS
PERTAINING TO THE F.B.I.

JANUARY, 1978


THE DEPARTMENT OF JUSTICE REPORT
ON THE RELATIONSHIP
BETWEEN
UNITED STATES RECORDING COMPANY
AND THE
FEDERAL BUREAU OF INVESTIGATION,
AND
CERTAIN OTHER MATTERS
PERTAINING TO THE F.B.I.

This is a report on a Department of Justice investigation of alleged misconduct by certain past and present officials of the Federal Bureau of Investigation.

In the Fall of 1975, the House Select Committee on Intelligence provided the Department with information that certain officials of the F.B.I. were allegedly profiting from the Bureau's business transactions with its exclusive electronics equipment supplier, the United States Recording Company of Washington, D.C. On November 3, 1975, Attorney General Edward H. Levi requested F.B.I. Director Clarence M. Kelley to investigate these allegations. Director Kelley appointed an Ad Hoc Committee to oversee an inquiry by the F.B.I.'s Inspection Division, the Bureau unit ordinarily responsible for internal investigations. Attorney General Levi found the report of the Inspection Division and the Ad Hoc Committee to be incomplete and unsatisfactory. On January 2, 1976, he directed the office of Professional Responsibility and the Criminal Division to review the Inspection Division Report and conduct an independent investigation. The Deputy Attorney General requested two Criminal Division attorneys to work with the office of Professional Responsibility in supervising a special team of F.B.I. investigators, who were carefully selected from Bureau field offices for their ability and experience. I.R.S. agents were also selected to investigate the tax implications of the allegations.

Hundreds of past and present F.B.I. officials were interviewed. Agent-accountants examined vast quantities of documents and records to determine the nature of the F.B.I. U.S.R.C. relationship and the FBI's procedures for purchasing electronic equipment. As the investigation proceeded and possible criminal violations emerged, a Federal Grand Jury in the District of Columbia, raided by the Criminal Division attorneys, began to review the findings of the Department's investigators.

The investigation was completed on November 11, 1976. The findings went beyond the original allegations into other areas of misconduct uncovered by the investigation. The Criminal Division investigative report examined the use of Government material and personnel services by F.B.I. officials for their personal benefit; the administrative mishandling and misapplication of appropriated funds; the misuse of funds of the FBI Recreation Association -- a private association of FBI employees; and improprieties in the FBI's dealings with contractors other than USRC.

PART 1

A. The Relationship Between the United States
Recording Company and the
Federal Bureau of Investigation


Joseph Tait has been owner and manager of the United States Recording Company (USRC) since 1938. Incorporated in 1969 in the District of Columbia, USRC sells and distributes electronic equipment, principally to the Federal Government. Mr. Tait started doing business with the Government in 1943, when Army Intelligence asked the Bureau's Laboratory Division, then interested in purchasing two Army microphones, to use USRC as a middleman. in the late 1940's, USRC contracted with the Bureau to service amplifiers, recorders and other technical equipment used by the Laboratory Division. From 1963 to 1975, USRC was virtually the sole supplier of electronic equipment to the FBI, and bureau purchase orders were frequently directed to USRC without open bidding as required by Government procurement statutes and regulations. _1/

FBI officials justified the exclusive relationship under a specific exemption for purchases that require confidentiality for security reasons. _2/  The following facts do not support this explanation, however. For instance, from 1971 to 1975, the Bureau made $500,000 worth of exclusive purchases from USRC which were not marked as confidential. Much of the equipment, including transmitters, receivers, and microphones, clearly fell into the "sensitive" category, but it was not clear why other "nonsensitive" equipment was purchased exclusively from USRC. Also, the Bureau took few precautions to insure the security and confidentiality of the FBI-USRC relationship. A number of electronic equipment manufacturers and suppliers were aware that the FBI used USRC as a middleman. The Bureau often purchased equipment directly from the manufacturer, but always paid its bills through USRC. USRC employees did not receive security clearances. The firm was broken into on at least two occasions. USRC made equipment deliveries to the FBI during working hours in a panel truck plainly marked "U.S. Recording Company."

Moreover, the FBI failed to follow proper procedures for such "confidential" purchases. Section 252(c)(12) of Title 41 of the United States Code requires an agency head to make a determination that the purchase of certain equipment should not be publicly disclosed before public advertising and open bidding regulations can be suspended. ado evidence was found that either the Attorney General or the FBI Director ever made such a formal determination. The procurement regulations were also evaded, and the scrutiny of the Department of Justice avoided, by the "splitting" of orders to USRC so that no single order exceeded $2,500, the limit above which all purchase orders had to be advertised for open bid. _3/

From 1961 to 1973, the Bureau purchased large quantities of tape recorders, playback units, closed circuit television systems, video tape machines, laboratory test equipment and FM radio equipment under confidential contract with USRC to the virtual exclusion of all other contractors. The costs to the Government of this special relationship were considerable. From Fiscal Year 1971 through 1975, 60 percent of USRC's total sales were made to the Bureau. Department investigators examined 1,339 USRC sales invoices, compared the cost of each item, where available, to USRC to the price USRC charged the Bureau, and found an average markup of 23.8 percent from Fiscal Year 1969 through 1975. Individual markups varied widely and were as high as 40 to 70 percent. In addition to high markups, by using USRC as a middleman, the Bureau was not able to purchase equipment at discount prices offered by manufacturers for direct sales on large orders. For example, in 1971 the Bureau paid USRC $147,261.50 for burglar alarm equipment which could have been purchased from a New York supplier for $81,357.00.

USRC asserted that its overhead costs amounted to 15 to 16 percent over the price it paid to the manufacturer. Department investigators found no objective evidence supporting a figure this high.

These findings essentially confirmed allegations made by a Special Agent of the FBI's Radio Engineering Section in 1973. He reported that the FBI paid too much for USRC equipment, that USRC markups were too high, that FBI employees were forced to buy inexpensive items from USRC when they were available elsewhere, and that the FBI-USRC relationship was not confidential. An Inspection Division inquiry was made into those allegations, but this investigation found that during that inquiry key witnesses were not interviewed. One Bureau official, now retired, provided Inspection Division investigators with palpably inaccurate information. The committees which reviewed the inquiry recommended the continued use of USRC as a "cutout" (i.e. a middleman used to conceal the Bureau's identity from outsiders) for confidential procurement without any sound basis for the conclusion. The agent who made the complaint was denied promotion and then transferred to the Tampa Field office, where the Special Agent-in-Charge was told the agent was not a good "team" player and did not get along with other employees.

The officials chiefly responsible for the proper implementation of procurement requirements and procedures were John P. Mohr, Assistant to the Director for Administrative Affairs; Nicholas P. Callahan, Assistant Director, Administrative Division; and G. Speights McMichael, Chief Procurement Officer. The investigation clearly established that these officials knowingly failed to apply required procurement procedures to purchases from USRC. Two possible motives were found for their actions.

No evidence of cash kickbacks or bribes was discovered. Rather, a pattern of social contacts and minor gratuities was revealed between Mr. Tait and various FBI officials, including Messrs. Mohr, Callahan and Mc-Michael. In the 1960's, Mr. Tait and a number of high Bureau officials would get together at the Blue Ridge Rod and Gun Club (Blue Ridge Club)_4/ to play poker. The poker parties would begin on Friday evening and continue until Saturday noon. (Each participant paid the host, a Bureau official, for the cost of food and lodging.)

Mr. Tait also entertained FBI officials on occasion at the Bethesda Country Club, Billy Martin's Carriage House in Georgetown, and the Rotunda Restaurant on Capitol Hill. There was no evidence of excessive drinking, associating with the opposite sex, payoffs, big winners or losers. Nor was there evidence that official FBI files were destroyed, as alleged, at the Blue Ridge Club.

Mr. Tait often gave Laboratory Division employees small gifts at Christmas time, such as tie clasps, wallets, manicure sets, and desk calendars. In 1971, Mr. Tait gave one FBI employee a stereo playback unit for his car after he retired from the Bureau. A former USRC employee stated that in 1969 Mr. Tait purchased and paid for the installation of an eight track tape player with two speakers in John P. Mohr's Cadillac at a total cost of $172.12. There was no other evidence of any personal benefit to any other FBI official.

The investigation also disclosed another possible reason for the Bureau's special relationship with Mr. Tait and USRC. Over the years, Bureau officials came to trust. Tait's willingness to keep the FBI-USRC relationship confidential, and especially, to keep Congress in the dark about FBI eavesdropping practices. In a March 14, 1963, memorandum to Laboratory Assistant Director, Ivan W. Conrad, M. Mohr ordered that:

...no recorders are to be purchased by the Bureau outside of USRC. The reason for this is because Mr. Tait of the USRC will protect the Bureau in the event questions are asked by a Congressional committee concerning the purchase of recorders by the FBI. Other companies will not do this for the Bureau.

On May 22, 1964, after learning that Mr. Tait had been invited to testify before the Senate Subcommittee on Administrative Practice and Procedure, Mr. Mohr wrote in a memorandum:

...Mr. Tait told me he does not know at this point just what he is going to do with the letter but he does not intend to furnish the Subcommittee with any specific information. It should be noted that the Bureau purchases virtually all of its electronic eavesdropping devices from the U.S. Recording Company. Over the years bite. Tait has been an excellent friend of the Bureau and would go to any lengths to protect our interests from any sources. He is a personal friend of mine and he told me that he would most certainly furnish us with any response that he makes to the Subcommittee's letter before submitting it to the Subcommittee._5/

According to past and present employees of the Radio Engineering Section, Mr. Mohr's March 1963 order initiated the Bureau's exclusive relationship with USRC.

The Department concluded that FBI officials showed an improper favoritism to Mr. Tait and USRC in violation of specific conflict of interest regulations of the Department of Justice._6/ However, no evidence was found indicating a fraudulent intent sufficient to make out a crime under Federal bribery or fraud statutes.

B. Tax Investigation

Mr. Tait was tried and, on June 20, 1977, acquitted of all tax evasion charges under Title 26, United States Code, Section 7201, for the years 1971, 1972 and 1973.

The Department found no evidence that Mr. Mohr violated any federal tax laws.

C. Conversion of Electronic Equipment

Ivan W. Conrad, former Assistant Director of the FBI Laboratory Division, was found to have taken a large quantity of FBI electronic equipment to his home, principally, between 1964 and 1966. Conrad liked to tinker with electronic equipment and was a "ham" radio operator. The equipment included voltmeters, watt meters, battery testers, stereo amplifiers, consoles, speakers, microphones, cables, sidewinders, mixers, tape recorders, transformers, and other sorts of electronic gadgetry. This equipment was evidently delivered directly from USRC to Mr. Conrad's office at FBI headquarters and he took the equipment home. No record was made on FBI inventory files that Mr. Conrad had possession of the equipment.

In late December 1975, after being questioned by investigators from the 1975 Inspection Division inquiry about unaccounted for equipment and after denying knowledge of it, Mr. Conrad, with Mr. Tait's assistance, shipped twenty-nine packages of electronic recording "ham" radio equipment and a large recording console from his home to the USRC warehouse in Southeast Washington. This included the equipment about which he had been questioned. A USRC employee made the delivery in a USRC truck. As much as eighty percent of the equipment had never been used and was in excellent condition. This equipment was subsequently recovered for the Bureau by this investigation. Purchasing documents revealed an acquisition cost of over $20,000.

Mr. Conrad, who retired in July 1973, was interviewed four times during this investigation. He admitted that the equipment once belonged to the FBI. While head of the Laboratory Division, he ordered the equipment from USRC and then used it on "special projects" for Director Hoover, he said. He serviced the Director's television, hi-fi sets, shortwave radio, and designed a portable recording system for him. The console recorder was delivered directly to his home by Mr. Tait, and he took the other equipment home after USRC delivered it to the Bureau. He said that most of the equipment was obtained between 1964 and 1966.

Mr. Conrad asserted that he never intended to convert this equipment to his own use. After Director Hoover died in 1972, he wanted either to buy the equipment from USRC or return it to the company. He said he was "tardy" in not returning it to Mr. Tait until late December 1975. In August 1976, in response to inquiries from this investigation, he delivered another shipment of electronic equipment to the FBI. He had signed this out of FBI Laboratory stocks in the early 1960's. Auto radios, control cables, heads, speakers, antennas, assorted accessory equipment, a stereo receiver, tape recorders, microphones, and a sound recording set were included in this shipment. It is believed that all FBI equipment that was in Mr. Conrad's possession has now been recovered.

D.  Goods and Services of the FBI's Exhibits Section

The Department also investigated the allegation that FBI employees were required to provide goods and services to their superiors. The Exhibits Section of the FBI is staffed with accomplished craftsmen and artisans. Their official task is to design and construct exhibits for use in Department litigation and displays, furniture, and other exhibits for internal FBI use. The Radio Engineering Section is responsible for maintaining and servicing FBI electronic equipment. Interviews with past and present employees of those sections and an examination of photographs and personal logs maintained by some of them revealed that services were provided to FBI officials during official duty hours and that goods were produced for FBI officials with Government property and equipment._7/ This constituted a misuse of Government time and materials, contrary to federal law and regulations. 18 U.S.C. 641; 28 C.F.R.ß45.735-16. Prosecutions, where otherwise possible, are barred by the statute of limitations as virtually all of the following misconduct occurred more than five years ago. 18 U.S.C. 3282.

1. Director J. Edgar Hoover

Exhibits Section employees painted Director Hoover's house each year when he visited California during the summer. They built a front portico onto his house and dug a fish pond, equipping it with water pump and outdoor lights. They constructed shelves, telephone stands, and an oriental fruit bowl. Home appliances, air conditioners, stereo equipment, tape recorders, and television sets, and electric wiring were serviced and repaired by Radio Engineering. Section employees. Exhibits Section employees serviced his lawn mower and snow blower, maintained his yard, replaced sod twice a year, installed artificial turf, and planted and moved shrubbery. The Exhibits Section built a deck in the rear of his house, a redwood garden fence, a flagstone court and sidewalks. A power window with sliding glass doors was also designed and constructed. Clocks were reset, metal polished, wallpaper re touched, firewood provided, and furniture rearranged. Employees were on call night and day for this work.

Mr. Hoover employed one grade 15 Bureau accountant to give him tax advice, maintain his tax records, and prepare his annual Federal tax return. His secretary or two associates would generally make the work requests. Exhibits Section employees were called upon to build gifts for Director Hoover every year for Christmas, his service anniversary and other special occasions. These gifts included furniture such as tables, display cases, cabinets, a bar and valets. Assistant Directors chipped in to pay for cost of materials. Employee labor, however, was not compensated.

FBI employees called upon to perform these services did not think them proper, but felt compelled to follow orders for fear of losing their jobs, or of arbitrary transfers or promotion delays.

2.  John P. Mohr

Mr. Mohr had car radios repaired, the body of his son's MG repaired and re painted, and an elaborate dental exhibit constructed for his son, a dentist. At his home, Exhibits Section employees shaved doors to accommodate new carpeting, and Radio Engineering Section employees repaired his television numerous times, and installed phones, stereo hi-fi speakers (Mr. Mohr's property) and a burglar alarm system which required frequent servicing after installation (FBI property). They repaired his stereo and purchased and installed a new FM radio tuner in an existing cabinet which was modified by Exhibits Section employees. Mr. Mohr also received certain gifts made by the Exhibits Section, including a coat of arms, a dresser top valet, and an oak portable liquor cabinet in the shape of a wine case.

Exhibits Section employees painted a desk and made a drawing board for Mr. Mohr. They made, at his direction, a walnut cigar box, a walnut tape-cartridge rack, a walnut wine rack cabinet whose value has been estimated at $2,000, and two walnut gun cases with glass front doors.

Mr. Mohr had employees mount snow tires, wash, and transport his personal automobile to commercial garages for repairs. A battery was installed in his car and a turn signal lamp was replaced by Exhibits Section employees. Mr. Mohr also received tapes of record albums which were copied and distributed by Radio Engineering Section employees at the direction of former Assistant to the Director Cartha D. DeLoach.

Mr. Mohr received services even after he retired in June 1972. Radio Engineering Section employees were sent to his home, at his request, to repair electrical switches, televisions, and the burglar alarm system which had been . installed earlier. Mr. Mohr also asked a Radio Engineering Section employee to repair his electric blood pressure machine. At Mr. Mohr's request to former Exhibits Section Chief John P. Dunphy, the Exhibits Section built a birdhouse according to plans he provided.

3.  Nicholas P. Callahan

For Mr. Callahan, Exhibits Section employees silk screened a felt cloth used for table games, cut doors at his house to accommodate new carpeting, printed maps showing the location of his beach home and finished Styrofoam nautical objects to decorate it. They made walnut fishing rod racks for his beach home, assembled a lathe fence to prevent sand erosion at his beach home, and built a picket fence for his residence._8/ He had walnut shelves cut by section employees during official hours (he supplied the material), had a piece of plywood covered with weatherproof material for a shed roof, had Exhibits Section employees make a sign for his daughter and son-in-law with their name, and had former Exhibits Section Chief Leo J. Gauthier make a fuse box cover for the basement recreation room in his home. At his request, the exhibits section cast a desk memento in plastic for him to give to a friend and make him a set of stack tables which duplicated a set which had been made for Director Kelley (see below). Radio Engineering Section employees diagnosed troubles with his televisions and Exhibits Section employees framed his personal photographs.

Mr. Callahan also received various gifts. He received a framed plaque which recited an Irish prayer, a plaque bearing his coat of arms, a dresser top valet, a portable oak liquor cabinet in the shape of a wine cask, a decorative Christmas tree ball and a gold medallion and chain for Mrs. Callahan into which a gold-disc with the FBI seal was set by the Exhibits Section (Mr. Callahan bought the medallion and chain). The valet and liquor cabinet were duplicates of gifts given to Director Hoover, Mr. Mohr and Mr. Dunphy.

Mr. Callahan also received considerable services to his automobile. Employees test drove his personal car, did diagnostic work on it, took it out for washes, fill-ups, snow tire mounting, and servicing at garages and muffler shops. Scratches on his car were touched up. (Some employees, however, recalled that the whole trunk lid on Mr. Callahan's car was painted.)

Mr. Callahan states that Mr. McMichael provided him with a Polaroid camera which he used for personal photographs.Film for the camera was also provided at FBI expense. He has since returned the camera.____9/

4.  John P. Dunphy

On August 13, 1976, Mr. Dunphy pleaded guilty to a misdemeanor charge under Section 641, Title 18, United States Code, as part of an agreement with the United States as a result of which he voluntarily tendered his resignation from his position as Chief of the Exhibits Section and cooperated with this investigation.__10/

5. Director Clarence M. Kelley

on directions from Mr. Callahan shortly after Director Kelley and his wife moved to Washington, two sets of valances were made and installed in Director Kelley's apartment by the Exhibits Section and two television sets were purchased and installed by the Radio Engineering Section. After this investigation began, Director Kelley paid for the estimated cost of the valances. Director Kelley admitted he knew, after the job was done, that the Exhibits Section installed the first set of valances. when they proved unsatisfactory, he requested a second set to be built and installed. This set was also built and installed by Exhibits Section employees. The television sets were ordered returned by Director Kelley after this investigation revealed their source. Although Mr. Callahan said he directed that the televisions be loaned to Director Kelley, the sets were not entered on FBI equipment inventory until after their return from Director Kelley's apartment on February 19, 1976.

The Exhibits Section also built a walnut table, a set of stack tables, and a jewelry box which were given to Director Kelley as gifts from the Executive Conference. He was unaware that the Exhibits Section made the gifts, he said. The Conference, by donations from its members, paid for the materials used in these gifts.

Director Kelley's personal automobile received occasional servicing by FBI employees and his FBI-provided chauffeur performed personal errands for him. Section employees repaired a broken cabinet for Director Kelley, and mounted the FBI seal on a gold disc as a charm for the Director's wife.

6. Miscellaneous

The practice of providing FBI goods and services to high Bureau officials was not limited to the above individuals.

Clyde Tolson, long-time Associate Director under Hoover, had FBI employees develop several patented devices during official hours. These included a reusable bottle cap and a power window opener. These patents were assigned to the FBI. There was no evidence that Mr. Tolson personally benefited from the development of these devices. one of the power windows was installed for President Johnson in the White House. A second unit, designed and intended for President Johnson's ranch, was never completed.

E.  Imprest Fund

There was evidence that an FBI official received reimbursement from the FBI Imprest Fund (petty cash fund) for personal purchases.

G.  Speights McMichael, Chief Procurement officer, denied that Imprest Funds were used for the personal purchases of Bureau officials. He stated that he did not check to see whether the purchases were proper. Under Federal law he was required, as the Bureau's chief procurement officer, to certify that each disbursement was proper and correct. Each voucher reads, in part: "I certify that the disbursements claimed herein are correct and proper..." Many of the personal purchases could have been used by the Exhibits Section and, therefore, could have escaped Mr. McMichael's attention. He admitted being derelict in his responsibilities as the Imprest Fund's cashier, disbursing and certifying officer.

F.  Confidential Fund

Part of the FBI's annual appropriation is specified "not to exceed $70,000 to meet unforeseen emergencies of a confidential character to be expended under the direction of the Attorney General and to be accounted for solely on his certificate." The most common use is for payments to informants. Contrary to the appropriation language and to Federal regulations, this money was drawn from the Treasury by travel vouchers that failed to reflect the actual expenditures. Top FBI administrative officers were, therefore, able to maintain in cash form these monies over which they exercised custody and control. Field offices were given separate funds for payment of informants which were maintained in separate accounts in addition to the so-called "Confidential Fund" which was kept at headquarters. Also contrary to Federal regulations, the unspent portion of the yearly appropriation was accumulated. By 1974, the headquarters "Confidential Fund" totalled $34,000.

Nicholas P. Callahan controlled the Fund from 1946, when he was Number One man to the Assistant Director of the Administrative Division, until July 1973, when he became Associate Director. John P. Mohr, Clyde Tolson, and Director Hoover could also authorize disbursements. A 1974 inspection of the Fund concluded that "no written guidelines exist pertaining to the utilization of this fund" and that separate records for this fund were kept by FBI administrative units apart from the FBI's normal accounting system and were not subject to Treasury Department audit. This investigation revealed uses of the "Confidential Fund" maintained at headquarters by FBI administrative officers that were not within the scope of the appropriation. _l2/

This investigation revealed that between August 1956 and May 1973 the Bureau purchased over $75,000 worth of electronic equipment with money from the Confidential Fund. No memoranda, purchase orders, requisitions, vouchers or similar documentation were located indicating why the equipment was purchased or who requested it.

Mr. Callahan acknowledged that Mr. Mohr and he decided to use Confidential Fund monies to purchase electronic equipment. This was not done to disguise the nature of the equipment, he said, but to expedite large purchases of equipment.

The Confidential Fund was also used to pay for public relations expenses. Between 1961 and 1975, $23,399.15 of Confidential Funds were spent on room rentals, food, drink and gifts for the liaison officers of foreign and domestic law enforcement and intelligence gathering organizations. Mr. Callahan approved disbursements for liaison functions. There was also evidence that Mr. Mohr, and, to a far lesser extent, Assistant Director Eugene W. Walsh, and Deputy Associate Director Thomas J. Jenkins also authorized such disbursements. Director Kelley recalled such an authorization by himself on one occasion.

One of these officials stated that any expenditure which in any way aids "the detection and prosecution of crimes against the United States," including liaison functions, is justified under the FBI's total appropriation and that the Confidential Fund was used only to expedite reimbursement. He admitted, however, that the Confidential Fund had been obtained on the representation to Treasury that they would be used for "unforeseen emergencies of a confidential character." Congress had not been informed that the Bureau was incurring public relations and liaison expenses and paying them out of the Confidential Fund. The Bureau had never submitted a formal request to Congress or the Office of Management and Budget for the proper budget authority to make these Confidential Fund expenditures. Title 31, United States Code, Section 551, which prohibits the use of appropriated funds for lodging, feeding, or providing transportation to an assemblage, can be interpreted specifically to prohibit the use of the Confidential Fund for public relations and liaison purposes.

This investigation also revealed that FBI officials used the Confidential Fund to cash personal checks. This practice was stopped after Mr. Welsh was questioned about the practice on May 21, 1976.

No evidence was found indicating that any senior official applied these appropriated funds to his own use.

G.  The FBI Recreation Association

The FBI Recreation Association (FBIRA) was founded in 1931 for the purpose of promoting and encouraging athletic, social and welfare activities among its members. The FBIRA is an independent and tax exempt organization whose membership is voluntary. The Association's funds were spent on athletic and social functions, group travel, clubs, hobbies, art shows, and publication of The Investigator, a monthly magazine reporting on FBIRA activities. Its constitution and bylaws provide for the election of officers and a five-member Board of Directors.

This investigation revealed that between September 1951 and June 1972, Nicholas P. Callahan obtained $39,590.98 from the FBIRA designated for the "Library Fund." The Association's records contain no explanation or authorization for these disbursements. No disbursement requests or vouchers were found. Mr. Callahan was the Library Fund's only recipient and maintained the only records of its expenditures. Mr. Mohr periodically reviewed the records. Shortly after Mr. Hoover died, Mr. Callahan and Mr. Mohr discontinued the Fund and destroyed its records. Neither of the two FBIRA treasurers who served during this period knew why the fund was named the Library Fund in the FBIRA Disbursements Journal. The treasurers understood that these "Library Fund" disbursements were for Director Hoover's public relations expenses, such as office flowers, condolence telegrams, and for unspecified office expenses, such as books and newspapers.

Only Messrs. Hoover, Tolson, Callahan, Mohr, and the treasurers knew about the "Library Fund" and disbursements were made to the Fund without the authorization of FBI-RA officers whose approval is required under the FBIRA charter. Mr. Callahan asserted that the disbursements were for official public relations and liaison functions for which appropriated funds are unavailable under law and that they were proper under a broad interpretation of the FBIRA constitution's "general welfare" clause because money spent promoting the FBI's general welfare is in the best interest of its employees.

The investigation also revealed that $55,849.77 of FBIRA funds were expended on receptions for National Academy students and guests between April 8, 1958, and June 20, 1972. The National Academy is an FBI operated training and education facility for local law enforcement personnel around the country. The receptions were not FBIRA activities and they were not open to FBIRA members. About half the cost of the receptions was borne by those attending the receptions so that net cost to the FBIRA after offset by these donations was $29,443.67. The FBIRA constitution and bylaws do not provide for expenditures for such functions as National Academy receptions.

From July 1952 to December 1975, another $12,219.90 of FBIRA funds were spent on miscellaneous or liaison expenses and on receptions, luncheons, retirement parties, and gifts for foreign law enforcement liaison officers, and senior FBI officials. The funds also covered the cost of FBI press receptions and other public relations expenses. Director Hoover, Mr. Callahan, Mr. Mohr, Mr. DeLoach, and Mr. Walsh, not the FBIRA Board of Directors, approved these disbursements, according to the records.

The above facts established that, from 1951 to 1975, high officials of the FBI obtained funds from the FBIRA for public relations and other uses not authorized by its charter and without obtaining the approval of its Board of Directors. There is no evidence that these Bureau officials converted the money to their own use and, therefore, no evidence of criminal intent as required under Title 18, United States Code, Section 654.

H.  Special Agents Mutual Benefit Association (SAMBA)

SAMBA is an unincorporated association designed to provide life and health insurance to FBI employee members. The Prudential Insurance Company has been SAMBA's underwriter since SAMBA was founded in 1948. SAMBA is independent of the FBI, with private offices at 1325 G Street, N.W., Washington, D.C.

This investigation uncovered questionable expenses from SAMBA books and records. The amount of $635.21 was withdrawn from the SAMBA account to pay for a retirement party and gift for Mr. Mohr. $310.22 of this withdrawal covered the price of a Sears Roebuck fishing boat, which was delivered to Mr. Mohr by FBI employees. One SAMBA officer admitted that SAMBA funds were used, in disregard of its charter, to pay for retirement parties, luncheons, and gifts for outgoing SAMBA officials and Directors. Other questionable expenses included two professional football season tickets for the use of a SAr4BA official, Saturday work charges, wedding and anniversary gifts, and annual Christmas parties.

Director Kelley and his wife, along with Mr. and Mrs. Mohr, Mr. and Mrs. Thomas Jenkins, and SAMBA President Thomas J. Feeney, Jr., and his wife, attended a weekend meeting in New York City with officials of Prudential Life Insurance Company, which underwrites the SAMBA policy. Director Kelley's travel from Kansas City, Missouri, to New York and return to Washington, D.C., was by Government Travel Request (GTR). Travel for Mrs. Kelley and the others was paid by SAMBA. Prudential paid all other expenses. Director Kelley subsequently reimbursed Prudential for these expenses.

I.  FBI Officials' Relations with Firearms Suppliers

The Remington Arms Company, which bids on arms and ammunition contracts with the FBI, maintains a 300-acre working farm and game preserve in Chestertown, Maryland, called Remington Farms. On January 3 and 4, 1972, Remington hosted three FBI officials at Remington Farms and paid for their room, board, hunting licenses and stamps at a cost of $203.50. Twelve other FBI officials were hosted at the Remington Farm on three subsequent occasions, costing the arms dealer an additional $1,168 in room and board.

Remington also paid for liquor, ammunition, guides and game shot on these four weekends. Although a breakdown by individual is not available for these costs, Remington spent a total of $2,013.96 for forty seven individuals for the four weekends. Fifteen of the forty seven guests were then active FBI officials.

FBI records show that the Remington Firearms Company has not been awarded a firearms contract since 1971. The hunting weekends mentioned above all occurred after 1971. Six ammunition (not firearms) contracts have been awarded to Remington since fiscal year 1971, but each of these contracts was solicited and awarded after open bidding by the Justice Department. Although several of the FBI officials who attended the hunting weekends were in a position to influence the awarding of arms contracts, no arms contracts were awarded to Remington during the 1970's. Nor were arms contracts awarded during this time to Winchester Firearms Company which hosted a hunting weekend for three Bureau officials in 1973.

The Federal illegal gratuities statute, Title 18, United States Code, Sections 201 (f) and (g), requires that the gratuity shall be "for or because of" an official act. This investigation found no evidence that the recipients of the gratuities did anything for Remington or Winchester, and therefore, there was no evidence warranting prosecution under this statute. The evidence does indicate that the Departmental regulation prohibiting the accepting of gifts or entertainment from those having or seeking a contractual relationship with the United States was violated. 28 C.F.R. ß45.735-14(a). Moreover, the evidence shows that these employees also violated the general Departmental prohibition against conduct creating the appearance of impropriety. 28 C.F.R. ß45.735-2. The Attorney General has referred this matter to the FBI Director with instructions to take appropriate administrative action against these employees.

J. Miscellaneous Allegations

1.  Financial Dealings Between Joseph C. Palumbo and John P. Mohr

This investigation received information from the House Select Committee on Intelligence that John P. Mohr and Joseph C. Palumbo of Charlottesville, Virginia had had improper financial dealings. Mr. Palumbo and Mr. Mohr entered a financial arrangement in late 1972, after Mr. Mohr had retired from the FBI. The transaction was entirely lawful and at arms length and no evidence was found that Mr. Palumbo ever discussed the FBI or its activities with Mr. Mohr.

2.  Official and Confidential Files

During 1975, an investigation was conducted into the disposition of the "official and confidential files" of J. Edgar Hoover following his death in May 1972. The inquiry determined that the files were turned over to Assistant Director W. Mark Felt by Miss Helen W. Gandy, Executive Assistant to Mr. Hoover, on May 4, 1972, and now are located at FBI headquarters. No evidence was found that official FBI files of any kind were removed to Mr. Hoover's home following his death.

A. PART II Summary and Actions Taken Against Principal Subjects

1. John P. Mohr

(a) Mr. Mohr was Assistant Director for the Administrative Division of the FBI and the Assistant to the Director. He was primarily responsible for using USRC as an exclusive supplier of electronics equipment to the FBI. His conduct towardß,USRC violated 28 C.F.R. 045.735-2(b) and (c)(2) (prohibiting employees from giving preferential treatment to any person outside the Department). He received a few gratuities (tape deck, Christmas gifts) from Mr. Tait. No evidence was found that he was bribed, but he violated 945.735-14(a)(1), which prohibits employees from accepting gifts from those doing business with the Department. (b) FBI employees provided goods and services to him as described above. This arguably violated 18 U.S.C. 641 (conversion of government property to his own use), (prosecution barred by the statute of limitations), and 28 C.F.R. ß45.735-16 (misuse of federal property). (c) Mr. Mohr was also responsible, along with Mr. Callahan, for using FBI Recreation Association and Confidential Fund monies for unauthorized public relations purposes. This matter has been referred to the Department's office of Management and Finance for appropriate action (see footnote 12 above). In 1972, he attended an expense paid hunting weekend at Remington Farms, an FBI arms supplier. This is a violation of the Department prohibition against accepting gifts from those doing business with the Department, 28 C.F.R. ß45.735-14(a)(1). (d) No action has been taken against Mr. Mohr. He retired on June 30, 1972. Criminal action under all of the above federal provisions is barred by the five year statute of limitations.

2.  Nicholas P. Callahan 

Mr. Callahan was Assistant Director for the FBI's Administrative Division and later Associate Director. In 1976, pursuant to Attorney General Levi's order, he was asked to resign as a result of this investigation. He did resign.

(a) Mr. Callahan was responsible for improperly diverting thousands of dollars of FBIRA and Confidential Fund monies to official FBI public relations activities. The funds were not authorized or appropriated for public relations activities. There was no evidence that he converted these funds to his personal use, and therefore, no evidence warranting prosecution. This matter has been referred to the Department's Office of Management and Finance for appropriate action. (See footnote 12 above.)

(b) Mr. Callahan admitted receiving FBI goods and services. FBI employees decorated his beach house, built a fence, walnut shelves, and other furniture for his residence. The statute of limitations bars prosecution of Mr. Callahan for receiving government property in violation of 18 U.S.C. 641.

(c) No evidence was found that Mr. Callahan was bribed or that he received illegal gratuities.

(d) No further action has been taken against Mr. Callahan.

3.  Ivan W. Conrad

Mr. Conrad was employed by the FBI Laboratory in many positions from 1934 to 1973. He retired on July 12, 1973, as Assistant Director of the Laboratory.

(a) Mr. Conrad took many pieces of electronic recording and amplifying equipment home with him and used them for his own benefit. Mr. Conrad asserted he had the equipment for legitimate purposes. The Department recovered all equipment, and Mr. Conrad tendered a $1,500 cashier's check to pay for his use of the equipment.

(b) No further action has been taken against Mr. Conrad. Prosecution was barred, in the judgement of the Criminal Division, by the statute of limitations and because of the lack of evidence showing criminal intent on the part of Mr. Conrad.

4.  Clarence M. Kelley

Director Kelley received the limited amount of goods and services described above. He was not involved in any of the other matters which are the subject of this report. Attorney General Levi and Deputy Attorney General Tyler determined that no disciplinary action was called for, but that Director Kelley should reimburse the Bureau for the goods and services he received. That has been done and no further action against him has been taken. Director Kelley should be given credit for putting an end to the improper practices described in the report. His cooperation greatly assisted Departmental investigators in uncovering the facts. His cooperation made this report possible. It should also be noted that Director Kelley was primarily responsible for bringing about the internal reforms set forth in the final section of this report.

5.  G. Speights McMichael

Mr. McMichael is no longer in charge of, but continues to work in, the FBI's Property Procurement and Management Section. He is no longer cashier of the Imprest Fund, a petty cash reimbursement fund.

(a) Mr. McMichael clearly neglected his responsibilities in managing the Imprest Fund. There is some evidence that he permitted violations of procurement procedures to favor USRC in the purchase of electronic equipment. 41 U.S.C. 252(c)(12). There is no evidence of bribery.

(b) While serving as the FBI's chief procurement officer, he attended an expense paid hunting weekend at Remington Farms. This is a probable violation of the Department regulation prohibiting the receipt of gifts from those doing business with the Department. 28 C.F.R. ß45.735 14 (a) (1) .

(c) The evidence that Mr. McMichael knowingly approved Imprest Fund reimbursement for the personal purchases of an FBI employee is not substantial. There is no evidence that he converted government money to his own use. 18 U.S.C. 641 and 643.

(d) McMichael clearly failed to meet his responsibilities as the FBI's Chief Procurement officer and probably violated 28 C.F.R. 945.735-13 (misuse of official position) and 945.735-16 (misuse of federal property). His attendance at Remington Farms probably violated ß45.735-14 (gifts from Department contractors). He failed to assist Department investigators. The statute of limitations bars criminal action against Mr. McMichael. These matters have, however, been referred to the Director with instructions to institute appropriate administrative action against him.

6. Joseph X. Tait

(a) On June 20, 1977, a jury acquitted Mr. Tait of. charges that he understated his income in 1971, 1972 and 1973, in violation of 26 U.S.C. 7201.

(b) A jury acquitted Mr. Tait on all counts of charges that he violated 18 U.S.C. 287 (false claims on the United States), 371 (conspiracy to defraud), and 1341 (mail fraud).

(c) Further comment regarding Mr. Tait is considered inappropriate because, unlike the other subjects of this report, he is not a government official.

B. Possible Civil Actions

1.  U.S. Recording Company

The Department is considering taking civil action to invalidate USRC contracts and recover the excess profits obtained from the Bureau. The basis of such a suit would be the clear breach of applicable government procurement regulations. The Civil Division is now evaluating the relevant facts to determine whether the Department should institute a civil recovery action against the United States Recording Company or its president.

2. Conversion of Government Property by Bureau Officials

Civil actions may not be instituted because: the actual amounts involved are small compared to the expense of litigation; there would be substantial difficulty in fixing the government's loss with any appreciable accuracy; and, much of the government's property has already been returned. In addition, civil action may be barred by the statute of limitations.

3. Imprest Fund

Approximately, $1,700 was diverted from that fund for clearly improper purposes. The property obtained with Imprest Fund monies has been returned to the Bureau. This matter has been referred to the Department's Office of Management and Finance to review the facts, and to take necessary administrative action.

4. Confidential Fund

Approximately, $75,000 was spent to purchase electronic equipment and $23,000 was spent over a fifteen year period on public relations type matter. This matter has also been referred to the Department's Office of Management and Finance for appropriate administrative action.

5. FBI Recreation Association

Monies from the FBI Recreation Association were improperly diverted. According to the Civil Division, the Government lacks standing to initiate any civil action, except under a somewhat strained theory of parens patriae. Accordingly, no civil action will be instituted regarding this matter.

C. Action Taken to Prevent Recurrence

Within the last fifteen months, Director Kelley has taken the following corrective measures to prevent the recurrence of the improper practices described in this report.He has:

1. Reorganized the Inspection Division and renamed it the Planning and Inspection Division; created the office of Professional Responsibility, an office of Inspections, and an office of Planning and Evaluation;' established within the office of Inspections a separate Audit Unit, responsible for auditing all FBI funds and financial transactions; and organized the Division so that it reports directly to him, as Director.

2. Removed the Property Procurement and Management Section from the Division with budget responsibility, the Finance and Personnel Division, thereby making one Division head responsible for procurement and another responsible for the FBI budget and funds. Director Kelley has placed a Special Agent Accountant, a Certified Public Accountant, as Section Chief of the Property Procurement and Management Section.

3. Discontinued the use of the U.S. Recording Company as a "cover" or "cut-out" for confidential purposes and established controls to ensure that all purchases are made in accordance with government regulations.

4. Restructured the FBI inventory system, to provide built-in controls and audit trails, and initiated automation of the inventory system to provide better accountability.

5. Discontinued the FBI Laboratory and Exhibits Sections' practice of providing personal services to FBI officials. Director Kelley also has discontinued the use of the unauthorized cash fund once maintained in the Exhibits Section.

6. Reorganized the management and handling of the FBI Recreation Association (FBIRA) and its funds, so that FBIRA officers are aware of their responsibilities to prevent unauthorized expenditures. A new treasurer of the FBIRA has taken office and is not responsible for any other FBI fund.

7. Replaced the FBI Confidential Fund with the Field Support Account, an imprest fund approved by the Treasury Department and administered in accordance with Treasury and Justice Department regulations.

8.  Developed and improved the FBI career development program for Special Agents to ensure that the best qualified individuals are selected for administrative advancement, substantially reducing the possibility that one person or group can control the selection of such candidates. In addition to these administrative measures, the FBI has increased legal instruction within its training curriculum; held training sessions on the FBI guidelines for career agents; and issued detailed instructions to the field on legal questions concerning the legality and propriety of investigative techniques. The FBI is also posing such questions to the Department's Office of Legal Counsel with increasing frequency.

On January 3, 1978, the Attorney General referred the entire U.S. Recording Company matter to the FBI and instructed the Director to initiate administrative proceedings against G. Speights McMichael and other FBI employees whom the Director considers to be appropriate, subjects for administrative action. The Attorney General requested the Director to keep him advised by informing the Department's Counsel on Professional Responsibility of all administrative action taken.

Finally, the Attorney General has asked Director Kelley to bring to the Attorney General's attention any improper attempts to have FBI agents conduct investigations or undertake activities which are not within the Bureau's authorized jurisdiction. The Attorney General has also directed all Bureau personnel to bring reports of misconduct to the attention of appropriate Bureau officials, and when necessary, the office of Professional Responsibility at the Bureau and at the Department of Justice.


_1/ 41 U.S.C. 252 (c) and regulations promulgated thereunder.

_2/ 41 U.S.C. 252 (c) (12) .

_3/ The limit was raised to $10,000 by statutory amendment in 1974.

_4/ The Blue Ridge Club burned down on November 23, 1975, just before House Select Committee investigators were scheduled to interview Club employees. This investigation revealed that an eight-year-old child caused the fire while playing with matches. The child "confessed" to Department investigators. The testimony of other witnesses corroborates the confession.

_5/ A search of the transcripts of committee hearings revealed no evidence that Mr. Tait actually testified before the referenced subcommittee or any other subcommittee.

_6/ 28 C.F.R. ß45.735-2(b) and (c) prohibit the giving of favored treatment or advantage to any member of the public and any action which might result in, or create the appearance of: preferential treatment, the use of public office for private gain, or an adverse effect on public confidence in the integrity of the Government. 28 C.F.R. X45.735-14(a)(1) prohibits the acceptance by public officials of gifts or gratuities from those doing business with the Department of Justice.

_7/ No official documents, memoranda, or work orders were found which account for the work performed, the materials used, or the goods produced by Exhibits Section employees for the personal benefit of Bureau officials.

_8/ Contrary to the evidence obtained from Exhibits Section employees, Mr. Callahan stated that he paid for the material for the fences and installed them himself on personal time.

_9/ Mr. Callahan testified that agents are allowed to take home cameras for personal use to maintain their proficiency with them. Agents assigned to this investigation verified that this is the case, but indicated that the practice is intended to maintain familiarity with cameras more complex than the Polaroid.

_10/ A further term of the agreement was that he make restitution for the goods he received in an amount to be determined later between his attorney and attorneys for the United States. On September 28, 1976, Dunphy was fined $500 and placed on probation. He returned all government materials to the Bureau, in accordance with the plea agreement.

There was no footnote _11/

_12/ Title 31 U.S.C. 628, a noncriminal statute, prohibits the use of appropriated funds for a purpose not specified in the appropriation. The Counsel on Professional Responsibility has requested the Department's Office of Management and Finance to review these facts, to take necessary administrative action to prevent the recurrence of this conduct, and if appropriate, to refer the matter to the Comptroller General for possible recovery actions against responsible disbursing officers.

DOJ-1978-M

02/02


In mid 1978 an Executive Vice President (EVP) of Northwestern Bank requested a visit to my facility.  I had never dealt with this particular person but I knew Duncan was involved with other more pressing matters. The EVP told me that the FBI had replaced the IRS as Duncan's chief antagonist and the FBI was totally disrupting the functioning and operations of Northwestern Bank. The FBI was using the old "divide and conquer" routine to demoralize and frighten the employees. The FBI started at lower level employees and were working upwards towards management. Duncan felt it would be a good idea if every manager carried a pocket recorder to recorded any and all conversations with the investigating agents. The language of his intent was clearly within the confines of the law, i.e. one party consent. He also purchased three 1/3rd speed cassettes to record conference room confrontations. The EVP left my facility with one of the 1/3rd speed recorders and I ordered the remaining two for him.

Several weeks later the EVP telephoned and indicated that there was one scenario they weren't prepared for... that being the making of recordings in a Northwestern Bank office controlled by the FBI. I told the EVP that regardless of the surroundings the same one party consent rule would apply.

A few days later a Northwestern aircraft arrived at BWI airport to ferry me to North Wilkesboro.  That Sunday I was taken to the main bank building and shown the office the bank wanted to monitor. It was near a corner of the building that had glass windows all around. There was a roughly 40 foot by 40 foot open area in the corner that contained no furniture whatsoever. To the left was an office with the door open. Just outside the office were several knocked down cardboard boxes and tubes from vacuum cleaners. The inside of the office was absolutely sterile. One desk, one chair, one telephone (sitting the floor). As usual, I had brought some countermeasure equipment with me to do a quick check of any new and unfamiliar surroundings. I felt, after seeing the room, that it most likely was bugged so I set the countermeasure equipment aside. A quick glance out of the window revealed an automobile pointing directly at me in the parking lot across the street. The EVP showed me the proposed listening post and I could see that the length of the run would need a preamplifier at the microphone end of the system. Based on the EVP's earlier description, I had taken only a microphone and hank of RG-174 coaxial cable. Back at the motel I pulled a couple of resistors, capacitors and a 2N3391A out of one of my countermeasure preamps and constructed a microphone preamp. On my way back to the bank building I stopped by the car I had seen earlier. The car had no tires and was sitting on four cinder blocks. It was covered with dust and debris and obviously had been sitting somewhere for a long time... but not there. There was no drip line around the car! Out came my contact microphone and when placed on the car I heard the unmistakable sound of a time lapse camera. I thought... and probably said out loud... C'mon you guys, you can do better than this!

On returning to the target room I installed the microphone and preamp inside the telephone jack cover. In an office on the other side of the building I connected my preamp to the designated wires... turned up the volume... and I could hear myself as clear as a bell. A sense of pride came over me and I was satisfied I had earned my money. I packed my bags and left town on one of Northwestern's airplanes.


Shortly afterwards Duncan was indicted for misapplication of several hundred thousand of the banks money. He was convicted of misapplying $675.00! Thanks to one of the idiotsyncrasies of our legal system, the sentencing guidelines are base on what you are charged with, not what you are convicted of, and Duncan was given an 18 year sentence. He was now a broken man and the vultures came to feed.... and feed they did.

To thank him for all he had done for them 15,000 people came to Duncan's send off party. Do you have that many friends? Duncan was a giant of a man in North Carolina and had helped hundreds of thousands of people during his term as Chairman. Now, that was all to end.

Shortly afterwards Duncan, Starr and the EVP were charged with bugging the FBI. They had extremely bad counsel. Rather than stick with their lawful position of one party consent, counsel came up with all kinds of rinky-dink defenses and got them all convicted. I followed the trial closely and was more than slightly pissed that they did not come to me for advice and guidance.

In early December, 1978 I was subpoenaed to appear before the Grand Jury that had indicted Duncan, Starr and the EVP. My attorney, Bud Fensterwald, Para-legal Marc Feldman and I headed to North Carolina. Before leaving, I typed up two 3 X 5 cards with the fifth amendment statement on them (for you foreigners, the fifth amendment of the U.S. Constitution gives a citizen the right NOT to answer a question). Before going into the Grand Jury room Fensterward instructed me to give them my name, rank and serial number and then "read the card." I must have read the first card 60-70 times before I ceremoniously set it aside and pulled out the second card and started reading it. Of course it had on it the exact statement and one of the Grand Juror's joked that the first card must have run out of gas or something. In total, I must have taken the fifth 150-175 times. Periodically, whenever I got tired I excused myself to converse with my attorney... i.e. get a breather.. and when I reentered the room Fensterwald would say "read the card."

Immediately after I was dismissed from the Grand Jury, Marc Feldman grabbed me by the arm and took me to an empty room. He asked me to tell him exactly what I had seen in the Grand Jury room. I started to my immediate right with the U.S. Attorney, then the stenographer, then the Grand Jurors... one by one... and finally the jury foreman's table at which sat two men. One was a gray haired fellow and the other FBI Agent XX. Feldman gasped and told me to go over that part again... which I did. A couple of days later I received a copy of a motion from Fensterwald to the Court asking that the charges be dropped due to improprieties by the FBI. This was a serious issue. It is a violation of federal law for an investigating agent to be present when a witness is questioned.

The Court requested a hearing. It stood to reason that I would take the stand and say he was there and he, knowing he had violated federal law and been caught, would most certainly say he was not. The only way to solve that dilemma was to put a couple of Grand Jurors on the stand under oath and ask what they saw. To help me to decide which of the Grand Jurors we would use the court was forced to give me a list of the names and addresses of the Grand Jurors... and here are twenty of them. You will hear more about these people later.

BERNICE C POOLE
BX 8694
2159 CHARLES ST
DURHAM, NC 27707

CARL F. SPAUGH, JR.
2441 W CLEMMONSVILLE
WINSTON-SALEM, NC 27107

JARIUS J. WATSON
GENERAL DELIVERY
EFLAND, NC 27243

MS HILDA J WEAVER
1008 TWYCKENHAM DRIVE
GREENSVILLE, NC 27408

DOROTHY R MC DOUGALD
P.O. BOX 471
BROADWAY, NC 27505

REBECCA A MYERS
1530 HARDING STREET
WINSTON-SALEM, NC 27107

MABLE L PARKER
39 WALNUT STREET
CONCORD, NC 28025

LUCY J PEARSON
3707 PROSPECT DRIVE
WINSTON-SALEM, NC 27107

LEEOIST B KIME
RT 2 BOX 38
LIBERTY, NC 27298

DORI A KING
RT 3 BOX 385-A
LEXINGTON, NC 27289

JOHN W LEONARD
4502 SUMMIT AVE
GREENSBORO, NC 27405

JOHNNY S MASON
2706 FERRELL ROAD
DURHAM, NC 27704

EVELYN P FURR
ROUTE 3
ALBEMARLE, NC 28001

BILLY G HEGWOOD
4955 SHATTALON DR
WINSTON-SALEM, NC 27106

EDITH J. JORDON
1617 E 23RD STREET
WINSTON-SALEM, NC 27105

PATRICIA KENNEDY
RT. 4 BOX 1179
HIGH POINT, NC 27260

CARL H BROWN
RT 2 BOX153
TRINITY, NC 27370

RICHARD K BURR
2852 WYCLIF ROAD
RALEIGH, NC 27602

DAVID C CAMPBELL
4 CRESTVIES CIR
SALISBURY, NC 28144

RANEY W FOUSHEE
1025 CHATFIELD DR
GREENSBORO, NC 27410

I had transferred these names from my master list to four names and addresses per mailing label group. I have since misplaced my master list and one group of four names and addresses. As soon as I find either, those name will be added to the above list.  

SO MUCH FOR GRAND JURY SECRECY!!

I took the stand and, under oath, made my statement that the FBI agent was indeed there. The FBI agent, under oath, said he was not. He should have stopped right there but his ego simply would not let him. The FBI agent, not the court, asked Fensterwald if he had seen him go in and out of the Grand Jury room. Fensterwalds answer was no. Again, the FBI agent couldn't shut up. He commented that he was in the library while I was before the Grand Jury. The judge should have immediately responded... Hey, wait a second XX. You know as well as I that directly behind the jury foreman's desk is a door that opens into a covered corridor which ends at the library! Maybe we SHOULD hear from some of those Grand Jurors! Instead, the judge turned to me and said "Mr. Kaiser, you're mistaken, honest or otherwise." Whack went the gavel and that was that. At least my team now knew what kind of trash we were up against.

We were now on to the arraignment stage.


There are three more chapters to this story and they will be up loaded as soon as I can write them. They are...

    The criminal case...
    The civil case...
    Repercussions...


The following newspaper articles were part of the original upload. The new chapters mentioned above will fill in and expand around these articles with true events.

Journal
Tuesday, February 21, 1978

Jury May Get Case Today, Is Kaiser Object of FBI Vendetta?

Twelve jurors probably will begin deliberations today to decide whether Martin L. Kaiser is guilty of conspiracy and illegally bugging FBI agents while they investigated Northwestern Bank last year.

One thing the jury must decide is whether the FBI is carrying out a vendetta against Kaiser, one of the, country's foremost wiretap and bugging experts.

Kaiser, a manufacturer of surveillance devices - from Maryland, was once a major supplier of the FBI's surveillance equipment But his dealings with the FBI stopped when he publicly identified an FBI front company used to buy his products and resell them to government agencies at substantially higher prices.

Today, Kaiser no longer works with the FBI, but his clients include the ..., the Army, and Air Force, several foreign countries and more than 200 police departments.

Martin Kaiser is still one of the most respected makers of bugging equipment in the world - among his character references is the head of the CIA's procurement division. Kaiser still supplies the ... with a great deal of surveillance gear' and he still holds an agency rating of secret.

But Kaiser says that the FBI wants revenge on him. He alleges that the FBI seeks revenge because of his testimony before the presidentially appointed National Wiretap Commission and the House Select Committee on Intelligence in 1975. In his testimony before the panels Kaiser revealed links between the FBI and U.S. Recording Co., an electronic equipment purchasing company.

Kaiser told the committee that the recording company was actually an FBI front - an apparently legitimate private business. Which was in fact operated by high ranking FBI officials. Kaiser had done a considerable amount of business with the FBI, he said, but his business began to suffer greatly after he was instructed in 1969 to sell his equipment to U.S. Recording instead of directly to the FBI.

Kaiser testified that he first assured that the procedure was merely a security measure, - but he later discovered that the electronic devices he sold to U.S. Recording were being duplicated and resold at substantial markups.

Kaiser had sold the FBI many surveillance devices - among them the bug detection kit used to find the listening devices Kaiser is charged with installing at Northwestern's headquarters in Wilkesboro. After his testimony an investigation by the General Accounting Office revealed that the FBI front company had marked up the prices of Kaiser's gear from 12 percent to 280 percent.

Kaiser testified that the FBI was not the only group buying his products through U.S. Recording. In addition to federal agencies, Kaiser told the congressional committee foreign governments, including Canada and Iran bought the marked-up goods.

Kaiser now says that most - of his federal contracts were severed after he brought the front company to public attention. An affidavit Kaiser filed in federal court claims that his sales plummeted from $200,000 annually before his testimony to $450 afterward.

His allegations of a vendetta go beyond the U.S. Recording Co. payment scheme, though. Kaiser said that Thomas J. Brereton, the FBI agent in charge of the Northwestern investigation illegally attended grand jury proceedings while Kaiser was testifying.

Kaiser's allegations resulted in a special hearing called by Judge Hiram H. Ward in U.S. Middle District Court here last month. Ward ruled that Brereton had not improperly attended the grand jury hearings and that "a mistake had been made, honest or otherwise."

Brereton testified that he had been in the U S. attorneys law library during Kaiser's grand jury appearance.

Friction between Kaiser and Brereton seemed to continue throughout the seven days of testimony in the bugging trial. Kaiser's attorneys repeatedly asked Ward to admonish Brereton for speaking with Assistant U.S. Attorney Benjamin White during cross examination.

Brereton consulted with White before many questions were put to defense witnesses, and Kaiser's attorneys objected that the jury could overhear Brereton's comment's. Several times, Ward instructed Brereton to lower his voice when he spoke with the prosecutor.

A part of Kaiser's affidavit on the FBI vendetta matter said that two special FBI agents visited him in December 1975 to interview him on his U S. Recording Co. testimony. Kaiser said the two "literally held me for several hours hostage... to elicit a statement which repudiated my earlier congressional testimony and absolved the Bureau and U.S. Recording Co. of their wrongdoing."

The U.S. attorney's office filed a motion in federal court to deny Kaiser's allegations of a vendetta.

Kaiser's trial will continue at 9:30 a.m. today, with final arguments and instructions to the jury scheduled.


Winston-Salem Journal
Wednesday - February 22, 1978

Martin L. Kaiser has been found not guilty of bugging FBI agents, conspiracy and illegal transporting listening devices.

The verdict was returned by a jury of eight women and four men after 2.5 hours of deliberation yesterday afternoon in U.S. Federal District Court here.

Kaiser, an electronic surveillance expert from Cockeysville, MD, had been charged with helping Edwin Duncan Jr. and Gwen E. Bowers bug FBI agents who were investigating Northwestern Bank last year. Duncan, former bank board chairman, and Bowers, a former bank vice president, pleaded guilty to similar charges last November.

The bugging took place between April and July 1977 in an office in the bank's headquarters in Wilkesboro. "In all honesty," Kaiser said after the verdict was announced, "it's what we expected. Needless to say I'm satisfied."

Throughout the eight day trial Kaiser admitted installing bugging equipment in a bank office used by the FBI agents but denied knowing that Duncan and Bowers would use the equipment illegally. The government case contended that Kaiser was fully aware that bank employees would use the bugging system to illegally monitor the FBI investigation.

"What this case is really about is human rights - the right to human privacy," said Assistant U.S. attorney Benjamin White in his final argument yesterday morning. "There is nothing illegal about him installing these devices - many attorneys have them in their offices, many businessmen have them in their offices," said John Morrow, ore of Kaiser's attorneys.

Much of Kaiser's trial was marked by controversy over his past business dealings with the FBI. Kaiser, who is a major manufacturer of surveillance equipment for government agencies, filed a pretrial affidavit protesting that the FBI was seeking revenge against him.

Kaiser said the FBI wanted vengeance because of testimony he gave before congressional panels on surveillance matters. He had identified an FBI front company that bought his equipment and resold it to the FBI and other government agencies at marked-up prices.

Most of the defense witnesses were from law enforcement agencies, and most testified that Kaiser is reputable and trustworthy. Kaiser testified that at he Sells bugging equipment and bomb detection gear to more than 200 law enforcement groups. His clients, he said, include the ..., the Army and Air Force and several foreign governments.

In his closing remarks, White questioned the nature of Kaiser's relations with his clients. After saying that Kaiser had once had the trust of law enforcement groups. White said, "Mr. Kaiser sold that trust, ladies and gentlemen, for $3,500 (Kaisers fee - for the Northwestern Bank bugging)."

Shortly after the end of the trial, one of Kaiser's attorneys told reporters that Northwestern has never paid Kaiser's fee. "We hope we don't have to sue them to get it - they're a big bank," said Bernard Fensterwald, a Washington lawyer who once defended James McCord, one of the Watergate burglars.

Kaiser said he plans to visit his daughter in Florida and then return to work. "I've really been out of business since July 29 (the date of his indictment)," he said. "I'm really looking forward to getting back to it."


The Daily Telegraph
London, England
Tuesday, January 2, 1979

Bugged FBI Men with Hemorrhoids Sue for 11 Million

A telephone tapping expert who supplied the Federal Bureau of Investigation with electronic eavesdropping devices is being sued for alleged "bugging of two FBI agents." The agents, Thomas Brereton and Zachary Lowe, are claiming eleven million pounds compensation They say their right as private citizens were "grossly violated" and they are suing Mr. Martin Kaiser and a bank in North Carolina.

They were investigating the bank's affairs after allegations that an executive was misusing funds, and according to Mr. Kaiser a vice president of the bank sought his assistance, wanting recorders installed to tape conversations and interviews in the bank involving the officers.

Devices were provided, Mr. Kaiser said, on the understanding that the equipment would be used legally with the consent of the agents.

The FBI men have now named him together with the bank in a lawsuit filed at Greensboro, North Carolina. In a court deposition Mr. Brereton tells of finding five bugging devices, including special transmitters and amplifiers, in the building.

He recalled: "That night there was tremendous anger and frustration". He remembered one of the bank's executives sitting "smirking at me when he pulled all the mikes out of the wall. He went on: "You wouldn't believe the anger that took place in here that night when I found out... you go home and all you do is think about it." "You know you've been bugged... It keeps playing on your mind".

As a result he was humiliated and embarrassed as a special agent and suffered, he said, increased hypertension and cysts in his eyes.

His colleague said in his deposition that after the incident his hemorrhoid condition worsened.


The Sentinel
Winston-Salem, NC
Saturday, February 5, 1983

Defendants Claim Agents Abused Process

GREENSBORO, NC - Two FBI agents abused the criminal process to strengthen their position in a $22 million lawsuit stemming from the 1977 investigation and bugging at Northwestern Bank lawyers for defendants in the suit charged in federal court yesterday.

One defendant in the civil case also accused the FBI of tampering with evidence. In an affidavit, defendant Martin L. Kaiser, an Electronics expert from Cockeysville, MD., said bureau agents or, employees altered two tape recordings and switched tape recorders. He also claimed that one agent removed documents from FBI files which have never been recovered.

The allegations were made during three hours of argument In U.S. Middle District Court Federal Judge Frank W. Bullock Jr. held a hearing on numerous motions pending in the case which began almost five years ago.

In July 1978, FBI agents Thomas J. Brereton and Zachary T. Lowe filed suit alleging that their civil rights were violated and their privacy was invaded when their conversations were electronically recorded during their investigation of Northwestern Bank from April to July 1977. Brereton and Lowe charged that Edwin Duncan Jr., then Northwestern Bank chairman, and Gwen E. Bowers, then bank vice president, conspired to intercept the agents oral and telephone communications.

They also claimed that Kaiser agreed to help Duncan and Bowers by possessing, selling, transporting, and installing electronic surveillance equipment or bugs to help them accomplish their sinister conspiratorial scheme." Northwestern Bank and Northwestern Financial Corp., the bank's holding company, also are defendants in the lawsuit.

The agents discovered they were being recorded while they were investigating financial irregularities at the North Wilkesboro-based bank. Duncan was convicted of misapplying bank funds and recording conversations of IRS agents who were reviewing bank records in October 1977, and in November 1977, he pleaded guilty to the bugging conspiracy against the FBI.

Bowers pleaded guilty to the conspiracy to record the FBI agents' conversations and to the actual bugging. However, Kaiser pleaded not guilty to charges related to the bugging and he was acquitted in federal court in Winston-Salem in February 1978.

Since Brereton and Lowe's suit was filed, it has become one of the most complicated civil cases ever in the U.S. Middle District. Three Greensboro attorneys - Bynum N. Hunter, Michael R. Abel, and Ben F. Tennille, have been released as defendants, and the remaining defendants and the plaintiffs have filed pages and pages of motions' affidavits and cross claims. There also is a similar case filed by former FBI agent Donald G. Wilson for $5.5 million in damages from Duncan, Bowers, Northwestern Bank and Northwestern Financial.

Lawyers for Duncan and Kaiser yesterday said Brereton and Lowe used the criminal investigation of their clients to prepare for their multi-million-dollar civil suit. "They were given access and power of the federal government they should not have been given," Stephen Spring, a Louisiana attorney representing Kaiser said. Duncan's attorney, Ted G. West, claimed that the former bank chairman Agreed to plead guilty to the bugging conspiracy during a meeting with Brereton and a former U.S. attorney.

"We contend that Mr. Brereton and Mr. Lowe abused the process," West said. "That's what it boils down to in instigating a guilty plea from Mr. Duncan so they could have something to hang their hat on in this civil case."

He also said, "This court must and should look closely at a situation where investigators of the U.S. government pursue their investigation knowing during the entire course of the investigation that they have a civil suit in mind".

But Mike Bailey, one of Brereton's and Lowe's lawyers, said the agents were only fulfilling their obligations by investigating and helping prosecute the cases.

Kaiser filed a $720,000 counterclaim against Brereton and Lowe in 1978 and last year he asked to add the FBI to his suit. He is seeking $10.7 million from the FBI. Kaiser claimed the bureau "actually assisted and enabled... Brereton and Lowe to gain access to Information and records while on bureau time and through bureau resources of information directly bearing to the outcome of the civil action."

Duncan also has asked the court to allow him to add the FBI, a former U. S. attorney and a former assistant U.S. attorney to his cross-claim against Brereton and Lowe. However, Bullock questioned whether the statutory limitation on adding to the cross-claims has run out.

Kaiser made other allegations against the FBI in his affidavit. He accused the bureau of fraudulently concealing and manufacturing evidence.

The Panasonic tape recorder presented at his criminal trial played at one-third normal speed, Kaiser said, but he said the recorder being used as evidence in the civil case operated at one-fourth normal speed. He also said tests showed that two tape recordings of Brereton and Lowe were not made on the tape recorder provided to Northwestern Bank in 1977 and that the two tapes were made on two different recorders, he said.

Kaiser said, "It is my belief based upon a review of tests that these modifications or manufacturing of evidence was performed by agents and/or employees of the Federal Bureau of Investigation as part of a conspiracy wherein the FBI acted in concert with plaintiffs Brereton and Lowe by attempting to convict me of a crime I did not commit ... and instituting the present civil suit as a retaliatory measure designed to drain me of funds necessarily spent in my defense."

Kaiser further charged that Brereton took documents out of the FBI files and that the bureau claims those papers are lost. He also said Brereton made misrepresentations to a grand jury which led to Kaiser's indictment on charges related to the buggings Brereton did that Kaiser said, so he could use the criminal trial to gather evidence for the civil case.

Duncan and Kaiser have filed motions for summary judgment and have asked for dismissal of the actions against them. Yesterday, attorneys for Northwestern Bank and Northwestern Financial Corp. also argued for summary judgment and dismissal.

"The bank was the one who was losing from this illegal activity" not just the customers, The bank," Richard Vanore, Northwestern attorney, said. "Because (Duncan) benefited is not sufficient to say the bank benefited and should be held responsible for his action."

He also charged that Brereton and Lowe are "seeking monetary damages as the real fruit of their criminal investigation"


The Sentinel
Winston-Salem, NC
Friday April 2, 1982

Bugging Expert Adds FBI To His Suit Against Agents

GREENSBORO, NC - A Maryland electronics expert is asking for more than $10 million in damages from the FBI, claiming that the agency as assisted two of its agents who were planning a lawsuit against him.

Martin L. Kaiser specializes in electronic surveillance (bugging), counter-surveillance and bomb detection equipment says in a document filed in federal court here that agents Thomas J. Brereton and Zachary T. Lowe were contemplating a lawsuit against him while they were involved in prosecuting him on criminal charges.

The FBI "actually assisted and enabled... Brereton and Lowe to gain access to information and records while on bureau time and through bureau resources of information directly bearing to the outcome of their proposed civil action", Kaiser claims.

He says in the document which is an amendment to an earlier counterclaims against the agents, that the FBI's action represents a "malicious motive for the institution and prosecution" of the criminal case against him "in violation of federal statutes which require federal agents with a conflict of interest to excuse themselves from such investigation".

Brereton and Lowe sued Kaiser in U. S. Middle District Court in July 1978, five months after he was found not guilty of charges of bugging them while they were conducting an investigation at Northwestern Bank in Wilkesboro in 1977.

The agents also sued the bank and its former president Edwin Duncan Jr., claiming that their right to privacy was violated by the bugging of the room they were using at the bank head quarters. The agents claim a total of $22 million in damages.

Several months later Kaiser filed a counterclaim against the agents claiming they abused the criminal process against him and asking for $720,000 in damages. The agents responded by denying that they had acted improperly in the criminal investigation and they asked for a dismissal of the counterclaim.

Kaiser's addition to the counterclaims filed this week asks that the United States be brought into the suit to represent the FBI, and he asks for an additional $10.7 million in damages.

U. S. Attorney Kenneth W. McAllister said this morning that "I certainly wouldn't comment on any pending civil actions".

Duncan and the bank have filed motions for dismissal of the agents' suit, and Duncan has asked the court for permission to file his own counterclaim against the government and prosecutors in a 1977 criminal case against him.

Duncan pleaded guilty to charges of conspiring to bug the agents. He spent several months in prison as the result of convictions on other charges stemming from the agents investigation.

No trial dates have been set in the lawsuit, which has become one of the most complex civil cases now pending in the district.


Periodically, my anger would boil over and I would send off a letter or two expressing my displeasure with the treatment I was getting. Here are two of those letters.

MARTIN L. KAISER, INC.
Countersurveillance ∑  Bomb Detection  ∑  Surveillance Electronics

9 July 1983

The White House
Washington, D C 20500

Attention: Mr Ronald Reagan, President

My Dear Mr President:

You certainly had no difficulty understanding the seriousness of the potential conflict of interest concerning the Carter briefing books so I am at a loss to understand why you failed to see just as obvious a conflict as outlined to you in my letter of 15 February, 1983.

First, let me state that your response placed me right back in the hands of my enemies and you certainly get no thanks for that.

Let me again cite some of the events that have occurred in my action against some corrupt FBI agents.

During the civil process one of the agent/plaintiffs revealed that they had been given my national security file. Check this out! Here I am fighting a corrupt group of FBI agents blindfolded, my hands tied behind my back, my cards being dealt face up and the bastards, in spite of that tremendous advantage, are dealing themselves from the bottom of the deck. No conflict, eh?

Every step of the way I have had to file subpoena after subpoena (at great expense) to obtain whatever material I needed to proceed with the case. When the FBI agent (the one with the sty in the eye) was pressed for an answer as to how many subpoenas he had issued for material in the case he responded "What do I have to worry...I'm the author.  I know what's in those files...my God, I wrote 80 percent of everything in those files. I've done probably 60 percent of the work, and Mr Lowe (he's the one with the hemorrhoid) the rest of it... I know what's in the files. I wrote them."!!! No conflict of interest, eh?

Bullshit!


Truly,




Martin L Kaiser
President

Encl:

P. O. BOX 171 ∑ COCKEYSVILLE, MARYLAND 21030 ∑ (301) 252-8810


MARTIN L. KAISER, INC.
Countersurveillance ∑ Bomb Detection ∑ Surveillance Electronics

27 July 1983

Federal Bureau of Investigation
Washington, D C 20535

Attention: William Webster, Director


Dear Mr Webster:

It seems ludicrous that I should be sending you a portion of the FBI manual of "Activities and Standards of Conduct" but since everyone else involved in the matter described in the attached article has forgotten about it I thought it best not to take any chances.

We now have a ruling from the Federal Court in North Carolina on my charges and they agree that your agents did indeed abuse both the criminal and civil process while acting under color of federal law. Granted they have the right of appeal but the issues raised fall within regulations covered by the manual of "Activities and Standards of Conduct."

I would like to call your attention to the following sections that I feel were violated by your agents. First, however, let me point out that the page enclosed is the first substantive one in the manual and is titled "Section I" so I must conclude that someone must have thought these issues important.

1-1(1) The agents did not conduct themselves in such a manner that created respect for the Government.

1-1(3)(a) The agents did create the appearance of using public office for private gain.

1-(3)(d) The agents did create the appearance of losing complete independence or impartiality.

1-(3}(f} The agents did conduct themselves in such a manner as to adversely affect my confidence in the integrity of the Government.

The remainder of 1~1(3) concerns conflict of interest and is revealing.

1-2 The agents did engage in dishonest and disgraceful conduct which was prejudicial to the Government.

In view of the incredible expense and loss of business reputation these agents have put me through along with their causing me to loose my confidence in the integrity of the Government I am herewith demanding that they be summarily fired. I'm sure you can find a way to do this without interfering with the civil suit. After all it has been you all along that has said this is a purely private matter.

I shall press all issues raised by this case to conclusion by the court of law but it's up to you whether or not my confidence in government is restored.


Truly,




Martin L Kaiser
President

Encl.

cc: President Reagan
Gerald McDowell

P. O. BOX 171 ∑ COCKEYSVILLE, MARYLAND 21030 ∑ (301) 252-8810

Hear are some letters expressing my continuing frustation and the value of damages that still accumulate.

Martin L. Kaiser, Inc.
MANUFACTURER OF SURVEILLANCE . COUNTERSURVEILLANCE . BOMB DETECTION EQUIPMENT

29 November 1999

Immigration Board
Department of Immigration
P.O. Box 1098GT
Grand Cayman
Cayman Islands

Reference: 007956

Attention: Liz Walton
Secretary, Immigration Board

Dear Ms. Walton:

This letter is in response to yours of 10 September, 1999 to Mr. John Bostock of John D.Bostock Associates.

For the past 27 years I have been a good citizen on the Cayman Islands and given generous financial and personal support to many, many charitable and civic organizations. On numerous I have assisted Royal Cayman Police Force in areas of my expertise. I sincerely regret the current state of affairs.

I place the blame for the destruction of my Cayman dream directly on the U.S. Federal Bureau of Investigation in particular and the U.S. intelligence community in general.  Allow me to explain.

Years ago your residency application asked "Have you ever been charged with a crime?" I would then have to say "Yes, I lawfully electronically bugged a couple of corrupt FBI agents." To express their displeasure they used the enormous power of the U.S. government to fabricate a crime, lie to a Grand Jury and falsely accuse me of committing that crime. They tampered with evidence they themselves had created and perjured themselves before the court. After I was acquitted they sued me for US$22,OOO,OOO claiming I caused them mental anguish. One agent claimed I aggravated the sty in his eye and the other that I aggravated his hemorrhoids. That suit lasted for nearly ten years and cost me hundreds of thousands of dollars before it was dismissed. You may go to my web site and read more about this story. You may not agree with my methods but I tell you that the price of freedom is not "free."

Recently that same question on your residency application was changed to "Have you ever been convicted of a crime?" I immediately reapplied to immigration and answered "NO." Now, it appears, my actions were too late.

You have a beautiful Island...don't loose it.   It is truly a pity that I shall not be part of it.

Respectfully,



Martin L. Kaiser
President



cc: Bostock & Assoc.
      U.S. Senator Barbara Mikulski (MD)


Martin L. Kaiser I Inc.
MANUFACTURER OF SURVEILLANCE. COUNTER SURVEILLANCE. BOMB DETECTION EQUIPMENT

28 January 1999

The Honorable Barbara A. Mikulski
United states Senate
253 The World Trade Center
401 East Pratt Street
Baltimore, Maryland 21202

Subject: A matter of fairness

Dear Senator Mikulski:

Recently, Sandia National Laboratories received a grant to develop a disrupter. A disrupter is a tool used by bomb technicians to disarm improvised explosive devices (IEDs) such as letter/mail, pipe or car bombs. Over the past 25 years I have sold hundreds of my disrupter to federal, state and local bomb squads.

The Federal Bureau of Investigation (FBI) then received a grant to purchase 400 disrupters of Sandia's design. What happened next is, to me, absolutely inconceivable. The FBI gave these disrupters away free of charge to virtually every bomb squad in the United states. My market went to zero overnight.  Since my disrupter sells for roughly $4,000.00, the FBI's action meant an instantaneous loss of $1,600,000.00!

Martin L. Kaiser, Inc. consists of myself and a part-time secretary.  I'm sure you can appreciate that a loss of this magnitude is totally devastating to a company the size of mine. There is absolutely no way I can compete with the FBI.

When I telephoned your office and spoke with a member of your staff he told me to make sure I tell you exactly what help I wanted.  Obviously, I would like you to help me recover from this loss. One solution would be to give the grant money directly to the bomb squads and allow them the option of choosing whatever disrupter is best for their needs.  I would appreciate hearing any ideas you may have to resolve this dilemma. Your kind assistance and guidance will determine the future of my company.

Supporting documentation is available for your review. Please do not hesitate contacting me with any questions or comments. Until then, I remain,


Truly,



Martin L. Kaiser, President

P.O. BOX 171 · COCKEYSVILLE, MARYLAND 21030 · U.S.A.
TEL: (410) 252-8810 . FAX: (410) 666-8790


United States Senate
Washington, D.C. 20510-2003


February 2,  1999

Mr. Martin L. Kaiser
President
Martin L. Kaiser, Inc.
P.O. Box 171
Cockeysville, Maryland 21030


Dear Mr. Kaiser:

Thank you for contacting me about the impact of the recent grant received by the Federal Bureau of Investigation on your business. In response to your concern, I have requested that Mr. Louis J. Freeh, Federal Bureau of Investigation take a look at this issue. I have asked Mr. Freeh to respond to you directly.  Thank you again for bringing this to my attention.



Sincerely,
Barbara A. Mikulski
United States Senator


Martin L. Kaiser, Inc.
MANUFACTURER OF SURVEILLANCE · COUNTER SURVEILLANCE · BOMB DETECTION EQUIPMENT


16 February 1999

The 'Honorable Barbara A. Mikulski
United states Senate
253 The World Trade Center
401 East Pratt Street
Baltimore, Maryland 21202

Subject: A matter of fairness

Dear Senator Mikulski:

With reference to your response to my letter of 28 February...WHY THE HECK DID YOU DO THAT!? My God, Senator, it doesn't take a rocket scientist to figure out that Mr. Freeh is a COMPETITOR and he is using the enormous power of the United States Government to enforce that position. If any of his employees show up at my door to "investigate" this matter they are going to find themselves on the street sitting on their butts. I trust you would agree that this is the proper response.

Mr. Freeh obviously has no concept, whatsoever, of how the free enterprise system works and therefore cannot self-judge the damage he has caused. This matter should be placed in the hands of Attorney General Janet Reno.  Would you be so kind as to assist in doing that? Please do not hesitate contacting me with any questions or comments. Until then, I remain,


Truly,




Martin L. Kaiser
President

cc: sp
     sb

P.O. BOX 171 · COCKEYSVILLE, MARYLAND 21030 · U.S.A.
TEL: (410) 252-8810 . FAX: (410) 666-8790


FBI AXIOM
If you lie in a court of law and get away with it, it is called "JUSTICE."
If you lie in a court of law and get caught, it is called "PERJURY."


Marty in His Lab


Note: In certain government circles it is "understood" that Martin L. Kaiser inspired Francis Ford Coppola to write the manuscript for "The Conversation" back in the early seventies. Some of Marty's FBI Story formed the basis for the new Jerry Bruckheimer/Tony Scott film "Enemy of the State" starring Gene Hackman, Will Smith, John Voit and Regina King.


Now is the time to read DESIDERATA     HOME

   © 2002

06/02    [Non-text portions of this message have been removed] 5536 From: Matthew Paulsen Date: Thu May 30, 2002 0:25pm Subject: RE: here is my latest handywork There goes another gig of my hard drive. Off to my filter rules. -----Original Message----- From: Marty Kaiser [mailto:martykaiser@p...] Sent: Friday, May 31, 2002 10:17 AM To: Undisclosed-Recipient:@pimout4-int.prodigy.net; Subject: [TSCM-L] here is my latest handywork [Non-text portions of this message have been removed] 5537 From: James M. Atkinson Date: Fri May 31, 2002 6:44pm Subject: Re: Newbie Intro At 10:02 PM -0400 5/29/02, D Patrick wrote: >Hi all. Dean Patrick here. I have BS in biology and computer science. >After working three years post undergrad I enrolled in law school. >Following graduation I will remain in the Detroit area and most likely >startup a patent firm. My interest in TSCM began way before I knew anything >about the topic. >A fourteen year old boy on the phone with his girlfriend. >Little brother >comes into his room to annoy him as ususal. No! Not this time. Little >brother informed the boy that while he was in father's office he could hear >his brothers' entire conversation. Father had spliced the line by the >laundry chute and tucked the wires out of casual view. Evaluation of the >line led the boy to behind his father's desk where a radio shack hookup of >some type was activating the tape recorder everytime the phone was in use. >Ouch. A crappy way to get interested, but here I am. > > >D. Patrick > > >ps > >when i go to the group page i can only post, i cannot read other messages. Welcome the group! -jma, The Moderator -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5538 From: James M. Atkinson Date: Fri May 31, 2002 6:44pm Subject: Archived is Locked Recently we had someone try to join the list (a bad guy) and I rejected his membership request, then he called up here in a snit and screamed and hollered about how he was going to have me murdered, raped, blown up, etc, etc. He then tricked one of the other list members into trying to delete the entire message archive. So I banned both offenders, and have locked the archive for a few weeks. Once things calm down I will reopen the archives, and in the meantime all of the message are being saved. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5539 From: James M. Atkinson Date: Fri May 31, 2002 6:45pm Subject: New Element Discovered: "Administratium" New Element Discovered: "Administratium" A major research institution has recently announced the discovery of the heaviest element yet known to science. This new element has been tentatively named "Administratium." Administratium has 1 neutron, 12 assistant neutrons, 75 deputy neutrons, and 111 assistant deputy neutrons, giving it an atomic mass of 312. These 312 particles are held together by a force called morons, which are surrounded by vast quantities of lepton-like particles called peons. Since Administratium has no electrons, it is inert. However, it can be detected as it impedes every reaction with which it comes into contact. A minute amount of Administratium causes one reaction to take over 4 days to complete, when it would normally require less than a second. Administratium has a normal half-life of 3 years; it does not decay, but instead undergoes a reorganization, in which a portion of the assistant neutrons and deputy neutrons and assistant deputy neutrons exchange places. In fact, Administratium's mass will actually increase over time, since each reorganization causes some morons to become neutron forming isodopes. This characteristic of moron-promotion leads some scientists to speculate that Administratium is formed whenever morons reach a certain quantity of concentration. This hypothetical quantity is referred to as "Critical Morass." You will know it when you see it -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5540 From: Marcel Date: Fri May 31, 2002 9:31pm Subject: Re: Archived is Locked I thought only Moderators can make changes to the archives? "James M. Atkinson" wrote: > Recently we had someone try to join the list (a bad guy) and I > rejected his membership request, then he called up here in a snit and > screamed and hollered about how he was going to have me murdered, > raped, blown up, etc, etc. > > He then tricked one of the other list members into trying to delete > the entire message archive. So I banned both offenders, and have > locked the archive for a few weeks. Once things calm down I will > reopen the archives, and in the meantime all of the message are being > saved. > > -jma > > -- > > -------------------------------------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------------------------------- > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > -------------------------------------------------------------------------------------------------- > "...three shall be the number to count, and the number to be counted shall > be three.....four shall thou not count......five is right out". - M. Python > -------------------------------------------------------------------------------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 5541 From: James M. Atkinson Date: Sat Jun 1, 2002 8:25am Subject: Re: Archived is Locked Yes, only the moderator can make changes; but they were trying to hack moderator privs (without success) and kept trying to delete the archives (again without success). Short after I banned Dennis from the list one of his close friends and associates (a convicted felon, career criminal, and mental patient) called here by phone in a obscene screaming snit. He then tried to join the list under a series of aliases, and was promptly rejected and banned. The "friend of Dennis" then called here and left 90 minutes of voice mail messages. The voice mails explain how he was going to pay some one to have me killed, how he was going to burn my house down, details about how he was going to get a hunting rifle and blow my head off, and so on. Between calls the "friend of Dennis" sent me a number of emails containing the same threats of violence. A few hours later the "friend of Dennis" called here with even more threats and started bragging how he was deleting the TSCM-L archives. A few hours later I checked the list logs and found that someone was indeed (unsuccessfully) attempting to obtain moderator privs, and was trying to delete the archives. I contacted the guy trying to change his privs and asked him what was going on. He explained that someone called him (claiming to be me) and offered to make him a list moderator. The caller then then walked him though a series of steps (that he didn't understand) and when the attempt was unsuccessful the caller hung up. As a result those involved have now been banned from the list, and the appropriate actions were taken. The archives are safe, and I have backup copies and mirrors in other locations just for safe keeping. -jma At 10:31 PM -0400 5/31/02, Marcel wrote: >I thought only Moderators can make changes to the archives? > >"James M. Atkinson" wrote: > >> Recently we had someone try to join the list (a bad guy) and I >> rejected his membership request, then he called up here in a snit and >> screamed and hollered about how he was going to have me murdered, >> raped, blown up, etc, etc. >> >> He then tricked one of the other list members into trying to delete >> the entire message archive. So I banned both offenders, and have >> locked the archive for a few weeks. Once things calm down I will >> reopen the archives, and in the meantime all of the message are being >> saved. >> > > -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5542 From: Marcel Date: Sat Jun 1, 2002 9:25am Subject: Re: Archived is Locked Geezee, Sickos everywhere! "James M. Atkinson" wrote: > Yes, only the moderator can make changes; but they were trying to > hack moderator privs (without success) and kept trying to delete the > archives (again without success). 5543 From: Jay Coote Date: Sat Jun 1, 2002 1:36pm Subject: Tek 1502-B Batteries? My 1502-B batts will no longer hold a charge. Which is easiest or cheapest, a whole new battery pack or augmenting my eyesight and putting new nicads in the pack? Thanks, Jay Coote Los Angeles Specialist in Technical Surveillance Countermeasures Lic: PI17926 TSCM@j... 5544 From: James M. Atkinson Date: Sat Jun 1, 2002 10:04pm Subject: Re: Tek 1502-B Batteries? At 2:45 PM -0400 6/1/02, Jay Coote wrote: >My 1502-B batts will no longer hold a charge. >Which is easiest or cheapest, a whole new battery pack or >augmenting my eyesight and putting new nicads in the pack? >Thanks, >Jay Coote >Los Angeles >Specialist in Technical Surveillance Countermeasures >Lic: PI17926 >TSCM@j... Remove and disassemble the NiCad pack, but DO NOT disconnect the actual batteries. Next, measure the voltage on each of the cells individually, and you should find one or two that are a different voltage then the rest (basically the cell is a dead short). If you physically inspect the sides and ends of the suspect cell you will find some swelling/splitting and possible leakage of electrolyte. Simply peel the tabs off the cell in question, and replace it with a similar size. Be EXTREMELY careful when you reattach the strap to the terminal as you can ruin a NiCad cell if you over-heat it. OK, now to explain. There is a flaw in all of the A and B series Tek 1502 and 1503 TDR (with the removable battery packs). Basically after a certain number of partial discharges and recharges small crystals build up in the NiCad cells. This eventually shorts out the bad cell, and will in time cause the entire battery pack to fail. The charging circuit in the 1500 A and B series units does not contain a decent charging circuit and it is prone to blowing cells. My personal preference is to build a single cell charger that does a "deep cycle charge" on a single cell. Then duplicate the circuit for the number of cells in the pack. When a single cell starts to flake out simple open the pack and replace the flakey cell before the whole pack goes bad. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5545 From: dp01011 Date: Sat Jun 1, 2002 1:15pm Subject: Archives for moderators only Hi Guys. Newbie here. Just got a partial email from the list. I only seem to get the first 1 or 2 messages then HTML garbage then end line. I saw the note from JMA on the archive lock. Hmmm. Then how can we search the archive and look at previous messages? I thought search capability would allow me to avoid asking repeat questions with a bit of research. I see the note on the side of the group page that says Archives for moderators only. Is that permanent? D. Patrick 5546 From: James M. Atkinson Date: Sun Jun 2, 2002 8:51pm Subject: Senior Moment An elderly Floridian called 911 on her cell phone to report that her car has been broken into. She is hysterical as she explains her situation to the dispatcher: "They've stolen the stereo, the steering wheel, the brake pedal and even the accelerator!" she cried. The dispatcher said, "Stay calm. An officer is on the way." A few minutes later, the officer radios in. "Disregard." He says. "She got in the back-seat by mistake." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5547 From: smartoldwolf Date: Sun Jun 2, 2002 3:39pm Subject: Aircraft Thought everyone might enjoy this. Subject: OT - Customer Warranty Form -- Hi there - this is a bit off-topic, but I have found so many interesting things on this group I thought you might enjoy it- This was allegedly posted very briefly on the McDonnell Douglas Website by an employee there who obviously has a sense of humor. The company, of course, does not have a sense of humor and made the web department take it down immediately. For once, the 'IMPORTANT' note at the end is worth a read, too. ---------------------------------------------------------- Thank you for purchasing a McDonnell Douglas military aircraft. In order to protect your new investment, please take a few moments to fill out the warranty registration card below. Answering the survey questions is not required, but the information will help us to develop new products that best meet your needs and desires. 1. Title: [_] Mr. [_] Mrs. [_] Ms. [_] Miss [_] Lt. [_] Gen. [_] Comrade [_] Classified [_] Other First Name: ................................................ Initial: ......... Last Name .......................................... Password: .......................... (max. 8 char) Code Name: ...................................... Latitude-Longitude-Altitude: ....................... 2. Which model aircraft did you purchase? [_] F-14 Tomcat [_] F-15 Eagle [_] F-16 Falcon [_] F-117A Stealth [_] Classified 3. Date of purchase (Year/Month/Day): ......./....... /...... 4. Serial Number: ........................................... 5. Please indicate where this product was purchased: [_] Received as gift / aid package [_] Catalogue / showroom [_] Independent arms broker [_] Mail order [_] Discount store [_] Government surplus [_] Classified 6. Please indicate how you became aware of the McDonnell Douglas product you have just purchased: [_] Heard loud noise, looked up [_] Store display [_] Espionage [_] Recommended by friend / relative / ally [_] Political lobbying by manufacturer [_] Was attacked by one 7. Please indicate the three (3) factors that most influenced your decision to purchase this McDonnell Douglas product: [_] Style / appearance [_] Speed / maneuverability [_] Price / value [_] Comfort / convenience [_] Kickback / bribe [_] Recommended by salesperson [_] McDonnell Douglas reputation [_] Advanced Weapons Systems [_] Backroom politics [_] Negative experience opposing one in combat 8. Please indicate the location(s) where this product will be used: [_] North America [_] Iraq [_] Iraq [_] Aircraft carrier [_] Iraq [_] Europe [_] Iraq [_] Middle East (not Iraq) [_] Iraq [_] Africa [_] Iraq [_] Asia / Far East [_] Iraq [_] Misc. Third World countries [_] Iraq [_] Classified [_] Iraq 9. Please indicate the products that you currently own or intend to purchase in the near future: [_] Color TV [_] VCR [_] ICBM [_] Killer Satellite [_] CD Player [_] Air-to-Air Missiles [_] Space Shuttle [_] Home Computer [_] Nuclear Weapon 10. How would you describe yourself or your organization? (Indicate all that apply): [_] Communist / Socialist [_] Terrorist [_] Crazed [_] Neutral [_] Democratic [_] Dictatorship [_] Corrupt [_] Primitive / Tribal 11. How did you pay for your McDonnell Douglas product? [_] Deficit spending [_] Cash [_] Suitcases of cocaine [_] Oil revenues [_] Personal check [_] Credit card [_] Ransom money [_] Traveler's check 12. Your occupation: [_] Homemaker [_] Sales / Marketing [_] Revolutionary [_] Clerical [_] Mercenary [_] Tyrant [_] Middle Management [_] Eccentric Billionaire [_] Defense Minister / General [_] Retired [_] Student 13. To help us better understand our customers, please indicate the interests and activities in which you and your spouse enjoy participating on a regular basis: [_] Golf [_] Boating / Sailing [_] Sabotage [_] Running / Jogging [_] Propaganda / Misinformation [_] Destabilization / Overthrow [_] Default on Loans [_] Gardening [_] Crafts [_] Black Market / Smuggling [_] Collectibles / Collections [_] Watching Sports on TV [_] Wines [_] Interrogation / Torture [_] Household Pets [_] Crushing Rebellions [_] Espionage / Reconnaissance [_] Fashion Clothing [_] Border disputes [_] Mutually Assured Destruction Thank you for taking the time to fill out this questionnaire. Your answers will be used in market studies that will help McDonnell Douglas serve you better in the future - as well as allowing you to receive mailings and special offers from other companies, governments, extremist groups, and mysterious consortia. As a bonus for responding to this survey, you will be registered to win a brand new F-117A in our Desert Thunder Sweepstakes! Comments or suggestions about our fighter planes? Please write to: McDONNELL DOUGLAS CORPORATION Marketing Department Military, Aerospace Division IMPORTANT NOTE: This e-mail is intended for the use of the individual addressee(s) named above and may contain information that is confidential, privileged or unsuitable for overly sensitive persons with low self-esteem, no sense of humor or irrational religious beliefs. If you are not the intended recipient, any dissemination, distribution or copying of this e-mail is not authorized (either explicitly or implicitly) and constitutes an irritating social faux pas. Unless the word absquatulation has been used in its correct context somewhere other than in this warning, it does not have any legal or grammatical use and may be ignored. No animals were harmed in the transmission of this e-mail, although the Kelpie next door is living on borrowed time, let me tell you. Those of you with an overwhelming fear of the unknown will be gratified to learn that there is no hidden message revealed by reading this warning backwards, so just ignore that alert notice from Microsoft. However, by pouring a complete circle of salt around yourself and your computer, you can ensure that no harm befalls you and your pets. --McDonnell Douglas 5548 From: Aimee Farr Date: Sun Jun 2, 2002 6:06pm Subject: Cell phone jammer exports Does that require export reporting? It could be a nice indicator. If not, maybe we should. ~Aimee 5549 From: Marcel Date: Mon Jun 3, 2002 3:49am Subject: Bomb concealed in a cellphone http://www.cellular-news.com/story/6848_print.html -- [Non-text portions of this message have been removed] 5550 From: Andrus Aaslaid Date: Mon Jun 3, 2002 4:05am Subject: RE: Archived is Locked > The "friend of Dennis" then called here and left 90 minutes of voice > mail messages. The voice mails explain how he was going to pay some > one to have me killed, how he was going to burn my house down, > details about how he was going to get a hunting rifle and blow my > head off, and so on. Between calls the "friend of Dennis" sent me a > number of emails containing the same threats of violence. Could make a nice educational tool, if you hang it up in files section .. :) Andrus. 5551 From: Andrus Aaslaid Date: Mon Jun 3, 2002 4:15am Subject: RE: Bomb concealed in a cellphone About two years ago, there were two conseqtive explosions in Estonian Stockmann retail outlet, caused by cellphone-bomb. http://www.balticsww.com/wkcrier/0508_0710_00.htm They traced down the pack of three people behind it and so far there has been no connection reported with intelligence agencies. It is just that new generation of criminal and technically capable minds have been establishing their presence in a world ... Andrus. > http://www.cellular-news.com/story/6848_print.html > -- > > > 5552 From: Marcel Date: Mon Jun 3, 2002 4:24am Subject: HOW ARAFAT PLANNED TERROR CAMPAIGN http://www.bjeny.org/241.htm -- [Non-text portions of this message have been removed] From: Jay Coote Date: Tue May 30, 2000 11:29pm Subject: Tel switch/pbx repair firms near Los Angeles? Could someone email me information on reliable (screened?) telephone switch or pbx repair firms or persons in Los Angeles or Southern CA? This is a favor for a client who has a small business and in-house switch. Thanks, Jay Coote Los Angeles TSCM@j... 453 From: Jay Coote Date: Tue May 30, 2000 11:56pm Subject: Re: Spectrum Analyzer Service Gordon; I would like to hear of any repair facilities... Sounds as if you've been there/done that. Jay ---------- > Except Tek doesn't fix, support, or sell parts for 492s anymore. How do you > think I know this bit of trivia? > > Gordon Mitchell > Future Focus, Inc > Electronic eavesdropping detection & finding clues in computers. > (888) BUG-KILR > > "James M. Atkinson, Comm-Eng" wrote: > > > At 7:33 PM -0400 5/30/00, Jay Coote wrote: > > >I'm looking for reliable shops near Los Angeles or in Southern CA > > >who can service some Tektronics 492s, a 492-BP... and other test > > >equipment as the need arises. > > >Thanks, > > >Jay Coote > > > > Drop it off with Tek, they still have the best prices (and will > > usually not stiff you for parts you don't need). > > > > I believe you can still get the flat fee repair rate on them so long > > as nothing has been hacked up, and you haven't blown out anything > > major due to abuse. > > > > I had to replace the CRT and internal mixer on a 494 A/P last year > > (Delta dropped the transit case), and the flat fee repair saved me a > > bloody fortune. > > > > I would strongly advise you to get all of your major equipment on a > > service plan with prepaid yearly calibrations (I buy mine 5 years at > > a time). If you feel like spending a little extra money you can also > > get the policy written so you have a loaner while your gear in at the > > lab. > > > > -jma > > > > =================================================================== > > Do not meddle in the affairs of dragons, > > for you are crunchy and taste good with ketchup. > > =================================================================== > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group > > 127 Eastern Avenue #291 http://www.tscm.com/ > > Gloucester, MA 01931-8008 jmatk@tscm.com > > =================================================================== > > Nil carborundum illigitimi > > =================================================================== > > > > ------------------------------------------------------------------------ > > Missing old school friends? Find them here: > > http://click.egroups.com/1/4055/1/_/507420/_/959730749/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > ------------------------------------------------------------------------ > Hot off the press- summer's here! > School's out and it's sizzling hot. Whether you're planning a > graduation party, a summer brunch, or simple birthday party, > shop GreatEntertaining.com before your next celebration. > http://click.egroups.com/1/4473/1/_/507420/_/959742674/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 454 From: Charles Patterson Date: Tue May 30, 2000 11:13pm Subject: Re: Tel switch/pbx repair firms near Los Angeles? Jay, let me know the make of the pbx (and perhaps the nature of the problem). I have lists of many places that could probably do it. We can try to narrow it down to find the best one for you. Charles ----- Original Message ----- From: Jay Coote To: Sent: Wednesday, May 31, 2000 12:29 AM Subject: [TSCM-L] Tel switch/pbx repair firms near Los Angeles? > > Could someone email me information on reliable (screened?) telephone switch or pbx repair > firms or persons in Los Angeles or Southern CA? This is a favor for a client who has a small business and in-house switch. > Thanks, > Jay Coote > Los Angeles > TSCM@j... > > > ------------------------------------------------------------------------ > Hot off the press- summer's here! > School's out and it's sizzling hot. Whether you're planning a > graduation party, a summer brunch, or simple birthday party, > shop GreatEntertaining.com before your next celebration. > http://click.egroups.com/1/4473/1/_/507420/_/959747366/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 455 From: Gordon Mitchell Date: Wed May 31, 2000 2:08am Subject: Re: Spectrum Analyzer Service I work with a local tech who does quite a bit of the west coast 492 work. He is in Seattle, however. My guess is that you will want to find someone in LA. I will ask him. Likely others have mentioned that the date on your computer is a pain for those receiving mail. Most of us sort by date and have to work through the list to weed your contributions out. Jay Coote wrote: > Gordon; > I would like to hear of any repair facilities... > Sounds as if you've been there/done that. > Jay > > ---------- > > Except Tek doesn't fix, support, or sell parts for 492s anymore. How do you > > think I know this bit of trivia? > > > > Gordon Mitchell > > Future Focus, Inc > > Electronic eavesdropping detection & finding clues in computers. > > (888) BUG-KILR > > > > "James M. Atkinson, Comm-Eng" wrote: > > > > > At 7:33 PM -0400 5/30/00, Jay Coote wrote: > > > >I'm looking for reliable shops near Los Angeles or in Southern CA > > > >who can service some Tektronics 492s, a 492-BP... and other test > > > >equipment as the need arises. > > > >Thanks, > > > >Jay Coote > > > > > > Drop it off with Tek, they still have the best prices (and will > > > usually not stiff you for parts you don't need). > > > > > > I believe you can still get the flat fee repair rate on them so long > > > as nothing has been hacked up, and you haven't blown out anything > > > major due to abuse. > > > > > > I had to replace the CRT and internal mixer on a 494 A/P last year > > > (Delta dropped the transit case), and the flat fee repair saved me a > > > bloody fortune. > > > > > > I would strongly advise you to get all of your major equipment on a > > > service plan with prepaid yearly calibrations (I buy mine 5 years at > > > a time). If you feel like spending a little extra money you can also > > > get the policy written so you have a loaner while your gear in at the > > > lab. > > > > > > -jma > > > > > > =================================================================== > > > Do not meddle in the affairs of dragons, > > > for you are crunchy and taste good with ketchup. > > > =================================================================== > > > James M. Atkinson Phone: (978) 381-9111 > > > Granite Island Group > > > 127 Eastern Avenue #291 http://www.tscm.com/ > > > Gloucester, MA 01931-8008 jmatk@tscm.com > > > =================================================================== > > > Nil carborundum illigitimi > > > =================================================================== > > > > > > ------------------------------------------------------------------------ > > > Missing old school friends? Find them here: > > > http://click.egroups.com/1/4055/1/_/507420/_/959730749/ > > > ------------------------------------------------------------------------ > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > ------------------------------------------------------------------------ > > Hot off the press- summer's here! > > School's out and it's sizzling hot. Whether you're planning a > > graduation party, a summer brunch, or simple birthday party, > > shop GreatEntertaining.com before your next celebration. > > http://click.egroups.com/1/4473/1/_/507420/_/959742674/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > ------------------------------------------------------------------------ > Hot off the press- summer's here! > School's out and it's sizzling hot. Whether you're planning a > graduation party, a summer brunch, or simple birthday party, > shop GreatEntertaining.com before your next celebration. > http://click.egroups.com/1/4473/1/_/507420/_/959748979/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 456 From: Robert G. Ferrell Date: Wed May 31, 2000 7:26am Subject: Re: Plan for World Domination [C Programmer Humor] I've got a couple more functions for that program: check(OS) { return; } if (OS == "Microsoft") { panic("Warning: Faulty Operating System Detected"); suggest("Load Linux Now?"); dump(OS); salvage; } RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center, US DoI Robert_G_Ferrell@n... ------------------------------------------------------------ Nothing I have ever said should be construed as even vaguely representing an official statement by the NBC or DoI. ------------------------------------------------------------ 457 From: Jay Coote Date: Wed May 31, 2000 9:36am Subject: Re: Spectrum Analyzer Service Gordon (and list) Thanks. Yes, please email your 492 tech's info, also his number and email address in case I have to ship one of these puppies as a last resort. Excuse the date error, it's not a clock thing, but a Microsoft thing in this older browser and PC. It will be resolved when I upgrade. ---------- > I work with a local tech who does quite a bit of the west coast 492 work. He is > in Seattle, however. My guess is that you will want to find someone in LA. I > will ask him. > > Likely others have mentioned that the date on your computer is a pain for > those receiving mail. Most of us sort by date and have to work through the > list to weed your contributions out. > > Jay Coote wrote: > > > Gordon; > > I would like to hear of any repair facilities... > > Sounds as if you've been there/done that. > > Jay > > > > ---------- > > > Except Tek doesn't fix, support, or sell parts for 492s anymore. How do > you > > > think I know this bit of trivia? > > > > > > Gordon Mitchell > > > Future Focus, Inc > > > Electronic eavesdropping detection & finding clues in computers. > > > (888) BUG-KILR > > > > > > "James M. Atkinson, Comm-Eng" wrote: > > > > > > > At 7:33 PM -0400 5/30/00, Jay Coote wrote: > > > > >I'm looking for reliable shops near Los Angeles or in Southern CA > > > > >who can service some Tektronics 492s, a 492-BP... and other test > > > > >equipment as the need arises. > > > > >Thanks, > > > > >Jay Coote > > > > > > > > Drop it off with Tek, they still have the best prices (and will > > > > usually not stiff you for parts you don't need). > > > > > > > > I believe you can still get the flat fee repair rate on them so long > > > > as nothing has been hacked up, and you haven't blown out anything > > > > major due to abuse. > > > > > > > > I had to replace the CRT and internal mixer on a 494 A/P last year > > > > (Delta dropped the transit case), and the flat fee repair saved me a > > > > bloody fortune. > > > > > > > > I would strongly advise you to get all of your major equipment on a > > > > service plan with prepaid yearly calibrations (I buy mine 5 years at > > > > a time). If you feel like spending a little extra money you can also > > > > get the policy written so you have a loaner while your gear in at the > > > > lab. > > > > > > > > -jma > > > > > > > > =================================================================== > > > > Do not meddle in the affairs of dragons, > > > > for you are crunchy and taste good with ketchup. > > > > =================================================================== > > > > James M. Atkinson Phone: (978) 381-9111 > > > > Granite Island Group > > > > 127 Eastern Avenue #291 http://www.tscm.com/ > > > > Gloucester, MA 01931-8008 jmatk@tscm.com > > > > =================================================================== > > > > Nil carborundum illigitimi > > > > =================================================================== > > > > > > > > ------------------------------------------------------------------------ > > > > Missing old school friends? Find them here: > > > > http://click.egroups.com/1/4055/1/_/507420/_/959730749/ > > > > ------------------------------------------------------------------------ > > > > > > > > ======================================================== > > > > TSCM-L Technical Security Mailing List > > > > "In a multitude of counselors there is strength" > > > > > > > > To subscribe to the TSCM-L mailing list visit: > > > > http://www.onelist.com/community/TSCM-L > > > > > > > > or email your subscription request to: > > > > subTSCM-L@t... > > > > =================================================== TSKS > > > > > > > > > ------------------------------------------------------------------------ > > > Hot off the press- summer's here! > > > School's out and it's sizzling hot. Whether you're planning a > > > graduation party, a summer brunch, or simple birthday party, > > > shop GreatEntertaining.com before your next celebration. > > > http://click.egroups.com/1/4473/1/_/507420/_/959742674/ > > > ------------------------------------------------------------------------ > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > > > > > ------------------------------------------------------------------------ > > Hot off the press- summer's here! > > School's out and it's sizzling hot. Whether you're planning a > > graduation party, a summer brunch, or simple birthday party, > > shop GreatEntertaining.com before your next celebration. > > http://click.egroups.com/1/4473/1/_/507420/_/959748979/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > ------------------------------------------------------------------------ > Hot off the press- summer's here! > School's out and it's sizzling hot. Whether you're planning a > graduation party, a summer brunch, or simple birthday party, > shop GreatEntertaining.com before your next celebration. > http://click.egroups.com/1/4473/1/_/507420/_/959756902/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 458 From: Andre Holmes <1ach@g...> Date: Mon May 29, 2000 5:44am Subject: Re: Equip. Hello Jay the Icom 8500 is a good reciever to have in your bag, however you need a set of freq. to input to the reciever so you need a data base of wirelless video freq good luck trying to get them Ive had trouble trying to get them from circuit something they sell video pagers etc.also 5.7 gig is a threat to consider. -----Original Message----- From: Jay Coote To: TSCM-L@egroups.com Date: Sunday, May 28, 2000 10:14 PM Subject: Re: [TSCM-L] Equip. >Andy; >I am going through a receiver upgrade myself. I am considering the Icom R-8500 which covers 100 KHz - 2 GHz. I am also looking into the AOR AR-5000 which is supposed to cover 10 KHz -2 Ghz. I might consider the TVR-7100 (nomenclature correct?) TV demodulator for the R-8500. It is supposed to allow the R-8500 to demodulate NTSC or PAL video (the user supplies a small monitor). Then there are subcarriers to monitor and the >question of a spectral display (although I could pipe the IF to my Tektronics microwave spectrum analyzer) I believe Icom, or inquiring on the scanner and SWL reflectors might find you some control software. I find that the cheaper handheld/mobile receivers are sometimes "numb" or else have a lot of internal spurs to stop the scan. > >I'm also looking for a microwave downconvertor... 2-4 Ghz input and output (IF) of 100 Khz-2 Ghz to be used with one of my receivers and extend it's coverage to 4 Ghz. > >Jay Coote (W6CJ) >Los Angeles > >---------- >> I know this has been discussed before, but I did not save the messages as it >> was not relevant 2 me then. >> >> I now wish to buy a broad band RX for hobby use which can double as a TSCM >> tool. If it can TX too it's a bonus. I am a licenced radio dealer and can >> legally posess ANY RF equipment. I am also a radio ham (ZR6UU) and have 3 >> VHF frequencies licenced to me for business use. >> >> We deal at up to government level but our 'experts' there don't cast a >> shaddow on the US experts. >> >> I'm looking for suggestions of cost effective product combinations (RX - >> PC - Software). >> >> My dealer suggests: >> >> AR 8000 or 8200 + Optronics 'sniffers' >> >> or Yaesu/Icon broadbands. I think the (UK) Audiotel stuff uses Icon kit plus >> a 2-3 gig converter. >> >> Advice will be appriciated >> >> Andy Grudko (CEO) >> Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & >> intelligence - Est 1981 >> Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 >> countries >> (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, >> SASFed, >> SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) >> www.grudko.com - "When you need it done right -first time" >> >> >> >> ------------------------------------------------------------------------ >> Old school buds here: >> http://click.egroups.com/1/4057/1/_/507420/_/959520816/ >> ------------------------------------------------------------------------ >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.onelist.com/community/TSCM-L >> >> or email your subscription request to: >> subTSCM-L@t... >> =================================================== TSKS >> >> > > > >------------------------------------------------------------------------ >eGroups members: $60 in FREE calls! Join beMANY! >And pay less each month for long distance. >http://click.egroups.com/1/4122/1/_/507420/_/959566467/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > 459 From: James M. Atkinson, Comm-Eng Date: Wed May 31, 2000 11:11am Subject: Re: Equip. Jay, I have already assembled the bug frequency list you are talking about, and you can download it free of charge from my website. I actually maintain a database of hundreds of thousands eavesdropping devices (dating back 20 years), and it contains well over 1 million specific bugging frequencies. You can find it at: http://www.tscm.com/TSCM101bugfreq.html Of course you still need to check the entire spectrum with a spectrum analyzer, but it can be profoundly enlightening to dump a list of bug freq into a scanner, and to "drive around town" or go park a block away from your local spyshop. -jma At 6:44 AM -0400 5/29/00, Andre Holmes wrote: >Hello Jay the Icom 8500 is a good reciever to have in your bag, however you >need a set of freq. to input to the reciever so you need a data base of >wirelless video freq good luck trying to get them Ive had trouble trying to >get them from circuit something they sell video pagers etc.also 5.7 gig is a >threat to consider. >-----Original Message----- >From: Jay Coote >To: TSCM-L@egroups.com >Date: Sunday, May 28, 2000 10:14 PM >Subject: Re: [TSCM-L] Equip. > > > >Andy; > >I am going through a receiver upgrade myself. I am considering the Icom >R-8500 which covers 100 KHz - 2 GHz. I am also looking into the AOR AR-5000 >which is supposed to cover 10 KHz -2 Ghz. I might consider the TVR-7100 >(nomenclature correct?) TV demodulator for the R-8500. It is supposed to >allow the R-8500 to demodulate NTSC or PAL video (the user supplies a small >monitor). Then there are subcarriers to monitor and the > >question of a spectral display (although I could pipe the IF to my >Tektronics microwave spectrum analyzer) I believe Icom, or inquiring on the >scanner and SWL reflectors might find you some control software. I find >that the cheaper handheld/mobile receivers are sometimes "numb" or else have >a lot of internal spurs to stop the scan. > > > >I'm also looking for a microwave downconvertor... 2-4 Ghz input and output >(IF) of 100 Khz-2 Ghz to be used with one of my receivers and extend it's >coverage to 4 Ghz. > > > >Jay Coote (W6CJ) > >Los Angeles > > > >---------- > >> I know this has been discussed before, but I did not save the messages as >it > >> was not relevant 2 me then. > >> > >> I now wish to buy a broad band RX for hobby use which can double as a >TSCM > >> tool. If it can TX too it's a bonus. I am a licenced radio dealer and can > >> legally posess ANY RF equipment. I am also a radio ham (ZR6UU) and have 3 > >> VHF frequencies licenced to me for business use. > >> > >> We deal at up to government level but our 'experts' there don't cast a > >> shaddow on the US experts. > >> > >> I'm looking for suggestions of cost effective product combinations (RX - > >> PC - Software). > >> > >> My dealer suggests: > >> > >> AR 8000 or 8200 + Optronics 'sniffers' > >> > >> or Yaesu/Icon broadbands. I think the (UK) Audiotel stuff uses Icon kit >plus > >> a 2-3 gig converter. > >> > >> Advice will be appriciated > >> > >> Andy Grudko (CEO) > >> Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & > >> intelligence - Est 1981 > >> Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 > >> countries > >> (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, > >> SASFed, > >> SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) > >> www.grudko.com - "When you need it done right -first time" > >> > >> > >> > >> ------------------------------------------------------------------------ > >> Old school buds here: > >> http://click.egroups.com/1/4057/1/_/507420/_/959520816/ > >> ------------------------------------------------------------------------ > >> > >> ======================================================== > >> TSCM-L Technical Security Mailing List > >> "In a multitude of counselors there is strength" > >> > >> To subscribe to the TSCM-L mailing list visit: > >> http://www.onelist.com/community/TSCM-L > >> > >> or email your subscription request to: > >> subTSCM-L@t... > >> =================================================== TSKS > >> > >> > > > > > > > >------------------------------------------------------------------------ > >eGroups members: $60 in FREE calls! Join beMANY! > >And pay less each month for long distance. > >http://click.egroups.com/1/4122/1/_/507420/_/959566467/ > >------------------------------------------------------------------------ > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > >=================================================== TSKS > > > > > >------------------------------------------------------------------------ >Hot off the press- summer's here! >School's out and it's sizzling hot. Whether you're planning a >graduation party, a summer brunch, or simple birthday party, >shop GreatEntertaining.com before your next celebration. >http://click.egroups.com/1/4473/1/_/507420/_/959788324/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 460 From: Date: Wed May 31, 2000 11:23am Subject: Scanlock I regularly view the list but have not commented in the past. However a number of your members have taken to sniping at Audiotel, and Scanlock in particular has been getting some unfair press in recent postings: please allow me to redress the balance. Audiotel International are a UK based manufacturer of countermeasures equipment, we have been for over 21 years. Many US based TSCM operatorsí experience of Scanlock relates to the large numbers of units sold to the US Government in the early 80ís which although obsolete appeared on the commercial market as Government Surplus many years ago. Some of these 15 ñ 20 year old units are still in use. I assume one correspondentís comment was based on such a unit. As to our lack of support and being ëexpensiveí, all our TSCM equipment carries a 2 years parts and labour warranty, this extends to 5 years with annual service and calibration. We try to provide support and back-up for the lifetime of our equipment - for example we recently serviced a unit that we manufactured in 1980. On a number of occasions we have repaired units while the sweeper sat in our reception with a cup of coffee, en route to a contract. Our service rates directly relate to labour and material costs and we have often carried out repairs free of charge. I hope this clarifies our servicing policy. Criticising other manufacturers as a means of making yourself look good is in our view counterproductive. If you have to make a sale by maligning your competitors, your equipment, by default, must be inferior. I will not SPAM the list with unsolicited advertising, however a pdf datasheet of the new Scanlock M2 countermeasures receiver is attached. DC to 5GHz with down-converters from 35GHz later in the year. Open if you wish, donít if you donít. We welcome valid, constructive criticism or suggestions which help us give you, the users, the tools you want. Adrian Hickey Sales Manager Audiotel International Ltd. [Non-text portions of this message have been removed] 461 From: James M. Atkinson, Comm-Eng Date: Wed May 31, 2000 11:24am Subject: Re: Spectrum Analyzer Service Sure they will, but the unit has to be on an active service contract (they stopped taking "Walk-Ins" sometime early year). Getting technical support, and repairs service for the 492, 496, 494 or any other instrument tends to be quite tricky once they are no longer in production. I set up my last service contacts back in 97, so I am OK until 2002, but after that the units become boat anchors. This is why the 492/494/496 instruments are so cheap to buy (no parts, no service, no software, no calibrations, etc). The government started dumping them literally by the pallet for scrap value about three years ago, and it's common to snap them up (by the pallet) for just over a grand each (but your still buying a boat anchor). Unless you are under a service contract they (Tek) will not touch your equipment if it is this old (just try getting your 7L plug-ins fixed). There are a number of major firm like Test Equity, and Tucker who can facilitate your repair and calibrations, but as time goes by the cost will skyrocket. Just a helpful hint... Try to only buy your instruments new, and only buy the most recent model. ALWAYS buy a long term service and calibration plan. Also, insure the living daylights out of it, and get two full sets of PRINTED Manuals when you buy the instrument. As soon as you find out the company is going to stop production try to "trade-up" the instrument (about every 5-10 years). If you itching to buy a spectrum analyzer try to buy one that was introduced within the last 2-3 years, that way you can squeeze a good ten years of life out of it. -jma At 8:11 PM -0700 5/30/00, Gordon Mitchell wrote: >Except Tek doesn't fix, support, or sell parts for 492s anymore. >How do you think I know this bit of trivia? > >Gordon Mitchell >Future Focus, Inc >Electronic eavesdropping detection & finding clues in computers. >(888) BUG-KILR > >"James M. Atkinson, Comm-Eng" wrote: > > > At 7:33 PM -0400 5/30/00, Jay Coote wrote: > > >I'm looking for reliable shops near Los Angeles or in Southern CA > > >who can service some Tektronics 492s, a 492-BP... and other test > > >equipment as the need arises. > > >Thanks, > > >Jay Coote > > > > Drop it off with Tek, they still have the best prices (and will > > usually not stiff you for parts you don't need). > > > > I believe you can still get the flat fee repair rate on them so long > > as nothing has been hacked up, and you haven't blown out anything > > major due to abuse. > > > > I had to replace the CRT and internal mixer on a 494 A/P last year > > (Delta dropped the transit case), and the flat fee repair saved me a > > bloody fortune. > > > > I would strongly advise you to get all of your major equipment on a > > service plan with prepaid yearly calibrations (I buy mine 5 years at > > a time). If you feel like spending a little extra money you can also > > get the policy written so you have a loaner while your gear in at the > > lab. > > > > -jma > > > > =================================================================== > > Do not meddle in the affairs of dragons, > > for you are crunchy and taste good with ketchup. > > =================================================================== > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group > > 127 Eastern Avenue #291 http://www.tscm.com/ > > Gloucester, MA 01931-8008 jmatk@tscm.com > > =================================================================== > > Nil carborundum illigitimi > > =================================================================== > > > > ------------------------------------------------------------------------ > > Missing old school friends? Find them here: > > http://click.egroups.com/1/4055/1/_/507420/_/959730749/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > >------------------------------------------------------------------------ >Hot off the press- summer's here! >School's out and it's sizzling hot. Whether you're planning a >graduation party, a summer brunch, or simple birthday party, >shop GreatEntertaining.com before your next celebration. >http://click.egroups.com/1/4473/1/_/507420/_/959742674/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 462 From: James M. Atkinson, Comm-Eng Date: Wed May 31, 2000 11:43am Subject: Re: Scanlock Adrian, Personally, I still own an older Scanlock, but prefer to use a higher end computer controlled digital spectrum analyzer and receiver system instead. As the list moderator I would invite you to post a full set of materials concerning the Scanlock and the related products you offer to the TSCM-L mailing list. Since file attachments are forbidden by list rules, I would request that you simply create a list posting, and send the materials as a simple text posting. I would also encourage you to periodically plug you own products on the list, but try to keep it technical, and not sales related. While a few list members may consider it spam, I would consider it be a fair subject for discussion, and would value your input to the list and materials for your products. Also, please feel free to plug your own website, and post a link to it periodically. Between the 410+ list members there are at least 35 ScanLocks, and I know of one specific list member has 12 Scanlocks alone (and he wouldn't part with them for anything). Regards, -jma At 5:23 PM +0100 5/31/00, Adrian@a... wrote: >I regularly view the list but have not commented in the past. However a >number of your members have taken to sniping at Audiotel, and Scanlock in >particular has been getting some unfair press in recent postings: please >allow me to redress the balance. > >Audiotel International are a UK based manufacturer of countermeasures >equipment, we have been for over 21 years. Many US based TSCM operatorsí >experience of Scanlock relates to the large numbers of units sold to the >US Government in the early 80ís which although obsolete appeared on the >commercial market as Government Surplus many years ago. Some of these 15 ñ >20 year old units are still in use. I assume one correspondentís comment >was based on such a unit. > >As to our lack of support and being ëexpensiveí, all our TSCM equipment >carries a 2 years parts and labour warranty, this extends to 5 years with >annual service and calibration. We try to provide support and back-up for >the lifetime of our equipment - for example we recently serviced a unit >that we manufactured in 1980. On a number of occasions we have repaired >units while the sweeper sat in our reception with a cup of coffee, en >route to a contract. Our service rates directly relate to labour and >material costs and we have often carried out repairs free of charge. I >hope this clarifies our servicing policy. > >Criticising other manufacturers as a means of making yourself look good is >in our view counterproductive. If you have to make a sale by maligning >your competitors, your equipment, by default, must be inferior. > >I will not SPAM the list with unsolicited advertising, however a pdf >datasheet of the new Scanlock M2 countermeasures receiver is attached. DC >to 5GHz with down-converters from 35GHz later in the year. Open if you >wish, donít if you donít. > >We welcome valid, constructive criticism or suggestions which help us give >you, the users, the tools you want. > >Adrian Hickey >Sales Manager >Audiotel International Ltd. =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 463 From: Date: Wed May 31, 2000 8:21am Subject: Re: Scanlock In a message dated 5/31/00 9:24:19 AM Pacific Daylight Time, Adrian@a... writes: << sniping at Audiotel, and Scanlock in particular >> RRAAHH - Stop - Red Equipment is important but not as much as knowledge. How many CM technicians on this list can't draw the schematic of a flashlight? I used various Scanlock's from 1978-1995 and they always did the job well. I know for a fact that many are still in use. The company builds good equipment that works. They also have a very innovative and "state of the art" line of "positive" gear. They know their stuff period. Delurking, I owned and operated Sherwood Communications from 1985-95. I've done well over 200 sweeps, hundreds of covert CCTV installs, and ghost written several books on these subjects. While I haven't done a sweep in five years, I'm still very much in the loop. Big Boy's Toys are part of why you guys are in it. Give me a double headed screwdriver and a paperclip and I'll outsweep 90% of you guys. Add a can wrench and it's 95% If you give me a VOM, 1059 and an SCD5 it'll be 98.5%. Michael 464 From: James M. Atkinson, Comm-Eng Date: Wed May 31, 2000 0:22pm Subject: Spycraft - A Chat with Chris Wallace Check out the following link: http://abcnews.go.com/sections/world/DailyNews/000526_spycraft_wallace _chat.html Internet Expose: Spycraft Chat with Chris Wallace May 26 - The world celebrated the destruction of the Berlin Wall and the symbolic end to the Cold War - with a renewed hope of better relations between East and West. But how did we get there? What forces were working behind the scenes to maintain order around the world? Welcome to the world of espionage. [snip] Learn how Mendez, a master of disguise, moved people around the world under the nose of enemy surveillance for over 25 years - from East Asia to Moscow to Iran, he helped hundreds of people escape potentially fatal situations. [snip] Chris Wallace at 3:01pm ET First of all, I have to defer to Tony Mendez, who believes that there are more spies in this country than ever, between rouge nations, industrial espionage and terrorists. So I don't feel that the threat to American interests has gone away with the fall of the Soviet empire. Whether it's in this country, where it's handled by the FBI, or overseas, where the CIA works, there are still plenty of enemies that the U.S. needs to know about. Moderator at 3:02pm ET What surprised you as you did research for this report? Chris Wallace at 3:05pm ET Two things. One, I was very impressed by Tony Mendez and the intellectual way in which he went about his work. There was a very intriguing analytical approach in which they went about what he called "the accumulation of millimeters" to develop disguises and fake identities for people. He also talked about the "wilderness of mirrors," which was his way of describing the moral quagmire in which spies live, where they have to distinguish between "good" and lies and "bad" lies. The other thing that surprised me was the Hollywoodization of espionage. Tony told me that whenever a new spy movie came out, his bosses at the CIA would call to see if, in fact, the agency had those same fancy spy gadgets. He also said that some of the CIA case officers around the world began putting on the airs of a James Bond, or some other movie spy. Moderator at 3:05pm ET Why do people still believe the Hollywood hype about the glamour of espionage? Chris Wallace at 3:07pm ET I think that in fact there isn't as big a difference between real life and Hollywood as some of us might have thought. If you go into our Web site and listen to Tony's story about how he rescued six Americans from Iran during the height of the hostage crisis, it is as theatrical as any Hollywood movie. But as to why it appeals to us, I think that the use of cloak and dagger techniques, imagination, disguise, to beat your enemy, as much as weapons, is intriguing and exciting. Moderator at 3:07pm ET Why have intelligence groups allowed books like Tony's and Christopher Andrew's to see the light of day? Is there a shelf life for secrets? Chris Wallace at 3:10pm ET That's a very good question, that I asked Tony about as well. And the answer is clearly that at a certain point, the CIA feels it can disclose some information without jeopardizing national security. In fact, Tony says that he would have gone to his grave with the story of the Iranian hostage rescue, but that it was the CIA that wanted it out. Tony never said this, but I suspect that the agency's challenge in getting funding in the post cold-war era may have loosened its attitude about revealing secrets. However, there are still limits. For instance, Tony told a wonderful story about how his wife had worn one of those Mission-Impossible-style disguises into a meeting with President Bush in the Oval Office and then stood up and taken it off her head, much to the alarm of the Secret Service. When we asked the CIA for a picture of Tony's wife in and out of disguise, although this happened 11 years ago they said, "no chance." Rob from dscga.com at 3:10pm ET Chris, how did you verify Mr. Mendez's information he provided. Did you ever think he was providing us with misinformation, a common tactic, to further protect his organization? Chris Wallace at 3:11pm ET Wow. That didn't occur to me. Maybe I should go back and check again. But seriously, these stories were sufficiently historical, and the details around them were sufficiently corroborated, that while we had to take a certain amount of it on faith, we felt comfortable in doing so. Moderator at 3:11pm ET Have gadgets used in intelligence made their way into the consumer market? Chris Wallace at 3:12pm ET Tony showed us a few gadgets - for instance, a light socket with a listening device and transmitter that he said is readily available now in so-called spy stores. If you go to our Web page, you can find a link to companies that sell spy equipment to consumers. So a certain amount of this has, over the years, become available on the public market. [snip] Moderator at 3:16pm ET Is the spy business really cloak and dagger, or can it be almost tedious at times? Chris Wallace at 3:18pm ET The answer is, both. Tony said that when he began at the CIA that his job was to create fake travel document for CIA case officers. That involved spending long hours hunched over paper trying to recreate, for instance, an East German visa. One of the things Tony said was that foreign intelligence agencies would purposely put mistakes or imperfections in their documents, so a customs officer could distinguish between what was real and what was forged. So there certainly was a tedious, if very important part, to it. However, when Tony tells how he was able to exfiltrate, or rescue, a top Iranian agent from Tehran in 1979 by disguising him as an old Jordanian businessman, it is a scene straight out of Hollywood. [snip] Gierbo from centix.net at 3:25pm ET Everyone reads spy novels - what's the biggest misconception? Also, do spies kill each other? I know the U.S. government is not supposed to sponsor murder, but do we? Do other nations? Chris Wallace at 3:27pm ET It is against the law, or has been, at least, since Congressional hearings in the 70s, for the U.S. to be involved in the assassination of foreign leaders. However, there is no such prohibition on foreign agents defending themselves in a life-and-death situation. As far as the spy novels are concerned, I was interested to see that Tony drew a great distinction in his chat between those that he thought were authentic, and those who he thought didn't get it right. He especially admires John LeCarre, and especially dislikes Tom Clancy. And I would certainly defer to Tony on the authenticity of spy fiction. [snip] =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 465 From: James M. Atkinson, Comm-Eng Date: Wed May 31, 2000 0:24pm Subject: CIA spy hunter talks to CNN about notorious turncoats CIA spy hunter talks to CNN about notorious turncoats http://www.cnn.com/2000/US/05/29/cia.spy.02/index.html May 29, 2000 Web posted at: 8:52 p.m. EDT (0052 GMT) (CNN) -- Richard Haver, former hunter and interrogator of spies, knows firsthand the havoc they can do to a nation's intelligence network. [snip] In an in-depth interview with National Security Correspondent David Ensor, Haver talks about his experiences with retired U.S. Navy Warrant Officer John Anthony Walker; Aldrich Ames, a longtime CIA employee posted to the office that handled clandestine operations around the globe; and Jonathan Pollard, a Navy intelligence analyst. For almost 20 years, Walker sold top-secret encryption codes to the Soviets that allowed them into the inner sanctum of United States operations and methods. He went even further, recruiting a spy ring that included his own son. "He opened up windows way beyond just Navy access for extended periods of time," says Haver, now vice president for Intelligence Business Development at TRW. "And when someone compromises your secure communications, they have compromised your entire system." Haver remembers Ames as arrogant and smart, a professional intelligence officer with perhaps a penchant for drinking too much. But his spying on behalf of the former Soviet Union proved "catastrophic" to the CIA's human intelligence operations. "In the spy game, when you're penetrated, when someone is working for the other side inside your security world, they then own you," Haver says. [snip] =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 466 From: James M. Atkinson, Comm-Eng Date: Wed May 31, 2000 0:37pm Subject: Re: Scanlock At 1:21 PM -0400 5/31/00, MACCFound@a... wrote: >In a message dated 5/31/00 9:24:19 AM Pacific Daylight Time, >Adrian@a... writes: ><< sniping at Audiotel, and Scanlock in particular >> > >RRAAHH - Stop - Red > >Equipment is important but not as much as knowledge. >How many CM technicians on this list can't draw the schematic of a >flashlight? > >I used various Scanlock's from 1978-1995 and they always did the job well. >I know for a fact that many are still in use. The company builds good >equipment >that works. They also have a very innovative and "state of the art" line of >"positive" gear. They know their stuff period. > >Delurking, I owned and operated Sherwood Communications from 1985-95. >I've done well over 200 sweeps, hundreds of covert CCTV installs, and ghost >written >several books on these subjects. > >While I haven't done a sweep in five years, I'm still very much in the loop. >Big Boy's Toys are part of why you guys are in it. Give me a double headed >screwdriver and a paperclip and I'll outsweep 90% of you guys. Add a can >wrench and it's 95% If you give me a VOM, 1059 and an SCD5 it'll be 98.5%. > >Michael Psst... Hey Mike... The VOM/Paperclip thing is a trade secret ;-) But what's the Can Wrench for? ;-O Seriously folks, technical training and competent experience is far more important then having the latest in fancy equipment. Any shmoe can pick up a razor blade and call himself a surgeon, but it's only after attending years of medical school that you become competent enough not to kill your patients. I know TSCM people who can find a bug faster with a flashlight and a VOM, then even the best "Wand Waver". I also know people (who will remain nameless) that buy every new gizmo on earth, have government training in electronics, but couldn't find a Wireless Microphone from Radio Shack at 10 feet, let alone a real bug. Now if you take someone who is extremely competent, well trained, and has legitimate experience then give them good equipment the "bad guys" will never be able to succeed. -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 467 From: Marty Kaiser Date: Wed May 31, 2000 10:09am Subject: Re: Scanlock Adrian: You are god-damn lucky the fucking FBI decided to do me in otherwise we would be head to head competitors. I continue to see your work and feel I can do as well....but without orders there is no reason trying. I have been persona-non-grata with the entire intelligence community for more than twenty five years and there is no end in sight. The FBI has also just done me in with the bomb detection business but since I'm close to retiring I'll just coast until the end. Marty (The REAL Enemy of the State) ----- Original Message ----- From: To: Sent: Wednesday, May 31, 2000 4:23 PM Subject: [TSCM-L] Scanlock I regularly view the list but have not commented in the past. However a number of your members have taken to sniping at Audiotel, and Scanlock in particular has been getting some unfair press in recent postings: please allow me to redress the balance. Audiotel International are a UK based manufacturer of countermeasures equipment, we have been for over 21 years. Many US based TSCM operators' experience of Scanlock relates to the large numbers of units sold to the US Government in the early 80's which although obsolete appeared on the commercial market as Government Surplus many years ago. Some of these 15 - 20 year old units are still in use. I assume one correspondent's comment was based on such a unit. As to our lack of support and being 'expensive', all our TSCM equipment carries a 2 years parts and labour warranty, this extends to 5 years with annual service and calibration. We try to provide support and back-up for the lifetime of our equipment - for example we recently serviced a unit that we manufactured in 1980. On a number of occasions we have repaired units while the sweeper sat in our reception with a cup of coffee, en route to a contract. Our service rates directly relate to labour and material costs and we have often carried out repairs free of charge. I hope this clarifies our servicing policy. Criticising other manufacturers as a means of making yourself look good is in our view counterproductive. If you have to make a sale by maligning your competitors, your equipment, by default, must be inferior. I will not SPAM the list with unsolicited advertising, however a pdf datasheet of the new Scanlock M2 countermeasures receiver is attached. DC to 5GHz with down-converters from 35GHz later in the year. Open if you wish, don't if you don't. We welcome valid, constructive criticism or suggestions which help us give you, the users, the tools you want. Adrian Hickey Sales Manager Audiotel International Ltd. [Non-text portions of this message have been removed] ------------------------------------------------------------------------ Hot off the press- summer's here! School's out and it's sizzling hot. Whether you're planning a graduation party, a summer brunch, or simple birthday party, shop GreatEntertaining.com before your next celebration. http://click.egroups.com/1/4473/1/_/507420/_/959790184/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 468 From: Marty Kaiser Date: Wed May 31, 2000 9:55am Subject: Re: Scanlock Thanks for the boost. Look at my 2057A www.martykaiser.com . It may not be quite as good as a scan-lock but it is pretty good....and a LOT cheaper too. Marty (the REAL Enemy of the State) ----- Original Message ----- From: To: Sent: Wednesday, May 31, 2000 5:21 PM Subject: Re: [TSCM-L] Scanlock > In a message dated 5/31/00 9:24:19 AM Pacific Daylight Time, > Adrian@a... writes: > << sniping at Audiotel, and Scanlock in particular >> > > RRAAHH - Stop - Red > > Equipment is important but not as much as knowledge. > How many CM technicians on this list can't draw the schematic of a > flashlight? > > I used various Scanlock's from 1978-1995 and they always did the job well. > I know for a fact that many are still in use. The company builds good > equipment > that works. They also have a very innovative and "state of the art" line of > "positive" gear. They know their stuff period. > > Delurking, I owned and operated Sherwood Communications from 1985-95. > I've done well over 200 sweeps, hundreds of covert CCTV installs, and ghost > written > several books on these subjects. > > While I haven't done a sweep in five years, I'm still very much in the loop. > Big Boy's Toys are part of why you guys are in it. Give me a double headed > screwdriver and a paperclip and I'll outsweep 90% of you guys. Add a can > wrench and it's 95% If you give me a VOM, 1059 and an SCD5 it'll be 98.5%. > > Michael > > > ------------------------------------------------------------------------ > Was the salesman clueless? Productopia has the answers. > http://click.egroups.com/1/4633/1/_/507420/_/959793695/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 469 From: James M. Atkinson, Comm-Eng Date: Wed May 31, 2000 5:25pm Subject: TSCM Equipment List In case anybody is interested the following is a list of TSCM equipment that I am recommending to companies who are starting up a TSCM function. The list is heavily aimed at the RF threat, with a limited amount of coverage of hardwired systems. Please note that this is just the "first round" of equipment The second and third round of equipment purchases is where the X-Ray, Thermal, IR, UV, Digital Spectrum Analyzers, Receivers, Sweep Generators, TDR, and so on get brought in. If any of the list members are interested in any of the equipment listed here then please let me know (ahem... let make a deal). -jma <<<<<====== Screen should be resized to be at least this wide ===========>>>>> OSC-5000 OSCOR Omni Spectral Correlator Base System$ 14,000.00 ODP-5000 Deluxe System Package$ 2,600.00 System Includes: OVM-5000 Video Option - Multi-format Video OVP-5000 Video Patch Cord OAR-5000 Audio Recorder with Cable OTL-5000 Ultrasonic Triangulate and Locate Option MPA-5000 Modular Phone Adapter CLA-5000 Cigarette Lighter Adaptor LPE-5000 Locator Probe Extension Cable MIC-5000 Microphone (for remote monitoring) MPC-5000 Multi-Purpose Cable OIF-5000 IF Output for Panoramic Signal Monitor (10.7 MHz)$ 230.00 OPC-5000 Computer Software Interface (HOT * HOT * HOT ) and Database Utilities software package$ 2,950.00 NGA-5000 Noise Generator for use with PC Software Version 3.0$ 295.00 MDC-2100 Microwave Down Converter (3 to 21 GHz - Fall 2000) $ 9,850.00 VBA-5000 2.4 GHz Video Booster Antenna$ 495.00 SDM-42 Panoramic Signal Monitor$ 1,405.00 ----- NJE-4000 ORION Non-linear Junction Detector$ 14,860.00 OTK-4000 Tool Kit for ORION NLJD$ 2,350.00 ----- CPM-700 Counter Surveillance Probe and Monitor$ 2,195.00 IRP-700 Infrared Probe$ 159.00 MLP-700 Magnetic Leakage Probe$ 185.00 ALP-700 Acoustic Leakage Probe$ 99.00 MPA-700 Modular Phone Adapter$ 39.00 TRP-700 Tape Recorder Patch Cords$ 10.00 CLA-700 Cigarette Lighter Adapter$ 10.00 NCB-700 Rechargeable Nickel Cadmium Battery Pack$ 55.00 ----- ANG-2000 Acoustic Noise Generator$ 695.00 TRN-2000 Transducer (Speaker)$ 65.00 WMT-2000 Window Mount$ 4.00 OMS-2000 Omni masking Speaker$ 99.00 PNG-2000 Portable Noise Generator$ 199.00 EAR-2000 Electro Acoustic Receiver$ 199.00 NGA-5000 Noise Generator and Amplifier$ 295.00 (for use with OSCOR PC DSP Software) ----- PSA-65C Analog Spectrum Analyzer$ 3,230.00 Additional Recommended Options: 10 kHz Resolution Bandwidth$ 325.00 Oscilloscope Interface Option$ 210.00 Sub-Carrier Detector$ 140.00 VDM-2 FM Video Demodulator/AM Module(s)$ 1,135.00 1.25 - 2.50 GHz Frequency Extender / Mixer$ 650.00 2.50 - 3.75 GHz Frequency Extender / Mixer$ 650.00 5.70 - 6.20 GHz Frequency Extender / Mixer$ 890.00 Carrying Case$ 105.00 Foam Carry Handle$ 7.50 ----- 1080H (Preferred) Single Line Telephone Analyzer$ 2,970.00 BTA-2/ETA-1 (Optional) Universal Multi Line Telephone Analyzer$ 5,995.00 ----- Biconical Antenna$ 1,080.00 (30-300 MHz, Un-calibrated) Log Periodic Antenna$ 2,280.00 (200-2000 MHz, Un-calibrated) Transient Limiter$ 610.00 (9 kHz - 200 MHz, Calibrated Mode) (<8 kHz - >400 MHz, Un-calibrated Mode) Active Rod Antenna$ 3,045.00 (30 Hz - 50 MHz, Calibrated) Active Loop Antenna$ 2,985.00 (1 KHz - 30 MHz, Calibrated) Omni Directional Discone Antenna$ 129.00 (28 - 1300 MHz, Un-calibrated) Wave Guide$ 3,590.00 (1 - 18 GHz, Calibrated, N-Type Connector) Antenna Tripod$ 835.00 (Non Metallic, Delrin and Linen Phenolic Composite) N-Type M-M Cable$ 190.00 (6 foot, Calibrated) N-Type M-M Cable$ 300.00 (25 foot, Calibrated) BNC Type F-F Cables$ 88.70 (10 each, 4 foot, Un-calibrated, for interconnects) BNC to N Adapter$ 12.50 ----- CEK-2000 Telecommunications Engineering Tool Kit$ 2,225.00 (includes a full set of Craft Tools) Includes full tool kit, plus the following craft items Harris Punch Tool Blade for 66M Blocks Blade for 110 Blocks Tone Generator Inductive Pickup Telephone Line Tester Electric Drill Drop Light with extended cord Cam Wrench with Stripper Soldering Iron TS-22 AL Linemans Handset (Datasafe) Series 80 Companion Kit Receptacle Tester Universal Adapter Kit (ITT) ----- Fluke 87 Digital Multi-Meter (DMM)$ 345.00 Fluke 89 Series IV True RMS Digital Multimeter$ 465.00 Fluke 199 Dual Channel, 200 MHz Hand Held Oscilloscope $ 2,985.00 ----- 1059 Audio Preamplifier(buy two)$ 375.00 2040B Test Oscillator$ 292.00 2047/U Ultrasonic/Contact Stethoscope$ 930.00 2049M Electronic Stethoscope$ 585.00 2050CA RF Field Detector$ 570.00 2030 Carrier Current Probe (WBFM/AM) - buy two$ 270.00 SCD-5 Carrier Current Probe (NBFM) - buy two$ 390.00 2057A Auto-Tune RF Locator$ 1,425.00 2044 Ambient Signal Strength Indicator$ 1,890.00 2045 Feedback RF Locator$ 690.00 2052WLWire and Device Locator$ 1,185.00 2060LV Wearable RF Detector (Light/Vibrate Alert)$ 480.00 ----- =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== [Non-text portions of this message have been removed] 470 From: James M. Atkinson, Comm-Eng Date: Wed May 31, 2000 5:43pm Subject: Revenge on Telemarketing Calls [Humor] Don't you hate being annoyed by telemarketers on your days off and evenings while your trying to eat dinner? I know I do. At work they can ring all day, ;) but at home, no way. So here are some ways to deal with them... 1) If they want to loan you money, tell them you just filed for bankruptcy and you could sure use some money. Ask, "How long can I keep it? Do I have to ever pay it back, or is it like the other money I borrowed before my bankruptcy?" 2) If they start out with, "How are you today?" say, "Why do you want to know?" Or you can say, "I'm so glad you asked, because no one seems to care these days and I have all these problems, my sciatica is acting up, my eyelashes are sore, my dog just died...." When they try to get back to the sales process, just continue on with telling about your problems. 3) If the person says he's Joe Doe from the XYZ Company, ask him to spell his name, then ask him to spell the company name, then ask where it is located. Continue asking personal questions or questions about the company for as long as necessary. 4) This one works better if you are male: Telemarketer: "Hi, my name is Judy and I'm with Canter and Siegel services.... You: "Hang on a second." (few seconds pause) "Okay, (in a really husky voice) what are you wearing?" (*I dont think Sprint will ever call me back!*) 5) Crying out, in well-simulated tones of pleasure and surprise, "Judy!! Is this really you? I can't believe it! Judy, how have you BEEN?" Hopefully, this will give Judy a few brief moments of terror as she tries to figure out where the heck she could know you from. 6) Say, "No," over and over. Be sure to vary the sound of each no, and keep an even tempo even as they're trying to speak. This is the most fun if you can keep going until they hang up. 7) If MCI calls trying to get you to sign up with their Family and Friends plan, reply, in as sinister a voice as you can muster, "I don't have any friends...would you be my friend?" *MY FAVORITE* 8) If they clean rugs: "Can you get blood out, you can? Well, how about goat blood or HUMAN blood - chicken blood too?" 9) Let the person go through their spiel, providing minimal but necessary feedback in the form of an occasional "Uh-huh, really, or, "That's fascinating." Finally, when they ask you to buy, ask them to marry you. They get all flustered, but just tell them you couldn't give your credit card number to someone who's a complete stranger. 10) Tell them you work for the same company they work for. Example: Telemarketer: "This is Bill from Watertronics." You: "Watertronics!! Hey I work for them too. Where are you calling from?" Telemarketer: "Uh, Dallas, Texas." You: "Great, they have a group there too? How's business/the weather? Too bad the company has a policy against selling to employees! Oh well, see ya." 11) Tell the Telemarketer you are busy and if they will give you their phone number you will call them back. If they say they are not allowed to give out their number, then ask them for their home number and tell them you will call them at home (this is usually the most effective method of getting rid of Telemarketers). If the person says, "Well, I don't really want to get a call at home," say, "Ya! Now you know how I feel." (smiling, of course...) =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 471 From: James M. Atkinson, Comm-Eng Date: Wed May 31, 2000 7:12pm Subject: TSCM-L Mailing List "Memo for Record" I would like to remind list members that ANYTHING they send to the Email address of TSCM-L@onelist.com or TSCM-L@egroups.com automatically goes out to every member of the entire group... all 400+ people (and growing quickly). If you want to respond privately then PLEASE Email directly to the person, and to not sent the message to the list. -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 472 From: James M. Atkinson, Comm-Eng Date: Wed May 31, 2000 7:22pm Subject: Fwd: MicroTel If your an old government SIGINT spook you know what this radio is, and what it can do for TSCM'ers. It's a steal for anything under five grand. MicroTel MSR-904A Microwave Receiver http://grass.ebay.com/go/101/11875222/1/345673062 -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 473 From: Andy Grudko Date: Tue May 30, 2000 3:31pm Subject: Re: Tone Sweepers ---- Original Message ----- > >So all we (I speak for my agency) can honestly protect against are the 16 > >common DTMF tones (1-0, A-D, # & +), which just need a keypad (usually half > >second 'natural button push' burst). A little 10 second program will do it > >but we have never bothered with it. We just press 1, 2, 3 etc. You answered: > That will only activate about 15% of the devices out there. The dangers of honesty. In my reports to clients I point out that at the level of a L2 sweep we may miss the more sophisticated devices. Thank heavan we are in a country where illegal surveillance mostly involves devices that were considered toys in the US 15 years ago. Even our legal surveillance devices are easy to find - embarrasingly so in some cases - and to identify as such brings up another, ethical question. A question easy to answer if you don't worry about seeing the inside of an third world cell...... Andy Grudko South Africa Where politics beat the Law every time (No sig file 'cos of the kak worm) 474 From: Andy Grudko Date: Thu Jun 1, 2000 5:26am Subject: Re: Equip. Quote > And with all this, don't overlook the 2.4 gig video threat, > power line devices and especially conducted threats, which none > of the above can detect adequately. Just to follow the thread on equipment, guys, this is AFRICA. If the badguys want to know who you are doing business with they usually kill your security guard at 2 in the morning, drive a truck through your wall and drive off with your filling cabinet - not to subtle. In general our threat level - and sophistication - here is far lower than in the US and the professional fees we can charge are very low compared to the US. We have operators here who simply walk round with a field strength meter and a pair of headphones and then declare a room clear for under US$100 - so coming in with serious fees, which would justify buying all this lovely gear, is difficult. Just last week I found a 'Tokio Spider' (you know, the little FM bugs they sell in the airport there). 2 months ago we found a similar device in a government office and evidence of previous phone tapping. We've found series and parallel tape recorders on phone lines, infinity bugs and even 2 hard wire mikes - one connected to a modified walkie-talkie. Do we miss stuff - probably, but our reports allways point out that no sweep is 100% effective. We try to educate clients as to why they should pay realistic fees, but usually we have to compromise. Even clients where we have found surveillance devices bitch about the costs. I found an illegal external phone tap at one of our finance companies - only 'cos we did a proper physical search - and have a monthly contract to sweep the offices and phone lines - about 12 rooms and 18 lines. My monthly fee is just over $ 300 so I really don't want to go out and buy a $ 21 000 OSCAR. Last year I suggested a 10% increase - they suggested they didn't need the work done any more... In one government office 3 different peices of our equipment detected a strong, unexplained RF signal. After ten minutes I had to tell the client 'I don't know what it is'. We try to be ethical, so rather than pretend there was nothing, we gave the client a written report explaining that we could not be 100% sure the signal was not hostile and recommended they ask our main oposition for a second opinion. They did this and invited us to attend. My oposition only deal in TSCM issues (they are the main suppliers of equipment) and they brought in the biggest spectrum analyser I've ever seen and a NLJD broom. After an hour and a half and pages of print out my colligue had to tell the client 'I don't know what it is'.......... Africa! Andy Grudko (CEO) Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence - Est 1981 Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 countries (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) www.grudko.com - "When you need it done right -first time" 475 From: Robert G. Ferrell Date: Thu Jun 1, 2000 7:16am Subject: Re: Revenge on Telemarketing Calls [Humor] >At work they can ring all day, ;) but at home, no way. So here are >some ways to deal with them... I usually say "I'll transfer you." and push one of the buttons. Then I come back on the line in a different voice and say "Federal Trade Commission: Consumer Complaints Hotline, May I help you?" RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center, US DoI Robert_G_Ferrell@n... ------------------------------------------------------------ Nothing I have ever said should be construed as even vaguely representing an official statement by the NBC or DoI. ------------------------------------------------------------ 476 From: James M. Atkinson, Comm-Eng Date: Thu Jun 1, 2000 9:22am Subject: Re: Equip. At 11:26 AM +0100 6/1/00, Andy Grudko wrote: >Quote > > And with all this, don't overlook the 2.4 gig video threat, > > power line devices and especially conducted threats, which none > > of the above can detect adequately. > >Just to follow the thread on equipment, guys, this is AFRICA. If the badguys >want to know who you are doing business with they usually kill your security >guard at 2 in the morning, drive a truck through your wall and drive off >with your filling cabinet - not to subtle. Ah, simple and crude, but effective. >In general our threat level - and sophistication - here is far lower than in >the US and the professional fees we can charge are very low compared to the >US. We have operators here who simply walk round with a field strength meter >and a pair of headphones and then declare a room clear for under US$100 - >so coming in with serious fees, which would justify buying all this lovely >gear, is difficult. We have the same problem in the United States, quite a few comedians can talk a mean streak about TSCM. But when they actually have to produce equipment for the sweep it turns out they have some nasty old service monitor, and a couple of fancy field strength meters or "James Bond Props". One guy why I know of actually buys and builds old movie props and shows up dressed in a battle dress uniform to even further impress the client. >Just last week I found a 'Tokio Spider' (you know, the little FM bugs they >sell in the airport there). 2 months ago we found a similar device in a >government office and evidence of previous phone tapping. We've found series >and parallel tape recorders on phone lines, infinity bugs and even 2 hard >wire mikes - one connected to a modified walkie-talkie. Great little devices, and oh so simple to find. "The more it dances the easier it is to find" (referring to the LC tuning circuits used in the "Tokyo Spiders") >Do we miss stuff - probably, but our reports allways point out that no sweep >is 100% effective. I've always considered that a TSCM Sweep is like gold... it can never be 100%, but the more your willing to spend, and higher the percentage. An ethical TSCM person can never assure that a location is 100% free of bugs, but he can certainly get in the high 90's (98.5-99.9%, etc) >We try to educate clients as to why they should pay realistic fees, but >usually we have to compromise. Even clients where we have found surveillance >devices bitch about the costs. I found an illegal external phone tap at one >of our finance companies - only 'cos we did a proper physical search - and >have a monthly contract to sweep the offices and phone lines - about 12 >rooms and 18 lines. My monthly fee is just over $ 300 so I really don't want >to go out and buy a $ 21 000 OSCAR. Ah, but you can use your equipment to justify either a higher fee, or to justify your firm over another firm. While the physical inspection is EXTERMELY important, the instruments are used to see where you can not, and to tell you where to look a little harder. A client should never "bitch about costs", while they may be a little annoyed, they should never be bitching. If the customer complains then you need to step back and determine how to make them happy, perhaps you are charging too much, or perhaps something you are doing (or not doing) has them unsettled. Talk to them, it's amazing what they will tell you when you ask for their advise. If your paying 21,000 for an OSCOR then we need to talk as they should only cost around 14,000 or so (from us). >Last year I suggested a 10% increase - they suggested they didn't need the >work done any more... Ouch, but you should NEVER increase your prices for an existing client... EVER. If you add a new piece of equipment to your complement then increase the amount of time, but not the fee. I have customers that I have held at the same fee for over 10 years. >In one government office 3 different peices of our equipment detected a >strong, unexplained RF signal. After ten minutes I had to tell the client 'I >don't know what it is'. At that time it would have been wise to bring in an engineer with a spectrum analyzers and laboratory grade antenna, near field probes, etc.. >We try to be ethical, so rather than pretend there was nothing, we gave the >client a written report explaining that we could not be 100% sure the signal >was not hostile and recommended they ask our main oposition for a second >opinion. I refer to this as the "Suspect Signal" segment of my report. When performing a TSCM sweep I identify EVERY signal present (over a certain threshold) in an area and classify it as Hostile, Friendly, or Unknown. The ranking I use runs from -32 to -1 for hostile or potentially hostile, 0 for unknown, and +1 to +32 for Friendly or Potentially Friendly signals. I've had cases where the RF environment was so dense and time was so limited that there were signals present in a room, that could not be isolated (and were flagged as "Unknown" in the report). If the client only gives you a few hours or a day to check a larger area then they have to be aware that you will have to cut corners and can only be certain of a certain level of confidence. If you have 8 hours to clear an entire 50,000 building with 100 phone (and no security) that you may only be able to give then a 5% confidence rating. On the other hand if you have 5 days to check 3 offices in a high security environment then you can have a confidence level about 98%. >They did this and invited us to attend. My oposition only deal in TSCM >issues (they are the main suppliers of equipment) and they brought in the >biggest spectrum analyser I've ever seen and a NLJD broom. Well see... They should have been using an OSC-5000 and ORION NLJD instead ;-) (snicker) Seriously, the size of the Spectrum Analyzer has nothing to do with it. The old lab grade 8566B, 70000, PR-700, MSR, MSS, and Hummingbird is a real dog compared to the newer instruments such as the 2784 and ESA and a laptop. I know where you can get 400 pound rack mounted spectrum analyzers that use vacuum tubes... but they are really not practical for TSCM. >After an hour and a half and pages of print out my colligue had to tell the >client 'I don't know what it is'.......... > >Africa! > >Andy Grudko (CEO) >Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & >intelligence - Est 1981 >Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 >countries >(+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, >SASFed, >SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) >www.grudko.com - "When you need it done right -first time" =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 477 From: Bob Date: Wed May 31, 2000 6:49pm Subject: Re: Revenge on Telemarketing Calls [Humor] James M. Atkinson, Comm-Eng wrote: > > Don't you hate being annoyed by telemarketers on your days off > and evenings while your trying to eat dinner? I know I do. > > At work they can ring all day, ;) but at home, no way. So here are > some ways to deal with them... > And then there are the phones which nobody calls, except wrong numbers and telemarketers. Like the phone which is only used for your modem. 1) Answer the phone with "Goodbye?" When done with the exact same infection as "hello" it will yield a minimum of ten seconds of silence. More than enough time to make your escape. 2) Answer the phone with "Yes, I would like a large pepperoni pizza with extra anchovies. Do you deliver?" Then, when they say "no", appologize and hang up. 3) Answer in a foreign language. I have found a few random phrases in Russian to be the most effective. The few times I used German were effective, until somebody responded in kind... Bob Washburne - "Look Mommy, a brain! Can I play with it?" 478 From: Marty Kaiser Date: Thu Jun 1, 2000 4:02am Subject: Re: TSCM-L Mailing List "Memo for Record" I guess this applies to me. Anyway, it was good to get that off my chest. Marty ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Sent: Thursday, June 01, 2000 12:12 AM Subject: [TSCM-L] TSCM-L Mailing List "Memo for Record" > I would like to remind list members that ANYTHING they send to the > Email address of TSCM-L@onelist.com or TSCM-L@egroups.com > automatically goes out to every member of the entire group... all > 400+ people (and growing quickly). > > If you want to respond privately then PLEASE Email directly to the > person, and to not sent the message to the list. > > -jma > > =================================================================== > Do not meddle in the affairs of dragons, > for you are crunchy and taste good with ketchup. > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Nil carborundum illigitimi > =================================================================== > > ------------------------------------------------------------------------ > Tired of searching? > Get the right answer, fast, from someone who's been there - guaranteed. > http://click.egroups.com/1/4520/1/_/507420/_/959818633/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 479 From: Marty Kaiser Date: Wed May 31, 2000 9:53am Subject: Re: Scanlock Thanks for the boost. Take a look at my 2057A. May not be a scan-lock substitute but it is pretty darn good. Marty (the REAL Enemy of the State) ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: Sent: Wednesday, May 31, 2000 5:37 PM Subject: Re: [TSCM-L] Scanlock > At 1:21 PM -0400 5/31/00, MACCFound@a... wrote: > >In a message dated 5/31/00 9:24:19 AM Pacific Daylight Time, > >Adrian@a... writes: > ><< sniping at Audiotel, and Scanlock in particular >> > > > >RRAAHH - Stop - Red > > > >Equipment is important but not as much as knowledge. > >How many CM technicians on this list can't draw the schematic of a > >flashlight? > > > >I used various Scanlock's from 1978-1995 and they always did the job well. > >I know for a fact that many are still in use. The company builds good > >equipment > >that works. They also have a very innovative and "state of the art" line of > >"positive" gear. They know their stuff period. > > > >Delurking, I owned and operated Sherwood Communications from 1985-95. > >I've done well over 200 sweeps, hundreds of covert CCTV installs, and ghost > >written > >several books on these subjects. > > > >While I haven't done a sweep in five years, I'm still very much in the loop. > >Big Boy's Toys are part of why you guys are in it. Give me a double headed > >screwdriver and a paperclip and I'll outsweep 90% of you guys. Add a can > >wrench and it's 95% If you give me a VOM, 1059 and an SCD5 it'll be 98.5%. > > > >Michael > > > > > Psst... Hey Mike... The VOM/Paperclip thing is a trade secret ;-) > > But what's the Can Wrench for? ;-O > > Seriously folks, technical training and competent experience is > far more important then having the latest in fancy equipment. > > Any shmoe can pick up a razor blade and call himself a surgeon, but > it's only after attending years of medical school that you become > competent enough not to kill your patients. > > I know TSCM people who can find a bug faster with a flashlight and > a VOM, then even the best "Wand Waver". I also know people (who will > remain nameless) that buy every new gizmo on earth, have government > training in electronics, but couldn't find a Wireless Microphone from > Radio Shack at 10 feet, let alone a real bug. > > Now if you take someone who is extremely competent, well trained, and > has legitimate experience then give them good equipment the "bad guys" > will never be able to succeed. > > -jma > > > =================================================================== > Do not meddle in the affairs of dragons, > for you are crunchy and taste good with ketchup. > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Nil carborundum illigitimi > =================================================================== > > ------------------------------------------------------------------------ > Accurate impartial advice on everything from laptops to table saws. > http://click.egroups.com/1/4634/1/_/507420/_/959794698/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 480 From: Charles Patterson Date: Thu Jun 1, 2000 10:09am Subject: Re: Revenge on Telemarketing Calls [Humor] re: telemarketers I have a small box that plug on the line and plays the S.I.T. tones (I forget what SIT stands for). Thats the tones you hear when you dial a non-working number --beee booo beeeep. Many telemarketing automated dialers will mark the number as non-working when it hears that tone sequence. You can set the box to play on every call, when your answering machine answers, or manually (push the button). (available from www.sandman.com "telemarketing stopper" I wonder if I could set up a telemarketing business to sell these things? Also RadShack has the li'l box that when you press the button, the box will take over the call, play a pre-recorded message, then hang up for you. You record a message such as "we do not accept any solicitations at this number, please remove this number from your list" or any of the miriade of unprintable versions. A friend of mine has a telemarketing business. I was working on his phone lines one evening installing a supervisor observation unit. I listened to the people making the calls (yes, around dinner time!) they all mumbled a bit and sounded like they were ready to go home. I felt like pulling the plug! Knowing how they work, though, usually the name the person gives is not their real name. Sometimes I try to start a different conversation... "what's your real name? where are you located, what's the weather like there?, Do you object to your supervisor listening in on your calls?" If you get a call from Simmons Beauty Rest, go ahead and answer the survey. They delivered a free, new, queen size mattress and box spring for my wife and I to try for 2weeks, answer some questions on a short form, and keep it! I haven't slept this good in years. I should have upgraded to king size but we would have had to get all new sheets. When they delivered it I realized the truck was stopping at many homes on the street. I guess I wasn't the only one to answer the survey. cp ----- Original Message ----- From: Bob To: Sent: Wednesday, May 31, 2000 7:49 PM Subject: Re: [TSCM-L] Revenge on Telemarketing Calls [Humor] > > James M. Atkinson, Comm-Eng wrote: > > > > Don't you hate being annoyed by telemarketers on your days off > > and evenings while your trying to eat dinner? I know I do. > > > > At work they can ring all day, ;) but at home, no way. So here are > > some ways to deal with them... > > > > And then there are the phones which nobody calls, except wrong numbers > and telemarketers. Like the phone which is only used for your modem. > > 1) Answer the phone with "Goodbye?" When done with the exact same > infection as "hello" it will yield a minimum of ten seconds of silence. > More than enough time to make your escape. > > 2) Answer the phone with "Yes, I would like a large pepperoni pizza with > extra anchovies. Do you deliver?" Then, when they say "no", appologize > and hang up. > > 3) Answer in a foreign language. I have found a few random phrases in > Russian to be the most effective. The few times I used German were > effective, until somebody responded in kind... > > Bob Washburne - "Look Mommy, a brain! Can I play with it?" > > > ------------------------------------------------------------------------ > Was the salesman clueless? Productopia has the answers. > http://click.egroups.com/1/4633/1/_/507420/_/959872502/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 481 From: Mike F Date: Thu Jun 1, 2000 11:17am Subject: phone scramblers Check out these older Government issue Phone Scramblers. Hey if I had the money I would bid on them! 50 minutes left,currently high bid is about $110 http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=341575551 later4,mike f Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." From: Mike F Date: Thu Jun 1, 2000 3:26pm Subject: zone alarms has been updated Zone Alarm v2.125 updated may31, The software is free about 1.5 megs http://www.zdnet.com/downloads/stories/info/0,,0015P7,.html later4,mike f Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 483 From: Andre Holmes <1ach@g...> Date: Thu Jun 1, 2000 11:29am Subject: Fw: Marty Kaiser Equipment -----Original Message----- From: Andre Holmes <1ach@g...> To: TSCM-L@egroups Date: Thursday, June 01, 2000 12:21 PM Subject: Marty Kaiser Equipment I want to say that Im proud to own some of the kaiser boxes they are the best you can get for the money. The 2044 is a very versital unit as compared to the scanlock and cpm and to say the least well worth the price. I join many of you out there who all ready own some of martys boxes and marty you should keep up the good work no matter what. Making sells is what we all are striving for and you can bet,[ side by side youve out done the others]. All that the other makers of Electronic countermeasures companys have done basically is increase the gig coverage and price. They havent shown any other detection features that they are sharing with us. Take second to none. Andre [Non-text portions of this message have been removed] 484 From: James M. Atkinson, Comm-Eng Date: Thu Jun 1, 2000 8:17pm Subject: United States Foreign Intelligence Surveillance Court Orders I thought the list might find this interesting: -jma ================ >Office of the Attorney General >Washington, D.C. 20530 >April 27, 2000 > >Honorable J. Dennis Hastert >Speaker of the House of Representatives >Washington, D.C. 20515 > >Dear Mr. Speaker: > >This report is submitted pursuant to the Foreign Intelligence >Surveillance Act of 1978, Title 50, United States Code, Section >1807, as amended. > >During calendar year 1999, 886 applications were made for orders and >extensions of orders approving electronic surveillance or physical >search under the Act. the United States Foreign Intelligence >Surveillance Court issued orders in 880 applications granting >authority to the Government for the requested electronic >surveillance and electronic searches. One application filed in 1999 >was pending before the Court until March 29, 2000, when it was >approved. Five applications which were filed in late December 1999 >were approved when presented to the Court on January 5, 2000. > >No orders were entered which modified or denied the requested authority. > > Sincerely, > > Janet Reno =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 485 From: James M. Atkinson, Comm-Eng Date: Thu Jun 1, 2000 9:03pm Subject: Re: Fw: Marty Kaiser Equipment Marty Kaisers "little black boxes" are worth their weight in gold (literally). I personally use an entire briefcase full of his gear on almost every sweep, and probably have 1 or 2 of just about every TSCM item he makes. I have nothing but praise for the 2044 and 2057, the systems are incredibly sensitive and I am confident they could "hear a flea break wind at 1000 yards". The noise floor on the 2044 and 2057 is simply amazing, which reflects his excellent design and manufacturing skills. The 2030, SCD5, and 1059 also make an incredible system (which out performs many overpriced government black boxes). I suggest that you buy one of each for AC mains, and a second system just for phone usage (be sure to tweak the impedance matching circuit for optimal function). The 2045 can perform miracles when hunting for some of the nasty little 35 - 50 MHz sub milli-watt devices that other manufactures equipment misses (cough-cough... no names please). The 2057 also seriously "kicks butt" when hunting for WFM "Tokyo Spider" devices, and devices which use Sub-Carrier modulation. In a nutshell... Marty's equipment is incredible, and it's a damn shame that there isn't some type of industry award that we nominate him for. -jma PS: On a more humorous note... Why is Marty like an "Amish Engineer"... (with respect... I hope nobody takes offense) [duck] 1) He dresses all his equipment in black 2) He keep his prices low, and reasonable 3) Everybody gets a fair deal... and I mean everybody 4) He is honest, and a straight shooter 5) He is really a pleasure to do business with 6) The government has tried 100 times to run him out of business 7) Everything is custom build to order... and I mean everybody At 12:29 PM -0400 6/1/00, Andre Holmes wrote: >-----Original Message----- >From: Andre Holmes <1ach@g...> >To: TSCM-L@egroups >Date: Thursday, June 01, 2000 12:21 PM >Subject: Marty Kaiser Equipment > > >I want to say that Im proud to own some of the kaiser boxes they are >the best you can get for the money. > >The 2044 is a very versital unit as compared to the scanlock and cpm >and to say the least well worth the price. > >I join many of you out there who all ready own some of martys boxes >and marty you should keep up the good work no matter what. > >Making sells is what we all are striving for and you can bet,[ side >by side youve out done the others]. > >All that the other makers of Electronic countermeasures companys >have done basically is increase the gig coverage and price. They >havent shown any other detection features that they are sharing with >us. > >Take second to none. Andre =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 486 From: Jay Coote Date: Thu Jun 1, 2000 9:11pm Subject: Anritsu Handheld S/A? Anyone have the sensitivity and RBW specs on the Anritsu 3 GHz handheld spectrum analyzer? I could not see the specs on their site and this "mature" computer won't ack PDF files. It looked like a nice toy. Thanks, Jay Coote 487 From: Date: Thu Jun 1, 2000 4:55pm Subject: On-hook Security Looking for a conference table type phone (multiple speakers/transmitters) that has on-hook security features like a STU-III or STE. 488 From: Steve Whitehead Date: Thu Jun 1, 2000 9:21pm Subject: AFRICA - Another view We would like to give our view on the recent comments posted by Andy Grudko about TSCM, etc in South Africa. As a professional TSCM company we are perhaps experiencing and seeing things from a different angle. We do not agree with his assessment regarding TSCM in general in South Africa. The same sophisticated devices available elsewhere in the World is perhaps more freely available in South Africa, because of the lack of proper Legislation regulating advertising, selling and possession of these devices. Our professional fees are lower than the US but compare quite favourably with fees from countries in Europe and elsewhere. There are many corporates and smaller companies in South Africa who are prepared to pay fairly decent fees for a professional service. Most corporates will not be fooled by operators walking around with a field strength meter and it is important to distinguish on which Level you offer services. The SA Government has excellent and well trained survey teams with sophisticated equipment and would never use a PI to conduct surveys for them. His rate of discoveries is astonishing. We have been involved in this business, (Government and corporate) for the many years and discoveries and signs of tampering are few and far in between. It appears that it is only the PI's in South Africa that regularly discover bugs. Unfortunately they are also regularly failing their polygraph tests regarding their "discoveries". (We recommend to companies to polygraph test operators on the discovery or location of any devices) We own professional equipment, spectrum analyser with accessories, 3 Non-Linear Junction Detectors, a single line as well as a multi-line telephone analyser, oscilloscope, power amplifiers, multi-meters, a variety of tools, as well as a number of probes, broadband receiver, Scanlock ECM and even a Winradio with software which we use for our training courses. (We offer a basic course which runs over 10 working days). We have spend nearly US $ 150 000 over the past four years on equipment since joining the commercial sector.We only offer TSCM services! (Grudko wrote " My monthy fee is only $ 300 so I really don't want to go out and buy a $ 21 000 Oscar") Actually it is spelled OSCOR. One would expect a professional to actually know the names of the equipment. We also regularly have a variety of demonstration equipment as we represent three well known manufacturers of TSCM equipment in South Africa. I also know of at least four other PI companies in South Africa that own professional and sophisticated equipment. How do they do it? Grudko wrote" ... and recommend that they ask our main opposition for a second opinion" What about the four companies mentioned here? Regarding his "RF signal in the Government office", How reliable is a CPM in a strong signal area? At the end of the day when an assessment is made it has to be based on experience, logic, physical search, interpretation of the readings and measurements, and if there is nothing, there is nothing. (We are the opposition referred to in his posting to the list). (The signal could have been present when he conducted his survey with the CPM, a few nights earlier, if there ever was one. We never got a printout, frequency, signal strength, etc) We agree with Grudko that more has to be done regarding educating companies about the overall lack of proper counterintelligence practices. We regularly present Workshops on the subject and usually feature an international speaker at the events. Rob Muessel of ISA visited South Africa twice as a keynote speaker at these workshops. A technician and an engineer from Winkelmann Ltd (UK) featured twice last year on our workshops and technical and engineering staff from REI will be keynote speakers at a Workshop we are hosting in September. During these workshops sophisticated devices and the countermeasures are discussed and even analysed during the presentations. We have another Workshop in July where we will analyse and evaluate very sophisticated audio devices from a well-known Scandinavian company. We regularly invite the local PI industry to these workshops but they never attend. Grudko is on record where he wrote us that "he is not into Workshops" when we mailed him an announcement of an upcoming workshop. There are a few companies in South Africa offering professional commercial TSCM services and the TSCM fraternity is a small group in South Africa and they all know each other. Grudko does not represent them or the level of services they offer, nor is he any opposition. On what basis can he give an informed opinion to the World what is available in South Africa or what level of sophistication we have to counter in South Africa? Perhaps he should consider to invest in professional equipment like the OSCOR and will be able to see, hear and detect things that are beyond the capabilities of a CPM and Scanlock. TSCM demands commitment, dedication as well as a large investment in equipment and constant training. We thank you for the opportunity to allow a different view of TSCM in South Africa. Steve Whitehead & Lorenzo Lombard Managing Members TSCM Services cc Tel (+2712) 664-3157 Fax (+2712) 664-3180 P O Box 16063, Lyttelton, 0140, Gauteng, South Africa E-mail sceptre@m... URL http://www.tscm.co.za Steve Whitehead Managing Member TSCM Services cc P O Box 16063, Lyttelton, 0140, Centurion, South Africa Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) E-mail sceptre@m... URL http://www.tscm.co.za [Non-text portions of this message have been removed] 489 From: Date: Thu Jun 1, 2000 5:32pm Subject: computer forensic I am looking for information concerning computer data recovery. With todays computer hardware is it possible to verify if a hard drive was replaced within a certain period of time. Also, if someone 'scrubbed' their computer (deleting and refilling in sectors with new bits of info), is there any way to recover the information that the person tried to hide? Any info is appreciated. -Eric -------------------------------------------------- Rage with the Bulls... Get your FREE @ragingbull.com Email Address Visit http://www.ragingbull.com/ 490 From: James M. Atkinson, Comm-Eng Date: Thu Jun 1, 2000 9:34pm Subject: The Physics of Hell It is an oldie... but still a goodie... The following is an actual question given on a University of Washington engineering mid term. The answer was so "profound" that the Professor shared it with colleagues, which is why we now have the pleasure of enjoying it as well. Bonus Question: Is Hell exothermic (gives off heat) or endothermic (absorbs heat)? Most of the students wrote proofs of their beliefs using Boyle's Law, (gas cools off when it expands and heats up when it is compressed) or some variant. One student, however, wrote the following: "First, we need to know how the mass of Hell is changing in time. So we need to know the rate that souls are moving into Hell and the rate they are leaving. I think that we can safely assume that once a soul gets to Hell, it will not leave. Therefore, no souls are leaving. As for how many souls are entering Hell, lets look at the different religions that exist in the world today. Some of these religions state that if you are not a member of their religion, you will go to Hell. Since there are more than one of these religions and since people do not Belong to more than one religion, we can project that all souls go to Hell. With birth and death rates as they are, we can expect the number of souls in Hell to increase exponentially. Now, we look at the rate of change of the volume in Hell because Boyle's Law states that in order for the temperature and pressure in Hell to stay the same, the volume of Hell has to expand as souls are added. This gives two possibilities: 1. If Hell is expanding at a slower rate than the rate at which souls enter Hell, then the temperature and pressure in Hell will increase until all Hell breaks loose. 2. Of course, if Hell is expanding at a rate faster than the increase of souls in Hell, then the temperature and pressure will drop until Hell freezes over. So which is it? If we accept the postulate given to me by Ms. Teresa Banyan during my Freshman year, "...that it will be a cold day in Hell before I sleep with you.", and take into account the fact that I still have not succeeded in having sexual relations with her, then, #2 cannot be true, and thus I am sure that Hell is exothermic and will not freeze." the student received the only "A" given. =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 491 From: Chad Clayton Date: Thu Jun 1, 2000 10:12pm Subject: Equipment Hello group, I am a recent newcomer to the list. And from reading the list I am the amateur in the group. I am a private investigator in the midwest who conducts low threat level sweeps. Most of my clients should be more concerned about basic information security procedures than worrying about an eavesdropping threats. Currently I use a CPM 700, Fluke 87 multimeter and a PSA 65C to 3.75 Gig and alot of physical searching. I am constantly trying to gain knowledge about the trade. I will be attending an additional 80 hours of training in July and plan to approach my boss for some additional equipment. I would like some input on what my next piece of equipment will help me the most a non linear junction detector, a TDR or ??? Advise and recommendations would be appreciated. Thanks, Chad 492 From: D. Douglas Rehman Date: Thu Jun 1, 2000 11:19pm Subject: RE: computer forensic > -----Original Message----- > From: eric@r... [mailto:eric@r...] > > I am looking for information concerning computer data recovery. > With todays computer hardware is it possible to verify if a hard > drive was replaced within a certain period of time. Also, if > someone 'scrubbed' their computer (deleting and refilling in > sectors with new bits of info), is there any way to recover the > information that the person tried to hide? Any info is appreciated. There are a lot of "it depends" in answering your questions; computers, software, operating systems, etc. are so complex that every situation is unique. Generally, yes, it is possible to determine when a hard drive was placed into service. It is often possible to tell that data has been purposefully deleted or destroyed. Depending on the manner that the data has been deleted, destroyed, or hidden, it can often be recovered. Microsoft operating systems tend to be very sloppy (infosec wasn't considered...) and often save information, unbeknownst to the user, to various areas of the hard drive. Information that has actually been written over is, for most practical purposes, lost. If that same information happens to have been written elsewhere on the drive, it can be recovered there. It is possible to recover information that has been overwritten, but you will need the budget of a small country. The information is recovered using Scanning Tunnel Microscopy. For this reason, the government usually shreds or melts hard drives that have contained sensitive information. While STM is extremely expensive today, it may well be affordable in a few years. As with TSCM, anybody can attempt computer forensics. The professionals will be trained, experienced, and equipped to do the best job possible. A non-pro almost always makes a mess out of the hard drive, often destroying evidence. Computer forensics is a lot like TSCM, you have to be at least as good as your opponent, or luckier... Best Regards, Doug Rehman Rehman Technology Services, Inc. Specializing in Computer Forensics and Technology Related Investigations License A-9800119 Mount Dora, Florida (Orlando Area) (352)357-0500 http://www.surveil.com 493 From: James M. Atkinson, Comm-Eng Date: Fri Jun 2, 2000 0:32am Subject: Re: Equipment At 10:12 PM -0500 6/1/00, Chad Clayton wrote: >Hello group, I am a recent newcomer to the list. And from reading the >list I am the amateur in the group. I am a private investigator in the >midwest who conducts low threat level sweeps. Most of my clients should >be more concerned about basic information security procedures than >worrying about an eavesdropping threats. Currently I use a CPM 700, >Fluke 87 multimeter and a PSA 65C to 3.75 Gig and alot of physical >searching. I am constantly trying to gain knowledge about the trade. I >will be attending an additional 80 hours of training in July and plan to >approach my boss for some additional equipment. I would like some input >on what my next piece of equipment will help me the most a non linear >junction detector, a TDR or ??? Advise and recommendations would be >appreciated. Thanks, Chad Your next purchase should be an OSCOR, and a small HH Dual trace Oscilloscope such as the Fluke 199 (and a little Kaiser ping box with two channels). If you don't already have then obtain the IR and Magnetic probes for the CPM-700, and maybe some extra batteries. You have several noticeable gaps in your first line countermeasure that the above equipment will help too close. To supplement the OSCOR you may also want to pick up 2 or 3 identical scanners and dump one of my bug frequency tables and have them running while you performing the physical inspection. Stay away from the NLJD for the time being, and don't buy a TDR quite yet. -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 494 From: Jordan Ulery Date: Fri Jun 2, 2000 1:59am Subject: Re: zone alarms has been updated Works like a charm and is worth the few minutes it takes. Be sure to join the list and get the other update info as well. Mike F wrote: > Zone Alarm v2.125 updated may31, > The software is free about 1.5 megs > http://www.zdnet.com/downloads/stories/info/0,,0015P7,.html > > later4,mike f > > Michael T. Fiorentino > Syracuse,NY 13206 > > "CONFIDENTIALITY WARNING" > This electronic message contains information which may be privileged > and/or confidential. The information is intended for use only by the > individual(s) > or entity named/indicated above. If you are not the identified/intended > recipient, be aware that > any disclosure, copying, distribution, or use of the contents of this > message/information is prohibited. If you are not the indicated recipient or > have > received this message in error contact our offices immediately for > instructions." > > ------------------------------------------------------------------------ > Accurate impartial advice on everything from laptops to table saws. > http://click.egroups.com/1/4634/1/_/507420/_/959891216/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 495 From: Jordan Ulery Date: Fri Jun 2, 2000 2:04am Subject: Re: computer forensic Check out PI mall for computer forensic specialists. It is my understanding that if the government wipe of 7x rewrite (1 followed by 0 followed by a random three digit number) is used recovery of data is impossible. With the 3x standard availalbe from some programs, including Norton, some recovery may be possible, although not likely. As for the date of installation and removal that should be recoverable, but may be over written on the hard disc if the unit is reinstalled in another computer, therfore, go to the pros. eric@r... wrote: > I am looking for information concerning computer data recovery. With todays computer hardware is it possible to verify if a hard drive was replaced within a certain period of time. Also, if someone 'scrubbed' their computer (deleting and refilling in sectors with new bits of info), is there any way to recover the information that the person tried to hide? Any info is appreciated. > > -Eric > > -------------------------------------------------- > > Rage with the Bulls... > Get your FREE @ragingbull.com Email Address > Visit http://www.ragingbull.com/ > > ------------------------------------------------------------------------ > Sneezing And Wheezing? > Get $10 Today to Fight your allergies! > http://click.egroups.com/1/4851/1/_/507420/_/959913749/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 496 From: Jordan Ulery Date: Fri Jun 2, 2000 3:01am Subject: Computer Forensics This is not an advertisement and I have no interest in the program or company. The information is offered as a service to the list and no warrantee is made regarding the product or its suitability to your needs. In light of the recent questions posed regarding computers this may be of interest. Caveat emptor! Below is the description of a Shareware ( Try it and Buy it) program for REAL data elimination. It reportably deletes files, registry entries, and other traces so thoroughly that the most sophisticated law enforcement and computer data reconstruction programs can not read the info. It is fully configurable. This information was gleaned from a PI list to which I am a member. The program is far to big ( 3.5 MB) to post here. Look for it at CD.net or on shareware sites. "This security tool eliminates all evidence from your PC in one single click of a button. In tests, Evidence Eliminator defeats "Forensic Analysis" software as used by investigators, law enforcement etc. It protects you from unwanted data becoming permanently hidden in your PC. Whoever you are, whatever you do, you need Evidence Eliminator. Free 30 day evaluation version is fully functional and gives complete protection. v4.5 now includes "Stealth Mode" invisibility and securely Under-Writes your existing files to defeat forensic hardware analysis. Short of dousing it with gasoline and setting it ablaze, the only way to keep things spotless and shiny clean is with Evidence Eliminator. Anything that's a potential problem is shredded, removed, or otherwise dealt with. There are lots of obvious problem areas cleaned with Evidence Eliminator. Things such as your browser's cache, history file, and cookies, as well as things on your start menu such as the run history, find files history, and recent documents list. Not that overly impressed yet, huh? Most of that is stuff that you already know about or do by hand, right? Did you think about Internet Explorer's AutoComplete memory of form posts and passwords? Or perhaps the Windows swap file and application logs? What about slack space and deleted entries in the Windows registry and deleted filenames, sizes and attributes from your drive directory structures? Hmm, did you miss any of those on your own? The people you don't want snooping around your computer won't." [Non-text portions of this message have been removed] 497 From: James M. Atkinson, Comm-Eng Date: Fri Jun 2, 2000 9:40am Subject: Re: AFRICA - Another view At 4:21 AM +0200 6/2/00, Steve Whitehead wrote: >We would like to give our view on the recent comments posted by Andy >Grudko about TSCM, etc in South Africa. As a professional TSCM >company we are perhaps experiencing and seeing things from a >different angle. It's good to talk... it promotes growth and development within the industry. Of course we all see things from a different angle, and it's good to "compare notes", and to "agree to disagree". >We do not agree with his assessment regarding TSCM in general in >South Africa. The same sophisticated devices available elsewhere in >the World is perhaps more freely available in South Africa, because >of the lack of proper Legislation regulating advertising, selling >and possession of these devices. > >Our professional fees are lower than the US but compare quite >favourably with fees from countries in Europe and elsewhere. There >are many corporates and smaller companies in South Africa who are >prepared to pay fairly decent fees for a professional service. You can only charge what your market will bear, and you can only spend as much time at your clients site as they will permit. Personally I like to take 2-3 days for even the most basic of sweeps (1-3 offices), and generally prefer to work alone. However, if I have only a maximum of 4 hours then I have to adapt to my clients requirements. I also have clients who insist that any TSCM activity always involve at least 2 people, in which cases I also have to adapt to their requirements and bring a second person. Some clients want the RF spectrum evaluated in detail, some only want a cursory check. Others want every conductor in an area evaluated, others are happy with only the telephone lines being strobed with a TDR. >Most corporates will not be fooled by operators walking around with >a field strength meter and it is important to distinguish on which >Level you offer services. Actually they will be fooled.... until they come across a real TSCM'er who shows them real TSCM equipment, real TSCM procedures, and real TSCM protocols. >The SA Government has excellent and well trained survey teams with >sophisticated equipment and would never use a PI to conduct surveys >for them. Actually it depends on what level of government your talking about... While the national government may not, the local water plant manager, or local police department might (and often does) use PI's for TSCM services. Remeber that all governments have many layers. I know of numerous cases where some low level politician or bureaucrat had a local PI bring in a "wand waver" who in turn found a box full of bugs. >His rate of discoveries is astonishing. We have been involved in >this business, (Government and corporate) for the many years and >discoveries and signs of tampering are few and far in between. It >appears that it is only the PI's in South Africa that regularly >discover bugs. Unfortunately they are also regularly failing their >polygraph tests regarding their "discoveries". (We recommend to >companies to polygraph test operators on the discovery or location >of any devices) The rate of discoveries are of course limited, but the more time you spend performing sweeps the more bugs you will find. As far as tampering... If you are very observant you can find "issues" on every single sweep you perform. That's not to say that you will find evidence of bugging, but you will observe serious weaknesses which could facilitate a bugging (such as telcom closets with no locks, unlocked SACS, un-secure pedestals, use of cordless phones, etc). In a small number of cases you may even be lucky and find signs of previous eavesdropping but not the bug itself (ie: wire soldered together after a series device was removed, or the ground lead being removed from an outlet, etc.) >We own professional equipment, spectrum analyser with accessories, 3 >Non-Linear Junction Detectors, a single line as well as a multi-line >telephone analyser, oscilloscope, power amplifiers, multi-meters, a >variety of tools, as well as a number of probes, broadband receiver, >Scanlock ECM and even a Winradio with software which we use for our >training courses. (We offer a basic course which runs over 10 >working days). It sounds like you are well equipped to address realistic threats. I didn't see anything mentioned about thermal imaging, bore scopes, or Xray equipment ;-) >We have spend nearly US $ 150 000 over the past four years on >equipment since joining the commercial sector.We only offer TSCM >services! Sound like a fairly decent equipment complement. >(Grudko wrote " My monthy fee is only $ 300 so I really don't want >to go out and buy a $ 21 000 Oscar") Actually it is spelled OSCOR. >One would expect a professional to actually know the names of the >equipment. Again it depends on his clients, and the level of threat he is addressing. If he does 15 sweeps a week, spends fours hours at each sweep, and hits each client one a month for a low threat RF sweep then he is doing pretty well. Of course I wouldn't use a CPM-700 for a higher threat, but it is fine for cursory checks and for low threat situations. If the clients is unwilling to pay more then $300 for a sweep then all you can do is provide them with a level of service within their budget. I've mistyped the model names of equipment myself, so we can let that error slide (it's a common mistake). >We also regularly have a variety of demonstration equipment as we >represent three well known manufacturers of TSCM equipment in South >Africa. > >I also know of at least four other PI companies in South Africa that >own professional and sophisticated equipment. How do they do it? > >Grudko wrote" ... and recommend that they ask our main opposition >for a second opinion" What about the four companies mentioned here? I noticed that he said "Opposition", instead of "Competitor". Please feel free to post the four companies you are talking about to the list. >Regarding his "RF signal in the Government office", How reliable is >a CPM in a strong signal area? At the end of the day when an >assessment is made it has to be based on experience, logic, physical >search, interpretation of the readings and measurements, and if >there is nothing, there is nothing. (We are the opposition referred >to in his posting to the list). (The signal could have been present >when he conducted his survey with the CPM, a few nights earlier, if >there ever was one. We never got a printout, frequency, signal >strength, etc) The CPM-700 is only as good as the operator, and instruments that generate hard copy reports cost money. I've known TSCM people who could find a bug with a cheap $20 VOM, a coat hangar, and a ten cent diode. I've also know TSCM people who have a latest in everything, but couldn't find a five watt FM device in the same room as them with a 494. >We agree with Grudko that more has to be done regarding educating >companies about the overall lack of proper counterintelligence >practices. It's actually a worldwide problem. >We regularly present Workshops on the subject and usually feature an >international speaker at the events. Rob Muessel of ISA visited >South Africa twice as a keynote speaker at these workshops. A >technician and an engineer from Winkelmann Ltd (UK) featured twice >last year on our workshops and technical and engineering staff from >REI will be keynote speakers at a Workshop we are hosting in >September. > >During these workshops sophisticated devices and the countermeasures >are discussed and even analysed during the presentations. We have >another Workshop in July where we will analyse and evaluate very >sophisticated audio devices from a well-known Scandinavian company. Kindly add my name to the mailing list for these upcoming seminars, I may be interested in attending. >We regularly invite the local PI industry to these workshops but >they never attend. Grudko is on record where he wrote us that "he is >not into Workshops" when we mailed him an announcement of an >upcoming workshop. Ouch... Why don't you extend your offer to him again, buy him dinner and drinks, and try to "smooth out some ruffled feathers". >There are a few companies in South Africa offering professional >commercial TSCM services and the TSCM fraternity is a small group in >South Africa and they all know each other. I know of about 45-50 TSCM people in SA, with a two thirds of them being federal government employees. >Grudko does not represent them or the level of services they offer, >nor is he any opposition. On what basis can he give an informed >opinion to the World what is available in South Africa or what level >of sophistication we have to counter in South Africa? It's probably just a matter of perspective >Perhaps he should consider to invest in professional equipment like >the OSCOR and will be able to see, hear and detect things that are >beyond the capabilities of a CPM and Scanlock. No doubt that in time he will. >TSCM demands commitment, dedication as well as a large investment in >equipment and constant training. Amen >We thank you for the opportunity to allow a different view of TSCM >in South Africa. I welcome such open and frank discussion in the list... thank you for expressing your views and concerns. I would like to see more open discussion of this nature in the list (but let's be nice). >Steve Whitehead & Lorenzo Lombard >Managing Members TSCM Services cc >Tel (+2712) 664-3157 Fax (+2712) 664-3180 >P O Box 16063, Lyttelton, 0140, Gauteng, South Africa >E-mail sceptre@m... >URL http://www.tscm.co.za =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 498 From: the cynic Date: Fri Jun 2, 2000 10:59am Subject: Re: computer forensic Regarding determining whether or not a particular piece of hardware was replaced at a given time, no. There is no real way to determine whether or not someone shoved a new floppy drive, or hard drive, or zip drive, or whatnot, into a computer within a given time period. One can try to do certain things, for example if you know for a fact that a given computer was installed on such and such a date, say Nov 5 1996, and you have it in your possession you can check the physical information on the Drive. The Directory Tables on a FAT filesystem contains information like the date that a file or directory was created and the time. I would guess that you can look at the directory table information for important system files that do not update themselves, and see when they were created. IF more recent than the knwon install date of the system this could indicate either a new filesystem was put on an old drive, or a new drive in all was shoved in with a new file system. This obviously not a fool proof method :-) Other than that nothing that I am aware of. As for recovery of deleted data I refer you to the paper: _Secure Deletion of Data from Magnetic and Solid-State Memory_ Gutmann, Peter. Interesting stuff. 499 From: A Grudko Date: Fri Jun 2, 2000 8:04am Subject: Marty Kaiser Equipment Marty Kaiser and others Please eMail me privately a list of the TSCM equipment & specs. you have available with approx export prices (excluding shipping) and any training as I am looking at renewing my kit and having a technician trained up. andy@g... Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigations & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia Israel - www.grudko.com. - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 Members of : SCIP (Gauteng Chairman), SACI (President), GIN (Charter), WAD, CALI, SASFed, SASA, SAMLF, UKPIN, AFIO (OS) Prisoners' Rehabilitation & Education Trust --- "When you need it done right - first time" --- 500 From: A Grudko Date: Fri Jun 2, 2000 9:52am Subject: Digital phones Long preamble to say what we do currently, followed by short question. Digital instruments on a PABX are a pain in the rear and are getting more common. One method of tapping them if it is a 2 wire system, as most are here, is to pick up the receiver (earpiece/speaker) connection - usually on a dandy 4 pin mini connector ('cos the side tone gives you both sides of the conversation) and run the audio ('cos it's not been converted to digital yet) down to the plug via the unused pair in the 4 core and off to an amplifier then recorder. We have seen this done. One could also stick a TX on the same point - no Steve, I'm not claiming we've found one of these, I'm theorising. This is easy to detect on a physical inspection, either by opening up the body of the phone or by inspecting the socket. You can also pick up the audio off the cable with a simple amplifier and of course it shouldn't be there on a digital phone - something of a giveaway. If the line has been actually tapped - i.e. on the pair, with a digital to analogue converter, it could be anywhere - like a tap on an analogue phone. Obviously a pro will use a high impedance pickup, or capacitivly decouple, or even couple inductively, making electronic detection hard. Again theory - I don't claim to have seen this done. On high risk extensions we unplug the phone, disconnect at the PABX frame ('peg out' in our local parlance )and run the standard checks for resistance, capacitance and impedance (which obviously won't detect inductive coupling). We also do physical searches at all the distribution points 'cos we acknowledge that you can't just rely on equipment, and we also use an RF type probe - a cable tracer - to 'sniff out' any diversions - but again it'll probably miss an inductive coupling. All this is time consuming. My question is, would a TDR be the right way to go to be more efficient? I don't own one but operated one a few years ago on a course and wasn't very impressed, but no doubt technology has improved. I'd prefer private replies unless you really want to share it with the group. Thanks. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigations & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia Israel - www.grudko.com. - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 Members of : SCIP (Gauteng Chairman), SACI (President), GIN (Charter), WAD, CALI, SASFed, SASA, SAMLF, UKPIN, AFIO (OS) Prisoners' Rehabilitation & Education Trust --- "When you need it done right - first time" --- 501 From: Date: Fri Jun 2, 2000 10:39am Subject: Scanlock Further to my recent message regarding the new Scanlock M2 Countermeasures Receiver, and for those who want to download the Advance Data Sheet, information is available in pdf format on www.audiotel-int.com (be patient with us - we are re-building the site). I assume there is no harm in manufacturers like us occasionally posting information on TSCM One-list with regard to major technical advances and new products, you know who we are and we are up-front about our intentions. Equally, I suppose there is license for dealers to promote their products. For example Mr Atkinson reps certain brands, but he tells us this and although he generally recommends a certain manufacturer's product line, we know he is a vendor who is knowledgable, fair and open minded. On the other hand, when manufacturer's reps praise products which they are selling, without disclosing a connection, there is a real danger that advice and information on what is internationally regarded as an important forum will be devalued. In our experience TSCM'ers are usually pretty smart and most will carefully examine specifications/get a detailed demo before they get out the cheque (or should that be check?) book. Adrian Hickey Sales Manager 502 From: Robert G. Ferrell Date: Fri Jun 2, 2000 10:48am Subject: RE: computer forensic >As with TSCM, anybody can attempt computer forensics. The professionals will >be trained, experienced, and equipped to do the best job possible. A non-pro >almost always makes a mess out of the hard drive, often destroying evidence. I have to second this assertion. STM is a complex process and requires considerable training; it would be not only expensive but verging on the insane for someone not specifically trained in its use to attempt it. Moreover, just opening a hard drive requires a clean room environment, serious anti-static precautions, and very, very meticulous technique. An inexperienced person with bug-locating equipment might, in a target-rich environment, luck out and find one. An inexperienced person who tries to recover overwritten data on a hard drive will fail universally, and probably destroy the drive in the process. You can take that to the bank. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center, US DoI Robert_G_Ferrell@n... ------------------------------------------------------------ Not an official statement by any entity of the US Government ------------------------------------------------------------ 503 From: James M. Atkinson, Comm-Eng Date: Fri Jun 2, 2000 11:39am Subject: Ping Box A ping box is a simple circuit that consists of a low voltage battery, two TL555 timers, four resistors, and some small value timing capacitors (ie 2pf). The circuit is powered by 4 AA alkaline batteries in a small case. The function is to provide a 15-20 ns pulse at a repetition rate of 75 KHz (which is simple to do for under five bucks). One of the resistors should be variable so that you can extend the pulse width relative to the length of cable being tested. This pulse signal is applied to a line under test and its behavior observed with a oscilloscope. The time between the pulse being released and "impedance bumps" is divided by 2 and then again by the speed of light (1.017 ns per foot). The results are then multiplied by the Velocity of Propagation Coefficient for the specific cable you are testing (it's actually easy to do in your head after a few hundred times). The time to these "impedance bumps" tell us WHERE things have been done to a wire, and the polarity and/or amplitude tells use WHAT was done to it. This signal can be directly squirted into a wire provided that no voltage or load is present (ie: a 500 ft roll of Cat 5 wire sitting on your work bench) If you want to "drive" something such as a phone line then you will have to buffer the signal which requires a 2N3904 or similar transistor and another 2-3 resistors. Also, you should consider adding a small impedance load, and variable compensation cap for what you are measuring for optimal results. Failure to "buffer" a driven line will result in a small explosion as your ping box is reduced to shrapnel. Also, on the off chance the phone rings things will also go poof unless you add a transient limiting circuit. If you want higher resolution you will need to shift to a CMOS oscillator and create a signal with a 250-300 pS rise time. What you have just done is create a TDR for under five bucks (not including a battery). -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 504 From: James M. Atkinson, Comm-Eng Date: Fri Jun 2, 2000 11:56am Subject: Re: Scanlock Adrian, At 4:39 PM +0100 6/2/00, Adrian@a... wrote: >Further to my recent message regarding the new Scanlock M2 Countermeasures >Receiver, and for those who want to download the Advance Data Sheet, >information is available in pdf format on www.audiotel-int.com (be patient >with us - we are re-building the site). When you post a web site please remember to add the appropriate preamble: http://www.audiotel-int.com/ >I assume there is no harm in manufacturers like us occasionally posting >information on TSCM One-list with regard to major technical advances and >new products, you know who we are and we are up-front about our >intentions. Please by all means plug you products periodically on the list, I strongly encourage you and the other manufacturer's talk about your own products (but try to keep it oriented towards a technical audience, and be gentle with the sales push). However, be discrete and don't over do it. >Equally, I suppose there is license for dealers to promote their products. >For example Mr Atkinson reps certain brands, but he tells us this and >although he generally recommends a certain manufacturer's product line, we >know he is a vendor who is knowledgable, fair and open minded. If a client expresses interest in a product I will try to set up a relationship with the manufacture so I can provide my client with the equipment they seek. I try to shy away from sales activities, but I feel that it is an important to provide a client with a channel where they can draw equipment at a fair price, get a fair deal, and not have to deal with "spy shop" hype. My primary efforts are in performing services, and I would much rather perform a sweep for a client rather then sell him equipment. But then of course most client are not going to have we come in once a week for a sweep. >On the other hand, when manufacturer's reps praise products which they are >selling, without disclosing a connection, there is a real danger that >advice and information on what is internationally regarded as an important >forum will be devalued. Agree'd, but then again there is a very limited number of legitimate and functional TSCM equipment out there. TSCM equipment also tends to come in various threat levels, various consumers, and various geographic preferences. >In our experience TSCM'ers are usually pretty smart and most will >carefully examine specifications/get a detailed demo before they get out >the cheque (or should that be check?) book. > > >Adrian Hickey >Sales Manager =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 505 From: James M. Atkinson, Comm-Eng Date: Fri Jun 2, 2000 0:10pm Subject: Re: Digital phones At 4:52 PM +0200 6/2/00, A Grudko wrote: >Long preamble to say what we do currently, followed by short question. > >Digital instruments on a PABX are a pain in the rear and are getting more >common. Yikes... I LOVE digital Instruments on a modern PBX... tampering is so easy to find provided the entire circuit is only service a a single pair. The instrument itself only require an X-ray followed by an internal physical search. It when we are dealing with analog signals, multiple cable pairs for power, voice, data, that things start to get messy. I'll take a modern PBX with a PCM or IDSN connection any day over a typical analog loop line or [shudder] a KEY system. >One method of tapping them if it is a 2 wire system, as most are here, is to >pick up the receiver (earpiece/speaker) connection - usually on a dandy 4 >pin mini connector ('cos the side tone gives you both sides of the >conversation) and run the audio ('cos it's not been converted to digital >yet) down to the plug via the unused pair in the 4 core and off to an >amplifier then recorder. We have seen this done. > >One could also stick a TX on the same point - no Steve, I'm not claiming >we've found one of these, I'm theorising. > >This is easy to detect on a physical inspection, either by opening up the >body of the phone or by inspecting the socket. > >You can also pick up the audio off the cable with a simple amplifier and of >course it shouldn't be there on a digital phone - something of a giveaway. Ah... or it could also be a covert data stream of audio running 40 dB down from the main signal at a different pulse rate (or even RF). >If the line has been actually tapped - i.e. on the pair, with a digital to >analogue converter, it could be anywhere - like a tap on an analogue phone. >Obviously a pro will use a high impedance pickup, or capacitivly decouple, >or even couple inductively, making electronic detection hard. Again theory - >I don't claim to have seen this done. Capacitive or Inductive coupling would show up on the cross talk analysis. >On high risk extensions we unplug the phone, disconnect at the PABX frame >('peg out' in our local parlance )and run the standard checks for >resistance, capacitance and impedance (which obviously won't detect >inductive coupling). We also do physical searches at all the distribution >points 'cos we acknowledge that you can't just rely on equipment, and we >also use an RF type probe - a cable tracer - to 'sniff out' any diversions - >but again it'll probably miss an inductive coupling. All this is time >consuming. How about "going to copper" with a Oscilloscope and SA before disconnecting anything to avoid alerting the eavesdroppers. >My question is, would a TDR be the right way to go to be more efficient? I >don't own one but operated one a few years ago on a course and wasn't very >impressed, but no doubt technology has improved. A TDR is nothing more then a Oscilloscope with a simple ping box. If you already have a good scope, then you don't have to have a TDR. But then again I am a "belt and suspecnders" kind of guy and I use both a scope and a TDR. >I'd prefer private replies unless you really want to share it with the >group. Thanks. > >Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime >investigations & intelligence >Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia >Israel - www.grudko.com. - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 >Members of : SCIP (Gauteng Chairman), SACI (President), GIN (Charter), WAD, >CALI, SASFed, SASA, SAMLF, UKPIN, AFIO (OS) Prisoners' Rehabilitation & >Education >Trust --- "When you need it done right - first time" --- =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 506 From: Robert G. Ferrell Date: Fri Jun 2, 2000 0:25pm Subject: Re: Computer Forensics >"This security tool eliminates all evidence from your PC in one single >click of a button. Even DoD overwrite algorithms are not proof against scanning tunnel microscopes, which resolve surface structure topologies of the hard disk's platters to a nanometric scale. Once a magnetic pattern has been written to a disk, some residual of that pattern remains even after the area has been overwritten. Of course, as was pointed out earlier, this forensics process is inordinately expensive at the moment, since Atomic Force/Scanning Tunnel microscopy is still a new technology. Just be aware the products which make claims to "eliminate all evidence" from a disk are kidding themselves and you. If you want to eliminate all evidence from a disk, melt it to slag and carbon dust with a blowtorch and then bury the residue in a deep hole. RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center, US DoI Robert_G_Ferrell@n... ------------------------------------------------------------ Not an official statement by any entity of the US Government ------------------------------------------------------------ 507 From: Jordan Ulery Date: Fri Jun 2, 2000 3:23pm Subject: Re: Computer Forensics YUP "caveat emptor" "Robert G. Ferrell" wrote: > >"This security tool eliminates all evidence from your PC in one single > >click of a button. > > Even DoD overwrite algorithms are not proof against scanning tunnel microscopes, > which resolve surface structure topologies of the hard disk's platters to > a nanometric scale. Once a magnetic pattern has been written to a disk, some > residual of that pattern remains even after the area has been overwritten. > > Of course, as was pointed out earlier, this forensics process is inordinately > expensive at the moment, since Atomic Force/Scanning Tunnel microscopy is still > a new technology. Just be aware the products which make claims > to "eliminate all evidence" from a disk are kidding themselves and you. > If you want to eliminate all evidence from a disk, melt it to slag and carbon > dust with a blowtorch and then bury the residue in a deep hole. > > RGF > > Robert G. Ferrell, CISSP > Information Systems Security Officer > National Business Center, US DoI > Robert_G_Ferrell@n... > ------------------------------------------------------------ > Not an official statement by any entity of the US Government > ------------------------------------------------------------ > > ------------------------------------------------------------------------ > Take your development to new heights. Work with clients like Dell and > pcOrder. Submit your resume to jobs@l.... Visit us at > http://click.egroups.com/1/4358/1/_/507420/_/959966877/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 508 From: James M. Atkinson, Comm-Eng Date: Fri Jun 2, 2000 4:59pm Subject: Re: Computer Forensics At 12:25 PM -0500 6/2/00, Robert G. Ferrell wrote: > >"This security tool eliminates all evidence from your PC in one single > >click of a button. > >Even DoD overwrite algorithms are not proof against scanning tunnel >microscopes, >which resolve surface structure topologies of the hard disk's platters to >a nanometric scale. Once a magnetic pattern has been written to a disk, some >residual of that pattern remains even after the area has been overwritten. > >Of course, as was pointed out earlier, this forensics process is inordinately >expensive at the moment, since Atomic Force/Scanning Tunnel >microscopy is still >a new technology. Just be aware the products which make claims >to "eliminate all evidence" from a disk are kidding themselves and you. >If you want to eliminate all evidence from a disk, melt it to slag and carbon >dust with a blowtorch and then bury the residue in a deep hole. > >RGF > >Robert G. Ferrell, CISSP >Information Systems Security Officer >National Business Center, US DoI >Robert_G_Ferrell@n... I was taught (at a government school) that the laws of physics dictate that you can never really erase a magnetic track alignment once it is laid down, and that hard drive and tape heads tend to drift "inside the track". This drifting ensures that data is still retrievable even after thousands of over writes (providing of course the spy has access to some heavy forensic gear). Magnetic tape, disks, and so on have a slight offset of the heads each time it makes a pass inside a track. In some cases dozens, and sometimes hundred of specific "writes" can be extracted from a single track with the data being written parallel to each other and other overleaved over prior data. Of course the last track signal written will be the strongest signal of all, but all the previous signals will still be there. We (as in my government days) used to shred all of our flexible magnetic media into 1/16th inch pieces, screen it for oversized pieces, and mix it into a solvent slurry before it could even leave the building to be burned. The shredding only happened after the media was over written X number of times, and then degaussed in an X gauss field for X minutes. If you wanted to sterile a hard drive you have to disassemble the platters themselves, degauss each of them, sand off all of the magnetic coating (using a HEPA filter), then put each of the platters on a metal lathe and cut away the first half millimeter on each side. Then and only then could you cut the actual disc into 10 mm or less squares, add in all the filings, and send it off to be smelted. Each IC on each PCB had be zeroized, and a center punch had to be applied to each IC dice. The actual heads which come into contact with the drive surface had to be cleared via a swept signal, and then overloaded until the actual coil overloads. The actual drive chassis itself in then cut into pieces roughly the size of a sugar cube and placed into a barrel with the other scrap from the sterilization. The barrel (when the sterilization was complete) would then be shipped out to a government smelter and maintained at a "roaring boil" for at a full hour and poured out into ingots as scrap metal. Each ingot was then X-rayed to ensure nothing was accidently missed. The following was related to me by a retired Red Banner instructor: Back in to 60's, 70's and early 80's the U.S. government used millions of reels of magnetic tapes a month (both data and voice). The tape tended not to last very long, and was simply being degaussed and sold for scrap (by the dumpster load). Unknown to the CI people a huge quality of this tape was being bought up by a number of front companies who where stacking it into cargo containers and shipping it back to the Soviet Union for exploitation. Tape reels that had any kind of classified markings received special and expedited handling. In the USSR the tape were then read on modified equipment and high classified information extracted from the reels by simple "punching up the signal". At one point they even went to far as to break into certain salvage yards so they could swipe reels with certain markings, and not wait for the salvage release dates. Just something to think about. -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 509 From: Jay Coote Date: Fri Jun 2, 2000 5:20pm Subject: Surge protector for RF, CC and SA's? I am looking for some simple circuits for protecting receiver, spectrum analyzer, scope and audio amplifier frontends from voltages which may be found on phone, CATV, LAN, power and other lines. A small budbox with banana/bnc or other appropriate connectors plus HV capacitors has worked for me thus far to protect my equipment from and AC or DC voltages... Anyone using 1N914 diode clippers or other simple, passive circuits? Thanks, Jay Coote Los Angeles (Please disregard the date error... it's not the PC, but an Ms thing, to be resolved later) 510 From: Date: Fri Jun 2, 2000 1:40pm Subject: News Story - sweeper in the news I thought that this would interest my fellow list people. The URL for the story is nyjournalnews.com : News Story or http://www.nyjournalnews.com/pirro/jnap018.sht. The URL contains links to previous articles. WHITE PLAINS --The husband of Westchester District Attorney Jeanine Pirro hired an investigator from her office to check for wiretaps on behalf of a client, then directed that the bill be sent to a company in his law office, the investigator testified yesterday. Acting Chief Investigator Patrick Spatafore said he later received a $1,077.50 check from the company, Baumeister Enterprises, that was displayed to the jury at lawyer Albert Pirro's federal tax-fraud trial. The check bore a distinctive signature that Albert Pirro's executive assistant identified earlier this week as that of her boss. Spatafore's testimony did not make clear the significance of the transaction, which he said involved work at a Manhattan apartment and the Harrison home of Albert Pirro's client, Marvin Singer. "He told me there was a matrimonial dispute," Spatafore said, when asked why Pirro hired him to work for Singer. But during opening statements last month, prosecutor Cathy Seibel said that Albert Pirro used Baumeister Enterprises -- which she called a "shady little company" -- to increase the cost of the work by more than $1,600. And two weeks ago, prosecutors showed jurors a $2,693.75 invoice from Baumeister Enterprises for an "audio countermeasures survey" at Singer's Manhattan clothing company, Depeche Mode. In court papers filed earlier in the case, prosecutors alleged that Albert Pirro pocketed the difference between the two bills, and changed the location of the work so that Singer -- a client, friend and golf partner -- could illegally deduct the cost as a business expense. Albert Pirro and his younger brother, accountant Anthony Pirro, are charged with conspiracy and tax evasion in an alleged scheme to illegally deduct almost $1.2 million in personal spending by Albert Pirro as business expenses. Jeanine Pirro is not charged in the case. Defense lawyers had tried previously to block introduction of the evidence involving Marvin Singer, and they argued about it again yesterday during an hourlong sidebar with federal Judge Barrington D. Parker, Jr. Parker allowed Spatafore's testimony, however, as well as that of two subcontractors Spatafore hired to do the work, one of whom, Mark DelVecchio, is also an investigator in the District Attorney's Office. Afterward, defense lawyer Gustave Newman called the testimony "so prejudicial" to Albert Pirro that he had to ask for a mistrial. Parker denied the request. During his testimony, Spatafore said his outside work involved a home-based company called Secure Communications Services that focused mainly on preventing corporate espionage. Spatafore said he filed an annual disclosure statement with the District Attorney's Office, and avoided any jobs that could lead to uncovering wiretaps or listening devices installed by law enforcement agencies. District Attorney Jeanine Pirro would not speak with reporters yesterday, but has said previously that her investigators were allowed to moonlight after their outside work was reviewed and approved by administrators in her office. Pace University law professor Bennett Gershman, who has been attending the trial and was present for yesterday's testimony, called moonlighting by Spatafore and DelVecchio a "staggering conflict of interest." A spokesman for Bronx District Attorney Robert Johnson said that office allowed its investigators to perform outside work on a case-by-case basis. But spokesman Steven Reed said Johnson would "probably not" let an investigator work for the district attorney's spouse or friends, because it could create the "appearance of a conflict." Staff writer Oliver W. Prichard contributed information for this report. 511 From: James M. Atkinson, Comm-Eng Date: Fri Jun 2, 2000 7:04pm Subject: Re: Surge protector for RF, CC and SA's? At 6:26 PM -0400 6/2/00, Jay Coote wrote: >I am looking for some simple circuits for protecting receiver, >spectrum analyzer, scope and audio amplifier frontends from voltages >which may be found on phone, CATV, LAN, power and other lines. A >small budbox with banana/bnc or other appropriate connectors plus HV >capacitors has worked for me thus far to protect my equipment from >and AC or DC voltages... Anyone using 1N914 diode clippers or other >simple, passive circuits? >Thanks, >Jay Coote >Los Angeles Jay, The following is my own design, so please give appropriate credit. First use a small fuse that is easy to change. Use two high voltage (several kilovolts) capacitors in series with the signal to de-couple the signal. Determine value of these capacitors based on what you are feeding into the circuit, and what you want to reject (your using them as a high pass filer). In the case of "polite signals" you would only used these caps for DC blocking, or not at all. Next you will need a gas tube voltage protector but the breakdown voltage you pick will depend on your specific application (Ethernet, telephone, AC-110, AC-220, etc). This component is installed in parallel with, and behind the de-coupling caps. After this I like to put in some kind of low wattage light, LED, or Neon bulb to develop a load across the line. What you use of course depends on the voltages you are testing (ie: do not use an LED on a 480 volt 3 phase box) Next you will want a low value resistor in parallel across the signal. something between 200 and 300 ohms will be fine. Next you may optionally want to install a low value variable resistor in series here to act as an attenuator. The next component(s) in parallel is a glass passivated junction to knock down anything that may have leaked though. This is most important when try to couple your spectrum analyzer into the power lines. This component must be easy to change, and helps to limit the possibility of blowing the 1N914's. Next I used two 1N914 diodes back to back in parallel with the signal.for a classic limiting circuit. These diodes must be easy to change. Be sure to check your circuit on a signal generator before using on a live circuit to ensure it works and knocks out the hostile signals. Also, watch your grounds, and consider using a shielded enclosure. I very commonly plug one of my boxes right into the AC mains, decouple it and filter out the AC, run it though one of these circuits, and then punch it up with an 30+ dB LNA and drop it directly into the front end of a spectrum analyzer or radio (don't try this at home). -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== From: Robert Dyk Date: Fri Jun 1, 2001 2:21pm Subject: Identifying Echelon Stations Let's assume for a moment that "echelon" has even a fraction of the capability that some of these journalists would try and convince us exists. I would like to know if anyone has calculated the amount of useless communication that this system would have to sift through before it finds or flags anything remotely worth listening to. It strikes me that these volumes are so vast that they are almost beyond estimation. If this is the case, then echelon (or any other high volume interception system) becomes just another method of directed electronic surveillance, intecepting traffic on channels which have been previously identified as possible targets by other means of intelligence. IMHO Robert Dyk Worldwide Security Ltd. 3123 From: Robert G. Ferrell Date: Fri Jun 1, 2001 11:53am Subject: Re: Identifying Echelon Stations >Let's assume for a moment that "echelon" has even a fraction of the >capability that some of these journalists would try and convince us exists. My contention has always been and remains that Echelon is a carefully nurtured hoax designed to increase the FUD (fear, uncertainty, and doubt) factor surrounding international telecommunications. In the words of the late, great, Douglas Adams, "The CIA discovered that, instead of actually invading a country, it would be cheaper and more effective to make them *think* they'd been invaded." Just because you're not paranoid doesn't mean they're not out to get you. Or does it? The s/n ratio for content filtering on the scale routinely ascribed to Echelon would make cracking Triple DES seem trivial by comparison. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 3124 From: Robert G. Ferrell Date: Fri Jun 1, 2001 11:55am Subject: Re: Mmind Ccontrol humour >But for $22 I can buy an over the counter kit in >downtown J*h*a*n*e*b*r* (sorry, the location is classified) ^^^^^^^^^^^^^^ Very clever encryption algorithm. Let's see Echelon crack that one! ;-) RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 3125 From: DrPepper Date: Fri Jun 1, 2001 0:41pm Subject: Re: Identifying Echelon Stations Robert Dyk wrote: > Let's assume for a moment that "echelon" has even a fraction of the > capability that some of these journalists would try and convince us exists. > I would like to know if anyone has calculated the amount of useless > communication that this system would have to sift through before it finds or > flags anything remotely worth listening to. It strikes me that these > volumes are so vast that they are almost beyond estimation. > That's why their computers do it. They look for words like "bomb, kill, president, shoot" and then they take a closer look. That cuts down a lot of the chaff. But you are correct, theres a lot of stuff to go through to get there. > > If this is the case, then echelon (or any other high volume interception > system) becomes just another method of directed electronic surveillance, > intecepting traffic on channels which have been previously identified as > possible targets by other means of intelligence. That, too, Robert, , , , , , , > > > IMHO > > Robert Dyk > Worldwide Security Ltd. -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my shack LIVE at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 3126 From: Steve Uhrig Date: Fri Jun 1, 2001 0:19pm Subject: Re: Shark fins Once upon a midnight dreary, A Grudko pondered, weak and weary: > I've seen an interesting GSM cellular antenna on the latest > models. It looks like 2 flattened black anodised rounded > 'shark fins', similar to some of the Erikson 'phones, about a > quarter wave high and a quarter wave apart on the horizontal, > in line with the front/rear axis of the car. It appears to be > a. OEM capacitive/inductive glass mount. Read up on "diversity" antenna systems. You see them on better quality wireless mikes and cordless phones too. More effective at higher frequencies where the wavelength is shorter and spacing more practical. In many consumer applications, cell phones included, the two antennas are not really diversity antennas. Most of the devices merely switch to either antenna in a comparator or multiplex situation and pick the signal off whichever is receiving it stronger. And virtually all of the consumer devices use the two antennas for receive only. Transmit side just picks a single antenna. Generally only high end commo systems use true spacial diversity. It involves two identically matched receivers, and ongoing maintenance generally. > I don't understand the mechanics of impedance matching 2 > antennas through a glass mount but it must be similar to using > a 75 ohm harness to match two 50 ohm antennas The glass is a capacitor. Thru-the-glass antennas are not very efficient and have a number of mounting considerations, but with cellular signals generally being very strong, the convenience and no holes aspect outweighs the shortcomings. The coax harness for impedance matching is merely a transformer. > I think this kind of design could assist in detecting (as against > locating) very low power suspect signals because wherever you are > in the room you will get maximum signal, regardless of your > position on the sine wave phase relative to the transmit antenna. If you were using true spatial diversity, which is complex and expensive as mentioned above, possibly there would be a benefit to TSCM types. But remember the realities of life. The listening post needs to hear the signal in order for the eavesdropping operation to be of any concern. It would be unlikely the listening post receiver (antenna, actually) would be closer to the hostil transmitter than your sweep receiver's antenna. You being a little bit closer means a big increase in signal strength, as you know from the inverse square law. The point being, if you can't hear the signal with your relatively decent sweep receivers, it is unlikely an eavesdropper would either. The real world and laws of physics work in our favor for once. You bring out some good issues. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3127 From: Robert Dyk Date: Fri Jun 1, 2001 5:02pm Subject: Re: Shark Fins Mobile Mark made an AMPS mobile antenna with two 1/4 wave rods, glass mounted in the late 80's. No diversity, No switching, only one coax connection to the to transceiver. Supposedly 3 dB gain. They didn't work very well. I would consider the two fins in the example as likely a facility to accomodate dual band GSM devices. (There are many of these antennas available in Europe with integrated GPS patch antennae for onboard nav aids) Robert Dyk Worldwide Security Ltd. 3128 From: Craig Snedden Date: Fri Jun 1, 2001 10:27am Subject: Re: Identifying Echelon Stations :-) A handy bag of marshmallows was always a fine treat on a cold day :-) (didn't do much for the circuitry if left too long though! Reminds me of the time I left a pack of butter straight from the fridge on top of a unit to warm up. I managed to get out of the workshops without having to explain why I thought the rig wasn't working.....!) I take your point Andy. I have seen at first hand the radar equipment fitted to a Soviet Bloc AAA (Anti Aircraft Artillery for the those non military background members of the list) system, all valves, not a transistor to be seen (and this is in a tracked vehicle, not exactly a comfortable ride!). My first reaction was "what a load of old crap". Then, just as you say, I thought about a post detonation EMP....... Not so silly after all when you think about it in those terms. Perhaps this drive to miniaturisation does have it's downsides. I can relate to your story about the radar detector and GSM towers. Here in the UK we have a lot of traffic signals fitted with active traffic flow sensors, usually running in the X band. I've figured out that you can tell when the light is about to change by the change in the pulse rate on the detector about a second and a half before the light actually changes. Craig ----- Original Message ----- From: "A Grudko" To: ; "Craig Snedden" Sent: Friday, June 01, 2001 12:34 PM Subject: Re: [TSCM-L] Identifying Echelon Stations > ----- Original Message ----- > From: Craig Snedden > >.....I was amazed to see a "tactical" satcom unit > > of a certain NATO country appear on a deployment consisting of a large > (4-6 > > metre) dish mounted on one truck and the TX/RX mounted on another and the > > associated switching systems on yet another, with the power detachment > > coming along for the ride as well. All our kit could be stowed in the > back > > of a small 4X4 and did exactly the same job.....!!!! > > Who needs night vision when all you have to look for is the glow of the > 'bottles' (valves) in the second truck. > > I joke of course, but there was serious talk a few years ago about some > Soviet military backup equipment being designed around miniature thermionic > valves rather than solid state components because of being thousands of > times less susceptible to EMP after a nearby nuclear strike or the use of > Pulse type weapons. > > (in a nearby lightning groundstrike recently 4 'state-of-the art' > miniaturised receivers went deaf and are in the repair shop. My 20 year old > FRG-7700 is as fresh as a puppy....) > > > Andy Grudko. D.P.M., Grad I.S, (S.A.) > ZR6UU > ZRAJ7795 > G8RXE The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 3129 From: e cummings Date: Fri Jun 1, 2001 3:04pm Subject: AMPS diversity system back around 1986 i installed a trunk-mounted E.F. Johnson AMPS cellular transceiver for a client. it had a diversity receiver, which at the time i thought was a great idea because of the propagation characteristics at 800 Mhz . two TNC connectors on the radio unit fed into separate receiver boards (i looked into it to verify that they weren't just phased together.) i mounted an antenna specialists' 5/8-wave antenna on each of the rear fenders. the diversity receiver worked much better than any other AMPS transceiver i ever used, (before or since.) the head unit used a regular modular telephone handset and had superb fidelity. soon thereafter, E.F. Johnson bailed out of the AMPS subscriber unit business. apparently folks weren't willing to shell out $5000 for that kind of quality. it's a shame the diversity idea never caught on in the marketplace; it worked extremely well. -ed cummings At 03:02 PM 6/1/01 -0700, you wrote: >Mobile Mark made an AMPS mobile antenna with two 1/4 wave rods, glass >mounted in the late 80's. No diversity, No switching, only one coax >connection to the to transceiver. Supposedly 3 dB gain. They didn't work >very well. I would consider the two fins in the example as likely a >facility to accomodate dual band GSM devices. (There are many of these >antennas available in Europe with integrated GPS patch antennae for onboard >nav aids) > >Robert Dyk >Worldwide Security Ltd. 3130 From: Steve McAlexander Date: Fri Jun 1, 2001 3:41pm Subject: RE: Identifying Echelon Stations Yep same with their radar in the MIGS all tube based no transistors. Why resistance to EMP and survivable... -----Original Message----- From: Craig Snedden [mailto:craig@d...] Sent: Friday, June 01, 2001 10:28 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Identifying Echelon Stations :-) A handy bag of marshmallows was always a fine treat on a cold day :-) (didn't do much for the circuitry if left too long though! Reminds me of the time I left a pack of butter straight from the fridge on top of a unit to warm up. I managed to get out of the workshops without having to explain why I thought the rig wasn't working.....!) I take your point Andy. I have seen at first hand the radar equipment fitted to a Soviet Bloc AAA (Anti Aircraft Artillery for the those non military background members of the list) system, all valves, not a transistor to be seen (and this is in a tracked vehicle, not exactly a comfortable ride!). My first reaction was "what a load of old crap". Then, just as you say, I thought about a post detonation EMP....... Not so silly after all when you think about it in those terms. Perhaps this drive to miniaturisation does have it's downsides. I can relate to your story about the radar detector and GSM towers. Here in the UK we have a lot of traffic signals fitted with active traffic flow sensors, usually running in the X band. I've figured out that you can tell when the light is about to change by the change in the pulse rate on the detector about a second and a half before the light actually changes. Craig ----- Original Message ----- From: "A Grudko" To: ; "Craig Snedden" Sent: Friday, June 01, 2001 12:34 PM Subject: Re: [TSCM-L] Identifying Echelon Stations > ----- Original Message ----- > From: Craig Snedden > >.....I was amazed to see a "tactical" satcom unit > > of a certain NATO country appear on a deployment consisting of a large > (4-6 > > metre) dish mounted on one truck and the TX/RX mounted on another and the > > associated switching systems on yet another, with the power detachment > > coming along for the ride as well. All our kit could be stowed in the > back > > of a small 4X4 and did exactly the same job.....!!!! > > Who needs night vision when all you have to look for is the glow of the > 'bottles' (valves) in the second truck. > > I joke of course, but there was serious talk a few years ago about some > Soviet military backup equipment being designed around miniature thermionic > valves rather than solid state components because of being thousands of > times less susceptible to EMP after a nearby nuclear strike or the use of > Pulse type weapons. > > (in a nearby lightning groundstrike recently 4 'state-of-the art' > miniaturised receivers went deaf and are in the repair shop. My 20 year old > FRG-7700 is as fresh as a puppy....) > > > Andy Grudko. D.P.M., Grad I.S, (S.A.) > ZR6UU > ZRAJ7795 > G8RXE The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 3131 From: James M. Atkinson, Comm-Eng Date: Fri Jun 1, 2001 5:17pm Subject: PR-700 Power Supplies I recently purchased a righteous quantity of PR-700's which I will be using for teaching TSCM (along with SPECTREs) but several units have a non-standard power supply module and are rigged for 24 volts DC only, with none of the 120 volt circuitry (but they do have the battery packs). To make these units functional I am looking to purchase several Micro-Tel PR-700 power supplies that run on AC... so if you have a scrap unit, or a stand alone PS you willing to sell drop me an email. I am also looking for several more WJ-8999's in any condition, with a preference for units with the HFE and WB IF filters. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3132 From: James M. Atkinson, Comm-Eng Date: Fri Jun 1, 2001 6:36pm Subject: Dog chews off woman's lower lip Damn poodles!! Dog chews off woman's lower lip By Sharon E. Crawford The Macon Telegraph June 1, 2001 WARNER ROBINS --- Police have determined a family pet ate off a woman's bottom lip while she was sleeping last week. Warner Robins police detective Karen Stokes said Thursday there was no evidence of a crime committed against a 47-year-old woman who said she woke up last Friday to find her bottom lip gone. Police determined the woman's poodle chewed off her lip while she was in a drug-induced sleep. Although the woman's family members believe an unknown chemical caused the injury, the woman admitted to police that she frequently allowed her 1-year-old poodle, "Shorty," to lick her lips after she drank sweet tea. She also told them her dog had taken her false teeth out of her mouth several weeks earlier and chewed them up while she slept. "The (doctors) found no trace of chemicals on the tissues they looked at," Stokes said. "We have determined it was the dog that caused the injuries." A call to the woman's North Houston Road residence was not returned Thursday. Elaine Stewart with the Houston County Health Department said officials also haven't been able to reach the victim about her dog. According to state law, an animal is supposed to be quarantined for 10 days following an animal bite to check for rabies. "A lot of people think we are going to put down their dogs and they are very protective of their animals," Stewart said Thursday. "If the people are cooperative, we actually allow home quarantine, where the animal can remain at home." The woman told police she took the pain medication Trazodone and drank sweet tea shortly after 10 p.m. May 24 and woke up at 9 a.m. May 25 to find her bottom lip was missing. While police officers searched the house for the woman's lip, they checked the dog and found traces of blood around the animal's mouth. The woman was treated and released from the Houston Medical Center. Stokes said the victim will have to have reconstructive surgery to reconstruct her lip, using skin from her buttocks area. http://www.macontelegraph.com/content/macon/2001/06/01/local/DOGBITE0601HOMT.htm -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 3133 From: James M. Atkinson, Comm-Eng Date: Fri Jun 1, 2001 9:38pm Subject: Airport experience > >Jim: > >Since you brought out the question of a traveling kit. I figured you >would enjoy this anecdote. Last year we traveled to XXXXXXXXXXXXX a >few times and one of those times I had the following experience. >I had set up a traveling kit which included a Fluke 99B, an >Explorer, a Scout, an OAR-8000 handheld scanner and various >miscellaneous tools such as screwdrivers, tips, a blade knife, a >McGuiver all tool, a small butt-set,etc.etc. > >Any way when we get ready to come back home from XXXXXXXXXXXXXXXXXX >I pass thru the airport security deal and they want to inspect my >business case which is where I am carrying all the tools. I open it >and the guy inspecting it is a Hindu middle age gentleman. He has >that typical female voice, looks at my tools and says " Oh I am >sorry sir , but you can not carry this hammer into the airplane, it >is very dangerous" I look at my miserable 4oz. little claw hammer, >that was given to me as birthday present by my daughter, and say to >myself quietly "shit". Now I am caught in a bind because if I have >him call a supervisor I know he'll see all the other stuff and I am >busted. > >So as nicely as I could I ask the Hindu man. Sir, do you have a >daughter? He looks at me puzzled and says "Yes". Well then please, >give this hammer to her, because this was a gift from my daughter to >me, so may-be it can keep serving a useful purpose. He smiles and >says "I will do that and I am sorry but I have to do my job".I say >Thank you very much close my business case and go to load the plane. > >That has been the only problem I have had in six national flights. >Most of the security ask what I do and I tell them I am a computer >tech. So far it has worked. I think the trick is to pack everything >neatly and real close together inside a black background case. > >This one is for your info. If you post it please keep my name and >Airport info. out . > >XXXXXX XXXXXXXXXX -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3134 From: Steve Uhrig Date: Sat Jun 2, 2001 10:16am Subject: Used TSCM and related equip FS Hello list, We have updated our used equipment list, with surveillance, countersurveillance, communications and related electronics for sale. Most used, some new. http://www.swssec.com/used.html You can sign up at the end of the page for an automatic service which will email you when the page is updated. This will remind you of the updates, keep you from having to bookmark the page and visit it occasionally, and make sure you get quick notification so you have an early opportunity to buy something of interest. Certain items sell within hours of the page being updated. Also Minox submini "spy" cameras are listed on a separate page: http://www.swsec.com/minox.html Visit here if you have any interest in the history of these tiny, super high quality cameras. They are not antiques; they aer still manufactured and film and processing is readily available. The smallest Minox is about the size of a Bic cigarette lighter and takes superb, high resolution color photos. Email reminder service on this page also. Questions invited on any product. And if you have something electronics or Minox related to sell, let me know. I pay very fair prices for good equipment. I take credit cards for payment and will ship anywhere in the world. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3135 From: Steve Uhrig Date: Sat Jun 2, 2001 6:45pm Subject: Tek 494AP wanted If anyone has one of the above spectrum analyzers you don't need and would be willing to sell, or something very close, please contact me. Tks ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3136 From: Date: Sat Jun 2, 2001 7:21am Subject: FYI - DTV smart card safeguards digital video http://www.edtn.com/story/OEG20010601S0081 DTV smart card safeguards digital video By Margaret Quan EE Times (06/01/01, 6:14 p.m. EDT) MANHASSET, N.Y. — Thomson Multimedia has proposed a smart card-based encryption scheme to safeguard digital video. Based on Extended Conditional Access (XCA), a renewable encryption scheme Thomson introduced in 1998, it claims to supplement other solutions for DTV copy protection provided by terrestrial broadcasters and to prevent illicit redistribution of digital video over the Internet. The new scheme, called SmartRight, keeps content encrypted in the consumers' home network until it is displayed or played on a presentation device. It was proposed to the Copy Protection Technology Working Group (CPTWG). Though XCA failed to gain widespread support in its first go-round, Thomson Multimedia (Paris) is proposing an enhanced version as a layer on top of current technologies such as 1394/5C or Digital Video Interface (DVI), to protect content where existing technologies do not. The 5C scheme is applicable in active, two-way environments, such as cable, while DVI — which provides a one-way interface to a display — is not a recordable interface. SmartRight could protect playing and recording of digital television over the air, via cable or satellite, as well as digital video content transmission over the Internet, Thomson maintains. SmartRight uses a system of smart cards to ensure renewability in case of penetration by a hacker, and it can be designed to be interoperable with existing copy-protection systems. The system would be for use worldwide. Thomson spokesman Dave Arland said the consumer electronics manufacturer thinks SmartRight will be better accepted now because it addresses issues that weren't as important two years ago. Arland said that Napster, for instance, which provided downloads of copyrighted music over the Internet before a court barred the practice, created fear among Hollywood studio executives. They "don't want to see the same thing happen with digital video content," he said. **************************** John R. Angier II M-Group P.O. Box 721388 Norman, OK 73070-8070 USA 405.321.1015 A fundamental principle is never to remain completely passive, but to attack the enemy frontally and from the flank, even while he is attacking us. - Clausewitz:Principles of War, 1812 3137 From: James M. Atkinson, Comm-Eng Date: Sat Jun 2, 2001 9:02pm Subject: Re: Discussion Item - Carry On TSCM Kit I guess I should offer my own equipment selection: At 5:20 PM -0400 5/31/01, James M. Atkinson, Comm-Eng wrote: >I would like to propose a topic for the list, and I belive that >everyone will benefit as the issue if discussed. > >Here is the hypothetical situation: > >A set of TSCM items that completely fits inside a standard piece of >ATA carry-on luggage with a maximum size of 9*14*22 (case must be >small enough to fit both under a seat, AND in the overhead bin). I would go with a Z-Roller case (13*21*7), or a Pilots Roller case that most businessmen would carry aboard an airplane for business meetings. I would also wear a jacket, tie, dress shirt, and appear as if I was just another road-warrior going to an out of town meeting (I would carry an extra dress shirt and tie in my tool case). >Contents of the case must allow a single person to perform a limited >scope "Bug Sweep" of a typical business office within a standard 8 >hour work day. The sweep must include a detailed RF evaluation, an >analysis of all conducted signals, and a limited evaluation of the >phone system. I would not include a phone analyzer, but would include a butt set, and small assortment of craft tools (punch tool, can wrench, combination banjo and tone gen.) The analysis of the phone system is important, but when time is limited you can only work with what you have. >The kit must be able to detect any device which radiates any RF >signal which is generally available in a spyshop, Radio Shack, >Walmarts, Home Depot, etc. The kit must be able to detect audio or >VLF signals present on any conductor. Simple enough to do with a PCR-1000 or R-3 >Kit must include (as a minimum) a 100 MHz+ Oscilloscope, a digital >voltmeter, audio amplifier, broadband diode detector system, a tuned >receiver or scanner (with sub-carrier capability) with coverage at >least 1.5 GHz, video receiver with coverage of all ATV bands >(including the 433, 900, 1300 and 2400 MHz bands). Fluke 199 200 MHz Oscilloscope (it is VERY compact, makes a great TDR when used with a simple ping box, kicks butt on VLF signals, and allows traces to be downloaded to a PC) Fluke 189 Digital Multimeter (great unit for general purpose measurements) Biddle BMM2580 200 Giga-ohm Insulation tester (Does magic when looking for high impedance devices on telephone lines) Riser bond 3000 or 6000 series TDR (but only if I had extra room) Kaiser 1059 or DAC Audio Amplifier with High pass filters (so I can listen to the power lines, or damn near anything else... Kaiser rules). CPM-700 with IR, mag Probes, etc probes (Decent broadband diode detector system). 4ea Modified ICOM R-3 Receivers (preloaded for video coverage, full coverage, with discriminator modification for sub carrier, and video bypass mod) External tunable .9 to 2.7 GHz mixers for above R-3 mixer simply overcomes the limited 2.4 GHz coverage the R3 has and squirts the signal directly into the IF or FM demod) Compact Active Magnetic Loop for 433 MHz (a small tuned loop for spy shop covert video, and all those little goodies from Micro toys, a log periodic at these frequencies simply is too large, so a loop is handier) Spiral Log Antenna for 900-2.700 MHz w/ 40+ dB LNA (for all the naughty toys sold in spy shops) REI VBA-2400 Active Log Periodic Antenna with tripod Pentium Laptop with a GPS module and mapping SW, databases, Office, etc. (Keeps track of every signal, location, and so on that is SUPPOSED to be on the spectrum. Laptop must have capability to digitize multi-format video for raster work) PCR-1000 built into and completely concealed inside above laptop with Sub-carrier coupler, discriminator mod, optional 1 kHz IF filter and inversion de-scrambler. (It's function is to ferret though the entire RF spectrum on confirmed eavesdropping channels, and then to sweep from 3 kHz to 1 GHz looking "for anything that rises off of the noise floor"). USB based TV and AM/FM radio for above laptop (driven with custom SW to allow full coverage of video from 45 MHz to 900 MHz). AGC adapter to stabilize and clamp a raster signal so that it can be brought though the laptop video port and examined for content. I would also include a small plastic box with a variety of rotary switches so I can criss-cross various conductors for analysis. >Any hand tools included in the kit must be small enough to pass >though airport security Xray machine without causing a problem (ie: >keep the screwdrivers small). Also, the kit must be light enough to >carry with one hand, and able to take a nominal amount of getting >bumped around in transit. I would include a ORION tool kit as it includes most of the items I would need (however I would replace their flashlight with a Surefire Xenon lamp, preferably a dual head unit for better lighting on the physical inspection) I would also include a LUXO inspection lamp with both UV and Visible bulbs (physical inspection). Of course I would add a very small 35mm camera with macro and flash (pocket sized), a small Polaroid instant camera, and various measuring instruments (to document things) I would also add a detailed inspection check list in hard copy for (5*8, dual sided, with backup copies on the laptop) >The question is: What you you include in the kit (and why), and what >would you leave out (and why). > >Remember; it must be "carry-on", and must be able to pass airline >security checkpoints. When limited to only one case I would leave the OSCOR's and ORIONs at the office as each of them take up an entire briefcase. I would also include (in my passport folder) a copy of the FAA regulations concerning what is, and is not a legally defined as a weapon (for those moments when you have a few colorful words with airport security people). Every thing would be in very neatly arranged Cordura nylon cases so as to appear to be nothing more then a tech support guy going out on a service call. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3138 From: A Grudko Date: Sun Jun 3, 2001 9:12am Subject: Re: Identifying Echelon Stations Calling Ork -- Original Message -- > ...three 8 foot diameter parabolic dishes guided by a complex collection of > garage door openers and step-down motors...... I often wonder just what in the heck my neighbors > thought I was doing. Teenage CIA spook? So now we know where ET really landed - Speilburg wasn't your neighbor was he? If he was, maybe you can claim 'inspirational royalties' Isn't there a CIA rule that teenagers and priests are not to be recruited by the agency except in extraordenary circumstances - seriously? And on an earlyer point - this being Sunday so I can muse a moment - what was the comment about estimating the operating frequency of a para. dish from it's size? Surely the size only determines gain at the operating frequencey - the parabola itself is not frequency dependant. The higher the frequency the greater the gain, all else being equal. Hey, you can make an educated guess or recognise a 'normal use type' ("Hey Dad, the neighbours got satelite TV!" - "No son, Billy-Bob's nailed a wok to his roof of his trailer and glued a Budweiser can in the middle"). Back to the TV (I've thrown out the remote control because I think the CIA are on a boat on the lake demodulating the infra-red signals to proove I DDO watch Jerry Springer!) Nanoo nanoo AG from the City of Gold on the planet of Paranoia 3139 From: A Grudko Date: Sun Jun 3, 2001 0:18pm Subject: Carry On TSCM Kit Apologies to anyone who sent me an urgent eMail the past 3 days and got a 'bounced' reply - I rumours of my death have been greatly exaggerated. I was engrossed in a project and assumed I'd just get my normal 400 mails for such a period. What I didn't count on was 2 people sending me HUGE files that chomped up all my remaining space on my ISP's server. It's Sunday, I'm watching 'Level 9' (compulsory for any TCSMer) and I've just finished driving my train (www.damrail.co.za) so I'm in the mood to give a light reply to this. -- Original Message -- > A set of TSCM items that completely fits inside a standard piece of > ATA carry-on luggage with a maximum size of 9*14*22 (case must be > small enough to fit both under a seat, AND in the overhead bin). James, we haven't met in person, but since experience beats technology, I'm wondering if we took off your arms and legs (I guess we'd need the head), would you fit in that case? Would you need advance warning to diet? > The kit must be able to detect any device which radiates any RF > signal which is generally available in a spyshop, Radio Shack, > Walmarts, Home Depot, etc. The kit must be able to detect audio or > VLF signals present on any conductor. You've basically answered the question below with the exception of Cat. numbers... > Kit must include (as a minimum) a 100 MHz+ Oscilloscope, a digital > voltmeter, audio amplifier, Needs to be a bit more than an amp - or be an amp after a 'selector' box. What does it select? Polarity Impedance matching - High, low and high, 1v peak-to-peak to catch those modified VCRs Voltage feed - 1 - 18 v dc to power ECMs or remote amps...use with caution or you might fritz the evidence (we built an ultra sensitive room mike the size of a sugar cube which needed 18 volts feed but works up to 3 km away on any unused copper pair with no audio loss) > broadband diode detector system, CPM 700 - can double as the audio amp (has an isolated input up to 250v ac) and mains mod. > a tuned receiver or scanner Lots on the market > (with sub-carrier capability) how common is this? I've only ever found one room bug which used this. I rely on my Scanlock for S-C but I think I'm going to need a bigger box! > Remember; it must be "carry-on", and must be able to pass airline security checkpoints. You mean I can't include the Glock? I have a true TSCM/gun control story here, and there aren't too many of those. In the early '80's, in the quiet town of Edenvale, outside Jo'burg, my client (in the financial sector and the victim of frequent internal fraud) had previously wired an ECMike from every room in his premises into his office, where he could select any 2, any time. We were contracted to hard-wire a similar system from the extension (private equipment) side of his PABX (this did not contravene any law then but it might today). I ran a 24 pair cable through the ducting to the client's solid oak desk. But I'd forgotten my drill... My client said 'Just shoot a hole through!' So we packed phone books behind the back of the desk (to reduce ricochet risks) and I shot a near perfect 9mm diameter hole through it. It was tight, but we got the cable through. These days I make sure I have my drill. I didn't add the cost of the round to the bill. Where does gun control come in? Hitting the target twice at 7 metres in 1.5 seconds - that's gun control Mr Bush! The weekend is over, back to reality tomorrow. Andy Grudko. D.P.M., Grad I.S, (S.A.) Grudko Associates - Crime investigation, intelligence and protection Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom - "When you need it done right - first time" 3140 From: Steve Uhrig Date: Sun Jun 3, 2001 4:07pm Subject: Re: Death? Once upon a midnight dreary, A Grudko pondered, weak and weary: > Apologies to anyone who sent me an urgent eMail the past 3 days > and got a 'bounced' reply - I rumours of my death have been > greatly exaggerated. Then who is it that has been calling each one of us and soliciting donations to the Andy Grudko Memorial Foundation for Funny Looking TSCM'ers? Do I get my ten dollars back? Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3141 From: James M. Atkinson, Comm-Eng Date: Sun Jun 3, 2001 7:25pm Subject: To Tell the Truth U.S.News 6/11/01 To Tell the Truth http://www.usnews.com/usnews/issue/010611/usnews/spy.htm As it ferrets out its own moles, the FBI can take a lesson from a CIA spy hunt that went too far By Kevin Whitelaw and David E. Kaplan Theirs is a job of deception and concealment, of gaming and lying, and doing it over and over. So Edward Curran knew in the fall of 1994 that his new position as the CIA's chief spy hunter carried a special peril. A career FBI man, Curran was instantly marked an enemy in a hostile camp. The bureau had just arrested Aldrich Ames, the most damaging spy in CIA history, and officials suspected there were other moles. A panicked Congress ordered the FBI to help clean up the CIA's mess. The task fell to Curran, who sensed the nation's premier spy agency was consumed by mistrust. Routine polygraphs became grueling interrogation sessions. The polygraphers treated their colleagues "like criminals," says Curran. "This might be great in a prison but not with civil servants." The crackdown turned up serious security problems. But innocent people were also snagged, raising the question of whether the agency used the decidedly wrong medicine for a cure. As many as 100 people-including some of the nation's top spies-found their careers paralyzed: Many lost coveted transfers overseas; others were pushed into dead-end jobs; still others quit in frustration or were forced out. "No organization can afford to have that many experienced officers tied up in limbo," says Frederick Hitz, the CIA inspector general for much of the 1990s. Says a former station chief: "The effect was devastating." Today, the dragnet at the CIA offers a cautionary tale as other federal agencies embark on their own sweeping spy hunts. The FBI has launched an agencywide mole hunt, sparked by the February ar- rest of veteran counterintelligence agent Robert Hanssen. And the Department of Energy, after unproven spy allegations against physicist Wen Ho Lee, is turning to the polygraph to shore up security at its labs. In all, thousands of federal employees will be tested, or "fluttered," on the box. Despite the obvious need to safeguard the nation's secrets, security inquiries can inflict lasting damage when they are not properly managed, as the CIA crackdown makes clear. The investigation helped plunge morale to depths from which the agency has still not recovered. And the exodus of talent hampered intelligence operations and left relative novices in key posts overseas. Interviews with three dozen current and former officials illuminate several problems: The FBI was slow to review cases; investigators gave short shrift to considerations of due process; and, most important, they placed far too much faith, despite its dubious scientific validity, in the so-called lie-detector test. "Because it was a convenient tool," concedes a CIA security official, "there probably was an overreliance on the polygraph." Unmasking spies. The ghost of spy hunters past still haunts the CIA. In the early 1970s, legendary spy hunter James Jesus Angleton turned the place inside out trying to unmask suspected Soviet agents. Angleton's crusade was so destructive that, after he was forced out, the CIA's counterintelligence office became a dismal backwater. "For a long time, it was just not a place where up-and-coming officers wanted to serve," says Hitz. Soon, enforcement of security rules waned; minor violations were winked at. "The attitude was that if you fail your polygraph," says Curran, "nothing will happen to you." That attitude, in large part, was blamed for the CIA's failure to detect Ames. But his arrest transformed the slack security office into a den of pit-bull investigators. Employees now were required to submit four-page financial disclosure forms, and the polygraph became the coin of the realm. "If they can't pass a CIA polygraph, fire them," former CIA officials recall Rep. Norman Dicks, a member of the House Intelligence Committee, barking at the time. Everyone knew of the polygraph's flaws, shortcomings so glaring that the test results are inadmissible in most courts. A tabletop box that monitors pulse, breathing, and skin moisture, the machine measures stress, not truthfulness. Even veteran polygraphers concede there is a 10 percent to 15 percent "false positive" rate. That's where the machine registers a "significant physiological response" on a truthful answer. "The polygraph is not really a lie detector," says former CIA director James Woolsey. "You have cases in which truthful people look like they're lying and where lying people look like they're truthful." Many times during the exams, officials say, fears unrelated to counterintelligence or criminal behavior clouded the results. Horror stories about bad polygraph sessions soon raced through the agency. No matter. CIA brass were under pressure to crack down. Security officials tapped into a classified database, combing through six years of old polygraph exams searching for inconsistencies. From that review came the "A to Z list"-a roster of some 300 employees with unresolved problems. CIA officials managed to clear about 85 percent of these initial cases, but every month, an additional 20 to 25 names were added to the list. The polygraph sessions got tougher. More than half the CIA officials examined failed routine follow-up tests, a rate by far the highest among all U.S. intelligence agencies. "After Ames," says retired CIA polygrapher John Sullivan, "we took a harder look at some behavior that in the past we might have let go." Polygraph boosters insist the machine is valuable as part of a larger counterintelligence program. The real value of the test, some say, is intimidation-its power to prompt confessions from subjects. But after Ames, many CIA employees felt polygraph examiners went too far. One CIA case officer fielded a polygrapher's questions about her sex life, including how often she and her boyfriend had sex, and what positions they used. A decorated station chief remembers being interrogated for six hours a day for five days-far beyond that recommended by outside polygraphers. "By then," the man says, "you even react to your own name." CIA officials are skeptical about these claims, but say they can't discuss individual cases. Inexperienced examiners presented another problem. Polygraphy is widely thought to be more craft than science, requiring skilled operators who, in intelligence work, must also understand the murky world of espionage. At the CIA after Ames, such expertise was in short supply. Agency brass had effectively dismantled the career service for security officials in the mid-1990s, causing many veteran polygraphers to quit and leaving novices to grill veteran officers. "If you say you have given classified information to foreigners, some [polygraphers] go bananas," says Paul Redmond, a veteran CIA counterintelligence officer who played a key role in catching Ames. "You might be trying to recruit or leverage your information, but try explaining that to someone who has no overseas experience." There was also potential for abuse. Attorney Roy Krieger, who has represented over 50 CIA employees, told Justice Department investigators of a case in which a polygrapher's supervisor ordered him to "make sure [the examinee] doesn't pass." In other cases, Krieger alleges that polygraphers accused truthful people of lying just to test their reaction. At the same time, the FBI was getting into the act. After Ames, Congress passed a law requiring the CIA to inform the FBI of any active counterintelligence investigation. An FBI-CIA agreement meant that any time an employee had trouble on three polygraphs, the case was referred to the FBI for a full criminal investigation."[The statute] was interpreted much too strictly," says Jeffrey Smith, former CIA general counsel. In all, as many as 100 cases were referred to the FBI, often based on little more than failed polygraphs. "The vast majority of referrals really didn't strike me as very serious allegations of espionage," says Raymond Mislock, an FBI official who saw many of the referrals. "In a different era, they would have been handled as [less serious] security violations." After Ames, however, they forced case officers into what they called "polygraph limbo"; their careers were effectively frozen. Assignments overseas were delayed or canceled and access to sensitive data restricted. Worse, the FBI became swamped with sketchy referrals that took months, even years, to resolve. Evidence was rarely sufficient to convince a judge to authorize wiretaps or search warrants. "They were putting cases on pending inactive status," says Curran. "Meanwhile, this guy was waiting for his promotion or transfer." Throughout the process, the CIA actively discouraged employees from seeking legal help. One case officer under suspicion was told that only guilty people need lawyers. But those caught in the crackdown have found few resources within the agency. "Inside, you really have no place to turn," says one official. Outside, lawyers complain of hurdles in obtaining security clearances so they can defend their clients. Shaky evidence. The CIA's crackdown yielded some important results. The sweep not only turned up unauthorized contacts with Russian spies but also undeclared trysts with foreigners and financial irregularities. Employees who committed the most serious violations were fired or forced to resign. Among them was Harold Nicholson, a career case officer later convicted of spying for Moscow. But evidence against others was ambiguous. One longtime case officer who had flunked a polygraph test earlier in his career was reinvestigated after Ames, and demoted. Put through multiple polygraph interrogations, he says he became so frustrated that he fumed to the operator that "the only hostile foreign intelligence agency I thought I worked for was the CIA." (As did others, the agent insisted on anonymity.) A distinguished record didn't help. In fact, some of the CIA's best operatives were most vulnerable precisely because they operated in gray areas. "The people who are out there running around the back alleys of the world that we ask to take risks on behalf of the nation," says Smith, "they're often the ones who have trouble on the polygraph." One former operative-one of the CIA's deepest-cover spies-fits that description. The man had a successful public career overseas for three decades. Working without the diplomatic protection given most CIA officers abroad, he made contacts ranging from Colombian drug dealers and Asian guerrillas to top officials in Europe. He became close enough with these sources to alert his handlers to planned assassinations and drug shipments. Too good. But after Ames, those relationships raised questions. "He fell under suspicion because he was producing good information on hard targets when nobody else was," says Vincent Cannistraro, a former CIA counterterrorism director. Other sources say a messy personal relationship raised questions. Two interrogations and several lengthy polygraph exams proved inconclusive. "He had to get intimate with these people," says Phil Giraldi, a former CIA station chief in Rome. "You get inside their heads, which means this kind of stuff gets into your head." The CIA finally decided the man had to resign. "Much of what I was submitting was highly respected up to the very end," he says. "Just the thought that I could be an agent for another power-that they had created a Frankenstein-was too much for the organization to digest." Those kinds of stories eventually persuaded CIA officials to make significant changes. The frequency of routine tests is now calibrated to an employee's access to sensitive information. Polygraph examiners most familiar with the agency's secret operations division are now assigned to test covert officers. The CIA has cut the number of questions on the exam from six to four, reducing the so-called bringback rate by half. Today, officials say, the CIA's list of referrals to the FBI is no more than "a handful." Such improvements are welcome, but for CIA officers who sometimes risked their lives for their country, the lack of due process was galling. "These were very dedicated and honest individuals who flew helicopters, ran black ops, and came under fire," says attorney Michael Kelley, a former CIA official who helped several colleagues sue the agency. "These people deserved a fair chance." CIA veterans are watching with interest now as the FBI and the Energy Department proceed with their inquiries. The FBI's polygraph program may eventually include many of its 11,000 agents. And the Energy Department may test up to 20,000 employees. Both agencies are likely to encounter the same problem that befell the CIA: guarding national security without sacrificing individual rights. "The very nature of these two things may be incompatible," says Kelley. Stephen Block, an American Civil Liberties Union lawyer who represented five CIA employees, warns that a balance must be struck: "It will require gutsy leadership not to destroy lives and careers while this is going on." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3142 From: Tyler Johnson Date: Sun Jun 3, 2001 1:13pm Subject: Who i am. My name is Tyler Johnson.i am a freshmen at high-school. ia m not part of any business.i have very strong interests in Law-Enforcement, espionage, counterintelligence, countersurveilance, electronics, agencies and other Federal activities. i am only 15 years of age and would like to help the TSCM out in any ways that i can. i am not sure exactly what this group is and why i did this but i am willing to continue if i can provide any help needed. please contact me on this as soon as possible! thank you Tyler Johnson __________________________________________________ Do You Yahoo!? Get personalized email addresses from Yahoo! Mail - only $35 a year! http://personal.mail.yahoo.com/ 3143 From: Shawn Hughes Date: Sun Jun 3, 2001 2:02pm Subject: specan question Following the 'bare bones' thread, I have a similar question. I know that you are all familiar with the add on analyzer monitors that can be purchased for the high end recievers like the icom and aor. How does this unit interface into the reciever? Could it be replicated on a smaller scale, like, say a handheld fluke oscope and a handheld aor? Thanks! Shawn 3144 From: Shawn Hughes Date: Sun Jun 3, 2001 6:53pm Subject: box add-ons >>>USB based TV and AM/FM radio for above laptop (driven with custom SW to allow full coverage of video >>>from 45 MHz to 900 MHz). Great idea. I'm sure it exists, but where would this software be obtained?? >>>AGC adapter to stabilize and clamp a raster signal so that it can be brought though the laptop video port >>>and examined for content. Another great idea. I'm sure you guys know how to do that, but specifically, how would this work? You feed the signal from the recieving set through the gain control into the port, but then what kind of software would you use to examine the signal with? Thanks! Shawn 3145 From: Steve Uhrig Date: Mon Jun 4, 2001 0:23am Subject: Re: specan question Once upon a midnight dreary, Shawn Hughes pondered, weak and weary: > I know that you are all familiar with the add on analyzer > monitors that can be purchased for the high end recievers like > the icom and aor. First of all, the ICOM and AOR are most definitely not high end receivers. They are on the high end of toy receivers, perfectly adequate for a lot of applications, but don't think of them as professional receivers. They are not. ICOM themselves considers them amateur products and carries receivers in the amateur line. We were ICOM dealers for about 17 years and sold thousands of receivers. The government used to buy them because they were cheap enough to be considered throwaway. For the price they are reasonable. High end receivers are Rhode & Schwartz, Microtel, Cubic, Watkins-Johnson and similar. A high end receiver costs about what an average man earns in a year. > How does this unit interface into the reciever? They connect to the 10.7 IF output of the receiver. They display a chunk of spectrum around the center frequency to which the receiver is tuned. They are very simple spectrum analyzers. Considering the very inexpensive Avcom spectrum analyzers, I'd buy an Avcom PSA-65C before I'd buy an R8500 and signal monitor. They work best in conjunction with each other though. You see something on the spectrum analyzer, then tune the receiver to it to listen to the signal and take it apart. The Avcom, Grove, AOR and similar signal monitor units are amateur grade products designed for the hobbyist. For a quality unit, go to: http://www.cse-assoc.com/atlantic.html and check out the SM-7071. These are no more expensive than the toys. I've personally used all of them, sold hundreds of the Atlantic Electronics pieces in conjunction with ICOM receivers, and am pleased with the Atlantic Electronics and basically disgusted with the others. I do not sell any signal monitor now so I have no ulterior motive. > Could it be replicated on a smaller scale, like, say a > handheld fluke oscope and a handheld aor? No. Not on a practical level. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3146 From: Aimee Farr Date: Mon Jun 4, 2001 0:43am Subject: RE: When is cell phone jammed? *batty eyelashes* > Watch it when Aimee bats her eyelashes. Strong men have been > known to fall when that happens. > > Steve Do not be taken in by Uhrig's 'wild theories' involving my matriarchal lineage, the poison girls of Chanakya, and genetic predetermination. Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR Waco, Texas "...women under concealment may throw a snake, or poison, or fire or poisonous smoke over his person when he is asleep in a confined place." 3147 From: DrPepper Date: Mon Jun 4, 2001 2:55pm Subject: Re: Who i am. Welcome aboard, Tyler, , , , , This is a very interesting business, and I think you will find that many of the people here have many years experience in this and associated fields. That means that you not only must get a good solid education behind you, but you also will need to start at the bottom and work your way up, by acquiring the experience needed for this work. Don't let this discourage you, however, it just takes dedication and a LOT of hard work. One thing you can do to help now, is to get a Ham Radio license., and don't just stop at the no code tech, either, , , , work your way up to the general and extra class license. This will give you a very solid basis for your future in this game. Good luck, Tyler, , , , J.R. "Ron" Cheshire, P.E. (ret) -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my shack LIVE at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ========================================= Tyler Johnson wrote: > My name is Tyler Johnson.i am a freshmen at > high-school. ia m not part of any business.i have very > strong interests in Law-Enforcement, espionage, > counterintelligence, countersurveilance, electronics, > agencies and other Federal activities. i am only 15 > years of age and would like to help the TSCM out in > any ways that i can. i am not sure exactly what this > group is and why i did this but i am willing to > continue if i can provide any help needed. please > contact me on this as soon as possible! thank you > Tyler Johnson > 3148 From: Shawn Hughes Date: Mon Jun 4, 2001 0:17pm Subject: Re: Digest Number 610 At 04:37 6/4/01 , you wrote: Thanks for the info..... >>>>High end receivers are Rhode & Schwartz, Microtel, Cubic, Watkins-Johnson and similar. forgot who I was talking to for a moment. I know Federal people who believe that Tandy makes a high - end reciever. I've only gotten to see a wj one time. Seriously, I don't think I could own one. I would be too concerned about dropping the damn thing! I bet they are sensitive and discriminative, tho. >>> The government used to buy them because they were cheap Well, I can't vouch for the discardability, but I can say that the Icom rigs are a staple around here. Kind of funny, I tried to explain to a Federal tech why the crystal reciever in my stupid AID kit was getting a signal when his Icom wasn't. He would rather believe it was strong juju in the attractive silver case! >>Considering the very inexpensive Avcom spectrum analyzers ? I know, you get what you pay for. I also know that at my last post, that any purchase over $500 had to be reviewed by a committee, none of whom had an inkling of basic sweep gear, or any other kind. >>I'd buy an Avcom PSA-65C before I'd buy an R8500 and signal monitor. I would've LOVED to purchase one of the kits Steve was selling ( I wonder if he accepts soda cans?). I even went to my bank for a loan, but couldn't convince them to give me a reasonable rate. I agree completely and whole heartedly that there are better things out there, Steve, but I am trying to better myself to provide a more effective product on a shoestring budget. People look at me funny when I tell them I have a 60% success rate on the novelty intercept kits, and a 5 - 10% rate on the pro gear. I'm not gonna lie, though. What success rate I have has more to do with several hours crawling around in ceilings and floorspaces than it does my gear. I just would like to build a spectrum analyzer. [ I would REALLY like for you just to GIVE me one, Steve. Anybody who can nonchalantly say, " a high-end reciever should cost what a man makes in a year" can afford to donate to the needy ! ;O) ] I think it would make me more effective. Considering I have no choice but to conduct the surveys, anyway. >> Could it be replicated on a smaller scale, like, say a handheld fluke oscope and a handheld aor? >>No. Not on a practical level. You know, thats too bad. My back is for the miniaturization of anything, as long as it doesn't degrade quality. You'd think that with the advances in computing and radios there would be a 2 pound spectrum analyzer by now. Oh, well. Just dreaming................ 3149 From: Date: Mon Jun 4, 2001 4:04pm Subject: Vibration and Infrasound Does anyone have any experience in monitering for large amounts of viration and/or infrasound? JV 3150 From: Steve Uhrig Date: Mon Jun 4, 2001 6:05pm Subject: Re: Cheap receivers? Once upon a midnight dreary, Shawn Hughes pondered, weak and weary: > forgot who I was talking to for a moment. I know > Federal people who believe that Tandy makes a high - end > reciever. I've only gotten to see a wj one time. Seriously, I > don't think I could own one. I would be too concerned about > dropping the damn thing! I bet they are sensitive and > discriminative, tho. Actually, sensitivity and reasonable selectivity are readily available in inexpensive receivers like the ICOMS. The better receivers are more rugged, better filters, better overall quality, probably more stable, much much (MUCH!) easier to repair and calibrate, better documented, and designed for people who do serious work, not hobby work. > Well, I can't vouch for the discardability, but I can say > that the Icom rigs are a staple around here. That is true in a large way primarily because of low cost, and ICOM's positioning, and ready availability. Agencies with large budgets have piles of W-J everywhere. > Kind of funny, I tried to explain to a Federal tech why the > crystal reciever in my stupid AID kit was getting a signal > when his Icom wasn't. He would rather believe it was strong > juju in the attractive silver case! How do you KNOW it wasn't juju? AID charges a lot more for that than ICOM. Actually, there could be many reasons. Antennas, for one. There's nothing wrong with AID, especially the earlier pre- Westinghouse gear. It is superbly designed, built to high standards, logically designed, serviceable, top performers. I have a lot of respect for it. AID Unitel kits were built for use in the field under potentially stressful and harsh conditions by relatively untrained people, where a man's life was on the line with the performance of the equipment. It was purpose-designed stuff. For a body wire receiver, you WANT a rockbound, simple, stable super rugged receiver. Price is insignificant for the most part. In spite of their relatively high prices, AID penetrated nearly every police department in the country. For a toy, you want something with lots of knobs, lights, chrome and blinking lights. That's what sells to people with lesser requirements or understanding. > ? I know, you get what you pay for. I also know that at my > last post, that any purchase over $500 had to be reviewed by a > committee, none of whom had an inkling of basic sweep gear, or > any other kind. Of all the statues in all the cities, None were erected to honor committees. > I'd buy an Avcom PSA-65C before I'd buy an R8500 and signal > monitor. > I would've LOVED to purchase one of the kits Steve was selling ( > I wonder if he accepts soda cans?). If you have *enough* cans, of course. We're talking dozens, if not hundreds of cans, though. I am not saying the Avcom is anything special either. I had one, and grew kind of fond of it, but it is to a real spectrum analyzer as an ICOM receiver is to a W-J. Cute, works, affordable. I miss the one I had. I'm drooling now over a Tek 494 but can't afford/justify it. Nor lift it with my back problems. > I agree completely and whole heartedly that there are better > things out there, Steve, but I am trying to better myself to > provide a more effective product on a shoestring budget. I wasn't implying, and you shouldn't infer, that I was looking down on anyone who used ICOM stuff, or workable equipment within anyone's budget. I merely wanted to clarify the point that ICOM receivers are not to be put on a pedestal and were not high end receivers. A lot of TSCM work is done with simple gear. I have more respect for a man who lives within his means than someone else with a lot of fancy toys who owes money on them. And I have even more respect for those who can accomplish the objective without all the fancy tools. They are fine, but do not substitute for experience, innovation, desperation sometimes. A number of us around here agree a competent man will do more with a VOM, flashlight and screwdriver than most will with all the fancy equipment. > What success rate I have has more to do with several hours > crawling around in ceilings and floorspaces than it does my > gear. This is the truth, finally come out. Virtually any professional sweeper would agree. Some argue your eyes can't see RF. True. But a proper physical search will find it, eventually. It's nice to have gear to use, but if you take a place apart properly, nothing would survive. You have to know what to look for, of course, and that is the experience that can substitute for equipment. I'm not saying one can do an honest sweep with no gear, or spy shop gear, but I'm arguing a point. Surveillances are the same thing. You can have a fancy black bag and a few weeks in school and do a job. Another grizzled old veteran can start with earth, air, water and fire and accomplish a usable end result. > I just would like to build a spectrum analyzer. Your original message seemed to imply you would like to build one for TSCM use as opposed to buying one. That I discouraged. However, if you want to build one for the education, the fun of it, the satisfaction, have at it. Plenty of hams have. Get an older issue of the Radio Amateur's Handbook and there probably are plans for one. It won't be suitable for TSCM though. But you can make something that will monitor strong, low frequency signals. An oscilloscope is only the display. A lot more goes into it. But do it! Lots of us here are hams, including myself, and we build crap for the fun of it, stuff we could just pick up the phone and order on a credit card. My barn is full of literally dozens of chassis of various things I've built over the years, just for fun. I am one of those hams who doesn't spend time on the air. I build something, get it working, diddle with it, make a few contacts to prove it is working, diddle with it some more, then retire it and build something else. > I would REALLY like for you just to GIVE me one, Steve. > Anybody who can nonchalantly say, " a high-end reciever should > cost what a man makes in a year" can afford to donate to the > needy ! I did not say "should cost". I said DOES cost. I do not own any receivers of that grade. > I think it would make me more effective. Of course! That's why most of us buy stuff like this. Or at least that's why we say we do. > Considering I have no choice but to conduct the surveys, anyway. > You'd think that with the advances in computing and radios > there would be a 2 pound spectrum analyzer by now. There are plenty of them. Simple ones like Sperry and Protek, up to 2 gigs. Anritsu up to, I believe, 7. Others. Now that large color LCD screens are so cheap, size is coming down. The CRT is the bulk of the weight in a lot of test equipment with a display like a scope or spectrum analyzer. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3151 From: William Knowles Date: Mon Jun 4, 2001 6:07pm Subject: Trojan lets cyber-cops plant bogus evidence http://www.theregister.co.uk/content/6/19404.html By Thomas C Greene in Washington Posted: 04/06/2001 at 09:36 GMT A new tool of Fascist control, with which law-enforcement agents can secretly monitor the entire range of a suspect's computer activity, has been developed by self-proclaimed 'computer surveillance experts' Codex Data Systems, according to a document sent to Cryptome.org. The source here is a PowerPoint slide show, presumably by Codex PR bunnies, boasting of D.I.R.T.'s amazing capabilities to violate in secret the last vestiges of civil protections from state oppression. "Imagine being able to remotely monitor any PC in the world anytime you want," the company taunts. "Suppose you could read every keystroke... Access and retrieve any file from the hard drive without having physical access... No more secrets..." The company slide show is carefully crafted to generate maximum suspense among Feds and cops straining to find ways around such regrettable obstacles as civil rights. Thus a series of 'scenarios' guaranteed to get the oppressive juices flowing: Scenario: You want to execute an "Electronic No-Knock Search Warrant" by stealth via the Internet to allow surreptitious remote seizure of digital evidence. What do you use? Scenario: Your undercover online investigator makes contact with a suspected pedophile in a chat room. Suspect sends illegal image(s). You now have probable cause. You want to remotely monitor suspect and seize additional evidence from his computer. What do you use? Scenario: Your investigation has determined that your suspects are using strong encryption to protect themselves. You need to "crack" encrypted and/or password protected e-mail and stored files. You don't have the time or money for a "Brute Force attack. What do you use? The answer to all the above is, of course, D.I.R.T. And just what is D.I.R.T.? Why it's a Trojan, pure and simple, which the Feds can feed to targets surreptitiously. It has a point-and-drool GUI and so functions very much like SubSeven on steroids. It doesn't crack crypto; it simply logs keystrokes, including, obviously, the user's pass phrase. Crude, but effective. It also defeats all known firewalls, killing the running process, replacing the firewall icon, and allowing a stealth FTP connection. The D.I.R.T. client can be embedded in Word documents, Excel documents, PowerPoint presentations, RTF documents, Word Perfect documents, Autorun.bat on CD-ROMS and floppy disks, and, coming soon in a free upgrade, Lotus Suite, JavaScript and ActiveX. Better yet, "D.I.R.T. is user friendly and can be operated by investigators with minimal computer skills," we're told. Most grotesquely, it enables the Feds to plant bogus evidence on a suspect's computer. "Sending hidden code to the target PC is simple using the D.I.R.T. 'Bug Generator'. Investigators need not have special computer code writing skills. Just point and click." A true tool of Fascism if ever we heard of one. And get this: the company discusses it with pride. Getting around it Protecting yourself from this diabolical program won't be easy. First, you need to monitor your comp's processes. Anything persistent which you don't recognize/can't explain should result in an immediate re-format with files re-loaded from text-only sources. For *nix, see this document. For Windows, see this one. You should run Netstat regularly to monitor all of your active connections. And again, anything persistent which you don't recognize/can't explain should result in an immediate re-format with files re-loaded from text-only sources. A handy progie which will resolve strange IPs is the free version of the Patrick Project DNS utility. Curious domains can then be traced free and easily via SamSpade.org, which has heaps of useful CGI gateways. 9x corner If all this strikes you as too technical, then you must be running Win9x, and that means you'd better play it as safe as possible. This, we're sorry to say, means re-formatting on a regular basis, like once a month. Annoying and troublesome, we'll allow; but it's the only way for the technically challenged to prevail against D.I.R.T. In order to do this successfully, you should ditch every file you don't need during each re-format. Files you do need must first be saved to removable media in plain text with a non-formatting text editor (e.g., Windows Notepad); and you'll need to change your PGP pass phrase (not your key) each time as well. Now set up your '9x box lean and mean, as if you were a gamer. Go to C:\WINDOWS\SYSTEM\MSCONFIG.EXE and make a desktop icon for the progie. Activate it, click on the 'STARTUP' tab, kill everything you don't need and re-boot (do NOT kill EXPLORER or SYSTEM TRAY). This will make it easier to keep track of what you have running, and what you should have running, which you can occasionally check with ALT-CTRL-DEL. Immediately after you re-format, run MSCONFIG.EXE and kill all the rot. Next re-boot, connect to the Internet, and then go ALT-CTRL-DEL and make a note of everything you have running. This list should remain constant. If it ever changes unexpectedly, it's time to re-format again. This exercise can be helpful, but it's not an authoritative inventory of running processes; so if you're technically challenged, and have reason to fear being infected with D.I.R.T. or some other scumbag Fed Trojan, stick to re-formatting once a month as a precaution. It wouldn't hurt to change ISPs from time to time as well, which is the only non-technical way to defeat Carnivore (though you IP savants know more convenient methods), just in case the Feds decide to double-team you with their perverse toys. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* From: delta Date: Thu Jun 1, 2000 3:40am Subject: Re: GSM off air laptop interceptor hello here is the link i know about the equipment for cellular but i ve never eard about something about 4000 usd !!! http://www.accelerated-promotions.com/consumer-electronics/cellular-interception.htm david in paris 8777 From: delta Date: Thu Jun 1, 2000 10:04am Subject: Re: GSM off air laptop interceptor hello kenny you say it is a magic laptop .... i believe you and i never eard about this magic modul for gsm ... hummm ... maybe an hoax ?? 4000 usd it would be great but at this price it is cheaper than a great scanner like aor one or something like that ... at this price i m sure a lot of people would be interested but i m sure the autority or the government don t let them buy it !!! for the moment i ve never eard about this magic think ( in france ) sorry but i can t help you but be sure when i ll find this magic think with this low price i ll advice ... may be in uk ??? someone in uk can help us ? david in paris *Thanks David for your info. I come across many links like this one but the reality is that *this 4000$ laptop is sold somewhere by someone. And can be there in France or UK. I *wasn't interested in this because until a week ago I know that are units outthere in the *200.000 to 400.000 $ range. But after I watched a short news on TV I started to search *for this magic laptop. Try to check and search in France and if you find something please *let me know. *Thanks, *Kenny -------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 8778 From: Lawrence Dillard Date: Tue Jun 1, 2004 1:13pm Subject: phone fix PHONE PROBLEM An elderly lady phoned her telephone company to report that her telephone failed to ring when her friends called -- and that on the few occasions when it did ring, her pet dog always moaned right before the phone rang. The telephone repairman proceeded to the scene, curious to see this psychic dog .... or the senile elderly lady. He climbed a nearby telephone pole, hooked in his test set, and dialed the subscriber's house. The phone didn't ring right away, but then the dog moaned loudly and the telephone began to ring. Climbing down from the pole, the telephone repairman found: 1. The dog was tied to the telephone system's ground wire via a steel chain and collar. 2. The wire connection to the ground rod was loose. 3. The dog was receiving 90 volts of signaling current when the phone number was called. 4. After a couple of such jolts, the dog would start moaning and then urinate on himself and the ground. 5. The wet ground would complete the circuit, thus causing the phone to ring. Which goes to show that some problems can be fixed by pissing and moaning. 8779 From: John M Date: Tue Jun 1, 2004 11:51am Subject: Direct connect of USB webcam to USB jumpdrive - possible? Curious if anyone could comment on the feasibility of direct connecting a cheap, USB webcam (that outputs compressed digital video) to a USB jumpdrive (say 256 or 512meg). I understand you would need to inject a power source in to simulate the USB line power. With the proper adapters would this work off-the-shelf? Or is some canned intelligence needed to tell either the jumpdrive or the USB cam to work? Could make a very cheap and self contained video storage device. Thanks. __________________________________ Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger. http://messenger.yahoo.com/ 8780 From: Steve Uhrig Date: Tue Jun 1, 2004 8:33pm Subject: Re: GSM off air laptop interceptor Once upon a midnight dreary, delta pondered, weak and weary: > here is the link i know about the equipment for cellular but i ve > never eard about something about 4000 usd !!! > http://www.accelerated-promotions.com/consumer-electronics/cellular-in > terception.htm The above device is phony. It's obvious from the specs. Many places claim to offer it. Each reseller adds a zero to the price. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8781 From: kondrak Date: Tue Jun 1, 2004 10:16pm Subject: Re: phone fix I've run into a similar problem, when the ground for a pole-pig transformer was loose at the ground rod. Had this poor mutt been attached to this, most likely he would of announced his displeasure by emptying his bowels....I know the time "I" found the wire and stepped on the ground completing the circuit, I was none too pleased with the jolt. Inspection after I regained my wits found the problem, and a lone house on the end of the triplex, with an obviously missing or poor earth ground made this a very painful discovery. My connection was via my left gaff, touching the wire and the sole of my right boot, on the ground, so you can imagine the path, leg-to-leg, and the resulting reaction to same is not mere speculation. Climb carefully....there's things up there that will bite you.... > 1. The dog was tied to the > telephone system's ground wire > via a steel chain and collar. > 2. The wire connection to the > ground rod was loose. > 8782 From: Steve Uhrig Date: Tue Jun 1, 2004 10:22pm Subject: Re: phone fix > 1. The dog was tied to the telephone system's ground > wire via a steel chain and collar. > 2. The wire connection to the ground rod was loose. This of course is an urban legend. Telephone systems are balanced, with neither side grounded. Any ground creates various troubles for which service people are called. Ring voltage is referenced one conductor to the other within the pair, not to ground. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8783 From: James M. Atkinson Date: Tue Jun 1, 2004 10:42pm Subject: Amusing TSCM for Muggle Pirates http://www.omaha.com/index.php?u_np=0&u_pg=1458&u_sid=1111379 Published Wednesday June 2, 2004 Goggles spy on pirates of 'Potter' LONDON (AP) - No, they are not Lord Voldemort's Death Eaters - but they sure could give you a scare. Ushers at British cinemas showing the new Harry Potter film since Monday have been issued military-style night vision goggles to thwart cinema pirates. Vue Cinemas said its staff is spending all two hours and 22 minutes of the film "Harry Potter and the Prisoner of Azkaban" scanning the theaters to try to find anyone trying to secretly record the film. The goggles were distributed to Vue cinemas around Britain, along with copies of the film, by Warner Brothers. The company is determined to fight back after a deluge of poor quality copies of the first two Harry Potter movies hit the black market. "It is an incredible response and makes you realize why the distributors are so keen to protect the film from pirates," said Jamie Graham, who manages a Vue complex in Ellesmere, central England. "I have been working in the cinema industry for 10 years, and I have never heard of anything like this before." The movie opens Friday in the United States. Contact the Omaha World-Herald newsroom ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8784 From: Charles Patterson Date: Wed Jun 2, 2004 0:26am Subject: Re: Re: phone fix Technical facts can always screw up a good story! > 1. The dog was tied to the telephone system's ground > wire via a steel chain and collar. > 2. The wire connection to the ground rod was loose. This of course is an urban legend. Telephone systems are balanced, with neither side grounded. Any ground creates various troubles for which service people are called. Ring voltage is referenced one conductor to the other within the pair, not to ground. Steve Tip side should be earth ground at the central office. If you check the voltage drop from Tip to ground at the demarc, should be close to 0 volts, but probably not exactly, which is why there would be really bad hum on the line if it was grounded. If the Ring side was grounded it would look like a short and the line would go dead. Hence the lady must have been living with a really bad phone connection for some time. For the dog to get a shock, his collar (metal chain collar) would have to be electrically connected to the ring side of the line, while he was standing on ground - wet ground would be a better conductor. So in fact, the pissing may have been the cause of the problem in the first place. :) Charles "Years ago I was checking a line and actually felt the shock all the way down in my hip. I dropped my tools and jumped back but the shock came back a second time even though I wasn't touching the line! Then I realized my pager was set on vibrate." [Non-text portions of this message have been removed] 8785 From: Jack Powers Date: Tue Jun 1, 2004 10:40pm Subject: video evidence in court Hello- I've been lurking on this list for several months, during which I have learned much. My thanks go to the many contributors. Now, I have a question regarding the acceptance of video evidence in court, specifically MPEG-4 vs. MPEG-2 digitally encoded and decoded video. I have been told that while MPEG-2 video has been widely accepted by courts, MPEG-4 has not. Is this true? If so, is it expected to change over (how much) time ? I realize that this is not a precise question and that there are various bit rates, levels, and platforms for both standards. I am trying to nail down the specs for a potential product, and need to understand if the market needs MPEG-2 or -4 or both. The product is an extremely rugged and small digital video recorder. If courts perceive (correctly or otherwise!) that our choice is not acceptable, sales will certainly suffer... so this is more about people than it is about technology. Any information would be very much appreciated. And if you have opinions about other features for such a product, I'd like to hear them also. Jack Powers Powers Technical Services powerstech@c... +1-408/621-1883 www.cryptnet.org/powerstech 8786 From: Michael Puchol Date: Wed Jun 2, 2004 2:14am Subject: Re: Direct connect of USB webcam to USB jumpdrive - possible? Hi John, A USB camera relies on external software to drive it, as it has to be initialised, configured and told what to do before it starts sending out frames. Then, the data it sends will in most cases be some form of proprietary video compression, but surely not data which can be written to a disk directly. Again, software has to drive the USB jumpdrive too. Regards, Mike ----- Original Message ----- From: "John M" To: Sent: Tuesday, June 01, 2004 6:51 PM Subject: [TSCM-L] Direct connect of USB webcam to USB jumpdrive - possible? > Curious if anyone could comment on the feasibility of > direct connecting a cheap, USB webcam (that outputs > compressed digital video) to a USB jumpdrive (say 256 > or 512meg). > > I understand you would need to inject a power source > in to simulate the USB line power. > > With the proper adapters would this work > off-the-shelf? Or is some canned intelligence needed > to tell either the jumpdrive or the USB cam to work? > > Could make a very cheap and self contained video > storage device. > 8787 From: Steve Uhrig Date: Wed Jun 2, 2004 1:08pm Subject: Do you have a beat up TDR? Hi all, If you have a Riser Bond yellow box TDR which is beat up and would like to clean it up, I have a quantity of brand new empty yellow boxes to fit any R-B yellow box TDR. They have the clear plastic shelf inside the lid to hold the manual and a cable, and are drilled to accept the mounting screws going into the bottom of the TDR. I service these TDRs and purchased too many new cases from R-B. I need to clean them out to make room. Price is $100 + ship. I can take credit cards and ship anywhere in the world. I also have a 1205T-OSP and a 3300 (not a yellow box) TDR if anyone needs one. Contact me off list for details. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8788 From: Hawkspirit Date: Wed Jun 2, 2004 8:03pm Subject: Zapped Hey in the over thirty years that I have had my mitts on phone lines I have had ring voltage shocks many times, usually when one hand gets across one side of a pair and I am in a garden on the side of a residence and the ground is damp from water sprinklers. Zapped even with sneakers on! Roger Date: Tue, 01 Jun 2004 23:22:26 -0400 From: "Steve Uhrig" Subject: Re: phone fix > 1. The dog was tied to the telephone system's ground > wire via a steel chain and collar. > 2. The wire connection to the ground rod was loose. This of course is an urban legend. Telephone systems are balanced, with neither side grounded. Any ground creates various troubles for which service people are called. Ring voltage is referenced one conductor to the other within the pair, not to ground. Steve [Non-text portions of this message have been removed] 8789 From: Hawkspirit Date: Wed Jun 2, 2004 8:07pm Subject: Nelk Just a general question about what's hot and what's not. Roger Date: Tue, 01 Jun 2004 22:31:38 +0100 From: Ocean Group Subject: RE: Nelk Yeah I do, what do you need to know? Ois ********************************** Message: 4 Date: Tue, 1 Jun 2004 09:44:45 -0700 From: "Hawkspirit" Subject: Nelk Anyone know anything about this company? Roger http://www.nelk.ru/eng/katalog.php?part=1 &open=_86&id_parent=86 [Non-text portions of this message have been removed] 8790 From: kondrak Date: Wed Jun 2, 2004 8:21pm Subject: "Via [cell phone] eavesdropping, terror suspects nabbed" >\ >-------- Original Message -------- >From: Anthony Townsend >Subject: CSM - "Via [cell phone] eavesdropping, terror suspects nabbed" >To: "Urban Technology & Telecommunications" > >from the June 02, 2004 edition - >http://www.csmonitor.com/2004/0602/p02s01-usmi.html > >Via eavesdropping, terror suspects nabbed >Intelligence officials use cellphone signals to track Al Qaeda >operatives, as number of mid-level arrests rises. > >By Faye Bowers | Staff writer of The Christian Science Monitor > > WASHINGTON - An ordinary-looking grid map of Riyadh adorns one wall of >a command-and-control center deep inside a government building in Saudi >Arabia's capital. > > >The map is higher-tech than it appears at first glance. Tiny embedded >lights flash red when certain cellphones - those belonging to suspected >terrorists - initiate or receive a call. Teams of officials from Saudi >Arabia, the FBI, the CIA, and the US Treasury Department decide >instantly whether simply to watch and listen to the suspected terrorist >- or to send in screaming police cars to nab him. > >So far, officials say, this technology - and others - has enabled them >to interrupt several terror plots and nab dozens of suspected >terrorists. Certainly it hasn't served as a panacea, as the attacks on >foreign workers in Saudi Arabia's oil-worker compounds last weekend >show. At least 22 people, including one American, were killed when >terrorists stormed a compound where foreign oil workers lived. One >terrorist was captured, while three others escaped using hostages as >shields. > >It doesn't take long for terrorists to figure out how authorities are >tracing them and then change methods. Still, the technology has proved >helpful in rolling up cells in Europe, the Middle East, Southeast Asia, >and America. "Today, gumshoe is really a lot more electronics," says >Peter Crooks, a retired FBI agent who specialized in counterterrorism. >"They have some pretty sophisticated equipment." >Recent progress > >Cooperating officials in many countries have been quietly chipping away >at terror cells over the past several months. Recent progress includes: > >ï Japan arrested five foreigners with suspected ties to Al Qaeda on May >26. Pakistan had detained four others on May 24. > >ï The Saudi government killed five suspected militants in the Buraida >area on May 21. > >ï On May 6, the Philippines arrested an alleged cell leader with Jemaah >Islamiyah, a Southeast Asian group tied to Al Qaeda. > >ï Spanish police arrested a Moroccan April 27, and said it was seeking >five others for roles in the March 11 Madrid train bombings. So far, 19 >have been detained for their roles in those bombings. > >ï South Africa deported five Al Qaeda members on April 9. Government >officials there claim the moves led to the detentions of several others >in Jordan. > >ï Jordan foiled what it called the most serious attempt yet to >overthrow its government on April 9. Four terrorists were killed and >three detained after they attempted to use chemical weapons and truck >bombs against several government targets, including the prime >minister's office and the US Embassy there. > >Terrorists, of course, catch on to the new tracking procedures and seek >safer ways to communicate. Osama bin Laden, for example, stopped using >satellite phones because he found out - with the delivery of a guided >missile - that the US was tracking his position via the satellite. > >But terrorists found a new system that enabled them to use phones that >were difficult, if not impossible, to track. > >SIM cards, for Subscriber Identity Model, were developed to create a >universal - and cheaper - cellphone system. Under the old approach, a >resident from, say, Britain would be charged at a local rate when >making cellphone calls in England. But if he were to travel to Germany, >he would be charged long distance rates. Under the new system, he can >buy a German SIM card - which contains a fingernail-sized computer chip >- and make the same calls at local rates. > >The information on pricing, minutes, and local telephone numbers is >encoded in the chip. But since there is no need for a local record of >the purchaser's name and credit information, as there is when setting >up a land line or a traditional cellphone account, it makes it easier >for people to use phones undetected. > >"What we're seeing is that people who want to remain invisible to law >enforcement are doing things like this in order to evade >interceptions," says a telecommunications engineer who's helped develop >ways to track cellphone users. Still, he adds, "this doesn't make you >immune from interceptions." > >After years of tracking terrorists, investigators have amassed a large >database of land-line and traditional cellphone numbers they are >watching (or listening to). All it takes is a call from one of those >numbers to a phone with a SIM card to discover who's using the >undetectable phone. >How one arrest happened > >This is what led investigators to Khalid Sheikh Mohammed, the >mastermind of the 9/11 plot, who was arrested in Pakistan in March >2003. A suspected terrorist whom German authorities were watching >placed a call to someone with a cellphone in Pakistan on April 11, >2002. > >No one spoke. But authorities said the call was made to alert Mr. >Mohammed that an attack on German tourists visiting Tunisia was about >to take place, which it did, later that day. Authorities began tracking >the SIM card, which Mohammed supposedly moved from phone to phone, >creating problems in locating his position. > >But pinpointing the location of the phone was much easier. >Investigators tracked it by analyzing the signals from different >cellphone towers. The time it takes a signal to "propagate and return >back tells how far the cellphone is from the tower," says an engineer. >The reason the red lights flash so quickly in the Saudi command and >control center is that "the timing is nearly simultaneous," he says. 8791 From: kondrak Date: Wed Jun 2, 2004 8:23pm Subject: Re: Zapped Oops, typo, make that 20-30hz Yes, 90v at 30-30hz is quite an awakening... At 21:03 6/2/2004, you wrote: > > >Hey in the over thirty years that I have had my mitts on phone lines I have >had ring voltage shocks many times, usually when one hand gets across one >side of a pair and I am in a garden on the side of a residence and the >ground is damp from water sprinklers. Zapped even with sneakers on! Roger > > > >Date: Tue, 01 Jun 2004 23:22:26 -0400 > > From: "Steve Uhrig" > >Subject: Re: phone fix > > > > > 1. The dog was tied to the telephone system's ground > > > wire via a steel chain and collar. > > > > > 2. The wire connection to the ground rod was loose. > > > >This of course is an urban legend. Telephone systems are balanced, > >with neither side grounded. Any ground creates various troubles for > >which service people are called. > > > >Ring voltage is referenced one conductor to the other within the > >pair, not to ground. > > > >Steve > > > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 8792 From: James M. Atkinson Date: Wed Jun 2, 2004 8:28pm Subject: TSCM Collectable If anybody is interested I have serial number one (#1), of the the ISA spectrum analyzer. It's in rough shape, but the CRT is intact, and it could be restored with a little work. This is a VERY collectable unit, but it will need some TLC. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8793 From: James M. Atkinson Date: Wed Jun 2, 2004 8:44pm Subject: Micro-Tel WR 550D Receiver I have been able to find several pallets of old Micro-Tel WR-550-D, looks to be at least 4 complete systems complete with the antenna module. These units also have the Spectral Correlations circuits intact from the early 70's. As many of you are aware the Omni-Spectral Correlation used by the WR-550 predates the OSCOR by about 20 years... but it essentially does the exact same thing. I am going to restore at least four complete 100 GHz WR-550D systems, and plan to offer three of them for sale later this year. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8794 From: ¬ÌÂÏı‚Ô‰Ù ⁄ÙԽΠDate: Thu Jun 3, 2004 2:52am Subject: Inslaw's Promise What do you think about Promise Software by Inslaw. Israel ideas about backdoors. Did Robert Hanssen gave Promise to Russia Inteligence. 8795 From: Date: Thu Jun 3, 2004 2:59am Subject: President Bush's visit to Italy, June 4th, protected by an ECM "bubble" In the 8 o'clock newscast on the italian national radio (RAI1) an english apparatus (ICM 600?) was mentioned. It has a very long antenna, will be mounted on a Carabinieri vehicle, and disturbs "all frequencies" in a 250 meter radius. It may pose a hazard to pacemaker-fitted heartpatients. About 12 minutes in http://www.radio.rai.it/grr/gr_1/archivio_2004/audio/gr1_20040603.0800.ram Ciao! Remo 8796 From: Ocean Group Date: Thu Jun 3, 2004 9:33am Subject: FW: CCS Lets play a game....its called guess the markup game...... You go first...? ********************************************* CCS International Presents NEW series of high-tech Transmitters: Digital Transmitter DS-1 DS-1 is designed for secret audio surveillance. Small in size the system is activated by a remote control, making detection virtually impossible. Specifications: Transmitter (with embedded remote control receiver): 1. Working frequency (average): 916,5 MHz (or 868,35 MHz). 2. Modulation: ASK-PWM, 64 kbit/sec, encryption. 3. Working time: up to 4 years in sleep mode, up to 30 hours in active mode. 4. Dimensions (without batteries): 55x30x4 mm. Receiver: 1. Working frequency: 916,5 MHz (or 868,35 MHz). 2. Bandwidth: 2 MHz 3. Sensitivity: not less than -85 dBm. 4. Estimating working time with one battery set: 80 - 100 h. 5. Dimensions: 113x75x27 mm. Remote Control: 1. Working frequency: 433,92 MHz. 2. Dimensions (without antenna): 110x70x28 mm. PC Keystroke Transmitter KS-1 KS - 1 is designed for remote PC-keyboard intercepting. Information is transmitted by radio waves in UHF band. This is a relatively simple but effective device for getting information of what somebody is typing on there keyboard. As it is a purely hardware device, it can not be detected by software methods. Specifications: Transmitter: 1. Dimensions: 33?12?3 mm. 2. Working frequency: 433,500 MHz. 3. Typical working distance: more than 800 m in the open area, 300 - 400 m in a city environment. Transmitter CM-1VOX CM-1VOX is designed for secret audio surveillance. Radio microphone's working frequency is 433 MHz. Radio microphone works in NFM mode, which allows to get good operating distance with relatively low power output - 10 mW. For battery power saving CM-1VOX has Voice Activation System (VOX). Specifications: 1. Working frequency: 433,500 MHz. 2. Estimating time of battery consumption at +20∞C. Type of battery: DL2450 (Duracell). a) constant transmission: 30h. b) transmission /standby = 1/3 (8 hours per day): 120h - 150h (5 - 7 days). c) transmission /standby = 1/10 (~2,5 hours per day): 450h (> 18 days). 7. Working temperature: 0∞? Ö +50∞?. 8. Dimensions: 25x25x3 mm without battery; 25x25x8 mm with battery (CR2450). DS1 $3800 Includes transmitter, Remote control and receiver. KS1 $3200 Includes transmitter, modem and receiver. CM-1 VOX $2800 Includes transmitter and receiver. [Non-text portions of this message have been removed] 8797 From: David Alexander Date: Thu Jun 3, 2004 9:47am Subject: RE: FW: CCS I'll see your markup and double it What fun..... David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: Ocean Group [mailto:inertia@o...] Sent: 03 June 2004 15:34 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] FW: CCS Lets play a game....its called guess the markup game...... You go first...? ********************************************* CCS International Presents NEW series of high-tech Transmitters: Digital Transmitter DS-1 DS-1 is designed for secret audio surveillance. Small in size the system is activated by a remote control, making detection virtually impossible. Specifications: Transmitter (with embedded remote control receiver): 1. Working frequency (average): 916,5 MHz (or 868,35 MHz). 2. Modulation: ASK-PWM, 64 kbit/sec, encryption. 3. Working time: up to 4 years in sleep mode, up to 30 hours in active mode. 4. Dimensions (without batteries): 55x30x4 mm. Receiver: 1. Working frequency: 916,5 MHz (or 868,35 MHz). 2. Bandwidth: 2 MHz 3. Sensitivity: not less than -85 dBm. 4. Estimating working time with one battery set: 80 - 100 h. 5. Dimensions: 113x75x27 mm. Remote Control: 1. Working frequency: 433,92 MHz. 2. Dimensions (without antenna): 110x70x28 mm. PC Keystroke Transmitter KS-1 KS - 1 is designed for remote PC-keyboard intercepting. Information is transmitted by radio waves in UHF band. This is a relatively simple but effective device for getting information of what somebody is typing on there keyboard. As it is a purely hardware device, it can not be detected by software methods. Specifications: Transmitter: 1. Dimensions: 33?12?3 mm. 2. Working frequency: 433,500 MHz. 3. Typical working distance: more than 800 m in the open area, 300 - 400 m in a city environment. Transmitter CM-1VOX CM-1VOX is designed for secret audio surveillance. Radio microphone's working frequency is 433 MHz. Radio microphone works in NFM mode, which allows to get good operating distance with relatively low power output - 10 mW. For battery power saving CM-1VOX has Voice Activation System (VOX). Specifications: 1. Working frequency: 433,500 MHz. 2. Estimating time of battery consumption at +20∞C. Type of battery: DL2450 (Duracell). a) constant transmission: 30h. b) transmission /standby = 1/3 (8 hours per day): 120h - 150h (5 - 7 days). c) transmission /standby = 1/10 (~2,5 hours per day): 450h (> 18 days). 7. Working temperature: 0∞? ... +50∞?. 8. Dimensions: 25x25x3 mm without battery; 25x25x8 mm with battery (CR2450). DS1 $3800 Includes transmitter, Remote control and receiver. KS1 $3200 Includes transmitter, modem and receiver. CM-1 VOX $2800 Includes transmitter and receiver. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8798 From: Ocean Group Date: Thu Jun 3, 2004 1:14pm Subject: RE: CCS Hmmm....I dunno, you could be bluffing....! :) ********************** Message: 10 Date: Thu, 3 Jun 2004 15:47:32 +0100 From: "David Alexander" Subject: RE: FW: CCS I'll see your markup and double it What fun..... David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 8799 From: Noel E. Hanrahan Date: Thu Jun 3, 2004 11:06am Subject: Fw: FW: CCS Markup?? you have no idea Am I wrong, but isn't 433.92MHz the frequency most used by garage door openers and car alarm key fobs? interesting to note that the frequencies used can be found in the CC1010 by chipcon, ( www.chipcon.com ) contained in a chip less than 1cm squared. I worked with that 18 months ago and voice capabilities were awfull.... As for your markup... the chip costs about US$4 in large quantities..... and since Chipcon will give you, as examples, the software to pretty much make the products described, development wouldn't have taken too long. Of course, I'm SURE such a serious company as CCS would NEVER try and pass off something like this as thier own work, and they would NEVER charge thousands of dollars for a $50 circuit Noel. [Non-text portions of this message have been removed] 8800 From: Does it matter Date: Thu Jun 3, 2004 8:18pm Subject: Re: video evidence in court Hi, Rules of evidence are different for Civil, State, and Federal Courts. In Federal Courts there are several decisions that speak to the admission of evidence and more importantly the examiner that is attempting to be admitted as an expert where he can render opinions as opposed to just answering questions. Check out NIST in google and see what they have for mpeg. Hope that helps. Darren ISA Forensics --- In TSCM-L@yahoogroups.com, Jack Powers wrote: > Hello- > > I've been lurking on this list for several > months, during which I have learned much. My thanks go > to the many contributors. > > Now, I have a question regarding the acceptance of > video evidence in court, specifically MPEG-4 vs. MPEG-2 > digitally encoded and decoded video. I have been told > that while MPEG-2 video has been widely accepted by > courts, MPEG-4 has not. > > Is this true? If so, is it expected to change over > (how much) time ? > > I realize that this is not a precise question and > that there are various bit rates, levels, and platforms > for both standards. I am trying to nail down the specs > for a potential product, and need to understand if the > market needs MPEG-2 or -4 or both. The product is an > extremely rugged and small digital video recorder. If > courts perceive (correctly or otherwise!) that our > choice is not acceptable, sales will certainly suffer... > so this is more about people than it is about technology. > > Any information would be very much appreciated. And > if you have opinions about other features for such a > product, I'd like to hear them also. > > Jack Powers > Powers Technical Services > powerstech@c... +1-408/621-1883 > www.cryptnet.org/powerstech 8801 From: James M. Atkinson Date: Thu Jun 3, 2004 9:56pm Subject: The Humble CPM-700 If anybody on the list is interested on some of these give me a call, or send an email. It's now available with coverage to 12 GHz., with a price low enough that any TSCM'er should have at least two of three. I take all major credit cards, cash, checks, gold coins, 5 gallon cans of diesel fuel, chicken, goats, etc. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- Attachment: (application/pdf) specs-CPM700.pdf [not stored] 8802 From: James M. Atkinson Date: Fri Jun 4, 2004 1:26am Subject: The Not-so-Humble CPM-700 Several people asked about what the new microwave down-convertor and close field probe looks like, so here are some different materials that show the DELUXE CPM-700. I suggest the CPM-700 Corporate system (with the extra probes and such), plus the deluxe upgrade. It costs a little but more, but it really helps to have these extra probes. Give me a call, or drop me an email and I'll fix you up. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- Attachment: (application/pdf) spec-cpm700-deluxe.pdf [not stored] 8803 From: contranl Date: Fri Jun 4, 2004 2:52pm Subject: New Icom R-20 scanner....useful for counter/surveillance ? There is a new scanner out ...it's the Icom R-20. I have owned many scanners but this one is the top ! and useful in surveillance and countersurveillance. First i have to say..."a scanner alone is by far not enough for serious countersurveillance...but it can be a nice tool to use together with other more specialized equipment" Why this scanner might be usefull and what are the novelties previously not found on any scanner: There is a carrier operated (COX) recorder in there it can record up to 4,3 hours ! of received audio...the audio is recorded to an internal chip. There are buttons for [play] , [pause] , [ffwd] , [fbwd] , playback speed can be 1,5 times the original speed...useful to find back specific passages...every track gets his own track number There is a counter for "total time" and "elapsed time" A red led lights up when recording...it flashes in pause. Everywhere you go you can now immidiatly record any received signals The recordings can be saved to your Pc. 2 data ports CI-V and USB The frequency range is: 0,150~3300 Mhz ! wich is an absolut record for a handheld scanner. Modes are AM,FM,WFM,LSB,USB,CW Tuning steps: 0,01/0,1/1/5/6,25/8,33/9/10/12,5/15/20/25/30/50/100 khz Sensitivity at some points less then 0,4 uV This scanner has 2 real receivers...so you can receive 2 signals at the same time (real-time not scanning !) There is a huge S-meter...15 bars !...biggest i have ever seen on a handheld scanner. When you use the "dualwatch" function (2 channels at the same time) you get 2 S-meters ! There are 2 built in antenna amplifiers...wich can be adjusted separately in 10 steps...these are not attennuators but real amplifiers...in most cases you may leave them in the middle position to not overload the receive(s)...an attenuator is also available 1250 memory channels ! Scanspeed 100 ch/sec ! There is a "bandscope" too...usually these are not very useful and you could call them gadgets....but this one is the most detailed i have seen...and it can do 3 Mhz (100khz steps)in 1 visible sweep the lowest sweep can be 1 khz so you can see a signal in detail. during a sweep you can listen too...maybe you could use this feature to detect (see) fast spreadspectrum transmitters...have not tested that yet. (it might be necessary to know the center-freuency) It runs of a LI-ON battery wich will give you an operating time of more then 20 hours !! Fast charger (2,5 hrs) Very nice design (motorola-style) Display is dot-matrix with adjustable contrast Backlight for display and keyboard Audio quality is very good considering the small speaker..other scanners with such small speakers are usually "distorted" or "noisy" A quick scan revealed no "BIRDIES"!! only some birdies in the 2,4 ghz band...wich is a little drawback...i would have liked to use this scanner as a detector to "see" if there is anything in the 2,4 ghz band (Video,Bluetooth,Wlan...etc) the birdies are small and occupy only a few khz...you could lock them out (skip) and still be able to detect all wireless-video signals since they occupy a large bandwidth (a few mhz)...(no idea of bandwidths of Wlan and Bluetooth) Further all usual (known) scanner-features are incorporated If you are thinking of buying a scanner (as an extra tool in surveillance or countersurveillance) then this must be the one ! Greetings Tetrascanner www.tetrascanner.com 8804 From: Ocean Group Date: Fri Jun 4, 2004 3:03pm Subject: RE: The Humble CPM-700 Arrggghhh, I'll give u me two fine Irish Lamb for 'em.....what be said....? Message: 4 Date: Thu, 03 Jun 2004 22:56:57 -0400 From: "James M. Atkinson" Subject: The Humble CPM-700 If anybody on the list is interested on some of these give me a call, or send an email. It's now available with coverage to 12 GHz., with a price low enough that any TSCM'er should have at least two of three. I take all major credit cards, cash, checks, gold coins, 5 gallon cans of diesel fuel, chicken, goats, etc. -jma 8805 From: James M. Atkinson Date: Fri Jun 4, 2004 3:17pm Subject: CPM-700 Pricing I have gotten flooded with queries about the pricing on the CPM-700, so I thought it wise to post this to the list The "stripped out" system is $1795, but you get nothing more than the CPM-700 itself... no case, no probes, no antenna's, no cables, no books, no adapters, nothing... just the CPM-700. This is great if you dropped or blew up your CPM-700 and just want to buy the main unit. However, I would point out that this is what many spyshops, and Internet sites are selling as a basic model, then they sell you they standard items that comes with a basic unit for a bloody fortune (ie: the case, the RF probe, etc). The basic model is $2195, and is a bare-bare bonez system that comes with a case, ONE RF probe, headphones, and various minor accessories. It's a good starter system, but you will be kicking yourself when you realize that your really should have bought the Corporate system with the extra probes, batteries, adapters and such. The Corporate System ($2752), is the most popular system we carry and includes everything in the basis system, PLUS several extra probes, rechargeable batteries, adapters, and other goodies that seriously make the CPM-700 an effective unit. The Deluxe System ($3995), is a basic model with the new 12 GHz microwave antenna system, a close field probe, and such... but it does not inclue the infrared probe, VLF probe, and other helpful things in the Corporate system. The Deluxe upgrade ($1695), includes those things needed to convert a basic system into a deluxe system. My recommendation is the Corporate System ($2752), and the Deluxe Upgrade package ($1695). It costs a bit more ($4447), but it really makes a big difference having the extra probes. Give me a call, and I will take care of you. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- From: James M. Atkinson, Comm-Eng Date: Fri Jun 2, 2000 7:14pm Subject: Interesting Trivia 1. Debra Winger was the voice of E.T. 2. Pearls melt in vinegar 3. It takes 3,000 cows to supply the NFL with enough leather for a year's supply of footballs. 4. Thirty-Five percent of the people who use personal ads for dating are already married. 5. The 3 most valuable brand names on earth: MARLBORO, COCA-COLA, and BUDWEISER, in that order 6. It's possible to lead a cow upstairs. . .but not downstairs. 7. Humans are the only primates that don't have pigment in the palms of their hands. 8. Ten percent of the Russian government's income comes from the sale of vodka. 9. The sentence "The quick brown fox jumps over the lazy dog." uses every letter in the alphabet. (Developed by Western Union to Test telex/two communications) 10. The only 15 letter word that can be spelled without repeating a letter is uncopyrightable. 11. Stewardesses' is the longest word that is typed with only the left hand. 12. No word in the English language rhymes with month, orange, silver, and purple. 13. "I am" is the shortest complete sentence in the English language. 14. Average life span of a major league baseball: 7 pitches. 15. A duck's quack doesn't echo, and no one knows why. 16. The reason firehouses have circular stairways is from the days of yore when the engines were pulled by horses. The horses were stabled on the ground floor and figured out how to walk up straight staircases. 17. The airplane Buddy Holly died in was the "American Pie." (thus the name of the Don McLean song) 18. Each king in a deck of playing cards represents a great king from history. Spades - King David Clubs - Alexander the Great Hearts - Charlemagne Diamonds - Julius Caesar 19. 111,111,111 x 111,111,111 = 12,345,678,987,654,321 20. Clans of long ago that wanted to get rid of their unwanted people without killing them used to burn their houses down - hence the expression "To get fired." 21. Only two people signed the Declaration of Independence on July 4th, John Hancock and Charles Thomson. Most of the rest signed on August 2, but the last signature wasn't added until 5 years later. 22. Hershey's Kisses are called that because the machine that makes them looks like its kissing the conveyor belt. 23. An Ostrich's eye is bigger than its brain. 24. The longest recorded flight of a chicken is thirteen seconds. 25. The name Jeep came from the abbreviation used in the army for the "General Purpose" vehicle, G.P. 26. The highest point in Pennsylvania is lower than the lowest point in Colorado. 27. Nutmeg is extremely poisonous if injected intravenously. 28. If you have three quarters, four dimes, and four pennies, you have $1.19. You also have the largest amount of money in coins without being able to make change for a dollar. 29. No NFL team which plays its home games in a domed stadium has ever won a Super bowl. 30. The only two days of the year in which there are no professional sports games (MLB, NBA, NHL, or NFL) are the day before and the day after the Major League All-Star Game. 31. The mask used by Michael Myers in the original "Halloween" movie was actually a Captain Kirk mask painted white. 32. If you put a raisin in a glass of champagne, it will keep floating to the top and sinking to the bottom. 33. Snails can sleep for 3 years without eating. 34. Actor Tommy Lee Jones and vice-president AL Gore were freshman roommates at Harvard. 35. The fingerprints of Koala Bears are virtually indistinguishable from those of humans, so much so that they could be confused at a crime scene. 36. Months that begin on a Sunday will always have a "Friday the 13th." 37. James Doohan, who plays Lt. Commander Montgomery Scott (Scotty) on Star Trek, is missing the entire middle finger on his right hand (lost it on D-Day). 38. The Eisenhower interstate system requires that one mile in every five must be straight. These straight sections are usable as airstrips in times of war or other emergencies. 39. There are 293 ways to make change for a dollar. 40. All of the clocks in the movie "Pulp Fiction" are stuck on 4:20. Number 29 is no longer true, the St. Louis Rams won in January. =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 513 From: James M. Atkinson, Comm-Eng Date: Fri Jun 2, 2000 7:25pm Subject: TSCM Rates There has been some questions on TSCM rates and I would like to offer the following: I've told people over the years to go visit five local computer stores, and to take the average of their "hourly on site service" rate (this is where they come to your office). In the United States the national average is about $90 for a competent technician (board swappers at worth about $25.00 per hour). This will be called your "base technical rate" Now people tend to get touchy about this "base technical rate", but it is important that you keep it in line with what your real capabilities. Do not try claiming a high level of competency after only attending a 2 week TSCM course. A good rule of thumb (used by one of my *MAJOR* customers) is as follows. (they use it to figure out how much to bill their own consultants out at) Basic Education of at least a Bachelors Degree, $15.00 per hour A minimum of 2 years of job specific experience on top of the basic 4 year education, $5.00 per hour. Value of each year of education (or 32 credits) above a 4 year degree, $2.50 per hour. Value of each year of job specific experience after the first two years, $2.50 per hour. Value of one week of job specific/speciality technical training (ie: a TSCM School), $5.00 per hour. Value of one week of non job specific, or general job skills (or background) technical training (ie: a Spectrum Analyzer School, or other electronics school), $2.50 per hour. Keep in mind that this can only be used to justify a rate up to the maximum "base technical rate" for your area. Just because you have 15 degrees doesn't mean your "base technical rate" can be umpteen dollars an hour. On top of the labor rate you will have to add an "equipment rate" where you collect all of the equipment that you will be taking to a clients job site and add up it's current value (not including vehicles, ladders, etc). Take this number and divide by 2000 to obtain your hourly "equipment rate". For example if you have an OSCOR your "Equipment Rate" just for that instrument is $10.00 per hour. An $80,000 Spectrum Analyzer would be worth about $40.00 per hour, and so on. It's important that is is the ACTUAL valued amount that your insurance company you pay if all of it got stolen or destroyed. Forget about all the little home brew boxes, the ham swap meet gizmos, and the ancient WJ radio you got for a song. The "Equipment Rate" is then added to your "base technical rate". Next contact five attorneys in your area and ask them what their hourly rate would be to prepare a will, and set up a trust, handle some minor matter, etc. Take an average of the rates of five of them, and call this your "ceiling rate". The hourly rate you charge your customer should always be less then the "ceiling rate", but also be high enough so that you are drawing a fair wage. In some cases you may want to charge by area, type of client, or strictly by the hour. You may also want to charge a little more, or a little less depending on the client, but keep it realistic. -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== [Non-text portions of this message have been removed] 514 From: James M. Atkinson, Comm-Eng Date: Fri Jun 2, 2000 7:28pm Subject: LETHAL SUBSTANCES A dietician was once addressing a large audience in Chicago. "The material we put into our stomachs is enough to have killed most of us sitting here, years ago. Red meat is awful. Vegetables can be disastrous, and none of us realizes the germs in our drinking water. But there is one thing that is the most dangerous of all and all of us eat it. Can anyone here tell me what lethal product I'm referring to? You, sir, in the first row, please give us your idea." The man lowered his head and said, "Wedding cake?" =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 515 From: James M. Atkinson, Comm-Eng Date: Fri Jun 2, 2000 7:31pm Subject: TOO LONG AT THE PUB A drunk is driving through the city and his car is weaving violently all over the road. A seriously annoyed trooper pulls him over. "So," says the cop to the driver, "where have you been?" "I've been to the pub," slurs the drunk. "Well," says the cop, "it looks like you've had quite a few. "I did all right," the drunk says with a smile. "Did you know," says the cop, standing straight and folding his arms, "that a few intersections back, your wife fell out of your car?" "Oh, thank heavens," sighs the drunk. "For a minute there, I thought I'd gone deaf." =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 516 From: Doug Ellsworth Date: Fri Jun 2, 2000 2:21am Subject: Re: computer forensic Eric, There are programs that automate the entire audit process, and archive these data in an unmodified form that courts will recognize as an unbroken "chain of evidence". I think this might be an answer...if I might be allowed to "read between the lines" to your question. ----- Original Message ----- From: To: Sent: Thursday, June 01, 2000 3:32 PM Subject: [TSCM-L] computer forensic > I am looking for information concerning computer data recovery. With todays computer hardware is it possible to verify if a hard drive was replaced within a certain period of time. Also, if someone 'scrubbed' their computer (deleting and refilling in sectors with new bits of info), is there any way to recover the information that the person tried to hide? Any info is appreciated. > > > -Eric > > > -------------------------------------------------- > > Rage with the Bulls... > Get your FREE @ragingbull.com Email Address > Visit http://www.ragingbull.com/ > > > ------------------------------------------------------------------------ > Sneezing And Wheezing? > Get $10 Today to Fight your allergies! > http://click.egroups.com/1/4851/1/_/507420/_/959913749/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 517 From: Steve Uhrig Date: Fri Jun 2, 2000 10:52am Subject: Low cost of sweeps Our associate Mr. Grudko commented: > >Our professional fees are lower than the US but compare quite > >favourably with fees from countries in Europe and elsewhere. > >There are many corporates and smaller companies in South Africa > >who are prepared to pay fairly decent fees for a professional > >service. Jim replied: > You can only charge what your market will bear, and you can only > spend as much time at your clients site as they will permit. Obviously there is a worldwide problem with pretenders undercutting legitimate qualified TSCM practitioners. The only workable solution, in my opinion, is to educate the consumers of TSCM services. Enlighten them as to the realities of the situation so they can see the difference between a rain dance and a competent sweep. I realize this is a long uphill battle, but start now and in a few years you will see the difference. Write articles which you contribute to local business magazines or trade journals read by potential clients. Offer to be a guest speaker at Chamber of Commerce functions, related associations, burglar and telephone professional meetings, attorney/bar association meetings, etc. ; whatever is applicable in your area. Issue appropriate press releases to local media. They are hungry for copy, especially as it pertains to local business and controversial topics (privacy invasion is hot worldwide). Be available and solicit media calls for talk shows and the like. Establish yourself as THE expert. Dig a niche so deep anyone who encroaches falls in and drowns. Here in the Baltimore and Washington DC area where our headquarters is based, we formerly had a lot of problems with every other PI doing $500 sweeps (in an area where competent services start at $5000 and go up). Local PIs saw what trained professionals charged and figured they could go after the work themselves. This is unethical and pure greed. With PIs being a major source of referrals for sweep work, over a many year period, we educated the PI community to where they now have no question about who is and who is not competent. And, most importantly, we educated them in the potential liability should they miss something and a client suffer a loss due to their incompetence. That was the kicker, and when you talk about potential six or seven figure judgements, the few hundred dollars they earn from sweeping does not justify the risk. I pointed out their insurance would not cover them if they could not demonstrate in court their competence, training, experience and equipment, with me most likely being the expert witness for their adversary. And, the referral fees we pay to a PI for a real sweep equal or exceed what they could get doing the work on their own, with no effort or liability on their part. Remind them sweeping is a *technical* specialty, not an investigative one. A PI in this area pretending to do $500 sweeps now faces the cold eyes of their peers for unethical practice (and in fact, the state PI association code of ethics specifically prohibits members from offering services in areas where they are not proven competent). Educating the client, and to some extent those who believe they are "competing" with you, is a long effort, but worth it. Yes it takes years, but the years are going to pass anyway whether you do something to improve the image of your profession or not. We don't have competitors, we have imitators. We don't have a problem with others who offer service for less. They know what their work is worth. The bottom line in any service is doing an honest competent job for the client. You are taking their money. That is a very serious matter, and basic ethics and morals dictate not doing so unless you are providing value in return. We all know in our hearts if that is true and some day, without question, there will be an accounting for every one of us. Be prepared to stand tall and confident. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 518 From: Vangelis Date: Fri Jun 2, 2000 2:19pm Subject: identifying a hostile xmitter Gentlemen, Might any of you recognize the following device? http://www.gothic23.com/~vangelis/bug_front.jpg http://www.gothic23.com/~vangelis/bug_back.jpg http://www.gothic23.com/~vangelis/bug_antenna.jpg Found via physical inspection in a POTS telco box at the side of a Northern California residence. Board is 4.5cm x 1.5cm, a pair of phone line leads, and a pair of single-wire antennae measuring 7.5cm and 13cm when unwound (tips were stripped by me). Im uncertain what to make of the antenna configuration - rx and tx? Or just tx and ground plane? No energy of any significant strength measured <1.3Ghz via freq counter. Some unstable energy ~300Mhz. Tested on- and off-hook. Source waveform observed on antenna via 40Mhz scope, but again at no significant amplitude. Any thoughts, before I allow a friend to attempt a chemical stripping to identify the 8-pin IC? 519 From: Charles@t... Date: Fri Jun 2, 2000 8:06pm Subject: Re: identifying a hostile xmitter you didn't mention how it was attached, I expect the grn and red terminals were in parallel? Is there a reason why you think the second pair of wires are antennae? Not knowing what it is, I might have thought there was one pair of wires going in and another coming out, perhaps for a series connection. hmmm always interesting... charles ----- Original Message ----- From: Vangelis To: Sent: Friday, June 02, 2000 3:19 PM Subject: [TSCM-L] identifying a hostile xmitter > > Gentlemen, > > Might any of you recognize the following device? > > http://www.gothic23.com/~vangelis/bug_front.jpg > http://www.gothic23.com/~vangelis/bug_back.jpg > http://www.gothic23.com/~vangelis/bug_antenna.jpg > > Found via physical inspection in a POTS telco box at the side of a Northern > California residence. Board is 4.5cm x 1.5cm, a pair of phone line leads, > and a pair of single-wire antennae measuring 7.5cm and 13cm when unwound > (tips were stripped by me). > > Im uncertain what to make of the antenna configuration - rx and tx? Or > just tx and ground plane? > > No energy of any significant strength measured <1.3Ghz via freq > counter. Some unstable energy ~300Mhz. Tested on- and off-hook. Source > waveform observed on antenna via 40Mhz scope, but again at no significant > amplitude. > > Any thoughts, before I allow a friend to attempt a chemical stripping to > identify the 8-pin IC? > > > > > ------------------------------------------------------------------------ > IT Professionals: Match your unique skills with the best IT projects at > http://click.egroups.com/1/3381/1/_/507420/_/959994591/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 520 From: Jay Coote Date: Fri Jun 2, 2000 9:04pm Subject: Re: identifying a hostile xmitter You might want to use a spectrum analyzer and see if the transmitter is spread-spectrum, frequency hopping or wide FM. Those and SSB might "confuse" a freq counter so it wouldn't give a reading. Jay Coote Los Angeles ---------- > Gentlemen, > > Might any of you recognize the following device? > > http://www.gothic23.com/~vangelis/bug_front.jpg > http://www.gothic23.com/~vangelis/bug_back.jpg > http://www.gothic23.com/~vangelis/bug_antenna.jpg > > Found via physical inspection in a POTS telco box at the side of a Northern > California residence. Board is 4.5cm x 1.5cm, a pair of phone line leads, > and a pair of single-wire antennae measuring 7.5cm and 13cm when unwound > (tips were stripped by me). > > Im uncertain what to make of the antenna configuration - rx and tx? Or > just tx and ground plane? > > No energy of any significant strength measured <1.3Ghz via freq > counter. Some unstable energy ~300Mhz. Tested on- and off-hook. Source > waveform observed on antenna via 40Mhz scope, but again at no significant > amplitude. > > Any thoughts, before I allow a friend to attempt a chemical stripping to > identify the 8-pin IC? > > > > > ------------------------------------------------------------------------ > IT Professionals: Match your unique skills with the best IT projects at > http://click.egroups.com/1/3381/1/_/507420/_/959994591/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 521 From: Justin T. Fanning Date: Sat Jun 3, 2000 5:02am Subject: Telco filter (NOT a Bug) - Was Re: identifying a hostile xmitter Hi, What you have is a Telco RF choke (line filter - great pictures BTW). When we were getting data lines installed in our CA office we pulled one off the line and I almost died right on the spot. We have since had Telco work on our CA data & voice lines several times and the Telco always checks for the presence of the filters and if not present adds one to the line (usually for high bandwidth applications i.e. DSL or noisy lines near high RF fields etc.) I have one right in front of me now. Mine has '91RA14' on the base and four spade connectors two red & two green. Thanks, Justin T. Fanning Justin@f... --- Vangelis wrote: > > Gentlemen, > > Might any of you recognize the following device? > > http://www.gothic23.com/~vangelis/bug_front.jpg > http://www.gothic23.com/~vangelis/bug_back.jpg > http://www.gothic23.com/~vangelis/bug_antenna.jpg > > Found via physical inspection in a POTS telco box at the side of a Northern > California residence. Board is 4.5cm x 1.5cm, a pair of phone line leads, > and a pair of single-wire antennae measuring 7.5cm and 13cm when unwound > (tips were stripped by me). > > Im uncertain what to make of the antenna configuration - rx and tx? Or > just tx and ground plane? > > No energy of any significant strength measured <1.3Ghz via freq > counter. Some unstable energy ~300Mhz. Tested on- and off-hook. Source > waveform observed on antenna via 40Mhz scope, but again at no significant > amplitude. > > Any thoughts, before I allow a friend to attempt a chemical stripping to > identify the 8-pin IC? > > ------------------------------------------------------------------------ > IT Professionals: Match your unique skills with the best IT projects at > http://click.egroups.com/1/3381/1/_/507420/_/959994591/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 522 From: James M. Atkinson, Comm-Eng Date: Sat Jun 3, 2000 6:21am Subject: Re: identifying a hostile xmitter At 12:19 PM -0700 6/2/00, Vangelis wrote: >Gentlemen, > >Might any of you recognize the following device? > >http://www.gothic23.com/~vangelis/bug_front.jpg >http://www.gothic23.com/~vangelis/bug_back.jpg >http://www.gothic23.com/~vangelis/bug_antenna.jpg > >Found via physical inspection in a POTS telco box at the side of a Northern >California residence. Board is 4.5cm x 1.5cm, a pair of phone line leads, >and a pair of single-wire antennae measuring 7.5cm and 13cm when unwound >(tips were stripped by me). > >Im uncertain what to make of the antenna configuration - rx and tx? Or >just tx and ground plane? > >No energy of any significant strength measured <1.3Ghz via freq >counter. Some unstable energy ~300Mhz. Tested on- and off-hook. Source >waveform observed on antenna via 40Mhz scope, but again at no significant >amplitude. > >Any thoughts, before I allow a friend to attempt a chemical stripping to >identify the 8-pin IC? Isn't the physical inspection a great thing ;-) Let me ask a few initial questions here. 1) What makes you thinks it is an eavesdropping device (specifically)? 2) What voltage(s) was across the various wire combinations? 3) What other signals were across the various wire combinations? 4) Do you have an Xray yet of the device, and if so can you post the layer with the PCB traces. 5) How many axial components 6) How many radial components 7) Any inductors, filters, or coils? 8) Is it possible that what appears to be an IC is actually a resistor matrix, inductor, or filter? 9) What is the resistance and impedance across all wire combinations. 10) What was the current draw in the circuit (if any). 11) Any transistors on the board 12) Any surface mount components? 13) Is that black material on the board paint or some type of conformal coating. 14) Anything that looks like a crystal, SAW, or other oscillating component? 15) Have you shot it yet with black and white and Infrared film... or even with normal photographic film yet? If not then shoot a roll of each immediately. 16) Have you given a federal law enforcement agency a formal "heads up" of the potential find yet... if not do so immediately (but only if your certain its a eavesdropping device, and not just a telco circuit or filter). 17) Is the any response detected with a near field probe (3 kHz to 1 GHz) 18) What component are immediately behind each of the wires 19) What materials is the PCB made out of 20) Is there any silk screen images, ink stamps, etc on either side of the board. 21) On the solder side... what is the quality of workmanship? 22) Is there any kind of flux residue on the PCB 23) Are any of the leads bent over, or just stuffed into the PCB straight Also, 24) What was the nature of the line this was found on (was it voice, data, fax, etc). 25) How far was it to the CO 26) How far was it to the demarc point (it seems like you said it was actually inside the demarc box), and also what was the distance to the nearest phone. 27) Did it appear that anybody had made an effort to conceal the device. Where exactly inside the box was it oriented, and how was it oriented in there. 28) Was the enclosure you found this metallic, and was any of the metal GROUNDED, and how good was the ground. 29) Are the wires solid or stranded, and if so what is the size (measure with a set of calipers) 30) Did you perform any kind of an audio sweep (DC to 15 kHz) on the line before and after removal to see if it was only a build out? 31) How many other lines cane into, or left the box. 32) I assume that you fumed the area for latent prints, any matches? 33) What was written (visibly or invisibly) inside or on the demarc point. 34) Do you have a preliminary schematic of the circuits yet? I have my suspicions about what this device is,. -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 523 From: Mike F Date: Sat Jun 3, 2000 9:15am Subject: FW: Purdue Library <===DELETE IF YOU GET MORE THAN ONE Purdue Virtual Library Resources This site has some usefull links,virtual reference desk,news&weather,and INTERNET GATEWAY. Be sure check all the Links on this site. http://thorplus.lib.purdue.edu/ Yesterday,I emailed everyone with my """"new email address"""" the flippin thing does not Work correctly. I can send email,go to websites etc. BUT,I CANNOT RECEIVE EMAIL ON THAT ACCOUNT. Please use my dreamscape.com email address untill further notice. SomeOne called me & said don't Cancel your old email right away. I am Glad I took the ADVICE. So many thanks to SBean. later4,mike f. email me at======>friindy@d... Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 524 From: the cynic Date: Sat Jun 3, 2000 1:01pm Subject: Re: identifying a hostile xmitter To be honest, in my mis-spent youth ( slightly mis-spent) oh so long ago, I used to run into these things a lot in Telco dumpsters. Please don't ask me what I was doing in Telco dumpsters,(looking for 24 gauge wire :). In any case I used to save them, I always wanted to strip off the expoxy and let some of my EE friends take closer looks at these devices, I still have a few lying around. I have no clue as to whether they are transmitters, the bes way to find out is to simply connect a line pair to them, I'm guessing that they get their voltage from the line itself. Connect it to a live line, and stick a near field receiver next to it or a spectrun analyzer and do a sweep, I guess. The coil on it would suggest that it is a transmitter, I 'll pull out one of the many that I still have lying around. 525 From: Dawn Star Date: Sat Jun 3, 2000 4:51pm Subject: R.F. Bug to Tap ratio I would like to make a comment from my own experience. I have swept over 2500 locations on the West Coast since 1973. The occasions that I have found devices the ratio has been ten to one telephones intercepts vs R.F. bugs. The reason that is, in my opinion, is that a telephone tap yields more information, including participants phone numbers and locations, has less audio quality problems, and is a lot safer to install and maintain. So the recommendation to the beginner buying equipment to hold on the T.D.R. and beef up on the R.F is a bad idea in the real world. Roger Tolces, Electronic Security Co. Los Angeles [Non-text portions of this message have been removed] 526 From: Miguel Puchol Date: Sat Jun 3, 2000 3:16pm Subject: RE: Telco filter (NOT a Bug) - Was Re: identifying a hostile xmitter Hi, > What you have is a Telco RF choke (line filter - great pictures BTW). > When we were getting data lines installed in our CA office we pulled > one off the line and I almost died right on the spot. Errr....great way to disguise a spread-spectrum bug placed on some odd band... Just a thought. Cheers, Mike 527 From: Jay Coote Date: Sat Jun 3, 2000 7:48pm Subject: Tek 1502-B TDR for sale I am interested in selling my Tektronics 1502-B TDR. LCD screen display, battery option and chart printer option. Includes manual, probes, lid. (I can email more specs) Excellent condition, clean, sole owner, low mileage, very near a "ten" A large recond/used/new test equipment firm asks $6300 for a 1502-B with these options. My 1502-B is going for $5500. Jay Coote Los Angeles. TSCM@j... 528 From: Date: Sat Jun 3, 2000 4:29pm Subject: Re: Telco filter (NOT a Bug) - Was Re: identifying a hostile xmitter In a message dated 6/3/00 5:21:15 PM Pacific Daylight Time, mpuchol@w... writes: << Errr....great way to disguise a spread-spectrum bug placed on some odd band... >> If the bugger could afford one that small, they'd go direct on his line. ex sweeper 529 From: Dawn Star Date: Sun Jun 4, 2000 11:57am Subject: Automated Sweeps Since reading to posting from the friend from Scanlock I've down loaded their spec sheets. One thing I see in these advertisements is the term "non-technical operators". I guess this means you turn the machine on and sometime later you pick up the results (ie a R.F. spectrum printout). Then I guess someone knowledgeable looks at it later on. I can only tell you from my 2500+ sweeps that the key skill in his game is waveform pattern recognition and wave analysis. If you don't have this skill you need to move on. This is why ability and accuracy in this area is directly linked with how many years have you been out in the field, on the front line. Wave form analysis is a real time sport, you don't get it done on a printout. Printouts are great for records and baseline studies for next sweep reference but that's it. I can TDR a line and tell you what you are going to find down the wire at what distance and be 95% accurate. I've TDR'd and analyzed the waves of 25,000 lines, its all in my head. I really don't think you can automate this skill. And as for throwing the printout results to the wind, in my career many of my clients when people made mistakes they didn't sue, you ended up having an unfortunate accident. So I always took results very seriously. Roger Tolces, Electronic Security Co. Los Angeles [Non-text portions of this message have been removed] 530 From: Mike F Date: Tue Jun 6, 2000 7:50am Subject: Internet Security Resources-DELETE IF YOU SEEN THIS B4! Canregie Mellon University has XXX-cell-ant Resource page for Security concerning computers & the internet. Certís Resource Page for Internet Security http://www.cert.org/nav/other_sources.html PS-Please don't forget check there main page at cert.org. L8R4,Mike F. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 531 From: Mike F Date: Tue Jun 6, 2000 8:29am Subject: Internet Security Tools <==DELETE ALL BUT ONE OF THESE EMAILS CanrnegieMellon's Other Sources of Security Tools http://www.cert.org/other_sources/tool_sources.html L8R4,Mike F. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 532 From: Jordan Ulery Date: Tue Jun 6, 2000 9:46am Subject: data eraser The following is another freeware product that may be useful to "remove" data from media. After the last discussion I suppose the term should be "camouflage" or "scramble" data, but we already had that discussion. caveat emptor http://www.tolvanen.com/eraser/download.html 533 From: Executive Security International, Ltd. Date: Tue Jun 6, 2000 11:16am Subject: Re: data eraser Please take us off your mailing list you are clogging our mailbox with unwanted mail.... THANK YOU Jordan Ulery wrote: > The following is another freeware product that may be useful to "remove" > data from media. After the last discussion I suppose the term should be > "camouflage" or "scramble" data, but we already had that discussion. > caveat emptor > > http://www.tolvanen.com/eraser/download.html > > ------------------------------------------------------------------------ > Old school buds here: > http://click.egroups.com/1/4057/1/_/507420/_/960302891/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 534 From: Jay Coote Date: Tue Jun 6, 2000 1:19pm Subject: Assistance with Telephone Breakout Box I am (slowly) putting together a breakout box for telephone tests; Jim and some list members have been a great help with their ideas and experiences. I am looking for a source for a tone sweeper that I can add to my BOB. Maybe there are some ready-made boards or modules which can be easily converted for a two- to four-tone (sinewave) sweep of telephone voiceband...? Thanks for helping, Jay Coote Los Angeles (Excuse the date error... it not my clock, but a "Ms thing") 535 From: Jay Coote Date: Tue Jun 6, 2000 1:25pm Subject: Microwave Downconvertors for receivers and SA's I am still looking for inexpensive ways to convert 2-4 GHz; 4-6 Ghz (etc) down to an IF (output to TSCM receiver and/or spectrum analyzer). I am also looking for were wideband RF preamplifiers for receivers or SA's.... low nf, 15-30 dB gain. One US vendor, Minicircuits, has some microwave components such as mixers. Have any list members built their own downconvertors and RF preamps? I am still looking for sources. Thanks for helping, Jay Coote Los Angeles (Please disregard the date error.... it's a Ms thing, not my PC) TSCM@j... 536 From: Executive Security International, Ltd. Date: Tue Jun 6, 2000 2:40pm Subject: Re: Assistance with Telephone Breakout Box Please take us off your mailing list... your clogging our mailbox with junk mail that we do not need. This is a business account and we need to keep it free of junk mail so that we can service our own mail. THANK YOU JJ Sutton Jay Coote wrote: > I am (slowly) putting together a breakout box for telephone tests; Jim and some list members have been a great help with their ideas and experiences. > > I am looking for a source for a tone sweeper that I can add to my BOB. > Maybe there are some ready-made boards or modules which can be easily converted for a two- to four-tone (sinewave) sweep of telephone voiceband...? > > Thanks for helping, > Jay Coote > Los Angeles > (Excuse the date error... it not my clock, but a "Ms thing") > > ------------------------------------------------------------------------ > IT Professionals: Match your unique skills with the best IT projects at > http://click.egroups.com/1/3381/1/_/507420/_/960315550/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 537 From: Executive Security International, Ltd. Date: Tue Jun 6, 2000 2:45pm Subject: Re: Microwave Downconvertors for receivers and SA's Please take us off your mailimg list your clogging our mailbox. This is a business account and we need to keep it free of junk mail to service our own mail. THANK YOU jjsutton Jay Coote wrote: > I am still looking for inexpensive ways to convert 2-4 GHz; 4-6 Ghz (etc) down to > an IF (output to TSCM receiver and/or spectrum analyzer). I am also looking for > were wideband RF preamplifiers for receivers or SA's.... low nf, 15-30 dB gain. > > One US vendor, Minicircuits, has some microwave components such as mixers. > > Have any list members built their own downconvertors and RF preamps? > I am still looking for sources. > > Thanks for helping, > Jay Coote > Los Angeles > (Please disregard the date error.... it's a Ms thing, not my PC) > TSCM@j... > > ------------------------------------------------------------------------ > IT Professionals: Match your unique skills with the best IT projects at > http://click.egroups.com/1/3381/1/_/507420/_/960315970/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 538 From: James M. Atkinson, Comm-Eng Date: Wed Jun 7, 2000 1:31am Subject: Mindless Moaning and Bitching Excuse me "jjsutton", but Bob (the guy who owns the business, and signs your pay check) specifically asked to be add to this list almost two years ago, and has personally thanked me several times for the materials contained herein. Instead of bitching so many times to the list kindly read the instructions on how to un-subscribe yourself. Also, you may want to mention this problem to Bob, and ask HIM if you wants to be removed fro the list, or does he want it moved to a new address. Until this little "misunderstanding" is resolved I will be revoking your posting privileges on the list. It always helps when you read the instructions, -jma At 12:45 PM -0700 6/6/00, Executive Security International, Ltd. wrote: >Please take us off your mailimg list your clogging our mailbox. >This is a business >account and we need to keep it free of junk mail to service our own mail. >THANK YOU >jjsutton > >Jay =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 539 From: Andy Grudko Date: Sun Jun 4, 2000 4:54am Subject: Marty K equip. Thanks for the info on the web pages. Nice site. I used to do construction at a lower level. My last project was a 70 transducer window ping noise generator for a bank 3 years ago. We just serviced it 2 months ago. Unfortunatly I lost my left arm above the elbow 22 months ago (rolled my 'Vette) so construction is very difficult and I sub out now. Also I'm still on strong pain medication which sometimes hits my concentration. I'll get some ideas over to you another time. I'm sure we'll do business. Andy Grudko (CEO) Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence - Est 1981 Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 countries (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) www.grudko.com - "When you need it done right -first time" Andy Grudko (CEO) Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence - Est 1981 Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 countries (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) www.grudko.com - "When you need it done right -first time" ----- Original Message ----- From: Vangelis To: Sent: Friday, June 02, 2000 8:19 PM Subject: [TSCM-L] identifying a hostile xmitter > Gentlemen, > > Might any of you recognize the following device? > > http://www.gothic23.com/~vangelis/bug_front.jpg > http://www.gothic23.com/~vangelis/bug_back.jpg > http://www.gothic23.com/~vangelis/bug_antenna.jpg > > Found via physical inspection in a POTS telco box at the side of a Northern > California residence. Board is 4.5cm x 1.5cm, a pair of phone line leads, > and a pair of single-wire antennae measuring 7.5cm and 13cm when unwound > (tips were stripped by me). > > Im uncertain what to make of the antenna configuration - rx and tx? Or > just tx and ground plane? > > No energy of any significant strength measured <1.3Ghz via freq > counter. Some unstable energy ~300Mhz. Tested on- and off-hook. Source > waveform observed on antenna via 40Mhz scope, but again at no significant > amplitude. > > Any thoughts, before I allow a friend to attempt a chemical stripping to > identify the 8-pin IC? > > > > > ------------------------------------------------------------------------ > IT Professionals: Match your unique skills with the best IT projects at > http://click.egroups.com/1/3381/1/_/507420/_/959994591/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 540 From: Andy Grudko Date: Sun Jun 4, 2000 4:59am Subject: Re: Low cost of sweeps Andy Grudko (CEO) Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence - Est 1981 Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 countries (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) www.grudko.com - "When you need it done right -first time" ----- Original Message ----- From: Andy Grudko To: Sent: Saturday, June 03, 2000 3:54 PM Subject: Fw: [TSCM-L] Low cost of sweeps > I'm reposting this 'cos it bounced due to my ISP changing the outgoing > address attached to my posts - without telling me!! Sorry ir if't a > duplicate. > > ----- Original Message ----- > From: Andy Grudko > To: > Sent: Saturday, June 03, 2000 11:12 AM > Subject: Re: [TSCM-L] Low cost of sweeps > > > > > > ----- Original Message ----- > > From: Steve Uhrig > > Write articles which you contribute to local business magazines > > > or trade journals read by potential clients. > > > > In the early '80s I wrote an article for a local article called Security > > Focus about TSCM, giving a 10 point check list on how to tell the > difference > > between someone who was a 'chancer' and someone who at least knew the > basics > > and was of good intent. > > > > A few months later I was talking TSCM to the security Manager of a local > > retail store chain (for Steve W's benifit, it was Edgars). As we chatted > his > > questions seemed familiar - yup, he was reading them off a photocopy of my > > article........ > > > > Andy Grudko (CEO) > > Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & > > intelligence - Est 1981 > > Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 > > countries > > (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, > > SASFed, > > SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) > > www.grudko.com - "When you need it done right -first time" > > > > > > > 541 From: Andy Grudko Date: Sun Jun 4, 2000 5:07am Subject: Re: Mixed ---- Original Message ----- One guy why I know of actually buys and builds old movie props and shows up dressed in a battle dress uniform to even further impress the client. I can only hope he's Microsoft's Redmond TSCM consultant. When they built their local HO here I did 3 sweeps/searches at different stages of building (to avoid the US Embassy Moscow Syndrome). On the last occasion, the first weekend after commissioning, we moved in only to find the card-reader doors jammed open ('cos staff were taking boxes in and out), but on one desk a document titled AIME...their confidential marketing plan for Africa, India, Middle East.... Hello! The rest of the story is too unbeleivable for this forum, but the local MD booted me out 'cos I reported this obvous security breech to Redmond. I wrote this message this a.m. but didn't have time to send it - this afternoon I heard that a bomb went off outside Microsoft's HO here at 5 a.m. Is it possible someone doesn't like them? An ethical TSCM person can never assure that a location is 100% free of bugs, but he can certainly get in the high 90's (98.5-99.9%, etc) Hence the need for a GOOD search. How else do you find a bug with a flat battery? A 'broom' is a very slow tool if done right (my excuse for not having one). The mike/walkie-talkie bug I mentioned was really interesting. Late '80s, EC mike on screened cable plastered into the wall of the Board Room. 60 Mtrs away connected to an out-of-band tuned UHF ham radio on 250 mw, on mains supply, on a 6 ele beam pointing to the HO, 800 Mtrs away. Obviously an 'inside job'. The CEO was checking up on his subsiduraries.... Found by physical search only. 3 RF sweeps totally missed it. We try to educate clients as to why they should pay realistic fees, but usually we have to compromise. Ah, but you can use your equipment to justify either a higher fee, or to justify your firm over another firm. Agreed, but we tend to use positive references from clients first. While the physical inspection is EXTERMELY important, the instruments are used to see where you can not, and to tell you where to look a little harder. Agreed A client should never "bitch about costs", while they may be a little annoyed, they should never be bitching. Perhaps we are hitting language/cultural differences here - they just weren't happy. If the customer complains then you need to step back and determine how to make them happy, If your paying 21,000 for an OSCOR then we need to talk as they should only cost around 14,000 or so (from us). One word. Import duty. OK, it's 2 words but I was never big on maths. We have protectionist import duties on most stuff. Also this type of kit is rarely bought here so dealers need to keep stocks of slow the moving imported gear and it is understandable that costs rise. In 1998 I visited Houston Tx to buy a polygraph and do a crash course. We then sent a partner over for a 10 week course in PA. I have yet to see a profit from that 'investment'. Seriously, the size of the Spectrum Analyzer has nothing to do with it. I know this - I meant the technology was big - they could pick up everything except Elvis. Yes this is Africa - but there are a few ethical professionals here. Andy Grudko (CEO) Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence - Est 1981 Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 countries (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) www.grudko.com - "When you need it done right -first time" From: Marty Kaiser Date: Mon Jun 3, 2002 7:45am Subject: sorry My apologies to all of you for sending a file in HTML format. I confess that I forgot how to cut and paste it from Microsoft Word. The story still has a long way to go so I have decided to break it into chapters. Periodically, you will be sent just those chapters recently updated and not the whole story. http://www.martykaiser.com/fbi1~1.htm Marty [Non-text portions of this message have been removed] 5554 From: Shawn Hughes Date: Mon Jun 3, 2002 10:25am Subject: I love eBay i **LOVE** eBay!! ======================================= Air Force Probes Internet Auction WASHINGTON (AP) - The Air Force is looking into the Internet auction of sensitive government aircraft communications equipment. The sales on eBay, which were reported by Newsweek, were of parts used in aircraft like the SR-71 spy plane and F-16 fighter. ``It is actively under investigation by the Air Force Office of Special Investigations,'' an Air Force spokesman, Capt. David L. Englin, said Sunday. Antiques dealer Norb Novocin told the magazine he bought the parts in Jacksonville, Fla., for $244 in an unclaimed property sale. The seller was a shipping company which had been hired to take the parts in 1989 from Dover Air Force Base in Delaware to Warner Robins in Georgia, the magazine reported. Novocin said that he initially called the Georgia base about buying the goods but was turned away. After he was contacted by the Air Force, Novocin said he turned over the names and addresses of purchasers and agreed to stop selling the equipment. ======================================= 5555 From: Hawkspirit Date: Mon Jun 3, 2002 0:45pm Subject: "Know your customer" lives!!!!! >Subject: Post article - "Know your customer" lives!!!!! > >washingtonpost.com > >In Terror War, Privacy vs. Security >Search for Illicit Activities Taps Confidential Financial Data >http://www.washingtonpost.com/wp-dyn/articles/A49323-2002Jun2.html > >By Robert O'Harrow Jr. >Washington Post Staff Writer >Monday, June 3, 2002; Page A01 > >In the amorphous war on terrorism, government officials believe they have >a new weapon: the growing number of financial institutions that use >powerful technology to monitor confidential customer activity and report >suspicious behavior to law enforcement and intelligence officials. > >Driven by little-known provisions of the USA Patriot Act, the anti-terror >legislation that was approved after Sept. 11, banks, securities firms and >other companies are deploying computer systems that draw together millions >of transactions, sometimes automatically, in searches for money >laundering, terrorist financing or other unusual patterns. > >"The Patriot Act is imposing a citizen-soldier burden on the gatekeepers >of the financial institutions," said David Aufhauser, general counsel at >the Treasury Department and head of an interagency task force on terrorist >finance. "In many respects, they are in the best position to police >attempts by people who would do ill to us in the U.S., to penetrate the >financial systems." > >Federal regulators three years ago tried to impose similar monitoring >requirements on financial institutions to combat money laundering but >dropped their plan, known as "know your customer," after it caused an >uproar among consumers concerned about their privacy. Now some specialists >believe the scrutiny of consumers on the government's behalf is going even >deeper. > >"Sept. 11 obviously made us totally rethink where to draw the line with >respect to government access to customer information," said David Medine, >a former financial privacy specialist at the Federal Trade Commission. > >"The question going forward is: Did we draw that line in the right place?" >Medine said. "It is really a fundamental civil liberties issue." > >The increased financial scrutiny is part of an expanded campaign by the >government to tap into public and confidential data in search of people >who pose terrorist threats. The push relies heavily on data and analytical >tools, some of them developed in the 1990s for direct mail, credit-card >offers and other kinds of targeted marketing. > >As directed by the Patriot Act, Treasury Department regulations require >that securities firms, money-services businesses and broker-dealers file >reports on suspicious activity, something banks have been doing for >several years. Those firms, along with mutual funds, operators of >credit-card companies and some other financial companies, also must have >anti-money-laundering programs. > >Congress also said that financial companies must authenticate new >customers, check their identities against government watch lists and >maintain records for government scrutiny. > >The law encourages financial institutions to share information among >themselves about customers suspected of being involved with terrorism or >money laundering, and it gives them protection from legal liability for >doing so. In addition, it gives law enforcement and intelligence agencies >greater access to confidential information without a subpoena while also >requiring that credit bureaus secretly turn over credit reports to the >CIA, National Security Agency and other intelligence agencies when >presented with a request signed by a senior agency official. > >While law-enforcement officials said the cooperation of the financial >services industry is critical to the war on terrorism, some industry >officials have expressed concern. > >H. Rodgin Cohen, a leading financial services lawyer in New York, said he >believes that financial companies may find themselves asking customers >about seemingly suspicious but innocent activity that might be >embarrassing or involve private matters, such as health care. He predicted >that they also will file more suspicious-activity reports, with less >evidence, to avoid trouble from the government. > >"As long as the government can enlist the financial institution as part of >the front-line defense against money laundering and terrorism, it has got >to be anticipated there will be more in the way of intrusions on privacy," >said Cohen, chairman of Sullivan & Cromwell. "It is just a different >manifestation of whether they can wiretap you." > >Tracy Calder, chief money-laundering prevention officer at UBS PaineWebber >Inc., agreed the new reporting mandates, coupled with the sophisticated >monitoring technology, are "absolutely intrusive." But, she said, they >will help fight terrorism and crime, something she believes most people >will embrace. "Americans are willing to accept more intrusiveness in >exchange for security," she said. > >The computerized systems create profiles of customer activity, sometimes >including more than a year's transactions, and sift through deposits, wire >transfers, ATM activity and links among account holders. Mantas Inc., a >Fairfax County spinoff from SRA International Inc., a government >contractor that works closely with U.S. intelligence agencies, recently >demonstrated how its software can monitor millions of transactions a day. > >Using data culled from people whose identities were masked, officials >showed reports that a bank analyst might receive from an overnight >computer review. One report in the demonstration had a risk score of 95 >out of 100. A click on a screen that resembled a Web page pulled up a file >that showed several unrelated individuals at the same address had, over >several days, sent out 18 checks or money orders for a total of $9,000. > >Another click on the screen brought up a report about links among five >relatively new accounts at different branches of the same bank. Those >accounts had transferred $125,000 to another account in Miami. The system >noted that the account holder there then wrote a check for $125,000. > >While each account on its own did not appear to represent a risk, the >coordinated activity set off alarms, said Don Temple, an >anti-money-laundering specialist at Mantas and a former special agent at >the IRS. "You can only detect suspicious transactions today with >sophisticated data-mining and pattern-recognition software," Temple said. > >Experts said such systems could also flag a securities account that never >trades stocks. Or the systems could draw attention to someone of >apparently modest means who receives a $40,000 wire transfer from abroad >and then sends out a large check. Specialists said the systems, by >sweeping through vast electronic depositories of information, can find >links among customers that a person might never see. > >"Sometimes we've referred to our product as the 'Big Brother,' " said >Alison Holland, spokeswoman for NetEconomy, a Dutch firm that is pitching >its systems to U.S. firms. "It can monitor so many things." > >Some companies used such tools before Sept. 11, as computer power >increased and the government increased efforts to stop the flow of drug >and mob money through the U.S. banking system. But TowerGroup, a >Massachusetts research firm that tracks financial services, estimated that >banks and other institutions will double their spending on monitoring >systems this year, to $120 million. "This is just a sea change in the >industry," said TowerGroup analyst Breffni McGuire. > >UBS PaineWebber, for example, recently signed a deal with Searchspace >Corp., a company that says its computer system "captures and uses all >transactions that flow through an organization to provide continuously >adaptive profiles of all individuals." > >Riggs Bank NA is working with Americas Software Corp. to install a similar >system that will automate procedures it has had in place for several >years. Citigroup Inc. has contracted with Mantas, which says its software >can "reduce the risk of money laundering with comprehensive, >enterprise-wide surveillance of your customer, account, and transaction >information . . . to reveal suspicious and previously unknown behaviors." > >Last week, in response to a mandate in the Patriot Act, the Treasury >Department's Financial Crimes Enforcement Network, known as FinCen, began >operating a secure online network to make it easier for financial >companies to report suspicious behavior by customers to the government. > >Central to that relationship are suspicious-activity reports, which >require officials to fill in more than 50 kinds of information, including >addresses, account numbers, Social Security numbers and phone numbers. > >They are maintained by FinCen in databases that are available to local, >state and federal law-enforcement agencies. Under Patriot Act provisions, >intelligence agencies also have the right to get such reports on demand. >People who are the subjects of the reports may not see them, a FinCen >official said. > >The number of suspicious-activity reports filed with the government was >almost 163,000 in 2000, compared with 81,000 in 1997, the first full year >the reports were collected, the agency said. > >The pace of the reports jumped sharply after the Sept. 11 attacks. About >125,000 were filed from Oct. 1, 2001, to the end of March, compared with >about 86,000 in the same period the previous year, agency officials said. > >John Byrne, senior counsel at the American Bankers Association, said >members have cooperated with the government in tracking down terrorist >assets and matching customer names against government lists of suspects >since Sept. 11. But Byrne said that financial institutions, even those >using the most sophisticated technology, need guidance and timely >intelligence to help the government. > >"We have proven our willingness to respond to legal government requests to >search records and report suspected crime," he said. "What concerns us is >any policy that suggests that the financial industry on its own determine >potential terrorist activity. At the end of the day, the financial sector >is not law enforcement." > >Officials at FinCen said they have no interest in deputizing the financial >industry and intruding unnecessarily into the financial lives of most >people. They want the industry to act as a gatekeeper, not a cop, and to >focus on risky customers. > >"We have this important practical reason for paying attention to privacy >concerns," FinCen Director James F. Sloan said. "If we don't, we're going >to end up losing these tools." > >Sloan said suspicious-activity reports, coupled with powerful data >warehouses and mining tools at FinCen, have turned up leads and suspects. >"This created an opportunity for dialogue that has never existed before," >Sloan said of the Patriot Act. "It has given us an opportunity to work >with the industry like never before." > >2002 The Washington Post Company > >--- > >[See also:] >http://www.washingtonpost.com/wp-dyn/articles/A30027-2002May29.html > >Financial Database To Screen Accounts >Joint Effort Targets Suspicious Activities > >By Robert O'Harrow Jr. >Washington Post Staff Writer >Thursday, May 30, 2002; Page E01 > >NEW YORK, May 29 -- Leading financial services firms here have formed a >private database company that will compile information about criminals, >terrorists and other suspicious people, for use in screening new customers >and weeding out those who may pose a risk. > >The company, known as Regulatory DataCorp Int'l LLC, comes as financial >services face strict new government mandates to make efforts to identify >those who may want to use the U.S. financial system for illegal activity and >file reports of suspicious activity to federal investigators, according to >people involved in the effort. > >====================================================================== 5556 From: Date: Mon Jun 3, 2002 10:45am Subject: FBI Changes Rules on Secret Wiretaps - sounds like a good solution FBI Changes Rules on Secret Wiretaps By TED BRIDIS .c The Associated Press WASHINGTON (AP) - Responding to criticism, the FBI has quietly changed its internal rules so that Director Robert Mueller personally reviews any requests by agents for secret terrorism wiretaps denied by lawyers at headquarters. The change gives FBI agents in the field a final avenue for appeal directly to Mueller if they believe terrorism investigations are being hampered by headquarters. The FBI director already personally reviews all such wiretap requests approved by lawyers at headquarters and forwarded for further approval by lawyers at the Justice Department. The new rules came shortly after Mueller received a scathing letter from Coleen M. Rowley, the top FBI lawyer in its Minneapolis office, complaining that a supervisor in Washington interfered with the Minnesota investigation of Zacarias Moussaoui weeks before the Sept. 11 attacks. It is impossible to determine how much extra work this change makes for the already burdened FBI director, because officials would not say how many such requests under the 1978 Foreign Intelligence Surveillance Act are rejected internally by FBI lawyers. The law, focused mostly on espionage and terrorism cases, gives the FBI broad authority to search a target's home or belongings or wiretap conversations. Court documents show that U.S. judges approved 932 requests under the surveillance law last year, but that included only the requests previously approved by lawyers at both the FBI's National Security Law Unit and the Justice Department's Office of Intelligence Policy and Review. Moussaoui, a French citizen, is the only person charged as an accomplice in the Sept. 11 attacks. While he was held in August on an immigration charge, FBI agents in Minnesota had sought permission from headquarters to search his laptop computer. Such a specialized warrant requires that the FBI believe Moussaoui was connected to a terrorism organization. ``HQ personnel brought up almost ridiculous questions in their apparent efforts to undermine the probable cause,'' Rowley wrote to the FBI director. ``It's true we all make mistakes, and I'm not suggesting that HQ personnel in question ought to be burned at the stake, but we all need to be held accountable for serious mistakes.'' The FBI has had problems with ``FISA'' warrants even before the Sept. 11 attacks. An April 2000 e-mail from the FBI, disclosed weeks ago under the Freedom of Information Act, described ``a pattern of occurrences which indicate to (the Justice Department) an inability on the part of the FBI to manage its FISAs.'' That e-mail to an FBI assistant general counsel described mistakes by the FBI during an investigation of Osama bin Laden in March 2000, when specialized surveillance software worked improperly. Sent by an agent whose name was blacked out, the e-mail also referred to other, unspecified ``FISA mistakes'' described in another FBI memorandum that has not been released. More recently, in the weeks after Sept. 11, the FBI made widely available within the bureau sensitive information from its requests for such warrants. The move helped investigators share information more easily among themselves. It drew criticism from a federal oversight commission, however, because ``highly classified information has been made available to a range of bureau personnel far broader than those who need to know it.'' The director's office admitted the risk and said it acted to prevent a recurrence. On the Net: FBI: http://www.fbi.gov/ 5557 From: Lists Date: Mon Jun 3, 2002 3:59am Subject: Re: Bomb concealed in a cellphone This is certainly not the first time that a bomb has been placed in a cell phone. The Israelis have been doing it for years. There are several public accounts of kidon teams using cell phones with semtex in them to slot terrs. 5558 From: zack <10-33@c...> Date: Mon Jun 3, 2002 9:13am Subject: Bomb concealed in a cell phone how about this .......... http://www.birdman.org/products/shotcall.htm At 01:14 PM 6/3/2002 +0000, you wrote: > Bomb concealed in a cellphone visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." George W Bush President of the United States of America God Bless The USA .. NEVER forget 9-11-01 http://www.copscops.com/blessusa.htm [Non-text portions of this message have been removed] 5559 From: John McCain Date: Mon Jun 3, 2002 0:08pm Subject: Re: Tek 1502-B Batteries? Last year, we had to replace virutally the entire pack on a 1503. We just bought new higher-capacity nicads that fit and replaced all. The only trick was the interconnects. We were forced to use solder braid instead of wire for interconnects so it would be thin enough to fit in the original packaging. Cheers, JohnM At , you wrote: >My 1502-B batts will no longer hold a charge. Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-352-0350 807 Pioneer Web: http://www.dcbnet.com Champaign, IL. 61820 Email: Jmccain@d... 5560 From: The Dog's Bollix Date: Mon Jun 3, 2002 1:19pm Subject: Strange signal - any ideas While tooling around with my Spec An last night I came across a signal, that appeared to be an FM signal, definitely not from anywhere near where I live, but the strange part (to me)was that it spanned about 6 Mhz in bandwidth and it spread from 548.2 -> 554.05 MHz. Connecting my Alinco to the IF output brought no joy, neither did simply tuning the Alinco to the said frequencies. Ditto for my R-3 (which probavly couldn't have picked it up if the transmitter was built into it) The signal was about twice as strong as the strongest local radio stations. Ten minutes later there was no sign of the signal. And this morning there is no sign of it. Any idea what it might have been? I live in a very rural area not really close to any military bases or anything like that. I do not live on any commercial or common flight paths. Any ideas on how better to identify it if I come across it again? Niall. __________________________________________________ Do You Yahoo!? Yahoo! - Official partner of 2002 FIFA World Cup http://fifaworldcup.yahoo.com 5561 From: James M. Atkinson Date: Mon Jun 3, 2002 4:01pm Subject: Re: Strange signal - any ideas Let's take a look at the most likely culprit. The spectrum between 548 and 554 MHz is allocated at Broadcast Television Channel #27, since you mention a measure bandwidth of 6 MHz I would lean towards it being an HDTV signal If the signal was there previously, but disappeared you may have encountered an HDTV station preparing to bring a transmitter online, and performing initial tune-up. If you post the city and state where you picked up the signal I can lookup the HDTV stations undergoing turn and tune up. Did the signal have a "spike" near the lower edge of the 6 MHz you mention? If so, you caught the ATSC pilot signal. Reference: http://www.tscm.com/dtvwave328.gif I have a tutorial on the subject located at: http://www.tscm.com/TSCM101HDTV.html Yes, it still could be an eavesdropping device... our job is to scientifically prove it isn't. -jma At 11:19 AM -0700 6/3/02, The Dog's Bollix wrote: >While tooling around with my Spec An last night I came > >across a signal, that appeared to be an FM signal, >definitely not from anywhere near where I live, but >the strange part (to me)was that it spanned about 6 >Mhz in bandwidth and it spread from 548.2 -> 554.05 >MHz. Connecting my Alinco to the IF output brought no >joy, neither did simply tuning the Alinco to the said >frequencies. Ditto for my R-3 (which probavly couldn't >have picked it up if the transmitter was built into >it) > >The signal was about twice as strong as the strongest >local radio stations. > >Ten minutes later there was no sign of the signal. And >this morning there is no sign of it. > >Any idea what it might have been? I live in a very >rural area not really close to any military bases or >anything like that. I do not live on any commercial or >common flight paths. > >Any ideas on how better to identify it if I come >across it again? > >Niall. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 5562 From: William Knowles Date: Mon Jun 3, 2002 10:20pm Subject: Snooping on cell-phone calls is no longer for amateurs http://www.philly.com/mld/philly/business/3389603.htm By Martin J. Moylan Knight Ridder News Service June 03, 2002 It's so easy to eavesdrop on many wireless conversations, given how loud some people are when they're talking on their cell phones. But how readily could a snoop listen to both sides of a call? In the late 1980s through the mid-'90s, it was easy: You could simply buy a scanner at Radio Shack. Back then, wireless snoops intercepted calls of Virginia's governor, Douglas Wilder, and the speaker of the U.S. House, Newt Gingrich. An eavesdropper even recorded a spicy cellular chat between a cheating Prince Charles and his lover, Camilla Parker Bowles. Today, with most calls carried on digital networks, nosing in on someone's wireless communications is pretty much the domain of professional spies. It could cost hundreds of thousands of dollars to mount a serious snooping effort against the user of a digital wireless phone, said Michael King, an analyst with Gartner Inc., a technology research firm. "You'd have to have a really good reason for doing it," King said. "Someone would have to be saying something really, really worth knowing." Calls made on the older, analog cell-phone network remain as open as ever to eavesdropping, said Semyon Mizikovsky, a member of Bell Labs' Wireless Security & Fraud Prevention Group. The Federal Communications Commission has banned scanners that intercept the frequencies used by analog cell phones. But old scanners are still out there, and new ones, sold overseas, can be ordered via the Internet. It's much harder, though not impossible, for someone to tap into wireless calls made on digital networks, which now carry an estimated 85 percent of wireless conversations. There's no technical barrier to intercepting digital calls, although the equipment and the act are illegal. "The equipment can be made if you're willing to pay for it," said Jon Peha, associate director of Carnegie Mellon University's Center for Wireless and Broadband Networks. "It's much easier to build a system that eavesdrops on random calls than one that follows someone around. But if you want to spend enough money, that can be done, too." Why would someone bother? Even snippets of conversation can be extremely valuable, said David Yach, vice president of software for wireless company Research in Motion. "If I go to a corporate campus, and sit in a car and intercept phone calls, it's likely that I'd get some interesting information," he said. "People have been cavalier about voice. It'd take some high-profile event to wake people up. If someone had overheard an Enron discussion and made billions shorting the stock, that might have done it." People who might be targeted by snoops could further safeguard their conversations by encrypting their voice calls. But that precaution is rarely taken now, Mizikovsky said. There are no known commercially available systems to intercept the next generation of CDMA communications, said Christopher Carroll, chairman of the committee responsible for the development of third-generation CDMA 2000 encryption and authentication algorithms. CDMA is the technology used by Sprint PCS, Verizon Wireless and Qwest. "It will be difficult for even the best professionals to [snoop] in the future," Carroll said. "But security guys never say never." As companies look to move more data over the wireless carriers' networks, security has become an increasing concern. Indeed, firms seem more concerned about protecting data than voice. "The technology is there to make wireless data secure," said Mike Vergara, director of product marketing for RSA, a firm that supplies encryption technology to phone manufacturers and companies that develop software for the phones. "You can take bits out of the air, but to decrypt them is not economically feasible." So, how could determined snoops try to listen in on the digital communications of choice targets, such as Wall Street traders, Fortune 500 CEOs, or elite R&D scientists? The simplest way would be to get someone within a wireless company to give a snoop the same network access that law-enforcement authorities get when they have a court order for a wiretap. In 2000, federal and state judges approved some 1,190 wiretaps, with 719 applying to cell phones and other portable devices. National security wiretaps are not included in the count. A technically adept snoop could also tinker with a phone so that it intercepts calls meant for other subscribers, Yach said. Dedicated snoops could even set up a pirate cellular tower to intercept calls. But the tower trick would require a wide range of other sophisticated equipment. "This would be extraordinarily difficult - in fact, nearly impossible to do," Mizikovsky said. And there are easier ways for most sleuths to get what they want. They could, for instance, use directional microphones or laser beams to tease a conversation out of windowpane vibrations. Or they could go low-tech, rummaging through bins of paper meant for recycling or just hanging around a targeted person in an airport, restaurant or plane, with ears wide open. "I've heard stories of people being hired just to fly business class on certain routes to hear whatever they can hear," Yach said. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 5563 From: Marcel Date: Tue Jun 4, 2002 4:33am Subject: Wireless Phones To Be Made Secure, by Pentagon Standardsn (dated) $4,000 for a secure cellphone? ================================== Wireless Phones To Be Made Secure, by Pentagon Standards http://www.nationaldefensemagazine.org/article.cfm?Id=572 -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 5564 From: William Knowles Date: Tue Jun 4, 2002 4:44am Subject: Re: Wireless Phones To Be Made Secure, by Pentagon Standardsn (dated) On Tue, 4 Jun 2002, Marcel wrote: > Wireless Phones To Be Made Secure, by Pentagon Standards > http://www.nationaldefensemagazine.org/article.cfm?Id=572 > > $4,000 for a secure cellphone? $4,000 for a secure satellite phone isn't all that bad, and in reality its about $1400 for the Iridium phone and another $2700 for the secure sleeve. Its suprising in this day and age that no one, (that I am aware of) is offering a secure cellphone for anything less than $4500. Out of curiosity, I know that it is fairly simple to listen into one side of Inmarsat calls and faxes, any idea if the same holds true for Iridium phones? Cheers! William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 5565 From: Aimee Farr Date: Mon Jun 3, 2002 4:27pm Subject: RE: FBI Changes Rules on Secret Wiretaps - sounds like a good solution > The change gives FBI agents in the field a final avenue for > appeal Right-of-appeal solutions typically have NOT been shown to protect or encourage dissenters, because of organizational and leadership dynamics. But, here, the cause of the problem is built-in, so it might be the best solution. It was certainly a response of the highest order. > ``HQ personnel brought up almost ridiculous questions in their apparent > efforts to undermine the probable cause,'' Rowley wrote to the > FBI director. It sounds like they could be bordering on making saliency determinations -- not their role is it? The "agent" is a sensor and has an understanding of the situation, whereas "approvers," and "Hqs" have a starkly different evoked set of concerns. That divergence in the interpretation of the same information --- PEARL HARBOR. Decision-makers have high ambiguity tolerance and ALWAYS want more information. They will often hold their decision as long as information is forthcoming. Now, that a river of information is constantly available to them, it might result in the worst decision failure of all: FAILURE TO TAKE ACTION. Today's Washington Post also cites like Hq problems with the military oversight in an age of rapid communication and "oversight transparency." The brass think they have ground truth, but it's a frame and a selection, and one that builds overconfidence for remote decision-makers. It puts decision-makers in a position of incremental analysis. It looks like a clear picture, but because of the way we receive and process information -- decision-makers could find themselves "wandering in the blur" .....unable to perceive change. Some of you might have seen the picture of a man's face that slowly morphs....through a series of exposures....to an image of a crying naked woman. If you are exposed to the first slide in the series, it will take you longer to perceive the change to a woman, than it would a new somebody who came into the problem mid-sequence. We do not perceive gradual change, we retain faith in our interpretation of the initial image through early and continual exposure. We assimilate new information to existing images. Our ideas about "lifting the fog of war," at least in some sensor-contexts, could be a dangerous illusion. Decision-makers, due to self-images of invulnerability and power-motivational biases -- probably won't see it in time. ~Aimee 5566 From: The Dog's Bollix Date: Mon Jun 3, 2002 9:23pm Subject: Re: Strange signal - any ideas That is exactly the signal that I saw. I located the signal in Meansville GA, which is just about as rural as one could ever hope to get. No cell-phone signal, but this HDTV puppy came through loud and clear. Thanks for the heads-up. Niall. --- "James M. Atkinson" wrote: > > Let's take a look at the most likely culprit. > > The spectrum between 548 and 554 MHz is allocated at > Broadcast > Television Channel #27, since you mention a measure > bandwidth of 6 > MHz I would lean towards it being an HDTV signal > > If the signal was there previously, but disappeared > you may have > encountered an HDTV station preparing to bring a > transmitter online, > and performing initial tune-up. If you post the city > and state where > you picked up the signal I can lookup the HDTV > stations undergoing > turn and tune up. > > Did the signal have a "spike" near the lower edge of > the 6 MHz you > mention? If so, you caught the ATSC pilot signal. > Reference: > http://www.tscm.com/dtvwave328.gif > > > > I have a tutorial on the subject located at: > http://www.tscm.com/TSCM101HDTV.html > > Yes, it still could be an eavesdropping device... > our job is to > scientifically prove it isn't. > > -jma > > > > > At 11:19 AM -0700 6/3/02, The Dog's Bollix wrote: > >While tooling around with my Spec An last night I > came > > > >across a signal, that appeared to be an FM signal, > >definitely not from anywhere near where I live, but > >the strange part (to me)was that it spanned about 6 > >Mhz in bandwidth and it spread from 548.2 -> 554.05 > >MHz. Connecting my Alinco to the IF output brought > no > >joy, neither did simply tuning the Alinco to the > said > >frequencies. Ditto for my R-3 (which probavly > couldn't > >have picked it up if the transmitter was built into > >it) > > > >The signal was about twice as strong as the > strongest > >local radio stations. > > > >Ten minutes later there was no sign of the signal. > And > >this morning there is no sign of it. > > > >Any idea what it might have been? I live in a very > >rural area not really close to any military bases > or > >anything like that. I do not live on any commercial > or > >common flight paths. > > > >Any ideas on how better to identify it if I come > >across it again? > > > >Niall. > -- > > -------------------------------------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The > Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site > on the Internet. > -------------------------------------------------------------------------------------------------- > James M. Atkinson Ph: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com > -------------------------------------------------------------------------------------------------- > "...three shall be the number to count, and the > number to be counted shall > be three.....four shall thou not count......five is > right out". - M. Python > > -------------------------------------------------------------------------------------------------- > > [Non-text portions of this message have been > removed] > > __________________________________________________ Do You Yahoo!? Yahoo! - Official partner of 2002 FIFA World Cup http://fifaworldcup.yahoo.com 5567 From: greendots . Date: Mon Jun 3, 2002 11:02pm Subject: Re: Strange signal - any ideas Because it is an FM signal, I would guess it would be TV audio, since I thought their video signals were transmitted in AM. And if it is a UHF-TV station on channel 27, they're out of band. My book says that UHF-27 audio should be on 553.75 Mhz and the video should be on 549.25 Mhz. --- >From: "James M. Atkinson" >To: TSCM-L@yahoogroups.com >Subject: Re: [TSCM-L] Strange signal - any ideas >Date: Mon, 3 Jun 2002 17:01:45 -0400 > >Let's take a look at the most likely culprit. > >The spectrum between 548 and 554 MHz is allocated at Broadcast >Television Channel #27, since you mention a measure bandwidth of 6 >MHz I would lean towards it being an HDTV signal > >If the signal was there previously, but disappeared you may have >encountered an HDTV station preparing to bring a transmitter online, >and performing initial tune-up. If you post the city and state where >you picked up the signal I can lookup the HDTV stations undergoing >turn and tune up. > >Did the signal have a "spike" near the lower edge of the 6 MHz you >mention? If so, you caught the ATSC pilot signal. Reference: >http://www.tscm.com/dtvwave328.gif > > > >I have a tutorial on the subject located at: >http://www.tscm.com/TSCM101HDTV.html > >Yes, it still could be an eavesdropping device... our job is to >scientifically prove it isn't. > >-jma > > > > >At 11:19 AM -0700 6/3/02, The Dog's Bollix wrote: > >While tooling around with my Spec An last night I came > > > >across a signal, that appeared to be an FM signal, > >definitely not from anywhere near where I live, but > >the strange part (to me)was that it spanned about 6 > >Mhz in bandwidth and it spread from 548.2 -> 554.05 > >MHz. Connecting my Alinco to the IF output brought no > >joy, neither did simply tuning the Alinco to the said > >frequencies. Ditto for my R-3 (which probavly couldn't > >have picked it up if the transmitter was built into > >it) > > > >The signal was about twice as strong as the strongest > >local radio stations. > > > >Ten minutes later there was no sign of the signal. And > >this morning there is no sign of it. > > > >Any idea what it might have been? I live in a very > >rural area not really close to any military bases or > >anything like that. I do not live on any commercial or > >common flight paths. > > > >Any ideas on how better to identify it if I come > >across it again? > > > >Niall. >-- > >-------------------------------------------------------------------------------------------------- >The First, The Largest, The Most Popular, and The Most Complete TSCM, >Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. >-------------------------------------------------------------------------------------------------- > James M. Atkinson Ph: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com >-------------------------------------------------------------------------------------------------- >"...three shall be the number to count, and the number to be counted shall >be three.....four shall thou not count......five is right out". - M. Python > >-------------------------------------------------------------------------------------------------- > >[Non-text portions of this message have been removed] > _________________________________________________________________ Join the worldís largest e-mail service with MSN Hotmail. http://www.hotmail.com 5568 From: James M. Atkinson Date: Tue Jun 4, 2002 9:18am Subject: Re: Strange signal - any ideas What you where likely measuring was "WAGATV" near Atlanta, GA. They are trying to bring an HDTV transmitter online on channel 27. But consider it hostile until you prove otherwise. -jma At 7:23 PM -0700 6/3/02, The Dog's Bollix wrote: >That is exactly the signal that I saw. I located the >signal in Meansville GA, which is just about as rural >as one could ever hope to get. No cell-phone signal, >but this HDTV puppy came through loud and clear. > >Thanks for the heads-up. > >Niall. > >--- "James M. Atkinson" wrote: >> >> Let's take a look at the most likely culprit. >> >> The spectrum between 548 and 554 MHz is allocated at >> Broadcast >> Television Channel #27, since you mention a measure >> bandwidth of 6 >> MHz I would lean towards it being an HDTV signal >> >> If the signal was there previously, but disappeared >> you may have >> encountered an HDTV station preparing to bring a >> transmitter online, >> and performing initial tune-up. If you post the city >> and state where >> you picked up the signal I can lookup the HDTV >> stations undergoing >> turn and tune up. >> >> Did the signal have a "spike" near the lower edge of >> the 6 MHz you >> mention? If so, you caught the ATSC pilot signal. >> Reference: >> http://www.tscm.com/dtvwave328.gif >> >> >> >> I have a tutorial on the subject located at: >> http://www.tscm.com/TSCM101HDTV.html >> >> Yes, it still could be an eavesdropping device... >> our job is to >> scientifically prove it isn't. >> >> -jma >> >> >> >> >> At 11:19 AM -0700 6/3/02, The Dog's Bollix wrote: >> >While tooling around with my Spec An last night I >> came >> > >> >across a signal, that appeared to be an FM signal, >> >definitely not from anywhere near where I live, but >> >the strange part (to me)was that it spanned about 6 >> >Mhz in bandwidth and it spread from 548.2 -> 554.05 >> >MHz. Connecting my Alinco to the IF output brought >> no >> >joy, neither did simply tuning the Alinco to the >> said >> >frequencies. Ditto for my R-3 (which probavly >> couldn't >> >have picked it up if the transmitter was built into >> >it) >> > >> >The signal was about twice as strong as the >> strongest >> >local radio stations. >> > >> >Ten minutes later there was no sign of the signal. >> And >> >this morning there is no sign of it. >> > >> >Any idea what it might have been? I live in a very >> >rural area not really close to any military bases >> or >> >anything like that. I do not live on any commercial >> or >> >common flight paths. >> > >> >Any ideas on how better to identify it if I come >> >across it again? >> > >> >Niall. >> -- >> >> >-------------------------------------------------------------------------------------------------- >> The First, The Largest, The Most Popular, and The >> Most Complete TSCM, >> Bug Sweep, Spy Hunting, and Counterintelligence Site >> on the Internet. >> >-------------------------------------------------------------------------------------------------- >> James M. Atkinson Ph: (978) 381-9111 >> Granite Island GroupFax: >> 127 Eastern Avenue #291http://www.tscm.com/ >> Gloucester, MA 01931-8008mailto:jmatk@tscm.com >> >-------------------------------------------------------------------------------------------------- >> "...three shall be the number to count, and the >> number to be counted shall >> be three.....four shall thou not count......five is >> right out". - M. Python >> >> >-------------------------------------------------------------------------------------------------- >> >> [Non-text portions of this message have been >> removed] >> >> > > >__________________________________________________ >Do You Yahoo!? >Yahoo! - Official partner of 2002 FIFA World Cup >http://fifaworldcup.yahoo.com > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5569 From: Marcel Date: Tue Jun 4, 2002 11:05am Subject: Re: Wireless Phones To Be Made Secure, by Pentagon Standardsn(dated) I wonder if Iridbomd is CALEA compliant? William Knowles wrote: > On Tue, 4 Jun 2002, Marcel wrote: > > > Wireless Phones To Be Made Secure, by Pentagon Standards > > http://www.nationaldefensemagazine.org/article.cfm?Id=572 > > > > $4,000 for a secure cellphone? > > $4,000 for a secure satellite phone isn't all that bad, and in reality > its about $1400 for the Iridium phone and another $2700 for the secure > sleeve. > > Its suprising in this day and age that no one, (that I am aware of) is > offering a secure cellphone for anything less than $4500. > > Out of curiosity, I know that it is fairly simple to listen into one > side of Inmarsat calls and faxes, any idea if the same holds true for > Iridium phones? > > Cheers! > > William Knowles > wk@c... > > *==============================================================* > "Communications without intelligence is noise; Intelligence > without communications is irrelevant." Gen Alfred. M. Gray, USMC > ================================================================ > C4I.org - Computer Security, & Intelligence - http://www.c4i.org > *==============================================================* -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 5570 From: James M. Atkinson Date: Tue Jun 4, 2002 0:31pm Subject: New Jersey Fourth-Highest Nationally in State-Authorized Wiretaps New Jersey Fourth-Highest Nationally in State-Authorized Wiretaps Mary P. Gallagher New Jersey Law Journal 06-04-2002 The electronic communications boom has been accompanied by an increase in electronic eavesdropping, and New Jersey is among the nation's top tappers, says a recent report from the Administrative Office of the U.S. Courts. The 99 wiretaps authorized by state judges in New Jersey last year was the fourth-highest of any state, trailing New York's 425, California's 130 and Illinois' 128, but exceeding Pennsylvania's 54, Florida's 51 and Maryland's 49. Nationally, the May 23 report shows a 25 percent increase in wiretaps ordered by federal and state courts during 2001, up to 1,491 from 1,190 the year before. The New Jersey attorney general's office accounts for 26 of the 99 wiretap orders in 2001, with 14 of New Jersey's 21 counties providing the rest. Union County leads the state with 14, followed by Hudson with 12 and Passaic with 11. Surprisingly, no wiretaps are shown for Essex County, which has the largest county prosecutor's office. The state Division of Criminal Justice, however, says Essex reported 12 wiretaps. DRUGS AND GAMBLING Nationally, the war on drugs accounts for the vast majority of wiretaps: 75 percent, or 1,167. The percentage of drug-related bugs has been steadily rising, from 63 percent in 1991 to 72 percent in 2000. The next largest national categories were gambling, 5.5 percent; racketeering, 5 percent; and homicide/assault, 3.5 percent. But in New Jersey, narcotics cases make up less of a swath, accounting for 57 percent of wiretaps. Wiretaps for gambling accounted for 22 percent of the state's total; racketeering, 11 percent; and homicide/assault, 9 percent. All 12 wiretap orders in Hudson County last year were for gambling offenses, while both of Burlington County's were related to homicide/assault. The investigation of the Sept. 11 terrorist attacks was not a factor in the general upswing reflected in the report, which covers warrants issued under Title 18 and excludes warrants issued under the Foreign Intelligence Surveillance Act. The report shows only one wiretap ordered last year in a terrorism matter, a warrant issued by U.S. District Judge William Bassler on Sept. 26. The U.S. Attorney's Office for New Jersey declines to provide details. Most but not all wiretaps covered in the report are of the traditional telephone-bugging variety. They also include interception of electronic communications via computers, faxes and digital pagers, as well as oral intercepts involving microphones and eavesdropping. Nationally, 83 percent of the intercepts carried out in 2001 involved listening devices applied to telephones, including land lines, cell phones and mobile phones; 5 percent were for electronic devices; 3 percent for oral communications; and 4 percent for some type of combination. New Jersey's figures were similar: 91.5 percent wire; 7 percent electronic; and 1.5 percent oral. The most common location for listening devices was "portable device carried by/on individual" -- devices such as cell phones and pagers. The category was only added in 2000. Nationally, 68 percent of wiretappings were installed on portable devices, followed by 14 percent in the home and by smaller numbers for business, roving warrants and combined locations. Reports on 70 wiretap operations in New Jersey last year show 313 resulting arrests and eight convictions thus far. Those results did not come cheaply. The $46,229 average cost for a wiretap in New Jersey was just below the $48,198 national average, but figures vary widely. Morris' single wiretap was the most expensive in the state at $133,627. Seven wiretaps in Cumberland averaged $114,286 apiece. At the other extreme were two in Middlesex for $8,185 each and five in Somerset at $9,934 each. The New Jersey attorney general's office averaged $33,296. The highest price nationally was paid by Maricopa County in Arizona, nearly $1 million for a narcotics wiretap and a homicide/assault wiretap. STAYING ON THE LINE Because the bulk of the cost goes for manpower, the duration of the wiretap accounts for much of the difference in cost. Last year, the longest wiretap lasted 431 days in a New York state narcotics case. The longest federal wiretap was a 300-day wiretap in a New Jersey fraud case. The U.S. Attorney's Office declines to provide specifics. The New Jersey attorney general conducted the most days of wiretapping last year, 468, followed by 360 days for Passaic and 333 for Union. Reports going back to 1997 show New Jersey consistently among the top four states in issuing wiretaps, with 70 in 1997, 84 in 1998, 71 in 1999 and 45 in 2000, though that does not include figures from the state attorney general's office. State-by-state numbers of federally authorized wiretaps were not provided in the 2001 report. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5571 From: James M. Atkinson Date: Tue Jun 4, 2002 0:31pm Subject: FBI May Use Keystroke-Recording Device Without Wiretap Order FBI May Use Keystroke-Recording Device Without Wiretap Order Mary P. Gallagher New Jersey Law Journal 01-02-2002 In a case of first impression, a federal judge ruled Dec. 26 that the Federal Bureau of Investigation did not need a wiretap order to attach a keystroke-recording device to a reputed mobster's computer in order to learn the password to an encrypted file. U.S. District Judge Nicholas Politan in Newark, N.J., also allowed prosecutors to keep secret the specifics of the technology, saying disclosure "would cause identifiable damage to the national security of the United States." Politan denied a motion by lawyers for Nicodemo Scarfo Jr., who was indicted on gambling and loan-sharking charges in June 2000, to suppress the gambling file obtained from his computer. The lawyers argued that the "key-logger system" violated the Fourth Amendment, by collecting more information than needed, and the federal wiretap statute, 18 U.S.C. 2510, by picking up modem transmissions without a wiretap order. Scarfo lawyers Norris Gelman and Vincent Scoca argued that they needed a detailed explanation of the logger technology to determine whether its use was improper. If the logger accessed wire transmissions, the FBI would have needed a wiretap order rather than the search warrants used, they argued. Politan originally seemed receptive. In an Aug. 7 letter opinion, he expressed concern that the FBI might have violated the wiretap statute if the logger picked up keystrokes while the computer modem was operating. He ordered the government to fully explain the device's workings. But prosecutors invoked the 1980 Classified Information Procedures Act, which establishes procedures for handling classified information in criminal cases. They contended that disclosure of the system's specifics would jeopardize ongoing and future criminal investigations and undermine national security. Politan held an in camera hearing on Sept. 26 to review what the opinion described as "top-secret, classified information" about how the logger operates in connection with a modem and how it affects national security. Only those with top-secret security clearance were allowed to attend. On Oct. 2, Politan issued a protective order, finding the classified-information act applied. He sealed the transcript of the Sept. 26 hearing but ordered the government to provide Scarfo's lawyers with an unclassified summary of the logger system, which he said gave them enough information to argue their suppression motion. Politan's opinion last week explains the reasons for his Oct. 2 ruling. "The Congress has spoken through CIPA and determined that certain classified pieces of information implicate national security concerns to such a degree that disclosure ... would seriously compromise United States' national security interests," he wrote. "CIPA strikes a balance between national security interests and a criminal defendant's right to discovery by allowing for a summary which meets the defendant's discovery needs." In rejecting Scarfo's argument that denial of more detailed information about the logger would cripple his defense, Politan wrote that the government's duty to disclose is not absolute and that CIPA creates an exception to that obligation. Politan also ruled that no special wiretap order was needed because the logger intercepted no telephonic communications. He based that finding on FBI evidence that it configured the logger so it would only record keystrokes when the modem was not transmitting. He also spurned the defense lawyers' contention that the warrants were, in effect, impermissible general warrants because they collected more data than necessary to crack the password code. Scoca, a Bloomfield solo practitioner, is troubled by the Sept. 26 closed-door hearing and by the fact that his expert witness was never heard. David Farber, a professor of telecommunications at the University of Pennsylvania, would have testified that it was unclear whether the key logger can distinguish between online and off-line work, Scoca says. Scoca calls it "overkill" for the FBI to use a classified device like the logger in a "run-of-the-mill bookmaking case," like the one against Scarfo, when there are commercially available alternatives that could have broken the password. "If the government's device doesn't encroach on our rights, there is no reason to keep that from the defense," he comments. Gelman, a Philadelphia solo practitioner, thinks the Sept. 11 terrorist attacks influenced Politan's receptiveness to the government's arguments. He points to Politan's referring to the key logger issue as being of "added importance in light of recent events and potential national security implications." "I hope this is not the dawning of a new age where hearings will be conducted in secret," says Gelman. Scoca adds: "Everyone has a heightened awareness of national security as a result of Sept. 11. But we don't want to wake up six months from now and find our civil liberties gone." Scoca says the defense might move for reconsideration of Politan's ruling. Assistant U.S. Attorney Ronald Wigler, who represents the government, did not return a call seeking comment. West Orange, N.J., solo practitioner Richard Roberts, who represents Scarfo's business associate and co-defendant, Frank Paolercio, and who joined in Scarfo's motion, declined comment. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5572 From: James M. Atkinson Date: Tue Jun 4, 2002 0:35pm Subject: Latest Strategy to Drive the Taliban Out of the Mountains of Afghanistan The latest strategy to drive the Taliban out of the mountains of Afghanistan is to send in a team of Redneck Special Forces. Billy Bob, Bubba and Cooter are being sent in with rifles and told three things: 1. The limit is two. 2. The season ended last weekend. 3. They taste just like chicken. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5573 From: Marcel Date: Wed Jun 5, 2002 6:31am Subject: Heightened Telecom Use Prompts Increase In Wiretaps Heightened Telecom Use Prompts Increase In Wiretaps The current boom in electronic communications is being closely mirrored by an increase in electronic eavesdropping, according to a recent report from the Administrative Office of the U.S. Courts. The report identifies New York (425 wiretaps) as the nation's Number One wiretapping state, followed by California (130 wiretaps), Illinois (128 wiretaps), New Jersey (99 wiretaps), Florida (51 wiretaps) and Maryland (49 wiretaps). Nationally, the May 23 report shows a 25 percent increase in wiretaps ordered by federal and state courts during 2001, up to 1,491 from 1,190 the year before. The war on drugs accounts for the vast majority of wiretaps: 75 percent, or 1,167. The percentage of drug-related bugs has been steadily rising, from 63 percent in 1991 to 72 percent in 2000. The next largest national categories were gambling, 5.5 percent; racketeering, 5 percent; and homicide/assault, 3.5 percent. The investigation of the Sept. 11 terrorist attacks was not a factor in the general upswing reflected in the report, which covers warrants issued under Title 18 and excludes warrants issued under the Foreign Intelligence Surveillance Act. 5574 From: T H W Date: Tue Jun 4, 2002 8:33am Subject: Re: Bomb concealed in a cellphone June 03, 2002 Russian media has been reporting that a 23yr old woman had died following the detonation of a bomb that was apparently concealed inside a cellphone. The woman's husband is reported as saying that the cellphone had been purchased at a market near a Moscow subway station and exploded when his wife first switched it on. The deputy prosecutor for the town of Lubertsy, Ramis Sapparov verified to the local RTR television station that the explosion had occurred but refused to say what caused it. Due to the level of sophistication needed to conceal a bomb within a cellphone casing, the domestic security agency are understood to be also investigating the explosion. As said before this is certainly not the first time a cell bomb has been used. However, instances of them being placed in retail for civilians to buy is relatively new. Of course I could be wrong. -Timothy H Woodard Port Security Specialist USCG 5575 From: The Protector Date: Tue Jun 4, 2002 9:09pm Subject: Nextel - Auto Answer Just received this - not verified, but seems reasonable enough knowing the Nextel Phone. I got this today from a DNE agent and thought I would pass it along. Just thought I'd share this incident with you. Maybe I'm just an idiot for not thinking of it but maybe I can save someone else similar problems. We were searching a truck the other day. We found 65 pounds of marijuana in the sleeper. Anyway, as we're continuing our search a Nextel cellular phone started ringing. The phone was in it's holster hanging on the dash. The phone stopped ringing. I figured it either went to voice mail or the caller hung up after not receiving an answer. Later as we were trying to work out a controlled delivery I learned a very valuable lessonconcerning Nextel phones. The caller, who was in the Bronx, and who was the intended destination for the dope, did not hang up when the phone stopped ringing. The phone was set to auto-answer. Basically he heard everything we said while we were searching the inside of the truck. Just goes to show you, you learn something new every day. This could have had disasterous effectsconcerning officer safety at the time of the delivery. For those of younot familiar with Nextel phones, you can access the auto-answer featureby pressing * and then #. Then arrow over until you come to the auto-answer feature. Make sure it is set to off. Please share this with anyone (who needs to know) on your mailing list. ===== Leopold T. Altman III Member IAPPA, ABA, IALEFI, ASLET, etc... American Institute of Executive Protection http://www.americanexecprotection.com. AIEP@s... because chance favours the prepared mind! __________________________________________________ Do You Yahoo!? Yahoo! - Official partner of 2002 FIFA World Cup http://fifaworldcup.yahoo.com 5576 From: Marcel Date: Wed Jun 5, 2002 8:09am Subject: Re: Nextel - Auto Answer Someone else reported the same thing. The Protector wrote: > Just received this - not verified, but seems reasonable enough > knowing the Nextel Phone. > > I got this today from a DNE agent and thought I would pass it along. > > Just thought I'd share this incident with you. Maybe I'm just an > idiot for not thinking of it but maybe I can save someone else > similar > problems. > > We were searching a truck the other day. We found 65 pounds of > marijuana in the sleeper. > > Anyway, as we're continuing our search a Nextel cellular phone > started ringing. The phone was in it's holster hanging on the dash. > The phone stopped ringing. I figured it either went to voice mail or > the caller hung up after not receiving an answer. Later as we were > trying to work out a controlled delivery I learned a very valuable > lessonconcerning Nextel phones. > > The caller, who was in the Bronx, and who was the intended > destination for the dope, did not hang up when the phone stopped > ringing. The phone was set to auto-answer. Basically he heard > everything we said while we were searching the inside of the truck. > Just goes to show you, you learn something new every day. This could > have had disasterous effectsconcerning officer safety at the time of > the delivery. For those of younot familiar with Nextel phones, you > can access the auto-answer featureby pressing * and then #. Then > arrow over until you come to the auto-answer feature. Make sure it is > set to off. Please share this with anyone (who needs to know) on your > mailing list. > > ===== > Leopold T. Altman III > Member IAPPA, ABA, IALEFI, ASLET, etc... > > American Institute of Executive Protection > http://www.americanexecprotection.com. AIEP@s... > because chance favours the prepared mind! > > __________________________________________________ > Do You Yahoo!? > Yahoo! - Official partner of 2002 FIFA World Cup > http://fifaworldcup.yahoo.com > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 5577 From: Marty Kaiser Date: Wed Jun 5, 2002 1:58pm Subject: Fw: It's getting better Subject: It's getting better Check out the latest. http://www.martykaiser.com/fbi1~3.htm Marty [Non-text portions of this message have been removed] 5578 From: Matthew Paulsen Date: Thu Jun 6, 2002 2:06am Subject: epic alert 9.11 link For those that didn't read the latest.. http://www.epic.org/alert/EPIC_Alert_9.11.html posted a watch the watcher link in their zine http://www.observingsurveillance.org/ The pictures quality is better than most. If you are interesting if you like this sort of thing you may wish to waste a minute of webtime on it. if not.. you'll be bored. 5579 From: Marcel Date: Thu Jun 6, 2002 2:16pm Subject: Courts Say It's OK: Peep Away - ASK THE EXPERT - CIO Magazine Jun 1,2002 http://www.cio.com/archive/060102/expert_content.html -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 5580 From: Marcel Date: Thu Jun 6, 2002 2:17pm Subject: Top Secret Phone Debuts For Feds http://www.wirelessweek.com/index.asp?layout=print_page&doc_id=89459 -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 5581 From: greendots . Date: Tue Jun 4, 2002 10:09pm Subject: Re: Strange signal - any ideas Ah, James, you beat me to it. I was going to offer this web site as an answer to who that was on Channel 27. http://100kwatts.tmi.net/tv/DTV.html Actually, that entire web site is absolutely fascinating! I first got the site as www.100000watts.com, but it redirects here: http://100kwatts.tmi.net This site even gives those wonderful details such as transmitter power, and its location in longitude and latitude. Now you can go gaze at those beautiful antenna arrays, and feel your hair stand up from that 100kw (or better) signal. --- >From: "James M. Atkinson" >To: TSCM-L@yahoogroups.com >Subject: Re: [TSCM-L] Strange signal - any ideas >Date: Tue, 4 Jun 2002 10:18:28 -0400 > >What you where likely measuring was "WAGATV" near Atlanta, GA. >They are trying to bring an HDTV transmitter online on channel 27. >But consider it hostile until you prove otherwise. > >-jma > > >At 7:23 PM -0700 6/3/02, The Dog's Bollix wrote: > >That is exactly the signal that I saw. I located the > >signal in Meansville GA, which is just about as rural > >as one could ever hope to get. No cell-phone signal, > >but this HDTV puppy came through loud and clear. > > > >Thanks for the heads-up. > > > >Niall. > > [SNIP!] --- _________________________________________________________________ Join the worldís largest e-mail service with MSN Hotmail. http://www.hotmail.com 5582 From: Kohlenberg, Toby Date: Wed Jun 5, 2002 3:36pm Subject: RE: Grandma 6 Guards 0 So, as satisfying as this is to hear, why is it more acceptable for an 83 year old grandmother (who could be just as much of an extremist as a 20 year old boy) to abuse these guards (even if they deserve it for being stupid) when if I (a 28 year old, 200lbs, 6', white male) did the same thing, I would get the book thrown at me? I think many of the "security measures" we are seeing are rediculous, but the only way to not get caught by false assumptions is to not make them. An 83 year-old grandmother may have decided that she has had a long and satisfying life and is now ready to sacrifice her life to whatever cause she cares about... T > -----Original Message----- > From: William Knowles [mailto:wk@c...] > Sent: Tuesday, May 28, 2002 8:52 PM > To: Hawkspirit > Cc: TSCM > Subject: Re: [TSCM-L] Grandma 6 Guards 0 > > > On Tue, 28 May 2002, Hawkspirit wrote: > > Ruth Gordon and Bud Cort? > > It appears that someone really likes Harold and Maude... > > http://us.imdb.com/Title?0067185 > > This would be really scary if some of the TSA guards names were, Philo > Beddoe, Orville Boggs, Tank Murdock, and Clyde. > > - William > > > > > >Subject: Fwd: Grandma 6 Guards 0 > > >http://www.lewrockwell.com/wallace/wallace42.html > > > > > Grandma Beats Up Airport Security Guards by Bob Wallace > > > > > > >Charges were dropped yesterday against Ruth "Grammy" Gordon, an > > > >83-year-old wheelchair-bound grandmother, who was > originally charged with > > > >assault and battery, and assault with a deadly weapon, because an > > > >altercation she had last week with six airport security > guards, that left > > > >all six hospitalized. > > > > > > > >According to one witness, Bud Cort of Cuyahoga Falls, > Ohio, one guard, "who > > > >weighed about 300 pounds, looked like he was drunk, and > had his shirt out, > > > >told this woman she couldn't board the plane unless they > searched her. He > > > >was really rude. That's when the trouble started." > > > > *==============================================================* > "Communications without intelligence is noise; Intelligence > without communications is irrelevant." Gen Alfred. M. Gray, USMC > ================================================================ > C4I.org - Computer Security, & Intelligence - http://www.c4i.org > *==============================================================* > > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> > Save 30% on Web addresses! Get with the times, get a web > site. Share information, pictures, your hobby, or start a > business. Great names are still available- get yours before > someone else does! > http://us.click.yahoo.com/XmK3jA/nFGEAA/sXBHAA/kgFolB/TM > -------------------------------------------------------------- > -------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > From: Ervin S. Odisho Date: Tue Jun 3, 2003 11:50am Subject: Re: Spam Hi All! Oisin, it depends as well on what operating system you are running. Applying end-user filters individually for each account might be inefficient as, in general terms, the mail server still receives trash and still forwards it to you (but you do not see it as you have it filtered with the app). This client-side spam-blocks do not prevent the spam traffic from coming into your mail server and consume the precious bandwidth. If your mail server is running any unix flavor, it can have a Spam Assassin installed which does the trick quite well. Combined with its internal blacklisting and RBL list filters you can have it configured to rejecte the junk mail right when the spammer attempts to deliver the message to your server. You can check the following URLs for more info: http://www.mirror.ac.uk/sites/spamassassin.taint.org/spamassassin.org/index.html http://www.email-policy.com/Spam-black-lists.htm http://cc.uoregon.edu/cnews/fall2002/spamreport.html Yours truly, Ervin El mar, 03 de 06 de 2003 a las 12:06, TSCM-L@yahoogroups.com escribiÛ: > ________________________________________________________________________ > > Message: 1 > Date: Mon, 2 Jun 2003 09:03:54 -0600 > From: "Scott Malcolm" > Subject: Re: Spam > > Oisin & List, > > I found a handy free Utility Called Mail Wash that works well for me. > Supposedly it's a filter that lets you Delete and Bounce Spam back > to the sender (like any spammer isn't going to munge the header) but > some don't. This filter program is suppose to process and filter before > you download from your ISP. Check it out at: > > http://www.webattack.com/freeware/comm/fwspam.shtml > > http://www.webattack.com/download/dlmailwasher.shtml > > > > Regards, > > Scott Malcolm > Malcolm & Associates, Inc. > Serving the State of Wisconsin > http://www.execpc.com/~conf-pi > Office 262 965 4426 / Fax 262 965 4629 > ____________________________________________________ > > > Message: 1 > > Date: Sat, 31 May 2003 16:18:36 +0100 > > From: "Ocean Group" > > Subject: Spam... > > > > I know this is slightly off-topic and I apologise for that.... > > > > But I reckoned everyone on the list was fairly tech savy! > > > > Can anyone recommend a good anti spam software. I tried using Cloudmarks > > Spamnet and that worked brilliantly, but alas I found out that you had to > > pay a monthly fee if you wanted to keep using it, which I'm not too gone on. > > > > I'd pay a once off price for some software though, can anyone resommend one > > that works? > > > > Cheers > > > > Oisin > > > > > ________________________________________________________________________ > ________________________________________________________________________ > > Message: 2 > Date: Mon, 2 Jun 2003 22:39:24 -0500 (CDT) > From: William Knowles > Subject: Clancy Urges CIOs: Seek Out the 'Smart People' > > http://www.eweek.com/article2/0,3959,1114813,00.asp > > By Dennis Fisher > June 2, 2003 > > WASHINGTON - In a rambling and somewhat odd keynote speech at the > Gartner IT Security Expo here Monday, author Tom Clancy urged the > assembled security specialists and CIOs in the audience to seek out > experts in other fields and apply their knowledge to the IT world. > > "The world is full of smart people, and when you find out what some of > them are doing, you get smarter," Clancy said. "Everyone knows at > least one thing you can learn from them. So go learn." > > Asked where he gets the information on the gadgets and technologies > that populate his novels, Clancy said that it's all out in the open, > and it's simply a matter of legwork and research. In the age of > information, when virtually anything you want to know is a few clicks > away, Clancy said there is no excuse for not finding what you need to > do your job better. > > "There are no secrets in the world. The only hard part is finding the > right person to ask," he said. "If you have a phone, you can find out > anything you want in under 60 minutes. With the Internet, it's even > faster." > > The idea, Clancy said, is to not limit yourself to one subject, to > broaden the scope of your intellectual activity. > > "Fortune favors the prepared mind, as Louis Pasteur said. The best > guys are the ones who can cross disciplines," Clancy said. "The > smartest ones look at other fields and apply them to their own." > > As Clancy veered from subject to subject - touching on issues as > diverse as Bill Clinton, baseball, the charm of Macs, and the relative > levels of corruption in Washington and Hollywood- the Gartner analysts > tasked to moderate his talk tried to steer him back to technology > topics. But they had little luck. > > In what amounted to more of a collection of one-liners and anecdotes > than a speech, Clancy revealed himself to be a master name-dropper and > a man who is perpetually unhappy with the people on Capitol Hill. > > After relating an anecdote about a congressman who dismissed an > expert's objections to a particular technology by saying, "Don't give > that laws of physics stuff," Clancy had this to say: "They don't have > an intelligence test for members of Congress. But I guess that's kind > of obvious." > > After his monologue, two Gartner analysts came on stage and asked > Clancy to sit down with them for a discussion. "I have to sit down, > huh? I'll be on the extreme right," Clancy quipped. > > Among Clancy's other verbal gems: > > * "The one nice thing about being rich and famous is you get to meet > all kinds of interesting people. Actually, you meet all sorts of idiots > too, but you discard them." > > * "An extremist is someone who doesn't agree with you and does so > loudly." > > * "The president of the United States wanted to do away with Fidel > Castro, and he asked the CIA to do it. They of course failed > because they hired the Mafia to do it, and Castro wouldn't sit in > the front seat." > > * "That's why I'm a Mac driver: You don't have to know anything about > computers." > > > > > > *==============================================================* > "Communications without intelligence is noise; Intelligence > without communications is irrelevant." Gen Alfred. M. Gray, USMC > ================================================================ > C4I.org - Computer Security, & Intelligence - http://www.c4i.org > *==============================================================* > > > > > > ________________________________________________________________________ > ________________________________________________________________________ > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > -- Ervin S. Odisho The Activa Link Project (activalink) 7414 From: spysafe2003 Date: Tue Jun 3, 2003 11:41pm Subject: NLJD Wanted, any condition I would like to buy your NLJD. Working or not please. thanks Rob. 7415 From: Graham Lorax Bignell Date: Thu Jun 5, 2003 0:36am Subject: Re: Spam... On Sat, 31 May 2003, Ocean Group wrote: > I know this is slightly off-topic and I apologise for that.... > But I reckoned everyone on the list was fairly tech savy! > Can anyone recommend a good anti spam software. I tried using Cloudmarks > I'd pay a once off price for some software though, can anyone resommend one > that works? This is a late reply because it was filtered into my spam catching directory by SpamAssassin, http://spamassassin.org which I reccomend. Spamassassin is an email filter, my .forward looks like (including "): "|IFS=' ' && exec /usr/local/bin/procmail -f- || exit 75 #user" and my .procmailrc filters according to the headers that spamassasin gloms on to the message. It's free, it works, you must RTFM. It scores messages according to local filters and "bogometer" ratings checked against the Razor2 database. Unconfigured it will probably eliminate 90% of your spam, and will get to 99% with training. It's impossible to escape them all without an exclusive whitelist arrangement. Do check to see which headers you report to the global database before running. ;) The thread was filtered because yahoo groups scores high already and the spam topic pushed it over. I've since added the tscm list to my local permits. --- Graham "Lorax" Bignell - 416 366 9755 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 7416 From: fiber boy Date: Wed Jun 4, 2003 1:03pm Subject: Re: Re: FW: Stupid Security ----- Original Message ----- From: A.Lizard To: TSCM-L@yahoogroups.com Sent: Monday, June 02, 2003 3:12 PM Subject: [TSCM-L] Re: FW: Stupid Security At 10:15 AM 6/2/03 +0000, you wrote: >Message: 2 > Date: Sat, 31 May 2003 23:14:49 -0400 > From: "Thomas Conlon" >Subject: FW: Stupid Security > >Sorry I am not really thinking too clearly as I just did a 10 hour shift >in the rain fixing cars outside. >Also I would like to note that my computer is seriously hacked as in my >control panel won't even open and yes I am a systems administrator by >trade, have been for bout 7-8 years. > >This whole script kiddie thing is becoming a real headache. I just dumped 4 copies of the latest Sobig virus into my "virus-contaminated" mail folder. >I am just wondering where these people meet as it is not on the web or >in yahoo. Ever heard of IRC (Internet Relay Chat)? The most popular Windows client is mIRC. Are you an MCSE by any chance? >I think you really have to delve in the world of those brazen felon >hackers to learn the methods to defend from penetration as I tried >talking to the rep at the Technical Sales seminar about security at the >Windows 2003 server launch and I am just tired of knowing you hit the >right button when people start shutting up (try mentioning wustat or >shatter attack to your Microsoft TAM) thank you and have a pleasant day. > >-tc >syseng@m... If you want to learn network security, start here with this interview with the inventor of nmap: http://interviews.slashdot.org/article.pl?sid=03/05/30/1148235&mode=thread&tid=126&tid=172&tid=95&threshold=1 and *READ THE DISCUSSION*. And go here: The Open Source Security Testing Methodology Manual (OSSTMM) http://www.isecom.org/projects/osstmm.htm I'm not trying to start a religious war here, the answer to "What kind of operating system should I use?" always has to start with "Just what is it are you trying to do?", and that was as true back in the BBS days when the argument was MacIntosh vs Windows as it is now, when the argument is "Microsoft vs whichever flavor of *nix". There are no "one size fits all" solutions. Get a Linux box, much of what you'll be exposed to in learning security are learning about network tools, and most of the interesting ones run on Linux. This will enhance your future career prospects as well. For instance, Microsoft just lost 14,000 seats in Munich. http://theregister.co.uk/content/4/30912.html As you've already found out, there's a big world out there that Microsloth sales presentations just don't cover. You may notice I'm posting this via a Windows app, the other drive of this dual boot box runs Red Hat 9 because I've decided it's time to learn Linux. More to the point, Microsoft isn't exactly the first example that comes to mind when I think about "best practices" in the field of security. However, remember, "security is a process". It isn't just about the tools and technology, it's about end users and business functionality and priorities. While this mailing list doesn't specialize in network security, it's a great place to learn about *the security process*. A.Lizard _________________________________________________________________ Help STOP SPAM with the new MSN 8 and get 2 months FREE* http://join.msn.com/?page=features/junkmail 7417 From: fiber boy Date: Wed Jun 4, 2003 1:05pm Subject: Re: Re: FW: Stupid Security Rather than start a nix war I will end with one word. FreeBSD ----- Original Message ----- From: A.Lizard To: TSCM-L@yahoogroups.com Sent: Monday, June 02, 2003 3:12 PM Subject: [TSCM-L] Re: FW: Stupid Security At 10:15 AM 6/2/03 +0000, you wrote: >Message: 2 > Date: Sat, 31 May 2003 23:14:49 -0400 > From: "Thomas Conlon" >Subject: FW: Stupid Security > >Sorry I am not really thinking too clearly as I just did a 10 hour shift >in the rain fixing cars outside. >Also I would like to note that my computer is seriously hacked as in my >control panel won't even open and yes I am a systems administrator by >trade, have been for bout 7-8 years. > >This whole script kiddie thing is becoming a real headache. I just dumped 4 copies of the latest Sobig virus into my "virus-contaminated" mail folder. >I am just wondering where these people meet as it is not on the web or >in yahoo. Ever heard of IRC (Internet Relay Chat)? The most popular Windows client is mIRC. Are you an MCSE by any chance? >I think you really have to delve in the world of those brazen felon >hackers to learn the methods to defend from penetration as I tried >talking to the rep at the Technical Sales seminar about security at the >Windows 2003 server launch and I am just tired of knowing you hit the >right button when people start shutting up (try mentioning wustat or >shatter attack to your Microsoft TAM) thank you and have a pleasant day. > >-tc >syseng@m... If you want to learn network security, start here with this interview with the inventor of nmap: http://interviews.slashdot.org/article.pl?sid=03/05/30/1148235&mode=thread&tid=126&tid=172&tid=95&threshold=1 and *READ THE DISCUSSION*. And go here: The Open Source Security Testing Methodology Manual (OSSTMM) http://www.isecom.org/projects/osstmm.htm I'm not trying to start a religious war here, the answer to "What kind of operating system should I use?" always has to start with "Just what is it are you trying to do?", and that was as true back in the BBS days when the argument was MacIntosh vs Windows as it is now, when the argument is "Microsoft vs whichever flavor of *nix". There are no "one size fits all" solutions. Get a Linux box, much of what you'll be exposed to in learning security are learning about network tools, and most of the interesting ones run on Linux. This will enhance your future career prospects as well. For instance, Microsoft just lost 14,000 seats in Munich. http://theregister.co.uk/content/4/30912.html As you've already found out, there's a big world out there that Microsloth sales presentations just don't cover. You may notice I'm posting this via a Windows app, the other drive of this dual boot box runs Red Hat 9 because I've decided it's time to learn Linux. More to the point, Microsoft isn't exactly the first example that comes to mind when I think about "best practices" in the field of security. However, remember, "security is a process". It isn't just about the tools and technology, it's about end users and business functionality and priorities. While this mailing list doesn't specialize in network security, it's a great place to learn about *the security process*. A.Lizard _________________________________________________________________ Tired of spam? Get advanced junk mail protection with MSN 8. http://join.msn.com/?page=features/junkmail 7418 From: R. Snyder Date: Tue Jun 3, 2003 3:33pm Subject: HIJACK vulnerabilities of wireless COMSEC devices? Given that COMSEC devices, such as STU-III's, can be compromised by "illuminating" them with appropriate RF, how do wireless COMSEC devices avoid such risks? For example, the Motorola CipherTAC 2000 is a STU-III that attaches to a cel phone, yet the traditional wisdom is that cel phones should not be in the same room with a STU-III. As another example, Harris' SecNet-11 encrypted 802.11b PCMCIA card uses Harris' Sierra crypto chip for strong crypto, yet it sprouts its 2.4 GHz antennae radiating +16 dBm right next to the host laptop PC's main circuit board processing plaintext. How are these incongruities reconciled so as to avert HIJACKers? __________________________________ Do you Yahoo!? Yahoo! Calendar - Free online calendar with sync to Outlook(TM). http://calendar.yahoo.com 7419 From: James M. Atkinson Date: Thu Jun 5, 2003 10:01am Subject: Heroes You will find this interesting and informative. Some people have been a bit offended that Lee Marvin is buried in a grave alongside 3 and 4 star generals at Arlington National Cemetery. His marker gives his name, rank (PVT) and service (USMC). Nothing else. Here's a guy who was only a famous movie star who served his time, why the heck does he rate burial with these guys? Well, following is the amazing answer: I always liked Lee Marvin, but did not know the extent of his Corps experience. In a time when many Hollywood stars served their country in the armed forces, often in rear-echelon posts where they were carefully protected, only to be trotted out to perform for the cameras in war bond promotion. Lee Marvin was a genuine hero. He won the Navy Cross at Iwo Jima. There is only one higher Naval award... the Medal Of Honor. If that is a surprising comment on the true character of the man, he credits his sergeant with an even greater show of bravery. Dialog from The Tonight Show with Johnny Carson: His guest was Lee Marvin. Johnny said, "Lee, I'll bet a lot of people are unaware that you were a Marine in the initial landing at Iwo Jima... and that during the course of that action you earned the Navy Cross and were severely wounded." "Yeah, yeah... I got shot square in the ass and they gave me the Cross for securing a hot spot about halfway up Suribachi... bad thing about getting shot up on a mountain is guys gettin' shot hauling you down. But Johnny, at Iwo I served under the bravest man I ever knew... We both got the Cross the same day, but what he did for his Cross made mine look cheap in comparison. The dumb bastard actually stood up on Red beach and directed his troops to move forward and get the hell off the beach. That Sergeant and I have been lifelong friends. When they brought me off Suribachi we passed the Sergeant and he lit a smoke and passed it to me lying on my belly on the litter and said, 'Where'd they get you Lee?' Well Bob... if you make it home before me, tell Mom to sell the outhouse! Johnny, I'm not lying... Sergeant Keeshan was the bravest man I ever knew.....Bob Keeshan... You and the world know him as Captain Kangaroo." On another note, there was this wimpy little man (who just passed away) on PBS, gentle and quite. Mr. Rogers is another of those you would least suspect of being anything but what he now portrays to our youth. But Mr. Rogers was a U.S. Navy Seal, combat proven in Vietnam with over twenty-five confirmed kills to his name. He wore a long sleeve sweater to cover the many tattoo's on his forearm and biceps. A master in small arms and hand-to-hand combat, able to disarm or kill in a heartbeat. He hid that away and won our hearts with his quiet wit and charm. America's real hero's don't flaunt what they did, they quietly go about their day to day lives, doing what they do best. They earned our respect and the freedom's that we all enjoy. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7420 From: gkeenan Date: Thu Jun 5, 2003 10:40am Subject: Re: Heroes Truer words were never spoken! The real frauds are the talkers. The real heros feel they don't have to prove anything - they already have. I started out in my business as a military researcher by obtaining personnel files on vets for PIs around the country. Over the last 24 months or so this has grown because I know where to find the records (there are over 70 locations around the country where they are kept - they aren't all in St. Louis - and nearly half of the records I obtain are from locations other than St. Louis). But along with this I've been slowly developing a reputation as a fraud-buster as well. I've got 3 phoney SEAL names up on the Wall of Shame right now over the last 10-12 months, and I have a fourth pending (we'll know as soon as I get his records sent to me). I've also busted several Ranger and Green Beret frauds, as well as one 82nd wannabe and helped to bust a wannabe British SAS fraud (I have access to the database (via phone only) at SAS HQ at Hereford, England - the only Yank I know of who does; but there may be others. I just don't know if there are). Also nailed a politician about a year ago claiming to be a 'hero' who served on a blockade ship during the Cuban missile crises in '62. Turned out, though, the Navy had no record of him ever having served (in any of the various possible records locations the Navy maintains, incl. the Records Center in St. Louis), and the ship he claimed to have served on was sold for scrap in '59 - 3 years before the blockade. All of these (and others) have one thing in common - they had some of the greatest war stories you ever heard. I also verified the SEAL service of at least 3 guys in the last year. Their records proved it. But they also had one thing in common - not one of them ever talked about their SEAL service except to fill it in on a resume and/or employment application. None ever made any vocal claims. If they brag about it, that's one of the first 'red flags' of a phoney. Just my $0.02 worth! Cheers! Jerry Keenan ----- Original Message ----- From: James M. Atkinson To: TSCM-L Mailing List Sent: Thursday, June 05, 2003 11:01 AM Subject: [TSCM-L] Heroes You will find this interesting and informative. (snip) America's real hero's don't flaunt what they did, they quietly go about their day to day lives, doing what they do best. They earned our respect and the freedom's that we all enjoy. [Non-text portions of this message have been removed] 7421 From: James M. Atkinson Date: Thu Jun 5, 2003 6:41pm Subject: Re: Heroes The post was actually a message forwarded to me by another list member... I have since found out that there factual inaccuracies in the information, and apologize to the list. -jma At 11:01 AM -0400 6/5/03, James M. Atkinson wrote: >You will find this interesting and informative. > >Some people have been a bit offended that Lee Marvin is buried in a >grave alongside 3 and 4 star generals at Arlington National Cemetery. >His marker gives his name, rank (PVT) and service (USMC). Nothing >else. Here's a guy who was only a famous movie star who served his >time, why the heck does he rate burial with these guys? > >Well, following is the amazing answer: > >I always liked Lee Marvin, but did not know the extent of his Corps >experience. In a time when many Hollywood stars served their country >in the armed forces, often in rear-echelon posts where they were >carefully protected, only to be trotted out to perform for the >cameras in war bond promotion. > >Lee Marvin was a genuine hero. He won the Navy Cross at Iwo Jima. >There is only one higher Naval award... the Medal Of Honor. If that >is a surprising comment on the true character of the man, he credits >his sergeant with an even greater show of bravery. > >Dialog from The Tonight Show with Johnny Carson: His guest was Lee >Marvin. Johnny said, "Lee, I'll bet a lot of people are unaware that >you were a Marine in the initial landing at Iwo Jima... and that >during the course of that action you earned the Navy Cross and were >severely wounded." > >"Yeah, yeah... I got shot square in the ass and they gave me the >Cross for securing a hot spot about halfway up Suribachi... bad thing >about getting shot up on a mountain is guys gettin' shot hauling you >down. But Johnny, at Iwo I served under the bravest man I ever >knew... We both got the Cross the same day, but what he did for his >Cross made mine look cheap in comparison. The dumb bastard actually >stood up on Red beach and directed his troops to move forward and get >the hell off the beach. That Sergeant and I have been lifelong >friends. > >When they brought me off Suribachi we passed the Sergeant and he lit >a smoke and passed it to me lying on my belly on the litter and said, >'Where'd they get you Lee?' Well Bob... if you make it home before >me, tell Mom to sell the outhouse! Johnny, I'm not lying... Sergeant >Keeshan was the bravest man I ever knew.....Bob Keeshan... You and >the world know him as Captain Kangaroo." > >On another note, there was this wimpy little man (who just passed >away) on PBS, gentle and quite. Mr. Rogers is another of those you >would least suspect of being anything but what he now portrays to our >youth. > >But Mr. Rogers was a U.S. Navy Seal, combat proven in Vietnam with >over twenty-five confirmed kills to his name. He wore a long sleeve >sweater to cover the many tattoo's on his forearm and biceps. A >master in small arms and hand-to-hand combat, able to disarm or kill >in a heartbeat. He hid that away and won our hearts with his quiet >wit and charm. > >America's real hero's don't flaunt what they did, they quietly go >about their day to day lives, doing what they do best. They earned >our respect and the freedom's that we all enjoy. > >-- > >-------------------------------------------------------------------------------------------------- >The First, The Largest, The Most Popular, and The Most Complete TSCM, >Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. >-------------------------------------------------------------------------------------------------- > James M. Atkinson Ph: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com >-------------------------------------------------------------------------------------------------- > Vocatus atque non vocatus deus aderit >-------------------------------------------------------------------------------------------------- > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7422 From: gkeenan Date: Thu Jun 5, 2003 7:17pm Subject: Re: Heroes No apologies necessary. I know that story is inaccurate (seen it before). However, Marvin did, in fact, receive the Purple Heart, and for the reason he stated - he got shot in the ass. The thing is, though, he shot HIMSELF in the ass; by accident. And it did happen on Iwo. I remember it like yesterday from when I was stationed in London back in the 70s and Lee Marvin was doing an interview on a BBC TV talk show (in fact, I think it was David Frost - but don't quote me). He came right out and said it. But he never said anything about either the NC or any other award. In fact, since WWII he was actually drawing disability pay from the Navy (Marines) because he had to be sent home from Iwo and his Marine career ended there. Wish I could get a copy of that BBC interview - but it was at least 30 years ago. But I still remember it. He was still drawing disability from the Marines on the day he died. Oh well, Cheers! Jerry ----- Original Message ----- From: James M. Atkinson To: TSCM-L Mailing List Sent: Thursday, June 05, 2003 7:41 PM Subject: Re: [TSCM-L] Heroes The post was actually a message forwarded to me by another list member... I have since found out that there factual inaccuracies in the information, and apologize to the list. -jma At 11:01 AM -0400 6/5/03, James M. Atkinson wrote: >You will find this interesting and informative. > >Some people have been a bit offended that Lee Marvin is buried in a >grave alongside 3 and 4 star generals at Arlington National Cemetery. >His marker gives his name, rank (PVT) and service (USMC). Nothing >else. Here's a guy who was only a famous movie star who served his >time, why the heck does he rate burial with these guys? > >Well, following is the amazing answer: > >I always liked Lee Marvin, but did not know the extent of his Corps >experience. In a time when many Hollywood stars served their country >in the armed forces, often in rear-echelon posts where they were >carefully protected, only to be trotted out to perform for the >cameras in war bond promotion. > >Lee Marvin was a genuine hero. He won the Navy Cross at Iwo Jima. >There is only one higher Naval award... the Medal Of Honor. If that >is a surprising comment on the true character of the man, he credits >his sergeant with an even greater show of bravery. > >Dialog from The Tonight Show with Johnny Carson: His guest was Lee >Marvin. Johnny said, "Lee, I'll bet a lot of people are unaware that >you were a Marine in the initial landing at Iwo Jima... and that >during the course of that action you earned the Navy Cross and were >severely wounded." > >"Yeah, yeah... I got shot square in the ass and they gave me the >Cross for securing a hot spot about halfway up Suribachi... bad thing >about getting shot up on a mountain is guys gettin' shot hauling you >down. But Johnny, at Iwo I served under the bravest man I ever >knew... We both got the Cross the same day, but what he did for his >Cross made mine look cheap in comparison. The dumb bastard actually >stood up on Red beach and directed his troops to move forward and get >the hell off the beach. That Sergeant and I have been lifelong >friends. > >When they brought me off Suribachi we passed the Sergeant and he lit >a smoke and passed it to me lying on my belly on the litter and said, >'Where'd they get you Lee?' Well Bob... if you make it home before >me, tell Mom to sell the outhouse! Johnny, I'm not lying... Sergeant >Keeshan was the bravest man I ever knew.....Bob Keeshan... You and >the world know him as Captain Kangaroo." > >On another note, there was this wimpy little man (who just passed >away) on PBS, gentle and quite. Mr. Rogers is another of those you >would least suspect of being anything but what he now portrays to our >youth. > >But Mr. Rogers was a U.S. Navy Seal, combat proven in Vietnam with >over twenty-five confirmed kills to his name. He wore a long sleeve >sweater to cover the many tattoo's on his forearm and biceps. A >master in small arms and hand-to-hand combat, able to disarm or kill >in a heartbeat. He hid that away and won our hearts with his quiet >wit and charm. > >America's real hero's don't flaunt what they did, they quietly go >about their day to day lives, doing what they do best. They earned >our respect and the freedom's that we all enjoy. > >-- > >-------------------------------------------------------------------------------------------------- >The First, The Largest, The Most Popular, and The Most Complete TSCM, >Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. >-------------------------------------------------------------------------------------------------- > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com >-------------------------------------------------------------------------------------------------- > Vocatus atque non vocatus deus aderit >-------------------------------------------------------------------------------------------------- > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 7423 From: Joe Gomez <1upserv@g...> Date: Thu Jun 5, 2003 4:19pm Subject: joke A farmer goes out one day and buys a brand new stud rooster to copulate with his chickens. The farmer puts the rooster straight in the pen so he can get down to business. The young rooster walks over to the old rooster and says "OK, old fellow, time to retire." The old rooster says, "You can't handle all these chickens....look at what it did to me!" The young rooster replies, "Now, don't give me a hassle about this. Time for the old to step aside and the young to take over, so take a hike." The old rooster says, "Aw, c'mon.....just let me have the two old hens over in the corner. I won't bother you," The young rooster says, "Scram! Beat it! You're washed up! I'm taking over!" So, the old rooster thinks for a minute and then says to the young rooster, "I'll tell you what, young fellow, I'll have a race with you around the farmhouse. Whoever wins the race gets domain of the chicken coop. And if I'm so feeble, why not give me a little head start? The young rooster says, "Sure, why not, you know I'll still beat you," They line up in back of the farmhouse, get a chicken to cluck "Go!" and the old rooster takes off running. About 15 seconds later the young rooster takes off after him. They round the front of the farmhouse and the young rooster is only about 5 inches behind the old rooster and gaining fast. The farmer, sitting on the porch, looks up, sees what's going on, grabs his shotgun and.... BOOM!, he blows the young rooster to KFC heaven. He shakes his head gloomily and says "Son of a b****h...third f**king gay rooster I bought this week!" 7424 From: gkeenan Date: Thu Jun 5, 2003 9:08pm Subject: Fw: Heroes This was sent to me privately by one of the members of this list. I don't know if Jim Atkinson got anything similar, but I'm going public with this because I'm fed up with left-wing liberal ass-holes like this. 'In the respones (only 2) I sent out today on this list concerning "Heroes", both were merely in response to what you might consider even more patriotic stuff than I sent out - and both were sent by the owner/moderator of this list. I didn't even mention anything about 'flag waving' or any other bullshit like that. But right now, I just opened my email and I got this piece of crap from an obviously left-wing, marxist asshole. I served my country, in uniform, for 20 years, followed by an additional 5 years with a Naval intel unit. All of it was in Europe, Middle East and North Africa. I've dodged firefights, I've been on an Irish terrorist group's hit list, as well as a loyalist group's hit list, and yet I'm still here - 25 years after being on those lists. I've been detained in Ulster, Israel, and other places - in addition to ducking for cover. I don't know who this asshole is - but his apparent email address says it all - FREELOADER! Jerry Keenan PO1, USN, Retired ----- Original Message ----- From: fred freeloader To: gkeenan Sent: Thursday, June 05, 2003 9:14 PM Subject: Re: [TSCM-L] Heroes My reply is: If you want to wave the flag go somewhere else. This is the TSCM group not the flag waving faggot private investigator queer group. -------------------------------------------------------------------------------- Do you Yahoo!? Free online calendar with sync to Outlook(TM). [Non-text portions of this message have been removed] 7425 From: gkeenan Date: Thu Jun 5, 2003 10:09pm Subject: Fw: Heroes I should've brought this up before - but I was wondering if the moderator will do something about this person. As you can see, henot only attacked me privately, but he's obviously got a problem with gays, PIs, and most likely anyone who is different from him. He's probably a proponent of racial profiling - but he's got a problem. Lot's of white folk aren't supremacists. Nor are we gay-bashers. But this guy has already all but sworn that he is anti-gay, and probably has a phobia where gays are concerned. So he's border-line basher. Why else would he make such a statment (and yes, I have had formal training in psycology and my major in college was behavioral science). But that doesn't stop me from having a temper and responding with no-holds-barred to this kind of bullshit. I'm Irish/Italian, and that combo has gotten me into trouble more time than I can count - I have the best, and worst, of those two ethnic backgrounds. And that includes temper when someone like this comes out of nowhere - without any obvious quals at all other than to bash gays and PIs - putting all of them in the same barrel. Okay guys, I apologize for the outburst. I'm done. Jerry ----- Original Message ----- From: gkeenan To: TSCM-L@yahoogroups.com Sent: Thursday, June 05, 2003 10:08 PM Subject: Fw: [TSCM-L] Heroes This was sent to me privately by one of the members of this list. I don't know if Jim Atkinson got anything similar, but I'm going public with this because I'm fed up with left-wing liberal ass-holes like this. 'In the respones (only 2) I sent out today on this list concerning "Heroes", both were merely in response to what you might consider even more patriotic stuff than I sent out - and both were sent by the owner/moderator of this list. I didn't even mention anything about 'flag waving' or any other bullshit like that. But right now, I just opened my email and I got this piece of crap from an obviously left-wing, marxist asshole. I served my country, in uniform, for 20 years, followed by an additional 5 years with a Naval intel unit. All of it was in Europe, Middle East and North Africa. I've dodged firefights, I've been on an Irish terrorist group's hit list, as well as a loyalist group's hit list, and yet I'm still here - 25 years after being on those lists. I've been detained in Ulster, Israel, and other places - in addition to ducking for cover. I don't know who this asshole is - but his apparent email address says it all - FREELOADER! Jerry Keenan PO1, USN, Retired ----- Original Message ----- From: fred freeloader To: gkeenan Sent: Thursday, June 05, 2003 9:14 PM Subject: Re: [TSCM-L] Heroes My reply is: If you want to wave the flag go somewhere else. This is the TSCM group not the flag waving faggot private investigator queer group. -------------------------------------------------------------------------------- Do you Yahoo!? Free online calendar with sync to Outlook(TM). [Non-text portions of this message have been removed] Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 7426 From: gkeenan Date: Thu Jun 5, 2003 10:47pm Subject: Re: Fw: Heroes Graham, I've got to figure out how to do this. I'm not very computer literate ;-). In fact, I'm probably around the stone age when it comes to comps! :-). I'll see what I can do, though. Jerry ----- Original Message ----- From: "Graham Lorax Bignell" To: "gkeenan" Cc: Sent: Thursday, June 05, 2003 11:25 PM Subject: Re: Fw: [TSCM-L] Heroes > On Thu, 5 Jun 2003, gkeenan wrote: > > ----- Original Message ----- > > From: fred freeloader > > To: gkeenan > > Sent: Thursday, June 05, 2003 9:14 PM > > Subject: Re: [TSCM-L] Heroes > > Can you post the full header of the message you recieved? > > --- > Graham "Lorax" Bignell - 416 366 9755 > 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 > > 7427 From: gkeenan Date: Thu Jun 5, 2003 10:51pm Subject: Re: Fw: Heroes Hi Graham, Okay, here it goes..... The email address this thing came in from is hoopaloopa2003@y..., with the name "fred freeloader". The below is the full header (I hope!). Jerry Return-Path: Received: from web20501.mail.yahoo.com (web20501.mail.yahoo.com [216.136.226.136]) by mx.suffolk.lib.ny.us (8.12.8/8.12.8) with SMTP id h561EQLG025654 for ; Thu, 5 Jun 2003 21:14:29 -0400 (EDT) Message-ID: <20030606011424.66465.qmail@w...> Received: from [206.176.36.181] by web20501.mail.yahoo.com via HTTP; Thu, 05 Jun 2003 18:14:24 PDT Date: Thu, 5 Jun 2003 18:14:24 -0700 (PDT) From: fred freeloader Subject: Re: [TSCM-L] Heroes To: gkeenan In-Reply-To: <008a01c32bc4$49ea92c0$131af7a5@computer> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="0-1182133621-1054862064=:64532" X-UIDL: lb%"!%e;!!2%C"!OCo"! ----- Original Message ----- From: "Graham Lorax Bignell" To: "gkeenan" Cc: Sent: Thursday, June 05, 2003 11:25 PM Subject: Re: Fw: [TSCM-L] Heroes > On Thu, 5 Jun 2003, gkeenan wrote: > > ----- Original Message ----- > > From: fred freeloader > > To: gkeenan > > Sent: Thursday, June 05, 2003 9:14 PM > > Subject: Re: [TSCM-L] Heroes > > Can you post the full header of the message you recieved? > > --- > Graham "Lorax" Bignell - 416 366 9755 > 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 > > 7428 From: James M. Atkinson Date: Thu Jun 5, 2003 11:08pm Subject: Re: Fw: Heroes It's that crackpot "Negro Dawn" that was trolling the list a few weeks back, and who was banned... this new alias has also been banned (as of just a few minutes ago). -jma At 10:08 PM -0400 6/5/03, gkeenan wrote: >This was sent to me privately by one of the members of this list. I >don't know if Jim Atkinson got anything similar, but I'm going >public with this because I'm fed up with left-wing liberal ass-holes >like this. > >'In the respones (only 2) I sent out today on this list concerning >"Heroes", both were merely in response to what you might consider >even more patriotic stuff than I sent out - and both were sent by >the owner/moderator of this list. I didn't even mention anything >about 'flag waving' or any other bullshit like that. But right now, >I just opened my email and I got this piece of crap from an >obviously left-wing, marxist asshole. > >I served my country, in uniform, for 20 years, followed by an >additional 5 years with a Naval intel unit. All of it was in Europe, >Middle East and North Africa. I've dodged firefights, I've been on >an Irish terrorist group's hit list, as well as a loyalist group's >hit list, and yet I'm still here - 25 years after being on those >lists. I've been detained in Ulster, Israel, and other places - in >addition to ducking for cover. > >I don't know who this asshole is - but his apparent email address >says it all - FREELOADER! > >Jerry Keenan >PO1, USN, Retired > > >----- Original Message ----- >From: fred freeloader >To: gkeenan >Sent: Thursday, June 05, 2003 9:14 PM >Subject: Re: [TSCM-L] Heroes > > > My reply is: If you want to wave the flag go somewhere else. This >is the TSCM group not the flag waving faggot private investigator >queer group. > > >-------------------------------------------------------------------------------- >Do you Yahoo!? >Free online calendar with sync to Outlook(TM). > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7429 From: Graham Lorax Bignell Date: Thu Jun 5, 2003 10:25pm Subject: Re: Fw: Heroes On Thu, 5 Jun 2003, gkeenan wrote: > ----- Original Message ----- > From: fred freeloader > To: gkeenan > Sent: Thursday, June 05, 2003 9:14 PM > Subject: Re: [TSCM-L] Heroes Can you post the full header of the message you recieved? --- Graham "Lorax" Bignell - 416 366 9755 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 7430 From: gkeenan Date: Fri Jun 6, 2003 8:35am Subject: Fw: Fw: Heroes Graham, I sent it to you last night - but here here it is again in case you didn't get it. Jerry ----- Original Message ----- From: "gkeenan" To: "Graham Lorax Bignell" Cc: Sent: Thursday, June 05, 2003 11:51 PM Subject: Re: Fw: [TSCM-L] Heroes > Hi Graham, > > Okay, here it goes..... > > The email address this thing came in from is hoopaloopa2003@y..., with > the name "fred freeloader". > > The below is the full header (I hope!). > > Jerry > > > > Return-Path: > Received: from web20501.mail.yahoo.com (web20501.mail.yahoo.com > [216.136.226.136]) > by mx.suffolk.lib.ny.us (8.12.8/8.12.8) with SMTP id h561EQLG025654 > for ; Thu, 5 Jun 2003 21:14:29 -0400 (EDT) > Message-ID: <20030606011424.66465.qmail@w...> > Received: from [206.176.36.181] by web20501.mail.yahoo.com via HTTP; Thu, 05 > Jun 2003 18:14:24 PDT > Date: Thu, 5 Jun 2003 18:14:24 -0700 (PDT) > From: fred freeloader > Subject: Re: [TSCM-L] Heroes > To: gkeenan > In-Reply-To: <008a01c32bc4$49ea92c0$131af7a5@computer> > MIME-Version: 1.0 > Content-Type: multipart/alternative; > boundary="0-1182133621-1054862064=:64532" > X-UIDL: lb%"!%e;!!2%C"!OCo"! > ----- Original Message ----- > From: "Graham Lorax Bignell" > To: "gkeenan" > Cc: > Sent: Thursday, June 05, 2003 11:25 PM > Subject: Re: Fw: [TSCM-L] Heroes > > > > On Thu, 5 Jun 2003, gkeenan wrote: > > > ----- Original Message ----- > > > From: fred freeloader > > > To: gkeenan > > > Sent: Thursday, June 05, 2003 9:14 PM > > > Subject: Re: [TSCM-L] Heroes > > > > Can you post the full header of the message you recieved? > > > > --- > > Graham "Lorax" Bignell - 416 366 9755 > > 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 > > > > > 7431 From: James M. Atkinson Date: Fri Jun 6, 2003 9:27am Subject: Re: Fw: Fw: Heroes I traced the messages to student accounts at Sioux Falls College and Augustana College in Sioux Falls, SD (same person)--. The crackpot in SD drives a 1990 Ford Ranger pickup -jma At 9:35 AM -0400 6/6/03, gkeenan wrote: >Graham, > >I sent it to you last night - but here here it is again in case you didn't >get it. > >Jerry > >----- Original Message ----- >From: "gkeenan" >To: "Graham Lorax Bignell" >Cc: >Sent: Thursday, June 05, 2003 11:51 PM >Subject: Re: Fw: [TSCM-L] Heroes > > >> Hi Graham, >> >> Okay, here it goes..... >> >> The email address this thing came in from is hoopaloopa2003@y..., >with >> the name "fred freeloader". >> >> The below is the full header (I hope!). >> >> Jerry >> >> >> >> Return-Path: >> Received: from web20501.mail.yahoo.com (web20501.mail.yahoo.com >> [216.136.226.136]) >> by mx.suffolk.lib.ny.us (8.12.8/8.12.8) with SMTP id h561EQLG025654 >> for ; Thu, 5 Jun 2003 21:14:29 -0400 (EDT) >> Message-ID: <20030606011424.66465.qmail@w...> > > Received: from [206.176.36.181] by web20501.mail.yahoo.com via HTTP; Thu, >05 >> Jun 2003 18:14:24 PDT >> Date: Thu, 5 Jun 2003 18:14:24 -0700 (PDT) >> From: fred freeloader >> Subject: Re: [TSCM-L] Heroes >> To: gkeenan >> In-Reply-To: <008a01c32bc4$49ea92c0$131af7a5@computer> >> MIME-Version: 1.0 >> Content-Type: multipart/alternative; >> boundary="0-1182133621-1054862064=:64532" >> X-UIDL: lb%"!%e;!!2%C"!OCo"! >> ----- Original Message ----- >> From: "Graham Lorax Bignell" >> To: "gkeenan" >> Cc: >> Sent: Thursday, June 05, 2003 11:25 PM >> Subject: Re: Fw: [TSCM-L] Heroes >> >> >> > On Thu, 5 Jun 2003, gkeenan wrote: >> > > ----- Original Message ----- >> > > From: fred freeloader >> > > To: gkeenan >> > > Sent: Thursday, June 05, 2003 9:14 PM >> > > Subject: Re: [TSCM-L] Heroes >> > >> > Can you post the full header of the message you recieved? >> > >> > --- >> > Graham "Lorax" Bignell - 416 366 9755 >> > 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 >> > >> > >> > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7432 From: kirk Date: Fri Jun 6, 2003 4:30pm Subject: Hillary is speaking to a 6th grade class about the way the world works. After her speech she opens the floor to questions. A hand goes up. "Yes, young man, what's your name?" "Billy" "And what is your question?" "Actually, I have three questions. First, what happened to your health care plan. Second, why would you consider running for president after your husband shamed the office. Third, what did you do with all that stuff you took from the White House?" Just then the bell rang, and the kids went to recess. After recess, Hillary again asked for questions. A hand went up. "Yes, what's your name?" "Steve." "And what's your question?" "Actually I have 5 questions. First, what happened to your health care plan. Second, why would you consider running for president after your husband shamed the office. Third, what did you do with all that stuff you took from the White House?. Fourth, why did the recess bell ring 20 minutes early? Fifth, what happened to Billy?" -- Kirk Adirim TACTRONIX Tactical Electronics for Critical Missions 468 North Camden Drive Beverly Hills, CA 90210 USA E: kirk@t... T: 323-650-2880 F: 310-388-5886 W: www.tactronix.com -- 7433 From: Steve Uhrig Date: Sat Jun 7, 2003 4:24pm Subject: Excellent telephone resource http://www.epanorama.net/links/telephone.html Good general discussion of telephone systems, from theory to implementation. Single lines, PBX, digital, fax, cordless, FCC, signaling, test equipment, billing. Lots of links, history, projects, more. Everyone should bookmark and scan sometime. This is a major resource for both professional and hobbyist alike. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7434 From: Steve Uhrig Date: Sat Jun 7, 2003 9:08pm Subject: For the hams - new band allocation Channelized HF operation will be new to most. Note bandwidth and ERP limitations. Below from ARRL newsletter. Free subscription info at www.qth.net. ... Steve WA3SWS ==>NEW 60-METER BAND TO BECOME AVAILABLE JULY 3 The new five-channel 60-meter amateur allocation becomes available to US Amateur Radio operators at midnight (12:00 AM) local time on July 3. The local time designation means that amateurs in the US territory of Guam likely will be the first to get a crack at the new band. The new band will be a secondary allocation--federal government users are primary--and the first on which the only permitted mode will be upper-sideband (USB) phone (emission type 2K8J3E). The FCC last month announced it would grant hams access to five discrete 2.8-kHz-wide channels instead of the 150 kHz-wide band ARRL had requested and the FCC initially proposed. The League remains optimistic, however, that Amateur Radio eventually may be able to enjoy a band segment with multiple mode privileges at 60 meters. ARRL CEO David Sumner, K1ZZ, has said that in the meantime hams will have to be on their best behavior when taking advantage of the limited channelized allocation, open to General and higher class licensees. The FCC has granted amateurs center-channel frequencies of 5332, 5348, 5368, 5373 and 5405 kHz--the last channel common to the amateur experimental operation under way in the United Kingdom . To be "on channel," users of 60 meters should set their transmitted carrier frequency 1.5 kHz lower than the channel-center frequency. In terms of day-to-day operation, the new band is expected to resemble the sort of channel sharing typical on local repeaters. ARRL Laboratory Manager Ed Hare, W1RFI, says hams need to be very careful if they're considering modifying their current transceiver or transmitter for 5 MHz. The ARRL advises that members check with the appropriate equipment manufacturers regarding specific modification information. Some modifications not only may void the warranty but could affect or alter a transmitter's operation in unpredictable ways. "Hams need to be sure that any modifications put them right on the desired channel," Hare said. "Most hams are used to just having to think about band edges, so on other bands, if a mod were a bit 'off,' all operators would need to ensure is that they are not transmitting outside the band." Hare recommended that on 5 MHz amateurs remain within "a few tens of Hertz" of suppressed-carrier accuracy. He also pointed out that hams have a mandate not to have any of their signal occupy spectrum outside the assigned 2.8 kHz channels. Noting that high-frequency audio response can vary considerably from radio to radio, Hare has suggested restricting occupied channel audio bandwidth to 2600 Hz, rolling off below 200 Hz on the low end and above 2800 Hz on the high end. Last-minute opposition to the granting of a band segment at 5 MHz came last year from the National Telecommunications and Information Administration (NTIA), which cited the ongoing spectrum requirements of federal government licensees having homeland security responsibilities. The NTIA administers spectrum allocated to the federal government. A compromise between the FCC and the NTIA resulted in the limited, channelized allocation. The NTIA selected the channels the FCC authorized to minimize the possibility of interference to federal government users, and it dictated the use of USB so that federal government users--who also use only USB--could readily identify amateur stations if necessary. The FCC has set maximum power at 50 W ERP and said it would consider a typical half-wave dipole to exhibit no gain. =============== ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7435 From: Date: Sun Jun 8, 2003 10:27pm Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7436 From: Date: Sun Jun 8, 2003 10:27pm Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7437 From: Ocean Group Date: Fri Jun 6, 2003 9:48am Subject: Fw: Heroes Hi Gerry, Just out of curiousity.....since you've made it public.... You say you were USN? How come you were posted in Ireland? Were you on exchange to lean how the British Intell services operated in a hostile country? And what did you do that had you put on the IRA hitlist as well as the UVF? You must have been up to some nasty work.... Oh, and ignore that other fella, every list has it's fair share of wasters. All the best Oisin Ocean Group, Technical Security Division, Ireland. ******************************************* "The real frauds are the talkers. The real heros feel they don't have to prove anything - they already have." ******************************************* 7438 From: George Shaw Date: Sun Jun 8, 2003 0:20pm Subject: RE: For the hams - new band allocation Steve this has been a great success in the UK, though there has been some discussion on the following comment. To be "on channel," users of 60 meters should set their transmitted carrier frequency 1.5 kHz lower than the channel-center frequency. In terms of day-to-day operation, the new band is expected to resemble the sort of channel sharing typical on local repeaters. Ther is a very good active NVIS group at NVIS@yahoogroups.com And a 5MHz discussion group at raynethf@r... -- George Shaw MI3GTO ì Any Sufficiently Advanced Technology is Indistinguishable from Magicî ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... Fax & Voicemail: +44 (0) 871 242 9183 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.488 / Virus Database: 287 - Release Date: 05/06/03 7439 From: gkeenan Date: Tue Jun 10, 2003 10:29pm Subject: Re: Fw: Heroes Oisin, None of the above. From February 1942 through September 1977 the USN maintained a Communications Station in Derry - on the Waterside in Clooney. Also had a public works dept. in Rossdowney. During WWII there were over 5,500 US troops (Navy, Army, Marines) based in Derry. After the war, only about 15 sailors remained at a very small radio station. When the cold war heated up, the radio station was upgraded to a Radio Facility, and finally to a Naval Communications Station with about 200+ Navy personnel stationed there at any given time until it was decommissioned. I was a Radioman (telecommunications specialist) and was stationed there 3 times - 1965-1968, 1969-1970, 1975-1976. The bulk of the personnel there were Radiomen (more than 100) and on my last tour they all worked for me 'cause I was the Leading Petty Officer of the Communications Division, the largest division on the base (as you might guess, given the nature/mission of the base). We had little official interaction with British forces, other than in a NATO setting and virtually no interaction with them concerning the troubles. We did socialize with the troops from time to time 'cause we always ran into them in the town and, of course, the inter/intra-military sporting events. The only really official interaction we ever had was that they were responsible for the outer perimeter security of our base under the NATO agreements and the Status of Forces Agreement (SOFA) with the UK and we would coordinate security operations with them. I was part of this myself on my last tour because I was one of the Officers of the Day and stood duty in that capacity every 6 days. The Command Duty Officer (CDO) was an officer between the ranks of Ensign to Lt. Commander, the Officer of the Day (OOD) was either a Warrant Officer or Chief Petty Officer, and Junior Officers of the Day (JOOD) were First Class Petty Officers. As JOOD my shift was ALWAYS the 2300-0700 shift. Seniority and all that ;-). But duty was actually 24 hours in length. So I ended up many times actually on the hand-held radios coordinating exercises, etc. with the Brits who were patrolling our perimeter. As for the hit list - it's much funnier than it might seem. I was married to a local Derry girl. Got married on my first tour, came back for a second tour, and we split in London. She went home, I decided to give it just one more try (the last of at least half a dozen - hard to maintain when your wife's an alkie with other issues). The Navy let me go back for a 3rd tour to try and work it out, 'cause 3 kids were involved. Well, it fell apart almost immediately and I checked into the barracks. A week later I met one of the new girls who transferred into the base - she was a junior Petty Officer, and a Radioman as well. We started seeing each other and the rest, as they say, is history. But we moved in together and, not being divorced, my wife didn't take kindly to it. She lived in the Creggan so she talked to some of the 'lads'. I got a call at work one day from Martin McGuiness telling me not to worry about it because it would never happen. That's the first I even heard about it! So, after I changed my underwear I went out and met with him (we knew each other and, as you are probably aware, back in '76 he was "allegedly" the OC of the Derry Brigade. But we'd had the occassional pint before this, and he wasn't going to let the boys get involved in a domestic dispute - especially when an Irish-American Catholic was involved. Not to mention my having a very distant family connection to his best friend since childhood, Colm Keenan, who was shot down in a firefight with British troops just 2 years earlier. My wife really didn't have a clue just who I knew, or didn't know. Like I've always said - it's best to be sure before inserting foot in mouth ;-). So it was basically a case of a spurned wife wanting vengence, but going to the very people she never should have gone to, with a contract on her husband who just happened to be an acquaintance of the head of the very organization she wanted to take me out. As for the UVF - I really wasn't on a hit list with them, per se. They just didn't like the Yanks in general because, whether by accident or design, the people the Navy would station at the Derry base were nearly all of Irish Catholic descent. At any given time, about 75% of the base was made up of Irish Americans, most of them Catholics. That sort of aided the UVF, and others, in a kind of propaganda war to prove the US was all but officially backing the republicans and nationalists. Even the majority of the Commanding Officers and Executive Officers during its 35 year history were of Irish descent. Some of the enlisted personnel were actually Irish immigrants, some from the south. A good friend of mine, now retired, is a Derry man, and his wife a Derry girl. We were stationed in London together. He was a Chief Petty Officer and retired after 25 years in the USN. They now live in Virginia Beach, Virginia. I just saw him two years ago at the first reunion of the organization formed by former military and civilian personnel of the base. This org. is only 3 years old and we have 522 members in 5 countries (assuming you count Ulster and UK as separate countries :-)) and I'm the official historian for this organization and am currently putting together research for a book on the history of the US military in Ireland from 1917 - 1977. Even I didn't know, 'til about 18 months ago, that we had troops based in Ireland during the Great War in Cork, Dublin, Galway and other locations. We even had a destroyer squadron based at Queenstown from 1918-1919. But the UVF, and other loyalist groups, didn't like us mostly for that reason. My girlfriend and I (the Navy woman I mentioned, who I've been married to for 26 years last month) lived in a flat over a chip shop on the Waterside - one of the major Protestant strongholds in the City at that time. I had borrowed a friend's car one night and, when I got up the next morning, all four tires had been slashed. It was a '72 Oldsmobile 442. And those tires weren't cheap. Even back then they ran $100.00 apiece. And, as for that other guy - seems he's been on here before, using another name, and Jim A. removed him that time, and banned him, but he changed his name and came back. Not much you can do about that, I guess. But you're right - every list has them. Normally I try to ignore stuff like that. But, as you know, we aren't always able to maintain our cool. There are times when you really aren't in the mood to put up with anyone's BS and you go off. That's what happened to me - although I think was able to control myself to some extent :-). For me, that in itself is an accomplishment. Being 1/2 Irish and 1/2 Italian, controlling my temper isn't one of the things I'll be remembered for :-). Cheers! Jerry ----- Original Message ----- From: Ocean Group To: TSCM Yahoogroup Sent: Friday, June 06, 2003 10:48 AM Subject: [TSCM-L] Fw: Heroes Hi Gerry, Just out of curiousity.....since you've made it public.... You say you were USN? How come you were posted in Ireland? Were you on exchange to lean how the British Intell services operated in a hostile country? And what did you do that had you put on the IRA hitlist as well as the UVF? You must have been up to some nasty work.... Oh, and ignore that other fella, every list has it's fair share of wasters. All the best Oisin Ocean Group, Technical Security Division, Ireland. ******************************************* "The real frauds are the talkers. The real heros feel they don't have to prove anything - they already have." [Non-text portions of this message have been removed] 7440 From: gkeenan Date: Tue Jun 10, 2003 10:30pm Subject: Heros My apologies to the list. That last email should have gone privately to Oisin at Ocean Group but I hit the wrong damned button. Either I'm tired, or I'm old. My money is on both :-). Jerry GPKeenan Co., Int'l Security Services 1005 Celia St. West Islip, NY 11795-2053 (631) 587-4020 (ph) (516) 768-9602 (cell) (530) 323-6832 (Jfax) gkeenan@s... secureops@e... [Non-text portions of this message have been removed] 7441 From: Andrus Aaslaid Date: Wed Jun 11, 2003 3:32am Subject: RE: Heros Quite contrary - thank you for the excellent story! Andrus. > My apologies to the list. That last email should have gone > privately to Oisin at Ocean Group but I hit the wrong damned button. > > Either I'm tired, or I'm old. My money is on both :-). > > Jerry > 7442 From: Scott Leibfried Date: Wed Jun 11, 2003 7:54am Subject: Re: Digest Number 1287 Ladies and Gentlemen, Does anyone out there have any experience regarding the collection of Avantel cellular phones - both the cell phone portion (and particularly) the PTT feature? If any commercial equipment is available I would greatly appreciate any information regarding vendors, specs, capabilities, etc. Thanks!! leibfried@y... --- TSCM-L@yahoogroups.com wrote: > ------------------------ Yahoo! Groups Sponsor > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > ------------------------------------------------------------------------ > > There are 5 messages in this issue. > > Topics in this digest: > > 1. Fw: Heroes > From: "Ocean Group" > 2. RE: For the hams - new band allocation > From: "George Shaw" > 3. Re: Fw: Heroes > From: "gkeenan" > > 4. Heros > From: "gkeenan" > > 5. RE: Heros > From: Andrus Aaslaid > > > > ________________________________________________________________________ > ________________________________________________________________________ > > Message: 1 > Date: Fri, 6 Jun 2003 15:48:56 +0100 > From: "Ocean Group" > Subject: Fw: Heroes > > Hi Gerry, > > Just out of curiousity.....since you've made it > public.... > > You say you were USN? How come you were posted in > Ireland? Were you on > exchange to lean how the British Intell services > operated in a hostile > country? > > And what did you do that had you put on the IRA > hitlist as well as the UVF? > You must have been up to some nasty work.... > > Oh, and ignore that other fella, every list has it's > fair share of wasters. > > All the best > > Oisin > > Ocean Group, > Technical Security Division, > Ireland. > > > ******************************************* > > "The real frauds are the talkers. The real heros > feel they don't have to > prove anything - they already have." > > ******************************************* > > > > > ________________________________________________________________________ > ________________________________________________________________________ > > Message: 2 > Date: Sun, 8 Jun 2003 18:20:15 +0100 > From: "George Shaw" > Subject: RE: For the hams - new band allocation > > Steve this has been a great success in the UK, > though there has been > some discussion on the following comment. > > To be "on channel," users of > 60 meters should set their transmitted carrier > frequency 1.5 kHz > lower than the channel-center frequency. In terms of > day-to-day > operation, the new band is expected to resemble the > sort of channel > sharing typical on local repeaters. > > Ther is a very good active NVIS group at > > NVIS@yahoogroups.com > > And a 5MHz discussion group at > > raynethf@r... > > > > -- > George Shaw MI3GTO > > ì Any Sufficiently Advanced Technology > is Indistinguishable from Magicî > ---Arthur C. Clarke > > Mobile: +44 (0) 7740 361 163 > Email: george.shaw@u... > Fax & Voicemail: +44 (0) 871 242 9183 > > > > --- > Outgoing mail is certified Virus Free. > Checked by AVG anti-virus system > (http://www.grisoft.com). > Version: 6.0.488 / Virus Database: 287 - Release > Date: 05/06/03 > > > > > > ________________________________________________________________________ > ________________________________________________________________________ > > Message: 3 > Date: Tue, 10 Jun 2003 23:29:27 -0400 > From: "gkeenan" > Subject: Re: Fw: Heroes > > Oisin, > > None of the above. > > From February 1942 through September 1977 the USN > maintained a Communications Station in Derry - on > the Waterside in Clooney. Also had a public works > dept. in Rossdowney. During WWII there were over > 5,500 US troops (Navy, Army, Marines) based in > Derry. After the war, only about 15 sailors remained > at a very small radio station. When the cold war > heated up, the radio station was upgraded to a Radio > Facility, and finally to a Naval Communications > Station with about 200+ Navy personnel stationed > there at any given time until it was decommissioned. > > I was a Radioman (telecommunications specialist) and > was stationed there 3 times - 1965-1968, 1969-1970, > 1975-1976. The bulk of the personnel there were > Radiomen (more than 100) and on my last tour they > all worked for me 'cause I was the Leading Petty > Officer of the Communications Division, the largest > division on the base (as you might guess, given the > nature/mission of the base). > > We had little official interaction with British > forces, other than in a NATO setting and virtually > no interaction with them concerning the troubles. We > did socialize with the troops from time to time > 'cause we always ran into them in the town and, of > course, the inter/intra-military sporting events. > The only really official interaction we ever had was > that they were responsible for the outer perimeter > security of our base under the NATO agreements and > the Status of Forces Agreement (SOFA) with the UK > and we would coordinate security operations with > them. I was part of this myself on my last tour > because I was one of the Officers of the Day and > stood duty in that capacity every 6 days. The > Command Duty Officer (CDO) was an officer between > the ranks of Ensign to Lt. Commander, the Officer of > the Day (OOD) was either a Warrant Officer or Chief > Petty Officer, and Junior Officers of the Day (JOOD) > were First Class Petty Officers. As JOOD my shift > was ALWAYS the 2300-0700 shift. Seniority and all > that ;-). > > But duty was actually 24 hours in length. So I ended > up many times actually on the hand-held radios > coordinating === message truncated === From: Andy Grudko Date: Sun Jun 4, 2000 5:08am Subject: Re: Ping Box ----- Original Message ----- > What you have just done is create a TDR for under five bucks (not including a battery). Cool - thanks. Please privately send me your postal address - I'd like to send you 2 books I wrote about 6 years ago which I want to update and I'd value your opinion. There is a reference in there to a similar device. andy@g... Andy Grudko (CEO) Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence - Est 1981 Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 countries (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) www.grudko.com - "When you need it done right -first time"> 543 From: Andy Grudko Date: Sun Jun 4, 2000 5:09am Subject: Re: identifying a hostile xmitter Andy Grudko (CEO) Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence - Est 1981 Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 countries (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) www.grudko.com - "When you need it done right -first time" ----- Original Message ----- From: Andy Grudko To: Sent: Saturday, June 03, 2000 5:46 PM Subject: Re: [TSCM-L] identifying a hostile xmitter > One thing I tell my occasional students is 'beware the obvious'. > > Just 'cos it looks like a TX, if I can't identify it 100% as such on site I > always tell the client 'it looks harmless but I'll test it and get back to > you ASAP'. > > Much better than; 'Oh my God, a bug, I'll get the FBI on it, get a warrant, > then we'll trap them'....then to have to come back and say 'Err, actually it > was a new line carrier switch, I just hadn't seen one before...a bit of an > anti-climax for the client - not that I'm suggesting that this is what > Vangelis hase done. > > Of course there's the shyster's way out (whispered), 'It was the CIA. I'll > put it back and pretend it never happened if you put 10 g into my account at > First Gates Bank'...(joke) > > But if it is a TX you can get back to him and say, 'Wow, you must be > important etc....' > > > On the other side of the coin, in my early days I found loads of 4 wire > black boxes just dangling there on top of phone poles. These were discarded > old polarity selected party line splitters, the size of a big pack of > cigarettes, a moulded black plastic case, with official Telkom stamps and > the bottom sealed in a soft rubber. Every tech. ignores them, even today. > Can you think of a better place to conceal a TX or call diverter? > They still hang, dead, on poles around Johannesburg today, 20 years later. > > When I started TSCM in this country in '81 the most common (and most PIs did > it) taps were; 1) a drop cable from a street pole to a recorder; 2) a series > TX, 80% FM LCO , 20% LBVHF Xtal.; 3) a micro cassette on the top of the pole > or in the DP/cable rack, in that order. So my most important piece of > equipment was my ladder! > > General Bug finding ratio - ladder 4:Scanlock 1 > > In the early 90's I upgraded to Ladder v.2 - the Folder - removing the need > for a van or roof rack on sweeps. > > I once had a controversial police friend call to look at the 'bug' he'd > found in his phone. Some wag had cut a cm. of PC storage tub, filled it > with epoxy, stuck a 1 cm cu. wire 'antenna' in and covered the ends with the > rough side of cigarette pack tinfoil facing out. It really looked cool but > rattled in the receiver - which was the intent. > > On a more serious note, if the way the wires are twisted in the front view > is how it was installed I doubt that the un-tagged red & black are > antennas. Helical polarisation (only 24 db loss if you get it wrong at the > RX - joke). > > Andy Grudko (CEO) > Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & > intelligence - Est 1981 > Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 > countries > (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, > SASFed, > SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS) > www.grudko.com - "When you need it done right -first time" > > > 544 From: Andy Grudko Date: Sun Jun 4, 2000 6:04am Subject: Africa - what? This message was a little delayed in being sent due to ISP problems. ----------- I read Steve Whitehead's message (of last Thursday) about me with interest, a giggle, an ironic smile and sadness - he is the ONLY person I have ever trusted to call in to give a second opinion on a sweep. I have no idea what I said that elicited his aggressive response - I thought I spoke about him in favourable terms although I did not name him or his company. I try to give my posts humour, some local colour and to be topical, soperhaps I said something which he misinterpreted. I have re-read it and am, like Alicia Silverstone, clueless. If I in any way slated him or his company I will publicly apologise on this list as that was never my intent. I hate the petty sniping that goes on on lists, but I cannot ignore Steve's allegations and insinuations in a forum which I respect and enjoy. I have no intention of wasting list members' time defending myself as my 20 year history and reputation are out there for anyone who is interested to confirm. I just have to make 4 comments, firstly on his reference to my spelling of OSCOR as Oscar, a point he judges my professionalism by; Quote> "Actually it is spelled OSCOR. One would expect a professional to actually know the names of the equipment." Those who consider it important will find at least eleven grammatical errors and one spelling mistake in Steve's message. I hope someone else writes his professional reports... secondly; Quote> "Perhaps he should consider to invest in professional equipment like the OSCOR and will be able to see, hear and detect things that are beyond the capabilities of a CPM and Scanlock." Perhaps? Not only did I consider it, but I have Steve's signed quote, at my request, dated 22 May (note that his message was sent about 10 days later), in front of me for the full OSCOR (gotta get that spelling right) for SAR 158 168.16; about US$ 22 595. Alzheimer's perhaps? My recent activity on this list is because I am about to upgrade all my equipment and I have been seeking the comments of the members of this list as I respect the opinions of counter surveillance operators in the field over what suppliers claim in brochures. If Steve enquiries with Harold Marshall he will discover that I was enquiring on Monday about the availability of the latest Scanlock. thirdly; Quote> "(The signal could have been present when he conducted his survey with the CPM, a few nights earlier, if there ever was one. We never got a printout, frequency, signal strength, etc)" I have in my hand Steve's signed 3 page report, dated 10 June 1999, identifying 3 strong signals which were 'manually analysed' and which includes a printout of 245 frequencies ranging from 5.96 to 958.60 Mhz, dB levels from -57.08 to -89.67, file name 08069917.57 obtained on an ECR-2 CSA, MDC - 4 Downconverter & SmartScan software, operator Steve, location Khyalami-Kemptonpark. I think Steve was accompanied by his associate, Lorenzo. This was conducted in the office of the ExCo Chairman of the Khyalami Metropolitan Council, a local government office, after numerous leaks of confidential political information, under the eye of the Manager of Safety & Security. I must admit I did exaggerate about the 'pages of printout' - it was only 1 page. We were entirely satisfied with Steve's service which took over an hour and which I judged as professional and we chatted afterwards about the CS association he had set up. Steve was paid in full for this service on 7 July, our cheque No. 4267, in the amount of R 584.59, about US$ 78.00, including travel - a very reasonable price. and finally; Steve is astonished at the fact that we find devices and implies I should be polygraphed. I would have no objection to being polygraphed next time we find a device, although I do not generally do sweeps myself. We find on average about 2 devices a year, and I have been in the business here for 20 years. We conduct about 50 sweeps a year, so find devices or compelling evidence of previous devices about 4% of the time. In 1995 we found 2 tape recorders on an office's lines - only because we did a thorough search. As a result of this we also found a recorder at the MD's home (he was later tapped again and the buggist was arrested by an alert security guard) and a series transmitter on the home 'phone pole of the CEO of one of the companies they were working closely with. That executive informed his company's security who caught a man changing a tape in the PABX rack. In the resulting police and Telkom investigation it was revealed that, I recall, 15 phones had been tapped or bugged over a 9 month period. I only count that as 4 devices, found in a 2 day period, but I could claim responsibility for all the finds. And no, I didn't put them there. If Steve doubts any of this I will request the client's permission to release his name so that Steve may confirm my statements. If Steve wishes to see my report to the Parliamentary Intelligence Oversight Committee some 6 years ago on alleged inter agency bugging I'm sure I can dig it out of the archives. Chill out Steve and let's have a cold beer at the next PI course (at the April course Steve circulated a copy of a newspaper article I supplied him - Bedfordview & Edenvale News, 15 March 2000, page 2 - about a bug found in the Edenvale local government's CEO's office, our client. So much for his contention that government don't use PIs - they are our biggest client sector, 22% of our 1999 turnover (see 'References' on our web site). Again, I'm sorry to take up bandwidth but I feel I had a right to reply before my peers. I hope this silly matter is closed now. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigations & intelligence - Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia Israel - www.grudko.com. - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 Members of : SCIP (Gauteng Chairman), SACI (President), GIN (Charter), WAD, CALI, SASFed, SASA, SAMLF, UKPIN, AFIO (OS) Prisoners' Rehabilitation & Education Trust --- "When you need it done right - first time" --- 545 From: Andy Grudko Date: Sun Jun 4, 2000 5:18pm Subject: Re: Automated Sweeps ----- Original Message ----- One thing I see in these advertisements is the term "non-technical operators". I guess this means you turn the machine on and sometime later you pick up the results (ie a R.F. spectrum printout). Then I guess someone knowledgeable looks at it later on. > I can only tell you from my 2500+ sweeps that the key skill in his game is waveform pattern recognition and wave analysis. Ah - a kindred spirit. Andy Jo'burg 546 From: Andy Grudko Date: Mon Jun 5, 2000 4:58pm Subject: Re: Africa - what? > This message was a little delayed in being sent due to ISP problems. > > ----------- > > I read Steve Whitehead's message (of last Thursday) about me with interest, > a giggle, an ironic smile and sadness - he is the ONLY person I have ever > trusted to call in to give a second opinion on a sweep. > > I have no idea what I said that elicited his aggressive response - I thought > I spoke about him in favourable terms although I did not name him or his > company. > I try to give my posts humour, some local colour and to be topical, > soperhaps > I said something which he misinterpreted. I have re-read it and am, like > Alicia > Silverstone, clueless. > > If I in any way slated him or his company I will publicly apologise on this > list as that was never my intent. I hate the petty sniping that goes on on > lists, but I cannot ignore Steve's allegations and insinuations in a forum > which I respect and enjoy. > > I have no intention of wasting list members' time defending myself as my 20 > year history and reputation are out there for anyone who is interested to > confirm. I just have to make 4 comments, firstly on his reference to my > spelling of OSCOR as Oscar, a point he judges my professionalism by; > > Quote> "Actually it is spelled OSCOR. One would expect a professional to > actually know the names of the equipment." > > Those who consider it important will find at least eleven grammatical errors > and one spelling mistake in Steve's message. I hope someone else writes his > professional reports... > > secondly; > > Quote> "Perhaps he should consider to invest in professional equipment like > the OSCOR and will be able to see, hear and detect things that are beyond > the capabilities of a CPM and Scanlock." > > Perhaps? Not only did I consider it, but I have Steve's signed quote, at my > request, dated 22 May (note that his message was sent about 10 days later), > in front of me for the full OSCOR (gotta > get that spelling right) for SAR 158 168.16; about US$ 22 595. Alzheimer's > perhaps? > > My recent activity on this list is because I am about to upgrade all my > equipment and I have been seeking the comments of the members of this list > as I respect the opinions of counter surveillance operators in the field > over what suppliers claim in brochures. > > If Steve enquiries with Harold Marshall he will discover that I was > enquiring on Monday about the availability of the latest Scanlock. > > thirdly; > > Quote> "(The signal could have been present when he conducted his survey > with the CPM, a few nights earlier, if there ever was one. We never got a > printout, frequency, signal strength, etc)" > > I have in my hand Steve's signed 3 page report, dated 10 June 1999, > identifying 3 strong signals which were 'manually analysed' and which > includes a printout of 245 frequencies ranging from 5.96 to 958.60 Mhz, dB > levels from -57.08 to -89.67, file name 08069917.57 obtained on an ECR-2 > CSA, MDC - 4 Downconverter & SmartScan software, operator Steve, location > Khyalami-Kemptonpark. I think Steve was accompanied by his associate, > Lorenzo. > > This was conducted in the office of the ExCo Chairman of the Khyalami > Metropolitan Council, a local government office, after numerous leaks of > confidential political information, under the eye of the Manager of Safety & > Security. > > I must admit I did exaggerate about the 'pages of printout' - it was only 1 > page. > > We were entirely satisfied with Steve's service which took over an hour and > which I judged as professional and we chatted afterwards about the CS > association he had set up. > > Steve was paid in full for this service on 7 July, our cheque No. 4267, in > the amount of R 584.59, about US$ 78.00, including travel - a very > reasonable price. > > and finally; > > Steve is astonished at the fact that we find devices and implies I should be > polygraphed. I would have no objection to being polygraphed next time we > find a device, although I do not generally do sweeps myself. We find on > average about 2 devices a year, and I have been in the business here for 20 > years. We conduct about 50 sweeps a year, so find devices or compelling > evidence of previous devices about 4% of the time. > > In 1995 we found 2 tape recorders on an office's lines - only because we did > a thorough search. As a result of this we also found a recorder at the MD's > home (he was later tapped again and the buggist was arrested by an alert > security guard) and a series transmitter on the home 'phone pole of the CEO > of one of the companies they were working closely with. That executive > informed his company's security who caught a man changing a tape in the PABX > rack. In the resulting police and Telkom investigation it was revealed that, > I recall, 15 phones had been tapped or bugged over a 9 month period. I only > count that as 4 devices, found in a 2 day period, but I could claim > responsibility for all the finds. And no, I didn't put them there. > > If Steve doubts any of this I will request the client's permission to > release his name so that Steve may confirm my statements. If Steve wishes to > see my report to the Parliamentary Intelligence Oversight Committee some 6 > years ago on alleged inter agency bugging I'm sure I can dig it out of the > archives. > > Chill out Steve and let's have a cold beer at the next PI course (at the > April course Steve circulated a copy of a newspaper article I supplied him - > Bedfordview & Edenvale News, 15 March 2000, page 2 - about a bug found in > the Edenvale local government's CEO's office, our client. So much for his > contention that government don't use PIs - they are our biggest client > sector, 22% of our 1999 turnover (see 'References' on our web site). > > Again, I'm sorry to take up bandwidth but I feel I had a right to reply > before my peers. I hope this silly matter is closed now. > > Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime > investigations & intelligence - Johannesburg - Cape Town - Durban - > Pretoria - UK - US - Canada - Australia > Israel - www.grudko.com. - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 > Members of : SCIP (Gauteng Chairman), SACI (President), GIN (Charter), WAD, > CALI, SASFed, SASA, SAMLF, UKPIN, AFIO (OS) Prisoners' Rehabilitation & > Education Trust --- "When you need it done right - first time" --- > > 547 From: WFR Date: Mon Jun 5, 2000 5:28pm Subject: TSCM list I have not recieved anything for a couple of days from this list. Is it experiencing difficulties? Thanks, Bill Rust Desperate Measures, Inc. [Non-text portions of this message have been removed] 548 From: Andy Grudko Date: Tue Jun 6, 2000 0:08pm Subject: Re: [CovertSurveillance] quick question ----- Original Message ----- > I have two different wireless setups, and for some reason the power supplies > are not like the other ones of the same package. > One of them is the > 15V 300ma > and the other is > 9V 500ma Simple rule of thumb - use the lowest VOLTAGE supply first. Potential amperage depends on the current requirements of the device at the other end and does not 'threaten' the equipment...you cannot supply too many amps as a circuit only draws what it needs. Plug a 9 v device into 15 v and there might be a burning smell. Bad. Plug a 15 v device into 9 v and.......probably not much will happen. No problem Simple logic + Ohm's law. V x A = power. Usually a portable audio RX uses less power than an the TX, but video can be the other way round (audio is about 1/900 the bandwidth, hence power, of video). 15v x .3a =5 watts, probably the RX (close enough to the standard 13.8 V vehicle charge system and a monitoring system) 9v x .5a = 4.5 watts, probably the TX (9v is a conveinient battery to use in a TX setup) but a small battery won't last long, rather get it on the mains. Andy Grudko (CEO) Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence - Est 1981 Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 countries (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS), IWWL, PRETrust www.grudko.com - "When you need it done right -first time" 549 From: Andy Grudko Date: Tue Jun 6, 2000 0:34pm Subject: Equipment Thank you friends & colligues I have pretty well decided on my next equipment ugrade. I would appriciate some private eMails re. training a former 'linesman' type techie up to current TSCM levels. Andy Grudko (CEO) Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence - Est 1981 Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 countries (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS), IWWL, PRETrust www.grudko.com - "When you need it done right -first time" 550 From: Steve Uhrig Date: Tue Jun 6, 2000 3:39pm Subject: RTFM Once upon a midnight dreary, Executive Security International, Ltd. pondered, weak and weary: > Please take us off your mailing list... your clogging our mailbox > with junk mail that we do not need. This is a business account > and we need to keep it free of junk mail so that we can service > our own mail. Read the green underlined sentence at the top of this message for instructions on how to unsubscribe. Appararently basic reading skills are not taught at your facility, nor are the employees required to know how to read. Really inspires confidence. As to this list being junk mail, there are people on this list who have been sweeping longer than your facility has been in existence. Considering your facility purportes to teach TSCM, a Rather than being junk mail, a more appropriate attitude would be to glean what information you could from the list and use your DELETE key on the rest. 551 From: Agent_X Date: Tue Jun 6, 2000 11:00am Subject: Re: Internet Security Resources-DELETE IF YOU SEEN THIS B4! At 8:50 AM -0400 6/6/00, Mike F wrote: >Canregie Mellon University has XXX-cell-ant Resource page for Security >concerning computers & the internet. >Certís Resource Page for Internet Security >http://www.cert.org/nav/other_sources.html > >PS-Please don't forget check there main page at cert.org. A even better source for info is the bugtraq mailing list hosted at http://www.securityfocus.com/. More constant updates and less academic IMHO. -- Agent X PGP Keys available by request. PGP Fingerprint (6.5.2) : 1953 A923 9B1F C710 5C94 AE05 E0BA F51F E9B6 AD85 PGP Fingerprint (2.6.2): 8C 9A BE D5 41 3F 96 C8 D2 8C 1D B1 5F 59 55 FF 552 From: Date: Tue Jun 6, 2000 0:13pm Subject: Fwd: Jewelry Tracking Device? This is a courtesy re-post//pls reply to the questioner... [Non-text portions of this message have been removed] 553 From: James M. Atkinson, Comm-Eng Date: Wed Jun 7, 2000 2:00am Subject: I N S T R U C T I O N S F O R L I F E 1. Take into account that great love and great achievements involve great risk. 2. When you lose, don't lose the lesson. 3. Follow the three R'S: Respect for self Respect for others and Responsibility for all your actions. 4. Remember that not getting what you want is sometimes a wonderful stroke of luck. 5. Learn the rules so you know how to break them properly. 6. Don't let a little dispute injure a great friendship. 7. When you realize you've made a mistake, take immediate \ steps to correct it. 8. Spend some time alone every day. 9. Open your arms to change, but don't let go of your values. 10. Remember that silence is sometimes the best answer. 11. Live a good, honorable life. Then when you get older and think back, you'll be able to enjoy it a second time. 12. In disagreements with loved ones, deal only with the current situation. Don't bring up the past. 14. Share your knowledge. It's a way to achieve immortality. 15. Be gentle with the earth. 16. Once a year, go someplace you've never been before. 17. Remember that the best relationship is one in which your love for each other exceeds your need for each other. 18. Judge your success by what you had to give up in order to get it. 19. Approach love and cooking with reckless abandon. =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 554 From: Date: Wed Jun 7, 2000 1:57am Subject: Re: Mindless Moaning and Bitching In a message dated 6/6/00 11:40:06 PM Pacific Daylight Time, jmatk@tscm.com writes: << I will be revoking your posting privileges on the list. It always helps when you read the instructions, -jma >> Thank you, Jim That's why you get the big money! M. 555 From: David Miller Date: Wed Jun 7, 2000 7:22am Subject: RE: Equipment I would like to see those training recommendations as well. Please either email me privately or post then to the list. Thanks -----Original Message----- From: Andy Grudko [mailto:agrudko@m...] Sent:Tuesday, June 06, 2000 12:34 PM To:TSCM-L@egroups.com Subject:[TSCM-L] Equipment Thank you friends & colligues I have pretty well decided on my next equipment ugrade. I would appriciate some private eMails re. training a former 'linesman' type techie up to current TSCM levels. Andy Grudko (CEO) Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence - Est 1981 Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 countries (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS), IWWL, PRETrust www.grudko.com - "When you need it done right -first time" ------------------------------------------------------------------------ Free @Backup service! Click here for your free trial of @Backup. @Backup is the most convenient way to securely protect and access your files online. Try it now and receive 300 MyPoints. http://click.egroups.com/1/4935/1/_/507420/_/960360887/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 556 From: Mike F Date: Wed Jun 7, 2000 7:27am Subject: Microsoft security list-DELETE IF U SEEN THIS B4. DELETE NOW!!!! Here is the address of Microsofts Security annnouncement. It will tell you the problems discovered and the Fixes for problem if available. Send email to address below, you will receive a response email asking you to verify request. When you get the response email You hit reply button put in the word """ ok """ without quotes in message body. email address is in between lines of equal signs. ============================================================================ ================== microsoft_security-subscribe-request@a... ============================================================================ ================== L8R4,Mike F. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 557 From: Mike F Date: Wed Jun 7, 2000 8:40am Subject: RE: Equipment If the training Recommendations are not posted on the List. Please email them to me privately. Thank You for your time & attention. later4,mike f I would like to see those training recommendations as well. Please either email me privately or post then to the list. Thanks -----Original Message----- From: Andy Grudko [mailto:agrudko@m...] Sent:Tuesday, June 06, 2000 12:34 PM To:TSCM-L@egroups.com Subject:[TSCM-L] Equipment Thank you friends & colligues I have pretty well decided on my next equipment ugrade. I would appriciate some private eMails re. training a former 'linesman' type techie up to current TSCM levels. Andy Grudko (CEO) Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence - Est 1981 Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 countries (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS), IWWL, PRETrust www.grudko.com - "When you need it done right -first time" ------------------------------------------------------------------------ Free @Backup service! Click here for your free trial of @Backup. @Backup is the most convenient way to securely protect and access your files online. Try it now and receive 300 MyPoints. http://click.egroups.com/1/4935/1/_/507420/_/960360887/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] ------------------------------------------------------------------------ Take your development to new heights. Work with clients like Dell and pcOrder. Submit your resume to jobs@l.... Visit us at http://click.egroups.com/1/4358/1/_/507420/_/960380322/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 558 From: Mike F Date: Wed Jun 7, 2000 9:08am Subject: SECURITY FREEWARE nonags ...-DELETE IF U SEEN THIS B4. DELETE NOW!!!! This is NONAGS Security FREEware list of Programs for downloading. This site is located in NY, to find a NONAG site closer to where you live see below. http://computers.rochester.rr.com/nonags/security.html You can got to "" nonags.com/amer.html """ to find a location closer to where you live. Here are some of the locations at above site: Alabama California Florida Georgia Kentucky Massachusetts Nevada New Jersey New York Ohio Oklahoma Brazil Canada When you get place you chose from list, on left hand side under "FREEWARE" click on Browse. Then click on security, then you will be on page that lists Security Software,hopefully the connections for downloading will be Faster. L8R4,Mike F. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 559 From: Date: Wed Jun 7, 2000 9:58am Subject: Equipment As Adrian Hickey is overseas, I will reply for him. Itís certainly the first time we have been criticised for making something simple to use. Itís often useful to use the car analogy. If (say) Jaguar brought out a new, high performance sports car, they could advertise it as ëOnly suitable for Formula 1 racing driversí, they might sell one or two and there is no doubt the skill of the drivers and the performance of that custom model would be difficult to beat. It is unlikely however that the Ford bean-counters would fund this Jaguar development because although it would be interesting and fun for the design engineers, commercially it would be complete and utter nonsense. An alternative might be to design a raw, high performance car which would attract the professional, allow him to do power slides etc., but with the flick of a switch bring in anti-lock braking systems, traction control, power steering and speed limiters, so Californian blondes can drive to the health club. The maths is simple; there are more blondes than F1 drivers. How about the slogan? ëTry the new Scanlock M2, designed for Formula One Sweepers, but with blondes in mindí. Returning to TSCM, it is our experience that more and more medium to large Companies require a sweeping facility in-house. They are happy with their contract sweep experts who visit one or more times annually and carry out deep sweeps, but contractors cannot be on-site permanently. We try to encourage companies to form a ëTSCM Groupí perhaps the Security Manager, Building Comms Engineer and an IT rep. Such a trio should know the layout of the building and its cabling structure and should be capable of assessing the likely threats to key areas. We would then show them lots of different bugs at our training facility, and demonstrate common deployment techniques and train them in the use of their chosen TSCM equipment. Apologies, I am trying to make a point without overtly promoting our product. Roger Tolces is close, with new Scanlock M2 you have the ability to collect and overlay your in-house spectral scans and compare differences, if in doubt use the attached laptop to email the result to your TSCM expert for comment, he will even be able to control the receiver on-line. Sweep teams cannot be omnipresent and itís the sweep experts who approached us for a solution to ensure their customerís security was ongoing. This was presented to us as: regular deep sweeps and tamperproof seals to phones and outlets within key areas; upgrade physical security, control access and supply effective, compatible TSCM equipment and training for in-house use. (I prÈcis, the document was a 30-page proposal). As Audiotel's Adrian Hickey said earlier, we listen and try to give the industry what it wants. As you will have guessed from my earlier ramblings, I enjoy cars and driving, maybe its because itís a lot like sweeping: You have to learn the Highway Code You must know how to drive your equipment When you begin youíre a danger to others You learn with experience Everybody thinks they can drive better than you can Criticise other drivers at your peril Driving a flashy car does not bestow navigational skills upon you Volvo drivers believe they own the road (does this translate to USA?) You donít argue with 16 wheelers Everybody knows a quicker/better route than you And remember, an inexperienced driver in a Beetle might come out top on a road he drives every day compared to a ëexpertí in a Ferrari driving it for the first time. I know Iím going to regret thisÖÖÖÖÖÖÖÖÖÖ any others? Nothing I have said should be construed as criticism of The Ford Motor Company, Jaguar Cars, and blondes. I have had and will continue to have fun with all three during my life. Ray Summers Commercial Director Audiotel International 560 From: Steve Uhrig Date: Wed Jun 7, 2000 8:32am Subject: NSA to partially privatize NSA to Hand Non-Spy Technology to Private Firms WASHINGTON (Reuters) - The U.S. National Security Agency will turn over to private industry the development and management of most of its nonclassified information technology in a single, 10-year contract valued at up to $5 billion to the winning bidder, The Washington Post reported Wednesday. The Post said NSA Director Lt. Gen. Michael Hayden called the initiative "unprecedented" at an agency that has historically kept most of its technology development in-house. Hayden told the paper in an interview the contract would free NSA management to focus on retooling critical spy technologies that are increasingly threatened by fiber-optic cable, digital cell phones, encryption and the Internet. "It narrows our front and allows us to focus the energies of the agency on the things that only the agency can do," it quoted him as saying. NSA officials said the initiative, dubbed "Project Groundbreaker," could save the government as much as $1 billion over the 10-year term of the contract and provide much faster modernization of the agency's desktop computers, servers, computer networks and telecommunication systems. Once in place, the contract would eliminate the jobs of 1,200 to 1,500 NSA employees and an additional 800 contractors. However, all NSA employees affected by the change will be guaranteed jobs by the winning bidder, the Post reported. The Post said three private-sector consortiums led by major U.S. corporations have been assembled to bid on the contract, but officials declined to name consortium members. The bids are due in late November and the contract is scheduled to be awarded in April 2001. ### ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 561 From: Grant Bayley Date: Wed Jun 7, 2000 9:35am Subject: Speaking of security etc software Hi all, Speaking of security-related software (but mostly with a Unix-emphasis rather than a Windows one), people might like to check out the Wiretapped mirror that we (2600 Australia et al) host in Australia: http://www.wiretapped.net ftp://ftp.wiretapped.net/pub/security/ To a certain degree the site assumes you have some idea of what you're after to begin with and is really designed as an Australian mirror of software and information, we're hosted on a good backbone that offers decent speed to US and European visitors. The emphasis on the site is on open source software and on having only the best. With regards to operating systems, we're currently hosting OpenBSD and Trustix, we're also hosting tools such as lsof, nmap, nessus, tcpdump/libpcap, libnet, snort, ssh versions for almost every operating system out there and a decent slab more. We'll eventually get around to indexing everything for those that don't know exactly what they're after, but the directories alone should give some idea of what each thing does. Overall, the archive aims to put alot of similarly purposed and similarly well-written software in the one place, something that's not readily been done before as far as we're aware. Hope people find this information useful, Grant (aka Dogcow) Wiretapped Archives Guy ------------------------------------------------------- Grant Bayley gbayley@a... -IT Manager @ Batey Kazoo (www.kazoo.com.au) -Admin @ AusMac Archive, Wiretapped.net, 2600 Australia www.ausmac.net www.wiretapped.net www.2600.org.au ------------------------------------------------------- 562 From: Date: Wed Jun 7, 2000 6:09am Subject: Re: Equipment In a message dated 6/7/00 7:57:45 AM Pacific Daylight Time, Adrian@a... writes: << And remember, an inexperienced driver in a Beetle might come out top on a road he drives every day compared to a ‚Äòexpert‚Äô in a Ferrari driving it for the first time. I know I‚Äôm going to regret this‚Ķ any others? >> Owns a Jaguar XK8, a Radio Shack 64-1950 and used to own quite a few Scanlocks. They never let me down. Michael 563 From: James M. Atkinson, Comm-Eng Date: Wed Jun 7, 2000 10:12am Subject: Technical Support Tech Support I had been doing Tech Support for Hewlett Packard's DeskJet division for about a month when I had a customer call with a problem I just couldn't solve. She could not print yellow. All the other colors would print fine, which truly baffled me because the only true colors are cyan, magenta, and yellow. For instance, green is a combination of cyan and yellow, but green printed fine. Every color of the rainbow printed fine except for yellow. I had the customer change ink cartridges. I had the customer delete and reinstall the drivers. Nothing worked. I asked my co-workers for help; they offered no new ideas. After over two hours of troubleshooting, I was about to tell the customer to send the printer in to us for repair when she asked quietly, "Should I try printing on a piece of white paper instead of this "yellow" construction paper?" ******************* A man attempting to set up his new printer called the printer's tech support number, complaining about the error message: "Can't find the printer." On the phone, the man said he even held the printer up in front of the screen, but the computer still couldn't find it! (YEE-HAW!) ***************** Customer: "Hello? I'm trying to dial in. I installed the software okay, and it dialed fine. I could hear that. Then I could hear the two computers connecting. But then the sound all stopped, so I picked up the phone to see if they were still connected, and I got the message, 'No Carrier,' on my screen. What's wrong?" ***************** An unfailingly polite lady called to ask for help with a Windows installation that had gone terribly wrong. Customer: "I brought my Windows disks from work to install them on my home computer." (Training stresses that we are "not the Software Police," so I let the little act of piracy slide.) Tech Support: "Umm-hmm. What happened?" Customer: "As I put each disk in it turns out they weren't initialized." Tech Support: "Do you remember the message exactly, ma'am?" Customer:(proudly) "I wrote it down. 'This is not a Macintosh disk. Would you like to initialize it'?" Tech Support: "Er, what happened next?" Customer: "After they were initialized all the disks appeared to be blank. And now I brought them back to work, and I can't read them in the A: drive; the PC wants to format them. And this is our only set of Windows disks for the whole office. Did I do something wrong?" ****************** For a computer programming class, I sat directly across from someone, and our computers were facing away from each other. A few minutes into the class, she got up to leave the room. I reached between our computers and switched the inputs for the keyboards. She came back and started typing and immediately got a distressed look on her face. She called the teacher over and explained that no matter what she typed, nothing would happen. The teacher tried everything. By this time I was hiding behind my monitor and quaking red-faced. I started to type, "Leave me alone!" They both jumped back, silenced. "What the . . . " the teacher said. I typed, "I said leave me alone!" The kid got real upset. "I didn't do anything to it, I swear!" It was all I could do to keep from laughing out loud. The conversation between them and HAL 2000 went on for an amazing five minutes. Me: "Don't touch me!" Her: "I'm sorry, I didn't mean to hit your keys that hard." Me: "Who do you think you are anyway?!" Etc. Finally, I couldn't contain myself any longer and fell out of my chair laughing. After they had realized what I had done, they both turned beet red. Funny, I never got more than a C- in that class. *************** I have a friend who just bought a computer and was instructed to load a program by typing "A:" and then the name of the program. My friend told me it would not work because his keyboard was no good. He said he couldn't type the "dot over dot thingie" and that every time he tried to type the "dot over dot thingie" he kept getting the "dot over comma thingie" no matter how careful he was to press only on the very top of the key. When I taught him about the shift key, he thought I was a genius. ***************** This guy calls in to complain that he gets an "Access Denied" message every time he logs in. It turned out he was typing his user name and password in capital letters. Tech Support: "OK, let's try once more, but use lower case letters." Customer: "Uh, I only have capital letters on my keyboard." **************** Email from a friend: "CanYouFixTheSpaceBarOnMyKeyboard?" **************** My friend was on duty in the main lab on a quiet afternoon. He noticed a young woman sitting in front of one of the workstations with her arms crossed across her chest and staring at the screen. After about 15 minutes he noticed that she was still in the same position only now she was impatiently tapping her foot. He asked if she needed help and she replied, "It's about time! I pushed the F1 button over twenty minutes ago!" **************** =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 564 From: Jay Coote Date: Wed Jun 7, 2000 10:33am Subject: Re: Automated Sweeps A few musings and ramblings.... I worry about sales pitches for "non-technical operators" :-) part of a talk I used to give for trainee PIs included in my handout a cartoon I drew of the "Whizzo Bug Detector" $29.95 (US), no technical skills needed. A loud horn alerts the sweeper to the presence of tape recorders, transmitters, carrier current, IR and laser, series/parallel taps...(etc) I enjoyed the story of the sweeper in military BDUs. I'll wager he used a Whizzo detector? A client told me of a past sweep they commissioned. Two men showed up and asked her (politely enough) to leave the room as it "interfered with the waves". The client stated that one of the sweepers had a handheld box or gadget which he waved around the area. The sweep was over in half an hour. (Another Whizzo?) More seriously, one concept of remote sweeping might have limited use. This may have been done already, but the idea of using PC Anywhere, modem dial-up and PC-controlled TSCM receiver (audio by way of sound cards?) might be handy for an RF-only sweep of an office...? Jay Coote Los Angeles ---------- > ----- Original Message ----- > One thing I see in these advertisements is the term "non-technical > operators". I guess this means you turn the machine on and sometime later > you pick up the results (ie a R.F. spectrum printout). Then I guess someone > knowledgeable looks at it later on. > > I can only tell you from my 2500+ sweeps that the key skill in his game > is waveform pattern recognition and wave analysis. > > Ah - a kindred spirit. > > Andy > Jo'burg > > > > ------------------------------------------------------------------------ > Old school buds here: > http://click.egroups.com/1/4057/1/_/507420/_/960360887/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 565 From: James M. Atkinson, Comm-Eng Date: Wed Jun 7, 2000 10:49am Subject: Re: Equipment At 3:58 PM +0100 6/7/00, Adrian@a... wrote: >As Adrian Hickey is overseas, I will reply for him. > >Itís certainly the first time we have been criticised for making something >simple to use. Actually I don't think it's an issue of making easy to use hardware, but instead an issue regarding the advertising and marketing the equipment as being suitable for people with a limited or no technical background. There is nothing wrong with making simple, easy to use products, but when it is pushed towards the consumer a little too hard they (the non-technical user) views it as a "magic box" and it often becomes the only TSCM equipment they buy. The Scanlock is a great product, HOWEVER; it should never be the ONLY major TSCM product the sweeper is using. Also, if the sweeper does not have a strong technical background then even the best technical equipment is of minimal value. >Itís often useful to use the car analogy. If (say) Jaguar brought out a >new, high performance sports car, they could advertise it as ëOnly >suitable for Formula 1 racing driversí, they might sell one or two and >there is no doubt the skill of the drivers and the performance of that >custom model would be difficult to beat. > >It is unlikely however that the Ford bean-counters would fund this Jaguar >development because although it would be interesting and fun for the >design engineers, commercially it would be complete and utter nonsense. > >An alternative might be to design a raw, high performance car which would >attract the professional, allow him to do power slides etc., but with the >flick of a switch bring in anti-lock braking systems, traction control, >power steering and speed limiters, so Californian blondes can drive to the >health club. The maths is simple; there are more blondes than F1 drivers. Ah, but also using the car analogy... It's a bit like selling someone a Formula One race car to someone who doesn't know how to drive (and then starting it for them, and then putting it in gear for them so they can drive it off the lot). >How about the slogan? ëTry the new Scanlock M2, designed for Formula One >Sweepers, but with blondes in mindí. Or, "Try the new Scanlock M2, designed for sophisticated and highly trained TSCM specialists, but so easy to use that even a bodyguard can use it..." (no offense to bodyguards and EP folks) >Returning to TSCM, it is our experience that more and more medium to large >Companies require a sweeping facility in-house. They are happy with their >contract sweep experts who visit one or more times annually and carry out >deep sweeps, but contractors cannot be on-site permanently. We try to >encourage companies to form a ëTSCM Groupí perhaps the Security Manager, >Building Comms Engineer and an IT rep. Such a trio should know the layout >of the building and its cabling structure and should be capable of >assessing the likely threats to key areas. We would then show them lots of >different bugs at our training facility, and demonstrate common deployment >techniques and train them in the use of their chosen TSCM equipment. I agree that companies need some in-house TSCM equipment for use between sweeps performed by an outside contractor. But it is also extremely dangerous to rely exclusively on an internal TSCM function. I feel that it is also equally dangerous to base a TSCM program only on a few pieces of RF field detection equipment without also considering LAN and WAN analysis, telephone equipment, physical inspection equipment, and so on. The problem with involving your own internal technical people in the sweep is that they often are the eavesdroppers, or at least working for the opposition. >Apologies, I am trying to make a point without overtly promoting our >product. Roger Tolces is close, with new Scanlock M2 you have the ability >to collect and overlay your in-house spectral scans and compare >differences, if in doubt use the attached laptop to email the result to >your TSCM expert for comment, he will even be able to control the receiver >on-line. Ahem... this is actually the appropriate forum for discussion about your product, so please don't be bashful about talking about it. >Sweep teams cannot be omnipresent and itís the sweep experts who >approached us for a solution to ensure their customerís security was >ongoing. This was presented to us as: regular deep sweeps and tamperproof >seals to phones and outlets within key areas; upgrade physical security, >control access and supply effective, compatible TSCM equipment and >training for in-house use. (I prÈcis, the document was a 30-page proposal). Some once referred to these as "brick and mortar sweeps"... The external TSCM person provides the "Bricks" and the internal folks fill in the gaps between sweeps (the mortar). >As Audiotel's Adrian Hickey said earlier, we listen and try to give the >industry what it wants. > >As you will have guessed from my earlier ramblings, I enjoy cars and >driving, maybe its because itís a lot like sweeping: > >You have to learn the Highway Code > >You must know how to drive your equipment > >When you begin youíre a danger to others > >You learn with experience > >Everybody thinks they can drive better than you can > >Criticise other drivers at your peril > >Driving a flashy car does not bestow navigational skills upon you > >Volvo drivers believe they own the road (does this translate to USA?) > >You donít argue with 16 wheelers > >Everybody knows a quicker/better route than you > >And remember, an inexperienced driver in a Beetle might come out top on a >road he drives every day compared to a ëexpertí in a Ferrari driving it >for the first time. I strongly agree with you. >I know Iím going to regret thisÖÖÖÖÖÖÖÖÖÖ any others? > > >Nothing I have said should be construed as criticism of The Ford Motor >Company, Jaguar Cars, and blondes. I have had and will continue to have >fun with all three during my life. > > >Ray Summers >Commercial Director >Audiotel International =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 566 From: James M. Atkinson, Comm-Eng Date: Wed Jun 7, 2000 11:16am Subject: Re: Automated Sweeps At 11:37 AM -0400 6/7/00, Jay Coote wrote: >A few musings and ramblings.... >I worry about sales pitches for "non-technical operators" :-) part >of a talk I used to give for trainee PIs included in my handout a >cartoon I drew of the "Whizzo Bug Detector" $29.95 (US), no >technical skills needed. A loud horn alerts the sweeper to the >presence of tape recorders, transmitters, carrier current, IR and >laser, series/parallel taps...(etc) What no laser range finder? >I enjoyed the story of the sweeper in military BDUs. I'll wager he >used a Whizzo detector? Nope, he buys every toy and piece of equipment on Earth, but doesn't have the slightest clue how any of it works. All he is concerned with is the ability of the equipment to impress the client, and little else. >A client told me of a past sweep they commissioned. Two men showed >up and asked her (politely enough) to leave the room as it >"interfered with the waves". The client stated that one of the >sweepers had a handheld box or gadget which he waved around the >area. The sweep was over in half an hour. (Another Whizzo?) What you describe is a typical "Rain Dance" >More seriously, one concept of remote sweeping might have limited use. >This may have been done already, but the idea of using PC Anywhere, >modem dial-up and PC-controlled TSCM receiver (audio by way of sound >cards?) might be handy for an RF-only sweep of an office...? How about a rack of spectrum analyzers connected to batteries of antenna's concealed in sensitive area's. The equipment is then connected to the Internet though an encrypted link. If (or when) a hostile emission takes place the internal and external security people are notified by pager and email. For example a 171.890 MHz, 50 kHz signal appears on the spectrum with a signal level of above -50 dBm. The security manager is notified on his pager who then contacts his external TSCM contractor (who arrives at the facility 90 minutes later). The same is true with "anomalies" detected by the PBX admin workstation (ie: an over current condition, or an extension being unplugged from the wall". Such a monitoring system can also be wired into the CCYV system to document what (and who) was involved in the event. FYI: Such systems are already in use [GRIN] -jma >Jay Coote >Los Angeles > >---------- > > ----- Original Message ----- > > One thing I see in these advertisements is the term "non-technical > > operators". I guess this means you turn the machine on and sometime later > > you pick up the results (ie a R.F. spectrum printout). Then I guess someone > > knowledgeable looks at it later on. > > > I can only tell you from my 2500+ sweeps that the key skill in his game > > is waveform pattern recognition and wave analysis. > > > > Ah - a kindred spirit. > > > > Andy > > Jo'burg =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 567 From: James M. Atkinson, Comm-Eng Date: Wed Jun 7, 2000 8:01pm Subject: Intelligence Staffer Dies In case you haven't heard yet, John Millis was found dead in a hotel room on Monday. -jma ----- From The Washington Post, Tuesday, June 6, 2000. Page A-10. "Intelligence Staffer Dies" "John I. Millis, staff director of the House Permanent Select Committee on Intelligence and a former CIA operations officer, was found dead Sunday night of an apparent gunshot wound in a Fairfax City motel, officials said yesterday (Monday). "City police found Millis in a room at the Breezeway Motel, 10829 Lee Highway, after receiving a report that a guest there was threatening suicide. Officers tried and failed to contact the room's occupant by telephone before entering and finding his body in the bathroom. An investigation is continuing. "U. S. Rep. Porter J. Goss (R-Fla.), chairman of the House Intelligence Committee and Millis's boss, said in a statement that 'this is tragic news that stunned us all' and expressed 'deep sympathy' to Millis's wife, Linda, and their children. "It seems that there are always more 'whys' than there are answers when a tragedy like this occurs,' Goss said. 'It also seems that words alone are insufficient to alleviate the enormous pain we feel.' "CIA Director George J. Tenet said in a statement that 'we in the intelligence community are shocked and saddened by this tragic loss. We worked closely with John for many years. He was a tenacious advocate for a strong national intelligence capability.' " =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 568 From: Dawn Star Date: Thu Jun 8, 2000 7:26am Subject: Scanlock features Ray Summers said, "Apologies, I am trying to make a point without overtly promoting our product. Roger Tolces is close, with new Scanlock M2 you have the ability to collect and overlay your in-house spectral scans and compare differences, if in doubt use the attached laptop to email the result to your TSCM expert for comment, he will even be able to control the receiver on-line." Ray, in your literature for the spectural analysis software you say the software features "modulation analysis" and "spectral occupancy". Could you give us a explanation of these features. Thanks, Roger Tolces [Non-text portions of this message have been removed] 569 From: Date: Thu Jun 8, 2000 3:48am Subject: Opportunity ? I'm passing this on. It may be of interest. Please contact him directly! I'm looking for a good candidate(s) to conduct a discussion panel at H2K, http://www.h2k.net on electronic surveillance techniques, technology, and TSCM. This is a not-for-profit conference, so they would not be paid. They would, however, be covered by major international media (newspapers, magazines, and electronic media outlets). The event is in NYC July 14-17 at the hotel Pennsylvania. Thanks in advance for your help on this. Contact: bernies@2... 570 From: A Grudko Date: Thu Jun 8, 2000 8:41am Subject: Off topic - Analist Notebook? Sorry for the off topic post, but one of you ex-Intel types might know the answer to this one. I have a government client who has bought a US product called 'Analist Notebook' (his spelling) from a local supplier. Despite the name, there is no notebook supplied, only software. The product is designed to assist in analysing large amounts of diverse data in criminal and Intel. matters, similar I think to 'Watson'. Although he did a 5 day course he cannot work out how to use it, especially to input large amounts of data from other data bases, such as call records, bank records etc. He has asked me to research the product a bit and tell him if it is worth the effort of going more deeply into it. I did a quick search on the net but could not find it, and I thought one of you might know of it. Thanks Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia Israel - www.grudko.com. - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 Members of : SCIP (Gauteng Chairman), SACI (President), GIN (Charter), WAD, CALI, SASFed, SASA, SAMLF, UKPIN, AFIO (OS),IWWF, PRETrust --- "When you need it done right - first time" --- 571 From: James M. Atkinson, Comm-Eng Date: Thu Jun 8, 2000 9:36am Subject: Switchable Low Noise Amplifier/PA Driver Amp GREENSBORO, N.C.--(BUSINESS WIRE)--June 8, 2000-- New 3V Component Features Low Noise, High Dynamic Range, Adjustable Bias Current and Integrated Bypass Switch [snip] With its operating range of 150MHz-2500MHz, the RF2366 functions as an outstanding front end low noise amplifier. When the IC is used as a LNA, the bias control can be set externally. When used as a PA driver, the component can operate directly from a single-cell Li-ion battery. The RF2366's design incorporates adjustable bias current and a power-down feature that can be used to turn the device completely off. The RF2366 integrates a low loss bypass switch for extended dynamic range. Operating from a single 3V (2.5V-6.0V) power supply, the RF2366 features a high intercept point and low noise figure. Typical applications for the RF2366 include use as a LNA or PA driver amp in CDMA PCS or cellular systems. The device is specified as a LNA for systems designed to meet IS-98B single tone and IMD requirements. Manufactured using an advanced gallium arsenide heterojunction bipolar transistor technology (GaAs HBT) and offered in an industry-standard SOT23-6 plastic package, the RF2366 is available for immediate shipment from RFMD, priced at $0.81 per device, in order quantities exceeding 10,000. Fully assembled evaluation boards for both LNA and driver amp modes are also available from RFMD. [snip] For further information about RFMD or the new RF2366, please visit our web site at http://www.rfmd.com [snip] =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== From: John McCain Date: Mon Jun 4, 2001 6:38pm Subject: Re: Cheap receivers? - now cheap SAs Shaw, For some education and bargain basement spectrum analysis work, check out http://www.science-workshop.com/ , home of the "poor man's spectrum analyzer" for some great ideas and kits to doityerself. Thousands of hams have built these kits ( or portions of them) Look at 2Mhz to 1.7 Ghz for well under 1K$ .... but it's no HP lab instrument :) Cheers, JohnM Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-352-0350 807 Pioneer Web: http://www.dcbnet.com Champaign, IL. 61820 Email: Jmccain@d... 3153 From: Date: Mon Jun 4, 2001 7:59pm Subject: TSCM Carry-on kit discussion Folks, here's my flyaway package... I keep a carry-on kit in the trunk of my personal car all the time. It's enough gear for a basic inspection and it wouldn't be the end of the world if it was stolen. It's also sufficient for most domestics and general paranoia inspections (after thoughtful client analysis...). I began with an empty Platt tool case that fits within the size limitations. Here's what's inside: LINE INSTRUMENTS: - Fluke portable, rechargeable 200 MHz o-scope/DMM - TPI DMM/basic o-scope - Harris buttset/speakerphone - Kaiser amplifier, TDR, subcarrier receiver RF INSTRUMENTS: - Protek 3201 handheld analyzer - Icom PCR-1000 - Icom R-10 or R-3 - Optoelectronics Xplorer - External mixers, preamps, and homebrew antennas TOOLS: - Surefire 9P flashlight, 2 D-cell Maglite, Maglite penlight, extra batteries - Xcelite interchangeable screwdrivers (1 large, 1 small ratchet size) - Craft tools: punchdown, banjo adapters, can wrench, etc. I chose the Fluke oscilloscope for its size, mostly, but I've been impressed by its features and durability. I can save traces and data to my computer. I also bring a TPI DMM/1 MHz scope for crawling around in attics and phone closets and for more basic work. It has RS-232, logs data, and costs less than $300. The buttset is for good measure and readbacks. I bring one or two Kaiser 1059 amplifiers and an SCD-5 subcarrier receiver (I like to try and hear what I see). The TDR kicker works great with the scope, and while I'd rather have a Riser-Bond with me, the Kaiser saves a lot of space and weight. I've never liked the Protek 3201. It's allegedly a spectrum analyzer -- but it has to be spoon fed RF. It's a huge compromise from a full size analyzer, lacking real sensitivity or selectivity, but it's better than nothing. Since kicking myself for buying it, I've found an interesting computer driven SA with better RF specs, but I haven't spent the money yet. If I can justify it, I'll pick up an Anritsu MS2711A, which has terrific RF performance for its size and reaches to 7 gigs. It's smaller than most laptop computers. Woo hoo. The Opto Xplorer is a neat toy that's fun to bring along. It runs by itself and collects frequencies that can be downloaded and examined later, or works as a cheap nearfield receiver with a demod. It finds any of the 50 or 100 mw wireless mic transmitters instantly (not necessarily something to brag about) and it picked out a fairly low power, hacked 49 MHz plug-n-talk when connected to a nice big antenna. It's also nice to have for long layovers in airports when you want to drop in on airport security, food cart guys, etc. I keep the Icoms for convenience. The PCR-1000 performs as expected and it's good to have for scanning through the hot lists. It also has a decent search function that logs numbers. The R-10 is good for walking around, as is the R-3. The R-3 has a neat LCD display (unfortunately, its best feature). I think the tools are self explanatory. I try and jam a pair of second hand coveralls (with somebody else's name on a patch) in there too. I have one with a cola company logo on one side and "Dave" on the other. It works wonders and keeps my real clothes clean if I have to play in someone's attic. My laptop fits inside, barely, but I usually carry it in its own case. On my wish list: a BAE/Watkins Micro or Miniceptor receiver to replace the Icom (about the same size). The Icom serves a purpose but it's no WJ. Also, some sort of small nearfield detector. I haven't picked out which one though. Best wishes, Eric Leonard Los Angeles, CA (213) 448-8967 3154 From: David Alexander Date: Tue Jun 5, 2001 6:30am Subject: re: ECHELON - does it exist ? I read Robert's submission with glee: >My contention has always been and remains that Echelon is a carefully >nurtured hoax designed to increase the FUD (fear, uncertainty, and doubt) >factor surrounding international telecommunications. In the words of >the late, great, Douglas Adams, "The CIA discovered that, instead of actually >invading a country, it would be cheaper and more effective to make them >*think* they'd been invaded." Just because you're not paranoid doesn't mean >they're not out to get you. Or does it? > >The s/n ratio for content filtering on the scale routinely ascribed >to Echelon would make cracking Triple DES seem trivial by comparison. > >Cheers, > >RGF > >Robert G. Ferrell, CISSP >Information Systems Security Officer >National Business Center >U. S. Dept. of the Interior >Robert_G_Ferrell@n... It's a good read until you get to his sig. block. Then the penny drops about who his employer is - the US Govt. Is this submission an attempt at disinformation sponsored by the 'evil capitalist yankee government ?' P.S. for the benefit of the _really_ paranoid, or the very, very nice people at Echelon (wouldn't say a word against them) this is a joke. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 3155 From: David Alexander Date: Tue Jun 5, 2001 6:38am Subject: re; EMP and electronics >I have seen at first hand the radar equipment fitted to a Soviet Bloc AAA >(Anti Aircraft Artillery for the those non military background members of >the list) system, all valves, not a transistor to be seen (and this is in a >tracked vehicle, not exactly a comfortable ride!). My first reaction was >"what a load of old crap". Then, just as you say, I thought about a post >detonation EMP....... Not so silly after all when you think about it in >those terms. Perhaps this drive to miniaturisation does have it's >downsides. It's actually very easy to sheld the delicate elctronics with a faraday cage. Generally known as 'hardening' and a it's a requirement of most NATO milspec equipment that it will survive EMP. Don't be fooled by the soviet use of valves. They had no choice, their PCB tech was almost nil. Read the tech reports of the NASA astronauts who went ot MIR to see how behind they were, and are. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 3156 From: James M. Atkinson, Comm-Eng Date: Tue Jun 5, 2001 8:48am Subject: Re: re; EMP and electronics In many cases vacuum tubes are actually preferable to semiconductors, and the Soviets have always been masters of making extraordinarily sophisticated micro vacuum tube systems (valves). They have always been able to make better valve products, and far cheaper then any other nation. This is why Soviet made vacuum tubes are in huge demand right now for broadcasting, radar, professional audio, medicine and other industries that still need valves. Consider this; How many folks in TSCM use an X-Ray imaging system? (Pray, does it use a vacuum tube)? The use of vacuum tubes should never be taken to mean low technology. -jma At 12:38 PM +0100 6/5/01, David Alexander wrote: > >I have seen at first hand the radar equipment fitted to a Soviet Bloc AAA >>(Anti Aircraft Artillery for the those non military background members of >>the list) system, all valves, not a transistor to be seen (and this is in a >>tracked vehicle, not exactly a comfortable ride!). My first reaction was >>"what a load of old crap". Then, just as you say, I thought about a post >>detonation EMP....... Not so silly after all when you think about it in >>those terms. Perhaps this drive to miniaturisation does have it's >>downsides. > >It's actually very easy to sheld the delicate elctronics with a faraday >cage. Generally known as 'hardening' and a it's a requirement of most NATO >milspec equipment that it will survive EMP. Don't be fooled by the soviet >use of valves. They had no choice, their PCB tech was almost nil. Read the >tech reports of the NASA astronauts who went ot MIR to see how behind they >were, and are. > >David Alexander M.INSTIS >Global Client-Server, Communications & Infrastructure Manager >Bookham Technology plc > >DDI: 01235 837823 >Mobile: 0779 988 1284 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3157 From: Robert G. Ferrell Date: Tue Jun 5, 2001 9:29am Subject: Re: Trojan lets cyber-cops plant bogus evidence >X-eGroups-Return: sentto-49964-3615-991696154-rferrell=rgfsparc.cr.usgs.gov@returns.onelist.com >X-Sender: wk@c... >X-Apparently-To: TSCM-L@egroups.com >X-Sender: wk@i... >And just what is D.I.R.T.? Why it's a Trojan, pure and simple Heh. Only in the government's dreams.... ;-) Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 3158 From: Robert G. Ferrell Date: Tue Jun 5, 2001 9:48am Subject: Re: re: ECHELON - does it exist ? >It's a good read until you get to his sig. block. Of course, if I were an evil government nark, I wouldn't be using my .sig, would I? Oh, but wait, I forgot that the government is so stupid, they probably do use their real names and employers and stuff. The US Government rents my data telecommunications engineering and IT security skills 40 hours a week. My opinions are quite definitely my own, and a lot of them are rather critical of the government. If anyone doubts this, see _Information Security_ magazine Nov. 1999, p. 72, Mar. 2001, p. 18, among many, many others. Or just ask Jericho or Cancer Omega or L33tdawg or.... My principal reason for disbelieving Echelon is that it requires a great deal of interagency, not to mention intergovernmental, coordination. I can promise you from experience that getting one intelligence agency to cooperate with another is like convincing Southern Baptist Ministers and Orthodox Rabbis to go out together for a wild night of drinking and dancing in gay bars. While Echelon could exist, for all I know, it just doesn't seem likely to me that it has anywhere near the capability that the media seem to think it has. Do the math. Oh, if Echelon _is_ watching, read my lips: bite me. We now return you, hopefully, to something vaguely on-topic. Cheers, RGF 3159 From: James M. Atkinson, Comm-Eng Date: Tue Jun 5, 2001 0:44pm Subject: Retired Col.'s Espionage Case Begins Retired Col.'s Espionage Case Begins http://www.guardianunlimited.co.uk/breakingnews/US/0,3560,958275,00.html Tuesday June 5, 2001 5:20 pm TAMPA, Fla. (AP) - A retired Army reserve colonel was such a valuable spy that when a former Soviet leader was handed a list of his nation's top sources, George Trofimoff was at the top, prosecutors said Tuesday. In opening statements in Trofimoff's espionage trial, Assistant U.S. Attorney Walter Fuhr said Trofimoff delivered more than 50,000 pages of documents to the KGB during a 25-year spying career. Trofimoff, 74, is the former chief of the Joint Intelligence in Nuremberg, Germany, and is considered the highest-ranking military officer to be arrested on spying charges. Trofimoff's attorneys are scheduled to present their opening statements later Tuesday. Trofimoff faces a life sentence if convicted. Among the information Trofimoff allegedly passed to the Soviets was details on U.S. battle plans, briefs of chemical and biological weapons and lists of information needed by U.S. intelligence officers. Trofimoff was the target of an undercover FBI investigation for more than three years before his arrest. He lived in an exclusive Melbourne development for military retirees and working as a grocery store bagger when he was indicted last June. Fuhr told jurors that longtime KGB head Yuri Andropov personally delivered a list of top sources to then-Soviet leader Leonid Brezhnev in the early 1970s. Andropov later became the Soviet Union's leader himself. Fuhr also said there are connections between Trofimoff and the KGB agents also connected to former spy Aldrich Ames, a veteran CIA officer who spied for the Soviets for more than eight years, and Clayton Lonetree, a Marine guard at the U.S. Embassy in Moscow who served nearly a decade after being convicted of spying in the 1980s. Trofimoff, born in Germany to Russian emigres, became a naturalized U.S. citizen in 1951, joined the Army in 1953 and was honorably discharged three years later, although he rose to colonel in the reserves. He was hired as a civilian in Army intelligence in 1959. From 1969 until 1994, Trofimoff was a civilian chief of an Army installation in West Germany where refugees and defectors from the Soviet bloc were interrogated. At the time of his arrest last June, a prosecutor said Trofimoff collected $300,000 for photographing volumes of secret U.S. intelligence documents and giving them to the KGB through a go-between, a boyhood friend who became a Russian Orthodox priest. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3160 From: Adnan Rahman Date: Tue Jun 5, 2001 2:24pm Subject: Re: Re: ECHELON - does it exist? greetings! | I can promise you from experience that getting one intelligence agency to | cooperate with another is like convincing Southern Baptist Ministers and | Orthodox Rabbis to go out together for a wild night of drinking and dancing | in gay bars. =) i watch this list and read the postings here quite a long (?) time now, didn¥t had any interesting stuff to post till now so ... i really enjoy reading your posts mr. ferrell, your humor is so refreshing. i learned some interesting things about tscm and counterintelligence only from watching this mailing list so i wanted to thank you all for the opportunity. i have to ask you to apologize my bad school english, didn¥t wrote any english since then (high school) ;) i also would like to thank mr. atkinson for creating such a informative list and a source of hands-on info about tscm, electronics etc. i recommend your website to all of my collegues, its amazing how many experience you have. im a 21 y. old student from bosnia, studying in austria, a licensed ham radio amateur, informatics and electronics fan. please forgive me for posting so off topic like this, i just wanted to say how much i respect the experience of all here and to thank you for the knowledge i collected through this mailing list. 73! Adnan Rahman Elektronska Sigurnost www.as19.org 3161 From: James M. Atkinson, Comm-Eng Date: Tue Jun 5, 2001 7:43pm Subject: Retired U.S. colonel, 74, is tried as spy for KGB Tuesday June 5, 11:41 PM Retired U.S. colonel, 74, is tried as spy for KGB http://uk.news.yahoo.com/010605/80/btxr4.html By Robert Green TAMPA, Florida (Reuters) - A retired U.S. intelligence officer gave the Soviet Union "enormous" amounts of sensitive military information while working as a KGB spy in Germany during the Cold War, a federal prosecutor has told jurors at the start of the former officer's espionage trial. The defendant, retired Army Col. George Trofimoff, 74, of Melbourne, Florida, is the highest-ranking U.S. military officer ever charged with espionage. Trofimoff, who has pleaded not guilty, faces life in prison if convicted. He is accused of stealing classified documents while serving as the civilian head of the U.S. Army's Joint Interrogation Center in Nuremberg, Germany, and selling them to the Soviet secret police, the KGB. "The amount of classified information the defendant sold to the Soviet Union is enormous," Assistant U.S. Attorney Terry Furr said in opening statements on Tuesday at Trofimoff's trial in federal court in Tampa, Florida. Trofimoff listened without expression during the statements. Dozens of former U.S. military officers and former KGB agents are scheduled to testify at the trial, which is expected to last about a month. The first witness, Army intelligence agent Gary Pepper, testified that Trofimoff had top-secret clearance to handle U.S. and NATO military documents. ARRESTED LAST JUNE Trofimoff worked at the intelligence centre in Nuremberg from 1969 to 1994 and served in the U.S. Army Reserve during most of that time, retiring in 1995 as a colonel. He was arrested last June after allegedly meeting in Tampa with an undercover FBI agent posing as a Russian intelligence officer. He has been jailed without bond since then. Furr said much of the evidence against Trofimoff would come from a six-hour videotaped conversation he previously had with the undercover agent. On the tape, Furr said, Trofimoff admitted to stealing more than 50,000 documents and selling them to the KGB. He said Trofimoff took them home in his briefcase a few at a time, photographed them and returned them the next day. Defence attorney Daniel Hernandez said Trofimoff was not a spy but "an American patriot" whose record showed "nothing but honourable and exemplary service." He said Trofimoff's statements in the videotaped conversation were "nothing more than fantasy" concocted to get money from the Russians. "He told the undercover agents what they wanted to hear to justify the money he was receiving," Hernandez said. "No one will be able to say they saw Mr. Trofimoff doing anything illegal." GERMAN CHARGES DROPPED Furr said the documents Trofimoff allegedly stole dealt with crucial information the United States had about the military capabilities of the Soviet Union and its Eastern European allies. The Soviet Union, the United States' Cold War foe, collapsed in 1991. Trofimoff was born in Germany to Russian parents and became a U.S. citizen in 1951. Furr said Trofimoff was recruited for the KGB by his childhood friend Igor Susemihl, a priest in the Russian Orthodox Church who was also a KGB agent. Susemihl died in 1999. The German government arrested Trofimoff and Susemihl on espionage charges in 1994 but dropped the charges because Germany's statute of limitations had expired. Furr said Trofimoff was awarded the Order of the Red Banner by the Soviet Union, a decoration presented for bravery, self-sacrifice and courage "in defense of the socialist homeland." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3162 From: James M. Atkinson, Comm-Eng Date: Tue Jun 5, 2001 8:01pm Subject: Re: Trojan lets cyber-cops... [Formally Retracted by The Register] The funny thing about the article is that the author has since recanted, and formally issued a retraction and apology (which is a very serious thing for any publication to do) . When I looked up the article on-line, the following note was on the top of the article: "This story contains incomplete and inaccurate data. Please see my explanation and partial retraction for the latest and most accurate information. -- TCG " Initial Article:http://www.theregister.co.uk/content/6/19404.html Retraction:http://www.theregister.co.uk/content/4/19480.html The retraction is a very honorable effort, and the journalist should be applauded for such professionalism, and for being willing to admit an error. -jma ====================== Register duped by crimebusting D.I.R.T. Trojan By Thomas C Greene in Washington Posted: 06/06/2001 at 00:04 GMT My recent article on the D.I.R.T. (Data Interception by Remote Transmission) Trojan, with which law-enforcement agents can secretly monitor a suspect's computer and marketed by surveillance outfit Codex Data Systems, contained several inaccuracies, all of which can be attributed solely to my own lapse in the skepticism for which The Reg in general, and I personally, are known. The full story, as it happens, is immensely more twisted than I imagined when I wrote my original item. Clearly, The Register's readers deserve better -- and here it is: S.C.A.M. Thanks to several e-mailed hints from readers, I continued doing background research and have now confirmed that the CEO of Codex Data Systems is one Francis Edward "Frank" Jones, a convicted felon currently on probation for illegal possession of surveillance devices. He was charged with trafficking and conspiracy to traffic in them, but in an agreement he pleaded guilty to simple possession, and the US Government dropped the other two charges. He was sentenced to three-hundred hours' community service and five years' probation with no jail time, on the strength of his argument to the court that he was not responsible for his illegal acts by reason of mental defect. He has also been required to participate in a mental-health program, which, judging by some of his recent behavior, appears to be less than a screaming success. Jones is widely regarded as a scam artist with a long history of security/surveillance snake-oil sales. He has, for example, sold bug-detection services, which we're told are completely fraudulent, involving detection apparatus easily cobbled together from the inventory of Radio Shack. He's reported to have planted a bug which he subsequently 'found' during one such charade. A Legend in His Own Mind He's also a shameless, Boswellian self-promoter with a Web site devoted to himself in his on-line incarnation, "SpyKing." Here we're told that SpyKing/Jones is "formerly in military and law enforcement service," and "a popular talk show guest with 15 appearances on national & regional programming and news specials." As for his law-enforcement experience, we've since learned that he managed to get himself fired from the New York City Police Department in 1975, according to a letter by Association of Counter-Intelligence Professionals (ACIP) Executive Director Michael Richardson. But the PR beat goes on: "Jones has lectured at M.I.T. (Massachussetts [sic] Institute of Technology) on TEMPEST computer eavesdropping techniques," his Web site claims. Indeed, "No other speaker has their thumb on the pulse of changing world trends in immerging [sic] surveillance technologies." The security 'experts' our illiterate subject has conned include hacker trivia master Winn Schwartau and AntiOnline's "JP" John Vranesevich (no surprises there), and such publications as PC World, E-BusinessWorld, TechWeek, the Wall Street Journal, and, thanks to my carelessness, El Reg as well. The D.I.R.T. on the Trojan The truly inexcusable element of my first story was my failure challenge rigorously Codex's claims regarding the amazing power of its D.I.R.T. Trojan. Had I taken the time to learn that SpyKing/Jones was behind this, I would have immediately suspected that it's a lot more talk than technology. But I ran with the piece out of eagerness to work my own agenda, motivated by personal outrage that anyone would be so irresponsible as to sell a Trojan to law-enforcement and governments as a surveillance device. And the reason for that outrage survives even now; D.I.R.T. unquestionably permits police to upload bogus evidence to a suspect's machine and offers no auditing controls by which they might be caught, which was the focus of my original report. That much hasn't changed; D.I.R.T. is absolutely ripe for abuse, and Jones is utterly damnable for trying to sell it to governments and police organizations. But I was on very shaky ground in reporting its true capabilities. My subsequent investigation indicates that Codex's claim that D.I.R.T. can defeat all known PC firewalls is, quite simply, false. Furthermore, their claim that "the software is completely transparent to the target and cannot be detected by current anti-virus software," is misleading, if not completely false. There is no technology in D.I.R.T. which addresses this sort of stealth; the server isn't detected simply because no anti-virus vendor has as yet added it to their signatures catalog. Defeating D.I.R.T. My suggestions in the original article for defeating D.I.R.T. remain basically sound, if perhaps a bit over-cautious due to my mistaken belief that it defeats all known firewalls (though there is reason to believe it may defeat a few). Because it isn't presently detected by anti-virus software, one does have to look for evidence of it. By default, it installs two files in the C:\WINDOWS directory -- DESKTOP.EXE and DESKTOP.DLL. Find either of those files, and it's time to re-format your HDD. One can also check their Windows registry under: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CurrentVersion HKEY_USERS\SOFTWARE\MICROSOFT\WINDOWS\CurrentVersion HKEY_USERS\DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CurrentVersion for any references to DESKTOP.EXE or DESKTOP.DLL. For those not well acquainted with the excessive complexities of the Registry, it would be best simply to search the entirety for references to both files mentioned. Now, because those file names are defaults which can be modified by savvy operators, I'm not saying 'if you can't find the files, then you can't be infected.' But we can rely on the fact that most operators will be using it in its default configuration -- after all, its chief selling point is that it can be used successfully by the technically illiterate. One last point regarding defenses against the Trojan: soon after I posted the first article recommending disk re-formats for those unsure how to attack D.I.R.T., which was mentioned and linked at Cryptome.org, a reader submitted the following warning: "D.I.R.T. uses 'unused' space in the file system, so high-level reformatting will not destroy it. (This 'unused' space is used by operating systems to handle classified information with data structures similar to that in SE_Linux). Removing D.I.R.T. requires wiping the disk at the device-driver level." I spoke with Eric Schneider, who wrote the program before leaving Codex on ethical grounds; and he told me that so far as he knows, "there is no technology in D.I.R.T. which comes close to surviving a high-level format." So there you have it. D.I.R.T. is a remote administration tool which functions in large part just like the free Trojans SubSeven and BO2K, which is being sold by a disgraced former cop and current felon and mental patient for thousands of dollars a pop to creepy Feds in countries where the sort of abuse it makes possible is routine and impossible for a victim to challenge in court. In all, a loathsome scam run by an equally loathsome con artist. Æ === At 6:07 PM -0500 6/4/01, William Knowles wrote: >http://www.theregister.co.uk/content/6/19404.html > >By Thomas C Greene in Washington >Posted: 04/06/2001 at 09:36 GMT > >A new tool of Fascist control, with which law-enforcement agents can >secretly monitor the entire range of a suspect's computer activity, >has been developed by self-proclaimed 'computer surveillance experts' >Codex Data Systems, according to a document sent to Cryptome.org. [snip] -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3163 From: Date: Tue Jun 5, 2001 5:13pm Subject: hello and a question I am new to the group having just moved to the USA from Israel and would like to say hi to the group. Also I would like to ask if their are any American laws regarding importation and export of counter meassure equipment. Thanks, Yoni 3164 From: Miguel Puchol Date: Wed Jun 6, 2001 2:33am Subject: RE: Trojan lets cyber-cops... [Formally Retracted by The Register] Judging by the retraction, it seems that the journalist was well taken in...and got very miffed when he found just how much by. In any case, a commendable effort - and a good lesson learned. Cheers, Mike -----Mensaje original----- De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] Enviado el: miÈrcoles, 06 de junio de 2001 3:01 Para: TSCM-L@yahoogroups.com Asunto: Re: [TSCM-L] Trojan lets cyber-cops... [Formally Retracted by The Register] The funny thing about the article is that the author has since recanted, and formally issued a retraction and apology (which is a very serious thing for any publication to do) . When I looked up the article on-line, the following note was on the top of the article: "This story contains incomplete and inaccurate data. Please see my explanation and partial retraction for the latest and most accurate information. -- TCG " Initial Article:http://www.theregister.co.uk/content/6/19404.html Retraction:http://www.theregister.co.uk/content/4/19480.html The retraction is a very honorable effort, and the journalist should be applauded for such professionalism, and for being willing to admit an error. -jma ====================== Register duped by crimebusting D.I.R.T. Trojan By Thomas C Greene in Washington Posted: 06/06/2001 at 00:04 GMT My recent article on the D.I.R.T. (Data Interception by Remote Transmission) Trojan, with which law-enforcement agents can secretly monitor a suspect's computer and marketed by surveillance outfit Codex Data Systems, contained several inaccuracies, all of which can be attributed solely to my own lapse in the skepticism for which The Reg in general, and I personally, are known. The full story, as it happens, is immensely more twisted than I imagined when I wrote my original item. Clearly, The Register's readers deserve better -- and here it is: S.C.A.M. Thanks to several e-mailed hints from readers, I continued doing background research and have now confirmed that the CEO of Codex Data Systems is one Francis Edward "Frank" Jones, a convicted felon currently on probation for illegal possession of surveillance devices. He was charged with trafficking and conspiracy to traffic in them, but in an agreement he pleaded guilty to simple possession, and the US Government dropped the other two charges. He was sentenced to three-hundred hours' community service and five years' probation with no jail time, on the strength of his argument to the court that he was not responsible for his illegal acts by reason of mental defect. He has also been required to participate in a mental-health program, which, judging by some of his recent behavior, appears to be less than a screaming success. Jones is widely regarded as a scam artist with a long history of security/surveillance snake-oil sales. He has, for example, sold bug-detection services, which we're told are completely fraudulent, involving detection apparatus easily cobbled together from the inventory of Radio Shack. He's reported to have planted a bug which he subsequently 'found' during one such charade. A Legend in His Own Mind He's also a shameless, Boswellian self-promoter with a Web site devoted to himself in his on-line incarnation, "SpyKing." Here we're told that SpyKing/Jones is "formerly in military and law enforcement service," and "a popular talk show guest with 15 appearances on national & regional programming and news specials." As for his law-enforcement experience, we've since learned that he managed to get himself fired from the New York City Police Department in 1975, according to a letter by Association of Counter-Intelligence Professionals (ACIP) Executive Director Michael Richardson. But the PR beat goes on: "Jones has lectured at M.I.T. (Massachussetts [sic] Institute of Technology) on TEMPEST computer eavesdropping techniques," his Web site claims. Indeed, "No other speaker has their thumb on the pulse of changing world trends in immerging [sic] surveillance technologies." The security 'experts' our illiterate subject has conned include hacker trivia master Winn Schwartau and AntiOnline's "JP" John Vranesevich (no surprises there), and such publications as PC World, E-BusinessWorld, TechWeek, the Wall Street Journal, and, thanks to my carelessness, El Reg as well. The D.I.R.T. on the Trojan The truly inexcusable element of my first story was my failure challenge rigorously Codex's claims regarding the amazing power of its D.I.R.T. Trojan. Had I taken the time to learn that SpyKing/Jones was behind this, I would have immediately suspected that it's a lot more talk than technology. But I ran with the piece out of eagerness to work my own agenda, motivated by personal outrage that anyone would be so irresponsible as to sell a Trojan to law-enforcement and governments as a surveillance device. And the reason for that outrage survives even now; D.I.R.T. unquestionably permits police to upload bogus evidence to a suspect's machine and offers no auditing controls by which they might be caught, which was the focus of my original report. That much hasn't changed; D.I.R.T. is absolutely ripe for abuse, and Jones is utterly damnable for trying to sell it to governments and police organizations. But I was on very shaky ground in reporting its true capabilities. My subsequent investigation indicates that Codex's claim that D.I.R.T. can defeat all known PC firewalls is, quite simply, false. Furthermore, their claim that "the software is completely transparent to the target and cannot be detected by current anti-virus software," is misleading, if not completely false. There is no technology in D.I.R.T. which addresses this sort of stealth; the server isn't detected simply because no anti-virus vendor has as yet added it to their signatures catalog. Defeating D.I.R.T. My suggestions in the original article for defeating D.I.R.T. remain basically sound, if perhaps a bit over-cautious due to my mistaken belief that it defeats all known firewalls (though there is reason to believe it may defeat a few). Because it isn't presently detected by anti-virus software, one does have to look for evidence of it. By default, it installs two files in the C:\WINDOWS directory -- DESKTOP.EXE and DESKTOP.DLL. Find either of those files, and it's time to re-format your HDD. One can also check their Windows registry under: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CurrentVersion HKEY_USERS\SOFTWARE\MICROSOFT\WINDOWS\CurrentVersion HKEY_USERS\DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CurrentVersion for any references to DESKTOP.EXE or DESKTOP.DLL. For those not well acquainted with the excessive complexities of the Registry, it would be best simply to search the entirety for references to both files mentioned. Now, because those file names are defaults which can be modified by savvy operators, I'm not saying 'if you can't find the files, then you can't be infected.' But we can rely on the fact that most operators will be using it in its default configuration -- after all, its chief selling point is that it can be used successfully by the technically illiterate. One last point regarding defenses against the Trojan: soon after I posted the first article recommending disk re-formats for those unsure how to attack D.I.R.T., which was mentioned and linked at Cryptome.org, a reader submitted the following warning: "D.I.R.T. uses 'unused' space in the file system, so high-level reformatting will not destroy it. (This 'unused' space is used by operating systems to handle classified information with data structures similar to that in SE_Linux). Removing D.I.R.T. requires wiping the disk at the device-driver level." I spoke with Eric Schneider, who wrote the program before leaving Codex on ethical grounds; and he told me that so far as he knows, "there is no technology in D.I.R.T. which comes close to surviving a high-level format." So there you have it. D.I.R.T. is a remote administration tool which functions in large part just like the free Trojans SubSeven and BO2K, which is being sold by a disgraced former cop and current felon and mental patient for thousands of dollars a pop to creepy Feds in countries where the sort of abuse it makes possible is routine and impossible for a victim to challenge in court. In all, a loathsome scam run by an equally loathsome con artist. Æ === At 6:07 PM -0500 6/4/01, William Knowles wrote: >http://www.theregister.co.uk/content/6/19404.html > >By Thomas C Greene in Washington >Posted: 04/06/2001 at 09:36 GMT > >A new tool of Fascist control, with which law-enforcement agents can >secretly monitor the entire range of a suspect's computer activity, >has been developed by self-proclaimed 'computer surveillance experts' >Codex Data Systems, according to a document sent to Cryptome.org. [snip] -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3165 From: Date: Wed Jun 6, 2001 5:43am Subject: FYI - For NSA vet, security's still a hard sell http://www.edtn.com/story/OEG20010605S0052 For NSA vet, security's still a hard sell By Terry Costlow EE Times (06/05/01, 3:08 p.m. EDT) Bill Crowell has spent his career in security, going from top civilian at the National Security Agency to president and chief executive officer of Cylink Corp., a developer of public-key security systems. But at times, he just can't help being a hacker. "I used to work where we had a facial recognition system in a briefing center," Crowell recalls. "We didn't have the images bound to the individual with a public key, so I slipped my picture into the file of the guy who did a demo of the system. He . . . couldn't figure out how I kept getting in the door saying I was him." Having executive access didn't hurt in pulling out that little trick, which also underscores a key difficulty facing security engineers. "A hacker only has to come up with one technique," Crowell points out. "The protector has to anticipate all current and future attacks." Crowell works on two fronts, to protect against attacks and to convince companies that they really need security. Crowell became boss of Cylink (Santa Clara, Calif.), a 17-year-old developer of secure networks, in 1998 after serving as vice president of product strategy. He's focusing on combinations of technology like biometrics and smart cards in pursuit of foolproof protection. "Probably the strongest security is when you have three-factor security, something like a smart card with some version of a biometric file, something you know like a password or carry like a biometric, and then something you are, the biometric," said Crowell. Though he earned a political science degree from Louisiana State University in 1962, Crowell has been in technology since he designed circuits for a local company while he was in high school. To avoid the situation he created when he slipped his own picture into someone else's file, Crowell said, those who use all three aspects of this security approach should make sure the biometric portion that people carry as a credential has been signed by someone who is trusted, the way a notary approves written signatures today. "Otherwise, people could steal your identity and insert their biometric information for yours," Crowell said. Biometrics like fingerprints and retinal or facial scans are gaining acceptance, but Crowell predicts it'll be a slow ramp, at first driven by high-end applications. "Biometrics will find its way into high-value transactions fairly quickly, when someone's doing $500,000 transactions fairly often," Crowell said. "But I don't see it being used extensively for consumer purposes or for Internet shopping very soon. It requires a large infrastructure of readers that will keep many merchants from adopting it." Cryptography doesn't require that vast infrastructure, so Crowell sees quicker acceptance. As companies vie for Web profits, he said, cryptography and smart cards offer them a potent way to get payments via the Net. "We'll see a quick ramp, particularly when people use smart cards or other tokens to authenticate themselves," Crowell said. "Those are going to be very popular for authentication, for buying software or other digitally protected files over the Internet. Things like an MP3 file or software that doesn't have to be packaged and can be delivered over the Internet could really benefit. These are areas where you want to be sure you're avoiding large-scale fraud. Most businesses do not care nearly as much about small-scale fraud." Unfortunately for Crowell and others in the security business, a lot of companies don't care much about fraud at all, at least when it comes to understanding the potential losses from fraud using the corporation's networks and electronic databases. Competing with inaction "Our No. 1 competition, without a doubt, is companies that don't do anything," Crowell said. "There's just not enough understanding in the upper echelons of business on the compelling need to install security into their business. Business models before the Internet accepted a certain amount of fraud as part of the cost of doing business. But with the Internet, fraud may be repeatable on such a large scale that it may no longer be possible to pass costs on to customers." Accepting the potenial for electronic theft was no problem when Crowell worked at NSA. Along with protecting defense communications, the agency is charged with exploiting the vulnerabilities of foreign communications. Crowell did two stints at NSA, leaving in 1989 when the Cold War's end made him think "it was time to do something else." But by the end of 1990, shortly before the Gulf War began, he was back, serving in a number of senior positions that included chief of staff and deputy director, the latter the agency's highest civilian post. He recalls NSA as "a fun place" with "some of the greatest toys you'll ever get to work with." "It's a mysterious place, but a lot of the stories about the NSA never say anything, are misleading. The movie Enemy of the State is as far from reality as you can get," he said. But if the stories are misleading at times, the tales of top secrecy also contain some truth. "In modern times, on signal intelligence, I can't talk about things," Crowell said. But, "on the historical side of signal intelligence, I was involved in making public NSA success decoding KGB messages, which were supposedly unbreakable, during World War II. That exploitation went on for 37 years." Now he's hoping that it won't take that long for the security market to take off. Eventually, Crowell said, it's likely that all corporate networks will employ some type of security. But he disagrees with those who think that it's going to happen in just a few years. "I feel it will take the better part of a decade before security is ubiquitous," Crowell said. Acceptance will come industry by industry, he predicted. "The financial industry is a good user of security not because they're more prone to security but because they have to use it, their business depends on assuring customers that fraud is rare. Finance is the No. 1 user [of security], large multinational companies like Intel are next, and the government is probably third." In the future, the medical world is likely to become a big adopter. The new Health Insurance Portability and Accountability Act is driving hospitals and medical offices to computerized record keeping, and security is a big concern for all involved. "The health industry is small for us right now," Crowell said. "They have traditionally spent little money on security and until recently spent little on IT. They used paper. It will become a large sector because regulations require health organizations to pay more attention to the privacy of medical records." Eventually, he predicts,even the companies that today couldn't care less about security will tout their protective measures. That will help them get business from around the world. "One of the remaining issues in the cyber world that really needs to be addressed is how essential security is to how we conduct business," Crowell said. "There are no borders in cyberspace. Business will go to the leanest, best companies, and security will be part of their marketing. Consumer surveys show that the majority of those who don't shop on the Internet say it's because they don't trust it." When he's not trying to thwart the criminal element, Crowell and his wife, Judy, are bikers. "My wife and I are both avid motorcyclists," Crowell said. "We'll take 3,000 to 4,000-mile trips. We also like to go fly fishing. On our latest 4,000-mile trip, we looked at a lot of rivers." When he isn't away from his San Jose, Calif., home, Crowell likes to spend his time cooking. "I cook very fancy things most every day, though I do less of it now that I'm CEO and am traveling more," he said. His business travels still keep him somewhat involved in government activities. Government agencies will continue to be closely involved in all aspects of security as they try to stay ahead of those who would steal from corporations or tap into military and government transmissions. He hopes industry and government agencies will learn how to develop technologies and techniques that benefit both sides. "There will be more and more cooperation between government and industry, in my opinion," said Crowell. John R. Angier II M-Group P.O. Box 721388 Norman, OK 73070-8070 USA 405.321.1015 A fundamental principle is never to remain completely passive, but to attack the enemy frontally and from the flank, even while he is attacking us. - Clausewitz:Principles of War, 1812 3166 From: Date: Wed Jun 6, 2001 0:52pm Subject: Interesting Product - Projects Sound AMERICAN TECHNOLOGY CORPORATION'S HSS TECHNOLOGY DEBUTS IN TRADE SHOW APPLICATION AT SUPERCOMM 2001 http://www.atcsd.com/PressReleases/06_04_01.html JV 3167 From: Steve McAlexander Date: Wed Jun 6, 2001 4:00pm Subject: FW: Why are these files on a Dell? -----Original Message----- From: scorned@h... [mailto:scorned@h...] Sent: Tuesday, June 05, 2001 18:28 To: focus-ms@s...; security-basics@s... Subject: Re: Why are these files on a Dell? interesting. this will surely freak out the conspiracy theorists who assert that Dell is 0wned by the NSA. (and i wouldn't be surprised either) why are you running an OS that is pre-installed by Dell? the first thing we do where i work is order hardware with nothing installed, so we can install our own secure loadsets. if something arrives with a pre-installed OS, we wipe it and install our own. you might want to consider building your own secure loadsets. Regards, kw >"Ed Kain" on 06/04/2001 03:22:50 PM > >To: focus-ms@s..., security-basics@s... >cc: >Subject: Why are these files on a Dell? > >Hi everyone! > >This issue was recently brought to my attention when i found DWSPYDLL.DLL >in my C:\DELL direcotry on a new lattitude notebook. This is from Desaware >(http://www.desaware.com/SpyWorksL2.htm) and the module is spyworks. >The extended functionality that this DLL provides is powerful, and made >me wonder why it is part of default Dell software. > >This started me thinking, then I found other interesting files, here's >a list; > >02/12/1999 12:49p 124,416 CLEAREVT.EXE //this clears my system logs >02/01/1994 11:25p 68,000 DWSPYDLL.DLL //this is the spyhook dll i found >01/09/2001 12:50p 40,960 KBWAKE.EXE //keyboard init? >04/13/2000 10:04a 20,480 REGCLEAN.EXE //name says it all >05/27/1999 11:29a 38,944 WDELTREE.EXE //old dos style deltree >12/01/1994 11:30a 7,508 WINBATCH.EXE //winbatch compiler > > > I contacted Dell customer support and asked if they had remote tech support >software for administration, to which several techs claim to never have been >trained if one existed, and none had heard of those files in dell computers > >(their call center dell's didn't have these files). > > I'm curious, if anyone else using a Dell product can confirm the existance >of these files, or hopefuly provide some insight as to why they are necessary. > > >TIA > >ed. Free, encrypted, secure Web-based email at www.hushmail.com 3168 From: Steve McAlexander Date: Wed Jun 6, 2001 4:12pm Subject: Does anyone in here understand Vietnamese ? Tu do hoac chet -----Original Message----- From: Michael J. Hendricks [mailto:mhendricks@c...] Sent: Wednesday, June 06, 2001 11:58 To: Incidents List Server (E-mail) Subject: FW: Tu do hoac chet We received this message yesterday. I believe it is a threat in connection with the US / Vietnam treaty's etc. Similar incidents happened during the US - China crisis. Does anyone have any introspection into this. I do not speak Vietnamese so I am at a loss. I appreciate any heads up on this. Michael Hendricks From: To:<> Sent:Tuesday, June 05, 2001 6:16 PM Subject:Tu do hoac chet > > Subject:NGA'Y THU+' NA(M, 7 THA'NG 6 NA(M 2001 Date: 4 Jun 2001 20:56:50 MDT > > Cac ban oi, Mien Nam co' ca^'n pha?i gia?i pho'ng khong ?? Gia?i pho'ng xong ho se~ mang la.i cho dda^'t nu+o+'c ta nhu+~ng gi' ??? ne^'u kho^ng pha?i la' a'p du.ng chi'nh sa'ch ho^. kha^?u dde^? kho^'ng che^' ta^'t ca? mo.i sinh ho.at cu?a ngu+o+'i da^n, ddi pha?i xin, dde^'n pha?i tri'nh.....co^.ng the^m chi'nh sa'ch gia'o du.c ba^'t co^ng ,ngu xua^?n, la^'y "ly lich" la'm thu+o+'c ddo ca(n ba?n dda~ dda^?y lu'i va khu+o+'c tu+' bao nhie^u la' ta'i na(ng tre? cu?a ca? mo^.t the^' he^. Ha^.u qu?a cu?a chi'nh sa'ch ngu da^n, i'ch ky? cu?a gio+'i la~nh dda.o csvn suo^'t 26 na(m qua, ddang ro~ ra'ng ba'y ra tru+o+'c ma('t mo.i ngu+o+'i, ddo' la' mo^.t VietNam la.c ha^.u,ddo'i nghe'o ddie^u ta'n & ddo^? na't ho^m nay ! > > Cac ban men, Yeu nuoc khong phai la tieu cuc chong doi. Yeu nuoc thi phai tich cuc hoat dong, xay du+.ng ddo^? vo, loai bo? bo.n sa^u da^n mo.t nuoc. La nguoi Viet Nam co'n yeu da^n men nuoc, hay dung len huong ung phong trao ddo'i la.i quye^'n TU DO TON GIAO, TU DO DAN CHU CHO VIET NAM dang phat dong manh trong quoc noi. > > <<<<>ma' tha'y Thi'ch Qua?ng Ddo^. cu'ng vo+'i ta^'t ca? ca'c chu+ ta(ng le^n ddu+o+'ng ra Huye^.n Nghi~a Ha'nh, ti?nh Qua?ng Nga~i dde^? ru+o+'c DDa.i La~o Ho'a Thu+o+.ng Thi'ch Huye^'n Quang tro+? ve^' Sa'i Go'n. > > NGA'Y THU+' NA(M, 7 THA'NG 6 NA(M 2001 pha?i la' nga'y ta^'t ca? mo.i to^? chu+'c dda^'u tranh chung lu+ng go'p su+'c, ho^~ tro+. su+. dda^'u tranh cu?a ca'c tha'y, cho quye^'n tu+. do to^n gia'o . > > NGA'Y THU+' NA(M, 7 THA'NG 6 NA(M 2001 pha?i la' nga'y ta^'t ca? mo.i ngu+o+'i da^n, kho^ng pha^n bie^.t Pha^.t Gia'o, Thie^n Chu'a Gia'o, Tin La'nh, Ho'a Ha?o, Cao Dda'i dde^'u quye^'t ta^m ho^~ tro+. su+. dda^'u tranh cu?a ca'c tha'y cho quye^'n tu+. do to^n gia'o . >>>>> > > THANH NIEN cac' nuoc Nam Duong, Phi Luat Tan, Dong Au va' ga^'n dda^y nha^'t la' thanh nien cua da^n to^.c thu+o+.ng du thie^?u so^' dda~ thu+'a can dda?m ddu+'ng le^n n gio'ng le^n UOC NGUYE^.N KHAO KHA'T TU+. DO cu?a ho. THANH NIEN VIET NAM CHU'NG TA HA' PHA?I CHI.U HE'N KE'M HO. SAO ????? > > NGA'Y THU+' NA(M, 7 THA'NG 6 NA(M 2001 LA' NGA'Y CO+ HO^.I CHO CA'C BA.N THAY DDO^?I VA^.N ME^.NH VA' TUONG LAI CU?A CA'C BA.N. HA~Y BA('T LA^'Y CO+ HO^.I HIE^'M CO' NA'Y....... > > Muon biet them chi tiet ve nga'y 7 THA'NG 6 NA(M 2001, ve^' nhu+~ng bie^'n ddo^.ng trong nuoc, mo+'i ca'c xem ba'i ddi'nh ke'm. > > Ne^'u vie^.c la'm na'y cu'ng quan ddie^?m cu~ng nhu+ ly' tu+o+?ng cu?a ca'c ba.n, mong ra('ng ca'c ba.n ha~y tie^'p tay chu'ng to^i chuye^?n nhu+~ng la' thu+ na'y dde^'n ddo^'ng ba'o trong nu+o+'c. > > > Chao than men. > > 3169 From: Steve Uhrig Date: Wed Jun 6, 2001 10:26pm Subject: Scam warning Hello all, A caution to anyone considering doing any business with a company in Vista CA called Plans & Kits Unlimited. Don't. They sell plans for time machines and perpetual motion machines (I am being figurative) and electronic kits. I ordered two electronic kits. The gentleman sends kits, but with no plans or any documentation at all. A note with the kits says to email him for the plans. No paper. Upon inquiring, he returns an email with a file attachment bearing an extension I've never seen before, and trying to open it crashes two different computers. I asked him to print and fax or post a paper copy of the plans, and he flat out refused. Available in electronic format only. I can BUY a CD with the viewer on it (after I've already paid for the kits) or download a special viewer from a hacker website apparently unique to whatever file format he is using. The gentleman is known to be associated with numerous hacker groups, and he runs several websites devoted to electronic harassment via the web and extensive hacker resources. All this makes me suspicious of the files, especially executables, he demands I load on my configuration-controlled machine in order to get the plans for the kits I have paid for already. It would not surprise me if something in his software does something other than let me view the plans. Read between the lines. Unfortunately, I paid for the kits via paypal, and I am fighting with them now to reverse the payment and credit me. The gentleman (I am being polite; I suspect it is a kid in his early 20s) refuses to give a refund based on the fact that I have seen his intellectual property and therefore no refund. Emails are answered sarcastically and with numerous blatant threats and references to his harassment website. Coming from a hacker, this is not cool. On top of no documentation, the kits were a few miscellaneous parts in a baggie, an UNETCHED piece of PC board, and very obviously not able to do the job claimed for them. Apparently the kit expects you to etch your own PC board also. I'm surprised he didn't give me a chunk of pencil lead and tell me to make my own resistors. I got ripped off and want to warn others who might consider dealing with this bozo. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3170 From: Date: Thu Jun 7, 2001 6:46am Subject: repost: No apologies, No regrets, No blame, No recriminations To: Subject: Crime-busting Trojan D.I.R.T. is a fraud Date: Tue, 5 Jun 2001 22:50:00 -0700 Declan, please send this out to your Politech list. Frank Jones of Codex Data Systems is selling a Trojan to law-enforcement (chiefly overseas) as a surveillance device. It enables cops to upload bogus evidence to a victim's machine with no auditing mechanism to ensure accountability. Unfortunately, I did a story on Sunday which contained some incomplete and inaccurate information, and I really need to set the record straight. thanks, tom http://www.theregister.co.uk/content/4/19480.html My recent article on the D.I.R.T. (Data Interception by Remote Transmission) Trojan, with which law-enforcement agents can secretly monitor a suspect's computer and which is marketed by surveillance outfit Codex Data Systems, contained several inaccuracies, all of which can be attributed solely to my own lapse in the skepticism for which The Reg in general, and I personally, are known. The full story, as it happens, is immensely more twisted than I imagined when I wrote my original item. Clearly, The Register's readers deserve better -- and here it is: S.C.A.M. Thanks to several e-mailed hints from readers, I continued doing background research and have now confirmed that the CEO of Codex Data Systems is one Francis Edward "Frank" Jones, a convicted felon currently on probation for illegal possession of surveillance devices. He was charged with trafficking and conspiracy to traffic in them, but in an agreement he pleaded guilty to simple possession, and the US Government dropped the other two charges. He was sentenced to three-hundred hours' community service and five years' probation with no jail time, on the strength of his argument to the court that he was not responsible for his illegal acts by reason of mental defect. He has also been required to participate in a mental-health program, which, judging by some of his recent behavior, appears to be less than a screaming success. Jones is widely regarded as a scam artist with a long history of security/surveillance snake-oil sales. He has, for example, sold bug-detection services, which we're told are completely fraudulent, involving detection apparatus easily cobbled together from the inventory of Radio Shack. He's reported to have planted a bug which he subsequently 'found' during one such charade. A Legend in His Own Mind He's also a shameless, Boswellian self-promoter with a Web site devoted to himself in his on-line incarnation, "SpyKing." Here we're told that SpyKing/Jones is "formerly in military and law enforcement service," and "a popular talk show guest with 15 appearances on national & regional programming and news specials." As for his law-enforcement experience, we've since learned that he managed to get himself fired from the New York City Police Department in 1975, according to a letter by Association of Counter-Intelligence Professionals (ACIP) Executive Director Michael Richardson. But the PR beat goes on: "Jones has lectured at M.I.T. (Massachusetts Institute of Technology) on TEMPEST computer eavesdropping techniques," his Web site claims. Indeed, "No other speaker has their thumb on the pulse of changing world trends in immerging [sic] surveillance technologies." The security 'experts' our illiterate subject has conned include hacker trivia master Winn Schwartau and AntiOnline's "JP" John Vranesevich (no surprises there), and such publications as PC World, E-BusinessWorld, TechWeek, the Wall Street Journal, and, thanks to my carelessness, The Register as well. The D.I.R.T. on the Trojan The truly inexcusable element of my first story was my failure challenge rigorously Codex's claims regarding the amazing power of its D.I.R.T. Trojan. Had I taken the time to learn that SpyKing/Jones was behind this, I would have immediately suspected that it's a lot more talk than technology. But I ran with the piece out of eagerness to work my own agenda, motivated by personal outrage that anyone would be so irresponsible as to sell a Trojan to law-enforcement and governments as a surveillance device. And the reason for that outrage survives even now; D.I.R.T. unquestionably permits police to upload bogus evidence to a suspect's machine and offers no auditing controls by which they might be caught, which was the focus of my original report. That much hasn't changed; D.I.R.T. is absolutely ripe for abuse without accountability, and Jones is utterly damnable for trying to sell it to governments and police organizations. But I was on very shaky ground in reporting its true capabilities. My subsequent investigation indicates that Codex's claim that D.I.R.T. can defeat all known PC firewalls is, quite simply, false. Furthermore, their claim that "the software is completely transparent to the target and cannot be detected by current anti-virus software," is misleading, if not completely false. There is no technology in D.I.R.T. responsible for this sort of stealth; the server isn't detected simply because no anti-virus vendor has as yet added it to their signatures catalog. Defeating D.I.R.T. My suggestions in the original article for defeating D.I.R.T. remain basically sound, if perhaps a bit over-cautious due to my mistaken belief that it defeats all known firewalls (though there is reason to believe it may defeat a few). Because it isn't presently detected by anti-virus software, one does have to look for evidence of it. By default, it installs two files in the C:\WINDOWS directory -- DESKTOP.EXE and DESKTOP.DLL. Find either of those files, and it's time to re-format your HDD. One can also check their Windows registry under: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CurrentVersion HKEY_USERS\SOFTWARE\MICROSOFT\WINDOWS\CurrentVersion HKEY_USERS\DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CurrentVersion for any references to DESKTOP.EXE or DESKTOP.DLL. For those not intimately acquainted with the incontinent complexities of the Windows Registry, it would be best simply to search the entirety for references to both files mentioned. (It's also worthwhile to check out some of the suggestions in my previous report.) Now, because those file names are defaults which can be modified by savvy operators, I'm not saying, 'if you can't find the files, then you're not infected.' The names can be changed; but we can rely on the fact that most operators will be using D.I.R.T. in its default configuration -- after all, its chief selling point is that it can be used successfully by the technically illiterate. One final point regarding defenses against the Trojan: soon after I posted the first article recommending disk re-formats for those unsure how to combat D.I.R.T., which was mentioned and linked at Cryptome.org, a reader submitted the following warning: "D.I.R.T. uses 'unused' space in the file system, so high-level reformatting will not destroy it. (This 'unused' space is used by operating systems to handle classified information with data structures similar to that in SE_Linux). Removing D.I.R.T. requires wiping the disk at the device-driver level." I spoke with Eric Schneider, who wrote the program before leaving Codex on ethical grounds; and he told me that so far as he knows "there is no technology in D.I.R.T. which comes close to surviving a high-level format." So there you have it. Codex's D.I.R.T. is a remote administration tool that functions in large part just like the free Trojans SubSeven and BO2K, which is being sold by a disgraced former cop, current felon and self-confessed lunatic for thousands of dollars a pop to creepy Feds in countries where the sort of abuse it invites is routine and impossible for a victim to challenge in court. In all, a loathsome scam run by an equally loathsome con artist. Æ ------------------------------------------------------------------------- > > POLITECH -- Declan McCullagh's politics and technology mailing list > > You may redistribute this message freely if you include this notice. > > To subscribe, visit http://www.politechbot.com/info/subscribe.html > > This message is archived at http://www.politechbot.com/ 3171 From: Robert G. Ferrell Date: Thu Jun 7, 2001 11:04am Subject: Re: repost: No apologies, etc. > My recent article on the D.I.R.T. (Data Interception by Remote Transmission) > Trojan, with which law-enforcement agents can secretly monitor a suspect's > computer and which is marketed by surveillance outfit Codex Data Systems, > contained several inaccuracies, all of which can be attributed solely to my > own lapse in the skepticism for which The Reg in general, and I personally, > are known. Told ya. ;-) Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 3172 From: James M. Atkinson, Comm-Eng Date: Thu Jun 7, 2001 11:33am Subject: The Hi-tech Spy Wednesday, 4 April, 2001, 11:24 GMT 12:24 UK The Hi-tech Spy http://news.bbc.co.uk/hi/english/world/asia-pacific/newsid_1259000/1259940.stm James Bond's briefcase looks decidedly low-tech compared to today's equipment http://news.bbc.co.uk/olmedia/1255000/images/_1259940_briefcase300.jpg The American spy plane forced to land in China was chock-full of electronic surveillance equipment. Today, espionage is all about who has the best technology. The diplomatic fallout surrounding an American spy plane forced to land on Chinese soil has again highlighted Washington's desire to keep a watch on the rest of the world. It's also a reminder that when it comes to intelligence gathering, the hackneyed image of a crafty spy with a miniature camera is somewhat out of date. So what sort of hi-tech practices do governments favour these days if they want to keep tabs on foreign powers? Satellite listening The widely acknowledged leader in this field is Echelon, a network of listening posts run by the United States National Security Agency (NSA) and located in America, Canada, Australia, New Zealand and the UK. While the idea of such a network was first agreed between London and Washington in 1948, for years the US denied its existence. It was eventually confirmed in declassified NSA documents. Echelon's capabilities are awesome. Relying on a network of American satellites, the system picks up microwave signals used by mobile phones. At any one time, millions of calls are recorded and then checked against a powerful search engine designed to pick out key words that might represent a security threat. Its work has been effective in tracking down terrorists but, says Ian Synge of Jane's Sentinel, most governments have started to shy away from microwave communication. Underwater bugging Alongside Echelon the idea of physically sticking bugs on underwater communication cables looks remarkably hands-on. Yet experts speculate it still goes on. During the 1970s, Soviet ports were secretly infiltrated by an American "spy submarine" with deep-sea divers on-board, who attached listening devices to telephone cables. After several weeks the divers returned to the scene and picked up the device, along with many hours of taped conversations. Animosity between America and Russia has declined, but according to the investigative reporter and surveillance expert Duncan Campbell the US still maintains a submarine specially equipped for such duties. Likely targets may include those in the Middle East, Mediterranean, eastern Asia, and South America, says Mr Campbell. Computer bugging While the right to monitor e-mail and internet activity is openly defended by the likes of the British government, more underhand methods can be used to track computer use. Latest advances in listening technology mean that if a bug can be attached to a computer keyboard it is possible to monitor exactly what is being keyed in. Because every key on a computer has a unique sound when depressed, it's simply a case of translating the clicks into words. The threat of this technology has led some internet banks to rely on a degree of mouse movement. Visual spy satellites Spy satellites revolutionised US intelligence gathering intelligence during the Cold War. Washington had relied on high-altitude reconnaissance aircraft, such as the U-2, to gather photographs of Russian and Chinese military installations. As well as being vulnerable to ground fire, the U-2 fleet could only cover so much distance. The maiden mission of the Corona photo-satellite in 1960 collected more images than the whole U-2 program had taken in four years, according to Jeffrey Richelson, author of America's Secret Eyes in Space. Unfortunately, Corona could not transmit its pictures back to base - its film fell to earth in a capsule. Great advances in satellite technology have followed, but Ian Synge says stories that they can read a newspaper headline from hundreds of miles up are probably apocryphal. Nevertheless, spy satellites remain a valuable source of intelligence. Even commercial satellites have an image resolution of one metre - easily good enough to track the movement of tanks and most military hardware. Radar imaging can pierce cloud cover and even expose subterranean development - useful if you suspect the enemy of stockpiling arms underground. Laser microphones Why have so many government offices got net curtains? One reason is that without them spies would be able to eavesdrop on top-secret conversations almost effortlessly. Laser microphones can pick-up conversations from up to a kilometre away by monitoring window vibrations. Curtains are a simple antidote, since they help absorb the sound and so corrupt any signal. Despite the fact computer technology has led to quantum leaps in intelligence gathering, low-tech still has its place. "One of the favourite stories I once heard from the Cold War was the KGB lesson that you could do one of two things to find out what the president's advisers are saying," says Ian Synge. "One was to find a sympathetic source inside the White House who could feed you information. The other was to take out a subscription to the New York Times." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3173 From: A Grudko Date: Wed Jun 6, 2001 1:21pm Subject: Bug-blaster We appear to agree that EMP is pretty impressive, killing a high percentage of discrete component devices & probably most 'bugs'. So how about creating a physical/biological non-destructive artificial EMP? Typical application - I have a client that built an office block here. We were called in to sweep the building twice before it was completed and once after. How nice to hit a 'kill' button in the first 2 stages. I have a feeling that the equipment box might have to carry a government health warning... Andy Grudko. D.P.M., Grad I.S, (S.A.) Grudko Associates - Crime investigation, intelligence and protection Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom - "When you need it done right - first time" 3174 From: Steve Weinert Date: Thu Jun 7, 2001 1:54pm Subject: Re: Scam warning Politely inform him that you will return his kits and files (unopened) for a full refund, or you will turn it over for prosecution. If he mailed you anything, all the better - then you can use postal inspectors. If not, take him to small claims court - now. You may never get a satisfaction of the almost automatic judgement in your favor, but then tell him you will send copies to all three major credit bureaus, PayPal (x.com), the BBB and so on.... He may piss and moan, but you should have your monies pretty quick, or at least you'll have a lot of fun on his expense. I would also ask a judge to intercede on his threats. Good luck! (I'm not an attorney, but have been in a similar situation). --- In TSCM-L@y..., "Steve Uhrig" wrote: > Hello all, > > A caution to anyone considering doing any business with a > company in Vista CA called Plans & Kits Unlimited. > > Don't. > > They sell plans for time machines and perpetual motion machines > (I am being figurative) and electronic kits. > > I ordered two electronic kits. > > The gentleman sends kits, but with no plans or any documentation > at all. A note with the kits says to email him for the plans. No > paper. > > Upon inquiring, he returns an email with a file attachment > bearing an extension I've never seen before, and trying to open > it crashes two different computers. > > I asked him to print and fax or post a paper copy of the plans, > and he flat out refused. Available in electronic format only. I > can BUY a CD with the viewer on it (after I've already paid for > the kits) or download a special viewer from a hacker website > apparently unique to whatever file format he is using. > > The gentleman is known to be associated with numerous hacker > groups, and he runs several websites devoted to electronic > harassment via the web and extensive hacker resources. > > All this makes me suspicious of the files, especially > executables, he demands I load on my configuration-controlled > machine in order to get the plans for the kits I have paid for > already. It would not surprise me if something in his software > does something other than let me view the plans. Read between > the lines. > > Unfortunately, I paid for the kits via paypal, and I am fighting > with them now to reverse the payment and credit me. > > The gentleman (I am being polite; I suspect it is a kid in his > early 20s) refuses to give a refund based on the fact that I > have seen his intellectual property and therefore no refund. > Emails are answered sarcastically and with numerous blatant > threats and references to his harassment website. Coming from a > hacker, this is not cool. > > On top of no documentation, the kits were a few miscellaneous > parts in a baggie, an UNETCHED piece of PC board, and very > obviously not able to do the job claimed for them. Apparently > the kit expects you to etch your own PC board also. I'm > surprised he didn't give me a chunk of pencil lead and tell me > to make my own resistors. > > I got ripped off and want to warn others who might consider > dealing with this bozo. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* 3175 From: Marcelrf Date: Thu Jun 7, 2001 4:21pm Subject: FORD MOTOR CORP CHANGES THEIR NAME.. FORD MOTOR CORP. CHANGES THEIR NAME.. (Detroit)- Ford Motor Corppration will now be known as "Fords-Overturn-Repeatedly-Daily" -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 3176 From: Date: Fri Jun 8, 2001 2:28am Subject: RE: Vietnamese translation RE : Vietnamese translation; L&H Simply Translating Deluxe-Introduction - L&H Lernout and Hauspie Corporation provides various speech translation software services capable of interpreting 40+ languages. Cost $99.00 USD. ATT provides realtime speech translation services at a cost of $7.50 per minute. HAVE A GREAT DAY !!! ---------- http://www.lhsl.com/simplytranslating/deluxe/ [Non-text portions of this message have been removed] 3177 From: William Knowles Date: Fri Jun 8, 2001 4:56am Subject: [ISN] Trojan vendor dishes the Dirt (fwd) ---------- Forwarded message ---------- Date: Fri, 8 Jun 2001 02:08:07 -0500 (CDT) From: InfoSec News To: isn@s... Subject: [ISN] Trojan vendor dishes the Dirt http://www.vnunet.com/News/1122902 By James Middleton 07 Jun 2001 Codex Data Systems, marketers of the controversial Dirt Trojan, has rubbished claims that the product does not actually exist. Eddie James, vice president of Codex, told vnunet.com: "Dirt has been available since 1998. It is in use by a number of law enforcement agencies." James also claimed that organisations such as Nato and the Hi-tech Crime Investigators Association have expressed interest in the product. "The only reason it is of interest now is because someone got hold of a marketing presentation that was not for public disclosure. In fact, the product's existence was not meant to be public knowledge," he said, adding that "if we find that person we will file a criminal complaint through the Secret Service". James said that he would "love to demonstrate the tool", but since vnunet.com is not an officially recognised law enforcement agency, he could not. The reputation of Codex has been called into question after it was revealed by UK news website theregister that company chief executive Frank Jones is a convicted felon and known fraudster currently on probation for illegal possession of surveillance devices. James was forced to acknowledge that the only reason Dirt is undetectable by antivirus software is because no antivirus company has ever seen it, and that it could only be used as a "last resort" tool after obtaining a court order. As for the ability to bypass firewalls, done by killing the process in the operating system, there is no explanation as to how it attacks the firewall in the first place. However, Paul Rogers, network security analyst at MIS, who has met the company, said he was very impressed with the standard of keyloggers Codex offered, but as he had not seen Dirt in action, he remained sceptical. The rumours have also been fuelled by newsgroup postings from people claiming to have seen demonstrations of Dirt. One such posting on the Cypherpunk Hyperarchive said that Dirt it is "not much more than BackOrifice, NetBus, VNC or PC Anywhere, for that matter". "It has a bit more capability than some of those, in that it will act as something similar to an FTP server and a keystroke capture tool. But any programmer with 2nd year C programming and a Win32 compiler can download VNC and add stuff to it to do the same thing," it added. ISN is hosted by SecurityFocus.com --- To unsubscribe email isn-unsubscribe@S.... 3178 From: Andrus Aaslaid Date: Fri Jun 8, 2001 5:20am Subject: RE: Scam warning > They sell plans for time machines and perpetual motion machines > (I am being figurative) and electronic kits. > > I ordered two electronic kits. > > /---/ > > The gentleman is known to be associated with numerous hacker > groups, and he runs several websites devoted to electronic > harassment via the web and extensive hacker resources. World works the funny way. Google web cache (http://www.google.com/search?q=cache:bvTE_pYI2TM:www.siin.com/contact.html+plans+%26+kits+unlimited+vista&hl=en) shows the same venture providing also sweep services as Spectrum Investigations, http://www.siin.com/ ... This address has been removed from their active webpage, that is why I am referensing the cached content. Regards, Andrus. 3179 From: Dawn Star Date: Sun Jun 10, 2001 0:59pm Subject: Web bug detector Anybody know what this website is about and what it does? I just don't have time to check it out. Roger http://www.bugnosis.org/ 3180 From: Talisker Date: Sun Jun 10, 2001 3:18pm Subject: Re: Bug-blaster Andy I think I may have killed to birds with one stone. Bird one = EMP, Bird 2 = Echelon 1. I remember seeing an article on DIY HERF bombs Q3 last year, the fear was that terrorists etc could use these to take out big chunks of cities electronic infrastructure, I've done a quick search on google though and can't find it. I'll dig through my mail later. 2. If echelon exists then I suspect my search would almost certainly have got the cogs whirring, hang on my IDS just went beserk and there's a knock at the door. ;o) http://www.networkintrusion.co.uk Talisker's Network Security Tools List Security Tools Notification http://groups.yahoo.com/group/security-tools/join ----- Original Message ----- From: "A Grudko" To: Sent: Wednesday, June 06, 2001 7:21 PM Subject: [TSCM-L] Bug-blaster > We appear to agree that EMP is pretty impressive, killing a high percentage > of discrete component devices & probably most 'bugs'. > > So how about creating a physical/biological non-destructive artificial EMP? > > Typical application - I have a client that built an office block here. We > were called in to sweep the building twice before it was completed and once > after. > > How nice to hit a 'kill' button in the first 2 stages. > > I have a feeling that the equipment box might have to carry a government > health warning... > > Andy Grudko. D.P.M., Grad I.S, (S.A.) > Grudko Associates - Crime investigation, intelligence and protection > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel. Agents in 41 countries - www.grudko.com - (+27 11) 465 > 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SAMLF, SCIP (Past SA Chairman), > UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom - "When you need it done right - > first time" > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3181 From: Talisker Date: Sun Jun 10, 2001 3:31pm Subject: Re: Web bug detector Roger The "bugs" track your visits to various sites, they are installed on the visited websites, not on your PC. To be honest as the websites have logs already which contain a whole host of information, web bugs or not. I wouldn't worry too much. I suspect the civil liberties people will be screaming at this invasion into their privacy. Personally as I don't do porn etc I feel the effort of remaining anonymous to be not worth the effort. I also worry about downloading any untrusted software from the net. Considering the potential threat of doing so to far outweigh the intelligence gleaned from my visits to catlitter.com (please tell me it doesn't actually exist as a beastiality site) Take Care Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List Security Tools Notification http://groups.yahoo.com/group/security-tools/join ----- Original Message ----- From: "Dawn Star" To: Sent: Sunday, June 10, 2001 6:59 PM Subject: [TSCM-L] Web bug detector > Anybody know what this website is about and what it does? I just don't have > time to check it out. Roger > > http://www.bugnosis.org/ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > From: Date: Fri Jun 4, 2004 11:44am Subject: Wardriver pleads guilty in Lowes WiFi hacks Wardriver pleads guilty in Lowes WiFi hacks By Kevin Poulsen, SecurityFocus Jun 4 2004 1:04PM In a rare wireless hacking conviction, a Michigan man entered a guilty plea Friday in federal court in Charlotte, North Carolina for his role in a scheme to steal credit card numbers from the Lowe's chain of home improvement stores by taking advantage of an unsecured wi-fi network at a store in suburban Detroit. Brian Salcedo, 21, faces an a unusually harsh 12 to 15 year prison term under federal sentencing guidelines, based largely on a stipulation that the potential losses in the scheme exceeded $2.5 million. But Salcedo has agreed to cooperate with the government in the prosecution of one or more other suspects, making him eligible for a sentence below the guideline range. One of Salcedo's two codefendants, 20-year-old Adam Botbyl, is scheduled to plead guilty Monday, assistant U.S. attorney Matthew Martins confirmed. Botbyl faces 41 to 51 months in prison, but also has a cooperation deal with the prosecutors, according to court filings. The remaining defendant, 23-year-old Paul Timmins, is scheduled for arraignment on June 28th. In 2000, as a juvenile, Salcedo was one of the first to be charged under Michigan's state computer crime law, for allegedly hacking a local ISP. According to statements provided by Timmins and Botbyl following their arrest, as recounted in an FBI affidavit filed in the case, the pair first stumbled across an unsecured wireless network at the Southfield, Michigan Lowe's last spring, while "driving around with laptop computers looking for wireless Internet connections," i.e., wardriving. The two said they did nothing malicious with the network at that time. It was six months later that Botbyl and his friend Salcedo hatched a plan to use the network to steal credit card numbers from the hardware chain, according to the affidavit. FBI Stakeout The hackers used the wireless network to route through Lowe's corporate data center in North Carolina and connect to the local networks at stores in Kansas, North Carolina, Kentucky, South Dakota, Florida, and two stores in California. At two of the stores -- in Long Beach, California and Gainseville, Florida -- they modified a proprietary piece of software called "tcpcredit" that Lowe's uses to process credit card transactions, building in a virtual wiretap that would store customer's credit card numbers where the hackers could retrieve them later. At some point, Lowe's network administrators and security personnel detected and began monitoring the intrusions, and called in the FBI. In November, a Bureau surveillance team staked out the Southfield Lowe's parking lot, and spotted a white Grand Prix with suspicious antennas and two young men sitting inside, one of them typing on a laptop from the passenger seat, according to court documents. The car was registered to Botbyl. After 20 minutes, the pair quit for the night, and the FBI followed them to a Little Ceasar's pizza restaurant, then to a local multiplex. While the hackers took in a film, Lowe's network security team poured over log files and found the bugged program, which had collected only six credit card numbers. FBI agents initially identified Timmins as Botbyl's as the passenger in the car, apparently mistakenly, and both men were arrested on November 10th. Under questioning, Botbyl and Timmins pointed the finger at Salcedo. Timmins had allegedly provided the two hackers with an 802.11b card, and had knowledge of what his associates were up to. Botbyl and Timmins, known online as "noweb4u" and "itszer0" respectively, are part of the Michigan 2600 hacker scene -- an informal collection of technology aficionados. The Lowe's wi-fi system was installed to allow scanners and telephones to connect to the store's network without the burden of cables, according to the indictment. < http://www.securityfocus.com/news/8835 > [Non-text portions of this message have been removed] 8807 From: Date: Fri Jun 4, 2004 2:19pm Subject: Fwd: Returned mail: User unknown [Non-text portions of this message have been removed] 8808 From: Date: Fri Jun 4, 2004 2:59pm Subject: Judge bars molestation evidence Judge bars molestation evidence What a dad heard when he picked up a phone threatens case against accused coach The Associated Press Friday, June 4, 2004 STANARDSVILLE - Virginia's law against wiretapping may hamper efforts to prosecute a gymnastics coach charged with molesting a Spotsylvania County teenager. The girl's father learned of the alleged sexual abuse in February 2003 when he picked up an extension phone in his bedroom and heard his daughter and her boyfriend talking about it. Greene County Circuit Judge Daniel R. Bouton ruled last week that evidence stemming from the conversation inadmissible because the call was illegally intercepted. The father, whose name is being withheld by The Associated Press to protect his daughter's identity, said Wednesday that he was stunned by the judge's ruling. He said he picked up the phone only because he heard his daughter crying in her room, and he wanted to end the call. "I did it in an instinctive, protective mode as a father," the man said in a telephone interview. "Any law that will not allow a father to make the protection of his child the first and foremost priority needs to be evaluated." Glen Allen Wolters, 29, is charged with forcible sodomy and taking indecent liberties with a minor. Several legal experts, though unfamiliar with the specifics of the Wolters case, told The Free Lance-Star of Fredericksburg that they had never seen the state's wiretapping law applied in this manner. University of Virginia law professor Earl Dudley Jr. said the law would have been broken if police investigated the case using only the father as a source. But because the daughter came forward on her own, the law should not apply, Dudley said. "My instinct, without having done any research, is that the argument doesn't fly. But if the judge buys it, they've got a winner." Roger Groot, a Washington and Lee University law professor, said a law's wording does not always reflect the way it was intended to be interpreted. The father's actions qualify as an interception under the statute as it is written, he said. "That's what the legislators said," Groot said. "It may not be what they mean, but it's what they said." Greene County Commonwealth's Attorney Ron Morris, who is trying the Wolters case, said the law in question was probably designed to prevent police misconduct. "They [lawmakers] cast a broad net to prohibit certain types of conduct," Morris said. "This probably was conduct they didn't want to include, but they did because of the language." Bouton will conduct a hearing Monday to determine if any other evidence, including the girl's own testimony, can be used in the case. The girl has told detectives that Wolters forced her to perform oral sex in July 2001 while he was driving her to a gymnastics camp at James Madison University. Investigators determined the incident occurred in Greene County. The girl was 14 at the time. [Non-text portions of this message have been removed] 8809 From: Bill Bennett Date: Fri Jun 4, 2004 1:44pm Subject: RE: The Humble CPM-700 Hi Jim, What is the price on the humble CPM-700? Bill Bennett -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Thursday, June 03, 2004 7:57 PM To: TSCM-L Subject: [TSCM-L] The Humble CPM-700 If anybody on the list is interested on some of these give me a call, or send an email. It's now available with coverage to 12 GHz., with a price low enough that any TSCM'er should have at least two of three. I take all major credit cards, cash, checks, gold coins, 5 gallon cans of diesel fuel, chicken, goats, etc. -jma ---------------------------------------------------------------------------- ------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8810 From: R. Snyder Date: Fri Jun 4, 2004 3:33pm Subject: phone fix: perhaps not an urban legend If one goes far enough back in telephone history, it's possible that the "phone fix" story was not an urban legend. While a telephone ringer is typically wired across the tip and ring conductors, back in the days of party line telephone service, two subscribers were connected to the same cable pair (tip and ring) with one subscriber's ringer wired from tip to ground and the other subscriber's ringer wired from ring to ground. The ringing voltage was applied to the appropriate conductor (either tip or ring) depending upon which party line subscriber's number had been dialed. What makes such a scenario even more plausible is that there was no mention in the story of massive amounts of static in the voicepath, which typically occurs when tip or ring is grounded through a wet fault. Instead, the high impedance of the ringer at voice frequencies, due to its property of being a low-pass filter, would have yielded the symptoms described without necessarily imposing overwhelming static on the voicepath. Therefore, I'd guess the story was true, but probably occurred many decades ago, as all of the details would be precisely technically correct in the context of a party line or other grounded-ringer system. __________________________________ Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger. http://messenger.yahoo.com/ 8811 From: delta Date: Mon Jun 5, 2000 1:59am Subject: Re: New Icom R-20 scanner....useful for counter/surveillance ? hello everybody here is a link to see the icom icr20 and the price is very low http://www.universal-radio.com/catalog/widerxvr/0020.html david from paris 8812 From: Date: Sun Jun 6, 2004 2:41am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 8813 From: Steve Uhrig Date: Sun Jun 6, 2004 5:58pm Subject: Virus sent to this list Earlier this morning, the monthly mission text file was mailed to all members of this list. My server trapped that file as having a virus attached, and deleted it. I since have verified with other list members who did download the file that their virus protection trapped a virus this morning on the same file. This was not a problem unique to me and is not a false alarm. IMPORTANT -- If you downloaded the mission file from this list within the last day, and your virus protection did not trap a virus attachment, YOU WELL MAY HAVE A VIRUS. I don't know why attachments are coming through as they have been prohibited on most lists for precisely these reasons. Attachments are not archived on yahoo's website and they strongly discourage them from being allowed, although they do not (yet) prohibit them. If you are not running a late version of virus protection, preferably Norton, and have not updated your definitions within the last day, I strongly recommend you obtain, install, update and run Norton Antivirus. When you update, keep updating until there are no more updates. It may take 5 or more updates to get them all. On a new installation, you don't get all updates with the first attempt. Norton lately has been releasing updated virus definitions twice a day on average. Even if you have automatic update enabled, new viruses and definitions may pop up more quickly than your auto update protects you. It's harmless and only takes a few seconds to manually update a few times a day, and it's worth the effort. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8814 From: James M. Atkinson Date: Sun Jun 6, 2004 6:30pm Subject: Re: Virus sent to this list Nope, The group still is set to reject attachments, so the virus did not come from the list. Also, there were no attachments to the mission file as it is a 7-bit text file, and thus incapable of having an executable. I also checked the version that came in on this end, and there were no attachments, or any virus issues. -jma At 06:58 PM 6/6/2004, Steve Uhrig wrote: >Earlier this morning, the monthly mission text file was mailed to all >members of this list. > >My server trapped that file as having a virus attached, and deleted it. > >I since have verified with other list members who did download the file >that their virus protection trapped a virus this morning on the same >file. This was not a problem unique to me and is not a false alarm. > >IMPORTANT -- > >If you downloaded the mission file from this list within the last day, >and your virus protection did not trap a virus attachment, YOU WELL MAY >HAVE A VIRUS. > >I don't know why attachments are coming through as they have been >prohibited on most lists for precisely these reasons. Attachments are not >archived on yahoo's website and they strongly discourage them from being >allowed, although they do not (yet) prohibit them. > >If you are not running a late version of virus protection, preferably >Norton, and have not updated your definitions within the last day, I >strongly recommend you obtain, install, update and run Norton Antivirus. > >When you update, keep updating until there are no more updates. It may >take 5 or more updates to get them all. On a new installation, you don't >get all updates with the first attempt. > >Norton lately has been releasing updated virus definitions twice a day on >average. Even if you have automatic update enabled, new viruses and >definitions may pop up more quickly than your auto update protects you. >It's harmless and only takes a few seconds to manually update a few times >a day, and it's worth the effort. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8815 From: Steve Uhrig Date: Sun Jun 6, 2004 6:48pm Subject: Re: Virus sent to this list Once upon a midnight dreary, James M. Atkinson pondered, weak and weary: > The group still is set to reject attachments, so the virus did not come > from the list. You attached a PDF a day or two ago and that wasn't an accident. And you or someone changed the 'reply to' option so replies went to the list instead of to the originator as they have been for years. Maybe you didn't change it, but someone did. Yahoo is in the process of changing hands, changing servers and have mailed (I thought) all list owners. Some of my lists now have the word 'finance' in the URL for all Yahoo-originated traffic. They are converting only certain lists at this time. > Also, there were no attachments to the mission file as it is a 7-bit text > file, and thus incapable of having an executable. I know the file is sent automatically from Yahoo as I have the same things set up on my lists. You didn't send it and maybe you didn't do anything, but the message this morning had a virus attached for at least six members, and that's only within the few hours we've been discussing it. Enough people now have mailed me directly to confirm. Five so far. And my server doesn't lie. The file had a virus attached. I don't know why some would receive the attachment and not others. > I also checked the version that came in on this end, and there were no > attachments, or any virus issues. Do you have your server set to filter and delete viruses at the server level like I do? If I didn't see a service message from my server I wouldn't have known. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8816 From: Michael Puchol Date: Sun Jun 6, 2004 8:14pm Subject: Re: Re: Virus sent to this list Hi, I can confirm that my Norton flagged it and automatically deleted the attachment as a virus too - I have not kept it, but the message will still be in the trash file, I'll dig it up again to see what happened. I believed it was Norton's error, as it sometimes flags emails/attachments as viruses when they are not. This is very rare, but it can happen. Lesson of the day: no matter which source an email comes from, if it has an attachment, scan it. Steve's advice couldn't have been said better. Patch thy systems, update thy antivirus, frequently. Better also, read all email as plain text, rather than HTML. Most email clients have this setting, which can make some emails look ugly, but you'll be spared of the security problems HTML email has. I've also noticed that the last couple of days I've had strange join requests on a Yahoo! group I manage, sent them a quick confirmation request email, but no answer. I'm not sure what could be going on, but never doubt that people like Yahoo! also have Gaping Security Holes, which could be affecting yours and everyone else's lists and groups, and one would be none the wiser. Regards, Mike 8817 From: kondrak Date: Sun Jun 6, 2004 8:57pm Subject: Berlin Tunnel web links Fwd from another list I'm on.... >While responding to an inquiry, I came across a couple of links which might >be of interest: > >A CIA web page with some information about the project, and several >interesting source documents: >http://www.cia.gov/csi/books/17240/art-7.html . > >And a page referencing books and articles on the topic: >http://intellit.muskingum.edu/cia_folder/cia50s_folder/cia50stunnel.html 8818 From: Steve Uhrig Date: Sun Jun 6, 2004 9:06pm Subject: Re: Virus sent to this list Once upon a midnight dreary, Michael Puchol pondered, weak and weary: > I can confirm that my Norton flagged it and automatically deleted the > attachment as a virus too - I have not kept it, but the message will > still be in the trash file, I'll dig it up again to see what happened. > I believed it was Norton's error, as it sometimes flags > emails/attachments as viruses when they are not. This is very rare, but > it can happen. I don't believe it was a Norton error, as my server flagged it. We pay USD $30 for Norton. The people who run my server pay a lot more than that for high end heuristic antivirus software. So something much more elaborate than Norton flagged it too. And while I didn't inquire, I doubt if all the people who mailed me off list were using Norton. Norton does flag on double extensions, like filename.ex1.ex2, even when those are legitimate files. Those are the only false positives I've seen. > Lesson of the day: no matter which source an email comes from, if it has > an attachment, scan it. Steve's advice couldn't have been said better. > Patch thy systems, update thy antivirus, frequently. Better also, read all > email as plain text, rather than HTML. Most email clients have this > setting, which can make some emails look ugly, but you'll be spared of the > security problems HTML email has. To change the HTML settings, go to Email Preferences here: http://groups.yahoo.com/group/TSCM-L and while you're at it, check your mail preferences to make sure all spam options are turned off. > I've also noticed that the last couple of days I've had strange join > requests on a Yahoo! group I manage, sent them a quick confirmation > request email, but no answer. I'm not sure what could be going on, but > never doubt that people like Yahoo! also have Gaping Security Holes, which > could be affecting yours and everyone else's lists and groups, and one > would be none the wiser. A number of Yahoo lists have been extremely heavily spammed lately, somehow by nonmembers spoofing legitimate member's addresses. I'm talking hundreds of messages. The only suggestion Yahoo has is to moderate the list, which is not practical for some of the busy lists with fifty or more messages a day. Best solution is as Mike says, not allow HTML, do not allow attachments to open automatically, run decent antivirus and update it very frequently and the standard stuff we've discussed over and over. And over. Recently I read a report stating less than half of Internet users run any sort of antivirus, and of those who do, about half have never updated their definitions. Antivirus without current definitions does you little good, and remember a definition cannot be written and disseminated until *after* the virus already has been trapped off the web somewhere. Not using your browser as an email client, and using non-Microsoft browsers and email clients also are excellent ideas. I use Pegasus www.pmail.com for email and Opera www.opera.com as a browser. Both for all practical purposes are immune to security attacks unless you do something incredibly stupid like opening unknown attachments. And using a utility like Mailwasher www.firetrust.com will keep you from downloading stuff you don't want and over time will kill spam. Using Mailwasher, I download zero spams. Not a few, but zero. Worth the little bit of extra overhead it takes to use. If anyone decides to use it, you can grab some canned filters off the website to start with which are 90% effective. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8819 From: A Grudko Date: Mon Jun 7, 2004 2:43am Subject: 164.725 On a sweep last week I found a room transmitter on 164.725 NBFM. I'd guess it is a 10 Mw output device. It is well concealed and for tactical and evidential reasons we have not dug it out of it's hiding place. This freq. is not on any of my manufacturers' lists so it might be a custom unit, but I thought someone might have come across it before and have some info on manufacturer/dealers/agents? Andy Grudko (British), DPM, Grad IS (South Africa) Consulting Investigator, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , andy@g... Pretoria (+27 12) 244 0255 - 244 0256 (Fax) Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.692 / Virus Database: 453 - Release Date: 2004/05/28 [Non-text portions of this message have been removed] 8820 From: Steve Weinert Date: Mon Jun 7, 2004 6:51am Subject: RE: Re: Virus sent to this list > -----Original Message----- > From: Steve Uhrig > Sent: Sunday, June 06, 2004 9:07 PM > To: tSCM-L@yahoogroups.com > Subject: [TSCM-L] Re: Virus sent to this list > > > Once upon a midnight dreary, Michael Puchol pondered, weak and weary: > > > I can confirm that my Norton flagged it and automatically deleted the > > attachment as a virus too - I have not kept it, but the message will > > still be in the trash file, I'll dig it up again to see what happened. > > I believed it was Norton's error, as it sometimes flags > > emails/attachments as viruses when they are not. This is very rare, but > > it can happen. > > I don't believe it was a Norton error, as my server flagged it. The version that arrived here was sans attachment. Neither Trend nor Panda products noted anything amiss. Puzzled why some received an attachment and other none.. .... > A number of Yahoo lists have been extremely heavily spammed lately, > somehow by nonmembers spoofing legitimate member's addresses. I'm talking > hundreds of messages. The only suggestion Yahoo has is to moderate the > list, which is not practical for some of the busy lists with fifty or > more messages a day. I've had to put hobbyist groups onto full moderated rather than allowing the spam/spoofs to freely traffic. A pain, but I figure the delay for my (or one of my two assistant moderators) intervention to clear posts is better than the alternative. The access to Yahoo by spoofed spam is surprising, and one list member pondered what the fee payable to Yahoo Groups for this sort of access is? I've a template message that I forward every spam that a Yahoo Member posts on a list to Yahoo. Several were members never added to the list by moderator action, yet mysteriously they somehow are able to join (how much and who do they pay for this?). As the service is without out of pocket costs there is a limit to the complaining one can do. It is worth remembering to export memberlists and archive any traffic, files and photos that would be useful if your list disappears some night into the vapors of the net ether... > Not using your browser as an email client, and using non-Microsoft > browsers and email clients also are excellent ideas. I use Pegasus > www.pmail.com for email and Opera www.opera.com as a browser. Both for > all practical purposes are immune to security attacks unless you do > something incredibly stupid like opening unknown attachments. I've alternated between Opera and Firefox (the renamed Mozilla Phoenix Browser). Have also been known to use a Linux box with the same. Appreciate the recommendation on Pegasus - I'll check it out. Have been using MailDaemon (Alt-N's thing) for inhouse, but they seem more interested in screwing around adding unwanted features in order to hold one hostage for upgrade fees or upgrade protection licensing. Do you have experience with the Mercury side of Pegasus? Wondering if this might be an alternative. Thanks! Steve W 8821 From: delta Date: Wed Jun 7, 2000 4:20am Subject: m1 optoelectronics ??? hello everybody i bought the m1 optoelectronics unit counter and i would like to know the possibility to see a carier current bug or something else with this unit because it work with the probe from 50 hz to 10 mhz ? can i use it to see something else than a frequency between 10 mhz to 2.8ghz in our sweep job ? any suggestion about this unit ? here is the link to see it http://www.optoelectronics.com/m1.htm many thanks david from paris 8822 From: James M. Atkinson Date: Mon Jun 7, 2004 8:17am Subject: Fair Warning - Reply-to Option Changed Please be advised that I have modified the group settings so that when you respond to a message from the TSCM-L group the response will go back to the list, and not just the original post. If you desire to privately respond to a post you will need to go to the "To:" header of your message, and remove the reference back to the list. This list exists to foster communications within the profession, so let's keep the traffic flowing, and let's keep the conversations and topics following back to the list. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8823 From: James M. Atkinson Date: Mon Jun 7, 2004 8:40am Subject: RE: Re: Virus sent to this list [Probable Virus Hoax] If any member of the list received an attachment when the mission.txt file came in I would appreciate it if they privately sent me a copy of the attachment. If your running Norton Anti-Virus, and Norton deleted the message there will still be an error message referenced in the headers so I would appreciate it if you could send me the error message as well as the original post with references back to the attached error message. These message will still exist or be referenced in the headers even if the message was deleted on the server. It is impossible for an executable to be attached to a text file. It is also unlikely that any attachment came from the list itself (when the mission.txt file was sent) as the list settings were set to strip or delete any attachments. The PDF files I posted several days previously required me to queue them up, deactivate the "delete attachments" options, forward the PDF files to the group, and then restore the "delete attachment" option. According to the logs there has been no other attachments send though the group. Several dozen lists members have contacted me on this issue, and they have not received any virus, or anything even remotely resembling a virus, an 8-bit file, or any form of executable. It's beginning to look like a HOAX, or a case where Norton Anti-Virus was not properly configured and it falsely claimed something was infected when it was not due to the paranoia level being set too high. -jma At 07:51 AM 6/7/2004, Steve Weinert wrote: > > -----Original Message----- > > From: Steve Uhrig > > Sent: Sunday, June 06, 2004 9:07 PM > > To: tSCM-L@yahoogroups.com > > Subject: [TSCM-L] Re: Virus sent to this list > > > > > > Once upon a midnight dreary, Michael Puchol pondered, weak and weary: > > > > > I can confirm that my Norton flagged it and automatically deleted the > > > attachment as a virus too - I have not kept it, but the message will > > > still be in the trash file, I'll dig it up again to see what happened. > > > I believed it was Norton's error, as it sometimes flags > > > emails/attachments as viruses when they are not. This is very rare, but > > > it can happen. > > > > I don't believe it was a Norton error, as my server flagged it. > > >The version that arrived here was sans attachment. Neither Trend nor Panda >products noted anything amiss. Puzzled why some received an attachment and >other none.. > >.... > > > A number of Yahoo lists have been extremely heavily spammed lately, > > somehow by nonmembers spoofing legitimate member's addresses. I'm talking > > hundreds of messages. The only suggestion Yahoo has is to moderate the > > list, which is not practical for some of the busy lists with fifty or > > more messages a day. > >I've had to put hobbyist groups onto full moderated rather than allowing the >spam/spoofs to freely traffic. A pain, but I figure the delay for my (or >one of my two assistant moderators) intervention to clear posts is better >than the alternative. > >The access to Yahoo by spoofed spam is surprising, and one list member >pondered what the fee payable to Yahoo Groups for this sort of access is? > >I've a template message that I forward every spam that a Yahoo Member posts >on a list to Yahoo. Several were members never added to the list by >moderator action, yet mysteriously they somehow are able to join (how much >and who do they pay for this?). > >As the service is without out of pocket costs there is a limit to the >complaining one can do. > >It is worth remembering to export memberlists and archive any traffic, files >and photos that would be useful if your list disappears some night into the >vapors of the net ether... > > > > > Not using your browser as an email client, and using non-Microsoft > > browsers and email clients also are excellent ideas. I use Pegasus > > www.pmail.com for email and Opera www.opera.com as a browser. Both for > > all practical purposes are immune to security attacks unless you do > > something incredibly stupid like opening unknown attachments. > >I've alternated between Opera and Firefox (the renamed Mozilla Phoenix >Browser). Have also been known to use a Linux box with the same. > >Appreciate the recommendation on Pegasus - I'll check it out. Have been >using MailDaemon (Alt-N's thing) for inhouse, but they seem more interested >in screwing around adding unwanted features in order to hold one hostage >for upgrade fees or upgrade protection licensing. Do you have experience >with the Mercury side of Pegasus? Wondering if this might be an >alternative. > >Thanks! > >Steve W > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8824 From: James M. Atkinson Date: Mon Jun 7, 2004 9:30am Subject: FSB's Top Spy Catcher Moves Over to Customs http://www.themoscowtimes.com/stories/2004/06/07/045.html Monday, June 7, 2004. Page 7. FSB's Top Spy Catcher Moves Over to Customs By Denis Maternovsky Staff Writer Russia's leading spy catcher and its first prosecutor general will have prominent roles in the new-look government. Lieutenant General Nikolai Volobuyev on Friday quit as head of counterintelligence for the Federal Securities Service to become deputy head of the powerful State Customs Committee, while Deputy Security Council chairman Valentin Stepankov resigned to become deputy natural resources minister. As the deputy chief and then head of the FSB's counterintelligence unit for most of the last decade, Volobuyev was involved in numerous spy cases, including the recent trial and conviction of scientist Igor Sutyagin. It is unclear exactly what Volobuyev's responsibilities will be at the $26 billion per year State Customs Committee, which is in the process of being overhauled, renamed and brought under the control of the Economic Development and Trade Ministry. Kommersant reported Saturday, citing top customs officials, that once this overhaul is completed, Volobuyev will likely replace the current customs chief, Mikhail Vanin, and the new body, known as the Federal Customs Service, will "all but merge with the FSB." Valery Draganov, head of the State Duma's economic policy committee and a former head of the State Customs Committee, said there was nothing unusual about the FSB and the customs service working closely together. "Customs always played a role in the struggle against the drug trade, terrorism and money laundering. Customs and the FSB have always worked together very closely and helped one another," he told the newspaper. Stepankov's duties, however, are already known: He will oversee legal issues and international cooperation in the natural resources sector. "The ministry has an enormous task of improving subsoil use legislation," Stepankov was quoted by Interfax as saying. "For four years I worked in the State Duma's Natural Resources Committee and was responsible for these questions. Therefore I have both legal and sector experience," he said. Stepankov was appointed Russia's first prosecutor general in 1991. The next year he launched a probe into the disappearance of the Communist Party's gold that was eventually quashed. He was fired in 1993 for siding with parliament in its standoff with then-President Boris Yeltsin. Stepankov was a deputy governor of the Perm region before being elected in 1995 to the State Duma, where he served one term. In June 2000, he was named a deputy to Sergei Kiriyenko, the presidential envoy to the Volga Federal District. He was named deputy head of the Security Council in April 2003. Natural Resources Minister Yury Trutnev is a former governor of Perm. His other deputy minister, Anatoly Tyomkin, is also a former deputy governor of the region. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8825 From: James M. Atkinson Date: Mon Jun 7, 2004 9:29am Subject: Chief wants FBI to have a domestic spy division Allowing the FBI to have another domestic spy division is a bit like allowing a pedophile to open up another day care center. -jma http://www.dailystar.com/dailystar/news/24786.php Chief wants FBI to have a domestic spy division Robert Mueller THE ASSOCIATED PRESS WASHINGTON - FBI Director Robert Mueller, fighting calls for an independent domestic intelligence agency, proposed Thursday that the bureau create its own service to gather information to combat terrorism. The division would be largely independent from the rest of the FBI and have its own budget. It would include all the bureau's intelligence-gathering resources. The chief would report directly to Mueller. Mueller told a House Appropriations subcommittee that an independent domestic spy agency would have to duplicate much of the expertise already in the FBI and harm what's become the bureau's top priority: fighting terrorism. "Any reform proposal must recognize that intelligence is fundamental to successful FBI operations," he said. "Intelligence functions are woven throughout the fabric of the bureau, and any changes to this integrated approach would be counterproductive." Mueller did not provide estimates of how many new people would be hired or any additional costs for the initiative. Congressional reaction has been mixed on the need for a domestic spy agency. The chairman of the subcommittee, Rep. Frank Wolf, R-Va., asked Mueller in February to consider creation of the separate entity within the FBI. Wolf disagreed with those who want a separate agency similar to the British intelligence service. Britain's Security Service, known as MI-5, collects and analyzes intelligence to disrupt terrorism, espionage and sabotage but has no law enforcement powers. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8826 From: James M. Atkinson Date: Mon Jun 7, 2004 9:47am Subject: CPM-700 [Free Stuff] Effective immediately, any customer who purchases a CPM-700 Deluxe system ($3995) through me will receive almost $450 of extra probes and accessories at no additional charge. This includes the VLF probe, Infrared Probe, Acoustic Probe, and so on... a huge amount of good stuff, essentially for free. This should make it more attractive for list members to purchase the new 12 GHz microwave system, which is available for immediate shipment. You can also find details on the following page on my website: http://www.tscm.com/cpm700a.html As always, I will pickup the cost of shipping by express courier which will save you even more money. -jma ps: I have included a data-sheet on the deluxe system as an attachment, and have confirmed that it is clean, and not infected in any way. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- Attachment: (application/pdf) spec-cpm700-deluxe.pdf [not stored] 8827 From: A Grudko Date: Mon Jun 7, 2004 11:38am Subject: RE: Re: Virus sent to this list -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: 07 June 2004 01:48 AM > Enough people now have mailed me directly to confirm. Five so far. My service provider's filters deleted the message and sent me a warning, crediting it to TSCM-L@yahoogroups.com but it could well have been spoofed and not come from/through the list at all. Andy Grudko (British), DPM, Grad IS (South Africa) Consulting Investigator, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , andy@g... Pretoria (+27 12) 244 0255 - 244 0256 (Fax) Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.692 / Virus Database: 453 - Release Date: 2004/05/28 [Non-text portions of this message have been removed] 8828 From: James M. Atkinson Date: Mon Jun 7, 2004 0:00pm Subject: RE: Re: Virus sent to this list Andy, Could you please send me a copy of the error message you got from your ISP. If a virus in fact came though to your ISP then it was spoofed, and did not at all come from the list in any way. -jma At 12:38 PM 6/7/2004, A Grudko wrote: > -----Original Message----- > From: Steve Uhrig [mailto:steve@s...] > Sent: 07 June 2004 01:48 AM > > > Enough people now have mailed me directly to confirm. Five so far. > > My service provider's filters deleted the message and sent me a warning, >crediting it to TSCM-L@yahoogroups.com but it could well have been spoofed >and not come from/through the list at all. > > Andy Grudko (British), DPM, Grad IS (South Africa) > Consulting Investigator, Est. 1981. PSIRA reg. No. 8642 > www.grudko.com , andy@g... > Pretoria (+27 12) 244 0255 - 244 0256 (Fax) > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > Cellular (+27) 82 778 6355 - ICQ 146498943 > SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. > "When you need it done right - first time" ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8829 From: Steve Uhrig Date: Mon Jun 7, 2004 0:30pm Subject: Re: Virus sent to this list Once upon a midnight dreary, A Grudko pondered, weak and weary: > My service provider's filters deleted the message and sent me a warning, > crediting it to TSCM-L@yahoogroups.com but it could well have been > spoofed and not come from/through the list at all. Being attached to the mission.txt file at the exact time that file was to have been sent kind of points away from spoofing and back towards Yahoo. A number of lists send monthly mission statements (it is an integral feature of Yahoogroups) and I got perhaps six all on top of one another yesterday morning, from different lists. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8830 From: kondrak Date: Mon Jun 7, 2004 2:16pm Subject: RE: Re: Virus sent to this list Well, as an adjunct, the servers I monitor picked up another flood of netsky virus this past 24 hours. I've got one disguised as a message from Yahoo system administration, however, it was mailed to the administration email for a list I maintain. I did some forensics on the payload, and its more attempts to install spam relays, and backdoors for more spamming. Yawn..the anti-virus caught it all. Whats unique about this past batch, is that theyre attempting to portend to be administration messages from listservs. At 07:51 6/7/2004, you wrote: > > -----Original Message----- > > From: Steve Uhrig > > Sent: Sunday, June 06, 2004 9:07 PM > > To: tSCM-L@yahoogroups.com > > Subject: [TSCM-L] Re: Virus sent to this list > > > > > > Once upon a midnight dreary, Michael Puchol pondered, weak and weary: > > > > > I can confirm that my Norton flagged it and automatically deleted the > > > attachment as a virus too - I have not kept it, but the message will > > > still be in the trash file, I'll dig it up again to see what happened. > > > I believed it was Norton's error, as it sometimes flags > > > emails/attachments as viruses when they are not. This is very rare, but > > > it can happen. > > > > I don't believe it was a Norton error, as my server flagged it. > > >The version that arrived here was sans attachment. Neither Trend nor Panda >products noted anything amiss. Puzzled why some received an attachment and >other none.. > >.... > > > A number of Yahoo lists have been extremely heavily spammed lately, > > somehow by nonmembers spoofing legitimate member's addresses. I'm talking > > hundreds of messages. The only suggestion Yahoo has is to moderate the > > list, which is not practical for some of the busy lists with fifty or > > more messages a day. > >I've had to put hobbyist groups onto full moderated rather than allowing the >spam/spoofs to freely traffic. A pain, but I figure the delay for my (or >one of my two assistant moderators) intervention to clear posts is better >than the alternative. > >The access to Yahoo by spoofed spam is surprising, and one list member >pondered what the fee payable to Yahoo Groups for this sort of access is? > >I've a template message that I forward every spam that a Yahoo Member posts >on a list to Yahoo. Several were members never added to the list by >moderator action, yet mysteriously they somehow are able to join (how much >and who do they pay for this?). > >As the service is without out of pocket costs there is a limit to the >complaining one can do. > >It is worth remembering to export memberlists and archive any traffic, files >and photos that would be useful if your list disappears some night into the >vapors of the net ether... > > > > > Not using your browser as an email client, and using non-Microsoft > > browsers and email clients also are excellent ideas. I use Pegasus > > www.pmail.com for email and Opera www.opera.com as a browser. Both for > > all practical purposes are immune to security attacks unless you do > > something incredibly stupid like opening unknown attachments. > >I've alternated between Opera and Firefox (the renamed Mozilla Phoenix >Browser). Have also been known to use a Linux box with the same. > >Appreciate the recommendation on Pegasus - I'll check it out. Have been >using MailDaemon (Alt-N's thing) for inhouse, but they seem more interested >in screwing around adding unwanted features in order to hold one hostage >for upgrade fees or upgrade protection licensing. Do you have experience >with the Mercury side of Pegasus? Wondering if this might be an >alternative. > >Thanks! > >Steve W > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 8831 From: kondrak Date: Mon Jun 7, 2004 2:18pm Subject: Re: Chief wants FBI to have a domestic spy division Hey, since 9.11, all the agencies who let us down are being rewarded with huge budget increases and promotions. As always, I ask, "Who benefits?" At 10:29 6/7/2004, you wrote: >Allowing the FBI to have another domestic spy division is a bit like >allowing a pedophile to open up another day care center. > >-jma > > > >http://www.dailystar.com/dailystar/news/24786.php > >Chief wants FBI to have a domestic spy division >Robert Mueller >THE ASSOCIATED PRESS > >WASHINGTON - FBI Director Robert Mueller, fighting calls for an independent >domestic intelligence agency, proposed Thursday that the bureau create its >own service to gather information to combat terrorism. > >The division would be largely independent from the rest of the FBI and have >its own budget. It would include all the bureau's intelligence-gathering >resources. The chief would report directly to Mueller. > >Mueller told a House Appropriations subcommittee that an independent >domestic spy agency would have to duplicate much of the expertise already in >the FBI and harm what's become the bureau's top priority: fighting >terrorism. > >"Any reform proposal must recognize that intelligence is fundamental to >successful FBI operations," he said. "Intelligence functions are woven >throughout the fabric of the bureau, and any changes to this integrated >approach would be counterproductive." > >Mueller did not provide estimates of how many new people would be hired or >any additional costs for the initiative. > >Congressional reaction has been mixed on the need for a domestic spy agency. > >The chairman of the subcommittee, Rep. Frank Wolf, R-Va., asked Mueller in >February to consider creation of the separate entity within the FBI. Wolf >disagreed with those who want a separate agency similar to the British >intelligence service. > >Britain's Security Service, known as MI-5, collects and analyzes >intelligence to disrupt terrorism, espionage and sabotage but has no law >enforcement powers. > > > > > > > > >----------------------------------------------------------------------------------------------------- > > >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >----------------------------------------------------------------------------------------------------- > > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >----------------------------------------------------------------------------------------------------- > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 8832 From: taylortscm@y... Date: Mon Jun 7, 2004 3:10pm Subject: Fwd: johnsoncounty judy grissom wrote:From judy grissom Mon Jun 7 13:04:18 2004 X-Apparently-To: taylortscm@y... via 216.136.175.211; Mon, 07 Jun 2004 13:04:29 -0700 Return-Path: Received: from 216.136.173.99 (HELO web12301.mail.yahoo.com) (216.136.173.99) by mta213.mail.dcn.yahoo.com with SMTP; Mon, 07 Jun 2004 13:04:28 -0700 Message-ID: <20040607200418.91605.qmail@w...> Received: from [24.15.169.101] by web12301.mail.yahoo.com via HTTP; Mon, 07 Jun 2004 13:04:18 PDT Date: Mon, 7 Jun 2004 13:04:18 -0700 (PDT) From: judy grissom Subject: johnsoncounty To: taylortscm@y... MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Length: 950 By: Dan Grissom Johnson County TN Stephen J. Wilson of Technical Intelligence Group, a technical surveillance countermeasures (tscm) firm Of Laurel bloomery TN, Was arrested on federal charges, of gun running, after a lengthily surveillance by: ATF, DEA, FBI Sources stated authorities also discovered hundreds of marijuana plants growing on his property. The surveillance was cut short after Wilson made death threats against his wife, authorities feared he would make good on the threats. Wilson was also known on ebay as tscm-er where he sold counter surveillance equipment, and defrauded ebay patrons out of thousands of dollars prior to his arrest. Mail and wire fraud charges are pending on the ebay scam. Wilson is in federal custody in Greenville TN. Dan grissom City news service 630.683.1900 __________________________________ Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger. http://messenger.yahoo.com/ --------------------------------- Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger [Non-text portions of this message have been removed] 8833 From: Steve Uhrig Date: Mon Jun 7, 2004 6:41pm Subject: New article available for review Hi all, Two new articles are posted to my website for anyone who's interested. One is on station grounding for communications installations. The other discusses care and feeding rechargeable batteries, primarily lithium. This one will be published in my regular column in the September issue of Police and Security News Magazine. http://www.swssec.com/grounding.html http://www.swssec.com/bat3.html All articles are indexed here: http://www.swssec.com/white_paper.html Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8834 From: John Papaleo Date: Mon Jun 7, 2004 3:02pm Subject: Invitation Greetings list. My name is John Papaleo. I am a retired NYPD Det. from a technical unit having had worked over seventeen years at both the Intelligence Division and the Manhattan DAs office. In the five years since I have retired the state of the art of digital video recording has made as many leaps and bounds as any other modern technology. I have had, since my retirement, the good fortune to have become employed by a mid sized security systems integration company. As such, I have been able to enhance my understanding of the technology and view the spectrum of products currently available. If any LAW ENFORCEMENT persons have any questions, problems or curiosities, I would be happy to help you find resolve. Thanks, Det 2 John Papaleo (Ret NYPD) [Non-text portions of this message have been removed] 8835 From: G P Date: Mon Jun 7, 2004 8:02pm Subject: Portable GSM/CDMA interception system based on SDR technology For those of you inquiring about portable GSM interception systems: http://www.vanu.com/products.html Supports AMPS, TDMA, GSM, CDMA, Project 25, Mobitex, FRS, and FM broadcast, all in a luggable Pentium-4 form factor. Current model is receive-only, with transmit capabilities coming Real Soon Now (rogue BTS anyone?), the unique thing about Vanu is that their entire engine is SDR, e.g. software defined radio - new updates don't require new hardware, the entire system is based around Eric Blossom's GNU Radio and an Echotek A/D card. GNU Radio is making lots of progress as well, they're doing full HTDV receive and broadcast all in software on an x86 Linux machine with the IF from a cable modem; they're at the 2nd rev of custom hardware that will be available to the public this summer, looks to be an Analog Devices FPGA with lots of additional interfacing support (USB 2.0 etc): http://www.gnu.org/software/gnuradio/ Intercepting GSM/CDMA and/or GPRS should be a no-brainer with a Linux laptop and the GNU Radio custom hardware platform. --------------------------------- From: Perry Myers Date: Wed Jun 5, 2002 4:06pm Subject: Cell/Radio Danger at gas stations I received this from another group email. Thought it important enough to pass on if it is indeed true. The investigator who provided this said he investigated many explosions at gas stations that left only the cell phone or radio as the possible source of the explosion. Subject: USE OF MOBILE PHONES NEAR PETROL FUMES Date: 29 May 2002 09:51 To members - my daughter's firm is circulating the following advice to all drivers. I know none of us would dream of using a mobile phone near petrol fumes - or would we? Date: 2002, May 8th SAFETY BULLETIN No: A 033 SUBJECT Incident with mobile phones during refueling SUMMARY OF INCIDENT SHELL have issued a warning about Mobile Phones, they have reported 3 incidents recently where Mobile Phones have ignited fumes whilst being answered / ringing during fuelling operations. In the first case, the phone was placed on the boot lid during fuelling, it rang and the ensuing fire destroyed the car and the pump. In the second, an individual suffered burns to the face when fumes ignited as he answered a call during fuelling. In the third case, an individual suffered burns to the thigh and groin as fumes ignited when the phone, which was in his pocket, rang during fuelling. KEY INFORMATION It is a misconception that Mobile Phones can't ignite fuel / fumes. ISSUE IDENTIFIED (According to enclosed root cause analysis). It is a misconception that Mobile Phones can't ignite fuel / fumes. It is believed that the more modern phones (those that light up when either switched on or when they ring) have enough energy released to provide the spark for ignition! IMMEDIATE ACTIONS REQUIRED TECHNICAL : --- ORGANISATIONAL : 1. Mobile phones should not be used in filling stations. 2. Mobile phones should be turned off before exiting the vehicle when stopping in a filling station. Perry Myers asked in a follow up email about validity of the information and informant responded with the following: Sir, My daughter is employed by Co-op Travelcare in the UK, part of the CWS Group. The content of the message was circulated from Head Office to all their personnel who are using cars in connection with their employment. The message, apparently, originated with Shell UK (petrol). I have not checked with Shell because in my pre-retirement days I was in charge of the Greater Manchester Police Motorway Group and attended a few incidents where fires had broken out at petrol spillages. The usual causes were eliminated (fuel dripping onto exhaust pipes, or hot metal, discarded cigarettes etc) leaving the only other possibilities being radios used by the emergency services or mobile telephones which seem to breed at incidents. I was satisfied in my mind the origin of the fires was because of mobile phone usage. It did not come as a surprise to me, therefore, to see the Shell message and passed it on to the group as a subtle warning not to take liberties in the vicinity of petrol vapours - bearing in mind more people seem to carry and use mobile phones when fuelling vehicles than smoke. ..........Sounds legitimate. Perry D. Myers, CFE President & CEO E-mail: perry@d... MSI Detective Services Myers Service, Inc. Corporate Headquarters 2076 N. Elston Ave. Suite 200 Chicago, IL. 60614-3940 Phone 773-342-8300 Facsimile 773-486-4430 Professional Investigators Since 1959 Investigations Nationwide 24 Hour Availability www.detectiveservices.com Process Service Division - Downtown Chicago 205 W. Randolph St., Ste. 1210 Chicago, IL. 60606 Phone 312-782-4000 Fax 312-853-3119 For Security, Surveillance & Privacy Products U-Spy Store Chicago - Orlando - Internet Sales www.u-spystore.com Orlando Warehouse - (800) 393-4779 Chicago Sales - (773) 395-0220 For more information on our investigative services please visit our web site at www.detectiveservices.com This e-mail is strictly confidential. If you receive this e-mail in error, please forward immediately to info@d... 5584 From: McIntyre Date: Wed Jun 5, 2002 10:55am Subject: Black Hat 2002 Speakers Announced For Immediate Release Contacts B.K. DeLong press@b... +1.617.877.3271 BLACK HAT BRIEFINGS 2002 SESSIONS EXAMINE BEST PRACTICES & THE BEST TOOLS Top Security Experts Address the Real Issues in Computer Security - Richard Clarke to Keynote http://www.blackhat.com/ -- Black Hat Inc. announced today preliminary speaker sessions for this summer's Black Hat Briefings and Training 2002, the annual conference and workshop designed to help computer professionals better understand the security risks to their computer and information infrastructures by potential threats. This year's show will focus on several tracks of hot topics including Wireless, Firewalls, Access Control, PKI & Single Signon, Routing and Infrastructure, Application Security, Intrusion Detection, Incident Response & Computer Forensics, Privacy & Anonymity, Web, Mail and Other Related Servers, and Deep Knowledge. The event is being held 31 July through 1 August 2002 at the Caesars Palace Hotel and Casino in the heart of Las Vegas. Top-notch speakers will deliver to the conference's core audience of IT & network security experts, consultants and administrators the newest developments on the vital security issues facing organizations using large networks with a mix of operating systems. "Our goal is to present a vendor-neutral environment where conference attendees can receive key intelligence in a face-to-face environment with the people developing the tools used by and against hackers," says Jeff Moss, founder of Black Hat Inc. "Our speakers discuss the strategies involved in correcting existing problems and inform attendees on upcoming issues, preparing them for the future." Richard Clarke, Special Advisor to President Bush for Cyberspace Security, will be one of the keynotes headlining the event. Mr. Clarke has served in several senior national security posts. Most recently he served as National Coordinator for Security, Infrastructure Protection, and Counter-terrorism on the National Security Council. As National Coordinator, he led the U.S. government's efforts on counter-terrorism, cyber security, continuity of government operations, domestic preparedness for weapons of mass destruction, and international organized crime. He will be speaking about our nation's strategy for securing cyberspace. The lineup of Black Hat Briefings presenters for 2002 include: -- Thomas Akin, Founding Director, Southeast Cybercrime Institute. Akin is a Certified Information Systems Security Professional (CISSP) who has worked in Information Security for almost a decade. He is the founding director of the Southeast Cybercrime Institute where he also serves as chairman for the Institute's Board of Advisors. He is an active member of the Georgia Cybercrime Task Force where he heads up the Task Force's Education committee. Thomas also works with Atlanta's ISSA, InfraGard, and HTCIA professional organizations. -- Ofir Arkin, Managing Security Architect, @stake. Prior to joining @stake, Arkin has worked as a consultant for several European finance institutes where he played the rule of Senior Security Analyst, and Chief Security Architect in major projects. His experience includes working for a leading European Swiss bank architecting the security of the bank's E-banking project. -- Rebecca Bace, President/CEO, Infidel Inc. Bace provides strategic and operational consulting services for clients that include security point product developers, legal firms, and Internet solutions providers. She is also a noted author on topics in intrusion detection and network security, with credits including the white paper series for ICSA's Intrusion Detection Consortium. Her book on Intrusion Detection was published by Macmillan Technical Publishing in January, 2000. -- Don Cavender, Senior Special Agent, FBI Academy. SSA Cavender has twelve years experience as an FBI Agent. The past seven years he has been involved in high technology investigations and/or digital forensics. He is presently responsible for instruction in Internet and Network Investigations for FBI, Federal, State and Local Law Enforcement Investigators, case support and consultation and research. -- Sean Convery, Network Architect, Cisco. Convery is a network architect in Cisco's VPN and security business unit. Sean works primarily on the SAFE blueprint, and is an author several of its whitepapers. Prior to his four years at Cisco, Sean held various positions in both IT and security consulting during his 11 years in networking. -- Mark Eckenwiler, Senior Counsel in the Computer Crime & Intellectual Property Section, Criminal Division, U.S. Department of Justice. Eckenwiler is Senior Counsel in the Computer Crime and Intellectual Property Section, Criminal Division, U.S. Department of Justice. His areas of responsibility include federal wiretap law, computer search and seizure, and online investigations. An Internet veteran for almost two decades, Mark has written and spoken widely on such issues as anonymity and free speech, e-mail stalking laws, Internet jurisdiction, electronic privacy, and the Fifth Amendment implications of cryptographic keys. -- Halvar Flake, Reverse Engineer, Black Hat Consulting. Originating in the fields of copy protection and digital rights management, he gravitated more and more towards network security over time as he realized that constructive copy protection is more or less fighting windmills. After writing his first few exploits he was hooked and realized that reverse engineering experience is a very handy asset when dealing with COTS software. With extensive experience in reverse engineering, network security, penetration testing and exploit development he recently joined BlackHat as their primary reverse engineer. -- Dr. Ian Goldberg is internationally recognized as one of the world's leading cryptographers and cypherpunks. Dr. Goldberg is a founder of Berkeley's Internet Security, Applications, Authentication and Cryptography group. In addition to developing many of the leading network software titles for the Palm Pilot, he is known for his part in cracking the first RSA Secret Key Challenge in three and a half hours; breaking Netscape's implementation of the encryption system SSL; and breaking the cryptography in the GSM cellular phone standard. In November 1998, Wired magazine selected Dr. Goldberg as one of the "Wired 25" - the twenty-five people who in 1998 are "about to change the rules all over again." In December 2000 he obtained his Ph.D. from UC Berkeley for his thesis "A Pseudonymous Communications Infrastructure for the Internet," which examined the technical and social issues involved in designing the Freedom Network. -- Jennifer Granick, Litigation Director, Center for Internet and Society, Stanford Law School. Ms. Granick's work focuses on the interaction of free speech, privacy, computer security, law and technology. She is on the Board of Directors for the Honeynet Project and has spoken at the NSA, to law enforcement and to computer security professionals from the public and private sectors in the United States and abroad. Before coming to Stanford Law School, Ms. Granick practiced criminal defense of unauthorized access and email interception cases nationally. She has published articles on wiretap laws, workplace privacy and trademark law. -- The Honeynet Project is a non-profit, all volunteer security research organization dedicated to researching the blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around the world to capture and analyze blackhat activity. These lessons are then shared with the security community. The Honeynet Project began in 1999 and continues to grow with the founding of the Honeynet Research Alliance. -- Jesse Kornblum, Chief, Research and Development, Air Force Office of Special Investigations. SA Kornblum is the Chief of Research and Development for the Air Force Office of Special Investigations Computer Investigations and Operations Branch . A graduate of the Massachusetts Institute of Technology, he has experience running intrusion investigations and supporting other agents in more traditional investigations. He is currently responsible for developing tools and techniques to allow agents to conduct investigations. -- Larry Leibrock, Associate Dean and Technology Officer, University of Texas McCombs Business School. Leibrock has held or currently holds clinical teaching and research appointments at McCombs Business School, Institute for Advanced Technology, The University of Texas Law School, Emory University, Helsinki School of Economics and Monterrey Technologica in Mexico City and Monterrey. He is a member of IEEE, ACM, Internet Society, FIRST and USENIX/SAGE. He is also a member of the Department of Defense Software Engineering Institute and a participant in the Air Force Software Technology Conference. -- David Litchfield, Managing Director & Co-Founder, Next Generation Security Software. Litchfield is a world-renowned security expert specializing in Windows NT and Internet security. His discovery and remediation of over 100 major vulnerabilities in products such as Microsoft's Internet Information Server and Oracle's Application Server have lead to the tightening of sites around the world. David Litchfield is also the author of Cerberus' Internet Scanner (previously NTInfoscan), one of the world's most popular free vulnerability scanners. In addition to CIS, David has written many other utilities to help identify and fix security holes. David is the author of many technical documents on security issues including his tutorial on Exploiting Windows NT Buffer Overruns referenced in the book "Hacking Exposed". -- Dr. William Tafoya, Senior Member of the Executive Staff, Computer Sciences Corporation Federal Sector - Defense Group. Tafoya is formerly Director of the Information System Security and Education Center, Washington, DC. Prior to that he was Professor of Criminal Justice at Governors State University and before that he was Director of Research for the Office of International Criminal Justice at the University of Illinois at Chicago. He is a retired Special Agent of the Federal Bureau of Investigation. A full list of speakers can be found at: http://www.blackhat.com/html/bh-usa-02/bh-usa-02-speakers.html Black Hat Inc. will also conduct computer security training for several different topics the two days prior to the briefings - 29 through 30 July. Subjects include: -- Hacking by Numbers -- Secure Development of Data-Driven Web Applications -- System and Process for Digital Evidence Ramp-Up Course -- Forensics Tools and Processes for Windows 2000 and Windows XP Platforms -- Using Active Directory to Manage Security -- Advanced Scanning with ICMP -- Securing Solaris and Locking Down Linux -- NSA InfoSec Assessment Methodology Course -- Ultimate Hacking: Black Hat Edition -- Analyzing Software for Security Vulnerabilities -- Infrastructure Attacktecs & Defentec "Hacking into a Cisco Network" The instructors for the training segment of this year's Black Hat are some of the top experts in their field and are fully active in the computer security community. You won't find most of these speakers anywhere else and these handpicked security gurus will train participants in understanding the real threats to any network and how to keep them from being exploited. To register for BlackHat Briefings, visit the Web site at http://www.blackhat.com. Direct any conference-related questions to info@b.... For press registration, contact B.K. DeLong at +1.617.877.3271 or via email at press@b.... About Black Hat Inc. Black Hat Inc. was originally founded in 1997 by Jeff Moss to fill the need for computer security professionals to better understand the security risks and potential threats to their information infrastructures and computer systems. Black Hat accomplishes this by assembling a group of vendor-neutral security professionals and having them speak candidly about the problems businesses face and their solutions to those problems. Black Hat Inc. produces 5 briefing & training events a year on 3 different continents. Speakers and attendees travel from all over the world to meet and share in the latest advances in computer security. For more information, visit their Web site at http://www.blackhat.com ### 5585 From: Marcel Date: Thu Jun 6, 2002 5:57pm Subject: Cell/Radio Danger at gas stations That is interesting Moto went to great length to dispel any belief that cellphones are dangerous at gas stations ( see the letter below your comments). If there is documented proof it should be forwarded to Moto and the appropriate state and federal agency. Has any one seen any warnings from a state or federal agency? Marcel- Perry Myers wrote: > I received this from another group email. Thought it important enough > to pass on if it is indeed true. The investigator who provided this > said he investigated many explosions at gas stations that left only the > cell phone or radio as the possible source of the explosion. > > Subject: USE OF MOBILE PHONES NEAR PETROL FUMES > Date: 29 May 2002 09:51 > > To members - my daughter's firm is circulating the following advice to > all drivers. > > I know none of us would dream of using a mobile phone near petrol fumes > - or would we? > > Date: 2002, May 8th > SAFETY BULLETIN > No: A 033 > > SUBJECT > > Incident with mobile phones during refueling > > SUMMARY OF INCIDENT > > SHELL have issued a warning about Mobile Phones, they have reported 3 > incidents recently where Mobile Phones have ignited fumes whilst being > answered / ringing during fuelling operations. > > In the first case, the phone was placed on the boot lid during fuelling, > it rang and the ensuing fire destroyed the car and the pump. > > In the second, an individual suffered burns to the face when fumes > ignited as he answered a call during fuelling. > > In the third case, an individual suffered burns to the thigh and groin > as fumes ignited when the phone, which was in his pocket, rang during > fuelling. > > KEY INFORMATION > > It is a misconception that Mobile Phones can't ignite fuel / fumes. > > ISSUE IDENTIFIED (According to enclosed root cause analysis). > > It is a misconception that Mobile Phones can't ignite fuel / fumes. > > It is believed that the more modern phones (those that light up when > either switched on or when they ring) have enough energy released to > provide the spark for ignition! > > IMMEDIATE ACTIONS REQUIRED > > TECHNICAL : --- > > ORGANISATIONAL : > > 1. Mobile phones should not be used in filling stations. > > 2. Mobile phones should be turned off before exiting the vehicle when > stopping in a filling station. > > Perry Myers asked in a follow up email about validity of the information > and informant responded with the following: > Sir, My daughter is employed by Co-op Travelcare in the UK, part of the > CWS Group. The content of the message was circulated from Head Office to > all their personnel who are using cars in connection with their > employment. > The message, apparently, originated with Shell UK (petrol). > I have not checked with Shell because in my pre-retirement days I was in > charge of the Greater Manchester Police Motorway Group and attended a > few incidents where fires had broken out at petrol spillages. The usual > causes were eliminated (fuel dripping onto exhaust pipes, or hot metal, > discarded cigarettes etc) leaving the only other possibilities being > radios used by the emergency services or mobile telephones which seem to > breed at incidents. I was satisfied in my mind the origin of the fires > was because of mobile phone usage. > It did not come as a surprise to me, therefore, to see the Shell message > and passed it on to the group as a subtle warning not to take liberties > in the vicinity of petrol vapours - bearing in mind more people seem to > carry and use mobile phones when fuelling vehicles than smoke. > > ..........Sounds legitimate. > > Perry D. Myers, CFE > President & CEO > E-mail: perry@d... ====================================================================================== Use of Mobile Phones and Portable Radios in Gasoline Stations A Motorola Background Paper 3 May 2002 Over the last several years, there has been occasional speculation in the media and over the Internet that the use of mobile phones at gasoline stations could pose a risk of fire or explosion. This issue can be traced to reports of alleged incidents that have been investigated and never verified. Having looked into this issue at some length, Motorola can report that: ïWe know of no documented incident anywhere in the world where the use of a mobile phone or portable radio was identified as the cause of a fire or explosion in a gasoline station. ïThere is no credible reason to believe that the use of these products poses any such hazard. In response to rumors that attracted considerable attention in 1999, Motorola commissioned a review by an independent scientific, engineering and technical consulting firm: Exponent Failure Analysis Associates. Exponent concluded in December 1999 that ìthe use of a cell phone at a gasoline filling station under normal operating conditions presents a negligible hazardî and that the likelihood of such an accident under any conditions ìis very remote.î ìAutomobiles (which have numerous potential ignition sources) pose a greater ignition hazard,î the report said. ìFinally, other potential ignition sources are present, such as static discharge between a person and a vehicle.î An analysis by the Center for the Study of Wireless Electromagnetic Compatibility Center at the University of Oklahoma reached a similar conclusion in August 2001. It said research into this issue ìprovided virtually no evidence to suggest that cell phones pose a hazard at gas stations.î ìWhile it may be theoretically possible for a spark from a cell phone battery to ignite gas vapor under very precise conditions, the historical evidence does not support the need for further research,î the report said. ìUntil there is evidence to the contrary, we suggest that no further action be initiated in this regard, and that no recommendations for further action are required of the wireless phone or petroleum industries.î? The Exponent and Oklahoma reviews agreed that the issue was whether a battery-related spark could create a source of ignition. The radio signals from the phone were not at issue. The use of mobile phones in gasoline stations long ago attained the status of an ìurban legendî ñ rumor and supposition accorded undue credence because of repeated mentions in the media and over the Internet. In the end, public policies and consumer advice must be based not on speculation but fact. The facts in this case are clear. They are reinforced by extensive engineering analysis and suggest that there is no sound technical basis to prohibit the use of mobile phones in gasoline stations or single them out as hazards. References ìCell Phone Usage at Gasoline Stations.î Report to Motorola by Exponent Failure Analysis Associates, Menlo Park, California USA. December 1999. ìInvestigation of the Potential for Wireless Phones to Cause Explosions at Gas Stations.î Center for the Study of Wireless Electromagnetic Compatibility, University of Oklahoma, Norman, Oklahoma USA. August 2001. http://www.ou.edu/engineering/emc/ ìGas Station Warnings Perpetuate ëUrban Legend.íî Statement of Tom Wheeler, president and CEO of the Cellular Telecommunications Industry Association. October 7, 1999. www.wow-com.com/news/press/body.cfm?record_id=407 ìFuelish Pleasures: Is Using a Cell Phone at a Gas Station Dangerous?î Urban Legends Reference Pages. January 2002. www.snopes2.com/autos/hazards/gasvapor.htm For More Information: Norm Sandler Director, Global Strategic Issues Corporate Issues Management Phone: +1.202.371.6831 Chuck Eger Director, Strategic and Regulatory Policy PCS Phone: +1.202.371.6898 Fred Moloznik Director, Global Product Safety and Regulatory Affairs CGISS/iDEN Phone: +1.847.576-3324?Addendum: Potentially Hazardous Environments In February 2002, Motorola became aware of a reported accident at a Chevron Texaco drilling platform off the coast of Louisiana in which a contractor suffered burns while inspecting an instrumentation panel connected to a natural gas line. Accounts of this accident that have circulated over the Internet report that the accident occurred when the contractor opened his Nextel phone to answer an incoming call. This was described in at least one account as evidence of ìthe potential danger of electronic devices as ignition sourcesî in areas where natural gas may be present. Pending further information that may emerge from investigation by Chevron Texaco or others, our understanding of the situation is summarized in the following statement drafted by Motorola and Nextel and based on information obtained from Chevron Texaco: We are aware of reports of a contractor who, while using a wireless telephone at a Chevron Texaco drilling platform off the Louisiana coast, was injured in a flash fire accident. The actual cause of the accident remains under investigation. There has been no information to suggest that the wireless phone caused or contributed to the accident. Nextel representatives have been in touch with Chevron representatives and we have offered to provide assistance with any investigative efforts or needs. In an abundance of caution, Nextel phone user manuals instruct users to turn off their phones/radios in areas with potentially explosive atmospheres including those that may be present at oil or gas drilling or storage facilities. This recommendation is designed to eliminate any potential risks, no matter how remote, in such locations. Please refer to the Nextel user manual section titled "Safety and General Information" for specific instructions and more information. It is our understanding that Nextel Corporate Communications is prepared to respond to external inquiries about this matter. It is being forwarded for you to be able to confirm, if asked, that Motorola is aware of the accident, has no reason to believe that the phone was a cause of contributor to the accident, and provides specific instructions in its product manuals on the use of radios or wireless phones in potentially explosive atmospheres. ïMotorola manuals contain explicit instructions about the use of wireless phones and other portable radio products in other settings where potentially explosive atmospheres may exist.?ïSuch precautions relate in no way to the radio signal from the product, but rather to the remote -- and undemonstrated -- possibility of a fault, malfunction or spark creating an ignition source that would propagate outside the battery or radio. ïIn any event, Motorola advises consumers to obey any local restrictions on the use of wireless phones or other portable radio products in specific areas. The issues raised by the Chevron Texaco accident should not be confused with those related to the use of mobile phones of portable radios in gasoline stations. The environments are quite different and, as described above, oil and gas facilities ñ as well as numerous other industrial settings ñ often have specific rules about the use of radios and other electrical devices in areas known to have potentially explosive atmospheres. In an abundance of caution, these rules may dictate the use of ìintrinsically safeî equipment or other limitations on use. Workers should obey any site-specific rules or regulations on the use of such devices. -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 5586 From: Matthew Paulsen Date: Thu Jun 6, 2002 6:43pm Subject: RE: Cell/Radio Danger at gas stations, the risk is real Yes, this is a threat, albeit a low one. You may wish to repost to the other groups you posted to. Point your browser to: http://www.search.shell.com/cgi-bin/rsearch.cgi Type in the following: mobile phone risk Change the search criterial to "using all my words" and watch the magic. And yes, Pak Man is really his name and not a nym. This is from Shell's website: http://www.shellglobalsolutions.com/solutions_for/oil_marketers/business_sol utions/lor/lor_cvp4_cs1.htm Licence to operate: Retail Mobile phone danger on the forecourt Situation A fuel retailer believed that there could be a potential fire risk from customers using mobile phones on the forecourt. Solution Shell Global Solutions assessed the possible risks and found that there were significant grounds for concern. . Benefit The use of mobile phones was banned on the forecourt and a programme implemented to increase customersí awareness of the risks. Safety message on use of mobile phones at retail stations http://www2.shell.com/home/Framework?siteId=my-en&FC1=&FC2=&FC4=&FC5=&FC3=/m y-en/html/iwgen/newsandlibrary/hse/2002/mobilephones_011611415.html Health, Safety and Environment Messages Battery powered equipment such as mobile phones, pagers, and cameras represent a potential ignition source. Shell takes the safety of its customers and retail staff very seriously. For this reason, although the risk associated with mobile phone use at retail sites is very low, Shell was the first in the oil industry in Malaysia to put up notices at pump islands to request motorists to switch OFF their mobile phones when refuelling at the station. There is a sticker to this effect at every pump island and it also advises customers to switch OFF your car engine and to refrain from smoking for similar reasons. We understand that there is an email, purportedly official Shell communication, circulating which describes various incidents that are supposed to have occured as a result of mobile phones ringing while at a retail station. Please be advised that the email in question does NOT originate from Shell Malaysia and we are unable to confirm any of the incidents quoted. Should you have any further enquiries on this subject, please email Pak Man via the following email address: pak.p.man@s... Thanks, Matt Paulsen Orange Networks LLC - Computers, Networks, Internet and Security http://www.orange-networks.com 503.533.4767 -----Original Message----- From: Marcel [mailto:Marcelrf@B...] Sent: Thursday, June 06, 2002 3:57 PM To: Perry Myers; NEXTEL1@yahoogroups.com; WFHSG@yahoogroups.com Subject: [TSCM-L] Cell/Radio Danger at gas stations That is interesting Moto went to great length to dispel any belief that cellphones are dangerous at gas stations ( see the letter below your comments). If there is documented proof it should be forwarded to Moto and the appropriate state and federal agency. Has any one seen any warnings from a state or federal agency? Marcel- Perry Myers wrote: > I received this from another group email. Thought it important enough > to pass on if it is indeed true. The investigator who provided this > said he investigated many explosions at gas stations that left only the > cell phone or radio as the possible source of the explosion. > > Subject: USE OF MOBILE PHONES NEAR PETROL FUMES > Date: 29 May 2002 09:51 > > To members - my daughter's firm is circulating the following advice to > all drivers. > > I know none of us would dream of using a mobile phone near petrol fumes > - or would we? > > Date: 2002, May 8th > SAFETY BULLETIN > No: A 033 > > SUBJECT > > Incident with mobile phones during refueling > > SUMMARY OF INCIDENT > > SHELL have issued a warning about Mobile Phones, they have reported 3 > incidents recently where Mobile Phones have ignited fumes whilst being > answered / ringing during fuelling operations. > > In the first case, the phone was placed on the boot lid during fuelling, > it rang and the ensuing fire destroyed the car and the pump. > > In the second, an individual suffered burns to the face when fumes > ignited as he answered a call during fuelling. > > In the third case, an individual suffered burns to the thigh and groin > as fumes ignited when the phone, which was in his pocket, rang during > fuelling. > > KEY INFORMATION > > It is a misconception that Mobile Phones can't ignite fuel / fumes. > > ISSUE IDENTIFIED (According to enclosed root cause analysis). > > It is a misconception that Mobile Phones can't ignite fuel / fumes. > > It is believed that the more modern phones (those that light up when > either switched on or when they ring) have enough energy released to > provide the spark for ignition! > > IMMEDIATE ACTIONS REQUIRED > > TECHNICAL : --- > > ORGANISATIONAL : > > 1. Mobile phones should not be used in filling stations. > > 2. Mobile phones should be turned off before exiting the vehicle when > stopping in a filling station. > > Perry Myers asked in a follow up email about validity of the information > and informant responded with the following: > Sir, My daughter is employed by Co-op Travelcare in the UK, part of the > CWS Group. The content of the message was circulated from Head Office to > all their personnel who are using cars in connection with their > employment. > The message, apparently, originated with Shell UK (petrol). > I have not checked with Shell because in my pre-retirement days I was in > charge of the Greater Manchester Police Motorway Group and attended a > few incidents where fires had broken out at petrol spillages. The usual > causes were eliminated (fuel dripping onto exhaust pipes, or hot metal, > discarded cigarettes etc) leaving the only other possibilities being > radios used by the emergency services or mobile telephones which seem to > breed at incidents. I was satisfied in my mind the origin of the fires > was because of mobile phone usage. > It did not come as a surprise to me, therefore, to see the Shell message > and passed it on to the group as a subtle warning not to take liberties > in the vicinity of petrol vapours - bearing in mind more people seem to > carry and use mobile phones when fuelling vehicles than smoke. > > ..........Sounds legitimate. > > Perry D. Myers, CFE > President & CEO > E-mail: perry@d... ============================================================================ ========== Use of Mobile Phones and Portable Radios in Gasoline Stations A Motorola Background Paper 3 May 2002 Over the last several years, there has been occasional speculation in the media and over the Internet that the use of mobile phones at gasoline stations could pose a risk of fire or explosion. This issue can be traced to reports of alleged incidents that have been investigated and never verified. Having looked into this issue at some length, Motorola can report that: ïWe know of no documented incident anywhere in the world where the use of a mobile phone or portable radio was identified as the cause of a fire or explosion in a gasoline station. ïThere is no credible reason to believe that the use of these products poses any such hazard. In response to rumors that attracted considerable attention in 1999, Motorola commissioned a review by an independent scientific, engineering and technical consulting firm: Exponent Failure Analysis Associates. Exponent concluded in December 1999 that ìthe use of a cell phone at a gasoline filling station under normal operating conditions presents a negligible hazardî and that the likelihood of such an accident under any conditions ìis very remote.î ìAutomobiles (which have numerous potential ignition sources) pose a greater ignition hazard,î the report said. ìFinally, other potential ignition sources are present, such as static discharge between a person and a vehicle.î An analysis by the Center for the Study of Wireless Electromagnetic Compatibility Center at the University of Oklahoma reached a similar conclusion in August 2001. It said research into this issue ìprovided virtually no evidence to suggest that cell phones pose a hazard at gas stations.î ìWhile it may be theoretically possible for a spark from a cell phone battery to ignite gas vapor under very precise conditions, the historical evidence does not support the need for further research,î the report said. ìUntil there is evidence to the contrary, we suggest that no further action be initiated in this regard, and that no recommendations for further action are required of the wireless phone or petroleum industries.î? The Exponent and Oklahoma reviews agreed that the issue was whether a battery-related spark could create a source of ignition. The radio signals from the phone were not at issue. The use of mobile phones in gasoline stations long ago attained the status of an ìurban legendî ñ rumor and supposition accorded undue credence because of repeated mentions in the media and over the Internet. In the end, public policies and consumer advice must be based not on speculation but fact. The facts in this case are clear. They are reinforced by extensive engineering analysis and suggest that there is no sound technical basis to prohibit the use of mobile phones in gasoline stations or single them out as hazards. References ìCell Phone Usage at Gasoline Stations.î Report to Motorola by Exponent Failure Analysis Associates, Menlo Park, California USA. December 1999. ìInvestigation of the Potential for Wireless Phones to Cause Explosions at Gas Stations.î Center for the Study of Wireless Electromagnetic Compatibility, University of Oklahoma, Norman, Oklahoma USA. August 2001. http://www.ou.edu/engineering/emc/ ìGas Station Warnings Perpetuate ëUrban Legend.íî Statement of Tom Wheeler, president and CEO of the Cellular Telecommunications Industry Association. October 7, 1999. www.wow-com.com/news/press/body.cfm?record_id=407 ìFuelish Pleasures: Is Using a Cell Phone at a Gas Station Dangerous?î Urban Legends Reference Pages. January 2002. www.snopes2.com/autos/hazards/gasvapor.htm For More Information: Norm Sandler Director, Global Strategic Issues Corporate Issues Management Phone: +1.202.371.6831 Chuck Eger Director, Strategic and Regulatory Policy PCS Phone: +1.202.371.6898 Fred Moloznik Director, Global Product Safety and Regulatory Affairs CGISS/iDEN Phone: +1.847.576-3324?Addendum: Potentially Hazardous Environments In February 2002, Motorola became aware of a reported accident at a Chevron Texaco drilling platform off the coast of Louisiana in which a contractor suffered burns while inspecting an instrumentation panel connected to a natural gas line. Accounts of this accident that have circulated over the Internet report that the accident occurred when the contractor opened his Nextel phone to answer an incoming call. This was described in at least one account as evidence of ìthe potential danger of electronic devices as ignition sourcesî in areas where natural gas may be present. Pending further information that may emerge from investigation by Chevron Texaco or others, our understanding of the situation is summarized in the following statement drafted by Motorola and Nextel and based on information obtained from Chevron Texaco: We are aware of reports of a contractor who, while using a wireless telephone at a Chevron Texaco drilling platform off the Louisiana coast, was injured in a flash fire accident. The actual cause of the accident remains under investigation. There has been no information to suggest that the wireless phone caused or contributed to the accident. Nextel representatives have been in touch with Chevron representatives and we have offered to provide assistance with any investigative efforts or needs. In an abundance of caution, Nextel phone user manuals instruct users to turn off their phones/radios in areas with potentially explosive atmospheres including those that may be present at oil or gas drilling or storage facilities. This recommendation is designed to eliminate any potential risks, no matter how remote, in such locations. Please refer to the Nextel user manual section titled "Safety and General Information" for specific instructions and more information. It is our understanding that Nextel Corporate Communications is prepared to respond to external inquiries about this matter. It is being forwarded for you to be able to confirm, if asked, that Motorola is aware of the accident, has no reason to believe that the phone was a cause of contributor to the accident, and provides specific instructions in its product manuals on the use of radios or wireless phones in potentially explosive atmospheres. ïMotorola manuals contain explicit instructions about the use of wireless phones and other portable radio products in other settings where potentially explosive atmospheres may exist.?ïSuch precautions relate in no way to the radio signal from the product, but rather to the remote -- and undemonstrated -- possibility of a fault, malfunction or spark creating an ignition source that would propagate outside the battery or radio. ïIn any event, Motorola advises consumers to obey any local restrictions on the use of wireless phones or other portable radio products in specific areas. The issues raised by the Chevron Texaco accident should not be confused with those related to the use of mobile phones of portable radios in gasoline stations. The environments are quite different and, as described above, oil and gas facilities ñ as well as numerous other industrial settings ñ often have specific rules about the use of radios and other electrical devices in areas known to have potentially explosive atmospheres. In an abundance of caution, these rules may dictate the use of ìintrinsically safeî equipment or other limitations on use. Workers should obey any site-specific rules or regulations on the use of such devices. -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5587 From: Marcel Date: Thu Jun 6, 2002 6:56pm Subject: Re: Cell/Radio Danger at gas stations, the risk is real Yea, I have seen that also but I'm wondering about an official warning / ordinance from a State or Federal agency that can be referenced. Not a oil company warning. Did you hear that a oil company claimed that radar detectors interfere with gas pumps? Matthew Paulsen wrote: > Yes, this is a threat, albeit a low one. You may wish to repost to the other > groups you posted to. Point your browser to: > http://www.search.shell.com/cgi-bin/rsearch.cgi 5588 From: Marcel Date: Thu Jun 6, 2002 8:07pm Subject: National Institute of Justice Research Report: Chapter 2-Video Surveillance: Video Cameras-Hardwired versus wireless systems Video Cameras (Chapter 2 Video Surveillance, Continued) Hardwired versus wireless systems http://www.ncjrs.org/school/ch2a_8.html -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 5589 From: Matthew Paulsen Date: Thu Jun 6, 2002 10:06pm Subject: RE: Cell/Radio Danger at gas stations Not really... Just some bans, and some very wide federal regulations... The US Code of Federal Regulations has tis: [CITE: 33CFR154.560] [Page 304-305] (e) Portable radio devices used to comply with paragraph (a) of this section during the transfer of flammable or combustible liquids must be marked as intrinsically safe by the manufacturer of the device and certified as intrinsically safe by a national testing laboratory or other certification organization approved by the Commandant as defined in 46 CFR 111.105-11. As an alternative to the marking requirement, facility operators may maintain documentation at the facility certifying that the portable radio devices in [[Page 305]] use at the facility are in compliance with this section. ---- But, I did like this: http://the.honoluluadvertiser.com/article/2002/Mar/10/ln/ln11a.html PS - You'll chuckle when you get to Lalago's quick thinking. :) -----Original Message----- From: Marcel [mailto:Marcelrf@B...] Sent: Thursday, June 06, 2002 4:56 PM To: mpaulsen6@a...; TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Cell/Radio Danger at gas stations, the risk is real Yea, I have seen that also but I'm wondering about an official warning / ordinance from a State or Federal agency that can be referenced. Not a oil company warning. Did you hear that a oil company claimed that radar detectors interfere with gas pumps? Matthew Paulsen wrote: > Yes, this is a threat, albeit a low one. You may wish to repost to the other > groups you posted to. Point your browser to: > http://www.search.shell.com/cgi-bin/rsearch.cgi ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5590 From: Date: Thu Jun 6, 2002 10:26pm Subject: "Loose Lips Sink Ships" Spy Agency: 'Loose Lips' Can Aid Terrorists Associated Press June 5, 2002 ANNAPOLIS JUNCTION, Maryland (AP) - The highly secretive National Security Agency has gone public with an advertising campaign urging members of the military to protect information that might be of use to terrorists. "Our enemies are unlike any we've encountered before," the spy agency says in advertisements running in four newspapers distributed to members of the Army, Air Force, Navy and Marine Corps. "Don't arm them with information that can harm us." The NSA, which is based at Fort Meade, usually does not respond to media calls. But it issued a two-page fact sheet Tuesday headlined, "Loose lips still sink ships!" It said the new ads and posters are reminiscent of the public relations campaigns the U.S. armed forces used during World War II to remind military personnel that casual comments about movements of troops and ships could be useful to enemy forces. The NSA's mission is to intercept and analyze potential foes' communications signals, many of which are encrypted and protected by other countermeasures. The NSA also protects U.S. communications systems. The ads feature a large image of a soldier or sailor looming over smaller images of equipment such as jets and tanks. Each carries the headline: "Information security begins with you." "Don't help American's enemies plan another attack," the text reads. The ads urge members of the military to use secure communications when discussing classified or sensitive information, practice computer security on the Internet, and handle and discard written information carefully. The ads, prepared by a Baltimore ad agency, will run in the Army Times, Navy Times, Air Force Times and Marine Corps Time, which are published by a private company. Posters similar to the ads will be distributed to military facilities. Copyright 2002 Associated Press. ---------- http://www.military.com/NewsContent?ESRC=airforce.nl&file=FL_spy_060602 [Non-text portions of this message have been removed] 5591 From: Marcel Date: Thu Jun 6, 2002 11:37pm Subject: Re: Cell/Radio Danger at gas stations Ok what is paragraph (A) ? Matthew Paulsen wrote: > Not really... Just some bans, and some very wide federal regulations... > The US Code of Federal Regulations has tis: > [CITE: 33CFR154.560] > > [Page 304-305] > > (e) Portable radio devices used to comply with paragraph (a) of this > section during the transfer of flammable or combustible liquids must be > marked as intrinsically safe 5592 From: blake bowers Date: Thu Jun 6, 2002 5:51pm Subject: Re: Cell/Radio Danger at gas stations No offense, but you would think that someone with so many credentials would at least check out a story a little bit, before forwarding it. www.snopes.com QUOTED Okay, so the bit about a guy in Indonesia being turned into a human fireball doesn't stand up -- what about persistent rumors about an Australian man done in by his mobile phone as he refueled? Although in 1999 oil companies told the South China Morning Post they had heard reports of an Australian man being blown up recently when his phone rang as he was filling his car with gasoline, fire service heads in Australia insist the incident never happened. As for incidents elsewhere in the world, after several reports in the United States where mobile phones were blamed for fires at gas stations, both the Cellular Telecommunications Industry Association (CTIA) and the American Petroleum Institute issued statements denying the risk. The CTIA said, "There is no evidence whatsoever that a wireless phone has ever caused ignition or explosion at a station anywhere in the world. Wireless phones don't cause gas stations to blow up. Warnings being posted in petrol stations simply perpetuate the myth." The American Petroleum Institute said, "We can find no evidence of someone using a cellphone causing any kind of accident, no matter how small, at a gas station anywhere in the world." Okay, so it hasn't happened yet. Is there still potential, yet unrealized, risk in using cell phones while refueling? According to the experts, there is a danger of touching off an explosion by using a mobile phone near gas pumps. However, this is a hugely remote possibility at best, and the risk is nowhere near as immediate as that of a number of other common pumpside behaviors such as smoking or leaving the engine running while filling the tank. Even so, gas pumps in Australia bear stickers cautioning motorists to turn off their phones while refueling; Shell in Malaysia has affixed similar stickers to each of its gas pumps; numerous pumps in the U.S.A. are similarly adorned; Canada's major gas pump operators have banned customers from using mobile phones while at the gas pump; and the city of Cicero, Illinois, recently passed the first law in the USA banning the use of cellular phones at gas stations. END QUOTED All of the major Fire organizations are not worried about this problem either. Perry Myers wrote: > I received this from another group email. Thought it important enough > to pass on if it is indeed true. The investigator who provided this > said he investigated many explosions at gas stations that left only the > cell phone or radio as the possible source of the explosion. > > Subject: USE OF MOBILE PHONES NEAR PETROL FUMES > Date: 29 May 2002 09:51 > > ..........Sounds legitimate. > > Perry D. Myers, CFE > President & CEO > E-mail: perry@d... > > MSI Detective Services > Myers Service, Inc. > Corporate Headquarters > 2076 N. Elston Ave. Suite 200 > Chicago, IL. 60614-3940 > Phone 773-342-8300 > Facsimile 773-486-4430 > > Professional Investigators Since 1959 > Investigations Nationwide > 24 Hour Availability > www.detectiveservices.com > > Process Service Division - Downtown Chicago > 205 W. Randolph St., Ste. 1210 > Chicago, IL. 60606 > Phone 312-782-4000 > Fax 312-853-3119 > > For Security, Surveillance & Privacy Products > U-Spy Store > Chicago - Orlando - Internet Sales > www.u-spystore.com > Orlando Warehouse - (800) 393-4779 > Chicago Sales - (773) 395-0220 > > For more information on our investigative services please visit our web > site at www.detectiveservices.com > 5593 From: Mitch D Date: Fri Jun 7, 2002 6:49am Subject: Re: Cell/Radio Danger at gas stations While I was waiting to pay for my gas at a local texaco/shell,I saw a little brochure(from shell oil) on the counter that pretty much issued the same warning.If you see the brochure the creator has done a great job of stereotyping the "offender". I dont believe any cell phone ignited any fire especially with most pumps using vapor recovery these days. Some asshole was probably smoking a cigarette,and had it in his or her hand,the same one holding the nozzle,and talking on theyre phone at the same time with the other hand....... Probably the same person that goes slower and slower in the left hand lane of the interstate,while yakking away holding up 4 miles of traffic until the call has ended. Although,as usual, some legal asswipe will find a way to cash in on this,as well as trying to figure out how to sell cell mfgs:"Dont use your phone within 1 mile of a gas pump" decals.Kind of reminds me of the McDonalds hot coffee scam......... --------------------------------- Do You Yahoo!? Sign-up for Video Highlights of 2002 FIFA World Cup [Non-text portions of this message have been removed] 5594 From: James M. Atkinson Date: Fri Jun 7, 2002 7:51am Subject: Foreign espionage on the increase http://www.sundaytimes.co.za/zones/sundaytimes/newsst/newsst1023339955.asp Foreign espionage on the increase Espionage activities have increased considerably, demonstrating that foreign intelligence services regarded South Africa as a priority, Intelligence Minister Lindiwe Sisulu said. "As we become a player in the international arena, and as we become a people to be reckoned with, our security stakes rise," she said during debate in the National Assembly on her budget vote. "We have to ensure therefore, that our security is at a level that is commensurate to what it is we want to protect. "It is important that South Africans understand that the absence of any threat to their national security is the result of continuous hard work by members of the services. "We sleep easy at night because they watch over us," Sisulu said. Sustaining the current, relatively favourable, national security picture in South Africa would depend largely on the country's economic performance, Sisulu said. The economy, therefore, remained one of the most important pillars of stability within the country, she added. The intelligence community was building the necessary capacity to monitor and advise on economic intelligence issues. "This will be one of our major investments for the next two years. We have to jealously guard what we have achieved; our economy is doing well, that's what my counterparts tell me, we have to keep it that way." Threats to South Africa's economic interests included economic and industrial espionage, economic and financial crimes, such as fraud, scams and money laundering, and deliberate acts to discredit or undermine foreign and domestic confidence in the country, Sisulu said. Sapa -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5595 From: James M. Atkinson Date: Fri Jun 7, 2002 7:51am Subject: Many in U.S. under constant surveillance http://www.philly.com/mld/inquirer/news/3411187.htm Posted on Thu, Jun. 06, 2002 Many in U.S. under constant surveillance The FBI's director said watching so many people suspected of having ties to terrorists was taxing the agency's resources. Washington Post WASHINGTON - The FBI has placed a "substantial" number of people suspected of ties to terror under constant surveillance in various parts of the United States, FBI Director Robert Mueller said yesterday. He said the agency was sending out special teams of agents roughly every two weeks in a mission that is seriously taxing the agency's resources. He would not specify how many possible terrorists the agency is tracking, but he said the bureau has been "pushed, really pushed," to keep up with them. He said agents have no choice but to monitor those people around the clock when they cannot be detained for immigration or other violations. "Our biggest problem is we have people we think are terrorists. They are supporters of al-Qaeda... . They may have sworn jihad [holy war], they may be here in the United States legitimately and they have committed no crime," Mueller said in an interview with Washington Post reporters and editors. "What do we do for the next five years? Do we surveil them? Some action has to be taken." Mueller's remarks are among the strongest government assertions that people with suspected connections to Osama bin Laden's al-Qaeda terrorist network remain in the United States, and they reflect the FBI's consuming race to thwart another attack. The remarks come a little more than two weeks after a succession of Bush administration officials, including Vice President Cheney, Secretary of Defense Donald H. Rumsfeld and Mueller himself warned publicly about the likelihood of another strike against the United States. Mueller also said that investigators believe the idea of the Sept. 11 attacks came from al-Qaeda leaders in Afghanistan, the actual plotting was done in Germany, and the financing came through the United Arab Emirates from sources back in Afghanistan. As Mueller moves to revamp the FBI and substantially beef up its counterterror forces to prevent another attack, the current solution to tracking possible terrorists is special squads. These are surveillance teams that the FBI has been dispatching about every other week since Sept. 11, particularly to locations where its field offices lack agents or translators to do the tedious work. The surveillance can be done on the ground, by air or, in some cases, with court-approved wiretaps, Mueller said. "There are gradations of persons who we might look at and their affiliation with a terrorist," Mueller said, explaining that they could range from someone "who has called a number of a prominent terrorist overseas" to a person passing out literature in support of bin Laden. "There are all gradations along that spectrum," he said. Mueller declined to say what kinds of leads have been developed as a result of the surveillance work. He said the FBI will be better-equipped to track terrorist activity because of changes made last week to guidelines governing the conduct of FBI probes. For example, agents now will be able to observe activities in public places, including houses of worship, to develop leads even when they have no evidence of criminal activity. And they will be able to more freely surf the Internet in search of clues to terror plans. Despite enhanced authority, Mueller said the FBI has no plans to conduct widespread surveillance of mosques, a concern raised by Arab American leaders and civil liberties groups. He said the new guidelines do not infringe upon personal freedom and "allow us to go where the public can go" in an attempt to generate antiterrorist leads. In particular, he said, agents intend to surf the Internet, for clues on bin Laden's network and other groups. In the past, the guidelines did not permit such work without evidence indicating criminal activity was taking place. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5596 From: Hawkspirit Date: Fri Jun 7, 2002 10:40am Subject: Spectrum Survey I just ordered this report, and it appears that they have them for other cities, This is quite helpful. Roger NTIA Report 97-336 Broadband Spectrum Survey at Los Angeles, California May 1997 http://www.its.bldrdoc.gov/pub/ntia-rpt/97-336/ 5597 From: Marcel Date: Fri Jun 7, 2002 11:27am Subject: Re: Cell/Radio Danger at gas stations yep! Mitch D wrote: > While I was waiting to pay for my gas at a local texaco/shell,I saw a little brochure(from shell oil) on the counter that pretty much issued the same warning.If you see the brochure the creator has done a great job of stereotyping the "offender". > I dont believe any cell phone ignited any fire especially with most pumps using vapor recovery these days. > Some asshole was probably smoking a cigarette,and had it in his or her hand,the same one holding the nozzle,and talking on theyre phone at the same time with the other hand....... > Probably the same person that goes slower and slower in the left hand lane of the interstate,while yakking away holding up 4 miles of traffic until the call has ended. > > Although,as usual, some legal asswipe will find a way to cash in on this,as well as trying to figure out how to sell cell mfgs:"Dont use your phone within 1 mile of a gas pump" decals.Kind of reminds me of the McDonalds hot coffee scam......... > > --------------------------------- > Do You Yahoo!? > Sign-up for Video Highlights of 2002 FIFA World Cup > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 5598 From: Steve Uhrig Date: Fri Jun 7, 2002 0:42pm Subject: WIZARDS front and center! Riddle #2 OK Wizards, here's another black box challenge. Let's see if more people can come up with the proper answer here than the last one. Basic AC theory is all you need to solve this. As before, assume components are perfect, i.e. capacitors have no leakage, resistors have no inductance, inductors have no resistance, semiconductors have no leakage, etc. Also take as a given the box does not contain any explosive or dangerous substance and you are not risking your life doing testing on an unknown device! And, don't make it any more complicated than it needs to be. Remember the old adage, "When you hear hoofbeats, think horses, not zebras." Here 'tis: ==================== You've been handed a black box. It's about the size of a brick, although the size doesn't matter. There are two terminals on the side. Your job is to identify what is inside the box. As before, you do not have X-Ray capability nor do you have (or need) any exotic test equipment. You happen to have an AC ammeter, an AC voltmeter, and a wattmeter. You also have a power supply which puts out 1 volt AC at 60 cycles. Although anyone working with TSCM should know this, I will remind you a voltmeter goes in parallel, an ammeter goes in series, and a wattmeter, which is the product of volts times amps, goes both in series and in parallel with three wires, at the same time. Assume the test equipment is operating properly and is connected properly. Any conditions not given do not matter. Do not assume anything not given, or ask me off list. One answer submitted the last time depended on leakage and a common path through the AC power ground of the test equipment, which invalidated the answer. Remember watts = volts x amps You notice, if you connect the voltmeter, ammeter and watttmeter to the power source and the terminals on the black box, and apply the 1 volt AC through the test equipment, you see the following readings: AC volts1 volt AC current1 amp AC watts0 watts Wait a minute! Zero watts? How can that be? Watts equals volts times amps, and we have both voltage applied and current being drawn. What's going on inside that black box? =========================== A generic answer of 2 or 3 words will be acceptable, but you'll get extra brownie points if you could give an example of exactly what sort of components or device could cause the effect of the generic answer. 1300+ members on this list, many if not most claiming to be involved in TSCM. How many know BASIC theory well enough to answer the riddle? Last time, less than 1% got the correct answer. Two were students. Basic electronic theory is MANDATORY to any TSCM work. If you can answer this question, you have my respect. If you can't, you need to take or take again some basic electronics courses if you plan to be active in TSCM. If you don't, you're fooling yourself and cheating your clients, and should sell your equipment and find another way to take money from people. And, the excuse of 'I know the theory but I'm no good at riddles' doesn't carry any weight. TSCM is as much investigative and solving problems/riddles with few inputs as anything else. Reply directly to me with your answer. Do NOT post it to the list. After some time has passed, I'll post the names and emails of those who submitted the correct answer. Please indicate if you do NOT want your info posted. And, if we are speaking on the phone and you give me the answer, please also drop it to me in an email, as I drop all correct answers into a folder and it from that folder where I will get the names of the winners to post. I test these on my father, an elderly and long retired electrical engineer/manager whose formal training dated back to the 1940s in college. Like the previous one, he instantly supplied the few word generic answer to the riddle above. Have at it! For the benefit of a few people I copied on this message who are not list members, TSCM = Technical Surveillance CounterMeasures, or the practice of sweeping for hidden electronic eavesdropping devices aka debugging. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5599 From: Steev Date: Fri Jun 7, 2002 8:19am Subject: Re: Cell/Radio Danger at gas stations ive heard similar claims in the UK, cell phones igniting vapour. But i have since heard that the concern is that the phone will affect the wireless network the pumps use to communicate with the till systems. s'what i heard anyway. Steevp __________________________________________________ Do You Yahoo!? Everything you'll ever need on one web page from News and Sport to Email and Music Charts http://uk.my.yahoo.com 5600 From: acirafice Date: Fri Jun 7, 2002 11:08am Subject: SCIF Construction I work for a company that primarily supports DoD contracts. I've been put into the position of trying to build a SCIF without having sponsorship. In other words, a space that is accreditable by some Gov agency that might be willing to sponsor and/or accredit this space at some point in the future. (Sponsorship doesn't appear to be imminent.) I have DD254s but none authorize a SCIF yet. We are in the pre-planning stages and I have started communicating the requirements of DCID 1/21 to my facilities staff. I wrote a SCIF Physical Security White Paper. I'm told the paper has some deficiencies. I believe that the gaps in the White Paper are primarily due to the DCID being vague in some areas and my inexperience with trying to address physcial security in this envioronment. Is anyone aware of supplemental DCID 1/21 guidance that may be available? My best guess is that DIA will be the accreditor once a contractual requirement exists. I have been told that DCID 1/21 will be replaced this summer by DCID 6/9. I have not seen the new DCID to date, and I'm unsure of the scope of the changes. Thanks! 5601 From: Perry Myers Date: Fri Jun 7, 2002 1:26pm Subject: RE: Cell/Radio Danger at gas stations That's why I said it was not verified. I don't always have time to check everything out and pay the rent at the same time. No offense taken as long as you are not offended that I wanted to put this out for discussion to possibly save a group member from exploding at a BP Amoco. In the mean time here is another piece of information that may or may not be true that was sent out by a respected colleague. "Thanks for the info Perry. I also found out from a petroleum security director that radio RF signals can ignite gasoline. For years, the air force does not allow two-way radios to be turned on or used in an area where an airplane is being refueled on the ground. A cell phone produces an RF signal and therefore there is the same possibility of catching fire as with a two-way radio." PS. All my credentials? I'm just a PI/CFE. -----Original Message----- From: blake bowers [mailto:bbowers@t...] Sent: Thursday, June 06, 2002 5:52 PM To: Perry Myers Cc: TSCM Group (E-mail) Subject: Re: [TSCM-L] Cell/Radio Danger at gas stations No offense, but you would think that someone with so many credentials would at least check out a story a little bit, before forwarding it. www.snopes.com QUOTED Okay, so the bit about a guy in Indonesia being turned into a human fireball doesn't stand up -- what about persistent rumors about an Australian man done in by his mobile phone as he refueled? Although in 1999 oil companies told the South China Morning Post they had heard reports of an Australian man being blown up recently when his phone rang as he was filling his car with gasoline, fire service heads in Australia insist the incident never happened. As for incidents elsewhere in the world, after several reports in the United States where mobile phones were blamed for fires at gas stations, both the Cellular Telecommunications Industry Association (CTIA) and the American Petroleum Institute issued statements denying the risk. The CTIA said, "There is no evidence whatsoever that a wireless phone has ever caused ignition or explosion at a station anywhere in the world. Wireless phones don't cause gas stations to blow up. Warnings being posted in petrol stations simply perpetuate the myth." The American Petroleum Institute said, "We can find no evidence of someone using a cellphone causing any kind of accident, no matter how small, at a gas station anywhere in the world." Okay, so it hasn't happened yet. Is there still potential, yet unrealized, risk in using cell phones while refueling? According to the experts, there is a danger of touching off an explosion by using a mobile phone near gas pumps. However, this is a hugely remote possibility at best, and the risk is nowhere near as immediate as that of a number of other common pumpside behaviors such as smoking or leaving the engine running while filling the tank. Even so, gas pumps in Australia bear stickers cautioning motorists to turn off their phones while refueling; Shell in Malaysia has affixed similar stickers to each of its gas pumps; numerous pumps in the U.S.A. are similarly adorned; Canada's major gas pump operators have banned customers from using mobile phones while at the gas pump; and the city of Cicero, Illinois, recently passed the first law in the USA banning the use of cellular phones at gas stations. END QUOTED All of the major Fire organizations are not worried about this problem either. Perry Myers wrote: > I received this from another group email. Thought it important enough > to pass on if it is indeed true. The investigator who provided this > said he investigated many explosions at gas stations that left only the > cell phone or radio as the possible source of the explosion. > > Subject: USE OF MOBILE PHONES NEAR PETROL FUMES > Date: 29 May 2002 09:51 > > ..........Sounds legitimate. > > Perry D. Myers, CFE > President & CEO > E-mail: perry@d... > > MSI Detective Services > Myers Service, Inc. > Corporate Headquarters > 2076 N. Elston Ave. Suite 200 > Chicago, IL. 60614-3940 > Phone 773-342-8300 > Facsimile 773-486-4430 > > Professional Investigators Since 1959 > Investigations Nationwide > 24 Hour Availability > www.detectiveservices.com > > Process Service Division - Downtown Chicago > 205 W. Randolph St., Ste. 1210 > Chicago, IL. 60606 > Phone 312-782-4000 > Fax 312-853-3119 > > For Security, Surveillance & Privacy Products > U-Spy Store > Chicago - Orlando - Internet Sales > www.u-spystore.com > Orlando Warehouse - (800) 393-4779 > Chicago Sales - (773) 395-0220 > > For more information on our investigative services please visit our web > site at www.detectiveservices.com > 5602 From: Aimee Farr Date: Fri Jun 7, 2002 2:38pm Subject: Please help Russia with her WMD litter problem. Yes, another FSB bust involving WMD! This time, radioactive missiles found in a cemetery via an anonymous tip! This is the third such bust I know of involving radioactive material. As recently as last week, a thallium collar was reported -- enough to kill all the citizens of Moscow. People pick up signs along the side of the road, and blow up. Cell phones have started to explode. Buildings just "fall down." Russia has a WMD litter problem. According to reports, most of this stuff is just sort of 'lying' about. The FSB is clearly working for us, protecting us by keeping these nasties from falling into terrorist hands, or by placing nasties into terrorist hands, per allegations of contact poisoning. Alternatively, they won't put their toys up when they are finished playing with them, indicating a lack of discipline. They are throwing Weimar Russia confetti...They are over there going on about how their flag "looks both ways".....some modern equivalent of the Greater Asian Co-prosperity Sphere...That Kaliningrad enclave gripe looks like Hitler's Sudeten Germans....Bunch of smoke from forest fires...(Russians like smoke)...if a radio station gets attacked, watch for them to invade Poland by mistake. According to their press, their military is so weak, it couldn't get out of bed. That's right....it's BARBAROSSA. You know, general strategic cover, economic treaties and diplomatic overtures....defensive pretexts....the whole nine yards and a nest of stinkbugs. I am reminded of the story of a dolphin. To show trust to the trainer, the dolphin rolls over and presents its vitals. Then, it takes the trainer's hand in it's mouth, and lets go. In an interesting twist, Russia appears to be rolling over and presenting what it can [BLANK] us with. Did we goof up and stuck our hand in their mouth? (Well, their "poison cookie complaint"....gave me a license to have a little fun.) ~Aimee 5603 From: James M. Atkinson Date: Fri Jun 7, 2002 5:23pm Subject: Re: Neuro-influencing technologies Your right, I shouldn't imply mental illness. Let me come right out and say it directly: Most of the "information" being circulated about mind control and electric harassment is pure and utter fantasy. People who claim to be a victim of mind control have a serous underlying psychiatric disorder and need to seek immediate medical help. -jma At 7:14 AM -0700 5/28/02, mcresearch@w... wrote: >I suggest rather than implying mental illness to victims of such >technologies thus continuing the victimization, you read this site >http://dcn.davis.ca.us/~welsh -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5604 From: James M. Atkinson Date: Fri Jun 7, 2002 10:05pm Subject: Spy agency listening in http://www.thewest.com.au/20020605/news/latest/tw-news-latest-home-sto59266.html Spy agency listening in CANBERRA THE nation's top secret electronic spy body, the Defence Signals Directorate, regularly tapes the conversations of ordinary Australians, The Defence Department said today. Department deputy secretary for intelligence and security Ron Bonighton said the eavesdropping occurred as DSD went about its legitimate business of monitoring electronic communications to collect foreign intelligence. "The problem is that Australians are everywhere and even if we're concentrating on the foreign part of our business, we're bound to come across them," Mr Bonighton told a Senate estimates committee. Under its rules, DSD is not permitted to monitor electronics communications within Australia or to report on the activities of Australians, except in a few special occasions. The issue was highlighted with the controversy over the MV Tampa boat people standoff last year where. DSD was alleged to have monitored satellite phone conversations between Australian unions officials and lawyers and Tampa and reported to the government on their content. Inspector General of Intelligence and Security Bill Blick said there were four instances where DSD incidentally collected intelligence related to the communications of Australians in breach of DSD rules. Defence has now sent letters of apology to the four. -AAP -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5605 From: Matthew Paulsen Date: Fri Jun 7, 2002 10:39pm Subject: RE: Cell/Radio Danger at gas stations I just asked my father who worked in the air force with nukes for many many years on bombers during refueling if this is the case. My father doesn't appear to think this is the truth... Since he was exposed to this area on a daily basis I'd wonder about this a bit more... BUT... he did happen to see a jackknifed loader full of conventional bombs heading towards a b52 once. That appears to have concerned everyone in the immediate vacinity (as they all started running from the epicenter as fast as possible - loader-><-b52 ) more than the pilots communicating with the towers during refueling according to his recollection. Matt ps - the loader didn't hit the b52. -----Original Message----- From: Perry Myers [mailto:perry@m...] Sent: Friday, June 07, 2002 11:27 AM Cc: TSCM Group (E-mail) Subject: RE: [TSCM-L] Cell/Radio Danger at gas stations That's why I said it was not verified. I don't always have time to check everything out and pay the rent at the same time. No offense taken as long as you are not offended that I wanted to put this out for discussion to possibly save a group member from exploding at a BP Amoco. In the mean time here is another piece of information that may or may not be true that was sent out by a respected colleague. "Thanks for the info Perry. I also found out from a petroleum security director that radio RF signals can ignite gasoline. For years, the air force does not allow two-way radios to be turned on or used in an area where an airplane is being refueled on the ground. A cell phone produces an RF signal and therefore there is the same possibility of catching fire as with a two-way radio." PS. All my credentials? I'm just a PI/CFE. -----Original Message----- From: blake bowers [mailto:bbowers@t...] Sent: Thursday, June 06, 2002 5:52 PM To: Perry Myers Cc: TSCM Group (E-mail) Subject: Re: [TSCM-L] Cell/Radio Danger at gas stations No offense, but you would think that someone with so many credentials would at least check out a story a little bit, before forwarding it. www.snopes.com QUOTED Okay, so the bit about a guy in Indonesia being turned into a human fireball doesn't stand up -- what about persistent rumors about an Australian man done in by his mobile phone as he refueled? Although in 1999 oil companies told the South China Morning Post they had heard reports of an Australian man being blown up recently when his phone rang as he was filling his car with gasoline, fire service heads in Australia insist the incident never happened. As for incidents elsewhere in the world, after several reports in the United States where mobile phones were blamed for fires at gas stations, both the Cellular Telecommunications Industry Association (CTIA) and the American Petroleum Institute issued statements denying the risk. The CTIA said, "There is no evidence whatsoever that a wireless phone has ever caused ignition or explosion at a station anywhere in the world. Wireless phones don't cause gas stations to blow up. Warnings being posted in petrol stations simply perpetuate the myth." The American Petroleum Institute said, "We can find no evidence of someone using a cellphone causing any kind of accident, no matter how small, at a gas station anywhere in the world." Okay, so it hasn't happened yet. Is there still potential, yet unrealized, risk in using cell phones while refueling? According to the experts, there is a danger of touching off an explosion by using a mobile phone near gas pumps. However, this is a hugely remote possibility at best, and the risk is nowhere near as immediate as that of a number of other common pumpside behaviors such as smoking or leaving the engine running while filling the tank. Even so, gas pumps in Australia bear stickers cautioning motorists to turn off their phones while refueling; Shell in Malaysia has affixed similar stickers to each of its gas pumps; numerous pumps in the U.S.A. are similarly adorned; Canada's major gas pump operators have banned customers from using mobile phones while at the gas pump; and the city of Cicero, Illinois, recently passed the first law in the USA banning the use of cellular phones at gas stations. END QUOTED All of the major Fire organizations are not worried about this problem either. Perry Myers wrote: > I received this from another group email. Thought it important enough > to pass on if it is indeed true. The investigator who provided this > said he investigated many explosions at gas stations that left only the > cell phone or radio as the possible source of the explosion. > > Subject: USE OF MOBILE PHONES NEAR PETROL FUMES > Date: 29 May 2002 09:51 > > ..........Sounds legitimate. > > Perry D. Myers, CFE > President & CEO > E-mail: perry@d... > > MSI Detective Services > Myers Service, Inc. > Corporate Headquarters > 2076 N. Elston Ave. Suite 200 > Chicago, IL. 60614-3940 > Phone 773-342-8300 > Facsimile 773-486-4430 > > Professional Investigators Since 1959 > Investigations Nationwide > 24 Hour Availability > www.detectiveservices.com > > Process Service Division - Downtown Chicago > 205 W. Randolph St., Ste. 1210 > Chicago, IL. 60606 > Phone 312-782-4000 > Fax 312-853-3119 > > For Security, Surveillance & Privacy Products > U-Spy Store > Chicago - Orlando - Internet Sales > www.u-spystore.com > Orlando Warehouse - (800) 393-4779 > Chicago Sales - (773) 395-0220 > > For more information on our investigative services please visit our web > site at www.detectiveservices.com > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5606 From: Jim Conrad Date: Sat Jun 8, 2002 1:47am Subject: FS: ICOM R71/R-7000 Transport Case/Rack Mount Made for State Department or CIA, even if not interested in purchasing take a look out the craftmanship; http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=1358747616 <:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:> Jim Conrad - jjc@o... or jimc1790@a... (backup) 757-560-5970 Office/Voicemail/Pager - 757-587-8251 Fax CAGE 0UD60 - http://www.oceanviewcom.com/ 5607 From: Mitch D Date: Fri Jun 7, 2002 7:15pm Subject: Re: Cell/Radio Danger at gas stations Perry, Sorry if you thought I was "cracking on your post",I just had to offer a little tongue in cheek humor along with what I saw. It may be possible for a pump nozzle hose assy to "act as an antenna" being the closest, conductor or device that would have antenna like properties,but as far as them passing a spark off of lower power RF I dont thinkit possible,if I'm wrong someone please educate us. IE: we were having a problem with rf noise "splatter" in a certain area,and a quick check with some gear showed a enormous amount of noise on the rf floor,and it peaked highes when we got near a "lone" telco pole.when you would move away from the pole, the noise level would drop off slightly. After contacting the local power co,they sent a crew out several days later to replace a broken insulator on a nearby high voltage line that was cracked,and barely hanging on.After the repair,no more "splatter" at the pole,and the "rf floor" was back to its usual half garbage filled self. Point being maybe some nozzles are acting as antennas thru inductance,or picking up a static charge thats enhanced,or being created by a culprit cell phone.If you look at the construction of a gas pump hose,its made of braided hose,covered with rubber,or similar material,with a aluminum or cast nozzle with a coil around the end of the nozzle.and a large rubber flange for vapor recovery.May work as an antenna by design no?Theres probably a better name for this inductive property,I cant think of the name at this time.....With most cell phones tx ing at less than 600mw,I cant see a cell phone of today passively setting a user on fire,especially if the nozzle is in the fill w fluid pumping away,and the vehicle acting as a "ground for the hose"Although I could maybe see a problem arising thru the use of a high powered tx on UHF/or VHF,although most HT's arent putting out anymore than 10 watts anyhow. If anyone knows of this property,please jump in and tell us! Thanx! Just my pennys worth............ --------------------------------- Do You Yahoo!? Sign-up for Video Highlights of 2002 FIFA World Cup [Non-text portions of this message have been removed] 5608 From: Michael Puchol Date: Sat Jun 8, 2002 6:52am Subject: Re: Cell/Radio Danger at gas stations Well, a few years ago, in my student days, I did some time as work experience with refuelers at the local airport, and I remember they were VERY strict about radios around the aircraft while it was being refueled. However, I think this had more to do with the radio's batteries or circuitry sparking, than with RF-induced discharges in the fuel tanks or bowser. All the best, Mike ----- Original Message ----- From: "Matthew Paulsen" To: "TSCM Group (E-mail)" Sent: Saturday, June 08, 2002 5:39 AM Subject: RE: [TSCM-L] Cell/Radio Danger at gas stations > I just asked my father who worked in the air force with nukes for many many > years on bombers during refueling if this is the case. My father doesn't > appear to think this is the truth... Since he was exposed to this area on a > daily basis I'd wonder about this a bit more... BUT... he did happen to see > a jackknifed loader full of conventional bombs heading towards a b52 once. > That appears to have concerned everyone in the immediate vacinity (as they > all started running from the epicenter as fast as possible - loader-><-b52 ) > more than the pilots communicating with the towers during refueling > according to his recollection. > > Matt > > ps - the loader didn't hit the b52. > > > > > -----Original Message----- > From: Perry Myers [mailto:perry@m...] > Sent: Friday, June 07, 2002 11:27 AM > Cc: TSCM Group (E-mail) > Subject: RE: [TSCM-L] Cell/Radio Danger at gas stations > > > That's why I said it was not verified. I don't always have time to > check everything out and pay the rent at the same time. No offense > taken as long as you are not offended that I wanted to put this out for > discussion to possibly save a group member from exploding at a BP Amoco. > In the mean time here is another piece of information that may or may > not be true that was sent out by a respected colleague. > > "Thanks for the info Perry. I also found out from a petroleum security > director that radio RF signals can ignite gasoline. For years, the air > force > does not allow two-way radios to be turned on or used in an area where > an > airplane is being refueled on the ground. A cell phone produces an RF > signal and therefore there is the same possibility of catching fire as > with > a two-way radio." > > PS. All my credentials? I'm just a PI/CFE. > > -----Original Message----- > From: blake bowers [mailto:bbowers@t...] > Sent: Thursday, June 06, 2002 5:52 PM > To: Perry Myers > Cc: TSCM Group (E-mail) > Subject: Re: [TSCM-L] Cell/Radio Danger at gas stations > > > > No offense, but you would think that someone with so many credentials > would at least check out a story a little bit, before forwarding it. > > www.snopes.com > > QUOTED > Okay, so the bit about a guy in Indonesia being turned into a human > fireball > doesn't > stand up -- what about persistent rumors about an Australian man > done > in by his > mobile phone as he refueled? > > Although in 1999 oil companies told the South China Morning Post > they > had heard reports of an Australian man > being blown up recently when his phone rang as he was filling > his car > with gasoline, fire service heads in > Australia insist the incident never happened. > > As for incidents elsewhere in the world, after several reports > in the > United States where mobile phones were > blamed for fires at gas stations, both the Cellular > Telecommunications Industry Association (CTIA) and the > American Petroleum Institute issued statements denying the risk. > The > CTIA said, "There is no evidence > whatsoever that a wireless phone has ever caused ignition or > explosion at a station anywhere in the world. > Wireless phones don't cause gas stations to blow up. Warnings > being > posted in petrol stations simply perpetuate > the myth." The American Petroleum Institute said, "We can find > no > evidence of someone using a cellphone > causing any kind of accident, no matter how small, at a gas > station > anywhere in the world." > > Okay, so it hasn't happened yet. Is there still potential, yet > unrealized, risk in using cell phones while refueling? > > According to the experts, there is a danger of touching off an > explosion by using a mobile phone near gas pumps. > However, this is a hugely remote possibility at best, and the > risk is > nowhere near as immediate as that of a > number of other common pumpside behaviors such as smoking or > leaving > the engine running while filling the > tank. Even so, gas pumps in Australia bear stickers cautioning > motorists to turn off their phones while refueling; > Shell in Malaysia has affixed similar stickers to each of its > gas > pumps; numerous pumps in the U.S.A. are > similarly adorned; Canada's major gas pump operators have banned > customers from using mobile phones while at > the gas pump; and the city of Cicero, Illinois, recently passed > the > first law in the USA banning the use of cellular > phones at gas stations. > END QUOTED > > All of the major Fire organizations are not worried about this problem > either. > > > > Perry Myers wrote: > > > I received this from another group email. Thought it important enough > > to pass on if it is indeed true. The investigator who provided this > > said he investigated many explosions at gas stations that left only > the > > cell phone or radio as the possible source of the explosion. > > > > Subject: USE OF MOBILE PHONES NEAR PETROL FUMES > > Date: 29 May 2002 09:51 > > > > ..........Sounds legitimate. > > > > Perry D. Myers, CFE > > President & CEO > > E-mail: perry@d... > > > > MSI Detective Services > > Myers Service, Inc. > > Corporate Headquarters > > 2076 N. Elston Ave. Suite 200 > > Chicago, IL. 60614-3940 > > Phone 773-342-8300 > > Facsimile 773-486-4430 > > > > Professional Investigators Since 1959 > > Investigations Nationwide > > 24 Hour Availability > > www.detectiveservices.com > > > > Process Service Division - Downtown Chicago > > 205 W. Randolph St., Ste. 1210 > > Chicago, IL. 60606 > > Phone 312-782-4000 > > Fax 312-853-3119 > > > > For Security, Surveillance & Privacy Products > > U-Spy Store > > Chicago - Orlando - Internet Sales > > www.u-spystore.com > > Orlando Warehouse - (800) 393-4779 > > Chicago Sales - (773) 395-0220 > > > > For more information on our investigative services please visit our > web > > site at www.detectiveservices.com > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5609 From: Aimee Farr Date: Sat Jun 8, 2002 1:55pm Subject: RE: Neuro-influencing technologies (and a serious question at bottom) > Your right, I shouldn't imply mental illness. > > Let me come right out and say it directly: Most of the "information" > being circulated about mind control and electric harassment is pure > and utter fantasy. People who claim to be a victim of mind control > have a serous underlying psychiatric disorder and need to seek > immediate medical help. > > -jma > > > At 7:14 AM -0700 5/28/02, mcresearch@w... wrote: > >I suggest rather than implying mental illness to victims of such > >technologies thus continuing the victimization, you read this site > >http://dcn.davis.ca.us/~welsh > -- We *do* have mind-control issues in the U.S. Historically, top decision-makers use it on themselves at the highest levels of government. IT'S THE WEAPON OF SELF-DECEPTION. (While we talk of mind control and influence, note the degree of selective exposure and the number of impressions on this website.) THE HOUSE IS ON FIRE (stimulus) & "MIND CONTROL": ------------------------------------------------ ''Imagine a number of individuals, varying widely in their predispositions, who find themselves inside a house on fire. It would be perfectly realistic to expect that these individuals, with rare exceptions, would feel compelled to run toward the exit... Surely, therefore, for an explanation of the rush for the exits, there is no need to analyze the individual decisions that produced it.'' -- Arnold Wolfers But it's not that simple... o People normally disagree as to whether or not the house "is on fire." For example, while your clients perceive security risks, people disagree widely about the scope of the problem. o People normally disagree as to the best course of action from a "triggering event" (the fire). In life, there is more than one "exit." Even real-life "fires" are often not the true cause of an action/response. Something else would have come along so as to fulfill expectations. o Even if people would always behave the same way to a stimulus, there are differences in a person's perceptions of stimuli and the reality of the situation. Your reality is your construction. o People feel as if they are acting under external compulsion partly as the result of cognitive dissonance which causes them to reduce mental friction so as to maintain their self-image. (It might be an insult to even suggest some people can be replaced by a "mind ray," when their mind, pencil and paper will do.) NOTE: NON-LETHAL WEAPONRY CAN BE A BAAAAAAAAAAD IDEA ---------------------------------------------------- Other countries don't like to think about "beams," especially coming from space. http://www.de.afrl.af.mil/factsheets/activedenial.html Some cultures will go BONKERS over "ray guns." Bullets are something they are at least accustomed to. Some of this stuff may offer marginal advantage, but provoke an EXTREME RESPONSE (WMD) -- making it dangerous in situations where we seek to limit escalation. It would be like The War of the Worlds to some people. Our expectations in conflict, become customs, and then our images of morality. When you take an offensive action that seeks to weaken or destroy, and one that offers longevity of control -- you invite the most extreme response. In contrast to some value systems of a "humane" weapon, some might view this on the level that we view a nuclear strike. It's largely outside of their expectations and situational control, presenting some with a choice between extremes. We are starting to project our value system with some of this "non-lethal" weaponry, without considering the interdependency of decision-making in conflict, and how perceptions differ. While I disagree with this website, I think it is telling us something important. Every new "gadget" we have, should come with a COUNTERDECEPTION IMPACT STATEMENT, to identify half-life in the countermeasure spiral, anticipate adversarial response across cultural mores, identify countermeasures, etc. Even on a law enforcement level. (Some of these counterterrorism solutions, are going to have some counterintuitive results.) Question: Do we do anything like that? ~Aimee 5610 From: Aimee Farr Date: Sun Jun 9, 2002 2:48pm Subject: RE: Neuro-influencing technologies (and a serious question at bottom) > (While we talk of mind control and influence, note the degree of selective > exposure and the number of impressions on this website.)> No, no... not Atkinson's website, the activist's website that was referenced. Normal people will often seek confirming information, rather than disconfirming information. This is "selective exposure." It leads to "odd matching." They "connect too many dots." Many will not even perceive discordant information which would question their theory or belief system. (This process can be organizational.) Chances are, you probably know somebody like that who reacted in a psychological doodlebug manner when confronted with information they just didn't want to believe. ----- TRANSMISSION: "Help!!! We're being attacked by [BLANK]!!!! Send help!!!" HQS REPLY: "That's impossible, and why are you breaking protocol?" THIRD PARTY RECIPIENT: Looks out the window, even though he's a 1,000 miles away. ----- I wasn't being disrespectful to anybody. (We could all be hit by mind rays tomorrow, for all I know.) In fairness, technical experts seem to downplay the possibility of adversarial "leaps" as not possible. A common expert knowledge elicitation trap. What many see as sort of a enemy bias, is probably mirror-imaging, and a by-product of the scientific way you approach problems (often as a series of obstacles). This is not to suggest that you aren't the best people to ask, of course, just that some people are "crabwise thinkers"....and have been known to do the impossible because they see The Third Option. At any rate, reality plays a surprisingly marginal role in human decision-making. (See generally, congress.) ~Aimee 5611 From: Secdep Date: Mon Jun 10, 2002 3:56am Subject: SpyFinder With regards to Spyfinder there is an article dated November 7, 2001 - Spy vs. Spy: Device Takes Hidden Cameras Out of Hiding, By Lou Hirsh TechExtreme. http://www.techextreme.com/perl/story/14627.html the article ends with the comment by Martin Kleckner III, president of SpyFinder LLC, ''the device is expected to be priced between $189 and $250'' For the past few months I have been E-Mailing SEA Technology in an attempt to get more information on SpyFinder. To date I have had no reply. Associates of mine in Australia and the UK, have also had no response. Has anyone in this group actually had contact with them? Raymond --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 5612 From: James M. Atkinson Date: Mon Jun 10, 2002 7:09am Subject: VeriSign cashes in on CALEA procrastination http://www.theregister.co.uk/content/6/25592.html VeriSign cashes in on CALEA procrastination By Thomas C Greene in Washington Posted: 05/06/2002 at 19:29 GMT The federal Communications Assistance to Law Enforcement Act (CALEA), which mandates that telecoms providers make their equipment wiretap-friendly, is scheduled to come into force on 30 June, though a number of carriers have yet to achieve compliance due to the expense and complexity involved. With that in mind, VeriSign is offering a solution called NetDiscovery for last-minute stragglers who've failed to put their houses in order according to DoJ standards. For a subscription fee VeriSign will perform all the collections ordered and forward the payloads to whatever law-enforcement agencies are requesting them. Depending on the existing equipment and number of switches involved, upgrade costs could range from $70,000 to as high as $500,000 per switch, plus staff costs. We couldn't quite nail VeriSign down on their prices for NetDiscovery, but we can say that it will be comparable to other subscription services the company offers. The company press release describes it as "a fraction of the cost" of upgrading one's equipment. The industry has resisted the CALEA as a significant financial drain, particularly burdensome for small carriers who would only rarely receive a wiretap request. Of course Congress did appropriate half a billion dollars to make its demands a bit easier to swallow. No doubt the equipment makers lobbied for it while the carriers lobbied against, and lost. But that's all water under the bridge now; the 103rd Congress passed it and we're all stuck with it. As for the sticky issues of data integrity, data security and potential problems with overcollection, we're still ambivalent. Stuff-ups are inevitable, but there is some advantage in reducing the number of people going about these collections in their own way. We hope that as VeriSign gets further into it they'll iron out the bugs over time. If every carrier were to come up with their own solution, that would only multiply the opportunities for unfortunate surprises. On the other hand, when a single company is entrusted with such large amounts of highly sensitive data, a single stuff-up is obviously going to affect a far greater number of people at once. Cynics may be depressed; but keep in mind this isn't some industry-led novel means of screwing the public out of their civil liberties like Larry Ellison's odious proposal to create a new, national ID system conveniently running on Oracle software. Communications data collection is already an unpleasant fact of life. The 103rd Congress gave us the CALEA, and the 107th gave us the PATRIOT Act which reduces judicial obstacles and oversight for the Feds; so don't blame VeriSign simply for trying to turn a profit on an existing legal requirement. That's what businesses do, after all. Æ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- From: Date: Wed Jun 7, 2000 7:45pm Subject: Re: Instructions for life. Danke shone. N. 573 From: Stowe Spivey Date: Thu Jun 8, 2000 10:00am Subject: RE: Off topic - Analist Notebook? I have used Analyst Notebook and it is great. It can graphically represent (not analyze) vast amounts of data which certainly can aid in the analysis process. There are options from i2, who produce the software, to tunnel vast amounts of data in electronically. The issue comes in if the data is not already in electronic form. Then the issue requires many man hours or sophisticated scanning equipment. Hopes this helps. Stowe Spivey -----Original Message----- From: A Grudko [mailto:agrudko@i...] Sent: Thursday, June 08, 2000 9:41 AM To: TSCM-L@egroups.com Subject: [TSCM-L] Off topic - Analist Notebook? Sorry for the off topic post, but one of you ex-Intel types might know the answer to this one. I have a government client who has bought a US product called 'Analist Notebook' (his spelling) from a local supplier. Despite the name, there is no notebook supplied, only software. The product is designed to assist in analysing large amounts of diverse data in criminal and Intel. matters, similar I think to 'Watson'. Although he did a 5 day course he cannot work out how to use it, especially to input large amounts of data from other data bases, such as call records, bank records etc. He has asked me to research the product a bit and tell him if it is worth the effort of going more deeply into it. I did a quick search on the net but could not find it, and I thought one of you might know of it. Thanks Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia Israel - www.grudko.com. - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 Members of : SCIP (Gauteng Chairman), SACI (President), GIN (Charter), WAD, CALI, SASFed, SASA, SAMLF, UKPIN, AFIO (OS),IWWF, PRETrust --- "When you need it done right - first time" --- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 574 From: Stowe Spivey Date: Thu Jun 8, 2000 9:46am Subject: Analyst Notebook I have used Analyst Notebook and it is great. It can graphically represent (not analyze) vast amounts of data which certainly can aid in the analysis process. There are options from i2, who produce the software, to tunnel vast amounts of data in electronically. The issue comes in if the data is not already in electronic form. Then the issue requires many man hours or sophisticated scanning equipment. Hopes this helps. Stowe Spivey -----Original Message----- From: A Grudko [mailto:agrudko@i...] Sent: Thursday, June 08, 2000 9:41 AM To: TSCM-L@egroups.com Subject: [TSCM-L] Off topic - Analist Notebook? Sorry for the off topic post, but one of you ex-Intel types might know the answer to this one. I have a government client who has bought a US product called 'Analist Notebook' (his spelling) from a local supplier. Despite the name, there is no notebook supplied, only software. The product is designed to assist in analysing large amounts of diverse data in criminal and Intel. matters, similar I think to 'Watson'. Although he did a 5 day course he cannot work out how to use it, especially to input large amounts of data from other data bases, such as call records, bank records etc. He has asked me to research the product a bit and tell him if it is worth the effort of going more deeply into it. I did a quick search on the net but could not find it, and I thought one of you might know of it. Thanks Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia Israel - www.grudko.com. - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 Members of : SCIP (Gauteng Chairman), SACI (President), GIN (Charter), WAD, CALI, SASFed, SASA, SAMLF, UKPIN, AFIO (OS),IWWF, PRETrust --- "When you need it done right - first time" --- 575 From: Bob Date: Thu Jun 8, 2000 4:30pm Subject: Re: Analyst Notebook I have been very successful at converting one database format to another by first inspecting the source database and then the target database formats with an ASCII code reader (a very basic word processor that doesn't respond to imbedded formatting commands) and noting the differences. Next, I write a macro to rearrange the data, add record field and convert delimiters as required. When doing this work I use WordPerfect 5.1 for DOS because of it is easy to write a macro with this program. I retrieve and save the files as ASCII files. I have never used "Analyst Notebook", but it sure sounds intriguing. Bob > -----Original Message----- > ..... I have a government client who has bought a US product called 'Analist > Notebook' (his spelling) from a local supplier. Despite the name, there is > no notebook supplied, only software. The product is designed to assist in > analysing large amounts of diverse data in criminal and Intel. matters, > similar I think to 'Watson'. > > Although he did a 5 day course he cannot work out how to use it, especially > to input large amounts of data from other data bases, such as call records, > bank records etc. > > He has asked me to research the product a bit and tell him if it is worth > the effort of going more deeply into it. I did a quick search on the net but > could not find it, and I thought one of you might know of it. > > Thanks > > Andy Grudko 576 From: Bob Date: Thu Jun 8, 2000 4:36pm Subject: Re: Assistance with Telephone Breakout Box You can sure spot those gun toting body guard types! Bob "Executive Security International, Ltd." wrote: > > Please take us off your mailing list... your clogging our mailbox with junk mail that we do not need. This is a business account and we need to keep it > free of junk mail so that we can service our own mail. > THANK YOU > JJ Sutton 577 From: James M. Atkinson, Comm-Eng Date: Thu Jun 8, 2000 5:28pm Subject: Re: Assistance with Telephone Breakout Box At 5:36 PM -0400 6/8/00, Bob wrote: >You can sure spot those gun toting body guard types! > >Bob > > > >"Executive Security International, Ltd." wrote: > > > > Please take us off your mailing list... your clogging our mailbox >with junk mail that we do not need. This is a business account and >we need to keep it > > free of junk mail so that we can service our own mail. > > THANK YOU > > JJ Sutton Nah... it was just a minor case of bad communications. Everything is fine now, no problem. -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 578 From: Date: Fri Jun 9, 2000 6:47am Subject: Scanlock features Roger, Further to your request (to Ray Summers) for explanation of some of the new Scanlock features: The 'modulation analysis' is a feature of the new Scanlock M2 'Fixed Compression' scan mode (a hybrid of Superhet and Harmonic receiver techniques). In this mode there is a 1:1 correlation between the RF signal bandwidth and the signal bandwidth shown on the spectral analysis display, as opposed to a pure Harmonic receiver (or 'Swept Compression') display. For instance when analysing a digital cellular (GSM) handset, the STACKED display will show the intermittent nature of the TDMA transmission from the phone whilst the PEAK HOLD trace will build up over several scans to show the modulation envelope of the signal. (See attached document - apologies to the list, but the document referred to can be also found at http://www.audiotel-int.com/news.html). The 'spectral occupancy' feature derives from the ability to display multiple overlaid spectra. The overlaid spectra can be displayed on top of each other in a 2D STACKED display or in a 3D 'WATERFALL' display. (See attached document). In the 3D 'WATERFALL' display mode, a section through the multiple spectra is available to show the 'occupancy' of a selected frequency. The 'occupancy' could be 'how often is the frequency used over a specified time period' if the spectra were collected at a single location over time, or 'how does the signal level of the selected frequency vary over a range of locations' if the spectra were collected at various locations. Regards Adrian Hickey Audiotel International Ltd [Non-text portions of this message have been removed] 579 From: James M. Atkinson, Comm-Eng Date: Fri Jun 9, 2000 7:36am Subject: Technician faces arrest for wire-tap Friday, June 9, 2000 Technician faces arrest for wire-tap http://www.bangkokpost.net/today/090600_News02.html Culprits will not be spared, says Suthep A warrant has been issued for the arrest of a Telephone Organisation of Thailand technician in the bugging of the home phone lines of political activist Veera Somkwamkid. The police request for the warrant was approved yesterday by Songwut Ngammeesri, an Interior Ministry inspector-general. Pol Maj-Gen Jongrak Chuthanond said Kerdpong Thitinan, a C-5 technician at the Klongchan Telephone Exchange, is accused of wire-tapping. The charge carries a maximum penalty of five years in jail. The deputy city police chief expected Mr Kerdpong, who is to be summoned to hear the charge on Tuesday, to implicate at least one accomplice during questioning. "We do not know the motive behind the tapping of Mr Veera's telephone lines but he has lodged many complaints against many people," said Pol Maj-Gen Jongrak, who declined to elaborate. Suthep Thaugsuban, transport and communications minister who supervises the Telephone Organisation of Thailand, said the culprits would be punished regardless of their position. Mr Veera believes the wire-tap was linked to his request to the National Counter Corruption Commission to investigate Sanan Kachornprasart, the Democrat secretary-general and former interior minister. Mr Suthep, deputy secretary-general, said Maj-Gen Sanan would not be spared if he was found to have been involved. =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 580 From: James M. Atkinson, Comm-Eng Date: Fri Jun 9, 2000 8:37am Subject: Re: Scanlock features Adrian, Could you please present more information to the list on the New Scanlock, it looks very interesting, and seems to offer some possibilities. What type of signal bandwidth is applied to the digitizer after folding, and what kind of a noise floor is possible. Also, how much pre-amplification is involved, and what kind of a noise figure does the instrument have. Is there any means to connected a spectrum analyzer into the M2 to permit the frequency domain to be viewed. What kind of sweep speeds are possible, and can we selected various bandwidths based on how much spectrum we are examining? -jma At 12:47 PM +0100 6/9/00, Adrian@a... wrote: >Roger, > >Further to your request (to Ray Summers) for explanation of some of the >new Scanlock features: > >The 'modulation analysis' is a feature of the new Scanlock M2 'Fixed >Compression' scan mode (a hybrid of Superhet and Harmonic receiver >techniques). > >In this mode there is a 1:1 correlation between the RF signal bandwidth >and the signal bandwidth shown on the spectral analysis display, as >opposed to a pure Harmonic receiver (or 'Swept Compression') display. > >For instance when analysing a digital cellular (GSM) handset, the STACKED >display will show the intermittent nature of the TDMA transmission from >the phone whilst the PEAK HOLD trace will build up over several scans to >show the modulation envelope of the signal. (See attached document - >apologies to the list, but the document referred to can be also found at >http://www.audiotel-int.com/news.html). > >The 'spectral occupancy' feature derives from the ability to display >multiple overlaid spectra. The overlaid spectra can be displayed on top of >each other in a 2D STACKED display or in a 3D 'WATERFALL' display. (See >attached document). > >In the 3D 'WATERFALL' display mode, a section through the multiple spectra >is available to show the 'occupancy' of a selected frequency. > >The 'occupancy' could be 'how often is the frequency used over a specified >time period' if the spectra were collected at a single location over time, > or 'how does the signal level of the selected frequency vary over a range >of locations' if the spectra were collected at various locations. > >Regards > >Adrian Hickey >Audiotel International Ltd > > > >[Non-text portions of this message have been removed] > > >------------------------------------------------------------------------ >Take your development to new heights. Work with clients like Dell and >pcOrder. Submit your resume to jobs@l.... Visit us at >http://click.egroups.com/1/4358/1/_/507420/_/960551415/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 581 From: Andy Grudko Date: Fri Jun 9, 2000 9:40am Subject: Off topic - RF monitoring tips? Ooooo.....have I made a discovery. We live 42 km by road from the office - probably 35 km line of sight. We are also 300+ mtrs below JHB (office). I get simplex radio coverage to the office (163 Mhz) to the top of the last (3 km) hill before our house. On my morning run I decided to head into the hills - we're surrounded by mountains. I took on the highest hill I could see, probably 3 - 400 Mtrs high, about 4 km from my house. Well, I made it to the top and what did I find ?.........a dead repeater! A 4 mtr mast - no antenna, a bit of unconnected co-ax, a concrete foundation and a big, locked fibreglass box, probably empty and no mains power, on a basically deserted piece of ground. Now my mind starts working. We have a number of licenced frequencies, including a leased repeater. We also use 'dead' frequencies, high Band VHF, for one off operations and then move on for security reasons. I'm thinking a passive repeater (2 yagis phase coupled back to back) to get coms to the office, but surely we can do more. I'm into VHF/UHF/MW monitoring but get few signals here in the 'bowl' of the lake I live on. So what happens if we put a discone up there with a 10 ele VHF beam pointing at my house, as a passive repeater? The potential range from such a high point is staggering. Or link up a solar panel to a 12 v gel cell and a wide band RF amp through the same setup? Or a straight forward uhf-vhf link - a bit booring 'cos it's one channel only. Let your mind run a bit wild here 'cos it's all business so the tax man pays. As a licenced radio/TV dealer I can legally posess ANY RF equipment - I just don't want to put k$ equipment on a lonely hill if I can avoid it 'cos of obvious theft problems. Andy Grudko (CEO) Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence - Est 1981 Johannesburg head office - Durban - Cape Town - Pretoria - Agents in 43 countries (+27 11) 465 9673 - 465 1487 (Fax) - SCIP (Gauteng Chairman), WAD , CALI, SASFed, SASA, SACI (President), GIN (Charter), SAMLF, AFIO (OS), IWWL, PRETrust www.grudko.com - "When you need it done right -first time" 582 From: Andy Grudko Date: Fri Jun 9, 2000 0:54pm Subject: Re: Analyst Notebook Thanks Stowe. I guessed the site would be www.i2.com. Well, if it was I found the site but couldn't find any product info. A very confusing site. I'll contact you off list. Andy Grudko ----- Original Message ----- > I have used Analyst Notebook and it is great. It can graphically represent > (not analyze) vast amounts of data which certainly can aid in the analysis > process. There are options from i2, who produce the software, to tunnel > vast amounts of data in electronically. The issue comes in if the data is > not already in electronic form 583 From: Ian Carter <141722.yup@t...> Date: Thu Jun 8, 2000 11:39am Subject: RE: Off topic - Analist Notebook? Hope this helps Andy: http://www.i2group.com/home.html Best Regards - Ian ~~~~~~~~~~~~~~~~~~~~~~~ Ian Carter Specialist Services & Training Close Protection/Bodyguards Surveillance Operators Child Recovery Agents International BEA's Tel: (USA) 1 724 763 2087 Fax: (USA) 1 724 763 2236 ~~~~~~~~~~~~~~~~~~~~~~~ -----Original Message----- From: A Grudko [mailto:agrudko@i...] Sent: Thursday, June 08, 2000 9:41 AM To: TSCM-L@egroups.com Subject: [TSCM-L] Off topic - Analist Notebook? Sorry for the off topic post, but one of you ex-Intel types might know the answer to this one. I have a government client who has bought a US product called 'Analist Notebook' (his spelling) from a local supplier. Despite the name, there is no notebook supplied, only software. The product is designed to assist in analysing large amounts of diverse data in criminal and Intel. matters, similar I think to 'Watson'. Although he did a 5 day course he cannot work out how to use it, especially to input large amounts of data from other data bases, such as call records, bank records etc. He has asked me to research the product a bit and tell him if it is worth the effort of going more deeply into it. I did a quick search on the net but could not find it, and I thought one of you might know of it. [Non-text portions of this message have been removed] 584 From: Steve Uhrig Date: Fri Jun 9, 2000 5:12pm Subject: Re: Off topic - RF monitoring tips? Once upon a midnight dreary, Andy Grudko pondered, weak and weary: > I'm thinking a passive repeater (2 yagis phase coupled back to back) to > get coms to the office, but surely we can do more. I'm into VHF/UHF/MW > monitoring but get few signals here in the 'bowl' of the lake I live on. Passive repeaters have their place. Generally they buy you only a few dB. The main application for passive repeaters is to fill in holes in the primary coverage area, for small area coverage systems. The classic application is back to back unity ground planes to repeat paging signals into the heavily shielded Xray department of a hospital. I have used two magnet mounts back to back, fifteen feet apart, to leak 2 way UHF comms into a large metal tank where workers were operating. They have their limitations, though. I doubt you would see much if any improvement in the situation you describe. Path loss is high enough to where you want the antennas as close to the receive site as possible. The thing is capturing precious little signal as it is, and that little signal attenuated by path loss at the distance and frequency you mention will put you on the negative side of the curve. If you put two yagis back to back, apparently you only want to relay signals originating from one point, or one town. You have the right idea though. > So what happens if we put a discone up there with a 10 ele VHF beam > pointing at my house, as a passive repeater? The potential range from such > a high point is staggering. Same comments. A discone is wideband, but unity gain. You need capture area. Forget resonant antennas on receive. You want a lot of metal in the air. Do not overlook a good ground image also. Important on receive as well as transmit. Remember, all current flowing in the antenna also flows in the ground image. > Or link up a solar panel to a 12 v gel cell and a wide band RF amp through > the same setup? How will you isolate things to where it doesn't talk to itself? If you radiate enough signal to do any good, you will overload the front end of the amp and create all sorts of problems. What you are describing is a "translator". They repeat a wide range of frequencies, AM and FM broadcast from the outside world into tunnels. Baltimore's Harbor tunnels have excellent translators. You barely notice any change in signal on FM broadcast even though you are many feet under water. If you can get some solar power, you can do a low powered active repeater, but for one frequency only. You would need very little power, like 50-100 milliwatts. Cheapest, most effective and most versatile likely would be to put up a tower or mast at your house, as high as possible. Then you can transmit as well as receive, on any frequency for which you can hang an antenna. Your thinking is valid. Do the math on the designs and you will see whether it is practical or not. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 585 From: James M. Atkinson, Comm-Eng Date: Fri Jun 9, 2000 7:16pm Subject: Jordanian 'spy' executed in Iraq Friday, June 9, 2000 Jordanian 'spy' executed in Iraq http://www.nando.com/noframes/story/0,2107,500213544-500301401-501666124-0,0 0.html Agence France-Presse BAGHDAD (June 8, 2000 4:54 p.m. EDT http://www.nandotimes.com) - Iraq confirmed Thursday that it had executed Jordanian Daud Sulaiman al-Dalu for "spying." "Daud al-Dalu, who was married to an Iraqi, confessed his crime, spying, and was executed, and his accomplices were punished, a foreign ministry spokesman was quoted by the official INA news agency. "Dalu, who manufactured dentures, was arrested in Iraq in 1991 for spying," the spokesman said. "Investigation showed that he was part of a network of conspirators and spies hostile to Iraq and its leaders," he added without saying when the execution had taken place. Jordan's press, quoting the official Petra news agency, said Tuesday the kingdom had protested to Iraq over the execution last week of Dalu, who had been jailed in Iraq since 1993 on unspecified charges. Jordan repeatedly tried through its embassy in Iraq to secure Dalu's release but never received a response from Baghdad, according to Petra. =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 586 From: James M. Atkinson, Comm-Eng Date: Sat Jun 10, 2000 10:45am Subject: Monastery Life [Humor] A new monk arrives at the monastery. He is assigned to help the other monks in copying the old texts by hand. He notices, however, that they are copying copies, not the original books. So, the new monk goes to the head monk to ask him about this. He points out that if there were an error in the first copy, that error would be continued in all of the other copies. The head monk says "We have been copying from the copies for centuries, but you make a good point, my son." So, he goes down into the cellar with one of the copies to check it against the original. Hours later, nobody has seen him. So, one of the monks goes downstairs to look for him. He hears a sobbing coming from the back of the cellar, and finds the old monk leaning over one of the original books crying. He asks the old monk what's wrong, and in a choked voice came the reply... "The word is 'celebrate'." =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 587 From: Date: Sat Jun 10, 2000 0:33pm Subject: Re: On-hook Security check hellodirect.com website. they have teleconferencing products. don't know if they have secure lines. you could add scramblers at either end. hope this helps. there are commercially available scrambling devices available. not sure of their quality or reliability. HAVE A GREAT DAY !!! [Non-text portions of this message have been removed] 588 From: James M. Atkinson, Comm-Eng Date: Sat Jun 10, 2000 0:46pm Subject: Feds Urged to Beef Up Spying http://www.wired.com/news/print/0,1294,36868,00.html Feds Urged to Beef Up Spying by Declan McCullagh 10:50 a.m. Jun. 9, 2000 PDT WASHINGTON -- Congress must give federal police more eavesdropping abilities and increase the budgets of spy agencies, members of a federal commission are recommending. The Justice Department is "overly cautious" when forwarding requests for wiretaps and electronic surveillance to a secret court established in 1978 for that purpose, Paul Bremer, the National Commission on Terrorism chairman, said Thursday. Bremer also told the Senate Intelligence committee that technologies such as encryption and fiber optics are making it tough for the once-super-secret National Security Agency to eavesdrop on the world's communications -- and such surveillance is more vital than ever. [snip] In a letter sent this week to Senator Richard Shelby (R-Alabama), chairman of the Senate Intelligence committee, the commission says: "Signals intelligence plays an increasingly vital role in U.S. counterterrorism efforts, yet the ability of the NSA to continue this essential mission is threatened by its failure to keep pace with changing technology. "The commission heard testimony from NSA representatives and others about the difficulties presented by the explosion in modern communications technologies. It is clear that while increased use of these technologies by intelligence targets presents potential collection opportunities, the NSA will not be able to exploit these opportunities without improvements in its own technology"," the letter said. [snip] The suggestions generated little or no controversy during Thursday's hearing. The Senate committee already reached a similar conclusion, saying in an April report that "rebuilding the NSA is the ... top priority. (We) will take whatever steps are necessary to ensure America's continuing superiority in the signals intelligence field." [snip] =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 589 From: James M. Atkinson, Comm-Eng Date: Sat Jun 10, 2000 0:47pm Subject: Chinese Spy Boat Operated in Waters Near Japan Chinese Spy Boat Operated in Waters Near Japan http://chblue.com/Article.asp?ID=277 Saturday, June 10, 2000 TOKYO -- A Chinese navy intelligence vessel conducted surveillance operations in the Pacific off Japan's Boso Peninsula, southeast of Tokyo, in late May, the Sankei Shimbun newspaper reported Saturday. The 4,420-ton Chinese icebreaker gathered information in Japan's 200-mile exclusive economic zone (EZZ) off the peninsula in Chiba Prefecture for the first time, the daily said, quoting officials of the Maritime Self-Defense Force (MSDF). Even though foreign vessels' activities are allowed within the zone, the Japanese government considers China's maritime research, conducted without prior notice, as violating the U.N. Convention on the Law of the Sea, which grants certain rights to Japan over the territory. MSDF officials said the Chinese naval vessel initially engaged in intelligence activity for seven days from May 14 around Tsushima Island in Nagasaki Prefecture, located between the Korean Peninsula and Japan's southwestern main island of Kyushu. It then sailed northward in the Sea of Japan, passing the Tsugaru Strait between Japan's largest main island of Honshu and the northernmost main island of Hokkaido three times from May 23 to 26, the officials said. The ship then headed south in the Pacific, sailing in a circle in the EZZ, east of the Boso Peninsula, around May 30, they said. It later traveled to the sea northeast of Oshima Island, the largest of the Amami Islands off Kagoshima Prefecture, via seas south of Shikoku main island, and was confirmed moored in the area some 300 kilometers west-northwest of Oshima Island at 9 a.m. Monday, according to the officials. The vessel returned to Chinese territorial waters by Friday, wrapping up its first visit around the Japanese archipelago, they said. During the voyage, the ship extended whirling antenna believed to be a receiver of communication radio waves. It also used equipment whose possible purpose was to collect maritime data such as those related to tides and water temperature, the paper said. These data could be used for Chinese submarines, and the ship could have gathered information on radio waves concerning radar of the Air Self-Defense Force (ASDF) through its antenna, it said. Some ASDF bases used as radar sites are located near the Boso Peninsula, and there are several MSDF facilities near the Tsugaru Strait. Alarmed by these Chinese naval activities, Liberal Democratic Party Secretary General Hiromu Nonaka asked the Chinese government Friday to address unannounced intrusions by Chinese ships, out of consideration for the friendship between the two countries. During a meeting in Tokyo with Zhao Qizheng, director of the Chinese Communist Party's Central Office for Overseas Publicity, Nonaka said China should respond to the failure of the Chinese marine resource exploration ships to give notice prior to entering Japanese waters. =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 590 From: Dawn Star Date: Sat Jun 10, 2000 7:33pm Subject: Scanlock technology Adrian from Scanlock said, "For instance when analysing a digital cellular (GSM) handset, the STACKED display will show the intermittent nature of the TDMA transmission from the phone whilst the PEAK HOLD trace will build up over several scans to show the modulation envelope of the signal. (See attached document - apologies to the list, but the document referred to can be also found at http://www.audiotel-int.com/news.html). The 'spectral occupancy' feature derives from the ability to display multiple overlaid spectra. The overlaid spectra can be displayed on top of each other in a 2D STACKED display or in a 3D 'WATERFALL' display. (See attached document). In the 3D 'WATERFALL' display mode, a section through the multiple spectra is available to show the 'occupancy' of a selected frequency." Adrian, is this then the technology your company feels will be the most effective to identify frequency hopping and spread spectrum devices that are only going to get tougher to identify in coming years or is there anything else in the works? About how much are we looking at to purchase your receiver and scanning software? Thanks, Roger Tolces Electronic Security [Non-text portions of this message have been removed] 591 From: Date: Sat Jun 10, 2000 9:07pm Subject: Re: I N S T R U C T I O N S F O R L I F E Subject: It might look like it's going to be a bad day if.... 1. Your income tax refund check bounces. 2. The bird singing outside your window is a vulture. 3. You get the blood test results.... you're allergic to chocolate. And, it concludes you're in fine health for someone twice your age. 5. You finally realize nothing you own is actually paid for. 6. The health inspector condemns your office coffee maker. 7. You have to use your Visa card to pay your MasterCard (doesn't everyone? 8. Your plans to eatout tonight include a sandwich on the front porch. 9. You open briefcase for a big meeting, & only find your son's coloring book 10. You lock your car and immediately notice keys hanging in the ignition. 11. Your see the film crew from "60 Minutes" is waiting in your office. We treat our two labs (1 black, 1 yellow) like our kids. However we had to give up teaching them to use the computer. After hours and hours we finally realized some of the problems: 1. Can't stick thier heads out of Windows 98. 2. Fetch command not available on all platforms. 3. It was too messy "marking" every Web site. 4. They can't help attacking the screen when hearing, "You've got mail." 5. Fire hydrant icon simply too frustrating. 6. Three words: Carpal Paw Syndrome. 7. Saliva-coated floppy disks caused real problems. 8. SIT and STAY were hard enough; DELETE and SAVE are out of the question! 9. Distracted by cats chasing the mouse, then, would not leave www.purina.com site. 10. TrO{gO HyAqR4tDc TgrOo TgYPmE WeIjTyH P;AzWqS,. ("Too hard to type with paws!"). HAVE A GREAT DAY !!! 592 From: James M. Atkinson, Comm-Eng Date: Sat Jun 10, 2000 11:41pm Subject: This is a great metaphor and lesson This is a great metaphor and lesson: One day an expert in time management was speaking to a group of Business students and, to drive home a point, used an illustration those Students will never forget. As he stood in front of the group of high powered overachievers he said, "Okay, time for a quiz." Then he pulled out a one-gallon, wide mouth Mason jar and set it on the table in front of him. Then he produced about a dozen fist-sized rocks and carefully placed them, one at a time, into the jar. When the jar was filled to the top and no more rocks would fit inside, he asked, "Is this jar full?" Everyone in the class said, "Yes." Then he said, "Really?" He reached under the table and pulled out a bucket of gravel. Then he dumped some gravel in and shook the jar causing pieces of gravel to work themselves down into the space between the big rocks. Then he asked the group once more, "Is the jar full?" By this time the class was on to him. "Probably not," one of them answered. "Good!" he replied. He reached under the table and brought out a bucket of sand. He started dumping the sand in the jar and it went into all of the spaces left between the rocks and the gravel. Once more he asked the question, "Is this jar full?" "No!" the class shouted. Once again he said, "Good." Then he grabbed a pitcher of water and began to pour it in until the jar was filled to the brim. Then he looked at the class and asked, "What is the point of this illustration?" One eager beaver raised his hand and said, "The point is, no matter how full your schedule is, if you try really hard you can always fit some more things in it!" "No," the speaker replied, "that's not the point. The truth this illustration teaches us is: If you don't put the big rocks in first, you'll never get them in at all. What are the 'big rocks' in your life? Time with your loved ones? Your faith, your education, your dreams? A worthy cause? Teaching or mentoring others? Remember to put these BIG ROCKS in first or you'll never get them in at all." So, tonight, or in the morning, when you are reflecting on this short story, ask yourself this question: What are the 'big rocks' in my life? Then, put those in your jar first. =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 593 From: James M. Atkinson, Comm-Eng Date: Sat Jun 10, 2000 11:42pm Subject: Doing the Wrong Thing 594 From: andre holmes <1ach@g...> Date: Sun Jun 11, 2000 9:17am Subject: SCANLOCK Based on information provided to the list I would like to know 1 - this new scanlock unit has the capibility to demodulate digital information carrier 800-1.8 gig true or false 2 - is this a restricted item here in the US 3- does the unit have the same ic as in modern cell phone technology. [Non-text portions of this message have been removed] 595 From: William Knowles Date: Sun Jun 11, 2000 9:50am Subject: Swedish Hacker-Tracker Is FBI And Media Darling http://news.excite.com/news/r/000610/22/net-sweden-computer-dc Updated 10:26 PM ET June 10, 2000 By Eva Sohlman STOCKHOLM (Reuters) - The FBI, desperate to track down the source of the "Love Bug" computer virus last month, turned to a shy 19-year-old Swedish student. Jonathan James came under the media spotlight after he helped the world's most famous crime-busting agency trace the origins of the virus that caused billions of dollars in damage to computers around the world. But right now he is more interested in getting through his school exams and enrolling in law school later this year. In recent weeks more than 150 foreign journalists have called James or traveled to his home -- a country cottage a short distance outside the university town of Uppsala -- to get his story. James is unfazed by the media attention. He is concentrating on finishing his school exams this month and is setting up a joint venture for computer security solutions. The journalists are not the only ones to court James. The U.S. Federal Bureau of Investigation (FBI) calls him several times a week to discuss security issues and ways of tracing computer hackers. The first time they contacted him, he said, was when he had tracked down the creator of the "Melissa" virus in 1999 -- something the FBI still have not acknowledged officially. "Well, I suppose it's hard to admit someone else did their job," James told Reuters. He recalled how they seemed to expect him to be honored by their call and spoke to him condescendingly. "But I called them by their first names and that cooled them down." James says he is not interested in hacking or computer games, and denied that he was working on a new virus. With the media frenzy surrounding "Melissa" still fresh in his mind, he told the FBI he would not help track the "Love Bug" when it emerged at the beginning of May. "I had decided that this time they would have to do it on their own but then I had a few hours left over on the Sunday..., he said. James decided to try to find out who was behind the virus when another Swede pointed the finger at a German student. Within hours he had gathered information on some well-known hackers' styles of programming and found one which had elements in common with the "Love Bug." The next day, the Washington Post, drawing on U.S. officials, reported James' findings as the most crucial and later in the day a 24-year-old Philippine computer student who had submitted a thesis describing a program similar to the virus, was arrested. The FBI had come to the same conclusion, James says. The only difference was that it had taken them days. U.S. security expert Richard M. Smith said many computer experts had taken part in the virus hunt but that James was the single most important player. "Jonathan found extremely important clues and if he hadn't been around it would have taken some more days to find the guy," Smith said. INTERNATIONAL TOP-HACKER CAREER NOT ON THE AGENDA But a career as a professional hacker, working for the world's most sophisticated intelligence services, does not appeal to James. "I want to be my own boss and decide myself what I should or shouldn't do," he said. He will start law studies at university later this year. "I've wanted to study law since I was nine -- even before I got into computers -- and I think it could be fruitful to combine it with computers." James says he is interested in security programming computers because it resembles the language studies that fascinate him. Studies in Greek, German, English and Latin help him to trace the origins of words -- something he says he enjoys while reading. The Swedish spy story writer Jan Guillou and American author John Grisham are his favorite writers. In the little spare time he has James practices martial arts, listens to all kinds of music, especially American hip-hop, and hangs out with his half-English family who have helped him keep his feet firmly on the ground during the media circus. He tells of the time a journalist from French television was standing outside his house at 9.30 in the morning and caught him in his underwear. "I was only wearing boxer shorts and there she was. She never wanted to leave but just sat there on our sofa and left around one o'clock in the afternoon." GOVERNMENTS LAX ON SECURITY James said he could not understand computer crime or why some people seemed to get a thrill from it. "It's just vanity that seems to drive those hackers," he said. He criticized governments for being too lax with security, adding that he had found a big security hole in the homepage of Sweden's ruling Social Democrats but it took three weeks before it was sorted out. He thinks worries about the security of on-line shopping are over-hyped because it is much harder to obtain credit card numbers without being traced than most people believe. On the other hand there is no such thing as a 100 percent safe Web site, he concluded. *-------------------------------------------------* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen. Alfred. M. Gray, USMC --------------------------------------------------- C4I Secure Solutions http://www.c4i.org *-------------------------------------------------* 596 From: Dawn Star Date: Sun Jun 11, 2000 4:55pm Subject: Secret Wiretap Court Wiretaps sought in record numbers > >By Richard Willing >USA TODAY > > >WASHINGTON -- The Justice Department last year sought and received permission >from a secret federal court to place a record 880 wiretaps in spying and >terrorism investigations, department records show. > >An FBI official says the taps demonstrate increased interest in pursuing >foreign agents operating on U.S. soil, including some linked to Mideast >terrorist groups. > >Arab-Americans and civil libertarians decried the taps, in part because the >secret federal court is not required to tell targets why the taps were >sought. When wiretaps are ordered in other federal investigations, court >proceedings usually are part of the public record. > >''We're concerned over the disregard we see for civil liberties in this >administration,'' says James Zogby, president of the Arab American Institute, >a civic and political group based in Washington. The wiretaps, which are >applied for by the Justice Department and usually carried out by the FBI or >National Security Agency, have increased dramatically during the Clinton >administration. By contrast, 484 such wiretaps were authorized the year >before Clinton took office. > >The administration sought 601 federal wiretaps in ordinary criminal >investigations in 1999. ''The increase (in spying and terrorist wiretaps) is >troubling because of the lack of accountability in the secret process,'' says >author and electronic privacy advocate David Banisar. The wiretap records >were obtained by privacy advocates under a federal Freedom of Information Act >request and reviewed by USA TODAY. The Justice Department did not respond to >requests for comment. > >The Justice Department's records do not show how many of the wiretaps led to >prosecutions. > >The secret wiretap court was created by the Federal Intelligence Surveillance >Act of 1978. It was designed to check the power of presidents who authorized >wiretaps and searches that didn't require warrants based on possible threats >to national security. > >The court has approved more than 13,600 wiretap requests in 22 years and has >rejected one. > > >- >Front page, News, Sports, Money, Life, Weather, Marketplace >© Copyright 2000 USA TODAY, a division of Gannett Co. Inc. > [Non-text portions of this message have been removed] 597 From: Dawn Star Date: Sun Jun 11, 2000 4:59pm Subject: sneak and peak Anti-Drug Bill Would Allow Secret Searches, Create New Crime: "Illegal Distribution of Information" Immediate action required: Stop the "Methamphetamine Anti- Proliferation Act" now! A bill that has passed the Senate unanimously and is now rapidly moving through the House poses a grave threat to your constitutional rights. This legislation -- HR 2987, also known as the Methamphetamine Anti-Proliferation Act -- would: * Expand the government's power to conduct so-called "sneak-and- peek searches." Police could search your house and not notify you for up to six months. * Make it a federal crime to write about any Internet site that provides drug paraphernalia. * Allow the government to prosecute Americans who teach others how to grow medical marijuana plants. Despite the fact that this legislation is a flagrant assault on your First and Fourth Amendment rights, it sailed through the Senate on November 19 without a single vote against it. Now we need your help urgently to stop HR 2987 before the House approves it as well! HR 2987 is *overdue* for a vote: It was originally scheduled to be considered by the Judiciary Committee before the Memorial Day recess, but that action was postponed. Now that the House has reconvened, a vote could be scheduled any day. (The legislation is also being considered by the House Commerce Committee.) We are asking you to act now to kill this bill before it gets out of committee. This "action item" contains: * Background on HR 2987 and a link to the bill so you can read it for yourself. * The names of the politicians on the two House committees considering this bill, Judiciary and Commerce. * Information on how to contact them and on what to say. BACKGROUND: The Methamphetamine Anti-Proliferation Act was introduced in July, 1999, by Senators Dianne Feinstein, D-CA, and Orrin Hatch, R-UT. On November 19, the bill passed the Senate by "unanimous consent" with no recorded opposition. Hatch and Feinstein claim their bill merely targets labs that produce methamphetamine, a form of speed. But the bill goes far beyond that and gives the federal government sweeping new powers. Specifically: * It would allow federal agents to conduct so-called "sneak and peek" searches without having to notify you for six months -- if ever. Current law requires that, if police want to search your home, they must produce a warrant, and if you're not home, they have to immediately notify you about the search and give you an inventory of confiscated items. But in vague, seemingly innocuous language in the section of HR 2987 entitled "Notice of Issuance," the legislation says that "any notice required" to be given for a search "may be delayed pursuant to the standards, terms, and conditions set forth in section 2705" of federal law. That section, according to legal experts, lets police delay notification for up to 180 days. That means police could conduct a "black bag" job on your house, search through your belongings -- and not even inform you they were there for a full six months. * It would allow federal agents to secretly copy your computer files and financial documents, and even take photographs of your belongings without ever notifying you. How did this happen? Lobbyists for the FBI quietly inserted the word "tangible" before the word "property" in the following sentence of the bill: "Subdivision (d) of such rule, as in effect on this date, is amended by inserting 'tangible' before 'property' each place it occurs." Since copies of your computer's hard drive -- and photographs of your personal belongings -- technically are not "tangible property," FBI and DEA agents would not have to notify you. The "sneak and peek" provision is such a blatant violation of the Fourth Amendment that it even caught the attention of Republican Rep. Bob Barr -- normally a vociferous supporter of the government's War on Drugs. Barr called the underhanded maneuver "typical behavior from the Justice Department and the FBI. That's certainly not the way to conduct business when you're dealing with people's liberties." HR 2987 also attacks your First Amendment freedoms by creating several "communication crimes." It: * Creates a federal felony -- punishable by a 10-year prison term -- called "Illegal distribution of information." Section 421 of the bill says it shall be unlawful to "teach or demonstrate to any person the manufacture of a controlled substance." Lawyers say this provision could be used to prosecute, for example, an individual who told a suffering AIDS or cancer victim how to grow medical marijuana. * Makes it illegal to advertise -- even indirectly -- drug paraphernalia. Section 5 of the bill says it shall be illegal for any "communications facility" to "post, publicize, transmit, publish, link to, broadcast or otherwise advertise" any sort of "drug paraphernalia" or "controlled substances." So, "if you had links on your web site to sites like High Times magazine, you could be threatened with a count of indirect advertising," according to Keith Stroup, executive director of NORML. Thanks to HR 2987, the War on Drugs has become a War on Words! [Non-text portions of this message have been removed] 598 From: James M. Atkinson, Comm-Eng Date: Mon Jun 12, 2000 9:46pm Subject: Re: sneak and peak At 2:59 PM -0700 6/11/00, Dawn Star wrote: >Anti-Drug Bill Would Allow Secret Searches, >Create New Crime: "Illegal Distribution of Information" > > Immediate action required: Stop the "Methamphetamine Anti- >Proliferation Act" now! > > A bill that has passed the Senate unanimously and is now >rapidly moving through the House poses a grave threat to your >constitutional rights. This legislation -- HR 2987, also known as the >Methamphetamine Anti-Proliferation Act -- would: [The List Moderator Speaketh] No offense, but this is not a "look how evil the government is" forum, but instead a forum for TSCM and technical security. While a little off topics humor, levity, SECURITY or INTELLIGENCE related news and so on is fine, political gripes, grumbling, and bitching is best kept off the list. I would add that any politician foolish enough to attempt to squelch a right guaranteed by the constitution will find the citizens of this country more them happy to remove them from office (by any means necessary). Do not go gently into that dark night... [The List Moderator Shuts Up] -jma =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 599 From: James M. Atkinson, Comm-Eng Date: Mon Jun 12, 2000 10:57pm Subject: So What's the Problem? CSIS trains foreign spies http://www.ottawacitizen.com/national/000612/4262795.html Poor nations send agents to learn law, democracy Jim Bronskill The Ottawa Citizen Canada's intelligence agency is quietly training spies from South America, Africa and Eastern Europe. Newly declassified records show the Canadian Security Intelligence Service has held two major instructional seminars for foreign agents at its headquarters near Ottawa. A third session is planned for this year. The documents, obtained under the Access to Information Act, shed light on a little-known aspect of CSIS's work and provide a glimpse of the vast network of international alliances the spy agency has forged. The annual two-week training course covers a broad range of subjects, including intelligence analysis, counter-terrorism and security screening. The program was established in 1998 in response to requests from foreign intelligence services for guidance and assistance. Participants are chosen from allied agencies with which CSIS has formal liaison arrangements. Citing security reasons, CSIS spokesman Dan Lambert declined to name countries or agencies from the three continents that have sent intelligence personnel to the program. However, he indicated many of the participant agencies are learning to operate according to democratic principles and the sort of legal framework under which CSIS functions. "We're not talking about oppressive regimes, but we're talking about countries who may be developing," Mr. Lambert said. "It's a point of lending them a real understanding of how we do things." CSIS, which has liaison arrangements with more than 200 foreign agencies, often must tread carefully to ensure sensitive information it supplies to an ally is not used by that country's security services or military to endanger the human rights of citizens. The Security Intelligence Review Committee, the watchdog over CSIS, reminded the spy service last fall that "all possible care" should be taken to avoid such abuses. Mr. Lambert said the annual training program supports Canada's goal of encouraging the conduct of security and intelligence work with respect for democratic traditions. The sessions also help foster stronger relationships with foreign agencies, he said. The fact Eastern European countries have received intelligence training from CSIS underscores the massive change that has taken place since the Cold War, when Canada vigilantly guarded against East Bloc espionage. A CSIS memo says last spring's training program featured a "rather eclectic mix of countries and agencies." The course covered topics including the role of an intelligence service in a democracy, the legal basis for CSIS, liaison with government, and structures of accountability and review. An outline says the program also emphasized "practical applications of intelligence operations," though details were deleted from the memo. Records indicate, however, that there were sessions on security screening, intelligence analysis and production, and the assessment of threats posed by terrorists and hostile spies. Participants, who were required to have a working knowledge of English, also learned the basics of developing their own training programs. Mr. Lambert would not reveal the amount spent on the training initiative, noting the spy agency doesn't release detailed budget breakdowns. CSIS covers the training expenses, while travel, lodging and most meals are the responsibility of course participants. Last year's program was considered "a most successful endeavor," based on comments from attendees. However, a memo prepared by the CSIS official who led the project noted the difficulty in telling whether objectives were being met. "Goals such as 'enhanced co-operation' and 'helping others to help themselves' are difficult areas to assess." The official recommended members of the CSIS training and development division travel and meet with some graduates to "assist in determining if we are delivering a viable program." ------------------------------------------------------------------------ =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 600 From: A Grudko Date: Mon Jun 12, 2000 6:26pm Subject: Control Freaks.......... Heard some news today. It would appear that the Brit Gov. are looking for ways to get into your Email. I cannot verify the source but don't doubt that in practice this is exactly what our old friends would like to do. Security Agencies there will still need a warrant. This would be issued to your ISP. Then all the agency has to do is install a "black box" in their offices which will flag up key words and monitor the sites that a particular "mark" visits or downloads etc. The reasons given are to monitor urban terrorists and other criminal activity. Sites where you get info on how to build bombs and so on, was the example cited. However, if you use an encryption package (PGP) etc. The warrent would be issued directly to you. You would be instructed to give them your private de-coding key. If you refuse you could face a two year prison sentence. But here's a twist for you. If you TELL anyone that you have been issued a warrent for your private de-coding key, the sentance could go up to five years behind bars! How this would be applied to non-UK ISP's is unclear. Andy Grudko SACI Pres. 601 From: Lachlan Date: Tue Jun 13, 2000 7:17am Subject: Re: Control Freaks.......... Seeing as you mention it. This is happening in Australia. [snip] Australian spooks and cops are set to have an easier time monitoring the telephone calls, communications and even the computers of the country's citizens with the passing of a new bill through Parliament today. [snip] http://www.newsbytes.com/pubNews/00/150247.html A Grudko wrote: > Heard some news today. It would appear that the Brit Gov. are looking > for ways to get into your Email. I cannot verify the source but don't doubt > that in practice this is exactly what our old friends would like to do. > > Security Agencies there will still need a warrant. This would be issued > to your ISP. Then all the agency has to do is install a "black box" in > their offices which will flag up key words and monitor the sites that a > particular "mark" visits or downloads etc. > > The reasons given are to monitor urban terrorists and other criminal > activity. Sites where you get info on how to build bombs and so on, was > the example cited. > > However, if you use an encryption package (PGP) etc. The warrent would > be issued directly to you. You would be instructed to give them your > private de-coding key. If you refuse you could face a two year prison > sentence. > > But here's a twist for you. If you TELL anyone that you have been issued > a warrent for your private de-coding key, the sentance could go up to > five years behind bars! > > How this would be applied to non-UK ISP's is unclear. > > Andy Grudko > SACI Pres. > > ------------------------------------------------------------------------ > IT Professionals: Match your unique skills with the best IT projects at > http://click.egroups.com/1/3381/1/_/507420/_/960893208/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- I-T- egroup @ http://www.egroups.com/group/I-T- From: John and Sheryl Date: Mon Jun 7, 2004 6:15pm Subject: RE: CPM-700 [Free Stuff] Is it possible to purchase just the 12GHZ probe, as I already have a CPM-700 and do not require the case or extra probe. John -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: June 7, 2004 8:47 AM To: TSCM-L Subject: [TSCM-L] CPM-700 [Free Stuff] Effective immediately, any customer who purchases a CPM-700 Deluxe system ($3995) through me will receive almost $450 of extra probes and accessories at no additional charge. This includes the VLF probe, Infrared Probe, Acoustic Probe, and so on... a huge amount of good stuff, essentially for free. This should make it more attractive for list members to purchase the new 12 GHz microwave system, which is available for immediate shipment. You can also find details on the following page on my website: http://www.tscm.com/cpm700a.html As always, I will pickup the cost of shipping by express courier which will save you even more money. -jma ps: I have included a data-sheet on the deluxe system as an attachment, and have confirmed that it is clean, and not infected in any way. -------------------------------------------------------------------------- --------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. -------------------------------------------------------------------------- --------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com -------------------------------------------------------------------------- --------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -------------------------------------------------------------------------- --------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 8837 From: John Papaleo Date: Mon Jun 7, 2004 2:23pm Subject: test email only test only ----- Original Message ----- From: "kondrak" To: Sent: Monday, June 07, 2004 3:18 PM Subject: Re: [TSCM-L] Chief wants FBI to have a domestic spy division > Hey, since 9.11, all the agencies who let us down are being rewarded with > huge budget increases and promotions. > As always, I ask, "Who benefits?" > > At 10:29 6/7/2004, you wrote: > > >Allowing the FBI to have another domestic spy division is a bit like > >allowing a pedophile to open up another day care center. > > > >-jma > > > > > > > >http://www.dailystar.com/dailystar/news/24786.php > > > >Chief wants FBI to have a domestic spy division > >Robert Mueller > >THE ASSOCIATED PRESS > > > >WASHINGTON - FBI Director Robert Mueller, fighting calls for an independent > >domestic intelligence agency, proposed Thursday that the bureau create its > >own service to gather information to combat terrorism. > > > >The division would be largely independent from the rest of the FBI and have > >its own budget. It would include all the bureau's intelligence-gathering > >resources. The chief would report directly to Mueller. > > > >Mueller told a House Appropriations subcommittee that an independent > >domestic spy agency would have to duplicate much of the expertise already in > >the FBI and harm what's become the bureau's top priority: fighting > >terrorism. > > > >"Any reform proposal must recognize that intelligence is fundamental to > >successful FBI operations," he said. "Intelligence functions are woven > >throughout the fabric of the bureau, and any changes to this integrated > >approach would be counterproductive." > > > >Mueller did not provide estimates of how many new people would be hired or > >any additional costs for the initiative. > > > >Congressional reaction has been mixed on the need for a domestic spy agency. > > > >The chairman of the subcommittee, Rep. Frank Wolf, R-Va., asked Mueller in > >February to consider creation of the separate entity within the FBI. Wolf > >disagreed with those who want a separate agency similar to the British > >intelligence service. > > > >Britain's Security Service, known as MI-5, collects and analyzes > >intelligence to disrupt terrorism, espionage and sabotage but has no law > >enforcement powers. > > > > > > > > > > > > > > > > > >--------------------------------------------------------------------------- -------------------------- > > > > > >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > >--------------------------------------------------------------------------- -------------------------- > > > > > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > >--------------------------------------------------------------------------- -------------------------- > > > > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > >--------------------------------------------------------------------------- -------------------------- > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > 8838 From: James M. Atkinson Date: Mon Jun 7, 2004 8:36pm Subject: RE: CPM-700 - BMP1200 Probe Upgrade Sorry John, but you would need to buy the BMP-1200 upgrade kit for $1695 to get the minimal system. You are essentially getting the extra probes for free, so it's actually a really good deal. -jma At 07:15 PM 6/7/2004, John and Sheryl wrote: >Is it possible to purchase just the 12GHZ probe, as I already have a CPM-700 >and do not require the case or extra probe. > >John > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8839 From: James M. Atkinson Date: Mon Jun 7, 2004 9:10pm Subject: Stephen J. Wilson - [was: Fwd: johnsoncounty] Hmmm, The General Criminal Court (in his neck of the woods) has someone by his name being brought up on charges on May 26, 2004 for criminal violation of a protective order. But what is curious is that the court records mention that at the time he was being held in Federal Jail, and there is no mention of bail, etc. How do you end up in Federal Custody for violating a protective order? -jma At 04:10 PM 6/7/2004, taylortscm@y... wrote: >judy grissom wrote:From judy grissom Mon Jun 7 >13:04:18 2004 >X-Apparently-To: taylortscm@y... via 216.136.175.211; Mon, 07 Jun >2004 13:04:29 -0700 >Return-Path: >Received: from 216.136.173.99 (HELO web12301.mail.yahoo.com) (216.136.173.99) >by mta213.mail.dcn.yahoo.com with SMTP; Mon, 07 Jun 2004 13:04:28 -0700 >Message-ID: <20040607200418.91605.qmail@w...> >Received: from [24.15.169.101] by web12301.mail.yahoo.com via HTTP; Mon, >07 Jun 2004 13:04:18 PDT >Date: Mon, 7 Jun 2004 13:04:18 -0700 (PDT) >From: judy grissom >Subject: johnsoncounty >To: taylortscm@y... >MIME-Version: 1.0 >Content-Type: text/plain; charset=us-ascii >Content-Length: 950 > >By: Dan Grissom > > > >Johnson County TN > >Stephen J. Wilson of Technical Intelligence Group, a >technical surveillance countermeasures (tscm) firm >Of Laurel bloomery TN, > >Was arrested on federal charges, of gun running, after >a lengthily surveillance by: ATF, DEA, FBI >Sources stated authorities also discovered hundreds of >marijuana plants growing on his property. > >The surveillance was cut short after Wilson made death >threats against his wife, authorities feared he would >make good on the threats. > >Wilson was also known on ebay as tscm-er where he sold >counter surveillance equipment, and defrauded ebay >patrons out of thousands of dollars prior to his >arrest. > >Mail and wire fraud charges are pending on the ebay >scam. > >Wilson is in federal custody in Greenville TN. > >Dan grissom >City news service >630.683.1900 > > > > > >__________________________________ >Do you Yahoo!? >Friends. Fun. Try the all-new Yahoo! Messenger. >http://messenger.yahoo.com/ > > >--------------------------------- >Do you Yahoo!? >Friends. Fun. Try the all-new Yahoo! Messenger > >[Non-text portions of this message have been removed] > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8840 From: Steve Uhrig Date: Mon Jun 7, 2004 9:01pm Subject: RE: CPM-700 - BMP1200 Probe Upgrade Once upon a midnight dreary, James M. Atkinson pondered, weak and weary: > Sorry John, but you would need to buy the BMP-1200 upgrade kit for $1695 > to get the minimal system. > You are essentially getting the extra probes for free, so it's actually a > really good deal. John, maybe you could team with someone who wants the basic kit but can't afford or doesn't need the microwave probe. Then you'd both benefit. This certainly is a logical place to try to connect with someone to do that. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8841 From: Mitch D Date: Tue Jun 8, 2004 0:26am Subject: tscm'er locked up Just for the record........ Stephen J Wilson is not locked up in Greene County Jail Stephen J Wilson does not have a PI license( required by the state for tscm work) Where did this story come from???????.......... ===== Mitch Davis TSCM/Special Operations Group Inc. Nashville,TN.USA MitchD@t... site:www.tscmusa.com. Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 __________________________________ Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger. http://messenger.yahoo.com/ 8842 From: James M. Atkinson Date: Tue Jun 8, 2004 1:24am Subject: Re: tscm'er locked up Check out http://www.thetomahawk.com/court_report.html Note the following: "Stephen J. Wilson; Viol. OP; Aug. 25. Def. in Federal Jail." The part about violating an OP is nothing major, but the "in Federal Jail" part is curious. If anybody has access to Pacer I would appreciate it if they could run a query on the name (in TN or VA) and post it to the list. We have a mystery afoot... Let's get to the bottom of this. -jma The information contained in this report is a matter of public record, and contains information from General Sessions Court of May 26, 2004, the Honorable Judge Bliss Hawkins presiding. The Tomahawk chooses to print this information for the benefit of its readers. People with names similar or identical to those listed may not be those identified in reports. If a defendant pays a fine late, a Capias may already have been issued and this information could appear in this report, even though the fine has been paid. Abbreviations: BA: Blood Alcohol; CTS: Cost to State; DORL: Driving on Revoked License; DOSL: Driving on Suspended License; DUI: Driving Under the Influence; DWI: Driving While Impaired; FTA: Failure to Appear; FTP; Failure to Pay: OP: Order of Protection; PI: Public Intoxication; PIF: Paid in Full; VOP: Violation of Probation. Raymond Arney; Expired DL. Dismissed CTS, has complied. Robert L. Askin; Speeding; June 30. Lloyd L. Bland; Expired DL, Viol. Regist. Law, No Ins. Dismissed CTS, motion of Atty. General. Has complied with all violations. Chadwick R. Brooks; Speeding, No Ins. Suspend DL for FTA. Gary L. Carlton; No Ins., Speeding, DUI, DORL Fourth; June 30. Amanda Church; DOSL, Speeding. Fines and costs, 5/29 susp. on paymt., 5/29 prob. Cross Roads. Condition of prob. that this is pd. in full. Shannon D. Collins; Speeding. Fines and costs, PIF. Bill M. Daddazio; Theft of Veh., Poss. Stolen Prop.; July 28. Michael Davis; Speeding. Suspend DL for FTA. Terry L. Davis; DOSL. Fines and costs, 5/29 susp. on paymt., 5/29 prob. CCI. Contd. July 28 for paymt. Robert Donahue; Vandalism, Inciting a Riot; July 21. Diana L. Dunn; Speeding. Fines and costs, PIF. Donna M. Enson; Viol. Regist. Law. Suspend DL for FTA. Burley Taylor; VOP. 183 days jail. Adam Erickson; Theft, Poss. Sch. VI, False Info. to Officer. Fines and costs, 11/29 susp. on paymt. x3, 11/29 prob. Cross Roads x3. Also: VOP. Dismissed CTS, motion of Atty. General and Prob. officer. Forf. cash bond. Vickie L. Farmer; Speeding. Fines and costs, PIF. Richard Fields, Jr.; Aiding and Abetting DUI Second; June 30 for plea. Billy R. Fletcher; Speeding. Fines and costs, contd. June 9 for paymt. Also: No Ins. Dismissed CTS, has complied. Monica Fitzgerald; Speeding, DOSL. Capias issued, $1,000 cash bond. Angelo A. Giarrusso; Speeding. Fines and costs, PIF. Kimberly Greene; Criminal Responsibility, Contrib. to Delinq. of Minor, Abandonment, Poss. Sch. II, Poss. Drug Para.; June 30 for trial. Rex Harman; Speeding. Fines and costs. James Humphrey; Speeding. Fines and costs, PIF. Christy Heaton ìMargaret McElyeaîí Domestic Asslt. x2. Order issued. Contd. June 23 for paymt. Steve Jennings; Speeding. Suspend DL for FTA. Daniel C. Jones; DOSL. Fines and costs, PIF. Also: Viol. DL Law. Dismissed CTS, motion of Atty. General. Blu N. Key; Theft over $5,000. June 23. James E. Leathern; DOSL. Fines and costs, 5/29 susp. on paymt., 5/29 prob. CCI. Christopher Lewis; Speeding; June 30. David Lipford; Speeding, DL Viol., Failure to Maintain Lane, No Ins. Suspend DL for FTA. Johnny M. Long; Poss. Sch. IV, Poss. Sch. VI for Resale, Poss. Drug Para.; June 23. Ronald Mason; Speeding. Fines and costs, PIF. Scotty K. May; DORL. Bound over to Grand Jury July 26. Melvin M. Morrison; Speeding. Fines and costs, PIF. Jacqueline B. Neatherly; Speeding, No Ins.; June 30. To have ins. Charles Oliver; Identity Theft. Dismissed CTS, motion of Atty. General. Charles Osborne; Viol. Regist. Law x2, Vehicle Defects. PIF. James E. Osborne; Viol. Regist. Law. PIF. Christopher Owens; Speeding, Viol. Seatbelt Law. Fines and costs, PIF. Also: No Ins.; June 30, to have ins. Angela R. Phillips; Viol. Regist. Law. Suspend DL for FTA. James H. Phipps; Speeding. Fines and costs, PIF. Jack C. Proffitt; Domestic Asslt.; July 28. Matthew L. Reece; Speeding, Seatbelt Viol. Suspend DL for FTA. Robert L. Roberts; Speeding. Fines and costs, PIF. Jerry D. Sluder; Theft, Forgery, VOP x3; June 30. Barbara Smith; Speeding; June 30. Terry W. Snyder; Speeding. Fines and costs, PIF. Michael Street; Speeding. Fines and costs, PIF. Also: No Ins. Dismissed CTS, now has ins. Tamara D. Tate; DOSL. Fines and costs, 5/29 susp. on paymt., 5/29 prob. CCI. Contd. June 16 for paymt. William B. Tharp, Jr.; DUI, Viol. Implied Consent, Speeding, No Ins.; June 30 for plea. John Triplett; Speeding. Fines and costs, PIF. David Triplett; Crim. Trespass., Vandalism. Dismissed CTS, motion of Atty. General. Joey Wallace; Vandalism. Bound over to Grand Jury July 26. Eric Ward; DUI; June 23. Donald G. Warren; Poss. Sch. II for Resale, Poss. Drug Para., Going Armed. Fines and costs, 11/29 susp. but 60 days, 11/29 susp. on paymt., 30 days susp. on paymt., 11/29 prob. CCI x2, 30 days prob. Also: Viol. Traffic Control Device. Dismissed CTS, motion of Atty. General. Joshua Weeks; Poss. Drug Para., Mfg. Sch. VI. Bound over to Grand Jury July 26. Also: Poss. Sch. VI. Dismissed CTS, motion of Atty. General. Stephen J. Wilson; Viol. OP; Aug. 25. Def. in Federal Jail. Travis D. Wilson; Speeding. Fines and costs, PIF. James L. Wolfe; Speeding. Fines and costs, contd. June 30 for paymt. Daniel Winters; Poss. Drug Para., Poss. Legend Drug. Fines and costs, 11/29 susp. on paymt., 30 days, 11/29 prob. Cross Roads, 30 days prob. Lyle D. Wolfe; Speeding. Fines and costs, contd. Aug. 18 for paymt. Also: Improper Passing. Dismissed CTS, motion of Atty. General. Joseph Hamm, Jr.; VOP; July 14. Laura Johnson Estep; Reckless Driving, DORL x2, Driving Left of Center, Viol. Regist. Law. Fines and costs, 5/29 susp. but 5 days, 5/29 susp. on paymt. x2, 5/29 prob. Cross Roads x3. Cond. of prob. to pay in full. Also: No Ins., Viol. Seatbelt Law. Dismissed CTS, motion of Atty. General. James Keller; DUI. Fines and costs, 11/29 susp. but 2 days, 11/29 prob. Cross Roads, DL susp. for 11/29. Steve Estep; DORL Third; June 9. John Main; Asslt. Fines and costs, 11/29 susp. but time served, 11/29 probÖ [] At 01:26 AM 6/8/2004, Mitch D wrote: >Just for the record........ >Stephen J Wilson is not locked up in Greene County Jail >Stephen J Wilson does not have a PI license( required by the >state for tscm work) >Where did this story come from???????.......... > >===== > >Mitch Davis >TSCM/Special Operations Group Inc. >Nashville,TN.USA >MitchD@t... site:www.tscmusa.com. >Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8843 From: James M. Atkinson Date: Tue Jun 8, 2004 8:40am Subject: Steve Wilson of TIG Burns at the Stake U.S. District Court (Live Database) Eastern District of Tennessee (Greeneville) CRIMINAL DOCKET FOR CASE #: 2:04-mj-00061-ALL Case title: USA v. Wilson Other court case number(s): None Magistrate judge case number(s): None Date Filed: 04/29/04 Assigned to: Magistrate Dennis H Inman Referred to: Defendant(s) ----------------------- Stephen J Wilson (1) represented by Tim S Moore Federal Defender Services of Eastern Tennessee, Inc. 129 West Depot Street Suite One Greeneville, TN 37743 423-636-1301 Fax : 423-636-1385 Email: Tim_Moore@f... LEAD ATTORNEY ATTORNEY TO BE NOTICED Designation: Public Defender or Community Defender Appointment Pending Counts ---------------------- Disposition ---------------- None Highest Offense Level (Opening) --------------------------------------- None Terminated Counts ----------------------------- Disposition ---------------- None Highest Offense Level (Terminated) -------------------------------------------- None Complaints ---------------- Disposition ---------------- 21:841(a)(1),(b)(1)(B) MANUFACTURE MARIJUANA Plaintiff ------------------- UNITED STATES OF AMERICA represented by Edward P Bailey, Jr - 1832 Midpark Drive Suite F Knoxville, TN 37921 865-330-1020 LEAD ATTORNEY ATTORNEY TO BE NOTICED Filing Date # Docket Text 04/29/2004 1 COMPLAINT against Stephen J Wilson signed by Mag Judge Dennis H. Inman (CSL) (Entered: 04/29/2004) 04/29/2004 WARRANT FOR ARREST issued for Stephen J Wilson by Mag Judge Dennis H. Inman (CSL) (Entered: 04/29/2004) 04/30/2004 ARREST of defendant Stephen J Wilson on 4/30/04 (CSL) (Entered: 04/30/2004) 04/30/2004 2 CTRM MINUTES: before Mag Judge Dennis H. Inman; initial appearance of Stephen J Wilson; dft sworn, found comptent, advised of charges/penalties, financial affidavit executed and approved; oral motion of USA for detention - granted; detention and preliminary hrg set for 9:00 5/3/04 for Stephen J Wilson before Mag Judge Dennis H. Inman; dft remanded to custody; Tape: 10:47:00, CD: Connie Lamb, AUSA: Edward Bailey, PTSO: Jennifer Bible (CSL) (Entered: 04/30/2004) 04/30/2004 3 CJA FORM 23 (Financial Affidavit) as to Stephen J Wilson, approved in the margin by USMJ Dennis H. Inman (CSL) (Entered: 04/30/2004) 04/30/2004 4 ORDER OF TEMPORARY DETENTION pending hrg 5/3/04 @ 9:00 a.m. by Mag Judge Dennis H. Inman as to Stephen J Wilson (cc: all counsel) (CSL) (Entered: 04/30/2004) 04/30/2004 5 ORDER by Mag Judge Dennis H. Inman, finding dft Wilson financially qualified for court-appointed counsel, appointing the Federal Defender Services as to Stephen J Wilson , setting a detention & prel hrg for 5/3/04 @ 9:00 a.m. (cc: all counsel) (CSL) (Entered: 04/30/2004) 05/03/2004 6 Minute Entry for proceedings held before Judge Dennis H Inman :Detention Hearing and Preliminary Hearing as to Stephen J Wilson held on 5/3/2004; witnesses sworn, proof offered by USA; proffer by USA and defense; oral argument by defense; gov't rests; defense rests; order to enter; oral motion of USA to unseal search warrant - granted; defendant remanded to custody (Court Reporter Jimmie Jane McConnell.) (CSL, ) (Entered: 05/03/2004) 05/03/2004 7 EXHIBIT and WITNESS LIST for 5/3/04 detention and preliminary hearing (CSL, ) (Entered: 05/03/2004) 05/03/2004 8 Search Warrant Issued in case as to Stephen J Wilson, application and affidavit originally filed 4/19/04 as case 2:04-54M and unsealed 5/3/04 (CSL, ) (Entered: 05/03/2004) 05/03/2004 9 Search Warrant Returned Executed on 04/22/04 in case as to Stephen J Wilson; search warrant case No. 2;04-54M unsealed 5/3/04 (CSL, ) (Entered: 05/03/2004) 05/03/2004 10 ORDER OF DETENTION pending trial as to Stephen J Wilson . Signed by Judge Dennis H Inman on 05-03-04. (CSL, ) (Entered: 05/03/2004) 05/03/2004 11 ORDER as to Stephen J Wilson, finding probable cause to believe that dft committed the offense with which he is charged, binding dft to the grand jury for further proceedings . Signed by Judge Dennis H Inman on 05/03/04. (CSL, ) (Entered: 05/03/2004) 05/10/2004 12 Warrant Returned Executed on 4/30/04. as to Stephen J Wilson. (BGP, ) (Entered: 05/10/2004) 05/26/2004 13 NOTICE OF HEARING as to Stephen J Wilson, Plea to information hearing set for 6/14/2004 09:00 AM in Courtroom 400 before Honorable J Ronnie Greer; criminal case number to be assigned on plea date. C/S by fax if no electronic receipt. (CSL, ) (Entered: 05/26/2004) ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8844 From: Does it matter Date: Tue Jun 8, 2004 10:21am Subject: Anthony in more trouble I posted about this before, but it appears that this situation has heated up again. http://www3.cjad.com/content/cp_article.asp? id=/global_feeds/canadianpress/entertainmentnews/e060233A.htm 8845 From: taylortscm@y... Date: Tue Jun 8, 2004 10:38am Subject: Re: tscm'er locked up mitch: just for the record stephen j wilson is in federal custody in greenville tn>and trial is in mountain city dan taylor group Mitch D wrote: Just for the record........ Stephen J Wilson is not locked up in Greene County Jail Stephen J Wilson does not have a PI license( required by the state for tscm work) Where did this story come from???????.......... ===== Mitch Davis TSCM/Special Operations Group Inc. Nashville,TN.USA MitchD@t... site:www.tscmusa.com. Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 __________________________________ Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger. http://messenger.yahoo.com/ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger [Non-text portions of this message have been removed] 8846 From: G P Date: Tue Jun 8, 2004 11:07am Subject: Re: Steve Wilson of TIG Burns at the Stake Bizarre. Steve Wilson bought a pristine 492PGM from me about 6 months ago, the transaction was a bit sketchy but I did eventually get paid (I wouldn't ship the SA until I was able to cash his cashier's check). Then, out of the blue about 2 months ago (around the same time as the initial complaint filed in this case), Steve sent me some email about doing some consulting work for U.S. Treasury and DEA, with a company called Secure USA. It was supposedly a large-scale surveillance project, store and forward interception, a bunch of TSCM services, Tektronix was involved etc. I sent Secure USA's NDA back, then never heard from him again. Methinks there is a bit more to this story than what the PACER docket reflects... "James M. Atkinson" wrote: U.S. District Court (Live Database) Eastern District of Tennessee (Greeneville) CRIMINAL DOCKET FOR CASE #: 2:04-mj-00061-ALL Case title: USA v. Wilson Other court case number(s): None Magistrate judge case number(s): None Date Filed: 04/29/04 Assigned to: Magistrate Dennis H Inman Referred to: Defendant(s) ----------------------- Stephen J Wilson (1) represented by Tim S Moore Federal Defender Services of Eastern Tennessee, Inc. 129 West Depot Street Suite One Greeneville, TN 37743 423-636-1301 Fax : 423-636-1385 Email: Tim_Moore@f... LEAD ATTORNEY ATTORNEY TO BE NOTICED Designation: Public Defender or Community Defender Appointment Pending Counts ---------------------- Disposition ---------------- None Highest Offense Level (Opening) --------------------------------------- None Terminated Counts ----------------------------- Disposition ---------------- None Highest Offense Level (Terminated) -------------------------------------------- None Complaints ---------------- Disposition ---------------- 21:841(a)(1),(b)(1)(B) MANUFACTURE MARIJUANA Plaintiff ------------------- UNITED STATES OF AMERICA represented by Edward P Bailey, Jr - 1832 Midpark Drive Suite F Knoxville, TN 37921 865-330-1020 LEAD ATTORNEY ATTORNEY TO BE NOTICED Filing Date # Docket Text 04/29/2004 1 COMPLAINT against Stephen J Wilson signed by Mag Judge Dennis H. Inman (CSL) (Entered: 04/29/2004) 04/29/2004 WARRANT FOR ARREST issued for Stephen J Wilson by Mag Judge Dennis H. Inman (CSL) (Entered: 04/29/2004) 04/30/2004 ARREST of defendant Stephen J Wilson on 4/30/04 (CSL) (Entered: 04/30/2004) 04/30/2004 2 CTRM MINUTES: before Mag Judge Dennis H. Inman; initial appearance of Stephen J Wilson; dft sworn, found comptent, advised of charges/penalties, financial affidavit executed and approved; oral motion of USA for detention - granted; detention and preliminary hrg set for 9:00 5/3/04 for Stephen J Wilson before Mag Judge Dennis H. Inman; dft remanded to custody; Tape: 10:47:00, CD: Connie Lamb, AUSA: Edward Bailey, PTSO: Jennifer Bible (CSL) (Entered: 04/30/2004) 04/30/2004 3 CJA FORM 23 (Financial Affidavit) as to Stephen J Wilson, approved in the margin by USMJ Dennis H. Inman (CSL) (Entered: 04/30/2004) 04/30/2004 4 ORDER OF TEMPORARY DETENTION pending hrg 5/3/04 @ 9:00 a.m. by Mag Judge Dennis H. Inman as to Stephen J Wilson (cc: all counsel) (CSL) (Entered: 04/30/2004) 04/30/2004 5 ORDER by Mag Judge Dennis H. Inman, finding dft Wilson financially qualified for court-appointed counsel, appointing the Federal Defender Services as to Stephen J Wilson , setting a detention & prel hrg for 5/3/04 @ 9:00 a.m. (cc: all counsel) (CSL) (Entered: 04/30/2004) 05/03/2004 6 Minute Entry for proceedings held before Judge Dennis H Inman :Detention Hearing and Preliminary Hearing as to Stephen J Wilson held on 5/3/2004; witnesses sworn, proof offered by USA; proffer by USA and defense; oral argument by defense; gov't rests; defense rests; order to enter; oral motion of USA to unseal search warrant - granted; defendant remanded to custody (Court Reporter Jimmie Jane McConnell.) (CSL, ) (Entered: 05/03/2004) 05/03/2004 7 EXHIBIT and WITNESS LIST for 5/3/04 detention and preliminary hearing (CSL, ) (Entered: 05/03/2004) 05/03/2004 8 Search Warrant Issued in case as to Stephen J Wilson, application and affidavit originally filed 4/19/04 as case 2:04-54M and unsealed 5/3/04 (CSL, ) (Entered: 05/03/2004) 05/03/2004 9 Search Warrant Returned Executed on 04/22/04 in case as to Stephen J Wilson; search warrant case No. 2;04-54M unsealed 5/3/04 (CSL, ) (Entered: 05/03/2004) 05/03/2004 10 ORDER OF DETENTION pending trial as to Stephen J Wilson . Signed by Judge Dennis H Inman on 05-03-04. (CSL, ) (Entered: 05/03/2004) 05/03/2004 11 ORDER as to Stephen J Wilson, finding probable cause to believe that dft committed the offense with which he is charged, binding dft to the grand jury for further proceedings . Signed by Judge Dennis H Inman on 05/03/04. (CSL, ) (Entered: 05/03/2004) 05/10/2004 12 Warrant Returned Executed on 4/30/04. as to Stephen J Wilson. (BGP, ) (Entered: 05/10/2004) 05/26/2004 13 NOTICE OF HEARING as to Stephen J Wilson, Plea to information hearing set for 6/14/2004 09:00 AM in Courtroom 400 before Honorable J Ronnie Greer; criminal case number to be assigned on plea date. C/S by fax if no electronic receipt. (CSL, ) (Entered: 05/26/2004) ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links --------------------------------- Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger [Non-text portions of this message have been removed] 8847 From: James M. Atkinson Date: Tue Jun 8, 2004 11:36am Subject: Stephen Wilson - Further Court Case Information According to David Sheppard (with the Sheriffs Department, (423) 727-7761), Steve Wilson was charged with violating a protective order under docket number #55209 in General Criminal Session Court held at Mountain City, TN. The phone number for the court is (423) 727-9633 x9012. According to affidavit filed in the case, Steve Wilson is accused of calling (by telephone) Penny Baker Wilson (his wife?) and threatening to kill her, burn her, murder her and so on unless she dropped criminal charges against him. The affidavit mentions that Steve intendes to plead guilty to the criminal charges against him in federal court, and that he was willing to serve his time, but that he wanted access to the children and wanted Penny Baker Wilson to drop the criminal complaint she had filed against him. The affidavit mentions that these threats were made on April 27, 2004 which would have been five days after the search warrant was issued (April 22, 2004) against his house and business, but three days before he was arrested by federal authorities. It sort of looks like Steve dug himself into a pretty deep hole, and then screwed himself by threatening someone who was a witness against him. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8848 From: James M. Atkinson Date: Tue Jun 8, 2004 1:36pm Subject: Re: Steve Wilson of TIG Burns at the Stake Yep, he was wildly buying and selling equipment for several months, and one the one hand was dumping all of his own TSCM equipment, but was also buy up related equipment. It gets even curious'er, and curious'er. Strange that the DEA would bust him if he was doing all that work for them... unless of course he was actually a confidential informant (ie: Narc) for the DEA, and the agency found out about his other business, and had no choice but to bust him. On the other hand they could have stubbled across his other business activities while they were doing a routine background check on him. Some really, really funny is going on here. I belive the company you may be referring to is: SecureUSA, Inc., and they have a website at: http://www.secureusa.net/ but they disavow any knowledge of him, or any relation to him. -jma At 12:07 PM 6/8/2004, G P wrote: >Bizarre. Steve Wilson bought a pristine 492PGM from me about 6 months >ago, the transaction was a bit sketchy but I did eventually get paid (I >wouldn't ship the SA until I was able to cash his cashier's check). > >Then, out of the blue about 2 months ago (around the same time as the >initial complaint filed in this case), Steve sent me some email about >doing some consulting work for U.S. Treasury and DEA, with a company >called Secure USA. It was supposedly a large-scale surveillance project, >store and forward interception, a bunch of TSCM services, Tektronix was >involved etc. I sent Secure USA's NDA back, then never heard from him again. > >Methinks there is a bit more to this story than what the PACER docket >reflects... > >"James M. Atkinson" wrote: > >U.S. District Court (Live Database) >Eastern District of Tennessee (Greeneville) >CRIMINAL DOCKET FOR CASE #: 2:04-mj-00061-ALL > >Case title: USA v. Wilson >Other court case number(s): None >Magistrate judge case number(s): None ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8849 From: James M. Atkinson Date: Tue Jun 8, 2004 2:27pm Subject: Steve Wilson is in the Custody of the U.S. Marshall's I have confirmed that Stephen J. Wilson is in fact in the custody of the U.S. Marshall's Service, and is being held at the Greene County Jail (AKA: Greene County Detention Center) run by the Greene County Sheriff's Department. Their number is (423) 798-1800, and they can confirm that he is being held on behalf of the U.S. Marshall's. Seems that Steve Wilson was or is also a member of ERI/BECCA, and that some of the membership was warmly embracing him, referring customers to him, endorsing him, etc, etc even after some of the membership was warned at a criminal indictment was in Wilson's future. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8850 From: G P Date: Tue Jun 8, 2004 2:43pm Subject: Re: Steve Wilson of TIG Burns at the Stake I checked out that Secure USA site, it's not the same company - the one he was involved with is headquartered out of NoVA / Washington D.C. Initially I wasn't interested in the opportunity, he then sent me paper copies of all of the involved principals' resumes - a very impressive group with lots of D.C. credentials, execs from NIPC, former VPs from DOE with Critical Infrastructure Protection, members of the World Economic Forum, all with ties to past and current administrations. Definitely more to this story than what's being reported... "James M. Atkinson" wrote: Yep, he was wildly buying and selling equipment for several months, and one the one hand was dumping all of his own TSCM equipment, but was also buy up related equipment. It gets even curious'er, and curious'er. Strange that the DEA would bust him if he was doing all that work for them... unless of course he was actually a confidential informant (ie: Narc) for the DEA, and the agency found out about his other business, and had no choice but to bust him. On the other hand they could have stubbled across his other business activities while they were doing a routine background check on him. Some really, really funny is going on here. I belive the company you may be referring to is: SecureUSA, Inc., and they have a website at: http://www.secureusa.net/ but they disavow any knowledge of him, or any relation to him. -jma At 12:07 PM 6/8/2004, G P wrote: >Bizarre. Steve Wilson bought a pristine 492PGM from me about 6 months >ago, the transaction was a bit sketchy but I did eventually get paid (I >wouldn't ship the SA until I was able to cash his cashier's check). > >Then, out of the blue about 2 months ago (around the same time as the >initial complaint filed in this case), Steve sent me some email about >doing some consulting work for U.S. Treasury and DEA, with a company >called Secure USA. It was supposedly a large-scale surveillance project, >store and forward interception, a bunch of TSCM services, Tektronix was >involved etc. I sent Secure USA's NDA back, then never heard from him again. > >Methinks there is a bit more to this story than what the PACER docket >reflects... > >"James M. Atkinson" wrote: > >U.S. District Court (Live Database) >Eastern District of Tennessee (Greeneville) >CRIMINAL DOCKET FOR CASE #: 2:04-mj-00061-ALL > >Case title: USA v. Wilson >Other court case number(s): None >Magistrate judge case number(s): None ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links --------------------------------- Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger [Non-text portions of this message have been removed] 8851 From: taylortscm@y... Date: Tue Jun 8, 2004 1:25pm Subject: Re: Stephen Wilson - Further Court Case Information jim: I talked to ed bailey all he do was to confirm he is the federal prosicuting stephen j wilson in the drug case , for manufacturing more than one hundred marijuana plants. dan grissom taylor group "James M. Atkinson" wrote: According to David Sheppard (with the Sheriffs Department, (423) 727-7761), Steve Wilson was charged with violating a protective order under docket number #55209 in General Criminal Session Court held at Mountain City, TN. The phone number for the court is (423) 727-9633 x9012. According to affidavit filed in the case, Steve Wilson is accused of calling (by telephone) Penny Baker Wilson (his wife?) and threatening to kill her, burn her, murder her and so on unless she dropped criminal charges against him. The affidavit mentions that Steve intendes to plead guilty to the criminal charges against him in federal court, and that he was willing to serve his time, but that he wanted access to the children and wanted Penny Baker Wilson to drop the criminal complaint she had filed against him. The affidavit mentions that these threats were made on April 27, 2004 which would have been five days after the search warrant was issued (April 22, 2004) against his house and business, but three days before he was arrested by federal authorities. It sort of looks like Steve dug himself into a pretty deep hole, and then screwed himself by threatening someone who was a witness against him. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger [Non-text portions of this message have been removed] 8852 From: kondrak Date: Tue Jun 8, 2004 3:03pm Subject: Wireless Hackers Leave No Tracks > > >http://www.computerworld.com/securitytopics/security/story/0,10801,93625,00.html > >Security Manager's Journal by Vince Tuesday >JUNE 07, 2004 >COMPUTERWORLD > >I'm a parasite. I didn't pay for the bandwidth I'm using right now. I >didn't ask for permission to use it -- I don't even know whom to ask. >But I'm on holiday, I have a few bits of work to finish up before I >can relax, and I need to send my e-mail. > >The broadband service in the rented house doesn't work, so I stuck in >my wireless LAN card and found two WLANs covering the house. One has a >Secure Set Identifier of "lopez" and has Wired Equivalent Privacy >turned on; the other has an SSID of "default" and no WEP. > >My wireless card has automatically associated with the "default" base >station, which gave me a Dynamic Host Configuration Protocol address. >Now I'm connected to the Internet at 11Mbit/sec. with no fee and no >restrictions on what I can do. > >When WLANs hit the mainstream a few years ago, the security focus was >on confidentiality, and vendors included WEP to encrypt data in the >air. WEP has flaws -- it might not stop a snooper in your parking from >reading your data -- but just the fact that "lopez" had it turned on >was enough to turn my attention elsewhere. Why hack "lopez" when >"default" is sending in the clear? > >But having data sniffed from the air isn't the real threat that >wireless poses. That problem is easily solved by using cryptography. A >bigger worry is "de-perimeterization," which is a fancy way of saying >that the walls of the normal fortress model are falling away, thanks >in part to wireless. In the good old days, you inventoried all >external connections and put firewalls in front of them. Now, nearly >every organization has so many connections to the outside that it >isn't feasible to set up firewalls to control access to all of them. >If your wireless users need access to all of the internal services, >what can you block with a firewall? > >And if you're a hacker, why bother trying to intercept data from the >traffic flying about when you can just connect to the network and >pretend to be a legitimate client? Once you become a full node on the >network, you don't have to wait for a client to connect to download >the information you want and sniff it. Instead, you can just waltz >right in and take what you want. This is a lot less covert, but unless >the target has a hair-trigger intrusion-detection system configuration >and very good triangulation equipment, you probably won't be >discovered. > >My company's authorized wireless access points have strong >authentication, so only legitimate clients can connect, but all our >exterior defenses might be for naught if a staff member plugs in a $99 >access point. > >To protect against this, my team and I run regular sweeps to check for >illegitimate access points that might allow unauthorized users to >connect. We had a few early run-ins with staff when we began the >sweeps, but now the authorized service is so good that everyone is >happier using that than they would be trying to sneak new equipment >into the office. > > >Insecure Access > >In these sweeps, we've detected many access points that are >transmitting from outside the company walls. It's interesting to see >that all the bars and restaurants near our offices have WLANs for >waiters to send orders to the kitchen. All are insecurely configured. >However, since the worst anyone could do is jump the queue for >ordering drinks, perhaps the low level of protection is all that's >necessary. > >The only time I really went white was when a sweep at my company >identified more than 30 unauthorized access points on a single floor. >I couldn't imagine why an entire department would go crazy and try to >provide its own competing WLAN service. > >But when I tried to connect to one of the access points, I could get >only a printer service Web page. It turned out that our printer vendor >had shipped a batch of printers with wireless printing support enabled >by default. Each was functioning as a WLAN access point. We disabled >the cards and asked the vendor to do the same with future orders. > >Rogue access points in the office are a problem we can solve, but the >real WLAN problem that strikes terror into my heart is the home user. > >Before WLANs, if I were a hacker or virus writer or if I wanted to >download or share illegal material, I had limited options. I could use >my own account and eventually get caught after the feds tracked the >abuse back to me. I could steal an AOL account by phishing until the >feds used phone traces to catch me. Or I could wander into a Web cafe, >do my evil deeds and flee, leaving closed-circuit TV footage, >fingerprints and physical evidence the feds could use to put me behind >bars. > >With WLANs, things have changed. On most streets in big metropolitan >areas, a few people have broadband, and at least one uses it with an >insecure wireless connection. Perhaps half of those people turn on the >Windows XP firewall, but that won't stop an attacker. They just get >within range and connect. There's no physical evidence, no >closed-circuit TV, and the poor schmuck whose broadband connection >gets used is the one whom the feds raid. > >So while the WLAN connection I'm using now is helpful to me as I >finish up my work while on holiday, someone else could just as easily >be using it to launch attacks before disappearing anonymously back >into the night. > >There's no chance that home users will move to two-factor >authentication for their wireless networks, so I'm making sure that my >current designs for Web-facing infrastructure don't rely on being able >to track down and stop attackers. Clearly, that's no longer possible. > > >What do You Think? > >This week's journal is written by a real security manager, "Vince >Tuesday," whose name and employer have been disguised for obvious >reasons. Contact him at vince.tuesday@h... 8853 From: James M. Atkinson Date: Tue Jun 8, 2004 3:28pm Subject: Re: Steve Wilson of TIG Burns at the Stake What city were they in? Do you have a website for them? When you say "NoVa in Washington" are you referring to Jack Mogus of Nova Security? I know that Steve Wilson was tied up with Buck Hall (AKA: Lawrence B. Hall ) for a while, but is any of this related to him? He (Wilson) was also involved with Tim Johnson and Bob Bryant at the World Institute, and that Wilson is still listed as a member of the faculty (see next message). -jma At 03:43 PM 6/8/2004, G P wrote: >I checked out that Secure USA site, it's not the same company - the one he >was involved with is headquartered out of NoVA / Washington D.C. > >Initially I wasn't interested in the opportunity, he then sent me paper >copies of all of the involved principals' resumes - a very impressive >group with lots of D.C. credentials, execs from NIPC, former VPs from DOE >with Critical Infrastructure Protection, members of the World Economic >Forum, all with ties to past and current administrations. > >Definitely more to this story than what's being reported... > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 8854 From: James M. Atkinson Date: Tue Jun 8, 2004 3:44pm Subject: Steve Wilson - Member of the Faculty of World Institute Curious that so many other folks in the business are listed as faculty at World Institute along with Steve Wilson. Check out: http://www.worldinstitute.org/wise/people/biosw.html He also seems to have a background in agriculture as well [ouch]. Bob Bryant at WISE may want to do a little pruning and make some edits on his website. -jma Attached: >World Institute for Security Enhancement >Steve Wilson > >Steve Wilson, is a member of the faculty of the World Institute for >Security Enhancement. Mr. Wilson is the president of the Technical >Intelligence Group, Incorporated. He has more than 10 years experience in >providing high level counterintelligence services to Fortune 500 >clientele, as well as several large foreign national corporations. > >Mr. Wilson has served as a consultant to both industry and Government in a >number of diverse assignments. He has served as a consultant to a major >American manufacturer of counterintelligence products as an expert in >telephone systems to assist in the design of their latest anti-wiretapping >products. He has also served as a consultant to the U. S. Custom's Special >Investigations Unit for secure Title III counterintelligence products. He >has served as a Technical (TSCM) Consultant to a government TSCM licensing >agency certifying schools and students. > >During his ten years with AT&T he was assigned to World Headquarters as >the National Director of Technical Products Development & Training for >Management Personnel. In this capacity he was responsible for Private >Branch Exchange (PBX) and Electronic Tandem Exchange (ETN) design He has >also configured and coordinated the installation of secure products >(including Tempest) Data Communications Networks to large Government and >(DOD) contractors. > >Mr. Wilson is currently Chairman of the Smoky Mountains Chapter of the >American Society for Industrial Security. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8855 From: kondrak Date: Tue Jun 8, 2004 4:13pm Subject: Re: Anthony in more trouble 404'ed At 11:21 6/8/2004, you wrote: >I posted about this before, but it appears that this situation has >heated up again. > >http://www3.cjad.com/content/cp_article.asp? >id=/global_feeds/canadianpress/entertainmentnews/e060233A.htm > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 8856 From: G P Date: Tue Jun 8, 2004 4:18pm Subject: Re: Steve Wilson of TIG Burns at the Stake Most were in Washingon D.C., specifically Northern Virginia area. Buck Hall was one of the resumes, I'm on the road this week so I'll have to dig up the others when I get back home. "James M. Atkinson" wrote: What city were they in? Do you have a website for them? When you say "NoVa in Washington" are you referring to Jack Mogus of Nova Security? I know that Steve Wilson was tied up with Buck Hall (AKA: Lawrence B. Hall ) for a while, but is any of this related to him? He (Wilson) was also involved with Tim Johnson and Bob Bryant at the World Institute, and that Wilson is still listed as a member of the faculty (see next message). -jma At 03:43 PM 6/8/2004, G P wrote: >I checked out that Secure USA site, it's not the same company - the one he >was involved with is headquartered out of NoVA / Washington D.C. > >Initially I wasn't interested in the opportunity, he then sent me paper >copies of all of the involved principals' resumes - a very impressive >group with lots of D.C. credentials, execs from NIPC, former VPs from DOE >with Critical Infrastructure Protection, members of the World Economic >Forum, all with ties to past and current administrations. > >Definitely more to this story than what's being reported... > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links --------------------------------- Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger [Non-text portions of this message have been removed] 8857 From: Does it matter Date: Tue Jun 8, 2004 5:24pm Subject: Re: Anthony in more trouble Don't know why but here is a link to another article... Sorry http://www.mercurynews.com/mld/mercurynews/news/breaking_news/8813967 .htm?1c http://www.reuters.com/newsArticle.jhtml? type=domesticNews&storyID=5314646 --- In TSCM-L@yahoogroups.com, kondrak wrote: > 404'ed > > At 11:21 6/8/2004, you wrote: > >I posted about this before, but it appears that this situation has > >heated up again. > > > >http://www3.cjad.com/content/cp_article.asp? > >id=/global_feeds/canadianpress/entertainmentnews/e060233A.htm > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > 8858 From: A Grudko Date: Wed Jun 9, 2004 0:03am Subject: RE: Virus sent to this list From: James M. Atkinson [mailto:jmatk@tscm.com] > Could you please send me a copy of the error message you got from your ISP. Unfortunatly I deleted it at once - I get many spoofed messages every day but I recalled it because it was the first one I have seen 'from' this group. I belong to just one other yahoogroup which is spoofed out of the about 40 lists that I belong to. I'll try to recover it. My personal and business addresses have been spoofed befor and I receive many 'virus attached' warnings from people I have never heard of. -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: 07 June 2004 07:31 PM > A number of lists send monthly mission statements (it is an integral feature of Yahoogroups) and I got perhaps six all on top of one another yesterday morning, from different lists. I don't think I have ever seen a 'mission statement' although I belong to about 40 groups - perhaps my group settings are different or yahoo might target people in countries (based on the address name - .co.za is a tiny market for the big boys. My multinational clients all peg us at about 1% of world market) Andy G Afrika Suid --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.692 / Virus Database: 453 - Release Date: 2004/05/28 [Non-text portions of this message have been removed] 8859 From: Date: Wed Jun 9, 2004 3:29am Subject: CNN.com - Web-linked cameras let users play Big Brother - Jun 7, 2004 Web-linked cameras let users play Big Brother Monday, June 7, 2004 Posted: 1:56 PM EDT (1756 GMT) YOUR E-MAIL ALERTS Computer Security Computer Networking Internet or CREATE YOUR OWN Manage alerts | What is this? TAIPEI, Taiwan (Reuters) -- Big Brother is getting a whole lot of little siblings. New surveillance cameras allow anyone with a broadband Internet connection to keep a 24-hour watch on nearly anything from anywhere. Want to monitor your house from the office? Connect one of the cameras to an Ethernet or wireless computer network at home, then navigate your browser to a Web site linked to an Internet address assigned to the camera. These Internet protocol (IP) cameras, made by companies including Cisco Systems Inc's Linksys unit and Sweden's Axis Communications, function as stand-alone servers that stream video over the Web. In Europe alone, IP cameras are expected to account for about 20 percent of a surveillance market forecast to be worth 376.5 million euros ($460 million) in annual sales by 2008, up from less than five percent today, according to IMS Research. "It's going to be one of the biggest trends in the surveillance market over the next few years without a doubt," said Simon Harris, a senior IMS analyst. "The companies that don't have good product offerings for (Internet) network surveillance are going to lose market share." In a sign of the market's growth, the organizers of last week's Computex computer trade show in Taipei set up a security pavilion for the first time, populated by about 25 vendors. Systems ran the range from simple configurations allowing parents to check on their children, to 16-camera networks providing multi-point remote surveillance of office buildings. Broadband-based systems Extra bells and whistles included cameras controlled via the Internet to scan a room, systems that trigger remote alarms when motion is detected, and ones whose views are accessible over cellphones and wireless personal digital assistants (PDAs). Such systems offer the advantage of relative affordability, since they use existing broadband infrastructure. Off-the-shelf software-equipped cameras cost just US$200-$300 apiece, said vendors at Computex, most of them smaller firms. More consumer oriented models, such as the Linksys model, can cost even less. Broadband-based systems are also more easily integrated with related systems that regulate functions such as access control, said Jill Chu, a sales specialist with G-Star Communications Inc. A drawback is the complexity of setting up systems, said Jin Whan, a product engineer at 3JTech Co Ltd. "The configuration is the hard part, but once you get that figured out the operation is easy," he said at Computex. For that reason, most of 3JTech's biggest customers so far have been specialty security companies, such as Napco Security Systems Inc, a supplier to Tyco International Ltd's ADT Security Systems Inc. "Sales are picking up gradually," Whan said. "There's more and more people asking for IP cameras. The technology is getting more accepted because people are moving to the Internet more." ---------- http://www.cnn.com/2004/TECH/internet/06/07/broadband.cameras.reut/index.html [Non-text portions of this message have been removed] 8860 From: Date: Wed Jun 9, 2004 1:35pm Subject: Latest News Article - FreeRealTime.com IPIX Surveillance Systems Used for Security and Logistics at 2004 G8 Summit Full-360 Degree CommandView Security Cameras Protecting G8 Dignitaries and Viewed by Multiple Security Agencies OAK RIDGE, Tenn., Jun 9, 2004 /PRNewswire-FirstCall via COMTEX/ -- IPIX Security, a premium supplier of video surveillance technology, today announced its Full-360 degree video surveillance systems are deployed for multiple applications at the 2004 G8 Summit. "IPIX(TM) is a huge asset for us," said Spencer Geissinger, Deputy Executive Director of the 2004 G8 Summit. "Homeland Secretary Tom Ridge designated the 2004 G8 Summit as a national security special event, which is the highest designation any event in the U.S. can be given. Events such as the Olympics, the Super Bowl and this Summit have received that designation. The enhanced security measures include IPIX CommandView(TM) security cameras, which are playing critical roles in protecting citizens and foreign dignitaries at the Summit. IPIX is an absolutely essential tool, and I'm confident that it will be used at summits and high security events in the future." "What's incredible about the IPIX technology is not only can you see the entire Summit Venue, you can pick something out and zoom in to further identify what it is, why it's there and if it's a threat. As a command and control tool it is phenomenal," said James Ramsey, Jr., Lt. Colonel, Retired, Chief Information Officer for the G8 and past Head of Communications for the White House. "Organizers of the G8 Summit installed multiple IPIX CommandView and IPIX CommandView360(TM) Cameras at critical locations including airports, landing zones and meeting rooms over a 120-mile area from Savannah, Ga. to Sea Island, Ga., site of the 2004 G8 Summit," said Jim Griffin, VP and General Manager, IPIX Security. "The cameras are being viewed on IPIX workstations by multiple security and logistics agencies, the Summit Planning Organization, national and international delegations and the U.S. Secret Service." About IPIX Security IPIX Security is a premium supplier of Full-360 degree video surveillance technology for critical government and commercial security applications. IPIX Security, using its patent protected technology, offers digital video surveillance systems that provide complete and continuous situational awareness by allowing users to see everything at the same time. Users can navigate within a live or recorded video scene in all directions using pan-tilt-zoom with no moving parts. IPIX Security video surveillance cameras provide superior image quality through the use of high-resolution multi-megapixel sensors operating at full video frame rates. IPIX Security is a business unit of IPIX Corporation (Nasdaq: IPIX) IPIX Corporation offers mission critical imaging where visual content is required for eCommerce and the protection of life and property. Learn more about IPIX's three business units (IPIX AdMission, IPIX Security and IPIX InfoMedia) at www.ipix.com. NOTE: IPIX, IPIX CommandView and IPIX CommandView360 are trademarks of IPIX Corporation. SOURCE IPIX Security CONTACT: Paul Farmer of IPIX, +1-925-242-4002, or CFO@i... URL: http://www.ipix.com http://www.prnewswire.com Copyright (C) 2004 PR Newswire. ---------- http://quotes.freerealtime.com/dl/frt/N?symbol=IPIX&art=C2004060900161p0081&SA=Latest%20News [Non-text portions of this message have been removed] 8861 From: James M. Atkinson Date: Wed Jun 9, 2004 2:23pm Subject: Steve Wilson Drug Bust According to the DEA looks like the U.S. Forestry Department may have been involved in the bust as well. They claim that he was also growing some really serious dope on National Forests, and that the had been on to him for some time. It also sounds like there was a huge civil forfeiture of all of his assets, house, vehicles, bank accounts, etc, etc. Should be interesting to see if he flips on his associates... including a number of people in the TSCM industry. A source with some knowledge of Wilson's business activities mentions that Wilson claimed to be working with Michael Hershman, currently the Chairman for Civitas Group and Allegent Technology Group: http://www.allegent.net/company_team.html At the time Hershman was CEO for DSFX (now part of Vance International), Wilson claimed he was supplying equipment and training for intelligence officers for House of Saud (Government of Saudi Arabia). Wilson claimed that he and Hershman's had ties to Mossad, and that DSFX was actually an Israeli owned company. If this is true it would mean that the government of Israel has a U.S. front company and is teaching technical intelligence to Saudi Intelligence officers (which would give the Israeli government a major advantage over the Saudi's). It is indeed a curious state of affairs. I will try to obtain the court documents to see what else they reveal, so far the court records reflect that he is/was penniless, that he was appointed free counsel, couldn't make bail, no one would sign for him, etc. and it sounds like he may push for a plea bargain (mentioned in other criminal proceedings). It sounds like the government has an extremely strong case against Wilson, and that they were forced to move early on him due to some kind of domestic situation. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 8862 From: savanted1 Date: Wed Jun 9, 2004 0:01pm Subject: Missing DEA Laptop Contains Information (7 June 2004) A Drug Enforcement Administration laptop computer is missing; it contains information on as many as 100 DEA investigations and on DEA confidential informants. An auditor in the Justice Department's Office of the Inspector General reported the laptop had been stolen three weeks ago; after further questioning, he changed his story and said that he accidentally damaged the machine and destroyed it and threw it in a dumpster because he was so embarrassed. http://www.msnbc.msn.com/id/5092991/site/newsweek 8863 From: contranl Date: Wed Jun 9, 2004 6:32pm Subject: . Have a look at these wonderful pictures of the latest "screening" fashion from the UK where the hype on "possible health effects" from their new wireless digital police networks called Airwave/Tetra has reached an absolut high. You may want to buy that hat for your wives birthday :) :) :) http://www.powerwatch.org.uk/sales/screen.htm Enjoy Tetrascanner www.tetrascanner.com . 8864 From: Charles Patterson Date: Wed Jun 9, 2004 8:21pm Subject: Re: Steve Wilson Jim, Your source of information may be misleading. >Seems that Steve Wilson was or is also a member of ERI/BECCA, and that some >of the membership was warmly embracing him, referring customers to him, I do not know Steve Wilson and have never met him, but I have been a member of Becca and then ERI since 1998. I have never ever seen Steve Wilson's name on any roster or membership list. I have never seen him at any ERI or BECCA meetings, I have never received any emails or other messages recommending him or his services. I do not even recall ever hearing his name mentioned at any meetings. Could a member have "warmly embraced" him on their own time? Sure, I wouldn't know, but that's none of my business and has nothing to do with ERI. regards, Charles Charles Patterson Global Communications Tarrytown, NY cp@t... ----- Original Message ----- From: James M. Atkinson To: TSCM-L Sent: Tuesday, June 08, 2004 3:27 PM Subject: [TSCM-L] Steve Wilson is in the Custody of the U.S. Marshall's I have confirmed that Stephen J. Wilson is in fact in the custody of the U.S. Marshall's Service, and is being held at the Greene County Jail (AKA: Greene County Detention Center) run by the Greene County Sheriff's Department. Their number is (423) 798-1800, and they can confirm that he is being held on behalf of the U.S. Marshall's. Seems that Steve Wilson was or is also a member of ERI/BECCA, and that some of the membership was warmly embracing him, referring customers to him, endorsing him, etc, etc even after some of the membership was warned at a criminal indictment was in Wilson's future. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 8865 From: Date: Wed Jun 9, 2004 9:03pm Subject: Re: Steve Wilson I just read Charles Pattersons note on a Steve Wilson.. I am as Charles a current member of ERI and was also a member of its predecessor BECCA. I have never heard of Mr. Wilson and as to promoting someone's business ERI does not do this as I know it. There are members of ERI that I have not met and some do not attend the annual conference in the DC area and if Mr. Wilson is a member or other I am not aware of it. Bill Rhoads From: Talisker Date: Sun Jun 10, 2001 3:58pm Subject: Re: Bug-blaster DIY Found it, don't shoot the messenger, I started reading it but was soon overcome by an attack of indifference Andy (talisker) http://www.iwar.org.uk/iwar/resources/senate/schriner.htm Statement of Mr. David Schriner before the Joint Economic Committee United States Congress Wednesday, February 25, 1998 "The Design and Fabrication of a Damage Inflicting RF Weapon by 'Back Yard' Methods" Note, this paper reflects the personal views and opinion of the author. The material in this paper has been deemed unclassified by those who hold his security clearances but it does not specifically represent their views. This paper is a very brief statement on the subject and it is written from a non-technical point of view to provide an easy look at the subject manner by non-professional people or groups. Further elaboration on any point can be requested in either a technical format or at a classified level with the proper security restrictions in place. For many years research activities in different countries have focused on the use of radio frequency (RF) waves as a weapon. Most of this work has been titled or described under the title of High Powered Microwave (HPM). Worldwide, large amounts of money have been invested in this technology to support both the military interests but also the industrial heating needs. Like most technologies, with maturity the applications increase and the costs to use it become lower. One primary point of this paper is that as these technologies mature they also become affordable and usable by criminals and terrorists. Most military programs are classified and the general public knows little concerning their nature but as the technology becomes available to criminals and terrorists, it may be directly applied to the infrastructure elements of our society. This paper addresses the question concerning the possibility of certain types of this technology being used against the society. The primary focus of this paper will be on a different and new form of HPM called Transient Electromagnetic Devices (TED) that could, in the hands of enemies, criminals, pranksters, or terrorists pose a significant threat to much of the United States infrastructure components that are based on micro-circuits and computer or micro-processor control. This includes financial institutions, aircraft, security, medical, automotive, and other critical equipment used everyday in our society. The systems necessary for the production of this form of energy are much easier to construct and use than the earlier and more well known conventional HPM narrow-band systems that are currently in development for military use. Millions of dollars have been spent on the conventional HPM, systems and it is the type that DOD managers and their funding offices are well acquainted with. This paper will briefly speak to these but the main focus of it will be on the very different type, the TED systems, which is less well known and may be the RF weapon of choice to the modern cyber or infrastructure RF warrior. Conventional HPM systems generate RF wavessimilar to those used for many different purposes including communications, heating, and radio location purposes. We are all very familiar with the term frequency as expressed in mega-hertz (MHz) when we tune our FM radios over the FM band from 88 to 108 MHz. Likewise with the AM radio band from .55 to 1.5 MHz. These expressions of frequency describe how many complete RF cycles occur each second from the radio transmitters that generate them. Radar systems also generate RF signals but these are in thousands of MHz each second (the term Giga-Hertz or GHz applies). This is the type of signal that conventional HPM systems generate or radiate, a sine wave. TED systems do not generate a sine wave and operate entirely differently than narrow-band systems. Narrow band HPM systems are similar to microwave ovens in that they use high powered sine waves to cause material placed in their field to generate heat. This is exactly what narrow band HPM systems do, they attempt to use extremely high powered RF sine waves to cause a target system to burn out. Other types of HPM use high powered, but conventional wave-like signals to enter a target system and cause some of the conventional effects that a jammer or countermeasure system might. All of these narrow band HPM systems employ sine waves that are very different than the signals generated and radiated and employed by the TED systems. RF power is expressed in Watts and one million Watts is expressed as "megaWatts" or MW. A kitchen microwave oven, for example, uses a magnetron tube to produce a continuous wave (CW) .5 to 1 MW RF signal to provide energy to heat the material placed in its presence. In a simple way of describing the heating, the powerful microwave signals cause the molecules of the material to rub together at the frequency generated by the magnetron and heat results in the material exposed to the field. Materials such as meat, many materials containing carbon molecules, and even water heat well when placed in such a field. Many industrial heating applications require considerably larger power levels than the home microwave oven but the basic principles are the same. It is with this view of microwave heating that we have the first notion of the use of microwaves as a weapon. One assumes that if a microwave signal of extremely high power level is aimed at a distant target of some type, then heating and perhaps burnout of some part of the target would occur. If the signal was tuned to the operating frequency of a targeted radio receiver, for example, one would assume that if enough power was provided in the radiated beam directed at the target's radio antenna, that the radio's "front-end", that part directly connected to the antenna, could be heated sufficiently to burn it out. The key here is whether there is an entry point for the high powered signal to enter the targeted system and whether there is enough power to cause burnout. The community involved with HPM systems generally describes a "front-door" and a "back-door" entry point. A front-door point might be, as in the above example, an antenna normally used by the target platform, such as an aircraft or a tank, for some RF function such as communication or radar. Here the RF weapon designer would attempt to radiate an RF signal into the target platform's antenna and cause either a burnout or a disruption effect. A back-door entry point might be an unshielded wire at some point on the targeted platform that would allow the RF weapon signal to enter some part of the platform's electronic systems and, as before, cause a burnout or disruption of some sort. The weapon designer would like to have a priori knowledge of the target so as to select the right frequency and use the right modulations to accomplish the desired result. Since this extremely high-powered RF generation technology also fills the needs of industrial heating applications, essentially very high powered microwave ovens, there is a universal worldwide need for the technology and export controls are confused when it comes to the possible use of this technology as a weapon. The New Kid on the block, the Transient Electromagnetic Device (TED): There is a new type of source technology currently under development in our country and, very likely, other countries as well. This type of directed RF energy is quite different than the narrow-band systems previously described. This type of directed energy is called transient electromagnetic radiation. Instead of generating a train of smooth sine-waves, as the conventional narrow-band systems do, it generates a single spike-like form of energy. This spike-like burst of potential does not have "cycles" or waves and it may be only one or two hundred pico-seconds (psec) in length. 100 psec is the time that it takes light to travel 1.2 inches and often these short time duration puoses are described in "light-inches". It is very similar to the type of signal that occurs when you rub your feet on the carpet on a dry day and then touch your computer keyboard. An electrostatic discharge (ESD) occurs when you do this. The electrostatic charge on your body discharges onto and into the computer and a very brief amount of very high current flows quickly from your finger into the computer circuits causing a momentary break in the normal flow of signals and bits of information. Because of this momentary break in the "bit-flow" the ESD may cause the computer to crash and in some cases it may cause sensitive electronic circuits to be actually damaged to the point where they are non-functional and must be replaced. This vulnerable item may be just a single semiconductor diode in a single integrated chip in a circuit on the motherboard, and there are hundreds or thousands of these in a desk-top computer. It is often economical to simply replace a whole circuit board of components rather than trying to find the one specific circuit and replacing just it. This type of new weapon source, a transient electromagnetic device (TED), is actually a system that radiates an ESD-like signal that is intended to cause a similar responses, as just described, to the targeted system. Let us look at the differences between narrow-band (NB) and TED HPM systems. The NB systems generate sine waves, the TEDs don't. The NB systems are very costly and go to great lengths to generate very high average powers, the TEDs don't, the NB systems are very complex systems, the TEDs are not, the NB systems generate very high average powers (microwave heating), the TEDs generate very high peak powers (and are poor RF heaters). They both use an antenna and the larger it is, the more power they can radiate, in a narrow focused beam, at the target. In a narrow-band HPM device, high technology vacuum tubes are used that are, in some ways, very similar to those used in our highest-powered TV or FM stations and radar systems. They are very delicate devices, are complex, and very expensive. They require large amounts of primary power and generally require some type of cooling system, either air blowers or liquid types. All of this complexity requires complex engineering and development, and the manufacturing time is great and costly. Not for the amateur or a low-cost, start-up operation. Generally a highly skilled team of various technical experts of numerous engineering specialties is required to manage the development and operation of such devices. TEDs, on the other hand, are relatively simple devices that generally use simple spark-gap switches, either in oil or in pressurized gas pulse storage lines. The power supplies are relatively small in size and much lower in average power and cost than for the NB systems. The engineering and mechanical issues are small in comparison to the narrow-band devices. The technology is well described in the various professional Pulse Power references found in good technical libraries. The significant development, engineering, and manufacturing costs are small in comparison to narrow band. Most of the technology required is available and is an outcrop of the various nuclear and flash x-ray work done in the past. NB systems operate at some given frequency with a small bandwidth, and you will find them at one spot on the radio dial. The TEDs do not even have a definable frequency but instead, because of their short time duration, they occupy a very large spectrum space, and you will find it everywhere on every radio dial. When a TED pulse is generated it will have the ability to excite responses in systems designed to receive at any frequency from as low as 100 MHz up to several GHz, from the FM band up to the lower microwave bands. A NB system would excite only those systems that were operating at its frequency, say 2.345 GHz, so a narrow band system must be "tuned" to a given target's known soft spot but a TED system would go after any soft spot of the target platform, back-door or front door. So what is the bottom line of this discussion? Because of the simplicity of TED systems and the suspicion that they may cause disruptive effects to electronic systems that they are aimed at, they make an attractive approach for RF terrorists to use for various purposes. We see hints of this vulnerability in the many warnings that we get each month about locations where we should not use radios and electronic devices for fear that we will do some damage to something. They make passengers on aircraft, during take off and landing, turn off radios, games, and other electronic devices. Hospitals regularly place signs that electronic devices are not allowed. Many people do not want you using your cellular telephones near their computer. Many repair shops require that wrist-bands attached to ground be used when opening electronic equipment for repair. We have a lot of things out there in the world that either have known or suspected vulnerabilities to RF fields or electrostatic discharge. A TED system provides both of these conditions, an RF electrostatic discharge nature and its output (the number of pulses per second) can be adjusted for maximum disruptive effect. Its peak power output can be made much higher than those fields ordinarily found in everyday systems like cellular radios, radar systems, TV and FM stations, and simple ESD effects. It clearly appears, based on testing that has been done as well the information presented at unclassified technical papers and conferences, that the TED would make a good terrorist RF weapon and that, with the proliferation of high technology infrastructure systems that are integral to everyday life in our country, we would be very vulnerable to such systems. It is also clear, because of the extreme cost of repairing all of the vulnerable systems, that until this vulnerability was shown, no one would have much concern or interest in it. Considerable discussion and innuendo has recently been made concerning the possibility of building a TED source using "back-yard" methods, a Radio Shack Terrorist RF weapon. Such a system would have to have sufficient power to, with some degree of probability, cause detrimental effects to common infrastructure items such as those found in; financial institutions (banks, ATMs, and stores), medical facilities, airport facilities, general transportation items (auto engine controls, ABS, air-bags, etc.), utility facilities (telephone exchanges, power grid controllers), and other infrastructure entities. This type of source is imagined to be what a criminal, terrorist, or prankster could develop or build in a reasonable time, with reasonable tools and materials and with open literature or reference material. The accomplishment of such an effort would require that either some sort of estimate of what power level would be necessary to accomplish a given objective or to simply make all of the power that could be made, and then go out and test the weapon against various target items under either controlled conditions or actual attempts against a family of established targets. Since it is an extremely complex process to even come close to some predicted level of vulnerability, using even the most advanced modeling and analysis techniques, the obvious approach would be to "go for the maximum power and then test" approach. Normal testing would be done under strict safety and security conditions but a terrorist would not have such limitations. Normal tests would be conducted at a test location but a terrorist would simply drive around the block or building until something happened. An important criteria for an RF terrorist would be that any of the parts and materials used would have to be those that could be easily found in any city and were not traceable by conventional counter-terrorist agencies such as the local police, insurance investigators, and FBI. It is clear that there are four basic configurations that could be used, one the size of a briefcase that could be placed very close to a target system (like a computer at a desk or counter), one that could be mounted into a small van and disguised to appear as ordinary, one that was dedicated to be set up at a remote target location and used for some purpose where appearance was not of any concern, and finally, a system that could be located in one's back yard such that it could be aimed at over flying aircraft. The systems would likely have much in common and the builder would employ a learning curve to go to the next more advanced system. The results or vulnerabilities found with any system could be factored into the use of the next system. This learn-as-you-go process would be a natural approach for such an amateur effort. The means of manufacturing the system includes parts and tools that one could purchase at a hardware store or those found in an average garage shop. Tools such as a small lathe with an integral milling machine (available via mail-order at a cost about $2,000), drill press, and general garage tools should be all that were needed, nothing exotic. The effort would likely be started with the small briefcase-sized unit. It could use automobile ignition parts and a camcorder ni-cad battery for the power supply. It might use a small dish antenna bought mail-order and some parts picked up at a surplus store. The total cost of such a unit would be about $300 and it could be built in about one week. The development behind its design could be accomplished by doing some basic experiments with stun-guns or other high voltage components found in surplus stores, automotive shops, and parts from a "well equipped electronics junk box". The unit could easily be tested at close range to the type of computers and hardware found in any home office and if it caused some ill effect, then the terrorist would have proven the effectiveness of the system. Success with step 1. The next step would be to refine the technology and increase the voltage and the repetition frequency. An advanced design might use a 6-foot TV dish antenna that could be bought mail-order (for $200) and it might use a more advanced spark-gap unit than was used in the earlier model. Such learn-as-you-go is a natural process in the design of spark-gaps. Such a unit using a larger antenna (a mail-order 12-foot TV dish), when finished would look like a simple TV dish system and it (or many like it) could be mounted such that it could easily be pointed at over-flying aircraft. In support of the information presented in this testimony and taking advantage of the winter's need to work indoors, a unit that uses oil spark-gaps was designed, built, and tested. The materials for it were mail-ordered at a cost of about $500 and about one week was needed to fabricate the mechanical hardware. It use two ignition coils and a battery for power, an automobile fuel pump and filter for the oil circulation, and commonly available transformer oil. An additional week was required to work out all of the electrical wiring, the oil lines, and the general finishing details. This unit was ready for testing in two weeks after starting the effort. The signal radiated from the unit was measured and found to be a very significant power level that can be compared against available vulnerability and susceptibility levels of military equipment. When the weather permits, this unit will be tested against a set of infrastructure targets at an official test range. From the measurements and known signal levels, this unit is expected to be consistently deadly to many types of infrastructure items at ranges suitable for terrorist usage. This quickly-developed low-cost system could easily be placed in a small van and used in a parking lot or directed at buildings that the van was driven past. It is highly likely that this type of device would be a very effective terrorist system and the findings of its design could be factored into another either a larger, higher powered device, or a more advanced design each with significantly greater effectiveness. The net result of all of this design, experimentation, fabrication and measurement proves that such a weapon system could be made by anyone with an engineering degree or even a bright technician with good hardware experience. The technical information required can be found in open sources, if not just from good common engineering sense. The materials needed are nothing special and if the effort is made, advanced concepts can be made using everyday hardware such as automotive ignition systems. The testing to date has been very limited but the results of this testing have provided considerable insight to just what is vulnerable in infrastructure systems. This insight and work leads to a firm opinion that a terrorist would have little trouble developing such technology and that he would have a high probability of success in the use as an RF weapon against our infrastructure elements found in any city or near facilities around the country. This work has been done within the proper security guidelines since: The models made in my home laboratory/workshop used off-the-shelf materials and open-source references. The laboratory tests of this hardware were made in a controlled environment with the proper security in place. The results of these tests, the data capabilities, and the target set identities are kept in a facility cleared for classified storage. The development of any of this hardware is reported on a regular basis to those with whom I relate at a classified level to assure that they are informed of the work and are able to apply this to their interests and efforts if necessary. Any of this hardware can be used by them for any determination of utility to military interests. Work in this area will be continued and an aggressive test and evaluation of these "back yard" techniques and methods will be accomplished. This process will be done in cooperation, and if requested, under the direction of agencies with an interest in this non-military weapon related process. The author of this report will, if requested, provide to the Committee further details at a classified level in the proper security environment http://www.networkintrusion.co.uk Talisker's Network Security Tools List Security Tools Notification http://groups.yahoo.com/group/security-tools/join ----- Original Message ----- From: "Talisker" To: ; "A Grudko" Sent: Sunday, June 10, 2001 9:18 PM Subject: Re: [TSCM-L] Bug-blaster > Andy > > I think I may have killed to birds with one stone. Bird one = EMP, Bird 2 > = Echelon > > 1. I remember seeing an article on DIY HERF bombs Q3 last year, the fear > was that terrorists etc could use these to take out big chunks of cities > electronic infrastructure, I've done a quick search on google though and > can't find it. I'll dig through my mail later. > > 2. If echelon exists then I suspect my search would almost certainly have > got the cogs whirring, hang on my IDS just went beserk and there's a knock > at the door. > > > ;o) > http://www.networkintrusion.co.uk > Talisker's Network Security Tools List > > Security Tools Notification > http://groups.yahoo.com/group/security-tools/join > ----- Original Message ----- > From: "A Grudko" > To: > Sent: Wednesday, June 06, 2001 7:21 PM > Subject: [TSCM-L] Bug-blaster > > > > We appear to agree that EMP is pretty impressive, killing a high > percentage > > of discrete component devices & probably most 'bugs'. > > > > So how about creating a physical/biological non-destructive artificial > EMP? > > > > Typical application - I have a client that built an office block here. We > > were called in to sweep the building twice before it was completed and > once > > after. > > > > How nice to hit a 'kill' button in the first 2 stages. > > > > I have a feeling that the equipment box might have to carry a government > > health warning... > > > > Andy Grudko. D.P.M., Grad I.S, (S.A.) > > Grudko Associates - Crime investigation, intelligence and protection > > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > > Australia - Israel. Agents in 41 countries - www.grudko.com - (+27 11) 465 > > 9673 - 465 1487 (Fax) - Est. 1981 > > GIN (Charter), SACI (Pres), WAD, CALI, SAMLF, SCIP (Past SA Chairman), > > UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom - "When you need it done > right - > > first time" > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3183 From: Bob Washburne Date: Sun Jun 10, 2001 5:12pm Subject: Re: Web bug detector A "web bug" is an unnoticeable single pixel GIF. It is used to track your visits on the web. It, in itself, cannot do anything to or plant anything on your computer. When you load a page into your web browser it contains text only. Within the page may be references to other files. These are usually the graphics (GIF, JPEG,...) files. When your browser sees these references it then requests the additional files automatically. These file references don't have to be from the same system as the original page. In fact, they can be a full URL to anywhere else. That is how most banner ads are built, as references to the advertising site. The host site doesn't need to have anything of the advertising on their site at all. When a GIF file (banner ad) is requested, it can also contain an imbedded reference. These single pixel GIF's point to another site which your browser dutifully requests. The bug site simply records the destination address (it has to be told where to send the GIF, after all). There are databases out there which can (usually) map an IP address back to a person. What's the issue with being counted? Usually nothing. So what if you like to visit sites about electronics. But here is a more malicious scenario: Say a friend comes over and tells you how their brother has been diagnosed with HIV. Can you help find them a support group? You, being a concerned friend, show them how to use the Internet to find a wealth of information. Your activity is tracked and eventually your insurance company finds out that you visit HIV related sites. Your policy is summarily dropped without explaination. Bottom line, while the web bug is not currently illegal, it has the potential of being just as misused as the electronic kind. How do you defend agains web bugs? Use a filtering web proxie. http://www.junkbuster.comis what I use. It is freeware and filters out most banner ads and web bugs. While it causes the occational site to break, it does seem to increase the reliability of the browsers. They don't hang nearly as much when the ads are removes. Junkbuster compares all requests against a "kill list". Unfortunatly, the list comes empty and you must fill it. Or... http://www.waldherr.orghas a nice set of lists which are continuously updated. Hope this helped. Bob Washburne Dawn Star wrote: > > Anybody know what this website is about and what it does? I just don't have > time to check it out. Roger > > http://www.bugnosis.org/ > 3184 From: Dawn Star Date: Mon Jun 11, 2001 10:42am Subject: Wavecom Junior Does any one have a schematic and board layout diagram for the Wavecom Junior/ RF link 2.4 GHZ Video/Audio transmitter and receiver; before I go to the time and expense of generating my own. Thanks Roger 3185 From: The Dog's Bollix Date: Sat Jun 9, 2001 4:04pm Subject: Re: FW: Why are these files on a Dell? Hello, "spy" , in Windows programming terms, is a term used in reference to monitoring memory usage and process threads from outside a program or thread. Microsoft have a little utility that all windows developers are familiar with called spy32.exe, its the can't-live-without tool that lets you know exactly how your deveoped program is behaving in real life. DWSPYDLL.DLL , if unique to Dell, will more than likely be a library that provides an interface to the Bios. It could use somthing like this spyhooddll.dll to do a bios query when you go to Dell.com's support site and let those tasty little ActiveX controls have their wicked way with your computer. PLEASE NOTE : That is purely my speculation based upon previous experience. You should just forward on the DLL to a windows programmer, once loaded into the microsoft developer tools it is often very easy to see exactly what it is the DLL does.... i.e. you get back a list of function names and parameters. Other than that, remove it and see what doesn't work. Only do this if you know what to do if your computer won't boot normally. --- Steve McAlexander wrote: > > > -----Original Message----- > From: scorned@h... > [mailto:scorned@h...] > Sent: Tuesday, June 05, 2001 18:28 > To: focus-ms@s...; > security-basics@s... > Subject: Re: Why are these files on a Dell? > > > interesting. this will surely freak out the > conspiracy theorists who assert > that Dell is 0wned by the NSA. (and i wouldn't be > surprised either) > > why are you running an OS that is pre-installed by > Dell? the first thing > we do where i work is order hardware with nothing > installed, so we can > install > our own secure loadsets. if something arrives with > a pre-installed OS, > we wipe it and install our own. you might want to > consider building your > own secure loadsets. > > Regards, > kw > > >"Ed Kain" on 06/04/2001 > 03:22:50 PM > > > >To: focus-ms@s..., > security-basics@s... > >cc: > >Subject: Why are these files on a Dell? > > > >Hi everyone! > > > >This issue was recently brought to my attention > when i found DWSPYDLL.DLL > >in my C:\DELL direcotry on a new lattitude > notebook. This is from Desaware > >(http://www.desaware.com/SpyWorksL2.htm) and the > module is spyworks. > >The extended functionality that this DLL provides > is powerful, and made > >me wonder why it is part of default Dell software. > > > >This started me thinking, then I found other > interesting files, here's > >a list; > > > >02/12/1999 12:49p 124,416 CLEAREVT.EXE > //this clears my system > logs > >02/01/1994 11:25p 68,000 DWSPYDLL.DLL //this is > the spyhook dll i found > >01/09/2001 12:50p 40,960 KBWAKE.EXE > //keyboard init? > >04/13/2000 10:04a 20,480 REGCLEAN.EXE //name says > it all > >05/27/1999 11:29a 38,944 WDELTREE.EXE > //old dos style deltree > >12/01/1994 11:30a 7,508 WINBATCH.EXE //winbatch > compiler > > > > > > I contacted Dell customer support and > asked if they had remote > tech support > >software for administration, to which several techs > claim to never have > been > >trained if one existed, and none had heard of those > files in dell computers > > > >(their call center dell's didn't have these files). > > > > I'm curious, if anyone else using a Dell > product can confirm > the existance > >of these files, or hopefuly provide some insight as > to why they are > necessary. > > > > > >TIA > > > >ed. > Free, encrypted, secure Web-based email at > www.hushmail.com > > __________________________________________________ Do You Yahoo!? Get personalized email addresses from Yahoo! Mail - only $35 a year! http://personal.mail.yahoo.com/ 3186 From: Steve Weinert Date: Sat Jun 9, 2001 10:46pm Subject: Re: Scam warning Do you need a phone number or address? Whois for www.siin.com .com is the global domain of USA & International Commercial (Whois queries for .com domains can be performed at http://rs.internic.net/cgi-bin/whois) whois -h whois.crsnic.net siin.com Redirecting to NETWORK SOLUTIONS, INC. The Data in Network Solutions' WHOIS database is provided by Network Solutions for information purposes, and to assist persons in obtaining information about or related to a domain name registration record. Network Solutions does not guarantee its accuracy. By submitting a WHOIS query, you agree that you will use this Data only for lawful purposes and that, under no circumstances will you use this Data to: (1) allow, enable, or otherwise support the transmission of mass unsolicited, commercial advertising or solicitations via e-mail (spam); or (2) enable high volume, automated, electronic processes that apply to Network Solutions (or its systems). Network Solutions reserves the right to modify these terms at any time. By submitting this query, you agree to abide by this policy. Registrant: Spectrum International Investigative Network (SIIN-DOM) 1839-D west vista way #515 vista, CA 92083 US Domain Name: SIIN.COM Administrative Contact, Billing Contact: Ronald, Rhoades (RR10936) ninteach@A... Spectrum International Investigative Network 1839-D West Vista Way #515 Vista , CA 92083 760-639-5527 Technical Contact: Network Operations Center (NOC154-ORG) noc@I... INetU, Inc. 744 Roble Road, Suite 70 Allentown, PA 18103 US (610) 266-7441 Fax- - (610) 266-7434 Record last updated on 05-Jan-2001. Record expires on 30-Jan-2010. Record created on 30-Jan-1999. Database last updated on 9-Jun-2001 12:46:00 EDT. Domain servers in listed order: NS3.INETU.NET209.235.192.3 NS4.INETU.NET209.235.192.4 --- In TSCM-L@y..., "Andrus Aaslaid" wrote: > > They sell plans for time machines and perpetual motion machines > > (I am being figurative) and electronic kits. > > > > I ordered two electronic kits. > > > > /---/ > > > > The gentleman is known to be associated with numerous hacker > > groups, and he runs several websites devoted to electronic > > harassment via the web and extensive hacker resources. > > World works the funny way. Google web cache (http://www.google.com/search? q=cache:bvTE_pYI2TM:www.siin.com/contact.html+plans+% 26+kits+unlimited+vista&hl=en) shows the same venture providing also sweep services as Spectrum Investigations, http://www.siin.com/ ... This address has been removed from their active webpage, that is why I am referensing the cached content. > > Regards, > > Andrus. 3187 From: Ray Van Staden Date: Mon Jun 11, 2001 1:15pm Subject: ILLEGAL SURVEILLANCE IN SOUTH AFRICA WATER WORKERS' PHONES TAPPED Mail & Guardian 8 to 14 June 2001 by PAUL KIRK THE Mail & Guardian has obtained documentary proof that a cash-strapped parastatal organization, Umgeni Water, has illegally tapped the telephones of serving and past senior employees - as well as members of the National Education Health and Workers Union. The illegal telephone bugging operation was carried out at a cost of R51 000 - an amount that appears to have been entirely paid for by the taxpayer. The cost of the exercise is confirmed in a damning letter in the possession of the Mail & Guardian. Less than an hour after asking Umgeni Water for comment on the letter ñ and faxing a copy of it to Umgeni Waterís offices - an unidentified person phoned the Mail & Guardian and offered R5 000 in cash for all copies of the document. The caller, a male, refused to identify himself but asked to meet at the Pavilion shopping center in Westville. The letter is only a single page long and is a communication to Umgeni Water Chief Executive Cromet Molepo from his then lawyer Robinson Manzi of Robinson Manzi and Company. Headed ìTAPES IN YOUR POSESSION,î the letter is dated 29 November 2000 and confirms: ìthat our office paid R15 000 and R36 000 to Sibusiso on your instructions for the tapes in which some offices of employees under investigation were bugged.î The Mail & Guardian can reveal that ìSibusisoî is in fact Sibusiso Ncube, a former member of the SANDF who falsely claims to work for various large national security companies. The M&G could not locate Ncube in the week before going to press. After itsí shocking opening paragraph the letter then continues: ìIn terms of the law such bugging is illegalÖî The letter then exhorts Molepo to hand the tapes over to Manzi at once so they would be protected under attorney client privilege. When the M&G visited Manzi and showed him the letter he confirmed it to be an authentic document. Said Manzi: ìYou can write that you showed me the letter and that I verified it is in fact my signature on the letter and that it is a real document. Shortly after that letter was written I withdrew as the legal representative of Umgeni. I am not running the sort of practice that I need to accept any business at all. I do not have to tout for business from anyone.î Manzi told the M&G that he paid the telephone bugger with one of his practices cheques. Umgeni Water then issued a cheque in favour of Manziís practice to compensate for the chequ Manzi drew. The effect of this transaction was to hide the fact that Umgeni had paid for illegal telephone taps. It would also have effectively protected Umgeni Water from criminal prosecution. Manzi, as Molepoís legal counsel, could not legally have been forced to testify against Molepo or Umgeni Water had the matter been detected by police. Manzi told the M&G that, apart from Molepo, at least two other senior Umgeni Water officials had full knowledge of the telephone tapping. Omar Latiff, a member of the board of Directors had full knowledge of the operation as did Todani Moyo ñ a member of Umgeniís Exco. According to Manzi it was Moyo who in fact wrote the cheque to compensate his practice for having paid for the bugging. In terms of the Interception and Monitoring Prohibition Act of 1995 it is a serious criminal offence to monitor telephone conversations. In terms of this act permission has to be sought from a high court judge ñ or a retired high court judge duly authorized by the Minister of Justice ñ before a telephone can be tapped. Terrence Manase, a spokesman for the Department of Justice told the M&G that the act allowed for various penalties to be handed down on transgressors, depending on which clauses of the act were broken. The lightest, and most likely penalty, would be a fine of R20 000 and/or two years in jail. Said Manzi: ìIf Molepo, and some other figures, are not prosecuted for this it will be a complete mystery to me. They have broken the law.î Manzi told the M&G that Sibusiso claimed that the telephones were tapped by paying Telkom employees to attach listening devices to the lines of those to be monitored. Telkom spokesman Ed Tillet told the M&G that in the past his organization had taken action against employees for illegally tapping telephones on behalf of private investigators. Tillet was not in his office at the time of going to press and could not confirm how many such cases are on record. Well known Durban private investigator, Raymond Van Staden, who runs one of the most technologically advanced surveillance countermeasures companies in Southern Africa told the M&G that, while he would never bug a telephone illegally, many other operators would. A trawl though the internet revealed three South African companies openly offering to bug telephones. Van Staden told the M&G that it is a common practice to bribe Telkom employees to monitor telephones. Unlike the movies, very few bugs are hidden in telephones. Instead they are attached to telephone lines between the telephone and the exchange. Said van Staden: ìInformation is valuable and anything that is valuable is liable to attract thieves. Information theft is one of the major growth areas of crime. I find around two to three illegal monitoring devices every year." Van Staden said that most bugging operations were conducted by unscrupulous private investigators acting in partnership with rotten Telkom employees. Said Van Staden: "We are not dealing with a large number of Telkom operators, just a small rotten core of them. The problem is they are very hard to catch out as they know exactly where to hide bugs along the telephone lines. And the problem is getting worse. A few years ago my company detected maybe a bug every 18 months, now we find two or three every year." The names of at least four individuals whose phones were illegally tapped are known to the Mail & Guardian. One is a senior shop steward of Nehawu. Nehawu has repeatedly called for a detailed investigation of Umgeni Water by the Scorpions, the Office for Serious Economic Offences and the Public Protector. Nehawu has repeatedly alleged massive corruption on the part of Umgeni Waterís senior management. Some years ago Umgeni Water outsourced their treasury operation to a company called Specialised Outsourcing. It soon came out that certain members of Umgeniís board held shares in Specialised Outsourcing. This contract became the subject of an internal investigation which eventually led to the contract being scrapped. Since then Nehawu has been calling for a thorough probe of Umgeni by law enforcement agencies. Management on the other hand have been investigating several former and current senior managers following various allegations. This week the M&G obtained copies of Umgeni Water management meeting records which seem to show rampant mismanagement and corruption. In one instance Brian Wallet, the chairman of the board of Umgeni, and two others admit to having concealed the theft of R600 000 by a senior financial director. In another instance Umgeni admits to having paid nearly R1 million to a contractor ìby mistake.î Finally in another instance Omar Latiff, a member of the Umgeni Board, is revealed to be the director of a graphic design company that has been awarded Umgeni contracts. SInce the investigation began Molepo has claimed his life is under threat. Umgeni Water recently spent a whopping R250 000 on a new burglar alarm for his home. * A list of questions with regard this story were faxed to the Pietermaritzburg offices of Umgeni Water. These were marked for the urgent attention of Cromet Molepo. His office confirmed their receipt but had not responded at the time of going to press. --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 3188 From: Ryan Huggins Date: Mon Jun 11, 2001 3:19pm Subject: Re: Web bug detector Another good web bug filter is WebWasher (webwasher.com). It filters out banner ads and web bugs (fully configurable). It is a stand alone program that works like a proxy server, allowing only the urls you want to be referrenced. It has a good built-in "Kill-List". On the issue of web bugs, I use them on my main entry page. It's a "hidden" 1 pixel image, or did I do it with width & height = 0? Anyway, my bug is hosted by SiteMeter.com, and to let you know the data it tracks; page views, visits, time zones, os, browser, png graphics, javascript, dhtml, entry pages, exit pages, referrer, domain (ca.us,.com...), visits by last day/month/week/year, and it projects the amount of people to come through. I thought I'd let you know what mine tracks, so that you may know that it is harmless. It also can't trace an IP back to it's owner. Let's face it though, most IPs would go back to some Prodigy or AOL company server anyways, they wouldn't say "Joe Schmoe visited the site today" The only way (I know) to get that info, is if it can be gotten from the browser's user name info by JavaScript (along with the IP address), and then saved to a file. If you want, sitemeter has a free demo on their site. Check it out, not all bugs are used for malicious purposes. Ryan P.S. I'm hosted through Yahoo, and they only give you date, time, IP, file accessed and file code (200, 404...). That's why I use bugs. > -----Original Message----- > Date: Sun, 10 Jun 2001 10:59:39 -0700 > From: Dawn Star > Subject: Web bug detector > > Anybody know what this website is about and what it does? I just > don't have > time to check it out. Roger > > http://www.bugnosis.org/ 3189 From: James M. Atkinson, Comm-Eng Date: Tue Jun 12, 2001 3:24am Subject: Expert: Foreign spies serious threat to U.S. Expert: Foreign spies serious threat to U.S. http://wnd.com/news/article.asp?ARTICLE_ID=23168 Recently convicted Cuban agents just tip of espionage iceberg By Toby Westerman C 2001 WorldNetDaily.com A 30-year veteran of the intelligence field says most Americans "almost ignore ... the power of intelligence and counterintelligence" in this country, despite the danger foreign intelligence agents pose to the nation's security. In an exclusive interview with WorldNetDaily, David Major identified the use of counterintelligence as a "serious" public issue for the United States. If a nation "chooses not to invest in good security - counterintelligence," said Major, "it simply makes it easier for the collector [foreign intelligence agents]." Although espionage activities are carried out against the Unites States "every single day," Americans, according to Major, "have a love/hate relationship" with counterintelligence, which people "never really see. ... It's just something that's in Hollywood; its something in a book - but it never really happens." Major, an FBI veteran who was a member of Ronald Reagan's National Security Council, is now dean and professor of the Centre for Counterintelligence and Security Studies, a non-governmental center committed to counterintelligence and security education. The Centre and their professors - former intelligence officers in the FBI, CIA, DOD and KGB - provide advanced counterintelligence and security training for the U.S. government, the intelligence community and private-sector companies. The Centre offers several programs to acquaint the public with the unfamiliar world of spies and counterspies, including its unique SpyCruise, which will be offered March 2002. Revelations from the case of Robert Hanssen and the Wasp Network trial have publicly exposed the vulnerabilities of the U.S. to infiltration by foreign intelligence services. Hanssen, a 25-year veteran of the FBI, is alleged to have spied for the Soviet Union, and then Russia, for 15 years. If the allegations against Hanssen prove correct, the former FBI agent would be guilty not only of revealing U.S. secrets, but would also be implicated in the deaths of several individuals who were assisting the U.S. The six-month Miami Wasp Network trial involves accusations of Cuban-directed spying against U.S. bases, locating points for the importation of explosives into the U.S., Cuban government-sponsored terrorism and murder. Five Cubans were convicted of spying by a Miami jury yesterday. One spy was found guilty of contributing to the death of four Brothers to the Rescue members shot down by Cuban jet fighters in international airspace in 1996. Referring to the ambivalence some Americans have regarding counterintelligence, Major stated that there is "nothing evil about doing counterintelligence. ... Vigilance is very important." Major addressed the lack of media coverage given to the Wasp Network trial in Florida and the group's connection with the government of Cuban President Fidel Castro. Regarding evidence implicating the Cuban government with assassination attempts and murder, Major expressed surprise that "nobody talks about it. No one seems to mind that Castro is involved in this," yet the myth of the CIA as "the personification of evil" is spread throughout the world. "The United States doesn't do it (assassinations), and yet no one seems to mind that Castro is involved in this," Major said. "There appears to be no price to pay for Castro for implementing this kind of program, Major observed. "It shows you the aggressiveness of the [Cuban intelligence] service." "If you were to look at intelligence operations against the United States for the last 50 years, you'll not find one that has more intrigue, more complexity. ... It shows that the Cubans have all the toys," Major reflected. Major stated that intelligence services normally seek to have more than one source for information - "redundancy" - and the public revelations surrounding the Wasp Network may indicate "what else is going on that you don't see in the public domain." On the question of Cuba sharing its intelligence information gathered in the U.S. with "rogue states," Major responded, "I think the chances of that are extremely high." Cuban intelligence also hosts a super-sophisticated Russian spy base at Lourdes. "For what purpose" is the base, Major asked, "if Russia is the ally it says it is?" Major quoted one associate, a retired KGB agent, who stated that reform in Russia "is clearly slipping away." The Peoples Republic of China, another close friend of Cuba, represents a formidable counterintelligence problem for the U.S. In contrast to European and American methods of intelligence gathering, the Chinese government relies mainly upon those in sympathy with it to come forward and supply information. The Chinese, according to Major, do not use embassy personnel or seek to recruit agents in the same manner as the Americans and Europeans. Major's organization is striving to make the world of intelligence and counterintelligence understandable to the general public. The group's activities include a variety of training seminars on intelligence topics, and a "spy tour" of Washington, D.C. - examining the nation's capital the way a spy might do. Related stories: Media ignore Cuban espionage http://wnd.com/news/article.asp?ARTICLE_ID=23134 'Wasp Network' stung in Miami http://wnd.com/news/article.asp?ARTICLE_ID=21253 Spying on the spies http://wnd.com/news/article.asp?ARTICLE_ID=22818 --------------------- I.J. Toby Westerman, mailto:twesterman@w... is a contributing reporter for WorldNetDaily who focuses on current events in the Commonwealth of Independent States and the Balkans. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3190 From: David Alexander Date: Tue Jun 12, 2001 4:45am Subject: re; Hi-tech spy with the net curtains Having worked in many UK government buildings with the ubiquitous net curtains, I have to say that their purpose is much more mundane than that discussed here. They are very voluminous and long, much taller than the window height, and the bottoms are filled with lead weights. The idea is that if there is a bomb explosion they will billow inwards and help to absorb and contain any fragments of glass and debris blown in through the window. I don't think they are of sufficient density to have any effect on sound to prevent laser surveillance. I am sure everyone knows that the only proven method is a vibration device attached to the glass - or don't talk in that room ! regards David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 3191 From: A Grudko Date: Tue Jun 12, 2001 10:18am Subject: SA Gov. bugs staff If you like to keep such things for future reference, I'd have a newspaper article on an SA local Government department illegally phone tapping it's past and present staff, plus some comments. MS word, about 3 k. Andy Grudko. D.P.M., Grad I.S, (S.A.) Grudko Associates - Crime investigation, intelligence and protection Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom - "When you need it done right - first time" 3192 From: Robert G. Ferrell Date: Tue Jun 12, 2001 11:42am Subject: Re: FW: Why are these files on a Dell? >PLEASE NOTE : That is purely my speculation based upon >previous experience. You should just forward on the >DLL to a windows programmer, once loaded into the >microsoft developer tools it is often very easy to see >exactly what it is the DLL does.... I've got MS Visual C++ 6 Pro at home. If you want to ship the DLL to me there, I can take a look at it for you. rferrell@t... Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 3193 From: Date: Tue Jun 12, 2001 1:20pm Subject: Agencies Ask for Help in Cybercrime Agencies Ask for Help in Cybercrime By D. IAN HOPPER .c The Associated Press WASHINGTON (AP) - Law enforcement officials asked Congress Tuesday for more money and expanded powers to fight cybercrime, as they touted some recent successes. Michael Chertoff, head of the Justice Department's criminal division, said his staff wants higher penalties for computer criminals. He specifically cited the case of David Smith, who pleaded guilty to writing the 1999 ``Melissa'' virus. ``In that case, even though the defendant caused tens of millions - if not billions - of dollars of damage,'' Chertoff told the House subcommittee on crime, ``the maximum penalty was five years in prison.'' Chertoff also said police should have broader powers to investigate computer crimes, including an update to the wiretap laws that were written for telephones and have been translated clumsily to the Internet age. New wiretap laws are essential in tracking criminals who use the Internet, Chertoff said. He revealed that investigators traced e-mail messages connected to James Kopp, who was on the run for three years after being indicted for the death of an abortion doctor. Kopp was found and detained in France, where he is awaiting a decision on extradition to the United States. The FBI and Justice Department use a device called DCS1000 - once known as Carnivore - to monitor e-mail messages going to and from a suspect. The device has been under fire from privacy advocates and some legislators. Investigators have used electronic wiretapping to track fugitives, drug dealers, extortionists and computer hackers, as well as suspected foreign intelligence agents. Carnivore critic Alan Davidson of the Washington-based Center for Democracy and Technology told Congress that new laws should come in the form of privacy enhancements, not investigative powers. Davidson said the last ``significant update'' to privacy rules occurred in 1986, before the World Wide Web was invented. The outdated rules leave ``gaps and ambiguities'' that can lead to abuse, he said. ``Greater clarity and enhanced protection are needed both to promote public confidence in law enforcement,'' Davidson said, ``and to provide deserved guidance about what is and is not acceptable behavior for electronic surveillance and data gathering.'' Davidson said the best way to promote online security is to encourage the use of strong encryption by regular Internet users. The Justice Department has argued against that and called for the police to be able to decrypt a message with a court order. An official with the Secret Service described several cases it has worked on to illustrate different flavors of computer crimes. As part of the Treasury Department, the Secret Service investigates crimes against financial institutions. Without naming the victims, James A. Savage of the financial crimes division told legislators about a medical diagnostic service provider that suffered a ``catastrophic shutdown'' of its entire computer network in March. A former employee later admitted guilt. In February, two ``major wireless telecommunications service providers'' identified two hackers who got free long distance and other services, Savage said. While they only stole service, they had enough access to the network to shut down telephone service over a large area, including emergency 911 systems and government installations. Savage said an unidentified financial institution had its entire banking network shut down just two weeks ago. It could not control its ATMs, banking transactions or other functions. Again, a former employee admitted to disabling the system. Savage told lawmakers that the Secret Service is being swamped with ``desperate pleas'' from local police departments for training, assistance and equipment ``on an alarmingly increasing basis.'' On the Net: House Judiciary Committee: http://www.house.gov/judiciary Justice Department: http://www.usdoj.gov 3194 From: Dragos Ruiu Date: Tue Jun 12, 2001 8:55am Subject: U.S. supreme court limits high-tech surveillance url: http://www.wirednews.com/news/politics/0,1283,44444,00.html Can't Scan Without a Warrant By Declan McCullagh 2:00 a.m. June 12, 2001 PDT WASHINGTON -- If the feds want to spy on your home using whizzy tech gadgets, they'd better get a warrant first, the Supreme Court said on Monday. In an important 5-4 ruling that extends privacy's shield to radiation not visible to the human eye, the court said federal agents should have obtained a warrant before using an infrared imaging device to snoop on Danny Lee Kyllo, an Oregon man they later arrested for growing marijuana. The decision, written by conservative Justice Antonin Scalia, said even though the law has long allowed police to peer at homes through their naked eyes, enhanced cameras and similar devices in law enforcement hands "would leave the homeowner at the mercy of advancing technology -- including imaging technology that could discern all human activity in the home." This ruling seems likely to affect how federal and state police may use their rapidly-growing arsenal of advanced surveillance tools. In the Kyllo case, agents used an Agema 210 unit to detect unusual heat emissions from the halide lamps used to grow marijuana. Since the Interior Department's unlawful surveillance of Kyllo in January 1992, infrared and other forms of electronic monitoring devices have become far more invasive, and the Justice Department has spent millions of dollars in research on X-ray devices that can see through even brick and concrete walls. "Certainly optical performance has improved. And over the years thermal sensitivity has grown a lot greater," said Doug Little, spokesman for FLIR Systems of Portland, Oregon, which bought Agema in 1998. "Cameras are a lot more accurate now." FLIR no longer lists the Agema 210 on their website. Little says that police typically now opt for the MilCAM LE, a handheld infrared camera that weighs 3 pounds, costs about $50,000, and is advertised with this slogan: "Perpetrators can turn out the lights but they can't turn off the heat." The slender majority of the justices in the Kyllo case strongly reaffirmed the common law belief that a man's home is his castle, as described by Sir Edward Coke four centuries ago: "The house of every one is to him as his castle and fortress, as well for his defence against injury and violence as for his repose." That strident defense of privacy against government intrusion makes Kyllo "probably the most significant decision on the constitutionality of technologically-aided electronic surveillance in a generation," said Marc Rotenberg, director of the Electronic Privacy Information Center in Washington, D.C. Noting that the Court's majority decided that Americans inside their homes expect their heat signatures and other incidental emissions to be private, Rotenberg said that the case breathes new life into the Fourth Amendment "after its battering by overflight, nightscopes, dog sniffing and other techniques that courts have generally found do not violate the 'reasonable expectation of privacy test.'" Larry Lessig, a professor of law at Stanford University, agrees that the case is a landmark one -- at least, if the slim majority can prevent one of its side from defecting. "The question is how sustainable it is," Lessig said. "Given the range of these technologies and the minimal actual kind of invasion they present, the question is whether the court will be resolute in protecting this conception of private spaces instead of yielding to the temptation to allow (surveillance) of criminal activity." Since the Fourth Amendment prohibits "unreasonable" searches and seizures, it implicitly permits reasonable ones. In Kyllo, the majority wrestled with whether viewing a home with electronically-enhanced gear was even a search at all. Scalia concluded that "obtaining by sense-enhancing technology any information regarding the interior of the home that could not otherwise have been obtained without physical intrusion into a constitutionally protected area constitutes a search -- at least where (as here) the technology in question is not in general public use." Future technology, Scalia said, might even reveal "at what hour each night the lady of the house takes her daily sauna and bath." In a dissent, liberal Justice John Paul Stevens -- joined by conservative Chief Justice William Rehnquist, and swing-vote Justices Sandra Day O'Connor and Anthony Kennedy -- sided with the Justice Department's defense of warrantless surveillance, saying disparagingly that "the countervailing privacy interest is at best trivial." "Heat waves, like aromas that are generated in a kitchen, or in a laboratory or opium den, enter the public domain if and when they leave a building. A subjective expectation that they would remain private is not only implausible but also surely not one that society is prepared to recognize as 'reasonable,'" Stevens said. This decision could influence whether police need a warrant to capture radio frequency emissions -- a practice known as TEMPEST monitoring -- produced by CPUs and monitors. The minority said they dissented because the "observations were made with a fairly primitive thermal imager" that could only see rough heat patterns and no details -- but TEMPEST monitoring is reportedly far more precise. On a related note, the Justice Department is paying for research on projects that include the Radar Flashlight and the Radar-Based Through-the-Wall Surveillance System, which can detect the presence of people through wooden doors, concrete walls and brick buildings. 3195 From: Craig Snedden Date: Tue Jun 12, 2001 6:14am Subject: Fw: re; Hi-tech spy with the net curtains ----- Original Message ----- From: "Craig Snedden" To: "David Alexander" Sent: Tuesday, June 12, 2001 12:12 PM Subject: Re: [TSCM-L] re; Hi-tech spy with the net curtains > Oh dear! > > I'll expect the men in suits to come knocking at any day, just to prove > "echelon" is reality....... > > :-) > ----- Original Message ----- > From: "David Alexander" > To: "'Craig Snedden'" > Sent: Tuesday, June 12, 2001 11:37 AM > Subject: RE: [TSCM-L] re; Hi-tech spy with the net curtains > > > > Hi Craig > > > > Yes, you are right about room locations, etc, but I didn't want to go into > > too much detail for brevity and for fear of giving away knowledge not for > > 'public consumption'. > > > > regards > > > > David Alexander M.INSTIS > > Global Client-Server, Communications & Infrastructure Manager > > Bookham Technology plc > > > > DDI: 01235 837823 > > Mobile: 0779 988 1284 > > David.Alexander@B... > > > > > > > -----Original Message----- > > > From: Craig Snedden [mailto:craig@d...] > > > Sent: Tuesday, June 12, 2001 11:07 AM > > > To: David Alexander > > > Subject: Re: [TSCM-L] re; Hi-tech spy with the net curtains > > > > > > > > > Correct answer David. They are indeed "shard collectors". > > > > > > I suspect that U.S. & other NATO countries have the same > > > policy, but you > > > will find that areas designated for the "processing" > > > (including discussion) > > > of "sensitive" information either have no windows at all, or > > > are positioned > > > such (in most cases, remembering that in the U.K. a lot of Government > > > facilities have been in use for many many years, when the > > > most sophisticated > > > bug was the human ear) that access to the window, either > > > directly or by line > > > of sight is restricted in some way. > > > > > > Craig > > > ----- Original Message ----- > > > From: "David Alexander" > > > To: "'TSCM submissions'" > > > Sent: Tuesday, June 12, 2001 10:45 AM > > > Subject: [TSCM-L] re; Hi-tech spy with the net curtains > > > > > > > > > > Having worked in many UK government buildings with the > > > ubiquitous net > > > > curtains, I have to say that their purpose is much more > > > mundane than that > > > > discussed here. > > > > > > > > They are very voluminous and long, much taller than the > > > window height, and > > > > the bottoms are filled with lead weights. The idea is that > > > if there is a > > > > bomb explosion they will billow inwards and help to absorb > > > and contain any > > > > fragments of glass and debris blown in through the window. > > > I don't think > > > > they are of sufficient density to have any effect on sound > > > to prevent > > > laser > > > > surveillance. > > > > > > > > I am sure everyone knows that the only proven method is a > > > vibration device > > > > attached to the glass - or don't talk in that room ! > > > > > > > > regards > > > > > > > > David Alexander M.INSTIS > > > > Global Client-Server, Communications & Infrastructure Manager > > > > Bookham Technology plc > > > > > > > > DDI: 01235 837823 > > > > Mobile: 0779 988 1284 > > > > David.Alexander@B... > > > > > > > > > > > > > > > ============================================================== > > > ========= > > > > This e-mail is intended for the person it is addressed to only. The > > > > information contained in it may be confidential and/or protected by > > > > law. If you are not the intended recipient of this message, you must > > > > not make any use of this information, or copy or show it to any > > > > person. Please contact us immediately to tell us that you have > > > > received this e-mail, and return the original to us. Any use, > > > > forwarding, printing or copying of this message is strictly > > > prohibited. > > > > > > > > No part of this message can be considered a request for goods or > > > > services. > > > > > > > ============================================================== > > > ========= > > > > Any questions about Bookham's E-Mail service should be directed to > > > postmaster@b.... > > > > > > > > ======================================================== > > > > TSCM-L Technical Security Mailing List > > > > "In a multitude of counselors there is strength" > > > > > > > > To subscribe to the TSCM-L mailing list visit: > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > > > or email your subscription request to: > > > > subTSCM-L@t... > > > > =================================================== TSKS > > > > > > > > Your use of Yahoo! Groups is subject to > > http://docs.yahoo.com/info/terms/ > > > > The data contained herein is confidential. Unauthorised dissemination > > of the contents of this e-mail may be in breach of Criminal and Civil law > > and may lead to prosecution. > The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 3196 From: Craig Snedden Date: Tue Jun 12, 2001 6:13am Subject: Fw: re; Hi-tech spy with the net curtains ----- Original Message ----- From: "Craig Snedden" To: "David Alexander" Sent: Tuesday, June 12, 2001 11:06 AM Subject: Re: [TSCM-L] re; Hi-tech spy with the net curtains > Correct answer David. They are indeed "shard collectors". > > I suspect that U.S. & other NATO countries have the same policy, but you > will find that areas designated for the "processing" (including discussion) > of "sensitive" information either have no windows at all, or are positioned > such (in most cases, remembering that in the U.K. a lot of Government > facilities have been in use for many many years, when the most sophisticated > bug was the human ear) that access to the window, either directly or by line > of sight is restricted in some way. > > Craig > ----- Original Message ----- > From: "David Alexander" > To: "'TSCM submissions'" > Sent: Tuesday, June 12, 2001 10:45 AM > Subject: [TSCM-L] re; Hi-tech spy with the net curtains > > > > Having worked in many UK government buildings with the ubiquitous net > > curtains, I have to say that their purpose is much more mundane than that > > discussed here. > > > > They are very voluminous and long, much taller than the window height, and > > the bottoms are filled with lead weights. The idea is that if there is a > > bomb explosion they will billow inwards and help to absorb and contain any > > fragments of glass and debris blown in through the window. I don't think > > they are of sufficient density to have any effect on sound to prevent > laser > > surveillance. > > > > I am sure everyone knows that the only proven method is a vibration device > > attached to the glass - or don't talk in that room ! > > > > regards > > > > David Alexander M.INSTIS > > Global Client-Server, Communications & Infrastructure Manager > > Bookham Technology plc > > > > DDI: 01235 837823 > > Mobile: 0779 988 1284 > > David.Alexander@B... > > > > > > ======================================================================= > > This e-mail is intended for the person it is addressed to only. The > > information contained in it may be confidential and/or protected by > > law. If you are not the intended recipient of this message, you must > > not make any use of this information, or copy or show it to any > > person. Please contact us immediately to tell us that you have > > received this e-mail, and return the original to us. Any use, > > forwarding, printing or copying of this message is strictly prohibited. > > > > No part of this message can be considered a request for goods or > > services. > > ======================================================================= > > Any questions about Bookham's E-Mail service should be directed to > postmaster@b.... > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 3197 From: James M. Atkinson, Comm-Eng Date: Wed Jun 13, 2001 9:12am Subject: The Espionage Price Tag The Espionage Price Tag http://www.idg.net/ic_551538_1794_9-10000.html IDG 23:14 12-Jun-01 Now that the cold war is history, intelligence pros are turning their black-bag wizardry toward corporate targets-maybe even the likes of you. BY ALISON BASS JOHN NOLAN, A FORMER U.S. intelligence officer, took the call on a hot sticky day in July. It was from the CEO of a major consumer electronics company in California. He told Nolan that his company was working on a mysterious new technology that once launched, would change the face of his industry and double the company's revenue base. The CEO said he had taken "extraordinary security measures" to make sure no competitors found out about the new product. But just to make sure, he wanted Nolan, who had founded his own intelligence agency after retiring from the Department of Defense, to penetrate his company's fortifications and find out what his R&D group was working on, how much money was being invested and when the new product would be rolled out-all in 30 days or less. It took Nolan's crew about three hours of working the phones to John Nolan says he applies his intelligence background to help clients find flaws in their own defenses. find out that one of the company's senior managers had been out of the office for the past three months. So they staked out the executive's home and early one morning, tailed him as he drove to a nondescript building about 15 miles from the company's headquarters. An armed guard let the executive through. Nolan's people made no attempt to follow. Instead, they took down the license plate numbers of every car in the parking lot and ran those numbers against Web databases until they had the identities and after more digging, the work titles of every person who had driven to the facility that day. Posing first as pollsters and later as headhunters, Nolan and his crew covertly interviewed almost all of the key engineers involved in the project. They not only discovered what the top secret technology was, how much it cost to develop and when it would be launched. They also-and well within the 30-day deadline-gave the shocked CEO the names and contributions of six strategic partners in the project. Nolan, whose Huntsville, Ala.-based Phoenix Consulting Group is one of the best-known competitive intelligence (CI) firms in the business, says he only does the James Bond stuff to show companies their vulnerabilities. But according to Nolan and others in the field, a growing number of intelligence gatherers regularly transgress ethical and even legal boundaries on behalf of corporate clients both here and abroad. Such spooks-many of them former government spies who migrated to the civilian sector after the Cold War ended-will resort to every dirty trick in the book. They'll lie, misrepresent themselves, steal phone records and do anything they can to wiggle their way into your confidence. Perhaps even now they are shopping their specialized talents to your competitors. So, listen up and remember that forewarned is forearmed. The Espionage Price Tag Earlier this year, in a report to the European Parliament, a British investigator asserted that both U.S. and European companies routinely engage in corporate espionage. And many foreign corporations regularly receive help from intelligence-gathering networks in their own governments, which use the latest in information monitoring technology to keep abreast of supposedly private Web communiquÈs. According to the U.S. Chamber of Commerce, corporate espionage costs U.S. shareholders at least $25 billion a year in intellectual property losses. "The Internet has made it so much easier to gain access to information. It has actually made people and companies more open," Nolan says. "It's getting harder and harder to protect your assets from the bad guys." Consider, for example, the recent unpublicized case of a California biotech CEO who got a call from someone claiming to be a reporter from a foreign television company. The "reporter" wanted to interview him, and the CEO was happy to oblige. "One of his crew had a shoulder video camera, and they walked with the CEO around his R&D lab with the camera running," says Alan Brill, a senior managing director at investigative firm Kroll Associates who is familiar with this case. "They were able to steal a number of secrets by videotaping the equipment, the settings on the equipment, and papers and notebooks that were lying around. And this CEO was so busy trying to be a star that he never noticed what they were doing or validated who they were." Some companies, like the biotech CEO's, are at a competitive disadvantage because they are simply unaware of the spies among them. Others know what's going on but are afraid to take the steps necessary to protect themselves. "Most companies don't like to get embarrassed, and they don't want to risk the bad press that comes from doing the James Bond stuff," says Nolan, who worked for the Defense Department's intelligence agency for 22 years. "We can't even use the term counterintelligence with the business community; they think of torture and assassination when we use that term. So we call it competitive assurance." Competitive assurance may not involve torture. But it does sometimes involve lying or misrepresentation. There's the old headhunter trick, for instance, or A Ruse by Any Other Name Protect yourself against the devious tricks that some folks in the business employ (whether they'll admit to it or not) the potential investor who just has to know a company's R&D plans. The ruses are endlessly varied (see "A Ruse by Any Other Name," right), and what many executives may not realize is that they are perfectly legal. Lying to obtain information is not even cause for a successful trade secret lawsuit-unless the imposter has signed a nondisclosure agreement. Ironically, the only party who can legitimately be charged with a trade secret violation is, in many cases, the employee who unwittingly shared the crown jewels. "It's not illegal to misrepresent yourself," says R. Mark Halligan, an expert on trade secret law and a principal with the Chicago law firm Welsh & Katz. "And the pretext itself is not actionable." Making matters worse, many corporate executives have a faulty understanding of just how to go about doing the kind of intelligent intelligence gathering that will keep them one step ahead of the competition. While corporate CI units need to know the arsenal of dirty tricks competitors might use against them, specialists say they should also understand that good competitive intelligence can often be accomplished without resorting to such shenanigans. If you know what you're doing, they say, the information you seek about your competitor's plans can usually be obtained by legitimate "open source" means. "You don't have to do the Mickey Mouse stuff to get proprietary information," Nolan says. "We get that kind of thing all the time just by calling the right people, going through public records and putting the pieces of the puzzle together." That doesn't mean, however, that there aren't bad guys out there. CI insiders say that certain Fortune 500 companies regularly rely on subcontractors to do their dirty work. "The fact of the matter is there are independent contract relationships," says Halligan, referring to what happens when a CI firm turns around and hires a subcontractor to do the work they don't want to get caught doing. The subcontractor "comes back with a report, and [the contractor] doesn't really inquire how you got the results of that report. You can call that plausible deniability; the fact is the corporation's relationship is with the first person, not with any subcontractor he may have hired." Interview with the Vampire Marc Barry is one of the bad guys. He says so himself. A cocky fellow from Dorchester, a working-class section of Boston, Barry won't Marc Barry is a self-styled bad guy whose "highly manipulative" nature helps him unearth business intelligence. say how he learned to do intelligence work or which agencies he may or may not have worked for in the past. "I basically developed my skills working undercover for years against Asian organized crime networks that were manufacturing counterfeit stuff" is all Barry will acknowledge in a long phone interview from his office in New York City. But he readily confesses that people who do the kind of work he does have to be "highly manipulative" and "borderline sociopathic." (Barry is also quite friendly. After two brief preinterview phone conversations, he invited this reporter, a perfect stranger, to his loft in Manhattan to see his priceless collection of modern furniture.) Barry, who is a founder and president of a CI firm-C3I Analytics-in New York City, says he regularly uses false pretenses to get information on his clients' competitors. And he knows a lot of other intelligence gatherers who do likewise. "The Society for Competitive Intelligence Professionals [SCIP] claims that all of their members abide by ethical rules, that they do everything by open source," says Barry. "You know, information you can pull down from a company's 10K, patent searches, Internet searches, pollution permits, that sort of thing. But that's simply not true. And the reason I know this is because I have been hired by SCIP members to engage in some very dubious activity on their behalf." Barry claims he once (illegally) obtained the phone records of a West Coast defense contractor at the request of a prominent CI firm whose founder is on the SCIP's board of directors. "We do as much open-source stuff as anyone else-and if you know where to look, you can get a wealth of information without resorting to deception and trickery," he notes. "But when it comes to things like profiling a competitor's R&D-like finding out Pfizer's formula for a drug it's developing for arthritis-you're not going to get that without deception or trickery." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3198 From: Date: Tue Jun 12, 2001 10:13pm Subject: Supreme Court Ruling on Through-The-Wall Scanning Opinion: http://supct.law.cornell.edu/supct/html/99-8508.ZS.html --- http://www.wired.com/news/politics/0,1283,44444,00.html Can't Scan Without a Warrant JV 3199 From: Aimee Farr Date: Wed Jun 13, 2001 10:44am Subject: FW: Roundup of newspaper editorials on Sup. Ct thermal imaging ruling Also FYI, for those interested. ~Aimee ..... > -----Original Message----- > From: owner-politech@p... > [mailto:owner-politech@p...]On Behalf Of Declan McCullagh > Sent: Wednesday, June 13, 2001 9:12 AM > To: politech@p... > Subject: FC: Roundup of newspaper editorials on Sup. Ct thermal imaging > ruling > > > Background from Politech: > http://www.politechbot.com/cgi-bin/politech.cgi?name=kyllo > > --- > > No spying on heat waves > Jun. 13, 2001 05:57 ET > insidedenver.com/drmn/opinion/article/0,1299,DRMN_38_645263,00.html > > Privacy first > Jun. 13, 2001 05:42 ET > http://www.sptimes.com/News/061301/Opinion/Privacy_first.shtml > > Blinding high-tech snoopers > Jun. 13, 2001 05:18 ET > http://home.post-dispatch.com/channel%5Cpdweb.nsf/pd/86256A0E0068F E5086256A6900243C32?OpenDocument&PubWrapper=Editorial Supreme Court Jun. 13, 2001 05:00 ET http://www.freep.com/voices/editorials/ecourt13_20010613.htm Hands off the Fourth Amendment Jun. 13, 2001 04:15 ET http://www.washtimes.com/op-ed/20010613-560933.htm EDITORIAL: Spying and searches Jun. 12, 2001 06:57 ET http://http://www.lvrj.com/lvrj_home/2001/Jun-12-Tue-2001/opinion/16300320.h tml Scalia's right! Jun. 12, 2001 05:44 ET http://www.nj.com/editorial/ledger/index.ssf?/editorial/ledger/1385715.html -- UPI roundup of editorials: U.S. newspapers editorialize on court Jun. 12, 2001 12:14 ET http://www.vny.com/cf/News/upidetail.cfm?QID=193309 ------------------------------------------------------------------------- POLITECH -- Declan McCullagh's politics and technology mailing list You may redistribute this message freely if you include this notice. To subscribe, visit http://www.politechbot.com/info/subscribe.html This message is archived at http://www.politechbot.com/ ------------------------------------------------------------------------- 3200 From: James M. Atkinson, Comm-Eng Date: Wed Jun 13, 2001 8:31pm Subject: Top Spy Sir David Spedding Dies Top Spy Sir David Spedding Dies By Audrey Woods Associated Press Writer Wednesday, June 13, 2001; 8:56 p.m. EDT http://www.washingtonpost.com/wp-srv/aponline/20010613/aponline205643_000.htm LONDON -- Retired spy chief Sir David Spedding, once the real-life embodiment of James Bond's fictional boss "M," died Wednesday at the age of 58. The Foreign Office, which did not even publicly acknowledge the existence of the Secret Intelligence Service until 1994, said Spedding died after a long illness. After nearly 30 years as a spy, Spedding had been appointed in 1994 to head the service long known to thriller readers and the general public as MI6. He had been the youngest head of the agency since its founding in 1909. An expert in Middle East terrorism, Spedding was the first MI6 chief not to be a Soviet specialist, reflecting the post-Cold War shift of emphasis in the espionage agency. Spedding, who had studied at Oxford University, was recruited into MI6 in 1967 and attended the Middle East Center for Arabic Studies, near Beirut, Lebanon - once a training center for British spies. His postings took him to Lebanon, Chile, the United Arab Emirates and Jordan. In Chile, which was his only posting outside the Middle East, he was second secretary at the British Embassy from 1972 to 1974, a post that was then a prime cover position for spies. There was speculation that he would have been aware of a U.S. plot against the elected socialist government of Salvador Allende. CIA director George Tenet called Spedding "a tremendous friend, colleague and mentor not only for me but for all the men and women of the Central Intelligence Agency and the entire Intelligence community." "Sir David was a magnificent partner; together our nations fought the scourges of terrorism, destabilizing regional conflict, the proliferation of weapons of mass destruction, and international narcotics trafficking," the statement said. Spedding, like his predecessors, was known in government circles as "C," for Chief, the inspiration for "M," the creation of James Bond author Ian Fleming. Sir David invited Dame Judi Dench to MI6's Christmas lunch in 1998, after the actress, who has played "M" in recent 007 movies, expressed an interest in learning more about her real-life counterpart. Traditionally, "C" writes memos in green ink, and is the only member of the service who is allowed to do so. "C" is also the only MI6 member whose identity is made public, but Spedding discouraged the taking of his photograph. In "Who's Who" he listed his recreations as golf and reading, and gave a post office box as his address. The new "C", Richard Dearlove, was appointed in August 1999. The Foreign Office said Prime Minister Tony Blair and newly appointed Foreign Secretary Jack Straw were informed immediately of Spedding's death. "Sir David was a determined and effective leader of a service whose contribution to Britain's security and well-being has to be unsung, but is nonetheless substantial," Straw said in a statement. "I personally was very grateful to him for his continuing advice to me on various subjects even after his formal retirement," said Straw who as former Home Secretary had been responsible for police and security issues, as well as customs and immigration matters. Spedding, who was knighted in 1996, is survived by his wife, Gillian, and two sons. Funeral arrangements were pending. © Copyright 2001 The Associated Press -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3201 From: Dave Emery Date: Wed Jun 13, 2001 3:16pm Subject: Anybody know of a source for Anritsu MS-2670A manuals ? Does anyone out there have or know of a source for a service and an operations manual (or a good photocopy of one) for an Anritsu MS-2670A 1.8 ghz color LCD display spectrum analyzer with integrated tracking generator ? I am desperately seeking these manuals and Anrtisu claims the MS-2670A "is not supported by Anritsu Japan" and they have no manuals for it in stock in the US. This after several months of giving me the run around about the manuals. This spectrum analyzer is a close cousin to the commercial 3 ghz Antitsu MS-2661A (current model is a MS-2661C) and apparently was produced as a special for the US Navy GPETE program in response to a 1995 RFP. According to government records 512 of these were sold to the government between 1996 and Dec 1999. It covers between 1 khz and 1.8 ghz with a 10 hz minimum resolution bandwidth and fully synthesized tuning, integrated frequency counter with 1 hz resolution and 10 ^^ 7 accuracy (or better with an external standard) and a number of firmware features including color display, A/B traces, markers, bandwidth measurements, peak search and so forth. A number of these instruments seem to have shown up surplus recently, I saw two of them at Dayton and one was just sold on Ebay (Item 1603474567). A couple of dealers have advertised them as well. None of the sellers has had an available manual when I asked them. Someone must have a manual they are willing to sell or take to the local Kinkos copy and have copied - I will pay liberally for an original or good copy as the instrument I bought last january on Ebay isn't much use without the manuals since it needs calibration... -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 3202 From: Dawn Star Date: Thu Jun 14, 2001 0:36pm Subject: Manuals Message: 2 Date: Wed, 13 Jun 2001 16:16:35 -0400 From: Dave Emery Subject: Anybody know of a source for Anritsu MS-2670A manuals ? There are companies that just specialize in manuals. Go to: www.google.com and run manuals or equipment manuals and there are about a dozen companies. Roger 3203 From: Date: Thu Jun 14, 2001 0:12pm Subject: U.S. House leader presses FBI surveillance worries U.S. House leader presses FBI surveillance worries By Jim Wolf WASHINGTON, June 14 (Reuters) - House Majority leader Dick Armey may seek U.S. Justice Department budget cuts to curb the use of the FBI e-mail surveillance tool formerly known as Carnivore, a spokesman said on Thursday. "If necessary he would consider using Congress's power of the purse to pull the plug on Carnivore," said the aide, Richard Diamond. At issue is specialized software used by the FBI for court-authorized tracking of a criminal suspect's online communications with the cooperation of an Internet service provider. Unlike other court-ordered electronic surveillance tools, Carnivore, as it is still widely known, gives law enforcers access to the communications of all the service provider's customers, critics have charged. In a letter earlier in the day, Armey, a Texas Republican, urged Attorney General John Ashcroft to rethink the program, which he inherited from the Clinton administration. "I respectfully ask that you consider the serious constitutional questions Carnivore has raised and respond with how you intend to address them," Armey wrote. He cited a decision on Monday by the Supreme Court restricting drug-hunting police officers' use of thermal-imaging technology to peer inside a suspect's home unless they first obtain a warrant. The court's 5-4 ruling was a setback for the Justice Department, which had argued the use of a thermal imager to scan a home's heat patterns was not covered by Fourth Amendment guarantees against unreasonable search and seizure. As a result, Armey said it was reasonable to ask whether Carnivore "similarly undermines the minimum expectation that individuals have that their personal communications will not be examined by law enforcement devices unless a specific court warrant has been issued." Chris Watney, a Justice Department spokeswoman, said Ashcroft was "very concerned about this issue and is reviewing it." She said he would respond directly to Armey. Ashcroft, like Armey, is widely regarded as a strong advocate of privacy rights. He has been studying a Justice Department task force's report on possible changes to the system which the FBI has renamed DCS-1000, a name spokesman Paul Bresson said did not signify anything in particular. Watney said she had no indication when Ashcroft would decide what, if anything, to do about the system. The in-house task force was assembled by Ashcroft's predecessor, Janet Reno, under pressure from Armey and other lawmakers. 3204 From: Miguel Puchol Date: Thu Jun 14, 2001 5:13pm Subject: RE: Anybody know of a source for Anritsu MS-2670A manuals ? Hi Dave, We have an Anritsu office here in Spain, and they are usually quite nice. I can give them a try, but there is a slight chance that the manuals may be in spanish - I say slight because this type of equipment is usually handled by people with some knowledge of english. Another maybe is that the devices probably were sold only in the U.S., so... In any case, I'll give them a go tomorrow. All the best, Mike -----Mensaje original----- De: Dave Emery [mailto:die@d...] Enviado el: miercoles, 13 de junio de 2001 22:17 Para: tscm-l@yahoogroups.com Asunto: [TSCM-L] Anybody know of a source for Anritsu MS-2670A manuals ? Does anyone out there have or know of a source for a service and an operations manual (or a good photocopy of one) for an Anritsu MS-2670A 1.8 ghz color LCD display spectrum analyzer with integrated tracking generator ? I am desperately seeking these manuals and Anrtisu claims the MS-2670A "is not supported by Anritsu Japan" and they have no manuals for it in stock in the US. This after several months of giving me the run around about the manuals. This spectrum analyzer is a close cousin to the commercial 3 ghz Antitsu MS-2661A (current model is a MS-2661C) and apparently was produced as a special for the US Navy GPETE program in response to a 1995 RFP. According to government records 512 of these were sold to the government between 1996 and Dec 1999. It covers between 1 khz and 1.8 ghz with a 10 hz minimum resolution bandwidth and fully synthesized tuning, integrated frequency counter with 1 hz resolution and 10 ^^ 7 accuracy (or better with an external standard) and a number of firmware features including color display, A/B traces, markers, bandwidth measurements, peak search and so forth. A number of these instruments seem to have shown up surplus recently, I saw two of them at Dayton and one was just sold on Ebay (Item 1603474567). A couple of dealers have advertised them as well. None of the sellers has had an available manual when I asked them. Someone must have a manual they are willing to sell or take to the local Kinkos copy and have copied - I will pay liberally for an original or good copy as the instrument I bought last january on Ebay isn't much use without the manuals since it needs calibration... -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3205 From: Marcelrf Date: Thu Jun 14, 2001 9:50am Subject: New Radar Can Detect Weapons In A Crowd New Radar Can Detect Weapons In A Crowd Source: Palm Beach Post Publication date: 2001-06-12 Arrival time: 2001-06-14 It's faster than a speeding bullet, more powerful than an airport metal detector. And, ahem, it may even be able to see through your underwear. Meet the new radar-like device that can detect concealed weapons through clothing from up to 50 feet away. Like a "remote frisk," the device being developed by U.S. government engineers could be used by police to spot people in unruly crowds who may be carrying guns, knives, or even plastic explosives. Plans for the system come amid growing concern over domestic terrorism, while adding new fuel to the debate over the constitutionality of high-tech policing practices. "There's a certain voyeuristic aspect to this that just makes me uncomfortable," said Richard Smith, chief technology officer for the Denver-based Privacy Foundation. Indeed, a ruling Monday by the U.S. Supreme Court could influence the use of high-tech devices by law enforcement officials in the future. The justices ruled 5-4 in the case of an Oregon man whose home was searched after a federal agent used a thermal-imaging device to detect heat waves emanating from the building. Although police found that Danny Kyllo was using powerful lights to grow marijuana, the court majority agreed that they violated Kyllo's Fourth Amendment rights by using the device without first obtaining a search warrant. But defenders of the device say it would help police identify and capture potentially dangerous criminals before they have a chance to use their weapons. The device emits high-frequency electromagnetic waves that pass through clothing, but are reflected by dense objects. The device focuses the reflected radiation onto small silicon wafers, converting it into images that appear on a laptop computer. "It penetrates clothing quite well," said Erich Grossman, who is leading the research. "Some clothing, like leather jackets, is more difficult, but there's not much difference. We're really very confident that it will produce recognizable images." He said the device wouldn't harm a person's health or affect a pacemaker. Although a working prototype will likely be ready by the end of the year, U.S. officials say there are no immediate plans to deploy the system. -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 3206 From: Ray Van Staden Date: Fri Jun 15, 2001 5:01am Subject: Telephone buggerís wings clipped MAIL & GUARDIAN 15 TO 21 June 2001 Telephone buggerís wings clipped By Paul Kirk The high-profile owner of a Durban electronic shop was arrested this week on suspicion of illegally tapping the telephones of a major shipping company. Police say only three cases of illegal telephone tapping ñ including this weekís case ñ have been prosecuted since the new legislation was passed allowing for serious jail time for telephone buggers. People illegally tapping phones can be jailed for up to two years, and up to five years for disclosing information obtained from an illegal telephone tap. But although this is on the increase - with dozens of ex-Telkom technicians and out-of-work police offering bugging services - the law that prevents telephone tapping is so restrictive it severely hinders the investigation of crime. Andrew Brophy advertised in the Durban telephone directory that his business - the Spy Shop in the Durban pavilion - supplied electronic surveillance and bugging. In effect he was advertising that he was prepared to break the law. The Interception and Monitoring Act places enormous obstacles in the way of government agencies that may legally monitor telecommunications lines. Only an assistant commissioner of police, a major general of the South African Defence Force (SANDF) or a chief director of Intelligence services may approach a judge to request permission to monitor a telecommunications line. Permission may only be granted for crimes that are being committed over a long period of time, or if they are committed on an organised or regular basis. The only exceptions to these rules are crimes committed under the Drugs and Drug Trafficking Act, or crimes that may harm the economy. A copy of the October 1999 Law Commission report on the Act states that these conditions may be a serious defect to the law ñ as once-off murder, rape, or armed robbery would not be sufficient to justify a telephone ìbugî. The report reads: ìA matter which is alarming in South Africa is the large number of advertisements, sometimes in law journals, of private investigators offering to deliver services which include ëbuggingí. In view of the fact that only the [police], the SA Secret Service, the SANDF and the National Intelligence agency may be authorised to do interception and monitoring, the legality of monitoring by private investigators is questionable, especially in regard to instances of third party monitoring.î Brophy was one of Durbanís most high-profile advertisers. His arrest followed the employment of Durban debugging expert Raymond van Staden to check the telephone lines of a shipping company. Most telephone taps are not placed inside the home or office of a victim; instead they are connected to the street boxes to which telephone lines run. Bugs do not normally make any noise on a telephone line and as a rule cannot be detected without specialised equipment and training. Van Staden says bugs are most commonly in the form of specially modified small tape recorders with wires attached to the telephone line. A special adaptation of the tape recorder switches the device on as soon as the telephone is lifted. The small tapes can generally record one hour of conversation. According to police sources, the standard charge is R3 000 a week to monitor a telephone line. After Van Staden discovered the telephone box outside his clientís home had been forced open, he looked inside and saw the tell-tale signs of an illegal telephone tap. He then contacted Telkom and police and prepared to wait for the telephone bugger to return. To Van Stadenís amazement the two alleged buggers returned only minutes later to change the tapes in their monitoring device. Once Brophy opened the junction box, Van Staden pounced and made a citizenís arrest. Moments later police and Telkom officials arrived. After a detailed search the telephone ìbugî was found hidden among the tangle of wires in the junction box. Members of the police technical support unit searched Brophyís car. Brophyís driver, Thinus Delport, was arrested as well. The bug was removed for fingerprinting and a partial fingerprint was found on the small tape inside. Brophy was found to be in possession of tape recorders like the one found in the telephone box. Police also found a file in his car containing the business cards of most of Durbanís large security companies suggesting that Brophyís client base may have been significant. Brophy appeared in court and was Granted R2 000 bail on Tuesday. Van Staden said he suspected that industrial espionage may have been the motive for the bugging. Andy Grudko, the South African Council of Investigators, said although telephone bugging was on the increase, it was more widespread before the new Act was passed. He said the council was attempting to weed out illegal telephone tappers from the industry. --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 3207 From: Date: Fri Jun 15, 2001 10:45am Subject: TSCM Organizations & Conferences Are there any memberships/organizations that are specifically for TSCM specialist? What about conferences/expositions? Is there anywhere you can see the latest TSCM equipment? Looking for recommendations, I'm new to the field and trying to find out as much as I can. Thanks ahead for any info. 3208 From: James M. Atkinson, Comm-Eng Date: Fri Jun 15, 2001 3:44pm Subject: Telephone Bugger's Wings Clipped Telephone Bugger's Wings Clipped Mail & Guardian (Johannesburg) June 15, 2001 Posted to the web June 14, 2001 Paul Kirk http://allafrica.com/stories/200106140457.html The high-profile owner of a Durban electronics shop was arrested this week on suspicion of illegally tapping the telephones of a major shipping company. Police say only three cases of illegal telephone tapping -- including this week's case -- have been prosecuted since new legislation was passed allowing for serious jail time for telephone buggers. People illegally tapping phones can be jailed for up to two years, and up to five years for disclosing information obtained from an illegal telephone tap. But, although this crime is on the increase -- with dozens of ex-Telkom technicians and out-of-work police offering bugging services -- the law that prevents telephone tapping is so restrictive it severely hinders the investigation of the crime. Andrew Brophy advertised in the Durban telephone directory that his business -- the Spy Shop in the Durban Pavilion -- supplied electronic surveillance and bugging. In effect he was advertising that he was prepared to break the law. The Interception and Monitoring Prohibition Act places enormous obstacles in the way of government agencies that may legally monitor telecommunications lines. Only an assistant commissioner of police, a major general of the South African National Defence Force (SANDF) or a chief director of Intelligence Services may approach a judge to request permission to monitor a telecommunications line. Permission may only be granted for crimes that are being committed over a long period of time, or if they are committed on an organised or regular basis. The only exceptions to these rules are crimes committed under the Drugs and Drug Trafficking Act, or crimes that may harm the economy. A copy of the October 1999 Law Commission report on the Act states that these conditions may be a serious defect to the law -- as a once-off murder, rape or armed robbery would not be sufficient to justify a telephone "bug". The report reads: "A matter which is alarming in South Africa is the large number of advertisements, sometimes even in law journals, of private investigators offering to deliver services which include 'bugging'. In view of the fact that only the [police], the SA Secret Service, the SANDF and the National Intelligence Agency may be authorised to do interception and monitoring, the legality of monitoring by private investigators is questionable, especially in regard to instances of third party monitoring." Brophy was one of Durban's most high-profile advertisers. His arrest followed the employment of Durban debugging expert Raymond van Staden to check the telephone lines of a shipping company. Most telephone taps are not placed inside the home or office of a victim, instead they are connected to the street boxes to which telephone lines run. Bugs do not normally make any noise on a telephone line and as a rule cannot be detected without specialised equipment and training. Van Staden says bugs are most commonly in the form of specially modified small tape recorders with wires attached to the telephone line. A special adaptation of the tape recorder switches the device on as soon as the telephone is lifted. The small tapes can generally record one hour of conversation. According to police sources, the standard charge is R3 000 a week to monitor a telephone line. After Van Staden discovered the telephone box outside his client's home had been forced open, he looked inside and saw the tell-tale signs of an illegal telephone tap. He then contacted Telkom and the police and prepared to wait for the telephone bugger to return. To Van Staden's amazement the two alleged buggers returned only minutes later to change the tapes in their monitoring device. Once Brophy opened the junction box, Van Staden pounced and made a citizen's arrest. Moments later police and Telkom officials arrived. After a detailed search the telephone "bug" was found hidden among the tangle of wires in the junction box. Members of the police technical support unit searched Brophy's car. Brophy's driver, Thinus Delport, was arrested as well. The bug was removed for fingerprinting and a partial fingerprint was found on the small tape inside. Brophy was found to be in possession of tape recorders like the one found in the telephone box. Police also found a file in his car containing the business cards of most of Durban's large security companies -- suggesting that Brophy's client base may have been significant. Brophy appeared in court and was granted R2 000 bail on Tuesday. Van Staden said he suspected that industrial espionage may have been the motive for the bugging. Andy Grudko, of the South African Council of Investigators, said although telephone bugging was on the increase, it was more widespread before the new Act was passed. He said the council was attempting to weed out illegal telephone tappers from the industry. Copyright © 2001 Mail & Guardian. Distributed by AllAfrica Global Media (allAfrica.com). -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3209 From: James M. Atkinson, Comm-Eng Date: Fri Jun 15, 2001 4:50pm Subject: Re: TSCM Organizations & Conferences At 3:45 PM +0000 6/15/01, guzlo1@y... wrote: >Are there any memberships/organizations that are specifically for >TSCM specialist? What about conferences/expositions? Is there >anywhere you can see the latest TSCM equipment? Looking for >recommendations, I'm new to the field and trying to find out as much >as I can. Thanks ahead for any info. It's a really tough, and awkward question. 1) The TSCM industry is small with only a few dozen major players in the world operating outside of a government agency. Due to this the number of "hardcore TSCM'ers" is very limited, and will continue to be so for quite some time to come. Of course their are hundreds of government TSCM'er (who have to keep their head down), and ten times as many people working in the private sector with similar responsibilities. 2) There are over a dozen "Boy's Clubs" out there that cater to people who are also TSCM'ers, but they don't actually exclude non-TSCM'ers so you get clumped together and painted with a broad brush.. 3) Many of the organizations out there accept members and issue certificates so long as their check clears the bank (my dog has actually been formally certified to perform TSCM by one such organization). 4) Other organizations are so tight and restrictive with membership that they only let their own personal friends, or people their own age level join (some require you to be on medicare). Such organizations will let anybody join (felons, mental Patients, Con Artists, etc) join so long as an appropriate amount or brown-nosing and ass kissing is performed. 5) Some organizations which cater to Private Investigators accept TSCM'ers, but in reality TSCM has very little to do with PIs. TSCM is a highly specialized technical discipline much like that of a professional locksmithing, professional photography, and so on. Just because a PI owns a 35mm camera does not make him a wedding photographer, much the same way as just owning a gun does not make you a bodyguard. 6) There are also organizations which a TSCM'er can join which exist solely as a front firm to make the TSCMer appear more legitimate, but even a basic query on the organization by an investigator turns up its true purpose (which completely kills the TSCM'ers credibility). Join those organizations, mailing lists, and conferences which are appropriate to your technical disciplines, interests, and expertise. Then expand your memberships to include those areas where you share a mutual interest (ie: PI's, lawyers, etc), and then finally consider membership in something more specific the TSCM business (which does not yet exist). Over the past few years I have been repeatedly asked to create an organization strictly for "TSCM people" with a tiered membership system with educational, experience, and minimal equipment qualifications for each level. The only problem is that half the people insists on being grand-fathered in as part of the old boys network, and the other half are amused by the first group and refused to join any organization unless admission is controlled by a rigorous board examination. It all boils down to TSCM being a highly specialized technical skills that is of great value to a wide variety of clients. However, the number of legitimate TSCM people out their is very limited, an thus creating "an organization" for two dozen people simply isn't practical or cost effective. [...so ends the sermon] -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3210 From: Ray Van Staden Date: Sat Jun 16, 2001 5:09am Subject: Fw: Telephone Bugger's Wings Clipped I am responsible for arresting the 2 suspects. I charged them under following law in South Africa: THE INTERCEPTION AND MONITORING PROHIBITION ACT (ACT No. 127 OF 1992) part 2 (1) (a) and (b) of the act which states: 2. Prohibition on interception and monitoring (1) No person shall- (a) intentionally and without the knowledge or permission of the dispatcher intercept a communication which has been or is being or is intended to be transmitted by telephone or in any other manner over a telecommunications line; or (b) intentionally monitor any conversation or communication by means of a monitoring device so as to gather confidential information concerning any person, body or organization. Raymond VAN STADEN --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za ----- Original Message ----- From: "James M. Atkinson, Comm-Eng" To: "TSCM-L Mailing List" Sent: 15 June 2001 10:44 Subject: [TSCM-L] Telephone Bugger's Wings Clipped Telephone Bugger's Wings Clipped Mail & Guardian (Johannesburg) June 15, 2001 Posted to the web June 14, 2001 Paul Kirk http://allafrica.com/stories/200106140457.html The high-profile owner of a Durban electronics shop was arrested this week on suspicion of illegally tapping the telephones of a major shipping company. Police say only three cases of illegal telephone tapping -- including this week's case -- have been prosecuted since new legislation was passed allowing for serious jail time for telephone buggers. People illegally tapping phones can be jailed for up to two years, and up to five years for disclosing information obtained from an illegal telephone tap. But, although this crime is on the increase -- with dozens of ex-Telkom technicians and out-of-work police offering bugging services -- the law that prevents telephone tapping is so restrictive it severely hinders the investigation of the crime. Andrew Brophy advertised in the Durban telephone directory that his business -- the Spy Shop in the Durban Pavilion -- supplied electronic surveillance and bugging. In effect he was advertising that he was prepared to break the law. The Interception and Monitoring Prohibition Act places enormous obstacles in the way of government agencies that may legally monitor telecommunications lines. Only an assistant commissioner of police, a major general of the South African National Defence Force (SANDF) or a chief director of Intelligence Services may approach a judge to request permission to monitor a telecommunications line. Permission may only be granted for crimes that are being committed over a long period of time, or if they are committed on an organised or regular basis. The only exceptions to these rules are crimes committed under the Drugs and Drug Trafficking Act, or crimes that may harm the economy. A copy of the October 1999 Law Commission report on the Act states that these conditions may be a serious defect to the law -- as a once-off murder, rape or armed robbery would not be sufficient to justify a telephone "bug". The report reads: "A matter which is alarming in South Africa is the large number of advertisements, sometimes even in law journals, of private investigators offering to deliver services which include 'bugging'. In view of the fact that only the [police], the SA Secret Service, the SANDF and the National Intelligence Agency may be authorised to do interception and monitoring, the legality of monitoring by private investigators is questionable, especially in regard to instances of third party monitoring." Brophy was one of Durban's most high-profile advertisers. His arrest followed the employment of Durban debugging expert Raymond van Staden to check the telephone lines of a shipping company. Most telephone taps are not placed inside the home or office of a victim, instead they are connected to the street boxes to which telephone lines run. Bugs do not normally make any noise on a telephone line and as a rule cannot be detected without specialised equipment and training. Van Staden says bugs are most commonly in the form of specially modified small tape recorders with wires attached to the telephone line. A special adaptation of the tape recorder switches the device on as soon as the telephone is lifted. The small tapes can generally record one hour of conversation. According to police sources, the standard charge is R3 000 a week to monitor a telephone line. After Van Staden discovered the telephone box outside his client's home had been forced open, he looked inside and saw the tell-tale signs of an illegal telephone tap. He then contacted Telkom and the police and prepared to wait for the telephone bugger to return. To Van Staden's amazement the two alleged buggers returned only minutes later to change the tapes in their monitoring device. Once Brophy opened the junction box, Van Staden pounced and made a citizen's arrest. Moments later police and Telkom officials arrived. After a detailed search the telephone "bug" was found hidden among the tangle of wires in the junction box. Members of the police technical support unit searched Brophy's car. Brophy's driver, Thinus Delport, was arrested as well. The bug was removed for fingerprinting and a partial fingerprint was found on the small tape inside. Brophy was found to be in possession of tape recorders like the one found in the telephone box. Police also found a file in his car containing the business cards of most of Durban's large security companies -- suggesting that Brophy's client base may have been significant. Brophy appeared in court and was granted R2 000 bail on Tuesday. Van Staden said he suspected that industrial espionage may have been the motive for the bugging. Andy Grudko, of the South African Council of Investigators, said although telephone bugging was on the increase, it was more widespread before the new Act was passed. He said the council was attempting to weed out illegal telephone tappers from the industry. Copyright © 2001 Mail & Guardian. Distributed by AllAfrica Global Media (allAfrica.com). -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3211 From: James M. Atkinson, Comm-Eng Date: Sat Jun 16, 2001 11:01am Subject: The Wrong Way to Do Dirty Tricks http://www.wired.com/news/politics/0,1283,44567,00.html The Wrong Way to Do Dirty Tricks By Declan McCullagh 2:00 a.m. June 16, 2001 PDT WASHINGTON -- A startling report from the Minnesota Senate race provides a stunning example of American politics as tech-cluelessness combined with petty nastiness. Christine Gunhus, the wife of a U.S. senator who ran unsuccessfully for re-election in 2000, pleaded no contest last week to charges of using a pseudonym to unlawfully send e-mail messages that disparaged her husband's Democratic rival. To hear state prosecutors tell it, Gunhus -- now married to former GOP senator Rod Grams -- violated the state's criminal election laws. Gunhus reportedly posted as a left-wing activist angry at the liberal, pro-labor candidate Mike Ciresi, who promptly turned around and filed a complaint under the Minnesota Fair Campaign Practices Act after he lost the primary election. That would be unusual enough in itself, but this look at how not to write e-mail nastygrams underscores the risks of using technology you don't understand -- especially when it can reveal your identity: *Gunhus is accused of using a Hotmail account (Katie Stevens -- kylomb@h...) to send the disparaging mails, which talked about how Ciresi had represented corporate polluters and anti-union companies. But Hotmail includes an X-Originating-IP header that shows the IP address of the sender -- a problem if you're typing it from the opposing campaign's computer. *Prosecutors say they traced the IP address back to an AT&T WorldNet user that had repeatedly used the "Katie Stevens" Hotmail account by connecting from Gunhus' home number. (Guess Worldnet keeps Caller ID logs.) Apparently, the person using the "Katie Stevens" pseudonym was cautious at first, sending the mail from a Kinkos store, but then got sloppy. *The e-mail attacks included Microsoft Word attachments, which a Ciresi aide investigated. The aide found that Word listed the document authors as Grams staffers including -- you guessed it -- Christine Gunhus. *Democratic researchers reported finding Globally Unique Identifiers in the Word documents. The GUID includes the Ethernet MAC address. Prosecutors obtained a search warrant last August to seize Gunhus' computer, from which they could extract the MAC address if the Ethernet card was still the same. *Let's not forget the political risk. In an article in the Minneapolis Star-Tribune last year, the Grams campaign offered a remarkably narrow denial. A spokesman said, "We didn't put this together and send it out of the Grams campaign office," leaving open the question of whether it was sent by a campaign worker from another location. *And what about the legal risk to free speech? The Minnesota Civil Liberties Union argues that a criminal law that bans sending pseudonymous messages is unconstitutional. A Supreme Court decision, McIntyre v. Ohio Elections Commission, says that a prohibition on the distribution of anonymous campaign literature violates the First Amendment. Epilogue: Grams managed to derail his Democratic rival's primary bid, and Ciresi did not win his party's nomination. Even though Grams lost the general election in November, that hasn't halted his political ambitions. The Washington Times reported in April that Grams is said to be considering a challenge in 2002 to U.S. Senator Paul Wellstone, a liberal Democrat. - - - Fidel.com: Fidel Castro has no plans to launch a crippling "cyberattack" against the United States. An apparently pained Castro, insulted that he would be suspected of such an offense, insisted last week that his honor was beyond reproach. How could those running-dog-capitalists even imply such a thing? Though cyberattacks are out, verbal attacks are still muy bueno. Castro labeled the feds "orphans, and bereft of ideas," and the U.S. as "an empire that only knows lies," according to the Associated Press. In February, as we told you at the time, Admiral Tom Wilson, head of the Defense Intelligence Agency, told the Senate that the 74-year-old dictator may be preparing a cyberattack against the United States. "There's certainly the potential for them to employ those kind of tactics against our modern and superior military," Wilson said at the time. - - - Carnivore update: House Majority Leader Dick Armey is asking the Justice Department to rethink Carnivore. "I respectfully ask that you consider the serious constitutional questions Carnivore has raised and respond with how you intend to address them. This is an issue of great importance to the online public," Armey said last week in a letter to Attorney General John Ashcroft. Armey said that the Supreme Court's decision this week in the Kyllo infrared surveillance case raises more questions about the continued use of the FBI's monitoring system. - - - Assassinate this: Jim Bell may have been convicted of intimidating an IRS agent, but the world's most notorious crypto-convict remains undaunted. Bell sent Wired News a copy of his latest legal filings, which include a renewed attempt to fire his court-appointed attorney and a request for an appeal of his conviction to the Supreme Court. Bell is the anarcho-cypherpunk whose political propagandizing and authorship of the "Assassination Politics" essay drew the unwelcome attention of the feds and led to his conviction in April on two of five counts of stalking government agents. He couldn't persuade the Ninth Circuit Court of Appeals to overturn his ruling, so now Bell's taking his fight to the nation's highest court. A legal filing in U.S. District Court and the appeals court that Bell wrote from federal prison says that U.S. District Judge Jack Tanner "was essentially incapable of conducting any sort of complete, proper, 'by the book' hearing, from the looks of things." During the trial, Tanner denied all of Bell's requests for witnesses that Bell said would have illuminated unlawful surveillance on the part of government officials. Copyright © 1994-2001 Wired Digital Inc. All rights reserved. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From: James M. Atkinson Date: Mon Jun 10, 2002 7:53am Subject: The Donkey Story The Donkey Story One day a farmer's donkey fell into a well. The animal cried piteously for hours as the farmer tried to figure out what to do. Finally he decided the animal was old and the well needed to be covered up anyway, it just wasn't worth it to retrieve the donkey. He invited all his neighbors to come over and help him. They all grabbed a shovel and began to shovel dirt into the well. At first, the donkey realized what was happening and cried horribly. Then, to everyone's amazement, he quieted down. A few shovel loads later, the farmer finally looked down the well and was astonished at what he saw. With every shovel of dirt that hit his back, the donkey was doing something amazing. He would shake it off and take a step up. As the farmer's neighbors continued to shovel dirt on top of the animal, he would shake it off and take a step up. Pretty soon, everyone was amazed as the donkey stepped up over the edge of the well and trotted off! Life is going to shovel dirt on you, all kinds of dirt. The trick to getting out of the well is to shake it off and take a step up. Each of our trouble is a stepping stone. We can get out of the deepest wells just by not stopping, never giving up! Shake it off and take a step up! Remember the five simple rules to be happy: 1. Free your heart from hatred. 2. Free your mind from worries. 3. Live simply. 4. Give more. 5. Expect less. P.S.: The donkey later came back and kicked the crap out of the farmer that tried to bury him. Moral: When you try to cover your ass, it always comes back to get you! -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5614 From: Date: Mon Jun 10, 2002 5:34am Subject: 2002 Investigators Mid-America Regional Conference (IMARC) The Kansas Association of Licensed Investigators (KALI) is sponsoring their second annual IMARC in Topeka, KS on July 19 & 20, 2002. Full details can be viewed on their web site at www.k-a-l-i.org or click here Kansas Association of Licensed Investigators . Attendance is $130 for KALI members and $155 for non-members if registered by June 15th and $155 for members and $180 for non-members after that date. The fee includes attendance at the seminars both days, lunch both days, the evening banquet, free hospitality room with refreshments, and vendor access. Rooms are available at the special rate of $66 a night (single or double occupancy). The agenda, full details, and an application are available at the web site. If you have any further questions, feel free to contact me by email or by phone. C. E. "Jack" Kelley, III, MBA C. E. Kelley & Associates Investigations P. O. Box 395, Baxter Springs, KS 66713 (620) 856-4460 Email: kelleypi@a... http://www.angelfire.com/ks/investigations/ Kansas Detective License: D-064 Board Member, Kansas Association of Licensed Investigators Member, American Society for Industrial Security Member, Association of Former Office of Special Investigations Special Agents Member, INTELNET (International organization of private investigators) [Non-text portions of this message have been removed] 5615 From: Steve Uhrig Date: Mon Jun 10, 2002 9:45am Subject: RE: Cell/Radio Danger at gas stations On 7 Jun 2002 at 13:26, Perry Myers wrote: > I also found out from a petroleum security director that radio RF > signals can ignite gasoline. For years, the air force does not allow > two-way radios to be turned on or used in an area where an airplane is > being refueled on the ground. A cell phone produces an RF signal and > therefore there is the same possibility of catching fire as with a > two-way radio." This dates back to the days when radios had vacuum tubes and open frame relays and switched high voltage. Relay contacts opening frequently create a small spark, which well could ignite fumes from something volatile. RF itself is not a problem. Using a radio or cell phone near an aircraft wouldn't generate the RF field of the base radar sweeping by with tens of kilowatts of high frequency. The switching inside the radios is/was the danger. Nowadays, 'Intrinsically Safe' radios are available, and are mandated in areas with dangerous environments, specifically flight lines, around oil fields, holds of ships where fumes may settle, etc. IS radios are sealed so nothing can get in, and the radios are designed to prevent happenings like sparks from relays switching which could cause problems. An IS radio has rubber boots on the insides of controls and switches, no openings in the radio, connectors must be closed construction, not like earphone jacks. Look at a modern radio and you'll see the accessories connect via contacts molded into the plastic. The batteries also must have fuses in them. Don't buy IS stuff, especially batteries, unless you need it, as it is more expensive, more difficult to repair and generally more annoying to use. A fuse in a nicad pack is a good idea, but prevents some of the amateur maintenance to rejuvenate old packs. Danger anymore may be minimal, but of course the government will take the safest position and prohibit anything. At least it's harmless and doesn't cost much if anything for compliance. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5616 From: Steve Uhrig Date: Mon Jun 10, 2002 10:00am Subject: Re: Please help Russia On 7 Jun 2002 at 14:38, Aimee Farr wrote: > I am reminded of the story of a dolphin. To show trust to the trainer, > the dolphin rolls over and presents its vitals. Then, it takes the > trainer's hand in it's mouth, and lets go. > In an interesting twist, Russia appears to be rolling over and > presenting what it can [BLANK] us with. > Did we goof up and stuck our hand in their mouth? Are people so short sighted so as not to remember Russians are masters at chess? They look 10 moves and a century ahead. The U.S. looks no further ahead than the next election. The Bear is not dead. It is not even hibernating. The Bear is very much alive. And we are fools to think otherwise. It was within most of our lifetimes when Kruschev told the U.S. that Russia would take us over, and we'd be shaking their hand and financing them when they do it. Did we goof up? Are we blind, deaf, ignorant of history? Apparently so. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5617 From: Date: Mon Jun 10, 2002 10:51am Subject: Latest Scam FYI.... The latest ATM scam involves thieves putting a thin, clear, rigid plastic "sleeve" into the ATM card slot. When you insert your card, the machine can't read the strip, so it keeps asking you to re-enter your PIN number. Meanwhile, someone behind you watches as you tap in your number. Eventually you give up, thinking the machine has swallowed your card and you walk away. The thieves then remove the plastic sleeve complete with card, and empty your account. The way to avoid this is to run your finger along the card slot before you put your card in. The sleeve has a couple of tiny prongs that the thieves need to get the sleeve out of the slot, and you'll be able to feel them. The police would like as many people as possible to be aware of this scam, so pass this on to your friends. 5618 From: Date: Mon Jun 10, 2002 11:42am Subject: Secret FBI files reveal covert activities at UC / Bureau's campus operations involved Reagan, CIA ************************************** This email is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient, you must not make any use of this information, copy or show it to any person. Any use, forwarding, printing or copying of this message is strictly prohibited. ---------- http://www.sfgate.com/cgi-bin/article.cgi?f=/chronicle/archive/2002/06/09/MNCFLEADIN.DTL [Non-text portions of this message have been removed] 5619 From: intricacy Date: Mon Jun 10, 2002 1:09pm Subject: Need Help Identifying Night Vision Equip I have a mystery question: can anyone identify the origin of this scope? And ideally, provide technical details on it's operation & manufacture? http://www.speakeasy.org/~daretruth/javelin.html Thanks, -Jason verve @ NOsvens.SPAM.com ps-- please remove NOSPAM from my email address to reply. Thanks! 5620 From: Aimee Farr Date: Mon Jun 10, 2002 4:59pm Subject: RE: Re: Please help Russia > Did we goof up? > > Are we blind, deaf, ignorant of history? > > Apparently so. > > Steve :) Well, Putin's press signals are pretty straight-forward these days. So too, ours. I don't know what the heck NATO is doing, or even "is" now. Russia's new "security pact" ...he suggested it might get bigger, as in from one ocean to the other. Something to protect is something to defend. (Mitigation-defense-attack pattern.) Oh, and Kaliningrad, where the latest Putin quote was "whatever it takes." http://www.russiajournal.com/news/rj_news.shtml?nd=2205 "Even then, at the peak of the Cold War, they did find solutions to these problems," said Putin, a former KGB agent who served in East Germany. "Perhaps that's not the best solution possible, bringing us back to the time of a cold war of sorts. But what we're hearing today is worse than the Cold War of the 1970s." At one of the State Department press conferences, a reporter asked if they knew Putin was going to play mediator between India-Pakistan. They didn't get an answer. Our position has been that "Russia has sided with the West." How can I not question things, when he puts a strategic spin on China above Western relations in his press statements? That whole country "moved" at 9-11. Fast decision-cycle. I admit I thought it suspicious, because of the tempo of exploitation. They are reducing their true signals with foreigner themes, terrorism pretexts, and spy mania. That bothers me. The defense pretexts and strategic cover...the nature of our political agenda and intelligence salience....how could they pass up the opportunity? Whatever the case, Putin is the man of the year. It's just that his image is blurring. I hope he doesn't morph into the Duke of Marlborough. ~Aimee 5621 From: Steve Uhrig Date: Mon Jun 10, 2002 9:55pm Subject: Re: FS: ICOM R71/R-7000 Transport Case/Rack Mount On 8 Jun 2002 at 2:47, Jim Conrad wrote: > Made for State Department or CIA, even if not interested in purchasing > take a look out the craftmanship; > http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=1358747616 These originally were made for NSA out of Fort Meade. They did the integraton usually, but sometimes the contractor did. We sold the ICOM receivers. R7000 and R71 as you mention, later adapted under protest to the R7100 which was a piece of junk and the R72, later adapted to the R8500 until ICOM and us got divorced 3 years ago, then the Fort switched over to W-J. They no longer buy or use ICOM equipment, and in fact have replaced most of what they had. They are the source of the ragged out R7000s, R71 and R7100 you see surplus and on ebay. The signal monitors were Atlantic Electronics SM-7071, sold by CSE Associates www.cse-assoc.com. Rack frames were built by a machine shop for us and CSE, later knocked off at much lower quality by EEB, out of business now since the owner got locked up. The DF was usually ours, sometimes Tech Comm, sometimes OAR (now Cubic) -- whatever was available in the quantities they needed at the time. We all worked together to fill their orders, as there was plenty of work to go around and someone we help this week will bail us out next week. The industry used to be a lot friendlier than it is now. They would buy tons, and I literally mean tons, of this stuff. I paid the freight bills. Sometimes UPS would bring the stuff early in the morning, we'd spend all day pasting labels on the unopened boxes, and UPS would haul them away later in the afternoon the same day. At times there were too many boxes to fit in the building, and we'd be taping contract labels onto the boxes on the lawn in front of the building hoping afternoon UPS would get here ahead of the rain. We built temporary furniture and workbenches out of ICOM receiver boxes waiting for some accessory to come in so we could ship. These kits left the country on intel missions and had an average life of six weeks. Those were the good old days. The Fort bought ICOM because they were cheap enough to be throwaway receivers, not because they were anything special in terms of quality or performance. They were and still are adequate for basic receivers, except for the fortunately short-lived R7100 and R9000 which are not worth the gas it takes to haul them to the dump. Same is true for the LCD R9000 out now. Stay away from any of those. The venerable R7000 and the current R8500 are the best of the lot. This piece Jim has must have been one used as a test bed. The particular pieces of equipment date that thing to about ten years ago. Thanks for the memories. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5622 From: Charles P Date: Mon Jun 10, 2002 10:23pm Subject: Selling a Biddle 335 TDR on ebay Hi all, For anyone interested, I have an older model Biddle 335 TDR with CRT display for auction on ebay, ending Tuesday night. It is working and might serve someone as a backup unit or an inexpensive way to get started working with a TDR. If someone from the TSCM list gets it I'll pay the shipping myself (USA) (you'll have to mention the list in an email). http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=1738402491 Charles Charles Patterson charles@t... Global Communications Tarrytown, NY www.telephonesecurity.com 5623 From: Marcel Date: Tue Jun 11, 2002 2:32am Subject: Re: Re: FS: ICOM R71/R-7000 Transport Case/Rack Mount R7000- The best receiver under $1500 Steve Uhrig wrote: > On 8 Jun 2002 at 2:47, Jim Conrad wrote: > > > Made for State Department or CIA, even if not interested in purchasing > > take a look out the craftmanship; > > > http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=1358747616 > > These originally were made for NSA out of Fort Meade. They did the > integraton usually, but sometimes the contractor did. > > We sold the ICOM receivers. R7000 and R71 as you mention, later > adapted under protest to the R7100 which was a piece of junk and the > R72, later adapted to the R8500 until ICOM and us got divorced 3 > years ago, then the Fort switched over to W-J. They no longer buy or > use ICOM equipment, and in fact have replaced most of what they had. > They are the source of the ragged out R7000s, R71 and R7100 you see > surplus and on ebay. > > The signal monitors were Atlantic Electronics SM-7071, sold by CSE > Associates www.cse-assoc.com. Rack frames were built by a machine > shop for us and CSE, later knocked off at much lower quality by EEB, > out of business now since the owner got locked up. > > The DF was usually ours, sometimes Tech Comm, sometimes OAR (now > Cubic) -- whatever was available in the quantities they needed at the > time. We all worked together to fill their orders, as there was > plenty of work to go around and someone we help this week will bail > us out next week. The industry used to be a lot friendlier than it is > now. > > They would buy tons, and I literally mean tons, of this stuff. I paid > the freight bills. Sometimes UPS would bring the stuff early in the > morning, we'd spend all day pasting labels on the unopened boxes, and > UPS would haul them away later in the afternoon the same day. At > times there were too many boxes to fit in the building, and we'd be > taping contract labels onto the boxes on the lawn in front of the > building hoping afternoon UPS would get here ahead of the rain. We > built temporary furniture and workbenches out of ICOM receiver boxes > waiting for some accessory to come in so we could ship. > > These kits left the country on intel missions and had an average life > of six weeks. > > Those were the good old days. > > The Fort bought ICOM because they were cheap enough to be throwaway > receivers, not because they were anything special in terms of quality > or performance. They were and still are adequate for basic receivers, > except for the fortunately short-lived R7100 and R9000 which are not > worth the gas it takes to haul them to the dump. Same is true for the > LCD R9000 out now. Stay away from any of those. > > The venerable R7000 and the current R8500 are the best of the lot. > > This piece Jim has must have been one used as a test bed. The > particular pieces of equipment date that thing to about ten years > ago. > > Thanks for the memories. > > Steve > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 5624 From: Andrus Aaslaid Date: Tue Jun 11, 2002 4:32am Subject: RE: Latest Scam > The latest ATM scam involves thieves putting a thin, clear, rigid plastic > "sleeve" into the ATM card slot. When you insert your card, the machine > can't read the strip, so it keeps asking you to re-enter your PIN number. I have been working with cash dispensers and have not seen any software yet what would ask PIN before track has been read. And there is more to it - As the readers under discussion are with mechanical transport, not a swipe-card readers, the transport mechanism must have a grip to the card. I am sure there are scams like this, but the description looks inaccurate to me ... Andrus. 5625 From: Nick Robson Date: Tue Jun 11, 2002 8:26am Subject: Re: Digest Number 967 The same can be said about China, they tell the West what they want and expect to hear. Nick On 11/6/02 6:14 AM, "TSCM-L@yahoogroups.com" wrote: > Message: 5 > Date: Mon, 10 Jun 2002 11:00:05 -0400 > From: "Steve Uhrig" > Subject: Re: Please help Russia > Are people so short sighted so as not to remember Russians are > masters at chess? > > They look 10 moves and a century ahead. > > The U.S. looks no further ahead than the next election. > > The Bear is not dead. It is not even hibernating. The Bear is very > much alive. And we are fools to think otherwise. > > It was within most of our lifetimes when Kruschev told the U.S. that > Russia would take us over, and we'd be shaking their hand and > financing them when they do it. > > Did we goof up? > > Are we blind, deaf, ignorant of history? > > Apparently so. 5626 From: Damien O'Rourke Date: Tue Jun 11, 2002 3:19am Subject: Re: Latest Scam This has been out since at least last year if not longer. Its called the lebanese loop. D. dseward2@j... wrote: > FYI.... > > The latest ATM scam involves thieves putting a thin, clear, rigid plastic > "sleeve" into the ATM card slot. When you insert your card, the machine > can't read the strip, so it keeps asking you to re-enter your PIN number. > > Meanwhile, someone behind you watches as you tap in your number. > Eventually you give up, thinking the machine has swallowed your card and > you walk away. The thieves then remove the plastic sleeve complete with > card, and empty your account. > > The way to avoid this is to run your finger along the card slot before > you > put your card in. The sleeve has a couple of tiny prongs that the > thieves > need to get the sleeve out of the slot, and you'll be able to feel them. > > > The police would like as many people as possible to be aware of this > scam, > so pass this on to your friends. > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5627 From: Fernando Martins Date: Tue Jun 11, 2002 6:23am Subject: RE: Need Help Identifying Night Vision Equip Javelin Systems now belong to Ademco Group ... Try ademco.com or ademcovideo.com As far as I know, Ademco don't have scopes now, but cameras for cctv systems that can be 0 lux if you want. At work I can try to search old Javelin CD's/catalogs to see if I can find any info about scopes... But don't bet ont that, and contact Ademco (it's a best hint) FM > -----Original Message----- > From: intricacy [mailto:yahoo_email@u...] > Sent: segunda-feira, 10 de Junho de 2002 19:10 > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Need Help Identifying Night Vision Equip > > > I have a mystery question: can anyone identify the origin > of this scope? And ideally, provide technical details on > it's operation & manufacture? > > http://www.speakeasy.org/~daretruth/javelin.html > > Thanks, > > -Jason > verve @ NOsvens.SPAM.com 5628 From: James M. Atkinson Date: Tue Jun 11, 2002 9:13am Subject: Only in America ONLY IN AMERICA 1. Only in America......can a pizza get to your house faster than an ambulance. 2. Only in America......are there handicap parking places in front of a skating rink. 3. Only in America......do drugstores make the sick walk all the way to the back of the store to get their prescriptions while healthy people can buy cigarettes at the front. 4. Only in America......do people order double cheeseburgers, large fries, and a diet coke. 5. Only in America......do banks leave both doors open and then chain the pens to the counters. 6. Only in America......do we leave cars worth thousands of dollars in the driveway and put our useless junk in the garage. 7. Only in America......do we use answering machines to screen calls and then have call waiting so we won't miss a call from someone we didn't want to talk to in the first place. 8. Only in America......do we buy hot dogs in packages of ten and buns in packages of eight. 9. Only in America......do we use the word 'politics' to describe the process so well: 'Poli' in Latin meaning 'many' and 'tics' meaning 'bloodsucking creatures'. 10. Only in America......do they have drive-up ATM machines with Braille lettering. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5629 From: James M. Atkinson Date: Tue Jun 11, 2002 9:14am Subject: Archives are back online The list archives are back online now, and open for browsing by list members. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5630 From: James M. Atkinson Date: Tue Jun 11, 2002 9:11am Subject: Ever Wonder? EVER WONDER? Why the sun lightens our hair, but darkens our skin? Why women can't put on mascara with their mouth closed? Why don't you ever see the headline "Psychic Wins Lottery"? Why is "abbreviated" such a long word? Why is it that doctors call what they do "practice"? Why is it that to stop Windows 98, you have to click on "Start"? Why is lemon juice made with artificial flavor, and dishwashing liquid made with real lemons? Why is the man who invests all your money called a broker? Why is the time of day with the slowest traffic called rush hour? Why isn't there mouse-flavored cat food? When dog food is new and improved tasting, who tests it? Why didn't Noah swat those two mosquitoes? Why do they sterilize the needle for lethal injections? You know that indestructible black box that is used on airplanes? Why don't they make the whole plane out of that stuff? Why don't sheep shrink when it rains? Why are they called apartments when they are all stuck together? If con is the opposite of pro, is Congress the opposite of progress? If flying is so safe, why do they call the airport the terminal? -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5631 From: James M. Atkinson Date: Tue Jun 11, 2002 9:13am Subject: The Human Race is Doomed In case you needed further proof that the human race is doomed through stupidity, here are some actual label instructions on consumer goods. On a Sears hairdryer: Do not use while sleeping. (and that's the only time I have to work on my hair). On a bag of Fritos: ..You could be a winner! No purchase necessary. Details inside. (the shoplifter special)? On a bar of Dial soap: "Directions: Use like regular soap." (and that would be how???....) On some Swanson frozen dinners: "Serving suggestion: Defrost." (but, it's "just" a suggestion). On Tesco's Tiramisu dessert (printed on bottom): "Do not turn upside down." (well...duh, a bit late, huh)! On Marks & Spencer Bread Pudding: "Product will be hot after heating." (...and you thought????...) On packaging for a Rowenta iron: "Do not iron clothes on body." (but wouldn't this save me more time)? On Boot's Children Cough Medicine: "Do not drive a car or operate machinery after taking this medication." (We could do a lot to reduce the rate of construction accidents if we could just get those 5-year-olds with head-colds off those forklifts.) On Nytol Sleep Aid: "Warning: May cause drowsiness." (and...I'm taking this because???....) On most brands of Christmas lights: "For indoor or outdoor use only." (as opposed to...what)? On a Japanese food processor: "Not to be used for the other use." (now, somebody out there, help me on this. I'm a bit curious.) On Sunsbury's peanuts: "Warning: contains nuts." (talk about a news flash) On an American Airlines packet of nuts: "Instructions: Open packet, eat nuts." (Step 3: maybe, uh...fly Delta?) On a child's superman costume: "Wearing of this garment does not enable you to fly." (I don't blame the company. I blame the parents for this one.) On a Swedish chainsaw: "Do not attempt to stop chain with your hands or genitals." (..was there a lot of this happening somewhere?) -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5632 From: James M. Atkinson Date: Tue Jun 11, 2002 0:27pm Subject: RE: Cell/Radio Danger at gas stations I have been aboard refuelling aircraft when they were putting fuel into B-52's and other aircraft with nuclear weapons. Also, I have personally (and safely) used radio systems, satcom gear, and such while inside a plane being refueled, and while on the ground being refueled. -jma At 8:39 PM -0700 6/7/02, Matthew Paulsen wrote: >I just asked my father who worked in the air force with nukes for many many >years on bombers during refueling if this is the case. My father doesn't >appear to think this is the truth... Since he was exposed to this area on a >daily basis I'd wonder about this a bit more... BUT... he did happen to see >a jackknifed loader full of conventional bombs heading towards a b52 once. >That appears to have concerned everyone in the immediate vacinity (as they >all started running from the epicenter as fast as possible - loader-><-b52 ) >more than the pilots communicating with the towers during refueling >according to his recollection. > >Matt > >ps - the loader didn't hit the b52. > > > > >-----Original Message----- >From: Perry Myers [mailto:perry@m...] >Sent: Friday, June 07, 2002 11:27 AM >Cc: TSCM Group (E-mail) >Subject: RE: [TSCM-L] Cell/Radio Danger at gas stations > > >That's why I said it was not verified. I don't always have time to >check everything out and pay the rent at the same time. No offense >taken as long as you are not offended that I wanted to put this out for >discussion to possibly save a group member from exploding at a BP Amoco. >In the mean time here is another piece of information that may or may >not be true that was sent out by a respected colleague. > >"Thanks for the info Perry. I also found out from a petroleum security >director that radio RF signals can ignite gasoline. For years, the air >force >does not allow two-way radios to be turned on or used in an area where >an >airplane is being refueled on the ground. A cell phone produces an RF >signal and therefore there is the same possibility of catching fire as >with >a two-way radio." > >PS. All my credentials? I'm just a PI/CFE. > >-----Original Message----- >From: blake bowers [mailto:bbowers@t...] >Sent: Thursday, June 06, 2002 5:52 PM >To: Perry Myers >Cc: TSCM Group (E-mail) >Subject: Re: [TSCM-L] Cell/Radio Danger at gas stations > > > >No offense, but you would think that someone with so many credentials >would at least check out a story a little bit, before forwarding it. > >www.snopes.com > >QUOTED >Okay, so the bit about a guy in Indonesia being turned into a human >fireball >doesn't > stand up -- what about persistent rumors about an Australian man >done >in by his > mobile phone as he refueled? > > Although in 1999 oil companies told the South China Morning Post >they >had heard reports of an Australian man > being blown up recently when his phone rang as he was filling >his car >with gasoline, fire service heads in > Australia insist the incident never happened. > > As for incidents elsewhere in the world, after several reports >in the >United States where mobile phones were > blamed for fires at gas stations, both the Cellular >Telecommunications Industry Association (CTIA) and the > American Petroleum Institute issued statements denying the risk. >The >CTIA said, "There is no evidence > whatsoever that a wireless phone has ever caused ignition or >explosion at a station anywhere in the world. > Wireless phones don't cause gas stations to blow up. Warnings >being >posted in petrol stations simply perpetuate > the myth." The American Petroleum Institute said, "We can find >no >evidence of someone using a cellphone > causing any kind of accident, no matter how small, at a gas >station >anywhere in the world." > > Okay, so it hasn't happened yet. Is there still potential, yet >unrealized, risk in using cell phones while refueling? > > According to the experts, there is a danger of touching off an >explosion by using a mobile phone near gas pumps. > However, this is a hugely remote possibility at best, and the >risk is >nowhere near as immediate as that of a > number of other common pumpside behaviors such as smoking or >leaving >the engine running while filling the > tank. Even so, gas pumps in Australia bear stickers cautioning >motorists to turn off their phones while refueling; > Shell in Malaysia has affixed similar stickers to each of its >gas >pumps; numerous pumps in the U.S.A. are > similarly adorned; Canada's major gas pump operators have banned >customers from using mobile phones while at > the gas pump; and the city of Cicero, Illinois, recently passed >the >first law in the USA banning the use of cellular > phones at gas stations. >END QUOTED > >All of the major Fire organizations are not worried about this problem >either. > > > >Perry Myers wrote: > >> I received this from another group email. Thought it important enough >> to pass on if it is indeed true. The investigator who provided this >> said he investigated many explosions at gas stations that left only >the >> cell phone or radio as the possible source of the explosion. >> >> Subject: USE OF MOBILE PHONES NEAR PETROL FUMES >> Date: 29 May 2002 09:51 >> >> ..........Sounds legitimate. >> >> Perry D. Myers, CFE >> President & CEO >> E-mail: perry@d... >> >> MSI Detective Services >> Myers Service, Inc. >> Corporate Headquarters >> 2076 N. Elston Ave. Suite 200 >> Chicago, IL. 60614-3940 >> Phone 773-342-8300 >> Facsimile 773-486-4430 >> >> Professional Investigators Since 1959 >> Investigations Nationwide >> 24 Hour Availability >> www.detectiveservices.com >> >> Process Service Division - Downtown Chicago >> 205 W. Randolph St., Ste. 1210 >> Chicago, IL. 60606 >> Phone 312-782-4000 >> Fax 312-853-3119 >> >> For Security, Surveillance & Privacy Products >> U-Spy Store >> Chicago - Orlando - Internet Sales >> www.u-spystore.com >> Orlando Warehouse - (800) 393-4779 >> Chicago Sales - (773) 395-0220 >> >> For more information on our investigative services please visit our >web >> site at www.detectiveservices.com >> > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5633 From: Ed Naylor Date: Tue Jun 11, 2002 1:49pm Subject: CELL PHONE BUGS Yahoo!/Reuters http://story.news.yahoo.com/news?tmpl=story&cid=581&ncid=581&e=3&u=/nm/20020611/tc_nm/tech_israel_netline_dc_1 Israeli Device Detects Cell Phones Acting as Bugs Jun 10, 2002 Albert Robinson TEL AVIV (Reuters) Imagine your company is holding secret talks to buy another firm when your main competitor suddenly snaps it up from under your nose, apparently aware of all the details of the negotiations. While you instigate a widespread investigation, the culprit could be nothing more sinister than a cell phone "accidentally" left in the corner of the room, placed in a plant pot or taped under the boardroom table. With a slight modification, cell phones become high-quality bugs. An owner can call the phone from anywhere in the world without it emitting a ringing tone while its screen remains blank, apparently turned off. "The beauty of the cell phone as a bug is that it's an innocent looking and ubiquitous object," said Ben Te'eni, co-founder of Netline Communications Technologies, which has developed a device for detecting cell phone communications, especially from cell phones in apparently dormant mode. "People trust cell phones, but modified and left in idle mode the cell phone can be used as a transmitter for up to a week. If it's connected to a power supply it can provide endless intelligence. Professional bugsweepers will ignore the cell phone frequency since the phones are so common and not suspicious." The drawback for cell phones and what enables Netline to catch them out, however, is that they periodically transmit a signal to their base station. With Netline's small Cellular Activity Analyzer (CAA) device left in a boardroom before or during crucial meetings, cell phone activity is detected and recorded with a visual and audio warning emitted. [[part of item deleted]] Their first product was a jamming device which prevents cell phone calls in chosen areas of a building or in the open air, which Te'eni said has been sold to defense agencies of "blue chip governments" around the world. "The jammer can be used by bomb squads or VIP security services to prevent the detonation of bombs by cell phones," Te'eni said. [[part of item deleted]] As for the future, Te'eni said Netline, like many technology firms in the current global slump, was not "dreaming big dreams" but looking for steady growth as security officers become more open to questioning long-standing operational methods following the September 11 attacks on the United States. [[rest of item deleted]] © 2002 Reuters Limited. © 2002 Yahoo! Inc. -- -- -- -- -- 5634 From: Marcel Date: Tue Jun 11, 2002 4:27pm Subject: WIRELESS CARRIERS CALL FOR UNITED FRONT ON 800 MHZ INTERFERENCE (United on his Plan Scam) This may happen. Don't be surprise if you find business users on 700mhz & 2.1ghz when you do a sweep. =============================================================== Morggie O'Brien WIRELESS CARRIERS CALL FOR UNITED FRONT ON 800 MHZ INTERFERENCE Tuesday June 11 12:00am Private wireless industry groups exhorted colleagues at American Mobile Telecom Assn. (AMTA) conference Mon. to move toward common position on plan to relieve public safety interference at 800 MHz. But occasionally spirited exchanges at start of 2-day conference in Arlington, Va., stressed how far apart different user groups were on how to mitigate interference as part of notice of proposed rulemaking approved by FCC in March. How to pay for incumbent relocation and where replacement spectrum would come from are among critical issues that remain as sticking points, although all sides agreed that public safety should obtain more spectrum. "Interleaving these kinds of operations -- analog high side public safety type systems on one hand and high efficiency Nextel SMR operations on the other, they simply are going to cause these intermodulation problems and there is no way to tweak your way out of it," (We all know this is a lie since Nextel has resloved several instances of interference by "Tweaking") Nextel Vice Chmn. Morggie O'Brien said. Several participants said time was running short to reach broader agreement on solution, including 30 additional days for reply comments on FCC's NPRM and shrinking window on Capitol Hill to move new legislation this session. "It's time for this industry to stop fighting among itself," said Laura Smith, pres. of Industrial Telecom Assn. (ITA). "We have to work together to come up with a solution." FCC in March approved NPRM examining ways to remedy interference problems for public safety at 800 MHz, including Nextel scam plan that would reconfigure users at 700, 800, 900 MHz and 2.1 GHz bands. That has sparked concerns of private wireless users that would be moved to 700 MHz and 900 MHz without being compensated for relocation. Nextel proposal would provide $500 million to compensate public safety users for costs such as retuning and would give them nearly 10 MHz more spectrum. "It's really the incredible efficiency that Nextel is squeezing out of the spectrum that it's using that's the fault," O'Brien said. In addition, spectrum allocation decisions 30 years ago were made to groups that now have chosen different technology paths, he said. While some industry groups, such as United Telecom Council, have cautioned FCC against rebanding approaches to rectify interference, O'Brien said he would be "amazed" if Commission didn't conclude that "some form of rebanding is the only solution to get incompatible technologies separated." O'Brien called rebanding "first step" in any ultimate solution that Commission chose to mitigate interference that has beset public safety users at 800 MHz from Nextel and other wireless operators. He said receiver redesign for public safety users would be necessary at some point "because the receivers that are being used by public safety are too wide open and they hear everything that goes on." Among overarching questions that policy-makers have to ask in this proceeding is what narrowband technology role is "in a telecom world that is increasingly moving toward broadband." Not surprisingly, at annual leadership conference of AMTA, which counts both private wireless licensees and Nextel among its members, several private wireless representatives gave vent to what they saw as problems with Nextel plan. "It may solve some problems but at every step we saw it as creating more problems than it solved," UTC Pres. William Moroney said. UTC has told FCC in comments that it opposed Nextel position but couldn't support any other proposal that would include mandatory relocation and redivision of spectrum. UTC instead has backed market-based solution dealing with specific interference problems as they occur. "I don't think expecting Nextel because it was smart with technology to totally turn its system inside out is the right answer, nor do I think that totally turning the band inside out is the answer," Moroney said. Assn. of Public-Safety Communications Officials International (APCO) Pres. Glen Nash stressed critical need of public safety operators to obtain more spectrum and said group was open to suggestions on how to reduce interference. One aspect of Nextel White Paper presented to FCC in Nov. that APCO found intriguing was proposal for $500 million for public safety to make changes. For public safety agencies, funding issue has political component because local decision- makers have to be convinced to spend more money on systems that in some cases were recently purchased, Nash said. Amount in Nextel proposal isn't likely to cover all costs of public safety agencies but Nash said: "We're not sure how much is enough. One of the arguments that public safety has made is that we need to be reimbursed for however much our costs are." "We cannot present the Commission with several solutions, we have to present the Commission with one solution," ITA's Smith. "It has to come from public safety, Nextel, the (Private Wireless) Coalition. We need to sit down at the table with UTC, AMTA, API and everyone in this industry who is directly impacted and hammer something out." If left to FCC, which doesn't have day-to-day field experience of industry, "they will come up with a solution that is not only painful for us but unworkable," Smith said. "If industry can't come to a consensus position to try to resolve this matter, we will be doing ourselves and our members a disservice," said attorney Liz Sachs. She referred to diversity of views expressed at conference: "Anyone who believes the FCC is going to ask any one company to cure this whole problem on their nickel is unrealistic. I just don't think that's how it's going to play out. There are too many interests the Commission considers significant." In separate talk, Michael Rosenthal, dir.-regulatory affairs, Southern Linc, said while it was "irrefutable" that public safety needed more spectrum, "we're not sure it should be our spectrum. If it's eminent domain that the government needs to take this spectrum away from us, we think they ought to pay for it just like we do if we have to put in electricity and run a wire over someone's farm." Rosenthal said Southern Linc's SMR system cost $500 million. "We think that ought to be paid for," he said. Issues such as public safety operators' needing more spectrum shouldn't be mixed together with solutions on how to relieve interference, he said. UTC Vp-Gen. Counsel Jill Lyon said rebanding brought with it "massive costs and massive disruptions to what are considered to be public safety radio services under the new definition." They would be in addition to $2 to $3 billion cost of moving public safety systems under Nextel plan, she said. UTC, which represents utilities with communications systems, didn't sign on to Private Wireless Coalition solution, arguing that not everyone in band should move. Lyon said many rebanding proposals that had been presented to FCC would require legislation to be implemented. Plan backed by Cingular Wireless, Southern Linc and others, for example, would entail rebanding that would relocate public safety users to 700 MHz from 800 MHz, requiring legislative change. "This year and probably next year you are probably not going to see any legislation that, for example, requires the FCC to give back auction revenues or allows the FCC to keep auction revenues to pay for something else," Lyon said. "That's not going to happen." -- Mary Greczyn 5635 From: Victor Healey Date: Tue Jun 11, 2002 4:48pm Subject: RE: CELL PHONE BUGS If you wish to view this complete article WITHOUT THE [stupid] SECURITY DELETIONS and with pictures goto http://www.cnn.com/2002/TECH/ptech/06/11/israel.netline.reut/index.html I used GoggleNews search to locate a better copy of that story. http://news.google.com/news?hl=en&q=Israeli+Device+Detects+Cell+Phones+&btnG =Google+Search Vic ----- Original Message ----- From: "Ed Naylor" To: Sent: Tuesday, June 11, 2002 2:49 PM Subject: [TSCM-L] CELL PHONE BUGS 5636 From: J. Nolan Date: Tue Jun 11, 2002 9:39pm Subject: Cell/Radio Danger at Gas Stations Occasionally the Air Force has to repair the fuel bladders in the wings of aircraft such as the B-52. This is hazardous surgery and is referred to as an "open fuel cell" condition. The aircraft is towed to a remote area of the base and flightline personnel are directed not to employ active radars in the vicinity while the fuel cell is being serviced. The concern is that the RF from a nearby radar would build up a charge on the fuselage which, if not properly grounded, could arc. Observe the next time you are at an airport that the first thing the fuel truck driver does when he prepares to refuel an aircraft is attach ground straps--often more than one--from the aircraft to grounding points in the tarmacs, the refueling hose and the fuel truck. Aircraft fuselages--and automobiles--make great Farraday cages. Jim 5637 From: Date: Wed Jun 12, 2002 10:50am Subject: File - mission.txt TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 5638 From: Date: Wed Jun 12, 2002 10:50am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. This file is set to automatically go out to list members every two weeks, Please review it, and ensure that you are listed properly (correct address, phone, etc). ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (including AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (425) 489-0446 Telephone URL: http://www.bug-killer.com/ E-mail: gordonm@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 5639 From: Fernando Martins Date: Wed Jun 12, 2002 4:21pm Subject: OSCE: Lisbon`s foreign minister calls for common anti-terror strategy [related link http://www.osce.org/cio/] http://www.lusa.pt/service.asp?service_id=ServiÁo%20LusaNews 12-06-2002 20:05:00 GMT. NotÌcia 3774094 Temas: OSCE: Lisbon`s foreign minister calls for common anti-terror strategy Portuguese Foreign Minister Antonio Martins da Cruz calld Wednesday for a UN-controlled "efficient and articulate strategy", to maximize international efforts in the fight against international terrorism. Martins da Cruz, in his capacity as acting chairman of the Organization for Security and Cooperation in Europe (OSCE), said this strategy would "avoid duplication" of efforts, reinforce cooperation and optimize the specialties and comparative advantages of each organization. The Portuguese diplomat was speaking in Lisbon at the opening of a one-day conference on preventing and combating terrorism which gathered about 70 senior representatives from international, regional and national organizations engaged in fighting global terrorism. UN Secretary Kofi Annan, in a message sent to the conference, said the world must be "decided", but simultaneously "scrupulous", in its war against terror. "The struggle against terrorism should not lead to the adoption of measures incompatible with the respect for human rights", warned Annan, otherwise, it would represent a "victory" for terrorists who "openly disrespect" those rights. CJB/SAS/MDR/JHM -Lusa- 5640 From: Fernando Martins Date: Wed Jun 12, 2002 4:50pm Subject: Consumers Face Wiretapping Fees http://www.pcworld.com/news/article/0,aid,101837,00.asp Consumers Face Wiretapping Fees FBI demand for new surveillance functions forces telecos to upgrade equipment, forego new customer services. Anne Ju, Medill News Service Tuesday, June 11, 2002 WASHINGTON -- Phone and Internet consumers could be cheated out of next-generation services and hit with higher rates as telephone companies scramble to make their lines wiretap-friendly for the FBI by the end of the month. Under a 1994 law, the Federal Communications Commission requires carriers--including wireless services--to bring their voice-surveillance capabilities up to scratch with FBI rules. The clock is ticking for the telcos, which have until June 30 to upgrade their switches to give the FBI access to extract dialed numbers and conversations. Despite the half billion dollars Congress set aside to offset costs, many telecom companies say obeying the Communications Assistance for Law Enforcement Act--CALEA--is still an expensive endeavor, one that might harm consumer confidence and cause rate hikes. "To the extent that the federal government doesn't pay for the upgrades, it will probably come down on consumers," says Mark Uncapher, vice president and counsel of the Internet Commerce and Communications Division of Information Technology Association of America, a telecommunications industry association. Money isn't the only concern. Consumer advocacy and privacy groups fear abuse with surveillanceof digital communications, which lack some of the safeguards of older analog methods. Both those privacy concerns and the money matters are likely to affect many consumers in ways they do not yet realize. Small Services Hit Hard Small phone companies say upgrade costs are affecting their business. In fact, many won't meet the June 30 deadline because wrangling with switch vendors and buying and installing software is a drawn-out process. Wheat State Telephone, a Kansas-based phone and Internet service provider, has about 2500 local subscribers who may have to wait another two years before enjoying video over the network, according to general manager Archie Macias. "We were looking at getting into video, providing movies, cable, and entertainment content," Macias says. But CALEA costs have set them back "one or two years," he says. Updating Wheat State's switches cost about $50,000 per switch. Macias says it's especially frustrating because the FBI has never ordered an interception of the company's phone lines. "We had to upgrade and expend this money for a function that probably won't be used," Macias says. "When we normally spend money for switch upgrades, we look at revenue streams it might generate, like optional calling features. This doesn't provide us any of that." The cost of these CALEA-mandated upgrades may eventually fall to consumers, he adds. Consumers may be the biggest losers in the CALEA crossfire, agrees Rick Stevens, assistant general manager at Central Montana Communications. "Ultimately, the end users will pay for it if we can't recover the costs," Stevens says. "I can't say it's been exorbitant, but it has certainly been expensive." Independent telco Central Oklahoma Telephone is also juggling its budget to appease the FBI. Like Wheat State in Kansas, it must delay upgrades for other scheduled services, says Steve Guest, manager. Central Oaklahoma Telephone has spent about $70,000 per switch so far, which is roughly a third of the original installation cost, Guest says. He called the costs a "setback" but does not think consumers will see a rate increase. VeriSign Cashes In One company hopes to profit from the carriers' crunch time. VeriSign, a Web security company, last week launched NetDiscovery, a subscription-fee service marketed to telephone companies. VeriSign's service takes over CALEA-mandated upgrades and maintenance. The company says it can perform the functions "a fraction of the cost" a carrier would pay to upgrade and maintain the equipment themselves. "To buy the equipment themselves, hire the staff and maintain the capability on a continuing basis...is really significant, up to $500,000 per switch," says Tony Rutkowski of Verisign's NetDiscovery strategy team. NetDiscovery may be the solution for straggling providers still sweating the approaching June 30 deadline. Rutkowski says it could save operating costs that would otherwise fall to consumers. The company says some telcos have expressed interest but did not reveal any contracts. Privacy Peeves Carriers aren't the only ones antsy about CALEA. Since Congress passed the law in 1994, the fight between privacy advocates and FCC rule makers on easy-access digit extraction and wiretapping has been a bitter one. The transition from analog to digital phone carriers threatened the agency's ability to keep tabs on phones in the event of a court-ordered criminal investigation. Congress helped the FBI by passing CALEA, requiring telecom companies to keep their wiretap-friendly technology current so the FBI could phone-tap on command. Congress left it to the FCC to write the specifics. The FBI has subsequently received more latitude in its surveillance operations. After complaints from privacy groups and cost concerns from telecom companies, a federal appeals court rejected the FCC's original proposal. The revised rules released in April fully address the concerns, says Rodney Small, an FCC engineer. But David Sobel, general counsel at the Electronic Privacy Information Center, is doubtful. He says privacy groups are especially concerned about the FCC's standard for dialed-digit extraction, a method of remotely identifying calls dialed from a given number. The problem was simpler in the analog world, Sobel explains. Law enforcement authorities often issue "pen register orders," which involve retrieving only dialed numbers, not conversations. Analog devices could only extract phone numbers but couldn't keep track of anything dialed after the call was connected. In a digital environment, however, all dialed information travels in packets, which include not only the phone number but anything dialed during the call. The challenge is protecting sensitive information like bank account and Social Security numbers when they are tightly bound to the packet. Privacy advocates fear the system is ripe for abuse, Sobel says. "Our position was that so long as no technical way to protect that content exists, that capability should not be given to law enforcement," Sobel says. Small counters Sobel's complaint, citing a clause in the FCC's new rules that says "the carrier must have the ability to turn on and off the dialed digit extraction capability." Sobel admits the on-off switch is an important start. But EPIC is still concerned about accountability--whether the switch will be used appropriately. EPIC "will certainly continue to monitor the activities of law enforcement," Sobel says. Sobel says EPIC has no immediate plans to challenge the most recent FCC order implementing CALEA, but that if industry groups decided to do so, EPIC would support them. 5641 From: James M. Atkinson Date: Wed Jun 12, 2002 6:23pm Subject: Stella Awards Most of the country has heard of the Darwin Awards given annually to the individuals who do the most for mankind by removing themselves from the gene pool. Now, we have the Stella Awards given to the individuals who win the most frivolous lawsuits ever. The Stella Awards are named in honor of 81 year-old Stella Liebeck, the woman who won $2.9 million for spilling a cup of McDonald's coffee on herself. The following are candidates for the Award: 1. January 2000: Kathleen Robertson of Austin, Texas, was awarded $780,000 by a jury of her peers after breaking her ankle, tripping over a toddler who was running amuck inside a furniture store. The owners of the store were understandably surprised at the verdict, considering that the misbehaving little fellow was Ms. Robertson's son. 2. June 1998: 19 year-old Carl Truman of Los Angeles won $74,000 and medical expenses when his neighbor ran over his hand with a Honda Accord. Mr. Truman apparently didn't notice there was someone at the wheel of the car when he was trying to steal his neighbor's hubcaps. 3. October 1998: Terrence Dickson of Bristol, Pa., was leaving a house he had just finished robbing by way of the garage. He was not able to get the garage door to go up, because the automatic door opener was malfunctioning. He couldn't reenter the house because the door connecting the house and garage locked when he pulled it shut. The family was on vacation. Mr.Dickson found himself locked in the garage for eight days. He subsisted on a case of Pepsi he found in the garage and a large bag of dry dog food. Mr. Dickinson sued the homeowner's insurance claiming the situation caused him undue mental anguish. The jury agreed to the tune of a half million dollars. 4. October 1999: Jerry Williams of Little Rock, Arkansas was awarded $14,500 and medical expenses after being bitten on the buttocks by his next door neighbor's beagle. The dog was on a chain in its owner's fenced-in yard at the time. Mr. Williams was also in the fenced-in yard. The award was less than sought because the jury felt the dog may have been provoked by Mr. Williams who, at the time, was repeatedly shooting it with a pellet gun. 5. December 1997: A Philadelphia restaurant was ordered to pay Amber Carson of Lancaster, Pa., $113,500 after she slipped on a soft drink and broke her coccyx. The beverage was on the floor because Ms. Carson threw it at her boyfriend 30 seconds earlier during an argument. 6. December 1997: Kara Walton of Clamont, DE, successfully sued the owner of a night club when she fell from the bathroom window to the floor and knocked out her two front teeth. This occurred while Ms. Walton was trying to sneak through the window in the ladies room to avoid paying the $3.50 cover charge. She was awarded $12,000 and dental expenses. Let's not forget to give their crooked lawyers and brain dead judges a round of applause too! -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5642 From: gkeenan Date: Wed Jun 12, 2002 10:22pm Subject: test [Non-text portions of this message have been removed] From: Shawn Hughes (Road) Date: Thu Jun 10, 2004 1:07am Subject: Re:Steve Wilson Well, TSCM *is* a small world. I'm surprised he's not a list member. Kinda thought I knew most of the people in the area (I'm near Oak Ridge), and I spend time in Johnson City / Greeneville, but never heard of him. -Shawn At 04:40 PM 6/8/04 +0000, you wrote: >Steve sent me some email about doing some consulting work for U.S. >Treasury and DEA, with a company called Secure USA. ============================= Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response, Incorporated ////////////////////////////////////////////////////////////////////////////// To be announced..... 8867 From: James M. Atkinson Date: Wed Jun 9, 2004 10:19pm Subject: Re: Steve Wilson I am 100% correct that Steve Wilson (and several of his associates) was a member of BECCA/ERI, and that he attended the meetings, got the news letters, drank the kool-aid, etc. -jma At 09:21 PM 6/9/2004, Charles Patterson wrote: >Jim, > >Your source of information may be misleading. > > >Seems that Steve Wilson was or is also a member of ERI/BECCA, and that some > >of the membership was warmly embracing him, referring customers to him, > >I do not know Steve Wilson and have never met him, but I have been a >member of Becca and then ERI since 1998. I have never ever seen Steve >Wilson's name on any roster or membership list. I have never seen him at >any ERI or BECCA meetings, I have never received any emails or other >messages recommending him or his services. I do not even recall ever >hearing his name mentioned at any meetings. Could a member have "warmly >embraced" him on their own time? Sure, I wouldn't know, but that's none of >my business and has nothing to do with ERI. > >regards, >Charles > > >Charles Patterson >Global Communications >Tarrytown, NY >cp@t... > ----- Original Message ----- > From: James M. Atkinson > To: TSCM-L > Sent: Tuesday, June 08, 2004 3:27 PM > Subject: [TSCM-L] Steve Wilson is in the Custody of the U.S. Marshall's > > > > I have confirmed that Stephen J. Wilson is in fact in the custody of the > U.S. Marshall's Service, and is being held at the Greene County > Jail (AKA: > Greene County Detention Center) run by the Greene County Sheriff's > Department. Their number is (423) 798-1800, and they can confirm that > he is > being held on behalf of the U.S. Marshall's. > > Seems that Steve Wilson was or is also a member of ERI/BECCA, and that > some > of the membership was warmly embracing him, referring customers to him, > endorsing him, etc, etc even after some of the membership was warned at a > criminal indictment was in Wilson's future. > > -jma > > > >----------------------------------------------------------------------------------------------------- > > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > >----------------------------------------------------------------------------------------------------- > > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue > #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > >----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > >----------------------------------------------------------------------------------------------------- > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > >------------------------------------------------------------------------------ > Yahoo! Groups Links > > a.. To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > b.. To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8868 From: James M. Atkinson Date: Wed Jun 9, 2004 10:55pm Subject: Re: Steve Wilson I am 100% correct that Steve Wilson was a member of BECCA/ERI. If you ask some awkward question you will find out that he was in fact a member... as were several of his close associates (who have not yet been indicted). -jma At 10:03 PM 6/9/2004, BGR101@a... wrote: >I just read Charles Pattersons note on a Steve Wilson.. I am as Charles a >current member of ERI and was also a member of its predecessor BECCA. I >have never heard of Mr. Wilson and as to promoting someone's business ERI >does not do this as I know it. There are members of ERI that I have not >met and some do not attend the annual conference in the DC area and if Mr. >Wilson is a member or other I am not aware of it. > >Bill Rhoads ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8869 From: Charles Patterson Date: Wed Jun 9, 2004 11:26pm Subject: Re: Steve Wilson I stand corrected. Apparently he was a member of ERI for less than a year in '98-'99 and was dropped. His name though, was never on the membership lists. I tried to meet everyone at the first meeting when I joined in 98 and I don't recall meeting him then or at any other meetings. My memory certainly isn't as good as it once was of course...could be that kool-aid. cp ----- Original Message ----- From: James M. Atkinson To: TSCM-L@yahoogroups.com Sent: Wednesday, June 09, 2004 11:19 PM Subject: Re: [TSCM-L] Steve Wilson I am 100% correct that Steve Wilson (and several of his associates) was a member of BECCA/ERI, and that he attended the meetings, got the news letters, drank the kool-aid, etc. -jma At 09:21 PM 6/9/2004, Charles Patterson wrote: >Jim, > >Your source of information may be misleading. > > >Seems that Steve Wilson was or is also a member of ERI/BECCA, and that some > >of the membership was warmly embracing him, referring customers to him, > >I do not know Steve Wilson and have never met him, but I have been a >member of Becca and then ERI since 1998. I have never ever seen Steve >Wilson's name on any roster or membership list. I have never seen him at >any ERI or BECCA meetings, I have never received any emails or other >messages recommending him or his services. I do not even recall ever >hearing his name mentioned at any meetings. Could a member have "warmly >embraced" him on their own time? Sure, I wouldn't know, but that's none of >my business and has nothing to do with ERI. > >regards, >Charles > > >Charles Patterson >Global Communications >Tarrytown, NY >cp@t... > ----- Original Message ----- > From: James M. Atkinson > To: TSCM-L > Sent: Tuesday, June 08, 2004 3:27 PM > Subject: [TSCM-L] Steve Wilson is in the Custody of the U.S. Marshall's > > > > I have confirmed that Stephen J. Wilson is in fact in the custody of the > U.S. Marshall's Service, and is being held at the Greene County > Jail (AKA: > Greene County Detention Center) run by the Greene County Sheriff's > Department. Their number is (423) 798-1800, and they can confirm that > he is > being held on behalf of the U.S. Marshall's. > > Seems that Steve Wilson was or is also a member of ERI/BECCA, and that > some > of the membership was warmly embracing him, referring customers to him, > endorsing him, etc, etc even after some of the membership was warned at a > criminal indictment was in Wilson's future. > > -jma > > > >----------------------------------------------------------------------------------------------------- > > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > >----------------------------------------------------------------------------------------------------- > > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue > #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > >----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > >----------------------------------------------------------------------------------------------------- > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > >------------------------------------------------------------------------------ > Yahoo! Groups Links > > a.. To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > b.. To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 8870 From: James M. Atkinson Date: Wed Jun 9, 2004 11:43pm Subject: Re: Re:Steve Wilson He was mostly active in Abington, VA in recent years until his business starting falling apart and he had to move back down to Laurel Bloomery, TN (where he was originally from). He started dumping all of his equipment on E-Bay last fall, and really started dumping it hard about two months before he got busted. If you bought equipment from him the government may show up on your doorstep to seize it as it could be subject to civil forfeiture laws if the government proves it was bought by him with drug money. In such cases, anything the drug money touched belongs to the government. This is just the tip of the iceberg... -jma At 02:07 AM 6/10/2004, Shawn Hughes (Road) wrote: >Well, TSCM *is* a small world. I'm surprised he's not a list member. Kinda >thought I knew most of the people in the area (I'm near Oak Ridge), and I >spend time in Johnson City / Greeneville, but never heard of him. > >-Shawn ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8871 From: James M. Atkinson Date: Wed Jun 9, 2004 11:52pm Subject: CACI TSCM People Gee, CACI does TSCM for the government, I wonder if they are planting devices to ensure they get the government contracts. ...and yes, I know that there are several CACI people on the list. -jma http://reuters.com/newsArticle.jhtml;jsessionid=5O32F2NIKKI2GCRBAEOCFEY?type=topNews&storyID=5386050 Lawsuit Filed Against U.S. Contractors Over Iraq Abuse Wed Jun 9, 2004 04:31 PM ET By Sue Pleming WASHINGTON (Reuters) - Two U.S. defense contractors were accused in a class-action suit on Wednesday of conspiring with U.S. officials to torture and abuse prisoners in Iraq. The suit, filed in San Diego, alleged San-Diego based Titan Corp. and CACI International of Arlington, Virginia, engaged in "heinous and illegal acts" to show they could get intelligence from detainees, and thereby obtain more government contracts. Employees from both firms, which provided interrogation and translation services in Iraq, were named in a report on Iraqi prison abuse by U.S. Army investigator Maj. Gen. Antonio Taguba. "We believe that CACI and Titan engaged in a conspiracy to torture and abuse detainees and did so to make more money," said Philadelphia-based lawyer Susan Burke who filed the suit along with New York-based Center for Constitutional Rights. The two companies are accused of violating the Racketeer Influenced and Corrupt Organizations Act, an anti-conspiracy law originally enacted to target organized crime. Titan spokesman Wil Williams called the lawsuit "frivolous" and said the company would aggressively defend itself against the charges. He said the Titan employee named in the Taguba report, Adel Nahkla, had since left the company. CACI did not immediately respond to phone calls asking for comment. The lawsuit charged that Stephen Stefanowicz and John Israel of CACI Inc. and Nahkla "directed and participated in illegal conduct" at the Abu Ghraib prison outside Baghdad. Evidence given to lawyers by former Iraqi inmates did not directly link employees from either Titan or CACI to their abuse, said Burke, adding this came from the Taguba report. However, inmates distinguished between uniformed interrogators and those in civilian clothing and had provided names, descriptions and nicknames of abusers. GRAPHIC ABUSE The lawsuit said plaintiffs were hooded and raped, subject to repeated beatings and stripped naked and one was allegedly forced to watch his father tortured and abused so badly that he later died. Other complaints included being urinated on and otherwise humiliated and being prevented from praying, said the lawsuit. "We have not heard everything yet, the stories are coming out," said Shereef Hadi Akeel, a Detroit-based lawyer who interviewed some of the plaintiffs by telephone from Iraq. A host of U.S. military investigations has been launched into the abuse and torture of Iraqi prisoners. Graphic photographs leaked to the media show naked prisoners simulating sex acts and being attacked by dogs. The lawsuit also alleged CACI and Titan created a joint enterprise with a third party that became known as "Team Titan" which was hired by the United States to provide interrogation services in Iraq. Titan spokesman Williams said he did not know of any joint enterprise with CACI and had not heard of "Team Titan." Nine plaintiffs were named on the lawsuit, including Sami Abbas Al Rawi, Mwafaq Sami Abbaas al Rawi as well as individuals who gave only their first names and others who were not named because of the graphic nature of their complaints and fear of retribution, lawyers said. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8872 From: James M. Atkinson Date: Thu Jun 10, 2004 3:07am Subject: Steve Wilsons Drug Bust - As the hammer starts to fall Wow, someone growing and distributing some pot can get into a heap of trouble, but when they catch them with a gun, using special skills, etc, etc the coals really get added to the fire. -jma ß2D1.1. Unlawful Manufacturing, Importing, Exporting, or Trafficking (Including Possession with Intent to Commit These Offenses); Attempt or Conspiracy (a) Base Offense Level (Apply the greatest): (1) 43, if the defendant is convicted under 21 U.S.C. ß 841(b)(1)(A), (b)(1)(B), or (b)(1)(C), or 21 U.S.C. ß 960(b)(1), (b)(2), or (b)(3), and the offense of conviction establishes that death or serious bodily injury resulted from the use of the substance and that the defendant committed the offense after one or more prior convictions for a similar offense; or (2) 38, if the defendant is convicted under 21 U.S.C. ß 841(b)(1)(A), (b)(1)(B), or (b)(1)(C), or 21 U.S.C. ß 960(b)(1), (b)(2), or (b)(3), and the offense of conviction establishes that death or serious bodily injury resulted from the use of the substance; or (3) the offense level specified in the Drug Quantity Table set forth in subsection (c) below. (b) Specific Offense Characteristics (1) If a dangerous weapon (including a firearm) was possessed, increase by 2 levels. (2) If the defendant unlawfully imported or exported a controlled substance under circumstances in which (A) an aircraft other than a regularly scheduled commercial air carrier was used to import or export the controlled substance, or (B) the defendant acted as a pilot, copilot, captain, navigator, flight officer, or any other operation officer aboard any craft or vessel carrying a controlled substance, increase by 2 levels. If the resulting offense level is less than level 26, increase to level 26. (3) If the object of the offense was the distribution of a controlled substance in a prison, correctional facility, or detention facility, increase by 2 levels. (4) If (A) the offense involved the importation of methamphetamine or the manufacture of methamphetamine from listed chemicals that the defendant knew were imported unlawfully, and (B) the defendant is not subject to an adjustment under ß3B1.2 (Mitigating Role), increase by 2 levels. (5) If the offense involved (A) an unlawful discharge, emission, or release into the environment of a hazardous or toxic substance, or (B) the unlawful transportation, treatment, storage, or disposal of a hazardous waste, increase by 2 levels. (6) If the defendant meets the criteria set forth in subdivisions (1)-(5) of ß5C1.2 (Limitation on Applicability of Statutory Minimum Sentences in Certain Cases) and the offense level determined above is level 26 or greater, decrease by 2 levels. [Subsection (c) (Drug Quantity Table) is set forth on the following pages.] (d) Cross References (1) If a victim was killed under circumstances that would constitute murder under 18 U.S.C. ß 1111 had such killing taken place within the territorial or maritime jurisdiction of the United States, apply ß2A1.1 (First Degree Murder). (2) If the defendant was convicted under 21 U.S.C. ß 841(b)(7) (of distributing a controlled substance with intent to commit a crime of violence), apply ß2X1.1 (Attempt, Solicitation, or Conspiracy) in respect to the crime of violence that the defendant committed, or attempted or intended to commit, if the resulting offense level is greater than that determined above. (c) DRUG QUANTITY TABLE Controlled Substances and Quantity* Base Offense Level (1) 30 KG or more of Heroin (or the equivalent amount of other Schedule I or II Opiates); 150 KG or more of Cocaine (or the equivalent amount of other Schedule I or II Stimulants); 1.5 KG or more of Cocaine Base; 30 KG or more of PCP, or 3 KG or more of PCP (actual); 15 KG or more of Methamphetamine, or 3 KG or more of Methamphetamine (actual), or 3 KG or more of "Ice"; 300 G or more of LSD (or the equivalent amount of other Schedule I or II Hallucinogens); 12 KG or more of Fentanyl; 3 KG or more of a Fentanyl Analogue; 30,000 KG or more of Marihuana; 6,000 KG or more of Hashish; 600 KG or more of Hashish Oil. Level 38 (2) At least 10 KG but less than 30 KG of Heroin (or the equivalent amount of other Schedule I or II Opiates); At least 50 KG but less than 150 KG of Cocaine (or the equivalent amount of other Schedule I or II Stimulants); At least 500 G but less than 1.5 KG of Cocaine Base; At least 10 KG but less than 30 KG of PCP, or at least 1 KG but less than 3 KG of PCP (actual); At least 5 KG but less than 15 KG of Methamphetamine, or at least 1 KG but less than 3 KG of Methamphetamine (actual), or at least 1 KG but less than 3 KG of "Ice"; At least 100 G but less than 300 G of LSD (or the equivalent amount of other Schedule I or II Hallucinogens); At least 4 KG but less than 12 KG of Fentanyl; At least 1 KG but less than 3 KG of a Fentanyl Analogue; At least 10,000 KG but less than 30,000 KG of Marihuana; At least 2,000 KG but less than 6,000 KG of Hashish; At least 200 KG but less than 600 KG of Hashish Oil. Level 36 (3) At least 3 KG but less than 10 KG of Heroin (or the equivalent amount of other Schedule I or II Opiates); At least 15 KG but less than 50 KG of Cocaine (or the equivalent amount of other Schedule I or II Stimulants); At least 150 G but less than 500 G of Cocaine Base; At least 3 KG but less than 10 KG of PCP, or at least 300 G but less than 1 KG of PCP (actual); At least 1.5 KG but less than 5 KG of Methamphetamine, or at least 300 G but less than 1 KG of Methamphetamine (actual), or at least 300 G but less than 1 KG of "Ice"; At least 30 G but less than 100 G of LSD (or the equivalent amount of other Schedule I or II Hallucinogens); At least 1.2 KG but less than 4 KG of Fentanyl; At least 300 G but less than 1 KG of a Fentanyl Analogue; At least 3,000 KG but less than 10,000 KG of Marihuana; At least 600 KG but less than 2,000 KG of Hashish; At least 60 KG but less than 200 KG of Hashish Oil. Level 34 (4) At least 1 KG but less than 3 KG of Heroin (or the equivalent amount of other Schedule I or II Opiates); At least 5 KG but less than 15 KG of Cocaine (or the equivalent amount of other Schedule I or II Stimulants); At least 50 G but less than 150 G of Cocaine Base; At least 1 KG but less than 3 KG of PCP, or at least 100 G but less than 300 G of PCP (actual); At least 500 G but less than 1.5 KG of Methamphetamine, or at least 100 G but less than 300 G of Methamphetamine (actual), or at least 100 G but less than 300 G of "Ice"; At least 10 G but less than 30 G of LSD (or the equivalent amount of other Schedule I or II Hallucinogens); At least 400 G but less than 1.2 KG of Fentanyl; At least 100 G but less than 300 G of a Fentanyl Analogue; At least 1,000 KG but less than 3,000 KG of Marihuana; At least 200 KG but less than 600 KG of Hashish; At least 20 KG but less than 60 KG of Hashish Oil. Level 32 (5) At least 700 G but less than 1 KG of Heroin (or the equivalent amount of other Schedule I or II Opiates); At least 3.5 KG but less than 5 KG of Cocaine (or the equivalent amount of other Schedule I or II Stimulants); At least 35 G but less than 50 G of Cocaine Base; At least 700 G but less than 1 KG of PCP, or at least 70 G but less than 100 G of PCP (actual); At least 350 G but less than 500 G of Methamphetamine, or at least 70 G but less than 100 G of Methamphetamine (actual), or at least 70 G but less than 100 G of "Ice"; At least 7 G but less than 10 G of LSD (or the equivalent amount of other Schedule I or II Hallucinogens); At least 280 G but less than 400 G of Fentanyl; At least 70 G but less than 100 G of a Fentanyl Analogue; At least 700 KG but less than 1,000 KG of Marihuana; At least 140 KG but less than 200 KG of Hashish; At least 14 KG but less than 20 KG of Hashish Oil. Level 30 (6) At least 400 G but less than 700 G of Heroin (or the equivalent amount of other Schedule I or II Opiates); At least 2 KG but less than 3.5 KG of Cocaine (or the equivalent amount of other Schedule I or II Stimulants); At least 20 G but less than 35 G of Cocaine Base; At least 400 G but less than 700 G of PCP, or at least 40 G but less than 70 G of PCP (actual); At least 200 G but less than 350 G of Methamphetamine, or at least 40 G but less than 70 G of Methamphetamine (actual), or at least 40 G but less than 70 G of "Ice"; At least 4 G but less than 7 G of LSD (or the equivalent amount of other Schedule I or II Hallucinogens); At least 160 G but less than 280 G of Fentanyl; At least 40 G but less than 70 G of a Fentanyl Analogue; At least 400 KG but less than 700 KG of Marihuana; At least 80 KG but less than 140 KG of Hashish; At least 8 KG but less than 14 KG of Hashish Oil. Level 28 (7) At least 100 G but less than 400 G of Heroin (or the equivalent amount of other Schedule I or II Opiates); At least 500 G but less than 2 KG of Cocaine (or the equivalent amount of other Schedule I or II Stimulants); At least 5 G but less than 20 G of Cocaine Base; At least 100 G but less than 400 G of PCP, or at least 10 G but less than 40 G of PCP (actual); At least 50 G but less than 200 G of Methamphetamine, or at least 10 G but less than 40 G of Methamphetamine (actual), or at least 10 G but less than 40 G of "Ice"; At least 1 G but less than 4 G of LSD (or the equivalent amount of other Schedule I or II Hallucinogens); At least 40 G but less than 160 G of Fentanyl; At least 10 G but less than 40 G of a Fentanyl Analogue; At least 100 KG but less than 400 KG of Marihuana; At least 20 KG but less than 80 KG of Hashish; At least 2 KG but less than 8 KG of Hashish Oil. Level 26 (8) At least 80 G but less than 100 G of Heroin (or the equivalent amount of other Schedule I or II Opiates); At least 400 G but less than 500 G of Cocaine (or the equivalent amount of other Schedule I or II Stimulants); At least 4 G but less than 5 G of Cocaine Base; At least 80 G but less than 100 G of PCP, or at least 8 G but less than 10 G of PCP (actual); At least 40 G but less than 50 G of Methamphetamine, or at least 8 G but less than 10 G of Methamphetamine (actual), or at least 8 G but less than 10 G of "Ice"; At least 800 MG but less than 1 G of LSD (or the equivalent amount of other Schedule I or II Hallucinogens); At least 32 G but less than 40 G of Fentanyl; At least 8 G but less than 10 G of a Fentanyl Analogue; At least 80 KG but less than 100 KG of Marihuana; At least 16 KG but less than 20 KG of Hashish; At least 1.6 KG but less than 2 KG of Hashish Oil. Level 24 (9) At least 60 G but less than 80 G of Heroin (or the equivalent amount of other Schedule I or II Opiates); At least 300 G but less than 400 G of Cocaine (or the equivalent amount of other Schedule I or II Stimulants); At least 3 G but less than 4 G of Cocaine Base; At least 60 G but less than 80 G of PCP, or at least 6 G but less than 8 G of PCP (actual); At least 30 G but less than 40 G of Methamphetamine, or at least 6 G but less than 8 G of Methamphetamine (actual), or at least 6 G but less than 8 G of "Ice"; At least 600 MG but less than 800 MG of LSD (or the equivalent amount of other Schedule I or II Hallucinogens); At least 24 G but less than 32 G of Fentanyl; At least 6 G but less than 8 G of a Fentanyl Analogue; At least 60 KG but less than 80 KG of Marihuana; At least 12 KG but less than 16 KG of Hashish; At least 1.2 KG but less than 1.6 KG of Hashish Oil. Level 22 (10) At least 40 G but less than 60 G of Heroin (or the equivalent amount of other Schedule I or II Opiates); At least 200 G but less than 300 G of Cocaine (or the equivalent amount of other Schedule I or II Stimulants); At least 2 G but less than 3 G of Cocaine Base; At least 40 G but less than 60 G of PCP, or at least 4 G but less than 6 G of PCP (actual); At least 20 G but less than 30 G of Methamphetamine, or at least 4 G but less than 6 G of Methamphetamine (actual), or at least 4 G but less than 6 G of "Ice"; At least 400 MG but less than 600 MG of LSD (or the equivalent amount of other Schedule I or II Hallucinogens); At least 16 G but less than 24 G of Fentanyl; At least 4 G but less than 6 G of a Fentanyl Analogue; At least 40 KG but less than 60 KG of Marihuana; At least 8 KG but less than 12 KG of Hashish; At least 800 G but less than 1.2 KG of Hashish Oil; 40,000 or more units of Schedule I or II Depressants or Schedule III substances; 2,500 or more units of Flunitrazepam. Level 20 (11) At least 20 G but less than 40 G of Heroin (or the equivalent amount of other Schedule I or II Opiates); At least 100 G but less than 200 G of Cocaine (or the equivalent amount of other Schedule I or II Stimulants); At least 1 G but less than 2 G of Cocaine Base; At least 20 G but less than 40 G of PCP, or at least 2 G but less than 4 G of PCP (actual); At least 10 G but less than 20 G of Methamphetamine, or at least 2 G but less than 4 G of Methamphetamine (actual), or at least 2 G but less than 4 G of "Ice"; At least 200 MG but less than 400 MG of LSD (or the equivalent amount of other Schedule I or II Hallucinogens); At least 8 G but less than 16 G of Fentanyl; At least 2 G but less than 4 G of a Fentanyl Analogue; At least 20 KG but less than 40 KG of Marihuana; At least 5 KG but less than 8 KG of Hashish; At least 500 G but less than 800 G of Hashish Oil; At least 20,000 but less than 40,000 units of Schedule I or II Depressants or Schedule III substances; At least 1,250 but less than 2,500 units of Flunitrazepam. Level 18 (12) At least 10 G but less than 20 G of Heroin (or the equivalent amount of other Schedule I or II Opiates); At least 50 G but less than 100 G of Cocaine (or the equivalent amount of other Schedule I or II Stimulants); At least 500 MG but less than 1 G of Cocaine Base; At least 10 G but less than 20 G of PCP, or at least 1 G but less than 2 G of PCP (actual); At least 5 G but less than 10 G of Methamphetamine, or at least 1 G but less than 2 G of Methamphetamine (actual), or at least 1 G but less than 2 G of "Ice"; At least 100 MG but less than 200 MG of LSD (or the equivalent amount of other Schedule I or II Hallucinogens); At least 4 G but less than 8 G of Fentanyl; At least 1 G but less than 2 G of a Fentanyl Analogue; At least 10 KG but less than 20 KG of Marihuana; At least 2 KG but less than 5 KG of Hashish; At least 200 G but less than 500 G of Hashish Oil; At least 10,000 but less than 20,000 units of Schedule I or II Depressants or Schedule III substances; At least 625 but less than 1,250 units of Flunitrazepam. Level 16 (13) At least 5 G but less than 10 G of Heroin (or the equivalent amount of other Schedule I or II Opiates); At least 25 G but less than 50 G of Cocaine (or the equivalent amount of other Schedule I or II Stimulants); At least 250 MG but less than 500 MG of Cocaine Base; At least 5 G but less than 10 G of PCP, or at least 500 MG but less than 1 G of PCP (actual); At least 2.5 G but less than 5 G of Methamphetamine, or at least 500 MG but less than 1 G of Methamphetamine (actual), or at least 500 MG but less than 1 G of "Ice"; At least 50 MG but less than 100 MG of LSD (or the equivalent amount of other Schedule I or II Hallucinogens); At least 2 G but less than 4 G of Fentanyl; At least 500 MG but less than 1 G of a Fentanyl Analogue; At least 5 KG but less than 10 KG of Marihuana; At least 1 KG but less than 2 KG of Hashish; At least 100 G but less than 200 G of Hashish Oil; At least 5,000 but less than 10,000 units of Schedule I or II Depressants or Schedule III substances; At least 312 but less than 625 units of Flunitrazepam. Level 14 (14) Less than 5 G of Heroin (or the equivalent amount of other Schedule I or II Opiates); Less than 25 G of Cocaine (or the equivalent amount of other Schedule I or II Stimulants); Less than 250 MG of Cocaine Base; Less than 5 G of PCP, or less than 500 MG of PCP (actual); Less than 2.5 G of Methamphetamine, or less than 500 MG of Methamphetamine (actual), or less than 500 MG of "Ice"; Less than 50 MG of LSD (or the equivalent amount of other Schedule I or II Hallucinogens); Less than 2 G of Fentanyl; Less than 500 MG of a Fentanyl Analogue; At least 2.5 KG but less than 5 KG of Marihuana; At least 500 G but less than 1 KG of Hashish; At least 50 G but less than 100 G of Hashish Oil; At least 2,500 but less than 5,000 units of Schedule I or II Depressants or Schedule III substances; At least 156 but less than 312 units of Flunitrazepam; 40,000 or more units of Schedule IV substances (except Flunitrazepam). Level 12 (15) At least 1 KG but less than 2.5 KG of Marihuana; At least 200 G but less than 500 G of Hashish; At least 20 G but less than 50 G of Hashish Oil; At least 1,000 but less than 2,500 units of Schedule I or II Depressants or Schedule III substances; At least 62 but less than 156 units of Flunitrazepam; At least 16,000 but less than 40,000 units of Schedule IV substances (except Flunitrazepam). Level 10 (16) At least 250 G but less than 1 KG of Marihuana; At least 50 G but less than 200 G of Hashish; At least 5 G but less than 20 G of Hashish Oil; At least 250 but less than 1,000 units of Schedule I or II Depressants or Schedule III substances; Less than 62 units of Flunitrazepam; At least 4,000 but less than 16,000 units of Schedule IV substances (except Flunitrazepam); 40,000 or more units of Schedule V substances. Level 8 (17) Less than 250 G of Marihuana; Less than 50 G of Hashish; Less than 5 G of Hashish Oil; Less than 250 units of Schedule I or II Depressants or Schedule III substances; Less than 4,000 units of Schedule IV substances (except Flunitrazepam); Less than 40,000 units of Schedule V substances. Level 6 *Notes to Drug Quantity Table: (A) Unless otherwise specified, the weight of a controlled substance set forth in the table refers to the entire weight of any mixture or substance containing a detectable amount of the controlled substance. If a mixture or substance contains more than one controlled substance, the weight of the entire mixture or substance is assigned to the controlled substance that results in the greater offense level. (B) The terms "PCP (actual)" and "Methamphetamine (actual)" refer to the weight of the controlled substance, itself, contained in the mixture or substance. For example, a mixture weighing 10 grams containing PCP at 50% purity contains 5 grams of PCP (actual). In the case of a mixture or substance containing PCP or methamphetamine, use the offense level determined by the entire weight of the mixture or substance, or the offense level determined by the weight of the PCP (actual) or methamphetamine (actual), whichever is greater. (C) "Ice," for the purposes of this guideline, means a mixture or substance containing d-methamphetamine hydrochloride of at least 80% purity. (D) "Cocaine base," for the purposes of this guideline, means "crack." "Crack" is the street name for a form of cocaine base, usually prepared by processing cocaine hydrochloride and sodium bicarbonate, and usually appearing in a lumpy, rocklike form. (E) In the case of an offense involving marihuana plants, treat each plant, regardless of sex, as equivalent to 100 G of marihuana. Provided, however, that if the actual weight of the marihuana is greater, use the actual weight of the marihuana. (F) In the case of Schedule I or II Depressants, Schedule III substances (except anabolic steroids), Schedule IV substances, and Schedule V substances, one "unit" means one pill, capsule, or tablet. If the substance is in liquid form, one "unit" means 0.5 gms. (G) In the case of anabolic steroids, one "unit" means a 10 cc vial of an injectable steroid or fifty tablets. All vials of injectable steroids are to be converted on the basis of their volume to the equivalent number of 10 cc vials (e.g., one 50 cc vial is to be counted as five 10 cc vials). (H) In the case of LSD on a carrier medium (e.g., a sheet of blotter paper), do not use the weight of the LSD/carrier medium. Instead, treat each dose of LSD on the carrier medium as equal to 0.4 mg of LSD for the purposes of the Drug Quantity Table. (I)Hashish, for the purposes of this guideline, means a resinous substance of cannabis that includes (i) one or more of the tetrahydrocannabinols (as listed in 21 C.F.R. ß 1308.11(d)(25)), (ii) at least two of the following: cannabinol, cannabidiol, or cannabichromene, and (iii) fragments of plant material (such as cystolith fibers). (J) Hashish oil, for the purposes of this guideline, means a preparation of the soluble cannabinoids derived from cannabis that includes (i) one or more of the tetrahydrocannabinols (as listed in 21 C.F.R. ß 1308.11(d)(25)), (ii) at least two of the following: cannabinol, cannabidiol, or cannabichromene, and (iii) is essentially free of plant material (e.g., plant fragments). Typically, hashish oil is a viscous, dark colored oil, but it can vary from a dry resin to a colorless liquid. Commentary Statutory Provisions: 21 U.S.C. ßß 841(a), (b)(1)-(3), (7), 960(a), (b). For additional statutory provision(s), see Appendix A (Statutory Index). Application Notes: 1. "Mixture or substance" as used in this guideline has the same meaning as in 21 U.S.C. ß 841, except as expressly provided. Mixture or substance does not include materials that must be separated from the controlled substance before the controlled substance can be used. Examples of such materials include the fiberglass in a cocaine/fiberglass bonded suitcase, beeswax in a cocaine/beeswax statue, and waste water from an illicit laboratory used to manufacture a controlled substance. If such material cannot readily be separated from the mixture or substance that appropriately is counted in the Drug Quantity Table, the court may use any reasonable method to approximate the weight of the mixture or substance to be counted. An upward departure nonetheless may be warranted when the mixture or substance counted in the Drug Quantity Table is combined with other, non-countable material in an unusually sophisticated manner in order to avoid detection. Similarly, in the case of marihuana having a moisture content that renders the marihuana unsuitable for consumption without drying (this might occur, for example, with a bale of rain-soaked marihuana or freshly harvested marihuana that had not been dried), an approximation of the weight of the marihuana without such excess moisture content is to be used. 2. The statute and guideline also apply to "counterfeit" substances, which are defined in 21 U.S.C. ß 802 to mean controlled substances that are falsely labeled so as to appear to have been legitimately manufactured or distributed. 3. Definitions of "firearm" and "dangerous weapon" are found in the Commentary to ß1B1.1 (Application Instructions). The enhancement for weapon possession reflects the increased danger of violence when drug traffickers possess weapons. The adjustment should be applied if the weapon was present, unless it is clearly improbable that the weapon was connected with the offense. For example, the enhancement would not be applied if the defendant, arrested at his residence, had an unloaded hunting rifle in the closet. The enhancement also applies to offenses that are referenced to ß2D1.1; see ßß2D1.2(a)(1) and (2), 2D1.5(a)(1), 2D1.6, 2D1.7(b)(1), 2D1.8, 2D1.11(c)(1), 2D1.12(c)(1), and 2D2.1(b)(1). 4. Distribution of "a small amount of marihuana for no remuneration", 21 U.S.C. ß 841(b)(4), is treated as simple possession, to which ß2D2.1 applies. 5. Any reference to a particular controlled substance in these guidelines includes all salts, isomers, and all salts of isomers. Any reference to cocaine includes ecgonine and coca leaves, except extracts of coca leaves from which cocaine and ecgonine have been removed. 6. Where there are multiple transactions or multiple drug types, the quantities of drugs are to be added. Tables for making the necessary conversions are provided below. 7. Where a mandatory (statutory) minimum sentence applies, this mandatory minimum sentence may be "waived" and a lower sentence imposed (including a sentence below the applicable guideline range), as provided in 28 U.S.C. ß 994(n), by reason of a defendantís "substantial assistance in the investigation or prosecution of another person who has committed an offense." See ß5K1.1 (Substantial Assistance to Authorities). In addition, 18 U.S.C. ß 3553(f) provides an exception to the applicability of mandatory minimum sentences in certain cases. See ß5C1.2 (Limitation on Applicability of Statutory Minimum Sentences in Certain Cases). 8. A defendant who used special skills in the commission of the offense may be subject to an enhancement under ß3B1.3 (Abuse of Position of Trust or Use of Special Skill). Certain professionals often occupy essential positions in drug trafficking schemes. These professionals include doctors, pilots, boat captains, financiers, bankers, attorneys, chemists, accountants, and others whose special skill, trade, profession, or position may be used to significantly facilitate the commission of a drug offense. Note, however, that if an adjustment from subsection (b)(2)(B) applies, do not apply ß3B1.3 (Abuse of Position of Trust or Use of Special Skill). 9. Trafficking in controlled substances, compounds, or mixtures of unusually high purity may warrant an upward departure, except in the case of PCP or methamphetamine for which the guideline itself provides for the consideration of purity (see the footnote to the Drug Quantity Table). The purity of the controlled substance, particularly in the case of heroin, may be relevant in the sentencing process because it is probative of the defendantís role or position in the chain of distribution. Since controlled substances are often diluted and combined with other substances as they pass down the chain of distribution, the fact that a defendant is in possession of unusually pure narcotics may indicate a prominent role in the criminal enterprise and proximity to the source of the drugs. As large quantities are normally associated with high purities, this factor is particularly relevant where smaller quantities are involved. 10. The Commission has used the sentences provided in, and equivalences derived from, the statute (21 U.S.C. ß 841(b)(1)), as the primary basis for the guideline sentences. The statute, however, provides direction only for the more common controlled substances, i.e., heroin, cocaine, PCP, methamphetamine, fentanyl, LSD and marihuana. The Drug Equivalency Tables set forth below provide conversion factors for other substances, which the Drug Quantity Table refers to as "equivalents" of these drugs. For example, one gram of a substance containing oxymorphone, a Schedule I opiate, is to be treated as the equivalent of five kilograms of marihuana in applying the Drug Quantity Table. The Drug Equivalency Tables also provide a means for combining differing controlled substances to obtain a single offense level. In each case, convert each of the drugs to its marihuana equivalent, add the quantities, and look up the total in the Drug Quantity Table to obtain the combined offense level. For certain types of controlled substances, the marihuana equivalencies in the Drug Equivalency Tables are "capped" at specified amounts (e.g., the combined equivalent weight of all Schedule V controlled substances shall not exceed 999 grams of marihuana). Where there are controlled substances from more than one schedule (e.g., a quantity of a Schedule IV substance and a quantity of a Schedule V substance), determine the marihuana equivalency for each schedule separately (subject to the cap, if any, applicable to that schedule). Then add the marihuana equivalencies to determine the combined marihuana equivalency (subject to the cap, if any, applicable to the combined amounts). Note: Because of the statutory equivalences, the ratios in the Drug Equivalency Tables do not necessarily reflect dosages based on pharmacological equivalents. Examples: a. The defendant is convicted of selling 70 grams of a substance containing PCP (Level 22) and 250 milligrams of a substance containing LSD (Level 18). The PCP converts to 70 kilograms of marihuana; the LSD converts to 25 kilograms of marihuana. The total is therefore equivalent to 95 kilograms of marihuana, for which the Drug Quantity Table provides an offense level of 24. b. The defendant is convicted of selling 500 grams of marihuana (Level 8) and five kilograms of diazepam (Level 8). The diazepam, a Schedule IV drug, is equivalent to 625 grams of marihuana. The total, 1.125 kilograms of marihuana, has an offense level of 10 in the Drug Quantity Table. c. The defendant is convicted of selling 80 grams of cocaine (Level 16) and five kilograms of marihuana (Level 14). The cocaine is equivalent to 16 kilograms of marihuana. The total is therefore equivalent to 21 kilograms of marihuana, which has an offense level of 18 in the Drug Quantity Table. d. The defendant is convicted of selling 56,000 units of a Schedule III substance, 100,000 units of a Schedule IV substance, and 200,000 units of a Schedule V substance. The marihuana equivalency for the Schedule III substance is 56 kilograms of marihuana (below the cap of 59.99 kilograms of marihuana set forth as the maximum equivalent weight for Schedule III substances). The marihuana equivalency for the Schedule IV substance is subject to a cap of 4.99 kilograms of marihuana set forth as the maximum equivalent weight for Schedule IV substances (without the cap it would have been 6.25 kilograms). The marihuana equivalency for the Schedule V substance is subject to the cap of 999 grams of marihuana set forth as the maximum equivalent weight for Schedule V substances (without the cap it would have been 1.25 kilograms). The combined equivalent weight, determined by adding together the above amounts, is subject to the cap of 59.99 kilograms of marihuana set forth as the maximum combined equivalent weight for Schedule III, IV, and V substances. Without the cap, the combined equivalent weight would have been 61.99 (56 + 4.99 + .999) kilograms. DRUG EQUIVALENCY TABLES Schedule I or II Opiates* 1 gm of Heroin = 1 kg of marihuana 1 gm of Alpha-Methylfentanyl = 10 kg of marihuana 1 gm of Dextromoramide = 670 gm of marihuana 1 gm of Dipipanone = 250 gm of marihuana 1 gm of 3-Methylfentanyl = 10 kg of marihuana 1 gm of 1-Methyl-4-phenyl-4-propionoxypiperidine/MPPP =700 gm of marihuana 1 gm of 1-(2-Phenylethyl)-4-phenyl-4-acetyloxypiperidine/ PEPAP = 700 gm of marihuana 1 gm of Alphaprodine = 100 gm of marihuana 1 gm of Fentanyl (N-phenyl-N-[1-(2-phenylethyl)-4- piperidinyl] Propanamide) = 2.5 kg of marihuana 1 gm of Hydromorphone/Dihydromorphinone =2.5 kg of marihuana 1 gm of Levorphanol = 2.5 kg of marihuana 1 gm of Meperidine/Pethidine = 50 gm of marihuana 1 gm of Methadone = 500 gm of marihuana 1 gm of 6-Monoacetylmorphine = 1 kg of marihuana 1 gm of Morphine = 500 gm of marihuana 1 gm of Oxycodone = 500 gm of marihuana 1 gm of Oxymorphone = 5 kg of marihuana 1 gm of Racemorphan = 800 gm of marihuana 1 gm of Codeine = 80 gm of marihuana 1 gm of Dextropropoxyphene/Propoxyphene-Bulk =50 gm of marihuana 1 gm of Ethylmorphine = 165 gm of marihuana 1 gm of Hydrocodone/Dihydrocodeinone =500 gm of marihuana 1 gm of Mixed Alkaloids of Opium/Papaveretum =250 gm of marihuana 1 gm of Opium = 50 gm of marihuana 1 gm of Levo-alpha-acetylmethadol (LAAM)= 3 kg of marihuana *Provided, that the minimum offense level from the Drug Quantity Table for any of these controlled substances individually, or in combination with another controlled substance, is level 12. Cocaine and Other Schedule I and II Stimulants (and their immediate precursors)* 1 gm of Cocaine = 200 gm of marihuana 1 gm of N-Ethylamphetamine = 80 gm of marihuana 1 gm of Fenethylline = 40 gm of marihuana 1 gm of Amphetamine = 200 gm of marihuana 1 gm of Dextroamphetamine = 200 gm of marihuana 1 gm of Methamphetamine = 2 kg of marihuana 1 gm of Methamphetamine (Actual) = 10 kg of marihuana 1 gm of "Ice" = 10 kg of marihuana 1 gm of Khat = .01 gm of marihuana 1 gm of 4-Methylaminorex ("Euphoria")=100 gm of marihuana 1 gm of Methylphenidate (Ritalin)= 100 gm of marihuana 1 gm of Phenmetrazine = 80 gm of marihuana 1 gm Phenylacetone/P2P (when possessed for the purpose of manufacturing methamphetamine) =416 gm of marihuana 1 gm Phenylacetone/P2P (in any other case) =75 gm of marihuana 1 gm of Cocaine Base ("Crack") = 20 kg of marihuana 1 gm of Aminorex = 100 gm of marihuana 1 gm of Methcathinone = 380 gm of marihuana 1 gm of N-N-Dimethylamphetamine = 40 gm of marihuana *Provided, that the minimum offense level from the Drug Quantity Table for any of these controlled substances individually, or in combination with another controlled substance, is level 12. LSD, PCP, and Other Schedule I and II Hallucinogens (and their immediate precursors)* 1 gm of Bufotenine = 70 gm of marihuana 1 gm of D-Lysergic Acid Diethylamide/Lysergide/LSD =100 kg of marihuana 1 gm of Diethyltryptamine/DET = 80 gm of marihuana 1 gm of Dimethyltryptamine/DMT = 100 gm of marihuana 1 gm of Mescaline = 10 gm of marihuana 1 gm of Mushrooms containing Psilocin and/or Psilocybin (Dry) = 1 gm of marihuana 1 gm of Mushrooms containing Psilocin and/or Psilocybin (Wet) = 0.1 gm of marihuana 1 gm of Peyote (Dry) = 0.5 gm of marihuana 1 gm of Peyote (Wet) = 0.05 gm of marihuana 1 gm of Phencyclidine/PCP = 1 kg of marihuana 1 gm of Phencyclidine (actual) /PCP (actual) =10 kg of marihuana 1 gm of Psilocin = 500 gm of marihuana 1 gm of Psilocybin = 500 gm of marihuana 1 gm of Pyrrolidine Analog of Phencyclidine/PHP =1 kg of marihuana 1 gm of Thiophene Analog of Phencyclidine/TCP =1 kg of marihuana 1 gm of 4-Bromo-2,5-Dimethoxyamphetamine/DOB =2.5 kg of marihuana 1 gm of 2,5-Dimethoxy-4-methylamphetamine/DOM =1.67 kg of marihuana 1 gm of 3,4-Methylenedioxyamphetamine/MDA =50 gm of marihuana 1 gm of 3,4-Methylenedioxymethamphetamine/MDMA =35 gm of marihuana 1 gm of 3,4-Methylenedioxy-N-ethylamphetamine/MDEA=30 gm of marihuana 1 gm of 1-Piperidinocyclohexanecarbonitrile/PCC =680 gm of marihuana 1 gm of N-ethyl-1-phenylcyclohexylamine (PCE) =1 kg of marihuana *Provided, that the minimum offense level from the Drug Quantity Table for any of these controlled substances individually, or in combination with another controlled substance, is level 12. Schedule I Marihuana 1 gm of Marihuana/Cannabis, granulated, powdered, etc. =1 gm of marihuana 1 gm of Hashish Oil = 50 gm of marihuana 1 gm of Cannabis Resin or Hashish = 5 gm of marihuana 1 gm of Tetrahydrocannabinol, Organic =167 gm of marihuana 1 gm of Tetrahydrocannabinol, Synthetic =167 gm of marihuana Flunitrazepam ** 1 unit of Flunitrazepam = 16 gm of marihuana ** Provided, that the combined equivalent weight of flunitrazepam, all Schedule I or II depressants, Schedule III substances, Schedule IV substances, and Schedule V substances shall not exceed 99.99 kilograms of marihuana. The minimum offense level from the Drug Quantity Table for flunitrazepam individually, or in combination with any Schedule I or II depressants, Schedule III substances, Schedule IV substances, and Schedule V substances is level 8. Schedule I or II Depressants*** 1 unit of a Schedule I or II Depressant = 1 gm of marihuana ***Provided, that the combined equivalent weight of all Schedule I or II depressants, Schedule III substances, Schedule IV substances (except flunitrazepam), and Schedule V substances shall not exceed 59.99 kilograms of marihuana. Schedule III Substances**** 1 unit of a Schedule III Substance = 1 gm of marihuana ****Provided, that the combined equivalent weight of all Schedule III substances, Schedule I or II depressants, Schedule IV substances (except flunitrazepam), and Schedule V substances shall not exceed 59.99 kilograms of marihuana. Schedule IV Substances (except flunitrazepam)***** 1 unit of a Schedule IV Substance (except Flunitrazepam)= 0.0625 gm of marihuana *****Provided, that the combined equivalent weight of all Schedule IV (except flunitrazepam) and V substances shall not exceed 4.99 kilograms of marihuana. Schedule V Substances****** 1 unit of a Schedule V Substance = 0.00625 gm of marihuana ******Provided, that the combined equivalent weight of Schedule V substances shall not exceed 999 grams of marihuana. To facilitate conversions to drug equivalencies, the following table is provided: MEASUREMENT CONVERSION TABLE 1 oz = 28.35 gm 1 lb = 453.6 gm 1 lb = 0.4536 kg 1 gal = 3.785 liters 1 qt = 0.946 liters 1 gm = 1 ml (liquid) 1 liter = 1,000 ml 1 kg = 1,000 gm 1 gm = 1,000 mg 1 grain = 64.8 mg. 11. If the number of doses, pills, or capsules but not the weight of the controlled substance is known, multiply the number of doses, pills, or capsules by the typical weight per dose in the table below to estimate the total weight of the controlled substance (e.g., 100 doses of Mescaline at 500 mg per dose = 50 gms of mescaline). The Typical Weight Per Unit Table, prepared from information provided by the Drug Enforcement Administration, displays the typical weight per dose, pill, or capsule for certain controlled substances. Do not use this table if any more reliable estimate of the total weight is available from case-specific information. TYPICAL WEIGHT PER UNIT (DOSE, PILL, OR CAPSULE) TABLE Hallucinogens MDA* 100 mg Mescaline 500 mg PCP* 5 mg Peyote (dry) 12 gm Peyote (wet) 120 gm Psilocin* 10 mg Psilocybe mushrooms (dry) 5 gm Psilocybe mushrooms (wet) 50 gm Psilocybin* 10 mg 2,5-Dimethoxy-4-methylamphetamine (STP, DOM)* 3 mg Marihuana 1 marihuana cigarette 0.5 gm Stimulants Amphetamine* 10 mg Methamphetamine* 5 mg Phenmetrazine (Preludin)* 75 mg *For controlled substances marked with an asterisk, the weight per unit shown is the weight of the actual controlled substance, and not generally the weight of the mixture or substance containing the controlled substance. Therefore, use of this table provides a very conservative estimate of the total weight. 12. Types and quantities of drugs not specified in the count of conviction may be considered in determining the offense level. See ß1B1.3(a)(2) (Relevant Conduct). Where there is no drug seizure or the amount seized does not reflect the scale of the offense, the court shall approximate the quantity of the controlled substance. In making this determination, the court may consider, for example, the price generally obtained for the controlled substance, financial or other records, similar transactions in controlled substances by the defendant, and the size or capability of any laboratory involved. If the offense involved both a substantive drug offense and an attempt or conspiracy (e.g., sale of five grams of heroin and an attempt to sell an additional ten grams of heroin), the total quantity involved shall be aggregated to determine the scale of the offense. In an offense involving an agreement to sell a controlled substance, the agreed-upon quantity of the controlled substance shall be used to determine the offense level unless the sale is completed and the amount delivered more accurately reflects the scale of the offense. For example, a defendant agrees to sell 500 grams of cocaine, the transaction is completed by the delivery of the controlled substance - actually 480 grams of cocaine, and no further delivery is scheduled. In this example, the amount delivered more accurately reflects the scale of the offense. In contrast, in a reverse sting, the agreed-upon quantity of the controlled substance would more accurately reflect the scale of the offense because the amount actually delivered is controlled by the government, not by the defendant. If, however, the defendant establishes that he or she did not intend to provide, or was not reasonably capable of providing, the agreed-upon quantity of the controlled substance, the court shall exclude from the offense level determination the amount of controlled substance that the defendant establishes that he or she did not intend to provide or was not reasonably capable of providing. 13. Certain pharmaceutical preparations are classified as Schedule III, IV, or V controlled substances by the Drug Enforcement Administration under 21 C.F.R. ß 1308.13-15 even though they contain a small amount of a Schedule I or II controlled substance. For example, Tylenol 3 is classified as a Schedule III controlled substance even though it contains a small amount of codeine, a Schedule II opiate. For the purposes of the guidelines, the classification of the controlled substance under 21 C.F.R. ß 1308.13-15 is the appropriate classification. 14. Where (A) the amount of the controlled substance for which the defendant is accountable under ß1B1.3 (Relevant Conduct) results in a base offense level greater than 36, (B) the court finds that this offense level overrepresents the defendantís culpability in the criminal activity, and (C) the defendant qualifies for a mitigating role adjustment under ß3B1.2 (Mitigating Role), a downward departure may be warranted. The court may depart to a sentence no lower than the guideline range that would have resulted if the defendantís Chapter Two offense level had been offense level 36. Provided, that a defendant is not eligible for a downward departure under this provision if the defendant: (a) has one or more prior felony convictions for a crime of violence or a controlled substance offense as defined in ß4B1.2 (Definitions of Terms Used in Section 4B1.1); (b) qualifies for an adjustment under ß3B1.3 (Abuse of Position of Trust or Use of Special Skill); (c) possessed or induced another participant to use or possess a firearm in the offense; (d) had decision-making authority; (e) owned the controlled substance or financed any part of the offense; or (f) sold the controlled substance or played a substantial part in negotiating the terms of the sale. Example: A defendant, who the court finds meets the criteria for a downward departure under this provision, has a Chapter Two offense level of 38, a 2-level reduction for a minor role from ß3B1.2, and a 3-level reduction for acceptance of responsibility from ß3E1.1. His final offense level is 33. If the defendantís Chapter Two offense level had been 36, the 2-level reduction for a minor role and 3-level reduction for acceptance of responsibility would have resulted in a final offense level of 31. Therefore, under this provision, a downward departure not to exceed 2 levels (from level 33 to level 31) would be authorized. 15. If, in a reverse sting (an operation in which a government agent sells or negotiates to sell a controlled substance to a defendant), the court finds that the government agent set a price for the controlled substance that was substantially below the market value of the controlled substance, thereby leading to the defendantís purchase of a significantly greater quantity of the controlled substance than his available resources would have allowed him to purchase except for the artificially low price set by the government agent, a downward departure may be warranted. 16. LSD on a blotter paper carrier medium typically is marked so that the number of doses ("hits") per sheet readily can be determined. When this is not the case, it is to be presumed that each 1/4 inch by 1/4 inch section of the blotter paper is equal to one dose. In the case of liquid LSD (LSD that has not been placed onto a carrier medium), using the weight of the LSD alone to calculate the offense level may not adequately reflect the seriousness of the offense. In such a case, an upward departure may be warranted. 17. In an extraordinary case, an upward departure above offense level 38 on the basis of drug quantity may be warranted. For example, an upward departure may be warranted where the quantity is at least ten times the minimum quantity required for level 38. Similarly, in the case of a controlled substance for which the maximum offense level is less than level 38 (e.g., the maximum offense level in the Drug Quantity Table for flunitrazepam is level 20), an upward departure may be warranted if the drug quantity substantially exceeds the quantity for the highest offense level established for that particular controlled substance. 18. For purposes of the guidelines, a "plant" is an organism having leaves and a readily observable root formation (e.g., a marihuana cutting having roots, a rootball, or root hairs is a marihuana plant). 19. If the offense involved importation of methamphetamine, and an adjustment from subsection (b)(2) applies, do not apply subsection (b)(4). 20. Under subsection (b)(5), the enhancement applies if the conduct for which the defendant is accountable under ß1B1.3 (Relevant Conduct) involved any discharge, emission, release, transportation, treatment, storage, or disposal violation covered by the Resource Conservation and Recovery Act, 42 U.S.C. ß 6928(d), the Federal Water Pollution Control Act, 33 U.S.C. ß 1319(c), or the Comprehensive Environmental Response, Compensation, and Liability Act, 42 U.S.C. ßß 5124, 9603(b). In some cases, the enhancement under this subsection may not adequately account for the seriousness of the environmental harm or other threat to public health or safety (including the health or safety of law enforcement and cleanup personnel). In such cases, an upward departure may be warranted. Additionally, any costs of environmental cleanup and harm to persons or property should be considered by the court in determining the amount of restitution under ß5E1.1 (Restitution) and in fashioning appropriate conditions of supervision under ß5B1.3 (Conditions of Probation) and ß5D1.3 (Conditions of Supervised Release). Background: Offenses under 21 U.S.C. ßß 841 and 960 receive identical punishment based upon the quantity of the controlled substance involved, the defendantís criminal history, and whether death or serious bodily injury resulted from the offense. The base offense levels in ß2D1.1 are either provided directly by the Anti-Drug Abuse Act of 1986 or are proportional to the levels established by statute, and apply to all unlawful trafficking. Levels 32 and 26 in the Drug Quantity Table are the distinctions provided by the Anti-Drug Abuse Act; however, further refinement of drug amounts is essential to provide a logical sentencing structure for drug offenses. To determine these finer distinctions, the Commission consulted numerous experts and practitioners, including authorities at the Drug Enforcement Administration, chemists, attorneys, probation officers, and members of the Organized Crime Drug Enforcement Task Forces, who also advocate the necessity of these distinctions. Where necessary, this scheme has been modified in response to specific congressional directives to the Commission. The base offense levels at levels 26 and 32 establish guideline ranges with a lower limit as close to the statutory minimum as possible; e.g., level 32 ranges from 121 to 151 months, where the statutory minimum is ten years or 120 months. For marihuana plants, the Commission has adopted an equivalency of 100 grams per plant, or the actual weight of the usable marihuana, whichever is greater. The decision to treat each plant as equal to 100 grams is premised on the fact that the average yield from a mature marihuana plant equals 100 grams of marihuana. In controlled substance offenses, an attempt is assigned the same offense level as the object of the attempt. Consequently, the Commission adopted the policy that each plant is to be treated as the equivalent of an attempt to produce 100 grams of marihuana, except where the actual weight of the usable marihuana is greater. Specific Offense Characteristic (b)(2) is derived from Section 6453 of the Anti-Drug Abuse Act of 1988. Frequently, a term of supervised release to follow imprisonment is required by statute for offenses covered by this guideline. Guidelines for the imposition, duration, and conditions of supervised release are set forth in Chapter Five, Part D (Supervised Release). Because the weights of LSD carrier media vary widely and typically far exceed the weight of the controlled substance itself, the Commission has determined that basing offense levels on the entire weight of the LSD and carrier medium would produce unwarranted disparity among offenses involving the same quantity of actual LSD (but different carrier weights), as well as sentences disproportionate to those for other, more dangerous controlled substances, such as PCP. Consequently, in cases involving LSD contained in a carrier medium, the Commission has established a weight per dose of 0.4 milligram for purposes of determining the base offense level. The dosage weight of LSD selected exceeds the Drug Enforcement Administrationís standard dosage unit for LSD of 0.05 milligram (i.e., the quantity of actual LSD per dose) in order to assign some weight to the carrier medium. Because LSD typically is marketed and consumed orally on a carrier medium, the inclusion of some weight attributable to the carrier medium recognizes (A) that offense levels for most other controlled substances are based upon the weight of the mixture containing the controlled substance without regard to purity, and (B) the decision in Chapman v. United States, 111 S.Ct. 1919 (1991) (holding that the term "mixture or substance" in 21 U.S.C. ß 841(b)(1) includes the carrier medium in which LSD is absorbed). At the same time, the weight per dose selected is less than the weight per dose that would equate the offense level for LSD on a carrier medium with that for the same number of doses of PCP, a controlled substance that comparative assessments indicate is more likely to induce violent acts and ancillary crime than is LSD. (Treating LSD on a carrier medium as weighing 0.5 milligram per dose would produce offense levels equivalent to those for PCP.) Thus, the approach decided upon by the Commission will harmonize offense levels for LSD offenses with those for other controlled substances and avoid an undue influence of varied carrier weight on the applicable offense level. Nonetheless, this approach does not override the applicability of "mixture or substance" for the purpose of applying any mandatory minimum sentence (see Chapman; ß5G1.1(b)). Historical Note: Effective November 1, 1987. Amended effective January 15, 1988 (see Appendix C, amendments 19, 20, and 21); November 1, 1989 (see Appendix C, amendments 123-134, 302, and 303); November 1, 1990 (see Appendix C, amendment 318); November 1, 1991 (see Appendix C, amendments 369-371 and 394-396); November 1, 1992 (see Appendix C, amendments 446 and 447); November 1, 1993 (see Appendix C, amendments 479, 484-488, and 499); September 23, 1994 (see Appendix C, amendment 509); November 1, 1994 (see Appendix C, amendment 505); November 1, 1995 (see Appendix C, amendments 514-518); November 1, 1997 (see Appendix C, amendments 555 and 556). ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8873 From: Hawkspirit Date: Thu Jun 10, 2004 11:23am Subject: Low frequency sweep For those who sweep the low low low frequencies! http://www.vlf.it/inductor/inductor.htm [Non-text portions of this message have been removed] 8874 From: James M. Atkinson Date: Thu Jun 10, 2004 0:41pm Subject: The Truth GREAT TRUTHS THAT LITTLE CHILDREN HAVE LEARNED: 1) No matter how hard you try, you can't baptize cats. 2) When your Mom is mad at your Dad, don't let her brush your hair. 3) If your sister hits you, don't hit her back. They always catch the second person. 4) Never ask your 3-year old brother to hold a tomato. 5) You can't trust dogs to watch your food. 6) Don't sneeze when someone is cutting your hair. 7) Never hold a Dust-Buster and a cat at the same time. 8) You can't hide a piece of broccoli in a glass of milk. 9) Don't wear polka-dot underwear under white shorts. 10) The best place to be when you're sad is Grandpa's lap. GREAT TRUTHS THAT ADULTS HAVE LEARNED: 1) Raising teenagers is like nailing Jell-O to a tree. 2) Wrinkles don't hurt. 3) Families are like fudge...mostly sweet, with a few nuts. 4) Today's mighty oak is just yesterday's nut that held its ground. 5) Laughing is good exercise. It's like jogging on the inside. 6) Middle age is when you choose your cereal for the fiber, not the toy. GREAT TRUTHS ABOUT GROWING OLD 1) Growing up is mandatory; growing old is optional. 2) Forget the health food. I need all the preservatives I can get. 3) When you fall down, you wonder what else you can do while you're down there. 4) You're getting old when you get the same sensation from a rocking chair that you once got from a roller coaster. 5) It's frustrating when you know all the answers but nobody bothers to ask you the questions. 6) Time may be a great healer, but it's a lousy beautician. 7) Wisdom comes with age, but sometimes age comes alone. THE FOUR STAGES OF LIFE: 1) You believe in Santa Claus. 2) You don't believe in Santa Claus. 3) You are Santa Claus. 4) You look like Santa Claus. SUCCESS: At age 4 success is . . not peeing in your pants. At age 12 success is . . . having friends. At age 16 success is . . .. having a drivers license. At age 35 success is . . . having money. At age 50 success is . . . having money. At age 70 success is . . . having a drivers license. At age 75 success is . . having friends. At age 80 success is . . . not peeing in your pants. Take the time to live!!! Life is too short. Dance naked! -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8875 From: James M. Atkinson Date: Thu Jun 10, 2004 0:04pm Subject: Steve Wilson to Plead Guilty According to court documents just filed this morning; Stephen J. Wilson *** WILL PLEAD GUILTY *** on 6/21/04 to the felony charges against him. I have contacted the court in Greeneville, and confirmed this to be true. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8876 From: szabo4381 Date: Thu Jun 10, 2004 3:28am Subject: cheap, broadband logper antenna, "made in Germany" Hi, folks, yesterday was discovered on the net by myself ( maybe i'm not the only one ) these antennas, mfrd by Aaronia AG, (Germany). So, these items , combined with one of the Centellax microwave modules, could do a good job , even for tscm-ers..., no? 8877 From: szabo4381 Date: Thu Jun 10, 2004 4:45am Subject: rohde-schwarz FSH6, handheld SA for 100kHz-6 Ghz range !! New handheld SA with -135 dBm DANL, and 1 ms sweepspeed at 0 span....the first, and the only on this planet....(june,07,2004) 8878 From: George Shaw Date: Thu Jun 10, 2004 0:18pm Subject: Wanted - Tektronix 7L12 Does anyone have a Tektronix 7L12 or any plug-ins for a Tektronix 7623A mainframe, email me direct. -- George Shaw MI3GTO / 2I0GTO " Any Sufficiently Advanced Technology is Indistinguishable from Magic" ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... Fax & Voicemail: +44 (0) 871 242 4946 8879 From: szabo4381 Date: Fri Jun 11, 2004 2:23am Subject: pricing of FSH6- handheld SA up to 6 GHz 9000 EUR ( basic version, with preamp), CIP, so, will be sell at cca.11,000 EUR ( our local Rohde-Schwarz repr. said) Hyperlog 700MHz-6GHz, handheld 5 dBi logper antenna for EMC measurements & radiomonitoring mfrd by Aaronia AG is priced at 150 EUR PS : I posted this due to several demands coming from tscm-ers, wlc all... 8880 From: Joe Gomez <1upserv@g...> Date: Fri Jun 11, 2004 8:09am Subject: sweep needed I have a client requiring a comprehensive sweep in Gibraltar. Interested parties either from UK or Spain should contact me direct for more info. Joe Gomez ONE UP SERVICES LTD Gibraltar Tel +350 76037 Fax +350 47007 Mob +350 58462000 E-mail: 1upserv@g... 8881 From: Paolo Sfriso Date: Fri Jun 11, 2004 10:57am Subject: Rhode & Schwarz FSH6 Dear Colleagues. The R&S webpage for the new FSH6 Spectrum Analyzer is: http://www.rsd.de/www/dev_center.nsf/frameset?OpenAgent&website=com&navig=/www/dev_center.nsf/html/nav,10,17&content=http://www.rsd.de/www/dev_center.nsf/html/news20040607en_fsh6 What is your opinion on this instrument and it's suitability for TSCM (laptop PC interfaced) ? Kind Regards. Your Italian Connection. Paolo Sfriso CFE, CII Director Gruppo S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY Phone +39 0422 828517 Fax +39 0422 823224 24hr GSM Cell +39 335 5257308 www.grupposit.com paulsfriso@t... info@g... [Non-text portions of this message have been removed] 8882 From: Paolo Sfriso Date: Fri Jun 11, 2004 11:07am Subject: New Icom IC-20 Handheld Scanner Dear Colleagues. Icom has commenced marketing it's new handheld scanner IC-20 (specs at http://www.icomamerica.com/receivers/handheld/icr20main.asp ). Has anybody actually used this new piece of equipment ? Will it be a flop like the R-3 ? Kind Regards. Paolo Sfriso CFE, CII Director Gruppo S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY Phone +39 0422 828517 Fax +39 0422 823224 24hr GSM Cell +39 335 5257308 www.grupposit.com paulsfriso@t... info@g... [Non-text portions of this message have been removed] 8883 From: Date: Fri Jun 11, 2004 8:15am Subject: Tennessee News - drugs & electronic surveillance gear seized Concealed license plate leads to arrest By: Bill Grubb Source: The Rogersville Review 06-10-2004 By Bill Grubb Staff Writer wgrubb@x... ROGERSVILLE‚ÄîA blue plastic cover over a vehicle‚Äôs license plate ultimately resulted in a Surgoinsville man being charged with several drug related charges including possession of cocaine. According to a report filed by Deputy Stacy Vaughan, of the Hawkins County Sheriff‚Äôs Department, on June 3 at approximately 2:30 a.m. he noticed a 1994 Honda Civic traveling east on Stanley Valley Road with a plastic cover obstructing the license plate. Vaughan stopped the vehicle, driven by James Debusk, 27, 110 Elm Street, Surgoinsville, and noticed Ronnie E. Seals, 48, 220 Bray Road, Surgoinsville, was a passenger in the vehicle. Because of an active arrest warrant for Seals he was taken into custody and the deputy asked Debusk for consent to search the vehicle. ‚ÄúDuring my search I found a small plastic container containing several bags of a white powder of what I believe to be cocaine. The bags appeared to be bagged for resale and were found on the floor board where Mr. Seals was sitting,‚Äù Vaughan states in Seals‚Äô arrest report. The deputy also reported he found a crack pipe and several pills under the seat that Seals was sitting in and found scales and several spoons with a white residue on it in a duffel bag that reportedly belonged to Seals. According to the deputy, Seals consented to a search of his residence and Vaughan reported finding a sawed off 12-gauge shotgun in a bedroom and a small bag containing what appeared to be cocaine on a kitchen table. Authorities also seized an electronic surveillance system. Seals was charged with violation of probation, possession of schedule II cocaine for resale, possession of schedule III drugs for resale, possession of schedule IV drugs for resale, possession of drug paraphernalia and possession of a prohibited weapon. Seals is currently being held in the Hawkins County Jail with a July 7 court date set in Hawkins County General Sessions Court. Debusk and two other passengers in the vehicle, Chad Lindsey, 27, 2215 Stanley Valley Road, Surgoinsville and Jackie L. Sharpe, 18, 1218 West Sullivan Street, Kingsport, were all charged with possession of drug paraphernalia. Click here: Hawkins County Online [Non-text portions of this message have been removed] 8884 From: Steve Uhrig Date: Fri Jun 11, 2004 11:56am Subject: Re: New Icom IC-20 Handheld Scanner Once upon a midnight dreary, Paolo Sfriso pondered, weak and weary: > Icom has commenced marketing it's new handheld scanner IC-20 (specs at > http://www.icomamerica.com/receivers/handheld/icr20main.asp ). > Has anybody actually used this new piece of equipment ? > Will it be a flop like the R-3 ? Having been an ICOM dealer for seventeen years selling primarily receivers to governments, I'll state it's never a good idea to buy early release anythings from anyone, especially ICOM. Like buying Version 1.0 software. Early releases always (100% of the time, not 99% of the time) have problems hopefully which are corrected in later production runs. The first 20,000 or so pieces very likely will have little bugs. ICOM may or may not correct them in later production and if they do, they may or may not make good on early release models under warranty. Some of the problems may not surface for some time, like battery life or charger problems. The R7100 receiver was so buggy it was discontinued shortly after it was released. That receiver never did work right and ICOM was losing too much money dealing with warranty claims. So if you're interested in the latest ICOM anything, drag your feet at least a few months so you're not an unpaid frustrated beta tester for the things. And read reviews from *knowledgeable* people AFTER the thing has been out a year or so. Virtually all reviews are glowing initially, because ICOM provides receivers free to reviewers and magazines are looking for advertising from ICOM. So take early reviews with a grain of salt. After a year, the truth comes out. www.strongsignals.net is a reasonably independent gentleman, but again wait until he's had the thing a while before putting much stock in the reviews. ICOM also tends to be liberal with their claims for performance, the R3 being a glaring example. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8885 From: James M. Atkinson Date: Fri Jun 11, 2004 6:06pm Subject: Re: Tennessee News - drugs & electronic surveillance gear seized I wonder if he was a BECCA/ERI member as well? [duck] -jma At 01:15 PM 6/11/2004, NoPositiveWork@a... wrote: >Concealed license plate leads to arrest > >By: Bill Grubb >Source: The Rogersville Review >06-10-2004 > >By Bill Grubb >Staff Writer wgrubb@x... > >ROGERSVILLE≠A blue plastic cover over a vehicle‚Äôs license pplate ultimately >resulted in a Surgoinsville man being charged with several drug related >charges >including possession of cocaine. > >According to a report filed by Deputy Stacy Vaughan, of the Hawkins County >Sheriff‚Äôs Department, on June 3 at approximately 2:30 a.m. he noticed a >1994 >Honda Civic traveling east on Stanley Valley Road with a plastic cover >obstructing the license plate. > >Vaughan stopped the vehicle, driven by James Debusk, 27, 110 Elm Street, >Surgoinsville, and noticed Ronnie E. Seals, 48, 220 Bray Road, >Surgoinsville, was >a passenger in the vehicle. > >Because of an active arrest warrant for Seals he was taken into custody and >the deputy asked Debusk for consent to search the vehicle. >‚ÄúDuring my search I found a small plastic container containing several bags >of a white powder of what I believe to be cocaine. The bags appeared to be >bagged for resale and were found on the floor board where Mr. Seals was >sitting,‚Äù >Vaughan states in Seals‚Äô arrest report. > >The deputy also reported he found a crack pipe and several pills under the >seat that Seals was sitting in and found scales and several spoons with a >white >residue on it in a duffel bag that reportedly belonged to Seals. > >According to the deputy, Seals consented to a search of his residence and >Vaughan reported finding a sawed off 12-gauge shotgun in a bedroom and a >small >bag containing what appeared to be cocaine on a kitchen table. Authorities >also >seized an electronic surveillance system. > >Seals was charged with violation of probation, possession of schedule II >cocaine for resale, possession of schedule III drugs for resale, >possession of >schedule IV drugs for resale, possession of drug paraphernalia and >possession of >a prohibited weapon. >Seals is currently being held in the Hawkins County Jail with a July 7 court >date set in Hawkins County General Sessions Court. > >Debusk and two other passengers in the vehicle, Chad Lindsey, 27, 2215 >Stanley Valley Road, Surgoinsville and Jackie L. Sharpe, 18, 1218 West >Sullivan >Street, Kingsport, were all charged with possession of drug paraphernalia. > > Click here: Hawkins County Online > > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8886 From: James M. Atkinson Date: Fri Jun 11, 2004 6:14pm Subject: Re: Re: New Icom IC-20 Handheld Scanner I will buy one in a few weeks, open it up, hook up some equipment and see how well it works. The analysis will be relative to using it for TSCM, but for hobby use. While I am at it I'll figure out some modes for video, sub-carrier, etc. -jma At 12:56 PM 6/11/2004, Steve Uhrig wrote: >Once upon a midnight dreary, Paolo Sfriso pondered, weak and weary: > > > Icom has commenced marketing it's new handheld scanner IC-20 (specs at > > http://www.icomamerica.com/receivers/handheld/icr20main.asp ). > > > Has anybody actually used this new piece of equipment ? > > > Will it be a flop like the R-3 ? > >Having been an ICOM dealer for seventeen years selling primarily >receivers to governments, I'll state it's never a good idea to buy early >release anythings from anyone, especially ICOM. Like buying Version 1.0 >software. > >Early releases always (100% of the time, not 99% of the time) have >problems hopefully which are corrected in later production runs. The >first 20,000 or so pieces very likely will have little bugs. ICOM may or >may not correct them in later production and if they do, they may or may >not make good on early release models under warranty. Some of the >problems may not surface for some time, like battery life or charger >problems. > >The R7100 receiver was so buggy it was discontinued shortly after it was >released. That receiver never did work right and ICOM was losing too much >money dealing with warranty claims. > >So if you're interested in the latest ICOM anything, drag your feet at >least a few months so you're not an unpaid frustrated beta tester for the >things. > >And read reviews from *knowledgeable* people AFTER the thing has been out >a year or so. Virtually all reviews are glowing initially, because ICOM >provides receivers free to reviewers and magazines are looking for >advertising from ICOM. So take early reviews with a grain of salt. After >a year, the truth comes out. www.strongsignals.net is a reasonably >independent gentleman, but again wait until he's had the thing a while >before putting much stock in the reviews. > >ICOM also tends to be liberal with their claims for performance, the R3 >being a glaring example. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8887 From: James M. Atkinson Date: Fri Jun 11, 2004 6:51pm Subject: 'Spy man' gets sack http://www.wakefieldtoday.co.uk/ViewArticle2.aspx?SectionID=702&ArticleID=805542 'Spy man' gets sack A member of staff at Fieldhead Hospital has been sacked following allegations he filmed female colleagues on the toilet. The Wakefield Express understands the man used a concealed camera to film female staff as they used the toilet in a department at the mental health hospital. Hospital spokeswoman Ruth Wilkins said police were notified on Wednesday May 26. She also confirmed an investigation was launched by the hospital and the man was dismissed from his post two days later on May 28 following disciplinary action. It is unclear how long the man had been carrying out his secret filming at the hospital on Ouchthorpe Lane. The allegations were made to senior members of the department after one woman noticed an object inside a rubbish bin close to the toilet cubicle. After rummaging in the bin the woman found that the object was a small video camera or a camcorder with only the tip of the lens visible, pointing towards the women's toilet. Miss Wilkins said: "We wish to make it clear that this man had no involvement with any patient on any ward. "But we can confirm a member of staff has been dismissed following serious allegations of inappropriate behaviour and misconduct." A West Yorkshire Police spokesman said they had no record of this incident being reported between May 26 and May 29 and refused to comment further. 11 June 2004 ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8888 From: kondrak Date: Fri Jun 11, 2004 9:31pm Subject: Surveillance Gets a Satellite Assist Think this is dated, but for your perusal... >Surveillance Gets a Satellite Assist > >Link to story in USA Today: >http://www.usatoday.com/tech/news/techinnovations/2004-06-09-gps-tracking_x.htm 8889 From: Ocean Group Date: Sat Jun 12, 2004 9:28am Subject: RE: Tennessee News - drugs & electronic surveillance gear seize Are all members of this organisation criminal or something? Message: 5 Date: Fri, 11 Jun 2004 19:06:20 -0400 From: "James M. Atkinson" Subject: Re: Tennessee News - drugs & electronic surveillance gear seized I wonder if he was a BECCA/ERI member as well? [duck] -jma 8890 From: Date: Sat Jun 12, 2004 6:00am Subject: Re: Tennessee News - drugs & electronic surveillance gear seize In a message dated 6/12/2004 7:25:38 AM Pacific Standard Time, inertia@o... writes: > Are all members of this organisation criminal or something? You're thinking of the IRA [Non-text portions of this message have been removed] 8891 From: Michael Puchol Date: Sat Jun 12, 2004 10:05am Subject: Re: Re: New Icom IC-20 Handheld Scanner Hi Steve, Good suggestions - I have aquired an R20 as I managed to flush a couple of older rigs in exchange, and also after a couple of people I know have tried it for a month - nowhere near the full year you suggest, which is reasonable, but I think no big bugs have come up, apart from being picky in antenna selection (UHF AM without a good antenna is useless, it seems). I agree that if you can wait and are not an itchy person it's much better to wait for some time. Had I waited a few years, I would be getting Bonito's soft with my PCR1000s rather than the [expletive deleted] that came with it :-) I will be testing it with a Marconi against an AR5000, AR8200, 780XLT and a Yaesu VR-500 that's lying around. For me, the greatest feature is the audio recorder - a little over four hours, not studio quality by any means, but more than enough for most purposes. You can leave a few channels scanning, and when one becomes active, recording will automatically start, and end when the signal dissapears. The audio can be downloaded to a PC for storage, but Icom (as usual) doesn't provide any info on the file format or PC player tools, so I'm trying to figure it out and make some kind of converter to standard PCM. What I find worst about Icom is that they take developers as enemies, they don't seem to realise that by providing information about the protocols to control the radios, etc. they are encouraging software development and hence more sales of their products. Icom is not in the software bussiness, we've seen that in all the pieces of crap they have made for their radios (this also applies to other radio manufacturers). Will let you know how I get on with the rig, so far impressions are very favourable. Regards, Mike ----- Original Message ----- From: "Steve Uhrig" To: Sent: Friday, June 11, 2004 6:56 PM Subject: [TSCM-L] Re: New Icom IC-20 Handheld Scanner | Once upon a midnight dreary, Paolo Sfriso pondered, weak and weary: | | > Icom has commenced marketing it's new handheld scanner IC-20 (specs at | > http://www.icomamerica.com/receivers/handheld/icr20main.asp ). | | > Has anybody actually used this new piece of equipment ? | | > Will it be a flop like the R-3 ? | | Having been an ICOM dealer for seventeen years selling primarily | receivers to governments, I'll state it's never a good idea to buy early | release anythings from anyone, especially ICOM. Like buying Version 1.0 | software. | | Early releases always (100% of the time, not 99% of the time) have | problems hopefully which are corrected in later production runs. The | first 20,000 or so pieces very likely will have little bugs. ICOM may or | may not correct them in later production and if they do, they may or may | not make good on early release models under warranty. Some of the | problems may not surface for some time, like battery life or charger | problems. | | The R7100 receiver was so buggy it was discontinued shortly after it was | released. That receiver never did work right and ICOM was losing too much | money dealing with warranty claims. | | So if you're interested in the latest ICOM anything, drag your feet at | least a few months so you're not an unpaid frustrated beta tester for the | things. | | And read reviews from *knowledgeable* people AFTER the thing has been out | a year or so. Virtually all reviews are glowing initially, because ICOM | provides receivers free to reviewers and magazines are looking for | advertising from ICOM. So take early reviews with a grain of salt. After | a year, the truth comes out. www.strongsignals.net is a reasonably | independent gentleman, but again wait until he's had the thing a while | before putting much stock in the reviews. | | ICOM also tends to be liberal with their claims for performance, the R3 | being a glaring example. | | Steve | | | ******************************************************************* | Steve Uhrig, SWS Security, Maryland (USA) | Mfrs of electronic surveillance equip | mailto:Steve@s... website http://www.swssec.com | tel +1+410-879-4035, fax +1+410-836-1190 | "In God we trust, all others we monitor" | ******************************************************************* | | | | | | ======================================================== | TSCM-L Technical Security Mailing List | "In a multitude of counselors there is strength" | | To subscribe to the TSCM-L mailing list visit: | http://www.yahoogroups.com/community/TSCM-L | | It is by caffeine alone I set my mind in motion. | It is by the juice of Star Bucks that thoughts acquire speed, | the hands acquire shaking, the shaking is a warning. | It is by caffeine alone I set my mind in motion. | =================================================== TSKS | Yahoo! Groups Links | | | | | | 8892 From: contranl Date: Sat Jun 12, 2004 11:30am Subject: Icom R20 website !...modifications,links,etc . I am setting up a website about the Icom r20 One of the first things i always do when trying out a new scanner is checking out the "birdies" A scanner that has to many of them is considered no good for me Sad enough this scanner does have some birdies right in the middle of the 2,4 Ghz band ...allthough these birdies are not very wide so you may lock them out and still be able to detect any wideband signals like video transmissions wich are a few Mhz wide A list with birdies is available at below website...(under construction) Do'nt forget that a (hobby)scanner without birdies does not exist...since this scanner is doing a very wide frequency range 0.1500 mhz till 3400 mhz you have to accept some birdies. It all depends on what you want to use it for..if you are looking for an extra tool in counter/surveillance then this would be the choice...if you are looking for a scanner to just receive your local police then you wo'nt need this one ,unless you are looking for the recorder function wich will allow you to automatically record a few days of communications from your local dispatch...for half the price you could buy a different scanner that would be easier to handle since the R20 uses a little complicated programming structure wich is not very handy while driving a car. My first impression is that it is a good receiver and one of the best handhelds ever to be useable in countersurveillance it has good sensitivity...a very wide frequency range (widest ever seen on a handheld scanner)..all kinds of demodulation types...very big signal meter display....built-in antenna amplifier with 10 settings + attenuator so you have a total of 20 gain settings. There are 2 seperate receivers both of them can have a bandscope and a sweep-fuction...both might be usefull to analyze signals. The search/scanning speed is not bad either I have owned lots of scanners during the last 25 years...my experience is that: once they are out...the stay like they are ,including possible bugs or misconceptions...improvements will only be on a next model with a different name and look...so waiting for a next factory run of a new scanner is useless since they will be exactly the same...Ofcourse you could wait for the next model (R30 ?) My local importer says that Icom have spend 3 years on developing this scanner The trend in handheld scanners over the last years was that they became smaller and smaller , less care was taken of the RF part and lots of software-tricks were added ...with the R20 that has changed...you now have a scanner with good RF and lots of tricks. The 4 hour recorder is perfect and might be usefull in surveillance for example as an automatic recorder in combination with voice operated transmitters (VOX) You can save the recordings to your Pc...but you can't play them there...wich is a negative.., i am working on some software that will correct that. The LI-ON battery will give you an operating time never seen before in a handheld scanner ( sometimes over 20 hours !) Offcourse there are lots of "wishes" like a simple backlight-on when something is received...(i do'nt understand why they forget that all the time) Resuming: the R20 is a good additional tool in countersurveillance the price is good (~500 US $)and it's the best looking scanner ever. All R20 information and a list of possible modifications can be found on this part of my website: http://www.tetrascanner.com/icom-r20-modifications.html Greetings Tetrascanner www.tetrascanner.com 8893 From: Shawn Hughes (Road) Date: Sat Jun 12, 2004 4:23pm Subject: Re: Digest Number 1595 You gotta remember, this is Tennessee. He prolly seized a baby monitor painted black from the guy or something.... Shawn (near the pointy end of TN) At 02:16 PM 6/12/04 +0000, you wrote: >also > >seized an electronic surveillance system. 8894 From: Ocean Group Date: Sat Jun 12, 2004 9:24pm Subject: Night Vision I have a quick question: Can anyone on this list think of any uses of night vision equipment in TSCM? Realistically? Regards Ois 8895 From: Steve Weinert at Excel.Net Date: Sat Jun 12, 2004 9:31pm Subject: Re: Night Vision Would seem fairly down on the list, except that IR links are common and often left on - some NV equipment will show more than the visual eye will see, but usually ends up like looking through layers of window screen. Most NV stuff out there is crap unless you spend some serious dosh. I think something like a Iogema IR video camera setup or even a nuclear subsurface inspection device could make more sense. (A good tech on a decent IR camera can be useful in exploring the hiden cavities in a building, but only as part of an inspection process). Not personally aware if the small light loss of Fiberoptic connects will show on NV. Only my limited knowledge - perhaps someone else has had more success with NV TSCM? (I do like driving lights-out with NV though - kind of hard on pedestrians buzzed though...). Steve W > I have a quick question: > > Can anyone on this list think of any uses of night vision equipment in TSCM? > > Realistically? > > Regards > > Ois From: gkeenan Date: Wed Jun 12, 2002 10:51pm Subject: test [Non-text portions of this message have been removed] 5644 From: Steve Uhrig Date: Thu Jun 13, 2002 8:36am Subject: Any EP types in London? Hi all, Is anyone on the list active in EP work in London, or know anyone who is? Three qualified and competent people are needed to back up a U.S. security team on a high profile client visit for Wimbledon. Please reply to me privately if you are qualified or know anyone who is, and I'll put you in touch with the EP team. We need trained and experienced professionals with direct EP qualifications, not guards or investigators without direct experience. Thanks ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5645 From: Marcel Date: Fri Jun 14, 2002 0:47am Subject: View Systems, Inc. is Awarded Contract by Houston-Galveston Area http://cnniw.yellowbrix.com/pages/cnniw/Story.nsp?story_id=30571564&ID=cnniw&scategory=Telecommunications%3AWireless& -- [Non-text portions of this message have been removed] 5646 From: Michael Kaegler Date: Fri Jun 14, 2002 0:39am Subject: Confusing roadside equipment in Pennsylvania I think this is on topic for this list... A friend and I driving north on I-95 from Philadelphia this weekend spotted dozens of these: http://nerv-un.net/~dragorn/digicam/digicam.php?cat=Travel&pic=solardetector.jpg Sorry for the fuzzyness, I took 5 pictures and this is the best of them. Some poles had two solar panels and one sensor, others had three panels and two sensors. All appeared to be hardwired to the ground rather than using RF to report to wherever they report to. My friend's thought is that these are speed detectors, but I do not see a window through which the appropriate radio waves could pass (like I've seen on standard issue police speed detectors). Its possible to gauge speed by transponder (like ez-pass), however most jurisdictions have declared that type of enforcement unfair, and the antennas are not positioned in an advantageous way for polling ez-pass-esuqe transponders (nor were there nearby antennas/sensors in the ground). My thought is that they are radiation sensors, trying to pick out anything transporting nuclear weapons. It is my understanding (from recent congressional hearings on terrorism) that the existing network of these sensors is very lacking and being worked on. Whatever they are, they're backed up by moving (pan up/down/left/right and probably megazoom) video cameras every few miles (no antennas in sight, must also be hardwired). Said cameras and sensors stretch from philly to jersey, but I did not notice them in jersey (Pennsylvania state sensors, not federal? On a ["federal defense"] interstate highway?). Thoughts? -mKaegler 5647 From: Marcel Date: Fri Jun 14, 2002 10:45am Subject: Re: Confusing roadside equipment in Pennsylvania I would guess it is part of the states traffic management system. The system typically comprises of cameras, Pole mounted radar sensors, in ground traffic loops, wireless transmitters, and fiber optic equipment. I would go to the Cities/State DOT Page for poss info. I assume this was a permanent installation? Michael Kaegler wrote: > I think this is on topic for this list... > > A friend and I driving north on I-95 from Philadelphia this weekend > spotted dozens of these: > > http://nerv-un.net/~dragorn/digicam/digicam.php?cat=Travel&pic=solardetector.jpg > > Sorry for the fuzzyness, I took 5 pictures and this is the best of > them. Some poles had two solar panels and one sensor, others had > three panels and two sensors. All appeared to be hardwired to the > ground rather than using RF to report to wherever they report to. > > My friend's thought is that these are speed detectors, but I do not > see a window through which the appropriate radio waves could pass > (like I've seen on standard issue police speed detectors). Its > possible to gauge speed by transponder (like ez-pass), however most > jurisdictions have declared that type of enforcement unfair, and the > antennas are not positioned in an advantageous way for polling > ez-pass-esuqe transponders (nor were there nearby antennas/sensors in > the ground). > > My thought is that they are radiation sensors, trying to pick out > anything transporting nuclear weapons. It is my understanding (from > recent congressional hearings on terrorism) that the existing network > of these sensors is very lacking and being worked on. > > Whatever they are, they're backed up by moving (pan > up/down/left/right and probably megazoom) video cameras every few > miles (no antennas in sight, must also be hardwired). Said cameras > and sensors stretch from philly to jersey, but I did not notice them > in jersey (Pennsylvania state sensors, not federal? On a ["federal > defense"] interstate highway?). > > Thoughts? > -mKaegler > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 5648 From: Nick Robson Date: Fri Jun 14, 2002 11:45am Subject: "Israeli Device Detects Cell Phones Acting as Bugs Does anyone have any input on this device? "Israeli Device Detects Cell Phones Acting as Bugs" Reuters (06/10/02) Israel-based Netline Communications Technologies has come up with a device that can detect cell phone transmissions to base stations, a tool it is marketing to companies as a way to prevent one form of corporate espionage. Due to the general ubiquity of cell phones, they often go undetected in board rooms. However, these devices can be programmed to transmit everything within listening distance, and all it takes is for a remote user to call a phone that has been pre-programmed not to emit a ringing tone or even display anything on its screen, thus making it appear to be inactive. Netline has also developed a tool for blocking cell phone communications in buildings or open areas, useful for preventing the detonation of bombs by cell phones and from keeping criminals and terrorists from communicating with one another. www.reuters.com Nick [Non-text portions of this message have been removed] 5649 From: ed Date: Fri Jun 14, 2002 10:18am Subject: Confusing roadside equipment in Pennsylvania it's a PA-owned microwave radar system for traffic flow analysis. -ed At 01:39 AM 6/14/02 -0400, you wrote: >I think this is on topic for this list... > >A friend and I driving north on I-95 from Philadelphia this weekend >spotted dozens of these: > >http://nerv-un.net/~dragorn/digicam/digicam.php?cat=Travel&pic=solardetector.jpg > >Sorry for the fuzzyness, I took 5 pictures and this is the best of >them. Some poles had two solar panels and one sensor, others had >three panels and two sensors. All appeared to be hardwired to the >ground rather than using RF to report to wherever they report to. > >My friend's thought is that these are speed detectors, but I do not >see a window through which the appropriate radio waves could pass >(like I've seen on standard issue police speed detectors). Its >possible to gauge speed by transponder (like ez-pass), however most >jurisdictions have declared that type of enforcement unfair, and the >antennas are not positioned in an advantageous way for polling >ez-pass-esuqe transponders (nor were there nearby antennas/sensors in >the ground). > >My thought is that they are radiation sensors, trying to pick out >anything transporting nuclear weapons. It is my understanding (from >recent congressional hearings on terrorism) that the existing network >of these sensors is very lacking and being worked on. > >Whatever they are, they're backed up by moving (pan >up/down/left/right and probably megazoom) video cameras every few >miles (no antennas in sight, must also be hardwired). Said cameras >and sensors stretch from philly to jersey, but I did not notice them >in jersey (Pennsylvania state sensors, not federal? On a ["federal >defense"] interstate highway?). > >Thoughts? >-mKaegler 5650 From: Kutlin, Josh Date: Fri Jun 14, 2002 0:10pm Subject: RE: "Israeli Device Detects Cell Phones Acting as Bugs Got this a month ago. The small version they said is about $900 US. Hope this helps Josh -----Original Message----- From: Nick Robson [mailto:sci.ltd@c...] Sent: Friday, June 14, 2002 12:46 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] "Israeli Device Detects Cell Phones Acting as Bugs Does anyone have any input on this device? "Israeli Device Detects Cell Phones Acting as Bugs" Reuters (06/10/02) Israel-based Netline Communications Technologies has come up with a device that can detect cell phone transmissions to base stations, a tool it is marketing to companies as a way to prevent one form of corporate espionage. Due to the general ubiquity of cell phones, they often go undetected in board rooms. However, these devices can be programmed to transmit everything within listening distance, and all it takes is for a remote user to call a phone that has been pre-programmed not to emit a ringing tone or even display anything on its screen, thus making it appear to be inactive. Netline has also developed a tool for blocking cell phone communications in buildings or open areas, useful for preventing the detonation of bombs by cell phones and from keeping criminals and terrorists from communicating with one another. www.reuters.com Nick [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5651 From: Mitch D Date: Fri Jun 14, 2002 2:14pm Subject: Re: Confusing roadside equipment in Pennsylvania We've got the stuff between Memphis and Little Rock.Radio towers,camera towers and transponder looking things.all self contained,self powered via solar and generator. I saw it along I-40 and thought it was for either random traffic monitoring,radar,or the housed antennas may be there to pick up signals off transponders,or umm "leaky radioactive somethings". None of the gear kicked out a signal on X K or Ka Band,on sunday.Obviously its for monitoring,and transmitting something.All fun aside it'd be nice to know "whats in the boxes"!! --------------------------------- Do You Yahoo!? Sign-up for Video Highlights of 2002 FIFA World Cup [Non-text portions of this message have been removed] 5652 From: Victor Healey Date: Fri Jun 14, 2002 3:21pm Subject: Hey Mike those are solar panels at the top of your photo. Hey Mike those are probably solar panels at the top of your photo. I only casually glanced at it. The photo is too indistinct to be sure. The other two devices are probably low power traffic counting radar which is lane specific. We have that around metro Atlanta on I-285. Any decent radar detector will confirm this for you. ki4je Vic -------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 5653 From: Charles P. Date: Fri Jun 14, 2002 10:27pm Subject: Re: Confusing roadside equipment in Pennsylvania Here in Westchester County, NY, we have some height detectors on the non-commercial parkways. First you see a pole resembling that photo, then a little ways down the road they have a sign that lights up and a warning signal so wandering truck rigs don't get stuck under a bridge. cp ----- Original Message ----- From: "Michael Kaegler" To: Sent: Friday, June 14, 2002 1:39 AM Subject: [TSCM-L] Confusing roadside equipment in Pennsylvania > I think this is on topic for this list... > > A friend and I driving north on I-95 from Philadelphia this weekend > spotted dozens of these: > > http://nerv-un.net/~dragorn/digicam/digicam.php?cat=Travel&pic=solardetector .jpg > > Sorry for the fuzzyness, I took 5 pictures and this is the best of > them. Some poles had two solar panels and one sensor, others had > three panels and two sensors. All appeared to be hardwired to the > ground rather than using RF to report to wherever they report to. > > My friend's thought is that these are speed detectors, but I do not > see a window through which the appropriate radio waves could pass > (like I've seen on standard issue police speed detectors). Its > possible to gauge speed by transponder (like ez-pass), however most > jurisdictions have declared that type of enforcement unfair, and the > antennas are not positioned in an advantageous way for polling > ez-pass-esuqe transponders (nor were there nearby antennas/sensors in > the ground). > > My thought is that they are radiation sensors, trying to pick out > anything transporting nuclear weapons. It is my understanding (from > recent congressional hearings on terrorism) that the existing network > of these sensors is very lacking and being worked on. > > Whatever they are, they're backed up by moving (pan > up/down/left/right and probably megazoom) video cameras every few > miles (no antennas in sight, must also be hardwired). Said cameras > and sensors stretch from philly to jersey, but I did not notice them > in jersey (Pennsylvania state sensors, not federal? On a ["federal > defense"] interstate highway?). > > Thoughts? > -mKaegler > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 5654 From: kondrak Date: Fri Jun 14, 2002 8:26pm Subject: The spy in your pocket > >http://www.comlinks.com/mag/pocket.htm >The Spy in Your Pocket > >by Alan Simpson > >Millions of businessmen around the world go to meetings, >listen to >briefings, and travel around not realizing they have one of >the most >efficient bugs eavesdropping on their conversations, and >telling the >world who they are, where they are, and who else is with >them. > >This is not a microchip from the NSA, not even a bug to be >found by >sweeping buttons and belt buckles. No this is the common >cellphone, or >digital mobile. In many cases you need not even switch it on >for it to >be used as a bugging device. The authorities can do that for >you, and >reconfigure the handset so you will never know it is >transmitting. > >Few details emerge as to the extent of monitoring >cellphones, only >when there have been problems, or when a high profile arrest >is made. >There was a series of highly publicized mailbox pipe bombs >that caused >havoc across the United States, early in 2002. In May it was >learned >that the prime suspect was Luke Helder, but the problem was >he had >disappeared, and evaded capture by the police. He did make >one mistake >that cost him his freedom. He turned on his cellphone. He >did not need >to call anyone for he had just electronically told the >network "my >identity is. and I am here at.." to access the network, and >start the >billing process. > >The FBI were alerted by the phone company, and immediately >called the >local police. Helders cellphone was acting like a beacon, >and calling >out for the police to come and arrest him. > >Major Rick Bradley of the Nevada Highway Patrol commented, >"We got a >call from the FBI at approximately 3.20 p.m. that the cell >phone had >been activated somewhere between Battle Mountain and >Golconda. We >started hitting Interstate 80" > >This remote region would have been a perfect hiding place >for Helder >had not the FBI been able to triangulate his position, using >his >cellphone as a beacon. > >This triangulation is causing concerns for privacy >advocates, for not >only can a cellphone be identified, monitored, but it can >easily be >tracked. The alibi may be that the user was playing Poker >downtown, >but the cellphone trackers may prove otherwise. And consider >if the >cellphone id's of known associates are available to law >enforcement. >They can tell where you were, and who was with you, or to be >precise >near you. > >An even more scary feature on many new digital devices is >that the >software can be remotely programmed. This allows patches to >be added >to all the users software on the network, without having >subscribers >come into a sales office and have their handsets >reprogrammed. It also >allows multiple technical and operating features to be >changed, or >added at the convenience of the user. But with convenience >comes risk. >Not only can the real network operator change your >cellphone, so can a >technology savvy interloper, armed with the right electronic >equipment. This equipment is only available to government >agencies. >The criminals of course been smarter than most government >agencies >were probably the first to use it! > >This raises serious concerns for businesses such as Banks, >and high >tech development companies. If a cellphone can be remotely >activated, >either from the legitimate network, or a pseudo network >simulator, >hidden in a briefcase nearby, then cellphones can be >switched on to >monitor meetings. Today many large corporations, Banks, and >Financial >Institutions require all cellphones to be switched off, left >outside >meeting and conference rooms, and in many cases have their >batteries >removed for additional security. > >As more and more technical features are added to these >mobile wireless >networks, the risks for eavesdropping, and tracking the >users become >easier. What may seem a simple benefit for the public can be >used for >"Big Brother" tactics by a intrusive government. In America >the "911" >feature is causing concern, for this will give constantly >updated >locations of every cellphone. In Britain this has been in >place for >several years and law enforcement were overjoyed at having >the >population carrying voluntary beepers giving out their >location. The >loophole in the law that allows this tracking is that >listening to the >conversations, the content of a telephone call, needs a >Court Order. >But the monitoring of locations, and directions as the user >travels >from cell to cell does not. > >Drug dealers are well aware of these issues with their >cellphones, and >routinely steal handsets from the unsuspecting public. They >can then >conduct transactions, and move on to another number, on >another >stolen, or reprogrammed handset. This use by drug dealers >only becomes >public when it hits the courts, usually after someone screws >up the >process. Recently in Baltimore there was a court exchange >between Drug >Enforcement , and Nextel, where Nextel computers shut off >the stolen >cellphones for non-payment, and the DEA wanted them left on >so they >could monitor the drug dealers. Some dealers became >suspicious when >their stolen phones were switched off, then on again, and >off again, >and on again without paying a dime. So you haven't paid any >bills for >six months, and the generous phone company switches the >phone back on. >How kind! > >As more and more devices are being connected to the wireless >network, >users must beware that communications are far from secure. >Even the >algorithms that supposedly protect the contents have been >shown to be >weak, and easily circumvented. Anyone using wireless for >computers >needs to consider encrypting their files, and email. Never >send >anything over wireless that is confidential, unless it has >several >layers of strong encryption. The problem with that statement >is of >course that the all seeing US Government will not let its >businessmen >abroad use such safeguards, insisting that they use only >export >approved weak encryption. > >In the meantime remember, especially on overseas visits, >that >cellphone is a beacon telling the authorities who you are, >where you >are, who you are meeting, and if they so desire, the >contents of your >conversations. 5655 From: kondrak Date: Sat Jun 15, 2002 11:08am Subject: Re: Confusing roadside equipment in Pennsylvania It doesn't look like the radiation detectors they're using now...here's a picture of the truck scanners we've seen crop up at the international borders near me. http://www.saic.com/ At 23:27 6/14/02 -0400, you wrote: >Here in Westchester County, NY, we have some height detectors on the >non-commercial parkways. First you see a pole resembling that photo, then a >little ways down the road they have a sign that lights up and a warning >signal so wandering truck rigs don't get stuck under a bridge. > > >cp 5656 From: Shawn Hughes Date: Sun Jun 16, 2002 11:44am Subject: vehicle scanning The item shown on the top page of www.saic.com isn't a radiation detector. That's VACIS, a giant x-ray machine for snooping inside giant containers. Shawn Hughes Technician in Transition 5657 From: iDEN-i100 Date: Mon Jun 17, 2002 6:44am Subject: Cellphone explodes According to a report on the local ETTV television channel, a cellphone has exploded in Taiwan, injuring its owner, who was only identified by her surname, Chen. The TV channel reported the woman as saying "The phone heated up and I could feel the heat coming from my bag, but I did not pay attention because I was eating. A few minutes later it exploded. The hot debris burned my arms and feet." The woman said that she had purchased the phone about a year ago, and had made a phone call just ten minutes prior to the "explosion". She has reported the issue to the police and is demanding compensation from the unidentified manufacturer. This appears to be the first case of a cellphone fault causing an explosion, although a phone apparently exploded in Russia earlier this month, but is claimed to have been an actual bomb disguised as a cellphone. www.cellular-news.com/story/6944.shtml 5658 From: A Grudko Date: Mon Jun 17, 2002 8:16am Subject: Re: Cellphone explodes I had a Kenwood portable W/T burst into flames in my car 2 years ago - suspected short. And of course Ni-MH batteries carry a warning sticker - "...may explode if disposed of in fire" Andy Grudko South Africa - www.grudko.com - Original Message - From: iDEN-i100 > According to a report on the local ETTV television channel, a cellphone > has exploded in Taiwan, injuring its owner, who was only identified by > her surname, Chen. The TV channel reported the woman as saying "The > phone heated up and I could feel the heat coming from my bag, but I did > not pay attention because I was eating. A few minutes later it exploded. > The hot debris burned my arms and feet." > The woman said that she had purchased the phone about a year ago, and > had made a phone call just ten minutes prior to the "explosion". She has > reported the issue to the police and is demanding compensation from the > unidentified manufacturer. > www.cellular-news.com/story/6944.shtml 5659 From: kondrak Date: Mon Jun 17, 2002 10:02am Subject: Re: Cellphone explodes A fully charged AA Ni-Cad can deliver several amps to a directly shorted terminal, I don't doubt a Ni-Mh can do likewise. This has always been a problem in shipping, especially on aircraft. Airlines are quite demanding about shipping anything like this for safety reasons. Imagine a fully charged battery contacting some aluminium foil in the cargo bay. Poof, fire! Batteries are generally shipped with some sort of charge in them, even brand new never charged ones. Care should always be taken to isolate a battery from the device it powers, wrap it in insulating material (plastic bag) and provide a cushioned shipping container. (Corrugated cardboard works fine). I don't imagine the UPS guy (commonly known as the OOps guy) would appreciate his truck catching fire any more than an aircraft pilot. At 15:16 6/17/02 +0200, you wrote: >I had a Kenwood portable W/T burst into flames in my car 2 years ago - >suspected short. > >And of course Ni-MH batteries carry a warning sticker - "...may explode if >disposed of in fire" > >Andy Grudko >South Africa - www.grudko.com I similarly had a Motorola MT500 come into the shop with the battery melted due to a short. Batteries have a vent to bleed off pressure should a short occur, as the electrolyte generally contains a good amount of water. Should this vent fail to perform, the real possibility of a steam explosion exists. This is probably what this woman experienced. 5660 From: kondrak Date: Mon Jun 17, 2002 10:07am Subject: Re: vehicle scanning I know they have rad detectors, sound detectors and that device installed at the bridges from Canada now for truck traffic. I see them in use all the time. I thought the SAIC device did rad monitoring as well. Will have to look into it further. Thanks or the report Shawn. At 12:44 6/16/02 -0400, you wrote: >The item shown on the top page of www.saic.com isn't a radiation detector. >That's VACIS, a giant x-ray machine for snooping inside giant containers. > > > >Shawn Hughes >Technician in Transition 5661 From: Aimee Farr Date: Mon Jun 17, 2002 11:51pm Subject: RE: Re: Please help Russia > > Did we goof up? > > > > Are we blind, deaf, ignorant of history? > > > > Apparently so. > > > > Steve ...."a certain step of a military nature that the Pentagon proposed to take for the purpose of strengthening our military posture in a region not far from the Soviet frontiers. I paled....It was at once apparent to me that had I been a Soviet leader, and had I learned...that such a step was being taken, I would have concluded the Americans were shaping their preparations towards a target of war within six months." -- George Kennan (who stomped on that plan) Whatever one thinks of Kennan, because we associate our actions with our own self-image, we don't see that other countries can view our actions as COMPELLINGLY hostile or limiting, despite any security justification (everybody always has one). As a result, we misperceive their reactions to our actions as overly hostile in turn. Deepening misunderstandings lead to self-fulfilling prophesies (The Weimar Russia scenario.) If you misperceive another country as hostile, they will become hostile, and then it's too late to say you're sorry, because you've reached a true state. In which case, you have no choice but to make your wrong right. Should we ever mishandle Russia's transition, that can carry a price tag with a payload. I didn't mean to be unfair or disrespect Russian values or interests....and I just felt a little bad for being so nasty. Nevertheless, Russia's signals....not all positive. ~Aimee 5662 From: iDEN-i100 Date: Tue Jun 18, 2002 7:51am Subject: Synnex to Recall Mobile Phone Batteries After Handset Explodes Synnex to Recall Mobile Phone Batteries After Handset Explodes http://quote.bloomberg.com/fgcgi.cgi?T=marketsquote99_news.ht&s=APQ7qHRatU3lubmV4 -- [Non-text portions of this message have been removed] 5663 From: zack <10-33@c...> Date: Tue Jun 18, 2002 8:48am Subject: Why me ??? Has anyone received this type of mail ??? Or am I getting the wackos.......... or does someone on this list know I wrap huge amounts of aluminum foil on my head because of microwave ..........0<" <<http://kr.geocities.com/wbxrose>>> visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." George W Bush God Bless The USA .. NEVER forget 9-11-01 http://www.copscops.com/blessusa.htm [Non-text portions of this message have been removed] 5664 From: James M. Atkinson Date: Tue Jun 18, 2002 9:36am Subject: Re: Why me ??? Ah, Grasshopper, let me impart some secret TSCM knowledge and reveal a sacred mysteries to you. Once you have reached a certain level in the profession you will start getting approached by two types of "undesirables". You have to treat these contacts with the utmost of professionalism, compassion, but also with an unwavering sternness. The first of these "undesirables" are people who want to by illegal eavesdropping devices. They all claim to have money to wave around, and all of them have a sob story about their cheating spouse, their business partners are ripping them off, there daughter is banging the local drug lord and so on. All you can do is to educate them that what they are doing involves committed at least 9 federal felonies, and that not only will you not assist them, but you will not refer them to any one who can. The second type of "undesirables" are people who suffer some various levels of mental illness. Usually they come up with completely irrational (but well researched) problems involving mind control, electronic harassment, voices, aliens from Venus and so on. Your best bet to not to engage them in a debate on the technical aspects, but simply tell them that there is nothing you can do for them and that they should seek immediate medical assistance. You have to be compassionate, and understanding, but their version of reality is so badly warped that they are incapable of being reasonable. When you get such contacts simply pat yourself on the back, and realize that it's just part of making your bones in the profession. -jma At 9:48 AM -0400 6/18/02, zack wrote: >Has anyone received this type of mail ??? Or am I getting the >wackos.......... or does someone on this list know I wrap huge amounts of >aluminum foil on my head because of microwave ..........0<" > ><<someone is doing an experiment on me. >I mean an experiment on a living creature. > >it's kind of hard to explain this situation. > >Base: liquid thing interacting with human body in itself. >1. they raise some koreans(about 20) and put liquid thing into their body. >2. Using satellite, they located korean's liquid thing around me and also >put liquid thing > into my body, also liquid thing in my body is interacting with that >korean's liquid thing. > >can you believe this? >please, trust me !!! (served in US Army as SWAT team). >maybe next time i can explain more details about this situation. > >I am sending a help mail to many people, but i think that >my uni. of Hanyang uni. in seoul of south korea is most important. >please, help me to bring attention of Hanyang uni. to me. >(name: Kim chulmin, student# : 91007940, department : industrial engineering) > >I wrote down this situation in korean. >http://kr.geocities.com/wbxrose>>> > > >visit http://www.copscops.com >Washington DC Police Department http://mpdc.dc.gov/main.shtm > >"Unity... Resolve... Freedom. These are the hallmarks of the American spirit." > George W Bush > >God Bless The USA .. NEVER forget 9-11-01 >http://www.copscops.com/blessusa.htm > > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5665 From: James M. Atkinson Date: Tue Jun 18, 2002 10:08am Subject: Re: vehicle scanning Most of the major bridges and roadways around Boston, New York, and DC now have radiation detectors mounted on them. They are typically spaced four feet apart underneath a bridge or similar structure that crosses the road (like a big highway sign). I have personally seem then as well, and understand that hundreds of them where quietly installed in the days after 9/11. -jma At 11:07 AM -0400 6/17/02, kondrak wrote: >I know they have rad detectors, sound detectors and that device installed >at the bridges from Canada now for truck traffic. I see them in use all the >time. I thought the SAIC device did rad monitoring as well. Will have to >look into it further. >Thanks or the report Shawn. > > >At 12:44 6/16/02 -0400, you wrote: >>The item shown on the top page of www.saic.com isn't a radiation detector. >>That's VACIS, a giant x-ray machine for snooping inside giant containers. >> >> >> >>Shawn Hughes > >Technician in Transition -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5666 From: Date: Tue Jun 18, 2002 2:47pm Subject: Building a Safer Cell Phone Antenna Building a Safer Cell Phone Antenna Wireless.NewsFactor.com Scientists at a British university, taking advantage of their research in GPS (global positioning system location-based technology, have reported a breakthrough in antenna design that could result in safer mobile phones. Engineers at Loughborough University's Centre for Mobile Communications Research (CMCR) say their work may yield a new antenna that will reduce cell phone radiation emissions absorbed into the body. The small-scale antenna initially was designed for devices receiving GPS signals from satellites, CMCR head Yiannis Vardaxoglou told NewsFactor. However, the researchers later discovered that the antenna had a low radiation SAR (specific absorption rate). While some of the radio frequency radiation emitted by mobile phones is dissipated into the air, some is absorbed in the user's head. Given the widespread concern over potential health hazards associated with cell phone use -- hazards that are, as yet, unproven -- a reduction in emissions would represent a significant development in phone safety. A reduction in the SAR of up to 85 percent was accomplished, Vardaxoglou explained, by creating an antenna using helical, or spiral, copper tracks etched into a small ceramic cylinder. The antenna measures about one centimeter in diameter by one centimeter in length. ---------- http://www.intelligentx.com/newsletters/technology/articles/story_tech2_061802.html [Non-text portions of this message have been removed] 5667 From: Aimee Farr Date: Tue Jun 18, 2002 3:59pm Subject: Why US? ....liquid Korean images off and on all day.... :-].... (It's disturbing because it's not like a movie, somebody is really perceiving that experience.) Assimilation to existing images and perceptual satisficing: Once you "hit" on an idea or a theory, it tends to preserve and reinforce itself. People buy the first shoe that seems to fit. Conspiracy theorists become 'seduced' by their theory. The rabbit they are chasing always seems to get closer, its presence is continually confirmed. (1) Expectations determine what you see. (2) What you see confirms your expectations. For whatever reason, for some people it's "liquid Koreans." For others, angels, devils, demons and mythological figures of their times. However, your mind does the same thing, just with different objects. To get somebody to see they do this requires a structured sensitization experience so as to put them at a psychological gunpoint. --- THE PATTERN PRINCIPLE IN HYPOTHESIS FORMATION* -- The amount of stimuli needed before hypothesis formation is inversely proportionate with the compatibility of this evidence with any well-known pattern. (The perceiver's schemata.) THE COGNITIVE CLOSURE & CONFIRMATION PRINCIPLE* -- The amount of stimuli needed for cognitive closure is inversely proportionate to the degree of expectation. For the above reasons, contingency planning, or at least having some procedure to handle recurring problems or likely issues, is always a good idea, because it allows you to quickly recognize and deal with problems. Furthermore, having a good contingency plan is a deterrent. That statement sounds very "right" to most people, but especially to adversarial planners. It is unwise to attack an enemy without a plan. Not your plan, the enemy needs a plan. If the enemy lacks a plan, you have to give them one. Thus, it's often impossible to surprise somebody that isn't prepared. I suppose it's an odd balance. ~Aimee *My silly tags, not "official" principles. 5668 From: ed Date: Tue Jun 18, 2002 11:38am Subject: James Bamford talk on NSA on CSPAN unfortunately i just learned of this, but videotapes of this are available for anyone interested. -ed >With the recent revelations about U.S. intelligence failures regarding the >tragedy of 9/11, we are pleased to announce that starting this Sunday, >C-SPAN2/Book TV will begin showing our very timely Independent Policy >Forum event, "Big Brother is Watching," > held before a >capacity crowd at The Independent Institute with investigative journalist >JAMES BAMFORD (author of BODY OF SECRETS: Anatomy of the Ultra-Secret >National Security Agency >): > >* Sunday, June 16, at 6:35 a.m. Pacific Time (9:35 a.m. Eastern) >* Sunday, June 16, at 3:30 p.m. Pacific Time (6:30 p.m. Eastern) >* Monday, June 17, at 3:35 a.m. Pacific Time (6:35 a.m. Eastern) > >Changes in the schedule may be posted at: . > >Among the many highlights of Bamford's talk: > >* An overview of the little-known National Security Agency, which monitors >communications around the globe, and -- with more than 30,000 employees >and an annual budget exceeding $5 billion -- is by far the world's largest >intelligence agency. > >* For more than three decades prior to 1975, but without a search warrant, >the NSA monitored every telegram sent to or from the United States through >Western Union. > >* During Bamford's research for his book, BODY OF SECRETS, he obtained >documents related to "Operation Northwoods," a plan drawn up and approved >by the U.S. Joint Chiefs of Staff in the early 1960s to commit covert >terrorist assaults upon Americans to generate popular support for a war >against Cuba. > >* The creation of a new Department of Homeland Security will accelerate >the threat to civil liberties posed by the government's >"security-industrial complex." > >* Despite its size and budget, the volume of electronic communications >worldwide routinely overwhelms the bureaucratic NSA's ability to process >the information it gathers in enough time to protect Americans. > >Indeed, the day following Bamford's talk at The Independent Institute, a >news report claimed that the NSA monitored a pre-Sept. 11th telephone >conversation between hijackers Khalid Shaikh Mohammad and Mohamed Atta, >and this information was never passed along. > >See "Another U.S. agency had clues before Sept. 11, some officials say," >(MERCURY NEWS, 6/7/02) at >. > >If you don't have television access to C-SPAN2/Book TV, you can watch the >program on-line at the scheduled time at: >. In addition, transcripts, audio tapes, >and videos of this program can be ordered directly from The Independent >Institute by visiting the following web page: > 5669 From: Kutlin, Josh Date: Tue Jun 18, 2002 3:47pm Subject: RE: vehicle scanning http://www.saic.com/cover-archive/transport/vacis.html FYI: Taken from link: "VACIS was first introduced in 1995 to inspect cargo trucks for drugs and other contraband at key U.S.entry points. Now, it also is used to scan vehicles and railcars moving at moderate rates of speed. Because of its proven success and advanced capabilities, SAIC has supplied the U.S. Customs agency with numerous VACIS units. Using highly penetrative gamma rays, system operators view vehicle or container images on a video monitor. They can readily see voids, false walls, or ceilings, and other secret compartments typically associated with illicit drug transportation, explosives, and weapons. The images also can verify that the actual cargo is consistent with a declared manifest." Josh -----Original Message----- From: Shawn Hughes [mailto:srh@e...] Sent: Sunday, June 16, 2002 12:45 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] vehicle scanning The item shown on the top page of www.saic.com isn't a radiation detector. That's VACIS, a giant x-ray machine for snooping inside giant containers. Shawn Hughes Technician in Transition ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5670 From: kondrak Date: Wed Jun 19, 2002 0:27am Subject: Now.. the Tooth-Phone ? ? > > > >Boy, does this have the makings of some great gags...! ! ! >( battery dead ? suck a lemon...) >====================================== > >Will 'Tooth Phone' Take Bite Out of Mobiles? >June 18, 2002 05:48 PM ET > >LONDON (Reuters) - British engineers say they have invented a >revolutionary tooth implant that works like a mobile phone and would not >be out of place in a James Bond spy movie. > >The 'tooth phone', designed by James Auger and Jimmy Loizeau, consists of >a tiny vibrator and a radio wave receiver implanted into a tooth during >routine dental surgery. > >The implant does not yet have its own microchip installed, but Auger says >the technology is tried and tested, and a fully functional phone could be >put together in no time at all. > >"With the current size of microchips this is feasible. They are now small >enough to implant in the tooth," he told Reuters on Tuesday. > >Sound, which comes into the tooth as a digital radio signal, is >transferred to the inner ear by bone resonance, meaning information can >be received anywhere and at any time -- and nobody else can listen in. > >The invention raises the prospects of financial traders receiving the >latest stock market bulletins while at the cinema and politicians tuning >in to secret briefings from advisers while being quizzed by opponents. > >Despite its similarity to high tech gadgets dreamt up by Bond's faithful >sidekick 'Q', the inventors believe the gizmo could become the first in a >whole suite of non-medical devices implanted into the human body. > >http://www.reuters.com/news_article.jhtml?type=technologynews&StoryID=110 >5673 5671 From: nzsweeperman Date: Wed Jun 19, 2002 11:19pm Subject: Introduction from N.Z. Hi All, My name is Steve Willetts - I have been working in the Electronic Countermeasure field for over 25 years down here in New Zealand. I was introduced to this site a couple of weeks ago and have taken the time to go through quite a few of the archives before venturing into the arena. Some very interesting comments and information. Keep up the good work. Regards Steve. (Electronic Countermeasures is not a Profession to be taken lightly especially when it is your Profession at stake.) 5672 From: David Alexander Date: Thu Jun 20, 2002 9:54am Subject: E: why us ? Aimee >It is unwise to attack an enemy without a plan. Not your plan, the enemy needs a plan. If the enemy lacks a plan, you >have to give them one. Thus, it's often impossible to surprise somebody that isn't prepared. There is an old military axiom that says: 'No plan ever survives first contact with the enemy' which supports your proposition. I vote for it. regards _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] From: James M. Atkinson Date: Thu Jun 12, 2003 10:53pm Subject: The Economics and Politics of Cows The Economics and Politics of Cows ----- DEMOCRAT You have two cows. Your neighbor has none. You feel guilty for being successful. You vote people into office that put a tax on your cows, forcing you to sell one to raise money to pay the tax. The people you voted for then take the tax money, buy a cow and give it to your neighbor. You feel righteous. Barbara Streisand sings for you. REPUBLICAN You have two cows. Your neighbor has none. So? SOCIALIST You have two cows. The government takes one and gives it to your neighbor. You form a cooperative to tell him how to manage his cow. COMMUNIST You have two cows. The government seizes both and provides you with milk. You wait in line for hours to get it. It is expensive and sour. CAPITALISM, AMERICAN STYLE You have two cows. You sell one, buy a bull, and build a herd of cows. DEMOCRACY, AMERICAN STYLE You have two cows. The government taxes you to the point you have to sell both to support a man in a foreign country who has only one cow, which was a gift from your government. BUREAUCRACY, AMERICAN STYLE You have two cows. The government takes them both, shoots one, milks the other, pays you for the milk, and then pours the milk down the drain. AMERICAN CORPORATION You have two cows. You sell one, lease it back to yourself and do an IPO on the 2nd one. You force the two cows to produce the milk of four cows. You are surprised when one cow drops dead. You spin an announcement to the analysts stating you have downsized and are reducing expenses. Your stock goes up. FRENCH CORPORATION You have two cows. You go on strike because you want three cows. You go to lunch. Life is good. JAPANESE CORPORATION You have two cows. You redesign them so they are one-tenth the size of an ordinary cow and produce twenty times the milk. They learn to travel on unbelievably crowded trains. Most are at the top of their class at cow school. GERMAN CORPORATION You have two cows. You engineer them so they are all blond, drink lots of beer, give excellent quality milk, and run a hundred miles an hour. Unfortunately they also demand 13 weeks of vacation per year. ITALIAN CORPORATION You have two cows but you don't know where they are. While ambling around, you see a beautiful woman. You break for lunch. Life is good. RUSSIAN CORPORATION You have two cows. You have some vodka. You count them and learn you have five cows. You have some more vodka. You count them again and learn you have 42 cows. The Mafia shows up and takes over however many cows you really have. TALIBAN CORPORATION You have all the cows in Afghanistan, which are two. You don't milk them because you cannot touch any creature's private parts. Then you kill them and claim a US bomb blew them up while they were in the hospital. POLISH CORPORATION You have two bulls. Employees are regularly maimed and killed attempting to milk them. FLORIDA CORPORATION You have a black cow and a brown cow. Everyone votes for the best looking one. Some of the people who like the brown one best, vote for the black one. Some people vote for both. Some people vote for neither. Some people can't figure out how to vote at all. Finally, a bunch of guys from out-of-state tell you which is the best-looking cow. NEW YORK CORPORATION You have fifteen million cows. You have to choose which one will be the leader of the herd, so you pick some cow from Arkansas. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7444 From: gkeenan Date: Sat Jun 14, 2003 9:26am Subject: test I apologize both for the test and the cross-posting, but I think I'm having trouble with yahoo again. It may also be my server because I'm not receiving anything from some of the other lists that are not on yahoo. Jerry GPKeenan Co., Int'l Security Services 1005 Celia St. West Islip, NY 11795-2053 (631) 587-4020 (ph) (516) 768-9602 (cell) (530) 323-6832 (Jfax) gkeenan@s... secureops@e... [Non-text portions of this message have been removed] 7445 From: Steve Uhrig Date: Sun Jun 15, 2003 9:24pm Subject: Re: Specialist CCTV Unit On 16 Jun 2003 at 3:01, Ocean Group wrote: > We've got a customer who has asked for a proposal on a specialist CCTV > outdoor unit for extreme conditions. I found one supplier here: I would suggest sticking with Pelco. They have a ruggedized/stainless Spectra III which is what you need. www.pelco.com. They have distributors all over the world, but in a pinch you can get it from me. Pelco is the world's largest professional supplier, and superb tech support. I have 100% Pelco with many Spectras installed at Tom Clancy's estate -- a fairly substantial system. The camera itself is not the only thing. You need a controller. That can get complicated. For the Pelco Spectra, you would use a KBD-300A. All spec sheets on their website. You want everything to be from one manufacturer, so you only have one place to call for tech support. If you mix manufacturers, each will point the finger at each other if problems. > The system also needs to be implemented alongside some older CCTV > units previously installed running on standard co-ax. The Spectra, as are most high end cameras, is 24VAC power in and composite video out on coax.. Control is via one data pair of something like Cat 5. Power can be a few pairs in the same cable depending on distance you need to run. You can get plug in options for video out on fiber or twisted pair. Almost everything is compatible if your work is designed by someone who knows the industry well. Don't let the client force you into taking shortcuts against your judgement. Do it right. Presuming you're 50 cycle mains, make sure anything you buy is PAL format. Pelco can supply either. 50 cycle countries use PAL. 60 cycle mains countries use NTSC. The two are *not* compatible. Depending on what you need to do, you may want to expand to a matrix switch. I would recommend the CM6800 as a friendly, powerful, inexpensive and reliable matrix switch. I've installed more of them than I can remember, all over the world. If you use a matrix switch, you'd still use one or several KBD-300 keyboards for control, but you would be able to send pan/tilt/zoom and all other commands back up the same coax bringing video back down ('Coaxitron'), and not need to run separate data pairs. The commands are sent during the vertical interval pulse, and it's 100% reliable. If you need to replace existing fixed cameras now or in the future with pan/tilt ones, using Coaxitron control allows you merely to drop the new camera in and not have to run any additional conductors for command data. Another reason to use a Pelco matrix switch. There are other manufacturers, but for everything other than recording I use Pelco. For recording on analog videotape I use Panasonic AG-6740 and for digital -- now 90% of my work -- I use nothing but Everfocus www.everfocus.com. I am sure there are distributors in Ireland for all these lines. If you have any problems with supply, I can get you anything at competitive prices. Hope this helps. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7446 From: Steve Uhrig Date: Sun Jun 15, 2003 11:06pm Subject: Re: Location of GPS antenna On 15 Jun 2003 at 21:46, mooty wrote: > why does a mobil unit need to be placed near a vehicle window? Not knowing who you are or your reason for asking, I won't go into a lot of detail. You were lucky. I live in a one story wood house, and periodically I lock onto some birds probably via multipath through windows. Indoors is *not* reliable. You need a minimum of 3 birds continually for lat/long info, and a 4th for altitude. Your antenna may be larger than those used in covert GPS tracking (which BTW works so poorly it's largely a waste of money). The covert antenna looks like a half melted ice cube, usually with a magnetic mount or sometimes sticky tape. Your antenna on your handheld unit has an effective feedline length of zero. The antenna, for all practical purposes, is attached directly to the input of the receiver. In a mobile installation, there will be some length of feedline involved between the antenna and electronics package. Feedline is lossy at GPS frequencies. Most decent mobile antennas have built in preamplifiers to try to compensate for feedline loss. While this helps, the preamp also adds noise meaning you need to hear a louder signal from all the birds to overcome the noise, and the preamp needs power. An auto is effectively a Faraday Cage, or shielded room. It's mostly metal, causing reflections -- called multipath -- which tend to cancel the desired signal due to timing differences. Remember ghost images on your TV in the days before cable? This is what happens with multipath, and you're trying to flow significant amounts of data. The metal shields the antenna from seeing the horizon in 360 degrees always, which is necessary for reliable operation. Your house probably is not well shielded to RF (it doesn't need to be). The most you might have is aluminum siding or foil backed insulation in the roof. Turn a metal wastebasket upside down over your handheld receiver and see in 15 minutes how many birds you have. The car is full of electronics in very close proximity --- inches in most cases -- to the GPS receive antenna. This electronics all radiates noise which kills the front end of the GPS receiver, meaning you need a lot louder signal, as mentioned above, to overcome the noise. Try setting your handheld unit on top of something electronic, like your computer chassis or an operating television, and see if it still works. Turn on a Dremel tool or hairdryer near it and leave it run for 15 minutes and see if you still see any satellites. Dremel tools and hairdryers are used by mobile radio installers as noise generators to help with filtering and shielding efforts. The car and most places you would mount the antenna is very close to the ground. Signals from the satellites bounce off the ground, adding to the multipath problem. Antenna close to the ground means a lot more things around to block the signal from the birds. This should give you an idea. Mobile covert GPS is very difficult to use, and for all practical purposes impossible despite all the spy shop hype. Problem is, the thing will still give you a track based on dead reckoning, but it will be wrong -- and you won't know it's wrong. As a collateral issue, in the U.S. most live GPS trackers (as opposed to those recording instead of reporting position info live) use the CDPD network for the downlink. Cellular Digital Packet Data, in spite of the name, uses the *analog* cellular network. The FCC recently issued a mandate decommissioning ALL analog cell including CDPD by the end of 2005. Any live reporting tracking system using CDPD to report will not function for more than about another year or so. Outside the U.S. this will not apply as usually a GSM downlink is used. Many police radio car Mobile Data Terminals use CDPD, so MDTs all will have to start the conversion to some digital comm link very soon. This should give you some idea of the state of the onion. If you happen to represent a law enforcement agency, call me Tuesday during business hours and I will be glad to go into some detail in answer to your question. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7447 From: Fernando Martins Date: Mon Jun 16, 2003 0:58am Subject: Re: Re: Specialist CCTV Unit > The Spectra, as are most high end cameras, is 24VAC power in and > composite video out on coax.. Spectra can be 110/230VAC so be aware of the exact reference of the product you need. You also must choose the type of mount and see if there is no need for extra adapter, Spectra have his own list/catalog of adapters. In the product specification sheet there is a very nice explanation of the product references, where a specific string can tell you the video format, or the mount, or the electrical power needed, or the lens, or ... everything yo need to know. ftp://www.pelco.com/ProductSpecs/22440.PDF FM 7448 From: James M. Atkinson Date: Mon Jun 16, 2003 2:49am Subject: Hillbilly Vasectomy Hillbilly Vasectomy After having their 11th child, a North Georgia Mountain couple decided that 11 was enough, as they could not afford a larger bed. So the husband went to his veterinarian and told him that he and his cousin didn't want to have any more children. The doctor told him that there was a procedure called a vasectomy that could fix the problem but that it was expensive. A less costly alternative, said the doctor, was to go home, get a cherrybomb (fireworks are legal in the North Georgia Mountains), light it, put it in an empty beer can, then hold the can up to his ear and count to 10. The redneck said to the doctor, "I may not be the smartest man in the world, but I don't see how putting a cherry bomb in a beer can next to my ear is going to help me." "Trust me, " said the doctor. So the man went home, lit a cherry bomb and put it in a beer can. He held the can up to his ear and began to count: 1 2 3 4 5 At which point he paused, placed the beer can between his legs, and resumed counting on his other hand. This procedure also works in Kentucky, Mississippi, and West Virginia. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- 7449 From: Ocean Group Date: Fri Jun 13, 2003 7:13pm Subject: RE: The Economics and Politics of Cows Irish Politicians... Your constituents have no cows... You convince them to buy two cows and promise the milk they will give can be used to repay the cost of the cows... The farmers rebel and buy two million cows... Milk now not worth anything... Farmers have no money... They complain and secretly feed some of the cows to the other cows to save on hay.... Eventually the politicians get sick of the complaining and subsidise them 70% of their costs... All the cows then develop some strange disease and they all go mad... Farmers claim they can't understand what happened... They blame politicians... Politicians blame the cows... The cows blame the price of milk... Politicians tired of mooing... Give another 30% subsidy to shut cows up... Farmers complain about having to go to the bank to collect subsidy cheque... Ireland joins EU... EU directive states that no farmer should have to go to the bank to collect cheques... Directive states that the mad cows are doing it already. Politicians confused as to what's happening to their country... And you thought you had it tough in the sweeping business. --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.474 / Virus Database: 272 - Release Date: 18/04/2003 7450 From: Doug Ellsworth Date: Fri Jun 13, 2003 10:08pm Subject: Waveguide Mixers on eBay Hi Group, Betcha someone on the List will buy these. The link will take you to waveguides, mixers and horns to 220 GHz. I'm not endorsing the seller. For a grand (currently) it might be of interest to youse who feel the need to see the frequency where the pearly gates resonates. http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=2537732905&category=25397 Your welcome, -Doug 7451 From: Ocean Group Date: Sun Jun 15, 2003 9:01pm Subject: Specialist CCTV Unit Hi, We've got a customer who has asked for a proposal on a specialist CCTV outdoor unit for extreme conditions. I found one supplier here: http://www.fvcctv.co.uk/Mic300.htm I was wondering if anyone has worked with these type of units or could recommend similar ones. These are for high chloride environments so something like stainless steel or high impact plastic would be required. The unit must also have a pan and tilt, downward looking and IR capability and there must be space for a good range zoom. The system also needs to be implemented alongside some older CCTV units previously installed running on standard co-ax. I'd appreciate any help and would be happy to discuss the project further should anyone have any ideas... Kind regards Oisin Ocean Group, Technical Security Division, Ireland. --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.474 / Virus Database: 272 - Release Date: 18/04/2003 7452 From: Hawkspirit Date: Mon Jun 16, 2003 10:21pm Subject: historical bug sweep articles Here are three new historical bug sweep articles just posted to my web site. Roger Tolces Electronic Security Los Angeles, Ca. The New Line on Wiretapping http://www.bugsweeps.com/info/new_line.html WANTED: Electronic Detectives http://www.bugsweeps.com/info/wanted.html How The Soviets Are Bugging America http://www.bugsweeps.com/info/soviets_bug.html 7453 From: James M. Atkinson Date: Tue Jun 17, 2003 7:22am Subject: HOW TO CALL THE POLICE...... HOW TO CALL THE POLICE...... George Phillips of Meridian Mississippi was going up to bed when his wife told him that he'd left the light on in the garden shed, which she could see from the bedroom window. George opened the back door to go turn off the light but saw that there were people in the shed stealing things. He phoned the police, who asked "Is someone in your house?" and he said no. Then they said that all patrols were busy, and that he should simply lock his door and an officer would be along when available. George said, "Okay," hung up, counted to 30, and phoned the police again. "Hello I just called you a few seconds ago because there were people in my shed. Well, you don't have to worry about them now cause I've just shot them all." Then he hung up. Within five minutes three police cars, an Armed Response unit, and an ambulance showed up at the Phillips residence. Of course, the police caught the burglars red-handed. One of the Policemen said to George: "I thought you said that you'd shot them!" George said, "I thought you said there was nobody available!" -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- 7454 From: James M. Atkinson Date: Tue Jun 17, 2003 7:35am Subject: Importance of water vs coke! Importance of water vs coke! We all know that water is important but I've never seen it written down like this before. 1. 75% of Americans are chronically dehydrated. (Likely applies to half world population.) 2. In 37% of Americans, the thirst mechanism is so weak that it is often mistaken for hunger. 3. Even MILD dehydration will slow down one's metabolism as much as 3%. 4. One glass of water will shut down midnight hunger pangs for almost 100% of the dieters studied in a University of Washington study. 5. Lack of water, the #1 trigger of daytime fatigue. 6. Preliminary research indicates that 8-10 glasses of water a day could significantly ease back and joint pain for up to 80% of sufferers. 7. A mere 2% drop in body water can trigger fuzzy short-term memory,trouble with basic math, and difficulty focusing on the computer screen or on a printed page. 8. Drinking 5 glasses of water daily decreases the risk of colon cancer by 45%, plus it can slash the risk of breast cancer by 79%, and one is 50% less likely to develop bladder cancer. Are you drinking the amount of water you should every day? COKE.......... 1. In many states (in the USA) the highway patrol carries two gallons of Coke in the trunk to remove blood from the highway after a car accident. 2. You can put a T-bone steak in a bowl of coke and it will be gone in two days. 3. To clean a toilet: Pour a can of Coca-Cola into the toilet bowl and let the "real thing" sit for one hour, then flush clean. The citric acid in Coke removes stains from vitreous china. 4. To remove rust spots from chrome car bumpers: Rub the bumper with a rumpled-up piece of Reynolds Wrap aluminum foil dipped in Coca-Cola. 5. To clean corrosion from car battery terminals: Pour a can of Coca-Cola over the terminals to bubble away the corrosion. 6. To loosen a rusted bolt: Applying a cloth soaked in Coca-Cola to the rusted bolt for several minutes. 7. To bake a moist ham: Empty a can of Coca-Cola into the baking pan,wrap the ham in aluminum foil, and bake. Thirty minutes before the ham is finished, remove the foil, allowing the drippings to mix with the Coke for a sumptuous brown gravy. 8. To remove grease from clothes: Empty a can of coke into a load of greasy clothes, add detergent, and run through a regular cycle. The Coca-Cola will help loosen grease stains. It will also clean road haze from your windshield. FOR YOUR INFORMATION: 1. The active ingredient in Coke is phosphoric acid. Its pH is 2.8. It will dissolve a nail in about four days. Phosphoric acid also leaches calcium from bones and is a major contributor to the rising increase in osteoporosis. 2. To carry Coca-Cola syrup (the concentrate) the commercial truck must use the Hazardous Material place cards reserved for highly corrosive materials. 3. The distributors of coke have been using it to clean the engines of their trucks for about 20 years! Now the question is, would YOU like a glass of water or coke ? -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- 7455 From: Robin Hunter Date: Mon Jun 16, 2003 4:04am Subject: Thought for the day Do not buy a dwarf with learning difficulties. ITS NOT BIG AND ITS NOT CLEVER!!!! ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. [Non-text portions of this message have been removed] 7456 From: Craig Meldrum Date: Mon Jun 16, 2003 5:36pm Subject: Contact Details I need to get a phone number for Dan Grissom of Taylor Group. I have his email but he is not responding to that. I would appreciate assistance. Thank you Craig =============================== Craig Meldrum, Managing Director Communications Security Ltd PO Box 8314, Symonds St Auckland, New Zealand Ph: 64-9-3093386 Fax: 64-9-3021148 =============================== 7457 From: Monty Date: Mon Jun 16, 2003 10:19pm Subject: Re: Re: Location of GPS antenna Steve My hat goes off to you on this one. I have never heard anyone descibe the problems so well and so simply. I have tried to explain these problems before, but had trouble getting the eggheads to understand real world problems compared to "LAB" testing. Hope if you don't mind if I borrow parts of this. Thanks Monty. --- Steve Uhrig wrote: > On 15 Jun 2003 at 21:46, mooty wrote: > > > why does a mobil unit need to be placed near a > vehicle window? > > Not knowing who you are or your reason for asking, I > won't go into a > lot of detail. > > You were lucky. I live in a one story wood house, > and periodically I > lock onto some birds probably via multipath through > windows. Indoors > is *not* reliable. > > You need a minimum of 3 birds continually for > lat/long info, and a > 4th for altitude. > > Your antenna may be larger than those used in covert > GPS tracking > (which BTW works so poorly it's largely a waste of > money). The covert > antenna looks like a half melted ice cube, usually > with a magnetic > mount or sometimes sticky tape. > > Your antenna on your handheld unit has an effective > feedline length > of zero. The antenna, for all practical purposes, is > attached > directly to the input of the receiver. > > In a mobile installation, there will be some length > of feedline > involved between the antenna and electronics > package. > > Feedline is lossy at GPS frequencies. > > Most decent mobile antennas have built in > preamplifiers to try to > compensate for feedline loss. While this helps, the > preamp also adds > noise meaning you need to hear a louder signal from > all the birds to > overcome the noise, and the preamp needs power. > > An auto is effectively a Faraday Cage, or shielded > room. It's mostly > metal, causing reflections -- called multipath -- > which tend to > cancel the desired signal due to timing differences. > Remember ghost > images on your TV in the days before cable? This is > what happens with > multipath, and you're trying to flow significant > amounts of data. > > The metal shields the antenna from seeing the > horizon in 360 degrees > always, which is necessary for reliable operation. > Your house > probably is not well shielded to RF (it doesn't need > to be). The most > you might have is aluminum siding or foil backed > insulation in the > roof. Turn a metal wastebasket upside down over your > handheld > receiver and see in 15 minutes how many birds you > have. > > The car is full of electronics in very close > proximity --- inches in > most cases -- to the GPS receive antenna. This > electronics all > radiates noise which kills the front end of the GPS > receiver, meaning > you need a lot louder signal, as mentioned above, to > overcome the > noise. Try setting your handheld unit on top of > something electronic, > like your computer chassis or an operating > television, and see if it > still works. Turn on a Dremel tool or hairdryer near > it and leave it > run for 15 minutes and see if you still see any > satellites. Dremel > tools and hairdryers are used by mobile radio > installers as noise > generators to help with filtering and shielding > efforts. > > The car and most places you would mount the antenna > is very close to > the ground. Signals from the satellites bounce off > the ground, adding > to the multipath problem. Antenna close to the > ground means a lot > more things around to block the signal from the > birds. > > This should give you an idea. Mobile covert GPS is > very difficult to > use, and for all practical purposes impossible > despite all the spy > shop hype. Problem is, the thing will still give you > a track based on > dead reckoning, but it will be wrong -- and you > won't know it's > wrong. > > As a collateral issue, in the U.S. most live GPS > trackers (as opposed > to those recording instead of reporting position > info live) use the > CDPD network for the downlink. Cellular Digital > Packet Data, in spite > of the name, uses the *analog* cellular network. The > FCC recently > issued a mandate decommissioning ALL analog cell > including CDPD by > the end of 2005. Any live reporting tracking system > using CDPD to > report will not function for more than about another > year or so. > Outside the U.S. this will not apply as usually a > GSM downlink is > used. > > Many police radio car Mobile Data Terminals use > CDPD, so MDTs all > will have to start the conversion to some digital > comm link very > soon. > > This should give you some idea of the state of the > onion. > > If you happen to represent a law enforcement agency, > call me > Tuesday during business hours and I will be glad to > go into some > detail in answer to your question. > > Steve > > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website > http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > __________________________________ Do you Yahoo!? SBC Yahoo! DSL - Now only $29.95 per month! http://sbc.yahoo.com 7458 From: Monty Date: Mon Jun 16, 2003 10:21pm Subject: Re: Re: Specialist CCTV Unit Have you had a look at Ultrak? They are expensive, but I think they are worth the investment. Monty --- Fernando Martins wrote: > > > The Spectra, as are most high end cameras, is > 24VAC power in and > > composite video out on coax.. > > Spectra can be 110/230VAC so be aware of the exact > reference of the product > you need. > You also must choose the type of mount and see if > there is no need for extra > adapter, Spectra have his own list/catalog of > adapters. > > In the product specification sheet there is a very > nice explanation of the > product references, where a specific string can tell > you the video format, > or the mount, or the electrical power needed, or the > lens, or ... everything > yo need to know. > > ftp://www.pelco.com/ProductSpecs/22440.PDF > > FM > > __________________________________ Do you Yahoo!? SBC Yahoo! DSL - Now only $29.95 per month! http://sbc.yahoo.com 7459 From: Denis Goodson Date: Tue Jun 17, 2003 1:37am Subject: NICE VISION Can anybody in the group tell me where I can obtain information on the NICE VISION CCTV System. I believe it is a US based company. Thanking ye kindly, Denis 5th Avenue Corporate Solutions Postnet Suite /101 Private Bag X01 Umhlanga Rocks South Africa 4320 [Non-text portions of this message have been removed] 7460 From: John M Date: Tue Jun 17, 2003 0:44pm Subject: Re: Specialist CCTV Unit I'd also suggest looking at what various DOT's are using for their equipment. Minnesota Department of Transportation has been using Pelco's on 50' poles, are exposed to temp extremes of minus 25 degrees F up to well over 100+ F, heavy rain, snow, ice, salt splash, etc. Over 250 of them up in the air, occasional problems, but for the most part - very good runners. __________________________________ Do you Yahoo!? SBC Yahoo! DSL - Now only $29.95 per month! http://sbc.yahoo.com 7461 From: ed Date: Tue Jun 17, 2003 0:48pm Subject: AMPS decommisioning schedule At 12:06 AM 6/16/03 -0400, Steve@s... wrote: "The FCC recently issued a mandate decommissioning ALL analog cell including CDPD by the end of 2005. Any live reporting tracking system using CDPD to report will not function for more than about another year or so." Steve, As a factual matter, the FCC did NOT "mandate decommissioning ALL analog cell including CDPD by the end of 2005." Last year the FCC rescinded (effective late Nov 2005) their long-standing mandate that required wireless carriers to also carry AMPS calls. Big difference. While many wireless carriers are likely chomping at the bit to dump AMPS (so they can force inferior--but more profitable--digital service on all their customers) they are in no way required by the FCC to do so. Large police agencies like the Delaware State Police, Philadelphia Police Dept, etc, that depend on CDPD for their MDT networks--and which are unlikely to fully deploy alternatives by 2006--are likely to convince carriers like Verizon to continue handling AMPS and CDPD traffic after November 2005. There is no government mandate that AMPS or CDPD be retired. -ed 7462 From: navyguyinil Date: Tue Jun 17, 2003 1:06pm Subject: Research for TSCM Equipment Book Hello TSCM Professionals. For the past two years I have been working on a book that will cover TSCM EQUIPMENT ONLY but in the future hope to write about some other aspects of TSCM. I have obtained a mass amount of information from many manufacturers and hope that I can rely on YOU to fill in the blanks. Once this master list is compiled and verified I will release a copy of all this information to the group with the permission of James M. Atkinson. Please email me sites, contacts, company lists (name address and contact information), personal research, saved information to me at navyguyinil@y.... If you have a substantial amount of information contact me and I will give you my military address because yahoo only supports up to 1-Mb attachments. Thank you for your help and I look forward to being able to present a finished product in the near future. Also if you would like to contact me during this research phase please e-mail me and I will send you an 800 number to call toll free. Thank you, Andrew Garrett 7463 From: Dave Emery Date: Tue Jun 17, 2003 1:29pm Subject: Re: Importance of water vs coke! On Tue, Jun 17, 2003 at 08:35:35AM -0400, James M. Atkinson wrote: > > FOR YOUR INFORMATION: > 1. The active ingredient in Coke is phosphoric acid. Its pH is 2.8. It will > dissolve a nail in about four days. I don't know whether anyone else on the list has had the experiance too, but more than once I have spilled Coke or Pepsi into an item of electronic equipement and had it completely disolve PC board copper etch destroying the PC board and the unit the Pepsi was spilled into. -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass 02493 PGP fingerprint 1024D/8074C7AB 094B E58B 4F74 00C2 D8A6 B987 FB7D F8BA 8074 C7AB 7464 From: James M. Atkinson Date: Wed Jun 18, 2003 7:53am Subject: Sweep Gear For Sale ... and now a word from out sponsors ... I would like to take just a moment and remind the list membership that we have a ton of NEW, USED, and NOS sweep gear for sale. I can provide attractive pricing on tool kits specifically designed for sweep work, audio amplifiers, digital X-Ray systems, high gain antenna's, OSCOR's, ORION's, CPM-700's, broad-band RF radiation monitors, special TSCM filter kits, and a ton of other special products. We also offer a huge amount of COMSEC gear, scrambling and encryption equipment, secure telephones, acoustic noise generators, white noise transducers, and so on. I also have for sale four brand new Radiance thermal imaging systems (very pricey) with the special sweep servos and rails so you can image an entire room though robotics control right into a computer that puts together a huge composite image, and then extracts the thermal anomalies from the composite images digitally. I also have eight USED Rockwell 95V-1 homodyne radio's for VME systems, seven Morrow V9085 VXI based spectrum analyzers (all in a VXI rack, with a high performance HP VXI CPU, plus mass media card, and DVD-R). Also available are some USED high performance HP COMB generators, Eaton impulse generators, Electrometrics '25 EMI receivers (with HP 7132 plotters). I would ask that list members let me know when they need any equipment; you will find it very beneficial and cost effective to buy all of your equipment here. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- 7465 From: James M. Atkinson Date: Wed Jun 18, 2003 8:24am Subject: Re: Importance of water vs coke! At 2:29 PM -0400 6/17/03, Dave Emery wrote: >On Tue, Jun 17, 2003 at 08:35:35AM -0400, James M. Atkinson wrote: > >> >> FOR YOUR INFORMATION: >> 1. The active ingredient in Coke is phosphoric acid. Its pH is 2.8. It will >> dissolve a nail in about four days. > >I don't know whether anyone else on the list has had the experiance >too, but more than once I have spilled Coke or Pepsi into an item >of electronic equipement and had it completely disolve PC board copper >etch destroying the PC board and the unit the Pepsi was spilled into. > > >-- >Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass 02493 >PGP fingerprint 1024D/8074C7AB 094B E58B 4F74 00C2 D8A6 B987 FB7D >F8BA 8074 C7AB I use it to clean heavy winch cables. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- 7466 From: kondrak Date: Wed Jun 18, 2003 1:30pm Subject: Re: Importance of water vs coke! Well, under the right condx ANY acid will do likewise.... BTW, you may want to check into the urban legends reference on this one, the part about the cops using it to remove blood, Is bogosity.... At 14:29 6/17/2003 -0400, you wrote: >On Tue, Jun 17, 2003 at 08:35:35AM -0400, James M. Atkinson wrote: > > > > > FOR YOUR INFORMATION: > > 1. The active ingredient in Coke is phosphoric acid. Its pH is 2.8. It will > > dissolve a nail in about four days. > > I don't know whether anyone else on the list has had the experiance >too, but more than once I have spilled Coke or Pepsi into an item >of electronic equipement and had it completely disolve PC board copper >etch destroying the PC board and the unit the Pepsi was spilled into. > > >-- > Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass 02493 >PGP fingerprint 1024D/8074C7AB 094B E58B 4F74 00C2 D8A6 B987 FB7D F8BA >8074 C7AB > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7467 From: kondrak Date: Wed Jun 18, 2003 1:31pm Subject: Re: Sweep Gear For Sale Gotta be nice to be rich.....;) Lovely equipment...drool... >I also have for sale four brand new Radiance thermal imaging systems >(very pricey) with the special sweep servos and rails so you can >image an entire room though robotics control right into a computer >that puts together a huge composite image, and then extracts the >thermal anomalies from the composite images digitally. 7468 From: kirk Date: Thu Jun 19, 2003 2:18am Subject: How to spot a terrorist "You can easily identify a suspected terrorist," says Epifanio Lambino Jr., chief of the Philippines' Immigration Bureau's Civil Security Unit. "Order him to remove his shoes," he instructs. "Does he have athlete's foot? If so, you may have someone who has undergone rigid military training." Other telltale signs, he says, include a scarred chest and calloused hands and elbows from crawling on the ground, and "eyes darting from place to place." Philippine immigration inspectors denied entry to as many as 200 suspected terrorists last year based on such criteria, Lambino said. (AP) -- Kirk Adirim TACTRONIX Tactical Electronics for Critical Missions 468 North Camden Drive Beverly Hills, CA 90210 USA E: kirk@t... T: 323-650-2880 F: 310-388-5886 W: www.tactronix.com -- 7469 From: Craig Meldrum Date: Wed Jun 18, 2003 5:17pm Subject: Contact Details Wanted I need to get a phone number for Dan Grissom of Taylor Group. I have his email but he is not responding to that. I would appreciate any assistance. Thank you Craig craig@c... =============================== Craig Meldrum, Managing Director Communications Security Ltd PO Box 8314, Symonds St Auckland, New Zealand Ph: 64-9-3093386 Fax: 64-9-3021148 =============================== 7470 From: James M. Atkinson Date: Fri Jun 20, 2003 5:15pm Subject: Wayside Chapel In the days when you couldn't count on a public facility to have indoor plumbing, an English woman was planning a trip to Germany. She was registered to stay in a small guesthouse owned by the local schoolmaster. She was concerned as to whether the guesthouse contained a WC. In England, a bathroom is commonly called a WC, which stands for water closet. She wrote the schoolmaster inquiring as to the location of the nearest WC. The schoolmaster, not fluent in English, asked the local priest if he knew the meaning of WC. Together they pondered possible meanings of the letters and concluded that the lady wanted to know if there was a "Wayside Chapel" near the house...a bathroom never entered their minds. So the schoolmaster wrote the following reply: Dear Madam, I take great pleasure in informing you that the WC is located 9 miles from the house. It is located in the middle of a grove of pine trees, surrounded by lovely grounds. It is capable of holding 229 people and is open on Sundays and Thursdays. As there are many people expected in the summer months, I suggest you arrive early. There is, however, plenty of standing room. This is an unfortunate situation, especially if you are in the habit of going regularly. It may be of some interest to you that my daughter was married in the WC as it was there that she met her husband. It was a wonderful event. There were 10 people in every seat. It was wonderful to see the expressions on their faces. My wife, sadly, has been ill and unable to go recently. It has been almost a year since she went last, which pains her greatly. You will be pleased to know that many people bring their lunch and make a day of it. Others prefer to wait till the last minute and arrive just in time! I would recommend your ladyship plan to go on a Thursday as there is an organ accompaniment. The acoustics are excellent and even the most delicate sounds can be heard everywhere. The newest addition is a bell, which rings every time a person enters. We are holding a bazaar to provide plush seats for all since many feel it is long needed. I look forward to escorting you there myself and seating you in a place where you can be seen by all. Sincerely, Schoolmaster -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- 7471 From: James M. Atkinson Date: Fri Jun 20, 2003 5:15pm Subject: Fitness and Exercise It is well documented that for every minute that you exercise, you add one minute to your life. This enables you at 85 years old to spend an additional 5 months in a nursing home at $5000 per month. My grandmother, said Joe, started walking five miles a day when she was 60. Now she's 97 years old and we don't know where the hell she is. The only reason I would take up exercising is so that I could hear heavy breathing again. I joined a health club last year, spent about 400 bucks. Haven't lost a pound. Apparently you have to go there. I have to exercise early in the morning before my brain figures out what I'm doing. I like long walks, especially when they are taken by people who annoy me. I have flabby thighs, but fortunately my stomach covers them. The advantage of exercising every day is that you die healthier. If you are going to try cross-country skiing, start with a small country. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- 7472 From: James M. Atkinson Date: Fri Jun 20, 2003 5:15pm Subject: The Bartender The Bartender: A very attractive lady goes up to a bar in a quiet rural pub. She gestures alluringly to the bartender who comes over immediately. When he arrives, she seductively signals that he should bring his face closer to hers. When he does she begins to gently caress his full beard. "Are you the manager?" she asks, softly stroking his face with both hands. "Actually, no," the man replied. "Can you get him for me? I need to speak to him" she says, running her hands beyond his beard and into his hair. "I'm afraid I can't," breathes the bartender. "Is there anything I can do?" "Yes, there is. I need you to give him a message" she continues, running her forefinger across the bartender's lips and slyly popping a couple of her fingers into his mouth and allowing him to suck them gently. "What should I tell him?" the bartender manages to say. "Tell him," she whispers, "there is no toilet paper, hand soap, or paper towels in the ladies room." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- From: Steve Uhrig Date: Sat Jun 12, 2004 9:28pm Subject: Re: Night Vision Once upon a midnight dreary, Ocean Group pondered, weak and weary: > Can anyone on this list think of any uses of night vision equipment in > TSCM? *Genuine* night vision, which excludes Russian and other garbage, is useful for inspecting for covert infrared transmissions. Most night vision is very sensitive at infrared. Several of us use it for exactly that purpose. With rare exceptions, I would consider real night vision to be units by or built from tubes manufactured by ITT or Litton, both of the United States. Very litte mass manufactured offshore stuff is worth even the freight it takes to ship. This especially is true of the Russian alleged military surplus. See the night vision articles on my website White Papers for technical info. They predate the availability of the Russian garbage, but the info for most part still is valid. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8897 From: Steve Uhrig Date: Sat Jun 12, 2004 9:47pm Subject: Re: Night Vision Once upon a midnight dreary, Steve Weinert at Excel.Net pondered, weak and weary: > some NV equipment will show more than the visual eye will > see, but usually ends up like looking through layers of window screen. When you see this or honeycombing, you have FAR too much light entering the night vision device and you HAVE permanently damaged it. Read the articles on my website White Papers. Do not EVER power up night vision, or even remove the lens cap, unless you are in near darkness. That WILL ruin it. The protection features which kill power with excessive light are more sales features than true protection. > Most NV stuff out there is crap unless you spend some serious dosh. > (I do like driving lights-out with NV though - kind of hard on > pedestrians buzzed though...). In college I rode my Harley around the campus with night vision goggles. Dangerous without training, as you don't have depth perception and have to focus manually between gauges and distance. But it is fun in large parking lots which are not illuminated. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8898 From: taylortscm@y... Date: Sat Jun 12, 2004 10:09pm Subject: Re: Night Vision even first gen with wratten filters works, just look for blooms third gen nv works even better. dan taylor group "Steve Weinert at Excel.Net" wrote: Would seem fairly down on the list, except that IR links are common and often left on - some NV equipment will show more than the visual eye will see, but usually ends up like looking through layers of window screen. Most NV stuff out there is crap unless you spend some serious dosh. I think something like a Iogema IR video camera setup or even a nuclear subsurface inspection device could make more sense. (A good tech on a decent IR camera can be useful in exploring the hiden cavities in a building, but only as part of an inspection process). Not personally aware if the small light loss of Fiberoptic connects will show on NV. Only my limited knowledge - perhaps someone else has had more success with NV TSCM? (I do like driving lights-out with NV though - kind of hard on pedestrians buzzed though...). Steve W > I have a quick question: > > Can anyone on this list think of any uses of night vision equipment in TSCM? > > Realistically? > > Regards > > Ois ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger [Non-text portions of this message have been removed] 8899 From: Steve Weinert at Excel.Net Date: Sat Jun 12, 2004 10:35pm Subject: Re: Re: Night Vision ----- Original Message ----- From: "Steve Uhrig" To: Sent: Saturday, June 12, 2004 9:47 PM Subject: [TSCM-L] Re: Night Vision > Once upon a midnight dreary, Steve Weinert at Excel.Net pondered, weak and weary: > > > some NV equipment will show more than the visual eye will > > see, but usually ends up like looking through layers of window screen. > > When you see this or honeycombing, you have FAR too much light entering > the night vision device and you HAVE permanently damaged it. I've seen that phenomena as well - what I didn't describe well is the loss of any real depth awarenes and the reduction in resolution. I've a PVS-3 I keep around for what little I need one (usually it lives one of the matching rifles for in the emergency kit). > > Read the articles on my website White Papers. > > (I do like driving lights-out with NV though - kind of hard on > > pedestrians buzzed though...). > > In college I rode my Harley around the campus with night vision goggles. > > Dangerous without training, as you don't have depth perception and have > to focus manually between gauges and distance. But it is fun in large > parking lots which are not illuminated. I'm thinking German backroads at about 70 kph in a sedan..... doubt some of the walkers have recovered to this day from the fright.... Steve W 8900 From: James M. Atkinson Date: Sat Jun 12, 2004 10:54pm Subject: New Material and Structure on Website I have just uploaded several dozen new files to the site, and several weeks ago I restructured the main directory and split it into several small directories to make information easy to find. Nothing was deleted, just several more layers of navigation added in preparation for a flood of new materials. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8901 From: James M. Atkinson Date: Sun Jun 13, 2004 6:13am Subject: Awesome Tribute FW: Awesome Tribute It takes a special kind of person, to be a guard at the Tomb of the Unknown Soldier . 1. How many steps does the guard take during his walk across the tomb of the Unknowns and why? 21 steps. It alludes to the twenty-one gun salute, which is the highest honor given any military or foreign dignitary. 2. How long does he hesitate after his about face to begin his return walk and why? 21 seconds for the same reason as answer number 1. 3. Why are his gloves wet? His gloves are moistened to prevent his losing his grip on the rifle. 4. Does he carry his rifle on the same shoulder all the time, and if not, why not? He carries the rifle on the shoulder away from the tomb. After his march across the path, he executes an about face, and moves the rifle to the outside shoulder. 5. How often are the guards changed? Guards are changed every thirty minutes, twenty-four hours a day, 365 days a year. 6. What are the physical traits of the guard limited to? For a person to apply for guard duty at the tomb, he must be between 5' 10" and 6' 2" tall and his waist size cannot exceed 30." Other requirements of the Guard: They must commit 2 years of their life to guard the tomb, live in a barracks under the tomb, and cannot drink any alcohol on or off duty for the rest of their lives. They cannot swear in public for the rest of their lives and cannot disgrace the uniform {fighting} or the tomb in any way. After two years, the guard is given a wreath pin that is worn on their lapel signifying they served as guard of the tomb. There are only 400 presently worn. The guard must obey these rules for the rest of their lives or give up the wreath pin. The shoes are specially made with very thick soles to keep the heat and cold from their feet. There are metal heel plates that extend to the top of the shoe in order to make the loud click as they come to a halt. There are no wrinkles, folds or lint on the uniform. Guards dress for duty in front of a full-length mirror. The first six months of duty a guard cannot talk to anyone, nor watch TV. All off duty time is spent studying the 175 notable people laid to rest in Arlington National Cemetery. A guard must memorize who they are and where they are interred. Among the notables are: President Taft Joe E. Lewis {the boxer} and Medal of Honor winner Audie Murphy, {the most decorated soldier of WWII} of Hollywood fame. Every guard spends five hours a day getting his uniforms ready for guard duty. I don't know if you saw this in the news, but it really impressed me. On the ABC evening news, it was reported that, because of the dangers from Hurricane Isabelle approaching Washington DC, the military members assigned the duty of guarding the Tomb of the Unknown Soldier were given permission to suspend the assignment. They respectfully declined the offer, "No way, Sir!" Soaked to the skin, marching in the pelting rain of a tropical storm, they said that guarding the Tomb was not just an assignment, it was the highest honor that can be afforded to a serviceperson. Funny, that our US Senate/House took 2 days off, saying that they couldn't work because of the expected storm. The tomb has been patrolled continuously, 24/7, since 1930. We can be very proud of our young men and women in the service no matter where they serve. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8902 From: John and Sheryl Date: Sat Jun 12, 2004 10:41pm Subject: RE: Night Vision I have seen a sweeper I know use one to check for Laser pick-ups by looking out windows from inside the premise being swept. Whether this is effective or not, I do not know. I would be interested in comments in regards to this as well. John -----Original Message----- From: Ocean Group [mailto:inertia@o...] Sent: June 12, 2004 8:24 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Night Vision I have a quick question: Can anyone on this list think of any uses of night vision equipment in TSCM? Realistically? Regards Ois ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 8903 From: Steve Weinert at Excel.Net Date: Sun Jun 13, 2004 6:55am Subject: Re: Awesome Tribute This is only part true. Their site and a visit to one of the discussion points for internet hoax emails (say snopes) can fill in the blanks. The honor is huge, but certainly not quite the ordeal outlined. Steve W ----- Original Message ----- From: "James M. Atkinson" To: "TSCM-L" Sent: Sunday, June 13, 2004 6:13 AM Subject: [TSCM-L] Awesome Tribute > FW: Awesome Tribute > > > It takes a special kind of person, to be a guard at the Tomb of the > Unknown Soldier . > 8904 From: Date: Sun Jun 13, 2004 7:08am Subject: New file uploaded to TSCM-L Hello, This email message is a notification to let you know that a file has been uploaded to the Files area of the TSCM-L group. File : /FSH6.pdf Uploaded by : graniteislandgroup Description : Rohde & Schwarz 6 GHz Microwave Spectrum Analyser You can access this file at the URL http://groups.yahoo.com/group/TSCM-L/files/FSH6.pdf To learn more about file sharing for your group, please visit http://help.yahoo.com/help/us/groups/files Regards, graniteislandgroup 8905 From: Ocean Group Date: Sun Jun 13, 2004 2:16pm Subject: RE: Night Vision Cheers Steve's! So to conclude, only look at high quality such as ITT/Litton..... And only useful for infra red device detection..... I wonder why there are no good European manufacturers of NV gear, surely there must be some good German equipment makers.......not that I am anti-US technology....! ;) Ois ************************************* Message: 8 Date: Sat, 12 Jun 2004 22:28:59 -0400 From: "Steve Uhrig" Subject: Re: Night Vision Once upon a midnight dreary, Ocean Group pondered, weak and weary: > Can anyone on this list think of any uses of night vision equipment in > TSCM? *Genuine* night vision, which excludes Russian and other garbage, is useful for inspecting for covert infrared transmissions. Most night vision is very sensitive at infrared. Several of us use it for exactly that purpose. With rare exceptions, I would consider real night vision to be units by or built from tubes manufactured by ITT or Litton, both of the United States. Very litte mass manufactured offshore stuff is worth even the freight it takes to ship. This especially is true of the Russian alleged military surplus. See the night vision articles on my website White Papers for technical info. They predate the availability of the Russian garbage, but the info for most part still is valid. Steve 8906 From: dj Date: Sun Jun 13, 2004 2:48pm Subject: RE: Night Vision Night vision goggles are useful but I have never seen any used for ts. --------------------------------- Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger [Non-text portions of this message have been removed] 8907 From: Steve Uhrig Date: Sun Jun 13, 2004 5:43pm Subject: Re: Night vision Once upon a midnight dreary, Ocean Group pondered, weak and weary: > So to conclude, only look at high quality such as ITT/Litton..... High quality whomever makes it. I happen to know ITT & Litton and trust both though frankly having worked in both factories I have a distinct preference to ITT. I wouldn't turn down Litton though. Check their websites. Very informative. Recommended vendor is Excalibur, www.nightvis.com. Things have changed since I wrote my articles 16 years ago. I no longer endorse or recommend Dark Invader, Owl or any product from B. E. Meyers & Company in Washington State. > I wonder why there are no good European manufacturers of NV gear, > surely there must be some good German equipment makers.......not that > I am anti-US technology....! ;) There is some decent European stuff I've seen. Don't remember where from. Something Scandanavian sticks in my mind but I could be wrong. I believe the European manufacturers may have maybe 5% of the international market. Everywhere I've been in the world has been using ITT or Litton. If you really want to know, check Jane's. > And only useful for infra red device detection..... Only thing I could think of. Maybe others will have more ideas. Dan G was correct mentioning first gen. Since first gen converts IR to visible light, it serves exactly the purpose we would want. Later generations amplify existing visible light, and happen to be sensitive at IR, where first gen is the old Sniperscopes where you see them mated with a huge IR illuminator. They see only IR. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8908 From: Lou Novacheck Date: Sun Jun 13, 2004 9:42pm Subject: New member info Name: Lou Novacheck, Milwaukee WI Retired US Army, assignments included Amman, Jordan; Sinop, Turkey; & Ft Meade MD. Sold food in England, southern Germany, Netherlands, & Mediterranean countries for Danish company. Owned small chain of collectible shops in Germany & Italy. Currently selling Toyota in Milwaukee. [Don't ask me to get you a Prius anytime soon!] Still have interest in spy-related matters, but not sure I'm savvy enough to understand this list. Robert Crumb's Crumbwrap $9.99 postpaid Life & Adventures of Santa Claus by Mike Ploog $12.99 postpaid Wizard Trading Co PO Box 482 Cudahy WI 53110 [Non-text portions of this message have been removed] 8909 From: Date: Mon Jun 14, 2004 10:12pm Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: When performing the RF analysis segement of a bug sweep; which analog scale do you use to take your readings, and document your efforts. Do you use a linear scale (ie: uV), or do you prefer to use a logarithmic scale (ie: -dbm). o Linear Scale o Logarithmic Scale To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1269917 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 8910 From: Date: Mon Jun 14, 2004 10:14pm Subject: Poll results for TSCM-L The following TSCM-L poll is now closed. Here are the final results: POLL QUESTION: Do you think that the Granite Island Group website of tscm.com is a valuable resource concerning TSCM, bug sweeps, and wiretap detection CHOICES AND RESULTS - Yes, 11 votes, 91.67% - No, 1 votes, 8.33% For more information about this group, please visit http://groups.yahoo.com/group/TSCM-L For help with Yahoo! Groups, please visit http://help.yahoo.com/help/us/groups/ 8911 From: Lawrence Dillard Date: Tue Jun 15, 2004 11:43pm Subject: ratta ta tat-- boom boom If you want to convince your doctor you are getting senile, ask him the precise meaning of "Take one tablet twice a day." Tell him it's such a messy nuisance to have to spit up that first tablet to take it again later. These days it's a very good thing for students that most jobs which require a college degree don't require a college education. Dan R. Greening 8912 From: kondrak Date: Wed Jun 16, 2004 0:53pm Subject: Wireless Eyes May Be Watching > > >Wireless Eyes May Be Watching >Source: Arkansas Business >Publication date: 2004-05-24 >Arrival time: 2004-06-14 > >EVEN IF YOU LOOKED right at Steve Wheeler's handiwork, you might not >notice. >And that's how he likes it. > >It may seem like an unusual feeling for a retail business owner to have, >since most typically want their products to be eyecatching. Out of >sight, out of business, after all. > >But for Wheeler, who founded Surveillance Plus Inc. of North Little Rock >in 1992, out of sight means good business. That's the key business >truism when your wares include wireless cameras in teddy bears and >neckties with batterypowered wireless pinhole cameras. > >"I've done some crazy stuff," Wheeler said. "Once, I (installed wireless >pinhole cameras) on a coffee pot and a Christmas tree." >The digital and wireless revolution have made cameras and surveillance >technology more accessible and less difficult to manage. Costs are down >- for instance, a clock radio with a wireless camera costs about $500 - >and more everyday people are making wireless surveillance purchases, >Wheeler said. > >A recent survey by the Custom Electronics Design and Installation >Association showed security concerns were the top reason customers >wanted wireless products. In fact, 31 percent said a centralized home >security system was the most important home networking system. > >Home theaters were second at 19 percent. > >"Probably for a lot of businesses, using the cameras has a lot to do >with preventing inventory shrinkage. And then the second most popular >'use is probably a domestic situation like a husband-and- wife tiff or a >divorce," Wheeler said. "And it's not just the white- collar employer >anymore. Now it's Joe Blow coming in for surveillance tools. >"It used to be out of their grasp, but it's a low-cost big deal now." > >Private investigators are also good customers, he said. During one nasty >custody battle, he set up cameras to capture the wife's parenting >practices. The setup cost $3,500, and the recorded images were used in >court. > >Business is good, said Wheeler, who declined to reveal sales figures. He >did close a west Little Rock shop on Bowman Road in summer 2003, but he >blamed it on the stress of having two operations and maintaining quality >customer service and a well-trained staff. > >"West Little Rock did pretty good, but it was more work than it was >worth," Wheeler said. "It's a very personalized trade. People come in, >tell you their problems, and then you piece together what they need." > >Attention > >With a big roof sign advertising the "Spy Shop" greeting southbound >motorists on Interstate 30, Wheeler's business is bound to get some >attention. But at ground level, the shop is in a nondescript building on >17th Street at North Little Rock. Behind dark tinted windows on a glass >door, a small retail shop offers a buffet of surveillance options. > >Wheeler or manufacturers can install one of the cameras with tenses of >just a few millimeters in diameter in just about anything. Shoppers can >choose from buttons, eyeglasses, cell phones, purses, thermostats, >pagers, wall clocks and books, just to name a few. It can take just a >few hours to install a camera in a radio or a clock. > >Wheeler prefers to keep the hightech stock at a minimum and order from >wholesalers and manufacturers as business demands. There is a high >degree of specialized customer service, Wheeler said, because customers >have different goals and unique challenges for installation of equipment >that he rents or sells. > >The cameras produce color or blackand-white images and offer >high-quality resolution without sound. Sound surveillance is a federal >wiretapping offense in non-public areas without posted notification, >according to Wheeler and others in the industry. >"That's a no-no," said Douglas Walker, vice president of Relay System >Corp. of Little Rock, which covers a multistate area with closed-circuit >television and wireless monitoring services. "You can go to jail." > >The cameras have a short broadcast range of 50 feet to a few hundred >feet, but the range can be enhanced to two or three miles with proper >equipment, said Bill Powers, president of Complete Security Inc. of >Little Rock. > >Wheeler retails pinhole cameras about 1-inch wide including casing at >just over $200 for color and $120 for black-andwhite. Transmitters send >signals to receivers that then, either record the images onto VCR tape >or digital recorders, or transmit to television monitors without >recording. > >Cameras can be activated by motion detectors. > >VCR equipment prices have plummeted with the advent of digital >equipment, Powers said. Wireless cameras transmitting to digital >recorders with more than 120 gigabytes of storage space - are popular >for efficiency and small size. >A few black-and-white cameras and a recorder can run about $1,000. A few >years ago, one camera could cost $1,200$1,500, Wheeler said. Of course, >the smaller the device, the more it costs. Still, a fullcoverage, >16-camera, wireless operation with storage for images can still cost >under $30,000, Wheeler said. > >"It's crazy now," Wheeler said, referring to the relatively low cost. >Walker said the less cumbersome equipment is also userfriendly. > >"Because of the electronics, it's a lot easier to use than before," >Walker said. "It's more friendly than ever." >Wheeler said he's noticed that customers tend to want a limited number >of cameras with wide areas to cover. But the technology and the lower >costs allow for a multitude of cameras. > >"It allows you to cover more area and be more versatile, although people >often decide they need fewer cameras, which defeats the purpose," >Wheeler said. "(But) you want to see faces. That's what you want. That's >how you catch people." >Walker said virtually all of the systems he sets up are custom designed. > >A retail operation, for instance, might put individual cameras on cash >registers to tape cashiers. To check for "sweethearting" - when cashiers >undercharge people they know - a store could then have the text of the >register transaction added to tape footage playing on a monitor screen, >Walker said. > >A check that might otherwise take a day or more could be done in just a >few hours, Walker said. > >While Wheeler can "wow" customers with surveillance possibilities, >sometimes he is "wowed" by the circumstances driving them to his shop. > >"Sometimes I feel like I need a psychiatrist fee," Wheeler said. "People >stay two or three hours and tell me all of their problems." > >Walker stays away from residential installations that aren't about >security for the whole family. > >Wheeler also sells general home security items, such as safety boxes >that resemble books, full soup cans or mayonnatse jars, as well as >martial arts weapons such as nun-chucks and throwing stars. > >Do It Yourself > >While improved technology can mean more business, it can also mean more >do-it-yourselfers. >A trip to a big box electronics retailer, for instance, can give >consumers less-expensive options. > >Best Buy retails similar color cameras for about $100 and a >black-and-white wireless camera with a monitor at a similar price. And >any Web surfer is familiar with pop-up advertisements from X10 Wireless >Technology Inc. of Kent, Wash., for wireless cameras. Its cameras send >wireless video signals about 100 feet to video receivers hooked up to >computers and televisions. A three-camera package runs for less than >$200. > >The company also offers another product that uses free software to send >live color video to computers from which digital photos can then be sent >over the Internet. A necessary USB capture adapter, though, sells for >about $70. >But, Walker said there is "a lot of cheap junk out there" and X10's >products are considered entry-level. > >Other companies offer digital video recording and a Webbased server that >allow people to check recorded images stored on their home computers. > >Complete Surveillance's Powers said he still does a lot of business >recording on VCRs. Prices have come down substantially with new >technology developments. > >"People have a need for it. Five or six years ago, we didn't have the >need like we do, now," Powers said. "They can check out their business, >make sure employees aren't stealing from the company." > >Copyright Arkansas Business May 24, 2004 > >http://cnniw.yellowbrix.com/pages/cnniw/Story.nsp?story_id=52568825&ID=cnniw&scategory=Telecommunications%3AWireless& 8913 From: Date: Thu Jun 17, 2004 0:08am Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: Do you think that Steve Wilson (TSCM'er in TN and VA) is actually guilty of the criminal acts the government has accussed him of? o Yes, I think he is guilty o No, I think he is innocent To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1272782 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 8914 From: Date: Thu Jun 17, 2004 0:12am Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: What do you think of the new CMA-100 Countermeasures Audio Amp. o Good Product o Product Sucks To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1272786 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 8915 From: Date: Thu Jun 17, 2004 0:14am Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: Do you plan to buy the new Icom R20 Wideband Receiver o Yes o No To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1272787 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 8916 From: Date: Thu Jun 17, 2004 0:23am Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: How much do you charge for a basic TSCM inspection of a typical executives office (one person on site for about 8-12 hours) o 1000 o 1500 o 2000 o 2500 o 3000 o 3500 o 4000 o 4500 o 5000 o 5500 o 6000 o 6500 o 7000 o 7500 o 7500+ To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1272792 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 8917 From: Date: Thu Jun 17, 2004 3:05am Subject: Poll results for TSCM-L The following TSCM-L poll is now closed. Here are the final results: POLL QUESTION: When performing the RF analysis segement of a bug sweep; which analog scale do you use to take your readings, and document your efforts. Do you use a linear scale (ie: uV), or do you prefer to use a logarithmic scale (ie: -dbm). CHOICES AND RESULTS - Linear Scale, 2 votes, 25.00% - Logarithmic Scale, 6 votes, 75.00% For more information about this group, please visit http://groups.yahoo.com/group/TSCM-L For help with Yahoo! Groups, please visit http://help.yahoo.com/help/us/groups/ 8918 From: Steve Uhrig Date: Thu Jun 17, 2004 0:37am Subject: Re: New poll for TSCM-L Once upon a midnight dreary, TSCM-L@yahoogroups.com pondered, weak and weary: > Enter your vote today! A new poll has been created for the > TSCM-L group: > Do you think that Steve Wilson > (TSCM'er in TN and VA) is actually > guilty of the criminal acts the > government has accussed him of? > o Yes, I think he is guilty > o No, I think he is innocent --------------------- This is an immature poll. Whomever submitted it has little understanding of the American jurisprudence system and merely is a troublemaker. Whatever PROPOGANDA (which means EDUCATION frequently intended to mislead) you may have read was selectively processed to lead you to believe Mr. Wilson is a slimebag. I am not defending any actions of Mr. Wilson although I have known him for 20 years and do not agree with his business principles and practices, but in THIS country, he IS ASSUMED TO BE INNOCENT UNTIL **PROVEN** GUILTY. To my mind, HE IS INNOCENT. He has NOT been proven guilty. He may not be. It's not our place to gossip. And that's what all this discussion of him has been. GOSSIP. Scripture prohibits us from engaging in idle talk. It also prohibits us from participating in gossiping and rumermongering. GOD SAYS this is forbidden. Don't argue with me. Take it up with Him if you disagree, and you ultimately will find out YOU are wrong. I do not agree with Mr. Wilson's business practices, but I darn well will defend his right to a fair trial and an adequate defense in the appropriate forum, which is not here on this list. If people choose to play little snipe games to subvert our justice system, do it somewhere else. A good number of us took oaths to uphold and defend the U.S. Constitution against all enemies, foreign and domestic. In this case, we have domestic enemies in addition to violating rules laid down by God, who incidentally guided the men who wrote the Constitution and Bill of Rights. Trial by media can kill any credible defense. Innocent or guilty, Mr. Wilson has the absolute right to a competent defense and deserves a fair trial. Children gossiping with polls such as this are demonstrating their personal ethics are directly incompatible with the principles guiding the professional TSCM profession. If you feel you must do this, please be responsible and resign from this list and go to Usenet or somewhere. And anyone posting a poll should have the gonads to do it under their real name, not anonymously. It is irresponsible of the moderator to allow ANYONE to post crap like this much less dignify it by casting a vote, especially anonymously. A significant portion of this list, including me, is on the very edge of unsubscribing due to all the horsecrap posted re Mr. Wilson lately. There are very few, if any, in this business who do not have skeletons in the closet and who would withstand an intensive government investigation. 'There but for the grace of God go I.' Keep your own nose clean, and 'let he who is without sin cast the first stone.' Observe that and not one single person on this entire list would be justified in picking up a stone. BTW, the above words were COMMANDED by the Lord Jesus Christ, the Son of God, not a fat little bald headed gray bearded cripple in Maryland who admittedly frequently has an attitude. Stop the crap and stick with the mission of this list, which is not blatant slander of others. I'm as guilty as anyone when a charlatan pops up and tries to snow us and I put him in his place, but in this case any discussion of Mr. Wilson is PURE GOSSIP and completely imappropriate for this list. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8919 From: Robert Dyk Date: Thu Jun 17, 2004 8:37am Subject: Re: New poll for TSCM-L Steve Uhrig wrote... > A significant portion of this list, including me, is on the very edge of > unsubscribing due to all the horsecrap posted re Mr. Wilson lately. The amount of time required to sift the useful items posted on this list from the drivel is ever increasing. If this continues, at some point in the future a quick cost/benefit check-up might reveal little benefit in remaining a subscriber. With regard to Mr. Wilson, I had never heard of the man prior to hearing his name on the list. It is unfortunate that my first contact with any information regarding his practise of TSCM had to be the gossip recently published here. Being Canadian, I am not in position to comment on the American justice system. I do however have the greatest respect and admiration for the zeal with which most of our American cousins defend their personal liberty and constitutional rights. It therefore comes as a great surprise that some US based list members are willing to commit their rendition of past events regarding Mr. Williams in writing to this forum. In summary, it is quite likely that a number of our clients subscribe to this list and monitor the traffic that it contains. They too are spending valuable time sifting through the postings and more importantly forming opinions based on what they might read. Like it or not, this list is a valuable source of public exposure for the TSCM profession. We need to respect this outside scrutiny and keep the traffic on topic and relevant. With respect, Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. 8920 From: Robert Dyk Date: Thu Jun 17, 2004 8:40am Subject: FW: New poll for TSCM-L Correction "Mr. Williams", should read "Mr. Wilson", in the last sentence of my last posting. Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. 8921 From: James M. Atkinson Date: Thu Jun 17, 2004 9:16am Subject: Re: Re: New poll for TSCM-L At 01:37 AM 6/17/2004, Steve Uhrig wrote: >Once upon a midnight dreary, TSCM-L@yahoogroups.com pondered, weak and weary: > > > Enter your vote today! A new poll has been created for the > > TSCM-L group: > > > Do you think that Steve Wilson > > (TSCM'er in TN and VA) is actually > > guilty of the criminal acts the > > government has accussed him of? > > > o Yes, I think he is guilty > > o No, I think he is innocent > >--------------------- > >This is an immature poll. Whomever submitted it has little understanding >of the American jurisprudence system and merely is a troublemaker. The person who submitted the poll appears to be the moderator of the list, but then of course the list moderator is known upstart who has a history of engaging in activities to seriously improve the profession, and to raise the bar of the industry. >Whatever PROPOGANDA (which means EDUCATION frequently intended to >mislead) you may have read was selectively processed to lead you to >believe Mr. Wilson is a slimebag. Numerous people on this list have been ripped off by Mr. Wilson (including the list moderator), and more than a few list members have had their skin crawl when they dealt with Mr. Wilson, and the more contact they had with him the further away they tried to get as it was obvious that lightning was going to strike him (which it did). >I am not defending any actions of Mr. Wilson although I have known him >for 20 years and do not agree with his business principles and practices, >but in THIS country, he IS ASSUMED TO BE INNOCENT UNTIL **PROVEN** >GUILTY. To my mind, HE IS INNOCENT. He has NOT been proven guilty. He may >not be. It's not our place to gossip. And that's what all this discussion >of him has been. GOSSIP. Of course he is innocent until proven guilty, but he has already registered his intentions to plead guilty. Steve Wilson has only been active in the TSCM business since 1991/1993, which coincidentally is about the same time the HTIA narcotics task force stared aggressively interdicting drugs in Steve's own back yard. Of course he is innocent until proven guilty, or he pleads guilty... but it looks like he is going to do the government a favor and plead guilty, which is far more damning then is he accepts and admits his guilt. >Scripture prohibits us from engaging in idle talk. It also prohibits us >from participating in gossiping and rumermongering. GOD SAYS this is >forbidden. Don't argue with me. Take it up with Him if you disagree, and >you ultimately will find out YOU are wrong. Scripture also says that you must obey those who have authority over you, that we should not burn any "strange incense" in Exodus 30:9, and in Micah 1:16 God commands us to "Make thee bald, and poll thee..." As I am starting loose my hair as I become older the only recourse is to create these polls. God and I argue all the time, and he always wins, but he also appreciates me asking questions and taking issue as it shows I have free will and that I am not following blindly. >I do not agree with Mr. Wilson's business practices, but I darn well will >defend his right to a fair trial and an adequate defense in the >appropriate forum, which is not here on this list. Most of the TSCM business does not agree with Mr. Wilson either, but I think everybody in the business wants a fair trial for him... which will not happen as he has filed the paperwork so that he can plead guilty. >If people choose to play little snipe games to subvert our justice >system, do it somewhere else. A good number of us took oaths to uphold >and defend the U.S. Constitution against all enemies, foreign and >domestic. In this case, we have domestic enemies in addition to violating >rules laid down by God, who incidentally guided the men who wrote the >Constitution and Bill of Rights. Nobody is trying to subvert justice, and nobody has tried to bribe the judge. >Trial by media can kill any credible defense. Innocent or guilty, Mr. >Wilson has the absolute right to a competent defense and deserves a fair >trial. Yes, and the trial should be fair, and public, and should not be held in a dark torture chamber in the bowels of prison where the defendant in sexually molested, tortured, beaten, and abused (oops, same government, different case). >Children gossiping with polls such as this are demonstrating their >personal ethics are directly incompatible with the principles guiding the >professional TSCM profession. If you feel you must do this, please be >responsible and resign from this list and go to Usenet or somewhere. I am a child at heart, but I do know flame-bait when I hear it. Ethics is when you stand up for what is right, not what is convenient, or what is popular, or what you are told to stand up for. It is a deep seated sense of what is right, and what is wrong, and it is something that the TSCM business needs more of. It is not gossip or rumor-mongering when it is true and there is hard documentation to back it up, and it is in the interest of the profession that the information is being circulated. >And anyone posting a poll should have the gonads to do it under their >real name, not anonymously. It is irresponsible of the moderator to allow >ANYONE to post crap like this much less dignify it by casting a vote, >especially anonymously. *** I *** posted the poll, and if you want to see my gonads you will have to buy me dinner and flowers first. >A significant portion of this list, including me, is on the very edge of >unsubscribing due to all the horsecrap posted re Mr. Wilson lately. The vast majority of the list appreciates this information and are free to leave the list at any time. >There are very few, if any, in this business who do not have skeletons in >the closet and who would withstand an intensive government investigation. There are even fewer on the list who grow dope, and sell drugs... and even fewer who abuse their wives and go to jail for doing so. >'There but for the grace of God go I.' I would pray that you do not turn to the dark side. >Keep your own nose clean, and 'let he who is without sin cast the first >stone.' Which size stones do you prefer? >Observe that and not one single person on this entire list would be >justified in picking up a stone. Should the stone be round, squarish, or a combination of both? >BTW, the above words were COMMANDED by the Lord Jesus Christ, the Son of >God, not a fat little bald headed gray bearded cripple in Maryland who >admittedly frequently has an attitude. I have never know you to have an attitude Steve [grin] Do you think two cubic yards of stones will do the trick, or should it be three yards. >Stop the crap and stick with the mission of this list, which is not >blatant slander of others. I'm as guilty as anyone when a charlatan pops >up and tries to snow us and I put him in his place, but in this case any >discussion of Mr. Wilson is PURE GOSSIP and completely imappropriate for >this list. It doesn't help that the Forestry department busted him, and ruined a long term DEA informant (Wilson), and that the DEA is now wicked annoyed at the Forestry department for busting him as they had been working him for almost a decade (this information came from the forestry side of the HTIA task force). I do not give quarter to people who do naughty things, especially those who do seriously naughty things like deal in drugs, illegal bugs, and so on. We both know that Steve Wilson has been a bad actor in our business for quite a while, and I hope that his getting busted will help him reform his ways, and become an upstanding member of the community... just not the TSCM community. As always thank you for your valuable comments and feedback (should the stones be of a certain color?) -jma >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8922 From: Ocean Group Date: Thu Jun 17, 2004 0:59pm Subject: RE: New poll for TSCM-L >And anyone posting a poll should have the gonads to do it under their >real name, not anonymously. It is irresponsible of the moderator to allow >ANYONE to post crap like this much less dignify it by casting a vote, >especially anonymously. *** I *** posted the poll, and if you want to see my gonads you will have to buy me dinner and flowers first. ##### You guys should get a hotel room for this kinda stuff....there are children in this list....! :) >There are very few, if any, in this business who do not have skeletons in >the closet and who would withstand an intensive government investigation. There are even fewer on the list who grow dope, and sell drugs... and even fewer who abuse their wives and go to jail for doing so. ##### Well I dunno about you guys.....but my mates in college have a few attributes that sound familiar from that list...! ;) I however never had anything to do with it.....of course..... It's all good, however, I've seen the US Justice System in operation and I have as about as much faith in it as the Chinesse. No responses required, I know I'll get shouted at for saying that.....but its true....! :) The mess between state, federal , consititution is a mess, one precedent says one thing and then another another......etc etc....sentences affected by politics blah blah blah. BUT.....Back to the TSCM topic...... Jim.... Would this system pick up the new UWB tx signals in your opinion: http://we.home.agilent.com/cgi-bin/bvpub/agilent/Product/cp_Product.jsp?NAV_ ID=-536892275.536892817.00&LANGUAGE_CODE=eng&COUNTRY_CODE=US I know its radar adpated but its clearly enough BW, there they say 6ghx, but as far as I know the new UWB tx's use 1.5Ghz centred BW. Cheers boys Ois 8923 From: kondrak Date: Thu Jun 17, 2004 3:54pm Subject: Beijing wages cyberwar against DPP headquarters A sign of things to come?: >http://www.taipeitimes.com/News/front/archives/2004/06/16/2003175231 > >By Ko Shu-ling >STAFF REPORTER >June 16, 2004 > >An army of hackers based in China has broken into Democratic >Progressive Party (DPP) databases, stealing classified information >such as President Chen Shui-bian's (≥اٴÛ) personal itinerary, >according to a Cabinet official who asked not to be named. > >"This is the first time we have found that the DPP headquarters' >computer systems were breached by Chinese hackers," the official said. >"The incident has sent jitters through the Ministry of National >Defense, which deems a systematic information attack launched by China >as military warfare." > >Information stolen from party headquarters included the personal >itineraries of Chen, who doubles as DPP chairman, and those of other >high-ranking party officials such as DPP Secretary-General Chang >Chun-hsiung (±i´T∂Ø). > >Also leaked was classified information on visits to the US by >high-ranking DPP officials ahead of the US presidential election. > >According to the Cabinet official, the DPP headquarters was an easy >target and the attackers were aware it would be more difficult to >break into computer systems belonging to the Presidential Office or >the defense ministry, where security is tighter. > >The attacks were noted a few days ago and the situation has been >monitored 24 hours a day since. > >This is not the first time that China has conducted information >warfare against Taiwan. Last September, the Cabinet discovered that >hackers in Hubei and Fujian provinces had spread 23 different Trojan >horse programs to the networks of 10 private high-tech companies in >Taiwan and used them as a springboard to break into at least 30 >different government agencies and 50 private companies. > >The Trojan-horse programs were used against the National Police >Administration, the defense ministry, the Central Election Commission >and the central bank. > >Since it appeared no government information had been stolen, the >Cabinet suspected that the program was likely aimed at paralyzing the >nation's computer systems, stealing sensitive government information >or preparing computers for future information warfare. > >Trojan-horses are one of the most serious threats to computer >security. A computer user may not only have been attacked but may also >be attacking others unknowingly. From: ISN C4I.org - Computer Security, & Intelligence - http://www.c4i.org 8924 From: James M. Atkinson Date: Thu Jun 17, 2004 6:13pm Subject: RE: New poll for TSCM-L The general idea is right on, but the unit really isn't going to be able to "grab" more that 2.5 GHz of bandwidth at a resolution high enough to let you see a signal off the airwaves. Yes, it will let you capture very high bandwidths, but with the extremely limited memory (relative to bandwidth), and limited resolutions at higher speeds your going to have some problems. It's fine to use on a bench-top environment when you have grabbed the signal, amplified it, and stabilized it... but not for searching for it... for that you want a direct conversion receiver. I would however mention that the scopes are quite nice, albeit in the low six digit figures to realistically buy one with "enhanced bandwidth". I should mention that I own Agilent stock, and I have been buying their products for over 25 years. -jma At 01:59 PM 6/17/2004, Ocean Group wrote: >[snip] >BUT.....Back to the TSCM topic...... > >Jim.... > >Would this system pick up the new UWB tx signals in your opinion: > >http://we.home.agilent.com/cgi-bin/bvpub/agilent/Product/cp_Product.jsp?NAV_ >ID=-536892275.536892817.00&LANGUAGE_CODE=eng&COUNTRY_CODE=US > >I know its radar adpated but its clearly enough BW, there they say 6ghx, but >as far as I know the new UWB tx's use 1.5Ghz centred BW. > >Cheers boys > >Ois ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8925 From: James M. Atkinson Date: Thu Jun 17, 2004 6:56pm Subject: Cute Little TDR Here is a cute little hand held TDR that is the fraction the price of a Riser Bond unit (even a used unit). http://www.jensentools.com/product/group.asp?parent_id=60855 It may not be fancy, but it is a good place to start, and it is under $1500. One real plus is that it is about the size of a typical DVM, and not the size of a suitcase. Description from Jensen site follows: This battery powered, handheld TDR can identify many types of faults on any cable consisting of at least two insulated metallic conductors. It has internal matching networks of 25, 50, 75 and 100 Ohms. The balance and velocity of propagation controls allow you to closely match any cable. It has a measurement range of 0 to 10,000' with resolution of four inches. The unit autoranges around the cursor giving the best view of the fault. The large back lit display is easy to read. Includes case, leads, manual and 6 AA batteries. 9 x 4.5 x 1.9", 1.3 lbs. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- From: Dawn Star Date: Tue Jun 13, 2000 11:29am Subject: sneak and peek No offense, but this is not a "look how evil the government is" forum, but instead a forum for TSCM and technical security. While a little off topics humor, levity, SECURITY or INTELLIGENCE related news and so on is fine, political gripes, grumbling, and bitching is best kept off the list. I would add that any politician foolish enough to attempt to squelch a right guaranteed by the constitution will find the citizens of this country more them happy to remove them from office (by any means necessary). Do not go gently into that dark night... [The List Moderator Shuts Up] -jma Sorry, I thought covert entry and copying of hard drives was directly relevant to TSCM, I'll avoid sharing this kind of information in the future. Roger Tolces [Non-text portions of this message have been removed] 603 From: A Grudko Date: Tue Jun 13, 2000 11:55am Subject: Re: [sacipub] Re: Encryption ---- Original Message ----- Incidentally, some of you will know that GWA has been going through a big network and PC upgrade, and we are just about back to full strength. We have built into our systems various levels of encryption......... I'm using PGP (Pretty Good Privacy). It's free, and integrates well with Eudora Pro. I highly recommend it. Hi Mike I use PGP to protect me from most 'snoops' but do not beleive it's ultimatly secure if any competant government agency is watching you. In fact, just using PGP or similar packages 'flags' you as a 'suspect' in some Intel. communities. Breaking your or my 'keys' is simple for any competent Intel. team. At one time there was a version which had a "for your eyes only" application. The email could be viewed on the screen for the amount of time decided by the sender, after which time it would "self destruct". It could not be printed, and could not be saved! Yup, a nice feature, but no doubt one of the few things all governments around the world agree upon is no privacy for the 'people' because 'they' know better. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax)- Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO(OS), IWWL, PRETrust --- "When you need it done right - first time" --- [Non-text portions of this message have been removed] 604 From: William Knowles Date: Tue Jun 13, 2000 10:17am Subject: Re: Re: [sacipub] Re: Encryption On Tue, 13 Jun 2000, A Grudko wrote: > ---- Original Message ----- Incidentally, some of you will know > that GWA has been going through a big network and PC upgrade, and > we are just about back to full strength. We have built into our > systems various levels of encryption......... I'm using PGP > (Pretty Good Privacy). It's free, and integrates well with Eudora > Pro. I highly recommend it. > > Hi Mike > > I use PGP to protect me from most 'snoops' but do not beleive it's > ultimatly secure if any competant government agency is watching > you. I tell my friends and clients that PGP is secure enough for 98% of the prying eyes on the Internet, and that 2% out there are the various intelligence community organizations with the acres and acres of computers humming along breaking messages that are deemed to be of interest to their national security. I like to remind people that that NSA employs over 40,000 mathematicians that are constently looking for ways to break the next generation of encryption, break the laws of physics, and if you're a fan of television science fiction, Go back seven days in time. :) If you think you have to worry about that 2% that can read your PGP messages, Then I think you have more than the NSA to worry about. > In fact, just using PGP or similar packages 'flags' you as a > 'suspect' in some Intel. communities. Breaking your or my 'keys' > is simple for any competent Intel. team. Well if that is the case, Hello to my friends and fans in domestic surveillance! > At one time there was a version which had a "for your eyes only" > application. The email could be viewed on the screen for the > amount of time decided by the sender, after which time it would > "self destruct". It could not be printed, and could not be saved! Versions after PGP 6.5.1 have a feature that will show the message in a 'TEMPEST shielded font' (I'd be curious to hear from those on the list how well this works, If it does, It looks nice.) and for as long as you wanted it on your screen, If you wanted to look at it again, You would have to decrypt the message again and look at it, Older versions of PGP 2.6 had the 'eyes only' feature, but it could be easily subverted by changing the name of the file so you could print out a copy. You can download PGP from: http://www.zedz.net/files/download_pgp.html Beware of PGP 5.x While most of the versions of PGP have gone over the scrutiny of cryptographers, a flaw was discovered in the randomness of PGP 5.x awhile back and data created to create a private and public key was less than random and made things pretty easy for some time for our friends and fans at Fort Meade. Cheers! William Knowles wk@c... *-------------------------------------------------* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen. Alfred. M. Gray, USMC --------------------------------------------------- C4I Secure Solutions http://www.c4i.org *-------------------------------------------------* 605 From: A.Lizard Date: Sun Jun 11, 2000 3:29pm Subject: Re: On-hook Security >Message: 2 > Date: Sat, 10 Jun 2000 13:33:51 -0400 (EDT) > From: patedwards@w... >Subject: Re: On-hook Security > >check hellodirect.com website. they have teleconferencing products. >don't know if they have secure lines. you could add scramblers at either >end. hope this helps. >there are commercially available scrambling devices available. not sure >of their quality or reliability. > > HAVE A GREAT DAY !!! Anybody have any opinion about PGPfone? It'a voice conferencing product which can be used either via Internet or via direct modem-to-modem connection. Check my sig for where it can be downloaded. It's freeware at this point and was created by the inventor of PGP working with a development team. It used to be export-controlled. A.Lizard ************************************************************************ Personal Web site http://www.ecis.com/~alizard Disaster prep & y2k computer fixes: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... PGP 6.5.1 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 606 From: Michael Martz Date: Tue Jun 13, 2000 5:46pm Subject: TSCM Books for sale Hello, I have a rather large lot of TSCM books for sale. They would make a nice addition to anybodys library. Titles include: The Axnan Attack by Glenn Whidden Guidebook for the Beginning Sweeper by Glenn Whidden Volumes 1,2,3 of The Ear by TSA Dont Bug Me by M.L. Shannon The Phone Book by M.L. Shannon TSCM Bible Countermeasures Cookbook by Ralph D. Thomas Techniques in Counter Surveillance by Marinelli Publishing Wiretap Detection Techniques A Guide to Checking Phone Lines by Theodore Swift plus several books on schematics of various bugging devices. I had thought of getting into TSCM services but determined the equipment needed to do a complete job was out of my budget. The Ear volumes are rather expensive but I hate to see this good stuff sit around in a box. If anybody is interested in this book lot please give me a jingle. Thanks, MM 607 From: James M. Atkinson, Comm-Eng Date: Tue Jun 13, 2000 7:14pm Subject: Missing Secrets Another 'Black Eye' For Lab June 12, 2000 http://www.abqjournal.com/news/1reax06-12-00.htm By Barry Massey The Associated Press LOS ALAMOS, N.M. - Workers at Los Alamos National Laboratory were concerned Monday about the lab's image - and their own stamina - following the disappearance of nuclear secrets from a vault, the latest bad news for the birthplace of the atomic bomb. "It's lousy. This has not been a good year," said Katherine Norskog, who has worked for the lab for 15 years. "Just everybody is going, ±Oh no!' ±' Norskog said she worries that in the public's perception, this would be another "black eye" for the lab. The loss of the two computer hard drives containing the nuclear secrets is the latest distraction for lab workers. Last year, the lab was at the center of a security controversy surrounding allegations against a co-worker, scientist Wen Ho Lee. In December, Lee was charged with 59 counts of breaching lab security. The prosecution contends Lee transferred 19 files from secure to unsecured computers and downloaded some material to computer tapes. Prosecutors have said the material included the top secret "crown jewels" of American nuclear science, but the defense disputes that characterization. Although Lee, who was a nuclear physicist in the weapons section of the lab, has not been charged with espionage, prosecutors contend he intended to aid a foreign government. Lee, 60, who has been in jail since December, could get life in prison if convicted. He has denied giving secrets to anyone. Last month, the entire laboratory was evacuated, as well as the town of Los Alamos, when a prescribed burn by the National Park Service raged out of control and burned down more than 200 homes and some lab property, including research and historic buildings from the Manhattan Project era. Workers were allowed back at the lab starting May 22. "Personally, and looking at my colleagues, we're distracted in some way because we're trying to deal with all these things that are going on," said Philip Thullen, the lab's program manager for integrated safety management. "These things all tie together," he said. "We're dealing with people who have emotions, who have thoughts and ideas. I haven't seen any recent statistics, but from anecdotal observations, you've got to wonder where their minds are going to be." "People are feeling worn out," a physicist added. At least one scientist did not feel that the disappearance of the computer hard drives was a big setback. "Of course it's a little discouraging," Edward Gaffney said, "but on a scale of zero to a fire, it's pretty close to zero." =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 608 From: Steve Uhrig Date: Wed Jun 14, 2000 7:33am Subject: Re: TSCM Books for sale Once upon a midnight dreary, Michael Martz pondered, weak and weary: > Hello, > > I have a rather large lot of TSCM books for sale. Hi Mike, I'd go $100 for the lot. Actually I am only interested in Glenn Whidden's stuff. Shannon's books are fine but he and I are personal friends so I have copies. Same with Ted Swift. Ralph Thomas good only for toilet paper. Don't know anything about Marinelli. Shannon's books probably would sell for near list on ebay. Same with schematic books. Please let me know if Glenn's stuff or the whole lot is still available. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 609 From: Charles Patterson Date: Wed Jun 14, 2000 7:24am Subject: sound id sources... thoughts I've toyed with a variety of sound sources for providing an identifiable audio source during rf sweeps. I curious as to what others are using. The basic is a cd player. When there are a few offices in close proximity, though, we would sometimes put diffferent sources in each. Carrying multiple cd players can get bulky so I've been trying other ideas. I have a little warble tone box, but of course that's a bit of a give-away if someone's listening, it is also annoying if anyone still working in the area has to listen to it. What has proved handy is a small electronic metronome (cigarette pack size). It just provides a clicking sound but the speed is variable so you can use more than one, just change the click speed. (They are easy to build with some 555 timers, but you can get 'em at music stores for about $15 -$20). When testing them it seems that the clicks are loud enought to be detectable and trigger most devices. I grabbed a small "relaxation" device at a tag sale for $2. It provides a set of repeating noises such as jungle sounds, waterfall, ocean waves. It was a small circuit board in a large housing, with a bit of repackaging it might work. Years ago I tried turning on an FM radio that was already in an adjoining office just to help cover the extra area. Unfortunately it had super strong out of band oscillations that I was able to easily pick up in the other room. Every time I changed the station, the signal on the SA had audio from the new station. Had me excited for a moment... (one more reason not to give away your finds until you are absolutely sure). Then I realized that the detected signal was changing it's frequency in accordance with the changes I made tuning the radio. Haven't used that idea since. CD players still seem the best. Now if somebody would make one small with a loud built in speaker, easy to carry... or if the MP3 players would come down in price they would be neat, too. Any other ideas? charles Charles Patterson Global Communications charles@t... www.telephonesecurity.com/countermeasures [Non-text portions of this message have been removed] 610 From: Manny G. Date: Tue Jun 13, 2000 4:06pm Subject: Re: TSCM Books for sale Mr. Martz, Hello there. I am on the TSCM mailing list. I am interested in purchasing some books. What are the price ranges for the books? I am interested in the Guidebook for the Beginning Sweeper as well as any beginners level books. Thank you for your time, Manuel Gonzales >From: Michael Martz >Reply-To: TSCM-L@egroups.com >To: TSCM-L@egroups.com >Subject: [TSCM-L] TSCM Books for sale >Date: Tue, 13 Jun 2000 17:46:12 -0500 > >Hello, > >I have a rather large lot of TSCM books for sale. They would make a >nice addition to anybodys library. Titles include: > >The Axnan Attack by Glenn Whidden >Guidebook for the Beginning Sweeper by Glenn Whidden >Volumes 1,2,3 of The Ear by TSA >Dont Bug Me by M.L. Shannon >The Phone Book by M.L. Shannon >TSCM Bible Countermeasures Cookbook by Ralph D. Thomas >Techniques in Counter Surveillance by Marinelli Publishing >Wiretap Detection Techniques A Guide to Checking Phone Lines by Theodore >Swift > >plus several books on schematics of various bugging devices. > >I had thought of getting into TSCM services but determined the >equipment needed to do a complete job was out of my budget. The Ear >volumes are rather expensive but I hate to see this good stuff sit >around in a box. If anybody is interested in this book lot please >give me a jingle. > >Thanks, > >MM > > ________________________________________________________________________ Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com 611 From: James M. Atkinson, Comm-Eng Date: Wed Jun 14, 2000 9:06am Subject: Re: sound id sources... thoughts A local FM radio station works well, as does a TV station but you have to be cautious and pick the right radio (and always provide your own). I also use a set of CD's The first one is blues and Jazz with lots of female vocals (to get a lot of energy on the high side of the spectrum). The second disc is "office sounds" such as papers shuffling, copy machine noise, typewriters, vacuum cleaners (good as a noise source for an OSCOR), etc. With this CD I select a specific track and just have that track loop endlessly. I set the delay between tracks to zero so that there is minimal interruptions in the sound. I tried the metronome method but found it to be too undependable, and way too alerting. I have also worked with warbling tones, swept tones, and so on, but they also tend to be seriously alerting. Lean towards a small stereo that would be appropriate in a business office, but try to keep the speakers small (remeber you don't need a lot of bass, and that you want good treble response). I have had really good luck with the small Bose and Cambridge Soundworks cube speakers. You may also find it handy to have a small variable tone generator that you can apply to the stereo signal inputs. -jma At 8:24 AM -0400 6/14/00, Charles Patterson wrote: >I've toyed with a variety of sound sources for providing an >identifiable audio source during rf sweeps. I curious as to what >others are using. > >The basic is a cd player. >When there are a few offices in close proximity, though, we would >sometimes put diffferent sources in each. Carrying multiple cd >players can get bulky so I've been trying other ideas. > >I have a little warble tone box, but of course that's a bit of a >give-away if someone's listening, it is also annoying if anyone >still working in the area has to listen to it. > >What has proved handy is a small electronic metronome (cigarette >pack size). It just provides a clicking sound but the speed is >variable so you can use more than one, just change the click speed. >(They are easy to build with some 555 timers, but you can get 'em at >music stores for about $15 -$20). When testing them it seems that >the clicks are loud enought to be detectable and trigger most >devices. > >I grabbed a small "relaxation" device at a tag sale for $2. It >provides a set of repeating noises such as jungle sounds, waterfall, >ocean waves. It was a small circuit board in a large housing, with >a bit of repackaging it might work. > >Years ago I tried turning on an FM radio that was already in an >adjoining office just to help cover the extra area. Unfortunately >it had super strong out of band oscillations that I was able to >easily pick up in the other room. Every time I changed the station, >the signal on the SA had audio from the new station. Had me excited >for a moment... (one more reason not to give away your finds until >you are absolutely sure). Then I realized that the detected signal >was changing it's frequency in accordance with the changes I made >tuning the radio. Haven't used that idea since. > >CD players still seem the best. Now if somebody would make one small >with a loud built in speaker, easy to carry... or if the MP3 >players would come down in price they would be neat, too. > >Any other ideas? > >charles > >Charles Patterson >Global Communications >charles@t... >www.telephonesecurity.com/countermeasures =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 612 From: Gordon Mitchell Date: Wed Jun 14, 2000 9:34am Subject: Re: sound id sources... thoughts Most of our RF work is during working hours so we can't do much for the sound environment. In afterhours work we do put sound sources out. For a while we used a tape player with old political speeches. My crew rebelled. Now we ask the client what sort of music they like and tune a clean FM receiver to that station. To get the music to all parts of the office we conference call phones that are in the speakerphone mode (didn't I get this idea from you?) so the sound goes through the phone system as well as offices. Gordon Mitchell (888) BUG-KILR Charles Patterson wrote: > I've toyed with a variety of sound sources for providing an identifiable audio source during rf sweeps. I curious as to what others are using. > > The basic is a cd player. > When there are a few offices in close proximity, though, we would sometimes put diffferent sources in each. Carrying multiple cd players can get bulky so I've been trying other ideas. > > I have a little warble tone box, but of course that's a bit of a give-away if someone's listening, it is also annoying if anyone still working in the area has to listen to it. > > What has proved handy is a small electronic metronome (cigarette pack size). It just provides a clicking sound but the speed is variable so you can use more than one, just change the click speed. (They are easy to build with some 555 timers, but you can get 'em at music stores for about $15 -$20). When testing them it seems that the clicks are loud enought to be detectable and trigger most devices. > > I grabbed a small "relaxation" device at a tag sale for $2. It provides a set of repeating noises such as jungle sounds, waterfall, ocean waves. It was a small circuit board in a large housing, with a bit of repackaging it might work. > > Years ago I tried turning on an FM radio that was already in an adjoining office just to help cover the extra area. Unfortunately it had super strong out of band oscillations that I was able to easily pick up in the other room. Every time I changed the station, the signal on the SA had audio from the new station. Had me excited for a moment... (one more reason not to give away your finds until you are absolutely sure). Then I realized that the detected signal was changing it's frequency in accordance with the changes I made tuning the radio. Haven't used that idea since. > > CD players still seem the best. Now if somebody would make one small with a loud built in speaker, easy to carry... or if the MP3 players would come down in price they would be neat, too. > > Any other ideas? > > charles > > Charles Patterson > Global Communications > charles@t... > www.telephonesecurity.com/countermeasures > > [Non-text portions of this message have been removed] > > ------------------------------------------------------------------------ > Take your development to new heights. Work with clients like Dell and > pcOrder. Submit your resume to jobs@l.... Visit us at > http://click.egroups.com/1/4358/1/_/507420/_/960990173/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 613 From: Date: Wed Jun 14, 2000 6:38am Subject: Re: sound id sources... thoughts I used the signal from the National Weather Service, five frequencies in the 162 MHz band. This continuous loop recording was unique enough. I never did a sweep in the US where I couldn't find a broadcasting station. The radios were so inexpensive that on occasion I left them as gifts for my clients. Michael 614 From: Charles Patterson Date: Wed Jun 14, 2000 10:06am Subject: Re: sound id sources... thoughts BYOR Bring your own radio sounds good. I did bring some weather radios once or twice (of course, the occaisional basement office might not have good reception). Something I haven't used yet but I have prepared, is an endless loop cassette (made for answering machines, usually 20 to 60 seconds long). I recorded "office sounds" on it, printer printing, keyboard typing, etc. I figure tape players are cheaper than cd's and often you can find some already in place at the secretary's desk. Among my other "free time" plans is to record generic sounds and burn them into my own cd's... charles ----- Original Message ----- From: To: Sent: Wednesday, June 14, 2000 11:38 AM Subject: Re: [TSCM-L] sound id sources... thoughts > > I used the signal from the National Weather Service, five frequencies in the > 162 MHz band. This continuous loop recording was unique enough. > I never did a sweep in the US where I couldn't find a broadcasting station. > The radios were so inexpensive that on occasion I left them as gifts for my > clients. > > Michael > > ------------------------------------------------------------------------ > IT Professionals: Match your unique skills with the best IT projects at > http://click.egroups.com/1/3381/1/_/507420/_/960997122/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 615 From: James M. Atkinson, Comm-Eng Date: Wed Jun 14, 2000 11:52am Subject: Re: sound id sources... thoughts I've used the NOAA weather signal before but found that the audio signal was too narrow bandwidth, and that I needed/wanted signals with high frequency coverage. Eavesdropping devices do interesting things when you start giving them a lot of higher frequencies. IMHO, it is not uncommon for spy shop bugs to "flip out" when hit with a strong audio signal which contains these higher frequencies. Consider this... what is the freq. response on the MICROPHONE on most of the bugging devices out there... then consider if there a filter between the microphone and the actual modulation circuit. Keep in mind that many devices are designed to pick up soken voice communications from 300 to 3500 Hz. Now look at what happens to a typical narrow band (or even wideband) FM signal when we feed it an audio signal outside of the range of it's deviation. Suddenly that little sub-milliwatt device becomes VERY easy to see on the SA. Someone once told be this was called "Cooking Popcorn" as you increase the audio signals frequency range until you force the bug to malfunction and give away it's location. -jma At 11:06 AM -0400 6/14/00, Charles Patterson wrote: >BYOR >Bring your own radio sounds good. > >I did bring some weather radios once or twice (of course, the occaisional >basement office might not have good reception). > >Something I haven't used yet but I have prepared, is an endless loop >cassette (made for answering machines, usually 20 to 60 seconds long). I >recorded "office sounds" on it, printer printing, keyboard typing, etc. I >figure tape players are cheaper than cd's and often you can find some >already in place at the secretary's desk. > >Among my other "free time" plans is to record generic sounds and burn them >into my own cd's... > > >charles > >----- Original Message ----- >From: >To: >Sent: Wednesday, June 14, 2000 11:38 AM >Subject: Re: [TSCM-L] sound id sources... thoughts > > > > > > I used the signal from the National Weather Service, five frequencies in >the > > 162 MHz band. This continuous loop recording was unique enough. > > I never did a sweep in the US where I couldn't find a broadcasting >station. > > The radios were so inexpensive that on occasion I left them as gifts for >my > > clients. > > > > Michael =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 616 From: A Grudko Date: Wed Jun 14, 2000 9:59am Subject: Re: sound id sources... thoughts ----- Original Message ----- Subject: [TSCM-L] sound id sources... thoughts > Any other ideas? How about small, cheap cassette players. Each plays a different, natural sounding conversation between 2 people.... Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax)- Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO(OS), IWWL, PRETrust --- "When you need it done right - first time" --- 617 From: James M. Atkinson, Comm-Eng Date: Wed Jun 14, 2000 9:10pm Subject: Former military officer arrested in spy case http://cnews.tribune.com/news/tribune/story/0,1235,tribune-nation-66184,00.html By Vickie Chachere The Associated Press June 14, 2000 1:44 p.m. CDT TAMPA, Fla. (AP) -- A retired Army Reserve colonel was arrested Wednesday, accused of spying for the Soviet Union during a 25-year Cold War conspiracy while he worked in Germany. The U.S. Attorney's Office identified him as George Trofimoff. It said he conspired to sell classified military intelligence information to the Soviets when he was a civilian employee of the Army. Trofimoff was indicted by federal grand jury in Tampa. The indictment was unsealed Wednesday, after he was arrested. Trofimoff obtained the classified information while serving as a civilian chief of the U.S. Army element of the Nuremburg Joint Interrogation Center in Germany from 1969 to 1994, prosecutors said. Trofimoff also served in the Army Reserve, retiring as a colonel in 1987. He had served several years in the regular Army before entering the Army Reserve in the 1950s. Trofimoff, who lived in Melbourne, retired from his Army civilian employment in 1995, after 35 years. He was born in Germany to Russian parents and was naturalized as a U.S. citizen in 1951. He is the highest-ranking U.S. military officer ever charged with espionage, federal prosecutors said. He had access to all classified information received or produced by the Nuremberg center. A hearing before a U.S. magistrate judge was set for midafternoon. The case will be prosecuted in Tampa, said Steve Cole, a spokesman for the U.S. Attorney's Office. Tampa's MacDill Air Force base is home to the U.S. Central Command, which directed the Gulf War in 1991. MacDill is also home to the U.S. Special Operations Command. Florida has been the scene of other Cold War espionage cases. Ernst Ludwig Forbrich, 43, was convicted in 1984 in Tampa on two counts of espionage and was sentenced to 15 years in federal prison. Forbrich, a resident of West Germany, was convicted of trying to buy U.S. military secrets on behalf of East Germany. In 1982, U.S. Army Warrant Officer Joseph George Helmich confessed in the midst of his espionage trial in Jacksonville to selling military secrets to the Soviet Union. Helmich admitted to contacting Soviet agents in Paris in 1963, when he was facing a possible court-martial because of bad checks. He was sentenced to life in prison. =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 618 From: A Grudko Date: Thu Jun 15, 2000 4:24am Subject: Sound sources - more thoughts - Jammers? ----- Original Message ----- > > Eavesdropping devices do interesting things when you start giving > them a lot of higher frequencies. > IMHO, it is not uncommon for spy shop bugs to "flip out" when hit > with a strong audio signal which contains these higher frequencies. This brings to mind 2 points. If you use a tone just above the best human hearing range I understand (but have never tested) that most microphones would respond to the sound and unless a band pass filter is fitted (certainly not in the 'Spy Shop' units I have seen, this would be transmitted and received/recorded by the electronics at the other end but not heard by the listener. The danger of the listener realising a CS sweep is in place is greatly reduced. I assume that "flip out" means overmodulates and then emits lots of spurious signals. Your CS receiver could have a converter or a visual/audio indication - perhaps different tones for different rooms. This reminds me of 2 'Mike Jammer' circuits we tried unsuccessfully to build in the late 80's. The principal was to use the old 'ultra-sonic Doppler shift' movement detector (burglar alarm) which used a TX and RX at about 40 KHz. Different matched pairs could be used in adjoining rooms without interfering with each other. You would then use 2 TXs on frequencies about one KHz apart, say 40 and 39 KHz at the highest amplitude the transducers would take. We humans couldn't hear them, but the average bat would call it serious noise pollution..... The theory was that the 2 frequencies would mix and hit any mike, producing a low order by-product of about 1 KHz, a high whistle but well within human range. Being a low level by-product but right on the mike element it would exceed any room audio therefore jamming any recording/monitoring. As I say, we couldn't get it to work, and I never saw a unit offered locally but I saw similar units in catalogues so we have supplied white and pink noise generators. I wonder if anyone has had success with this type of technology? Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax)- Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO(OS), IWWL, PRETrust --- "When you need it done right - first time" --- 619 From: Robert G. Ferrell Date: Thu Jun 15, 2000 7:24am Subject: Re: Encryption > I like to remind people that that >NSA employs over 40,000 mathematicians that are constently looking for >ways to break the next generation of encryption, break the laws of >physics, Of course, even the NSA itself admits that it's "behind the technology curve." >> In fact, just using PGP or similar packages 'flags' you as a >> 'suspect' in some Intel. communities. Breaking your or my 'keys' >> is simple for any competent Intel. team. Possible, yes. Routine, perhaps. Simple, no. >Versions after PGP 6.5.1 have a feature that will show the message in >a 'TEMPEST shielded font' (I'd be curious to hear from those on the >list how well this works, If it does, It looks nice.) I can't speak for the specific mechanism referred to here, but the general principal of shielded or filtered fonts is that they are generated using a number of countermeasures that reduce the ability of a TEMPEST system to deduce the letter from its electromagnetic transmission pattern. To quote from Markus G. Kuhn: "Greyscale fonts in which high-frequency vertical edges have been carefully smoothed by low-pass filters emit significantly less energy and the emitted remaining signal is more difficult to separate from the background noise. Minor random variations of the glyph shapes increase the number of patterns that the matching algorithms in eavesdropping receivers have to cope with. These variations help to increase significantly the error rate of the pattern recognition process, thus reducing the value of the gathered data for automatic processing." As to the efficacy of these measures, it depends on the degree to which they are implemented, the specific algorithms employed, and, to a lesser extent, how carefully the messages themselves are constructed (avoiding common patterns, etc.). Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center, US DoI Robert_G_Ferrell@n... ------------------------------------------------------------ Not an official statement by any entity of the US Government ------------------------------------------------------------ 620 From: Steve Uhrig Date: Thu Jun 15, 2000 8:11am Subject: Sound sources - more thoughts - Jammers? Once upon a midnight dreary, A Grudko pondered, weak and weary: > > IMHO, it is not uncommon for spy shop bugs to "flip out" when hit > > with a strong audio signal which contains these higher frequencies. > This reminds me of 2 'Mike Jammer' circuits we tried unsuccessfully > to build in the late 80's. The theory was that the 2 frequencies would > mix and hit any mike, producing a low order by-product of about 1 KHz, > a high whistle but well within human range. > we couldn't get it to work Your idea was appropriate, but you were a bit ahead of the times. Currently, most small transmitters and indeed most products using microphones use electret mikes. They are cheap, sensitive and high fidelity. HOWEVER, electrets have a frequency response well into the ultrasonic range. This is a weakness in surveillance, as there are many natural sources of ultrasonic noise which we do not hear, but electrets do. If we heard all the ultrasonic out there we'd probably go crazy. Bearing squeal, for example, starts at high frequencies and goes down. So does noise from steam radiators, and most anything with mechanics. Electrets with their wide frequency response will pick up a lot of this ultrasonic. Sometimes, the ultrasonic will swamp the lower frequencies of human speech, making the apparent sensitivity poor. Or the relatively loud ultrasonic pollution will pump up a compressor or AGC and reduce sensitivity. And here you are, the poor clown, wondering why your bug doesn't work. All checks out on the bench, but you don't hear ultrasonic energy so you don't know what's going on. Also, electret elements are subject to deliberate jamming countermeasures. People who understand this, and truly know what they are doing (I actually met one the other day) will use dynamic elements in their surveillance transmitters. These have a frequency response much closer to the human ear. They have high frequency rolloffs in the appropriate places, and still good sensitivity since the mass of the element you need to wiggle with sound pressure is so light. Remember, a mic having frequency response above or below the human ear's coverage is asking for trouble. In the human ear, the speech power is in the low frequencies while the intelligence is in the higher frequencies. You need the proper ratio to capture the best signal. Dynamic elements are immune to swamping or otherwise being bothered by ultrasonic energy. Small elements are more sensitive at higher frequencies, because the mass is lower. The physics of microphone design will account for this. Look at curves from the mic manufacturers and you will learn something. Our associate Mr. Grudko's countermeasure device likely was tested on dynamic elements which would not respond to the ultrasonic. Try it on a modern electret mic and it would have a good chance of working. You'd want to do some research and find the resonant frequency of the mic element and attack at that frequency. In one audio device we build for the government, we spend almost as much on the mic element itself as we do on the subsequent electronics. Packaging is the most expensive component of the device. Mic elements cannot be casually selected. Most are selected for availability and cost and size, not for the intended application. If all bugs would use electrets ( a safe bet for garbage bugs, not a safe bet for well designed ones, which are in the tiny minority), you could use an ultrasonic sound source. That likely would be non alerting and well within the sensitivity curve of the mic element. Do some playing around with an oscilloscope on typical mike elements, then on the output of the receiver used to listen to them, and you may be surprised. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 621 From: Steve Uhrig Date: Thu Jun 15, 2000 11:53am Subject: Top Quality NLJD for sale cheap For sale is an ISA-1 Nonlinear Junction Detector, with all accessories and fitted hard case. Unit has been gone over completely by me, several minor repairs made, aligned for max output and aluminum threads in antenna where pole and universal attaches have had a helicoil insert for maximum strength. Power levels may not necessarily be FCC legal in the U.S. as I tuned for max, not for a crippled legal level. Receiver also is very sensitive and the thing hears my signal generator at about 13 dBm into a paperclip from an adjacent room about 30 feet away, when polarization matches. Unit has a good fresh rechargeable battery, and uses a standard $22 gelcell, not some exotic battery pack available only from the U.K. for 150 pounds. Complete with instruction and theory manual. ISA is a premier manufacturer of high end countersurveillance equipment. They are still in business and will service their products, although this one should not need anything for a good long while. This unit is circa 1988. Construction is top quality, all welded heavy gauge metal, not plastic or sheet metal. The duplexers are reinforced for stability and will not detune during shipping like another well known brand of NLJ. Cables use standard TNC connectors, easy to find if you ever want to make a set of different length cables. Unit shows no measureable harmonics on the fundamental frequency. Any harmonics around are being generated in the target, not this thing. Adjustable sensitivity helps reduce false alarms and speed operation in high background alarm areas like metal studs. Antenna can be rotated 90 degrees for sweeping in both antenna polarizations. No plastic in this thing. Made to last. All cavities and internal microwave connectors are gold plated. Includes control unit, remote meter indicator, headphone output, high sensitivity headphones, antenna, universal joint, rugged metal extendable pole of adjustable length, shoulder strap for control unit, internal gelcell, charger, coax and remote meter cables, extendable metal tapper for thumping suspect joints, instruction manual, battery test function on meter, LED power and battery charge indicator, and fitted hard carrying case with combination lock. The NLJD will detect electronic surveillance items, tape recorders, most microphones (electret w/ preamp), video cameras, transmitters, receivers, repeaters, anything electronic containing semiconductors (diodes, transistors or integrated circuits). It will detect them whether they are working or not, whether they even have batteries in them or not. Detection distances depend on several factors, but ranges from 6 inches to maybe12 inches. This device can detect a bug buried in solid concrete, although that is unlikely to happen in real life. It will detect devices on the other side of a wall, so don't freak when you get a hit until you inspect the adjoining areas. It merely may be detecting a clock on the opposite side of the wall. This can be an extremely effective tool in capable hands. Until fairly recently, nonlinear junction detectors were restricted to government use and were classified. Now they are available for nongovernment use, at new prices starting at about $15,000 and going to nearly twice that for rugged commercial units. There are two ways to find a bug whose battery has run down: physical inspection and nonlinear junction detection. You can save a tremendous amount of time over a physical search with competent use of this unit. Plus, you don't have to disturb the area as much, which is a factor when you are in an executive office. A piece like this can separate the men from the boys. Your price only $5500 plus freight. This is about 25% of original cost. Can take credit cards for payment. Call today and you can have it tomorrow. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 622 From: WFR Date: Tue Jun 13, 2000 8:21pm Subject: Re: TSCM Books for sale I am intersted in a couple of the titles if they are still available. Please send a contact number to Desperate10@h.... Thank You, Bill Rust ----- Original Message ----- From: Michael Martz To: TSCM-L@egroups.com Sent: Tuesday, June 13, 2000 6:46 PM Subject: [TSCM-L] TSCM Books for sale Hello, I have a rather large lot of TSCM books for sale. They would make a nice addition to anybodys library. Titles include: The Axnan Attack by Glenn Whidden Guidebook for the Beginning Sweeper by Glenn Whidden Volumes 1,2,3 of The Ear by TSA Dont Bug Me by M.L. Shannon The Phone Book by M.L. Shannon TSCM Bible Countermeasures Cookbook by Ralph D. Thomas Techniques in Counter Surveillance by Marinelli Publishing Wiretap Detection Techniques A Guide to Checking Phone Lines by Theodore Swift plus several books on schematics of various bugging devices. I had thought of getting into TSCM services but determined the equipment needed to do a complete job was out of my budget. The Ear volumes are rather expensive but I hate to see this good stuff sit around in a box. If anybody is interested in this book lot please give me a jingle. Thanks, MM ------------------------------------------------------------------------------ ------------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 623 From: Miguel Puchol Date: Thu Jun 15, 2000 4:17am Subject: RE: Re: [sacipub] Re: Encryption Just a point... > -----Mensaje original----- > De: William Knowles [mailto:wk@c...] > Enviado el: martes, 13 de junio de 2000 17:18 > Para: A Grudko > CC: sacipub@egroups.com; TSCM-L@egroups.com > Asunto: Re: [TSCM-L] Re: [sacipub] Re: Encryption > > In fact, just using PGP or similar packages 'flags' you as a > > 'suspect' in some Intel. communities. Breaking your or my 'keys' > > is simple for any competent Intel. team. > > Well if that is the case, Hello to my friends and fans in domestic > surveillance! You could use a steganography system. I have used software for hiding files or messages in other files like WAVs or pictures, inocent-looking of course. For example, you could encrypt with PGP and then hide the result in another file, and send it that way. The only thing I don't know is wether the 'agencies' sistematically check (if there is a way to do so effectively) for steganography. Mike 624 From: Miguel Puchol Date: Thu Jun 15, 2000 4:17am Subject: RE: Control Freaks.......... > > However, if you use an encryption package (PGP) etc. The warrent would > > be issued directly to you. You would be instructed to give them your > > private de-coding key. If you refuse you could face a two year prison > > sentence. > > > > But here's a twist for you. If you TELL anyone that you have > been issued > > a warrent for your private de-coding key, the sentance could go up to > > five years behind bars! There's [still] a provision in UK law that gives you the right to an attorney / lawyer, and I can't see how silence on this matter can be inforced upon you. Imagine the scene... - You: "I would like a lawyer please..." (Some time later) - Lawyer: "Hello, I'm your lawyer, what's the problem?" - Y: "Errr...I can't tell you." - L: "Why?" - Y: "Well, if I don't tell you, I'll get two years, if I do, I'll get five..." Etc. Mike 625 From: Date: Wed Jun 14, 2000 10:36am Subject: Re: TSCM Books for sale I am interested in some of these items. Can you page me and I''ll call you 651-969-0832? Thanks DMM 626 From: Date: Thu Jun 15, 2000 5:03pm Subject: Interesting Landline Enigma. This post is off topic but has technical security relevance. I am requesting any and all advice, comments, on this phenomena. After I had my current landline connected I ran into a strange problem. Every time I dialed out 2 separate lines would dial out. For example, if I called a friend, I would hear my friend answer the phone and simultaneously I would hear a busy signal. One line in to my dwelling, two lines out. Hmm, odd, annoying, especially when the busy signal turns into an offhook tone. So, I complained to the phone company and after a short time this was corrected. Then I connected my webtv.. The same effect was (and is) happening on the net connection. Duplicate signals being sent out simultaneously. This is not usually apparent since I would guess that they are so close that the hit the same spot, so to speak. Although logging onto a chat, and other functions sometimes bring up double screens and messages. Odd. My hypothesis is that the phone signal is leaving my dwelling, being split for some reason, then re-routed back on course. This would not arouse my suspicion except that the 'overt' problem that I complained about was 'corrected'. Only a more subtle digital transmission from my webtv. unit is sensitive enough to double now. Suggestions appreciated, Thank you for your time. Negative-. 627 From: Charles Patterson Date: Thu Jun 15, 2000 8:21pm Subject: Re: Interesting Landline Enigma. Hi Neg, what you probably have is crossed lines somewhere. this could be in your home or out in telco land. If you have two lines in your house, you may have a jack that has both pairs connected on the same screws, or you may have a 2 line phone somewhere that has both line buttons pressed down in a sort of conference mode. It may be the phone company's problem if their wires got crossed out on the street somewhere. When you dial a number, one call gets to the destination first, the second line gets a busy signal. What to do... Use a test set (or a single line phone) and dial an ANI number (try 800-346-0152 if you don't know any for your area), and see if you can hear two numbers being read back to you. You may recognize both numbers as your own. If one number is not yours then the problem may be with the telco. Go to the demarc (where the phone lines enter your building) and test from there, disconnecting everything in the house. If you are sure you are connected to only one pair of wires and you still hear two lines being rung through, then the problem is still with the phone company wiring. Good luck -Positive. ----- Original Message ----- From: To: Sent: Thursday, June 15, 2000 6:03 PM Subject: [TSCM-L] Interesting Landline Enigma. > > This post is off topic but has technical security relevance. I am > requesting any and all advice, comments, on this phenomena. > > After I had my current landline connected I ran into a strange problem. > Every time I dialed out 2 separate lines would dial out. For example, if > I called a friend, I would hear my friend answer the phone and > simultaneously I would hear a busy signal. One line in to my dwelling, > two lines out. Hmm, odd, annoying, especially when the busy signal turns > into an offhook tone. > So, I complained to the phone company and after a short time this was > corrected. > > Then I connected my webtv.. The same effect was (and is) happening on > the net connection. Duplicate signals being sent out simultaneously. > This is not usually apparent since I would guess that they are so close > that the hit the same spot, so to speak. Although logging onto a chat, > and other functions sometimes bring up double screens and messages. Odd. > > My hypothesis is that the phone signal is leaving my dwelling, being > split for some reason, then re-routed back on course. > This would not arouse my suspicion except that the 'overt' problem that > I complained about was 'corrected'. Only a more subtle digital > transmission from my webtv. unit is sensitive enough to double now. > > Suggestions appreciated, > Thank you for your time. > Negative-. > > > > ------------------------------------------------------------------------ > Get a FREE "YourName.Com" Web Address, > E-Mail, and Home Page...TODAY! CLICK HERE! > http://click.egroups.com/1/5460/1/_/507420/_/961115312/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 628 From: Date: Thu Jun 15, 2000 10:03pm Subject: Re: Interesting Landline Enigma. am experiencing similar problem on my web tv unit. occurred recently after web tv upgrade to allow chat function ,as well as coincided with joining TSCM list membership. could be a Microsoft glitch, a webtv virus or a hacker attack. since the phone company charges extra for over a certain limit of calls, it could even be MaBell seeking to increase revenues surrepticiously. if you also joined the Hotsites membership list that was briefly mentioned in a TSCM communique,it could also be one of their commonly heralded viruses. e-groups is a perfect virus medium , as it is circulated to many people simultaneously. utilize web tv or your primary internet device as a low security appliance and do not store critical data on it, as the web is notoriously open to information theft. many hackers simply view cracking / hacking as an inticate amusing challenge . complaining to Microsoft could better alleviate problem and afford a better understanding of it as they will ultimately do a systems check. currently ,it has not been an over-riding nuisance as yet but i do feel that it could be an ever present hacker monitoring attack. As time goes on ,i will investigate more thoroughly. if even the Los Alamos secrets are up for public display ,how much more so , are lower security defenses vulnerable to compromise. HAVE A GREAT DAY !!! 629 From: Date: Thu Jun 15, 2000 10:19pm Subject: Re: Interesting Landline Enigma. Charles; thanks for the insight,on the lines crossed! noticed weird things happening after Microsoft's last upgrade. also hackers are getting more and more sophisticated every day. here's to privacy! most systems can be compromised, so internet security must constantly be observed. HAVE A GREAT DAY !!! 630 From: James M. Atkinson, Comm-Eng Date: Thu Jun 15, 2000 11:32pm Subject: Police Probe Attempt to Buy Garbage Linked to Microsoft http://interactive.wsj.com/articles/SB961105810825579561.htm June 16, 2000 Police Probe Attempt to Buy Garbage Linked to Microsoft By TED BRIDIS Staff Reporter of THE WALL STREET JOURNAL WASHINGTON -- On the evening of June 1, Jose Lopez and Erminia Morales of P&R Enterprises were going about their normal office-cleaning duties when, they say, a woman approached them and offered in Spanish to pay between $50 and $60 to each of them for the trash of the Association for Competitive Technology here. The trade group is heavily funded by Microsoft Corp. and has been relentlessly pro-Microsoft in its work. The cleaners said the woman identified herself as Blanca Lopez and asked them to bring the bags of trash to Upstream Technologies, on the same floor of the building. The cleaners declined. Less than one week later -- exactly one day before U.S. District Judge Thomas Penfield Jackson ordered the breakup of the software giant -- the value of Microsoft-related trash rose dramatically. Lou DeLeon, the general manager for the cleaning service, said Ms. Lopez returned the evening of June 6 and repeated her request for the trash. This time she offered $500 each to the two cleaners and $200 more to their supervisor. When they again declined, Ms. Lopez handed over a copy of her business card and asked that Mr. DeLeon call her, saying she was "investigating a criminal case and wanted the trash from these suites," according to the cleaning crew. Mr. DeLeon got the business card but never called her. The cash-for-trash offers came just days before a mysterious break-in at Microsoft's offices here in Dupont Circle. So far, no one has been charged with anything. Microsoft officials say it doesn't look like any valuables were stolen in the weekend break-in. And police say the bizarre trash-buying attempt -- which may have been totally unrelated to the break-in -- probably wasn't even against the law. When contacted by The Wall Street Journal, Blanca Lopez said, "I know nothing of this," and referred questions to Martin Lobel, a Washington antitrust attorney. Mr. Lobel said Monday that he was paid "a nice retainer" by an executive at Upstream Technologies, whose name he declined to reveal, to investigate the trash-buying incident. But he said Blanca Lopez was not his client. The next day, Blanca Lopez hired attorney Pamela Bethel, a former assistant U.S. prosecutor, and stopped talking to Mr. Lobel, he said. Ms. Bethel declined to comment. Upstream Technologies is itself shrouded in mystery, with no evidence that it exists as a corporation. Its three-month lease next to the Association for Competitive Technology was arranged to begin May 1 by a Robert Walters, according to a copy of the credit application he made for the property. An Upstream lawyer identified Mr. Walters as a former investigative reporter. A New York Times article in August 1998 identified a Robert Walters as a former newspaper reporter who had links to Investigative Group International Inc., a high-powered research firm led by Terry Lenzner that has been employed by lawyers for President Clinton. Larry Potts, former deputy director at the Federal Bureau of Investigation, is IGI's chief operating officer. Sitting on a special board of advisers created by IGI is George Vradenburg, senior vice president for global and strategic policy at America Online Inc., a fierce Microsoft rival. An AOL spokesman, Andrew Weinstein, said Mr. Vradenburg agreed to sit on the board at the request of Mr. Lenzner, a personal friend. But Mr. Vradenburg hasn't attended any board meetings and isn't involved with the work of the company, Mr. Weinstein said. In a statement, Edward Federico, corporate vice president and director of operations for IGI in Washington, said, "It is IGI's longstanding policy not to respond to media inquiries relating to client, personnel or other business issues. However, at the specific request of Mr. George Vradenburg of America Online, a member of IGI's advisory board, I can confirm that neither AOL nor Mr. Vradenburg is a client of IGI." In correspondence with the building's management, Mr. Walters named three others from Upstream authorized to use the office, including one person identified as Grant Stockdale. Mr. Stockdale was listed as the IGI spokesman on a May 1 news release. But a woman answering the telephone at the number provided for Mr. Stockdale on the release said that no one with that name worked at IGI. Mr. Walters didn't return repeated messages left at his home and office and with business colleagues. By Friday, a woman answering the office telephone number that had been accepting messages for Mr. Walters said she did not know anyone by that name. Aside from the hiring of Mr. Lobel and the opening of the office, there is no evidence that Upstream Technologies exists as a corporation. On a credit application for the office suite, Mr. Walters said the company was involved in "technology development," and listed an address on Main Street in Laurel, Md. That address is of a telephone answering service, where the owner and employees say they have never heard of Upstream. Maryland state records show no firm incorporated there. Mr. Walters wrote that Upstream wanted to rent the office for "selected company employees" to make telephone calls and catch up on work while they were downtown. Telephone logs for the Upstream office for the entire month of May show only five outgoing phone calls, none lasting longer than 48 seconds and almost all of them made late in the evening. Three were made to the home of Mr. Walters in Washington or to his wife at work. The other two were to voice-messaging systems. The new Upstream lawyer, Mr. Lobel, says he doesn't know any details about the company either. "They tend to be very low-profile," Mr. Lobel said. He complained that "so far nobody has returned my calls." The head of the pro-Microsoft trade association, Jonathan Zuck, and some Microsoft insiders believe industry rivals may be behind the break-in and the two attempts to buy the unshredded trash at Mr. Zuck's offices. They note the plethora of leaks of confidential Microsoft e-mails to the press during the antitrust investigation to bolster their case. Police are continuing to investigate the break-in at Microsoft's offices here. The cleaning crew who turned down $1,200 for the trash at Mr. Zuck's building, meanwhile, were rewarded this week by their boss. "We appreciate the honesty of our employees," Mr. DeLeon said. He gave them checks for modest amounts -- far less than $500 each, he admitted -- and a pizza party. Write to Ted Bridis at ted.bridis@w... =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 631 From: B.K. DeLong Date: Thu Jun 15, 2000 11:19pm Subject: Microsoft, Watergate and Industrial Espionage Crazy stuff: http://interactive.wsj.com/articles/SB961105810825579561.htm June 16, 2000 ---------------------------------------------------------------------------- ---- Police Probe Attempt to Buy Garbage Linked to Microsoft By TED BRIDIS Staff Reporter of THE WALL STREET JOURNAL WASHINGTON -- On the evening of June 1, Jose Lopez and Erminia Morales of P&R Enterprises were going about their normal office-cleaning duties when, they say, a woman approached them and offered in Spanish to pay between $50 and $60 to each of them for the trash of the Association for Competitive Technology here. The trade group is heavily funded by Microsoft Corp. and has been relentlessly pro-Microsoft in its work. The cleaners said the woman identified herself as Blanca Lopez and asked them to bring the bags of trash to Upstream Technologies, on the same floor of the building. The cleaners declined. Less than one week later -- exactly one day before U.S. District Judge Thomas Penfield Jackson ordered the breakup of the software giant -- the value of Microsoft-related trash rose dramatically. Lou DeLeon, the general manager for the cleaning service, said Ms. Lopez returned the evening of June 6 and repeated her request for the trash. This time she offered $500 each to the two cleaners and $200 more to their supervisor. When they again declined, Ms. Lopez handed over a copy of her business card and asked that Mr. DeLeon call her, saying she was "investigating a criminal case and wanted the trash from these suites," according to the cleaning crew. Mr. DeLeon got the business card but never called her. The cash-for-trash offers came just days before a mysterious break-in at Microsoft's offices here in Dupont Circle. So far, no one has been charged with anything. Microsoft officials say it doesn't look like any valuables were stolen in the weekend break-in. And police say the bizarre trash-buying attempt -- which may have been totally unrelated to the break-in -- probably wasn't even against the law. When contacted by The Wall Street Journal, Blanca Lopez said, "I know nothing of this," and referred questions to Martin Lobel, a Washington antitrust attorney. Mr. Lobel said Monday that he was paid "a nice retainer" by an executive at Upstream Technologies, whose name he declined to reveal, to investigate the trash-buying incident. But he said Blanca Lopez was not his client. The next day, Blanca Lopez hired attorney Pamela Bethel, a former assistant U.S. prosecutor, and stopped talking to Mr. Lobel, he said. Ms. Bethel declined to comment. Upstream Technologies is itself shrouded in mystery, with no evidence that it exists as a corporation. Its three-month lease next to the Association for Competitive Technology was arranged to begin May 1 by a Robert Walters, according to a copy of the credit application he made for the property. An Upstream lawyer identified Mr. Walters as a former investigative reporter. A New York Times article in August 1998 identified a Robert Walters as a former newspaper reporter who had links to Investigative Group International Inc., a high-powered research firm led by Terry Lenzner that has been employed by lawyers for President Clinton. Larry Potts, former deputy director at the Federal Bureau of Investigation, is IGI's chief operating officer. Sitting on a special board of advisers created by IGI is George Vradenburg, senior vice president for global and strategic policy at America Online Inc., a fierce Microsoft rival. An AOL spokesman, Andrew Weinstein, said Mr. Vradenburg agreed to sit on the board at the request of Mr. Lenzner, a personal friend. But Mr. Vradenburg hasn't attended any board meetings and isn't involved with the work of the company, Mr. Weinstein said. In a statement, Edward Federico, corporate vice president and director of operations for IGI in Washington, said, "It is IGI's longstanding policy not to respond to media inquiries relating to client, personnel or other business issues. However, at the specific request of Mr. George Vradenburg of America Online, a member of IGI's advisory board, I can confirm that neither AOL nor Mr. Vradenburg is a client of IGI." In correspondence with the building's management, Mr. Walters named three others from Upstream authorized to use the office, including one person identified as Grant Stockdale. Mr. Stockdale was listed as the IGI spokesman on a May 1 news release. But a woman answering the telephone at the number provided for Mr. Stockdale on the release said that no one with that name worked at IGI. Mr. Walters didn't return repeated messages left at his home and office and with business colleagues. By Friday, a woman answering the office telephone number that had been accepting messages for Mr. Walters said she did not know anyone by that name. Aside from the hiring of Mr. Lobel and the opening of the office, there is no evidence that Upstream Technologies exists as a corporation. On a credit application for the office suite, Mr. Walters said the company was involved in "technology development," and listed an address on Main Street in Laurel, Md. That address is of a telephone answering service, where the owner and employees say they have never heard of Upstream. Maryland state records show no firm incorporated there. Mr. Walters wrote that Upstream wanted to rent the office for "selected company employees" to make telephone calls and catch up on work while they were downtown. Telephone logs for the Upstream office for the entire month of May show only five outgoing phone calls, none lasting longer than 48 seconds and almost all of them made late in the evening. Three were made to the home of Mr. Walters in Washington or to his wife at work. The other two were to voice-messaging systems. The new Upstream lawyer, Mr. Lobel, says he doesn't know any details about the company either. "They tend to be very low-profile," Mr. Lobel said. He complained that "so far nobody has returned my calls." The head of the pro-Microsoft trade association, Jonathan Zuck, and some Microsoft insiders believe industry rivals may be behind the break-in and the two attempts to buy the unshredded trash at Mr. Zuck's offices. They note the plethora of leaks of confidential Microsoft e-mails to the press during the antitrust investigation to bolster their case. Police are continuing to investigate the break-in at Microsoft's offices here. The cleaning crew who turned down $1,200 for the trash at Mr. Zuck's building, meanwhile, were rewarded this week by their boss. "We appreciate the honesty of our employees," Mr. DeLeon said. He gave them checks for modest amounts -- far less than $500 each, he admitted -- and a pizza party. Write to Ted Bridis at ted.bridis@w... -- B.K. DeLong Research Lead ZOT Group 617.542.5335 ext. 204 bkdelong@z... http://www.zotgroup.com From: James M. Atkinson, Comm-Eng Date: Fri Jun 16, 2000 9:23am Subject: SECURITY FIASCO -Richardson bungled critical duty http://www.paducahsun.com/cgi-bin/view.cgi?/200006/16+00S4_editorial.h tml+20000616+editorial">http://www.paducahsun.com/cgi-bin/view.cgi?/20 0006/16+00S4_editorial.html+20000616+editorial SECURITY FIASCO Richardson bungled critical duty Struggling to contain another scandal over grievous security lapses at the Los Alamos nuclear weapons lab, Energy Secretary Bill Richardson issued one of his typical ringing pronouncements, using the same earnest tone he employs when he comes to Paducah to promise action on the cleanup of the uranium enrichment plant here. Declared Richardson: "I want accountability." Accountability is exactly what's needed at the Department of Energy. And it should begin with Richardson, an ambitious political hack who has proven himself utterly incapable of overseeing an agency that has the duty of protecting some of the nation's most sensitive secrets. The story unfolding at the Los Alamos laboratory is nothing less than astounding. Two computer hard drives containing secret data on nuclear weapons are missing. No one seems to know what happened to them, but DOE officials say not to worry: they may have been misplaced when Los Alamos employees were trying to protect the lab's documents from a wildfire. Misplaced? People misplace their car keys. It's simply assumed that the government does not "misplace" nuclear secrets. With the Clinton administration in charge of the nuclear weapons program, it's not safe to assume anything about our security safeguards. A fear is that all of our secrets are threatened by the administration's laissez-faire attitude toward national security. Perhaps the most appalling fact revealed by reports on the missing hard drives is that Los Alamos employees discovered they were missing on May 7, but didn't report the security breach to their superiors until three weeks later. Richardson said he didn't know about the missing computer hardware until last week. Incredibly, some DOE officials are trying to downplay the importance of this massive breakdown in nuclear security. Meanwhile, Richardson is in his "I'll take care of it íƒÓ I promise" mode. It needs emphasizing that this isn't just another political problem for the Clinton administration's spin team. The missing hard drives contain information on U.S. nuclear bombs as well as diagrams of nuclear weapons produced by France, China and Russia. Said Sen. Jon Kyl, R-Ariz.: "What's missing, and may well have been stolen, is information about how to disarm our nuclear weapons and those of perhaps some other countries whose nuclear weapons could be stolen and used by terrorists." This information would be of tremendous interest to a variety of terrorist groups, not to mention outlaw nations such as Iran, Iraq and North Korea. Last year, when Los Alamos was embroiled in a scandal involving an engineer who was indicted for copying nuclear secrets, Richardson vowed that he would improve security and ensure that the nation's nuclear secrets were protected. Since then the energy secretary has devoted a good deal of time and effort to advancing the presidential aspirations of his political ally, Vice President Al Gore. Richardson, a former congressman, is frequently mentioned as a possible running mate for Gore. Presumably, Richardson's chances of being on the ticket with Gore vanished with the latest revelations from Los Alamos. But that is a small price to pay for presiding over the collapse of security at the nation's most important nuclear weapons facility. For the sake of national security, Richardson must go. If President Clinton is serious about safeguarding nuclear secrets íƒÓ that is, of course, one of the fundamental obligations of his job íƒÓ he should promptly remove Richardson from the energy post and replace him with a credible administrator. Then it's up to Congress to get to the bottom of the security disaster at Los Alamos, which has, as Rep. Ike Shelton, D-Mo., said, put at risk "some of the crown jewels of American scientific achievement." All of those responsible for the fiasco must be held accountable for compromising the security of the American people. =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 633 From: James M. Atkinson, Comm-Eng Date: Fri Jun 16, 2000 9:26am Subject: Senate confirms new CIA nuclear weapons chief http://www.nandotimes.com/politics/story/body/0,1066,500215932-5003060 56-501700433-0,00.html By H. JOSEF HEBERT, Associated Press WASHINGTON (June 14, 2000 1:17 p.m. EDT http://www.nandotimes.com) - Spurred by another security breech at the Los Alamos weapons lab, the Senate quickly confirmed the No. 2 man at the CIA to head a new nuclear weapons agency within the Energy Department. Air Force Gen. John A. Gordon, now deputy CIA director, won unanimous confirmation Wednesday after his nomination had been held up for months. The vote was 97-0. The disappearance of nuclear secrets from a vault at the Los Alamos weapons lab in New Mexico has prompted a criminal investigation and unleashed another torrent of criticism about security at the Energy Department, leaving the Clinton administration scrambling to contain the political fallout. Senior Energy Department officials told a Senate hearing that the FBI has taken over what now is a criminal investigation and that some scientists - members of a special nuclear emergency response team - were to begin undergoing polygraph tests Wednesday as authorities try to find out what happened to the secrets contained in two computer hard drives. As the vote was taken on Gordon's nomination, senators at a hearing lashed out at Energy Secretary Bill Richardson, who had sent his senior advisers but did not show up for the hearing to explain the latest security flap involving his department. Perhaps Richardson would have found time to attend "if the secretary would spend less time trying to get the vice president elected," Sen. Richard Shelby, R-Ala., chairman of the Intelligence Committee, declared sarcastically. But Democrats also were sharply critical. The incident, coming after the alleged espionage controversy involving former Los Alamos scientist Wen Ho Lee last year, represents "a culture of indifference about security," said Sen. Richard Bryan, D-Nev. Until the latest security breach, Gordon's nomination had languished in the Senate since last March. Democrats and the administration had sought to use the nomination to try to get changes that would make the new agency less independent within the Energy Department. "It is critical that General Gordon take over," said Sen. Jon Kyl, R-Ariz., in light of the latest Los Alamos security breach. He accused Richardson "of not minding the store" in terms of assuring that America's nuclear secrets are secure. Gordon, who has said he would retire from the military if confirmed, "will be taking on one of the most challenging assignments in the federal government," said Sen. Carl Levin of Michigan, the Armed Services Committee's senior Democrat. At a joint hearing of the Senate intelligence and energy committees, DOE and Los Alamos officials said that the two computer drives - used as part of a "tool kit" for an emergency nuclear response team known as NEST - had last been confirmed in a top-secret vault on April 7. On May 7, members of the NEST team went into the vault to safeguard the kit and put it out of harm's way from a raging fire that was closing in on the laboratory. On the next day the laboratory was evacuated. Los Alamos lab director John Brown told the senators the team members told no one of the disappearance. "That was the first mistake," said Browne, adding that he was "disturbed, angry ... and frustrated" about the way the whole incident had been handled "after everything that we've been through the past year." Los Alamos was the focus of a yearlong controversy in 1999 over alleged security lapses involving former lab scientist Wen Ho Lee. Lee has been charged with illegally copying highly classified nuclear weapons computer files and awaits trial. He had been the focus of a three-year investigation into alleged losses of secrets to China, but has not been charged with espionage. The new disclosures gave Republicans plenty of ammunition to criticize the Clinton administration's national security record. And while Richardson emerged largely unscathed last from the Wen Ho Lee case, this time Richardson is expected to be a prime target. =================================================================== Do not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup. =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Nil carborundum illigitimi =================================================================== 634 From: Bob Date: Thu Jun 15, 2000 9:58pm Subject: Re: Re: [sacipub] Re: Encryption Miguel Puchol wrote: > > Just a point... > > > -----Mensaje original----- > > De: William Knowles [mailto:wk@c...] > > Enviado el: martes, 13 de junio de 2000 17:18 > > Para: A Grudko > > CC: sacipub@egroups.com; TSCM-L@egroups.com > > Asunto: Re: [TSCM-L] Re: [sacipub] Re: Encryption > > > In fact, just using PGP or similar packages 'flags' you as a > > > 'suspect' in some Intel. communities. Breaking your or my 'keys' > > > is simple for any competent Intel. team. > > > > Well if that is the case, Hello to my friends and fans in domestic > > surveillance! > > You could use a steganography system. I have used software for hiding files > or messages in other files like WAVs or pictures, inocent-looking of course. > For example, you could encrypt with PGP and then hide the result in another > file, and send it that way. > > The only thing I don't know is wether the 'agencies' sistematically check > (if there is a way to do so effectively) for steganography. > > Mike > There is no way to prove the existance of encrypted data in a properly implemented stenanographic system. The whole purpose is to provide plausible deniability. You might wish to check out: http://ban.joh.cam.ac.uk/~adm36/StegFS/ Which is a steg. file system for Linux. I have not tried it and cannot vouch for it, but there are two interesting features which it claims: 1) A file system can have multiple decryption keys. Depending on which key you use, different files are revealed. There is no way to prove the existance or non-existance of additional keys or files. So the authorities confiscate you computer. They note that you have StegFS on it. They demand your key. You give it to them and it reveals all of the taudry corresponcance between you and your mistress. How embarrasing. Meanwhile, the secret plans for the Uranium Pew-38 Explosive Space Modulator remain hidden and cannot be shown to even exist. 2) A WAV file can be used as the file system. The goodies are encrypted into the low order 4 bits of each 16 bit sample. Since these bits typicly contain noise, there is again no way to prove that a message even exists. Note, for this gambit to work you would not want to "rip" a commercial CD. That would provide a refference to compare against. Best to record your own WAV files, sending silly songs back and forth, etc. Again, if you feel you cannot claim the WAV files are inocent, simply load them with sufficiently embarrasing data under an alternate key. Your total storage capacity is one forth that of the entire WAV file. Bob Washburne 635 From: Michael Martz Date: Fri Jun 16, 2000 6:48am Subject: TSCM Books all Sold Hello, Thanks for everybodys interest in the book lot but I have sold everything already. MM 636 From: Date: Fri Jun 16, 2000 0:25am Subject: Re: Interesting Landline Enigma. As I stated, the landline problem was corrected shortly after I informed the telephone company about it. The webtv. problem persists. Logic states that the odds of a virus (which webtv. says is impossible) duplicating my already strange phone problem is highly improbable. Thank you for the input. I guess it is back to whining at the phone company. Since they corrected the superficial problem, maybe they can correct the subtle one. Shin shin, shin gan. Negative-. 637 From: Robert G. Ferrell Date: Fri Jun 16, 2000 10:05am Subject: Re: Police Probe Attempt to Buy Garbage Linked to Microsoft >In correspondence with the building's management, Mr. Walters named >three others from Upstream authorized to use the office, including >one person identified as Grant Stockdale. A few miscellaneous facts and rumination: Grant Stockdale is (or at least was) the publisher and president of the Technology Publishing Group, which he founded in 1991. Prior to that, he was North American Editorial Director at Jane's Information Group, London. He was also a founder of New Technology Week and Defense Week, and associate publisher at The Energy Daily in the 1970s. 'Robert Walters' is an international IT recruitment consultancy based in London, although that's a common enough name that there may be no connection. There was an employment ad for Upstream Technology on monster.com some time last fall (don't know the details, though). The only actual firm I know of by that name is an Australian printer supplies company. Cheers, RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 638 From: Dawn Star Date: Fri Jun 16, 2000 10:52am Subject: Trash story The cleaning crew who turned down $1,200 for the trash at Mr. Zuck's building, meanwhile, were rewarded this week by their boss. "We appreciate the honesty of our employees," Mr. DeLeon said. He gave them checks for modest amounts -- far less than $500 each, he admitted -- and a pizza party. This reminds me of an experience I had some yeas ago. I was doing a night sweep in a high rise in Century City , Los Angeles. While taking a break in the hallway I noticed a stack of computer records 3 inches thick in a trash can moved into the hall by the night cleaning crew. I looked at the printouts and they were all the current financial info, status of accounts of a financial company down the hall that I was not working for. The next day I stopped in at this company with the printouts and asked to see the president. I said it was confidential. The secretary said he was too busy to see me. I said well give him these, and flopped the print outs on her desk. I made it to about the elevator and this man came frantically running down the hall. All of a sudden this big time exec had all the time in the world to see me. Oh well so much for attitude adjustments. Roger Tolces [Non-text portions of this message have been removed] 639 From: A Grudko Date: Fri Jun 16, 2000 9:12am Subject: Bugged computer? This was forwarded by a colleague Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax)- Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO(OS), IWWL, PRETrust --- "When you need it done right - first time" --- The following advertisement has some interesting implications surrounding it, and may well be of some interest to many of you . . . ---------------------------------------------------------------------------- ---- Your computer may be bugged, watching and recording every key you press, every program you run, every document you open, even precisely how many minutes you spent on each computer task. And it might be e-mailing that data to some nosyparker. An installation of WinWhatWhere's ($99) Investigator program for Windows does all of that, without showing any evidence to the computer user. Now that a government advisory suggests that users should be told of any such monitoring, WinWhatWhere has added a Notification Banner feature, which warns you on screen that the Investigator is on your case. ---------------------------------------------------------------------------- ---- The company's web site address is: http://www.winwhatwhere.com/ Take care! --Lee ---------------------------------------------------------------------------- ---- Lee Koerber . . . KOERBER INVESTIGATIONS Serving the States of Minnesota & South Dakota, USA P. O. Box #326, Ivanhoe, MN 56142-0326, USA http://www.Koerber-Investigations.com mailto:erko@f... mailto:SWMNPI@a... 1-507-694-1656 640 From: A Grudko Date: Fri Jun 16, 2000 9:18am Subject: Strange phone A fellow PI in the US posted this on another list, and I thought you phone experts might have an answer. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax)- Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO(OS), IWWL, PRETrust --- "When you need it done right - first time" --- ----- Original Message ----- > We have had a strange occurrence at our house. First of all, you need to > know that my home phone #, at one time, was also my fax number (before I > found eFax). > > In the middle of the night, the phone sometimes rings; except only one of > the phones rings - not the extensions (very bizarre). > I heard this the other night and, thinking I had left my cordless in another > room, I didn't want to get up unless it was really important (in which case > whoever was calling - the police, my son) - would call a 2nd time. > > No second call was forthcoming, and I went back to sleep. In the a.m., I > looked at the caller ID to see who awoke me in the middle of the night, for > no good reason. There was nothing - repeat, nothing, displayed on the > caller ID. I recollected that the phone had rang more than once, but that > the "rythm" of the ring was not the usual. (As most of you know, I'm sure, > if someone calls, then hangs up after only one ring, often the caller ID > will not register the call). > > My son was not home the night this happened. I told him about it the next > day and he confirmed that this had happened several times, and that when he > picks up the phone, he hears a fax tone. He confirmed it always happens > very late at night, and that only of the the phones rings, and that the > caller ID does not register the call. > > I'm probably paranoid (but then, if I wasn't, I don't suppose I'd be a PI), > but I'd appreciate anyones take on what could be causing this. 641 From: A Grudko Date: Fri Jun 16, 2000 1:21pm Subject: Re: Re: [sacipub] Re: Encryption ----- Original Message ----- > You could use a steganography system. I have used software for hiding files > or messages in other files like WAVs or pictures, inocent-looking of course. > For example, you could encrypt with PGP and then hide the result in another > file, and send it that way. > The only thing I don't know is wether the 'agencies' sistematically check > (if there is a way to do so effectively) for steganography. I think the Intel agencies are hooked into every language, including stenography, brail, mores code etc. If there are really 40 000 NSA agents working it - and I do not doubt our esteemed colleagues on this, I think no 'common' code such as PGP is secure. For me it is not a question of hiding (one-time pads still rule when needed) 'cos we have nothing to hide from the 'Feds', but we have a lot to hide from the crooks we investigate; so it becomes a question of legitimate security. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax)- Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO(OS), IWWL, PRETrust --- "When you need it done right - first time" --- 642 From: A Grudko Date: Fri Jun 16, 2000 0:52pm Subject: Re: Control Freaks.......... > Imagine the scene... > - You: "I would like a lawyer please..." > (Some time later) > - Lawyer: "Hello, I'm your lawyer, what's the problem?" > - Y: "Errr...I can't tell you." > - L: "Why?" > - Y: "Well, if I don't tell you, I'll get two years, if I do, I'll get > five..." Etc. Mike They want to 'paint us into a corner'. Do not confuse law with justice or logic. The law is a powerful tool for the corrupt. The reason that governments want unrestricted surveillance and total prohibition of private counter-surveillance is easy to understand. Hitler did the same with gun control 18 months before he opened the first gas chamber. I think I'll just stop working for a living and go into politics. I just have to work with my therapist on these damned morals! Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax)- Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO(OS), IWWL, PRETrust --- "When you need it done right - first time" --- 643 From: A Grudko Date: Fri Jun 16, 2000 1:43pm Subject: Re: Interesting Landline Enigma. ----- Original Message ----- > what you probably have is crossed lines somewhere. this could be in your home or out in telco land. OTHER scenario Bad guy wants to get into your home/office. Bad guy locates your line at the pole/DB, whatever you call it, off your premises. Bad guy joins 0.1uf cap between one leg of your circuit and any neighbor's. Instant cross talk - so annoying but the phone works. You report a 'fault'. Bad guy's 'technician' turns up with fake ID to fix fault. You're so happy to see him - but he plants bug and removes cap. 'Fault' goes away. You're happy ..... and so is the bugger. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax)- Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO(OS), IWWL, PRETrust --- "When you need it done right - first time" --- 644 From: Charles Patterson Date: Fri Jun 16, 2000 2:02pm Subject: Re: Strange phone Andy, two technical possibilities worth considering (besides the usual harrassment concept). When the son picked up the phone and heard a fax tone, that was probably an automatic fax service on it's midnight rounds dialing any number it can think of. The other rings could be a malfunctioning fax server. More likely, the phone companies here have an automatic testing feature that sends a pulse out on certain lines, not exactly random, but selected in various locations for testing their circuits. It is usually done late at night. It is usually a brief pulse that rarely sets off a ringer. When it does, it usually just give enough to cause a single ding on ye old standard bell ringer. Now with modern phones and systems, this short pulse might be detected as a ring and the phone set or system may trigger it's own longer ring. We spent a few days monitoring calls at a top exec's estate here. It was happening every evening between 11 and 11:15 pm. Because he had a phone system, every phone in his house would start ringing because the system thought the pulse was a regular ring. When I got the info about that automated testing, one call to the repair department confirmed that his line was on the testing list. They were able to remove it from the list promptly and all the strange rings stopped. (He had that problem for over a year and a half before we were called in on it, it's always nice to see a happy, grateful client!) Charles ----- Original Message ----- From: "A Grudko" To: Sent: Friday, June 16, 2000 10:18 AM Subject: [TSCM-L] Strange phone > > A fellow PI in the US posted this on another list, and I thought you phone > experts might have an answer. > > Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime > investigation & intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel. Agents in > 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax)- Est. > 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > Chairman), CITTF, > UKPIN, AFIO(OS), IWWL, PRETrust --- "When you need it done right - > first time" --- > > > ----- Original Message ----- > > We have had a strange occurrence at our house. First of all, you need to > > know that my home phone #, at one time, was also my fax number (before I > > found eFax). > > > > In the middle of the night, the phone sometimes rings; except only one of > > the phones rings - not the extensions (very bizarre). > > I heard this the other night and, thinking I had left my cordless in > another > > room, I didn't want to get up unless it was really important (in which > case > > whoever was calling - the police, my son) - would call a 2nd time. > > > > No second call was forthcoming, and I went back to sleep. In the a.m., I > > looked at the caller ID to see who awoke me in the middle of the night, > for > > no good reason. There was nothing - repeat, nothing, displayed on the > > caller ID. I recollected that the phone had rang more than once, but that > > the "rythm" of the ring was not the usual. (As most of you know, I'm > sure, > > if someone calls, then hangs up after only one ring, often the caller ID > > will not register the call). > > > > My son was not home the night this happened. I told him about it the next > > day and he confirmed that this had happened several times, and that when > he > > picks up the phone, he hears a fax tone. He confirmed it always happens > > very late at night, and that only of the the phones rings, and that the > > caller ID does not register the call. > > > > I'm probably paranoid (but then, if I wasn't, I don't suppose I'd be a > PI), > > but I'd appreciate anyones take on what could be causing this. > > > > ------------------------------------------------------------------------ > Missing old school friends? Find them here: > http://click.egroups.com/1/5534/1/_/507420/_/961184337/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 645 From: Date: Fri Jun 16, 2000 11:41am Subject: appearance protection I recently came across this product line that had some items that true TSCM professionals should be aware of. Telephone Enclosures - Phone Line Security or http://www.comlok.com/home.htm 646 From: Mike F Date: Sat Jun 17, 2000 7:32am Subject: Security,Surveillance etc. Here is Yahoos on Espionage & Spying. Near the botton of each section headings such as "NEWS STORIES & RELATED WEB SITE'S" be sure and click on the word 'more' at bottom right of Each Section Heading http://fullcoverage.yahoo.com/Full_Coverage/World/Espionage_and_Spying/ later4,mike f 647 From: Mike F Date: Sat Jun 17, 2000 8:27am Subject: one phoneline,use this Free Service don't miss any call. Hi if you only have one or two phone lines,I only have 1. People who call me when I was online..... well they were Unable to reach me. Some of the Calls were Important to me. I missed a chances to make a Buck or Two. Any how this BUZME is FREE!!! Most of you know what a cheapskate I am,so this is perfect. Once your account is activated,when you are online you will Receive an Email Notification that someone is trying to call you. You have a choice since buzme tells you the phone number of the person calling you, you can Accept call Buzme disconnects online Computer connection.. then rings your phone. Or if you don't tbhink the call is important,the caller can leave a voicemail message. I like this service, you download & install the software; it will take a Few does before your account becomes activated. [ mailto:friindy@d... ] has invited you to try BuzMe! Have you ever gone online only to find out later that you missed a phone call? Never again with BuzMe's free Internet Call Waiting service. BuzMe, working with your existing phone line, allows you to receive and respond to phone calls while online. Complete with caller ID and personal private Voicemail, it's a "must have" for the single phone line Internet user. We did mention that basic service is absolutely FREE, right? Simply go to http://www.buzme.com/main/default.asp?pid=Share_BuzMe to sign up and get started. later4,mike fiorentino 648 From: Tommy Bridges Date: Sat Jun 17, 2000 2:10pm Subject: Surveillance Expo 2000 http://www.surveillance-expo.com/ SURVEILLANCE EXPO 2000 August 28th - 30th Washington, DC It's the Twelfth Annual International Surveillance and Countersurveillance Conference and Exposition! The 12th Annual International Surveillance and Countersurveillance Conference and Exhibition features an outstanding exhibit hall. The exhibit hall is open Monday, August 28th and Tuesday, August 29th from 9:00 AM - 5:00 PM. With nearly forty exhibitors, it is a great opportunity for you to preview the latest equipment, services, and technology. The equipment and services presented are always interesting and diverse. They specifically focus on the primary themes of the Expo; Surveillance, Countersurveillance, Communications/Information Security and Investigations Technology. It's a great opportunity to meet the experts and get answers to your questions. For questions or comments, contact: info@s... 649 From: Miguel Puchol Date: Fri Jun 16, 2000 4:37pm Subject: RE: Bugged computer? Andy, We made a small software program that decoded Logitech's wireless keyboards data, using a scanner and a PC with Win98 and a sound card...it worked wonders with a directional antenna and a decent receiver. We couldn't hack the mouse, although we're working on it. Wonder what someone with money could do ;-) Mike > Your computer may be bugged, watching and recording every key you press, > every program you run, every document you open, even precisely how many > minutes you spent on each computer task. And it might be > e-mailing that data > to some nosyparker. An installation of WinWhatWhere's ($99) Investigator > program for Windows does all of that, without showing any evidence to the > computer user. Now that a government advisory suggests that > users should be > told of any such monitoring, WinWhatWhere has added a Notification Banner > feature, which warns you on screen that the Investigator is on your case. 650 From: Miguel Puchol Date: Fri Jun 16, 2000 4:33pm Subject: RE: Interesting Landline Enigma. Andy, Just a comment, 'bugger' has a curious (to be polite) meaning in U.K. english... :-) Mike > You're happy ..... and so is the bugger. 651 From: Date: Sat Jun 17, 2000 0:56pm Subject: Re: Surveillance Expo 2000 In a message dated 6/17/00 12:43:33 PM Pacific Daylight Time, Steve@s... writes: << Don't waste your time. >> I won't. I checked the speakers list. The pontiff is not speaking. 652 From: Jay Coote Date: Sat Jun 17, 2000 8:00pm Subject: Re: Strange phone Could be the telephone CO doing automated tests? ---------- > A fellow PI in the US posted this on another list, and I thought you phone > experts might have an answer. > > Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime > investigation & intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel. Agents in > 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax)- Est. > 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > Chairman), CITTF, > UKPIN, AFIO(OS), IWWL, PRETrust --- "When you need it done right - > first time" --- > > > ----- Original Message ----- > > We have had a strange occurrence at our house. First of all, you need to > > know that my home phone #, at one time, was also my fax number (before I > > found eFax). > > > > In the middle of the night, the phone sometimes rings; except only one of > > the phones rings - not the extensions (very bizarre). > > I heard this the other night and, thinking I had left my cordless in > another > > room, I didn't want to get up unless it was really important (in which > case > > whoever was calling - the police, my son) - would call a 2nd time. > > > > No second call was forthcoming, and I went back to sleep. In the a.m., I > > looked at the caller ID to see who awoke me in the middle of the night, > for > > no good reason. There was nothing - repeat, nothing, displayed on the > > caller ID. I recollected that the phone had rang more than once, but that > > the "rythm" of the ring was not the usual. (As most of you know, I'm > sure, > > if someone calls, then hangs up after only one ring, often the caller ID > > will not register the call). > > > > My son was not home the night this happened. I told him about it the next > > day and he confirmed that this had happened several times, and that when > he > > picks up the phone, he hears a fax tone. He confirmed it always happens > > very late at night, and that only of the the phones rings, and that the > > caller ID does not register the call. > > > > I'm probably paranoid (but then, if I wasn't, I don't suppose I'd be a > PI), > > but I'd appreciate anyones take on what could be causing this. > > > > ------------------------------------------------------------------------ > Missing old school friends? Find them here: > http://click.egroups.com/1/5534/1/_/507420/_/961184337/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 653 From: A Grudko Date: Sat Jun 17, 2000 6:15pm Subject: phones ----- Original Message ----- > two technical possibilities worth considering (besides the usual harrassment concept). But 'automatic fault diagnosis' can easilly be 'hacked' into surveillance mode. I have clients who are horrified to hear that the company that installed their 'top-of-the-line' PABX who offer 'remote diagnistics' failed to mention that they - or a corrupt technician - can use the same software and password to access and control the PABX from any phone with a suitable lap-top. The intruder can become an 'invisible operator', listening in on calls and downloading call data. Luckily it only takes a few minutes of physical searching to find the potentially offending PABX modem line and disconnect it. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust "When you need it done right - first time" 654 From: Charles Patterson Date: Sun Jun 18, 2000 3:07pm Subject: Re: phones Just for info, the auto line testing spoken of is not remote diagnostics and nothing to fear from a surveillance viewpoint. It's just sending a pulse from the co down the pairs (similar to a tdr test I presume) to make sure their cable network is still in place. On the other hand, all major PBX's and voicemail systems are capable of remote diagnostics or programming in one form or another if they have been set up that way. It's a good service to educate and assist clients with. (Oh, and of course if anyone needs an extra hand with a phone system I'm usually available... :) If an analysis of a complex phone system is in order, I usually recommend to clients that I work together with their phone vendor. Or if they do not trust their vendor, then we can arrange it with a different vendor but one who is thoroughly familiar with their particular systems. Charles Charles Patterson Global Communications charles@t... www.telephonesecurity.com/countermeasures ----- Original Message ----- From: "A Grudko" To: Sent: Saturday, June 17, 2000 7:15 PM Subject: [TSCM-L] phones > > ----- Original Message ----- > > two technical possibilities worth considering (besides the usual > harrassment concept). > > But 'automatic fault diagnosis' can easilly be 'hacked' into surveillance > mode. > > I have clients who are horrified to hear that the company that installed > their 'top-of-the-line' PABX who offer 'remote diagnistics' failed to > mention that they - or a corrupt technician - can use the same software and > password to access and control the PABX from any phone with a suitable > lap-top. > > The intruder can become an 'invisible operator', listening in on calls and > downloading call data. > > Luckily it only takes a few minutes of physical searching to find the > potentially offending PABX modem line and disconnect it. > > Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime > investigation & intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 > 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > Chairman), CITTF, > UKPIN, AFIO (OS), IWWL, PRETrust "When you need it done right - first > time" > > > > ------------------------------------------------------------------------ > Wrox Wireless Developer Conference, Amsterdam, July 10-12. Choose from > 40+ technical sessions covering application of WAP, XML, ASP, Java and > C++ to mobile computing. Get your ticket to the future today! > http://click.egroups.com/1/5689/1/_/507420/_/961321516/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 655 From: Mike F Date: Sun Jun 18, 2000 9:00pm Subject: FW: [nais] Equipment prices needed I am posting this for a friend. later4,mike f. -----Original Message----- From: lgriggs@m... [mailto:lgriggs@m...] Sent: Sunday, June 18, 2000 8:23 PM To: Nais@Egroups. Com; thePIgroup@egroups. com Subject: [nais] Equipment prices needed Vibrating video,tape recorder or bug detector (tape recorder and video preferably) that will fit on belt or in pocket. Need price and availability. Need a quality product. No junk. Lee Protection Technology, Inc. PTI Investigations "Charter member-Investigators of America" Member "IWWL" Providing full investigation services in SC plus professional process service in SC & NC. Forensic lock analysis nationwide. Tel: 803-432-9008 Fax: 803-424-0450 Website: http://www.msegroup.com Join PayPal and have the advantage of credit card payments without the hassle and costs. Get paid promptly. https://secure.paypal.com/refer/pal=lgriggs%40msegroup.com Spector 2.12 A great computer monitoring application. https://www.spectorsoft.com/purchase/spector-step1.asp?affil=88 Eblaster 2.00 Send screen snapshots to a remote location. https://www.spectorsoft.com/purchase/eblaster-step1.asp?affil=88 ------------------------------------------------------------------------ AUTO & HOME INSURANCE -- LOWEST RATES & BEST COVERAGE. Get dozens of the best agents competing for your business with our new FREE service. http://click.egroups.com/1/5568/6/_/161701/_/961377938/ ------------------------------------------------------------------------ TO GET TO THE NAIS MEMBERS ONLY SECTION, GO TO: http://www.pimall.com/nais/mo.html MEMBERS ONLY NAIS NEWSLETTERS ARE NOW WEB BASED! TO GET TO CURRENT ONES, GO TO: http://www.pimall.com/nais/mo.bitestoggle.html THE NAIS MEMBERSHIP DIRECTORY IS ON THE WEB AT: http://www.pimall.com/nais/dir.menu.html 656 From: William Knowles Date: Mon Jun 19, 2000 9:34am Subject: [ISN] 'Stages.worm' on the loose ---------- Forwarded message ---------- Date: Mon, 19 Jun 2000 09:14:14 -0500 From: InfoSec News To: ISN@S... Subject: [ISN] 'Stages.worm' on the loose http://www.zdnet.com/zdnn/stories/news/0,4586,2589845,00.html By Bob Sullivan, MSNBC June 19, 2000 6:06 AM PT British and U.S. firms were infected with a computer virus this weekend that arrives via e-mail and convincingly masquerades as an innocent plain text file. The bug, called "Stages.worm," does not damage computer files but can shut down corporate e-mail servers. While there is some concern that employees arriving on Monday morning may be fooled into opening e-mail that carries the bug, anti-virus companies tell MSNBC that a wide-scale outbreak is not expected. "We're going to find out on Monday," said Dan Shrader, spokesperson for anti-virus firm Trend Micro. He said two large aerospace companies were hit with the virus on Friday afternoon, and one of the largest companies in the country was infected on Saturday. Still, he said, "as of Friday (it) didn't look like it was going to be a huge situation." The virus is particularly tricky because it utilizes a rare file format called "windows scrap files." The extension for this file type, which should be ".shs," never appears. That means it's easy to make a scrap file appear to be another file type; Stages.worm arrives ending with the letters ".txt," suggesting that it's a text file. Internet users are advised not to open attachments they did not expect to receive, no matter what the file extension may appear to be. "If you didn't expect it, you should check with the sender before you open any attachment, no matter what the extension is," said Mary Landesman, spokesperson for anti-virus firm Command Software Systems Inc. The virus was apparently authored by a familiar Argentinian virus writer named "Zulu" and was released May 26. But the first infections were not found until Friday. "I don't see anything indicating a widespread release," Landesman said. Her firm had found only four infected companies by Sunday. "But that doesn't mean it's not sitting in a lot of people's inboxes. ... It is a holiday weekend." "Stages.worm" spreads like the Melissa virus and the Love Bug, sending copies of itself to e-mails listed in the victim's Microsoft Outlook address book. But the virus sends out a maximum of 100 copies each time. It arrives with one of several randomly chosen subject lines. One sample has in the subject line "Funny"; the body of the message reads, "The male and female stages of life," and the attachment is named "Life_Stages.txt." Other possible subject lines are: "life_stages," "jokes" and "text." After infection, the worm does display humorous text: The male stages of life: Age. Seduction lines. 17 My parents are away for the weekend. 25 My girlfriend is away for the weekend. 35 My fiancee is away for the weekend. 48 My wife is away for the weekend. 66 My second wife is dead. Age. Favorite sport. 17 Sex. 25 Sex. 35 Sex. 48 Sex. 66 Napping. Age. Definiton of a successful date. 17 Tongue. 25 Breakfast. 35 She didn't set back my therapy. 48 I didn't have to meet her kids. 66 Got home alive. The female stages of life: Age. Favourite fantasy. 17 Tall, dark and hansome. 25 Tall, dark and hansome with money. 35 Tall, dark and hansome with money and a brain. 48 A man with hair. 66 A man. Age. Ideal date. 17 He offers to pay. 25 He pays. 35 He cooks breakfast next morning. 48 He cooks breakfast next morning for the kids. 66 He can chew his breakfast. ISN is sponsored by SecurityFocus.com --- To unsubscribe email LISTSERV@S... with a message body of "SIGNOFF ISN". 657 From: William Knowles Date: Tue Jun 20, 2000 0:10pm Subject: U.S. drops "rogue state" tag http://news.excite.com/news/r/000619/15/usa-rogues Updated 3:12 PM ET June 19, 2000 By Jonathan Wright WASHINGTON (Reuters) - Iran, Libya and North Korea are rogues no longer, the U.S. State Department has decided. Now they're just "states of concern", Secretary of State Madeleine Albright said in a radio interview. "Some of those countries aren't as bad as they used to be. They say: 'We've done some stuff so why are you still calling us a rogue state?'," one State Department official said. Or, as State Department spokesman Richard Boucher put it more carefully on Monday: "It's just a recognition that we have seen some evolution in different ways in different places, and that we will deal appropriately with each one based on the kind of evolution we're seeing." Iran, for example, has become more democratic, with presidential and parliamentary elections. Libya has handed over the suspects in the Lockerbie case for trial and North Korea has declared a moratorium on tests of its long-range missiles. Even Iraq, a hardcore "rogue state" under the old description, is now "a state previously known as rogue", to quote Boucher's jocular formulation. Albright, speaking on National Public Radio's Diane Rehm show, said: "We are now calling these states 'states of concern' because we are concerned about their support for terrorist activities, their development of missiles, their desire to disrupt the international system." FOUR GROUPS OF NATIONS The Clinton administration, and especially Albright as ambassador to the United Nations, was once an enthusiastic proponents of the "rogue state" theory. In an April 1994 lecture, she divided the countries of the world into four categories -- international good citizens, emerging democracies, rogue states and countries where a state hardly exists, such as Somalia and Sierra Leone. She defined a rogue state as one that had no part in the international system and that tried to sabotage it. U.S. policy should be to isolate them, she added. For the past year or so, the United States had used the term mainly for countries it thought might be working on long-range missiles. This was the justification for planning a controversial national defense against their missiles. But experience, especially with the isolated Stalinist state of North Korea, has shown that it might be more productive in the long run to engage in dialogue. In the case of Iran, moreover, the United States has been actively seeking a dialogue with the government, despite repeated rebuffs from Tehran. CALLING NAMES DOES NOT HELP Talks between the United States and North Korea, which have no diplomatic relations, have persuaded Pyongyang to freeze its nuclear program, allow the United States to inspect suspect sites and suspend the missile tests. The talks may have been a factor in persuading North Korean leader Kim Jong-il to take part in last week's summit with South Korea. One U.S. official tied the change in terminology specifically to the case of North Korea, one of the countries which the United States calls a state sponsor of terrorism. "It doesn't help to be calling them rogues one minute and trying to get them to be reasonable the next," he said. Boucher said the State Department wanted to move away from putting countries in groups and would not be drawn on whether there were "states of concerns" which were never rogues. The term "rogue" never had any formal status but Albright initially included Iraq, Iran, Serbia, Sudan, and North Korea. Cuba and Syria have been on the U.S. list of "terrorism sponsors" but were rarely if ever called rogues. "The category has outlived its usefulness...but we're not trying to create new categories. We're trying to deal with each situation in U.S. interests. If we see a development that we think is in U.S. interests, we will respond," Boucher said. "If we're able to encourage them (states of concern) or pressure them or otherwise produce changes in their behavior, and therefore change in our relationship, we're willing to do that," the spokesman added. *-------------------------------------------------* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen. Alfred. M. Gray, USMC --------------------------------------------------- C4I Secure Solutions http://www.c4i.org *-------------------------------------------------* 658 From: Mike F Date: Thu Jun 22, 2000 8:10am Subject: Electonic,surveillance,Investigative Eq uipment. Hi, I will try to keep this email fairly short. This will be Difficult because it about Something that aGreat Resource and the Prices. A some of list Members know that I say this often ""I'M NOT FRUGAL,....... HELL, I'M A BONA FIDE......CHEAPSKATE!!!!! I am always looking for Good but yet Inexpensive,Surveillance & Electronic equipment. I do fairly well on EBAY but it is Risky, there where a few times the Ebay purchases where a mistake. So Now I have Thee Book!! BEST SOURCE & RESOURCE 4 ,"electronic surveillance equipment,countermeasures gear,transmitters,and covert and Security Cameras. The name is ""THE COVERT CATOLOG 2000"" by Lee Lapin. Here are the chapter titles of this book. 1. ELECTRONIC SURVEILLANCE 2. COUNTERMEASURES 3. VIDEO SURVEILLANCE 4. ELECTRONIC TRACKING 5. COMPUTER SURVEILLANCE & ATTACK 6. CELL PHONES Interception & Blocking 7. OPTICS AND NIGHT VISION 8. WEAPONS AND PERSONAL PROTECTION 9. COVERT ENTRY 10. MAGAZINES AND NEWSLETTER 11. SAMPLE NEWSLETTER <==sample of Lee Lapin's Newsletter 12. MISCELLANEOUS And Too Late To Classify This Book is gives you Direct Access to the Manufacturers and Distributors of Equipment. If you or the Company you work for is in the market any surveillance equipment. "The Covert Catolog 2000", is for me the king of CHEAPSKATES an indespensible comparative resource. I want to know Where the Best Equipment is,and who has that equipment for the Lowest price. Here is the Website of Lee Lapin. If you click on Newsletter You can get Sample copy. The Covert Catolog 2000 is in the catolog http://www.intelligence.to/ L8R4,Mike f. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 659 From: Gordon Mitchell Date: Thu Jun 22, 2000 8:24am Subject: Re: Electonic,surveillance,Investigative Eq uipment. Mike -- It is possible that you may have included the wrong URL. The company with intelligence in their name is just another rip-off spy shop that has deceptive ads and tools for folks who would like to violate the law by installing audio devices. I am sure that as a professional you would not want to be associated with this organization. Likely those on the list do not want to get their ads or further posts on the topic. Gordon Mitchell Future Focus, Inc (888) BUG-KILR Mike F wrote: > Hi, > I will try to keep this email fairly short. > This will be Difficult because it about Something that aGreat Resource and > the Prices. > A some of list Members know that I say this often > > ""I'M NOT FRUGAL,....... > HELL, > I'M A BONA FIDE......CHEAPSKATE!!!!! > > I am always looking for Good but yet Inexpensive,Surveillance & Electronic > equipment. > I do fairly well on EBAY > but it is Risky, > there where a few times the Ebay purchases where a mistake. > > So Now I have Thee Book!! > > BEST SOURCE & RESOURCE 4 ,"electronic surveillance > equipment,countermeasures gear,transmitters,and covert and Security Cameras. > > The name is ""THE COVERT CATOLOG 2000"" by Lee Lapin. > Here are the chapter titles of this book. > 1. ELECTRONIC SURVEILLANCE > 2. COUNTERMEASURES > 3. VIDEO SURVEILLANCE > 4. ELECTRONIC TRACKING > 5. COMPUTER SURVEILLANCE & ATTACK > 6. CELL PHONES Interception & Blocking > 7. OPTICS AND NIGHT VISION > 8. WEAPONS AND PERSONAL PROTECTION > 9. COVERT ENTRY > 10. MAGAZINES AND NEWSLETTER > 11. SAMPLE NEWSLETTER <==sample of Lee Lapin's Newsletter > 12. MISCELLANEOUS And Too Late To Classify > > This Book is gives you Direct Access to the Manufacturers and Distributors > of Equipment. > If you or the Company you work for is in the market any surveillance > equipment. > "The Covert Catolog 2000", is for me the king of CHEAPSKATES an > indespensible comparative resource. > I want to know Where the Best Equipment is,and who has that equipment for > the > Lowest price. > > Here is the Website of Lee Lapin. > If you click on Newsletter You can get Sample copy. > The Covert Catolog 2000 is in the catolog > http://www.intelligence.to/ > > L8R4,Mike f. > > Michael T. Fiorentino > Syracuse,NY 13206 > "CONFIDENTIALITY WARNING" > This electronic message contains information which may be privileged and/or > confidential. The information is intended for use only by the > individual(s) > or entity named/indicated above. If you are not the identified/intended > recipient, be aware that > any disclosure, copying, distribution, or use of the contents of this > message/information is prohibited. If you are not the indicated recipient > or > have > received this message in error contact our offices immediately for > instructions." > > ------------------------------------------------------------------------ > SALESFORCE.COM MAKES SOFTWARE OBSOLETE > Secure, online sales force automation with 5 users FREE for 1 year! > http://click.egroups.com/1/2658/1/_/507420/_/961679487/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 660 From: Mike F Date: Thu Jun 22, 2000 9:12am Subject: RE: Electonic,surveillance,Investigative Eq uipment. I guess I need to Clarify what I Am trying to say. I mean that the book ""the covert catolog"" is an XXX-cell-ant Resource for electronic equipment. Gordon if you are Questioning my Integrity or Veracity of my statements Email me Privately. You are tyhe one who brought up misuse of equipment! I sure if we get together we can Work it out. Subject: Re: [TSCM-L] Electonic,surveillance,Investigative Eq uipment. Mike -- It is possible that you may have included the wrong URL. The company with intelligence in their name is just another rip-off spy shop that has deceptive ads and tools for folks who would like to violate the law by installing audio devices. I am sure that as a professional you would not want to be associated with this organization. Likely those on the list do not want to get their ads or further posts on the topic. Gordon Mitchell Future Focus, Inc (888) BUG-KILR Mike F wrote: > Hi, > I will try to keep this email fairly short. > This will be Difficult because it about Something that aGreat Resource and > the Prices. > A some of list Members know that I say this often > > ""I'M NOT FRUGAL,....... > HELL, > I'M A BONA FIDE......CHEAPSKATE!!!!! > > I am always looking for Good but yet Inexpensive,Surveillance & Electronic > equipment. > I do fairly well on EBAY > but it is Risky, > there where a few times the Ebay purchases where a mistake. > > So Now I have Thee Book!! > > BEST SOURCE & RESOURCE 4 ,"electronic surveillance > equipment,countermeasures gear,transmitters,and covert and Security Cameras. > > The name is ""THE COVERT CATOLOG 2000"" by Lee Lapin. > Here are the chapter titles of this book. > 1. ELECTRONIC SURVEILLANCE > 2. COUNTERMEASURES > 3. VIDEO SURVEILLANCE > 4. ELECTRONIC TRACKING > 5. COMPUTER SURVEILLANCE & ATTACK > 6. CELL PHONES Interception & Blocking > 7. OPTICS AND NIGHT VISION > 8. WEAPONS AND PERSONAL PROTECTION > 9. COVERT ENTRY > 10. MAGAZINES AND NEWSLETTER > 11. SAMPLE NEWSLETTER <==sample of Lee Lapin's Newsletter > 12. MISCELLANEOUS And Too Late To Classify > > This Book is gives you Direct Access to the Manufacturers and Distributors > of Equipment. > If you or the Company you work for is in the market any surveillance > equipment. > "The Covert Catolog 2000", is for me the king of CHEAPSKATES an > indespensible comparative resource. > I want to know Where the Best Equipment is,and who has that equipment for > the > Lowest price. > > Here is the Website of Lee Lapin. > If you click on Newsletter You can get Sample copy. > The Covert Catolog 2000 is in the catolog > http://www.intelligence.to/ > > L8R4,Mike f. > > Michael T. Fiorentino > Syracuse,NY 13206 > "CONFIDENTIALITY WARNING" > This electronic message contains information which may be privileged and/or > confidential. The information is intended for use only by the > individual(s) > or entity named/indicated above. If you are not the identified/intended > recipient, be aware that > any disclosure, copying, distribution, or use of the contents of this > message/information is prohibited. If you are not the indicated recipient > or > have > received this message in error contact our offices immediately for > instructions." > > ------------------------------------------------------------------------ > SALESFORCE.COM MAKES SOFTWARE OBSOLETE > Secure, online sales force automation with 5 users FREE for 1 year! > http://click.egroups.com/1/2658/1/_/507420/_/961679487/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS ------------------------------------------------------------------------ SALESFORCE.COM MAKES SOFTWARE OBSOLETE Secure, online sales force automation with 5 users FREE for 1 year! http://click.egroups.com/1/2658/1/_/507420/_/961680113/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 661 From: James M. Atkinson, Comm-Eng Date: Thu Jun 22, 2000 10:19am Subject: Grand Jury Convened in Lab Case 07:15 PM ET 06/21/00 Grand Jury Convened in Lab Case By H. JOSEF HEBERT Associated Press Writer WASHINGTON (AP) _ A grand jury has been convened to look into the two-month disappearance of nuclear secrets at the Los Alamos weapons laboratory as the FBI focuses on ``a handful'' of scientists, Energy Secretary Bill Richardson said Wednesday. On Capitol Hill, Richardson said investigators have not found any evidence suggesting the two computer drives containing the information left the most secure area of the New Mexico lab, or that espionage was involved. Some lawmakers remained unconvinced after hearing Richardson, who spoke at a public session and then back-back closed-door meetings with Senate committees. Asked if he were concerned secrets might have been compromised, the chairman of the Senate Armed Services Committee, said, ``We don't know.'' ``It is clear there was a lack of accounting for a great period of time,'' said Sen. John Warner, R-Va. Government computer experts continued to examine the drives electronically to determine if information had been copied. The FBI, seeking to learn who last handled the devices, was studying fingerprints found on an external wrapping and on the drives. They are believed to have disappeared ``at the tail end of March'' from a vault in the top-secret ``X Division'' at Los Alamos. The drives were found last Friday behind a copying machine in an area that had been thoroughly searched at least twice, according to officials. ``The investigation ... has focused on a handful of X-Division employees who have offered conflicting statements to investigators,'' said Richardson. A grand jury has been convened in New Mexico ``to examine issues related to the case,'' he said. A grand jury is often empaneled when people under investigation are giving conflicting or possibly deceptive statements, a Justice Department official explained, requesting anonymity. The purpose is to provide a forum before which they can be questioned under oath and set up a situation where they face possible prosecution if they lie. Even if the drives have not been compromised, those involved in thee disappearance and mysterious reappearance could face felony charges for mishandling nuclear secrets. Officials said DOE regulations requiring any security breach to be reported within eight hours were violated. A former Los Alamos nuclear scientist, Wen Ho Lee, is in jail awaiting trial and could face a maximum of life in prison for security violations. He was arrested in December and accused of illegally copying top-secret nuclear weapons files while also working in the X Division. The alleged copies of the files have not been found. The latest security breach has unleashed particularly angry rhetoric on Capitol Hill because the lapse follows repeated assurances by Richardson that security was a top priority and that America's nuclear secrets were safe. ``You've lost all credibility,'' Sen. Richard Shelby, R-Ala., chairman of the Intelligence Committee, told Richardson. ``I believe you are part of the problem. Look in the mirror,'' lectured Shelby, who has said Richardson should resign. At times combative and at other times subdued, Richardson acknowledged the seriousness of the disappearance of the hard drives _ even if there was no espionage _ and listed the steps he has taken over the past year to tighten lab security. ``In two years I've done more on security than has been done in the last 20 years,'' he told the senators. But they were in no mood for such explanations. Lawmakers instead accused Richardson of trying for months to sidestep a requirement from Congress last year that would put nuclear weapons programs under a largely autonomous agency within his department. They said this would streamline accountability. Richardson contended the new agency was being given too much independence; he staffed it with his own senior advisers. On Wednesday _ under intense attack _ he said he was ready to accept the agency as created. Meantime, Warner said he would soon introduce legislation to look at whether an independent agency or the Defense Department should take over the nuclear weapons programs, including the research labs. Sen. Joe Lieberman predicted that if security does not improve and the administration does not give wide berth to the new nuclear weapons agency, there will be strong bipartisan support for putting the Pentagon in charge. ``This really is the last chance,'' Lieberman, D-Conn., told Richardson. ___= On the Net: For general information about the Los Alamos lab: http://www.lanl.gov/worldview/ =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== From: James M. Atkinson, Comm-Eng Date: Sun Jun 17, 2001 6:18pm Subject: The more you read the more interesting it gets. The more you read the more interesting it gets. Q. Half of all Americans live within 50 miles of what? A. Their birthplace. Q. Most boat owners name their boats. What is the most popular boat name requested? A. Obsession Q. If you were to spell out numbers, how far would you have to go until you would find the letter "A"? A. One thousand Q. What do bullet proof vests, fire escapes, windshield wipers, and laser printers all have in common? A. All invented by women. Q. What occurs more often in December than any other month? A. Conception. Q. What is the only food that doesn't spoil? A. Honey Q. There are more collect calls on this day than any other day of the year? A. Father's Day (I love this one) Q. What trivial fact about Mel Blanc (voice of Bugs Bunny) is the most ironic? A. He was allergic to carrots. Q. What is an activity performed by 40% of all people at a party? A. Snoop in your medicine cabinet. Did you know... The first couple to be shown in bed together on prime time television were Fred and Wilma Flintstone. Coca-Cola was originally green. Every day more money is printed for Monopoly than the US Treasury. Men can read smaller print than women; women can hear & smell better. The state with the highest percentage of people who walk to work: Alaska The percentage of Africa that is wilderness: 28% - The percentage of North America that is wilderness: 38% The cost of raising a medium-size dog to the age of eleven: $6,400 The average number of people airborne over the US any given hour 61,000. Intelligent people have more zinc and copper in their hair. That San Francisco Cable cars are the only mobile National Monuments. Each king in a deck of playing cards represents a great king from history: Spades - King David; Clubs - Alexander the Great; Hearts - Charlemagne; Diamonds - Julius Caesar If a statue in the park of a person on a horse has both front legs in the air, the person died in battle. If the horse has one front leg in the air, the person died as a result of wounds received in battle. If the horse has all four legs on the ground, the person died of natural causes. Only two people signed the Declaration of Independence on July 4th, John Hancock and Charles Thomson. Most of the rest signed on August 2, but the last signature wasn't added until 5 years later. The term "the whole 9 yards" came from WWII fighter pilots in the South Pacific. When arming their airplanes on the ground, the .50 caliber machine gun ammo belts measured exactly 27 feet before being loaded back into the fuselage. If the pilots fired all their ammo at a target, it got "The whole 9 yards." Hershey's Kisses are called that because the machine that makes them look like it's kissing the conveyor belt. The phrase "rule of thumb" is derived from an old English law which stated that you couldn't beat your wife with anything wider than your thumb. The name Jeep came from the abbreviation used in the army for the "General Purpose" vehicle, G.P. The cruise liner, Queen Elizabeth II, moves only six inches for each gallon of diesel that it burns. The only two days of the year in which there are no professional sports games (MLB, NBA, NHL, or NFL) are the day before and the day after the Major League all-stars Game. The nursery rhyme "Ring Around the Rosy" is a rhyme about the plague. Infected people with the plague would get red circular sores ("Ring around the rosy"), these sores would smell very badly so common folks would put flowers on their bodies somewhere (inconspicuously), so that it would cover the smell of the sores ("a pocket full of posies"). Furthermore, people who died from the plague would be burned so as to reduce the possible spread of the disease ( "ashes, ashes, ashes, we all fall down"). -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3213 From: James M. Atkinson, Comm-Eng Date: Mon Jun 18, 2001 11:01am Subject: Bear Alert Bear Alert The Department of Wildlife is advising bikers, campers, hikers, hunters, fishermen, and golfers to take extra precautions and be on the alert for bears while enjoying their given sport. They advise people to wear noise-producing devices such as little bells on their clothing to alert,but not startle the bears unexpectedly. They also advise you to carry pepper spray in case of an encounter with a bear. It is also a good idea to watch for signs of bear activity. Comments: People should be able to recognize the difference between black bear and grizzly droppings. 1. Black bear droppings are smaller and contain berries and possibly squirrel fur. 2. Grizzly bear droppings have little bells in them and smell like pepper spray. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3214 From: Aimee Farr Date: Mon Jun 18, 2001 3:01pm Subject: Corporate spycams in CA *class action* 9th Cir: Cramer v. Consolidated Freightways @ http://www.ca9.uscourts.gov/ca9/newopinions.nsf/72AF8644401119A488256A6C0057 DA99/$file/9855657.pdf?openelement Cramer, an employee at the Mira Loma terminal, brought a CLASS ACTION suit in state court alleging invasion of privacy on behalf of all "individuals lawfully on the premises . . . who had a reasonable expectation of privacy while using [Consoli-dated's] restrooms." Guillermo Alfaro, another Consolidated employee, and 281 others brought a separate suit seeking damages for invasion of privacy and infliction of emotional distress. They also sought injunctive relief to end the use of the surveillance devices. The court held the two-way mirror bathroom surveillance of truckers to control drug use was not preempted by a collective bargaining agreement, when: ...other restroom cameras were placed in the ceiling, hidden from view in a fake sprinkler head. ....the presence of visible cameras does not imply the expectation of or consent to additional secret cameras. What is that? "Per-camera privacy?" The court did not need to consider that, I find it interesting that they did. ...evidence of such a waiver is not "clear and unmistakable." ...the same would be illegal under CA law, since illegal provisions of a contract are void an unenforceable. Under California Penal Code ß 653n, "[a]ny person who installs or who maintains . . . any two-way mirror permitting observation of any restroom, toilet, bathroom, washroom, shower, locker room, fitting room, motel room, or hotel room, is guilty of a misdemeanor." Thus, Consolidated's installation of the two-way mirror was a direct violation of California criminal law. Counsel made the argument this was only applicable to "public" bathrooms, so maybe there is some "confusion" over there? Alternatively, it was just a dumb argument. ...among other things. As always, seek counsel in your jurisdiction. This is "general info" not legal advice. Regards, Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR Waco, Texas 3215 From: Paolo Sfriso Date: Mon Jun 18, 2001 3:56pm Subject: Computer Security Expert Sentenced to 27 Months' Imprisonment for Computer Hacking and Electronic Eavesdropping Computer Security Expert Sentenced to 27 Months' Imprisonment for Computer Hacking and Electronic Eavesdropping June 13, 2001 MARY JO WHITE, the United States Attorney for the Southern District of New York, announced that JESUS OQUENDO was sentenced in Manhattan federal court yesterday to 27 months in prison for computer hacking and electronic eavesdropping in the first federal computer hacking case that went to a trial in the Southern District of New York. OQUENDO was convicted following a one-week trial in a case developed and investigated by the Computer Crime Squad of the New York Office of the FBI. According to the evidence at the trial, OQUENDO worked as a computer security specialist at a company called Collegeboardwalk.com during the first half of 2000. Collegeboardwalk.com shared office space and computer network with one of its investors, Five Partners Asset Management LLC ("Five Partners"), a venture capital company based in Manhattan. As a result of this access, OQUENDO altered the start-up commands on the Five Partner's network to send automatically the password file from the Five Partner's system to him at an e-mail account he controlled each time the Five Partner's computer system was rebooted. According to the evidence at trial, after Collegeboardwalk.com failed as a business, OQUENDO began accessing the Five Partner's network remotely over the Internet through a secure shell account he illegally installed on the victim's network. He also began storing hacking programs and other information in a computer directory that was no longer being used by Five Partners. Additionally, in August 2000, he secretly installed what is known as a "sniffer" program that intercepted and recorded electronic traffic on the Five Partner's network, including unencrypted passwords. This sniffer program was then programmed to e-mail these intercepted communications to OQUENDO each morning at 4 A.M. at a second secret email account that he had registered under a false name. By installing this sniffer program, OQUENDO was able to take advantage of the fact that one of the legitimate users on the Five Partner's network also had a computer account on a second victim, RCS Computer Experience ("RCS"), which is also based in Manhattan, and which specializes in selling computer equipment at retail locations and over the Internet to individuals located throughout the United States. OQUENDO's sniffer program on the Five Partner's computer intercepted this legitimate user's password when the user logged into the RCS network to check the database file RCS maintained to record and track all of its sales and inventory (the "RCS Database"). The trial evidence showed that on August 2 and 3, 2000, OQUENDO connected to the Internet from his home and again remotely entered the Five Partner's network. Using the legitimate user's password, OQUENDO then broke into the RCS network. While on the RCS network, OQUENDO sent the RCS password file to his secret e-mail account, sought to install a similar sniffer program on the RCS system, and issued a series of commands that deleted the entire RCS database, costing RCS approximately $60,000 to repair. Finally, OQUENDO left the victim a taunting message on its network: "Hello, I have just hacked into your system. Have a nice day." In imposing the 27-month prison term, United States District Judge LORETTA A. PRESKA determined that OQUENDO's offense should be increased because he used a special skill, his computer expertise, to commit his crimes. She also ordered OQUENDO to pay restitution in the amount of $96,385 to RCS. OQUENDO, 27, lives in Queens, New York. Assistant United States Attorneys ROBERT R. STRANG and JOSHUA G. BERMAN are in charge of the prosecution. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 paulsfriso@t... www.grupposit.com [Non-text portions of this message have been removed] 3216 From: Aimee Farr Date: Sat May 19, 2001 0:50am Subject: Code of Fair Surveillance Practices? I am trying to find the equivalent of a "Code of Fair Surveillance Practices" akin to the "Code Of Fair Information Practices," involving voluntary, "guiding light" principles of general applicability. (Most info-privacy law is benchmarked by the principles embodied in the Code Of Fair Information Practices '73, which involve the principles of notice, consent for secondary use, security against misuse, etc. -- these concepts are now fairly pervasive in information privacy law and policy.) Surely there is something like this for security (site) surveillance, hm? Do any industry groups have exemplars or policies? I figured some of you guys might know. Thanks for any help, and int'l info welcome. Permission to FWD to individuals with clue. Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR Waco, Texas 3217 From: Date: Tue Jun 19, 2001 3:43am Subject: Poor Man's MM-Wave Detector Neon Lamp Microwave Detector An Ultra simple and stable circuit for detecting Microwaves Will apparently operate to Milli-Meter Wave frequencies as high as 100Ghz ( 3 mm ) also: Neon Lamp Scalar wave Detector An Ultra simple and stable circuit for detecting Scalar Waves Based on a modification of the above circuit. http://www.icom.ca/~mccoy/#mmwave 3218 From: Robert G. Ferrell Date: Tue Jun 19, 2001 9:25am Subject: Re: Computer Security Expert Sentenced to 27 Months' Imprisonment >Computer Security Expert Sentenced to 27 Months' Imprisonment for >Computer Hacking and Electronic Eavesdropping Bah. An "expert" doesn't get caught, and sure as hell doesn't leave "you've been hacked" messages on compromised systems. Nothing this guy is accused of doing couldn't have been carried out by a reasonably alert 13 year old with an Internet connection. >In imposing the 27-month prison term, United States District Judge >LORETTA A. PRESKA determined that OQUENDO's offense should be increased >because he used a special skill, his computer expertise, to commit his crimes. Does this hold true for all criminals who use a 'special skill?' Who decides what skills are 'special' and what aren't? To me, the skills this person used are far from special. In fact, they're quite ordinary. His lack of judgment is quite 'special,' of course. It's sometimes hard to plumb the facts of a case from the agenda-promoting accounts of the press, but to me this smacks of arbitrary sentencing based on the ignorance of the judge, rather than the actions or motives of the accused. Cheers, RGF Robert G. Ferrell, CISSP ======================================= Who goeth without humor goeth unarmed. ======================================== 3219 From: Aimee Farr Date: Sat May 19, 2001 9:36am Subject: RE: Code of Fair Surveillance Practices? Thanks for the replies, yes, I know surveillance isn't "fair." *rolls eyes* Some of you are really funny.... I was eyeing something for CCTV, retail and site security, and taking into consideration the pace of technology. Most corporate policies are purely consent-based, and often overlook... a lot. In comparison, Uncle incorporates some recognized information-privacy principles in surprising, and subtle contexts. Hong Kong's privacy office is currently eyeing workforce restraints. This completes this week's stupid lawyer questions. Back to my booklist.... Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR Waco, Texas > 3220 From: e cummings Date: Tue Jun 19, 2001 8:43am Subject: WSJ piece on last week's ELSUR ruling by U.S. Supreme Court >June 18, 2001 >A Victory for Privacy >By Jeffrey Rosen. Mr. Rosen, legal affairs editor of The New Republic and an >associate professor of law at George Washington University, is author of >"The Unwanted Gaze: The Destruction of Privacy in America," just out in >paperback from Vintage. > >Justice Antonin Scalia is not ordinarily celebrated by liberals for his >devotion to the right to privacy. But last week, he wrote a Supreme Court >opinion that is an occasion for all friends of privacy to dance in the >streets. In Kyllo vs. U.S., Justice Scalia held that the government acted >unreasonably when it aimed a thermal imaging device at a suspect's house and >surmised, from the high levels of heat on the exterior walls, that he was >using heat lamps to grow marijuana inside. For a 5-4 majority, Justice >Scalia declared that when government agents use surveillance technology that >isn't ordinarily used by the general public to explore details of the home, >the surveillance is presumptively unreasonable without a search warrant. > >Justice Scalia's opinion is only the latest illustration of how privacy is >an issue about which liberal and conservative justices can increasingly >agree. And it provides a model of how the original understanding of the >Constitution can be intelligently translated to regulate electronic >surveillance. > >This is a problem that that the court struggled with unsuccessfully for most >of the 20th century. The court's first encounter with electronic searches >was a 1928 case in which the government was using wiretaps to investigate a >suspect bootlegger named Olmstead. Olmstead claimed that the wiretap >violated the Fourth Amendment, which protects the right of the people to be >secure in their "persons, houses, papers, and effects." But Chief Justice >William Howard Taft disagreed. The Fourth Amendment, he said, was originally >understood to forbid only searches or seizures accompanied by a physical >trespass on private property, and the agents hadn't trespassed on Olmstead's >property when they placed wiretaps on the phone lines in the streets near >his house. > >In a visionary dissenting opinion, Justice Louis Brandeis noted that when >the Constitution was adopted, breaking and entering into the home was the >only way for the government to invade a citizen's private thoughts. But in >the 1920s, subtler ways of invading privacy, such as wiretapping, made it >possible for the government to invade the privacy of the home without a >physical trespass. To protect the same amount of privacy that the framers of >the Fourth and Fifth Amendments intended to protect, Brandeis concluded, it >was necessary to prohibit unreasonable searches and seizures of >conversations over the wires, even if the invasions occurred without >physical trespass. > >In 1967, the Supreme Court appeared to accept Brandeis's argument that >technologically enhanced surveillance could qualify as an unreasonable >search, but it did so in a way that inadvertently undermined Brandeis's >central insight. In the Katz case, government agents attached a listening >device to a public telephone booth and recorded a suspect's end of the >conversation without his knowledge. Overruling the Olmstead decision, the >court announced that the "Fourth Amendment protects people, not places." > >In an influential concurring opinion, Justice John Harlan proposed the >following test for determining what kind of surveillance activity should >trigger the protections of the Fourth Amendment: A person must have an >actual or subjective expectation of privacy, Harlan suggested, and the >expectation must be one that society is prepared to accept as reasonable > >Harlan's test was applauded as a victory for privacy, but it soon became >clear that it was entirely circular. People's subjective expectations of >privacy tend to reflect the amount of privacy they experience; and as >surveillance technologies grew increasingly intrusive, expectations of >privacy were correspondingly diminished. In the 1980s, for example, the >Supreme Court upheld the aerial surveillance of a fenced-in backyard without >requiring a warrant. Since any member of the public could, hypothetically, >rent a helicopter and hover over a neighbor's backyard, the court suggested, >all of us have to assume the risk that the police might do so, too. > >Using the same circular logic in his dissenting opinion in the Kyllo case, >Justice John Paul Stevens would have approved the use of the thermal imaging >devices. Since we voluntary put out heat waves in the same way that we put >out the trash, Justice Stevens suggested, we can't legitimately expect that >our heat waves won't be monitored by what he aptly called "off the wall" >heat-seeking devices. > >But in his majority opinion, Justice Scalia rejected this implausible logic. >"The question we confront today is what limits there are upon this power of >technology to shrink the realm of guaranteed privacy," Justice Scalia wrote. >Far from revealing only public information, the heat sensors might disclose >intimate details of the home, such as "at what hour each night the lady of >the house takes her daily sauna and bath." To protect the same amount of >privacy in the 21st century that citizens in the 18th century took for >granted, Justice Scalia held the government should get a warrant before >using cutting-edge technology to obtain information about the interior of a >home that, 200 years ago, would have required a physical intrusion. > >Justice Scalia has been a consistent defender of the privacy of the home -- >refusing to allow the police to move a stereo to observe its serial number, >for example. But he is not the only conservative justice devoted to privacy. >Justice Clarence Thomas is the leading advocate for the privacy of private >papers: In the case last year that rejected Ken Starr's decision to subpoena >Webster Hubbell's tax records after granting him immunity, Justice Thomas >wrote a bold concurring opinion arguing that the Fifth Amendment should >protect the content of private papers, as it was originally understood to >do. > >Justice Anthony Kennedy is especially concerned about people's privacy in >their cars -- perhaps because of his upbringing in California. And Justice >Sandra Day O'Connor recently wrote a powerful dissenting opinion in which >she argued that the Fourth Amendment should prohibit arrests for low-level >misdemeanors, such as seat-belt offenses, that are ordinarily punished only >by a fine. In all these cases, conservatives and liberal justices have >joined in unexpected alliances, proving that on the Supreme Court, as on >Capitol Hill, privacy is a cross-cutting, bipartisan issue. > >The Kyllo opinion is only the beginning of the court's efforts to translate >the Constitution into a technological age. Justice Scalia held that >surveillance of the home requires a warrant only when the technology is not >generally in public use. As invasive technologies become more commonplace, >the court may have to decide that there are certain invasions no citizen in >a civilized society should endure, regardless of whether expectations of >privacy have been diminished by technology. And Justice Scalia's opinion is >limited to the home, leaving us vulnerable to the kind of surveillance in >public places that spectators at the Tampa Super Bowl recently experienced: >Their faces were scanned as they entered the stadium and compared with >databases of suspected wrongdoers. > >But although Kyllo is only a first step in successfully translating the >original understanding of the Constitution into the electronic age, it is >welcome and long overdue. For this, we have Justice Scalia to thank. 3221 From: James M. Atkinson, Comm-Eng Date: Tue Jun 19, 2001 3:42pm Subject: FBI files sold to mob figures: Las Vegas analyst is charged with stealing secrets [Keystone Cops are at it Again] Today: June 19, 2001 at 11:07:39 PDT FBI files sold to mob figures: Las Vegas analyst is charged with stealing secrets By Jeff German LAS VEGAS SUN A confidential informant has told the FBI that he sold investigative information obtained from a just-arrested Las Vegas FBI employee to organized crime members and other criminal targets. The employee, James J. Hill, a 51-year-old security analyst for the Las Vegas FBI, was taken into custody locally last week on a criminal complaint filed against him in New York. He faces a 3 p.m. Wednesday detention hearing before U.S. Magistrate Lawrence Leavitt. Hill was charged in the six-page complaint with obstruction of justice and stealing and selling the top-secret FBI information for cash. The informant, a New York private investigator, said he had paid Hill $25,000 for criminal files since November 1999. "The FBI and its many hard-working, dedicated employees should not be judged by the actions of one individual," Las Vegas FBI chief Grant Ashley said in a statement Monday. "The FBI is committed to the highest degree of professionalism, and any allegation of misconduct will be appropriately addressed." The New York complaint alleged that Hill, an Air Force veteran who has worked for the Las Vegas FBI for several years, had access to national security and electronic surveillance information as well as confidential informants and witnesses data stored in the FBI's nationwide computer system. "CI (confidential informant) admitted that the defendant has provided CI with classified FBI records pertaining to organized crime investigations, white collar crime investigations and investigations involving international alien smuggling, which CI sold to members of organized crime and other criminal targets," the complaint said. New York FBI agent Demetrius Barkoukis also suggested in the complaint that the confidential informant may have provided secret FBI information obtained from Hill to potential FBI targets in other countries. Barkoukis said the confidential informant's phone records showed that he had communications with people in Mexico and Cuba and that his passport listed recent visits to the drug cartel cities of Medillin and Bogata, Colombia. FBI agents learned of Hill's reported clandestine activities after they arrested the informant in Oyster Bay, N.Y., Thursday on charges of stealing and selling classified FBI information, the complaint said. When he was taken into custody, the complaint added, the informant was in possession of numerous FBI documents, and he later agreed to cooperate with agents. The informant told agents that he had recruited Hill in 1999 and that Hill had provided him with "hundreds of different classified FBI records and documents pertaining to criminal cases and grand jury investigations," the complaint said. The records obtained from Hill also were sold to attorneys and criminal defendants in New York, Long Island and elsewhere, the complaint said. Hill was arrested at 7:45 p.m on Friday as he left the FBI office in Las Vegas. "At the time of his arrest, Hill admitted that he had been accessing FBI records and documents relating to criminal investigations and providing them to CI for which he was paid by CI," the complaint said. Ashley said that as a precaution, the FBI was conducting a "national security damage assessment" as a result of Hill's arrest. FBI officials would not discuss who specifically wound up with the information allegedly provided by Hill. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3222 From: James M. Atkinson, Comm-Eng Date: Tue Jun 19, 2001 3:44pm Subject: Suspects in Lucent case plead innocent Tuesday, June 19, 2001 Suspects in Lucent case plead innocent http://thestar.com.my/tech/story.asp?file=/2001/6/19/technology/19trial&sec=technology NEWARK (New Jersey): As the three Chinese nationals accused of stealing trade secrets from Lucent Technologies pleaded innocent on Monday, a federal prosecutor said it could take months for investigators to process the computer-based evidence. US District Judge William H. Walls set a trial date for Jan 28, but called it "tentative." New charges are possible and could further delay a trial. The suspects are charged under a one-count indictment with conspiring to steal trade secrets and to possess stolen trade secrets, but the Justice Department has listed the case as a prosecution under the Economic Espionage Act. The indictment carries up to 10 years in prison and a US$250,000 (RM950,000) fine, while economic espionage has maximum penalties of 15 years in prison and a US $10mil (RM38mil) fine. Assistant US Attorney Scott S. Christie told Walls that investigators have "voluminous" materials to examine and copy for the defence teams, including 15 hard drives and hundreds of music CDs that may contain other information. Also, hundreds of documents must be translated into English from Chinese, and authorities are seeking documents from China and companies based there, Christie said. The men charged, including two scientists who worked at Lucent's Murray Hill headquarters, are accused of plotting a joint venture with a Chinese company to sell a copy of a Lucent product in China. Lucent fired the scientists after their arrest May 3. Hai Lin, 30, and Kai Xu, 33, had been on the technical staff at the Murray Hill headquarters of the telecommunications giant that was once part of AT&T Corp. The third man, Yong-Qing Cheng, 37, was fired after his arrest from Village Networks, an optical networking vendor in Eatontown. All posted bail and are under house arrest with electronic monitoring. Christie had argued against bail being granted, claiming the men posed a flight risk. All were in court Monday. The suspects boasted that their joint venture with Datang Telecom Technology Co Ltd, of Beijing, would become "the Cisco of China" by selling a clone of Lucent's PathStar data and voice transmission system to Internet providers in that nation, according to the May 31 indictment and the earlier FBI filing. - AP -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3223 From: James M. Atkinson, Comm-Eng Date: Tue Jun 19, 2001 4:06pm Subject: FBI's spy scandal casts its shadow on Canberra FBI's spy scandal casts its shadow on Canberra http://www.smh.com.au/news/0106/17/world/world3.html Espionage charges ... FBI counterintelligence agent Robert Hanssen. By Brendan Nicholson and agencies Robert Hanssen, the highly placed FBI officer who allegedly turned Russian spy, may have given Moscow the crucial information it needed to protect a spy ring working in Canberra. An investigation by reporters Tom Mangold and Jeff Goldberg has revealed that Hanssen would have been able to report back to Moscow full details of the British debriefings of Colonel Oleg Gordievsky, the most significant KGB defector recruited by MI6 during the Cold War, and KGB archivist Vasili Mitrokhin. Professor Des Ball, of the Strategic and Defence Studies Centre at the Australian National University, said that if Hanssen was involved in United States counterespionage operations, he would have known details of foreign spy rings in the US and the state of investigations into them. And if he had access to that sort of information, he was also likely to have been able to pass on to Moscow details of what Australian investigators knew of Russian spies operating in Australia. "He may well have been able to tell the Russians how much Australia had been able to suss out about the extent of the penetrations here," Professor Ball said. "Mitrokhin was able to talk about actual penetrations as of 1992. "He [Hanssen] was able to tell the Russians that at least part of their Australian operation - they wouldn't have known how much, though they'd be desperate to find out - had been sprung." The penetration of the Australian Security Intelligence Organisation was the subject of a top-secret report handed to the Keating government seven years ago and never made public. Meanwhile, evidence has been revealed that suggests Hanssen began the spying at least six years earlier, in 1979. CBS television reported yesterday that Hanssen was forced to tell his wife, Bonnie, at the time because she was suspicious and confronted him. Afterwards, according to another source, Hanssen confessed his espionage to a priest affiliated with the conservative Roman Catholic organisation Opus Dei and then donated money the Soviets had allegedly paid him - more than $US 10,000 ($19,960) - to Mother Teresa, CBS said. Hanssen then stopped spying for six years, before allegedly resuming his espionage, CBS said. Hanssen's lawyer, Plato Cacheris, declined to comment on the CBS report, saying he did not respond to reports based on unnamed sources. Hanssen, an FBI counterintelligence agent for 25 years, pleaded not guilty late last month to charges of spying for Russia during the past 15 years in one of the most serious espionage cases in US history. He was arrested in February after allegedly dropping off a bundle of classified material at a park near his home in suburban Virginia to be picked up by his Russian handlers. A 21-count indictment alleged that Hanssen compromised secrets related to satellites, early warning systems, US means of defence or retaliation against large-scale nuclear attacks, communications intelligence and defence strategy. Hanssen was charged with conspiracy to commit espionage, 19 counts of espionage and one count of attempted espionage. He is accused of selling secrets to Moscow for $US 1.4 million ($2.72 million) in money and diamonds. Sources familiar with the case said on Thursday that the US Justice Department was no longer demanding Hanssen face a possible death penalty, clearing the way for a plea deal. The sources said plea negotiations had resumed and that agreement could be reached within the next two weeks. Under the main elements of the deal, Hanssen would agree to plead guilty to espionage charges and co-operate with government investigators on what he disclosed to the Russians. In exchange, he would get a long prison term, such as life imprisonment, but would avoid the death penalty, the sources said. The Sun-Herald -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3224 From: e cummings Date: Tue Jun 19, 2001 11:21am Subject: Re: Computer Security Expert Sentenced to 27 Months' Imprisonment At 09:25 AM 6/19/01 -0500, "Robert G. Ferrell" wrote: > >Computer Security Expert Sentenced to 27 Months' Imprisonment for > >Computer Hacking and Electronic Eavesdropping > >Bah. An "expert" doesn't get caught, and sure as hell doesn't leave >"you've been hacked" messages on compromised systems. Nothing this guy >is accused of doing couldn't have been carried out by a reasonably alert >13 year old with an Internet connection. > > >In imposing the 27-month prison term, United States District Judge > >LORETTA A. PRESKA determined that OQUENDO's offense should be increased > >because he used a special skill, his computer expertise, to commit his > crimes. > >Does this hold true for all criminals who use a 'special skill?' Who decides >what skills are 'special' and what aren't? To me, the skills this person >used >are far from special. In fact, they're quite ordinary. His lack of >judgment is >quite 'special,' of course. > >It's sometimes hard to plumb the facts of a case from the agenda-promoting >accounts of the press, but to me this smacks of arbitrary sentencing >based on the ignorance of the judge, rather than the actions or motives of >the accused. ...and it's especially difficult to plumb the facts from the press after it's deliberately fed false or misleading information by an agenda-promoting DOJ that knows the press is all too willing to report as gospel anything it's told. granted, the defendant in this case sounds like a malicious, stupid jerk deserving of punishment--but when an U.S. Attorney or AUSA makes an absurd statement like "(the defendant) issued a series of commands that deleted the entire RCS database, costing RCS approximately $60,000 to repair" it sounds like the same kind of undocumented nonsense the u.s attorney used in mitnick's and all too many other computer-related cases. so it never occurred to this company to back up its database? doubtful. and it took a year's salary to reconstruct it? also doubtful. there doesn't appear to be any allegation this moron stole anything, damaged any equipment, or even profited from his malicious actions. federal sentencing tables for this kind of thing are linked to the dollar amount stolen or actual damages caused--but federal sentencing rules do not require any proof of actual damages. as a result, victims have a financial incentive--and in some cases are documented to have been encouraged by federal prosecutors--to misrepresent these dollar figures. hey, everybody wins, right? why not make up some ominous-sounding figures to burnish some reputations for a nice-sounding collar and give the complainant a nice kickback? as for the "special skills" and "more than minimal planning" sentencing enhancements, they're routinely invoked by federal prosecutors for remarkably mundane and opportune activities. if the company's security was so lax to begin with that it resulted in their system being easily hacked into by a moron, then do they deserve to have all new servers, firewalls, and software purchased for them (that might have prevented the problem in the first place?) 2-1/4 years seems a more appropriate sentence for someone who actually hurt someone or physically damaged or stole something of value. this is what happens when a legislature and a judiciary composed of techno-illiterates are responsible for writing and interpreting laws about technology they don't understand...and when prosecutors are willing to make absurd statements like the one above in order to win a conviction. -e cummings 3225 From: A.Lizard Date: Tue Jun 19, 2001 1:14pm Subject: Digital Angel = Digital Snake Oil? looks like the 'injectable tracker for people is back in the news', has anything come up that makes this device look more credible since it was last discussed here? The interesting feature of these posts is that patent numbers relating to the technology are included. A.Lizard Date: Tue, 19 Jun 2001 08:25:24 -0700 To: politech@p... From: Declan McCullagh Subject: FC: More on Digital Angel, chip implants, and human tracking Reply-To: declan@w... X-URL: Politech is at http://www.politechbot.com/ X-Author: Declan McCullagh is at http://www.mccullagh.org/ X-News-Site: Cluebot is at http://www.cluebot.com/ [Copied to press and investor relations reps for Digital Angel. I invite the company to reply. Background: http://www.politechbot.com/p-02153.html --DBM] --- Date: Mon, 18 Jun 2001 19:13:27 -0700 From: David Alban To: Declan McCullagh Subject: Re: FC: Digital Angel may -- or may not -- soon implant chips in humans Declan, On Sun, 17 Jun 2001 at 03:40:56 Dwayne Gradin wrote: > http://www.worldnetdaily.com/news/article.asp?ARTICLE_ID=23232 > > 'Digital Angel' set to fly tomorrow > Implant technology to be beta tested on humans If I were someone who advocated the use of technology to track and ultimately exercise power over individuals, I would be feeling now like my wildest dreams were about to come true. David --- Date: Tue, 19 Jun 2001 17:05:18 +1000 From: Nathan Cochrane Organization: The Age newspaper To: declan@w... Subject: Re: FC: Digital Angel may -- or may not -- soon implant chips in humans Hi Declan This looked interesting, so I looked a little further, as you did no doubt. The "Mark of the Beast" tag is very accurate, given the circumstances. Digital Angel owns patents on implanted transmitter technology following Applied Digital Solutions' $130 million acquisition September 2000 of Destron Fearing, a company that specialises in implanted animal trackers. The CEO is trained vet and patent holder, Dr Randolph K. Geissler. "Prior to joining Digital Angel Corporation, Geissler served as Chief Executive Officer of Destron Fearing, a position he held since November 1993. He also served as Interim Chief Executive Officer during the merger of Destron/IDI and Fearing Manufacturing Co., Inc., a company he owned since 1987. Geissler also was President and Chief Executive Officer of Fearing. Prior to 1987, he held a variety of positions with Fearing, including product manager and director of corporate research and development-ectoparaciticides" http://www.digitalangel.net/about/exec.htm An ectoparaciticide is a drug for external use intended to prevent, destroy, repel, or mitigate parasites in or on animals. This is what Geissler said about the merger, March 6, 2000: "Our background, skill set and established track record of success are an excellent fit with Applied Digital's plans for competing in the tracking and monitoring business," Geissler said. - http://www.digitalangel.net/press/pr_2000/pr_03_06_00.htm Parent company, Applied Digital Solutions, chairman and CEO, Richard J. Sullivan went further. "Clearly, Destron Fearing is a highly successful and respected company in the animal monitoring arena," Sullivan said. "The fact that it's a leader in electronic monitoring technologies fits right in with our focus on e-business-to-business solutions. We're particularly excited about the potential for incorporating Destron Fearing and Digital Angel.net's data and technologies into the ASP (Application Service Provider) strategy we announced recently." - http://www.digitalangel.net/press/pr_2000/pr_03_06_00.htm Why would you put the CEO of an implant animal tracking company in charge of an e-commerce division? This is from the background to the acquisition, from a press release at the time, mirrored below: "In December of 1999, Applied Digital Solutions announced that it had acquired the patent rights to a miniature digital transceiver -- which it has named Digital Angel -- implantable within the human body that could be used for a variety of purposes, such as providing a tamper-proof means of identification for enhanced e-commerce security, locating lost or missing individuals, tracking the location of valuable property and pets, and monitoring the medical conditions of at-risk patients. The implantable device sends and receives data and can be continuously tracked by GPS (Global Positioning Satellite) technology." - http://home.iae.nl/users/lightnet/world/updatedigitalangel.htm Digital Angel chief scientist is Dr Peter Zhou counts among his patents anti-shoplifting tag systems -- "US5146204: Theft detection apparatus and flattened wire target and method of making same" and "US5029291: Electromagnetic sensor element and methods and apparatus for making and using same". His former employer, Knogo, holds 38 patents over similar technologies, all related to tracking things, usually via surreptitious means. There is nowhere on Digital Angel's site where it says it will not introduce similar implants for people. If it will never introduce them, let that be declared to the market. But it appears Destron Fearing was bought specifically for these patents. "Destron Fearing is the pioneer and developer of syringe injectable, miniaturized microchip technology for injection under the skin of animals." - http://www.destronfearing.com/elect/elect.html The images of the Destron Fearing implants look a lot like patent US5963132: Encapsulated implantable transponder, developed by Avid Identification Systems. That's not surprising. In its prior art claims, Avid references Destron/IDI's US5211129: Syringe-implantable identification transponder: "An improved transponder for transmitting an identification of an animal or the like is described which is sufficiently miniaturized to be syringe-implantable, thus avoiding the necessity of surgical procedures." Destron/IDI holds patents: US5166676: Identification system - passive integrated transponder (PIT) is attached to or embedded in an item to be identified US5041826: Identification system - A passive integrated transponder (PIT) is attached to or embedded in an item to be identified. Destron Fearing has gone so far to find a way for the implant to attach itself inside a human host once injected: "The patented BioBond anti-migration cap is a porous polypropylene polymer sheath attached to RFID microchip implants to impede migration of the device within animal tissue. The use of the patented BioBond cap results in increased retention by promoting the development of fibrocytes and collagen fibers around the implant, thus inhibiting movement of the implant within the animal." - http://www.destronfearing.com/elect/elect.html For Dr. Lawrence Webber to say there are no plans for implant trackers in humans in the followup article is not consistent with the company's strategy to acquire intellectual property. You don't pay $130 million for a company for its intellectual property and then not use it. If you want to see someting particuarly scary, check out Destron Fearing's 9 Feb 1998 patent US6095915: Premise identification system. Geissler shares a credit on the patent. "An animal tracing system having a parasitic premise information panel for attachment to the stud of an ear tag for use in determining the history and origins of an animal after the animal has been slaughtered, the premise information panel contains a bar code and a numeric code to reveal an animal's history and origin, the panel having sufficient strength to remain attached to the identification panel in day-to-day wear but of sufficient weakness so that a user can remove the premise information panel from the animal ear tag without removing the ear tag from the animal carcass and, along with a blood sample, store the panel therewith until a later date, at which time the premise identification information can be referred to a blood test reveals that the animal has a disease. The tainted carcass can be quickly identified by cross-referencing the premise information panel to the ear tag remaining on the carcass." http://www.delphion.com/cgi-bin/viewpat.cmd/US06095915__?OUT_FORMAT=pdf&MODE=fstv Other patents: US4885855: Antibacterial attachment US4741117: Animal ear tag US4497321: Ear tag applicators US4209924: Marking tag BTW Digital Angel COO is Mercedes Walton, who was chair of Project Nigel, an online music selling joint venture between AT&T, BMG Entertainment, Matshushita Electric, Inc., and Universal Music Group. Nigel crashed and burned. Can you imagine a tracking system that could tell when you had swapped songs over Napster, then dobbing you in to the local police, complete with your location accurate to within a few meters? http://www.bizreport.com/news/2000/01/20000119-3.htm --- ------------------------------------------------------------------------- POLITECH -- Declan McCullagh's politics and technology mailing list You may redistribute this message freely if you include this notice. To subscribe, visit http://www.politechbot.com/info/subscribe.html This message is archived at http://www.politechbot.com/ ------------------------------------------------------------------------- ************************************************************************ Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 3226 From: Steve Uhrig Date: Tue Jun 19, 2001 9:08pm Subject: Re: Digital Angel = Digital Snake Oil? Once upon a midnight dreary, A.Lizard pondered, weak and weary: > looks like the 'injectable tracker for people is back in the > news', has anything come up that makes this device look more > credible since it was last discussed here? http://www.wired.com/wired/archive/7.10/spam.html Digital Angel and all permutations are completely phony. The basic laws of physics explain why. Nothing more needs to be said. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3227 From: James M. Atkinson, Comm-Eng Date: Tue Jun 19, 2001 10:41pm Subject: Experts testify that long careers in spying unusual Experts testify that long careers in spying unusual Associated Press - 6/16/01 Tampa - Most spies don't have careers that last for decades. And espionage experts say if prosecutors prove that Melbourne retiree George Trofimoff was a spy throughout the Cold War, that would make him remarkable. Trofimoff is on trial at the U.S. District Courthouse in Tampa on a charge that he supplied the Soviets with secret military documents for more than 25 years. Prosecutors say they intend to link Trofimoff to the same KGB agents whose other American military contacts have been arrested during the past three decades. Presley Reeves is a former Air Force intelligence officer who now teaches at American Military University in Virginia. And Reeves says most spies slip up at some point in their career. Jurors have been told that Trofimoff showed some suspicious signs during the years he headed an Army interrogation center in Germany. He lived beyond his means, and openly associated with a Russian suspected of being a spy. But he never disclosed his relationship to the Army, even though he often stayed overnight at the man's home while carrying secret Army documents. Trofimoff's trial resumes Monday, and is expected to last at least two weeks. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3228 From: David Alexander Date: Wed Jun 20, 2001 6:11am Subject: Re: FBI files sold to mob figures: >FBI files sold to mob figures: Las Vegas analyst is charged with >stealing secrets > >A confidential informant has told the FBI that he sold investigative >information obtained from a just-arrested Las Vegas FBI employee to >organized crime members and other criminal targets. > >The employee, James J. Hill, a 51-year-old security analyst for the >Las Vegas FBI, was taken into custody locally last week on a criminal >complaint filed against him in New York. He faces a 3 p.m. Wednesday >detention hearing before U.S. Magistrate Lawrence Leavitt. > >Hill was charged in the six-page complaint with obstruction of >justice and stealing and selling the top-secret FBI information for >cash. > >The informant, a New York private investigator, said he had paid Hill >$25,000 for criminal files since November 1999. Why call this person a 'CI'. He's not going to be any use in the future as his cover is blown wide open. Even if Hill does not tell someone in the crime gangs who it is, how many PIs in NY with the details given are selling dodgy files to organised crime...can't be too hard for the bad guys to figure out who the 'CI' is. Sounds like the newspapers trying to make the story more dramatic than it really is again David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 3229 From: Robert G. Ferrell Date: Wed Jun 20, 2001 0:15pm Subject: Re: Re: FBI files sold to mob figures: >Sounds like the newspapers trying to make the story more dramatic than >it really is again News doesn't sell papers: scandal and melodrama do. RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 3230 From: Paolo Sfriso Date: Wed Jun 20, 2001 9:22am Subject: Poor Man's mm-Wave Detector Would any of the more uWave adept listmembers please comment on this circuits sensibility and freq. range. Message: 1 Date: Tue, 19 Jun 2001 08:43:02 -0000 From: mccoy@i... Subject: Poor Man's MM-Wave Detector Neon Lamp Microwave Detector An Ultra simple and stable circuit for detecting Microwaves Will apparently operate to Milli-Meter Wave frequencies as high as 100Ghz ( 3 mm ) also: Neon Lamp Scalar wave Detector An Ultra simple and stable circuit for detecting Scalar Waves Based on a modification of the above circuit. http://www.icom.ca/~mccoy/#mmwave Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 paulsfriso@t... www.grupposit.com 3231 From: Steve Uhrig Date: Wed Jun 20, 2001 2:27pm Subject: Re: Poor Man's mm-Wave Detector Once upon a midnight dreary, Paolo Sfriso pondered, weak and weary: > Would any of the more uWave adept listmembers please comment on > this circuits sensibility and freq. range. The webpage was written by one of the types of lunatics we get calls from. On quick examination, the circuit probably would work to detect high levels of RF (like on the order of those found inside a microwave oven) at fairly high frequencies. The thing is not magic; it merely uses a moderately resonant antenna to help fire a neon bulb, along the lines of a trigger on an electronic camera flash. I don't see any practical use for TSCM. In fact, offhand I can't think of any practical use whatsoever, although there certainly will be special applications for anything. The circuit could be designed to detect different frequencies (but still at relatively high levels) merely by changing the resonant frequency of the loop the circuit uses as the antenna. I believe the author, who anyone reading the remainder of his site would agree is a nut case, is confusing a lot of scientific mumble jumble with something of practical use. The original article in whatever the publication was, was more of a theoretical thing than suggesting any real world applications. BTW, Paul, WL acknowledged receipt of the document you asked me to send him. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3232 From: John McCain Date: Wed Jun 20, 2001 4:15pm Subject: Re: Poor Man's MM-Wave Detector Steve, I saw this a little differently. Based upon his description ("only the tip of the cathode electrode glows") I imagine that the ne-2 (forgot they still made those) is almost in the conducting range, and additional ionizing energy would cause it to flash over, thus causing a current pulse that was indicated on the speaker. Similar to a low sensitivity geiger tube. I can't imagine any useful purpose for this thing though. 'Of course, it's billed as a scalar wave detector, and any time scalars start waving at me, I reach for the ghost buster....errr, dust buster.. or something :). Cheers, JohnM > >Neon Lamp Scalar wave Detector > >An Ultra simple and stable circuit for detecting Scalar Waves >Based on a modification of the above circuit. > >http://www.icom.ca/~mccoy/#mmwave Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-352-0350 807 Pioneer Web: http://www.dcbnet.com Champaign, IL. 61820 Email: Jmccain@d... 3233 From: Jeremy Funk Date: Thu Jun 21, 2001 10:02am Subject: DIA Employment TSCM Group, I have followed this list for about a year now. I am extremely impressed with the levels of expertise to be found here. My hat's off to James Atkinson for making this happen. I am a 27 yr old Electrical Engineering student at Texas A&M. I have 8 years SIGINT and COMSEC experience with the US Army. The DIA is offering summer internships for 2002. Here is where I insert my question. Has anyone on this list either a) participated in the summer internships, or b) is associated with the DIA and would be willing to lend some advice to a potential employee. Just keeping my proverbial ducks in a row. Thank you for your time and help. Jeremy Funk 3234 From: Date: Thu Jun 21, 2001 0:37pm Subject: Lawmakers Push Wiretap Bill Lawmakers Push Wiretap Bill By JESSE J. HOLLAND .c The Associated Press WASHINGTON (AP) - Federal investigators should have the power to seek telephone wiretaps on suspected sexual predators to help block physical meetings between molesters and children, lawmakers said Thursday. ``If law enforcement officials cannot monitor a predator's calls, they may be unable to stop him before he harms the child,'' said Rep. Lamar Smith, R-Texas. The bill passed by a House Judiciary subcommittee Thursday would allow federal officials to ask for permission to wiretap people suspected of being involved in child pornography; trying to get children to perform sexual acts for money; or traveling to or bringing children for prostitution or illegal sexual activity. A similar bill passed the House last year but died in the Senate. Since 1995, the FBI has investigated more than 4,900 cases involving people traveling interstate intending to have sex with children or involved with child pornography. Wiretaps are essential because child molesters lurk on the Internet but then move to more conventional forms of communication, argued Rep. Nancy Johnson, R-Conn., the bill's sponsor. ``Most all of these predatory relationships involve at least limited phone contact,'' she said. ``As the relationship between the predator and their victim progresses they move their conversations to the telephone. The authorities need the ability to track these conversations, if we are to truly protect our children.'' Johnson also wants federal officials to be able to wiretap Americans traveling overseas to have sex with children, and people buying and selling children for sexual exploitation. ``These people do not only act on their predatory impulses overseas,'' she said. ``They return to the United States emboldened by their experiences.'' While praising the bill's intent, Rep. Bobby Scott, D-Va., argued against expanding wiretapping by the FBI. ``The standard for wiretaps should not be whether it is helpful, but whether it is necessary,'' Scott said. But Francis Gallagher, deputy assistant director of the FBI's criminal investigative division, called telephone wiretaps not only ``warranted but necessary'' when investigating sexual crimes against children. ``The authority to monitor 'off-line' conversations would in many cases enable the FBI to learn of a planned meeting between the predator and the child,'' he said. ``The FBI could then intercede prior to the victimization of the child. Such authority would also allow for the collection of valuable evidence which could result in the identification of other child sex offenders and child victims.'' The bill number is H.R. 1877. On the Net: For bill text: http://thomas.loc.gov House Judiciary Committee: http://www.house.gov/judiciary Federal Bureau of Investigation: http://www.fbi.gov AP-NY-06-21-01 1733EDT 3235 From: William Knowles Date: Fri Jun 22, 2001 4:10am Subject: Profane parrot upstages admiral http://www.thetimes.co.uk/article/0,,2-2001211806,00.html also: http://www.telegraph.co.uk/et?ac=004782403739693&pg=/et/01/6/22/nparo22.html BY ALAN HAMILTON FRIDAY JUNE 22 2001 ADMIRAL Sir Alan West, Commander-in-Chief Fleet, was addressing fellow officers in the wardroom of the frigate HMS Lancaster during a tour of the Gulf when a high-pitched voice from a side room cupboard shouted "Arse". Mildly perturbed but with steely resolve, the admiral continued with his briefing. "Bollocks", said the voice. Further choice epithets not unfamiliar below decks followed without regard for the fact that serious top brass could hear them. "Slag", said the voice. It could have been worse. Sunny, the 18-month-old African grey parrot who is employed as the Lancasters mascot and who usually lives in a cage in the wardroom, has an extensive repertoire. She can quote the words of Sir Michael Caine, "Zulus, thousands of 'em", whistle the theme tune from Steve McQueens The Great Escape, and remark in the manner of a macho Australian, "Show us your growler". The Lancasters officers had thought Sunny should stay out of sight during the admirals visit, but the voice refused to be silenced. "F off", it said. One of the Lancasters ratings said: Everything was going OK until the word 'arse' was blurted out from the cupboard. The Commander-in-Chief looked a little stunned at first, but fortunately he just carried on as normal. God knows what he was thinking. The crew had taught Sunny her bad habits, another rating said: Now she shouts 'arse' and 'bollocks' every other minute. In future, if senior officers come aboard, Sunny will be banished from the wardroom, as she can no longer be trusted to observe naval discipline. When she returns to Portsmouth next month at the end of the type 23 frigates six-month tour, she needs to mind her As and Bs or she might find herself an ex-parrot. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 3236 From: Date: Fri Jun 22, 2001 5:28pm Subject: Here's some things you may not have known. Think you know everything? Here's some things you may not have known. 1. Rubber bands last longer when refrigerated. 2. Peanuts are one of the ingredients of dynamite. 3. There are 293 ways to make change for a dollar. 4. The average person's left hand does 56% of the typing. 5. A shark is the only fish that can blink with both eyes. 6. There are more chickens than people in the world. 7. Two-thirds of the world's eggplant is grown in New Jersey. 8. The longest one-syllable word in the English language is "screeched." 9. On a Canadian two dollar bill, the flag flying over the Parliament building is an American flag. 10. All of the clocks in the movie "Pulp Fiction" are stuck on 4:20. 11. No word in the English language rhymes with month, orange, silver, or purple. 12. "Dreamt" is the only English word that ends in the letters "mt". 13. All 50 states are listed across the top of the Lincoln Memorial on the back on the $5 bill. 14. Almonds are a member of the peach family. 15. Winston Churchill was born in a ladies' room during a dance. 16. Maine is the only state whose name is just one syllable. 17. There are only four words in the English language which end in "dous": tremendous, horrendous, stupendous, and hazardous. 18. Los Angeles' full name is "El Pueblo de Nuestra Senora Reina de los Angeles de Porciuncula" 19. A cat has 32 muscles in each ear. 20. An ostrich's eye is bigger than its brain. 21. Tigers have striped skin, not just striped fur. 22. In most advertisements, the time displayed on a watch is 10:10. 23. Al Capone's business card said he was a used furniture dealer. 24. The characters Bert and Ernie on Sesame Street were named after Bert the cop and Ernie the taxi driver in Frank Capra's "It's a Wonderful Life." 25. A dragonfly has a life span of 24 hours. 26. A goldfish has a memory span of three seconds. 27. A dime has 118 ridges around the edge. 28. It's impossible to sneeze with your eyes open. 29. The giant squid has the largest eyes in the world. 30. In England, the Speaker of the House is not allowed to speak. 31. The microwave was invented after a researcher walked by a radar tube and a chocolate bar melted in his pocket. 32. Mr. Rogers is an ordained minister. 33. The average person falls asleep in seven minutes. 34. There are 336 dimples on a regulation golf ball. 35. "Stewardesses" is the longest word that is typed with only the left hand. ...NOW you know everything... "You could be a TEENAGER! 3237 From: James M. Atkinson, Comm-Eng Date: Fri Jun 22, 2001 9:41pm Subject: Mossad advertising for field officers with 'spunk' Mossad advertising for field officers with 'spunk' http://www.jpost.com/Editions/2001/06/22/News/News.28895.html By Arieh O'Sullivan TEL AVIV (June 22) - "Let's be frank - we want spunky people who can captivate others as they manipulate and lead them along to provide secret information to the state." That's the theme of the newest recruitment campaign by the Mossad, which appears today in major Hebrew dailies. The success of the first ad campaign last summer looking for spies was so successful, the Mossad has now narrowed down its want ads to one of the intelligence field's most challenging roles: field officers. "If you've got spunk, smarts, and sensitivity, you can make an impact on and fulfill a national and personal mission," say ads prepared by the Mossad appearing in today's major Hebrew dailies. It goes on to say that they are looking for people who can "drag, enthrall and motivate" others, key criteria for field case officers. It was a rare revelation by the Mossad of the specific characteristics they were seeking for their case officer candidates. "This is in order to remove some of the uncertainties which may cause potential candidates to refrain from applying," said a statement from the Prime Minister's Office, which is responsible for Israel's security service. Case officers are the heart of any intelligence network. Their main task is to recruit operatives and informers, particularly in enemy countries, or those with access to secret information around the world. "Intelligence that a case officer brings in allows the political level to make strategic decisions and are an instrument in the hands of the security bodies to successfully carry out the most complicated missions," the statement said. "A case officer is a director, a screenwriter, and an actor in a reality which he creates in order to make the suitable environment for gathering intelligence," the statement said. It went on to say that the Mossad was looking for flexible people who could work on their own or in a team among different cultures. "The position requires intermittent service abroad and in areas which are not hostile," the statement said. The Mossad maintains that the recruitment campaign is "a natural continuation" of the previous campaigns, said the statement. Senior Mossad sources said that the first ad campaign last summer was seen as a success, not only because some suitable candidates were found, but also it revealed to the organization that some of their recruitment criteria were faulty. Mossad sources said that in the previous ad campaigns they did not detect any attempts to introduce plants into the secret service organization. A few months ago, the Mossad took out ads for computer experts and others specializing in hi-tech. The Mossad has found itself competing for a small group of high quality people on the open market who are being drawn to the hi-tech companies and business world with high salaries, good conditions, and social status, all of which the Mossad can't offer. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3238 From: Justin T. Fanning Date: Sat Jun 23, 2001 7:40pm Subject: handheld with 2" screen (ICOM IC-R3) Icom has a new hand held receiver (2.4W x 4.7H x 1.3D in) with a built in 2" video screen, covering up to 2.45 Ghz. All your normal receiver features plus, AM & FM TV (NTSC M, PAL B or PAL G systems). To quote Icom, they are aiming at the ..."Experimenting with wireless video" market. I'm more involved in the IT security side of things than RF sweeping, so I couldn't comment on its TSCM usefulness, but I'm sure the spy shops will have shelves full of them in no time at all! http://www.icomamerica.com/receivers/handheld/icr3main.html Regards, Justin T. Fanning Justin@f... 3239 From: James M. Atkinson, Comm-Eng Date: Sat Jun 23, 2001 7:56pm Subject: Re: handheld with 2" screen (ICOM IC-R3) At 1:40 AM +0100 6/24/01, Justin T. Fanning wrote: >Icom has a new hand held receiver (2.4W x 4.7H x 1.3D in) with a built >in 2" video screen, covering up to 2.45 Ghz. All your normal receiver >features plus, AM & FM TV (NTSC M, PAL B or PAL G systems). > >To quote Icom, they are aiming at the ..."Experimenting with >wireless video" market. I'm more involved in the IT security side of >things than RF sweeping, so I couldn't comment on its TSCM usefulness, >but I'm sure the spy shops will have shelves full of them in no time >at all! > >http://www.icomamerica.com/receivers/handheld/icr3main.html > > >Regards, > > >Justin T. Fanning >Justin@f... Justin, The R-3 has been out now for a year, and Icom has been receiving a lot of heat due to the flat out deceptive advertising there are doing concerning it. For what it is, and what it costs it is a pretty good deal, but it is not even close to what Icom claims. I have several R-3's. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3240 From: Graham Bignell Date: Sat Jun 23, 2001 6:14am Subject: Re: Here's some things you may not have known. On Fri, 22 Jun 2001 MACCFound@a... wrote: > Think you know everything? Here's some things you may not have known. > 9. On a Canadian two dollar bill, the flag flying over the Parliament > building > is an American flag. I could ignore the other false statements but not this one, we Canucks fly our flag with the same pride as you yankees so: 1. The only american flags to appear on Canadian money are special issue commemorative coins, where it is stamped next to our flag. 2. It's a Canadian flag on the two dollar bill. 3. It's a two dollar coin now, the bills are out of circulation. :) --- Graham "Lorax" Bignell 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 3241 From: Miguel Puchol Date: Sun Jun 24, 2001 4:52am Subject: RE: handheld with 2" screen (ICOM IC-R3) James, > I have several R-3's. So, what you do, use them to start the fireplace at night? :-) I tried one and returned it, your comments are mild from what I have experienced with this rig. Icom makes good receivers, but sometimes trying to cram so much stuff into a small scanner is asking for trouble. I just can't see how the R-3 made it through prototype testing. All the best, Mike From: William Knowles Date: Thu Jun 17, 2004 8:09pm Subject: Re: Re: New poll for TSCM-L I'll be honest, I have been seriously debating axing this list as half the stuff isn't related to TSCM, some could be debunked in five minutes of Googling or Snopes, and the other 30% about TSCM is dead on the money. Its one of the few lists I don't digest, procmail, and read from another mailbox, I consider it important enough to read in my inbox as it comes in. However being on the list as long as I have, (feeling more knowledgeable that when I first joined) if an opportunity pops up from one of my clients wanting TSCM services, I know who to call on to get the job done professionally and who not to call that is going to send in the clowns wearing ninja suits unloading $50K worth of CCS junk. :) While I now know the difference between professional gear and that spy shop crap you can buy from the Sharper Image, I know a number of others don't. If you feel that you must point out these people, put up a webpage like Attrition does for all the fakes within information security and do it for the TSCM business. http://www.attrition.org/errata/charlatan.html I was doing ALOT of deleting here, and there last week, and honestly I am sure I deleted some stuff I probably would have wanted to read, but a little heads-up to the list that your charlatan page has been updated would suffice in my book, not cluttering it up with rumors or gossip that detracts from the true mission of the list. William Knowles wk@c... > A significant portion of this list, including me, is on the very > edge of unsubscribing due to all the horsecrap posted re Mr. Wilson > lately. > > Stop the crap and stick with the mission of this list, which is not > blatant slander of others. I'm as guilty as anyone when a charlatan > pops up and tries to snow us and I put him in his place, but in this > case any discussion of Mr. Wilson is PURE GOSSIP and completely > imappropriate for this list. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ---------------------------------------------------------------- C4I.org - Computer Security, & Intelligence - http://www.c4i.org ================================================================ Help C4I.org with a donation: http://www.c4i.org/contribute.html *==============================================================* 8927 From: James M. Atkinson Date: Thu Jun 17, 2004 8:30pm Subject: Re: Re: New poll for TSCM-L You make a good point, and I appreciate your feedback on the matter. I generally don't waste my time pointing out the smaller con artists in the business, but only cut loose on Wilson as quite few people on the list (including myself) have been screwed by the guy, but until now he was Teflon coated due to his tie to the DEA as a CI. He was also warmly embraced by a number of list members even though I and others in the profession was waving them off. -jma At 09:09 PM 6/17/2004, William Knowles wrote: >I'll be honest, I have been seriously debating axing this list as half >the stuff isn't related to TSCM, some could be debunked in five >minutes of Googling or Snopes, and the other 30% about TSCM is dead >on the money. Its one of the few lists I don't digest, procmail, and >read from another mailbox, I consider it important enough to read in >my inbox as it comes in. > >However being on the list as long as I have, (feeling more >knowledgeable that when I first joined) if an opportunity pops up from >one of my clients wanting TSCM services, I know who to call on to get >the job done professionally and who not to call that is going to send >in the clowns wearing ninja suits unloading $50K worth of CCS junk. :) > >While I now know the difference between professional gear and that spy >shop crap you can buy from the Sharper Image, I know a number of >others don't. If you feel that you must point out these people, put up >a webpage like Attrition does for all the fakes within information >security and do it for the TSCM business. > >http://www.attrition.org/errata/charlatan.html > >I was doing ALOT of deleting here, and there last week, and honestly I >am sure I deleted some stuff I probably would have wanted to read, but >a little heads-up to the list that your charlatan page has been >updated would suffice in my book, not cluttering it up with rumors or >gossip that detracts from the true mission of the list. > >William Knowles >wk@c... > > > > A significant portion of this list, including me, is on the very > > edge of unsubscribing due to all the horsecrap posted re Mr. Wilson > > lately. > > > > Stop the crap and stick with the mission of this list, which is not > > blatant slander of others. I'm as guilty as anyone when a charlatan > > pops up and tries to snow us and I put him in his place, but in this > > case any discussion of Mr. Wilson is PURE GOSSIP and completely > > imappropriate for this list. > > > >*==============================================================* >"Communications without intelligence is noise; Intelligence >without communications is irrelevant." Gen Alfred. M. Gray, USMC >---------------------------------------------------------------- >C4I.org - Computer Security, & Intelligence - http://www.c4i.org >================================================================ >Help C4I.org with a donation: http://www.c4i.org/contribute.html >*==============================================================* > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8928 From: James M. Atkinson Date: Thu Jun 17, 2004 8:41pm Subject: Icom R20's The two Icom R20's I ordered last week came in this afternoon, and arrived earlier than expected. I will fiddle around with them for a few weeks before I open them up for modifications or hitch them up for an instrument based evaluation. My initial impression of the unit is favorable, but I will have a better opinion of it in a few weeks, and will post it to the list. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8929 From: James M. Atkinson Date: Thu Jun 17, 2004 9:48pm Subject: Looking for a carbon capacitor I need a eighteen to twenty each 28+ volt, 100 Farad, very low ESR, carbon capacitors, and would appreciate hearing from any list member who might have these in stock. I also seeking high current shunts of at least 1500 amps at 28 volts, with a 50mV output, and would be happy with shunts rated at 2000 Amps. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8930 From: kondrak Date: Fri Jun 18, 2004 0:09am Subject: Citizens use Internet to spy on Terrorists Ö > > >Posted on Thu, Jun. 17, 2004 > >Citizens use Internet to spy on, thwart terrorists > >BY MIKE CARTER >Seattle Times > >CONRAD, Mont. - (KRT) - Shannen Rossmiller finds early mornings are best >for hunting terrorists. > >When it's 4 a.m. in this one-stoplight prairie town, it's 3 p.m. in, >say, Karachi, Pakistan, the sweltering hours just before the evening >call to prayer. That's when Rossmiller, while her husband and three >children sleep, finds the Internet chat rooms and bulletin boards >frequented by radical Muslims and jihad warriors are busiest. > >It is when Rossmiller pursues her deadly serious hobby: Citizen >cyber-spy. > >Since the Sept. 11, 2001, attacks, the Internet has become sprinkled >with self-proclaimed intelligence agents and freelance threat analysts >like Rossmiller - ordinary civilians who comb Web sites and chat rooms >for hints of the enemy's next move. The phenomenon, propelled by the >Internet's anonymity and worldwide reach, is unique to the war on >terrorism. > >A few, like Rossmiller, take their pastime further. > >Unencumbered by bureaucracy or by laws requiring warrants or prohibiting >entrapment, she and a few others freely infiltrate the enemy's lairs and >assess what they find there. In some cases, they even disrupt >communications or get people arrested. > >But spying can be dangerous business, even more so when the government >doesn't officially condone or even know about it. Experts say citizen >cyberspies can stumble into risky situations or get in the way of law >enforcement. But they also acknowledge people like Rossmiller have good >intentions - and, occasionally, good luck. > >So it was that, on one of Rossmiller's trawls through Web sites with >names like bravemuslim.com last fall, she came across a posting by a man >calling himself Amir Abdul Rashid. It was clear from the message that >Rashid was edging toward the violent fringes of Islam. > >Over time, it also became apparent to her that he was an American >soldier. > >Posing as an Algerian with ties to that country's outlawed Armed Islamic >Group, she sent Rashid an e-mail with the subject line "A Call to >Jihad." Rashid responded by asking if it was possible that a "brother >fighting on the wrong side could defect." > >Over a period of four months, Rossmiller drew out Rashid through a >series of 27 e-mails. She learned, with growing alarm, that he was a >National Guardsman about to be deployed to Iraq. And he appeared willing >to share information on American troop vulnerabilities with the enemy. >Rossmiller provided the information to the Department of Homeland >Security, which passed it to the FBI and the Army. > >The arrest in that case of Ryan Anderson, 26, a troubled Muslim convert >and a specialist in the Washington state National Guard's 81st Armor >Brigade, was splashed across the country's newspapers in February. It >was a direct result of Rossmiller's work, and she is expected to be the >reluctant star witness at his pending court martial. She testified in a >preliminary hearing last month. > >Until that hearing, almost nobody in Conrad (population 2,753) knew of >Rossmiller's avocation. Townsfolk learned about it only after a wire >story appeared in the Great Falls Tribune. > >Rossmiller said she never wanted the publicity - all she wanted was to >help stop terrorists. Now, people stop her at the grocery and wave her >down at the local coffee shop to thank or congratulate her. > >When asked, however, nobody's quite sure how she got involved or exactly >what she did. >"I don't think people really know what to think of this," Rossmiller >said. > >Even before being outed as a cyber-spy, Rossmiller was a high-profile >member of this farming community: She's the town judge, a paralegal who >was appointed to the post four years ago. > >Conrad, surrounded by farmlands that roll, virtually uninterrupted, to >Glacier National Park some 60 miles northwest, is home to a large >community of Hutterites, a pacifist Christian sect similar to the Amish. >The surrounding county also hosts 17 intercontinental strategic missile >sites operated out of nearby Malmstrom Air Force Base. > >Rossmiller, 34, was born and raised in Conrad, her father a farmer and >her mother a special-education teacher. A former high-school cheerleader >and honors student, she now draws on her legal-research skills in her >quest. >Rossmiller said there is no mystery to how and why she developed her >avocation. It traces to Tuesday morning, Sept. 11, 2001. > >She was bedridden with a fractured pelvis and felt helpless as the >terrorist attacks unfolded. >"I had to do something," Rossmiller said over lattes and lunch at the >Lobby, a kitschy restaurant two doors down from the city offices on Main >Street. > >She started pulling random items out of her purse: her checkbook, a >wallet, a key fob, all adorned with the American flag. "This is who I >am," she said. "When President Bush asked for a dollar for the Afghan >children's fund, I sent $100. I can't help it. > >"Besides, my husband wouldn't let me join the National Guard." > >Her interest in the attacks led her to the Internet, where, in >discussion groups and on bulletin boards, she met others driven to know >more about those responsible. > >It wasn't long before she and a few others formed a loose-knit group. >Alliances evolved over time. The goal, however, was clear from the >start: Disrupt terrorists. The group called itself 7Seas Global >Intelligence Security Team, and its research began extending beyond the >day's headlines. > >"By the time things hit the mainstream media, a deed was pretty much >done," explained Brent Astley, an unemployed physicist and software >designer near Toronto, and a member of the 7Seas team. "We decided to >take it to the next level." > >7Seas has grown into a sophisticated intelligence group, members say. > >Initially, the group gathered information and tried to predict when >another terrorist attack might occur. Members posted their findings on a >Web site called itshappening.com, a bulletin board of like-minded >armchair intelligence neophytes. The first attempts were amateurish, and >Astley concedes a critic's point that 7Seas was prone to crying wolf. > >"They are prone to read an awful lot into very little," said Neil Doyle, >a freelance journalist who has written extensively on international >terrorism. > >"We've evolved," Astley said. "Some of us are quite adept." > >The 7Seas operation has become more sophisticated, Rossmiller and Astley >say. Its members now post their work and share thoughts in a private, >secure area of the Internet. In the meantime, members have put together >a huge database of research and news stories about terrorist groups and >individuals. > >Occasionally, the group takes its findings public. On May 12, 2002, >7Seas posted a news release stating it had correctly warned of bombings >that day in Riyadh, Saudi Arabia, that killed an Australian man. The >group referenced a rough and garbled translation of an Arabic Web site >that 7Seas had posted four days earlier on itshappening.com. > >Rossmiller said she and others have developed contacts in intelligence >agencies in several countries, and have passed on significant >information. > >It's hard to measure her claim. The Department of Justice did not >respond to requests to discuss 7Seas or the private-intelligence >phenomenon. Likewise, the Canadian Security Intelligence Service >declined to comment. > >But FBI spokesman Bob Wright, a special agent in Salt Lake City - the >field office responsible for FBI activities in Montana - said the agency >would not discourage individuals like Rossmiller. > >"We've always relied on our good relationship with citizens as our eyes >and ears in the community," Wright said. "This is just a new twist on an >old theme. It's sort of like a cyber Neighborhood Watch." > >Cyberspies' tactics are painstaking and sometimes bold. > >The 7Seas Web site - www.7-seas.net - claims the group can provide >"round-the-clock" threat analysis and "real time terrorist information, >intelligence and strategic analysis to law enforcement and military >agencies both within the United States and internationally." > >Rossmiller took a few hours one morning to demonstrate. Over the past >two years, she explained, she has invented and developed several >characters whose identities she assumes when visiting Jihadi chat rooms >and bulletin boards. Nobody in 7Seas speaks Arabic, and Rossmiller might >spend weeks translating a posting using software and a dictionary. > >The details of the personalities she assumes are just as painstakingly >assembled. Their street addresses are real. She knows the address of the >nearest mosque and the name of its imam. A message pops up on her >computer to remind her when it would be prayer time, so she remembers to >stop what she's doing. > >She has software that "proxies" her computer address to that area, >making it appear to all but the most savvy Internet user that she's >physically there. It helps that her husband, Randy, is a computer >technician. > >Rossmiller spends hours researching the philosophical underpinnings of >terrorist groups. If she were a Kashmir radical, she points out, her >motivations would differ from those of a Saudi Arabian or Afghan. > >Her postings can be brazen. Rossmiller said the goal is to flush out >terrorists, and being timid or obtuse doesn't get it done. >"I've found that the only way to get information is to be a little >bolder than they are," she said. >"This is not conventional. There is no textbook for this." > >There are seven members of 7Seas: Four in the U.S. and one each in >Canada, Australia and Singapore. Rossmiller declined to identify the >others, aside from Astley. But she said they are corporate and personal >security experts, a former detective who speaks seven languages >(although not Arabic), a "global media" specialist, a real-estate agent >and an architect. >For a brief period in 2002, 7Seas was incorporated and its members hoped >to land a government contract. But a falling-out with a founding member >delayed those plans, and Rossmiller let the corporation die before it >ever made a dime. > >She said, however, that its members hope one day to make a profit as >security and intelligence consultants - even though the job has risks. >Conrad police officer Carl Suta said the FBI ordered Rossmiller placed >under police protection after a suspicious telephone call to Conrad City >Hall on May 18. > >Officers believed the call may have come from someone in Canada with >whom Rossmiller had been in contact while using the same alias she used >to trap Anderson. > >Since the Sept. 11 attacks, private security and intelligence sites on >terrorism have sprouted on the Internet. They range from the useful to >the absurd: One site, http://trackingthethreat.com, contains a >remarkable database of known terrorists and groups. > >Then there's http://stevequayle.com, whose founder is a longtime >survivalist, talk-radio host and conspiracy theorist. Quayle's "global >terror alert" can be found alongside links to his research into our >36-foot-tall ancestors and a conspiracy-fueled treatise on missing >Soviet scientists. > >Two years ago, a freelance intelligence agent in Britain named Glen >Jenvey obtained secret videotapes of an Islamic cleric in London named >Abu Hamza al-Masri and a young Seattle acolyte named James Ujaama >talking about jihad. Those tapes were later used to prosecute Ujaama, >who had helped plan to set up a terrorist training camp in Bly, Ore. >Ujaama pleaded guilty and has agreed to testify against Abu Hamza, who >is charged with conspiring to help al-Qaida. > >Last month, the operator of a homeless shelter in Albuquerque, N.M., >Jeremy Reynalds, infiltrated and then exposed several jihad Web sites >unwittingly hosted by American Internet providers. Reynalds, an >associate of Jenvey, said he has spent more than two years posing as a >terrorist to get inside some of the sites. > >"This is a really intriguing phenomenon," said retired Air Force Gen. >Todd Stewart, the executive director of the National Academic Consortium >for Homeland Security, an alliance of colleges and universities >conducting research on homeland-security issues. >"What you're seeing is people taking to heart the calls for increased >vigilance," he said. >The question is, when does vigilance become vigilantism? Stewart and >others say that remains to be seen. > >"I think we'll find that this is all part of the debate over how secure >is secure enough" in the post-Sept. 11 world, Stewart said. "We have yet >to determine the balance between personal security and personal >freedom." > >Cyberspies avoid bureaucracy, but they can land in trouble. > >Still, there is precedent for citizens to take up spying for the common >good, even when it stretches the law, said Steven Emerson, a journalist >whose 1992 book "American Jihad: The Terrorists Living Among Us" took on >new significance after the Sept. 11 attacks. > >"If you uncover some wrongdoing or illegality, then I think this sort of >thing is a public service, really," Emerson said. > >Consider, he said, the seminal investigative work of white Texas writer >John Howard Griffin, who tinted his skin and chronicled the life of a >black man in the Deep South in his book "Black Like Me." Griffin's book >was published in 1961. >Glenn Harlan Reynolds, a University of Tennessee law professor who has >written about what he calls "white-hat hackers" - citizens who use the >Internet to spy on or disrupt terrorism - said the phenomenon is a >natural extension of the war on terrorism. > >"It's not unlike Newton's Law - for every action there is an equal and >opposite reaction," he said. "Terrorism is decentralized. You would >expect the reaction to it to be decentralized, as well." > >Individuals are able, in some instances, to >leapfrog the efforts of the federal agencies whose job it is to protect >the homeland. >"They are not strangled by a bureaucracy" or the requirements of a court >of law, he said. >The downside, he said, is that private citizens don't have the legal >immunities that police do. An officer acting in good faith, even if he >makes a mistake, is difficult to sue. Not so for a private citizen, >Reynolds said. > >And there could be other, more serious, legal consequences. > >"Computers make it possible to play spy from your home, and that can be >good," he said. "But remember, you are still being a spy, and that >carries risks. People might try to kill you. You might violate the law. >You might screw things up." > >Wright, the FBI agent, said, "It's probably true that at times we will >be working at cross-purposes." > >Indeed, one of the points Rossmiller and others who play these spy games >concede is that they can't always tell who is who on the Internet. >Astley, the 7Seas member in Canada, said he was once warned away from a >target by "U.S. law enforcement." He backed off without asking why. > >Elizabeth Bancroft, the executive director of the Association of Former >Intelligence Officers in Washington, D.C., said the role of citizen >spies - she calls them "assets" - has been "a fixture of imaginative >minds for decades. > >"The Internet has only brought forth more gamesmanship and role-playing. >... But hundreds of Walter Mittys and James Bond Juniors exist, and play >their hands with vigor, cloaked by the anonymity of the Net. > >"One of the many features of a free society is having a bit of fun," she >said. "Should they happen to flush out a terrorist or two - we say >bravo." > >--- > >© 2004, The Seattle Times. > >Visit The Seattle Times Extra on the World Wide Web at >http://www.seattletimes.com > >Distributed by Knight Ridder/Tribune Information Services. > >© 2004 KRT Wire and wire service sources. All Rights Reserved. > >http://www.aberdeennews.com 8931 From: Lou Novacheck Date: Thu Jun 17, 2004 10:09pm Subject: Re: Beijing wages cyberwar against DPP headquarters FWIW, the first of my two cents says this is the second feeler the PRC's sent out. The first was last week's "leak" which stated the PRC was planning a "beheading" operation against the ROC, whereby they'll take out the President, his top aides, and certain other top brass, both military and civilian, but mostly civilian. The predominant thinking is that if you sever the head, the body will die. And for my second of the two cents, the PRC will make their move in the thick of the US presidential campaign, very late summer, early fall. Combined with Afghanistan and Iraq, plus what might have developed in Saudi, in the Jordan-Lebanon-Israel area, and the Sudan, and maybe even Iran or Syria by then, the US won't be able to respond to the extent they'll need to. The US military is already stretched way too thin. Robert Crumb's Crumbwrap $9.99 postpaid Life & Adventures of Santa Claus by Mike Ploog $12.99 postpaid Wizard Trading Co PO Box 482 Cudahy WI 53110 ----- Original Message ----- From: kondrak To: TSCM-L@yahoogroups.com Sent: Thursday, June 17, 2004 3:54 PM Subject: [TSCM-L] Beijing wages cyberwar against DPP headquarters A sign of things to come?: >http://www.taipeitimes.com/News/front/archives/2004/06/16/2003175231 > >By Ko Shu-ling >STAFF REPORTER >June 16, 2004 > >An army of hackers based in China has broken into Democratic >Progressive Party (DPP) databases, stealing classified information >such as President Chen Shui-bian's (≥اٴÛ) personal itinerary, >according to a Cabinet official who asked not to be named. > >"This is the first time we have found that the DPP headquarters' >computer systems were breached by Chinese hackers," the official said. >"The incident has sent jitters through the Ministry of National >Defense, which deems a systematic information attack launched by China >as military warfare." > >Information stolen from party headquarters included the personal >itineraries of Chen, who doubles as DPP chairman, and those of other >high-ranking party officials such as DPP Secretary-General Chang >Chun-hsiung (±i´T∂Ø). > >Also leaked was classified information on visits to the US by >high-ranking DPP officials ahead of the US presidential election. > >According to the Cabinet official, the DPP headquarters was an easy >target and the attackers were aware it would be more difficult to >break into computer systems belonging to the Presidential Office or >the defense ministry, where security is tighter. > >The attacks were noted a few days ago and the situation has been >monitored 24 hours a day since. > >This is not the first time that China has conducted information >warfare against Taiwan. Last September, the Cabinet discovered that >hackers in Hubei and Fujian provinces had spread 23 different Trojan >horse programs to the networks of 10 private high-tech companies in >Taiwan and used them as a springboard to break into at least 30 >different government agencies and 50 private companies. > >The Trojan-horse programs were used against the National Police >Administration, the defense ministry, the Central Election Commission >and the central bank. > >Since it appeared no government information had been stolen, the >Cabinet suspected that the program was likely aimed at paralyzing the >nation's computer systems, stealing sensitive government information >or preparing computers for future information warfare. > >Trojan-horses are one of the most serious threats to computer >security. A computer user may not only have been attacked but may also >be attacking others unknowingly. From: ISN C4I.org - Computer Security, & Intelligence - http://www.c4i.org ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 8932 From: Steve Uhrig Date: Thu Jun 17, 2004 10:24pm Subject: Re: Looking for a carbon capacitor Once upon a midnight dreary, James M. Atkinson pondered, weak and weary: > I need a eighteen to twenty each 28+ volt, 100 Farad, very low ESR, carbon > capacitors, The maximum voltage so far on large (farad size) super caps is 3 point something volts. That's the max. Far more affordable are 2 volts at a few farads. Figure about $5 each in reasonable quality. So you'd need at least fifteen in series to get the voltage you need, then 20 parallel strings of fifteen caps in series to get the capacity you desire. So you're talking 300 caps +/- mental arithmetic, at about $5 each, or $1500. And that's for one. So for twenty, figure $30,000. Carbon capacitors? The only stock you'll find is from manufacturers. A year ago these caps didn't exist. Now they're being treated more as batteries than supercapacitors. They're still not in widespread production yet. Even getting some for engineering samples takes some effort. For your shunt, use a 3/4" piece of rebar of the proper length and something like saddle clamps from Polyphaser or Cadweld to connect to it. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8933 From: frost_bitten_ca Date: Thu Jun 17, 2004 10:41pm Subject: Re: Looking for a carbon capacitor --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > I need a eighteen to twenty each 28+ volt, 100 Farad, very low ESR, carbon > capacitors, and would appreciate hearing from any list member who might > have these in stock. > > I also seeking high current shunts of at least 1500 amps at 28 volts, with > a 50mV output, and would be happy with shunts rated at 2000 Amps. > > -jma > > > > > -------------------------------------------------------------------- --------------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > -------------------------------------------------------------------- --------------------------------- > > James M. Atkinson Phone: (978) 546- 3803 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------- --------------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------- --------------------------------- shunts that I have seen used in the 2000 amp range are generally made of this solid copper plates :) 8934 From: David Alexander Date: Thu Jun 17, 2004 0:07pm Subject: Re: New poll for TSCM-L Steve Very well said. I support you wholeheartedly. I did point out, offline to JMA, that activity and postings such as the ones seen recently on this list would, if done in Europe before a trial: a) Get you prosecuted for doing so b) Probably result in the trial being abandoned on the grounds that he couldn't now get a fair trial The response was not encouraging. I have no problems with postings after a conviction or acquittal that discuss elements, but the way this was reported here reminded me of a downmarket tabloid journalism that leaves a bad taste in my mouth. I appreciate that everyone is entitled to their opinion, and I would defend unto the death the right to free speech, but I believe that the use of that right should be tempered with common sense, not used simply 'because I have the right'. I would also say that, in my opinion and I think that of many others on this list, this thread about Mr Wilson, guilty or not, has a significant risk of bringing the list into disrepute. I don't know if others feel the same, I would value everyones' comments. If I'm in a minority I will accept that with good grace and wind my neck in (wouldn't be the first time). I suggest another TSCM poll: I think that this thread was unnecessary and should not have been posted to the list Yes No I'm not asking anyone to admit being in the wrong, or of showing bad judgement or to apologise. I do think we need to define an acceptable code of conduct for taking this group forwards - and postings such as this should not be acceptable. My 2c. Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: 17 June 2004 06:37 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: New poll for TSCM-L Once upon a midnight dreary, TSCM-L@yahoogroups.com pondered, weak and weary: > Enter your vote today! A new poll has been created for the > TSCM-L group: > Do you think that Steve Wilson > (TSCM'er in TN and VA) is actually > guilty of the criminal acts the > government has accussed him of? > o Yes, I think he is guilty > o No, I think he is innocent --------------------- This is an immature poll. Whomever submitted it has little understanding of the American jurisprudence system and merely is a troublemaker. Whatever PROPOGANDA (which means EDUCATION frequently intended to mislead) you may have read was selectively processed to lead you to believe Mr. Wilson is a slimebag. I am not defending any actions of Mr. Wilson although I have known him for 20 years and do not agree with his business principles and practices, but in THIS country, he IS ASSUMED TO BE INNOCENT UNTIL **PROVEN** GUILTY. To my mind, HE IS INNOCENT. He has NOT been proven guilty. He may not be. It's not our place to gossip. And that's what all this discussion of him has been. GOSSIP. Scripture prohibits us from engaging in idle talk. It also prohibits us from participating in gossiping and rumermongering. GOD SAYS this is forbidden. Don't argue with me. Take it up with Him if you disagree, and you ultimately will find out YOU are wrong. I do not agree with Mr. Wilson's business practices, but I darn well will defend his right to a fair trial and an adequate defense in the appropriate forum, which is not here on this list. If people choose to play little snipe games to subvert our justice system, do it somewhere else. A good number of us took oaths to uphold and defend the U.S. Constitution against all enemies, foreign and domestic. In this case, we have domestic enemies in addition to violating rules laid down by God, who incidentally guided the men who wrote the Constitution and Bill of Rights. Trial by media can kill any credible defense. Innocent or guilty, Mr. Wilson has the absolute right to a competent defense and deserves a fair trial. Children gossiping with polls such as this are demonstrating their personal ethics are directly incompatible with the principles guiding the professional TSCM profession. If you feel you must do this, please be responsible and resign from this list and go to Usenet or somewhere. And anyone posting a poll should have the gonads to do it under their real name, not anonymously. It is irresponsible of the moderator to allow ANYONE to post crap like this much less dignify it by casting a vote, especially anonymously. A significant portion of this list, including me, is on the very edge of unsubscribing due to all the horsecrap posted re Mr. Wilson lately. There are very few, if any, in this business who do not have skeletons in the closet and who would withstand an intensive government investigation. 'There but for the grace of God go I.' Keep your own nose clean, and 'let he who is without sin cast the first stone.' Observe that and not one single person on this entire list would be justified in picking up a stone. BTW, the above words were COMMANDED by the Lord Jesus Christ, the Son of God, not a fat little bald headed gray bearded cripple in Maryland who admittedly frequently has an attitude. Stop the crap and stick with the mission of this list, which is not blatant slander of others. I'm as guilty as anyone when a charlatan pops up and tries to snow us and I put him in his place, but in this case any discussion of Mr. Wilson is PURE GOSSIP and completely imappropriate for this list. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ****************************************************************** David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 8935 From: A Grudko Date: Fri Jun 18, 2004 11:58am Subject: Cop's boot bug http://www.iol.co.za/index.php?set_id=1&click_id=13&art_id=vn200406180354356 49C976365 [A Grudko] Bugged boot drama in court case Estelle Ellis June 18 2004 at 03:54AM A rather well-worn velskoen (a soft leather shoe - AG) is at the centre of a bizarre murder-for-hire plot raging behind the scenes in the trial of Andrew Phillips (an 'associate' of many years) , owner of The Ranch. Alleged brothel owner Phillips claims that the senior Scorpions investigator in his case, George Hardaker, tried to entrap him into hiring a man - wearing bugged velskoens - to murder witnesses in his Johannesburg regional court trial. He demanded that Hardaker withdraw from the investigation by Thursday afternoon or face "imminent" legal action. The National Prosecuting Authority does not want to comment officially on Phillips's claims, but sources suggested that it is, in fact, Phillips who might be trying to frame Hardaker, a man reputed to be one of the Scorpions' "straightest" officers. 'We will determine who is framing who' What is certain is that there is no love lost between Phillips and Hardaker. Hardaker, in his capacity as investigator, was previously ordered to pay damages to Phillips after the Johannesburg High Court found that he had defamed Phillips by claiming that there were drugs, child prostitution and trafficking in women at The Ranch. "We will determine who is framing who," was Phillips's riposte on Thursdaynight. "We were wondering what they would do. They could either admit it, or do something else." In documentation in possession of The Star, Phillips claims that Hardaker sent an agent, wearing bugged shoes, to his house on June 6. The agent was allegedly supposed to entice Phillips into ordering a hit on state witnesses in his trial. Phillips got wind of the alleged scheme, however, and managed to lay his hands on the shoes, which he has been bringing to his trial over the past few days. On Thursday morning, the shoe allegedly containing the bug stood conspicuously on the defence counsel's table. "What is the shoe for?" curious regional magistrate Stef Bezuidenhout asked. "It is likely to be an exhibit," advocate Mike Hellens SC, for Phillips, grinned mysteriously. Phillips has been charged with keeping two brothels - The Ranch and the Titty Twister - from 1995 to December 2000; procuring or attempting to procure women to become common prostitutes; facilitating sex for sale at The Ranch and the Titty Twister; living off the proceeds of prostitution; and employing foreigners in contravention of the Aliens Control Act. He has pleaded not guilty to all the charges against him, and is free on bail of R10 000. Previously, the prosecution attempted to have the evidence of women associated with The Ranch heard in camera, but no evidence of threats against their lives has been produced in court. This application was eventually abandoned, but state advocate Joe Davidowitz SC said this week that the prosecution was considering reinstating it. The trial has seen a lot of legal wrangling this week, but without the evidence of a single witness being led. The trial continues on Thursday. a.. This article was originally published on page 1 of The Star on June 18, 2004 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.707 / Virus Database: 463 - Release Date: 2004/06/15 [Non-text portions of this message have been removed] 8936 From: James M. Atkinson Date: Fri Jun 18, 2004 10:46am Subject: On Her Majesty's Secret Service - Uncensored http://cryptome.org/mi6-sd36.htm 15 June 2004. Republished by request. 1 April 2001. Anonymous has restored information censored by the British Government from Chapter 36 of MI6: Inside the Covert World of Her Majesty's Secret Intelligence Service, by Stephen Dorril. It is published here to provide public information on MI6 which Mr. Dorril could not, and has been done so without his knowledge or permission. -------------------------------------------------------------------------------- ON HER MAJESTY'S SECRET SERVICE - UNCENSORED This is the original text with missing words provided and hyperlinked to footnotes and highlighted in red. Agent D/813317 Richard Tomlinson joined MI6 in 1991. Born in New Zealand, he read aeronautical engineering at Cambridge and was a Kennedy memorial scholar at the Massachusetts Institute of Technology. Fluent in French, German and Spanish, Tomlinson was approached at university where he gained a first. A lecturer had asked him if he wanted to do 'something stimulating' in the foreign service. Despite modern recruiting methods, the trusted old-boy network is still a favoured option at Oxbridge, and a number of other key universities, such as Durham and Exeter, still have a contact group of lecturers on the lookout for 'firsts' as suitable recruits. Historian Andrew Roberts has written about his own experience of being approached in 1987 to join the 'FCO Co-ordinating Staff', as MI6 is known (also "The Executive Branch"): the 'chat with a Cambridge contact', tea at the John Nash-designed Carlton House which overlooks St James's Park, 'a discreet lunch a fortnight later and then a delightfully absurd mini-exam, in which one of the questions was "Put the following in order of social precedence: earl, duke, viscount, baron, marquis" '. At Century House, Roberts recognised 'several of the young Miss Moneypennys from the secretarial schools' parties at university'. The questions continued in a farcical vein: 'If I had been a communist, a fascist or a homosexual . . . Where do Britain's best long-term interests lie? Washington, Brussels or Moscow?' During the medical examination, he was told that 'with Oxford it's the drugs thing, with Cambridge it's the boys'. Attitudes have changed, and by 1997 MI6 was prepared to post a 'gay couple' - 'counsellor' and chief of station Christopher Hurran and his long-time Venezuelan lover - to the British embassy in Czechoslovakia. A few years earlier, the Service had recruited a member of CND. Finally, Roberts went through the process of positive vetting (known since 1990 as EPV). It is generally conducted by a semi-retired officer with a false name, who interviews referees and other contacts, and undertakes checks on credit-worthiness. Suitable candidates are put through the fast-stream Civil Service Selection Board. Roberts, however, decided not to join, and Tomlinson did so only after spending a number of years travelling and working in the City, during which time he had also signed up for the SAS territorial regiment. Over the last decade the Service has recruited a number of personnel from the special forces, though their gung-ho philosophy seems at odds with the image that M16 has projected of the modern spy. Tomlinson eventually joined MI6 for old-fashioned 'patriotic reasons' and sat the standard Foreign Of fice entry examination before being accepted on to the intelligence service training course. New recruits are introduced to the traditional 'tradecraft' of the world of spying and gain a broad range of knowledge from recruiting and running agents to developing agents of influence and organising and servicing 'dead letter' drops. Because of the smaller numbers, MI6 officers indulge in less specialisation than their American counterparts, though the techniques are essentially little different from those used at the beginning of the century. The infamous Dreyfus affair began when a cleaning woman, Marie Bastian, working in the German embassy but employed by the French secret service, handed over to her French controller the contents of the wastepaper baskets she emptied. MI6 recruiters still look out for 'the life-and-soul-of-the-party types who could persuade the Turkish ambassador's secretary to go through her boss's wastepaper basket'. These days, however, the spy is armed with a hand-held digital scanner which can hold the filched material in its memory and can also be used in emergencies to transmit the stolen secrets by burst transmissions via a satellite. Such gadgets are developed for the Directorate of Special Support responsible for providing technical assistance to operations - staffed by MoD locksmiths, video and audio technicians and scientists in sections devoted to chemicals and electronics, forensic services, electronic support measures, electronic surveillance and explosive systems. While the gadgets continue to provide the modern spy with a James Bond-like image - for instance, identification transmitters that can be hidden in an agent's shoes to enable the monitoring by satellite of their precise location - the reality is that most of the work is mundane and office-bound. Trainees still receive small-arms training at Fort Monkton, but much of the training is taken up with learning to use the computer system and writing reports in the house style. As part of the Service's obsession with security, a great deal of time is spent on being indoctrinated in cipher and communications work. Trainee officers are instructed on how to encrypt messages for transmission and how to use the manual BOOK cipher which is regarded as particularly secure. Used at stations abroad to transmit details of operations, potential sources and defectors, BOOK is sent either via the diplomatic bag or by special SIS courier. Diplomatic bags are not totally secure as the success of the Service's own N-Section testified. It employed up to thirty people in Palmer Street rifling the opened bags which were then expertly resealed. The work petered out in the mid-sixties as other means of communication took over. ____________________ t Some code words in this chapter have had to be disguised on legal advice. Officers learn about 'off-line' systems for the encryption of messages such as NOREEN - used prior to transmission by cipher machines - and 'on-line' systems for the protection of telegrams during transmission, code-named HORA and TRUNCHEON. They are indoctrinated into the use of certain cryptonyms for forwarding telegrams to particular organisations and offices such as SIS headquarters, which is designated ACTOR. They also learn about code words with which sensitive messages are headlined, indicating to whom they may be shown. UK EYES ALFA warns that the contents are not to be shown to any foreigners and are intended only for the home intelligence and security services, armed forces and Whitehall recipients. UK EYES BRAVO includes the above categories, the Northern Ireland Office, LIST X firms engaged in the manufacture of sensitive equipment, and certain US, Australian, New Zealand and Canadian intelligence personnel liaising with the Joint Intelligence Committee (JIC) in London. Additional code words mark specific exclusions and inclusions. ECLIPSE material cannot be shown to the Americans, while LOCSEN deprives local intelligence officials and agencies of its content. Material for named individual officers, sometimes at specified times, is headed DEDIP or DESDEN, while particularly sensitive material about a fellow officer or operation is known as DEYOU. The protection of files and their secure handling is a top priority, with officers taught to keep a classified record of their use and location. Photocopiers have the ability to mark and check the origin of non-authorised copies of classified material. Following the development by MoD scientists of a means of reading a computer disk without a computer, all disks are protected in transit. All correspondence by letter is secured by specially developed red security tape which leaves detectable signs if tampered with, though - near-undetectable photographic and laser techniques exist to read the inside of mail and to open envelopes. Each officer has his own safe with dual-combination locking, while the filing cabinets with false tumbler locks, as an added precaution, are protected from penetration by X-rays. Since no lock is secure from picking, they collapse internally if anything more than the slightest force is used. In the event of drilling, a glass plate inside the door shatters, releasing a spring-loaded bolt to prevent opening. Frequent random checks take place on the number settmgs to see if the safe has been opened illegally. These bureaucratic procedures and attention to minute security rules are not merely technical; failure to carry out security precautions can lead to points deduction in the security breach points system. If an officer racks up 160 points over three years (breach of Top Secret counts as 80 points), this may lead to security clearance being withdrawn and instant dismissal. New officers will initially be based at the exotic Vauxhall Bridge headquarters, about which many Service personnel are sensitive, almost embarrassed. Access to 'Ceausescu Towers', as some officers have dubbed it, is gained by use of a swipe card and PlN number. The interior comprises a hive of bare, unmarked air-conditioned corridors. The only visible signs of occupancy are the acronyms on the doors, with nothing on the walls except floor plans and exit signs. As with major stations abroad, such as Moscow and Beijing, Vauxhall Cross is classified as a Category A post, with a high potential physical threat from terrorism (HPT) and sophisticated hostile intelligence services (HIS). Operatives from the TECHNICAL SECURITY DEPARTMENT (TSD) based at Hanslope Park, Milton Keynes, and from MI6's own technical department ensure that the building is protected from high-tech attack (HTA). There is triple glazing installed on all windows as a safeguard against laser and radio frequency (RF) flooding techniques, and the mainframe computer, cipher and communications areas are housed in secure, modularshielded rooms. A secure command-and-control room runs major operations such as those in Bosnia, where 'war criminals' were tracked and arrested by SAS personnel. Off the corridors are open-plan offices which give the impression of informality, though security overrides such considerations. A new officer will find that since l996 more women than men have been recruited to the Service, but males remain predominant, particularly in senior positions. As in many modern offices, officers will be seen working at computers, processing information, collating files, planning operations, liaising with foreign intelligence agencies and networks, and, most importantly, supporting the three to five hundred officers in the field, though only half that number will be stationed abroad at any one time. MI6 has been at the forefront of updating its information technology and, in 1995, installed at a cost of £200 million an ambitious desktop network known as the Automatic Telegram Handling System (ATHS /OATS), which provides access to all reports and databases. Staff are officially not allowed to discuss their work with colleagues, not even when they relax in the staff bar with its spectacular views over the River Thames, though, as Richard Tomlinson discovered, gossip is in fact rife. All officers will spend time in the field attached to embassies, though they will have little choice as to the location. Turning down a post will jeopardise future promotions and can lead to dismissal. Stations abroad are classed from the high-risk Category A, such as Yugoslavia and Algeria, to the lesser B, such as Washington and New York, C, the European countries, and D, often the Commonwealth, where there is little or no threat. New officers might find themselves among the additional personnel sent to Malaysia, Thailand and South Korea, following the Service's boost to its presence in South-East Asia, or involved in operations into China following the transfer of Hong Kong and the winding up of its espionage operations in the former colony. In a large station such as Washington, operating under 'light' diplomatic cover will be a head of station (often a Counsellor), a deputy and two or three officers (First and Second Secretaries). There will also be back-up staff consisting of three or four secretaries, a registry clerk to handle files and documents, and communications and cipher officers. Easily identified by the trained eye in the Foreign and Commonwealth Office 'Diplomatic List' - the number of Counsellor and First Secretary posts is limited and there tend to be too many for the positions available - an MI6 officer's presence will be known to the host intelligence and security agency. In some cases, a senior officer will make his presence known to draw attention away from his colleagues. Before postings and missions abroad, officers receive a briefing from the Information Operations (I/OPs) unit, which provides them with a list of sympathetic journalists who can be trusted to give them help and information. These contacts have become increasingly important in trouble spots such as the Balkans. I/OPs also has a more covert role in planning psychological operations along the lines of the old Special Political Action (SPA) section and the Information Research Department (IRD). I/OPs may also, according to a former MI6 officer, 'attempt to influence events in another country or organisation in a direction favourable to Britain'. One example is MI6's determined effort to 'plant stories in the American press about Boutros Ghali, whom they regarded as dangerously Francophile, in the run up to the 1992 elections for UN secretary-general'. Foreign operations of this sort do not require ministerial sanction.1 I/OPs also expends considerable energy behind the scenes in 'surfacing' damaging stories designed to discredit critics of the Service. They will use off-the-record briefings of sympathetic journalists; the planting of rumours and disinformation, which through 'double-sourcing' are confirmed by a proactive agent; and the overt recruitment of journalist agents. Journalists paid to provide information or to 'keep their eyes open' are known as an 'asset' or an 'assistant' or just 'on side'. According to Richard Tomlinson, paid agents included in the nineties one and perhaps two national newspaper editors. An editor is unlikely to be directly recruited as the Service would require the permission of the Foreign Secretary and would not like to be put in the position of being refused. Such high-fliers are more likely to have been recruited early in their careers. In this case, the journalist was apparently recruited at least three years before becommg an editor and remained an asset until at least 1998. Tomlinson has said that the editor was paid a retainer of £100,000, with access to the money via an offshore bank in an accessible tax haven. The editor was given a false passport to gain entry to the bank, which he regularly visited.2 In trying to identify the editor 'agent', media interest centred on Dominic Lawson, son of the former Tory Chancellor of the Exchequer, who became editor of the Spectator in 1990 and had been editor of the Sunday Telegraph since 1995. Lawson denied that he had ever been 'an agent, either paid or unpaid, of Ml6 or of any other government agency'. On the other hand, the youngest brother of Lawson's second wife, Rosa Monckton, had joined MI6 in 1987. In 1996, Anthony Monckton was appointed First Secretary (Political) in the Croatian capital Zagreb. Quite separately, one of Rosa's closest friends and a godparent to the Lawsons' daughter, the late Princess of Wales had clearly been under some kind of surveillance, as evidenced by the 1,050-page dossier held by the US National Security Agency (NSA) in its archive, detailing private telephone conversations between Diana and American friends intercepted at MI6's request. While all stories linking MI6 to the Princess's death in the car accident in France have been complete nonsense, it has been alleged that working closely with I/Ops in an attempt to deflect enquiries away from the security services had been a chief of staff to 'C', Richard Spearman, temporarily posted to the Paris embassy with his assistant, Nicholas Langman.3 Operational officers can be casually spotted by the 'PENTEL' roller-ball pens in their top pocket (it was discovered by accident that they have the ability to create invisible ink), the Psion organiser and the specially adapted 'Walkman' (PETTLE) they carry to record conversations for up to ten minutes on the middle band of an ordinary commercial music cassette tape. They also use laptop computers for writing reports. If that seems like a recipe for disaster, the secret hard disk contains a protected back-up. The station is usually sited in a part of the embassy regularly swept by technical staff for bugs and other electronic attack. It is entered using special door codes with an inner strongroom-type door for greater security. Following all the procedures learned during training, officers handling material up to the 'Secret' level work on secure overseas Unix terminals (SCOUT) and use a messaging system known as ARRAMIS. Conversations by secure telephone masked by white noise are undertaken via a special SIS version of the BRAHMS system. A special chip developed by GCHQ apparently makes it impossible even for the US NSA to decipher such conversations. Secure Speech System (HOUSEMAN) handset units are used by SIS officers within a telephone speech enclosure. The most important room is electronically shielded and lined with up to a foot of lead for secure cipher and communications transmissions. From the comms room, an officer can send and receive secure faxes up to SECRET level via the CRYPTEK fax system and S***** (encrypted communications with the Ministry of Defence (MoD), Cabinet Office, MI5 (codename SNUFFBOX), GCHQ and 22 SAS. An encrypted electronic messaging system working through fibre optics, known as the UK Intelligence Messaging Network, was installed in early 1997 and enables MI6 to flash intelligence scoops to special terminals in the MoD, the Foreign Office and the Department of Trade and Industry. Manned twenty-four hours a day, 365 days a year, and secured behind a heavy thick door, the cipher machines have secure 'integral protection', known as TEMPEST. MI6 officers abroad also work alongside GCHQ personnel, monitoring foreign missions and organisations. Officers in the field may include not only those officially classed as diplomats but also others operating under 'deep' cover. Increasingly MI6 officers abroad act as 'illegals'. It is known that Service officers are sometimes employed during the day in conventional jobs such as accountancy, and provided with false identities. British banks - the Royal Bank of Scotland is particularly helpful, and to a lesser extent the Midland - help supply credit cards to officers working under cover. At the end of each month, officers have to pay off their aliases' credit cards. Banks also help transmit money overseas for covert operations. During the Cold War, banks in the Channel Islands and other offshore locations acted as a conduit for secret funding.4 Recruiting or running agents and gathering intelligence are the prime objectives of these deep-cover operatives, and their real work, some claim, starts at six in the evening when the conventional diplomats begin their round of cocktail parties. Such social events can be very useful for gathering intelligence and spreading disinformation. Baroness Park recalled that one of MI6's more successful ploys was 'to set people very discreetly against one another. They destroy each other. You don't destroy them.' Officers would offer the odd hint that it was 'a pity that so-and-so is so indiscreet. Not much more.' Officers will also deal with paid 'support agents' - those who supply MI6 with facilities including safe houses and bank accounts, as well as intelligence. There are also 'long insiders' - agents of influence with access to MI6 assessments and sanitised intelligence. The Service's deep-cover agents have burst transmitters with the ability to transmit a flash signal to MI6 via a satellite when they are in danger.5 (SIS suceeeded in placing a former SIS officer to work closely at a high level on the delicate negotiations of the London/Frankfurt exchange merger. An ex-Cambridge and fluent Asian language specialist, she graduated IONEC with one of the highest scores outlasting all her male colleagues during the hostage endurance course.) Officers abroad may also be asked to aid more sophisticated operations designed to build up the Service's psychological profiles of political leaders. A special department within MI6 has tried in the past to procure the urine and excrement of foreign leaders. A specially modified condom was used to catch the urine of Romanian leader Nicolae Ceausescu, while the 'product' of Presidents Fidel Castro and Leonid Brezhnev was 'analysed' by medical specialists for signs of their true health. Tomlinson's duties included recruiting agents to inform on foreign politicians. His most important task was to infiltrate in 1992 a Middle Eastern weapons procurement programme network - the BMP3 - with the object of locating and disabling a chemical weapons facility. Authorised by an unnamed senior Cabinet minister, the sabotage plan - onc account suggests the planting of a bomb - aimed to intercept a shipment of machinery and interfere with its extractor fan equipment, despite warnings of the possible risk to the lives of dozens of civilian workers at the plant. In November 1992 using the name 'Andrew Huntley' and the pretext of assisting at a conference run by the Financial Times, Tomlinson went under cover to Moscow. His very sensitive mission was to obtain Russian military secrets on ballistic missiles and effect the defection of a Russian colonel who specialised in this area. Although, strangely, he was not given the usual 'immersion' language training in Serbo-Croat, Tomlinson soon found himself in the former Yugoslavia, whose break-up had taken the Service by surprise.6 When the country fractured in January 1991 into Croatia, Bosnia and Serbia, EU recognition of independent Croatia proved to be a critical and disastrous policy, eventually paving the way for Serb aggression which the Foreign Office interpreted as civil war. MI6 had been running a few federal sources in the old Yugoslavia, but they provided little worthwhile intelligence. The Service lacked appropriate linguists and had to start more or less from scratch. The JIC established a Current Intelligence Group (CIG) on the Balkans, and within eighteen months MI6's Controllerate dealing with the area had recruited a number of sources at a high level from among the ethnic military and political protagonists. During 1993, as a 'targeting officer' within the Balkans Controllerate, whose job was to identify potential informants, Tomlinson spent a harrowing and dangerous six months travelling as a journalist to Belgrade, Skopje, Zagreb and Ljubljana, in the process recruiting a Serb journalist - journalists of every nationality were a particular MI6 target in the Balkans, as they proved to be more productive than most other sources - and a leader of the Albanian opposition in Macedonia. In 1993, UN blue-helmeted troops started patrolling the borders of the Former Yugoslav Republic of Macedonia. According to sources, MI6 used air-drops in an operation to set up arms dumps on the border of Macedonia as part of a stay-behind network.7 Another operation included running as an agent a Tory MP, who gave information about foreign donations to the Conservative Party. Parliamentary Private Secretary to the Northern Ireland minister, Harold Elleston was an old Etonian who studied Russian at Exeter University and subsequently became a trade consultant specialising in the former eastern bloc countries, during which time he was recruited by MI6. He worked for them in eastern Europe, the former Soviet Union and during the conflict in former Yugoslavia. After visiting former Yugoslavia in 1992, Elleston, who was employed by a lobbying firm with Conservative candidate John Kennedy (aka Gvozdenovic), notified his Ml6 handlers that donations were reaching the Conservative Party from Serbia. Despite Harold Wilson's ruling in the sixties that the intelligence services would not use MPs as agents, the Service received special sanction from Prime Minister John Major to continue Elleston's secret role. Sir Colin McColl warned Major that the party was possibly accepting tainted money via Kennedy, a key figure in arranging payments from the Serb regime.8 MI6 was itself seen as being pro-Serb in its reporting. In 1994, two articles arguing against western policy in the Balkans conflict appeared in the Spectator (the right-wing magazine unknowingly served as 'cover' for three MI6 officers working in Bosnia, Belgrade and Moldova), written under a Sarajevo dateline by a 'Kenneth Roberts', who had apparently worked for more than a year with the United Nations in Bosnia as an 'adviser'. Written by MI6 officer Keith Robert Craig, who was attached to the MoD's Balkan Secretariat, the first on 5 February rehearsed arguments for a UN withdrawal from the area, pointing out that all sides committed atrocities. The second, on 5 March, complained baselessly about 'warped' and inaccurate reports by, in particular, the BBC's Kate Adie of an atrocity against the Bosnian Serbs. Guardian correspondent Ed Vulliamy recalled being invited to a briefing by MI6 which was 'peddling an ill-disguised agenda: the Foreign Office's determination that there be no intervention against Serbia's genocidal pogrom'. Without the slightest evidence, the carnage that took place in Sarajevo's marketplace was described as the work of the Muslim-led government, which was alleged to be 'massacring its own people to win sympathy and ultimately help from outside'. As Vulliamy knew, Sarajevo's defenders were 'dumb with disbelief'. Despite UN Protection Force reports which found that it was Serb mortars which were killing Muslims, the MI6 scheme 'worked - beautifully', as the allegations found their way into the world's press. Vulliamy noted that 'it was quickly relished by the only man who stood to gain from this - the Serbian leader Radovan Karadzic'.9 Perhaps it was only an intelligence/Foreign Office faction which was pro-Serb. From March 1992 until September 1993, Tomlinson worked in the East European Controllerate under the staff designation UKA/7. He has claimed that in the summer of 1992 he discovered an internal document that detailed plans to assassinate President Slobodan Milosevic. During a conversation, an ambitious and serious colleague who was responsible for developing and targeting operations in the Balkans (P4 / OPS), Nick Fishwick, had pulled out a file and handed it to Tomlinson to read. 'It was approximately two pages long, and had a yellow card attached to it which signified that it was an accountable document rather than a draft proposal.' It was entitled 'The need to assassinate President Milosevic of Serbia' and was distributed to senior MI6 officers, including the head of Balkan operations (P4), Maurice Kenwrick-Piercy, the Controller of East European Operations (C/CEE), Richard Fletcher, and later Andrew Fulton, the Security Officer responsible for eastern European operations (SBO1/T), John Ridd, the private secretary to the Chief (H/SECT), Alan Petty ('Alan Judd'), and the Service's SAS liaison officer (MODA/SO), Maj. Glynne Evans. According to Tomlinson, Fishwick justified assassinating Milosevic on the grounds that there was evidence that the 'Butcher of Belgrade' was supplying weapons to Karadzic, who was wanted for war crimes, including genocide. US and French intelligence agencies were alleged to be already contemplating assassinating Karadzic. There were three possible scenarios put forward by MI6. Firstly, to train a Serbian paramilitary opposition group to carry out the assassination. This, Fishwick argued, had the advantage of deniability but the disadvantage that control of the operation would be low and the chances of success unpredictable. Secondly, to use the small INCREMENT cell of SAS/SBS personnel, which is especially selected and trained to carry out operations exclusively for MI6/MI5, to send in a team that would assassinate the President with a bomb or by a sniper ambush. Fishwick said that this would be the most reliable option, but would be undeniable if the operation went wrong. Thirdly, to kill Milosevic in a road crash which would be staged during one of his visits to the international conferences on former Yugoslavia in Geneva. Fishwick suggested that a stun device could be used to dazzle the driver of Milosevic's car as it passed through one of Geneva's motorway tunnels.10 A year later, Tomlinson acted as a counsellor to the commander of the British forces in Bosnia and worked at manipulating the sources in the entourage of Karadzic. One participant to these operations suggests that these sources 'produced a very detailed intelligence picture which included not just the military plans and capabilities of the different factions but also early warning of political intentions'. There appears to have been little evidence of this intelligence coup in the Foreign Office decisions that followed, and its value is contradicted by another source which, while admitting that several significant agents were recruited, concludes that they did not 'produce substantial intelligence of quality'.11 The intelligence deficit was worsened by the United States' unwillingness to provide its Atlantic partner with all its intelligence on the Serbs. General Sir Michael Rose, a former head of the SAS and commander-in-chief of the UN Protection Force, realised that during 1994 all his communications were being electronically intercepted and his headquarters in Sarajevo was 'bugged' by the Americans because Washington, which wanted to use Nato air strikes to bomb the Serbs to the negotiating table, thought the British were too supportive of the Bosnian Serbs. The Americans also monitored the communications of SAS scouts deep in Bosnian territory and discovered that they were deliberately failing to identify Serb artillery positions. This lack of trust caused friction and led to a backstage confrontation between the secret services, and reminded some observers that the special relationship existed only on the basis that the US saw Britain as a cnance to extend its reach into Europe.12 The plans for Milosevic were not the only assassination plot in which MI6 became entangled. Renegade MI5 officer David Shayler, who was released by a French court in November 1998 on 'political grounds' following his detention in prison as part of extradition proceedings to England, first heard of a plot to kill the Libyan leader, Colonel Gaddafi, in November 1995. Shayler had been posted to MI5's counter-terrorist G9A section with responsibilities for issues relating to Lockerbie and Libya. A higher executive officer, earning £28,000 per year, Shayler headed up the Libyan desk for over two years and was held in high esteem, undertaking presentations to senior civil servants on all matters relating to Libya. For this work he received a performance-related bonus. An MI6 officer, referred to as PT16B, with whom Shayler had developed a close working relationship, informed him during a liaison meeting on Libya that the Service was running an important Arab agent. A former Libyan government official code-named 'Tunworth', the agent was a go-between with Libyan opposition groups, including a little-known band of extremists called Al Jamaa Al Islamiya Al Muqatila (Islamic Fighting Force). Tunworth had apparently approached MI6 in late 1995, outlining plans to overthrow Gaddafi by the Islamic Fighting Force, and later met with an MI6 officer in a Mediterranean country where he asked for funding. Shayler was told that more than £100,000 had been handed over in three or four instalments beginning in December. PT16B and his colleagues wrote a three- to four-page CX report for Whitehall circulation to other agencies, which stated that MI6 was merely in receipt of intelligence from agent Tunworth on the militants' coup plotting and the group's efforts to obtain weapons and Jeeps. It seems that no mention was made of any MI6 involvement in an assassination attempt.13 [Cryptome note, see: http://cryptome.org/qadahfi-plot.htm ] Shayler later heard that there had been a bomb attack on Gaddafi's motorcade near a town called Sirte, but the device was detonated under the wrong car. In fact, it seems that the dissidents launched an attack with Kalashnikovs and rocket grenades on the wrong car. In a communique to Arab newspapers on 6 March 1996, the Islamic Fighting Force stated that its men had tried to attack Gaddafi as he attended the Libyan General People's Congress. The attempt went wrong when Gaddafi did not show up in person, and the terrorists were forced to cancel the attack. 'But as our heroes were withdrawing they collided with the security forces and in the ensuing battle there were casualties on both sides.' Three fighters were killed but the leader of the hit team, Abd al-Muhaymeen, a veteran of the Afghan resistance who was possibly trained by MI6 or the CIA, 'escaped unhurt'. Following a crackdown by Gaddafi's secret police, his family home in the town of Ejdabiya was burnt down. The back of the Fighting Force was broken and its leaders retreated to Afghanistan.14 When Shayler subsequently met PT16B, the MI6 othcer mentioned the attack with 'a kind of note of triumph, saying, yes, we'd done it'. Shayler's reaction was 'one of total shock. This was not what I thought I was doing in the intelligence service.' He told BBC's Panorama programme: 'I was absolutely astounded ... Suddenly we were talking about tens of thousands of pounds of taxpayers' money being used to attempt to assassinate a foreign head of state.' He concluded that 'no matter who is funding this, it's still international terrorism. The Brits might say we're the good guys, but it's a very difficult road to go down.' Government officials dismissed Shay]er's claims as 'completely and utterly nutty'. A Foreign Office spokesperson said that it was 'inconceivable that in a non-wartime situation the Government would authorise the SIS to bump off a foreign leader. In theory, SIS can carry out assassinations but only at the express request of the Foreign Secretary.' The 1994 Intelligence Services Act refers to MI6 being able to perform 'other tasks' and protects of ficers from prosecution for criminal acts outside Britain. Indeed, a clause was especially inserted into the 1998 Criminal Justice Bill - which outlaws organisations in Britain conspiring to commit offences abroad - giving all Crown agents immunity from prosecution under the legislation, including possibly the assassination of foreign leaders. It was clear to Shayler, however, and confirmed by BBC sources, that MI6 had not sought ministerial clearance for backing the attempt on Gaddafi. MI6, Shayler believed, was 'operating out of control and illegally'.15 Whatever the truth is surrounding Shayler's accusations, the public and politicians will not discover the full facts. Unlike in the United States, where similar, but less detailed, revelations led to a major Senate enquiry into alleged assassination plotting in the mid-seventies, there will be no House of Commons investigation. As Tomlinson explains, 'there is a deep-rooted belief that, should a policy or operation go wrong, nobody will be held ultimately responsible. The Service will always be able to hide behind the catch-all veil of secrecy provided by the Official Secrets Act or, if the heat really builds up, a Public Interest Immunity Certificate.16 Given his operational experience, as a Grade 5 officer Tomlinson might have expected steady promotion through the ranks and a long career in the secret service, perhaps ending as head of a Controllerate. Senior officers, who are easily spotted in the honours lists with their OBEs, retire at fifty-five. Their attachment to the Service does not end there, however. A number are found appointments as non-executive directors with companies or subsidiaries that have dealt with MI6, or employed as security or corporate liaison officers. 'It is part of their retirement package,' Tomlinson has revealed. 'They are effectively MI6 liaison officers. iust like MI6 liaison officers in Whitehall departments.'17 Since MI6 helped establish Diversified Corporate Services in Rome, New York and London in the late sixties, there has been an increasing trend for setting up consultancies, with the tacit approval or encouragement of the Service. Among the consultants to Ciex, which has 'cornered a lucrative market' in providing a restricted 'confidential service' in 'strategic advice and intelligence' for 'a small group of very substantial customers', are Hamilton McMillan, who retired from the Service's counter-terrorist section in 1996, and former head of the Middle East department Michael Oatley, who previously worked tor another intelligence-linked consultancy, Kroll Associates. Set up in 1995 by the late Sir Fitzroy Maclean, with a board that includes a former Royal Dutch Shell managing director and a former BP deputy chair, the Hakluyt Foundation provides leading British businesses with information that clients 'will not receive by the usual government, media and commercial routes'. Hakluyt's managing director, Christopher James, was until 1998 in charge of MI6's liaison with commerce, while a fellow-director, Mike Reynolds, was regarded as one of the Service's brightest stars.18 Tomlinson's career in the secret world turned out to be short-lived. He returned home from the Balkans exhausted and traumatised by the atrocities he had witnessed, but, fearing that the Service's personnel managers might regard this as a sign of weakness, he did not tell them of his emotional state.* At one point he had been depressed following the death of his girlfriend. Since he had no one to whom to unburden himself - as is standard practice, his parents were unaware of his secret life - his personal problems mounted. Despite the claims of improved personnel management within the Service, Tomlinson received little or no support. It seems that the Service has not put in place any counselling provision as a result of Tomlinson's (and others') experience, but, instead, has decided that officers be vetted by clinical psychologists in order to 'identify actual or potential personality disorders', particularly those being appointed to sensitive posts. Harold Macmillan once said that anyone who spent more than ten years in the secret service must be either weird or mad.19 ____________________ * Recalcitrant officers and agents under suspicion are sometimes interrogated at the 'cooler' facilities in Chelsea and in a special soundproofed 'rubber' room situated beneath a hotel in west London Tomlinson's personnel manager claimed that he was not a team player, lacked judgement and was not committed to the Service because he was prone to going on 'frolics of his own'. In early 1995, Tomlinson turned up for work and discovered that his swipe card would not gain him entry to MI6 headquarters. Security guards informed him that it had been cancelled. His security clearance had been stopped after he complained to his superiors that a number of MI6's operations and tactics were unethical. Tomlinson was also privy to much sensitive information, as gossip was prevalent inside headquarters. For instance, he was aware that a British businessman had threatened to go public with allegations that intelligence officers had destroyed his company. MI6 was said to have mounted a covert operation, including telephone tapping, against the businessman to ensure that he did not contact the press. Tomlinson was formally dismissed from the Service in August 1995. He did not believe that MI6 was properly accountable to the law. This lack of accountability at the top 'cascades downwards to even the lowest levels' and provides 'a fertile breeding ground for corruption'.20 One MI6 officer paid for his divorce by pocketing the expenses of a fictitious agent whose fake intelligence had been taken from the pages of the Economist. Another senior officer sold false passports to Middle Eastern businessmen and possibly drug traffickers, and diverted taxpayers' money intended for defectors and informants - up to £400,000 - into his offshore bank account. 'Agent J' was allowed to retire on a full pension with no police investigation or prosecution because 'he knew where the bodies were buried'. The scandal was uncovered by the US authorities, who were investigating drugs in the Caribbean and came across an offshore bank account opened with a British passport issued in a false name. Senior MI6 of ficers are allowed to open new bank accounts and transfer cash.21 Tomlinson blamed his dismissal on a personality clash with a personnel manager. Other officers, including his immediate superior, protested that the personnel officer's accusations were unsubstantiated. Tomlinson was allowed to appeal to the intelligence services' tribunal, set up in 1994 and chaired by Lord Justice Brown, but, following the rejection of his appeal, he dismissed it as a 'star chamber'. 'I was denied the basic natural justice. I had no legal representation or access to papers which were said to give reasons for my dismissal. I could not cross-examine key witnesses.'* When he then told the head of the Personnel Department that he would pursue his claim for unfair dismissal at an industrial tribunal, he was informed: 'There's no point in doing that because nobody can tell the Chief what to do.'22 ____________________ * In February 1999 Foreign Secretary Robin Cook accepted that M16 staff should 'as much as possible, enjoy the same rights as other employees'. A special investigator with access to all intelligence files would be appointed to look into allegations of malpractice. Home Secretary ack Straw, however, said that the Official Secrets Act would not be amended to allow 'whistleblowing' because the security services were now 'accountable'. MI6 refused to co-operate with the tribunal, which led to Tomlinson's decision to write a book about his experiences. Investigated by Special Branch officers, Tomlinson was subsequently jailed for twelve months on 18 December 1997 under the Official Secrets Act in order 'to deter others from pursuing the course you chose to pursue'. He spent six months in Belmarsh prison, courtesy of Her Majesty, and was released in April 1998.23 Publicity concerning Tomlinson's case led to considerable anxiety in Whitehall and is said to have caused turmoil inside MI6. The Service feared that the publicity would expose poor management and lead to calls for changes and reform. It became the task of the Director of Security and Public Affairs, and effectively C's number two, John Gerson, to 'deal' with Tomlinson. A Far East specialist with close ties with the Americans, Gerson, who is an associate member of the Centre for the Study of Socialist Legal Systems at London University, is the model of the well-versed and evasive civil servant as portrayed in Yes, Minister. His hobby is the classic spy's pastime of birdwatching. Rewarded with a CMG in the 1999 New Year's Honours, Gerson has been ably assisted by the main contact with the press, Iain Mathewson, a former official in the DHSS and Customs and Excise, who joined MI6 in 1980. The Cold War was easy for the intelligence agencies, to the extent that they had clear, identifiable targets. It also provided a curtain behind which they could hide their failures. Without an all-embracing enemy to counter, the Secret Intelligence Service has developed a bits-and-pieces target list, known as the 'Mother Load' agenda, which lacks coherence. This is sometimes explained as being due to the fact that the world has become more unstable. This is nonsense. There is no danger of a world conflagration such as there was during Berlin in 1961, Cuba in 1962, the Middle East in 1967 and 1973, or at other crisis points when nuclear bombers took to the air. Threats from so-called rogue states such as Iran and Iraq are altogether of a different magnitude. Even then, it is apparent that many of the 'scares' - suitcase nuclear bombs, missiles with nuclear and biological warheads, nuclear terrorists, etc. - are either grossly exaggerated or simply manufactured by the intelligence services. It is true that there are significant trouble spots in the world and Britain rightly has to take measures to monitor them, but what this so-called instability has exposed is the inability of agencies designed for the Cold War to tackle the problems of today. In the United States, where a much more open, democratic debate has taken place, the CIA's director from 1977 to 1981, Stansfield Turner, has suggested that the solution is to build a new intelligence service from scratch. Others talk of open-source intelligence agencies that would exploit the explosion of information and do away with the mystique that surrounds secret sources. The most trenchant criticism of the changes that MI6 has undertaken since the end of the Cold War has come from insiders. David Bickford, former lawyer to the security services, argued in November 1997 that the British intelligence community - MI6, MI5, whose Director-General, Stephen Lander, is not regarded as an inspired choice, and GCHQ - 'is not doing its job properly'. He said that the cost was completely unjustified as there was 'triplication of management, triplication of bureaucracy and triplication of turf battles'. SIS appears to be top heavy with management, with resources being shifted away from operations to administration, such as employing lawyers to deal with the new crime agenda, as well as public relations officers, accountants, etc. There would appear, then, to be room for cuts. Officials claim that MI6 currently costs about £140 million. This is hardly a credible figure for an organisation employing two thousand staff. Indeed, sources who were privy to the figures as presented to the Permanent Secretaries' Committee on the Intelligence Services in thc mid-eighties were then quoting £150 million. What few people are aware of is that the budget only covers MI6's operations: everything else is excluded. (Overseas Estate Department) It does not take a specialist to appreciate that a realistic budget would be considerably higher if all the running costs of maintenance, pensions, travel, overseas stations, computers, equipment, communications, and the full building costs of the new headquarters (the National Audit Office report on the £90 million overspend is to remain secret) are taken into account. The Treasury insists that costs which were previously hidden away in the budgets of other departments, such as the MoD, are now included in the Secret Vote figure for MI6. This cannot be true. Staff costs are met by the Foreign Office, while the MoD pays for Fort Monkton and the Hercules transport plane and Puma helicopter that are kept on permanent stand-by for the Service's use. It is unlikely that ministers are aware of the network of 'front' companies that MI6 set up in the early nineties, nor of the numerous bank accounts, such as the one at the Drummonds branch of the Royal Bank of Scotland, which the Service operates. It can now be revealed that the real budget figure - intelligence sources with access to the budget call it MI6's biggest secret - is at least double the official figure. One source with access to the internal accounts puts it as high as five times this figure. Ministers and MPs are being misled. So is the Commons Intelligence Security Committee. The American experience is that it is budgetary control which provides the only means of real leverage and represents a move towards genuine oversight. Intelligence chiefs have argued successfully that a detailed audit of MI6 expenditure would 'prejudice their operational security'. The result is, Tomlinson argues, 'a management and budgetary structure which would provide a theme park for management consultancies'. It is not surprising to learn that MI6 officers have 'little idea how to manage a budget, and even less incentive to manage it well'. Tomlinson discovered many cases of profligate waste. It was common at the end of the financial year for departments to feverishly spend the remaining budget on planning expensive operations - which, in reality, had little chance of success - in order to prevent cuts to the following year's allocation.24 Bickford had his own agenda, believing that British Intelligence was turning 'a blind eye to the fact that economic crime - organised racketeering in narcotics, kidnap extortion, product contamination and fraud - now poses the greatest threat to the security of the international community'. During 1995 the intelligence agencies had apparently tried to persuade the Major government to allow them to develop closer links with large companies so as to provide them with 'protective business intelligence'. The initiative failed because, Bickford claimed, the different agencies bickered between themselves on how to finance and run the new scheme. Tomlinson agrees that there is 'often bitter fighting between the two agencies over who should have primacy over a particular target or operation'. Although arbitrary ground rules are sometimes brokered between warring departments, communication between MI6 and MI5 remains 'desperately poor'. There is 'remarkably little cross-fertilisation of ideas or operational co-ordination'.25 Besides economic crime, the main threat to Britain, Bickford believed, was 'super-terrorism', involving weapons of mass destruction, and because of the 'common international nature of these threats', the case for having three different agencies 'falls at the first hurdle'. These threats and the many others that the intelligence services have warned us about often do not stand up to close scrutiny - indeed, the modern intelligence service's prime purpose appears to be to generate fears - but Bickford's argument that a merger between the three services would save 'tens of millions of pounds' and provide the necessary 'focused direction, integration and analysis of electronic and human intelligence' deserves to be taken seriously. Tomlinson argues that such a streamlined organisation should be accountable to a parliamentary committee so that 'intelligence targets, priorities and budgets are all controlled through the normal democratic process'.26 A new Treasury-led interdepartmental committee inquiry was instigated in 1998 to put the security and intelligence services under what was said to be an unprecedented 'root-and-branch' scrutiny, the aim being to expose the intelligence agencies to zero-based budgeting, a Treasury discipline that asks the agency concerned to explain from first principles the value of everything it does. As Independent political correspondent Donald Macintyre suggested, 'Ministers will have to be tough; when an effort was made from within the Treasury to do the same thing in the 1980s, it foundered when the security services, almost certainly with Margaret Thatcher's backing, put the shutters up. Although the official budget for MI6, MI5 and GCHQ is claimed to be £713 million, rising to £776 million in 1999/2000 (not including a Treasury supply estimate for the capital budget of £144 million) and up to £1 billion for all agencies, Sir Gerald Warner, who as former deputy head of MI6 and Intelligence and Security Co-ordinator at the Cabinet Office (1991-6) should be in a position to know, put a figure of £2.5 billion on the entire cost of Britain's intelligence community. The reality is that the intelligence budget has increased in a period when defence spending has gone down from 5 per cent to around 3.5 per cent of GDP. Defence intelligence, the international arms trade and nuclear proliferation absorb about 35 per cent; intelligence on foreign states and their internal politics about 10 per cent; intelligence operations, including supplying diplomats and ministers in negotiations with secrets and economic espionage, about 20 per cent; counter-terrorism another 20 per cent; with counter-intelligence, counter-espionage, drugs and international crime the rest. An inquiry conducted by the Cabinet Office in 1998, with wide terms of reference, including ensuring that the agencies' objectives are properly 'focused' on providing relevant intelligence to other Whitehall departments, asked them to justify their activities as well as their usefulness. It was acknowledged that the scrutiny team would probably recommend some 'down-sizing' of MI6, which had 'run out of things to do', though no clues were forthcoming from the politicians. The intelligence chiefs have them selves complained that New Labour has had no policy on the intelligence services, and it is true that all efforts to elicit a pre-election policy statement from the future Prime Minister, Foreign Secretary and Home Secretary met with failure. MI6 Chief Sir David Spedding, however, had no need to worry. Foreign Secretary Robin Cook, the former left-winger who in opposition regularly criticised the intelligence and security services for their threat to civil liberties, lack of accountability and waste of taxpayers' money, had, one intelligence source told Richard Norton-Taylor, 'further to travel than his predecessors' in coming to terms with his responsibilities for the Secret Intelligence Service. It did not take long. Labour politicians who, in the main, have had little contact wlth the intelligence world, or much interest in its activities, have been and continue to be easily seduced by the magic of secrecy and privileged access to special sources. MI6 senior staffers knew what to do, having for so long, as Tomlinson warned, 'carefully and successfully cultivated an air of mystique and importance to their work'. Knowing that the reality is very different, SIS continues to devote considerable time and resources to lobbying for its position in Whitehall. Cook made the short trip across the Thames to the Service's palatial Vauxhall Cross headquarters, where Spedding and his successor, Richard Dearlove, avoiding discussion of MI6's real budget, briefed him on their latest 'successes': a 'crucial role' in revealing Saddam Hussein's continuing chemical, biological and nuclear weapons programme; uncovering Iranian attempts to procure British technology; and tracking drug smugglers and countering money laundering in the City of London. And then, in April 1998, dressed in the traditional white tie and tails for the Mansion House Easter dinner for diplomats and City businessmen, ** Cook went out of his way - indeed, further than any previous Labour Foreign Secretary - to praise SIS, noting that they 'cannot speak for themselves' because 'the nature of what they do means that we cannot shout about their achievements if we want them to remain effective. But let me say I have been struck by the range and qualily of the work. It seems that some things in the British state never change. ** There have been numerous rumours in areas of Whitehall's intelligence community that while in opposition, Mr Cook used a well know high class London based escort agency (A****) [A reader suggests "Adam's"] - apparently the preferred choice of several MP's and Whitehall civil servants. The Security and Intelligence services keep on file indiscretions, however politically sensitive, of crown servants, MP's etc - An example of that would be the sexual encounter that occurred between Gordon Brown and Peter Mandelson (interrupted accidentally by a member of Michael Meacher's staff) in Gordon Brown's office at the House of Commons while in opposition and is still only known to a very select number of Commons and Whitehall hierarchy. The services are also aware of the sexual relationship between Mr Hague and Mr Coe. -------------------------------------------------------------------------------- Notes 1. Punch, No. 71, 2.199. 2 & 3. Sunday Business, 20.12.98 & 24.1.99. Family friend and former Conservative defence procurement minister, Jonathan Allen, who was an MI6 agent, providing insights into the Saudi royal family and their defence spending plans. 4. Sunday Business, 11.10.98. 5. Observer, 21.11.93; BBC1 Panorama, 22.12.93. 6 & 7. Sunday Times, 22.9.96, 21.12.97 & 2.8.98. 8. Observer, 22.12.96. 9 & 10. Guardian, 25.3.98 & 7.10.98; Sunday Times, 30.8.98; Independent, 2.9.98. 11. Adams [?], p. 101; Mark Urban , UK Eyes Alpha: The Inside Story of British Intelligence, pp. 215-16; Sunday Times, 22.9.96, 21.12.97 & 2.8.98. 12. Guardian, 20.12.94; Times, 10.11.98. 13 & 14. Guardian, 10.8.98; Sunday Times and Observer, 9.8.98. 15 & 16. Guardian, 8.8.98. 17 & 18. Sunday Business, 11.10.98; Times, 15.11.98. 19. Guardian, 19.12.97; Sunday Times, 17.11.96 & 9.1.97; Observer, 25.10.98. 20 & 21. Guardian, 21.9.96, 20.5 & 8.8.98; Observer, 16.8.98; Punch, 2.1.99. 22. Foreign Secretary Robin Cook has indicated that in future the tribunal route might be allowed. Daily Telegraph, 3.11.98; Guardian, 15.8.98. 23. Sunday Times, 31.3.97. 24. Independent, 29.8.97. -------------------------------------------------------------------------------- Footnotes on censored text BOOK CIPHER Book cipher, as such, is not a codename, this is probably referring to the method used - the one-time pad (OTP) encryption system. It is a slow manual "off-line" system using one-time pads and books to convert plain text into groups of figures. The resultant cipher text is reduced by 20% compared to the text to be enciphered. -------------------------------------------------------------------------------- NOREEN/ROCKEX CIPHER An "off-line" (off-line: text is enciphered prior to transmission) machine system using coded tapes and manual entry through a typewriter keyboard. The resultant cipher text is increased by up to 40% compared to the text to be enciphered. -------------------------------------------------------------------------------- ON-LINE CIPHER SYSTEMS Past and present systems are: AUCTIONEER, TOPIC, TREDS (Topic Rapid Encryption Decryption System), ALVIS, TRUNCHEON, FRANTON, and HORA. An "on-line" (on-line: text is protected during transmission) machine system using encryption tapes to set current cipher protocols and an advanced day counter, both must tally or the cipher is considered compromised. The resultant cipher text is usually increased by 10-20% compared to the text to be enciphered. AUCTIONEER and TOPIC can work in either mode, they have a manual keyboard for off-line and cipher key tapes for on-line. Transmission speeds are reduced by up to 10% with these systems. CONSORT is the portable communications satellite system. Message and communications handling is through six main communications hubs; Darwin, Hanslope Park communications centre in Bedfordshire, a jointly operated SIS/GCHQ station in Poundon, Bucks, about 20 miles south west of Hanslope, GCHQ Cheltenham and two main London Communications Centres servicing both the Diplomatic Service and SIS. -------------------------------------------------------------------------------- ACTOR is the codename given to SIS within the United Kingdom Home, Defence and Diplomatic messaging services. It is designed to add an extra level of security when telex and telegrams are copied to SIS and reference to CX's from SIS. The Security Service codename is SNUFFBOX. All government sections are allocated a router indicator and channel indicator, in the case of SNUFFBOX; OI and SNFBX respectively. Even the BBC World Service in London has its own; HT and BBCBH. Bush House has an encrypted FCO communications terminal. Interestingly, all BBC World Service employees are NG (negatively) vetted for clearance up to and including CONFIDENTIAL through the resident BBC's Security Service liaison officer. Those members of staff working directly for the BBC Director General, particularly with access to the DG's management registry, are PV'd (positively) vetted up to and including SECRET. During national security alerts the DG's office will receive a direct 'subtle' briefing on behalf of the JIC from the resident Security Service liaison officer on "the line to take" in terms of what would, and would not be in the national and operational interest to broadcast. In some cases BBC World Service editors have, in the past, been individually approached to allow certain news items to be transmitted 'verbatim', unwittingly on behalf of SIS, as communication codes to agents in the field. -------------------------------------------------------------------------------- L***** This may refer to a caveat called LOCSEN which is used within the Diplomatic Service to restrict information from locally engaged staff that are suspected of being a member of a hostile intelligence agency (HIS) or have been assessed as having possible connections with a subversive or terrorist organisation, but has no meaning in respect of sensitive inter-agency liaison. -------------------------------------------------------------------------------- ECLIPSE A caveat previously known as GUARD. -------------------------------------------------------------------------------- UK EYES ALFA The caveat EXCLUSIVE is used for the physical transportation of this material. -------------------------------------------------------------------------------- BRAHMS A secure mobile system based on the Racal Comsec MA4300 secure system. -------------------------------------------------------------------------------- CRYPTEK This is a commercially available system available in classified and unclassified versions. The Communications Electronics Security Group (CESG), part of GCHQ, sets the standards for the installation of the fully Tempested classified system which operates on the UK public key system and, once in situ, is afforded the same level of security as UK cipher systems. -------------------------------------------------------------------------------- DEDIP, DESDEN DEYOU They are ostensibly Diplomatic codewords used for the transmission of very sensitive information and are used by SIS for operational and staff details over the diplomatic cipher system. -------------------------------------------------------------------------------- It comes as no surprise to members of the FCO or SIS, to see sensitive accounting or budget documents carrying the caveat "NOT FOR NAO EYES" effectively restricting the document from dissemination to the National Audit Office. -------------------------------------------------------------------------------- TECHNICAL SECURITY DEPARTMENT (TSD) TSD is officially a branch of the Diplomatic Service based at the FCO's Communications and Information Systems Divisions (ISD) at the Hanslope Park compound just outside of Milton Keynes in Bedfordshire. However, TSD also has offices in the FCO, GCHQ and SIS. TSD has a dual function - its is primarily responsible for all Diplomatic communications security at home and abroad but it also supplies technical and operational support for SIS and technical security for other government departments overseas. TSD is tasked with handling all overseas technical intelligence liaising closely and in many cases providing cover for SIS TOS (Technical and Operations Support) GCHQ and the Security Service's technical intelligence departments. TSD consist of five main sections: Branch A Branch B Branch C Branch D Branch E Technical Security Security Engineer Operations Support Technical Support and Forensics Technical Intelligence and Security A1 - Technical Security Inspectorate B1 - Intruder Detection C1 - Information Systems and Telephones D1 - Forensic Investigations E1 - Technical Analysis Directorate A2 - Tempest and Radiation Monitoring A3 - Tempest and Radiation Exploits B2 - Protective Systems and Future Projects B3 - Locks and CCTV B4 - Specialist Locksmiths C2 - Operational Maintenance C3 - Operational Personnel D2 - Research and Development D3 - Computers and Electronics E2 - Projects Analysis E3 - Technical Archives -------------------------------------------------------------------------------- The FCO's Overseas Estate Department's budget is designed to cover SIS officers accommodation under diplomatic cover. These costs therefore do not surface in the SIS overall yearly budget. For example, in one of the top SIS postings such as H/NY (Head of Station New York) - which comes with a very pleasant family size upper eastside apartment and costs in excess of $12,000 per calendar month - the cost is covered under the FCO's local UK Mission to the UN budget. -------------------------------------------------------------------------------- PENTEL A secret writing technique using a commercially available pen. [This is more fully described in Richard Tomlinson's The Big Breach.] -------------------------------------------------------------------------------- PETTLE A secret recording device that looks and acts like a commercially available walkman but utilises the middle part of the tape to record a "third" track through a slightly modified PCB that provides limited semi-duplex encryption. -------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8937 From: contranl Date: Fri Jun 18, 2004 8:23pm Subject: ATM ...hidden cameras in money machines . Stealing from ATM's (money machines) using a wireless camera and cardcopier...this time with nice detailed pictures ! http://www.snopes.com/crime/warnings/atmcamera.asp another story from the same website on using celphone-cameras to steal info.... http://www.snopes.com/crime/warnings/phonecam.asp Greetings Tetrascanner www.tetrascanner.com 8938 From: contranl Date: Fri Jun 18, 2004 9:21pm Subject: Gadget time ! . Hi welcome to the weekly :)GADGET(: hour 1) Keyhanger with built in Hidden camera detector (from 400MHz to 2.4GHz) covers all the frequency ranges of hidden-cameras....and...counterfeit money detector 2) Multifunctional hidden Camera detector with Siren, Flashlight and Burglar alarm system and Pepperspray http://www.globalsources.com/gsol/GeneralManager? &design=clean&language=en&action=GetSupplier&page=supplier/Showroom&s upplier_id=6008804103839&showroom_type=&action=GetPoint&point_id=3000 000152127&catalog_id=2000000003844&prod_id=17034 Are they crazy or what ?.........here is the short one: http://tinyurl.com/24kwd I am seriously curious if these things can differentiate between video-signals and other signals in the same frequency band...and how they do that..seems to me that you would need a videodetection- circuit wich looks for a video-line-sync frequency (15~16 Khz)...i suspect there is no such a circuit inside...so they are basically wideband AM-detectors ? They are not available in my country (Netherlands)...anyone in the US feel like buying one of these(cheap)gadget videodetectors ? and see if they only react to real (rf) videosignals ? Greetings Tetrascanner www.tetrascanner.com 8939 From: contranl Date: Fri Jun 18, 2004 10:04pm Subject: "Wireless-Video-Camera-Jammers" from the Far-East . Latest low-cost..."Wireless-Video-Camera-Jammers" from the Far-East http://tinyurl.com/2v5dk I suppose this will only work when they overpower the other (peeping) transmitter ? (at the receivers end),in practice they would have to be 100 mW at least to safely overpower a standard 10mW video- transmitter ? How do you now the frequency to jam on ? sweeping ? wideband-rf-noise-generator ? Maybe it is only somekind of 15 khz (sync)Am wideband signal ? not a real and complete videosignal ? Notice the 2 antennas and the fact that they mention different standards (Ntsc,Pal..etc) By the way...a good website to see the latest on Far-East (Taiwan,Korea,China) spystuff,gadget-detectors and for example very small harddisk video-recorders is here: http://www.globalsources.com Half the "spyshop"" products is now coming from this area....time to learn Chinese ! Tetrascanner www.tetrascanner.com 8940 From: Paul Curtis Date: Fri Jun 18, 2004 10:35pm Subject: RE: "Wireless-Video-Camera-Jammers" from the Far-East If people will buy this stuff to conduct serious screening imagine what they could do with my warehouse full of dark emitting diodes. Now . . . if I could just figure out a way to find them :) Paul Curtis National Ventures, Inc. -----Original Message----- From: contranl [mailto:contranl@y...] Sent: Friday, June 18, 2004 20:04 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] "Wireless-Video-Camera-Jammers" from the Far-East . Latest low-cost..."Wireless-Video-Camera-Jammers" from the Far-East http://tinyurl.com/2v5dk I suppose this will only work when they overpower the other (peeping) transmitter ? (at the receivers end),in practice they would have to be 100 mW at least to safely overpower a standard 10mW video- transmitter ? How do you now the frequency to jam on ? sweeping ? wideband-rf-noise-generator ? Maybe it is only somekind of 15 khz (sync)Am wideband signal ? not a real and complete videosignal ? Notice the 2 antennas and the fact that they mention different standards (Ntsc,Pal..etc) By the way...a good website to see the latest on Far-East (Taiwan,Korea,China) spystuff,gadget-detectors and for example very small harddisk video-recorders is here: http://www.globalsources.com Half the "spyshop"" products is now coming from this area....time to learn Chinese ! Tetrascanner www.tetrascanner.com ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8941 From: John McCain Date: Fri Jun 18, 2004 10:22am Subject: Re: Cute Little TDR James, Another of those rare chances where I can contribute something to this list. Usually lurking here, but since I touched one of these at a trade show last month along with another made by Biddle, and several from Triplett , I thought I'd give my impressions. They were all similar and if I had the free cash, I'd have gone for one of them simply because of the convenience factor. They were all quite inexpensive... with one under 400 $US. Positives are well defined in the marketing literature. I saw a couple of minor negatives that all of them had to various degrees. 1. On the trade show floor, all displays were easy to see. In the sunlight, I think you would have to build a sun-shade to read most of them with ease. I suspect a bit of cost savings on the display, but you'd expect them to be used outdoors in the sun. Since I couldn't take one outside, I can't be positive of this defect, but sure seemed to be there 2. I was unable to zoom into the display for much detail. I suspect you'd miss a higher impedance "fault" on some of those due to display resolution. 3. No 150 or 600 ohm output on most. Not a killer, but I'd like to have it. I like to match what I'm connecting to. 4. One unit had a variable Vf control, but you had to enter the factor, reset the unit, then restart it. On the plus side, that unit had numerous Vf numbers for common cable in a table for easy recall. But, I never know what cable is installed, so have to measure something and work backwards for a Vf if accurate lengths are required. 5. I didn't care for the connectors. I tend to like BNC connectors on this kid of stuff, and the "fluke type" safety connectors bug me. Caveat.. I'm not into commercial TSCM (but have an interest), I mostly do digital communications work; so my uses are different from most on this list. For now, I'll keep using the home-made NE-555 based tiny unit with a Fluke hand-held scope when I'm need a small package (I have to have the scope anyway), the RiserBond (thanks Steve) for accurate stuff, and the heavy old Tek 1503 if there's a chance of burning it up. Unless you're one of the big buck guys, if planning on buying one, to make sure it doesn't live in the closet, I'd get a hour's use on it before committing to the cash. Cheers, JohnM James M. Atkinson wrote: > Here is a cute little hand held TDR that is the fraction the price of a > Riser Bond unit (even a used unit). > > http://www.jensentools.com/product/group.asp?parent_id=60855 > > It may not be fancy, but it is a good place to start, and it is under $1500. > > One real plus is that it is about the size of a typical DVM, and not the > size of a suitcase. > > > Description from Jensen site follows: > > This battery powered, handheld TDR can identify many types of faults on any > cable consisting of at least two insulated metallic conductors. It has > internal matching networks of 25, 50, 75 and 100 Ohms. The balance and > velocity of propagation controls allow you to closely match any cable. It > has a measurement range of 0 to 10,000' with resolution of four inches. The > unit autoranges around the cursor giving the best view of the fault. The > large back lit display is easy to read. Includes case, leads, manual and 6 > AA batteries. 9 x 4.5 x 1.9", 1.3 lbs. > > -jma > > > > > > ----------------------------------------------------------------------------------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ----------------------------------------------------------------------------------------------------- > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ----------------------------------------------------------------------------------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ----------------------------------------------------------------------------------------------------- > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 8942 From: Steve Uhrig Date: Fri Jun 18, 2004 9:37pm Subject: Re: Gadget time ! Once upon a midnight dreary, contranl pondered, weak and weary: > I am seriously curious if these things can differentiate between > video-signals and other signals in the same frequency band...and how they > do that..seems to me that you would need a videodetection- circuit wich > looks for a video-line-sync frequency (15~16 Khz)...i suspect there is no > such a circuit inside...so they are basically wideband AM-detectors ? They detect any RF within their frequency range if the RF is loud enough. Basically a diode detector into some sort of alert indicator. No demodulator at all. If they're within a foot or so of a cell phone (200 mW max in the U.S., and usually less), they'll trigger when the cell phone registers with the cell site. So they're not terribly sensitive, but not deaf either. If you want to finance it, I'll do a controlled test and document the results of field strength it takes to trip it, and at what frequencies, with various forms of modulation! The price gives you an indication of the quality. A lot of these Pac Rim places will send a demonstration sample at no charge if you contact them via fax with a professional letterhead. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8943 From: frost_bitten_ca Date: Sat Jun 19, 2004 2:17am Subject: Re: Looking for a carbon capacitor --- In TSCM-L@yahoogroups.com, "Steve Uhrig" wrote: > Once upon a midnight dreary, James M. Atkinson pondered, weak and weary: > > > I need a eighteen to twenty each 28+ volt, 100 Farad, very low ESR, carbon > > capacitors, > > The maximum voltage so far on large (farad size) super caps is 3 point > something volts. That's the max. Far more affordable are 2 volts at a few > farads. Figure about $5 each in reasonable quality. > > So you'd need at least fifteen in series to get the voltage you need, > then 20 parallel strings of fifteen caps in series to get the capacity > you desire. So you're talking 300 caps +/- mental arithmetic, at about $5 > each, or $1500. > > And that's for one. > > So for twenty, figure $30,000. > > Carbon capacitors? > > The only stock you'll find is from manufacturers. A year ago these caps > didn't exist. Now they're being treated more as batteries than > supercapacitors. They're still not in widespread production yet. Even > getting some for engineering samples takes some effort. > > For your shunt, use a 3/4" piece of rebar of the proper length and > something like saddle clamps from Polyphaser or Cadweld to connect to it. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* in the plating industry most plating we did was being done around the 6VDC region up to 20,000 amps. The rule of thumb for current carrying bus bars etc was 1 sq inch of copper/1000 amps of current carrying, so 2000 amp work pieces would require a 2 sq inch copper bus bar and so on. You can replace with aluminum bar but its not as efficient over the long term. 8944 From: A Grudko Date: Sat Jun 19, 2004 10:12am Subject: NYC Plans Giant WiFi Safety Net By Glenn Fleishman Special to Wi-Fi Networking News Permanently archived item [1] Computerworld reports that New York City will build a wireless network to supports 10,000s of public-safety users at speeds of up 70 mph: Bids are expected next month. They'll start with a three-month pilot project to test with multiple bidders, and then award a five-year contract with the potential for two five-year renewals. The bid's spec apparently calls for two Mbps access and simultaneous streaming for 1,000s of users. The first phase would support about 5,000 fire, police, and emergency medical personnel. The full cost could be $500 million to $1 billion, but the city won't confirm it. Mesh architecture is practically a necessity, the article quotes experts as saying. Tropos says they could deploy such a network with 600 of their access points in the 2.4 GHz band. More would be needed to use the 4.9 GHz public-safety band. Lucent suggests that EvDo running at 2.4 Mbps in the 1.9 GHz band would be an option as well. URLs referenced: [1] -- pgp key: http://www.jonbaer.net/jonbaer.asc fingerprint: F438 A47E C45E 8B27 F68C 1F9B 41DB DB8B 9A0C AF47 -- NYCwireless - http://www.nycwireless.net/ Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/ Archives: http://lists.nycwireless.net/pipermail/nycwireless/ Andy Grudko (British), DPM, Grad IS (South Africa) Consulting Investigator, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , andy@g... Pretoria (+27 12) 244 0255 - 244 0256 (Fax) Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.707 / Virus Database: 463 - Release Date: 2004/06/15 [Non-text portions of this message have been removed] 8945 From: Date: Sat Jun 19, 2004 11:34am Subject: New file uploaded to TSCM-L Hello, This email message is a notification to let you know that a file has been uploaded to the Files area of the TSCM-L group. File : /Wilson Burns/Criminal Complaint, Arrest, and Detention.pdf Uploaded by : graniteislandgroup Description : Criminal Complaint You can access this file at the URL http://groups.yahoo.com/group/TSCM-L/files/Wilson%20Burns/Criminal%20Complaint%2C%20Arrest%2C%20and%20Detention.pdf To learn more about file sharing for your group, please visit http://help.yahoo.com/help/us/groups/files Regards, graniteislandgroup 8946 From: Date: Sat Jun 19, 2004 11:39am Subject: New file uploaded to TSCM-L Hello, This email message is a notification to let you know that a file has been uploaded to the Files area of the TSCM-L group. File : /Wilson Burns/Plea Bargain Agreement.pdf Uploaded by : graniteislandgroup Description : Plea Bargain Agreement You can access this file at the URL http://groups.yahoo.com/group/TSCM-L/files/Wilson%20Burns/Plea%20Bargain%20Agreement.pdf To learn more about file sharing for your group, please visit http://help.yahoo.com/help/us/groups/files Regards, graniteislandgroup 8947 From: Date: Sat Jun 19, 2004 11:53am Subject: New file uploaded to TSCM-L Hello, This email message is a notification to let you know that a file has been uploaded to the Files area of the TSCM-L group. File : /Wilson Burns/Search Warrant and Results.pdf Uploaded by : graniteislandgroup Description : Search Warrant Results You can access this file at the URL http://groups.yahoo.com/group/TSCM-L/files/Wilson%20Burns/Search%20Warrant%20and%20Results.pdf To learn more about file sharing for your group, please visit http://help.yahoo.com/help/us/groups/files Regards, graniteislandgroup 8948 From: Date: Sat Jun 19, 2004 0:01pm Subject: New file uploaded to TSCM-L Hello, This email message is a notification to let you know that a file has been uploaded to the Files area of the TSCM-L group. File : /Wilson Burns/Initial Affidavit for Search Warrant.pdf Uploaded by : graniteislandgroup Description : Initial Affidavit and Search Warrant You can access this file at the URL http://groups.yahoo.com/group/TSCM-L/files/Wilson%20Burns/Initial%20Affidavit%20for%20Search%20Warrant.pdf To learn more about file sharing for your group, please visit http://help.yahoo.com/help/us/groups/files Regards, graniteislandgroup 8949 From: R. Snyder Date: Sat Jun 19, 2004 11:45am Subject: Re: John McCain's comments on TDR's John McCain mentioned his use of a 555-based ping box with a handheld o'scope. Having owned and used several Riser Bond and Biddle TDR's, I still have to express a particular fondness for the 74AC14-based ping box design on epanorama.net. In the version I built, powered from a 9V battery via a 78L05, with one rotary switch for off, batt chk, and output impedances of 50, 75, 100, and 125 ohms, and another rotary switch for 20nS, 33nS, 96nS, 360nS, 1.6uS, and 7uS pulse widths, the whole thing fits in a 6"x2"x1" box, and all the parts cost less than $20. Sure it takes more mental gymnastics to measure a wire in Vp*nS/2 rather than simply reading a convenient measurement in feet or meters, but just like the various clicks and pops of the old WECO 1013 butt set, once one develops a particular intuition for using a cheap ping box, every little idosyncracy of it can be used to extract information about the cable to which it is attached. That said, I'm not about to give up my latest Riser Bond TDR, as it's just too convenient. __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail 8950 From: kondrak Date: Sat Jun 19, 2004 5:06pm Subject: Re: Re: John McCain's comments on TDR's Ive got one right here I built,a long time ago using a 555. It was from an article in the old 73 amateur radio magazine. At 12:45 6/19/2004, you wrote: >John McCain mentioned his use of a 555-based ping box >with a handheld o'scope. Having owned and used >several Riser Bond and Biddle TDR's, I still have to >express a particular fondness for the 74AC14-based >ping box design on epanorama.net. In the version I >built, powered from a 9V battery via a 78L05, with one >rotary switch for off, batt chk, and output impedances >of 50, 75, 100, and 125 ohms, and another rotary >switch for 20nS, 33nS, 96nS, 360nS, 1.6uS, and 7uS >pulse widths, the whole thing fits in a 6"x2"x1" box, >and all the parts cost less than $20. Sure it takes >more mental gymnastics to measure a wire in Vp*nS/2 >rather than simply reading a convenient measurement in >feet or meters, but just like the various clicks and >pops of the old WECO 1013 butt set, once one develops >a particular intuition for using a cheap ping box, >every little idosyncracy of it can be used to extract >information about the cable to which it is attached. >That said, I'm not about to give up my latest Riser >Bond TDR, as it's just too convenient. > > > >__________________________________ >Do you Yahoo!? >Yahoo! Mail - Helps protect you from nasty viruses. >http://promotions.yahoo.com/new_mail > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 8951 From: delta Date: Mon Jun 19, 2000 1:53pm Subject: m1 counter hello everybody i don t know if my last message appear on the liste because i obtain no answer so i ask the list again : does anyone use the m1 counter from optoelectronics or another product (opto ) to inspect the rf level ? what do you think about the m1 counter ? it work from 50hz to 2. 8 ghz ? is this unit a good product to help us in the search of rf transmitter or another product like the scout 40 ? thank to everybody david from paris 8952 From: James M. Atkinson Date: Sat Jun 19, 2004 10:49pm Subject: Re: Re: John McCain's comments on TDR's I've been using the 555 based ping boxes for years, and have found it helpful to modify the design so that it drives two or more additional transistors on the output which gives you a really cheap multi-line TDR, and to use a potentiometer as the biasing resistor on the transistors instead of just a fixed value. This way you can fine tune the biasing to a better impedance match into the line you are testing, which makes all the difference in detecting mischief relative to eavesdropping devices. Get the impedance close with a fixed resistor (ie. 45 ohms), then use a ten turn pot to bring it up to between 45 and 150 ohm. Sure, I still prefer to use a Riser Bond or Tek TDR, but those little ping-boxes can be really handy what you have some special situation to work in, or when you want non-standard documentation (those of you who have seen my big four pair TDR printouts know what I am talking about). -jma At 12:45 PM 6/19/2004, R. Snyder wrote: >John McCain mentioned his use of a 555-based ping box >with a handheld o'scope. Having owned and used >several Riser Bond and Biddle TDR's, I still have to >express a particular fondness for the 74AC14-based >ping box design on epanorama.net. In the version I >built, powered from a 9V battery via a 78L05, with one >rotary switch for off, batt chk, and output impedances >of 50, 75, 100, and 125 ohms, and another rotary >switch for 20nS, 33nS, 96nS, 360nS, 1.6uS, and 7uS >pulse widths, the whole thing fits in a 6"x2"x1" box, >and all the parts cost less than $20. Sure it takes >more mental gymnastics to measure a wire in Vp*nS/2 >rather than simply reading a convenient measurement in >feet or meters, but just like the various clicks and >pops of the old WECO 1013 butt set, once one develops >a particular intuition for using a cheap ping box, >every little idosyncracy of it can be used to extract >information about the cable to which it is attached. >That said, I'm not about to give up my latest Riser >Bond TDR, as it's just too convenient. > > > >__________________________________ >Do you Yahoo!? >Yahoo! Mail - Helps protect you from nasty viruses. >http://promotions.yahoo.com/new_mail > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8953 From: Date: Sun Jun 20, 2004 2:31am Subject: Humor On the Lighter Side.... "How many spies,does it take to change a lightbulb? answer= "What,light bulb?" Dogpile Web Search Home Page- Joke Of The Day ---------- http://www.dogpile.com/ [Non-text portions of this message have been removed] 8954 From: Steve Uhrig Date: Sat Jun 19, 2004 11:15pm Subject: Re: John McCain's comments on TDR's Once upon a midnight dreary, James M. Atkinson pondered, weak and weary: > I've been using the 555 based ping boxes for years, and have found it > helpful to modify the design so that it drives two or more additional > transistors on the output which gives you a really cheap multi-line TDR, > and to use a potentiometer as the biasing resistor on the transistors > instead of just a fixed value. A real good description of a simple ping box TDR is the one incorporated into Marty Kaiser's 1080H telephone analyzer. The simplest ideas tend to be the most brilliant. It's well worth reading everything here, not just the TDR part, just for the learning experience: http://www.martykaiser.com/1080h~1.htm Learn to use line balance, which costs pennies and is extremely effective. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8955 From: James M. Atkinson Date: Sun Jun 20, 2004 2:41am Subject: CIA TSCM Contractor Busted I have uploaded a new directory of information concerning the Wilson bust to the file space on Yahoo, and have the following analysis of the court documents turned up thus far in the case. I will add documents to the file space as they become available. Steve Wilson has repeatedly claimed to be working for the CIA, and according to official documents has claimed this numerous numerous times to federal agents. Amusingly, when he was busted his defense was that he was dealing in drugs on behalf of the CIA. The court records indicate that Wilson was engaging in a long-tern large scale indoor marijuana growing operation, and they caught him not with a couple of dozen plants, or even a hundred plants... but with over 550 plants, that a huge amount of drugs was being produced, that he had been producing it for a number of years, and was likely bringing in over a million dollars a year in cash. It appears that he was running a money laundering activity through his business called "Technical Intelligence Group" and used numerous other business names to clean his drug money proceeds. On a side note, for the last ten years or so he was using the drug money to buy up surplus test equipment and sell it to the folks in the TSCM business, which means the government is going to be coming after a whole bunch of people in the TSCM business who bought equipment from him. Remember, if the deal seems to good to be true it probably is... You can expect a number of Private Investigators to loose their licenses over this situation, but it's their own fault as they should have figured this clown out years ago when he started pouring Kool-Aid at the meetings.. Both Steve, and his wife confessed to dealing drugs, as did some of his business associates. It looks like his adult some was the drug courier, and list members will recall that this kid was the one that Steve had been bringing out with him to help on bug sweeps. They caught him with almost three dozen firearms, and he has already confessed that he was using them in his drug business. It should be noted that while he had a large number of weapons the quality of most of it was really poor, lacked decent optics, and he seemed more concerned with quantity instead of quality. Also, there does not appear to be any kind of duplicate weapons (ie. two or three of the same model), which means the guy had absolutely no clue when it came to tactical operations. The affidavits spell out that Steve had threatened to kill federal law enforcement officer, and was ready for a Waco-style shoot-out if they confronted him. The documents also spell out that they caught him with what appears to be an illegal sawed off shotguns, rifles, and an illegal silenced pistol. The ATF will likely find that some of the seized weapons had been illegally converted to full-auto. Wilson claimed that he was indigent, and was appointed a public defender, but this is curious as the guy was flush with cash, had caches of weapons and money all over his area, and assets and resources stashed for future access. Consider the amount of dope he was caught with, the amount of money that was rolling in, and will see that there is an issue of some rather significant missing money. Of course of the other hand he did file bankruptcy two years ago, and recently claimed that his business partner ripped him off for over $400,000. In the "Reasons for Detention" it mentions that Steve was planning to flee the country after the government raided his compound, but that the government moved too fast for him and arrested him before he got away. Unless he had a bunch of cash and assets stashed in another country it would not have done him much good to run away... so where are these assets? He has a private pilot's license (what drug dealers don't), he has moved over 12 times in the past 20 years, had copious businesses to launder his money, and a probable history of dealing drugs dating back since at least 1983. He has agreed to plead guilty (see the Plea Agreement), and faces between five and forty years in prison, millions of dollars in fines, and so on. He seriously complicated his sentence buy admitting the guns were used in his drug dealings, and even though he has agreed to rat-out his associates the severity of the "complicating factors" is going to end up in the government super-sizing his prison term so that he will likely be in his seventies before he sees the light of day... assuming of course that he doesn't get killed in prison. Most notable is that he turned on his own son, and showed his true colors by screwing over his own child. The documents spell out that it was his own son was the weak link, and that he became vulnerable to detection nearly two years ago when Steve Wilson got greedy and tried to pay someone $25,000 as a consulting fee to help him grow better drugs. His offer was refused, but the consultant remembered who Steve was, and where he was located. When the consultant was arrested recently and charged he immediately called upon his memory to play "let's make a deal" and recalled sufficient details to allow the authorities to hunt down Steve Wilson and secure a search warrant. The documents Mention that Steve Wilson operated under the business names of "Wilson and Associates", "Technical Intelligence Group", "Black Branch Farms", and numerous others which he would move assets , cache, equipment and such around into so as to hid his assets, and launder proceeds from drug deals. On January 25, 1993 he and his wife filed a claim that their house burned down, and collected a pay-off from the insurance company, but the court records seem to indicate the fire was a planned arson. Coincidentally, right after this Steve started dropping huge amount of money on anything even remotely involving TSCM, communications, security, etc. He got set up as a dealer of equipment and was moving a small amount here and there, but nothing significant. The documents indicate that Steve had bypassed his electric meter, and was stealing power to run his grow lights, but that he screwed up on at least one occasion and had to explain a rather hefty bill. Now the electric company is going after him for stealing tens of thousands of dollars in power over the past ten years. Wilson had a couple of run-ins with the FBI in Nov 18, 2003 after he was heard to say that "he would kill any federal officer that came onto his property"... they were not amused... and Wilson launched into his rant that he was working for the CIA. The documents reveal that in Feb 2004 Wilson had a contact with someone who was serving on the Drug Task Force, and he tried to social engineer his way into their inner circles but they were suspicious and didn't let it happen. During this contact Wilson claimed that he had infiltrated biker gangs for the CIA, and that he was a CIA Contractor.-jma -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- From: Wayne T Work Date: Thu Jun 19, 2003 8:30am Subject: RE: How to spot a terrorist How clueless is this guy. Good thing he works for the US Gov because if he worked for another government, they would be a threat to the US because they are way to STUPID to be effective. IMHO!!! Wayne T Work, Sr. CISSP (Work) 203.217.5004 (Fax) 208-545-4365 Owner and Sr. Information Systems Security Consultant Security Gauntlet Consulting HIPAA Compliance Resource Group www.securitygauntlet.com www.hipaact.com -----Original Message----- From: kirk [mailto:kirk@t...] Sent: Thursday, June 19, 2003 3:18 AM To: tscm-l@yahoogroups.com Subject: [TSCM-L] How to spot a terrorist "You can easily identify a suspected terrorist," says Epifanio Lambino Jr., chief of the Philippines' Immigration Bureau's Civil Security Unit. "Order him to remove his shoes," he instructs. "Does he have athlete's foot? If so, you may have someone who has undergone rigid military training." Other telltale signs, he says, include a scarred chest and calloused hands and elbows from crawling on the ground, and "eyes darting from place to place." Philippine immigration inspectors denied entry to as many as 200 suspected terrorists last year based on such criteria, Lambino said. (AP) -- Kirk Adirim TACTRONIX Tactical Electronics for Critical Missions 468 North Camden Drive Beverly Hills, CA 90210 USA E: kirk@t... T: 323-650-2880 F: 310-388-5886 W: www.tactronix.com -- ------------------------ Yahoo! Groups Sponsor ---------------------~--> Looking for the latest Free IT White Papers? Visit SearchNetworking.com to access over 500 white papers. Get instant access at SearchNetworking.com Today http://us.click.yahoo.com/.EaHdD/OLNGAA/vitMAA/kgFolB/TM ---------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ [Non-text portions of this message have been removed] 7474 From: Date: Thu Jun 19, 2003 6:50am Subject: Dave McGauley UK Re how to spot a terrorist Kirk that sounds an exact description of my Ex mother in law I have notified Scotland Yard Dave TSCM [Technical Surveillance and Countermeasures] David McGauley Demtec Electronic Surveillance and Counter Measures Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L39 0HF UK 01695 558544 07866206112 demtec@a... www.demtec.co.uk [under construction] The manufacture and installation of custom made covert electronic audio and video devices Professional physical and electronic counter measures [sweep] services. Note: any fellow UKPIN members welcome to call in to discuss applications. Workshop located alongside the M58 junc 3 [Non-text portions of this message have been removed] 7475 From: Date: Thu Jun 19, 2003 7:52am Subject: Golf Balls A golfer whose car broke down flagged down a passing bus and got aboard. He sat down on the bus next to a little old lady. His pockets were full of golf balls. The little old lady kept looking quizzically at him and his bulging pockets. Finally, after many such glances from her he said, "It's golf balls." The little old lady continued to look at him thoughtfully and finally said, "Does it hurt as much as tennis elbow? Have a Grand Day [Non-text portions of this message have been removed] 7476 From: Guy Urbina Date: Thu Jun 19, 2003 0:21pm Subject: ruggedized padlocks, any info? Hi list, This may be a little off topic, but I respect the opinions of the professionals on this list since many of you go out in the field and install electronic equipment. We're going on a deployment to install some expensive electronic equipment in a maritime location. Without going into too much detail, I'm looking for a rugged, heavy duty padlock that can withstand corrosion, salt water and foul weather. Our enclosure is stainless steel NEMA 4X with tamper proof, vandal proof screws and hardware. I looked at a few websites of the major lock manufacturers, but I wanted to get a professional opinion from the list. Thanks in advance for the help. Best Regards, -Guy ____________________________________________________________ Guy Urbina Defense Sciences Engineering Division Electronics Engineering Lawrence Livermore National Laboratory 7000 East Avenue, Mail Stop L-369 Livermore, CA 94551 USA Voice - (925) 422-6460 Fax - (925) 422-2118 alpha page:http://labnet.llnl.gov/cgi-bin/pager_script?PAGERNUM=05461 email - urbina1@l... _____________________________________________________________ 7477 From: Date: Thu Jun 19, 2003 1:18pm Subject: Re: How to spot a terrorist Do you have a decent reference for this? All I can find is the following which brings its validity into question: http://www.icomm.ca/survival/245fil.don/bad-boys.htm I'm curious because I can't find such a thing as the "Civil Secretary Unit": http://www.immigration.gov.ph/ORg%20structure.htm Thanks - (Embedded image moved to file: pic24021.pcx) |---------+----------------------------> | | "kirk" | | | | | | | | | 06/19/2003 02:18 | | | AM | | | Please respond to| | | kirk | | | | |---------+----------------------------> >--------------------------------------------------------------------------------------------------------------| | | | To: | | cc: | | Subject: [TSCM-L] How to spot a terrorist | >--------------------------------------------------------------------------------------------------------------| "You can easily identify a suspected terrorist," says Epifanio Lambino Jr., chief of the Philippines' Immigration Bureau's Civil Security Unit. "Order him to remove his shoes," he instructs. "Does he have athlete's foot? If so, you may have someone who has undergone rigid military training." Other telltale signs, he says, include a scarred chest and calloused hands and elbows from crawling on the ground, and "eyes darting from place to place." Philippine immigration inspectors denied entry to as many as 200 suspected terrorists last year based on such criteria, Lambino said. (AP) -- Kirk Adirim TACTRONIX Tactical Electronics for Critical Missions 468 North Camden Drive Beverly Hills, CA 90210 USA E: kirk@t... T: 323-650-2880 F: 310-388-5886 W: www.tactronix.com -- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ******************* N O T I C E ******************* The information contained in this e-mail, and in any accompanying documents, may constitute confidential and/or legally privileged information. The information is intended only for use by the designated recipient. If you are not the intended recipient (or responsible for the delivery of the message to the intended recipient), you are hereby notified that any dissemination, distribution, copying, or other use of, or taking of any action in reliance on this e-mail is strictly prohibited. If you have received this e-mail communication in error, please notify the sender immediately and delete the message from your system. *************************************************** [Non-text portions of this message have been removed] 7478 From: George Shaw Date: Thu Jun 19, 2003 5:40pm Subject: protocol/network analyser software Can anyone suggest a powerful protocol/network analyser software both hardwired and wireless lan/wan. -- George Shaw ì Any Sufficiently Advanced Technology is Indistinguishable from Magicî ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... Fax & Voicemail: +44 (0) 871 242 9183 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.490 / Virus Database: 289 - Release Date: 16/06/03 7479 From: spysafe2003 Date: Fri Jun 20, 2003 0:21am Subject: Biddle cfl 510 TDR Help Please Do any of you kind sirs have the instructions for this tdr? I am more than willing to cover any costs in getting a copy. Thanks and happy hunting. Rob. 7480 From: kondrak Date: Sat Jun 21, 2003 1:58am Subject: RE: How to spot a terrorist Reminds me of Popeye Doyle...."Ever pick your feet in Poughkeepsie?"... At 09:30 6/19/2003 -0400, you wrote: >How clueless is this guy. Good thing he works for the US Gov because if he >worked for another government, they would be a threat to the US because >they are >way to STUPID to be effective. >IMHO!!! > >Wayne T Work, Sr. >CISSP >(Work) 203.217.5004 >(Fax) 208-545-4365 >Owner and Sr. Information Systems Security Consultant >Security Gauntlet Consulting >HIPAA Compliance Resource Group >www.securitygauntlet.com >www.hipaact.com > > >-----Original Message----- >From: kirk [mailto:kirk@t...] >Sent: Thursday, June 19, 2003 3:18 AM >To: tscm-l@yahoogroups.com >Subject: [TSCM-L] How to spot a terrorist > > > >"You can easily identify a suspected terrorist," says Epifanio Lambino Jr., >chief of the Philippines' Immigration Bureau's Civil Security Unit. "Order him >to remove his shoes," he instructs. "Does he have athlete's foot? If so, >you may >have someone who has undergone rigid military training." Other telltale signs, >he says, include a scarred chest and calloused hands and elbows from >crawling on >the ground, and "eyes darting from place to place." Philippine immigration >inspectors denied entry to as many as 200 suspected terrorists last year based >on such criteria, Lambino said. (AP) > >-- >Kirk Adirim >TACTRONIX >Tactical Electronics for Critical Missions >468 North Camden Drive >Beverly Hills, CA 90210 USA >E: kirk@t... >T: 323-650-2880 >F: 310-388-5886 >W: www.tactronix.com >-- > >------------------------ Yahoo! Groups Sponsor ---------------------~--> >Looking >for the latest Free IT White Papers? Visit SearchNetworking.com to access over >500 white papers. Get instant access at SearchNetworking.com Today >http://us.click.yahoo.com/.EaHdD/OLNGAA/vitMAA/kgFolB/TM >---------------------------------------------------------------------~-> > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, the hands >acquire shaking, the shaking is a warning. It is by caffeine alone I set my >mind in motion. =================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7481 From: William Knowles Date: Sat Jun 21, 2003 6:05pm Subject: What's the Joint Terrorism Task Force Doing in the Tiny Town of Rachel? http://www.klas-tv.com/Global/story.asp?S=1330758&nav=168XGVQf George Knapp I-Team Exclusive June 20, 2003 FBI agents have confirmed that a search warrant was served Thursday night on the home of a self-described military watchdog in the tiny town of Rachel, near the mysterious Area 51 military base. We've learned this action was initiated by the Joint Terrorism Task Force. The search warrant remains sealed and the FBI won't say what was seized from the home of Rachel resident Chuck Clark. We believe the action was taken because Chuck Clark escorted the I-Team on a tour of the roads surrounding the base. During the visit, he showed us the location of military sensors, hidden on public land. Here's our story. Retired astronomer and desert rat Chuck Clark has a new hobby. He's prowled the hills and deserts of Lincoln County for several years now, has photographed exotic aircraft in the skies, and keeps an eye on the top secret base known as Area 51. He's even written a book about the place. Over the past few months, he's discovered that the military has been installing secret sensor devices on public lands surrounding the base. Using a frequency counter device, he can tell when his vehicle trips a sensor. When that happens, he looks for the hard-to-spot wire atop the device, and then he digs them up, takes pictures, and puts them back. Clark isn't a terrorist or spy but is angered that hikers, four wheelers, or photographers are being monitored by the military on public land, miles from the boundary of the base, which is clearly marked by signs. Chuck Clark says, "It's overkill in my opinion. They have a 25-mile buffer zone around the base. Why they have to put stuff outside the line really escapes me." During the I-Team visit last week, two sensors were located and base security wrote down the plate numbers of our vehicles. We returned five days ago and drove to the rear entrance of Area 51. Two days later, FBI agents, working with Air Force intelligence and the Joint Terrorism Task Force [1], raided Clark's home and seized photos, records and his computer. Is it legal for anyone to touch military sensors hidden on public land? The government doesn't think so, although Clark hasn't been charged with anything, is the military trying to silence this outback gadfly? "They're paranoid about this location and I don't see why?" asks Clark. We asked the BLM if it's legal for the military to put sensing devices out on public land but a spokesman couldn't answer our question? Law enforcement sources say that by handling the sensors, the devices are disabled. So it amounts to destruction of government property. As we mentioned, Clark hasn't been charged. He was out of the state when the warrant was served. Our investigation of the issues involved will continue. [1] http://www.fbi.gov/terrorinfo/counterrorism/partnership.htm *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 7482 From: Mitch D Date: Sat Jun 21, 2003 10:56pm Subject: Re: ruggedized padlocks, any info? One word comes to mind for high quality locks: Medeco second is ABLOY Medeco has been around for years and works well,pricey but high quality. Abloy has a unique line as well,good product,keys are proprietary to Abloy,dont lose em. Hope this helps, Mitch --- Guy Urbina wrote: > Hi list, > > I'm looking for > a rugged, heavy duty padlock that can withstand corrosion, > salt water and > foul weather. Our enclosure is stainless steel NEMA 4X with > tamper proof, > vandal proof screws and hardware. > > I looked at a few websites of the major lock manufacturers, > but I wanted to > get a professional opinion from the list. > > Thanks in advance for the help. > > Best Regards, > > -Guy > > ____________________________________________________________ > Guy Urbina > Defense Sciences Engineering Division > Electronics Engineering > Lawrence Livermore National Laboratory > 7000 East Avenue, Mail Stop L-369 > Livermore, CA 94551 USA > Voice - (925) 422-6460 > Fax - (925) 422-2118 > alpha > page:http://labnet.llnl.gov/cgi-bin/pager_script?PAGERNUM=05461 > email - urbina1@l... > _____________________________________________________________ > > > __________________________________ Do you Yahoo!? SBC Yahoo! DSL - Now only $29.95 per month! http://sbc.yahoo.com 7483 From: Fernando Martins Date: Sun Jun 22, 2003 2:30am Subject: Re: protocol/network analyser software look here, just some well known references http://www.insecure.org/tools.html http://www.sans.org/tools/ http://www.isecom.org/projects/securitytools.htm http://packetstormsecurity.nl/assess.html personaly, my favorites are ethereal (http://www.ethereal.com/) as a free tool for unix/win32, and nai sniffers as commercial products (http://www.nai.com/us/products/sniffer/home.asp). FM ----- Original Message ----- From: "George Shaw" To: Sent: Thursday, June 19, 2003 11:40 PM Subject: [TSCM-L] protocol/network analyser software > > Can anyone suggest a powerful protocol/network analyser software both > hardwired and wireless lan/wan. > -- > George Shaw > > ì Any Sufficiently Advanced Technology > is Indistinguishable from Magicî > ---Arthur C. Clarke > > Mobile: +44 (0) 7740 361 163 > Email: george.shaw@u... > Fax & Voicemail: +44 (0) 871 242 9183 > > > > --- > Outgoing mail is certified Virus Free. > Checked by AVG anti-virus system (http://www.grisoft.com). > Version: 6.0.490 / Virus Database: 289 - Release Date: 16/06/03 > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 7484 From: kondrak Date: Sun Jun 22, 2003 2:33am Subject: Re: How to spot a terrorist Your prob right... At 13:12 6/21/2003 -0400, you wrote: >Naah, your giving him FARRR too much credit. More like Sherriff Buford >Pusser(In >The Heat of The Night),,. SD > >kondrak wrote: > > > Reminds me of Popeye Doyle...."Ever pick your feet in Poughkeepsie?"... 7485 From: Date: Sun Jun 22, 2003 10:33am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7486 From: Date: Sun Jun 22, 2003 10:33am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7487 From: James M. Atkinson Date: Mon Jun 23, 2003 6:34am Subject: George W & Saddam Saddam decided to send George W. a letter in his own writing to let him know that he is still in the game. Bush opened the letter and it appeared to contain a coded message: 370HSSV-0773H . George W. couldn't figure it out so he typed it out and emailed it to Colin Powell. Colin and his aides had no clue either so they sent it to the CIA. No one could solve it so it went to the NSA and then to MIT and NASA and the Secret Service... the list got longer and longer. Eventually they asked Mossad in Israel for help. Capain Moishe Itzak took one look at it and replied:"Tell the President he is looking at the message upside down." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- 7488 From: Mitch D Date: Tue Jun 24, 2003 0:10am Subject: Bug Zapper test Saw it on ebay,the seller posted a test report,quite humorous: http://cgi.ebay.com/ws/eBayISAPI.dllViewItem&item=3032122699&category=14957 enjoy,keep drinks away from the monitor during review ;)..... MD __________________________________ Do you Yahoo!? SBC Yahoo! DSL - Now only $29.95 per month! http://sbc.yahoo.com 7489 From: The Dog's Bollix Date: Tue Jun 24, 2003 0:49am Subject: Re: Bug Zapper test I'm glad the seller owns one. Maybe he won't need to chew on his fingernails from the paranoisa now. __________________________________ Do you Yahoo!? SBC Yahoo! DSL - Now only $29.95 per month! http://sbc.yahoo.com 7490 From: Ocean Group Date: Sat Jun 21, 2003 6:57pm Subject: Sweep Gear I'll give you ten bucks for the whole lot :) And I'll throw in a free pen. For your passwords. _______________ Message: 10 Date: Wed, 18 Jun 2003 08:53:09 -0400 From: "James M. Atkinson" Subject: Sweep Gear For Sale ... and now a word from out sponsors ... I would like to take just a moment and remind the list membership that we have a ton of NEW, USED, and NOS sweep gear for sale. I can provide attractive pricing on tool kits specifically designed for sweep work, audio amplifiers, digital X-Ray systems, high gain antenna's, OSCOR's, ORION's, CPM-700's, broad-band RF radiation monitors, special TSCM filter kits, and a ton of other special products. We also offer a huge amount of COMSEC gear, scrambling and encryption equipment, secure telephones, acoustic noise generators, white noise transducers, and so on. I also have for sale four brand new Radiance thermal imaging systems (very pricey) with the special sweep servos and rails so you can image an entire room though robotics control right into a computer that puts together a huge composite image, and then extracts the thermal anomalies from the composite images digitally. I also have eight USED Rockwell 95V-1 homodyne radio's for VME systems, seven Morrow V9085 VXI based spectrum analyzers (all in a VXI rack, with a high performance HP VXI CPU, plus mass media card, and DVD-R). Also available are some USED high performance HP COMB generators, Eaton impulse generators, Electrometrics '25 EMI receivers (with HP 7132 plotters). I would ask that list members let me know when they need any equipment; you will find it very beneficial and cost effective to buy all of your equipment here. -jma 7491 From: Steve Uhrig Date: Thu Jun 26, 2003 2:24pm Subject: TSCM & related equip FS http://www.swssec.com/equipment_for_sale.html Wide variety of used, demo, tradein, some new, production overrun, new military surplus and miscellaneous surveillance, countersurveillance, communications, test equipment and related items for sale. I also buy equipment and pay fair prices. Can take credit cards and ship to any non-embargoed country. Check my References section while you are there. Holler if questions. If you are considering the purchase of anything along these lines, check my site first. Many on this list have equipped their entire operations from my inventory and saved many thousands at the same time. Lifetime tech support is a part of most sales. If an item is listed as restricted sale, it means exactly that. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7492 From: kondrak Date: Fri Jun 27, 2003 1:32am Subject: Re: Application Anyone else get this unreadable file, your_details.pif? I believe it's a probe for a hostile program. http://www.itc.virginia.edu/desktop/virus/results.php3?virusID=63 Careful... At 16:25 6/26/2003 +0000, you wrote: >Please see the attached zip file for details. 7493 From: gkeenan Date: Fri Jun 27, 2003 4:35am Subject: Re: Re: Application That's the latest variant of the Sobig virus - very nasty piece of work. My Norton has caught it 16 times in the last 48 hours trying to get into my computer using a number of different subject lines and originating email addresses to entice me to open it and let me think it's coming from someone I know. No one's safe from it - one of the email addresses that it came in with was from the DoD Defense Link, to which I subscribe. So be very careful and don't open anything like that. Jerry Keenan ----- Original Message ----- From: kondrak To: TSCM-L@yahoogroups.com Sent: Friday, June 27, 2003 2:32 AM Subject: [TSCM-L] Re: Application Anyone else get this unreadable file, your_details.pif? I believe it's a probe for a hostile program. http://www.itc.virginia.edu/desktop/virus/results.php3?virusID=63 Careful... At 16:25 6/26/2003 +0000, you wrote: >Please see the attached zip file for details. [Non-text portions of this message have been removed] 7494 From: kondrak Date: Fri Jun 27, 2003 0:05pm Subject: Re: Re: Application Yes, thats what I found as well when I ran norton over it, however, it arrived here, sans it's trailing extension that makes it an executable under the winscript program. (filename.pif.ext) the .ext was gone. Im wondering if its an error, or the anti-viri here nipped it off. It didn't appear it was caught until I ran the anti-viri scan over the attachment directory. When it examined the .zip in detail, it found and quarantined it. Strange in any case, its not how the anti-virus here has always worked.....thus, thinking it might be a probe, or a part of the bomb, and another part will follow, fusing it and allowing it to go off. At 01:52 6/27/2003 -0500, you wrote: >I'm lame so I lurk on the list, but don't open the zip or execute it. >Its the wicked stupid sobig.e worm. Update your av software! >Buggers systems thru email and network shares. > >Cheers! >/di >On Fri, 27 Jun 2003 1:42AM -0600, kondrak wrote: >>Anyone else get this unreadable file, your_details.pif? >>I believe it's a probe for a hostile program. >>http://www.itc.virginia.edu/desktop/virus/results.php3?virusID=63 >> >>Careful... >> >> >>At 16:25 6/26/2003 +0000, you wrote: >>>Please see the attached zip file for details. >> >> >> >>======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >>=================================================== TSKS >> >>Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7495 From: Fernando Martins Date: Sun Jun 29, 2003 4:56am Subject: Re: Re: Application that's the sobig worm, that along with the latest 2/3 win32 e-mail virus (Portugal has been one of the most affected places ...), and some latest symantec corp av bugs, had become the joy of my work, since because of a health problem with a colleage I'm now the part-time net admin. Those virii/worms are putting me in shape again regarding managing a lot of boxes, and not just my "pets" here are home ... too much time as security consultant ? :> FM p.s. - I have now a spam list in symantec av so big that it looks like I'm channel manager again in undernet LOL ----- Original Message ----- From: "kondrak" To: Sent: Friday, June 27, 2003 7:32 AM Subject: [TSCM-L] Re: Application > Anyone else get this unreadable file, your_details.pif? > I believe it's a probe for a hostile program. > http://www.itc.virginia.edu/desktop/virus/results.php3?virusID=63 > > Careful... > > > At 16:25 6/26/2003 +0000, you wrote: > >Please see the attached zip file for details. > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 7496 From: kondrak Date: Sun Jun 29, 2003 11:19pm Subject: our favorite virus Hmm...arrived this afternoon with a return address of: torvalds@t... Linus will be pissed! 7497 From: snailmail222000 Date: Wed Jun 25, 2003 8:01pm Subject: My Security Minds versus Malicious Minds Book PURPOSE OF MY BOOK SECURITY MINDS VERSUS MALICIOUS MINDS Power in the hands of the wrong people is dangerous. So a group of people decided to make a difference in the Universe of the Internet. In the two and a half years it took me to write this book to aid others, you will be able to do the same in a matter of a few hours. The long tedious hours of research, exploring and discovering has all been done for you. Brick walls like Backdoors, Trojan Horses, Open Ports and Viruses will no longer be a mystery or obstacle. A new road will be built and lead to safe lanes and disaster free of obstructions you need to fear. At first, the Internet was an object to explore. In my search for ferret information, it lead me to Google Newsgroups. It also lead me to a hornet of hackers and their attempt to rid me off their Newsgroup. To accomplish this, they decided to publish personal information found only on my computer. What started in anger when the hacking was discovered turned into the discovery of how, why and who could do this and get away with such a thing. This book is intended to help people think and realize what can happen to them and their computers. Stories in this book will open your eyes to what has happened to innocent victims. What mayhem is going on with hundreds of thousands of computers that are being used and abused by hackers. In other words, a pathway to hell. Topics to be covered are as follows: Your Personal Computer, the Internet you travel, and the wonderful world of Hackers, included in 69 Chapters, 11,000 pages and 27 megabytes of data. But the most important topic is software applications. Without them, you can get your paper and pencil out and revert back to the 1980's before this wonderful world was introduced to computers. I'm giving you the choice to see what the computer world is really all about, and to help yourself be either the victim or a White Hat computer owner. Your time is important, just remember, I've done all the work for you. Sit back and realize all the knowledge of what the computers and hackers have in store for you. CHAPTERS: 1. WHY I'M WRITING THIS BOOK 2. THE MILLION DOLLAR EXPOSURE 3. THE SECOND MILLION DOLLAR EXPOSURE 4. THE BEST KEPT SECRETS OF THE COMPUTER UNDERGROUND 5. HACKERS SECRET WEAPONS 6. WINDOWS SERVICES YOU MIGHT WANT TO DISABLE 7. INTERNET MISTAKES TO AVOID 8. SETTINGS, CONTROL PANEL AND INTERNET OPTIONS 9. SECURITY CONSULTANTS 10. SECURITY MESSAGE BOARDS FOR OTHERS TO LEARN 11. SOFTWARE APPLICATION UPDATE PATCHES 12. MAKING YOUR COMPUTER SYSTEM SECURE AFTER IT'S BEEN COMPROMISED 13. WAYS TO DISGUISE SOME OF YOUR ACTIVITIES FROM HACKERS 14. INTERNET POSTING ANONYMOUSLY 15. VIRTUAL PRIVATE NETWORK 16. FIREWALL SOFTWARE APPLICATIONS PLUS PARTIAL FIREWALL LOGS 17. BACKDOORS, TROJAN HORSES AND PORT NUMBERS WITH THEIR ASSOCIATED ASSIGNMENTS 18. WEB BASED E-MAIL, HYPERTEXT MARKUP LANGUAGE- HTML EMBEDDED CODE 19. HACKER ACTIVITY: UN-BE-KNOWN AS TO WHY 20. MISCONFIGURED/OPEN NNTP NEWS SERVERS 21. OUR UNIQUE TRACEROUTES 22. PROXY/SOCKS/SQUID SERVERS 23. UNPROTECTED SERVERS REVEALING THEIR WHO, WHAT, WHERE AND HOW 24. YAHOO AND HOTMAIL 25. COMPUTER PROTOCOL LANGUAGES 26. THESE ARE SIGNS TO LOOK FOR TO TELL YOU IF YOUR COMPUTER HAS BEEN COMPROMISED 27. PORT SECURITY CHECKING 28. HACKERS NETSTAT FILE AND BYPASSING A HARDWARE FIREWALL 29. TROJAN HORSE CLEANERS 30. HOW TO SECURE INTERNET BROWSERS 31. INTERNET TRACKING METHODS 32. TRACING THE TRACKEROUTE:: A WHITE PAPER BY ANKIT FADIA - PERMISSION GRANTED 33. HOW OTHERS CAN NUKE YOUR INTERNET SERVICE PROVIDER ACCOUNT 34. INTERNET COOKIES 35. SOFTWARE APPLICATIONS LIKE SAMSPADE, VISUALROUTE AND NEOTRACE 36. DOMAIN NAME SERVER 37. PRIVATE IP NETWORKS 38. WAYS FOR LOCAL AND STATE LAW ENFORCEMENT TO TRAP MASTER MINDS OF THE PEDOPHILE WORLD 39. REVERSE LANGUAGE 40. DANGEROUS WEBSITES 41. AOL/ICQ/MSN/NETSCAPE INSTANT MESSENGER 42. OPEN RELAYS 43. ENCRYPTION 44. THROW AWAY ACCOUNTS 45. BYPASSING THE 30 DAY TRIAL PERIOD OF APPLICATIONS 46. SPAMMERS 47. WHERE MALICIOUS HACKERS LIST THEIR USENET NEWSGROUPS/WEBSITES PRIZED PROXY SERVERS 48. EASY TARGETS FOR HACKERS 49. SMTP SERVER ROAD RUNNER 50. MAN-IN-THE-MIDDLE 51. USER NAME AND E-MAIL ADDRESSES OF EITHER HACKERS OR THEIR FRIENDS 52. NEWSGROUPS MALICIOUS HACKERS SUBSCRIBED TO AND VIEWED 53. WEBSITES HACKERS VISITED 54. PREPAID PHONE CARDS AND LOCAL BULLETIN BOARD SERVICES 55. MIRC AND PIRCH 56. POPULAR REMAILERS MALICIOUS HACKERS LOVE TO USE 57. ACCOMPLISHMENTS SINCE EXPOSING MALICIOUS HACKING ACTIVITY 58. HOW HACKERS APPROVE WHO CAN USE THE COMPROMISED SERVERS AND WHAT DO THEY HAVE TO PERFORM TO GAIN THESE RIGHTS 59. PROFILING CHARACTER TYPES OF MALICIOUS HACKERS 60. WHY I BELIEVE MALICIOUS HACKERS KEPT MY COMPUTER SYSTEMS ALIVE 61. BITING BACK 62. BAITING/SOCIAL ENGINEERING/TROLLING 63. ARP SPOOFING 64. RESOURCES USED WHILE THE COMPUTER SYSTEM WAS COMPROMISED 65. MISCELLANOUS INFORMATION 66. KEY LOGGER 67. THANK YOU LETTERS 68. JOKES MALICIOUS HACKERS SHARED WITH EACH OTHER 69. SNIFFERS AND CIALL SNIFFER EVIDENCE The cost of my CD-ROM media book will be $40.00 USA dollars, payable by Money Order. Presently, the CD-ROM book will be sold in the United States only, until an ISBN number is obtained for export. The CD-ROM book is available in the English language only. My CD-ROM book is written in the following formats: 1. Microsoft Word for Windows 95, version 7.0. If you're using any later version of Word, you can easily open it up to read it. 2. The CD-ROM book is saved in a text format which can be opened in any text application. You can open it using Microsoft Wordpad. To find out how to purchase my CD-ROM book, visit my Website for further details. www.securityminds2003.com 7498 From: A.Lizard Date: Fri Jun 27, 2003 6:56am Subject: Re: Application At 07:34 AM 6/27/03 +0000, you wrote: >Message: 2 > Date: Fri, 27 Jun 2003 02:32:03 -0400 > From: kondrak >Subject: Re: Application > >Anyone else get this unreadable file, your_details.pif? >I believe it's a probe for a hostile program. actually, it *is* a hostile program. >http://www.itc.virginia.edu/desktop/virus/results.php3?virusID=63 > >Careful... Latest Sobig variant. W32.Sobig.E@mm http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.e@mm.html A.Lizard ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -Benjamin Franklin, Historical Review of Pennsylvania, 1753 Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... PGP 8.0 key available by request or keyserver. Download PGP from http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html For new music, try http://www.eliangedeon.com ************************************************************************ 7499 From: Monty Date: Fri Jun 27, 2003 0:17am Subject: Re: Sweep Gear I'll give you twelve bucks and a flag... --- Ocean Group wrote: > I'll give you ten bucks for the whole lot :) > > And I'll throw in a free pen. > > For your passwords. > > _______________ > > Message: 10 > Date: Wed, 18 Jun 2003 08:53:09 -0400 > From: "James M. Atkinson" > Subject: Sweep Gear For Sale > > > ... and now a word from out sponsors ... > > > I would like to take just a moment and remind the > list membership > that we have a ton of NEW, USED, and NOS sweep gear > for sale. > > I can provide attractive pricing on tool kits > specifically designed > for sweep work, audio amplifiers, digital X-Ray > systems, high gain > antenna's, OSCOR's, ORION's, CPM-700's, broad-band > RF radiation > monitors, special TSCM filter kits, and a ton of > other special > products. > > We also offer a huge amount of COMSEC gear, > scrambling and encryption > equipment, secure telephones, acoustic noise > generators, white noise > transducers, and so on. > > I also have for sale four brand new Radiance thermal > imaging systems > (very pricey) with the special sweep servos and > rails so you can > image an entire room though robotics control right > into a computer > that puts together a huge composite image, and then > extracts the > thermal anomalies from the composite images > digitally. > > I also have eight USED Rockwell 95V-1 homodyne > radio's for VME > systems, seven Morrow V9085 VXI based spectrum > analyzers (all in a > VXI rack, with a high performance HP VXI CPU, plus > mass media card, > and DVD-R). > > Also available are some USED high performance HP > COMB generators, > Eaton impulse generators, Electrometrics '25 EMI > receivers (with HP > 7132 plotters). > > I would ask that list members let me know when they > need any > equipment; you will find it very beneficial and cost > effective to buy > all of your equipment here. > > -jma > > __________________________________ Do you Yahoo!? SBC Yahoo! DSL - Now only $29.95 per month! http://sbc.yahoo.com 7500 From: Thomas Shaddack Date: Fri Jun 27, 2003 0:22pm Subject: Re: Re: Application > Yes, thats what I found as well when I ran norton over it, however, it > arrived here, sans it's trailing extension that makes it an executable > under the winscript program. (filename.pif.ext) the .ext was gone. .pif is one of the mile-long list of Microsoft's executable extensions. (We can thank their unwillingness to clearly distinguish between executable code and data for most of contemporary problems. Another crime of them is not showing file extensions by default; this prevents most of the users from recognizing bad extensions even if they'd know them.) > Im wondering if its an error, or the anti-viri here nipped it off. It > didn't appear it was caught until I ran the anti-viri scan over the > attachment directory. When it examined the .zip in detail, it found and > quarantined it. > Strange in any case, its not how the anti-virus here has always > worked.....thus, thinking it might be a probe, or a part of the bomb, and > another part will follow, fusing it and allowing it to go off. This virus is atypical by sending itself as .zip files, sidestepping the detection in mail attachments. That could explain the anomalies. I am including the list of known-dangerous and known-suspicious filename extensions used by a program I wrote to screen our company internal email (a simple POP3 proxy, couple lines of Linux C code). The dangerous extensions shouldn't be ever sent by mail, it's safer to consider them evil. (Especially .pif and .scr are favorite ones for worms, while you won't meet them in 99.99% of legitimate mails.) DANGEROUS: ".PIF",".SCR",".EXE",".COM",".BAT",".LNK",".CEO",".BAS", ".CMD",".CPL",".CRT",".HTA",".JS" ,".JSE",".LNK",".MSI", ".SHB",".SHS",".VB" ,".VBE",".VBS",".WSH" SUSPICIOUS: ".ADE",".ADP",".CHM",".HLP",".INF",".INS",".ISP",".MDB", ".MDE",".MSC",".MSP",".MST",".PCD",".REG",".SCT",".URL", ".WSC",".WSF",".EML",".ZIP" The .zip was added today. You could also add .DOC (and .RTF, which - while harmless - is handed over by idiotic Microsoft Word document handler to DOC handler if its internal structure matches DOC, which allows DOC file (a potential carrier of a macro virus) pose as RTF file) and .XLS, if you are using very old M$ Office which doesn't warn you when document contains macros, and potentially couple other extensions, depending on your threat model. The .eml, the mail-message-as-attachment, was added after one infection that got through in a bounce message sent from a forged address and then delivered to our system. (Then the user opened the attached message, took a curious look at the attachment, and then we had to come and clean the worm.) The safest way, wherever you can afford it, is to use some sane mail client, eg. Pegasus or Eudora. (Or, if you run some real operating system (Linux, BSD, ...) and prefer console over GUI, use pine or mutt.) Hope that helps. :) 7501 From: Thomas Shaddack Date: Sun Jun 29, 2003 5:25pm Subject: Through-wall vision technology http://www.cambridgeconsultants.com/news_pr90.shtml Summary: A low-frequency radar, battery powered, in the size of a laptop computer. Can see through (presumely nonmetallic) walls up to 25 cm thick, can detect positions of objects and persons inside buildings. Range is 5-10 meters, angle of view is up to 120 degrees. 7502 From: James M. Atkinson Date: Mon Jun 30, 2003 10:25am Subject: HOW TO STAY YOUNG HOW TO STAY YOUNG (George Carlin) 1. Throw out nonessential numbers. This includes age, weight and height. Let the doctor worry about them. That is why you pay him/her. 2. Keep only cheerful friends. The grouches pull you down. 3. Keep learning. Learn more about the computer, crafts, gardening, whatever. Never let the brain idle. " An idle mind is the devil's workshop." And the devil's name is Alzheimer's. 4. Enjoy the simple things. 5. Laugh often, long and loud. Laugh until you gasp for breath. 6. The tears happen. Endure, grieve, and move on. The only person who is with us our entire life, is ourselves. Be ALIVE while you are alive. 7. Surround yourself with what you love, whether it's family, pets, keepsakes, music, plants, hobbies, whatever. Your home is your refuge. 8. Cherish your health: If it is good, preserve it. If it is unstable, improve it. If it is beyond what you can improve, get help. 9. Don't take guilt trips. Take a trip to the mall, to the next county, to a foreign country, but NOT to where the guilt is. 10. Tell the people you love that you love them, at every opportunity. AND ALWAYS REMEMBER: Life is not measured by the number of breaths we take, but by the moments that take our breath away. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- From: David Alexander Date: Thu Jun 20, 2002 11:00am Subject: 'do it yourself ray gun' I'm not going to comment. You all know what I'm going to say, just as I know what you will say. Ho Hum: http://www.theregister.co.uk/content/2/6709.html Fancy building your own Klingon Disruptor ? An ex-US Navy engineer has done just that for the bargain price of $500. The gadget fiend has built a 'gun', using readily available hardware that can disable almost any piece of electronic equipment from 20 feet away. It consists of a parabolic reflector, a horn antenna and two ignition coils and is powered by a car battery. When the inventor, David Schriner demonstrated his new toy at the Infowar 99 conference in Washington DC, it disrupted the PA system and two nearby PCs, which needed to be reset even after the 'gun' was switched off. The principle it exploits dates back to Tesla. In essence, the gun shoves a 20 megawatt burst of radio noise through the antenna, which then interferes with nearby electrical equipment, according to US newswire reports. Schriner said the demonstration was intended as a wake up call to the electronics industry. He said he wanted to show that even low-budget saboteurs could inflict serious damage. He claims to have built another machine capable of crashing computers, and cars from a distance of 100 feet. That one cost him less than $300. Permanent damage is rare, Schriner says, but that is not the point. The computers at the conference worked after re-booting. "But if that happens to be a computer in a tank, or in a piece of medical equipment, how long does it take to reboot?" he asks. "By that time you could be dead." (r) It's no good, I can't keep quiet.......I'm sorry. 20 megawatts from a car battery ? _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 5674 From: gkeenan Date: Thu Jun 20, 2002 11:05am Subject: Re: 'do it yourself ray gun' Maybe it's a battery from a Lincoln Navigator? :-) Jerry GPKeenan Co. West Islip, NY 11795-2503 ----- Original Message ----- From: David Alexander To: 'TSCM submissions' Sent: Thursday, June 20, 2002 12:00 PM Subject: [TSCM-L] 'do it yourself ray gun' I'm not going to comment. You all know what I'm going to say, just as I know what you will say. Ho Hum: http://www.theregister.co.uk/content/2/6709.html Fancy building your own Klingon Disruptor ? An ex-US Navy engineer has done just that for the bargain price of $500. The gadget fiend has built a 'gun', using readily available hardware that can disable almost any piece of electronic equipment from 20 feet away. It consists of a parabolic reflector, a horn antenna and two ignition coils and is powered by a car battery. When the inventor, David Schriner demonstrated his new toy at the Infowar 99 conference in Washington DC, it disrupted the PA system and two nearby PCs, which needed to be reset even after the 'gun' was switched off. The principle it exploits dates back to Tesla. In essence, the gun shoves a 20 megawatt burst of radio noise through the antenna, which then interferes with nearby electrical equipment, according to US newswire reports. Schriner said the demonstration was intended as a wake up call to the electronics industry. He said he wanted to show that even low-budget saboteurs could inflict serious damage. He claims to have built another machine capable of crashing computers, and cars from a distance of 100 feet. That one cost him less than $300. Permanent damage is rare, Schriner says, but that is not the point. The computers at the conference worked after re-booting. "But if that happens to be a computer in a tank, or in a piece of medical equipment, how long does it take to reboot?" he asks. "By that time you could be dead." (r) It's no good, I can't keep quiet.......I'm sorry. 20 megawatts from a car battery ? _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5675 From: James M. Atkinson Date: Thu Jun 20, 2002 11:30am Subject: Re: 'do it yourself ray gun' Bwahhhhh, this is really hilarious. The "disrupter" that is mentioned is nothing more then a high voltage broadband signal generator, and is something that has been around since the late 1800's. David Schriner invented nothing, and in fact the FCC would like to talk with him concerning criminal violations of Title 47. Of course anybody with any kind of background in electronics would have intimate knowledge of how such a device works, and would know that non of this involves "secret mysteries" There was not "20 mega-watts" of anything running through the dish, a few hundred watts perhaps, but not mega-watts. In fact the feed horn they used for the demonstration would not have been able to handle any more then a few hundred watts before it started to vaporized. Given the size of and poor construction of the dish the gain was likely below 20 dB. Lets assume the user got lucky and shot 500 watts out of the coils, then the effective power out of the dish would have been about 50,000 watts (20 dB is a hundred fold gain)... but no where near even a half megawatt. Of course when you have a trade show being run by a bankrupt marketing company, who hires convicted felons and mental patients to help run things all kind of wild claims can be made. Actual engineering totally blows away the demonstration as a hoax. Really kind of sad, -jma PS: You can disrupt a CPU with a five watt CB radio if your just a few feet away... further if you have a bad ground. At 5:00 PM +0100 6/20/02, David Alexander wrote: >I'm not going to comment. You all know what I'm going to say, just as I know >what you will say. Ho Hum: > >http://www.theregister.co.uk/content/2/6709.html > > > >Fancy building your own Klingon Disruptor ? An ex-US Navy engineer has done >just that for the bargain price of $500. The gadget fiend has built a 'gun', >using readily available hardware that can disable almost any piece of >electronic equipment from 20 feet away. > >It consists of a parabolic reflector, a horn antenna and two ignition coils >and is powered by a car battery. When the inventor, David Schriner >demonstrated his new toy at the Infowar 99 conference in Washington DC, it >disrupted the PA system and two nearby PCs, which needed to be reset even >after the 'gun' was switched off. > >The principle it exploits dates back to Tesla. In essence, the gun shoves a >20 megawatt burst of radio noise through the antenna, which then interferes >with nearby electrical equipment, according to US newswire reports. > >Schriner said the demonstration was intended as a wake up call to the >electronics industry. He said he wanted to show that even low-budget >saboteurs could inflict serious damage. He claims to have built another >machine capable of crashing computers, and cars from a distance of 100 feet. >That one cost him less than $300. > >Permanent damage is rare, Schriner says, but that is not the point. The >computers at the conference worked after re-booting. "But if that happens to >be a computer in a tank, or in a piece of medical equipment, how long does >it take to reboot?" he asks. "By that time you could be dead." (r) > >It's no good, I can't keep quiet.......I'm sorry. 20 megawatts from a car >battery ? >_______________________________ >David Alexander M.INSTIS >Global Infrastructure Director >Bookham Technology plc >Tel: +44 (0) 1327 356264 >Mobile: +44 (0) 7799 881284 >Fax: +44 (0) 1327 356775 >http://www.bookham.com > > > >======================================================================= >This e-mail is intended for the person it is addressed to only. The >information contained in it may be confidential and/or protected by >law. If you are not the intended recipient of this message, you must >not make any use of this information, or copy or show it to any >person. Please contact us immediately to tell us that you have >received this e-mail, and return the original to us. Any use, >forwarding, printing or copying of this message is strictly prohibited. > >No part of this message can be considered a request for goods or >services. >======================================================================= >Any questions about Bookham's E-Mail service should be directed to >postmaster@b.... > > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5676 From: Matthew Paulsen Date: Thu Jun 20, 2002 2:32pm Subject: RE: 'do it yourself ray gun' http://www.dallas.net/~pevler/jec.htm#Schriner You can read a multitude of his stuff at the link, I love the 2nd sentence. Excerpt below. Thanks, Matt Paulsen Orange Networks LLC - Computers, Networks, Internet and Security http://www.orange-networks.com 503.533.4767 " Statement of Mr. David Schriner before the Joint Economic Committee United States Congress Wednesday, February 25, 1998 "The Design and Fabrication of a Damage Inflicting RF Weapon by 'Back Yard' Methods" Note, this paper reflects the personal views and opinion of the author. The material in this paper has been deemed unclassified by those who hold his security clearances but it does not specifically represent their views. This paper is a very brief statement on the subject and it is written from a non-technical point of view to provide an easy look at the subject manner by non-professional people or groups. Further elaboration on any point can be requested in either a technical format or at a classified level with the proper security restrictions in place. For many years research activities in different countries have focused on the use of radio frequency (RF) waves as a weapon. Most of this work has been titled or described under the title of High Powered Microwave (HPM). Worldwide, large amounts of money have been invested in this technology to support both the military interests but also the industrial heating needs. Like most technologies, with maturity the applications increase and the costs to use it become lower. One primary point of this paper is that as these technologies mature they also become affordable and usable by criminals and terrorists. Most military programs are classified and the general public knows little concerning their nature but as the technology becomes available to criminals and terrorists, it may be directly applied to the infrastructure elements of our society. This paper addresses the question concerning the possibility of certain types of this technology being used against the society. " -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Thursday, June 20, 2002 9:30 AM To: 'TSCM submissions' Subject: Re: [TSCM-L] 'do it yourself ray gun' Bwahhhhh, this is really hilarious. The "disrupter" that is mentioned is nothing more then a high voltage broadband signal generator, and is something that has been around since the late 1800's. David Schriner invented nothing, and in fact the FCC would like to talk with him concerning criminal violations of Title 47. Of course anybody with any kind of background in electronics would have intimate knowledge of how such a device works, and would know that non of this involves "secret mysteries" There was not "20 mega-watts" of anything running through the dish, a few hundred watts perhaps, but not mega-watts. In fact the feed horn they used for the demonstration would not have been able to handle any more then a few hundred watts before it started to vaporized. Given the size of and poor construction of the dish the gain was likely below 20 dB. Lets assume the user got lucky and shot 500 watts out of the coils, then the effective power out of the dish would have been about 50,000 watts (20 dB is a hundred fold gain)... but no where near even a half megawatt. Of course when you have a trade show being run by a bankrupt marketing company, who hires convicted felons and mental patients to help run things all kind of wild claims can be made. Actual engineering totally blows away the demonstration as a hoax. Really kind of sad, -jma PS: You can disrupt a CPU with a five watt CB radio if your just a few feet away... further if you have a bad ground. At 5:00 PM +0100 6/20/02, David Alexander wrote: >I'm not going to comment. You all know what I'm going to say, just as I know >what you will say. Ho Hum: > >http://www.theregister.co.uk/content/2/6709.html > > > >Fancy building your own Klingon Disruptor ? An ex-US Navy engineer has done >just that for the bargain price of $500. The gadget fiend has built a 'gun', >using readily available hardware that can disable almost any piece of >electronic equipment from 20 feet away. > >It consists of a parabolic reflector, a horn antenna and two ignition coils >and is powered by a car battery. When the inventor, David Schriner >demonstrated his new toy at the Infowar 99 conference in Washington DC, it >disrupted the PA system and two nearby PCs, which needed to be reset even >after the 'gun' was switched off. > >The principle it exploits dates back to Tesla. In essence, the gun shoves a >20 megawatt burst of radio noise through the antenna, which then interferes >with nearby electrical equipment, according to US newswire reports. > >Schriner said the demonstration was intended as a wake up call to the >electronics industry. He said he wanted to show that even low-budget >saboteurs could inflict serious damage. He claims to have built another >machine capable of crashing computers, and cars from a distance of 100 feet. >That one cost him less than $300. > >Permanent damage is rare, Schriner says, but that is not the point. The >computers at the conference worked after re-booting. "But if that happens to >be a computer in a tank, or in a piece of medical equipment, how long does >it take to reboot?" he asks. "By that time you could be dead." (r) > >It's no good, I can't keep quiet.......I'm sorry. 20 megawatts from a car >battery ? >_______________________________ >David Alexander M.INSTIS >Global Infrastructure Director >Bookham Technology plc >Tel: +44 (0) 1327 356264 >Mobile: +44 (0) 7799 881284 >Fax: +44 (0) 1327 356775 >http://www.bookham.com > > > >======================================================================= >This e-mail is intended for the person it is addressed to only. The >information contained in it may be confidential and/or protected by >law. If you are not the intended recipient of this message, you must >not make any use of this information, or copy or show it to any >person. Please contact us immediately to tell us that you have >received this e-mail, and return the original to us. Any use, >forwarding, printing or copying of this message is strictly prohibited. > >No part of this message can be considered a request for goods or >services. >======================================================================= >Any questions about Bookham's E-Mail service should be directed to >postmaster@b.... > > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell ---------------------------------------------------------------------------- ---------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5677 From: Aimee Farr Date: Thu Jun 20, 2002 5:53pm Subject: RE: Why US? I said: >It is unwise to attack an enemy without a plan. Not your plan, the enemy needs a plan. If the > enemy lacks a plan, you >have to give them one. Thus, it's often impossible to surprise > somebody that isn't prepared. David Alexander wrote: > There is an old military axiom that says: 'No plan ever survives first contact with the enemy' which supports your proposition. I vote for it. ======= David, let me remind you: THIS IS THE U.S.A., and we must repeat your past mistakes on our own, while you sit over there and try to help us, and we ignore you. :-] I picked up a copy of The World War, c. 1918 -- the introductory flap: The Cathedral at Rheims. I was reminded that the ban on civilian bombing is said to have broken down because neither side could target accurately so as to control the situation, and neither side realized it. Each side thought they were bombing what they intended; each side thought that they were not bombing the other's civilians -- but the enemy was clearly intentionally bombing theirs. As a result, the restraints could not be maintained. Worse, the Germans initially attributed British compliance as a reciprocal gesture for their "kindness," rather than a lack of planes. I started thinking about our terrorism policy in terms of that logic pattern...and then decided I didn't want to. What follows is the American version of The Dichotomy of Coordination of Compromise. For us, the distinction between a plan, and a party invitation, can involve a delicate balance: http://www.nytimes.com/2002/06/19/opinion/19HALL.html?todaysheadlines Before Congress makes any decision on where to store this country's nuclear waste, it must first determine whether that waste can be safely transported on our highways, waterways and railways. Congress must require that the Department of Energy conduct a comprehensive risk assessment considering all potential hazards, including terrorist threats. Congress must also demand that the department develop a transportation safety plan that outlines steps to be taken in the event of terrorist acts and accidents. And there must be full-scale testing of the containers to be used for transporting this waste. The transportation plan must be created in an open process that includes input from state and local officials and the public. With our enemy in active pursuit of dirty bombs, our considerations about nuclear waste management have to change. [...] ~Aimee 5678 From: William Knowles Date: Fri Jun 21, 2002 3:36am Subject: FBI investigating Las Vegas man's claim he overheard attack threat http://story.news.yahoo.com/news?tmpl=story&u=/ap/20020621/ap_wo_en_po/us_vegas_threat_1 Fri June 21, 12:15 AM ET By KEN RITTER, Associated Press Writer LAS VEGAS - The FBI said it is investigating a Nevada man's claim that he picked up a conversation in Arabic on his cell phone during which someone said there would be a "hit" on the "day of freedom." "We've initiated a full-scale investigation to determine if this constitutes a threat, and if so, what kind of threat," said FBI Special Agent Daron Borst in Las Vegas on Thursday. Borst said agents have interviewed the man who reported the conversation, Michael Hamdan, and planned to question him again Friday. Hamdan, 54, said he's a naturalized U.S. citizen who was born in Lebanon and speaks Arabic. Hamdan said he was trying to call his wife on his cell phone Saturday when he heard Arabic voices. "They said in Arabic, not even a word of English, 'We are in the city of corruption, the city of prostitution, the city of gambling, the city of unbelievers,'" Hamdan told The Associated Press late Thursday. '"We are going to hit them on the day of freedom.'" Hamdan said the call lasted about 90 seconds before the line went dead. He said he believes the men were talking about July Fourth. "I was frozen, absolutely cold," Hamdan said. "I was sweating. I couldn't believe what I heard." Hamdan said he reported what he heard to the FBI early Sunday morning. Hamdan, who is married and has two children, described himself as a semiretired businessman. He said he moved to the United States in 1976. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 5679 From: ed Date: Thu Jun 20, 2002 11:56am Subject: Re: 'do it yourself ray gun' 20MW is a meaningless figure without a pulse width figure to go with it. a large electrolytic capacitor could store enough energy from a large car battery to deliver a short 20MW pulse (we're talking microseconds here.) it's doubtful this particular device posed any credible threat, but DOD supposedly spent $950,000 for a similar device: http://www.empshield.com/emp/emp5.htm (scroll down from the 12th paragraph.) -ed At 05:00 PM 6/20/02 +0100, you wrote: >I'm not going to comment. You all know what I'm going to say, just as I know >what you will say. Ho Hum: > >http://www.theregister.co.uk/content/2/6709.html > > > >Fancy building your own Klingon Disruptor ? An ex-US Navy engineer has done >just that for the bargain price of $500. The gadget fiend has built a 'gun', >using readily available hardware that can disable almost any piece of >electronic equipment from 20 feet away. > >It consists of a parabolic reflector, a horn antenna and two ignition coils >and is powered by a car battery. When the inventor, David Schriner >demonstrated his new toy at the Infowar 99 conference in Washington DC, it >disrupted the PA system and two nearby PCs, which needed to be reset even >after the 'gun' was switched off. > >The principle it exploits dates back to Tesla. In essence, the gun shoves a >20 megawatt burst of radio noise through the antenna, which then interferes >with nearby electrical equipment, according to US newswire reports. > >Schriner said the demonstration was intended as a wake up call to the >electronics industry. He said he wanted to show that even low-budget >saboteurs could inflict serious damage. He claims to have built another >machine capable of crashing computers, and cars from a distance of 100 feet. >That one cost him less than $300. > >Permanent damage is rare, Schriner says, but that is not the point. The >computers at the conference worked after re-booting. "But if that happens to >be a computer in a tank, or in a piece of medical equipment, how long does >it take to reboot?" he asks. "By that time you could be dead." (r) > >It's no good, I can't keep quiet.......I'm sorry. 20 megawatts from a car >battery ? >_______________________________ >David Alexander M.INSTIS >Global Infrastructure Director >Bookham Technology plc >Tel: +44 (0) 1327 356264 >Mobile: +44 (0) 7799 881284 >Fax: +44 (0) 1327 356775 >http://www.bookham.com > > > >======================================================================= >This e-mail is intended for the person it is addressed to only. The >information contained in it may be confidential and/or protected by >law. If you are not the intended recipient of this message, you must >not make any use of this information, or copy or show it to any >person. Please contact us immediately to tell us that you have >received this e-mail, and return the original to us. Any use, >forwarding, printing or copying of this message is strictly prohibited. > >No part of this message can be considered a request for goods or >services. >======================================================================= >Any questions about Bookham's E-Mail service should be directed to >postmaster@b.... > > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5680 From: greendots . Date: Thu Jun 20, 2002 9:16pm Subject: Re: 'do it yourself ray gun' 1 car battery from your garage - $0 1 old spark plug from your last tune-up - $0 1 ignition coil from your junk box - $0 1 zinc plated steel trash can lid that landed in your yard after the last wind storm - $0 The joy of disrupting radio communications for blocks around -- Priceless. -- >From: "James M. Atkinson" >To: "'TSCM submissions'" >Subject: Re: [TSCM-L] 'do it yourself ray gun' >Date: Thu, 20 Jun 2002 12:30:21 -0400 > >Bwahhhhh, this is really hilarious. > >The "disrupter" that is mentioned is nothing more then a high voltage >broadband signal generator, and is something that has been around >since the late 1800's. David Schriner invented nothing, and in fact >the FCC would like to talk with him concerning criminal violations of >Title 47. > >Of course anybody with any kind of background in electronics would >have intimate knowledge of how such a device works, and would know >that non of this involves "secret mysteries" > >There was not "20 mega-watts" of anything running through the dish, a >few hundred watts perhaps, but not mega-watts. In fact the feed horn >they used for the demonstration would not have been able to handle >any more then a few hundred watts before it started to vaporized. > >Given the size of and poor construction of the dish the gain was >likely below 20 dB. Lets assume the user got lucky and shot 500 watts >out of the coils, then the effective power out of the dish would have >been about 50,000 watts (20 dB is a hundred fold gain)... but no >where near even a half megawatt. > >Of course when you have a trade show being run by a bankrupt >marketing company, who hires convicted felons and mental patients to >help run things all kind of wild claims can be made. > >Actual engineering totally blows away the demonstration as a hoax. > >Really kind of sad, > >-jma > > >PS: You can disrupt a CPU with a five watt CB radio if your just a >few feet away... further if you have a bad ground. > > > > >At 5:00 PM +0100 6/20/02, David Alexander wrote: > >I'm not going to comment. You all know what I'm going to say, just as I >know > >what you will say. Ho Hum: > > > >http://www.theregister.co.uk/content/2/6709.html > > > > > > > >Fancy building your own Klingon Disruptor ? An ex-US Navy engineer has >done > >just that for the bargain price of $500. The gadget fiend has built a >'gun', > >using readily available hardware that can disable almost any piece of > >electronic equipment from 20 feet away. > > > >It consists of a parabolic reflector, a horn antenna and two ignition >coils > >and is powered by a car battery. When the inventor, David Schriner > >demonstrated his new toy at the Infowar 99 conference in Washington DC, >it > >disrupted the PA system and two nearby PCs, which needed to be reset even > >after the 'gun' was switched off. > > > >The principle it exploits dates back to Tesla. In essence, the gun shoves >a > >20 megawatt burst of radio noise through the antenna, which then >interferes > >with nearby electrical equipment, according to US newswire reports. > > > >Schriner said the demonstration was intended as a wake up call to the > >electronics industry. He said he wanted to show that even low-budget > >saboteurs could inflict serious damage. He claims to have built another > >machine capable of crashing computers, and cars from a distance of 100 >feet. > >That one cost him less than $300. > > > >Permanent damage is rare, Schriner says, but that is not the point. The > >computers at the conference worked after re-booting. "But if that happens >to > >be a computer in a tank, or in a piece of medical equipment, how long >does > >it take to reboot?" he asks. "By that time you could be dead." (r) > > > >It's no good, I can't keep quiet.......I'm sorry. 20 megawatts from a car > >battery ? > >_______________________________ > >David Alexander M.INSTIS > >Global Infrastructure Director > >Bookham Technology plc > >Tel: +44 (0) 1327 356264 > >Mobile: +44 (0) 7799 881284 > >Fax: +44 (0) 1327 356775 > >http://www.bookham.com > > > > > > > >======================================================================= > >This e-mail is intended for the person it is addressed to only. The > >information contained in it may be confidential and/or protected by > >law. If you are not the intended recipient of this message, you must > >not make any use of this information, or copy or show it to any > >person. Please contact us immediately to tell us that you have > >received this e-mail, and return the original to us. Any use, > >forwarding, printing or copying of this message is strictly prohibited. > > > >No part of this message can be considered a request for goods or > >services. > >======================================================================= > >Any questions about Bookham's E-Mail service should be directed to > >postmaster@b.... > > > > > > _________________________________________________________________ Join the worldís largest e-mail service with MSN Hotmail. http://www.hotmail.com 5681 From: David & Lisa Younce Date: Fri Jun 21, 2002 7:28am Subject: Spy Pictures Air on Satellite TV http://www.public-i.org/dtaweb/report.asp?ReportID=189&L1=10&L2=10&L3=0&L4=0 &L5=0v June 14 ≠ A British satellite enthusiast has discovered that anyone can tune in live to U.S. spy plane photo transmissions over the Balkans. John Locker said the freely available pictures by both manned spy planes and drones can pinpoint a location to within six feet. "It's frightening ≠ I am amazed," he told Reuters on Thursday. "Even before September 11, this is not the sort of stuff that should be shown openly." Locker said he had spent the last seven months alerting NATO and U.S. military commanders about the free availability of the pictures but just met with the answer: "So What?" NATO said it was not concerned about any possible security breaches but American officials said plans were in hand to encrypt the data. Locker, who picked up the broadcast from the Telstar satellite over Brazil at home on his satellite dish, stressed he was not tapping into anything. "This is not an intercept," he said. "I am not a hacker. This is free to air programming." "I would question if this could put troops at risk on the ground. Those pictures are within real time of three seconds," he said. "It is just stunning." Locker is a freelance journalist who writes for satellite communications magazines. He said pictures he has seen covered military exercises on the ground in Macedonia and further north in the Sarajevo area in Bosnia. Clearly visible were troops on the ground, armored personnel carriers and a helicopter whizzing underneath the camera. Viewers tuning into the satellite this week were reported to have been able to watch a security alert around the U.S. Army's headquarters at Camp Bondsteel in Kosovo. Last week, the spy plane provided airborne surveillance for a heavily protected patrol on the Macedonian-Kosovo border near Skopje. "We can see dozens of satellites in the sky," he said. "This just happened to pop up on one of the satellites last November. It appeared to me to be of military origin." The pictures have been broadcast through a satellite over Brazil. Clips from the feed, which are not encrypted, have been transmitted by the International Consortium of Investigative Journalists on their Web site. Richard Perle, chairman of the Pentagon's Defense Policy Board, told the BBC plans were now in hand to encrypt the data. "We have discovered in the period since September 11 how important this sort of real-time intelligence is," he said. "Now we are making much better use of this kind of information and it will make sense to encrypt it in the future. There are plans to encrypt this data." Asked to comment on the broadcasts, a NATO spokesman in Brussels told Reuters: "This is a U.S. issue. We are aware of it but it is not new. It was a decision made by the United States to treat this imagery as unclassified material and to put it on a commercial satellite...This is a decision they made and we are content that they are following appropriate levels of security." Major Bill Bigelow, a spokesman for the U.S. European Command in Germany, said the images did not constitute intelligence. "Raw information such as that video does not mean intelligence," he said. "Intelligence means analysis of data that comes from many different sources." 5682 From: zack <10-33@c...> Date: Fri Jun 21, 2002 9:08am Subject: Why us ?? Those who don't study the past will repeat its errors. Those who do study it will find OTHER ways to err. http://www.copscops.com/murphys.htm At 12:56 PM 6/21/2002 +0000, you wrote: >I said: > >It is unwise to attack an enemy without a plan. Not your plan, the enemy >needs a plan. If the > > enemy lacks a plan, you >have to give them one. Thus, it's often >impossible to surprise > > somebody that isn't prepared. > >David Alexander wrote: > > There is an old military axiom that says: 'No plan ever survives first >contact with the enemy' which supports your proposition. I vote for it. visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." George W Bush God Bless The USA .. NEVER forget 9-11-01 http://www.copscops.com/blessusa.htm [Non-text portions of this message have been removed] 5683 From: Date: Fri Jun 21, 2002 9:36am Subject: Re: FBI investigating Las Vegas man's claim he overheard attack threat How did he hear it on his cell phone? The days of analog frequency re-use crossover are gone, aren't they? Sgt. Kirk Sewell 500 Iles Park Place, Suite 300 Springfield, IL 62718 (217)524-6079 5684 From: William Knowles Date: Fri Jun 21, 2002 11:35am Subject: Re: FBI investigating Las Vegas man's claim he overheard attack threat On Fri, 21 Jun 2002 sewellr@i... wrote: > How did he hear it on his cell phone? The days of analog frequency > re-use crossover are gone, aren't they? As I understand it, its pretty rare, but still happens. I used to have Sprint PCS for service, with it I would get a crossed signal every so often and I would cringe thinking that some of my conversations might be crossed in Chicago which was a very oversold marketplace. William Knowles wk@c... > Sgt. Kirk Sewell > 500 Iles Park Place, Suite 300 > Springfield, IL 62718 > (217)524-6079 *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 5685 From: iDEN-i100 Date: Fri Jun 21, 2002 1:04pm Subject: College degree benefits police This sounds like a repeat- http://www.sun-sentinel.com/news/local/palmbeach/sfl-bb21justicejun21.story?coll=sfla%2Dnews%2Dpalm -- [Non-text portions of this message have been removed] 5686 From: A Grudko Date: Fri Jun 21, 2002 0:31pm Subject: FBI investigating - Original Message - From: > > How did he hear it on his cell phone? The days of analog frequency re-use > crossover are gone, aren't they? I wondered about that too but as I know nothing about US cellphones I kept quiet. If it was a cell phone I thought he might have been dialling to a land line number which had a crossed connection. Or the 'conspiritors' might have had his cell number on speed dial and accidentally hit the button to make a connection, 'bugging' themselves - which happens frequently - but that implies that he knew them and he becomes a suspect! And of course there's a chance that the Service Provider would have the caller's ID on record. Or 'they' might have accidentally dialled his number at random (the 'phone in the pocket syndrome') but what are the chances that they would unknowingly dial a 10 digit number that happens to come out to an Arab speaker. Maybe he's an oportunist who thinks July 4 is an obvious target date. If an incident happens he says 'I told you so' and gets paid millions to be on Opra and in the gutter press. If nothing happens he can either keep quiet and the world forgets OR he claims his info. stopped a terror act. Just my cynical thought for the weekend. Andy Grudko (British) - D.P.M., Grad I.S, South Africa - PSIRA investigators Reg. No. 8642 Grudko Associates - www.grudko.com , andy@g... . Est. 1981. International business intelligence and investigations TO CONTACT US: (+27 12) 244 0255 - 244 0256 (Fax). ICQ : 146498943. Netmeeting : agrudko@h... IPA, SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust When you need it done right - first time 5687 From: Paolo Sfriso Date: Sat Jun 22, 2002 7:43am Subject: How to find hidden Cameras Dear Collegues. The following link is for a recent and interesting 36 page essay on how to find hidden cameras. http://www.franken.de/users/tentacle/papers/hiddencams.pdf Kind Regards. Your Italian Conneciton. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 5688 From: Michael Puchol Date: Sat Jun 22, 2002 5:40am Subject: Fw: FBI investigating This investigation shouldn't take up much time - all he needs to tell the FBI is where he was, and what cell carrier he was using, date and approx. time. Now, I believe that in the old analog cell systems, crossovers could happen by a) internal crossovers in the cell's switching systems, or b) by interference from a nearby cell - so, if we have the cell, and surrounding cells, a date and approximate time, the FBI *should* be able to grab a log of all calls that have gone on in those cells, and go from there. If the crossover happened at the landline he was calling, then that's different, but should also be somewhat traceable. Here in Spain we hve a problem with these sort of things, because now you can buy pre-paid phones with cash, which cannot be traced to a name - unless physically tracked and found. These are the types of phones terrorists use to coordinate between themselves, call claiming responsibility for actions & such, and remotely detonating explosives. All the best, Mike > ----- Original Message ----- > From: "A Grudko" > To: > Sent: Friday, June 21, 2002 7:31 PM > Subject: [TSCM-L] FBI investigating > > > > - Original Message - > > From: > > > > How did he hear it on his cell phone? The days of analog frequency > re-use > > > crossover are gone, aren't they? > > > > I wondered about that too but as I know nothing about US cellphones I kept > > quiet. > > > > If it was a cell phone I thought he might have been dialling to a land > line > > number which had a crossed connection. > > > > Or the 'conspiritors' might have had his cell number on speed dial and > > accidentally hit the button to make a connection, 'bugging' themselves - > > which happens frequently - but that implies that he knew them and he > becomes > > a suspect! And of course there's a chance that the Service Provider would > > have the caller's ID on record. > > > > Or 'they' might have accidentally dialled his number at random (the 'phone > > in the pocket syndrome') but what are the chances that they would > > unknowingly dial a 10 digit number that happens to come out to an Arab > > speaker. > > > > Maybe he's an oportunist who thinks July 4 is an obvious target date. If > an > > incident happens he says 'I told you so' and gets paid millions to be on > > Opra and in the gutter press. If nothing happens he can either keep quiet > > and the world forgets OR he claims his info. stopped a terror act. > > > > Just my cynical thought for the weekend. > > > > Andy Grudko (British) - D.P.M., Grad I.S, South Africa - PSIRA > investigators > > Reg. No. 8642 > > Grudko Associates - www.grudko.com , andy@g... . Est. 1981. > > International business intelligence and investigations > > TO CONTACT US: (+27 12) 244 0255 - 244 0256 (Fax). ICQ : 146498943. > > Netmeeting : agrudko@h... > > IPA, SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust > > When you need it done right - first time > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > 5689 From: Fernando Martins Date: Sat Jun 22, 2002 11:43am Subject: RE: FBI investigating > Here in Spain we hve a problem with these sort of things, > because now you can buy pre-paid phones with cash, which > cannot be traced to a name - unless physically tracked and > found. These are the types of phones terrorists use to > coordinate between themselves, call claiming responsibility > for actions & such, and remotely detonating explosives. With or without those kind of phones, that even if not available in Spain they are available in Portugal for some years now, what puts just some miles in the middle, terrorists in Spain always were able to do that, so my guess is the problem dont rely on phones ... And I'm worried about it since bombs start to explode (like this week) in places where I use to go, like Fuengirola or Marbella :( It's a tool for hackers too ... But that's not new also. What's a new problem, and it is already a problem here, regarding phones and cellphones (well, any comm's) is that Spain must put his eyes on imigrants from Bearland ... FM 5690 From: David Alexander Date: Mon Jun 24, 2002 4:25am Subject: Re: er why us ? From: "Aimee Farr" Subject: RE: Why US? >I said: >It is unwise to attack an enemy without a plan. Not your plan, the >enemy needs a plan. If the enemy lacks a plan, you >have to give them one. Thus, it's often > impossible to surprise somebody that isn't prepared. > >David Alexander wrote: > There is an old military axiom that says: 'No plan ever survives first >contact with the enemy' which supports your proposition. I vote for it. > >======= > >David, let me remind you: THIS IS THE U.S.A., and we must repeat your past mistakes on our own, while you sit over there >and try to help us, and we ignore you. :-] Er, you already did that in a far-away place called Vietnam. If you _still_ have not learned that lesson, I will be over on the next plane with a pea-shooter to 're-claim the lost colonies' <6 feet wide grin> regards _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 5691 From: kondrak Date: Sat Jun 22, 2002 4:53pm Subject: Jamming authorized: Wouldn't count on that cell phone in Canada..... >Jamming of radio signals authorized > >Special permission for RCMP, military >restricted to G8 summit, Pope's visit > >By PAUL WALDIE > >Friday, June 21, 2002 ≠ Print Edition, Page A1 > >TORONTO -- The Canadian military and the RCMP have been given special >authorization to jam radio and cellphone signals during the G8 Summit >next week and the Pope's visit to Canada in July. > >It's the first time police or the military have ever been allowed to >block signals, an official said. > >The authorization allows the Department of National Defence and the RCMP >to use jamming devices around Calgary and Kananaskis, Alta., from June >17 to June 29 for the summit of leaders from Group of Eight nations. >They will have the same power to jam signals in Toronto from July 16 to >July 31 -- the Pope is scheduled to arrive in Canada July 23 and depart >July 29, with three Toronto appearances in between. > >RCMP spokesman Corporal BenoÓt Desjardins said jamming is an important >part of the security measures for both events. > >"The RCMP must ensure the safety and security of those attending," he >said yesterday. > >"It could be used, for example, if there was threat of a detonation of >some type of a remote-controlled device. We could jam the frequencies to >make sure nobody could send a signal to that bomb." > >He did not know, however, how the jamming would affect cell phones or >commercial radio transmissions. > >The order, signed by the Minister of Industry on June 6, exempts the >army and police from provisions of the Radiocommunication Act, which >prohibits "the interference with or obstruction of radiocommunication >without lawful excuse." > >The exemption "will provide a way to address the problematic application >of the prohibitions," the order says. > >It specifies that "every reasonable effort shall be made to confine or >restrict to the extent possible interference with or obstruction of a >radiocommunication . . . to the smallest physical area, the fewest >number of frequencies and the minimum duration required to accomplish >the objectives of the interference or obstruction." > >David Warnes, a senior adviser in Industry Canada's telecommunications >branch, said yesterday that it is the first time this kind of order has >been granted. > >He added that cellphone jammers are illegal in Canada, but the >department will soon release a policy on the devices. > >The department held public consultations on cellphone jammers last year >and it is considering permitting them in theatres, hospitals and other >public places. Jamming devices are also illegal in the United States, >but there is a growing underground market for the devices, which can be >bought for about $2,200. >A survey of 2,000 people last year by Decima Research found about 50 per >cent support for jammers in public places. > >Copyright © 2002 Bell Globemedia Interactive Inc. All Rights Reserved. 5692 From: Thomas Habets Date: Mon Jun 24, 2002 10:21am Subject: Re: FBI investigating Las Vegas man's claim he overheard attack threat -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Friday 21 June 2002 10:36, William Knowles wrote: > LAS VEGAS - The FBI said it is investigating a Nevada man's claim that > he picked up a conversation in Arabic on his cell phone during which > someone said there would be a "hit" on the "day of freedom." In case you haven't seen it and are interrested, it seems the FBI didn't believe him. http://www.cnn.com/2002/US/06/21/cellphone.plot/index.html WASHINGTON (CNN) -- A man who told the FBI that he overheard a cell phone conversation about a possible Fourth of July terrorist attack in Las Vegas is "not credible," the FBI said late Friday. [...] FBI Special Agent Daron Borst told CNN the probe was "substantially complete" after agents spent four and a half hours questioning Michael Hamdan and giving him a polygraph test Friday. Borst declined to discuss results of the test or elaborate further about the investigation. While aftonbladet.se (Swedish) reports he failed the polygraph: "Men det avf‰rdas efter ett misslyckat lˆgndetektortest, uppger AP." translation "But AP states [the report] was dismissed after a failed liedetector test." http://www.aftonbladet.se/vss/nyheter/story/0,2789,178302,00.html - --------- typedef struct me_s { char name[] = { "Thomas Habets" }; char email[] = { "thomas@h..." }; char kernel[] = { "Linux 2.4" }; char *pgpKey[] = { "http://darkface.pp.se/~thompa/pubkey.txt" }; char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; } me_t; -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE9FzkkKGrpCq1I6FQRArtxAKD+v6vsKEab5PWUXG4fV3UOmDPjYwCgiraj YZQbvK5NXCxgn+SAdnHQFK0= =YH0y -----END PGP SIGNATURE----- 5693 From: Michael Puchol Date: Mon Jun 24, 2002 2:56pm Subject: Re: Jamming authorized: Well, in Spain we've had jammers installed in government buildings & official vehicles for some time now - they basically generate broadband noise, use huge amounts of electricity (you can't have them on without the car running, they munch batteries that fast) - but leave a gap in the GSM band, so the whole purpose of the jammer is defeated... I've been next to these official vehicles a few times, and all rigs went dead, even the digital (Tetra) ones, but I could still use my cellphone....I guess the officials like to live, but not unless they can use their phones. All the best, Mike P.S. all this without any formal telecomms agency approval or authorisation...government, they can do what they like :-) ----- Original Message ----- From: "kondrak" To: Sent: Saturday, June 22, 2002 11:53 PM Subject: [TSCM-L] Jamming authorized: > Wouldn't count on that cell phone in Canada..... > > > > >Jamming of radio signals authorized > > > >Special permission for RCMP, military > >restricted to G8 summit, Pope's visit > > > >By PAUL WALDIE > > > >Friday, June 21, 2002 ≠ Print Edition, Page A1 > > > >TORONTO -- The Canadian military and the RCMP have been given special > >authorization to jam radio and cellphone signals during the G8 Summit > >next week and the Pope's visit to Canada in July. > > > >It's the first time police or the military have ever been allowed to > >block signals, an official said. > > > >The authorization allows the Department of National Defence and the RCMP > >to use jamming devices around Calgary and Kananaskis, Alta., from June > >17 to June 29 for the summit of leaders from Group of Eight nations. > >They will have the same power to jam signals in Toronto from July 16 to > >July 31 -- the Pope is scheduled to arrive in Canada July 23 and depart > >July 29, with three Toronto appearances in between. > > > >RCMP spokesman Corporal BenoÓt Desjardins said jamming is an important > >part of the security measures for both events. > > > >"The RCMP must ensure the safety and security of those attending," he > >said yesterday. > > > >"It could be used, for example, if there was threat of a detonation of > >some type of a remote-controlled device. We could jam the frequencies to > >make sure nobody could send a signal to that bomb." > > > >He did not know, however, how the jamming would affect cell phones or > >commercial radio transmissions. > > > >The order, signed by the Minister of Industry on June 6, exempts the > >army and police from provisions of the Radiocommunication Act, which > >prohibits "the interference with or obstruction of radiocommunication > >without lawful excuse." > > > >The exemption "will provide a way to address the problematic application > >of the prohibitions," the order says. > > > >It specifies that "every reasonable effort shall be made to confine or > >restrict to the extent possible interference with or obstruction of a > >radiocommunication . . . to the smallest physical area, the fewest > >number of frequencies and the minimum duration required to accomplish > >the objectives of the interference or obstruction." > > > >David Warnes, a senior adviser in Industry Canada's telecommunications > >branch, said yesterday that it is the first time this kind of order has > >been granted. > > > >He added that cellphone jammers are illegal in Canada, but the > >department will soon release a policy on the devices. > > > >The department held public consultations on cellphone jammers last year > >and it is considering permitting them in theatres, hospitals and other > >public places. Jamming devices are also illegal in the United States, > >but there is a growing underground market for the devices, which can be > >bought for about $2,200. > >A survey of 2,000 people last year by Decima Research found about 50 per > >cent support for jammers in public places. > > > >Copyright © 2002 Bell Globemedia Interactive Inc. All Rights Reserved. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5694 From: Aimee Farr Date: Mon Jun 24, 2002 6:23pm Subject: RE: Re: Please ...Russia > It's just that > his image is > blurring. Well, don't I eat crow. http://www.russiajournal.com/news/index.shtml?nd=13889#n13889 They always liked to show the boot. These days, the boot is on their backside. New model: a bunch of men, standing in a circle, holding each other's privates, eyeing each other suspiciously? So much for bean-counting! http://www.steelmedia.com/steel-balls-grades.htm ~Aimee 5695 From: Shawn Hughes Date: Mon Jun 24, 2002 9:16pm Subject: new interference source Subject: Devices that will jam police radios Some vendors at various electronic shows and mall kiosks are using a device to display those flashing cell antenna lights. The novelty item apparently attaches to a standard cell phone antenna and flashes whenever a radio wave is transmitted around it. The problem with the display is that it emits a signal that totally disrupts the operation of 800 MHz radios and cell phones using that band within a 100-foot radius. According to several sources, this item is quite the rage with the teenage populous. The display resembles a Motorola battery bank charger and can display up to 16 of the flashing antennas (No photo available). These devices are being smuggled into this country from China and are in violation of FCC rules and regulations (see the attached notice from the FCC). Any of the devices without a permanently affixed label stating, E2809Ccompliance to FCC Part 15 requirementsE2809D is in violation and can be seized and forfeited to the U.S. Government. 5696 From: David Alexander Date: Tue Jun 25, 2002 7:16am Subject: Royal security jeopardized by eavesdropper From the www.bbc.co.uk news site today: The safety of the Royal Family and top politicians is at risk because classified security details are being published on the internet, it has been revealed. Radio scanning enthusiast Paul Wey is intercepting Special Branch and other communications and publishing their details on internet news groups, BBC Radio 4's Today programme has learned. An intelligence source said Mr Wey was a "menace", whose actions could help terrorists commit atrocities and may have already been used to counter police operations. Liberal Democrat home affairs spokesman Simon Hughes said the government must consider banning radio scanners, which are currently illegal to use but not to own. 'Limited harm' Mr Wey, from Hertford, told Today he had a list of frequencies used by security for any big events or organisations in London. He admitted that what he was doing was illegal, but denied the information he was publishing would be "gold dust" to potential terrorists. He said: "They would be aware of these things whether I published them or not", adding that the harm being done to national security was "limited".M r Wey suggested that his activities could prompt the authorities to take better care of security - for instance by ensuring that Special Branch's radio equipment was updated as it should be. Restricted The intelligence source said Mr Wey and his website were "a severe danger to the public and to national security". "It's basically what I would describe as an ex-directory publication of radio frequencies used by the government, security services, military and police and other emergency services throughout the UK." She said the frequencies and files published contained "highly restricted" information. The source called for the site to be closed down, as well as for scanners to be made illegal. She said: "They can only be used for illegal activity. It's similar to saying to somebody: 'It's OK to have a gun, as long as you don't put bullets in it'." Millwall suspicion The source suggested Mr Wey's newsgroup may have been used by Millwall supporters to avoid police during riots at the south London football club on 2 May. A month before the riots, someone claiming to be a Millwall supporter posted a message on Mr Wey's site. It read: "We're always getting bothered by the police so want to turn it the other way around and watch them closely. "Does anyone know the exact frequency or listen to police when Millwall games are on?" Mr Wey said he would not entertain such questions on his website: "I'm not having people like that on the group." However, the Today programme has seen evidence that Mr Wey provided the supporter with radio frequencies, plus information about police deployments and intelligence. Prosecutions Speaking to the BBC Simon Hughes said: "The first thing that needs to happen is to make sure that the equipment that the police have is the best available. "We have to make sure that our people doing this job have the most secure communications possible." The options for action the UK authorities could take against Mr Wey are limited. Most web groups like his are registered in the US and, as such, are out of bounds to the UK authorities. But a Home Office spokeswoman said it was also illegal to publish transmissions on websites, and added that people had been prosecuted in the past. She said: "The material would have to be assessed to see if any offence had been committed or if there was any civil wrong." There is also the option of prosecuting Internet Service Providers which fail to remove the material if they know it is there. The maximum penalty for listening to private radio communications with a scanner is a £5,000 fine and confiscation of the equipment. ______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 5697 From: David Alexander Date: Tue Jun 25, 2002 9:58am Subject: Radio jamming authorized in Canada This was in the IWAR mailing list. I reproduce it here to pass constructive comment, not to simply pass it on: >TORONTO -- The Canadian military and the RCMP have been given special authorization to jam radio and cellphone signals >during the G8 Summit next week and the Pope's visit to Canada in July. >It's the first time police or the military have ever been allowed to block signals, an official said. sounds like a knee-jerk reaction to me. Are they going to jam the entire electromagnetic spectrum ? If not, seems rather a waste of time. It's publicized in advance and anyone serious planning a disruption has plenty of time to obtain alternative systems - CB, ham radio, broad-spectrum transceiver systems.... If they jam the lot a dollar gets you 10c there will be some seriously upset citizens. >The authorization allows the Department of National Defence and the RCMP to use jamming devices around Calgary and >Kananaskis, Alta., from June 17 to June 29 for the summit of leaders from Group of Eight nations. >They will have the same power to jam signals in Toronto from July 16 to July 31 -- the Pope is scheduled to arrive in >Canada July 23 and depart July 29, with three Toronto appearances in between. > >RCMP spokesman Corporal BenoÓt Desjardins said jamming is an important part of the security measures for both events. OK, so an opportunist might decide to plant a device triggered by any kind of jamming (eg white noise signal) on a given range of freqs. Cops turn on the jammers and boom ! The culprits could be on another continent by then. >"The RCMP must ensure the safety and security of those attending," he said yesterday. You don't say. Would never have worked that one out. >"It could be used, for example, if there was threat of a detonation of some type of a remote-controlled device. We could >jam the frequencies to make sure nobody could send a signal to that bomb." Similar to above - you could set the device to trigger above a certain signal strength (common jamming tactic - send a stronger signal), once again...boom ! What about LOS laser initiation ? What about device linked to a modem for landline phone initiation ? >He did not know, however, how the jamming would affect cell phones or commercial radio transmissions. > >The order, signed by the Minister of Industry on June 6, exempts the army and police from provisions of the >Radiocommunication Act, which prohibits "the interference with or obstruction of radiocommunication without lawful >excuse." > >The exemption "will provide a way to address the problematic application of the prohibitions," the order says. > >It specifies that "every reasonable effort shall be made to confine or restrict to the extent possible interference with >or obstruction of a radiocommunication . . . to the smallest physical area, the fewest number of frequencies and the >minimum duration required to accomplish the objectives of the interference or obstruction." > >David Warnes, a senior adviser in Industry Canada's telecommunications branch, said yesterday that it is the first time >this kind of order has been granted. > >He added that cellphone jammers are illegal in Canada, but the department will soon release a policy on the devices. > >The department held public consultations on cellphone jammers last year and it is considering permitting them in >theatres, hospitals and other public places. Jamming devices are also illegal in the United States, but there is a >growing underground market for the devices, which can be bought for about $2,200. A survey of 2,000 people last year by >Decima Research found about 50 per cent support for jammers in public places. > >Copyright © 2002 Bell Globemedia Interactive Inc. All Rights Reserved. This sounds like a badly thought out plan or a PR stunt than anything else My 2c _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 5698 From: iDEN-i100 Date: Tue Jun 25, 2002 4:15pm Subject: Wireless encryption not invulnerable to hackers --Wireless encryption not invulnerable to hackers http://cnniw.yellowbrix.com/pages/cnniw/Story.nsp?story_id=30846836&ID=cnniw&scategory=Telecommunications%3AWireless& [Non-text portions of this message have been removed] 5699 From: Matt Paulsen Date: Tue Jun 25, 2002 5:02pm Subject: RE: Wireless encryption not invulnerable to hackers Blah blah blah.. WEP sucks, viruses exist, cookies suck. Woe is the Internet. The sad part about this article is that it points out three areas that all tie back to one thing.. marketing. WEP - marketing in charge of engineering. Viruses - Marketing to scare consumers to purchase AV software. Cookies - Used by marketing to get information on customers. I wonder how much marketing $ YellowBrix spent on this story. Hey, I got an idea.. Lets get rid of marketing. -----Original Message----- From: iDEN-i100 [mailto:Marcelrf@B...] Sent: Tuesday, June 25, 2002 2:15 PM To: NEXTEL1@yahoogroups.com; WFHSG@yahoogroups.com Subject: [TSCM-L] Wireless encryption not invulnerable to hackers --Wireless encryption not invulnerable to hackers http://cnniw.yellowbrix.com/pages/cnniw/Story.nsp?story_id=30846836&ID=cnniw &scategory=Telecommunications%3AWireless& [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5700 From: iDEN-i100 Date: Tue Jun 25, 2002 5:13pm Subject: Re: Wireless encryption not invulnerable to hackers They picked up the story from the Milwaukee Journal Sentinel Matt Paulsen wrote: > I wonder how > much marketing $ YellowBrix spent on this story. 5701 From: Date: Tue Jun 25, 2002 5:57pm Subject: File - mission.txt TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 5702 From: Date: Tue Jun 25, 2002 5:57pm Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. This file is set to automatically go out to list members every two weeks, Please review it, and ensure that you are listed properly (correct address, phone, etc). ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (including AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: tscm01@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ From: kondrak Date: Sun Jun 20, 2004 5:28am Subject: Cable Spec Found the info on FM-8, the velocity factor is .86 8957 From: Thomas Shaddack Date: Sun Jun 20, 2004 5:36am Subject: Re: On Her Majesty's Secret Service - Uncensored > genocidal pogrom'. Without the slightest evidence, the carnage that took > place in Sarajevo's marketplace was described as the work of the Muslim-led > government, which was alleged to be 'massacring its own people to win > sympathy and ultimately help from outside'. As Vulliamy knew, Sarajevo's > defenders were 'dumb with disbelief'. Despite UN Protection Force reports > which found that it was Serb mortars which were killing Muslims, the MI6 > scheme 'worked - beautifully', as the allegations found their way into the > world's press. Vulliamy noted that 'it was quickly relished by the only man > who stood to gain from this - the Serbian leader Radovan Karadzic'.9 A friend from the contemporary diplomatic community of Sarajevo strongly disagrees with this part. His reaction follows, making me wondering about the chances of a mere civilian to get some truth from the news: The author shows a large amount of ignorance on his part. It's about the massacre on the Sarajevo marketplace (46 dead and 29 wounded) from the October 1995, which was assigned to a hit of a mortar shell from Serbs besieging the city, and became the pretext for subsequent NATO attacks at Serbian positions, which was, by the way, the first real military action of NATO in 45 years of its existence. British intelligence service, as the first and only, performed an on-site investigation, which lead to following conclusions: 1. The force of explosion, calculated from the damage, was six times higher than the explosive power of a mortar shell, which was implied (and whose fragments were found). Eg, some additional explosive was affixed to the shell. It is impossible to do that for shells shot from the barrel of that diameter. 2. It would be the only shell of that type shot at Sarajevo during the entire length of the siege. For the comparison - in average about 1500 shells hit Sarajevo every day. So for shooting that one Serbs would have to bring a special barrel, which was never found. 3. All wounds, including the deadly ones, were primarily on the bottom half of the bodies, there were pieces of asphalt found in the wounds (so the grenade was apparently planted underground). 4. And as all that wasn't enough, it was found that some citizens of Sarajevo with close contacts to the headquarters of the city defense forces got a discrete warning the day before to not go to the marketplace tomorrow. The described realities were contained in a report that I saw in the diplomatic analyses from the British embassy, so it isn't secret and surely will be somewhere on the Internet. Only later, because of transparent political reasons, the report was suppressed and replaced with a tendentious reporting of local journalists, who weren't caring to even leave their Holiday Inn hotel and were blaming Serbs for everything by default. I don't want to advocate the intelligence services in general, I don't like them, but I claim and will claim that the states would do better if they would trust them and follow their information (regardless of the insufficient amount of gays or blondes or whatever in their ranks for someone's tastes). Though, the times are changing. The intelligence services increasingly tend to present the wishes of their superiors as the reality. See the US services and the Case Iraq. By the way, the intelligence services of Britain, France, or Russia informed their top politicians about Iraq arsenal and threats realistically. Nobody listened to them in the first one of them. Even if this article suggests some absurdly easy tests for joining the intelligence services, it's still better than with journalists, where nobody checks their intelligence nor integrity. The mentioned Ed Vullamy can be a crystal-clear example, who spent all the war in the mentioned Holiday Inn hotel in Sarajevo, writing not about the actual events but about his own prejudices. Between other events he managed to miss the internal civil war between different units of the city defenders (lead mostly by various bosses of the local pre-war half-world), which took ten days and cost thousands of civilian lives. Serbs on the hills stopped the fire for that time and were just watching and laughing. Vullamy's book is commonly called here "How to entirely misunderstand the war in Bosnia". The intelligence services are necessary as a counterweight for such vermin. Above the place of the massacre there is still a board with inscription "Na ovom su mjestu srpski zlocinci ubili..." (On this place the Serb criminals killed...) PS: It seems that the main motivation for the aerial attacks was apparently to try a real fight with Mig 29s (which are the planes Serbs used to have), and the anti-anti-air defense. They shot down one Mig, the Serbs then held the rest aground as they lacked sufficiently experienced pilots. 8958 From: A Grudko Date: Sun Jun 20, 2004 6:30am Subject: RE: m1 counter -----Original Message----- From: delta [mailto:agenceadi@o...] > does anyone use the m1 counter from optoelectronics or another product (opto ) to inspect the rf level ? I have an Optronics Xplorer which runs via their software on my Compaq laptop. I see a TSCM use for it's features, in my case running in the background while I do my main RF sweep to show me what is generally going on in the area, plus it should be a good way of quickly determining the f of an unknown located transmitter. Unfortunately this piece of equipment turned out to be one of the worst equipment buys I have made. The main performance problem is that it gives false positives - the same signal is detected many times but displays up to 20 different apparently random frequencies - but sometimes does NOT display the actual frequency!!! But worse is the servicing. My unit stopped scanning within 2 months of buying it. A month later it went deaf and a few months later the ni-cads died. The 'agent' did not did service so I sent it from here in South Africa to Optronics in Fort Lauderdale, USA and 2 months and nearly US$200 later it was back with new batteries and sensitivity up but still not selective or scanning. It now sits on the shelf. I won't be buying their products again. Andy Grudko (British), DPM, Grad IS (South Africa) Consulting Investigator, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , andy@g... Pretoria (+27 12) 244 0255 - 244 0256 (Fax) Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.707 / Virus Database: 463 - Release Date: 2004/06/15 [Non-text portions of this message have been removed] 8959 From: James M. Atkinson Date: Sun Jun 20, 2004 10:46am Subject: This Spy for Rent The New York Times, June 13, 2004 OP-ED CONTRIBUTOR This Spy for Rent By JAMES BAMFORD James Bamford is the author, most recently, of "A Pretext for War: 9/11, Iraq, and the Abuse of America's Intelligence Agencies." WASHINGTON Assessing, cultivating and recruiting spies has long been a key job of Central Intelligence Agency officers. But now it is the C.I.A. officers themselves who are being assessed, cultivated and recruited ≠ sometimes right out of the agency's cafeteria. In what is leading to a critical spy drain, private companies are aggressively seeking highly trained employees of our espionage agencies to fill government contracts. With the resignation of George Tenet as director of central intelligence and the final hearings of the 9/11 commission this week, the stage is set for the first major restructuring of the intelligence community in decades. While there has been much discussion of moving agencies and creating an "intelligence czar," the privatization of our spies has been largely overlooked. The C.I.A. is awash in money as a result of post-9/11 budget increases. But because of the general uncertainty over the future, it faces a long delay before it can recruit, train and develop a new generation of spies and analysts. So for now it is building up its staff by turning to the "intelligence-industrial complex." These corporations range from Fortune 500 giants like Booz Allen Hamilton and Northrop Grumman to small companies made up almost entirely of former senior C.I.A. officers, like the Abraxas Corporation in McLean, Va. For example, one Abraxas expert, Mary Nayak, formerly ran the Directorate of Intelligence's South Asia group; now she's been hired as a consultant to the C.I.A.'s review group on 9/11. Private contractors are taking over jobs once reserved for highly trained agency employees: regional desk officers who control clandestine operations around the world; watch officers at the 24-hour crisis center; analysts who sift through reams of intelligence data; counterintelligence officers who oversee clandestine meetings between agency officers and their recruited spies; and reports officers who act as liaisons between officers in the field and analysts back at headquarters. While there is nothing inherently wrong with the intelligence community working closely with private industry, there is the potential for trouble unless the union is closely monitored. Because the issue is hidden under the C.I.A.'s heavy layers of secrecy, it is impossible for even Congress to get accurate figures on just how much money and how many people are involved. But many experts inside and outside the agency feel that we are talking about hundreds of millions of dollars and thousands of contractors. As was made clear by the Abu Ghraib prison scandal, involving private contractors in sensitive intelligence operations can lead to disaster. And the potential for disaster only grows when not just the agents on the ground, but their supervisors and controllers back at headquarters too, are working for some private company. Another problem has been an increased cost to taxpayers. Desperate to fill their contracts, the companies frequently offer to double a federal employee's salary. Because the recruiters have security clearances, they often make their recruiting pitches at the C.I.A.'s headquarters in Langley, Va. And many of those who do sign on end up going right back to their old office ≠ only now working for a private company. Thus, after spending millions of dollars training people to be clandestine officers, taxpayers are having to pay them twice as much to return as rent-a-spies. "The money is incredible," one agency veteran, who handled spies overseas for years, told me. "I doubled my salary to go out and come back in and continue doing what I was doing." But some of these former officers warned me that their talents are being wasted on unsophisticated tasks, and that because of the slap-dash nature of the rush to expand, the quality of intelligence produced has become questionable. "The problem is these jobs are mindless," one officer-turned-contractor with decades of Middle East experience told me. "So we're all just sitting there looking at each other, and we're making a ridiculous amount of money." Another former agency employee told me that he was among a group of contractors assigned to analyze e-mail messages on computer hard drives snatched by operatives in Iraq, Afghanistan and other countries. "A lot of it was in Arabic and none of us spoke Arabic ≠ just a little problem," he said. "None of us really knew what we were doing and we had management who didn't know what they were doing either." As the United States gets more deeply involved in the war on terrorism and the war in Iraq, there will be a corresponding increase in private spies. This isn't all bad: by marrying well-trained federal employees with innovative contractors working in a less structured role, perhaps we can find more effective ways of tackling old problems. But better oversight is critical. If Congress doesn't even know whom the C.I.A. is hiring, how can anyone ensure that what they are doing (and how much they are being paid) is acceptable? As we decide how to remake our intelligence services, we need to find the right balance between the people who make the cloaks and daggers and the people who wear them. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291Web: http://www.tscm.com/ Gloucester, MA 01931-8008Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8960 From: contranl Date: Sun Jun 20, 2004 0:31pm Subject: Standaard equipment for coutersurveillance/sweeping . I have uploaded a picture of the equipment used by a German sweeper the picture is probably at least 6 years old..since then he might have added more equipment to deal with the latest spystuff.the pic is in the photo-section of this group Can you make out all the equipment on the picture ? Photo source: Manfred Fink,Germany Tetrascanner www.tetrascanner.com 8961 From: Steve Uhrig Date: Sun Jun 20, 2004 0:50pm Subject: Re: Standard equipment for coutersurveillance/sweeping Once upon a midnight dreary, contranl pondered, weak and weary: > I have uploaded a picture of the equipment used by a German sweeper > the picture is probably at least 6 years old..since then he might > have added more equipment to deal with the latest spystuff.the pic > is in the photo-section of this group > Can you make out all the equipment on the picture ? Photo too small to see much. Lotta items for physical search. Borsecopes, mirrors. What appear to be some telephone 'toners'. Long item in lower left with angled handle on right pointing down is a cane, same model I use. Maybe he used it for an extension pole. I use it to walk. Several discones, standard oscilloscopes, yellow box' Riser Bond TDR, strong floodlights under discones. Reels of power cable for lights. Can't tell about gray and black briefcases without a closer look. Several laptops. Several handheld two way radios or scanners. Few consumer-grade pieces lower right, maybe handheld counters from Opto or similar. Few Fluke pieces in their trademarked yellow boots. Garrett handheld metal detector. Some sort of nonlinear junction detector. What looks like a gray film camera and maybe black external flash next to it. Fluorescent tube light on cord. Maybe old night vision piece bottom left, and some small flashlights near it. What appears to be a mobile two way radio with external mic on cord. At least one decent sized power supply with handle, maybe dual metered for I and E. ------------------ Best I can tell with a small photo about the size of a package of cigarettes on my laptop screen. A number of items are not much more than dots of color and undefined shapes. Thanks for sharing. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8962 From: Steve Uhrig Date: Sun Jun 20, 2004 1:05pm Subject: Opto Xpolrer Once upon a midnight dreary, A Grudko pondered, weak and weary: > The main performance problem is that it gives false positives - the same > signal is detected many times but displays up to 20 different apparently > random frequencies - but sometimes does NOT display the actual > frequency!!! I use mine as a piece of test equipment, not for TSCM, like finding the freq and tones of an unknown radio turned in for service. It is so sensitive it will read the frequencies of the multipliers up close, or harmonics. I have to back halfway across the room to where the fundamental freq will read, and then get my wife to read the freq or use a telescope. I use a straightened out staple as an antenna in these instances. Too much signal is a lot more of a hassle than too little. Just the raw BNC with no antenna doesn't hear at all. For bench work it's a useful piece, but I don't recall ever having taken mine out in the field. Oh - yes I did actually. When I worked the movie 'Enemy of the State' there were dozens of two way radios, wireless mikes, etc. I took it one day to read all the freqs and tones of the different services operating there on UHF, then programmed them all into my personal portable. The very next day I had the only radio which could talk to anyone regardless of service. Was very convenient. I know one competent sweeper who does use the Xplorer for a quick external perimeter check to get some idea of the background RF outside the building, so that's a legitimate TSCM application. I make extensive use of filters on mine. Don't buy them from Opto. They're the identical boxes manufactured by Minicircuits with Opto's label on them. You can get FM BCB blocking filters from me (made to my spec by a military supplier, not Minicircuits) which are the best of all, AFTER you sweep the FM broadcast band to make sure nothing hostile is there. Then you can knock down the nearby strong broadcast stations. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8963 From: Michael Puchol Date: Sun Jun 20, 2004 3:39pm Subject: Re: Opto Xpolrer I agree with Steve's views on the Xplorer, and I can say that during the time I had mine (traded it for a Nokia 9210), I was quite surprised by it's performance. Once it picked up an aircraft transmitting on 130something MHz, AM, and he was passing some 30.000 feet above me! It *really* surprised me as Opto's docs stated that it could not pick up AM signals...it did however suffer from poor image rejection, you had to lock out a signal and quite a few images above and below before it stopped tuning it. Current units have a useful feature which is they can lock out up to ten programmable frequency ranges, so you can get rid of any commercial FM, TV, etc. as needed, I believe older units can be updated to include this feature at a cost. The Minicircuits filters are great, I keep quite a few around so I can play with combinations of LPF and HPF to isolate the spectrum of interest. Their service is excellent, I once got a quote from the local distributor (to call him something) and it was for twice the list price and four weeks lead time - ordered direct from Minicircuits, took three days to arrive, they shipped on the same day. Regards, Mike ----- Original Message ----- From: "Steve Uhrig" To: Sent: Sunday, June 20, 2004 8:05 PM Subject: [TSCM-L] Opto Xpolrer > Once upon a midnight dreary, A Grudko pondered, weak and weary: > > > The main performance problem is that it gives false positives - the same > > signal is detected many times but displays up to 20 different apparently > > random frequencies - but sometimes does NOT display the actual > > frequency!!! > > I use mine as a piece of test equipment, not for TSCM, like finding the > freq and tones of an unknown radio turned in for service. > 8964 From: mark de Boer Date: Sun Jun 20, 2004 1:24pm Subject: RE: m1 counter I have used several optoelectronic products, most of them were not designed for TSCM use. The XSweeper i tested had very promising specs but the thing was useless. This is what they promise you on the Opto site"All of our Optoelectronics near field devices look for a signal that is 15dB above the background RF floor. Once it detects that dominant signal it stops and locks on that signal and displays the frequency". I have done a simple test with a tiny transmitter <1 MW ERP hidden in a room and the antenna of the Xsweeper was centimetres away from the device before picking it up. Opto product may be great for radio amateurs but for TSCM use their not it. M. de Boer RRBsecurity Archimesstraat 12 3316 AB Dordrecht Holland. A Grudko wrote: -----Original Message----- From: delta [mailto:agenceadi@o...] > does anyone use the m1 counter from optoelectronics or another product (opto ) to inspect the rf level ? I have an Optronics Xplorer which runs via their software on my Compaq laptop. I see a TSCM use for it's features, in my case running in the background while I do my main RF sweep to show me what is generally going on in the area, plus it should be a good way of quickly determining the f of an unknown located transmitter. Unfortunately this piece of equipment turned out to be one of the worst equipment buys I have made. The main performance problem is that it gives false positives - the same signal is detected many times but displays up to 20 different apparently random frequencies - but sometimes does NOT display the actual frequency!!! But worse is the servicing. My unit stopped scanning within 2 months of buying it. A month later it went deaf and a few months later the ni-cads died. The 'agent' did not did service so I sent it from here in South Africa to Optronics in Fort Lauderdale, USA and 2 months and nearly US$200 later it was back with new batteries and sensitivity up but still not selective or scanning. It now sits on the shelf. I won't be buying their products again. Andy Grudko (British), DPM, Grad IS (South Africa) Consulting Investigator, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , andy@g... Pretoria (+27 12) 244 0255 - 244 0256 (Fax) Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.707 / Virus Database: 463 - Release Date: 2004/06/15 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- ALL-NEW Yahoo! Messenger - sooooo many all-new ways to express yourself [Non-text portions of this message have been removed] 8965 From: taylortscm@y... Date: Sun Jun 20, 2004 3:03pm Subject: Re: Opto Xpolrer steve is correct about the explorer but I use the stubby db32 opto antenna that seems to knock the sensitivity out the explorer ,and for the notch filter he sells is the best ,don't waste your money on opto filter. dan g taylor group Steve Uhrig wrote: Once upon a midnight dreary, A Grudko pondered, weak and weary: > The main performance problem is that it gives false positives - the same > signal is detected many times but displays up to 20 different apparently > random frequencies - but sometimes does NOT display the actual > frequency!!! I use mine as a piece of test equipment, not for TSCM, like finding the freq and tones of an unknown radio turned in for service. It is so sensitive it will read the frequencies of the multipliers up close, or harmonics. I have to back halfway across the room to where the fundamental freq will read, and then get my wife to read the freq or use a telescope. I use a straightened out staple as an antenna in these instances. Too much signal is a lot more of a hassle than too little. Just the raw BNC with no antenna doesn't hear at all. For bench work it's a useful piece, but I don't recall ever having taken mine out in the field. Oh - yes I did actually. When I worked the movie 'Enemy of the State' there were dozens of two way radios, wireless mikes, etc. I took it one day to read all the freqs and tones of the different services operating there on UHF, then programmed them all into my personal portable. The very next day I had the only radio which could talk to anyone regardless of service. Was very convenient. I know one competent sweeper who does use the Xplorer for a quick external perimeter check to get some idea of the background RF outside the building, so that's a legitimate TSCM application. I make extensive use of filters on mine. Don't buy them from Opto. They're the identical boxes manufactured by Minicircuits with Opto's label on them. You can get FM BCB blocking filters from me (made to my spec by a military supplier, not Minicircuits) which are the best of all, AFTER you sweep the FM broadcast band to make sure nothing hostile is there. Then you can knock down the nearby strong broadcast stations. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 8966 From: Ocean Group Date: Mon Jun 21, 2004 8:58am Subject: FW: Security Managers Could Face Court Penalties I wonder if this would apply to people in charge of hiring TSCM services.... *********************** http://nwc.securitypipeline.com/showArticle.jhtml?articleID=22100927 By Mitch Wagner June 18, 2004 San Francisco - Routine efforts to improve network security could be used against IT managers in court, warned cybercrime attorney Mark Rasch. Security managers who fail to secure their company's information could be making it harder to prosecute computer crime, said Rasch, who delivered a keynote at the NetSec 2004 conference here this week. "For trade secrets to be entitled to legal protection, the person holding the trade secret has to demonstrate that they used reasonable efforts to ensure its secrecy," Rasch said. And sometimes a security manager's efforts to secure information can be used against him by a plaintiff's attorney. For example, imagine that a security manager writes a memo listing 10 measures that must be taken to secure corporate information, and the company only implements two of them. "That memo is a plaintiff's lawyer's dream," Rasch said. Likewise, security managers are routinely cautious in deploying patches to Microsoft software and other products. The patches are tested, and rolled out over a period of time. That caution be used by a plaintiff's lawyer to prove negligence. "They'd ask how much it would cost to install the patch? They'd say it doesn't cost much. You'd say it isn't just one patch, there are thousands of patches. But the jury just hears about the one patch," Rasch said. Likewise, companies that generate security logs but don't look at them are letting themselves in for legal trouble, Rasch said. The corporation is presumed to be aware of the information contained in those logs. Rasch is senior vice president and chief security counsel for Solutionary, a managed security service provider. He is former head of the U.S. Justice Department's computer crime unit, and prosecuted Robert Tappan Morris, who released one of the first Internet worms in 1988. Rasch also prosecuted the Hanover hackers, as described in "The Cuckoo's Egg," by Clifford Stoll. Another problem with computer law is that laws are written so broadly that they criminalize normal activities, Rasch said. "We define computer law so broadly that it covers things we never meant, and then we tell people, don't worry, you would never be prosecuted," Rasch said. There is no way to make the law so precisely worded that we prosecute only what we want to prosecute; we rely on prosecutorial discretion to stop unreasonable prosecutions. Computer crime is defined as unauthorized access to a computer, he said. By that standard, any time an employee violates a company policy barring personal use of the Internet, that employee is committing a felony - even if the policy is routinely violated and never enforced, Rasch said. _________________________________________ ISN mailing list Sponsored by: OSVDB.org - For 15 cents a day, you could help feed an InfoSec junkie! (Broke? Spend 15 minutes a day on the project!) 8967 From: Steve Uhrig Date: Sun Jun 20, 2004 8:47pm Subject: Re: Opto Xpolrer Once upon a midnight dreary, Michael Puchol pondered, weak and weary: > Once it picked up an aircraft transmitting on > 130something MHz, AM, and he was passing some 30.000 feet above me! It > *really* surprised me as Opto's docs stated that it could not pick up AM > signals. It doesn't pick up AM. Many/most AM transmitters have a significant amount of FM component, which is what you were hearing. The FM component doesn't bother the AM receivers. > it did however suffer from poor image rejection, you had to lock out a > signal and quite a few images above and below before it stopped tuning > it. I never considered images. I was presuming I was hearing frequencies of the different multiplying stages in the transmitter. It absolutely locks onto harmonics though, which is odd as I can't think of any situation where a harmonic would be stronger than the fundamental. Will have to do some math on a known radio some time and see if it is locking on a multiplier frequency. > Current units have a useful feature which is they can lock out > up to ten programmable frequency ranges, so you can get rid of any > commercial FM, TV, etc. as needed, I believe older units can be updated to > include this feature at a cost. You can have the firmware upgraded, but you give up some features. I don't remember what you give up, but it was minor, like battery voltage or something. > The Minicircuits filters are great, I keep quite a few around so I can > play with combinations of LPF and HPF to isolate the spectrum of interest. > Their service is excellent, I once got a quote from the local distributor > (to call him something) and it was for twice the list price and four weeks > lead time - ordered direct from Minicircuits, took three days to arrive, > they shipped on the same day. Yup. Quality and performance is great though. Anyone doing engineering or bench work should have a printed Minicircuits catalog. If you go to replace the nicads in your Xplorer, know there are two distinctly different packs depending on the vintage of your unit. You can open the thing and see how the AA nicads are laid out physically, then buy some new ones with solder tabs and use some tape and hot melt glue to copy the same pattern. With the new firmware changes and other circuitry changes in later units, Opto moved the RF connector from the antenna (a relatively huge SMA connector) to a different place on the circuit board, and this made clearance problems for the nicad pack which is affixed to the back cover. They'll have to replace the battery pack if you get your unit updated. If replace the nicads yourself, be aware of the tiny bit of clearance and the precise placement of the nicads needed to clear the SMA connector. No, Opto will not re-block the 800 meg cell freqs if you have an unblocked unit and send it in for the firmware upgrade. You get back what you sent. Frankly, mine locks up on cell so much I've locked the entire bank of cell freqs out and have no intention of reinstating them. Pain in the butt when the thing is always locking onto the nearest cell site. I'm not by any stretch of the imagination an Opto fan, but the Xplorer has its place, and its personality. It serves as a convenient piece of test equipment and tool in the field for me, but not for any purpose related to TSCM. ------------- In filming the movie 'Enemy of the State', my Xplorer was used by the NSA folks to sweep Hackman/Brill through the fence of the police parking lot, for Hackman wearing a body wire. This is the scene where Hackman is in the Baltimore City police uniform. He actually is wearing a body wire, but he doesn't switch it on until after the sweep. Will Smith is monitoring the listening post from a nearby hotel room. After a week of needing rain for that scene, and no rain forthcoming, the production bit the bullet and spent a million union dollars to erect a rain tower 5 stories high and a block long. As soon as they finished, it started to rain. Rain got into my Xplorer and ruined it, and the production replaced it for me. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8968 From: Michael Puchol Date: Mon Jun 21, 2004 1:10pm Subject: Re: Re: Opto Xpolrer Hi Steve, > It doesn't pick up AM. Many/most AM transmitters have a significant > amount of FM component, which is what you were hearing. The FM component > doesn't bother the AM receivers. Didn't think about that option, thanks for the explanation. > I never considered images. I was presuming I was hearing frequencies of > the different multiplying stages in the transmitter. It absolutely locks > onto harmonics though, which is odd as I can't think of any situation > where a harmonic would be stronger than the fundamental. Will have to do > some math on a known radio some time and see if it is locking on a > multiplier frequency. Well, the problem I usually experienced was that the Xplorer would do it's sweep, and lock onto the strongest signal, say a paging station on the low VHF band. You would lock it out, then sweep again, and it would lock onto the strongest harmonic of the same paging station, unless a stronger signal was available. You had to keep locking out images for some time until it started to pick up other things lower on the signal scale. And since one usually has a few FM radio transmitters, paging stations and whathaveyou around, locking up harmonics was a PITA. > You can have the firmware upgraded, but you give up some features. I > don't remember what you give up, but it was minor, like battery voltage > or something. I think it's probably GPS input. If I remember correctly, you could connect an the NMEA output from a GPS receiver and it would also save the coordinates of captured frequencies. I am working through the latest serial protocol, and it's not mentioned anywhere, so I guess they pulled that out. Coordinates tend to take quite a few storage bytes, and it was probably the easiest option to cut. > If you go to replace the nicads in your Xplorer, know there are two > distinctly different packs depending on the vintage of your unit. You can > open the thing and see how the AA nicads are laid out physically, then As it happens, I was replacing the battery pack on my Scout last night, made a new pack with four tabbed NiCD cells, works great again. The Scout tends to switch off after a few seconds, when no battery pack is present and you power it externally. > I'm not by any stretch of the imagination an Opto fan, but the Xplorer > has its place, and its personality. It serves as a convenient piece of > test equipment and tool in the field for me, but not for any purpose > related to TSCM. Agreed. > In filming the movie 'Enemy of the State', my Xplorer was used by the NSA > folks to sweep Hackman/Brill through the fence of the police parking lot, > for Hackman wearing a body wire. This is the scene where Hackman is in > the Baltimore City police uniform. He actually is wearing a body wire, > but he doesn't switch it on until after the sweep. Will Smith is > monitoring the listening post from a nearby hotel room. It was also used as a sort of portable beacon tracker during the hotel chase, if I remember correctly. Watched it quite a few times...seems like a Swiss Army Opto. Best regards, Mike 8969 From: Ocean Group Date: Mon Jun 21, 2004 3:49pm Subject: Australia 'party to bugging of UN' Silly POMs.....arf arf....! :) *********************************** By Mark Forbes Canberra Sunday 20th June 2004 : Australia was party to spying on the United Nations, including Secretary-General Kofi Annan, to assist the lobbying campaign for launching the war against Iraq. Intelligence community sources confirmed that the Howard Government received details of the UN bugging, in response to revelations to be published in a book by a senior Australian intelligence analyst turned whistleblower, Andrew Wilkie. The book, which has been vetted by the Attorney-General's Department and had some details censored on national security grounds, also states that: Australian agencies gathered intelligence on the US Administration and reported that allegations of Saddam Hussein's weapons of mass destruction and links to terrorists were not the main reasons it wanted to invade Iraq. The Opposition was deliberately misled during briefings by intelligence agencies in the lead-up to the war, with facts undermining the Government's position omitted. The Government knowingly presented false intelligence to the public that exaggerated the threat that Saddam Hussein posed. Mr Wilkie's book documents a remarkable transformation from a career as a conservative, respected military officer to a Greens candidate running against Prime Minister John Howard in his Bennelong seat in the forthcoming federal election. During an interview with The Age, Mr Wilkie said he would still be a senior international issues analyst for Mr Howard's Office of National Assessments - Australia's main intelligence assessment agency - if not for his dismay at the "completely bogus" reasons presented in early 2003 for invading Iraq. In Axis of Deceit, Mr Wilkie confirms a former British cabinet member's claims that sensitive UN communications were intercepted in the lead-up to the war. The Age has confirmed that the interceptions were made by a five-way electronic intelligence gathering and sharing network made up of Australia, Britain, the US, New Zealand and Canada. "The UN was monitored and assessed with almost as much vigour as Iraq itself," Mr Wilkie writes. Australia, US and Britain also placed spies inside UN organisations, including weapons inspection teams, to collect intelligence. His book states that "there was a deliberate and official campaign to eavesdrop on the most sensitive UN communications during the lead-up to the war". "The UN was spied on at the highest level," Mr Wilkie told The Age. "I am not able to speak in any detail, I am not able to say what was edited from the book." He would say only that Australia was part of the "five-eyes" arrangement, a global system of communications interceptions (including Australian ground stations). Intelligence sources confirmed that the arrangement was used to spy on the UN. Mr Wilkie did confirm that Australia was also "party to the organised use of UN agencies as a cover for covert activities". The Howard Government had placed the US high on its official "National Foreign Intelligence Assessment Priorities" list guiding spy agencies, he said. "Mr Howard and Alexander Downer knew exactly why the US was going to war and that terrorism and WMD was not the most important part of the reason," Mr Wilkie said. The US wanted to gain control of oil reserves, reinforce its global power ascendancy, respond to domestic political considerations after the September 11 attacks and influence the shape of the Middle East, he said. Confidential US Administration information was obtained from sources and contacts, then communicated back to Australia in diplomatic cables, he said. By late 2002, the ONA had determined that the US had already decided to invade Iraq, the book states. Repeated claims by the Howard Government that its WMD case against Iraq accurately reflected the views of national intelligence agencies were "plainly wrong", Mr Wilkie said. In 2002, the ONA knew that evidence that Iraq was rebuilding its nuclear program with uranium purchases from Africa was false. The agency also knew that any WMD capacity held by Iraq was limited and there was no hard evidence to show Saddam was "weaponising". Subtle, but effective pressure was exerted on the ONA to deliver what the Government wanted to hear, he said. The Government manipulated the flow of intelligence information to the Opposition, Mr Wilkie said, ensuring only material supporting its policies was conveyed. He participated in a briefing to then Opposition leader Simon Crean, where the ONA presented "an unbalanced assessment of the situation in Iraq in general and the state of Saddam's WMD in particular". The strong doubts about the capacity of any WMDs in Iraq and links to al-Qaeda were excluded 8970 From: contranl Date: Mon Jun 21, 2004 8:52pm Subject: New scanner ( Uniden BC 246 T ) with built in frequency counter . After 10 years of explorers and counters Uniden has now decided to bring a scanner with a built-in nearfield receiver...wich is something that i have been waiting for a long time It's the Bearcat 246 T, it runs of only 2 penlites it's a small portable and includes trunking...and memory for 3300 channels. It works more or less like this: The nearfield receiver (or frequency counter circuit) receives a signal...it then immidiatly programs the scanner to the found frequency Before you had to do that manually or hook up your counter/nearfield receiver to you scanner...so you had 2 units to carry. Units that where able to do that where: The wellknown Optoelectronics stuff The Icom scanners Some Aor scanners Aceco counters/sweepers A special cable was needed (CI-V interface) Now these are combined into one single scanner ! Uniden calls this "Close call" Drawback might be that this Bearcat 246 T does not have continious frequency range....but only the usual communication bands... It is obviously not intended for countersurveillance...it's more for quickly picking up unknown nearby communications...such as Steve discribed in the previous posting. I do hope they will make one that does the whole frequency-range, i suspect if this model picks up a strong signal wich is not in the scanner's frequency-range,then it will simply show nothing. If they are clever (wich they are not always) they use the frontend of the scanner ...there are bandfilters in there ...that would greatly enhance the reception range of the nearfield part..it would also eliminate some out of band signals...they could prepare 4 special channels each in 1 band and scan them...that would be neccesary to switch trough all the bandfilters (scanning only 4 channels and measuring the frequency may take less then 0.1 sec wich is realtime enough) You could also stop the scanning...then you would only "count" the frequencies in the current band. Bandfilters in many (non-continuous) scanners are for example: 1) 25~68 Mhz 2) 68~175 Mhz 3) 380~512 Mhz 4) 800`~960 Mhz The better ones (like Aor5000) have more filters and a additional tuning-circuit that continuously tunes/maximizes the frontend in smaller steps More info and a nice pic here: http://tinyurl.com/2yk79 73's Tetrascanner www.tetrascanner 8971 From: Steve Uhrig Date: Mon Jun 21, 2004 1:39pm Subject: Re: Opto Xpolrer Once upon a midnight dreary, Michael Puchol pondered, weak and weary: > > You can have the firmware upgraded, but you give up some features. I > > don't remember what you give up, but it was minor, like battery voltage > > or something. > I think it's probably GPS input. If I remember correctly, you could > connect an the NMEA output from a GPS receiver and it would also save the > coordinates of captured frequencies. I am working through the latest > serial protocol, and it's not mentioned anywhere, so I guess they pulled > that out. Coordinates tend to take quite a few storage bytes, and it was > probably the easiest option to cut. Makes sense. I checked their website, and this is what you give up: - Baud Rate Setting (fixed at 9600) - CI-5 Address Setting (fixed at B0) - Battery Voltage Readout - GPS Interface > > In filming the movie 'Enemy of the State', my Xplorer was used by the > > NSA folks to sweep Hackman/Brill through the fence of the police parking > > lot, for Hackman wearing a body wire. > It was also used as a sort of portable beacon tracker during the hotel > chase, if I remember correctly. Watched it quite a few times...seems like > a Swiss Army Opto. The piece you are referring to above was a sniffer made by Marty (Kaiser). It's similarly sized to the Xplorer and black, but it's not the Opto. Marty gets credit for this one, and know the production took a lot of editorial license on the tracking stuff. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8972 From: contranl Date: Mon Jun 21, 2004 7:30pm Subject: Re: Standard equipment for countersurveillance/sweeping . Thanks Steve, What about the very big apparatus on top of the pic...looks like an x-ray scanner...then there is a Scanlock (Audiotel) the NlJ is Audiotel too, In the middle left is a spectrumanalyzer by Farnell...next to it is certainly made by Rhode&Schwarz probably a communications test receiver/analyzer....next thing looks like a normal oscilloscope (Hameg ?) there are 2 scanners Aor3000 and Aor5000 and a Aor sdu display-unit Case on the far left looks like just some tools (screwdrivers etc) Below that case some round shapes in green and silver they look like those things to hold big glass windows (suction cups ?) what are these for ?...to climb the windows ? :) The original picture is taken from here: http://tinyurl.com/37lua By the way the owner of the equipment on the picture has written an excellent book on industrial spionage and countersurveillance...there are some pictures of equipment and techniques in there that you could call "typical European" the book is mentioned in the above link/pdf... it's in German...even then it's worth to buy it...at Amazon Germany...wich is here: http://tinyurl.com/2jo8z Greetings Tetrascanner www.tetrascanner.com 8973 From: Rob Muessel Date: Tue Jun 22, 2004 8:08am Subject: RE: Re: Standard equipment for countersurveillance/sweeping The suction cup gizmos are for lifting the floor tiles used in raised computer room floors. Also, to the left of the Riser Bond TDR is an ISA line balance tester -- -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 www.tscmtech.com USA -----Original Message----- From: contranl [mailto:contranl@y...] Sent: Monday, June 21, 2004 8:31 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Standard equipment for countersurveillance/sweeping . Thanks Steve, What about the very big apparatus on top of the pic...looks like an x-ray scanner...then there is a Scanlock (Audiotel) the NlJ is Audiotel too, In the middle left is a spectrumanalyzer by Farnell...next to it is certainly made by Rhode&Schwarz probably a communications test receiver/analyzer....next thing looks like a normal oscilloscope (Hameg ?) there are 2 scanners Aor3000 and Aor5000 and a Aor sdu display-unit Case on the far left looks like just some tools (screwdrivers etc) Below that case some round shapes in green and silver they look like those things to hold big glass windows (suction cups ?) what are these for ?...to climb the windows ? :) The original picture is taken from here: http://tinyurl.com/37lua By the way the owner of the equipment on the picture has written an excellent book on industrial spionage and countersurveillance...there are some pictures of equipment and techniques in there that you could call "typical European" the book is mentioned in the above link/pdf... it's in German...even then it's worth to buy it...at Amazon Germany...wich is here: http://tinyurl.com/2jo8z Greetings Tetrascanner www.tetrascanner.com ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 8974 From: contranl Date: Tue Jun 22, 2004 3:02pm Subject: Indoor Gps . Some time ago i said in this group that latest Gps trackers do'nt need direct satellite view anymore....and therefore they could now be anywhere hidden in a car All that would be possible by using more processing power (correlators) inside such a Gps receiver. Not many products with such indoor Gps capabilities have reached the market yet...but here is one...it's a digital handheld radio (Tetra) with build-in "œndoor Gps" The manufacturer states that this Gps is a 1000 (thousand) times more sensitive then previous receivers ! i think the point i made a few months ago is now proven...very soon you will see this increased to maybe 5000 or 10.000 times more sensitive. For obvious reasons you do'nt see highly professional Gps-trackers advertised that use this new technique...but i bet they exist already http://www.sepura.co.uk/products-detail.php?id=7 Motorola produces a similar radio with built-in Gps Tetrascanner www.tetrascanner.com 8975 From: Michael Puchol Date: Tue Jun 22, 2004 3:17pm Subject: Re: Indoor Gps Hi, The exact physics of this, or how a massive amount of correlators (I've read the theory, but didn't digest it very well), still escapes me, but all I can say is that I have seen a live, non-staged demo of the Sepura SRP-2000 TETRA radio with built-in GPS, getting a valid fix inside the hotel conference room where it was being shown. This room was a basement, with no skylights, and the radio was some 20 meters away from the nearest window. I found it quite amazing. Right now good old SiRF are going to launch a new line of engines, which are said to boast 200.000 correlators, way above what this TETRA radio's GPS had. Best regards, Mike ----- Original Message ----- From: "contranl" To: Sent: Tuesday, June 22, 2004 10:02 PM Subject: [TSCM-L] Indoor Gps . Some time ago i said in this group that latest Gps trackers do'nt need direct satellite view anymore....and therefore they could now be anywhere hidden in a car All that would be possible by using more processing power (correlators) inside such a Gps receiver. Not many products with such indoor Gps capabilities have reached the market yet...but here is one...it's a digital handheld radio (Tetra) with build-in "œndoor Gps" The manufacturer states that this Gps is a 1000 (thousand) times more sensitive then previous receivers ! i think the point i made a few months ago is now proven...very soon you will see this increased to maybe 5000 or 10.000 times more sensitive. For obvious reasons you do'nt see highly professional Gps-trackers advertised that use this new technique...but i bet they exist already http://www.sepura.co.uk/products-detail.php?id=7 Motorola produces a similar radio with built-in Gps Tetrascanner www.tetrascanner.com ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8976 From: James M. Atkinson Date: Tue Jun 22, 2004 8:16am Subject: Re: Standaard equipment for coutersurveillance/sweeping Could you please post a link directly to the image that you reference? -jma At 01:31 PM 6/20/2004, contranl wrote: >I have uploaded a picture of the equipment used by a German sweeper >the picture is probably at least 6 years old..since then he might >have added more equipment to deal with the latest spystuff.the pic >is in the photo-section of this group >Can you make out all the equipment on the picture ? > >Photo source: Manfred Fink,Germany > > >Tetrascanner >www.tetrascanner.com ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8977 From: contranl Date: Wed Jun 23, 2004 8:38am Subject: Re: Standard equipment for countersurveillance/sweeping . Hi James...the direct link to the pdf file with the picture is in message # 8972 just a few messages above this one...it is part of this website: http://www.fink-consulting.info Greetings Tetrascanner www.tetrascanner.com 8978 From: Jason Dibley Date: Wed Jun 23, 2004 8:56am Subject: RE: Indoor Gps Does the Tetra unit gain it's fixes from GPS sattelites or maybe it aquires its fixes from trilateration between the fixed tetra radio sites as in some land based RF tracking systems. This possbility would allow fixes to aquired inside buildings due to the lower frequencies and higher powers involved in local fixed sites.There was a system called quicktrack in use in London until very recently (they went under last month) that would supply street level tracking within London via 14 fixed site Rf stations. the transponder unit resembled a mobile phone and could send and receive messages over the system. This unit was often mistaken for a GPS tracking system, which obviously it was not. Best Wishes Mr Jason M Dibley Dip Eng (hons) TSCM Director. QCC Interscan Ltd. Please visit our Web site at http:\\www.qcc.co.uk You can view our digitally signed reports and other documents using Adobe Acrobat Version 4 or greater. You can obtain this for free from the following web site: http://www.adobe.co.uk/products/acrobat/readstep.html This message is intended only for the use of the person(s) to whom it is addressed. It may contain information which is privileged and confidential or material which is protected under attorney-client privilege. In addition, this message may not necessarily represent the views of QCC. Accordingly any unauthorised use is strictly prohibited. If you are not the Intended Recipient, please contact QCC Interscan as soon as possible or send mail to contact@q.... QCC Interscan Ltd. Registered in England and Wales No. 03773029 -----Original Message----- From: Michael Puchol [mailto:mpuchol@s...] Sent: 22 June 2004 21:18 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Indoor Gps Hi, The exact physics of this, or how a massive amount of correlators (I've read the theory, but didn't digest it very well), still escapes me, but all I can say is that I have seen a live, non-staged demo of the Sepura SRP-2000 TETRA radio with built-in GPS, getting a valid fix inside the hotel conference room where it was being shown. This room was a basement, with no skylights, and the radio was some 20 meters away from the nearest window. I found it quite amazing. Right now good old SiRF are going to launch a new line of engines, which are said to boast 200.000 correlators, way above what this TETRA radio's GPS had. Best regards, Mike ----- Original Message ----- From: "contranl" To: Sent: Tuesday, June 22, 2004 10:02 PM Subject: [TSCM-L] Indoor Gps . Some time ago i said in this group that latest Gps trackers do'nt need direct satellite view anymore....and therefore they could now be anywhere hidden in a car All that would be possible by using more processing power (correlators) inside such a Gps receiver. Not many products with such indoor Gps capabilities have reached the market yet...but here is one...it's a digital handheld radio (Tetra) with build-in "œndoor Gps" The manufacturer states that this Gps is a 1000 (thousand) times more sensitive then previous receivers ! i think the point i made a few months ago is now proven...very soon you will see this increased to maybe 5000 or 10.000 times more sensitive. For obvious reasons you do'nt see highly professional Gps-trackers advertised that use this new technique...but i bet they exist already http://www.sepura.co.uk/products-detail.php?id=7 Motorola produces a similar radio with built-in Gps Tetrascanner www.tetrascanner.com ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8979 From: Michael Puchol Date: Wed Jun 23, 2004 11:01am Subject: Re: Indoor Gps Hi Jason, This particular radio had only GPS, not assisted by outside means. Or so they claim. I still wait to receive a couple of test units which I'll put through their paces. As for land RF-based positioning, there are indoor solutions which use 2.4GHz beacons and strategically placed antennas to provide location of people inside buildings to within 5 meters. Obviously such systems need calibration and careful installation. There are also GSM based location services (LBS) which so far are very touch and go, in my oppinion. If you are luck and stand next to a cell, it will give you a good fix, but if you happen to be in a rural area, your position could be off by 20 miles (this I have personally verified, it can be that bad). Unless other methods (good and accurate true triangulation) are used, such systems are too unreliable to be of use. With a GPS I can know all the time the quality of the fix it's giving me, with these systems there is no indication as to their accuracy at a given time. I was not aware of this system in London, what frequency band were they using? 14 stations doesn't seem a lot to cover such a big city. Best regards, Mike ----- Original Message ----- From: "Jason Dibley" To: Sent: Wednesday, June 23, 2004 3:56 PM Subject: RE: [TSCM-L] Indoor Gps > Does the Tetra unit gain it's fixes from GPS sattelites or maybe it aquires > its fixes from trilateration between the fixed tetra radio sites as in some > land based RF tracking systems. This possbility would allow fixes to aquired > inside buildings due to the lower frequencies and higher powers involved in > local fixed sites.There was a system called quicktrack in use in London > until very recently (they went under last month) that would supply street > level tracking within London via 14 fixed site Rf stations. the transponder > unit resembled a mobile phone and could send and receive messages over the > system. This unit was often mistaken for a GPS tracking system, which > obviously it was not. > > Best Wishes > > Mr Jason M Dibley Dip Eng (hons) 8980 From: James M. Atkinson Date: Wed Jun 23, 2004 10:50am Subject: Re: Re: Standard equipment for countersurveillance/sweeping Across the back row we have a rather large pass though digital/computer based X-Ray machine, two hybrid discone antenna with a fairly long run of coaxial cable on each. To the far left side we can see three quartz-halogen light, and three spools of extension cable. In front of the Xray machine is a Garret hand-held metal detector between two silver cases, but the resolution is not high enough to determine what is in the cases. To the left of this is a Riser Bond TDR, and what looks like a Biddle TDR, but the resolution is poor. The Laptop is likely dedicated to the TDR's. There appears to me a Kodak Diconic printer in front of the TDR's, and is likely used to hard copy the TDR's. To the right, and just in front of the TDR's is an Old HP 182T Spectrum Analyzer, and a 855x plug in (from the early to mid 70's). To the right of that is a Rhode and Swartz Spectrum Analyzer, and an 100 MHz ? oscilloscope to the right of that. Further to the right are two briefcases, the one to the far right is obviously a collection of standard hand tools, but the resolution of the picture makes it difficult to determine what the second case is, although it looks like an RF set. In front of the tools case are two silver, and two green floor cups, which tells me the guy likely has a background working in data-com centers as there are used to like modular floor panels. Moving back to the left again we see a Audiotel NLJD with several boxes to the right of it that can not be identified due to the picture resolution. Further to the right we see two line-mans craft butt sets, and several toner generators and probes for tracing cables. Next we see three hand-held walkie-talkies, then two Xenon light sources (for fiber optics). Then to the right we see one laptop, and two scanners... the laptop likely being dedicated to the canners. The item to the far right i a LCD basic Spectrum Display Unit for the AOR receiver. In front of the NLJD with see a green box with is a multi-spectrum UV lamp, and a fluorescent light stick next to it. In the same area we also see three rather long fiber optic scopes, and two bore-scopes. In front of that are several cameras. To the left of the cameras we see another laptop, an LCR meter, and several Digital Voltmeters. Behind the volt meters are several other hand-held instruments including a frequency counter. In the very front of the picture, and to the left is a Infrared imager, several flashlights, then several on telescoping poles, and one with a flashlight. On the left, and below the UV lamp is what appears to be a video camera on a pole, and a video monitor, but the resolution is poor and I may be mistaken. -jma At 09:38 AM 6/23/2004, contranl wrote: >. > > >Hi James...the direct link to the pdf file with the picture is in >message # 8972 just a few messages above this one...it is part of >this website: > >http://www.fink-consulting.info > >Greetings > >Tetrascanner >www.tetrascanner.com ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8981 From: contranl Date: Wed Jun 23, 2004 3:51pm Subject: Re: Indoor Gps . I have the feeling that the item "Indoor Gps" is something that seems to go beyond imagination ...i understand that...but what can i say..it's there...it demonstrates how fast things are developing...just watch all your Startrek movies again to be prepared for more things to come....." beam me up scottie " Anyway check out Google : http://www.google.nl/search?q=indoor+gps&ie=UTF-8&hl=nl&lr= and start believing There are a thousand systems that use terrestrial networks to determine the position of an object or person...up till now none can compare with the accuracy of Gps wich is in the few meters range Positioning is implemented and possible in a Tetra network but suffers either from the software for that not being available(yet) or accuracy not being good enough (caused by multipath/reflections) wich is obviously one of the reasons why they now are implementing "Indoor Gps" For that same reason "Indoor Gps" is now implemented in the latest Cellular/Gsm phones A mix of both techniques is called "Gps-A" wich stands for Gps Assisted where both the network and Gps can provide a position...in that case the network does the indoor part (at lesser accuracy) and the Gps the outdoor part...this is a intermidiate solution that needs changes in the network software (the network needs to open up at least 3 connections to the basestations surrounding the target to be able to get a fix)...it was invented before the real "Indoor Gps" came up...Gps-Assisted is already outdated before it really made it to the market. Some other variations do exist but they all need modifications to the networks or costly additional hardware at every basestation. Why using GPS-A when you can now do it with only "Indoor Gps" it does not need any modifications to existing networks since the Gps data is transmitted all the way to the other end trough a transparent data-channel...different usergroups can decide themselves if they want positioning or not...all they would have to do is to buy a slightly (100$ ?) more expensive radio wich includes a "Indoor Gps" unit Tetrascanner www.tetrascanner.com 8982 From: contranl Date: Wed Jun 23, 2004 5:14pm Subject: Movie stuff ? . Have you seen those movies where the have a get-away car... once out of sight they remove the fake paint so the car now has a different color...i believe that was in a Bruce Willis movie called "The Jackal"...when i saw that i thought ..." impossible !" Well it's available now! A peel-able paint that can be removed in a minute ! it does'nt leave a trace ! ...no damage at all ! It's called "MASKIN" taken from mask and skin...it's developed by Akzo-Nobel a chemical company from The Netherlands. As a publicity stunt you can now have your car painted in very bright orange for only 99 Euro's (125 US $) (orange is the color of the national Dutch football team currently joining the world football matches in Portugal) Details from the manufacturer: http://tinyurl.com/ywgeo Pdf file with some pics: http://www.absautoherstel.nl/documents/EK_Actie_Maskin.pdf Short video showing the peeling off (please ignore the guy painting himself orange :) http://www.absautoherstel.nl/oranjeActie/ShowNieuwsISDN.wmv Picture of a "beetle" painted with "Maskin" http://tinyurl.com/364dt Let's wait to see this trick applied in real life Tetrascanner www.tetrascanner.com 8983 From: Steve Uhrig Date: Wed Jun 23, 2004 1:58pm Subject: RE: Indoor Gps Once upon a midnight dreary, Jason Dibley pondered, weak and weary: > Does the Tetra unit gain it's fixes from GPS sattelites or maybe it > aquires its fixes from trilateration between the fixed tetra radio sites > as in some land based RF tracking systems. You generally need more than one antenna (2 to 4 antennas) to get this info via Time Difference of Arrival (TDOA) or Switched Pattern or several other methods. As far as I know, it is not possible to derive bearing information from a single antenna, presuming the transmitters are not sending their location as some sort of data which merely is decoded rather than calculated by the receiver. GPS is, of course, an expensive, special purpose network which falls under different parameters. It's sending data which, when received from several satellites, can be used to calculate the position of the receiver. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8984 From: Steve Uhrig Date: Wed Jun 23, 2004 8:39pm Subject: John Fulford front and center John, if you're reading this list, please contact me regarding your recent order. It is important. If anyone else has contact info for John Fulford in Florida, please mail it to me off list. Tks ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8985 From: lee_claypole Date: Wed Jun 23, 2004 8:45pm Subject: Equipment Required Hello all, I am new to this forum, however not inexperienced in TSCM. I am currently on the market for any advances in equipment and would appreciate any information relating to new products (NOT including OSCAR/SCANLOCK/BROOM2/ORION. If you are a product reseller, please feel free to email me any time with full details/specifications and costings. Regards, Lee From: James M. Atkinson, Comm-Eng Date: Thu Jun 22, 2000 10:29am Subject: Richardson says FBI has determined drives did not leave Los Alamos http://www.cnn.com/2000/ALLPOLITICS/stories/06/21/los.alamos/index.html June 21, 2000 Web posted at: 6:54 PM EDT (2254 GMT) By Ian Christopher McCaleb/CNN WASHINGTON (CNN) -- Two highly sensitive computer hard drives that were missing from the Los Alamos National Laboratories earlier this year never left the premises, and the FBI has uncovered no hints of espionage in the case, Energy Secretary Bill Richardson told a Senate committee Wednesday. The two hard drives, each smaller than a deck of playing cards, held vital nuclear weapons secrets and were stored in a secured vault at the storied New Mexico nuclear weapons laboratory. In a statement opening a lengthy and touchy hearing of Senate Armed Services Committee, Richardson said: "Based upon the investigation by the FBI so far, there is no evidence of espionage, nor is there evidence the drives have ever left Los Alamos." Richardson added that the FBI seems to be on the verge of reconstructing what happened to the drives, saying, "Latent fingerprints were found on the scene, and on the external wrappings of the drives themselves." The FBI continues to comb the "crime scene" -- a room housing a copy machine -- and a grand jury has been convened, Richardson said, punctuating his statement with a declaration that a handful of so-called Los Alamos "X-Division" employees have offered conflicting statements to investigators. The secretary speculated that the disappearance of the hard drives may have been an unintentional mistake by a lab employee, who feared coming forward when alarms were raised. "I will not take (disciplinary) action until I have all the facts before me," he said, vowing, "I will not rest until I know what happened -- when, where, why and by whom." The FBI has said the drives disappeared "at the tail-end of March of this year, March 28," Richardson said. Should the FBI's timeline prove correct, reports issued at the beginning of this week that the drives have been missing since January could be called into question. The two hard drives were discovered missing on May 7, when weapons scientists took an inventory of the drives stored within a vault at the laboratory's X-Division as a massive wildfire approached the facility. The section is perhaps the most sensitive area of the facility, and is where the most classified nuclear weapons research, design and development is undertaken. The scientists had been tasked with checking to assure that all of the division's drives were safely within the vault in the event that the lab would have to be evacuated. An evacuation was ordered the next day because of the fire threat, but no one reported the drives missing until May 31, sparking a massive search of the area -- and deep anger in Washington. The drives contain vital information on the makeup of U.S., Russian, Chinese and French nuclear weapons. They mysteriously reappeared last Friday in a room at the lab that already had been searched several times. Richardson taken to task early, and often Richardson's pledge to bring accountability to bear on those responsible for the missing drives was met with cold stares from committee members of both parties. Members of the Senate have awaited the secretary's appearance for several days, after he last week declined an opportunity to offer Senate testimony, saying he wanted to wait until he had more information. The safety of weapons secrets has dogged Richardson for much of his tenure as Energy Secretary. During his watch, Los Alamos scientist Wen Ho Lee was removed from his position amid charges of spying. He has been formally charged with mishandling classified information -- not espionage -- and awaits trial. Members of Congress have also raised red flags over the reported sale of computers once used at the Savannah River nuclear weapons facility in Augusta, Georgia. Those computers, two senators intimated Wednesday, may have once contained classified information that could have been reconstructed by their new owners. Sen. Strom Thurmond (R-South Carolina) suggested at Wednesday's hearings that some of the Savannah River computers may have been sold to the People's Republic of China. In his opening statement, Armed Services Chairman John Warner (R-Virginia) lined Richardson himself up for accountability, saying that although Richardson has worked to change the security culture at the Energy Department and the national laboratories, ultimately, responsibility for ongoing lapses rests with him. "Mr. Secretary," Warner said directly to Richardson, "On June 23rd of last year you told this committee, in this room: 'The secretary of Energy,' and I quote you, '...must be accountable and must be responsible" for such security failures. " ... We are holding you accountable," Warner said. "These incidents happened on your watch. Like the captain of a ship, you must bear full accountability." Appearing at the hearing, Sen. Richard Shelby (R-Alabama), chairman of the Senate Select Committee on Intelligence, repeated his earlier calls for Richardson's resignation, saying, "I think it's time for you to go." Harsher still was the criticism leveled by Sen. Robert Byrd (D-West Virginia), a member of Richardson's own party, who said Richardson's pledges to get to the bottom of the case would not sway the opinion of the Senate, whose trust he had lost permanently. "The horse is out of the barn," Byrd said. Referring to Richardson's refusal to testify last week, Byrd said, "You've waited and shown contempt of Congress that borders on supreme arrogance." Speaking directly to Richardson, a one-time congressman and former Ambassador to the United Nations, Byrd said, "You had a bright and brilliant career, but you will never again receive the support of the U.S. Senate for any office you seek. You have squandered your treasure." Richardson, who at times looked stunned by the tone taken by many committee members, sought to defend himself -- arguing that he wanted to have "all the facts" in hand before making a congressional appearance. He added that he had made vast changes in the security culture at the department and in the nation's weapons laboratories, and had put off a good many longtime employees as a consequence. "I've been excoriated, but if you go into the scientific and academic community, I am driving scientists away." He also said he has been accused of racism in the Wen Ho Lee case, and has had to battle members of own party who saw regular polygraph tests for employees as a violation of civil rights. Sen. James Inhofe (R-Oklahoma) suggested that the "captain of the ship" wasn't Richardson, but President Bill Clinton, who Inhofe said was responsible for a variety of security policy changes and leaks to the media that have led to a relaxed, careless attitude among those charged with overseeing the nation's weapons secrets. 'Serious loss of control over classified information' Also appearing before the panel was Dr. John Browne, director of the Los Alamos facility. Browne, while attempting to illustrate for panel members -- with charts -- just how difficult it is to gain access to the X-Division, admitted that his security operatives have lost control over how classified information is handled -- mainly because there is no set procedure to determine who handled much of the material and when. "This is not an environment one can easily get into," he said. Still, Browne said, "there is a serious loss of control over classified information at my laboratory," adding, perhaps for the benefit of committee members, that he had "no knowledge that the information has been compromised or tampered with. "From a national security perspective, these are positive indications." Richardson was congratulated by Sen. Pete Domenici (R-New Mexico) for ceding all weapons security issues to a newly confirmed director of a semi-autonomous agency formed to assess and reformulate all security procedures. Air Force Gen. John Gordon, confirmed by the Senate to helm the agency but not as yet sworn into the post, will report to Richardson, but will not be directed by anyone else at the Energy Department. The Senate had held up Gordon's confirmation for months for unspecified reasons, but he was unanimously confirmed last week after news of the hard drives' disappearance was released. "The best thing you could do to leave a legacy for America in terms of nuclear weapons is to [get this agency operational]," Domenici said, scolding Richardson not to engage in any "dual-hatting," and let Gordon make the changes he needs to make. Warner was less congratulatory, warning Richardson outright that he must honor the 1999 law creating the agency and allow it to go about its business unfettered. The panel closed its session to the public and members of the media just after noon on Wednesday so specifics of the case could be discussed. Domenici predicted earlier in the day that a closed session would yield much more in the way of disturbing information. "We could go into a closed session, and you wouldn't believe the things you'd hear in there," he said. "These things have to be corrected too." When the Armed Services proceedings ended at mid-afternoon, Richardson told reporters he just wanted "to do his job" and conclude the investigation. He said the fallout from the security breach was "too political," adding, "I did not utter one partisan word in that committee." Later in the day, the Select Intelligence Committee held a closed-door hearing on the matter. Richardson was in attendance. Shelby, the secretive panel's chairman, emerged from that gathering late in the afternoon, and told reporters he was even "more disturbed" than he had been earlier in the day. The hard drives, Shelby said, contained vital information that could be of great use to terrorists. He did not elaborate on the nature of that information, but said that additional hearings on the matter would be scheduled for next week. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 663 From: Steve Uhrig Date: Thu Jun 22, 2000 5:08pm Subject: Re: Electonic,surveillance,Investigative Eq uipment. Once upon a midnight dreary, Mike F pondered, weak and weary: > So Now I have Thee Book!! > The name is ""THE COVERT CATOLOG 2000"" by Lee Lapin. Lee Lapin is a pen name for Scott French. French, by his own admission, writes for entertainment value. Honesty or accuracy is not a consideration. The book largely is science fiction. Many of the suppliers listed are out of business, and Mr. French knew it but used them to fluff out the book. He lists a number of known fraudulent operations as well as a lot of vaporware. I wonder how many tens of thousands of dollars have been lost because people took the coverage in his book to be implied endorsement and got ripped off? I have reviewed the book and it has essentially no value for the professional. It may be of interest to a spy groupie. The same is true for virtually all of French's works. French is the ultimate armchair commando. Professionals easily can see through his nonsense. If you do enjoy books of that sort, far more realistic and infinitely more valuable are the several books by M. L. Shannon, available through Paladin (I believe they have a website), or possibly direct from Mr. Shannon, his website being www.fusionsites.com. Shannon has been there and his technical information is accurate. French takes one small fact and spins it into a gigantic story as if he has actually done whatever outrageous thing he claims. I don't often take strong positions like this, but I hate to see entertainment material passed off as a valuable resource. Don't take offense Mike, just don't trust any of your honestly earned money to places recommended by French. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 664 From: James M. Atkinson, Comm-Eng Date: Thu Jun 22, 2000 5:31pm Subject: Senate Nuclear Hearings - Grand Jury Convened, Richardson Reamed Senate Grills Secretary of Energy Bill Richardson Senator Robert Byrd (D) WVA reamed Secretary of Energy, Bill Richardson. At one point the Senator said that he doubted if he would ever believe anything Richardson said. It was the worst public whipping of any government employee or appointee in history!!! Senator Byrd: "You have really thrown away a treasure... that treasure being the confidence of Congress -- some of the members of Congress don't have any faith in what you say." A grand jury is being convened to look into the lack of security at the nuclear labs which resulted in missing laptop hard drives. These hard drives miraculously reappeared behind a Xerox machine -- after an indeterminate amount of time. 'You've lost all credibility,'' Sen. Richard Shelby, R-Ala., chairman of the Intelligence Committee, told Richardson. He reiterated his view that Richardson ought to resign. Sen. John Warner, R-Va., who chairs the Armed Services Committee, said he would soon introduce legislation directing an examination of whether the nuclear weapons programs, including the labs, should be turned over to an independent agency or the Defense Department. Secretary Richardson claimed that the FBI has found no evidence of espionage. The Senators did not appear to believe him. Take a look at the way the following article presents these same facts. If you only read the first few paragraphs, you would view this story in a totally different light. This is called "slant". This can be seen immediately when you read the title of the following article. ### http://www.newsday.com/ap/text/washington/ap77.htm AP Washington No Espionage Evidence at Los Alamos by H. JOSEF HEBERT Associated Press Writer WASHINGTON (AP) -- The FBI has found no evidence of espionage or indications that missing computer disks containing nuclear secrets ever left the Los Alamos weapons lab, Energy Secretary Bill Richardson said Wednesday. A grand jury has been convened to consider the case, he told a Senate hearing. Investigators also have lifted fingerprints from wrappings of the hard drives, which apparently disappeared in late March and reappeared last week behind a copying machine at the New Mexico facility. ''The FBI has now determined that these are the authentic disk drives. ... So far there is no evidence of espionage, nor is there evidence that the drives have ever left the Los Alamos X Division,'' Richardson told the Senate Armed Services Committee. Richardson said ''the working theory'' is that the two drives, which contain information on how to dismantle an array of nuclear devices, disappeared ''at the tail end of March of this year'' but that the time has yet to be pinpointed. The disks were discovered missing from the highly secured vault on May 7 by members of a nuclear emergency response team, but the disappearance was not reported to senior lab managers or the Energy Department for 24 days. ''We do not know everything, but we do know more about this case this morning,'' Richardson said, appearing for the first time on Capitol Hill to discuss the security flap that has prompted some senators to call for his resignation. Republican members of the Armed Services Committee opened the hearing with a blistering attack on Richardson, saying he had broken promises made a year ago to assure that secrets are safe at the nation's weapons labs. ''You've lost all credibility,'' Sen. Richard Shelby, R-Ala., chairman of the Intelligence Committee, told Richardson. He reiterated his view that Richardson ought to resign. Sen. John Warner, R-Va., who chairs the Armed Services Committee, said he would soon introduce legislation directing an examination of whether the nuclear weapons programs, including the labs, should be turned over to an independent agency or the Defense Department. Richardson acknowledged the seriousness of the disappearance of the hard drives -- even if there was no espionage -- and offered a list of actions he has taken over the past year to beef up security at the labs. ''In two years I've done more on security than has been done in the last 20 years,'' said Richardson. Until the latest security controversy, he had been held in high regard on Capitol Hill and largely escaped direct criticism stemming from another alleged security breach last year at the Los Alamos lab involving former scientist Wen Ho Lee. Still, members of both parties showed little sympathy for Richardson this time. ''There's no tolerance for data of this kind to be missing,'' declared Sen. Carl Levin of Michigan, the top Democrat on the committee. He said lab scientists were ''worried about their own skins'' and tried to cover up the loss for weeks. After interviewing dozens of people and conducting a string of polygraph tests, investigators were still uncertain when the two drives disappeared. The last written record showed them to be in the vault of the high-security ''X Division,'' where nuclear designers work, at the first of the year. Richardson said the FBI now puts the loss at the end of March. Originally investigators were told by a Los Alamos scientist that he saw the disks in the vault on April 7. Richardson also said that the investigation is focusing on ''a handful of X Division employees who have offered conflicting statements to investigators.'' ''The last actual inventory that gives us a degree of certainty took place as part of the Y2K inventory,'' Rep. Porter Goss, R-Fla., chairman of the House Intelligence Committee, said in an interview Tuesday. ''That screams at me and says we've got a procedure problem.'' The lab's failure to require basic logout and login procedures for the devices is among the issues troubling members of Congress. Energy Department and lab officials have said no such tracking was required under a relaxed policy instituted in the early 1990s for material classified as ''secret'' -- as opposed to ''top secret.'' Richardson said he has changed the procedure and now requires information such as the data on the hard drives to be encrypted, and has required the vault to have guards when someone enters and a formal logout and login procedure. The lack of close tracking of the devices has confounded investigators trying to determine when the devices first were taken. All 26 individuals who had unescorted access to the vault have been given polygraph tests, according to Richardson. ^------= On the Net: For general information about the Los Alamos lab: http://www.lanl.gov/worldview/ AP-NY-06-21-00 1125EDT< 06/21/2000 =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 665 From: William Knowles Date: Thu Jun 22, 2000 2:44pm Subject: Chinese Spy Fever Strikes Again in Washington http://dailynews.yahoo.com/h/nm/20000622/ts/china_agency_dc_1.html Thursday June 22 5:27 PM ET By Jonathan Wright WASHINGTON (Reuters) - Chinese spy fever has struck again in Washington with the revelation that the Chinese news agency Xinhua bought an office building within sight of the Pentagon without U.S. government approval. The State Department said on Thursday it had told the Chinese embassy it must now seek approval, as required by a law covering all diplomatic purchases of U.S. real estate, even though the sale has already gone through. One member of Congress, Republican Dana Rohrabacher of California, said he was worried that Xinhua, which has close connections with the Chinese government, had bought a building so close to the heart of the U.S. military establishment. ``I'm very concerned to hear that what well could be an arm of Communist Chinese intelligence is now overlooking the Pentagon and has a bird's eye view electronically of everything we're doing,'' he said after a congressional hearing. ``This is something I will look into and others in the government should look into,'' he added. A U.S. intelligence official, speaking on condition of anonymity, said he couldn't rule out the possibility that China used some Xinhua people for gathering intelligence. Over the past few years, Washington has had a series of flaps over alleged espionage by China or over Chinese government influence in business and politics. But Pentagon spokesman Kenneth Bacon said a rejection of the sale would not be automatic. The Pentagon would evaluate the ''pros and cons'' of having the agency in the neighborhood and make a recommendation to the State Department. ``We are mature enough to realize, and realistic enough to realize, that this building is subject to surveillance from a number of different directions and has been for more than 50 years and we obviously have a number of countermeasures we have installed over time to defeat or foil surveillance,'' he said. ``It's not new to us -- the idea that people might want to watch or listen to what goes on in the building, and we've been living in that environment, for over 50 years,'' Bacon added. The State Department and the Chinese embassy gave very different accounts of how Xinhua came to buy the building and what U.S. law really requires. State Department spokesman Philip Reeker said: ``The Xinhua news agency should have requested prior authorization from the Department of State to purchase an apartment building. ``We have informed them that they must make such a request, and the State Department will have 60 days in which to authorize or deny such a request when it's made.'' But an embassy spokesman said Xinhua was a private company ''duly registered'' in Virginia, where the Pentagon is, and did not require State Department approval to buy property. Besides, he added, Xinhua did write to the State Department in late May to say it planned to go ahead with the purchase unless it heard objections by June 15. ``They received nothing in return. So they decided to go ahead. It was only after this story hit the press that the State Department began to ask questions,'' he added. When Xinhua bought its current premises in 1985, there was clear understanding that Xinhua was not subject to the Foreign Missions Act, which covers diplomatic property, he said. Reeker disagreed. ``The Xinhua news agency is considered tied to the government of the People's Republic of China and therefore is under the relevant provisions of this act in terms of the restriction. They're very aware of that. The embassy is aware of that,'' he said. *-------------------------------------------------* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen. Alfred. M. Gray, USMC --------------------------------------------------- C4I Secure Solutions http://www.c4i.org *-------------------------------------------------* 666 From: Date: Thu Jun 22, 2000 3:30pm Subject: Re: Re: Electonic,surveillance,Investigative Eq uipment. In a message dated 6/22/00 3:36:28 PM Pacific Daylight Time, steve@s... writes: << Don't take offense Mike, just don't trust any of your honestly earned money to places recommended by French. >> you should have let this blow by 667 From: Date: Thu Jun 22, 2000 3:51pm Subject: Re: Re: Elect,surv,Inv Euip. - ERROR My last post was meant to be a private reply. My apologies to the list. 668 From: James M. Atkinson, Comm-Eng Date: Thu Jun 22, 2000 8:23pm Subject: Breaches in national security all too familiar (Asleep at the Wheel) 06/19/00- Updated 04:22 PM ET Breaches in national security all too familiar http://www.usatoday.com/news/comment/columnists/tmoran/tm10.htm "I'd tell you, but then I'd have to kill you." We've all heard this cloak-and-dagger catch phrase from friends who choose not to divulge particulars. It's said as a joke, but some people actually have jobs that require keeping their mouths shut. They're not all spies, of course. Many work for defense contractors and government agencies. But all of them have security clearances, allowing them access to sensitive material. Having a security clearance is an honor and a privilege, and though I'm sure most folks who carry those fancy badges recognize the importance of their work, there are a few who are making the whole lot of them look bad. Recent news reports point to many security failures in some of our most exclusive government buildings and research laboratories: Two hard drives believed missing for weeks were found behind a copy machine in the Los Alamos, N.M., national laboratory. Staffers noticed that the drives were missing May 7 but did not inform their supervisors until May 31. The drives contained highly sensitive data, including information on how to arm and disarm nuclear missiles, and were used by a team that responds to nuclear accidents and terrorism. Despite the materials' sensitivity, the drives were classified only as "secret" rather than "top secret." Los Alamos nuclear scientist Wen Ho Lee was arrested in December 1999 and charged with mishandling classified information after downloading classified files onto his home computer. The FBI has failed to produce any evidence that Lee passed information to Chinese authorities, but prosecutors believe that was the intention. Some of the top-secret computer files have never been found. Lee faces a 59-count indictment and life in prison if convicted. In April 2000, a laptop containing data on arms proliferation disappeared from a secured conference room at the State Department. The "classified" laptop was not password-protected. In May 2000, the General Accounting Office revealed that GAO agents in plain clothes used phony identification cards to enter 19 of the government's most secure buildings and two airports. They were allowed access to offices of the CIA, FBI, State Department, Justice Department and the Pentagon. Their briefcases were not searched. In May 2000, the State Department reported that 15 unclassified laptop computers had disappeared in the past 18 months. In early May 2000, a section chief at the FBI's national security division said foreign intelligence officers were working in the news media at the State Department. In December 1999, Russian diplomat Stanislav Borisovich Gusev was forced to leave the United States after being accused of eavesdropping with a listening device only doors from Secretary of State Madeleine Albright's office. An internal State Department audit in December 1999 found that visitors, contractors and maintenance workers were being allowed to roam the building unsecured. In 1998, a man entered the office of the executive secretary to the secretary of state and removed sensitive documents. Neither the man nor the papers have been located. In 1996, the CIA learned that former director John Deutch had mishandled classified materials by keeping them on as many as eight unsecured home and office computers - which also were used by Deutch's children to surf the Internet. The CIA didn't report the find to the Justice Department until March 1998, and congressional oversight panels were not notified until June 1998. In April 1999, the Justice Department found that Deutch was sloppy but not criminal in his mishandling of the materials, and the former director's security clearance was revoked in July 1999. The case has since been reopened to ensure fair treatment in light of the Wen Ho Lee case. If you've been watching the news lately, you know that Energy Secretary Bill Richardson is under fire for the lapses at Los Alamos. Some Republican lawmakers have asked for Richardson's resignation. Richardson took over at the DOE in fall 1998 with the mission of ensuring security at the national research laboratories. When Wen Ho Lee fell under suspicion last year, Richardson was adamant that the labs needed to change their ways. "Security here has been treated with a low priority, and secretaries in the past have never tackled this because of constituencies, politics," Richardson said. "There's a lack of accountability and responsibility, and we're going to correct that." This led to Richardson's Security Reform Package in spring 1999, which called for the creation of an Office of Security and Emergency Operations, better oversight, inventory accountability, cybersecurity improvements and a zero-tolerance security policy. In July 1999 Richardson ordered a security "stand-down," requiring all DOE employees to participate in a brief security training and education program. He also reversed his opposition to approve a controversial plan to create an independent oversight panel, leading to the establishment of the Office of Independent Oversight and Performance Assurance. Its first report came out in August 1999. Richardson established a position for a security "czar" to ensure that security programs at the labs are effective. And in spite of these changes, a few staffers at Los Alamos failed to tell their supervisors about the missing hard drives for weeks. This scandal pushed the Senate last week to confirm Air Force Gen. John Gordon, the current deputy CIA director, to head a new nuclear weapons agency at DOE. Richardson wants Gordon to get to work immediately on a full review of the three nuclear laboratories. It seems Richardson has become the fall guy for national security breaches not only at DOE but also at all "secured" government agencies. Problems have been cited at the State Department, FBI, CIA and the Pentagon. So the problem reaches far beyond Energy; and it stems from the fact that people disregard rules and regulations. Some may argue that by claiming a need for accountability, Richardson should be prepared to fall on his sword over the security scandal at Los Alamos. Instead, that sword should be pointed at the levels where security was breached. Those at Los Alamos who failed to report the hard drives missing should be collecting unemployment. Guards at the various Washington agencies who admitted agents with phony identification cards should be dismissed. Former CIA director John Deutch, who should have been setting an example as a pillar of the intelligence community, should be punished severely for his audacity in copying classified files to his unsecured home computers. You get the idea. Make those responsible for national security breaches account for their behavior, and make them pay for mistakes. Only by setting examples within the ranks can you change behavior. Besides, there are plenty of people who do observe the rules, and they should be allowed to take pride in the fact that they promote and protect national security. When colleagues lose classified hard drives, laptops and documents, it's a little hard for these folks to hold their heads high. Tracy Moran is the opinion editor for USATODAY.com. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 669 From: William Knowles Date: Fri Jun 23, 2000 0:01am Subject: Infamous Ex-CIA Agent Philip Agee Resurfaces in Cuba http://ap.tbo.com/ap/breaking/MGI07PADT9C.html Jun 23, 2000 - 01:07 AM By Nicole Winfield Associated Press Writer HAVANA (AP) - Former CIA agent Philip Agee, a longtime friend of communist Cuba who exposed purported CIA operatives in his infamous book, has resurfaced in Havana, where he has launched what he says is the first independent American business in 40 years. With European investors and the state-run travel agent as his partner, Agee has opened a travel Web site designed specifically to bring American tourists to the island - even if it means violating the U.S. trade embargo. The site, cubalinda.com, offers package tours within Cuba and other help with Cuban tourism that is largely off limits to Americans because of U.S. law. "I would like to see people ignore the law," Agee said at a press conference Thursday. "The idea is to disdain this law to the point that our grandfathers disdained Prohibition." [...] http://www.cubalinda.com *-------------------------------------------------* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen. Alfred. M. Gray, USMC --------------------------------------------------- C4I Secure Solutions http://www.c4i.org *-------------------------------------------------* 670 From: WFR Date: Thu Jun 22, 2000 9:56pm Subject: Re: Electonic,surveillance,Investigative Eq uipment. This is only the second time I have posted to the list, so I do not have much clout. What I am about to say may seem rude to a few, but I am concerned about the advertisement in this post. I went to the site (link was provided in the post) and was appalled by the prices. For someone to recommend a book that is supposed to save people money, (if interested in purchasing surveillance equipment) when the publisher of the book sells the products for a 200% mark-up, is professionally appalling. I am not a huge purchaser, but I do sell equipment to specific businesses. I know what costs what, and I can tell you that by making a phone call to a reputable equipment manufacturer, and dealing with a rep, you will usually get the best possible deal. You certainly don't need a book to tell you who to call and where to find equipment. If you need the book, you are in the wrong business! O.K, some may find the above paragraph taking things to far, but some others find the advertisement a load of .... Exit stage left, Bill Rust Desperate Measures, Inc. ----- Original Message ----- From: Mike F To: mfriindy@w... Sent: Thursday, June 22, 2000 9:10 AM Subject: [TSCM-L] Electonic,surveillance,Investigative Eq uipment. Hi, I will try to keep this email fairly short. This will be Difficult because it about Something that aGreat Resource and the Prices. A some of list Members know that I say this often ""I'M NOT FRUGAL,....... HELL, I'M A BONA FIDE......CHEAPSKATE!!!!! I am always looking for Good but yet Inexpensive,Surveillance & Electronic equipment. I do fairly well on EBAY but it is Risky, there where a few times the Ebay purchases where a mistake. So Now I have Thee Book!! BEST SOURCE & RESOURCE 4 ,"electronic surveillance equipment,countermeasures gear,transmitters,and covert and Security Cameras. The name is ""THE COVERT CATOLOG 2000"" by Lee Lapin. Here are the chapter titles of this book. 1. ELECTRONIC SURVEILLANCE 2. COUNTERMEASURES 3. VIDEO SURVEILLANCE 4. ELECTRONIC TRACKING 5. COMPUTER SURVEILLANCE & ATTACK 6. CELL PHONES Interception & Blocking 7. OPTICS AND NIGHT VISION 8. WEAPONS AND PERSONAL PROTECTION 9. COVERT ENTRY 10. MAGAZINES AND NEWSLETTER 11. SAMPLE NEWSLETTER <==sample of Lee Lapin's Newsletter 12. MISCELLANEOUS And Too Late To Classify This Book is gives you Direct Access to the Manufacturers and Distributors of Equipment. If you or the Company you work for is in the market any surveillance equipment. "The Covert Catolog 2000", is for me the king of CHEAPSKATES an indespensible comparative resource. I want to know Where the Best Equipment is,and who has that equipment for the Lowest price. Here is the Website of Lee Lapin. If you click on Newsletter You can get Sample copy. The Covert Catolog 2000 is in the catolog http://www.intelligence.to/ L8R4,Mike f. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." ------------------------------------------------------------------------------ ------------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 671 From: Guy Urbina Date: Thu Jun 22, 2000 6:34pm Subject: labs getting black eye... As a former federal weapons lab engineering employee, I want to say something positive about the labs.... Yes, the culture between scientists and security were at odds and yes the security was lax as compared to let's say a DOD installation. But I believe the college level atmosphere does foster creative thinking. I agree that a separate entity to oversee the security is wise, and let the academics do the science. let's see.......what comes to mind as far as some achievements the labs have done....(unclassified of course) we've improved laser science by leaps and bounds....using ultraviolet laser lithography ( or smaller wavelengths) we can read and write more data to media such as CD-roms, increasing the data density. An innovative RF application, micropower impulse radar....(radar on a chip) uses fast pulse technology and range gating to see through walls, creates 3D radar pictures. The nonlethal technologies you may have seen in the media were developed and are continuing to be developed at LANL, LLNL and SNL. anyway...you get the picture....(getting off soapbox) There are alot of fantastic things that we did , that for now, we can't disclose. the people are hardworking....the EE departments are a smart and intelligent patriotic bunch of guys and gals...I learned most of my engineering experience in lasers, RF, optoelectronics, digital, analog and fast timing electronics at the national labs. -Guy 672 From: Hoffman Date: Fri Jun 23, 2000 10:50am Subject: CCS Books. Question as to quality. [A question; and maybe a brief rant related to professional literature in the field of communications and security]. Has anyone on this mailing list purchased or read the various books published by CCS. {see: http://www.spyzone.com/ccs/publish_catalog.html} The publishers want alot of money for these books (even with the so-called "dealers discount")... but considering some of the books are 500 to 700 pages long I'd like to know how comprehensive and accurate the material is? More than one colleague has told me: "to stay th hell away from CCS", as they are (quote) "scam artists who run disreputable spy shops that don't deliver." I'll take that comment "with a grain of salt"... and factor into the equation that I do not usually fall for the anti-spy shop hysteria. Those guys just want to make a buck like everyone else in this country... so I see no need to put them down for being good entrepeneurs... Anyway... it's the books I'm interested in... Not CCS's reputation. [the rant] I have about 10,000 plus books in my personal library, and am always looking to aquire new books. After buying so many books it has occured to me that you usually get what you pay for. However, that is not always the case. I am accustomed to ponying up large sums of cash for so-called "trade/professional" books and sometimes the price is worth it. For example, most anything published by prestigious Artech Publishing or maybe even Butterworth is worth the $100 because you know it's almot ceartainly published by PhD's... .....and I know that $200 I spent on 'Telephone Eavesdropping and Detection' by Taylor and Udovich was worth it. The latter was not really all that technical; but it was comprehensive, and so worth the price in my mind. Unfortunately, sometimes you pay a premium price and what you get back is less than expected. There is one very famous countermeasures man whos books I find to be (although extremely well written)... not worth the price. I find it unfortunately that in such cases, gullible readers do not realize that they are not just paying for quality info... but rather are paying the premium price for "brand name"... Apparently, some guys think that because of they're reputation they can write a 25 page book and charge people $150 for it. It's particularly annoying when you pony up that kind of dough only to find the information to be rather elementary. I wont name names.... but I'm not gullible enough to fall for this scheme. I don't really care what a persons "reputation" is, or how long they worked for the CIA. All I know is... when I pay $150 for a book... it damned well be as good as something I get from Artech House which is usually Masters and PhD quality material through- and-through. Sometimes the excessive cost is due to self-publishing... I understand this because my company has self-published alot of our own manuals and white papers, and I realize that it can cost over 3 times as much to self publish.. but $150 for 20 pages, spare me. [rant mode off] 673 From: Robert G. Ferrell Date: Fri Jun 23, 2000 0:57pm Subject: Re: labs getting black eye... >let's see.......what comes to mind as far as some achievements the labs have >done....(unclassified of course) Don't forget the fabulously cool (if a bit disconcerting) work on the Principia Cybernetica Web Server by Johan Bollen and the Distributed Knowledge Systems group at LANL. RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 674 From: James M. Atkinson, Comm-Eng Date: Fri Jun 23, 2000 5:59pm Subject: Re: CCS Books. Question as to quality. I personally own the CCS books on Surveillance, a set of their "franchise kit" and thousands of pages of their sales materials, brochures, marketing literature, product spec sheets, and so on. I have also attended several of their "presentations", and watched a number of their demonstrations over the years. I can say with out the slightest amount of reservation that the books they are complete and utter over priced, over hyped, worthless horse shit (excuse my French). The books are little more (over 90%) then a rehashing of basic electronics and simplified radio theory and is YEARS out of date. The book is actually worth about 30 bucks, 50 at the most, but is offered for ten times that amount. If you really must have the book, then by all means put your money down and buy one (I did), but it really is a crappy book. Spend your money on some of Grobbs books, or Carr, or even buy the Donald-Christensen's EE Platinum Edition. For the same amount of money you can build a formidable collection of books. I HIGHLY, repeat HIGHLY recommend the books written by Glenn Whidden, and feel that the materials are worth 5 times what he charges. I feel the same way about the Telephone books by Udovich, and a few other authors work. I have listed a few dozen books I recommend on my website at http://www.tscm.com/pubs.html (I should point out that while I have the CCS books listed on one of the pages, I still think they suck). -jma At 11:50 AM -0400 6/23/00, Hoffman wrote: >[A question; and maybe a brief rant related > to professional literature in the field of > communications and security]. > >Has anyone on this mailing list purchased or read the >various books published by CCS. >{see: http://www.spyzone.com/ccs/publish_catalog.html} >The publishers want alot of money for these books >(even with the so-called "dealers discount")... but considering >some of the books are 500 to 700 pages long I'd like >to know how comprehensive and accurate the material is? > >More than one colleague has told me: "to stay th hell >away from CCS", as they are (quote) "scam artists who run >disreputable spy shops that don't deliver." I'll take that >comment "with a grain of salt"... and factor into the equation >that I do not usually fall for the anti-spy shop hysteria. >Those guys just want to make a buck like everyone >else in this country... so I see no need to put them >down for being good entrepeneurs... Anyway... it's >the books I'm interested in... Not CCS's reputation. > >[the rant] >I have about 10,000 plus books in my personal library, >and am always looking to aquire new books. After buying >so many books it has occured to me that you usually >get what you pay for. However, that is not always the >case. I am accustomed to ponying up large sums >of cash for so-called "trade/professional" books and >sometimes the price is worth it. For example, most >anything published by prestigious Artech Publishing >or maybe even Butterworth is worth the $100 because >you know it's almot ceartainly published by PhD's... >.....and I know that $200 I spent on 'Telephone >Eavesdropping and Detection' by Taylor and Udovich >was worth it. The latter was not really all that technical; >but it was comprehensive, and so worth the price >in my mind. > > Unfortunately, sometimes you pay a premium price >and what you get back is less than expected. There >is one very famous countermeasures man whos books >I find to be (although extremely well written)... not >worth the price. I find it unfortunately that in such >cases, gullible readers do not realize that they are not >just paying for quality info... but rather are paying the >premium price for "brand name"... Apparently, some >guys think that because of they're reputation they can >write a 25 page book and charge people $150 for it. >It's particularly annoying when you pony up that kind >of dough only to find the information to be rather >elementary. I wont name names.... but I'm not >gullible enough to fall for this scheme. I don't really >care what a persons "reputation" is, or how long >they worked for the CIA. All I know is... when I pay >$150 for a book... it damned well be as good as >something I get from Artech House which is >usually Masters and PhD quality material through- >and-through. Sometimes the excessive cost is >due to self-publishing... I understand this because >my company has self-published alot of our own >manuals and white papers, and I realize that it can >cost over 3 times as much to self publish.. but >$150 for 20 pages, spare me. > >[rant mode off] =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 675 From: Intelligence Inc. Date: Fri Jun 23, 2000 2:00pm Subject: Re: Electonic,surveillance,Investigative Eq uipment. Please note, we are NOT a spy shop- sell NO audio (in fact no video devices as of a year ago) units. Our publications, CD's and tapes are widely used by many legit investigators in both law enforcement and private fields. We have a strong recommendation from, among others, the director (at that time) of the CIA. The FBI has utilized our materials as training materials. Intelligence Inc. Gordon Mitchell wrote: > > Mike -- > > It is possible that you may have included the wrong URL. The company with intelligence in their name is just another rip-off spy shop that has deceptive ads and tools for folks who would like to violate the law by installing audio devices. > > I am sure that as a professional you would not want to be associated with this organization. Likely those on the list do not want to get their ads or further posts on the topic. > > Gordon Mitchell > Future Focus, Inc > (888) BUG-KILR > > Mike F wrote: > > > Hi, > > I will try to keep this email fairly short. > > This will be Difficult because it about Something that aGreat Resource and > > the Prices. > > A some of list Members know that I say this often > > > > ""I'M NOT FRUGAL,....... > > HELL, > > I'M A BONA FIDE......CHEAPSKATE!!!!! > > > > I am always looking for Good but yet Inexpensive,Surveillance & Electronic > > equipment. > > I do fairly well on EBAY > > but it is Risky, > > there where a few times the Ebay purchases where a mistake. > > > > So Now I have Thee Book!! > > > > BEST SOURCE & RESOURCE 4 ,"electronic surveillance > > equipment,countermeasures gear,transmitters,and covert and Security Cameras. > > > > The name is ""THE COVERT CATOLOG 2000"" by Lee Lapin. > > Here are the chapter titles of this book. > > 1. ELECTRONIC SURVEILLANCE > > 2. COUNTERMEASURES > > 3. VIDEO SURVEILLANCE > > 4. ELECTRONIC TRACKING > > 5. COMPUTER SURVEILLANCE & ATTACK > > 6. CELL PHONES Interception & Blocking > > 7. OPTICS AND NIGHT VISION > > 8. WEAPONS AND PERSONAL PROTECTION > > 9. COVERT ENTRY > > 10. MAGAZINES AND NEWSLETTER > > 11. SAMPLE NEWSLETTER <==sample of Lee Lapin's Newsletter > > 12. MISCELLANEOUS And Too Late To Classify > > > > This Book is gives you Direct Access to the Manufacturers and Distributors > > of Equipment. > > If you or the Company you work for is in the market any surveillance > > equipment. > > "The Covert Catolog 2000", is for me the king of CHEAPSKATES an > > indespensible comparative resource. > > I want to know Where the Best Equipment is,and who has that equipment for > > the > > Lowest price. > > > > Here is the Website of Lee Lapin. > > If you click on Newsletter You can get Sample copy. > > The Covert Catolog 2000 is in the catolog > > http://www.intelligence.to/ > > > > L8R4,Mike f. > > > > Michael T. Fiorentino > > Syracuse,NY 13206 > > "CONFIDENTIALITY WARNING" > > This electronic message contains information which may be privileged and/or > > confidential. The information is intended for use only by the > > individual(s) > > or entity named/indicated above. If you are not the identified/intended > > recipient, be aware that > > any disclosure, copying, distribution, or use of the contents of this > > message/information is prohibited. If you are not the indicated recipient > > or > > have > > received this message in error contact our offices immediately for > > instructions." > > > > ------------------------------------------------------------------------ > > SALESFORCE.COM MAKES SOFTWARE OBSOLETE > > Secure, online sales force automation with 5 users FREE for 1 year! > > http://click.egroups.com/1/2658/1/_/507420/_/961679487/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > ------------------------------------------------------------------------ > SALESFORCE.COM MAKES SOFTWARE OBSOLETE > Secure, online sales force automation with 5 users FREE for 1 year! > http://click.egroups.com/1/2658/1/_/507420/_/961680113/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 676 From: James M. Atkinson, Comm-Eng Date: Fri Jun 23, 2000 7:26pm Subject: Detective Agency Obtained Documents On Microsoft at Two Additional Groups Detective Agency Obtained Documents On Microsoft at Two Additional Groups By TED BRIDIS and GLENN R. SIMPSON Staff Reporters of THE WALL STREET JOURNAL WASHINGTON -- Investigative Group International Inc., the detective agency linked to attempts to buy the trash of a pro-Microsoft Corp. trade association, obtained internal information from two other groups that support Microsoft in its antitrust fight, according to people with knowledge of IGI's operations. IGI conducted successful actions against the Independent Institute of Oakland, Calif., which focuses on economic policy, and the National Taxpayers Union in Arlington, Va. The company obtained documents showing Microsoft's financial support of the groups, which later appeared in news accounts. The disclosures mean that IGI's anti-Microsoft campaign -- on behalf of a still-unidentified client -- was much longer and more elaborate that previously known, occurring over the course of a year and spanning the country. Several people with ties to IGI provided the details on the operations contained in this report. In the Independent Institute matter, IGI employee Robert M. Walters coordinated efforts from Washington to collect information about the group's funding sources. The institute began defending Microsoft in 1998 and took out pro-Microsoft ads last June. In September, the New York Times published a story citing internal documents from the institute that indicated Microsoft had paid for the ads. The newspaper wrote that it obtained the paperwork from "a Microsoft adversary associated with the computer industry who refused to be further identified." Institute officials said they believe the funding information may have been in two laptop computers stolen from the group the same month the ads appeared. IGI Chairman Terry Lenzner wouldn't discuss any specifics of cases the firm is involved in or its clients. "We would never allow anybody to steal property or break into a site we were not authorized to be in," he said. "And I know of no matter where we've ever been in the possession of a computer without specific authorization of the owner." IGI obtained information from the National Taxpayers Union by collecting its garbage earlier this year. The group began claiming last year that the government's antitrust case against Microsoft was motivated by the prospect of large fines. In May, Microsoft's contributions to the group were detailed in The Wall Street Journal and the Washington Post. The efforts to pass information detrimental to Microsoft continue. Mr. Lenzner contacted associates in New York last week, telling them that one of Microsoft's adversaries had hired his firm and he had uncovered new embarrassing information about the software giant, according to people familiar with the discussions. He said he was looking for a public-relations firm that could pass details to the media without disclosing his role, these people said. Last year, IGI's Mr. Walters, who declined more than a dozen requests for comment, told friends in Washington he was looking into contributions from Microsoft to organizations critical of the antitrust case, according to people familiar with his activities. Even the firm's critics said it was unlikely Mr. Lenzner would tolerate criminal activity. Former employees and others familiar with IGI operations say the firm's methods include interviewing former or disgruntled employees, conducting "pretext" interviews where the questioner doesn't identify himself as an IGI investigator, and obtaining trash. Collecting trash is a legal activity and is fairly common in the investigations business. But Independent Institute President David Theroux said he believes the information about the ad payments, which he said has been misrepresented, came from the stolen laptops. Institute officials were careful never to throw away the documents about the ad payments, Mr. Theroux said. He added that financial paperwork is shredded and trash is in a locked box. However, he added, "We don't have any proof exactly about how the documents were gotten." IGI's anti-Microsoft work came to light after efforts to buy the trash of the Association for Competitive Technology earlier this month. Office cleaners said a woman twice asked them to bring the group's trash to the nearby offices of Upstream Technologies Inc., which began leasing space in the building May 1. Records show that Mr. Walters completed the credit application for Upstream and paid for the office space with a personal check for $4,445 dated April 17 and drawn on his own bank account. Write to Ted Bridis at ted.bridis@w... and Glenn R. Simpson at glenn.simpson@w... =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== [Non-text portions of this message have been removed] 677 From: James M. Atkinson, Comm-Eng Date: Fri Jun 23, 2000 11:59pm Subject: Books, Books, Books... Since several list members have asked that I should suggest a few more books I would like to offer the following. First, I feel that it is wise to FIRST obtain several dozen books on Basic Electronics, Modern Communications, and "the basics behind the business". The first five basic books may be found at the follow (these are very important to have): http://www.tscm.com/pubs6.html Second are the communication books, and I strongly recommend the first four books listed on the following page, these are also very important: http://www.tscm.com/pubs4.html Third are books on acoustics, and I recommend the first three listed on the following page: http://www.tscm.com/pubs3.html Next make a trip down to your local Government Printing Office and pick up a copy of both Title 18 and Title 47 (all sections). Of most importance will be title 47, and I would suggest they you pay for a full set of books, and then set up a subscription to get updates on a regular basis. (All total you will get about six books) Now for the TSCM books.... You will want to purchase at least the first 16-17 books on the following page: http://www.tscm.com/pubs1.html This should give you about 35 books, and you can also print off the materials on this website (about 6000+ pages) and stick them into binders (for about 35 more volumes). Now add to this the course materials you receive while attending various TSCM schools, and the manuals for you equipment (which add up really fast). -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 678 From: Miguel Puchol Date: Sat Jun 24, 2000 8:11am Subject: RE: Electonic,surveillance,Investigative Eq uipment. Hi, > Please note, we are NOT a spy shop- sell NO audio (in fact no video > devices as of a year ago) units. > > Our publications, CD's and tapes are widely used by many legit > investigators in both law enforcement and private fields. > > We have a strong recommendation from, among others, the director (at > that time) of the CIA. The FBI has utilized our materials as training > materials. > > Intelligence Inc. Errrr...from your web site: "Wireless Video Surveillance Transmitter Hook it up to any miniature camera (including our pager/watch units), add a 9 volt battery and this tiny, tiny (world's smallest, a little over 1"x1") crystal controlled transmitter will send the signal 200-500 feet to any cable ready TV or VCR. No special receiver needed!" Price stated $279. Hmmmm....saw a camera with built-in 2.4GHz transmitter smaller than that - 11x11 mm (0.43"). Or, what about: "These units can be purchased from many suppliers and take advantage of the newly available, even approved by our old friends the FCC, low power video bands at 900 MHz and 2.4 GHz. As anyone who has ever tried to ferret these units out with conventional countermeasures gear can tell you; she no be happenin'. In fact, testing a number of mid to top end (read $14K here) counter surveillance units failed to provide one reliable video finder." This is relating to the FD-3000 'video finder', well, if I can see video signals in these bands with an AR5000 tied to an SDU-5500 'spectrum display unit', then I can safely assume that any TSCM specialist with average equipment could also... I don't mind, as someone else stated in a post, people making money be it with professional TSCM activities or with spy-shop articles, but I cannot accept trying to deceive costumers into spending money on something which is not what they are paying for... Cheers, Mike 679 From: James M. Atkinson, Comm-Eng Date: Sun Jun 25, 2000 1:47pm Subject: More possible breaches at U.S. nuclear lab More possible breaches at U.S. nuclear lab http://news.excite.com/news/r/000624/19/crime-nuclear Updated 7:24 PM ET June 24, 2000 LOS ALAMOS, N.M.(Reuters) - Los Alamos National Laboratory, already under fire for the temporary disappearance of hard drives containing nuclear secrets, had two more possible security breaches this week, officials said Saturday. Two floppy disks containing classified information were reported missing for a day and, separately, a door was left open in the classified area of the laboratory's administration building, officials said. The incidents were less serious than a breach that this month sparked criticism of the government over the loss -- and later mysterious reappearance -- of two hard drives that contained secrets on U.S., Russian, Chinese and French nuclear systems to help a team of experts dismantle weapons in an emergency such as a terrorist attack. Still, this week's potential lapses could draw fresh attention to the issue of security at the largest U.S. nuclear weapons laboratory. Officials reported missing Wednesday two 10-year-old floppy disks that were found Thursday attached to a written report in a nearby "secured, contained area," Los Alamos Laboratory spokesman Jim Danneskiold said. "It's an obsolete technology," Danneskiold said of the disks. "I'm not even sure if they're readable by computers at the lab." As part of an inventory of the lab, the floppy disks were noticed missing during a review of the same vault where the hard disks had been stored, Danneskiold said. A second incident also occurred on Wednesday, when a computer technician working on a bank of computer switches in the administration building left the room without locking a door. "The door leading into the room where the bank is was locked," said Danneskiold. "But the panel, or closet door, to the switches was found unlocked. The area is behind a fence inside a secure area." Officials from the laboratory and the Department of Energy are investigating both incidents and will issue a report of their findings. A grand jury is looking into the earlier security lapse involving the hard drives, which were discovered missing on May 7 from the top-secret X-Division of the laboratory, which was founded in the 1940s for construction of the first atomic bomb. Roughly the size of a deck of cards and used by the Nuclear Emergency Security Team, or NEST, the hard drives were later found behind a copy machine near the vault from which they disappeared. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 680 From: Jay Coote Date: Sun Jun 25, 2000 10:05pm Subject: Schematics Needed for Projects I am trying to find schematics for the following so that I can build these myself - can someone email me some scans or JPGs of these? 1.Tone sweeper, four separate sweeping tones, voiceband, 0dBM level output... to go in a telephone breakout box. 2.Subcarrier receiver for use with R-71, R-8500 or AOR AR5000. Tunable for all SC freqs and connects to receiver. Also usable direct on mains/tel lines for CC detection. 3.Block convertors. 2-4 Ghz in = 0-2 GHz out, also 4-6 Ghz in = 0-2 Ghz out. To be used with 0-2 GHz multimode comms receiver. Thanks, Jay Coote 681 From: James M. Atkinson, Comm-Eng Date: Mon Jun 26, 2000 8:10am Subject: Nuclear scientists often targets of foreign spies Sunday, June 25, 2000, 12:00 a.m. Pacific Nuclear scientists often targets of foreign spies by Vernon Loeb The Washington Post WASHINGTON - A report by the General Accounting Office (GAO) says the Department of Energy (DOE) has identified more than 75 incidents of foreign spies targeting U.S. nuclear scientists traveling abroad by bugging their hotel rooms, rifling their personal belongings and offering them sexual favors. The report, requested by Reps. Timothy Roemer, D-Ind., and Benjamin Gilman, R-N.Y., faults the department for underestimating threats posed by travel to nonsensitive countries such as Britain and France. It recommends that counterintelligence officials at DOE's national laboratories review and approve all requests for foreign travel to nonsensitive and sensitive countries, a category that includes China, Russia, Pakistan and Israel. "Laboratories' foreign travelers face many threats in other countries," the report says. "DOE's approach of emphasizing `sensitive' country travel discounts the reality that travelers to nonsensitive countries may be targeted by intelligence entities from `sensitive' or even `nonsensitive' countries." While members of Congress have grilled DOE officials in recent weeks over security lapses at Los Alamos National Laboratory, Roemer said the GAO audit underscores equally serious vulnerabilities related to foreign travel. "I think the Department of Energy is working on the problem," said Roemer, a member of the House Permanent Select Committee on Intelligence. "We are in the midst of a paradigm change in safeguarding our security. We need to move from the old philosophy of guns, guards and gates to concentrating on our laptops and hard drives, and on changing human nature." According to the GAO report, to be released this week, one U.S. scientist traveling to a "sensitive" country reported that he was propositioned every night by prostitutes. Another admitted to "extensive sexual contact with women from the host country and another `sensitive' country while on official foreign travel," the report says. "This included a prostitute, a waitress and two female employees at the facility where he was visiting." In one incident involving electronic surveillance, a scientist traveling to a "sensitive" country realized his personal calls were being monitored after speaking on the telephone to his wife, who happened to mention that she was going to play bingo. "A short time later in the hotel lounge, someone mentioned to the traveler the bingo trip that his wife had talked about," the report says. "The next day, another person asked, `What is bingo?' " In an incident involving video surveillance, a scientist in a "sensitive" country reported seeing a flashing light when she undressed or changed clothes in her hotel room. "The traveler believed that pictures were possibly being taken from a smoke detector attached to the ceiling," the report says. Still another scientist visiting a "sensitive" country reported finding that someone using a "guest access" sign-in secretly logged onto a laptop computer in his hotel room, even though it had been locked with a padlock, according to the report. The scientist later found that an identical "guest access" had occurred during a previous visit to the country. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 682 From: James M. Atkinson, Comm-Eng Date: Mon Jun 26, 2000 8:49am Subject: Perhaps the most significant intelligence loss in U.S. history... U.S. News & World Report July 3, 2000 Washington Whispers Listening Post By Richard J. Newman It was "perhaps the most significant intelligence loss in U.S. history." No, not the Los Alamos security fiasco. That's how a new history of select U.S. eavesdropping efforts describes the treachery of spy William Weisband, who tipped off the Soviets to extensive U.S. code breaking during and after World War II. The revelation may explain why the United States had no advance warning of the invasion of South Korea. The history highlights several code-breaking capers from 1945 to 1952, including the interception of Communist war plans during the Korean War. Available starting this week at www.nsa.gov. That's the National Security Agency's Web site. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 683 From: James M. Atkinson, Comm-Eng Date: Tue Jun 27, 2000 8:59am Subject: Study Questions Los Alamos Security 07:18 PM ET 06/26/00 Study Questions Los Alamos Security By H. JOSEF HEBERT Associated Press Writer WASHINGTON (AP) _ Security at the Los Alamos weapons laboratory may not have been accurately reported by the lab in self-assessment reports because of pressures from managers to improve security, according to an Energy Department investigation. The department's inspector general said in a report that there are ``legitimate concerns that the overall security'' at the laboratory in New Mexico, including the safeguarding of nuclear secrets, ``was not being accurately reported'' during that time. The IG report, which came to light only recently, was completed on May 30, two days before Energy Secretary Bill Richardson and other senior DOE officials were notified that two computer hard drives were missing from a vault at the Los Alamos lab. Lab scientists did not notify senior management or the DOE of the missing drives for three weeks. The IG investigation was prompted by allegations from two workers that the lab's security evaluations were not accurate. It focused on the lab's ``self assessment'' reports and separate security evaluations conducted by the DOE's regional office in Albuquerque, N.M. In examining the lab's own security reviews, investigators found that 8 of 28 security operations personnel at Los Alamos said they had been pressured by managers to soften security concerns raised as part of the assessment. In one case, a report was written without a security review having been done, said the report. Separately, the IG investigation found that managers at DOE's regional office in Albuquerque changed the Los Alamos lab's annual security ratings both in 1998 and 1999, overruling the DOE security teams that had conducted the reviews. In 1998, the DOE managers upgraded a number of category ratings, including the one on protecting classified material, from ``unsatisfactory'' to ``marginal.'' The changes allowed for an overall ``marginal'' rating for the lab, instead of overall ``unsatisfactory.'' The next year, the managers of the regional office downgraded the lab's rating. They continued its ``marginal'' rating, although the security review team had upgraded the rating to ``satisfactory.'' The report said there was no evidence of ``collusion or deal making'' between the regional office and the lab. Managers at the DOE office told investigators that the process of developing the ratings was ``subjective.'' Papers used in evaluating the ratings had been destroyed ``so there was no complete record to show how ratings were developed by the survey teams,'' the IG report said. The Los Alamos laboratory has conducted self-assessment reports since 1996. In early 1999, the lab came under intense pressure over security lapses amid the controversy over lab scientist Wen Ho Lee, who was fired in March, 1999 for security violations. Lee was arrested last December and charged with illegally copying classified computer codes and awaits trial on security violations charges. More recently, the lab's security procedures have come under scrutiny following the disappearance for two months of the two computer hard drives containing nuclear weapons secrets. The devices vanished from a vault in late March and were found behind a copying machine on June 16. The FBI is continuing its investigation into the matter. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 684 From: James M. Atkinson, Comm-Eng Date: Mon Jun 26, 2000 10:22pm Subject: Russia holds Lithuanian for spying for U.S. [tit for tat] Monday June 26, 7:05 PM Russia holds Lithuanian for spying for U.S. http://uk.news.yahoo.com/000626/1/absey.html By Elizabeth Piper MOSCOW (Reuters) - Russia's FSB domestic security service said on Monday it had exposed and detained a Lithuanian on charges he spied for the United States by hacking into its computer systems. It said the operation consisted of hacking into FSB computers with the aim of revealing its structure and possible counter measures the Russians were taking against Western operations. "A Lithuanian citizen, exposed by members of the FSB, gave a detailed testimony that, while being an agent of the Lithuanian state security department, he was active on a CIA special operation from the beginning of 1999," the FSB, a successor body to the Soviet-era KGB, said in a statement. ORT public television said the unnamed man was a 24-year-old Lithuanian of Russian origin, a computer whiz who had worked for the Lithuanian tax inspectorate and entered the ex-Soviet state's security service when he was still a student. The Lithuanian embassy in Moscow was not available for comment. "The most important thing for the Americans was to use the agent to penetrate information systems used by the Russian FSB in order regularly to obtain operative and other information," the FSB said. It said the agent also confessed that between April and May this year, before a visit by U.S. President Bill Clinton to Moscow, he had the task of recruiting a representative of the FSB through a meeting in Poland. SPY SCANDALS Clinton visited Moscow at the beginning of this month and met Russian President Vladimir Putin, himself a former member of the KGB who served in communist East Germany. The two leaders hailed their meetings as the start of a new era of relations between the two former Cold War enemies after what had been a year of tensions over arms control issues, the Kosovo campaign and Western criticism of the Chechnya offensive. ORT showed grainy pictures of a young man, with brownish long hair, smoking a cigarette on the street and in a room but did not say whether he was the suspected Lithuanian spy. Relations between Russia and Lithuania have come under threat after the Baltic state's parliament approved a law that would oblige the government to bill Moscow for damages caused during 50 years of Soviet rule. Lithuania and its Baltic neighbours Estonia and Latvia were occupied by the Red Army in 1939 and incorporated into the Soviet Union in 1940, when tens of thousands were exiled to Siberia. The nations won independence in 1991. But the latest spy scandal follows a pattern over the last several months, when both the United States and Russia have become embroiled. Russia detained a U.S. citizen, Edmond Pope, on spying charges in April. Pope, who says he is innocent, remains under investigation and is being held in Moscow's former KGB prison, Lefortovo. In November, Russia ordered U.S. diplomat Cherie Leberknight to leave the country after saying it caught her red-handed with a collection of James-Bond-style gadgets trying to obtain military secrets from a Russian citizen in a Moscow park. Shortly afterwards, Washington expelled a Russian diplomat. The FSB has accused foreign intelligence services of intensified activity in Russia despite the end of the Cold War. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 685 From: James M. Atkinson, Comm-Eng Date: Mon Jun 26, 2000 10:22pm Subject: Russian spy accused of being double agent [tit for tat] Russian spy accused of being double agent http://www.ananova.com/news/story/russia_spying-us-lithuania_156904.html Russia has accused one of their agents of being an American spy. A Lithuanian who worked for the Federal Security Service, formerly the KGB, spied for the US and Lithuania while working in the Russian intelligence service's computer security department, officials said. The FSB said the man has confessed he was an agent of the Lithuanian intelligence service and enlisted last year by the CIA to spy on the service's computer and information safety department. The suspect also allegedly testified that during preparations for President Bill Clinton's recent visit to Russia, he was to take an FSB representative to Poland to try to recruit him. The plan was foiled by Russian counterintelligence agents, the FSB said in a statement. No details were released on the identity of the alleged spy, or on when or how he was apprehended. Russia and the United States have arrested and expelled several alleged spies over the past year, a string of actions that has accompanied a general deterioration of relations. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 686 From: James M. Atkinson, Comm-Eng Date: Mon Jun 26, 2000 10:22pm Subject: Russians arrest 'CIA hacker' [tit for tat] Russians arrest 'CIA hacker' http://news.bbc.co.uk/hi/english/world/europe/newsid_806000/806984.stm The Russian authorities say they have arrested a man who allegedly spied for the United States by hacking into Russian security service computers. The man's name has not been revealed, but he is said to be a Lithuanian who passed secrets to his own government as well as to the US. News of the arrest was given by the Russian domestic security service, the FSB - the successor to the KGB. The most important thing for the Americans was to use the agent to penetrate information systems used by the Russian FSB FSB statement It said the man had hacked into FSB computers and passed on secrets to the US Central Intelligence Agency. The man is said to have given "detailed testimony" about his spying activities for both the Lithuanian state security department and the CIA. The statement said the man had been "active on a CIA special operation" from the beginning of 1999. "The penetration of the FSB's computer network was an important element of the US operation," said the FSB in a statement. According to the Russians, the man hacked in to the FSB's own computer system to find out the organisation's structure, staffing, and what counter-measures the Russians might be taking against Western operations. "The most important thing for the Americans was to use the agent to penetrate information systems used by the Russian FSB in order regularly to obtain operative and other information," the FSB said. The man is also said to have confessed to attemping to recruit an FSB agent as a spy, during a planned meeting in Poland. "The CIA aimed to stage a political provocation against Russia, recruit an FSB employee and penetrate the FSB's computer network," the agency said. Expelled Even though the Cold War is over, Russia and the US have both accused a number of people of spying over the past year. In early April, American Edmond Pope was arrested in Russia as an alleged spy, and is still being held. His arrest came only months after US diplomat Cherie Leberknight was ordered to leave the country for allegedly trying to obtain military secrets. Shortly afterwards, Washington expelled a Russian diplomat. And less than a fortnight ago, the Americans arrested a retired Reserve Army officer and accused him of spying for the Soviet Union during the Cold War. The spying expulsions did not halt a summit meeting between US President Bill Clinton and Russian President Vladimir Putin - himself a former KGB head - earlier in June. The two men said they had held constructive talks, but disagreed strongly on a proposed US defence system, and correspondents said there was little evidence of personal warmth between them. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 687 From: James M. Atkinson, Comm-Eng Date: Tue Jun 27, 2000 4:58pm Subject: Critics say memos suggest snooping on U.S. citizens [Note: Legally the NSA can eavesdrop on targets inside the United States provided that it is done as part of "training, equipment testing, demonstrations, and evaluation". Also, NSA employees can assist other agencies (and often do) on surveillance activities provided that it involves formal letters of agreement, and so on. Also, the NSA actually dates back to the days of Yardley which predates WW I... not WW II] U.S. spy agency under fire: Critics say memos suggest snooping on U.S. citizens By Will Rodger, USATODAY.com Restricted by law from eavesdropping on American citizens, the super-secret National Security Agency nevertheless drafted policies for dealing with communications intercepted from or about Hillary Rodham Clinton, former President Jimmy Carter and unidentified candidates for national office in 1996, agency memos show. NSA officials deny any wrongdoing, insisting that the memos were written by in-house lawyers merely to help agency personnel comply with laws that forbid spying on U.S. citizens who aren't directly involved in foreign intelligence matters. But privacy advocates say the agency memos indicate the NSA intercepts large numbers of innocent conversations in its mission to eavesdrop on phone calls, faxes and other communications linked to terrorists and other national security risks. The National Security memos The National Security Agency memos are essentially instruction sheets telling NSA employees what to do in the event they intercept communications to or from certain prominent people. Privacy advocates say they reflect the large number of innocent conversations the NSA intercepts in its mission to counter national security threats: One of the documents is a December 1994 memo that deals with Carter's visit to Bosnia that year: "Any reports that reflect either his travels to Bosnia or his participation in efforts to end the war may identify him only as a 'U.S. person,'" officials wrote. "Only if Former President Carter eventually becomes an official envoy of the U.S. Government in this activity, could he then be identified as a 'former U.S. President.' " NSA officials also urged caution in dealing with reports about the first lady in a July 1993 memorandum: "Mrs. Clinton may be identified in reports only by title (currently Chairperson of the President's Task Force on National Health Care Reform) without prior approval when that title is necessary to understand or assess foreign intelligence and when the information being discussed relates to her official duties," they wrote. "As with other senior officials of the Executive Branch, no reports may be published concerning Mrs. Clinton's private life or activities absent evidence of criminal wrongdoing and even then only after review by senior NSA management and the (Office of the General Counsel)." NSA officials gave similar warnings regarding congressional campaigns in 1996. "We anticipate that as the 1996 election campaigns go on, there may be instances when references to political parties and candidates will be necessary to understand foreign intelligence or assess its importance. In such cases, unless you have prior approval for specific identification in accordance with (law), refer to the U.S. identity in generic terms only: a U.S. political party, a U.S. presidential candidate, a U.S. Senate candidate, etc. Remember that even when such terms are used, the context of the report could constitute an identification." The Electronic Privacy Information Center obtained the memos, which were part of a lawsuit filed last year, under the Freedom of Information Act. The suit seeks information about the NSA's compliance with laws that forbid domestic surveillance. Rep. Robert Barr, R-Ga., says the House Committee on Government Reform will examine the memos as part of larger hearings this summer into NSA activities. "I'm troubled by this," he says. "This information that we see today is only the tip of the iceberg of the vast number of conversations that are apparently picked up by the NSA." Barr has spent the last two years looking into allegations that an NSA surveillance system popularly known as "Echelon" is scooping up millions of phone, fax and e-mail messages every hour. His inquiry follows a report in 1997 by the European Parliament that says that Echelon can monitor all such communications in Europe simultaneously. Barr once worked in the Central Intelligence Agency's office of legislative affairs, where he rose to assistant legislative counsel before leaving in 1978. An NSA spokeswoman declined to say whether the agency actually intercepted communications by the officials mentioned in the memos. Neither Carter nor Clinton would comment. But NSA officials emphasize that the memos show NSA operatives ignore information about U.S. citizens unless a court order authorizes its analysis. Even with a court order, they say, the NSA must show that the information is relevant to a matter of national security that crosses national borders. "NSA operates in strict accordance with U.S. laws and regulation in protecting the privacy rights" of Americans, the agency said in a statement. "Our activities are conducted with the highest constitutional, legal and ethical standards." EPIC attorney David Sobel says the scope of NSA surveillance alone should give American citizens pause. "They are collecting a massive amount of information that affects a great many people," he says. "If a lot of what we have heard recently is true, it's not just a former president, it's not just the first lady, it's probably all of us. This is the first time real names have been added to what has been a theoretical discussion. It puts a real face on this issue." Jeffrey Richelson, senior fellow at George Washington University's National Security Archive, says the release marks the first time in 25 years the NSA has revealed the identity of any American who was or may have been monitored by the agency. EPIC fellow Wayne Madsen says one of the memos raises concerns over the confidentiality of Carter's mission to violence-ravaged Bosnia in 1994. "If they had heard what Jimmy Carter was saying, that could have undermined his efforts there in Bosnia," he says. "Those documents are revealing of how they operate. It's obvious the Carter Center was subject to a U.S. signals intelligence operation." In hearings before the House Permanent Subcommittee on Intelligence last April, Director of Central Intelligence George Tenet addressed allegations that the NSA is gathering more information than it is allowed. "There have been recent allegations that the intelligence community, through NSA, has improperly directed our signals intelligence capabilities against the private conversations of U.S. persons," Tenet testified. "I will say to this committee unequivocally that this is simply not the case." The Defense Department's NSA traces its origins to the uniformed intelligence services that cracked numerous ciphers used by the Germans and Japanese in World War II. Now, as then, the NSA is widely believed to have the best surveillance technologies anywhere available. Most of its estimated 38,000 employees today are still members of the armed forces. But given that eavesdropping and deception are part of the agency's everyday existence, civil libertarians and the intelligence community have long regarded each other with suspicion. The NSA and its predecessor agencies, after all, routinely violated U.S. law from 1945 to 1975 by persuading telegraph carriers to let them copy cables they sent and received overseas. The nation first learned of those activities through hearings before the Senate Intelligence Committee. The committee, then under the direction of Sen. Frank Church, also discovered that the NSA had used its powers to spy on anti-war activists like Jane Fonda and Benjamin Spock - again in violation of U.S. law. Before 1975, "there were really no legal constraints on NSA," says James Bamford, who documented the story of the NSA from inception to the 1980s in his 1982 bestseller The Puzzle Palace. Bamford, for his part, remains concerned that many of the 170 pages of materials submitted to EPIC have been censored. Nonetheless, "those documents really didn't suggest to me they have gone back to the bad old days," he says. The European Parliament has issued two reports in the last three years that say the United States, together with the United Kingdom, Canada, Australia and New Zealand, eavesdrop on virtually every phone call, fax, e-mail and satellite signal in Europe. Chief among NSA goals, the reports say, is industrial espionage for U.S. companies. NSA officials say they spy on foreign companies to reveal cases of bribery and corruption, but nothing else. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 688 From: James M. Atkinson, Comm-Eng Date: Tue Jun 27, 2000 5:44pm Subject: Renter detects camera in smoke alarm Renter detects camera in smoke alarm http://www.sun-sentinel.com/news/daily/detail/0,1136,32000000000119977,00.html By SHANNON O'BOYE Web-posted: 10:54 p.m. June 26, 2000 FORT LAUDERDALE -- A high school graduate who planned to experiment with living on his own before heading to college in the fall recently got a life lesson he never bargained for. A month after moving into a tiny rented cottage in Victoria Park, Shawn Danoff came home to a note signed by his landlord saying the man had installed a smoke detector in his bedroom. Danoff, 18, went straight to the bedroom and pushed the button to hear the detector's beep. When nothing happened, he removed the plastic cap on the ceiling and discovered a tiny spy camera. The camera was attached to a cable that ran into an outdoor storage shed on the other side of his bedroom wall. Disturbed, Danoff called the police. He assumed the landlord, Paul Cohen, would be held accountable. But within 48 hours of making the report, Danoff learned that the Fort Lauderdale Police Department was closing the case and the Broward State Attorney's Office was not going to pursue charges. "I don't understand why they wouldn't further the investigation," the recent Hollywood Hills graduate said a few days after moving back into his mother's home. "I'm very aggravated they're dropping this." The Fort Lauderdale Police Department consulted with Dennis Nicewander, the assistant state attorney who handles sex crimes and child abuse, on June 14, the day after Danoff filed the complaint. Nicewander said he did not think police had enough evidence to prosecute the case under the applicable law, a voyeurism statute enacted in 1998. Simply placing a camera in the guise of a smoke detector in a bedroom is not against the law, and Danoff found it so quickly that nothing was filmed. Civil lawsuit option The voyeurism statute says a person commits the offense when he or she "secretly observes, photographs, films, videotapes or records another person" with "lewd, lascivious, or indecent intent." "I suggested you have to find some extra evidence of lewd intent to apply the statute," Nicewander said. "If I thought the kid was doing something illegal on my property and I wanted to put a tape in here to see if he was destroying the place, or operating an illegal business, or any number of excuses, then that's not lewd intent." Danoff's best option would be to sue the landlord in civil court for invading his privacy, Nicewander said. Bob Daniels of Boca Raton said Cohen had recently contacted him seeking legal advice about removing a "questionable tenant." He said he did not pursue the matter because the tenant, Danoff, moved out on his own. Daniels said he didn't know anything about the spy camera in the smoke detector. Cohen did not return calls for comment. Danoff's parents, Burt Danoff, a Fort Lauderdale-based obstetrician/gynecologist, and Linda Danoff, the president of a communications firm, were upset at the lack of police and legal of action. "How is it that anyone who puts a camera on a young man does not have ill intent?" his mother asked. "If you think the possible lessee is dubious, don't rent to him." Howard Simon, executive director of the American Civil Liberties Union in South Florida, questioned how the police and the prosecutor could decide they didn't have enough evidence to bring charges without interviewing the landlord or searching his apartment for evidence that he had recorded other tenants. Voyeurism question "That's a troubling message they are sending to other landlords and, more significantly, to tenants in Broward County that if they're victims of incompetent spying, the police are not going to do anything to stop it and enforce the laws protecting what little there remains of privacy," Simon said. The voyeurism law was meant to address problems authorities were having with people using better, smaller and cheaper technology to invade people's privacy. In 1995, the state prosecuted former Sunrise police officer Larry Greenberg in connection with using a two-way mirror and a video camera to catch two 21-year-old female roommates naked in their bathroom. He had installed the camera after asking the two women to move into his townhouse to help him pay the mortgage. At the time there was no law against clandestine videotaping, so prosecutors tried to prove that Greenberg intercepted the women's oral communication without their consent, a third-degree felony punishable by up to five years in prison. They failed and Greenberg was acquitted in 1996. Violating the voyeurism statute is a first-degree misdemeanor, punishable by up to one year in prison. Nicewander said he felt the new law had enough teeth. "It's difficult to pass such a law because there are so many legal reasons to tape things," he said. "You have to make sure you don't make legal actions illegal by the way you express the law." But Burt Danoff said no one will be brought to justice for what happened to his son. "His sense of security is gone. In every apartment he may rent, he's going to be wondering if every fire detector doesn't have a video camera in it," he said. "That's not how you choose to start your young adult life." =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 689 From: Miguel Puchol Date: Tue Jun 27, 2000 4:38pm Subject: RE: Schematics Needed for Projects Jay, I too would be interested in some of these, mainly the downconverters. Comments: Take a look at www.downeastmicrowave.com They make great stuff, I ordered a 1540MHz preamp and they sent it within a week. It works really well, and can be externally powered from 12V dc. > 2.Subcarrier receiver for use with R-71, R-8500 or AOR > AR5000. Tunable for all SC freqs > and connects to receiver. Also usable direct on mains/tel > lines for CC detection. You could use another scanner (AFAIK) to tune in the 10.7MHz IF out segment from the AR5000. Cheers, Mike 690 From: Date: Tue Jun 27, 2000 4:22pm Subject: Re: Renter detects camera in smoke alarm My situation was similar. My name is Dan McGraw. I lived in the Regency Woods Apartment homes in Minnetonka MN between 1996 and 1998. In July of 1997 I heard a noise in the 4'ft high wall that separates my kitchen from my one room efficency. The electrical outlets in that apartment are 3'ft off the floor. I removed the cover and wasn't sure what I was looking for. In the midst of the sheet rock dust and wires I noticed a very thin black wire being pulled back down through the wall. Since that day I have been involved trying to find out what happened. That's how I found the TSCM Web site. I lived at 2260 South Plymouth Rd Apartment 207. I suspected the maintenance person, Mike Frederickson in 307 above me but I couldn't be sure. I consulted a top criminal attorney here in Minneapolis, Joseph Friederg and we began the hunt. This hunt has taken me in many directions including but not limited to a group of off duty police officers. I don't know how many residents were affected by this but I suspect it was wide spread. The police did not want to get to involved. The FBI said that I didn't have any evidence. What I do have now is alot of evidence about the people who came and went out of that building for roughly 90 days after this incident. I made so much noise about this event that the local police concocted a reason to produce a search warrant of my premises on November 7 1997. My attorney thinks that was an opportunity for them to remove some proof of some foul play. I now live at 14720 71st Str. NE Elk River, MN 55330 Pager 651-969-0832 Home phone 763-241-5543. This story does not end here. It has many twists and turns. I have found TSCM to be quite compelling. I am looking to train under someone for no charge. I can travel the US or world but prefer someone here in the Minneapolis, St. Paul area. I have been gathering alot of experience on my own through many sources but would like some tutoring. Thanks Dan Clockdepot@a... For those interested in the way this story is still playing out please call or maybe instead, Write 691 From: James M. Atkinson, Comm-Eng Date: Wed Jun 28, 2000 9:13am Subject: Oracle hired Microsoft snoop Oracle hired Microsoft snoop http://www.cnnfn.com/2000/06/28/news/oracle/ Software rival admits hiring detective agency to dig up dirt on MSFT June 28, 2000: 1:09 a.m. ET NEW YORK (CNNfn) - Oracle, one of Microsoft's fiercest software rivals, acknowledged Wednesday that it paid a detective agency to monitor the political activities of Microsoft and its allies for a year. Oracle said it hired Investigative Group International to expose the Microsoft's "underhanded attempts" to win its antitrust case against the Justice Department. A federal judge ruled June 7 that Microsoft must be broken up into two companies to keep it from engaging in anticompetitive behavior in the future. The case is currently under appeal and could be heard this fall by the Supreme Court. IGI went to great lengths to trail Microsoft and at least two groups sympathetic to its cause, at one point offering to pay for one group's office trash. Oracle (ORCL: Research, Estimates) confirmed to CNNfn Wednesday its role in a probe of the Independent Institute of Oakland, Calif. and the National Taxpayers Union of Arlington, Va. Oracle spokeswoman Jennifer Glass told CNNfn, "As a result Oracle discovered both the Independent Institute and the National Taxpayer's Union were misrepresenting themselves as independent advocacy groups when in fact they were funded by Microsoft for the express purpose to influence public opinion in favor of Microsoft in the antitrust trial." The Oracle spokeswoman added, "Microsoft also funded the Association for Competitive Technology for the same purpose. Left undisclosed, these Microsoft front groups could have influenced the outcome of one of the most important antitrust cases in U.S. history." The Oracle statement continued, "We didn't specify how IGI should go about getting information. We did, however, insist that whatever method must be legal. IGI repeatedly assured us that all their activities were in fact 100 percent legal." Oracle alleges the above groups, which feigned independence, were actually funded by Microsoft (MSFT: Research, Estimates) to boost public opinion in favor of the Redmond, Wash.-based software maker. Microsoft spokesman Vivek Varma told CNNfn he first heard the allegation late Tuesday from the newspaper and has no independent confirmation. He said, "it is sad for the industry that a company like Oracle (apparently) did this." Varma said Microsoft is not at this point accusing Oracle of doing something illegal. He added that he does not know if Chairman Bill Gates or CEO Steve Ballmer are yet aware of the story, which was first published in Wednesday's Wall Street Journal. - CNNfn's Steve Young contributed to this report =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== From: G P Date: Wed Jun 23, 2004 9:30pm Subject: Re: Re: Indoor Gps The method used for mobile location-based services here in the U.S. is carrier-dependent. Some providers (such as Sprint) are in fact using GPS-assist which works as you described, however other telcos are doing triangulation at the MTSO and tower in lieu of GPS-assisted solutions. Even with GPS-assist, the MTSO is largely responsible for most of the computational effort required to determine the location of a mobile handset. A much more fascinating study is passive radar, using multipath and delay correlation of reflected signals from existing mobile towers - there is plenty of ambient RF energy floating about, really no need to use active systems for location applications anymore... http://www.globalsecurity.org/org/news/2001/e20010619stealths.htm http://www.3nw.com/pda/radar_with_cell_phones__look_at_celldar.htm contranl wrote: .. I have the feeling that the item "Indoor Gps" is something that seems to go beyond imagination ...i understand that...but what can i say..it's there...it demonstrates how fast things are developing...just watch all your Startrek movies again to be prepared for more things to come....." beam me up scottie " Anyway check out Google : http://www.google.nl/search?q=indoor+gps&ie=UTF-8&hl=nl&lr= and start believing There are a thousand systems that use terrestrial networks to determine the position of an object or person...up till now none can compare with the accuracy of Gps wich is in the few meters range Positioning is implemented and possible in a Tetra network but suffers either from the software for that not being available(yet) or accuracy not being good enough (caused by multipath/reflections) wich is obviously one of the reasons why they now are implementing "Indoor Gps" For that same reason "Indoor Gps" is now implemented in the latest Cellular/Gsm phones A mix of both techniques is called "Gps-A" wich stands for Gps Assisted where both the network and Gps can provide a position...in that case the network does the indoor part (at lesser accuracy) and the Gps the outdoor part...this is a intermidiate solution that needs changes in the network software (the network needs to open up at least 3 connections to the basestations surrounding the target to be able to get a fix)...it was invented before the real "Indoor Gps" came up...Gps-Assisted is already outdated before it really made it to the market. Some other variations do exist but they all need modifications to the networks or costly additional hardware at every basestation. Why using GPS-A when you can now do it with only "Indoor Gps" it does not need any modifications to existing networks since the Gps data is transmitted all the way to the other end trough a transparent data-channel...different usergroups can decide themselves if they want positioning or not...all they would have to do is to buy a slightly (100$ ?) more expensive radio wich includes a "Indoor Gps" unit Tetrascanner www.tetrascanner.com ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links --------------------------------- Do you Yahoo!? New and Improved Yahoo! Mail - 100MB free storage! [Non-text portions of this message have been removed] 8987 From: Date: Thu Jun 24, 2004 1:11am Subject: MSNBC - Embedding their hopes in RFID Embedding their hopes in RFID Tagging technology promises efficiency but raises privacy issue By By Jonathan Krim To John Kendall, the future of casino gambling will soon look like this: A player sits down at a blackjack table and bets a stack of chips, which Kendall hopes are manufactured by his company, Chipco International of Raymond, Maine. Sensors trained on the betting area of the table scan tiny computer tags embedded in the chips, and electronically report the amount of the bet to a security control room. "If at table 17, player 4 has been betting $5, and all of a sudden he bets $500, they want to be notified," said Kendall, whose firm is investing heavily in technology known as RFID -- radio frequency identification -- to make the tags work. "Our reporting will tell the casino manager that this person has just changed his betting habits," perhaps because he is cheating. Chipco, which hopes to introduce its new chips late this year, is one of many companies placing bets on RFID these days. Toll booths to Wal-Mart The technology has been around for a decade -- including use in the E-ZPass system that helps speed drivers through toll booths on many East Coast highways -- but RFID is now robust enough, and getting cheap enough, that it is beginning to transform numerous sectors of the economy by allowing unparalleled tracking of products and people. ïU.S. may use new ID cards at borders Early this month, Reston-based Accenture LLP won a contract worth as much as $10 billion from the Department of Homeland Security that will include using RFID at U.S. border checkpoints. Delta Air Lines Inc. is testing RFID baggage tags on its service between Jacksonville, Fla., and Atlanta, to help with security and lost luggage. In Great Britain, officials are weighing proposals to embed tags in vehicle license plates. International Business Machines Corp. is seeking to convince banks that their best customers could be issued cards with the tags, allowing them to be immediately recognized when they enter the bank and given red-carpet treatment. "If you know quickly who is in the area, you can customize their experience," said Paul McKeown, who heads IBM's global smart-card efforts. McKeown said he was inspired by an experience his mother had in her small town in England, where for years she was banking at the same branch and one day wasn't recognized and was challenged by a new teller. The technology is moving fastest in retailing, where Wal-Mart Stores Inc. is wielding its market power to push RFID into the supply chain. It has told its top 100 suppliers that by January they are to begin putting tags on cases of products before they are shipped to several Wal-Mart distribution centers in Texas that are testing the system. Unlike bar codes, which must be passed in front of a scanner, RFID tags can be read remotely by a device in the vicinity, sharply reducing time and labor needed to take inventory and letting stores more quickly recognize when stocks are low. By some estimates, retailers lose 4 percent in sales because they are out of what consumers are looking for. Privacy concerns But RFID initiatives alarm privacy advocates, as well as some federal government officials and state legislatures, who understand the benefits but worry about the possibility of abuse in the tracking of goods and people. For example, an RFID tag on a medication bottle might one day be used to alert a relative at another location that an elderly father forgot to take his pills. But electronic readers in office buildings might detect the types of medicines being carried around by employees, which many would regard as an invasion of privacy. The Food and Drug Administration is in fact encouraging adoption of RFID in the pharmaceutical industry to attack counterfeit drugs, pushing for widespread tagging of medicines by 2007. Other uses are proliferating as well. One California company has developed a soap dispenser capable of reading employee tags to let restaurant managers know whether their workers washed their hands while in the bathroom. A charter school in Buffalo uses tags on its students as a way of taking attendance in the mornings. "RFID has tremendous potential for improving productivity and security, but it also will become one of the touchstone privacy issues of our times," said Sen. Patrick J. Leahy (D-Vt.), who foresees congressional hearings on the issue. "Before RFID becomes ubiquitous throughout our society and economy, we need to start paying more attention to the privacy side of the equation." That view is shared by the Federal Trade Commission, which held an all-day seminar on the issue Monday to examine the tradeoffs. Tracking everything Privacy activists have not waited, conducting high-profile boycotts in the past two years against such firms as Benetton Group SpA and Gillette Co. after learning they were considering, or testing, tags in their products. A consortium of more than 40 public-interest groups has called for strict public-notification rules, the right to demand deactivation of the tag when people leave stores, and overall limits on the technology's use until privacy concerns have been better addressed. Their fears were particularly stoked by the early ambitions of leaders of the RFID movement, who envisioned a world in which every product had a unique identifier that could be electronically tracked. Kevin Ashton, former executive director of a joint corporate and academic RFID research center at the Massachusetts Institute of Technology, said in a promotional video that the organization's mission was to "create a single global technology that will enable computers to identify any object, anywhere, automatically." The MIT center has disbanded, but its work is being carried on by EpcGlobal Inc., a corporate-funded organization that later this summer hopes to announce uniform worldwide technical standards for the technology. The group is also issuing privacy guidelines. Privacy activism, and economic realities, have tempered the expansive rhetoric of the RFID industry, which now is focused on tagging cases or pallets of products, rather than individual items. At a price of between 25 cents and 50 cents for each tag, it is not yet worth it to put them on every can of soda or tube of toothpaste. "A lot of people are making crazy statements" about how fast the price of a tag -- which typically contains a tiny chip and an antenna -- will fall, said Jeff Woods, an RFID analyst with the market research firm Gartner Group. Pressing ahead Woods said the technology also is still plagued by inaccuracies in reading the data. Certain metals can interfere with the signals, as can moisture on the tags. Woods said many suppliers are telling him that, unlike retailers, they are not likely to reap savings from moving to RFID systems until it is cheap enough to tag individual items. Even consumer product giant Procter & Gamble Co., an aggressive early tester and booster of the technology, is not yet certain about its near-term financial benefits. The company is participating in the Wal-Mart tests, tagging cases of Pantene shampoo, while testing tags on individual bottles in Germany. But Wal-Mart is pressing ahead, announcing last week that it was expanding the program to its top 300 suppliers by 2006. Target Corp. and Albertson's Inc. have announced similar initiatives, as has the Department of Defense, which will affect hundreds of suppliers of everything from bullets to rations. "RFID will revolutionize . . . the way we do business around the world, and deliver unimaginable benefits," said Simon Langford, Wal-Mart's global director of RFID. That is music to the ears of a burgeoning sector of large and small companies making RFID tags and readers, and providing hardware and software integration services. "I think this will be a single-digit, billion-dollar market in three years," said Piyush Sodha, chief executive of Matrics Inc., a 75-employee Rockville firm that manufactures its tags at a plant in Columbia. Demanding disclosure But it is those same unimaginables that worry Katherine Albrecht, a Boston-area privacy activist who is leading the charge against RFID. Albrecht, who is working on a doctoral dissertation at Harvard University, founded Consumers Against Supermarket Privacy Invasion and Numbering in 1999 after studying how grocery chains were using loyalty cards to develop marketing data about their customers. "Who controls the data" collected from RFID tags? Albrecht asked. She worries that companies putting tags into consumer products might forge alliances with the makers of carpeting, for example, to embed sensing devices that could develop intelligence about how consumers use the items. Industry dismisses those kinds of scenarios as paranoia, but Albrecht and other activists have forced companies to pay attention to them. A store in Rheinberg, Germany, took RFID tags out of its loyalty cards after protests. Many large firms working with RFID now have extensive disclosure statements on their Web sites. "Anonymity is an important issue that must be handled very thoughtfully," said Elliot Maxwell, who heads an international committee that advises EPCGlobal on privacy and other policy issues. But he also recognizes the RFID paradox: "In order to have the most value to both individuals and society, the infrastructure [to read tags] needs to be widespread," he said, citing medical monitoring and the ability to track toxic products, or stolen guns, as examples. "And yet it is just that widespread infrastructure that raises the most questions." Currently, tags cannot be read at more than about 20 feet, but many say that reading capability will rapidly advance. And given RFID's potential to track stolen goods, privacy activists wonder how long it will be before tags are embedded in money. But few applications raise more eyebrows than RFID tags implanted in people, a business pursued by Applied Digital Solutions Inc. and its subsidiary, VeriChip Corp., of Palm Beach, Fla. The company has for years provided rice-grain sized tags for implants into pets and cattle. But it made waves two years ago when a Boca Raton man, his wife and 14-year-old son agreed to let the tags be implanted in them. The company and the family hoped the tag would speed patients through frequent hospital visits or in the case of an emergency by quickly alerting doctors to a person's identity and medical history. But the FDA quickly stepped in and deemed medical uses of the technology subject to government approval, which is still pending. Scott R. Silverman, Applied Digital's chief executive, said he hopes the FDA will provide clearance by the end of the year. © 2004 The Washington Post Compan ---------- http://www.msnbc.msn.com/id/5271964/ [Non-text portions of this message have been removed] 8988 From: kondrak Date: Thu Jun 24, 2004 5:45am Subject: Re: MSNBC - Embedding their hopes in RFID Now imagine this, RFID readers everywhere, connected to power lines supplying Internet connections, and you have all the makings of a police-state surveillance system. At 02:11 6/24/2004, you wrote: >Embedding their hopes in RFID >Tagging technology promises efficiency but raises privacy issue >By By Jonathan Krim >To John Kendall, the future of casino gambling will soon look like this: >A player sits down at a blackjack table and bets a stack of chips, which >Kendall hopes are manufactured by his company, Chipco International of >Raymond, Maine. Sensors trained on the betting area of the table scan >tiny computer tags embedded in the chips, and electronically report the >amount of the bet to a security control room. 8989 From: contranl Date: Thu Jun 24, 2004 9:39am Subject: Re: Indoor Gps . The standard way of how many digital networks do a location fix is: By measuring the so called "TA" wich stands for "Timing Advance", the TA is a technique wich slightly advances the data-stream to keep the data in sync, this is necessary to bridge a certain distance between transmitter and receiver...the bigger the distance the higher "Timing advance"...you could also say that it's an automatic synchronizing procedure Anyway the "TA" is obtained by looping certain data...the loop around time is proportional with the distance so "TA" was originally intended to keep sync in the network (air) It's very similar to "pinging" or "TDR" From the "TA" you can roughly calculate the distance between the base and the mobile....if you do this from more then 1 base you can overlay the cirkels and the crosspoints is the position of the mobile In general this is not done,because it was not implemented. The TA is not very accurate and that is why the calculated position is not very accurate either. In the current Gsm networks the TA is only calculated on the current connection ( your call) ..it is not implemented to do that from let's say 3 basestations at the same time (it could be done but that needs software changes) Many operators offer a gsm locating service...wich is nothing more then a distance (TA) from the mobile to a base (Cell-id) so what you get there is nothing more then: "the location of telephone 123456789 is somewhere on a cirkel at 500 meters around a basestation X"...in practice this is not accurate enough and only usefull for very rough statistics" If you know how to get in the "monitor-mode" of your Gsm-phone you can see the "TA's" as measured from your own phone usually you can see at least 6 of them...in other words you can see the distances to the nearest 6 available basestations around you...this is information that your phone has...the basetation (the network) knows only the TA from the current connection to just 1 basestation...wich is the previous mentioned cirkel around it...it can only now that when a connection exists..in other words if you do'nt make a call the position can not be found out (by the network) There is a trick to still get a TA from a Gsm ...even when there are no calls made...without the owner of such a phone nowing that he is being traced!,that trick is called "silent SMS" it works like this: The network sends an SMS (short message)to such a phone...normally that message would show up on the phone's display...by clever modification of the so called "header" the phone will not show this message..but it actually did receive it and a real connection was made...so a TA measurement could have been made...in that case the position is roughly known to who ever is tapping your phone A slightly more accurate position can be obtained when the used basestation uses so called "sectorized" antennas for example the cirkel around such a basestation would be covered by 3 different antennas(and transmitters)each serving 1/3 of the circle (1/3 of the pie)in that case the target would be somewhere on one of the 1/3 pieces of that cirkel...such information is kept in the database and maybe used in a court of law (wich has been done several times to prove that a certain person was at a certain place at a certain time) Same goes for Tetra wich also uses TA A little more on this subject is at this page of my website http://www.tetrascanner.com/gsm-position-locator-details.html where i have used a gsm-phone in combination with a uhf tracking transmitter....you get the rough position by doing a trace of the GSM-phone (0,10 $) using a locating service...once you are in that area you can remotely switch on the beacon transmitter to track the last few meters. Tetrascanner www.tetrascanner.com 8990 From: contranl Date: Thu Jun 24, 2004 8:59pm Subject: A whole load of "Gsm-scanners" . Here's a list with links to sellers of "Gsm-scanners" wich everybody seems to be looking for. I whas going to make such a list myself ..but someone else went to that trouble...i have not checked them yet...but i bet most of them can't deliver a real one (wich obviously needs some form of A5 decryption !).. http://tinyurl.com/2rl23 A very quick look shows me that the real "guys" are not in the list ...you now the big companies like Thales,Rhode & Schwarz etc . So i remain sceptical...the fact that some of them say that you need an enduser-certificate is a lot of bull and only serves the purpose of raising the price or making you believe that you should be so happy that they want to sell you one (probably without such a certificate ...i am not shure anyway if the are on the restricted list) Let me know if you are going to buy one ! i would be happy to advice or participate in a test (take care !!) It would be a nice test to see if the really can deliver a working unit at a reasonable price...wich would be a sensation. tetrascanner www.tetrascanner.com 8991 From: Jason Dibley Date: Fri Jun 25, 2004 2:29am Subject: RE: Indoor Gps Hi Michael, The company maybe experiancing difficulties but a link to thier website is below, it gives details of the system etc. www.quiktrak.co.uk Best wishes Mr Jason M Dibley Dip Eng (hons) TSCM Director. QCC Interscan Ltd. Please visit our Web site at http:\\www.qcc.co.uk You can view our digitally signed reports and other documents using Adobe Acrobat Version 4 or greater. You can obtain this for free from the following web site: http://www.adobe.co.uk/products/acrobat/readstep.html This message is intended only for the use of the person(s) to whom it is addressed. It may contain information which is privileged and confidential or material which is protected under attorney-client privilege. In addition, this message may not necessarily represent the views of QCC. Accordingly any unauthorised use is strictly prohibited. If you are not the Intended Recipient, please contact QCC Interscan as soon as possible or send mail to contact@q.... QCC Interscan Ltd. Registered in England and Wales No. 03773029 -----Original Message----- From: Michael Puchol [mailto:mpuchol@s...] Sent: 23 June 2004 17:02 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Indoor Gps Hi Jason, This particular radio had only GPS, not assisted by outside means. Or so they claim. I still wait to receive a couple of test units which I'll put through their paces. As for land RF-based positioning, there are indoor solutions which use 2.4GHz beacons and strategically placed antennas to provide location of people inside buildings to within 5 meters. Obviously such systems need calibration and careful installation. There are also GSM based location services (LBS) which so far are very touch and go, in my oppinion. If you are luck and stand next to a cell, it will give you a good fix, but if you happen to be in a rural area, your position could be off by 20 miles (this I have personally verified, it can be that bad). Unless other methods (good and accurate true triangulation) are used, such systems are too unreliable to be of use. With a GPS I can know all the time the quality of the fix it's giving me, with these systems there is no indication as to their accuracy at a given time. I was not aware of this system in London, what frequency band were they using? 14 stations doesn't seem a lot to cover such a big city. Best regards, Mike ----- Original Message ----- From: "Jason Dibley" To: Sent: Wednesday, June 23, 2004 3:56 PM Subject: RE: [TSCM-L] Indoor Gps > Does the Tetra unit gain it's fixes from GPS sattelites or maybe it aquires > its fixes from trilateration between the fixed tetra radio sites as in some > land based RF tracking systems. This possbility would allow fixes to aquired > inside buildings due to the lower frequencies and higher powers involved in > local fixed sites.There was a system called quicktrack in use in London > until very recently (they went under last month) that would supply street > level tracking within London via 14 fixed site Rf stations. the transponder > unit resembled a mobile phone and could send and receive messages over the > system. This unit was often mistaken for a GPS tracking system, which > obviously it was not. > > Best Wishes > > Mr Jason M Dibley Dip Eng (hons) ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8992 From: Brian Varine Date: Fri Jun 25, 2004 10:02am Subject: New IIS Worm on the Loose-download.ject Look out...we have another IIS worm and there doesn't appear to be a patch for it. Microsoft has a take on it as well... What You Should Know About Download.Ject http://www.microsoft.com/security/incident/download_ject.mspx From http://www.Incidents.org Updated June 25th 2004 14:11 UTC (Handler: Deb Hale) Compromised Web Sites Infect Web Surfers (for more details, also see yesterday's diary: http://isc.sans.org/diary.php?date=2004-06-24 ) Updates will be posted here. A large number of web sites, some of them quite popular, were compromised earlier this week to distribute malicious code. The attacker uploaded a small file with javascript to infected web sites, and altered the web server configuration to append the script to all files served by the web server. The Storm Center and others are still investigating the method used to compromise the servers. Several server administrators reported that they were fully patched. If a user visited an infected site, the javascript delivered by the site would instruct the user's browser to download an executable from a Russian web site and install it. Different executables were observed. These trojan horse programs include keystroke loggers, proxy servers and other back doors providing full access to the infected system. The javascript uses a so far unpatched vulnerability in MSIE to download and execute the code. No warning will be displayed. The user does not have to click on any links. Just visiting an infected site will trigger the exploit. If your SERVER was compromised, you will observe: * All files sent by the web server will include the javascript. As the javascript is delivered by the web server as a global footer, images and other documents (robots.txt, word files) will include the javascript as well. * The files on your server will not be altered. The javascript is included as a global footer and appended by the server as they are delivered to the browser. * You will find that the global footer is set to a new file. * For snort signatures, see http://www.bleedingsnort.com We do not know at this point how the affected servers have been compromised. The SSL-PCT exploit is at the top of our list of suspects. If you find a compromised server, we strongly recommend a complete rebuild. You may be able to get your web site back into business by changing the footer setting and removing the javascript file. But this is a likely a very sophisticated attack and you should expect other stealthy Backdoors. If you visited an affected page, and your BROWSER is compromised: * You may see a warning about a javascript error. But it depends on how the attack code interfers with other javascript on the respective page, and many users disable these javascript warnings. * Disconnect the system from the network as soon as possible. * run a thorough virus check with up to date virus definitions. Many AV vendors released new definitions as recently as last night. * If you are able to monitor traffic to the infected host, you may see attempts to contact 217.107.218.147 on port 80. * AV software will detect the javascript as 'JS.Scob.Trojan'. FAQ's about this attack: - Is this the first time web servers have been compromised to attack browsers? No. Nimda attempted the same trick, using an older MSIE exploit. Other attempts have been observed in the past. This attack is special because it affects a large number of servers and is not easily detectable. - Will affected websites be "defaced" or otherwise altered? No. In most cases, the web sites will look just like usual to the casual browser. The infected javascript may interfere with other javascript on the respective page. - Will the javascript attached to images be executed? No. The javascript attached to images is harmless. It's the JavaScript attached to the .htm or .html files that gets executed, forcing the browser to connect to the Russian site. - How can I protect my web server from becoming infected and used as a host for the script? Apply all necessary patches. If you find an unpatched web server, assume it has been compromised even if you do not see an obvious sign of an attack. Given the current threat environment, an unpatched web server is likely to be attacked successfully within a few hours. - How can I protect my users from these web sites. Do you publish a list? Should they stop browsing? We do not provide a list of infected sites. Instead we try to work with site administrators to have them shut down as soon as possible. Right now, we don't know of any sites that are still hosting the script. Given that this attack is likely going to be repeated using different javascript code, we recommend that you (*) install and maintain anti virus software (*) if possible turn off javascript, or use a browser other then MSIE until the current vulnerabilities in MSIE are patched. Relevant Links Analysis of the underlying MSIE vulnerability: ! This link will trigger some warnings from AV software ! http://62.131.86.111/analysis.htm (thanks to Olivier de Jong) Symantec writeup for js.scob.trojan: http://securityresponse.symantec.com/avcenter/venc/data/js.scob.trojan.html MSIE Exploit information from Security Focus: http://www.securityfocus.com/bid/10472 http://www.securityfocus.com/bid/10473 CHMM Vulnerability (not used here, but used by similar exploits ) :http://www.securityfocus.com/bid/9658/info/ F-Secure Information: http://www.f-secure.com/weblog/ http://www.f-secure.com/v-descs/scob.shtml http://www.f-secure.com/v-descs/padodorw.shtml Microsoft Alert: http://www.microsoft.com/security/incident/download_ject.mspx UseNet Discussion about IIS exploits: http://www.derkeiler.com/Newsgroups/microsoft.public.inetserver.iis.security/2004-06/0588.html Snort Rule: http://snort.infotex.com/cgi-bin/viewcvs.cgi/Stable/VIRUS_Unknown_IIS_Worm 8993 From: contranl Date: Tue Jun 29, 2004 1:12pm Subject: My rf-est-room ! . Have a look at my rf-testroom ...this is where i test my equipment http://www.comlab.no/movie/comlab.wmv (very high quality 2MB video stream...view in full screen !) if it's to fast for your connection watch the slower stream http://www.comlab.no/movie/comlab256kstream.wmv Only joking it's not mine ofcourse :) Tetrascanner 8994 From: Date: Tue Jun 29, 2004 5:12pm Subject: Online Privacy "Eviscerated" by First Circuit Decision Online Privacy "Eviscerated" by First Circuit Decision Tuesday, June 29 2004 @ 08:00 PM Contributed by: ByteEnable The First Circuit Court of Appeals dealt a grave blow to the privacy of Internet communications with its decision today in the case of U.S. v. Councilman. The court held that it was not a violation of criminal wiretap laws for the provider of an email service to monitor the content of users' incoming messages without their consent. The defendant in the case is a seller of rare and used books who offered email service to customers. The defendant had configured the mail processing software so that all incoming email sent from Amazon.com, the defendant's competitor, was copied and sent to the defendant's mailbox as well as to the intended recipient's. As the court itself admitted, "it may well be that the protections of the Wiretap Act have been eviscerated as technology advances." "By interpreting the Wiretap Act's privacy protections very narrowly, this court has effectively given Internet communications providers free rein to invade the privacy of their users for any reason and at any time," says Kevin Bankston, EFF attorney and Equal Justice Works fellow. "This decision makes clear that the law has failed to adapt to the realities of Internet communications and must be updated to protect online privacy." Decision in U.S. v. Councilman (PDF file). http://www.linuxelectrons.com/article.php?story=20040629200051526 [Non-text portions of this message have been removed] 8995 From: Date: Thu Jul 1, 2004 2:20am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (including, but not limited to: MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com -------------------------------------------------------------------------------- New England, New York, and New Jersey Area (including, Boston, Manhattan, Long Island, New Jersey, Nantucket Island, and Martha's Vineyard) Richard J. Heffernan R.J. Heffernan Associates 383 East River Road Guilford CT. 06437-2299 (203) 458-8882 Telephone E-mail: richheffernan-tscminfo@y... -------------------------------------------------------------------------------- Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... -------------------------------------------------------------------------------- New York, Westchester County, Manhattan, Greenwich CT Area (also, serving New Jersey, Philadelphia, Washington DC, North-East) Charles Patterson Global Communications PO Box 70 Irvington, NY 10533 (800) 337-2001 Telephone URL: http://www.telephonesecurity.com/ E-mail: tscm@t... -------------------------------------------------------------------------------- Washington DC, Northern VA, and Baltimore Metropolitan Area (also, Delaware, Philadelphia, Harrisburg and surrounding areas in PA and NJ) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... -------------------------------------------------------------------------------- Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... -------------------------------------------------------------------------------- Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: info@e... -------------------------------------------------------------------------------- Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intellicom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone URL: http:// www.intellicomtscm.com/ E-mail: bgr101@intellicom -------------------------------------------------------------------------------- Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... -------------------------------------------------------------------------------- Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... -------------------------------------------------------------------------------- San Francisco and all of California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... 8996 From: Date: Thu Jul 1, 2004 2:20am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 8997 From: Date: Thu Jul 1, 2004 2:20am Subject: File - spec-ang-2200.pdf File : spec-ang-2200.pdf Description : ANG-2200 Dual Channel Noise Generator Attachment: (application/pdf) spec-ang-2200.pdf [not stored] 8998 From: Date: Thu Jul 1, 2004 2:20am Subject: File - specs-CPM700.pdf File : specs-CPM700.pdf Description : CPM-700 Spec Sheet Attachment: (application/pdf) specs-CPM700.pdf [not stored] 8999 From: Date: Thu Jul 1, 2004 2:20am Subject: File - spec-cpm700-deluxe.pdf File : spec-cpm700-deluxe.pdf Description : CPM-700 DELUXE Spec Sheet Attachment: (application/pdf) spec-cpm700-deluxe.pdf [not stored] 9000 From: Date: Thu Jul 1, 2004 2:20am Subject: File - specs-OSCOR.pdf File : specs-OSCOR.pdf Description : OSCOR Spec Sheet Attachment: (application/pdf) specs-OSCOR.pdf [not stored] 9001 From: Date: Thu Jul 1, 2004 2:20am Subject: File - specs-ORION.pdf File : specs-ORION.pdf Description : ORION Spec Sheet Attachment: (application/pdf) specs-ORION.pdf [not stored] 9002 From: neverbeatle Date: Thu Jul 1, 2004 2:19am Subject: Investment Question - Quadrupole Resonance On a talk show on the War in Iraq here in Australia last night one of the commentators made the point that when a prestigious British military think tank was asked about the effect on Al Quadea of operations in Iraq and the War On Terror in general their response was two words - "Accelerated Recruitment". This morning I made a modest investment in a small Australian company which holds intellectual property in Quadrupole Resonance technology. The company, QR Sciences (http://www.qrsciences.com/), is field trialling its Quadrupole Resonance technology with Lockheed and other partners for bomb detection systems to be deployed initially at airports. They are hiring RF specialists in the US at the moment - members of this list might be interested, check the company's website. This stock is a lottery ticket. Apparently, the CEO Kevin Russeth, has stated openly that this year will determine whether the company is worth 2 cents or 2 dollars (currently it's 14 cents). Given that QR Sciences is not a manufacturer of equipment (they intend to license the IP) the key investment risk relates to the technology - is it good enough and will it be adopted? Given the security implications of this business there is very little information regarding the specifics of the technology or the company's commercial prospects reaching the market. Investors are, to an extent, flying blind. I thought I'd poll this list to see if anyone has any gut feelings as to the commercial viability of this technology. There are other competing technologies for bomb detection of which, it seems, Trace Detection is the most promising. However, Quadrupole Resonance (and this is why I took a punt on it) seems pretty straight forward. It's fast, cheap, effective and can probably be scaled down to a hand-held wand. On the downside, it wont detect liquid-based explosives (because nitrates in liquid don't have a static quadrupole moment?), it wont see through metal (thus must be used in conjunction with X-ray), and has trouble detecting dynamite because the return signal comes out smack-bang in the middle of the AM broadcast band. There is a company-commissioned research report which surveys the landscape for the competing bomb-detection technologies here: http://tinyurl.com/2g8yk I'm not hawking this stock, I want to know if anyone has any ideas on the prospects for Quadrupole Resonance for commercial security applications. The company is definitely in the right investment space in this climate. Jerry 9003 From: contranl Date: Thu Jul 1, 2004 11:43am Subject: New portable/handheld spectrum analyzer (Hameg) . A new portable/handheld dpectrum analyzer is available from Hameg http://www.hameg.com/en/product/sa/hm5033.htm Usually there products are fairly lowcost...this model however is sold at 5300 Euro's in the Netherlands wich is unusual high for a Hameg product A Rhode & Schwarz FSH-3 costs 6000 Euro's...for a few bucks more i'd choose the R & S ...unless ofcourse you can get the Hameg for a better price wich might be possible. Here is a very big picture: http://www.oscilloscoop.nl/foto-hameg/HM-5033.jpg Tetrascanner www.tetrascanner.com 9004 From: A Grudko Date: Thu Jul 1, 2004 1:48pm Subject: RE: File - specs-CPM700.pdf -----Original Message----- From: TSCM-L@yahoogroups.com [mailto:TSCM-L@yahoogroups.com] > Description : CPM-700 Spec Sheet LITTLE KNOWN FACT Spill coffee on your CPM 700 display and the logos dissolve. Yup, I did it. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.710 / Virus Database: 466 - Release Date: 2004/06/23 [Non-text portions of this message have been removed] 9005 From: delta Date: Sun Jul 2, 2000 4:09am Subject: test r20 icom hello everybody here you ll find a test (poor but ...) for the icom r20 receiver http://www.ukmidlandscanner.co.uk/r20rev.htm that you speak about last week on this list david from paris 9006 From: James M. Atkinson Date: Fri Jul 2, 2004 3:42pm Subject: Has Pled Guilty According to the criminal clerk at the Federal Courthouse in Greeneville, TN; Stephen J. Wilson formally plead guilty to a host of criminal charges on June 21, 2004, and he is how in the pre-sentencing investigation phase. He is scheduled to be sentenced on August 30, 2004 at 9 AM. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9007 From: contranl Date: Sat Jul 3, 2004 7:13pm Subject: NLJD frequencies ? . For some research on the 800 mhz band usage in my country: The Netherlands (wich also covers many other European countries since most of them use the same harmonized bandplans) I would like to know the transmitting frequencies used by Non Linear Junction Detectors (NLJD's). i imagine that the exact frequencies must be known ..since they are transmitters (with sometimes more then 1 Watt of RF-power)and therefore need a license...and all licenses are registrated somewhere also some users on this group might know there exact frequencies'. I know the frequency-bands but not the exact frequencies (channels) Question: What are the exact frequencies and power-levels (only 800 mhz band) as used by NLJD's ? Ps) I am making a frequency-list of the 800 mhz band...this band could be called the "hightech-band" since many new protocols are used there...including: Fsk,Gmsk,Frequencyhopping,SpreadSpectrum,UltraWideband,Gsm,Tetra..etc Usually the 800 mhz band is not used for "normal" landmobile communications in Europe like in the USA (police fire...etc) i will include sound-examples and links..i'll let you know when it's ready. Thanks in advance ! Tetrascanner www.tetrascanner.com 9008 From: Date: Sat Jul 3, 2004 3:32pm Subject: intercepted the conversation through a wiretap Officer accused of taking a bribe from drunken driving suspect The Associated Press 7/3/2004, 12:32 p.m. ET LANSING, Mich. (AP) ‚Äî A city patrol officer was charged with accepting money in exchange for letting off a possible drunk driver last year. The officer, whose name was not released, was on paid leave for two weeks before being charged Friday. The case came to light after the FBI intercepted the conversation through a wiretap that had been put on the cell phone belonging to person who was pulled over, the FBI said. That person is now serving federal prison time for drug trafficking, FBI Lansing Supervisor Rich Licht told the Lansing State Journal. "It was coincidence that this person has his phone tapped," he said. The officer could face as much as six months in jail if convicted of the misdemeanor, Ingham County Prosecutor Stuart Dunnings III said. Investigators said the officer pulled the man over on suspicion of drunken driving in March 2003. When the unidentified driver offered to give him cash to let it slide, the officer accepted. Authorities did not say how much money was involved. ‚Ä¢__ Information from: Lansing State Journal, http://www.lansingstatejournal.com [Non-text portions of this message have been removed] 9009 From: Steve Uhrig Date: Sat Jul 3, 2004 7:56pm Subject: Re: NLJD frequencies ? Once upon a midnight dreary, contranl pondered, weak and weary: > I would like to know the transmitting frequencies used by Non Linear > Junction Detectors (NLJD's). i imagine that the exact frequencies must > be known ..since they are transmitters (with sometimes more then 1 > Watt of RF-power)and therefore need a license...and all licenses are > registrated somewhere also some users on this group might know there > exact frequencies'. > Question: > What are the exact frequencies and power-levels (only 800 mhz band) as > used by NLJD's ? Hi Tetra, The 800 megacycle band in the U.S. is used heavily by public safety fleets (both analog and digital, both conventional and trunked) and by mobile telephone. The bulk of public safety is moving towards the APCO 25 digital trunking standard on 800 megs. Wars are being fought in the business and legal community over bandwidth in the 800 region. Because there is so much mobile telephone and other users on 800, NLJDs manufactured in the United States do not operate on that band. The NLJD could interfere with legitimate communications and thus would not pass mandatory Federal Communications Commission (FCC) Certification needed to be imported or manufactured in the U.S. However, there is a band between 902 and 928 megacycles called an Industrial, Scientific and Medical band (ISM). It's basically a garbage dump. Unlicensed, non-FCC approved equipment can be used there. Cordless phones, remote controls, wireless video and many other consumer products use the 900 megacycle ISM band because no license is required nor do the restrictions apply which would on 800 due to the numerous life critical users of the band. No license. The device may need to be FCC Certified, and that info can be researched on the FCC's website. An exact frequency need not be specified, only a range or band. My ISA NLJD operates on 915 megacycles. Another brand of NLJD is in the same band (902-928), but hops around to avoid interference from other signals like which may be close by. I personally believe this is more of a selling point than a truly useful technical feature. I've never had, and don't know anyone who has, experienced interference on an NLJD operating on a fixed frequency. This includes operating on upper levels of skyscrapers in Manhattan and Los Angeles, some of the toughest cities in the United States as far as the RF environment goes. The antennas are directional anyway. Units designed for export, or for federal government use in the U.S. may be higher powered and may use frequencies slightly outside the 900 megacycle ISM band. The federal government in the U.S. conveniently exempts themselves from many of the laws they pass. Higher power doesn't mean much. Receiver sensitivity does. My NLJD has control of its output power, and I rarely find it necessary or even desireable to run it near maximum. Frequency doesn't mean much either, as long as it's within a general range which has proven to work. Don't forget you need to build cavities and stable, sensitive receivers for the 2nd and 3rd harmonic too, so going too high in frequency adds cost and complexity to the receive side with questionable benefits. I believe, but do not know from personal experience, some Russian units may operate at lower frequencies maybe around 300-400 megacycles and much higher power. I've heard people whom I trust state they would not want to be around one of the Russian units. Life is cheaper there and standards much lower. Using raw power, which is cheap and easy, is a crappy attempt to make up for a lousy receiver and deent precision antennas, which are expensive and difficult. Hope this helps. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9010 From: James M. Atkinson Date: Sun Jul 4, 2004 11:44am Subject: Re: NLJD frequencies ? Illumination frequencies typically run between 750 and 950 MHz, but there are some Soviet and Chinese units (of the same design) which operate on illumination frequencies around 300, 500, or 650 MHz. In the U.S. the 900 MHz ISM band is most commonly used between 902 and 928 MHz, but in Europe and Asia an illumination frequency in the 800 MHz band is more common. A few units use a swept illumination signal between 200 MHz and 1 GHz, and others use the same swept signal but add the use of a comb generator as well, which can also be called "chirping" of "sounding". The illumination frequency used by most equipment is actually rather arbitrary, and reflects more the limitations of a poor design, or cheaper equipment. A NLJD that operates on a fixed frequency is going to be less expensive than one that is tunable, and a tunable unit is going to be less expensive than a swept or comb unit. The receiver section selectivity and sensitivity are far more important than either the power levels used or the frequencies used. The transmitting frequency must be precisely locked onto the receiver frequencies, or the NLJD is going to be useless. The optimal way to do this is to actually use an extremely high stability time-base, and maintain a phase lock between the transmitter and receiver sections. All the bells, buzzers, meters, blinking lights, and fancy packaging are useless if the NLJD is cheap consumer grade garbage that drifts or has poor receiver design. A good rule-of-thumb is to assume that NLJD's can operate anywhere from 300 to 1.2 GHz for the illumination frequency, and two, three, and four times this for the reflected signal that is of interest. -jma At 08:13 PM 7/3/2004, contranl wrote: >. > >For some research on the 800 mhz band usage in my country: >The Netherlands (wich also covers many other European countries >since most of them use the same harmonized bandplans) > >I would like to know the transmitting frequencies used by Non Linear >Junction Detectors (NLJD's). i imagine that the exact frequencies >must be known ..since they are transmitters (with sometimes more >then 1 Watt of RF-power)and therefore need a license...and all >licenses are registrated somewhere >also some users on this group might know there exact frequencies'. > >I know the frequency-bands but not the exact frequencies (channels) > >Question: > >What are the exact frequencies and power-levels (only 800 mhz band) >as used by NLJD's ? > >Ps) I am making a frequency-list of the 800 mhz band...this band >could be called the "hightech-band" since many new protocols are >used there...including: >Fsk,Gmsk,Frequencyhopping,SpreadSpectrum,UltraWideband,Gsm,Tetra..etc >Usually the 800 mhz band is not used for "normal" landmobile >communications in Europe like in the USA (police fire...etc) i will >include sound-examples and links..i'll let you know when it's ready. > >Thanks in advance ! > > >Tetrascanner >www.tetrascanner.com > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9011 From: contranl Date: Sun Jul 4, 2004 1:48pm Subject: RE: NLJD frequencies . Thanks for the replies! I did find some more info: Some (older)Scanlock NLJD's work on 888.5500 mhz wich is a frequency already phased out in most European countries...wich would mean that using them on that frequency would be illigal since that frequency is now being used for the GSM /cellular band (GSM-Extended) I assume that Scanlock now has an option to change the frequeny..just like the Orion and others My guess is that the new frequency band for NLJD's in Europe would be: 869.4125 ~ 869.6375 in 25 khz steps(or wideband) and a maximum power of 500 mW This band is also used for other devices that work more or less similar (transmitting a signal and then measuring what is coming back) Such devices are for example readers (transmitters) for RFID , RF- Tags , Access control Note: the maximum allowed power is 500 mW...all NLJd's i have seen can do at least 1 Watt most of them have adjustable power-levels so it is left to the user to be responsable and not use more then 500 mW (wich leads to the conlusion that such devices can not have a CE approval mark (similar to FCC mark)...so they are in the "Grey-zone". The exact frequency band in the USA would be: 902.2 ~ 927.8 MHz. (curious if an Orion can do the whole range ?) mostly around 915 mhz So in USA and Europe no exact frequencies but just frequency ranges ...and in both cases not exclusive Rusian NLJD's seem to operate in the 891.000 ~ 897.0000 MHz range wich can't be used in either USA or Western-Europe For my curiousity i would like to know what an NLJD sounds like when listening to it with a scanner ...i assume that they may all sound different since the signal itself is not regulated and depends on the manufacturer I would welcome a sound sample (10 sec Wav or Mp3) (i will add the sound to my 800 mhz frequency-list) Here is a maybe not so well known European NLJD http://www.winkelmann.co.uk/pdfs/HAWK450XD%20Ver2.pdf And here's a Russian http://www.suritel.ru/Catalogue-2003_eng.pdf Greetings Tetrascanner www.tetrascanner.com 9012 From: delta Date: Tue Jul 4, 2000 2:52am Subject: Re: NLJD frequencies ? +I am making a frequency-list of the 800 mhz band...this band +could be called the "hightech-band" since many new protocols are +used there...including: hello here in france (but i think all around the world) i find last week the frequency 863.350 mhz used by the davys vantage pro station (for the weather) the power is 15 mw and burst every 2.5 secondes also often in france you ll find a lot of microphone using the 740 to 850 mhz band in wfm mode and some wireless home transmission (for listenning the tv in your bed etc etc ...) but nothing else. david from paris 9013 From: Jack Powers Date: Sun Jul 4, 2004 4:47pm Subject: frequency-list There is a very nice (U.S.) spectrum chart available here: www.ntia.doc.gov/osmhome/allochrt.pdf It's about 400K bytes in size. On Jul 4, 2004, at 5:48 AM, TSCM-L@yahoogroups.com wrote: > > ... > Ps) I am making a frequency-list of the 800 mhz band...this band > could be called the "hightech-band" since many new protocols are > used there...including: > Fsk,Gmsk,Frequencyhopping,SpreadSpectrum,UltraWideband,Gsm,Tetra..etc > Usually the 800 mhz band is not used for "normal" landmobile > communications in Europe like in the USA (police fire...etc) i will > include sound-examples and links..i'll let you know when it's ready. > > Thanks in advance ! > > > Tetrascanner > www.tetrascanner.com > Jack Powers Powers Technical Services powerstech@c... +1-408/621-1883 www.cryptnet.org/powerstech 9014 From: Date: Mon Jul 5, 2004 1:04am Subject: Bugging devices are found at 4-5% of UK companies that ask for checks Industrial espionage 'real and out there' By Will Smale BBC News Online business reporter The revelation that Marks and Spencer is investigating an apparent attempt to spy on the mobile phone records of its boss Stuart Rose has brought industrial espionage into sharp and somewhat worrying focus. By the very nature of the activity it is impossible to quantify, but experts are in agreement that the issue is real and growing. And the galloping pace of technology is making espionage, such as eavesdropping or theft, ever more of a potential problem for companies today. Mobile phones and the internet simply provide the bad guys with a number of additional ways to get at a company's information, helped on by an ever more sophisticated and easily obtainable array of gadgets and tools with which to do their dirty work. For example, an electronic bug can be enclosed in an apparently normal mobile phone battery, creating a listening device that is forever powered by the said power source and able to transmit the user's two-way conversation. Listening in Picture the scene: the company director hangs his coat up in the changing room before going off to begin his round of golf. The attacker then simply opens up the executive's mobile phone and switches the batteries. Industrial espionage isn't just in films or TV shows, it is real and out there Security boss Justin King The director may never find out he was being bugged. After all, how many people know the file number on their mobile phone battery? Yet an unscrupulous rival can now listen to some of his most intimate business conversations. The Institute of Directors (IoD) confirms that, from talking to its members, the potential of becoming a victim of industrial espionage now seems to be bigger than ever. Some 60% of members have suffered from theft - be it electronic or of the more traditional form - while 14% have reported internet crime in one form or another, explains IoD head of business policy Richard Wilson. Concealed device "It is certain that the increased use of mobile phones and the internet means the potential to suffer from industrial espionage is bigger than ever. "Every cloud has a silver lining though, so to speak, and it does provide a lot of opportunities for security companies to offer protection," Mr Wilson told BBC News Online. Bugging devices are found at 4-5% of UK companies that ask for checks, according to Justin King, managing director of C2i International, one firm which helps businesses prevent and counter industrial espionage. "In some cases the bugs could have been in place for months or years. People are just utterly horrified when they find out, just devastated," Mr King said. Commercial advantage Mr King says the extent of the problem is evident when you realise that, according to industry estimates, more than £10m of bugging devices have now been sold in the UK. Considering some bugs cost as little as £40 each, that could be an awful lot of bugs. REAL LIFE ESPIONAGE In 2001 Proctor and Gamble admitted spying on rival Unilever for information on its shampoos Boeing was punished by the US Air Force in 2003 for resorting to espionage in order to better its defence rival Lockheed Martin "They are out there and companies cannot afford to ignore the problem," he said. And Mr King is in no doubt about the motivating factor behind the bugging trend: money. "Information is vital when the markets are tight and people want to get an advantage. This is especially vital when in cases of mergers or hostile takeovers. "That one fact or figure could make all the difference." Cleaning up There are also a number of semi-legal firms providing spying services, Mr King added. "These people are very easy to find, sadly it isn't hard," he said. And in addition from simply protecting internet and phone systems, companies also need to keep an eye on their staff, be it full time workers or contract cleaners. "I'm told the going rate to get a cleaner to steal something for you in London is £20," said Mr King. "We have had clients who have had a cleaner steal a vital document, or photograph it with a mobile phone, or even in one instance, simply copy it on one of the firm's photocopiers. You do not want to leave sensitive documents lying around. "Industrial espionage isn't just in films or TV shows, it is real and out there." said Mr King. Story from BBC NEWS: http://news.bbc.co.uk/go/pr/fr/-/1/hi/business/3853913.stm Published: 2004/07/04 08:32:54 GMT © BBC MMIV [Non-text portions of this message have been removed] 9015 From: Ocean Group Date: Mon Jul 5, 2004 9:29am Subject: RE: NLJD's I saw some Russian NLJD's at a show last year and let me tell you, I almost had a heart attack when the Russian Sales guy told me the output power... At 250 W's I can cook my freaking breakfast with the thing. You could also look at the UK made LocatorXD. From: zack <10-33@c...> Date: Sun Jun 24, 2001 8:23am Subject: Web cams I am looking to purchase a web cam. One of you has had a positive experience with one. Suggestions please ??? ( PS -- not expensive ) (<: visit http://www.copscops.com Join the Law Enforcement community http://anexa.com/lawenforcement/index.Ihtml Washington DC Police Department http://www.mpdc.org The data contained herein is confidential. Unauthorized dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 3243 From: Jay Coote Date: Sun Jun 24, 2001 1:53pm Subject: Re: handheld with 2" screen (ICOM IC-R3) I've heard the R3 will only receive the "standard" TV channels- no 900 or 2400 MHz stuff.... someone should check this out first. Jay Coote ---------- Icom has a new hand held receiver (2.4W x 4.7H x 1.3D in) with a built in 2" video screen, covering up to 2.45 Ghz. All your normal receiver features plus, AM & FM TV (NTSC M, PAL B or PAL G systems). To quote Icom, they are aiming at the ..."Experimenting with wireless video" market. I'm more involved in the IT security side of things than RF sweeping, so I couldn't comment on its TSCM usefulness, but I'm sure the spy shops will have shelves full of them in no time at all! http://www.icomamerica.com/receivers/handheld/icr3main.html Regards, Justin T. Fanning Justin@f... ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3244 From: Dragos Ruiu Date: Sun Jun 24, 2001 11:20am Subject: Re: Web cams (Caveat Lector: I've been working on encrypted video for secure applications for a while and my choices tend to be biased by these requirements..) I've had positive experiences with the Axis products on several projects, including some high visibility ones (www.alzado.net) and highly recommend them, though their nature (web/ftp server on boards, c mount lens) puts them in the more expensive price ranges. But they are great stuff... For lower cost fixed lens USB models I've had good results with the Kodak DVC products and like the Intel ones (The ones that have linux drivers!), though I'm still fiddling with these... The Logitech QuickCam series is ubiqitously available and fairly decent in the low end range if you only plan to use MS os'es. If you can get an olderish one you may find 3rd party linux drivers for it... forget about the newest ones for a while though unless wintendo is your platform. There are many HOWTO's and web pages available for this particular brand... The Creative brand cameras seem to have decent Linux support though I have no personal experience with them. If you do want any custom software or work under linux I highly recommend looking at the video4linux pages and checking driver availability before purchase at: http://roadrunner.swansea.uk.linux.org/v4L.shtml Sourceforge has a new project called motion that looks very interesting too and you may find extremely useful... For windows only environment krosnoff.com has a fairly good driver availability chart and hardware survey... You can find some faily comprehensive lists of wintendo/Mac video sw packages at: http://netconference.about.com/internet/netconference/cs/webcamsoftware For more high end products, check out Pelco... In almost all cases I would recommend looking at the model compatibility of the software you select before purchasing the hardware, as the driver availablility and sw support is usually a highly limiting factor on hardware choices. cheers, --dr On Sunday 24 June 2001 13:23, zack wrote: > I am looking to purchase a web cam. One of you has had a positive > experience with one. Suggestions please ??? ( PS -- not expensive ) (<: > > visit http://www.copscops.com > Join the Law Enforcement community > http://anexa.com/lawenforcement/index.Ihtml Washington DC Police Department > http://www.mpdc.org > > The data contained herein is confidential. Unauthorized dissemination > of the contents of this e-mail may be in breach of Criminal and Civil law > and may lead to prosecution. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3245 From: Dragos Ruiu Date: Sun Jun 24, 2001 11:38am Subject: Re: Web cams P.S. Oh Yeah... Another good sourceforge page to check is the CPiA project page.... cheers, --dr On Sunday 24 June 2001 16:20, Dragos Ruiu wrote: > (Caveat Lector: I've been working on encrypted video for secure > applications for a while and my choices tend to be biased by these > requirements..) > > I've had positive experiences with the Axis products on several projects, > including some high visibility ones (www.alzado.net) and highly recommend > them, though their nature (web/ftp server on boards, c mount lens) puts > them in the more expensive price ranges. But they are great stuff... > > For lower cost fixed lens USB models I've had good results with > the Kodak DVC products and like the Intel ones (The ones that have > linux drivers!), though I'm still fiddling with these... > > The Logitech QuickCam series is ubiqitously available and fairly decent > in the low end range if you only plan to use MS os'es. If you can get > an olderish one you may find 3rd party linux drivers for it... forget about > the newest ones for a while though unless wintendo is your platform. > There are many HOWTO's and web pages available for this particular brand... > > The Creative brand cameras seem to have decent Linux support though > I have no personal experience with them. > > If you do want any custom software or work under linux I highly > recommend looking at the video4linux pages and checking > driver availability before purchase at: > > http://roadrunner.swansea.uk.linux.org/v4L.shtml > > Sourceforge has a new project called motion that looks > very interesting too and you may find extremely useful... > > For windows only environment krosnoff.com has a fairly good > driver availability chart and hardware survey... > > You can find some faily comprehensive lists of wintendo/Mac > video sw packages at: > > http://netconference.about.com/internet/netconference/cs/webcamsoftware > > For more high end products, check out Pelco... > > In almost all cases I would recommend looking at the > model compatibility of the software you select before purchasing > the hardware, as the driver availablility and sw support is > usually a highly limiting factor on hardware choices. > > cheers, > --dr > > On Sunday 24 June 2001 13:23, zack wrote: > > I am looking to purchase a web cam. One of you has had a positive > > experience with one. Suggestions please ??? ( PS -- not expensive ) (<: > > > > visit http://www.copscops.com > > Join the Law Enforcement community > > http://anexa.com/lawenforcement/index.Ihtml Washington DC Police > > Department http://www.mpdc.org > > > > The data contained herein is confidential. Unauthorized dissemination > > of the contents of this e-mail may be in breach of Criminal and Civil law > > and may lead to prosecution. > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3246 From: James M. Atkinson, Comm-Eng Date: Sun Jun 24, 2001 8:40pm Subject: Telephone bugger's wings clipped MAIL & GUARDIAN 15 TO 21 June 2001 Telephone bugger's wings clipped By Paul Kirk The high-profile owner of a Durban electronic shop was arrested this week on suspicion of illegally tapping the telephones of a major shipping company. Police say only three cases of illegal telephone tapping - including this week's case - have been prosecuted since the new legislation was passed allowing for serious jail time for telephone buggers. People illegally tapping phones can be jailed for up to two years, and up to five years for disclosing information obtained from an illegal telephone tap. But although this is on the increase - with dozens of ex-Telkom technicians and out-of-work police offering bugging services - the law that prevents telephone tapping is so restrictive it severely hinders the investigation of crime. Andrew Brophy advertised in the Durban telephone directory that his business - the Spy Shop in the Durban pavilion - supplied electronic surveillance and bugging. In effect he was advertising that he was prepared to break the law. The Interception and Monitoring Act places enormous obstacles in the way of government agencies that may legally monitor telecommunications lines. Only an assistant commissioner of police, a major general of the South African Defence Force (SANDF) or a chief director of Intelligence services may approach a judge to request permission to monitor a telecommunications line. Permission may only be granted for crimes that are being committed over a long period of time, or if they are committed on an organised or regular basis. The only exceptions to these rules are crimes committed under the Drugs and Drug Trafficking Act, or crimes that may harm the economy. A copy of the October 1999 Law Commission report on the Act states that these conditions may be a serious defect to the law - as once-off murder, rape, or armed robbery would not be sufficient to justify a telephone "bug". The report reads: "A matter which is alarming in South Africa is the large number of advertisements, sometimes in law journals, of private investigators offering to deliver services which include 'bugging'. In view of the fact that only the [police], the SA Secret Service, the SANDF and the National Intelligence agency may be authorised to do interception and monitoring, the legality of monitoring by private investigators is questionable, especially in regard to instances of third party monitoring." Brophy was one of Durban's most high-profile advertisers. His arrest followed the employment of Durban debugging expert Raymond van Staden to check the telephone lines of a shipping company. Most telephone taps are not placed inside the home or office of a victim; instead they are connected to the street boxes to which telephone lines run. Bugs do not normally make any noise on a telephone line and as a rule cannot be detected without specialised equipment and training. Van Staden says bugs are most commonly in the form of specially modified small tape recorders with wires attached to the telephone line. A special adaptation of the tape recorder switches the device on as soon as the telephone is lifted. The small tapes can generally record one hour of conversation. According to police sources, the standard charge is R3 000 a week to monitor a telephone line. After Van Staden discovered the telephone box outside his client's home had been forced open, he looked inside and saw the tell-tale signs of an illegal telephone tap. He then contacted Telkom and police and prepared to wait for the telephone bugger to return. To Van Staden's amazement the two alleged buggers returned only minutes later to change the tapes in their monitoring device. Once Brophy opened the junction box, Van Staden pounced and made a citizen's arrest. Moments later police and Telkom officials arrived. After a detailed search the telephone "bug" was found hidden among the tangle of wires in the junction box. Members of the police technical support unit searched Brophy's car. Brophy's driver, Thinus Delport, was arrested as well. The bug was removed for fingerprinting and a partial fingerprint was found on the small tape inside. Brophy was found to be in possession of tape recorders like the one found in the telephone box. Police also found a file in his car containing the business cards of most of Durban's large security companies suggesting that Brophy's client base may have been significant. Brophy appeared in court and was Granted R2 000 bail on Tuesday. Van Staden said he suspected that industrial espionage may have been the motive for the bugging. Andy Grudko, the South African Council of Investigators, said although telephone bugging was on the increase, it was more widespread before the new Act was passed. He said the council was attempting to weed out illegal telephone tappers from the industry. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3247 From: David Alexander Date: Mon Jun 25, 2001 2:43am Subject: re: things you didn't know >In England, the Speaker of the House is not allowed to speak. For those who don't understand. The House of Commons in the UK government has a 'Speaker' whose job it is to maintain good order and discipline in the chamber during business. The person is an elected MP, but is neutral to the issues and parties. The speaker may not express an opinion on an issue during a debate, which is what the 'factoid' is trying to say, but does have the casting vote in the event of a tie. Hope this makes it clearer. I have to say that many of those 'facts' set my 'baloney detectors' flashing, But I have no definite proof. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 3248 From: James M. Atkinson, Comm-Eng Date: Mon Jun 25, 2001 0:16pm Subject: The Movie Laws of Computers and Electronics (cough-cough) How about a version of this for TSCM'ers -jma -------------------------- > >The Movie Laws of Computers and Electronics > >Word processors never display a cursor. > >You never have to use the space-bar when typing long sentences. > >All monitors display inch-high letters. > >High-tech computers, such as those used by NASA, the CIA, or some >such governmental institution, will have easy to understand >graphical interfaces. Those that don't, have incredibly powerful >text-bases command shells that can correctly understand and execute >commands typed in plain English. > >Corollary: you can gain access to any information you want by simply >typing "ACCESS ALL OF THE SECRET FILES" on any keyboard. > >Likewise, you can infect a computer with a destructive virus by >simply typing "UPLOAD VIRUS" (see "Fortress") > >All computers are connected. You can access the information on the >villain's desktop computer, even if it's turned off. > >Powerful computers beep whenever you press a key or whenever the >screen changes. Some computers also slow down the output on the >screen so that it doesn't go faster than you can read. The *really* >advanced ones also emulate the sound of a dot-matrix printer. > >All computer panels have thousands of volts and flash pots just >underneath the surface. Malfunctions are indicated by a bright >flash, a puff of smoke, a shower of sparks, and an explosion that >forces you backwards. > >People typing away on a computer will turn it off without saving the data. > >A hacker can get into the most sensitive computer in the world >before intermission and guess the secret password in two tries. > >Any PERMISSION DENIED has an OVERRIDE function (see "Demolition Man" >and countless others). > >Complex calculations and loading of huge amounts of data will be >accomplished in under three seconds. Movie modems usually appear to >transmit data at the speed of two gigabytes per second. > >When the power plant/missile site/whatever overheats, all the >control panels will explode, as will the entire building. > >If a disk has got encrypted files, you are automatically asked for a >password when you try to access it. > >No matter what kind of computer disk it is, it'll be readable by any >system you put it into. All application software is usable by all >computer platforms The more high-tech the equipment, the more >buttons it has (Aliens). However, everyone must have been highly >trained, because the buttons aren't labelled. > >Most computers, no matter how small, have reality-defying >three-dimensional, active animation, photo-realistic graphics >capability. > >Laptops, for some strange reason, always seem to have amazing >real-time video phone capabilities and the performance of a CRAY >Supercomputer. > >Whenever a character looks at a VDU, the image is so bright that it >projects itself onto his/her face (see "Alien", "2001"). -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3249 From: James M. Atkinson, Comm-Eng Date: Mon Jun 25, 2001 5:39pm Subject: Survey: Majority Of Web Users Are FBI Agents Posing As Teenage Girls [Satire] Survey: Majority Of Web Users Are FBI Agents Posing As Teenage Girls Survey Shows Evolving Web No Longer Dominated by Male Techies NEW YORK, N.Y. (SatireWire.com) - The Internet reached a demographic milestone this week as a new study revealed that for the first time, the majority of U.S. Internet users are FBI agents posing as teenage girls. The report, by research firm Media Metrix, marks the first time the demographic group known as "males" has not been in the majority. According to the survey, which tracked online usage from January through July, 50.4 percent of U.S. Web users -- or nearly 38 million -- are FBI agents posing as teenage girls. That's still below the percentage of FBI agents posing as teenage girls in the overall population, which according to U.S. Census figures is 55.7 percent. However, the report noted that FBI agents posing as teenage girls represent the fastest growing segment of Web users, increasing 185 percent in the past 12 months. "This study reveals that the Internet has come of age as a practical medium and is no longer dominated by the male techie crowd," said Randall Stinson, editor of American Demographics magazine. `These newcomers are saying, 'The Internet is about more than being a geek. It's about shopping and staying in touch with family and posing as a little girl to apprehend geeks.'" Web sites catering to teenage girls corroborated the findings. "At least half" of Gurl.com's 1.3 million unique monthly visitors are FBI agents posing as teenage girls, said Gurl.com spokesperson Helen Kattrall. "It's easy to tell the difference," she said. "Real teens chat with each other about boys and school and celebrities. But FBI agents posing as teenage girls are never interested in girl-talk. They tend to write things like, 'Hi, I'm Emily. I'm almost 13, and I'm looking for a father figure willing to cross state lines.'" In a statement, the FBI disputed the study's findings and insisted its agents are not working on that many cases. However, the bureau conceded it cannot rule out the possibility that some agents are posing as teenage girls in their free time. In other survey findings: More than 60 percent of female respondents say cybersex is equivalent to infidelity, but a staggering 92 percent of FBI agents posing as teenage girls approve of cybersex as long as it leads to an arrest and conviction. Nearly one third of pedophiles say they actually go to teen sites in hopes of meeting FBI agents. Four out of five men say they watch women's gymnastics and figure skating for the athleticism. Nine out of ten women say they are lying. Copyright © 2000-2001, SatireWire. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 3250 From: Date: Mon Jun 25, 2001 1:02pm Subject: WWW.huh?: You Are the First Line of Defense By Steve Hara American Forces Press Service WASHINGTON, June 25, 2001 -- Defense Department computer security systems and specialists foiled nearly 22,500 would-be intruders in 1999 and 24,500 in 2000. There's no let-up in sight. Special agent Jim Christy said he and others on his law enforcement staff are in a "growth business" chasing hackers and spies and running other criminal activities to ground. As representatives of the Office of the Assistant Secretary of Defense for Command, Control, Communications and Intelligence, they also counsel DoD employees on being an effective first line of defense instead of the weakest link. When he discusses computer security, Christy said, he drives home that average folks aren't expected to mount an ironclad defense. Rather, he stressed, they can do simple things that make life harder for bad guys -- and stop doing simple things that make life easy for them. o Use different passwords at Web sites and on every machine you use. Reject all site and system offers to "remember" you and your password. Bad guys know many people use just one password, so attacking an easily hacked site gives them "skeleton keys" to tough ones. o Don't open e-mail attachments from people you don't know, and don't open them uncritically just because someone you do know supposedly sent them. Hackers use attachments to inject viruses and other mischievous or malicious computer code into machines and systems. A common means to spread infections is by sending e-mail copies to everyone in a victim's address book -- using the victim's name. o Log off or lock your workstation when you go on breaks or out to lunch. No point giving bad guys unfettered access to your computer and network -- and leaving you holding the bag because the system thinks you're at the keyboard. o Never use personal diskettes, Zip disks and the like on classified systems. Computers divide files and write them to disk in units called sectors. If the file's last sector is only partially filled, the machine tops it off with data randomly pulled from memory or hard drives -- there's no real telling in advance where the information might come from. So writing and saving even your holiday greetings letter on a classified system is a potential disaster. That's why the practice is a security violation. o You can be a security risk even if you don't work with classified files, have none on your computer and have no access to any. The mindset on the last point is wrong for at least three reasons, Christy noted. First, too many people think a secure system can't be hacked from their office computer network -- usually because they themselves don't know how. Fact is, good hackers really can launch attacks on your lowly machine if you give them the time and opportunity, he said. Second, he continued, intelligence analysts make a living by drawing conclusions and educated guesses from bits and pieces of unclassified and seemingly unrelated information. Third, information doesn't have to be classified to be sensitive. Medical records, personnel records and personal address and phone books aren't usually classified, but all contain data protected from public release by the Privacy Act of 1974. Good security, he said, means locking out all snoops, not just spies. Christy and company's growing business in security issues gives constant rise to another: personal privacy. You have none, and that roils many employees. Uncle Sam's machine, Uncle Sam's rules, Christy noted. Agency systems administrators are supposed to have the means to track every move made by every user in their realm. Literally. Every keystroke. Every mouse click. They can reconstruct any document you write, every Web site you visit, Christy said. Monitoring could be used to detect crimes and employee waste and abuse, but rarely is, he noted. More frequently, investigators and managers consult monitoring records to make or break cases after allegations surface other ways. Computer users can't claim a "probable cause" defense after being caught, because they all agree to be monitored as a condition of access. "There is absolutely no privacy on a government computer," Christy said. "Every time you turn one on, you get a message that the government can and will monitor you, and if you sign in, that means you understand and agree. Always assume you're being monitored." ##END## 200106252a.jpg Turn on a government computer and you'll see a message saying that signing in means you agree to government monitoring, special agent Jim Christy warns. He's a computer security expert in the Office of the Assistant Secretary of Defense for Command, Control, Communications and Intelligence. Photo by Steve Hara. 200106252b.jpg To make life harder on hackers, use different passwords at Web sites and on every machine you use. Reject all site and system offers to "remember" you and your password. Photo by Steve Hara. 200106252c.jpg Special agent Jim Christy counsels DoD employees on being an effective first line of computer security defense instead of the weakest link. Chasing hackers and spies and running other criminal activities to ground for the Office of the Assistant Secretary of Defense for Command, Control, Communications and Intelligence is unfortunately a "growth business," he says. Photo by Steve Hara. _______________________________________________________ NOTE: This is a plain text version of a web page. If your e-mail program did not properly format this information, you may view the story at http://www.defenselink.mil/news/Jun2001/n06252001_200106252.html Any photos, graphics or other imagery included in the article may also be viewed at this web page. ********************************************************** John R. Angier II M-Group P.O. Box 721388 Norman, OK 73070-8070 USA 405.321.1015 ‚Äò‚ÄòYour central focus in life is to ensure that sufficient and timely and accurate information is present for rational decision making, That‚Äôs really the focus. A young lieutenant or noncommissioned officer has to be able to look at large blocks with no apparent pattern and recognize one.‚Äô‚Äô Brig. Richard P. Zahner, USA, Deputy Director for Signals Intelligence, National Security Agency 3251 From: James M. Atkinson, Comm-Eng Date: Tue Jun 26, 2001 3:17pm Subject: Goodfellow AFB, TX [For those of us who spent time at Goodfellow AFB (spit-spit-spit, mumbled curse) for any length of time...] http://www.wired.com/news/culture/0,1284,44578,00.html?tw=wn20010625 San Angelo, Texas: Home of Spies By Bill Lamb 2:00 a.m. June 25, 2001 PDT SAN ANGELO, Texas -- As president of the chamber of commerce, it is Michael Dalby's job to be this city's biggest civic booster, always available to talk glowingly about the tax base, jobs, home prices and good corporate citizenship. But his repertoire of good news and optimism contains a little something extra: "We understand the security business." No doubt. Thanks to neighboring Goodfellow Air Force Base, this isolated West Texas city of 87,000 may harbor more spies, ex-spies and future spies per capita than any place in America, save Washington, D.C. Since the late 1950s, the relatively obscure base, 90 miles of two-lane highway south of Abilene, has trained thousands of men and women in the increasingly high-tech art of signals intelligence, known in military jargon as SIGINT. The stock and trade of the super-secret National Security Agency, SIGINT is one of the most closely held, least discussed aspects of U.S. intelligence efforts. In San Angelo, however, it's a secret that really isn't, although it may be spoken of in euphemisms or simply referred to in vague terms. Publicly, the base's new armed forces firefighter training program grabs most of the spotlight simply because it is a mission that can be talked about. "From what (a new resident) reads, he thinks all they do at Goodfellow is train firefighters," said retired Air Force Col. Charles E. Powell, Goodfellow's commanding officer from 1980-1984. "As you well know, that's far from the truth." Smoke rising from Goodfellow's firefighter training grounds may attract the public's attention, but the work inside windowless brick buildings keeps the NSA's worldwide front lines manned and takes place without acknowledgment. Even passersby -- civilian and military alike -- who photograph nearby flight exhibits are warned not to shoot buildings in the background. But these simple rules belie the level of security that surrounds Goodfellow's mission. In many respects, the public's perception of how secret something can be is wholly inadequate for describing how carefully the details and technologies of SIGINT operations are guarded. With an average base contingent of 3,000, and military retirees living in the area numbering in the hundreds, San Angelo residents can never know if a new acquaintance is - or was -one of America's high-tech spies. Glenn Miller would be one of those unassuming strangers with stories to tell, but don't count on hearing any. He joined the Air Force in the early 1970s with plans to become an air traffic controller. Those plans changed when he scored well on language aptitude tests and was made an offer he didn't want to refuse. After 37 weeks of Russian language training, he arrived for his first tour at Goodfellow, as a student, in 1972. "San Angelo was one of those places (the students) either liked or hated. And I think the people who hated it were the single guys," Miller said. "They used to roll the streets up at 9 o'clock around here." Twenty-three years of active duty led him to additional language studies, multiple tours in Europe -- including a two-year stint at the U.S. Embassy in Moscow, a tour at NSA headquarters in Maryland and two additional tours at Goodfellow as both an instructor and supervisor. Following his second tour at Goodfellow, the Pennsylvania native decided San Angelo was a good place to call home. He and his wife Janet retired to the city in 1994, and he is now a county veterans service officer. "It was friendly. Low cost of living. And totally different from Pennsylvania. And we didn't want to go back there," he said. "We liked it. We just liked it." It's not an uncommon story, according to Dalby, who cited two of the more well known Goodfellow retirees: a former base commander who served as mayor and another veteran who established a highly successful chain of convenience stores in the area. "(Retirees) are serving on different boards and committees here in the community, and that makes for maybe a better understanding of the base's mission than perhaps other communities would have," said Dalby. While a growing number of European governments question and fear the scope of American SIGINT missions, and privacy advocates protest the presence of American intelligence personnel at overseas collection sites, Goodfellow Air Force Base remains mostly unknown to the public and largely ignored. But the scope and importance of worldwide events aren't ignored in West Texas. "As a community, we tend to take a little more interest in those kinds of stories," said Dalby. The only serious threats to Goodfellow have been home grown: A series of proposed base closings during the past two decades left civic leaders scrambling to save the facility. In 1992, thousands of San Angelo residents lined the streets to greet members of a base closure committee in town for a public hearing. At stake was not only the base's financial impact -- Goodfellow is estimated to pump more than $250 million annually into the local economy -- but civic pride. "Now, that's legendary throughout the Air Force," Dalby said of the outpouring of support. "That wasn't orchestrated by the chamber or the Kiwanis Club or the Rotarians," Powell said. "It was spontaneous. We even saw school children beside the highway whose teachers had brought the class out. They had crudely printed signs that said, 'We Love Goodfellow.'" Whether the turnout influenced the decision is debatable, but the committee instead chose to shut down Lowry Air Force Base near Denver. In the end, survival meant growth, since Goodfellow absorbed many of the intelligence missions previously given out to other bases that are now closed. Now, according to Powell and others, it would be difficult to spend a career in Air Force intelligence without some association with Goodfellow and San Angelo. Copyright © 1994-2001 Wired Digital Inc. All rights reserved. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3252 From: James M. Atkinson, Comm-Eng Date: Tue Jun 26, 2001 4:12pm Subject: Retired Army Officer Guilty of Spying Retired Army Officer Guilty of Spying By Vickie Chachere Associated Press Writer Tuesday, June 26, 2001; 3:37 p.m. EDT http://www.washingtonpost.com/wp-srv/aponline/20010626/aponline153756_000.htm TAMPA, Fla. -- A retired Army man was found guilty Tuesday of selling Cold War military secrets to Moscow over two decades, becoming the highest-ranking U.S. officer to be convicted of espionage. George Trofimoff, 74, could get up to life in prison. The retired colonel in the Army Reserves oversaw an intelligence center in Germany from the 1960s to 1990s. He was working as a grocery store bagger last year when he was arrested in an FBI sting trying to collect money he thought was coming from the Russians. Trofimoff stood erect and showed no emotion when the verdict was announced. He shrugged slightly at his wife, who wept. Sentencing was set for Sept. 27. "What this case should do is send a message to those we entrust our nation's secrets to that if you sell those secrets, if you spy against the United States, we'll pull out all the stops to catch you, to bring you to justice and to convict you," federal prosecutor Laura Ingersoll said. Defense attorney Daniel Hernandez said he will appeal. >From 1968 to 1994, Trofimoff was the civilian chief of an Army interrogation center in Nuremberg, Germany, where refugees and defectors from the Soviet bloc were questioned. The center also housed volumes of secret documents detailing what the United States knew about its Soviet adversaries and other Warsaw Pact nations. Prosecutors said Trofimoff collected $300,000 for photographing U.S. intelligence documents and giving them to the KGB through a go-between, boyhood friend Igor Vladimirovich Susemihl, a Russian Orthodox priest. Among the information prosecutors said Trofimoff smuggled to the Soviets were CIA documents and details of what the United States knew about Soviet military preparedness. A former KGB general, Oleg Kalugin, testified that Trofimoff was one of the Soviet Union's top spies during the 1970s, so valuable that his code name was at the top of a list of KGB sources given to Soviet leader Leonid Brezhnev. He said Trofimoff was even brought to a resort for Soviet military officials as a reward. Trofimoff, born in Germany to Russian emigres, wept on the stand as he described growing up hating communists because some of his family members were unable to escape the Bolshevik Revolution and were killed. He insisted that he never was a spy, but pretended to be one because he needed money. But jurors laughed at Trofimoff when he testified it was a coincidence that he was able to name several Soviet spies when shown them by an undercover FBI agent posing as a Russian diplomat. Jury foreman Mark King said only one vote was needed: Jurors agreed Trofimoff was guilty after viewing a videotape of him describing his spying activities. Deliberations took just two hours. "Just to think someone would do that stuff," King said following the verdict. "He claimed to be an American, that he served the country for the past 46 years ... To think someone like that would betray the country." Trofimoff became a U.S. citizen in 1951, joined the Army in 1953 and was honorably discharged three years later. He was hired as a civilian in Army intelligence in 1959. Trofimoff was recruited to spy by Susemihl, a high-ranking priest for the Moscow-controlled branch of the Russian Orthodox church, investigators said. Susemihl was arrested and freed in 1994; he died five years later. Trofimoff, who married five times, concealed his activities for years from U.S. authorities and his wives. Investigators say he smuggled documents out of the Nuremberg center to his home, where he photographed them at night in his basement. The case against Trofimoff emerged out of the tiny scraps of paper smuggled out the Soviet Union by former KGB archivist Vasili Mitrokhin, who for more than a decade scribbled notes from the secret police's most closely held files. When Mitrokhin defected to Great Britain in 1992, British, American and German investigators began piecing together the information to look for spies. They focused on Trofimoff using details of a valuable Soviet spy known as "Markiz," "Konsul" and "Antey" who worked in the same Army unit as Trofimoff and who was recruited by a Russian priest. As authorities closed in, Trofimoff was captured on videotape in 1999 putting his hand to his heart and telling an undercover agent posing as a Russian agent: "I'm not American in here." Trofimoff was living in a military retirement community in Melbourne on a $71,000 annual Army pension when he was arrested. © Copyright 2001 The Associated Press -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3253 From: Aimee Farr Date: Tue Jun 26, 2001 5:17pm Subject: RE: Retired Army Officer Guilty of Spying Trofimoff indictment @ http://news.findlaw.com/cnn/docs/trofimoff/ustrofimoffindct.pdf Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR Waco, Texas 3254 From: Aimee Farr Date: Tue Jun 26, 2001 5:28pm Subject: FW: Attorney Use of Tracking Technology (email bugs) I deleted my "response" to the below post. If anybody wants to respond, I will FWD along (or you can subscribe). Public archive. Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR Waco, Texas > -----Original Message----- > From: Law & Policy of Computer Communications > [mailto:CYBERIA-L@L...]On Behalf Of Mark Milone > Sent: Tuesday, June 26, 2001 3:57 PM > To: CYBERIA-L@L... > Subject: Attorney Use of Tracking Technology > > > Proposed hypo: > > Attorney (A) is hired by Client (C) to sue Defamer (D) for > defamatory remarks anonymously posted to a message board. (A) > decides to send a "bugged" email to (D) in order to establish > his/her true identity. > > What are the ethical/legal implications of (A)'s conduct? > > - Mark G. Milone > > > ********************************************************************** > For Listserv Instructions, see http://www.lawlists.net/cyberia > Off-Topic threads: http://www.lawlists.net/mailman/listinfo/cyberia-ot > Need more help? Send mail to: Cyberia-L-Request@l... > ********************************************************************** > > > 3255 From: Charles P Date: Wed Jun 27, 2001 5:48pm Subject: Re: The Movie Laws of Computers and Electronics And... Access to the Internet (or any other WAN for that matter) requires the sound of a dial-up modem (see the Sec' Gen. of the UN's desktop in "Art of War" with Wesley Snipes) Charles ----- Original Message ----- From: "James M. Atkinson, Comm-Eng" To: "TSCM-L Mailing List" Sent: Monday, June 25, 2001 1:16 PM Subject: [TSCM-L] The Movie Laws of Computers and Electronics 3256 From: Date: Wed Jun 27, 2001 5:36am Subject: WWW.huh?: You Are the First Line of Defense By Steve Hara American Forces Press Service WASHINGTON, June 25, 2001 -- Defense Department computer security systems and specialists foiled nearly 22,500 would-be intruders in 1999 and 24,500 in 2000. There's no let-up in sight. Special agent Jim Christy said he and others on his law enforcement staff are in a "growth business" chasing hackers and spies and running other criminal activities to ground. As representatives of the Office of the Assistant Secretary of Defense for Command, Control, Communications and Intelligence, they also counsel DoD employees on being an effective first line of defense instead of the weakest link. When he discusses computer security, Christy said, he drives home that average folks aren't expected to mount an ironclad defense. Rather, he stressed, they can do simple things that make life harder for bad guys -- and stop doing simple things that make life easy for them. o Use different passwords at Web sites and on every machine you use. Reject all site and system offers to "remember" you and your password. Bad guys know many people use just one password, so attacking an easily hacked site gives them "skeleton keys" to tough ones. o Don't open e-mail attachments from people you don't know, and don't open them uncritically just because someone you do know supposedly sent them. Hackers use attachments to inject viruses and other mischievous or malicious computer code into machines and systems. A common means to spread infections is by sending e-mail copies to everyone in a victim's address book -- using the victim's name. o Log off or lock your workstation when you go on breaks or out to lunch. No point giving bad guys unfettered access to your computer and network -- and leaving you holding the bag because the system thinks you're at the keyboard. o Never use personal diskettes, Zip disks and the like on classified systems. Computers divide files and write them to disk in units called sectors. If the file's last sector is only partially filled, the machine tops it off with data randomly pulled from memory or hard drives -- there's no real telling in advance where the information might come from. So writing and saving even your holiday greetings letter on a classified system is a potential disaster. That's why the practice is a security violation. o You can be a security risk even if you don't work with classified files, have none on your computer and have no access to any. The mindset on the last point is wrong for at least three reasons, Christy noted. First, too many people think a secure system can't be hacked from their office computer network -- usually because they themselves don't know how. Fact is, good hackers really can launch attacks on your lowly machine if you give them the time and opportunity, he said. Second, he continued, intelligence analysts make a living by drawing conclusions and educated guesses from bits and pieces of unclassified and seemingly unrelated information. Third, information doesn't have to be classified to be sensitive. Medical records, personnel records and personal address and phone books aren't usually classified, but all contain data protected from public release by the Privacy Act of 1974. Good security, he said, means locking out all snoops, not just spies. Christy and company's growing business in security issues gives constant rise to another: personal privacy. You have none, and that roils many employees. Uncle Sam's machine, Uncle Sam's rules, Christy noted. Agency systems administrators are supposed to have the means to track every move made by every user in their realm. Literally. Every keystroke. Every mouse click. They can reconstruct any document you write, every Web site you visit, Christy said. Monitoring could be used to detect crimes and employee waste and abuse, but rarely is, he noted. More frequently, investigators and managers consult monitoring records to make or break cases after allegations surface other ways. Computer users can't claim a "probable cause" defense after being caught, because they all agree to be monitored as a condition of access. "There is absolutely no privacy on a government computer," Christy said. "Every time you turn one on, you get a message that the government can and will monitor you, and if you sign in, that means you understand and agree. Always assume you're being monitored." ##END## 200106252a.jpg Turn on a government computer and you'll see a message saying that signing in means you agree to government monitoring, special agent Jim Christy warns. He's a computer security expert in the Office of the Assistant Secretary of Defense for Command, Control, Communications and Intelligence. Photo by Steve Hara. 200106252b.jpg To make life harder on hackers, use different passwords at Web sites and on every machine you use. Reject all site and system offers to "remember" you and your password. Photo by Steve Hara. 200106252c.jpg Special agent Jim Christy counsels DoD employees on being an effective first line of computer security defense instead of the weakest link. Chasing hackers and spies and running other criminal activities to ground for the Office of the Assistant Secretary of Defense for Command, Control, Communications and Intelligence is unfortunately a "growth business," he says. Photo by Steve Hara. _______________________________________________________ NOTE: This is a plain text version of a web page. If your e-mail program did not properly format this information, you may view the story at http://www.defenselink.mil/news/Jun2001/n06252001_200106252.html Any photos, graphics or other imagery included in the article may also be viewed at this web page. ********************************************************** John R. Angier II M-Group P.O. Box 721388 Norman, OK 73070-8070 USA 405.321.1015 ‚Äò‚ÄòYour central focus in life is to ensure that sufficient and timely and accurate information is present for rational decision making, That‚Äôs really the focus. A young lieutenant or noncommissioned officer has to be able to look at large blocks with no apparent pattern and recognize one.‚Äô‚Äô Brig. Richard P. Zahner, USA, Deputy Director for Signals Intelligence, National Security Agency 3257 From: James M. Atkinson, Comm-Eng Date: Thu Jun 28, 2001 8:00am Subject: Russia: Spy equipment producers arrested in the city of Saransk Pravda.RU:Main:More in detail 20:29 2001-06-27 IGOR TELIN: SPY EQUIPMENT PRODUCERS ARRESTED IN THE CITY OF SARANSK http://english.pravda.ru/main/2001/06/27/8868.html Two citizens of Saransk have been arrested by the workers of Mordvinian Ministry of Internal Affairs department "R", which struggles with crimes in high technologies sphere. Two Saransk young men are accused of illegal production and spreading of sound- and video-recording equipment. 4 camcorder not smaller than a match box with 1-millimetre diameter were seized from the young men. This cameras belong to special equipment for secret obtaining information, therefore spreading such equipment is forbidden by proper law of the Russian Federation. The young producers sold cameras, which are completely compatible with videotape recorder and TV set, for 2 thousand rubles each (about 69 dollars), though it is not clear till now, whether criminals used them to struggle with their competitors. Both Saransk citizens produced the cameras on their own, using details bought in different Moscow radio markets. According to Sergei Afansyev, the worker of "R" department of the Ministry of Internal Affairs, that was the first case of the kind in their practice. The young men were accused of illegal production, sale and acquisition for sale aims of technical facilities, aimed for secret obtaining of information and sentenced to 3 years of imprisonment. Igor Telin PRAVDA.Ru Saransk -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3258 From: Dawn Star Date: Thu Jun 28, 2001 10:38am Subject: Wiretap Inquiry Here is a wiretap inquiry that came in to me today that I wanted to share with the group for comment. Here is the letter of inquiry with name removed and my answer. Roger Yes your evaluation is very astute, there is a system out of Texas that you hook on the target line and works in association with another line that the wiretapper orders up under his control. The new line is set up with speed dial and the number of the listening post is plugged in. When the target lifts their phone the device pulls the spare line into dial tone and executes the tone sequence to activate the speed dial and the line dials the listening post. The second piece of equipment at the listening post answers the phone and puts the conversation bridged off the target line on to an automatic tape machine. The tap part of the hardware is a small box 4"x2"x3" and powers off the phone line itself. It must be physically located along the target line somewhere between the target and the phone company central office and the slave line must also be physically present. Let me know the results for my files. Best Roger Tolces At 01:03 AM 6/28/2001 -0700, you wrote: Dear Sir; You may not entertain answering my enquire but here it is. I am a Deputy Sheriff. Recently I worked a harassing phone call complaint involving the caller knowing privet matters only discussed by the complainants in the privacy of their home. I asked to use the phone at that residence and what I heard when picking up the phone received brings me to my question. When I picked up the receiver I heard a normal dial tome for less than a second and then there were four key tones in rapid entry after which a normal dial tone returned. I had never heard anything like that before and decided not to use that phone. Is there equipment available for clandestine surveillance that can be attached to a phone line in a remote location away from the residence that is activated when the phone receiver is picked up and dials an outside extension where any phone conversation on that line is recorded or overheard by the spying party? I checked the phone box at the residence and found nothing suspicious at that location. I hope someone will take the time to answer this question and offer suggestions. Thank you; 3259 From: Ed Naylor Date: Thu Jun 28, 2001 1:53pm Subject: 802.11 WIRELESS ENCRYPT SECURITY Network protection commentary by: P.J. Connolly Posted at June 22, 2001 01:01 PM PST Pacific NOW THAT SUMMER is officially here, beach trips and picnics become feasible again. I'll tidy up a few loose ends here and then get some fresh air. First of all, if you haven't already done so, check out my take on the security of wireless networking in the Test Center Research Report. If you don't have time, here's a summary: Wireless network security -- at least for the 802.11 specification -- is not secure. That may sound harsh, but people smarter than I appear to have a pretty good handle on the details: Intel's Jesse Walker, the University of California at Berkeley's Nikita Borisov, and the University of Maryland at College Park's William Arbaugh, for starters. The designers of 802.11's security protocol, WEP (Wired Equivalent Privacy), appear to have been a bunch of network guys who thought they knew how to implement encryption. According to the above-mentioned heroes of networking, they made a dog's breakfast of it. True, the traffic is encrypted, and you can't just pluck it out of the air and read it; but it doesn't take very long to snag enough traffic for a data sample large enough to allow an attacker to crack the encryption.Unfortunately, WEP reuses keys way too frequently to provide anything more than casual security. It doesn't help that the RC4 stream cipher method used in 802.11 isn't a good fit for a wireless environment, or that WEP and its successor WEP2 are vulnerable to simple packet-forging attacks. 3260 From: DrPepper Date: Thu Jun 28, 2001 2:21pm Subject: Re: 802.11 WIRELESS ENCRYPT SECURITY I guess that I'm confused. Maybe others more experienced in encryption can explain, , , , , , Why are people fooling with this type of encription when PGP is good enough to fool even the NSA?? Ron C. ============================== Ed Naylor wrote: > Network protection commentary by: P.J. Connolly > > Posted at June 22, 2001 01:01 PM PST Pacific > > NOW THAT SUMMER is officially here, beach trips and > picnics become feasible again. I'll tidy up a few > loose ends here and then get some fresh air. > > First of all, if you haven't already done so, check out > my take on the security of wireless networking in the > Test Center Research Report. If you don't have time, > here's a summary: Wireless network security -- at > least for the 802.11 specification -- is not secure. > That may sound harsh, but people smarter than I appear > to have a pretty good handle on the details: Intel's > Jesse Walker, the University of California at > Berkeley's Nikita Borisov, and the University of > Maryland at College Park's William Arbaugh, for starters. > > The designers of 802.11's security protocol, WEP (Wired > Equivalent Privacy), appear to have been a bunch of > network guys who thought they knew how to implement > encryption. According to the above-mentioned heroes of > networking, they made a dog's breakfast of it. True, > the traffic is encrypted, and you can't just pluck it > out of the air and read it; but it doesn't take very > long to snag enough traffic for a data sample large > enough to allow an attacker to crack the > encryption.Unfortunately, WEP reuses keys way too > frequently to provide anything more than casual > security. It doesn't help that the RC4 stream cipher > method used in 802.11 isn't a good fit for a wireless > environment, or that WEP and its successor WEP2 are > vulnerable to simple packet-forging attacks. > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my shack LIVE at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 3261 From: Miguel Puchol Date: Thu Jun 28, 2001 3:13pm Subject: RE: 802.11 WIRELESS ENCRYPT SECURITY Ron, The problem with PGP is that it's a 'slow' type of encryption system, it's not designed, in it's file-encryption form, to handle real-time high volumes of information, such as those present in a WLAN environment (up to 11Mbps). Other flavours of PGP, such as PGPPhone, encrypt data real-time, but a different type of algorithms and processing methods are used. Some algorithms are best suited for fast data encryption, in network environments, but when these are applied badly, then weak security and a false sense of security ensues. All the best, Mike > -----Mensaje original----- > De: DrPepper [mailto:DrPepper@i...] > Enviado el: jueves, 28 de junio de 2001 21:22 > Para: Ed Naylor > CC: TSCM-L Mailing List > Asunto: Re: [TSCM-L] 802.11 WIRELESS ENCRYPT SECURITY > > > I guess that I'm confused. Maybe others more experienced in encryption can > explain, , , , , , > > Why are people fooling with this type of encription when PGP is > good enough > to fool even the NSA?? > > Ron C. > > ============================== > > Ed Naylor wrote: > > > Network protection commentary by: P.J. Connolly > > > > Posted at June 22, 2001 01:01 PM PST Pacific > > > > NOW THAT SUMMER is officially here, beach trips and > > picnics become feasible again. I'll tidy up a few > > loose ends here and then get some fresh air. > > > > First of all, if you haven't already done so, check out > > my take on the security of wireless networking in the > > Test Center Research Report. If you don't have time, > > here's a summary: Wireless network security -- at > > least for the 802.11 specification -- is not secure. > > That may sound harsh, but people smarter than I appear > > to have a pretty good handle on the details: Intel's > > Jesse Walker, the University of California at > > Berkeley's Nikita Borisov, and the University of > > Maryland at College Park's William Arbaugh, for starters. > > > > The designers of 802.11's security protocol, WEP (Wired > > Equivalent Privacy), appear to have been a bunch of > > network guys who thought they knew how to implement > > encryption. According to the above-mentioned heroes of > > networking, they made a dog's breakfast of it. True, > > the traffic is encrypted, and you can't just pluck it > > out of the air and read it; but it doesn't take very > > long to snag enough traffic for a data sample large > > enough to allow an attacker to crack the > > encryption.Unfortunately, WEP reuses keys way too > > frequently to provide anything more than casual > > security. It doesn't help that the RC4 stream cipher > > method used in 802.11 isn't a good fit for a wireless > > environment, or that WEP and its successor WEP2 are > > vulnerable to simple packet-forging attacks. > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > -- > Dr Pepper aka WB6GKI > in the High Desert of California. > Check out my shack LIVE at: > http://www1.iwvisp.com/DrPepper/ham/ham.htm > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3262 From: Gordon Mitchell Date: Thu Jun 28, 2001 3:09pm Subject: Re: 802.11 WIRELESS ENCRYPT SECURITY The encryption challenge for wireless systems is a couple layers down from application-based approaches like PGP. Most of the frames that are sent on 802.11 systems are not (and cannot be) encrypted. They have to do with beacons, association, and the like. When frames are encrypted, a portion still has to be visible, for example to indicate that the frame is encrypted, which MAC address it is aimed at,... PGP handles none of this. Certainly there are problems with the crypto implementation in 802.11. When access points are set up right (rolling initialization vectors, requiring crypto, not implementing authentication,...) the system is not bad for medium level security. Serious users of any system of this sort, including wired networks with RJ-45s in public areas, need to use encryption schemes like SSL or SSH to protect network traffic. There are some interesting ways to detect wireless network intrusion. Within the next few days I hope to complete and publish a paper on how to build a wireless honeypot that will detect someone cruising by and looking for wireless networks to sniff or associate with. Email me for a copy. Gordon Mitchell Future Focus, Inc Woodinville, WA Electronic eavesdropping detection & finding clues in computers. (888) BUG-KILR DrPepper wrote: > > I guess that I'm confused. Maybe others more experienced in encryption can > explain, , , , , , > > Why are people fooling with this type of encription when PGP is good enough > to fool even the NSA?? > > Ron C. > > ============================== > > Ed Naylor wrote: > > > Network protection commentary by: P.J. Connolly > > > > Posted at June 22, 2001 01:01 PM PST Pacific > > > > NOW THAT SUMMER is officially here, beach trips and > > picnics become feasible again. I'll tidy up a few > > loose ends here and then get some fresh air. > > > > First of all, if you haven't already done so, check out > > my take on the security of wireless networking in the > > Test Center Research Report. If you don't have time, > > here's a summary: Wireless network security -- at > > least for the 802.11 specification -- is not secure. > > That may sound harsh, but people smarter than I appear > > to have a pretty good handle on the details: Intel's > > Jesse Walker, the University of California at > > Berkeley's Nikita Borisov, and the University of > > Maryland at College Park's William Arbaugh, for starters. > > > > The designers of 802.11's security protocol, WEP (Wired > > Equivalent Privacy), appear to have been a bunch of > > network guys who thought they knew how to implement > > encryption. According to the above-mentioned heroes of > > networking, they made a dog's breakfast of it. True, > > the traffic is encrypted, and you can't just pluck it > > out of the air and read it; but it doesn't take very > > long to snag enough traffic for a data sample large > > enough to allow an attacker to crack the > > encryption.Unfortunately, WEP reuses keys way too > > frequently to provide anything more than casual > > security. It doesn't help that the RC4 stream cipher > > method used in 802.11 isn't a good fit for a wireless > > environment, or that WEP and its successor WEP2 are > > vulnerable to simple packet-forging attacks. > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > -- > Dr Pepper aka WB6GKI > in the High Desert of California. > Check out my shack LIVE at: > http://www1.iwvisp.com/DrPepper/ham/ham.htm > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ [Non-text portions of this message have been removed] 3263 From: Dragos Ruiu Date: Thu Jun 28, 2001 2:28pm Subject: Re: 802.11 WIRELESS ENCRYPT SECURITY AFAIK PGP is too compute intensive to be implemented in a real-time, on-the fly basis in an embedded device currently at the cost levels 802.11 is trying to hit. In trying to come up with a "lightweight" cryptosystem capable of being performed in an embedded processor, they went far too "light" on the weight. :-) And used bad cryptography to boot. 802.11 WEP can be decrypted like it wasn't there even using consumer HW (only some brands however). It will only stop casual eavesdroppers. Private it ain't. IMHO, despite all the key management issues it introduces, however, it is still a good idea to enable it to hinder the, now infamous, casual parking lot attacks. This form of hijiinks is becoming very popular amongst the "script kiddies". In addition, using real encryption like ssh and IPsec on wireless segments is *highly* recommended. cheers, --dr On Thu, 28 Jun 2001, DrPepper wrote: > I guess that I'm confused. Maybe others more experienced in encryption can > explain, , , , , , > > Why are people fooling with this type of encription when PGP is good enough > to fool even the NSA?? > > Ron C. > > Network protection commentary by: P.J. Connolly > > > > Posted at June 22, 2001 01:01 PM PST Pacific > > First of all, if you haven't already done so, check out > > my take on the security of wireless networking in the > > Test Center Research Report. If you don't have time, > > here's a summary: Wireless network security -- at > > least for the 802.11 specification -- is not secure. > > That may sound harsh, but people smarter than I appear > > to have a pretty good handle on the details: Intel's > > Jesse Walker, the University of California at > > Berkeley's Nikita Borisov, and the University of > > Maryland at College Park's William Arbaugh, for starters. -- Dragos Ruiu dursec.com ltd. / kyx.net - we're from the future gpg/pgp key on file at wwwkeys.pgp.net or at http://dursec.com/drkey.asc 3264 From: Kirk Sewell Date: Thu Jun 28, 2001 3:29pm Subject: Re: Wiretap Inquiry My question is how the bugger could order up a dialup line onto the target's spare pair? Why would the phone company allow that? It doesn't sound feasable. -- 3265 From: Charles P Date: Thu Jun 28, 2001 8:13pm Subject: Re: Wiretap Inquiry Kirk, The connection is not something you order through the phone company. It is done illegally (or surreptitiously by law enforcement). The eavesdropper makes a bridge tap onto the suspect line. That tap is then connected to a dialer that will be activated when the target line goes off hook. The dialer dials out on a separate, bugger-provided line (his own, or a borrowed one) to his remote listening post. The circuitry needs to bridge the audio from the target line to the eavesdropper's line. You would be looking for a typical hardwire tap onto the line in question. This scenario is one of many that could take place at the end of the tap. Rather than running a trace-able hardwire line to the eavesdropper's listening post, it would just go to a small box and another phone line --still traceable somewhat by checking the dtmf, who owns the 2nd line, etc, but the perpetrator could be anywhere in the world. Charles charles@t... Global Communications Tarrytown, NY www.telephonesecurity.com N2AXO ----- Original Message ----- From: "Kirk Sewell" To: ; Sent: Thursday, June 28, 2001 4:29 PM Subject: Re: [TSCM-L] Wiretap Inquiry > My question is how the bugger could order up a dialup line onto the target's spare pair? Why would the phone company allow that? It doesn't sound feasable. > -- > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3266 From: Dawn Star Date: Fri Jun 29, 2001 10:22am Subject: Compliments to Charles Charles, My compliments to you on this, I could not have said it better. I must say you are one of the sharpest and most knowledgeable people on the list, especially relating to telephone systems. Roger Tolces Date: Thu, 28 Jun 2001 21:13:37 -0400 From: "Charles P" Subject: Re: Wiretap Inquiry Kirk, The connection is not something you order through the phone company. It is done illegally (or surreptitiously by law enforcement). The eavesdropper makes a bridge tap onto the suspect line. That tap is then connected to a dialer that will be activated when the target line goes off hook. The dialer dials out on a separate, bugger-provided line (his own, or a borrowed one) to his remote listening post. The circuitry needs to bridge the audio from the target line to the eavesdropper's line. You would be looking for a typical hardwire tap onto the line in question. This scenario is one of many that could take place at the end of the tap. Rather than running a trace-able hardwire line to the eavesdropper's listening post, it would just go to a small box and another phone line --still traceable somewhat by checking the dtmf, who owns the 2nd line, etc, but the perpetrator could be anywhere in the world. Charles 3267 From: Mark Barrueta Date: Fri Jun 29, 2001 11:04am Subject: Bug Sweeper Equipment Wanted Looking for a Used Good condition CPM 700 Sweeper with all the accessories. Pls reply., ===== Mark Barrueta,VP The 911 Professionals, Inc U.S.A 626-258-0585(Corporate Office) Cell U.S.A 805-218-1929 Mexico(011-52-)3-615-2000 __________________________________________________ Do You Yahoo!? Get personalized email addresses from Yahoo! Mail http://personal.mail.yahoo.com/ 3268 From: James M. Atkinson, Comm-Eng Date: Fri Jun 29, 2001 2:10pm Subject: Re: Bug Sweeper Equipment Wanted At 9:04 AM -0700 6/29/01, Mark Barrueta wrote: >Looking for a Used Good condition CPM 700 Sweeper with >all the accessories. > >Pls reply., > > >===== >Mark Barrueta,VP >The 911 Professionals, Inc >U.S.A 626-258-0585(Corporate Office) >Cell U.S.A 805-218-1929 >Mexico(011-52-)3-615-2000 Mark, I have attached the prices for the equipment you mention along with relate equipment (this is for NEW equipment, not used). CPM-700 Counter Surveillance Probe and Monitor$ 2,195.00 IRP-700 Infrared Probe$ 159.00 MLP-700 Magnetic Leakage Probe$ 185.00 ALP-700 Acoustic Leakage Probe$ 99.00 MPA-700 Modular Phone Adapter$ 39.00 TRP-700 Tape Recorder Patch Cords$ 10.00 CLA-700 Cigarette Lighter Adapter$ 10.00 NCB-700 Rechargeable Nickel Cadmium Battery Pack$ 55.00 =========== Complete CPM-700 System$ 2,752.00 OSC-5000 OSCOR Omni Spectral Correlator Base System$ 14,000.00 ODP-5000 Deluxe System Package$ 2,600.00 System Includes: OVM-5000 Video Option - Multi-format Video OVP-5000 Video Patch Cord OAR-5000 Audio Recorder with Cable OTL-5000 Ultrasonic Triangulate and Locate Option MPA-5000 Modular Phone Adapter CLA-5000 Cigarette Lighter Adaptor LPE-5000 Locator Probe Extension Cable MIC-5000 Microphone (for remote monitoring) MPC-5000 Multi-Purpose Cable MDC-2100 Microwave Down Convertor (3 GHz to 21 GHz)$ 9,850.00 OIF-5000 IF Output for Panoramic Signal Monitor (10.7 MHz) $ 230.00 OPC-5000 Computer Software Interface and Database Utilities software package$ 2,950.00 =========== Complete OSC-5000 System$ 29,630.00 NJE-4000 ORION Non-linear Junction Detector$ 14,860.00 OTK-4000 Tool Kit for ORION NLJD$ 2,350.00 =========== Complete ORION System$ 17,210.00 ANG-2000 Acoustic Noise Generator$ 695.00 TRN-2000 Transducer (Speaker)$ 65.00 WMT-2000 Window Mount$ 4.00 OMS-2000 Omni Masking Speaker$ 99.00 PNG-2000 Portable Noise Generator$ 199.00 EAR-2000 Electro Acoustic Receiver$ 199.00 NGA-5000 Noise Generator and Amplifier$ 295.00 (for use with OSCOR PC DSP Software) Payment may be made by wire transfer, government check, company check, or bank/cashiers check, but shipment will not be made until the funds have completely cleared (our terms are strictly payment in advance). Of course the funds should be made payable in U.S. Dollars. Normally we ship the equipment after we receive confirmation from our bank of the wire transfer, or in the case of uncertified funds shipment is made once the funds have cleared. Additionally, we can offer the following TSCM equipment as well, however; the lead times for this equipment is longer. PSA-65C Analog Spectrum Analyzer$ 3,230.00 Additional Recommended Options: 10 kHz Resolution Bandwidth$ 325.00 Oscilloscope Interface Option$ 210.00 Sub-Carrier Detector$ 140.00 VDM-2 FM Video Demodulator/AM Module(s)$ 1,135.00 1.25 - 2.50 GHz Frequency Extender / Mixer$ 650.00 2.50 - 3.75 GHz Frequency Extender / Mixer$ 650.00 5.70 - 6.20 GHz Frequency Extender / Mixer$ 890.00 Carrying Case$ 105.00 Foam Carry Handle$ 7.50 ----- Digital Spectrum Analyzer$ from (3 Hz to 26.5 GHz, -153 dBm sensitivity ) $53,750.00 (150+ resolution bandwidths, 113 dB Dynamic Range) Biconical Antenna$ 1,080.00 (30-300 MHz, Un-calibrated) Log Periodic Antenna$ 2,280.00 (200-2000 MHz, Un-calibrated) Transient Limiter$ 610.00 (9 kHz - 200 MHz, Calibrated Mode) (<8 kHz - >400 MHz, Un-calibrated Mode) Active Rod Antenna$ 3,045.00 (30 Hz - 50 MHz, Calibrated) Active Loop Antenna$ 2,985.00 (1 KHz - 30 MHz, Calibrated) Omni Directional Discone Antenna$ 129.00 (28 - 1300 MHz, Un-calibrated) Wave Guide$ 3,590.00 (1 - 18 GHz, Calibrated, N-Type Connector) Antenna Tripod$ 835.00 (Non Metallic, Delrin and Linen Phenolic Composite) N-Type M-M Cable$ 190.00 (6 foot, Calibrated) N-Type M-M Cable$ 300.00 (25 foot, Calibrated) BNC Type F-F Cables$ 88.70 (10 each, 4 foot, Un-calibrated, for interconnects) BNC to N Adapter$ 12.50 ----- CEK-2000 Telecommunications Engineering Tool Kit$ 2,225.00 (includes a full set of Craft Tools) Includes full tool kit, plus the following craft items Harris Punch Tool Blade for 66M Blocks Blade for 110 Blocks Tone Generator Inductive Pickup Telephone Line Tester Electric Drill Drop Light with extended cord Cam Wrench with Stripper Soldering Iron TS-22 AL Linemans Handset (Datasafe) Series 80 Companion Kit Receptacle Tester Universal Adapter Kit (ITT) ----- Fluke 87 Digital Multi-Meter (DMM)$ 345.00 Fluke 89 Series IV True RMS Digital Multimeter$ 465.00 Fluke 199 Dual Channel, 200 MHz Hand Held Oscilloscope$ 2,985.00 ----- 1270A Dual Line Time Domain Reflectometer$ 3,495.00 (for Checking Telephone Lines) Additional Waveform Memory$ 295.00 Multilevel Waveform Filtering$ 195.00 Padded Carrying Case$ 195.00 2 Year Limited Extended Warranty$ 195.00 4200 Dual Line Time Domain Reflectometer$ 3,595.00 (for Checking Power Lines) Additional Waveform Memory$ 295.00 Multilevel Waveform Filtering$ 195.00 Padded Carrying Case$ 195.00 2 Year Limited Extended Warranty$ 195.00 1205TX High Power, Dual Line Time Domain Reflectometer$ 3,995.00 (for Checking Telephone Lines Though Loading coils) Additional Waveform Memory$ 295.00 Multilevel Waveform Filtering$ 195.00 Padded Carrying Case$ 195.00 2 Year Limited Extended Warranty$ 195.00 6000 Mutlifunction Phone Line Instrument$ 3,995.00 (Time Domain Reflectometer, Resistance Fault Detector, Multimeter, Insulation and Mega-ohm Tester, Pair Balance, and Noise Measurements) Additional Waveform Memory, 32$ 295.00 Multilevel TDR Waveform Filtering$ 195.00 2 Year Limited Extended Warranty$ 195.00 ----- 3200 CATV Time Domain Reflectometer (single line)$ 1595.00 3300 Phone Line Time Domain Reflectometer (single line)$ 1795.00 3400 Power Line Time Domain Reflectometer (single line)$ 2195.00 ----- We can also provide higher end TSCM gear, specialized cryptographic, COMSEC, satellite, and related equipment on request. James M. Atkinson -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 3269 From: James M. Atkinson, Comm-Eng Date: Fri Jun 29, 2001 3:01pm Subject: AOR AR5000 vs Icom R8500? This was forwarded to me by a list member who prefers to remain anonymous. -jma > >Have any list members had experience with the AR5000, or the AR5000 >vs the R8500? >The AR5000 appears to cover 10 Khz through 2600 MHz- nice for >carrier current and VLF >as well as 2.4 GHz monitoring. The Icom R8500 only covers 100 KHz - 2 GHz. >But with the above in mind, how do they compare? > >(Yes, neither are in the same arena as Watkins-Johnson, Harris RF, etc...) > >Thanks -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3270 From: James M. Atkinson, Comm-Eng Date: Fri Jun 29, 2001 5:02pm Subject: Dear Billy Joe Bob [Redneck Humor] I am not one to forward redneck jokes - but this is cute. Dear Billy Joe Bob, I'm writing this slow because I know you can't read fast. We don't live where we did when you left home. Your Pa read in the newspaper that most accidents happen within 20 minutes of your home, so we moved. I won't be able to send you the address because the last family that lived here took the house numbers when they moved so they wouldn't have to change their address. This place is really nice. I even has a washing machine. I'm not sure it works so well, though, Last week I put a load of clothes in and pulled the chain, we haven't seen it since. The weather isn't bad here. It only rained twice last week; the first time for three days and the second time for four days. About that coat you wanted me to send; your Uncle Bubba said it would be too heavy to send in the mail with the buttons on, so we cut them off and put them in the pockets. Bubba locked his keys in the car yesterday. We were really worried because it took him two hours to get me and your father out. Your sister had a baby this morning,but I haven't found out what it is yet so I don't know if you are an aunt or uncle. The baby looks just like your brother. Uncle Bobby Ray fell into a whiskey vat last week. Some men tried to pull him out but he fought them off and drowned. We had him cremated; he burned for three days. Three of your friends went off a bridge in a pickup truck. Butch was driving. He rolled down the window and swam to safety. Your other two friends were in the back, they drowned because they couldn't get the tailgate down. Your Favorite Aunt -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3271 From: Shawn Hughes Date: Fri Jun 29, 2001 4:45pm Subject: Re: Digest Number 634 Yup, There is a similar device that uses a cell phone for the dialout pair, but I forget who makes it. Also, if it were to be done illegally, it's not a great leap of logic to tie the unit into anybody elses pair at the first pedestal from the house. And, if the victim lives in an apartment building.......Katie, bar the door. Shawn Hughes "Technician in Transition" formerly, Head, Technical / Electronic Surveillance Unit, Knox County (TN) Sheriff's Office >Kirk, > >The connection is not something you order through the phone company. It is >done illegally (or surreptitiously by law enforcement). > >The eavesdropper makes a bridge tap onto the suspect line. That tap is then >connected to a dialer that will be activated when the target line goes off >hook. The dialer dials out on a separate, bugger-provided line (his own, or >a borrowed one) to his remote listening post. The circuitry needs to bridge >the audio from the target line to the eavesdropper's line. > >You would be looking for a typical hardwire tap onto the line in question. >This scenario is one of many that could take place at the end of the tap. >Rather than running a trace-able hardwire line to the eavesdropper's >listening post, it would just go to a small box and another phone >line --still traceable somewhat by checking the dtmf, who owns the 2nd line, >etc, but the perpetrator could be anywhere in the world. > > >Charles > > > >charles@t... >Global Communications >Tarrytown, NY >www.telephonesecurity.com >N2AXO > > > My question is how the bugger could order up a dialup line onto the >target's spare pair? Why would the phone company allow that? It doesn't >sound feasable. > > -- From: Jay Coote Date: Tue Jun 25, 2002 7:56pm Subject: Re: new interference source It's similar to the operation of an NLJD- the LED junctions being flooded with high-power RF and producing harmonics. And I've seen them in Los Angeles ---------- Subject: Devices that will jam police radios Some vendors at various electronic shows and mall kiosks are using a device to display those flashing cell antenna lights. The novelty item apparently attaches to a standard cell phone antenna and flashes whenever a radio wave is transmitted around it. The problem with the display is that it emits a signal that totally disrupts the operation of 800 MHz radios and cell phones using that band within a 100-foot radius. According to several sources, this item is quite the rage with the teenage populous. The display resembles a Motorola battery bank charger and can display up to 16 of the flashing antennas (No photo available). These devices are being smuggled into this country from China and are in violation of FCC rules and regulations (see the attached notice from the FCC). Any of the devices without a permanently affixed label stating, E2809Ccompliance to FCC Part 15 requirementsE2809D is in violation and can be seized and forfeited to the U.S. Government. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5704 From: Paolo Sfriso Date: Wed Jun 26, 2002 5:09am Subject: Thermal Imagery & TSCM Dear Colleagues. I am seriously considering the purchase of a Raytheon IR 250 Thermal Imager for TSCM use. First hand considerations on this technique and the suitability of the IR-250 would be greatly appreciated. Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 5705 From: Aimee Farr Date: Wed Jun 26, 2002 1:25pm Subject: RE: Re: er why us ? > Er, you already did that in a far-away place called Vietnam. If > you _still_ > have not learned that lesson, I will be over on the next plane with a > pea-shooter to 're-claim the lost colonies' <6 feet wide grin> Oddly enough, I just thinkin' that elsewhere... ;) FWD ==== History suggests that a false image as simple as thinking a group of people are "cowards," might cause analysts to ignore surprise attack indicators. Diplomats are surely excellent conduits for images, as are many open sources. Preconceptions/expectations resulting from a basic misunderstanding is often the problem with "surprises," rather than a misinterpretation of direct evidence, although it looks that way in 20/20. Any missing piece likely would have been assimilated into the existing false image, which can be amazingly absorbent to discrepant information. It often takes firsthand experience ("being bit") to break false images, so as to force the feedback for change. Sometimes, information alone is not a learning experience. If Sept. 11 had been prevented, history suggests it would not have forced the necessary impetus for change and self-examination, allowing another event to substitute for it. (Some countries lacked the common sense to use their swords correctly, so as to cut the horses out from under their cavalry.) Whatever the case, in the aftermath, everybody will talk about the signals that were missed, etc. (the what), rather than the faulty images, etc. (the why). What we learn from events is determined by our preconceptions -- how we saw the problem before -- which sets the solution-frame. Obviously, some of those pre-9/11 images were incorrect. So, some of those incorrect images will appear to have just been confirmed? The current debate looks like cognitive dissonance frames -- the preservation of central images and minimal change. Is the "construction site" on a fault line? Any false central images have to be allowed to crash, or at least be exposed. We should not confuse prevention with propping up a house of cards. When we do, assimilating information to false images seems to take on a macabre aspect. The discrepant information becomes traumatic events, horrific mistakes, dead bodies, and domestic unrest. And, the faulty image will absorb an endless amount of discrepant information. I think I hear the *klink!* of closing cognitive gates, with the lock of political stakes, and a garden path masquerading as a search for solutions. Also, an inability to distinguish "admitting a better idea," from admitting you were wrong, incompetent, or "cavalry." If we don't find a mechanism to challenge, identify, and correct faulty images, as well as build-in perceptual openness and fluidity, the only thing that will re-open the gate is the weight of the bodies piling up outside of it. Growing up, I always heard: "No, that would be Vietnam....." After 30+ years of trying to apply their lesson to everything else, when the chance FINALLY came, will history say congress missed it? Not just the question, but THEIR LESSON? We had an "attack," planes, the sky, missed signals, enemy from within....if Pearl Harbor is the "story," and they want to "connect the dots," the only thing they're going to connect is bodybags. Pearl Harbor -- was that a story about "connecting dots?" Vietnam -- a simple moral about sending men to fight a strange war in a strange place? Or, is that just the "what," and not the "why?" While everybody has detailed messages for congress, if I just had one chance, mine is quaint: "YOU'RE CONNECTING THE WRONG DOTS. THIS ISN'T PEARL HARBOR. THIS IS VIETNAM. IT'S CIVILIANS, IT'S HERE, AND IT'S 2002." If I had the opportunity to ask congress ONE question post Sept. 11: "WHAT WENT WRONG IN VIETNAM?" ("...WAS IT THE DOTS?") Probably the last thing a Vietnam Veteran would expect from someone of my generation, but there it is. 5706 From: George Shaw Date: Wed Jun 26, 2002 0:29pm Subject: Digital/GPS/Compass Binoculars? Does anyone have a good web site source for integral "digital" compass/GPS binoculars? George Shaw Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... 5707 From: david_johnrobinson Date: Wed Jun 26, 2002 4:14pm Subject: please disregard tonight posting Please disregard my posting this evening - finger trouble during a demonstration of the service the group offers. David R 5708 From: Fernando Martins Date: Thu Jun 27, 2002 1:28pm Subject: RE: Need Help Identifying Night Vision Equip I was today at Ademco (with .es staff) and asked about this scope ... Or it's too old or those guys are too new, no info about it. FM ª -----Original Message----- ª From: Fernando Martins [mailto:fernando.martins@e...] ª Sent: terÁa-feira, 11 de Junho de 2002 12:24 ª To: TSCM-L@yahoogroups.com ª Subject: RE: [TSCM-L] Need Help Identifying Night Vision Equip ª ª ª ª Javelin Systems now belong to Ademco Group ... Try ademco.com ª or ademcovideo.com As far as I know, Ademco don't have scopes ª now, but cameras for cctv systems that can be 0 lux if you want. ª ª At work I can try to search old Javelin CD's/catalogs to see ª if I can find any info about scopes... But don't bet ont ª that, and contact Ademco (it's a best hint) ª ª FM ª ª > -----Original Message----- ª > From: intricacy [mailto:yahoo_email@u...] ª > Sent: segunda-feira, 10 de Junho de 2002 19:10 ª > To: TSCM-L@yahoogroups.com ª > Subject: [TSCM-L] Need Help Identifying Night Vision Equip ª > ª > ª > I have a mystery question: can anyone identify the origin ª > of this scope? And ideally, provide technical details on it's ª > operation & manufacture? ª > ª > http://www.speakeasy.org/~daretruth/javelin.html ª > ª > Thanks, ª > ª > -Jason ª > verve @ NOsvens.SPAM.com ª ª ª ª ------------------------ Yahoo! Groups Sponsor ª ---------------------~--> Will You Find True Love? Will You ª Meet the One? Free Love Reading by phone! ª http://us.click.yahoo.com/Deo18C/zDLEAA/Ey.GAAª /kgFolB/TM ª ª ª -------------------------------------------------------------- ª -------~-> ª ª ======================================================== ª TSCM-L Technical Security Mailing List ª "In a multitude of counselors there is strength" ª ª To subscribe to the TSCM-L mailing list visit: ª http://www.yahoogroups.com/community/TSCM-L ª ª It is by caffeine alone I set my mind in motion. ª It is by the juice of Star Bucks that thoughts acquire ª speed, the hands acquire shaking, the shaking is a warning. ª It is by caffeine alone I set my mind in motion. ª =================================================== TSKS ª ª Your use of Yahoo! Groups is subject to ª http://docs.yahoo.com/info/terms/ ª ª ª 5709 From: Hawkspirit Date: Thu Jun 27, 2002 5:45pm Subject: Sweep I need someone in the vicinity of windsor, ontario to de-bug my apartment. the evidence would be used in a lawsuit so company must be reputable. could you contact me with any info that could help me find bugs. Any sweepers that could handle this, I will be on the road starting Friday morning so contact me by cell phone at: 760-409-1652 Roger Tolces Electronic Security Co. 5710 From: Hawkspirit Date: Thu Jun 27, 2002 6:04pm Subject: Sweep hello. im looking for information on finding out if my home and business line have been tapped by my daughters father. i live in the state of maine and id like to know if there is someone local that i can contact, if you don't service this far north. Here is another sweep request, contact me if you cans handle this sweep. Roger Tolces Electronic Security Co. 760-409-1652 5711 From: zack <10-33@c...> Date: Thu Jun 27, 2002 9:33am Subject: Question If someone installs a convert/surveillance camera ............. wireless or cable in an office....... and you able to access " the office " through drop ceilings and crawl ways, is there a particular type of cable or extension to the camera which you can look for ?? EX: Employee buys a surveillance camera to spy/get info on inside information...... visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." George W Bush God Bless The USA .. NEVER forget 9-11-01 http://www.copscops.com/blessusa.htm [Non-text portions of this message have been removed] 5712 From: kondrak Date: Thu Jun 27, 2002 5:10pm Subject: Warchalking? > >http://www.warchalking.org/ > >http://www.zdnet.co.uk/news/specials/ > >Warchalking: London Wi-Fi guerrillas take tips from hobos >14:48 Wednesday 26th June 2002 >Matt Loney > > >A new fad in London is taking the Internet community by storm: chalking >runes on pavements and walls to indicate the presence of a wireless >networking node >Seventy years ago, during the Depression in the US, hobos drew signs to >indicate to each other where they could get a meal. Now, across the Atlantic >in London, geeks are talking about using a similar system of chalk symbols >to signal where they can get a decent wireless Internet connection. > >Warchalking, as the practice has been coined by founder Matt Jones, entails >simply drawing a chalk symbol on a wall or pavement to indicate the presence >of a wireless networking node. If you see one of these symbols, you should >-- in theory at least -- be able to whip out your notebook computer equipped >with an 802.11 wireless networking card, and log on to the Net. > > > >The idea of organised wireless hot spots, where people can log on at cafes, >exhibition centres, airports and the like, is nothing new. BT has ambitious >plans to create a commercial network of at least 400 high-speed wireless hot >spots by next summer, and plans to have 20 up and running by August. > >BT's vision, which entails providing access only to subscribers of its >OpenZone service, required a change in the law to allow commercial use of >the 2.4GHz part of the radio spectrum without a Wireless Telegraphy Act >licence. > >But warchalking is remarkable because it is based on an ad hoc process of >people discovering Wi-Fi nodes -- whether commercial or not -- and >signalling their presence with chalk symbols. It is also remarkable for the >reception the idea has had. > >"I've been a bit overawed by everything to be honest," said Matt Jones, who >came up with the idea after seeing students of the UK Architectural >Association in what they called a "wireless Internet performance". The >students had chalked an office plan on the pavement of London's Bedford >Square, and sat out in the virtual office with laptop computers hooked up to >the Internet over a Wi-Fi connection. > >"I thought it seemed like a really nice idea," said Jones, who has an >architectural background himself. "I have only had a wireless networking >card for two months myself, and was interested in how it could change a >city." > >Several days later Jones was chatting to some friends, and someone mentioned >the symbols that hobos used to use. "These were all about making visible >what might otherwise go unnoticed," said Jones. After spending half an hour >in Adobe Illustrator, Jones set up a Weblog to publicise his idea, emailed >the address to a few friends, and waited. > >That was Sunday. By Tuesday, the popular Slashdot.org Weblog in the US had >picked up on the story and the flood of emails began, including ideas to >expand the basic set of three symbols to include the direction of the node. > >The first attempt at drawing up symbols resulted in three simple designs: >two semicircles back to back to indicate an open node, a circle to indicate >a closed node; and a circle with a W inside it to indicate a WEP node, which >will probably be inaccessible to the public because such nodes use >encryption for security. Each symbol has a Service Set Identifier (SSID) at >the top, which acts as a password to the node. SSIDs are easily obtained >using readily available sniffing software. > >"The idea of the warchalking blog was to put an imperfect idea out there and >see what happened," said Jones. "It has been interesting to see how it has >developed, but it has grown so fast it does not really feel like my idea >anymore. I feel more like the gardener than the builder." Nevertheless, >Jones hopes to finalise version one of the runes by the end of this week. > >The idea of the warchalk symbols, said Jones, is that they should give just >enough of a visual cue to indicate that it is worth firing up a notebook (or >PDA). Some suggestions have concentrated on touring the city with a notebook >and GPS to find wireless nodes, and then building an online database, but >according to Jones this misses the point: "Using chalk runes breaks the >cycle, because otherwise you would have to fire up your computer and log on >anyway to find where the nodes are." > >And the attraction of warchalking is its simplicity. Jones likens it to the >apocryphal tale of how NASA spent ten years and millions of pounds to make >ballpoints work in space, only to send its astronauts up with pencils. There >are other attractions of the chalk approach too. > >"Some people have asked why not use stickers or paint," said Jones. "But the >idea of chalk means that people have to go around and renew the symbols so >the network is constantly revalidating itself and checking its own >integrity. Also, using chalk won't piss too many people off." By using >chalk, warchalkers should be able to avoid the fate of IBM, which was >famously fined $100,000 (£70,000) for spray-painting its "Peace, Love and >Linux" ad campaign over the sidewalks of San Francisco last year. > >There have been reports of sysadmins expressing concern at the idea of >having their wireless networks probed and exposed for all to see, but >according to Jones there is a positive flipside to this. "If someone chalks >the fact that you're exposed and you're a sysadmin, you can see it. You know >you're exposed, and then you can decide what you want to do. I have already >had emails from some sysadmins who said they love the idea. Several even >said they will print the symbols on a card and put it in their office >windows." > >However, the idea does not appear to be universally popular. The organisers >of London-based community wireless project consume.net, for instance, do not >appear to overly impressed. "I am one of those people trying to seriously >encourage community networking and if that activity is seen to be some sort >of cracker plot it will be damaged," wrote one consume.net member on the >Slashdot Weblog. 5713 From: Matt Paulsen Date: Thu Jun 27, 2002 10:54pm Subject: RE: Warchalking? Klingon speakers.. meet Warchalkers.. Let the battle begin. -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: Thursday, June 27, 2002 3:11 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Warchalking? > >http://www.warchalking.org/ > >http://www.zdnet.co.uk/news/specials/ > >Warchalking: London Wi-Fi guerrillas take tips from hobos >14:48 Wednesday 26th June 2002 >Matt Loney > > >A new fad in London is taking the Internet community by storm: chalking >runes on pavements and walls to indicate the presence of a wireless >networking node >Seventy years ago, during the Depression in the US, hobos drew signs to >indicate to each other where they could get a meal. Now, across the Atlantic >in London, geeks are talking about using a similar system of chalk symbols >to signal where they can get a decent wireless Internet connection. > >Warchalking, as the practice has been coined by founder Matt Jones, entails >simply drawing a chalk symbol on a wall or pavement to indicate the presence >of a wireless networking node. If you see one of these symbols, you should >-- in theory at least -- be able to whip out your notebook computer equipped >with an 802.11 wireless networking card, and log on to the Net. > > > >The idea of organised wireless hot spots, where people can log on at cafes, >exhibition centres, airports and the like, is nothing new. BT has ambitious >plans to create a commercial network of at least 400 high-speed wireless hot >spots by next summer, and plans to have 20 up and running by August. > >BT's vision, which entails providing access only to subscribers of its >OpenZone service, required a change in the law to allow commercial use of >the 2.4GHz part of the radio spectrum without a Wireless Telegraphy Act >licence. > >But warchalking is remarkable because it is based on an ad hoc process of >people discovering Wi-Fi nodes -- whether commercial or not -- and >signalling their presence with chalk symbols. It is also remarkable for the >reception the idea has had. > >"I've been a bit overawed by everything to be honest," said Matt Jones, who >came up with the idea after seeing students of the UK Architectural >Association in what they called a "wireless Internet performance". The >students had chalked an office plan on the pavement of London's Bedford >Square, and sat out in the virtual office with laptop computers hooked up to >the Internet over a Wi-Fi connection. > >"I thought it seemed like a really nice idea," said Jones, who has an >architectural background himself. "I have only had a wireless networking >card for two months myself, and was interested in how it could change a >city." > >Several days later Jones was chatting to some friends, and someone mentioned >the symbols that hobos used to use. "These were all about making visible >what might otherwise go unnoticed," said Jones. After spending half an hour >in Adobe Illustrator, Jones set up a Weblog to publicise his idea, emailed >the address to a few friends, and waited. > >That was Sunday. By Tuesday, the popular Slashdot.org Weblog in the US had >picked up on the story and the flood of emails began, including ideas to >expand the basic set of three symbols to include the direction of the node. > >The first attempt at drawing up symbols resulted in three simple designs: >two semicircles back to back to indicate an open node, a circle to indicate >a closed node; and a circle with a W inside it to indicate a WEP node, which >will probably be inaccessible to the public because such nodes use >encryption for security. Each symbol has a Service Set Identifier (SSID) at >the top, which acts as a password to the node. SSIDs are easily obtained >using readily available sniffing software. > >"The idea of the warchalking blog was to put an imperfect idea out there and >see what happened," said Jones. "It has been interesting to see how it has >developed, but it has grown so fast it does not really feel like my idea >anymore. I feel more like the gardener than the builder." Nevertheless, >Jones hopes to finalise version one of the runes by the end of this week. > >The idea of the warchalk symbols, said Jones, is that they should give just >enough of a visual cue to indicate that it is worth firing up a notebook (or >PDA). Some suggestions have concentrated on touring the city with a notebook >and GPS to find wireless nodes, and then building an online database, but >according to Jones this misses the point: "Using chalk runes breaks the >cycle, because otherwise you would have to fire up your computer and log on >anyway to find where the nodes are." > >And the attraction of warchalking is its simplicity. Jones likens it to the >apocryphal tale of how NASA spent ten years and millions of pounds to make >ballpoints work in space, only to send its astronauts up with pencils. There >are other attractions of the chalk approach too. > >"Some people have asked why not use stickers or paint," said Jones. "But the >idea of chalk means that people have to go around and renew the symbols so >the network is constantly revalidating itself and checking its own >integrity. Also, using chalk won't piss too many people off." By using >chalk, warchalkers should be able to avoid the fate of IBM, which was >famously fined $100,000 (£70,000) for spray-painting its "Peace, Love and >Linux" ad campaign over the sidewalks of San Francisco last year. > >There have been reports of sysadmins expressing concern at the idea of >having their wireless networks probed and exposed for all to see, but >according to Jones there is a positive flipside to this. "If someone chalks >the fact that you're exposed and you're a sysadmin, you can see it. You know >you're exposed, and then you can decide what you want to do. I have already >had emails from some sysadmins who said they love the idea. Several even >said they will print the symbols on a card and put it in their office >windows." > >However, the idea does not appear to be universally popular. The organisers >of London-based community wireless project consume.net, for instance, do not >appear to overly impressed. "I am one of those people trying to seriously >encourage community networking and if that activity is seen to be some sort >of cracker plot it will be damaged," wrote one consume.net member on the >Slashdot Weblog. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5714 From: Michael Puchol Date: Fri Jun 28, 2002 4:03am Subject: Re: Digital/GPS/Compass Binoculars? Hi George, You'll probably find some nice equipment at http://www.steiner-binoculars.com/ They make ranging binoculars with high-precision compass systems built-in. I am not aware, however, of binoculars with integrated GPS receiver (it would be a real drag to hold up for some time !!). All the best, Mike ----- Original Message ----- From: "George Shaw" To: Sent: Wednesday, June 26, 2002 7:29 PM Subject: [TSCM-L] Digital/GPS/Compass Binoculars? > Does anyone have a good web site source for integral "digital" > compass/GPS binoculars? > > George Shaw > Mobile: +44 (0) 7740 361 163 > Email: george.shaw@u... > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5715 From: Kirk Adirim Date: Thu Jun 27, 2002 11:42pm Subject: RE: Question Zack, video signals can be sent over coax such as RG-174, RG-59, Ethernet cable, or driven down twisted pair (telephone or CAT5) by passive matching transformers or active amplifiers (to drive longer runs). In any event all wiring and cables must be checked for the presence of video or RF carrier(s) containing video, not to mention cameras that have been installed through an existing computer network which can be accessed by logging on to the companies network or even the internet. The long and the short of it is that there isn't a telltale type of cable/wire to look for. All possibilities must be examined. Hope this helps. Kirk, www.tactronix.com -----Original Message----- From: zack [mailto:10-33@c...] Sent: Thursday, June 27, 2002 7:34 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Question If someone installs a convert/surveillance camera ............. wireless or cable in an office....... and you able to access " the office " through drop ceilings and crawl ways, is there a particular type of cable or extension to the camera which you can look for ?? EX: Employee buys a surveillance camera to spy/get info on inside information...... visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." George W Bush God Bless The USA .. NEVER forget 9-11-01 http://www.copscops.com/blessusa.htm [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5716 From: A.Lizard Date: Fri Jun 28, 2002 1:23am Subject: possible new low-cost structure RF shielding This looks like it might turn out to be a low-cost solution to shielding a room or a building against RF leakage. I look forward to seeing the specs when the stuff is actually available for sale. A.Lizard http://news.bbc.co.uk/hi/english/sci/tech/newsid_2067000/2067672.stm Wednesday, 26 June, 2002, 18:07 GMT 19:07 UK Wooden solution to mobile chatter The mobile signals are blocked by tiny particles A team of Japanese engineers has come up with a way of blocking mobile phone signals using wood panels containing magnetic material. The panels would be useful in cinemas, theatres, or anywhere where ringing mobile phones cause exasperation. They work by sandwiching a layer of nickel- zinc ferrite between thin slices of wood, New Scientist magazine reports. The magnetic ferrite absorbs much of the energy of the radio signal, cutting the phone dead in most cases. --------------- rest at the URL ************************************************************************ new voicemail number,ask if you need it. Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@C... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 5717 From: Matthijs van der Wel Date: Fri Jun 28, 2002 3:52am Subject: Wooden solution to mobile chatter http://news.bbc.co.uk/hi/english/sci/tech/newsid_2067000/2067672.stm ---------- A team of Japanese engineers has come up with a way of blocking mobile phone signals using wood panels containing magnetic material. The panels would be useful in cinemas, theatres, or anywhere where ringing mobile phones cause exasperation. They work by sandwiching a layer of nickel-zinc ferrite between thin slices of wood, New Scientist magazine reports. The magnetic ferrite absorbs much of the energy of the radio signal, cutting the phone dead in most cases. Stopping power Hideo Oka and his colleagues at Iwata University in Morioka, Japan, tested the composite panels by placing them over antennae used to transmit radio signals at frequencies typical for GSM mobiles, Bluetooth and Wi-Fi computer networks. He chose wood as a natural material which could be used for furnishing. Tests showed a four-millimetre sandwich of wood and ferrite stopped 97% of the power of a test microwave signal. Mr Oka hopes the shielding panels will eventually be sold in hardware stores. They could be used to build doors, walls and rooms in which it would be impossible to carry out a mobile phone conversation. They might also be useful to shield wireless computer networks from each other. Mr Oka told New Scientist he wanted to make the panels cheaply and cut their cost even further by using recycled materials. In many public places in Japan - such as trains and cinemas - customers are asked to switch off their mobile phones or put them on silent tone. However, until now, there has been no way of enforcing silence. ---------- Yours sincerely, Matthijs van der Wel 5718 From: iDEN-i100 Date: Sat Jun 29, 2002 1:12pm Subject: Now you can visually track and listen to your target simultaneously with the 1st TDMA, CDMA, iDEN, AMPS SCANNOCULAR. Now you can visually track and listen to your target simultaneously with the 1st TDMA, CDMA, iDEN, AMPS SCANNOCULAR. This unit is only availabel to those with TSC (Top Secret Clearence) Don't ask any questions because you are not cleared to that level. http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=1362360292 - [Non-text portions of this message have been removed] 5719 From: Steve Uhrig Date: Sat Jun 29, 2002 2:18pm Subject: Re: 1st TDMA, CDMA, iDEN, AMPS SCANNOCULAR. On 29 Jun 2002 at 14:12, iDEN-i100 wrote: > Now you can visually track and listen to your target simultaneously > with the 1st TDMA, CDMA, iDEN, AMPS SCANNOCULAR. This unit is only > availabel to those with TSC (Top Secret Clearence) Don't ask any > questions because you are not cleared to that level. > http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=1362360292 - Marcel, I wish you wouldn't let the cat out of the bag on things like this until AFTER the ebay auction is over. Now you're sending a few hundred people over there to jump my bid. The last one went to over $30,000 and I had to drop out. Thanks a lot. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5720 From: iDEN-i100 Date: Sat Jun 29, 2002 2:36pm Subject: Re: Re: 1st TDMA, CDMA, iDEN, AMPS SCANNOCULAR. Sorry, I just thought everyone should be able to Bid on this Top Secrete technology. Steve Uhrig wrote: > On 29 Jun 2002 at 14:12, iDEN-i100 wrote: > > > Now you can visually track and listen to your target simultaneously > > with the 1st TDMA, CDMA, iDEN, AMPS SCANNOCULAR. This unit is only > > availabel to those with TSC (Top Secret Clearence) Don't ask any > > questions because you are not cleared to that level. > > http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=1362360292 - > > Marcel, I wish you wouldn't let the cat out of the bag on things like > this until AFTER the ebay auction is over. > > Now you're sending a few hundred people over there to jump my bid. > > The last one went to over $30,000 and I had to drop out. > > Thanks a lot. > > Steve > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 5721 From: Date: Sat Jun 29, 2002 10:45am Subject: Re: Re: 1st TDMA, CDMA, iDEN, AMPS SCANNOCULAR. you all need lives 5722 From: Shawn Hughes Date: Sat Jun 29, 2002 3:18pm Subject: Steve! ok, Steve, you're killing me. How bout anotehr hint, or the answer to Question #2. You've got me stumped. Shawn 5723 From: dp01011 Date: Sat Jun 29, 2002 5:44pm Subject: Tooth Phone? Hi. So on the local (Detroit) 2am Fox 2 News I caught the end of what sounded like an offer for the implantation of some type of phone setup in a tooth. They mentioned something about the vibration being passed from or through the molar to the cochlea of the ear for listening. Anyone else hear about this? Dean 5724 From: Matt Paulsen Date: Sun Jun 30, 2002 2:07pm Subject: RE: Tooth Phone? http://www.cnn.com/2002/TECH/ptech/06/19/britain.phone.reut/index.html -----Original Message----- From: dp01011 [mailto:dpatrick@a...] Sent: Saturday, June 29, 2002 3:44 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Tooth Phone? Hi. So on the local (Detroit) 2am Fox 2 News I caught the end of what sounded like an offer for the implantation of some type of phone setup in a tooth. They mentioned something about the vibration being passed from or through the molar to the cochlea of the ear for listening. Anyone else hear about this? Dean ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5725 From: David Alexander Date: Mon Jul 1, 2002 2:58am Subject: Re: 1st TDMA, CDMA, iDEN, AMPS SCANNOCULAR. >> Now you can visually track and listen to your target simultaneously >> with the 1st TDMA, CDMA, iDEN, AMPS SCANNOCULAR. This unit is only >> availabel to those with TSC (Top Secret Clearence) Don't ask any >> questions because you are not cleared to that level. >> http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem &item=1362360292 - > >Marcel, I wish you wouldn't let the cat out of the bag on things like >this until AFTER the ebay auction is over. > >Now you're sending a few hundred people over there to jump my bid. > >The last one went to over $30,000 and I had to drop out. > >Thanks a lot. > >Steve Steve Call yourself an electronics wizard...pah ! I built one of these gizmos for less than $600...and it had a BS filter on both the input and output channels ! Want to be the first franchisee for my breakthrough technology ? cheers _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 5726 From: Date: Sun Jun 30, 2002 11:37pm Subject: Re: Tooth Phone? Apparently infrasound has already been used to allow the deaf to hear, bypassing the eardrum and middle ear....see http://www.hearinginnovations.com/hisonic.html if this technology was able to be 'microsized' and combined with a micro radio receiver and implanted near the correct bone in the skull, could this explain some of the claims of the "aluminum foil beanie groups"?????? ************************************** This email is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient, you must not make any use of this information, copy or show it to any person. Any use, forwarding, printing or copying of this message is strictly prohibited. 5727 From: Date: Mon Jul 1, 2002 5:49pm Subject: Liddy Testifies in Defamation Case Liddy Testifies in Defamation Case By GRETCHEN PARKER .c The Associated Press BALTIMORE (AP) - Watergate conspirator G. Gordon Liddy on Monday testified that he was kept in the dark about the 1972 break-in he helped organize - even as he lay in wait that night with radio transmitters at the Watergate hotel. Liddy, who is being sued for $5 million for defamation, maintains he learned afterward that the 1972 burglary was not an attempt to tap phones and get evidence for President Nixon's re-election committee. Instead, Liddy alleges the operation was masterminded by Nixon White House counsel John Dean, in an effort to retrieve photographs and papers that could have tied Dean's future wife, Maureen Biner, to a high-class prostitution ring. Ida ``Maxie'' Wells, whom Liddy has said kept the photos in her desk and had a hand in running the ring, is suing Liddy claiming he harmed her reputation when making speeches promoting his prostitution theory. Last year, jurors deadlocked on Well's 1997 claim and a new trial was ordered. The Deans have denied Liddy's theory. On Thursday, Liddy testified that the break-in mysteriously turned from one of a skeleton crew quickly bugging the office to one with a full crew of burglars and a load of photographic equipment. The target of the tapping, as Liddy says he understood it, was the office of then-Democratic National Committee Chairman Lawrence O'Brien. ``The question in my mind always was, 'Why would anyone want to do that?' There's nothing to be gained by that,'' Liddy testified. But Liddy said he found out later O'Brien's office was never the target. Instead, burglars carried a key that fit a lock in Wells' desk, Liddy said. Liddy said he was convinced Dean was behind the burglary by Len Colodny, author of ``Silent Coup.'' After visiting Colodny for four days and reviewing paperwork, Liddy said he realized he had been out of the loop. When he saw a picture in Maureen Biner Dean's book that showed Wells as a bridesmaid, Liddy said he was convinced of the link between the Deans and the prostitutes. Liddy, 71, served more than four years in prison for his role in the break-in. Liddy said he blames himself for making the ``fatal mistake'' of not telling the burglars to check the sign-in log at the Watergate offices' front desk. The log would have told them, he said, that the cleaning crew had gone home and to be careful of rigging the DNC office door to stay open. A guard saw electrical tape over a door jamb, knew it wasn't the janitors and called police. The trial was expected to be turned over to a jury Wednesday. 07/01/02 22:12 EDT 5728 From: William Knowles Date: Tue Jul 2, 2002 4:05am Subject: The Technology Secrets of Cocaine Inc. http://www.business2.com/articles/mag/print/0,1643,41206,FF.html By: Paul Kaihla Issue: July 2002 Colombian cartels have spent billions of dollars to build one of the world's most sophisticated IT infrastructures. It's helping them smuggle more dope than ever before. On a rainy night eight years ago in the Colombian city of Cali, crack counter-narcotics troops swarmed over the first floor of a low-rise condominium complex in an upscale neighborhood. They found no drugs or guns. But what they did find sent shudders through law enforcement and intelligence circles around the world. The building was owned by a front man for Cali cocaine cartel leader JosÈ Santacruz Londono. Inside was a computer center, manned in shifts around the clock by four to six technicians. The central feature of the facility was a $1.5 million IBM AS400 mainframe, the kind once used by banks, networked with half a dozen terminals and monitors. The next day, Colombia's attorney general secretly granted permission for U.S. agents to fly the mainframe immediately back to the United States, where it was subjected to an exhaustive analysis by experts from the Drug Enforcement Administration and various intelligence agencies. The so-called Santacruz computer was never returned to Colombian authorities, and the DEA's report about it is highly classified. But Business 2.0 has ferreted out many of its details. They make it clear why the U.S. government wants the Santacruz case kept quiet. According to former and current DEA, military, and State Department officials, the cartel had assembled a database that contained both the office and residential telephone numbers of U.S. diplomats and agents based in Colombia, along with the entire call log for the phone company in Cali, which was leaked by employees of the utility. The mainframe was loaded with custom-written data-mining software. It cross-referenced the Cali phone exchange's traffic with the phone numbers of American personnel and Colombian intelligence and law enforcement officials. The computer was essentially conducting a perpetual internal mole-hunt of the cartel's organizational chart. "They could correlate phone numbers, personalities, locations -- any way you want to cut it," says the former director of a law enforcement agency. "Santacruz could see if any of his lieutenants were spilling the beans." They were. A top Colombian narcotics security adviser says the system fingered at least a dozen informants -- and that they were swiftly assassinated by the cartel. A high-level DEA official would go only this far: "It is very reasonable to assume that people were killed as a result of this capability. Potential sources of information were compromised by the system." The discovery of the Santacruz computer gave law enforcement officials a chilling glimpse into the cartels' rapidly evolving technological sophistication. But here's what is truly frightening: Since the discovery of the Santacruz system in 1994, the cartels' technological mastery has only grown. And it is enabling them to smuggle more dope than ever before. The drug lords have deployed advanced communications encryption technologies that, law enforcement officials concede, are all but unbreakable. They use the Web to camouflage the movement of dirty money. They track the radar sweeps of drug surveillance planes to map out gaps in coverage. They even use a fleet of submarines, mini-subs, and semisubmersibles to ferry drugs -- sometimes, ingeniously, to larger ships hauling cargoes of hazardous waste, in which the insulated bales of cocaine are stashed. "Those ships never get a close inspection, no matter what country you're in," says John Hensley, former head of enforcement for the U.S. Customs Service. Most of the cartels' technology is American-made; many of the experts who run it are American-trained. High-tech has become the drug lords' most effective counter-weapon in the war on drugs -- and is a major reason that cocaine shipments to the United States from Colombia hit an estimated 450 tons last year, almost twice the level of 1998, according to the Colombian navy. In a sense, the cartels are putting their own dark twist on the same productivity-enhancing strategies that other multinational businesses have seized on in the Internet age. Indeed, the $80 billion-a-year cocaine business poses some unique challenges: The supply chain is immense and global, competition is literally cutthroat, and regulatory pressure is intense. The traffickers have the advantages of unlimited funds and no scruples, and they've invested billions of dollars to create a technological infrastructure that would be the envy of any Fortune 500 company -- and of the law enforcement officials charged with going after the drug barons. "I spent this morning working on the budget," the head of DEA intelligence, Steve Casteel, said recently. "Do you think they have to worry about that? If they want it, they buy it." That's an especially troubling thought just now, as the Bush administration pressures Congress to expand the $1.3 billion anti-narcotics plan for Colombia and to allow the U.S. military to take a more forceful role in the savage fighting between Colombia's left-wing rebels, right-wing paramilitary units, and the drug-trafficker allies of both. Archangel Henao is the man whom authorities credit with much of the drug runners' recent technological progress. According to Colombian and U.S. narcotics officials, Henao heads the North Valley Cartel, the largest and most feared criminal organization to emerge from the chaos that gripped Colombia's underworld after the old MedellÌn and Cali cartels were broken up in the 1990s by the country's military -- with extensive U.S. help. Officials say that Henao, a heavyset 47-year-old born with a withered left arm, controls Buenaventura, the principal port on a stretch of the Pacific coast that is the launching point for most of the cocaine and heroin smuggled into North America from Colombia. His North Valley Cartel foot soldiers are known for dismembering the bodies of their enemies with chain saws and dumping them into the Cauca River. The U.S. Treasury Department has banned Henao from doing business with U.S. companies because he is a "drug kingpin," and the DEA publicly calls him one of Colombia's biggest traffickers. He has never been convicted of a drug-related offense, although a DEA official says the agency is "trying to build an indictment" against him. Henao's cartel is a champion of decentralization, outsourcing, and pooled risk, along with technological innovations to enhance the secrecy of it all. For instance, to scrub his profits, he and fellow money launderers use a private, password-protected website that daily updates an inventory of U.S. currency available from cartel distributors across North America, says a veteran Treasury Department investigator. Kind of like a business-to-business exchange, the site allows black-market money brokers to bid on the dirty dollars, which cartel financial chiefs want to convert to Colombian pesos to use for their operations at home. "A trafficker can bid on different rates -- 'I'll sell $1 million in cash in Miami,'" says the agent. "And he'll take the equivalent of $800,000 in pesos for it in Colombia." The investigator estimates the online bazaar's annual turnover at as much as $3 billion. Henao and other cartel leaders recruit IT talent from many sources, intelligence officials say. The traffickers lure some specialists from legitimate local businesses, offering scads of cash. They also contract with Israeli, U.S., and other mercenaries who are former electronic warfare experts from military special ops units. Cartel leaders have sent members of their own families to top U.S. engineering and aeronautical schools; when the kids come home, some serve as trusted heads of technical operations. Most of the high-end gear the cartels deploy comes from household-name multinational companies, many of them American; typically, front companies purchase equipment from sales offices in Colombia or through a series of intermediaries operating in the United States. The talent and tools are among the best that money can buy, and it shows. For instance, Henao's communications have become so advanced that they have never been intercepted, Colombian intelligence sources say. The last clear view inside the organization's technical operations was provided in 1998, when a small army of Colombian police arrested Henao's top IT consultant, Nelson Urrego. That bust soon led to the discovery of an elaborate communications network that allowed Urrego to coordinate fleets of North Valley Cartel planes and ships that were smuggling 10 to 15 tons of cocaine each month. The network's command center was hidden in a Bogot· warehouse outfitted with a retractable German-made Rhode & Schwarz transmission antenna about 40 feet high, and 15 to 20 computers networked with servers and a small mainframe. The same kind of state-of-the-art setup existed in communications centers at Urrego's ranch in MedellÌn, at an island resort he owned, and at a hideout in Cali. Seized invoices and letters show that Urrego or his associates had recently bought roughly $100,000 worth of Motorola (MOT) gear: 12 base stations, 16 mobile stations installed in trucks and cars, 50 radio phones, and eight repeaters, which boost radio signals over long distances. The range of Urrego's network extended across the Caribbean and the upper half of South America. He and his operatives used it to send text messages to laptops in dozens of planes and boats to inform their pilots when it was safe to go, and to receive confirmations of when loads were dropped and retrieved. According to one intelligence official who analyzed Urrego's network, it was transmitting 1,000 messages a day -- and not one of them was intercepted, even by U.S. spy planes. When Urrego typed a message into his computer, it created a digital bit-stream that was then encrypted and fed through a converter that parceled the data out at high frequencies. Digital communications over a radio network can be put into a code much more easily than voice transmissions, and thus are far tougher to intercept and decipher. "There's going to be a delay in sending and receiving messages," says a surveillance expert who does code-breaking work for the DEA and CIA, "but it's going to be fairly friggin' secure." The cartel's fleets still had to dodge surveillance aircraft like the dozen or so P3 Orions that U.S. Customs flies over Colombia. But by bribing officials and drawing on an elaborate counterintelligence database maintained by the cartels, Urrego learned the operations schedule of the planes. According to a former narcotics operative in the U.S. Army's Southern Command, cartel pilots routinely map the radar coverage of U.S. spy planes by putting FuzzBuster radar detectors in their drug plane cockpits and logging the hits. "They'd use every piece of data to build a picture, just like a jigsaw puzzle," the retired officer explains. "A piece of data could be 'One of our airplanes was flying on this azimuth at this altitude, and his FuzzBuster went off,' which means he was being painted by the radar. So they put that piece of data in the computer. Then another airplane was flying on that azimuth at that altitude, and his FuzzBuster did not go off. As they put that data together, they'd build a picture of the radar signature." Law enforcement officials believe that much of Urrego's system has simply been reconstituted -- with upgrades based on the latest advances in communications and encryption gear. A lanky man with deep bags under his eyes sits in a cinder-block office within a heavily fortified army base. He may have the most dangerous job in Colombia. He is a top special operations commander, and he probably knows more about the drug cartels' technological prowess than anyone on the outside. He rarely gives interviews, but late one Saturday night, he agrees to discuss one of his special areas of expertise: Archangel Henao. Lately, the commander says, he has been studying how Henao's cartel uses technology for what amounts to corporate espionage and competitive advantage against business rivals. The North Valley Cartel has waged a war against other smuggling groups over a variety of issues, including control of the port of Buenaventura. The commander recites a litany of recent assassinations and bombings. In February 2001, for instance, North Valley Cartel operatives commandeered a Bell helicopter used by the government in coca fumigation programs and pressed it into service in an attempted assassination of a rival trafficker. The rival was in jail in Cali at the time, so the hit men flew over the prison and dropped a homemade bomb containing 440 pounds of TNT. The detonator failed, but had the bomb gone off, it would have killed more than 3,000 people, the commander estimates. Within a month of that attack, the intended victim's organization retaliated with a flurry of hits -- among them, a submachine-gun ambush of four North Valley Cartel figures in a Cali hospital cafeteria. (In February, Henao's brother-in-law, a top North Valley Cartel capo, was poisoned to death in a maximum-security prison.) Many of the targets in the power struggle, the commander says, were located by signals intelligence -- things like pager and e-mail intercepts, transmitters planted on vehicles, or bugs hidden in homes and offices. "This is a technological war," he says. Actually, it has been for a long time -- as the mysterious story of the Santacruz computer suggests. According to Carlos Alfonso Vel·squez Romero, a now-retired colonel who commanded the elite unit that discovered the computer, one of the principal IT gurus behind the system was Jorge Salcedo Cabrera, a former army intelligence operative and electrical engineer who crossed over to the underworld. The Santacruz computer wasn't his first big technological splash. When the Colombian government launched the unit that Vel·squez would later head, it established a toll-free tip line for information about Cali Cartel leaders. The traffickers tapped the line, with deadly consequences. "All of these anonymous callers were immediately identified, and they were killed," a former high-ranking DEA official says. Henao's cartel built on this and other prior technology initiatives, in part by creating what amounts to a narco research and development program. One early fruit of that effort, intelligence officials say, was an advanced version of a cheap boat called a semisubmersible. Shaped like the Civil War-era Monitor, the small craft cruises below the waterline, except for a conning tower where one of its two-man crew pilots the boat. The vessel has underwater propulsion, radar, and short-band radio towers. And it's virtually invisible to even the most sophisticated spy gear. "You basically need a visual sighting to detect one, because you're not going to pick them up in a radar sweep," says Hensley, the former U.S. Customs enforcement chief. Semisubmersibles, however, are unstable, and narcotics officials think the cartels have lost several at sea -- one reason that the traffickers upgraded to submarines. According to the head of the Colombian navy, Adm. Mauricio Soto, the North Valley Cartel and other organizations have used real subs for years. Authorities believe that the Cali Cartel purchased a Soviet sub in the early '90s, and that its crew accidentally sank it off Colombia's Pacific coast during its first smuggling run, probably because they lacked the 10 skilled people needed to operate it. More recently, the cartels have built their own subs, with help, Soto suspects, from Italian engineers who stayed in Colombia after overseeing the construction of the navy's own fleet of commando submarines two decades ago. Henao, for instance, is believed by military and intelligence officials to have a small fleet of mini-subs -- used for, among other things, hauling dope to those toxic waste freighters. So far, Colombian authorities have found only two drug subs, both of which were under construction. The most recent one, discovered 21 months ago outside Bogot·, was a 78-foot craft that cost an estimated $10 million. Intelligence sources say it belonged to Henao's North Valley Cartel. A Colombian official says Henao wanted a vessel that could carry several more tons than the Buenaventura mini-subs and travel as far as 2,000 miles -- say, to the coast of Mexico or Southern California. Arrayed against this formidable technological arsenal is, well, not much. The commander of the narcotics agents in the Buenaventura area is a world-weary man who rarely ventures outside his military compound not far from town. He never goes into Buenaventura itself. Traffickers have put a price of 35 million pesos (about $17,000) on his head. "Life is cheap here," he mutters. He displays boxes and boxes of seized high-tech gear. Even personnel at the bottom of the cartel food chain have Israeli night-vision goggles, ICOM radio frequency scanners, and Magellan GPS handhelds. The commander says an informant told him about mini-subs off Buenaventura months ago. But neither he nor his men have ever seen one. His outfit doesn't have the equipment to detect underwater craft. Nor does the commander know many details about the Santacruz computer bust that first alerted officials to how technologically advanced his adversaries had become. He is unaware, for instance, of one of the biggest reasons U.S. officials want details of the system and the murders of U.S. intelligence sources it triggered kept top secret. Jorge Salcedo Cabrera, the main IT whiz who set up the Santacruz computer, eventually became an informant against cartel bosses. The DEA declined to comment on Salcedo. But according to several intelligence officials, he is now living in America at taxpayer expense, under the witness protection program. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 5729 From: Kirk Adirim Date: Mon Jul 1, 2002 8:08pm Subject: RE: Re: 1st TDMA, CDMA, iDEN, AMPS SCANNOCULAR. This is NOT a good value as it doesn't cover GSM, Inmarsat, or Iridium. However I must confess that I bought a pair for listening to and observing solar flares and sunspots, however you must squint your eyes just right when using the binocular portion. Another Bright idea from Kirk at www.tactronix.com -----Original Message----- From: David Alexander [mailto:david.alexander@b...] Sent: Monday, July 01, 2002 12:59 AM To: 'TSCM submissions' Subject: [TSCM-L] Re: 1st TDMA, CDMA, iDEN, AMPS SCANNOCULAR. >> Now you can visually track and listen to your target simultaneously >> with the 1st TDMA, CDMA, iDEN, AMPS SCANNOCULAR. This unit is only >> availabel to those with TSC (Top Secret Clearence) Don't ask any >> questions because you are not cleared to that level. >> http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem &item=1362360292 - > >Marcel, I wish you wouldn't let the cat out of the bag on things like >this until AFTER the ebay auction is over. > >Now you're sending a few hundred people over there to jump my bid. > >The last one went to over $30,000 and I had to drop out. > >Thanks a lot. > >Steve Steve Call yourself an electronics wizard...pah ! I built one of these gizmos for less than $600...and it had a BS filter on both the input and output channels ! Want to be the first franchisee for my breakthrough technology ? cheers _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5730 From: iDEN-i100 Date: Tue Jul 2, 2002 11:21am Subject: Re: Re: 1st TDMA, CDMA, iDEN, AMPS SCANNOCULAR. There is a $9.95 add on module that does GSM, Inmarsat, Iridium and Astro. There is a UV filter for $5.95 that takes care of the squinting, you can even look directly at a Solar Eclipse. Kirk Adirim wrote: > This is NOT a good value as it doesn't cover GSM, Inmarsat, or Iridium. > However I must confess that I bought a pair for listening to and observing > solar flares and sunspots, however you must squint your eyes just right when > using the binocular portion. > Another Bright idea from Kirk at www.tactronix.com > > -----Original Message----- > From: David Alexander [mailto:david.alexander@b...] > Sent: Monday, July 01, 2002 12:59 AM > To: 'TSCM submissions' > Subject: [TSCM-L] Re: 1st TDMA, CDMA, iDEN, AMPS SCANNOCULAR. > > >> Now you can visually track and listen to your target simultaneously > >> with the 1st TDMA, CDMA, iDEN, AMPS SCANNOCULAR. This unit is only > >> availabel to those with TSC (Top Secret Clearence) Don't ask any > >> questions because you are not cleared to that level. > >> http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem > > &item=1362360292 - > > > >Marcel, I wish you wouldn't let the cat out of the bag on things like > >this until AFTER the ebay auction is over. > > > >Now you're sending a few hundred people over there to jump my bid. > > > >The last one went to over $30,000 and I had to drop out. > > > >Thanks a lot. > > > >Steve > > Steve > > Call yourself an electronics wizard...pah ! > > I built one of these gizmos for less than $600...and it had a BS filter on > both the input and output channels ! > > Want to be the first franchisee for my breakthrough technology ? > > cheers > > _______________________________ > David Alexander M.INSTIS > Global Infrastructure Director > Bookham Technology plc > Tel: +44 (0) 1327 356264 > Mobile: +44 (0) 7799 881284 > Fax: +44 (0) 1327 356775 > http://www.bookham.com > > ======================================================================= > This e-mail is intended for the person it is addressed to only. The > information contained in it may be confidential and/or protected by > law. If you are not the intended recipient of this message, you must > not make any use of this information, or copy or show it to any > person. Please contact us immediately to tell us that you have > received this e-mail, and return the original to us. Any use, > forwarding, printing or copying of this message is strictly prohibited. > > No part of this message can be considered a request for goods or > services. > ======================================================================= > Any questions about Bookham's E-Mail service should be directed to > postmaster@b.... > > [Non-text portions of this message have been removed] > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 5731 From: Matt Paulsen Date: Tue Jul 2, 2002 11:57am Subject: Mafia boss jailed in FBI keyboard bugging case http://www.theregister.co.uk/content/55/25971.html By John Leyden Posted: 01/07/2002 at 11:59 GMT A New Jersey federal court has sentenced Nicodemo Scarfo to 33 months in prison at the end of a case that tested the legality of law enforcement surveillance techniques. Government agents placed a keystroke-logging device on Scarfo's computer and a key point in the case was reached when US District Court Judge Joel Pisano ruled in December that evidence from the device was admissible. Two months later Scarfo, the son of the jailed former boss of the Philadelphia mob, changed his plea and admitted his role in an illegal gambling operation. FBI investigators entered Scarfo's office in January 1999, but were initially foiled by his use of PGP to protect documents they believed would provide evidence of his crimes. They returned after obtaining a search warrant that allowed them to place a keyboard-logging device on his PC, enabling them to obtain his password. Scarfo used to work for a Florida software firm and is considered something of a geek in Wise Guy circles. Defence lawyers unsuccessfully argued that the authorities needed to obtain a wiretap warrant - which is more difficult to obtain than a search warrant - prior to planting the device. Æ Thanks, Matt Paulsen Orange Networks LLC - Computers, Networks, Internet and Security http://www.orange-networks.com 503.533.4767 5732 From: Guy Urbina Date: Wed Jul 3, 2002 11:39am Subject: antenna help......... Hi all, I've been contracted to design and develop a proof of concept prototype GPS alarm for motorcycles. My current design uses microburst AMPS transceivers for the data packets, therefore I am looking for a miniature, covert AMPS cell antenna that can meet my needs. I've searched around on the net and did not find anything I liked. Ideally, I would like something that is extremely small and can still have omni-directional characteristics with nominal or unity gain. I was hoping some of you Title III designers can help me out and point out some sources........preferably COTS, but I am willing to fabricate one myself given proper plans and instructions. Best regards, -Guy Urbina From: James M. Atkinson, Comm-Eng Date: Wed Jun 28, 2000 9:15am Subject: Chinese 'spy tower' put on hold Wednesday, 28 June, 2000, 07:26 GMT 08:26 UK Chinese 'spy tower' put on hold http://news.bbc.co.uk/hi/english/world/asia-pacific/newsid_809000/809365.stm Xinhua is accused of planning a "spy tower" near Pentagon The United States has stopped China's Xinhua news agency from moving employees into a building it bought near the Pentagon. The move came after furious Republican congressmen accused the Chinese of using the purchase to erect a "spy-tower." US State Department spokesman Philip Reeker said Xinhua had infringed the 1982 Foreign Missions Act which requires China to give notice of its intention to buy real estate. Under the rules, Xinhua is being put on notice not to move into the apartment block during a 60-day review of the purchase. Mr Reeker said the State Department on Monday received a copy of a letter from the Chinese embassy, dated 22 May, saying Xinhua planned to buy the building. The State Department insists that no such letter was received in May, even though China is adamant one was sent by the embassy. Strategic location "The State Department now has 60 days from the date of receipt of the letter, in this case 26 June, in which to review a request for purchase," Mr Reeker said. The Pentagon is expected to make a recommendation to the State Department on the matter during the period. Meanwhile, US lawmakers launched a new attack on Xinhua, accusing it of erecting a "spy-tower" overlooking the Pentagon. "The name of the complex, Pentagon Ridge Apartments, vividly describes its strategic location," said Republican congressman David Vitter in a statement. The block could become a "spy tower, ideally suited to capturing our military secrets," he added. Chinese denial China has reiterated that the official agency was not caught up in a spying operation. It called on the Washington Times newspaper, which broke news of the sale last week, to disown experts it quoted as saying the building was a potential nest of spies. "The purchase is a purely commercial activity," said foreign ministry spokesman Zhu Bangzao. The agency says it bought the building to provide a new office and living quarters for 14 Xinhua staff based in Washington, as the current 1950s-era building is dilapidated. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 693 From: James M. Atkinson, Comm-Eng Date: Wed Jun 28, 2000 9:33am Subject: Wanted to Buy If anybody has any Xetron SPL-60, Dektor u-Amp, Hughes Ferret, Lockheed CSA, or related gear they are interested in selling I could be interested in both working or non-working units. I am also interested in purchasing lab grade RF and/or audio filters which include the use of an internal comb generator, specifically ones in the ELF/VLF range, and ones which utilize a "swept comb" in the broadcast FM bands. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 694 From: James M. Atkinson, Comm-Eng Date: Wed Jun 28, 2000 9:56am Subject: Re: Schematics Needed for Projects At 11:14 PM -0400 6/25/00, Jay Coote wrote: >I am trying to find schematics for the following so that I can build >these myself - can someone email me some scans or JPGs of these? > >1.Tone sweeper, four separate sweeping tones, voiceband, 0dBM >level output... to go in a telephone breakout box. I would encourage you to design your own based around the TLC555 timer circuit using timing caps (it's a good exercise) >2.Subcarrier receiver for use with R-71, R-8500 or AOR AR5000. >Tunable for all SC freqs >and connects to receiver. Also usable direct on mains/tel >lines for CC detection. I would encourage you to use a Kaiser SCD-5 (great products, good people), or if you prefer build one of the Ramsey (boo-hiss, under indictment) sub-carrier receivers. Personally I prefer to use the Kaiser units, and have added a few of my own minor modifications. >3.Block convertors. 2-4 Ghz in = 0-2 GHz out, also 4-6 Ghz >in = 0-2 Ghz out. To be used >with 0-2 GHz multimode comms receiver. Trust me... you do not want to downconvert to 0-2 GHz... Something like downconverting a 1 GHz block down to 500 MHz to 1.5 GHz is more reasonable. I wish that more countermeasures products provided access to their internal "tune voltages", and IF loops (it is a 20 dollar modification to most equipment). This way the customers could use the external mixers, waveguides, and preamplifiers that they are already using with their spectrum analyzers. >Thanks, >Jay Coote =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 695 From: Ted Swift Date: Wed Jun 28, 2000 6:20am Subject: Re: Wanted to Buy Any interest in a Rangelock Model 3801, a transmitter locator made by TSA (Glenn Whidden)? Price $295 plus shipping. It's old but Glenn checked it out last year and it seems to work fine. Ted Swift ACM Research Service At 10:33 AM 6/28/2000 -0400, you wrote: >If anybody has any Xetron SPL-60, Dektor u-Amp, Hughes Ferret, >Lockheed CSA, or related gear they are interested in selling I could >be interested in both working or non-working units. > >I am also interested in purchasing lab grade RF and/or audio filters >which include the use of an internal comb generator, specifically >ones in the ELF/VLF range, and ones which utilize a "swept comb" in >the broadcast FM bands. > >-jma > > =================================================================== > Everybody's into computers... Who's into yours?Å > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > "...any sufficiently advanced technology is > indistinguishable from magic." - Arthur C. Clarke > =================================================================== > >------------------------------------------------------------------------ >IT Professionals: Match your unique skills with the best IT projects at >http://click.egroups.com/1/3381/1/_/507420/_/962203322/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > 696 From: Steve Uhrig Date: Wed Jun 28, 2000 11:01am Subject: TSCM equipment for sale Hello list, For sale is an ISA DAR-3 (http://www.isa-tscm.com/Products/dar-3&4.htm) Discriminated Audio Receiver. This is a high end wideband RF (transmitter) detector. This model will detect nearly any RF source from 50 kc up to 12 gigs regardless of modulation, including spread spectrum and digital transmitters. Unit is in like new condition and includes foam fitted executive hard carrying case with combination lock, gelcell battery (replacement cost $17), 110/220 charger, handheld whip antenna with cable for up close and personal sweeping, ISA-manufactured rugged handheld pistol grip microwave log periodic antenna (looks like something from Star Trek) for high frequency work, very decent headphones, shoulder strap, power line subcarrier adapter and illustrated instruction manual. Accessories are in a separate carrying case although you can fit everything except the microwave LPA inside the main case if you need to keep your bag count down. This piece is currently manufactured by ISA and is one of the few RF detectors able to sweep well up into the microwave region. The highest frequency RF source I have an oscillator at 10.525 gigs, and the unit alarms on it in the same room. Remember these frequencies are highly directional, however, hence the pistol grip microwave antenna. In addition to manual sweeping, the unit was designed for in place monitoring to secure an area during meetings or whatever. You sweep the area, set the DAR-3 to the background RF level, and any new RF introduced will sound a silent or audible alarm. The alarm can be remote controlled to sound the alarm at a remote listening post, via a front panel connector. The DAR-3 also includes a sound source which can be activated once you think you have discovered a transmitter. If the sound comes back to you via the signal transmitted by the covert transmitter, you have a positive indication of a problem. This avoids anxiety from apparent signals emanating from file cabinets, venetian blinds, etc, in RF saturated areas. In testing, it identified an off hook 900 meg cordless phone in a closed desk drawer in seconds. You also can check power lines for RF subcarriers using the included adapter. This is a vulnerable area often ignored by sweepers and taken advantage of by buggers. The DAR-3 is easy to use and can serve as your primary RF sweep piece. You also can use it to add microwave capability to your existing kit. A secondary use is to monitor the area for nearby voice transmissions. With it sitting on a shelf, you will know of any two way or cellular transmissions in the area. This can let you know of any other activity in the area, friendly or hostile. Readers of this list may have the unit for $2500 plus shipping, and I can take credit cards for payment. This is a small fraction of the new price, and this unit is in nearly new condition. Price will be higher on my used equipment page. The last DAR I had sold for this price in one day, and it wasn't the microwave version nor in this same condition. Also available: ISA nonlinear junction detector, handheld X-ray machine, Riser Bond TDR. Call to order or if questions. I buy and sell used surveillance and countersurveillance equipment. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 697 From: Jay Coote Date: Wed Jun 28, 2000 0:21pm Subject: Re: Schematics Needed for Projects Mike; Thanks for the IF information. I've heard of DownEast Microwave and finally have their catalog. (There are one or two Ham projects in there I'd like to try) I will give DEMI a call and see if they can make the downconvertor. They faxed me back info on an RF preamp for receiver or analyzer and the price was right.... 3 GHz! Jay (AKA W6CJ) ---------- > Jay, > > I too would be interested in some of these, mainly the downconverters. > Comments: > Take a look at www.downeastmicrowave.com > They make great stuff, I ordered a 1540MHz preamp and they sent it within a > week. > It works really well, and can be externally powered from 12V dc. > > > 2.Subcarrier receiver for use with R-71, R-8500 or AOR > > AR5000. Tunable for all SC freqs > > and connects to receiver. Also usable direct on mains/tel > > lines for CC detection. > > You could use another scanner (AFAIK) to tune in the 10.7MHz IF out segment > from the AR5000. > > Cheers, > > Mike > > > > ------------------------------------------------------------------------ > e-Business Quality Management- Your Site's Success Depends on It. > Register today for an eye opening experience. > http://click.egroups.com/1/5934/1/_/507420/_/962162577/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 698 From: James M. Atkinson, Comm-Eng Date: Wed Jun 28, 2000 2:47pm Subject: Re: Chinese 'spy tower' put on hold At 11:36 AM -0700 6/28/00, Ed Naylor wrote: >James, > >Do you "look for" or advise your clients concerning laser microphone threats? > >Ed > >======================== >At 10:15 AM 6/28/00 -0400, you wrote: >>Wednesday, 28 June, 2000, >> >>07:26 GMT 08:26 UK >> >>Chinese 'spy tower' put on hold Actually I recommend that all conducted and/or radiated emissions present in or around the client facility is carefully analyzed. This of course includes any kind of visible or invisible light signals, and any kind of an illuminating signal, etc.. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 699 From: Steve Uhrig Date: Wed Jun 28, 2000 2:27pm Subject: DAR-3 sold DAR-3 sold to the first caller, within 15 minutes of being posted to this list. Thanks to all who called. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 700 From: Date: Wed Jun 28, 2000 3:03pm Subject: Wired News : 'Twas Oracle That Spied on MS A note from James M. Atkinson: Here is an update on the Microsoft Espionage fiasco. -jma ============================================================ From Wired News, available online at: http://www.wired.com/news/print/0,1294,37278,00.html 'Twas Oracle That Spied on MS by Declan McCullagh 6:00 a.m. Jun. 28, 2000 PDT WASHINGTON -- Those mysterious private eyes who allegedly bribed janitors for the trash thrown out by Microsoft allies turned out to be financed by the Redmond software giant's most bitter enemy. That's right: It was Oracle Corp. The detective firm, Investigative Group International, used questionable tactics to obtain potentially damaging documents from trade associations, conservative groups, and other organizations that are funded in part by Microsoft and have opposed the Justice Department's antitrust lawsuit. Oracle admitted late Tuesday that it had hired IGI to expose links to the nonprofit groups. "Left undisclosed, these Microsoft front groups could have improperly influenced the outcome of one of the most important antitrust cases in U.S. history," the company said. The Wall Street Journal and The New York Times also reported Oracle's involvement in Wednesday's editions. Oracle CEO Larry Ellison is an outspoken fan of the Justice Department's lawsuit and has called for a three-way breakup of the Redmond, Washington software firm. Before and during the antitrust trial, Oracle provided documents to government lawyers that aided them in their investigation. A private investigator who official records say worked for IGI has been linked to attempts to pay janitors for the trash of the Association for Competitive Technology, as first reported by Wired News. ACT President Jonathan Zuck said he wanted a public apology from Oracle. "They are revealed to be what they have been all along -- an enormously successful firm willing to use politics and deceit to win the war against Microsoft at any cost," Zuck said. Oracle's statement did not explicitly acknowledge its involvement with the ACT cash-for-trash episode, instead merely saying "Microsoft also funded the Association of Competitive Technology for the same exact purpose (of being a front group)." ACT receives money from Microsoft, but has taken positions -- such as opposing government intervention in the AOL-Time Warner merger -- that are not consistently pro-Microsoft. Oracle did, however, acknowledge it had hired IGI to target a libertarian and a conservative group. "Oracle Corporation hired Investigation Group International (IGI) to examine the activities of the Independent Institute and the National Taxpayers Union. As a result, Oracle discovered that both the Independent Institute and the National Taxpayers Union were misrepresenting themselves as independent advocacy groups, when in fact their work was funded by Microsoft for the express purpose of influencing public opinion in favor of Microsoft during its antitrust trial," the statement said. The free-market Independent Institute in Oakland, California has seen confidential documents obtained by computer companies and leaked to The New York Times for an article that was critical of the Redmond, Washington, software giant. The newspaper identified the source of the leak only as a Microsoft rival. "We thought we were getting involved in a high-level debate over economic theory," said David Theroux, president of the institute. "It's pretty pathetic if (Oracle's involvement) is true." Oracle refused to answer questions, but the company funds the Progress and Freedom Foundation, which has called for a breakup of Microsoft. Oracle has already benefited from the Justice Department's antitrust suit. Last November, the day of U.S. District Judge Thomas Jackson's preliminary ruling against Microsoft, Oracle's stock jumped about four percent. In April, after Jackson ruled that Microsoft had violated antitrust laws, Ellison's personal net worth soared to $50 billion, making him temporarily the richest man in the world. In Wednesday morning trading, Oracle shares were at 82-1/2, far above its 52-week low of 17-5/16. Ellison has said he would like to see Microsoft split into three separate firms, each with complete rights to all company products. He once even went so far as to compare Microsoft's let-us-innovate defense to Nazi propaganda. On June 6, a woman identifying herself as Blanca Lopez offered janitors $700 cash for documents in ACT's trash, according to a report from P&R Cleaning Services Inc. to the building's owner. Lopez refused to comment to Wired News. Lopez offered money on two different evenings, and gained access to the building using a cardkey from Robert M. Walters, who has been a private investigator for IGI. Walters rented an office in the same executive suite as ACT on behalf of "Upstream Technologies," which appears to be a front company. The company was incorporated in March in Delaware, which does not require disclosure of corporate officers until one year later. Related Wired Links: More Funding for FBI Snooping Jun. 24, 2000 Microsoft Strategy 'In the Cloud' Jun. 23, 2000 Who's Digging Up MS Dirt? Jun. 16, 2000 MS Espionage: Cash for Trash Jun. 15, 2000 Copyright 1994-2000 Wired Digital Inc. All rights reserved. 701 From: A Grudko Date: Wed Jun 28, 2000 1:41pm Subject: Construction tips > ----- Original Message ----- > From: Jay Coote > I am trying to find schematics for the following so that I can build these myself - can someone email me some scans or JPGs of these? With technical help from Paul Matthews, G4AWZ. Sorry, no working circuit diagrams as these are theoreticals. We are happy to develop the thread further if it helps colleagues. > 1. Tone sweeper, four separate sweeping tones, voiceband, 0dBM level output... to go in a telephone breakout box. **Mmmm. Do you refer to the 4 x 4 DTMF tone system, nominated (keypad) 0 - 9 plus # & *, with A, B, C & D hidden from consumers) 16 mixed tone resultants? As I mentioned about 3 months ago, on sweeps we use a manual 16 tone DTMF pad to hit those codes - but we acknowledge the limitations so we ALWAYS search. But what if the activation code for a device is a modest 4 DTMF tones? MY Bank DTNF access code is 8 figures. Our Telkom (phone co.) standardised at 10 tones per second when DTMF auto dialling. An automatic tone generator to activate such a device, operating without pauses, will generate 16 x 16 x 16 x 16 tones at 10/sec - 11 minutes required.....but our phone system generally 'times out' (disconnects) at about 90 seconds if a valid tone sequence is not entered. Tricky. If the buggist uses a common 7 tone DTMF code (like a local call number), a full sweep will then take 31 days, operating 24 hrs a day - on one line. You could use an NE567 or even the better LM565N; these are voltage controlled oscillator chips. A push button can be used to short out the ramp capacitor. This can be connected to the supply via a 1M ohm resistor. When it's released this will start the sweep voltage, which is fed into pin 7 (LM565N). The frequency control pin, pin 4, has a square wave output they cost a couple of dollars). The application notes are available from National Semiconductor. The external resistor can control a 20-1 range. You may have to filter the output if you are pedantic about the distortion level. > 2. Subcarrier receiver for use with R-71, R-8500 or AOR AR5000. Tunable for all SC freqs. The audio tuning subcarrier part of an Analogue Satellite Receiver receiver can be used at any frequency to demodulate these signals. However they generally only cover 5-8 Mhz bandwidth, so scans will be required around individual suspect frequencies. > 3. Block convertors. 2-4 Ghz in = 0-2 GHz out, ** Try MMDS /antenna converter unit from a defunked/ceased city (Cable ) distribution unit >also 4-6 Ghz in = 0-2Ghz out. To be used with 0-2 GHz multimode comms receiver. **Buy a working, used C Band L.N.B. from a car boot sale etc. Gain and sensitivity are no object as more than enough gain i.e. we are not looking for the weakest of signals from a Satellite 22,000 Kms away ! However less than normal performance is better as it's less likely to self oscillate when sniffing around. You will have to power it through a clean, series power injector @ 15V dc. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust "When you need it done right - first time" ICQ 78711262 702 From: James M. Atkinson, Comm-Eng Date: Wed Jun 28, 2000 11:40pm Subject: Independence Day - July 4, 2000 The Declaration of Independence Few Americans are aware of the tremendous sacrifices made by the brave and selfless men who signed the Declaration of Independence. Have you ever wondered what happened to those men who signed the Declaration of Independence? What kind of men were they? Twenty-four were lawyers and jurists. Eleven were merchants. Nine were farmers and large plantation owners-men of means and well educated. But they signed the Declaration of Independence, knowing full well the penalty would be death if they were captured. They signed and pledged their lives, their fortunes and their sacred honor Five signers were captured by British as traitors and were tortured before they died. Twelve had their homes ransacked or burned. Two lost their sons in the Revolutionary army. Another had two sons captured. Nine of the 56 fought and died from wounds or the hardships of war. Carter Braxton of Virginia, a wealthy planter and trader, saw his ships swept from the seas by British navy. He sold his home and properties to pay his debts and died in rags. Thomas McKean was so hounded by the British that he was forced to move his family almost constantly. He served in Congress without pay and his family was kept in hiding. His possessions were taken and poverty was his reward. Vandals or soldiers or both looted the properties of Ellery, Clymer, Hall, Walton, Gwinnett, Hetward, Rutledge and Middleton. Francis Lewis had his home and properties destroyed. The enemy jailed his wife, after which she died within a few months. At the Battle of Yorktown, Thomas Nelson, Jr., noted that British General Cornwallis had taken over the Nelson home for his headquarters. The owner quickly urged General Washington to open fire on the dwelling. The home was destroyed. Nelson died a bankrupt man. John Hart was driven from his wife's bedside as she was dying. Their 13 children fled for their lives. His fields and grist mill were laid waste. For more than a year, he lived in the forests and in caves, returning home after the war to find his wife dead and his children vanished. A few weeks later, he died from exhaustion and a broken heart. Morris and Livingston suffered similar fates. Such were the stories and sacrifices of the American Revolution. These were not wild-eyed, rabble-rousing ruffians; they were soft-spoken men of means and education. They had security, but they valued liberty more. They pledged: "For the support of this Declaration, with a firm reliance on the protection of the Divine Providence, we mutually pledge to each other our lives, our fortunes and our sacred honor." The 56 Signers of the Declaration of Independence are: Connecticut/New York Huntington, Samuel; Floyd, William;Sherman, Roger; Lewis, Francis; Williams,William ; Livingston, Philip; Wolcott, Oliver; Morris, Lewis. Delaware/North Carolina McKean, Thomas; Hewes, Joseph; Read, George; Hooper, William;Rodney, Caesar; Penn, John. Georgia/Pennsylvania Gwinnett, Button; Clymer, George;Hall, Lyman; Franklin, Benjamin;Walton, George; Morris, Robert. Maryland Morton, Robert; Carroll, Charles; Ross, George; Chase, Samuel; Rush, Benjamin; Paca, William; Smith, James; Stone, Thomas;Taylor, George. Massachusetts Wilson, James; Adams, John. Rhode Island Adams, Samuel; Ellery, William;Gerry,Elbridge; Hopkins, Stephen; Hancock, John. South Carolina Paine, Robert T.; Heyward, Thomas Jr. New Hampshire Lynch, Thomas Jr.; Bartlett, Josiah; Middleton, Arthur; Thornton, Matthew; Rutledge, Edward; Whipple, William Virginia/New Jersey Braxton, Carter; Clark, Abraham; Harrison, Benjamin; Hart, John; Jefferson, Thomas; Hopkinson, Francis; Lee, Francis Lightfoot; Stockton, Richard; Lee, Richard Henery; Witherspoon, John;Nelson, Thomas Jr.; Wythe, George =================================================== With the above in mind read the following to your friends and family on Tuesday, and remeber that freedom is never free. Make sure they understand these documents, and value every word of them as a great price was paid by those who wrote it, those who fought for it, and those who died for it. -jma =================================================== The Declaration of Independence IN CONGRESS, July 4, 1776. The unanimous Declaration of the thirteen United States of America, When in the Course of human events, it becomes necessary for one people to dissolve the political bands which have connected them with another, and to assume among the powers of the earth, the separate and equal station to which the Laws of Nature and of Nature's God entitle them, a decent respect to the opinions of mankind requires that they should declare the causes which impel them to the separation. We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness.--That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed, --That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its foundation on such principles and organizing its powers in such form, as to them shall seem most likely to effect their Safety and Happiness. Prudence, indeed, will dictate that Governments long established should not be changed for light and transient causes; and accordingly all experience hath shewn, that mankind are more disposed to suffer, while evils are sufferable, than to right themselves by abolishing the forms to which they are accustomed. But when a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security.--Such has been the patient sufferance of these Colonies; and such is now the necessity which constrains them to alter their former Systems of Government. The history of the present King of Great Britain is a history of repeated injuries and usurpations, all having in direct object the establishment of an absolute Tyranny over these States. To prove this, let Facts be submitted to a candid world. He has refused his Assent to Laws, the most wholesome and necessary for the public good. He has forbidden his Governors to pass Laws of immediate and pressing importance, unless suspended in their operation till his Assent should be obtained; and when so suspended, he has utterly neglected to attend to them. He has refused to pass other Laws for the accommodation of large districts of people, unless those people would relinquish the right of Representation in the Legislature, a right inestimable to them and formidable to tyrants only. He has called together legislative bodies at places unusual, uncomfortable, and distant from the depository of their public Records, for the sole purpose of fatiguing them into compliance with his measures. He has dissolved Representative Houses repeatedly, for opposing with manly firmness his invasions on the rights of the people. He has refused for a long time, after such dissolutions, to cause others to be elected; whereby the Legislative powers, incapable of Annihilation, have returned to the People at large for their exercise; the State remaining in the mean time exposed to all the dangers of invasion from without, and convulsions within. He has endeavoured to prevent the population of these States; for that purpose obstructing the Laws for Naturalization of Foreigners; refusing to pass others to encourage their migrations hither, and raising the conditions of new Appropriations of Lands. He has obstructed the Administration of Justice, by refusing his Assent to Laws for establishing Judiciary powers. He has made Judges dependent on his Will alone, for the tenure of their offices, and the amount and payment of their salaries. He has erected a multitude of New Offices, and sent hither swarms of Officers to harrass our people, and eat out their substance. He has kept among us, in times of peace, Standing Armies without the Consent of our legislatures. He has affected to render the Military independent of and superior to the Civil power. He has combined with others to subject us to a jurisdiction foreign to our constitution, and unacknowledged by our laws; giving his Assent to their Acts of pretended Legislation: For Quartering large bodies of armed troops among us: For protecting them, by a mock Trial, from punishment for any Murders which they should commit on the Inhabitants of these States: For cutting off our Trade with all parts of the world: For imposing Taxes on us without our Consent: For depriving us in many cases, of the benefits of Trial by Jury: For transporting us beyond Seas to be tried for pretended offences For abolishing the free System of English Laws in a neighbouring Province, establishing therein an Arbitrary government, and enlarging its Boundaries so as to render it at once an example and fit instrument for introducing the same absolute rule into these Colonies: For taking away our Charters, abolishing our most valuable Laws, and altering fundamentally the Forms of our Governments: For suspending our own Legislatures, and declaring themselves invested with power to legislate for us in all cases whatsoever. He has abdicated Government here, by declaring us out of his Protection and waging War against us. He has plundered our seas, ravaged our Coasts, burnt our towns, and destroyed the lives of our people. He is at this time transporting large Armies of foreign Mercenaries to compleat the works of death, desolation and tyranny, already begun with circumstances of Cruelty & perfidy scarcely paralleled in the most barbarous ages, and totally unworthy the Head of a civilized nation. He has constrained our fellow Citizens taken Captive on the high Seas to bear Arms against their Country, to become the executioners of their friends and Brethren, or to fall themselves by their Hands. He has excited domestic insurrections amongst us, and has endeavoured to bring on the inhabitants of our frontiers, the merciless Indian Savages, whose known rule of warfare, is an undistinguished destruction of all ages, sexes and conditions. In every stage of these Oppressions We have Petitioned for Redress in the most humble terms: Our repeated Petitions have been answered only by repeated injury. A Prince whose character is thus marked by every act which may define a Tyrant, is unfit to be the ruler of a free people. Nor have We been wanting in attentions to our Brittish brethren. We have warned them from time to time of attempts by their legislature to extend an unwarrantable jurisdiction over us. We have reminded them of the circumstances of our emigration and settlement here. We have appealed to their native justice and magnanimity, and we have conjured them by the ties of our common kindred to disavow these usurpations, which, would inevitably interrupt our connections and correspondence. They too have been deaf to the voice of justice and of consanguinity. We must, therefore, acquiesce in the necessity, which denounces our Separation, and hold them, as we hold the rest of mankind, Enemies in War, in Peace Friends. We, therefore, the Representatives of the united States of America, in General Congress, Assembled, appealing to the Supreme Judge of the world for the rectitude of our intentions, do, in the Name, and by Authority of the good People of these Colonies, solemnly publish and declare, That these United Colonies are, and of Right ought to be Free and Independent States; that they are Absolved from all Allegiance to the British Crown, and that all political connection between them and the State of Great Britain, is and ought to be totally dissolved; and that as Free and Independent States, they have full Power to levy War, conclude Peace, contract Alliances, establish Commerce, and to do all other Acts and Things which Independent States may of right do. And for the support of this Declaration, with a firm reliance on the protection of divine Providence, we mutually pledge to each other our Lives, our Fortunes and our sacred Honor. The 56 signatures on the Declaration appear in the positions indicated: [Column 1] Georgia: Button Gwinnett Lyman Hall George Walton [Column 2] North Carolina: William Hooper Joseph Hewes John Penn South Carolina: Edward Rutledge Thomas Heyward, Jr. Thomas Lynch, Jr. Arthur Middleton [Column 3] Massachusetts: John Hancock Maryland: Samuel Chase William Paca Thomas Stone Charles Carroll of Carrollton Virginia: George Wythe Richard Henry Lee Thomas Jefferson Benjamin Harrison Thomas Nelson, Jr. Francis Lightfoot Lee Carter Braxton [Column 4] Pennsylvania: Robert Morris Benjamin Rush Benjamin Franklin John Morton George Clymer James Smith George Taylor James Wilson George Ross Delaware: Caesar Rodney George Read Thomas McKean [Column 5] New York: William Floyd Philip Livingston Francis Lewis Lewis Morris New Jersey: Richard Stockton John Witherspoon Francis Hopkinson John Hart Abraham Clark [Column 6] New Hampshire: Josiah Bartlett William Whipple Massachusetts: Samuel Adams John Adams Robert Treat Paine Elbridge Gerry Rhode Island: Stephen Hopkins William Ellery Connecticut: Roger Sherman Samuel Huntington William Williams Oliver Wolcott New Hampshire: Matthew Thornton =================================================== THE PREAMBLE TO THE BILL OF RIGHTS Congress of the United States begun and held at the City of New-York, on Wednesday the fourth of March, one thousand seven hundred and eighty nine. The Conventions of a number of the States, having at the time of their adopting the Constitution, expressed a desire, in order to prevent misconstruction or abuse of its powers, that further declaratory and restrictive clauses should be added: And as extending the ground of public confidence in the Government, will best ensure the beneficent ends of its institution. Resolved by the Senate and House of Representatives of the United States of America, in Congress assembled, two thirds of both Houses concurring, that the following Articles be proposed to the Legislatures of the several States as amendments to the Constitution of the United States, all, or any of which articles, when ratified by three fourths of the said Legislatures, to be valid to all intents and purposes, as part of the said Constitution; viz. Articles in addition to, and Amendment of the Constitution of the United States of America, proposed by Congress and ratified by the Legislatures of the several States, pursuant to the fifth Article of the original Constitution. THE FIRST 10 AMENDMENTS TO THE CONSTITUTION AS RATIFIED BY THE STATES Note: The following text is a transcription of the first 10 amendments to the Constitution in their original form. These amendments were ratified December 15, 1791, and form what is known as the "Bill of Rights." Amendment I Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. Amendment II A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed. Amendment III No Soldier shall, in time of peace be quartered in any house, without the consent of the Owner, nor in time of war, but in a manner to be prescribed by law. Amendment IV The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. Amendment V No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offence to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation. Amendment VI In all criminal prosecutions, the accused shall enjoy the right to a speedy and public trial, by an impartial jury of the State and district wherein the crime shall have been committed, which district shall have been previously ascertained by law, and to be informed of the nature and cause of the accusation; to be confronted with the witnesses against him; to have compulsory process for obtaining witnesses in his favor, and to have the Assistance of Counsel for his defence. Amendment VII In suits at common law, where the value in controversy shall exceed twenty dollars, the right of trial by jury shall be preserved, and no fact tried by a jury, shall be otherwise reexamined in any Court of the United States, than according to the rules of the common law. Amendment VIII Excessive bail shall not be required, nor excessive fines imposed, nor cruel and unusual punishments inflicted. Amendment IX The enumeration in the Constitution, of certain rights, shall not be construed to deny or disparage others retained by the people. Amendment X The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people. AMENDMENT XI Passed by Congress March 4, 1794. Ratified February 7, 1795. Note: Article III, section 2, of the Constitution was modified by amendment 11. The Judicial power of the United States shall not be construed to extend to any suit in law or equity, commenced or prosecuted against one of the United States by Citizens of another State, or by Citizens or Subjects of any Foreign State. AMENDMENT XII Passed by Congress December 9, 1803. Ratified June 15, 1804. Note: A portion of Article II, section 1 of the Constitution was superseded by the 12th amendment. The Electors shall meet in their respective states and vote by ballot for President and Vice-President, one of whom, at least, shall not be an inhabitant of the same state with themselves; they shall name in their ballots the person voted for as President, and in distinct ballots the person voted for as Vice-President, and they shall make distinct lists of all persons voted for as President, and of all persons voted for as Vice-President, and of the number of votes for each, which lists they shall sign and certify, and transmit sealed to the seat of the government of the United States, directed to the President of the Senate; -- the President of the Senate shall, in the presence of the Senate and House of Representatives, open all the certificates and the votes shall then be counted; -- The person having the greatest number of votes for President, shall be the President, if such number be a majority of the whole number of Electors appointed; and if no person have such majority, then from the persons having the highest numbers not exceeding three on the list of those voted for as President, the House of Representatives shall choose immediately, by ballot, the President. But in choosing the President, the votes shall be taken by states, the representation from each state having one vote; a quorum for this purpose shall consist of a member or members from two-thirds of the states, and a majority of all the states shall be necessary to a choice. [And if the House of Representatives shall not choose a President whenever the right of choice shall devolve upon them, before the fourth day of March next following, then the Vice-President shall act as President, as in case of the death or other constitutional disability of the President. --]* The person having the greatest number of votes as Vice-President, shall be the Vice-President, if such number be a majority of the whole number of Electors appointed, and if no person have a majority, then from the two highest numbers on the list, the Senate shall choose the Vice-President; a quorum for the purpose shall consist of two-thirds of the whole number of Senators, and a majority of the whole number shall be necessary to a choice. But no person constitutionally ineligible to the office of President shall be eligible to that of Vice-President of the United States. *Superseded by section 3 of the 20th amendment. AMENDMENT XIII Passed by Congress January 31, 1865. Ratified December 6, 1865. Note: A portion of Article IV, section 2, of the Constitution was superseded by the 13th amendment. Section 1. Neither slavery nor involuntary servitude, except as a punishment for crime whereof the party shall have been duly convicted, shall exist within the United States, or any place subject to their jurisdiction. Section 2. Congress shall have power to enforce this article by appropriate legislation. AMENDMENT XIV Passed by Congress June 13, 1866. Ratified July 9, 1868. Note: Article I, section 2, of the Constitution was modified by section 2 of the 14th amendment. Section 1. All persons born or naturalized in the United States, and subject to the jurisdiction thereof, are citizens of the United States and of the State wherein they reside. No State shall make or enforce any law which shall abridge the privileges or immunities of citizens of the United States; nor shall any State deprive any person of life, liberty, or property, without due process of law; nor deny to any person within its jurisdiction the equal protection of the laws. Section 2. Representatives shall be apportioned among the several States according to their respective numbers, counting the whole number of persons in each State, excluding Indians not taxed. But when the right to vote at any election for the choice of electors for President and Vice-President of the United States, Representatives in Congress, the Executive and Judicial officers of a State, or the members of the Legislature thereof, is denied to any of the male inhabitants of such State, being twenty-one years of age,* and citizens of the United States, or in any way abridged, except for participation in rebellion, or other crime, the basis of representation therein shall be reduced in the proportion which the number of such male citizens shall bear to the whole number of male citizens twenty-one years of age in such State. Section 3. No person shall be a Senator or Representative in Congress, or elector of President and Vice-President, or hold any office, civil or military, under the United States, or under any State, who, having previously taken an oath, as a member of Congress, or as an officer of the United States, or as a member of any State legislature, or as an executive or judicial officer of any State, to support the Constitution of the United States, shall have engaged in insurrection or rebellion against the same, or given aid or comfort to the enemies thereof. But Congress may by a vote of two-thirds of each House, remove such disability. Section 4. The validity of the public debt of the United States, authorized by law, including debts incurred for payment of pensions and bounties for services in suppressing insurrection or rebellion, shall not be questioned. But neither the United States nor any State shall assume or pay any debt or obligation incurred in aid of insurrection or rebellion against the United States, or any claim for the loss or emancipation of any slave; but all such debts, obligations and claims shall be held illegal and void. Section 5. The Congress shall have the power to enforce, by appropriate legislation, the provisions of this article. *Changed by section 1 of the 26th amendment. AMENDMENT XV Passed by Congress February 26, 1869. Ratified February 3, 1870. Section 1. The right of citizens of the United States to vote shall not be denied or abridged by the United States or by any State on account of race, color, or previous condition of servitude-- Section 2. The Congress shall have the power to enforce this article by appropriate legislation. AMENDMENT XVI Passed by Congress July 2, 1909. Ratified February 3, 1913. Note: Article I, section 9, of the Constitution was modified by amendment 16. The Congress shall have power to lay and collect taxes on incomes, from whatever source derived, without apportionment among the several States, and without regard to any census or enumeration. AMENDMENT XVII Passed by Congress May 13, 1912. Ratified April 8, 1913. Note: Article I, section 3, of the Constitution was modified by the 17th amendment. The Senate of the United States shall be composed of two Senators from each State, elected by the people thereof, for six years; and each Senator shall have one vote. The electors in each State shall have the qualifications requisite for electors of the most numerous branch of the State legislatures. When vacancies happen in the representation of any State in the Senate, the executive authority of such State shall issue writs of election to fill such vacancies: Provided, That the legislature of any State may empower the executive thereof to make temporary appointments until the people fill the vacancies by election as the legislature may direct. This amendment shall not be so construed as to affect the election or term of any Senator chosen before it becomes valid as part of the Constitution. AMENDMENT XVIII Passed by Congress December 18, 1917. Ratified January 16, 1919. Repealed by amendment 21. Section 1. After one year from the ratification of this article the manufacture, sale, or transportation of intoxicating liquors within, the importation thereof into, or the exportation thereof from the United States and all territory subject to the jurisdiction thereof for beverage purposes is hereby prohibited. Section 2. The Congress and the several States shall have concurrent power to enforce this article by appropriate legislation. Section 3. This article shall be inoperative unless it shall have been ratified as an amendment to the Constitution by the legislatures of the several States, as provided in the Constitution, within seven years from the date of the submission hereof to the States by the Congress. AMENDMENT XIX Passed by Congress June 4, 1919. Ratified August 18, 1920. The right of citizens of the United States to vote shall not be denied or abridged by the United States or by any State on account of sex. Congress shall have power to enforce this article by appropriate legislation. AMENDMENT XX Passed by Congress March 2, 1932. Ratified January 23, 1933. Note: Article I, section 4, of the Constitution was modified by section 2 of this amendment. In addition, a portion of the 12th amendment was superseded by section 3. Section 1. The terms of the President and the Vice President shall end at noon on the 20th day of January, and the terms of Senators and Representatives at noon on the 3d day of January, of the years in which such terms would have ended if this article had not been ratified; and the terms of their successors shall then begin. Section 2. The Congress shall assemble at least once in every year, and such meeting shall begin at noon on the 3d day of January, unless they shall by law appoint a different day. Section 3. If, at the time fixed for the beginning of the term of the President, the President elect shall have died, the Vice President elect shall become President. If a President shall not have been chosen before the time fixed for the beginning of his term, or if the President elect shall have failed to qualify, then the Vice President elect shall act as President until a President shall have qualified; and the Congress may by law provide for the case wherein neither a President elect nor a Vice President shall have qualified, declaring who shall then act as President, or the manner in which one who is to act shall be selected, and such person shall act accordingly until a President or Vice President shall have qualified. Section 4. The Congress may by law provide for the case of the death of any of the persons from whom the House of Representatives may choose a President whenever the right of choice shall have devolved upon them, and for the case of the death of any of the persons from whom the Senate may choose a Vice President whenever the right of choice shall have devolved upon them. Section 5. Sections 1 and 2 shall take effect on the 15th day of October following the ratification of this article. Section 6. This article shall be inoperative unless it shall have been ratified as an amendment to the Constitution by the legislatures of three-fourths of the several States within seven years from the date of its submission. AMENDMENT XXI Passed by Congress February 20, 1933. Ratified December 5, 1933. Section 1. The eighteenth article of amendment to the Constitution of the United States is hereby repealed. Section 2. The transportation or importation into any State, Territory, or Possession of the United States for delivery or use therein of intoxicating liquors, in violation of the laws thereof, is hereby prohibited. Section 3. This article shall be inoperative unless it shall have been ratified as an amendment to the Constitution by conventions in the several States, as provided in the Constitution, within seven years from the date of the submission hereof to the States by the Congress. AMENDMENT XXII Passed by Congress March 21, 1947. Ratified February 27, 1951. Section 1. No person shall be elected to the office of the President more than twice, and no person who has held the office of President, or acted as President, for more than two years of a term to which some other person was elected President shall be elected to the office of President more than once. But this Article shall not apply to any person holding the office of President when this Article was proposed by Congress, and shall not prevent any person who may be holding the office of President, or acting as President, during the term within which this Article becomes operative from holding the office of President or acting as President during the remainder of such term. Section 2. This article shall be inoperative unless it shall have been ratified as an amendment to the Constitution by the legislatures of three-fourths of the several States within seven years from the date of its submission to the States by the Congress. AMENDMENT XXIII Passed by Congress June 16, 1960. Ratified March 29, 1961. Section 1. The District constituting the seat of Government of the United States shall appoint in such manner as Congress may direct: A number of electors of President and Vice President equal to the whole number of Senators and Representatives in Congress to which the District would be entitled if it were a State, but in no event more than the least populous State; they shall be in addition to those appointed by the States, but they shall be considered, for the purposes of the election of President and Vice President, to be electors appointed by a State; and they shall meet in the District and perform such duties as provided by the twelfth article of amendment. Section 2. The Congress shall have power to enforce this article by appropriate legislation. AMENDMENT XXIV Passed by Congress August 27, 1962. Ratified January 23, 1964. Section 1. The right of citizens of the United States to vote in any primary or other election for President or Vice President, for electors for President or Vice President, or for Senator or Representative in Congress, shall not be denied or abridged by the United States or any State by reason of failure to pay poll tax or other tax. Section 2. The Congress shall have power to enforce this article by appropriate legislation. AMENDMENT XXV Passed by Congress July 6, 1965. Ratified February 10, 1967. Note: Article II, section 1, of the Constitution was affected by the 25th amendment. Section 1. In case of the removal of the President from office or of his death or resignation, the Vice President shall become President. Section 2. Whenever there is a vacancy in the office of the Vice President, the President shall nominate a Vice President who shall take office upon confirmation by a majority vote of both Houses of Congress. Section 3. Whenever the President transmits to the President pro tempore of the Senate and the Speaker of the House of Representatives his written declaration that he is unable to discharge the powers and duties of his office, and until he transmits to them a written declaration to the contrary, such powers and duties shall be discharged by the Vice President as Acting President. Section 4. Whenever the Vice President and a majority of either the principal officers of the executive departments or of such other body as Congress may by law provide, transmit to the President pro tempore of the Senate and the Speaker of the House of Representatives their written declaration that the President is unable to discharge the powers and duties of his office, the Vice President shall immediately assume the powers and duties of the office as Acting President. Thereafter, when the President transmits to the President pro tempore of the Senate and the Speaker of the House of Representatives his written declaration that no inability exists, he shall resume the powers and duties of his office unless the Vice President and a majority of either the principal officers of the executive department or of such other body as Congress may by law provide, transmit within four days to the President pro tempore of the Senate and the Speaker of the House of Representatives their written declaration that the President is unable to discharge the powers and duties of his office. Thereupon Congress shall decide the issue, assembling within forty-eight hours for that purpose if not in session. If the Congress, within twenty-one days after receipt of the latter written declaration, or, if Congress is not in session, within twenty-one days after Congress is required to assemble, determines by two-thirds vote of both Houses that the President is unable to discharge the powers and duties of his office, the Vice President shall continue to discharge the same as Acting President; otherwise, the President shall resume the powers and duties of his office. AMENDMENT XXVI Passed by Congress March 23, 1971. Ratified July 1, 1971. Note: Amendment 14, section 2, of the Constitution was modified by section 1 of the 26th amendment. Section 1. The right of citizens of the United States, who are eighteen years of age or older, to vote shall not be denied or abridged by the United States or by any State on account of age. Section 2. The Congress shall have power to enforce this article by appropriate legislation. AMENDMENT XXVII Originally proposed Sept. 25, 1789. Ratified May 7, 1992. No law, varying the compensation for the services of the Senators and Representatives, shall take effect, until an election of representatives shall have intervened. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 703 From: James M. Atkinson, Comm-Eng Date: Wed Jun 28, 2000 11:49pm Subject: Big Rocks This is a great metaphor and lesson: One day an expert in time management was speaking to a group of Business students and, to drive home a point, used an illustration those Students will never forget. As he stood in front of the group of high powered overachievers he said, "Okay, time for a quiz." Then he pulled out a one-gallon, wide mouth Mason jar and set it on the table in front of him. Then he produced about a dozen fist-sized rocks and carefully placed them, one at a time, into the jar. When the jar was filled to the top and no more rocks would fit inside, he asked, "Is this jar full?" Everyone in the class said, "Yes." Then he said, "Really?" He reached under the table and pulled out a bucket of gravel. Then he dumped some gravel in and shook the jar causing pieces of gravel to work themselves down into the space between the big rocks. Then he asked the group once more, "Is the jar full?" By this time the class was on to him. "Probably not," one of them answered. "Good!" he replied. He reached under the table and brought out a bucket of sand. He started dumping the sand in the jar and it went into all of the spaces left between the rocks and the gravel. Once more he asked the question, "Is this jar full?" "No!" the class shouted. Once again he said, "Good." Then he grabbed a pitcher of water and began to pour it in until the jar was filled to the brim. Then he looked at the class and asked, "What is the point of this illustration?" One eager beaver raised his hand and said, "The point is, no matter how full your schedule is, if you try really hard you can always fit some more things in it!" "No," the speaker replied, "that's not the point. The truth this illustration teaches us is: If you don't put the big rocks in first, you'll never get them in at all. What are the 'big rocks' in your life? Time with your loved ones? Your faith, your education, your dreams? A worthy cause? Teaching or mentoring others? Remember to put these BIG ROCKS in first or you'll never get them in at all." So, tonight, or in the morning, when you are reflecting on this short story, ask yourself this question: What are the 'big rocks' in my life? Then, put those in your jar first. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 704 From: Miguel Puchol Date: Thu Jun 29, 2000 3:55am Subject: RE: Big Rocks Humor point... All my rocks seem to be huge, and I could do with a shedule-compression algorithm... The jar broke long ago... Mike > One eager beaver raised his hand and said, "The point is, no > matter how full your schedule is, if you try really hard you can > always fit some more things in it!" 705 From: Jay Coote Date: Thu Jun 29, 2000 10:52am Subject: 1950's era "device" List; While browsing, I came across photos of a "bug" transmitter from the mid or late 1950's. Kind of interesting to see how they did it a long time ago. (The site has some other clandestine radio history as well) www.geocities.com/saipan59 Jay Coote Los Angeles 706 From: Date: Thu Jun 29, 2000 7:29am Subject: Re: 1950's era "device" In a message dated 6/29/00 8:58:57 AM Pacific Daylight Time, TSCM@j... writes: << www.geocities.com/saipan59 >> Thanks, interesting site. Just a comment, there's plenty of "old" stuff out there and it's still dangerous. 707 From: James M. Atkinson, Comm-Eng Date: Thu Jun 29, 2000 0:32pm Subject: Oracle-MS flap -- how it happened [It's interesting that nobody has mentioned the Economic Espionage Act in regards to this entire incident] http://www.zdnet.com/zdnn/stories/news/0,4586,2596408,00.html Oracle-MS flap -- how it happened By Ted Bridis, Glenn Simpson and Mylene Mangalindan, WSJ Interactive Edition June 29, 2000 6:50 AM PT In June of 1999, Washington lobbyists for software giant Oracle Corp. grew dismayed by the skill with which Oracle's bitterest rival, Microsoft Corp., seemed to be manipulating public opinion. As Microsoft faced the antitrust fight of its life, a group called the Independent Institute bought full-page newspaper ads citing 240 academics who criticized the government's antitrust attack on Microsoft. Oracle Corp. suspected the institute wasn't so independent, and decided to find out. It hired a Washington detective firm called Investigative Group International Inc. The ensuing cat fight, pitting two companies run by billionaires with a history of bitter animosity, exposed the glamorous software industry's seamiest side. Among its bizarre elements were accusations of stolen laptop computers and suspicious characters lurking outside the offices of Microsoft Corp. allies. And, in a curious twist for an industry that celebrates high-tech wizardry, spies for Oracle ended up relying mainly on low-tech paper trash. At the time, Microsoft was making headway in its arguments against the government, causing tension among the small group of Silicon Valley firms that had instigated the government's case. Particularly unhappy were Oracle founder Lawrence Ellison and his executives, who carried an abiding anger over Microsoft's efforts to -- as one Microsoft executive had put it in an internal e-mail -- "kill ... Oracle." Oracle, concerned about the effectiveness of the anti-Microsoft coalition, decided to go it alone. Oracle took with it a bare-knuckles Washington public-relations firm called Chlopak, Leonard, Schechter & Associates. And then, after the pro-Microsoft newspaper ads started running, Oracle added the other weapon in its arsenal, IGI, a firm that had previously helped the tobacco industry and the Clinton administration in their travails and was led by a former Watergate investigator. Who paid for it?Suspecting that Microsoft itself was behind the pro-Microsoft campaign, Oracle gave IGI its assignment: get the Independent Institute's funding figures. There was a discussion of tactics, including so-called Dumpster diving -- sifting through trash. IGI was told to do what was legal. It wasn't long before IGI produced results: Internal documents showing that Microsoft had paid Independent Institute, based in Oakland, Calif., $153,000. Independent Institute President David Theroux suspects that information was stolen. People familiar with the operation, however, intimate that it was obtained by rifling through trash, a practice that isn't illegal. IGI Chairman Terry Lenzner said Wednesday that his firm "abides by a rigorous code of ethics and conducts all of its investigations in a lawful manner," and that its work for Oracle "was conducted in strict accordance with these standards." In any case, the information found its way into a Sept. 18 New York Times article, embarrassing to both Microsoft and the Independent Institute. According to people with knowledge of IGI's activities, the operation was deemed highly successful within the firm. Oracle next turned its sights on the Microsoft-backed Association for Competitive Technology, which in January announced it would file a friend-of-the-court brief on Microsoft's behalf, using a team of prestigious former government lawyers. Oracle's Washington team viewed the move as outrageous, given the probability that the brief would be paid for with money from Microsoft itself. In April, Oracle told IGI to look into ACT. Soon yet another player surfaced: the National Taxpayers Union. It had long been publicly criticizing a suit against Microsoft by state attorneys general as "government-led larceny of Microsoft's intellectual property." In mid-May, as the group renewed its attacks on the government, Oracle again suspected the hidden hand of its software foe. Once again, it dispatched IGI, which promptly went trash-hunting. IGI discovered that the National Taxpayers Union had received more than $200,000 from Microsoft. That information surfaced in The Wall Street Journal and the Washington Post in May. Taxpayers Union President John Berthoud has said that a succession of visitors had appeared at the group's Arlington, Va., offices pretending to be people they weren't. And another Microsoft ally, the Washington-based Citizens for a Sound Economy, said thieves stole three laptops from its downtown offices between November 1999 and January. Information about the group's financial backing from Microsoft, contained on the laptops, appeared subsequently in the Washington Post. Although there has been no evidence linking the latter incident to Oracle or IGI, Ellison said Wednesday, "Am I supposed to feel bad that we've exposed Microsoft as hiring the Citizens for a Sound Economy to say that anything that is bad for Microsoft is bad for America?" Trash talkingIt was trash-hunting at ACT, however, that ultimately brought Oracle's entanglement to light. For that, Oracle can thank Robert M. Walters and a conscientious cleaning crew. In May, Walters, an amiable former journalist who was IGI's chief anti-Microsoft detective, leased an office near ACT's Washington offices. He used his own name but identified himself as an official of "Upstream Technologies." According to someone familiar with the matter, Walters was involved in arranging for a woman, Blanca Lopez, to offer $1,200 in cash to the cleaning crew at ACT's quarters to look for office trash and bring it to the nearby offices of Upstream. Ms. Lopez told the Journal she was never aware of who was ultimately behind the trash-buying effort. The cleaning crew declined the money and reported the incident. Asked whether anyone at IGI offered money to a cleaning crew, the detective agency declines to comment. Walters gave the leasing agent the names of three other "Upstream employees," all of whom were easily traceable back to IGI once efforts to buy ACT's trash were exposed. Walters, who declined numerous requests for comment, resigned from IGI last week. Walters also paid $4,445 to lease the office space near ACT using a check drawn on his personal bank account, according to records obtained by the Journal. And he used the telephone in the Upstream office to call his home and his wife at her office. Those calls later were easily traced because they were routed through the building's computerized phone system. Together, these steps bore the mark of a detective who appeared not particularly worried about covering his true identity. Oracle's Ellison Wednesday took responsibility for the probe of Microsoft allies, though he said he didn't know that his company had hired IGI until Tuesday, nor that the effort included rummaging through trash. "It was my watch," he said during a news conference at company offices in Redwood Shores, Calif. "I authorized the budget, but I didn't know the details of the activities." He acknowledged that "some of the things our investigator did may have been unsavory. Certainly from a personal hygiene point, they were. I mean, garbage ... yuck." Asked how he would respond to news that a competitor like Microsoft was rifling through Oracle's trash, he deadpanned: "We'll ship them our garbage. We'll send them all our garbage." The PR firm Chlopak, Leonard & Schechter took a role in distributing information critical of Microsoft, although it said Wednesday that it "did not retain or direct the activities of IGI." The PR firm also said that only a "tiny fraction" of its work relating to Microsoft involved the software giant's allies, "all of which was factual, all of which was legal and none of which has been disputed." Oracle isn't the only high-tech company getting into the business of corporate espionage these days. America Online Inc., for instance, acknowledged Wednesday that it, too, hired IGI to help in a political fight. AOL initially said, when queried last week, that it didn't believe it had done any business with IGI. Later, shown contrary information, spokesman Andrew Weinstein said the company had hired IGI in an effort to ferret out its foes in its fight in California over "open access" to cable lines. "The project lasted less than a week and basically involved research using Lexis-Nexis and public documents" -- and no trash searches -- he said. Trash and cache Microsoft itself acknowledges that it once pulled an important document from the trash of another company. The incident occurred in February 1993 during a police raid of Supercom Inc., a California company accused of reproducing Microsoft software. According to court documents, an investigator hired by Microsoft, Stephen H. Lawrence, accompanied police on the raid and rummaged through the company's trash. He found a two-page document crucial to the piracy allegations, along with 325 other pages that Microsoft later produced as part of the court case in a box labeled "documents found in trash." A Microsoft spokesman, Vivek Varma, argued Wednesday that circumstances of the 1993 police raid and Oracle's activities were different. Corporate America long ago discovered the utility of paying private detectives to investigate enemies and allies. But the most prominent investigation firms, including IGI, maintain that they consider so-called "trash cover" operations to be disreputable, even as they occasionally dispatch detectives to discreetly collect a target's refuse. IGI Chairman Terry Lenzner, for example, has said that the firm never uses such a technique without the express approval of the client. Other executives at detective firms say they discourage trash searches even if a client requests one, arguing that they can be costly and risk exposure, and that the source of any documents thus obtained and later used in court must be identified. One doesn't want to uncover explosive evidence in such a way that judges or juries focus on the method used to get it, one executive says. Collecting someone's garbage is typically legal, as U.S. courtroom precedent dictates there isn't a presumption of privacy afforded to discarded items. But detective firms point to a plethora of other potential legal entanglements. In some jurisdictions, it could be considered trespass or even burglary to enter property with the intention to take trash. Paying money to cleaners or city employees for garbage could be deemed commercial or official bribery. IGI avoided the trespass issue by leasing office space near ACT. District of Columbia police who investigated the attempts to buy ACT's trash took the case earlier this month for review to the U.S. attorney's office, where it was determined that despite the suspicious offer, no crime took place. Authorities in Arlington, where IGI rummaged the trash of the National Taxpayers Union, also indicated they weren't currently investigating any crime associated with the effort. Gates-Ellison rivalry On a business level, competition between Microsoft and Oracle has always been fierce, particularly after Microsoft introduced its SQL Server 7 database, which competes directly with Oracle, about a year and a half ago. Oracle has also recently been touting its success powering the systems of e-business firms, a market Microsoft is eager to crack. The rivalry extends beyond the computer industry into such areas as charitable donations. In June 1997, Gates pledged $400 million to bring computers and Internet access to public libraries. The next day, Ellison said Oracle would donate $100 million to help schools install inexpensive computing devices. Gates is bankrolling a vaccine scheme for poor countries; Ellison is putting money into cancer research. On the charity front, Gates is winning so far, having donated some $22 billion to his charitable foundation. Comparing Ellison's effort "is like comparing a canoe to an aircraft carrier," scoffs Trevor Neilson, a spokesman for the Bill & Melinda Gates Foundation. Wednesday, Microsoft issued a blistering statement calling Oracle's trash hunt "disingenuous and hypocritical." Oracle "apparently believes its business goals are more important than the free speech and privacy rights of others," it said. At a briefing Wednesday, Oracle had hoped to talk about the exciting news behind its Application Server 8i: how it had been endorsed by more than 40 companies, and how it was "taking the middleware market by storm." But everyone else wanted to talk trash. The room was jammed with reporters, far more than usually show up for a tech briefing, including TV camera crews. Oracle stuck to its schedule, though, and Gary Bloom, the company's executive vice president, spent an hour going through his slides explaining the firm's latest technology. "That's awesome," he said at one point, looking at a slide showing the performance of one of Oracle's "data caching" products. The crowd was getting itchy. When a Compaq Computer official was brought on stage to endorse Oracle's plan -- a standard technology event -- one of the cameramen at the back of the room exclaimed, "Geez, this is ridiculous." Finally, Ellison came on stage, and the room snapped to attention. The first question to him: "Larry, we hear you have been looking at Bill Gates' garbage. Is that true?" --Lee Gomes and Don Clark contributed to this article. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 708 From: Ed Naylor Date: Thu Jun 29, 2000 3:32pm Subject: Re: Independence Day - July 4, 2000 At 12:40 AM 6/29/00 -0400, you wrote: >The Declaration of Independence > >Few Americans are aware of the tremendous sacrifices made by the brave and >selfless men who signed the Declaration of Independence. Have you ever >wondered what happened to those men who signed the Declaration of >Independence? ============================================ jma, Thanx for sending this timely reminder. It's a good time to review the basic schematic. Ed 709 From: William Knowles Date: Thu Jun 29, 2000 1:54pm Subject: Leaks and geeks: International espionage goes high-tech http://news.cnet.com/news/0-1003-200-2174240.html By Rachel Konrad Staff Writer, CNET News.com June 29, 2000, 12:55 p.m. PT International spies, pilfered documents and treasonous allegations: Are these the irrelevant artifacts of the 1980s Cold War? Absolutely not, Mr. Bond. A spate of old-fashioned security leaks and newfangled hack attacks has made corporate espionage one of the New Economy's hottest topics. As companies such as Microsoft, Oracle and Intel struggle to protect trade and investment secrets, tech firms are increasingly the perpetrators and victims of spy missions--the likes of which British spy novelist Ian Fleming and his 007 character would be proud. Although the tech industry has had its share of blatantly illegal espionage, most modern corporate spy activity falls into a gray zone between aggressive competition and unethical snooping. Yesterday, Oracle chief executive Larry Ellison defended his company's decision to hire detectives to mine garbage pails and investigate two research groups funded by the company's fiercest rival, Microsoft. Comedians and satirists are heralding the case, Ellison's increasingly embarrassing albatross, as "garbage gate." In another recent case of corporate intrigue, a judge found in May that Broadcom tried to extract trade secrets from competitors during job interviews with Intel employees. Filed in California's Santa Clara County Superior Court, the suit touched a nerve in the Silicon Valley, where executives often probe job candidates about their current and future projects at competing firms. In 1997, Santa Clara County slapped felony charges on software maker Avant, charging that its top executives conspired to steal trade secrets from Cadence Design. The case hinged on former Cadence employee Mitsuru "Mitch" Igusa, who allegedly emailed Cadence software files to his home in 1995 and had once served as a consultant to the rival company. Security experts say such cases--and thousands of other embarrassing leaks that companies don't want to make public--aren't mindless paranoia. From Dumpster diving to international data theft, cases of legal and illegal espionage at all levels are on the rise. According to a study by the American Society for Industrial Security (ASIS) and consulting firm PricewaterhouseCoopers, Fortune 1000 companies sustained losses of more than $45 billion in 1999 from the theft of proprietary information--up from mid-'90s estimates from the FBI pegging the cost at roughly $24 billion a year. The average Fortune 1000 company reported 2.45 incidents with an estimated loss per incident in excess of $500,000. More troubling: Forty-four of the 97 companies that participated in the ASIS survey reported a total of more than 1,000 separate incidents of theft. Tech companies reported the majority of those incidents. The average tech firm reported nearly 67 individual attacks. The average theft was pegged at $15 million in lost business. High-tech booty What are spies after? Customer lists from high-tech companies are the No. 1 stolen item--making dot-com start-ups, software firms and Internet service providers, which typically keep extensive customer lists in their marketing departments, prime candidates for espionage. Financial data, research and development work, merger and acquisition plans, unannounced product specifications, and prototypes round out the ASIS list of hot commodities. Experts say the message of this study and others is simple: The average tech company has too many leaks and needs to batten the security hatches. "Most companies don't have the ability to detect when these problems are even occurring," said Ira Winkler, author of "Corporate Espionage: What It Is, Why It Is Happening in Your Company, What You Must Do About It" and president of The Internet Security Advisers Group. Winkler estimates that blatant, illegal espionage attacks penetrate the average Fortune 2000 company two to three times per year. But most companies are completely unaware of the pillage. When competitors come out with a similar product, service or production method, victimized companies often chalk it up to fierce competition or dumb luck. "Companies have got to go ahead and do the basic security things. Keep audit logs when people access computers and sensitive information. Keep important information on a need-to-know basis. Require employees to change passwords frequently," Winkler said. "Usually companies have policies for that, but rarely do they enforce them." Although spies may penetrate tech companies more than other companies, high-tech firms are not alone in their struggles with espionage. Legendary intrigue The most colorful and high-stakes case embroiled General Motors and Volkswagen for much of the 1990s. The cased hinged on a ring of Latin employees led by a hard-charging Basque expatriate named Jose Ignacio Lopez de Arriortua. Lopez was head of purchasing for GM and defected abruptly to VW in 1993. GM accused Lopez of masterminding the theft of more than 20 boxes of documents on research, manufacturing and sales. Much of the allegedly pilfered data involved blueprints for a super-efficient assembly plant--a factory that GM believed would topple VW's dominance of the small-car market in emerging markets of Eastern Europe, China and elsewhere. The world's largest international corporate espionage case officially ended in 1997, when VW admitted no wrongdoing but settled the civil suit by agreeing to pay GM $100 million in cash and spend $1 billion on GM parts over seven years. In 1998, German prosecutors dropped criminal charges of industrial espionage against Lopez, who resigned from VW in 1996 and was injured in a car accident in Spain two years later. But Germany made Lopez donate $224,845 to charity. In "War by Other Means: Economic Espionage in America," author John Fialka writes that foreigners are pillaging confidential information from unwitting bureaucrats and U.S. companies in all industries. Although one Amazon.com reviewer from Silicon Valley dismissed the 1997 tome as "alarmist and overly paranoid," the book was widely trumpeted as a wake-up call to corporate America. Fialka recounts a 1991 incident in which spies posing as garbage collectors scoured the trash cans outside the Houston home of a U.S. defense contractor executive. One of the ostensible garbage men turned out to be France's consul general, who said he was collecting fill for a hole in his yard. Not so, said the FBI, which suspected he was searching for secrets in part of a 30-year effort by the French government to reap U.S. scientific or military secrets. The book also recounts a vast Japanese corporate spy ring. The group stole U.S. research into tilt-wing aircraft that represented four decades' worth of Bell Helicopter experimentation, $3.5 billion of U.S. government investment, and $17.8 billion in potential U.S. exports. Spies on the rise Experts pinpoint several reasons for heightened spy activity. The end of the Cold War, which began when the Berlin Wall fell in 1989 and culminated when the Soviet Union dissolved in 1991, ended much of the storied espionage between the USSR, China and the West. But experts say that after a brief respite from spy activity, espionage resurfaced. Instead of international political and military espionage, it became corporate. By 1997, the FBI reported that 23 foreign governments were systematically scouring American companies of intellectual assets. The rise of email as the de facto means of sending messages across companies and the world has heightened the danger. Hackers can intercept email on the Internet more easily than they can tap into a phone call, and skilled spies can even penetrate a company's intranet. "The Spartans and Athenians went through each other's garbage 1,000 years ago--that's nothing new," said Harris Miller, president of the Information Technology Association of America. "But now we're seeing more virtual corporate espionage...Rather than someone (breaking) into a physical building and (prying) open a file cabinet and (taking) out documents, the new challenge is for someone to break into an intranet and steal documents that are being sent back and forth in the company." Virtual and physical corporate espionage reached such a pitch--and corporate victims including GM, Intel, Hughes and Lockheed Martin raised such a fit--that Congress passed the Economic Espionage Act of 1996. As a result, theft of trade secrets became a federal offense, with prison sentences of up to 15 years and fines of up to $500,000 for individuals. Domestic thieves who sing to corporate rivals face fines of up to $250,000 and jail sentences of up to 10 years. But the law hasn't curbed the broader corporate trends that are fueling espionage, especially in the tech sector. International security hot spots The increasingly global world of commerce means that more tech companies are setting up shop in places such as China and Japan. ASIS says the "weakest link" in security is often the small sales office in a foreign country, where employees enjoy easy access to the company intranet but have little face-to-face contact with or loyalty to top executives. According to ASIS, the top five countries cited as security risks are the United States, China, Japan, France and the United Kingdom. Mexico and Russia, meanwhile, have the highest increase in spy activity. Another factor: The tech industry is increasingly becoming an industry of contractors--hired guns who write software or set up Web sites for three months to a year before moving to the next job, often at a rival firm. ASIS found that roughly 20 percent of workers at Fortune 1000 companies are temporary or part-time workers. Although companies often require regular employees to sign non-compete clauses, in which employees promise not to work for a direct competitor for a year or more after they quit, contractors sometimes fall under the legal radar. ASIS found that few companies do thorough background checks on temps, yet most have no qualms assigning them to work with sensitive data. Despite alarming statistics, some tech workers say espionage fears are overblown. The vast majority of companies respect the trade secrets of their rivals, they say. Intel spokesman Chuck Mulloy didn't deny that many companies rely on defectors from rivals to determine competitors' plans. There is no specific law forbidding questions about a worker's current employer in a job interview, as there are laws against inquiring about age, marital status or religion. But in Broadcom's case, Mulloy said, the company overstepped its legal boundaries concerning trade secrets. "I don't think this is run-of-the-mill, which is why there's litigation pending," Mulloy said. "They had four pages of notes about unannounced products, including a blocked diagram. Nowhere in those four pages of notes could we find reference to this interviewee's job history, job performance, salary requirements. This was not a job interview--it was a case of a company trying to get our trade secrets." *-------------------------------------------------* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen. Alfred. M. Gray, USMC --------------------------------------------------- C4I Secure Solutions http://www.c4i.org *-------------------------------------------------* 710 From: James M. Atkinson, Comm-Eng Date: Thu Jun 29, 2000 7:00pm Subject: Oracle spying just business as usual Published Thursday, June 29, 2000, in the San Jose Mercury News Oracle spying just business as usual http://www.mercurycenter.com/premium/front/docs/astroturf29.htm Microsoft rivalry `like a political campaign' BY TRACY SEIPEL AND MATT MARSHALL Mercury News The latest tangle between arch-rivals Oracle and Microsoft may not be familiar to MBA students of Silicon Valley business, but it certainly is to experienced political consultants. Microsoft, after all, was only conducting an ``astroturf campaign'' or creating an artificial grass-roots effort by funding friendly groups to advance its interests. And Oracle was only engaging in ``opposition research'' in trying to expose the ties. ``This is just like an old-fashioned political campaign, with both sides digging up dirt on both sides, scorch-earth politics and all,'' said Kevin Spillane, a Sacramento based political consultant. ``Instead of elections, it's now fighting over billions of corporate dollars.'' On Wednesday, Oracle CEO Larry Ellison admitted his company hired Investigative Group International, a detective agency based in Washington, D.C., to research groups and institutions that publicly defended Microsoft last year during the heated federal antitrust trial. Ellison denied he knew the details of how the investigators worked, which included trying to bribe janitors to obtain one non-profit's trash. But Ellison claimed Oracle was only trying to out the truth. ``Our whole intent is to make everything public and we would love it if Microsoft would play by the exact same rules,'' said Ellison during an interview with the Mercury News on Wednesday. ``We don't like doing this. We've never had to do this for another competitor.'' Valley not surprised Reaction around Silicon Valley varied from a ``no comment'' from Sun Microsystems CEO Scott McNealy to ``not surprised'' by Ruben Barrales, president and CEO of Joint Venture: Silicon Valley, a non-profit civic group. ``Welcome to the big leagues,'' Barrales said. ``Oracle and Microsoft are two of the all-star players in the biggest league of all. And you're going to find the kinds of tactics that some have come to expect unfortunately in politics to be seen in the business world.'' However, for experienced investigators, the imbroglio makes the high-tech wizards of Silicon Valley look like the gang that couldn't snoop straight. ``I laughed,'' said David Fechheimer, a veteran San Francisco private eye who has known Terry Lenzner, chairman of IGI, for years. ``It was pretty poor detective craft because the very idea of identifying yourself and leaving a trail when you're hired to discreetly obtain information . . . is not discreet.'' Nor was it very surprising to Fechheimer. ``This goes on all the time in all sorts of businesses,'' he said. ``It's not that IGI discovered a new, low road to follow. It's only that they embarrassed themselves to death.'' Political consultants can cite plenty of examples of one camp trying to establish front groups while the opposite camp tries to expose them. Last March, then-Republican presidential candidate Sen. John McCain argued he was being sandbagged in New York by $2.5 million ads whose source was not accurately identified. He argued that ads sponsored by ``Republicans for Clean Air'' should be pulled unless relabeled. In fact, McCain said they were sponsored by Sam and Andrew Wyly, supporters of Texas Gov. George W. Bush, and that the Federal Communications Commission should block the ads. FCC Commissioner Gloria Tristani agreed with him, and called upon the full commission to take action. Astroturf campaigning isn't new to business either. Cliff Staton, a political consultant with Staton & Hughes in San Francisco, said energy companies have set up their own groups designed to combat environmental organizations. Exposing front groups With friendly names like the ``Coalition for a Sound Energy Future,'' these groups appear to be balanced voices, he says, but their members are often on retainers from the oil companies. Battles have also been waged between the tobacco industry and anti-smoking groups. In March, FCC Commissioner Tristani referred to a case in Oregon in which she said the Tobacco Institute had created a front group to sponsor pro-smoking ads. In the late 1990s, a California anti-smoking organization, the Americans for Nonsmokers Rights Foundation, funded by state tax dollars, compiled an ``enemies list'' aimed at exposing front groups supposedly used by the tobacco industry to fight tobacco-control programs. Meanwhile, on Wednesday, one non-profit investigated by Oracle rejected the idea it was fronting for Microsoft publicly. Allison Rosen, a spokeswoman for the Association for Competitive Technology in Washington, D.C., one of the alleged pro-Microsoft groups that were targeted, said Microsoft is just one of many other of the group's 1,000 dues-paying members. She said the group's members include Excite@Home, which competes with Microsoft's MSN Internet service, and Symantec, which competes with Microsoft in the field of software development tools and utilities for Windows. She refused to comment on how much of the group's funding comes from Microsoft, saying it was a policy not to talk about membership dues. But Rosen criticized another Washington-based organization, the Project to Protect Competition & Innovation in the Digital Age, otherwise known as ProComp, which she said comprises nine large companies that are competitors to Microsoft, including Oracle. She said the group is ``very single-mindedly'' orchestrating a campaign in support of the government's case against Microsoft. ``This is all that they are doing: coordinating the attack. That is not at all comparable to what we've been building here.'' Tech world goes political In the end, the Oracle-Microsoft incident may show that big business has learned techniques from the very politicians they sometimes scorn. ``The high-tech industry was sort of dragged kicking and screaming into the world of Washington politics,'' said Larry Makinson, executive director of the Center for Responsive Politics, a Washington, D.C., research group that tracks money in politics. ``And now it seems they picked up a few tips they can use in their own backyard.'' Mercury News Staff Writers Margaret Steen and Cecilia Kang contributed to this report. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 711 From: William Knowles Date: Fri Jun 30, 2000 0:16am Subject: Soviet spy crippled U.S. intelligence ahead of Korean War, report says http://www.nandotimes.com/noframes/story/0,2107,500222523-500318496-501790954-0,00.html By DAVID BRISCOE, Associated Press WASHINGTON (June 29, 2000 6:12 p.m. EDT http://www.nandotimes.com) - A Russian spy working in military security crippled U.S. intelligence gathering in the critical period prior to the Korean War, a newly declassified report says. The National Security Agency report on cryptology says William Weisband, described as a linguist recruited by Soviet intelligence in the 1930s, caused "perhaps the most significant intelligence loss in U.S. history." Weisband, who lived in Fairfax, Va., and died in 1967, was never charged with spying, although he was removed from the Armed Forces Security Agency, the NSA's predecessor, and spent a year in prison for refusing to cooperate with a grand jury. The son of Russian immigrants is believed to have passed to the Soviets information about U.S. ability to decipher their messages, which restricted monitoring of the communist bloc after World War II, the report by NSA researchers David A. Hatch and Robert Louis Benson said. In rapid succession, every one of (the) cipher systems went dark," the report said. "This dreary situation continued up to the Korean War, denying American policymakers access to vital decrypts in this critical period." John Earl Haynes, a Library of Congress political historian, said Thursday that Weisband's importance as a spy has been underestimated. "While the evidence they had was plenty convincing, the Justice Department determined that unless they wanted to reveal a lot of stuff, it wouldn't be sufficient for criminal prosecution," Haynes said in an interview. A report Thursday in The (Baltimore) Sun described Haynes as one of the first people outside the intelligence agencies to focus on Weisband's role. The NSA historical analysis is part of a series of documents officials hope to declassify as part of the 50th anniversary of the Korean War, which lasted from 1950 to 1953. The report analyzes U.S. intelligence gathering leading up to the Korean War and says monitoring of Korea was not a high priority until the surprise invasion by North Korea in June 1950. U.S. officials were caught unprepared for the invasion or for China's entry into the war later that year. The report said some North Korean communications were intercepted between May 1949 and April 1950 because the Koreans were using Soviet communications procedures. But coverage was dropped once analysts confirmed the non-Soviet origin of the material. Approximately 200 messages had been intercepted by the time the war began, but none had been processed, it said. Prior to the outbreak of war, there were at least two hints of "more than usual interest in the Korean peninsula by communist bloc nations," the report said, but neither was sufficient to provide a specific warning of the June invasion. One was an increase in Soviet targeting of communications in South Korea and the other was large shipments of bandages and medicines from the Soviet Union to North Korea and Manchuria starting in February 1950. "These two actions made sense only in hindsight," the report said. Even later analysis of the unprocessed messages disclosed no message that would have given advance warning of the invasion, the report said. *-------------------------------------------------* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen. Alfred. M. Gray, USMC --------------------------------------------------- C4I Secure Solutions http://www.c4i.org *-------------------------------------------------* 712 From: Robert G. Ferrell Date: Fri Jun 30, 2000 9:53am Subject: Secure Deletion of Data Hi folks, In reference to an earlier discussion of the pitfalls inherent in erasing data from magnetic media, here is a fairly comprehensive look at the subject from a counter-espionage perspective by Peter Gutmann at the University of Auckland. A bit dated (1996), but still useful technical background info, with an extensive bibliography. http://www.fish.com/security/secure_del.html Cheers, RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 713 From: James M. Atkinson, Comm-Eng Date: Fri Jun 30, 2000 8:19pm Subject: High-Tech World Has Low-Tech Spying Friday June 30 2:21 PM ET High-Tech World Has Low-Tech Spying http://dailynews.yahoo.com/h/ap/20000630/tc/corporate_spy_vs_spy_1.html By CLIFF EDWARDS, AP Technology Writer SANTA CLARA, Calif. (AP) - Transmeta chief executive David Ditzel chuckles at the memory of the sudden interest in the company's trash weeks before taking the wraps off its top-secret new Crusoe computer chip. But with hundreds of millions of dollars of research on the line, keeping the microprocessor's specifications secret was no laughing matter. Ditzel and other employees at Transmeta's sprawling low-rise office complex, located in an area tightly packed with semiconductor companies, kept a careful watch on the trash bins and chased off several people, including one whose car bore the bumper sticker of a well-known rival. ``We made sure all they got were orange rinds,'' said Ditzel, who kept the company's mission secret for five years until January despite heavy interest from the media and industry. Even Oracle Corp.'s hiring of detectives to dig up information on archrival Microsoft Corp. (NasdaqNM:MSFT - news), didn't shock executives in Silicon Valley, where ``security'' companies hired by many of those firms say it is standard procedure to get down in the dirt to muddy the image of competitors or profit off their work. ``Dumpster diving,'' hacking, bribery, hiring away key employees - even not-so-casual conversations with unsuspecting relatives of company executives, have become conventional tools in the unconventional business of corporate espionage. Fortune 1,000 companies lost more than $45 billion last year from trade theft, according to a survey by the American Society for Industrial Security and PricewaterhouseCoopers. Other estimates put the figure closer to $100 billion. But in the game of spy vs. spy, few players are willing to admit involvement unless caught in the act. In recent years, admissions of unorthodox tactics have come from companies including Microsoft Corp., America Online Inc. (NYSE:AOL - news), and this past week, Oracle. Larry Ellison, the Oracle chairman, said he authorized payments to a private detective agency to spy on several trade and policy groups that publicly supported Microsoft in the federal antitrust case. He portrayed his efforts as a public service, although Oracle would benefit directly from a wounded Microsoft. According to executives at firms who do corporate espionage, what has been dubbed ``Larrygate'' by some is by no means an isolated incident. ``Corporate wars are just like real wars: They're ugly, and they are won and lost in the details,'' said Eric Dezenhall, whose Washington firm Nichols-Dezenhall hires private detectives, former CIA, FBI, Drug Enforcement and other law enforcement officers for corporate investigations. ``A company might not want to know how you got the information, but they still want the information,'' Dezenhall said. ``To survive in a more competitive climate, corporations need to resort to unconventional resources, and some of those resources include using deceit to stop an attacker. ``I tell them if you live by the sword, you may die by the sword. But if you live by the olive branch, you still may die by the sword,'' he said. Experts say high-tech companies are especially vulnerable to espionage. They often work to promote a casual atmosphere to their employees and overlook establishing security procedures in their rush to get out new products. Security guards are rarely posted in many companies' lobbies, doors go unlocked, computers lack intrusion safeguards. ``You can expect that your adversary is going to come through the path of least resistance, the one gateway that you didn't secure, whether it's your trash or your Internet gateway,'' said Amit Yoran, chief executive of RIPTech, a security-monitoring company. ``It's not something that's openly talked about, because most people think it does smell,'' Yoran said. ``But you have to realize this is a global economy we're now talking about; in the international and global economies where we are competing, these are commonly accepted business practices.'' On several occassions at optical data-switching equipment manufacturer Cyras Systems Inc. of Fremont, Calif., two men in black suits entered unannounced and made a beeline for the company's engineering department before being stopped. Cyras Systems hired plainclothes security guards to patrol the corridors and ordered new ID cards after one incident in which a man told an employee he was there ``to browse,'' said company spokesman Gary Clemenceau. And earlier this month, the company hired guards at a West Coast trade show after a crate containing sensitive equipment was broken into. ``The space is increasingly competitive, and if they can't invent it, they'll try to steal it,'' Clemenceau said. ``Unfortunately, that means many of us are having to `Big Brother'-up the place.'' Industry analysts say many such companies are doing the same. They estimate slightly more than 80 percent of the world's companies with a market capitalization of more than $1 billion have a formal intelligence program to either gather information on competitors or protect their own information. Forrester Research in its ``B2B Information Warfare'' report found that while corporate spending on security represents just a fraction of total expenditures, the security spending has risen by a factor of 10 in just two years. ``No one knows the total size of the problem, but even if they don't talk about it and even if they're not quite sure what they're afraid of, it's clear they see the risk,'' said senior analyst Frank Prince at Forrester's e-business infrastructure group. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 714 From: James M. Atkinson, Comm-Eng Date: Fri Jun 30, 2000 9:40pm Subject: Sex, bribes and the corporate spy's role Friday, June 30, 2000 Sex, bribes and the corporate spy's role http://www.scmp.com/News/Business/Article/FullText_asp_ArticleID-20000 630013310633.asp REUTERS in Washington The revelation that Oracle hired a private detective agency to investigate groups that support rival software giant Microsoft has drawn renewed attention to boardroom spy tricks that can range from office-bugging to sex traps. The private-eye tactics used in the software industry disclosed this week underline the high-stakes corporate competition that can, in some cases, boil over into plots befitting a corporate James Bond. R. James Woolsey, US President Bill Clinton's first CIA chief, said the biggest spy threat to US corporations came not from one another but from foreign intelligence organisations working on behalf of their countries' companies. "Whether it's using sex or stealing briefcases while you're out at dinner", US business people, particularly those in high-technology with military applications, were often targets when travelling abroad, he said. But the flap pitting Oracle against Microsoft threw a light on the bitterness dividing the corporate titans vying for dominance of the multibillion-dollar global software market. Oracle chairman Larry Ellison has long been a bitter critic of Microsoft chairman Bill Gates and Microsoft's competitive tactics. Oracle, the world's second-biggest software-maker, acknowledged on Tuesday it had hired a detective firm to investigate groups sympathetic to Microsoft, the industry leader. The detective agency, Investigative Group International (IGI), allegedly offered janitors cash for trash from the Washington office of one of the pro-Microsoft trade groups, the Association for Competitive Technology (ACT). Microsoft condemned Oracle's involvement in hiring IGI. An ACT spokesman, Allison May Rosen, said her organisation was considering legal action against both the detective firm and Oracle for alleged dirty tricks. Jeffrey Zuck, president of the association, said he was "shocked and saddened" by the purported US$1,200 offered to a cleaning crew on June 6, the second such alleged undercover effort in Washington to gather documents that might embarrass Microsoft. Oracle said it had been seeking to uncover links between Microsoft and the groups during Microsoft's landmark antitrust battle with the government. "Left undisclosed, these Microsoft front groups could have improperly influenced the outcome of one of the most important antitrust cases in US history," Oracle said. The company - named after a CIA project that was its first commercial contract - said it had no knowledge of any illegal activities by its contractor. It said it had ordered IGI to stick to the law. IGI founder Terry Lenzner, a one-time Watergate scandal investigator, did not return a telephone call seeking comment, but has said in the past that his firm abides strictly by the law. "Dumpster diving" may not break any US law, but it is just one tactic that may be used by firms - or foreign intelligence agencies - to gather competitive intelligence on rivals or steal their secrets. Sex is an old standby, according to investigators. Just this week, the General Accounting Office, the audit arm of Congress, highlighted the use of the tactic to win over US nuclear scientists, even in countries deemed non-threatening to the United States. One US scientist admitted to "extensive sexual contact with women from the host country and another 'sensitive' country while on foreign travel", the report said. "This included a prostitute, a waitress and two female employees at the facility where he was visiting." =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 715 From: A Grudko Date: Fri Jun 30, 2000 2:47am Subject: AR8200 I just got an AR8200 and it has an unusual socket for the data link - it looks a bit like a modular network socket. The dealer wants over $100 for a cable into my Compaq serial port....sounds like a rip off to me. Anyone know what the correct name of the plug is and where I can get one? I have plenty of serial cables lying round and this bit of plastic & copper can't be more than a couple of $s. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust "When you need it done right - first time" ICQ 78711262 716 From: A Grudko Date: Fri Jun 30, 2000 2:36pm Subject: Fw: Paul - sources > ----- Original Message ----- > I too would be interested in some of these, mainly the downconverters. > Comments: > Take a look at www.downeastmicrowave.com > They make great stuff, I ordered a 1540MHz preamp and they sent it > within a week. > > > It works really well, and can be externally powered from 12V dc. I think this is a company that provide made up parts or kits for 1296 13cm ham band, preamps etc. There is a low noise 2 stage version for satellite use, a Gasfet front end and MMIC main gain; approx 30db, however, they have a limited bandwidth, 1000-1600 mhz > 2. Subcarrier receiver for use with R-71, R-8500 or AOR > AR5000. Tunable for all SC freqs > and connects to receiver. Also usable direct on mains/tel > lines for CC detection. > You could use another scanner (AFAIK) to tune in the 10.7MHz IF out > segment from the AR5000. > I dont think so. How? My understanding is the signal has to be demodulated before ANY subcarrier appears! The loading or bandwidth of the demod has a direct relationship to the level of signal available from its output, including the bandwidth of the pre-detector RF. An FM detector has to have a buffered, non de-emphasised, output to feed the subcarrier detector chain.. The RF level will reduce the further up the subcarrier range you go and eventually disappear in the noise., A scanner will not normally have this output available...unless its spec shows it's for data use e.g. 9600 bd and above, paket data use. An AM syncronous detector, for AM subcarriers on FM sound channels! Mostly used on cable tv scramblers to feed the sync. gating signals....... These types of demods are very linear..... Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust "When you need it done right - first time" ICQ 78711262 717 From: A Grudko Date: Fri Jun 30, 2000 3:37pm Subject: Fw: Bugged computer? ----- Original Message ----- > We made a small software program that decoded Logitech's wireless keyboards > data, using a scanner and a PC with Win98 and a sound card...it worked > wonders with a directional antenna and a decent receiver. We couldn't hack > the mouse, although we're working on it. > Wonder what someone with money could do ;-) I guess you sniffed the RF channel, one way, as the kbd only requires a one way link. The return is only used to set the key repeat rate and P.O.S.T on power up to check for stuck keys, and also to set the num lock lights on I think the mouse is similar comms..... try swopping the keyboard and mouse connectors over with "Terminal" running to see what I mean Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust "When you need it done right - first time" ICQ 78711262 718 From: James M. Atkinson, Comm-Eng Date: Fri Jun 30, 2000 11:29pm Subject: Sub-Carriers "Dogs have fleas..." A Bomber Pilot, a Chaplain, and Stripper walk into a bar ... (oops, wrong message) ;-) Please allow me to shed a little illumination of the discussion about Sub-C signals and how they relate to TSCM. Before I start rambling on about the subject let me point out that it takes at least 2-3 days of classroom instruction to teach a TSCM'er to deal with Sub-C threats, this posting just barely addresses the subject. 1) A Carrier must first be demodulated first before extracting any SubCarrier 2) A SubCarrier is a secondary signal (or signals) CONCEALED inside the bandwidth of another signal. 3) The primary carrier may be modulated any number of ways including FM, AM, Pulse and so on. 4) Ditto on the SubCarrier 5) The most popular FM broadcast band "Sub Carriers" are based on the 19 kHz pilot signal. 6) The most popular TV broadcast band "Sub Carriers" are based on the horizontal retrace signals (15/15.734 kHz). 7) There are minor variations to the number 5 and 6, but they are limited, and may include fractional signals. 8) SubCarrier signals may be voice, data, telemetry, video or any number of other signals (ie: LoJack, water meters, alarm systems, weather reports, fax transmissions, Medical Paging systems, GPS correction signals, etc). 9) SubCarrier signals may (and often do) include tone masking or other signals to deceive the TSCM specialist. 10) Do not confuse a VLF or carrier current signal with a SubCarrier signal... the delineation is that a SubCarrier signal is WITHIN THE BANDWIDTH of another signal. Of course you can have a Carrier Current signal that contains a SubCarrier signal. 11) The "cleanest" way to handle SubCarrier is to use TWO spectrum analyzers, or a multi-channel SA. 12) Use the first spectrum analyzer to measure the bandwidth of the primary carrier (in the case of a typical FM radio station this would be +/- 75 kHz) 13) Next, place the first SA into zero span mode and demodulate the primary signal (the display on the SA will look like an O'Scope) 14) Grab the video signal (Y-Axis) coming out of the back of your SA and feed it to your second SA (or the second channel on your primary SA). Hint: Some spectrum analyzers used for TSCM have more then one frequency domain input. 15) Now display the demodulated signal from the first SA on the 2nd SA (in the Freq. domain), and the SubCarrier peaks should appear with no problem. 16) After you identify the SubCarrier you will find it helpful to filter out the primary signal. In the case of an FM/TV SubCarrier you would kill everything below 15 kHz or so by around 40 dB. 17) Also, once you identify the bandwidth of the SubCarrier you will find it helpful to filter everything outside the bandwidth of the signal. 18) Now place the 2nd SA in Zero Span mode, and observe the signal in the time domain and feed the Y axis into an O'Scope, audio amp (if audio) or RAID system (if the signal is repetitive) for further analysis. 19) Of course you can replace either or both SA's with a Sub-C receiver, but do so at your own risk, as you will miss hostile threats. On the other hand you can use a simple SubCarrier demodulator (on your primary SA Y-Axis output) to save copious time in lower threat situations. 20) If you like living dangerously you can use a scanner to pick up the primary signal, tie into the discriminator circuit (just before the low pass filter before the audio amp), and dump it into an SCD-5 (but make sure you get the right impedance input for your application). 21) Always keep in mind that a primary signal may actually have more then one SubCarrier signal. 22) Yes, a SubCarrier can have a SubCarrier. Always remeber... "Dogs have fleas upon there backs to bite um, and fleas have lesser fleas, and so on infinitum..." 23) I STRONGLY encourage people to check the entire bandwidth of the primary carrier, then check the entire bandwidth of any and ALL SubCarrier signals, and then carefully check the frequencies between all SubCarriers. 24) One thing to watch out for are SubCarrier inside ASYNCHRONOUS signals (as opposed to synchronous), and SubCarrier inside pulse modulated signals 25) Here is a good example of pulse modulated SubCarriers: A 30 mV pulse modulated signal riding on the AC mains in traverse mode (at 13 ohm impedance), the signal that comes out of a computer can contains an audio monitoring device/microphone. The device intercepted audio, converted it to a pulse modulated signal, and impressed that signal onto what looked like a "leaking" pulse modulated timing signal (from the video circuit). The results was a pulse modulated audio signal riding inside "the jitter" of another pulse modulated signal. 26) SubCarrier signals often are very narrow bandwidth, with 5 kHz or less being fairly popular. 27) "The bug" may actually impress the SubCarrier into a pre-existing broadcast signals. For example the spy could have his bug pick up a local FM or TV broadcast station, and simple re-transmit it, except with an extra signal inserted. 28) Remember to check all energy for any curiosities, and always investigate in at least the Frequency (SA), Time (O'Scope), Space (DF), and Code domain in addition to the Modulation domain. Just my humble opinion (grin) -jma PS: "Greets" and a hardy welcome to the 50+ .gov/.mil folks lurking on the list. > > 2. Subcarrier receiver for use with R-71, R-8500 or AOR > > AR5000. Tunable for all SC freqs > > and connects to receiver. Also usable direct on mains/tel > > lines for CC detection. > > > You could use another scanner (AFAIK) to tune in the 10.7MHz IF out > > segment from the AR5000. > > > I dont think so. How? >My understanding is the signal has to be demodulated before ANY >subcarrier appears! The loading or bandwidth of the demod has a direct >relationship to the level of signal available from its output, including >the bandwidth >of the pre-detector RF. > >An FM detector has to have a buffered, non de-emphasised, output to feed >the > subcarrier detector chain.. The RF level will reduce the further up the >subcarrier range >you go and eventually disappear in the noise., >A scanner will not normally have this output available...unless its spec >shows it's for data use >e.g. 9600 bd and above, paket data use. > >An AM syncronous detector, for AM subcarriers on FM sound channels! >Mostly used on cable tv scramblers to feed the sync. gating >signals....... >These types of demods are very linear..... =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 719 From: Date: Sat Jul 1, 2000 2:58pm Subject: Video Surveillance Laws (or lack thereof) Konnichiwa. From what I have gathered from the news, here in Maryland, U.S., it is not against the law to surreptitiously video a person. It is only against the law to record audio without the parties knowledge. This sounds like an avenue the unscrupulous property owner would avidly exploit. Is my impression of the lack of protective covert video laws in Maryland correct? Shin shin, shin gan. Negative. 720 From: A.Lizard Date: Sat Jul 1, 2000 8:07pm Subject: Re: Schematics Needed for Projects >Message: 1 > Date: Wed, 28 Jun 2000 10:56:43 -0400 > From: "James M. Atkinson, Comm-Eng" >Subject: Re: Schematics Needed for Projects > >At 11:14 PM -0400 6/25/00, Jay Coote wrote: > >I am trying to find schematics for the following so that I can build > >these myself - can someone email me some scans or JPGs of these? > > > >1. Tone sweeper, four separate sweeping tones, voiceband, 0dBM > >level output... to go in a telephone breakout box. > > >I would encourage you to design your own based around the TLC555 >timer circuit using timing caps (it's a good exercise) Is the Intersil 8038 still around? If a more or less pure sine wave is required for the sweep, it's probably a better choice than the 555 for this, since the 8038 chip has an output for sine, square, and triangle waves, the 555 provides square / triangle waves which need to be filtered down to sine waves. Fixed frequencies would simply require the appropriate timing RC, and sweep generation could be provided with another 8038 or with the 555 (cheaper, not that this means much next to one's time.) though the frequency shift input. data sheet from http://www.intersil.com You might want a buffer amplifier for the output, a TLC084 or 074 (TI parts numbers: http://www.ti.com ... and getting their Linear and Digital databooks on CDROM is a good idea) would be a good choice, or perhaps even a 1 W audio amplifier chip for heavier line drive capability. There are lots of them, I'd pick on a basis of what's easy to get. re: Declaration of Independence. If one pledges one's life, one's fortune, and one's sacred honor, sometimes the price is all of the above, and sometimes the only reward is one's continued self respect. A.Lizard ************************************************************************ Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... PGP 6.5.1 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 721 From: James M. Atkinson, Comm-Eng Date: Sat Jul 1, 2000 10:26pm Subject: Re: Video Surveillance Laws (or lack thereof) At 3:58 PM -0400 7/1/00, Negative-@w... wrote: >Konnichiwa. > From what I have gathered from the news, here in Maryland, U.S., it >is not against the law to surreptitiously video a person. It is only >against the law to record audio without the parties knowledge. > This sounds like an avenue the unscrupulous property owner would >avidly exploit. Is my impression of the lack of protective covert video >laws in Maryland correct? > > Shin shin, shin gan. > Negative. The reality is that FEDERAL LAW strongly prohibits the private possession or usage of *** ANY eavesdropping device *** which is capable of passing and/or recording an audio signal. Federal law allows the possession of covert VIDEO gear... but if you have something with a microphone, or that can be readily modified to add a microphone then your screwed if you get caught (it is a serious felony). The little 2.4 GHz clock radio video transmitter your client picked up at the local spy shop (or Radio Shack) is actually a contraband surveillance device as almost all of them have an audio circuit. Something that can also get someone in a pinch is if they take a "legit consumer product" and conceal or modify it in anyway to make it more useful for audio surveillance then it is legally considered an illegal covert surveillance device. For example a little $75 video monitor that someone bought is quasi-legal until you hide it in a Kleenex box. Another little gotcha is that to actually USE OR SELL the equipment it must be on an FCC approved frequency, AND must be FCC approved equipment (yes, even law enforcement stuff). More then a few bad guys have walked on a criminal case when the defense proved the cops used unapproved or modified surveillance gear... Ditto on civil cases (I know of a number of cases where insurance companies had to pay off bad comp cases when their PI got caught using naughty toys). Now STATE laws are quite different, and they range from one extreme to the other... but in all cases audio surveillance is taboo. Monitoring communications is also a touchy issue as a typical Sony, Marantz, or Radio Shack tape recorder is not specifically a surveillance device, and you can generally record your own voice. However, when you record the voice (or communications) or someone else things start getting a little messy. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== From: James M. Atkinson, Comm-Eng Date: Fri Jun 29, 2001 6:48pm Subject: The Polygraph: Does It Detect Lies or Rely on Lies? [What's really funny is that a polygraph examination relies on the ability of the examiner to coerce and deceive the subject, and to thus lead them into a quasi voluntary confession. The entire focus of any kind of polygraph usage is to intimidate the subject, to administer stimulus questions, and then to read the stress the subject feels thus allowing further questions to be developed. The polygraph examiner must rely on the gullibility to the person being interrogated, as the machine itself is little more then a technological prop. -jma] PRESS RELEASE FOR IMMEDIATE RELEASE Contact: Kevin Christopher Phone: (716) 636-1425 ext. 224 Fax: (716) 636-1733 E-mail: press@c... The Polygraph: Does It Detect Lies or Rely on Lies? Amherst, N.Y. (June 28, 2001)-When the FBI announced that it had uncovered Robert Philip Hanssen's 15 years of alleged espionage activities, the immediate question was how an organization like the FBI, equipped with the best investigative tools, could overlook so serious a security breach for so long. An article by the Center for National Security and Arms Control's senior scientist, published in the new July/August 2001 issue of Skeptical Inquirer, suggests that such blunders might be explained by American law enforcement's love affair with the arcane contraption known as the polygraph (a.k.a lie detector). Alan P. Zelicoff is the Senior Scientist in the Center for National Security and Arms Control at Sandia National Laboratories in New Mexico. He offers a scathing indictment in his article for Skeptical Inquirer, titled "Polygraphs and the National Labs: Dangerous Ruse Undermines National Security." Zelicoff compares the polygraph to the ancient Roman practice of divining the future from animal entrails: "Perhaps polygraphers would do better with Wonder Woman's lasso than they have been doing with their box. The secret of the polygraph-the polygrapher's own shameless deception-is that their machine is no more capable of telling the truth than were the priests of ancient Rome standing knee-deep in chicken parts." According to Zelicoff, the four parameters measured by the polygraph-blood pressure, pulse, perspiration, and breathing rate-are all affected by a broad range of emotions, and offer no reliable measurement of deception. Zelicoff says that there are dozens of studies in the past two decades showing that the lie detector cannot distinguish between truth telling and lying. As examples of the polygrapher's dangerous inaccuracy, he points to the cases of spies like Aldrich Ames and the Walker brothers, who passed their polygraph tests repeatedly every five years. He also cites examples of those wrongly accused based on shoddy polygraph evidence, such as FBI agent Mark Mullah whose career was ruined by suspicion, despite the fact that all "evidence" against him was dismissed and his badge was restored. "It is time to relegate the polygraph... to the ash heap of bad ideas and misplaced beliefs," Zelicoff says. The scientist urges that "we should not make the spy's task easier with self-defeating measures like the polygraph." ### Skeptical Inquirer is the official publication of the Committee for the Scientific Investigation of Claims of the Paranormal (CSICOP), a non-profit organization dedicated to science literacy and the examination of paranormal and junk science claims. Published six times a year, the magazine features informed articles and commentary from a critical, scientific perspective. For more information about the magazine or CSICOP, contact Kevin Christopher at press@c... or (716) 636-1425 ext. 224. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3273 From: Miguel Abreu Date: Fri Jun 29, 2001 10:03pm Subject: My name is Miguel Abreu work in domicorp, in the dominican republic the company sell security equipment, and my goal is to learn to become a professional TSCM thanks _________________________________________________________________ Get your FREE download of MSN Explorer at http://explorer.msn.com 3274 From: Date: Fri Jun 29, 2001 6:23pm Subject: Big Brother is watching From USA Today : [Unable to display image] Nearly 80% of major companies keep tabs on employees by checking their e-mail, Internet, phone calls and computer files -- up from 35% in 1997. Source: American Management Association ================================================================== John R. Angier II M-Group P.O. Box 721388 Norman, OK 73070-8070 USA 405.321.1015 "The threat is changing, It's a threat that is using a variety of sources to come at us, and it's a threat that you can't necessarily pin down in a (predictable) scenario." Lt. Col. Dane Reves, U.S. Army, Army Computer Emergency Response Team 3275 From: James M. Atkinson, Comm-Eng Date: Fri Jun 29, 2001 11:16pm Subject: The Brit's Discover the Fine at of "Gerbil-ing" [No doubt that MI5 was also planning to train the Gerbils on how to use Scanlocks, Mason receivers, and Superscouts. -jma] Saturday 30 June 2001 MI5's secret plan to recruit gerbils as spycatchers http://www.telegraph.co.uk/et?ac=003100565149417&rtmo=axaJ3J2L&atmo=HHHHHH8L&pg=/et/01/6/30/ngerb30.html By Michael Smith, Defence Correspondent MI5 considered using a team of highly-trained gerbils to detect spies and terrorists flying into Britain during the 1970s, Sir Stephen Lander, the service's director-general, revealed yesterday. The plan was based on the ability of gerbils to detect a rise in adrenalin from changes in the scent of human sweat. Sir Stephen said the Israelis had put the idea into practice, placing gerbil cages to the side of security checks for travellers at Tel Aviv airport. A suitably placed fan wafted the scent of the suspect's sweat into the cage. The gerbils were trained by Pavlovian response to press a lever if they detected increased adrenalin, receiving food as a reward. The system was never put into practice by MI5 because the Israelis were forced to abandon it after they found that the gerbil could not tell the difference between terrorists and passengers who were scared of flying. Speaking at a conference at the Public Record Office in Kew, Sir Stephen said MI5 archives contained a complete volume on the idea - which was based on Canadian research for the Royal Canadian Mounted Police - written in the 1970s. Although Dame Stella Rimington made a practice of speaking publicly in an attempt to change MI5's secretive reputation, yesterday's Missing Dimension conference was only the second occasion that Sir Stephen has done so. The conference marks a new PRO exhibition on espionage, Shaken Not Stirred, starting today, which includes exhibits on a number of spies including Mata Hari and a spy paid the equivalent of L6.5 million by King George I to spy on the Stuarts. The Missing Dimension refers to the fact that most histories are written before intelligence files have been released and so omit a crucial element of what occurred and why. Sir Stephen admitted that it would be a long time before MI5 would be able to release details of its Cold War activities. ============================== SATURDAY JUNE 30 2001 Why MI5 wanted gerbils with a nose for fear http://www.thetimes.co.uk/article/0,,2-2001223145,00.html BY MICHAEL EVANS, DEFENCE EDITOR THE short, secret role of gerbils in the hunt for suspected hostile infiltrators was revealed by the head of MI5 yesterday. Sir Stephen Lander, Director-General of the Security Service, who was once head of MI5's registry of files, recalled seeing a file which described the special sniffing qualities of the domestic rodent. An MI5 man came up with the idea in the 1970s of using gerbils to detect nervous people arriving at airports. Apparently the Canadians had found that gerbils had such a powerful sense of smell that they could detect the slightest whiff of adrenalin, the chemical released in sweat when human beings are under stress. Sir Stephen, who revealed the tale of the gerbils during a private conference at the Public Record Office in Kew, said that the idea was that rodents were kept in cages and concealed fans wafted air across a suspect's hands towards the animals' nostrils. If the gerbils started to lick their lips at the thought of tasting the salt in the excreting sweat, it would give the game away and the suspect would be led away for further interrogation. The secret plan was dropped after an experiment at a foreign airport in the 1970s showed that the gerbils were far too sensitive to be operationally effective. Passengers were found to be nervous for all sorts of reasons, including suffering from the aftermath of the fear of flying. The file on the gerbils contains three pages and is classed as a "policy" document. It is known as a "shut file" because MI5 feels that it no longer has any need to consult it for future operations. However, the file remains in MI5's archives and will not be released for general consumption until the 1970s files are examined for handing over to the Public Record Office. Sir Stephen's recollection of the gerbils' brief role in intelligence operations came as he spoke of MI5's policy towards releasing secret files. Addressing historians interested in the publication of MI5 records, he told his audience: "The good news is that our files are safely secured and stored in good condition. The bad news, given that the service has worked continuously for over 90 years, is that there is rather less material than you might expect." "There are 400,000 paper files, many multivolume. There is one volume on the security uses of gerbils compared with six on vetting procedures. Many of them are still living entities that record the lengthy interest of the service over decades in a single subject, organisation or individual. Much of our work has long antecedents, knowledge of which is important to our success today.' That was the reason, he said, that files dating back 50 years or more often remained closed when related papers from other government departments were made public. He confirmed that files would eventually be made available on eminent public figures and those involved in important historical events. A small percentage of files on individuals who turned out not to be suspicious was also being kept for future historians, but they would be released when they could not be an embarrassment to the people concerned. A small team of retired agents is working through the files deciding what it is safe to put on view, but they are not expected to complete work on the period up to the end of the Second World War for another three to four years. Some files have been released and more are due later this year, including material from the 1920s and 1930s when the agency's total staff was fewer than 20. The gerbil file will have to wait, along with the huge volume of other material from the Cold War, until after that. Sir Stephen also revealed that MI5 has a programme for videoing and taping interviews with former agents to give a personal flavour to the paper files. The conference was titled The Missing Dimension, a reference to the lack of publicly available intelligence material. Sir Stephen said: "I do not believe that anyone could claim that Intelligence has been totally absent from 20th-century historical studies and that applies to peace as well as wartime material." MI5 had been transferring files to the Public Record Office for public release since November 1997. The first tranche comprised surviving records from the First World War. Since then, there had been a further six tranches, totalling 708 files, largely related to the Second World War, although many files contained prewar material. Sir Stephen said: "There is material in our archives which will add to historians' understanding of 20th-century history. In particular, how successive governments and the Security Service approached non-military threats." ============================== MI5 'recruited gerbils to smell a rat' http://www.ananova.com/news/story/sm_341129.html?menu= MI5 planned to recruit a team of trained gerbils to help expose undercover agents, according to the security service's director-general. The rodents were to play a key role in the interrogation of suspects because their acute sense of smell meant they could detect a rise in adrenalin, the chemical released in sweat when humans feel under stress. Sir Stephen Lander revealed details of the gerbil files during a rare appearance at a conference at the Public Record Office in Kew. Sir Stephen said research for the Royal Canadian Mounted Police in the 1970s had uncovered the gerbil's skill and the Israelis had first put it to the test. They had kept the rodents in cages next to security check areas in Tel Aviv airport. Carefully placed fans wafted the smell of a suspect's hands towards the animals' nostrils. The gerbils were trained to press a lever if they detected increased adrenalin. But MI5 abandoned its plans to use the gerbils after the Israelis discovered that the gerbils could not tell the difference between terrorists and passengers who were scared of flying. At Kew, a team of retired agents is working through some 400,000 files produced by MI5, deciding which are safe to put on public view. Material from the 1920s and 1930s is due to be declassified later this year but the team are not expected to complete work on the period up to the end of the Second World War for another three to four years. Story filed: 03:46 Saturday 30th June 2001 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3276 From: Miguel Puchol Date: Sat Jun 30, 2001 4:06am Subject: RE: AOR AR5000 vs Icom R8500? I've had both receivers side-by-side, and my personal preference is towards the AR5000. I suppose that between these two receivers there is a PC/Mac-like relationship, each has it's adepts. In any case, factual (and personal) findings are: - The Icom is superior in HF. Audio quality, sensitivity are good. - The AR5000 is superior above 1300MHz, for some reason Icom didn't pay attention to the band it covers above 1.3GHz, and it's rather deaf here. The AR5000 could pick up Inmarsat with a Yagi and no pream, whereas the 8500 couldn't. - The AR5000 offers some interesting options, like being able to switch between up to 4 antennas, and easy RS-232 control commands. You can easily write your own software tailored to your needs, the Icom uses CI-V which is more complex. - The Icom is twice as big and weighs twice as much as the AOR, so bear this in mind if you are looking for a portable solution. - The AOR has relays for changing RF steps, so the clicking can be annoying sometimes. For full reviews, specs, etc. you can look at www.strongsignals.net All the best, Mike > -----Mensaje original----- > De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] > Enviado el: viernes, 29 de junio de 2001 22:01 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] AOR AR5000 vs Icom R8500? > > > > This was forwarded to me by a list member who prefers to remain anonymous. > > -jma > > > > > >Have any list members had experience with the AR5000, or the AR5000 > >vs the R8500? > >The AR5000 appears to cover 10 Khz through 2600 MHz- nice for > >carrier current and VLF > >as well as 2.4 GHz monitoring. The Icom R8500 only covers 100 > KHz - 2 GHz. > >But with the above in mind, how do they compare? > > > >(Yes, neither are in the same arena as Watkins-Johnson, Harris > RF, etc...) > > > >Thanks > -- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3277 From: e cummings Date: Sat Jun 30, 2001 10:40am Subject: cellular in lieu of dialout pair i've installed several of these units as emergency backups for fax lines belonging to a major u.s. corporation (after a backhoe sliced through all their phone lines.) http://www.telular.com/products/product_display.asp?productID=38 the compact unit provides standard PSTN dial tone, call progress tones, and ring signals to any RJ-11 POTS equipment, and decodes DTMF and rotary dial signalling--basically a single-line CO and a cellular transceiver in one small box. TDMA, CDMA, and GSM versions are also available. don't forget to include a spectrum search for strong (reverse channel) AMPS/TDMA/CDMA/GSM wireless telephony signals when searching for unauthorized or suspicious phone lines. -e cummings At 05:45 PM 6/29/01 -0400, you wrote: >Yup, > >There is a similar device that uses a cell phone for the dialout pair, but >I forget who makes it. Also, if it were to be done illegally, it's not a >great leap of logic to tie the unit into anybody elses pair at the first >pedestal from the house. And, if the victim lives in an apartment >building.......Katie, bar the door. > > >Shawn Hughes >"Technician in Transition" >formerly, Head, Technical / Electronic Surveillance Unit, Knox County (TN) >Sheriff's Office > > > > >Kirk, > > > >The connection is not something you order through the phone company. It is > >done illegally (or surreptitiously by law enforcement). > > > >The eavesdropper makes a bridge tap onto the suspect line. That tap is then > >connected to a dialer that will be activated when the target line goes off > >hook. The dialer dials out on a separate, bugger-provided line (his own, or > >a borrowed one) to his remote listening post. The circuitry needs to bridge > >the audio from the target line to the eavesdropper's line. > > > >You would be looking for a typical hardwire tap onto the line in question. > >This scenario is one of many that could take place at the end of the tap. > >Rather than running a trace-able hardwire line to the eavesdropper's > >listening post, it would just go to a small box and another phone > >line --still traceable somewhat by checking the dtmf, who owns the 2nd line, > >etc, but the perpetrator could be anywhere in the world. > > > > > >Charles > > > > > > > >charles@t... > >Global Communications > >Tarrytown, NY > >www.telephonesecurity.com > >N2AXO > > > > > My question is how the bugger could order up a dialup line onto the > >target's spare pair? Why would the phone company allow that? It doesn't > >sound feasable. 3278 From: Dave Emery Date: Sat Jun 30, 2001 6:57pm Subject: Re: AOR AR5000 vs Icom R8500? On Sat, Jun 30, 2001 at 11:06:15AM +0200, Miguel Puchol wrote: q> I've had both receivers side-by-side, and my personal preference is towards > the AR5000. I suppose that between these two receivers there is a > PC/Mac-like relationship, each has it's adepts. > - The AR5000 offers some interesting options, like being able to switch > between up to 4 antennas, and easy RS-232 control commands. You can easily > write your own software tailored to your needs, the Icom uses CI-V which is > more complex. One notable difference is that a version of the AOR 5000 (the C version) is available that is fully synthexized and locked to an external 10 mhz standard, so it can be used as a phase coherent downconverter. Most ICOM radios, including I think the 8500, use various crystal controlled but not externally phase locked oscillators so they cannot be used in phase coherent setups or with a rubidium standard for really high accuracy narrow band work. -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 3279 From: Date: Sat Jun 30, 2001 5:24pm Subject: (no subject) Britons held in Dubai over bugging allegations LONDON, July 1 (Reuters) - Eight Britons have been arrested in the United Arab Emirates in connection with illegal surveillance equipment, the British Foreign Office said on Sunday. The seven men and one woman were arrested in Dubai and Abu Dhabi last Tuesday after a series of raids on four British-managed companies, a Foreign Office spokeswoman said. "Dubai police have said they are being held in connection with illegal surveillance equipment," she said. "We understand they are comfortable and well. Consular staff will visit them tomorrow to ensure they have details of lawyers." She could not confirm reports that the raids followed complaints from ruling families about the tactics used by some British expatriates working as private investigators in the UAE. Britain's Sunday Times newspaper said two of those arrested, Michael Sixsmith from Kent and Peter Lockhart-Smith, had British military backgrounds and worked for the Middle East Research Group (MERG). The paper said five worked for SSS Corporate Research, a subsidiary of International Corporate Research. The Foreign Office confirmed the names of the individuals and firms identified by the paper but would not give further details. "We are obviously very worried because they haven't been able to see lawyers and we don't know what they are being held for," the paper quoted International Corporate Research operations director Neil Tunstall as saying. SSS Corporate Research had been investigating trade in counterfeit goods ranging from electrical equipment to fashion, the Sunday Times said. 20:49 06-30-01 3280 From: Aimee Farr Date: Sun Jul 1, 2001 8:02am Subject: Law firms: cheap or stupid? On a legal channel, I mentioned TSCM and law firms in the same sentence. This resulted in a flood of disturbing email, (i.e., "What is TSCM?" ... "What is a sweep?,"... "Is this about hackers?"... "Is it over a few hundred dollars?"....etc.) Two questions: 1. On a scale of 1 to 10...law firms would rate [fill-in-this-blank] in terms of awareness and responsibility (in regard to this stuff, not in a general sense). 2. On a scale of 1 to 10...law firms would rate [fill-in-the-blank] in terms of risk. Responses are confidential. Some discussions with some fairly sizable law firms are... disturbing. Surely I am just talking to the wrong people. Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR Waco, Texas 3281 From: James M. Atkinson, Comm-Eng Date: Sun Jul 1, 2001 8:24am Subject: Re: Law firms: cheap or stupid? At 8:02 AM -0500 7/1/01, Aimee Farr wrote: >On a legal channel, I mentioned TSCM and law firms in the same sentence. > >This resulted in a flood of disturbing email, (i.e., "What is TSCM?" ... >"What is a sweep?,"... "Is this about hackers?"... "Is it over a few hundred >dollars?"....etc.) > >Two questions: > >1. On a scale of 1 to 10...law firms would rate [fill-in-this-blank] in >terms of awareness and responsibility (in regard to this stuff, not in a >general sense). > >2. On a scale of 1 to 10...law firms would rate [fill-in-the-blank] in terms >of risk. > >Responses are confidential. > >Some discussions with some fairly sizable law firms are... disturbing. >Surely I am just talking to the wrong people. > > >Aimee Farr >mailto:aimfarr@p... >LAW OFFICE OF AIMEE FARR >Waco, Texas Aimee, What you just experienced is actually very common., and what is really sad is that law firms are one of the more "at risk" private sector industries, and yet they have almost no awareness of the problem. Sadly, most attorneys engage a PI or an ex-cop to perform bug sweeps and are unaware that this is a most inappropriate engagement. They also tend to resist having preventative measure taken in advance, an are speechless when an actual problem or bug is found. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3282 From: Aimee Farr Date: Sun Jul 1, 2001 9:54pm Subject: RE: Law firms: verdict Cheap AND stupid. Thank you for all your replies. The reason I asked is because I'm about to take a meat cleaver to a senior partner, but I don't have personal knowledge in this area, although I knew your answer. TODAY'S BIG LAW FIRMS: ...associate revolving-door, summer interns, contract lawyers, foreign lawyers, combative marketing, file head-hunting, life-or-death RFP "beauty contests," (written by the same handful of consultants), professional SALES and "pitch" staff, robust marketing depts with director salaries near partner-level, organization-wide intranets, unprecedented access to client information, "paperless offices," new "ancillary" businesses, client-firm partnerships, outsourced services, so-called "franchise firms" out to get their footprint in every state, and globalized practice (foreign adversaries). A $250,000 advertising budget for a firm is considered "challenger category." They go after clients in a strategic manner, although short of violating the letter of solicitation rules. A handful of law firms are attempting to incorporate a less marketing-based intelligence function. TODAY'S LAWYERS: ...many don't have 'practice areas,' but really specialize by industry code classification. Client lists, once ALWAYS private, are on law firm web sites (with consent) and slyly marketed with the lawyers as part of their "individual lawyer marketing plan." As part of conflict screening for a lateral move lawyer, you have to inquire as to his client list and matters he's worked on. And, all that's on top of the "lawyer greeting ritual." Most importantly, today's biz lawyers don't just handle 'matters' -- they are intimate with the day to day activities of their clients. Once pretty much to themselves, lawyers now take "cross-selling" courses to market their clients to other practice groups in the firm. Their contact management databases have every little note and contact imaginable. You make rain to make partner. To do that, you collect a lot of intelligence on clients and prospective clients. ((((( .....GONG!!! )))))) Searched the web for "law firm security". Results 1 - 10 of about 29. Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR Waco, Texas 3283 From: David Alexander Date: Mon Jul 2, 2001 4:24am Subject: Re: Law firms: cheap or stupid? Aimee I have done a lot of infosec consulting for law firms in the UK...and 95% of them couldn't tell sh*t from Christmas when it came not only to the practicalities of it, including TSCM, but also what the law is and requires them to do in those areas. Regards David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 3284 From: James M. Atkinson, Comm-Eng Date: Mon Jul 2, 2001 11:18pm Subject: Spy camera found in restaurant restroom Saturday, June 30, 2001 - 12:00 a.m. Pacific Spy camera found in restaurant restroom http://seattletimes.nwsource.com/html/localnews/134312376_pottycam30m.html A tiny camera hidden above a women's toilet in a Edmonds pizza parlor could be either a case of video voyeurism or internal intrigue within the restaurant's management, police said. Police learned about the camera at Romeo's Pizzeria Restaurant on Thursday, the day after a Seattle television-news crew ran a segment about it, said Edmonds police Detective Don Kinney. It wasn't clear how long the camera had been in place, he said. KIRO-TV received a tip about the restroom surveillance, and a television crew found and removed it Wednesday, Kinney said. The camera lens, about the size of a pencil eraser, had apparently been positioned above a small hole punched into a ventilation grate. Bill Loukas, who helps run the restaurant owned by his father, said he hadn't known about the camera installed above one of two women's stalls at the restaurant, in the 21100 block of 76th Avenue West. Neither he nor the restaurant's manager was present when the television crew shot its footage, he said. Loukas said he had installed about a dozen other surveillance cameras all over the restaurant because of a continuing theft problem involving former employees and managers. Images captured by those cameras were viewed on three monitors in the restaurant's office, Loukas said. He believes he was set up by disgruntled former employees or somebody involved with his divorce proceedings, Kinney said. The police investigation could be difficult, however, because the camera was removed before officers arrived. "Police wish they could have seen it in operation, but police saw nothing," Kinney said. Loukas and Seattle attorney Chris Benis, who represents the restaurant's owners, both expressed dismay that KIRO may have destroyed evidence by pulling down the camera before police were notified. "After they did that there was no way to tell what it looked like, what was there. Everybody touched it; they can't take fingerprints," Loukas said. Helen Swenson, KIRO-TV's news director, yesterday said the news crew had to take apart the vent to confirm the camera's existence. "It's not like it looked like a camera," she said. "We actually had to take it out to see what it was." Kinney said all that remained of the camera set-up when police arrived was about 50 to 75 feet of cable that apparently had connected the camera with the monitors. Even if police determined the camera was installed to spy upon women using the restroom, authorities might not be able to prosecute the case. The state's 1998 voyeurism law, passed after a Kingdome electrician was arrested for planting a camera in the Seahawks SeaGals changing room, requires proof that the camera was installed "for the purpose of arousing or gratifying the sexual desire of any person." "We would look at it and then we would send it up to the (Snohomish County) Prosecutor's Office and try to figure it out," said acting Edmonds Police Chief Greg Wean. Diane Brooks can be reached at 206-464-2567 or dbrooks@s.... Copyright C 2001 The Seattle Times Company -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3285 From: James M. Atkinson, Comm-Eng Date: Tue Jul 3, 2001 7:48am Subject: Spy Agency Reveals Some, Not All Spy Agency Reveals Some, Not All http://www.washingtonpost.com/wp-dyn/articles/A10615-2001Jul2.html By Maureen O'Hagan Washington Post Staff Writer Tuesday, July 3, 2001; Page B01 Hidden along Route 32, in a drab beige building that looks every bit the cheap motel it once was, is America's official museum of secrets. Here, you'll learn about a hush-hush device that historians say shortened World War II by nearly two years (no, not the atom bomb), you'll read tales of unheralded genius and you'll glimpse the efforts of this country's own James Bonds, many of whom resemble the class nerd more than they do 007. In fact, a number were women. The sign outside says, National Cryptologic Museum. It's run by the federal government, but it's a far cry from the Smithsonian Institution. Instead of a prominent spot on the Mall, this museum sits behind a gas station on the edge of Fort George G. Meade in northern Anne Arundel County. Instead of a gleaming marble entrance, it welcomes visitors with a low-slung canopy propped up on spindly columns. Instead of dazzling displays, it houses mysterious exhibits intended, in some cases, to obfuscate as much as explicate. The museum is one of the few peeks the public is allowed into the super-secret National Security Agency at Fort Meade, an organization so sensitive that the government once denied its existence and still won't release its staffing and budget needs. With the museum's opening in December 1993, however, the agency has tried to dispel the conspiratorial rumors that have swirled about it for decades. "I had 30 years where nobody but my family and close friends knew where I worked," said Jack E. Ingram, the museum's curator since 1994. Shortly after Ingram took the job, his face appeared on television, making him the first NSA employee to be shown on camera. "I had to keep pinching myself," he said. The museum now acts as a release valve for other NSA employees. "It's a great venue for us to show our families what we actually do without talking about it," said Bronwen Reagan, an agency public affairs officer. Inside the one-floor building are exhibits showing how Julius and Ethel Rosenberg, the first U.S. civilians executed for espionage, were outted; how the Russians fooled a U.S. ambassador with the help of Soviet boy scouts; and how an American cryptologist broke the codes of a gang of Chinese opium smugglers even though she didn't know a word of Chinese. Don't expect too many details, however. The museum is careful to tell and show only so much. But contemplating the brainpower behind the stories helps fill some of that void. Take Enigma, for example. A World War II-era German machine resembling a typewriter, it featured a system of mechanical rotors and wires that turned words into what was thought to be impenetrable code. The code changed every time a letter was typed, meaning that a mind-boggling one hundred thousand billion billion combinations of letters had to be tried to break the code. The Germans who designed Enigma were smart, but the Allies who solved it were smarter. Explaining to visitors how the code was cracked is difficult if not impossible, both because of the brain wattage required and because the museum doesn't fill in all the gaps. Suffice it to say that, because of the work of more than 120 computers and countless anonymous Einsteins, American cryptologists eventually were able to read a coded Enigma message in a matter of hours. The Germans didn't discover this until 1974, when a controversial book titled "The Ultra Secret" revealed the codebreaking triumph. "It was absolutely the best secret in World War II," said Ingram, one that analysts have concluded shortened the war by almost two years. "Just think of all the lives saved by these people working in secret," Ingram said. There is another side to America's professional secret-keepers, one not touched on at the museum: The NSA has at times monitored not only the activities of other nations but also those of U.S. citizens, as revealed by a Senate investigation in the early 1970s headed by then-Sen. Frank Church (D-Idaho). The agency has since tightened its rules, and officials are adamant in saying it does not spy on American citizens. Still, critics charge that the NSA has the capability to intercept virtually all forms of electronic communication from whomever it likes. Are its eavesdroppers really listening to the world's cell phone conversations? That's a mystery that won't be solved here. C 2001 The Washington Post Company -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3286 From: Craig Snedden Date: Tue Jul 3, 2001 8:14am Subject: Oh No! Not again!! --(Off Topic) Hi all, This is somewhat off topic I know, but since some of the list members also seem to be concerned with Security/Fraud etc. I thought I'd post and be damned...!! Below is the transcript of a e-mail I got this afternoon. I've had these before, but by post. This is the first e-mail one that I have personally had, although I've colleagues who have received them. This is a well known scam (which must work, judging by the fact that it must be at least 15 years old by now. If anyone knows differenct, please let me know). Do any of our US colleagues know of this scam? Are the perpetrators targeting US citizens as much as UK? I'm just curious as I have an open file on this scam, ever since a customer of mine started to be targeted on a very regular basis (it goes in cycles, somtimes as much as 3/4 times a day, othertimes nothing for months). Best regards, Craig ------Transcript---------- Received: from web13702.mail.yahoo.com [216.136.175.135] by paul.fasthosts.co.uk (SMTPD32-6.00) id A2149300D0; Tue, 03 Jul 2001 14:01:08 +0100 Message-ID: <20010703130106.5018.qmail@w...> Received: from [196.2.33.11] by web13702.mail.yahoo.com; Tue, 03 Jul 2001 06:01:06 PDT Date: Tue, 3 Jul 2001 06:01:06 -0700 (PDT) From: Francis Pascal To: admin@d... MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-RCPT-TO: X-UIDL: 271946455 Status: U Subject: ATTN: MANAGING DIRECTOR / C.E.O FROM: MRS. GRACE DESIREE KABILA TEL: +27-72-287-9581 FAX: +27-83-374-4814 PROPOSAL FOR A BUSINESS ASSISTANCE Greetings! I know you will be surprised to read from me, but please consider this letter as a request from a widow in need of assistance. I am Mrs. Grace Desiree Kabila, from the Democratic Republic of Congo (formerly known as Zaire); one of the three wives of Late President of the Democratic Republic of Congo, Laurent Kabila. Your firm was introduced to me by a career diplomat whom I consulted in my search for a reliable company or individual who can assist me in transferring a reasonable sum of money abroad. I, on behalf of my son Mr. Francis Pascal Kabila, decided to solicit for your assistance to transfer the sum of US$18.2 Million (Eighteen Million Two Hundred Thousand United States Dollars) to your personal/company account. This money was part of the money secured by my late husband Laurent Kabila when he was the president of Democratic Republic of Congo. As the wife he relied on, he drew my attention to the money in case of death or other unforeseen circumstances. His fear was actualized on the 16th January, 2001 when he was assassinated by his bodyguard. For your awareness, this fund was personally deposited by my husband in a private security company in Johannesburg, South Africa before his death. I am in possession of all documents involved in the said deposit. The idea of involving you in this transaction is for you to assist me transfer this money to your overseas account for investment purposes. Contact my son who is in South Africa on the above tel/fax. He is in a position to inform you the whole procedure mapped out for a successful transaction. If this proposal interests you, we will discuss the percentage for you and other modalities for a smooth transaction. I have also advised him to contact a lawyer in South Africa for legal reasons. This transaction is totally risk-free on your side, but also requires utmost confidentiality and urgency. NB: Furnish him with your private phone/fax numbers for easier communication. May God bless you as I earnestly hope for your urgent reply. Yours sincerely, MRS. GRACE DESIREE KABILA __________________________________________________ Do You Yahoo!? Get personalized email addresses from Yahoo! Mail http://personal.mail.yahoo.com/ --------END Transcript------------ The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. [Non-text portions of this message have been removed] 3287 From: DrPepper Date: Tue Jul 3, 2001 1:49pm Subject: Re: Oh No! Not again!! --(Off Topic) Right you are, , ,, Give them ANY information, and they gotcha! The first time I heard about this, they wiped out the bank account of some poor schnook who didn't know any better. Beware. they are apparently at it again, , , , , And this is NOT just an urban legend! Greed is everything. Craig Snedden wrote: > Hi all, > > This is somewhat off topic I know, but since some of the list members also seem to be concerned with Security/Fraud etc. I thought I'd post and be damned...!! > > Below is the transcript of a e-mail I got this afternoon. I've had these before, but by post. This is the first e-mail one that I have personally had, although I've colleagues who have received them. > > This is a well known scam (which must work, judging by the fact that it must be at least 15 years old by now. If anyone knows differenct, please let me know). > > Do any of our US colleagues know of this scam? Are the perpetrators targeting US citizens as much as UK? I'm just curious as I have an open file on this scam, ever since a customer of mine started to be targeted on a very regular basis (it goes in cyc > > les, somtimes as much as 3/4 times a day, othertimes nothing for months). > > Best regards, > > Craig > > ------Transcript---------- > > Received: from web13702.mail.yahoo.com [216.136.175.135] by paul.fasthosts.co.uk > (SMTPD32-6.00) id A2149300D0; Tue, 03 Jul 2001 14:01:08 +0100 > Message-ID: <20010703130106.5018.qmail@w...> > Received: from [196.2.33.11] by web13702.mail.yahoo.com; Tue, 03 Jul 2001 06:01:06 PDT > Date: Tue, 3 Jul 2001 06:01:06 -0700 (PDT) > From: Francis Pascal > To: admin@d... > MIME-Version: 1.0 > Content-Type: text/plain; charset=us-ascii > X-RCPT-TO: > X-UIDL: 271946455 > Status: U > Subject: ATTN: MANAGING DIRECTOR / C.E.O > > FROM: MRS. GRACE DESIREE KABILA > TEL: +27-72-287-9581 > FAX: +27-83-374-4814 > > PROPOSAL FOR A BUSINESS ASSISTANCE > > Greetings! > > I know you will be surprised to read from me, but > please consider this letter as a request from a widow > in need of assistance. I am Mrs. Grace Desiree > Kabila, from the Democratic Republic of Congo > (formerly known as Zaire); one of the three wives of > Late President of the Democratic Republic of Congo, > Laurent Kabila. > > Your firm was introduced to me by a career diplomat > whom I consulted in my search for a reliable company > or individual who can assist me in transferring a > reasonable sum of money abroad. I, on behalf of my > son Mr. Francis Pascal Kabila, decided to solicit for > your assistance to transfer the sum of US$18.2 Million > (Eighteen Million Two Hundred Thousand United States > Dollars) to your personal/company account. > > This money was part of the money secured by my late > husband Laurent Kabila when he was the president of > Democratic Republic of Congo. As the wife he relied > on, he drew my attention to the money in case of death > or other unforeseen circumstances. His fear was > actualized on the 16th January, 2001 when he was > assassinated by his bodyguard. > > For your awareness, this fund was personally deposited > by my husband in a private security company in > Johannesburg, South Africa before his death. I am in > possession of all documents involved in the said > deposit. The idea of involving you in this > transaction is for you to assist me transfer this > money to your overseas account for investment > purposes. > > Contact my son who is in South Africa on the above > tel/fax. He is in a position to inform you the whole > procedure mapped out for a successful transaction. If > this proposal interests you, we will discuss the > percentage for you and other modalities for a smooth > transaction. I have also advised him to contact a > lawyer in South Africa for legal reasons. > > This transaction is totally risk-free on your side, > but also requires utmost confidentiality and urgency. > > NB: Furnish him with your private phone/fax numbers > for easier communication. > > May God bless you as I earnestly hope for your urgent > reply. > > Yours sincerely, > > MRS. GRACE DESIREE KABILA 3288 From: Miguel Puchol Date: Tue Jul 3, 2001 3:36pm Subject: RE: Oh No! Not again!! --(Off Topic) Craig, We get these in Spain, always via post, with stamps from Congo or some other african country. The urban legend bit is that they will empty your account just like that, there is no reasonable way to do this, other than if you had internet access to your bank and gave them the access codes (something dumb to do). What happens is that in order for them to tranfer the huge amount of money, they ask you to place a deposit "in proof of good faith" in some numbered account somewhere. This sum can sometimes be quite large - in one of the letters, offering to transfer some $100 million from an oil company, you had to place a $1 million diposit in some account, I believe it was Nigeria. The best defence against this is to simply ignore it. As with all other spam. All the best, Mike > -----Mensaje original----- > De: Craig Snedden [mailto:craig@d...] > Enviado el: martes, 03 de julio de 2001 15:15 > Para: TSCM-L@yahoogroups.com > Asunto: [TSCM-L] Oh No! Not again!! --(Off Topic) > > > Hi all, > > This is somewhat off topic I know, but since some of the list > members also seem to be concerned with Security/Fraud etc. I > thought I'd post and be damned...!! > > Below is the transcript of a e-mail I got this afternoon. I've > had these before, but by post. This is the first e-mail one that > I have personally had, although I've colleagues who have received them. > > This is a well known scam (which must work, judging by the fact > that it must be at least 15 years old by now. If anyone knows > differenct, please let me know). > > Do any of our US colleagues know of this scam? Are the > perpetrators targeting US citizens as much as UK? I'm just > curious as I have an open file on this scam, ever since a > customer of mine started to be targeted on a very regular basis > (it goes in cycles, somtimes as much as 3/4 times a day, > othertimes nothing for months). > > Best regards, > > Craig > > ------Transcript---------- > > Received: from web13702.mail.yahoo.com [216.136.175.135] by > paul.fasthosts.co.uk > (SMTPD32-6.00) id A2149300D0; Tue, 03 Jul 2001 14:01:08 +0100 > Message-ID: <20010703130106.5018.qmail@w...> > Received: from [196.2.33.11] by web13702.mail.yahoo.com; Tue, 03 > Jul 2001 06:01:06 PDT > Date: Tue, 3 Jul 2001 06:01:06 -0700 (PDT) > From: Francis Pascal > To: admin@d... > MIME-Version: 1.0 > Content-Type: text/plain; charset=us-ascii > X-RCPT-TO: > X-UIDL: 271946455 > Status: U > Subject: ATTN: MANAGING DIRECTOR / C.E.O > > FROM: MRS. GRACE DESIREE KABILA > TEL: +27-72-287-9581 > FAX: +27-83-374-4814 > > PROPOSAL FOR A BUSINESS ASSISTANCE > > Greetings! > > I know you will be surprised to read from me, but > please consider this letter as a request from a widow > in need of assistance. I am Mrs. Grace Desiree > Kabila, from the Democratic Republic of Congo > (formerly known as Zaire); one of the three wives of > Late President of the Democratic Republic of Congo, > Laurent Kabila. > > Your firm was introduced to me by a career diplomat > whom I consulted in my search for a reliable company > or individual who can assist me in transferring a > reasonable sum of money abroad. I, on behalf of my > son Mr. Francis Pascal Kabila, decided to solicit for > your assistance to transfer the sum of US$18.2 Million > (Eighteen Million Two Hundred Thousand United States > Dollars) to your personal/company account. > > This money was part of the money secured by my late > husband Laurent Kabila when he was the president of > Democratic Republic of Congo. As the wife he relied > on, he drew my attention to the money in case of death > or other unforeseen circumstances. His fear was > actualized on the 16th January, 2001 when he was > assassinated by his bodyguard. > > For your awareness, this fund was personally deposited > by my husband in a private security company in > Johannesburg, South Africa before his death. I am in > possession of all documents involved in the said > deposit. The idea of involving you in this > transaction is for you to assist me transfer this > money to your overseas account for investment > purposes. > > Contact my son who is in South Africa on the above > tel/fax. He is in a position to inform you the whole > procedure mapped out for a successful transaction. If > this proposal interests you, we will discuss the > percentage for you and other modalities for a smooth > transaction. I have also advised him to contact a > lawyer in South Africa for legal reasons. > > This transaction is totally risk-free on your side, > but also requires utmost confidentiality and urgency. > > NB: Furnish him with your private phone/fax numbers > for easier communication. > > May God bless you as I earnestly hope for your urgent > reply. > > Yours sincerely, > > > > MRS. GRACE DESIREE KABILA > > > > > > __________________________________________________ > Do You Yahoo!? > Get personalized email addresses from Yahoo! Mail > http://personal.mail.yahoo.com/ > > > --------END Transcript------------ > > The data contained herein is confidential. Unauthorised dissemination > of the contents of this e-mail may be in breach of Criminal and Civil law > and may lead to prosecution. > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3289 From: William Knowles Date: Tue Jul 3, 2001 4:00pm Subject: Re: Oh No! Not again!! --(Off Topic) On Tue, 3 Jul 2001, Craig Snedden wrote: Hello Craig and all! > This is somewhat off topic I know, but since some of the list > members also seem to be concerned with Security/Fraud etc. I > thought I'd post and be damned...!! > > Below is the transcript of a e-mail I got this afternoon. I've > had these before, but by post. This is the first e-mail one that > I have personally had, although I've colleagues who have received > them. > > This is a well known scam (which must work, judging by the fact > that it must be at least 15 years old by now. If anyone knows > differenct, please let me know). You might want to check this out: http://www.bbb.org/alerts/nigerian061099.asp What cracks me up is what the Kabila's are worth (a few billion?) and Internet domains in the Congo are around $500 a year that all these mails are from Yahoo or other free mail accounts. :) > Do any of our US colleagues know of this scam? Are the > perpetrators targeting US citizens as much as UK? I'm just > curious as I have an open file on this scam, ever since a customer > of mine started to be targeted on a very regular basis (it goes in > cycles, somtimes as much as 3/4 times a day, othertimes nothing > for months). Since that part of the world is part of my watch lists I get this kind spam mail a little more often than most people, I have been meaning to try to con the con men with a site like this one. http://www.buddyweiserman.com/ Reserve an hour to look it over, you won't be disappointed. Cheers! William Knowles wk@c... > FROM: MRS. GRACE DESIREE KABILA > TEL: +27-72-287-9581 > FAX: +27-83-374-4814 > > PROPOSAL FOR A BUSINESS ASSISTANCE > > Greetings! > > I know you will be surprised to read from me, but please consider > this letter as a request from a widow in need of assistance. I am > Mrs. Grace Desiree Kabila, from the Democratic Republic of Congo > (formerly known as Zaire); one of the three wives of Late > President of the Democratic Republic of Congo, Laurent Kabila. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 3290 From: Aimee Farr Date: Tue Jul 3, 2001 7:08pm Subject: F&S Data Encryption Market report http://www.internetnews.com/bus-news/article/0,,3_795731,00.html ... In fact, new analysis by marketing consulting company Frost & Sullivan entitled "World Military and Government High Assurance Network and Data Encryption Market" states that this industry generated revenues of $176 million in 2000 and is projected to increase steadily to $457.6 million by 2007. ... "Manufacturers must also cater to defense contractors who use similar high-speed encryptors to comply with government security regulations," said Lieske. "Not only must contractors protect sensitive information from global espionage, but corporate espionage has also become a concern." [...] ~Aimee 3291 From: Date: Tue Jul 3, 2001 3:34pm Subject: Freedom * Opportunity * Prosperity * Civil Society * HERITAGE MEMBERS INTERACTIVE ----- www.heritage.org Freedom * Opportunity * Prosperity * Civil Society * ------------------------- Each Fourth of July we're reminded of courageous men who risked everything 225 years ago. On a hot and muggy Philadelphia day, they put forth a document that would define a new, American nation-one not based on race, creed or religion, but on the principles of Liberty, Freedom, and of a government deriving its power from the "consent of the governed." These extraordinary men started a fire that has lit the world, and on this Fourth of July, it is fitting that we remember their sacrifices, their courage, and the virtues that made them who they were. Below is an excerpt from Matthew Spalding's "Independence Forever: The 225th Anniversary of the Fourth of July" http://www.heritage.org/library/backgrounder/bg1451.html A NOTE ON THE SIGNERS OF THE DECLARATION OF INDEPENDENCE "...we mutually pledge to each other our Lives, our Fortunes and our sacred Honor." (Each year information about those who signed the Declaration of Independence is circulated, not all of which is accurate. The following note is based on research in several established sources, which are noted below.) Fifty-six individuals from each of the original 13 colonies participated in the Second Continental Congress and signed the Declaration of Independence. Pennsylvania sent nine delegates to the congress, followed by Virginia with seven and Massachusetts and New Jersey with five. Connecticut, Maryland, New York, and South Carolina each sent four delegates. Delaware, Georgia, New Hampshire, and North Carolina each sent three. Rhode Island, the smallest colony, sent only two delegates to Philadelphia. Nine of the signers were immigrants, two were brothers, two were cousins, and one was an orphan. The average age of a signer was 45. The oldest delegate was Benjamin Franklin of Pennsylvania, who was 70 when he signed the Declaration. The youngest was Thomas Lynch, Jr., of South Carolina, who was 27. Eighteen of the signers were merchants or businessmen, 14 were farmers, and four were doctors. Forty-two signers had served in their colonial legislatures. Twenty-two were lawyers--although William Hooper of North Carolina was "disbarred" when he spoke out against the Crown--and nine were judges. Stephen Hopkins had been Governor of Rhode Island. Although two others had been clergy previously, John Witherspoon of New Jersey was the only active clergyman to attend--he wore his pontificals to the sessions. Almost all were Protestant Christians; Charles Carroll of Maryland was the only Roman Catholic signer. Seven of the signers were educated at Harvard, four each at Yale and William & Mary, and three at Princeton. John Witherspoon was the president of Princeton and George Wythe was a professor at William & Mary, where his students included the author of the Declaration of Independence, Thomas Jefferson. Seventeen of the signers served in the military during the American Revolution. Thomas Nelson was a colonel in the Second Virginia Regiment and then commanded Virginia military forces at the Battle of Yorktown. William Whipple served with the New Hampshire militia and was one of the commanding officers in the decisive Saratoga campaign. Oliver Wolcott led the Connecticut regiments sent for the defense of New York and commanded a brigade of militia that took part in the defeat of General Burgoyne. Caesar Rodney was a Major General in the Delaware militia and John Hancock was the same in the Massachusetts militia. Five of the signers were captured by the British during the war. Captains Edward Rutledge, Thomas Heyward, and Arthur Middleton (South Carolina) were all captured at the Battle of Charleston in 1780; Colonel George Walton was wounded and captured at the Battle of Savannah. Richard Stockton of New Jersey never recovered from his incarceration at the hands of British Loyalists and died in 1781. Colonel Thomas McKean of Delaware wrote John Adams that he was "hunted like a fox by the enemy--compelled to remove my family five times in a few months, and at last fixed them in a little log house on the banks of the Susquehanna . . . and they were soon obliged to move again on account of the incursions of the Indians." Abraham Clark of New Jersey had two of his sons captured by the British during the war. The son of John Witherspoon, a major in the New Jersey Brigade, was killed at the Battle of Germantown. Eleven signers had their homes and property destroyed. Francis Lewis's New York home was destroyed and his wife was taken prisoner. John Hart's farm and mills were destroyed when the British invaded New Jersey and he died while fleeing capture. Carter Braxton and Thomas Nelson (both of Virginia) lent large sums of their personal fortunes to support the war effort, but were never repaid. Fifteen of the signers participated in their states' constitutional conventions, and six--Roger Sherman, Robert Morris, Benjamin Franklin, George Clymer, James Wilson, and George Reed--signed the United States Constitution. Elbridge Gerry of Massachusetts attended the federal convention and, though he later supported the document, refused to sign the Constitution. After the Revolution, 13 of the signers went on to become governors, and 18 served in their state legislatures. Sixteen became state and federal judges. Seven became members of the United States House of Representatives, and six became United States Senators. James Wilson and Samuel Chase became Justices of the United States Supreme Court. Thomas Jefferson, John Adams, and Elbridge Gerry each became Vice President, and John Adams and Thomas Jefferson became President. The sons of signers John Adams and Benjamin Harrison also became Presidents. Five signers played major roles in the establishment of colleges and universities: Benjamin Franklin and the University of Pennsylvania; Thomas Jefferson and the University of Virginia; Benjamin Rush and Dickinson College; Lewis Morris and New York University; and George Walton and the University of Georgia. John Adams, Thomas Jefferson, and Charles Carroll were the longest surviving signers. Adams and Jefferson both died on July 4, 1826, the 50th anniversary of the Declaration of Independence. Charles Carroll of Maryland was the last signer to die--in 1832 at the age of 95. Sources: Robert Lincoln, Lives of the Presidents of the United States, with Biographical Notices of the Signers of the Declaration of Independence (Brattleboro Typographical Company, 1839); John and Katherine Bakeless, Signers of the Declaration (Boston: Houghton Mifflin, 1969); Biographical Directory of the United States Congress, 1774-1989 (Washington, D.C.: U.S. Government Printing Office, 1989). ---- How You Can Help Preserve America's Heritage https://secure.heritage.org/supportthf.cfm?july4 1. Forward this email to 5 friends or colleagues who will enjoy reading about America's rich history. 2. Visit www.heritage.org every day. Each day we offer new and relevant commentary on important issues of the day. http://www.heritage.org/ 3. Support Heritage's work online. Your online support is even more valuable, because it eliminates some of the financial costs associated with support campaigns---and those resources can be used to further our research and outreach. https://secure.heritage.org/supportthf.cfm?july4-devemail ******************* Support Heritage.org https://secure.heritage.org/supportthf.cfm?dev_070201 ******************* Leadership for America The Heritage Foundation is committed to building an America where freedom, opportunity, prosperity and civil society flourish. 3292 From: Steve Whitehead Date: Tue Jul 3, 2001 2:10pm Subject: Re: Oh No! Not again!! --(Off Topic) Craig And now they are also operating from South Africa using pre-paid mobile sim cards for their contact numbers. A happy 4th July holiday for those on the list that celebrate the day. Steve Whitehead E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa TSCM Services URL : http://www.tscm.co.za ----- Original Message ----- From: Craig Snedden To: Sent: Tuesday, July 03, 2001 3:14 PM Subject: [TSCM-L] Oh No! Not again!! --(Off Topic) 3293 From: James M. Atkinson, Comm-Eng Date: Tue Jul 3, 2001 11:44pm Subject: Spy Suspect Hanssen to Plead Guilty Spy Suspect Hanssen to Plead Guilty http://www.guardianunlimited.co.uk/breakingnews/US/0,3560,1024444,00.html Wednesday July 4, 2001 2:20 am WASHINGTON (AP) - Trying to close the books on an espionage debacle that rocked the FBI, the government struck a deal with ex-agent Robert Hanssen that would spare his life in exchange for a full confession detailing secrets he sold the Russians, people familiar with the case said Tuesday. Hanssen's FBI pension will go to his wife, Bonnie, and six children as part of the agreement in which he will plead guilty to multiple counts of espionage Friday and ultimately be sentenced to life in prison, said the sources, speaking on condition of anonymity. Fourteen of the 21 charges against Hanssen could have been punishable by death. The deal averts an Oct. 29 jury trial. ``We believe this is an appropriate resolution of this matter that is beneficial to the government and to Mr. Hanssen and his family,'' said Hanssen lawyer Preston Burton, who confirmed that a plea hearing is scheduled Friday in U.S. District Court in Alexandria, Va. He declined to confirm any aspect of the agreement. The Russians paid Hanssen over $600,000 in cash and diamonds and set up an escrow account for him in a Moscow bank worth at least $800,000, the government has alleged in court documents. Hanssen is expected to provide details of damage he did the United States when he undergoes questioning by government investigators. They allege he passed 6,000 pages of documents starting in 1985. Already in possession of a great deal of information about Hanssen's activities, prosecutors could go to court seeking to undo the deal if Hanssen, in the government's view, doesn't come clean. According to prosecutors, Hanssen revealed identities of double agents, disclosed how the United States was intercepting Soviet satellite transmissions, told the Soviets the means by which the United States would retaliate against a nuclear attack and tipped off the KGB to the FBI's secret investigation of Felix Bloch, a foreign service agent suspected of spying for Moscow in 1989. Bloch was never arrested. The Hanssen case is one in a succession of damaging episodes that have undermined the FBI's credibility, from the botched investigation of former nuclear scientist Wen Ho Lee to the FBI's failure to turn over 4,000 documents in the Oklahoma City bombing. The document problem delayed the execution of Timothy McVeigh. With the FBI in the hands of an acting director following the resignation of Louis Freeh, there are calls on Capitol Hill for tougher outside scrutiny of the bureau. The House Judiciary Committee recently approved legislation to create a new position of deputy Justice Department inspector general with the sole task of keeping watch over the FBI. Reacting to the Hanssen deal, Sen. Richard Shelby, the ranking Republican on the intelligence committee, faulted the FBI for ``looking in the wrong place'' for a Russian spy who turned out to be one of the FBI's own agents. The bureau had information long ago about a spy inside the government intelligence apparatus, but didn't focus on Hanssen until last year. He was arrested Feb. 18. Of the plea bargain, Shelby said, ``I wouldn't say he's getting off light, but if he could have gotten the death penalty, it probably wouldn't have been too much.'' Last month, other people familiar with the case said Hanssen's spying for the Soviets began before 1985. Those sources said Hanssen told his wife and a Catholic priest more than 20 years ago he had given information to the Soviets in exchange for money. Mrs. Hanssen said her husband told her he was tricking the Russians, not giving them anything important, the sources said. She told the FBI she was stunned when her husband was arrested in February and charged with espionage. What Hanssen did with the money he got hasn't been spelled out, although following his arrest, a former stripper said the FBI agent gave her almost $80,000 in gifts, including a trip to Hong Kong and a Mercedes. She said he made no sexual advances and spurned hers during their yearlong friendship that began in 1990. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3294 From: James M. Atkinson, Comm-Eng Date: Tue Jul 3, 2001 11:45pm Subject: Accused FBI spy Hanssen to plead guilty Accused FBI spy Hanssen to plead guilty http://www.thestar.com//NASApp/cs/ContentServer?GXHC_gx_session_id_=33ff587cf84521ac&pagename=thestar/Layout/Article_Type1&c=Article&cid=994159867984&call_page=TS_News&call_pageid=968332188492&call_pagepath=News/News Under deal, sources say, his wife, 6 kids get his FBI pension WASHINGTON (AP) - Trying to close the books on an espionage debacle that rocked the FBI, the U.S. government struck a deal with former agent Robert Hanssen that would spare his life in exchange for a full confession detailing secrets he sold the Russians, people familiar with the case said Tuesday. Hanssen's FBI pension will go to his wife and six children as part of the agreement in which he will plead guilty to multiple counts of espionage Friday and ultimately be sentenced to life in prison, said the sources, speaking on condition of anonymity. Fourteen of the 21 charges against Hanssen could have been punishable by death. The deal averts an Oct. 29 jury trial. ''We believe this is an appropriate resolution of this matter that is beneficial to the government and to Mr. Hanssen and his family,'' said Hanssen lawyer Preston Burton, who confirmed that a plea hearing is scheduled Friday in U.S. District Court in Alexandria, Va. He declined to confirm any aspect of the agreement. The Russians paid Hanssen more than $600,000 US in cash and diamonds and set up an escrow account for him in a Moscow bank worth at least $800,000, the government has alleged in court documents. Hanssen is expected to provide details of damage he did the United States when he undergoes questioning by government investigators. They allege he passed 6,000 pages of documents starting in 1985. Already in possession of a great deal of information about Hanssen's activities, prosecutors could go to court seeking to undo the deal if Hanssen, in the government's view, doesn't come clean. According to prosecutors, Hanssen revealed identities of double agents, disclosed how the United States was intercepting Soviet satellite transmissions, told the Soviets the means by which the United States would retaliate against a nuclear attack and tipped off the KGB to the FBI's secret investigation of Felix Bloch, a foreign service agent suspected of spying for Moscow in 1989. Bloch was never arrested. The Hanssen case is one in a succession of damaging episodes that have undermined the FBI's credibility . from the botched investigation of former nuclear scientist Wen Ho Lee to the FBI's failure to turn over 4,000 documents in the Oklahoma City bombing. The document problem delayed the execution of Timothy McVeigh for a month. With the FBI in the hands of an acting director following the resignation of Louis Freeh, there are calls on Capitol Hill for tougher outside scrutiny of the bureau. The House of Representatives Judiciary Committee recently approved legislation to create a new position of deputy Justice Department inspector general with the sole task of keeping watch over the FBI. Last month, other people familiar with the case said Hanssen's spying for the Soviets began before 1985. Those sources said Hanssen told his wife and a Roman Catholic priest more than 20 years ago he had given information to the Soviets in exchange for money. Hanssen's wife said her husband told her he was tricking the Russians, not giving them anything important, the sources said. She told the FBI she was stunned when her husband was arrested in February and charged with espionage. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3295 From: James M. Atkinson, Comm-Eng Date: Tue Jul 3, 2001 11:46pm Subject: Spy suspect reaches deal with government Spy suspect reaches deal with government http://inq.philly.com/content/inquirer/2001/07/03/national/03SPY.htm By Gina Holland ASSOCIATED PRESS WASHINGTON - Veteran FBI agent Robert Hanssen will plead guilty this week to charges he spied for Russia and will avoid the death penalty, his attorney said today. "This is an appropriate resolution which we believe is beneficial to the government and to Mr. Hanssen and his family," defense attorney Preston Burton said. Two government officials, speaking on condition of anonymity, confirmed that the deal spares Hanssen from the death penalty. The accused spy will be required to sit for interviews with the FBI, CIA and other intelligence officials so they can determine the extent of his activities, the officials said. One of the officials said the deal would allow Hanssen's wife, Bonnie, and six children to receive benefits under his government pension. Hanssen is only the third FBI agent to be accused of espionage. He pleaded not guilty May 31 to charges of spying for Moscow, and plans were set for an Oct. 29 trial. The federal indictment, issued May 16, accuses Hanssen of 21 counts of espionage. Burton said he could not release other details of the deal, saying it was sealed. "I don't think it's appropriate to discuss the specifics and how we got here," Burton said. "We'll address the matter in court and outside afterward." A Justice Department spokeswoman would not comment. Attorneys for the former FBI agent have been negotiating for weeks on a deal that would allow him to reveal secrets he sold to Moscow, in exchange for the Justice Department agreeing to a life term. Hanssen could have faced the death penalty because the government said his spying led to the death of two double agents. The government alleged that Hanssen passed U.S. secrets to Moscow for 15 years in exchange for $1.4 million in cash and diamonds. The FBI said it obtained original Russian documents that detailed Hanssen's alleged activities, including letters he allegedly wrote to his Russian handlers and secret codes he allegedly used to signal when and where he would drop documents. The FBI has not disclosed the source of the documents. Hanssen has been detained at an undisclosed location since his arrest Feb. 18 at a Virginia park as he allegedly delivered a package for pickup by his Russian handlers. Going to trial would have raised the prospect of prosecutors having to reveal in open court sensitive information about U.S. counterintelligence activities. For instance, Hanssen allegedly disclosed how the United States was intercepting Soviet satellite transmissions and the means by which the United States would retaliate against a nuclear attack -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3296 From: David Alexander Date: Wed Jul 4, 2001 3:52am Subject: re: Oh no not again ! Craig This is what is known in the trade as a 419 scam. The correct course of action in the UK is to send it, with full headers, to the National Criminal Intelligence Service, who have set up an e-mail address specifically for dealing with such scams: 419@s... I've had e-mails of this sort as well. Report and forget. Regards David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 3297 From: DrPepper Date: Wed Jul 4, 2001 8:40am Subject: Re: Oh No! Not again!! --(Off Topic) Miguel Puchol wrote: > Craig, > > > The urban legend bit is that they will empty your account just like that, > there is no reasonable way to do this, other than if you had internet access > to your bank and gave them the access codes (something dumb > That is just the point, , ,, , If you give them your bank account number so that they can "deposit" the money, then they gotcha! > > Mike > > o do). > > -----Mensaje original----- > > De: Craig Snedden [mailto:craig@d...] > > Enviado el: martes, 03 de julio de 2001 15:15 > > Para: TSCM-L@yahoogroups.com > > Asunto: [TSCM-L] Oh No! Not again!! --(Off Topic) > > > > > > Hi all, > > > > This is somewhat off topic I know, but since some of the list > > members also seem to be concerned with Security/Fraud etc. I > > thought I'd post and be damned...!! > > > > Below is the transcript of a e-mail I got this afternoon. I've > > had these before, but by post. This is the first e-mail one that > > I have personally had, although I've colleagues who have received them. > > > > This is a well known scam (which must work, judging by the fact > > that it must be at least 15 years old by now. If anyone knows > > differenct, please let me know). > > > > Do any of our US colleagues know of this scam? Are the > > perpetrators targeting US citizens as much as UK? I'm just > > curious as I have an open file on this scam, ever since a > > customer of mine started to be targeted on a very regular basis > > (it goes in cycles, somtimes as much as 3/4 times a day, > > othertimes nothing for months). > > > > Best regards, > > > > Craig > > > > ------Transcript---------- > > > > Received: from web13702.mail.yahoo.com [216.136.175.135] by > > paul.fasthosts.co.uk > > (SMTPD32-6.00) id A2149300D0; Tue, 03 Jul 2001 14:01:08 +0100 > > Message-ID: <20010703130106.5018.qmail@w...> > > Received: from [196.2.33.11] by web13702.mail.yahoo.com; Tue, 03 > > Jul 2001 06:01:06 PDT > > Date: Tue, 3 Jul 2001 06:01:06 -0700 (PDT) > > From: Francis Pascal > > To: admin@d... > > MIME-Version: 1.0 > > Content-Type: text/plain; charset=us-ascii > > X-RCPT-TO: > > X-UIDL: 271946455 > > Status: U > > Subject: ATTN: MANAGING DIRECTOR / C.E.O > > > > FROM: MRS. GRACE DESIREE KABILA > > TEL: +27-72-287-9581 > > FAX: +27-83-374-4814 > > > > PROPOSAL FOR A BUSINESS ASSISTANCE > > > > Greetings! > > > > I know you will be surprised to read from me, but > > please consider this letter as a request from a widow > > in need of assistance. I am Mrs. Grace Desiree > > Kabila, from the Democratic Republic of Congo > > (formerly known as Zaire); one of the three wives of > > Late President of the Democratic Republic of Congo, > > Laurent Kabila. > > > > Your firm was introduced to me by a career diplomat > > whom I consulted in my search for a reliable company > > or individual who can assist me in transferring a > > reasonable sum of money abroad. I, on behalf of my > > son Mr. Francis Pascal Kabila, decided to solicit for > > your assistance to transfer the sum of US$18.2 Million > > (Eighteen Million Two Hundred Thousand United States > > Dollars) to your personal/company account. > > > > This money was part of the money secured by my late > > husband Laurent Kabila when he was the president of > > Democratic Republic of Congo. As the wife he relied > > on, he drew my attention to the money in case of death > > or other unforeseen circumstances. His fear was > > actualized on the 16th January, 2001 when he was > > assassinated by his bodyguard. > > > > For your awareness, this fund was personally deposited > > by my husband in a private security company in > > Johannesburg, South Africa before his death. I am in > > possession of all documents involved in the said > > deposit. The idea of involving you in this > > transaction is for you to assist me transfer this > > money to your overseas account for investment > > purposes. > > > > Contact my son who is in South Africa on the above > > tel/fax. He is in a position to inform you the whole > > procedure mapped out for a successful transaction. If > > this proposal interests you, we will discuss the > > percentage for you and other modalities for a smooth > > transaction. I have also advised him to contact a > > lawyer in South Africa for legal reasons. > > > > This transaction is totally risk-free on your side, > > but also requires utmost confidentiality and urgency. > > > > NB: Furnish him with your private phone/fax numbers > > for easier communication. > > > > May God bless you as I earnestly hope for your urgent > > reply. > > > > Yours sincerely, > > > > > > > > MRS. GRACE DESIREE KABILA > > > > > > > > > > > > __________________________________________________ > > Do You Yahoo!? > > Get personalized email addresses from Yahoo! Mail > > http://personal.mail.yahoo.com/ > > > > > > --------END Transcript------------ > > > > The data contained herein is confidential. Unauthorised dissemination > > of the contents of this e-mail may be in breach of Criminal and Civil law > > and may lead to prosecution. > > > > [Non-text portions of this message have been removed] > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my shack LIVE at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 3298 From: Craig Snedden Date: Wed Jul 4, 2001 3:03am Subject: Re: Oh No! Not again!! --(Off Topic) Thanks to all who responded on this. I gained some info that I wasn't aware of. (thats the point stupid!) :-) Around here it's usually known as the "Nigerian Letters Scam". This is the first I've seen apparently originating from South Africa. I personally know a normally quite sensible and cautious businessman who was taken for around £5,000 when greed got the better of judgement.... Luckily he realised quickly enough that he was getting into hot water. Happy 4th July to all "Across the Pond". Craig The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 3299 From: Roger Pilkington Date: Wed Jul 4, 2001 4:41am Subject: Fw: Oh No! Not again!! --(Off Topic) ----- Original Message ----- From: Roger Pilkington To: Craig Snedden Sent: Wednesday, July 04, 2001 9:56 AM Subject: Re: [TSCM-L] Oh No! Not again!! --(Off Topic) > Craig, > > Both we and our clients regularly receive these. > They follow up asking for yr bank details to transfer money in/suck you into > a written exchange of letters/copy yr signature/withdraw all funds from yr > Account. > Amazingly people are still falling for this. > If I get bored I forward these to their relevant embassy/Ministry of Justice > in the Country concerned, > > We have recently worked on another African scam for some European clients > where the Originators pose as Solicitors acting on behalf of recently > deceased ex pats claiming that their former colleague /relative has hidden > assets for tax purposes - usually a non existent gold or diamond mine.They > then sting you for fees/customs backhanders etc.This one cost an otherwise > sensible Company some USD 600,000 till we were called in.The local Security > Services in the originating Country concerned were delighted to assist us on > this and are currently interviewing the perpetrators.The Clients still cant > believe it!! > > Kind regards > > Roger Pilkington > Resolution Security/London Wishing all our American friends a happy fourth of July! > 3300 From: James M. Atkinson, Comm-Eng Date: Wed Jul 4, 2001 10:39am Subject: 'Spy Gear' Britons Get Bail 'Spy Gear' Britons Get Bail http://www.sky.com/skynews/storytemplate/storytoppic/0,,30200-1022181,00.html Eight Britons arrested for allegedly using illegal surveillance equipment in the United Arab Emirates have been released on bail. The British Embassy said: "Investigations continue, but all eight Brits were released on bail late last night (Tuesday)." Investigation They were among a group of 19 arrested last week after police raids on companies involved in corporate research and commercial investigation in Dubai and Abu Dhabi. It is unclear whether the remaining 11, including nationals of the Philippines, Morocco, Jordan and Yemen, had also been freed. Money The Britons were granted bail after they, and male guarantors resident in Dubai, handed over their passports to authorities. No money was involved. The embassy said the companies involved are SSS Corporate Research, Middle East Research Group (MERG) and Vision and Leisure International. Last Modified: 04 Jul 2001 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3301 From: James M. Atkinson, Comm-Eng Date: Wed Jul 4, 2001 10:46am Subject: COPS SAY SUPER FIEND PLANTED SPY CAMERAS COPS SAY SUPER FIEND PLANTED SPY CAMERAS http://nypostonline.com/news/regionalnews/34041.htm New York Post 06:47 By ERIC LENKOWITZ, PHILIP MESSING and ADAM MILLER July 4, 2001 -- The super of a posh Fifth Avenue office building has been busted for installing hidden cameras in two women's bathrooms, police said yesterday. Zdenko Ceselka, 34, of Iselin, N.J., hooked the cameras to a closed-circuit television system in the Scribner building at 597 Fifth Ave. to spy on women, cops said. The monitors for the system were allegedly in the boiler room basement of 3 East 48th St., which Ceselka also managed. Police discovered the two hidden cameras Monday when an unidentified female employee at Screen Vision Cinema spotted something sticking out of a ceiling vent above one of the stalls in their 7th floor ladies bathroom. The frantic woman called 911 and detectives discovered the camera. A search of the building uncovered another hidden camera above one of the stalls in the 6th floor women's bathroom. Because he didn't record the women, Ceselka could only be charged with unlawfully installing or maintaining a viewing device. If convicted, he faces a maximum 15 days behind bars and a $300 fine. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From: James M. Atkinson Date: Mon Jun 30, 2003 10:35am Subject: How Did YOU Sleep Last Night? How Did YOU Sleep Last Night? Support Our Troops -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- Attachment: (image/jpeg) pic12423.jpg [not stored] Attachment: (image/jpeg) pic16139.jpg [not stored] Attachment: (image/jpeg) pic16279.jpg [not stored] Attachment: (image/jpeg) pic25996.jpg [not stored] 7504 From: James M. Atkinson Date: Mon Jun 30, 2003 10:36am Subject: Quote of the Year Nominated for Quote of the Year is the statement made by Texas Congressman Dick Armey when asked, "If you had been in President Clinton's place would you have resigned?" Armey's reply: "If I had been in the president's place I would not have gotten the chance to resign. I would have been lying in a pool of my own blood, looking up, and listening to my wife ask, "How do you reload this son of a bitch?" -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- 7505 From: Steve Uhrig Date: Mon Jun 30, 2003 6:57pm Subject: Congrats to Mike Congrats to list member Mike Adler of CA on his very recent marriage. Today is the first day of the rest of your life! Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7506 From: Date: Mon Jun 30, 2003 3:11pm Subject: Re: Congrats to Mike In a message dated 6/30/2003 4:58:57 PM Pacific Standard Time, steve@s... writes: > Congrats to list member Mike Adler of CA on his very recent marriage. bad posting [Non-text portions of this message have been removed] 7507 From: Steve Uhrig Date: Mon Jun 30, 2003 7:19pm Subject: Re: Congrats to Mike On 30 Jun 2003 at 20:11, MACCFound@a... wrote: > bad posting Matter of opinion. You notice I didn't post the pix on my site with a link to it in my msg? Pretty gal. You're getting old/distinguished. 7508 From: James M. Atkinson Date: Mon Jun 30, 2003 7:10pm Subject: Re: Congrats to Mike Hey Mike, Congratulations, and best wishes. -jma At 7:57 PM -0400 6/30/03, Steve Uhrig wrote: >Congrats to list member Mike Adler of CA on his very recent marriage. > >Today is the first day of the rest of your life! > >Steve -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- 7509 From: gkeenan Date: Mon Jun 30, 2003 7:36pm Subject: Re: Congrats to Mike Hi Mike - My condolences :-)!! Seriously - all the best to you both! Jerry At 7:57 PM -0400 6/30/03, Steve Uhrig wrote: >Congrats to list member Mike Adler of CA on his very recent marriage. > >Today is the first day of the rest of your life! > >Steve [Non-text portions of this message have been removed] 7510 From: Craig Meldrum Date: Mon Jun 30, 2003 7:08pm Subject: Phone Number Wanted Can anybody assist me with a phone number for Dan Grissom of Taylor Group in Downers Grove Il. I have been trying to contact him by email for some time but am not getting a response. Thank you Craig =============================== Craig Meldrum, Managing Director Communications Security Ltd PO Box 8314, Symonds St Auckland, New Zealand Ph: 64-9-3093386 Fax: 64-9-3021148 =============================== 7511 From: IT3 Andrew Date: Mon Jun 30, 2003 9:44pm Subject: Motorola Cellular Site Operator School Does anyone have training materials offered only at the MCSOS school by motorola. This is a cellular site operator school or equivalent. Andrew Garrett USNR 7512 From: IT3 Andrew Date: Mon Jun 30, 2003 9:46pm Subject: WinRadio Vs. Receivers (ICOM, Vertax) What would you prefer if you had the luxury of working with both? WinRadio products via a laptop and a external receiver or a r8500 or equivalent? Andrew Garrett USNR 7513 From: IT3 Andrew Date: Mon Jun 30, 2003 9:41pm Subject: Cellular Monitoring OK Guys put on your thinking caps... If you needed to listen in to a analog cellular conversation taking place on the AMPS cellular network what equipment would you use. Optoelectronics ? OKI 900? Receiver ? Andrew Garrett USNR 7514 From: IT3 Andrew Date: Mon Jun 30, 2003 9:43pm Subject: Mobile Comm Van If you were given a budget of 700k to work with, strictly for surveillance and TSCM what would you install in a Mobile Comm Van. What equipment would be necessary? Andrew Garrett USNR 7515 From: A Grudko Date: Tue Jul 1, 2003 3:00am Subject: Re: Congrats to Mike - Original Message - From: Steve Uhrig > Congrats to list member Mike Adler of CA on his very recent marriage. > Today is the first day of the rest of your life! Since life is really about familly, not just TSCM, I'm sure that our great and wise Moderator will allow me to pass on my encouragement to Mike - Judy and I are spending most of next month away cellebrating our 25 YEARS of marrage. AnD (my new gangsta rapper sig) ;-) Andy Grudko (British), Grad I.S, South Africa Registered as a security service provider by the Private Security Industry Regulatory Authority, registration No. 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 7516 From: Steve Uhrig Date: Tue Jul 1, 2003 9:04am Subject: Re: Cellular Monitoring On 1 Jul 2003 at 2:41, IT3 Andrew, navyguyinil@x... wrote: > If you needed to listen in to a analog cellular conversation taking > place on the AMPS cellular network what equipment would you use. The charter of this *public* list, over 1300 strong, is *defensive* measures. Details of offensive operations are contrary to the mission of this list and should be taken to the appropriate law enforcement forums where members are vetted. Offensive operations are illegal absent law enforcement authority in the U.S. Persons with legitimate authority have access to all the information and hardware they need to carry out their duties. They don't need to ask here. I publish a private newsletter, not connected in any way with this forum, called 'Tips for Techs'. Government law enforcement personnel (only) are welcome to contact me directly to subscribe. State full details of your agency affiliation in first mail. I would encourage members of this list not to reply either factually or tongue-in-cheek, on list or off, to requests for sensitive information. To do so makes you a part of the problem, not the solution. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7517 From: James M. Atkinson Date: Tue Jul 1, 2003 9:10am Subject: Re: Cellular Monitoring At 2:41 AM +0000 7/1/03, IT3 Andrew wrote: >OK Guys put on your thinking caps... > >If you needed to listen in to a analog cellular conversation taking >place on the AMPS cellular network what equipment would you use. > >Optoelectronics ? >OKI 900? >Receiver ? > >Andrew Garrett >USNR Start by obtaining a legal Title III warrant, and then ask. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- 7518 From: James M. Atkinson Date: Tue Jul 1, 2003 9:11am Subject: Re: Mobile Comm Van At 2:43 AM +0000 7/1/03, IT3 Andrew wrote: >If you were given a budget of 700k to work with, strictly for >surveillance and TSCM what would you install in a Mobile Comm Van. >What equipment would be necessary? > >Andrew Garrett >USNR Two different applications, two different vehicles. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- 7519 From: James M. Atkinson Date: Tue Jul 1, 2003 9:12am Subject: Re: Motorola Cellular Site Operator School At 2:44 AM +0000 7/1/03, IT3 Andrew wrote: >Does anyone have training materials offered only at the MCSOS school >by motorola. This is a cellular site operator school or equivalent. > >Andrew Garrett >USNR Such course materials are highly sensitive, proprietary, and can only be obtained though legitimate channels. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- 7520 From: James M. Atkinson Date: Tue Jul 1, 2003 9:13am Subject: Re: WinRadio Vs. Receivers (ICOM, Vertax) At 2:46 AM +0000 7/1/03, IT3 Andrew wrote: >What would you prefer if you had the luxury of working with both? > >WinRadio products via a laptop and a external receiver or a r8500 or >equivalent? > >Andrew Garrett >USNR R-8500 -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- 7521 From: Date: Tue Jul 1, 2003 8:57am Subject: German Eavesdropping Law Before Court German Eavesdropping Law Before Court By MELISSA EDDY .c The Associated Press FRANKFURT, Germany (AP) - Critics of a German law allowing authorities to eavesdrop on conversations in private homes took their case to the supreme court Tuesday, arguing that the five-year-old measure is unconstitutional. While law enforcement officials and the government argue that the law helps fight organized crime and terrorism, opponents contend it violates constitutional privacy guarantees and has not allowed authorities to crack a single major case. Passed under former Chancellor Helmut Kohl, the law was controversial because of the legacy of the Nazi police state and decades of snooping by the Stasi, the secret police in communist East Germany. Three members of the small opposition Free Democratic Party are leading the challenge in the Federal Constitutional Court, which is expected to rule by the fall. Speaking for the plaintiffs at the opening hearing, former parliamentary vice president Burkhard Hirsch said the notion that people were no longer safe from eavesdropping in their homes violated human dignity. He criticized the government for refusing to present a detailed report of the costs and effectiveness of the measures. Chief federal prosecutor Kay Nehm, whose agency investigates terrorism, defended the law as an effective anti-crime tool. Federal prosecutors have planted bugs in four cases since the law passed in 1998, he said. Terror attacks cannot be prevented simply by tapping telephone lines because suspects often will use several mobile phones and switch even in mid-conversation, he testified. Justice Minister Brigitte Zypries, representing the government, said bugging was used only as a last resort. Overall, German authorities plant bugs in homes in about 30 cases a year, she said. 07/01/03 13:50 EDT [Non-text portions of this message have been removed] 7522 From: A Grudko Date: Mon Jun 30, 2003 8:34am Subject: Re: Congrats to Mike - Original Message - From: > bad posting Bad punctuation. Andy Grudko (British), Grad I.S, South Africa Registered as a security service provider by the Private Security Industry Regulatory Authority, registration No. 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 7523 From: kondrak Date: Tue Jul 1, 2003 3:21pm Subject: Microsofts revenge OOoo! Thought they'd of known about this: > >Microsoft Word bytes Tony Blair in the butt > > > > >---------- > >Richard M. Smith >(mailto:rms@c...?subject=Blair) >June 30, 2003 > >Microsoft Word documents are notorious for containing private information >in file headers which people would sometimes rather not share. The British >government of Tony Blair just learned this lesson the hard way. > >Back in February 2003, 10 Downing Street published a dossier on Iraq's >security and intelligence organizations. This dossier was cited by Colin >Powell in his address to the United Nations the same month. Dr. Glen >Rangwala, a lecturer in politics at Cambridge University, quickly >discovered that much of the material in the dossier was actually >plagiarized from a U.S. researcher on Iraq. > >You can read Dr. Rangwala's original analysis of the dossier from Feb. 5, >2003 at this URL: >http://www.casi.org.uk/discuss/2003/msg00457.html > > >Blair's government made one additional mistake: they published the dossier >as a Microsoft Word file on their Web site. When I first heard from Dr. >Rangwala about the dossier, I decided to try to learn who had worked on >the document. I downloaded the Word file containing the dossier from the >10 Downing Street Web site (http://www.number-10.gov.uk/) and found the >following revision log in the file: > Rev. #1: "cic22" edited file > "C:\DOCUME~1\phamill\LOCALS~1\Temp\AutoRecovery save of Iraq - security.asd" > Rev. #2: "cic22" edited file > "C:\DOCUME~1\phamill\LOCALS~1\Temp\AutoRecovery save of Iraq - security.asd" > Rev. #3: "cic22" edited file > "C:\DOCUME~1\phamill\LOCALS~1\Temp\AutoRecovery save of Iraq - security.asd" > Rev. #4: "JPratt" edited file "C:\TEMP\Iraq - security.doc" > Rev. #5: "JPratt" edited file "A:\Iraq - security.doc" > Rev. #6: "ablackshaw" edited file "C:\ABlackshaw\Iraq - security.doc" > Rev. #7: "ablackshaw" edited file "C:\ABlackshaw\A;Iraq - security.doc" > Rev. #8: "ablackshaw" edited file "A:\Iraq - security.doc" > Rev. #9: "MKhan" edited file "C:\TEMP\Iraq - security.doc" > Rev. #10: "MKhan" edited file "C:\WINNT\Profiles\mkhan\Desktop\Iraq.doc" >Most Word document files contain a revision log which is a listing of the >last 10 edits of a document, showing the names of the people who worked >with the document and the names of the files that the document went under. >Revision logs are hidden and cannot be viewed in Microsoft Word. However I >wrote a small utility for extracting and displaying revision logs and >other hidden information in Word .DOC files. > >It is easy to spot the following four names in the revision log of the >Blair dossier: >P. Hamill >J. Pratt >A. Blackshaw >M. Khan > >In addition, the "cic22" in the first three entries of the revision log >stands for "Communications Information Centre," a unit of the British >Government. > >Back in February, I passed along these 4 names to Dr. Rangwala who then >provided them to a number of reports in the UK. One reporter quickly >identified the four individuals as: >Paul Hamill - Foreign Office official >John Pratt - Downing Street official >Alison Blackshaw - The personal assistant of the Prime Minister's press >secretary >Murtaza Khan - Junior press officer for the Prime Minister > >During the week of June 23, 2003, the British Parliament held hearings of >the Blair Dossier and other PR efforts by the UK Government leading up to >the Iraq war. Alastair Campbell of the UK Communications Information >Centre was put in the hot seat and had to explain the dossier plagiarism >and details of the revision log. > >One of the interesting tidbits that came out of the hearings is that John >Pratt provided the dossier on a floppy disk to Alison Blackshaw to give to >Colin Powell for his presentation before the United Nations. The revision >log shows the document being copied from Pratt's hard drive to a floppy >disk in revisions #4 and #5. > >The Word version of the dossier was recently removed from the 10 Downing >Street Web site, but I archived a copy of the Feb. 6 version here: >IRAQ - ITS INFRASTRUCTURE OF CONCEALMENT, DECEPTION AND INTIMIDATION >http://www.computerbytesman.com/privacy/blair.doc > > >The Blair government learned its lesson well with regard to publishing >Microsoft Word documents. Another report on Iraq that was published in >June 2003 was only available as a PDF file. PDF files do not contain >revision logs or hidden author information. > >Links > > > >Dr. Glen Rangwala's analysis of the Iraq dossier, Feb. 2003 >http://www.casi.org.uk/discuss/2003/msg00457.html > >Dr. Glen Rangwala's paper submitted to Foreign Affairs Committee of the >House of Commons, June 16, 2003 >http://middleeastreference.org.uk/fac030616.html > >Iraq's Security and Intelligence Network: A Guide and Analysis, Sept. 2002 >http://meria.idc.ac.il/journal/2002/issue3/jv6n3a1.html > >Downing St dossier plagiarised, Feb. 6, 2003 >http://www.channel4.com/news/2003/02/week_1/06_dossier.html > >Britain Admits That Much of Its Report on Iraq Came From Magazines, Feb. >8, 2003 >http://query.nytimes.com/gst/abstract.html?res=F20B1EFD395F0C7B8CDDAB0894DB404482 > >Straw's letter to WMD inquiry >http://politics.guardian.co.uk/iraq/story/0,12956,983396,00.html > >Campbell: In the line of fire >http://news.independent.co.uk/uk/politics/story.jsp?story=418480 > >The key backroom players >http://www.thisislondon.co.uk/news/articles/5475182 > >WD97: How to Minimize Metadata in Microsoft Word Documents >http://support.microsoft.com:80/support/kb/articles/Q223/7/90.ASP > >Dr. Glen Rangwala's Web site >http://middleeastreference.org.uk > >10 Downing Street Web site >http://www.number-10.gov.uk > >Copyright (C) 2003 Richard M. Smith [Non-text portions of this message have been removed] 7524 From: Date: Tue Jul 1, 2003 3:03pm Subject: Interesting site - Telephone Central Offices Click here: Telephone Central Offices or http://www.thecentraloffice.com/ [Non-text portions of this message have been removed] 7525 From: IT3 Andrew Date: Tue Jul 1, 2003 1:18pm Subject: Apologies I apologize for the postings earlier. Any information involving a TSCM van full stocked please forward to me at garrettar@h... Thank you, IT3 Garrett 7526 From: Date: Tue Jul 1, 2003 4:12pm Subject: Re: Microsofts revenge Minor correction regarding: PDF files do not contain revision logs or hidden author information. PDFs contain metadata as well. Simply open a document and go to File - Document Properties - Summary. You can view other information if you view the file with a tool like BinText (in the Resources section of http://www.foundstone.com/). (Embedded image moved to file: pic04940.pcx) ******************* N O T I C E ******************* The information contained in this e-mail, and in any accompanying documents, may constitute confidential and/or legally privileged information. The information is intended only for use by the designated recipient. If you are not the intended recipient (or responsible for the delivery of the message to the intended recipient), you are hereby notified that any dissemination, distribution, copying, or other use of, or taking of any action in reliance on this e-mail is strictly prohibited. If you have received this e-mail communication in error, please notify the sender immediately and delete the message from your system. *************************************************** [Non-text portions of this message have been removed] 7527 From: Wiseguy Date: Wed Jul 2, 2003 7:02am Subject: TSCM Defense strategies for Computer Administrators Greetings, I have been a lurker for some time.... I am helping to put together speakers at a computer crimes conference. I was hoping someone might recommend a qualified person whom could speak to a civilian group about strategies to protect computer networks from unwanted monitoring. I understand it could never be a complete listing of protections. ;-) The conference is sponsored by the Atlanta Chapter of the High Technologies Crime Investigative Association (HTCIA) and Kennesaw State University's Southeast Cybercrime Institute. The conference is in the Atlanta Georgia metro area. Conference makeup is about 60/40...Corporate security / Law Enforcement. Links to our website our listed below. Any interested parties please respond off list. Thank you for your time. Steven Wisenburg Low Cost Training March 2-5, 2004 E-Mail: wiseguy@a... http://www.southeastcybercrimesummit.com/ or http://www.atlccs.com/ 7528 From: Steve Uhrig Date: Wed Jul 2, 2003 3:42pm Subject: Nextel Cup (satire) This piece is fairly technical and a lot political, and probably only of interest to Nextel users. Use your Delete button now if needed. Else ... For those of you who follow such things, below is a good satire on the current state of affairs. If you haven't been following, briefly -- Nextel (a nationwide digital comm system with mobile telephone capability in the U.S.) has been interfering with 800 megacycle public safety systems, in many areas completely denying coverage to sections of cities. In emergencies, authorities have to arrange to have the Nextel sites in the area turned off so the 800 meg systems can function. Nextel, who for all practical purposes is Motorola and has Motorola's money behind them, is made of Teflon. Nothing is their fault. They have proposed solutions. The one they're pushing involves moving all public safety communications down to 700 megacycles, which of course involves a complete replacement of the infrastructure and all new equipment of course to be provided by Motorola. Remember, some communities are only now just building out 800 meg systems, yet Nextel is proposing to move everyone to 700 megacycles while soliciting orders for 800 meg systems in the meantime. Those who do not learn from history are doomed to repeat it. Remember when Nextel was formed, and they threw off analog users from 800 meg trunking? In doing what they propose, this would free up the bandwidth now used by the public safety customers, and allow more room for Nextel to expand on 800 megacycles. The 700 megacycle channels would be taken away from UHF broadcast television allocations. Higher UHF broadcast television stations would need to move to lower frequencies, again requiring replacement of all equipment and antennas. No one has yet agreed how all this will be funded, but it doesn't need to be said the bill, in the billions, will be paid by Nextel users and taxpayers. As a side note, Verizon and other cell carriers are introducing their own competition to Nextel in the form of PTT capability on the existing cellular network. Competition will drive prices down, of course. Nextel is fighting, obviously. And Nextel is claiming copyrights to the term 'PTT (Push To Talk') even though it has been in common use since the days of dynamotors and vacuum tubes in mobile radios. The author of the below is a Washington D.C. area attorney who works on communications issues on behalf of the victims/users. Most of the land mobile industry is anti-Nextel as they seemingly are arranging to profit substantially from a problem they caused, and lives are being lost in the meantime. FCC? When FCC commissioners retire, they go to work for Nextel. You figure it out. You kind of have to be following the players for the article below to make sense. Even if you have not, however, the situation is pretty clear. The below originally was printed in the Private Wireless Forum aka PWF, a forum for legal and technical information pertaining to the wireless communications industry. Persons interested can subscribe on yahoogroups. Reprinted with permission of the author. Nextel Cup refers to some big car race Nextel just announced they will be sponsoring as a marketing effort. .... Steve =========== From: Robert Schwaninger Subject: Nextel Cup I can only envision the running of the Nextel Cup. The race would be among a white panel truck, driven by a local two-way shop going to service a customer's mobile unit; an ambulance on the way to rescue a fireman who has been overcome by smoke while fighting a three-alarm blaze; an eighteen wheeler, driven by one of Nextel's fleet customers; a BMW convertible, driven by the pampered daughter of a successful CPA; and a jaguar driven by Morgan O'Brien. The Two-Way Operator's panel truck wouldn't make it out of the pits because Nextel would have the race officials declare that for reasons of safety, the panel truck must swap its wheels with the Nextel jaguar, at the operator's cost. Nextel does agree, however, to pay for the hot air to inflate them following the swap. ITA and PCIA join in the decision saying, "if we didn't go along, the race officials would have done something else really, really bad." They offer to remove the lug nuts without charge to show their concern. The ambulance would be side-swiped on the first turn by the Nextel jaguar. However, Nextel is not charged with the accident because its car was lawfully licensed in the state where the race was held, the ambulance's engine was not made sufficiently "robust" to outrun the Nextel jaguar, the ambulance's fenders were manufactured in a manner that rendered them susceptible to collision, and besides, the cellular operators really caused the accident in the first place. The eighteen wheeler does not finish the race because it runs of out gas. The owner explains to the driver that there was only so much money in the budget and the company could spend it on paying Nextel's industry- high revenue per unit for operation of the radio in the vehicle, or on gas. The money went to Nextel and the driver is forced to walk home after his truck conks out. Nextel wins the race and celebrates by giving a really nifty minutes package to the BMW driver, who immediately exceeds the use package, causing her father to be stuck with a bill for $14,000 because the teen driver and her friends couldn't decide how to decorate the gym for the prom and the haggling over an underwater theme versus a thug- rocker theme is debated for weeks. Later, Nextel's representatives testify before the FCC that due to the high minutes of usage experienced on their system, they will require authority to transmit at up to 50,000 watts ERP from transmitters mounted atop the heads of people's pets. Following complaints that various people's dogs were found par broiled by the Nextel system, men being sterilized in a manner that followed witnessing of a rather disturbing two "pops", and damage to trees, painted surfaces, and flying insects, Nextel announces its two-prong response to the thousands of incidents stating, "we have reconfirmed our efforts to the Best Practices Guide and hereby announce that our units will compete with the Mosquito Magnet." =========== ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7529 From: kondrak Date: Thu Jul 3, 2003 0:23am Subject: Re: Nextel Cup (satire) When I read that, I was ROTFLMAO! >From: Robert Schwaninger > >Subject: Nextel Cup > >I can only envision the running of the Nextel Cup. The race would be >among a white panel truck, driven by a local two-way shop going to >service a customer's mobile unit; an ambulance on the way to rescue a >fireman who has been overcome by smoke while fighting a three-alarm >blaze; an eighteen wheeler, driven by one of Nextel's fleet >customers; a BMW convertible, driven by the pampered daughter of a >successful CPA; and a jaguar driven by Morgan O'Brien. > >The Two-Way Operator's panel truck wouldn't make it out of the pits >because Nextel would have the race officials declare that for reasons >of safety, the panel truck must swap its wheels with the Nextel >jaguar, at the operator's cost. Nextel does agree, however, to pay >for the hot air to inflate them following the swap. > >ITA and PCIA join in the decision saying, "if we didn't go along, the >race officials would have done something else really, really bad." >They offer to remove the lug nuts without charge to show their >concern. > >The ambulance would be side-swiped on the first turn by the Nextel >jaguar. However, Nextel is not charged with the accident because its >car was lawfully licensed in the state where the race was held, the >ambulance's engine was not made sufficiently "robust" to outrun the >Nextel jaguar, the ambulance's fenders were manufactured in a manner >that rendered them susceptible to collision, and besides, the >cellular operators really caused the accident in the first place. The >eighteen wheeler does not finish the race because it runs of out gas. >The owner explains to the driver that there was only so much money in >the budget and the company could spend it on paying Nextel's industry- >high revenue per unit for operation of the radio in the vehicle, or >on gas. The money went to Nextel and the driver is forced to walk >home after his truck conks out. > >Nextel wins the race and celebrates by giving a really nifty minutes >package to the BMW driver, who immediately exceeds the use package, >causing her father to be stuck with a bill for $14,000 because the >teen driver and her friends couldn't decide how to decorate the gym >for the prom and the haggling over an underwater theme versus a thug- >rocker theme is debated for weeks. > >Later, Nextel's representatives testify before the FCC that due to >the high minutes of usage experienced on their system, they will >require authority to transmit at up to 50,000 watts ERP from >transmitters mounted atop the heads of people's pets. Following >complaints that various people's dogs were found par broiled by the >Nextel system, men being sterilized in a manner that followed >witnessing of a rather disturbing two "pops", and damage to trees, >painted surfaces, and flying insects, Nextel announces its two-prong >response to the thousands of incidents stating, "we have reconfirmed >our efforts to the Best Practices Guide and hereby announce that our >units will compete with the Mosquito Magnet." > > >=========== > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7530 From: Date: Thu Jul 3, 2003 1:17pm Subject: Detecting Surveillance Travel Warning - Colombia http://bogota.usembassy.gov/wwwsc093.shtml [Non-text portions of this message have been removed] 7531 From: kondrak Date: Thu Jul 3, 2003 9:46pm Subject: let's celebrate > > >As we go out to celebrate our freedom this 4th of July, let's go over a few >things to make your celebration a success. > >Before leaving home make sure you check the color coded Homeland Security >alert status. Be especially careful if it is orange or red. Don't worry >about yellow. It's always yellow. > >Be aware of your surroundings at all times. New Yorkers, in particular, >watch out for those pesky mushroom clouds. > >Don't use any illegal fireworks in your 4th Celebration. It is for your own >safety. And the founding father's implemented a government to protect you >from yourselves. Didn't they? Besides, fireworks are explosive devices and >you might be considered a terrorist with weapons of mass destruction. And >although the government can't find any in Iraq, you can rest assured they >will find them in your car trunk. But don't worry, getting arrested, >imprisoned indefinitely without formal charges, and a 5 year wait before the >secret tribunal trial per the Patriot Act is a breeze. It's that secret >summary execution that should make you nervous. > >Make sure you are buckled up in your seat belts, there will be roadblocks >and checkpoints to make sure you comply. It is for the children. > >If you are an airline employee, lighten up for the holiday, you can always >look for a job tomorrow. Maybe you could transfer over to a Federal Airport >Security Screener job. Big demand for those jobs and you don't have to be >smart. > >If you are a Haliburton employee, then celebrate, you probably have a raise >coming from the Iraqi contract windfall. > >If celebrating on any public property, >make no mention or relgious ideals. >Government is god there. >You will be aprehended. > >Have your papers ready as you approach the holiday police checkpoints. > >Don't criticize the President or other government officials, you might be in >violation of the Patriot Act and considered a possible terrorist. > >Don't mention the Constitution in any district court or you could be held in >contempt. > >If your children get out of line this holiday, do not discipline them, or >they may be kidnapped by the Dept. of Social Services and held hostage until >you receive approved psychological therapy and are deemed acceptable. > >Show compassion this Independence Day by bringing an illegal immigrant to >your celebration or by hugging a tree. > >If an election is occurring in your locality within the next 90 days, do not >talk about or publicly support any candidate, as that is no longer lawful. >Keep your mouth shut. > >If an officer asks to search your vehicle at the "seat belt" checks, do not >be belligerent and demand a search warrant. Standing up for your fourth >amendment rights is anti-social and not in tune with the new American way. >Are you with Al Quada or something? > >Do not get upset when the searching officer will not help you pick up your >belongings that he has strewn all over the highway as he searched your >vehicle. It is not in his job description and complaining will get you >charged with obstructing justice. > >Keep your guns at home. You are not going hunting and besides, What on >earth do guns have to do with American Independence? Better yet, turn your >guns into the authorities to let them know that you are a true patriotic >American. > >If celebrating at the mall in Washington DC. you are probably safe as the >mall is now monitored by hundreds of surveillance cameras, watched by >federal security forces. Don't do anything that you wouldn't want them to >see. > >Bring lots of cash with you, there will be many taxes, fines, and fees to >pay as you celebrate your freedoms this day. > >Do not leave home without your driver's license, social security card, birth >certificate, welfare card, medicare card, medical records, W-2 Form, and two >others forms of ID. You may be asked for them at the police checkpoints. >Better yet, get micro-chipped, and avoid the hassle of carrying around your >papers. > >Bring your library card, the FBI may ask you for it. > >Do not put any "anti-government" bumper stickers on your car. Especially not >anything about the right to keep and bear arms. Police have been trained by >the FBI in "bumper sticker profiling". >This attracts their attention at the check points, and makes you look like a >terrorist. > >With regard to "bumper sticker profiling" you should be especially aware of >the fact that "They will get my gun, when they pry it from my cold dead >fingers" is no longer mere semantics. At WACO, and at RUBY RIDGE, >we learned that they WILL kill you to take your guns > >ALSO, be careful not to have any unauthorized THOUGHTS. >There are now serious penalties for "thought crime". >Be aware that "civil forfeiture" laws make it possible to take anything that >you own, by alleging that it was "intended" to be used for the commission of >a crime. This could include transporting or storing a gun. >If "civil forfeiture" proceedings are initiated against you, >then you will have the burden of proof, >to show that your thoughts were in compliance with government standards. > >If traveling by air this Independence Day, do not give the airport screeners >a hard time. They are feeling you up and molesting your daughter and wife >for the security of America. If you complain you could be arrested. You >don't support Bin Laden do you? > >Keep an eye on your fellow Americans as you celebrate this 4th of July. If >you see anything supicious, take notes so that when you get home you can >call and report them to the Homeland Security Office. And remember you are >not a nosey snitch, you are a great American Patriot. > >Do not mention the signers of the Declaration of Independence this 4th of >July. Mentioning these white subversive terrorists is not popular and could >get you in big trouble. Besides what do these guys have to do with the 4th >of July anyway? > >Do not leave home without one or more little plastic American flags made by >political slaves in Communist China. Make sure you have one flying from the >antennae of your vehicle. You don't want to seem un-American do you? > >Do not take a copy of the Declaration of Independence with you as it >advocates the overthrow of tyrannical government. It is a terrorist >document and will be confiscated at the holiday police checkpoints. Same >advice for the Constitution. > >And remember, as you leave home for your 4th of July outing, that the second >you stepped out of your door that you probably broke hundreds of federal, >state, and local laws that you are probably unaware of. However, if you tow >the line, you will not be charged. > >Don't even think about taxes on this great day. The 50 per cent government >confiscation of your income at the threat of imprisonment or at the point of >a gun should not even cross your mind as you revel in your freedom. After >all, April 15th is a long way off. > >And whatever you do, do not let on that you really know that true freedom >died a long time ago in America, just have fun for the day and then go home >and stick your head back in the sand and pretend America is not becoming a >socialist police state. > >Now go out there and celebrate your freedom and liberty and have a great >sanitized, politically correct, and government approved and authorized >Independence Day! > >If you have a few decades with nothing better to do, study up on >"administrative law". Laws are now made by the unelected bureaucrats, in >hundreds of "administrative agencies". If you are charged with violating one >of these "laws" you will not get a trial by a jury of your peers. You will >be tried by the agency that made the charge. > >I hope this message gets past the Department of Homeland security approved >internet filter. >How else can they protect us from unauthorized thought? > >Now go out and celebrate your independence and have a great Independence Day! > >===== > >HOMELAND SECURITY ADVISORY >This transmission screened prior to receipt by addressee pursuant to >applicable sections of the USA PATRIOT Act. > >------------------ >-InfoWarz >None are so hopelessly enslaved as those who falsely believe they are free. >Our forefathers are crying. >Our forefathers are angry. >Our forefathers are loading their muskets and heading for The Green. >America........Wake the hell up. 7532 From: James M. Atkinson Date: Thu Jul 3, 2003 10:09pm Subject: Re: Detecting Surveillance At 6:17 PM -0400 7/3/03, MACCFound@a... wrote: > Travel Warning >- Colombia > > >http://bogota.usembassy.gov/wwwsc093.shtml > Surveillance Recognition: Surveillance is required for successful terrorist planning. Experience has taught us that terrorist attacks are generally preceded by pre-operational surveillance in which terrorists gather target intelligence. Surveillance is defined as the process of keeping facilities, vehicles and persons under observation in order to obtain detailed information. Any indications of surveillance should be reported immediately to the the security office of your organization and/or the police. All training programs designed to protect individuals from becoming victims of terrorism recommend that people be alert to surveillance. This is excellent advice, but, unfortunately, in most instances it is insufficient, because people have had no training in detecting surveillance, and terrorist organizations are often relatively sophisticated in their surveillance methods. Detecting surveillance conducted by trained experts is not as easy as most Hollywood films would lead us to believe. Fortunately, however, the type of surveillance conducted by terrorist organizations is not normally as elaborate as that done by intelligence organizations nor does it involve as many people or as much equipment. Nevertheless, for people to have a reasonable chance at detecting most forms of surveillance they would have to be somewhat familiar with the techniques used. The purpose of surveillance is to determine (1) the suitability of the potential target based upon the physical and procedural security precautions that the individual has taken and (2) the most suitable time, location, and method of attack. This surveillance may last for days or weeks depending upon the length of time it takes the surveillants to obtain the information that they require. Naturally, the surveillance of a person who has set routines and who takes few precautions will take less time. The people undertaking the surveillance will often not take part in the attack, nor will the attack take place while surveillance is still in progress. Before undertaking surveillance most experts gather information about the subject from other sources. Public records of information made available to the terrorist organization from a sympathetic individual within an organization, local police, or other government office may reveal useful facts about an individual such as the names of family members, an address, a description of vehicles and license numbers, photographs, etc. The surveillants will also make a reconnaissance of the neighborhood in which the target lives and works. This permits them to select positions of observation, the types of vehicles to use, the clothing to be worn, and the type of ruse to use that will give them an ordinary or normal appearance and plausible reasons to be in the area. There are basically three forms of surveillance: foot, vehicle, and stationary (generally categorized as either mobile or static). A brief description of the most common techniques used for each of these forms and methods for detecting each one follows: One or more individuals may undertake foot surveillance. One-person foot surveillance is rather complicated and fairly easy to detect. The surveillance must remain close to the target, particularly in congested areas, to avoid losing him or her. In less congested areas the surveillant can maintain a greater distance, but the lack of other pedestrians makes the surveillant that much more noticeable. The one complicating factor is the use of a disguise to make the surveillant look different (perhaps a uniform). One possible use of a disguise is a shopping bag or some other container for a change of clothes, particularly if the shopping bag is from a store not found in the area or the container somehow seems out of place. Where a disguise is suspected, pay particular attention to shoes and slacks or skirts. These items are less easily and, therefore, less commonly changed. In elevators, watch for people who seem to wait for you to push a button and then select a floor one flight above or below yours. Two-person foot surveillance is more effective in that the second surveillant provides greater flexibility. Normally, one surveillant remains close to the target while the other stays at a greater distance. The second surveillant may follow the first on the same side of the street or travel on the opposite side. Periodically the two surveillants change position so that if the target spots one of them, that one will soon be out of sight, leading the target to think that he or she was mistaken. Obviously, spotting this form of surveillance is more complicated, but individuals who are alert to the people in their vicinity will eventually detect the same surveillant over a period of time. Foot surveillance with three or more people uses the most sophisticated techniques and is the most difficult to spot. Generally, one surveillant remains behind the target close enough to respond to any sudden moves. A second surveillant remains behind the first on the same side of the street with the first surveillant in sight. A third surveillant travels on the opposite side of the street parallel with or just behind the target. In areas where the target has few paths to choose, one surveillant may walk in front of the target, where he or she is least likely to cause suspicion. The positions of the surveillants are frequently changed, most commonly at intersections. The surveillant directly behind the target may move to the opposite side of the street, while another surveillant moves in close behind the target. With the additional surveillants, any surveillant who feels that he or she has been observed may drop out of the formation. The use of this sophisticated technique requires that people be alert not only to those people behind them but also to those across the street and perhaps in front of them. If the same person is seen more than once over a certain distance, surveillance may be suspected even if that person is not continuously seen. Common methods for detecting surveillance apply to all three forms of foot surveillance. The most effective are: 1.stopping abruptly and looking to the rear, 2.suddenly reversing your course, 3.stopping abruptly after turning a corner, 4.watching reflections in shop windows or other reflective surfaces, 5.entering a building and leaving immediately by another exit, 6.walking slowly and then rapidly at intervals, 7.dropping a piece of paper to see if anyone retrieves it, 8.boarding or exiting a bus or subway just before it starts, and 9.making sudden turns or walking around the block. While taking these actions, watch for people who are taken by surprise, react inappropriately, suddenly change direction, or give a signal to someone else. Surveillants will not normally look directly at the target, but they may do so if they are surprised or unaware that you are observing them. Foot surveillance is often used in conjunction with vehicle surveillance since it is likely that the target will use a combination of foot and vehicle transportation. Vehicles used for surveillance are inconspicuous in appearance and of a subdued color. Frequently, the inside dome light is made inoperative so that it will not illuminate the interior of the car when the door is opened. Vehicles will have two or more people in them so that if the target parks his or her vehicle and walks away, the surveillance can be resumed on foot while the driver remains with the vehicle. While moving, the driver gives full attention to driving while the observer operates the radio, watches the target, and makes notes on the target's activities. Sometimes it will be necessary for surveillants to break traffic regulations to avoid losing you. If you see a vehicle run a red light, make an illegal U?turn, travel over the speed limit, or make dangerous or sudden lane changes in an apparent effort to keep up with you, you should, of course, be suspicious of that vehicle. The distance between a surveillance vehicle and the target will vary depending on the speed at which the vehicles are traveling and the amount of traffic. Surveillants will try to keep one or two vehicles between themselves and the target. As with foot surveillance, vehicle surveillance may be undertaken using only one vehicle or using two or more vehicles. One-vehicle surveillance suffers from the same drawbacks as one-person foot surveillance. The target has to be kept in view at all times and followed by the same vehicle. Surveillants can try to overcome this advantage somewhat by changing seating arrangements within the vehicle; putting on and taking off hats, coats, and sunglasses; changing license plates; and turning off onto side streets and then turning back to resume the tail. This makes it necessary for a person suspecting surveillance to remember aspects of a following vehicle that cannot easily be changed such as the make, model, and color of the car and any body damage such as rust, dents, etc. The use of two or more vehicles permits surveillance to switch positions or to drop out of the surveillance when necessary. One vehicle follows the target vehicle and directs other vehicles by radio. The other vehicle may follow behind the lead surveillance vehicle, precede the target vehicle, or travel on parallel roads. At intersections, the vehicle following directly behind the target vehicle will generally travel straight ahead while alerting all other vehicles of the direction in which the target vehicle has turned. Another vehicle in the formation will then take a position behind the target and become the lead vehicle, taking over the responsibility for giving instructions to other surveillants. The former lead vehicle then makes a U?turn or travels around the block to take up a new position ready to resume the lead vehicle position again when necessary. People who have well established routines permit surveillants to use methods that are much more difficult to detect. If, for example, you leave the office at the same time each day and travel by the most direct route to your home or if you live in a remote area with a few or no alternate routes to your home, surveillants have no need to follow you all the way to your residence. An alternative method of surveillance in such situations is leading surveillance and progressive surveillance. In leading surveillance the surveillant travels in front of the target while the observer watches for turns. When the target turns, this is noted. The next day the surveillant makes a turn where the target did the previous day. Over a period of time the surveillants will discover the entire route to the residence while still driving in a position that creates much less suspicion. There are two forms of progressive surveillance. In the first form, surveillants are placed at intersections along the probable routes of the target. When the target makes a turn, this is noted and the position of the surveillants is adjusted to check the next intersection. Eventually, this method leads the surveillants to the residence. In the second form or progressive surveillance, a vehicle will follow the target for a short distance and then turn off. On successive days the surveillant picks up the target where he or she left off the previous day. Leading and progressive surveillance are extremely difficult to detect, but you should not give anyone the opportunity to use these methods. The most effective methods for detecting most forms of vehicle surveillance are: 1.making a U-turn where it is safe to do so, 2.making a turn to the right or left (in general, right turns create greater complications for surveillants because of oncoming traffic that may delay a turn), 3.going through a traffic light just as it is turning red, 4.stopping just beyond a curve or hill, and 5.circling a block. In each case, watch for the reactions of any vehicles that you may suspect. Any vehicles that make unusual maneuvers should be carefully noted. Do not forget to check for motorcycles or motorbikes, since in many parts of the world they seem to be favored by surveillants because they move easily through heavy traffic. Stationary surveillance is commonly used by terrorist organizations. As mentioned earlier, most attacks take place near the residence or office because that part of the route is least easily varied. Most people are more vulnerable in the morning when departing for work, because morning departure times are more predictable than are evening arrivals. Surveillants seek a position that permits them to observe the residence or office clearly without being observed or suspected. Surveillants want to identify observation points that afford the best view of the target. Foot and vehicular traffic, buildings and terrain around each government facility vary with each location. Pedestrian traffic, rush hour traffic flow, temporary street closure, etc. will affect observation points. If the surveillants decide that it is best not to be seen, they may obtain an apartment or rent office space in the area that provides for an adequate view, but such apartments or office space may not be available and the renting of an apartment or office space could provide clues for a subsequent investigation. The use of an apartment or office space for surveillance, while possibly the most difficult to detect, is generally not the easiest or safest method. Many surveillance teams use vans with windows in the side or back that permit observation from the interior of the van. Often the van will have the name of a store or utility company to provide some pretext for its being in the area. The driver may park the van and walk away, leaving the surveillance team inside. Some teams use automobiles for stationary surveillance, parking the vehicle far enough from the residence or office to be less noticeable, using other vehicles for cover, facing the vehicle away from the target, and using the rear view mirrors to watch. Where it is not possible to watch the residence or office unobserved, surveillants must come up with a plausible reason for being in the area. The types of ruses used are limited only by the surveillant's imagination. Some of the more commonly used covers are automotive repairs due to engine trouble or a flat tire, door to door sales, utility repair crews, lovers in a park, walking a dog, construction work, or sitting at a cafe. Women and children are often used to give a greater appearance of innocence. Some things to check for are parked vehicles with people in them, cars with more mirrors or mirrors that are larger than normal, people seen in the area more frequently than seems normal, people who are dressed inappropriately, and workers who seem to accomplish nothing. If you become suspicious of a van, note any information printed on the side of the van, including telephone numbers. Check the telephone book to see if such a business exists. Note the license numbers of any suspicious vehicles and provide them to your security office so they can be checked. Make a habit of checking the neighborhood through a window before you go out each day. Detecting surveillance requires a constant state of alertness and must become an unconscious habit. We do not want to encourage paranoia, but a good sense of what is normal and what is unusual in your surroundings could be more important than any other type of security precaution you take. Above all, do not hesitate to report any unusual events to the police. Many people who have been kidnapped realized afterwards that their suspicions had been well founded. If those suspicions had been reported, their ordeal might have been avoided. Since surveillance attempts to determine the suitability of a potential target and the most opportune time for an attack, it is crucial to avoid predictability. Although the recommendation to vary routes and times of arrivals and departures has become trite, implementing it in one's daily schedule has proven to be effective in deterring sufficient terrorist planning. Varying times and routes apply to jogging, shopping and all activities where a pattern can develop. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- From: A.Lizard Date: Sat Jul 1, 2000 9:19pm Subject: re: High-Tech World Has Low-Tech Spying >Message: 2 > Date: Fri, 30 Jun 2000 21:19:14 -0400 > From: "James M. Atkinson, Comm-Eng" >Subject: High-Tech World Has Low-Tech Spying > > >Friday June 30 2:21 PM ET > >High-Tech World Has Low-Tech Spying > >http://dailynews.yahoo.com/h/ap/20000630/tc/corporate_spy_vs_spy_1.html > >By CLIFF EDWARDS, AP Technology Writer > >SANTA CLARA, Calif. (AP) - Transmeta chief executive David Ditzel chuckles >at the memory of the sudden interest in the company's trash weeks before >taking the wraps off its top-secret new Crusoe computer chip. > >But with hundreds of millions of dollars of research on the line, keeping >the microprocessor's specifications secret was no laughing matter. > >Ditzel and other employees at Transmeta's sprawling low-rise office complex, >located in an area tightly packed with semiconductor companies, kept a >careful watch on the trash bins and chased off several people, including one >whose car bore the bumper sticker of a well-known rival. > >``We made sure all they got were orange rinds,'' said Ditzel, who kept the >company's mission secret for five years until January despite heavy interest >from the media and industry. > >Even Oracle Corp.'s hiring of detectives to dig up information on archrival >Microsoft Corp. (NasdaqNM:MSFT - news), didn't shock executives in Silicon >Valley, where ``security'' companies hired by many of those firms say it is >standard procedure to get down in the dirt to muddy the image of competitors >or profit off their work. > >``Dumpster diving,'' hacking, bribery, hiring away key employees - even >not-so-casual conversations with unsuspecting relatives of company >executives, have become conventional tools in the unconventional business of >corporate espionage. How good are low end paper shredders of the kind one can get at Office Depot? Good means hundreds of hours for every page reconstructed if they can be reconstructed at all. Or is a company better off going straight to sealed burn bags for everything regardless of cost. It appears that the best solution to the garbage security problem is to put a paper shredder over every desk wastebasket and train the employees to put every single sheet of paper they have no further use to through the shredder, including junk mail. The other point is that if one has reason to believe that one's office garbage is being examined, this is a great opportunity to provide the opposition with false and misleading information. This can not only be bad for opposition business, but can have a great deal of entertainment value. Opinions? A.Lizard Note: I think Oracle, in a blundering way, did both the entire computing community and ironically, Microsoft's stockholders a favor by exposing the "independent" organizations promoting Microsoft viewpoints as paid shills. I am of the opinion that exposing MS to product and price competition will result in better MS products, and the MS organizations will become more valuable to their stockholders just as the AT&T companies did post-breakup for their stockholders ************************************************************************ Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... PGP 6.5.1 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 723 From: Steve Uhrig Date: Sun Jul 2, 2000 4:32pm Subject: Re: Video Surveillance Laws (or lack thereof) Once upon a midnight dreary, Negative-@w... pondered, weak and weary: > From what I have gathered from the news, here in Maryland, U.S., it > is not against the law to surreptitiously video a person. It is only > against the law to record audio without the parties knowledge. In Maryland, ALL parties must give consent for audio. Video is permitted in certain circumstances. You are not permitted to install covert video in a bathroom, bedroom, dressing room or any private area where someone may have a "reasonable expectation of privacy". Regardles of who owns the house, if another resident, babysitter or even casual visitor would have the expectation of privacy, you cannot video there. Nanny watching cannot even be done in the child's bathroom, for example, as there is a possibility a guest or family member could use that bathroom. Same restrictions are true in a commercial or public facility. Reasonable expectation of privacy. You also are not permitted to surveil any union facility unless you first have permission of the union. When we have a covert video job at a union shop, we get management to work with the union to allow videotaping ("If you don't have anything to hide then you won't object"). Then we put a genuine camera exposed, in some back corner of the place falling off the bracket looking at the floor, with coax splices obviously pigtailed with no electrical tape. We let the union think this is the "video surveillance" obtained via low bid. In the meantime, the genuine covert video is cranking away. Maryland is a pretty tight state with regard to electronic surveillance violations. Based on the number of prosecutions and sentences, Maryland is the 3rd toughest state in the union for prosecuting these things. The laws affecting video are very recent and most lawyers do not know, so do not rely on them for advice. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 724 From: William Knowles Date: Sun Jul 2, 2000 2:04pm Subject: Re: re: High-Tech World Has Low-Tech Spying On Sat, 1 Jul 2000, A.Lizard wrote: > >http://dailynews.yahoo.com/h/ap/20000630/tc/corporate_spy_vs_spy_1.html > > > >``Dumpster diving,'' hacking, bribery, hiring away key employees - even > >not-so-casual conversations with unsuspecting relatives of company > >executives, have become conventional tools in the unconventional business of > >corporate espionage. > > It appears that the best solution to the garbage security problem > is to put a paper shredder over every desk wastebasket and train > the employees to put every single sheet of paper they have no > further use to through the shredder, including junk mail. You would think, An organization in California I consulted with used the fax machine for office copies and it was one of these plain paper units that has a roll of carbon to imprint the copies and faxes on and would have to be removed when inserting a new roll, Well it had be discovered that the office girl was just tossing the finished roll with everything faxed and copied (in reverse) for the last month in garbage. For that matter the management didn't see too concerned about the data on the fax roll and balked at buying a shredder. The low tech response for disposing the fax rolls in the future was to drop them in the garbage of the local C rated burrito resturants dumpster. :) > The other point is that if one has reason to believe that one's > office garbage is being examined, this is a great opportunity to > provide the opposition with false and misleading information. This > can not only be bad for opposition business, but can have a great > deal of entertainment value. Heh, Another party I was friends with owned a chain of bicycle shops and it was known that some parties were checking the dumpsters behind their shops for information, This was alleviated by moving the empty boxes of sold bicycles from busy stores to locations of theirs where business was fairly slow, and then watching the competition increase their advertising budgets for a few weeks where more boxes were being found in the garbage. My personal opsec has a good Brother cross shredder in the home office, but I have been toying with the idea of getting a NSA certified shredder to make anyone whose raiding my garbage a lesson in futility. :) William Knowles wk@c... *-------------------------------------------------* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen. Alfred. M. Gray, USMC --------------------------------------------------- C4I Secure Solutions http://www.c4i.org *-------------------------------------------------* 725 From: Miguel Puchol Date: Sun Jul 2, 2000 1:28pm Subject: RE: Bugged computer? Andy, > I guess you sniffed the RF channel, one way, as the kbd only requires a > one way link. Correct! Logitech had a company (the name of which escapes me now...) make the coding and RF stages of the keyboard. If you look inside the keyboard, you'll find an IC with 'NMB' stamped on it. This is the coding chip, and I could'nt find info on it - some cordless telephones use similar schemes for sending numbers between handset and base, but they use Motorola coding ICs, and these are easier to deal with. It proves a good intellectual exercise. By the way, to those who asked, I wont give the software away - the reasons should be obvious. Cheers, Mike 726 From: Miguel Puchol Date: Sun Jul 2, 2000 1:28pm Subject: RE: Fw: Paul - sources Andy, > > You could use another scanner (AFAIK) to tune in the 10.7MHz IF out > > segment from the AR5000. > > > I dont think so. How? > My understanding is the signal has to be demodulated before ANY > subcarrier appears! The loading or bandwidth of the demod has a direct > relationship to the level of signal available from its output, > including > the bandwidth > of the pre-detector RF. If you take a scanner's 10.7 MHz IF output (like the AR5000 which is available through a BNC connector) and you feed it into another scanner's antenna input, and tune that scanner to 10.7MHz, you will hear the original signal from the first scanner. A more rudimentary way is to take the detector output from the scanner and feed it into the antenna input of another one (at very low volumes!), then you get the same effect. A simple test is to tune the first scanner to a stereo FM radio station, and then tune the second to 19kHz. You will then hear a pilot tone, which is the one that makes the 'Stereo' LED light up on your radio deck. Other common subcarriers used by FM radio stations are 28 and 45kHz, at least here in Spain, for things like audio loops for shops, bars, etc. and for RDS transmissions. > A scanner will not normally have this output available...unless its spec > shows it's for data use > e.g. 9600 bd and above, paket data use. Yep, but most can be easily modified. Look at www.qrz.com/mods All the best, Mike 727 From: Miguel Puchol Date: Sun Jul 2, 2000 1:42pm Subject: RE: AR8200 Hi Andy, Third reply :-) > I just got an AR8200 and it has an unusual socket for the data link - it > looks a bit like a modular network socket. The dealer wants over > $100 for a > cable into my Compaq serial port....sounds like a rip off to me. I went looking for one like mad, and after a couple of weeks, gave up. It's very strange, and I believe that its either a) custom-made for AOR or b) some weird type in Taiwan, so impossible in the 'west'. It is similar in shape to a USB connector, but has more contacts than one. I can get the original cables here in Spain for around $40, if you're interested let me know. If anyone has additional info I'd also like to know, I could do with a couple more cables myself. Regards, Mike 728 From: James M. Atkinson, Comm-Eng Date: Sun Jul 2, 2000 7:39pm Subject: Re: re: High-Tech World Has Low-Tech Spying At 2:04 PM -0500 7/2/00, William Knowles wrote: >On Sat, 1 Jul 2000, A.Lizard wrote: > > > >http://dailynews.yahoo.com/h/ap/20000630/tc/corporate_spy_vs_spy_1.html > > > > > >``Dumpster diving,'' hacking, bribery, hiring away key employees - even > > >not-so-casual conversations with unsuspecting relatives of company > > >executives, have become conventional tools in the unconventional >business of > > >corporate espionage. > > > > It appears that the best solution to the garbage security problem > > is to put a paper shredder over every desk wastebasket and train > > the employees to put every single sheet of paper they have no > > further use to through the shredder, including junk mail. I use the following rule of thumb: 1) A shredder must reduce the page to pieces that are smaller then the smallest character on any the page of the materials. 2) For a document that uses 10 or 12 point type this would dictate a piece to be no larger then 1/16th of an inch in any dimension after shredding. 3) Once a small quantity of documents are shredded (or at least once a day) the collection bin is checked to ensure that shredding actually took place correctly. 4) Sometimes a shredder will malfunction, and simply "chew" the document, so it is important to check the collection bin. 5) At one of the facilities I worked we actually had to sift all of the shredded materials before any of the "grindings" could leave the controlled area. 6) I strongly suggest that each executive has a small personal shredder next to his desk for ALL documents (call it an executive benefit). 7) I also suggest that each copy machine, laser printer, and fax machines in the company have a shredder nearby, and that NOTHING ever leaves the company intact. 8) At any given time the trash found in a dumpster or trash should NEVER contain any document created inside the facility, ever. 9) Also there should be a central collection point for all paper and other documents where they cam be "bulk shredded" (daily) prior to being released to a recycling firm. It never ceases to amazes me how many companies (and government facilities) are so clueless about trash management. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 729 From: James M. Atkinson, Comm-Eng Date: Sun Jul 2, 2000 8:27pm Subject: RE: Fw: Paul - sources At 8:28 PM +0200 7/2/00, Miguel Puchol wrote: >Andy, > > > > You could use another scanner (AFAIK) to tune in the 10.7MHz IF out > > > segment from the AR5000. > > > > > I dont think so. How? > > My understanding is the signal has to be demodulated before ANY > > subcarrier appears! The loading or bandwidth of the demod has a direct > > relationship to the level of signal available from its output, > > including > > the bandwidth > > of the pre-detector RF. > >If you take a scanner's 10.7 MHz IF output (like the AR5000 which is >available through a BNC connector) and you feed it into another scanner's >antenna input, and tune that scanner to 10.7MHz, you will hear the original >signal from the first scanner. >A more rudimentary way is to take the detector output from the scanner and >feed it into the antenna input of another one (at very low volumes!), then >you get the same effect. >A simple test is to tune the first scanner to a stereo FM radio station, and >then tune the second to 19kHz. You will then hear a pilot tone, which is the >one that makes the 'Stereo' LED light up on your radio deck. >Other common subcarriers used by FM radio stations are 28 and 45kHz, at >least here in Spain, for things like audio loops for shops, bars, etc. and >for RDS transmissions. > > > A scanner will not normally have this output available...unless its spec > > shows it's for data use > > e.g. 9600 bd and above, paket data use. > >Yep, but most can be easily modified. Look at www.qrz.com/mods > >All the best, > >Mike Feeding the 10.7 IF to a second scanner will do very little good as you first have to isolate and demodulate the first signal to extract a SubCarrier. Simply dumping the 10.7 IF to a second scanner will do little more then make both signals appear on both scanners. You simple MUST demodulate the signal first to extract the SubCarrier signal. Of course you can modify the first scanner to tap off just prior to the LP filter in the audio amp, and then dump THAT into a second scanner (which is what I suspect you meant). -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 730 From: Date: Sun Jul 2, 2000 10:12pm Subject: Oldies Stations for relaxation; cool radio station links of various musical format. menu bar at bottom of link page will bring you to classical,jazz,pop etc. radio stations on the net. HAVE A GREAT DAY !!! ---------- http://members.wbs.net/homepages/w/e/b/webtv99/oldies.html [Non-text portions of this message have been removed] 731 From: James M. Atkinson, Comm-Eng Date: Sun Jul 2, 2000 10:21pm Subject: Re: Oldies Stations At 11:12 PM -0400 7/2/00, patedwards@w... wrote: >for relaxation; >cool radio station links of various musical format. menu bar at bottom >of link page > will bring you to classical,jazz,pop etc. radio stations on the net. Pray, do they have a TSCM call-in hour? -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 732 From: Doug Ellsworth Date: Mon Jul 3, 2000 0:43am Subject: Re: re: High-Tech World Has Low-Tech Spying My two cents: Our policy includes three and only three options. Failure to follow Options 1 and 2 REQUIRES Option 3! Number One: Shred and scatter. Number Two: Burn and disperse. Number Three: CHEW AND SWALLOW. ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: Sent: Sunday, July 02, 2000 5:39 PM Subject: Re: [TSCM-L] re: High-Tech World Has Low-Tech Spying At 2:04 PM -0500 7/2/00, William Knowles wrote: >On Sat, 1 Jul 2000, A.Lizard wrote: > > > >http://dailynews.yahoo.com/h/ap/20000630/tc/corporate_spy_vs_spy_1.html > > > > > >``Dumpster diving,'' hacking, bribery, hiring away key employees - even > > >not-so-casual conversations with unsuspecting relatives of company > > >executives, have become conventional tools in the unconventional >business of > > >corporate espionage. > > > > It appears that the best solution to the garbage security problem > > is to put a paper shredder over every desk wastebasket and train > > the employees to put every single sheet of paper they have no > > further use to through the shredder, including junk mail. I use the following rule of thumb: 1) A shredder must reduce the page to pieces that are smaller then the smallest character on any the page of the materials. 2) For a document that uses 10 or 12 point type this would dictate a piece to be no larger then 1/16th of an inch in any dimension after shredding. 3) Once a small quantity of documents are shredded (or at least once a day) the collection bin is checked to ensure that shredding actually took place correctly. 4) Sometimes a shredder will malfunction, and simply "chew" the document, so it is important to check the collection bin. 5) At one of the facilities I worked we actually had to sift all of the shredded materials before any of the "grindings" could leave the controlled area. 6) I strongly suggest that each executive has a small personal shredder next to his desk for ALL documents (call it an executive benefit). 7) I also suggest that each copy machine, laser printer, and fax machines in the company have a shredder nearby, and that NOTHING ever leaves the company intact. 8) At any given time the trash found in a dumpster or trash should NEVER contain any document created inside the facility, ever. 9) Also there should be a central collection point for all paper and other documents where they cam be "bulk shredded" (daily) prior to being released to a recycling firm. It never ceases to amazes me how many companies (and government facilities) are so clueless about trash management. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== ------------------------------------------------------------------------ Was the salesman clueless? Productopia has the answers. http://click.egroups.com/1/4633/1/_/507420/_/962585163/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 733 From: James M. Atkinson, Comm-Eng Date: Mon Jul 3, 2000 11:23am Subject: RPT - Israel to relive Mossad foul-up in Swiss trial Monday July 3, 6:25 AM RPT - Israel to relive Mossad foul-up in Swiss trial http://uk.news.yahoo.com/000703/1/ac888.html By Nieck Ammerlaan ZURICH (Reuters) - The Swiss Federal Court faces a test of its diplomatic skills this week brought on by the trial of a self-confessed agent for Israel's Mossad secret service for his role in a bungled wire-tap attempt in 1998. The court, the highest in the land, already has had to accept that the man, who was caught red-handed in an apartment building near the capital Berne, will appear without the judges knowing his actual identity. The spy's true name is not being revealed in deference to Israeli state interests. But Switzerland has insisted the trial take place, even if it revives the acute embarrassment felt in Israel when the case first came to light. The Federal Police Office is allowing the man to return to Switzerland as "David Bental", known to be ones of his aliases. Apart from wire-tapping, the charges against the agent, who is also named "David Bental" on documents from the Federal Court in Lausanne where he will stand trial, include entering the country using genuine travel papers with false names. Other charges include political espionage and carrying out illegal acts for a foreign state. The Federal Prosecutor's Office has said the accused had admitted to acting on orders from the Mossad, Israel's intelligence agency which has a reputation for ruthless efficiency, but has also badly bungled operations. Federal Police Office spokesman Folco Galli has said the agent's mirky identity was not a problem for the Swiss. "The Federal Court let him go on bail and allowed him to leave the country under that name (Bental)." The man was arrested in February 1998 together with five others after a sleepless resident raised the alarm. Police found the group in the basement of the apartment house, trying to tap the phone of a naturalised Lebanese-born car dealer believed to have links with Hizbollah (Party of God) Shi'ite Moslem guerillas. The others were let go before prosecutors arrived, but Bental was detained after he failed to explain what he was doing with a suitcase full of electronic gear in the cellar of a private residence. Shame-faced, Israel paid bail of three million Swiss francs and apologised, and Bental was allowed to leave the country. Federal Court Judge Hans Wipraechtiger, presiding over the trial, has said the accused's veiled identity was not an issue for the court either. "We expect the Federal Police to confirm that this is the man who was caught. That is important." "It is not good that we will know anything about his previous life or his record, but that is not that rare: it also happens in the case of illegal immigrants," he said. Wipraechtiger said the Israeli state prosecution office had told the court that Bental had no previous convictions. The trial is due to start at 1200 GMT on Monday, when Bental will be heard. On Tuesday, further witnesses will appear. Both sides are to sum up on Thursday and sentence is due to be pronounced on Friday morning. Political espionage is punishable with up to four years in jail in Switzerland. But legal experts have said the agent faces only a one-year sentence, possibly suspended, which would reflect the diplomatic sensitivities of the case and a likely reluctance on the part of the Swiss to have to jail a known spy. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 734 From: James M. Atkinson, Comm-Eng Date: Mon Jul 3, 2000 11:25am Subject: Dirty world of corporate spying costs billions Dirty world of corporate spying costs billions http://www.thestar.com/editorial/updates/business/200007030_CORPORATE-SP.html SANTA CLARA, Calif. (AP) - Transmeta chief executive David Ditzel chuckles at the memory of the sudden interest in the company's trash weeks before taking the wraps off its top-secret new Crusoe computer chip. But with hundreds of millions of dollars of research on the line, keeping the microprocessor's specifications secret was no laughing matter. Ditzel and other employees at Transmeta's sprawling low-rise office complex, in an area tightly packed with semiconductor companies, kept a careful watch on the trash bins and chased off several people, including one whose car bore the bumper sticker of a well-known rival. ''We made sure all they got were orange rinds,'' said Ditzel, who kept the company's mission secret for five years until January, despite heavy interest from the media and industry. Even Oracle Corp.'s hiring of detectives to dig up information on archrival Microsoft Corp., didn't shock executives in Silicon Valley, where ''security'' companies hired by many of those firms say it is standard procedure to get down in the dirt to muddy the image of competitors or profit off their work. ''Dumpster diving,'' hacking, bribery, hiring away key employees - even not-so-casual conversations with unsuspecting relatives of company executives - have become conventional tools in the unconventional business of corporate espionage. Fortune 1,000 companies lost more than $45 billion (U.S.) last year from trade theft, according to a survey by the American Society for Industrial Security and PricewaterhouseCoopers. Other estimates put the figure closer to $100 billion. But in the game of spy versus spy, few players are willing to admit involvement unless caught in the act. In recent years, admissions of unorthodox tactics have come from companies such as Microsoft Corp., America Online Inc., and this past week, Oracle. Oracle chairman Larry Ellison said he authorized payments to a private detective agency to spy on several trade and policy groups that publicly supported Microsoft in the federal antitrust case. He portrayed his efforts as a public service, although Oracle would benefit directly from a wounded Microsoft. According to executives at firms who do corporate espionage, what has been dubbed ''Larrygate'' by some is by no means an isolated incident. ''Corporate wars are just like real wars: They're ugly, and they are won and lost in the details,'' said Eric Dezenhall, whose Washington firm Nichols-Dezenhall hires private detectives, former CIA, FBI, Drug Enforcement and other law enforcement officers for corporate investigations. ''A company might not want to know how you got the information, but they still want the information,'' Dezenhall said. Experts say high-tech companies are especially vulnerable to espionage. They often work to promote a casual atmosphere to their employees and overlook establishing security procedures in their rush to get out new products. Security guards are rarely posted in many companies' lobbies, doors go unlocked, computers lack intrusion safeguards. ''You can expect that your adversary is going to come through the path of least resistance, the one gateway that you didn't secure, whether it's your trash or your Internet gateway,'' said Amit Yoran, chief executive of RIPTech, a security-monitoring company. ''It's not something that's openly talked about, because most people think it does smell,'' Yoran said. ''But you have to realize this is a global economy we're now talking about; in the international and global economies where we are competing, these are commonly accepted business practices.'' Industry analysts estimate slightly more than 80 per cent of the world's companies with a market capitalization of more than $1 billion (U.S.) have a formal intelligence program to either gather information on competitors or protect their own information. Forrester Research, in its B2B Information Warfare report, found that while corporate spending on security represents just a fraction of total expenditures, the security spending has risen by a factor of 10 in just two years. ''No one knows the total size of the problem, but even if they don't talk about it and even if they're not quite sure what they're afraid of, it's clear they see the risk,'' said senior analyst Frank Prince at Forrester's e-business infrastructure group. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 735 From: James M. Atkinson, Comm-Eng Date: Mon Jul 3, 2000 11:27am Subject: Bungling Mossad spy goes on trial Bungling Mossad spy goes on trial http://www.ananova.com/news/story/switzerland_israel-crime-spying_150129.html An Israeli spy has gone on trial more than two years after a group of Mossad agents bungled their attempt to bug a Swiss apartment. It is believed to be the first time a confirmed member of the spy agency has gone on trial outside Israel. The February 1998 operation came unstuck when police were called to investigate strange noises in the basement of a building in Liebefeld, a suburb of the capital, Bern. But of the five agents who were caught, only one - a man Swiss officials say admitted being assigned to install the wire tap - faces charges. Four were initially questioned by police but got away, and another was never caught. The case embarrassed the government of then premier Benjamin Netanyahu. Israel apologised to Switzerland, but the incident soured relations already overshadowed by tensions over Switzerland's treatment of the assets of Jews who perished in the Holocaust. The main charge is espionage for another country, which could bring a sentence of up to 20 years imprisonment. But demands for a shorter sentence are expected because the espionage was not aimed at Switzerland, but at an alleged link to an anti-Israel Arab organisation. The aim of the operation was to bug phone calls from the apartment of Abdallah el-Zein, whom Swiss officials claim was linked to Hezbollah, the militant organisation that fought for years to oust Israel from south Lebanon. El-Zein has denied this. Swiss authorities remain unaware of the agent's real name. The indictment describes him as "Issac Bental, born July 10 1954; son of Samuel Bental and Sera Hen; Mossad agent, mathematician, computer specialist, resident of Tel Aviv." In a concession to Israeli sensitivities, Hans Wipraechtiger, presiding judge of the Federal Criminal Court which is conducting the trial in Lausanne, said that Bental would be able to continue using the pseudonym in the trial without divulging his true identity. Last updated: 12:34 Monday 3rd July 2000. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 736 From: A Grudko Date: Mon Jul 3, 2000 10:43am Subject: Re: Fw: Paul - sources ----- Original Message ----- > If you take a scanner's 10.7 MHz IF output (like the AR5000 which is > available through a BNC connector) and you feed it into another scanner's > antenna input, and tune that scanner to 10.7MHz, you will hear the original > signal from the first scanner. > A more rudimentary way is to take the detector output from the scanner and > feed it into the antenna input of another one (at very low volumes!), then > you get the same effect. > A simple test is to tune the first scanner to a stereo FM radio station, and > then tune the second to 19kHz. You will then hear a pilot tone, which is the > one that makes the 'Stereo' LED light up on your radio deck. > Other common subcarriers used by FM radio stations are 28 and 45kHz, at > least here in Spain, for things like audio loops for shops, bars, etc. and > for RDS transmissions. I think I see what you're trying to do, but I haven't tried this technique and I'm still not convinced this will work without demodulating the signal out of the first scanner. I'll give it a try - I'm always happy to try something new. Thanks Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust "When you need it done right - first time" ICQ 78711262 737 From: A Grudko Date: Mon Jul 3, 2000 11:09am Subject: Shredding - PG16 humour Please don't read any further if you are offended by a little adult humour. I just could not resist this obvious reply after all the technical posts on IFs, subcarriers, demodulation etc... ----- Original Message ----- > Our policy includes three and only three options. > Failure to follow Options 1 and 2 REQUIRES Option 3! > Number One: Shred and scatter. We do this to sensitive docs. and the shreddings go to my house for > Number Two: Burn and disperse. kindling for our fireplace in the winter - legal in our country, maybe not in others 'cos of polution. All non-sensitives taken to one of many recycling plants. Nothing goes into our dumpster > > Number Three: CHEW (the cigar) AND SWALLOW (the evidence). My contact in the Secret Service tells me the President used to have a 'Mark 1 Lewinski Lasher de Lux' under his desk but he has replaced it with a quieter model......... Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust "When you need it done right - first time" ICQ 78711262 738 From: James M. Atkinson, Comm-Eng Date: Mon Jul 3, 2000 11:38am Subject: Corporate-Spying Firms Thrive Call It Mission Impossible Inc. -- Corporate-Spying Firms Thrive http://dowjones.wsj.com/n/SB962620063527490475-d-main-c1.html By NEIL KING JR. and JESS BRAVIN Staff Reporters of THE WALL STREET JOURNAL The corporate-spying business is booming, and it appears to include more capers like the Oracle-Microsoft trash-combing incident than some professionals in the field like to admit. Most corporate detectives avoid terms like spying and espionage, preferring the more dignified label "competitive intelligence." But whatever you call it, snooping on business rivals has become an entrenched subindustry. Nearly every large U.S. company has an intelligence office of some kind. Some, like Motorola Inc., have units sprinkled in almost all of their outposts around the world. Their assignment is to monitor rivals, sniff out mergers or new technologies that might affect the bottom line, even to keep tabs on morale at client companies. Motorola's intelligence unit, seen as a model in the business, was formed in 1982 by a veteran of the Central Intelligence Agency. Much of this corporate activity is considered ethical, but there is disagreement over when, and how often, it crosses the line into impropriety. Some corporate intelligence types say that the Oracle Corp. trash operation was an anomaly, that respectable companies rarely engage in such tactics. "This is the sort of thing that gives legitimate business intelligence a bad name," says Alden Taylor, head of corporate intelligence at Kroll Associates Inc. in New York. "What we do is much closer to specialized management consulting than it is donning Neoprene suits and diving into dumpsters." Others have had a different experience. "There's a lot of dumpster-diving that goes on; people are always trying to steal customer lists and that sort of thing," says Eddy McClain, a 44-year veteran of the private-eye trade and president of Krout & Schneider Inc., a detective agency in Glendora, Calif. And as for drawing ethical or legal lines, Mr. McClain adds, "the generally accepted premise is, if the trash is on the curb, it's fair game, but if it's on someone's private property, it's questionable." Heightening the stakes, a number of foreign governments regularly dispatch spies to steal American corporate secrets for foreign industry, according to U.S. law-enforcement officials. Recently, Europeans have countered with similar charges about U.S. government spy agencies. Corporate intelligence relies on a slew of tools, some sophisticated, many quite basic. On the simpler side, business sleuths do everything from prowling trade-show floors to combing through rivals' Web sites and Patent Office filings. They keep their ears open in airports and onboard flights. But sometimes they go further. They take photographs of competitors' factories, and increasingly, they rely on new data-mining software that permits them to scour the Internet at high speeds for snippets about their rivals. The aim, says Leonard Fuld, president of Fuld & Co., a corporate intelligence consulting firm in Cambridge, Mass., is to garner every possible public fact about one's market or competitor, and then see the opportunities that others miss. While corporations are littered with former Federal Bureau of Investigation and CIA agents, most corporate-intelligence workers tend to be accountants, market researchers and MBAs -- people with highly analytical skills that are accustomed to collecting and synthesizing vast quantities of information, fast. There's even a trade association for these professionals, based outside Washington, D.C., with 6,900 members. Universities offer courses on competitive intelligence; the University of Missouri at Kansas City teaches enrollees how to do "pipeline analysis" in the pharmaceutical industry, which involves using public sources to suss out what drugs are in a competitor's research pipeline. At Motorola, officials say that based on competitive intelligence, they have revamped significant parts of the company and even chosen new partners, such as Cisco Systems Inc. last year. Now directed by its third ex-CIA operative in a row, the Motorola intelligence team sits in on most business strategy sessions, company officials say. "The concept was to mirror the interaction between the CIA and the White House," says Jan Herring, who formed the Motorola unit in the early 1980s after 20 years at the spy agency. "We provided the best intelligence, and the executives made the decisions." Mr. Fuld voices a common view that the Oracle-Microsoft case represents an unscrupulous fringe of business intelligence -- but concedes it's one that is nonetheless alive and well, especially in Silicon Valley. "The high-tech field is more open to this sort of thing because the product life cycles are so much shorter," he says. "That leads to a certain desperateness and haste." But Old Economy companies get in the act, too. Raytheon Co., a defense contractor, for example, last year agreed to pay a multimillion-dollar settlement to resolve civil allegations that it hired private detectives to eavesdrop and steal confidential documents in an unsuccessful attempt to undermine Ages Group LP's bid for a U.S. military aircraft-service contract. A Raytheon spokesman confirms the settlement but denies the company committed any wrongdoing. The upshot: It's hard to find a consensus on where exactly the ethical and legal lines lie. Stealing or trespassing on a rival's property could be the basis for criminal prosecution. The Economic Espionage Act, enacted in 1996, specifically makes theft of trade secrets a federal felony. But the Justice Department says there have been only 22 indictments under the act, with 19 convictions and three cases pending. Still, short of out-and-out theft, it's difficult to separate legitimate from unethical conduct in this murky realm, experts say. Common sense may be the best guide. "In most cases, people wouldn't have a problem distinguishing what is illegal or unethical conduct vs. obtaining information from public sources," says Peter Toren, a New York attorney who formerly prosecuted trade-secret cases at the Justice Department. Donald Greenwood, a Houston security consultant who has held top security posts at Apple Computer Inc., Compaq Computer Corp. and Sun Microsystems Inc., says that such "upstanding companies" would rarely engage in questionable behavior like rifling garbage looking for a rival's secrets. He says he knows of a number of instances in which Silicon Valley companies that were offered a competitor's trade secrets handed the information back to the competitor, along with the name of the person offering it. Yet when done as a defensive tactic, Mr. Greenwood says, trash raids are perfectly appropriate. He says his current firm, Swailes, Sheridan, Slade & Associates, has conducted them, but only on behalf of client companies that believe their trade secrets have been stolen and want to check a rival's garbage for evidence. "It's a matter of intent," he says. It's "a personal line that you draw." Equally unclear is how much illegal activity exists and how much it costs the victims. By definition, successful corporate espionage doesn't come to light, so it's hard to gauge how much there is. And "companies are often reluctant to report to authorities that they have been the victim of such conduct," because they don't want embarrassing publicity, Mr. Toren says. One commonly cited study, sponsored in part by PriceWaterhouseCoopers, which has an information-protection practice, says theft of proprietary information cost Fortune 1000 companies $45 billion in 1999. Perhaps the most shadowy aspect of all in the corporate-espionage game is the role of national intelligence services that aid their country's companies. The French are considered the most aggressive in this regard, although they deny it. In a speech last year at the U.S. Chamber of Commerce in Washington, FBI Director Louis J. Freeh said his agents are tracking eight foreign countries that are "extremely active," using bribery, theft and other clandestine techniques "with the ultimate purpose of benefiting a foreign government" by delivering trade secrets "to one of their national companies." The FBI declines to identify the countries. And this year, European government officials have accused the U.S. of abusing its international electronic communications-surveillance network to gather information for American companies -- a charge the CIA and other U.S. intelligence agencies heatedly deny. Pamela J. Noe, a senior intelligence officer with the CIA, who is on leave this year to teach at George Washington University, says that corporations could look to the American government to elevate their behavior. "In corporate America," she observes, "the definition of what's ethical is what's legal. I come from a higher standard, believe it or not, simply because ethics are scrutinized much more in the U.S. government intelligence field." =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 739 From: Jordan Ulery Date: Mon Jul 3, 2000 5:01pm Subject: Re: Video Surveillance Laws (or lack thereof) Steve is generally right in talking about a lack of video laws. The area to watch is the stalking statutes of each state. MA recently had a close call with a "right (left) minded" idea to prevent surreptitious video taping of bedroom activity from outside the house. The intent was to allow prosecution of video peeping toms with yet another law. The effect of the poorly conceived wording would have been to prevent any video taping of any activity, including news action, workers' comp anti-fraud, anti-theft, nanny cam and the like. Except for the eagle eyes of the legislative watch committee of LPDAM (the PI association in MA) it would have passed as one of those feel-good laws that didn't harm anyone, except everyone. 740 From: James M. Atkinson, Comm-Eng Date: Mon Jul 3, 2000 6:40pm Subject: Suspected Mossad spy admits to phone bugging in Swiss trial Suspected Mossad spy admits to phone bugging in Swiss trial http://www.arabia.com/article/0,1690,News|24299,00.html The Mossad agent told the Swiss federal court that he was simply an operative sent to Switzerland to carry out a special mission. July 03, 2000, 10:29 PM LAUSANNE, Switzerland (AFP English) - An agent of Israel's secret service, Mossad, admitted Monday to having participated in an illegal phone bugging operation in a Bern suburb when his trial on spying charges opened here. The accused, whose identity is not known for security reasons, is charged with four others of having attempted to place a phone tap two years ago on a man of Lebanese origin suspected by Mossad of running Hezbollah's operations in Switzerland. After being escorted into the building by a backdoor to avoid photographers, the agent told the Swiss federal court that he was simply an operative sent to Switzerland to carry out a special mission. "Our mission was to spy on a man who is a terrorist, a man who dispatched terrorists to Israel," he added, claiming the surveillance target was the director of the Ahl-Al-Bait Centre in Berne, an organisation allegedly run by Hezbollah. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 741 From: James M. Atkinson, Comm-Eng Date: Mon Jul 3, 2000 7:10pm Subject: Family of Filters I am working on the designs and prototypes for a new series of filters to be used by TSCMers, and would like to obtain some input of preferences from those of you in the field. The initial designs are based on a simple multiple Butterworth filter, and are built into a small metal box with BNC connectors on both end (so it can be placed into series with an antenna). The PCB is mostly surface mount, and at least five stages/poles are used, but I have space for up to 25 poles (the PCB can have up to four high-pass/low pass filters each). The first family of filters are very sharp and are designed to kill (Band Reject) or Isolate (Band Pass) specific broadcast bands and related annoying transmissions (such as CB's). In the first switch position the filter will be a bandpass, in the second position a band reject, I currently have the designs set for a 40 dB or better attenuation, but would consider bumping it up to 80+ dB if there is enough interest. I will also consider providing them as four filters that can be configured (via a toggle switch) to select the actual high/low pass filter (as opposed to just providing a bandpass/reject) By first filtering (at least 40 dB on the antenna), and then amplifying the results (25-40 dB) you can isolate hostile signals in a saturated signal area. Also, by increasing the number or stages or poles the sharper you can make the filter. The filters are designed for very specific bands of interference, or specific threats that you may need to isolate. I am leaning towards a cost of $105 for the basic case and high pass filter circuit, and additional $45 for the low pass. The second and third filter (in the same case) would cost an additional $35 each. This way you could have a precision band reject and band pass all in the same box (which would be very small). Of course the final price has not been set yet as I am still working on the designs. Unless otherwise noted all filters are 50 ohms input and output impedance, with a 40 dB filter, all connectors are BNC, but I am considering using N-Type. So far I have the following prototypes built and operational. DC to 300 Hz (12.5 ohms in, 50 ohms out, 110 dB, designed as a PLA) DC to 300 Hz (600/900/1200 ohms input, 50 ohms output) 300 Hz to 3300 Hz (600/900/1200 ohms input, 50 ohms output) 300 Hz to 15 kHz 9 kHz to 150 kHz 100 kHz to 500 kHz 14.5 kHz to 50 kHz 500 kHz to 1.710 MHz 1.7 MHz to 3 MHz 3 MHz to 6 MHz 6 MHz to 12 MHz 12 MHz to 24 MHz 24 MHz to 30 MHz 87.5 MHz to 107.5 MHz 30 MHz to 45 MHz 45 MHz to 50 MHz 54 MHz to 88 MHz 108 MHz to 135 MHz 135 MHz to 150 MHz 150 MHZ to 174 MHz 174 MHz to 200 MHz 200 MHz to 225 MHz 225 MHz to 250 MHz 169 MHz to 172 MHz 30 MHz to 300 MHz 300 MHz to 500 MHz 225 MHz to 400 MHz 390 MHz to 430 MHz 430 MHz to 435 MHz 400 MHz to 820 MHz 820 MHz to 870 MHz 870 MHz to 895 MHz 902 MHz to 928 MHz 928 MHz to 960 MHz The PCB is laid out is such a way that I may be able to add a small low noise preamp circuit in the same case after the filter circuit (probably about 25 db of gain with a nf of 3 dB or less), but it this would require an external power source. I am also considering building all of the filters into a single box along with a low noise preamplifier (32+ dB) so that it can be used as a 128 band pre-selector (which would be invaluable in TSCM). Can anybody suggest other bands (below 1 GHz) that they feel would be helpful? I am going to work on the designs for some similar stuff between 1 GHz and 3 GHz, but it will be later this fall. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 742 From: Jordan Ulery Date: Mon Jul 3, 2000 8:14pm Subject: Data Deleation Thank you for the detailed information. It fills in gaps in knowledge and experience. 743 From: James M. Atkinson, Comm-Eng Date: Mon Jul 3, 2000 8:51pm Subject: Court Hears of Mossad Operation Court Hears of Mossad Operation http://www.latimes.com/wires/20000703/tCB00V0884.html By ALEXANDER G. HIGGINS, Associated Press Writer LAUSANNE, Switzerland--An Israeli Mossad agent admitted in court Monday that he illegally entered Switzerland in a bungled 1998 operation to spy on a man allegedly linked to terrorist operations. Although other Mossad agents have been charged with spying abroad, it was believed to be the first time a confirmed member of the Israeli spy agency has gone on trial outside Israel. The defendant, a stocky man with short, dark hair, testified under the assumed name Issac Bental. "It would affect my own personal security if I gave my true identity," he said in Hebrew. An interpreter translated his testimony into German for the five-judge panel of the Federal Criminal Court. Bental's chief lawyer, Ralph M. Zloczower, told the court that even he didn't know his client's real name. Bental admitted in court to each of the three charges against him -that he acted illegally for a foreign country, conducted political espionage and repeatedly used false foreign identity documents. The main charge is espionage for another country, which could bring a sentence of up to 20 years imprisonment. But demands for a shorter sentence were expected because the espionage was not aimed at Switzerland. The sentence is expected Friday. Bental said he entered Switzerland in January 1998 to conduct surveillance on the apartment of Abdallah el-Zein, a Swiss citizen of Lebanese origin who Swiss officials say was linked to Hezbollah, the militant organization that fought for years to oust Israel from south Lebanon. El-Zein has denied this. Bental said he returned with other agents -two men and two women -a month later, when they were caught by police while installing wiretap equipment in the basement of the building. "I had a specific role ... to listen to what this certain man planned," Bental said, adding that his Mossad handlers told him el-Zein was "responsible for acts" in Israel. The spy operation was blown when police were called to investigate strange noises in the basement of the building in Liebefeld, a sleepy suburb of the capital, Bern. Bental and his accomplices were caught. Bental denied knowing anything about the other four agents who were caught with him but who were released almost immediately. "I have no relationship to these people," Bental said. The case embarrassed the government of then-Prime Minister Benjamin Netanyahu. Israel apologized to Switzerland, but the incident soured Israeli-Swiss relations already overshadowed by tensions over Switzerland's treatment of the assets of Jews who perished in the Holocaust. The agent returned voluntarily as promised by the Israeli government when it paid bail of $2 million two years ago so that he could be released after more than two months in custody. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 744 From: James M. Atkinson, Comm-Eng Date: Mon Jul 3, 2000 11:32pm Subject: Bug Sweep FAQ 2000 I am compiling a list of at least 100 of the more common questions that those of use in TSCM hear from people. Once I have at least 100 questions I will go though and answer each with a one of two paragraph non technical answer and post the entire list to my website. The questions are limited to common non technical issues asked by laymen which have been posted to my "guestbook" over the last six years. I can only come up with a small number of the more common and relevant questions, and would really appreciate it if other list members could share a few suggestions. I am looking for questions specifically dealing with TSCM, bug sweeps, eavesdropping questions, and communications security. I plan to avoid computer security questions, physical security, and related materials for the time being. The FAQ will be directed towards a completely non-technical audience, and hopefully it will benefit the entire industry by educating our clients on the subject matter. I added a few of the more colorful questions from people with mental problems, not so that we can all snicker at them, but to foster some type of helpful answer that we can offer them (via the FAQ) to gently nudge them toward the appropriate medical treatment they require. Of course some of these colorful questions are simply based on a misunderstanding of technology. Please feel free to respond publicly or privately. In case anybody is interested; My goal is to enhance the quality of our profession, and to enlightened our clients so that in return they will understand the benefits of our services... and as a result we will keep eavesdroppers on the run. -jma ------------------------------------------------- Bug Sweep - Frequently Asked Questions (FAQ) by James M. Atkinson Granite Island Group version 4 July 2000 1. How common is bugging, wire taping, and related eavesdropping. 2. How hard is it for someone to bug a telephone 3. I have noticed for awhile that my phone has been clicking as if someone has been picking up the receiver. One day I picked up the phone while it makes this clicking noise and there was no dial tone. I did this a few times have been able to do the same thing. Is this a sign of some sort of phone tapping? What can I do? 4. I was told by a friend that if you called this phone # (xxx-xxx-xxx) it was used by corporations to check phone lines. I was told that if you get a clear tone, your phone was not bugged. Ever heard of this?? 5. Back in the sixties I remember reading about a special number you could call that would tell you if your phone was bugged. Is there a special 800 number that I can call that will tell me if my phone is bugged. 6. What is an Infinity Transmitter or Harmonica Bug 7. How much would it cost to check my phone for bugs 8. I...I am certain that my spouse of 20 yrs is having an affair. How do I tap is cell phone? Is it possible? And is it legal? 9. How much would it cost to check my office or home for bugs 10. How do I contact someone in my area to arrange to do a bug sweep for me 11. I was wondering how you can tell if your phone is tapped. Every time i call some one it calls my house back with a series of loud pulses. also it will call my house for no reason with those same series of beeps. what do you think 12. The only realistic way to tell if your phone is taped is to engage a TSCM person to check it out for you. 13. I would like to by a telephone eavesdropping device, how much would you charge 14. I would like to buy a tracking device so I can follow my boyfriend 15. I would like to eavesdrop on my boyfriends cellular telephone and would like to know if it is legal, and how can I do it. 16. I want to bug my bosses office. 17. Are Cellular Telephones secure 18. Are PCS Telephones secure 19. Are GSM telephones secure 20. Are Cordless Phones secure 21. Are Pagers and Beepers secure 22. Why should I always turn my cellular telephone off when I am not specifically making or expecting a phone call. 23. What are the more common ways that someone can follow my vehicle 24. I want to buy a small amount of inexpensive equipment so I can perform by own bug sweeps, what do you recommend. 25. I am a private investigator (or security consultant) and would like to start offer bug sweep services to my clients 26. I work for a company and we are interested in obtain some basic equipment to provide an in-house TSCM capability. 27. I am a bodyguard or executive protection specialist and would like to add a limited bug sweep capabilities to my protective detail and support functions. 28. Do you have any info on building your own FM transmitter that enables you to transmit a voice further than 300ft? 29. I have talked to a number of people through email and then follow-up telephone conversations. These people indicate that there is the existence of a communication system that, as hard as it is to believe, can transmit information directly to the human body. It has variously been termed energy directed audiograms, mental telepathy system, artificial intelligence network, and remote viewing. 30. I am a government guinea pig under the influence of bioelectronics, radio and microwaves radiation, ultrasonic bombardment and electronic destruction of memory and intense mid control. 31. Should I can the FBI if I think that I have found a bug 32. Should I call the FBI if I think I am bugged 33. I would like to buy a phone scrambler, can you help me. 34. I am hearing voices beamed to my by the CIA who is operating under the authority of the federal mind control courts at area 51. To this day hear the voices in my head and i 100% believe the voices to come from an intelligence agency. they are using some sort of technology to beam messages into my mind 35. Someone is harassing me by beaming microwave and/or Ultrasonic energy at me, I am having really bad headaches, my teeth hurt, and I can not sleep. 36. Can you send me a hardcopy catalog of eavesdropping equipment 37. Several phone trucks were seen down the block. my phone seems to have a delay and echo in it, my scanners are not working, and there is a shadow going by the back window 38. I was wondering about the range of the VHF crystal controlled mini bug being advertised in magazines which boast a 1/2 mile range. Do they really give a 1/2 mile range under normal conditions? What kind of range should I expect in a residential area? 39. Have you ever came across the type of bug the soviets used away back to eavedrop on the US embassy in Moscow. The whole thing used no power, it depended on excitation from microwaves to resonate it, the resonant cavity was constructed as such to allow voice frequency sound to modulate it resonant frequency . What they would do was beam a signal at it and have the thing tuned just slightly off of resonance and then pick up its "new" reflected and modulated signal at another location. 40. I was wondering where does one buy the bugs. 41. I would like to obtain plans to build some bugs, can you please send me some designs. 42. Is PGP a good email encryption program? 43. Is there any way to make cordless phones more secure? 44. I would like to buy a scrambled telephone, which is the best on to buy. 45. I have been experiencing a constant non-directional tone in two-different indoor locations within a couple of miles of each other. The tone I would guess at being about 1500 Hz and it only lasts for about 30 seconds to a minute. Any suggestions you have on this would be much appreciated as I have now dismissed this as a one-off. Thank you very much, I hope you can suggest what this could be. 46. I am interested in the bumper beeper thing.. need to purchase equipment immediately serious inquiry... thanks for reply soon... 47. if REMOBS can be detected and if so by which method. 48. is there any books or manual available that show Hookswitch bypass methods and modifications? 49. Is there an easy way to determine whether a home is being subjected to electron eavesdropping. I need to determine this before going to the authorities with an accusation. Is there an equipment item that can be easily used to detect electronic surveillance? The situation is real and I am not paranoid. I do not want to contact the sheriff with an accusation that is unfounded. Can you help me by providing information about such equipment? 50. Can you suggest a source for the ultrasonic devices that can thwart microphones? 51. Are there any pocket-sized detectors that can alert one to the presence of a tape recorder's bia oscillator? 52. I bought a voice scrambler for a thousand dollars, but people are still able to hear the things I say over my cordless telephone, what is wrong. 53. I just bought one of those fancy 2.4 GHz spread spectrum telephone but I think my neighbor can still eavesdrop on the signal, is this possible? 54. The sales person at the cellular telephone place told me that people can not eavesdrop on the new telephones, is this try, and if not why is the guy lying to me. 55. What percentage of sweeps actually turn up anything 56. Any recommendations on constructing a true faraday cage or bug proof room? 57. We are looking for an employee engaging in illegal eavesdropping who will probably use cheap radio Shack or Spy Shop type of transmitters , What equipment would suggest to detect this type of device at several feet, assuming that there is not much background noise? The equipment would need to be suitable for people with a non-technical background to use, and operate with little or no training. 58. Our company has provided a bug in their own Boardroom. It is a wireless microphone that is part of a speakerphone. When they use it, they set it on the table and turn it on. When not is use, it is then plugged into the charger. I've turned the thing over and looked on the bottom. There is a label which say 174 240, and sure enough that is the frequency I can pick up on my scanner. I found out that for some reason they never turn the transmitter off, and that I can pick up the signal 24 hours a day from outside the building. How many companies have a problem like this, and what can I do to point out how dangerous this situation is. 59. Do those $50 boxes you hook into your phone line to detect a tap really work? 60. I'm doing research paper for a class on security and such and this particular area seemed to intrigue me the most. I've run across references to the Van Eck experiments aired on BBC television back around 1990 and how the various alphabet agencies in the US didn't quite like this demonstration.... but for the most part, I find very little information about a topic 61. How much does a working telephone bug cost, and how does it work? 62. Last year FBI agents abducted by cat and implanted it with a covert video camera. Now the cat follows me around everywhere I go and transmits video images back to the FBI. What can I do to make this stop. 63. ??? =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== [Non-text portions of this message have been removed] 745 From: Larry Nevin Date: Mon Jul 3, 2000 10:04am Subject: Infrared viewing This is my first time using the e-groups for information. Is it possible to purchase glasses that will allow me to view IR emissions? I am not interested in night vision equipment. What I was thinking about was barrier type glasses like the ones I use for my UV lights. Thanks for the help. Larry J. Nevin Fire In The Hole Inc. ljn35945@y... ===== "EXPECT MORE THAN OTHERS THINK POSSIBLE!" __________________________________________________ Do You Yahoo!? Kick off your party with Yahoo! Invites. http://invites.yahoo.com/ 746 From: Miguel Puchol Date: Mon Jul 3, 2000 3:46pm Subject: RE: Fw: Paul - sources James, > Feeding the 10.7 IF to a second scanner will do very little good as > you first have to isolate and demodulate the first signal to extract > a SubCarrier. You're right, I didn't express the idea correctly - apologies for the confusion. > Of course you can modify the first scanner to tap off just prior to > the LP filter in the audio amp, and then dump THAT into a second > scanner (which is what I suspect you meant). Yes. As I mentioned in my post, you need to take the demodulated audio. You can do this with a simple mod to almost all scanners, but it's not so 'clean' - although it works. Cheers, Mike 747 From: Doug Ellsworth Date: Tue Jul 4, 2000 0:48am Subject: Re: Sub-Carriers "Dogs have fleas..." Thanks Jim for the info on sub-C. I was told once that older HP SA's that had separate IF and RF section plug-ins, each with sets of input and output BNC's could allow the mainframe display to show sub-C signals. Does anyone know if this is true? Thanks in advance -Doug Secure Communications Corporation, Inc. U.S. Commercial Distributor of Litton PRC-PReCis Audit Management Systems ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: Sent: Friday, June 30, 2000 9:29 PM Subject: [TSCM-L] Sub-Carriers "Dogs have fleas..." A Bomber Pilot, a Chaplain, and Stripper walk into a bar ... (oops, wrong message) ;-) Please allow me to shed a little illumination of the discussion about Sub-C signals and how they relate to TSCM. Before I start rambling on about the subject let me point out that it takes at least 2-3 days of classroom instruction to teach a TSCM'er to deal with Sub-C threats, this posting just barely addresses the subject. 1) A Carrier must first be demodulated first before extracting any SubCarrier 2) A SubCarrier is a secondary signal (or signals) CONCEALED inside the bandwidth of another signal. 3) The primary carrier may be modulated any number of ways including FM, AM, Pulse and so on. 4) Ditto on the SubCarrier 5) The most popular FM broadcast band "Sub Carriers" are based on the 19 kHz pilot signal. 6) The most popular TV broadcast band "Sub Carriers" are based on the horizontal retrace signals (15/15.734 kHz). 7) There are minor variations to the number 5 and 6, but they are limited, and may include fractional signals. 8) SubCarrier signals may be voice, data, telemetry, video or any number of other signals (ie: LoJack, water meters, alarm systems, weather reports, fax transmissions, Medical Paging systems, GPS correction signals, etc). 9) SubCarrier signals may (and often do) include tone masking or other signals to deceive the TSCM specialist. 10) Do not confuse a VLF or carrier current signal with a SubCarrier signal... the delineation is that a SubCarrier signal is WITHIN THE BANDWIDTH of another signal. Of course you can have a Carrier Current signal that contains a SubCarrier signal. 11) The "cleanest" way to handle SubCarrier is to use TWO spectrum analyzers, or a multi-channel SA. 12) Use the first spectrum analyzer to measure the bandwidth of the primary carrier (in the case of a typical FM radio station this would be +/- 75 kHz) 13) Next, place the first SA into zero span mode and demodulate the primary signal (the display on the SA will look like an O'Scope) 14) Grab the video signal (Y-Axis) coming out of the back of your SA and feed it to your second SA (or the second channel on your primary SA). Hint: Some spectrum analyzers used for TSCM have more then one frequency domain input. 15) Now display the demodulated signal from the first SA on the 2nd SA (in the Freq. domain), and the SubCarrier peaks should appear with no problem. 16) After you identify the SubCarrier you will find it helpful to filter out the primary signal. In the case of an FM/TV SubCarrier you would kill everything below 15 kHz or so by around 40 dB. 17) Also, once you identify the bandwidth of the SubCarrier you will find it helpful to filter everything outside the bandwidth of the signal. 18) Now place the 2nd SA in Zero Span mode, and observe the signal in the time domain and feed the Y axis into an O'Scope, audio amp (if audio) or RAID system (if the signal is repetitive) for further analysis. 19) Of course you can replace either or both SA's with a Sub-C receiver, but do so at your own risk, as you will miss hostile threats. On the other hand you can use a simple SubCarrier demodulator (on your primary SA Y-Axis output) to save copious time in lower threat situations. 20) If you like living dangerously you can use a scanner to pick up the primary signal, tie into the discriminator circuit (just before the low pass filter before the audio amp), and dump it into an SCD-5 (but make sure you get the right impedance input for your application). 21) Always keep in mind that a primary signal may actually have more then one SubCarrier signal. 22) Yes, a SubCarrier can have a SubCarrier. Always remeber... "Dogs have fleas upon there backs to bite um, and fleas have lesser fleas, and so on infinitum..." 23) I STRONGLY encourage people to check the entire bandwidth of the primary carrier, then check the entire bandwidth of any and ALL SubCarrier signals, and then carefully check the frequencies between all SubCarriers. 24) One thing to watch out for are SubCarrier inside ASYNCHRONOUS signals (as opposed to synchronous), and SubCarrier inside pulse modulated signals 25) Here is a good example of pulse modulated SubCarriers: A 30 mV pulse modulated signal riding on the AC mains in traverse mode (at 13 ohm impedance), the signal that comes out of a computer can contains an audio monitoring device/microphone. The device intercepted audio, converted it to a pulse modulated signal, and impressed that signal onto what looked like a "leaking" pulse modulated timing signal (from the video circuit). The results was a pulse modulated audio signal riding inside "the jitter" of another pulse modulated signal. 26) SubCarrier signals often are very narrow bandwidth, with 5 kHz or less being fairly popular. 27) "The bug" may actually impress the SubCarrier into a pre-existing broadcast signals. For example the spy could have his bug pick up a local FM or TV broadcast station, and simple re-transmit it, except with an extra signal inserted. 28) Remember to check all energy for any curiosities, and always investigate in at least the Frequency (SA), Time (O'Scope), Space (DF), and Code domain in addition to the Modulation domain. Just my humble opinion (grin) -jma PS: "Greets" and a hardy welcome to the 50+ .gov/.mil folks lurking on the list. > > 2. Subcarrier receiver for use with R-71, R-8500 or AOR > > AR5000. Tunable for all SC freqs > > and connects to receiver. Also usable direct on mains/tel > > lines for CC detection. > > > You could use another scanner (AFAIK) to tune in the 10.7MHz IF out > > segment from the AR5000. > > > I dont think so. How? >My understanding is the signal has to be demodulated before ANY >subcarrier appears! The loading or bandwidth of the demod has a direct >relationship to the level of signal available from its output, including >the bandwidth >of the pre-detector RF. > >An FM detector has to have a buffered, non de-emphasised, output to feed >the > subcarrier detector chain.. The RF level will reduce the further up the >subcarrier range >you go and eventually disappear in the noise., >A scanner will not normally have this output available...unless its spec >shows it's for data use >e.g. 9600 bd and above, paket data use. > >An AM syncronous detector, for AM subcarriers on FM sound channels! >Mostly used on cable tv scramblers to feed the sync. gating >signals....... >These types of demods are very linear..... =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== ------------------------------------------------------------------------ Visit Ancestry.com for a FREE 14-Day Trial and find your ancestors now. Search over 550 million names and trace your family tree today. Click here: http://click.egroups.com/1/5528/1/_/507420/_/962426127/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 748 From: James M. Atkinson, Comm-Eng Date: Tue Jul 4, 2000 0:10am Subject: Re: Sub-Carriers "Dogs have fleas..." At 10:48 PM -0700 7/3/00, Doug Ellsworth wrote: >Thanks Jim for the info on sub-C. > >I was told once that older HP SA's that had separate IF and RF section >plug-ins, each with sets of input and output BNC's could allow the mainframe >display to show sub-C signals. Does anyone know if this is true? > >Thanks in advance > >-Doug > > >Secure Communications Corporation, Inc. >U.S. Commercial Distributor of Litton PRC-PReCis Audit Management Systems True, the "older then dirt" plug in systems would have a plug in for the RF range you were interested in, and then a second plug in for the IF you wanted to use. The problem is that while you could "see" the raised peak you still had to demodulate (or quasi demodulate) the signal to examine the SubCarrier. The kicker is that the SubCarrier your looking at could simply be a pilot signal, or a very narrow band audio transmission... there isn't any reliable way to determine which unless you demodulate and examine the signal. There are several tricks that can be used, but they are risky and are biased against the TSCM'er. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 749 From: James M. Atkinson, Comm-Eng Date: Tue Jul 4, 2000 0:48am Subject: Kaiser 1080H Telephone Analyzer For Sale If anybody is interested I have a new Kaiser 1080H Telephone Analyzer, that I am interest in letting go for only $ 2,750.00. I will pay all shipping and handling (via Federal Express) to the first person who steps forward and purchases it. It's a hell of a little box, and includes all cables, cases, battery chargers, headphones, and adapters. I'll even throw in a used AT&T linesman handset (the one with the neat computer interface, modem, joystick pointer, and LCD screen to sweeten the deal). It makes a great add on piece for the 1080H. I expect the analyzer will move quickly, so act fast if you are interested. You can find more information of the instrument at: http://www.tscm.com/mlk1080H.html -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 750 From: James M. Atkinson, Comm-Eng Date: Tue Jul 4, 2000 0:55am Subject: Research Electronics Equipment Happy 4th of July!! I would like to take a moment and mention to list member that we are REI dealers and can provide a number of packages such as the OSCOR, CPM-700, ORION NLJD, and related equipment. We can save you a ton of aggravation, and can provide the equipment to you on a very short shipment schedule (usually in just a few days). As a professional courtesy, if you are a list member we will also pickup all shipping costs via Federal Express so you can get your equipment even faster. If your interested in any of this equipment please shoot me an Email privately and I'll get one ready to send to you. The OSCOR and CPM-700 make an excellent package to get started with, and we have had really good luck with them. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 751 From: Gordon Mitchell Date: Tue Jul 4, 2000 1:32am Subject: Re: Infrared viewing Welcome to the group. A long explanation to your short question follows. The trickery that we use (and love) for seeing fluorescence of stuff in the UV doesn't work in the IR. What is happening in the UV is that light with a short wavelength -- shorter than 400 nanometers -- is absorbed by stuff then the molecules of the stuff reradiate light at a longer wavelength. The reason that this longer and shorter wavelength stuff is important is that shorter wavelength photons (chunks of light) have higher energy. Since there is always loss in these transactions the radiated light has a longer wavelength than the incident light. Walking around the room with a UV light quickly shows up things that contain dyes which absorb UV and efficiently radiate a longer (visible) wavelength light. Common dye materials are associated with the brightest colors you see. Coumarin compounds are blue, alkali hydroxides of fluorescein are green and rhodamine B is orange. We do this because the solvents of common adhesives will fluoresce. An example is visualizing fresh glue holding a suspicious block of wood under a desk. Since your eyes are only designed to work from about 400 to 700 nanometers (where most of the sun's energy is) you will not be able to see light much longer than 700 nanometers in wavelength. This means that since any sort of IR luminescence will make light that is too long of a wavelength to see. You have to increase the energy of the chunks (photons) of IR light to make them visible. This is commonly done with a photocathode/electron amplifier/phosphor combination or, in some cases, a TV camera that is IR sensitive. I recommend using an IR imager like the ones in the Edmund Scientific catalog. They can see IR radiation from 1300 nanometer light sources. TV cameras and night vision equipment is blind past about 950 nanometers. Look for light sources inside the room (for audio going out via a IR beam) or bright lights shining on the window (for a IR laser probing the room audio). Hope that illuminates the issue. Gordon Mitchell, PhD, CISSP Future Focus, Inc Woodinville, WA Electronic eavesdropping detection & finding clues in computers (888) BUG-KILR Larry Nevin wrote: > This is my first time using the e-groups for > information. > > Is it possible to purchase glasses that will allow me > to view IR emissions? I am not interested in night > vision equipment. What I was thinking about was > barrier type glasses like the ones I use for my UV > lights. > > Thanks for the help. > > Larry J. Nevin > Fire In The Hole Inc. > ljn35945@y... > > ===== > "EXPECT MORE THAN OTHERS THINK POSSIBLE!" > > __________________________________________________ > Do You Yahoo!? > Kick off your party with Yahoo! Invites. > http://invites.yahoo.com/ > > ------------------------------------------------------------------------ > Lonely? Get Firetalk! > Free, unlimited calls anywhere in the world. > Free voice chat on hundreds of topics. > http://click.egroups.com/1/5477/1/_/507420/_/962686503/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS From: Mitch D Date: Wed Jul 3, 2002 1:29pm Subject: Scannocular Just saw one at a Flying J Truckstop,$69.00,looked at it,I think it would make a great paperweight! __________________________________________________ Do You Yahoo!? Sign up for SBC Yahoo! Dial - First Month Free http://sbc.yahoo.com 5734 From: Michael Puchol Date: Wed Jul 3, 2002 4:20pm Subject: Re: antenna help......... Guy, What frequency are your AMPS transceivers operating at? In my AVL systems, I supply a basic GSM antenna which is nothing more than a strip of PCB tuned to the required band/s to costumers who don't want to spend a lot - of course good quality roof mount antennas are also available. To that is attached a length of RG-175 cable terminating with an SMA connector. The source of this antenna is taiwanese, but comes via a local import agent - in any case, you may find that a PCB antenna is quite cost-effective, although don't expect gain from it. All the best, Mike ----- Original Message ----- From: "Guy Urbina" To: Sent: Wednesday, July 03, 2002 6:39 PM Subject: [TSCM-L] antenna help......... > Hi all, > > I've been contracted to design and develop a proof of concept prototype GPS > alarm for motorcycles. > > My current design uses microburst AMPS transceivers for the data packets, > therefore I am looking for a miniature, covert AMPS cell antenna that can > meet my needs. > > I've searched around on the net and did not find anything I liked. > > Ideally, I would like something that is extremely small and can still have > omni-directional characteristics with nominal or unity gain. > > I was hoping some of you Title III designers can help me out and point out > some sources........preferably COTS, but I am willing to fabricate one > myself given proper plans and instructions. > > Best regards, > > -Guy Urbina > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5735 From: David Alexander Date: Thu Jul 4, 2002 9:12am Subject: happy 4th of July Hi Guys Happy 4th of July to you all cheers _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 5736 From: Paolo Sfriso Date: Thu Jul 4, 2002 11:08am Subject: Digital Audio Broadcasting Dear Colleagues. Following is an interesting link on Digital Audio Broadcasting: http://www.worlddab.org/ Kind Regards and Happy 4th of July to our friends in the USA. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 5737 From: Matt Paulsen Date: Thu Jul 4, 2002 3:05pm Subject: Off topic.. Gunman shot dead after killing 1 at Los Angeles airport http://www.cnn.com/2002/US/07/04/la.airport.shooting/index.html Gunman shot dead after killing 1 at Los Angeles airport July 4, 2002 Posted: 3:48 PM EDT (1948 GMT) LOS ANGELES, California (CNN) -- A gunman opened fire Thursday at Los Angeles International Airport near the ticket counter of Israel's El Al Airlines, officials said, killing one person and wounding at least two others before airline security personnel shot him dead. "At this time, there's no reason to believe the incident is terrorist-related," said Lt. Horace Frank, an LAPD spokesman. Information is still sketchy and the investigation is still in its earliest stages, he said. The Tom Bradley International Terminal was shut down, said Los Angeles Police Department spokesman Alex Baez. Everyone inside was evacuated. Thousands were seen streaming out of the terminal and traffic was stopped outside. Police cars, ambulances, and fire engines lined the road. Frank said 911 operators received the first call at approximately 11:30 a.m. (2:30 p.m. EDT), saying a suspect opened fire on an individual near the El Al counter. The suspect in turn was killed by El Al security personnel, but other "innocent bystanders" were shot and some were seriously wounded. Thad Weimlein, who was checking into his flight on Korean Air, heard an initial barrage of between eight and 10 shots, before it paused. Then the firing resumed, he said. "People were running and screaming and hitting the floor," Weimlein said. "There were a number of plainclothes policemen who pulled out their guns and badges at the same time." After it was over, officers asked everyone in the area of the international ticket counters to file outside, he said. 5738 From: Matt Paulsen Date: Thu Jul 4, 2002 4:02pm Subject: Official site to advise on state snooping I wonder how long it will be up until it's defaced. -m http://news.bbc.co.uk/hi/english/sci/tech/newsid_2049000/2049593.stm Monday, 17 June, 2002, 11:57 GMT 12:57 UK The UK Government has set up a website to advise other organisations on the best way to snoop on citizens. Later this month a raft of government departments and organisations will be added to the list of people that can compile records of what British people get up to with their mobile and fixed phones, fax machines, web browser and e-mail accounts. The website has been set up to help the new organisations stay within the law while they carry out covert surveillance. But critics say the department charged with overseeing the use of surveillance will be unable to cope with the deluge of snooping likely to be unleashed by the new laws. 'Understaffed' The Office of Surveillance Commissioners was set up in 1999 by the Home Office to watch over the activities of organisations that can carry out covert surveillance. The OSC gained a new role when the controversial Regulation of Investigatory Powers Act became law in 2000. The Act made it much easier for Customs and Excise, police forces and intelligence services to get permission to spy on criminals and citizens. Before the RIP Act was passed, anyone wanting to carry out surveillance had to justify their need to spy in front of a judge. The RIP Act removed this requirement and instead put approval and oversight into the hands of the Office of Surveillance Commissioners. 'Completely unfeasible' The website unveiled at the end of last week will act as a central information point for any organisations that have to carry out surveillance and give advice on best practice. One of the three surveillance commissioners appointed to the OSC has the job of ensuring that covert surveillance of what people do with e-mail, the web, phones and faxes is carried out in line with the RIP Act. Ian Brown, director of the Foundation for Information Policy Research, expressed doubts that the understaffed and underfunded OSC will be able to police the use of surveillance, given that many more organisations are about to get snooping powers. "The number of staff that is has is such that it is completely unfeasible that it would be able to provide any oversight of how these powers are used," he said. Mr Brown said that police forces have already declared that they will not maintain a central register of how much surveillance they are carrying out. As a result, he said, staff working for the OSC will have to travel the country checking the records of police forces and every other organisation that is carrying out surveillance. [Non-text portions of this message have been removed] 5739 From: Matt Paulsen Date: Thu Jul 4, 2002 4:06pm Subject: Soviet spycatcher guilty of treason http://news.bbc.co.uk/hi/english/world/europe/newsid_2067000/2067229.stm Wednesday, 26 June, 2002, 12:40 GMT 13:40 UK Soviet spycatcher guilty of treason Kalugin will stripped of all ranks and honours A former general in the Soviet secret service has been jailed in his absence for treason and spying for the United States. Oleg Kalugin, who now lives in the US, was given a 15-year term in a maximum security prison. Mr Kalugin had denied any wrongdoing. He ran the KGB's exterior counter-intelligence department from 1973-1980, and wrote a book in 1994 about Soviet intelligence operations. Spy tours The court declared him guilty of revealing official secrets in "First Directorate", which he co-wrote with an American journalist. Mr Kalugin had also been accused of handing over classified documents to Washington during his testimony at the Florida espionage trial of retired US general George Trofimoff. But the court threw out this charge because it did not have access to the Trofimoff trial transcripts, and said it would not make a ruling on the basis of press reports. Mr Kalugin is the first KGB operative to be tried in absentia in Russia for treason since the fall of communism in 1991. He is likely to be the last. New code The trial was carried out quickly in order to miss the introduction of a new criminal code on 1 July, which does not allow for trials in absentia. The sentence came one day after another former intelligence agent, Alexander Litvinenko, was given a three-and-a-half-year suspended prison sentence for abuse of office and stealing explosives. That sentence was also imposed in his absence, after he fled to London and claimed political asylum. Mr Kalugin has called the proceedings an act of revenge by his former colleagues. He has been living in the US since 1995, and has written a series of books criticising the Soviet secret service and denouncing contemporary Russia as corrupt and crime-ridden. He has also made money giving espionage tours around Washington with a former American spy. 5740 From: Fernando Martins Date: Thu Jul 4, 2002 4:39pm Subject: RE: Off topic.. Gunman shot dead after killing 1 at Los Angeles airport I think that it's not too much off topic ... Still private guns in US airports? It was a personal 'vendetta', right? I just saw that on TV (CNN ... Sky News, one of those) FM > -----Original Message----- > From: Matt Paulsen [mailto:mpaulsen6@a...] > Sent: quinta-feira, 4 de Julho de 2002 21:05 > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Off topic.. Gunman shot dead after killing > 1 at Los Angeles airport > > > > http://www.cnn.com/2002/US/07/04/la.airport.shooting/index.html > > > Gunman shot dead after killing 1 at Los Angeles airport > July 4, 2002 Posted: 3:48 PM EDT (1948 GMT) > > LOS ANGELES, California (CNN) -- A gunman opened fire > Thursday at Los Angeles International Airport near the ticket > counter of Israel's El Al Airlines, officials said, killing > one person and wounding at least two others before airline > security personnel shot him dead. > > "At this time, there's no reason to believe the incident is > terrorist-related," said Lt. Horace Frank, an LAPD spokesman. > Information is still sketchy and the investigation is still > in its earliest stages, he said. > > The Tom Bradley International Terminal was shut down, said > Los Angeles Police Department spokesman Alex Baez. Everyone > inside was evacuated. Thousands were seen streaming out of > the terminal and traffic was stopped outside. > > Police cars, ambulances, and fire engines lined the road. > > Frank said 911 operators received the first call at > approximately 11:30 a.m. (2:30 p.m. EDT), saying a suspect > opened fire on an individual near the El Al counter. The > suspect in turn was killed by El Al security personnel, but > other "innocent bystanders" were shot and some were seriously wounded. > > Thad Weimlein, who was checking into his flight on Korean > Air, heard an initial barrage of between eight and 10 shots, > before it paused. Then the firing resumed, he said. > > "People were running and screaming and hitting the floor," > Weimlein said. "There were a number of plainclothes policemen > who pulled out their guns and badges at the same time." > > After it was over, officers asked everyone in the area of the > international ticket counters to file outside, he said. > > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> Will You Find True Love? Will You > Meet the One? Free Love Reading by phone! > http://us.click.yahoo.com/ztNCyD/zDLEAA/Ey.GAA> /kgFolB/TM > > > -------------------------------------------------------------- > -------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire > speed, the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > 5741 From: James M. Atkinson Date: Fri Jul 5, 2002 0:20am Subject: US spy devices helped to nail Filipino rebels http://straitstimes.asia1.com.sg/asia/story/0,1870,130106,00.html US spy devices helped to nail Filipino rebels They were a crucial factor in the success of two operations MANILA - US tracing devices hidden inside a backpack and a boat helped Filipino troops hunt down Muslim rebels in two bloody operations last month, Philippine military officials said. The disclosure points to a deeper than previously admitted US involvement in the fight against terrorism in the southern Philippines - but still falls short of a direct US combat role. The military officials, all speaking on Wednesday on condition of anonymity, said operations that rescued an American hostage in the jungle on June 7 and reportedly killed a top Abu Sayyaf leader at sea on June 21 were a combined triumph of US technology and local intelligence. Said President Gloria Arroyo: 'The American spy plane showed it all because they recorded it and I saw the movie.' Military officials said marine intelligence agents got wind of Sabaya's escape plans as early as February and worked to identify his couriers and contacts, several of whom decided to work as spies. Through the couriers - used by Sabaya to obtain food, medicine and other supplies - marine and army officials planted among the rebels a backpack implanted with US military-supplied gadgets that emitted satellite signals. A Philippine general secured a boat that was secretly fitted with US tracing devices and then delivered to Sabaya. A US spy plane watched Sabaya and his men step aboard the boat on June 21 until marine and naval boats caught up and rammed the craft at the start of a brief gun battle that is believed to have killed Sabaya and two other Abu Sayyaf members, local military officials said. Their bodies have not been found. A US spy plane also took surveillance pictures of Filipino troops in the seaborne attack, and two American Chinook helicopters illuminated the area to help search for casualties. Meanwhile, a senior military official said that a second batch of American military advisers could be despatched to the rebellion-torn southern Philippines. 'All of the deployments would be in October,' said armed forces Chief of Staff Gen Roy Cimatu. 'There will be one in Luzon which is the light reaction company, one in Visayas where it will be the night-flying activities, and one in Mindanao.' --AP, AFP -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5742 From: Secdep Date: Fri Jul 5, 2002 3:31am Subject: If you look like an American..... Please try not to look like an American if you visit Israel/Palestine ================================================ Here is another in a series. This was from an Israeli News source: << that the official Hamas website recently hosted an electronic chat in which at least four participants offered a fifth user advice on how to murder Americans. Excerpts: "Once a week, a group of American "dogs" come near us on the sea front. I have been following them for a long time and am interested in your suggestions for ways to get rid of them secretly." "If they arrive in a private car, put a large amount of sugar in the gas tank of the car. Then, you can ambush them on the way back because the car will get stuck in the way. You will have many options to get rid of them. You can run them over on the road, after they abandon the broken down car. You can put a trap on the beach if they tend do a lot of walking. If you have people with you and four cars, you can stop them at a certain point on the road, at a traffic light for example, block them from all directions and burn them in their cars using a Molotov cocktail.">>> [Non-text portions of this message have been removed] 5743 From: Steve Uhrig Date: Fri Jul 5, 2002 5:04pm Subject: Item of possible interest http://www.minox.org/mhspublications/MinoxMemo/index.html Download the Summer 2002 newsletter. Might be someone in there you recognize using a piece of intelligence equipment, the same item some of you have purchased from me over the years. You'll see you're in good company. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5744 From: iDEN-i100 Date: Sat Jul 6, 2002 2:15am Subject: NATO C3-SECURE GSM-PHONE- Secure to NATO SECRET Level. NATO C3-SECURE GSM-PHONE- Secure to NATO SECRET Level. The NATO Consultation, Command and Control Agency (NC3A) recently announce the 1st Secure GSM Phone for Secure Voice/Data communication up to NATO SECRET level. NC3A presented the Secure GSM Phone last month at a NATO conference. I have uploaded the Power Point from the meeting. For those with "Classified Clearance" additional information is available here. http://nc3a.info/PCS/GSM_Z/CDROMdetails.shtml [Non-text portions of this message have been removed] 5745 From: iDEN-i100 Date: Sat Jul 6, 2002 2:25am Subject: Re: NATO C3-SECURE GSM-PHONE- Secure to NATO SECRET Level. Here is the PPT- http://nc3a.info/PCS/GSM_Z/Using%20NSK%20200-HT.ppt iDEN-i100 wrote: > NATO C3-SECURE GSM-PHONE- Secure to NATO SECRET Level. > > The NATO Consultation, Command and Control Agency (NC3A) recently > announce the 1st Secure GSM Phone for Secure Voice/Data communication up > to NATO SECRET level. NC3A presented the Secure GSM Phone last month at > a NATO conference. I have uploaded the Power Point from the meeting. > For those with "Classified Clearance" additional information is > available here. > > http://nc3a.info/PCS/GSM_Z/CDROMdetails.shtml > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 5746 From: Secdep Date: Sat Jul 6, 2002 7:31am Subject: 10 Commandments of Counterintelligence http://www.iwar.org.uk/sigint/resources/ncix/counterintelligence.htm The First Commandment: Be Offensive CI that is passive and defensive will fail. We cannot hunker down in a defensive mode and wait for things to happen. I believe we are spending far too much money on fences, safes, alarms, and other purely defensive measures to protect our secrets. That is not how we have been hurt in recent years. Spies have hurt us. Our CI mindset should be relentlessly offensive. We need to go after our CI adversaries. Aggressive double agent (DA) operations are essential to any CI program, but not the predictable, hackneyed kind we have so often pursued. We need to push our bright and imaginative people to produce clever new scenarios for controlled operations, and we need more of them. The opposition services should be kept constantly off guard so that they never suspect that we have actually controlled the operations they believe they initiated from the beginning. When the requirements, modus operandi, and personality objectives of the DA operation have been achieved, we should in a greater number of cases pitch the opposition case officer. If only one out of 10 or 20 of these recruitments takes, it is worth it. And CI professionals, of course, should not rely exclusively on their own efforts. They should constantly prod their HUMINT colleagues to identify, target, and recruit officers from the opposition intelligence services. The key to CI success is penetration. For every American spy, there are several members of the opposition service who know who he or she is. No matter what it takes, we have to have penetrations. We should operate aggressively against the nontraditional as well as the traditional adversaries. How many examples do we need of operations against Americans by so-called friendly countries to convince us that the old intelligence adage is correct: there are friendly nations, but no friendly intelligence services? If we suspect for whatever reason that the operatives of a foreign intelligence service, friend or foe, are operating against us, we should test them. We should dress up an enticing morsel, made to order for that specific target, and send it by them. If they take it, we have learned something we needed to know, and we have an operation. If they reject it, as true friends should, we have learned something, too. In either event, because we are testing a "friend," plausible deniability has to be strictly preserved. Every foreign service is a potential nontraditional adversary; no service should get a lifetime pass from US offensive CI operations. The Second Commandment: Honor Your Professionals It has been true for years, to varying degrees throughout the IC, that CI professionals have not been favored, to the extent they deserved, with promotions, assignments, awards, praise, esteem, or other recognition. The truth is that CI officers are not popular. They are not always welcome when they walk in. They usually bring bad news. They are easy marks to criticize when things go wrong. Their successes are their failures. If they catch a spy, they are roasted for having taken so long. If they are not catching anyone, why not? What have they done with all that money they spent on CI? It is no-win. For much of my career, many of our best people avoided becoming CI specialists. CI was not prestigious. It had a bad reputation. It was not fast track. It did not lead to promotions or good assignments. Angleton left a distasteful legacy that for years discredited the CI profession. Ted Price did more than anyone else in the Agency to reverse that trend and to rehabilitate CI as a respected professional discipline. Nevertheless, that battle is still not completely won. We have to do more to get our CI people promoted, recognized, and respected so that our best young officers will be attracted to follow us into what we know is a noble profession and where the need is so great. The Third Commandment: Own the Street This is so fundamental to CI, but it is probably the least followed of the commandments. Any CI program worthy of the name has to be able to engage the opposition on the street, the field of play for espionage. And when we do go to the street, we have to be the best service there. If we are beaten on the street, it is worse than not having been there at all. For years, we virtually conceded the streets of the world's capitals, including the major espionage centers, to the KGB, the GRU, and the East European services because we either did not know how to do it or we were not willing to pay the price for a thoroughly professional, reliable, full-time, local surveillance capability. Opposition intelligence officers have to be watched, known meeting areas have to be observed, and, when an operation goes down-often on short notice- undetectable surveillance has to cover it, identify the participants, and obtain evidence. This capability is expensive-selection, training, vehicles, photo gear, video, radios, safe apartments, observation posts, and on and on-but, if we do not have it, we will be a second-rate CI service and will not break the major cases. The Fourth Commandment: Know Your History I am very discouraged when I talk to young CI officers today to find how little they know about the history of American CI. CI is a difficult and dangerous discipline. Many good, well-meaning CI people have gone wrong and made horrendous mistakes. Their failures in most cases are well documented, but the lessons are lost if our officers do not read the CI literature. I find it inconceivable that any CI practitioner today could ply his or her trade without an in-depth knowledge of the Angleton era. Have our officers read Mangold? Have they read Legend and Wilderness of Mirrors? Do they know the Loginov case, HONETOL, MHCHAOS, Nosenko, Pollard, and Shadrin? Are they familiar with Aspillaga and the Cuban DA debacle? Have they examined our mistakes in the Ames and Howard cases? Are they staying current with recent releases like The Mitrokhin Archive and The Haunted Wood? I believe it is an indispensable part of the formation of any American CI officer-and certainly a professional obligation-to study the CI failures of the past, to reflect on them, and to make sure they are not repeated. The many CI courses being offered now are a positive step, but there will never be a substitute for a personal commitment on the part of our CI professionals to read their history, usually on their own time at home. The Fifth Commandment: Do Not Ignore Analysis Analysis has too often been the stepchild of CI. Throughout the CI community, we have fairly consistently understaffed it. We have sometimes tried to make it up as we go along. We have tried to do it on the cheap. Generally speaking, operators make bad analysts. We are different kinds of people. Operators are actors, doers, movers and shakers; we are quick, maybe a little impulsive, maybe a little "cowboy." Our best times are away from our desks. We love the street. Research and analysis is really not our thing-and when we have tried to do it, we have not been good at it. True analysts are different. They love it. They are more cerebral, patient, and sedentary. They find things we could not. They write better. A lot of CI programs in the past have tried to make operators double as their own analysts. As a result, in the United States, CI analysis historically has been the weakest part of the business. Professional CI analysts have been undervalued and underappreciated. A good CI program will recruit and train true analysts in sizable numbers. I do not think it would be excessive as a rule of thumb in a top notch CI service to be evenly divided between operators and analysts. Very few of our US CI agencies come anywhere close to that ratio. Wonderful things happen when good analysts in sufficient numbers pore over our DA reports, presence lists, SIGINT, audio and teltap transcripts, maps, travel data, and surveillance reports. They find the clues, make the connections, and focus our efforts in the areas that will be most productive. Many parts of the US CI community have gotten the message and have incorporated trained analysts into their operations, but others have not. Across the board, we still have serious shortfalls in good, solid CI analysis. The Sixth Commandment: Do Not Be Parochial More harm probably has been done to US CI over the years by interagency sniping and obstruction than by our enemies. I remember when the CIA and the FBI did not even talk to each other-and both had disdain for the military services. It is no wonder that CI was a shambles and that some incredibly damaging spies went uncovered for so long. Occasionally in my career, I encountered instances of sarcasm or outright bad mouthing of other US Government agencies by my officers. That kind of attitude and cynicism infected our junior officers and got in the way of cooperation. These comments often were intended to flaunt our supposed "superiority" by demeaning the capabilities of the other organizations. I dealt with these situations by telling the officers to "knock it off," and I would encourage other CI supervisors around the community to do the same. CI is so difficult, even in the best of circumstances, that the only way to do it is together. We should not let personalities, or jealousies, or turf battles get in the way of our common mission. Our colleagues in our sister services are as dedicated, professional, hardworking, and patriotic as we are, and they deserve our respect and cooperation. The best people I have known in my career have been CI people, regardless of their organizational affiliation. So let's be collegial. The Seventh Commandment: Train Your People CI is a distinct discipline and an acquired skill. It is not automatically infused in us when we get our wings as case officers. It is not just a matter of applying logic and common sense to operations, but is instead a highly specialized way of seeing things and analyzing them. CI has to be learned. I do not know how many times in my career I have heard, "No, we do not really need a separate CI section. We are all CI officers; we'll do our own CI." That is a recipe for compromise and failure. There is no substitute for a professional CI officer, and only extensive, regular, and specialized CI training can produce them. Such training is expensive, so whenever possible we should do it on a community basis to avoid duplication and to ensure quality. CI is a conglomerate of several disciplines and skills. A typical operation, for example, might include analysts, surveillance specialists, case officers, technical experts, and DA specialists. Each area requires its own specialized training curriculum. It takes a long time to develop CI specialists, and that means a sustained investment in CI training. We are getting better, but we are not there yet. The Eighth Commandment: Do Not Be Shoved Aside There are people in the intelligence business and other groups in the US Government who do not particularly like CI officers. CI officers have a mixed reputation. We see problems everywhere. We can be overzealous. We get in the way of operations. We cause headaches. We are the original "black hatters." Case officers want their operations to be bona fide. Senior operations managers do not want to believe that their operations are controlled or penetrated by the opposition. There is a natural human tendency on the part of both case officers and senior operations managers to resist outside CI scrutiny. They believe that they are practicing good CI themselves and do not welcome being second-guessed or told how to run their operations by so-called CI specialists who are not directly involved in the operations. I have seen far more examples or this in my CI career than I care to remember. By the same token, defense and intelligence contractors and bureaucrats running sensitive US Government programs have too often tended to minimize CI threats and to resist professional CI intervention. CI officers, in their view, stir up problems and overreact to them. Their "successes" in preventing CI problems are invisible and impossible to measure, but their whistle blowing when problems are uncovered generate tremendous heat. It is not surprising that they are often viewed as a net nuisance. When necessary, a CI service has to impose itself on the organizations and groups it is assigned to protect. A CI professional who is locked out or invited in only when it is convenient to the host cannot do his job. My advice to my CI colleagues has always been this: "If you are blocked by some senior, obtuse, anti-CI officer, go around him or through him by going to higher management. And document all instances of denied access, lack of cooperation, or other obstruction to carrying out your CI mission. If not, when something goes wrong, as it likely will in that kind of situation, you in CI will take the blame." The Ninth Commandment: Do Not Stay Too Long CI is a hazardous profession. There should be warning signs on the walls: "A steady diet of CI can be dangerous to your health." I do not believe anyone should make an entire, uninterrupted career of CI. We all who work in CI have seen it: the old CI hand who has gotten a bit spooky. It is hard to immerse oneself daily in the arcane and twisted world of CI without falling pray eventually to creeping paranoia, distortion, warping, and overzealousness in one's thinking. It is precisely these traits that led to some of the worst CI disasters in our history. Angleton and his coterie sadly succumbed, with devastating results. Others in the CIA and elsewhere have as well. The danger is always there. My wife, who was working at the CIA when I met her, was well acquainted with this reputation of CI and the stories about its practitioners. When I was serving overseas and received the cable offering me the position as Ted Price's deputy in the new Counterintelligence Center, I discussed it with her that evening at home. Her response, I thought was right on the mark: "Okay, but do not stay too long." Sensible and productive CI needs lots of ventilation and fresh thinking. There should be constant flowthrough. Non-CI officers should be brought in regularly on rotational tours. I also believe it is imperative that a good CI service build in rotational assignments periodically outside CI for its CI specialists. They should go spend two or three years with the operators or with the other groups they are charged to protect. They will come back refreshed, smarter, and less likely to fall into the nether world of professional CI: the school of doublethink, the us-against-them mindset, the nothing-is-what-it-seems syndrome, the wilderness of mirrors. The Tenth Commandment: Never Give Up The tenth and last commandment is the most important. What if the Ames mole hunters had quit after eight years instead of going into the ninth? What if, in my own experience, we had discontinued a certain surveillance operation after five months instead of continuing into the sixth? CI history is full of such examples. The FBI is making cases against Americans today that involved espionage committed in the 1960s and 1970s. The Army's Foreign Counterintelligence Activity is doing the same. The name of the game in CI is persistence. CI officers who are not patient need not apply. There is no statute of limitations for espionage, and we should not create one by our own inaction. Traitors should know that they will never be safe and will never have a peaceful night's sleep. I applauded my CI colleagues in the FBI when I read not long ago of their arrest in Florida of a former US Army Reserve colonel for alleged espionage against the United States many years earlier. They obviously never gave up. If we keep a CI investigation alive and stay on it, the next defector, the next penetration, the next tip, the next surveillance, or the next clue will break it for us. If there were ever to be a mascot for US counterintelligence, it should be the pit bull. In Conclusion These are my 10 commandments of CI. Other CI professionals will have their own priorities and exhortations and will disagree with mine. That is as it should be, because as a country and as an Intelligence Community we need a vigorous debate on the future direction of US CI. Not everyone will agree with the specifics, or even the priorities. What we should agree on, however, is that strong CI has to be a national priority. Recent news reports from Los Alamos, Washington, and elsewhere have again underscored the continuing need for CI vigilance. --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 5747 From: Aimee Farr Date: Sat Jul 6, 2002 10:47am Subject: RE: The Technology Secrets of Cocaine Inc. Aesop's The Hart in the Ox-Stall A Hart hotly pursued by the hounds fled for refuge into an ox-stall, and buried itself in a truss of hay, leaving nothing to be seen but the tips of his horns. Soon after the Hunters came up and asked if any one had seen the Hart. The stable boys, who had been resting after their dinner, looked round, but could see nothing, and the Hunters went away. Shortly afterwards the master came in, and looking round, saw that something unusual had taken place. He pointed to the truss of hay and said: "What are those two curious things sticking out of the hay?" And when the stable boys came to look they discovered the Hart, and soon made an end of him. He thus learnt that Nothing escapes the master's eye. -#- In every strength is a weakness. I have this fable filed mentally under the equivalent of: "How we _WON_ World War II," as an allegory for Hitler. "Therefore, it is important to be a fox in order to understand the snares and a lion in order to terrify the wolves. Those who choose only to be a lion do not really understand." -- MACHIAVELLI ~Aimee 5748 From: Aimee Farr Date: Sat Jul 6, 2002 0:28pm Subject: RE: 10 Commandments of Counterintelligence > We should operate aggressively against the nontraditional as well > as the traditional adversaries. How many examples do we need of > operations against Americans by so-called friendly countries to > convince us that the old intelligence adage is correct: there are > friendly nations, but no friendly intelligence services? If we > suspect for whatever reason that the operatives of a foreign > intelligence service, friend or foe, are operating against us, we > should test them. We should dress up an enticing morsel, made to > order for that specific target, and send it by them. If they take > it, we have learned something we needed to know, and we have an > operation. If they reject it, as true friends should, we have > learned something, too. In either event, because we are testing a > "friend," plausible deniability has to be strictly preserved. > Every foreign service is a potential nontraditional adversary; no > service should get a lifetime pass from US offensive CI operations. Here too, Aesop counsels the other side to this coin: The Lion, the Wolf, and the Fox ------------------------------- A lion, growing old, lay sick in his cave. All the beasts came to visit their king, except the fox. The wolf therefore, thinking that he had a capital opportunity, accused the fox to the lion of not paying any respect to him who had the rule over them all and of not coming to visit him. At that very moment the fox came in and heard these last words of the wolf. The lion roaring out in a rage against him, the fox sought an opportunity to defend himself and said, "And who of all those who have come to you have benefited you so much as I, who have traveled from place to place in every direction, and have sought and learnt from the physicians the means of healing you?" The lion commanded him immediately to tell him the cure, when he replied, "You must flay a wolf alive and wrap his skin yet warm around you." The wolf was at once taken and flayed; whereon the fox, turning to him, said with a smile, "You should have moved your master not to ill, but to good will." ...Never make traps against an innocent because you will be the first to be caught. -#- The wolf told the fox what he valued, what he sought, his methods, and what the wolf thought the fox feared. In his coup-planning and quest for glory, the wolf failed to realize how the situation he created could be used against him. In asserting power over the fox, the wolf gave the fox the very means to assert power over him. In our desire to identify and prevail over our enemies, sometimes we give them the very means to attack not just our immediate aim, but our entire strategy. For this reason, I have this fable mentally-filed under "Serious Screw-ups," and also under "The Saddam Problem." Just showing the other side of the coin. :-] ~Aimee 5749 From: Paolo Sfriso Date: Sat Jul 6, 2002 0:35pm Subject: NATO Approved Secure GSM Dear Colleagues. An interesting site with some unclas details of NATO Approved Secure GSM. http://nc3a.info/PCS/GSM_Z/mds_nc3a_gsmz_index.shtml Have a nice weekend. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 5750 From: Matt Paulsen Date: Sat Jul 6, 2002 5:10pm Subject: U.S. mappers told to buy, not spy http://www.cnn.com/2002/TECH/space/07/01/spy.satellites.reut/index.html U.S. mappers told to buy, not spy July 1, 2002 Posted: 10:54 AM EDT (1454 GMT) WASHINGTON (Reuters) -- The director of central intelligence, George Tenet, has ordered U.S. spy outfits to turn commercial satellite images into the mainstay of government mapping, rather than spy satellites. The policy, a shot in the arm for the fledgling U.S. remote-sensing industry, would leave the government's own high-resolution satellites free for spookier work. "My goal in establishing this policy is to stimulate, as quickly as possible, and maintain, for the foreseeable future, a robust U.S. commercial space imagery industry," Tenet said in a June 7 memo to James Clapper, head of the National Imagery and Mapping Agency. U.S. commercial satellite imagery should be "the primary source of data used for government mapping, regardless of whether the production work is performed by NIMA or is outsourced," he said. Among the potential beneficiaries is Boeing Co., which is developing a "Future Imagery Architecture" for the National Reconnaissance Office, a secretive Pentagon contracting agency that designs, builds and operates spy satellites. Tenet's order, first reported by The New York Times, was obtained by Reuters on Wednesday. CIA spokesman Mark Mansfield confirmed its authenticity. In it, Tenet also told Clapper to streamline the acquisition of commercial satellite imagery for other federal agencies in an effort to expand the market. NIMA is one of the 13 executive-branch outfits that make up the U.S. intelligence community. A Defense Department arm, it manages the collection of imagery and mapping for combat commands, the CIA, the Defense Intelligence Agency and other spy agencies. Pressure from Congress In line with rising pressure from Congress, Tenet said it was U.S. intelligence community policy to use U.S. commercial space imagery "to the greatest extent possible." "National technical means" -- spy jargon for satellites and other sensors used to collect classified data -- will be used to collect mapping data only in "exceptional circumstances," added Tenet, who serves as board chairman of the intelligence community in addition to heading the CIA. The Senate Armed Services Committee included $30 million in its version of the fiscal 2003 defense authorization bill for purchase of commercial imagery, imagery products and services from U.S. commercial vendors. The panel, in a report accompanying the bill, asked NIMA to establish a "concrete plan" incorporating a role for commercial remote-sensing capabilities in the Boeing-developed "Future Imaging Architecture." NIMA did not respond to a query about how much business the policy change might spin off. Clapper, a retired Air Force lieutenant general, told reporters this month that the Bush administration had earmarked a "substantial increase" for purchasing commercial satellite images in coming years. "We as a nation, I believe, are committed to a very strong, viable internationally dominant commercial imagery industry," he told a June 4 defense writers' breakfast. In the early days of the U.S.-led war in Afghanistan sparked by the September 11 attacks, NIMA bought exclusive rights to all imagery collected over the region by Space Imaging of Thorton, Colorado -- a practice critics denounced as "checkbook shutter control." Space Imaging, which in 1999 launched Ikonos, the world's first one-meter resolution commercial Earth-imaging satellite, hailed the move toward integrating products like its own into the government's day-to-day operations. "If this directive is implemented it would stimulate and maintain a robust commercial industry which the Congress and several administrations have sought to do for a long time," said Mark Brender, Space Imaging's executive director for government affairs. Other potential beneficiaries include ORBIMAGE of Dulles, Virginia, and DigitalGlobe of Longmont, Colorado, which began marketing .61-meter resolution images worldwide this month. 5751 From: Kirk Adirim Date: Wed Jul 3, 2002 10:19pm Subject: RE: antenna help......... Guy, you can go to www.tecom-ind.com for all your antenna needs. They do a lot of custom/covert antennas that are not mentioned in their sales brochures. I've bought a lot of antennas from them over the years and they do excellent work. Good luck, Kirk www.tactronix.com -----Original Message----- From: Guy Urbina [mailto:urbina1@l...] Sent: Wednesday, July 03, 2002 9:39 AM To: tscm-l@yahoogroups.com Subject: [TSCM-L] antenna help......... Hi all, I've been contracted to design and develop a proof of concept prototype GPS alarm for motorcycles. My current design uses microburst AMPS transceivers for the data packets, therefore I am looking for a miniature, covert AMPS cell antenna that can meet my needs. I've searched around on the net and did not find anything I liked. Ideally, I would like something that is extremely small and can still have omni-directional characteristics with nominal or unity gain. I was hoping some of you Title III designers can help me out and point out some sources........preferably COTS, but I am willing to fabricate one myself given proper plans and instructions. Best regards, -Guy Urbina ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5752 From: Bryan Herbert Date: Thu Jul 4, 2002 3:16pm Subject: Re: Off topic.. Gunman shot dead after killing 1 at Los Angeles airport The count is now 2 dead, 2 injured and on an unrelated note... Not far from LAX, a small twin engine plane crashed into a crowd of people celebrating Independence Day at a park in San Dimas, 7 people have been reported injured. Matt Paulsen wrote: http://www.cnn.com/2002/US/07/04/la.airport.shooting/index.html Gunman shot dead after killing 1 at Los Angeles airport July 4, 2002 Posted: 3:48 PM EDT (1948 GMT) LOS ANGELES, California (CNN) -- A gunman opened fire Thursday at Los Angeles International Airport near the ticket counter of Israel's El Al Airlines, officials said, killing one person and wounding at least two others before airline security personnel shot him dead. "At this time, there's no reason to believe the incident is terrorist-related," said Lt. Horace Frank, an LAPD spokesman. Information is still sketchy and the investigation is still in its earliest stages, he said. The Tom Bradley International Terminal was shut down, said Los Angeles Police Department spokesman Alex Baez. Everyone inside was evacuated. Thousands were seen streaming out of the terminal and traffic was stopped outside. Police cars, ambulances, and fire engines lined the road. Frank said 911 operators received the first call at approximately 11:30 a.m. (2:30 p.m. EDT), saying a suspect opened fire on an individual near the El Al counter. The suspect in turn was killed by El Al security personnel, but other "innocent bystanders" were shot and some were seriously wounded. Thad Weimlein, who was checking into his flight on Korean Air, heard an initial barrage of between eight and 10 shots, before it paused. Then the firing resumed, he said. "People were running and screaming and hitting the floor," Weimlein said. "There were a number of plainclothes policemen who pulled out their guns and badges at the same time." After it was over, officers asked everyone in the area of the international ticket counters to file outside, he said. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ --------------------------------- Do You Yahoo!? New! SBC Yahoo! Dial - 1st Month Free & unlimited access [Non-text portions of this message have been removed] 5753 From: Keith Ray Date: Thu Jul 4, 2002 4:52pm Subject: RE: Off topic.. Gunman shot dead after killing 1 at Los Angeles airport Quoting Fernando Martins : > I think that it's not too much off topic ... Still private guns in US > airports? It was a personal 'vendetta', right? > I just saw that on TV (CNN ... Sky News, one of those) I don't know the law in LA, but in Texas, it is still legal to carry a weapon in any area of an airport except the secured area. -- Keith 5754 From: kondrak Date: Sun Jul 7, 2002 0:29am Subject: Question Im in a discussion on another list about "voice stress analysis", anyone here have any dealings with the "tools"? I ran some software a while ago any played a Clinton clip into it and it told me he was a liar, but I didn't need software to tell me that. Thanks 5755 From: Fernando Martins Date: Sun Jul 7, 2002 11:04am Subject: RE: 10 Commandments of Counterintelligence This is a nice lecture on the subject: ftp://sailor.gutenberg.org/pub/gutenberg/etext94/sunzu10.txt At the end of the book, look for chapter 13. The Use of Spies Any comments on the "divine manipulation of the threads."? :> Here is a short version of this chapter: THE USE OF SPIES ------------------------------------------------------------------------ -------- Sun Tzu said: Raising a host of a hundred thousand men and engaging them in war entails heavy loss on the people and a drain on the resources. The daily expenditure will amount to a thousand ounces of silver. There will be commotion at home and abr oad, and men will drop out exhausted. Opposing forces may face each other for years, striving for the victory which may be decided in a single day. This being so, to remain in ignorance of the enemy's condition simply because one grudges the outlay of a hundred ounces of silver is the height of stupidity. One who acts thus is no leader of men, no present help to his cause, no master of victory. Thus, what enables the wise commander to strike and conquer, and achieve things beyond the reach of ordinary men, is foreknowledge. Now this foreknowledge cannot be elicited from spirits; it cannot be obtained inductively from experience, nor by any deductive calculation. Knowledge of the enemy's dispositions can only be obtained from other men. Hence the use of spies, of whom there are five classes: (1) Local spies - Having local spies means employing the services of the inhabitants of an enemy territory; (2) Moles - Having moles means making use of officials of the enemy; (3) Double agents - Ha ving double agents means getting hold of the enemy's spies and using them for our own purposes; (4) Doomed spies - Having doomed spies means doing certain things openly for purposes of deception, and allowing our spies to know of them and report them to t he enemy; (5) Surviving spies - Surviving spies means are those who bring back news from the enemy's camp. When these five kinds of spy are all at work, none can discover the secret system. This is called "divine manipulation of the threads." It is the commander's most precious faculty. Hence it is that which none in the whole army are more intimate relations to be maintained than with spies. None should be more liberally rewarded. In no other fields should greater secrecy be preserved. (1) Spies cannot be usefully employed without a certain intuitive sagacity; (2) They cannot be properly managed without benevolence and straight forwardness; (3) Without subtle ingenuity of mind, one cannot make certain of the truth of their reports; (4) Be subtle! be subtle! and use your spies for every kind of warfare; (5) If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death together with the man to whom the secret was told. Whether the object be to crush an enemy, to storm a territory, or to kill an enemy general, it is always necessary to begin by finding out the names of the attendants, the aides-de-camp, and door-keepers and sentries of the general in command. Our spies m ust be commissioned to ascertain these. The enemy's spies who have come to spy on us must be sought out, tempted with bribes, led away and comfortably housed. Thus they will become double agents and available for our service. It is through the information brought by the double agent that we are able to acquire and employ local and inward spies. It is owing to his information, again, that we can cause the doomed spy to carry false tidings to the enemy. Lastly, it is by his information that the surviving spy can be used on appointed occasions. The end and aim of spying in all its five varieties is knowledge of the enemy; and this knowledge can only be derived, in the first instance, from the double agent . Hence it is essential that the double agent be treated with the utmost liberality. Hence it is only the enlightened and wise general who will use the highest intelligence of the army for purposes of spying and thereby they achieve great results. Spies are the most important asset, because on them depends an army's ability to march. 5756 From: Rick Hofmann - MICROSEARCH Date: Sun Jul 7, 2002 4:29pm Subject: Identity of a device One of my clients sent me something that I am trying to identify. I believe it is part of an anti-shoplifitng device, or some other proximity sensing unit, but input and ideas from list members would be greatly appreciated. The device is built on a round circuit board approximately 1.25 in diameter. One side has a single LED and round camera type battery holder. The other side of the circuit board has another LED, a 7/16 diameter piezoelectric buzzer, an S9013 transistor, and a 15 turn coil of wire about .125 in diameter with a solid .375 long piece of wire soldered to the circuit board in the center of the coil. The only markings on the device are, "AL328" and "ALLEGRO" on the component side of the board. I did an Internet search using the markings, but came up with nothing. Any ideas? Very truly yours, Rick Hofmann, CCO, CPP, PI16998 MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 http://home.earthlink.net/~microsearch 5757 From: Robert Dyk Date: Sun Jul 7, 2002 6:35pm Subject: RE: Question I have seen VSA used and nobody has been able to prove that there is even a hint of real function to these so called tools. As with polygraph, if used in a interview there is an intimidation effect, but in my experience little else, certainly nothing resembling any scientific detection of a deceptive individual. Robert Dyk dyk@c... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. > -----Original Message----- > From: > sentto-49964-6227-1026042286-dyk=canada.com@r... > [mailto:sentto-49964-6227-1026042286-dyk=canada.com@r... > .com]On Behalf Of kondrak > Sent: July 7, 2002 1:29 AM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Question > > > > Im in a discussion on another list about "voice stress analysis", anyone > here have any dealings with the "tools"? > > I ran some software a while ago any played a Clinton clip into it and it > told me he was a liar, but I didn't need software to tell me that. > > Thanks > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 5758 From: Charles P. Date: Sun Jul 7, 2002 8:17pm Subject: Re: Identity of a device Rick, could be related to Allegro MicroSystems, which you probably found on your search. http://www.allegromicro.com/ Among other things they manufacture some smoke detector circuits, but I think they are just the ic's. http://www.allegromicro.com/selguide/safety1.asp Charles Charles Patterson Global Communications Tarrytown, NY charles@t... ----- Original Message ----- From: "Rick Hofmann - MICROSEARCH" To: Sent: Sunday, July 07, 2002 5:29 PM Subject: [TSCM-L] Identity of a device > > > One of my clients sent me something that I am trying to identify. I > believe it is part of an anti-shoplifitng device, or some other proximity > sensing unit, but input and ideas from list members would be greatly > appreciated. > > The device is built on a round circuit board approximately 1.25 in > diameter. One side has a single LED and round camera type battery > holder. The other side of the circuit board has another LED, a 7/16 > diameter piezoelectric buzzer, an S9013 transistor, and a 15 turn coil of > wire about .125 in diameter with a solid .375 long piece of wire soldered > to the circuit board in the center of the coil. The only markings on the > device are, "AL328" and "ALLEGRO" on the component side of the board. > > I did an Internet search using the markings, but came up with nothing. > > Any ideas? > > Very truly yours, > > Rick Hofmann, CCO, CPP, PI16998 > > MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage > Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: > 714-209-0037 > http://home.earthlink.net/~microsearch > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 5759 From: Date: Sun Jul 7, 2002 8:55pm Subject: Re: Question Check out the site (I think) antipolygraph.org....the countermeasures against polygraph are pretty well known, fewer countermeasures against VSA (although I once was told to use a VSA on a person with a stoma), but the VSA's actual reliability, as with the polygraph is in question. Mostly they are both 'enhancements' to interrogation techniques. Just ask Aldrich Ames. No 'peer reviewed' scientific evidence that either works. > > -----Original Message----- > > From: > > sentto-49964-6227-1026042286-dyk=canada.com@r... > > [mailto:sentto-49964-6227-1026042286-dyk=canada.com@r... > > .com]On Behalf Of kondrak > > Sent: July 7, 2002 1:29 AM > > To: TSCM-L@yahoogroups.com > > Subject: [TSCM-L] Question > > > > > > > > Im in a discussion on another list about "voice stress analysis", anyone > > here have any dealings with the "tools"? > > > > I ran some software a while ago any played a Clinton clip into it and it > > told me he was a liar, but I didn't need software to tell me that. > > > > Thanks > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5760 From: James M. Atkinson Date: Mon Jul 8, 2002 4:39am Subject: Re: Question The VSA/VSE is of minimal value, and serve as nothing more then a tool to intimidate a gullible subject (just like the polygraph). A VSA/VSE is of minimal value over the phone lines as the voice band filters on the line kill the band of frequencies the VSE wants to look at. -jma At 1:29 AM -0400 7/7/02, kondrak wrote: >Im in a discussion on another list about "voice stress analysis", anyone >here have any dealings with the "tools"? > >I ran some software a while ago any played a Clinton clip into it and it >told me he was a liar, but I didn't need software to tell me that. > >Thanks -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5761 From: James M. Atkinson Date: Mon Jul 8, 2002 4:59am Subject: Re: Identity of a device Rick, The device you describe sounds like a common "inventory control" or anti-shoplifting/anti-pilferage device used on higher end goods. However, the presence of both an LED and buzzer is curious. Take a really close look at it and see if you can find anything that looks like a SMT diode. If you disconnect the center tap on the "coil" you should be able to shoot it with a 1502 TDR and determine electrical length, or you can try to calculate in from the geometry of the coil. What size battery does it take? What are the dimensions of the battery holder. Are there any holes in the PCB where a plastic post would go through? I suspect that the item is designed to chirp or squeal when brought near a RF signal (likely near the 3-6 MHz, or 150 kHz EAS bands). One LED could be for testing the battery in the device, and second for an alarm test. Either way, I would need to see a photograph of the device (with a scale in the picture), but my initial impression is that it is a EAS or POS security product. You might want to give it a new battery, and then expose it to a signal from an RF signal generator several feet away. Just slowly tune the RF generator though the EAS bands and see if the device goes off. Of course, always assume the device is hostile until proven otherwise. -jma At 2:29 PM -0700 7/7/02, Rick Hofmann - MICROSEARCH wrote: > One of my clients sent me something that I am trying to identify. I >believe it is part of an anti-shoplifitng device, or some other proximity >sensing unit, but input and ideas from list members would be greatly >appreciated. > > The device is built on a round circuit board approximately 1.25 in >diameter. One side has a single LED and round camera type battery >holder. The other side of the circuit board has another LED, a 7/16 >diameter piezoelectric buzzer, an S9013 transistor, and a 15 turn coil of >wire about .125 in diameter with a solid .375 long piece of wire soldered >to the circuit board in the center of the coil. The only markings on the >device are, "AL328" and "ALLEGRO" on the component side of the board. > > I did an Internet search using the markings, but came up with nothing. > > Any ideas? > >Very truly yours, > >Rick Hofmann, CCO, CPP, PI16998 > >MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage >Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: >714-209-0037 >http://home.earthlink.net/~microsearch -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5762 From: Date: Mon Jul 8, 2002 1:53pm Subject: Moussaoui: FBI Planted Tracking Device Moussaoui: FBI Planted Tracking Device By DAVID PACE .c The Associated Press ALEXANDRIA, Va. (AP) - Zacarias Moussaoui, accused of conspiring in the Sept. 11 attacks, claims the FBI planted a tracking device in an electric fan that mysteriously appeared on his car in Oklahoma four months before his arrest in Minnesota, according to court records unsealed Monday. The motion, one of more than four dozen Moussaoui has filed since becoming his own lawyer last month, adds a new element to the 34-year-old French citizen's contention that U.S. authorities know he is innocent of the attacks on New York and Washington because they had him and the 19 hijackers under surveillance for months. The government has said neither Moussaoui nor any of the hijacker were being watched by U.S. authorities before Sept. 11. Monday was the deadline for Moussaoui to file motions before his trial this fall on charges that he conspired to commit acts of terrorism, commit aircraft piracy, destroy aircraft, use weapons of mass destruction, murder U.S. employees and destroy property. The government has said it will seek the death penalty. Moussaoui asked last week for permission to testify before Congress about his conspiracy theory. The government offered no objection, and U.S. District Judge Leonie Brinkema relayed his request to congressional leaders. Leaders of the House and Senate Intelligence committees will discuss the request later this week, a spokesman for Sen. Bob Graham, D-Fla., chairman of the Senate panel, said Monday. But there seemed to be little interest among lawmakers to hear from the only person charged in connection with the attacks. ``I can't imagine us being interested in hearing from him at this point,'' said Rep. Saxby Chambliss, R-Ga. ``The congressional inquiry is not the place for that to be aired.'' In the motions unsealed Monday, Moussaoui asked for an independent forensic examination of an electric fan he said was ``mysteriously left on my car like a present or gift'' when he was living in Oklahoma. He said he left the fan in his apartment when he moved to Minnesota, where he was arrested Aug. 16 after raising suspicions of instructors at a flight school. He said the FBI ``must have used the strategem to avoid to have to go to a judge to get a warrant to plant electronic surveillance device.'' Moussaoui took a shot at President Bush in one motion, comparing him to the Roman emperor in the movie ``Gladiator.'' ``The one who say that he was going to return honors to the office was definitely talking about Ceasar Type Honors like in Gladiator: Stabbing the enemy in the back before the fight. Not surprising for Daddy son. Leading (or I must say cheating) from the back,'' he wrote. 07/08/02 18:44 EDT Copyright 2002 The Associated Press. From: James M. Atkinson, Comm-Eng Date: Tue Jul 4, 2000 1:48am Subject: Re: Infrared viewing At 11:32 PM -0700 7/3/00, Gordon Mitchell wrote: >Welcome to the group. A long explanation to your short question follows. > >The trickery that we use (and love) for seeing fluorescence of stuff >in the UV doesn't work in the IR. An excellent post regarding UV lighting, thanks Gordon. One of the IR viewing methods we use involves the OmniChrome light source, and an IR sensitive CCD camera. This is in addition to visible light and UV light viewing. Works like gangbusters when examining altered documents, glue lines, paint marks, or materials that may not want to react with UV florescence. Very interesting results when looking at marks on the walls, or molding strips that may have been deformed by a wire installation. Someone once told me that virtually everything on earth "glows" if it is excited by the appropriate wavelength of light, the only problem is that the "glow" may not be visible to the unaided eye. We also use a variety of UV fingerprint powders (of different colors) mixed with KY Jelly which is then applied with an acid brush to the inside of wiring boxes, telephones, computers, wiring blocks,cross connect wiring, and so on. That way we can see if anybody has been "fooling with anything" since our last TSCM visit. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 753 From: James M. Atkinson, Comm-Eng Date: Tue Jul 4, 2000 1:54am Subject: Re: Infrared viewing > >Larry Nevin wrote: > > > This is my first time using the e-groups for > > information. > > > > Is it possible to purchase glasses that will allow me > > to view IR emissions? I am not interested in night > > vision equipment. What I was thinking about was > > barrier type glasses like the ones I use for my UV > > lights. Gary, If you use a NVD IR device be sure to use a Wratten #25 I/R filter, and a tri-color green (#58 I think) filter over the objective for better results. For UV lighting use a medium orange viewing screen... and a UV face shield to avoid a rather painful condition known as "Ground Glass Eyeball" or even a sunburn (depending on the wavelength of light your using). -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 754 From: A Grudko Date: Tue Jul 4, 2000 5:48am Subject: Re: Research Electronics Equipment ----- Original Message ----- > The OSCOR and CPM-700 make an excellent package to get started with, > and we have had really good luck with them. I'm also very happy with the CPM-700 except that it is prown to blowing the first stage transistor in the RF probe if you touch a metal object and there is a static discharge. We have blown 3 that way. Our winters are very dry and some carpet/shoe friction combinations cause serious discharges - you can see the spark even in daylight. We tell our technicians to touch metal frequently to discharge and obviously try to keep the probe away from any conducting surface, but.... Taking shoes off helps but looks weird to the client. We tried a computer tech.'s wristband with a long cable to earth but that has it's own disadvantages - one blow-out was 'cos the tech. didn't realised he'd pulled the cable out by stepping on it and touched a metal filing cabinette. Well that's his story. I don't have the same problem with the Scanlock. I can only think of re-fitting the probe's PCB into a bigger box with BNC m & f's, add some static protection and make up a strip of veroboard straight through the neat little CPM probe to the antenna. Any better suggestions? Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust "When you need it done right - first time" ICQ 78711262 755 From: Steve Uhrig Date: Tue Jul 4, 2000 7:16am Subject: Fire in the Hole? Hi Larry, What kind of business might you be in? I have a side business shooting display fireworks. One every night from last Thursday till tonight unless it rains and tonight slips. The name of your firm caught my attention. Saw you on TSCM list. Active night vision will show IR, as will black and white CCD cameras. Color cameras will not because they need an IR cut filter to keep IR from saturating the red. The cheaper the better for a board camera sensitive to IR. Look at the spec. If you saturate with IR (easy on cheap cameras) you will see a heavy vertical line on the image where you have saturated an entire column of pixels. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 756 From: Jay Coote Date: Tue Jul 4, 2000 0:00pm Subject: Re: Infrared viewing Larry and the List; I'd like to see what answers come up. I've been using NVGs. These cover the near IR band and some CCD cameras will do the same thing. Of course there may be IR emitters beyond the frequency range (detection ability)of NVGs, CCD cameras and IR detector kits. On this thread, I would like to see the data on the IR frequency bands of NVGs, TSCM IR detector kits and CCD cameras. Jay Coote Los Angeles ---------- > This is my first time using the e-groups for > information. > > Is it possible to purchase glasses that will allow me > to view IR emissions? I am not interested in night > vision equipment. What I was thinking about was > barrier type glasses like the ones I use for my UV > lights. > > Thanks for the help. > > Larry J. Nevin > Fire In The Hole Inc. > ljn35945@y... > > ===== > "EXPECT MORE THAN OTHERS THINK POSSIBLE!" > > __________________________________________________ > Do You Yahoo!? > Kick off your party with Yahoo! Invites. > http://invites.yahoo.com/ > > > ------------------------------------------------------------------------ > Lonely? Get Firetalk! > Free, unlimited calls anywhere in the world. > Free voice chat on hundreds of topics. > http://click.egroups.com/1/5477/1/_/507420/_/962686503/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 757 From: Jay Coote Date: Tue Jul 4, 2000 0:01pm Subject: Re: Research Electronics Equipment Andy and list; I've had *some* luck protecting receiver front-ends with a pair of diodes back-to-back. A higher-value resistor shunt to ground (earth) may also help bleed static. A series blocking cap may keep lower voltages out, but probably not static. Jay Coote ---------- > ----- Original Message ----- > > The OSCOR and CPM-700 make an excellent package to get started with, > > and we have had really good luck with them. > > I'm also very happy with the CPM-700 except that it is prown to blowing the > first stage transistor in the RF probe if you touch a metal object and there > is a static discharge. We have blown 3 that way. > > Our winters are very dry and some carpet/shoe friction combinations cause > serious discharges - you can see the spark even in daylight. We tell our > technicians to touch metal frequently to discharge and obviously try to keep > the probe away from any conducting surface, but.... > > Taking shoes off helps but looks weird to the client. We tried a computer > tech.'s wristband with a long cable to earth but that has it's own > disadvantages - one blow-out was 'cos the tech. didn't realised he'd pulled > the cable out by stepping on it and touched a metal filing cabinette. Well > that's his story. > > I don't have the same problem with the Scanlock. I can only think of > re-fitting the probe's PCB into a bigger box with BNC m & f's, add some > static protection and make up a strip of veroboard straight through the neat > little CPM probe to the antenna. Any better suggestions? > > > Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime > investigation & intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 > 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > Chairman), CITTF, > UKPIN, AFIO (OS), IWWL, PRETrust "When you need it done right - first > time" ICQ 78711262 > > > > > ------------------------------------------------------------------------ > Challenged with e-Business quality management? Register for a free > Webinar featuring e-business testing and performance experts. > http://click.egroups.com/1/5935/1/_/507420/_/962711381/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 758 From: Jay Coote Date: Tue Jul 4, 2000 0:01pm Subject: Re: Infrared viewing Gordon and the list; One test of a unit's ability to see near IR would be to locate some LEDs which have published data on frequency, and use these. Some specialty LED manufacturer must have LEDs which go beyond the usual 850 or 900 nM. Jay Coote ---------- > Welcome to the group. A long explanation to your short question follows. > > The trickery that we use (and love) for seeing fluorescence of stuff in the UV > doesn't work in the IR. > > What is happening in the UV is that light with a short wavelength -- shorter > than 400 nanometers -- is absorbed by stuff then the molecules of the stuff > reradiate light at a longer wavelength. The reason that this longer and > shorter wavelength stuff is important is that shorter wavelength photons > (chunks of light) have higher energy. Since there is always loss in these > transactions the radiated light has a longer wavelength than the incident > light. > > Walking around the room with a UV light quickly shows up things that contain > dyes which absorb UV and efficiently radiate a longer (visible) wavelength > light. Common dye materials are associated with the brightest colors you see. > Coumarin compounds are blue, alkali hydroxides of fluorescein are green and > rhodamine B is orange. We do this because the solvents of common adhesives > will fluoresce. An example is visualizing fresh glue holding a suspicious > block of wood under a desk. > > Since your eyes are only designed to work from about 400 to 700 nanometers > (where most of the sun's energy is) you will not be able to see light much > longer than 700 nanometers in wavelength. This means that since any sort of > IR luminescence will make light that is too long of a wavelength to see. You > have to increase the energy of the chunks (photons) of IR light to make them > visible. This is commonly done with a photocathode/electron > amplifier/phosphor combination or, in some cases, a TV camera that is IR > sensitive. > > I recommend using an IR imager like the ones in the Edmund Scientific catalog. > They can see IR radiation from 1300 nanometer light sources. TV cameras and > night vision equipment is blind past about 950 nanometers. Look for light > sources inside the room (for audio going out via a IR beam) or bright lights > shining on the window (for a IR laser probing the room audio). > > Hope that illuminates the issue. > > Gordon Mitchell, PhD, CISSP > Future Focus, Inc > Woodinville, WA > > Electronic eavesdropping detection & finding clues in computers > (888) BUG-KILR > > > Larry Nevin wrote: > > > This is my first time using the e-groups for > > information. > > > > Is it possible to purchase glasses that will allow me > > to view IR emissions? I am not interested in night > > vision equipment. What I was thinking about was > > barrier type glasses like the ones I use for my UV > > lights. > > > > Thanks for the help. > > > > Larry J. Nevin > > Fire In The Hole Inc. > > ljn35945@y... > > > > ===== > > "EXPECT MORE THAN OTHERS THINK POSSIBLE!" > > > > __________________________________________________ > > Do You Yahoo!? > > Kick off your party with Yahoo! Invites. > > http://invites.yahoo.com/ > > > > ------------------------------------------------------------------------ > > Lonely? Get Firetalk! > > Free, unlimited calls anywhere in the world. > > Free voice chat on hundreds of topics. > > http://click.egroups.com/1/5477/1/_/507420/_/962686503/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > ------------------------------------------------------------------------ > Get 6 months of FREE* MSN Internet access! > http://click.egroups.com/1/5727/1/_/507420/_/962692064/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 759 From: James M. Atkinson, Comm-Eng Date: Tue Jul 4, 2000 0:39pm Subject: Re: Research Electronics Equipment Ah, but remember that the more sensitive the front end the more prone it is to static damage, and the more you protect the front end the more of the signal you attenuate and/or distort. I have toasted more then a few MOSFETS in the winter time, and fried more then a few $4,000 LNA's when someone bumped an antenna during a sweep.... it's just a cost of doing business. (Cough... Cough...) I ALWAYS carry an extra set of CPM-700 probes (RF, Magnetic, and IR). I also have an external compact Radio Shack discone (30 - 1300 MHz + a 22 dB preamp) on hand to supplement the OSCOR in case of a poofed antenna platform (plus I have a fetish about throwing up a lot of copper to snag low power signals). I also keep a 2.4 GHz Video Booster Antenna on hand, but would be feel that REI needs to offer a similar version of the antenna suitable for 902-928 MHz, a second for for 1 - 1.5 GHz, and a third for 1.5-2.0 GHz. -jma At 1:11 PM -0400 7/4/00, Jay Coote wrote: >Andy and list; >I've had *some* luck protecting receiver front-ends with a pair of diodes >back-to-back. A higher-value resistor shunt to ground (earth) may also >help bleed static. A series blocking cap may keep lower voltages >out, but probably not static. >Jay Coote > >---------- > > ----- Original Message ----- > > > The OSCOR and CPM-700 make an excellent package to get started with, > > > and we have had really good luck with them. > > > > I'm also very happy with the CPM-700 except that it is prown to blowing the > > first stage transistor in the RF probe if you touch a metal >object and there > > is a static discharge. We have blown 3 that way. > > > > Our winters are very dry and some carpet/shoe friction combinations cause > > serious discharges - you can see the spark even in daylight. We tell our > > technicians to touch metal frequently to discharge and obviously >try to keep > > the probe away from any conducting surface, but.... > > > > Taking shoes off helps but looks weird to the client. We tried a computer > > tech.'s wristband with a long cable to earth but that has it's own > > disadvantages - one blow-out was 'cos the tech. didn't realised he'd pulled > > the cable out by stepping on it and touched a metal filing cabinette. Well > > that's his story. > > > > I don't have the same problem with the Scanlock. I can only think of > > re-fitting the probe's PCB into a bigger box with BNC m & f's, add some > > static protection and make up a strip of veroboard straight >through the neat > > little CPM probe to the antenna. Any better suggestions? > > > > > > Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime > > investigation & intelligence > > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > > Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 > > 9673 - 465 1487 (Fax) - Est. 1981 > > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > > Chairman), CITTF, > > UKPIN, AFIO (OS), IWWL, PRETrust "When you need it done right - first > > time" ICQ 78711262 =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 760 From: James M. Atkinson, Comm-Eng Date: Tue Jul 4, 2000 0:42pm Subject: Re: Infrared viewing Just a hint... Try a Watec 902A CCD video camera with a "Near Infrared" Wratten filter... just make sure your lens does not have a IR coating... you will be amazed. -jma At 1:11 PM -0400 7/4/00, Jay Coote wrote: >Larry and the List; >I'd like to see what answers come up. >I've been using NVGs. These cover the near IR band and some CCD cameras will >do the same thing. >Of course there may be IR emitters beyond the frequency range >(detection ability)of >NVGs, CCD cameras and IR detector kits. >On this thread, I would like to see the data on the IR frequency >bands of NVGs, >TSCM IR detector kits and CCD cameras. >Jay Coote >Los Angeles > > >---------- > > This is my first time using the e-groups for > > information. > > > > > Is it possible to purchase glasses that will allow me > > to view IR emissions? I am not interested in night > > vision equipment. What I was thinking about was > > barrier type glasses like the ones I use for my UV > > lights. > > > > Thanks for the help. > > > > Larry J. Nevin > > Fire In The Hole Inc. > > ljn35945@y... > > > > ===== > > "EXPECT MORE THAN OTHERS THINK POSSIBLE!" > > =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 761 From: Gordon Mitchell Date: Tue Jul 4, 2000 2:42pm Subject: Re: Infrared viewing Sorry, no commercial LEDs are available at the long wavelengths that need to be checked. Jay Coote wrote: > Gordon and the list; > One test of a unit's ability to see near IR would be to locate > some LEDs which have published data on frequency, and use > these. Some specialty LED manufacturer must have LEDs which > go beyond the usual 850 or 900 nM. > Jay Coote > > ---------- > > Welcome to the group. A long explanation to your short question follows. > > > > The trickery that we use (and love) for seeing fluorescence of stuff in the UV > > doesn't work in the IR. > > > > What is happening in the UV is that light with a short wavelength -- shorter > > than 400 nanometers -- is absorbed by stuff then the molecules of the stuff > > reradiate light at a longer wavelength. The reason that this longer and > > shorter wavelength stuff is important is that shorter wavelength photons > > (chunks of light) have higher energy. Since there is always loss in these > > transactions the radiated light has a longer wavelength than the incident > > light. > > > > Walking around the room with a UV light quickly shows up things that contain > > dyes which absorb UV and efficiently radiate a longer (visible) wavelength > > light. Common dye materials are associated with the brightest colors you see. > > Coumarin compounds are blue, alkali hydroxides of fluorescein are green and > > rhodamine B is orange. We do this because the solvents of common adhesives > > will fluoresce. An example is visualizing fresh glue holding a suspicious > > block of wood under a desk. > > > > Since your eyes are only designed to work from about 400 to 700 nanometers > > (where most of the sun's energy is) you will not be able to see light much > > longer than 700 nanometers in wavelength. This means that since any sort of > > IR luminescence will make light that is too long of a wavelength to see. You > > have to increase the energy of the chunks (photons) of IR light to make them > > visible. This is commonly done with a photocathode/electron > > amplifier/phosphor combination or, in some cases, a TV camera that is IR > > sensitive. > > > > I recommend using an IR imager like the ones in the Edmund Scientific catalog. > > They can see IR radiation from 1300 nanometer light sources. TV cameras and > > night vision equipment is blind past about 950 nanometers. Look for light > > sources inside the room (for audio going out via a IR beam) or bright lights > > shining on the window (for a IR laser probing the room audio). > > > > Hope that illuminates the issue. > > > > Gordon Mitchell, PhD, CISSP > > Future Focus, Inc > > Woodinville, WA > > > > Electronic eavesdropping detection & finding clues in computers > > (888) BUG-KILR > > > > > > Larry Nevin wrote: > > > > > This is my first time using the e-groups for > > > information. > > > > > > Is it possible to purchase glasses that will allow me > > > to view IR emissions? I am not interested in night > > > vision equipment. What I was thinking about was > > > barrier type glasses like the ones I use for my UV > > > lights. > > > > > > Thanks for the help. > > > > > > Larry J. Nevin > > > Fire In The Hole Inc. > > > ljn35945@y... > > > > > > ===== > > > "EXPECT MORE THAN OTHERS THINK POSSIBLE!" > > > > > > __________________________________________________ > > > Do You Yahoo!? > > > Kick off your party with Yahoo! Invites. > > > http://invites.yahoo.com/ > > > > > > ------------------------------------------------------------------------ > > > Lonely? Get Firetalk! > > > Free, unlimited calls anywhere in the world. > > > Free voice chat on hundreds of topics. > > > http://click.egroups.com/1/5477/1/_/507420/_/962686503/ > > > ------------------------------------------------------------------------ > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > ------------------------------------------------------------------------ > > Get 6 months of FREE* MSN Internet access! > > http://click.egroups.com/1/5727/1/_/507420/_/962692064/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > ------------------------------------------------------------------------ > Life's too short to send boring email. Let SuperSig come to the rescue. > http://click.egroups.com/1/6137/1/_/507420/_/962730076/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 762 From: James M. Atkinson, Comm-Eng Date: Tue Jul 4, 2000 6:24pm Subject: Suspect Denies Terrorist Links July 04, 2000 at 11:02:47 PDT Suspect Denies Terrorist Links http://www.lasvegassun.com/sunbin/stories/w-eur/2000/jul/04/070400499.html ASSOCIATED PRESS LAUSANNE, Switzerland (AP) -- A Swiss-Lebanese man at the center of a bungled Israeli spy operation said Tuesday that the Islamic center he ran was set up for religious purposes and was not linked to anti-Israeli activities. On the second day of the trial of an Israeli Mossad agent caught in a February 1998 espionage attempt, lawyers for the Swiss government and the agent probed for links between Abdallah el-Zein and terrorist masters in Lebanon and Iran. But a Swiss police expert testified that investigators had been unable to connect the worldwide network of Ahl El-Beit centers to Hezbollah, the Iranian-backed guerrilla group that fought to oust Israeli troops from southern Lebanon. "The suspicion exists," said Hans Knaus of Switzerland's federal police. "But we have not been able to confirm it." Other police officers described Tuesday how they caught the Israeli agent, identified as Issac Bental, and four colleagues installing bugging equipment after midnight in the basement of an apartment building where el-Zein had lived near the capital, Bern. Police were called in when neighbors reported strange noises. Rudolf Leuenberger of Bern state police said he and his partner found Bental and two other agents in the basement and said there were enough suspicious elements, including identical stamps in their Israeli passports, that police decided to take them in for questioning. Two other agents keeping watch outside were also questioned. Only Bental was arrested, because he was holding a bag with tools to install the wiretap. Contained in two hollowed-out boards about four feet long, the bugging system included a cellular phone, a timer and 24 batteries. The phone was set up to dial a recording center every time the telephone in el-Zein's apartment was taken off the hook. "It could have worked for years," said Victor Ruefenacht, the federal police technology expert. El-Zein told the court that the Ahl El-Beit center he ran organized soccer teams, promoted friendship and sent money to orphans in Lebanon and Iraq, but its main purpose was to encourage Islamic worship. "Of course there are other activities but the main purpose is religious," he told the Federal Criminal Court. Bental said Monday that he had been told el-Zein had sent people on terrorist missions to Israel. El-Zein denies the allegations and has settled a separate suit against Bental out of court. The Mossad agent's lawyer, Ralph M. Zloczower, asked el-Zein about his contacts with figures prominent in Ahl El-Beit, including Saddredine Fadlallah, head of the organization's center in Paris. El-Zein acknowledged meeting Fadlallah, but said he didn't know Fadlallah is the son of the Lebanese Grand Ayatollah Sheik Mohammed Hussein Fadlallah, widely believed to be the spiritual guide of Hezbollah. Bental, who is being tried under a pseudonym, is believed to be the first admitted Mossad agent to go on trial in a foreign country. Bental has said that the three charges against him are correct - that he acted illegally for a foreign country, conducted political espionage and repeatedly used false foreign identity documents. If found guilty, he could face a maximum sentence of 20 years imprisonment. Lawyers are to make closing arguments on Thursday, and sentencing is expected Friday. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 763 From: James M. Atkinson, Comm-Eng Date: Tue Jul 4, 2000 6:32pm Subject: Swiss court hears charges against Israeli secret agent Swiss court hears charges against Israeli secret agent http://www.irna.com/newshtm/eng/14004258.htm Spy-trial Vienna, July 4, IRNA -- An Israeli secret agent has gone on trial in Switzerland charged with carrying out illegal acts against a foreign state and using a false passport, Swiss Radio International reported on Monday. The Federal Court has allowed the man to stand trial under a pseudonym. The Mossad agent identified himself as "Isaac Bental", saying through an interpreter that he could not give the court his real name because it would jeopardise his personal safety. The Federal Court has allowed him to stand trial under a false name in a concession to the Israeli authorities, who want to prevent information about the secret service, Mossad, from entering the public domain. He faces charges of carrying out illegal acts against a foreign state, and of entering Switzerland using a false passport. The hearing is thought to be the first in which a Mossad agent has gone on trial outside Israel. "Bental" was caught red-handed in an apartment building near Berne in February 1998, while trying to tap the phone of a Swiss-Lebanese citizen, thought to have links with the Hezbollah guerrilla group. Swiss police also detained four other Mossad agents but later released them. Bental remained in detention after he was found to be in possession of sophisticated electronic listening equipment as well as several different passports. The Swiss authorities later allowed him to return home after the Israeli government paid bail of SFr 3 million and promised he would return to Switzerland for trial. In court Bental confirmed he was still working for Mossad but refused to answer questions about the agency's activities. He testified he had joined Mossad for idealistic reasons, and said he had never been involved in any operations in which people being harmed or killed. He said he had received orders from Israel to wiretap the telephone of a Hezbollah faction. "We wanted to find out what Hezbollah was doing in Switzerland," he said. At the time of his arrest, the incident led to a severe straining of diplomatic relations between Israel and Switzerland. The Swiss authorities demanded an apology from the Israelis, and this was grudgingly forthcoming. But the Swiss were also anxious to avoid a row with Israel because of the controversy over Switzerland's handling of dormant bank accounts belonging to Holocaust victims. At the time, the Swiss government and Swiss banks were involved in tortuous negotiations with the World Jewish Congress over a financial settlement . There remains a possibility that the Mossad agent may claim diplomatic immunity. If that happens, the trial will collapse, since foreign nationals with diplomatic immunity cannot be tried before a Swiss court. The case has also raised difficult questions about the effectiveness of Switzerland's various police forces. It is still not clear who was responsible for releasing the other four Mossad agents. One rumour lays the blame at the door of the Swiss federal police, saying they ordered their cantonal colleagues to let the agents go to prevent a diplomatic row with Israel. Another rumour says the cantonal police did not receive information early enough from the federal branch about the true identity of the four, and therefore had no option but to release them. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 764 From: Jinques West Date: Tue Jul 4, 2000 3:57pm Subject: Re: Bug Sweep FAQ 2000 Here are a few more things to consider,, My instincts tell me something is wrong, should I look more carefully or is this just my imagination? Should I trust long time employees? If I think I am surveilled should I call the authorities? What kind of response should I expect if I call the authorities? What kind of potential problems or damage could being surveilled pose for me? How do I prevent this sort of thing? Do I have any legal recourse if tapping is discovered? (Before you answer remember the way the authorities react) Should I tell anyone else before I call an expert? How do I convince my banker that I need to spend this much based on a suspicion? What do I do if I catch someone in the process of bugging my place? Why should anyone want to bug a small business anyway? "James M. Atkinson, Comm-Eng" wrote: > I am compiling a list of at least 100 of the more common questions > that those of use in TSCM hear from people. Once I have at least 100 > questions I will go though and answer each with a one of two > paragraph non technical answer and post the entire list to my website. > > The questions are limited to common non technical issues asked by > laymen which have been posted to my "guestbook" over the last six > years. I can only come up with a small number of the more common and > relevant questions, and would really appreciate it if other list > members could share a few suggestions. > > I am looking for questions specifically dealing with TSCM, bug > sweeps, eavesdropping questions, and communications security. I plan > to avoid computer security questions, physical security, and related > materials for the time being. > > The FAQ will be directed towards a completely non-technical audience, > and hopefully it will benefit the entire industry by educating our > clients on the subject matter. I added a few of the more colorful > questions from people with mental problems, not so that we can all > snicker at them, but to foster some type of helpful answer that we > can offer them (via the FAQ) to gently nudge them toward the > appropriate medical treatment they require. Of course some of these > colorful questions are simply based on a misunderstanding of > technology. > > Please feel free to respond publicly or privately. > > In case anybody is interested; My goal is to enhance the quality of > our profession, and to enlightened our clients so that in return they > will understand the benefits of our services... and as a result we > will keep eavesdroppers on the run. > > -jma > > ------------------------------------------------- > > Bug Sweep - Frequently Asked Questions (FAQ) > by James M. Atkinson > Granite Island Group > > version 4 July 2000 > > 1. How common is bugging, wire taping, and related eavesdropping. > > 2. How hard is it for someone to bug a telephone > > 3. I have noticed for awhile that my phone has been clicking as if > someone has been picking up the receiver. One day I picked up the > phone while it makes this clicking noise and there was no dial tone. > I did this a few times have been able to do the same thing. Is this > a sign of some sort of phone tapping? What can I do? > > 4. I was told by a friend that if you called this phone # > (xxx-xxx-xxx) it was used by corporations to check phone lines. I > was told that if you get a clear tone, your phone was not bugged. > Ever heard of this?? > > 5. Back in the sixties I remember reading about a special number you > could call that would tell you if your phone was bugged. Is there a > special 800 number that I can call that will tell me if my phone is > bugged. > > 6. What is an Infinity Transmitter or Harmonica Bug > > 7. How much would it cost to check my phone for bugs > > 8. I...I am certain that my spouse of 20 yrs is having an affair. How > do I tap is cell phone? Is it possible? And is it legal? > > 9. How much would it cost to check my office or home for bugs > > 10. How do I contact someone in my area to arrange to do a bug sweep for me > > 11. I was wondering how you can tell if your phone is tapped. Every > time i call some one it calls my house back with a series of loud > pulses. also it will call my house for no reason with those same > series of beeps. what do you think > > 12. The only realistic way to tell if your phone is taped is to > engage a TSCM person to check it out for you. > > 13. I would like to by a telephone eavesdropping device, how much > would you charge > > 14. I would like to buy a tracking device so I can follow my boyfriend > > 15. I would like to eavesdrop on my boyfriends cellular telephone and > would like to know if it is legal, and how can I do it. > > 16. I want to bug my bosses office. > > 17. Are Cellular Telephones secure > > 18. Are PCS Telephones secure > > 19. Are GSM telephones secure > > 20. Are Cordless Phones secure > > 21. Are Pagers and Beepers secure > > 22. Why should I always turn my cellular telephone off when I am not > specifically making or expecting a phone call. > > 23. What are the more common ways that someone can follow my vehicle > > 24. I want to buy a small amount of inexpensive equipment so I can > perform by own bug sweeps, what do you recommend. > > 25. I am a private investigator (or security consultant) and would > like to start offer bug sweep services to my clients > > 26. I work for a company and we are interested in obtain some basic > equipment to provide an in-house TSCM capability. > > 27. I am a bodyguard or executive protection specialist and would > like to add a limited bug sweep capabilities to my protective detail > and support functions. > > 28. Do you have any info on building your own FM transmitter that > enables you to transmit a voice further than 300ft? > > 29. I have talked to a number of people through email and then > follow-up telephone conversations. These people indicate that there > is the existence of a communication system that, as hard as it is to > believe, can transmit information directly to the human body. It has > variously been termed energy directed audiograms, mental telepathy > system, artificial intelligence network, and remote viewing. > > 30. I am a government guinea pig under the influence of > bioelectronics, radio and microwaves radiation, ultrasonic > bombardment and electronic destruction of memory and intense mid > control. > > 31. Should I can the FBI if I think that I have found a bug > > 32. Should I call the FBI if I think I am bugged > > 33. I would like to buy a phone scrambler, can you help me. > > 34. I am hearing voices beamed to my by the CIA who is operating > under the authority of the federal mind control courts at area 51. To > this day hear the voices in my head and i 100% believe the voices to > come from an intelligence agency. they are using some sort of > technology to beam messages into my mind > > 35. Someone is harassing me by beaming microwave and/or Ultrasonic > energy at me, I am having really bad headaches, my teeth hurt, and I > can not sleep. > > 36. Can you send me a hardcopy catalog of eavesdropping equipment > > 37. Several phone trucks were seen down the block. my phone seems to > have a delay and echo in it, my scanners are not working, and there > is a shadow going by the back window > > 38. I was wondering about the range of the VHF crystal controlled > mini bug being advertised in magazines which boast a 1/2 mile range. > Do they really give a 1/2 mile range under normal conditions? What > kind of range should I expect in a residential area? > > 39. Have you ever came across the type of bug the soviets used away > back to eavedrop on the US embassy in Moscow. The whole thing used no > power, it depended on excitation from microwaves to resonate it, the > resonant cavity was constructed as such to allow voice frequency > sound to modulate it resonant frequency . What they would do was beam > a signal at it and have the thing tuned just slightly off of > resonance and then pick up its "new" reflected and modulated signal > at another location. > > 40. I was wondering where does one buy the bugs. > > 41. I would like to obtain plans to build some bugs, can you please > send me some designs. > > 42. Is PGP a good email encryption program? > > 43. Is there any way to make cordless phones more secure? > > 44. I would like to buy a scrambled telephone, which is the best on to buy. > > 45. I have been experiencing a constant non-directional tone in > two-different indoor locations within a couple of miles of each > other. The tone I would guess at being about 1500 Hz and it only > lasts for about 30 seconds to a minute. Any suggestions you have on > this would be much appreciated as I have now dismissed this as a > one-off. Thank you very much, I hope you can suggest what this could > be. > > 46. I am interested in the bumper beeper thing.. need to purchase > equipment immediately serious inquiry... thanks for reply soon... > > 47. if REMOBS can be detected and if so by which method. > > 48. is there any books or manual available that show Hookswitch > bypass methods and modifications? > > 49. Is there an easy way to determine whether a home is being > subjected to electron eavesdropping. I need to determine this before > going to the authorities with an accusation. Is there an equipment > item that can be easily used to detect electronic surveillance? The > situation is real and I am not paranoid. I do not want to contact > the sheriff with an accusation that is unfounded. Can you help me by > providing information about such equipment? > > 50. Can you suggest a source for the ultrasonic devices that can > thwart microphones? > > 51. Are there any pocket-sized detectors that can alert one to the > presence of a tape recorder's bia oscillator? > > 52. I bought a voice scrambler for a thousand dollars, but people are > still able to hear the things I say over my cordless telephone, what > is wrong. > > 53. I just bought one of those fancy 2.4 GHz spread spectrum > telephone but I think my neighbor can still eavesdrop on the signal, > is this possible? > > 54. The sales person at the cellular telephone place told me that > people can not eavesdrop on the new telephones, is this try, and if > not why is the guy lying to me. > > 55. What percentage of sweeps actually turn up anything > > 56. Any recommendations on constructing a true faraday cage or bug proof room? > > 57. We are looking for an employee engaging in illegal eavesdropping > who will probably use cheap radio Shack or Spy Shop type of > transmitters , What equipment would suggest to detect this type of > device at several feet, assuming that there is not much background > noise? The equipment would need to be suitable for people with a > non-technical background to use, and operate with little or no > training. > > 58. Our company has provided a bug in their own Boardroom. It is a > wireless microphone that is part of a speakerphone. When they use it, > they set it on the table and turn it on. When not is use, it is then > plugged into the charger. I've turned the thing over and looked on > the bottom. There is a label which say 174 240, and sure enough that > is the frequency I can pick up on my scanner. I found out that for > some reason they never turn the transmitter off, and that I can pick > up the signal 24 hours a day from outside the building. How many > companies have a problem like this, and what can I do to point out > how dangerous this situation is. > > 59. Do those $50 boxes you hook into your phone line to detect a tap > really work? > > 60. I'm doing research paper for a class on security and such and > this particular area seemed to intrigue me the most. I've run > across references to the Van Eck experiments aired on BBC television > back around 1990 and how the various alphabet agencies in the US > didn't quite like this demonstration.... but for the most part, I > find very little information about a topic > > 61. How much does a working telephone bug cost, and how does it work? > > 62. Last year FBI agents abducted by cat and implanted it with a > covert video camera. Now the cat follows me around everywhere I go > and transmits video images back to the FBI. What can I do to make > this stop. > > 63. ??? > > =================================================================== > Everybody's into computers... Who's into yours?Å > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > "...any sufficiently advanced technology is > indistinguishable from magic." - Arthur C. Clarke > =================================================================== > > [Non-text portions of this message have been removed] > > ------------------------------------------------------------------------ > e-Business Quality Management- Your Site's Success Depends on It. > Register today for an eye opening experience. > http://click.egroups.com/1/5934/1/_/507420/_/962685265/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 765 From: Thomas H. Jones Date: Wed Jul 5, 2000 9:02am Subject: RE: Research Electronics Equipment When we first developed the CPM, we knew that ESD would be a problem if care is not taken to avoid the problem. We could have added additional circuitry to address the issue, but this would have lowered the sensitivity of the unit. However, about three years ago we modified the design of the CPM probe antenna to meet CE mark requirements, and now we offer two versions of the probe. The normal version is unchanged, the new version has an antenna that is basically rubber coated to protect against ESD. There is slight loss in performance with the new antenna, and for this reason, we usually do not ship this version unless requested. But, most people find the performance more than adequate for a broadband receiver. If you would like this new probe, please contact us directly. Best Regards, Tom Jones General Manager REI -----Original Message----- From:A Grudko [SMTP:agrudko@i...] Sent:Wednesday, July 05, 2000 8:16 AM To:TSCM-L@egroups.com Subject:Re: [TSCM-L] Research Electronics Equipment ----- Original Message ----- > The OSCOR and CPM-700 make an excellent package to get started with, > and we have had really good luck with them. I'm also very happy with the CPM-700 except that it is prown to blowing the first stage transistor in the RF probe if you touch a metal object and there is a static discharge. We have blown 3 that way. Our winters are very dry and some carpet/shoe friction combinations cause serious discharges - you can see the spark even in daylight. We tell our technicians to touch metal frequently to discharge and obviously try to keep the probe away from any conducting surface, but.... Taking shoes off helps but looks weird to the client. We tried a computer tech.'s wristband with a long cable to earth but that has it's own disadvantages - one blow-out was 'cos the tech. didn't realised he'd pulled the cable out by stepping on it and touched a metal filing cabinette. Well that's his story. I don't have the same problem with the Scanlock. I can only think of re-fitting the probe's PCB into a bigger box with BNC m & f's, add some static protection and make up a strip of veroboard straight through the neat little CPM probe to the antenna. Any better suggestions? Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust "When you need it done right - first time" ICQ 78711262 ------------------------------------------------------------------------ Challenged with e-Business quality management? Register for a free Webinar featuring e-business testing and performance experts. http://click.egroups.com/1/5935/1/_/507420/_/962711381/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 766 From: James M. Atkinson, Comm-Eng Date: Wed Jul 5, 2000 4:18pm Subject: Witness testifies in Israeli spy trial Tuesday, 4 July, 2000, 20:54 GMT 21:54 UK Witness testifies in Israeli spy trial http://news.bbc.co.uk/hi/english/world/europe/newsid_819000/819581.stm The target of a bungled Israeli spy operation in Switzerland has been giving evidence on the second day of the trial of an Israeli secret agent. The agent, known under the cover name of Isaac Bental, was captured in February 1998 trying to install a telephone bug in an apartment block in the Swiss capital, Berne. Mr Bental said the target, a Swiss-Lebanese man who lived in an apartment in the building, was a suspected member of a group that supported attacks against Israelis. But the witness, Abdallah el-Zein, told the court on Tuesday that the Islamic center he ran in Switzerland was set up for religious purposes. Car salesman He was suspected by the Israeli intelligence agency, Mossad, of having links with the Lebanese Islamic organisation Hezbollah - a charge Mr el-Zein denies. He acknowledged links with what he called a religious and cultural centre in Berne, which collects money for Iraqi and Lebanese orphans. The man, who became a Swiss national after marrying a Swiss woman, is currently a car salesman. The Israeli agent has already pleaded guilty to charges of installing an illegal listening device in a botched mission that sparked a diplomatic incident between Switzerland and Israel. Bugging equipment The operation caused deep embarrassment in Israel and prompted the head of the secret service, Mossad, to resign. It is not clear why Mossad decided to work independently of Swiss police in the operation. On Tuesday, police officers described in court how they caught the agent and four colleagues installing bugging equipment after midnight in the basement of the building where Mr el-Zein lived. One police officer showed the court the bugging equipment, which he said was capable of functioning for years. On Monday, Mr Bental said Mossad had told him that Mr El-Zein had sent people on terrorist missions to Israel. Mr el-Zein was asked in court whether he could shed any light on anti-Israeli attacks such as the July 1994 bombing of a Jewish community center in Argentina, that killed 86 people. He denied any knowledge of such incidents. The hearing is expected to last until Friday. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 767 From: James M. Atkinson, Comm-Eng Date: Wed Jul 5, 2000 4:21pm Subject: Policeman left details of phone tap on train Policeman left details of phone tap on train http://www.independent.co.uk/news/UK/This_Britain/2000-07/tap050700.shtml By Fran Abrams, Westminster Correspondent 5 July 2000 A police officer was disciplined after accidentally leaving details of a secret telephone bugging operation on a train, it was disclosed last night. The log of the operation by the National Criminal Intelligence Service, which targets some of the country's most dangerous criminals, was recovered by British Transport Police. The Commissioner for Interception of Communications, Lord Nolan, said in his annual report, published yesterday that the incident in March last year, represented a "very serious failing" by the officer concerned. The police found that the envelope containing the log had been opened although the material inside was intact and there was no evidence that it had been read. The officer, who was not a member of NCIS, had filled in the log sheet with details of the bugging operation which were "correctly sanitized and coded in accordance with established practice" and the operation itself was not compromised. The incident was one of a series of mainly technical errors recorded by Lord Nolan in the execution of warrants issued for the interception of telephone calls and letters. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 768 From: Mike Dever Date: Wed Jul 5, 2000 2:29am Subject: Various Subjects James and other members of the group, 1. Covert Video Surveillance: There has been some recent discussion about the legality of covert video surveillance. All Australian jurisdictions (federal, state and territory) have existing laws prohibiting the manufacture, sale, possession, use, etc of 'listening devices' however the law has been silent about video or optical surveillance until recently. At least one state here in Australia (Victoria) has enacted legislation prohibiting covert video surveillance without a warrant from a court. The Victorian legislation is called the 'Surveillance Devices Act, 1999' and is available at http://www.dms.dpc.vic.gov.au/sb/index.html. It is expected that all Australian states and territories will soon have similar legislation. 2. Detection of IR Emitting devices: In addition to the Watec Model WAT-902A, the Ikegami ICD-42 series monochrome cameras also have a very good IR response. The spectral response of the ICD43E for example extends to beyond 1100nm (without the IR cut filter) 3. Bug Sweep FAQ 2000 Just the other day a prospective client asked me if it was possible to intercept fax or e-mail communications and read them. Apparently they asked their 'security company' who told them that it was impossible to intercept fax and e-mail transmissions. So perhaps a question for the FAQ list could be: "Can fax messages be intercepted?" Regards Michael J. Dever CPP Senior Engineer Dever Clark & Associates Canberra Australia Telephone: +6254 5337 Telefax: +6278 4020 E-mail: deverclark@b... 769 From: James M. Atkinson, Comm-Eng Date: Wed Jul 5, 2000 7:06pm Subject: AC Line Impedance When performing TSCM services are you calculating your AC line impedance as 10, 12.5, 15 ohms, or some other value. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 770 From: James M. Atkinson, Comm-Eng Date: Wed Jul 5, 2000 9:22pm Subject: Mossad agents threaten strike over spy's Swiss trial Mossad agents threaten strike over spy's Swiss trial http://www.the-times.co.uk/news/pages/tim/2000/07/06/timfgnmid01001.html FROM SAM KILEY IN JERUSALEM MEMBERS of Israel's Mossad spy agency threatened to down tools yesterday in protest at the country's decision to send an agent to stand trial in Switzerland. The image of Mossad has taken a battering in recent years after a bungled Swiss wire-tapping operation and an assassination attempt against a Hamas leader that ended in a fiasco. Now agents have said that they are angry with their spymasters, who sent "David Bental", whose real name is being witheld from the Swiss authorities, to stand trial in Berne. He was caught in the basement of a flat near Berne trying to bug the home of a a Lebanese-born car salesmen whom the Israelis suspected of having links with Hezbollah. Israel Radio said yesterday that Ephraim Halevy, the head of Mossad, had been told that his agents felt that sending "Mr Bental" for trial was a betrayal of trust. Agents also complained that they were suffering from low morale because of the drop in the number of operations and the rejection of other operations by Ehud Barak, the Israeli Prime Minister. In court, Swiss police officers described how they caught "Mr Bental" and four colleagues installing listening devices in the home of the car dealer. Only "Mr Bental" was charged because he had a bag containing bugging equipment: a cell phone connected to 24 batteries, which was to have been plugged into Abdallah el-Zein's telephone line and would have called a recording centre every time that he picked up his handset. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 771 From: James M. Atkinson, Comm-Eng Date: Thu Jul 6, 2000 2:49pm Subject: Discovery Notification Procedures I've gotten quite a few questions regarding "Notification Procedures" so I though it was time to post something to the list. First, as a fact of law when you uncover a illegal eavesdropping devices, or evidence of illegal eavesdropping activity, espionage, bugging, wiretapping, and so on you have a legal responsibility to notify appropriate law enforcement which has jurisdiction. Failure to report a crime or suspected crime may cause the words "Obstruction of Justice" to appear next to your name on an indictment. Second, The issue of "jurisdiction" is a very touchy one. As a rule your safest bet is to make always your report initial in writing to at least one FEDERAL law enforcement agency, and optionally to one local law enforcement agency. Third, You want someone in law enforcement to get out to the location and take control of the premises is quickly as possible. Fourth, It is CRITICAL that you collect as much documentation as quickly as humanly possible as the bug may vanish in all the commotion once LE gets involved. Fifth, Law Enforcement will (or should) ALWAYS suspect that the person who found the bug is also the person who planted the bug. You had better make damn sure that you "are as pure as the freshly laid snow", and that NOTHING in your possession (or at your office) could be even remotely considered an eavesdropping device. Sixth, When you take photographs of the find be sure to get INSTANT pictures in three copies (one for you, one for LE, and one for your clients), and be sure to sign each and add a date and time (these are your insurance pictures). Next, take a series of 35mm photographs with a "Normal" 50 or 60 mm lens and use COLOR print film (as slow speed as possible, I prefer 25 or 100 speed). Be sure to use a tripod and off camera flash, and stop-down to the minimum aperture so the photographs will be tack sharp when blown up. If you have time supplement the color photographs with a set of black and white picture shot on PANCHROMATIC film (as slow as possible, I prefer 50 speed or Tech-Pan). Take great care not to disturb anything that might be considered evidence. Don't rely on digital pictures only, but burn some film (LE folks, judges, and juries love big 30*40 prints). Seventh, record every little detail on paper, and remember that you will need to sign , date, and time stamp each page. Remember to make a photocopy as you will usually give all of your originals to the LE person who comes out (be sure to get a property receipt... no property receipt, no evidence). Personally I have a 150+ page discovery checklist that goes into virtually all conceivable parameters of a discovery, and tracks all notifications, etc. (I also bring along some of my own property receipts in case they forget theirs). Eighth, This would be a good time to point out that you should make copies of everything, but that it may be wise to "forget" about these copies (and your insurance pictures) when you hand over the original documents. Funny things have been known to happen in property rooms, and it may end up being "your word against theirs", so CYA, CYA,CYA. Ninth, Always assume that there is more then the bug or bugs you found, and assume that someone will attempt removal or at least some type of countermeasure against your discovery. Tenth, It is critical that you consider that what you have found is hostile, AND illegal until proven otherwise. AND THE MOST CRITICAL!!! Eleventh, Our job is to ensure that an area that we are inspecting is reasonably free of eavesdropping devices or technical weaknesses. We are never engaged to find the bug, but to ensure that no bug is present. It is not our job to "investigate" who did it, but to scientifically document our find and then to turn the case over to someone in law enforcement for investigation. ================================================ Assorted Ramblings: My personal preference is to "preload" a notification form letter on a laptop with all of the location information, client information, and so on. I set it up so it can launch a fax off to the local FBI office in seconds (sent to the complaint duty officer). I also set up a similar form letter with contact information (via fax) for any other local LE agency that may also have interest in case I find something (State Police, Local Sheriff, City Police, etc). I also indicate that this is simply an "Initial Notification Letter" and that there will be more details to follow in a second fax and phone call. I then go down my discovery check list, key-in the appropriate details on the find and squirt a fax (with more details) to the appropriate agencies as soon as possible. This way the paper trail on the find is started immediately. I then follow up with a phone call about 5-10 minutes after I've confirmed that all of the faxes have gone though. Once that has been completed the rest of the discovery list is filled out. Photographs of the find are taken (both 35mm and Polaroid instant "insurance pics") and as much information written down and documented in as much depth and detail as possible. Be sure to observe the behavior of your contact and their employees when you tell them about your discovery as this often proves quite interesting (it may be THEIR bug). The area is then secured, and the law enforcement agencies re-contacted (and pushed) to get someone to "take control" of the area prior to your departure. Usually the LE folks will bitch and moan, but it is critically important to get someone (anyone) to come visit the location, and at least take down a written incident report or complaint (be sure that YOU get a copy). Also be sure to get the name, badge number, and contact information of the people who come out (be sure to record the plate number and/or car number). If someone in law enforcement claims that the device "is one of theirs" simply ask for the docket/case number, the court who issued the warrant, and the names/phone of the judge so you can get a protective order issued. If there is Court or Judges name given and no protective order is issued, then there is no legitimate warrant, in turn the cop is probably violating the felony, and you need to immediately talk to the FBI. (A protective order is a court order that will formally command you to "keep your mouth shut" regarding the discovery or activities involving a legitimate COURT ordered bugging. You should ask for this to be issued to protect you, and most judges will be quite happy to issue one as they understand the ethical position you are in.) If in fact you obtain good reason to belive that it is a legitimate COURT ORDERED activity then politely and immediately refund all of your clients money (with a little extra something for their trouble), and find some way to gracefully back out of the assignment (feigning an equipment malfunction, theft of gear, or a physical ailment are all good excuses). Just remember that when you find a bug keep your mouth shut, document everything, preserve evidence, officially notify law enforcement, and be ready to answer some awkward questions. -jma =================================== By the way, here are the FBI Offices in major 56 U.S. cities. I suggest that you copy and past them into your discovery checklist. Federal Bureau of Investigation 200 McCarty Avenue Albany, New York 12209 (518) 465-7551 Federal Bureau of Investigation Suite 300 415 Silver Avenue, Southwest Albuquerque, New Mexico 87102 (505) 224-2000 Federal Bureau of Investigation 101 East Sixth Avenue Anchorage, Alaska 99501-2524 (907) 258-5322 Federal Bureau of Investigation Suite 400 2635 Century Parkway, Northeast Atlanta, Georgia 30345-3112 (404) 679-9000 Federal Bureau of Investigation 7142 Ambassador Road Baltimore, Maryland 21244-2754 (410) 265-8080 Federal Bureau of Investigation Room 1400 2121 8th. Avenue N. Birmingham, Alabama 35203-2396 (205) 326-6166 Federal Bureau of Investigation Suite 600 One Center Plaza Boston, Massachusetts 02108 (617) 742-5533 Federal Bureau of Investigation One FBI Plaza Buffalo, New York 14202-2698 (716) 856-7800 Federal Bureau of Investigation Suite 900, Wachovia Building 400 South Tyron Street Charlotte, North Carolina 28285-0001 (704) 377-9200 Federal Bureau of Investigation Room 905 E.M. Dirksen Federal Office Building 219 South Dearborn Street Chicago, Illinois 60604-1702 (312) 431-1333 Federal Bureau of Investigation Room 9000 550 Main Street Cincinnati, Ohio 45202-8501 (513) 421-4310 Federal Bureau of Investigation Room 3005 Federal Office Building 1240 East 9th Street Cleveland, Ohio 44199-9912 (216) 522-1400 Federal Bureau of Investigation 151 Westpark Blvd Columbia, South Carolina 29210-3857 (803) 551-4200 Federal Bureau of Investigation Suite 300 1801 North Lamar Dallas, Texas 75202-1795 (214) 720-2200 Federal Bureau of Investigation Federal Office Building, Room 1823 1961 Stout Street, 18th. Floor Denver, Colorado 80294-1823 (303) 629-7171 Federal Bureau of Investigation 26th. Floor, P. V. McNamara FOB 477 Michigan Avenue Detroit, Michigan 48226 (313) 965-2323 Federal Bureau of Investigation 660 S. Mesa Hills Drive El Paso, Texas 79912-5533 (915) 832-5000 Federal Bureau of Investigation Room 4-230, Kalanianaole FOB 300 Ala Moana Boulevard Honolulu, Hawaii 96850-0053 (808) 521-1411 Federal Bureau of Investigation 2500 East TC Jester Houston, Texas 77008-1300 (713) 693-5000 Federal Bureau of Investigation Room 679, FOB 575 North Pennsylvania Street Indianapolis, Indiana 46204-1585 (317) 639-3301 Federal Bureau of Investigation Room 1553, FOB 100 West Capitol Street Jackson, Mississippi 39269-1601 (601) 948-5000 Federal Bureau of Investigation Suite 200 7820 Arlington Expressway Jacksonville, Florida 32211-7499 (904) 721-1211 Federal Bureau of Investigation 1300 Summit Kansas City, Missouri 64105-1362 (816) 512-8200 Federal Bureau of Investigation Suite 600, John J. Duncan FOB 710 Locust Street Knoxville, Tennessee 37902-2537 (423) 544-0751 Federal Bureau of Investigation John Lawrence Bailey Building 700 East Charleston Boulevard Las Vegas, Nevada 89104-1545 (702) 385-1281 Federal Bureau of Investigation Suite 200 Two Financial Centre 10825 Financial Centre Parkway Little Rock, Arkansas 72211-3552 (501) 221-9100 Federal Bureau of Investigation Suite 1700, FOB 11000 Wilshire Boulevard Los Angeles, California 90024-3672 (310) 477-6565 Federal Bureau of Investigation Room 500 600 Martin Luther King Jr. Place Louisville, Kentucky 40202-2231 (502) 583-3941 Federal Bureau of Investigation Suite 3000, Eagle Crest Bldg. 225 North Humphreys Blvd. Memphis, Tennessee 38120-2107 (901) 747-4300 Federal Bureau of Investigation 16320 Northwest Second Avenue North Miami Beach, Florida 33169-6508 (305) 944-9101 Federal Bureau of Investigation Suite 600 330 East Kilbourn Avenue Milwaukee, Wisconsin 53202-6627 (414) 276-4684 Federal Bureau of Investigation Suite 1100 111 Washington Avenue, South Minneapolis, Minnesota 55401-2176 (612) 376-3200 Federal Bureau of Investigation One St. Louis Centre 1 St. Louis Street, 3rd. Floor Mobile, Alabama 36602-3930 (334) 438-3674 Federal Bureau of Investigation 1 Gateway Center, 22nd. Floor Newark, New Jersey 07102-9889 (973) 792-3000 Federal Bureau of Investigation Room 535, FOB 150 Court Street New Haven, Connecticut 06510-2020 (203) 777-6311 Federal Bureau of Investigation 2901 Leon C. Simon Dr. New Orleans, Louisiana 70126 (504) 816-3000 Federal Bureau of Investigation 26 Federal Plaza, 23rd. Floor New York, New York 10278-0004 (212) 384-1000 Federal Bureau of Investigation 150 Corporate Boulevard Norfolk, Virginia 23502-4999 (757) 455-0100 Federal Bureau of Investigation 3301 West Memorial Drive Oklahoma City, Oklahoma 73134 (405) 290-7770 Federal Bureau of Investigation 10755 Burt Street Omaha, Nebraska 68114-2000 (402) 493-8688 Federal Bureau of Investigation 8th. Floor William J. Green Jr. FOB 600 Arch Street Philadelphia, Pennsylvania 19106 (215) 418-4000 Federal Bureau of Investigation Suite 400 201 East Indianola Avenue Phoenix, Arizona 85012-2080 (602) 279-5511 Federal Bureau of Investigation Suite 300 U.S. Post Office Building 700 Grant Street Pittsburgh, Pennsylvania 15219-1906 (412) 471-2000 Federal Bureau of Investigation Suite 400, Crown Plaza Building 1500 Southwest 1st Avenue Portland, Oregon 97201-5828 (503) 224-4181 Federal Bureau of Investigation 111 Greencourt Road Richmond, Virginia 23228-4948 (804) 261-1044 Federal Bureau of Investigation 4500 Orange Grove Avenue Sacramento, California 95841-4205 (916) 481-9110 Federal Bureau of Investigation 2222 Market Street St. Louis, Missouri 63103-2516 (314) 231-4324 Federal Bureau of Investigation Suite 1200, 257 Towers Bldg. 257 East, 200 South Salt Lake City, Utah 84111-2048 (801) 579-1400 Federal Bureau of Investigation Suite 200 U.S. Post Office Courthouse Bldg. 615 East Houston Street San Antonio, Texas 78205-9998 (210) 225-6741 Federal Bureau of Investigation Federal Office Building 9797 Aero Drive San Diego, California 92123-1800 (619) 565-1255 Federal Bureau of Investigation 450 Golden Gate Avenue, 13th. Floor San Francisco, California 94102-9523 (415) 553-7400 Federal Bureau of Investigation Room 526, U.S. Federal Bldg. 150 Carlos Chardon Avenue Hato Rey San Juan, Puerto Rico 00918-1716 (787) 754-6000 Federal Bureau of Investigation Room 710 915 Second Avenue Seattle, Washington 98174-1096 (206) 622-0460 Federal Bureau of Investigation Suite 400 400 West Monroe Street Springfield, Illinois 62704-1800 (217) 522-9675 Federal Bureau of Investigation Room 610, FOB 500 Zack Street Tampa, Florida 33602-3917 (813) 273-4566 Federal Bureau of Investigation Washington Metropolitan Field Office 601 4th Street, N.W. Washington, D.C. 20535-0002 (202) 278-2000 =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 772 From: James M. Atkinson, Comm-Eng Date: Thu Jul 6, 2000 3:07pm Subject: Swiss prosecution wants jail for Mossad spy Swiss prosecution wants jail for Mossad spy http://www.excite.co.uk/news/news_story/world/reuters_world_news_20000 706171603_6.txt Thursday 6 July 2000 LAUSANNE, Switzerland, July 6 (Reuters) - Swiss prosecutors on Thursday demanded a 15-month jail sentence for an agent of Israel's Mossad secret service caught red-handed during a bungled wiretap attempt in Switzerland in 1998. Deputy Federal Prosecutor Felix Baenziger called the action a serious violation of Swiss sovereignty and asked the Federal Court, Switzerland's highest, to fine the agent 5,000 Swiss francs ($3,090) and ban him from the country for 10 years. Baenziger asked the five-judge panel to find the spy, who has identified himself only by the code name Issac Bental, guilty of illegal actions for a foreign state, political espionage and falsification of identity documents. Defence attorneys for the 46-year-old spy, who has acknowledged his role in the botched eavesdropping operation, asked for acquittal, arguing their client acted to protect the vital interests of Israel. Bental himself, who had the right to make a statement to the court after his defence lawyers, chose to remain silent. Bental and four accomplices were caught in and outside an apartment building near the capital Berne in February 1998 while trying to tap the phone of a naturalised Lebanese-born car dealer who Mossad thought had links with Hizbollah Islamic guerrillas. Police later released the others, but held Bental when he failed to explain what he was doing with a suitcase full of electronic gear in the cellar of a private residence. Israel paid bail of three million Swiss francs and apologized, and Bental was allowed to leave the country in April 1998 on condition he return to stand trial. Political espionage is punishable by up to four years in jail, but legal experts have said the agent faces a lesser sentence, possibly suspended, which would reflect the diplomatic sensitivities of the case. The court will hand down its sentence on Friday. Some Mossad agents were reported by Israel radio on Wednesday to be threatening to refuse further missions in protest against Bental being sent to stand trial in Switzerland. ($1=1.618 Swiss Franc) =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 773 From: Miguel Puchol Date: Wed Jul 5, 2000 5:20pm Subject: RE: Various Subjects Hi all, > Just the other day a prospective client asked me if it was possible to > intercept fax or e-mail communications and read them. Apparently > they asked > their 'security company' who told them that it was impossible to intercept > fax and e-mail transmissions. So perhaps a question for the FAQ list could > be: "Can fax messages be intercepted?" Yes. I've seen a combination of hardware/software system intercept faxes sent via Inmarsat (in A mode) - so same could be done in telephone lines. I'll dig out a couple of URLs of companies making 'fax-testing tools'... Cheers, Mike 774 From: Dr. Pepper Date: Thu Jul 6, 2000 8:54am Subject: Re: (was) Various Subjects (now) Video monitoring I'm just a newbie to this list here in Californbia, USA, but the question asked below is, I think, quite obvious! YES! It can be intercepted and read. ANYTHING can be intercepted and read! Fax and email are very simple to intercept. The question of video interception is another story, but yes, it also, can be intercepted. I am presently seting up a video montoring system for use in my office, and to sell as a complete system for others that may need this service. My question is: Is there anyone out there using video moinitoring, who would they like to compare and discuss these things with me? I really need to talk to someone who is more experienced with these systems who would share their thoughts. Thanx Ron Cheshire, ACI Engineering, Ridgecrest, CA DrPepper@i... ================================================== Mike Dever wrote: > James and other members of the group, > > 1. Covert Video Surveillance: > > There has been some recent discussion about the legality of covert video > surveillance. > > All Australian jurisdictions (federal, state and territory) have existing > laws prohibiting the manufacture, sale, possession, use, etc of 'listening > devices' however the law has been silent about video or optical surveillance > until recently. At least one state here in Australia (Victoria) has enacted > legislation prohibiting covert video surveillance without a warrant from a > court. The Victorian legislation is called the 'Surveillance Devices Act, > 1999' and is available at http://www.dms.dpc.vic.gov.au/sb/index.html. > > It is expected that all Australian states and territories will soon have > similar legislation. > > 2. Detection of IR Emitting devices: > > In addition to the Watec Model WAT-902A, the Ikegami ICD-42 series > monochrome cameras also have a very good IR response. The spectral response > of the ICD43E for example extends to beyond 1100nm (without the IR cut > filter) > > 3. Bug Sweep FAQ 2000 > > Just the other day a prospective client asked me if it was possible to > intercept fax or e-mail communications and read them. Apparently they asked > their 'security company' who told them that it was impossible to intercept > fax and e-mail transmissions. So perhaps a question for the FAQ list could > be: "Can fax messages be intercepted?" > > Regards > Michael J. Dever CPP > Senior Engineer > Dever Clark & Associates > Canberra > Australia > Telephone: +6254 5337 > Telefax: +6278 4020 > E-mail: deverclark@b... > > ------------------------------------------------------------------------ > Who invented Gatorade -- and what part did it play in > winning the1967 Orange Bowl? Find out the true facts at > http://click.egroups.com/1/6212/1/_/507420/_/962834502/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- - - - Dr Pepper, aka Ron Cheshire, WB6GKI, 3537.26N/11740.02W China Lake, CA USA 90 miles West of Death Valley, 200 miles North of LAX - - - 775 From: Doug Ellsworth Date: Thu Jul 6, 2000 2:31pm Subject: Re: Request for assistance Jim and Group: I am posting this as a favor to an associated company (PRC, Inc.) who has been tasked with updating one or their client's corporate information security policy. The way their client wants to approach this task is to review a number of corporate security policies, especially in the Fortune 500 arena, as a basis for their revised document. This message is to request help in obtaining such policy statements. I know this is unusual request, but PRC does little work in the commercial arena, working almost exclusively with specific U.S. government agencies worldwide. If any in the group have contacts that would be willing to share an anonymous policy statement please let me know. PRC Inc. will promise non-disclosure, and sanitize. Their next meeting with their client (in the Reston, VA area) will be tomorrow. I once had a link (since lost) to a site that provided a CD (for about $500) that contained anonymous examples for site security policies. This would be helpful if any of the group can point us to this site. Thank you all. -Doug Doug Ellsworth Secure Communications Corporation, Inc. Phone: 402.578.7709 Email: do5ug@r... 776 From: James M. Atkinson, Comm-Eng Date: Thu Jul 6, 2000 3:31pm Subject: Mossad Hot Over Spy Left Out To Dry Mossad Hot Over Spy Left Out To Dry http://www.nypostonline.com/news/7285.htm By Andy Geller Mossad agents are threatening to refuse missions in protest of Israel's decision to hand over an operative of the spy agency to Switzerland. The agent, under the alias Isaac Bental, is on trial in Lausanne on spying and wiretapping charges. He was nabbed in February 1988, installing a bug in an apartment in the Swiss capital, Berne. Mossad agents told Israeli Radio yesterday they are "angry and greatly frustrated" that Bental was handed over. In addition to spying and wiretapping, Bental also faces charges of entering the country using papers with false names and carrying out illegal acts for a foreign state. The operation's target was Abdallah el-Zein, a Swiss citizen of Lebanese descent who manages an Islamic center in Berne. Cops caught Bental and four colleagues installing the bugging equipment in the basement of el-Zein's apartment building after residents reported strange noises. Only Bental was arrested, because he was holding a bag with tools to install the wiretap. On the second day of the trial yesterday, his lawyers probed for links between el-Zein and terrorist masters in Lebanon and Iran. But a Swiss police expert testified that investigators were unable to connect the center to Hezbollah, the Iranian-backed terrorist group. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 777 From: James M. Atkinson, Comm-Eng Date: Thu Jul 6, 2000 3:33pm Subject: PM rejects claim by Mossad agents that gov't abandoned them Thursday, July 6 2000 15:25 3 Tammuz 5760 PM rejects claim by Mossad agents that gov't abandoned them http://www.jpost.com/Editions/2000/07/06/News/News.9259.html By Jerusalem Post Staff and News Agencies JERUSALEM (July 6) - The Prime Minister's Office yesterday said it gave "full support" to the Mossad and its director, rejecting criticism by Mossad agents that the government had turned its back on the service by sending an agent to stand trial in Switzerland for a bungled wire-tap attempt on a Hizbullah member. A security source said the government could not renege on its pledge to send the agent to Switzerland for the trial, which began on Monday. Israel Radio reported yesterday that some Mossad agents were considering a boycott of future missions in protest. The radio said Mossad agents were "angry and greatly frustrated" over the return to Switzerland of the agent, who is travelling under the alias "David Bental," calling it a "complete lack of backing." In 1998 the agent was caught in the basement of an apartment house near the Swiss capital of Bern trying to tap the phone of a naturalized Lebanese-born car dealer suspected of having links to Hizbullah. Apart from wiretapping, the charges against the agent include entering the country using genuine papers with false names, political espionage and carrying out illegal acts for a foreign state. The radio reported that Mossad director Ephraim Halevy had been informed of the agent's operations in advance. It said Mossad agents were also frustrated over what they said was a drop in the number of operations and the rejection of many planned missions by Prime Minister Ehud Barak, the radio reported. Barak has to approve any Mossad operations. The incident in Switzerland was one of a series of bungled operations in recent years to tarnish the once vaunted image of Mossad. In 1997 the agency failed in an attempt to assassinate the head of Hamas in Jordan, leading to tension between Jordan and Israel three years after they signed a peace deal. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 778 From: James M. Atkinson, Comm-Eng Date: Thu Jul 6, 2000 3:36pm Subject: Swiss Mossad Trial Nears End Swiss Mossad Trial Nears End http://www.worldnews.com/?action=display&article=2607774&template=worl dnews/search.txt&index=recent LAUSANNE, Switzerland (AP) - The Swiss government on Thursday asked a court to sentence an Israeli spy to 15 months in prison in a case that reportedly has caused unrest in the ranks of Mossad agents in Israel. The agent being tried under the pseudonym Issac Bental had participated knowingly in an illegal attempt to wiretap a Swiss-Lebanese citizen whom Israel suspected of supporting terrorist acts, but for which there was no proof, Deputy Federal Prosecutor Felix Baenziger said in closing arguments. ``The case presented falls far short of being an emergency situation,'' said Baenziger. ``Immediate danger ... cannot be seen here with all respect to the fears of the Israeli population of terrorist attacks.'' Bental's lawyer was to present his case later Thursday. The court is to rule Friday. Israel radio reported Wednesday that Mossad agents, angry that one of their own had to return to face public trial in Switzerland, were refusing to go on overseas missions. The agents accuse the Israeli government of failing to stand by operatives in the field when they get into trouble. However, Deputy Defense Minister Ephraim Sneh insisted the government is giving its full support to the agency. ``There is no problem of political backing for the Mossad,'' Sneh told Israel radio. Although other Mossad agents have been arrested abroad and even tried, the Swiss procedure has exposed Bental to unusual scrutiny. Swiss prosecutors and the five-judge panel of the Federal Criminal Court allowed Bental to continue hiding his true identity - even from them - on grounds that revealing it could endanger his life. They also have refrained from pressing him for answers about Mossad operations beyond what they already know about his failed mission. But the defendant has been required to sit on the bench next to his Swiss lawyers, where he can be seen by court spectators. His comments are translated from Hebrew into German for the court. Four Israeli diplomats sit behind him for moral support. The lawyers and judges have gone over the details of his two trips to Switzerland in 1998, when he was caught with four other agents installing a wiretap. The operation was to set up equipment to record conversations on the telephone of a Swiss-Lebanese man whom Mossad suspected of supporting terrorist acts by the anti-Israeli organization Hezbollah. It was foiled after a woman living in an apartment in the building called police because she heard strange noises after midnight. The other agents - two men and two women - were questioned and released, but Bental was jailed for more than two months because he was carrying a bag with tools to install the equipment. Bental was released on bail of $2 million two years ago on the assurances of the Israeli government that he would return to face trial. Bental's chief lawyer has been asking questions suggesting links between the man, Abdallah el-Zein, and terrorist masters in Lebanon and Iran. El-Zein, a Lebanese-born car dealer who obtained Swiss citizenship by marriage, ran an Ahl El-Beit center, part of an international chain that promotes adherence to Shiite Islam. But a Swiss police expert said investigators had been unable to prove that the worldwide Ahl El-Beit network were connected to Hezbollah, the Iranian-backed Shiite Muslim guerrilla group that led the fight against Israeli occupation of southern Lebanon. Bental said each of the three charges against him was true - that he acted illegally for a foreign country, conducted political espionage and repeatedly used false foreign identity documents. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 779 From: James M. Atkinson, Comm-Eng Date: Thu Jul 6, 2000 3:56pm Subject: RE: Research Electronics Equipment Do you have a part number for the insulated antenna? -jma At 9:02 AM -0500 7/5/00, Thomas H. Jones wrote: >When we first developed the CPM, we knew that ESD would be a problem if >care is not taken to avoid the problem. We could have added additional >circuitry to address the issue, but this would have lowered the sensitivity >of the unit. However, about three years ago we modified the design of the >CPM probe antenna to meet CE mark requirements, and now we offer two >versions of the probe. The normal version is unchanged, the new version has >an antenna that is basically rubber coated to protect against ESD. There is >slight loss in performance with the new antenna, and for this reason, we >usually do not ship this version unless requested. But, most people find >the performance more than adequate for a broadband receiver. If you would >like this new probe, please contact us directly. > >Best Regards, >Tom Jones >General Manager REI > > > >-----Original Message----- >From:A Grudko [SMTP:agrudko@i...] >Sent:Wednesday, July 05, 2000 8:16 AM >To:TSCM-L@egroups.com >Subject:Re: [TSCM-L] Research Electronics Equipment > >----- Original Message ----- > > The OSCOR and CPM-700 make an excellent package to get started with, > > and we have had really good luck with them. > >I'm also very happy with the CPM-700 except that it is prown to blowing the >first stage transistor in the RF probe if you touch a metal object and >there >is a static discharge. We have blown 3 that way. > >Our winters are very dry and some carpet/shoe friction combinations cause >serious discharges - you can see the spark even in daylight. We tell our >technicians to touch metal frequently to discharge and obviously try to >keep >the probe away from any conducting surface, but.... > >Taking shoes off helps but looks weird to the client. We tried a computer >tech.'s wristband with a long cable to earth but that has it's own >disadvantages - one blow-out was 'cos the tech. didn't realised he'd pulled >the cable out by stepping on it and touched a metal filing cabinette. Well >that's his story. > >I don't have the same problem with the Scanlock. I can only think of >re-fitting the probe's PCB into a bigger box with BNC m & f's, add some >static protection and make up a strip of veroboard straight through the >neat >little CPM probe to the antenna. Any better suggestions? > > >Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime >investigation & intelligence >Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - >Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 >9673 - 465 1487 (Fax) - Est. 1981 >GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA >Chairman), CITTF, >UKPIN, AFIO (OS), IWWL, PRETrust "When you need it done right - first >time" ICQ 78711262 =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== 780 From: Gordon Mitchell Date: Thu Jul 6, 2000 4:13pm Subject: Re: Re: Request for assistance Unfortunately they have put you in an impossible position. The word "policy" is tightly bound to the word "procedure" which has people implications. Simply stated, a written document that comes over the wire is as worthless as the best selling books listing security survey questions. Anyone who does policy has to have a broad capability, direct contact with the strategic folks in the company, time to find out how policy will be implemented and time to live in the corporate culture. Anything short of this will simply become an effort that bounces off the bureaucracy. These folks need someone who has made the mistakes before (called experience) and can learn about the company by being there. Any written material that comes in to inexperienced folks is bound to fail. Gordon Mitchell Future Focus, Inc Woodinville, WA (888) BUG-KILR Electronic eavesdropping detection & finding clues in computers. Doug Ellsworth wrote: > Jim and Group: > > I am posting this as a favor to an associated company (PRC, Inc.) who has > been tasked with updating one or their client's corporate information > security policy. The way their client wants to approach this task is to > review a number of corporate security policies, especially in the Fortune > 500 arena, as a basis for their revised document. This message is to > request help in obtaining such policy statements. > > I know this is unusual request, but PRC does little work in the commercial > arena, working almost exclusively with specific U.S. government agencies > worldwide. If any in the group have contacts that would be willing to share > an anonymous policy statement please let me know. PRC Inc. will promise > non-disclosure, and sanitize. Their next meeting with their client (in the > Reston, VA area) will be tomorrow. > > I once had a link (since lost) to a site that provided a CD (for about $500) > that contained anonymous examples for site security policies. This would be > helpful if any of the group can point us to this site. > > Thank you all. > > -Doug > > Doug Ellsworth > Secure Communications Corporation, Inc. > Phone: 402.578.7709 > Email: do5ug@r... > > ------------------------------------------------------------------------ > Life's too short to send boring email. Let SuperSig come to the rescue. > http://click.egroups.com/1/6137/1/_/507420/_/962915235/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 781 From: James M. Atkinson, Comm-Eng Date: Thu Jul 6, 2000 5:20pm Subject: Fwd: Re: Re: Request for assistance >X-From_: sendmail Thu Jul 6 17:52:22 2000 >X-Sender: jkg@2... >Date: Thu, 06 Jul 2000 17:49:49 -0500 >To: jmatk@tscm.com >From: James Goldston >Subject: Re: [TSCM-L] Re: Request for assistance > >Jim, could you please post this? The note bounced from TSCM-L@egroups.com. > Guess I need to sign up my new email address to be able to submit. I'll >try to resubscribe tomorrow. In the meantime, if you have the time, >perhaps you would not mind posting so Doug can get some responses. If not, >never mind. > >Thank you, >James > >=-=-=-=-= >Hey Doug, > >You must be referring to Cresson Wood's $500 book. See >www.baselinesoft.com. You may find it useful, but, alone, it is not >sufficient as a policy reference text. At one time, we had hoped to use it >to assist in the development of commercial firm's security policies (we >have done much gov't policy work, even some with PRC), but found it to be >not very helpful. We corresponded with Baseline providing feedback on two >versions of the book and even investigated reselling it, but decided >against it. > >I will be quite surprised if you get much response from your request for >other firm's security policies. These documents come about only as a >result of very much hard work. Our firm does not provide such information >free but would be willing to speak with your associate and respond to an RFQ. > >I would note that there is a quite a range of policy, procedures, metrics, >etc. that an organization must address to span the gamut from the >high-level, corporate, short CIO-driven policies to mid-mgmt, user, >sysdmin, etc. level. Policies may take many forms, including network-, >system-, application-, user-centric, etc. As an FYI, your request is not >unusual. Anyway, there's a few thoughts. > >Have a nice day, >James > > >At 12:31 PM 7/6/00 -0700, Doug Ellsworth wrote: > >Jim and Group: > > > >I am posting this as a favor to an associated company (PRC, Inc.) who has > >been tasked with updating one or their client's corporate information > >security policy. The way their client wants to approach this task is to > >review a number of corporate security policies, especially in the Fortune > >500 arena, as a basis for their revised document. This message is to > >request help in obtaining such policy statements. > > > >I know this is unusual request, but PRC does little work in the commercial > >arena, working almost exclusively with specific U.S. government agencies > >worldwide. If any in the group have contacts that would be willing to share > >an anonymous policy statement please let me know. PRC Inc. will promise > >non-disclosure, and sanitize. Their next meeting with their client (in the > >Reston, VA area) will be tomorrow. > > > >I once had a link (since lost) to a site that provided a CD (for about $500) > >that contained anonymous examples for site security policies. This would be > >helpful if any of the group can point us to this site. > > > >Thank you all. > > > > > >-Doug =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== From: Aimee Farr Date: Wed Jul 4, 2001 0:33pm Subject: Anarchists and anti-capitalists = infobunkers http://news.independent.co.uk/digital/update/story.jsp?story=77374 Top firms retreat into bunker to ward off anarchists By Steve Boggan 11 June 2001 Some of Britain's biggest companies are running their internet operations on systems installed in a 300ft-deep nuclear blast-proof bunker to protect customers from violent anti-capitalist campaigners. They are renting space in hermetically sealed rooms capable of withstanding a one Kiloton explosion, electro-magnetic "pulse bombs", electronic eavesdropping and chemical and biological warfare. Hundreds of companies have already installed systems in The Bunker ≠ formerly known as RAF Ash, outside Sandwich in Kent ≠ and dozens more are understood to be queuing up for space. They have been driven underground by the IRA bombings of Canary Wharf and Bishopsgate in London and, increasingly, by concerns over the operations of anarchists behind sophisticated protests such as the May Day anti-capitalist rallies. At stake is billions of pounds worth of business conducted over the internet. Companies are concerned that while electronic security ≠ using increasingly sophisticated encryption codes ≠ is gradually making customers feel more confident about conducting credit-card transactions over the internet, the physical side of e-business is still vulnerable. The fear is that servers, the small electronic boxes through which customer traffic and business transactions on the web are channelled, could be physically vulnerable to theft, damage or sabotage. For companies conducting business solely over the internet, the loss of a server could be catastrophic; while offline there can be no sales and no income, and customers will go elsewhere. Records, too, are vulnerable to attack, hacking or simple damage, resulting in shut-downs that could cost even traditional companies millions of pounds. Now organisations such as Scottish Widows, BTCellnet, Richer Sounds and the Bank Automated Clearance System ≠ which deals with inter-bank transactions ≠ have acted, putting their e-business and confidential dealings out of harm's way behind guards, barbed wire, dogs, electronic detection systems, millions of tons of earth, 4m of concrete, pressurised air locks and rows of steel doors up to 18in thick. "This isn't paranoia or fantasy, this is the future," said Dr Ian Angell, professor of information systems at the London School of Economics and author of The New Barbarian Manifesto. "There are sophisticated anti-capitalists out there who feel a great deal of resentment against the business world. These are the new Luddites and, given half a chance, they would smash the machine to pieces." [...] New Barbarian Manifesto (I'm a dabbling futurist.) http://www.fastcompany.com/online/39/ifaqs.html http://www.businessknowhow.com/career/barbarian.htm ] *makes mental note: never say, "this isn't paranoia or fantasy...." Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR Waco, Texas 3303 From: A Grudko Date: Wed Jul 4, 2001 1:49pm Subject: AOR AR8600 ----- Original Message ----- AOR AR5000 vs Icom R8500? Coincidental to the posts I read here yesterday on these 2 receivers, I looked at the AOR AR8600 today as a possible replacement for my ageing Kenwood RZ1. When I do a sweep I usually first spend about half an hour (depending on the building size, access, security, safety etc.) on the outside driving around with my Fairmate running on known bug frequencies and my Scanlock just running, into 2 mag mount antennas (I don't have a van - my BMW is my work horse!). My Optronics Explorer runs on a 20" whip for later download into my laptop. My telco technician mans the equipment (saves on fender-bender costs). I like the look of the 8600 and especially it's transportability. The specs. are impressive (if one can believe specs.). I played with it for a few minutes and liked a few things: * the controls - I'm a big guy (6'2", 200 lbs) with big fingers and don't have a left hand, so miniaturisation of controls, such as on pocket scanners, becomes a disadvantage * the logical, intuitive operation (unlike my blooming Fairmate!) * the (10 meg) band scope - a mini spectrum analyser with a 'save trace' function for then/later examining interesting spikes * the 10.7 meg i.f. output to their external spectrum display - AOR SDU5500 (I don't have specs.) - is this a budget SA? * the RS232 interface * the high scan/search rates - 37 increments/sec * the unusual modes * the voice inversion card It's a pity these types of receivers usually don't demodulate at least standard TV formats (part of the reason I was interested in the Icom IC-R3) although my ancient RZ1 does have NTSC video out. So, do I retire my RZ1 to my shack, monitoring my neighbours' cordless phones in favour of the 8600? Andy Grudko. D.P.M., Grad I.S, (S.A.) Grudko Associates - Crime investigation, intelligence and protection Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SAMLF, SCIP (Past SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom, IPA- "When you need it done right - first time" 3304 From: Nick Robson Date: Wed Jul 4, 2001 4:53pm Subject: Re: Oh No! Not again!! --(Off Topic) What has also allegedly happened as a result of one of these scams some years ago was that a businessman from England went to one of these African countries to meet with the contact and ended up murdered. Nick Robson, C.S.C.M. 3305 From: Ryan Huggins Date: Wed Jul 4, 2001 4:10pm Subject: Re: Oh No! Not again!! --(Off Topic) Along those lines, I got one today proclaiming to be from the FBI and asking for personal information. I forwarded it to my local FBI office. This was sent as HTML with the official logo from the FBI's website, and a nice form to fill out and submit. Thought I'd throw in my 2 cents. Ryan Huggins // Your application is approved. Please fillout this form to confirm your identity : First name : MI : Last Name : Address : City : State : Zip : Phone : Credit Card # : Exp.Date : CVV2 : Your informations will be encrypted before sending. A field Agent will contact you after verification. Thank you. Click on the link below to remove yourself via your web browser (which should launch automatically) http://www.autoresponderz.com/cgi-bin/maxuseradmin.cgi?function=manualdelete 3&email=mars_g@p...&un=Application2 A confirmation screen will show that your email was deleted. In case the browser doesn't start or doesn't show the correct information, select the whole URL line (or lines if it is presented over more than one line) with your mouse, cut and paste it into your browser's address bar and hit enter from there. 3306 From: Miguel Puchol Date: Thu Jul 5, 2001 3:52am Subject: RE: Re: Oh No! Not again!! --(Off Topic) That's got to be the dumbest attempt at a scam! Even more dumb than the Nigerian letter... What is it you (supposedly) applied for, that needs a credit card? Souvenir FBI coffee mugs? I suppose the field agent will call you to bring them personally, with their compliments... Oh the internet can be so much fun sometimes :-) All the best, Mike > -----Mensaje original----- > De: Ryan Huggins [mailto:RyanHuggins@P...] > Enviado el: miercoles, 04 de julio de 2001 23:10 > Para: TSCM-L@yahoogroups.com > Asunto: [TSCM-L] Re: Oh No! Not again!! --(Off Topic) > > > Along those lines, I got one today proclaiming to be from the FBI > and asking > for personal information. I forwarded it to my local FBI office. > This was > sent as HTML with the official logo from the FBI's website, and a > nice form > to fill out and submit. > > > Thought I'd throw in my 2 cents. > > Ryan Huggins > > > > // > > Your application is approved. > > Please fillout this form to confirm your identity : > > First name : MI : Last Name : > > Address : > > City : State : Zip : > > Phone : Credit Card # : > > Exp.Date : CVV2 : > > > > Your informations will be encrypted before sending. > > A field Agent will contact you after verification. > > Thank you. > > > Click on the link below to remove yourself via your web browser (which > should launch automatically) > http://www.autoresponderz.com/cgi-bin/maxuseradmin.cgi?function=ma nualdelete 3&email=mars_g@p...&un=Application2 A confirmation screen will show that your email was deleted. In case the browser doesn't start or doesn't show the correct information, select the whole URL line (or lines if it is presented over more than one line) with your mouse, cut and paste it into your browser's address bar and hit enter from there. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3307 From: James M. Atkinson, Comm-Eng Date: Thu Jul 5, 2001 11:31am Subject: United States Patent #5,454,037 - Pacella - September 26, 1995 United States Patent #5,454,037 - Pacella - September 26, 1995 ------------------------------------------------------------------------ Portable secure-telephone communications module Abstract A portable secure-telephone communications module including a collapsible enclosure for holding a person desiring to perform secure remote telephone communications, a secure telephone remote communication device in the enclosure, and RF shielding for the enclosure to inhibit RF leakage for preventing eavesdropping from outside the enclosure. ------------------------------------------------------------------------ Inventors:Pacella; Angelo M. (Annandale, VA) Assignee:Grayline International Limited (Annandale, VA) Appl. No.:144250 Filed:October 28, 1993 [Related patent data and claims omitted] ------------------------------------------------------------------------ Description ------------------------------------------------------------------------ FIELD OF INVENTION This invention relates to a portable secure communications module that provides for truly secure remote communications from an easily portable location. BACKGROUND OF INVENTION For many years there has been much effort made to maintain the confidentiality of conversations between parties over telecommunications equipment. Conversations that are carried out on telephonic equipment are particularly vulnerable to eavesdropping, as the eavesdropper has a number of options that may be used to intercept voice audio from the telephone conversation. One option is to penetrate the telephone circuit between the telephone instrument and the telephone company switching office; there exist a wide variety of eavesdropping devices that can be connected to the telephone circuit for monitoring the conversation. To meet this eavesdropping threat, there have been developed a number of types of telephone voice encryption devices that digitally encode the voice before transmission and decode at the receiving end; for example, units that utilize high-grade algorithms, such as U.S. Data Encryption Standard (DES) and proprietary algorithms, preferably in conjunction with RSA Public Key Technology (RSA Data Security, Inc., Redwood City, Calif.), such as the Motorola, Inc., Government Electronics Group (Scottsdale, Ariz.) SECTEL series, or unique systems such as the U.S. government STU-III. In most cases, commercial telephone encryption equipment cannot provide total voice security due to the eventual breakdown of intercepted data, but remains the equipment of choice for use on telephone lines when the conversational content is sensitive in nature. Whatever security provided by telephone encryption equipment, however, is cancelled if the eavesdropper has targeted the room that contains the secure telephone equipment. Although such eavesdropping will only provide one side of a conversation, that may be sufficient to provide the intelligence needed to accomplish the mission at hand. Accordingly, there has been much effort directed toward protecting the room or area containing the telephone equipment from eavesdropping. An eavesdropping method commonly used is to intercept the room audio and transmit it with a radio frequency transmitter planted in the room, in a person's clothing, or in a small object that a person would use--such as a pen or pocket calculator. Other methods of intercepting room audio use carrier current devices attached to existing building AC wiring; such systems transmit converted room audio to a compatible remote receiver. A concealed, hard wired microphone is another method. Laser monitoring systems which may be located in a nearby building utilize an invisible laser beam to monitor either an object in the room or a room window which may be emulating room audio. Another method exists that utilizes remotely generated microwave RF frequencies and a concealed, passive cavity device in the target area. Devices operating in the near-infrared (IR) range deliver modulation via non-visible light waves and may be intercepted through target room windows using specialized receiving equipment from considerable distances. All of these methods depend on delivery from the target room of a modulated signal that is transformed back into an audio signal at a remote location, commonly known as a listening post (LP). A highly sophisticated method of eavesdropping is to monitor RF and low frequency magnetic emissions that may emanate directly from internal circuit components of a particular device. The study of such emanations is known in security circles as "tempest". In the case of a secure telephone instrument, it is possible to intercept emissions radiated from internal circuit boards in clear voice, prior to electronic encryption processing, thereby compromising user voice security during a secure telephone conversation. Tempest emanations are very limited in range. However, this near-field radiation is a security threat in instances where the eavesdropper is highly skilled, equipped with specialized receiving equipment, and able to occupy an area in close proximity to the target instrument. Tempest emissions can also induce signals into nearby electronic equipment and miscellaneous area wiring, and by this means travel to various remote points where signals can be intercepted. Some manufacturers of security equipment, including secure voice equipment, offer tempest-protected versions of their products; such devices are oftentimes protected by RF filtering and enclosing specific internal components, or the entire device, in metallic, RF shielding material. Similar telephonic devices may be tempest certified in accordance with U.S. government established standards, for example, the GE STU III manufactured by GE Government Communications Systems Division (Camden, N.J.) or the STU III by Motorola Inc. (Schaumberg, Ill.). Another method is to place an entire device in a small RF shielded enclosure. Quality enclosures will provide tempest protection to specifications exceeding -100 dB (20 KHz>1 GHz). It is also possible for expert lip reading personnel to obtain conversational information using telescopic instruments to directly monitor persons in the room. The utilization of a lip reader, although extremely rare, should not be discounted by the security practitioner. There are a number of available countermeasures for the protection of room audio. The room or area containing the telephonic equipment may be alarmed and guarded. Also, technical experts can be used to perform technical surveillance countermeasures sweeps (TSCM). Such sweeps, however, afford only short-lived security and cannot be guaranteed due to their technical limitations, the difficulty of performing an exhaustive sweep, and the eavesdropper's possible awareness of the scheduled sweep and subsequent temporary removal or remote deactivation of the listening device. This drawback may be overcome to some extent by installing in the area RF spectrum detection equipment that continuously monitors for extraneous radio signals. Even these systems, however, are ineffective against wired devices such as a microphone with concealed wiring, previously described near-infrared devices, external laser systems, and certain highly sophisticated frequency hopping RF transmitters. Room audio may also be masked with audible noises designed to constantly modulate, at voice range frequencies, microphone elements or specific surfaces such as walls that may have listening devices planted on the other side, and windows to prevent laser interception. Noise systems of this type use speakers for general noise distribution and mountable transducers for specific surface protection. One type of noise generated by these systems is known as "white noise" (a static sound with energy spread evenly throughout the frequency range of human speech), or music may be generated, or a sound known as "babel". Babel is a precision mixture of human voices or synthetic voice sounds, recorded on magnetic tape, on optical disk or may be generated from a chip, and is considered to be an effective masking sound. Babel sounds would be most effective if the frequency profile of the babel sounds closely matched the frequency profile of the person speaking. Such an effect may be accomplished by utilizing electronic equipment designed to constantly sample a person's voice. For example, a person's voice frequency range may be used to control the capstan-drive motor speed on a magnetic tape player, affecting tape playback speed, and continuously adjusting the pitch of prerecorded babel sounds generated by the masking system speakers as different system users speak into a dual-purpose communications/voice sampling microphone during secure telecommunications. A system such as this would be highly effective for masking voice audio. Variations of masking sound generators such as single channel and multiple channel with mixers that generate random, non-stationary masking noises, will also protect room conversation from the eavesdropper but may not be as effective as babel if the eavesdropper has utilized phased array microphones, adaptive filters, or is equipped with sophisticated computer equipment designed to isolate and separate (subtract) masking sounds from actual voice sounds of intercepted audio. All audible masking systems, however, may add noticeably to the noise level in the room and would make listening to a telephone especially difficult; and in any case above, it is imperative that the volume level of masking sounds exceed the room conversation volume level in order to protect room conversations from eavesdropping. Other versions of masking systems exist that are somewhat effective. One magnetic jamming system utilizes large coils to induce microphone elements or nearby electronics with electro-magnetic masking frequencies. Another ultrasonic system affects microphone elements with inaudible sound waves. Shortcomings of these systems are the size of the magnetic coils, inability to affect all microphone types, complexity of installation, and complaints of nausea by people exposed to powerful ultrasound. The preferable option for preventing RF transmissions from the room containing the secure telecommunications equipment is to shield the area with grounded metal mesh, foil, or purchase a walk-in RF shielded enclosure system. RF enclosures are constructed as a room within a room that allow for easy inspection of all surfaces of the enclosure. Some of these enclosures are fully soundproofed as well and require no masking equipment. Installing such sealed enclosures, however, is very expensive, and restricts the user to that specific area. The room that contains the RF shielded enclosure is usually referred to as the parent-room. SUMMARY OF INVENTION It is therefore an object of this invention to provide a portable secure communications module that provides for high security telecommunications virtually anywhere. It is a further object of this invention to provide such a device that provides a high level of security for individuals with no technical security training. It is a further object of this invention to provide such a device that is has electronic means for self protection to prevent unauthorized tampering when stored or when opened and unattended. It is a further object of this invention to provide such a device that accomplishes total telecommunications security at a reasonable cost. It is a further object of this invention to provide such a device that accomplishes telecommunications security without the need for continuous, expensive, technical surveillance countermeasure sweeps to ensure audio security during secure communications. It is a further object of this invention to provide such a device that requires only one person to rapidly set up the equipment for use. This invention results from the realization that truly effective secure telephone communications may be inexpensively accomplished by providing a portable, collapsible enclosure that is RF and IR shielded and contains secure remote telephone communications equipment such as a digital encryption telephone. This invention consists essentially of a portable secure communications module that includes a collapsible enclosure for holding a person desiring to perform secure remote communications with a secure remote telephone communication device in the enclosure along with means for sealing the enclosure to inhibit RF leakage to prevent eavesdropping from outside the enclosure. Preferably, the enclosure includes a collapsing frame which may include pantograph wall members with a rigid base and top member at the ends of the frame in which the frame folds into at least one of the base and top members so that, when collapsed, the entire unit is the size of the base and top members put together. In that case, there may further be included means for fastening together the base and top members when the enclosure is collapsed to form an easy-to-move unit. Handles and wheels on the unit may also be provided so that the module may be easily moved when collapsed. The enclosure preferably includes an automatically collapsible seat, automatically folding instrument cluster and writing surface for the user, as well as internal lighting. The enclosure may be RF shielded with a metallic substance that is preferably in the cover and also in the base and top member, such as metallized rip-stop nylon substrate, metal foil or metal screening. The frame covering is preferably flexible so that it collapses with the frame so that it does not have to be removed from the module. Preferably, the cover is opaque to prevent the passage of non-visible light energy and to prevent visual eavesdropping. The audio masking system may also include means for preventing remote, hostile laser systems from receiving intelligence via audio-based vibrations caused by the user's voice and affecting the module enclosure covering. This may be accomplished by transmitting into the cover, base and top cabinet sections, broad band noise spread evenly over the frequency range of the human voice. There may also be included means for projecting noise from the enclosure into the parent room to mask the voice leakage from the enclosure. This noise may be recorded or synthetic babel or other suitable non-stationary masking sounds. Preferably, the noise is projected when the person is speaking to make it easier for the user to hear conversations over the secure communication device. The level of masking noise projected from the enclosure is preferably automatically adjusted as the user inside the enclosure speaks into the telephone equipment. Module utility penetration points are secure from RF leakage by including RFI/EMI filters for electrical and telephone lines that enter the enclosure.The enclosure preferably is ventilated by one or more ventilation fans in combination with honeycomb waveguide, RF shielded external air-conveying openings to prevent RF leakage. Preferably, the ventilation system operates automatically as the user sits on the module seat. The system may further include a video camera for external monitoring from the module along with means for directing the video camera view to allow surveillance under the control of the module user. The module may include a sound-absorbing material covering a portion of the enclosure interior, for example cloth, carpeting, or professional sound absorbing material, for inhibiting leakage of sound from the module interior. There may further be included photosensitive means such as photo detectors for detecting light on the enclosure outside to determine when an enclosure dark storage area has been compromised. There may also be included wireless communication means for offsite signalling of the module status. Still further, there may be motion detection means such as a passive infrared detector (PIR) which communicates with the enclosure outside for detecting motion in the area outside the module, particularly useful for when the module is open and unattended to determine if someone such as an intruder has entered the room in which the module is stored. There may be included in the flexible module cover one or more metallic zippers electrically communicating with the metallic substance in the cover for providing an RF shielded opening in the flexible cover for the user to enter and exit the module. The module may further include an external signal beacon for indicating when the module is in use and some means for testing for RF leakage from the shielded enclosure and one or more module tamper alarms that may be activated when the enclosure is collapsed to deter enclosure tampering when it is stored. The module also contains a sophisticated security system that operates in conjunction with the PIR unit stated above for protecting the unattended parent room. The system utilizes internal, automatic switching devices that select the proper security mode as the user opens the module--off premise; slow scan video monitoring of the parent room is also available when the module is open. DISCLOSURE OF PREFERRED EMBODIMENTS Other objects, features and advantages will occur to those skilled in the art from the following description of a preferred embodiment and the accompanying drawings in which: FIG. 1 is an axonometric view of a portable secure telephone communications module according to this invention in the closed position ready to betransported; FIG. 2 is a view of the module of FIG. 1 with the module cover being placed thereon; FIG. 3 is a side view, partially broken away, of the module of FIG. 1; FIG. 4A is a front view of the module of FIG. 1 being opened; FIG. 4B is a front view of the module of FIG. 1 in the open position; FIG. 4C is a similar view showing a person in the open module, with the zippered entrance flap open; FIG. 5A is a schematic side elevational view of the automatic folding seat of the module of FIG. 1 in the upright position; FIGS. 5B and 5C are views of the seat assembly of FIG. 5A in the partially collapsed and fully collapsed position, respectively; FIG. 6A is a top view of the assembly of FIG. 5A; FIG. 6B is a view of the systems option-selecting dip switches and fuse board layout of FIG. 6A; FIGS. 7A through 7C detail the operator instrument cluster of the module of FIG. 1 in the extended, retracting and retracted positions, respectively; FIG. 7D is a front view of the instrument cluster of FIGS. 7A through 7C; FIG. 7E is a top view of the seat of FIGS. 7B and 7C; FIG. 7F is a cross-sectional view of the seat of FIG. 7E detailing the seat switch; FIG. 7G is a schematic diagram of the interior light and fan control using the seat switch of FIG. 7F; FIG. 8A is a schematic cross sectional view of the upper and lower case-section RF liners and tempest sub-enclosures of the module of FIG. 1; FIG. 8B is a top view of the base section of the module depicted in FIG. 8A; FIG. 9A is a schematic partly broken away view of the pantograph assembly of the module of FIG. 1; FIG. 9B is a detailed view of a portion of the pantograph of FIG. 9A; FIG. 9C is a cross section taken along line E--E of FIG. 9A; FIG. 9D is a detailed view of the operation and locking means of the pantograph of FIGS. 9A through 9C; FIG. 10 is a schematic representation of the automatic shunt circuit for the power supply cutoff switch of the module of this invention; FIG. 11 is a schematic block diagram of the security system automatic loop selector circuit of the module of this invention; FIGS. 12A and 12B are side and top schematic views, respectively, of one intruder detection security system for the module of this invention; FIG. 13A is an overhead view of the module of this invention in a dark storage configuration; FIG. 13B is a schematic representation of the external connections of the module of this invention; FIGS. 14A and 14B are schematic views of the module of this invention in the closed and open position showing the locations of various security transmitting and receiving antennas; FIG. 14C is an enlarged view of one IR receiving element and one transmitting antenna of FIG. 14B along with two remote receiving means; FIG. 15 is a block diagram of an automatic-extend/retract pager signal, or cellular telephone antenna for the module of this invention; FIG. 16A is a cross sectional view of a closed circuit television monitoring system for the module of this invention; FIG. 16B is an enlarged view of a portion of the system of FIG. 16A; FIG. 16C is a front view of the system of FIG. 16A; FIG. 17 is a block diagram of a slow scan, still picture, video transmission security system for the module of this invention; FIG. 18A is a cross sectional schematic view of the flexible covering and RF screening or foil material for the module of this invention; FIG. 18B is a partial front view of the covering and sealing means of FIG. 18A; FIGS. 18C and 18D are enlarged detailed views of a method for accomplishing overlapping zipping enclosures depicted in FIG. 18B; FIG. 19 is a schematic view from the module interior of mounted white noise transducers of a protective masking system for the module of this invention; FIG. 20 is a cross sectional view of a babel-projecting speaker for a protective masking system of the module of this invention; FIG. 21A is a cross sectional view of the intake port for the ventilation system of the module of this invention; FIG. 21B is an exploded view of the ventilation system of FIG. 21A; FIG. 21C is a second cross sectional view of the ventilation intake port of FIG. 21A shown within an airflow baffle; FIG. 21D is a schematic cross-sectional view of the module showing the general forced air flow direction; and FIGS. 22A through 22C are a block diagram of the electrical system for the module of this invention. There is shown in FIGS. 1 through 4 the portable secure telephone communications module of this invention in the closed, opening, and open position. The module includes a two part cabinet with top section 1 and bottom section 2. The module includes an internal pantograph-type skeleton structural assembly that provides a collapsible and expandable locking pantograph skeleton for maintaining the module in the open position to create an enclosure that can hold a person desiring to make secure-voice telephonic communications. The pantograph assembly is shown in more detail in conjunction with FIGS. 9A through 9D. The module includes, completely covering the pantograph as well as connecting to rigid metallic linings in the top and bottom section of the cabinet, a flexible, opaque, Radio Frequency (RF) and light barrier 4 that may be comprised of flexible, metallic shielding material such as metallic coated rip-stop nylon fabric sold by the Flectron Division of the Monsanto Company (St. Louis, Mo.) or similar products sold by International Paper Corporation, Veratec Division (Walpole, Mass.) for preventing the passage of RF energy. Overall, the layered module RF shielding will provide RF protection to a minimum frequency of 1 GHz with attenuation of at least -70 dB as well as protect from the passage of near-infrared light in the region of the infrared spectrum usable for modulated transmission. The barrier of the module will prevent interception of transmitted user-voice audio during secure-voice communications via clandestine RF or IR transmitting devices carried into the module unknowingly by the user. Flexible RF/IR barrier module covering 4 includes permanent creases 5, on an outer, flexible, permanently creased, second layer, that provides guidance for the metallic/nylon layer and gives the module an accordion appearance for uniform folding so that the RF/IR barrier can easily collapse into the top and/or bottom cabinet sections. The user enters the module through outer RF sealing door flap 6a and inner RF sealing door flap 6b, shown in more detail below. Each door flap has a zippered pull 7. Included accessible from the outside of base section 2 is a pantograph release pedal 8 used to collapse pantograph 3, shown in more detail below. Retractable and extendable locking handles 9 are provided for ease of handling in the collapsed position so that the module can be easily steered, pulled up and lowered down stairs in conjunction with wheels 16. Walking behind the module without an extended handle, while pushing the unit, would be difficult due to limited space for the person's feet. Handles 10 are provided for ease of lifting the module while it is being transported. Concave area 11 behind handle 10 is provided so that the user may easily grip the handle 10 without the need of handle 10 breaking the profile of the module. Locking latches 12 and locking-latch mating components 13 are provided so that the module may be locked in the closed configuration. When closed, the latch/lock assembly provides an aligned hole through both components so the user may insert through the holes proprietary lead and wire seals such as Budco (Tulsa, Okla.) No. 134, and seal with a hand-held sealing tool fitted with custom proprietary dies, such as Budco No. 823 Cut-R-Press dual purpose, seal press/wire cutter tool. Power/ground and telephone cables 15 provide power for the module, ground the RF shielding, and transmit/receive the telephonic communications into and out of the module. Wheel anti-roll brake assembly 17 may comprise metal plates that contact the tires when applied to ensure stable parking of the unit, as found in many baby carriages. A brake would be particularly important to temporarily hold the module from rolling as the user unlocks and opens a vehicle door to load the module for transportation, for example, on a sloped driveway, parking lot, loading dock, etc. The user depresses pedal 18 to lock/unlock the brake assembly 17: one step to lock and one step to unlock (a simple cam-type mechanism). Also included are belt rollers 19 as found on two wheel dollys to facilitate movement up and down stairs. Floor insulators 20 are soft cushions that separate the module from the floor to preclude hostile interception of vibrations in the ceiling of the room below the module as a means of intercepting the conversation taking place within the module, prevent the module from sliding on hard floors, and protect the lower case section from scratches. The module includes a number of sound masking system speakers 21 that project masking sounds into the parent room as described below. Two speakers are included on each of the four flat sides of the upper and lower case sections of the module, a total of 16 speakers. Also included is a passive infrared detection device (PIR) 22 for monitoring the space in front of the module when the module is open, not in use, and the surrounding area is unattended. When used in this manner, the module becomes a rapid deployment security device capable of detecting a parent room intrusion and the off-premise notification of the intrusion via the local telephone company switched network or by wireless RF transmission. Currently available PIR units such as Napco Security Systems, Inc., (Amityville, N.Y.) Model 5050 "Super Quad" and Aritech Corp. (Hickory, N.C.), Model PR383 "Premier" provide for an extraordinary level of false alarm rejection through the use of multiple sensing elements, pulse counting, or signal-analyzing microprocessors. PIR units contain a "walk-test" LED (light emitting diode) designed for technicians to use when installing a unit to identify detection patterns, such as those shown in FIGS. 12A and 12B. In the preferred embodiment, the module PIR should have the walk-test LED operational when standing by and off when the security system is armed. This methodology will allow the user to "see" the sensitive areas in a parent room and know when he/she is clear of the zones as well. This will permit arming the security system, with the wireless transmitter, in the "instant mode" without a false alarm and provide no entry delay and no "walk-test" LED for an intruder, thus support superior "surprise" intruder-ID video operations via the video transmission system described below. The PIR unit is mounted flush on the module or in a recessed area to effectively protect it from damage during transportation. The module also includes an external security system digital keypad 23 for access to the security system, including user control of selectable systemfeatures as described below. Security system warning/verification sounder 24 is also further described below as are photo-sensitive detection elements 25, RF-barrier leak-test system antennae 26 and cylindrical receiving cavities 27 for the test antennae. Optional strobe light 28 is included. Television viewing port 29 is included for a closed-circuit television system that allows the user inside the module to visually monitor outside the module. Also included may be slow scan, still picture video transmission circuitry for security system enhancement, providing, upon a parent room intrusion, off-premise video identification of the intruder via telephone lines as described below. Ventilation of the module is accomplished with intake port 30 and exhaust port 31 along with honeycomb waveguide air vents for RF shielding and automatically activated fans as described below. The purpose of having the intake vent port in the lower module case and the exhaust in the upper section is based on the principle of rising (body) heat; therefore, naturally assisting air movement inside the module and supporting more effective ventilation. UHF transmit antenna 32 and receiving antenna or photoelement 33 or security system remote control arming/disarming are also described below. Shown in the partial cutaway view of FIG. 3 is spring powered, ratchet locking, power-return cable spool or spools 36 for carrying the power and telephone cables 15 so that they may be retracted and withdrawn from the module as desired. Area 35 is the termination point for the RF shielding that allows the cable to be carried outside of the RF shielded area so that the only penetration of the shielding is by the RFI/EMI filters which pass AC power and telephone information, at the penetration point, through the RF shield into the wire-spool area. A wide variety of RFI/EMI filters are readily available from specialty manufacturers such as Lindgren LectroLine (Los Angeles, Calif.). Hinged, cable access door 37 includes cam lock 38 with spring powered hinge 42 that holds access door 37 open. Tapered locking cam 39 for access door 37 is moved behind cam holding plate 40 to accomplish compression locking. Lock 38 may be a high security lock such as the unique angular-keyed locks sold by Medeco Security Locks, Inc. (Salem, Va.). Push button switch 43 may be included to open the security system standby power circuit when access door 37 is closed to prevent discharge of the rechargeable standby battery during periods of long distance transportation. To ensure security, a protective shunt circuit that prevents this push-button switch from operating during security armed periods may be included. The shunt would cycle open and closed as the security system is armed/disarmed, thereby shunting the push button switch in the armed mode. This process would eliminate the possibility of hostile, external control of the module power supply during periods of armed security as described in more detail below. Single-conductor quick-connect receptacle 44 may be included for an auxiliary grounding jumper to provide grounding of the RF shielding of the module when available AC power outlet does not provide a third prong for grounding. One end of the grounding jumper is fitted with a clamp suitable for attachment to a cold water pipe or other suitable ground. FIG. 4C shows the module open with the door flap open as accomplished by simultaneously opening zippered closures 6a and 6b. The two zippers are open and closed with dual zipper control handle 7a. A person is shown sitting on seat 94 using telephonic and other equipment on fold-down instrument cluster 166, both described in more detail below. When the module is open, seat 94 is offset to one side of the center of the module to allow room for the user's legs. When the module is collapsed, seat 94 moves down and to the right in FIG. 4C so that it is below the bottom portion of instrument cluster 166 to ensure that the seat contacts the instrument cluster as the module is collapsing to fold the instrument cluster into top module section 1 as shown in more detail below. The internal, automatic rising/collapsing, pantograph-integrated user seat assembly is shown in FIGS. 5A through 5C and 6A. Pantograph arm 102 forms part of pantograph 130. Lowest pantograph arm pivot point 86 is within base section 2. In the top view of FIG. 6A second pantograph member 102a and pivot points 86a are also shown. The user seat comprises upholstered cushion 94 on support plate 92. A pressure-sensitive switch may be installed between plate 94 and cushion 92 to activate the ventilation system and interior lighting as the user sits in the seat. This feature is described in more detail below. Dual support rods 104 are hingedly attached to plate 92 at their upper ends and to reinforced floor plate 108 at their lower ends at pivots 106. Upper section of wide support rod/hinge 88 is hinged at points 90 and 96. Lower section of wide support rod/hinge 98 is hinged at points 96 and 100 so that the seat may be collapsed onto plate 108 as shown in FIGS. 5B and 5C. Floor plate 108 is suspended from base 2 by a number of floor plate supports 110 and may either be hinged on one side or completely removable to gain access to electronic equipment under the floor plate 118. Removable tote-tray 112 fits within a tote tray perimeter support 114. (Tote tray may be used to store foreign AC adaptors, grounding jumper and clamp, etc.) Hinged door 122 covers tray 112 and includes handle 134 and hinge 136 shown in FIG. 6A. A simple hinge spring or magnetic cabinet latch may be used to hold the door closed, important during the module transportation mode. The underside of the hinged door may be used to mount spare system fuses and a general purpose allen wrench held in place by spring-tension retainers for easy access. Circuit board 116, FIG. 6B, is mounted below tote tray perimeter support 114 as shown in FIGS. 5A and 6B and is accessible by removing the tote tray. The board includes a number of system fuses and DIP switches to allow the sales technician to set options available as described for the end user. Ventilation intake port baffle 82 directs air pulled in through intake port 80 up toward plate 108 which has intake port grill cover 135 therein for allowing air to pass into the module. Seat 94 is operated as follows: Controlling rod 133 connects to pantograph members 132 and 132a and also to the hinged seat rod at point 96. When the pantograph is fully open, hinge 96 passes the 180.degree. point (point 96 would be slightly to the right of where it is in FIG. 5A) to lock the seat mechanism in place along with the locked pantograph assembly, until the pantograph is collapsed. When the pantograph is collapsed, hinge 96 moves inward and downward along with the pantograph, allowing the seat to collapse as shown in FIGS. 5B and 5C. The fold down instrument cluster for the module of this invention is shown in FIGS. 7A through 7C. Module top section 1 includes RF secure exhaust port 164 and airflow directing baffle 165 in a similar arrangement to the intake port described above. Instrument cluster 166 is hingedly mounted with a wide hinge at mount 172. An automatic on/off switch 170 activates overhead lamp 175 when cluster 166 is automatically lowered. Tempest sub-enclosure area for mounting electronic equipment 162 is shown in more detail below. Rigid head liner plate 163 is similar to the lower floor plate and carries mounting assembly 172. Rounded, smooth, seat contact area 173 contacts seat 94 to apply an upward force to cluster 166 when the module is collapsing, thereby allowing the gravity-operated cluster to fold up as shown in FIG. 7B and 7C. Hinge rest area 176 stabilizes cluster 166, when open, by it's own weight but may also include an internal spring-powered ball-and-notch type lock that releases under slight pressure as seat contact area 173 contacts the cluster when the module is collapsing. In either case, the cluster never reaches a 180.degree. position. Thus, constant gravitational pressure is applied to hinge rest area 176 when the module is open for use and cluster 166 is never in a position that would preclude movement when contacted by seat 94. Ribbon wire or other flexible wires 174 carries the power and signals to and from the instrument cluster. User telephonic headset 178 includes volume-limited control knob 179, shown mounted on user's head. Wire 169 connects headset 178 to cluster 166 and headset 178 may be stored in cluster pocket 177 as shown on FIG. 7D. This pocket may contain a switching device to function as a hookswitch for the secure telephone, thus provide dial-tone automatically when the headset is removed. A cluster-mounted momentary-action pushbutton switch would be used to temporarily "hang up" and produce dial-tone again to make another call, etc. The headset should cover the user's ears entirely and provide light noise attenuation, for example, Telex Communications, Inc., (Minneapolis, Minn.) Model HS-700 with flexible boom mic. The purpose for this type of headset is to allow the user to hear more clearly in the presence of sound masking noise and to ensure that little or no sound escapes from headset speakers. Cluster 166 includes clamps 177a, 177b for holding a pen and pad. Telephone and miscellaneous controls, TV monitor screen and TV-lens joystick control 181 are shown on FIG. 7D. Miscellaneous cluster controls and LCD display may be backlighted to ensure accurate viewing of the instrumentation. FIGS. 7E through 7G disclose a preferred embodiment of a control circuit for the internal lamp 175 and intake and exhaust fans 606a and 606b. Overhead lamp switch 170, described above, activates timer 189 when the instrument cluster is lowered. Timer 189 turns on incandescent lamp 175 which may have a voltage rating of approximately 50% higher than the voltage supply to increase bulb life and provide softer interior lighting. Switch 185 is disposed within user seat 94 and is closed when the user's weight presses spring steel, switch control leaf 181 against switch 185. Leaf 181 is mounted to user seat base support plate 92 with mounting hardware 187 and is slightly curved to provide a space for switch 185. Timer 189 is enabled to shut off lamp 175 after a short time, for example three minutes, to allow the user to enter the module and sit on the seat. The circuitry lights the interior of the module as soon as it is opened so that the user does not have to enter the module in the dark, however, shuts off after three minutes to better support parent room security operations by not attracting attention to the module during armed security "away" periods. At any given time, when switch 185 is closed by the user sitting on the seat, seat switch timer control circuit 191 overrides, via a parallel connection, timer 189 to active lamp 175 and start both vent fans as well. When the user leaves the seat and switch 185 is opened, the timer in circuit 191 is activated for perhaps one minute. At the end of the time cycle both the ventilation fans and the light are automatically turned off and the module is once again standing by for use as a parent room security device. The physical design of seat 94, cavity 183, and switch control leaf 181 is designed so that switch 185 is closed only by the amount of force created by the user sitting on seat 94 to prevent switch 185 from being activated when the module is closed as shown in FIG. 7C. FIGS. 8A and 8B show the base and top section RF liners and tempest sub-enclosures for preventing the passage of electro-magnetic and RF emissions from onboard electronic equipment into the parent room. Module top section 1 and base section 2 each carry a number of tempest sub-enclosures 203 formed by metallic compartment dividers 204 within a metallic-lined, or molded metallic case-section 205. Interior head liner 206 encloses sub-enclosures 203. The internal RF liner 208 lines the entire top and base sections. The tempest enclosures and the RF liners are attached to ground 209. Metallic, ventilation baffle 210 in upper section 1 and baffle 210a in lower section 2 direct air flow into and out of the module. Baffle plates may serve as tempest sub-enclosure wall components as well. Also shown in FIG. 8B is wire spool compartment 212. Module floor insulators 213 are shown in FIG. 8A. Areas 206 and 207 may be covered with thin, adhesive-backed, lightweight carpeting to absorb sound within the enclosure, thereby attenuating sound escaping into the parent room and providing more effective audio security. Tempest sub-enclosures and module case-sections may be manufactured to specification by specialty fabrication companies such as Electromet Corporation (Hagerstown, Md.). Rather than utilizing tempest sub-enclosures, another method would include custom designed RFI/EMI shielded electronic subassemblies manufactured by specialty companies such as Caron Enterprises, Inc. (Girard, Pa.). FIGS. 9A through 9D schematically depict the pantograph-type frame of the module of this invention that in combination with the top and base member form the mechanical structure portion of the collapsible and expandable portable module of this invention. The general structure of the pantograph 250 is shown in FIG. 9A. The pantograph locking mechanism that locks the member in the upright position is shown in area 254 that is detailed in FIG. 9D. As shown in FIG. 9B, the pantograph comprises a number of pivotably interconnected structural cross-members such as members 256 and 258 interconnected at point 259. In one embodiment, springs such as spring 260 that is connected to member 258 and point 259 may be included to assist module opening. Slow-air-release piston or pistons 261 control the rate of descent when the pantograph is released from the open and locked position, similar to units used to control spring-powered doors, such as a screen door on a house. Operation is as follows: pantograph springs would assist opening to approximately the half-way open position and pistons would control descent to the half-way closed position. When closing, the user would step on the release pedal, wait for the unit to descend to and stop at the half-way position, then gently push down on the top case-section, compressing pantograph springs 260, to close and lock the module. FIG. 9C is a cross-sectional view taken along line E--E, FIG. 9A. This figure details the pantograph locking mechanism with external foot pedal release. Shown are lower pantograph members 272 and 274 interconnected to guide bars 282a and 282b, respectively. These guide bars ride in slots through the base section of the module, one such slot shown in FIG. 9A. Top slots 252 shown in FIG. 9A allow upper guide bars freedom to travel, however, are not part of the pantograph locking mechanism. The locking and release mechanism are shown in more detail in FIG. 9D. Release foot pedal 279 extends externally from the module base section 2. Lift bar 278 is attached to locking fingers 280a and 280b. Locking finger 280a is shown in detail and pivots on point 290. Spring 292 urges the finger to return to the locked position shown in FIG. 9D wherein the finger is engaged in stop block 286 that prevents member 282b from sliding into slot 254 as is required in order for the pantograph to collapse. Pedal return spring 294 urges the pedal to return to the locking position shown in FIG. 9D. To close the assembly, the operator steps on pedal 279 to release the locking fingers from the stop blocks, allowing guide bars 282a and 282b to slide along the slots as the pantograph collapses. The mechanism is shown in its open, locked position, FIG. 9D, in which bar 282b cannot slide along slot 254. In the closed position bar 282b would be at the far right end of slot 254. As the pantograph is expanded bar 282b engages the lower curved surface 281 of arm 280a to lift arm 280a so that bar 282b can travel to the far left end as shown in FIG. 9D. Spring 292 then returns finger 280a to its locking position shown in FIG. 9D to keep the pantograph assembly in its raised position. Depressing the external pedal 279 then lifts both locking fingers simultaneously via the attached lift bar to allow the pantograph arm ends such as end 282b to travel back along the slots so that the assembly can collapse and the module can close. The pantograph assembly for the module may be constructed of high strength, lightweight material, such as aircraft quality aluminum. FIG. 10 is a block diagram of an automatic shunt circuit for power supply cutoff switch 43, as shown in FIG. 3, that may be arranged to open the security system standby power circuit when door 37, FIG. 3, is closed, to prevent deep discharge of the rechargeable standby battery during long-distance transportation. The protective shunt circuit prevents switch 43 from operating during security armed periods to eliminate the possibility of hostile, external control of the module power supply during periods of armed security. System 320 includes security system control instrument/panel 321, described below. LED 322 is lit when control instrument 321 is armed either using a module-mounted keypad control or a wireless remote transmitter control. Transistor-operated relay circuit 323, such as Aritech Corporation (Hickory, N.C.) MPI-206 series, draws a small amount of current from LED circuit 322 and is activated closed when LED 322 is activated, thereby shunting switch 43 with contacts rated 5 amps at 28 VDC. Battery 325, which may be a rechargeable cell or cells such as Gates Energy Products (Gainesville, Fla.), Monobloc sealed-lead batteries, powers the unit. Floating charge circuit 326 is a circuit that samples an attached battery, adds power to charge the battery when needed, and holds back from overcharging when the battery has been charged to the required specification. Floating charge circuits are usually integrated into control instruments such as instrument 321. Block 327 indicates standby-power-dependent on-board electronic systems connected to power supply/charge circuit 326 that are protected by the shunt circuit. A second part of the security system, a security system automatic loop selection circuit, is shown in FIG. 11. This circuit may accomplish automatic selection of the proper security system detection circuit by including a permanent magnet 330 in the module top section and magnetic-responsive, detection loop selecting contacts 332 in the base section that are switched between loop A and loop B depending upon whether the module is open or closed. Loop A is used for protection of the module during closed storage; loop B is automatically selected when the module is open, for protection of the unattended parent room in which the module is located, using the multi-element wide angle, passive infrared detector 22 as shown in FIG. 4B. Loop A includes photosensitive detectors 336 for detecting light when the module is stored in a dark storage area, and vibration analyzer 338, that detects vibrations such as those from shock and drilling, and in response triggers an alarm. Analyzer 338 may have an event counting processor such as a Litton Poly-Scientific (Blacksburg, Va.) Terminus Pad-A-Dap one-zone processor, Model No. SP3219-1 with 1 or 2 Model No. SP3237 shock sensors; Litton sensors may also be positioned to detect tipping of the module. Such systems are programmable to ignore a limited number of shock events in order to prevent a false alarm. However, events are stored for a period of time, and exceeding a particular number of events in a given time-frame initiates an alarm. Cabinet contact switches 340 will trigger an alarm if the module is unlocked and opened (point contacts) during periods of armed security. Detectors 336, 338, 340 may be independently selected, or selected in groups, by the user via the security system keypad shunt control feature operating in conjunction with zone-controlling central instrument 321. FIGS. 12A and 12B are side and top schematic views, respectively, of typical passive infrared sensor (PIR) detection patterns such as those models specified for use with the invention. PIR 22 in top section 350 senses minute thermal changes throughout detection zones 360 through 364 on 3 planes; 356, 358 and 360 as shown in FIG. 12A. These thermal changes are recognized as an intruder's motion within the parent room and in response trigger an alarm output, via the PIR relay contacts, thus switching the security system central control instrument to initiate an off-premise notification via the switched telephone network. Notification of an alarm condition may be in the form of a digital alarm signal or a freeze-frame video of the parent room sent via the on-board slow scan transmission system of the invention described below. FIG. 13A shows the module 350 closed and in a dark storage area in which it is accessible to AC power 382 and optional telephone network connection 380; a telephone line is not required for off-premise notification if the module wireless notification system is utilized as described below. 384 shown in FIG. 13B is the module ground jumper connection and is only required if AC outlet 382 does not provide a ground. The dark storage photo-sensitive system utilizes surface-mounted sensor elements connected to a signal amplifier with a relay output that activates the security system central control instrument described above. Photo-sensing elements are redundant, and spaced at a number of locations on the module cabinet(s) exterior, smoothly flush mounted to preclude a person from identifying sensor element locations in the dark and then covering the elements with a substance such as clay prior to illuminating the dark storage area. The photo-sensors respond to both white light and infrared light as generated from infrared night vision illuminator units available on the market. This system will provide, in a dark storage area, an extremely high level of detection sensitivity with an absolute minimum of false alarm probability, and does not require installing equipment in the storage area other than an AC outlet and a "peel and stick" light-sealing rubber gasket for the storage room door. The storage room may be a typical clothing closet in an office or a house. Threshold sensitivity settings for surface-mounted photo sensors may be selected, in increments, with system DIP switches shown above in FIG. 6B. Other detection options may be selected by the user when the module cannot be placed in dark storage with the use of the user keypad shunt control shown in FIG. 11. Selections may be verified for the user with an LED display. Entry/exit delay settings for the security system allow the user a predetermined time period to leave and approach an armed module without causing an alarm output. A sounder, such as a Mallory Sonalert, shown in FIG. 4B as number 24, may be utilized to warn the user that entry delay circuitry has been activated and an alarm is imminent. A short tone from the sounder may also verify when the security system is armed or disarmed via the key-chain-size, remote wireless arming/disarming device as stated above, for example, one beep equals armed, two beeps equals disarmed. Entry/exit delay circuitry is integrated into the central control instrument and may be adjusted, in increments, using DIP switches described above. The transmitting and receiving signalling antenna system of the module of this invention is shown in FIGS. 14A, 14B, 14C and 15. With the module in the closed configuration shown in FIG. 14A, RF-leak-test receive antennas 401 and 402, that are mounted on the top and/or base members outside of the flexible RF barrier, are received within receiving cavities in the mating module portion to protect antennas during the transportation mode of the module. Receiving cavities 403 and 404 are shown in FIG. 14B. When the module is opened, as shown schematically in FIG. 14B, these antennae are exposed and are outside the RF enclosure and thus may be used to test whether there is RF leakage from the unit by transmitting from internal RF leak test transmit antenna 405 that is mounted inside of the flexible RF barrier. Test signals may be a suitable UHF frequency. A simple red light/green light display may be provided for the user inside the module to verify RF shield integrity, and an RF barrier test cycle may be initiated automatically each time the module secure-voice telephone is activated for use by utilizing the telephone hookswitch control function to activate the RF barrier-test circuitry. The hookswitch may be located on the instrument cluster as described above. FIG. 14C shows UHF flexible stub antenna 408 for signalling to a remote pager as described below. IR receiving element 407 for the wireless key-chain-size transmitter is also described above. An IR key-chain-size transmitter is preferable for security because IR will not penetrate parent room walls. However, if an RF device is utilized, one antenna may be used in conjunction with a diplexer to receive wireless commands and transmit to a pager as well. Antenna 408 may be covered with a rubber covering that also encapsulates an internal lacing of small diameter wire connected via isolation circuitry to the security system tamper protection loop so that if the lacing wire is severed an alarm event will be triggered and registered in memory as described below. An indirect connection utilizing a relay and/or RF filtering is important to preclude RFI from affecting the module security system via the tamper protection circuit during UHF transmission from antenna 408. Typical personal receivers for digital alarm signals transmitted over antenna 408 may be a pager 413 with AC charger 414, and/or a receiver system 410 that may be carried concealed in brief case 412. During parent room "away" video surveillance described below, the pager system would notify the user of an unauthorized intrusion in progress. Signals may also be transmitted to professional facilities such as central monitoring stations, guard booths, etc. Signal antenna 408 may be an automatic extend/retract antenna 440 as shown in FIG. 15. Security system central control instrument 321 activates upon alarm, and includes auxiliary timing circuit 434, for example, Altronix (Brooklyn, N.Y.) model 6060 timer, which controls the RF transmit and extend antenna time. RF signal transmitter 436 is connected by a coaxial cable 438 to antenna 440 that is extendable and retractable within power antenna body 437 that has antenna movement-limiting microswitches 439 and 439a. The transmit frequency range and modulation type for either antenna system stated above may be coded UHF or other suitable frequency range. Operation of the system is described below. Antenna 440 may also be a cellular telephone antenna if the module is so equipped and may transmit digital alarm data or slow scan video pictures during an alarm cycle. FIGS. 16A through 16C detail an on-board closed circuit video system for the module of this invention that permits the user to monitor areas outside of the unit during a secure communications session, (for example the user may wish to know that a secretary or associate has entered the room) as well as allow security system (PIR) activated, remote twenty-four hour surveillance of the parent room area outside the module of this invention. CCD (charge-coupled device) video camera 451 such as a Pulnix America, Inc., (Sunnyvale, Calif.) Model TM-34K-0 has its output provided to panel-mounted television monitor 452, for example, Sony Security Systems (Montvale, N.J.) FDM-030 flat display monitor that has a screen size of 2.0.times.2.7 inches. The TM-34K camera would provide quality video in low-light areas and infrared lighted areas as well. Parallel camera output 452a is routed to slow scan equipment as described below. Monitor 452 may be mounted in the fold-down instrument cluster 453. Four position mini-joystick controller 454 is used to position the camera lens as described below. Flexible, fiber optic lens 457 such as units sold by Visual Methods, Inc., (Westwood, N.J.) is connected to camera 451 by mini-bayonet mount 456. Fiber lens 457 passes through a grounded waveguide 458 that is mounted to the module top section 1 by RF-sealing mount 459. The waveguide prevents RF leaks from the module and prevents revealing emissions from the video camera that could be detected by hostile surveillance equipment, thereby alerting adversaries that the parent room is under active video surveillance and interfere with intruder-ID "surprise" parent-room video operations. It is also possible, in some cases, to decipher parent room images from intercepted video camera emissions. Hole 460 through top section 1 provides an open area for the camera lens and the lens steering components that allow the operator to change the camera view. Lens steering motor control assembly 462 responds to commands from joystick 454. Rigid lens steering collar 464 is connected to motor control assembly 462 by control linkage 463. 465 is the lens assembly termination point. The lens assembly may incorporate an auto iris mechanism to provide quality images under a variety of lighting conditions. Steering-collar rubber suspension mount 466 is the flexible component that permits lens movement. High-impact plastic protective lens cover 467 may be convex or flat. FIG. 17 shows in block diagram a slow scan, still picture video transmission system utilized in conjunction with the system shown in FIGS. 16A through 16C. This system provides the user with remote video alarm transmissions of the module parent room using the switched public telephone network. The system may be activated upon detection of an intruder to transmit video freeze-frames to any remote location at which the images may be viewed in near real-time on a TV monitor, and/or recorded on a VCR or thermal paper printer automatically activated by each alarm event. Freeze-frame videos would be sent approximately every two seconds during an intrusion. Programming of the slow scan transmission system digital telephone dialer with the desired outgoing telephone number may be accomplished with the on-board DTMF (dual-tone multi-frequency) telephone keypad utilizing a DTMF function-transfer switch as described below, and/or a remote-access DTMF-responsive, control device with EEPROM memory 511, which would enable the user to change the digital dialer video-send telephone number from any external location. The slow scan television transmission system is activated upon a parent room intrusion by the security system passive infrared detector 22 as described above and security system central control instrument 321 that sends a signal to digital telephone dialer/transmitter 502 during an alarm event. CCD video camera 4 1, also shown in FIG. 16A includes a 75.OMEGA. mini-coaxial cable 512 to the internal video monitor shown above. A parallel output 452a, also shown in FIG. 16A is also provided to signal processor/transmitter 502, for example, a Sony Security Systems (Montvale, N.J.) SPT-T200 Telepix transmitter with automatic digital telephone dialer that provides the digital freeze-frame data and which transmits the images via the telephone lines to the external location where the signals are received with a slow scan video receiver/monitor such as a Sony SPT-R200. The Sony system is a good example because it is event-triggered and provides for transmission of parent room audio as well utilizing "listen-in" microphone or microphones 514. DTMF keypad and LCD numerical display 504 allows the user to select the outgoing video-send telephone number in conjunction with DTMF function selector 505 and view the information on the LCD display for verification before sending it to an EEPROM circuit where the data is retained for use with the slow scan transmitter/dialer. Secure-voice communications encryption equipment 506 utilizes DTMF pad 504 in conjunction with selector 505. An alternative to the DTMF function selector would be to utilize two DTMF pads. The public telephone network is indicated by block 507. The freeze-frames are provided to television receiver/processor 508 at a remote location, as well as auxiliary VCR or video printer 509. A remote touchtone (DTMF) telephone 510 allows the user to access the DTMF remote-control circuit 511 described above and remotely control programming of this system. FIGS. 18A through 18E devil the flexible module covering and RF shielding for the module of this invention, including one means of allowing user access to the interior of the module while still maintaining a quality RF seal that meets or exceeds the frequency and attenuation specifications stated above. Flexible, opaque, RF-shielding module liner 521, FIG. 18A, includes three basic components: metallic fabric for RF shielding 523 as described above, protective inner layer 523a (prevents accidental damage to the metallic fabric), and permanently creased, fold-guiding, protective outer layer 525 which may be a thin rubber layer capable of "remembering" crease locations for proper, consistent folding of the flexible barrier. Module base component 2 is lined all around with RF liner 530 (or the entire case section may be constructed of metal) to which metallic liner 523 is electrically connected using a pressure component 533 and evenly spaced, continuous screw or rivet fasteners 533a. Said pressure component and fasteners secure the RF liner into formed area 532 in base component 2. Liner 523 is exposed to liner 530 by making external protective layer 525 end before it reaches electrical contact area 532. Metallic fabric and protective inner layer 523/523a is continued past the contact area to ensure a resistance-free electrical connection and to firmly hold the barrier in place. Liner 523/523a terminates at point 531. Pressure component 533 has a top clamping area 534 that is intended to firmly hold all flexible layers in place and to protect metallic fabric layer 523 from being pulled as the module is opening. The top case section of the module utilizes the same mounting arrangement for the flexible barrier as the base section. Precision, close tolerance metallic zippers 526 and 526a, FIG. 18B, close user entryway 522, shown open. The zippers are firmly sewn to the nylon, metallic coated fabric with the zipper metal in continuous contact with the metallic fabric to provide continuous electrical continuity across the entire face of the module that contains the user entryway. In the area where the zippers are sewn, but not in the electrical contact area, all layers of the flexible barrier are also sewn together and appear as a single, flexible barrier 521. The module zipper system can easily be maintained for high performance by occasionally cleaning the zippers with aerosol spray electrical contact cleaner available from any Radio Shack or similar type store. On the interior side of the flexible barrier, a section of metallic fabric material overlaps the primary section of metallic fabric forming a secondary flap 524 that closes with flap zipper 527a. The section of the barrier where the metallic fabric is redundant to create a flap, may be a dual metallic fabric layer manufactured by special order, or a second section of flap material may be sewn to the original layer of metallic fabric then soldered or taped with specialized metallic fabric shielding tape as appropriate to maintain resistance-free electrical continuity. Unique metallized-fabric adhesive tapes such as copper and silver/copper on a rip-stop nylon substrate are currently available and manufactured via a corporate agreement between Adhesives Research, Inc. and the Monsanto Company Chemical Group. The entire metallic fabric RF shield 523 may be two layers for purposes of forming the second zipper flap and this will contribute somewhat to the overall attenuation rating of the module RF shielding performance as well. Zipper pull 527 operates flap zipper 526 and zipper pull 527a operates the primary barrier zipper 526a. The RF metallic barrier is shown grounded via internal module wiring 528 shown in more detail below. The density of opaque layers 523a and 525 is commensurate with the degree of protection desired for preventing IR passage. Pull handles that may be used to operate both zippers are shown in FIGS. 18C and 18D. Both views are from a perspective inside the module. RF shielded flap 550 between zippers 558 and 542 may be connected to inner zipper 542 and not outer zipper 558. However, the flap does pass over outer zipper 558 when closed and the RF lining is continuous with lining material on the 523a side of FIG. 18C as a second layer. When closed, the user entryway is RF leak protected with two metallic fabric layers and two zippers that are arranged in offset positions. FIGS. 18C and 18D are zipper pull arrangements with rigid pulls. These pulls use a rigid handle 552 attached directly to the interior zipper pull 554. The exterior zipper pull is connected to the handle with a fine but rigid wire such as a spring steel wire so that the handle can be pulled to close the zippers and pushed to open the zippers. In FIG. 18C, flap guide support bar 556 is attached to pull handle 552 to help guide RF seal flap 550 into the proper position as the zippers are closed to prevent jamming of interior zipper 542. The flexible barrier flap 550 is positioned between support bar 556 and rigid control wire 546. Outer zipper 558 would not be visible when flap 550 is closed. FIG. 18D shows a similar arrangement without a flap guide bar. The outer zipper pull for zipper 558 may be utilized to operate both zippers from outside the module to close the entryway prior to collapsing the unit to ensure proper barrier folding as the module is collapsing. Custom, industrial sewing projects, such as the assembly of flexible materials and conductive zippers that comprise the module folding barrier, may be subcontracted to specialty firms, such as SeamCraft, Inc. (Chicago, Ill.). FIG. 19 is an internal view of a section of the module showing module top section 1, base section 2, and flexible RF barrier covering 567. Internal white noise transducers 563 are mounted at spaced locations on top section 1 and base section 2 to vibrate the sections in order to interfere with laser eavesdropping systems monitoring the module remotely. Flat, rigid, lightweight resonating bars 565 are mounted at spaced points to the interior of flexible covering 567 and are interconnected with ribbon wire 566 to provide power to white noise transducers 563 that similarly vibrate the flexible RF covering to also prevent laser intercept from outside the module. Resonating bars help distribute masking frequencies evenly and are attached with adhesive to the protective inner-layer of the three-layer RF barrier and do not affect performance of the barrier. The white noise system will also contribute somewhat to the masking of user voice audio leakage into the parent room. Parent room masking speaker 568, FIG. 20, is shown in more detail mounted to module top or base section 569. Internal metallic RF liner 570 covers the back of speaker 568. Speaker wire 571 penetrates the RF barrier through an individual RFI/EMI filter 571a for each speaker so that RF energy cannot follow wire paths and escape from the module. Tightly woven metallic grill 572 covers the speaker and further prevents EMI leakage through the opening in section 569. Grounding straps 573 for speaker grill 572 electrically connect grill 572 to liner 570 and would not apply if metal case sections are used. Security system tamper switches 580 and 581 may be momentary hold, push-to-close switches held in position by the speaker grills 572. During periods of armed security, an attempt to remove the speaker grills, or any other surface-mounted item protected with similar switches, would result in an alarm event. The closed-circuit tamper loop is independent of entry/exit delay circuits described above and responds instantly. Preferably, surface mounted equipment on the module would be fastened internally utilizing threaded, welded posts on each surface item mounted, thereby providing no removable fasteners on the exterior surface of the module. FIG. 21A shows in cross section an RF secure ventilation intake port for the module of this invention. Boxer fan 606 includes fan hub 607 and fan blade 605 attached thereto. Opening 614 in module top section 1 allows air flow and is protected from allowing any RF leakage with a honeycomb waveguide air vent 608 that prevents passage of RF energy of up to 1 GHz at the minimum. A range of honeycomb waveguide vents with varied performance specifications are available from specialty manufacturers such as Instrument Specialties (Delaware Water Gap, Pa.). Fan 606 and waveguide vent 608 are held in place in U-shaped channel-frame member 618 as shown in the exploded view of FIG. 21B. Once fan 606 and waveguide 608 are placed in frame 618, frame top member 62 1 is secured to provide a tight fitting frame that is preferably lined with an RF sealing mesh gasketing such as the many types available for RFI/EMI shielding purposes from Instrument Specialties Co. as stated above to preclude RF leakage. Exterior rigid metallic grill 616 is secured to top section 1 with retainers 612 that also provide grounding via attachment to the frame 618. The grounding takes place through internal RF liner 610. Interior grill 135, FIG. 21C, allows air passage into the module through the floor plate, and also provides service access to fan 606 and honeycomb waveguide vent 608 from inside the module for occasional vent cleaning or replacement of the boxer fan unit. Metal baffle 619 directs airflow up from fan 606 through grill 135 into the module. The exhaust fan would have the same arrangement with the airflow reversed. Interior grill 135, as it relates to the module interior floor plate, is shown in FIG. 6A above. FIG. 21D is an overall view of the module with both ventilation fans in operation. The arrows indicate airflow direction as air enters into the base case section and exhausts through the top case section. The electrical schematic diagram implementing all of the above functions is shown in FIGS. 22A through 22C. The power enters the module through RFI/EMI line filter 734 and voltage selecting relay 740 which may be a switchable relay to select the proper input voltage. Included is overvoltage protection circuit 741 which prevents damage to the electronic components in the module which may be caused by voltage spikes; such units are manufactured by Polyphaser Corporation (Minden, Nev.). Transformer 744 and rectifier/filter 746 provide the necessary power to the distribution instrumentation and controls indicated by block 720. Block 710 is RF leak test system as described in detail above. White noise masking sound generating transducers 702 are mounted so that they transmit white noise, or a variation thereof, from generator 704 for example, a Research Electronics, Inc., (Cookville, Tenn.) Model No. ANG-2000 acoustic noise generator to transmit noise into the module. The white noise volume is controlled by user-limited intensity control 706 so that the white noise volume cannot be turned off but, to ensure security, may only be lowered by the user during secure communications. AC power 732 may be carried by RFI/EMI filter 734 that penetrates the module RF barrier but does not allow RF leakage. An optional strobe light 724 may be mounted accessible to the outside of the module to signal for example when the module is in use. The strobe light is recessed in a mirrored bowl 724a and covered flush with conductive, grounded, wire-reinforced glass 726. Voice activated relay 772 is responsive to voice sensing microphone 770 for activating the primary masking noise amplifier output. Automatic masking amplifier volume control is accomplished in conjunction with the user's voice so that the output volume of babel-type masking sounds is directly proportional but higher in volume to that volume of audio created by the user speaking into telephone equipment using circuit 768, 766 and 760 in conjunction with player or generator 764. Module babel speakers 784 may be controlled by an amplifier output control in 760 that randomly alternates speaker to source information. This methodology will prevent the system from generating the same sounds from the same speakers each time prerecorded material repeat-plays. It is critical that the primary masking volume is always higher than the voice audio leakage from the module as the user is speaking to ensure security. When speaking inside the module on telephonic equipment the user is positioned directly in the center of an omnidirectional array of noise projection speakers on upper and lower elevations of the module. The primary masking system is only active as the user is speaking, thus providing easier listening during a secure telecommunication session. Quick-connect jumper ground cable 788 may be stored in tote-tray 782 under door 780, as shown in detail in FIG. 5A, for connecting the grounded components, particularly the RF shielding means 730, to cold water pipe or similar ground 792 through module connector 786 and tooth-jaw, spring powered, pipe clamp 790. 792 is a typical cold water pipe. This jumper cable is provided as a back-up device as described above. Encoder/decoder 748 is the secure remote telephone communication device for this invention as described above. The output is provided to the telephone network through an RFI/EMI filter 802 that allows telephone conductors to penetrate the RF barrier without RF leakage. The telephone device also contains a relay to fully break electrical contact with the telephone network each time a telephone conversation is terminated and the device is inactive. Finally, the telephone device should be able to interface with DTMF and rotary-dial networks. Security system central control instrument 321, powered by DC uninterruptable, rechargeable power supply 810, may be communicated with remotely using user remote wireless transmitter 818 and receiver 816 for accomplishing external control of the system. As a protective measure, the wireless feature may be selected or deleted by the user with the digital keypad control/shunt selector. Magnetic contacts 826, vibration analyzer 824 and photo-sensitive system 822 are all alarm sensors that may be selected for use with the user keypad control 814 as shown in FIG. 11. For maximum security, the security system keypad may be a Hirsch Electronics Corporation (Irvine, Calif.) Scramble Pad Model No. DS37L "Spy*Proof" used in conjunction with the circuit board contained in Hirsch Control Instrument No. SL1. This system rearranges temporarily lighted digits each time the pad is used, thereby preventing onlookers from memorizing keypad fingerbutton locations when a code is inserted. The Hirsch unit also restricts the viewing field of the lighted display to 2.degree., and the user must be directly in front of the pad to read the numbers. All alarm condition is transmitted over the telephone lines with digital communicator 804 as an alarm signal or as slow scan video data from slow scan system 808 and also may be indicated with optional local range wireless transmitter 806. 800 is a telephone line-cut monitor, such as an Ademco (Syosset, N.Y.) Model No. 659EN, for monitoring the telephone line during periods of armed security. The line-cut monitor constantly samples telco line voltage and should telephone service to the module be interrupted for a specific time period (approximately 30 seconds), a local alarm would be initiated by the monitor, such as a wireless alarm. Alarm event data for an alarm caused from the line-cut monitor, or any other module system detector, will be stored in the security system central control instrument 321 EEPROM "alarm memory" and be available via coded user access from the user keypad 814. A lithium-powered clock may be added to the system to provide the user with the time of each alarm event since last arming the module security system. The lithium cell is important because the primary power supply is disconnected when the module is transported and would not be suitable to power a system clock. Higher quality security control instruments provide the alarm memory feature, such as units distributed by Aritech Corporation, (Hickory, N.C.) or Napco Security Systems, Inc., (Amityville, N.Y.) such instruments are referred to as "control panels", and offer multitudes of features and options. A preferable, custom control would provide independent zones for each detection device utilized and store event data according to the zone that caused the alarm event in conjunction with the lithium-powered clock described above. This system will inform the user, upon reviewing alarm event history, which zone caused the alarm and when. A typical LCD-type display would read as follows: "zone #1 0901am 12Dec", "zone #2 0330pm 14Dec", etc. Each zone of the control instrument refers to a specific on-board device, i.e., zone 1=photosensitive detectors, zone 2=vibration analyzer, etc. An arrangement such as this would also be an invaluable diagnostic tool that a technician may utilize to solve a system false alarm problem through positive zone, sensor, and time verification. Also shown in this figure is internal lamp timer 189 and seat switch timer 191 along with combination exhaust vent fan and waveguide vent 606a and the intake vent fan and waveguide vent 606b. All systems shown in FIGS. 22A through 22C may be integrated on specially fabricated long circuit boards and mounted in module case-sections utilizing specialized shock damping mounts manufactured by Sorbothane, Inc. (Kent, Ohio). A long-board format will consume ample lateral space but very little vertical space. This methodology will allow for shallow upper and lower module cabinet sections, therefore resulting in a very narrow, compact and streamlined portable communications module when closed. Although specific features of the invention are shown in some drawings and not others, this is for convenience only as some feature may be combined with any or all of the other features in accordance with the invention. Other embodiments will occur to those skilled in the art and are within the following claims: * * * * * -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3308 From: Timothy Brown Date: Wed Jul 4, 2001 8:46pm Subject: Re: Anarchists and anti-capitalists = infobunkers Hi, TSCM-ers, I haven't introduced myself yet. The best introduction would be to say that I am interested in commercial/consultative applications of TSCM, in addition to being a budding student in signals and systems, where I intend to specialize in forensic analysis of both standard voice/data signals as well as underwater acoustics. Now that i've gotten that out of the way... Can anyone comment on the availability of similar facilities for commercial purposes a little farther east in Europe? Best, T. On Wed, Jul 04, 2001 at 12:33:45PM -0500, Aimee Farr wrote: > > http://news.independent.co.uk/digital/update/story.jsp?story=77374 > > Top firms retreat into bunker to ward off anarchists > By Steve Boggan > 11 June 2001 > > Some of Britain's biggest companies are running their internet operations on > systems installed in a 300ft-deep nuclear blast-proof bunker to protect > customers from violent anti-capitalist campaigners. > > They are renting space in hermetically sealed rooms capable of withstanding > a one Kiloton explosion, electro-magnetic "pulse bombs", electronic > eavesdropping and chemical and biological warfare. > > Hundreds of companies have already installed systems in The Bunker ≠ > formerly known as RAF Ash, outside Sandwich in Kent ≠ and dozens more are > understood to be queuing up for space. They have been driven underground by > the IRA bombings of Canary Wharf and Bishopsgate in London and, > increasingly, by concerns over the operations of anarchists behind > sophisticated protests such as the May Day anti-capitalist rallies. > > At stake is billions of pounds worth of business conducted over the > internet. Companies are concerned that while electronic security ≠ using > increasingly sophisticated encryption codes ≠ is gradually making customers > feel more confident about conducting credit-card transactions over the > internet, the physical side of e-business is still vulnerable. The fear is > that servers, the small electronic boxes through which customer traffic and > business transactions on the web are channelled, could be physically > vulnerable to theft, damage or sabotage. > > For companies conducting business solely over the internet, the loss of a > server could be catastrophic; while offline there can be no sales and no > income, and customers will go elsewhere. Records, too, are vulnerable to > attack, hacking or simple damage, resulting in shut-downs that could cost > even traditional companies millions of pounds. > > Now organisations such as Scottish Widows, BTCellnet, Richer Sounds and the > Bank Automated Clearance System ≠ which deals with inter-bank transactions ≠ > have acted, putting their e-business and confidential dealings out of harm's > way behind guards, barbed wire, dogs, electronic detection systems, millions > of tons of earth, 4m of concrete, pressurised air locks and rows of steel > doors up to 18in thick. > > "This isn't paranoia or fantasy, this is the future," said Dr Ian Angell, > professor of information systems at the London School of Economics and > author of The New Barbarian Manifesto. "There are sophisticated > anti-capitalists out there who feel a great deal of resentment against the > business world. These are the new Luddites and, given half a chance, they > would smash the machine to pieces." > > [...] > > New Barbarian Manifesto (I'm a dabbling futurist.) > http://www.fastcompany.com/online/39/ifaqs.html > http://www.businessknowhow.com/career/barbarian.htm ] > > *makes mental note: never say, "this isn't paranoia or fantasy...." > > Aimee Farr > mailto:aimfarr@p... > LAW OFFICE OF AIMEE FARR > Waco, Texas > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > -- 3309 From: Paolo Sfriso Date: Thu Jul 5, 2001 2:08am Subject: Anti-globalisation Hackers plan massive DOS and Virus attacks during the G-8 Anti-Globalisation Hackers plan massive DOS and Virus attacks on Government servers during the G-8 meeting to be held in Genoa on July 22nd. Threats have been also made to multinational firms and financial-banking corporations. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 paulsfriso@t... www.grupposit.com [Non-text portions of this message have been removed] 3310 From: zack <10-33@c...> Date: Thu Jul 5, 2001 4:13am Subject: Re: Digest Number 640 Thank you Sir, some people cannot imagine what this means to us................ At 08:43 AM 7/5/2001 +0000, you wrote: >Happy 4th July to all "Across the Pond". > >Craig visit http://www.copscops.com Join the Law Enforcement community http://anexa.com/lawenforcement/index.Ihtml Washington DC Police Department http://www.mpdc.org 3311 From: David Alexander Date: Fri Jul 6, 2001 9:39am Subject: Hanssen pleads guilty From the BBC web site: A former FBI agent accused of spying for Russia, Robert Hanssen, has pleaded guilty in exchange for escaping the death penalty. This is an appropriate resolution which we believe is beneficial to the government and to Mr Hanssen and his family Defence attorney Preston Burton The agent is accused of passing American secrets to Moscow over a period of 15 years, in exchange for more than $1.4m in cash and diamonds. He is now expected to face life imprisonment. US officials believe Mr Hanssen sold some of the nation's most closely guarded secrets to Moscow. They also hold him responsible for the deaths of at least two American double agents. One of his defence lawyers, Preston Burton, said he could not release other details of the deal: "Specific terms of the plea agreement are under seal." Reports suggest that the deal would allow Mr Hanssen's wife, Bonnie, and six children to receive benefits under his government pension. A BBC correspondent in Washington says the deal ensures there will be no trial and no airing of evidence potentially embarrassing to the US Government. Officials were concerned that a detailed account of Mr Hanssen's espionage would reveal the extent of damage done to national security and raise serious questions about the internal failings of the FBI and other security agencies. Our correspondent says the FBI now hopes to learn exactly what information Mr Hanssen sold to Moscow far from public view. The accused spy will be required to sit for interviews with the FBI, CIA and other intelligence officials so they can determine the extent of his activities. Mr Hanssen's lawyers had been negotiating for weeks on a deal that would allow him to reveal secrets he sold to Moscow, in exchange for the US Justice Department agreeing to a life term. The plea hearing was held at the Alexandria, Virginia, federal district court. The former agent had originally pleaded not guilty and a trial had been set for October. Mr Hanssen was arrested in February after allegedly dropping off classified material at a park near his home in suburban Virginia to be picked up by his Russian handlers. He was just a few years off retirement at the time of his arrest. A 21-count indictment alleges that Mr Hanssen compromised secrets related to satellites, early-warning systems, US means of defence or retaliation against large-scale nuclear attacks, communications intelligence and defence strategy. Mr Hanssen was charged with conspiracy to commit espionage, 19 counts of espionage and one count of attempted espionage. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 3312 From: Aimee Farr Date: Fri Jul 6, 2001 6:44pm Subject: Soundproofed doctors? I wish. Today, HHS Secretary Tommy Thompson issued the first of several guidance documents for the medical privacy regulation that went into effect on April 14, 2001. This guidance appears to address the hyperbole and misstatements generated by some health care organizations regarding the regulation. For example, the guidance specifically states that the privacy rule does not require soundproofing of rooms to reasonably safeguard oral communications of protected health information. http://www.hhs.gov/ocr/hipaa. ---- *laughter* Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR Waco, Texas 3313 From: James M. Atkinson, Comm-Eng Date: Fri Jul 6, 2001 8:50pm Subject: FBI Agent Began Spying for Russia in 1979 Friday July 6 4:14 PM ET FBI Agent Began Spying for Russia in 1979 http://dailynews.yahoo.com/h/nm/20010706/pl/crime_usa_spy_career_dc_1.html By Sue Pleming WASHINGTON (Reuters) - U.S. turncoat Robert Hanssen began spying for Moscow as early as 1979 and court documents released on Friday said he handed over top secret information that led to the deaths of at least two Russian spies. Hanssen, 57, pleaded guilty on Friday to 15 counts of spying for Moscow in a deal in which he promised to tell prosecutors whatever they wanted to know if they dropped their bid to push for the death penalty in his case. Included in the plea documents is a ``statement of facts'' signed by Hanssen and prosecutors, which details evidence against him and says both sides agreed if the case were to go to trial these facts would have been proven ``beyond a reasonable doubt.'' The statement lists ``dead drop'' sites where Hanssen left classified documents for Moscow and the secret codes he used to signal his Russian handlers when and where he would drop off packages wrapped in garbage bags for them. One of the most devastating pieces of evidence is information he gave the KGB, the former Soviet Union's intelligence agency, about three Soviet diplomats who were allegedly spying for the United States. In an October 1985 letter addressed to Victor Cherkashin, the KGB's counterintelligence chief at the Soviet Embassy in Washington D.C, at the time, Hanssen warns him that three Russians -- Boris Yuzhin, Sergey Motorin and Valeriy Martynov -- have been recruited by the United States. ``The information about Motorin and Martynov resulted in their identification by the USSR as agents of the United States and consequently in their deaths,'' said the statement. In addition, to ``further support my bona fides,'' Hanssen gave details of three then-recent Soviet defectors. The statement did not indicate who they were or what happened to them. For all this information, Hanssen demanded $100,000 and also set the ground rules for future contacts, including instructions on dates in which he said he would add six to stated months, dates and times and his handlers should deduct six to come up with the correct number. The court documents detail Hanssen's spying over a 15-year period from 1985 until his arrest on Feb. 18 while he was dropping off a package at a park near his home in Virginia. HANSSEN NEVER MET HIS HANDLERS But Hanssen's lawyer, Plato Cacheris, said his client first began spying for Russia in 1979 -- just three years after he took his oath of office as a special FBI (news - web sites) agent. He did not spy continuously over a 20-year period, but rather intermittently, said Cacheris, indicating remorse over what he was doing made him cease his activities for a while. Cacheris also represented another U.S. spy, former CIA agent Aldrich Ames who was sentenced to life for spying. What made this case interesting, said Cacheris, was that Hanssen controlled the situation and never met his handlers. ``I think that's striking because in all other espionage cases that I've been involved in -- we've been involved in -- there's usually a handler. There was not one in this case.'' Contained in the statement of facts are several letters written by Hanssen to the KGB in which he continually rebuffs their requests to meet him. ``No, I have decided. It must be on my original terms or not at all. I will not meet abroad or here,'' he says in one letter. In another mailed on or about Aug. 7, 1986, Hanssen complains he had found a site empty where he had expected to pick up a package. ``Scheduling is not simple for me because of frequent travel and wife ... My security concerns may seem excessive. I believe experience has shown them to be necessary,'' he wrote. MONEY A MOTIVATOR The motivation behind what pushed Hanssen to spy against his own country is not made clear in the court documents but Cacheris and prosecutors agree that money was probably the leading force behind his decision. Hanssen, a father of six, spent the money he received for spying on ``living expenses'', said Cacheris, refusing to give further details. Under the plea deal Hanssen has agreed to forfeit up to $1.4 million in assets paid to him or put aside for him by the Soviet union and its successor, the Russian Federation. Cacheris said his client had a premonition he was going to be arrested on Feb. 18, but went ahead anyway and dropped off his final package of classified documents. In a letter to the Russians on Feb. 18, Hanssen said he suspected ``bursting radio signal emanations from my vehicle.'' ``Something has aroused the sleeping tiger. Perhaps you know better than I,'' he wrote in a letter that was never received by his Russian handlers. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3314 From: Perry Myers Date: Fri Jul 6, 2001 11:57am Subject: Cell Jamming Anyone have any information on cell phone jamming usage at US restaurants? Perry D. Myers, CFE President & CEO E-mail: Perry@d... MSI Detective Services Myers Service, Inc. Corporate Headquarters 2076 N. Elston Ave. Suite 200 Chicago, IL. 60614-3940 Phone 773-342-8300 Facsimile 773-486-4430 Professional Investigators Since 1959 Investigations Nationwide 24 Hour Availability www.detectiveservices.com > For more information on our investigative services please visit our web > site at www.detectiveservices.com > > This e-mail is strictly confidential. If you receive this e-mail in error, > please forward immediately to info@d... > > > 3315 From: =wampyr= Date: Fri Jul 6, 2001 3:27pm Subject: Greetings Mr. Atkinson and list. Here is a free tone generator tool link. The program is tiny, and it runs flawlessly with -no- spyware. http://www.nch.com.au/action Look for the 'Tone Generator'. C. 1 year ago, Mr. Atkinson posted several New technology patents involving 'power line data transfer'. The company was out of Tx. somehere. The post infered that we would have access to 2.5 gig. per sec. data tranfer speeds, from a home computer, through the existing electric line network. I have not seen or heard anything about the emerging technology since then. I was wondering if the list has heard anything about this subject. Arigato, Nacht. == Those that travel long distances in isolation will defend themselves with strange arts. Shin shin, shin gan. The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. Any use, forwarding, printing or copying of this message is strictly prohibited. _____________________________________________________________ Yourname@i...
When you want them to remember!
http://burn.inhell.com 3316 From: Date: Thu Jul 5, 2001 10:02am Subject: National security needs boost sales of encryption products http://www.govexec.com/dailyfed/0701/070501td.htm Daily Briefing July 5, 2001 National security needs boost sales of encryption products From National Journal's Technology Daily Hacker and e-terrorist attacks are propelling sales of network encryption devices as the Internet increasingly becomes a target of cybervillains, according to a research report released Tuesday by the consulting company Frost & Sullivan. With the amount of classified information being transmitted via electronic networks on the rise, agencies like the National Security Agency and international bodies such as NATO are increasing network defense spending and modernizing equipment to ensure the privacy of their information, according to the study. The military in particular is showing an increased interest in wireless encryption. "Corporate espionage is an ever-present threat, and defense contractors require quality encryption for sensitive information," analyst Brooks Lieske said in a press release. "The 'better safe than sorry' perspective will have a very positive influence on demand." ********************************************************** John R. Angier II M-Group P.O. Box 721388 Norman, OK 73070-8070 USA w 405.321.1015 f 405.321.1259 "The threat is changing, It's a threat that is using a variety of sources to come at us, and it's a threat that you can't necessarily pin down in a (predictable) scenario." Lt. Col. Dane Reves, U.S. Army, Army Computer Emergency Response Team 3317 From: Date: Thu Jul 5, 2001 0:34pm Subject: Looking for S/A Am looking for a Cushman CE15 S/A or anything equivalent but like the CE15 because of th audio demod feature. U can reply in public or privately. Thanks John Fulford--WA4VPY 3318 From: DrPepper Date: Sat Jul 7, 2001 9:07am Subject: Re: Cell Jamming Other than the obvious, , , being illegal, , , , , No, I haven't heard anything other than the story about a church trying it. If I missed a call because of that, I'd sue the socks off 'em. Courtesy says that you put it on vibrate, or lower the ring volume, and take it outside if a call comes in. Common Courtesy, which not too many people have these days. (Grumpy Old Man mode off) -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack camera at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ==================================================== Perry Myers wrote: > Anyone have any information on cell phone jamming usage at US restaurants? > > Perry D. Myers, CFE > President & CEO > E-mail: Perry@d... > > MSI Detective Services > Myers Service, Inc. > Corporate Headquarters > 2076 N. Elston Ave. Suite 200 > Chicago, IL. 60614-3940 > Phone 773-342-8300 > Facsimile 773-486-4430 > > Professional Investigators Since 1959 > Investigations Nationwide > 24 Hour Availability > www.detectiveservices.com > > > For more information on our investigative services please visit our web > > site at www.detectiveservices.com > > > > This e-mail is strictly confidential. If you receive this e-mail in error, > > please forward immediately to info@d... > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3319 From: Marcelrf Date: Fri Jul 6, 2001 10:18pm Subject: Re: Cell Jamming Not legal here but Canada and Asian countries are seriously considering it. Perry Myers wrote: > Anyone have any information on cell phone jamming usage at US restaurants? > > Perry D. Myers, CFE > President & CEO > E-mail: Perry@d... > > MSI Detective Services > Myers Service, Inc. > Corporate Headquarters > 2076 N. Elston Ave. Suite 200 > Chicago, IL. 60614-3940 > Phone 773-342-8300 > Facsimile 773-486-4430 > > Professional Investigators Since 1959 > Investigations Nationwide > 24 Hour Availability > www.detectiveservices.com > > > For more information on our investigative services please visit our web > > site at www.detectiveservices.com > > > > This e-mail is strictly confidential. If you receive this e-mail in error, > > please forward immediately to info@d... > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 3320 From: DrPepper Date: Sat Jul 7, 2001 9:19am Subject: Re: Cell Jamming That's right, Marcel, , , , Not only that, but you can't keep the jamming signal just with your building or property, either. So, , , driving by on the street, , , jammed! -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my shack LIVE at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ========================================== Marcelrf wrote: > If you tried to call 911 and they could not hear you........LAWSUIT CITY!!! > > DrPepper wrote: > > > Other than the obvious, , , being illegal, , , , , > > No, I haven't heard anything other than the story about a church trying it. > > If I missed a call because of that, I'd sue the socks off 'em. > > Courtesy says that you put it on vibrate, or lower the ring volume, and take it > > outside if a call comes in. > > Common Courtesy, which not too many people have these days. > > (Grumpy Old Man mode off) > > -- > > Dr Pepper aka WB6GKI > > in the High Desert of California. > > Check out my LIVE Hamshack camera at: > > http://www1.iwvisp.com/DrPepper/ham/ham.htm > > > > ==================================================== > > > > Perry Myers wrote: > > > > > Anyone have any information on cell phone jamming usage at US restaurants? > > > > > > Perry D. Myers, CFE > > > President & CEO > > > E-mail: Perry@d... > > > > > > MSI Detective Services > > > Myers Service, Inc. > > > Corporate Headquarters > > > 2076 N. Elston Ave. Suite 200 > > > Chicago, IL. 60614-3940 > > > Phone 773-342-8300 > > > Facsimile 773-486-4430 > > > > > > Professional Investigators Since 1959 > > > Investigations Nationwide > > > 24 Hour Availability > > > www.detectiveservices.com > > > > > > > For more information on our investigative services please visit our web > > > > site at www.detectiveservices.com > > > > > > > > This e-mail is strictly confidential. If you receive this e-mail in error, > > > > please forward immediately to info@d... > > > > > > > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > -- > "NEXTEL1 IT'S NOT JUST NEXTEL" > Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 3321 From: James M. Atkinson, Comm-Eng Date: Sat Jul 7, 2001 10:27am Subject: Re: Soundproofed doctors? I wish. At 6:44 PM -0500 7/6/01, Aimee Farr wrote: >Today, HHS Secretary Tommy Thompson issued the first of several guidance >documents for the medical privacy regulation that went into effect on April >14, >2001. This guidance appears to address the hyperbole and misstatements >generated >by some health care organizations regarding the regulation. For example, >the >guidance specifically states that the privacy rule does not require >soundproofing of rooms to reasonably safeguard oral communications of >protected >health information. > >http://www.hhs.gov/ocr/hipaa. > >---- >*laughter* > >Aimee Farr >mailto:aimfarr@p... >LAW OFFICE OF AIMEE FARR >Waco, Texas Ok, but what about the doctors who bug their own examination rooms so as to facilitate "transcription" of their discussions with their patients? (I have personally seen this numerous times) The first time I came across it was when a doctor engaged my services to check a new office he was moving in to. The previous occupant of the building was also a doctor, and had installed multiple microphones and cameras in every inch of the office including the examination rooms, waiting rooms, etc. Since then I have performed numerous sweeps of various medical offices and in at least 25-35% of the cases the doctor has either a hard wired audio or video system installed, or carries a concealed wireless microphone and/or tape recorder. In a number of these cases the doctor is using a wireless system, which is of course the height of being indiscreet. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3322 From: James M. Atkinson, Comm-Eng Date: Sat Jul 7, 2001 10:29am Subject: Re: Cell Jamming Using any such "Jammer" is completely unlawful in the United States. -jma At 11:57 AM -0500 7/6/01, Perry Myers wrote: >Anyone have any information on cell phone jamming usage at US restaurants? > > >Perry D. Myers, CFE >President & CEO >E-mail: Perry@d... > >MSI Detective Services >Myers Service, Inc. >Corporate Headquarters >2076 N. Elston Ave. Suite 200 >Chicago, IL. 60614-3940 >Phone 773-342-8300 >Facsimile 773-486-4430 > >Professional Investigators Since 1959 >Investigations Nationwide >24 Hour Availability >www.detectiveservices.com -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3323 From: Aimee Farr Date: Sat Jul 7, 2001 7:27pm Subject: RE: Soundproofed doctors? I wish. jma wrote: > Ok, but what about the doctors who bug their own examination rooms so > as to facilitate "transcription" of their discussions with their > patients? (I have personally seen this numerous times) #1: I'm not into HIPAA, because it's just now moving past a policy/compliance issue. Low civil penalties. Many privacy people hate it. http://www.hhs.gov/ocr/hipaa/oral.html "Click on the mailbox to submit a question regarding the Privacy Rule." *click* *click* *click* Actually, they anticipate recording (slyly, like everything else HIPAA). -- The rule does not require covered entities to tape or digitally record oral communications, nor retain digitally or tape recorded information after transcription. But if such records are maintained and used to make decisions about the individual, they may meet the definition of "designated record set." For example, a health plan is not required to provide a member access to tapes of a telephone "advice line" interaction if the tape is only maintained for customer service review and not to make decisions about the member. --- However, this should surely give them pause, along with their privacy policies: Civil money penalties are $100 per violation, up to $25,000 per person, per year for each requirement or prohibition violated. Federal criminal penalties. Under HIPAA, Congress also established criminal penalties for knowingly violating patient privacy. Criminal penalties are up to $50,000 and one year in prison for obtaining or disclosing protected health information; up to $100,000 and up to five years in prison for obtaining protected health information under "false pretenses"; and up to $250,000 and up to 10 years in prison for obtaining or disclosing protected health information with the intent to sell, transfer or use it for commercial advantage, personal gain or malicious harm. --- Some might get fine print written consent, "to improve patient service" or "for transcription." (..that is just bs) Feinstein had a bill up a few years back to address this issue - I don't know what happened to it. Possibilities...Recording statutes, physician ethics, HIPPA (which goes beyond disclosure), state medical privacy bills, possible breach of fiduciary duty, deceptive trade practice...hm. Lawyers also record, despite the majority of ethical rulings that put us "above" recording statutes: http://www.hricik.com/Recording.html (ABA Comm. on Professional Ethics and Grievances, Formal Op. 337 (1974)(Predicated on rules against dishonesty, fraud, deceit, and misrepresentation, it is unethical -- even when legal under federal and state law and neither civilly or criminally punishable -- for attorneys secretly to record conversations.) MDs might have similar considerations. (BTW, this is now being put into question even in a prosecutorial context involving deceit in investigations, attorney supervision of covert investigations, etc. See Gatti, involving pretexting: http://www.osbar.org/Media/gatti.html ) Aside from the above, somebody might try to argue a breach common law fiduciary duty, even though there wasn't a disclosure. Another evolving theory is the use of deceptive trade practice protections to protect privacy in a customer context. If surreptitious - seems to fit. (Would I got to a spy-Doc? Not if I knew about it.) I did not know doctors...ahem. Eh, I'm still in Ch. 1 in The Black Book Of Knowledge. I've decided I'm not reading past Ch. 3. ~Aimee Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR Waco, Texas 3324 From: Aimee Farr Date: Sat Jul 7, 2001 7:35pm Subject: Blacklist gov contr rule dead http://www.law.com/cgi-bin/gx.cgi/AppLogic+FTContentServer?pagename=law/View &c=Article&cid=ZZZUOA11TOC&live=true&cst=1&pc=0&pa=0&s=News&ExpIgnore=true&s howsummary=0 (I'm sure that will snap. Cut and paste.) Blackballing the Blacklist Clinton contractor rule near death thanks to regulators, business Vanessa Blum Legal Times July 6, 2001 Just months after the swift reversal of workplace ergonomics regulations, another controversial Clinton-era reform may soon be history. The so-called blacklisting rule -- which would bar companies with patterns of legal violations from receiving lucrative government contracts -- will almost assuredly be wiped from the books, perhaps as soon as this month. [...] Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR Waco, Texas 3325 From: MIKE F. Date: Sun Jul 8, 2001 5:44am Subject: MORE SECURITY TOOLS This site has some good software. http://www.wilders.org/free_tools.htm Later4,mike f. Michael Fiorentino Master Links 4 Master Investigators http://ml4mi.com Syracuse,NY 13206-2945 3326 From: A Grudko Date: Sun Jul 8, 2001 5:06am Subject: Fw: Cell Jamming > -- Original Message -- > From: DrPepper > > That's right, Marcel, , , , > > Not only that, but you can't keep the jamming signal just with your > building or > > property, either. > > So, , , driving by on the street, , , jammed! > > For how long? > > I find that moving my GSM cell phone 2cm can switch cells and converts the > signal from 'hfsetdlkbydese' to 'Hi Dad'. Was I being jammed? - I doubt it; > we're just in the early days of cellular communications. > > If a downtown theatre blocks the cellular calling frequency in an average > 100 mtr radius and I drive by at 60 kph I'll pass through that block in > about a second. > > Andy Grudko. D.P.M., Grad I.S, (S.A.) > Grudko Associates - Crime investigation, intelligence and protection > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel. Agents in 41 countries - www.grudko.com - (+27 11) 465 > 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SAMLF, SCIP (Past SA Chairman), > UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom - "When you need it done right - > first time" > > 3327 From: Marcelrf Date: Sat Jul 7, 2001 9:15am Subject: Re: Cell Jamming If you tried to call 911 and they could not hear you........LAWSUIT CITY!!! DrPepper wrote: > Other than the obvious, , , being illegal, , , , , > No, I haven't heard anything other than the story about a church trying it. > If I missed a call because of that, I'd sue the socks off 'em. > Courtesy says that you put it on vibrate, or lower the ring volume, and take it > outside if a call comes in. > Common Courtesy, which not too many people have these days. > (Grumpy Old Man mode off) > -- > Dr Pepper aka WB6GKI > in the High Desert of California. > Check out my LIVE Hamshack camera at: > http://www1.iwvisp.com/DrPepper/ham/ham.htm > > ==================================================== > > Perry Myers wrote: > > > Anyone have any information on cell phone jamming usage at US restaurants? > > > > Perry D. Myers, CFE > > President & CEO > > E-mail: Perry@d... > > > > MSI Detective Services > > Myers Service, Inc. > > Corporate Headquarters > > 2076 N. Elston Ave. Suite 200 > > Chicago, IL. 60614-3940 > > Phone 773-342-8300 > > Facsimile 773-486-4430 > > > > Professional Investigators Since 1959 > > Investigations Nationwide > > 24 Hour Availability > > www.detectiveservices.com > > > > > For more information on our investigative services please visit our web > > > site at www.detectiveservices.com > > > > > > This e-mail is strictly confidential. If you receive this e-mail in error, > > > please forward immediately to info@d... > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 3328 From: James M. Atkinson, Comm-Eng Date: Sun Jul 8, 2001 8:21am Subject: Report: Mexican attorney general's office uncovers spy Report: Mexican attorney general's office uncovers spy MEXICO CITY, Mexico (AP) -- Agents of the Mexican Attorney General's office investigating a kidnapping uncovered a network of political espionage based in the capital, a Mexican newspaper reported Saturday. Preliminary investigations showed that members of the network were spying for "an institution or political group" and had no links to official investigative agencies such as the Center of Investigations and National Security or the National Center for Drug Control, the daily newspaper Jornada reported on its front page. The newspaper quoted sources as saying that authorities had dismantled the network's operations center in Mexico City and had detained at least one person. The Attorney General's office planned to announce an official statement later Saturday. Jornada reported that federal agents detained a suspected member of a kidnapping ring who possessed recordings that led them to suspect the network existed. Fears and allegations of espionage have abounded in Mexico. In the past two years, two governors, a former government secretary who went on to become Mexico City mayor, and a Mexico City councilor have complained publicly that their telephones were tapped, offices bugged or their movements recorded. Last September, just a little more than two months after President Vicente Fox's historic victory brought an end to 71 years of one-party rule, newspapers obtained telephone conversations that had been recorded between Fox and First Lady Martha Sahagun, who at the time was press chief of his campaign. The newspaper that broke the story said the conversations were illegally recorded by government intelligence and national security agencies prior to Fox's election as part of a "plot" to benefit his main opponent, Francisco Labastida, of the then-ruling Institutional Revolutionary Party, or PRI. Government agencies denied any involvement, but it is widely known that Mexico's federal intelligence agency, the Center for Investigation and National Security, for decades conducted illegal spying and political intimidation. As part of a broad campaign against corruption and crime, Fox's administration announced earlier this year that it would centralize federal police under a single command and separate law enforcement and spying agencies from the once-omnipresent Interior Department. National Security Adviser Adolfo Aguilar Zinser said the Center for Investigation and National Security henceforth would concentrate solely on combating organized crime. In October 2000, national television network Televisa released taped telephone conversations between the brother of ex-President Carlos Salinas de Gortari, Raul Salinas, and his sister, who spoke of millions of dollars in Swiss bank accounts that the ex-president allegedly knew about. Some speculated publicly that the tapes had been leaked by the administration of then-President Ernesto Zedillo in attempt to get government officials getting revenge for Salinas' book in which he accused Zedillo of being responsible for the devastating peso crisis of 1995. Zedillo's administration vehemently denied any involvement. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 3329 From: Miguel Puchol Date: Sun Jul 8, 2001 2:25pm Subject: RE: Cell Jamming Well, I think there are grey areas, as with a lot of other subjects...my personal views: - Hospitals have a good cause to jam cell frequencies, as they can interfere with life-support equipment. Also, if you had to call 911 from within a hospital, you'd be a bit dumb... - Restaurants, cinemas, etc. I think cannot be allowed to jam cell freqs, but rather than for ethical reasons or because lawsuits will fly back and forth (remember when we didn't have cellphones, life was about the same, it's just that now you can reach and be reached easier...). The reason not to do it is that some form of licensing and regulation should be created, and to enforce it would be quite difficult - so then everyone would be getting jammers, and that I think is not acceptable. For a cinema, for example, there are devices that monitor the uplink band of the cell system, and when they detect a signal within it's coverage area, turn on a sign. If you placed a couple of these luminous signs at the sides of the screen, the problem could be almost solved (there's always going to be the guy who ignores any form of social etiquette). As an off-TSCM-topic but on-GSM-topic comment, I will be trying a GSM repeater in about 10 days, if anyone is interested in the results contact me. Basically consists of two directional antennas and an indoor transceiver. Cheers all, Mike > -----Mensaje original----- > De: Marcelrf [mailto:Marcelrf@B...] > Enviado el: sabado, 07 de julio de 2001 16:15 > Para: DrPepper > CC: Perry Myers; TSCM (E-mail) > Asunto: Re: [TSCM-L] Cell Jamming > > > If you tried to call 911 and they could not hear > you........LAWSUIT CITY!!! > > DrPepper wrote: > > > Other than the obvious, , , being illegal, , , , , > > No, I haven't heard anything other than the story about a > church trying it. > > If I missed a call because of that, I'd sue the socks off 'em. > > Courtesy says that you put it on vibrate, or lower the ring > volume, and take it > > outside if a call comes in. > > Common Courtesy, which not too many people have these days. > > (Grumpy Old Man mode off) > > -- > > Dr Pepper aka WB6GKI > > in the High Desert of California. > > Check out my LIVE Hamshack camera at: > > http://www1.iwvisp.com/DrPepper/ham/ham.htm > > > > ==================================================== > > > > Perry Myers wrote: > > > > > Anyone have any information on cell phone jamming usage at US > restaurants? > > > > > > Perry D. Myers, CFE > > > President & CEO > > > E-mail: Perry@d... > > > > > > MSI Detective Services > > > Myers Service, Inc. > > > Corporate Headquarters > > > 2076 N. Elston Ave. Suite 200 > > > Chicago, IL. 60614-3940 > > > Phone 773-342-8300 > > > Facsimile 773-486-4430 > > > > > > Professional Investigators Since 1959 > > > Investigations Nationwide > > > 24 Hour Availability > > > www.detectiveservices.com > > > > > > > For more information on our investigative services please > visit our web > > > > site at www.detectiveservices.com > > > > > > > > This e-mail is strictly confidential. If you receive this > e-mail in error, > > > > please forward immediately to info@d... > > > > > > > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > -- > "NEXTEL1 IT'S NOT JUST NEXTEL" > Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3330 From: James M. Atkinson, Comm-Eng Date: Sun Jul 8, 2001 7:58pm Subject: Why we use Federal Express Good help is so hard to find, http://www.tscm.com/TSCMsherpa.jpg This is why we use Federal Express. -jma -- ----------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ----------------------------------------------------------------------- Sed quis custodiet ipsos Custodes? The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ----------------------------------------------------------------------- 3331 From: Steve Whitehead Date: Sun Jul 8, 2001 11:50pm Subject: INTEREST IN YOUR SYSTEMS Received this enquiry from Texas the US. Would appreciate it if the US members on the list or those from Texas help us out here. Regards Steve Whitehead E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa TSCM Services URL : http://www.tscm.co.za ----- Original Message ----- From: To: Sent: Monday, July 09, 2001 4:44 AM Subject: Re: INTEREST IN YOUR SYSTEMS > I AM SEARCHING FOR COUNTER SURVEILLANCE AND COVERT SURVELLANCE EQUIPMENT. > THIS INCLUDES ALL TYPE OF BUGGING DEVICE DETECTORS, AUTOMOBILE AND PERSONAL > GPS TRACKING SYSTEMS, VIDEO AND AUDIO SURVEILLANCE EQUIPMENT, COMPUTER > (INTERNET ACCESIBLE, MULTIPLE LOCATION MONITORING) CONTROLLED OFFICE OR HOME > SURVEILLANCE SYSTEMS, DETECTORS OF LASER, MICROWAVE, RF, UHF, ETC... . I AM > INTERESTED IN ALL TYPES OF EQUIPMENT BECAUSE I AM CURRENTLY CONSIDERING AND > RESEARCHING THE LAWS PERTAINING TO THE USE, POSSESION, SALE, RENTAL, AND > OFFERING SERVICES FOR WHICH THIS EQUIPMENT MAY BE USED. I AM INTERESTED IN > STARTING A BUSINESS IN THIS INDUSTRY AND FORMING BUSINESS RELATIONSHIPS WITH > MANUFACTURERS AND DISTRIBUTORS OF THIS TYPE OF EQUIPMENT. I AM IN THE > RESEARCH STAGE OF MY INTEREST OF ENTERING THIS INDUSTRY BECAUSE I BELEIVE IT > IS A PROFITABLE AND IN MY CASE NO LOCAL COMPETITION IS AROUND. THE TIME TO > START IS NOW AND ANY AND ALL HELP WOULD BE APPRECIATED. I HOPE YOU CAN HELP. > I AM NOT SPECIFIC AS TO A PARTICULAR PRODUCT BECAUSE I NEED INFORMATION ON > ALL TYPES OF EQUIPMENT AND LAWS IN ORDER TO DECIDE WHETHER IT IS A GOOD, > LEGAL, AND PROFITABLE BUSINESS VENTURE. THANK YOU IN ADVANCE FOR YOUR HELP IF YOU HAVE A CATALOGUE PLEASE MAIL TO J.E.C. 502 ENTERPRISE, LAREDO, TEXAS > 78045. ALSO ANY INFORMATION REGARDING THE ADMISSIBIITY OF ANY OF YOUR > PRODUCTS TO THE UNITED STATES. IF YOU DON;T HAVE A CATALOGUE PLEASE E-MAIL > BACK . IF YOU HAVE ANY INFORMATION ON DEALER PRICING OR WHOLESALE PRICING AND INFOMATION. THANK YOU. From: Gregory Horton Date: Fri Jul 4, 2003 11:33am Subject: Re: let's celebrate This is the perfect reason why they include the delete button on our computers. Greg Horton kondrak wrote: > > > > > > >As we go out to celebrate our freedom this 4th of July, let's go over > a few > >things to make your celebration a success. > > > >Before leaving home make sure you check the color coded Homeland Security > >alert status. Be especially careful if it is orange or red. Don't worry > >about yellow. It's always yellow. > > > >Be aware of your surroundings at all times. New Yorkers, in particular, > >watch out for those pesky mushroom clouds. > > > >Don't use any illegal fireworks in your 4th Celebration. It is for > your own > >safety. And the founding father's implemented a government to protect you > >from yourselves. Didn't they? Besides, fireworks are explosive > devices and > >you might be considered a terrorist with weapons of mass > destruction. And > >although the government can't find any in Iraq, you can rest assured they > >will find them in your car trunk. But don't worry, getting arrested, > >imprisoned indefinitely without formal charges, and a 5 year wait > before the > >secret tribunal trial per the Patriot Act is a breeze. It's that secret > >summary execution that should make you nervous. > > > >Make sure you are buckled up in your seat belts, there will be roadblocks > >and checkpoints to make sure you comply. It is for the children. > > > >If you are an airline employee, lighten up for the holiday, you can > always > >look for a job tomorrow. Maybe you could transfer over to a Federal > Airport > >Security Screener job. Big demand for those jobs and you don't have > to be > >smart. > > > >If you are a Haliburton employee, then celebrate, you probably have a > raise > >coming from the Iraqi contract windfall. > > > >If celebrating on any public property, > >make no mention or relgious ideals. > >Government is god there. > >You will be aprehended. > > > >Have your papers ready as you approach the holiday police checkpoints. > > > >Don't criticize the President or other government officials, you > might be in > >violation of the Patriot Act and considered a possible terrorist. > > > >Don't mention the Constitution in any district court or you could be > held in > >contempt. > > > >If your children get out of line this holiday, do not discipline them, or > >they may be kidnapped by the Dept. of Social Services and held > hostage until > >you receive approved psychological therapy and are deemed acceptable. > > > >Show compassion this Independence Day by bringing an illegal immigrant to > >your celebration or by hugging a tree. > > > >If an election is occurring in your locality within the next 90 days, > do not > >talk about or publicly support any candidate, as that is no longer > lawful. > >Keep your mouth shut. > > > >If an officer asks to search your vehicle at the "seat belt" checks, > do not > >be belligerent and demand a search warrant. Standing up for your fourth > >amendment rights is anti-social and not in tune with the new American > way. > >Are you with Al Quada or something? > > > >Do not get upset when the searching officer will not help you pick up > your > >belongings that he has strewn all over the highway as he searched your > >vehicle. It is not in his job description and complaining will get you > >charged with obstructing justice. > > > >Keep your guns at home. You are not going hunting and besides, What on > >earth do guns have to do with American Independence? Better yet, > turn your > >guns into the authorities to let them know that you are a true patriotic > >American. > > > >If celebrating at the mall in Washington DC. you are probably safe as the > >mall is now monitored by hundreds of surveillance cameras, watched by > >federal security forces. Don't do anything that you wouldn't want > them to > >see. > > > >Bring lots of cash with you, there will be many taxes, fines, and fees to > >pay as you celebrate your freedoms this day. > > > >Do not leave home without your driver's license, social security > card, birth > >certificate, welfare card, medicare card, medical records, W-2 Form, > and two > >others forms of ID. You may be asked for them at the police checkpoints. > >Better yet, get micro-chipped, and avoid the hassle of carrying > around your > >papers. > > > >Bring your library card, the FBI may ask you for it. > > > >Do not put any "anti-government" bumper stickers on your car. > Especially not > >anything about the right to keep and bear arms. Police have been > trained by > >the FBI in "bumper sticker profiling". > >This attracts their attention at the check points, and makes you look > like a > >terrorist. > > > >With regard to "bumper sticker profiling" you should be especially > aware of > >the fact that "They will get my gun, when they pry it from my cold dead > >fingers" is no longer mere semantics. At WACO, and at RUBY RIDGE, > >we learned that they WILL kill you to take your guns > > > >ALSO, be careful not to have any unauthorized THOUGHTS. > >There are now serious penalties for "thought crime". > >Be aware that "civil forfeiture" laws make it possible to take > anything that > >you own, by alleging that it was "intended" to be used for the > commission of > >a crime. This could include transporting or storing a gun. > >If "civil forfeiture" proceedings are initiated against you, > >then you will have the burden of proof, > >to show that your thoughts were in compliance with government standards. > > > >If traveling by air this Independence Day, do not give the airport > screeners > >a hard time. They are feeling you up and molesting your daughter and > wife > >for the security of America. If you complain you could be arrested. You > >don't support Bin Laden do you? > > > >Keep an eye on your fellow Americans as you celebrate this 4th of > July. If > >you see anything supicious, take notes so that when you get home you can > >call and report them to the Homeland Security Office. And remember > you are > >not a nosey snitch, you are a great American Patriot. > > > >Do not mention the signers of the Declaration of Independence this 4th of > >July. Mentioning these white subversive terrorists is not popular > and could > >get you in big trouble. Besides what do these guys have to do with > the 4th > >of July anyway? > > > >Do not leave home without one or more little plastic American flags > made by > >political slaves in Communist China. Make sure you have one flying > from the > >antennae of your vehicle. You don't want to seem un-American do you? > > > >Do not take a copy of the Declaration of Independence with you as it > >advocates the overthrow of tyrannical government. It is a terrorist > >document and will be confiscated at the holiday police checkpoints. Same > >advice for the Constitution. > > > >And remember, as you leave home for your 4th of July outing, that the > second > >you stepped out of your door that you probably broke hundreds of federal, > >state, and local laws that you are probably unaware of. However, if > you tow > >the line, you will not be charged. > > > >Don't even think about taxes on this great day. The 50 per cent > government > >confiscation of your income at the threat of imprisonment or at the > point of > >a gun should not even cross your mind as you revel in your freedom. > After > >all, April 15th is a long way off. > > > >And whatever you do, do not let on that you really know that true freedom > >died a long time ago in America, just have fun for the day and then > go home > >and stick your head back in the sand and pretend America is not > becoming a > >socialist police state. > > > >Now go out there and celebrate your freedom and liberty and have a great > >sanitized, politically correct, and government approved and authorized > >Independence Day! > > > >If you have a few decades with nothing better to do, study up on > >"administrative law". Laws are now made by the unelected bureaucrats, in > >hundreds of "administrative agencies". If you are charged with > violating one > >of these "laws" you will not get a trial by a jury of your peers. You > will > >be tried by the agency that made the charge. > > > >I hope this message gets past the Department of Homeland security > approved > >internet filter. > >How else can they protect us from unauthorized thought? > > > >Now go out and celebrate your independence and have a great > Independence Day! > > > >===== > > > >HOMELAND SECURITY ADVISORY > >This transmission screened prior to receipt by addressee pursuant to > >applicable sections of the USA PATRIOT Act. > > > >------------------ > >-InfoWarz > >None are so hopelessly enslaved as those who falsely believe they are > free. > >Our forefathers are crying. > >Our forefathers are angry. > >Our forefathers are loading their muskets and heading for The Green. > >America........Wake the hell up. > > > Yahoo! Groups Sponsor > ADVERTISEMENT > [Click Here!] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service > . [Non-text portions of this message have been removed] 7534 From: Enum Date: Thu Jul 3, 2003 0:56am Subject: Government CCTV Report The GAO recently released a report on CCTV. Included are sections on government policies & best practices for implementing CCTV as well as images of CCTV control rooms in Washington DC. Link: http://www.gao.gov/new.items/d03748.pdf [Non-text portions of this message have been removed] 7535 From: Date: Fri Jul 4, 2003 8:20am Subject: Americans your Independence is almost over Happy Independence Day America but celebrate while you can, us British will be back soon and this time for good. Coffee will be off the menu We were busy fighting Napoleon last time, King George had gone mad, so our soldiers in America were wearing bright red coats [I always found that a bit strange] Happy Holiday Dave TSCM [Technical Surveillance and Countermeasures] David McGauley Demtec Electronic Surveillance and Counter Measures Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L39 0HF UK 01695 558544 07866206112 demtec@a... [Non-text portions of this message have been removed] 7536 From: Ocean Group Date: Sat Jul 5, 2003 9:31am Subject: Re: let's celebrate Yeah Kondrak, How could you send that? Don't you know how many governemnt employees are on this list, how many law enforcement and military members too? You know how sensitive they are to criticism. Shame on you for bringing all that stuff up.I totally agree with Gregory that criticisms of such a nation should be deleted immediately. ________________________________________________________________________ ________________________________________________________________________ Message: 1 Date: Fri, 04 Jul 2003 09:33:26 -0700 From: Gregory Horton Subject: Re: let's celebrate This is the perfect reason why they include the delete button on our computers. Greg Horton kondrak wrote: > > > > > > >As we go out to celebrate our freedom this 4th of July, let's go over > a few > >things to make your celebration a success. > > > >Before leaving home make sure you check the color coded Homeland Security > >alert status. Be especially careful if it is orange or red. Don't worry > >about yellow. It's always yellow. > > > >Be aware of your surroundings at all times. New Yorkers, in particular, > >watch out for those pesky mushroom clouds. > > > >Don't use any illegal fireworks in your 4th Celebration. It is for > your own > >safety. And the founding father's implemented a government to protect you > >from yourselves. Didn't they? Besides, fireworks are explosive > devices and > >you might be considered a terrorist with weapons of mass > destruction. And > >although the government can't find any in Iraq, you can rest assured they > >will find them in your car trunk. But don't worry, getting arrested, > >imprisoned indefinitely without formal charges, and a 5 year wait > before the > >secret tribunal trial per the Patriot Act is a breeze. It's that secret > >summary execution that should make you nervous. > > > >Make sure you are buckled up in your seat belts, there will be roadblocks > >and checkpoints to make sure you comply. It is for the children. > > > >If you are an airline employee, lighten up for the holiday, you can > always > >look for a job tomorrow. Maybe you could transfer over to a Federal > Airport > >Security Screener job. Big demand for those jobs and you don't have > to be > >smart. > > > >If you are a Haliburton employee, then celebrate, you probably have a > raise > >coming from the Iraqi contract windfall. > > > >If celebrating on any public property, > >make no mention or relgious ideals. > >Government is god there. > >You will be aprehended. > > > >Have your papers ready as you approach the holiday police checkpoints. > > > >Don't criticize the President or other government officials, you > might be in > >violation of the Patriot Act and considered a possible terrorist. > > > >Don't mention the Constitution in any district court or you could be > held in > >contempt. > > > >If your children get out of line this holiday, do not discipline them, or > >they may be kidnapped by the Dept. of Social Services and held > hostage until > >you receive approved psychological therapy and are deemed acceptable. > > > >Show compassion this Independence Day by bringing an illegal immigrant to > >your celebration or by hugging a tree. > > > >If an election is occurring in your locality within the next 90 days, > do not > >talk about or publicly support any candidate, as that is no longer > lawful. > >Keep your mouth shut. > > > >If an officer asks to search your vehicle at the "seat belt" checks, > do not > >be belligerent and demand a search warrant. Standing up for your fourth > >amendment rights is anti-social and not in tune with the new American > way. > >Are you with Al Quada or something? > > > >Do not get upset when the searching officer will not help you pick up > your > >belongings that he has strewn all over the highway as he searched your > >vehicle. It is not in his job description and complaining will get you > >charged with obstructing justice. > > > >Keep your guns at home. You are not going hunting and besides, What on > >earth do guns have to do with American Independence? Better yet, > turn your > >guns into the authorities to let them know that you are a true patriotic > >American. > > > >If celebrating at the mall in Washington DC. you are probably safe as the > >mall is now monitored by hundreds of surveillance cameras, watched by > >federal security forces. Don't do anything that you wouldn't want > them to > >see. > > > >Bring lots of cash with you, there will be many taxes, fines, and fees to > >pay as you celebrate your freedoms this day. > > > >Do not leave home without your driver's license, social security > card, birth > >certificate, welfare card, medicare card, medical records, W-2 Form, > and two > >others forms of ID. You may be asked for them at the police checkpoints. > >Better yet, get micro-chipped, and avoid the hassle of carrying > around your > >papers. > > > >Bring your library card, the FBI may ask you for it. > > > >Do not put any "anti-government" bumper stickers on your car. > Especially not > >anything about the right to keep and bear arms. Police have been > trained by > >the FBI in "bumper sticker profiling". > >This attracts their attention at the check points, and makes you look > like a > >terrorist. > > > >With regard to "bumper sticker profiling" you should be especially > aware of > >the fact that "They will get my gun, when they pry it from my cold dead > >fingers" is no longer mere semantics. At WACO, and at RUBY RIDGE, > >we learned that they WILL kill you to take your guns > > > >ALSO, be careful not to have any unauthorized THOUGHTS. > >There are now serious penalties for "thought crime". > >Be aware that "civil forfeiture" laws make it possible to take > anything that > >you own, by alleging that it was "intended" to be used for the > commission of > >a crime. This could include transporting or storing a gun. > >If "civil forfeiture" proceedings are initiated against you, > >then you will have the burden of proof, > >to show that your thoughts were in compliance with government standards. > > > >If traveling by air this Independence Day, do not give the airport > screeners > >a hard time. They are feeling you up and molesting your daughter and > wife > >for the security of America. If you complain you could be arrested. You > >don't support Bin Laden do you? > > > >Keep an eye on your fellow Americans as you celebrate this 4th of > July. If > >you see anything supicious, take notes so that when you get home you can > >call and report them to the Homeland Security Office. And remember > you are > >not a nosey snitch, you are a great American Patriot. > > > >Do not mention the signers of the Declaration of Independence this 4th of > >July. Mentioning these white subversive terrorists is not popular > and could > >get you in big trouble. Besides what do these guys have to do with > the 4th > >of July anyway? > > > >Do not leave home without one or more little plastic American flags > made by > >political slaves in Communist China. Make sure you have one flying > from the > >antennae of your vehicle. You don't want to seem un-American do you? > > > >Do not take a copy of the Declaration of Independence with you as it > >advocates the overthrow of tyrannical government. It is a terrorist > >document and will be confiscated at the holiday police checkpoints. Same > >advice for the Constitution. > > > >And remember, as you leave home for your 4th of July outing, that the > second > >you stepped out of your door that you probably broke hundreds of federal, > >state, and local laws that you are probably unaware of. However, if > you tow > >the line, you will not be charged. > > > >Don't even think about taxes on this great day. The 50 per cent > government > >confiscation of your income at the threat of imprisonment or at the > point of > >a gun should not even cross your mind as you revel in your freedom. > After > >all, April 15th is a long way off. > > > >And whatever you do, do not let on that you really know that true freedom > >died a long time ago in America, just have fun for the day and then > go home > >and stick your head back in the sand and pretend America is not > becoming a > >socialist police state. > > > >Now go out there and celebrate your freedom and liberty and have a great > >sanitized, politically correct, and government approved and authorized > >Independence Day! > > > >If you have a few decades with nothing better to do, study up on > >"administrative law". Laws are now made by the unelected bureaucrats, in > >hundreds of "administrative agencies". If you are charged with > violating one > >of these "laws" you will not get a trial by a jury of your peers. You > will > >be tried by the agency that made the charge. > > > >I hope this message gets past the Department of Homeland security > approved > >internet filter. > >How else can they protect us from unauthorized thought? > > > >Now go out and celebrate your independence and have a great > Independence Day! > > > >===== > > > >HOMELAND SECURITY ADVISORY > >This transmission screened prior to receipt by addressee pursuant to > >applicable sections of the USA PATRIOT Act. > > > >------------------ > >-InfoWarz > >None are so hopelessly enslaved as those who falsely believe they are > free. > >Our forefathers are crying. > >Our forefathers are angry. > >Our forefathers are loading their muskets and heading for The Green. > >America........Wake the hell up. > > > Yahoo! Groups Sponsor > ADVERTISEMENT > [Click Here!] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service > . [Non-text portions of this message have been removed] ________________________________________________________________________ ________________________________________________________________________ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ --- Incoming mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.491 / Virus Database: 290 - Release Date: 18/06/2003 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.491 / Virus Database: 290 - Release Date: 18/06/2003 7537 From: James M. Atkinson Date: Sat Jul 5, 2003 10:30pm Subject: How "Uncle Joe" Bugged FDR http://www.cia.gov/csi/studies/vol47no1/article02.html The Lessons of History How "Uncle Joe" Bugged FDR [4]Gary Kern In recent years, the statesmanship of President Franklin Delano Roosevelt, in particular his handling of Soviet affairs, has come under attack in historical studies. The situation has reached such a pass that even a psychiatrist who examined FDR's medical records has opined that toward the end of World War II the US President ceded the better part of Eastern Europe to Soviet dictator Joseph Stalin because he was "gripped by clinical depression.[5]1" Certainly the President's moves can be questioned, but questionable policy can be founded on factors other than low spirits--which, in point of fact, were not generally observed in FDR at the time. Rather, the operant factors were: the President's supreme confidence in his own powers of persuasion, his profound ignorance of the Bolshevik dictatorship, his projection of humane motives onto his Soviet counterpart, his determined resistance to contradictory evidence and advice, and his wishful thinking based on geopolitical designs--mindsets supported and reinforced by his appointed advisors. Taken together, these factors produced a false view of US-Soviet relations and inspired policy that had only superficial contact with reality. As an instance in point, they induced the President of the United States to do the unthinkable: walk into a surveillance trap, not once, but twice, and willingly. Normally, in order to avoid the possibility of intelligence leaks and personal embarrassment, as well as to ensure physical safety, traveling US presidents stay in their own country's embassies or other diplomatic buildings, whose tables and walls have been swept by instruments able to discover listening devices. But when Roosevelt went abroad to meet Stalin, he wanted very badly to please him, holding him to be a key figure in the postwar division of powers, and so did not insist on such accommodations. Consequently, at the conference in Teheran (November 1943) and again at Yalta (February 1945), he stayed in Soviet quarters and was bugged like no other American president in history. FDR's Acquaintance With Bugs Roosevelt was no stranger to technical surveillance. In 1939, piqued by an incident in which he believed that the press had deliberately misquoted him, he had a secret recording system installed in the White House as a means of self-protection. Since German tape-recording technology had not yet found its way to America, something had to be invented. FDR's assistants took the problem to David Sarnoff of the Radio Corporation of America. In June 1940, Sarnoff personally presented the President with a "continuous-film recording machine" that made use of motion-picture sound film. Set in a wire cage in a room beneath the Oval Office, the device was activated either by the President using a switch inside his desk drawer or by his technician down below throwing a switch on the machine itself. A single microphone poked out through a lamp on FDR's desk. Between 23 August and 8 November, 1939, during his campaign for an unprecedented third term, the President recorded fourteen of twenty-one press conferences held in his office, plus a number of private conversations, the latter possibly by mistake. It seems that he never used the system to entrap anyone, and no one knows why he stopped it. Relatively innocent by today's standards of invasion, it nevertheless demonstrates that the President was acquainted with listening devices before his conferences with Stalin.[6]2 In the very year of the Teheran conference, he was reminded of hidden microphones when watching Mission to Moscow, a movie based on a book of that title by Joseph E. Davies, America's second Ambassador to the Union of Soviet Socialist Republics. [7]3 Produced in 1943 with the President's blessing, possibly even at his explicit request, this blatant piece of propaganda was designed to drum up public enthusiasm for a political shotgun wedding: It colored Stalin as a simple, practical man with whom one could do business; rhapsodized about Soviet construction, government, and politics; and justified the Soviet blood purges, the Moscow show trials, and Stalin's two-year pact with Hitler, which had ended when Hitler turned the tables on Stalin and invaded the Soviet Union in June 1941. Attempting to forestall any criticism of the Soviet system, Davies even contrived to make a brief for bugging. In one scene, set in the American Embassy in Moscow, the Ambassador's assistants warn him of listening devices, but he rebukes them severely: I say nothing outside the Kremlin that I wouldn't say to Stalin's face. Do you? . . . We're here in a sense as guests of the Soviet government, and I'm going to believe they trust the United States as a friend until they prove otherwise. Is that clear? When the assistant persists that still, after all, there may be microphones, Davies, played with aplomb by FDR's favorite actor, Walter Huston, cuts him off: "Then let 'em hear! We'll be friends that much faster!"[8]4 This cinematic scene was based on an actual incident. In 1937, when a bug was discovered directly over the Ambassador's desk at the US Embassy in Moscow, the real Davies laughed it off. If the Soviets wanted to listen in, he told his incredulous staff--which included George Kennan, Charles Bohlen, and other skilled State Department diplomats--they would only obtain proof of America's sincere desire to cooperate with them.[9]5 FDR strongly approved of the film. In his assessment of Soviet politics, he was much closer to Davies, his second Ambassador, than to his first, William C. Bullitt.[10]6 Contrary to Davies, Bullitt never missed an opportunity to warn FDR of Stalin's treachery. In a typical exchange, Roosevelt responded: Bill, I don't dispute your facts; they are accurate. I don't dispute the logic of your reasoning. I just have a hunch that Stalin is not that kind of man. Harry [Hopkins] says he's not and that he doesn't want anything but security for his country, and I think if I give him everything I possibly can and ask for nothing in return, noblesse oblige, he won't try to annex anything and will work with me for a world of democracy and peace.[11]7 FDR's hunch, Hopkins' glowing reports on Stalin, and Davies' boundless trust in the Soviet regime were the President's counters to the admitted facts about Hitler's recent ally, history's greatest mass-murderer, and the sole ruler of a party and state dedicated to worldwide communism.[12]8 Missions to Moscow Certain that he had the correct line on Stalin, FDR desired to meet him, turn his famous charisma on him, and decide world affairs with him on a personal basis. As early as March 1942, he wrote British Prime Minister Winston Churchill: I think I can personally handle Stalin better than either your Foreign Office or my State Department. Stalin hates the guts of all your top people. He thinks he likes me better, and I hope he will continue to do so.[13]9 Guided by this conviction, FDR steered a straight-line policy on "Russia," as he unfailingly and mistakenly called the Soviet Union: unswerving conciliation of Stalin, capped off with a face-to-face meeting. To advance this policy, he relied heavily on Davies. In March 1943, when the Ambassador to the USSR at the time, Adm. William H. Standley, complained in Moscow that the Soviet authorities had concealed the extent of American Lend-Lease aid from the Soviet people, FDR feared that Stalin would take offense. Chastising Standley, he informed him that his sole purpose in Moscow was "full and friendly cooperation" with the Soviet Union. Soon afterward, the President entrusted former envoy Davies with a new mission: flying to Moscow and telling Stalin in private how much the American President respected him and how much he wanted to build their special relationship. To prove it, Davies was to tell the tyrant that FDR wanted to meet him face-to-face. Prior to his departure in May 1943, Davies brought a fresh print of Mission to Moscow to the White House for a sneak preview. After its viewing, he secured FDR's permission to take a copy with him to Moscow, along with a sealed envelope that the President had prepared for Stalin. When Davies arrived in Moscow, Amb. Standley, not informed of the mission in advance, resigned in disgust. Davies met Stalin in the Kremlin and read him the letter. He emphasized the US government's disapproval of British imperialism and broadly hinted that the USA and the USSR, without the British, could rule the world together. Having betrayed British allies and destroyed the incumbent Ambassador, Davies then retired with Stalin to the Kremlin screening room to watch Mission to Moscow, where his cinematic glorification of the dictator, to his disappointment, did not win a rave review, but only a grunt or two. However, Davies got what he came for: Stalin agreed to meet FDR in Alaska. Davies' biographer, Elizabeth Kimball MacLean, calls it "the coup of his diplomatic career."[14]10 The coup proved ephemeral, as did all of the other coups in Davies' career. Stalin had no intention of roving far from home. He kept putting off the meeting, frustrating and reducing FDR to pleading. Where once he had made a concession to FDR's physical handicap, Stalin now began to insist on the capital of Iran as a venue, despite its extra hardship for the President. On 25 October 1943, Roosevelt pointed out that "I would have to travel 6,000 miles and you would have to travel 600 miles from Russian [sic] territory." He implored Stalin not to fail him "in this crisis," and stooped to the words: "I am begging you."[15]11 Then, thinking that yet another "mission to Moscow" might do the trick, he sent his aged and aching Secretary of State, Cordell Hull, to deliver this letter to the Kremlin and tell the tyrant once again what a great leader he was. But Stalin was used to servile praise and would not relent. He said he could go no farther from the front, indicating that his duties as Marshal of the Red Army were weightier than FDR's as Commander-in-Chief of the US Armed Forces. Finally convinced of Stalin's inflexibility, FDR caved in. On 8 November, he wired his approval to Moscow. He could break his tight schedule in Washington and arrange for the signing of Congressional bills while abroad in order to meet Stalin in Teheran. W. Averell Harriman, Standley's replacement as Ambassador to the Soviet Union, hand-carried this capitulation to the Kremlin, where he met with Vyacheslav Molotov, Commissar for Foreign Affairs, since Stalin was said to be sick. Molotov toyed with the Ambassador, suggesting that the site was still not certain and that Stalin might have to stay on Soviet soil, prompting Harriman to send an alarmed report to the White House. The next day, however, Stalin confirmed the arrangement through the Soviet Embassy in Washington, so Roosevelt felt that he had achieved something. The following day, 11 November, he urged Churchill to accept the site and rejected the idea of meeting alone with the Prime Minister in advance, fearing that Stalin would think that they had "ganged up" against him. Stalin had FDR acting in his best interests.[16]12 Stalin's Acquaintance With Bugs For Stalin, bugging friend and foe was an essential part of politics. Since the early 1920s, he had kept a special telephone beneath his desk in the Kremlin for listening in on the private conversations of other Politburo members speaking on an exclusive line.[17]13 Thus, all through the inner-Party struggle for succession, while leader Vladimir Lenin lay dying and for years after he died in 1924, Stalin was able to eavesdrop on all of his comrades, who spoke openly on the line, believing that, since there was no operator (as on the other Kremlin lines), the new "vertushka" (dial) phone was safe. It was not: Stalin magically knew all of their nighttime thoughts the next morning, outmaneuvered them every day, and eventually had most of them shot.[18]14 Stalin's intelligence arm, the NKVD, or People's Commissariat of Internal Affairs, extended all manner of mechanical eyes and ears throughout the nation to reinforce the Bolshevik party's totalitarian control. Closed borders, internal passports, censored presses, political purges, and forced-labor camps--all of these features of the Soviet system were common knowledge in the 1930s and 1940s, as even Mission to Moscow acknowledged, but FDR, like Davies, brushed them aside. He wanted no criticisms from Bullitt, Standley, or anyone worried about the Soviet massacre of Polish officers in Katyn Forest, for example. To keep the war effort united and to work for postwar democracy, he wanted to please Iosif ("Joseph") Stalin, whom he liked to call "Uncle Joe." His primary purpose was to makes friends with a man widely believed to have murdered his wife, liquidated his closest political comrades, and ordered the assassination of Leon Trotsky in Mexico in August 1940. As Thomas Fleming notes in The New Dealers' War: FDR and the War Within World War II, Churchill once said that making an alliance with Stalin would be the same as "shaking hands with murder." But that was before he, too, warmed up to Uncle Joe.[19]15 Security Alarms And so President Roosevelt made the trip to Teheran, flying eight hours from Cairo in the Presidential DC-4, jokingly called "the Sacred Cow." He had come to Cairo for a five-day conference with Chiang Kaishek, leader of the Nationalist Chinese, and Winston Churchill, his closest ally, whom he snubbed. While in Cairo, he communicated with Stalin in order to finalize their meeting in Teheran. Naturally, each government had already made plans for its head of state--the President, the Marshal, and the Prime Minister--to stay in his own diplomatic residence. Such matters are settled before leaving home.[20]16 Iran was an occupied country during the war. Soviet and British troops divided the territory, while American forces facilitated the transport of Lend-Lease materials through the country to the USSR. The Iranians were restless because they were practically starving, but the Allies kept the situation in hand, and there was little risk from this quarter. In the capital, the occupation forces maintained tight security, obliging vehicles and pedestrians to show documents at frequent checkpoints. Back-to-back Soviet and British embassies stood inside a walled park in the center of town; the American Legation was only one mile away, inside a smaller walled compound. All three missions were fortified by armed guards. The site of the conference was secure. Nevertheless, on the day of his arrival in Cairo (22 November 1943), FDR began to suggest a change in his plans for Teheran. He wrote Stalin in Moscow: I am advised that all three of us would be taking unnecessary risks by driving to and from our meeting if we were staying so far apart from each other. Where do you think we should live?[21]17 Who advised FDR is not certain, possibly Churchill, who at some point invited Roosevelt to stay in the British Embassy. In any event, the next day Andrei Vyshinsky, the infamous prosecutor in the Moscow show trials of the 1930s and now the USSR Assistant Commissar for Foreign Affairs, called on FDR at the villa of Alexander C. Kirk, the American Ambassador to Egypt. After paying his respects, Vyshinsky, accompanied by Harriman and Bohlen (who translated), invited the President to stay in the Soviet Embassy while in Teheran. FDR declined. After the visit, he told his security man, Mike Reilly, that he preferred to stay at the American Legation and remain "more independent than a guest could hope to be."[22]18 Then he dispatched Reilly to Teheran to check out the security and a possible train route to the city, which his doctor thought would be better for his health than a high-altitude flight. Reilly tested a low-flying route to Iran and landed at Gale Morghe Airport, a Soviet airstrip, where he was met by Soviet Security. In his later memoir, he recalls the man in charge as "General Artikov," but it was more likely Gen. Dmitry Arkadiev, a forty-three-year-old functionary who headed the NKVD department of transportation. Reilly never saw the real head of the NKVD, Lavrenty Beria, who was present but kept to the shadows. Arkadiev took Reilly forthwith on a tour of the Soviet Embassy and told him in passing that the NKVD had learned that Nazi "parachutists" had jumped in the area the previous day, but so far had not been apprehended. Their intentions could only be terrible: kidnapping and/or assassination of the world leaders, and possibly sabotage of key installations. Although the exact date for the Teheran conference had not yet been fixed, the Nazis were aware of the prospect. On 22 November, New York Times correspondent James Reston reported from London that a German radio broadcast had announced a Big Three meeting in Teheran at the end of the month. It is difficult to understand why the Nazis would disclose the secret meeting if they planned to assassinate its participants. They may have learned about the conference from FDR and Churchill's intercontinental telephone calls, all of which were intercepted after a technical breakthrough by German intelligence in March 1942.[23]19 Reilly proceeded to inspect the British and American premises, and on his own turf extended the protected area and doubled the guard. A hundred American soldiers pitched tents on the legation grounds to be ready for any contingency. Soviet, British, and American security dragged a net through the city for Nazi agents, while Reilly flew off to Basra, Iraq, to evaluate the train route. Upon his return, he learned that a Nazi spy in custody, "Fritz Meier," had admitted, after a bit of persuasion, that he expected to be contacted by the "paratroopers." But, again, this information appears faulty, because the British had rolled up Franz Mayer and his non-functional Teheran network in August. Nevertheless, Reilly took the plot seriously. He flew back to the President in Cairo, leaving instructions with his subordinates to work with the NKVD in his absence. Since he had demonstrated that the plane to Teheran could steer low through the mountains, Reilly advised the President to fly direct to the capital. The train route, he reported, was not only a security risk, but also a miasma of filth and parasites. As for the city, said Reilly, the American premises were adequate and the drive between the embassies presented no security problems.[24]20 Changing Places [25][FDR2new.jpg] Stalin, Roosevelt, and Churchill, at the Teheran Conference, 1943. Meanwhile, on 25 November, Stalin replied to FDR's query--"Where do you think we should live?"--with the terse but cordial offer: "I shall be at your service in Teheran the evening of November twenty-eighth." When he learned that the President planned to arrive on 27 November, Stalin changed his plans and flew in on the preceding day. In this way, he not only gained time to get settled, but also could appear as the host.[26]21 On the day of Stalin's arrival, the Soviet ChargÈ d'Affaires came to see Patrick J. Hurley, one of FDR's roving envoys, and conveyed yet another invitation for the American leader to stay at the Soviet Embassy. Hurley, following FDR's orders, politely but firmly refused, stating that the President had decided to stay in his own legation. Nevertheless, he went off to inspect the suite of six rooms that were offered. Afterward, he wrote FDR that they would be more commodious, comfortable, and secure than the housing at his own place.[27]22 The elaborate maneuvers were beginning to approach the stylized steps of a dance. Both FDR and Uncle Joe wanted badly for the American President to stay in the Soviet Embassy, each for his own reasons, but neither wanted to appear too eager. FDR needed to be courted; Uncle Joe needed to be cool. Both needed an objective reason to change the President's accommodations, and the Nazi threat of assassination filled the bill. Yet the dance was not done; it was time for bold stamps and a swirl. Roosevelt arrived in Iran at 3:00 p.m. and drove under armed escort to the American Legation. With barely a moment's rest, he sent word to the Soviet Embassy that he would be honored to have Marshal Stalin to supper. Although well rested, Stalin was determined not to ride through the streets of a foreign city, no matter how heavy his protection. He replied that he was too tired. FDR then invited Churchill, but the Prime Minister had a sore throat from talking so long at the closing ceremonies of the Cairo conference and planned to retire to bed early with a volume of Dickens. He had the consolation of Scotch whiskey, for which the Americans sorely envied him, since their cellar supply had been closed off by a ramp built for Roosevelt's wheelchair. Lacking suitably high-level company, FDR conceived a new stratagem. At 6:00 p.m., Harriman called on Molotov and presented the President's reply to Stalin's written invitation of 25 November. The President, said Harriman, was obliged to say no, because he did not want to upset the British, who had also made the offer. Molotov replied that the place of residence was naturally the President's choice, but the rooms would remain available "if difficulties should arise." Harriman next proposed that the first meeting of the conference take place the next afternoon in the American Legation, and Molotov, after consulting with Stalin in the next room, agreed.[28]23 FDR was playing hard to get, testing his own theory that Stalin was "get-at-able." He turned down an offer from the Persian Shah to stay in the Golistan Palace, stating that his own place was fully adequate. He did not need to complicate matters by honoring the local head of state. Meanwhile, the NKVD got hold of Reilly and elaborated on the Nazi plot. Thirty-eight paratroopers had landed, Arkadiev now told him, and Soviet Security had captured all but six. Reilly saw none of the prisoners, but all the same began to worry that even the best security might not stop a fanatical assassin from making an assault on one or all of the Big Three as they rode back and forth through the streets. At midnight, Molotov sent an urgent summons to Harriman and Archibald Clark Kerr, the British Ambassador to the USSR, in order to reverse Stalin's consent on the meeting place. When the two ambassadors arrived, he gave his version of the Nazi plot, saying that there might be "a demonstration" in which there would be "shooting" and innocent bystanders would be hurt. The bloodbath would cause an international scandal. He refused to give details, but, just in case, took Harriman on another tour of the quarters prepared for the President. By this time, practically everyone but the President had seen them. The location of the next day's meeting was left in doubt. The next morning, Harriman convened a staff meeting and presented FDR with information on the plot. The details were sketchy, but scary; if they contained any truth, the lives of all three leaders would be put at risk by the necessity of having to travel to and from the American site. Reilly, who had the last word in the matter, agreed. Either of the two other embassies, he said, would be better than their own. But since the British living quarters had also been inspected and deemed inferior to the Soviet accommodations, FDR at last had the face-saving reason he needed to move in with the dictator and to spend time alone with him without the inconvenience of having to share his thoughts with "Winnie" Churchill. Now he could get at Stalin.[29]24 Uncle Joe's Guest To effect the move, the US Secret Service staged a great charade on the afternoon of 28 November, driving a convoy of cars, jeeps, and motorcycles to the Soviet Embassy with agent Robert Holmes dressed up as Roosevelt, while the President gleefully traveled the back roads, entered the compound furtively, and was carried into the Soviet Embassy by a side door. Within fifteen minutes of his arrival, before he had time to straighten up, Stalin, like a conquering suitor, appeared at his entranceway, and the first of their three private sessions ensued. Appropriately, it took place under portraits of Lenin and Stalin. Part of FDR's staff, including Harry Hopkins, Adm. William D. Leahy, and Adm. Ross T. McIntyre, stayed in the embassy with him, some remained in town with the American Minister, Louis G. Dreyfus, who had been displaced from the legation, while others stayed at Camp Amirabad, outside the city. The soldiers at the legation stayed in their tents to maintain the appearance that they were guarding something. Churchill stayed in his own embassy, closed out of the private parlays.[30]25 The Americans inside the Soviet Embassy noticed right away that the personnel attending them had big bulges at their hips under their aprons and white coats. They even saw NKVD uniforms poking out from under the sleeves and the tails of their throwovers. They winked at each other and congratulated themselves for detecting the clumsy disguises, not guessing that they were meant to detect them so as to feel a level of intimidation. In his account, Reilly notes with some concern that 3000 NKVD officers were on hand for the conference, far outnumbering both his and the British guard. He must have understood that there was no way he could protect the President, if need be, against the Soviet forces, both in uniform and in apron. He, like the President, was compelled to put his trust in them. They owned the territory. Having spared FDR the horror of riding one mile each day through the Persian streets, having appropriated his space and nullified his Secret Service, Uncle Joe drew him into a warm embrace. He told him that after the war he would grant freedom of religion, private ownership, and greater democracy in the Soviet Union, the name of which he would change back to Russia. Roosevelt, delighted with these unbelievable concessions, let Joe know that he could draw the postwar borders of Poland and reassume control of the Baltic republics with perhaps "some expression of the will of the people, perhaps not immediately after their re-occupation by Soviet forces, but some day." Uncle Joe's word--Stalin said he "understood"--was good enough for FDR. Harriman never quite believed in the existence of a plot against the President. Back in Moscow after the conference, he asked Molotov whether the Nazis had cooked it up, or whether Molotov and he himself had conjured it. Molotov, who had no sense of humor, replied that, in point of fact, he had no details of an actual plot, yet knew that there were Nazi agents in Teheran. Harriman realized that he could not draw blood from a stone and assumed that Stalin simply did not want to risk his own neck driving through the city. He did not suspect that surveillance was part of the picture and years later told historian Paul Mayle that "the Russians" had no reason to eavesdrop. His perspective on the matter was the same as that of Davies.[31]26 Reilly relates in his book that three months after the conference the "Russians" caught the six missing paratroopers living with a Bedouin tribe in the mountains, and executed them. Such information could have originated only with the NKVD. He filed no report on the alleged plot with the Secret Service, and the report on the conference that the Secret Service did produce makes no mention of a plot. The British record likewise lacks any such reference. The Joint Intelligence Committee of the War Cabinet considered the matter afterward in London and concluded that the so-called Nazi plot against the Big Three was "complete baloney."[32]27 The Illusive "Plot" Resurfaces In contrast to the West, the NKVD retained the story of the plot and, twenty years later during a publicity campaign, its successor, the KGB, began to promote it in the press. In its new guise, the purported plot against FDR acquired a wealth of details and a sterling cast of characters, most notably SS Capt. Otto Skorzeny, one of the legendary figures of World War II.[33]28 In the literature generated by the KGB, Skorzeny was the man designated by Hitler to lead the attack on the Big Three in Teheran and, in one stroke, turn the war around. But--the story went--the Nazis did not count on NKVD ace Nikolai Kuznetsov, who, posing as a Wehrmacht lieutenant in occupied Ukraine, befriended a hard-drinking and talkative SS officer named von Ortel, who blurted out revealing tidbits of the plan. Consequently, all three nations--the United States, the United Kingdom, and the USSR--owed the survival of their leaders to the vigilance of the Soviet Secret Police. As might be expected, Skorzeny's memoirs mention no such plan and the various Soviet accounts differ among themselves in names, places, and other specifics.[34]29 In fact, a Georgian defector who claims to have heard the inside story from sources close to Stalin and Beria (both Georgians), debunks the idea of a Nazi plot. In order to impress Roosevelt and impose a feeling of indebtedness on him, writes Yuri Krotkov (a pseudonym), Stalin conceived a bogus assassination attempt and ordered Beria to set it up, with the provision that "assassins" should actually be arrested. Roosevelt, informed of his salvation by Soviet counterintelligence, asked to see the man who had busted the plot. He was presented with a colonel from Saratov named Kravchenko.[35]30 When FDR mistakenly called Col. Kravchenko "General," Stalin jovially promoted him in rank. Krotkov does not say what happened to the men who filled the role of the arrested.[36]31 Although the evidence remains insubstantial, it is not altogether impossible that the Nazis did plan an attack on the Allied leaders, perhaps even at the Teheran conference and even with only a week to prepare (following the radio broadcast of 21 November). It is completely impossible, however, that such a Nazi plan could have been the one that Stalin warned FDR about. If Stalin thought that Otto Skorzeny, who had whisked Mussolini off a mountain top as if he were a feather, were planning to assassinate him, or to try any action in Teheran, he would have postponed the conference and left. He would not have remained in the city even if the story that his own men were spreading were true, that a half-dozen assassins possibly capable of shelling the Soviet Embassy were in the vicinity. He was not a man to take such a risk. On this score Harriman's instincts were correct. Stalwart Good Humor At the formal meetings in Teheran, FDR continued to woo Stalin. According to a journal article appearing afterward: "Throughout the sessions, he [FDR] was to make every endeavor to meet Stalin's mind, to understand his point of view and to assure the Russian [sic] of his own complete good faith. It seemed to him that the creation of a reciprocal spirit of confidence among the Big Three was more desirable than specific compacts . . . . The core of his policy has been the reassurance of Stalin."[37]32 Returning to America on 17 December, the President told reporters that he did not wholly believe Stalin's warning about the assassination plot, but followed his advice anyway, and "everything went well from then on."[38]33 FDR saved his full report on the conference for Christmas Eve. In the most extensive nationwide radio broadcast up to that time, he assured the country that peace was at hand and that no indissoluble problems would arise between the Big Three after the war. Regarding Stalin, he said: To use an American and somewhat ungrammatical colloquialism, I may say that "I got along fine" with Marshal Stalin. He is a man who combines a tremendous, relentless determination with a stalwart good humor. I believe he is truly representative of the heart and soul of Russia; and I believe that we are going to get along very well with him and the Russian people--very well indeed.[39]34 The press did not ask what Stalin might have wanted if his warning of an assassination attempt was not true. But the possibility of bugging was not lost on insiders. In his memoirs, the British general, Sir Hastings Ismay, wondered "if the microphones had already been installed."[40]35 At the Tsar's Palace The Yalta conference in February 1945 afforded FDR a second opportunity to prove his good faith to Stalin. It was held on Soviet ground, in the Crimea, where a suite was specially prepared for FDR in the Livadia Palace, the spacious summer residence of the former tsar. The building was old, but the new furnishings throughout should have raised suspicions that every word of the American delegation would be transmitted to a listening station. An FBI sweep of the American Embassy in Moscow the previous year had detected 120 concealed microphones, and from time to time afterward, new devices were found in furniture, wall plaster, and other inconspicuous places.[41]36 One would assume that the President, or someone close to him, had been informed, so that the Americans would question their privacy at Livadia. But, in the spirit of Joseph E. Davies, that is where FDR stayed. The British delegation settled down in the Vorontsov Palace, twenty miles distant, where accommodations were equally attentive. In a story with two versions--either Churchill said that lemon juice would go nicely with his gin and tonic, or his daughter, Sarah, said that lemon juice would go nicely with the caviar--the British woke up the next day to find a lemon tree growing on the grounds.[42]37 Stalin was taking no chances that either Washington or London would outwit him. Not content with FDR's and Churchill's numerous and profuse demonstrations of good will, he had spies in the American State Department and the British Foreign Service. He had Alger Hiss, a recruited agent, working on the American delegation--Bullitt had warned FDR that Hiss and his brother Donald were spies, but the President did nothing. Stalin also could count on Harry Hopkins, advisor to the President, a man so positive toward "Russia" that the NKVD is said to have regarded him as a voluntary agent. Moreover, Stalin had a seriously ailing, inconvenienced, and ill-prepared President, possibly clinically depressed, on unfamiliar turf, plus a disgruntled British Prime Minister, keenly conscious of being regarded as the least of the three. Still, it wasn't enough (he wanted an extra edge), so Stalin had bugs.[43]38 Eyewitness Stalin's interpreter at both Teheran and Yalta was Valentin Berezhkov, a trim and proper young man from Leningrad with flowing chestnut hair. In March 1998, still lean and erect, but with flowing white hair, Berezhkov came to the University of California in Riverside to give the keynote address at a conference on Stalin. Sitting in the audience, I recognized a golden opportunity to settle the question about Stalin's bugging FDR. A few years previously, I had read an account about surveillance at Teheran in a New York Russian-language newspaper. The author, Sergo Beria, claimed to be the son of Lavrenty Beria, the infamous head of Soviet Security; however, conflicting reports about Beria's son left me unsure whether I should put stock in the article.[44]39 If anyone should know, I reasoned, it was Berezhkov, whose image appears in numerous snapshots and much of the film footage of the two conferences of the Big Three. After Berezhkov's talk, delivered in nearly flawless English, I went up and asked him: "Was President Roosevelt bugged at Teheran and Yalta?" Berezhkov paused a moment, thought, and then broke into a broad grin as an old scene came back to mind: "Yes, he was," he laughed, "and the names of the speakers were written in by hand." Further questioning over the next two days, both in English and Russian, brought out the details. Each morning, both in Teheran and Yalta, Berezhkov received from an intelligence unit transcripts of the American delegation's conversations from the previous evening. He then shared them with Stalin as the leader made his preparations for the day's session. In Teheran, the transcript was typed in English, so that Berezhkov had to translate it verbally to Stalin. As he recalled it, each section had a blank line inserted at the beginning with the name of the speaker filled in by hand in Russian.[45]40 "Ear-witness" Berezhkov, who supported the preparation of this article, underwent heart surgery in September 1998 and died in November of that year. Just at that time, his secret knowledge received unexpected confirmation from a colleague. Late in 1998, CNN aired the first installment of a $12 million series on the Cold War.[46]41 The first episode included an interview with Sergo Beria, the author of the 1993 article referencing the bugging in Teheran. Beria, born in 1924, turned out indeed to be the son of the dreaded Secret Police chief, who had been executed by Stalin's successors at the end of 1953. For the next 40 years, Sergo lived under the false name of Sergei Gegechkori. Only in the post-Soviet period did he dare to restore his true name. In addition to the CNN interview, he authored a book that appeared in 2001 in English under the title: Beria, My Father: Inside Stalin's Kremlin.[47]42 Beria's account of the bugging is consistent with Berezhkov's. Like Berezhkov, Beria knew both English and German, in addition to Russian--he also knew Georgian, like his father and Stalin. As a young man, he had worked in Teheran as a code clerk for the NKVD, transmitting messages from agents in Germany back to the center in Moscow. Before the Teheran conference, Stalin, whose memory for people was phenomenal, added Sergo Beria to an intelligence team assembled in Moscow and sent out to Teheran by way of Baku. Stalin apparently chose the city over sites proposed by FDR and Churchill because he had a well-established spy network there. At the Soviet Embassy, he privately met each man involved in the surveillance of his guests and gave him his special orders. He told Beria that he had to know everything that FDR was thinking, because he wanted American support on his choice of a second front against Germany and he knew that Churchill had different ideas. He assigned Beria to listen to the President's living quarters at all times and write down whatever was said. The devices were already planted, Beria writes in his book, but he does not say how many, nor whether he listened directly or to recordings. Getting up at 6:00 a.m. each morning, Beria prepared summaries of the overheard conversations; then he met with Stalin at 8:00 a.m. Stalin was interested not only in what was said, but also in how it was said: He wanted to know the intonation, the length of pauses, and the tone of voice of the American speakers. According to Beria, Stalin prepared very carefully for each day's session, assembling all the reports from his intelligence team. Beria noticed that his desk was always filled with confidential papers, archival records, lists of questions, and so on. Yet at the conferences, Stalin appeared bored, indifferent, and occasionally inattentive.[48]43 Putting the accounts of Berezhkov and Beria together, one can see that the two men performed different functions. The first read verbatim translations of what was transcribed; the second gave summaries and personal impressions of what he heard. No doubt others of the intelligence team reported on other particulars, perhaps on different members of FDR's team, or on particular sections of the transcript, or on particular times of day. In this way, Stalin covered the conversations, many of which almost certainly were candid and confidential, from all angles. He had the American President pinned, examined, and analyzed like a specimen under a magnifying glass. [49][FDR3.jpg] Churchill, Roosevelt, and Stalin, at Yalta, 1945. In his book, Beria remarks with pride that the American delegation failed to discover the bugging devices at Teheran. No wonder: They could hardly have probed the walls in the Soviet Embassy. FDR's staff, however, did warn him that he was probably being listened to, so he could not have been unaware of the problem. Sometimes Beria thought that FDR was trying to talk directly to Uncle Joe through the microphones, but that manner succeeded only in arousing Stalin's suspicions. "What do you think," he asked Beria, "do they know that we are listening to them?" Sergo hesitated to draw a conclusion. "It's bizarre," Stalin went on, "They say everything, in the fullest detail." After the conference, on 20 December, Stalin wrote Roosevelt with consummate irony that he was glad "that fate has given me an opportunity to render you a service in Teheran."[50]44 Yalta Refinements According to Berezhkov, with the Yalta conference on Soviet soil and greater manpower available, the Soviets were able to improve their technical operation at the second meeting. Here the transcripts were prepared in Russian, so that Stalin could take them and read them himself at breakfast time. One can imagine the huge overnight and/or early morning effort on the part of the NKVD, translating and perhaps abstracting the diplomats' conversations while the overworked, overfed, and over-liquored diplomats snoozed. The surveillance team was rewarded with leftovers from the lavish banquets, which were much better than their usual fare. To be sure, they did not take their tasks lightly; failure could cause heads to roll: Stalin wanted nothing to get by him. Beria's CNN interview reveals that at Yalta FDR was not free from bugging even when he went outdoors. While an attendant pushed his wheelchair and Churchill tagged alongside, the NKVD listened from afar. "As we already had a system for directing the microphones to a distance of 50 to 100 meters to listen, [and] as there was no background noise, everything was quiet," Beria recounted, "all these conversations recorded very well, and later on were translated and processed."[51]45 At Yalta, Beria himself plied the microphones, which were more advanced than at Teheran. He recalled that FDR cut Churchill off when they met in private and refused to discuss issues with him, saying that they had already been decided. Stalin, Beria added, was no longer worried about the tone of voice and inflections of his bugged guests. He was confident that he had the upper hand and could dictate postwar terms to the lesser two of the Big Three. Berezhkov, thinking back on the affair, could not recall that the transcripts he saw contained anything sensational: They were filled with standard diplomatic discussions. He did remember that they contained a lot of flattering words about the Soviet host. "Maybe," he suggested while strolling through Riverside's historic Mission Inn, "the Americans suspected the microphones in their rooms and said things they wanted Stalin to hear." Berezhkov did not believe that the bugging gave the dictator much of an advantage: "To know a couple of hours before each day's session what they were thinking--how much difference could it make?" Beria, in contrast, thought it a distinct advantage to know in advance what the Allies were thinking and saying privately or even semi-privately. Potsdam Berezhkov was not present at the 1945 conference at Potsdam and so could not comment on the possibility that Roosevelt's immediate successor was also bugged. But how else can we understand the arrangements? Stalin chose the city, and before Harry S. Truman moved into his lodging, as David McCullough recounts in his detailed biography of the President, Soviet soldiers occupied the premises, ejected everyone living there, beat the owner, and removed all of his belongings, including rare books and manuscripts, replacing them with a grand piano and gloomy, incongruous furniture. Truman and others thought the place looked like a "nightmare." Such a dreadful remodeling job argues that the microphones were as carefully placed in Number 2, Kaiserstrasse, as in FDR's quarters at the Soviet Embassy in Teheran and his suite at the Livadia Palace in Yalta.[52]46 Sergo Beria did go to Potsdam, but was not involved in eavesdropping. He writes, however, that "it was on the program." So Truman, though more wary than his predecessor, fell into the same trap. Hindsight and History Through his elaborate surveillance operation, Stalin learned the moods, intentions, and attitudes of his diplomatic counterparts; perceived their wants and concessions; gauged their strengths and weaknesses; and planned his strategy accordingly. They could not do the same in regard to him, since they never understood him, let alone controlled the meeting sites or put him under surveillance. Perhaps the transcripts still exist in the vaults of Russian intelligence and someday will appear in print so that we, too, historically speaking, can spy on the trusting President and hear his words of endearment to Uncle Joe.[53]47 Diplomacy is often compared to poker, even when conducted between professed friends. And in poker, who has the better chance of winning--the one who holds his cards close to his vest or the one who holds them up in front of a mirror, believing that by so doing he is making a show of good faith? FDR, like his gullible emissaries Hopkins and Davies, insisted on showing his cards, hoping to win over the man who liked to torture and destroy his friends, just as he liked to torment and humiliate his foreign allies before accepting their gifts of land and humanity. The stakes were not friendship and world harmony, as FDR fondly hoped, but the boundaries for the coming Cold War. _________________________________________________________________ [54]Gary Kern served more than 35 years in the CIA Directorate of Operations. [55]1. John Harlow, Depressed FDR Handed Stalin Victory at Yalta, The Sunday Times (UK), 24 February 2002. [56]2. The FDR Tapes, American Heritage, No. 2, 1982. [57]3. Joseph Edward Davies, Mission to Moscow (New York, NY: Simon and Schuster, 1941). [58]4. David Culbert, ed., Mission to Moscow [Warner Brothers Screenplay] (Madison, WI: Univ. of Wisconsin Press, 1980), pp. 109-110. When the film was shown to the Soviet public, all the scenes about bugging were cut. [59]5. Elizabeth Kimball MacLean, Joseph E. Davies: Envoy to the Soviets (Westport, CT: Praeger, 1992), p. 40. [60]6. Bullitt served as US Ambassador to the USSR from 1933-1936, Davies from 1936-1938. [61]7. William C. Bullitt, How We Won the War and Lost the Peace, Life, 30 August 1948, p. 94. [62]8. Hopkins described the 5 3 Stalin as an austere, rugged, determined figure in boots . . . built close to the ground, like a football coachs dream of a tacklesee his article, The Inside Story of My Meeting with Stalin, in American Magazine (Springfield, Ohio), No. 132, December 1941, pp. 14-15; Davies once said that the Bolshevik word of honor was as safe as the Bible, according to William C. Bullitt, citing the Daily Worker of 25 and 28 February 1942, in The Great Globe Itself (New York, NY: Scribners Sons, 1946), pp. 22, 255, 256. [63]9[64]. Quoted by Frederick W. Marks III, Wind Over Sand: The Diplomacy of Franklin Roosevelt (Athens, GA: University of Georgia Press, 1988), p. 172; also p. 176 (on Standley). [65]10. MacLean, p. 105. [66]11. Marks, p. 178. [67]12. The relevant documents are in Foreign Relations of the United States: Diplomatic Papers: The Conferences at Cairo and Tehran 1943 (Washington, DC: US Government Printing Office, 1961), pp. 71-80. Hereafter FRUS. [68]13. Stalins secretary, Boris Bazhanov, defected to the West in 1928 and told in his memoirs how a Czech technician had been instructed to install the control point, supposedly to regulate mechanical failures. When the work was done, the technician was arrested and never seen again. Boris Bazhanov, Vospominaniya byvshego sekretarya Stalina [Memoirs of Stalins Former Secretary] (Paris: Tretya Volna, 1980), pp. 56-60. [69]14. Ibid. [70]15. Thomas Fleming, The New Dealers' War: FDR and the War Within World War II (New York, NY: Basic Books, 2001), p. 308. [71]16. Sources for the account of the Teheran conference include: John R. Deane, The Strange Alliance: The Story of Our Efforts at Wartime Cooperation with Russia (New York, NY: Viking, 1947), pp. 39-45; John T. Flynn, The Roosevelt Myth (New York, NY: Devin-Adair, 1948), pp. 351-360; George N. Crocker, Roosevelt's Road to Russia (Washington, DC: Regnery Books, 1959, 1986), pp. 209-227; W. Averell Harriman and Elie Abel, Special Envoy to Churchill and Stalin 1941-1946 (New York, NY: Random House, 1975), pp. 262-274; Keith Eubank, Summit at Teheran (New York, NY: William Morrow, 1985), pp. 161-197; Paul D. Mayle, Eureka Summit: Agreement in Principle and the Big Three at Tehran, 1943 (Newark, DE: University of Delaware Press, 1987), pp. 40-59; Robert Nisbet, Roosevelt and Stalin: The Failed Courtship (Washington, DC: Regnery Gateway, 1988), pp. 44-51; Marks, pp. 170, 177-179; Fleming, pp. 305-336; Joseph E. Persico, Roosevelt's Secret War: FDR and World War II Espionage (New York, NY: Random House, 2001), pp. 274-276. [72]17. FRUS, p. 373-374. [73]18. Vyshinsky visitFRUS, pp. 310-311; FDR quotationMichael F. Reilly, as told to William J. Slocum, Reilly of the White House (New York, NY: Simon and Schuster, 1947), p. 171. Reillys overall account is on pp. 168-188. [74]19. Mayle, p. 57; Edmund L. Blandford, SS Intelligence: The Nazi Secret Service (Edison, NJ: Castle Books, 2001), pp. 23-24. [75]20. Composite of Reillys memoir (1947) and his written report from Teheran to Cairo, 24 November 1943, FRUS, p. 397. [76]21. FRUS, pp. 415, 438. [77]22. FRUS, pp. 377, 440. Hurley, like Davies and Vice President Henry Wallace, was a self-made millionaire who understood business and thought that Uncle Joe appreciated a fair deal. [78]23. Harriman, pp. 262-263. [79]24. Charles Bohlens minutes of the three meetings are found in FRUS, pp. 483-486, 529-533 and 594-596. [80]25. Former Amb. William Standley considered the Dreyfus residence so hospitable that he thought, in retrospect, that FDRs preference for the Soviet Embassy was perhaps an early sign of the physical and mental deterioration which eventually led to his death. William H. Standley and Arthur A. Ageton, Admiral Ambassador to Russia (Chicago, IL: Henry Regnery, 1955), p. 303. [81]26. Harriman, pp. 264-265. [82]27. Eubank, p. 195. [83]28. In September 1943, two months before the heads-of-state meeting in Teheran, Skorzeny and a team of 107 commandos sailed gliders to the top of Gran Sasso, the highest peak in the Italian Appenines. They landed with machine guns ready and startled the Carabinieri soldiers holding the deposed Italian leader Benito Mussolini in an empty hotel. Effecting a prompt surrender of the guards without firing a shot, Skorzeny took the stunned, disheveled, and very grateful Duce to a small plane waiting in a meadow, while the other rescuers escaped by cable car. Skorzeny flew Mussolini to Vienna, then met with Hitler at his private retreat and received his personal commendation. After the war, Skorzeny escaped to Francos Spain, where he wrote a book about his exploits and eventually died in Madrid in July 1975. See John Toland, Adolf Hitler (New York, NY: Doubleday, 1976), Vol. 2, pp. 857-858; and Otto Skorzeny, Skorzenys Secret Missions: War Memoirs of the Most Dangerous Man in Europe (New York, NY: Dutton, 1950), pp. 91-107. [84]29. The KGB literature: Aleksandr Lukin, Operatsiya Dalnyi prizhok [Operation Long Jump], Ogonek, No. 33 (1990), 15 August 1965, p. 25, and No. 34 (1991), 22 August 1965, pp. 25-27; Kyril Tidmarsh, How Russians foiled Nazi plot to kill Teheran Big Three, The Times (London), 20 December 1968, p. 8; Viktor Egorov, Zagovor protiv Evriki: broshenny portfel [The Plot Against Eureka: The Lost Portfolio] (Moscow: Sovetskaya Rossiya, 1968); and Pavel Sudoplatov and Anatoli Sudoplatov, with Jerrold L. and Leona P. Schecter, Special Tasks: The Memoirs of an Unwanted WitnessA Soviet Spymaster (Boston, MA: Little, Brown & Company, 1994), pp. 130-131. Well researched, but dubious is Laslo Havas, Hitlers Plot to Kill the Big Three, translated from the Hungarian by Kathleen Szasz (London: Transworld, 1967, revised 1971). Havas claims to have sought out ex-Nazis in exile around the world, including Skorzeny, and forced them to talk, using psychological persuasion. He states that the NKVD planted eighty microphones in the walls of FDRs quarters in Teheran, but his sources as cited would not have been able to provide such information. He describes Hitlers plot as underway in September 1943, well before 8 November, when FDR finally accepted Stalins proposal to meet in Teheran. [85]30. This common Ukrainian surname was not yet associated with the 1944 defector named Victor who would denounce Stalin in the New York Times and cause FDR reelection headaches. [86]31. Yuri Krotkov, The Red Monarch: Scenes from the Life of Stalin, translated by Tanya E. Mairs, ed. by Carol Houck Smith (New York, NY: Norton, 1979), pp. 29-34. [87]32. Forrest Davis, What Really Happened at Teheran, Life, 13 and 20 May 1944. FDR read over the article and corrected it before publication, as noted by Bullitt, pp. 16-26. See also Amos Perlmutter, FDR & Stalin: A Not So Grand Alliance, 1943-1945 (Columbia, MO: University of Missouri Press, 1993), p. 159. [88]33. Stalin Bared Plot Against President, New York Times, 18 December 1943, p. 3. [89]34. Presidents Address Dealing With Conferences Abroad, New York Times, 25 December 1943, p. 8. [90]35. Years later, a KGB defector from the 1980s, Oleg Gordievsky, cited Ismays question and answered that indeed the microphones had already been installed: Housed in Soviet property, attended by NKVD servants, their conversations constantly monitored by their hosts, the United States delegation to the first summit meeting with a Soviet leader was condemned to practice something akin to open diplomacy. Gordievsky offered no sources or details, however, so the matter remained unresolved. See Christopher Andrew and Oleg Gordievsky, KGB: The Inside Story (New York, NY: Harper Collins, 1990), p. 332. [91]36. Andrew and Gordievsky, p. 334. [92]37. Zoya Zarubina, in the first episode of CNNs Cold War; Andrew and Gordievsky, p. 335. [93]38. Bullitts warning about Hiss: Ralph de Toledano, The Last Word, Insight, 17 December 2001, on the web at: http://insight- mag.com/global_user_elements/printpage.cfm?storyid=150529). Hopkins as Soviet agent: Andrew and Gordievsky, pp. 287-289, 350. [94]39. Sergo Beriya, Mne dali imya na Lubyanke [They Gave Me a Name in the Lubyanka], Novoye Russkoye Slovo (New York, NY), 21-22 May 1994, p. 8. [95]40. Authors interviews with Valentin Berezhkov, 12-13 March 1998, and e-mail exchange of 2 April 1998. [96]41. See website: http://www.cnn.com/SPECIALS/cold.war/ episodes/01/interviews/beria. [97]42. Sergo Beria, Beria, My Father: Inside Stalin's Kremlin (London: Duckworth, 2001). [98]43. Ibid., pp. 92-95, 103-105, 117-119. Paragraph also draws from newspaper and CNN interviews with Beria, listed previously. [99]44. FRUS, p. 849. [100]45. See information on the Cold War TV series on CNNs website. [101]46. David McCullough, Truman (New York, NY: Simon and Schuster, 1992), pp. 407-408, 430-432, 442. [102]47. Vasili Mitrokhin, who ransacked the KGB files and brought hundreds of copies of documents to the West in 1992, indicates that intelligence records of the two conferences still exist, and says that most of the transcribers were women. Christopher Andrew and Vasili Mitrokhin, The Sword and the Shield: The Mitrokhin Archive and the Secret History of the KGB (New York, NY: Basic Books, 1999), pp. 111, 598 (n.63), 133, 599 (n.78). UNCLASSIFIED References 4. http://www.cia.gov/csi/studies/vol47no1/article02.html#author -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- 7538 From: Date: Sun Jul 6, 2003 10:57am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7539 From: Date: Sun Jul 6, 2003 10:57am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7540 From: Mike Dever Date: Sun Jul 6, 2003 5:34pm Subject: Automated Detection of RF Devices Greetings I have a client who is interested in the capability to detect (automatically) and locate transmitting RF sources within their facilities. Particularly interested in detecting GSM, CDMA, DECT mobile/cordless phones. Facilities can be over quite large area (campus style). Any ideas or suggestions on or off the list on the type(s) of equipment required would be appreciated. Regard Mike Michael J. Dever CPP Dever Clark & Associates Canberra, Australia Voice: +612 6254 5337 Email: dca@b... 7541 From: Steve Uhrig Date: Sun Jul 6, 2003 6:42pm Subject: Re: Automated Detection of RF Devices On 7 Jul 2003 at 8:34, Mike Dever wrote: > I have a client who is interested in the capability to detect > (automatically) and locate transmitting RF sources within their > facilities. Particularly interested in detecting GSM, CDMA, DECT > mobile/cordless phones. Facilities can be over quite large area (campus > style). This marginally might be practical with IPM (In Place Monitoring) receivers within each individual area to be protected, reporting their locations back to a central monitoring point. The IPM receivers would have very small area coverage and essentially no antenna, so they would respond only to transmitters within close proximity. To cover all the mentioned modes, you'd need a number of receivers in each area, since each is different frequencies and modulation. It wouldn't just be a general RF sniffer or it's be in alarm all the time. With some human intelligence to sort things out, sweeps can be done manually. Even IPM systems are manually operated. The one attempt a Korean company made at developing a system vaguely as you mentioned was evaluated by a number of us on this list. Each of us tore the thing apart operationally and physically and we universally agreed the thing was worthless. The company dropped the idea although they had dreams of obsoleting manual sweeps and every spy shop on the planet selling the thing. And they were not trying to do anything more than automate detection of any new RF introduced into an area. That would be inadequate for your need. Proper design could use overlapping coverage areas of receivers to define the area. HOWEVER, the above would be possible (note I say 'possible', not 'practical') if and only if ALL mobile telephones are prohibited from the area. Otherwise, how would you distinguish a transmitter you desired to locate from a normal, legitimate mobile telephone? Remember, all mobile phones register and reregister with the various cell sites frequently -- every few minutes in the case of CDMA, and even more often than that if they are moving. In other words, as long as a mobile phone is *powered on*, whether placing or receiving calls or not, it's transmitting its ID and location and some other parameters very frequently to the cellular system. Frankly, I think any discussion would be theory only considering the practical considerations. And lots of things other than mobile telephones leak levels of RF loud enough to trip sensitive monitoring equipment. When I sweep my own office area, I must physically unplug the power from my office photocopier, not just turn it off. It radiates a loud signal in the VHF region precisely where surveillance devices are known to exist. Some sort of digital modulation so I can't just dismiss it as innocuous. You'd have to deal with that issue, too. And also the fact most large facilities have cell sites right there, and you'd have to differentiate between the cell site and an unwanted transmitter, which would be extremely expensive. Even cell sites within spec radiating spurs and harmonics 60 dB down would still have garbage loud enough to trip adequately sensitive receivers if enough were deployed to do the mentioned job. I could go on and on, but I think you get the idea. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7542 From: Shawn Hughes Date: Mon Jul 7, 2003 0:11pm Subject: Re: Noisy copiers At 04:36 AM 7/7/03 , you wrote: >.....It radiates a loud signal in the VHF region precisely where >surveillance devices are known to exist. >Some sort of digital modulation so I can't just dismiss it as innocuous. >You'd have to deal with that issue, too..... Steve, you didn't buy that thing surplus from a US Embassy, did you? Shawn Hughes +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Remember; Don't sweat the petty things..........and don't pet the sweaty things! 7543 From: Gregory Horton Date: Mon Jul 7, 2003 11:38pm Subject: Re: Re: let's celebrate Oh no, the personal attack! Yawn.... zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz Ocean Group wrote: > Yeah Kondrak, > > How could you send that? > > Don't you know how many governemnt employees are on this list, how > many law > enforcement and military members too? > > You know how sensitive they are to criticism. > > Shame on you for bringing all that stuff up.I totally agree with Gregory > that criticisms of such a nation should be deleted immediately. > > > ________________________________________________________________________ > ________________________________________________________________________ > > Message: 1 > Date: Fri, 04 Jul 2003 09:33:26 -0700 > From: Gregory Horton > Subject: Re: let's celebrate > > This is the perfect reason why they include the delete button on our > computers. > Greg Horton > > kondrak wrote: > > > > > > > > > > > >As we go out to celebrate our freedom this 4th of July, let's go over > > a few > > >things to make your celebration a success. > > > > > >Before leaving home make sure you check the color coded Homeland > Security > > >alert status. Be especially careful if it is orange or red. Don't > worry > > >about yellow. It's always yellow. > > > > > >Be aware of your surroundings at all times. New Yorkers, in > particular, > > >watch out for those pesky mushroom clouds. > > > > > >Don't use any illegal fireworks in your 4th Celebration. It is for > > your own > > >safety. And the founding father's implemented a government to > protect you > > >from yourselves. Didn't they? Besides, fireworks are explosive > > devices and > > >you might be considered a terrorist with weapons of mass > > destruction. And > > >although the government can't find any in Iraq, you can rest > assured they > > >will find them in your car trunk. But don't worry, getting arrested, > > >imprisoned indefinitely without formal charges, and a 5 year wait > > before the > > >secret tribunal trial per the Patriot Act is a breeze. It's that > secret > > >summary execution that should make you nervous. > > > > > >Make sure you are buckled up in your seat belts, there will be > roadblocks > > >and checkpoints to make sure you comply. It is for the children. > > > > > >If you are an airline employee, lighten up for the holiday, you can > > always > > >look for a job tomorrow. Maybe you could transfer over to a Federal > > Airport > > >Security Screener job. Big demand for those jobs and you don't have > > to be > > >smart. > > > > > >If you are a Haliburton employee, then celebrate, you probably have a > > raise > > >coming from the Iraqi contract windfall. > > > > > >If celebrating on any public property, > > >make no mention or relgious ideals. > > >Government is god there. > > >You will be aprehended. > > > > > >Have your papers ready as you approach the holiday police checkpoints. > > > > > >Don't criticize the President or other government officials, you > > might be in > > >violation of the Patriot Act and considered a possible terrorist. > > > > > >Don't mention the Constitution in any district court or you could be > > held in > > >contempt. > > > > > >If your children get out of line this holiday, do not discipline > them, or > > >they may be kidnapped by the Dept. of Social Services and held > > hostage until > > >you receive approved psychological therapy and are deemed acceptable. > > > > > >Show compassion this Independence Day by bringing an illegal > immigrant to > > >your celebration or by hugging a tree. > > > > > >If an election is occurring in your locality within the next 90 days, > > do not > > >talk about or publicly support any candidate, as that is no longer > > lawful. > > >Keep your mouth shut. > > > > > >If an officer asks to search your vehicle at the "seat belt" checks, > > do not > > >be belligerent and demand a search warrant. Standing up for your > fourth > > >amendment rights is anti-social and not in tune with the new American > > way. > > >Are you with Al Quada or something? > > > > > >Do not get upset when the searching officer will not help you pick up > > your > > >belongings that he has strewn all over the highway as he searched your > > >vehicle. It is not in his job description and complaining will get you > > >charged with obstructing justice. > > > > > >Keep your guns at home. You are not going hunting and besides, What on > > >earth do guns have to do with American Independence? Better yet, > > turn your > > >guns into the authorities to let them know that you are a true > patriotic > > >American. > > > > > >If celebrating at the mall in Washington DC. you are probably safe > as the > > >mall is now monitored by hundreds of surveillance cameras, watched by > > >federal security forces. Don't do anything that you wouldn't want > > them to > > >see. > > > > > >Bring lots of cash with you, there will be many taxes, fines, and > fees to > > >pay as you celebrate your freedoms this day. > > > > > >Do not leave home without your driver's license, social security > > card, birth > > >certificate, welfare card, medicare card, medical records, W-2 Form, > > and two > > >others forms of ID. You may be asked for them at the police > checkpoints. > > >Better yet, get micro-chipped, and avoid the hassle of carrying > > around your > > >papers. > > > > > >Bring your library card, the FBI may ask you for it. > > > > > >Do not put any "anti-government" bumper stickers on your car. > > Especially not > > >anything about the right to keep and bear arms. Police have been > > trained by > > >the FBI in "bumper sticker profiling". > > >This attracts their attention at the check points, and makes you look > > like a > > >terrorist. > > > > > >With regard to "bumper sticker profiling" you should be especially > > aware of > > >the fact that "They will get my gun, when they pry it from my cold dead > > >fingers" is no longer mere semantics. At WACO, and at RUBY RIDGE, > > >we learned that they WILL kill you to take your guns > > > > > >ALSO, be careful not to have any unauthorized THOUGHTS. > > >There are now serious penalties for "thought crime". > > >Be aware that "civil forfeiture" laws make it possible to take > > anything that > > >you own, by alleging that it was "intended" to be used for the > > commission of > > >a crime. This could include transporting or storing a gun. > > >If "civil forfeiture" proceedings are initiated against you, > > >then you will have the burden of proof, > > >to show that your thoughts were in compliance with government > standards. > > > > > >If traveling by air this Independence Day, do not give the airport > > screeners > > >a hard time. They are feeling you up and molesting your daughter and > > wife > > >for the security of America. If you complain you could be > arrested. You > > >don't support Bin Laden do you? > > > > > >Keep an eye on your fellow Americans as you celebrate this 4th of > > July. If > > >you see anything supicious, take notes so that when you get home > you can > > >call and report them to the Homeland Security Office. And remember > > you are > > >not a nosey snitch, you are a great American Patriot. > > > > > >Do not mention the signers of the Declaration of Independence this > 4th of > > >July. Mentioning these white subversive terrorists is not popular > > and could > > >get you in big trouble. Besides what do these guys have to do with > > the 4th > > >of July anyway? > > > > > >Do not leave home without one or more little plastic American flags > > made by > > >political slaves in Communist China. Make sure you have one flying > > from the > > >antennae of your vehicle. You don't want to seem un-American do you? > > > > > >Do not take a copy of the Declaration of Independence with you as it > > >advocates the overthrow of tyrannical government. It is a terrorist > > >document and will be confiscated at the holiday police > checkpoints. Same > > >advice for the Constitution. > > > > > >And remember, as you leave home for your 4th of July outing, that the > > second > > >you stepped out of your door that you probably broke hundreds of > federal, > > >state, and local laws that you are probably unaware of. However, if > > you tow > > >the line, you will not be charged. > > > > > >Don't even think about taxes on this great day. The 50 per cent > > government > > >confiscation of your income at the threat of imprisonment or at the > > point of > > >a gun should not even cross your mind as you revel in your freedom. > > After > > >all, April 15th is a long way off. > > > > > >And whatever you do, do not let on that you really know that true > freedom > > >died a long time ago in America, just have fun for the day and then > > go home > > >and stick your head back in the sand and pretend America is not > > becoming a > > >socialist police state. > > > > > >Now go out there and celebrate your freedom and liberty and have a > great > > >sanitized, politically correct, and government approved and authorized > > >Independence Day! > > > > > >If you have a few decades with nothing better to do, study up on > > >"administrative law". Laws are now made by the unelected > bureaucrats, in > > >hundreds of "administrative agencies". If you are charged with > > violating one > > >of these "laws" you will not get a trial by a jury of your peers. You > > will > > >be tried by the agency that made the charge. > > > > > >I hope this message gets past the Department of Homeland security > > approved > > >internet filter. > > >How else can they protect us from unauthorized thought? > > > > > >Now go out and celebrate your independence and have a great > > Independence Day! > > > > > >===== > > > > > >HOMELAND SECURITY ADVISORY > > >This transmission screened prior to receipt by addressee pursuant to > > >applicable sections of the USA PATRIOT Act. > > > > > >------------------ > > >-InfoWarz > > >None are so hopelessly enslaved as those who falsely believe they are > > free. > > >Our forefathers are crying. > > >Our forefathers are angry. > > >Our forefathers are loading their muskets and heading for The Green. > > >America........Wake the hell up. > > > > > > Yahoo! Groups Sponsor > > ADVERTISEMENT > > [Click Here!] > > > < > http://rd.yahoo.com/M=244522.3512152.4794593.1261774/D=egroupweb/S=17050071 > > 40:HM/A=1595054/R=0/SIG=124f8kfa7/* > http://ashnin.com/clk/muryutaitakenattogy > o?YH=3512152&yhad=1595054> > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service > > . > > > > > [Non-text portions of this message have been removed] > > > > ________________________________________________________________________ > ________________________________________________________________________ > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > --- > Incoming mail is certified Virus Free. > Checked by AVG anti-virus system (http://www.grisoft.com). > > Version: 6.0.491 / Virus Database: 290 - Release Date: 18/06/2003 > > --- > Outgoing mail is certified Virus Free. > Checked by AVG anti-virus system (http://www.grisoft.com). > > Version: 6.0.491 / Virus Database: 290 - Release Date: 18/06/2003 > > > > Yahoo! Groups Sponsor > ADVERTISEMENT > [Click Here!] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service > . [Non-text portions of this message have been removed] 7544 From: Mitch D Date: Tue Jul 8, 2003 0:28am Subject: CCTV Install gone bad Lesson to be learned: Change the default password after the install,and don't ever listen to the principal......what next...... Parents sue school after hidden cameras catch students undressing Web posted Thursday, July 3, 2003 | Associated Press NASHVILLE, Tenn. -- Some Overton County parents have sued the school system, saying officials allowed security cameras to film children undressing in locker rooms and then stored the images on a computer accessible through the Internet. The lawsuit filed last week in U.S. District Court in Nashville seeks $4.2 million in damages. The parents contend the school system violated students' rights by putting hidden cameras in Livingston Middle School's boys and girls locker rooms. The cameras reportedly captured students, ages 10-14, in various stages of undress. "The parents have been devastated by the conduct of the school officials, by the videotaping and by the breach of trust," attorney Mark Chalos, who represents the parents of 16 girls and one boy, told The Tennessean newspaper. Chuck Cagle, lawyer for Overton County Schools, said he wouldn't comment because he hadn't read the lawsuit. EduTech Inc., the company that installed the surveillance cameras in several Overton County schools also was named in the lawsuit. Officials with the Dyersburg-based company had no comment. Parents learned of the cameras when a student reported a suspicious device in the school at Livingston, about 80 miles east of Nashville. The lawsuit contends that images captured by the cameras were stored on a hard drive in the office of assistant principal Robert Jolley and could be accessed from remote computers by the Internet. It claims the computer's password security had not been changed from the factory default setting. The images were reportedly accessed 98 times between July 2002 and January 2003 - sometimes late at night and early in the morning - and through Internet providers in Clarksville and Gainesboro and in Rock Hill, S.C. William Needham, director of Overton County Schools, said Jolley has been transferred to another school in the system. Chalos said he doesn't know if the cameras are still operating. "We think there were lots and lots of people photographed who may not know it yet," Chalos said. __________________________________ Do you Yahoo!? SBC Yahoo! DSL - Now only $29.95 per month! http://sbc.yahoo.com 7545 From: kondrak Date: Tue Jul 8, 2003 5:03pm Subject: Parents sue school after hidden cameras catch students undressing > > >Parents sue school after hidden cameras catch students >undressing > >http://www.heraldonline.com/scnews/state_regional_interest/story/2661898p-2468514c.html > > July 3, 2003 > >NASHVILLE, Tenn. -- Some Overton County parents have sued the >school system, saying officials allowed security cameras to film >children undressing in locker rooms and then stored the images >on a computer accessible through the Internet. > > > >The lawsuit filed last week in U.S. District Court in Nashville >seeks $4.2 million in damages. > >The parents contend the school system violated students' rights >by putting hidden cameras in Livingston Middle School's boys and >girls locker rooms. The cameras reportedly captured students, >ages 10-14, in various stages of undress. > >"The parents have been devastated by the conduct of the school >officials, by the videotaping and by the breach of trust," >attorney Mark Chalos, who represents the parents of 16 girls and >one boy, told The Tennessean newspaper. > >Chuck Cagle, lawyer for Overton County Schools, said he wouldn't >comment because he hadn't read the lawsuit. > >EduTech Inc., the company that installed the surveillance >cameras in several Overton County schools also was named in the >lawsuit. Officials with the Dyersburg-based company had no >comment. > >Parents learned of the cameras when a student reported a >suspicious device in the school at Livingston, about 80 miles >east of Nashville. > >The lawsuit contends that images captured by the cameras were >stored on a hard drive in the office of assistant principal >Robert Jolley and could be accessed from remote computers by the >Internet. It claims the computer's password security had not >been changed from the factory default setting. > >The images were reportedly accessed 98 times between July 2002 >and January 2003 - sometimes late at night and early in the >morning - and through Internet providers in Clarksville and >Gainesboro and in Rock Hill, S.C. > >William Needham, director of Overton County Schools, said Jolley >has been transferred to another school in the system. > >Chalos said he doesn't know if the cameras are still operating. > >"We think there were lots and lots of people photographed who >may not know it yet," Chalos said. 7546 From: Date: Wed Jul 9, 2003 8:31am Subject: VCRs on endangered species list VCRs on endangered species list Silicon Valley Biz Ink :: Headlines Thursday, July 03, 2003 With prices for DVD recorders falling fast, VCRs will be obsolete within a few years BY RHONDA ASCIERTO When you update your Wimbledon finals home-video collection, give pause to your trusty old VCR, which is fast becoming an endangered species, according to new research by iSuppli Corp. DVD recorders, with their rapidly falling prices and superior recording qualities, will usurp VCR dominance in households around the globe within a few years. "VCRs are going to die a miserable death," says Jay Srivatsa, principal analyst of consumer electronics at iSuppli of El Segundo, a market research firm. "By the end of 2007, the market for VCRs worldwide will be completely obliterated by DVD recorders." Chris Koller, business team leader for consumer electronics at Best Buy Co. Inc., agrees. VCR sales are down dramatically, Koller says. In fact, Best Buy has cut in half its store's selection of VCRs during the past year. Sales of VCRs are expected to shrink by another 40 percent this year as DVD recorder prices continue to fall and muscle VCRs out of the market, says Michelle Abraham, senior analyst with research firm In-Stat/MDR. Srivatsa points to significant gains in DVD recorders, which are projected to grow 118 percent between 2002 and 2007 to a 40 million-unit market worth $5.8 billion, even with prices hovering in the $600 to $800 range last year. DVD players, which cannot record programming onto blank DVD discs, are selling for as little as $60 in major department stores. "I have a rule of thumb that any time a product falls under $300, it becomes a mainstream product," Srivatsa says. Ontario-based electronics maker Apex Digital Inc., which is the biggest seller of Chinese-made DVD players in the United States, is expected to launch a $399 DVD recorder-player combination machine this summer. Best Buy's Koller says $400 is still too steep for the average consumer, but he agrees with Srivatsa that within a year or two, DVD recorder prices will hit the magic price point for mass consumer acceptance. Srivatsa says electronics manufacturers in China can make DVD players at $25 to $30 per unit less than rival Japanese companies, which has driven down prices of DVD players. While Japanese companies, such as Sony Corp. and Matsushita Electric Industrial Co. (Panasonic), have the leading edge on DVD recorders today, Srivatsa expects Chinese companies will soon catch up and help drive down DVD recorder prices further. That means consumers will opt out of buying new VCRs. "With a DVD recorder the picture quality is better," Koller says. "The quantity of space on a DVD is significantly bigger than a VCR tape and DVDs won't degrade over time, while a VHS tape will." In some Asian countries, including India, VCRs will still be in use until the later part of the decade, Srivatsa says. And while Abraham agrees that DVD recorders will overtake VCRs this decade, she says VCRs won't completely disappear in the United States. "VCRs will hang around, just because people will have library collections of personal video tapes," Abraham says. "But people will chose a DVD recorder over VCRs since DVD recorders offer better quality recording." Rhonda Ascierto is a Biz Ink reporter. You can reach her at rascierto@s.... [Non-text portions of this message have been removed] 7547 From: Steve Uhrig Date: Wed Jul 9, 2003 10:04pm Subject: Mason A3C manual Would anyone have one of these, original or copy, for a collector gentleman friend of mine? He's not into TSCM directly but appreciates the engineering of the intercept receivers. Please contact me if you can help and I will put you in touch with him. He is friends to several on this list. I would appreciate it greatly. Tks .. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7548 From: Date: Wed Jul 9, 2003 10:01am Subject: Goodbye bar codes...hello bugs! Goodbye bar codes: Packages with transmitters on the way Razor blades and medicines packaged with pinpoint-sized computer chips and tiny antennae to send retailers and manufacturers a wealth of information about the products and those who buy them will start appearing in grocery stores and pharmacies this year. Within two decades, the minuscule transmitters are expected to replace the familiar product bar codes, and retailers are already envisioning the conveniences the new technology, called "radio frequency identification," will bring even as others are raising privacy concerns. http://www.usatoday.com/tech/news/2003-07-08-rfid-chip_x.htm 7549 From: Matthijs van der Wel Date: Thu Jul 10, 2003 8:34am Subject: Sweeping for 2.4 GHz video Hi, I would like to perform a sweep for hidden video surveillance equipment in a large building. The video surveillance equipment operates on the 2.4 GHz frequency band, so I'm only interested in that specific band. Something like the one shown on http://www.smarthome.com/7654s.html I'm thinking of buying the Digital Scout frequency recorder with a telescope antenna for this job (see http://www.optoelectronics.com/digitalscout.htm) since it counts from 10MHz - 2.6GHz. I would like to know if anyone has any experience with the Digital Scout frequency recorder or can recommend me some better equipment for this specific job. I know I can invest in better and more expensive equipment that can do a lot more (...) but right now I'm only interested in finding the video surveillance equipment! Thanks in advance for your time and effort. Matthijs 7550 From: Steve Uhrig Date: Fri Jul 11, 2003 11:21am Subject: Re: Sweeping for 2.4 GHz video On 10 Jul 2003 at 13:34, Matthijs van der Wel wrote: > I would like to perform a sweep for hidden video surveillance > equipment in a large building. The video surveillance equipment > operates on the 2.4 GHz frequency band, so I'm only interested in that > specific band > I'm thinking of buying the Digital Scout frequency recorder with a > telescope antenna for this job Save your money. > I would like to know if anyone has any experience with the Digital > Scout frequency recorder or can recommend me some better equipment for > his specific job. Looks like it is time for me to republish my special design for a 2.4 video/audio sniffer. Low cost, works extremely well, guaranteed not to rust, bust or gather dust. In repeated demos, it's located any test transmitters in, above or below the 2.4 gig ISM band. ========= In response to several requests, copied below is a message I sent to someone recently discussing my experience with sweeping for the low cost 2.4 gig video and audio transmitters: Hope this is of service to someone. For a few hundred dollars max you can build the receiver and a video monitor package. Use the best 2.4 antenna you can with as short a length of feedline as you can get away with, in all cases less than a foot. I mounted a 6dBm patch antenna to a pingpong paddle, as a convenient way to paint the walls and ceiling when sweeping. A larger patch antenna is good, keeping in mind the pattern of the thing. Use audio too, into a speaker, as there are audio-only bugs built from the video transmitters. ********************************************* Regarding 2.4 gig surveillance equipment: 99% of this 2.4 gig wireless video garbage is made from converted Wavecom or virtually identical generic modules, sometimes with the attenuator pads bypassed to give 20-50 mw RF out. What is described here will work regardless of the manufacturer of the 2.4 gig video devices. The Wavecom TX are on 4 distinct transmit channels. The Wavecom RX are the same 4 channels, but the front ends and I.F. filtering on the receivers is so crappy that the receivers will hear one and usually two adjacent channels fine, including stuff well above and below the ISM band allocation. Due to the fact that the Wavecom units frequently power up on channel 1 by default, chances are good any surveillance or monitoring will be on channel 1. They are 4 channel devices where you can select channels 1-2-3-4 by a stepper switch, but on power up they frequently revert to channel 1 unless some mods have been done to change this feature. The best and cheapest sweep goodie for 2.4 gig wireless video is a Wavecom (or same thing with another name on the label) receiver module with batt pack and small batt operated video monitor. Use the original garbage patch antenna if you can't afford anything better and move around area being inspected. Take a $3 hardware store bimetal lamp flasher, turn out all lights in the target area, and plug one lamp into the flasher. You easily will see on the Wavetek receiver/monitor the pattern of the flashing light if there is an "open camera" anywhere in the vicinity. Once you see something, kill the flashing lamp and shine a flashlight around till you hit the camera. Start with channel 1 on the Wavecom RX and advance through its 4 channels doing a separate sweep on each channel. An average room will only take a few minutes to sweep. You may not see a clear picture depending on many factors, but you will see the light/raster flashing, and that is a giveaway to inspect further. Anything other than noise on the video monitor is cause for further investigation. This test almost is child's play and in testing we have been able to identify a test transmitter at the fringe of the coverage area. This test setup is more sensitive than the stock Wavecom (because of the gain antenna you are pointing manually) so you will be able to sniff from further away than the listening post likely would be. If the above does not reveal anything, it is extremely unlikely there is any illicit 2.4 surveillance activity in the vicinity. Remember range of FCC Type Accepted stuff on 2.4 is like 300 feet MAX and probably less. Even bumping up the effective radiated power (ERP) does not increase range that much. For indoor applications of 2.4 gigs, the listening post almost always will be no further away than through one or two interior walls. A way to test the Wavecom receiver setup is to heat a cup of water in a microwave. Depending on leakage from the microwave, you should see hash in the Wavecom image for up to several rooms away. Remember the 2.4 gig video stuff is on the precise frequency as a microwave oven. 2.4 video and microwave ovens cannot peacefully co-exist in the same area. There also is some crappy audio-only packages made around the Wavecom models. The Wavecom receiver will still hear them but of course you go for audio feedback instead of watching for the flashing lamp on the video. Virtually all the Wavecom-type devices are the same manufacture and freqs regardless of packaging, so you can buy the cheapest one from a catalog anywhere and have good results. Be sure to get the crummy Wavecom receiver though, not a better receiver of another brand (not too likely as practically everything at these frequencies are built down to a consumer price, not up to a performance level standard). You want the high sensitivity (cheap) and the poor selectivity (high selectivity is expensive) which goes along with the crummy receiver. In this application, both work to the sweeper's advantage. Using a decent patch antenna on a pingpong paddle will improve sensitivity significantly. Larger is better. Look for 6 - 8dBd if possible. As the patch antenna will be fairly directional, stand in the middle of each room being swept and 'paint' the walls and ceilings by slowly rotating and moving the pingpong paddle up and down as you rotate. Look for anything other than noise on the video monitor. I wear the receiver over my shoulder and use an older Sony battery powered video monitor around my neck on a strap, leaving my hands free to operate the antenna and step through the channels on the receiver. Hope this helps. Do as described, and you don't need anything else. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7551 From: kondrak Date: Fri Jul 11, 2003 2:04pm Subject: Re: Goodbye bar codes...hello bugs! It also opens a HUGE market for "search and destroy" equipment....I cant wait to see the first models and patent a hand-held device that locates them, and allows you to vaporize them on the spot. At 10:01 7/9/2003 -0500, you wrote: >Goodbye bar codes: Packages with transmitters on the way Razor blades and >medicines packaged with pinpoint-sized computer chips and tiny antennae to >send retailers and manufacturers a wealth of information about the products >and those who buy them will start appearing in grocery stores and >pharmacies this year. Within two decades, the minuscule transmitters are >expected to replace the familiar product bar codes, and retailers are >already envisioning the conveniences the new technology, called "radio >frequency identification," will bring even as others are raising privacy >concerns. >http://www.usatoday.com/tech/news/2003-07-08-rfid-chip_x.htm > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7552 From: kondrak Date: Fri Jul 11, 2003 2:06pm Subject: Re: Sweeping for 2.4 GHz video Chances are it's DSSS or FHSS (spread-spectrum) , either need a special piece of test equipment. The old reliable counters and spectrum analyzers are not at all good in this regard. Look for 802.11 test equipment specifically developed for this purpose. At 13:34 7/10/2003 +0000, you wrote: >Hi, > >I would like to perform a sweep for hidden video surveillance >equipment in a large building. The video surveillance equipment >operates on the 2.4 GHz frequency band, so I'm only interested in >that specific band. Something like the one shown on >http://www.smarthome.com/7654s.html > >I'm thinking of buying the Digital Scout frequency recorder with a >telescope antenna for this job (see >http://www.optoelectronics.com/digitalscout.htm) since it counts from >10MHz - 2.6GHz. > >I would like to know if anyone has any experience with the Digital >Scout frequency recorder or can recommend me some better equipment >for this specific job. I know I can invest in better and more >expensive equipment that can do a lot more (...) but right now I'm >only interested in finding the video surveillance equipment! > >Thanks in advance for your time and effort. > >Matthijs > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7553 From: gkeenanus Date: Fri Jul 11, 2003 6:46pm Subject: test 7554 From: Jay Coote Date: Fri Jul 11, 2003 9:38pm Subject: Re: Sweeping for 2.4 GHz video I have had good results using a spectrum analyzer and a very directional antenna such as a horn or panel. I'm concerned the selectivity and sensitivity of handheld "sniffer-counters" might overlook something. Jay Coote Los Angeles ---------- Hi, I would like to perform a sweep for hidden video surveillance equipment in a large building. The video surveillance equipment operates on the 2.4 GHz frequency band, so I'm only interested in that specific band. Something like the one shown on http://www.smarthome.com/7654s.html I'm thinking of buying the Digital Scout frequency recorder with a telescope antenna for this job (see http://www.optoelectronics.com/digitalscout.htm) since it counts from 10MHz - 2.6GHz. I would like to know if anyone has any experience with the Digital Scout frequency recorder or can recommend me some better equipment for this specific job. I know I can invest in better and more expensive equipment that can do a lot more (...) but right now I'm only interested in finding the video surveillance equipment! Thanks in advance for your time and effort. Matthijs ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7555 From: Mitch D Date: Sat Jul 12, 2003 9:16am Subject: Re: VCRs on endangered species list --- MACCFound@a... wrote: > VCRs on endangered species list > Thursday, July 03, 2003 With prices for DVD recorders falling > fast, VCRs > will be obsolete within a few years I dont believe they will be completely obsolete,as both DVR and video tape recorders have their purposes,and respective user market.Tape is simple to use, DVR requires thought and minor programming. Pure marketing hype. __________________________________ Do you Yahoo!? SBC Yahoo! DSL - Now only $29.95 per month! http://sbc.yahoo.com 7556 From: Mitch D Date: Sat Jul 12, 2003 9:20am Subject: Robonaut for robotics enthusiasts (slightly off topic) NASA humanoid robot http://vesuvius.jsc.nasa.gov/er_er/html/robonaut/robonaut.html __________________________________ Do you Yahoo!? SBC Yahoo! DSL - Now only $29.95 per month! http://sbc.yahoo.com 7557 From: kondrak Date: Sat Jul 12, 2003 11:11am Subject: Fwd: Shooting Ourselves in the Foot > >I, Cringely | The >Pulpit >JULY 10, 2003 > >Shooting Ourselves in the Foot >Grandiose Schemes for Electronic Eavesdropping May Hurt More Than They Help > >By Robert X. Cringely > > > >Whom do you trust? If you are a policeman, you trust the police. How >much information is enough? When it comes to the electronic gathering of >intelligence information, it appears that no amount of information is >enough. These two concepts have collided in America with the result that >creating the very capability of gathering electronic intelligence is >putting all of us in greater danger. The supposed cure may be worse than >the disease. Maybe -- and only maybe -- we know a little more about what >the bad guys in our society are doing, but it is coming at what might be a >horrible cost. And a big part of the problem is that if you are a >policeman, you trust the police. > >The Federal Bureau of Investigation administers the Communications >Assistance to Law Enforcement Act (CALEA), which was passed by Congress in >1994. CALEA was a response to advances in digital communications. It was >a way for law enforcement and intelligence agencies to go beyond >old-fashioned phone taps and listen in on mobile phone calls, pagers, the >Internet and any other form of electronic messaging that might be used by >enemies of the state. CALEA made the phone companies and pager companies >and Internet companies responsible for building into their equipment the >capability to tap all types of communications on the order of a judge or >-- in the case of foreign surveillance -- of the U.S. Attorney >General. Every telephone switch installed in the U.S. since 1995 is >supposed to have this surveillance capability, paid for, by the way, with >$500 million of your tax dollars. Not only can the authorities listen to >your phone calls, they can follow those phone calls back upstream and >listen to the phones from which calls were made. They can listen to what >you say while you think you are on hold. This is scary stuff. > >But not nearly as scary as the way CALEA's own internal security is >handled. The typical CALEA installation on a Siemens ESWD or a Lucent 5E >or a Nortel DMS 500 runs on a Sun workstation sitting in the machine room >down at the phone company. The workstation is password protected, but it >typically doesn't run Secure Solaris. It often does not lie behind a >firewall. Heck, it usually doesn't even lie behind a door. It has a >direct connection to the Internet because, believe it or not, that is how >the wiretap data is collected and transmitted. And by just about any >measure, that workstation doesn't meet federal standards for evidence >integrity. > >And it can be hacked. > >And it has been. > >Israeli companies, spies, and gangsters have hacked CALEA for fun and >profit, as have the Russians and probably others, too. They have used our >own system of electronic wiretaps to wiretap US, because you see that's >the problem: CALEA works for anyone who knows how to run it. Not all >smart programmers are Americans or wear white hats. We should know that >by now. CALEA has probably given up as much information as it has >gathered. Part of this is attributable to poor design and execution, part >to pure laziness, part to the impossibility of keeping such a complex yet >accessible system totally secure, and part because hey, they're cops, >they're good guys. Give 'em a break. Have a donut. > >This vulnerability is never discussed in public because it is an >embarrassment to law enforcement and because the agencies that pay for >CALEA don't want its vulnerability to be known. That might compromise >national security. Alas, national security is already compromised by the >system itself, and the people who might take advantage of the >vulnerability have known about it for years. Only we are kept in the dark. > >In a sense I think the problem comes down to the "dumbing down of >IT." The biggest problem with CALEA is the people managing it. They >don't know it needs to be secured. This column, for example, will be >widely distributed, but will have no impact whatsoever on the folks it >should because they simply won't get it. > >I suspect the people actually running the system know a bit more and >probably have suggested it from time to time. Like many government >systems, you can't fix it until you're TOLD to fix it, and you won't be >told to fix it until there is funding. And the funding will usually be >accompanied by explicit instructions on how to fix it, right or wrong. In >the corporate world IT has been under attack and downsized for >years. Forget training. Forget expertise. There is a belief that by >just buying a firewall, you solve all your security issues. If you have a >firewall, why do you need to have someone track and install all those >security patches on all your computers? Many of IT's biggest problems are >simply repeats of past problems. Through this "dumbing down" process >we've lost the ability to stop the cycle. > >Even if CALEA were secure, it would still be a danger because of its >capability to do what are called "roving wiretaps." Old-fashioned wiretaps >did just that, they tapped wires, but today's criminals and terrorists are >mobile. They use throwaway cell phones and conference calls and 800 >numbers to mask their communications so CALEA targets the criminal, not >the phone line. This means that CALEA effectively taps every phone that >is connected at any time to the roving subject. Phone conversations can >be followed from line to line and each of those phone lines becomes, at >least for a while, a target. Dozens, hundreds, thousands of numbers can >get swept up and recorded whether it is a conversation with a lawyer, a >priest, or a journalist. > >That's what led me to this story. In the Lacie Peterson murder case in >California, thousands of Scott Peterson's phone conversations were >recorded using CALEA technology. Some of those conversations were between >Peterson and his lawyer, some between Peterson and the press. None of >them were with me. I have no idea whether Scott Peterson is guilty or >innocent, and it doesn't matter at all to this column. What matters is >that a few days ago 176 new phone conversations were "discovered." > >How do you "discover" a recorded phone conversation in a totally automated >system? If you can discover a conversation, then you can also lose one a >la Rosemary Woods and the famous 17-minute gap in that Watergate >tape. The whole system becomes suspect and subject to abuse. > >And abuse does happen. In the late 1990s the Los Angeles Police >Department conducted illegal wiretaps with CALEA technology involving >thousands of phone lines and potentially hundreds of thousands of people >at a time when the official annual report on wiretaps compiled by the >Department of Justice said L.A. was conducting an average of around 100 >wiretaps per year. Illegal convictions were obtained, property was >illegally confiscated, civilian careers and lives were ruined, yet nobody >was punished. > >But wait, there's more! CALEA represents mid-90s thinking about >electronic intelligence, but now we have the Patriot Act that goes so much >further. And we have a program at the Defense Advanced Projects Research >Agency called Total Information Awareness. I am sorry to quote so >extensively from a DARPA document (unclassified), but you need to get a >sense of the epic scope of this proposal, which sounds like Big Brother to me: > >"OBJECTIVES: (1) Development of revolutionary technology for ultra-large >all-source information repositories and associated privacy protection >technologies. >(2) Development of collaboration, automation, and cognitive aids >technologies that allow humans and machines to think together about >complicated and complex problems more efficiently and effectively. >(3) Development and implementation of an end-to-end, closed-loop prototype >system to aid in countering terrorism through prevention by integrating >technology and components from existing DARPA programs such as: Genoa, >EELD (Evidence Extraction and Link Discovery), WAE (Wargaming the >Asymmetric Environment), TIDES (Translingual Information Detection, >Extraction and Summarization), HID (Human Identification at Distance), >Bio-Surveillance; as well as programs resulting from the first two areas >of this BAA and other programs." > >"Repository Issues: The National Security Community has a need for very >large scale databases covering comprehensive information about all >potential terrorist threats; those who are planning, supporting or >preparing to carry out such events; potential plans; and potential >targets. In the context of this BAA, the term "database" is intended to >convey a new kind of extremely large, omni-media, virtually-centralized, >and semantically-rich information repository that is not constrained by >today's limited commercial database products -- we use "database" for lack >of a more descriptive term. DARPA seeks innovative technologies needed to >architect, populate, and exploit such a database for combating terrorism. >Key metrics include the amount of total information that is potentially >covered, the utility of its data structures for data entry and use by >humans and machines in searching and browsing, data integration, and >capability to automatically populate, and the completeness, correctness, >and timeliness of the information when used for predictive analysis and >modeling in exploiting the information in these repositories. It is >anticipated this will require revolutionary new technology." > >"The database envisioned is of an unprecedented scale, will most likely be >distributed, must be capable of being continuously updated, and must >support both autonomous and semi-automated analysis. The latter >requirement implies that the representation used must, to the greatest >extent possible, be interpretable by both algorithms and human analysts. >The database must support change detection and be able to execute >automated procedures implied by new information. Because of expected >growth and adaptation needs, the effective schema must be adaptable by the >user so that as new sources of information, analytical methods, or >representations arise, the representation of data may be re-structured >without great cost. If distributed, the database may require new search >methods to answer complex, less than specific queries across physical >implementations and new automated methods for maintaining consistency. The >reduced signature and misinformation introduced by terrorists who are >attempting to hide and deceive imply that uncertainty must be represented >in some way. To protect the privacy of individuals not affiliated with >terrorism, DARPA seeks technologies for controlling automated search and >exploitation algorithms and for purging data structures appropriately. >Business rules are required to enforce security policy and views >appropriate for the viewer's role." > >"The potential sources of information about possible terrorist activities >will include extensive existing databases. Innovative technologies are >sought for treating these databases as a virtual, centralized, grand >database. This will require technologies for automatically determining >schemas, access methods and controls, and translation of complex English >language queries into the appropriate language for the relevant databases." > >"DARPA currently has on-going research programs aimed at language >translation, information extraction from text, and multi-modal biometric >technologies. These component technologies will be used to feed the >Information Awareness database but must be augmented by other technologies >and new sources of information to dramatically increase the coverage of >counter-terrorism information. These other technologies include but are >not limited to innovative new methods of database integration, structured >information authoring, and exploitation of integrated data streams. >Non-traditional methods of identifying and monitoring terrorist activity >are anticipated. Populating a database with information derived from >masked or deceptive behavior by an adversary is a challenging technical >problem. DARPA invites new ideas for novel information sources and methods >that amplify terrorist signatures and enable appropriate response." > >"Collaboration, Automation And Cognitive Aids Issues: DARPA will be >developing technology to support collaborative work by >cross-organizational teams of intelligence and policy analysts and >operators as they develop models and simulations to aid in understanding >the terrorist threat, generate a complete set of plausible alternative >futures, and produce options to deal proactively with these threats and >scenarios. The challenges such teams face include the need to work faster, >overcome human cognitive limitations and biases when attempting to >understand complicated, complex, and uncertain situations, deal with >deliberate deception, create explanations and options that are persuasive >for the decision maker, break down the information and procedural >stovepipes that existing organizations have built, harness diversity as a >tool to deal with complexity and uncertainty, and automate that which can >effectively be accomplished by machines so that people have more time for >analysis and thinking. Emphasis needs to be placed on ease of use, >adaptation to the user who is often not a scientist or engineer, and >implicit encouragement to use the tools to make the users' tasks easier." > >"DARPA is seeking innovative technology for automating some of the team >processes; augmenting the human intellect via tools that assist teams >thinking together, tools that do some of the thinking for people, and >tools that support human/machine collaboration in the cognitive domain; >and for providing a rich environment for collaboration across existing >hierarchical organizations while maintaining the necessary accountability >and control. DARPA envisions that the human teams using its system will be >drawn from multiple organizations spanning state, local, and federal >government. Thus, there will be the need to permit collaboration across >organizational-boundaries while providing control and accountability and >connection back to the central systems of each participating organization. >Technology will be required to support the entire life cycle of such >teams. Key challenges include knowledge management/corporate memory, >declarative policy generation and context-based enforcement, business >rules and self-governance, and planning and monitoring team processes." > >"The goals for automation technology include speeding the front-end >processes of gathering, filtering, and organizing information and >assimilating its content without having to read all of it. On the back-end >of the process, technology is needed to automate or semi-automate the >generation of efficient and persuasive explanations, and to maintain >consistency within a large, distributed multi-media knowledge base. >Technology is also required to make the tools and the collaborative >environment itself more efficiently used by humans by making it aware of >user context and preferences and smart and adaptive to optimize the user >experience. DARPA seeks technology to aid the human intellect as teams >collaborate to build models of existing threats, generate a rich set of >threat scenarios, perform formal risk analysis, and develop options to >counter them. These tools should provide structure to the collaborative >cognitive work, and externalize it so that it can be examined, critiqued, >used to generate narrative and multi-media explanations, and archived for >re-use." > >Back to Cringely: How, exactly, are they going to automate the protection >of our privacy? > >No sane person is in favor of terrorism or lawlessness. But at a time >when intelligence agencies are under fire for being not very intelligent, >when our leaders are sometimes in too big a hurry to cast blame and take >credit, we are building huge information gathering systems that we can't >completely control, we can't completely validate, that can be turned >against us by our enemies, and that can ultimately be used to justify, >well, anything. > >It might be a good idea to think twice about this before we shoot >ourselves in the foot. [Non-text portions of this message have been removed] 7558 From: mpaulsen6 Date: Sat Jul 12, 2003 3:29pm Subject: Jim Bell Sues US et al for RICO and Anti-Trust http://cryptome.org/jdb-v-usa-106.htm 7559 From: mpaulsen6 Date: Sat Jul 12, 2003 3:39pm Subject: Corning Cable Systems - Laser point to point I have a need for multi-gb/s wireless networking connection. Have met with Corning, which suggested their multibeam laser for site-to- site. They referenced a few govt. sector customers. I'd like to know what people think of their product from a security standpoint with this technology before shelling out 6 figures for the installation. I must be able to show that the technology is nearly impossible to penetrated while still enabling a high throughput rate. Corning suggests it is by referencing their client list. Anyone? 7560 From: kirk Date: Sat Jul 12, 2003 4:40pm Subject: Re: Corning Cable Systems - Laser point to point I'm not familiar with the Corning product however we had to pull out a single beam laser video link from a building in downtown Los Angeles. The link was installed with heavy duty mounts, but due to building creep, ambient temp. heating and cooling cycles and slight ground movement over time, (not to mention earthquakes) within 3 months the transmitter and receiver would mis-align and need to be tweeked again. Maybe something to consider in your geographical location. ---------- Original Message ---------------------------------- From: "mpaulsen6" Date: Sat, 12 Jul 2003 20:39:30 -0000 >I have a need for multi-gb/s wireless networking connection. Have >met with Corning, which suggested their multibeam laser for site-to- >site. They referenced a few govt. sector customers. I'd like to know >what people think of their product from a security standpoint with >this technology before shelling out 6 figures for the installation. >I must be able to show that the technology is nearly impossible to >penetrated while still enabling a high throughput rate. Corning >suggests it is by referencing their client list. Anyone? > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > -- Kirk Adirim TACTRONIX Tactical Electronics for Critical Missions 468 North Camden Drive Beverly Hills, CA 90210 USA E: kirk@t... T: 323-650-2880 F: 310-388-5886 W: www.tactronix.com -- 7561 From: mpaulsen6 Date: Sat Jul 12, 2003 5:18pm Subject: Re: Corning Cable Systems - Laser point to point Thanks for the thoughtful response. Corning said that wouldn't be an issue if their spec app didn't pass muster on our site. If it doesn't pass the spac they won't sell it to us. We're in a quake zone, but we're pretty resilient to that sort of stuff. With the multibeam setup also, there's a lot of drift possible, as long as one is good in the path we're ok is what we're being told. Also, the distance isn't much, we can pretty much spit between the sites. Really the only 2 issues are cost/performance and security. --- In TSCM-L@yahoogroups.com, "kirk" wrote: > I'm not familiar with the Corning product however we had to pull out a single beam laser video link from a building in downtown Los Angeles. The link was installed with heavy duty mounts, but due to building creep, ambient temp. heating and cooling cycles and slight ground movement over time, (not to mention earthquakes) within 3 months the transmitter and receiver would mis-align and need to be tweeked again. Maybe something to consider in your geographical location. > > > > ---------- Original Message ---------------------------------- > From: "mpaulsen6" > Date: Sat, 12 Jul 2003 20:39:30 -0000 > > >I have a need for multi-gb/s wireless networking connection. Have > >met with Corning, which suggested their multibeam laser for site- to- > >site. They referenced a few govt. sector customers. I'd like to know > >what people think of their product from a security standpoint with > >this technology before shelling out 6 figures for the installation. > >I must be able to show that the technology is nearly impossible to > >penetrated while still enabling a high throughput rate. Corning > >suggests it is by referencing their client list. Anyone? > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > >http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > > > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > -- > Kirk Adirim > TACTRONIX > Tactical Electronics for Critical Missions > 468 North Camden Drive > Beverly Hills, CA 90210 USA > E: kirk@t... > T: 323-650-2880 > F: 310-388-5886 > W: www.tactronix.com > -- 7562 From: Mitch D Date: Sun Jul 13, 2003 4:20am Subject: component ID site Found this helpful site that has charts for component ID's,resistor color codes etc, to include a FCC address for a component trace by FCC ID. http://webhome.idirect.com/~jadams/electronics/ref.htm ===== Mitch Davis TSCM/Special Operations Group Inc. Antioch,TN.USA MitchD@t... website:www.tscmusa.com. Tel (615)837-9933 Cell(615) 584-9933 __________________________________ Do you Yahoo!? SBC Yahoo! DSL - Now only $29.95 per month! http://sbc.yahoo.com From: Steve Uhrig Date: Mon Jul 5, 2004 9:40am Subject: RE: NLJD's Once upon a midnight dreary, Ocean Group pondered, weak and weary: > I saw some Russian NLJD's at a show last year and let me tell you, I > almost had a heart attack when the Russian Sales guy told me the output > power... > At 250 W's I can cook my freaking breakfast with the thing. Not many people appreciate this. Power is cheap and easy to make. And you figuratively can use a tin can and a string for a receiver. Decent receivers and antennas and cavities are expensive to make. Guess which way some choose to do it? Hungry entrepreneurs with some talent, little field experience, zero concern for safety and a market who buys on hyperbole, not understanding. This is typical of the Russian design. Brute force, not finesse. Higher quality machine will use 30dB or less RF power, and real receivers. Much more elegant way to go. Guys throw around those RF numbers as if they mean something. It may be a game of whomever quotes the highest power/longest range/best performance wins, or so they think. Against this, you need to be an educated consumer so you're not taken in by the misleading spec. Thanks to Tetra's original question, we all have learned something and maybe will be more informed consumers. 250 watts is 50 times the RF I used to work Lithuania the other day from Maryland/USA on 10 meter single sideband... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9017 From: James M. Atkinson Date: Mon Jul 5, 2004 11:36am Subject: RE: NLJD's I have had extremely good results when signal levels are kept below 100 mW, and in most cases a signal below 10-35 mW is more than enough to get good results. Remember the higher the power output used, the nastier the receiver section is likely to be. -jma At 10:29 AM 7/5/2004, Ocean Group wrote: >I saw some Russian NLJD's at a show last year and let me tell you, I almost >had a heart attack when the Russian Sales guy told me the output power... > >At 250 W's I can cook my freaking breakfast with the thing. > >You could also look at the UK made LocatorXD. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9018 From: contranl Date: Mon Jul 5, 2004 7:22pm Subject: RE: NLJD's . I guess that Russian guy was just talking a lot of "bull" ...and it was battery operated as well ? very big batteries ? To make 250 watts at 800~900 mhz is not that easy as you may think Also the(unwanted)harmonics will be amplified so you won't hear the wanted harmonics. At such a power level you will probably saturate(overload)any circuits wich may not reflect any harmonics anymore So 250 watts from a NLJD ...can't be ! Tetrascanner 9019 From: James M. Atkinson Date: Mon Jul 5, 2004 11:30pm Subject: Pennies I have heard pennies lying on the sidewalk being good luck, gifts from angels, etc. This is the first time I've ever heard this twist on the story. Gives you something to think about. Several years ago, a friend of mine and her husband were invited to spend the weekend at the husband's employer's home. My friend, Arlene, was nervous about the weekend. The boss was very wealthy, with a fine home on the waterway, and cars costing more than her house. The first day and evening went well, and Arlene was delighted to have this rare glimpse into how the very wealthy live. The husband's employer was quite generous as a host, and took them to the finest restaurants. Arlene knew she would never have the opportunity to indulge in this kind of extravagance again, so was enjoying herself immensely. As the three of them were about to enter an exclusive restaurant that evening, the boss was walking slightly ahead of Arlene and her husband. He stopped suddenly, looking down on the pavement for a long, silent moment. Arlene wondered if she was supposed to pass him. There was nothing on the ground except a single darkened penny that someone had dropped, and a few cigarette butts. Still silent, the man reached down and picked up the penny. He held it up and smiled, then put it in his pocket as if he had found a great treasure. How absurd! What need did this man have for a single penny? Why would he even take the time to stop and pick it up? Throughout dinner, the entire scene nagged at her. Finally, she could stand it no longer. She causally mentioned that her daughter once had a coin collection, and asked if the penny he had found had been of some value. A smile crept across the man's face as he reached into his pocket for the penny and held it out for her to see. She had seen many pennies before! What was the point of this? "Look at it." He said. "Read what it says." She read the words "United States of America." "No, not that; read further." "One cent?" "No, keep reading." "In God we Trust?" "Yes!" "And?" "And if I trust in God, the name of God is holy, even on a coin. Whenever I find a coin I see that inscription. It is written on every single United States coin, but we never seem to notice it! God drops a message right in front of me telling me to trust Him? Who am I to pass it by? When I see a coin, I pray, I stop to see if my trust IS in God at that moment. I pick the coin up as a response to God; that I do trust in Him. For a short time, at least, I cherish it as if it were gold. I think it is God's way of starting a conversation with me. Lucky for me, God is patient and pennies are plentiful! When I was out shopping today, I found a penny on the sidewalk. I stopped and picked it up, and realized that I had been worrying and fretting in my mind about things I cannot change. I read the words, "In God We Trust," and had to laugh. Yes, God, I get the message. It seems that I have been finding an inordinate number of pennies in the last few months, but then, pennies are plentiful! And, God is patient... Have a blessed day!! -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9020 From: Ocean Group Date: Tue Jul 6, 2004 8:48am Subject: RE: NLJD's I guess that Russian guy was just talking a lot of "bull" ...and it was battery operated as well ? very big batteries ? To make 250 watts at 800~900 mhz is not that easy as you may think Also the(unwanted)harmonics will be amplified so you won't hear the wanted harmonics. At such a power level you will probably saturate(overload)any circuits wich may not reflect any harmonics anymore So 250 watts from a NLJD ...can't be ! ### Couldn't tell you, they were specialising in bomb detection equipment and I saw they offered an NLJD so I went up and asked him if I could paw it. I had a look, the thing was massive, I asked a little bit about what type of freq, SS etc and then asked at what power the RF burst was at, that's when he said a couple hundred watts, I took double take and asked him to confirm and he did. After that I laughed, thanked him for his time and mosied onto something a bit more worthwhile. C'est tout! 9021 From: James M. Atkinson Date: Tue Jul 6, 2004 10:35am Subject: RE: NLJD's The really funny thing is that only a complete fool would use a NLJD for detecting bombs or any other explosive device. Interestingly, companies that make Non-Linear Junction Detectors usually have no experience in working with bombs or explosives, their engineers and salesmen don't know the difference between a fuze and a fuse, and think the liquid nitrogen used by an EOD team is there to keep the the beer cold. The best way to shut down their false claims is to ask them, or one of their family members to hold a blasting cap in the palm of their hands while YOU "detect it" with a NLJD... the result will typically be someone starting to sputter and tap dance, with them qualifying their claims. The problem is that you will find out their don't actually have any idea what they are talking about when is comes to working with things that make loud noises and scatter body parts. In fact a good bomb builder (ie: ALQ, IRA, RB, IFI, etc) will add a small circuit that will detonate the bomb if a NLJD signal is detected, cell phone, or a microwave Doppler signal is picked up near the bomb. Many Chinese, Indian, and Pakistani land mines even contain a small 850-980 MHz detonator circuit to ensure that any NLJD used to detect the mines is reduced to little pieces. Add to this that the NLJD is essentially worthless for mine detection teams, and is more of a liability than a resource. Using a NLJD to detect bombs, is like using a match to find a gas leak. -jma At 09:48 AM 7/6/2004, Ocean Group wrote: > I guess that Russian guy was just talking a lot of "bull" >...and it was battery operated as well ? very big batteries ? >To make 250 watts at 800~900 mhz is not that easy as you may think Also >the(unwanted)harmonics will be amplified so you won't hear the wanted >harmonics. >At such a power level you will probably saturate(overload)any circuits wich >may not reflect any harmonics anymore > >So 250 watts from a NLJD ...can't be ! > > >### Couldn't tell you, they were specialising in bomb detection equipment >and I saw they offered an NLJD so I went up and asked him if I could paw it. >I had a look, the thing was massive, I asked a little bit about what type of >freq, SS etc and then asked at what power the RF burst was at, that's when >he said a couple hundred watts, I took double take and asked him to confirm >and he did. > >After that I laughed, thanked him for his time and mosied onto something a >bit more worthwhile. > >C'est tout! > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9022 From: David Alexander Date: Tue Jul 6, 2004 11:01am Subject: RE: NLJD's The top quality IED builders have been known to add a circuit to guard against x-rays too. Photodiodes with something to scintillate in the appropriate energy range added to them. David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: 06 July 2004 16:36 To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] NLJD's The really funny thing is that only a complete fool would use a NLJD for detecting bombs or any other explosive device. Interestingly, companies that make Non-Linear Junction Detectors usually have no experience in working with bombs or explosives, their engineers and salesmen don't know the difference between a fuze and a fuse, and think the liquid nitrogen used by an EOD team is there to keep the the beer cold. The best way to shut down their false claims is to ask them, or one of their family members to hold a blasting cap in the palm of their hands while YOU "detect it" with a NLJD... the result will typically be someone starting to sputter and tap dance, with them qualifying their claims. The problem is that you will find out their don't actually have any idea what they are talking about when is comes to working with things that make loud noises and scatter body parts. In fact a good bomb builder (ie: ALQ, IRA, RB, IFI, etc) will add a small circuit that will detonate the bomb if a NLJD signal is detected, cell phone, or a microwave Doppler signal is picked up near the bomb. Many Chinese, Indian, and Pakistani land mines even contain a small 850-980 MHz detonator circuit to ensure that any NLJD used to detect the mines is reduced to little pieces. Add to this that the NLJD is essentially worthless for mine detection teams, and is more of a liability than a resource. Using a NLJD to detect bombs, is like using a match to find a gas leak. -jma At 09:48 AM 7/6/2004, Ocean Group wrote: > I guess that Russian guy was just talking a lot of "bull" >...and it was battery operated as well ? very big batteries ? >To make 250 watts at 800~900 mhz is not that easy as you may think Also >the(unwanted)harmonics will be amplified so you won't hear the wanted >harmonics. >At such a power level you will probably saturate(overload)any circuits wich >may not reflect any harmonics anymore > >So 250 watts from a NLJD ...can't be ! > > >### Couldn't tell you, they were specialising in bomb detection equipment >and I saw they offered an NLJD so I went up and asked him if I could paw it. >I had a look, the thing was massive, I asked a little bit about what type of >freq, SS etc and then asked at what power the RF burst was at, that's when >he said a couple hundred watts, I took double take and asked him to confirm >and he did. > >After that I laughed, thanked him for his time and mosied onto something a >bit more worthwhile. > >C'est tout! > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ---------------------------------------------------------------------------- ------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9023 From: Rob Muessel Date: Tue Jul 6, 2004 11:17am Subject: RE: NLJD's Neither of the companies that make NJDs in the US market their products as IED detection equipment. I can assure you that all of the parties involved with marketing and sales at both ISA and REI are fully aware of the risks inherent in using an NLJD for these purposes. In this case, it is the customers that are creating and driving the market, not the vendors. By the way, liquid nitrogen keeps the beer too cold. -- -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 www.tscmtech.com USA -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Tuesday, July 06, 2004 11:36 AM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] NLJD's The really funny thing is that only a complete fool would use a NLJD for detecting bombs or any other explosive device. Interestingly, companies that make Non-Linear Junction Detectors usually have no experience in working with bombs or explosives, their engineers and salesmen don't know the difference between a fuze and a fuse, and think the liquid nitrogen used by an EOD team is there to keep the the beer cold. The best way to shut down their false claims is to ask them, or one of their family members to hold a blasting cap in the palm of their hands while YOU "detect it" with a NLJD... the result will typically be someone starting to sputter and tap dance, with them qualifying their claims. The problem is that you will find out their don't actually have any idea what they are talking about when is comes to working with things that make loud noises and scatter body parts. In fact a good bomb builder (ie: ALQ, IRA, RB, IFI, etc) will add a small circuit that will detonate the bomb if a NLJD signal is detected, cell phone, or a microwave Doppler signal is picked up near the bomb. Many Chinese, Indian, and Pakistani land mines even contain a small 850-980 MHz detonator circuit to ensure that any NLJD used to detect the mines is reduced to little pieces. Add to this that the NLJD is essentially worthless for mine detection teams, and is more of a liability than a resource. Using a NLJD to detect bombs, is like using a match to find a gas leak. -jma At 09:48 AM 7/6/2004, Ocean Group wrote: > I guess that Russian guy was just talking a lot of "bull" >...and it was battery operated as well ? very big batteries ? >To make 250 watts at 800~900 mhz is not that easy as you may think Also >the(unwanted)harmonics will be amplified so you won't hear the wanted >harmonics. >At such a power level you will probably saturate(overload)any circuits wich >may not reflect any harmonics anymore > >So 250 watts from a NLJD ...can't be ! > > >### Couldn't tell you, they were specialising in bomb detection equipment >and I saw they offered an NLJD so I went up and asked him if I could paw it. >I had a look, the thing was massive, I asked a little bit about what type of >freq, SS etc and then asked at what power the RF burst was at, that's when >he said a couple hundred watts, I took double take and asked him to confirm >and he did. > >After that I laughed, thanked him for his time and mosied onto something a >bit more worthwhile. > >C'est tout! > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > -------------------------------------------------------------------------- --------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. -------------------------------------------------------------------------- --------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com -------------------------------------------------------------------------- --------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -------------------------------------------------------------------------- --------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 9024 From: Thomas Shaddack Date: Tue Jul 6, 2004 11:27am Subject: RE: NLJD's On Tue, 6 Jul 2004, David Alexander wrote: > The top quality IED builders have been known to add a circuit to guard > against x-rays too. Photodiodes with something to scintillate in the > appropriate energy range added to them. That's useful in many other applications, everywhere you want a system to perform a self-defense action when it detects a non-invasive probing (which usually precedes the invasive one). (The scintillating thingy may be eg. zinc sulphide.) A cryptographic key-storage token comes to mind, or a bug that encrypts the data before it broadcasts them (or which contains a microcontroller with sensitive firmware, eg. the algorithm for generating the PRNG sequence for UWB broadcast). Combination of X-ray detection with a pressurized case (with pressure-change detection), case breach detection by other means (if the adversary would work in a hyperbaric chamber, which isn't that difficult to get access to, ask any higher-end diver), and temperature grossly outside of permitted range (eg. attempt to freeze the memory with liquid nitrogen), and couple other countermeasures (beware of differential power analysis, see attacks on secure smartcards) could make the key recovery job quite a challenging task. (There is a wide range of interesting problematics how to avoid key recovery from RAM. One thing that's not commonly known between rank-and-file electronics engineers is the electromigration; tendency of structures on chip to physically move around a tiny bit, when the current densities are high enough (which is not that difficult, given the scale of the chip - even a milliamper can become much above a million amps per square centimeter), as the electrons interact with the atoms in the lattice and share with them part of their kinetic energy). This causes a creep that can be detected under an electron microscope; because it is of permanent nature, powering off the chip doesn't work. The countermeasure here can be eg. storing the key as a XOR of a pair of bits, and regularly (or randomly) flipping them, so in long term every bit in the memory would be 1 and 0 for roughly the same total time. The "memory memory effect" can be observed on older circuits that were in service with the same data in RAM for long time - after a power-on, the memory cells tend to preferentially initialize to the state they are "used to".) (Same problem applies to other chips than memories. If a chip performs the same operation with the same key all the time, it tends to "remember" it in its structure. Eg. designers of the ATM crypto accelerators have to keep this in mind. ...Which brings me to an idea - why not use a FPGA that's fed its code after reset from another device, and feed it each time with different cell layout, to equalize the load of the parts of the chip? A clever design, with two complementary circuits - one "real" and one dummy, performing complementary operations - could be also a countermeasure against differential power analysis and related EMSEC problems, as every operation would have its inverse equivalent, cancelling the differences. Could it work?) 9025 From: Thomas Shaddack Date: Tue Jul 6, 2004 0:13pm Subject: RE: NLJD's On Tue, 6 Jul 2004, Rob Muessel wrote: > By the way, liquid nitrogen keeps the beer too cold. Depends on its use. By careful dosage, the temperature can be achieved just right. But it needs some experience, or you end up with "beersicles" - frozen content of the containers. Liquid gases tend to have unintuitively low heat capacity, even the vaporization heat. (So they tend to boil easily, and the layer of vapor between the liquid nitrogen and the object-to-cool acts as a makeshift insulation; exactly like the mechanism of the water drop dancing on a hot stove. This is also the reason why you can stick your finger for a short while into the liquid nitrogen and come out unharmed. It's a fun trick to show the newbies.) (Another fun trick to scare the newbies with is to swash a little of LN2 on them. It's a very good demo, though a bit shocking, of how low the heat capacity of liquified gases is. I know this rather intimately, I was that newbie.) During one demo of superconductors and magnetic levitation (I used to be an assistant on physics camps, a workshop mage in charge of building ad-hoc instruments), we the instructors used a bit of LN2 for an effect. We came into the room, bearing beakers of LN2-enriched tea which were producing copious amounts of thick white vapors, and were sipping the tea during the introductory talk. (Similar, longer-lasting, effect can be achieved with a chunk of dry ice. (Which can be used for other fun too - put a small piece of it into a plastic film canister, close it, and sneak it into a closed drawer or a waste paper basket. In a while you'll hear a loud *POP* followed by even louder "AAAARGH!" from the audience around.)) (We also managed to accidentally make a tear gas (hint: never try to extract bromine just created by oxidation of bromide in acidic solution into acetone, you won't get a pretty dark-brown organic layer - it's an idea so bad it makes you cry crocodile tears), and couple other stories. One of them included catching somebody literally red-handed. We got a bit of Neutral Red (a red powder used as a colorizer in biology labs, to stain the cultures of live cells without killing them, pretty non-toxic; if you see a Petri dish in a movie or a documentary, that has a red layer on its bottom, it's most likely a live cell culture stained with this stuff). It's a very fine red powder, with almost invisible particles. But even one particle has a pretty good staining power, when it gets wet and dissolves. We caught the one stealing the sweets from the kitchen this way. You *can't* wash it off your hands, it lingers for days. I still have a stain on my mom's carpet, which is lightly pinkish and gets a bit darker when there's a rain coming in and the air moisture gets up, and it's a decade old. Don't expect the people to be willing to follow even so simple instructions like "never hold a bottle by the plug".) 9026 From: eglemont Date: Tue Jul 6, 2004 5:29pm Subject: SpyfinderPersonal Vaporware? Two weeks ago I ordered spyfinderpersonal from SEAbase, spyfinderpersonal.com. It hasn't arrived, they took my money two weeks ago, and now they say another three to five weeks. Did anyone get one of these, do they exist, have they not finished designing the unit yet? It's a nuisance to have to wait six or seven weeks after they took my money. 9027 From: Monty Date: Tue Jul 6, 2004 10:28pm Subject: RE: NLJD's By the way, liquid nitrogen does a great jobs stipping wax off the floor. But that was back in the stupid years. Monty --- Thomas Shaddack wrote: > > On Tue, 6 Jul 2004, Rob Muessel wrote: > > > By the way, liquid nitrogen keeps the beer too > cold. > > Depends on its use. By careful dosage, the > temperature can be achieved > just right. But it needs some experience, or you end > up with "beersicles" > - frozen content of the containers. __________________________________ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail 9028 From: Monty Date: Tue Jul 6, 2004 10:23pm Subject: RE: NLJD's Hate to tell ya... They do exist... What they don't hear gets destroyed. Like putting a "bull" in a China shop. Monty --- Ocean Group wrote: > I guess that Russian guy was just talking a lot of > "bull" > ...and it was battery operated as well ? very big > batteries ? > To make 250 watts at 800~900 mhz is not that easy as > you may think Also > the(unwanted)harmonics will be amplified so you > won't hear the wanted > harmonics. > At such a power level you will probably > saturate(overload)any circuits wich > may not reflect any harmonics anymore > > So 250 watts from a NLJD ...can't be ! > > > ### Couldn't tell you, they were specialising in > bomb detection equipment > and I saw they offered an NLJD so I went up and > asked him if I could paw it. > I had a look, the thing was massive, I asked a > little bit about what type of > freq, SS etc and then asked at what power the RF > burst was at, that's when > he said a couple hundred watts, I took double take > and asked him to confirm > and he did. > > After that I laughed, thanked him for his time and > mosied onto something a > bit more worthwhile. > > C'est tout! > > > __________________________________ Do you Yahoo!? Read only the mail you want - Yahoo! Mail SpamGuard. http://promotions.yahoo.com/new_mail 9029 From: Thomas Shaddack Date: Wed Jul 7, 2004 0:12pm Subject: RE: NLJD's On Tue, 6 Jul 2004, Monty wrote: > By the way, liquid nitrogen does a great jobs stipping > wax off the floor. But that was back in the stupid > years. A rumour is that academics in the local Physics Institute, when there was a disagreement betweeen their management and the building janitors and they had to clean up their labs themselves, swept the floors by pouring liquid nitrogen on them. The dancing balls of evaporating LN2 carried the dirt to the corners, from where it was easier to be swept. LN2 is also used for forced entries. Cool down the lock, the metal gets fragile. Then bang it with a hammer and it shatters. Not as fast as shotgun slugs designed for that purpose, but quiterer. To stay on the list-topic at least vaguely - LN2 is also frequently used for cooling down various extremely-low-noise sensors; often used in older or more sensitive thermail imaging systems for cooling the sensor and the optics. The cryo systems are big and bulky and expensive and breakdown-prone, so the more modern uncooled bolometric arrays are a big step forward. Hope they get cheaper soon. However, cooling of the sensors can be done by other means as well. A popular, though power hungry, but solid-state and low-maintenance way is using the Peltier elements - a cousin of the thermocouple, which, when subjected to the flow of DC electric current, becomes hot on one side and cold on the other one. (Or, when you screw up cooling, it gets hot on one side and hotter on the other one.) Some Japanese even claim they managed to improve the efficiency of thermocouples and Peltier elements using some trick with thin layers, up to the possibility of reaching the liquid nitrogen temperature by a solid-state device - a layered Peltier element, which could boost the thermal imaging equipment sensitivity many times without the high cost and maintenance associated with conventional cryogenics. Would like to offer an URL, but can't find it anymore. Very low temperatures are useful even for measuring extremely weak magnetic fields. There is a device vaguely similar to the Hall probe but extremely sensitive: SQUID, superconductive quantum interference detector; see eg. here: . The device is so sensitive it can measure the magnetic field of a working brain. I can imagine a handheld array of SQUID detectors, used in a NLJD-style manner, sensing the fields around the walls and objects that should have no such fields around them. Could be a problem to decouple the 50/60 Hz background, though. A very tiny SQUID array could be useful for a non-invasive side-channel attacks on eg. smartcards. PS: From cold to hot; how to heat a hot dog: http://dcom.rulez.cz/pictures/grill/ 9030 From: James M. Atkinson Date: Wed Jul 7, 2004 0:06pm Subject: Re: SpyfinderPersonal Vaporware? The last I heard they where begging for startup capital, and had not even finished the designs for the cheaper one, let along build any of them (outside of a could of mock-ups). If they are in fact in production it is news to me. -jma At 06:29 PM 7/6/2004, eglemont wrote: >Two weeks ago I ordered spyfinderpersonal from SEAbase, >spyfinderpersonal.com. It hasn't arrived, they took my money two >weeks ago, and now they say another three to five weeks. > >Did anyone get one of these, do they exist, have they not finished >designing the unit yet? It's a nuisance to have to wait six or seven >weeks after they took my money. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9031 From: Michael Puchol Date: Wed Jul 7, 2004 0:54pm Subject: Re: SpyfinderPersonal Vaporware? Hi, You may try the following, as their website is a bit vage: C&C Technology David Cremer 8100-M4 Wyoming Blvd. NE -244 Albuquerque, NM 87113-1956 US Phone: 5053501803 Email: cdcremer@a... (as taken from whois). Regards, Mike > Two weeks ago I ordered spyfinderpersonal from SEAbase, > spyfinderpersonal.com. It hasn't arrived, they took my money two > weeks ago, and now they say another three to five weeks. > > Did anyone get one of these, do they exist, have they not finished > designing the unit yet? It's a nuisance to have to wait six or seven > weeks after they took my money. 9032 From: Jerry Hartridge Date: Wed Jul 7, 2004 0:24pm Subject: RE: NLJD's Thanks for the post James, I've been thinking about your comments on the use of the NLJD with regards to bomb detection and it strikes me that your comments regarding this must be equally valid with regards to Quadrupole Resonance detection (aka radio spectroscopy). The principle with QR technology, as I understand it (and my understanding is incomplete), is very similar to that of NLJDs in that you are pulsing airport baggage with an RF exciter and listening for the QR return signals belonging to the substances you are targeting. More worryingly for QR perhaps, the optimal pulse frequency is determined by the substance sought. The frequency band in the case of PETN, for example, is specific and is only 600 KHz wide: "The pulse radiated by the transmit coil are usually a sequence of phase coherent, high power RF pulses at centre frequencies dictated by the sample. In the case of TNT within the general range 500 to 1500kHz, RDX, 0.4MHZ to 6MHz and PETN 400kHz to 1MHz. The pulse lengths, intervals and coherency all influence to magnitude and frequency of the re-radiated signal." See here: http://tinyurl.com/2fmxo I do not know what pulse power current QR detection systems are running. However, I note the Russians run their pulses between 1KW and 5 KW - although this was in 1995, see here: http://www.ksu.kern.ru/grechishkin/ww5.htm - for a detection range of around 35cm. This, though, could just be the Russian approach to the problem as their NLJDs are also relatively high-powered. If the pulse frequencies (at the requisite power for QR) can be used as a trigger for an explosive device as you suggest is the case for NLJDs, then I assume you would make the same claims about using QR for EOD and this partially answers my question, thanks. In the context of facility security, however, how is xray different? What I'm trying to think through is why you would use an xray scan at an airport (or anywhere else for that matter) if an xray-triggered explosive device is so easy to build - as it appears having read these posts (the photodiode and the scintillating thingy). It strikes me that any transport facility using xray is vulnerable to a non-suicide checked baggage attack. That is, terrorists could use the security system itself as a target proxy - relying on the screening systems to trigger the weapons. Unless the screening systems were blast-shielded and/or located in areas remote from passenger concentrations an attack like this could be devastating. I note that some manufacturers of security systems are advocating screening directly at the ticketing counter claiming this provides speed as the screening occurs during the ticketing process which ordinarily takes several minutes. We can only trust that the TSA has, or will, put a whole lot of grey matter into this. It would be a tradgedy if western countries built themselves a giant Achilles heel with their anti-terrorism spend. The argument, as I understand it, against NLJDs for bomb detection is that there are already NLJD aware weapons around. But it's possible that the current state of play could change for any EOD system. Trace Detection systems are possibly least vulnerable in this respect but I'd like to know how an angina sufferer carrying a Glyceryl Trinitrate pump spray gets on getting past one. Here is a Polish plastic explosive detector which specs a pulse frequency between 0.5 and 10 MHz. "Adam Mickiewicz University The prototype device for the detection of plastic explosives in luggage by means of nitrogen-14 nuclear quadrupole resonance Explosives detected: RDX, HMX and PETN Minimum detection time: 100 g RDX in 30 sek (detection probability > 90%) Full automation of the detection process by a PC controlled 14N-FT NQR spectrometer The usage of the device as a high performance research 14N-NQR spectrometer operating in the frequency range 0.5-10 MHz is possible " Jerry "James M. Atkinson" wrote: The really funny thing is that only a complete fool would use a NLJD for detecting bombs or any other explosive device. Interestingly, companies that make Non-Linear Junction Detectors usually have no experience in working with bombs or explosives, their engineers and salesmen don't know the difference between a fuze and a fuse, and think the liquid nitrogen used by an EOD team is there to keep the the beer cold. The best way to shut down their false claims is to ask them, or one of their family members to hold a blasting cap in the palm of their hands while YOU "detect it" with a NLJD... the result will typically be someone starting to sputter and tap dance, with them qualifying their claims. The problem is that you will find out their don't actually have any idea what they are talking about when is comes to working with things that make loud noises and scatter body parts. In fact a good bomb builder (ie: ALQ, IRA, RB, IFI, etc) will add a small circuit that will detonate the bomb if a NLJD signal is detected, cell phone, or a microwave Doppler signal is picked up near the bomb. Many Chinese, Indian, and Pakistani land mines even contain a small 850-980 MHz detonator circuit to ensure that any NLJD used to detect the mines is reduced to little pieces. Add to this that the NLJD is essentially worthless for mine detection teams, and is more of a liability than a resource. Using a NLJD to detect bombs, is like using a match to find a gas leak. -jma At 09:48 AM 7/6/2004, Ocean Group wrote: > I guess that Russian guy was just talking a lot of "bull" >...and it was battery operated as well ? very big batteries ? >To make 250 watts at 800~900 mhz is not that easy as you may think Also >the(unwanted)harmonics will be amplified so you won't hear the wanted >harmonics. >At such a power level you will probably saturate(overload)any circuits wich >may not reflect any harmonics anymore > >So 250 watts from a NLJD ...can't be ! > > >### Couldn't tell you, they were specialising in bomb detection equipment >and I saw they offered an NLJD so I went up and asked him if I could paw it. >I had a look, the thing was massive, I asked a little bit about what type of >freq, SS etc and then asked at what power the RF burst was at, that's when >he said a couple hundred watts, I took double take and asked him to confirm >and he did. > >After that I laughed, thanked him for his time and mosied onto something a >bit more worthwhile. > >C'est tout! > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! [Non-text portions of this message have been removed] 9033 From: Chad Margita Date: Wed Jul 7, 2004 1:39pm Subject: Re: SpyfinderPersonal Vaporware? I ordered one 4-26-03 and they shipped it immediately. Maybe they are back ordered now that the unit has proven itself to actually work as advertised. It's also possible that they are going under for lack of sales. I don't know many who bought one. I do know that they have given up on the cheaper model they were trying to design. Let me know how they treat you and if you get your unit. I won't want to be recommending it if the company is having problems delivering. Chad Margita Off Duty Security ----- Original Message ----- From: "eglemont" To: Sent: Tuesday, July 06, 2004 6:29 PM Subject: [TSCM-L] SpyfinderPersonal Vaporware? > Two weeks ago I ordered spyfinderpersonal from SEAbase, > spyfinderpersonal.com. It hasn't arrived, they took my money two > weeks ago, and now they say another three to five weeks. > > Did anyone get one of these, do they exist, have they not finished > designing the unit yet? It's a nuisance to have to wait six or seven > weeks after they took my money. > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > 9034 From: Thomas Jones Date: Wed Jul 7, 2004 1:53pm Subject: NLJD Frequencies and EOD As a company, REI understands that the purpose of this forum is to discuss TSCM technical issues, and REI typically refrains from regular posting as we do not want to be perceived as using the forum for commercial advertisements. Nonetheless, comments have been posted regarding NLJD frequencies and EOD usage, and I thought it warranted a response. Please forgive any appearance of over promotion, and forgive the delayed response. NLJD Frequencies: Many years ago when we first did our research to develop our NLJD, the ORION, we were surprised and baffled as to why NLJD's seemed to respond differently to different targets. One of the things that we discovered was that Frequency was important. Many targets respond differently at different frequencies, and we wanted a product that would support many markets with little hardware change. For this reason, it was our goal to develop an NLJD with as wide an operating bandwidth as possible. - For export and Government use, the ORION can operate from 880MHz to 1005MHz (actually we can go down to 850MHz if requested). - For the USA FCC commercial approved version, 902 - 928 MHz (ISM band). - For the European CE mark version, 869.4 to 869.6MHz. Also, the transmit power is adjusted for both the FCC and CE mark approved versions. These power limitations are only invoked when the unit is placed in a CW transmission mode. In normal pulsing operation, all ORIONs transmit 1.4 watts of peak power even for FCC and CE mark versions. The FCC and CE mark regulations allow for pulsed transmitters with low duty cycle to have higher transmit peak power as long as the average power meets a specified value. Also, every ORION hardware is the same, but the firmware is programmed to only allow the proper frequency and power transmission. A few years ago, we added a frequency hopping mode to the ORION. Besides just sounding cool to have a Frequency hopping NLJD, the main reason was to increase detection reliability by hopping over a wide frequency band to hopefully cross frequencies that have a strong NLJD response. The second reason is an attempt at adding a little bit of stealth so that the NLJD transmission will not have such an obvious signature. The ORION can hop can cover 125MHz of bandwidth in 1.4 seconds and it has 625 channels. The hopping algorithm only allows it to hit each channel every 90 seconds. Furthermore, if the receiver encounters any interference, channels are automatically flagged and avoided. When using the ORION in this mode, you can switch the ORION to a CW mode of operation and the unit automatically jumps to the last frequency that got the greatest return. This has an interesting effect, if you scan a Cell Phone with an ORION, it will respond much better at frequencies that are within it's operational band. Therefore, it is quite useful to automatically jump to the frequency range of optimum performance based on the frequency hopping return data. (Incidentally, REI owns the patent rights for the NLJD frequency agile technology described in this E-mail.) A Graph of this frequency dependant effect for cell phones was published on page 3 of our Q1 2004 newsletter at http://www.research-electronics.com/downloads/REI_Q1_2004_Newsletter.pdf (Note: In the newsletter, the OPC 5.0 software that was supposed to be released in May was delayed and should be released this month. We are currently in BETA testing.) NLJD EOD: On the issue of NLJD use for EOD, I greatly appreciate Rob Muessel's comments. REI does not advertise or recommend NLJD's for this purpose, but many credible Governments around the world use them for this purpose. While I cannot support or deny this logic, the belief seems to be that the terrorist does not really intend for the IED to detonate on a search party, the goal is detonate on the intended target after the inspection is completed. Therefore, the assumption is to detect the electronics associated with the remote controlled detonation circuit. I can't imagine using an NLJD for Land Mine detection because most modern Landmines to not contain any electronics, only mechanical detonators. From our experience with Government purchases around the world, I cannot support Jim's claim about terrorist devices designed to detonate on NLJD signals. However, it would certainly be easy to do. Being a developer and manufacturer of NLJD technology and in order to have a clear conscience on the matter, REI did design a remote capability for the ORION. Our concept was that if you are going to use an NLJD for this purpose, you should at least be at a safe distance. Some customers use an NLJD on robots or put the NLJD on a tripod and then remove to a safe distance to turn it on. See our newsletter at http://www.research-electronics.com/downloads/4thQuarter2003Newsletter.p df or a previous article at http://www.research-electronics.com/downloads/ORION_RemoteControlSoftwar e.pdf. Sorry for the length. I hope that some of you find this information useful and no one ponders until you are weak and weary. Regards, Tom Jones REI General Manager 9035 From: Rob Muessel Date: Wed Jul 7, 2004 3:55pm Subject: Lost your number???? Ed Steinmetz- can you please give me a call. I seem to have the wrong number for you. Thanks. Apologies for the inconvenience to all. -- -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 www.tscmtech.com USA [Non-text portions of this message have been removed] 9036 From: James M. Atkinson Date: Wed Jul 7, 2004 3:52pm Subject: Re: SpyfinderPersonal Vaporware? Chad, Did you buy the full-blown version, or the little personal one? Also, if any list member has purchased the cheap personal one I would appreciate it if they would let the list know, ditto if you paid for one and haven't received it yet. -jma At 02:39 PM 7/7/2004, Chad Margita wrote: > I ordered one 4-26-03 and they shipped it immediately. Maybe they are >back ordered now that the unit has proven itself to actually work as >advertised. It's also possible that they are going under for lack of sales. >I don't know many who bought one. I do know that they have given up on the >cheaper model they were trying to design. Let me know how they treat you >and if you get your unit. I won't want to be recommending it if the company >is having problems delivering. > >Chad Margita >Off Duty Security > > >----- Original Message ----- >From: "eglemont" >To: >Sent: Tuesday, July 06, 2004 6:29 PM >Subject: [TSCM-L] SpyfinderPersonal Vaporware? > > > > Two weeks ago I ordered spyfinderpersonal from SEAbase, > > spyfinderpersonal.com. It hasn't arrived, they took my money two > > weeks ago, and now they say another three to five weeks. > > > > Did anyone get one of these, do they exist, have they not finished > > designing the unit yet? It's a nuisance to have to wait six or seven > > weeks after they took my money. > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9037 From: James M. Atkinson Date: Wed Jul 7, 2004 7:42pm Subject: SOFTWARE-BASED AUDIO AMPLIFIER Excuse me, but this smells like yet another rigged ITC bid (how many more people there have to get fired there before someone gets a clue). The comedian who wrote the technical spec. (who is also a list member) should be slapped as the amplifier gain should be at least 110 dB, but 135-140 dB would be better (NOT 70 dB). I notice that the spec. fails to mention anything about noise figures, and the part about a easy to use COLOR touch display is quite humorous. The input impedances are all screwed up as well, and fails to account for the lower impedance devices which given the limited gain requested ensure the product will miss one hell-of-a-lot of hostile devices. How about adding that something about a remote controlled robotic arm that connects the test least to the line under test as well? or even better... how just inviting the some hostile FIS agents do the whole pesky test for you? How the bloody hell are you going to use a 600 ohm input on a 10-15 ohm power line and get decent results ... I guess that's why gain is limited to 70 dB? The 600 Ohm/1 M Ohm requirement may work fine for law enforcement interceptions, but it is totally inappropiate for TSCM work. The 18 VDC biasing requirement is quite silly as their are quite a few microphones used for bugging that require at least 36 volts to bias (heaven forbid that we have to use more than 2ea MN1604 batteries in the thing). Hint: Do you speak FRENCH, HINDI, ARABIC, or CYRILLIC over this kind of microphone? Repeat after me... ALL audio amplifiers used for TSCM must have a TUNABLE impedance matching circuit, or a series of switch-able tunable bands to cover from 5 ohms to at least 1200 ohms, AND must have a secondary high impedance input of at least 40 megaohms (not one frickin mega-ohm). Why is the common mode rejection so low? it should be at least 40 dB better than this, and what is this silliness about the roll off at 2800 Hz... Excuse me, how about being a little more threat oriented, and a little less clueless. If the frequency response is limited to only 20 kHz, then how pray tell are you going to detect and record carrier current events? and at what detection threshold will these events need to appear.. what, 400 volts? How many conductors does the unit need to be able to pick from... two, four, eight, 200? How about a clean connection for a ground lead so you can include that as a conductor (or did they ignore what the North Koreans and Israeli's do with the ground circuit). Why only 60 minutes of audio, is it also going to be used as an illegal bug? What's that you say? this is starting to smell more like someone buying an illegal bug... NOT TSCM equipment. Why only connections to a phone line when the specification clearly states that want to test phone lines AND POWER lines. That are they going to do... straighten out a paper clip, stick it into the power outlet and then clip the popper clips to it? Or better yet, can you see a Ft. Washington trained knob turner trying to shove an RJ-45 jack into a power outlet? I wonder which hostile intelligence agency (slap), paid their asset at ITC (slap-slap) to cough up such foolishness (slap-slap-slap). Looks like about $83.56 in components for the isolation, switching, and DSP section, plus the cost of the "color touch screen", test leads, sexy case, and manual. The fancy software GUI they have the hots for is what is really going to drive the cost up, but it is very easy to extract voice or other signals once you get the signal in the digital domain. Most EE college students can pond out the software to do this as a class project for only a couple of grand. This requirement is a good example as to why the U.S. Government TSCM efforts tracks 10+ years behind the technology used by hostile Foreign Intelligence Services. The circuit and software to do this has been around for over 10 years and is little more than a handful of capacitors and inductors to create a high pass and anti-aliasing filter, plus to couple of 9 volt batteries, one switch, and potentiometer to provide bias voltages. Once you have impedance matched into the line under test you apply the signal to a cheap Analog Devices or TI DSP chip, and digitally extract the signal(s) of interest via the in-phase/out-of-phase components. Squirt it into a plastic box, and add an opto-isolated computer interface for good luck.... and like magic the little spies get caught... all for less than a grand. Toss in a couple of extra grand per unit and you can squeeze in a 80 GB hard drive so you can just digitize 300 Hz to 500 KHz for hours at a time. The spec. failed to mention that the resident software/firmware should be updated via a USB port, and that the LCD display should have a built in web-browser so the TSCM tech can surf the net while appearing to perform counter-intelligence activities. Given the age and experience level (or lack thereof) of the folk who will be using this gear perhaps they should add an option where the user can play video games and download on-line pron. Give me $500k, and I'll cough up a proof of concept in 45 days, and the first batch of production units 90 days later. Let's roll out the pork barrel... the hell with national security. Duh... "which end of a flashlight do you put the batteries in" Idiots... -jma ------------------------------------------------------------------------------------------------------------------------------- >SOFTWARE-BASED AUDIO AMPLIFIER >General Information >Document Type: PRESOL >Posted Date: May 11, 2004 >Category: Electrical and Electronic Equipment Components > >Set Aside: N/A > >Contracting Office Address >Other Defense Agencies, Washington Headquarters Services, Protective and >Support Services, 1155 Defense Pentagon, Room 5E330, Washington, DC, >20301-1155 > >Description >(i) This is a combined synopsis/solicitation for commercial services >prepared in accordance with the format in Subpart 12.6, as supplemented >with additional information included in this notice. > >This proposed action is for supplies for which the Government intends to >solicit and negotiate with one source, Intelligent Devices, Inc., under >authority of FAR 6.302-1. > >Persons may identify their interest and capability (statement) to respond >to the requirement (see xiv). > >THIS NOTICE OF INTENT IS NOT A REQUEST FOR COMPETITIVE PROPOSALS. > >See numbered Note 22 for further specifics. > >(ii) This solicitation is for the integration of a modern, software-based, >audio amplifier, for two prototypes and a first article. > >Delivery schedule/period of performance is to be proposed by contractor. > >(iii) This solicitation document and incorporated provision and clauses >are those in effect through Federal Acquisition Circular 2001-23, >effective May 05, 2004. > >(iv) The applicable North American Industry Classification System code is >334310 and the corresponding size/number of employees is 750. > >(v)& (vi) CLIN 0001-Prototype; CLIN 0002-Prototype; CLIN 0003-First Article. > >The Performance Work Statement (PWS) with specifications for the items >follows: > >1.0 Introduction > >This PWS is for the integration of a modern, software-based, audio >amplifier system. > >This system will be designed to give the Intelligence Community and the >Department of Defense the most effective capability in extracting audio >from any fortuitous conductor by combining hardware amplification with the >power of digital signal processing. This product will be a hybrid of an >audio amplifier and speech extraction software. > >This product will be capable of covertly intercepting audio while >performing additional functions such as off-hook loading, positive and >negative DC injection, and differential monitoring, and then digitally >processing any speech using specialized software. > >2.0 Background The Technical Surveillance Countermeasures (TSCM) Program >has utilized several audio amplifiers over the last decade for checking >conductors for unauthorized audio transmission. > >Traditional line amplifiers do very well at amplification if the signal is >relatively clean. Unfortunately, any noise that has corrupted on the line >is also amplified. > >To remove unwanted noise, there are new frequency domain, software-based, >audio filter/speech extraction technologies that surpass hardware-based >products. > >The opportunity now exists to marry the two technologies into a >specialized package designed for our unique requirements. > >3.0 Scope The Contractor shall integrate a product that will consist of a >portable, battery powered, integrated unit consisting of a hand-held >computer with telephone interface hardware, all necessary input/output >connections, and a full color graphic touch-screen with simple user >interface for control of all onboard functions. > >Both analog (such as test tone generation and adjustment of DC injection) >and digital (such as forensic audio) functions will be controlled using >the onboard color graphic touch-screen. > >All other signal processing functions, including the comb/notch and >band-pass filter, are handled digitally within the specialized software. > > >4.0 Requirements > >4.1 The Contractor shall ensure the system is electrically isolated to >prevent shock. > >4.2 The Contractor shall ensure the system?s input can be connected to >single end or differential feeds. > >4.3 The Contractor shall provide adjustable positive or negative DC >voltage injection. > >4.4 The Contractor shall ensure the system is switch able AC or DC 600 ohm >off hook loading. > >4.5 The Contractor shall ensure the system?s gain is adjustable from 0 to >70 dB via a combination of analog and digital gain. > >4.6 The Contractor shall provide a headphone jack with adjustable output >level and limiter function to prevent sudden output level changes. > >4.7 The Contractor shall ensure the system has digital on-screen tone >generation. > >4.8 The Contractor shall ensure the system has a simple touch screen user >interface to control all operations of the system. > >4.9 The Contractor shall ensure the system has a large, clear on-screen >indicators > >that will display the status of all functions. > >4.10 The Contractor shall provide onboard high quality digital audio >recording capacity of up to 60 minutes. > >4.11 The Contractor shall ensure the system will operate for approximately >3 hours per battery charge. > >4.12 The Contractor shall ensure the system will weigh under three pounds >total. > >4.13 The Contractor shall use separate rechargeable batteries for the >computer and the I/O signal interface box. > >4.14 The Contractor shall provide ambidextrous operation of the system. > >4.15 The Contractor shall ensure that the development time does not exceed >six (6) months. > >4.16 The Contractor shall ensure the system has the following system >performance specifications (only fully applicable for the First Article >system): > >Hardware-Amplifier-Total Gain: Adjustable, 0 dB to 70 dB. > >Bandwidth: 20 Hz to 20 kHz (3 dB). > >Input Impedance: Selectable, 600 ? and 1 M?. > >Input Configuration: >Single ended (A or B) and Differential (A-B). >Common Mode Rejection: 80 dB @ 50/60 Hz and minimum 50 dB @ 2800 Hz. > >Input Protection: 400 VDC, 240VAC protection. > >Input Connectors: Two 1/8 inch mono phone plugs marked A & B. > >Headphone Output: 2-channel 1/8-inch phone plug (signal in both ears). > >Headphone Overload Protection: High speed limiting to protect hearing. > >Output Impedance: 100 Ohms, AC coupled. > >Line Driver- DC Output Voltage: Adjustable 0 VDC to 18 VDC. >Output Current: 2 mA to 5 mA. >Line Polarity Reversing Switch: Included. > > >Software > >1) SES (Speech Extraction System) 4 based real-time technology modified >for direct fingertip touch control operation. > >2) Full floating point operation for very high frequency and dynamic >resolution. Record frequency domain events for utilization of an in-place >monitoring system for the frequency range of the system. > >3) Full Auto operation allows for a simple one-button solution to the >repetitive task of cleaning live audio. > >4) Continuously adjustable band-pass, comb/notch filtering, harmonic notch >filtering, automated tone detection and removal, and complex noise removal >functions. > >5.0 Security Requirements Eventual production items (not a part of this >PWS) including the dedicated touch-screen forensic audio software and the >task-specific I/O hardware shell, will be available to US Government >agencies, US law enforcement, and approved government and law enforcement >agencies with the expressed written consent of the US Government. > >6.0 Deliverables The Contractor shall provide three (3) models ? two (2) >prototypes and one (1) first article, in a phased approach to allow for >Government testing and feedback. > >The phases are as follows: Phase I (prototype # 1) ? Implementation of >standard SES4 software onto the small portable handheld computer. > >Phase II (prototype # 2) ? Implementation of application specific SES4 >software with a rudimentary hardware interface. Phase III (first article) >? Finished integrated amp and system. The Contractor shall provide three >(3) user manuals and data reports associated with the system >specifications cited in this PWS. > >7.0 Government Testing The Government (National Security Agency) >technicians and the PFPA TSCM technicians will conduct all testing at the >Interagency Training Center (ITC), 10530 Riverview Road, Ft Washington, MD >20744. > >The test will consist of connecting the system to both telephone and power >lines then detecting the audio that will be toned masked on those lines. > >The testers will utilize the software to cancel out all injected tones and >machine noise then record the audio. The system will pass test if coherent >audio can be recovered. > >The testers will test the in-place monitoring capability of the system by >producing a carrier current test signal to make sure the system registers >the event. > >The system will pass test if records event of the produced frequency. > >The testers will utilize DC voltage injection to bias a microphone that >requires between 4 and 18 volts DC that is polarity dependant to be activated. > >The system passes if microphone is activated and passes audio. > > > >[blah, blah, blah... mumbo-jumbo follows] > > >The Government will verify the PWS specifications to ensure the system >meets requirements. The system will pass first article testing and >approval if all the testing requirements are met and passed. (vii) Date(s) >and place(s) of delivery and acceptance and FOB point: Government Testing >Facility (see PWS). (viii) The following provisions apply to this >acquisition : Federal Acquisition Regulation (FAR) 52.212-1 entitled >Instructions to Offerors- Commercial. The following provision is being >added as an Addendum: FAR 52.214-31 Facsimile Bids/Quotes. (ix) Also >offers are to include a provision of FAR 52.212-3 entitled Offeror >Representations and Certifications- Commercial Items. Also, if your >company is a vendor not registered to do business with the Government, >check web address:http://www.dlis.dla.mil/ccr and provide company?s CAGE >Code with offer. (x) The following provision does apply to this >acquisition: FAR 52.212-4 entitled Contract Terms and >Conditions-Commercial Items. (xii) The following clause is applicable to >this acquisition: FAR 52.212-5 entitled Contract Terms and Conditions >Required To Implement Statutes or Executive Orders-Commercial Items. The >following FAR Clauses within the aforementioned clause are being selected >as applicable: 52.222-19, 52.222-21, 52.222-26, 52.222-35, 52.222-36, >52.222-37, 52.225-1, 52.232.33. In addition, the following clauses apply >to this acquisition: DFARS 252.204-7004, Required Central Contractor (CCR) >Registration and DFARS 252.212-7001 are applicable to this requirement. >Vendors may obtain CCR information by calling 1-888-227-2423 or via the >Internet at http://ccr.edi.disa.mil. ONLY FIRMS REGISTERED IN THE CCR ARE >ELIGIBLE FOR CONTRACT AWARD. (xiii) This provision applies to this >acquisition: FAR 52.209-4, First Article Approval, Government Testing. >(xiv) Submission and delivery of capability statements are to be forwarded >by May 14, 2004 by 11:00 A.M. local time, using either method: via >facsimile 703-692-0811 or via e-mail to mwalton@r.... The points of >contact for this acquisition are: Contract Specialist Mr. Michael Walton >(703) 695-3459, Contracting Officer Ms. Larna Palmer (703) 614-9324. ANY >FURTHER INQUIRIES SHOULD BE FORWARDED VIA FACSIMILE ON 703- 692-0811. No >telephonic inquiries are accepted. >Original Point of Contact >POC Larna Palmer, Contract Specialist, Phone 703-614-9324, Fax >703-692-0811, - Larna Palmer, Contract Specialist, Phone 703-614-9324, Fax >703-692-0811, >Place of Performance >Address: >CONTRACTOR'S FACILITY >, USA >Email: lpalmer@r..., lpalmer@r... ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9038 From: savanted1 Date: Wed Jul 7, 2004 3:49pm Subject: China steps up surveillance, targeting mobile phone messaging China's Xinhua News Agency has announced government plans to surveil SMS (short message service) message exchanges over cell phones for pornographic, obscene, and fraudulent content, while Reporters Without Borders argues that the new measure will also aim at political dissent. China already scans e-mail and chat sessions for subversive content, and blocks a number of foreign websites, but has had difficulty keeping up with newer technologies, such as SMS. The Xinhua report did not specifically mention political dissent, but noted that the new surveillance, to be implemented by Venus Info Tech, would target violent text messages as well as those that could "harm economic interests". So far, eleven companies have been penalized for such illegal operations as prostitution as a result of the surveillance. Mobile companies are expected to implement the filters from Venus as "self-discipline". http://www.securityfocus.com/news/9045 9039 From: James M. Atkinson Date: Wed Jul 7, 2004 9:58pm Subject: Film Request - 70mm I need to purchase a large amount of Kodak Color EIR film in 70 mm format with sprockets, but in rolls that are least 3600 feet long, and on a meter spool, and stored in tapped up metal canisters. The film has to be in date, and but still be in the unopened virgin sealed pouches, and have been kept refrigerated from the day it was made. I need 45 rolls of this film, for a total of 162,000 feet of film. I am willing to pay with cash, gold coin, or major credit card. I need the film in my hands by Monday NLT 3 PM The spooks on the list know what this is for... -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9040 From: James M. Atkinson Date: Wed Jul 7, 2004 11:53pm Subject: Spyshop Report Curious report that other members may want to comment on. -jma >From: Frank Cornwell >Subject: Spyshop Report >To: jmatk@tscm.com > >This weeks spyshop report: >Spyshop: Spyexchange Ausin TX >Owner: Thomas Publications > >Our I Team had inquired to the Spyexchange about a possible bugsweep via >phone: > >The spyexchange reported that this could be done easily.Phone lines would >be checked with a voltmeter for voltage drop to determine if a line had >been tapped."Radio bugs" would be detected by state of the art >equipment.The discussion did not cover what would be done if a device was >found. > >The next part of the I team mission entailed having a look at the shop to >see what was on display concurrent with claims that many items sold >through the stores site were not in stock >During our visit to the store,multiple items were on display such as PI >Badges,diode detectors,books etc, E Bay style wireless cameras from >taiwan and a Kaiser 1080H telephone line analyzer.. > >We inquired about the 1080 H,and examined it on the counter,It was mounted >in what apppeared to be a platt briefcase,and had several radio shack >accessories with it which led us to believe it was a used piece of >gear,although a instruction sheet that had Mr Kaisers call sign printed >on it was part of the package. > >We did not know if it was operational as someone named Cody was not there >to explain if it was still serviceable. > >The shop vaguely reminded us of an old "Stuckeys" complete with >coffeecups,shotglasses and swag from various agencies.James Bond gadgets >kids toys and CCS style "things" . Everything for the retired multi agency >employee looking to impress possible marks er or clients. >On a scale from 1 to 10 the shop got a 2 only because an old out of >service police interceptor was parked out front and gave the I team a few >moments of laughter. > >If you know of a spyshop that needs to be checked out,please contact the I >team investigative debunkers. > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9041 From: neverbeatle Date: Wed Jul 7, 2004 11:07pm Subject: Re: NLJD's Thanks for the post James, I've been thinking about your comments on the use of the NLJD with regards to bomb detection and it strikes me that your comments regarding this must be equally valid with regards to Quadrupole Resonance detection (aka radio spectroscopy). The principle with QR technology, as I understand it (and my understanding is incomplete), is very similar to that of NLJDs in that you are pulsing airport baggage with an RF exciter and listening for the QR return signals belonging to the substances you are targeting. More worryingly for QR perhaps, the optimal pulse frequency is determined by the substance sought. The frequency band in the case of PETN, for example, is specific and is only 600 KHz wide: "The pulse radiated by the transmit coil are usually a sequence of phase coherent, high power RF pulses at centre frequencies dictated by the sample. In the case of TNT within the general range 500 to 1500kHz, RDX, 0.4MHZ to 6MHz and PETN 400kHz to 1MHz. The pulse lengths, intervals and coherency all influence to magnitude and frequency of the re-radiated signal." See here: http://tinyurl.com/2fmxo I do not know what pulse power current QR detection systems are running. However, I note the Russians run their pulses between 1KW and 5 KW - although this was in 1995, see here: http://www.ksu.kern.ru/grechishkin/ww5.htm - for a detection range of around 35cm. This, though, could just be the Russian approach to the problem as their NLJDs are also relatively high-powered. If the pulse frequencies (at the requisite power for QR) can be used as a trigger for an explosive device as you suggest is the case for NLJDs, then I assume you would make the same claims about using QR for EOD and this partially answers my question, thanks. In the context of facility security, however, how is xray different? What I'm trying to think through is why you would use an xray scan at an airport (or anywhere else for that matter) if an xray- triggered explosive device is so easy to build - as it appears having read these posts (the photodiode and the scintillating thingy). It strikes me that any transport facility using xray is vulnerable to a non-suicide checked baggage attack. That is, terrorists could use the security system itself as a target proxy - relying on the screening systems to trigger the weapons. Unless the screening systems were blast-shielded and/or located in areas remote from passenger concentrations an attack like this could be devastating. I note that some manufacturers of security systems are advocating screening directly at the ticketing counter claiming this provides speed as the screening occurs during the ticketing process which ordinarily takes several minutes. We can only trust that the TSA has, or will, put a whole lot of grey matter into this. It would be a tradgedy if western countries built themselves a giant Achilles heel with their anti-terrorism spend. The argument, as I understand it, against NLJDs for bomb detection is that there are already "NLJD aware" weapons around. But it's possible that the current state of play could change for any EOD system. Trace Detection systems are possibly least vulnerable in this respect but there's the problem, at least currently, of high false alarm rates. Sydney Air Traffic control had to recall a Korean 747 last week an hour after it left the airport because the screener ignored the alarm from the trace detector. I wonder how an angina sufferer carrying a Glyceryl Trinitrate pump spray gets on getting past one. Here is a Polish plastic explosive detector which specs a pulse frequency between 0.5 and 10 MHz. "Adam Mickiewicz University The prototype device for the detection of plastic explosives in luggage by means of nitrogen-14 nuclear quadrupole resonance Explosives detected: RDX, HMX and PETN Minimum detection time: 100 g RDX in 30 sek (detection probability > 90%) Full automation of the detection process by a PC controlled 14N-FT NQR spectrometer The usage of the device as a high performance research 14N-NQR spectrometer operating in the frequency range 0.5-10 MHz is possible " Jerry --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > The really funny thing is that only a complete fool would use a NLJD for > detecting bombs or any other explosive device. > > Interestingly, companies that make Non-Linear Junction Detectors usually > have no experience in working with bombs or explosives, their engineers and > salesmen don't know the difference between a fuze and a fuse, and think the > liquid nitrogen used by an EOD team is there to keep the the beer cold. > > The best way to shut down their false claims is to ask them, or one of > their family members to hold a blasting cap in the palm of their hands > while YOU "detect it" with a NLJD... the result will typically be someone > starting to sputter and tap dance, with them qualifying their claims. The > problem is that you will find out their don't actually have any idea what > they are talking about when is comes to working with things that make loud > noises and scatter body parts. > > In fact a good bomb builder (ie: ALQ, IRA, RB, IFI, etc) will add a small > circuit that will detonate the bomb if a NLJD signal is detected, cell > phone, or a microwave Doppler signal is picked up near the bomb. > > Many Chinese, Indian, and Pakistani land mines even contain a small 850-980 > MHz detonator circuit to ensure that any NLJD used to detect the mines is > reduced to little pieces. Add to this that the NLJD is essentially > worthless for mine detection teams, and is more of a liability than a resource. > > Using a NLJD to detect bombs, is like using a match to find a gas leak. > > -jma > > > > > At 09:48 AM 7/6/2004, Ocean Group wrote: > > I guess that Russian guy was just talking a lot of "bull" > >...and it was battery operated as well ? very big batteries ? > >To make 250 watts at 800~900 mhz is not that easy as you may think Also > >the(unwanted)harmonics will be amplified so you won't hear the wanted > >harmonics. > >At such a power level you will probably saturate(overload)any circuits wich > >may not reflect any harmonics anymore > > > >So 250 watts from a NLJD ...can't be ! > > > > > >### Couldn't tell you, they were specialising in bomb detection equipment > >and I saw they offered an NLJD so I went up and asked him if I could paw it. > >I had a look, the thing was massive, I asked a little bit about what type of > >freq, SS etc and then asked at what power the RF burst was at, that's when > >he said a couple hundred watts, I took double take and asked him to confirm > >and he did. > > > >After that I laughed, thanked him for his time and mosied onto something a > >bit more worthwhile. > > > >C'est tout! > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > ------------------------------------------------------------------- ---------------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ------------------------------------------------------------------- ---------------------------------- > > James M. Atkinson Phone: (978) 546- 3803 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ------------------------------------------------------------------- ---------------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ------------------------------------------------------------------- ---------------------------------- 9042 From: Date: Thu Jul 8, 2004 2:27pm Subject: Defendant Escapes After Gluing Electronic Monitoring Device To Cat 14-Year-Old Murder Defendant Escapes After Gluing Electronic Monitor To Cat POSTED: 3:05 pm EDT July 7, 2004 UPDATED: 3:30 pm EDT July 7, 2004 PRINCETON, W.Va. -- A 14-year-old girl under house arrest on charges of murdering her father escaped after cutting an electronic monitoring device off her ankle and gluing it to a cat, authorities said. Police searched on Wednesday for Kayla Marie LaSala, who fled an uncle's house early Saturday. If she thought pinning the device to the cat would fool authorities, it did not work: An alarm went off when a circuit in the device was broken, officials said. But she was gone before police could get there. "She's very, very sharp. She's cunning," said sheriff's Detective C. T. Lowe. Kayla is awaiting trial Sept. 7 on charges of stabbing her father to death in February. Sheriff's Sgt. A. D. Beasley said the motive for the slaying was unclear. Lowe said Kayla told family members she planned to escape by July 2. He said the relatives were asleep when she fled. [Non-text portions of this message have been removed] 9043 From: Thomas Shaddack Date: Thu Jul 8, 2004 6:27pm Subject: Re: Re: NLJD's On Thu, 8 Jul 2004, neverbeatle wrote: > It strikes me that any transport facility using xray is vulnerable > to a non-suicide checked baggage attack. That is, terrorists could > use the security system itself as a target proxy - relying on the > screening systems to trigger the weapons. Unless the screening > systems were blast-shielded and/or located in areas remote from > passenger concentrations an attack like this could be devastating. > > I note that some manufacturers of security systems are advocating > screening directly at the ticketing counter claiming this provides > speed as the screening occurs during the ticketing process which > ordinarily takes several minutes. We can only trust that the TSA > has, or will, put a whole lot of grey matter into this. It would be > a tradgedy if western countries built themselves a giant Achilles > heel with their anti-terrorism spend. The heel is there already. Scanning the luggage at the ticketing counter won't bring significantly more direct risk; remember it's the moment where a hostile passenger with a bomb does not need any more complicated triggering mechanism than a manually controlled pushbutton. It's actually an improvement against a non-suicidal attacker, as the possibility of the device being triggered in the vicinity of the attacker is not the desired outcome there. The unscreened huddled waiting masses are a prime target themselves; Bruce Schneier reportedly came with such observation when he saw the crowds of people waiting to be security-scanned. They are one big herd of vulnerability. (I believe it's referenced in his book Beyond Fear, but I didn't read it yet.) The delays introduced by additional screening partially lowered risk on one side of the screening frames, but raised it on the other one. My gut feeling is that this avenue of attack is more low-tech and more likely than a NLJD or X-ray aware device. The complexity of the technological possibilities, together with the sexiness of the more advanced ones, has a danger of seducing us away from seeing the simple, low-tech threats. > The argument, as I understand it, against NLJDs for bomb detection is > that there are already "NLJD aware" weapons around. But it's possible > that the current state of play could change for any EOD system. Trace > Detection systems are possibly least vulnerable in this respect but > there's the problem, at least currently, of high false alarm rates. > Sydney Air Traffic control had to recall a Korean 747 last week an hour > after it left the airport because the screener ignored the alarm from > the trace detector. I wonder how an angina sufferer carrying a Glyceryl > Trinitrate pump spray gets on getting past one. These systems are in danger of an easily-exploitable denial of service. If they are sensitive-enough, a single taxi shuttling between a bigger hotel and the airport, with the trunk sprayed with the mentioned pump, could cause a whole bunch of false alarms and lots and lots of delays. There already are precedents of such kinds of sabotage: A water pistol with water from a bong was reportedly used in London (and at least suggested to be used) in Sydney in order to mount a successful DOS on the drug sniffing dogs being used for random searches in public transportation. See . Along the same line, and remembering the earlier post about Chinese screening the SMS messages: The same city also had a group of about 60 volunteers operating a SMS service for alerting the subscribers when sniffing squad was seen in their general area. See also , and much more in Google search results for the keyword "snifferdogalert" here: . The site is down now, there are rumours that the cops found a way how to take it down; or maybe it was a victim of its own success, as it's difficult to provide free service to over 3000 SMS subscribers. There is a limitation of SMS services on this range - but perhaps IP-based messaging systems of newer-generation mobile devices, together with service decentralization, can improve the situation. The trench war between pot growers and pot busters is an interesting field to observe, getting more interesting with every new technology introduced on the chessboard - in both technical and social sense, being it cellphones on one side or multispectral imaging on the other one. (Similar services are here in Prague for alerting about ticket inspectors in public transportation, in NYC for spotting celebrities, and so on. More possibilities are described in eg. the Rheingold's book Smart Mobs; another book I should read. It's interesting what can happen with new technology once it hits the streets; "toothing" (using Bluetooth-enabled devices to find likely-minded people nearby) is one of the examples of such unexpected developments. The attractivity of these possibilities, however, brings the risk of security vulnerabilities present in the phones, as it motivates the people to not disable the services.) (A cuuuuute Bluetooth virus would be one that would just sit and spread for few days, then change the ringtone to coughing and the SMS beep to a sneeze, then "heal" after a week. Your phone could get a flu just by spending time next to an infected phone in the bus...) -- ....Airplane: (n) An overhyped bus with retractable wheels. 9044 From: Shawn Hughes (Road) Date: Fri Jul 9, 2004 2:46am Subject: Re: Advanced Explosives Detection Jerry , > I've been thinking about your comments on the use of the NLJD with > regards to bomb detection and it strikes me that your comments regarding > this must be equally valid with regards to Quadrupole Resonance detection > (aka radio spectroscopy). NLJD - Bad. QR - ok in certain circumstances. QR units are in use now, forgive me, I forget my references, but deminers are beginning to use them. Certain types of munitions contraindicate their use, however. >If the pulse frequencies (at the requisite power for QR) can be used as a >trigger for an explosive device as you suggest is the case for NLJDs, then >I assume you would make the same claims about using QR for EOD and this >partially answers my question, thanks. Potentially. I would not advise the use of either in an IED context, however, in the field of UXO/OER, where metal content in munitions drops each year, QR has its' place. >It strikes me that any transport facility using xray is vulnerable to a >non-suicide checked baggage attack. That is, terrorists could use the >security system itself as a target proxy - relying on the screening >systems to trigger the weapons. Unless the screening systems were >blast-shielded and/or located in areas remote from passenger >concentrations an attack like this could be devastating. Except, the Bad Guys haven't historically targeted these checkpoints, preferring to instead target the facility or service they protect. As areas become increasingly 'hardened', we expect what you surmise to begin occurring. >The argument, as I understand it, against NLJDs for bomb detection is that >there are already NLJD aware weapons around. Any device with an electrically - operated fuzing system is going to be 'NLJD aware'. When the broom sweeps the item, the RF can overload or even damage the circuitry, or create enough current in a dry leg of the circuit to fire the device. >But it's possible that the current state of play could change for any EOD >system. Trace Detection systems are possibly least vulnerable in this >respect but I'd like to know how an angina sufferer carrying a Glyceryl >Trinitrate pump spray gets on getting past one. Every day, people like this do get stopped. And, people with radioactive tracers as a part of radiotherapy. People are starting to carry their medical orders, which isn't foolproof and susceptible to misuse, but as technology advances, we must play catchup. Jerry, this is a hugely - expanding science. You make some good observations. remember that a large number of bomb builders get taken out by their own devices, and most bombs are simplistic in nature. Sincerely, -Shawn ============================= Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response, Incorporated ////////////////////////////////////////////////////////////////////////////// To be announced..... ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. 9045 From: Shawn Hughes (Road) Date: Fri Jul 9, 2004 3:05am Subject: Re: reply to Tom's post (NLJD) At 02:52 PM 7/8/04 +0000, you wrote: >but many credible Governments around the world use them for this >purpose. I am not aware of any reputable organizations using this gear for this purpose. It would be foolhardy, and shows a lack of operational knowledge. Some places have more money than sense. >While I cannot support or deny this logic, the belief seems to >be that the terrorist does not really intend for the IED to detonate on >a search party, the goal is detonate on the intended target after the >inspection is completed. This is a dangerous belief. >Therefore, the assumption is to detect the >electronics associated with the remote controlled detonation circuit. As I previously posted, unless it is mechanically commanded to function, *ANY* electrically - operated firing circuit illuminated by a NLJD has a VERY high probability of firing. >I can't imagine using an NLJD for Land Mine detection because most modern >Landmines to not contain any electronics, only mechanical detonators. This is exceptionally erroneous. Most modern emplaced weapons systems use a great deal of electronic circuitry to comply with UN law requiring them to self-destruct after a period of time. > >From our experience with Government purchases around the world, I cannot >support Jim's claim about terrorist devices designed to detonate on NLJD >signals. Due to the access agreement I have had with publications and bulletins concerning this matter, I cannot confirm or deny this statement. Except to say it is in the public literature that several IED's have been discovered with a RF - sensing capability. Whether they were tuned specifically to a NLJD frequency, I can't say. Sorry. >However, it would certainly be easy to do. Being a developer >and manufacturer of NLJD technology and in order to have a clear >conscience on the matter, REI did design a remote capability for the >ORION. Our concept was that if you are going to use an NLJD for this >purpose, you should at least be at a safe distance. Some customers use >an NLJD on robots or put the NLJD on a tripod and then remove to a safe >distance to turn it on. Sir, if you are selling these items to personnel knowing what they are capable of doing, and they subsequently are killed, even if you've made them aware, I'm not a product liability lawyer, but I see a large window of exposure to you and your company, if not simply as an integrity issue. I am very knowledgeable on the Remotec line of units, and have had experience with some of the smaller ones. How they can keep an even distance on a remote manipulator would be interesting to watch. And, I'm not so certain about the tripod method. Noone in my field has time to sweep for devices by moving a tripod, running back, checking, running up, and moving 8 inches at a time. Any person that uses a device that emits radio - frequency energy to look for bombs is making a terrible, terrible mistake. I teach people how to look for bombs, previously I used to take apart bombs as a Public Safety Bomb Technicians. No one I know in the US, UK, or Canada teaches this method, and from these sources most of the rest of the world gets their knowledge base. I strongly urge you to rethink your stance on providing items to those who do not fully appreciate the danger they are placing themselves in. Since this topic might be perceived to be straying from the mission statement, I'll happily take this offline if need be. Very respectfully, Shawn Hughes ============================= Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response, Incorporated ////////////////////////////////////////////////////////////////////////////// To be announced..... ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. From: Dr. Pepper Date: Thu Jul 6, 2000 3:27pm Subject: Re: Discovery Notification Procedures Thank you James, , , , , , , , That was a well written, detailed "work instruction". It was greatly appreciated by me. I have been a Quality Engineer responsible for auditing (surveying) Navy Contractors for over thirty five years, and I firmly believe in "Work Instructions". They should be followed exactly, every time. Of course that assumes that they are accurately written in the first place:-} And, of course, one should never "Assume" anything. I have only recently started doing bug sweeps for a Private Investigator, and I have to admit that I did not look at this business in that light. Over the years, I have learned several things, , , , 1. The best technical equipment you can have is your EYES. They are much more important than any other piece of equipment in your tool bag. The Second best tool, is the ability to ask a lot of what some people may consider "dumb questions". The more you know about a situation, the better you will be prepared to cope with it. (Don't assume anything) Again, James, , ,Thank you very much for your treatise. J.R. "Ron" Cheshire, P.E. ACI Engineering Ridgecrest, CA ============================================== "James M. Atkinson, Comm-Eng" wrote: > I've gotten quite a few questions regarding "Notification Procedures" > so I though it was time to post something to the list. > > -- - - - Dr Pepper, aka Ron Cheshire, WB6GKI, 35.37.26N/117.40.02W China Lake, CA USA 90 miles West of Death Valley, 200 miles North of LAX - - - 783 From: 1RCM <1RCM@M...> Date: Thu Jul 6, 2000 5:07pm Subject: Toys For Sale Hi List, I have a few items for sale that were obtained for a start-up business partnership that I was involved with which never really got off the ground. The three pieces of test equipment came from a working electronics lab that moved their operation to a sister division on the west coast and didn't want to ship-out a bunch of redundant equipment. The three pieces were gotten about a year ago and I was told at the time that they were all calibrated about six months prior to that. However their actual age is unknown. They have been sitting unused on a shelf since I received them but have been powered-up every few months and each time appeared to fully function per spec. Although obviously I can't offer any warranty on them I do guarantee that they are not DOA and I will offer a full right of return if any of them are received that way. The covert video equipment is brand new and is what remains from what the ex-partners split between them when they went their separate ways. This equipment has never been used except to be checked to be in working order when it was purchased and received almost a year ago. The asking price for each item is set at what is required for the partnership to 'get back a reasonable portion of their investment' in order to legally settle the business affairs of the partnership. And so the prices are unfortunately basically non-negotiable at this time. Packaging and shipping costs are to be at the buyer's expense (and choice) and will be from the Philadelphia, Pa. area. I can take credit cards through a third party who is an active participant on this list. That will allow any buyers to 'spread the pain' of their purchase out plus allow for some positive measure of assurance to anyone who has ever been 'taken' via e-commerce as the buyer can set it up with the third-party to have their money held in escrow until their purchase is received. I'll give a bit of detail on the equipment here and then I can be contacted at 1RCM@M... for further information, for digital photos of any of the items, or with any questions. But please, serious inquiries only! 1. HP 8565A Spectrum Analyzer - This unit covers 10 MHz to 22 GHz and is capable of going to 40 GHz with external mixers (I don't have them but they are easily obtained). The spec books says it has internal yig preselector from 1.7 GHz to 22 GHz, resolution bandwidth 3MHz to 1KHz, amplitude -112dBm to +30 dBm, CRT bezel readouts of frequency, resolution bandwidth, sweep rate, and other parameters, and trace storage from 1 to 30 minutes (this one I'm not sure of since I haven't played with that feature on this unit since I don't have any manual). The display is bright and the case is cosmetically in real good shape. The unit displayed everything that I was able to throw at it when I got it and still does so when I checked it just prior to making this post. I don't have any manual with this unit. Tucker and the ads in Nuts & Volts resell this unit for $4,000.00 and up. I'll let it go for $3,000.00. 2. HP 8640B Signal Generator - According to the spec book this unit covers 0.5 to 512 MHz, has an output level of +19 to -145 dBm (2 V to 0.013 v), output is calibrated, metered and leveled to within +/- 0.5 dB across the full frequency range, has internal modulation from 20Hz to 600 kHz and provides AM, FM and pulse modulation. I don't know if it has any of the usual manufacturer's options installed so I won't make any claims to that fact. If they are installed then the buyer gets a bonus that he didn't pay for. The case is cosmetically in very good shape. I have the original shop manual with this unit and these must be quite rare because one just went on e-Bay for over $100 for the manual alone. The resell price on this unit minus the manual is $1,850.00 and up. This one goes for $1,250.00 with the manual included. 3. Tektronix 2445 Oscilloscope - This unit is a 4 channel, full-function O-scope with a bandwidth to 150mHz. The case is cosmetically in very good shape and the display is clear and bright. The unit has no carry/stand handle as it was rack mounted when obtained. There is no case or manual with the unit either. The resell price is $1,600.00 and up. The first $1,150.00 takes it. 4. Covert Video Equipment - 1 - Watec 902A 1/2" CS mount b/w mini-camera with power supply. It has 0.03 lux with 450 TV lines. 3 - Digispec model VMD-LC1 digital motion detector units. These are for use with virtually any camera source to start/stop video recording decks only when motion is detected in the user-adjustable field of view. 1- Sony model FDM-402B b/w hand-held set-up monitor. It has a 3.7" tube and comes with attachable battery and charger. 1- Marshall 4-20 mm zoom pinhole lens. It has fully adjustable settings and will fit any 1/2" CS mount camera or virtually any CCD camera with an easily purchased adapter attached. 1- VMI KPT811X 12-in-1 covert lens kit. You can mix and match these pieces to make any of the 12 covert lens set-ups, take it apart, and then make another lens set-up - all in the field. Anyone who has ever used this kit has found it indispensable for those 3 AM installations where the lenses that you brought turn out not to be the one lens that you need to get the shot. 1- Sony SVT-DL224 VHS 8/24 real-time continuous play recording deck. It runs on 12 vdc and comes with the 110vac mini-power supply as well. This unit uses the easily obtainable T150 VHS tape rather than some of the exotic extended-play media. 1- 50' and 6-25' sections of micro-line dual-line coax. This stuff is the size of small residential 110 zip cord and carries both the video signal and the camera power on its dual lines. It has all applicable connectors on each end. This stuff is special-order and goes for better than $1.50/foot. It's easy to hide and easy to work with. I'd like to sell all of the above-listed covert video equipment as one lot (unless someone makes such a good offer that I can take the risk of being left with an orphan piece or two). All of the above covert video equipment cost $4,624.00 new one year ago. It has never been used and is in excellent condition. I need to get $3,500.00 for the lot. Take Care .... Bob Motzer 784 From: Mike Dever Date: Thu Jul 6, 2000 7:02pm Subject: Re: (was) Various Subjects (now) Video monitoring Ron and other members of the List, There appears to have been some misunderstanding. I wasn't asking the question about fax or e-mail interception. I am well aware of the technology to do same. I was simply suggesting that it might be a good question for the FAQ 2000 list as it is a common misunderstanding of our clients. For those who may be interested a couple of manufacturers are: Spectronic (a Danish company) manufactures internet e-mail interception equipment (http://www.spectronic-denmark.com/) and Teletron (Israel) manufactures fax interception equipment. Regards -- Michael J. Dever CPP Senior Engineer Dever Clark & Associates Canberra Australia Telephone: +6254 5337 Telefax: +6278 4020 E-mail: deverclark@b... > From: "Dr. Pepper" > Organization: ACI > Reply-To: TSCM-L@egroups.com > Date: Thu, 06 Jul 2000 06:54:54 -0700 > To: TSCM-L@egroups.com > Subject: Re: [TSCM-L] (was) Various Subjects (now) Video monitoring > > I'm just a newbie to this list here in Californbia, USA, but the question > asked below is, I think, quite obvious! YES! It can be intercepted and read. > ANYTHING can be intercepted and read! Fax and email are very simple > to intercept. > > The question of video interception is another story, but yes, it also, can be > intercepted. I am presently seting up a video montoring system for use in my > office, and to sell as a complete system for others that may need this > service. > > My question is: > Is there anyone out there using video moinitoring, who would they like to > compare and discuss these things with me? I really need to talk to someone > who is more experienced with these systems who would share their thoughts. > > Thanx > > Ron Cheshire, > ACI Engineering, > Ridgecrest, CA > DrPepper@i... > > ================================================== > > > Mike Dever wrote: > >> James and other members of the group, >> >> 1. Covert Video Surveillance: >> >> There has been some recent discussion about the legality of covert video >> surveillance. >> >> All Australian jurisdictions (federal, state and territory) have existing >> laws prohibiting the manufacture, sale, possession, use, etc of 'listening >> devices' however the law has been silent about video or optical surveillance >> until recently. At least one state here in Australia (Victoria) has enacted >> legislation prohibiting covert video surveillance without a warrant from a >> court. The Victorian legislation is called the 'Surveillance Devices Act, >> 1999' and is available at http://www.dms.dpc.vic.gov.au/sb/index.html. >> >> It is expected that all Australian states and territories will soon have >> similar legislation. >> >> 2. Detection of IR Emitting devices: >> >> In addition to the Watec Model WAT-902A, the Ikegami ICD-42 series >> monochrome cameras also have a very good IR response. The spectral response >> of the ICD43E for example extends to beyond 1100nm (without the IR cut >> filter) >> >> 3. Bug Sweep FAQ 2000 >> >> Just the other day a prospective client asked me if it was possible to >> intercept fax or e-mail communications and read them. Apparently they asked >> their 'security company' who told them that it was impossible to intercept >> fax and e-mail transmissions. So perhaps a question for the FAQ list could >> be: "Can fax messages be intercepted?" >> >> Regards >> Michael J. Dever CPP >> Senior Engineer >> Dever Clark & Associates >> Canberra >> Australia >> Telephone: +6254 5337 >> Telefax: +6278 4020 >> E-mail: deverclark@b... >> >> ------------------------------------------------------------------------ >> Who invented Gatorade -- and what part did it play in >> winning the1967 Orange Bowl? Find out the true facts at >> http://click.egroups.com/1/6212/1/_/507420/_/962834502/ >> ------------------------------------------------------------------------ >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.onelist.com/community/TSCM-L >> >> or email your subscription request to: >> subTSCM-L@t... >> =================================================== TSKS > > -- > - - - > Dr Pepper, > aka > Ron Cheshire, WB6GKI, > 3537.26N/11740.02W > China Lake, CA USA > 90 miles West of Death Valley, > 200 miles North of LAX > - - - > > > > > ------------------------------------------------------------------------ > Savings + service + convenience = beMANY! > http://click.egroups.com/1/4116/1/_/507420/_/962915235/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 785 From: Gregory G. Horton Date: Fri Jul 7, 2000 1:03am Subject: Re: Discovery Notification Procedures Jim, The notification procedure should be just the way you said it should be in a perfect world. My experience was quite the opposite. I had a client that was concerned with his business partner etc., etc. He wanted us to inspect his house and then his office. The first thing I checked was the telephone junction in the alley behind the house. When I climbed the pole and found a recorder alligator clipped to the client's line, I immediately did what you said to do. When I placed a call to the FBI (Los Angeles Office) I was politely advised that they didn't handle this type of incident and told me I had to contact the local police. I contacted the local jurisdiction (not LAPD) and the detective told me to stand by and they would send a patrol car out and have the officer remove the device. I asked about keeping the device under observation, and they said they couldn't do it. We politely declined their assistance. Greg Horton 786 From: William Knowles Date: Fri Jul 7, 2000 0:39am Subject: RE: Various Subjects On Thu, 6 Jul 2000, Miguel Puchol wrote: > Hi all, > >> Just the other day a prospective client asked me if it was possible to >> intercept fax or e-mail communications and read them. Apparently >> they asked their 'security company' who told them that it was >> impossible to intercept fax and e-mail transmissions. So perhaps a >> question for the FAQ list could be: "Can fax messages be intercepted?" > > Yes. I've seen a combination of hardware/software system intercept faxes > sent via Inmarsat (in A mode) - so same could be done in telephone lines. This one comes highly recommended from a friend that has their gear. http://www.swagur.com/ He basically left it on for a week while he was out consulting and was amazed at how many faxes he recieved, Only getting one side of the conversation didn't. Plenty of them would have been called sensitive in his book. I'm sure your client would shudder with the thought of their stuff being read by any other parties besided the intended ones. William Knowles wk@c... *-------------------------------------------------* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen. Alfred. M. Gray, USMC --------------------------------------------------- C4I Secure Solutions http://www.c4i.org *-------------------------------------------------* 787 From: Robert G. Ferrell Date: Fri Jul 7, 2000 9:06am Subject: Re: Re: Request for assistance >If any in the group have contacts that would be willing to share >an anonymous policy statement please let me know. Hi Doug, You probably wouldn't be interested in my security policy, per se, since it is largely identical to those of other federal agencies. However, I can recommend a few good references upon which a great many corporate policies are based. NIST 800-18 (Guide for Developing Security Plans for Information Technology Systems) has a nice generic framework. The book "E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets" by Michael R. Overly (American Management Association, 1999) is decent. There are also a lot of good policy suggestions in the "Information Security Management Handbook" by Harold F. Tipton and Micki Krause (Auerbach, 2000). There are a number of policies available on the Web, mostly from educational institutions. A few that come to mind are Smith College (http://www.saultc.on.ca/security.html), Texas A&M (my alma mater) (http://www.tamu.edu/cis/qapcm/SecurityPolicy.html), the Queensland (Australia) University of Technology (http://www.fit.qut.edu.au/policy/Policy3.html), and St. Charles County Community College (http://www.stchas.edu/about/it/APPENDIXA1.htm). There are probably many more. You might also want to review http://security.isu.edu/csl/csl01-94.html, a computer security policy document by the Center for Decision Support at Idaho State University. Hope this helps, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 788 From: D. Douglas Rehman Date: Fri Jul 7, 2000 9:28am Subject: RE: Re: Request for assistance We sell a computer policy drafting guide at http://www.computerpolicy.com. It covers a wide range of computer related areas and covers information security. Best Regards, Doug Rehman Rehman Technology Services, Inc. Specializing in Computer Forensics and Technology Related Investigations License A-9800119 Mount Dora, Florida (Orlando Area) (352)357-0500 http://www.surveil.com 789 From: Thomas H. Jones Date: Fri Jul 7, 2000 9:56am Subject: RE: Research Electronics Equipment The CPM probe that has been designed for the the CE mark and has good ESD protection is priced at $105. This probe is designed specifically for the CPM-700, the part number is "RFP-700E". You can purchase through Jim Atkinson or REI directly. It should be noted that this probe and all the CPM probes have very good sensitivity because the CPM provides DC current to the handle of the probe which contains a pre-amp to boost the RF signals being detected by the probe. It is not merely an antenna. Tom Jones General Manager REI -----Original Message----- From:James M. Atkinson, Comm-Eng [SMTP:jmatk@tscm.com] Sent:Thursday, July 06, 2000 4:21 PM To:TSCM-L@egroups.com Subject:RE: [TSCM-L] Research Electronics Equipment Do you have a part number for the insulated antenna? -jma At 9:02 AM -0500 7/5/00, Thomas H. Jones wrote: >When we first developed the CPM, we knew that ESD would be a problem if >care is not taken to avoid the problem. We could have added additional >circuitry to address the issue, but this would have lowered the sensitivity >of the unit. However, about three years ago we modified the design of the >CPM probe antenna to meet CE mark requirements, and now we offer two >versions of the probe. The normal version is unchanged, the new version has >an antenna that is basically rubber coated to protect against ESD. There is >slight loss in performance with the new antenna, and for this reason, we >usually do not ship this version unless requested. But, most people find >the performance more than adequate for a broadband receiver. If you would >like this new probe, please contact us directly. > >Best Regards, >Tom Jones >General Manager REI > > > >-----Original Message----- >From:A Grudko [SMTP:agrudko@i...] >Sent:Wednesday, July 05, 2000 8:16 AM >To:TSCM-L@egroups.com >Subject:Re: [TSCM-L] Research Electronics Equipment > >----- Original Message ----- > > The OSCOR and CPM-700 make an excellent package to get started with, > > and we have had really good luck with them. > >I'm also very happy with the CPM-700 except that it is prown to blowing the >first stage transistor in the RF probe if you touch a metal object and >there >is a static discharge. We have blown 3 that way. > >Our winters are very dry and some carpet/shoe friction combinations cause >serious discharges - you can see the spark even in daylight. We tell our >technicians to touch metal frequently to discharge and obviously try to >keep >the probe away from any conducting surface, but.... > >Taking shoes off helps but looks weird to the client. We tried a computer >tech.'s wristband with a long cable to earth but that has it's own >disadvantages - one blow-out was 'cos the tech. didn't realised he'd pulled >the cable out by stepping on it and touched a metal filing cabinette. Well >that's his story. > >I don't have the same problem with the Scanlock. I can only think of >re-fitting the probe's PCB into a bigger box with BNC m & f's, add some >static protection and make up a strip of veroboard straight through the >neat >little CPM probe to the antenna. Any better suggestions? > > >Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime >investigation & intelligence >Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - >Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 >9673 - 465 1487 (Fax) - Est. 1981 >GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA >Chairman), CITTF, >UKPIN, AFIO (OS), IWWL, PRETrust "When you need it done right - first >time" ICQ 78711262 =================================================================== Everybody's into computers... Who's into yours?? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke =================================================================== ------------------------------------------------------------------------ Law.com is the preeminent online destination for legal professionals. Visit Law.com for exclusive content from American Lawyer Media, online CLE Seminars, Practice Centers and Career Listings. http://click.egroups.com/1/5803/1/_/507420/_/962917363/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 790 From: Robert G. Ferrell Date: Fri Jul 7, 2000 10:55am Subject: Re: Discovery Notification Procedures >When I placed a >call to the FBI (Los Angeles Office) I was politely advised that they >didn't handle this type of incident Hi folks, I'm a little concerned with this statement. If this is the actual wording used by the investigative assistant or duty agent with whom you spoke, it's incorrect. 18 USC 2511 spells out quite clearly that wiretapping is a federal crime, and therefore the purview of the FBI. What the FBI person should have done was at least to offer to take the complaint, even if there was a serious doubt in his/her mind that the US Attorney's office would prosecute. I hope this is an isolated case of simple misinformation on the part of the FBI person, who may have been new or for some other reason unaware of the proper procedure. RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 791 From: James M. Atkinson, Comm-Eng Date: Fri Jul 7, 2000 11:26am Subject: Re: Discovery Notification Procedures At 10:55 AM -0500 7/7/00, Robert G. Ferrell wrote: > >When I placed a > >call to the FBI (Los Angeles Office) I was politely advised that they > >didn't handle this type of incident > >Hi folks, > >I'm a little concerned with this statement. If this is the actual >wording used >by the investigative assistant or duty agent with whom you spoke, it's >incorrect. 18 USC 2511 spells out quite clearly that wiretapping is a federal >crime, and therefore the purview of the FBI. What the FBI person should have >done was at least to offer to take the complaint, even if there was a serious >doubt in his/her mind that the US Attorney's office would prosecute. > >I hope this is an isolated case of simple misinformation on the part >of the FBI >person, who may have been new or for some other reason unaware of the proper >procedure. > >RGF > >Robert G. Ferrell, CISSP I agree with you, Wiretapping is a FEDERAL crime and as such ANY federal law enforcement officer has legal obligation to "take the case". Of course every federal law enforcement agency attempts to weasel out of getting "bug finds" dropped on their lap, which is why you have to document everything and make all of your initial notifications in writing. I generally include a paragraph at the top of my notification letters that points out the jurisdiction issue, and ask that if they opt not to assist to direct the letter to an "appropriate agency". In the event that you "get anything less then an enthusiastic response" from a federal law enforcement agency then you should make sure that you provide your local U.S Attorneys office (send it to THE U.S. Attorney, and NOT an Assistant U.S. Attorney) with a copy of the notification letter. Also send a secondary letter where you mention the agent by name to refused to handle the complaint. Sadly, No federal law enforcement agency has never formally accepted or been given jurisdiction over bugging and wiretapping incidents unless the incident involves classified materials or industrial, military, or economic espionage. The U.S. is ripe for a major crackdown on the spy shops, eavesdroppers, and wiretappers, but nobody really cares about enforcing the law already on the books. Generally the "newly minted agents, still wet behind the ears" will give you the most problems, but the older agents are a bit more understanding. In any case, documentation is your friend, as is having a formal discovery and notification proceedure already in place. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 792 From: James M. Atkinson, Comm-Eng Date: Fri Jul 7, 2000 11:27am Subject: Mossad spy given suspended sentence [*** HOT ***] [This just hit the wire] Mossad spy given suspended sentence http://www.ananova.com/news/story/switzerland_spying-israel-world_145653.html A Swiss court has found a Mossad agent guilty of spying and given him a one-year suspended sentence. The decision in Lausanne means the agent, identified only by the pseudonym Issac Bental, will not serve any time in a Swiss prison and is free to return to Israel. Defence lawyers welcomed the verdict. They said Bental was only doing his duty to ward off terrorist attacks against Israel. Swiss prosecutors demanded imprisonment for 15 months, including the 65 days already served in 1998. The court found Bental guilty of illegal activity on behalf of a foreign country and using forged passports. Last updated: 11:06 Friday 7th July 2000. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 793 From: James M. Atkinson, Comm-Eng Date: Fri Jul 7, 2000 0:15pm Subject: Re: Discovery Notification Procedures As a formality years ago I started writing down every little aspect of how I perform a TSCM or related service. My primary goal was to use computer controlled instruments, and to let it help ferret out potential threats. Of course to do this I first had to describe in detail every aspect of what I wanted the computer to do, which was then reduces to a series of C instructions. When a client contacts me for a sweep I have a 3 ring binder that I grab so I can collect on of the information on the assignment and "fill in the blanks". I then have my computer spit out a copy of the "Prep Worksheets", equipment checklists, and so on. Once I arrive on-site I have a RF worksheet that runs several hundred pages, and is mostly computer generated modeling information. Each wallplate, switch, light fixture, piece of furniture, and so on each has a different type of detailed checklist, and higher threat things such as doors and door frames have a 6+ pages list. I have one type of checklist for pocket calculators, another one for AC powered calculators, another for ashtrays, and so on. The checklist for a single telephone line is 16+ pages, and the inspection list for the phone instrument is over 20 pages. Years ago I learned not to assume anything, and learned that by documenting every aspect of what you do there is less chance to miss minor anomalies or details which could point to a bug. Customers also seem to be a lot happier when you can show then that you are working off of a formal plan of work or blueprint. Customers are also delighted that you have a formal scientific method and procedure that they can look at, touch, feel, and talk with you about. My "Procedural Guide" is currently a total of six (soon to be seven) 1.5-inch thick binders. Each binder covers the methods used on a specific segment of the TSCM survey. I insert copies of what ever worksheets are appropriate for the job into the back of each section once I arrive and "count the wallplates". Since most of my sweeps are repeat customers I can usually just pull the blueprints and prepare the worksheets in advance. When I roll out to perform a sweep I print off a current version of the "Procedural Guide" so that it becomes a living document. At the end of EVERY sweep, learn of a new threat, and so on I make a batch of updates to the "Procedural Guide" so that it evolves over time to be more useful. If anybody is interested I will code up some of the proceedures and worksheets in HTML and put them up on my website so you can see what I am talking about. -jma At 1:27 PM -0700 7/6/00, Dr. Pepper wrote: >Thank you James, , , , , , , , > >That was a well written, detailed "work instruction". >It was greatly appreciated by me. > >I have been a Quality Engineer responsible for auditing (surveying) >Navy Contractors for over thirty five years, and I firmly believe in >"Work Instructions". They should be followed exactly, every time. >Of course that assumes that they are accurately written in the first place:-} >And, of course, one should never "Assume" anything. >I have only recently started doing bug sweeps for a Private Investigator, >and I have to admit that I did not look at this business in that light. > >Over the years, I have learned several things, , , , >1. The best technical equipment you can have is your EYES. >They are much more important than any other piece of equipment >in your tool bag. > >The Second best tool, is the ability to ask a lot of what some people >may consider "dumb questions". The more you know about a situation, >the better you will be prepared to cope with it. (Don't assume anything) > >Again, James, , ,Thank you very much for your treatise. > >J.R. "Ron" Cheshire, P.E. >ACI Engineering >Ridgecrest, CA =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 794 From: Steve Uhrig Date: Fri Jul 7, 2000 0:04pm Subject: Re: Discovery Notification Procedures Once upon a midnight dreary, Robert G. Ferrell pondered, weak and weary: > >When I placed a > >call to the FBI (Los Angeles Office) I was politely advised that they > >didn't handle this type of incident > I'm a little concerned with this statement. If this is the actual wording > used by the investigative assistant or duty agent with whom you spoke, > it's incorrect. 18 USC 2511 spells out quite clearly that wiretapping is > a federal crime, and therefore the purview of the FBI. What the FBI > person should have done was at least to offer to take the complaint, even > if there was a serious doubt in his/her mind that the US Attorney's office > would prosecute. My experience has been similar. On a very controversial find in an extremely high profile corporation, on a Saturday evening, the local FBI office basically told me they were not going to yank anyone out of the bowling alley to respond. Local police responded after clearing all the barking dog and loud music complaints and got the same brushoff from the FBI. The local officer, this late at night, could not get anyone in legal to research whether the bug was a state offense. The officer, properly, stated he could not enforce federal law, only state or local. Although he personally inspected the bug and interviewed personnel involved, his hands were tied without some indication the thing was a state offense. He wrote a report and left. I was not in my own state and did not have that state's statutes at my fingertips. I was operating from a cell phone in the parking lot. The next day (Sunday) I faxed the officer the sections from that state's code showing the thing was a felony. I never heard back from him and neither the officer nor his supervisor would return my calls. The device was not a LE one. I learned later that the FBI has a satellite office in the same building as where I found the transmitter, and they could not even be bothered to go up and inspect it. For all I know, the thing could still be there although it would not be operating. I wallpapered myself but have little faith in official procedures. I know every agency from local sheriffs to the Bureau get regular calls from lunatics, but I had left the device in place with witnesses, the local officers personally inspected it and there was no doubt my call was not from a lunatic. This old government boy knows how to CYA and I left it at that. Years ago on a domestic wiretap, the FBI also brushed me off, and local police would take only a telephone report. On another completely separate incident, after 3 calls to the local police, I left for home after waiting five hours for the officer to respond. I understand so many lunatics calling every week that the agencies have to draw the line somewhere. They can't afford to respond to the volume of calls. But it apparently makes no difference for one to be calm, lucid, professional and a third part, and former law enforcement themselves. I am firmly against licensing for TSCM, but at least that would give some credibility. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 795 From: James M. Atkinson, Comm-Eng Date: Fri Jul 7, 2000 0:54pm Subject: Re: Discovery Notification Procedures At 1:04 PM -0400 7/7/00, Steve Uhrig wrote: >Once upon a midnight dreary, Robert G. Ferrell pondered, weak and weary: > > > >When I placed a > > >call to the FBI (Los Angeles Office) I was politely advised that they > > >didn't handle this type of incident > > > I'm a little concerned with this statement. If this is the actual wording > > used by the investigative assistant or duty agent with whom you spoke, > > it's incorrect. 18 USC 2511 spells out quite clearly that wiretapping is > > a federal crime, and therefore the purview of the FBI. What the FBI > > person should have done was at least to offer to take the complaint, even > > if there was a serious doubt in his/her mind that the US Attorney's office > > would prosecute. > >My experience has been similar. On a very controversial find in an >extremely high profile corporation, on a Saturday evening, the local FBI >office basically told me they were not going to yank anyone out of the >bowling alley to respond. > >Local police responded after clearing all the barking dog and loud music >complaints and got the same brushoff from the FBI. The local officer, >this late at night, could not get anyone in legal to research whether the >bug was a state offense. The officer, properly, stated he could not >enforce federal law, only state or local. Although he personally >inspected the bug and interviewed personnel involved, his hands were tied >without some indication the thing was a state offense. He wrote a report >and left. > >I was not in my own state and did not have that state's statutes at my >fingertips. I was operating from a cell phone in the parking lot. The >next day (Sunday) I faxed the officer the sections from that state's code >showing the thing was a felony. I never heard back from him and neither >the officer nor his supervisor would return my calls. > >The device was not a LE one. > >I learned later that the FBI has a satellite office in the same building >as where I found the transmitter, and they could not even be bothered to >go up and inspect it. For all I know, the thing could still be there >although it would not be operating. > >I wallpapered myself but have little faith in official procedures. I know >every agency from local sheriffs to the Bureau get regular calls from >lunatics, but I had left the device in place with witnesses, the local >officers personally inspected it and there was no doubt my call was not >from a lunatic. > >This old government boy knows how to CYA and I left it at that. > >Years ago on a domestic wiretap, the FBI also brushed me off, and local >police would take only a telephone report. On another completely separate >incident, after 3 calls to the local police, I left for home after >waiting five hours for the officer to respond. > >I understand so many lunatics calling every week that the agencies have >to draw the line somewhere. They can't afford to respond to the volume of >calls. But it apparently makes no difference for one to be calm, lucid, >professional and a third part, and former law enforcement themselves. > >I am firmly against licensing for TSCM, but at least that would give some >credibility. > >Steve Hmmm... maybe it's time for the TSCM industry to start a lobbying effort to push the FBI to formally obtain jurisdiction over "Bug Finds". A handful of letters sent to the appropriate legislative contacts could result in a memo that the FBI must handle such investigations (provided they are legitimate) Steve is right about the FBI getting hit with calls from lunatics, mental patients, and crackpots. This is why you want to always make your notification is writing, and to take great care to reflect a professional image to them. I would point out that according the the FBI "Investigative Manual/SOP" they will ALWAYS suspect the person who "found the bug" (let me know if you would like the exact chapter and verse). -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 796 From: A Grudko Date: Fri Jul 7, 2000 0:45pm Subject: Signal During a TSCM sweep last night in a government office I detected a strange signal which I would like to hear comment on. Frequency was 503.250 NBFM which is in one of our TV bands. It was detected on 4 different receivers, having different IFs, mixing and Fq synthisis, so I'm confident that it was really there. It dropped about 10 db if I tuned 5 kcs (smallest tuning increment on that equipment) up or down but was undetectable 10 kcs up or down. There were 5 TV signals detected in band but none had a similar 'blank carrier' signal associated. Close by (<2km) is an airport and closer are various cellulars/repeaters/MW links etc. The building has an extensive data network operating through RG58U type cable on BNC T type connector inputs. Signal was analysed for AM, WBFM, NBFM, Side Band and variable range Sub-carrier (via Scanlock + HP 'scope). Subjectively it did not sound like pure, unmodulated carrier - it sounded more like a solid, modulated FM carrier from a silent room. This building has a prior history of hostile RF based audio surveillance (2 events in 18 months). The signal strength was Full Scale Deflection (20db over S10), did not respond like a low power signal in the room in question and upon moving to other rooms I found it present at differing strengths, inferring low power. I put increasing stepped attenuation in line but could not find a hot source - signal dropped pretty well equally from room to room. Some non-target rooms were locked but serious knocking on the doors etc. did not produce any modulation on the suspect frequency. The signal was detectable outside the building but faded as we moved away from it (into noise at about 600 mtrs, all be it to an external 1/4wave GP antenna resonating at 460 Mhz) so I think it originated somewhere in the building. I am confident that the signal was not hostile to the rooms in question on the sweep, but it was a wierd one....what really got me was the 'empty room' feeling I got from the NBFM demodulated audio. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 797 From: A Grudko Date: Fri Jul 7, 2000 1:12pm Subject: Re: Various Subjects ----- Original Message ----- From: Mike Dever > Just the other day a prospective client asked me if it was possible to > intercept fax or e-mail communications and read them. Apparently they asked > their 'security company' who told them that it was impossible to intercept > fax and e-mail transmissions. I suggest they get a better informed 'security company'. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 798 From: A Grudko Date: Fri Jul 7, 2000 2:21pm Subject: TSCM ----- Original Message ----- > We had various discussions with Government TSCM Groups regarding the > debugging industry, Government/private, etc. Government has a strategic > committee regarding input to the SOB. We had consultations with them but > they have their own ideas and vision in this regard. The relationship > between them (Government Groups) and us are however good and we are approved > suppliers regarding training, equipment, etc. > > We are glad to see that there are also others who are concerned and > dedicated to the debugging industry. We need professionals and hope that > through dedication we will get rid of the so-called "specialists". I hate to be pedantic, but "specialists" are what we need...but real specialists, not posers who have read and quote a few brochures. Approved suppliers are good, but as soon as they become aproved we all know what they can or cannot do. 799 From: Date: Fri Jul 7, 2000 0:24pm Subject: Re: Discovery Notification Procedures OK, here's the straight scoop. Interception of Communications is a Federal offence and is a violation handled by the FBI. The local police or sheriff also have concurrent jurisdiction under applicable state statute. (I talking about California here) I am a retired FBI agent and was the Technical Advisor for the Sacramento Division of the FBI, covering from the Los Angeles County line to the Oregon border, and Nevada state line to the coastal mountain range. The Complaint Clerk or Duty Agent should have written the matter up, even if no action was being taken, and the complaint forwarded to the appropriate supervisor for information or action. We received many complaints from individuals who claimed that their phone was tapped, they're hearing clicks on the line, etc, and we did NOT respond to those complaints and search for a device, nor would they normally be written up. In 20 years I never received a complaint from a PI or private TSCMer reporting a found device. I can recall only one incident where a director of a government agency, who was involved in serious labor problems, called and articulated a set of facts that caused me to believe that they were in fact tapped (room bug) and I responded and swept the area and checked the phones with negative results. They originally denied, but later admitted that they had talked about their suspicions and the fact that they had called the FBI in the office in question. Conclusion? Device removed. Had I known this in advance, I probably would not have taken the case. Ninety percent of our complaints came from the telephone company ( via security), who had found a device attached to their wires, and we responded to all of those complaints, took custody of the device and conducted logical investigation. The matter was presented to the United States Attorney for a prosecutive opinion and we either prosecuted the subject or closed the case. The US Attorney, by district policy at that time, would not prosecute domestic husband/wife or boyfriend/girlfriend cases. Business and political spying or espionage was prosecuted. In either case, the suspects knew that they were caught and if something came up again the old case would be reopened and consolidated into the new one and they wouldn't get a free pass the second time. FBI Agents like arresting criminals, and putting them in jail. Part of my annual performance evaluation covered the number of cases I handled, the number of arrests, indictments, convictions, fines, savings, recoveries (value of stolen property), etc, and if someone called me with a slam-dunk case, I'd take it in a heartbeat. There is a reverse to all of this, too. Sometimes, when telephone security called, it was coincidental with the failure of one of my court ordered interceptions. A phone repairman found something suspicous and removed it. By policy, they are supposed to leave it in place and call their supervisor who will then contact security. When doing private sweeps, the question is eventually asked if they might be under law enforcement scrutiny, and they are told that if a device is found which in my opinion is a LE device, it will not be removed, nor will they be advised that it was found. One client then admitted that his business partner was under investigation and he thought that he might be also. If something is found and no LE agency will admit to me that it is theirs, then it is disclosed, however, this hasn't happened yet. So, if you find a device, call it in. Let's put somebody in jail. Oh, and don't smear any fingerprints that might be on the device or the battery, etc. Carl Larsen Sacramento 800 From: Preflat@p... Date: Fri Jul 7, 2000 4:37pm Subject: Re: Discovery Notification Procedures ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: Sent: Friday, July 07, 2000 11:26 AM Subject: Re: [TSCM-L] Discovery Notification Procedures At 10:55 AM -0500 7/7/00, Robert G. Ferrell wrote: > >When I placed a > >call to the FBI (Los Angeles Office) I was politely advised that they > >didn't handle this type of incident I have told the local FBI office about devices I have found in the past. I was told "the federal government is not interested in the domestic affairs of it's citizens". I was only to tell them when I found evidence that someone was installing or building these things for hire. ( Most of these devices were of the 'mom and pop' variety). Just my 2 cents. Steve Preflatish ADVANCED COUNTERMEASURES 801 From: James M. Atkinson, Comm-Eng Date: Fri Jul 7, 2000 5:33pm Subject: Bricks, bars, art adorn new US embassy in Moscow Bricks, bars, art adorn new US embassy in Moscow http://www.boston.com/dailyglobe2/189/nation/Bricks_bars_art_adorn_new _US_embassy_in_Moscow+.shtml By Brian Whitmore, Globe Correspondent, 7/7/2000 MOSCOW - Employees at the US Embassy in Moscow still refer to a church across the street, where the Soviet KGB once installed surveillance equipment, as ''Our Lady of Immaculate Reception.'' Such dark humor reflects the embassy's troubled history in the Russian capital. But on the day when officials proudly opened their new chancery building to the public, US Ambassador James Collins said the issue was no laughing matter. ''I don't joke about security,'' Collins told reporters yesterday. Neither do the guards at the door. Anybody wishing to pass through the embassy compound's red-brick walls and black-iron gates must endure an airport-like security check. Mobile telephones, laptop computers, personal digital assistants, and anything else remotely electronic must be checked at the door. Officials said the measures are justified given past security breaches. The embassy has been pelted with eggs, shot at with grenade launchers, and broken into by a drunk soldier. And that was after the Cold War ended. Construction of the new embassy began in 1979 but was abruptly halted in 1985 when listening devices were found throughout the building - including hundreds implanted in pieces of precast concrete and around the steel reinforcing bars. At the time, some officials said the building had become a ''mammoth microphone.'' A Senate committee described it as the ''most massive, sophisticated, and skillfully executed bugging operation in history.'' Under a 1972 agreement between Moscow and Washington, Soviet labor and materials were used initially. After the bugs were discovered, only American workers and materials were used. In another Cold War-era security breach, an embassy guard, Marine Sergeant Clayton J. Lonetree, was accused of espionage in December 1986. In 1987 he was convicted of passing the names of nine CIA operatives to a KGB agent. Lonetree was introduced to the KGB agent by a female Russian translator at the Moscow embassy with whom he had an affair. In May, after more than 20 years of construction work that cost American taxpayers more than $240 million, the embassy's 1,200-member staff finally moved into a new chancery. It was dedicated during President Clinton's visit to Moscow last month. Embassy officials yesterday showed off the smart new 10-story building, with its spiral staircases and walls decked out with modern art. ''I like to think of this as a very good, secure modern building,'' Collins said. ''It was built by Americans, designed by Americans, and overseen by Americans.'' In the time it took to tear down the bugged building and erect a new one, the Cold War halted, the Soviet Union collapsed, and Russian-American relations warmed up and then cooled off again. ''We are entering a new era in our relations with the Russian Federation, and this building represents what we are trying to do in these relations,'' Collins said. He added that the new embassy is private and secure enough for the embassy staff to ''work with confidence,'' but also would be open and welcoming to the Russian public. ''We are not just an observer anymore, but also a participant,'' Collins said. But viewed from the outside, the embassy still looks somewhat like ''Fortress America.'' Russians complain of long lines and what they call a demeaning screening procedure to obtain a US visa. Some US citizens complain about the tight security when they have business at the embassy. The embassy also has become a focal point for anti-American demonstrations and sometimes violent attacks. Yesterday, a small group of environmentalists were protesting Washington's proposal to build a missile defense system. During last year's NATO-led airstrikes against Yugoslavia, angry Russians pelted the embassy with eggs and paint. Last March, men armed with grenade launchers and an assault rifle sprayed the building with gunfire. Earlier this year, a drunk 19-year-old soldier broke into the embassy compound and reportedly tried to steal a car before being shot and wounded by a guard. ''We are in an environment where you cannot take physical safety for granted,'' Collins said. This story ran on page A02 of the Boston Globe on 7/7/2000. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 802 From: James M. Atkinson, Comm-Eng Date: Fri Jul 7, 2000 5:47pm Subject: Re: Discovery Notification Procedures Carl, Many thanks for posting your comments regarding this to the list. It's always tough trying to get the agent on complaint duty to write up the incident unless you know the guy on duty, but your right that the guy still should have written in up. -jma At 5:24 PM -0400 7/7/00, farklexfbe@a... wrote: >OK, here's the straight scoop. > >Interception of Communications is a Federal offence and is a violation >handled by the FBI. The local police or sheriff also have concurrent >jurisdiction under applicable state statute. (I talking about California here) > >I am a retired FBI agent and was the Technical Advisor for the Sacramento >Division of the FBI, covering from the Los Angeles County line to the Oregon >border, and Nevada state line to the coastal mountain range. > >The Complaint Clerk or Duty Agent should have written the matter up, even if >no action was being taken, and the complaint forwarded to the appropriate >supervisor for information or action. > >We received many complaints from individuals who claimed that their phone was >tapped, they're hearing clicks on the line, etc, and we did NOT respond to >those complaints and search for a device, nor would they normally be written >up. In 20 years I never received a complaint from a PI or private TSCMer >reporting a found device. I can recall only one incident where a director of >a government agency, who was involved in serious labor problems, called and >articulated a set of facts that caused me to believe that they were in fact >tapped (room bug) and I responded and swept the area and checked the phones >with negative results. They originally denied, but later admitted that they >had talked about their suspicions and the fact that they had called the FBI >in the office in question. Conclusion? Device removed. Had I known this in >advance, I probably would not have taken the case. > >Ninety percent of our complaints came from the telephone company ( via >security), who had found a device attached to their wires, and we responded >to all of those complaints, took custody of the device and conducted logical >investigation. The matter was presented to the United States Attorney for a >prosecutive opinion and we either prosecuted the subject or closed the case. >The US Attorney, by district policy at that time, would not prosecute >domestic husband/wife or boyfriend/girlfriend cases. Business and political >spying or espionage was prosecuted. In either case, the suspects knew that >they were caught and if something came up again the old case would be >reopened and consolidated into the new one and they wouldn't get a free pass >the second time. > >FBI Agents like arresting criminals, and putting them in jail. Part of my >annual performance evaluation covered the number of cases I handled, the >number of arrests, indictments, convictions, fines, savings, recoveries >(value of stolen property), etc, and if someone called me with a slam-dunk >case, I'd take it in a heartbeat. > >There is a reverse to all of this, too. Sometimes, when telephone security >called, it was coincidental with the failure of one of my court ordered >interceptions. A phone repairman found something suspicous and removed it. By >policy, they are supposed to leave it in place and call their supervisor who >will then contact security. > >When doing private sweeps, the question is eventually asked if they might be >under law enforcement scrutiny, and they are told that if a device is found >which in my opinion is a LE device, it will not be removed, nor will they be >advised that it was found. One client then admitted that his business partner >was under investigation and he thought that he might be also. If something is >found and no LE agency will admit to me that it is theirs, then it is >disclosed, however, this hasn't happened yet. > >So, if you find a device, call it in. Let's put somebody in jail. Oh, and >don't smear any fingerprints that might be on the device or the battery, etc. > >Carl Larsen >Sacramento > >------------------------------------------------------------------------ >Find long lost high school friends: >http://click.egroups.com/1/5535/1/_/507420/_/963005054/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 803 From: James M. Atkinson, Comm-Eng Date: Fri Jul 7, 2000 5:49pm Subject: Re: Discovery Notification Procedures At 4:37 PM -0500 7/7/00, Preflat@p... wrote: >----- Original Message ----- >From: James M. Atkinson, Comm-Eng >To: >Sent: Friday, July 07, 2000 11:26 AM >Subject: Re: [TSCM-L] Discovery Notification Procedures > > >At 10:55 AM -0500 7/7/00, Robert G. Ferrell wrote: > > >When I placed a > > >call to the FBI (Los Angeles Office) I was politely advised that they > > >didn't handle this type of incident > >I have told the local FBI office about devices I have found in the past. I >was told "the federal government >is not interested in the domestic affairs of it's citizens". I was only to >tell them when I found evidence that someone was >installing or building these things for hire. ( Most of these devices were >of the 'mom and pop' variety). > >Just my 2 cents. > >Steve Preflatish >ADVANCED COUNTERMEASURES Steve, this is why you should always inform them in writing, and should ALWAYS push for someone to fill out an appropriate report on the incident. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 804 From: James M. Atkinson, Comm-Eng Date: Fri Jul 7, 2000 6:50pm Subject: Re: Discovery Notification Procedures > >I would point out that according the the FBI "Investigative >Manual/SOP" they will ALWAYS suspect the person who "found the bug" >(let me know if you would like the exact chapter and verse). > Manual of Investigative Operations and Guidelines (AKA: MIOG) Part II, Section 16 Pages 133-140 =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 805 From: Date: Fri Jul 7, 2000 4:17pm Subject: Re: Re: Discovery Notification Procedures Jim, That comes under the category of "logical investigation" Like your web-site, by the way. cl 806 From: Dawn Star Date: Sat Jul 8, 2000 10:30am Subject: duck and cover "My experience has been similar. On a very controversial find in an extremely high profile corporation, on a Saturday evening, the local FBI office basically told me they were not going to yank anyone out of the bowling alley to respond." Steve Uhrig My experience is the same also, I hand it over to the clients attorney, and then I duck and cover and stay maximum low profile, After twenty five years on the front line you find this is the way not to become a "bug" on a windshield. Roger Tolces, Electronic Security, Los Angeles [Non-text portions of this message have been removed] 807 From: A Grudko Date: Sat Jul 8, 2000 5:21pm Subject: Another strange signal Any ideas....? Semi rural area. 141.675 Mhz NBFM. 6 x 250 milisec tone bursts of about 900 Hz. followed by 1 sec rest (no carrier). Max. sig. range is 5 km. Sounds like a 'bumper beeper' but it never moved over past 6 weeks. Location roughly identified to within a km radius. This signal appears to be running 24/7. I can only think it it an 'exception reporting' fail safe process monitoring (non-TSCM hostile) system where if something goes wrong (i.e. 5 > blips, not 6) it triggers an alarm. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 808 From: A Grudko Date: Sat Jul 8, 2000 5:37pm Subject: Re: Research Electronics Equipment ----- Original Message ----- From: Thomas H. Jones > The CPM probe that has been designed for the the CE mark and has good ESD > protection is priced at $105. This probe is designed specifically for the > CPM-700, the part number is "RFP-700E". > > It should be noted that this probe and all the CPM probes have very good > sensitivity because the CPM provides DC current to the handle of the probe > which contains a pre-amp to boost the RF signals being detected by the probe. It is not merely an antenna. > Tom Jones > General Manager REI Tom. As I have stated, I like the CPM 700. It is one of 4 spectrum emission devices we use on our sweeps. The probe upgrade cost of $ 105 is not an issue. But if the upgrade is, as I understand, coating the antenna with a static resistant surface, this sounds inadequate in our circumstances where we see blue static arcs over 3 - 6 mm just walking on carpet. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 809 From: Steve Uhrig Date: Sat Jul 8, 2000 5:56pm Subject: Re: Another strange signal Once upon a midnight dreary, A Grudko pondered, weak and weary: > Semi rural area. 141.675 Mhz NBFM. 6 x 250 milisec tone bursts of about > 900 Hz. followed by 1 sec rest (no carrier). Max. sig. range is 5 km. > Sounds like a 'bumper beeper' but it never moved over past 6 weeks. "Bumper beeper" pulse widths are much shorter than 250 ms. Frequently less than 100 ms, occasionally as long as 125-150 depending on the DF processor used at the other end. Most beacons have motion sensors which slow the pulse rate down when the transmitter is at rest. HDS uses a 2:1 ratio moving to slow, the rest of the world including us uses a 4:1 ratio. Typically when at rest there will be a pulse every 8 seconds. Most bumper beeper aka vehicle tracking beacons also have a sleep circuit where the transmitter will revert to a pulse every 30-60 seconds when the thing has been still for fifteen minutes. The idea is to send a confidence pulse periodically, but so slowly that batteries can last weeks instead of days. Most beacons also chirp as the crystal winds up. Only on rare occasions would the beacon be modulated. Virtually always they are pure CW. If several beacons are being used on the same frequency in the same area, us and others use DTMF modulation, not a single tone. DTMF pairs will be different between transmitters. There was a crude method using tone modulated beacons years ago in an attempt to differentiate the beacon's signal from noise impulses, but they never made it into widespread use. The things are pretty distinctive when you hear them. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 810 From: Miguel Puchol Date: Sat Jul 8, 2000 6:19pm Subject: RE: Another strange signal Andy, What you may be hearing is a ranging signal from a site paging system, or a CCIR/ZVEI/etc. tone based selcall or paging system. Some older pagers used two tones (consecutive, not simultaneous DTMF-like) to signal different mobiles. Could you record some and send it? It may help indentify the thing... The alarm idea is good, could be right. Normally this would not be the case, tonal systems are widely used in wireless alarm systems, but all the ones I have seen or heard only send a signal when the alarm condition is reached. Cheers, Mike > Semi rural area. 141.675 Mhz NBFM. 6 x 250 milisec tone bursts of > about 900 > Hz. followed by 1 sec rest (no carrier). Max. sig. range is 5 km. 811 From: Miguel Puchol Date: Sat Jul 8, 2000 6:34pm Subject: RE: Signal Andy, Just as information, I too get a carrier which sounds modulated where I am (Barcelona, Spain) on 503.250MHz. The signal has a similar behaviour as the one you describe, it begins appearing at 503.2430MHz, has it's peak stable between 503.2470MHz and 503.2530MHz and drops to nothing at 503.2560Mhz. I'll try to unplug all the electrical material I have around, but it may take a while :-) to see if it's local and I can isolate it. I'll do some tests off-site also. Cheers, Mike --- Something for the x-files ?? --- > During a TSCM sweep last night in a government office I detected a strange > signal which I would like to hear comment on. > > Frequency was 503.250 NBFM which is in one of our TV bands. It > was detected > on 4 different receivers, having different IFs, mixing and Fq > synthisis, so > I'm confident that it was really there. It dropped about 10 db if > I tuned 5 > kcs (smallest tuning increment on that equipment) up or down but was > undetectable 10 kcs up or down. From: James M. Atkinson, Comm-Eng Date: Sat Jul 8, 2000 10:04pm Subject: Mossad spy gets suspended Swiss sentence Mossad spy gets suspended Swiss sentence http://www.arabia.com/article/0,1690,News|24562,00.html Switzerland's Federal Court also barred the Mossad agent from the country for five years after finding him guilty of political espionage. July 07, 2000, 09:21 PM LAUSANNE, Switzerland (Reuters) - Switzerland's highest court handed an Israeli spy a one-year suspended prison sentence on Friday for his role in a botched 1998 wiretap by the Mossad secret service. The Federal Court also barred the Mossad agent from the country for five years after finding him guilty of political espionage, illegal acts for a foreign state and entering Switzerland under a false name in early 1998. "The crimes were considerable. Switzerland's sovereignity was violated in a callous way," presiding judge Hans Wipraechtiger said, pronouncing verdict. The agent was also held liable tor 100,000 Swiss francs ($61,390) in court costs. The 46-year-old spy, who was allowed to appear under an alias to hide his identity, confessed to the charges in what was thought to be the first trial of a Mossad agent outside Israel. "Issac Bental" took the five-judge panel's sentence impassively. Defence lawyer Ralph Zloczower said he expected the man to return to Israel soon. Bental was caught in February 1998 trying to tap the phone of a naturalised Lebanese-born car dealer who Mossad thought had links with Hizbollah guerillas. Bental was nabbed red-handed in the basement of an apartment complex with two other agents, while two more stood guard outside the building near the capital Berne. A sleepless neighbour had heard suspicious noises and alerted police. Four were let go before federal prosecutors arrived but Bental was held when he failed to explain what he had been doing in the cellar with what he called a diplomatic bag full of electronic gear and installation tools. Shame-faced, Israel paid bail of three million Swiss francs and apologised, and Bental was allowed to leave the country in April 1998 on the condition he return to stand trial. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 813 From: James M. Atkinson, Comm-Eng Date: Sat Jul 8, 2000 10:08pm Subject: Surveillance still rampant in Russia Surveillance still rampant in Russia Spies for hire said to be as busy as KGB was under Communist rule GEOFFREY YORK The Globe and Mail Moscow Bureau Saturday, July 8, 2000 Moscow -- Dozens of Russia's top politicians and businessmen have been confronted with dramatic proof that domestic spies are monitoring their conversations and watching their movements. The espionage is reminiscent of old Soviet KGB tactics, but with a shocking new twist: The secrets are sold to private clients and even to the highest bidder. And from the latest evidence, it appears that almost everyone in the new capitalist Russia is spying on someone else. The spies are now a vast network of private security agencies and ex-KGB agents who serve the political and financial interests of wealthy clients. A Russian Web site has begun publishing 20,000 pages of detailed transcripts of undercover files on 140 of Russia's most powerful tycoons, bankers, politicians and journalists. According to the Web site, the surveillance targets have included people as revered as Alexi II, the Patriarch of the Russian Orthodox Church. The Web site includes a transcript of a telephone conversation in which a man believed to be the Patriarch discusses the latest high-level political intrigues at the Kremlin. In another transcript, powerful tycoon Boris Berezovsky casually discusses his business affairs in a conversation with Tatyana Dyachenko, daughter of former president Boris Yeltsin. Some transcripts reveal an obsession with even the most trivial details of the private lives of less important people. One report describes how Moscow journalist Alexander Budberg was carefully shadowed as he met a friend, walked to a hotel, had dinner, watched a movie and went shopping for groceries. Another dossier was compiled on Jonas Bernstein, a former Moscow correspondent for The Washington Times. The dossier claimed he was "connected to the CIA" and had a "negative relationship to the existing system." Included in his file were details of his apartment, his landlady, and the middleman who arranged his apartment rental. But it was also filled with basic factual errors. For example, the dossier said he had two school-aged children and a Japanese wife named Mariko who "participated in the activities of foreign religious" organizations. In reality, as Mr. Bernstein noted in a Moscow newspaper yesterday, it was a correspondent for the Los Angeles Times who had a Japanese-American wife named Mariko, and she was not a religious proselytizer. Included among the 600 entries are hundreds of telephone conversations, surveillance reports, personal dossiers, and private data on the closest friends and relatives of the espionage targets. Several of the targets have confirmed that the files are authentic. Many of the files are astonishingly detailed, containing even the most insignificant facts about personal lives -- although sometimes riddled with errors. The unidentified compilers of the dossiers had tried to sell the data for $250,000 (U.S.) in 1998, but eventually dropped their asking price to $50,000, according to Russian media reports. They also offered to sell individual files for $200 each. The Russian-language Web site (http://www.flb.ru), set up by a Moscow journalism organization called the Federal Investigative Agency, said it had obtained the espionage data for a large undisclosed sum. "We believe that the telephone tapping and surveillance of hundreds of Russian citizens indicates that the country is under a microscope and that this microscope is more intense than that of the KGB," the Web site's editors commented. The editors, terming it Russiagate, said they were releasing the information on the Internet to expose the massive extent of private espionage in Russia. To protect the victims, they deleted some personal data such as passport numbers, telephone numbers, home addresses and the sexual liaisons of the espionage targets. "Beginning five years ago, investigative activities slipped out from under the control of the state," said the editors, who are veterans of muckraking Russian tabloids. "Private lives are being savoured and turned inside out." Many of Russia's wealthiest banks and corporate tycoons have set up their own private security agencies, usually staffed with former KGB officers. Their task is to spy on their political and business enemies and to gather compromising material -- known as kompromat -- which can be leaked to the media or used for blackmail purposes. Some of the material is believed to have originated in the private security service of Media-MOST, the parent company of the independent NTV television channel, which was raided by federal police this spring. The dossiers may have been removed by employees who were dismissed in 1998. Analysts say the dossiers show how the former KGB has fragmented into a multitude of private agencies that exploit their secret-police expertise for personal profit or the private interests of their patrons. "In the past, it was all very predictable -- you knew who was watching you," said a Moscow-based diplomat who specializes in intelligence issues. "Now it's wide open. You don't have any idea who's doing the spying or why, which increases the threat. And information has become a commodity." The dossiers also reveal the ruthless feuds among Russia's leading businessmen, state officials and political clans. "The state has become much more amorphous," the diplomat said. "Nothing is ever resolved. It's a question of who is dominant at any moment. They're in a constant state of war with each other." =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 814 From: James M. Atkinson, Comm-Eng Date: Sat Jul 8, 2000 10:10pm Subject: Israeli relief at spy's light sentence Israeli relief at spy's light sentence http://www.guardianunlimited.co.uk/international/story/0,3604,340987,00.html Peter Capella in Geneva and Suzanne Goldenberg in Jerusalem Saturday July 8, 2000 Switzerland's supreme court has allowed a Mossad agent to return to Israel after it handed down a one-year suspended prison sentence on charges of espionage. The five judges found the Israeli, known as Issac Bental, guilty of acts committed illegally for a foreign state, of political espionage and of repeated use of false identity documents. A charge of illegal phone tapping was dropped at the end of the unprecedented week-long trial. "The crimes were considerable. Switzerland's sovereignty was violated in a callous way," presiding judge Hans Wiprîchtiger said. Bental was also barred from entering Swiss territory for five years. The light sentence came as a relief to Israel's prime minister, Ehud Barak. "The prime minister expresses his satisfaction with the sentence given to the Mossad man, which allows him to return to Israel immediately," a statement from Mr Barak's office said. The bungled spying case was as much of a political embarrassment to Switzerland as it was damaging to Mossad. During summing up on Thursday, the Swiss deputy prosecutor, Felix Bînziger, said the aborted surveillance mission by Bental and four other Israelis in a suburb of Berne two years ago was unpardonable on behalf of a secret service with close ties to Switzerland. He said Israel should have asked for Swiss help, as it had done before. Bental, who had admitted the charges, was arrested in February 1998 while he was installing a sophisticated bugging device in a block of flats used by the target of the surveillance operation, Abdallah El-Zein, a Swiss-Lebanese citizen suspected of having links with Hizbullah. The other Israeli suspects escaped arrest because police did not realise at first that they were dealing with a spying mission. Bental was detained because he was carrying a diplomatic bag with technical equipment. He was later released on $3m (L2m) bail, paid by Israel in return for a promise that the agent would return to Switzerland to face trial. Defence lawyers had pleaded for an acquittal because Bental was only doing his job to stop terrorist attacks on Israel. "The danger of terror is omnipresent for Israel, its inhabitants and Jews," Ralph Zloczower, the defence lawyer, said. Mr Zloczower described Bental as a "simple agent", a 45-year-old son of Jews who had fled Russia. He joined Mossad in 1990. Mr Bînziger argued that the possible threat from El-Zein could not be regarded as an "immediate danger" to Israel. El Zein, a car salesman, apparently used the flat in the Swiss capital while he was taking care of the Ahl Al-Beit Islamic centre in Berne. He had denied any links with Hizbullah. Mr Barak has attempted to reach out to other Mossad operatives, following rumblings of discontent during the last few days at the sight of their man on open view in a Swiss court. On Wednesday, Israel Radio reported that some Mossad agents had been prepared to refuse further missions if Bental were jailed. Others are reportedly frustrated at a drop in further missions, and Mr Barak's rejection of some of their operations. Mr Barak's reputed caution - he has to approve all Mossad operations - has some basis. During recent years, Israeli agents abroad have been involved in a number of botched operations - including the notorious failed assassination attempt against the head of the Hamas Islamist movement in Jordan in 1997. "The prime minister repeats his expression of appreciation for all of the people in the branches of security whose work exposes them to personal dangers for the sake of strengthening the security of Israel," Barak's statement said. Despite some recent failures, experts on Israeli intelligence point out that the Mossad conducts some 500-600 operations every year similar to the one that went so badly wrong in Switzerland. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 815 From: James M. Atkinson, Comm-Eng Date: Sat Jul 8, 2000 10:21pm Subject: Re: Research Electronics Equipment At 12:37 AM +0200 7/9/00, A Grudko wrote: >----- Original Message ----- >From: Thomas H. Jones > > The CPM probe that has been designed for the the CE mark and has good ESD > > protection is priced at $105. This probe is designed specifically for the > > CPM-700, the part number is "RFP-700E". > > > It should be noted that this probe and all the CPM probes have very good > > sensitivity because the CPM provides DC current to the handle of the probe > > which contains a pre-amp to boost the RF signals being detected by the >probe. It is not merely an antenna. > > Tom Jones > > General Manager REI > >Tom. As I have stated, I like the CPM 700. It is one of 4 spectrum emission >devices we use on our sweeps. The probe upgrade cost of $ 105 is not an >issue. But if the upgrade is, as I understand, coating the antenna with a >static resistant surface, this sounds inadequate in our circumstances where >we see blue static arcs over 3 - 6 mm just walking on carpet. Andy (and the group), Add a gas discharge tube, and then two cross diodes... It will cost you some sensitivity, but will help out with static situation. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 816 From: James M. Atkinson, Comm-Eng Date: Sat Jul 8, 2000 10:28pm Subject: Call For News Articles and Court Cases Related to Buggings Since several people have asked... I would like to invite other list members to post news articles articles they come across the directly address buggings, wiretaps, technical surveillance, TSCM and other issues that DIRECTLY apply to TSCM such as, investigations of such things, coverage of the court cases, and so on. Please do not start posting articles about "ECHELON", "Mind Control", HERF Guns, or other such foolishness... please keep it directly related to FINDING bugs and catching the spies that use them. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 817 From: Dr. Pepper Date: Sat Jul 8, 2000 11:37am Subject: Re: Signal It sounds like an image, or harmonic of another frequency being transmitted by either the nearby airport, or a nearby cell site. ===================================== A Grudko wrote: > During a TSCM sweep last night in a government office I detected a strange > signal which I would like to hear comment on. > > Frequency was 503.250 NBFM which is in one of our TV bands. It was detected > on 4 different receivers, having different IFs, mixing and Fq synthisis, so > I'm confident that it was really there. It dropped about 10 db if I tuned 5 > kcs (smallest tuning increment on that equipment) up or down but was > undetectable 10 kcs up or down. > > There were 5 TV signals detected in band but none had a similar 'blank > carrier' signal associated. Close by (<2km) is an airport and closer are > various cellulars/repeaters/MW links etc. The building has an extensive data > network operating through RG58U type cable on BNC T type connector inputs. > > Signal was analysed for AM, WBFM, NBFM, Side Band and variable range > Sub-carrier (via Scanlock + HP 'scope). > > Subjectively it did not sound like pure, unmodulated carrier - it sounded > more like a solid, modulated FM carrier from a silent room. This building > has a prior history of hostile RF based audio surveillance (2 events in 18 > months). > > The signal strength was Full Scale Deflection (20db over S10), did not > respond like a low power signal in the room in question and upon moving to > other rooms I found it present at differing strengths, inferring low power. > I put increasing stepped attenuation in line but could not find a hot > source - signal dropped pretty well equally from room to room. > > Some non-target rooms were locked but serious knocking on the doors etc. did > not produce any modulation on the suspect frequency. > > The signal was detectable outside the building but faded as we moved away > from it (into noise at about 600 mtrs, all be it to an external 1/4wave GP > antenna resonating at 460 Mhz) so I think it originated somewhere in the > building. > > I am confident that the signal was not hostile to the rooms in question on > the sweep, but it was a wierd one....what really got me was the 'empty room' > feeling I got from the NBFM demodulated audio. > > Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime > investigation & intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 > 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > Chairman), CITTF, > UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - > first time" ICQ 78711262 > > ------------------------------------------------------------------------ > Old school buds here: > http://click.egroups.com/1/5536/1/_/507420/_/962997931/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- - - - Dr Pepper, aka Ron Cheshire, WB6GKI, 3537.26N/11740.02W China Lake, CA USA 90 miles West of Death Valley, 200 miles North of LAX - - - 818 From: Steve Whitehead Date: Sat Jul 8, 2000 7:09pm Subject: Re: Another strange signal Andy wrote > Any ideas....? > Semi rural area. 141.675 Mhz NBFM. 6 x 250 milisec tone bursts of about 900Hz. followed by 1 sec rest (no carrier). Max. sig. range is 5 km > Sounds like a 'bumper beeper' but it never moved over past 6 weeks. The frequencies between 141.5 - 144 MHz has been allocated for mobile base transmitters. The current SF assignments at 141.5 - 142.775 are to be migrated or changed to DF. (SA Band Plan - Available from the Department of Communications) Regards Steve Whitehead TSCM Services cc 819 From: Steve Whitehead Date: Sat Jul 8, 2000 7:47pm Subject: Re: Signal Grudko wrote During a TSCM sweep last night in a government office I detected a strange signal which I would like to hear comment on. Frequency was 503.250 NBFM which is in one of our TV bands. The frequency 503.25 is allocated to Channel 25 (Vision)(Band 4) and is utilised by CSN TV in the Pretoria region. Regards Steve Whitehead TSCM Services http://www.tscm.co.za 820 From: John Titterton Date: Sun Jul 9, 2000 5:03am Subject: RE: Another strange signal Andy Two ideas: 1. It is a "fail-safe" alarm system at an electrical sub-station - stops on power failure. 2. It is a temperature reporting system from a remote weather station - we have lots of them at the coast, but they are normally in the 160 mHz range. To find out if it is legit, phone SATRA, give them the freq. and approx. location and they will tell you who it belongs to. John Titterton Intelec Corporate Investigators Cape Town, South Africa (GMT +2 Hours) Tel: +27 21 559-4929 Fax: +27 21 559-4920 Cellular: +27 82 551-6794 E-mail: mailto:info@i... URL: http://www.intelec.co.za/ >-----Original Message----- >From: A Grudko [mailto:agrudko@i...] >Sent: Sunday, 09 July, 2000 00:22 >To: TSCM-L@egroups.com >Cc: Evelyn Matthews >Subject: [TSCM-L] Another strange signal > > >Any ideas....? > >Semi rural area. 141.675 Mhz NBFM. 6 x 250 milisec tone bursts of about 900 >Hz. followed by 1 sec rest (no carrier). Max. sig. range is 5 km. > >Sounds like a 'bumper beeper' but it never moved over past 6 >weeks. Location >roughly identified to within a km radius. This signal appears to be running >24/7. > >I can only think it it an 'exception reporting' fail safe process >monitoring >(non-TSCM hostile) system where if something goes wrong (i.e. 5 > >blips, not >6) it triggers an alarm. 821 From: Date: Sun Jul 9, 2000 7:06am Subject: Re: Call For News Articles and Court Cases Related to Buggings Can anyone speak to the issue of florescent street lights being affected by possible planted device in vehicle. I don't know enough about it but would like to hear from list members as to how this can be accomplished. Specifically, street lights going out as vehicle either approaches or after vehicle has sits in one location for a few minutes. Thanks DMM 822 From: Gordon Mitchell Date: Sun Jul 9, 2000 1:20pm Subject: Re: Streetlights out I am only aware of three things that can cause this. 1. As in Seattle in the job depression at Boeing in 1970... there was a billboard that asked the last one out of town to turn out the lights. 2. Situations that involve aliens... and I am not talking about my in-laws, these are the little green men sort of aliens. 3. An undiagnosed condition that seems to affect many of the people who call for sweeps. It is most common among those who call from phone book; corporate clients don't seem to have this problem. Gordon Mitchell Future Focus, Inc Woodinville, WA (888) BUG-KILR Electronic eavesdropping detection & finding clues in computers. Clockdepot@a... wrote: > Can anyone speak to the issue of florescent street lights being affected by > possible planted device in vehicle. > I don't know enough about it but would like to hear from list members as to > how this can be accomplished. > Specifically, street lights going out as vehicle either approaches or after > vehicle has sits in one location for a few minutes. > Thanks > DMM > > ------------------------------------------------------------------------ > Law.com is the preeminent online destination for legal professionals. > Visit Law.com for exclusive content from American Lawyer Media, online > CLE Seminars, Practice Centers and Career Listings. > http://click.egroups.com/1/5803/1/_/507420/_/963161009/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 823 From: Jordan Ulery Date: Sun Jul 9, 2000 3:56pm Subject: Wiretapping Jim provided excellent information on reporting a wiretap under federal statutes. It appears that both federal and (not "and/or" as some agencies would have you believe) laws apply. The site listed below has information on the state laws that may apply and you may find it useful. Thanks to John Healy of NHLI for finding this site. If you want to know the state law regarding recording conversations in your state, or any other state this is the site. There are also helpful links to federal statues. www.spyman.com [Non-text portions of this message have been removed] 824 From: Miguel Puchol Date: Sun Jul 9, 2000 5:39pm Subject: RE: Streetlights out Hi, One possible way would be to blast the starter packs with RF at a frequency that disturbs their normal operation - but this is only a speculation. Mike > > Can anyone speak to the issue of florescent street lights being > affected by > > possible planted device in vehicle. > > I don't know enough about it but would like to hear from list > members as to > > how this can be accomplished. > > Specifically, street lights going out as vehicle either > approaches or after > > vehicle has sits in one location for a few minutes. > > Thanks 825 From: James M. Atkinson, Comm-Eng Date: Sun Jul 9, 2000 5:47pm Subject: Feuding Mossad calls off its spies Feuding Mossad calls off its spies http://www.sunday-times.co.uk/news/pages/sti/2000/07/09/stifgnmid01003.html THE espionage activities of Mossad, the Israeli secret service, have all but ground to a halt amid a bitter power struggle, writes Uzi Mahnaimi. Ephraim Halevy, the agency's London-born boss, is clinging to office despite widespread criticism of bungled operations. Mossad's reputation was dealt a severe blow on Friday, when a Swiss court gave a Mossad agent with the alias "Isaac Bental" a suspended 12-month prison sentence and banned him from entering Switzerland for five years. In Israel, its agents angered by Halevy's decision to let Bental stand trial are said to have considered strike action. Bental and four other agents were caught in 1998, installing bugging equipment in the flat of a Swiss-Lebanese living in Berne. As Mossad reflects on the humiliation of the four-day trial, nearly all its activities in Europe and the Arab world have ceased. Halevy has called off spying on Arab embassies and counter-terrorist activities. The hostility towards Halevy is said to be strongest among Bental's colleagues in various specialist units who are responsible for activities such as phone tapping, data hacking and assassination. Sources say Ehud Barak, the prime minister, last month offered Halevy's post to Ami Ayalon, the head of Shin Beth, Israel's internal security service, but the reshuffle was shelved. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 826 From: James M. Atkinson, Comm-Eng Date: Sun Jul 9, 2000 5:49pm Subject: Oracle caper lifts lid on America's corporate spies Oracle caper lifts lid on America's corporate spies http://www.sunday-times.co.uk/news/pages/sti/2000/07/09/stibusnws02010.html Mysterious departure: Ray Lane quit a couple of days after scandal erupted THE admission by Oracle that it spied on lobbyists for Microsoft, its chief rival, has thrown the spotlight on the booming corporate intelligence industry that has become a part of business in America. Most big American companies have their own intelligence units and smaller firms hire one of the big six or seven companies devoted to corporate intelligence gathering. Larry Ellison, Oracle's chairman, saw little reason to repent when he told reporters he had hired a detective agency that had tried to rummage through the rubbish of the Association for Competitive Technology, looking for evidence that Microsoft was paying the lobby group to influence its anti-trust case. Ellison called the skulduggery his "civic duty" to aid the government's attempt to break up Microsoft. Yet Oracle is second only to Microsoft in software and Ellison is second only to Gates in the wealth tables. Speaking from Oracle's offices, dubbed Larryland by staff, the flamboyant 55-year-old said: "All we did was to try to take information that was hidden and bring it into the light. I don't think that's arrogance. That's a public service." Ellison said his agency proved the association and two other lobby groups "were misrepresenting themselves as independent advocacy groups, when in fact their work was funded by Microsoft". "I don't know if we're alone in this," Ellison added. "The Justice Department felt the need to investigate this company too." Ellison is taking responsibility for the spying, though he said he did not know until last month about the tactics involved or the name of the agency, Investigative Group International, headed by a former Watergate investigator. Oracle also denies knowledge of laptops stolen from another lobby group, Citizens for a Sound Economy. The spy scandal came to light after detectives allegedly offered $1,200 to office cleaners to buy the association's rubbish. The offer was rejected. There is a fine line between legal and illegal corporate spying but experts say offering bribes breaks the law. "It's despicable," said Jonathan Zuck, association president. "I would hope to get a letter of apology from Larry Ellison and an explanation of how, in a climate of so much concern over the issue of privacy, he could think this is an acceptable business practice." Zuck said he was considering legal action. While it is legal to search rubbish on public property it is a crime if it is still inside a private property. "This is not dumper-diving outside the building. This is bribery," he said. "It's also a security issue." But Ellison remains unfazed. He challenged Microsoft to spy on Oracle. "We will ship them our garbage," he said. "We believe in full disclosure." Microsoft responded: "The only thing more disturbing than Oracle's behaviour is their ongoing attempt to justify these actions." It added that Oracle had also financed groups to lobby over the case. Victim: Oracle's sleuths attempted to find dirt on Bill Gates Ellison's hatred of Gates, left, is legendary. He once accused Microsoft of Nazi propaganda. "They're special," he said. "They're the only ones we've felt the need to investigate." While Ellison was blunt about the spying, he was less forthcoming when it emerged two days later that Ray Lane, his chief operating officer, had suddenly quit. Lane is credited with rescuing Oracle from its lows in the early 1990s and is respected on Wall Street. He has been involved in key projects such as helping Oracle form online trade exchanges between suppliers, such as Covisint, and the big three carmakers. Ellison said he was taking over Lane's duties but gave no reason for jettisoning him in his terse statement over the Independence Day weekend. Investors were not thrilled. The shares fell 13% at one point and, although they recovered, sentiment was not helped when William Epifanio, a JP Morgan analyst, reduced Oracle's rating to "market performer", citing the "extremely negative news" about Lane. The timing of Lane's departure was curious, coming two days after Ellison acknowledged the spying. Oracle denied Lane was taking the hit for the scandal. But investors now fear an unbridled Ellison may do something stupid. The spying case has raised questions not only about Oracle but about the extent of business snooping in America. It has also put professional sleuths on edge. They bristle at talk that they are spies. They may look like spies and sound like them but they say their trade is "competitive intelligence". After the scandal broke, the Society of Competitive Intelligence Professionals (SCIP) issued a press release headlined "Competitive intelligence is not corporate espionage", a theme taken up by Richard Horowitz, a lawyer who advises companies on intelligence gathering. He said: "Competitive intelligence was founded by librarians in 1982 and most members today are accountants and market researchers. Private detectives do mostly field work and little analysis, while most competitive-intelligence professionals work in libraries and on the phone and are skilled at analysing the data." The field is now so popular that universities are offering courses in it. To help its 7,000 members, the SCIP has a code of ethics. Members must strive to increase the respect of the profession, obey all laws, disclose information about themselves before interviews, respect confidential information, avoid conflicts of interest and make realistic recommendations to clients. The society tries to teach the difference between legal, illegal and improper intelligence. It found in a survey the most common methods used included hiring a competitor's staff (okay unless they reveal trade secrets), posing as a student, recruiter, supplier or vendor (improper), attending trade shows, interviewing a competitor's vendors and studying public records (all okay). Some 20% of respondents named as most common techniques collecting rubbish (okay if on public property, but frowned on), listening to conversations in public (borderline) and illegal methods such as electronic surveillance, stealing documents, bribing staff and intercepting faxes and e-mail. Michael Sandman, who works for Fuld & Co, one of the oldest agencies, said the bribery alleged in the Oracle scandal was not typical. "Big companies tend to be much more careful about not doing something that looks improper," he said. The survey showed the biggest threats were seen as coming from disgruntled staff, electronic surveillance (including satellite photographs), computer hackers, stolen laptops and spies planted in a company. Another source of concern has been spying by foreign governments and companies. In response, Congress passed the Economic Espionage Act. So far there have been 19 convictions. Louis Freeh of the FBI said his agents were tracking eight countries that were "extremely active" in espionage. Yet while America has moved to cut off foreign spying, it now faces charges that it and Britain are spying on mainland European companies. Last week, the European parliament launched an inquiry into the Echelon operation, which London and Washington deny is involved in industrial espionage. The SCIP believes companies need intelligence gatherers because of rapid changes in business. "Executives can no longer afford to rely on instinct or intuition when making strategic business decisions. In many industries, the consequence of making one wrong decision may be to see the company go out of business," says its website. That point was taken up recently by Robert Flynn, the former NutraSweet chairman, in a speech at SCIP's annual conference. He said companies that gathered intelligence enjoyed "greater earnings per share than companies in the same industry without competitive-intelligence programmes". Apparently other chief executives agree with him. They spend $1 billion a year on such intelligence. Motorola, for instance, has intelligence units in overseas offices, hoping to find out about mergers or new technologies. The company, which employs a former CIA agent to head its service, has been active in the field since 1982. While much of the recent shady intelligence gathering has involved high-technology companies such as Oracle, old-economy firms are also in on the act. Raytheon, the defence contractor, last year paid several million dollars to settle a lawsuit covering eavesdropping and the theft of documents. If a court can determine that Ellison's detectives did offer bribes and Oracle knew of the tactics, the company could be found liable. Though much intelligence gathering may be legal, the ethical questions do not go away, even if the public is more focused on political and military spying than economic. Pamela Noe, a CIA officer on leave to teach at George Washington University, told The Wall Street Journal: "In corporate America, the definition of what's ethical is what's legal. "I come from a higher standard, believe it or not, simply because ethics are scrutinised much more in the US government intelligence field." =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 827 From: James M. Atkinson, Comm-Eng Date: Sun Jul 9, 2000 5:50pm Subject: Straw signs five bugging orders a day Straw signs five bugging orders a day http://www.sunday-times.co.uk/news/pages/sti/2000/07/09/stinwenws01023.html James Clark, Home Affairs Correspondent BUGGING, phone-tapping and letter-opening by the police and security services have risen by 60% since Jack Straw became home secretary. Government figures reveal that last year Straw personally signed 1,645 bugging warrants to tap telephones - almost five a day. With each lengthy document taking about 20 minutes to assess, the figures show that Straw could be spending up to one hour and 40 minutes signing bugging certificates every day. Michael Howard, the last Conservative home secretary, signed 1,073 such documents in 1996 for the police, MI5, MI6 and GCHQ, as well as some elements of military intelligence, customs and financial investigation bodies. The figures are contained in a report by Lord Nolan, the commissioner overseeing interceptions. Nolan's report and a second document that looks at the work of MI5, the security service, this time by Lord Justice Stuart-Smith, list a host of errors and slip-ups by police and spooks. In one case MI5 "infiltrated" the wrong house. Stuart-Smith says: "I can report that the first error occurred when an [MI5] operational team deployed outside the target location specified in the relevant warrant. While the interference or entry on property was admittedly minimal . . . an unauthorised intrusion has clearly occurred." Nolan reports errors by the Post Office, MI6, customs and other agencies. In one case a National Criminal Intelligence Service (NCIS) officer left a file of bugged phone numbers and transcripts of calls on a train. When it was recovered, "the envelope containing the log had been opened". There were examples of bugging taking place at the wrong addresses or numbers - although there were few by MI5, whose officers won praise in the report for their efforts to reduce mistakes. In many cases, telecom staff simply programmed in the wrong numbers, leading to mystified spooks listening to family chit-chat. The Nolan document also shows there has been a 22% rise in the number of certificates allowing post to be intercepted, from 69 to 89. It is not, however, just Straw who has been authorising taps. Donald Dewar, the Scottish first minister, allowed 288 telephone intercepts but not a single postal operation since taking up his post after devolution. According to Nolan, most taps were targeted on organised criminals. Supporters of Straw will see it as further evidence of his tough image. Straw admits in an interview with The Sunday Times today that he has less liberal views than one of his Conservative predecessors. He contrasts his belief in the importance of prison with the softer views of Douglas Hurd, the home secretary under Margaret Thatcher from 1985 to 1989. Yesterday, Straw announced that criminals will face tougher sentencing, with proposals to allow prosecutors to challenge pleas of mitigation. This will mean offenders can no longer expect lenient treatment because they plead guilty and claim a crime was committed under pressure of circumstances. John Wadham, a lawyer and director of the campaign group Liberty, said: "This is an alarming trend. Politicians should have no role in authorising these sorts of serious violations of privacy. This is an area that should be reserved for the courts, not the backrooms of Westminster." =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 828 From: Date: Sun Jul 9, 2000 5:20pm Subject: RE: Streetlights out Dear DMM Since we now have achieved a new intellectual high with this e-group, I am obliged to point out one possible cause that the esteemed Dr. Mitchell neglected to bring to our attention. Shame on you Gordon. That is the four Pollock's who were called to repair this street light. I was told that this technical assignment took one gentleman to hold the bulb, the three to turn the ladder. As the work order reads, there was ladder failure in that one of the legs became lodged against a rock and the job was not completed. All four were stymied at this predicament. I response to Dr. Mitchell's comments, obviously this incident could not possibly have occurred in Seattle, because we've overdosed on embarrassment for one year...ala WTO, our police chief, and our mayor. Secondly, since I was not present at the time, I am not aware if the men were dressed in green. Thirdly, this condition need not be diagnosed. Just call Gordon. He can refer the work to a company nearby who specializes in this type of work. As professional technical experts, we would be remiss if we did not rule out all possibilities. /M Michael J. Canaan, CPP President Trident Investigative Service, Inc. Corporate Special Services P.S.Please do not repsond with how I have offended your mother...or with other distasteful ethnic jokes. We don't have time to read them. -----Original Message----- From: Gordon Mitchell [mailto:gordonm@b...] Sent:Sunday, July 09, 2000 11:20 AM To:TSCM-L@egroups.com Subject:Re: [TSCM-L] Streetlights out I am only aware of three things that can cause this. 1. As in Seattle in the job depression at Boeing in 1970... there was a billboard that asked the last one out of town to turn out the lights. 2. Situations that involve aliens... and I am not talking about my in-laws, these are the little green men sort of aliens. 3. An undiagnosed condition that seems to affect many of the people who call for sweeps. It is most common among those who call from phone book; corporate clients don't seem to have this problem. Gordon Mitchell Future Focus, Inc Woodinville, WA (888) BUG-KILR Electronic eavesdropping detection & finding clues in computers. Clockdepot@a... wrote: > Can anyone speak to the issue of florescent street lights being affected by > possible planted device in vehicle. > I don't know enough about it but would like to hear from list members as to > how this can be accomplished. > Specifically, street lights going out as vehicle either approaches or after > vehicle has sits in one location for a few minutes. > Thanks > DMM > > ------------------------------------------------------------------------ > Law.com is the preeminent online destination for legal professionals. > Visit Law.com for exclusive content from American Lawyer Media, online > CLE Seminars, Practice Centers and Career Listings. > http://click.egroups.com/1/5803/1/_/507420/_/963161009/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS ------------------------------------------------------------------------ Special Offer-Earn 300 Points from MyPoints.com for trying @Backup Get automatic protection and access to your important computer files. Install today: http://click.egroups.com/1/6347/1/_/507420/_/963166509/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 829 From: Jay Coote Date: Sun Jul 9, 2000 7:42pm Subject: Re: Call For News Articles and Court Cases Related to Buggings I've used powerful HF and VHF transmitters from vehicles, in the 50-120 watt reagion. Driving nearby fluorescent lamps (under the eaves of gas stations) and keying the mike would cause the lights to flicker.... but that's 100 watts with the antenna a meter or less from the lights. Some street lamps have photocell switches to turn them on at dusk- could be a reflection or someone playing games with IR or a beam to turn the lights off? Some cities use a emergency vehicle interrupt signal on traffic lights. The white strobes pulse at a special rate, the sensors at the intersection pick up the pulse and give the police/fire/EMS vehicle a green light. Hmmmm..... ---------- > Can anyone speak to the issue of florescent street lights being affected by > possible planted device in vehicle. > I don't know enough about it but would like to hear from list members as to > how this can be accomplished. > Specifically, street lights going out as vehicle either approaches or after > vehicle has sits in one location for a few minutes. > Thanks > DMM > > > ------------------------------------------------------------------------ > Law.com is the preeminent online destination for legal professionals. > Visit Law.com for exclusive content from American Lawyer Media, online > CLE Seminars, Practice Centers and Career Listings. > http://click.egroups.com/1/5803/1/_/507420/_/963161009/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 830 From: Doug Ellsworth Date: Mon Jul 10, 2000 0:00am Subject: Re: Call For News Articles and Court Cases Related to Buggings Group, The following story ran in our local newspaper last year. I thought some of you might find it interesting. Interesting also inasmuch as I consulted officials on this escapade, and a few weeks later followed up with the reporter. The reporter informed me that the story had been taken away from him, and moreover, that news media were requested not to pursue their own investigations of this incident. Omaha World-Herald May 15, 1999 Phone Threats Lead Police to Dead Ends by John W. Allman, WORLD-HERALD STAFF WRITER Flowers, a computer warning and a bomb threat. Omaha police are trying to unravel a series of mysterious events surrounding theats received at the department's headquarters Thursday night and Friday morning. A phone call to the department's front counter information line at 11:45 p.m. Thursday said a bomb was inside the building. Police searched, but did not find any suspicious devices. They then tracked the initial call through caller identification and 911 records to a house in northwest Omaha near 148th and California Streets. When they arrived at the house, however, the real mystery began, said Officer Don Savage, a police spokesman. A man at the house told police he was expecting them because of a message he had received about 5 p.m. on his home computer that said police would be coming to his house later that night. The man also said his mother had received 24 pink roses earlier in the day from a florist. A note was attached to the roses that said "CLOPS, you're my buddy." The man told police that CLOPS is his computer name. Police took the man downtown to report his story. While the man was downtown, Savage said, the department received four other phone calls from the same phone line. Each time, the caller either spoke and made various threats or just kept the line open. The last call was received at 2:30 a.m. Friday, Savage said. Some computer users can "spoof" a person's electronic mail address to send e-mail under a different name, but that technology does not apply to phone lines, said Bob Lamphier, manager of Nebraska public policy for U S West Communications. "The only way we know it can be done is somebody's making a physical connection," said Lamphier, who spoke to U S West phone and computer security experts Friday. Such connections can be made several ways: accessing the phone line from inside the residence; tapping into it outdoors; or accessing the line from within the phone company's network. It takes "a huge amount of sophistication" and expensive equipment to access a phone line in any other way, Lamphier said. Police did not arrest the man whose phone line was used during the calls, Savage said. An investigation is continuing. 831 From: James M. Atkinson, Comm-Eng Date: Mon Jul 10, 2000 9:53am Subject: Suits filed for illegal taping Suits filed for illegal taping http://www.thesunlink.com/news/2000/july/0707a9a.html By Travis Baker, Sun Staff A Bremerton man will ask a federal judge July 21 to prohibit the state patrol from arresting people who record traffic stops. Jerome Alford, 47, was arrested Nov. 22, 1997, for just that, according to a lawsuit he filed in U.S. District Court in Tacoma. The suit seeks monetary damages and asks that the patrol be enjoined from "stopping, questioning, detaining or arresting persons for allegedly violating the (state privacy act) by recording, or attempting to record, law enforcement activities." Alford's lawyer is R. Stuart Phillips of Poulsbo, who also has filed a similar lawsuit on behalf of a Sequim man who claims he was arrested after videotaping the Sequim police chief. Assistant State Attorney General Eric Mentzer said he will oppose Phillips' request for an injunction in the Alford suit. The arguments will be heard by U.S. District Judge Robert Bryan. Alford says he was pulled over on Highway 16 by Trooper Joi Haner because his car was equipped with headlights that flash alternately, right and left. Mentzer says such headlights are reserved for the use of the police. Patrol Sgt. Gerald Devenpeck joined Haner at the stop and arrested Alford for "illegal tape recording" when he noticed a recorder running on the passenger seat of the car, according to the suit. Alford alleges that Devenpeck, who since has left the patrol to become a private pilot, used excessive force and injured him. Alford spent 12 hours in the Pierce County jail before posting bail. Both the citation for the headlights and the illegal recording charge later were dismissed. Mentzer acknowledges that a 1993 court ruling found that police acting in their official capacity in the presence of others don't have an expectation of privacy. But one-on-one situations, such as with Devenpeck, or even with two officers present, may make such tape recording illegal, he said. He'll oppose the motion because it seeks to forbid all enforcement of the privacy act involving tape recording of police activities, he said. Alford still carries a tape recorder with him and will record any future police stops, his suit says. Phillips filed the second suit on June 16 on behalf of 23-year-old Anthony Johnson of Sequim. Defendants include the city of Sequim and its police chief, Byron Nelson. It says Johnson is "an avid videographer and film editor." The suit alleges that an incident on Jan. 28 followed "a two-year campaign of harassment" of Johnson by Sequim police over his skateboarding in or near the town's "no skate zone." The suit alleges that on that day Johnson began taping Chief Nelson as he sat in his patrol car at the Sequim Skateboard Park. Nelson objected, saying it was illegal to record him without permission, Johnson alleges. He said Nelson told him he was under arrest for "unlawfully recording my conversations and me." He spent three days in jail on Super Bowl weekend. A judge dismissed the charge on May 10, he said. Johnson also alleges that he was physically abused by the arresting officers, including being choked, forced face down in the gravel, handcuffed too tightly and lifted painfully by his handcuffed arms. Nelson declined to comment on the suit. Bryan, a former Bremerton resident and Kitsap County Superior Court judge before going to the federal bench, also has been assigned the Johnson suit. Reach reporter Travis Baker at (360) 792-9217 or at tbaker@t.... Published in The Sun: 07/07/2000 =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 832 From: A Grudko Date: Sun Jul 9, 2000 3:12pm Subject: Re: Signal ----- Original Message ----- From: Dr. Pepper > It sounds like an image, or harmonic of another frequency > being transmitted by either the nearby airport, or a nearby cell site. Hi Doc. Yeah. I thought of that, but it sounded so much like a nearby empty room that I'm going back Monday to see if I can get some voice on this one, Even if this is outside my contracted sweep area, finding a 'live one' is great. I'll keep you informed. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 833 From: A Grudko Date: Mon Jul 10, 2000 9:45am Subject: Re: Signal ----- Original Message ----- From: Miguel Puchol Just as information, I too get a carrier which sounds modulated where I am > (Barcelona, Spain) on 503.250MHz. The signal has a similar behaviour as the > one you describe, it begins appearing at 503.2430MHz, has it's peak stable > between 503.2470MHz and 503.2530MHz and drops to nothing at 503.2560Mhz. Now I'm really curious Mike. I don't beleive in coincidence. For you to have a similar signal on the same frequency over 4000 km away makes me think it is a legitimate by product of something like a computer. I was going back today but have cancelled till Friday. I'll have kit to tune in 100 Hz steps around it and we should have keys to the locked office. I'll also test at other locations to see if I can find it and determine a common factor. > --- Something for the x-files ?? --- Exactly. The six words I hate most at the end of a sweep are 'I don't know what it is' - which is why I like this group so much. Good communication with people who have been there...why re-invent the wheel? I store lots of these messages in my 'Technical' directory and I have to admit I've learned a lot hanging around here. Andy Grudko (G8RXE; ZR6UU; ZRAJ7795) 834 From: A Grudko Date: Mon Jul 10, 2000 9:47am Subject: Re: Another strange signal > Could you record some and send it? It may help indentify the thing... Pls. send me your eMail address - I'll send you a little .wav if that works for you. Andy Grudko 835 From: A Grudko Date: Mon Jul 10, 2000 10:30am Subject: Re: Another strange signal ----- Original Message ----- > Two ideas: > 1. It is a "fail-safe" alarm system at an electrical sub-station - stops on > power failure. > 2. It is a temperature reporting system from a remote weather station - we > have lots of them at the coast, but they are normally in the 160 mHz range. > To find out if it is legit, phone SATRA, give them the freq. and approx. > location and they will tell you who it belongs to. Hi John - I didn't know you hung out here too...they'll obviously let anyone in.... . 1. Could be - I thought it could be some kind of 'fail safe' process monitoring. But there are plenty of sub-stations around so why have I never heard one before?r 2. I think then it would contain some data, not just these constant pulses. I live on a lake in a mountainous bowl miles from anywhere, but there are lots of antennas on the mountains, all line of sight, and the NASA/TELKOM/CSIR Hartebeeshoek satelite tracking, communication and radio astronomy station nearby, so plenty of interesting RF. SATRA? Have you tried them lately? I'll give it a go anyway. Andy Grudko 836 From: A Grudko Date: Mon Jul 10, 2000 9:19am Subject: Re: Another strange signal .----- Original Message ----- From: Steve Whitehead > > Semi rural area. 141.675 Mhz NBFM. 6 x 250 milisec tone bursts of about > > 900Hz. followed by 1 sec rest (no carrier). Max. sig. range is 5 km > The frequencies between 141.5 - 144 MHz has been allocated for mobile base > transmitters. The current SF assignments at 141.5 - 142.775 are to be > migrated or changed to DF. (SA Band Plan - Available from the Department of Communications) Hi Steve Thanks for the input. This signal still intrigues me - it seems to serve no purpose other than to send this constant burst of tones, 24 hours a day, much like a 'bumper beeper', but it does not seem to move. It's not an airband beacon. It's not an amature beacon. There appears to be no data embeded in it. In 20 years of sniffing RF I have not seen this type of transmission before. I have a licence for one of our simplex systems less than a Meg. from this odd signal, so I frequently scan in that band. I first noticed it about 4 weeks ago. Our interest is not so much in what frequencies/users SATRA have allocated/licenced in that band for legitimate use but the possible unauthorised use of frequencies. Of course if someone can tell me what ligitimate purpose there is for such a transmission I will have learned something. As we all know, Snoops do not stick to band plans or type approved equipment. The last time I spoke to SATRA about establishing the legitimacy of a transmission I got so frustrated with the burocrats on the phone that I nearly pulled out my last 2 strands of hair... The signal in question (which I detect 14db over S10 as I type this late at night) appears to originate about 40 Km west of the Pretoria CBD. You're based around Pretoria and I guess you must come this way sometimes. It's strongest on the R512 where the old Herculese/Magalisburg railway line crosses the road (not the Sun City T junction, the next one). 837 From: James M. Atkinson, Comm-Eng Date: Mon Jul 10, 2000 3:01pm Subject: Re: Signal At 4:45 PM +0200 7/10/00, A Grudko wrote: >with people who have been there...why re-invent the wheel? I store lots of >these messages in my 'Technical' directory and I have to admit I've learned >a lot hanging around here. > >Andy Grudko >(G8RXE; ZR6UU; ZRAJ7795) Andy, This is why I created the web site and list to begin with... to simply help out the entire TSCM profession, and to keep several steps ahead of the eavesdroppers. I am glad you have found the list to be helpful. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 838 From: James M. Atkinson, Comm-Eng Date: Mon Jul 10, 2000 3:08pm Subject: Re: Another strange signal Three words: High Gain Antenna! A high gain antenna can be used for "Space Domain Analysis" to locate WHERE the signal is coming from. At that frequency you could use a CHEAP TV antenna with a 300/50 ohm balun and preamp, or a active loop antenna. Three or four readings later and you will have a clean vector to the emitter. You may have an emitter used by the railroad for watching hot boxes, or some kind of railway status device. Use Space Domain to find out WHERE. -jma At 4:19 PM +0200 7/10/00, A Grudko wrote: >.----- Original Message ----- >From: Steve Whitehead > > > Semi rural area. 141.675 Mhz NBFM. 6 x 250 milisec tone bursts of about > > > 900Hz. followed by 1 sec rest (no carrier). Max. sig. range is 5 km > > > The frequencies between 141.5 - 144 MHz has been allocated for mobile base > > transmitters. The current SF assignments at 141.5 - 142.775 are to be > > migrated or changed to DF. (SA Band Plan - Available from the Department >of Communications) > >Hi Steve > >Thanks for the input. > >This signal still intrigues me - it seems to serve no purpose other than to >send this constant burst of tones, 24 hours a day, much like a 'bumper >beeper', but it does not seem to move. >It's not an airband beacon. It's not an amature beacon. There appears to be >no data embeded in it. In 20 years of sniffing RF I have not seen this type >of transmission before. I have a licence for one of our simplex systems less >than a Meg. from this odd signal, so I frequently scan in that band. I first >noticed it about 4 weeks ago. > >Our interest is not so much in what frequencies/users SATRA have >allocated/licenced >in that band for legitimate use but the possible unauthorised use of >frequencies. Of course if someone can tell me what ligitimate purpose there >is for such a transmission I will have learned something. >As we all know, Snoops do not stick to band plans or type approved >equipment. The last time I spoke to SATRA about establishing the legitimacy >of a transmission I got so frustrated with the burocrats on the phone that I >nearly pulled out my last 2 strands of hair... > >The signal in question (which I detect 14db over S10 as I type this late at >night) appears >to originate about 40 Km west of the Pretoria CBD. You're based around >Pretoria and I guess you must come this way sometimes. It's strongest on the >R512 >where the old Herculese/Magalisburg railway line crosses the road (not the >Sun City T junction, the next one). =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 839 From: Thomas H. Jones Date: Mon Jul 10, 2000 3:10pm Subject: RE: Research Electronics Equipment Andy, The upgrade is not a simple coating. It is a completely new antenna designed specifically to withstand large ESD. I have attached a picture of the original telescoping antenna along with the ESD version so that you can at least visibly compare. As previously stated, this antenna meets CE mark testing for sale in Europe. The CE mark testing procedures are rather stringent. We have been shipping them to Europe for a couple of years. We have not been able to "blow" one so far, and we have not had to repair or replace a single one yet. I hope this clears up the probe question. However, I fear that this posting may be a challenge to some of you. I don't think that it will survive a lightning bolt strike or any other voltage levels that are capable of killing or maiming a human. So, be careful out there. Regards, Tom Jones General Manager REI -----Original Message----- From:A Grudko [SMTP:agrudko@i...] Sent:Monday, July 10, 2000 9:10 AM To:TSCM-L@egroups.com Subject:Re: [TSCM-L] Research Electronics Equipment ----- Original Message ----- From: Thomas H. Jones > The CPM probe that has been designed for the the CE mark and has good ESD > protection is priced at $105. This probe is designed specifically for the > CPM-700, the part number is "RFP-700E". > > It should be noted that this probe and all the CPM probes have very good > sensitivity because the CPM provides DC current to the handle of the probe > which contains a pre-amp to boost the RF signals being detected by the probe. It is not merely an antenna. > Tom Jones > General Manager REI Tom. As I have stated, I like the CPM 700. It is one of 4 spectrum emission devices we use on our sweeps. The probe upgrade cost of $ 105 is not an issue. But if the upgrade is, as I understand, coating the antenna with a static resistant surface, this sounds inadequate in our circumstances where we see blue static arcs over 3 - 6 mm just walking on carpet. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 ------------------------------------------------------------------------ Still looking for the complete Application Server solution? Find answers and a $75 gift certificate at the Intraware App Server Webinar. Sign up at: http://click.egroups.com/1/6756/1/_/507420/_/963096058/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS begin 600 CPMprobes.jpg M_]C_X `02D9)1@`!`@$`2 !(``#_[0"X4&AO=&]S:&]P(#,N, `X0DE-`^T` M`````! `2 ````$``0!(`````0`!.$))30/S```````(``````````$X0DE- M)Q ```````H``0`````````".$))30/U``````!(`"]F9@`!`&QF9@`&```` M```!`"]F9@`!`*&9F@`&```````!`#(````!`%H````&```````!`#4````! M`"T````&```````!.$))300&```````"``;_[@`.061O8F4`9 `````!_]L` MA `"`@("`@("`@("`P("`@,$`P("`P0%! 0$! 0%!@4%!04%!08&!P<(!P<& M"0D*"@D)# P,# P,# P,# P,# P,`0,#`P4$!0D&!@D-"@D*#0\.#@X.#P\, M# P,# \/# P,# P,#PP,# P,# P,# P,# P,# P,# P,# P,# P,# S_P `1 M" (E`U4#`1$``A$!`Q$!_\0!H@````$S%F+P)'*"\25# M-%.2HK)C<\(U1">3H[,V%U1D=,/2X@@F@PD*&!F$E$5&I+16TU4H&O+C\\34 MY/1E=865I;7%U>7U9G:&EJ:VQM;F]C='5V=WAY>GM\?7Y_(B8J+C( MV.CX*3E)66EYB9FINGM\?7Y_(B8J+C( MV.CX.4E9:7F)F:FYR=GI^2HZ2EIJ>HJ:JKK*VNKZ_]T`! !K_]H`# ,!``(1 M`Q$`/P#V?Q!Z+1? C>A[_3F8(R<*MFZ\J$ `E?V=Z^'3H'&A^+<\=^^5D;K:P"FW4=QT`K[CODZ) M79L@+M52304J>IZ?37(\/FF_)NE2%I3B?L@[5)WW\<38ZI #E%:?NV% *@[D M[;FN-^:+7@BG'CN-R/H[C"/>M+*'<O$T%=B M>7XY9Q%B#2X]]JAV^+;M05R,9>;,"+JEBH^(<".@V#?TQH]&))64HW%:;U8< MC\)WZ@Y(&04%L$[$]:_9I2OBJ+)6U^S\(%#2@WK[X\/FM-MT!9>^VY!P@4I&$6 MP$>Y4Y#X@?B45J-S\NF1X2IL*895Z@D'Q%2/IZ?=EEHXEPZ%5 W^SO7;OL,K MJT\06M7"2+*T[@E0&/5FK M@H#JD.ZJ"![4Z?CA!);.*@N/AUYT%#XCI3"P`OJT1L>0WY4*^XZUP>Y-%803 MN2:BHIC95H4H5#%2>XZ[^%<=UL-$;U#;5W7;:O0'W[XV$6VO3K6E/N[_`(X^ MI2:Y-%@:EJT)W^>3'FA_?$E:4U(J.7P.3T)_EVV]C@X:9<2XUK4?$&^_!8#%= M05.U1T*[^&_8X25V:(^R1\'$U*[]"/D,B=DQC:W8;>&P^0&Y'RP<7<$40M6E M1ML-P/D/PZTP"^]0&QOQW%16N_+Y'VVR5'OMD"&QN?;N3MCQE'"X< :'8]57 MQ\<;)9C;FW1"6^!0#]K:OT_2FU/&FV28VNC (3XB1U!8GH03N3N>N"K23)4()6G&G/:HV/3!PL;)4FKV M[D4(VIVZ]_EC?%6\>F$QMDXD4:-5X@$%^V(CWJ+Z*:\N1J MM:M1-Z4VZX.(!2OI0[@=:'>E:BO7Z<)E:B)4V/$BNRGX:&H"[=2<1[UI:/VF M3>O4-44Z=NV$^]E1:8U%%-=]S4U-,C&%L5)3OW#=/O\`&OX82%&SB%J.56XU M-/<=#7QKD(HI<6:M7(9FWI6OWCYX;DJG\-*T%68\5]A_;7(DDLP?Z+N2^H#3 ML>_3HWXXTF][?__0]H?$16@-:T)V-*[YF\)Z.)Q-@@**`[4K0TVZ']>#=C9: M(![ $5 WZ4.](MKN>-6/=U/;QKDC$,^(K4-6-"=J>PW-,J.R%Q M\30*>H [C;>F^$,SLW3B.-?4[ACN:#MX9+A8$M(06+!2-P0M=]LB20ME_7`-D[JGPCXB:<0>5.N^WZ\)MB7,*U(8=* MDCJ12GZ\1:/B:\U0`FH)#'N&-*[; M4^9R!%(XEC$C94-/VJGIX#B<,"6-6MX_#4<2O6A_'8=,ES9Q#9H&V!J>$NDYM\*FM!4 M#I4^)R)%+Q4N"5!7U `34T- !X$^& #R3=KE*U+=>';W'?)\04DAWP@`EZ4K MU[D]=N^5U:([\VE)X@$!2-S0UR8LK*@6P).53QH.I!_'WP\`4"VN9)^&M.7Q M!=JT]QX^&"@FZ6!UY;#DU?WE`=SO]&2X6)D6@2!S(-36@J=OHR*02TQ.Y^R& M/0>(PLK744?$03OTW_ADC[V-^;;5;X0`*D?#4G(;LM^]:HJ:,: DCQ/W8;/< MB^];R((0*>5-A2GWX@E3P]%JA#3>BEM]JBGS[?/ 9,;*LS? :D-0_$!UP7$I MX27 [GD.1:F_8CO_`&8F)12PU(&U5V IV_S.(BEPH5Y4``[$]?\`;.$!-TLI M4#X00-S7P_L\,E7FQMLDUZ ]`17I3V^G`)6I(6;U)'8U!K^L84KP:J"#4=1M MVP$$WOD]F0)6K2NX[ M[@=/NP+87D4IR-"-SOV^> R/1:/1S;D$**]SWI[GO@V3:GSY4IMO4TWVR2[K MBQ Y$D[[5))IX8>$)LK 233B0*5.XK3?&[1;5:@D?$&+=#O3Z,B84GC6K3D2 M`>W(5)W]\A:+M5"BC4)H34EC]XR5$]&8I;525#*Q)!H]>GB#^K'AKF@RM3% M1Q52:[FOMU^C(6Q%.8C8]3XCO7PR49=XID=FU^(&A/?X3V^>2X$<:\GQ(IOM MW)KD;(7B*T[;E2V]:#IMWQL*9%I2H!'55/3OOOU^G&V-VUR%>A(;<]OPQX2G MXM!EWI3X*G;^'OC1#+B+9)V%"16I(.XV\.^ ;KQ%8>@+%*$B@)(/SV[Y+DFR MO8T`Y*3N!7MOTR/&4\"PIR'Q5-:U`VVW[XVPON=Q7<5V8?%V.V2XD\#=*@[C MK\5#].^1]R:KDUT[[[U)^_#P`L"6@Q'Q5.Y4+X"O?'A*!*U-R0: U IQ)Z^^ M2JD@+4 J2WVJ[_+M]V1W95W[+]E!!/+>O(GXA7!98 J'*E-N*]U8[##:JP(: MO%J@&M>E,BRA(*?P$JM H8C>F&RF^YRD, Q-`14KT'O\\:3Q`K05%*4-*?"# M]VV!:DXE=N7VS4[CCT_CA8 >:UF)96(Z5)IMV[CYX0OQ6@!BIVY,12FU!W_C MAB:2(A>:#;H2:L3WZT&-GHI%+&I4+T)8U)'04IO])QHGFQ:)0E0N_8 &H\*C M([! M:6 ``HR$4!]NN^'B++A)6550-J#;Y=@\!^.'A8D^;5.A .Q!->_AMC0[E(5:BHV'+J&K3Y[>V1D.YF":6 M!2%6/94;X:4KL.N5[L2"MJ.7.G0UY[<=_P"W)T:13__1]H@A: #9"?B'V?AV M-,SB#WNO$:;:A4\J`U%"2: 'KC1[V5.Y<3NM=Z\B>_C@/O7A=3]K9:GL.IQ, M2NX6-\1IQ)J:4'4_PQV9[JB@! O$+^TRGK_3)>YB8N+*0M5VK5V&VV^1LCDB MEW4_9 9J5IN#X;X`0%X"V!R `/$]&'C]^$Y"R6&M*_$`=U!^R3^O!L57[;"G MQ;;5[X #T96L-0#TV.Y]Z]\ENQ^*\( S5''>JJIZ_1@XZ3OT:I0%AUWJI-=Z M=#X82;8M#B6!^R!U(K6O\QV&^/$ M65A4!J":\E4`@>).1X24$!JC"OQ"C$[]:$]J8#!'N;(!45 XJ?B/3?Y9'DME M8&5J'K4FI(KTZ4\,LWZ,J"^H5:TY&M=N^1X"PL- JP)(IX*=C]./"4\=]?QR8*3$][>^SLE:'X@-Z>-?HPH ML#JVK$4!"@,=SOMC0*VVPJ>I/7X??MLM=B *BO0#O4=\`H)NW YPUYHXBO/'X6++\9J7)ZTVJ/GD;79PH*@-NA-5 MJ""?EB"$^H+2">7/XJ$`*-^E>X_C@*.,M@4%>M3N*^V$%D9;*:D[#84.X/?: MOX8F):U6K @ER0Q^'E4]!X9%G$AQJ:UH*CH*G\<*DVH$4)9M@*<5!^_"$4NY M`T5'! -'7)A#2@&F[ C[!K^-,2"CB!<2=SQ^(GXCU)]Z#ID:,DC9L%2":]Q0 M]LC5;,P;:%6%3N!45-?XY8P(:Y #<"IW!!R!"B^]3/4M0FO8]*_(8[(E8[W, M!0$CX:@\0:FOC[8FV5V'5J?A;IU^G)1!8BE4].U.M3[^&0+91I;6@IN5%0U. MI'M[X$<#B/M=R3]-?;#N&0B%!A13U&]#O6GWX=BP7JW*FQ(H2IV_`CYY*@M% MU22>IV&P-.FW3(\*0:7*:-ML0?BJ>FV/`@D+"5%&J:#=2-ZFG4#!P4R$EC G M9:%56FY-37I6F$&E(IL#>I !H!T*T\=CTQ.["K7-N": E=MB0=^XIWIB-F7" MT0-B]"&H"PWKOM]&-L>$=[C44'@?&NV_7$FTU7)29MR&XC?8>PQ$;8\14S3E M7Y%:UY?=X83$AD#2YR2".Q%*4[G!86*T#F0&&XWV/ZQC=(+8-#0]:?:Z;>^$ M;L:"PU IQZ]#UW/<9+@9`UR7<:\>2GXNK [;#J?GD4$E29D12QHR; GW[?CC MPVR$RNHU>7%&-:FI/XTWW.2HHNW,M /VJ5HN]*^ ^0Z9"R.B+4HUX+2O+<<2 M*UZ=3V.^.Y7=S@FH!^$_:W(_LPC9G84T# E5JP#;+4U%/B_CDEI4(:BDCH=^ MWN:C`"%LNI4D$@\Z]#3IO48F*#*UH-5!/?>@%*?,9! ![ULA&ZG?H=L+,W7- M1XU4?#WJ6Z$_1[88-?#?DM)W`#4IN:#K7;KDF5!L"G5:E3T;M\_"F1D+Y)HK M0X)'$U._RQ$4;]Z[F:]JUZ?V?/'A#*W_TO:*T4'BM*;!0=AF89!P^!P`-.1( M`ZGJ=L **(7)Q;ML*D^XIUKEAE2=RM'[1(VVX@$]2*=NU#E9E;"VCR+-0$U8 M$'V_LQJN:;5J<5(4BI/;O@V07?9WK7_)R5GHH):4BFRBM=Q7[7OCPDME;./I MU)*\AUI\\/"0UDMD2$ _L@AN(ZT/]*Y&Z38:;:FPZ4(Y5V.^&^Y&[:'NB;=2 M.Q\"?NR/Q2&P#NW#D>(Y"NP'2N2OS96T645;C12:@MW)Z4^_!P^:.$M 49>2 M_:\?XCOE@D%W"J.-/M\J'KT/7I3($R3?>T "***4)-.A%3U]\!)6PVW+HH!\ M6.WW#O7#`,5IKQ+5V(H$`/;?Z-Z9*5LA%> !\"@`;FGVW4`_/$FV/P:;<$>'1>O7WQ!IMH.!ZT7CQ-2 MR[J"1DP!W,3&16@+4@K6IY,!MM327$JQ) 4'P!-3X$UR3&J5 OP\30'0Y&K6E1">,885XJ5'B*[FIJ?&N'@'5 M>.@I%-ST7Y?P^>&EB057B2!Q45[5[]=_HR)%>:;IHFCGE5M_BXF@&W<8@CN0 M22T"I)K4>_B,))Z(W:8_984XEMA7I[TR%+3D5A\6]-Z5_ T_')F#*UYY_%\. MU=U.YK3K].1X*8\VMJ ]*['^./$0S%!3(HWP[ &K'QQLIL.4U5J]":$$]OED MJ8D]S7&OQ#D5K^UMD>) W:"#H5Y FI:O8=OEX9(2*3!RCD"67IUJ>^_3WPG? MJQIW:O[)6HJ.GC].5U;:-G$GB:K1NM#OTZUQHL#2DJJ3NRE:U<**T!W'X8[K M($+_`(20$&V]:[ ^'T'?)77-1$EI%!WI_K5ZUQ,@FB&CUJ:U8T'@?]C_`)UQ M!XD4N[+R.]*F@\=J9/B/)!!@1 ZJI%#4[]*'?]60)-IJ^35.-.C4WH*]QW&. MY6J6%UI5CR%31@"*'Y8T5,CT4V))#%2V^X'RW-,13'WKEX_$*@&N].I/RQ]2 M00N8,0!M7?B*D4/;(;]6P2#=0W$%*"NVXW(Z4^9R0-()[EE2M3]D"K-3L.M? MNR8`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`C]K:O?PRMF X>!/ M4^]/Z??D]PQ)(Y-FH)+ `M_E#<#?MTR/#:/>6B1R6K5X;A.G7N!].2$"RX@V MPXD#HIWW/?K7`:4"W$ *H;V MP!78FH-:D]1W^[)B14RI3-.0;<;!1N=Z=LCZF-!484J#\73D#T]L:22.BBI4 MD[ FO;IC5;&AT:CJ5 *G>HX].G?ZHM;7_)/6@6O+;Y MG;[\-%)D0J!MZ5(%=VZ[>P.$"D&5MU#4JU>W$;BGB:=S@D;0!31H>7V20?BV MI0C]>0BS%MA>AV)[D&E??;"9% V6R M7J%.U-NP_B<,*5U*[4 4'8?3O7Z_P"/SR)DI%-<3NM:`'KWVZ[9&R6- M+BQJ`>E=E/7IUR? D;@]O;#Q6IB[X""P%>3"I!V`/7[L/ CBIL^&VPZ=#\\ M'I"B1:<5)J:*2*]P`!6M,C91N5@%5() (Z^Q.]/NR0/_R M^C 5$B%U*FJ@JM>YJ5%.ON>U,)C7)3,]%H78%37_],C[D MDE=\3!>1XJ#LVWA3Z<%L:E#^O#:32T5!) Z5VK7?#MT8T"IA MJJ*DGON-^N/J9#;JYZ@5)JW4+TZFF^'=CNY:*2=Q4T/<^&0,V0)#;MLW'MN& M'3!'=!)/-JAH/C[ '[\GRYII>34-0#XPC=;#B*;< 2=J'WQKS79:"20!55._\`4'YY&E+94@'X1NQ( M`&U>_3)BT!3!8D%5#"G8[UQX4K^)-.C$;J>M-CN,!*[*1'<+7:HH:5\">^,4 M`.ZKNH Y58=]O#^N.X9@'JT10$%A5C5O';V'7;"0&)7$J0VYJV]2*D@;'(7: MWLM8DC:@)-:U[>'Z\D(H$;459"%5OAK7X2:GV^6V#DGBI>K!@235F(-3TWQH MHLM,0#4M\(VW-,/$O$:V:+D&A%&/<=*8*6)):YE@>5%(;I6O;8D81NMH:I!H MRAJ;@M4_2#^K)+2JK'ET)%1M2I[]1@D=F-.=]NM"37;I4]_OB#WIH*C-45V-!O38U\?X9'B2(4L9_BJPV Z$UK\\ M(/G2GW-]=SV[$@5V.^Y[]L)L,0&BZU*T/ M45!\<1&T\5*)`;=A4+0M[=*5^FGTY(P"%@((^+X@:4'0C;QZG>F1$2HBJ$D\ ME%/#K7;WR"0:6%@0*D*"234]01AICQ'O:Y?LU[T]Z4PVG>N;_]3VC2@#4KT' M&OO0U\,R[<*R.2[B=CU/@>@W(%!\ACQ,K+9')6K0E-V4&O7H<>-3;E''8GX@ M>) VV_CUR5DL=E,&I'P<07J!7MVQHA:*OM4;^X'3YY'B**+J%JA:@_[K!-/G M[?TP[=4W2V@*\EWY5XJ#UZ 5^C!&UNVD8D,.-:GL=P>U,*1;;5"U+%C6H&X% M1OU'RP<+$W:\L 0>I:@9=J5^C)<-(XEH[J2!45 /[5-Z?TPUYLX%:-J#/\`GTR0#!<*`*"*FM=Z[ =-QUKC(L@5 MS?94,OVJ@T)V^C*EB+7MA@&+9W'Q$D`[^.)D2RKA:!VKQHM M-SN37OL,%=Y3;A]D%@VY\#O]';&NYCQ5U0>)V!J1Q[DDGKDA[[0 6D4UH$ M*MN&4MU/B!@L+Q-/N*JQ?<#KM7W^6&P5!7;T',$[T(&]?#Z!@)3S6'GR8\MN M533IT%-OIPB;(Q5-R:-U'Q$BOT';VR7#;&G*Q (H6)/>M?>N1\,+=.#*P&P< M#9U!Z# 85U6SWNY*!\96I4CB-B2.M,B 2BSWN)/7B22=B#L-AM]&3X&0FTQ< M(QH.0/S^7;([*/)8IJ?B-0U.E3N.U*#KVP6CB*IL@Z=AN#L/H_##7F@R)4:, MPCH`"P'6M#[[9+;O4*M25/P\JD ,2:@GPKD:#(@K:.#0KL.KGO\`,8V&-K03 M11*OQ4+!6J3L=P#X#)1%I;Z;,"#MR.Y%>IKWQ,1WKNM!->G>A85%>_??!PJ# M(*AKQV7H:FH[?3D1S37>6E8EN+ @5K2FX\*Y(A0!WJ1J"2Q)H34G8T)[?PP< M##XKU( JP '+HM34=ZCMOC1#/XMCX30DT&X(\-]LBO"3U4V-"2*@.:DJ*URR M)0;#2AC6,,Q!->)&P^1IB2"BUU*#OU^T#T/B<3LD%Q4BFX8U^UU&/-!6$44& MFYZ&O5O<8D#O4!S]#4D#]DFFWB#3\,@"AR@-6M0`#6E*TR1VY)6@%344!K4K MMOMU.#X,["^JJU-R!M45ZXDA'%7)W,]*4(4T8;D`]?EA@PJV@*_$037WWH/' M$RKDGAIH\:5Z4)/L!3Q'$=!V]L )15+2?$&E10=. M_7";#+B!4B?B)W)-:&EHLY4_#O_`*W3V^["(][$NY.ZCD&!)[$]>QPT% 6NSNJ@FI&Q).U1 M_7![FT#O4PY!"M3<]5.^-R# FN2YFWZ\AOR4_ACOW(XU,GD:-&AY'X02>^_; MOX8:I3*U1&*DDDGEUKUKD1(L;4BP8^X/3WZ')W:#Y.5E'Q#XB31AWZTK[96L M5A:I++U_9KT'O^.6,B:7+*S"I-01N3UJ=]SCPHM;(Y##B16IV[_1@)*DM*S$ M`$4.YI6N1V[UIQ<4+_<1O^&$*M+EQ2N_4%?Z9+A[T65ID"E#R)"_$*[5']F" MZY);Y\A3]KEQ8'M7(;HH+3*6#4Z+7KT.W7)6>J:*PN#1J<]R![=<%'O3PEWJ M4]2O$T/V`:FM.AP)&_13YC[985'0FC?30^V'=!"WG\0^)?YN>WW?=MAW8T>] M_]7VB"*5H* U%=SMM^.9A/9!!([;';\,?#(9"PJ&"BR%+JAE H%0DD+[==]QAW3(]RZJH#3;Z*BG;:I M)^>1W8&+9" T-:'<[5H>VQWPD$HXBXDD5-"=P QJ">_W' D6TW&HY%@QV/%B M*5&W]F$,B>_9;5O$,2:T6O2E*_/;KCPH(ML4J'HVU*?[72VI!!(/1 MMAM7?[0'C@X60%NY5% :B@Y4Z'^W$LJKDM7B".U2?M';I_3(T@QDN^&IXFG6 MI!V.VV3'DQ)(YK$*\0T9.V]"*#;YXFV0(:+;[*6"T##MN:D_C@HL50DK2@!" MU+@;A?"OS& ,A$*:FC5Y5 !'$Y.ZZ)H="OX_$:? -J%1[5-?;'=!7'H-U% : MD$FM>GZSAC(L)>0;)J>0`I4U,>*D1B7$!5(K0`[K7KWK^/3#Q$H)402.+!@"-T8[; M[]/#KC:@!5(X]>A+$_?CQ,Z*D9!3D!6AJ4 ZGMOC3&BJT^&E>('4#>M.V/)G MPK S=#2IZ;=/8[C%@05U5%:"FU!OO]U<:*02T22[$J21T(VI\\46M&Y%:4KT MZ5IC89&)*X[]:2$'[+U(%=]J9(%%4UQ'%BQH1N":`GVH/#$DTQ]RPU+4("D_ M%0>'CD8SD$MUXKN-^O$5Z#)$\2\5_C7*Z2 9=5S'BH#"GB-] MQXX0+39Y*(>AH2-_LGQ\.N'DA4/0\N2D['WQ$BO"L)X[DT'?PV\:;Y+8H; % M"4HQ)H2.FWC7?:N1(9&NBF:EP:@[4 KMD6%*@ 5:D]3OVZ9(%E]/,*877IX8\UH!HD4I4FM02 *G;O7`(I7%JGETJ?U M],BD@E3=G41%=OAW/XX`B,!WN["IK04\.V66M+&:M.0W\0:4]\C5IH-J M&-05)\%J*BO;)#9C5-$DGH?N_5D4VNH0>1!!%>+;5_#)?!#>U2.1W:G$;@G( M,X%1>M:FE"=EKU%-@1^.2WZ,+7+]GC7?KR[;??D-^]EL5,$#D*@DBO'<'Z:" MF2M:'>J*>5" *!:;4ZX:#&W5J2O$@$_#3N*;GVQH)LJ;$DM4_$=DW-*T!Z#) M,:<>7$D$,.M"2#OMT^>0/DGA4JDD[;+ML:GQ[=-SAHHD';-4$;5Z$_JQLIYK M&(H?5Z"M.._RJ, ME04B1R#46FW7X3D^$E&RBSMQXML2:GYY'AI0I\C784/< M#J/?Z,/$`ROR:!W0D]2!OO\`3DMBQHN+AU8D4J>5`>O@H-#U:HV\*=< X^B2(J3R\34F@`J>PRS=A0;#%D+K4@BHIT^G(6 M>JB+35-:FM>W;;KC9*5I*@EO`["NU:=?IPF)'5CQ2:=CQJ=M^34/AOOD+9P) M65XGO3#Q*;;]0%>5"HZE7_`('$Q2 % M,OSJ"W%:@V"FE01TI\L/$6._1IF8"HH17H:UW';Z, M-][.BL+,4H10;%17=??;OAV[U!*GS9>Q]V[G[@<;6BL!<;.JU\*UJ?N'?!21 M-S?S'?CN1[=/XY+A# FVJ[4IO6E/?ID;9<+_`/_6]HT5Z;5'$D #[MLR22'! MH]&JU791[MW^G)!((;!8H5K0]N]<)E7)D+/??#OW+Q?%I5JE57D#O M0GK3?)1!95LN%& W-%)VZTKOL,@=F-MMTH#O7]D;;=/IPBTV&FY$. 1M4GT8\5,J;4T8 \2&.WS/7?($6CA'>WLQ:@!H*$D[;?@<)8D4T:FM3^.Y\1M MM]&-!-^:Y>)4`GB%.X'2N_CB8]RWYN*C>HH.0)/ZL$5 MO@K4%0`M>0%=R:; M_?7!:2*=3E]E>3?L[]2>^WSPW:"&R0`6H"H^TQ)V%:?KQI(#8:C4;JI/+K2M M-R/IP<*[]ZP]*CXB:$==SV(KE@(1PWR+?PGF": '?X:$@;[GOD-T;][3M0!B MS#PY$T%1[81NFW56I8"GB=]R?&N&D -FE*@"O55/'DF07M05'C[T^*NV M_;&PU@[\VN/2IKO4*=@?G[8\5GR^0P%:(;J2!4GF-V4;B MO?;YX RLNY,0`P`Y&GP]*'IAIK-K&H0*D$4%$KW_`!PB^BW;0(+C;H*5`H 2 M.^ Q5:S U#5J"#7M7O2N2C%)\EWPL `JU9ME%=O8]\@>;&RV0 I56(0_:^0_ MMP\)9\1')2*]3L'[FM2?IQ!I:)7K6JAMQN>OAXX=F/"1R:<<@Q(X]R*T('CD M4@TX4XJH!)45%>_TXLO4V6H=Q4'M7:OMB PWZNV/,L-R*=:CZRGM]W;!;&K6=R=@*[*.OXXU;9R"]F-&)HY"U8=" M`.^WSR5@=6'$LXU"L2H`.QIT!\:?KQM;7 'X@7+&I*AJFH[[8+KHMTM<\:J> M3,5WKM_G\\ C?)EQ=[E+<138DTK6A^[#5],1 L`6^U&'*@VIWPTG=RJ!448;?9![Y'9 MEPDNH"W(AB1TZ>![_ACRY($5C$4`+;&EIZ5=".X%=R.QQXJ9$+:!5#,P6IV-=L`(ZE M"XFM:@;@D'Y;UR1D%HN)\1QJ?L 5.^^5\-L+#C2M=CR:I7MTI4_++ 2&2DY7 MM2C$5\<$B2MK*$*!0M]^U/'(@6GB(Y*1()'W\=Q6GC@H(LEHL:\@*DTVJ/P^ M6'W-@VYK"ZGO0G8@BE:;Y&PUFT.W$BA!H#]GE3)[A%DJ3C:B_$:C8[[?QVKA MW+,6IU7D1U/'[-???[L'"4&9;V4`@U(ZC?:AH1*U8=Z>WTX@(Y.!X[@J6)`-#O4;@%OX9/AKS7C^"DU-U?QJ".X.]/HP$$ M=&-TO!J 3Q#="@VZ#>@[;8-RRLE38JHWZGK7?&@&')0Y,3LO(BIJ#M3P.&@6 M8DO:K&A','=@#0&O?^&/`CB6* >348!-N77KUK@,2$\9"PJY'Q,!\'@=\B=VH[J!V8$-R9MFY TH M?;OTQK9*_B*\@6*\OA#$U([4';#$J"I&@??V#B+:;Z*@1J+\5-A M6AJ-Z="/##Q-:XDU)<[UH!WH*]?88>).YY*3$EJ*: TV%/?'AM!%-J02%/[7 MQD[FI\*>QP$4IRA:Q*LY&TBFHK\MZ#[\@D;\BT K"BDEB!Q;H"/YCX&F%.X6 M-LU"I!^RXJ!Q!'?VZ'%;OJM^T:$[`;_32F_AAID&C(WQ#B4K6NW;;OAX6M;4 M^)^5-Z9*O)EN_P#_U_:94'D%=B2?LTWV]^N90<.RZE:J^[=D)W^GODCY,2[I M5B!11WV 'S_5@!I1):RU4@U...@[[=#7Z<0`>J*DX"N_$U&YR>X3L7'>A)/N M?;%+8-&%&%3N0?"GAD-F7"5Q8R %@"/V6\"?[<("&E# 4([[E=S[[8F98\E^ MW6E =E[FOSP[E;:>G'>AKMQ!W/A7OB20@$AM@>@Z'=@?NIXY$&TKZ%JD*!0; M$U[=J#)VA81\5:%5J 33:HVK]-*Y)#0*BG<5*@@$]?;($MH-!3J$T5F+&F_3M_9@ MXBPYM/78M0<=Z'=C7^8=L/&SY-CBH !(XCK0T7Y?M=\-#JQ(:<4YJPV'V5IT MITK]]<30Y,ZII0H]J]J]_89&V7$TY8\=N*5%=Z],:(:^)RD45@32O3Q.&BC= MQ"JS,:$&G$]R/\SD;MD`2J,J@!: ?L\?X_1D5M8H"DBE"!L#TIXY( E'%)MC MTY**>QVKXX1'S18/;Y_+(&)033569J=6'7W&WZ\> L5C\: 4I3[(';_:QLA.ZV-.51R!'$[>Y MKUP<930;)*@J0*;TJWOUIB-U$BM %2#04 ^UL-_?$F/>G M^).S&R%,Q@$T`9:GD6)W^@8(E/Q7*JA"0 O(T/R'3KA)8DD*4H._/C4#;8]/ M:N 4D+TV%6\>_2F2H,[*Z@(&Q:AJ5'4X*#&EO4T'*@- M-S3)6M*?$].`+C< M@'C4;[$G(&E*YZ$+N U?VJ =/UXT4BPTK]69."_*H-.YQ *%K; 5\:G>G0BO MW;X\6Z=^BHM2H)IR)[;"G]F$K$%JB;$*:H>OZS4Y/>MB@VL(0<:\B!U%: ^. M]/GD=^I7=4I]FAKR.ZD=!VK4>&5VO$5(@4KO1C4@GM[]LG%6ZA@3'U[5WJ/ M#&0M/%31HVPKPJ:J>@%.OS.1LKSZ+P$Y?%)615^(5\0.H[>V*EL(C?$"6:NP M]LE9"-W?#R Y$U[@;??VI@LE-D+"5VJO-@-QX_VG#NCFL4 5(HH!J:[4^??# M9+(TXBK5J"3O0=_XX$!W@3]HCXB.V#CIE8+8.Z@[@'D>P/;?[\CQ%KM<":&O MQ,&I0^'C]&-!GQ$M<23U#5K6IH*#)6.Y2%@0`+7[`J.([8>(=S%U#T8\:=3] MV1L=RK"%X@;5D^$#Q\B0:7FM!MU[5Z$>/@,ALDF)64/53L*UKX^_N,E9 M8<*D0HY5^([??@M+52:CB:$U(^6],]R&K1B"Q=:]#T\?XY/28D]ZT;+T^&G3^'CMC:>$=ZT\7Z4Y*:TK2FU-_OP\910"D5#4#$%U-!M0 M"@I6F1C/R37 W>F_(=*L:4^> MV ;*I@DE:\66@Y=]SW^7;"1LROSMMRD2DTV!IT/4]"*?=E<8I"B&J0I I4%@ M"0!7P/\`#)$,B?-4#'0.Y/A_7#:1*0Y*3TJ.)HJG8@4WZTR81OU7+2@%.7% MBU.X)KV^G(D*8CHT#S)_:>E2.^PIVPPBPMIN!V :FQH#04I^.&J+,65BGL:$ MG[2[]=]RN2%TICW+31`0%^S6BDT!^G&/O8$$-4;[/+ MVY]^E:T_#'JBR__0]HU!!)KX@5\?Z9EB+AF9')NH//?D:]FW/T]L/#YJ#?1V MP-3\Z?:"_1@JU(;8EEJ'%0:GO4]_EDN!B5G$"M-@P! ^G?#10!;B=Z^!V/\` M7Z.N.Z: 74;BQ(J&KR5:CY&O;!N%LE,(X25AHKDGOWR5 MCHFE2E5!V9J@T^T/N\<-HX.K:@,5<5Y-LP';?*Y3/5(V;V4@U!Y48@=2>Q/T MY "T\-]75)!(12#U`)%:=3E@V284ID025?J&(-.A%>Q M^DX=RFUP`:A.X+&E!OM\-?ORLIYKJG8;'>A-2>U:T^9QI3%P4;%C4_LFI!-> M^_TX0 .K"J:X\NM2`=QWJ.],LV22.YL5VZ_:K[_/`2Q!+B&_E!WK6M5IV)]\ M@(D,S-LD?"!3EX$TZ^.2E$(VZ!38`HI^TK&C%3ML=QX'; `ME?SV'>A(Z$$& MO0TV[8\".)3/`J7 &-,E1#&#QI0G<+6@I3?Y]\B1YL"L"U)8"J MCKWWV_V\/$EL`41?AX@$M\Z_YG+.:TI$JVQ)`\!V]_IR":(Y*G%QTH03L">F M/$ C9RDT(9@36A:F]??QWP$VRL]&U"BO$$4)^$?M=:[8EB;;J*]S7IU -:;D MY %(+N/+9@:%B0M1MM^'7)#WK;5.- S;+1=R=OI[G+!Y%)DZH8\@A/$GXB#L MP[X#[T *3<1QX&K$5&]=C[9'?JM-J2?A0\@=F4]![D9,`((+G*D'>K@@FG^5 MM@-!0"J*M&132H&W+7Q;>]!XY,>2#)3#%G7KWJ?'PJ M.WRP\""0J#KS("UJ20:[4KO@D&.ZQCR8;B@Z`[]J#\<,:#*BV.:T)3<&H%>N MV)D#Y,;(7@<0/@J._0D>WXY DE(W:)Z;<2#LO?\`#)"(9"QR4T7F MXZ X3*EVZKF4TH-@&WVZX\=LN'N6*I(%05!V`PW%KXB&J\RU3QKN!UPD6D25 M*GB&XU[ "@_#(\"VUUV9B0&J*UI0`$?=DP*4R*TDDG?>NPIL-J_AD)%1$'JT MI(,@.Y!J0:C?5-J$;8+9;+"ST(`&PKQ!([9+AI`"FS5H7/ M;N:X+ODDVNVH":EJ])/+O0]^ 0&R10H*DTX^%0*C(L:6*_J`&GPGOTW[U'SRRSW* `O M&]30$CJ1E6Z=EM-B14TJ*CVVR5LJ'1R_&JG8@FO>M.H/Z\?@PX2U7X6#$!>B MEA0U.W7%D*0X/8@GW!J:]%'$1R6LH.X (9B7 M%*?+Z-231_;<5[XLCQ4HN`U"IH%-:#KTI_'#Q(C$R6^ H:5K4??\` MQQ MGR:=PPX4IM\0/^5L,/"C=1#M)0* :_$0#X;'" $;A<>0'Q4*MT!J:$[= M\!#"PH'[*LJL:$DG;?\`S]L199!=O15^%PXJ0/#Q.'@3Z0T6J2& 8G;E7OVR M7 O$3UI>"W(AA4BO(]@/?VQX&-J"LM""-JE=ST%0:EOE7 065$KB02#2I85< M=*'VR&R>$MJ7J >IWY>'N1DKMEOU<""02*,35V]E!-*>&1X6!C2FU>IIQ8=C MT'7I].2C)(F2U5GW+H'3KA^">'S:K7?LQW%.M?;!PE!/FXFE%4;`[#P M\-OEAB:8[K:&GVEY\MS_`)-/UUP<6ZO_T?:5>I_:Z'MT[4S.XRX1#2U*EBM4 M_E\/';!SZHINI._04^S['I48T RHK05 Z4]Q_3)C9@;7#?8'?OW_`!R,I'HD M6YEXC8EAXY#B+(4TU M>V_Q=]^F2$E,2X,S5;:@!IM0;]Z5&_OCX;%;6M&Y M$&C5HM=M\>0V2 51>!4A2-S1Z=C]&^"(\U-KQ\; A0016I'WO3P_AE?5"T%JDU-0>0W^XY.MFSBI?RK4,*#[ M3-7;Z<$8L3;EK4@\0#1J-N">],*0:=RJ>M3^RO7[_#!07B):H0Q7E,-CHBSU:8\?@-2!M\1J2>OVJ#QQ6VR*\?8_9!(_ 9*J'->?)4('!]@#UX M[FN5]4^&I2;D;5Z=SMMX'PRP>YB6EV)'#?\`9 &]?XY(R\E7,2K$LH8#>F]* M_(9 ^Y%EN@X@BK!30* ``!7;QRNV0(6BA;9@O4E0:TZ;>.2'S9[]6V%58\=^ M-"!^&W7#=(L=[JE^0/4,&!)--@#AON006R&Y5/PEMQ4'Z1O['!Q>2"%STH&+ M\5!/$GL*=/NQ-]R ::(%/BC*DTH2=SX?ATQJ+$VV"K?#L]>@#'IUWPT>]D 6 MJL%+]S\4?$=^F-1[UM2<4=@.@IMX;9(^20:7`B@^$UK2I%/I]\KY,A9:H:GD M1\1W`W4@#8X3*V/"0M1">0H0E>@V/W=L1$()57(2@*AJ"H4GI3Q]\0`@J"@C M<$TKS- :CWKWITQ('>BD0*&2L,^$K 5 M)W'T`FOS(P;(.W5<14 '=13K4^X/WC#:"6E^("H(I7N#=/)L/52*UJ *=-R:UR8D6#O42C&HWW)/Z\!M;*SD:\B">],C MMWJUS!&XKMN=]_OQXBV<*WD#0C?D:=Z#W_AB)HX/-QD%`2 58BHWVP\_)B1W M+$9>3-\N6W;'9;7F1JU/Q+W_`,_;(FNB>,N5Z;@%EW^$&E:C8XH`'>YG&YY M@$"DT`%.G\I(Z ;_3[XF"\7^13NI&I.P-14E1\ MJ'K[')!BO9@P+4XL214=R*TK]V)3:P@;,:!/SIME@UV#^:?G^Q/Y?(.<_L53_P`YP?FB_/G::669 M3Z">F%$;>)/#H.N#\_BOZ#\T'#D_G_8K:?\`\YP_F5#)%]>L+"\B6*CH@],L M=MS1-A_9E@UF'^:?FB.+(/XOL9;;_P#.>6OK%&;OR79RR=7=)MJ'^4>G7:E* M_/(G48>@(^+...8/U(R'_G/&_,SB3R-%);GB84%P`0.Y-$\.F4G58OYI^;.6 M/+WHNQ_YSM!U.\;4/*#+IJ1N^GVT4JF4\5J.1X 5)[G+89L)0?$32/\`YSPT M;TT>7R/,K @7""X%`6VV'':AZY$SQVQ)R=+^::1_\YT^49)&$OE"Z](_M(_Q M>XH5Z5]N^6 X>]J,\X/+[44O_.=/D1@ZGRM?CB!\9;???KQ[;]L!GA'\7WML M992-X_:F-O\`\YN_EHTYAN-'OX8NHE^)O;HJ'ICXV$[<7WLOWG2+*(O^$>+/N?_TO9Y8!0IH2#2G7KWW_7F8 X`]]KSL2 :#EO[ MGZI)V.U/;'A'1/$2M8"I 4FIV!/T9*ZZ,'*`=J,O+J.6VW^W@LG MI3.@>175!.VU/#?MCP=Y0XBM5 ^(;&^#B!YLN$A74U7H%([4ZC(D!%MCCNW$\:=.V1!*TXGQ0L&_:'3WR6 MZTN/4JU#3I4T%/E@XBA;6M1N*D'CX^!/\,.R:"[H?B*@]AVKXGWR(\D\NC9( M(W4FO;O\\-%C:VA/4FK;<5Z _P!F$$)IJE2**"6H=SW\XW%#VR/%22%QZF&_-' 5YXG8?9J!4$TZ4[XRE:/4%NR'F#LOA MM6FV_B]=\(\UB;6LZ(0KFA9@JHP) M%>H(K\\D9!) 5J@&A0`TH-ZG;M\AE9-L=G<@JCEN3^TM?QIX8@$M@D%+U!]I M10G[2"M#4'<9.@&)M:"NY8$+V"D$'?;;QQXRA=R!_:^$_9W^>U/;`3):*GR3 M>N^_<]*=P<&Z>(N5AU#2[5J:_AX;8"5(`42]0PZA]^(Z&@'],0"Q51,I"J&HI M- >]?$_*M,)LHM:70**#BA/'@I(IX#[SOD=RA8[L*K4_#0AA3OO04WV.3X>] MEQ$*?,D[D[U+#VVH?'$4Q#9D'VJ4[5%E/DIW!^F MN6@V&+@Q!\:=,K+*$0L&['MSK6AZG#Q*;;#,H'Q'D1R4^!Z"N "UX&RQ/$D4 MK^R#45Z G[L-%"E(:EB=PP(8@48GMOX;Y*@@A<*@*6:G@IVJ?E[9$R*BU(D[ M\D!Z=JBOCMT.-#O32IR)JP')0-V']N VIEW;M+UJ"&+'E!0X%=0LSV*;'>G04[>_MCQ,N&^J@/4^$&A-`KFM350#TR7$>]@8>:J: ME:_0X"/-CN%+9CX_M!1\(\.O3(D,^(E4^V=P"*FF^^VW3 *"BFB"%V M(84KUIOX[=,/$6P&U(AF"BG44Z4^&HH?U[XMGX8.(,J6D(`*MOT`[5QNV/B4WW'%>0! M'&OW;_JP@!(E;77XCU)HWCMMAM-%OX2 M#U\?#OD5X2L:@#$T*_RGM[CW\,D MME2XAOB/PBOQ;T^9IB;30Q(6^K15*U&WV@M*5PG((\TC?D^7/.?_.07 MF+5?7@L;C]%6]6588B"QKONW&NX.8\LUIX"^=M5\VW5Y,SO.\QE%1*Q):HW( M:HZ'L::9$8D<45UZ['IMX#??*X2+/@#!O/=U/0.J2H M[D&I*JP%`>_7;!,`\]V>,UR>2,[-5>5.+?$`>@?I7Y5R(N/)G(@ME@.7(]>* MG>NY)&_Z\@`;7AC.] M/"A_LR/$&>_^6#;I:.(JJ2,(^)(M0II\1Z@=R1UJX/_]/VB5[U^SN!VS.$RX)(Z*?(@ ]=^E:#'FC=<"NY&P/4#QPFD@D+ MC\7$?:IN''3;V\GM@B&+7J+45-`.I[5'AXG)4@K%HPY#J& M!JWO6E?IP2MB`VS'D*'Q/ ;]MZ>!R0);>&@J!ZG=JK38CK6O0_+($-:DTBO4 M*U,2@\F-&K3BVY(%!VZ=:X[IH+S+\(8,&JWQ=Z#V&#;JBI%I M9*U+\MC\))IDK'1B05HFK1>+`%COT.V^_P`\%6R;,PK4+N#V]]SC2-W+/4)6 MI)Z#P.1I/#;O4/6M0M*5V'MCL%6^J2"M>*GJ*]#DK"J1DWW/(D<@2>P_ID;[ MF5M*XK05Z4 (-/;K[X\2FVB7Y'X5)Y?+MW\=\/$QIP9A0=#N>(\>QP62RVII MI2.))/0@,!O[[?/)$AA84UD8@D$J"*"HH?G3([)!"MR:HJQ%/LT-*GK^K)<2 M"% 5JE0:[\S78$FH/T#&[0+534D$BG'_`(48+ 965A8D@\BP.X"[U]Z>'OAN MT4%K$@`@DU/4=B>XQKN22 %BU8,JUW-22Q!'B*]J8##S1$!5^(TJW3J#T.Q& MXR)EYLB5G(O'45H=P/[,*1;0'.J[FO4UITR017>%X)HH;[(^^ON3C?>I7;E@ MOC['? 9,.2D.-2RDGXNAZ#OMD;9R(<&55W/<@C_/OD^(@(6J&J"5I3Z=CD%C MYN)?N*C?X.I^_)FJ9+E%:4JJ@?#[?/*Q3'A)7"IW([=^OSQ*[Q7'B*U J>YP MT6?$&B%\*CW]O'VR0M>)86(+%?BZ4J*GZ3[8"/-@927*/ >._OU.V#=;I9]H MT;>N[;T&W388D!C$ME:D]0.W^TA/;QP,Z\UM# ML&^T?LE=BWA0?KQ#&O-8S,M:&C'905K0#V\!)%.)[_?AXBS!I:RT-*$%MQN:``;C]>,3WK5]6DJ>1/VN@)\2*=\) M`/) ]ZUU+;$`]!WJP'04Z>.1%(V:"J!S.XK3CTJ!W _IA**V2,J9';DT:?#R-*]/\_;&T42L!45(4 5W!Z'P]]\/ M$>B""%-6Y$V'AD>K7NH70D> $L MXQ)-/S=_,W\Y?,.KZWK&G7%]+!IMJZI#9Q_""" 03Q%33IFN_/"1KDWRQF+P M"\\S75P\C!@&)#NZFA+$"F].V9GB1KO:09#FQNXU!I1))4@BK1I7IVZ=_&F0 M,267''JESREB.8J:^G*P--@.0_X:N 1"B0[[5;!&N)55*_OE)8==NHV\*T%. MV5^$>@9C(.]"><-+D30;UW K`JLSC3AQ132JK3 M<&@4D_?DX&]BC( N&Y -*@;>S?LDT[4R9E6P:C9#G8!0%KQ#5* DU/2A^_(\ M)*PM:M1Q#."'.Y&Y';;[NF6@`,S:QG9DKPW))85[$'B-\$MNBB!YKZ\PHK2G M1^O?^(VRK@\E,^Y8#4\E-0* 'IMX4/O3+1"+'Q).9:@4^)B22IWH2:@&O0#! M]*\1/5<*!C&1Q&Y#>U-\B9LAA\UDC#<4V4 T-:CEU+>V"F54TU''%R0>0/TC M;;#5*0MA(!_7A$N]KX;Z.#*H=R34%FY#KMTJ/88F+;&*WD?M5/"F MZ]_$;>%=L;+"HV__U/9K4K4UWI4^_O\`?F69#O<`A8201N :GX2"?$5]OGAH M,@Y20* _14U[8T%MMY%C1G9A&B*7=R30`'J3[8>"V!(BQU/._EYOACFE,32^ MFLZ'DE>A.V^QKDN7-,9WR31BK.LBD,LIK$U>U*@$=+=0PY@[#N=JURP$M1YJ;.`/D=Q\L)6R%421O(U K0 M>V5GWH$F^<9!!/2A)&WCTR0C3,2IQ>.@6H(W(J=ZG)$)&_5P=?YA]D5%:5V\ M/U97=)(<7CH6+ EN@[BH';#=H6^JCT8E16I^*HK7Y8#MR6VA/$#0BH.Y(/2H MWP@VEWJIO2NVX*M0`X;ICOU4VEC;8'X>H!_73%(<)E-=BI_:8> R)3PM_6%# M"@9M^^PWVWI@%]ZU3O76C-RKMN >GRP[J=VC.&I3X1V4=.G7?^."N]"@)ZE@ M00X.Y)W/OX9(2 20VLK D;D'<]*?/;<8+MA1[VG9CM0&O8GJ#X'^.)D0DM\V M/PT53["@V]AW^60!3&-J)^(@DUW^'OO_`&98)!3 E4*U(8FI!(.VVX\,3/N8 M"%-UI2E2M!OWK\L09%G=!8W+B"13X:KX=.XP^]0O(*[JS)W*@D-\77;WV^6(D4D-@48D'B-N)'6N_7Z,=RH- M.( JQ-:]3[?+$2(3Q!>BE@.*\@>A&X]M\:):[49%V%4%*$JPVH#OU]\1`GD$ M\95>#<5JIJW2M:T^C#X95:4;NIX_9 Y;FOL=\?#\UMW%V/(Q$_%6@!'7;I\Z M_/)<* YHY/A))&]>)]MLA\&6U-"!@W(,RLQJ*&ON?PP$6@Q#^1HCHQI2],\N5"".X^^A&2 +(*@C+N M*JJCD>(#0K]H["HKVQ$;29[)?<:K86]Q]7 MN+V**8 EXR:TWV.PR?A%K\20YM+JFE'B/K\0*DU+^2&$ACQ%4_2FE[(]_&Q6@H"=R._3WKD#CM(F%3])Z54%M M0CZ;T#'[Z;##P2"3D"G^DM*[ZA$@K4#?I](P^%)CX@[W#4-+V=]1@J>I5B>G M2NV1&*2\3?Z2THD`ZA&U/B*CP'N1].$8"R$P%RZAIU-[])>.Y4$;TZFO3N,3 MB*3*VQ?Z:O6^1:G=37K0GO7!X4F'$%YU#30`%OH2*>)V-*FH`IWPC&6?&XW^ MGO3_`$^'B14\B0:^&^#PI+&=]ZTWFG;VV'AFQ(`+37NFD"FH1-Q M*L2&'AUZ=@=L!QRZHXG"\T_E3Z] 0=C5@ ?PR/"6?'2_ZYI_:_@))HJE_#?Z M/&F/`6!R+OK-@/\`C]A8GMSH1WZ?JR0@2D36"\T]CQ:^A'S:F/AEF)A:]W8D M/Z=W$W+YA'+;1N+0`AKR,TWHS# MK[8`)#HDFU.2XM6J?K410?:/,$@D4Z9'@)0IK=6HV^L1HG6K'OWJ!_'$P*5- MI[=CM9-(*\3=IS-2PH:$^ V[Y/@(YEE:B/-&D$L/KJ]ZBAZ@=/IP4.]%H#6O M,.GG2+\Q7 +M"Y %:[(2:5V!IE>:)$6S$=WY&>?[CU/-VKR0O6*0@H0=R2JC MF!U([9I,,:G]+E3JF'N=RP!"\PTB=?V:#\3<5;JH\#M4?/KDN)J^UQ?CQ;C0[A@#L*^/O@MLL+UW!Y;& MD>X^9I7)B4@SB&F'($K0L.(:II7;XJ_URP96N6W(TL-0&%"6#; ;]/'VR!W6 M)EWKZ"I7O2M>U/#Y=LA18\6[_]7V=4;@DBHIL=CW'XYE<)<,RM39@06/SH-Z M_=DQLP*F954J:;$[^W+;I[9'B*$D\R^7O/'G#RSY@\O_`)?Z;^EO,][92+8P MB6.+TV(^%V:1E'6O?IEN.<0.:#BXS^U\]V7E75/R]TJ/R?K>DS6OF'3(^5_I M'(W$C2,W,T],N34G*SCESYLXD 5%FGD[\Q]+OYDTV^OELKJW!]2VO 89(0*T M656"LNPI2F0`*@O4/TUH$A(37+(,QV+3`%MJ4X]>G?+XBF!D+:?5=*:M-:M- MJT02!:U'4D]1@,66S8O]*9M]:M!4FH]=0=MO$$FM*Y!!F%9+NQ)'^Y>R^R"1 MZR=:=20:=JE>FW?OD>$K;E2- ME!^LPMW#&5!OX#?MOC22;6!4Y&MU`1R-1ZB 5\#OAX"@+E@0"GUB$<14CU5I MOMX]O 9)D7<$/Q&XA(#?[\7?N"-]NN1HEB&+>8O.WD[RG-;6WF37H-.FG!:- M7=14;=#4@]1^&"N'F:^-)!/06QEOSK_*E3\7G/3ZUXT,Z]MP0._3(^+CZS'S M'ZV7!,_PGY%1_P"5X?E22Q'G+3M^\DRCKX4-0$;="/3J-^GMD)9L7\X'W,Q@S?S2O/_ M`#EE840#1;EN3#TP+>6I\141' ,N#O7\OF_FER?\Y86[,_#0KT,.H^JS<03T MH/1Z9,Y\(ZK^7SC^$KO^AJPSQQCR]?%W.Z+;7#;=C_<^&#\UA[_O83Q9NXJ; M_P#.4\T0V\NZJ8BI=@MG<,:@T!($!-/'('4X1R)^%J,.7NV#\^"=H'[0V<-HK-P.Q%?&E=ZY=J5+A&,_(_J;,>GADYR9 /(?YX MT%;'75$@XFGE/6VH:[UK""*UZXGM:?3&?D?U-PT6+^<4;'^6GYUL7:0ZQ#5B M5*^4];?CX<1Z51D3VK/_`%,_(_J;!H3]:8UIN MQ_=@X/Y7R?ZG+_2G]2?R>(?Q%%)^3?YM2-4^9M4C+@`?\Z7K@ IX_ .N2_E: M?^IG_2G]2/R.'^IYSU..K;T\FZMO\PP&'^53_`#)?Z4K^4Q?SC\PB!^0GYD5/+\PM M60TH@7R-K!%?X9 ]J2/*$O\`2E/Y3#TD?L7Q_P#./?YD.[*WYB:JBKNCGR1J MG'Y #<_3@':DOYDO]*5_*XN_[5TG_./'YD'[/YC:RY) 9/\`!>H*/"OQ/3OD MSVI+^9+_`$I0=)C_`)RL/^<(_Q? M:''_`)QL_,"3B3^8VOQN:FB^3[BBMXFLP!!Q_E27\R7^E+ Z#'_.'S"Y?^<; M_/H0/)^8'F5W8D2'_"4AZ>"_6%V\,![3/6$O]*5_(P_G#YA:O_.-WGR5V4^? M?-$04CC(?*;48'8[&YKMX9 =HG^;/_2E![.Q_P`X?,)B/^<9/.A".?S.\QDR M$#C_`(/8@_YA^8HX16E MQ_A0`$]:\1=UP?RF>Z?^E+(:*/\`.'S55_YQ@\[E^+?F1YDI7X91Y56G@/A- MX#C_`"C+^G_I2G\C'^HXWA(Z[8_R MCY3_`-*41T,/YP^:BO\`SC-YS:4J?/WFE49124^55H*=^/UJM?G@':9/\,O] M*61T$.DA\TZM/^<3?,ES,BO^;?F*U'VB[^50JG_)-;KOA_.DCE+_`$I:SHHC M^(?-Y=Y$_(36//=YYUU'S'IOG:]L=#\P7.A:+J.B1V%G]8.G#T9I9;;4;NVD M4^H"I^$_9VV.],-;+*3O,5_1*QTW<8_-Z"/^<4XG`:70?S/AF)%5$WEQU('2 MO'5^N62,B?[R?R_8V#":_@^:QO\`G%9U:J:%^9\D:FI;U?+8)/0&AUBM-^G7 M`3/_`%6?^E_8HPRO_)_:@1_SBM=O*8Y=)_,>"V&XE/Z$D8'Q`CU-CMAW_P!5 MG_I?V)EII'_4_FME_P"<49U(6"U_,F9&``F9-'2H_P!0ZD"#\QDA9_RL_P#2 M_L1X$ATQ_-I?^<27:5$>7\RX$(/QF#290K#[/346VK[8;D.66?\`I?V(_*C^ MA\W#_G$W@)"VH_F6A^SQ&FZ;(I\#M?\`3#Q9#_E9?+]BC2D?S/FJ#_G$R/JV ML?F2'\3I.GD$GP`OMJ943/\`U27R_8G\M?\`,^:G'_SBQ1BAUO\`,H=00="L MR*?ZWURA!QXY_P"J2_TO[$?E#_0^:(_Z%8B=@W^)/S,A%36(Z!:D5/?:Z( R M!E,_Y27^E_8S&C'?#YK&_P"<6N+BGFG\R2H.S#RY;FFW_,57(FE*X1FF/XY_Z4_J1+2>CGI M[8RU1 V,_P#2']2C2UUC\U1O^<<;+DK#SQ^8JLOV0?R_U!N@[D5RJ.K-\Y_Z M0_J0=*.^/S7Q?\XTVLOQ'\Q//T3 ])/R^U,U^94=,M_-GOG_`*4_J8'2Q\OF MJI_SC+9%6/\`RM;SQ;(I*F)_RYUEB?>HCW^>'\W+OG_I3^I'A1'%W))M5'\H:LO)B/^,1^_!XL^\_(I\33H)?R M/@DHS?GC;0EB3Z4OEG5$H/<>F*'P&6#-DZ$_(I\;3A0;\G-,1F>;\_;$4/)C M_AW5!3CM4_N]NN'BRGO^18^/I>]"2?E1I2BJ?G[IC]J1FT\F+>1?R>\O>?=$U'S'J_G/SU;W*ZE+:P6_E;R;JFKVOI(64.' MM;>0`U4A@QJ"/?,,2,K]?ZKD_TA_XEOE #GP?/]J#?_G''\N"_&/\TOS6FG:@ M,:?EKYA9QM]FGU($$>&-Y!_E7K7RUY M]U72+:XU*>UM6!M;G5;&33[MHWC1QZEM)1UW<=1F#@UYE/AL_$47*R:81AQ; M? L#,*<&!8?$`"HVJ-@:CQS?X02*MU4H^2'+T:3@?WS[D?R$=&^[]>3E'A:1 M'O;=K<2J"]1&4DX[DGX:T]Q7M[9,#(>C<)0',IWY6N;-->M&F/*!@2&>M/B8 M`_($_ACB!$MPPGD'1G'G;4=-D\KZM"JJ93&PB(J.E0-^U,AJCMLW8_#>F_P`\(B6N MBM(+!E96J#4,13]7W8&0/: M@H2=ZCL,.S&BWR=C4J"2%JNYZ=#3Y4QJF='HO8LQ+, JD,@]ST/WTR=R9F(6LV].7%*`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`._8XD\F2_P"_K_,"BW_.4>@`IS_Y MSI\K`2$A1'^7-UN?:MTV,H0Z83_IB@9I_P#*1_L`AY/^ M3_5Q_I I+_SDSY9XMS_YS_+4J.:?EHH%:_\`,$PR/@G^8?FS&2?^KC_2A;_T M,OY6^(/_`,_ ;L]-X_RTBVKTZZ8^`X)'^$_-GQ9!_EA_I?VJA_YR8\FK&GJ? M\Y]ZQRZ^K'^6L-"/D=%<8_EY?S3\Q^IG$Y#_`)4?Z7]JD?\`G)KR2@=C_P`Y M]^8Y2!\,:_EK;>'_`&P/XX/ /=]H_4S$:,.1-:+\5@*?3D?R@OZA\_P#CJ>'-WW\!^MYZ_P#SE-!=>=M: MUV/_`)RD\[>7[:[T"QL=,U>/R7H[RW@M+F>1XY+&6TEA#1F=V60("5)6IID9 M88 @<81$9B;V_'Q:N/\`G+>]B#-;_P#.9GGZY100G/\`+[RNG(]N0_1=0/'[ M\M&/`.:;GXJ1N?*'EA0P^U4UTHTH,G M$:7J1]OZVLG4#H'G5W_SFY_SDY&LKVOY[ZO/$O+T7/EWRJI<=5_Z5)W([8#E MT8Z7\3^MEPZCR"43_P#.G_(8]64<>1467ELGX:$_]*NN#^5-+_J<4C29>M_,KF_YS"_YS%:H M7\Y=:,I&ZK:>70`:5 WTNGADOY6TW^I1^03^3GWG_32_6VG_`#F#_P`YFF+T MV_.'661_B8BQ\O[\*+$Z2?>?],?UJB?\Y4_\YHW! M0K^;?F-.=26%OH%#3J2/T;M\A]V/\NZ?_4H_Z4*-!,]3_IS^M37_`)R;_P"< MTIH4*_FYYH$[`%ZQZ*HWWJ =.KMT]\M_E[!_J4/])% T4NLI?Z:7ZUW_`$,M M_P`YK.%/_*WO-(Y'M%H@J:;@4T[:E,C_`*(,(_R,/]+%E^1/\X_Z>7ZU(_\` M.17_`#FJ\G_DY/-0CIM)31Q0=CM8TZ[8_P"B''6V#'_I8_J4:&SO*7^GE^M3 M;_G(G_G-(D@! -]ULMC7".WXG_`"&/_2Q_4REVT,1_D,?\`I(_J3_)T?YTO M]/+]:&?_`)R5_P"?Y\^7UOK/RQ^;OG#2K[6[ZYUO7SIUZ8?4O[Q4:2=^" M@$N4W4 #P&0_EOJ<6,_YH_4U#LV,3SF+-GU2%_:Q)?\`G(+_`)RI4J7_`#Z_ M,1N2CKK,W&IZGX?T,#_D<8_S!^IE+LJ$A]<_^5DOUM1?\Y&?\Y/Q/*;C M\^_S$85^!!K,O0$"I.X^(["GZ\F?:& _R&+_`$@_4T_R1W3G_P`K)_\`%(Z/ M_G)S_G)J`1K/^>OG_B6 =CJ3-L1RZE=AVR0[;@=_"Q_Z0(EV:1_'/_3R_6T_ M_.5/_.3*J6?\[O/B+THNI'E7I_*?OP_RYB/^1Q_Z4,?Y/D/\I,_Y\OUJ0_YR MN_YR<2M?SM\]N%.P.H^/2I]*N"/;F'_4L?\`I0QEH9?SY_Z>7ZV_^AM?^AWBJ.^3_EK"/\EC_P!(/U,X]GR_GS/^?+]:M'_SE]_S MDJ[AA^<_GKTVI0"_0["H)H823TKD3VWB/+%C_P!(&S^3C_.G_IY?K1$W_.9? M_.2*0UC_`#I\ZM\2JQ%S`=GVY&MN"*=3A';NG'/%#_2#]34=!D/*4_\`3R6K M_P`YD_\`.2R.[-^>?G +Q!5?6MV'P]:$VYK7;+(]LXC_`)''_I(_J8#1GK.? M^GE^M%I_SFC_`,Y*+R;_`)7CYM8H0I4M:;+3J0;4DG)_RSA_U''_`*2/ZDC0 MR_GS_P!-+]:.M_\`G-?_`)R64H#^=WFE/BHZNE@_$4V^)[(UK@/;6#_48?Z0 M?J3^5D/XY_Z:7ZT2O_.<_P#SDY'.RQ_G3Y@*LI:-9+73'\*;G3ST[Y$]JX)? MY*'^E _0R&GD.I;0-)H:"IW6T&&.;1GG#[3^MC>IZD?)L_\`/QS_`)R8 M4$_\K!M2(ZDA\DQ7_GX[_SD3Z;%YGT.\>57OU2YT:V MHHG;U&53"L8-&8]?QS'&;21/JA?Q(^XAS!CU5;3^P?J*3I_S]+_YRBJ VH^6 M&4D`,NCK4BE3_NVFP\I&QH%*CZR5[UHP/TXG5:$[1Q?:?\`BD\&J'^4^P?J?(?YD?G' MY]_.#S?=_F#^8&LKK/F+4(DAEN4@CMHDAC"1QQQ11*H"@(.WOU)S23TF')G\ M3(NQC" MJIC9CN:UI3W)PV8]64ZGY*VK:G))I]S$[6=QW90]/(V\ M>0'[185!4G>@&VY^C891$ AE=M5#"CFA8T).V]#CPTQD&P&:HY\3RZ].@ZC& MV II78A@6/.IXMUVH-C\^V(OHV&@TVR%E;=J`JIW'?I^&))0"5[FX` MZ]#3(;ME$+5(`7D-MV(';MTQ`+4;/5S'D:*3U)![CM^NN6<1'-(@%PX\@-R" M-B>@)W)I@L,^`!81_E5 4T/CL=C[' 22O%2TDL %W#,&VZBHZ4]L0&) =6E" M>IY4I[^V-*(TL+$FH) J`!VIM^)ZY*PR%KZ[_9/#GUKM7Q_CC93Q%__7]EEN M0KPY+U44H:]SOF7LX-J3G8_"5+#8GJ3WZ>V$;+Q20P/1=J*>QWI0TK_#"9TB MDE\P:+:^8]#UC0KQ:VNKVSV\L;&E0VU:U'ZZ]\'$6,L8D^<[/R;<>0/*(T"U M$]W;ZIWROPCWI!!Z*#_E3FU=ML'AED9(8_EUK0!87 M#:T)5)Y.0.WQ= >X8DUZ[9$Y#U3P16'0O- M<:T]9VWJ1O2I[U!&V0,R60@%`Z5YLC*$7DBT[ _U)( QO(@PCWVU]3\VI7][ M(:+4OM6E?'P[Y(2DB.-3DMO,\RCZROKL`-F /$>W? M^2NF,Z8_%Y6\J*@:7RW8R3GQ9F-:MMTJ:D^^#@!YJ/)6'EORF3S'EVS M5:].!!Z4^C"(B/\`:6=D=5P\O>6%/$:!:"CEB A.QW !_P`]L/#'JP,BN.A> M71Q+:#9[$%AP)-=Z=2-L3&)_!2+7_H/RYPH-#LTWZA*4-:GO].",8K(2<-(T M.C<-$M%0[\0E=_G7?VR=1[OM1#B"X:7H@"_[AK0,W4F.M/'O[Y QBS.0K1I> MBCXFTBV(4TH5J-^FWN()??^7_+>IK; M17^@VUS;P.66*A!'($'B0=JXRCCES"@R[T$?(_D/E0^5X*J=@6:M.]=Z[Y4= M+A/1EQ3#8\B^0C\7^%;:AK10SK04WVKT\/;('1X>Y,0_(08,/+-L>8`=.3A:#I05^_#^7P]S#Q9!Q\C M>0Q5AY7M@0: `M44\-^XJ/EA\"!Z-IR2K9L>1O(C5+>5[1N3D#D6W% 1WZBE M,A^3P7R1')D/4_-5_P`$^1!4+Y8MQ4;K5B*4/:M.^2.FQ]R"3WET?DWR.8R7 M\LVK;C?>H6E?&@ID#HL7\U,/D MZ%M?)_DU>(30( @:H4%@/;ODORD.YG^8EWHI?+OEE ..BPCQ"EMA[[X3I<8Y M!BVDZ%45M.A^) MO48?(D5VWR?@P/(*,DE!]!T'(!-=J]1URJ6F@3R293"I M_A/R6Q!.DP$*=U->I[4KV\,D=) ?PHCGF.J\^4_)#,&;2;= @X+$`Q&_<;T) M.1EI(= V^/(+07_*I_*,E"]S=6G4*ESM>0*HE2" "U*]*;'(RT^3I(L@(!4;_G':Y9PHUB1BQ#%?26@X@>_8 M;Y6--F_GEL]'0(?_`*%WO0\C?I:8K)3X1"H->-*]:==4<`_I5B"U59H13X00#L?IRP1R][.H4IG_G'O64*\-3> M-%&Z>@".G4?%W\,$XR_A8QH=50?\X_ZRH/\`N3XU%1(8`:,0!6G+MOMAC"5; ML^*/>M7_`)Q\ULU":BC(BD%#"./Q#PY>&^5G%./(L"8GJ4-_T+]KGP@ZHA%# M^]] `U)V85;?8Y4,64EB(#S*W_H7_P`P! R7JQE*$UM_L@; #XMZ9>(Y`V<$ M.\J8_(/7BS#Z\H"MR$@B[G>JDMXG(2AD+"@.J'_Y47YEHW*\1D9C7]S\1VV% M0W&>:E_RHKS"D]NUS>Q)$LE7+0[BC UIR/84K@QPRB2)0AWL;\[_ M`)2^:+[7F?3=)75;"/X;68R*I1:#X22=]^A^C)91ED>0^;*$8=[#6_)GSF%( M_P`*Q@JU2HG6E016N^1K(#O%D8>:T_DOYW0,?\***CB0)5/05Z5]\E*,529%N$+'?D6H6H>/AE,99`=PCPHRY%YM?QS6^^;#&06O)$1ZH!F)" DJM0P`WIWW'SR4B0UF/4-M<+R9B0# MS%6Z@!E#$^V^1X9%*D\I4\=]JDJ?Y.A%/GOE@$FN4!U70;7GZK15`;9E\/ >'?8Y*,BUF()6 MU+<0!3G0^P+4ZCYC)64T`%Q8*3MS`)(]B>OZL '>Q%]S1%0&4$BM3\SN*??D MMF-[[KBV]"/#X5V-6']F1/"S^"F3O6H`0[GW]L 6_-JO,J#T%2W;?N3A#/AO MHN44VY%5'Q,?GTR)#$QINK5J" Q)J0-Z;;X[+OW-5%$+&K=#X_=DB*Y%(]RT M; -S(%=B-BM#L_3(C=D(D=6J M_!3O7:/WK6N39;O_T/9F[#O_`*OMF?5.#96NO(4._O[>&5$7R3=H9K<$D@D$ M]:5Z=QMAH@)%+_JXX@G...& !37>Q[7M)&HP-"C;.*T\??KODN+:BUD)!H M?ED:8"*J!NU*=Z=3OVRH0HL^C,XV:-%#*QY#<@`GYY9PD(%-/))LH>O'=GV) M-.QIMUP\:T%PN7 `Y\0/BJOO\_?&EX2.JXW#BA!.XW#;=?PW]L>75CNO^M2L MH!%2O0DU%/'(\3(*BWCU8*U*`4WZ_,8=U)<;P"NU"3\-`>F2]04$JBWPXL:- M6G:O*O\`$XT%7_60Q!8`$&H--SMD#LMK_70[FC(]ZTLA'\1^.V&@46TT5OR+21\N7>@Z_3]^/!3+B4_0M6*KZ:FA-3N/ MOI@X...*^FO7=N73Z/X]L3 HX@QZ^\N:=<#XU4> 6I)^8)R!#'9)3 MY.TJ@/'B]"TBT(!;K2@-,AX:01%H>1]-IQ4<379:=_;Q.#P"GC"47ODVW0$( M*LZ,P8C?A3>N_P"&2\(A3/S81>>3+M9"4YI4_""-M\,12W?5"+Y,OAOR84J1 M3WZU%1XY"8ODB,5A\G7OQE*[BN]*_3D1C+,;-_X1OP%).W4GL*= M^NV/#3(R\U$^4-12@Y GL /M=^E??#PEA9/5K_"6I _S`]30#E\Q7ID"R'O4 M#Y5U( [%7;8<0 !3:M:G(CB9;'JL?RQJ=":&E=^O+Q._2AKDS(DL>QW/0'CV/T5I7!'W+7<5G^'M1'(/%1@:-3>GAU\,,@3T2+ZJ+Z)J(!_TO%XTAD53X+X;4_I ME@LL!(*;0W'PJ8V0UHC]37[5/QR/"V6:YKEAE+H?82)R6@+J=JCN#^'3,8Z^&XJ->WT=,?2RBN<24(JH#-4\N@`'1O; M(F0*#%1+,*!@YY_8J#T!))K\L%R"/##@Y#.*["E!W)/>OTY,308;;+2W+B:5 M&[$@T%5['[LE8/1C")[US,Q1E<$4`"TZG;H!V(WID#?A MVW('^>^1J2*7M.A/RPFU-AH=2&9MB:"O2O;*[,2Q-EOD-Z$GENNXZ[FN6FSR*!L MXMR4!G*\2"NYJ:>(R!XFP0:#TV6H^,J5]Z='CMD1()HAPGE;J>2T ' M45]Q[9,`M?"2O,\AZD\E^%2"=J^_?I]&2NN38 7?6)3Q^,K("2#T(RLWWID& MQ>W # .W&OP4[MUW^=*8\?I.PZ]!M[81D 7P_-QU*X# M(?4*BOPUV!V[^^^'QBM +TU:XYD*]0!0U&ZGQ^>^V6C(&%A>NLWAJ?5D^,BO M([[=_IKD99"V`*IUZ\#*'E;PI7;_`#ZTR$UF"]O,%V"RAVY;[5H3TJ3^O M'Q8Q1PKSYDN5'/U324@L*D#Z#3OED9VBSWMGS1=JH$G$M\Z@UVZ[;Y(F(00> MBM_B2ZV\*D']6^,9A A-;_B>:@!K4'N:TKN/HR)G$,C @+_\2R %=RQ/P@L% M!)^5=O#VR(RCHL(%H>9^020G@I6H8&@7;IVZ=,GQ4RX3T5/\4-L7=B*BHY$U M)VJ?HI3!X@08^;9\T"LA5FX"M #N*;<17)@GJQD0O_Q,K<>M,IGQ=[:$I?4[)]S >3[U4T!-/#KOC"/>CB*#? M4=.XK6('E]M:FE%[4(//(DGB?E0=/'&48A%DL7\S M72S:-?I%SC:1`O(,?A##X@#[C:N8\I$#9LB*?GUYR+)KUP(5/!AP&YWXD$_/ M8[>]0VRF6)&;DS"-JARS"*M#\'4GPH>N9(:)6JI-QWZ@JM7IUY#N/$' M`$ 2\ULI \1VKD:9[AH'=1 MTJ03[@[4_&N2!I-M?:-?>A3L:?/#QL*M<2N]=B>H]S_MY%' >]3/*E>YV4 M#W\<6=%?05.X`4?#6N*"*65/&E-Z>]>O^8P[+9?_T?95*G[1H&J5K1MO#VS+ MXBX-%QIT`.QKTICPDJ5H;8EN@;D?IPU2A>=SU/$5''Q/C]&,4H.IK$QX$E6`J*4WKQ\,?BFD2(%(!-=SOQVV]QB386E-K9*$!* M5(X['(1@D M+; GX@#4!:=O$'$V$\1:-N*;[O MO3&B6NK6`2FI9.@HI-=R<2S&S:\ME84%>_6@_AUR)6K;!(.YJ2:_=UV[Y$RI M(%-,QJ:U"@U6E=CV-,,9%'#2TLJ&O)@Q(XGK7IO0Y*RR![E59#X$\:\@Q[UZ M^. L3?>UZKC9G#,.J ?PZX@)V'-1/Q;5/'?DQ.Q/8996S"[7+Q(4$D@#D2W; MV\G\,:+(T'47E1J]"=R*DCO@ MW8\0[FO2C8#D@\=QM\\!"\N2TPI6I52#L =OOQ,5N+C;14),*5.Q!VIXD?3C MOWVS!M1]"+D!Z>PVITKX??DA&^;"4EQM[=V :,-R`+^W4?PQE `,.*1<;6U^ M(<**/M#J3TH??WROA#8#WE8;6U(JHZ= ": ]B5]LE2!.^37U*U=F4QM4&AC- M.0*BI%1M]V!D25HT^T(KP VW7?;:N_TX: Y,>,EHZ99,""C$U-2ON*D_?D1% M-E -H5J>3*HJ30,?8=\3% OHA3Y>@DV"`[UXCY=A@X0RB3U"';RU;57]T#M\ M+#K7\*8\+:3MR7'RI;O]F+%E9##0?M;>!&U,B8-@R M$J,GDV%BQ]$`,Q8[5K7M@.(KQH<^28OBY0;+LP[,.M:>^1&)-J3>28VH6CHP M/;:GO6N2E!1*E!O)$1&\8(!W(K0G[\'A^2>,=4+)Y(7X@(A7]@`DU/:N1X2R M$XH9_)0ZA2JUY5!(`/6O48)8RH([U#_!11*E2U:5KA6Y<2!7XJUWJ.^YV!QX#T097S0;>7+@!N2-3>A! MKV'6A'X8T4"D%)H%XM4X'TZ560=R*GCUK@LAL(!"TZ/>T8HE6ZH#X5-*^(WR MH18B2D=*OJ$!"I^T`>HY=SA,Y#FF.ZC^C;[BO*WKO4H-J$]OOR/-E3?Z/O3T MB(-:;_B3X>V3$6)F5'ZG=@K6(UK14;K7^:OM@N37?#S*T6]Q0#ZO)0GXAL*$ M_2"=R=\GTW9 =Q6FTF(`:$[='%:[$5ZGN,C%:4_0F<']VU!1J4XD5[A<(9!Q#(Q5F"N"#T;;?\`SZ8?241/\K4_C7)Q@ DS/I! MW%33?<9$@%EOW. <`54L0*@`UW^G;OD98P6%]X:%2"* ?Y--J@;DUWZG#"?" MSX0L(+$*:J:%>0["E:UZ9+Q5$ 5LIV.QJQ J#VZ;D?/(^(Q,:Y+-O@# @KR: MH&_$"A^0WR)*19YM4&_%N04!6H=^@._R'3)XXVQX2[L%(]4]Q44V_P`]L)VY MLP+YJ)):IH?CY-1:-N.@VR%AB8TZH-*L65Q7B#3H>73#9/+9C:WU#\3$T+#8 M?+&@V!2)J.7)B'J0`3R'6M]0=C15Y$DU M_>=2>QZ>YR `O=F1W+&8M4$ED !J1L*?+OC)$8D)5>@SP7$+J KJ?A7[+?#\ M/R%>F5SLQV9">[XQ\S^7+L:C*P>;9DE$]&" M7.E/$2OIO&M26I]I2PZGV(&^9 R2MC6VVR5M:R1LW, \?MTJ*GMO\O\`.N6" M5M9/=2$043C1D9@"G+Z M`O Y5%"*`T^GN<>$(6BK?;J=]B3U[[' `0RX5C4^VW60T*=?G_7"5X?)44_% M4@UKT^FO7*RRXCT:(-=M^AI7KWQ11+3=ZD[]_?%2*ZM-\1/7D#T\=L+&@U2O M)@WQD;?TP[J-N2T$$JVX_7OT(R5!0J _W:4K2FY]SX=NN#]OO7B: TI7_*K7Y5P+8?_TO9(K6M"I_ES-JG"<_;8_%UQ!\V- M!HBNY%/!F5TR0T]?B)#!`:L:DT--NFYWR8CYK:X) MU%.YWW&U">_OD"/--6B!S)^($TV ^=#U^>';O1PE)K M6N$ILKB P)IL?VO?(UF1)"/4%*0CF5XB@JK,-MZ=#]^ M(%I&[BU!Q)-:'CL33?+ `SY.!:H!<'>HV(_5AX6 5#U/%*J=Q3K[U'RR)DV< M(6)0`T(J"/D%VI3(DVP,7;D`G]JGVJBOA4^&3!ZJ(GW-OP]1MC2+#0)+*`"*DFI]MZC(VF_.E3D0%I4 ]:$_?^.(W8$#O M4VD)Y?#56-/GTZTZ4R8B6)("L)G6B&M.C'?\3B(+LI^M4[FE:L -]O;YY+BK MHD&EZ2T%.(^(FKG<;^WM2F 2'4,J\UXN&)8HS*5'*E/HH,D2%5O50KPW/+X3 M78[CH:.(EKT+8_P"ZZ']DL0`2 M!_#($,Q2U[."2@(ZD;=30CM7;&-=5M2%C:L/L0J?A6IKL#L??[L(9&00K>6T8@F)7 M([ [&N/PIC==;0I\MQ$$>B0IKNI[CIOTP&'>DR*D?+"C[,=213BIJ=]O$95* M-FW3V&0X"@2!4&\L1DFJ&IJ" M*4^>'P^+FCJAO\+1]31B*;4W!]\EP $O$ M5@\KH>+>FI+;E2*4%.P)&2&-(R(0^5D)0>E6O0$;@$[UZC!X:(RBHGRH&WX` MU%'[UVKON-J9+A4R/0J#^5.1J8]B:@,-NE#W_P`S@X%.0]4-_A8?%^Y'&O(# MM[D?1CX:`;4'\K'[/I-U)5CWK_9D(XX]Z92*&?RQS6I@-&^QUZ?+Z<'"2D3/ M50E\M@_:B(%/A!]^M0*X#$A2;4/\-H"?W;!J`&I[C^ _#!2\E#_#Q*?$IH-B MM-CN>IPG$5XQWJ+^7XZ$*K!4^(BA^1'X_?E9B4B0/(J3^7E!H>2@$$A05)-. MI/@!DHXR$;*4GEWD2C;BH8@]_ _=E@$DDH=M`D(/(DT.Q\!_GOD9<2PI!OHD MOQ<3[%?"O[7CD*DV$A!OI5Q4@*?C6H\:CMN>WOCN%$HE`R:7I%#WKD>&UC*GDVO\`D*VD#2V;<&()])AW M)\:FE.F)Q&/)EQV=WEFL>4FMA1DX_$H9Z;-OL*?/OX96#*VI+6KGBH'3E4=ODN2WZ*0` MV:^^$E>%=0M0C]OWIN, -,2M)(6NX-:4\:"IR M5%0'5+4!4CZ?'$^]0 U3H6.W+D.X\/X8.)*^H)8EM_VO8'O]&$FD@DJ3@U;K MUH/PP VF@%U16O+X.E?;_;[8=D<1?__3]E@=^(/A4[_?X9ECR<&^YU0*@BM. M]:82/-(],'%7(I(\G"A8TZ^.^&K8K2033>O?Z,-5SW8@KC3@N_ M7K^S_M9&PS$BM )&U&H?AW[_`#Q.W527P):@H!UJ M?#"*8\)6XKEE1*;/1<%+'B36H^&E:[]2@51RQIL6J3ONP/$U';$A#31AJ# M?/SQH!'$A_P!CXHZ,Q+,%-:MUJ/?;(D;J M03T5&+,C=Z =NA/X[9(`L:*P`;D`T! *TW)\?ZX;I"^G)N3;LPH!\5-_G\\! M*+:(#+0@%H]TY="?]B">FV131*_:KU>A`^FNV$2[D\)6%J]*M05XTV-/ M?# 6BUJA>3+0D ;$[\CUZ^U:8E0`6B?B:I-!U\#_`&C$TF@TI4[T8UIMT_'V MP;I%+V/)2QH:_:%=MC4&GW800A2!4&@[;F.G4$U)^_";ZKP]RHU=Z.Q:H-?E MT `VIVR(ILJE('H*FI!*CZOM]YP MDEF+;#'CQ7>38*C>_P#7?&E)"KU84- 33I[=`/PR-L0L5MP0:\]^0V!)[>^- M!%>;N;$\A4F$6FUQ=@H*=%J>._P`7S&))[F+@Y5@`>0);XUVK_G7( MB1')F*:,OQ!JLI!)`'3?N>V3$243+?KD['=P0=J[5[Y+8)!(#FN*\>1/%3Q[ M]>HV_CE9%(IOU-@1XT)KX?+)`]Z>)PF8$T9BH^D'PPW%:7BY$MFY/[7Q`]C@-!/"TLX' M$,OB0.NP[' 9=P6JY+Q*"K?#4+V!%#[XVR M5YIVJH8;J/XG'XI$9!=ZH4D` M;]/&H\,?3WL3,K^<1#&G78CV]S[8+\UXK:0Q,%)3Q"@[@^%/D,+(4T8H34#B M-CO7>A]OOP$VBZY->C&76K5)/2M>U1^&-)$R[ZK -^(-#]GW&WW^&&BS,J4_ MJ=NQV&QZJR[U7;K@W8<8*E]2@()9:?S&E10>^-I/DI&PAI5H_B)J2.A[DT^G M&K8D16/I<)#?`>.YH#MU[^-1UP@+QDH=M*MP2S+7OQ!)I[^V-J(%1;2HJ\N) M(3O45^[HH)[=,!B4@^2@^FBI"L!Q^T#\O\`.F0.,LN.D*=+)W(VZNO;EMU[ MX* 6)M8^E"I>B\0?B!VIXD_+)BRCAI0.D!MV044T(/AOM])WPE0:ZM?H=2 2 M@YCJU*G(@,^/90?1E)(X,H M-M"4[D5YFNWRICPWS96E\N@`AAP(W6H7>E=]_P"&2\.+$R2.[T!41R2#0GKM M3L/IWP<-(!OHQ*_THHK$44*:%B.I/3?YGK@-E.W0(&VX%#4T' M\YY'^8FC7@FMK>QTR:2!.33RJ"06%-S\\CXH#;PWR>4-IUXI6MG* MU2=N![?('QR7B#O:C$K%LKIVD_T>0LC!&7BWW=!WQ.0=Z:+FMKDOQ,$A?L"I MW[T^_$3!ZLN!>-/ORP`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`)%-QDMPDV0M%MQ 0@'QW\?Z9 FT MQ!&ZBT+5%2 /V@=]^X-.F&@GBM8(22*D@U(*[GZ*9%-'O:,1)I\2\6^,&NVW M<_TR5@\T$\*PAB:.GQ>/OWP;(M:5(-2#7]KOM[X>)>?)8>1XU6O4L?HVV[X- MEY-*X--B#NV_45!QHGK;9:]F.Q_F-".@]CD3LP,BI*10E@.0(^SUK05_#) L M-U1:4/0D]2.U>GX9`DL^&*V@4E58+0FE`*[CODXR/NV Q(2)4X M@D!37<;[]>FYP72">JWD*FM26^*@\.G09,$%C9:)J?M<@#4$=#@-,?>T0.@/ MV=BIKO[#M7YX*#(4%/EU+5%!LIWZ]MLE03NV&Y?"2>-=V[L/E@V"\G,2O,FH M(Z@=3]'B,BQKS=44^+IUY#:GS'CDKIENY26(I4@'DQI7;I0_?A5M9**AV "[ MJNPH1X>V`@]$[A=RI0'IUI7H".^,01T1S;4[!>7QL*]:@TQXR.BB*H.73+AOD5_JE H0@KT)/4?1D2%-!WJUJ=Q4 M4H.WO3WP@=[7PD\E_J,!N:A=R.Y PV&?"Y9S3D1Q!%:]*#N*]L2.Y0`J-< 5 M9FH-C\O?(C9)`Z-F0*1N2!N:=AX_CE@)+!=ZY^3$BF_[7V:4]^N1XBRH+EF+ M_C3YX6!\RM8(3R MK]K8J-@:=21WZ U(W]\3+N;+!#0"@L"&)857ENR[]3[TR)+ M&E1J5)(`-:4`Z #OD1;:HD?#6@KM3Y988L;I2]/D`]/'E7;<>W7ZYD%![9&%*55J;^.U!D:"?$I*[NRCX%J;&M5I4^./"&%DL% MU2P6CG@23U4=N_7Z8ZK9QHU>)%2>)K\/'O\`+?OF-Q4S$0\PUBS( M#*%)D)%"-NIW-,KD0>C9PL'F@9':H/&HH *[$]_G@B)=R#LE[HX,K"M5Z#I[Y M* OJID(^2"^J0'DJ1(Q<%G4**;]-NV7?EXC=K&24NH44LK.%RZVT0^(.S,@H M".Y^G*SC`Z-ID>]1.GV2L6-O&LB?%L@Y%J5)'MODN",NB1*4NJHMI;T56M5J M:$H56I/<_16F^1&.)V092'-L6\*,TBQJSJ0:<-P0!3B.FX\,M& #=HCD)-.$ M**W'@*L?@(^RIZBH/0&E,CQQ#=PR')>L:4"*H(KZ@VIWJWT'MA\0=%C?5:8J M**$T1ZK0T.]2:>%!D3DET8G'$KJD5)6HW8_J'TT.1$24B BOV!#$\2Q ?GT^ M'>K83&0Z,Y8^YI6)"&2JJK$J/U-L@ M,029A5CE>DA=CS=J,5[BFU0?:F#A`Y!G"0*IZG[SC0UY4K4\:T_S^G#TY)ZO M_]7V4.P.].M=B2,S"X*Y22!MNHH0#@$$"PI,.U#OV!_SKDJKJD+Q0@'<%ARX MCM7VR#+9KD:'GOV^[`2O"%]#4445;8UH?PP'==PT'Y.Q)^0I0>'\,8!C17K7HW0;^ M'R(.$@LC8C(P)#?%]'MA,24$VI=230]=_#?84'TY#ES6 MEQY;'B!0U^+?Z:#OA3NN+5X@@$-U!KTP;H)*T,I^(T)'VNM!QW.WSR6Z'$@% ME) X[&NV^()!19:J2Y&[`+4@=OGAF"MM4Z'EN!]-#XC!QD,B0YAOL6!K2JT! MW_LQW*.&W#EU)J*=@:U[?AA-EE0#B>1--R,CN$%H'X2#5J]584/WY+C1PD=5 MBL:;T-:A!3HO^K[9( %=U_(BI<4Z"O2OSP&/FBSU*F ?B;@:^"]:?/(\5+PW MU7$\B0`2`/ CKTK3PR?&GPRYCUY \BV_&G?Y94>:J=&)H I%?M'VP[,^BTJ& MJ%^T2:$FM2/;"P*[TZ4HS 4I0DC;QI@XRDWU4#'SDKOR/Q#C4$J2/'&BM!;Z M=2%8UK0%>X/<[;Y+A1Q%2:#?OUK3?^/7?([)M3]&@9B#[ #J/EUZ82.'DQLJ M;P-ORZK\/%>M*?Y]<-ADL]!@2:$D_:)%#4 =>^2$1T86T8GV!H "" /P.0H, M[43&Q>JJ`?VJ]#X=-SDK(YL;/>J ,!1QWW6M:??OE9%E00M-44ES\ K4[]3T MR5!LL]'5KU0E?$BE".AWR+&R5)0NYXGEUZ=_';)>I)%M&I[E:&K;_P">WCAH M,3$N#J>1"E5%:^_>OWC(DH-A86)!VH& Y>-?\SDN'JL0&R11CN>2\BGRV_AD M2D[.9JC<\1)0+XC;?\,C18VU7D5XD'OT#I7$!((4ZEJ-5F0&I]@-OX8 M266_1>1RV;[2TJ -S2E"?8$G[\!D.YCNJ@[$5'3M4?CV^6($CTID10<6/$E@ M?A.XWP\(#"+JE_M5?H0%K0`_Q&#B*:WV7$*.*D U-!\SWKD>:)7:TN"&/VDD M-"X\#2E3AX6R,C2H6))Y'XCL?U?PP T@D%:"QJ/A-*T!KT]\##<VXJ=OD,'I84>]QE/P_$0.77) TR-M"4@D$_%0 M'[NV) 12\R[T^T>I0'QR))');[G%S3K6I/+(U?---&4;4&U13J>OMEFP2+"G MZRML"6XU:F]#N=L/""@D]5)Y1M5J@[U ^_\`5D3%0H&:I-:<17KOU[T.,0DJ M)DJ:'J"#6FYVZTR)`2#2SF"34]JFIW_S.$6&=!W,`5._A0]*]<%E!IQD7CQ) M/'I3<_JP\2 %)9J%>1KM\)'2A[8;9;MM*#6HKR(VV[>_RPL#NIL_A4_%TZ== MNGTX#N@A#S!66K %MR"!E9 9Q'FQN]A#D@MOR)6@/V:=Z>^ Q/1G?FP74-,+ MEB14$@E2*C;IE,L9+ %YMJNA,'1B&;B6)'CU('RWI3*I1,>3>(DCF\\N]+>- M29OL\>$C#?8#<'WKTR U!Y4F. ]['[O3RI'J%BJ!20`3N/$]SD:/<@V.J126 MC("PV0>H!05H>H/XY;!C'="NCJIHQ+H5)!ZD'9@/F.OMB95R4Q)\T&%IS-"G M)N)7PI05^6$2F6,<(\EY0F1E`H :JOL.@]Z;G(&)4P,>JA2LI:E>1 ;MT_5D M2VX[`:=27_=D_"!4$=#M0D_/+03W6URF+YT[BS<2`:DD$G8_/^&1-GHSQ@+- MU^+9@*E6/=CMN? 9&6.5,I2[FV!="H/$(U%9MC2@Y5)Z;UWR$8US"!9ZK"H+ M(-U45YCJ6(^SQ/8=LM@;NA2RC31'- (R"K#G'0$4:NX8'?Y8F)0+5"!4`U<+ ML[$?9:I.WAMMD3Q]&0L-D$A=J%Q5P14+7;\,1'R4S6I&69 H(Y#[+'KRW#?Q MIEG#*(W#2(D\ER@E*U %.A%#0=J#WKE8F6T`AOC-PZ=JD[TI_-ALIM__UO95 M`:\3UWJ3O2@W^^N98LN'Q#H[B&H!3XMAOU/OAC$ABL-"ZDU&Q('L/\]L%E0O M5EY4WV'+V%=M_?'@*B5-$T!/*@.^_P"O'A9<1:.W4TI\7$[;#K7)5%BV`>.] M=]ARZ_3XXF=VV)\EIO9N)#?$#TV /TY ; M((I8:[TV`IQ&]:]]O#)$6EU.1*D@GO\`9D3:!3B:$&G($5)^>V^$"V7#2QFH^Y &V^P`[#[Z9+DM>398 M@TKUJ:<:_JQNT&-.JQH34[[GM^.2$0MTL4@?#R-:]-R?[.F"J9"=N'4`= >E M2/?(L6BW2K,.1(J!T(%3]&3C:B3EW.SU`H*@]^^^`D(MSMQ4!:>Q-2/GD$W3 M?)N)V.V^Q!)/^?CDN!#>[ *6;L&;]KQ[;8*+9N%JAB*MN23N.^_M[4P&D$%J M3CN*BFP'4?%VV[X@%B25.E2 HXD=%'2M*?,==02 0>U>H.YVR)-M6Z\$"AXE6)-?ZX&S?O4W!)4D<^/05(^G;"CBMJ M@ +'[1ZD5W'?\*XV4\--.*BBGKNVY'RWQB>]AQ+>!):M"I'0]-OUX;'1EPET MD1(8``=^/CV%?OP@^;"T*L?6E=^@K\R/Q.3.Z:*J\'&G): [^)IM3;[\A$IA M$M>BHW:IJ3\(/M^.1LL^%2:$!2""V^XJ3X?/" &!X@H&(*.(%1^R03RVR=D= M&?Q:,0H"Z\E[+@H]R"5-H:L#W^78=*X[AC5K/3Y CD:TZ@[_`$#((Y+1%0'8 M\0.-?EW]L-%)FL]#H":C^;P'RQN3&RV4DJ#QJ1LW@?$[=_"F#DN[C&ZA:[*3 M\7+K]-,(F#LSX+6E2"I9!7]H*?M>_P!V&V"B_.A)Y$5%*';KVITPW;.*\EU: MG@:@4[G:H_I@H,S1"J.*D\F7EL=SVIM\^F1/I:QY-C?D*G9J]=]Q7\<;*>(A MLD\23VZC[OU8_%CS<30DG[6]-^WR[X[)!IKY]SL-^GTXTMMTV-3WJ/;QQ!D. M3,&U-@2?CH >K5WI6A'TFF-A@6_4XU84^'J&WWKQV]ZFF3 [V(MRGDQI7C6O M/W]_#(<">$M @<16B=2*]"W?VQW"+; 4<-PFQJQ/?V\:X02R!"VA)#$()+&G6OOAW0)=RER-2>18GJ!U_SI@W9@]ZP$J/B).YY ]![X"2 MGA!Y*;=?B!/3C7PIL;72FO3<%B/^"^=,B:; >Y86+&A .QK3;&*\5K@H M;CL0`"2:?J&1IA1:+#>C4W_:- ?F,#,%1%1Q8D$MT'84\/'#99MH7/'D"HW' M`]1UWR/">J*426+%2QZTIX^&22T07! J"-OPWP@L9!!S0LP*GX?BWWKL17KU MP-<94E$UB&KR.U!7K2MS!#';S2.0!93\(XBO9CU(_5D?=NVQ/'([L>*N:4O MY=G7B0C,X(Y@;5W!I@'''JCB!0A\OS$\?3,@W82 4J/8=^N6C(3M::!0QT&Y M/+]RU.O#J03^S7IL`*>V,HR'TA/&L;0[E5Y+!(6C4?NR=VVJ`>W?? =QNQ^# M;Z%.&X\695/-6!VI7_,Y&,.X,^-8-!NASY(>=3Q!WV/:GMAEXG0L1)LZ!< , MJJVQ# G>I_ER,93CS0;6?H.Z5Q)Z90FAHU:>XICQFT":P:)=H36)G4,M%Z5] MM_F,,H@J)^38T.\=2Q4^GU0UJ"*4J/>IR48\+,Y#[FUT*Z >H<2$K#A!:;0[TT`C=>)^$[5^(`$'Y 5&()[V8!')IM"NF!;AZ:Q"BHW2@W M)_';'A$D[J_Z'O.87?D8RO/]KB*?[62\DT__U_9#4"DL20:44#N#^&99#A6V MQ5B22.2GJ30;Y( *25A-36G%ANRDUI[Y+9 )7TVY`$[C8;5KMO\`?ALK8=LX M!!Y5[UV)'<9'?JA9RY5 -#TW'CM@H,FVH%HU3O0GI0CQQ$&/);7[/*M*_:&Y MZ=[#KQ%0*^.#A M4GS=6E I`+'=2=NE<:*%A ("4Z?M5WZ5^*F]<0"OO:>AVW(Y#X22!T_'Z<-> M3&UP)K4D@>]*TZ\J#$Q 2)'WK5(HA*_%057H0-Z?KP<*"[D-A4GCL!_3$P+( M4V7--U+ CK7[/3KAX5V6@LH'+?MMOM7KVR/$C9W3B Q)/7YCIW/OAJV%.^*H MY$=3M3MVPV"()ZH:^*O.@K4 M]-S3#P%>(KE-2#M2@)[^)J?NP6?,+7:K<:BH-7'04.YV\<-!K-]5PH.M M*_"!W'N,>(KPM5Z,10#=A7IXG\(#5J>_+? M8_V8T68E\5%NPIL^[?/WPT5/R5#\0KN#2@\?QQY(HUS6-RY%@*L/A!WK2@J3 M7;!06,>\KA4$`A>]33=@/<;?1AHE;KJXNC?ZPKQV(.^/"0Q._5H#[/$U7]H? MJQ)OHH,FVK0@[4_'VR-%=E(*L*,`"^]=STWZ?KKDZ[E$%I4*&!W()H" M.@J=_F:Y$6Q,2%/B%J@!JE">X(WK7Y')6NZTQ\B!6O$_$J^-/X5PVM-,C5\> M``8G[^OTY75L7>F"2 !0&H:E"3DA75.1V!J] M>E.@H/GA.RV5K1+]ENK;J?<;;8!:\7FI-& &!I2GQ_U/BPH=]C M[=,G$E0MHY++R)4@5IN:FFX/MUP&DVV2"S$$]:>G\MR<`!9;ELO0,">*`UZ^ MU&/$2UTL4*U/B* MJ1[]=]R#VWR-L^&33U**E#4CX0W4$FHKX>.$+NWZ@-0!\((-#W^62L]$`4I\ MJJ"234TIU'W8.$M@DM+"H9NA%0":^/;)40B@7$!1N*-4%@.X(ITP<;&,`L)) M--@5ZD]!W_CA,DF5K:;'8[]13(<:>!:034#^S?O3VP\5HLQ=R))HVXZT]QW M\(K&!JM5&QW-*T&&J9V0WU^*HH>_P"O(V@VI>G0T^UN23O7?]6&T D*:P\J M`4"TJ2=_E48>`E%!#2VH;[05E K6FV_ZL')L``Y("33D*DNH(-2W7I3_`#WR M!CNI%I-/I :-=JER`RTVI3OX80%JN22RZ(CU58^.]0"-Z>(.`PMC$I7/Y<5@ M0J@]3XFO:NXVR!QT%N^:3OY<4FI4"M5J`=Z@>Y[Y5''3:#$*+^6&HU5!``-- MJ$ML:T^C+#MR7B/39!MY69@24K7;B#VRNSW)HK#Y;DX3X2(Q\)JZ_LTKOOWIX8>"^C $]2M_PRX?[&U3P)&_<_A7;#PGN9DN' ME=SQJIJ:DJ!NU-SD#C\E!X^JT^69*;1!F6H#=?M=-OXXBQT4Q\U,^6"U`8?A M/8]1]./!(HN,5Y\MO5:Q=-J]=OETQ\.09C*#LM_PPP)+Q4%>M>@%2":[TPR@ M>K$0IH^6BK59*EC]HC<+2I^=3C& [K7B(6CRS,* J*KLQ*FH'CU'W9/A'W_`(9D_P!]GG_-0?:IUI7\,C39Q%__T/9(VVX[=:^Y\:^(S+D>YP@&BU3\ M5"5I4$$_?B!YJI*0I0#AQ(WH".I.QKU]L)"+5@`H`H:$LK"UR2*BAWJQ)V(.QPB)8\16BC< MB!R5OLJ.I(VI@XBP(5-J5Y%MZ MX#QPB53?: [>WW;81(=ZFE/FI45WY&E!UV\/EE M@!/5C1*H* 4%:D_9'\??*Y#S41/>T2352 37?V'O@,:9BG-5:$T#?M>&1LL& M_A'5:ECN=ZY("3)9R7D3TJ:$$''A*TTQ`J:@+7F=^/:F2LA6FI04.S$<6'4T MWI@XBAL<0O6BJ0?<5W ^_)<2\)6\2#7@BAB?B H0".OWY R1NL<@!?BI0C]W MX#$,[5 2:@4!0T(_KB(L5DA0E@Z]@>-.O]V&[2)-]R:\1XU\=Z?C@HAB!;0%5)849JAUKTQ$B&5]RSX6903 M7?MXGKALI&_-LD4V^( &@Z_?@HJ12UFW`._BM>FU3^(R7A@,=UP?[7Q+53M4 M_M$#^N#B(9;J7V6]U.Y[U'6N-$L;[W+N*-\0?( MZ&N^U.V^$$L0;=7C1N95>F_<]L DR5 0:$FH((8^U=Z8T4-E/ M$D^QR0!+*1'>I*U0&WW/)E!KMX_AA(*@UU;-7'Q5J3M0FN_CCNIDXT;D5%*' M=33?[LCN@T' ] 11NNQP@,.)HCDM7Z,*4WI](R=TR$5H`')B:MUH*5K\LCQ% M;M5KQWV8$?PKA,E!#0-*UCW`H#WZ]_HP4FG!"6)XFAZJ?EUWP$GO3LO M$2_LT .['J1\@,C;$DM[**4#-=QMV\>^&BDR(6<%:N MWS!WK7<&AWP+QE3XR$U8[[FE:[4K0??3) A)F6GVJI+'DU2.I K7KT^60("+ M)4G+`D !J;U]R:[]CA&R1$MGQ85 ;[(V%>F)'F@+*@D*1Q) -:]-J?K_`%Y9 MO7-;/4-35^DGQ]NN.[($=[2?"PKT/ M5C7X??[Z#&D&2J:T^):&GQ ?CUQ/%3(26&C4WK4_"/U9"-HN)6-$C5)(96(< M[D;#MMA000N*!2%ILI/>NU-O;$ *AP%%.QV'A7B*UIX9.EWZ*HW_`&15M@@W M`)K^&^01Q%3*$,QX[; +T^9P)7H@4<: #L![_JQW2(^:SB%J*CD30?0*].^2 M4R*P()-Z'B:%=J$_YUQ1:@T'.-2*!B 0!_'!<@R)*'-J&8T%*G8]-MJ;8L5& M2P1N1)%0=^P/;Z>N.Z>$'FA#IBD\>(&]26!IMTIN.M,D"#U4[*3Z62*T^$5+ M5K\Q3?YY&K0,B&.DLW-QL"*H*;^'?YX.`=[/FO\`T3R#!@#7=P2>VW?"`Q,J M6_HFM/5 /$UX4VKX]<%,:M:=)9B>1'\U.U2/G@,>YD)5S6_HECOT-#0=A[8. M%?BI'2FI0@,"#5:T`.(A2:/O6-I3%JBI#D$5W&PI^.2W[U,CW*@T@TH45A4% M@-J8V6-M_HMU^):5*CXAL:_[7;!P][+B6_HHC]@$]?HQ(H+$VL.F$CDRU\2> MP'ZLC"+92S]%/7C5:G:M/VA[>'>F3HVQV?_1]CA?IZYEDCHX.Y:\! MLIZ5.PIV-.^(!8_2I@%G`) ()Y$5&_;KDN)GPCFJ\CRJPW;8<5IVKMD3%2 Z MA-0OQ;U4#P/], ]](6U 7J!U![;^^2XO-?@TQ!6K-3XAL-C4>'TX12;I:E Q M&YHW[0VWJ?UXDA&ZIL!5G#4J68=/?\:Y&R4D#HTRU#T`;NQ.XIWR-;L1%S,W M2M*_:%*_1EO),HE;4 5/4?: /$4P2*!%L\N*T +<@:-L,KNF5TM*FAK5O'?W MP*!?52*,10#?H P&]>A--ZCOD@4R-*A>A56Z$;UV-< %H!\EJA>H`!J=Q2N$ MQ(38Z+S0TJ*_Y^&17AM;WHPJ?D=AVV&2O93:T\N3,7Y*O4D[=!3;VQC75C4B M[XB6Y?$#OUV Q)'1F(=ZWE0E=R2=E/<#QQ@`6)VY-DCB>5#[+N?H'ADR`QN2 MQV+-04(ZD'<4\?HR%!.S9YTZ\A3[(H!3Y8+'53:WER.Y78T`W'W=C]&2H'DB MN]<2>6ZU93^K;? 8D,N?)KD&K2NVYVH,D-NK`@M,X(!:JC:D@Z >.2XNY1:Y MB>(J.IKQ';PW]QE9B2R(;Y `$@J2:4.U2=NF$1(5:W4B2HKT(%0"-M_HQ![R MM+3MT9EKN%[_`"^0KDC$'DI+09?A9Z5Z5"[ 9645:H VX)/Q"IW(%0.X[8[] M$\E A*@FK$[!5K2ON3C91952* BH[$4[GY9($+NI/7]JE*&M/$X>.^3$`KB: M.QI6@J:;'QZ],APE)"R1B37<@; =.N^]=^_7#1"1%='OU-*>/3Z/GD;*"&S5 MF[ _LUV/SPVSC!9\1(+B!V*O\5:+4`4V-1[4P))%-@;U!(VY! M0=B!UV/CDF!"V2@8'93QXD'WW_"N"EX0L6K%5ZTJ*5[4(VPD$)WZ+"WW?9'O M05RR(--6[BQWHGQ*1N![5%?>F0&_-L MH$C9EK4@AF-*8T$\/DJ$,-QL*[$[ M'?V\,E811:K\06F]?OR.Z::HI%:;]&%:].F)".$EA_M&#<,@` MV *;KSXB@7QPC, TYEW4D=B*=^W7)1#$!2]$% M@ H_R-N@.36PUZ0%%7;Q'W[Y65HE:8B>E&2@H3W^?SP"5+P%3*'X2!5A6@^= M!^&2MEP=ZF(C_)7?X1T\0,/+D@AH(2.(&VU*?R]M\AU8H MR0ID#2F8RJ!=Q0T#_,@[]^^'A":6>AR.U0=^O3Y^/3#(BF-J?IH\,B2"DQ'>U\0/$J1N*U% M.W7 PX"M/(54GX:[')"19<+5-P>/M4"F$RI>%M-S78"NW(;?,Y&BPHJU0:-3 MX/&M=_X#$'N952DRD;G<@GD:^.$DA5L?*IH!Q4@U...&V^1XK4$A4V(/$D\MP M3BD;J1%:$GIT(VQ]030"X?#0@"I!I4[=-\ES3752-6H#T'6NY]C@HL3:_P"$ M#K7?WMVPGW MVS 6A2P8TZ_#[G?OD&.[G;D"P%1UIXY)D0>JGP%.E>],0&->:\\?'DX-0.F- M-D176UA4#B1UZT/3_,'!Q!2%W&@I3<[GK0>^V2$247LM9(P&' `'L!T^[? 2 MPCOU6K$*D-X_"3M7P]\-UR92@XQ+\7(?%2I^CIN.N1!+& I2],ANGP<:M'N/ MEB6=]S?I*.)"AN5"030[?UR06MFUBC;B&_:)J:X38ZL;:]*J-4U^*E>U#_MY M782(KO2J:T WW!Z4\:=\+9]+A$I)V(-237P'MX8&-@\VO3^*O$5'[7'K7^E. MN&PG@#__TO8^X[GCT /CTKF7)P!86\MR#0UZ*34&GMA&R"!U6J"*_%S/OX]^ MGOD^+9>2IUIU![U.^",CW,@L-#L-PVQ5JJ-MZ[8\7DGDMJ":$ML>E*EMZ4.#<%-M<>; [L`=P": G;XAX;Y,G9BJ;-6NQ\.QRNV8'< MLZ$J0Q!-:]3XY+<\E;4`5-*?+I4^(R-$I)\Z:K78U!% 1UXU[C'A'N0=UI8- M0R1U!^+IL/:F&CWH`6%VY4/4@FE/NIB %)#@6%2*\^U*=:;5RR(I%@K&6C@D M%3^T1[]M\B>:13:4):@IW'COXY$ED "N%0?B^CP)'8=\% L#%L5:M0:,=QTZ M>V&Z46L5F(45J#W.V AGOWJA#=B"378G^7>N"E^*ENWQ,104V4U'2HH=L06) MKO7!C3XC3Z,F*0!(J,A4'BQV!!8GI0X*M()7L*U;8D'=J=^@^@#!09&1"UB MP!IQ8@GW/>@P@-<;+;$,?A[CJ#]XIBIMP[+6H;H!_'(*LW5B0M0E`.YRQD"! MU5 !7?=5-1N3OWKE=IKS:-/B[5J=P2M>W7IDQ-B;+88L% ^T=^)V_P`_#*S9 M15O?-80""*5 WWVR-LA$KJ*PH7H.W?#9[DDA::\R*EM_LD5%!3J?QQHL37 M>N!&YY$FNY)[=OZ8[L92I8Q!W)Y+6IH:=3XX=TPH]51-M^H/*OC4[#YY$I,2 M%-W 10S*!L">F_;?MTQX68IU=@RDUIR9!V[4&!,2.B\ML.(.P^R.NW7)`6B3 ME8 @G;CNH^CJ3A(IKWZ*;\11B34D$[_?M@MEO7-:"I8K4_!7H>HK_3";1Q'H MXFO(E1L#Q0="-@`?_B!L.Q&$3H*2&P2%)/6M4 [GL33(%CP MML% `_O"NX J/I^C$%1LM!W H:G8GO7M7[\E5K3JD `D`DD@;U!_7WP<([F5 MM@AARW##=5IU]Q3YX*8[]Z[;8UJ0*,:[@^_Z\%J25IK\*$5*[U_FK_M4PT$" M97?$"*[-V_:^\?/!PAG9/)24U/Q$,-AQ%:[=*FA(!-: 'M04KA.S+DV% "CD7#'9J=Z5ROB%I4"BDA6';X M0*C<;UI].3N^3'B6D5XM4 5/,M4$@=:X=DK'!*A@0X[+OU)VI@V10=Z(!#5^ MACO2NVPVKDN %>*E)U)+%@`0]58TI^.1H#FSXZ#A'Q(+K]HUJ237PH,=F(W5 M@A-"2 .XH:"E>WC@(I;BAF6J#W'3O\ZX:3[EG$!=RQKL`#1J=]O8=#C1')1* M2]EKO_+O3W['$ ,224.%;X:BH/Q$>^'B7A(5=PIY=J[-OVWZ;XD,N(J%14FE M6V.^YVP_&F/$2NY5'+B=SN1D.$=2BEGPU(J K;D'W[?ADN#N39"IN?V5!Z>P M`W'TY6;9PI39MZ@54$A@#TVV/W80$2)MJ,';HQH*TKU^G)<#$$M/6E 06[X+ M;0VNQ()%*_ /:F FV)B[8 )]KD:[[T]R/;'A8B5+0H.[/P.^P&PIB &?-O;] MKIN>'MDC$L>$=6B6=5'O7K2E/[,$((I8HK0?$0>U/X_+$ELI=2@;CN3L*"O\ M1CS08J56-2S'@17X:5KT/?VQ`KHQ,0'4;F4.Z]:[=KD,%%5%._A M_3$!%->H*D5;PIW_`,^^-(W?_]/V(&I_*/AH(Q]KY_+,VBX):M?[,CPTJSDIH6/Q'=:#;;) E::X5 M&]*D\FVVI@("@EIR!L#NPV ]NF `JM!'3]H#=!N*T.3&S$Q534_$=SN:'VKU MR!)*[AHD\@U#0]:>('?'WLXD.8GIO1NO;)1(4[M GC4'I6O+;ITR)(5KE058 M4+ =#O\`=WR(!*3(*9Z@@]>H)(_VNN2%AKIP':M0IH>OZ^^2XZ2%K!R2!UX[ M`G[LAQ,K:H"-UJ#U6@Z^/4;Y(2""NH2 36@/6M*[=-C@/D@0OJLH#0]J?$36 MH!%,CN&8B!S*\EC4E=@:C?KTW^_$!'".];RY#X*J!4T]^]<25^EHDL&)+4WI M3:E*=<,4;-'9*@[@_9^?C@M,05,D\E5CQ#'@P)ZT!(K]^2I)M>64"A%5/AT\ M!D;[F&Y:5R2>(Y4-2ON<4TYV)V Y&AK7L<(I' 6PU0*]`?BWW&!(QE:7Z*6 M>N]>OT9+B*2 &RQYBIIX@8 `6)IQ-34[D]MZ$=JX91I(GW-'^9VJ#T532E/Q M. %!!*UBM5/+([CQR6QYJ(E:0OPEG->M6V-??\`AD;[ENES&M>ZL#O^ MNI[X*ET2@E=3I4%JM\8/;#14E2+5J6%`K5-#4\? M<#?Y>V BNJ!)4#44U)^$?%U [=C\\A;95\MFJK15(WWV'AN:Y*3&,:ZMH**C MG;CNI]Z=3]^'B[ED25DE2E*_'W7MM_MY'FC=W,* #M7KRZ'VPD$+Q%?N14DL M0:[[TK3IX_+(VF DL+ FNY/7PI[TRP2+*06.^X6M-R1MWIC3&([U/J&/A3D! ML:X`:2:Z.9J&GVF/8>V3L(W;Y$4Y,217B"-J'_:R) 6RN0;5W8CIOT Z;9&@ MALL:,>13<[C<'8=?#) AE<@M9F)Y+3<$T']F)/<4A<# MLM%[[C!3*FRP"GD003N.X\"<=QR8D%QZ\J-134;]:CPR))*!&U_/JK+0#J#U MVW^C'A940M!7<=AU'X4R42!U8[M*Q() -1VKX]/UX#3.)*\[FO*F_P`;?(>/ M3!3$DN'PEJ&A--AM4TZ^&$[LI4!6-2Q/P'Q MZY,2I(Q@K450/AV"DT%*$5)/3'TGH@AKBIW)'?<]?PP&UVZ.X$U'4>_?VWP[ M=4;K"@Z%=NE!6@R%TG=3*FCF5V&-+C1F!I]BA^G);EE:B4#$*I V/W]=O;!PE;,E,1/4% MP%H=J485_P!JN E=^2UP`&4[$@5'0UH*[?+&DTI>F00:`&E&4=#7;)<96FF4 M`[-1E-"#UY==_OQ&Z;*@4) J.]22:?YC)6 O"2[J>56"C[0KM]V1)#(14R*5 MV /+YFH';'C00&^2E07)`:E!TV [Y&NJ!'S49206;EQ -2I^5/UG$%G9;4T) M^-B.A'45'7&V)!2! 197GXJ =OIZ[9+C[E,G5W-34TZ?1 M3!5HMH$FAH/#8]SUVP<)".(A:Q)XD4(Y4)I6GT>V(*1OU4E6E 1U.R#8J-Z; M>V&1M>$#JNHH+!:#D:LV]6KV-H^[?Y&N&D65IY<33[3DJH.Y% ?Z9%E0/5W?[7> MM:FOAUP(X?-__]3V*?LM512@8T'ZSF93@AHG=MB5!(+#?MX8T2AI6-!3J-PH MW&U-Z8^H,COR6LQ++N"OVN([@@T)/\,G5L"V". X@\@`!4;_`$^&"R$TXU! MK2O4]C^.5VR$2M)(%!\-111WKN37?H&_RZ96)+1" MXT*\3T8]S7J>N V6)#OA8\CR%1\2[4)\:#VP\!13; DUKVW';[LCR9UW+"HK M\1Y;J6KWH=J_(],-E>#S; Y;@@DTI] W^C) E/".]2+;'^'9'%YK=S45Z]^W7(T1T2J4*T .XZ@=_ECNH%K>0'Q%3R)^%=^E. M_AAKS9>H+NH%!0&E3X;]P?UX&6YYH=S449J$M44Z4!\,M8\E4%>(;<+78#?K MTH.^5D*:+F92*CI2GMM@W"!!9L0.0(7K3K7^.'=-#O7"HJ>5:?9J#2GR.2$R M$\'$]&F+D<25![R[@'I0>(PBF0 M5*#X0]&"G=QTH03\S@*:=4'<[E@1U\13?OVP,MU)CR(.RC>@]B<4\06T>I/* M@!^$`;UZ5Z]L*#%:S@%03M'7EVJ6I[G%K(IW&@.S+4UH3^.3!*VV&'QBE#U8 M= =L96B@7"H'7B21RI^(^[&MDN)V#UH?M$U(IU&^0(;!$$*A*5!.P) J#3<# M^W(B88&)/)L==Z4'][[GY=LG80`7H M/7!;7$4W04(%`&(Y`C8]_OP,^(AIGJRE@HY$UV_'[L,0Q,;ZM@@\2305`/T' M8T&+/@H+0?A 8LQKO0?YC?)<7DO 5U14D_$M#U\?#;'B\F)!#N=232AV#+T_ MV\! 5M@Q%=B3T(.X)_MR/$4AKD":;L%52@Z\JC^N$6RX1U6,W';B#5:[DTIW M)R5EB?)NI(!)`-:L`:?+K^K(FUB::)K4L*BM:TVZCMA#$R%[+2QK4'OLAK2@ MWZY)=V@5K4]14["N].ZY&5,N$M#BP44&]3R'2I';^&1LJ8Q6CB3R)I4?#3?; ML<1(L>2VA[FK`]!T.6#?HH;()5N1#+390-^]V'A M[F+0^$4K6@ZU\.^(M/)S4Y E=ZBG7N0.V/O6E-FI15W;8T.XV_#:F';HQ)6@ MT(:O795Z=.P&/$H#2;;;4Y$DGW%:'!*3(CN55(XUZ[?1@!'O\WT MG)B*""I?`6HU#Z?VB>M#UWP")11:E05%?MDU+TZ4ZD')>\J+[T,5'+B1LY)) M;M3L<%-@B1UM28O\04"I^SMO[_V8\"\2CQ4CF*$U.U>U/A_#'DBAT7[@$TVK MM7M6N2XP@Q*B:4H?WA[D]3[#'B+(6N J* D@?YT^C((((ZK&VW&X!^GY_0,L MH+N6D"T+$@JJDEQ\-=^X^[*I!/Q;ZM\)# @ENYKM3([HLGDXM6@4CD#]D]0. M^2"Q'>Y2I(Y2<0QH7!V4=SOMA7W.9MJ$!6.Y7J?I[X[E%^35`3R#`$[-XDCI M\J8>$A(%N-&5MZBO$@'P^6)#(!;2IY$DU/%1UI\.1]0836*%-036HJPWK[X: M+&$%^YJ=C0^']>N!GPE<:-Q%36O<;]#UQ8[A:M10L=^NWN.^2NN2\37PJ3TY M=5!_$X $R!/5=Q/(CM2E?XUP+>S_`/_5]A5W6IJ"=B/IZYFF3KQ8YK9''6I M!'6H%?HZ^V!E3:,1TW@RZA2.(N1F`/,AB5%2`?U?QRD@=[(V M5K]2K&BMNWR&^YQY].A!_LP`LPWRJ:?JKX'(D*-EO4-O\O;;# M=,;6G[6R@5WKW]R,`+,&,H@LA-LD $]0O7J3\_;(TO# M:PD`\S0FM58=*'K^&6"BIBX5!1":]"'\*+0;^P&)*(A;R8+^\4-\7PJM?^!P M#=/!3EJ1R%6.]37KM_#!2+;^$@L1QIU%=SMUQ*"2I-Q8GE0U4P).W3KD!LQ4AQJM*G<4%=C0'>AVR9FHD50EQ4D5IN?]K( )!:YAJK0K MWH>A`[TQ"B165:HJ.7(?$-^H\*9+8,C*VC^R#R8L2J+[GQQLECQ .5E)J!5D M!*A>H^G 04QHML=AQI4[KR.VXWK@LJ?)8I+$EP/A.[;^'ZAC01LO)9JFG(=R M![;=<=ULE95*@$<0".5-P*T!I].&RBFP>E1QKN":]:=,/"SX%E1R*TH`!T!^ MG)66) ;!-*L-QL16GR/WY'A!9"5-%ZT7B#X?/Y8>&D$AR$50@UJ3N>@)WZ?3 MB1W)L]5P+4 !^*2J@4ZD#PR(!4GS6 F@4KU\*GI3:O??+=@-V/&2IR&I8%Z& MGPJ*[]=]M]LI/DH<2H)HW$U =3O784.61M)(;)%6.XJ:@8L&@0`&+^W'?:M. MHP>YG5+C3BM2"31ZCV%/]K(CFQ4:E!0;U(H/?^S+&5JH- "[`"NP\!\LKYIA M[UI8$;BH&]._CODN`J9>:H&%6!H!6E :]J_Q.10#'O7,M>IXAB"*?:V^>$"D M`D.ZEC4CBU*'M7:N/$F(M:M2$6FXIMN:$?[63$N%B0O%&ZCE3?*S(E(+N0K7 MC5?&IP-A+C3CON3OWK]/MAC;&QWK00`Y)!=R&H*TH3T`KMDJ*"0V7H :EUW) M/@1U'Z\@8GJ:8K6;82*N]:[&O8 $GV&&(\T@TW4!0 *C^4]_# =F5WT;+=/A M)4]P=JCMDA*^JU7-U%)(-#XJ17K_`&8"0GA"UV!(WIX'P W_`%8=RUE8S"E MU 313VH>F$!D&@20"00[CZ#X;C$VFPL0D54L. -5%>GW^]_ MCTR=GHDM_%4$CH>VQK3?(\4@B@[B`#Q'Q; (>E/'\3B96GA(:;XMA]G^3N1T MQL(;-6'6C 5*GMX_A@$J7ES6-4J*;L=P#XGIV\,'-E846X[%@IKVK4;]^F2& M-B2M.X ISKT7$*+7DDM0BII]KP[TR8C:22%S.%4$`$MMQK2O>OT9'AI;ML @ MTV+#]9]^_7!QTBEK5!5>)(%1MT%/]O(F=IIL5!6H[[C'<\EB::D(8['X=J+2 MAVQHHLK(THS46CDCX6[_`"R7#;(R+I!Q!)IUV7J1_MUP4442@S\6["@JICZD MT(P\+(%:]:,2`"-MB?G_``Q!`3PH9EKT8$5%!^)_`X"05JN3B.S UW\0-_PR M%!B9*:@$_8H%V4[5%.O3+!)03T;W*DDUI^Q3\?'(DVRX;6%B:+4*3NP'AXTR M((**IRD\:]1OO\O'PR40>]CNYF)XCE0%MP`37;[L3;89TI?%MU)+4Y=Z4KTZ M'$,"9*A(-32C5H >FPK_`!RSB4FNKB#X;C&/5 M>%?1ARJ2RM4'P!Z=.N(("U38HN_&@I3Q/W]<-Q:]UNP-6[[4/B=A7 "0R:9= MJ#8U#48]#U/RP*9-<]OV>M:UV^>'=%O_UO8(8[@C84Z=?IS,D27!([EK_$*5 M"G>E=Q]/;(52-UR@,IE._A]/T80MKHF+?$1\0)H?;M^&"@BE M]>1Z^],;"M+NJ@5;85^[#PWR6EU:&C \1V!H3X"O;!PEG:D>/&I'*G04Z]JT M^\8*+'A'>X$$_"6/!MZFNYW%?:G;)B""#WJ8#C=JU+ D==Z=AA(`41\VQ556 ME*,WQ@^/;KTWRNR6>P6DK4E@3O51V/CUVR0B6 :+T8_"=C4#_/PQW8&);?\` M:6AJ":&M*]-L;#.,"UTY!0ONI[>W0UP;EG(UL%.@(%-D'4>_ML,(-06 M-*'[6U<)D.@9Q 6G[/V:IMWZ'QR-L"0M8_":/0'HP-"WB,"@M*JEN+.*(:5' M[0[FG?%%+"U7H220>WA\\E3,'N;#4(\344^?>F(%L2&F!#4I4 ;DG\??Y8>$ M=ZG*XN:"HY4(/)<>$,+7)/PCC0T/@=AAJUI8SDFK=0?']>'A9&2WD2222%\*]_?#X; +VO4>_X9+B53=OC(-&'+<#PI@HH$ MI!51@1&']Z+T%![_`#.)!ZJI^H#101S7=J'QR,8KPN4CB-P?\K)\/PV7,:C:BG>EC&A^[^S(E0(J@(^T`=OOZXVR)KD&JT ,AW^(CQ]@<.S RMPH M-R-S3D2?X8#:[N+&A"MRXGB5[D#)BD6UR-=AM^T.]/GD.(ALXR0V2*DEU1"? MA4'MT'T[X@GO8"%N`+5#4/$UU<47(+3Q/3=NU3O\`V8$WWKJ\EIO6A('7>GXY,Q8F:T$? M'QXUJ:]J_P"8P",D`J#MMN=^R U)^GIDC896X;%6^TYW))WIT^CKD%L-;<>( M&_["]/BZX8HW*NI^'J-ALO4@#OCQ(X2T#3X"5:O2FV_?;$,N$J;DU!XEJCIU MIMA,0BBNC)"#HI(^'MO\\:ET11'6UDA-"I(J>@H>@]L(`6+E(X@L2*[>!\.O MSQY!H=P/EX??D3:0H,*N=ZJHI3PVWI\\1)E9[EC;BC?8IL!V;:I M^C!S4#R4-J].NY'SVQ3=XRR,J23;@-@#0^X\/'!>Z>%9R!)H=CT'; MY[9.RBF^1VJ..XVK^._CD:0OKN*D4W-:]QTV^G 9#JG@6KTHU*C]H?JP,A&F MP& '+[1-12M/IP@TRI8Q8K0`@$;J3M4;X;[VH$A28@&E37V/Q'H21_#)4.C' MC(*H#U4BG$TH-P?EX9$AF)%=0L2#6O;I7Z.V17C6[#;E7L1W]Z]L:4$E?RKR M)K2M*C%ELM(8]*=1\7RQ:RUS/*O$<>=*^_C_``P]%]3_`/_7]@D$KQ8TJ01M MX=-OHS+XG"L*;E^O*AK3[]_IPV4%>2IC*FCG\*^_AD:*%@)J%4T[]S[]^V2! MIE3F%:[,:G:GB-L-DHIL; #M6O'M3!PDIH+5)/$]*5V).Y[9&JY,3%4"@T&X M(J:5V!/?\,>(I$:#1\%4+7J!V/7I].2X05WZ. .W(G MH)V+KM3?Q^[(TMDM5J6/2AJ:UI7&V0C;J%N--Z5/7<[>&-J8E1+?'NQJ*D@5 M! IMDANF( 7B0FE"&%3M6O?'A3Q7R"@U&H%-5!/PMW^[&@&%JJ4[/MWIUVKL M34^(-78[4[TJ .)I;MQI0$DNI/N*@ 8AE86* M>5:LY(%0Y--O#Z.V$%'-:U*!2Q-2/EXY,S12]&!J#NK_`&3XCQRJTT.]3J0> M-6#$\N8_$8;)1152=OB7J=E[CQ)^=,":45&ZL""7HQ6M=CO^&2$I* %:HJ/ M?:2I^BH\#AX"4;+2X4DN:\ON]AB<=*+:+TK0<0#4T(H:>.1"3'S4R=B05!8` ML-_OSR-*O M8T._0&I6II7_`&L%TI*C4$**4XC@/]IQW61IRU;CN*DU]Q3;$_-AQ%MR*U-10_:\:^WM@H=R M@-$@?$*DGH-QTR=$LO<5,D&O)@K#N/U#^.0HA /F[D%'2H)Y'W/7^.("*[EM M10-TV!/MAW"&RP!%2=R#7M]./$C9L'H&8 MH.]!3?VR//DRXCT:K0FOQ$I!KS;J#MRVZ_+(D+2DU*TH5 ->5:5^C$196!U::A4\R*G=1X>^2LJ8CO7 MM1>=``!L#6II2I\.N2W07-V)%0!2OOUR'$IH(:BF2C MMM7M2I/Z\=D<4B'- MS-.((ZUIV--JGYXVL8A8KD*0P//8UXUK[T^=!_MR!! M0;7EAWH2/LCO3&RM+&9P'*TWZDUZ##0[V?/JM^T6!'(T)VZ=-AOD:(8\'FY@ M&8;_`&14DCKL!7&S+FQ\-RD2V5)D)8 J 6-"2?AWZ5'7[LCPE._>L>E*MTK4GIU_S[X:;`0AB:AAN M2>E,;[F)M;0*5!H?\DBI^CY=]=NG?"`@RI2%35R]"#O4;#M]'3)@4P)5!6A!/*O4G_`#Z962BO M)Q- 231:=3UW_AC12**Y>_514T5OM=]S\\5$J6 FC$+2OQO3Z/\]\"*+_`/_0]@]U0\GKU)W-:=_??,KA MJ6R5'4GX3LU:#O3;O3(T5!MHL6J$'(G>J^/B1UQ 35+5I1222# MU7P([[[Y(V$6J@CBVQ 7KUW'CD:)25O(!J%3ML#4BNV'A(4`.+*2U=R-QN1T MIU!PB^]!H='%U!)-% Z@]2?#]627C[F^8%&[5[]:=_PKE6R>)K:!^(&YHI-!OU.2$2&!*PKMQ[GKX>V E M-#O5%.U"FV_3?MX9'A+$'N*F')W4_$ -^)[#'A*05I8#FPWW.PZ5`VICPEEQ MWR=S`(I6E05Y;5V_K7#PE!)*UF)H.O<@[;^V$V.2-EW.M 5H.]-Z_.GAE=,H M1'>IE^2JA%44U%?IW^CKDQ L2:+7@=J5^'?M@IEQE8U"#L>W?;;"-N109-@@ M*M0:!ONIW^>&SWL#$E8#\;4VW)^5>@& $CDH"HQY<: ==V'6M.^/$;9B,0L4 M.*T'7J1OCQE;#>Q(4CDP!)J:=/\`;P[ECLU3X^X8]5WI0[??@/$G=MBC]P*[ M4)J-M]Z?=@X2A8U/B)6I/A[ #O\`=DQ%-EM36O8A>^]2>^W^>V"00TS$UJ:G MIMX]A].0`[V7`T&:C5-'Z%1V( K^.6#=%M.P*-7<"NY)`_SICP%3)W+?CL14 M?$#^S3O]. Q(ZHI<6Y!J5XU^9VP65I9MR7D>()W/?IMM[XFU7"GQ5 -"/;YC M[\ )*;6;%NE*=/;K].2,4<6_)>O3B3OU+'V[TR#,4?)WV-J[M\1/B<("-N]J MM6!8D*OQ$GI6E/GM7"8%EQ=RE6M*GEO4D=*_V9$;=&N[:W%?VGKT[;X1-;6\ MJL:$5#'EO4CI_##Q+S;'@36E20_P`7Q@FJ>-3U^C)#=%TY2&"B MO&@)H-P0<%$@^7MT^_&F5BMFU=6IR^R=BKT MK7Y#&RQI4! ^UN">GM[X^I3MR:# "E*"O7)<0"TNHO%:L=OOR!F5%]%Y!VK6 MO<'PR&_%*-4;5RT2* `7!1R*$$ '<4H,C130[W?#4(*$4WV_`'I] M^2$RRV7;T(/PU844TIOXT^>1-%>!IC\/$C[6Q7V/6N(!+ BG$DU[T-!^O;)\ M`0%E02"3QV)(/M[8":95:WG4D @G:M=MCTQNT4T6++0'@"RD-WZ[@_/*R% # M@%.^X_J,0&7 `N!-/B%&%>_6OMDO<@$+B:TXFE1WVW^6-,21;2[\03M3XJ?T M[9+BI-@K338]:':OWUID";9&"VH(Y4)*G((VK6A^>2L] MJ8ILW M[6P/A^'4C(4&R :5A1745H>+#< ;_CDB$$6=C2(!H0-^[!1OT]LCLHQN#T(4 MUI78^YWI^-:8#$J 0L*H592>2M0,5ZDD`5.(I'$52,J030A34@'<[?PVR0V4 MR4J*2%(`(Y%3UZFIVR%L;7*6!"CB$Z\0.OODMREHNPY$MG$L M''9FY4W('=JCID@2P!+G4<&'7@:'WVZ_?D>&3'9!<:AJ+Z@%20>_MAJNK+A+ M9^+F6(*]2*[$]LB8LZV4&/\`,*@GXC7<8>71CPK0*%>@!^W3J<&R8%2;J]6+ M5KP']*8V>]27*Z,6XDF&-(NVF854=ZGX*]>_3(DDIH#FN'(;E MN0/3?K[TP,A39XM2K5WI0>^3B?-E:FY+*P7XJ=*'>N!B05Q/0GX=J%F/WY*@ M&/)8Q7M4`#8+O[;_`'Y#9>(*;=Z GD":5W\.F66IH+T.ZJ00``6/X"OW9&K4 M+E)Y,IZ]0#X=L/"1U3[FBQJP)ZL`*;T'?'A'>@B^:YBM&.]1L32H%#U_' 8E M1$!KGR-:'< ^%:^&0X".J;#?'<'EMO4UWKM0#"GB#__1]@%P-JU)`KL:??F8 M0'"XRI$$U"[CQ)-?ZY$TI;9F(ZT/=34@T&,02B4UO$LRU%5/T"E :<1OVR5A M,7$U(H/A;<;_`#(Z?QP&NB:/1Q3D"=ZL15 12M*5VWP1-,5G``1]-V)85()X M[5\))+#-<3:"55BNYV9@""!V`ZY& MBQL-$F@*T&]345^D##PTDD#DTQ4FI!8U[>X&Y&("+"SETY+7EU%/:MM=C\OIZY'F@@-58TY;U!*G?H=ATP\ MN3#8.V+.HK\-`6[#:O\`'$ ]Z+4SQ# M3F1NRFIVR9)#( %LGP(^+H3D=V8H M*O2G3"@ER.2G'H14;'IW%1@XX%2:DFGAAH-@E3@6WV[#EU M\DQ'1>U6^%F^T*,-ZD' !;#BX6C1B"1R*[E10=>YQ(I-$N/0[[C8 M`TW_`,^F"SWLA'O4_L\U-'Y&O'^.2!+'A!ZKS2M:5VXA>U.Y/OD3,HH#JHN: M+Q3XC3J-C0^^'B[TF0')4^,#X6Y!C]'^WOB*+ !:0=ZBM#UZY927* *#HU-A MTK_9D3).P^DFD-R.X"@`;+3K7Q^ZN2!8D1=4<59G!0'K6E/`^YR7-CL[D@# M#H*U/@/ ??B8E(DV"*DGH=P*U'S^_(W(,N)NK$T"U/9:;_/!8+ FVR5V+; + M\1K2GS\?Z8+[F5$M`B@8[@@['VZGYX0"K0(VY;\C\)[;;[^^2KRIB;'5=S%" MW4]3MO0;9'C*TN!%:U^T:CKL0.WXX3$EG&9"X25)J#L11O:FQWR#(RM>'.VX M))V'\=L(OHQXB.3=:'D1R'^8QHK1*P'EO6H[_/ID@"BFZDCKL=C7^WWR!B4. M#4/("O(]*5WH:G#5)<"*\36E*D]L,/'T9%#=20=CMN!WZC?Z,"V0-FZT MXJ:IT5B>E-OQ.6"-IB3U*\4-!R-!M3Z!N)) )ZCV&$6UVM8D'L001N2?P&V/"D*+*K<@SL:= 3TZ>'7J.N2H#DRNG* M$/PTIPV /3Y_>%/$7!35>G%/CH/$T%,EL$*PJ*:[K&9J+M\>_(?KPD4O$3UI0Y%GX!2&?QZ9,!40PY #9&ZL#N/N_SIB1 M3&Z4R/VG(% "Y/0`5IR^_;(&+9&0[FU=50K6O%AOV%>A&1$"$DUT6N_Q&I(9 MB1P!VZ4% M)6@:M!3M7ODN'N1Q'HL(J&Z_%UKXY&8/QPUYL5C]5^'>NY!IO\` MQR*\1:JO$<@>*TW[5_IX8.%+C4@`THOPDCJ2=C^O"Q;+?$ :+W'@?N]L>$H$ MEM!5CL%>GP^ `[?3BVVZG(D<"& -8QU/N?:F1H+86<4V"\:<*[G8#L>AR5EB M"[D0*[,?GU ^0'3)T:YI/N7#^7GRKXFI^G(&1[V)-IY5/=]POMTPV0I)ZJ?("H['=B/O%<2$`$M*VU*4J=NX\2?OP4V;T MT:!N(<+0]"-EIU&V3#65,@%Q\18UZC<_=[8.-%MT/VO$D&NW3VQ'"60-+"P5 M5+&O@5![[4PR&VS+B#AN:_:=J<1T(Z=?HRK@DQ,@5C!O$4\,M]*B)Z-D;,S5 MH0`17[^F`GN7A+7)68D`<=J=:T_CB.):\W5!H 017I7N(#DXGB "*U%1 M6O0"OX],&[ [J-"Q)"JS=6V2!*!:LV_0\FI52QIV[XU;/A*FXJ0 M:=.M214T\,/!3$ERUIVW-:;#MB >B!;1J>IV(-#V_6-Z]\)$@RW6JHJ&-2Q. MWM\]S7([HLJK$ ';B1UIWPV0DE2V) MCW,=PIA:D]6DZN*=#081$=ZA46I)6OQ'?8U]NF)L]69(Z.5E!KN36IW_`)<` MB0Q6;(-P2H 'R&WTY*T\-J"N&6/8#DU 3\OZX*8F+:E3UJ#X#?YDCZ.N%A2P MD*M.J]%-:T&X!^_!$$]607ABIY,>56V'3H:8""RMH-4FG>M2=NY\,:CU7AE) M>20":@@;\AOV]\6?$!T6="BA20FPJ: 4`QXBP):9A\)K12*<">QZURP7WI7< M^H444-TK0 >-'6GXXB)*R Z-`AEK3X?0-2:4':AZ9*R$[=ZF_'E0FM/LD=J^&-]R"0'$K44JM.J@;U\?IP;L+" MY*'D*5K\Z?/?PQ9[%U*GD3MU([=*=,D)%CPN!^&H%0W6E"-M@.V1-J+[Z=MR MZ$;U(ZT/3Q/2N2$$*B] *4IM0$=ML((BMVHGC\5.-6J>&X/N??K@._(J`[C4 M; 4H"%\-MZC([LK<6/)1RJE/BKUV([X$.]0`4J>2T-!4T!)IUZ9/A)Y(*[ER M.S#B>P/<;=OED&2C\ J Y%3T)_:&X(KWVR8D5NEHIQW&^X#,>_[1."R5W;Y\ MBHKRV^+L-P36OTXF)4E5^'N:``'Y?1B 6---0#9OC'8;TKWI].2J25!^_P`5 M`&)0]:=J?V9"F0![U0#B*GXFJ$J10UWZ_*N$EE2A0.X2K*350/V:C) EA40N M7B#_`#2*G)5/A4#\#@)*\1;D4']MB"3R)-"?:GL3@HK9+2R;@]>E#TI0;U'T MUQHE2"%-J! `Y8$AN5?'^'ADN!>+S7"O,<@`:U K6OS';!Q5R186L I"UY*2 M"#6F]3M^.V1YMD9!1H&1:@E:_$-AU&2W"D175/&A! ._T[5QX2C918;[-1B> MG7;!N$ENH-37BR]OGWPF+!38!J$]!V.]??(6O!:SX0Q'((.M":#YY,<115+U M`I3BM3^R._O@( 9#WJ83[ ^*E3[@?1CQL:\UW%3RH-F(^'K3;ID:/>SJ@I&, MM4/2OB-MJ8[I@I",5'([5^';?Z&^C55%!0@$_M5^\TKB;+'ER7UH6-0% M'V=MR?$'N,K94>]0#T^*M5J!Q-*#WRX&N3 V75-6*MN0`34;T]LC89!Q9:#< MDTHQKMO[?3CN@DE=56)4@$DU>GWY$VF%]ZUI%9:_:Y&O6F/"BR5JT#["E>U= MO]O)\ :[#N:-Q4MRI]H$$BM#@D*;+;K4KR)--OHQ`"1;3[ [DDG:G8?:'T96 M0GA)0KSFH*-4$U/>OAMWR0I$;"GZP/'KX#K3?^T9( !22UZJ,*?SU+!FZCI6 MG@>N/%2\U_K$O4$`[;CY4'3V& 3I91IL/6HJ*T)K6OS.^#B1P%S,H!Y'X3U] MNF/$M4W5@&Y,5 ;;5(P!O4D=3X=-\%,OIY.8U0*0Q8D=._A3 M??)4`BEB@5J35B26`\3MM[>&2\1;7&NW3B2/?8>V5G=B07"I-:$T-5V^C^.2 M$BFUO3CU(H>5?'J-L2"4TN)-#Q->N_O@$;05M `*4H17<[?/YY+@1PJ;+4@` M?"VS;;^QI@X2%5%>M*FE.1*]_ 'PQ!#8/>L9AQ(!J5) `Z;4^@9,2[V--J.1 M-0H!H5KN=O$?JR!W2?>MD:M23QXD$U'0>/R'7([AA==6PQ)&U5)Z>'W8@6R% MEHM1@"20>H/O7)G;D4U2QB02#0QC]FG3;*]^]$53EN!W)Z5Z[>&$2(6E,@BA M*U%=J'??:I^_&V/"N4BI*5('Q =Z=JX>(AE33J"*'E<$:9@!.))K6I M))->_N/EA0+="Q[4[4]AMD.(HNU5 >]*EB33>OAA$BQELX`5H2 M>(%3M^&/%WLL8;!K4'O]GMMVQ]RER,14,=^Y.]1_MX!MT8 KZ[EMS4?$*_PR M=WT96M8D)\35():E>WT9"XHX)-%J4)5J`T5!_E4W/RRP';9E0#9;;N*$EZ ` M?Y[Y`V44WR(95%:=`?>F/"5 :+#B`* 5VJ:$_P! M^2$>]%MAJ[TZG'2F5D%#6[%=APK\24J2"*4 M%.YKD@4C9:#1%)-:^^U/;)@)X3T*U2&8*AV4\E/[517?!139KFJL!2A(8M38 M`D$=*[=\ANQC;;,E%.] 14;UI\OIP[]5*&!WY-4J#5B"=ST`I\Z8VFBJ4 6I MK5COM7J=Q3V\<(-^3#U%:78$U->&Y%=J]OPR)BRX*$]5RGX:SL=0UZ87_+)WQX@>J-VB/AWKN*T[[^/WY& M@RW"G)0?$2-]O&G;?)!CQ$MBH'T5WZ;>&2W03:VA`Y-N>NXW`._ZLC($J!2T MKR;XMZC[/7ZI(%=O;_;VR5(Y+%+'; M]NNPZTKTJ,C1*\U2@X#=J^-#N!D*6HAQ4$\:4#=0:X0%LM$5:M1O]L#P'3!: M-RL*=>6X:HX^].^3)V31Z+BIJP)(%?B';;((NN:E0^G3T_AXG;,SB+@\)Z*"JJT!WX?"5ZU'C]& S*>#J54E05HO M0=.GR)&1M(*Q6H":&K'XJD@>.].N*+:)Y-LY=14<3TW%.@]SDHING<@PY U( MJ>0-*;>'? R,EI4&@_GH3O[=_OP\186%['8;[[$`G?QR,26-`J!(X\FW:@Z MU%>OX')<6ZU7)LDAOC(Y5H=]C3OXX+BK50K**A*DUZGML-OUG'=/O6U#U*U* MGX33??PQ3"@Y@0&(!J:$*3N>U",B-F1,5/U0].);:AJ12I4]:?ADN%CZ7%AU MY_$U=O&A_AEFZ[.#"E>W<9"K3RY(.YF)-*UY$ CW[XF%7+=:5(3PJ/#\2U7(*DT8H:C> ME:U&X[[$Y(Q1:_U2%H:5\*T^$&@/W8*#.W>L.9H-B>3'QKU./"&)1:RUVK51 MN2>@'OE:8R*DI-0I(XJ14K45VY"E,L&P1*E44 "UY$[_`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`%2Z]-Z?Q)WR8!K=B >JL&))^+E7J/ `D"F0 M*0%C4V!)()ZU^C#Q,J:)4[$TXGOMUWPBUI<'H%9]EVJ1_#"2O#W-] J_L@[[ M[U]\AL@`K@0[.H-:`5 ZBM<=V?$6CUI0FAWZY+ADU\UJEMPQVK4@5('TG(&) M#( CDXE5YL?B5?B4UVKDA$(I2Y%V!([[UZX>$!/ >BSU*FBK6K!BI) HQVZ; MX>$=Z[JP8\: =@0`3\_PI@X:ZHI>!R"DJ2U?:N^]:T-45 +5 MH !TI[Y+8,B"5Z[OQH54;MX?+ :')AN.:OMR`J2I(HM:'(;J`M8'>O85#?*F M&VP^2GLWVF.Q)"T!%*;[=\6%%58B@5MJC=?$X1*DT0%$LG(K7[/6/_/VQXD1 MD6E(8$#XB 6)%0-Z'Q/MAHCJHD#T6I2AXBI/3^7W^7O@W9-DL2;6*JLU6=C0584I5NY^61((11BN;:IJHWI[8&8LJ9XDE=] M]P<:212]NJEE`+'8UV-*'^.3B6#53O4DL #4=P0#7\'B[D^]H&,E$;7-6N[$DUWZDGYX-^YE5-&M*;,3N1WR!".&^K9&YWV/7QQ!9&)#1%11 MEV]_XY+XM2VAKWW'3L1X4QOS3P[/_]7ULQI&QXBIK11W)V!S*W+A\8'):AY$ M\JU.['^&"DF5KF!8\444ZD=.G;\R )M?;'9L'N:`4G[)7^: MNY/].N2Y(+@:J%%26^)?HZ?KR!906-4D*RDCJW@OSP-9JVE/(E0=QNRTK6G< M#VR0E3$+& &Y^-3\6_;WQXRSE$A94;,M=^@'CVJ,0"4Q-G;I[' UDD\VZDD]QM_;DC(E:IQ+%J 44U- M:BN `) 6@ E:D[G:AZ=ZFGRRRZ9[A>34]#7I3QI4UR)HL>%1#3C&:J%84\0.U?F!A#, %68M2JL*@%O#IT)'W8"0.3"0KDT6; MG]EG&RLU?:NWTX0;YK2E*[<$-!1C4J=C7^./#W+OT4C(.)=^E!RY'[A[^&-$ M+'&3U6<@36F]2=_ =]\/$@T.;BWPBE-S4&IWKD@ES= 34@U#4Z[#;;P.PR0( M*91I:7Y <5(*T"BO;Y]3['(J+7*W6I(/?YXK;0(`+"NRD-4[8"%;'V0.A:FU M=J?Q\*9(&2[='!BQY,>1.XIM6H\,$A:D"E04Y\J&I))Z@;_+*]V(L*I-"@KU MK7J*^&2!VW6():#D\&8\>6X7K]XP&NC(P+?.B\G!&] OC[X@,*,G?&Q4E:J: MAE8[>&3$@FR%X()I]E4WKTZ>].F1,>Y/%;7P\AU-2 -B-AO78#OD>$KPKFI0 M;UH>QWZ]B?')1![T!I:DUXU 5:BM=O#?ORQE[V0]+2D5=J$NA!-/>M#X=-\( M'FBU*0$$[<12C+3>OMVQ) YJ+:H%JX%6'[(/44\!MWP<0Z(X?>N4_9 -2E!M MML=\BS&R\FNY/$5J.)WWWI3Z<#&UPD^)0!N5+\MJ`>%3WR0C(),UK,6 I\1; M=?GVQV7BMPY4;D11M@*44#WQ-,;M8Y,B%2#5A4FG8G:F$1\T@$J9?U"Q922V M[!AN!V'T8=^]D(R;8A@I:JL.BUVIV)R!@6-M``$E3NN].YJ.PPDD)) <5H:% MA(-J5%*GLWXXP+ "^BP,:U)J%J:>).6B^]G3=5J2Q!Z$5/0]!^(R$K[TT%1. M88BIVW(%*9$4P.ZKR!K5C]JIVI[CKX' :6BM:E2&-5;<4]]ZD_/%F(J2T8_: M'VJ-3Y/8X;)130Y; M5%*;,P[T[@>QPV$<2RM%=2=FW13V%-P?Q.-%)DOYT Y_$WL-NFV)!8;EIC6O MPD?%4GJ3MOM[9'DC=96H8<"I%"&Z#?J:?/'B+(2(;E+<0=ZKN[$[5IU!'7%E M16 H34[<=@%[D#JA!W8FK#Z,4^YH`FI50:UKW)]Z832V55E(HK ,: \#U)ITK['?*RQ,2V5W M`9>1[J#]KOUZ=<'$4QBI<.+,QJ5K0 $??7YT^[""4D4V*M\(W-.7$>!V^C?+ M/>QM8P)[T8BHJ3L>Q\#3`3%/#;04J34DFN_@33VR&Y2/FW]A>5.0)&Q-:>)W MR7"AK!BPITK7^.1X2RXJ6BK452P^?7PR0V8TUV_:-#V]^ MM<22A80I8*033<4K3<;$X=^]EMW-KM7>E#M3;[LB0C=<6J20*U\3N,:'>GB+ M8H#ON0*+1J]?#QP4HD2VR<@04"ECNW2OSP(M1*C8$&@H* TK0Y+B35\FJ5-2 MGQ"O$G!:J14;U8;]2*CZ!_7$!C(L>\R^:-&\G:)?>8M?O%L-,TY#)-*U02JD M5 /\3UE 4-ZEO*%(KL:C@*GKF(-61]3D@`]'K. MC_\`.7?Y5:J8X[V*\T=Y?A7FK2"M.]%V`]L(UU\K7PO-Z5I/YS?E3KS1I8^< M+1'DI^YEYH=AXLHRX:F)7PF>6FHZ5?@'3]5L[D$5*I,I-#TVVR8R7U4XY!'O M%(HJ8VH0"6K5=_?+:M@8E1/+O\-=B3_'`MUS=4TIM4DG;WH,4\1*VK4J=M^G M;W_#%%EL^ M-D*(^:Y)^JDT)Y$D=C3X?QP64R [U;U@W0UH-T7J/]K)46%%:KJ15:1I0]%VZ ,"?#; `%LCHM;E3XR [T!I4 _=[Y($(XK; M``XK0\6(4 =AVP6MES-5@IJ%ZM78$=OI%-\%GO7DT.3,QJ*[50^W?#Q+S6LW M(,0.*E>-*5)/R_C@,BFJ6JPY?%42$4"D]:?M?/?!PVME5Z\@'^*NWBH'CVVV MR9CP\F.ZZHK1ZDD;$=/I\-\A2[(=S448U()JVU-Z]AO]GQR0*A0#\NOQ"E0> MWL?GN,/"RA+S=44H[[>V"BV>]S,"5J:!=R2%L$>)*GHFYQIC"+ED)Y&O'?MV/O\LER9$6 MO5DJ&^R!]O?PZ&F1LL>$JX90P4[J*CI]D4J/UX3:#9;;BZ\*@([=?IR6Z:/56-35B*$FI6NW3VR*+I1IJ00"`/H[ MX-UXE#E]E@*[#BPZC84/]I()V[[4Q*DDKN516AH-U7WIX M88!A2ZIH*59EK\)V)/@3B2V !?5*=UZ%2.Y[G[N^1W""?)=R% 2&(I7YCW'4 M[XG=%5T6$@QT(XLU?$ ?2>@Z;9%.\E!6J5HW<@]:`#K3)^(4V>]JI?A4=MB> MH[4_'(W;'A"WC\^Y9CTVV&2X@DFNB[<\:_%3>AKO3L?GAV6VZ&M?L*=R13;_ M`#&'B1:P"JU4@U/TD=-SWK7(\3(1*]-]BW0"C= :>V$2[D2CG4``;@_P"?SP\*#9;ZJ034@TH# MM[;X>7)1'N6=2/BZ5+T[4V^GKD+39ZAFW#?J155IN0,(-*%-@%:IW*M5 M@:DUIAW9$!4HK*:C9F!'?PVI[8+ ZL!06%>H.Q.VYIT]\CL>J7#BNQ'B./4& MO<_3AC'N3391?34[#:OPC:@.Y^_'JQW;H!R!.]0!3J1\L-=R38:D-%##X>1X M@ ;#[L"+4R:]% `VK0G\,*E>P^&E`:-UJ?QKDN$*#2D:-4UW)H!_7(\F?&J$ MDBI(V 8`;;[X),3,.W%"QH#N1[X>(,@9+*TH""0230C;;P/;;#L465Q).Z[5 M!H*]NF_;OA$>]9&U-%J:.2&J"0!7<5^C`0HIQ VWV.2-J=N2I\OH^C(FR@1M MS%B*GB*?:/0_.F&@&5>:T@&@J/B[].OC[8*7XM5#4'7?H.I[;^.-*2>]N@8" MI:@I\/AOT.&O)'$5O$\J]JU^BM<;\F+_`/_7]9L:=#3FP-3OL10C[LS#Q.#P M`=6T?FZ_":FPR1V3QJ3.44\JFNZ]"3VVKMW_P`Q7 -^2#*UP^)JD@@5XT[ M[TH>]?')$$(:Y?"W(@N10)X@?JP<*[+Z\E!(KQ-6!\ /;OC1"=E-2@H">?$_ M$I).YWW!^>"@.K!IFXT-22#NH_I[8\19`6HF9"!\E().XV[CWPIM:9%.Y4[? MLCJ.U>N $H,;?GA_SGKYFOH;;R3Y2MI6AM;Z>2[ND0_#)P0`<@1O\1J#F3FE MPPY.'(B1/X[GPOIZZ M="6Y?"#MTIOOWWI[X>*OK2(#HE[Z%S0&%RE#6("M2H'(UW._$8?"Z@)D3RND M')IEXH24%V 4U*@$@]]O'$F)Z!8W'JC+?5M?TN6-K+4)[21*%BCE:U4\12N_ M?*S$GR]RB1'5[?\`E9_SD;YB\H^:-*3S/JM_JGEV-F&JP\^8X!25HH6OPM2E M#F*1.,O3(N7#/C(HT^^-&_YR5_)C6_3"^8SITLAJ(;N*13WH/L YL8ZJ- '9 MH..).QMZII7FSR=K21RZ/YFT^\24?NZ2!6(_R5.^9,,\3U:CADR-;=G4-&ZR M)^R4WKV^C+1*,NK&4*6M$Z@\AQ*D$[;F@I2OAA,1WHXBL5*GINIZ=.N1+*RI MN@_E8&M0!T^D9#ABD@TM`I0MTWJOA[Y/A+ "EG!6))HQJ"K>(R-(^*^F^U0Q M[#)"1"G;DNY'YT[=Q\\E9+(65H=?A:E2:;'I@W"2+;:7X:T^(&E.^VV !>3: ME"2-ZG?V.(-,2;;:3:NYV.]?&F3C5,>%P:E25!/0T)/R)&5FT@*ADJ/C((Z M4R8B$WYN$G[7\QJ -O\`/; ;Z)'O7+,>%*!ZC9>@-/?!$6FO-4:8L2*FN]=Z M`G;>GMAJ2#1ZKEE.Q(W+4"=23VI7;<=L&S'@+JJ8UJ>*5%:M6E/8;;9,2*** MQ34D\R07/Q=Z#>N/TL@`J!JT5A7<\?GUKXY$D'D5(*^CD_#7@*<3L0:]B.O7 M`Q4F*L16O%V^`4^CYT)%:8:I)I1'$DTW`WIT^>-IB+ZMDU IM6NU<"@EJJ[@ MG<"M![^.-)XFC\%179A6F_\`G\L;1Q K:]:LVW@-OPWPBUH=ZVHW&Y(%0/\` M:R7&1S3PCHLYUW -/VC\L'$QKR4RP;[5?B_EK7VWQXE)*QVIMOM7B/';(VFE MI8D59A\0H*U)W&^)(7DJ>H"":BK $KMM7H<'!UI'$>]L2EC1MBIJ0/<;')<0 M#(;K@]30[T -0XR7I4V>BT2"JC<`D54> _AD03T6K\E MX'RR0OJQC#S;9U&Q;D2QI[#&@69'; ;4Z"OWY+A M#7P"^;N0'7X#2H)K0]OZY$R ;!:X,I 8,)% ^TN^V(X2QHK^1X@L":4)`._O MA('13:HU".*CB(R32M1VJ<%TQ IOD":'I&=SMOM]_P!V0+9Q&G,]0[T;BW[% M3L1L*U\/AA!" ZK=R%7]#[?3@H,A&EA)_P#9AB UD+P6(/.IJ>1% M=_G]& Q[E$0L9BU0:EB*@$[T']<%>:>75<@.S$ 4-6_C7)7W%CQTM;G6@-0V M_#L:]#CP][+C+0-69V/2E!7N/;(@5R46>KF-*D@U;=OGDMEL]ZP?$2QY!P.O MM\AUQX60XEP(XGD!0COT/M3L>^'B`Z()/YG$GO=RI] MJK*.B@\0??"+#&6ZD:,!6HW-`-N6W0X5:HM145 H1MV\<3(+:J353M0[D@>X MKO@)#8!8:)Y@^601PN.[5H !4 >-:=:]:4PVQ,:;IML13E4]B*]] MM^V)V3QTM(- '/Q*`:>/S)R01=M$+2T$DU8AA^U7MA/"$@%H\OM,*@M]GJ:4W/TG "$&PTE").-.78@U-? M?Y#)<+(3<_Q'B$!4#;?E2F.X8$ K7;XOB.[&C'<].G7(B:@*+R&K`&HZG_:P M[%E02Z65RST%!QIM4D$]34??B#%:KJ[U68 [U'3<]QWKD32>$=ZPNP(-"ST# M"NZ^.(*F0Y6^2_\`G+?\K-4_,+R78ZUH,#W6M^5)))WM(Z.QN/['Y/W,>HV4CVTUN\3P@K+&P(9*55J@[BG'-9D$<9IS<4 MB(TAAJ#1UX*82H#,.P!%=_GU.4G)Q=&?!YHR+7+E511,R_8TP#( M3L6401R3.#S/B6Z==6;K,;BHGEF=]ZT8)J)PK,-*_,'\Q=!])]'\TWUN*[(TA9>/8,&#=#D)1B.5_ LXY".3UC1/^J:/_P`YO7J<8M?\DI<&A,LU MI)Z8!-30`IOMXX3GR1\V7%C]SUW1_P#G,'\I]55%U"&]T:Y8GCZBNZ)VK4)3 M:M,E'5"?.)8^%QT7\X_RN\PQQG3/.-FS@4].4M&5[4^)1URX:B/4J<1 M[V?VUS97X5K&]M[U"*JT,BMM^&6QS1/5H&,A&R6LR@5B964?'4?J^@Y(D=%H M]Z&X4 )(0G52>>U?GMWIB(IE+A5@Q&X M)WI6IVH37;W-<+"!6,S+]CX]R0#N0:TW/M6F-AENJA@U2]:5JIK3V'X#&T\+ MBX(^(GXA0KVIWKAXB4@*H8&G$D)-!U4(Z&G3>H.2`8DJ@910*!MUKD"? M-0M[`$E6&X!VVZ]?U8-NC97>TQ.^^P[=SA#65%GIL13?[JX2SBL9Z+3D34]/ MPJ<8XPLE"HJO0K7M_GX=,'$UW2F6*@@GJ*\2?#K4=O;'FD-$L:TW%12G^?AD M:94"J<%-?A-!0L1XG:F&RR$0OY"N^S+O7?O[8$K%+-0UJ 2*[BM/;$1#7S*K MN*4%2Q^+Y9*R.3+A"G4A-B0H78 ]-L'->$-^K6J\J[?$:4H*=<.X09MM**KR MY4K0@5V'OD"$FBIM-OTK45%0>A/X=.F2" 0JB38GIO3K^K&^]-+_`%&:E?@( MZ#Z.I]\(D.B-RI"4L#N2&HJUZ^-3]U$M*]*'C\5*EJ[]304J<$J*.&05?6KL>V MZGM_GXY7PR9D@KO5-6 4@$_:V%3WPM?AJ?,5'Q"@/SR5GHRV+G-5W()9NE*_ M=X802BAWN)IT.W<=\F8L02XNRLJM3I4^'AO]^5\)9.)Z=:L=J>VW3"8E32TM ML1L7K6M:8**^GHB%J=SN#U3VP+N&ZFAJ"Y9:BIZ5_5D:`22.]3?D:"@K^T*] MOGXY<#W,'*PKU4D4J!_'$CS9BE3?8T/8_*A\N&(#'A*\\J[$"O3PID9 )BL9@?M&F_'AO MU\21XY(4@VN4J"*D5!H=_'I3$[,:!Z+6K4*:BBUW';W[9$228MH0:DU#=]Z; M^U/;( ,XG;FTS<3U)6E2:G?V.6"118;7CN1U;!)^_$I!;8U%/MA@>G0T M[8[ *8VI!&-#]IAOR'6@&_T8.(J;Z*H.U*U)6J^&1JV!![W;T)-".P'4?,8= MAR0ZI-?YJU4TV\<-E7'@585KN2/&G4?=CNO"2I5#A6 Y5^*K"GX=L&Z\)#9) MKU.^]FXW[5&2X?)-GJYB[48=6%&/? MQ[^.$11388[U7[5=_#MMTQ,2S$@LKS%>K#[3;U/C[;^^0X0FK;0<@#N*CX:4 M`'+?MUZX?Y/&4/*JD&I* MFHXGY[?QR#"DK*L&Y:KD4;DH('V>NWC3P\<-/!$4"W:I5 MB(F4_#X=32F4SQQDGQ,@Z, O/(_F:PD$=YIUPE'XO(5!!Z4H:GH#F/X9CUMF M,DCY)SHGY6^<=6TY]3TVP,T$$KQ2;J"Q0T!4-0G?IAXN)G&,O)+K_P`D><]) M>1+O1IZKNY%&!H/M`K44.U,D83/)!F =T@]:_M7 FMY8U4_%&PX[TW^CKD8X M9=4G("B8-=FB$ID=F^)>0:E:;@<:]:4KAE&D"1/)&QZ_509%#([48$T9@-P# MMT-*Y6"04\)1B:G9.0KJ>4IV!->,8Z@"F7^+MNQ )\EP?3'(*R -R_=(U1_K M`GKOMTQ ![D2V1*Z= 65HYT:0FI*MX[#N#M7(;;V`42XSR*:VVI>9])F]2PU MFZM0I7TO3D;B:M3<5- -S\Z9`X(2Z?:B.2<.;TC1O^<@/SET%PT7FF:Y",>< M5RJ2J#7N2M=\)PRC]-_.V\9CW/6]$_YS2\]VH":UH%CJ:J/C< 1N>)WJ`AZU MQ\;+Y+XD!S>M:%_SFMY,NZC7?*]YIKL-Y(7,JU[T''MMA&LERX268QQERE3U MS1?^[1U()!._P^QZ9,:J(^OTL/ /0V]3T_S+Y9U; MC)IOF"PO!4&,1S $U'@1XG+8ZK&>1M/@S">B%VH0IE!J05HVQW'3+N('DU$2 M"@5 )!%&_9!V/TY($]&,FRE:ML2._M^O($'N4%1*L*BC!OV'J=^6V"PRM=QW M-34H:=^O7O\`/#36;6.U#RH2#L01[]?Z8:3&5.- H -!7X0OS.Y]L(E%3'K; MF8U KMV/4@_[73)&5L1.ER,#Q4U->PV^DG[LBH *H):DK6M=Z?K_`!P\19T` MYG!J2P6G>N#8]$65CR _`?B#@$[]AXXF)38=Z@^T"=@`10U^D8TM`KN9('P[ M>_W9(,>&EPDV8C=J;4Z^'?Y9`Q2+;#TY$FH'8]*'H01@JD^III-UY#CR) `# M&NU=_NPIH(=WJ$:E:_$5KT^G&D$4HE@U>'E?2+5^CI7Z,%K*15$WX$N#_, MKG?EOOD*1!=NM!NW(_M[@?TQV#+=L4K4E2.A`.V-AD"7%N=-S4+T&VYZ[Y*Z M0;46IM45Z54$C[P,(DPX#WMJ&V(^T*%0*['?JDX!!:M=Z&O]/IPB10(4TA/(_%0D].NYZFAR1/DFR%SM44%6Y$@CN"*5 MJ/IR`YLN)0+DT6A51MMAMAMWM!J5'*B[5*]!_'#9*; "KS^+H2JBH)/Q5\1\ M\@20L JB:I!J2O=>N_CA!OJR)(Y-B?DO$K7?K4[^&V2(6!OFWZIKR_98U\=_ MGCS9>YOZQ6J@_#0\A7]>"F!'FO\`7%*A=S]D?Q^6`VQC*EWJ@5VJ0=Q78^XQ M; `5190PJ?#?Y802$2!<)%)Y$5+-MO6H!WVQ-L!:[U!6M1Q WJ=SED3\%,"V MS */@YG8[>_3[LAQ>:\)7HQ)-6J7)9C]%*?A7)\2@TJ\SWH>AI[#QR"^E28K M\(8E5!"]PNX\2.G?)'W+2]:FIVY,=F^CI6@\,;\D+@S,0/V11N)\-_OR!W9& MP&JLQW(^/PVV%:?3ODA%,"&B`U.5*\06([G?8>V]<2>Y)!M:F_PLW+CL33KX M979*`%0_'U&Q]^G>N6")3(K"P)ZBC4((\"!OCQ$-9BNXCQJ1N3XC'B*02&BO MQ$NM"PJ6/MD;4RMR_$M-AWZU_##Q%-2=L :GKM0]_E@YLN$+B=E*M4#P/VJ= M_P`(WXJ.E.QQ( M/>H*ZOPGE44[UID=^]EMT:!IQ+=0=S]'7#PE'Q:V^8!K4BN.X4EN.E*L*G<\ M3MMVKWR%6ILM@)W'AV]JY$K1+F W!K3J:_PPQ&[+ MA #0JJK0$@U-":GZBT(*_:-:U.$"D"/FL+$]2? M]6N3V'1B05YHM& +$5\>_4>!(R&_X'CC5LJ"U:U:HX]PIZ';]6)0ARO MP $5(VX>%-Z^V1%]Z.&T/+"24Y+0/]KCN1WH1].QP[MD8(;ZNP.X.QV0;4'N M.^2V8R'$L:-AN:]N7]@PVPNE-HR*'A\#=:G\:X"?-D"$'<(6Y"AY=AT/^>^1 M,ST+/B8S>V)E5MBH(+?%O@Y-=,!U+R^)&(XD5/5>P['MUKD3'R;;`8A=>7I8 MJ,K&@^SR'6O7O7*S'S0)5T2:?07J_JP+,JCK(!04WZ]0.^0([C;(S)Z("/3V MLH@B6_U=1\7I( ``QIL.X%1D!:B16E&97BE0LM"&5UV900>)'ON3D8SE$MG- M);SRUHFH#EJ&B6EQ1OA;A4$'Y>/7+#GDQ,&":C^3OD/4RX?2S:2=.=N[`&NY MX@G...^;S_`%/_`)QTT:9F&G:M);)R H-@VXW`ROAA)B>-Y_J M7_..WFFW$AT^^AOBHK3DJ\C3KN=]^PQE@1Q2'1@>I?E;Y[TMAZND22!#\+)Q M:@(`!-#L2=S[8(X)#H%XQU##KNPU[39'%W87$-/A]-@14[C?84^>"8D-K6,@ MM_2]]%(>4[ +L5.X8$U ->WOE<8\*[21<7F1^:%V!YJ.0.Y!`^$$GZ=\D>)L MXJ1,6NVU5YP@G...=_P)P<18\(GT3VPO_+DI(NI"B^IS! KMQ._TC;"2 M60CMM05Y[3RQ?*3;WTI MVKE1A7*_FV#-,\Z^3U?1_P#G*W\X-$DB2^N[;5;=6^)9845G%*T!"FI'?VPB M>2/(AE7?3U'1_P#G-NZ01)YA\DQRL#222VEX#?P'`=>N2&IF.8MK/#WEZMI' M_.7OY57\BIJ O-%+K63FC2!2!XA=@.N6QU!E_ 5X0.KUK1OSE_*S7BIL/.MD M))":0SXYA".C;)/4^.^2X:8CGR5J5/,!B:T(J*`#N<=@RY*9H`>5 C5+$$E=M_]K&T6"I$ MD@,QW&^U=J[G\,0"1LIB!S;#/R*@['K4=2??(CS7A!ZN1VI5R23\17KM4]?; MPP&73/XKRWL%!'Q;[#QQM!(4 MBX?C\)^$_ #T^[$$]6!C2BU-]ZJ0>GAT_ABP-.!+!@=P#M7QI^.'DD&EHVY M`[G?PZ=<*7%U``/Q"IJ1_3!PVF5+Q(0$V/+E0'I3&01'8KZD@+T/+A^77QR0OHO"HW?VW&1X$ MFRT`5.X`/@/N%,E7"P(;(:A-2M>U`?UY4;5:.K47PJ-Z'V%&1L)IRM\2TJ 10@5K7WR-(%E47?KT!(Z_KQIE M16D`$FM.YIOT[Y(2+&FPU3U%3N*]?;;&B6QU36OVCM5:^'ZL2*# D]'5!Z;C MEX?AMX9 $,0MH:_8%>73?QQXC;*AWO\`_]/U:0A&X)!8Y=Q MI\)4J:U!'0^Q^CKCQ%K.Z@`".@`-*'Q W'T;9):"HR L36A9BP%:@5'88 3W M(V6A0.0)!/4$"E/&N2XBFU@0E@#0UJ3O[>&5D@K85.(XD'D13>O6GOCQ!"F_ M0K7EM1C6G]N)DJ[X?BHK47;B3O\`3[X@%EPE;79J*21^R-S[9+A\T#92+,U" MQH!V_5TQJN13QGHI4KU!&YV)JW3VP5YIHE3V%:BBOXGI0=ZX*12UE/P4`J31 MFKML/#YX[,0AY%"L:<>(`XQ']FFP%,D+9T@I8@0...[C_/[L2+5 2V<<@- M%H/ Y&5AF:DE4VCQ,SL%+$4:A%*5&Y'T'(QWYJ=N262Z`O&O#F3L>7?>F)@& M/$>])9O+:/S 4@[[CKTV/AOD# )L)=-Y3-0W&H:M5'B/$=NN`109% OY45%' M&,J$H%4]".PPF)4'O49/+*!6+P@U\!UIT/\`;@\(IL#E:67'EHE22O&JTH>P M)!ZX!C".))Y/+LAJRL:C[-!R`[5]O"N0,"68F1R2V;2;L2 &K'N#O1NM#X[; M8/!+/B2C4-%BN8F2[T^*8,#4.O*@\:?ADQ"0:I@4PJ__`"Y\FW_,7GE^-!(N M\B5!%#TV_5AW'-IC`WLP34?R"\E77+TC/8N[%G JW4=C6G7O@,_)LX)^Y@&I M?\XTTD+:9KRGX_ACD6A.W3[0J>NYR$1:."8>>:A^0WGS3]XH$O%"FJQNM#R% M01\1Z#+!#N+*,I#F& ZAY-\UZ4>=[I-Q$4)-$7D*_.M,HGBDS\1*VFU2U>02 MQR(6Y? ZTW^GPWRNJ1QE5BUN[BI(TC<*CB>X)%%(]P,E$EG9I'KYEW"3Q"15 M0*ZI04:FQ!/:N9.T1S8"1.U6C!KUG(A26(CA1FI6C<1W^68AF)%D<>S:7&GS M%"\J&4E*DC8]/U],R1EB!5M?AUS7"UM9FI'*%9J@RFU#D>&,N;/'? M2TUL]5US3F%QI^LW5J[N>$,4S+3@W6E2`/#*)8XWMLV S',_-Z%I/YV_FWH( M46WF^[FC!^!)U204`K0U6N_7#''(J:)_P`YA_F;9\(]6M++6% 6 ML3H(RRFNWPH:D=CEI\8->YZEHW_.:NFN$3S!Y/>#C_>3VTU0/'8Q MT.XRHZR7JUPCD*W>M$Z4RT:R)YJ M<==;>HZ5^:7Y-1M6C\JD=-J_+KB+8\ :9^2C MES#,:D[&F)*:DHGL=Z^-/'O]V2$2M -NPI7F!CPANE!]K?M[83.O-EPAM20:$[D'8#^/\.^ RM'".]U=@'(`K]GI].1; M(D=[?(!CUHVP!W:H\,+"0OJL+5'4<*TH`:[[4)P4.C$1\T#<:Q^_E`_NK=& -!4[LIWIUIA&4 M=$F%O*=8_P"M.-0:93.4DP$1U>1ZW^"%0HH3U/P@T\,IXN\L[KD\]D\V7TDKS&\G:5VY%D<\J@'<4)I2G7 M)&,*V)7B)YA':M_SD1YY\@Z9IEGHMW%665;M%F*JG[2_#4#>F^0BA:-^:OY=^8&XZ3YNL;ERP4Q M,Q7XCU!K0@T&6QU6/E;'PI=S.(;ZUNQZD-W!.C$`&-UZG8 TRT3C+D6)QR[D M4Y=37C]FI8;@^Q!H?NR0BD J0D^%>9Z[FO6F]=J"F1(:R'%Z)5MF%.7>I\,D M`5 +A*%-""*MTK4[X\(*3%OF"3U-30X\)#($M@EEYUW9JT/8#8'Z:5QXB&)) M7%J%J'D#]@>WSP$E-ELNWPF@--RO7KM^O!Q)-*H<_:I78[UZ=CDB>YK5O5/V M2Q)!(X]OIR-!F*6&2IJ34CK3I3#89KTN"-BI%=V(\?'Z,:!ZL.->UP7_`&J5 MI2GM@9<^2^.8+6A)[[^.'P_I]V1B2Q)[UW)&/(T85WVWKVW\=\ MG9*!31OBE?;!\6HR* MT;M3?D138]:^&'ER*19;)IQ\2WV/':FWOAXB>K(Q6!QM]D$G9A^K#6S#=U"* M@;K6K4V'T8(112IS>M*BG/[/M3[_`'^66;6RX1WO_]3U9\)!/4#[=">WCF60 M2X0D0WR'7XN(W\?;^.#A2*ZM&I(78D_LUIT_5C[DW%JAWJ0@[=RW?Z*5PB18 M&EC-T)4T)ZUV-,GQ6M+F!X]"*$54[?CD2+8[+*EE("FF_@/UY$Q945K?$RT! M+"M6)H*>WR_')@4HV75/PJ2:_LC?Z*T_5D9,N(K6(K0^Y/A7Y?PP1D>]@8VA MV8+Q!J3]D 5PR)4&G U&R4I3\,35,K\U@ '(T%6Z@[CX?Z9"U%GFZOPGJ:]A MMTV_'+1$(*#E8EJF@Y-N*^ [XF0910TAZ@#DNU!7?KD1?1:\D(6K4;DKO]%= MLB;ZI! 5!\5#6E5V'O@3Q!;V7^8#XJ8>(H/DHM"00I44H #7:G]F$DL.`KC$ MII10"*\*CJ0/# 06?$5Y@A:GP5\17;IOCLGBM0-C&]>0!%=AT[4&WODJV872 M>6WD_8V8[BM1L-MOH&1WBQ*72:(A/PI1#\3=MF%33PWQH'FRC:32^7`U%9 M0QJ37OM]FN0X`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`'L>W^>V"UC$K&G6K G;N/;"+6A:%DN>(; MCW'P@8$[=Z5:MJ(L]*U2\Y@"TLYY?B-""J'B0>Q!Z' 2`"2D'N?F9>><-0UB M/Z[?7$ES<7/&6KGNU `1VIUS!@>,LY2(22YU61D"!FI%4D5W-0`2?IS/@(Q' M<@3D4)-J#\BG*OQ+2AW+=Q\Z=,J,QWM1QGN0CWO(RR%BIE?X5'5C7O\`C]&5 MV#U91A7,+#<HBK38

H`ZU)H<,Q^*9QI769;%'HQC,O6-(_P"^71G*//=B3C/0O8M$_YS!_+O4E@_2NGZAHTTCGU"5,J(H^RS,$IT[9* M.JK^$L/#OD1\'I.E_P#.1'Y/:I*\5MYL2V>+=A/&X4[5^$E14FNV$:B)Y[,3 MB9MIGYC^1-7@]2R\T6-PH4,ZLY4@$=P1L?;+!GATD@0DR6+5M/G6/ZMJ=M." M``8Y4)!/0]>M"P`+*5/B:;^ M_I@(7;N55)XU-:]>(WJ>^W3KO@XJZI,1[EZL>(I3X=E-=JC?\,=N]$;"PR+W MY#B#P4&A--J^^&^YB96J[UZ\E'7QZ_P\,&Z\-*3R5>AH0:U4]?;#3,^388[_ M`!'C4 CMVQMCP%6::E%8$\CM3?I7$A=^BQ9-J#H/HH.VV***J7JI+'H.AZX; M[F5AKU16A<5.]/:@Q(12($I)-!6F]#T)_LR)V3$$+#*3N#2O4$UVP0I.ZLLS M4-0#4BM3OUZ@=\D5$>]:91R#59@#LIZ#^F$"V)I$1S=&)V;KN13#8&Q2+Z.5 M@1UX['X>1:H-:U!Q)'-NX/VQ\._XC!<>]EQ+^6Q//J=E`WI_GOC<>]F&BPY&J@$T" >(WZ>WZL!* M[K.7#EO4':AWVZU^>^V-(-.0N:5J`: `GIJ6\,CZ65+2U ":C?OCPEC9[V_AK4@`[D&E#].'C9B+JT\:+LU*]NOZ\%E MB8.Y+]JK5KOUZ=AX5P64;/\`_]7U:VW("@`W*_JS.^EP:/5JC*!1MZ;#K]X] M\ E:B*PBO(;&G:O\/;(&QR9'9BBIDD[*!3J:[UIT[CI@V6E,G$%WK M*C$5J:%QOOMU)&#B\TGXXH,BIDH0Q(X\J]^@(ZXHH%:8HV6I( MV7[1.Y]\("1$J LX7'$[@[L:4V^?7)$H(!0TFDPO\)0H&V!ZGY^'^>^1XUX# MT2R70X6)`-!NQ_JU!X?1B`>K$[I%/Y>KNZVU<-6O$0 ME,OE\\*$!B23[DC?Z-^^)@.B\92Z?0I5JJ,5+B@%.I%"-O8Y28#N9Q(*72Z5 M*#&NKS_4/^<7(4-.)K05P2Q$K%[O3-6M*I/:31-'U+!A0;TI7KMD/"G% ME#+#HM6^NXG%7J3\2HVX[U)\.N8THDLN'JB4URZ"J"%>,'C2O0]>0^9P0CP, M@1+8E&CS`"JK) .NY^D9,3-[ID(@(A=8L)VH4XAM@Q^(\J[_V899& M$."T0+C39B1'*JFA)_R3W;[P,3,`E!$"HEB,\QT+T/3/ MSX_-G19'>#S3<3Q%>7IS*D@!!WJ"O<'(1TN0;B3;'4 \P'IVD_\`.7GY@6@* MZQIUE?\`'X7=P%._1MD(^?MDA.L^4YK%C/5Z'IG_.3_P"5^J&-6O[C3GDXT6Y1PH4]=PO@ M#7#^9[Q2G%7(AZ)IOYF^1]65#8^9K)UD')(VD*DBNW51WQ&IQH.&13#6O.7E MK0;6VO=7UFWMK*]F6"WN`WJ(9'^(!BM:5![X99QWL/"(Z(RV\PZ'J2HVGZQ: M7I9JA(Y1RIT[@8C/"2>"7_P`/?EQYCO68AI8/J]N:TJTK4 _&GOAS M1/ =T"P_-Q#)';V<-5 "+0>RFGWBF4:8" 8Y+DT\S+S9I ?BK(X-"H J2?#V MS(E*71KL\ELDG(15CXB(J:UI6O8GYD4RG!!$2NU:BIV]CA M/%>S#B(2$I4]B3'H&XP05VKZE>*5Z#J3]^2,@R%JK;,U1LPKS'3WKD# M`=R@K0:EC39=N!_:KL*?2<%5R# B7>VQ9E%.K#H=ZBG?$PF4@CO7"=J[U%*! MEZ]A3\*8. ][,2I49N2 U%=ZU%0:4/3Y5R-2ZLA)WKOQ4*Q6$$,BBHK2I&U1 MX[9*6('DQXJ1\&KZK;\3;:E<6[*:*4E=:4\-]J&A&,8`=&$Z>AZ%^7G M#Z=YNO"(P2Z3<9EV)M3*E_K #IH./3I3^& M2 I )[U1)J[%V)K3B>G>N1)MEQ6J?6.17:Y)2:-4$[\2?&F2XZ9-F8M\0%>'8&G7!%B2%R2%B5V%1\"C9J^.2(+$ E4 M#JZ]J?:^=,B12:7+(M5 %6/8#XM\B;9 .YK0`D=:H-=]O M#[\D)$,6B PH:$UW->^-EEPE;7M45\*_Q_CC11OWO__6]4K\-"JC:E >WOF8 M13A<7@[K6^(U84\2.F2V"\)6D$"A(*D4(^?0_1D#,)W#=2/VN2MUIVVZXDA. MZF0I+;&H/CX`;Y,4QW;-*@#X@>]>AP*HEF.YJ67[5>E?&F1(*>&U.OQC9034 MU)_'W]L'$5 :ZKR&YK45VK_3$2"D'O65-!R))).XV^C)&)+ ^]SL.+%@58T8 MGIM[G(\(2 A)-ZT;K3[NWR^63 (9\2$F-*UZ>&#HQM#4"FM!3&_OAXRICW+" %`8[#=^1[DG(& MR@1(7?%3XE-25KX5K0D??OD8DAL65%'->7QG:O6I)V_SZ9)5J[I0DUI1N^U: M;_1AM%US6,Q)/+?KOU]Z5_#(DAC$KVE/&M*M6K #N0-SA!M304_4)JS&O$5X MGOX#VH=ZX3LGXJK2-R-:4!V-.@!K7Z>^"U-]ZHCCQ!KUJ32IW_7BPX1WMK(" M#ORXDT1:>._7OXX-RRNNJKSY"C)6IV'M3VP[)NUM.74`;U )H#MD@1T394V2 M-RZG=B"0.P/8UP;L:"D]HC]>/ FE.I^=,4F1Z(&;38'%#%S!._8_=AH-0-\T M#+HL,A!"4(.X`VH.N1;.! 3Z`"VRCBQV!\-J5QH(N,4EF\NMQ)"5:K `5J.O M:O3!* Z,A,E+;CRVQ))B!I]H>/AM7*>%*3W'EZJ&L7/<\P1N!0Y9P6RXI)3/ MH#$;K5^5*"NWB"/;!&(8@VD\GE\?%Q'$4H:=!]^0(!Y,KI R:+,G/XB?%#6G M$>_AX^V1\,]Z1)"26,[%I#\0:0AC6M&]A3HU#B17)B)7S2FYT6VN*BZL8;DD M$>H\:DL.A/0=C2N#Q9LO#BQ"_P#RU\FZAM<:#$C @*$Y+0=]ZBGMDQ.3"6(' MD6#7_P"0ODZZD)MWN+/U.-*,6 IO_,*Y,9 T>">]A.H?\XXHQ+Z7K2NH/-$F M4J*$;&O+K6IP&$9AZC'PI'FR\44QB?2]7M&3U;66-SU1U/,;= M\CX9@L9QGU0HO;Z)-I&'#F/3!H33K0'J1A$2>6S?Q&MD5'KVH05<$%GY<01T MVIT\-\J(FB)KN1J>8"559("Q%.E2-UZU[TQX"&SC!5TUJSD2.JT7H WZ_P!> M$;=$3FK17&G2@()@.I->@V-/N&5RF>@MB**](HR(G@G*L!T&^QQ$(RY@,HV. MJ,^NWDR_4Y;Z2>U2A6)F+(&"AE8J20:@['VRZ.G@.Y8YI'F56/4+NU:":&XD MMV#45T<@H"#O4;=^F4SQ1ER#/Q/-/X_-/F/4K2;2]4U:ZOK*8HS6TTC,E4;8 M4[]*^V2A`\K:Y3VYHPT,@B8A9:"O+W&2@8A@(RZ%1:-E*<3P M/(!@3VWWQG,]"@R/4)]%#Z<:QA0[5'7<>Q(\*=<8S);!#J\(UN<3:MJ,AJRM M,5W-2Q&U3].4R,@F6R6DEVCY`T4\JU_"G?KB`2PC%KA6E#4,_P`9Z';H,D8U MR+$R"\#X>##X:I.&6,A'B.=MJU))/P@'[_P#/_:P52?$[E9RJ MCA7B8^(=*C8'>M>VQZ]L@2GCMI:T9J=-V/0;G^W)`R'5C+9H$!FJ68$U)KW( M`&_A7)FLZ3_P`Y<_FEIJI#>W%CJL<)J[R1+$Q7N*A.M.^2!RCD1\E$HGG%ZOI7_.;$ M?-!K7DPLCL!ZUO<`LH(V)!3OXC)_F)Q&X^3+@B>6SU+1_P#G+O\`*C4N*7WU M[17D<*&GCD<&O^JE`*@X8:H#G$A/@$\B'JVE_G/^5^LR"'3_`#E82.Q!6.0L MA/<'XAUVRS\UC/5J.&0\V=V&LZ1JJ^II^IVM\ 13TI036@.XIMEHD#R8\ [D MS^.AH:<:4Z<2=FIT^^H. M&B&LWT:8U(I6M0*=:5[X\96(M>SL`P4_$""I8_":^)]\`L]6[@6NU2:KR"&C M`;FO^9IC3 Q\UP8;EBI^*M#XT !VP;A 7!B&J27/4[[>&+/@"WU&%!784!!Z M4H#T[_/#2F2])7X)7912NV_&GCDKKJBAW*IFJ35AMN3XGMD=U$3[FQ&E1+BA1>[;DU[#^W)2D3U9W2IZX4DNR@`UK6EG\G7!18N,AXLSK\*]-ZBIPC9/$MY '[!)Z@_1WQ^*"7FZ@; >-?HR-%% M%85J?B.XJ*]JT[')"0[EM80`0*;TW(%3M3I3OD@2RB2%-B5!JQ9NM!O4=B*= ML3 E)(4=@#RZ=';>M.W7(F#'B*]R"#U)KOQ\3TK\\@S$B5H^( JHZE@`>IZ' M[J8;6B.2F_V?%6H50"I_SKBP)0S[`=>1J0M*C;KO].2B&1-J+*3]K>@^'?&@ MBD(L7$4(KR)-"*#[L22RXBI-Z@J4XFII0BA:E/BK@%%%KJ%A4@'?8=JCQ/?( M@5R;%K= 6''>K#]6%I(*T]0H++0!J%J=-\2;4 E3(!8?#\&Y84IL=\6P1IK8 M*5[]<;1QJ3KR*CF0`]:]14BF_P!^1(M-$\U3D5^,_%1@25VZ[8B-,ME "I W M`I4MU]MA[88R:2 J]?#MDT`6N9R5[[;FN1XQW-O!MLL$E*K2BU K4UZ]ZY/ MB!815?65C2E>(.Q&YKD=T[7NVTP8BI^R`2@-:5\>_MD3,IH+TE!6GVMZ\AX? MKWQBI\G/(K5J*@?9\1XU^>31P7S6H$;>E6(I]_\`9@) 1P`*31K4"G+K7O[T MQ9"-(=[2-GW7D"2">U3T.2! YIM"R:3":\T`IUI3'9KYI;+H<3$-Q^'<;[4! MIUP4S I 2>6DHQ"G8&@)ZCN*>]- *]]OH-1MCN$<0Z)/ M-Y=^W1&#'CR8?M!J@$>_OA'$QV2V;R^10F(%U(8[=@H'V?<;4QILC82J30%% M&6.KOU8^(K]W6E,ADQVGB"72Z$3RX(P0@4J-CQZ;Y2,!7B!Y(&729*\14%C4 M%MZTZ[>QR7A5U:^'R0[Z=< GYTXD5'S R!%%L&_1)Y]&M;JHNM.CN@5HYD0" MK ;'E\J9?$EB<<3T8;>_EKY-NQ(T^A1*K5^.-2M *?9W`/MDQ*7^1)$F/!*/5@&I_D=YOL0[P)'-8Y0S-R8G>FZ@4&X]S7$8I,^*EZZA,75:D(>3.E=P>AS M(@3 ;M!B9EE.CWIG0SOL(V:/_6"G?_;R''$GN;1&0V9']=#DUJ$<$@TH!Q% M*Y/CODUF("J+E1(.I,:\N--]R!0^-:UQC:/%*I]84N"Q!"@$MX;UZ_.F3G!D M,M+XGI)$&('QAW[T!WWRL$CDDB4D]:_@0RSN_!.#NM>@H*5K[G:F0F2SA&8? M/+2B:>1G( DE=IJ]R/L@?3E4!NW=.:@':E>6S5XKW(&_+^&6DM'#?5>0>"LU M58;D`[T'Q#(@7U8"%W7Z:Y AM$^]90A5*4)(^%OGX`;TK MB)16BV.(<,11:@_#6@)V8Y8+'2V)`/5MJL>-!114C<5H*]_'(2'$P\+S6L:5 M#':I`3O]D=?"G; )4RJNJ[D3*5(HIZ?M?/\`LQV/-B25PK41 MD8CDSB._9:0U.H-1\3#H33;_`&LLXH4BR.K?,D! 0.+5;EO]H#ID1$=$DCWM MHPX@]:UI3L-]\'),0.YKD:9^>?YJZ80+?SE=^ MFC<568(_05WJ-M\!!!VD6?''R>AZ/_SEI^:NGLIO+FRU925+"6%5WH0=U%-Q MWPG-FZ'[&'%CZO5M*_YS;NP6&L^38I$(!46TWTD?8 &68YY!N:/N92\,\K#T M[1_^.6G4`\XE,<'6P]-T_P#YR#_* M'5"PA\XP1,O'DLR2)UV[KURT:J('-B8@W' MXX?>C9H@585H>BGN/&HQL=$&E-R%XEB0OQM1[>WTY K5*+( MJN')^R#L.XZ[C$3(4DGD&G12`#4U;?CX_+MDK!40+14D56I*G<+[#\?;(E)O MJIN%*&NQ/4CY=Q_#&@PM:17V5>B]"VP^[Y8WW):*JRFAY*NW,'8D]Z^QP;E- M!0948A2I^(BC5Z5%3]QQHK14VB(!(K0[@;CZ=\8D][+A*CZ:[$+6NX%2X6(FM$( ! MI0?RGK3WP66?$%-H^)/7=ME[4'7&T&*FZ,1LQ!_:%?U_CA!8`TIDUITIT/'V MZX\-HXB>JQBI*D@U`VK3#PJN6I^*@I4`@G(<";;8`U]^OO[8"2V"`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`5B>:)RHQ)KQ[G*C&FT>]Q!HM02#N*UW[&F3 M'"$'AZE:VR*M`PDJK)7L((KMW&U:Y(7W)JG*I5E MC< L!4^!H:UIX[Y"0 9"-JA;FO,&M3U)[@[;]LG$RKFPE!:00I(HS5!9*<1N M.WTG[L!X2N/'YMOR?@JOQ!WYG:M*?#\ZC!NV$4M4"M0H4(U5)W(`KL?I)QXB M&$9VTP-9.3T5J5'B1T_$X005.9L,.*D[;%B6/3Z/F,M>@+D?02@H2=@>O4[C)D!K!ET=4BA4T(%*# M^53U^BI )C(]%0*14%:A&/P@]^OZSCPCHF,9#HXOQW/C4@]*5WR7 .I7B/ MD;#S7J%N8*<5$Q;8'P8-7Z1@&(CD2RED 9[IW_.2'YNZ;,EQ'YK M>[DCY>*-D;_6 4';Z,($X_P`3#C\GJ&C_`/.9'GJTND&LZ58:E;P@I/%' M2(NP8T(/$TZ]3CXN3OOW*91/(/8M)_YS/\FW#(NL>6KW322.4L<@EITKLJ[B MN3CG(YQ+7& /5Z39_P#.47Y/WTOI/Y@>QH!\4D4@!)KL:IX?=7+/S0/-MX*Z MVSC2?SC_`"TU]XX-,\WV4LDIH Q*&O<'D/??)C/ _P`3$QD]"@OK*[2MM=V] MRFW"2&0$&OAEPKHQHCDBQR=11#R8[A0:T^@'QR0#7PVM(XUY(5HPVI0=Q_'" M:*:(;Z]2`%'P]_?^.0I'$&ZED6K'D3\0K4GY#%()6\@:`L!44W.VW3"&1E:_ MUCON.76G+;P_MP[L'__1]0"I*GH30T7V]SF;1[W7MGEVJ14U3M7$>].ZXM4D M#<#<_P!N,B$AP<@I7<@;CY'M]^5+QEJH9NP`I4"M=A7?OOD^!B-UA-"O912G M4]?]O!Q'O9[+B>1W4*1T/^?RP[KPN5J@\37L#VJ.O8Y+A9#9::]M]_BITWZG MH.V1I92#GJ?A`) .Y)_IOMDN*+&K4]R:@%2#LM1O3I7YY"V0!7.1U(I7:M?N M&W481[V)!6!J-0LH[,!^&,MF.ZWB.2'NK?$#6E*$5IE=!-- $%:4#';2E35C2K$$'?Y'YX;(;1$]&G!^)3\)!_>AO;K M\L$0I!6%?B(7M.Q/T9(T&-*83[6W("I4$[_`#WR)I1;?#E6II2E0 1V MZX!01Q%#D)44'':AIL?F1D@;31:X`* 3]KI7O[XT1R1NI>DI8DT!'[0V^>_S MQ3%3>(44*/B!)H/#^N0,65E#A$),90LP^)J&BU/X5R/".]!I8\7[74 C;H?N MR5E H^3C$?VEVH/3?IBI[ MPI-5J]3N.(&]/ _?AH=46IT-02 &`HIW[]2$=ZXTW#=#V/\`GOD*MGOT M4W+#94KTH!U^["!2*#:D'B%&S&@)K7^N%DIM\=.2C<;\JBH[T'M@IAL6P>/( MT J:'KT'2GOA7@'1:\C!2*4[CY#QKC3 Q +@YW/B#1>NYI6ORPEG$CHJ>J>I M.Q%0#L3X_KR-19+.9:G3DK<0H[TJ1_3Z<*FU7UJUJ>G0=:CK7\<=V'">]=ZO M[7B:4-10?+#S9@4VTI ['VKM].#DDBU3U2H)J5%=P/X9(FT57)=ZW*HZT((7 MZ.^1KN:B2N,B\EKU['>@]O:N'B+(1:Y)QX4<)D@9-(B(4D \JEJ8*9U27RZ#'LP"DUJ5]NGX5K3"B4BD]UY=JKE4 M"L-_:A_I7ID>$,A8#';ORP?C`B#%2#P^5-Q7P\,(B.YK,Y,P8<:'Y5RV6(=Z8S/PH?'V^G)QX3U9'$3U0&JW#)I\L?(%GD55KU%*FA'@:8;$6R.,#O8A7F@Y MMQ# '?VZX/?E\ZY'A+&4;Y %*L/HR1 "/$KENMIS526X M\?A%:FM=]J>-<,0"U2(*_D&"<6^%FJA:NQ;K^&'PS_"L8]ZRBBK,U%+%4'3H M:#Y_TQ!#:(M_$]5JM3N:_9J=P:^W3"2 @Q/N:-&%2P5MBQ)V##JORH,BP$!W MM\P&8D$<:D "N]*T^D'#1Z,E0$MQ_FNX-1^!&$BTPQK0_*@/P'FU?"E-S^ P`5Y)E&EU M6Y\6)Y(P1J^V]1]'3(\*/FT6K\;'X0.2L#7>E#MDQ$CJF,JZ-]*H #0$-0)TKW&_OD" F- M="U6JR5&T?[S<]3TZ>V&Y*!'O7L7YDKN9*5J-E-!^O!&CS03356:I.Q=ARWV M&P[?/)")_A08`[N]2A%!R"T!7QZ]/GUPF^K$1@O5Q4DJ)%]J4[T-3[Y3+R;A M&@Y6`):@+1-16![&E:[Y.$ 0TDA-[;S!K5F%^HZQ>VA0\U"3NNPV8;'P)R/ M//YME=S-](_.3\RM#<2:?YOOU!V"2LL@W!'[2D[=<1C[I?:D92]'TC_G*_\` M-FP`675+74E'$?O[=!RX[$\@/??;+?$RQ1PQEW_!Z3I'_.:_F&-(OTYY2M+K MCQ]26";T@030GB8^HK]^7QU$NK$PCYO4M*_YS+\A7TD:ZIHNHZ6RI66X'[W< MD@<55:TH/NPG4Q[D<% O_TO4`#TKUD(^( M&@'(>.9G'3@U...#L:=3X8;M;+8%6;E4J3O7;IAM(!;JH+=:'H3U![_AE M9BI!4Q6I5=CW/<@>/T8FRP%N)K53UH2E<0"$[-M0[FO$4IOX#P_SKDA*7>MK MO#<&H!()\=CMX8.(][(1M3^RRUZ;T3W [_C3"+017)8Q:FX/;A6G?;MVK@KR M8@MDG:M*;\1T\1U^>2,J0TS?9H3W)'0"E*?B$^;1Y$E!\9#,23 M\C7;N!@9`*=0'Y&HYG[--M_B.$(X%Q91]JE"2QZU`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`ZMK=+@:G3^WZ M,>*VKJV&%%7B:*=C[4--L1$L[H.+`%F!I78D=EH.OO[X*(3C50R@\Z[@#D3X M=C\L%D'DRD;4E JB*H*U3D.M.HV'^?7+C,5R:0-VP.4C! 6W/4;?+WQ$R$GU M.0Y%F2&OB)0<2O*K2UZ_+Z,;)YM9DOY M,I!V-%K6O<[8\'FH)[VMF"ES6M5(I]YI[9'BKZ0RB!WM.*(JUWJ%)!Z'>IVZ MUZ8>,E1.NJ\E2RN!1U!HG16J#M3Z,%R*\0+2@"OJ4XGN->)VKR'+K6HH,$1 M;49EO;(`WHI`[;]=_;(-M!8%!=EJ* ,`2:5)'[7 MM3+"0!LQ-CF6D/Q <:5)YI7N=AC&9[FOXMU0/RH>5#QZTKWV^_(R(/1L'%T< M&'!W)!HQ((/<'H!TV)R%'O9<0ZM,`%HI#,1]FGC7<_++>.3$2 =\)8 [\2'Y M>]..2W/,(.0MK4D<* <>-!U#C^!-<')B2"ID@@#[56KUH/\`/;*J)*QOHX$, MS?"2S"A4;C;<5^@Y<(V.=H)*_8JP8\06Z#K0CM].5G9D!Q+6`H5 HU20"?Y: M$?>:Y*'OI)!Z+F^%]R0"*DUZ,.OT;8#[U D%@(5&%.-5J:=!3;;Z,A1;+-;88#:1315J/OW^[Q MR,5L-L"5HQ*\ZK4?Y6]/I&3%+Q$0XB&WA'O<2SU+ ,&(*KL?GMCN6$K7_],GO3&P[E\1# [$A@>BFG M?Z,J,>Y-=RVH;@*(KHS1MUVV*FFV_>N2ELD'X-UXU([$GWKE M5E%+2%'<;$=.@-*GZ=\-R4EH*:HVQJ0>5=Q3O@LE1;3;\FH0:[D]`/#?VP\) M*R)ZN!4D[J16I/04_4,G1',L0ID!R 1\7=NO6O3(\==;7=& WW,>*E-HR.:DBAXJM.H. MPZ?1A$QT">(TID\C1BQI4D]:G^A\<%$HBU& 6#;GD:4/:HZ?QPDLR2&RP:CA MA0[U!W--Z_QR"0&ZUZD&IJ>P\1MA#(^2Q2:?$I))W7VW&2YHW4C1=R#NU#5C MV `V.-$E1TW(\/"N$@KPTT`IK\(H=P/$G#1"T%A(-"P!'=1MOXX;+!?1:* M3\+;UR%,J'1J@IL/>F2!(01(J9H?L]M^7AN,8L02L*EZBA%6V/OOOMXX#S;+ M*DT:MQ4\GK7D5\>O?Y[8*)0"'&,,/A% =R:BG3VQCC(9'=19* @+3H"M/LCN M/?;!R8'W802%X*4I$!)``:E#\/3?#LO"5/TP>-10?RD MX"G@M8\3"@KX?K_IAIB84I"(@LN]#N-ZFM>_T9$Q29*3QD<=]QT!Z U[XVQM M25!R^&I4&O&G\U348DLXS7,6*A@O*@W%=Z]V2B&(D1S:7XJAF:AZ_*A)!_ MLR)!2#;6[4!'7X:FE*@5/3$`CS92< C!@2&4?\2Z?/)<185YNV;BS$\0:KD0 M&9L5?M5+4VK[?,]L:IKYJ97[ )H!^T3L1[X1.]FPF@A'$AJ2I!^*A' MV@`*@T\#VP&(*!(%"..*JO([&NW6K"HQ-H%=ZD6(*J?FR_3O]."_)EP\/58) M*?9Z\B?HKT_AB0>BUYJOK;\A4))H/FSSK^ M7%K?&::Q06TSDF2%0>+"@!V/3 ;:2 'SMK'EJYLIIX+BU;[+(?$[#<'OB)5S M3Q]S"[JSE5F-5+"IB;]DM3;E3YTR$L7'N%&7O2D(2]P`>$8>LDC_`&N/3X:; M<@<@#*.S98/+=C^I;+D@*AE`8$4-2S;4Y=1AX:7 MQ*Y.0+Q04XU#"GSK0D>(QI''Y-K]A4^(JH[]:GN!^.'B3\6C7D6D6M*_"IJ> MU/PR<-TBFS0.O+XB""]!M0C:GMC.PU5ONN("G=C0]'!]JD_=ME7#+JSJ*FY* MJQHU"""O@=B*>%#O7) (OOIQ%=B?;OB6,:7.64ERJCTVV1?$"G& MGS/7$1!ZLZ&!U8;M,`OPCXJU'(CP&QIW.#W,J[ MFN9 42Y0"!"U0&/ M7?8-O6A]\MB1'HR&/O5&/&C.-RVZ4^^OTY48@FV7"%E!NY;?9O'?I0#L=L9, M>%?1:@`\Z4)J.IX]S].$#O39IJ:G^@P"UKO:YJ6H-A7]KW^+;Z=L)L)D`0X+0@U'P MU([5KW/RJ5LR/-U.;^H[ *1204(!(J" M:'[LLW8T%Q(''DA'-A0G*GD22T-!0^#5-?H-,/UO]<)-K4@OJS$*$Y,2M .I#="/F,HX3$IM MH;$4/*OQ%AOL1L:?/OEO#(A10W:#$E>7[1 ([4[5/SP##7-!R<7)<2_ \A\2 M-L?>HXT^C_/;#X('5C94PRU+4HII3QKD>%EQA3>K*R]"WVAU.QQ$2&'$5:H3 M9MPIV(WJ>S?3EG##JHR2#OAY<^QW!_R1_: M/L>F9?$7!X:;0E@3]H,:ANY[4^C)"5H6"M"2O+?L?'M]&'A*#-Q(Y DT;IN> ME?\`:R/ $\):7B>;%RI)J6&_MM7)CB33B>C"KFO,;;_#^JN)B$6%S'CQ+#E2 MM=ZT&1-CR9<^KN1HIZ$4/O3Y8.$][&G,0#0@D#;KM]/WXU(=60)]ZF3NM.)' M4+VJ>AR'5C:PO7D"M0=N.]2&V'3MN*[D]CXGJ, M0*W41(46-:I[_:!H13L(Z;^ MV(W190\@)-6(/Q#M7?P[8>(,2*7DGXHM#7>IZ]_ MXY#=/J6,U>8%>5-U%?\`,Y8)5U00N#5/PU"AOB!%*[;]<'Q7<+:$G?J>J_1M MAB&))=3E0'<_L[^V1,D"W= QI3M]&2B4@ELA2#56H30COD"6T+'I0K3D&% # MWVK3'<()4ZD5)J2*L0.W8"G?#Q+17$ `K4TK\2D]B/' $65,`$J*5ZGT>&1XM^3+@6 M%=OQ))^)17:NWT8(EGN0M->0Y 'D#L.S5WR5A8Q6D,2%%:@;@>&!-4ID M%B:T4;4:NU?;(W;'=8RUZDDR;>GT'T'"(E' 5!T5MR 6I6@-#\J8:3'8TA6A M4U,@Y5["N]=^A[X"+9$((J[4K1JJ"RC8`]Z'P_C7(P9"E%EX@[$L2 *>_7!* MPB@L%%Y,Q^';#;_3V M>:[Y8MK^*1;B'F9#]IB P(%10U&]1D>"09@`\G@OF3R%+UTD(B5D)+-6I^$[@#O3IXY`1EU+$#N>-7Q5[R\ M;[*KGL3@,BCAKD%K$ 2;D/\*K\74C^& M()08>3N5`*'D0WQQGQ"C]>7"@.28Q(7O2J [T05)[M_,,JW[ELK5(-3X9(FD$5R"T* M64*!\2FG*M:GJ",`*.$KO478* SU`[&E.],CNS$9`;-*#Z@!("DCF2=C]';) MT>Y8VX!:/7[))"G]6 DAG1A/?]6 QM@92[FE92*L>6VR]J=MO883`TMD]%TC$B-5KR&XIL#7K7! 5S;* M;+M55(J2=R#U%.WX4RV&4I=67%W-;\@A%"M:J>FXZ&OWX 6LGR75*DFM#&E.NY WJ.^3/%WT MG?N:9P"O7X>QZKW+4[^-<@`>]F('N6L:.!LPB;[74;CQ';?(`$LS'S7"G1MO MYA6HIUWKVJ<>%K/N;.SH:]2!3N-MP?#;?$2ICP$]5IZ@,!2,"C_/M7OT&3\0 M$,A"07%F._*C*U*G>@(IM^.^5\!)9&=-;*S MW+QZ8+/7=J&O;?;#PQ[T<3:N"O)S5CM M2O2MJ]&#("*&I MVWPDTBBM5MQQ^+B3W\!WP"5LJ:*\P.1)/\HZ;#;W[X9$A8CN7,=A7J=J#OMD M8R*>30`J"5 !ZFFU3@LA2>Y3+?$>0% ?AJ:U/A]&-CN8$-0@L*$#D **#M2G MAA)/5!D>C9-15C7?<_/Q^_(4R!M:U&XG<$DA2/???[LG&PS)(YH:1QMR^R#U M%3U/7)$(!;56/4%J5/CMXY7*0'1M4V'Q`[5:G(G;_,Y(2BU$DM]"14$@[K7H M??[\!-]643)QH:_%L37<[U'CVP`*26G+%C5E;?>J_CDJI MRTX[/0GJ??I^K M(*8K#0_%2A.Q7L:=-NV3!(44IE@1L:@[T[UR/"2I`;:@`V)'>F6$*"M!J0>7 M7HOB.YR-6RL4MW->]14`=.^^)A3"UXKQ'3J?>AR%I%E3969@5(\.I!I7;<9* M)[DT7*&XC>M22 >O7;IA,4&"Y@Q^UQHI)8_1D; 7AI86`KS/2A:AK3W/Z\.Y M0YFK5&!&Y5C7VKD>&1Y,P*(A@V<`U (]_88>3,&UCT#;[[4/>H_LP,9!:%H20P[&GL.G7YY(RL,.+N:> M-0""/;CW^9KD3;:#:Q%!4E:%>AJ=N]*C$F07FVR*RD$#@:!9Z9 M+$TXG>I78GV(Z4QXJ20%.2)5*J1R)^D;X(R)ZH$0XIX]>WAA,=]BDK#&2.@& M_P"&2#"BI^E6H*@U[$[#Z1@H-H6R1+R4J ":`+7X:]OQR),0Q.ZWT5&ZK2OZ MO;&V`C:FT ()"UKT\:X6P;*)A^T0*@'X0.M*'I[XW2V%!X">).Y._P#8<-KP M@J#0D@"G?X6]SVR.[&1X>2&>WH&HNVY7B=R>N1(*`;0,D1K0J>)^SX@4Z>^1 M(/1M$:0S1L 6(H2:D?UK[9(1)YL:426H3Q+5(^'O\S[#)&(20TR]R.5=Z>-. MF1V:ZDA)N %7HK#[`.]2>E?;)57(LN%*[BS1JK0+0T#'WZ_CD2+ZLJ8Q>:=4 MD,H*J30G8$4R)PCO4TQ"_P!&1U*%2Q_:KU-?A^@Y48'O3&NY@.J^7U+RN4"< MFYAEV-2-J>QIDHXY#K2=B7E.K>0='EIZ8G M'(,3(GJEC6DRL!)"\7$?WC[ 4Z_<,A9BSA(*'!EK5:&M2">S&I^@955LB6ZL M]2I*@"A53U(`I^&V'A#$'WM50$*P^!NIZ].M3[5R5GILRXAT;K5I`W4;L=Z= M.WSR(N^:.,M;`H*@ACOUV/8_COEF_>RXK:[GS05 MH"6 0>%:U-/F3D)PZV@!:2#4A:$@E*GWR-D-D2WUXU^$@BKGX@*;81( MCHP(=R/&K**&K<.E*5QGH\,E!C8'>M"\RJL0HIR*]JUZ9 M`VRY]5_)JDN 64^.Y/C]V(F.Y@,:FVW^2&/';J NX^DY=&0KN7B/+FN#`>H& MVHX-":$[=_'*R1:PL+3L>= `3O3P[_PR5AF1WE<:J*-^WN0=QX?J.1H,3P][ M8/.A)&QJ!0UV%#\\F0/<@6.2X@"-Z48`_:->H_5D-N]CQGK:T;58+0M4**[G MPK]/3)"TG?H6_P!WQXN!115J=/\`;R$N)D,0Y[MCIQ.U3R4$[K71\U04JLA7EZ;"BDUY?/QRJ=#Z641+WK&( M;B0?BH 6ZUV\,$(R+.FF^-34D!1Q`ZUK_M9(0MAZH^;9Y/Q!45"@R#J =ZU] MZXRQ^:;MRD+Q"TYM]KN ,>&NJ?B6FK4JAXJ1^O8G#6[5/3 ML<@33*,R.=M/3D:UJ02%%?IK@!4R![UI4)'4_$>0;J=MJ&E?8Y8)GHQL^;3 M!$%0"#\1!P2LE?']>^0MD M(VV&(5F%2.H91V&_?OC119')I.*^I4EU!J33[P/;) >:BUQ*@_9ZC=:U)KM4 M?13)?&V ;#;]8*$JI^P-A[[;88VO$0I$,"PH:4W4=1 M7O0X+*-VJ$J%6I+5'/KOUW(R8D60"D)AQI5N)J.F_P#GUP&U,8J@`910K4$L MNVQJ:"OT9$2(1N%(\ P!!/&M`?8=L)D4[KNQ&] Q"$]:`U;VI4G(6O$5)N;$ MDH =Z\MZ@BG4=L0$1OO<`*5W`).U>Q/ZA7)F0#(-ESU)K\6PX]N_TY%!@5IH M?M?,`BM3U-?HR5%/+FM5E!HH/NOS\1D4T"XGJ:UKL:;T^C&T$4HU&PZGMDP* M8[KB1W2GOWKD^):*R@%5()(W(!IM_M8"$@A;NJJ!4<>@!/;Q^C(2FHM4J.IZ MGI7(BBF7N4A4,H&S$UXUKT[TR=CO7B)7``+LG'?H-M^E<&QZIW&[FI\1( `! M+;UKL0:XD4DR):K6I(W)^+YY'B+&("QJ?"-Z@EJ$[4IDXJ20TM I8U^(?$/< M^&1))3!<:&M#6A[]LCPLFB0>)/7]DTZ=OQQ%() 6$$ T4U)^(_@,FQ,P.2P` M5/\`*=R0:_/ BK7>% 2#OM_GWP`,MU(TW45;OQ';Q&)3`+D8$4IQ(KM[_JP, M3$]&F( 0&K="Q(IXCITZ5Q2.):%+,-QRK5P?N ]OGC;($M,.9YGD: GBM1N- MZ;]ZUP@J1;C]EF'C5AXUWW\??&R@1 6TWZ#X34D=/E\L@1+O7B6FAJU:^!85 MH:]!]%=\F 4<:\<5W(V8$(-S3P[8ED%I')>(JJI2H[_/<#IUR)+&1[EI56Y" MO'??IM[T&&F.ZWX6!JNVY &]#XX0*Z,J/>UQ'PGJ/QZ'K3%:/>LX`[;4';;: MG?QP(V'58%5Z_#3V^>Y'XX:+/;O4V@Y5%/B(&W;8^'Z_;"),-N]1>W%*!*/W M<^!-3M@LK2@;3DS!=J5I6O0^^'?O1R0S6F]"NX'?J, B5!*%:T!Y$)N.H/[6 M1()9\8*%:S*@5W J13OL=R,'`$WYH)K1Z#;XB":_?3#1/)'%7FAC;-QJ5 )( MHC= `*D_PR55S#'C*'GLDD5OA!)/0BM*]_HKD91ODRL]['[K22Y5A&!5A4,= M]MJCY] M&0EC/0L+M*;CRS0N&',R*JFHIR>G7X=AE8Q2[VP56X2]M"9F44JR4(\3ML?I MZ8^$1U8"4>@2VXT:0\>2[*"65ARJ.A--]QA$2>JDSZ)9)H,!1UFM$(E8^1-$NE,D^FJ9'4J>-10D@$[$>%,D)R'5AP]6.W'Y M8:+*R-$DD-22\:U[?3VW.2XH]0QJ71CM]^59+%[#4.2#XHTD4&I\20?#(')$ M]:9#'E#&+C\N?,2&4HL4JI1JI )J3V->WRZ9$S M'0* ?>IUH =S3XJ]SM3;[ZY;')LDTV!395*OU4#QZ4R6S",CWN)4J_Q;46C[ M_(C*9 MX;Z!ZT%22_P`Z>/RQ')=AOS;J>7%CQXT(7M\5#O@CCCU+(Y#)NM"2 MZ]2:C>AVQVZ->W>WN$!91R))I[@?TIDN`L">XK.0`9F:GQ$E#X4']<;KI:\4 MNC9#$AU-6X\21O0FE-L(KN9<9ZEP^R#6@)JM>OM3(4>]AQK^Z(6^-&(8^V3L ML*MRL59AQW-5('R.^&Y=Z0+:I3@!Q"[$LV].]?;WP^$.=LQ$^:T'>I!!2I*^ MQK_#<9'=E)=R-50_9%.*@;COO]%3D>!A&^C8:@V "M0ANO'M7Y;99&5)\2;1 MXL:UH4!([_=D";Z,A,]6E)8$A:';C3K4]SDZKF$C(U7B34;(`?G5OZ9"AWL9 MDE$=2L4I4$BFWP MJ#T&P'TG'A;.(!MP>5:EJ;L?`#M\\-TFW%!LW(&@H:;[=B?QP<5L)2(Y+>= MPIL=@1U!`Z??D>&)2-V]_AYD'< L/ET/N<:(6N%I5(%*`MO]^6#(&-@E9OUJ M:5^Q3?E]K)<19[/_U_32T9223L?E\7RS,X>YPQ*EI%#\25)I1CT^[&JZHM<4 M#+Q;XJ^/?[_#`9)/+9HJ`2#5MB 0?$4'W9*%,(J:J H7D[&O4D@DBFVW;8X+ M(++AM>A)I78CKUI4C^W(SW084X\RP- .7Q]ZU&V^$0`"\:^E=P-FZ'KM0]\2 M6(W6.]0``"RD%E(KL1O@!IMK;G2D?4Y 4*UW45I7QQ)"Q '5Q^('F#5:DI7K MM_# #2.-38+M0DFI)WZU.VV2!\U^"[XJD\5Y#JH/ZQVPV5,T.Q-2-PI\.N_A M[8H7#=57CM3?>AVPDJIL: *HH*[]0,C120%XJQWJ30DBO:F)JN:*+NH%1M3X M03X#(Q1NIL"5YD%3T8$;D=CAM(!+J5)HW(#Z:5\<-)ML4V)INM:X#80!:DOW MK4<*=:4'3&B67" YJU!^+CW'R[G$6GB6BIJU>([/VH,F:[V&YZ+6>O-@=R0U M1WKL,K]S*B%W)BH+D;[L!D^&*W:T,'!K0@=".V1X.YCPVX7VNM00*C)45]*QATILW1CX?1TRLQ*D MM"O';JQW-/X=-\('>N_>N8+O3<[U'7?(GR8[CJI@FK5'(C8`&GX>.2I/"&_A M857E\)W4G\#B25V6A0RUY\2U32O2N]33MO3(TFPWR4G<,12A/+P[TZ[=-\+* MU$LU`Q"\N0`WWIWH52&H:@BI-1W(^ M[(4;5;XD5._([]?#\,G01Q@+D<]3U)/4G(F 3S:)%35:BFX7H>G7$!COT4S3 MDYZ[5%.@]OHR<6/"5S;A"=S4U\.GAA,F?"V*CCW ()H?;*R4DAJK;,0S[[K\ M_P`/#$$%-NXBIY$=0!3P/3;QV&%2%IJ=CN'J>->O;<>V^*T`M^$_&?AH23O3 MO7(\,K8[=ZG5:D5 V^@GWRVBIE33?:))!6OQ']?R&1IKX@XT'':F]5W()^8[ M;80+9@AJ@(HQVH:^%*]/NR*T'4)+`U*CH/#"&)CW+652>1ZG^/SQ9'8*;Q(Y MH5!(% ._T81(]&JPAS .0K7B?V3[@Y$DMHI!2VX`8<-J5W%?A Q%K(D$(XTND\OPNO)D4[#U M"1L:UV^_!8";2B7RM$6(`)'8G]JO)8D`;DL1 M0GY=@9]%D02\8@30,H- M0"2JRE257>BPSK*)K5)* T1E%/D:;[],09=[ 0!YL) L:NO)7F.U2 MD#N:1@?3)Z$TH>@KU.3 (Y! G1:/)J[;5HA\>/7?W!.#X)D06S4D`G8=%P\0 M"C'WM\2Y52H.X``ZX.-LX%I;BY0_$H-*?K.(! M+$E&QR9L(.W-RE@06ZM6M/EMD2"PXP5Q<5J14_P`A]Q4Y';O6 M,K<2:L-A4;_.@PP-=2VF(*T%C3B.3D5H3L?\QD^,GJQ\,!=R!--CQJ"U:UJ- MC\LB86@@#J6@9*!NP- /$[ ?1D.!(R!:K<4^':JU^[I^K)@T@QML+]D.*<6^ MDT_L)RP9(GFD<+7+@IK7B#T&^_7^.1(B>2:#@24`/:I)K0_%M_F.V1X2.BT" MX49N'(5)/?8$"AR=#N78.0BK$CX4/?>HI_'&CW*9`]5Q+!B2/B8`\?G_`$&V M0J+$3BL_>=*_&%V-=J("BIW!\>W?,VBX-GHO3 M<,2U:'Y_+(<)8@M%"Q)J34;CY;],(%=%LN.Y_9-34D&AH-NF1HI&[4B#=P`6 MY=Z[]!U[#)DD,Z(:B"4#*!UVIN304V!R/$P)7]"RL:\/M@"N_OXX\2B5+3QK M4T(`JQJ>OMX>XR0OO2M;B*U##EOM4 GY?/#PGO1Q=RDU&(4@FE2)#WJ349'B MI:X6S4\E)J&KU.X(`QL+:VH=B:55B6Y;BIWZ=OOR)43+5#4L`H8DQ5 6^R.RD]*_/*V9OHIL220=P*B MO],G88D%O< AATWJ>XH*5^C!1]R 2UR?J%J/%A7;!2=UAY44_:!8CK\P,LOA M4V&P2:#[)[@U/OD"+0&B01N"P W!V^G?(D,[[EH5^BUJ=A7Y=Z8+8&1:-"Y* M``"IH>M*#H(5VZ MK1AR*[^^_2N%EN6B*DKU"[4'XU'MDMF,K#7$T!-2:T-#3Z^_6OMX8V4Q(6L27V-2QIRIL!3ODN*V0:3H02:C8^ M'SR-6Q,74Y!C6H->:[TW'6N'FFFFW!)8[U`!)W%?\`.F-TD"EM"30#B*]^OTXL#SW; M9D" %@5W!&].AP;L@0&BQHE :*QY5/6NU*?23C5J2&B3T8U(WVZ&FY.",:42 M;;XF^SO6H\/#ODE*B26Z\N5*EO8XV0UT5Q J:$%:"M>YQ!)9[./$L2Q[].YP M@HX%A&P/1@:D'OMC$E;!6L.7;D*#X??MB)@+5/(D_CU'XXDLN(K"G,$T4@=J_([Y#C7A*STP2000`*C? MN=OEMDUH+6CJ!_E'<>%-C^&"ZYHKN4VAJ-@'%?AKX?YUP@LZ\U.2V60."-J_ M`/ #VP646H/9J:$@&0BBT&U!UV^6&D<%]4&VG(=^(J33[_;!928=+0LFE0%3 M5 22>+>X-3Q^BN)C:(Q$$!)H-K)6D>Y&X ^FIP<)1*?<$MG\M025^"E2"& W MIWV]Z9'=K(EW)//Y31@E%XJ*+0_>.X\1AKB91L)5<>4F!Y>F2Y!J6!\!MW[9 M.N%;*27'E21F/[ODW0#I4T%#XG(''$MD324W'E8!JM!5& J/8[#W[Y7X9#9< M>J53>6FXT>$\RU2=Z<1U-,J(-[,`1T" E\L*5"E6**1Z@WZ4Z[^%!D@`>C6; M]R52^6A\)5*U%&'<@5I[^^$XBD$^]+KCRTP%>)*G8@['X!0FG7<=\$!7,,I1 MK=+VT-U6-73XB.18; ,.F_R."4!)GCDEMUHJM'Q*"6..M4H34G==^NQ\,K$) M1Y%GDB"$BN?*VG77JBXTZ"0,>9^&A7IO0$!?8#) 2'6VB.,,8O/RST"<.19& M`EBH:)F%`O3>O7PR<2>L6P0`ZL8E_*:S)D2+4)D:BT;B*K4UH"3]^)X%,9!C MFH?E;JMNH:SN8K@FC,H'$@CL#6E,B(7R+4)2+&YO(/F>``/8&7FP4^FRL145 MJ17WR-@"= MPW04W(/T9 R)91\MUN[%Z_ZP`^@[_?A!\UXO):"".>XJ3R/>OOD0"2S,@NY MCDVU*#Y_1A(KJTG(5I)"T-25H U>E.PR1NF7$N$B!DY=":N.VVY'T],A$65J M*T[K($KCN2-S38_(=*Y$T.K M9SYMJ0`VP%"1R/RQ^+3*!4RI&S5#=0#TI3)"0I1Y+@>G(5-">(Z[#OB(DLN, MKCR##B/A79:]CT/](E:3\/@K$@`]J;5R7"Q%Q;*_&IJ: ^&_0;Y&NY MF+*T%2?LCD 5*_2>F @AC-4HFZL34;K\J?QR0R'WL*ET6(S;[?9):GX&GZLG M7%S972W>I/$UVW[UW/ZML> =Z+?_T?3M-E78\P=AL-B#6O;8C,O9P1:P[?$! M5NQZ'K6OMUQ.Z;4Q-4D-'2AK4;GYG" 1NK:R(#R(7XC4@*=Z;58_3D224@6M M911?AIP[@T%-^_AA,DG9>AV7E\!H2XZ &FY^C(L*\VE8$"NYI5032O@:]LEQ M$+NV"3N66J&IJ*#Z1@XEX9.!)H "12G%NI^7M@4<00YW-0WPNQ8`=P>V2C") M;#$-[E?B[ BFU:=!]W?(G9JHK/C(% "R_17P%/'"`&P<2]!\0#*&'L*[C;Y; M8$2DAV-:%A4T% 3]KV]JUR[XHA&U_*O,L23U\=CW^CME5,C(CDAR>*@=0O4G MK3W^_) 4Q5AM13MV([#(VVK>56!93RZ4/C3K[?/^N",>'JPXEO($"@^%0-FZ M^Q^_#PE)+6_)B0&J3L/U^^^^,33$>]IZA2XK4THO3O3Y=\!E99U2RC&G+:GA M[FIR%-9*YZDT]]S_`)^^2372.(M(R+ M(.-=^BD@$"GXG[\`%(D:6;../>F]/NR=-=VI,W(L% +*P'$^)[_=7"%JFH@" MHIL1M^JE<;9 -O4]:A@=J#:IZ8+"G;DTK"H5FI_*M=S3<]BU&!8;CB#4CIL.F#AI3OU=N54L2K&A)J:$D;"@P\0".$]ZW MX7H:T-:T8'I[5]L45YM[!.N_6G<^%?HR'J/)/%2DS@,U37>H4]@,F 4\0I^(*3U/M3?[LC&BQX3WJ8H*M0\PQX^P]OGUR1!6Z MY- &E*$*FS"N^#9)M?R^+BPIR-01^K&F&X6+4TK05._(;T.^V+*@75!Z+N/M M?+>F$(X2&@:;`U=C3Z*9`E,25K-RHYWK7;MB),S0<":BIJ#]F,'?;P&"_-CP MA86&] !UZUZY($LO<[<@']??$6I%K:[,0#[>V)4"FJU!((!VW.V 7WL:#98" MO>AV&3-LC3FJ1O5AML/GD##O8&2W<_%MMMUKMB3W,2TW%U^)NGA^&2C991BA MS4LP`Z 5%>WC]_;(3QELND-(*D]'Z5%2":=:#V-*U$D]#5B02!X'+.$*)+ ME+%D+K\6X^\9$A!D6U-!Q8[J:;XT>]CSYM4KT-/BW!\!UP&12(CO6D'<\3XA M5ZT[8:9<7FI.JK4TJ I<@=??;%(6B):*HV0=!U'S^G 9E)#13C5B>+ %J[@@ M#N?E@$D#93>WV/P].XI\-!WPVIC:PP*U"0*!JCVWV/TX\^J *4/JZ,&)0\O< M4/3<_P`,DDBT,UC$2E4Y`T1&]O$_.N R"@4A9=*A8D&,&M0H[$@;_13%CP!! M/HL)W,:@_CQ*U%?<],%=S/=!2>6K5@B*I*H>O(UH!WP&N]JH]R72^5(F)/I[ M+5B!L":8. CDV7WE)9_*2N&"@J*TC(Z_C3(Q![UC$%+)?*=>)](QHK-R7KU- M3T-.M37)< #'A,3LDMSY5=*D0\@P!J.M*[?UP<'$SXMN23R^52P*-"2M3ZHW M^*O2E/D",'#P\EB24GF\M4XCTG ()-#505!(!'T$>.^^0/%WI,;2N7RUQZ*3 M4<5 &PH:T\>YRLW+HP!X4NF\OS#D6B)=*G;H!U_5B,)YLB8E+Y=!>*@9"64? M`% )X@&E/>O7)&1B.;482_A2Z31I`761*F4_&*$T%!\)[4Z]B3C ZGX,7N/RYT&YY_Z$8)F(*\"0!M MMWIXDCPPPE7,-YEAW79UY;TH2!6A]O#+?$B><4 2[V.W7 MY37_`,/U2_66-UK\2\:4[$UH308/#!\D<4DHG_++S"I?@(I@J\E/, 'KM2IW MVR,H5U4<7!X6-" M`ZE>M>O\,D2>B1(=ZC1QRY(:D_"-R*G^S*B&0HK0I"\B?B)H/\_NQL-E"MVC M7IP-3ML:@4[T\,.[`\+1-:$'E3&99AW.$"0X;T"FA+%J5\!7?_/KC5+]3?!P37@H M)HP\>X_7@)!29 +6Y?;9*DFM!ON-NGT9(4AL[A3\07?8>&U/HR5 I7!ZLH:H M8FC#J 1OE)A3&EJJ?C))^,AJUK7Z?#PPVO%W-\@!4K7B:LM#TZ;_`'UQ`M>( MEH4/VBU"?W9)'SI^.3JD5;3K6IJ&H/'I[T.1ME$+3Q9>74J!UJ*DG[\(E3,@ M!K[1# !BIJTII4D]-O;#*B@#S:K120`"*$J34'Z/?!09T0LH``"2.)W(_I[' M(W2M5J:J:5J2>V2HJ!:P@$$[CEL1V-:?CC&18\(<2S L1L=]VP\-J94MZBM- MP*@'!N&%-&A-#N"*'P^G(LP;:-#N1L14U['VR-L3$-A]L; 3PGO6; D ML.@Z8!)A4ETC*0QY4I1G(ZTZC]6*W71:KO;"+9\5N)95#D\6KO M2M .U<("+=OOL?$':A^61V1N/-HDD\FJKD"BTK3#2;'N47)!8\JC;X/?O^&( M`9")'5LU/4"BL&8MT]OPP+Q!IAR)H>5:`[[T!PK3JG@P`&QJ`=ZTK6F-,3 + M&H3L?M&I%:':@IC:\%1K6N^)!8[!^)FHC3E.U/M=34G?IWR)`+ D M#DXMT((H?V!UKMVQ"..30I\>X'8@5\-:MMV(R-4S()6J3M45(Z MCQP$$L0*<:4K04.W?]8QC$LI'SI8Q[;@4.XJ:TIUP\D#WK3TW[=OHQ^U2:6L M6(I4`[;;X..NC#A+FKN6ZD^/AA!M-$-%SL!0GHZ;'8_/!=,>*1=44Z%J'O7; M'B[F0=^[V'*E#QJ!3P_SI@-LC%H"IH:@(=QC$%A5./QGD34$BBTZ>^3;(\E. M11Q(V!8[L-JC`B0M0/$,:5\*4K]YQ,+8A"NM0#447^&0X*YLP2>2@2:M7=B> MAZ@9,4Q)(YE:Y&XKQJ=B33(\$E)6*2216G6GCMW^63W"T7#D`6VVZIX=.F/" M#S39:%3\5*KW+#?$Q8Q"[[9;[VIW^[(EB?)M0:D.>K'?I0]JUP;=4P"GL30C MB!T%"/BQ$0R,N]L'XEXTH-Y/<=_IKMAX:9@VI<25&U0VY7N=NA_5AM!E2XC8 MTIQ;8C_/PQ8<6_);P'*/DP*@T..._L4^-?B^(_B/'"8 ,`/-:\"[FN]*_#[>V((+*Z4&MMVJ!N*DUWKWJ M/EDK"\U)K;E17-=Z+3J": '\<3)C[T,^G1$#DHJ":BG??:F-R6D,VE0E&8H# M7:@&^W2@[8\4EXNX)?-Y?A<%>&Q;[)\3U)_'#N>C"]TMG\JV[5- K "F]?P] MQ3(");"0$JF\I(RD"/<$TJ1\7S]^PPF 0+26;R@Q)^'D0=G[GI4[94,9ZEMC M.DJG\J/0EHF"M5=B/AI7XC7Z,)CQ=&)D2D3&)CZTIG\L$D (WP@@$?R]14>-3D#LRBEQ M\M2T:J!&.S2&,L`2.B#O-#AFVO+)'25M^2@]>@]NW7^F5$2!;#DHPOX>/KV(IX0__T_2E*N!QV.PW M/S/X#,T2MP`259@E&+BO<_Y^-,>(]Z.%JK%7^$%@*G?NWM\LD17-@06]POPD538U.VWC]&/$Q(6 MM6OQ?$&;I^NH["F'AMD"V&+*RTI0TH/UCY8D!:6\T'PD`T-%(&W8&OOE=%(W MZM!QN10D5Y#WZ8;#+@/>L8 *H#4HWCU/]F 2I(BN!%*5```"#I0]?IZX@6QI M3I4J!6@)-*&A`[[8>"F1-N>GPDFCT+'?O\L;1NM8CE1=P*<2>IV\/;"!WH%K M30K4U%.M<@V!L\0=C136JGIDA:T"IT'[1W[TZ83:@!LD_#LIW XUIMD*/>MA M:P) Y;UZ`"HV`_KDK[V)BMZD%S7EL:5%*[],B?(+7>U1210[LWPU_A7VP@K0 M*UP'*+TH=U[FE?XY(4$D-$,5HP^)J D;CWQV86M5"!RH.1KQWK_G\L!KHV$% MMAN":5I\5,C3&O-:#L*@[GIVR0V6@.J[ON&;N:?=TP$I`"F=PM35.1(IVH/X M9&BDWT<2P4L&(KW![80Q$BI;GE\1!&R@=2<-,N)=R)6O4TY&HW^?X8&'`I%@ M3\0^$UY@[$[=:9/ISM>7)L?$P8CXN0:O3;I_'(TD"^;4O@Z[8[($Y*/J'[-=ATZT[9*-,#9*\J:?9Y#L/H M&X.1#,&ANX$$4+ `D;_M$[]L*F;1+%:$].@[?=B"`MT&N0(91\3;<5/6G:N" MPB,6JGX:GD2:[=!3H3].1(OJGC(;*@`"M0IH3W\:_C@V'5$8$K:'BR@E0:FM MII^&V#3/;O6F@.P MK4G?V^>1M-%IC3L">WZNGTX\87@+O$;U-*KUZ[5Q-%D+4FH:AA\'>O>OB,$6 MLELDFA))I0TK0';I^.))3Q .!%:$BBG^&/%T9 MM]D;'Q&]:_1A19;+$=/F? M$GYX.)B5I)VWW;?B?QPTA8RK0G=2>X\,60M"E:LU!RH*@'O[T[X":9HY8D!W<)LQJ/5': M@'('\<,2B4G5I4UH3TX-/EA$D<*SC4\^(Y4(6G[/@?HPIN^;J*E&I5NC M*#7?IM7YX4B@Y:E:`T"BGM0[X$D@NJ5%>(:K5V-37 CC<*,QH:=P>X_SWR)7 MB7MR# `5H"5'0UI3K]^/`O"74Z;TY$>U/[,EL%-A8R4!4BM6(4>()V('RQX0 MH+945Y5!/0U)[>WR.-4SHCDIE-VJ0WQ5%*]:#&)8U?-HQ@= 6)WKVKT_4V! J*4/)JBH M('3;#R1&SU0OU0&A9"':I(4T`J*??0X=D%:]B#\1C%#6I/X&GW94068B$')I MT17>*KJ17;JU=S3YY*E/%T0DFBVTG'X5.Q:OS'3[L0*1ZDLE\MPDL%C',"@7 MIO4T&-@IXR$#-Y4C9:*E%_E[4(I3($! D2D\_D^(DDOE1OAK M!5I*EJBH'A4=JY",0R/I2N7RI5'!BY<7W(\:5'T#??"6-D;I7+Y7KQ8!ECA^*M"). M-652H-=N]=JY`2/\*>$=6/77E'2)IN<=LT3<@(TA8FO6M:GMD\D@X\=^]C5Y^4T(#?5[Z2.1#47PT !IUK[X]+8<9?_4])D,0^YY=&6N_B.FP^>9QX7!YNJQY4)'+=E(W^C] M60X4KS5MQ]H`?"37!R3Q%2!D<%34_P#%9V \3C820M=2./*G'K0M4D#OC98@ M@KE8KLX(J:E30C44B@HI!KMUVK\\>:*(=SKQ KTV\/#!R M45WK0%KWJ=J$_P"?AB++.N]KEUY5_>=0/E@,/-%@.K]DMN"/QQM'/DM[&I-3 MU^C!Q,E-@02R@-5OB&]1L-\E98D=R^@Z#8]>O4_3D*/(M57?8TIUZU'CB-D@R+1KR'*NR_%M7<^WRQ,D@%H;A1UWJ1UH3W^_$ 'J MID'5W(J??Q]\C=(!+3%@!Q78D4!%0/0/\`F,'">B2:6JQJ11B#O7J! MVZ^)IC1#`2;<@<0:J">A-3](R5MMK5IN0 G3B>M>O; AMB2K#K6HX^&W;!MT M8G;DLW8_:% `3O0C;P/7!PAC9[FSR*U-2Q-"`=Z?TQ,3T+9OU43R;]KX^I P MP(##=4)Z'?:APDGH+39#0 HO8_?T&% X6B30\OB#$M45%*T[8/_>N`D]&UP^':M36M3WVP7WAB0;6"I6M=SO2NW]: MX12=UIKRZ5KU]J#)V6HW:ZOPL.I-./\`;@W9&1<0#LW^R._X8>)/I6BA&YY* M]3MU]L1753D;( ZD#CW'CD20$;E2)K6H+#N-MZ[?QP<031')=6HW_P""\3XX ML@2IU^SR-"?LTW!\1A*.$+2"?BH68FHH10D[`GZ,C!(;8!E*@MR()[TW[UR3 M&R'?`OVB2.(Y&M:4[[],!-*8WU;I]KG4,/M5[]]J^-<;!3&-OC]^$ M&EI#<>1';?:O88$6&B"NU2O2A[CPR/$0D@]'#D179:U(7O4^^$%ANNIITWVZY+A8#?HNW!5:DT M%=]Z[>VV`VS,%0!:,O$E11>521MUQ,R.B *:92U5?<5IQ'0"F_N#E9E;.B6A M\1/5N1J">PI@$5$0N!(J2">-21UY`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`%>^_P`\R@1U#@$R/)JKD\:@<6X@BE/] MNAPV.Y1:R@I4#NIZ]1^T=N_7&RV739+5!/Q$AB#U84Z UWH>E,! 8DM\030L M&8@U#;BA-!4>&#=>+N4^?J,2P)44< [==]_U8@6HIIZ'L34_$!X>WRR7"6?$ M5G%&+'JH)())J!7&P&/#;@0>3.]7!^$K2A'B<- KRY-"OQ%14&@)-=J],@=D M#1Z4! --AWK[8@MK5"S5Z=@!O])'X8:0MHPJIKU\:5^C#9130%-N) M'A^O(G=!`#0W.XJ!TWW.'DBXKB20P*T/:I\?;Z,;9@!8#4_9*[ L6VZ^_?)< M88F7/(UH/;"H6T!H#5NX'RWP$>;'=M>)'6JCK]/ M7(B5=60)[EM:%F.U>A'MXX91OJ@D]S4E":5+`4+ ;\Z]OXX*9@_%QWZ#<;J MWZR,&Y8'W+:L"PVJE*K4T^_Y8.$)IQX@$#0&P!/C7KL?X960;3QA29B"0 *J=]J$; C]>2C&V/B%RG8$ABBL&!KN2>_W MC!(%(%[N#-2NX(!6J^!%:CW&0J3,EI*LRJQ'(U;B#T&_3V/7)-7"6R.H:@V' M\<(/O],*F351521R-!Q7Q!ZU^1Q8 M[.:H5BM2!T/<^!\,C38/): 0P\&-#XDD=,6!BW2M)":UW(.]*Y*BH)')Q!W% M?I]L";*UJ;J3L#]I?PK].'B3%H@?:-/A[&E/&OX9$BV1=R^)OBY#8\3[[5V^ M6"O-B3?-OPW)]JX0?-DM:O5MA^R3_GVR?)C1+B*$$BH_FKMO3>F"T<*WM7O4 M_#T/S\,!4@CDUQWZ?(=L;6%M;@DCJ:54_P"?OB=^2DD%Q!]S4[4/;_,8`*2" M5KB@<@?%0D\3M7K_`!.-VRMS`*M *5!Y,!T'C0[GJ=L!'D@FEM&;J*4[U/PB MFYKW_MP@4@3"\K\).U17>O0D8\F7$%%OAXH3RJ:N:]J;GVIUP@KL6N"BHJ3W M`K0$;5R)DF,@HNI.Q2II] ]O?&[8FD.T=2: @^2!DP:9-OBJ#45KA MN^C/DM*%J=0QH H-:^&V+)2XNJFE2VXX[5K]/M@5:T9XA1L%H1^K?Z,@8A6O MBK2IH3\0'RI]U!CP5R22M=:M#7E0]Z9($TQ,B/-VP*DG@ MW[>.-@=6-VW6M 2 &/?KQIUVZ[T&2$^Y)B&F)Y $5(!'RWZ;Y$V>J(EQJ1LP MZ@`5-=ZUZ;X\06_@TP+$G:K"A/7IOB-T<'FULZGJ2:D@;4VZ^.652-G-M12" M2#4-6H[U)[]*Y494S$0VO.HI3E6K/O0&FQ([C"/)!\ES[E6 (8[,!M3N:_2, M)KO8\)4Z@FG5A4?3UR-$]4BAR;X\=@=UH":U]R*>^/+JS 6BC5/ `@]CO[?V M800460WN?V0RUW'AXGYX;'>CB+BI^$$[$DU[D@8>/N9$EHJ&VIR)()%?:F1C M*UJUM!7CRJU2:>WM^K";8$.4#J0>M0.OXXK7FL]-6!JNU2=]@*=#08BV06M MHV4I)4VMU<[?$0M2`#7??Z<)D0QW4S;U2>WAT.((+<#Y(232HG(+1#B: MD#>IKL*#!;'B\D!+H<#[A `PH5->OO7(GA*@D^253>6(9*&FQ(%*T^$=-N^0 M\,%D9\/FE%YY14H"% )'QT'W4RWA8\TB_P`(#GPXGCXU[?[60X-TV>]__];T MN0U4- 1T`KU)[YE?%P8V.C8/PA:5XD5^=?OP4DE8U5([!2 "#[;>_?)B([UI M36@)YFFY+;FNVU13P.V)%=4@@]&R:+L":[G?>G;<8$D4&F^SN."MLQW)&)'F ML5Q%-R.QY-N23V^@Y&DFE*G:E"30_P"?MAM:!6BA:G5J\N7OV_#)"1:S"N3B M%;;?CQW!\#D"26<5E2=STWJIK_#YX0"DEL4;X^KCN"=Z]]\>$)4P6^)I*@]Z MG:@KW[9,@A@"%P?]G?X=MM@#UZ=NN1B RX@L.../Z8#LNSJUI2H(ZC M^M<"D!:P!-14_([;_/)#9@!2T["C&OMB9=R1YM;5`%1R'7M_M[[8!92:Z-U\ M.E*_V?3@(30[W5KX&O1:UR'$&/J')90,Q)V)%&KV`Z9.R6.[@-JD]=AX[=,: M+95+0Q-.M0:,#M3%!!/5J@;E]KXAQ[T^>)("T0U6J@UV< >'7^W (KQ%U2:T MZBG3Q/7\,!M-E;TH"2!2J_(84@+"0: #ER))Z'\#B"42!+1.ZH("BG:NV&O-,LB\\B&)4$=03TKV^G Q%%09ZGD1\0^THZ5 M[_2.F$!M%=%ZL. )4%>K@]^WWTR7`UF5K68FM%W(J/F-M_HR!%,HMJ? <@=^ M-2-SBO"L.Z*#N0:@$UI7KCQAEPD_^9P;]$B/>W\"D5/$$&A/2I[X`$@`-,33H3T%1TZ_ MTQW9.):NXZG>G;PKDA; Q:'Q$_R@[^! ZDXE`][=22*FH->G@-L'-3%:"=]B M14??2F3 \T&W5)J#U/\`GME1D5&[MJ$$5!V']3@J19T`U7[()+$U)(VJ3UVR M?"&.S1)%`*&AIQ]^^!/%YM$5`Z #O7N?Z8;8D$N![$==Z#J??$%&_1O;EO4$ M#8U^'?Q/CC;(36LJ\@6[GIX+W'OA`*;D%Q'(<=R#U([4_CC3&R5M#W-?A_:/ M],!#*J;*CW)IT/>H'^8QB*2::'[S<[JWQ+7K7Y8DBV (6T5F)K6I)._C_M8" M0RX?-NA(K]JGVAX_Y^&$2"T>];0#D HH[;#QJ*DX**GA"TIR`7H!38;=![8? MH/3#'S9$VVR%N&P-36O8]QUWKMD;#91 =P(JW2@J M.E=NG3W./$&._^&@DF71:T1%1MXU[?/;$4$$+&BV `JRUHI MZ;=_QQ$@6-24/1)=@#NIYUK\-#X#^&-,5-HZ`J/LC_,X>&V=R6.E#Q4]>@'0 M#Q/;%% ]5@1A(* <14D]^GATZX:!9BPMXL022W*F]:=.G;WR$!M3R()%"2**>A-*[^XQ*38Y*S,U0=JJ02OM M7?\`7D"(J+::A Z_">M.U=_Q[X-^B2>%9S+5-.(!H#6M1X_?AX&0RJO$FI-# M3H1](R7$`Q)OD5"M7(Y4(W<'J!TQ!M@%4<2"5WJM.72O?Z>N1IF32G6N]*!= MQX[[[XQ#`1MM*<@IW8&I!W]P?PPVSX>YS GFI):AJIZ;G>GRP !%]ZU26)! M%".(Z[9(RI>!>5 ((^$*`:?TR/%:=E'8$*#QH-JUH#UJWMDC:)4')ZO%UD*@ MACP(ZD4ZGWZX!28+OM ;D/R'):[ 4^+ZH\<%,N&N3J+2M M!3]H5VX_+(\'FR6&+XE8AN0IP?Z=P!A #7(`*1@J#4@$[T[8:#*(6F%&H>(Y M+4\OHR,CW!F9D*07V(J?;K09+@\U MXG__U_2]4(&^^]".@\/II3,L1ET<&BT3QH:M4=!W^9R)M>#S:)6C%5 ;8@=C MN-Z?C3$%EP]RPU#5I4BBEJ[$_P`U/X9(1)7B`:)+`$4VK1>A(IL?`8?I"#*V MZU)J2IH>0KU'?V.5"3#DM8<:T/(**@]*U%*'ZWT80$B1:I4FAZ[Y,FN3+B6DU^T:1^*NP#=*]-_NQ0-^:UC4[[UJI._MM3O\\/$ MV"*XL*U&Y:I.]2*TVKVQI25%@*;?#_OP4I4>^38V5U>34XFJ]3XY465N`H*= M:"O2GT81?$+2P=@O+X0*D#KN>OMAZ+=+7HP()*E353U'3^.5DA'#\6G(KQ8 M?"5&WAXD'YX[%?@YN-:L/LCXZ=J]ZCQ&2 2(@N)!Y; -Q&VY^GYY$FD\NJT\ MF5B1Q8 D4->W7PP@I,;6&E0S5)]NG2@Q)8\EP)6M=^1JP;<4/\A.WTY"4@M%3?ET-*$U8#ODH$%!![W&A:HK4^)[?/),>$M,31A4?:V6M13; M[J8HX"X#B":DDGQR1G09TXE-N0J$/( ?=_'(Q)+$AQZT9NC?%4[U]A@D)=$7 M31(45V^7]F]=^P_P`ZX+#,$-5!H3LN_3MM_7)"DFF]RW^M]D5] MSOC(@(!!75K3V)Z[Y4";V53%#2I._P"!RT2DQX&@3U/[.VW<'OD"24@$+N[+ M7KN/;MAC&F5;-@G]H ;T8"O3I7YFF/%3$4%M&)!!!H=SU/\`9AX;8F1<.YW) M!J/;(T6+A2BFG+Q%*[G)<)+9%L5![CCM3MTP"-*06B%/4[=QXY(RKS1PEK;[ M1I6FXKT\:]L$=^BG'YMBF]-O\G_/PQ2/2X!CN?:M!W]LC803;1%3O4&NV_7Y MC$2*%P%=B0-Z[?Y[?/),J+5*]=J>.("!Q!8W&GB"1U/3YXIX"X**BI.S=NOA MB:2;Z-IRS=(!ZK64GD`?#EM44/M ME9\T1 "FRD;'?_(%-_O\,L%+NI>A5!UV(W[].F)9A3,0(HP%:5^C`!2R\FC' M45IL.LA[9)KA(J7IEJT[?:Y;@CY8-V5EKTSO^UOMX'WQI!*BR*H)(YUH2H]M M]O?&4B Q!+9A[,*T^RI K\.^_P`JY",^)G*!M-]Z]1XXB*;M0$9K6E:CXC3;;V[X>)KM5*$ M"M37^!WP<(+<)V$.13KL":-7PQX?)K)*\JP!!WY=`-_P[8*(3Q%8PJ31JLK" MJ@["GM^.-(!#HU)!(!()/.NU!7Q\/#"6P$K=@***;_"JF@H=R<8AC975K5A4 M&M2OHIM7WZ=LK()4$!3-"H4@D; M57I_F,CP4S&54W(IRW8EJXX[TP`M9# M5:@U/7^)V3Q<+98J!R/+XMU M.Q(_IB$U$K2ZJ:D`'?;ITZ8T2LEH:K$D4!^SX ^/W8\#7PVXT9FVJ 6X]:L* M_#]V2XB-@S$:ZM$`\0`W($44DTJ01O7(\TB7Q6@G<\:>Q\M12O$>..Z!NM5A\*[; %Q7?KUIVPQ'DG=;4KL] &)I0_< M:8T47)OYU)['IA.,KQ7S6GX2*$;G8TKD-QR9"(/)U14I2H9>G3^RF2 *>2PG M;YL"-^@]OHQ(*0YF%>)H".E1MOTR-L"2%(D':A&^X\>U/IR03QML05+$%: F MGA7"8%K): !-"Q8L3\/3QZY"Z; "T:'BX(/+[/SIL,'"&3@*DU!%30*3MT[> M.2!*J9H>!J-OB.^V_B/'`@FEOVE^*@H37L37<;X1:-BM_9X@$#W.ZG$@,&E> MB@=031:;D#PRL6&RRM 447@K<=B*[;?VY994Q=UH#L":-L?U>&"Z5U*]!NVX M%:]/;%+0J:5!8'J.N_;;`8@H)D&J@$[OOWR0@&'&U12/A 7?X@">_S MR)-)!'1J@XT!'0;[^/M^&1/D&5 ]6N0(J5(H`64_(>'SQ!D.:R'<6JJ*@"@Z M$;;81(%KC?>T3\(%1TV4^QR1!92-BU0 M<:GJ>WM[Y#B2*<0-R 212@[5P\(+(J;?98#AZ4_V\>&FOB;H2/:FP/R_A MA))9C;FV2]*'[0'P[]_?(0M!%K5-0'Y4&U:TY&OB/')HH]&]N/)B.I/R'7\, M60MHUZ!5"$;!3OX=,._1C(%P;:G;KOWKCLBB[DIX@D O4CL3WP*1YN!4GBS; M4'PGMQ.WX]\/$5X"W4,=B=@*$?+?""5W=R!&_;OXD]LB60B>KC0CC4$K0MOU MKMN<`9;]'+0TXT!K]GPIMTQ8U+O<:TJ30#=C[#!NM$+J=1UZ`'I3OCPDIH]7 M5J%(`--SXU.$133==P?'[SA(6/):IXBC$ECMOV\*_1A"VV"*DC=3_NL#IXG( MD!5BA5Z*H7>IP"T$TNJ1L14]:&M:'H'J$B87+$@84 JW4]J4W_"N()ZI*[T MRA#-6JBJK7X=]O\`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`*X>$KP;M?#4*:$+0\B".7C7P- M.V%EP+.(Y$#]HDA=^^(!*"*=4D <:#=B:[X!`L:=N34T*D5H=B*=Q_'VP;LK M/58:52HHS#9:[@5Z$_PPP6BX_:-:'W_S_5C+9-$MEF/4\P.BGML>AR"1PM$; M$$GXNB@5RP"N2D]ZRAHIZ%?B4GQ.W0>U]?]K `4V%M!0U&U:<1TW[G!3,&F MMZ@`T_F7QKO7)WWL-RMZLU-EZG:G*NV&PEO M_?L<`A2*<>)*UI4&@/;I]L `; M;=6H(K4=1X[ [?CDFKBW6 (]39J>2-Q(.S;;GN<6(%M5V4@#?84\,-EL 7 M`*=S^'6N"_-&[14&G:FX(['QQ8F+0 YN?&FW@/#"H--T'4?"=B1E9$5'-H4` M#W;\>V B MTW;7)R*>-:=@1\L=D'8-4H!MT% :X4")7UJ"3]H&G$].FU<#,BU/G45H=SQ8 M$>W0XAJ(X2O[&HZ??A([FR-M<@PVJ>XVPT2CB6DK7L"#\.]#N-OGD:(3;7VA M5J $$K0U^'Q/ACQ4QX3WM4'$A>)5MT/B:?[>&R>:DD-4)-"!4"@4]S3>A_# MQXBM'I@$D!%KR:GCT_AAJFP2/>NJ`A(VWJ#TP(X2>964^"E%J20R]P.QK\\' M"$B--^DOPD#;C0`G;;J70UI4;5 ]\!"D6[AO0[UW]ZC?ID13 [+ M&C+ MV*.*EOI\E5B*,=Z=PQ_7TR/$V VTT>X4;@'=1MT]LF4;]&N#GZE1TK2II]G^N#A8WY/__2]!&^95/.TD4FAX@@[?3OF5QBJ#C! M]H7UNRCC)0DUHP^^OSR/$QX*5?K-N1Q$J\R*J MA;K\OEAXD\*\NA4\64@'E0G?W^>$3*B/>[@2QH"5H>0_SZ8\2F*[CM4@<.1" MDG<=>OC@!*#:PBO"@JX&YZ?,X:*@T[B*J F[5(!VZ=SB-UX^Y3W._4$[TZ;> M/?)575%M$!CTJ>H';[CD3+N9"0=N1UHO\X&U?G\LB 2RV6$#D*'IT-=NAK^% M065IS"\0U=E.3('O46&P6"[ MBI!Z5^*O:F5TD6IDL5HX!KO2AXU'8U\3C9'1GLWXL20*T\3OX>&'="DJ\Q5T M"L*D*-J'P.'B(ZL**YJ@U) Y#X@35=O;([]Z1PK>+;FE*&I7K04&V!)D0T#0 M$!@*]!\SA8\2RM>'%#0?W8'4BGATR5TGC=RY@!Q]KK_3PZ'(4V!80.7Q&E-M M]J ^/T9,6&$BMY5K7X5Y;;[5H*X"0P%+5WH.IW(&],@>)N%-@J5X]0-S44!R M0#$Q!:#?M;[-7Y[']63LAB(@K*UX;=R:?1D3&V-K>530[!!2GCMCPTG<\FU8 M$-R)+&A-?'K3[L%!D(%HBA(X@5...'C2HK]&3`!4DAJHJR@UI2E1^OWR!8@6V M2!Q'+B.IIW^C`"6=\*UFWW51R.[=Z^%.F3KO8F30)WJ*'Q'8_JP$#H@6ZA)) M-..Q%3U [GWZXLK#FI4;[D"N$!!D0ZM#T^$=!@`8BUM%H5J"* E5Z#^W($!M M+=067XAN3S%>P&WXXBF)#3$`TX_ZO?\`SVR=>:.-P4U?H!6K;U/04H,!H=65 MVM^(]5'RK49"R6.[=*@'H!4$5Z>^2!++FZJT04/Q&@7N#DFN@NJ*D5 IL0/& MF"F=$+=A2F_B1ALL0"V0.W4TWP+P-$@5`^R3UK_7WQ$Y,N'N<#78GX@?B%1_ M#%B;=\2U;D %(8?1TP$%/"YV(K0'M3([LF@#L:#EODXD,>(M[$#;D0P-/`@U'ZL#+INM#5-*#E4_Q @]*=_HP\3&BW1.@Z]:C?;MD>(]6P;.5 U6;8J"=]]O MXUID`;*#&VZ$@=.7117OTV';),#%W$=0:/LGPW(_5D"9%(+B/&A)HK'[OZX*)YE+;"N[4&Y8?C^."0/1*GO0A35A0 M-7L*BOX8\(6ESA=ZJHW-?<=B'RQ#7$EO]V@4[4H M!N-^GX85LJ534$#<4H"=CRJ-OOVQIMVKFK<%JH"U&P4=>^WW8*:[/>AP`68K M1N3$D?+;]6(*`(]2O],$FM:.17KX"GZLD"8I(#4B[M79B=VKM0^'@1@NT\)6 M^C_,H*A=Z;L1XT['VPBD<)#104_F\ WOW^8R)#8+[E!8V!8\2>-2`=B?#_:Q MW19;= @V%>H`IO3^&#A#&,J4C&68]:-3X?HWID@"&)-KRI &WV=@#UQ9XU)H MZUH-A1B.FX^>V(BR,F@K,5J "QW9=]B???ID3Q-;13H0#0G8CV.2NFP&UCQU M'+:M20H[[X(2#$Q*PQEB13J*A>P)R?%71-@A3X4J_P`+$@`L/$]:?*N5G=C$ MA:8A4T!XKLP_&IK[X 6PR6"-F!^$;=.0J1XC^F2:SSW<4-5%.I'(=:+\L-,N M(-%6H-OVJ]_PP4$TY%'8[DT?Z?GE9$BD%9)1B *#D:H/\H^_RKC1#&U/XJ]3 MNM :;?=CQLG_T_0WPU[UIM6OTUS*%5LXQY[N>M3SZ=ON/3MA8K9.%1SX\N(K MXU[==ONPBNJ3:';ZK^V(Z;]:=:;X2P09_1_*#G]KD:4Y=>]:9%)M>?J_!?3] M;E4UXAY5K^T?ZY(\3$+ M!QJ=O@IM6M/?KME9IN:/'EO3ER->G3MT_#)(C;FZ[UKZ@Y4\:=\4&K6/U%:T M]NE?AI7W\,D+Z(]S1[5^SO7Y[U_CD2A9MR->-:[ ]/\`.F$,XVV.F].-17EX M_P"UBC=::?O*_9VK_K?[>$,C:PUVKRK5>/A6N]/IP(W[0I7X:=?@I_PM,M8&V]MJ_9K M_MU]\B66ZGMQWK3?KU]\D&)OHU^R.7TUQ8BESUH:=*G_`#WRLVSW=OR'*E?V M?N'A_'+ Q/-9W%/'?^VO;%GNV>-#7[-/B\*;^&):@V*\FY4YU^.N5[,_4IMR MH?"A^_M7)"T[-M3;K_DX4M]]^-=L3YH-M?1O7M6M?HP;+NTU*?'Z=/\`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`$UP MFFIK;?)'7E[_`(Y 4V[J7P[UI6II7KQV^FEE__9 ` end 840 From: Jordan Ulery Date: Mon Jul 10, 2000 9:46pm Subject: more wire tap law Again Mr. John Healy of NHLI has found interesting information on the various state laws. This site cites (is not English just a grand language to have so many word that sound alike, but mean such differing things?) chapter and verse. http://www.aapsonline.org/aaps/judicial/telephone.htm 841 From: James M. Atkinson, Comm-Eng Date: Mon Jul 10, 2000 9:50pm Subject: Re: more wire tap law At 10:46 PM -0400 7/10/00, Jordan Ulery wrote: >Again Mr. John Healy of NHLI has found interesting information on the >various state laws. This site cites (is not English just a grand >language to have so many word that sound alike, but mean such differing >things?) chapter and verse. > >http://www.aapsonline.org/aaps/judicial/telephone.htm I would strongly encourage other list members to post similar materials. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== From: James M. Atkinson Date: Mon Jul 8, 2002 9:37pm Subject: What's a Military Family Worth? What's a Military Family Worth? by Rush Limbaugh, March 11, 2002 I think the vast differences in compensation between the victims of the September 11th casualty, and those who die serving the country in uniform, are profound. No one is really talking about it either because you just don't criticize anything having to do with September 11th. Well, I just can't let the numbers pass by because it says something really disturbing about the entitlement mentality of this country. If you lost a family member in the September 11th attack, you're going to get an average of $1,185,000. The range is a minimum guarantee of $250,000, all the way up to $4.7 million. If you are a surviving family member of an American soldier killed in action, the first check you get is a $6,000 direct death benefit, half of which is taxable. Next, you get $1,750 for burial costs. If you are the surviving spouse, you get $833 a month until you remarry. And there's a payment of $211 per month for each child under 18. When the child hits 18, those payments come to a screeching halt. Keep in mind that some of the people that are getting an average of $1.185 million up to $4.7 million are complaining that it's not enough. We also learned over the weekend that some of the victims from the Oklahoma City bombing have started an organization asking for the same deal that the September 11th families are getting. In addition to that, some of the families of those bombed in the embassies are now asking for compensation as well. You see where this is going, don't you? Folks, this is part and parcel of over fifty years of entitlement politics in this country. It's just really sad. "Patriotism is not a short and frenzied outburst of emotion but the tranquil and steady dedication of a lifetime." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5764 From: James M. Atkinson Date: Mon Jul 8, 2002 9:39pm Subject: Wish to the Lord A man walking along a California beach was deep in prayer. All of a sudden, he said out loud, "Lord grant me one wish." Suddenly the sky clouded above his head and in a booming voice the Lord said, "Because you have TRIED to be faithful to me in all ways, I will grant you one wish." The man said, "Build a bridge to Hawaii, so I can drive over anytime I want." The Lord said, "Your request is very materialistic. Think of the enormous challenges for that kind of undertaking. The supports required to reach the bottom of the Pacific! The concrete and steel it would take! I can do it, but it is hard for me to justify your desire for worldly things. Take a little more time and think of another wish, a wish you think would honor and glorify me." The man thought about it for a long time. Finally he said, "Lord, I wish that I could understand women. I want to know how they feel inside, what they are thinking when they give me the silent treatment, why they cry, what they mean when they say 'nothing', and how I can make a woman truly happy." The Lord replied, "You want two lanes or four on that bridge?" -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5765 From: James M. Atkinson Date: Mon Jul 8, 2002 9:43pm Subject: America Osama Bin Laden, your time is short; We'd rather you die, than come to court. Why are you hiding if it was in God's name? You're just a punk with a turban; a pathetic shame. I have a question, about your theory and laws; "How come you never die for the cause?" Is it because you're a coward who counts on others? Well here in America, we stand by our brothers. As is usual, you failed in your mission; If you expected pure chaos, you can keep on wishing Americans are now focused and stronger than ever; Your death has become our next endeavor. What you tried to kill, doesn't live in our walls; It's not in buildings or shopping malls. If all of our structures came crashing down; It would still be there, safe and sound. Because pride and courage can't be destroyed; Even if the towers leave a deep void. We'll band together and fill the holes We'll bury our dead and bless their souls. But then our energy will focus on you; And you'll feel the wrath of the Red, White and Blue. So slither and hide like a snake in the grass; Because America's coming to kick your ass!!! Keep this email going. PASS IT ON -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 5766 From: Steve Uhrig Date: Mon Jul 8, 2002 10:41pm Subject: Voice Stress Analysis On 7 Jul 2002 at 1:29, kondrak wrote: > Im in a discussion on another list about "voice stress analysis", > anyone here have any dealings with the "tools"? My general answer is the tools in untrained hands are useless or even dangerous. I was close friends with a friend who taught polygraph. His courses ran weeks. Even if you would come up with some software or hardware, without training it would be worth little. That said, I think voice stress analysis or PSE or whatever cutesy name they choose to call it this week is pure baloney. Even with polygraph, which I believe in, the skill of the examiner is critical, and the truth, as anyone who has worked with them knows, more often comes out in the pre-test interview. A lot of it is all psychological. VSA/PSE, etc. is pure vaporware in my opinion. Another attempt to forego expensive equipment, training and experience in exchange for some magic box which will let anyone with the money do the job. CCS doesn't sell polygraphs. They do sell PSEs. I've personally seen a number of phony demos of voice stress, and someday when I have time I'll explain how they're done if you haven't figured it out for yourself. I've never seen a faked polygraph demo by the manufacturer, although I have seen plenty of people operating them who had no idea whatsoever what they were doing. Steve (always opinionated) ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5767 From: Steve Uhrig Date: Mon Jul 8, 2002 11:14pm Subject: Chad Margita Chad, if you read this list, please give me a call when you can. I have a small assignment for you. We don't seem to have a reliable email connection. Tuesday before 2PM or after 5PM would be best, Thirsday days or Friday. Will be on the street Wednesday day work and Thursday evening. Not before 10AM please. Use my toll free number. It is on any of my stationery or cards. Tell whoever answers I told you to use that number and ask for me if anyone gives you any crap about being on that line. That line switches around to whomever is available for tech support, and they may have to transfer you back to me. Or call the main number and I'll call you back. Leave your # if I don't answer. Tks .. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5768 From: Date: Tue Jul 9, 2002 3:02am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. This file is set to automatically go out to list members every two weeks, Please review it, and ensure that you are listed properly (correct address, phone, etc). ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (including AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: tscm01@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 5769 From: Date: Tue Jul 9, 2002 3:02am Subject: File - mission.txt TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 5770 From: Hawkspirit Date: Tue Jul 9, 2002 8:57pm Subject: CALEA Sent: Monday, July 01, 2002 9:32 PM Subject: CALEA wiretap requirements took effect yesterday FYI, Mike Privacy Villain of the Week: CALEA wiretap tax Consumers looking forward to lower phone bills or the next generation in whizbang wireless technology may have to wait a bit longer. First they have to pay for the privilege of having holes deliberately torn out of their phone security. This Sunday, June 30 is the deadline dictated by the courts and the Federal Communications Commission for telecommunications companies to fall into full compliance with the 1994 Communications Assistance to Law Enforcement Access Act (CALEA) . Compliance in this instance means the installation of an infrastructure giving the FBI the access, at the flip of a switch, to "call content" (i.e., conversations) and "call data" (i.e., who dialed what when) at the flip of the switch. This mandated infrastructure obviates the need for the cumbersome process of going to a judge, applying for a search warrant and installing a tap before listening in. Now, those rather quaint procedures are still on the books in some form or another -- it's just that the infrastructure is now such that the formal niceties of a legal permission slip aren't strictly necessary to listen in on phone calls on the qt. The ready-to-tap system leaves consumer phone calls -- including the Social Security and bank account numbers entered via touch-tone -- much more vulnerable to other parties with the necessary technical know-how. The potential for identity fraud and outright theft is thus increased. Now, of course, all of this doesn't come cheap. One small telephone/Internet provider in Kansas told PCWorld, "We were looking at getting into video, providing movies, cable, and entertainment content," but the costs of the CALEA compliance have pushed that back one or two years. Costs of compliance have been quoted as anywhere from $15,000 to $75,000 per switch. VeriSign, which is looking to provide CALEA services to telecom providers estimates that in addition to the upgrade costs, maintenance of CALEA systems will run about "at a minimum $150,000 annually." And of course these higher costs will restrict supply and raise prices above what they otherwise would have been. But it's all for a good cause -- the easy listening pleasure of any number of Privacy Villains of the Week. The Privacy Villain of the Week and Privacy Hero of the Month are projects of the National Consumer Coalition's Privacy Group. Privacy Villain audio features are now available from FCF News on Demand. For more information on the NCC Privacy Group, see www.nccprivacy.org or contact James Plummer at 202-467-5809 or jplummer@c.... 5771 From: McIntyre Date: Tue Jul 9, 2002 9:24am Subject: Black Hat Briefings Keynotes Include NSA Director and Special Advis. to Bush FYI - I thought this may be of interest to several list members due to recent discussions ---------------------------------------------------------------- For Immediate Release Contacts B.K. DeLong press@b... +1.617.877.3271 BLACK HAT BRIEFINGS 2002 KEYNOTES INCLUDE NSA DIRECTOR AND SPECIAL ADVISOR TO THE PRESIDENT NSA Security Evaluations Group Technical Director Richard George & Richard Clarke - Special Advisor to the President for Cyberspace Security http://www.blackhat.com/ -- Black Hat Inc. today announced the keynote speakers for this summer's Black Hat Briefings and Training 2002, the annual conference and workshop designed to help computer professionals better understand the security risks to their computer and information infrastructures by potential threats. This year's show will focus on 8 tracks of hot topics including Wireless, Firewalls, Access Control, PKI & Single Signon, Routing and Infrastructure, Application Security, Intrusion Detection, Incident Response & Computer Forensics, Privacy & Anonymity, Web, Mail and Other Related Servers, and Deep Knowledge. The event is being held 31 July through 1 August 2002 at the Caesars Palace Hotel and Casino in the heart of Las Vegas. Top-notch speakers will deliver to the conference's core audience of IT & network security experts, consultants and administrators the newest developments on the vital security issues facing organizations using large networks with a mix of operating systems. "Black Hat USA 2002 will be unlike any other security conference in the world- we will be showcasing the work of over 45 of the most knowledgeable and renown security professionals, hosting a gala reception with an unrivaled book signing event that will run concurrent with the never-before-seen Hacker Court," says Jeff Moss, founder of Black Hat Inc. "Black Hat USA 2002 promises to offer an unparalleled networking opportunity in the security arena." The keynote speakers for this year's Black Hat Briefings include: -- Richard George joined the National Security Agency as a mathematician in 1970 and has worked in the Information Assurance Directorate (or its predecessor organizations) for 32 years as a cryptomathematician. He currently serves as the Technical Director of the Security Evaluations Group which is responsible for evaluating security solutions used by the Department of Defense and Intelligence Community. -- Richard Clarke, Special Advisor to the President for Cyberspace Security. Clarke has served in several senior national security posts. Most recently he served as National Coordinator for Security, Infrastructure Protection, and Counter-terrorism on the National Security Council. As National Coordinator, he led the U.S. government's efforts on counter-terrorism, cyber security, continuity of government operations, domestic preparedness for weapons of mass destruction, and international organized crime. In 1992, General Scowcroft appointed Mr. Clarke to the National Security Council staff. He continued as a member of the NSC staff throughout the Clinton Administration. This year's Luncheon Speaker will be Jeff Jonas, President and founder of Systems Research & Development (SRD). Jonas will be talking about Non-Obvious Relationship Awareness (NORA) technology, how this technology is used to catch gaming cheats in the nearby casinos, and how it is being used to catch terrorists these days. Other Black Hat Briefings 2002 speakers include: -- Thomas Akin, Founding Director, Southeast Cybercrime Institute. Akin is a Certified Information Systems Security Professional (CISSP) who has worked in Information Security for almost a decade. He is the founding director of the Southeast Cybercrime Institute where he also serves as chairman for the Institute's Board of Advisors. He is an active member of the Georgia Cybercrime Task Force where he heads up the Task Force's Education committee. Thomas also works with Atlanta's ISSA, InfraGard, and HTCIA professional organizations. -- Don Cavender, Senior Special Agent, FBI Academy. SSA Cavender has twelve years experience as an FBI Agent. The past seven years he has been involved in high technology investigations and digital forensics. He is presently responsible for instruction in Internet and Network Investigations for FBI, Federal, State and Local Law Enforcement Investigators, case support and consultation and research. -- Sean Convery, Network Architect, Cisco. Convery is a network architect in Cisco's VPN and security business unit. Sean works primarily on the SAFE blueprint, and is an author several of its whitepapers. Prior to his four years at Cisco, Sean held various positions in both IT and security consulting during his 11 years in networking. -- Mark Eckenwiler, Senior Counsel in the Computer Crime & Intellectual Property Section, Criminal Division, U.S. Department of Justice. Eckenwiler is Senior Counsel in the Computer Crime and Intellectual Property Section, Criminal Division, U.S. Department of Justice. His areas of responsibility include federal wiretap law, computer search and seizure, and online investigations. An Internet veteran for almost two decades, Mark has written and spoken widely on such issues as anonymity and free speech, e-mail stalking laws, Internet jurisdiction, electronic privacy, and the Fifth Amendment implications of cryptographic keys. -- Carole Fennelly, Partner, Wizard's Keys Corporation. With 20 years as a Unix systems administrator and security consultant, Carole has a wealth of experience in both technical and managerial procedure. Her rather caustic articles, both technical and editorial, have been widely published and she has been quoted in numerous trade publications. -- Halvar Flake, Reverse Engineer, Black Hat Consulting. Originating in the fields of copy protection and digital rights management, he gravitated more and more towards network security over time as he realized that constructive copy protection is more or less fighting windmills. After writing his first few exploits he was hooked and realized that reverse engineering experience is a very handy asset when dealing with COTS software. With extensive experience in reverse engineering, network security, penetration testing and exploit development he recently joined BlackHat as their primary reverse engineer. -- Dr. Ian Goldberg is internationally recognized as one of the world's leading cryptographers and cypherpunks. Dr. Goldberg is a founder of Berkeley's Internet Security, Applications, Authentication and Cryptography group. In addition to developing many of the leading network software titles for the Palm Pilot, he is known for his part in cracking the first RSA Secret Key Challenge in three and a half hours; breaking Netscape's implementation of the encryption system SSL; and breaking the cryptography in the GSM cellular phone standard. In November 1998, Wired magazine selected Dr. Goldberg as one of the "Wired 25" - the twenty-five people who in 1998 are "about to change the rules all over again." In December 2000 he obtained his Ph.D. from UC Berkeley for his thesis "A Pseudonymous Communications Infrastructure for the Internet," which examined the technical and social issues involved in designing the Freedom Network. -- Jesse Kornblum, Chief, Research and Development, Air Force Office of Special Investigations. SA Kornblum is the Chief of Research and Development for the Air Force Office of Special Investigations Computer Investigations and Operations Branch . A graduate of the Massachusetts Institute of Technology, he has experience running intrusion investigations and supporting other agents in more traditional investigations. He is currently responsible for developing tools and techniques to allow agents to conduct investigations. -- David Litchfield, Managing Director & Co-Founder, Next Generation Security Software. Litchfield is a world-renowned security expert specializing in Windows NT and Internet security. His discovery and remediation of over 100 major vulnerabilities in products such as Microsoft's Internet Information Server and Oracle's Application Server have lead to the tightening of sites around the world. David Litchfield is also the author of Cerberus' Internet Scanner (previously NTInfoscan), one of the world's most popular free vulnerability scanners. In addition to CIS, David has written many other utilities to help identify and fix security holes. David is the author of many technical documents on security issues including his tutorial on Exploiting Windows NT Buffer Overruns referenced in the book "Hacking Exposed". A limited number of books will be available for purchase from our official on-site bookseller, Breakpoint, during the USA 2002 Briefings. Meet and speak with the authors: * Thomas Akin, author of "Hardening Cisco Routers" * Stuart McClure, author of "Web Hacking: Attacks and Defense" ^ * Paul Proctor, author of "The Secured Enterprise: Protecting Your Information Assets" and "The Practical Intrusion Detection Handbook" * Honeynet Project on their book "Know Your Enemy Revealing the Security Tools, Tactics, and Motives of the Blackhat" * Ryan Russell and Dan Kaminsky, best-selling authors of "Hack Proofing Your Network, Second Edition" * Debra Littlejohn Shinder, best-selling author of "Scene of the Cybercime: Computer Forensics Handbook" ^ * Dr. Thomas W. Shinder, bestselling author of "Configuring ISA Server 2000" and the forthcoming "InfoWar for MCSEs: Defending Your Microsoft Enterprise Network" * Robert Shimonski, author of "Sniffer Network Optimization and Troubleshooting Handbook" * Rick Smith, author of "Authentication: From Passwords to Public Keys" * Mike Schiffman, Hacker's Challenge: Test Your Incident Response Skills Using 20 Scenarios ^ Denotes a NEW BOOK- be one of the first to get a copy BEFORE it hits the bookstores! All paid Briefings attendees will receive free admission to the DEF CON conference (http://www.defcon.org), being held August 2, 3, and 4th at the Alexis Park Hotel. Conference-goers also get a free book: "Hack Proofing Your Ecommerce Site" by Ryan Russell, compliments of our official book sponsor, Syngress Publishing. There will also be access to a wireless network during the show; for those without wireless cards, we will be selling them on-site from the BlackHat Store To register for BlackHat Briefings, visit the Web site at http://www.blackhat.com or register at the conference. Direct any conference-related questions to info@b.... For press registration, contact B.K. DeLong at +1.617.877.3271 or via email at press@b.... (For the DEF CON conference, ALL PRESS MUST PRE-REGISTER or pay the $75 entrance fee on-site. For more details regarding media passes to DEF CON, please read this page: http://www.defcon.org/dcx-press.html) About Black Hat Inc. Black Hat Inc. was originally founded in 1997 by Jeff Moss to fill the need for computer security professionals to better understand the security risks and potential threats to their information infrastructures and computer systems. Black Hat accomplishes this by assembling a group of vendor-neutral security professionals and having them speak candidly about the problems businesses face and their solutions to those problems. Black Hat Inc. produces 5 briefing & training events a year on 3 different continents. Speakers and attendees travel from all over the world to meet and share in the latest advances in computer security. For more information, visit their Web site at http://www.blackhat.com ### 5772 From: dp01011 Date: Wed Jul 10, 2002 0:02am Subject: Re: CALEA Are there any attorneys on this list who could give us some constitutional insight on CALEA? Dean 5773 From: Hawkspirit Date: Wed Jul 10, 2002 0:19pm Subject: Sound Weapon > Weapon Sends Message That's Loud & Clear > San Diego tech firm's 'sonic bullets' could be the latest device > in the Pentagon's nonlethal arsenal. > By Peter Pae, Times Staff Writer > SAN DIEGO - The shrill cry of a baby can be one of the most > annoying sounds of daily life, but it is music to Pentagon strategists. > > An electronics company, American Technology Corp., has turned > the wail of a baby into a weapon that fires "sonic bullets," narrow > beams of noise that exceed the human threshold of pain. It can > incapacitate people or compel them to flee. > > "It gives you the equivalent of an intense migraine headache," said > Elwood G. Norris, the company chairman and inventor of the > device. "It's just totally disabling." > > Norris uses 50 different sound tracks, or sonic bullets, in his > new weapon. For instance, it plays backward the sound of a baby > crying at 140 decibels, 0r 20 decibels above the threshold of pain. > The noise-level is similar to that of a passenger jet taking off. > Pentagon officials see many uses for Norris' invention, such as > controlling unruly crowds, foiling hijackers and keeping potential > suicide bombers at bay. A commercial variant also may have > applications in movie theaters, vending machines and retail stores. > > The sound technology is not the first time that Norris, has made > waves. A prolific inventor, he developed and patented a Doppler > system that is a key component of ultrasonic imaging technology. > He also invented the first digital sound-recording device, as well > as a microwave radar that can detect plastic land mines. > > The acoustic weapon is categorized by the Pentagon as nonlethal, > but it could damage hearing or cause psychological harm. It > is one of the more innovative devices among the nonlethal weapons > the military is developing, analysts said. > > "They're very intrigued by these nonlethal weapons," said Loren > Thompson, a defense analyst with the Lexington Institute think tank > in Arlington, VA. "Some acoustic weapons are so powerful that they > can knock you out." > > ACOUSTIC TECHNOLOGY > > Weapons makers have been developing a nonlethal arsenal for decades, > but new advances in microwave and acoustic technology as well as post- > Sept. 11 security concerns have raised interest in such weapons. > (KK's comments: and just where does everybody think these weapons > have been tested? Hmmmmm?) > > The signal emitted by the acoustic weapon can penetrate any opening > and bounce off surfaces before reaching the intended targets. > In Afghanistan (KK's" or your next door neighbor), it could have been > used to drive out enemy soldiers holed up in caves and buildings. > > It could help an airline pilot fend off hijackers without harming > the aircraft or bystanders. And it could help military ships protect > their > perimeters in port. > (snips) > Despite years of research on sound-harassment weapons, Pentagon officials > say this is the first time soldiers will be able to direct the harassing > should > at a particular individual or target. > > A significant feature of the device is the fact that the person > standing behind or next to the emitter can't heard the sound. > It is heard only by the person who is in the sound emitter's > line of fire. > (snips) > American Technology's weapon is based on a beaming technology that > Norris has been trying to perfect for more than seven years. Known > as the hypersonic sound system, it also is creating a major buzz within > the commercial acoustics industry. > > Unlike a traditional speaker, which produces sound by vibrating the > membranes > of a woofer or a tweeter, small crystal wafers project a beam of sound > across > a room like a spotlight. The emitters are semiconductors used by Norris > in a configuration that produces focused sound waves. > > The device sends out two ultrasonic signals that produce sound only when > they hit an object or a person. > > An emitter pointed at a wall will produce a sound that seems to be coming > from > the wall, not the emitter. However, a person who is not in the line of > the beam > will not hear anything unless the beam has been bounced off the wall. > > In a recent test of the device in the company's parking lot, a reporter > stood > about 100 feet from the emitter and could hear a radio broadcast as though > it were coming from within the ear. (KK's: imagine that!) Norris then > pointed > the emitter at a nearby window and it seemed as though the sound were > coming > from within the building. (KK's: just the thing for creating street > scenes.) > (snips) > After seven years of research and development, American Technology > recently received Food and Drug Administration approval to begin marketing > the product. The FDA determined that the new sound technology does not > have adverse health effects, Norris said. > > The weapons version, which does not require FDA approval, uses high- > intensity emitters specially designed for the Pentagon. > (snips) > Stereo-equipment manufacturers also are looking at the technology. > The system would allow individuals in a car to listen to different music > without using headphones, and movie theater operators would be able to > project the system off the screens, giving the audience the illusion that > the > sound is coming from the actors' mouths. > (snips) > A simple version of the commercial system will sell for $200 to $300. > > The sound technology is the future for us," Norris said. > - - - - End of article - - - - - - > 5774 From: Paolo Sfriso Date: Thu Jul 11, 2002 3:36am Subject: Thermal Imagery and TSCM Dear Colleagues. Thanks for the many answers received on the subject. All were enlightening and usefull. I have had the Italian agent for Raytheon visit my offices for a demo of the IR-250. A practical test of trying to view a VHF Walkie-Talkie, battery powered microcamera and bug (all switched on for over an hour) planted inside a wooden cupboard with 3-4 mm wooden panels was unsatisfactory. None of the devices were revealed (N.B. they were not in direct contact with the wood panels but with about 7 cm airspace in between). FYI the Raytheon agent initially quoted a 18.000 USD price. When I told him that the US price is about 12.000 USD and for 18.000 I could fly over to the US, buy one in person and through in a 2 week holiday he immediately reduced the price to 13.000 (including shipping and export license fees which apparently takes 2-3 months to obtain). I have decided not to buy a Thermal Viewer for the time being and shall wait for one of the more sensitive items (Indigo Systems ?) to fall in price following which I'll reconsider purchase. Again, Thanks to all for the suggestions. Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 5775 From: James M. Atkinson Date: Thu Jul 11, 2002 8:44am Subject: al-Qaeda poised to strike hard via the Internet http://www.theregister.co.uk/content/6/26134.html al-Qaeda poised to strike hard via the Internet By Thomas C Greene in Washington Posted: 10/07/2002 at 17:43 GMT Every few months some naive twinkie in the mainstream press re-writes the government's urban myth of terrorists slithering through cyberspace, preparing to blow up a small city with the awesome power of the computer mouse. Lately the frequency of these press infomercials has been increasing, most likely in response to a Federal PR campaign supporting Dubya's sales pitch for a new Department of Homeland Defence, a piece of bureaucratic window-dressing engineered to produce a nation-wide illusion of safety. For a little historical background, the mother of all such cyber-terror FUD stories is this one by USA Today's Andrea Stone. It's the government's script on cyber-terror, perfectly reproduced and unbiased by any evaluation, skepticism or research by the author. Recently it's been dÈj‡ vu all over again. Just over a week ago we had a hysterical item from the Washington Post predicting mass death and destruction from al-Qaeda operatives remotely crashing planes and opening flood gates from secret bases in Internet cafes throughout the world. A few days later, ABC News re-wrote the article, as mainstream outlets like to do with sexy/scary stuff like cyber terror. That same week we had a warning from the Business Software Alliance, which told us that a lot of "IT Pros" are worried about this Internet terror thing (so it must be true), heavily propagated by CNN. Today we find new FUD by USA Today, in which, ironically, an old and fully discredited rumor of al-Qaeda using steganography to share their diabolical plans on Web sites is resurrected and passed-off as news. The reporter (or rather government propagandist), Jack Kelley, tells us that, "lately, al-Qaeda operatives have been sending hundreds of encrypted messages that have been hidden in files on digital photographs on the auction site eBay.com. Most of the messages have been sent from Internet cafes in Pakistan and public libraries throughout the world." A painfully familiar claim for which the author provides not one scrap of evidence, yet expresses as an established fact. We like the way he uses location (his in Islamabad and the criminal images' on eBay) for that extra ring of authenticity. "The volume of the messages has nearly doubled in the past month, indicating to some US intelligence officials that al-Qaeda is planning another attack," Kelly warns. His sources, predictably, are all anonymous 'officials'. He's merely rehashing a New York Times FUD piece written just after the 9/11 atrocity which says exactly the same things, and offers exactly the same disgraceful level of evidence, only with some quotes from identifiable people. The Times piece undoubtedly came from a 'we found terrorist stego' publicity stunt by financially strapped outfit iomart. Now, with the current struggle on Capitol Hill to approve Dubya's new Gestapo, it's essential that the man in the street be frightened and confused by a torrent of 'news' pointing to incomprehensible threats which only Big Bro has the knowledge and skill to protect him from. Look for a lot more of this cyber-terror drivel over the next two months -- or until the Department is created to the administration's satisfaction, or until Enron, Harken Energy and Halliburton cease making headlines. Æ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5776 From: Secdep Date: Fri Jul 12, 2002 0:14am Subject: CLIENT CONFIDENTIALITY? Where does client confidentiality stop? As a rule I will not do work for known criminals. Here is a story where a firm has conducted a TSCM sweep, believed to have found confidential information belonging to their client, then handed it over to the authorities. Mail & Guardian 12 July 2002 http://www.mg.co.za/Content/l3.jsp?a=59&o=5882 Top SA spy linked to Vito Palazzolo by Stefaans Brummer The head of the National Intelligence Agency (NIA) in the Eastern Cape has been suspended following allegations that he solicited money from Cape-based mafioso Vito Palazzolo. The NIA this week confirmed the suspension last month of Dumisani Luphungela, the agency's Eastern Cape provincial manager, on "allegations of corruption". But spokes-person Lorna Daniels added: "We do not want to specify the nature of the allegations except to say that every avenue will be investigated." Luphungela, who was NIA deputy head in the Western Cape until late 2000, earlier served in a multi-agency team formed to investigate Palazzolo. It is not the first time allegations have surfaced that an improper relationship developed between the Sicilian-born businessman and an investigator supposedly on his trail. The Mail & Guardian learnt this week that a private investigating firm founded by former national police commissioner Georg Fivaz had chanced on damning evidence against Luphungela while the firm was doing de-bugging work at a Franschhoek wine farm and mineral water business associated with Palazzolo. The farm, La Terre de Luc, and adjacent mineral water plant, La Vie de Luc, earlier belonged to Palazzolo. Although he formally sold both to Italian playboy and former racing driver Count Riccardo Agusta, Palazzolo still helps manage the business side. Leonard Knipe, formerly a police detective head and now a partner in Fivaz and Associates, this week said: "We did work for Count Agusta on the property. With a de-bugging company we performed duties -- we looked for bugs at the premises and the office complex of the mineral water plant." In the process, Knipe said: "I might have become privy to certain information which was conveyed to the relevant authorities." Investigators, speaking on condition of anonymity, told the M&G that Knipe had chanced on "evidence of a communication" in which Luphungela allegedly asked Palazzolo for about R10 000 to help pay for funeral expenses. From the context, the sources said, it appeared that Luphungela had a pre-existing relationship, possibly financial in nature, with the mobster. One investigator said he had been "surprised to learn" that Fivaz and Associates were "involved in providing security to Palazzolo", but praised Knipe's decision to convey the information. Several sources said it was thought that Palazzolo did not object to the information being handed to the authorities. Palazzolo's lawyer this week advised him not to comment. Knipe is also the investigating officer in the fraud-and-theft trial of Andre Lincoln, the suspended head of the elite Presidential Investigation Task Unit. Although Knipe has left the police, he has been retained part-time by the state to help finalise the prosecution, which resumed this week. Lincoln's unit was tasked by then-president Nelson Mandela in 1996 with investigating Palazzolo. The prosecution's case includes allegations that Lincoln maintained improper relations with Palazzolo. After Lincoln was arrested in 1998, the probe into Palazzolo was taken over first by Piet Disjoin, the police captain who recently grabbed headlines with his arrest of German fugitive J?rgen Harksen, and then by a multi-agency team which included prosecution authorities, the Scorpions and the NIA. Luphungela, then still second-in-charge of the NIA in the Western Cape, was the agency's representative on the team management. The M&G understands that Luphungela cultivated close ties with Cyril Beeka, a Western Cape security company boss and underworld figure who has been described as Palazzolo's "lieutenant". Although Luphungela is said to have denied "handling" Beeka as an informer, there is little doubt that Luphungela indeed had NIA authorisation to handle Beeka and that he indeed obtained some information from him. Investigators are concerned that Luphungela apparently maintained relations with Beeka after the need for it expired. If indeed Luphungela had a corrupt relationship with Palazzolo or his associates, could it have harmed investigations into the mob? A partial answer may lie in the wealth of information to which Luphungela had access. Said one insider: "He was quite hands-on. He knew everything about anything [the multi-agency team members] were doing." " Meanwhile, NIA spokesperson Lorna Daniels this week confirmed a probe into allegations that NIA members had been involved in providing false identity documents to German fugitives associated with Harksen. The M&G understands that investigators are looking at whether Luphungela was involved in this. Allegations of NIA collusion were made early this month in a bail application by a German fugitive, Erwin Heldmann, after his arrest in Cape Town. Heldmann detailed an informal network of German fugitives living in South Africa, with Harksen as contact person. NIA members provided false identity documents, he claimed. A prominent member of the German fugitive network, and an associate of Heldmann, is alleged to be former German junior defence minister Ludwig-Holger Pfahls. He has been wanted since 1999 by prosecutors in his own country on corruption and tax fraud charges amounting to about R20-million. --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 5777 From: James M. Atkinson Date: Fri Jul 12, 2002 9:19am Subject: 42 Minutes and Holding MY PLANET 42 Minutes and Holding Ö by Mary Roach Thank you for calling VeriCom Customer Care. Your call is important to us, though not as important as it is to you. If you are calling from a touch-tone phone, press or say 1. If you are calling from a rotary phone, please stay on the line while a Customer Care representative makes mocking, derisive faces. Para assistancia in espanol, go to South America and try your call again. Your call may be monitored and/or recorded for staff entertainment purposes. For unexplainable security reasons, please enter the last four digits of your junior high school locker combination, followed by your motherís pet name for your father on evenings when sheís had too much sherry. To save us money and expedite the dismissal of Customer Care representatives, our express automated speech response system is now available. To use this system, press or mime 1. To speak to one of our Customer Care representatives, call the Peterson County unemployment office. To hear these options again, hang up and call back. Welcome to the express automated speech response system. Please say your 67-digit personal account number, located on the upper lower left middle corner of the one page of your bill that has gone missing, followed by the pound sign. If you thought the * was the pound sign, say, ìDing Dongî. I heard 894375937462846190087364092634511897253478227465395834575097035044. If this is correct, say yes. If this is not correct, itís your fault. You are mumbling and/or have a funny accent. For payment information, say Payment. If you have calls and charges you donít understand, say Pinhead. To hear these options again, say Attention Span of a Gnat. To hear the call of the Long-toed stint, say kirrrr-PIP! Wacka, wacka, wacka. Welcome to our automated payment information center. Our records show a payment of $149 was posted on January 23, 2002, following a 12 day processing period during which time Accounts Receivable Clerk June Smetak was unaccountably absent and consequently your payment was recorded six days after the due date. A late fee of as much as we figured we can possibly charge without government intervention has been posted to your account. Accounts Receivable Clerk June Smetak has been promoted. Whoever said life was fair. To exit the express automated speech response system, press or say 1. To enter your 67-digit personal account number again for no special reason, press or say 2. Please wait, a Customer Care representative will be with you shortly, or will be short with you, or something. Currently, all our representatives are busy helping dilute our profits. Calls will be answered in the order in which we feel like. Your expected wait time is 42 minutes. Your expected blood pressure is 210/130. You may hear clicks followed by silence. You may hear Whole Lotta Love done entirely in strings. You may hear yourself say regrettable things, which may be monitored and/or recorded. For example, our records show that you used the phrase ìgabbling nitwitî during your last call to Customer Care. This has been noted in your records and will be reflected in the quality of service you receive and the tone of voice of the Customer Care representative, should you somehow manage to reach one. Iím sorry, 0 is not a valid prompt, even if pushed furiously 11 times in rapid succession. To use our express automated speech response system, press 1. To hear our web site address, press 2. To speak to someone about your anger management problem, press 3. 3 is not a valid response. Thank you for calling. Good bye. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5778 From: A Grudko Date: Fri Jul 12, 2002 11:17am Subject: Re: CLIENT CONFIDENTIALITY - Original Message - > ... a firm has conducted a TSCM sweep, believed to have found confidential information belonging to their client, then handed it over to the authorities. An interesting ethical and perhaps legal debate. SA law obliges members of the public, who may have limited knowledge of the law, to report information about crime, but Mr Knipe, as a recently former senior police detective officer working on a directly related case, possibly entered the client's premises with a biased view in the convenience of a commercial contract. It is hard to imagen that Knipe was objective given his history. If Knipe was acting in a law enforcement roll, even as a civillian, his actions were probably legally justified - but not then 'going public' with the info. Apart from anything else, to 'go public' would probably prejudice further official investigations. If he was only there in a professional TSCM role he should have recused himself as he would know beforehand that possibly he could not legally maintain client confidentiality. To not recuse damages the reputation of the industry. Andy Grudko (British) - D.P.M., Grad I.S, South Africa - PSIRA investigators Reg. No. 8642 Grudko Associates - www.grudko.com , andy@g... . Est. 1981. International business intelligence and investigations To contact us: (+27 12) 244 0255 - 244 0256 (Fax). ICQ : 146498943. Netmeeting : agrudko@h... IPA, SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust When you need it done right - first time 5779 From: A Grudko Date: Fri Jul 12, 2002 10:18am Subject: Gaddafi The last paragraph below is the reason for this post. Of course, journalists are experts on electronic communications :-) There are many more interesting aspects to Gaddafi's visit such as his attempt to bring over 60 full auto weapons into our country and an undisclosed number of RPGs! -------- Gaddafi circus gives Swazis a wake-up jolt July 11 2002 at 08:59PM Johannesburg STAR newspaper By Bhekie Matsebula, Tom Holloway and Basildon Peta Ludzidzini, Swaziland - If South Africans were irritated by "Brother Leader" Muammar Gaddafi and the antics of his huge entourage, spare a thought for Swaziland. The border community of Lavumisa in the south of the country woke up in the early hours on Thursday to find the town packed with soldiers, police and prison warders. Some thought South Africa was invading the country, but nerves were calmed when they saw the Swazi security forces not fleeing, but waiting at the border post. Lavumisa businessman Johannes Nkwanyane said: "I usually wake up as early as 5am to open some of my shops, and as usual, I always find a few people walking around the town. But things were different when soldiers were seen patrolling the streets, armed with automatic rifles, looking at everyone with an eagle eye." The Swazi security contingent waited tensely until 10.30am, when a convoy of government officials joined to wait even longer for the arrival of Gaddafi. King Mswati III himself arrived at the border gate around 11am. Prime Minister Sibusiso Dlamini arrived some time later. Mswati had to wait until 12.15pm for Gaddafi's arrival, in a disappointing convoy of only six cars. But by the time the army band had played both the Libyan and Swaziland national anthems, the convoy had grown to more than a hundred vehicles. After facing the music, they left for the Ludzidzini royal residence, where Gaddafi was due to pay a courtesy call on Mswati's mother before going to rest. All roads leading from Lavumisa to Manzini, 250km away, were heavily guarded by soldiers. Motorists were searched for weapons. Residents were deeply puzzled. The confusion was heightened by Gaddafi's notorious jamming equipment, which blocked telecommunications systems in the tiny kingdom from Thursday morning until late in the evening. Angry cellphone users besieged (cellphone SP) MTN's complaints lines, but these were inoperative too. * My comments in ( ) brackets. Andy Grudko (British) - D.P.M., Grad I.S, South Africa - PSIRA investigators Reg. No. 8642 Grudko Associates - www.grudko.com , andy@g... . Est. 1981. International business intelligence and investigations To contact us: (+27 12) 244 0255 - 244 0256 (Fax). ICQ : 146498943. Netmeeting : agrudko@h... IPA, SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust When you need it done right - first time 5780 From: Hawkspirit Date: Fri Jul 12, 2002 0:26pm Subject: Sweep needed Sweep needed near Birmingham, Alabama or Gulf Shores, Alabama (near Pensacola, FL Area, a spectrum analyzer or surveillance receiver to 18GHZ a requirement. Contact me by e-mail. Roger Tolces Electronic Security 5781 From: kondrak Date: Thu Jul 11, 2002 2:32pm Subject: Spookz awards > >The Spook Awards > >July 11, 2002 >By WILLIAM SAFIRE > > > > > > >LONDON > >How fare the espionage agencies? Who's hot and who's >not? >Most agents and spymasters resolutely refuse to talk >about >their own agencies, but cheerfully rat on each other's >intelligence gathering, evaluation and tradecraft. >Time now >for the Golden Cloak & Dagger Awards, based on >professional >assessments by a half-dozen of my spooky sources >around the >world. > >America's C.I.A.-N.S.A. combine is rated by its peers >as >unrivaled in elint (electronic intelligence), >shorthanded >in humint (human ears in foreign ministries or >terrorist >organizations) and sometimes fatally weak on timely >evaluation of data. Although it has some of the best >analysts in the field, they rarely get out in the >field and >tend to skew their evaluations to the wishes of our >director of central intelligence. > >Russia's impoverished spies, their morale bolstered by >one >of their own, Vladimir Putin, at the top in the >Kremlin, >have worked out a way to finance their operations: >using >the old Primakov network in Iraq, they take fat >commissions >on illegal oil deals. This enables them to carry out >their >primary mission - stealing technology from the West - >though Russian operatives are babes in the woods >compared >with those in the vast international Chinese network, >peer-reviewed as best in the world at filching arms >production know-how. Russia still excels at using U.N. >cover, often through Scandinavian penetrations. > >Most-improved agency in Europe is Dutch intelligence, >stunning others with its technical sophistication. In >France, intelligence agents who leaked embarrassing >data >about Jacques Chirac must now cover their tracks after >his >re-election triumph. Germany, despite its failure to >penetrate cells of Hamburg terrorists, is well >regarded for >its cold-war ability to triple double agents. >Britain's >agency, the one most trusted by the data-overwhelmed >C.I.A., shines in the field of analysis. > >The growing terror networks in the Far East are >getting >fair attention from South Korea's K.C.I.A., which >cooperated with Singapore in uprooting a Hezbollah >operation misidentified publicly as exclusively Al >Qaeda. >Indonesia's spymaster impressed his hosts at a >Langley, >Va., meeting recently with his Elvis Presley haircut, >but >has yet to get a handle on Islamic groups based in his >far-flung country. > >In the Middle East, individual Spook of the Year is >Gen. >Saeb Khier of Jordan, though no panel member is >willing to >say why. Israel's Mossad, making a comeback after a >slump >in the past decade, is admired by fellow professionals >for >its recent wetwork. The well-heeled gumshoes of the >Saudi >network, their loyalties riven by royal family >dissension, >are no longer at the top of the Arab field. Egyptian >intelligence is more effective, thanks largely to >interrogation techniques that some other agencies envy >but >cannot stomach. > >Syria, say members of the peer-review panel, is >runner-up >for the Golden Cloak & Dagger for its post-Sept.-11 >strategic coup. Damascus is said to have made a deal >with >the C.I.A.: We'll help you track down Al Qaeda, saving >American lives, if you don't give us a hard time on >Hezbollah based in Syrian-occupied Lebanon, which >costs >only Israeli lives. As a result, even though the U.S. >solemnly tut-tuts at active Syrian support of these >terrorists, Syria was not included in President Bush's >"axis of evil." > >This unverified account goes further: in return for a >promise of secret U.S. use of Syrian territory near >Iraq in >the next attack on Saddam Hussein, as took place when >Syria >joined the allied coalition in Gulf War I, the U.S. >has >turned a blind eye to Syria's payment in oil from Iraq >for >being the conduit of Russian replacement parts for >Saddam's >aging MIG-29 planes and T-62 tanks. > >Practitioners of espionage everywhere salute Bashar >al-Assad. The eye doctor, who succeeded his father as >dictator, is taking excellent instruction in duplicity >from >his experienced spymaster. > >Push the envelope, please: > >The non-judgmental Golden Cloak & Dagger Award this >year >goes to Iran, guardian of the heritage of takia, "the >need >to conceal," for sponsorship of its covert arm, >Hezbollah, >now spreading throughout the Shiite diaspora >worldwide, >from Lebanon to Indonesia. While Al Qaeda gets the >publicity as designated global villain, the quietly >metastasizing cells of Iran's Hezbollah get the >intelligence insiders' acclaim. > >Copyright 2002 N.Y. Times > >===== 5782 From: Johnston, Richard Date: Fri Jul 12, 2002 8:18am Subject: RE: al-Qaeda poised to strike hard via the Internet So, what is your point? How does it apply to TSCM? Who is Dubya? -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Thursday, July 11, 2002 7:45 AM To: TSCM-L Mailing List Subject: [TSCM-L] al-Qaeda poised to strike hard via the Internet http://www.theregister.co.uk/content/6/26134.html al-Qaeda poised to strike hard via the Internet By Thomas C Greene in Washington Posted: 10/07/2002 at 17:43 GMT Every few months some naive twinkie in the mainstream press re-writes the government's urban myth of terrorists slithering through cyberspace, preparing to blow up a small city with the awesome power of the computer mouse. Lately the frequency of these press infomercials has been increasing, most likely in response to a Federal PR campaign supporting Dubya's sales pitch for a new Department of Homeland Defence, a piece of bureaucratic window-dressing engineered to produce a nation-wide illusion of safety. For a little historical background, the mother of all such cyber-terror FUD stories is this one by USA Today's Andrea Stone. It's the government's script on cyber-terror, perfectly reproduced and unbiased by any evaluation, skepticism or research by the author. Recently it's been dÈj‡ vu all over again. Just over a week ago we had a hysterical item from the Washington Post predicting mass death and destruction from al-Qaeda operatives remotely crashing planes and opening flood gates from secret bases in Internet cafes throughout the world. A few days later, ABC News re-wrote the article, as mainstream outlets like to do with sexy/scary stuff like cyber terror. That same week we had a warning from the Business Software Alliance, which told us that a lot of "IT Pros" are worried about this Internet terror thing (so it must be true), heavily propagated by CNN. Today we find new FUD by USA Today, in which, ironically, an old and fully discredited rumor of al-Qaeda using steganography to share their diabolical plans on Web sites is resurrected and passed-off as news. The reporter (or rather government propagandist), Jack Kelley, tells us that, "lately, al-Qaeda operatives have been sending hundreds of encrypted messages that have been hidden in files on digital photographs on the auction site eBay.com. Most of the messages have been sent from Internet cafes in Pakistan and public libraries throughout the world." A painfully familiar claim for which the author provides not one scrap of evidence, yet expresses as an established fact. We like the way he uses location (his in Islamabad and the criminal images' on eBay) for that extra ring of authenticity. "The volume of the messages has nearly doubled in the past month, indicating to some US intelligence officials that al-Qaeda is planning another attack," Kelly warns. His sources, predictably, are all anonymous 'officials'. He's merely rehashing a New York Times FUD piece written just after the 9/11 atrocity which says exactly the same things, and offers exactly the same disgraceful level of evidence, only with some quotes from identifiable people. The Times piece undoubtedly came from a 'we found terrorist stego' publicity stunt by financially strapped outfit iomart. Now, with the current struggle on Capitol Hill to approve Dubya's new Gestapo, it's essential that the man in the street be frightened and confused by a torrent of 'news' pointing to incomprehensible threats which only Big Bro has the knowledge and skill to protect him from. Look for a lot more of this cyber-terror drivel over the next two months -- or until the Department is created to the administration's satisfaction, or until Enron, Harken Energy and Halliburton cease making headlines. Æ -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell ---------------------------------------------------------------------------- ---------------------- Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 5783 From: pballaera Date: Fri Jul 12, 2002 1:04pm Subject: Hello Everyone! Hello members thanks for having me aboard,Im 28 yrs as a Private Investigator/Bodyguard/Surety Bailbonds Man.Id really like to learn the Bizz ive done some minor stuff but never this advanced.Im a hard working dedicated man available for work at anytime/anywhere.My resume, Id be more than happy to fax anyone whos interested in taking on a guy who deeply shows a desire to work in your field of expertise.Please feel free to drop me an email. Sincerly,Paul pballaera@y... 5784 From: gkeenan Date: Fri Jul 12, 2002 5:44pm Subject: Re: al-Qaeda poised to strike hard via the Internet Well, I'm just in "learning mode" re TSCM. I'm more on the physical/analytical/research side of terrorism. However, it doesn't take a brain surgeon to see the connection between cyberterror and TSCM. After all, from what I've been able to glean from this list alone over the last couple of years -- there are MANY areas of overlap between them. So I would think that that's the point. We all have to be aware. If you have such a narrow focus on TSCM only -- you're a prime candidate for an attack from another direction (I only speak from 25 years of military experience -- and another 20 as a security specialist and consultant). As for Dubya? Where've you been? He just happens to be the President of the USA. Jerry Keenan West Islip, NY ----- Original Message ----- From: Johnston, Richard To: 'James M. Atkinson' ; TSCM-L Mailing List Sent: Friday, July 12, 2002 9:18 AM Subject: RE: [TSCM-L] al-Qaeda poised to strike hard via the Internet So, what is your point? How does it apply to TSCM? Who is Dubya? -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Thursday, July 11, 2002 7:45 AM To: TSCM-L Mailing List Subject: [TSCM-L] al-Qaeda poised to strike hard via the Internet http://www.theregister.co.uk/content/6/26134.html al-Qaeda poised to strike hard via the Internet By Thomas C Greene in Washington Posted: 10/07/2002 at 17:43 GMT Every few months some naive twinkie in the mainstream press re-writes the government's urban myth of terrorists slithering through cyberspace, preparing to blow up a small city with the awesome power of the computer mouse. Lately the frequency of these press infomercials has been increasing, most likely in response to a Federal PR campaign supporting Dubya's sales pitch for a new Department of Homeland Defence, a piece of bureaucratic window-dressing engineered to produce a nation-wide illusion of safety. For a little historical background, the mother of all such cyber-terror FUD stories is this one by USA Today's Andrea Stone. It's the government's script on cyber-terror, perfectly reproduced and unbiased by any evaluation, skepticism or research by the author. Recently it's been dÈj‡ vu all over again. Just over a week ago we had a hysterical item from the Washington Post predicting mass death and destruction from al-Qaeda operatives remotely crashing planes and opening flood gates from secret bases in Internet cafes throughout the world. A few days later, ABC News re-wrote the article, as mainstream outlets like to do with sexy/scary stuff like cyber terror. That same week we had a warning from the Business Software Alliance, which told us that a lot of "IT Pros" are worried about this Internet terror thing (so it must be true), heavily propagated by CNN. Today we find new FUD by USA Today, in which, ironically, an old and fully discredited rumor of al-Qaeda using steganography to share their diabolical plans on Web sites is resurrected and passed-off as news. The reporter (or rather government propagandist), Jack Kelley, tells us that, "lately, al-Qaeda operatives have been sending hundreds of encrypted messages that have been hidden in files on digital photographs on the auction site eBay.com. Most of the messages have been sent from Internet cafes in Pakistan and public libraries throughout the world." A painfully familiar claim for which the author provides not one scrap of evidence, yet expresses as an established fact. We like the way he uses location (his in Islamabad and the criminal images' on eBay) for that extra ring of authenticity. "The volume of the messages has nearly doubled in the past month, indicating to some US intelligence officials that al-Qaeda is planning another attack," Kelly warns. His sources, predictably, are all anonymous 'officials'. He's merely rehashing a New York Times FUD piece written just after the 9/11 atrocity which says exactly the same things, and offers exactly the same disgraceful level of evidence, only with some quotes from identifiable people. The Times piece undoubtedly came from a 'we found terrorist stego' publicity stunt by financially strapped outfit iomart. Now, with the current struggle on Capitol Hill to approve Dubya's new Gestapo, it's essential that the man in the street be frightened and confused by a torrent of 'news' pointing to incomprehensible threats which only Big Bro has the knowledge and skill to protect him from. Look for a lot more of this cyber-terror drivel over the next two months -- or until the Department is created to the administration's satisfaction, or until Enron, Harken Energy and Halliburton cease making headlines. Æ -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell ---------------------------------------------------------------------------- ---------------------- Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5785 From: Steve Uhrig Date: Fri Jul 12, 2002 6:09pm Subject: Surveillance catalogs, manuals and lit for sale Hi all, I am serious about cleaning this place out and am trying to raise enough money to rent a huge construction dumpster and a bulldozer to help me clean out the shop. I need to cut down to no more than 20 bookcases full of lit, so I am offering a package of older and some more recent surveillance catalogs, individual product sheets, instruction manuals, photographs and related stuff. Much of this stuff was never available to the public, produced in tiny quantities, hand delivered only, serial numbered to the recipient, and considered extremely sensitive. Most of this no one on this list will ever actually see, but most will claim to already have it. Here's a reasonably complete list in no particular order. I may throw in other items not listed with the below package as I come across them: ==================== Department of Justice Report on Body-Worn FM Transmitters dtd Dec 1978. Evaluation of several models. Desired characteristics and design criteria for body wires. Legal requirements of the hardware. Single source of a lot of interesting info. National Intelligence Academy (NIA) textbook on Surveillance Operations, dtd 1980. Exhaustive, heavily illustrated, extremely scarce. NIA was the educational arm of AID (Audio Intelligence Devices) and is still in operation. Controlonics Scrambler Instruction Manual. This was a popular unit 20 years ago. 1995 Wiretap Report issued by the federal government. Covers court orders for electronic surveillances by state, type of intercept, length of intercept, number of intercepts, number of arrests, number of convictions, cost of intercept, etc. Lots of information, thick book. EVERY legal non-FISA intercept for 1995 is in this book. See below for other annual issues of this report. Large (size of small phone book) heavily illustrated generic spy shop catalog. 136 pages. Don't remember company, almost certainly out of business by now. Probably ten years old. Same tired old crap everyone is still selling. One of the largest of this type of catalog. Mostly garbage, nothing professional (which is still the case with these sort of things). Law Enforcement Associates (LEA) Intelligence Equipment Catalog Vol 5, dtd 1997. Highly restricted. After LEA's conversion from a garbage spy shop to an allegedly professional law enforcement equipment supplier. LEA is owned by Sirchie. Many sensitive items, heavily illustrated. Commercial van equipment catalog. Not specifically surveillance vans, but a company who makes various accessories for construction and commercial vans, with much overlap to surveillance van building. Old, but you will get a lot of ideas on how to use ordinary stuff in your van. Company probably still in business. R&R Surveillance Van Brochure. R&R/Larry Rhoades was one of the original surveillance van manufacturers. They were based here in MD and I used to have an office right around the corner from them back in the early 1980s. Their front operation was a dirtyshirt Harley Davidson shop, with open drug trafficking in the parking lot and hogs in and out at all hours and motorcycle carcasses all over the place. In the back, hidden from view, was a hospital clean professional surveillance van operation; a secret facility. R&R did some of the best van work of anyone, and a large number of government vans, especially on the East Coast, were done at R&R Speed and Cycle Shop. R&R no longer is in the van business, unfortunately. This brochure shows some of the best examples of their work. Includes detailed specs. Get lots of ideas on how professional quality surveillance vans were put together. Most are still in use. Many AID (Audio Intelligence Devices) surveillance van catalogs, brochures, photographs and specs. One is an 8x10 color glossy photo of the inside of the most expensive surveillance vans commercially available, and the fanciest. Starting prices for AID vans are about what most people pay for a starter house (well in the 5 figures). Very tightly controlled information, extremely sensitive. Their latest design of vans are fully digital, controlled by touching icons on computer screens with your fingers, not switches. Some very interesting features here. This alone is a fantastic package. Same as above, but from Sirchie's surveillance van facility in Medford, NJ. Delicate info. Large photos. Few new concepts as most of LEA and Sirchie's stuff is copied from someone else. Good info, though. Westinghouse/AID (W/AID) Video Catalog. The early days of AID degenerating from a superb outfit to just another spy shop selling other people's stuff. Perfect example of AID's current philosophy. Take an ordinary WATEC camera, triple the price, tell everyone you sell it only to police, and law enforcement will pay 3x the price for the thing. Works for them. LEA Catalog Vol 2, Dtd 1994. I seem to recall this being the early years of them trying to turn around their image from a spy shop to a reputable outfit. They're still trying. LEA International Surveillance Equipment Catalog. Dtd 1990. National Intelligence Academy (NIA) Vol 2 Electronic Intelligence textbook, covers primarily audio surveillance techniques. Several hundred pages. Dated 1974, but many of the basics are the same. Highly restricted item. Many photos, charts, drawings, op plans, etc. NIA is the educational facility associated with AID. HDS (another formerly reputable, high end but now defunct surveillance equipment manufacturer who dealt exclusively with government) brochure and spec sheets, dated 1996 and 1997, when they were in their final death throes. HDS stood for Household Data Services, if anyone cares. Perfect name for a surveillance manufacturer. HDS specialized in super small microwave wireless video and had a full line out before most of you had heard of wireless video. NIA course schedule dtd 1996. See all you could learn at the world's largest private spook school. NIA literally would not even acknowledge the existence of some of these courses. Westinghouse/AID 3rd generation digital surveillance van brochure. Many color photos. Picture the bridge of Star Trek in the back of a van and you'll get the idea. Wonder how many of these they made? Their catalogs showed something like 8 bays, and they probably had more than that. I personally have seen and operated these vans, and it is very easy to become spoiled in a short period of time and never be happy with anything lesser again. 1994 Wiretap Report. See above for description. CCS/STG (CCS we've all heard of. STG is Surveillance Technology Group, another of the endless names CCS adopted to give them a chance at approaching the law enforcement market where the CCS name was mud). Surveillance and countersurveillance equipment catalog. Several hundred pages. Heavily illustrated. Dated approximately 1990. Almost exclusively vaporware. See if you can spot the very few genuine products in this catalog, and if you can, identify who actually made them before CCS repackaged them in a Halliburton Suitcase and multiplied the price by 100. Probably the single largest catalog they've ever produced. Would be good for an English class as a superb example of hyperbole. For the majority who never got beyond 6th grade English, hyperbole is a term meaning gross exaggeration, like 'world's smallest'. I always ask the question when 200 spy shops all claim to be the manufacturer of the 'world's smallest' whatever, does that mean they have examined each and every one on the planet and compared the volume and weight of every one of them to their own product? FYI, manufacturing involves more than pasting your label on someone else's product. Scott French Book 'Big Brother Game' dated 1975. Anything involving Scott French is another example of hyperbole in its purest form. Very little if any of French/Lapin's stuff is worth the postage to ship it. NATIA membership brochure. NATIA = NAtional Technical Investigator's Association. The top electronic spooks in the world. Membership open to government employees only, and not just any government employee. You must know how to play golf. ESC Technical Security Measures Catalog. I forget what ESC used to stand for, but he was an early scum spy shop, large catalog dtd 1987 packaged in a 3 ring notebook. Very fancy product sheets, some nonexistent products, some other people's stuff, nothing genuine which was original. Long defunct operation. Many many photos. Scott French Book 'High Tech Harrassment' dtd 1990. Original price listed as $45, which apparently some were foolish enough to pay. For the record, I have never bought a French/Lapin book in my life. All were sent to me by French when he was trying to butter me up. Worked for about 2 weeks. 1999 Wiretap Report. Description above. LEA (Law Enforcement Associates) Spy Shop Catalog dtd 1988, back when they were just another scummy spy shop, heavily illustrated, 85 pages, extensive knockoffs of other companies' products, thinly disguised as LEA's own. An example of the earlier days of sleazy spy shops promising a lot of things they couldn't deliver, yet taking tens of thousands of dollars from victims who believed their crap. Winkelmann Hawk Model 450 Nonlinear Junction Detector brochure dtd 11/99, color photos, specs, etc. Seems like a fairly decent low end unit, although I have never seen one. Winston Arrington Book 'Now Hear This', numerous schematics of his surveillance devices, all of which are valid and most of which a talented hobbyist with a good junkbox and electronic construction skills could reproduce. This is the real thing. Schematics only, no construction info, not for the inexperienced or faint of heart. You will need to know some theory to make these circuits work, as some require calculating values of inductance and capacitance to hit certain frequencies. You also likely will need a spectrum analyzer and a wide coverage receiver for the transmitter projects. Excellent info from one of the masters of the trade. Many items formerly sold assembled, then later as kits, then dropped altogether after legal harassment. 1st edition dated 1988. I have an infinite amount of respect for Mr. Arrington, and we have spent many hours on the phone over the years. I did a nice very favorable review of this book which for some reason he chose never to use. Good examples even if you don't have any intention of building anything, just to see circuit design. This book would be much more popular if it was slightly cheaper. While it is worth whatever he charges for it, people won't know that until they've seen it, and they won't see it until they buy it. Here's a nice copy. Probably the best piece in this collection. Lee Lapin/Scott French Book 'How to Get Anything on Anybody', dtd 1987. 264 pages. Lee Lapin and Scott French are the same person. Lapin is a pseudonym, and for a while French used the name 'Wolf Security' to pretext companies for their product information. Lapin happens to mean 'Wolf' in Latin, which surprised French when I knew that. Latin is not a totally dead language. This book has more bullshit per pound than anything else I've read in my life, including a CCS catalog. I would consider this book as pure fiction and am including it in this collection only to save the effort of carrying it to the dumpster. National Intelligence Academy (NIA) textbook 'Telephone System Intercept', dated 1986, heavily illustrated. 2nd edition, 130 pages. The real thing. Equipment and techniques still in use today. A dangerous manual in the wrong hands. Even after 30 years in this business, I learn something new every time I pick up an NIA textbook. Full Disclosure Newspaper by Glenn Roberts -- 3 issues, #21, 22 and 23, dtd approx 1990. Scarce. Glenn Roberts is anti anything government and spy related, and he reproduced copies of government requests for bids for surveillance equipment, surveillance equipment product sheets when he could get them, and similar. He is one of those who would take a single small fact and spin gigantic conspiracies around them and appear to speak knowledgeably of things about which he had absolutely no real knowledge. This guy is probably on more government lists than anyone else you could name. Interesting reading, little of real value, written by those who thought they were part of the system but had no idea they had no idea whatever of what was happening in the real world of surveillance. Accu-Quest Corp 8 page illustrated catalog, several years old, very heavy on BS. Take someone else's product, put your label on it, claim you are the manufacturer, write it up as if you personally invented the entire concept of recording on magnetic tape, or the physics of optics, or whatever, charge outrageous prices, claim to teach courses when you have no genuine knowledge on a subject matter other than what you've learned from crap you pick up at every trade show and by reading catalogs. The ultimate spy shop run by one of the ultimate spy groupies. The shell of the company may still be in business here in Maryland. SEMCO Personal Video Surveillance System, color brochure with many photos, dated approx 1990. A law enforcement video body wire intended for uniformed duty use, to record what the officer heard and saw via a 2.4 gig microwave link to a recorder in the trunk of the radio car. Not a bad idea, but the implementation was impractical, multipath rendered operation nearly useless, lots and lots of stuff to wire on the officer every morning when he's already late for roll call. Produce never made it. It was well built, but operated at dangerous power levels. I personally had a unit for evaluation which I used extensively, and while it was a nice system, it just wasn't practical. SEMCO was a former military defense supplier who ran into hard times and thought they could penetrate the law enforcement equipment market. Like many others, they had little understanding of how to function in the law enforcement community, and they failed. The company is still around, I am pretty sure, but I don't believe this product ever went anywhere. Nice brochure and good idea, though, and an honest company. Orion Vehicle Tracking Equipment Catalog dtd 1999. Canadian manufacturer, heavily GPS oriented, changes distributors and products too often for the market to keep up. An honest owner who is a capable engineer runs the place, but like in many companies, 10s hire 9s who hire 8s, and so on, and the larger the place grows the less customer service they offer. I have been to their plant, and they do good work. Heavily illustrated catalog, equipment used in large quantities by the government. Chances are, government tracking equipment will be AID if older or Orion if newer. Rare glimpse of the latest designs in primarily vehicle tracking. W/AID Intelligence Equipment Catalog, Catalog Supplement and Price Sheet (3 documents) dated 1996. Some of the old standbys, and some 'other people's products'. Towards the end of their demise under Westinghouse, although they have yet again risen, like a Phoenix, from the ashes and are trying to make another comeback. W/AID Intelligence Equipment Catalog and separate price sheet dated 1997-98. Smaller catalog than the previous year. Audio Intelligence Systems, Video Surveillance Products, Night Vision Systems, Tracking Equipment, Personal Security Systems, Mobile Surveillance Platforms, Special Purpose Vehicles, Professional Training. ======================= All the above is priced at $300 shipped in the U.S. Shipping will be via priority mail, almost certainly from Florida. Note I AM NOT offering any of the actual equipment described in these documents for sale, neither am I advertising the products. Payment can be by credit card or check. I will ship internationally at higher shipping, of course. This offer to sell the above documentation IS NOT open to just anybody and I reserve the right to deny sale to anyone without explanation. Descriptions of the companies are my opinions only, even though they are shared by most of the industry. Price is firm and I will not split up the package and sell individual items, although if you are willing to buy everything but want me to throw the Scott French books in the trash I will do so and deduct some proportionate amount from the shipping. One or two of the NIA textbooks may be reproductions, although I do not know if the repros were done by AID or later. All other info, as far as I can recall, are originals. ========================= Sold separately from the above, but sold only to a buyer of the above, is an 1992 AID catalog with prices. This is a huge catalog, 400 pages, with illustrations of nearly every product. This is probably the largest and most complete catalog they ever produced. Has charts of frequencies, connector ID and assembly instructions, matrices of what accessories work with what products, photos of everything, and prices listed. Lots of generic technical info useful to the electronic surveillance operative. This is the big one, the one everyone saves when they throw all the rest out. The classic AID. I am offering it separately because it is an expensive piece and someone may feel it is redundant compared to the rest of the package above. Price is $150. Again, this is NOT available separately, only with purchase of the above. ========================= Email if questions, but pretty much everything is described above. Please don't ask me if a certain product is in a certain catalog as this stuff is packed away and I don't feel like digging through it all, neither do I feel like making an appointment with a proctologist which is almost mandatory after reading some of this material. You have been warned. Just think, for the price of only 300 cups of coffee or 10 packs of cigarettes in some states, you can have a huge collection of surveillance equipment documentation which took me much of a career to collect. Some of this stuff is real classics from the early days of surveillance, spy shops and fraudsters. In all of the above, there is more vaporware than real products. But most of the real products ever issued are in one or another of the catalogs from the Real Companies. Buyer may get a bit more than described, as I further clean out files and find more pertinent info. Purchasing business related documentation may be a legitimate tax deduction. A formal invoice will accompany the order. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5786 From: Matt Paulsen Date: Fri Jul 12, 2002 8:21pm Subject: RE: Surveillance catalogs, manuals and lit for sale For a moment I thought that this was Jim's way of trying to clean up the list and get us back 'on topic'. Then I checked the name and read more. Guess that proves that new parents get delusional after 25+ sleepless days. Hmm.. my wife just said something and walked away.. and I have no idea what she said... >Hi all, > >I am serious about cleaning this place out and am trying to raise >enough money to rent a huge construction dumpster and a bulldozer to >help me clean out the shop. 5787 From: D. Douglas Rehman Date: Fri Jul 12, 2002 8:49pm Subject: RE: Surveillance catalogs, manuals and lit for sale Steve: What a trip down memory lane! I have to admit though that "How to get anything on anybody" (on my bookshelf beside me) helped me break into law enforcement electronic surveillance. I was fresh out of college and working as a patrolman for the city of Port Richey, Florida. A friend at the Florida Department of Law Enforcement (FDLE) told me that the Illinois State Police were looking for some tech people. I had been a ham since age 14 and wanted to get into electronic surveillance. I sent an application to ISP and got an interview. (1985) While I was pretty knowledgeable about electronics and communications, I didn't know anything about electronic surveillance. I started looking for some study material and came across Lapin's book. It gave me some insight into surveillance that helped me to answer some of the interview questions. I got hired and spent 2.5 years as a tech agent with ISP, including going to the first NATIA conference and the trial run of the electronic surveillance school at Glynco. We had several HDS systems, including two micro-miniature microwave transmitters- exceptionally advanced for their day. The year prior to my being hired, my unit had done several stings on people selling illegal wiretap equipment. Arrington was one of the targets and we had a large collection of his materials (parts, completed units, modified receivers, original schematics, etc.). We had multiple surveillance vans, but the crown jewel was an R&R Speedshop beauty. After ISP, I spent 10 years as a tech agent at FDLE and saw/have many of the catalogs/items you mention. Boy, now I feel old... Best Regards, Doug Rehman Rehman Technology Services, Inc. Specializing in Computer Forensics and Technology Related Investigations License A-9800119 Mount Dora, Florida (Orlando Area) (352)357-0500 http://www.surveil.com President Florida Association of Computer Crime Investigators http://www.facci.org 5788 From: Matt Paulsen Date: Fri Jul 12, 2002 10:00pm Subject: RE: al-Qaeda poised to strike hard via the Internet It's a 1 2 3 dance. Facilities, communications, data... TSCM is very related to data security which is very related to facilities controls. All three areas are prime attack areas, all three operate together and all three are responsible for covering the other two butts when their on the pot. Examples - ANSI 709.x, IEEE 802.11, IEEE 802.1x (I didn't say they were GOOD examples) , EIA 852, (D.P.S.S.T.) Oregon Department of Public Safety Standards and Training, ASP certification, CPR certification, etc. Technical capabilities, network capabilities, physical capabilities, etc. We're all doing our piece of the security dance, just in different ways. It's the real players that understand that working with professionals in other overlapping, complimentary fields creates true competencies as long as you know when you're stupid enough to be really dangerous in that area and smart enough to know who to call who is such in yours. What can I say about Mr. Greene... I'd better not, I'd get sued by The Register and like mom always used to say..... But give CheckPoint a call, I'm sure they'll be happy to tell you what they think of Mr. Greene. (Ah, that's much nicer that what I just finished typing after 15 minutes. After all this is a public forum and who knows who's lurking on the list.) With regards to the article, this is a risks avoidance, pension planning, 25 year retirements dreams issue. Information security as it pertains to physical access systems is deplorable in many cases and the abilities to carry out attacks on infrastructure being more readily available than should be. From personal experience I've seen too many lax security managers give out too much access and not do enough to safeguard critical information because they don't want to rock the boat. Fine by me, it's more $ when things blow up (literally) and they don't care because 'it won't happen on my watch' is the predominant mentality. But don't fool yourself into thinking that it's not an issue when I and 100's of others know for a fact it is, especially when I've been left with access to information systems after I've walked out of client sites telling them to take my access off their lists and hear that they left it in YEARS LATER (including encryption systems, remote untrusted systems and real-time proxies to highly sensitive locations) "because it's so hard to get accounts like that setup in the first place, so we think we'll keep it around for a while." Lets think that through for a moment.. Yea.. That doesn't make sense. But it DOES happen. DAILY. Ok, lets see if I get on someone's to-watch list...What if major PUC facilities were hit with coordinated attacks on government sites to create government information confusion and public panic and real deaths.. in the millions or at least 10's of thousands and completely decentralize large geographic populations. Control centers, substations, etc. Little onsite security, no major data center offsite facilities, tie-ins with nuclear facilities via t1, oc3, microwave, etc. Lets think about the Portland region alone, since my backyard is a good example of incompetence. We've got now defunct Enron/PGE, Trojan, Hanford, DOE, FBI, Secret Service, the PDX Intl. Airport, and the Port of Portland all in a nice 10 KM area (ties via networks to Trojan/Hanford obviously since their not in the downtown proper). Ok, so we lace a nice tanker from Japan with nuclear waste (this seems to be happening now reasons only God knows why, so why the heck not put it in here), or for simplicities sake, a PPT purity chemicals boat bound for Japan is blown up, we storm PGE for their information controls, blow up the Secret Service building and a few banks (oops collateral damage, the Canadians will be annoyed) and the FBI building (there goes counterterrorism) and for giggles take out the DOE building with a PDX Boeing 7x7 series across the way next to Benson and... oh sh*t we have a problem people. No more power trading today thank-you-very-much. Now the funny part is... just who has backups for data... facilities, and oh yea, those other things that corporate CEO's call streamlined operations.. trained personnel to replace all those dead people, and don't forget the potential for blackout here, radiation issues, mass deaths via waterway contamination and sheer terror. Just who's monitoring services, and what about vendor access and control safeguards. What about actual trained and fire tried guards. Most of these locations are crippling examples of what not to do from a security standpoint. Things are no more secure now than they were pre-9/11, which is why I and not the police are chasing crazies on the streets of NW Portland during my lunchtime when nuts are breaking into cars and attacking my vendor's cleaning lady with sticks on the street. Which is why the Portland Police bureau may as well file bankruptcy, which is why the Oregon legislature can't appear to balance a budget. $38 billion for security... For what I ask. If you ask me, we got lucky 10 months ago and we haven't done anything of any measurable value to fix the real problems at stake with what got us there to begin with, so in the meantime, I'm just going to try to get my lunch without chasing criminals on the street and maybe watch NBR at night when they talk about 300 point daily drops in an overinflated readjusting market. -----Original Message----- From: gkeenan [mailto:gkeenan@s...] Sent: Friday, July 12, 2002 3:44 PM To: 'James M. Atkinson'; TSCM-L Mailing List; Johnston, Richard Subject: Re: [TSCM-L] al-Qaeda poised to strike hard via the Internet Well, I'm just in "learning mode" re TSCM. I'm more on the physical/analytical/research side of terrorism. However, it doesn't take a brain surgeon to see the connection between cyberterror and TSCM. After all, from what I've been able to glean from this list alone over the last couple of years -- there are MANY areas of overlap between them. So I would think that that's the point. We all have to be aware. If you have such a narrow focus on TSCM only -- you're a prime candidate for an attack from another direction (I only speak from 25 years of military experience -- and another 20 as a security specialist and consultant). As for Dubya? Where've you been? He just happens to be the President of the USA. Jerry Keenan West Islip, NY ----- Original Message ----- From: Johnston, Richard To: 'James M. Atkinson' ; TSCM-L Mailing List Sent: Friday, July 12, 2002 9:18 AM Subject: RE: [TSCM-L] al-Qaeda poised to strike hard via the Internet So, what is your point? How does it apply to TSCM? Who is Dubya? -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Thursday, July 11, 2002 7:45 AM To: TSCM-L Mailing List Subject: [TSCM-L] al-Qaeda poised to strike hard via the Internet http://www.theregister.co.uk/content/6/26134.html al-Qaeda poised to strike hard via the Internet By Thomas C Greene in Washington Posted: 10/07/2002 at 17:43 GMT Every few months some naive twinkie in the mainstream press re-writes the government's urban myth of terrorists slithering through cyberspace, preparing to blow up a small city with the awesome power of the computer mouse. Lately the frequency of these press infomercials has been increasing, most likely in response to a Federal PR campaign supporting Dubya's sales pitch for a new Department of Homeland Defence, a piece of bureaucratic window-dressing engineered to produce a nation-wide illusion of safety. For a little historical background, the mother of all such cyber-terror FUD stories is this one by USA Today's Andrea Stone. It's the government's script on cyber-terror, perfectly reproduced and unbiased by any evaluation, skepticism or research by the author. Recently it's been dÈj‡ vu all over again. Just over a week ago we had a hysterical item from the Washington Post predicting mass death and destruction from al-Qaeda operatives remotely crashing planes and opening flood gates from secret bases in Internet cafes throughout the world. A few days later, ABC News re-wrote the article, as mainstream outlets like to do with sexy/scary stuff like cyber terror. That same week we had a warning from the Business Software Alliance, which told us that a lot of "IT Pros" are worried about this Internet terror thing (so it must be true), heavily propagated by CNN. Today we find new FUD by USA Today, in which, ironically, an old and fully discredited rumor of al-Qaeda using steganography to share their diabolical plans on Web sites is resurrected and passed-off as news. The reporter (or rather government propagandist), Jack Kelley, tells us that, "lately, al-Qaeda operatives have been sending hundreds of encrypted messages that have been hidden in files on digital photographs on the auction site eBay.com. Most of the messages have been sent from Internet cafes in Pakistan and public libraries throughout the world." A painfully familiar claim for which the author provides not one scrap of evidence, yet expresses as an established fact. We like the way he uses location (his in Islamabad and the criminal images' on eBay) for that extra ring of authenticity. "The volume of the messages has nearly doubled in the past month, indicating to some US intelligence officials that al-Qaeda is planning another attack," Kelly warns. His sources, predictably, are all anonymous 'officials'. He's merely rehashing a New York Times FUD piece written just after the 9/11 atrocity which says exactly the same things, and offers exactly the same disgraceful level of evidence, only with some quotes from identifiable people. The Times piece undoubtedly came from a 'we found terrorist stego' publicity stunt by financially strapped outfit iomart. Now, with the current struggle on Capitol Hill to approve Dubya's new Gestapo, it's essential that the man in the street be frightened and confused by a torrent of 'news' pointing to incomprehensible threats which only Big Bro has the knowledge and skill to protect him from. Look for a lot more of this cyber-terror drivel over the next two months -- or until the Department is created to the administration's satisfaction, or until Enron, Harken Energy and Halliburton cease making headlines. Æ -- -------------------------------------------------------------------------- -- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------- -- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com -------------------------------------------------------------------------- -- ---------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------- -- ---------------------- Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5789 From: Hawkspirit Date: Sat Jul 13, 2002 0:25am Subject: Sweep Needed >I have a request for a residential sweep in Western Kentucky, anyone >providing services in that area contact me. Roger Tolces Electronic Security 5790 From: Aimee Farr Date: Sat Jul 13, 2002 1:36am Subject: RE: al-Qaeda poised to strike hard via the Internet > So, what is your point? > How does it apply to TSCM? Hm...I'll make a meek attempt to "spin" some relevance from this story, in regard to TSCM, as linked to espionage collection. Likely, it is one that researchers and subject matter experts tend to be blind to in journalistic, research collaboration, and Delphi approaches. After all, of what importance could it be to give away the impossible, the impractical, and the unimportant? I'm sure some of you saw that clip on Rumsfeld's explanation of "unknown unknowns," in an attempt to explain some intelligence difficulties to the press. We also have "our own unknown unknowns" -- in the forms of discounted policy, impossible or too-future technological developments, seemingly unsound doctrinal approaches, R&D no-gos, special obstacles in policy, law, economics, technology, etc.-etc. Here is often the essence of "non-decisions," which some view as more important than actual decision-making or agenda items. The reason is because these sentiments often seem to coincide with the lines of least expectation and least resistance. (nod to Liddell-Hart) And, one of the most frequent errors in war (or any rivalry) seems to be allowing your enemy time to move where you are not, and, conversely, to move where you are, following the principle of strength against weakness. We all are subject to the "Fallacy of Initiative" to some degree, by which we think adversarial dispositions, intentions, and capabilities are constant and not relative. The general public suffers from "perceptual defense" on an increasing number of issues, because they don't think there is any effective action they can take -- the signal is tuned out, because there is no payoff in it. Together, "our own unknown unknowns," the "fallacy of initiative," and forms of "perceptual defense" can make for a false concept image, a false enemy image and various shades of ignorance and complacency. History would seem to suggest that with a motivated adversary, this is a bad recipe. Many authors have cited these themes, albeit in round-about ways -- in regard to Nazi Germany. We were rather displeased with what some experts said was not possible, practical or feasible, because it seems they didn't agree. ~Aimee 5791 From: Steve Uhrig Date: Sat Jul 13, 2002 9:24am Subject: Re-Airing of C-SPAN 2 Book World with Linda The below is a video review of a book of fascinating history of intelligence and a demo and discussion of some tradecraft items, including miniature photography. Highly recommended. Set up to tape it if you're not going to be around. Below message is forwarded from the gal who is the speaker on the topic, and author of the book being discussed. ... Steve =========== Good morning everyone, C-SPAN called yesterday to say that June 13, 2002 talk I gave at the National Archives in honor of the 60th anniversary of the OSS will air again this weekend on C-SPAN 2. The dates and times are: Saturday morning, July 13 at 9:45 am Sunday evening, July 14, at 6:10 pm For those who missed the first airing a couple of weeks ago, here's a second (and third) chance to see it again. Maybe C-SPAN 2 had a lot of dead air to fill this weekend . . . For more information, log onto www.booktv.org. Yours from Stonewall's Valley, Linda History is a Hoot, Inc. P.O. Box 285 Markham, VA 22643 (540) 622-2074 www.historyisahoot.com ------- End of forwarded message ------- 5792 From: John McCain Date: Fri Jul 12, 2002 6:04pm Subject: OT: Cell phone passive repeater question Hi Gurus, My employer recently moved to a rural office complex, and I'm now "living" on the ground floor of a tight metal building. This place is like a faraday cage... metal window screen, two layers of steel walls with foil-backed insulation behind the sheet rock. I can't even get a broadcast band AM or FM radio to pick up anything here, and my ham HTs are useless inside. The point... I use a TDMA/AMPS dual-band (800/1.9) cell phone, which is useless inside the building now. We're several miles from the closest cell site, and signal levels are so poor in here that I have to do something. I considered adding an outside antenna and coax to the phone the way I've done in the past, but that ties me to one office using the phone. I'm now leaning towards a passive repeater... two antennae and a short chunk of coax. Have any of you tried putting up a yagi outside with a couple feet of coax to a panel or small yagi antenna on the inside of a building like this? I could gain 10 or 15 dB on the yagi, and mount it 20' above the ground , then with a 2' or so run of coax, feed either a monopole, dipole, or flat panel on the inside. We own the buildings, so there's no problem with the install if I'm reasonably comfortable that I'll get enough signal to use. AM I overlooking anything? Is it reasonable? Any suggestions? Thanks, JohnM Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-897-6600 2949 CR 1000N Web: http://www.dcbnet.com Dewey, IL. 61840 Email: Jmccain@d... From: hamed a Date: Mon Jul 9, 2001 0:09am Subject: GSM Encryption? any one knows if GSM encryption is breakable? were could i find more info?? thanks __________________________________________________ Do You Yahoo!? Get personalized email addresses from Yahoo! Mail http://personal.mail.yahoo.com/ 3333 From: Date: Mon Jul 9, 2001 5:05am Subject: RE: Cell Jamming The UK produce a lovely pocket sized box that jams cell phones within about 10 meters. There is an industrial one available if required. This is also illegal in the UK. http://starportuk.com/21.htm Rgds, Nik.. -----Original Message----- From: DrPepper [mailto:DrPepper@i...] Sent: 07 July 2001 16:19 PM To: Marcelrf Cc: Perry Myers; TSCM (E-mail) Subject: Re: [TSCM-L] Cell Jamming That's right, Marcel, , , , Not only that, but you can't keep the jamming signal just with your building or property, either. So, , , driving by on the street, , , jammed! -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my shack LIVE at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ========================================== Marcelrf wrote: > If you tried to call 911 and they could not hear you........LAWSUIT CITY!!! > > DrPepper wrote: > > > Other than the obvious, , , being illegal, , , , , > > No, I haven't heard anything other than the story about a church trying it. > > If I missed a call because of that, I'd sue the socks off 'em. > > Courtesy says that you put it on vibrate, or lower the ring volume, and take it > > outside if a call comes in. > > Common Courtesy, which not too many people have these days. > > (Grumpy Old Man mode off) > > -- > > Dr Pepper aka WB6GKI > > in the High Desert of California. > > Check out my LIVE Hamshack camera at: > > http://www1.iwvisp.com/DrPepper/ham/ham.htm > > > > ==================================================== > > > > Perry Myers wrote: > > > > > Anyone have any information on cell phone jamming usage at US restaurants? > > > > > > Perry D. Myers, CFE > > > President & CEO > > > E-mail: Perry@d... > > > > > > MSI Detective Services > > > Myers Service, Inc. > > > Corporate Headquarters > > > 2076 N. Elston Ave. Suite 200 > > > Chicago, IL. 60614-3940 > > > Phone 773-342-8300 > > > Facsimile 773-486-4430 > > > > > > Professional Investigators Since 1959 > > > Investigations Nationwide > > > 24 Hour Availability > > > www.detectiveservices.com > > > > > > > For more information on our investigative services please visit our web > > > > site at www.detectiveservices.com > > > > > > > > This e-mail is strictly confidential. If you receive this e-mail in error, > > > > please forward immediately to info@d... > > > > > > > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > -- > "NEXTEL1 IT'S NOT JUST NEXTEL" > Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3334 From: Tim Date: Mon Jul 9, 2001 7:37am Subject: Re: GSM Encryption? Two cryptographers in Israel broke A5/1, which is the encryption scheme GSM uses. My source is the Risks digest, and the article is dated 07 Dec 1999. The cryptographers were Birykov and Shamir (yes, that Shamir, of the RSA algorithm). Press, including most GSM providers, were skeptical that it could be done in the real world. However, most voice traffic is encrypted via A5/2. Purportedly, A5/2 can be broken in five to six clock cycles on an ASIC. A5/1 takes more clock cycles, but the Birykov/Shamir attack can be done in real-time on a PC. This was in 1999, so i'm sure that foreign intelligence sources have had it perfected by now, and probably for a long time before that. It is important to note that A5/1 and A5/2 are two of the most widely used cryptographic algorithms in the world. I should add here that breaking the encryption in GSM, while not a trivial project, is not the only step. One has to predict the next frequency the GSM user will shift to. This would not be overly difficult, but a custom device would probably have to be built for the purpose. I'm not up on the capabilities of more custom devices that are able to do this kind of frequency-hopping. I know that you might have luck with a GSM test-set tied to a PC. Generally, I don't trust any mobile devices for any serious conversations. I could be incorrect on any one of the above factors. YMMV, my advice is not gospel. Tim On Sun, Jul 08, 2001 at 10:09:26PM -0700, hamed a wrote: > any one knows if GSM encryption is breakable? were > could i find more info?? > > thanks > > > > __________________________________________________ > Do You Yahoo!? > Get personalized email addresses from Yahoo! Mail > http://personal.mail.yahoo.com/ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > -- 3335 From: James M. Atkinson, Comm-Eng Date: Mon Jul 9, 2001 7:45am Subject: Re: GSM Encryption? At 10:09 PM -0700 7/8/01, hamed a wrote: >any one knows if GSM encryption is breakable? were >could i find more info?? > >thanks GSM has been "breakable" now for several years, and in fact there is no mainstream wireless communications system available to the public that has not been broken multiple times by non-governmental entities. That said keep in find that there is a big difference between randomizing, scrambling, public encryption, and proprietary encryption. -jma -- ----------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ----------------------------------------------------------------------- Sed quis custodiet ipsos Custodes? The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ----------------------------------------------------------------------- 3336 From: Steve Uhrig Date: Mon Jul 9, 2001 8:10am Subject: Re: Is the CDMA ( cell phone ) system safe ???? Once upon a midnight dreary, Rogerio pondered, weak and weary: > Anyone have any information on monitoring .... Cell phone .... > CDMA system ??? ( Equipment ) Also ... TDMA system ??? Since you cross posted this to at least one of Ralph Thomas' lists, I am sure you will get valuable and accurate info there, so why bother to ask here where we are all hobbyists and groupies? > Companies that sells this system, says that it is impossible to > monitor the CDMA system.... Just in case... i would like to know > if this is true or not !!!!!!! What manufacturer is going to admit his system can be monitored? CDMA cannot be monitored off the air. Period. Anyone claiming differently is misinformed. CDMA is spread spectrum. Governments worldwide do virtually no off air monitoring of cellular, of any flavor, anymore. They go to the service provider with a subpoena or local equivalent, and the service provider hands them them analog audio on a pair of wires which generally is relayed to a remote listening post via a slave. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3337 From: Miguel Puchol Date: Mon Jul 9, 2001 8:47am Subject: RE: Re: Is the CDMA ( cell phone ) system safe ???? Steve, > What manufacturer is going to admit his system can be monitored? None. Not even when they know their systems are totally insecure. > CDMA cannot be monitored off the air. Period. There -must- be a way, although it can be so hard as to not be worthwhile for the value of the possibly recovered information, otherwise lawful listeners could not monitor the signal either. Key & code rotation, encryption, etc. can make it almost impossible to intercept. Some WLAN systems that use DS spread spectrum are notably insecure in their default configuration, which is no encryption or authentication enabled, and admin passwords like 'default' or 'WLAN'. In this configuration I could simply get near an AP with a laptop and PCMCIA card, join the network, and run packet sniffers & other analsys/capture software. > Governments worldwide do virtually no off air monitoring of > cellular, of any flavor, anymore. They go to the service > provider with a subpoena or local equivalent, and the service > provider hands them them analog audio on a pair of wires which > generally is relayed to a remote listening post via a slave. Internally, agreed. Externally, the story is different. Some governments are quite interested in being able to monitor cellular systems in other countries, a lot of useful information flows through them. In this case, you'd have to do it OTA. All the best, Mike 3338 From: Kevin D. Murray Date: Mon Jul 9, 2001 9:26am Subject: Cooke Telephone Analyzer, et. al. Hi folks, Over the next few weeks we will do summer cleaning here. Some items currently being Ebayed might be of interest to the group. Example... If you are not familiar with the Cooke Telephone Analyzer it is worth checking just to see the pictures. This week's list includes... http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=1253153896 http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=1253170874 http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=1614465879 http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=1614567812 In the coming weeks, some more serious TSCM items will be offered, and I will keep the list posted. If anyone wants an advance list with the "Buy It Now" prices, just let me know and I will email it to you directly instead of gumming up our list. Thank you for the bandwidth, Kevin -- Kevin D. Murray CPP, CFE, CCO, BCFE [Murray Associates] Counterespionage Consultants to Business & Government Eavesdropping Detection Specialists www.spybusters.com 3339 From: Thomas H. Jones Date: Mon Jul 9, 2001 8:39am Subject: Cell Jamming Check out site: "www.mobileblocker.com/MBIntro.htm" This device has some limitations, and from my understanding it is not FCC approved nor is it likely to be. It is primarily export only. I don't see how a public restaurant can use such a device. There must be liability with people that fail to receive important phone calls (doctors, lawyers, stock brokers, etc...). I think a sign on the door that reads "To maintain our environment, please turn off your cell phone or place it in vibrate mode." Regards, Tom Jones Date: Fri, 6 Jul 2001 11:57:35 -0500 From: Perry Myers Subject: Cell Jamming Anyone have any information on cell phone jamming usage at US restaurants? 3340 From: James M. Atkinson, Comm-Eng Date: Mon Jul 9, 2001 2:25pm Subject: RE: Re: Is the CDMA ( cell phone ) system safe ???? At 3:47 PM +0200 7/9/01, Miguel Puchol wrote: >Steve, > >> What manufacturer is going to admit his system can be monitored? > >None. Not even when they know their systems are totally insecure. > >> CDMA cannot be monitored off the air. Period. > >There -must- be a way, although it can be so hard as to not be worthwhile >for the value of the possibly recovered information, otherwise lawful >listeners could not monitor the signal either. Key & code rotation, >encryption, etc. can make it almost impossible to intercept. Some WLAN >systems that use DS spread spectrum are notably insecure in their default >configuration, which is no encryption or authentication enabled, and admin >passwords like 'default' or 'WLAN'. In this configuration I could simply get >near an AP with a laptop and PCMCIA card, join the network, and run packet >sniffers & other analsys/capture software. Several test instruments including the HP 8920 permit the CDMA signal to be evaluated, and part of this evaluation involves extracting a single voice channel. The "spread spectrum" used on CDMA is not so much thee for security but is for "enhanced channel density". CDMA interception is way, way out of the realm of something a PI could do, and is something that any but the best equipped law enforcement people could perform. There are commercially available CDMA, GSM, TDMA, etc interception solutions, but they are not cheap, and require a very high level of technical expertise. The CMDA instrument based around a ESA can quite capable to extracting either data or voice information from a channel, but it is costly, and who the equipment is sold to is very closely watched. > > Governments worldwide do virtually no off air monitoring of >> cellular, of any flavor, anymore. They go to the service >> provider with a subpoena or local equivalent, and the service >> provider hands them them analog audio on a pair of wires which >> generally is relayed to a remote listening post via a slave. > >Internally, agreed. Externally, the story is different. Some governments are >quite interested in being able to monitor cellular systems in other >countries, a lot of useful information flows through them. In this case, >you'd have to do it OTA. > >All the best, > >Mike Off the air intercepts simply isn't cost effective for law enforcement anymore; it is far cheaper, simpler, and far cleaner for the service provider to simply squirt the call over a cable pair. Ahem, Most of the "off-the-air" cellular intercept equipment being sold in the US **IS NOT ** being sold to law enforcement, and is not in fact being use for legitimate intercepts. -jma -- ----------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ----------------------------------------------------------------------- Sed quis custodiet ipsos Custodes? The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ----------------------------------------------------------------------- 3341 From: Marcelrf Date: Mon Jul 9, 2001 2:58pm Subject: Re: Re: Is the CDMA ( cell phone ) system safe ???? I monitor all technologies, iDEN,CDMA,GSM, TDMA using the following: http://www.ericsson.com/tems/cdma/rsat-cdma.shtml http://www.ericsson.com/tems/iden/investigation-iden.shtml http://onenetworks.comms.agilent.com/internetadvisor/J5458A.asp The Layer 3 messages allow you to decode ALL DATA "James M. Atkinson, Comm-Eng" wrote: > At 3:47 PM +0200 7/9/01, Miguel Puchol wrote: > >Steve, > > > >> What manufacturer is going to admit his system can be monitored? > > > >None. Not even when they know their systems are totally insecure. > > > >> CDMA cannot be monitored off the air. Period. > > > >There -must- be a way, although it can be so hard as to not be worthwhile > >for the value of the possibly recovered information, otherwise lawful > >listeners could not monitor the signal either. Key & code rotation, > >encryption, etc. can make it almost impossible to intercept. Some WLAN > >systems that use DS spread spectrum are notably insecure in their default > >configuration, which is no encryption or authentication enabled, and admin > >passwords like 'default' or 'WLAN'. In this configuration I could simply get > >near an AP with a laptop and PCMCIA card, join the network, and run packet > >sniffers & other analsys/capture software. > > Several test instruments including the HP 8920 permit the CDMA signal > to be evaluated, and part of this evaluation involves extracting a > single voice channel. The "spread spectrum" used on CDMA is not so > much thee for security but is for "enhanced channel density". > > CDMA interception is way, way out of the realm of something a PI > could do, and is something that any but the best equipped law > enforcement people could perform. > > There are commercially available CDMA, GSM, TDMA, etc interception > solutions, but they are not cheap, and require a very high level of > technical expertise. > > The CMDA instrument based around a ESA can quite capable to > extracting either data or voice information from a channel, but it is > costly, and who the equipment is sold to is very closely watched. > > > > Governments worldwide do virtually no off air monitoring of > >> cellular, of any flavor, anymore. They go to the service > >> provider with a subpoena or local equivalent, and the service > >> provider hands them them analog audio on a pair of wires which > >> generally is relayed to a remote listening post via a slave. > > > >Internally, agreed. Externally, the story is different. Some governments are > >quite interested in being able to monitor cellular systems in other > >countries, a lot of useful information flows through them. In this case, > >you'd have to do it OTA. > > > >All the best, > > > >Mike > > Off the air intercepts simply isn't cost effective for law > enforcement anymore; it is far cheaper, simpler, and far cleaner for > the service provider to simply squirt the call over a cable pair. > > Ahem, Most of the "off-the-air" cellular intercept equipment being > sold in the US **IS NOT ** being sold to law enforcement, and is not > in fact being use for legitimate intercepts. > > -jma > -- > > ----------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ----------------------------------------------------------------------- > Sed quis custodiet ipsos Custodes? > > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ----------------------------------------------------------------------- > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 3342 From: Dave Emery Date: Mon Jul 9, 2001 8:28pm Subject: Re: Re: Is the CDMA ( cell phone ) system safe ???? On Mon, Jul 09, 2001 at 03:25:51PM -0400, James M. Atkinson, Comm-Eng wrote: > > > Several test instruments including the HP 8920 permit the CDMA signal > to be evaluated, and part of this evaluation involves extracting a > single voice channel. The "spread spectrum" used on CDMA is not so > much thee for security but is for "enhanced channel density". > > CDMA interception is way, way out of the realm of something a PI > could do, and is something that any but the best equipped law > enforcement people could perform. > It is by no means out of the question for someone (illegitimate and illegal in the US) to hack the firmware on a CDMA phone handset so it can be used to monitor the forward voice channels on a cellsite signal. This of course gives you access to only one direction of call (to the handset) and because of digital echo suppressors (cancellers) required with the vocoders used (which introduce lots of delay and thus require echo cancellation even on local calls) the other direction (from handset to tower) will be completely inaudible. Some handsets may already incorperate such capabilities as part of test modes (when will manufacturers learn)... Obviously the headset can receive voice channels off the signal, and in fact the current IS-95 standard does not provide any kind of encryption for the voice on the forward voice channels so it is there for the taking. The whole signal in the forward direction is nothing but a fast QPSK TDM multiplexed data signal - and the spreading sequence is public and not cryptographicly random. Only cryptographicaly random spreading sequences provide any security to spread spectrum signals. Intercepting the reverse channel from headset to base is much harder, and in fact has been something that has been bedevilling the NSA and other spook agencies. The problem here is that the signal power from the phone is very tightly dynamicly controlled to be no stronger than required to hit the tower with enough signal to provide an adaquate bit error rate. This is necessary to aviod the "near-far" problem where energy from a strong nearby cellphone using another spreading code and offset appears as random white noise to the correllators looking at the weaker and more distant phones and raises the effective noise floor high enough so the bit error rate is too bad for traffic to flow. Ideally the power control keeps all the cellphones hitting the tower just a little bit over the average noise level with none of them much stronger than any other. If you are close to the handset you can of course see enough signal to recover its bits, but if you are not very close to it you may very well not see enough signal enough of the time to recover usable traffic. In general you have to have a lot better rf view of it than the tower it is using, which is hard. And of course you also need to be closer to your target handset than others using the same rf channel, else their stronger signal will swamp your correllators too... This is a limitation of physics and no black magic can recover signals under the (thermal) noise floor (though of course fancy antennas help). Other cell standards (GSM for example and AMPS and TDMA) have much looser power control that operates over much longer intervals (seconds or more) and makes no particular attempt to absolutely minimize the radiated power on a millisecond by millisecond basis. So getting reliable signals from the handset under those standards is much easier. In addition to these problems intercepting the reverse channel on CDMA systems, and perhaps as much of a showstopper, or more is the use of various kinds of encyrption to protect the signalling against fraud. This makes access to the forward and reverse control channel messages difficult (deliberately so so cloners can't recover ESNs and MINs and clone phones). This makes it hard to monitor traffic and locate a particular call of interest as opposed to just listening to whatever random traffic is flowing over a particular cell site at a particular time - and also makes it hard to identify who the calling party is, and what number they are calling. For most kinds of interception this is a crippling problem, since there is only one or a few target phones and no desire to listen to all the random babble on the air in a particular location. > There are commercially available CDMA, GSM, TDMA, etc interception > solutions, but they are not cheap, and require a very high level of > technical expertise. > Certainly as Jim points out, most of these I have ever heard of are specialized test equipment or systems designed for the spooks (and presumably highly classified in respect to all the details). > The CMDA instrument based around a ESA can quite capable to > extracting either data or voice information from a channel, but it is > costly, and who the equipment is sold to is very closely watched. > I have actually seen some CDMA test systems on Ebay. Haven't payed a lot of attention to exactly what they were or how they were equiped, but it would be my impression that on occasion test equipment capable of demodulating a CDMA forward or even reverse voice channel has shown up in the last year since I have been watching Ebay, though whether equiped with the right software and hardware options I have no idea. Most of this gear has been offered for substantial minimums, often close to or above $10K, so it hasn't been cheap. I suspect, of course, that obtaining the CDMA options and software from HP or Moto or whoever would doubtless require some authentication and proof of business need. I also remember seeing a complete CDMA cell site transciever box show up in one auction (went for about $70). > > > > Governments worldwide do virtually no off air monitoring of > >> cellular, of any flavor, anymore. They go to the service > >> provider with a subpoena or local equivalent, and the service > >> provider hands them them analog audio on a pair of wires which > >> generally is relayed to a remote listening post via a slave. > > > >Internally, agreed. Externally, the story is different. Some governments are > >quite interested in being able to monitor cellular systems in other > >countries, a lot of useful information flows through them. In this case, > >you'd have to do it OTA. > > > >All the best, > > > >Mike > > > > Off the air intercepts simply isn't cost effective for law > enforcement anymore; it is far cheaper, simpler, and far cleaner for > the service provider to simply squirt the call over a cable pair. > That is what CALEA is all about. We (taxpayers) paid a good bit for this feature of the cellular system. But of course the NSA and all the rest of the world's intelligence agencies cannot in general rely on cooperation from the local carriers. So there is serious work going on to develop and refine interception capabilities. And then of course, there are the rumored rogue random wiretaps by LEAs acting other than under color of law. CALEA taps involve paperwork at the carriers and are supposed to leave a trail, one suspects that rogue wiretaps rarely go theough CALEA channels. And this problem is not entirely a figment of overheated civil liberties type imaginations, witness the recent LA police scandels... > Ahem, Most of the "off-the-air" cellular intercept equipment being > sold in the US **IS NOT ** being sold to law enforcement, and is not > in fact being use for legitimate intercepts. No doubt there is significant use of such for illegal commercial espionage and theft of trade secrets... although I am nieve enough not to know of many vendors of such gear selling it in the USA. -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 3343 From: David Alexander Date: Tue Jul 10, 2001 4:55am Subject: re: GSM encryption In answer to your question about GSM encryption. The following submission was made to the sci.crypt,alt.security,uk.telecom newsgroup in 1994 by Dr Ross Anderson of Cambridge University. It is technical, but does clearly show how weak the encryption of A/5 is. I kept it because I knew it would come in useful one day : begin quote =========== From sci.crypt Fri Jun 17 17:11:49 1994 From: rja14@c... (Ross Anderson) Date: 17 Jun 1994 13:43:28 GMT Newsgroups: sci.crypt,alt.security,uk.telecom Subject: A5 (Was: HACKING DIGITAL PHONES) The GSM encryption algorithm, A5, is not much good. Its effective key length is at most five bytes; and anyone with the time and energy to look for faster attacks can find source code for it at the bottom of this post. The politics of all this is bizarre. Readers may recall that there was a fuss last year about whether GSM phones could be exported to the Middle East; the official line then was that A5 was too good for the likes of Saddam Hussein. However, a couple of weeks ago, they switched from saying that A5 was too strong to disclose, to saying that it was too weak to disclose! The government line now pleads that discussing it might harm export sales. Maybe all the fuss was just a ploy to get Saddam to buy A5 chips on the black market; but Occam's razor suggests that we are really seeing the results of the usual blundering, infighting and incompetence of bloated government departments. Indeed, my spies inform me that there was a terrific row between the NATO signals agencies in the mid 1980's over whether GSM encryption should be strong or not. The Germans said it should be, as they shared a long border with the Evil Empire; but the other countries didn't feel this way, and the algorithm as now fielded is a French design. A5 is a stream cipher, and the keystream is the xor of three clock controlled registers. The clock control of each register is that register's own middle bit, xor'ed with a threshold function of the middle bits of all three registers (ie if two or more of the middle bits are 1, then invert each of these bits; otherwise just use them as they are). The register lengths are 19, 22 and 23, and all the feedback polynomials are sparse. Readers will note that there is a trivial 2^40 attack (guess the contents of registers 1 and 2, work out register 3 from the keystream, and then step on to check whether the guess was right). 2^40 trial encryptions could take weeks on a workstation, but the low gate count of the algorithm means that a Xilinx chip can easily be programmed to do keysearch, and an A5 cracker might have a few dozen of these running at maybe 2 keys per microsecond each. Of course, if all you want to do is break the Royal Family's keys for sale to News International, then software would do fine. It is thus clear that A5 should be free of all export controls, just like CDMF and the 40-bit versions of RC2 and RC4. Indeed, there seems to be an even faster attack. As the clock control is stop-go rather than 1-2, one would expect some kind of correlation attack to be possible, and on June 3rd, Dr Simon Shepherd of Bradford University was due to present an attack on A5 to an IEE colloquium in London. However, his talk was spiked at the last minute by GCHQ, and all we know about his attack is: (a) that sparse matrix techniques are used to reconstruct the initial state (this was published as a `trailer' in the April 93 `Mobile Europe'); (b) that he used some of the tricks from my paper `Solving a class of stream ciphers' (Cryptologia XIV no 3 [July 90] pp 285 - 288) and from the follow-up paper `Divide and conquer attacks on certain classes of stream ciphers' by Ed Dawson and Andy Clark (Cryptologia XVIII no 1 [Jan 94] pp 25 - 40) (he mentioned this to me on the phone). I believe that we have to stand up for academic freedom, and I hope that placing A5 in the public domain will lead to the embargo on Simon's paper being lifted. Ross Anderson APPENDIX - AN IMPLEMENTATION OF A5 The documentation we have, which arrived anonymously in two brown envelopes, is incomplete; we do not know the feedback taps of registers 2 and 3, but we do know from the chip's gate count that they have at most 6 feedback taps between them. The following implementation of A5 is due to Mike Roe , and all comments and queries should be sent to him. /* * In writing this program, I've had to guess a few pices of information: * * 1. Which bits of the key are loaded into which bits of the shift register * 2. Which order the frame sequence number is shifted into the SR (MSB * first or LSB first) * 3. The position of the feedback taps on R2 and R3 (R1 is known). * 4. The position of the clock control taps. These are on the `middle' one, * I've assumed to be 9 on R1, 11 on R2, 11 on R3. */ /* * Look at the `middle' stage of each of the 3 shift registers. * Either 0, 1, 2 or 3 of these 3 taps will be set high. * If 0 or 1 or one of them are high, return true. This will cause each of * the middle taps to be inverted before being used as a clock control. In * all cases either 2 or 3 of the clock enable lines will be active. Thus, * at least two shift registers change on every clock-tick and the system * never becomes stuck. */ static int threshold(r1, r2, r3) unsigned int r1; unsigned int r2; unsigned int r3; { int total; total = (((r1 >> 9) & 0x1) == 1) + (((r2 >> 11) & 0x1) == 1) + (((r3 >> 11) & 0x1) == 1); if (total > 1) return (0); else return (1); } unsigned long clock_r1(ctl, r1) int ctl; unsigned long r1; { unsigned long feedback; /* * Primitive polynomial x**19 + x**5 + x**2 + x + 1 */ ctl ^= ((r1 >> 9) & 0x1); if (ctl) { feedback = (r1 >> 18) ^ (r1 >> 17) ^ (r1 >> 16) ^ (r1 >> 13); r1 = (r1 << 1) & 0x7ffff; if (feedback & 0x01) r1 ^= 0x01; } return (r1); } unsigned long clock_r2(ctl, r2) int ctl; unsigned long r2; { unsigned long feedback; /* * Primitive polynomial x**22 + x**9 + x**5 + x + 1 */ ctl ^= ((r2 >> 11) & 0x1); if (ctl) { feedback = (r2 >> 21) ^ (r2 >> 20) ^ (r2 >> 16) ^ (r2 >> 12); r2 = (r2 << 1) & 0x3fffff; if (feedback & 0x01) r2 ^= 0x01; } return (r2); } unsigned long clock_r3(ctl, r3) int ctl; unsigned long r3; { unsigned long feedback; /* * Primitive polynomial x**23 + x**5 + x**4 + x + 1 */ ctl ^= ((r3 >> 11) & 0x1); if (ctl) { feedback = (r3 >> 22) ^ (r3 >> 21) ^ (r3 >> 18) ^ (r3 >> 17); r3 = (r3 << 1) & 0x7fffff; if (feedback & 0x01) r3 ^= 0x01; } return (r3); } int keystream(key, frame, alice, bob) unsigned char *key; /* 64 bit session key */ unsigned long frame; /* 22 bit frame sequence number */ unsigned char *alice; /* 114 bit Alice to Bob key stream */ unsigned char *bob; /* 114 bit Bob to Alice key stream */ { unsigned long r1; /* 19 bit shift register */ unsigned long r2; /* 22 bit shift register */ unsigned long r3; /* 23 bit shift register */ int i; /* counter for loops */ int clock_ctl; /* xored with clock enable on each shift register */ unsigned char *ptr; /* current position in keystream */ unsigned char byte; /* byte of keystream being assembled */ unsigned int bits; /* number of bits of keystream in byte */ unsigned int bit; /* bit output from keystream generator */ /* Initialise shift registers from session key */ r1 = (key[0] | (key[1] << 8) | (key[2] << 16) ) & 0x7ffff; r2 = ((key[2] >> 3) | (key[3] << 5) | (key[4] << 13) | (key[5] << 21)) & 0x3fffff; r3 = ((key[5] >> 1) | (key[6] << 7) | (key[7] << 15) ) & 0x7fffff; /* Merge frame sequence number into shift register state, by xor'ing it * into the feedback path */ for (i=0;i<22;i++) { clock_ctl = threshold(r1, r2, r2); r1 = clock_r1(clock_ctl, r1); r2 = clock_r2(clock_ctl, r2); r3 = clock_r3(clock_ctl, r3); if (frame & 1) { r1 ^= 1; r2 ^= 1; r3 ^= 1; } frame = frame >> 1; } /* Run shift registers for 100 clock ticks to allow frame number to * be diffused into all the bits of the shift registers */ for (i=0;i<100;i++) { clock_ctl = threshold(r1, r2, r2); r1 = clock_r1(clock_ctl, r1); r2 = clock_r2(clock_ctl, r2); r3 = clock_r3(clock_ctl, r3); } /* Produce 114 bits of Alice->Bob key stream */ ptr = alice; bits = 0; byte = 0; for (i=0;i<114;i++) { clock_ctl = threshold(r1, r2, r2); r1 = clock_r1(clock_ctl, r1); r2 = clock_r2(clock_ctl, r2); r3 = clock_r3(clock_ctl, r3); bit = ((r1 >> 18) ^ (r2 >> 21) ^ (r3 >> 22)) & 0x01; byte = (byte << 1) | bit; bits++; if (bits == 8) { *ptr = byte; ptr++; bits = 0; byte = 0; } } if (bits) *ptr = byte; /* Run shift registers for another 100 bits to hide relationship between * Alice->Bob key stream and Bob->Alice key stream. */ for (i=0;i<100;i++) { clock_ctl = threshold(r1, r2, r2); r1 = clock_r1(clock_ctl, r1); r2 = clock_r2(clock_ctl, r2); r3 = clock_r3(clock_ctl, r3); } /* Produce 114 bits of Bob->Alice key stream */ ptr = bob; bits = 0; byte = 0; for (i=0;i<114;i++) { clock_ctl = threshold(r1, r2, r2); r1 = clock_r1(clock_ctl, r1); r2 = clock_r2(clock_ctl, r2); r3 = clock_r3(clock_ctl, r3); bit = ((r1 >> 18) ^ (r2 >> 21) ^ (r3 >> 22)) & 0x01; byte = (byte << 1) | bit; bits++; if (bits == 8) { *ptr = byte; ptr++; bits = 0; byte = 0; } } if (bits) *ptr = byte; return (0); } ================= end quote If you are still awake, or reading, at this point, you are doing well. regards David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 3344 From: A Grudko Date: Mon Jul 9, 2001 0:48pm Subject: Encryption humour -- Original Message -- > Generally, I don't trust any mobile devices for any serious conversations. So, let me get this right. No mobiles (i.e RF). No landlines (voice, fax , data). This leaves runners with cleft sticks - ah, Africa leads in technology again. Andy G Johannesburg 3345 From: Tim Date: Tue Jul 10, 2001 6:38am Subject: Re: Encryption humour Look, it's just reality. You can trust those media if you build your own crypto to run over them and trust that crypto. I'm saying that the built in crypto in most devices today is designed to foil the average cloner (in the RF case). Obviously, no crypto on landlines, outside of the spread spectrum stuff, which i've never looked into (for cordless phones in the US). If you want security, use a one time pad. You can make some reasonable assumptions about having your communications violated regardless of what you use. For instance, I bet that my keys will be compromised within xx days, and after that, I revoke and reissue. If i'm engaging in serious conversations, I use encrypted net chat programs, and even then I know what i'm risking. Think about it positively: If you know the "enemy" is listening in, you can use that to your advantage, as long as you know "which" enemy. Tim On Mon, Jul 09, 2001 at 07:48:47PM +0200, A Grudko wrote: > -- Original Message -- > > Generally, I don't trust any mobile devices for any serious conversations. > > So, let me get this right. No mobiles (i.e RF). No landlines (voice, fax , > data). This leaves runners with cleft sticks - ah, Africa leads in > technology again. > > Andy G > Johannesburg > > -- 3346 From: Date: Tue Jul 10, 2001 9:00am Subject: NIGHTLINE: The Listeners: Inside the NSA Date: 7/10/01 10:07:15 AM Pacific Daylight Time From: listeditor@a... (Nightline) Reply-to: listeditor@a... (Nightline) To: nightlinemail-l@a... (Nightline Mailing List) TONIGHT‚ÄôS SUBJECT: They are the most secret intelligence agency in the world. They have the means to listen to phone calls, emails, faxes. Do they listen too much? Or is there so much traffic that they‚Äôre missing the most important information? ‚ÄúThey‚Äù is the National Security Agency. ---- When I was brand new in local television, I had to call the CIA for something, I don‚Äôt remember what. They were listed in the phone book in San Francisco. I called the number, and the person on the other end answered by reciting the number I had dialed. I asked if I had reached the CIA. She said she couldn‚Äôt tell me. I said that the number was listed as the CIA. She said she couldn‚Äôt comment. I hung up. True story. We actually are able to cover the CIA occasionally. We did a series of broadcasts on their predictions for the coming years. But the National Security Agency, the NSA, is different. They rely not on human intelligence, not on spies, but on technology. On listening. Phone calls, emails, fax transmissions, all fair game. With satellites, listening posts, spy ships, planes, you name it, they can listen to just about anything. One listening post can reportedly pick up about two million phone calls and emails an hour. Now one of the problems is going through all that. How can all of that information be processed? How do you make sure you‚Äôre not missing the phone call from Osama bin Laden in the midst of all of that traffic? And some in the intelligence community have criticized the NSA for missing crucial warnings of terrorist attacks. And how can they stay ahead of the rapidly advancing technology? But for most Americans, mention the NSA and another issue comes up. The official position is that the NSA does not eavesdrop on Americans without a court order. This follows after the abuses of the 1970‚Äôs, when the Nixon White House ordered the NSA to spy on the anti-war movement. But that won‚Äôt convince a lot of people who just don‚Äôt believe it. So the NSA is being hit from both sides, some say they‚Äôre not listening enough, others say they‚Äôre listening too much. The truth? Chris Bury will have a rare interview with the director of the NSA tonight. We hope you‚Äôll join us. Tuesday, July 10, 2001 Leroy Sievers Executive Producer NIGHTLINE Offices Washington, D.C. ----------- If you have questions or comments regarding this message or a recent "Nightline" broadcast, please do not hit reply; simply click on this link to send your message directly to the "Nightline" staff: http://abcnews.go.com/sections/nightline/Nightline/Nightline_email_form.html Or log on to the new "Nightline" Message Board: http://boards.go.com/cgi/abcnews/request.dll?LIST&room=nightline Chat with "Nightline" guests and find articles, transcripts and video excerpts on our Web site at: http://abcnews.go.com/Sections/Nightline/ You can unsubscribe to the "Nightline" e-mail at: http://login.mailpref.go.com/login Ask your friends to sign up! Send them this link: http://abcnews.go.com/sections/nightline/DailyNews/nightline_login.html 3347 From: A Grudko Date: Tue Jul 10, 2001 0:16pm Subject: One time pads -- Original Message -- From: Tim > If you want security, use a one time pad. You can make some reasonable > assumptions about having your communications violated regardless of what > you use. Hi Tim Of course, one time pads CAN be applied to our local 'cleft stick' communications, as in their paperbound original use :-) I love somethimes throwing out dissinformation over low security comms. just to see where the info. comes out. I had an amateur snoop give himself away that way just a few months ago. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) GIN, SACI, WAD, CALI, SAMLF, SCIP, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom "When you need it done right - first time" "Experience is the name everyone gives to his mistakes" Oscar Wilde - A tribute to the late Roy Lawson. 3348 From: Marcelrf Date: Tue Jul 10, 2001 7:38am Subject: Re: re: GSM encryption Motorola has publicly admitted it has broken the GSM encryption 2 yrs ago. David Alexander wrote: > In answer to your question about GSM encryption. The following submission > was made to the sci.crypt,alt.security,uk.telecom newsgroup in 1994 by Dr > Ross Anderson of Cambridge University. It is technical, but does clearly > show how weak the encryption of A/5 is. I kept it because I knew it would > come in useful one day : > > begin quote =========== > > >From sci.crypt Fri Jun 17 17:11:49 1994 > From: rja14@c... (Ross Anderson) > Date: 17 Jun 1994 13:43:28 GMT > Newsgroups: sci.crypt,alt.security,uk.telecom > Subject: A5 (Was: HACKING DIGITAL PHONES) > > The GSM encryption algorithm, A5, is not much good. Its effective key length > is at most five bytes; and anyone with the time and energy to look for > faster > attacks can find source code for it at the bottom of this post. > > The politics of all this is bizarre. Readers may recall that there was a > fuss > last year about whether GSM phones could be exported to the Middle East; the > > official line then was that A5 was too good for the likes of Saddam Hussein. > > However, a couple of weeks ago, they switched from saying that A5 was too > strong to disclose, to saying that it was too weak to disclose! The > government line now pleads that discussing it might harm export sales. > > Maybe all the fuss was just a ploy to get Saddam to buy A5 chips on the > black > market; but Occam's razor suggests that we are really seeing the results of > > the usual blundering, infighting and incompetence of bloated government > departments. > > Indeed, my spies inform me that there was a terrific row between the NATO > signals agencies in the mid 1980's over whether GSM encryption should be > strong or not. The Germans said it should be, as they shared a long border > with the Evil Empire; but the other countries didn't feel this way, and > the algorithm as now fielded is a French design. > > A5 is a stream cipher, and the keystream is the xor of three clock > controlled registers. The clock control of each register is that register's > own middle bit, xor'ed with a threshold function of the middle bits of all > three registers (ie if two or more of the middle bits are 1, then invert > each of these bits; otherwise just use them as they are). The register > lengths are 19, 22 and 23, and all the feedback polynomials are sparse. > > Readers will note that there is a trivial 2^40 attack (guess the contents of > registers 1 and 2, work out register 3 from the keystream, and then step on > to check whether the guess was right). 2^40 trial encryptions could take > weeks on a workstation, but the low gate count of the algorithm means that > a Xilinx chip can easily be programmed to do keysearch, and an A5 cracker > might have a few dozen of these running at maybe 2 keys per microsecond > each. Of course, if all you want to do is break the Royal Family's keys > for sale to News International, then software would do fine. > > It is thus clear that A5 should be free of all export controls, just like > CDMF and the 40-bit versions of RC2 and RC4. > > Indeed, there seems to be an even faster attack. As the clock control is > stop-go rather than 1-2, one would expect some kind of correlation attack > to be possible, and on June 3rd, Dr Simon Shepherd of Bradford University > was due to present an attack on A5 to an IEE colloquium in London. However, > his talk was spiked at the last minute by GCHQ, and all we know about his > attack is: > > (a) that sparse matrix techniques are used to reconstruct the initial state > (this was published as a `trailer' in the April 93 `Mobile Europe'); > > (b) that he used some of the tricks from my paper `Solving a class of stream > > ciphers' (Cryptologia XIV no 3 [July 90] pp 285 - 288) and from the > follow-up paper `Divide and conquer attacks on certain classes of stream > ciphers' by Ed Dawson and Andy Clark (Cryptologia XVIII no 1 [Jan 94] > pp 25 - 40) (he mentioned this to me on the phone). > > I believe that we have to stand up for academic freedom, and I hope that > placing A5 in the public domain will lead to the embargo on Simon's paper > being lifted. > > Ross Anderson > > APPENDIX - AN IMPLEMENTATION OF A5 > > The documentation we have, which arrived anonymously in two brown envelopes, > is incomplete; we do not know the feedback taps of registers 2 and 3, but we > do know from the chip's gate count that they have at most 6 feedback taps > between them. > > The following implementation of A5 is due to Mike Roe , and > all comments and queries should be sent to him. > > /* > * In writing this program, I've had to guess a few pices of information: > * > * 1. Which bits of the key are loaded into which bits of the shift register > * 2. Which order the frame sequence number is shifted into the SR (MSB > * first or LSB first) > * 3. The position of the feedback taps on R2 and R3 (R1 is known). > * 4. The position of the clock control taps. These are on the `middle' one, > > * I've assumed to be 9 on R1, 11 on R2, 11 on R3. > */ > > /* > * Look at the `middle' stage of each of the 3 shift registers. > * Either 0, 1, 2 or 3 of these 3 taps will be set high. > * If 0 or 1 or one of them are high, return true. This will cause each of > * the middle taps to be inverted before being used as a clock control. In > * all cases either 2 or 3 of the clock enable lines will be active. Thus, > * at least two shift registers change on every clock-tick and the system > * never becomes stuck. > */ > > static int threshold(r1, r2, r3) > unsigned int r1; > unsigned int r2; > unsigned int r3; > { > int total; > > total = (((r1 >> 9) & 0x1) == 1) + > (((r2 >> 11) & 0x1) == 1) + > (((r3 >> 11) & 0x1) == 1); > > if (total > 1) > return (0); > else > return (1); > } > > unsigned long clock_r1(ctl, r1) > int ctl; > unsigned long r1; > { > unsigned long feedback; > > /* > * Primitive polynomial x**19 + x**5 + x**2 + x + 1 > */ > > ctl ^= ((r1 >> 9) & 0x1); > if (ctl) > { > feedback = (r1 >> 18) ^ (r1 >> 17) ^ (r1 >> 16) ^ (r1 >> 13); > r1 = (r1 << 1) & 0x7ffff; > if (feedback & 0x01) > r1 ^= 0x01; > } > return (r1); > } > > unsigned long clock_r2(ctl, r2) > int ctl; > unsigned long r2; > { > unsigned long feedback; > > > /* > * Primitive polynomial x**22 + x**9 + x**5 + x + 1 > */ > > ctl ^= ((r2 >> 11) & 0x1); > if (ctl) > { > feedback = (r2 >> 21) ^ (r2 >> 20) ^ (r2 >> 16) ^ (r2 >> 12); > r2 = (r2 << 1) & 0x3fffff; > if (feedback & 0x01) > r2 ^= 0x01; > } > return (r2); > } > > unsigned long clock_r3(ctl, r3) > int ctl; > unsigned long r3; > { > unsigned long feedback; > > /* > * Primitive polynomial x**23 + x**5 + x**4 + x + 1 > */ > > ctl ^= ((r3 >> 11) & 0x1); > if (ctl) > { > feedback = (r3 >> 22) ^ (r3 >> 21) ^ (r3 >> 18) ^ (r3 >> 17); > r3 = (r3 << 1) & 0x7fffff; > if (feedback & 0x01) > r3 ^= 0x01; > } > return (r3); > } > > int keystream(key, frame, alice, bob) > unsigned char *key; /* 64 bit session key */ > unsigned long frame; /* 22 bit frame sequence number */ > unsigned char *alice; /* 114 bit Alice to Bob key stream */ > unsigned char *bob; /* 114 bit Bob to Alice key stream */ > { > unsigned long r1; /* 19 bit shift register */ > unsigned long r2; /* 22 bit shift register */ > unsigned long r3; /* 23 bit shift register */ > int i; /* counter for loops */ > int clock_ctl; /* xored with clock enable on each shift register */ > unsigned char *ptr; /* current position in keystream */ > unsigned char byte; /* byte of keystream being assembled */ > unsigned int bits; /* number of bits of keystream in byte */ > unsigned int bit; /* bit output from keystream generator */ > > /* Initialise shift registers from session key */ > > r1 = (key[0] | (key[1] << 8) | (key[2] << 16) ) & 0x7ffff; > r2 = ((key[2] >> 3) | (key[3] << 5) | (key[4] << 13) | (key[5] << 21)) & > 0x3fffff; > r3 = ((key[5] >> 1) | (key[6] << 7) | (key[7] << 15) ) & 0x7fffff; > > /* Merge frame sequence number into shift register state, by xor'ing it > * into the feedback path > */ > > for (i=0;i<22;i++) > { > clock_ctl = threshold(r1, r2, r2); > r1 = clock_r1(clock_ctl, r1); > r2 = clock_r2(clock_ctl, r2); > r3 = clock_r3(clock_ctl, r3); > if (frame & 1) > { > r1 ^= 1; > r2 ^= 1; > r3 ^= 1; > } > frame = frame >> 1; > } > > /* Run shift registers for 100 clock ticks to allow frame number to > * be diffused into all the bits of the shift registers > */ > > for (i=0;i<100;i++) > { > clock_ctl = threshold(r1, r2, r2); > r1 = clock_r1(clock_ctl, r1); > r2 = clock_r2(clock_ctl, r2); > r3 = clock_r3(clock_ctl, r3); > } > > /* Produce 114 bits of Alice->Bob key stream */ > > ptr = alice; > bits = 0; > byte = 0; > for (i=0;i<114;i++) > { > clock_ctl = threshold(r1, r2, r2); > r1 = clock_r1(clock_ctl, r1); > r2 = clock_r2(clock_ctl, r2); > r3 = clock_r3(clock_ctl, r3); > > bit = ((r1 >> 18) ^ (r2 >> 21) ^ (r3 >> 22)) & 0x01; > byte = (byte << 1) | bit; > bits++; > if (bits == 8) > { > *ptr = byte; > ptr++; > bits = 0; > byte = 0; > } > } > if (bits) > *ptr = byte; > > /* Run shift registers for another 100 bits to hide relationship between > * Alice->Bob key stream and Bob->Alice key stream. > */ > > for (i=0;i<100;i++) > { > clock_ctl = threshold(r1, r2, r2); > r1 = clock_r1(clock_ctl, r1); > r2 = clock_r2(clock_ctl, r2); > r3 = clock_r3(clock_ctl, r3); > } > > /* Produce 114 bits of Bob->Alice key stream */ > > ptr = bob; > bits = 0; > byte = 0; > for (i=0;i<114;i++) > { > clock_ctl = threshold(r1, r2, r2); > r1 = clock_r1(clock_ctl, r1); > r2 = clock_r2(clock_ctl, r2); > r3 = clock_r3(clock_ctl, r3); > > bit = ((r1 >> 18) ^ (r2 >> 21) ^ (r3 >> 22)) & 0x01; > byte = (byte << 1) | bit; > bits++; > if (bits == 8) > { > *ptr = byte; > ptr++; > bits = 0; > byte = 0; > } > } > if (bits) > *ptr = byte; > > return (0); > > } > > ================= end quote > > If you are still awake, or reading, at this point, you are doing well. > > regards > > David Alexander M.INSTIS > Global Client-Server, Communications & Infrastructure Manager > Bookham Technology plc > > DDI: 01235 837823 > Mobile: 0779 988 1284 > David.Alexander@B... > > ======================================================================= > This e-mail is intended for the person it is addressed to only. The > information contained in it may be confidential and/or protected by > law. If you are not the intended recipient of this message, you must > not make any use of this information, or copy or show it to any > person. Please contact us immediately to tell us that you have > received this e-mail, and return the original to us. Any use, > forwarding, printing or copying of this message is strictly prohibited. > > No part of this message can be considered a request for goods or > services. > ======================================================================= > Any questions about Bookham's E-Mail service should be directed to postmaster@b.... > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 3349 From: Laarence Dillaard Date: Tue Jul 10, 2001 8:17pm Subject: EMC terrorism ìThe new Cold War; Defending Against Criminal EMCî appears in the May/June issue of Compliance Engineering Magazine on page 12. It is not yet (7-10-01) on their website: http://www.ce-mag.com/ They should have it there soon. It deals with the means and methods of electronic terrorism and the ways to protect therefrom. Larry Dillard, Textek, Ltd. 3350 From: James M. Atkinson, Comm-Eng Date: Wed Jul 11, 2001 10:56am Subject: The Dog A man is sitting in a plane which is about to take off when another man with a dog comes in and sits in the empty seats alongside. The dog is sat in the middle, and the first man is looking quizzically at the dog when the second man explains that they work for the airline. The dog handler says, "Don't mind Skipper, he is a "sniffer dog," the best there is. I'll show you when we get airborne and I set him to work." The plane takes off and levels out and the handler says to the man, "Watch this." He tells the dog "Skipper, search." The dog jumps down, walks along the aisle and sits next to a woman for a few seconds. It then returns to its seat and puts one paw on the handler's arm. He says "Good boy," and turns to the man and says, "That woman is in possession of marijuana, so I'm making a note of this and the seat number for the police who will apprehend her on arrival." "That's fantastic!" replies the man. Once again, he sends the dog to search the aisles. The dog sniffs about, sits down beside a man for a few seconds, returns to its seat and places both paws on the handler's arm. He says "Good boy," and he turns to the first man and says, "That man is carrying cocaine, so again, I'm making a note of this and the seat number." "That's marvelous, I've never seen anything like it!" says the admiring passenger. Once again he sends the dog to search the aisles. He goes up and down the plane and after a while sits down next to someone, and then comes racing back and jumps up onto the seat and craps all over the place. The man is surprised and disgusted by this and demands "What the hell is going on NOW?" The handler replies, "He's just found a bomb!" -jma -- ----------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ----------------------------------------------------------------------- Sed quis custodiet ipsos Custodes? The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ----------------------------------------------------------------------- 3351 From: Perry Myers Date: Wed Jul 11, 2001 6:17pm Subject: Horsing Around I had to pass this one on. Horseback Riding A blonde decides to try horseback riding, even though she has had no lessons or prior experience. She mounts the horse unassisted and the horse immediately springs into motion. It gallops along at a steady and rhythmic pace, but the blonde begins to slip from the saddle. In terror, she grabs for the horse's mane, but cannot seem to get a firm grip. She tries to throw her arms around the horse's neck, but she slides down the side of the horse anyway. The horse gallops along, seemingly ignorant of its slipping rider. Finally, giving up her frail grip, the blonde attempts to leap away from the horse and throw herself to safety. Unfortunately, her foot becomes entangled in the stirrup, and she is now at the mercy of the horse's pounding hooves as her head is struck against the ground over and over. As her head is battered against the ground, she is mere moments away from unconsciousness when to her great fortune, Bobby, the Wal-Mart greeter, sees her and unplugs the horse. Thank God for heroes! Perry D. Myers, CFE President & CEO E-mail: Perry@d... MSI Detective Services Myers Service, Inc. Corporate Headquarters 2076 N. Elston Ave. Suite 200 Chicago, IL. 60614-3940 Phone 773-342-8300 Facsimile 773-486-4430 Professional Investigators Since 1959 Investigations Nationwide 24 Hour Availability www.detectiveservices.com > For more information on our investigative services please visit our web > site at www.detectiveservices.com > > This e-mail is strictly confidential. If you receive this e-mail in error, > please forward immediately to info@d... > > > 3352 From: David Alexander Date: Fri Jul 13, 2001 10:06am Subject: humour This is real, taken from the BBC news web site. Check it before they change it: http://news.bbc.co.uk/hi/english/sci/tech/newsid_1431000/1431917.stm Atlantis nears space station dicking The Atlantis orbiter, carrying a new "front door" for the International Space Station (ISS), is making its final approach prior to its docking at 0253 GMT Saturday 14 July. It had a perfect lift-off leaving the launch pad at the Kennedy Space Center in Florida, US, at 0504 EDT (0904 GMT) on 12 July without incident. The American space agency (Nasa) had David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 3353 From: Nick Robson Date: Fri Jul 13, 2001 6:42pm Subject: Spray-on Antennas Make Their Mark Something we may have to watch out for in future ------------------------------------------------------------------------ Source: http://www.us.net/signal/CurrentIssue/July01/spray-july.html ------------------------------------------------------------------------ July 2001 ©SIGNAL Magazine 2001 Spray-on Antennas Make Their Mark Experimental technologies offer elegant, inexpensive solutions. By Henry S. Kenyon Researchers are studying applications and materials for creating radio antennas that are sprayed onto a surface. Made from commercially available materials, these devices consist of a conductive substance sprayed over a template with a radio aerial pattern on it. The antennas can be applied directly to walls, windows or fabric shelters, allowing military commanders and relief workers to set up communications networks quickly. Transporting, establishing and maintaining radio systems for military and humanitarian operations is often a logistics balancing act because of weight and space considerations. The ability to use any convenient surface as a mount for an aerial provides planners with additional flexibility when deploying in areas that are devastated or lack infrastructure. The Defense Advanced Research Projects Agency (DARPA), Arlington, Virginia, is considering a number of possible applications and techniques for using spray-on antennas. According to Dr. Paul J. Kolodzy, program manager, DARPA Advanced Technology Office, the goal is to develop easily transportable antenna apertures that can be deployed rapidly. For example, a command post staff could set up its communications infrastructure by spraying antennas onto tents, walls or windows. This concept could also be used where there is a temporary need for a large antenna. Instead of diverting resources to transport and assemble a large structure, communications specialists may find it more efficient to spray a pattern onto a large piece of plastic to create a dish, he says. Kolodzy cautions that the technology is still in its early concept phase. DARPA is examining materials that can emit or receive radio waves and is studying the capabilities of those substances in a particular antenna design. Once these operational parameters have been determined, researchers will be able to decide where to direct work on potential applications, he explains. The technology for the antennas is not exotic, Glynda Benham, president of MegaWave Corporation, Boylston, Massachusetts, explains. MegaWave is conducting a phase-two small business innovation research study for DARPA on possible uses for spray able antennas. According to Benham, the antenna material is available in the form of metal-based paints such as nickel or silver and carbon-graphite-based paints. To create an antenna, a template is placed on the desired surface, the paint is sprayed over it and a connector is attached. These paints are currently used for electromagnetic interference shielding in cases for electronic equipment such as laptop computers. Marshall Cross, vice president for research and development at MegaWave, notes that an antenna could be built into a laptop casing on the production line simply by using a template to separate a section of the paint. This would be less expensive than installing a piece of metal for an antenna, he explains. One potential difficulty will be creating a paint that maintains its integrity on fabric surfaces such as tents. The antennas must be durable enough to withstand repeated folding and washing for long-term applications, Benham says. DARPA research also will determine what kind of power a spray able antenna will be able to put out in a transmission mode. This is important because too much power can destroy the antenna material, Kolodzy says. However, the primary goal of the research is to develop passive receiving systems, he adds. Additional studies seek new ways to find optimal patterns for antenna templates and to create apertures easily. MegaWave also has experimented with wideband antenna designs with bandwidth ranges from 200 megahertz to 3 gigahertz. While efficiency remains a concern, the goal of the current research is to see where the engineering and design boundaries lie. Kolodzy notes that if the broadband studies are successful, the results can be applied directly to narrowband applications. The paints currently used for the antenna material are opaque. DARPA is interested in possible applications for transparent paints. Transparent antennas would be unobtrusive and could be installed on vehicle windshields, Kolodzy says. He notes that the military would like very large apertures for their antennas, and a windshield is often the largest uninterrupted surface on a vehicle that is available for mounting such a device. However, MegaWave researchers determined that no commercially available aerosol spray products currently meet transmission requirements because high temperatures are required to make the paint transparent. While several companies make metal-oxide-based materials for use at room temperature, they do not possess the minimum conductivity capacity of 100 to 500 ohms per square inch necessary for an antenna. The study did reveal how much conductivity is needed to make this class of antennas, Cross observes. "It's almost like negative research. We figured out that with today's state of the art, you couldn't do it," he says. DARPA and MegaWave are also cooperating on developing "invisible" antennas built into transparent surfaces such as glass or plastic. Unlike sprayable antennas, these devices consist of films embedded into or placed over a windshield or a window to create a receiver. This technology also utilizes existing materials. Cross notes that automobile windows are coated with a metal-oxide film. This material currently serves three functions: as a safety laminate to hold the glass together during an accident, as protection for the vehicle's interior and occupants from ultraviolet and infrared rays, and as a demister or defogger when a current passes through it. A fourth and new function would be as a wideband antenna, he adds. In much the same way spray-on antennas can be created by separating a small template from a larger painted area, a transparent antenna can be made by cutting out and isolating an area of window film, Cross explains. This type of device could receive a variety of signals such as amplitude modulation, frequency modulation, global positioning system, cellular telephone and personal communications systems transmissions. Megawave currently is working with Southwall Technologies Incorporated, Palo Alto, California, to develop this technology for automotive use, Benham says. MegaWave also developed a prototype aircraft window for the Federal Aviation Administration. While the program did not proceed beyond the concept stage, it did demonstrate possible aerospace applications for the technology, Cross observes. The concept was to place a metal-oxide film on commercial aircraft windows to provide protection from sunlight and to shield communications and navigation systems from electromagnetic radiation emitted by personal electronic devices. The windows also could be used to detect and locate individual personal devices affecting aircraft avionics. "It's more bang for the buck. One piece of film does three things," Cross contends. Kolodzy hopes that these antenna technologies will be employed in areas such as the automotive industry and disaster relief. He believes that continued research will reveal more uses and capabilities for these devices. "It's going to be fun. If this works out, you're only limited by your imagination," he says. Besides developing unobtrusive and sprayable antenna technologies, DARPA is focusing on combining multiple aerials into a single unit. As part of its phase-two SBIR program with the agency, MegaWave developed a broadband antenna that would allow multiple radios to transmit and receive signals. According to Cross, the goal of the research is to develop multifunction antennas for law enforcement vehicles. "The idea is that you wouldn't drive around in a vehicle with five or six antennas on it because that tips off who you are. We got a used Ford Taurus and developed the whip and invisible windshield antennas and demonstrated that you could put many very high frequency and ultrahigh frequency radios on a single antenna and communicate just as well as with many antennas," he says. The modified device functions as a broadband whip antenna operating over multiple octaves. It is a resistantly loaded antenna--the resistances are distributed along the aerial's length in a manner that allows for wideband use without compromising much of its gain, Cross notes. The company has recently redesigned the whip with genetic algorithm techniques to optimize it for certain frequency bands, Benham explains. Genetic algorithms generate and produce efficient functions, much like real genetic traits are passed along by the dominant genes. This creates an automated method for optimizing antenna configurations. "When you do this process with genetic algorithms, instead of getting a continuous loading process, you get a piecewise, continuous profile that is totally random. It's not something you would ever get if you sat for 100 years and optimized it by hand," she says. --HSK Additional information on MegaWave Corporation's military antenna programs is available on the World Wide Web at http://www.megawave.com/. -- ___________________________________________________________________ Nick Robson, C.S.C.M. Cayman Business Park, Unit B 10 A Huldah Ave, P.O. Box 30297 SMB, Grand Cayman Island, Cayman Islands, British West Indies. I have taken every reasonable precaution to ensure that any attachment to this e-mail has been swept for viruses. However, I cannot accept liability for any damage sustained as a result of software viruses and would advise that you carry out your own virus checks before opening any attachment. Work Phone: 345-949-0004 Work Fax: 345-945-6591 Home Phone: 345-945-8556 -- ____________________________________________________________________ 3354 From: Richard Maher Date: Fri Jul 13, 2001 11:08am Subject: Photon III's The new Photon III is out and it is water resistant with the added function of 3 levels of brightness, 3 levels of strobe and a 1 minute auto shutoff. Red, orange and yellow have a continuous battery life of 120 hours, the LED bulb will never burn out and comes with a lifetime warranty, batteries and a key-ring. Photons weigh just 6 grams, fit under a quarter and can be seen for over a mile. Used by NASA. Rich www.photonmicro.com 3355 From: James M. Atkinson, Comm-Eng Date: Sat Jul 14, 2001 2:48pm Subject: Mass. Court Upholds Man's Conviction Mass. Court Upholds Man's Conviction By Denise Lavoie Associated Press Writer Saturday, July 14, 2001; 5:52 a.m. EDT http://www.washingtonpost.com/wp-srv/aponline/20010714/aponline055226_000.htm BOSTON -- A rock musician who was found guilty of wiretapping after he secretly recorded police during a traffic stop had his conviction upheld by the state's highest court. Michael Hyde, 33, said he turned on his tape recorder on Oct. 26, 1998, after being pulled over by Abington police because he believed he had been unfairly targeted because of his long hair, leather jacket and sports car. Hyde recorded officers using an obscenity, asking him if he had any cocaine in his car, and threatening to send him to jail. They let him go without a ticket, but several days later, Hyde brought the tape to police headquarters to try to prove he was harassed. Instead, he was charged and convicted of breaking the state's electronic surveillance law, getting six months of probation. Hyde said the Supreme Judicial Court's decision Friday "slapped the people of Massachusetts very hard in the face." At Hyde's trial, police testified they pulled him over because of the loud revving of his car's engine, a noisy muffler and a broken license plate light. The court rejected Hyde's argument that the surveillance law was not applicable because police were performing their public duties and therefore had no reasonable expectation of privacy. "We conclude that the Legislature intended (the law) strictly to prohibit all secret recordings by members of the public, including recordings of police officers or other public officials interacting with members of the public, when made without their permission or knowledge," Justice John M. Greaney wrote in the majority opinion. In a strongly worded dissent, the two justices said the wiretapping statute was not meant to prevent citizens from recording an encounter with police. Chief Justice Margaret Marshall and Justice Robert Cordy used the famous videotape of the Rodney King police beating in Los Angeles as an example of a recording that would have been prohibited under Massachusetts law. Prosecutor Robert Thompson said the language of the law explicitly protects the privacy rights of all individuals, whether they are private citizens or police officers. Hyde vowed to continue his fight. "Right now I am looking for an attorney who wants to take this to a federal court," he said. "If I drop this right now it could negatively affect a lot of people." © Copyright 2001 The Associated Press -- ----------------------------------------------------------------------------------------------------- "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ----------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ----------------------------------------------------------------------------------------------------- 3356 From: Aimee Farr Date: Sat Jul 14, 2001 4:40pm Subject: RE: Mass. Court Upholds Man's Conviction COMMONWEALTH vs. MICHAEL J. HYDE Opinion @: http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=ma&vol=sjcslip/8429&i nvol=1 Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR 5400 Bosque, Ste. 675 Waco, Texas 76710 > Mass. Court Upholds Man's Conviction > > By Denise Lavoie > Associated Press Writer > Saturday, July 14, 2001; 5:52 a.m. EDT > > http://www.washingtonpost.com/wp-srv/aponline/20010714/aponline055 > 226_000.htm > 3357 From: James M. Atkinson, Comm-Eng Date: Sat Jul 14, 2001 4:52pm Subject: RE: Mass. Court Upholds Man's Conviction At 4:40 PM -0500 7/14/01, Aimee Farr wrote: >COMMONWEALTH vs. MICHAEL J. HYDE >Opinion @: >http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=ma&vol=sjcslip/8429&i >nvol=1 > >Aimee Farr >mailto:aimfarr@p... >LAW OFFICE OF AIMEE FARR >5400 Bosque, Ste. 675 >Waco, Texas 76710 > > >> Mass. Court Upholds Man's Conviction >> >> By Denise Lavoie >> Associated Press Writer >> Saturday, July 14, 2001; 5:52 a.m. EDT >> >> http://www.washingtonpost.com/wp-srv/aponline/20010714/aponline055 > > 226_000.htm > > http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=ma&vol=sjcslip/8429&invol=1 ------------------------------------------------------------------------ Docket No.:8429 Parties:COMMONWEALTH vs. MICHAEL J. HYDE. County:Plymouth. Dates:April 2, 2001. - July 13, 2001. Present:(Sitting in Northampton): Marshall, C.J., Greaney, Spina, Cowin, Sosman, & Cordy, JJ. Summary:Eavesdropping. Electronic Surveillance. Constitutional Law, Privacy. Words, "Interception," "Oral communication." Complaint received and sworn to in the Brockton Division of the District Court Department on January 28, 1999. A motion to dismiss was heard by James F.X. Dinneen, J., and the case was tried before David G. Nagle, Jr., J. The Supreme Judicial Court granted an application for direct appellate review. Peter M. Onek, Committee for Public Counsel Services, for the defendant. Robert C. Thompson, Assistant District Attorney, for the Commonwealth. William C. Newman & John Reinstein, for American Civil Liberties Union of Massachusetts, amicus curiae, submitted a brief. GREANEY, J. This case raises the issue whether a motorist may be prosecuted for violating the Massachusetts electronic surveillance statute, G. L. c. 272, ß 99, for secretly tape recording statements made by police officers during a routine traffic stop. A jury in the District Court convicted the defendant on four counts of a complaint charging him with unlawfully intercepting the oral communications of another, in violation of G. L. c. 272, ß 99 F. The defendant appealed, and we granted his application for direct appellate review. We conclude that G. L. c. 272, ß 99, strictly prohibits the secret electronic recording by a private individual of any oral communication, and makes no exception for a motorist who, having been stopped by police officers, surreptitiously tape records the encounter. Accordingly, we affirm the judgments of conviction. The relevant facts are not in dispute. On October 26, 1998, just after 10:30 P.M., an Abington police officer stopped the defendant's white Porsche, because the automobile had an excessively loud exhaust system and an unlit rear registration plate light. Three other Abington police officers arrived shortly thereafter and the stop quickly became confrontational.(1) During the course of the stop, which lasted approximately fifteen to twenty minutes, the defendant and his passenger, Daniel Hartesty, were ordered out of the automobile, and Hartesty was pat frisked. One officer reached into the automobile, picked up a plastic shopping bag that lay on the floor by the passenger seat, and looked inside. (The bag contained compact discs.) At one point, the defendant stated that the stop was "a bunch of bullshit," and that he had been stopped because of his long hair. One officer responded, "Don't lay that shit on me." Later, another officer called the defendant "an asshole." The defendant was asked whether he had any "blow" (cocaine) in the car. At the conclusion of the stop, the defendant and Hartesty were allowed to leave. No traffic citation was issued to the defendant, and the defendant was not charged with any crime. According to the testimony of one police officer, the defendant was "almost out of control" and the stop "had gone so sour," that it was deemed in everyone's interest simply to give the defendant a verbal warning. Unbeknownst to the officers, however, the defendant had activated a hand-held tape recorder at the inception of the stop and had recorded the entire encounter. Six days later, the defendant went to the Abington police station to file a formal complaint based on his unfair treatment during the stop. To substantiate his allegations, he produced the tape recording he had made. A subsequent internal investigation conducted by the Abington police department, which concluded on February 1, 1999, exonerated the officers of any misconduct. In the meantime, the Abington police sought a criminal complaint in the Brockton Division of the District Court Department against the defendant for four counts of wiretapping in violation of G. L. c. 272, ß 99. A clerk-magistrate refused to issue the complaint, and the Commonwealth appealed. After a show cause hearing, a judge in the District Court ordered that the complaint issue. The defendant filed a motion to dismiss the complaint. He claimed that G. L. c. 272, ß 99, was intended to protect the privacy rights of individuals, and, because the police officers were performing official police duties during the stop of his car, they had no privacy expectations in their words, and, as a result, their conversation should not be considered "oral communication" within the statute. Because, in the defendant's view, there was no interception of any "oral communication," there could be no violation of G. L. c. 272, ß 99. In support of his position, the defendant relied on Federal cases interpreting the term "oral communications" as defined in the Federal electronic surveillance statute, 18 U.S.C. ß 2510 (2000), to require the speaker to have a justifiable expectation of privacy. The defendant asserted that Massachusetts courts have looked to Federal decisions interpreting the Federal statute for guidance in interpreting other portions of our electronic surveillance statute, see Commonwealth v. Look, 379 Mass. 893 (1980), and so we should also look to Federal precedent for the proper interpretation of the term "oral communication" in our statute. The judge (the same judge who had ordered that the complaint issue) rejected the defendant's argument and denied the motion to dismiss. The judge reasoned that the definition of "oral communication" under G. L. c. 272, ß 99 B 2 ("speech, except such speech as is transmitted over public air waves by radio or other similar device"), was clear, and, unlike the definition in the Federal electronic surveillance statute,(2) did not require an expectation of privacy by the speaker in order to make the statute applicable. He concluded that the Massachusetts statute prohibited the secret tape recording of the police officers' speech. The defendant was tried before a jury and convicted of four counts of violating G. L. c. 272, ß 99. The defendant once again claims, as his principal argument, that the judge improperly denied his motion to dismiss, because the police officers did not possess any privacy interest in the words they spoke in the course of the stop, and, therefore, his tape recording of the encounter did not violate G. L. c. 272, ß 99. The Commonwealth asserts that the plain language of the statute unambiguously expresses the Legislature's intent to prohibit the secret recording of the speech of anyone, except in specifically delineated circumstances. We agree with the Commonwealth. General Laws c. 272, ß 99 C 1, set forth below,(3) prohibits, unless otherwise specified in the statute, the intentional interception of any oral communication. The statute provides that "[t]he term 'interception' means to secretly hear, secretly record, or aid another to secretly hear or secretly record the contents of any wire or oral communication through the use of any intercepting device[(4)] by any person other than a person given prior authority by all parties to such communication . . . ." G. L. c. 272, ß 99 B 4. An "oral communication" is defined as "speech, except such speech as is transmitted over the public air waves by radio or other similar device." G. L. c. 272, ß 99 B 2. Exceptions to the general prohibition are clearly specified within the statute and include recordings by (1) a communication common carrier in the ordinary course of its business, see G. L. c. 272, ß 99 D 1 a (commonly referred to as "service observing"); (2) persons using an office intercommunication system in the ordinary course of their business, see G. L. c. 272, ß 99 D 1 b; (3) an investigative or law enforcement officer, if the officer is a party to such communication or has been given prior authority by such a party, and if the recording is made in the course of investigating certain designated offenses in connection with organized crime, see G. L. c. 272, ß 99 B 4 and 7; and (4) persons duly authorized to make specific interceptions by a warrant issued pursuant to the statute, see G. L. c. 272, ß 99 D 1 d. The statute is carefully worded and unambiguous, and lists no exception for a private individual who secretly records the oral communications of public officials. We have no doubt that the plain language of the statute accurately states the Legislature's intent. The Report of the Special Commission on Electronic Eavesdropping, 1968 Senate Doc. No. 1132, at 6, confirms that the statute's strict prohibition of all secret recording by members of the public grew out of concern over the commercial availability of electronic devices capable of intercepting wire or oral communications, and the recognition that there was no way effectively to prohibit the sale or manufacture of these devices. These concerns led the commission to revise the prior version of the statute, which had allowed secret recording on private premises, see G. L. (Ter. Ed.) c. 272, ß 101 ("nothing contained [herein] shall render it unlawful for any person to install and use such a device on premises under his exclusive control"), repealed by St. 1968, c. 738, ß 5, to "strictly prohibit [the public from] electronic eavesdropping and wiretapping of other persons' conversations without permission." 1968 Senate Doc. No. 1132, at 9. In addition, until the 1968 amendments, the law had permitted the recording of one's own conversations, or conversations with the prior permission of one party (traditionally known as "one-party consent"). See G. L. c. 272, ß 99, as appearing in St. 1959, c. 449, ß 1 ("Whoever . . . secretly or without the consent of either a sender or receiver . . ."). The commission revised the statute generally to disallow recordings made with one-party consent, thus rejecting the prevalent approach taken by other States, and by the comparable Federal electronic surveillance statute, that generally permitted wiretapping and eavesdropping in cases of one-party consent. See Commonwealth v. Thorpe, 384 Mass. 271, 280 n.7 (1981), cert. denied, 454 U.S. 1147 (1982) (examining Legislature's decision in 1968 amendments to allow some warrantless surveillance by law enforcement officers, but limiting the reach of one-party consent to interception of offenses in connection with organized crime). The commission clearly designed the 1968 amendments to create a more restrictive electronic surveillance statute than comparable statutes in other States.(5) See Commonwealth v. Jackson, 370 Mass. 502, 506 & n.6 (1976). We conclude that the Legislature intended G. L. c. 272, ß 99, strictly to prohibit all secret recordings by members of the public, including recordings of police officers or other public officials interacting with members of the public, when made without their permission or knowledge. We reject the defendant's argument that the statute is not applicable because the police officers were performing their public duties, and, therefore, had no reasonable expectation of privacy in their words. The statute's preamble expresses the Legislature's general concern that "the uncontrolled development and unrestricted use of modern electronic surveillance devices pose[d] grave dangers to the privacy of all citizens of the commonwealth" and this concern was relied on to justify the ban on the public's clandestine use of such devices. G. L. c. 272, ß 99 A. See Commonwealth v. Gordon, 422 Mass. 816, 833 (1996). While we recognize that G. L. c. 272, ß 99, was designed to prohibit the use of electronic surveillance devices by private individuals because of the serious threat theypose to the "privacy of all citizens," the plain language of the statute, which is the best indication of the Legislature's ultimate intent, contains nothing that would protect, on the basis of privacy rights, the recording that occurred here.(6) In Commonwealth v. Jackson, supra at 506, this court rejected the argument that, because a kidnapper has no legitimate privacy interest in telephone calls made for ransom purposes, the secret electronic recording of that conversation by the victim's brother would not be prohibited under G. L. c. 272, ß 99: "[W]e would render meaningless the Legislature's careful choice of words if we were to interpret 'secretly' as encompassing only those situations where an individual has a reasonable expectation of privacy." Id.(7) The defendant concedes the restrictive nature of the statute's language, but urges us, nevertheless, to recognize an exception to the statute's prohibition. In support of his request, the defendant cites Commonwealth v. Gordon, supra at 832-833, where this court held that G. L. c. 272, ß 99 P, which allows a criminal defendant to move to suppress evidence obtained in violation of G. L. c. 272, ß 99, does not prohibit a judge from allowing in evidence routine administrative recordings of a defendant's booking procedure following an arrest. That decision, however, dealt primarily with the admissibility of a secret recording as evidence, and not with whether a violation of the statute had occurred. Moreover, the defendant cannot claim that his recording was made as a routine, administrative procedure, when the record indicates that he recorded the officers' words fully intending to use the recording as proof in his subsequent complaint of police misconduct.(8) The defendant argues that his prosecution was tantamount to holding him criminally liable for exercising his constitutional rights to "petition [the government] for redress of his grievances and to hold police officers accountable for their behavior." This argument has no merit. The defendant freely exercised his right to petition by filing his complaint of police misconduct with the Abington police department. An internal investigation was conducted pursuant to his complaint, which included, according to the trial testimony of the officer in charge of the investigation, a review of the defendant's tape of the encounter. The defendant was not prosecuted for making the recording; he was prosecuted for doing so secretly. The dissent reaches its conclusion by ignoring the unambiguous language and definitions of the statute and by relying on purported (and dubious) legislative history. The dissent suggests that the defendant's secret recording of the words of the police officers should be lawful, because such recording may tend to hold police officers accountable for improper behavior. Implicit in the dissent's position is the even broader suggestion that police officers routinely act illegally or abusively, to the degree that public policy strongly requires documentation of details of contacts between the police and members of the public to protect important rights. We doubt the validity of the dissent's major premise, and we are not convinced that the widespread clandestine recording of encounters between individuals and police officers would be desirable or even efficacious.(9) Nor do we think, as the dissent does, that police officers should be singled out for particular approbation to safeguard the integrity of the "Republic." Post at . Followed to its logical conclusion, the dissent would encourage drug manufacturers to mount hidden video cameras in their facilities so they can capture the moment of truth when the police execute a search warrant and would authorize drug dealers secretly to tape record conversations with suspected undercover officers or with informants in order to protect the dealers' rights against hypothetical police abuse. Numerous other examples exist. The point is an obvious one. Every police encounter would be available for secret recording; even meter maids would not be spared. The value of obtaining probative evidence of occasional official misconduct does not justify a failure to enforce the clear terms of the statute. See Commonwealth v. Blood, 400 Mass. 61, 74 (1987), and cases cited. Further, if the tape recording here is deemed proper on the ground that public officials are involved, then the door is opened even wider to electronic "bugging" or secret audio tape recording (both are prohibited by the statute and both are indistinguishable in the injury they inflict) of virtually every encounter or meeting between a person and a public official, whether the meeting or encounter is one that is stressful (like the one in this case or, perhaps, a session with a tax auditor) or nonstressful (like a routine meeting between a parent and a teacher in a public school to discuss a good student's progress). The door once opened would be hard to close, and the result would contravene the statute's broad purpose and the Legislature's clear prohibition of all secret interceptions and recordings by private citizens. See Commonwealth v. Thorpe, supra at 279 ("the Legislature proceeded on the premise that electronic surveillance is anathema except within certain narrowly prescribed boundaries"). See also Commonwealth v. Gonzalez, 426 Mass. 313, 315 (1997); O'Sullivan v. NYNEX Corp., 426 Mass. 261, 263 (1997); Commonwealth v. Blood, supra at 66. Despite efforts to circumscribe its holding, the dissent, by logical extension, would permit the untrammeled interception of communications by legislators, executive officers and agents, judicial officials, municipal officers, among others, on the erroneous supposition that public accountability requires the practice. It is not our function to craft unwarranted judicial exceptions to a statute that is unambiguous on its face, and, particularly, not to attempt to do so by subjecting police and public officials to sinister accusations or by evoking unwarranted fears that legitimate interests of the media may be harmed by the statute. See Commonwealth v. Thorpe, supra at 279-280.(10) Finally, some comment is in order on the dissent's appeal to the now-famous Rodney King videotape, recorded in Los Angeles, California, by George Holliday on March 3, 1991, post at . The appeal interjects emotional rhetoric into what should be a straightforward matter of statutory interpretation. The California electronic surveillance statute prohibits only the recording of "confidential communication," and excludes "communication made in a public gathering . . . or in any other circumstance in which the parties to the communication may reasonably expect that the communication may be overheard or recorded," Cal. Penal Code ß 632 (a) and (c) (West 1999), and, therefore, would have no application to Holliday's videotape. As discussed above, however, our Legislature chose not to follow those States whose statutes prohibit wiretapping or secret electronic recording based on privacy rights. See notes 5 and 6, supra. "If the Legislature had intended to [prohibit only secret recording where an individual has a reasonable expectation of privacy], the statute would have been written in terms similar to those used in the California eavesdropping statute . . . . Rather, it is apparent from the Report of the Special Commission on Electronic Eavesdropping, 1968 Senate Doc. No. 1132, that the legislative intent was to impose more stringent restrictions on the use of electronic surveillance devices by private individuals than is done in other States." Commonwealth v. Jackson, 370 Mass. 502, 506 (1976). There is no basis to ignore the plain language and legislative history of G. L. c. 272, ß 99, or our case law interpreting it, in favor of speculation as to how an imaginary scenario might have played out, had the Rodney King episode occurred in Massachusetts and not in California.(11) The problem here could have been avoided if, at the outset of the traffic stop, the defendant had simply informed the police of his intention to tape record the encounter, or even held the tape recorder in plain sight.(12) Had he done so, his recording would not have been secret, and so would not have violated G. L. c. 272, ß 99. See Commonwealth v. Jackson, supra at 507 (no "interception" when defendant was aware his voice was being recorded). Secret tape recording by private individuals has been unequivocally banned, and, unless and until the Legislature changes the statute, what was done here cannot be done lawfully. Judgments affirmed. MARSHALL, C.J. (dissenting, with whom Cordy, J., joins). In the early morning hours of Sunday, March 3, 1991, George Holliday was awakened by a commotion outside his apartment. From his window he saw an African-American man being beaten by uniformed police officers. Holliday did more than watch. He recorded on videotape (with sound) the officers' clubbing the man with fifty-six baton strokes, and kicking him viciously about the head and body.(1)The graphic videotape of the arrest of Rodney King was subsequently viewed on television by millions of Americans, causing a public outcry and leading to a comprehensive investigation of the use of excessive force by the Los Angeles police department. The videotape also served as the catalyst for the formation of The Christopher Commission, established to investigate the incident. The commission concluded that police misconduct was a serious problem within the department, and that major reform efforts were needed. The commission wrote of the importance of the Holliday videotape: "Our Commission owes its existence to the George Holliday videotape of the Rodney King incident. Whether there even would have been a Los Angeles Police Department investigation without the video is doubtful, since the efforts of King's brother . . . to file a complaint were frustrated, and the report of the involved officers was falsified."(2) The videotaped events occurred in Los Angeles. Had they occurred in Massachusetts, under today's ruling Holliday would have been exposed to criminal indictment rather than lauded for exposing an injustice.(3) That can be the result only if the Legislature intended the criminal statute, G. L. c. 272, ß 99, to apply in these circumstances. It did not. I therefore respectfully dissent. There is nothing in the legislative history of the wiretapping statute, G. L. c. 272, ß 99, in the preamble to the legislation, or in the language of the statute that compels the result reached by the court today. The legislative history makes clear that the intent of the statute, as amended in 1968,(4) is twofold. First, the amendments were designed to authorize and to regulate the government's use of wiretaps and other surveillance devices. See Interim Report of the Special Commission on Electronic Eavesdropping, 1968 Senate Doc. No. 1132, at 1-2 (1968 Report) (commission "desires close judicial supervision over all aspects of the process of eavesdropping and wiretapping as it is performed by law enforcement officers"). Supervision of governmental surveillance and eavesdropping was viewed as necessary to "eliminate the possibility of abuse and add to the public's confidence in the manner in which this statute is employed by law enforcement officials." 1968 Report at 8. Second, the amendments were intended to protect the privacy of citizens by regulating nongovernmental "surveillance," particularly in two circumstances identified by the Special Commission as posing serious risks to that privacy: (i) the Legislature was concerned about the newly discovered practice of private telephone companies' eavesdropping on the conversations of its private customers(5); and (ii) the commission heard evidence that new technology had made "eavesdropping devices" or "bugs," such as subminiature transmitters, "readily available" to "private investigators" and "private parties." Even if detected, the commission cautioned, "one can never learn the identify of the eavesdropper." Interim Report of the Special Commission on Electronic Eavesdropping, 1967 Senate Doc. No. 1198 at 3 (1967 Report). The commission recommended that, to protect the privacy of citizens, individuals be prohibited from using these "wiretapping and eavesdropping devices" to record their private conversations.(6) There is no hint in the legislative history that the Legislature contemplated the circumstances at issue in this criminal case: the tape recording of an encounter on a public way between a citizen and a police officer engaged in his official duties.(7) The 1968 amendments to the wiretapping statute, St. 1968, c. 738, ß 1, at issue here, were enacted shortly after the special commission's report, and reflect these same two purposes. First, the statute authorized the police to engage in secret electronic surveillance of citizens suspected of organized crime: The statutory preamble notes that "[n]ormal investigative procedures are not effective" in combating the "increasing activities of organized crime" and that "law enforcement officials must be permitted to use modern methods of electronic surveillance . . . when investigating these organized criminal activities." Id.(8) Second, the Legislature noted that the "uncontrolled development and unrestricted use of modern electronic devices" posed grave dangers to the "privacy of all citizens of the commonwealth." With these twin objectives in mind, the Legislature placed substantial restrictions on "surveillance" and "eavesdropping" by government officials. See Commonwealth v. Gordon, 422 Mass. 816, 833 (1996) ("It is apparent from the preamble that the legislative focus was on the protection of privacy rights and the deterrence of interference therewith by law enforcement officers' surreptitious eavesdropping as an investigative tool"). The Legislature also restricted "surveillance" and "eavesdropping" by private individuals to protect those same privacy interests. See Commonwealth v. Jackson, 370 Mass. 502, 507 (1976) (statutory language and legislative policy of "protecting the privacy of our citizens"). To that end the Legislature both prohibited "interceptions," and provided a civil remedy for any person "aggrieved" by such "interceptions," described by the Legislature as one who "ha[s] standing to complain that his . . . privacy was invaded in the course of an interception." G. L. c. 272, ß 99 B 6 and Q. The legislative intent as reflected in the statutory language is explicit: to protect the privacy interests of citizens. While the statutory language enacted to accomplish these purposes can be broadly read, there is no suggestion that the Legislature had in mind outlawing the secret tape recording of a public exchange between a police officer and a citizen. The criminal conviction of Michael Hyde is (apparently) the first time that a citizen of Massachusetts has been convicted because he tape recorded an exchange with a police officer performing an official function in a public place in the presence of a third party, potentially within the sight and hearing of any passerby.(9) Now to hold, as the court does, that a police officer possesses a privacy interest in statements he makes as a public officer effectuating a traffic stop sets the jurisprudence of this Commonwealth apart from all others. Many States have wiretapping statutes similar to the one enacted in 1968 in Massachusetts.(10) In only one reported decision has a State attempted to indict a citizen in circumstances similar to those in this case. The attempt was summarily rejected. In State v. Flora, 68 Wash. App. 802 (1992), the court overturned a conviction obtained in circumstances nearly identical to these and under a wiretapping statute similar to the one at issue here. The Flora court rejected as "wholly without merit" the view now adopted by this court. Id. at 806. The court "decline[d] the State's invitation" to transform its wiretapping statute "into a sword available for use against individuals by public officers acting in their official capacity." Id. at 808.(11) This court's attempt to distinguish State v. Flora, supra, as "inapposite" because the "Washington electronic surveillance statute prohibits only the secret recording of private conversations" is not persuasive. Ante at n.6.(12) Like its Washington counterpart, the Massachusetts statute protects, as it was intended to, the privacy of citizens. See G. L. c. 272, ß 99 B 6 ("aggrieved person" is one whose "privacy was invaded in the course of an interception").(13) Both the language of the statute and its legislative history make clear that the Legislature was concerned only with protecting the secret recording of conversations in which there was a legitimate expectation of privacy. None exists here. The purpose of G. L. c. 272, ß 99, is not to shield public officials from exposure of their wrongdoings. I have too great a respect for the Legislature to read any such meaning into a statute whose purpose is plain, and points in another direction entirely. Where the legislative intent is explicit, it violates a fundamental rule of statutory construction to reach a result that is plainly contrary to that objective. See Commonwealth v. Gordon, supra at 832-833 (court declined to read wiretapping statute "literally" in "absence of more specific statutory language" that broad definition of interception outlawed unconsented audiotaping of booking procedures, noting that "in light of the preamble, we are unwilling to attribute that intention to the Legislature"). See Commissioner of Pub. Works v. Cities Serv. Oil Co., 308 Mass. 349, 360 (1941) (statutes are to be interpreted "in the light of the Constitution and of the common law, to the end that they be held to cover the subjects presumably within the vision of the Legislature" and "be not stretched" to "comprehend matters not within the principle and purview on which they were founded"). "The public has an interest in knowing whether public servants are carrying out their duties in an efficient and law-abiding manner." Attorney Gen. v. Collector of Lynn, 377 Mass. 151, 158 (1979). To hold that the Legislature intended to allow police officers to conceal possible misconduct behind a cloak of privacy requires a more affirmative showing than this statute allows. In our Republic the actions of public officials taken in their public capacities are not protected from exposure. Citizens have a particularly important role to play when the official conduct at issue is that of the police. See Rotkiewicz v. Sadowsky, 431 Mass. 748, 754 (2000) (recognizing importance of "public discussion and public criticism directed toward the performance" of police officers). Their role cannot be performed if citizens must fear criminal reprisals when they seek to hold government officials responsible by recording -- secretly recording on occasion -- an interaction between a citizen and a police officer. The court suggests, ante at , that a different reading would permit "untrammeled interception of communications" of government officials by everyone and anyone. That concern is misplaced. There is a difference in kind, well recognized in our jurisprudence, between police officers, who have the authority to command citizens, take them into custody, and to use physical force against them, and other public officials who do not possess such awesome powers.(14) We hold police officers to a higher standard of conduct than other public employees, and their privacy interests are concomitantly reduced. See, e.g., O'Connor v. Police Comm'r of Boston, 408 Mass. 324, 328-329 (1990) ("public confidence in the police is a social necessity and is enhanced by procedures that deter [unlawful police conduct]"); Broderick v. Police Comm'r of Boston, 368 Mass. 33, 42 (1975), quoting Gardner v. Broderick, 392 U.S. 273, 277-278 (1968) (police officer "is a trustee of the public interest, bearing the burden of great and total responsibility to his public employer"). We hold officers to this higher standard of conduct, fully confident that, in most cases, they will meet that standard, and there is no "implicit" suggestion to the contrary. Ante at . It is the recognition of the potential for abuse of power that has caused our society, and law enforcement leadership, to insist that citizens have the right to demand the most of those who hold such awesome powers.(15) The court's ruling today also threatens the ability of the press -- print and electronic -- to perform its constitutional role of watchdog. As the court construes the Massachusetts wiretapping statute, there is no principled distinction to explain why members of the media would not be held to the same standard as all other citizens. See, e.g., Associated Press v. NLRB, 301 U.S. 103, 122-133 (1937) ("The publisher of a newspaper has no special immunity from the application of general laws. He has no special privilege to invade the rights and liberties of others"). See also Branzburg v. Hayes, 408 U.S. 665, 682 (1972) ("It is clear that the First Amendment [to the United States Constitution] does not invalidate every incidental burdening of the press that may result from the enforcement of civil or criminal statutes of general applicability"). The statute, on its face, makes no exception for members of the media or anyone else. Had Michael Hyde, the defendant in this case, been a news reporter he could have faced the same criminal consequences that the court now sanctions.(16) If the statute reaches actions by police officials acting in their public capacities in the plain view of the public, the legitimate news gathering of the media is most assuredly implicated. I would reverse the conviction. ------------------------------------------------------------------------ calm the defendant, he became more and more unruly as the stop progressed. Hartesty, on the other hand, testifying for the defendant, stated that the defendant was not combative, but that the defendant and the officers "were bickering." Hartesty also testified that he was illegally searched and that one officer threatened to give the defendant a road sobriety test, which the officer "promised" the defendant would fail. (2) The definition of "oral communication" in the Federal electronic surveillance statute is "any oral communication uttered by a person exhibiting an expectation that such communication is not subject to interception under circumstances justifying such expectation, but such term does not include any electronic communication." 18 U.S.C. ß 2510 (2) (2000). (3) The relevant text of G. L. c. 272, ß 99 C 1, reads as follows: "Except as otherwise specifically provided in this section any person who -- willfully commits an interception, attempts to commit an interception, or procures any other person to commit an interception or to attempt to commit an interception of any wire or oral communication shall be fined not more than ten thousand dollars, or imprisoned in the state prison for not more than five years, or imprisoned in a jail or house of correction for not more than two and one half years, or both so fined and given one such imprisonment." (4) The term "intercepting device" is defined as "any device or apparatus which is capable of transmitting, receiving, amplifying, or recording a wire or oral communication." G. L. c. 272, ß 99 B 3. (5) Every State, with the exception of Vermont, has some type of eavesdropping or wiretapping statute. The majority contain language that, to some degree, prohibits only the surreptitious recording of another's words when spoken with a reasonable expectation of privacy. See, e.g., Ala. Code ß 42.20.300 (Michie 1996) (Alabama; "private communication"); Ga. Code Ann. ß 16-11-60 (Michie 1996) (Georgia; "in private place"); Mich. Comp. Laws ß 750.539a (1996) (Michigan; "private discourse of others"); N.H. Rev. Stat. Ann. ß 570-A: 1 (1995) (New Hampshire; "uttered by a person exhibiting an expectation that such communication is not subject to interception under circumstances justifying such expectation"). In addition, as recognized by the judge in his memorandum denying the defendant's motion to dismiss, the Federal electronic surveillance statute, see note 2, supra, similarly limits "oral communication" to the speech of a person who holds a justifiable expectation that it will not be subject to interception. For an extensive discussion of various State electronic surveillance statutes, see C. Bast, What's Bugging You? Inconsistencies and Irrationalities of the Law of Eavesdropping, 47 DePaul L. Rev. 837, 868-881 (1998). (6) The defendant cites State v. Flora, 68 Wash. App. 802, 806 (1992), in which the Court of Appeals of Washington held, on nearly identical facts, that an arrestee's attempt to use a tape recorder to record his arrest did not violate Washington's electronic surveillance statute, because the police officers had no reasonable expectation of privacy in their words. This case is inapposite, however, because the Washington electronic surveillance statute prohibits only the secret recording of private conversations, see Wash. Rev. Code Ann. ß 9.73.030 (1) (b) (2000). Accord Commonwealth v. Henlen, 522 Pa. 514, 517 (1989) (secret recording of interrogation by prison guard suspected of theft did not violate Pennsylvania's electronic surveillance statute, because interrogating officer had no justifiable expectation of privacy). See 18 Pa. Cons. Stat. ß 5702 (2000) (defining "oral communications" as "any oral communication uttered by a person possessing an expectation that such communication is not subject to interception under circumstances justifying such expectation"). Because our own statute broadly prohibits the interception of speech (except that which is transmitted over public air waves), see G. L. c. 272, ß 99 B 2, whether the police officers possessed privacy interests in their words spoken in the course of performing their public duties, or whether the encounter constituted a routine traffic stop or a custodial interrogation, as argued by the defendant, are issues that we need not address. Consideration of such issues would only be warranted in a civil suit for damages under G. L. c. 272, ß 99 Q, which allows actual and punitive damages, as well as attorneys fees, for: "any aggrieved person whose oral or wire communications were intercepted, disclosed, or used except as permitted or authorized by this section or whose personal or property interests or privacy were violated by means of an interception except as permitted or authorized by this section shall have a civil cause of action against any person who so intercepts, discloses or uses such communications or who so violates his personal, property or privacy interest . . . ." (Emphasis added). (7) We reject the defendant's argument that police officers acting in their official capacity are not "persons" entitled to the protection of G. L. c. 272, ß 99. See Commonwealth v. Voight, 28 Mass. App. Ct. 769, 771-773 (1990) (town, as political subdivision of Commonwealth, cannot be victim of telephone harassment, but dispatcher, as individual public employee, could be appropriate victim). (8) The defendant also points to Dillon v. Massachusetts Bay Transp. Auth., 49 Mass. App. Ct. 309 (2000), where the Appeals Court departed from the statute's strict language banning electronic recording except that done by telephone equipment supplied by a communications common carrier (i.e., a telephone company). See G. L. c. 272, ß 99 B 3. Recognizing sweeping changes in the telecommunications industry since the statute's enactment, and the fact that common telephone equipment is now widely available from entities other than telephone companies, the court properly allowed the exception to apply, even though the intercepting device had been obtained from a commercial equipment manufacturer. Id. at 315-316 ("We do not depart lightly from the express wording of a statute . . . but in the unusual circumstances appearing here we agree with the court below that a deviation is justified"). The Dillon decision is easily distinguishable from this case. The court departed from the words of the statute to preserve the Legislature's intent; here, as discussed above, the relevant provisions of the statute mirror the Legislature's intent. (9) Although we have stated that the electronic recording by the police of interrogations is a good practice, see Commonwealth v. Diaz, 422 Mass. 269, 271-273 (1996), by no stretch of the imagination did we suggest that it is desirable for citizens to intercept or record electronically the speech of others, including police officers, without their knowledge. We presume that, when police interrogations are electronically recorded, the suspect is aware that the interrogation is being preserved. (10) Although not cited by the parties, in People v. Beardsley, 115 Ill. 2d 47 (1986), a defendant appealed from his conviction of eavesdropping when, having been arrested and placed in the rear seat of a squad car, he secretly tape recorded the conversation of two police officers who sat in the front seat. See id. at 49. The Supreme Court of Illinois reversed the defendant's conviction, holding that, although the plain language of the Illinois eavesdropping statute prohibited the recording of "all or any part of any conversation" without consent, Ill. Ann. Stat. c. 38, ß 14-2 (a) (1) (1983), the statute must have been intended to protect individuals only from the surreptitious monitoring of conversations of a private nature. See id. at 53 (reasoning that, because officers were aware that the defendant was in a position to overhear, their conversation was not private). The Illinois Legislature, however, subsequently amended the statute to define "conversation" as "any oral communication between 2 or more persons regardless of whether one or more of the parties intended their communication to be of a private nature." 720 Ill. Comp. Stat. ß 5/14-1(d) (West 1996). See People v. Nestrock, 316 Ill. App. 3d 1, 7 (2000). (11) The dissent's presumption that Holliday would have been prosecuted, under Massachusetts law, for wilfully committing an interception of an oral communication, is unwarranted. Although the Rodney King videotape visually captured the conduct of the police officers' interaction with King, the recording was virtually inaudible, until electronic enhancements filtered the audio portion to allow the actual commands of the police officers to be heard. See United States v. Koon, 34 F.3d 1416, 1427 & n.3 (9th Cir. 1994), aff'd in part and rev'd in part, 518 U.S. 81 (1996). (12) The Commonwealth suggests that the defendant's alleged unruly conduct during the stop was a purposeful attempt to "bait" the officers into saying something improper, which would be duly recorded. The statute requires only that the recording be secret and intentional, and, therefore, it is irrelevant whether the situation was as the Commonwealth claims, or whether the defendant's recording was a sincere effort to protect himself from police harassment. (1) See Witnesses Depict Relentless Beating by Police, Los Angeles Times, Mar. 7, 1991, at B1. See also United States v. Koon, 34 F.3d 1416, 1424-1425 (9th Cir. 1994), rev'd in part, aff'd in part, 518 U.S. 81 (1996) (convictions affirmed). (2) Report of the Independent Commission on the Los Angeles Police Department at ii (1991). Holliday's videotape also led to the Federal indictment of four officers, two of whom were convicted of violating King's civil rights by the use of unreasonable force. See United States v. Koon, supra at 1462. (3) The court's suggestion, ante at n.11, that Holliday would not face prosecution because his 1991 recording was "virtually inaudible" is unwarranted. Electronic recordings are routinely enhanced to clarify the sound. See, e.g., United States v. Carson, 969 F.2d 1480, 1493 (3d Cir. 1992) (audio enhancement of wiretap surveillance tapes to improve quality); United States v. Vastola, 915 F.2d 865, 869 (3d Cir. 1990) (same). (4) The Massachusetts wiretapping statute, G. L. c. 272, ß 99, was first enacted in 1920. St. 1920, c. 558, ß 1. It was substantially modified in 1959, St. 1959, c. 449, ß 1. In 1964, the Senate established a special commission to investigate electronic "eavesdropping" and "wire tapping recording devices." Res. 1964, c. 82. Interim reports were filed in 1967 and 1968. The 1968 amendments to G. L. c. 272, ß 99, followed shortly thereafter. St. 1968, c. 738, ß 1. See Commonwealth v. Thorpe, 384 Mass. 271, 280 n.7 (1981), cert. denied, 454 U.S. 1147 (1982). (5) During the course of its hearings the Special Commission discovered for the first time that for decades New England Telephone and Telegraph Company had secretly engaged in "service observation practices" in which the company intercepted and recorded customer-to-customer calls and customer-to-company calls. The commission stated that "[w]e cannot understand why apparently no one in the [Department of Public Utilities] thought it outrageous that the company would monitor customer-to-customer calls to gain customer comments on service" (emphasis removed). 1967 Report at 14. (6) A concurring report filed by two members of the special commission, Elliot B. Cole and William P. Homans, Jr., makes abundantly clear that the "prohibition of wiretapping and eavesdropping by the public" was to protect the privacy of citizens engaged in personal conversations. The two members quoted from a letter to the commission by Professor Alan Westin, the author of Privacy and Freedom, expressing his opposition to "one-party consent" provisions. Professor Westin explained that one-party consent provisions inhibit a person "to speak frankly and freely in personal conversation." Professor Westin refers to a 1958 opinion by West Germany's highest civil court against one-party "surveillance," in which the opinion notes "that the individual expresses his personality in private conversation, and has a right to do so freely, without distrust and suspicion" (emphasis added). 1968 Report at 12 (concurring report). (7) Audio tape recorders (the device at issue in this criminal case) were hardly new technology in 1968. The 1967 Report makes clear that what concerned the Legislature were "eavesdropping devices" ("bugs") and other sophisticated inventions of then-recent origin that could be concealed in telephones or walls, and could "transmit a very clear signal at least 7 blocks in downtown Boston and can pick up a whisper at 20 feet." See 1967 Report at 3. (8) It is clear that authorizing electronic wiretapping to combat organized crime was the primary focus of the 1968 amendments to the statute. See 1968 House Doc. No. 3797, Message from His Excellency the Governor Recommending Legislation to Assist Law Enforcement Officials to Combat Crime in the Commonwealth, Feb. 6, 1968 (The "shocking events of the last few days" demonstrate the need to "enact an electronic surveillance law that allows law enforcement officials to obtain evidence . . . by striking at the communications links essential to the operation of criminal organizations"). The "shocking events" referred to by Governor John A. Volpe involved an attack on attorney John E. Fitzgerald, Jr., who lost a leg and nearly died after organized crime members placed a bomb in his vehicle. See Barboza's Lawyer Loses Leg in Everett Dynamite Blast, Boston Globe, Jan. 31, 1968, at 1. Attorney Fitzgerald represented Joseph (Barboza) Baron, an informer who was the star witness in a trial of four men accused of a gangland murder. Id. See also The Rule of Terror, Boston Globe, Feb. 1, 1968, at 14 ("[t]he underworld struck at the very core of ordered society Tuesday when it nearly killed . . . counsel for gangland informer"). (9) The Commonwealth points to no other convictions, nor even an indictment, in circumstances such as these. (10) The court is correct that the Massachusetts statute is more restrictive than some other States, but not for the reasons it suggests. Ante at . In Commonwealth v. Jackson, 370 Mass. 502, 506 & n.6 (1976), we distinguished our statute from those in other States that permit so-called "one-party consent." Our Legislature did reject the use of one-party consent surveillance (see note 6, supra), but the Legislature made abundantly clear that its intent was to curtail "surveillance" in order to protect the privacy of citizens. See Commonwealth v. Jackson, supra at 505. (11) In one other case, also referred to by the court, ante at n.10, People v. Beardsley, 115 Ill. 2d 47 (1986), the defendant was convicted of eavesdropping when he recorded the conversation of two police officers sitting in the front seat of a police squad car, while he was in the back. The Supreme Court of Illinois reversed the conviction, noting that the police officers knew he had a tape recorder with him, which he had been openly using only minutes before. Id. at 55. The Legislature of Illinois had amended its wiretapping statute to prohibit the recording of any conversation unless all parties consented, as the Massachusetts statute requires. Although the police in that case had not consented to the recording, the Illinois court held that the amendment "does not alter the basic concept of the conduct at which the statute is aimed . . . a surreptitious interception of a private conversation . . . listening in secret to what is said in private." Id. at 58. As the court notes, ante at n.10, eight years later, the Illinois Legislature amended its wiretapping statute to prohibit the secret recording of conversations "regardless of whether one or more of the parties intended their communication to be of a private nature." 720 Ill. Comp. Stat. ß 5/14-1(d) (West 1996). See In re Marriage of Deborah Almquist, 299 Ill. App. 3d 732, 736 (1998) (Illinois General Assembly added definition of "conversation" to the eavesdropping statute by Pub. Act 88-677, effective December 15, 1994). The Massachusetts wiretapping statute contains no such provision. (12) The court also attempts to distinguish Commonwealth v. Henlen, 522 Pa. 514, 517 (1989). Ante at n.6. In that case a prison guard suspected of theft recorded his interrogation by police. The court held that the parties did not have a protected privacy interest, and there was no violation of the Pennsylvania statute. Id. That case is akin to Commonwealth v. Gordon, 422 Mass. 816, 833 (1996), in which we also held that the secret videotaping of the defendants' booking at the police station was not a violation of the wiretapping statute, because the Legislature did not "appear to have had in mind the recording of . . . booking steps following an individual's arrest." (13) Contrary to the court's suggestion, ante at n.7, Commonwealth v. Voight, 28 Mass. App. Ct. 769, 771-773 (1990), did not establish that police officers, acting in their official capacity, are "persons" entitled to statutory protection. The court in Voight correctly expressed that public officials acting in their official capacity are not generally considered "persons" unless expressly designated. Id. at 771, citing G. L. c. 4, ß 7 Twenty-third. (14) The court's suggestion, ante at , that undercover police officers engage in the type of conduct to which Michael Hyde was subjected lacks any support. Undercover officers inhabit a unique position in the world of law enforcement, and daily face perilous situations while concealing their identity as police officers. Because of the covert and hazardous nature of their important work, such conduct can hardly be contemplated because it would place them in even greater jeopardy than they already are. (15) Boston Police Commissioner Paul F. Evans has said that holding officers under his command to the highest ethical standards is a priority: "The integrity of the department is the most important concern I have [and] when the department's trust and integrity is questioned I am going to respond." See An Outside Review for Hub Police, Boston Globe, Sept. 17, 1997, at A1. (16) The scope of the court's ruling encompasses any citizen stopped by the police, not just those who may have violated some law. No traffic citation was issued to Michael Hyde, and he was not charged with any crime. -- ----------------------------------------------------------------------------------------------------- "...any sufficiently advanced technology is indistinguishable from magic." - Arthur C. Clarke ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ----------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ----------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 3358 From: Date: Sun Jul 15, 2001 0:28pm Subject: Wireless networks lure hackers Wireless networks lure hackersReport from the Black Hat BriefingsBy Robert Lemos ZDNET LAS VEGAS, July 12 ≠ A new way to attack wireless networks underscores the lack of security for PC owners using the airwaves to connect their computers, said security experts speaking at the Black Hat Briefings conference. ON THURSDAY, Tim Newsham, a researcher for security firm @Stake, presented the details of weaknesses in the password system of wireless networks that could lead to a break in security in less than 30 seconds. The flaw is the third to be uncovered in the so-called Wired Equivalent Privacy, or WEP, protocol that supposedly secures wireless networks. "WEP is inherently insecure," said Newsham. "So using WEP is essentially just throwing another barrier≠and a small one≠in front of the attacker." That barrier can be overcome in 5 to 30 seconds in certain cases, he said. Hacks, Attacks & Scams ï Sans.org Web site hackedï Reporters victimized by credit card scamï Honeynet Project sweetens hacker baitï Security showdown in Vegasï Report: Online banks compromisedï Gates' credit card hacker sentencedï Hackers pounce on Web site flaw Specifically, wireless systems that rely on a 64-bit key≠used in many homes and earlier hardware≠can be broken in less than a minute, letting the attacker see the data beamed across the networks. Newer 128-bit wireless LAN (local area network) cards are fairly strong. But poorly chosen passwords can still be cracked with an old technique known as a dictionary attack: Using a list of common passwords and a dictionary of words, the potential intruder can try various combinations until the password is broken. "Either it works or it doesn't," Newsham said. "If it doesn't, you can try one of the other attacks." Earlier at the Black Hat conference, Ian Goldberg, chief scientist for private network seller Zero Knowledge Systems, presented details on a variety of techniques for cracking the encryption of wireless networks. "The point of a cryptographics protocol is to be able to communicate securely over an insecure medium," he said. Using Goldberg's techniques, which he developed while earning a doctorate at the University of California at Berkeley, data on wireless networks can be modified, added or, in some cases, decrypted. In the end, people need to understand that wireless networks are completely insecure. For the security conscious, "virtual private network" technology such as Secure Shell, known as SSH, or other encryption techniques should be used, he said. "People need to treat wireless networks just as they do the Internet," Goldberg said. "That means using encryption technology to secure their data." HAVE A GREAT DAY !!! ---------- http://www.msnbc.com/news/599573.asp [Non-text portions of this message have been removed] 3359 From: Date: Sun Jul 15, 2001 0:36pm Subject: Security showdown in Vegas Security showdown in VegasBlack Hat Briefings, Def Con set to beginBy Robert Lemos ZDNET July 11 ≠ Las Vegas plays host to two separate security conferences this week≠one for people who guard computer systems, another for those who break into them. SYSTEM ADMINISTRATORS and hackers, CIOs and script kiddies will all gather in the desert to trade information, swap stories and take each other's measure. At the Black Hat Briefings security conference Wednesday and Thursday at Caesar's Palace, security experts will teach network administrators and information-technology managers how to protect their critical systems. Yet starting Friday, hackers become ascendant at Def Con, with many from the underground culture coming out into the hot Las Vegas sun to trade code, learn new tricks, and, in some cases, finally meet in real life. Hacks, Attacks & Scams ï Sans.org Web site hackedï Reporters victimized by credit card scamï Honeynet Project sweetens hacker baitï Wireless networks lure hackersï Report: Online banks compromisedï Gates' credit card hacker sentencedï Hackers pounce on Web site flaw "They are very different conferences," said Scott Culp, security-program manager for Microsoft, who plans to attend Black Hat but not Def Con. "Def Con is very focused on attacking systems, while Black Hat is focused on defending them." Microsoft tests the wind yearly at Black Hat to see what security threats system administrators are most worried about, Culp said. Last year, the major worries were the virulent spread of worms through e-mail and the high cost of properly managing security. (MSNBC is a Microsoft-NBC joint venture.) In response to hearing such worries at Black Hat and other conferences, Microsoft focused more heavily on getting the bugs out of its own programs, announcing its "war on hostile code" in April. Don't expect any panacea for the high-tech world's security woes, however. "If you're looking for a killer technology that has radically altered the security landscape in the past year, it's not there," Culp said. "Security is about banging out incremental improvement every day." The flip side of the security coin shows up at Def Con. While the past few years of media frenzy surrounding hackers has caused the crowds to swell at the conference, actual hackers still do show up, said Jay Beale, security team director for Linux-software maker MandrakeSoft. "Def Con just mirrors the population of hackers in general," he said. "The bulk are just script kiddies, but there is some small portion that really know what they are doing." With its "capture the flag" contest, where teams of attackers try to crack a handful of servers set up for the tourney, Def Con is a big game for some. Others barely attend the conference, meeting in rooms behind closed doors to swap information and finally chat in real life. But while there are two distinct conferences, the attendees have a lot in common. Some system administrators come early to Black Hat to attend seminars including "Ultimate Hacking!" a two-day course that teaches them to hack their own systems, the idea being that knowing your own weaknesses is the best defense. Others officially attend Black Hat on behalf of their company then stay on to meet the other side at Def Con. In the end, the worst thing about the conferences may be that security and hacking have become too popular, Beale said. "The only complaint I have is that there are too many people who know about it at this point," he said. HAVE A GREAT DAY !!! ---------- http://www.msnbc.com/news/599063.asp [Non-text portions of this message have been removed] 3360 From: Steve Whitehead Date: Sat Jul 14, 2001 4:56pm Subject: Industrial Espionage at SA Reserve Bank "INDUSTRIAL ESPIONAGE & THE RESERVE BANK BUGS IN THE BANK By Stuart Theobald Reserve Bank Governor calls in the cops The Reserve Bank has been a victim of industrial espionage. Governor Tito Mboweni called in SA's top spy-busters after an important Bank directive was leaked to a London financial institution during the Y2K scare. Tito Mboweni "Bugs were found," says Mboweni cryptically of what happened after he called in the National Intelligence Agency (NIA) to investigate the leak. The bugs and the leak might not have been connected. But even so, the fact remains that industrial espionage, a growing scourge of executive boardrooms and offices around the world, has penetrated the hallowed heights of SA's most august financial institution, whose decisions can move millions, or even billions, of rand. Industrial espionage is a hi-tech, high-stakes game. The modern industrial spy uses sophisticated eavesdropping kit - from devices that can pick up conversations by reflecting laser beams off boardroom windows or bugs that look like credit cards to computer viruses that monitor every keystroke on your PC and, of course, cell-phone monitors. Most of this underground "war" stays that way - companies do not advertise that they have been raided by corporate spies. When it involves central banks, though, the implications can have graver consequences because their decisions can move markets. Knowing those decisions before anyone else can be a recipe for fortune. The Reserve Bank leak was uncovered, Mboweni says, when an unidentified London banker called an SA repo-rate change hours before it was released to the market. The Bank says the leak involved a system adjustment rather than any actual repo-rate decision. But the system adjustment would have given the banker a clear indication of the repo rate over the Y2K period in early 2000, as the Bank fixed the rate to give certainty to the market. Investigators found a number of listening devices, and it is not clear that other sittings of the monetary policy committee were immune. It met nine times in 2000, twice making repo-rate adjustments; a quarter percentage point cut in January and an equivalent increase in October. Prior knowledge of those adjustments would have allowed the banker to deal in the money market knowing that interest rates were about to change. Even knowledge of the fixing of the rate would have given a trader confidence to take a calculated position for good gain. (Though a Bank official says the leak did not noticably effect the rand.) Having such an exclusive advantage is akin to trading on insider information, and can threaten the integrity of the Reserve Bank in the eyes of market players. A banker can take a market position, usually on the currency markets, based on that knowledge and wait for the market to react when the decision is announced. Standard Bank treasury economist Margie Purcell says the trick is to predict an exchange rate movement that will normally follow a decision. The surprise cut last month in the repo rate, for example, saw the rand strengthen 4c against the US dollar in the hours following the announcement. A trader with foreknowledge of the cut could have borrowed dollars to buy rand, and then sold them a day later to repay the dollars, pocketing the difference. If such leaks became frequent, the market in rand trading would be prejudiced by insider trading, meaning banks could never be certain that they had access to the same information as another market participant. They would rather opt for more reliable currencies. The Reserve Bank leak could only have come from inside the locked room at the Pretoria head office. That is where, most months, discussions are held over two days by the Reserve Bank's monetary policy committee (MPC). The committee comprises four voting members and 11 policy officials and economic researchers, who would have been involved in discussions over the system change that was leaked. The two-day meeting would have begun with a brief plenary of opinion-canvassing. Nowadays the crucial decisions take place only in the last hour of the meeting. But last year, a system or rate adjustment may have emerged from the plenary, allowing someone 36 hours to pass on the information before its official announcement. Mboweni took it upon himself to track down the leak. First, he approached each of his staff and urged them to come clean about any information given to the market. When no-one responded, he called in the NIA. Though independent of government, the Bank can call on government resources in the interests of national security. Having sifted through e-mails and other correspondence of the members of the MPC, the agency swept for bugs in the committee room on the 30th floor of the Reserve Bank building where the MPC meetings take place. Sure enough, it picked up electronic interference. Further investigation pointed to a transmission dish, situated on top of a building a block away from the bank. It was facing the 30th floor. Before the NIA could get to the dish, though, it mysteriously disappeared. When the building's owners were questioned, they said the dish belonged to Vodacom. But the trail has run cold. Vodacom knows nothing about the dish - it does not use dishes in its distribution network at all. The leaks came to an end after the investigation last year, says Bank security chief Aboobaker Ismail. He says no specific individuals were implicated in the bugging. "Once we started the investigation, people were alerted and they pulled back," he says. That security breach is water under the bridge, says Ismail. Constant vigilance has lessened the risks. "Like all institutions and businesses, we carry out regular checks." He would not elaborate. It would not be the first time a central bank has been compromised by a leak. The US Federal Reserve, the world's most influential central bank, traced a leak to a member of its staff after a monetary policy setting committee meeting in 1996. The leak proved misleading - it predicted a drop in the discount rate, which actually remained steady. The Fed has not disclosed the outcome of its investigation . Rumours have also circulated of leaks at the European Central Bank. The ECB says t these are just rumours. To bug the Reserve Bank would require special expertise, as the Bank's security is quite sophisticated. "Someone inside must have helped them," says private security consultant Howard Griffiths. In SA, corporate spies are quite sophisticated, he says. "No matter what you think of the politics, the apartheid years developed some of the best espionage experts in the world. Many of them are now for hire in the private sector." With many experienced intelligence operatives having left the public service and with successive budget cuts of the post-apartheid era, the once-ruthless State spying machine is now considered behind the game. Private-sector agencies may be better equipped to protect the Reserve Bank than government agencies. Mboweni says the Bank has found bugs in meeting rooms on several occasions. The MPC room, especially, is swept for electronic devices before the six-weekly meetings. Detection relies on picking up a radio transmission of some kind. But Griffiths says the cutting-edge technology is practically undetectable, because radio transmissions are limited to 10-second bursts of packaged sound every few hours. To detect it, one would have to be sweeping as it was making a transmission. Bugging technology is openly available. Outlets such as The Spy Shop in Bruma, Johannesburg, offer a range of bugs, miniature video cameras and even sweeper kits to fulfil the fondest dreams of amateur James Bonds. The Internet offers more. For all of the hi-tech toys, though, the biggest threat remains the human factor. "One of the methodologies of espionage is to recruit people inside the target - everyone has a price," says Griffiths. Ismail agrees: "Analyses we've done on bank heists suggest that the information came from within the systems." As a result, companies increasingly are spying on their staff. Software can now monitor e-mails for "suspicious" communication. Managers often bug the phones of their own subordinates when they suspect information leaks. To catch a spy, it seems you have to become one" Story at http://www.fm.co.za/01/0713/cover/coverstory.htm Steve Whitehead Managing Member E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa TSCM Services URL : http://www.tscm.co.za [Non-text portions of this message have been removed] 3361 From: zack <10-33@c...> Date: Sat Jul 14, 2001 8:55pm Subject: Poor boy And here is the newest scam.......... <<>>> visit http://www.copscops.com Join the Law Enforcement community http://anexa.com/lawenforcement/index.Ihtml Washington DC Police Department http://www.mpdc.org The data contained herein is confidential. Unauthorized dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. From: David Alexander Date: Fri Jul 9, 2004 1:31am Subject: RE: Re: Advanced Explosives Detection As an adjunct to the comments here about people being stopped at airport security, my eldest daughter is a type 1 diabetic and has to carry her insulin with her in hand luggage (especially on a long flight) - which means a needle. The right paperwork will get you through airport security but it does get tiring after a while.... regards David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: Shawn Hughes (Road) [mailto:srh@e...] Sent: 09 July 2004 08:46 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Advanced Explosives Detection Trace Detection systems are possibly least vulnerable in this >respect but I'd like to know how an angina sufferer carrying a Glyceryl >Trinitrate pump spray gets on getting past one. Every day, people like this do get stopped. And, people with radioactive tracers as a part of radiotherapy. People are starting to carry their medical orders, which isn't foolproof and susceptible to misuse, but as technology advances, we must play catchup. Jerry, this is a hugely - expanding science. You make some good observations. remember that a large number of bomb builders get taken out by their own devices, and most bombs are simplistic in nature. Sincerely, -Shawn ============================= Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... //////////////////////////////////////////////////////////////////////////// /// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response, Incorporated //////////////////////////////////////////////////////////////////////////// // 9047 From: James M. Atkinson Date: Fri Jul 9, 2004 8:56am Subject: Re: Re: reply to Tom's post (NLJD) Shawn, The information is very appropriate for the list, and as the list moderator I would like invite you to continue your discussion via the list. Any discussion of NLJD's is appropriate for the list, as is the discussion of any other sweep or countermeasures gear , to include TSCM equipment being used for this other than TSCM.. -jma >[snip] >Since this topic might be perceived to be straying from the mission >statement, I'll happily take this offline if need be. > > >Very respectfully, > >Shawn Hughes ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9048 From: James M. Atkinson Date: Fri Jul 9, 2004 10:09am Subject: Thank you Mr. Ashcroft Why is the U.S. Government being so huffy, so far it sounds like the American Citizens running the fake prison were doing everything by the book? Hey, beatings, abuse, illegal detention, fake prisons... everything the world has come to know and love about America. Perhaps they had a private contract with CAIC or Titan? ...or maybe the CIA is just upset that they didn't take digital pictures of the beatings and abuse and post them on the Internet like our troops did. Lady Liberty has a black eye, thank you Mr. Ashcroft. -jma >http://www.cnn.com/2004/WORLD/asiapcf/07/09/afghan.prison/index.html > >Americans held over 'fake prison' >Friday, July 9, 2004 Posted: 6:16 AM EDT (1016 GMT) > > >KABUL, Afghanistan (CNN) -- Afghan authorities have arrested three >American citizens accused of running a fake prison in Kabul, U.S. State >Department and Afghan officials say. > >Afghan government officials raided a rented house in the capital late >Sunday where the three Americans lived. They found a private prison inside >the building that contained eight prisoners, a Ministry of Interior >official said Friday. > >The raid came after Afghan citizens reported their family members missing >over the past several months. > >At a news briefing Thursday, State Dept. spokesman Richard Boucher >identified all three as American citizens, noting "the U.S. government >does not employ or sponsor these men." > >He identified two of the men as Jonathan Idema and Brent Bennett, but >could not release the name of the third because he had not signed a >Privacy Act waiver. > >Idema and his colleagues told Afghan authorities they were operating the >prison because they wanted "to take part in the war on terror," the Afghan >official said. > >The Americans did not torture their prisoners, but did administer "some >beatings," the official added. > >The three men are being interrogated by Afghanistan's intelligence agency. >They are not being held in prison but in a residential area. > >The eight prisoners are also being debriefed by the agency, and the >government is trying to find several Afghans who were allegedly helping >the Americans, the official said. > >The arrests came as the U.S. military investigated allegations of detainee >abuse in Afghanistan at the hands of American jailers. > >That investigation was prompted by outrage after photographs of abuse at >Baghdad's Abu Ghraib prison captured international media attention. > >Boucher said officials from U.S. consular offices in Kabul visited the >Americans on Tuesday and Thursday. > >When asked if they were being treated fairly, he responded "we're >monitoring their welfare." > >Idema and his colleagues rented the house near Kabul's Intercontinental >Hotel, and told neighbors that they were operating an export company that >traded Afghan rugs, the Afghan official said. > >The Americans were mainly detaining men with long beards on the outskirts >of Kabul who they suspected -- based on their appearance -- to be members >of al Qaeda, the interior ministry official said. > >Idema and his two colleagues would then interrogate the prisoners in an >attempt to get them to confess they were members of the terrorist network, >the official said. > >If charged, the official said it was unlikely that Idema would be tried in >the Afghan judicial system, but would be handed over to U.S. custody at >some point. > >The official said the story would "definitely have a negative impact on >the image of Americans" among Afghans. > >CNN Terrorism Analyst Peter Bergen in Kabul contributed to this report. > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9049 From: David Alexander Date: Fri Jul 9, 2004 10:23am Subject: RE: Thank you Mr. Ashcroft >The Americans did not torture their prisoners, but did administer "some beatings," You'll be telling me they used the comfy chair and the fluffy cushions next (apologies to Monty Python fans everywhere) If it was April 1st I'd say this was a classic of the genre - Thanks Jim, for sharing that with us. David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: 09 July 2004 16:10 To: TSCM-L Subject: [TSCM-L] Thank you Mr. Ashcroft Why is the U.S. Government being so huffy, so far it sounds like the American Citizens running the fake prison were doing everything by the book? Hey, beatings, abuse, illegal detention, fake prisons... everything the world has come to know and love about America. Perhaps they had a private contract with CAIC or Titan? ...or maybe the CIA is just upset that they didn't take digital pictures of the beatings and abuse and post them on the Internet like our troops did. Lady Liberty has a black eye, thank you Mr. Ashcroft. -jma >http://www.cnn.com/2004/WORLD/asiapcf/07/09/afghan.prison/index.html > >Americans held over 'fake prison' >Friday, July 9, 2004 Posted: 6:16 AM EDT (1016 GMT) > > >KABUL, Afghanistan (CNN) -- Afghan authorities have arrested three >American citizens accused of running a fake prison in Kabul, U.S. State >Department and Afghan officials say. > >Afghan government officials raided a rented house in the capital late >Sunday where the three Americans lived. They found a private prison inside >the building that contained eight prisoners, a Ministry of Interior >official said Friday. > >The raid came after Afghan citizens reported their family members missing >over the past several months. > >At a news briefing Thursday, State Dept. spokesman Richard Boucher >identified all three as American citizens, noting "the U.S. government >does not employ or sponsor these men." > >He identified two of the men as Jonathan Idema and Brent Bennett, but >could not release the name of the third because he had not signed a >Privacy Act waiver. > >Idema and his colleagues told Afghan authorities they were operating the >prison because they wanted "to take part in the war on terror," the Afghan >official said. > >The Americans did not torture their prisoners, but did administer "some >beatings," the official added. > >The three men are being interrogated by Afghanistan's intelligence agency. >They are not being held in prison but in a residential area. > >The eight prisoners are also being debriefed by the agency, and the >government is trying to find several Afghans who were allegedly helping >the Americans, the official said. > >The arrests came as the U.S. military investigated allegations of detainee >abuse in Afghanistan at the hands of American jailers. > >That investigation was prompted by outrage after photographs of abuse at >Baghdad's Abu Ghraib prison captured international media attention. > >Boucher said officials from U.S. consular offices in Kabul visited the >Americans on Tuesday and Thursday. > >When asked if they were being treated fairly, he responded "we're >monitoring their welfare." > >Idema and his colleagues rented the house near Kabul's Intercontinental >Hotel, and told neighbors that they were operating an export company that >traded Afghan rugs, the Afghan official said. > >The Americans were mainly detaining men with long beards on the outskirts >of Kabul who they suspected -- based on their appearance -- to be members >of al Qaeda, the interior ministry official said. > >Idema and his two colleagues would then interrogate the prisoners in an >attempt to get them to confess they were members of the terrorist network, >the official said. > >If charged, the official said it was unlikely that Idema would be tried in >the Afghan judicial system, but would be handed over to U.S. custody at >some point. > >The official said the story would "definitely have a negative impact on >the image of Americans" among Afghans. > >CNN Terrorism Analyst Peter Bergen in Kabul contributed to this report. > ---------------------------------------------------------------------------- ------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9050 From: Date: Fri Jul 9, 2004 10:24am Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: Do you have a Ham Radio/Amatuer Radio Liscense? o Yes o No To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1300838 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 9051 From: James M. Atkinson Date: Fri Jul 9, 2004 10:55am Subject: TSCM'er Gone Bad I took of one Steve Wilson's (the Busted Drug Dealer who does TSCM) brochures and ran it through OCR to obtain the following text. Due to the poor quality of the original document the OCR has a few errors in it. I have also attached a (virus free) copy of the original document to this message as a PDF file as well. I have other similar document where Steve Wilson states that he is a close associate of John McCann, and others. -jma BIOGRAPHY Stephen J. Wilson CEO & Founder, Technical Intelligence Group, Incorpornted Mr. Wilson began his career as a Research Scientist in Coastal Geology at the University of South Carolina. His duties included field research of beach erosion, teaching PhD courses in field collection techniques, sedimentation analysis, and wave forecasting via Fourier Analysis. During this period he also held a part-time consulting position with the State of South Carolina's Depzrtment of Environmental Control, serving as their staff mathematician. Mr. Wilson was a Bell W. Baroque Scholar, graduating with a BS degree (Magna Cum Laude) in Physical Oceanography with a rninor in mathematics. Following his educational and scientific endeavors, Mr. Wilson worked as an Account Manager in the Large Systems Division of Burrough's Computer Corporation. During his tenure he was nmcd to the Chairman's Honor Roll for sales in excess of 440% of quota. As Technical Support Manager with Southern Bell Mr. Wilson was responsible for cornpuler szles and Data Communications Network Design. He chaired the staff that redesigned the National Crime Information Center's Network (NCIC), used by law enl'orcemcnt nationwide to check criminal histories, license plates, etc. This project resulted in an optimized NCIC network, reducing average access time by 44% and established redundant network access points within each state, providing increaszd probability of access in situations crucial to officer's safety. Mr. Wilson chaired a five-person executive certification committee within .4T&T Headquarters that created the certification criteria doctrine for the progression of .4T&T's technical management staff through t!uee levels of management. 'l'his doctrine was empIoyed to manage over 65,000 management employees. Mr. Wilson's last AT&T assignment was as a National Director at AT&T1s World Headcprters, where he was responsible for the education and colxse development for Techical and Secure Products for U.S. hfaaagen:ent Personnel. He was also responsible for the development of PBX design, ETN's Electronic Tandem Networks (systcms tl:ut link PBX's via Integrated Voice and Data networks), and Secure Products Design (Tempest). During his tenure with AT&T Mr. Wilson was recognized as t!~e developer of the first computer-aut~:nnted voice answering systems. In 1982 Mr. Wilson founded Confidential Custom Security. This company iiico~poril~ed ill 1994 as the Technical Intelligence Group, better kno;vn as TIG. Since 1992 Mr. Wilson ha!; been invo!ved in teaching TSCM Technical Surveillance Countermeasures (electronic "bug" and wiretap delection) a: three internationally attended civilian TSCM Schools. He served as the consultant to North Carolina's Department of Justice, responsible for reviewing all US civilian TSCM schools for proficiency to meet North c&olinals "CI" (Counterinte!ligence Agent) Licensing standards. In 1995 MI, Wilson began integrating Vulnerability Threat Analysis iato his hish threat level TSCM operations. He also began to develop a network of key top-level associates, and he now has formed an elite association of security experts covering every venue of intomlation and asset protcction security. Today TIG offers a unique and comprehensive Trede Secret Protection Program (TSPP Program) to both corporate and government clients, encotnpassing both infonnztion and asset protection. Mr. Wilson currently selves TIG as CEO, with responsibility for corporate direclion and sirategic partcring. BIOGRAPHY JAMES K. COWAN . . Director of Engineering, Technical Intelligerzce Group, Inc. James Cowan is a management professional and engineering specialist with over thirty-five years of progressive and diversified US. government (DOD, National Security Agency) experience. Jim has a proven leadership record in directing annual multi-million dollar engineering research and development organization programs. In recognition of outstanding contribution to his Agency's productivity efforts, Jim received the Director of NSA's Productivity Improvement Award in 1996. In 1995, Jim's engineering team was the recipient of The National Foreign Intelligence Community award for superior accomplishments and significant benefit to the Intelligence Community, presented by the Director of Central Intelligence. Prior to retiring from NSA in 1997, Jim was Special Assistant to the Chief, Special Access Programs. He provided direct support between R&D and Operation work centers where he advised senior management on technology trends. Jim served as the office representative to the newly formed Information Operations Technology Center (IOTC) at NSA, where he provided technical liaison and coordination for technologies of mutual interest. Jim was the team leader for a SIGINT Engineering Group study for the improvement of process management across R&D organizations. He conducted interviews across the organization, analyzed data, prepared Power Point briefings and published a detailed final report. As a management work center chief, Jim directed diversified technologies in research, system design and development, opti'cal systems and microelectronics. These technologies supported SIGINT collection, counterintelligence (CI), counter terrorism (CT), and technical security counter measures (TSCM) programs. He supervised a diverse group of professionals that included electrical engineers, mechanical engineers, computer scientists, physicists, engineering technicians and signals analysts. He managed a team whose program initiatives resulted in first-year tangible savings of over $100K in productivity improvement. Jim was instrumental in the introduction of two new X&D technology ventures that were subsequently employed in special purpose collection systems. As an engineering specialist, Jim performed hands-on engineering, in-house design, development, testing, evaluation, production and fielding of complex electronic equipment and systems. He performed RFI/EMI testing and analysis of electronic receiving systems and components. In support of special operations, he performed signals analysis, identification and classification of electro- - - maketic emissions.. He routinely coordinated and delivered technical exchanges with representatives of FBI and CIA. Jim has extensive hands-on knowledge and experience with RF antennas, transmission lines, RF amplifiers, filters, receiving systems, demodulators, recorders, oscilloscopes, and spectrum analyzers. He conducted TSCM operations at overseas facilities that supported the Department of State. Jim served as the R&D representative to an interagency subgroup, Technical Security Working Group (TSWG) on terrorism. Jim supported SIGINT engineering while he served three consecutive overseas field assignments that spanned seven years. In addition to his support of TSCM services and training offered by the Technical Intelligence Group (TIG), he owns and manages a local bed and breakfast. In support of the local community, he teaches e-mail and Internet classes for older adults at a local community college. TSSI Security Clearance, NSAICSS BIOGRAPHY Buck has over twenty-eight years expe:.iencc in leadership and ~nanayncnl ipositiims i ~ i \ : c l ~ . i ! l ~ owl- tcn years of federally certified experience in countci-intelligence including twenty-live ycnrs crpericnce in security management encompassing all facets ofsccurity. D w i ~ ~ g his career he hi~s IWXI r~.spn~lsil~l~ I ~ I - the security of some of our nation's most sensitive installations and pl-o~rams. Iblc \\,orkcti lclr live !cars with Marietta Energy Systems, serving as their Infomiation Security Manager, developing and assess in^ company policy regarding the protection of scnsiiive and clnssitied infol-mation involvin: research and development and nuclear weapon pl-oduction. Me also worked for five years as an intlepentimr sccurit!; and operations consultant. After graduating from The Citadel as a Distinguished Military C;raduate with a majot- in Chemistry ; I I I ~ n minor in Physics, Buck entered active duty as a regular officer in the United States AI-my 1-lc ser\:ecl Cotover 20 years in security and counterintelligence assignments and completed military service as a Lieutenant Colonel with numerous decorations and awards. He was assigned as the Security Directol- for the second largest chemical weapons storage depot in ilic United States and developed and managed all secilrity and counterintelligence programs. Hasec! on liis hands-on experience and success, he was appointed to serve as a technical secul-it)) advisor for the Department of Anny during Congressional Hearings on the status ~Csecul-it:,~ atid safc~y oloiir chei~liciil weapons resulting in the allocation o~millions of dollars for worldwide improvemen~s. While serving as the Ser,urity Manager ljr the United States Militaly Aca3emy he ticvclq~ed aid coordinated the operation plan for "Operation Eagle", the relum or the Unilctl States hostages fi-vni Iran. He actively managed all counterintelligence operations to include ouersi~ll( of icciinical ~W?.II-!~Y countemieasures (TSCM) for national lcvel scientific conferences, the Army Science C':~nI;.r~)~ic.c and !lie Tri-Radar Syniposium, involving numerous major Depal-tmenl of Defense conlractors As tlie Director of Security for the largest land-based test and evaluation [range in the United Stales lie. worked intimately with the majority of the largcst research and development conhactors in t!ie countr:/. Projects under his security supervision iccluded industrial security programs and intelligence countelmeasures for the Multiple Launch Rocket System (MLRS), the Pershing I1 !viissiic, and the Improved Hawk, Copperhead, and Patriot missile systems, the Stealth Fighter Program [or the United States Air Force, and the first High Energy Laser Test Facility for the Department of Dsfense (.S!r:r Wan). Buck culminated his career by leading the developmeni of future organizational designs fol. key security organizations protecting govel-~iment facilities and installations Lhro~!gl~out tile worid, including those For chemical and nixlear weapons and tlie present day Criminal Investigation Divisiou (CID) for tlie U.S. Anny. In addition to conceiving :he Trade Secret Protection Program 0 that TIG is currently ~i'fwing, Buck also consults to private corporations, government contractors and law enforcement. He !la5 pel-sonal!y developed several technical contract proposals for Pinkerton Government Services regarding multimillion-dollar government solicitations for security support to the GSA, the Dellartment ol'Justice, the US Marshals Service and the Department of Energy. Clearances held: Top Secret Clearance - DOD (20 years), Q Level Clearance - DOE (9 years) February 2000 - Positioning Report Technical Intelligence Group, Incorporated ................................................ Foreword The Technical Intelligence Group continues to improve with respect to our positioning with Trade Secret Protection P r o m (TSPP) and Critical hhtrucrure clients. Our base of interested cornorate and zovemment supporting pa&ea &tinu& to grow. TIC ~untinues to be the only company offering comprehensive solutions.&at are immediatelv utilizable for the ~rotection of Trade Secrets and Critical Inhtnmurcs. TIG is also minina wide reoognition-within the U.S. ~overnment and Critical 1nfi.astructure Companies as the innovative leader-first &offer snlutions to their needs. To Wit: ..................... - ...... . CIAO - Critical infrastructure Assurance Oftice TIC is a Charter Member of the Partnenhi~ for Critical Infrastructure Sccuriw. mrsonallv invited to oarticbate bv the Senior Director for Critical htiastructure; National Security Council, The G i t e ~ousk. ~overnient alone c k o t address this complex issue; government must hare the support of individual corporations. These issues can affea a corporation's very existence, and cumulatively they directly affen the National Seuuity of the United States. This Partnership met in Washington. DC for a "retreat", destined to shape the future course of anion regarding Critical lnfrastruaurc Securiw within the United States. Membershiv was divided into five workinaerouvs. each chartered to -- . . improving an area 02 Critical Inhtructure. A common need emerged h m every working group - the need for Executive Awareness, which was deemed crucial to the Partnership's success. TlG was &d to chair the Execuh've Outreach Committee for the CL40 ..................................................... ....................... ESWC - Economic Security Working Croup- National Chamber of Commerce TIG is also a charter member of this mup. ?he ESWG is chartered with enhancing the pmte~lion of American Corporations Tradc Secrets. The mn&ic impact from thc loss of Trade Secrets to ~ k e r i & corporations is huge; estimates range from tens to hundreds of billions annually and increase every year. Thc Director ofthe FBI stated that the loss of America's Trade Secrets affects the National Security of the United States. TIG is actively working with the Chamber and is discussine hwtine the next ESWG in an effort to reach "at risk" mmnanies and CEO's. We will present how successll ~ & l e S&t Protection Programs should be struchlred. The cbaher's Ambassador has also offered to position 'TIG with Senator BennetL the ~ e ~ a m n e n t of State, and to assist in developing a marketing plan. TIC will be co-conductinn a joint consultine cam~aim to 'Yt Risk" CEO's. TIC will also join the Chamber's Cipija[ ill Commz~tee topr&t these problems to congress. ........................................................................... FBI - TIG CEO Awareness Seminars TIG has been asked to assist the FBI to inerease the awareness of East Coast high-tech firms that their companies are at high risk of being targeted by foreign intelligence agencies. Foreign intelligence agencies are conducting eamomic espionage for their home corporations. Intelligence thus obtained provides their country's corporations a mmpetitive marketing edge, enabling them to successful defeat American companies in today's global markets. CEO's who are not protecting their company's proprietary information are potentially at risk h m negligence lawsuits fiom shareholders, insurance companies, and bankers. A leading intellectual property law firm recently advised clients that ............... "You are only protected by the law to the ex.... that you are protecting yourself' TIG will be conductingjoint educational mvareness seminars in cooperation with the FBIond the Nationol Counteriruel&ence Center to bring increased mareness t i high-tech Company k CEO's. ............................................................................ US - South African Joint Business Council TIG's membership in this council will yield a positive impact international corporations considering investments into South A6ia The council is partiwlarly influential regarding US investments into South Akica: with member companies currently mmprising 73% of all US investments into South Mica TIC now sils in aposition to influence US componies investing into South Africa Our TSPP can benefi South Africa bv creatinz o more stable economic sihration for nlobal investors. - - I................ ............................................................. Technology Policy Committee TIG has amin been invited to attend this National Chamber Committee as an o r i m contributing member. This - - committee's goals are to represent high technology companies and emerging technology company's interests to the congress for legislative action favorable to development within these areas. We will also be addressing these needs within the courts and with the US Governments agencies. As a member of this committee, and because of our level of sustained involvement, the National Chamber has asked TIC to become a member of their Capital Hill Committee. This group visits congress routinely to discuss issues critical to the economic, securily, and business needs of Corporate America. ............................................................................ Technical Intelligence Group, Inc. Direct Line: (540) 628 - 1599 304 East Main Street Fax: (540) 628 - 1598 Abingdon,VA24210 Email:tigsales@tscmplus.com WWW: htt~://www.tscm~lus.com Technical Intelligence Group - Memberships of Principles: Tennessee Professional Investigators Association. NC Private Protective Services Board ASIS - American Society of Industrial Security Association of Former Intelligence Officers SAIG - Security And Investigations Group - Charter Member BECCA - Business Espionage Controls &Countermeasures Association Education of President: ' BS USC IMagna Cum Laudel - - Columbia, SC . - Core Cotuses for Masters Degee in Computer Science - MIT - Boston ' AT&T - 167 weeks of Technical Training in PBX, Data Communications, &Secure Products Design : BTAM, CICS, PBXTraffic Theory, Modems, Sync Terminals, ISDN, Dimension 100,400,2000, System 25,75,85, ETN, Secure Network Design, Tempest Design Technical Surveillance &Countermeasures Courses completed bv ow team: Many Additional Government TSCM related courses - list available to qualified clients * ~ a v e & o ~ ~ i n ~ Countermeasures I & I1 - [JII - Institute] *Electronic Eavesdropping Detection &Prevention I &.I1 - Ross Engineering 'Technical Intelligence Operations - [JII - Institute] Telephone Intercept - 011 - Institute] 'Methods of Enhy - [JII - Institute] 'Covert Video Operations - [Mc Cam International] * TSCM - Technical Surveillance Countermeasures - World Institute for Security Enhancement w e teach TSCM for three internationally attended schools. Several other courses in TSCM, SIGINT and related disciplines have also been developed &taught] Experience: ' TIG's WORK HISTORY INCLUDES FORTUNE 100/500, DOD. DIA, CIA, NSA, MILITARY * TIG's COMBINED TEAM EXPERIENCE IN TSCM SERVICES - EXCEEDS 60 YEARS ' TIG's WLNERABILITY THREAT ASSESSMENT EXPERIENCE - EXCEEDS 50 YEARS WG clients have included:] US &Foreign Governments, Central Intelligence Agency, US Embassies, Presidential Cabinet Members, UN, Fortune 500 Corporations, and select private Celebrities. Recent Special Recognition's: llist includes accolades from multi~le TIG team members1 ' 1995 - ~ I G ~ecognized by Dept. of Navy as one of the Top TSCM ~ o m ~ a n i e s in ~ m z a * 1995 - TIG asked to serve as Exoert TSCM Adviser to US Customs Soecial Investieative Unit " - * 1995 - TSCM Consultant to N C ' D ~ ~ ~ . of Justice to evaluate TSCM sc'hools nationwide * 1996 -PBX Systems Consultant to major TSCM manufacturer on PBX Wiretap Detection '1996 - ASIS Chapter Chairman - Greater Smoky Mountains Chapter * 1997 - ASIS Chapter Chairman - Greater Smoky Mountains Chapter 1997/98 ASIS Chapter Chairman - Upstate NY Chapter 1996fl- Primary TSCM Instructor for a Licensed Nationally Attended TSCM School 1997- TSCM Instructor for three different International Executive Protection Schools * 1998 - Selected by US Commerce Department to tour South America representing the best of American TSCM. Access Control. Industrial Securitv. &Trade Secret Protection. etc ~ - ~ - [Specialized conlracls available; please conrhct TIC or your T ~ M ser~ices~rovider for a &alion] ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- Attachment: (application/pdf) WilsonAssociates v2.0.pdf [not stored] 9052 From: Linda Lilienfeld Date: Thu Jul 8, 2004 5:18pm Subject: Spyfinder Personal I ordered a Spyfinder Personal about a month ago . I was charged for the item on my credit card but did not receive it. I sent them an email requesting a credit to my account. A gentleman by the name of David sent me a very courteous and apologetic email stating that he would credit my account. I have since received an email from paypal telling me that my account will be credited. Just to let you know about this. All you need to do is send David an email requesting a refund. His email address is cctechnology@c... I have asked him to advise me as to when the product will be available. I really believe that the Spyfinder Personal will be the answer to privacy problems that some of us have. As I mentioned before, I live in a townhouse and my neighbors are looking into my house with pinhole cameras. If anyone is interested and wants more details, please write to me. Linda (Corporate Personal Property Assessor) __________________________________ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail 9053 From: Merl Klein Date: Fri Jul 9, 2004 10:57am Subject: Re: New poll for TSCM-L No I Don't Merl ----- Original Message ----- From: TSCM-L@yahoogroups.com To: TSCM-L@yahoogroups.com Sent: Friday, July 09, 2004 8:24 AM Subject: [TSCM-L] New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: Do you have a Ham Radio/Amatuer Radio Liscense? o Yes o No To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1300838 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS 9054 From: William Knowles Date: Fri Jul 9, 2004 2:21pm Subject: Re: Thank you Mr. Ashcroft On Fri, 9 Jul 2004, James M. Atkinson wrote: > Why is the U.S. Government being so huffy, so far it sounds like the > American Citizens running the fake prison were doing everything by the > book? Hey, beatings, abuse, illegal detention, fake prisons... everything > the world has come to know and love about America. Mainly because these guys are running this one privately, and without official assistance of the U.S. Government. They aren't contractors, they aren't even private military contractors, they are mercenaries out for the $25 Million dollar bounty and the glory around bagging the biggest game animal on the planet, Usama bin Laden. Just like the ninja suit wearing TSCM companies with the CCS spy gear, these clowns antics are only going to tarnish the Americans who are in Afghanistan really looking for UBL and his like. Here's a couple more links/stories to fill in the blanks on Johnathan "Jack" Keith Idema. http://news.bbc.co.uk/2/hi/south_asia/3881317.stm http://www.guardian.co.uk/afghanistan/story/0,1284,1257512,00.html http://www.nytimes.com/2004/07/09/international/asia/09para.html A former Special Operations soldier in the United States who spoke on the condition of anonymity said in a telephone interview that former commandos had questioned Mr. Idema's Afghan claims. "I know a lot of people are challenging his statements," he said. The former soldier said there were also complaints that Mr. Idema had exaggerated his military experience. A spokesman for the Special Operations command in Fayetteville, N. C., said he could not immediately release Mr. Idema's military records. Enjoy! William Knowles wk@c... > Perhaps they had a private contract with CAIC or Titan? > > ...or maybe the CIA is just upset that they didn't take digital pictures of > the beatings and abuse and post them on the Internet like our troops did. > > Lady Liberty has a black eye, thank you Mr. Ashcroft. > > -jma > > > > > >http://www.cnn.com/2004/WORLD/asiapcf/07/09/afghan.prison/index.html > > > >Americans held over 'fake prison' > >Friday, July 9, 2004 Posted: 6:16 AM EDT (1016 GMT) > > > > > >KABUL, Afghanistan (CNN) -- Afghan authorities have arrested three > >American citizens accused of running a fake prison in Kabul, U.S. > >State Department and Afghan officials say. > > > >Afghan government officials raided a rented house in the capital > >late Sunday where the three Americans lived. They found a private > >prison inside the building that contained eight prisoners, a > >Ministry of Interior official said Friday. > > > >The raid came after Afghan citizens reported their family members > >missing over the past several months. > > > >At a news briefing Thursday, State Dept. spokesman Richard Boucher > >identified all three as American citizens, noting "the U.S. > >government does not employ or sponsor these men." *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ---------------------------------------------------------------- C4I.org - Computer Security, & Intelligence - http://www.c4i.org ================================================================ Help C4I.org with a donation: http://www.c4i.org/contribute.html *==============================================================* 9055 From: Steven Date: Fri Jul 9, 2004 11:03am Subject: RE: New poll for TSCM-L Yes I do..a general Class Steven G -----Original Message----- From: Merl Klein [mailto:tsi@t...] Sent: Friday, July 09, 2004 11:58 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] New poll for TSCM-L No I Don't Merl ----- Original Message ----- From: TSCM-L@yahoogroups.com To: TSCM-L@yahoogroups.com Sent: Friday, July 09, 2004 8:24 AM Subject: [TSCM-L] New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: Do you have a Ham Radio/Amatuer Radio Liscense? o Yes o No To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1300838 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT click here _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 9056 From: Thomas Jones Date: Fri Jul 9, 2004 0:22pm Subject: Reply to Shawn Hughes comments about NLJD EOD use In response to Shawn Hughes comments: Just to be clear. REI does NOT promote NLJD use for EOD purposes. We have always recognized that our equipment may be used in a particularly risky environment or method (EOD or otherwise). We have, and will continue, to improve safety features on our products and provide sufficient warnings in the event that the user may use them in a dangereous or hostile environment. The development of the remote ORION capability was to raise the level of awareness to potential users about the potential dangers of this use, and all literature associated with this function have addressed these concerns. 9057 From: Don C. Johnson Date: Fri Jul 9, 2004 1:21pm Subject: AVCOM Spectrum Analyzer for sale A colleague is downsizing and advised me he has a like-new AVCOM Spectrum Analyzer with accessories for sale ($7,000). I am not a TSCM specialist; I rely on you guys for that. If you are interested, I will put you in touch for details and further information. __________________________________ Don C. Johnson, CLI, CII, Trace Investigations (Indiana License PD58900651) Editor, PI Magazine (www.pimagazine.com); Editor, The NCISS Report (www.nciss.org) Phone (812) 334-8857, Fax (812) 334-2274, Email dcjcli@i... 9058 From: Shawn Hughes (Road) Date: Sat Jul 10, 2004 2:48pm Subject: Re:privately operated prisons At 01:37 PM 7/10/04 +0000, you wrote: > >He identified two of the men as Jonathan Idema This guy is well - known in some of the ponds I swim in.... and noone with direct knowledge has anything positive to say about him. Best guess from the ones that know him is he was trying to extract intel to collect the bin Laden reward, and had zilch to do with any USG op. -Shawn ============================= Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response, Incorporated ////////////////////////////////////////////////////////////////////////////// To be announced..... ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. 9059 From: Shawn Hughes (Road) Date: Sat Jul 10, 2004 3:20pm Subject: Re: NLJD Sir, Your tool and searching for IED's are at cross points. To find an electronic eavesdropping device, it could be acceptable to flood a suspect unit with RF. Save one scenario, it is *NEVER* appropriate to put added RF into an IED environment as a search tool. That scenario is where a sweeping frequency transmitter is employed to remotely function a hazardous device. I do not know what the db plot of your antenna is, but should be very narrow, short and directional to be effective as a bug search tool. The ECM units I reference will function things for a long distance in a broad pattern. And, that tool is only for use by competent Technicians in specific mission profiles. For the majority of personnel, we ALL teach not to operate ANY RF - producing device within 300' of a suspected device, including 2-way pagers, wi-fi equipped devices, and even keychain alarm remotes. This is because bombs are generally employed to destroy something. Usually personnel, but many times infrastructure. If you don't know where the device (or devices) are, and are using the NLJD to find it, and it's attached to the main computer node for the NSA, that's bad. If it's attached to a gas main in the basement of a 40 story building, that can be catastrophic. Technicians ALWAYS look for a path that precludes High Order detonation of a device (function as intended), because, otherwise what's the point? The Bad Guy pushes the button, or you push the button with your broom..... Back to using NLJD's as an ECM tool, I understand the Israelis used NLJD's years ago, prior to the advent of safer tools for this purpose, but, as I stated earlier, I don't know, and noone in my field I've emailed can support, no competent teams are actively using this tool. This makes me believe that people with limited training and unlimited budgets are getting the idea from you guys that this equipment is acceptable as a non-invasive search tool, which it is not. I once again urge you to take a strong stance against the use of a NLJD as a IED search tool. In fact, if you want my assistance, as soon as I return from where I'm going, I'll be happy to come down with some live IED componentry, and we can, in safe and repeatable conditions, demonstrate how a NLJD can function a bomb, both by overload and component failure, or by masking the control signal. In closing, you can't add any safety features to a broom to make it safe for use as an IED search tool any more than you could make a two-tined fork safe as a wall outlet tester. Respectfully submitted, Shawn At 01:37 PM 7/10/04 +0000, you wrote: >We have, and will continue, >to improve safety features on our products and provide sufficient >warnings in the event that the user may use them in a dangereous or >hostile environment. ============================= Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response, Incorporated ////////////////////////////////////////////////////////////////////////////// To be announced..... ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. 9060 From: Shawn Hughes (Road) Date: Sat Jul 10, 2004 2:55pm Subject: Re: Digest Number 1620 William, sorry. I get the digest and hadn't seen your post yet. You are dead on regarding your evaluation of this guy. People that work in his field said he was a paper-tabbed soldier assigned as support (he was a chute packer), not on an ODA. -Shawn At 01:37 PM 7/10/04 +0000, you wrote: >they are mercenaries >out for the $25 Million dollar bounty and the glory around bagging the >biggest game animal on the planet, Usama bin Laden. 9061 From: Eric Leonard Date: Sat Jul 10, 2004 2:04am Subject: More than giant mouse ears... This was posted to the "A Fly on the Wall" weblog. I can verify it's a reasonable account of what's transpired. -Eric The link to see for yourself: http://aflyonthewall.journalspace.com/ Electronic Bugs Found in Eisner's Disney Office posted 07/07/04 Two electronic bugs were found in Disney honcho Michael Eisner's office on the Burbank studio lot during a routine security sweep over the long July 4 weekend, according to a source inside the Mauschwitz exec building. Upholstered furniture was also removed and replaced in the event further bugs were buried inside. The tiny electronic transmitting devices were found on a credenza behind Eisner's desk and also under a small conference table. Eisner routinely pays for a security sweep by electronics experts every few months out of his own pocket. This is the first time evesdropping bugs are believed to have been found. The devices were analyzed by electronics experts and determined not to be the sort used by law enforcement authorities. After some apparent internal disagreement, Disney officials decided not to alert the Burbank Police Department about the security breach. Disney is notoriously closed-mouthed with Burbank city officials about studio operations, and Burbank police are not allowed on the walled and gated studio lot unescorted. As to who may have planted the bugs, the list of Eisner's enemies is slightly longer than the Manhattan telephone directory. Some of his current high-profile battles include an ongoing showdown with Miramax's Harvey Weinstein and also a bitter feud with a Roy Disney faction for control of the company. Eisner is expected to address the ugly Miramax brouhaha at this week's annual A-list media conference in Sun Valley. In other Disney news, the Board of Directors voted themselves nice fat raises earlier this week, notwithstanding the company's dismal showing this season at the box office and the perennial last-place ratings for the Disney-owned ABC network. 9062 From: savanted1 Date: Sat Jul 10, 2004 10:04am Subject: Patriot Act Wins House Vote The US House of Representatives has voted, 210-210, against a bill that would limit certain surveillance provisions of the USA Patriot Act. The votes had amounted to 220-200 after the fifteen minute limit on roll-call expired, but Republican leaders managed to extend the vote an additional twenty minutes and persuade ten Republicans to change their votes. The Bush administration threatened to veto the law if it passed. The bill sought to block a section of the Patriot Act that required libraries and booksellers to provide federal investigators with records about patrons' purchases and Internet use. Representative Frank Wolf (R-Virginia) read a letter from the Justice Department describing how terrorists used computers at a public library to communicate. Critics of the Patriot Act argue that records from libraries and booksellers could still be obtained for anti-terrorism investigations through subpoenas and court orders. http://www.wired.com/news/politics/0,1283,64144,00.html 9063 From: Date: Sat Jul 10, 2004 7:08am Subject: Ham radio licensing. Looks like a number of folks, who have been granted the status of not having their postings to the group screened for appropriateness, scan rather hastily. (Regarding the number of responses to the group about ham radio licensing instead of hitting the poll's web page.) Paul [Non-text portions of this message have been removed] 9064 From: dp01011 Date: Sat Jul 10, 2004 11:26am Subject: Cell phone camera ... Remote Viewing? Is it likely that someone could remotely access the camera function on the newer cell phones? Perhaps a live feed of the cell cam to a remote location? I just got my first cam phone and Im ready to color the lens with a sharpie... 9065 From: Thomas Shaddack Date: Sat Jul 10, 2004 1:46pm Subject: Re: Cell phone camera ... Remote Viewing? On Sat, 10 Jul 2004, dp01011 wrote: > Is it likely that someone could remotely access the camera function > on the newer cell phones? Perhaps a live feed of the cell cam to a > remote location? I just got my first cam phone and Im ready to > color the lens with a sharpie... It's theoretically both possible and impossible; impossible if we suppose the phone's firmware is bulletproof, corners weren't cut in java sandboxing, and nobody compromised the phone itself, and possible if we won't assume anything of this can not happen. As a camera on the phone can be useful, I suggest rather using just a piece of sticky tape with a small square of aluminum foil over the lens (to avoid the glue getting on the lens). It's easy to apply and easy to remove when you need the cam. Also, a lot of cellphone threats can be detected by watching the power radiated from the antenna, eg. using the "fashion accessories" for the phones, using small LEDs powered by the phone's transmitter and either built into the antenna (on older models with removable one), or, if it is e.g. that red-blue LED sticker, attached on the back of the phone. During normal operation it has to blink occassionally when synchronizing the phone position within the cellular network, but when higher amounts of data are being transferred (sound, or live image feed), it'll shine almost constantly. (I used to listen to my cellphone in a similar way, by a coincidence - using a cheap walkman that tended to be jammed with the phone signal; the transmit patterns for cell change and an incoming SMS message or a phonecall soon become familiar.) The minimal useful size for such data, coupled with the relatively small bandwidth available for the handset, should make the attempt for their transmission rather obvious - but only if we watch for it. 9066 From: James M. Atkinson Date: Sat Jul 10, 2004 10:05pm Subject: Request for Information I am researching several of Steve Wilson's associates, their links back to him, and his money laundering activities, and would like to know if anybody on the list recognized any of the following names, and if so you have any comments or research on them that you could share with me. James K. Cowan Lawrence "Buck" Hall John McCann Kenneth Buchanan Levi and Lizzie Fisher Jo S. Fischer Greg Scott Bob Bryant Demain Wilson John Prochaska Miles Hayes Brian Reece ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9067 From: Mike Dever Date: Sun Jul 11, 2004 3:15am Subject: Automated RF Analysis Systems Hello I am interested in any comments, experiences, thoughts, etc. folk may have about 'automated' or 'semiautomated' TSCM RF analysis systems such as the SystemWare 'IP Patrol' and 'TSCM Dragon' products (www.sysware.com) both as a primary TSCM tool and also as an 'in place (or real time) monitoring systems'. What is considered to be the maximum threat level this type of system should be used against? (If there is one) Regards Mike Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Voice: (02) 6254 5337 Email: dca@b... This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 9068 From: William Knowles Date: Sun Jul 11, 2004 4:33pm Subject: Kabul bounty hunters search for bin Laden http://www.nzherald.co.nz/storydisplay.cfm?storyID=3577743&thesection=news&thesubsection=world 12.07.2004 It was a discovery startling, and disturbing, even by the standards of Afghanistan's anarchic violence. Prisoners hanging upside down in a private prison, tortured by heavily armed soldiers of fortune seeking the millions of dollars in bounty offered by the Americans. The arrest of Jack Idema and two companions after a shootout in Kabul gave a glimpse of a savage and largely unreported war taking place in the shadow of the Iraq conflict, and the assortment - mercenaries and misfits, fortune-seekers and fantasists - who have come to take part. Idema, now in the custody of the notorious Afghan security chief, Baba Jan, in many ways epitomises these latter-day men who would be king in this part of the "Wild East". His is a colourful background across three continents: author, adventurer and convict. Some of us first met "Jack" in 2001, when the Taleban had retreated from Kabul, victorious Northern Alliance fighters were parading in the streets, and United States and British forces were pouring into Bagram airbase. A dapper man in a black T-shirt and combat trousers, a Glock pistol strapped in his shoulder holster, Idema gave a graphic account of his supposed experiences as a former US Army Green Beret who had trained with the SAS and, as an adviser to the Tajik and Uzbek militias, had helped plan the operation to take the Afghan capital. The meeting took place at the Mustafa Hotel, then being built in the city centre. It was another example of the seemingly endless carpetbagging opportunities then on offer. The hotel's owners are a family of Afghan expatriates from New Jersey, the hotel named after one of three brothers. Sipping whiskey, then retailing at US$140 ($213) a bottle at the Chelsi supermarket off Chicken St, Idema offered to organise a convoy to Tora Bora, where the Taleban and al Qaeda were making what was thought to be their last stand and where, the Americans were confident, Osama bin Laden was trapped. After checking with the British military, some of us decided to decline his offer. Those who went were robbed at gunpoint a quarter of the way through the journey by their "guards" and made their way, bedraggled, back to Kabul. Jack professed to be outraged. He would take the matter up immediately with his "good friends" General Quononi, the new Defence Minister, and Abdul Rashid Dostum, the warlord, and the bandits would be summarily executed. After that Idema would regularly turn up at the Intercontinental Hotel, where most of the foreign journalists were staying, trying to sell videos and photographs purporting to show Taleban and al Qaeda terrorists training for assassinations and rehearsing gas attacks using dogs. Some of these were bought for large sums of money, and one tape was shown on American network TV. But Idema later declared he was going to sue over alleged breach of contract, and also threatened to "punch out" Fox reporter Geraldo Rivera and a Fox TV presenter in a dispute over the recordings. Idema had also taken legal action against the director Stephen Spielberg and his DreamWorks production company, accusing them of plagiarising a biographical book he had written, Red Bull Rising, in making a film, The Peacemaker, with George Clooney and Nicole Kidman. Idema, said to be demanding a US$130 million settlement, claimed Clooney's character, a special forces soldier who heroically prevents rogue Russian soldiers from exporting a nuclear warhead to Iran, was based on his own life in Lithuania, where he worked as an "undercover intelligence source". His mission, undertaken on behalf of "private interests", was sabotaged by the CIA and FBI, he claims, because he was exposing deals with terrorists that embarrassed President Bill Clinton's attempts to improve relations with the Russians. Idema has co-authored another book, Taskforce Dagger: the Hunt for bin Laden, with Robin Moore, who wrote The French Connection and The Happy Hooker, in which he develops his theme of playing a pivotal part in the fall of the Taleban. The cover has a dramatic picture of him, bare-chested, semi-automatic rifle in his hand, flanked by two Afghan guerrillas. But back in America Idema, known as Keith rather than Jack, was known for another type of combat - paintball. He ran a magazine called Paintball Planet and produced "combat helmets" for the game. It was while running another company, Idema Combat Systems, which sold military clothing and equipment, that he was convicted in 1994 of swindling 60 companies out of US$200,000. Sentencing Idema to three years' jail in federal prison, the judge ordered that he should undertake psychological tests. Timothy Connolly, then an assistant secretary of defence at the Pentagon, appeared as a character witness for the defence. Records show Idema served with the 11th Special Forces Group as a "rigger", essentially a supporting role ensuring that equipment and supplies reached those in the frontline. Whatever Idema's credentials are, the fact remains that he and others like him are common sights in Afghanistan. They have an eye for bounty, the top prize being the US$25 million ($38 million) offered by the US Government for bin Laden. There are also claims that some are involved in heroin trafficking - in the country that produces three-quarters of the world supply - and smuggling antiquities. The Mustafa, now much expanded, is the favourite hangout in Kabul. Men in cropped hair, camouflage clothing and keffiyehs, packing guns, lounge in the Irish Bar, drinking bourbon with the Thai girls flown in to work at the hotel's new massage parlour. Some operating in this murky world do indeed have official connections. David Passaro, a former Green Beret who arrived on a CIA security contract, is under arrest, accused of beating a 28-year-old Afghan detainee to death. The war on terror is lavishly funded when it comes to bounties. The State Department is offering US$340 million for information leading to the capture or killing of 30 top suspects worldwide. So far, US$56 million has been paid out internationally. Small wonder, then, that all kinds of adventurers are now buzzing round this honeypot. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ---------------------------------------------------------------- C4I.org - Computer Security, & Intelligence - http://www.c4i.org ================================================================ Help C4I.org with a donation: http://www.c4i.org/contribute.html *==============================================================* 9069 From: Steve Uhrig Date: Mon Jul 12, 2004 8:31pm Subject: Short article on signal sniffing On Optoelectronics' site, there is a decent article about using a scanner to sniff for signals, and what's happening behind the scenes. Most of it related directly to TSCM. Starts with the basics. Article is only 3 pages. Short article, good info, worth a read: http://www.optoelectronics.com/tech/pdf/counterintelligence.pdf Note I am not making any statements about products from Optoelectronics. Just sharing the link to the article. You'll see why a counter is a rarely-used tool in TSCM. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9070 From: Date: Tue Jul 13, 2004 7:21am Subject: Caller ID spoofing Implementation quirks in Voice over IP are making it easy for hackers to spoof Caller I.D., and to unmask blocked numbers. By Kevin Poulsen, SecurityFocus Jul 6 2004 1:54PM Caller I.D. isn't what it used to be. Hackers have discovered that the handy feature that tells you who's calling before you answer the phone is easily manipulated through weaknesses in Voice over IP (VoIP) programs and networks. They can make their phone calls appear to be from any number they want, and even pierce the veil of Caller I.D. blocking to unmask an anonymous phoner's unlisted number. At root, the issue is one of what happens to a nugget of authenti- cation data when it leaves the tightly-regulated realm of traditional telephony, and passes into the unregulated domain of the Internet. On the old-fashioned phone network, Caller I.D. works this way: your local phone company or cell phone carrier sends your "Calling Party Number" (CPN) with every call, like a return address on an envelope. Transmitted along with your CPN is a privacy flag that tells the telephone switch at the receiving end of the call whether or not to share your number with the recipient: if you have blocking on your line, the phone company you're dialing into knows your number, but won't share it with the person you're calling. This arrangement relies on telephone equipment at both ends of the call being trusted: the phone switch providing you with dial tone promises not to lie about your number to other switches, and the switch on the receiving end promises not to reveal your number if you've asked that it be blocked. In the U.S. that trust is backed by FCC regulations that dictate precisely how telephone carriers handle CPNs, Caller I.D. and blocking. Most subscribers have come to take Caller I.D. for granted, and some financial institutions even use Caller I.D. to authenticate customers over the phone. Despite that, the system has long been open to manipulation. "A lot of times you can offer any number you want, and carriers won't validate that," says Lance James, chief security office of Secure Science Corporation. But in the past, the power to misrepresent your number came with a high price tag: you typically had to be a business able to pay the local phone company for a high-volume digital connection. On the other side of the equation, companies who pay for toll free numbers can often access an incoming caller's phone number even if it's blocked. Voice over IP networks, currently outside FCC regulation, place those capabilities in the hands of ordinary netizens. In a telephone interview with SecurityFocus, 21-year-old phone hacker "Lucky 225" demonstrated how he could spoof his Caller I.D. to appear to be phoning from the reporter's office. In another demonstration, the reporter phoned Lucky's associate "Natas" from a residential phone with Caller I.D. blocked. Natas was able to rattle off the unlisted phone number. Full story at: http://www.securityfocus.com/news/9061 [Non-text portions of this message have been removed] 9071 From: Chris W. Date: Tue Jul 13, 2004 3:14pm Subject: Re: Caller ID spoofing I thought caller ID spoofing had been around for a long time. Originally referred to as the "orange box" in "phreaking terms". You can do a search for a program called CIDMage for windows on google and with hardware allowing it makes the task pretty simple. However usually if the person just hits the back button once on their caller ID it will show the real sent info. However that's usually easily comprimised as well. Anyhow I'm no expert on the subject, just two cents on it... Chris W. Freelanced Technologies www.freelancedtechnologies.com chris@f... ----- Original Message ----- From: NoPositiveWork@a... Date: Tue, 13 Jul 2004 12:21:47 EDT To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Caller ID spoofing > > Implementation quirks in Voice over IP are making it easy for hackers > to spoof Caller I.D., and to unmask blocked numbers. > > By Kevin Poulsen, SecurityFocus Jul 6 2004 1:54PM > > Caller I.D. isn't what it used to be. > > Hackers have discovered that the handy feature that tells you who's > calling before you answer the phone is easily manipulated through > weaknesses in Voice over IP (VoIP) programs and networks. They can > make their phone calls appear to be from any number they want, and > even pierce the veil of Caller I.D. blocking to unmask an anonymous > phoner's unlisted number. > > At root, the issue is one of what happens to a nugget of authenti- > cation data when it leaves the tightly-regulated realm of traditional > telephony, and passes into the unregulated domain of the Internet. > > On the old-fashioned phone network, Caller I.D. works this way: your > local phone company or cell phone carrier sends your "Calling Party > Number" (CPN) with every call, like a return address on an > envelope. Transmitted along with your CPN is a privacy flag that tells > the telephone switch at the receiving end of the call whether or not > to share your number with the recipient: if you have blocking on your > line, the phone company you're dialing into knows your number, but > won't share it with the person you're calling. > > This arrangement relies on telephone equipment at both ends of the > call being trusted: the phone switch providing you with dial tone > promises not to lie about your number to other switches, and the > switch on the receiving end promises not to reveal your number if > you've asked that it be blocked. In the U.S. that trust is backed by > FCC regulations that dictate precisely how telephone carriers handle > CPNs, Caller I.D. and blocking. Most subscribers have come to take > Caller I.D. for granted, and some financial institutions even use > Caller I.D. to authenticate customers over the phone. > > Despite that, the system has long been open to manipulation. "A lot of > times you can offer any number you want, and carriers won't validate > that," says Lance James, chief security office of Secure Science > Corporation. But in the past, the power to misrepresent your number > came with a high price tag: you typically had to be a business able to > pay the local phone company for a high-volume digital connection. On > the other side of the equation, companies who pay for toll free > numbers can often access an incoming caller's phone number even if > it's blocked. > > Voice over IP networks, currently outside FCC regulation, place those > capabilities in the hands of ordinary netizens. In a telephone > interview with SecurityFocus, 21-year-old phone hacker "Lucky 225" > demonstrated how he could spoof his Caller I.D. to appear to be > phoning from the reporter's office. In another demonstration, the > reporter phoned Lucky's associate "Natas" from a residential phone > with Caller I.D. blocked. Natas was able to rattle off the unlisted > phone number. > > Full story at: > http://www.securityfocus.com/news/9061 > > > > [Non-text portions of this message have been removed] > -- ___________________________________________________________ Sign-up for Ads Free at Mail.com http://promo.mail.com/adsfreejump.htm 9072 From: Bruce Date: Tue Jul 13, 2004 3:35pm Subject: Re: Patriot Act Wins House Vote --- In TSCM-L@yahoogroups.com, "savanted1" wrote: > ...The bill sought to block a section of > the Patriot Act that required libraries and booksellers to provide > federal investigators with records about patrons' purchases > and Internet use. Representative Frank Wolf (R-Virginia) read a > letter from the Justice Department describing how terrorists used > computers at a public library to communicate. I wish our representatives and other elected officials would wake up and educate themselves about the current and future technologies (and their risks) before they try to draft laws that will have little or none of the "intended" impact on the criminal. Terrorists use public computers libraries to communicate!? Sure they do but if you want in on a dirty little secret? Get your laptop, a wireless network card, and download a copy of Netstumbler (for free) and see how long it takes for you to get access to a _completely_ anonymous, wide open wireless LAN complete with high-speed Internet access. This country is exploding with wireless access points, and the vast majority of them are installed by the consumer with no thought to preventing unauthorized access. I would doubt very seriously that many terrorists are stupid enough to risk monitoring and/or detection at a public library when they could quietly sit in a parking lot or on a side street in "Anywhere, USA" and have the same or faster Internet access. This also allows them to use their own laptops with their choice of encryption or steganography software. Don't misunderstand me savanted1, this is not directed at you and I appreciate your original posting... Bruce "Give me liberty, or make your peace..." 9073 From: G P Date: Tue Jul 13, 2004 6:44pm Subject: Re: Caller ID spoofing This has been an issue for decades, but most hobbyists didn't have the funds for a dedicated SS7 link or ISDN PRI circuit (CLID/ANI is easily spoofed using the 'D' channel on a PRI circuit, depending on the provider). Now with the proliferation of VOIP services, modifying CLID/ANI information is trivial at best. Check out http://www.asterisk.org for an open-source PBX system that can pass whatever CLID/ANI information you choose, with relative ease. Any form of authentication based upon CLID/ANI has been and will be suspect - callback modems, helpdesks that rely upon CLID info, your credit card company that uses CLID to access your financial information. If you can hold down the '1' button on your cellphone and check your voicemail without entering a password... then so can anyone else that can forge your mobile telephone number. More importantly, our elected officials have done ABSOLUTELY NOTHING to protect location-based information from the mobile telephone system. The Emergency 911 (E911) act was rammed through Congress under the auspices of public safety, and funded by your tax dollars (as if *.Bell needs any additional tax welfare). For giggles, google "+LBS +E911 +SS7", and then do some research on the individuals that are jumping into the location-based services market - take a look at the bios and nationality of the people running these LBS companies... Anyone with a few grand per month can gain access to the location information of your mobile handset and toll records, without your consent, without your permission, and without your explicit opt-in. "You have no privacy, get over it." --Scott McNealy, CEO Sun Microsystems --- NoPositiveWork@a... wrote: > > Implementation quirks in Voice over IP are making it > easy for hackers > to spoof Caller I.D., and to unmask blocked numbers. > > By Kevin Poulsen, SecurityFocus Jul 6 2004 1:54PM > > Caller I.D. isn't what it used to be. > > Hackers have discovered that the handy feature that > tells you who's > calling before you answer the phone is easily > manipulated through > weaknesses in Voice over IP (VoIP) programs and > networks. They can > make their phone calls appear to be from any number > they want, and > even pierce the veil of Caller I.D. blocking to > unmask an anonymous > phoner's unlisted number. > > At root, the issue is one of what happens to a > nugget of authenti- > cation data when it leaves the tightly-regulated > realm of traditional > telephony, and passes into the unregulated domain of > the Internet. > > On the old-fashioned phone network, Caller I.D. > works this way: your > local phone company or cell phone carrier sends your > "Calling Party > Number" (CPN) with every call, like a return address > on an > envelope. Transmitted along with your CPN is a > privacy flag that tells > the telephone switch at the receiving end of the > call whether or not > to share your number with the recipient: if you have > blocking on your > line, the phone company you're dialing into knows > your number, but > won't share it with the person you're calling. > > This arrangement relies on telephone equipment at > both ends of the > call being trusted: the phone switch providing you > with dial tone > promises not to lie about your number to other > switches, and the > switch on the receiving end promises not to reveal > your number if > you've asked that it be blocked. In the U.S. that > trust is backed by > FCC regulations that dictate precisely how telephone > carriers handle > CPNs, Caller I.D. and blocking. Most subscribers > have come to take > Caller I.D. for granted, and some financial > institutions even use > Caller I.D. to authenticate customers over the > phone. > > Despite that, the system has long been open to > manipulation. "A lot of > times you can offer any number you want, and > carriers won't validate > that," says Lance James, chief security office of > Secure Science > Corporation. But in the past, the power to > misrepresent your number > came with a high price tag: you typically had to be > a business able to > pay the local phone company for a high-volume > digital connection. On > the other side of the equation, companies who pay > for toll free > numbers can often access an incoming caller's phone > number even if > it's blocked. > > Voice over IP networks, currently outside FCC > regulation, place those > capabilities in the hands of ordinary netizens. In a > telephone > interview with SecurityFocus, 21-year-old phone > hacker "Lucky 225" > demonstrated how he could spoof his Caller I.D. to > appear to be > phoning from the reporter's office. In another > demonstration, the > reporter phoned Lucky's associate "Natas" from a > residential phone > with Caller I.D. blocked. Natas was able to rattle > off the unlisted > phone number. > > Full story at: > http://www.securityfocus.com/news/9061 > > > > [Non-text portions of this message have been > removed] > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > Yahoo! Domains - Claim yours for only $14.70 > http://us.click.yahoo.com/Z1wmxD/DREIAA/yQLSAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - 100MB free storage! http://promotions.yahoo.com/new_mail 9074 From: James M. Atkinson Date: Tue Jul 13, 2004 9:07pm Subject: Tennessee Homicide Two Reasons Why It's So Hard To Solve A Tennessee Homicide 1. All the DNA is the same. 2. There are no dental records. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9075 From: Steven Date: Tue Jul 13, 2004 7:20pm Subject: RE: Caller ID spoofing I believe that software shoves the packet burst down the phone line after the original information. It's a cheesy way to spoof caller ID but it works if the called party isn't watching to closely. Steven -----Original Message----- From: Chris W. [mailto:chris_w@t...] Sent: Tuesday, July 13, 2004 4:14 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Caller ID spoofing I thought caller ID spoofing had been around for a long time. Originally referred to as the "orange box" in "phreaking terms". You can do a search for a program called CIDMage for windows on google and with hardware allowing it makes the task pretty simple. However usually if the person just hits the back button once on their caller ID it will show the real sent info. However that's usually easily comprimised as well. Anyhow I'm no expert on the subject, just two cents on it... Chris W. Freelanced Technologies www.freelancedtechnologies.com chris@f... ----- Original Message ----- From: NoPositiveWork@a... Date: Tue, 13 Jul 2004 12:21:47 EDT To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Caller ID spoofing > > Implementation quirks in Voice over IP are making it easy for hackers > to spoof Caller I.D., and to unmask blocked numbers. > > By Kevin Poulsen, SecurityFocus Jul 6 2004 1:54PM > > Caller I.D. isn't what it used to be. > > Hackers have discovered that the handy feature that tells you who's > calling before you answer the phone is easily manipulated through > weaknesses in Voice over IP (VoIP) programs and networks. They can > make their phone calls appear to be from any number they want, and > even pierce the veil of Caller I.D. blocking to unmask an anonymous > phoner's unlisted number. > > At root, the issue is one of what happens to a nugget of authenti- > cation data when it leaves the tightly-regulated realm of traditional > telephony, and passes into the unregulated domain of the Internet. > > On the old-fashioned phone network, Caller I.D. works this way: your > local phone company or cell phone carrier sends your "Calling Party > Number" (CPN) with every call, like a return address on an > envelope. Transmitted along with your CPN is a privacy flag that tells > the telephone switch at the receiving end of the call whether or not > to share your number with the recipient: if you have blocking on your > line, the phone company you're dialing into knows your number, but > won't share it with the person you're calling. > > This arrangement relies on telephone equipment at both ends of the > call being trusted: the phone switch providing you with dial tone > promises not to lie about your number to other switches, and the > switch on the receiving end promises not to reveal your number if > you've asked that it be blocked. In the U.S. that trust is backed by > FCC regulations that dictate precisely how telephone carriers handle > CPNs, Caller I.D. and blocking. Most subscribers have come to take > Caller I.D. for granted, and some financial institutions even use > Caller I.D. to authenticate customers over the phone. > > Despite that, the system has long been open to manipulation. "A lot of > times you can offer any number you want, and carriers won't validate > that," says Lance James, chief security office of Secure Science > Corporation. But in the past, the power to misrepresent your number > came with a high price tag: you typically had to be a business able to > pay the local phone company for a high-volume digital connection. On > the other side of the equation, companies who pay for toll free > numbers can often access an incoming caller's phone number even if > it's blocked. > > Voice over IP networks, currently outside FCC regulation, place those > capabilities in the hands of ordinary netizens. In a telephone > interview with SecurityFocus, 21-year-old phone hacker "Lucky 225" > demonstrated how he could spoof his Caller I.D. to appear to be > phoning from the reporter's office. In another demonstration, the > reporter phoned Lucky's associate "Natas" from a residential phone > with Caller I.D. blocked. Natas was able to rattle off the unlisted > phone number. > > Full story at: > http://www.securityfocus.com/news/9061 > > > > [Non-text portions of this message have been removed] > -- ___________________________________________________________ Sign-up for Ads Free at Mail.com http://promo.mail.com/adsfreejump.htm ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT click here _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. From: Jay Coote Date: Mon Jul 10, 2000 10:05pm Subject: Re: Re: Another strange signal You might try DFing it. Use a cheap yagi antenna (borrow from a ham?) and vary attenuation. Spin the antenna for quieting or highest signal reading. Use map and compass, DF from many points to rule out reflections or poor readings. Jay ---------- > .----- Original Message ----- > From: Steve Whitehead > > > Semi rural area. 141.675 Mhz NBFM. 6 x 250 milisec tone bursts of about > > > 900Hz. followed by 1 sec rest (no carrier). Max. sig. range is 5 km > > > The frequencies between 141.5 - 144 MHz has been allocated for mobile base > > transmitters. The current SF assignments at 141.5 - 142.775 are to be > > migrated or changed to DF. (SA Band Plan - Available from the Department > of Communications) > > Hi Steve > > Thanks for the input. > > This signal still intrigues me - it seems to serve no purpose other than to > send this constant burst of tones, 24 hours a day, much like a 'bumper > beeper', but it does not seem to move. > It's not an airband beacon. It's not an amature beacon. There appears to be > no data embeded in it. In 20 years of sniffing RF I have not seen this type > of transmission before. I have a licence for one of our simplex systems less > than a Meg. from this odd signal, so I frequently scan in that band. I first > noticed it about 4 weeks ago. > > Our interest is not so much in what frequencies/users SATRA have > allocated/licenced > in that band for legitimate use but the possible unauthorised use of > frequencies. Of course if someone can tell me what ligitimate purpose there > is for such a transmission I will have learned something. > As we all know, Snoops do not stick to band plans or type approved > equipment. The last time I spoke to SATRA about establishing the legitimacy > of a transmission I got so frustrated with the burocrats on the phone that I > nearly pulled out my last 2 strands of hair... > > The signal in question (which I detect 14db over S10 as I type this late at > night) appears > to originate about 40 Km west of the Pretoria CBD. You're based around > Pretoria and I guess you must come this way sometimes. It's strongest on the > R512 > where the old Herculese/Magalisburg railway line crosses the road (not the > Sun City T junction, the next one). > > > > ------------------------------------------------------------------------ > Need a credit card? > Instant Approval and 0% intro APR with Aria! > http://click.egroups.com/1/6034/1/_/507420/_/963258846/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 843 From: Dr. Pepper Date: Mon Jul 10, 2000 3:36pm Subject: Re: Re: Another strange signal 141.5 - 144 MHz 144 to 148 is Ham 2 meter band These are USG frequencies. Could be Military or non-mil. ================================================= A Grudko wrote: > .----- Original Message ----- > From: Steve Whitehead > > > Semi rural area. 141.675 Mhz NBFM. 6 x 250 milisec tone bursts of about > > > 900Hz. followed by 1 sec rest (no carrier). Max. sig. range is 5 km > > > The frequencies between 141.5 - 144 MHz has been allocated for mobile base > > transmitters. The current SF assignments at 141.5 - 142.775 are to be > > migrated or changed to DF. (SA Band Plan - Available from the Department > of Communications) > > Hi Steve > > Thanks for the input. > > This signal still intrigues me - it seems to serve no purpose other than to > send this constant burst of tones, 24 hours a day, much like a 'bumper > beeper', but it does not seem to move. > It's not an airband beacon. It's not an amature beacon. There appears to be > no data embeded in it. In 20 years of sniffing RF I have not seen this type > of transmission before. I have a licence for one of our simplex systems less > than a Meg. from this odd signal, so I frequently scan in that band. I first > noticed it about 4 weeks ago. > > Our interest is not so much in what frequencies/users SATRA have > allocated/licenced > in that band for legitimate use but the possible unauthorised use of > frequencies. Of course if someone can tell me what ligitimate purpose there > is for such a transmission I will have learned something. > As we all know, Snoops do not stick to band plans or type approved > equipment. The last time I spoke to SATRA about establishing the legitimacy > of a transmission I got so frustrated with the burocrats on the phone that I > nearly pulled out my last 2 strands of hair... > > The signal in question (which I detect 14db over S10 as I type this late at > night) appears > to originate about 40 Km west of the Pretoria CBD. You're based around > Pretoria and I guess you must come this way sometimes. It's strongest on the > R512 > where the old Herculese/Magalisburg railway line crosses the road (not the > Sun City T junction, the next one). > > ------------------------------------------------------------------------ > Need a credit card? > Instant Approval and 0% intro APR with Aria! > http://click.egroups.com/1/6034/1/_/507420/_/963258846/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- - - - Dr Pepper, aka Ron Cheshire, WB6GKI, 3537.26N/11740.02W China Lake, CA USA 90 miles West of Death Valley, 200 miles North of LAX - - - 844 From: Dr. Pepper Date: Mon Jul 10, 2000 3:34pm Subject: Re: Signal Thanx, , , Always interesting,, , , , , , :-} ================================ A Grudko wrote: > ----- Original Message ----- > From: Dr. Pepper > > It sounds like an image, or harmonic of another frequency > > being transmitted by either the nearby airport, or a nearby cell site. > > Hi Doc. > > Yeah. I thought of that, but it sounded so much like a nearby empty room > that I'm going back Monday to see if I can get some voice on this one, Even > if this is outside my contracted sweep area, finding a 'live one' is great. > I'll keep you informed. > > Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime > investigation & intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 > 11) 465 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > Chairman), CITTF, > UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - > first time" ICQ 78711262 > > ------------------------------------------------------------------------ > Need a credit card? > Instant Approval and 0% intro APR with Aria! > http://click.egroups.com/1/6034/1/_/507420/_/963258841/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- - - - Dr Pepper, aka Ron Cheshire, WB6GKI, 3537.26N/11740.02W China Lake, CA USA 90 miles West of Death Valley, 200 miles North of LAX - - - 845 From: Bryan Herbert Date: Mon Jul 10, 2000 5:25pm Subject: Re: Another strange signal I too would like a copy of the wav A Grudko wrote: > > Could you record some and send it? It may help indentify the > thing... > > Pls. send me your eMail address - I'll send you a little .wav if that > works > for you. > > Andy Grudko > > ----------------------------------------------------------------------- > > ----------------------------------------------------------------------- > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- Bryan Herbert KE6ZGP (661) 714-2611 25006 Walnut St #2 Newhall, Ca. 91321 http://www.geocities.com/b_herbert_91321/index.html AIM: EAVE5DR0P / ICQ: 23631907 / Yahoo: EAVE5DR0P 846 From: Steve Whitehead Date: Mon Jul 10, 2000 6:32pm Subject: Re: Research Electronics Equipment Andy We are getting some replacement CPM antennas and parts in from REI tomorrow. We will replace your faulty CPM antenna free of charge. You just need to pick it up from us. Steve Whitehead Managing Member TSCM Services cc South Africa E-mail sceptre@m... URL http://www.tscm.co.za (Authorised REI Equipment Distributor) ----- Original Message ----- From: Thomas H. Jones To: Sent: Monday, July 10, 2000 10:10 PM Subject: RE: [TSCM-L] Research Electronics Equipment > Andy, > The upgrade is not a simple coating. It is a completely new antenna > designed specifically to withstand large ESD. I have attached a picture of > the original telescoping antenna along with the ESD version so that you can > at least visibly compare. As previously stated, this antenna meets CE mark > testing for sale in Europe. The CE mark testing procedures are rather > stringent. We have been shipping them to Europe for a couple of years. We > have not been able to "blow" one so far, and we have not had to repair or > replace a single one yet. I hope this clears up the probe question. > However, I fear that this posting may be a challenge to some of you. I > don't think that it will survive a lightning bolt strike or any other > voltage levels that are capable of killing or maiming a human. So, be > careful out there. > Regards, > Tom Jones > General Manager REI > > > > -----Original Message----- > From: A Grudko [SMTP:agrudko@i...] > Sent: Monday, July 10, 2000 9:10 AM > To: TSCM-L@egroups.com > Subject: Re: [TSCM-L] Research Electronics Equipment > > ----- Original Message ----- > From: Thomas H. Jones > > The CPM probe that has been designed for the the CE mark and has good ESD > > protection is priced at $105. This probe is designed specifically for the > > CPM-700, the part number is "RFP-700E". > > > It should be noted that this probe and all the CPM probes have very good > > sensitivity because the CPM provides DC current to the handle of the > probe > > which contains a pre-amp to boost the RF signals being detected by the > probe. It is not merely an antenna. > > Tom Jones > > General Manager REI > > Tom. As I have stated, I like the CPM 700. It is one of 4 spectrum emission > devices we use on our sweeps. The probe upgrade cost of $ 105 is not an > issue. But if the upgrade is, as I understand, coating the antenna with a > static resistant surface, this sounds inadequate in our circumstances where > we see blue static arcs over 3 - 6 mm just walking on carpet. > > > Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime > investigation & intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel. Agents in 43 countries - www.grudko.com - (+27 11) 465 > 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > Chairman), CITTF, > UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - > first time" ICQ 78711262 > > > > ------------------------------------------------------------------------ > Still looking for the complete Application Server solution? > Find answers and a $75 gift certificate at the Intraware App Server > Webinar. Sign up at: > http://click.egroups.com/1/6756/1/_/507420/_/963096058/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > ---------------------------------------------------------------------------- ---- > > > ------------------------------------------------------------------------ > 0% Introductory APR! > Instant Approval! > Aria Visa - get yours today. > http://click.egroups.com/1/6035/1/_/507420/_/963260094/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 847 From: James M. Atkinson, Comm-Eng Date: Mon Jul 10, 2000 11:08pm Subject: Call for Subscribers --> Spread the Word Greetings, As many of you know the number of subscribers on this list is now well over 400 people, and we are running a really good signal to noise ratio. I would like to invite the membership to "spread the word" about this list and to recommend it to other TSCM people and to investigators. Please keep in mind that to join the list a subscriber should be involved (at some level) in the TSCM business. The primary goal of this list is the increase the technical knowledge within the TSCM business, to educate those who are new to the business, and to keep several steps ahead of the eavesdroppers. Hopefully while doing this we can also raise the bar for the entire TSCM industry. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 848 From: Jordan Ulery Date: Tue Jul 11, 2000 10:15am Subject: strange signal The frequency range mentioned may be milatary, but may also be Rail Road signaling system and/or test equipment. The range is similar to frequencies encountered in "another life" working on the rail road in New England. Just a thought. 849 From: James M. Atkinson, Comm-Eng Date: Tue Jul 11, 2000 11:54am Subject: Re: strange signal At 11:15 AM -0400 7/11/00, Jordan Ulery wrote: >The frequency range mentioned may be milatary, but may also be Rail Road >signaling system and/or test equipment. The range is similar to >frequencies encountered in "another life" working on the rail road in >New England. Just a thought. I have seen hot box detectors used with a signal such as you describe. A "Hot Box" detector is a system that keeps an eye on the axles, brakes, and so on (the sensor is mounted between the train tracks). As each element of the trains undercarriage passes over an IR detector it causes a IR detector to see various heat levels. This is then used to modulate a tone relative to the "hotness" of the component. An experienced railroad person can then monitor this tone while on board the train and quickly scan the undercarriage for defective components while the train is still moving. The more modern systems will actually call out a problem in a computerized voice such as "Hot Box/Axle/Wheel, Car 84, Axle 3..." and so on. Of course I would still encourage you to haul out a log periodic antenna and DF the signal. This is a good example why you need to explore the RF environment prior to going out to a clients site... the last thing you want to tell a client is that you detected a suspect signal that you could not locate. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 850 From: Robert G. Ferrell Date: Tue Jul 11, 2000 1:25pm Subject: RE: Streetlights out >Specifically, street lights going out as vehicle either approaches or >after vehicle has sits in one location for a few minutes. Now that we've run the gamut of flippancy, I feel compelled to add my two cents' worth. I have noticed for a number of years that sodium vapor lamps, one of the most common street lighting fixtures on my part of the planet, are not lit steadily, but instead turn on and off at regular intervals. I've always assumed this was part of their normal operation, since most of 'em seem to do it. I have on a number of occasions perceived there to be some correlation between the proximity of my vehicle and the state of the lamp; however, I suspect that an objective analysis of the phenomenon would show no real cause and effect at work. I'm not necessarily suggesting that this is the relevant mechanism in your case, but it might be. If you drive under a light and it turns on/off at about the same time, it would be quite natural to want to connect the two events. There was one lamp that seemed to change state virtually every time I drove near it, yet I'm relatively certain that no unusual RF emissions were coming from my car (heck, the AM/FM radio didn't even work). Cheers, RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 851 From: James M. Atkinson, Comm-Eng Date: Tue Jul 11, 2000 2:04pm Subject: RE: Streetlights out Ok Folks... Here is your homework for the evening. Pull out a good log periodic, a nice squirrel cage Biconical, a broadband loop,some matching low noise amps, and a spectrum analyzer. Haul them out to the local mall parking lot at midnight. Randomly select 25-30 such lights and take four traces (0-3 GHz) from each. Each light should be at least 30-50 feet way from the building, any other vehicles, overhead cables, and so on. Use a large sheet of copper as your ground plane (of at least 4 square feet), and reference all of your equipment to that copper sheet... be sure to use a transient limiter. For extra credit put a near field probe on a painters pole and place it a foot away from the bulb, the bulb fixture, and the lamp post all the way to the base (take GREAT care not to actually touch the bulb or light socket). Also for extra credit shine a xenon light at the lamp for 30 seconds while checking it with your near field probe. Post your results to the list. When in doubt... check it out... -jma At 1:25 PM -0500 7/11/00, Robert G. Ferrell wrote: > >Specifically, street lights going out as vehicle either approaches or > >after vehicle has sits in one location for a few minutes. > >Now that we've run the gamut of flippancy, I feel compelled to add >my two cents' >worth. > >I have noticed for a number of years that sodium vapor lamps, one of the most >common street lighting fixtures on my part of the planet, are not >lit steadily, >but instead turn on and off at regular intervals. I've always >assumed this was >part of their normal operation, since most of 'em seem to do it. > >I have on a number of occasions perceived there to be some correlation between >the proximity of my vehicle and the state of the lamp; however, I suspect that >an objective analysis of the phenomenon would show no real cause and effect at >work. > >I'm not necessarily suggesting that this is the relevant mechanism >in your case, >but it might be. If you drive under a light and it turns on/off at about the >same time, it would be quite natural to want to connect the two events. There >was one lamp that seemed to change state virtually every time I drove near it, >yet I'm relatively certain that no unusual RF emissions were coming >from my car >(heck, the AM/FM radio didn't even work). > >Cheers, > >RGF > >Robert G. Ferrell, CISSP =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 852 From: Miguel Puchol Date: Tue Jul 11, 2000 4:46pm Subject: RE: Streetlights out I have many times walked under such lamps, when they have suddenly turned off, as if affected by my bad luck aura - I never really though about a scientifical explanation to this, I just though it was a faulty fixture or bulb. Cheers all, Mike > I have on a number of occasions perceived there to be some > correlation between > the proximity of my vehicle and the state of the lamp; however, I > suspect that > an objective analysis of the phenomenon would show no real cause > and effect at > work. 853 From: A Grudko Date: Tue Jul 11, 2000 0:43pm Subject: Re: DFing strange signal ----- Original Message ----- From: James M. Atkinson, Comm-Eng > > Three or four readings later and you will have a clean vector to the emitter. I have a Daytong (made in UK) doppler-shift system (4 x 1/4 waves) which works great in this range. This is not client related sao I'll get it out one Sunday and DF it. Andy 854 From: A Grudko Date: Tue Jul 11, 2000 1:47pm Subject: Re: Research Electronics Equipment ----- Original Message ----- From: Steve Whitehead > We will replace your faulty CPM antenna free of charge. You just need to pick it up from us. Many thanks for the generous offer Steve. We did get the antenna repaired about 4 months ago and it's 100% at the moment. I don't want to take stock from you if mine is working - just keep one in in case my over-zealous techie zaps another one! Would you like me to mention on the SACI list that you have stock, as I know other members have CPMs (I won't mention free 'cos some came from Spy Shop etc). Also try a post to the security.co.za message board. Regards Andy Grudko 855 From: D. Douglas Rehman Date: Tue Jul 11, 2000 5:56pm Subject: FW: [private-eye] help with electronic sweep The below message is from another list, forwarded with the permission of the author. Please contact him directly, I'm only passing the info on. Best Regards, Doug Rehman Rehman Technology Services, Inc. Specializing in Computer Forensics and Technology Related Investigations License A-9800119 Mount Dora, Florida (Orlando Area) (352)357-0500 http://www.surveil.com -----Original Message----- From: LookoutPI [mailto:stevanjr@l...] Sent: Tuesday, July 11, 2000 3:38 PM To: PRIVATE-EYE Subject: [private-eye] help with electronic sweep Message from the Private-Eye mailing list Hello all: I have an opportunity to bid on an electronic sweep to detect illegal transmitters and phone bugs for a very well-heeled corporate client. This could end up being a huge international contract, but it also may be a one-time job for one of the company's VPs. I know nothing about this area of investigations! What I'm looking for is someone to come in as a sort of limited partner and do the sweep working under my license (and do some training on me) for a 50-50 split of the fee. If our bid is accepted. The partner will need to sign a five-year non-competition contract with me regarding this client, but if things work out, I will probably need my partner's assistance for at least a year while I am learning the basics of this field. I will split all fees from this client with my partner during this year of training. Now here's the rub, this company is a world leader in a certain field of electronic monitoring, so we will be working for engineers and scientists (that means the work we do must be super professional and able to withstand intelligent and knowledgeable scrutiny by experts in the field of electronic surveillance. In other words this must be much more than a dog and pony show. The expert/partner should have verifiable and deep counter measures experience and the appropriate equipment!) If this is something you are interested in and qualified for, send me a fax introducing yourself and detailing your qualifications. Please, no phone calls at this point because I simply don't have time right now to deal with a lot of phone calls. Although a lot of this is still vague, it may all happen pretty quickly. So far, I have the inside track on this opportunity, because of the recommendation of another client, but that may change in a heartbeat. Thanks Stevan Rosenlind Lookout Investigations of California, CA PI #20651 "Wide-ranging investigative experience since 1983." Please visit our web site where you will find thousands of free internet investigative resources: http://www.lookoutpi.com 7081 N. Marks #225 Fresno CA, 93711 office: 559-447-5847, fax: 559-436-4504 --- To unsubscribe send a blank email to leave-private-eye-2369R@l... 856 From: Dr. Pepper Date: Tue Jul 11, 2000 11:53am Subject: James Bond stuff With all the talk of cellphones causing traffic accidents, this looks like it will cause more DEAD SKIERS! "We are coming up with things that will make your head spin," said Lawrence Rabiner, vice president for research at AT&T Labs. One of AT&T's projects under development is a pair of Internet-accessible ski goggles with a built-in wireless phone that would allow skiers to hold conversations, transmit a video of their downhill descent or pull down a course map projected onto a visor. "It's James Bond, 'Mission Impossible' stuff," Rabiner said nyuk, nyuk, nyuk, , , , , -- - - - Dr Pepper, aka Ron Cheshire, WB6GKI, 3537.26N/11740.02W China Lake, CA USA 90 miles West of Death Valley, 200 miles North of LAX - - - 857 From: Date: Tue Jul 11, 2000 10:16am Subject: Re: Streetlights out Robert thanks so much for your input on this. It makes sense. I have been doing some reading on this. I understand it to be a possible tool used by local authorities and or FBI in the playing of games with their target. It causes paranoia when used effectively. Thanks again DMM 858 From: Date: Tue Jul 11, 2000 11:15am Subject: Fwd: help with electronic sweep (RE-POSTED--PLS RESPOND TO THE MSG ORIGINATOR) In a message dated 7/11/00 12:49:15 PM, stevanjr@l... writes: << Hello all: I have an opportunity to bid on an electronic sweep to detect illegal transmitters and phone bugs for a very well-heeled corporate client. This could end up being a huge international contract, but it also may be a one-time job for one of the company's VPs. I know nothing about this area of investigations! What I'm looking for is someone to come in as a sort of limited partner and do the sweep working under my license (and do some training on me) for a 50-50 split of the fee. If our bid is accepted. The partner will need to sign a five-year non-competition contract with me regarding this client, but if things work out, I will probably need my partner's assistance for at least a year while I am learning the basics of this field. I will split all fees from this client with my partner during this year of training. Now here's the rub, this company is a world leader in a certain field of electronic monitoring, so we will be working for engineers and scientists (that means the work we do must be super professional and able to withstand intelligent and knowledgeable scrutiny by experts in the field of electronic surveillance. In other words this must be much more than a dog and pony show. The expert/partner should have verifiable and deep counter measures experience and the appropriate equipment!) If this is something you are interested in and qualified for, send me a fax introducing yourself and detailing your qualifications. Please, no phone calls at this point because I simply don't have time right now to deal with a lot of phone calls. Although a lot of this is still vague, it may all happen pretty quickly. So far, I have the inside track on this opportunity, because of the recommendation of another client, but that may change in a heartbeat. Thanks Stevan Rosenlind Lookout Investigations of California, CA PI #20651 "Wide-ranging investigative experience since 1983." Please visit our web site where you will find thousands of free internet investigative resources: http://www.lookoutpi.com 7081 N. Marks #225 Fresno CA, 93711 office: 559-447-5847, fax: 559-436-4504 >> [Non-text portions of this message have been removed] 859 From: John McCain Date: Tue Jul 11, 2000 2:51pm Subject: RE: Streetlights out This discussion was getting so much fun, I hate to inject any facts, but here goes... In an earlier electrical engineering career, amongst other things I designed lighting . When we first started using HID lamps, we had to learn how much to "over illuminate" to make up for the lamps that would cycle off and back on without leaving the gym or shop area in dim darkness. I don't remember the exact figure, but it was something like 10-20%. Here's a link on HID lamps I quickly found on the web.. http://www.misty.com/~don/dschtech.html and a quote... "7a. Why do aging sodium lamps sometimes cycle repeatedly on and off? The sodium vapor pressure is controlled by the temperature of the amalgam reservoirs at the ends of the arc tube. As the lamp ages, the ends of the arc tube get darkened, and they absorb light. This makes them hotter. Therefore, the amalgam reservoirs get hotter. This increases the sodium vapor pressure in the arc tube, leading to different electrical characteristics. When this effect becomes excessive, the arc in the arc tube goes out. The arc tube must cool before the vapor in it is thin enough to restrike an arc. Aging sodium lamps sometimes repeatedly turn on and off as the ends of the arc tubes overheat, then cool off once the arc goes out. If a high pressure sodium lamp repeatedly turns on and off, replacing the bulb with a new one is usually all that is needed." That said, I used to often pass a specific street lamp that my vehicle turns off. When there is a rain caused water puddle at a certain place, my headlights reflect directly into the photocell on that individually controlled light pole. Used to drive me crazy before I figured it out. There's a dip that collects water, then a slight hill, and the pole is just over the hill. If there had been no traffic through the puddle, its smooth surface does a nice job of reflecting the street light into my eyes as well as my headlamps the other way. It would be nice to hear the results from JMA's emission test though :) Cheers, JohnM 860 From: gerard p. keenan Date: Tue Jul 11, 2000 4:09pm Subject: Fw: [private-eye] help with electronic sweep Hi Everyone, I picked this off another list. Some of you may also be members of it, but I thought I'd put this out in case anyone's interested in helping this guy out. Jerry Keenan GPKeenan Co., Int'l Security Services 1005 Celia St. West Islip, NY 11795-2503 (631) 587-4020 (ph) (516) 768-9602 (mobile) (530) 323-6832 (jfax) secureops@e... gkeenan@s... -----Original Message----- From: LookoutPI To: PRIVATE-EYE Date: Tuesday, July 11, 2000 3:36 PM Subject: [private-eye] help with electronic sweep >Message from the Private-Eye mailing list >Hello all: > >I have an opportunity to bid on an electronic sweep to detect illegal >transmitters and phone bugs for a very well-heeled corporate client. This >could end up being a huge international contract, but it also may be a >one-time job for one of the company's VPs. > >I know nothing about this area of investigations! > >What I'm looking for is someone to come in as a sort of limited partner and >do the sweep working under my license (and do some training on me) for a >50-50 split of the fee. If our bid is accepted. The partner will need to >sign a five-year non-competition contract with me regarding this client, but >if things work out, I will probably need my partner's assistance for at >least a year while I am learning the basics of this field. I will split all >fees from this client with my partner during this year of training. > >Now here's the rub, this company is a world leader in a certain field of >electronic monitoring, so we will be working for engineers and scientists >(that means the work we do must be super professional and able to withstand >intelligent and knowledgeable scrutiny by experts in the field of electronic >surveillance. In other words this must be much more than a dog and pony >show. The expert/partner should have verifiable and deep counter measures >experience and the appropriate equipment!) > >If this is something you are interested in and qualified for, send me a fax >introducing yourself and detailing your qualifications. Please, no phone >calls at this point because I simply don't have time right now to deal with >a lot of phone calls. Although a lot of this is still vague, it may all >happen pretty quickly. So far, I have the inside track on this opportunity, >because of the recommendation of another client, but that may change in a >heartbeat. > >Thanks > >Stevan Rosenlind >Lookout Investigations of California, CA PI #20651 >"Wide-ranging investigative experience since 1983." >Please visit our web site where you will find thousands of free internet >investigative resources: >http://www.lookoutpi.com >7081 N. Marks #225 Fresno CA, 93711 >office: 559-447-5847, fax: 559-436-4504 > > > >--- >To unsubscribe send a blank email to leave-private-eye-2860Q@l... > 861 From: Terry Rogers Date: Tue Jul 11, 2000 5:19pm Subject: Re: Streetlights out Most street lighting today are of the High Intensity Discharge (HID) design. This includes Mercury Vapor, Metal Halide, High Pressure Sodium and Low Pressure Sodium. Light is produced by an arch discharge between two electrodes located at opposite ends of an arch tube within the lamp. And all contain a ballast which provides the proper starting and operating voltage and current to initiate and sustain this arch. HID lamps take several minutes to warm up and reach full light output. An interruption in the power supply, or a sudden voltage drop may cause the arc to extinguish. A lamp which is hot will not restart immediately. Before the lamp will relight, it must cool down sufficiently to reduce the vapor pressure within the arc tube to a point where the arc will restrike. The approximate restriking time of the HID groups mentioned earlier are: Lamp Type Restrike Time Mercury Vapor 3-6 Minutes Metal Halide 10-20 Minutes High Pressure Sodium 1/2-1 Minute Low Pressure Sodium 3-12 Seconds Several other factors may cause the lights to cycle on and off. Normal end of lamp life is one of the most common. Aged High Pressure Sodium lamps will tend to cycle at end of life. After start up, they will cycle off and on as the aged lamp requires more voltage to stabilize and operate the arc than the ballast is capable of providing. Another would be a problem with the photo eye itself , or improperly oriented with an ambient light source causing such a condition. Personally I have had several experiences with different persons over the years swearing that the light went out every time went near it. Once repairs were effected the condition stopped. I hope this may shed some light on this, (no pun intended). Terry J. Rogers Rogers & Associates ----- Original Message ----- From: "Robert G. Ferrell" To: Sent: Tuesday, July 11, 2000 2:25 PM Subject: RE: [TSCM-L] Streetlights out > >Specifically, street lights going out as vehicle either approaches or > >after vehicle has sits in one location for a few minutes. > > Now that we've run the gamut of flippancy, I feel compelled to add my two cents' > worth. > > I have noticed for a number of years that sodium vapor lamps, one of the most > common street lighting fixtures on my part of the planet, are not lit steadily, > but instead turn on and off at regular intervals. I've always assumed this was > part of their normal operation, since most of 'em seem to do it. > > I have on a number of occasions perceived there to be some correlation between > the proximity of my vehicle and the state of the lamp; however, I suspect that > an objective analysis of the phenomenon would show no real cause and effect at > work. > > I'm not necessarily suggesting that this is the relevant mechanism in your case, > but it might be. If you drive under a light and it turns on/off at about the > same time, it would be quite natural to want to connect the two events. There > was one lamp that seemed to change state virtually every time I drove near it, > yet I'm relatively certain that no unusual RF emissions were coming from my car > (heck, the AM/FM radio didn't even work). > > Cheers, > > RGF > > Robert G. Ferrell, CISSP > ======================================== > Who goeth without humor goeth unarmed. > ======================================== > > > ------------------------------------------------------------------------ > Need technology solutions for your business? > Respond.com will Help! > http://click.egroups.com/1/6829/1/_/507420/_/963340745/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 862 From: James M. Atkinson, Comm-Eng Date: Tue Jul 11, 2000 8:06pm Subject: Re: DFing strange signal At 7:43 PM +0200 7/11/00, A Grudko wrote: >----- Original Message ----- >From: James M. Atkinson, Comm-Eng > > > Three or four readings later and you will have a clean vector to the >emitter. > >I have a Daytong (made in UK) doppler-shift system (4 x 1/4 waves) which >works great in this range. This is not client related sao I'll get it out >one Sunday and DF it. > >Andy Do you mean a Datong? You will have much better luck with a "big ass TV VHF/UHF 300-ohm antenna", a simple amplifier and balun. Plus you can usually fold up such an antenna to a fairly small size, and they are quite easy to transport. While I have a fetish for big and nasty lab grade antenna's sometimes you have to work with what you can get into a clients site... Sometimes when I have to travel via air I can not take by "big antenna's" with me. In such cases I'll find out where the nearest Best Buy, Circuit City, K-Mart, Home Depot, etc is. Then I'll simply buy the biggest log periodic they have. Since I bring along my own amp and balun I end up with a highly directional antenna I can use instead of a lab grade unit (which are are really a bear to haul on the plane). Such a system is good to ferreting out weird signals when you get into a pinch, but are a bit in appropriate for use inside a clients facility. When I travel by air I like to use a rental Ryder truck to haul my equipment around (they are all fiberglass), this makes a great enclosed area to set up the log (inside the truck) and I can they drive around sniffing the RF. I also will pickup a couple to folding tables and a cheap folding chair to get up a little lab in the back of the van (be sure to tie the table to the wall, and secure all of your equipment). I simple leave the van engine running, tap off the 12 volt supply at the alternator, invert it, and use the 120 volts to run my equipment. I then find a nice mall or theater parking lot (with no cars around) and do a two hour sniff from the back of the truck. I've been doing it for years, and commonly smurf out to client locations on a commercial flight with only a couple of Pelican cases for lower threat sweeps. I also "drive by" the clients area with the antenna directed toward the building in question, and feeding into a computer controlled scanner "sniffing for 2500+ known bug channels" anlong with several SA sweeps. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 863 From: James M. Atkinson, Comm-Eng Date: Tue Jul 11, 2000 8:07pm Subject: Re: Research Electronics Equipment At 8:47 PM +0200 7/11/00, A Grudko wrote: >-Would you like me to mention on the SACI list that you have stock, as I know >other members have CPMs (I won't mention free 'cos some came from Spy Shop >etc). Also try a post to the security.co.za message board. Spy Shops.... Booo.... Hiss.... -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 864 From: James M. Atkinson, Comm-Eng Date: Tue Jul 11, 2000 8:17pm Subject: RE: Streetlights out At 2:51 PM -0500 7/11/00, John McCain wrote: >This discussion was getting so much fun, I hate to inject any facts, but >here goes... > >In an earlier electrical engineering career, amongst other things I >designed lighting . When we first started using HID lamps, we had to learn >how much to "over illuminate" to make up for the lamps that would cycle off >and back on without leaving the gym or shop area in dim darkness. I don't >remember the exact figure, but it was something like 10-20%. Here's a link >on HID lamps I quickly found on the web.. > http://www.misty.com/~don/dschtech.html and a quote... > >"7a. Why do aging sodium lamps sometimes cycle repeatedly on and off? > >The sodium vapor pressure is controlled by the temperature of the amalgam >reservoirs at the ends of the arc tube. As the lamp ages, the ends of the >arc tube get darkened, and they absorb light. This makes them hotter. >Therefore, the amalgam reservoirs get hotter. This increases the sodium >vapor pressure in the arc tube, leading to different electrical >characteristics. When this effect becomes excessive, the arc in the arc >tube goes out. The arc tube must cool before the vapor in it is thin enough >to restrike an arc. >Aging sodium lamps sometimes repeatedly turn on and off as the ends of the >arc tubes overheat, then cool off once the arc goes out. If a high pressure >sodium lamp repeatedly turns on and off, replacing the bulb with a new one >is usually all that is needed." > >That said, I used to often pass a specific street lamp that my vehicle >turns off. When there is a rain caused water puddle at a certain place, my >headlights reflect directly into the photocell on that individually >controlled light pole. Used to drive me crazy before I figured it out. >There's a dip that collects water, then a slight hill, and the pole is just >over the hill. If there had been no traffic through the puddle, its smooth >surface does a nice job of reflecting the street light into my eyes as well >as my headlamps the other way. > >It would be nice to hear the results from JMA's emission test though :) > >Cheers, >JohnM Back in my active duty days the "Electric Chicken" drivers (AKA: EF-111 or Raven) used to love to fly over the local mall or office park parking lot and wink their ECM gear. The end result is that they would radically overload the photocells (with a few megawatts of RF) and most of the parking lot lights would turn off. There were also several cases where a local horse track kept getting winked and the scoreboard was "poofing" as a result (involving some major dollars being paid to the place). The funniest was the B-52 ECM officer who rope chaffed the horse track in the middle of a big race (there was some serious hell to pay when all the power went out as a result). -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 865 From: James M. Atkinson, Comm-Eng Date: Tue Jul 11, 2000 8:19pm Subject: RE: Streetlights out John, Many thanks for such a well written description of the operation of a sodium light I've already done the "light test", and the results were quite illuminating (forgive me). -jma At 2:51 PM -0500 7/11/00, John McCain wrote: >This discussion was getting so much fun, I hate to inject any facts, but >here goes... > >In an earlier electrical engineering career, amongst other things I >designed lighting . When we first started using HID lamps, we had to learn >how much to "over illuminate" to make up for the lamps that would cycle off >and back on without leaving the gym or shop area in dim darkness. I don't >remember the exact figure, but it was something like 10-20%. Here's a link >on HID lamps I quickly found on the web.. > http://www.misty.com/~don/dschtech.html and a quote... > >"7a. Why do aging sodium lamps sometimes cycle repeatedly on and off? > >The sodium vapor pressure is controlled by the temperature of the amalgam >reservoirs at the ends of the arc tube. As the lamp ages, the ends of the >arc tube get darkened, and they absorb light. This makes them hotter. >Therefore, the amalgam reservoirs get hotter. This increases the sodium >vapor pressure in the arc tube, leading to different electrical >characteristics. When this effect becomes excessive, the arc in the arc >tube goes out. The arc tube must cool before the vapor in it is thin enough >to restrike an arc. >Aging sodium lamps sometimes repeatedly turn on and off as the ends of the >arc tubes overheat, then cool off once the arc goes out. If a high pressure >sodium lamp repeatedly turns on and off, replacing the bulb with a new one >is usually all that is needed." > >That said, I used to often pass a specific street lamp that my vehicle >turns off. When there is a rain caused water puddle at a certain place, my >headlights reflect directly into the photocell on that individually >controlled light pole. Used to drive me crazy before I figured it out. >There's a dip that collects water, then a slight hill, and the pole is just >over the hill. If there had been no traffic through the puddle, its smooth >surface does a nice job of reflecting the street light into my eyes as well >as my headlamps the other way. > >It would be nice to hear the results from JMA's emission test though :) > >Cheers, >JohnM =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 866 From: James M. Atkinson, Comm-Eng Date: Tue Jul 11, 2000 8:27pm Subject: Re: Fwd: help with electronic sweep At 4:15 PM -0400 7/11/00, sleuthone@a... wrote: >(RE-POSTED--PLS RESPOND TO THE MSG ORIGINATOR) >In a message dated 7/11/00 12:49:15 PM, stevanjr@l... writes: > ><< Hello all: > > >I have an opportunity to bid on an electronic sweep to detect illegal > >transmitters and phone bugs for a very well-heeled corporate client. This > >could end up being a huge international contract, but it also may be a > >one-time job for one of the company's VPs. > So why not simply fork the project out to a competent TSCM firm in you area for a modest referral fee of 10-20%? You will have much less overhead, less liability, less aggravation, and you will not run the risk of embarrassing yourself with the client if you get caught trying to fool them. Unless you are a highly skilled TSCM person, with years of experience and a ton (literally) of equipment you should not consider offing sweeps to larger clients as the will eat you lunch. IMHO: The more well heeled the client the better they tend to be in detecting bullshit.... and the more likely you are to feel said heel being applied to your backside. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 867 From: James M. Atkinson, Comm-Eng Date: Tue Jul 11, 2000 8:31pm Subject: Re: Fw: [private-eye] help with electronic sweep In that part of the country you want to call either Rick Hoffman or Gordon Mitchell... both are very good and are highly recommended. For other recommendations for TSCM firms take a look at: http://www.tscm.com/goldlist.html -jma > >If this is something you are interested in and qualified for, send me a fax > >introducing yourself and detailing your qualifications. Please, no phone > >calls at this point because I simply don't have time right now to deal with > >a lot of phone calls. Although a lot of this is still vague, it may all > >happen pretty quickly. So far, I have the inside track on this opportunity, > >because of the recommendation of another client, but that may change in a > >heartbeat. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 868 From: Christopher E. Brown Date: Tue Jul 11, 2000 7:24pm Subject: RE: Streetlights out On Tue, 11 Jul 2000, Robert G. Ferrell wrote: > >Specifically, street lights going out as vehicle either approaches or > >after vehicle has sits in one location for a few minutes. > > Now that we've run the gamut of flippancy, I feel compelled to add my two cents' > worth. > > I have noticed for a number of years that sodium vapor lamps, one of the most > common street lighting fixtures on my part of the planet, are not lit steadily, > but instead turn on and off at regular intervals. I've always assumed this was > part of their normal operation, since most of 'em seem to do it. After having used sodium vapor lamps for deck lighting (commercial fishing), I can say its normal for an aging lamp. When you power the lamp there is a warm up stage, then it runs. If there is any interruption in power, or a sag below min the lamp will go out. Then back to warm up, then light. The older the lamp the more sensitive it is, and eventually they will will start cycling even without power issues, 30 sec - 5 min warmup, 5 - 30 minuet run time, dark. Repeat all night long, or until the bulb totally fails. As to outside triggers, many of our local lamps use a very cheap daylight sensor. Photo voltaic cell and control on a *plastic* box outside the main lamp (refit older lamps). Driving under one while operating 2M fm or ssb at 350watts will many times trigger the sensor. I expect the silly thing has no hold timer, and a fair bit of induced RF is getting through its total lack of shielding. The newer lamps with a built in unit don't have this issue. --- As folks might have suspected, not much survives except roaches, and they don't carry large enough packets fast enough... --About the Internet and nuclear war. 869 From: Bryan Herbert Date: Tue Jul 11, 2000 9:41pm Subject: Re: Another strange signal > The transmission format of the audio sample you sent is similar to our > local gas company's telemetry system. Have you tried decoding, if so > what modes have you used? > A Grudko wrote: > > > > Could you record some and send it? It may help indentify the > > thing... > > > > Pls. send me your eMail address - I'll send you a little .wav if > that > > works > > for you. > > > > Andy Grudko > > > > > ----------------------------------------------------------------------- > > > > > > ----------------------------------------------------------------------- > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > -- > Bryan Herbert KE6ZGP (661) 714-2611 > 25006 Walnut St #2 Newhall, Ca. 91321 > http://www.geocities.com/b_herbert_91321/index.html > AIM: EAVE5DR0P / ICQ: 23631907 / Yahoo: EAVE5DR0P > > > > ----------------------------------------------------------------------- > > ----------------------------------------------------------------------- > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- Bryan Herbert KE6ZGP (661) 714-2611 25006 Walnut St #2 Newhall, Ca. 91321 http://www.geocities.com/b_herbert_91321/index.html AIM: EAVE5DR0P / ICQ: 23631907 / Yahoo: LovinU4Life 870 From: James M. Atkinson, Comm-Eng Date: Wed Jul 12, 2000 9:19am Subject: Putting More Energy into Counterintelligence Putting More Energy into Counterintelligence http://www.washingtonpost.com/wp-dyn/articles/A5758-2000Jul8.html By Vernon Loeb Washington Post Staff Writer Monday, July 10, 2000 The Department of Energy's attempts to improve counterintelligence awareness training at the nuclear weapons laboratories have "failed dismally." Its polygraph program has yet to gain "even a modicum of acceptance." And its claims about fixing counterintelligence are "nonsense." So the House Permanent Select Committee on Intelligence opines in a report released last month on counterintelligence capabilities at Los Alamos, Lawrence Livermore and Sandia National Laboratories, citing a culture at all three facilities that is "profoundly antithetical toward counterintelligence and security." Weapons scientists at the labs take umbrage at such strong rhetoric, having played no small role in winning the Cold War. But the HPSCI report minces no words, bearing the indelible signature of its principal author, Paul Redmond, the straight-talking former CIA chief of counterintelligence. Redmond's conclusions about the lab's cultural problems seem predictable enough from someone with his background in spy hunting, as does his support for polygraph testing. But his report is interesting precisely because, in many other ways, it isn't predictable at all. He is harshly critical of the initiatives emanating from DOE headquarters but nonetheless credits the department for having made "a good but inconsistent start in improving its CI [counterintelligence] capabilities." He faults headquarters for producing CI training materials that were "bureaucratic, boring, turgid, and completely insufficient," yet he lauds Edward J. Curran, a career FBI counterintelligence expert now serving as DOE's counterintelligence chief, as "ideal" for the job "because of his extensive CI experience at the FBI, his rotational assignment at the CIA, and his persistence and determination." And far from signing off on every last "reform" initiative coming out of Congress, Redmond quotes Curran as opposing the new National Nuclear Security Administration (NNSA), created by Congress last year expressly to improve security and counterintelligence at the labs. Given the NNSA's semi-autonomous status within the DOE, Redmond writes, Curran believes "he will have only a policy role and no actual authority" over the labs' counterintelligence programs. As for the DOE's polygraph program, Redmond is an ardent proponent of the "lie detector" but concedes that there are "rational" reasons for scientists at the labs to oppose being polygraphed, since the tests invariably produce "false positives" - indications that people are lying when, in fact, they are not. The real culprits here are officials at DOE headquarters, Redmond argues,who initially proposed an overly broad polygraph program, appeared to flip-flop in scaling it back, and never succeeded in "explaining the importance and utility of the polygraph program" as a counterintelligence tool. Curran to Redmond: Flattery will get you nowhere Unfortunately for Redmond, the only participant in this raging debate over counterintelligence at the weapons labs blunter than he may be Curran himself. In a recent written rebuttal, Curran emphasizes a point Redmond makes but does not underscore - DOE's current CI program began with President Clinton's issuance of Presidential Decision Directive NSC 61 in February 1998. That was 13 months before the still contentious allegations of Chinese espionage at Los Alamos broke in the press and touched off a political furor among Clinton's Republican critics in Congress. The report of the HPSCI's Redmond panel, Curran said, "is poor counsel." Redmond's criticism of DOE's CI awareness training, Curran said, ignores virtually all of the department's substantive work, including 100 interviews with weapons scientists aimed making CI training more meaningful to them. The department has also used foreign defectors to lecture scientists on ways in which foreign intelligence services can be expected to target them when they travel abroad. And all traveling scientists, Curran said, are now briefed about CI threats before they travel to sensitive countries, and debriefed when they return. But Redmond's "most illogical guidance," according to Curran, came in his conclusion that DOE officials must "sell" the need for improved CI, not to mention the department's polygraph program, to scientists at the labs. Curran said 600 lab scientists have now taken DOE's polygraph "without one false positive result." The current program, which involves far fewer scientists than originally proposed, Curran added, takes into account 105 written comments and 87 oral comments from lab employees last year. "The research and knowledge involved in manufacturing nuclear weapons is vital to U.S. national security," Curran said. "The need to protect this information from unauthorized disclosure is self-evident, and the secretary of energy should not be placed in a position of asking 'Mother, May I' of the department's laboratories when he is implementing measures he deems appropriate to protect U.S. national security." Resisters beware Curran took a similarly hard-line stance in testimony last month before the Senate Armed Services Committee, saying polygraphs are necessary to unmask spies like former CIA officer Aldrich H. Ames. His words were warmly received. At the end of the hearing, Committee Chairman Sen. John Warner (R-Va.) asked him to send the committee documentation of polygraph resistance at the labs. The exchange rang alarm bells at the labs, where some scientists at Los Alamos's X Division, its nuclear warhead design facility, have signed an open petition to Energy Secretary Bill Richardson that says, "We believe that the vast majority of X-Division employees cannot justly be subjected to polygraphing." One scientist at Livermore asked in a widely disseminated email,"Is there any reason to think that the signatories to the polygraph petition will be part of a list of resisters to security measures that Ed Curran will submit to the United States Senate? If so, this has ominous overtones." Fueling the fire One of those leading the charge at the labs against polygraph screening is George W. Maschke, a former military intelligence officer and captain in the Army reserve who now works as a translator at the Iran-United States Claims Tribunal in The Hague. While not a weapons scientist, Maschke is in regular email contact with numerous lab employees, many of whom have read his critique of DOE's counterintelligence polygraph, "The Lying Game: National Security and the Test for Espionage and Sabotage" . Maschke, 36, is a fervent polygraph opponent, to say the least. He wanted to become an FBI agent specializing in counterterrorism but failed the bureau's pre-employment polygraph. While most of those who fail the test get hung up on questions about past recreational drug use, Maschke said the bureau concluded he had committed espionage: an FBI polygrapher told him he was lying when he denied ever passing classified information to unauthorized individuals. "I was one of the very few spies they've ferreted out," Maschke said. Maschke's main beef with the polygraph, he said, is that it's no more scientific than astrology. It's too easy for real spies to beat the test through simple countermeasures, he said, and it's so inaccurate that relatively large numbers of truthful subjects will inevitably be falsely accused of lying - so-called "false positives." Congress remains unpersuaded In the wake of the latest security scandal at Los Alamos involving two missing computer hard drives containing top secret nuclear weapons data that have since been found, the House voted recently to dock the pay of any Los Alamos employee who refuses to undergo a polygraph test. The House Armed Services Committee went even further, passing legislation requiring polygraphs for any lab scientists with access to unclassified but "restricted" data, which would mean thousands more employees would be subject to the test. Vernon Loeb, a Washington Post staff writer who covers national security issues, writes his biweekly IntelligenCIA column exclusively for washingtonpost.com. His newspaper column, Back Channels, is also carried by this Web site. Loeb answers questions from readers in monthly online discussions. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 871 From: James M. Atkinson, Comm-Eng Date: Wed Jul 12, 2000 9:28am Subject: Classified Work at DOE Lab Stopped July 10, 2000 Classified Work at DOE Lab Stopped http://www.lasvegassun.com/sunbin/stories/bw-exec/2000/jul/10/071000327.html ASSOCIATED PRESS YAKIMA, Wash. (AP) -- Classified work at the Pacific Northwest National Laboratory was temporarily halted after a secret document was mistakenly photocopied and left in an unsecured but locked office. The security breach occurred June 29 when an employee at the lab in Richland copied several unclassified drawings along with a classified one in a secure area, then took the papers to an office outside the secure area and left them locked up there, lab spokesman Greg Koller said Monday. The lapse was discovered the next day by another employee, and lab staff reported it to the U.S. Department of Energy, Koller said. The employee involved in the lapse was not disciplined. "These security concerns happen occasionally," Koller said. A security stand down, in which managers meet with staff to review security procedures involving classified projects, was ordered July 3. Some classified work has resumed and the remainder should start again later this week, Koller said. The security flap comes on the heels of the national uproar over a security breach at the Los Alamos National Laboratory in New Mexico. In May, a huge wildfire threatened the lab where two computer hard drives with information used to disable nuclear weapons went missing before the site was evacuated. The breach was not reported to DOE for more than three weeks. The hard drives later reappeared mysteriously in June. In December, former Los Alamos scientist Wen Ho Lee was charged with illegally copying top-secret nuclear weapons files. He is in jail awaiting trial. The Northwest lab is operated by Battelle for the DOE. It does classified work both at the Hanford nuclear reservation and at its main campus just south of the reservation. The incident occurred as a range fire swept across the nearby Hanford nuclear reservation, but the security lapse was unrelated to the blaze, Koller said. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== From: pvs4 Date: Wed Jul 12, 2000 9:15am Subject: Encryption keeps your state fair winning blue ribbion pie recipe, all yours . . . Found this very interesting: Maybe everyone should be more worried about Carnivore and Echelon than they think . . . in particular Corporate entities. "The FBI developed the Internet wiretapping system at a special agency lab at Quantico, Va., and dubbed it Carnivore for its ability to get to "the meat" of what would otherwise be an enormous quantity of data. FBI technicians unveiled the system to a roomful of astonished industry specialists here two weeks ago in order to steer efforts to develop standardized ways of complying with federal wiretaps. Federal investigators say they have used Carnivore in fewer than 100 criminal cases since its launch early last year. " See this link for the story: Links for Carnivore: This is the FBI's monitoring project http://www.msnbc.com/news/431355.asp Another good link: http://www.wired.com/news/politics/0,1283,37503,00.html http://cryptome.org/fbi-sucks2.htm Links for Echelon: This is the NSA's monitoring project http://www.jya.com Go to Cryptome, see echelon and review echelon archives Corporate Spying by the Government utilizing Government resources http://cryptome.org/gov-spy-com.htm David [Non-text portions of this message have been removed] 873 From: Dr. Pepper Date: Wed Jul 12, 2000 8:49am Subject: Re: Streetlights out Get real, , , , , , , , , The cost of all this equipment alone is such that no working stiff could afford it. ================================================= "James M. Atkinson, Comm-Eng" wrote: > Ok Folks... Here is your homework for the evening. > > Pull out a good log periodic, a nice squirrel cage Biconical, a > broadband loop,some matching low noise amps, and a spectrum analyzer. > > Haul them out to the local mall parking lot at midnight. > > Randomly select 25-30 such lights and take four traces (0-3 GHz) from > each. Each light should be at least 30-50 feet way from the building, > any other vehicles, overhead cables, and so on. > > Use a large sheet of copper as your ground plane (of at least 4 > square feet), and reference all of your equipment to that copper > sheet... be sure to use a transient limiter. > > For extra credit put a near field probe on a painters pole and place > it a foot away from the bulb, the bulb fixture, and the lamp post all > the way to the base (take GREAT care not to actually touch the bulb > or light socket). > > Also for extra credit shine a xenon light at the lamp for 30 seconds > while checking it with your near field probe. > > Post your results to the list. > > When in doubt... check it out... > > -jma > > At 1:25 PM -0500 7/11/00, Robert G. Ferrell wrote: > > >Specifically, street lights going out as vehicle either approaches or > > >after vehicle has sits in one location for a few minutes. > > > >Now that we've run the gamut of flippancy, I feel compelled to add > >my two cents' > >worth. > > > >I have noticed for a number of years that sodium vapor lamps, one of the most > >common street lighting fixtures on my part of the planet, are not > >lit steadily, > >but instead turn on and off at regular intervals. I've always > >assumed this was > >part of their normal operation, since most of 'em seem to do it. > > > >I have on a number of occasions perceived there to be some correlation between > >the proximity of my vehicle and the state of the lamp; however, I suspect that > >an objective analysis of the phenomenon would show no real cause and effect at > >work. > > > >I'm not necessarily suggesting that this is the relevant mechanism > >in your case, > >but it might be. If you drive under a light and it turns on/off at about the > >same time, it would be quite natural to want to connect the two events. There > >was one lamp that seemed to change state virtually every time I drove near it, > >yet I'm relatively certain that no unusual RF emissions were coming > >from my car > >(heck, the AM/FM radio didn't even work). > > > >Cheers, > > > >RGF > > > >Robert G. Ferrell, CISSP > > =================================================================== > Everybody's into computers... Who's into yours?Å > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > "By the pricking of my thumbs, something wicked this way comes." > - Macbeth, Shakespeare > =================================================================== > > ------------------------------------------------------------------------ > Still looking for the complete Application Server solution? > Find answers and a $75 gift certificate at the Intraware App Server > Webinar. Sign up at: > http://click.egroups.com/1/6756/1/_/507420/_/963343070/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- - - - Dr Pepper, aka Ron Cheshire, WB6GKI, 3537.26N/11740.02W China Lake, CA USA 90 miles West of Death Valley, 200 miles North of LAX - - - 874 From: James M. Atkinson, Comm-Eng Date: Wed Jul 12, 2000 10:02am Subject: Re: Carnivore and Echelon (was: Encryption...) (grin) I am more concerned about Klingons gaining access to federation warp core technology. -jma At 9:15 AM -0500 7/12/00, pvs4 wrote: >Found this very interesting: > >Maybe everyone should be more worried about Carnivore and Echelon >than they think . . . in particular Corporate entities. > >"The FBI developed the Internet wiretapping system at a special >agency lab at Quantico, Va., and dubbed it Carnivore for its ability >to get to "the meat" of what would otherwise be an enormous quantity >of data. FBI technicians unveiled the system to a roomful of >astonished industry specialists here two weeks ago in order to steer >efforts to develop standardized ways of complying with federal >wiretaps. Federal investigators say they have used Carnivore in >fewer than 100 criminal cases since its launch early last year. " > >See this link for the story: >Links for Carnivore: This is the FBI's monitoring project >http://www.msnbc.com/news/431355.asp > >Another good link: > >http://www.wired.com/news/politics/0,1283,37503,00.html >http://cryptome.org/fbi-sucks2.htm > >Links for Echelon: This is the NSA's monitoring project > >http://www.jya.com >Go to Cryptome, see echelon and review echelon archives > >Corporate Spying by the Government utilizing Government resources >http://cryptome.org/gov-spy-com.htm > >David =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 875 From: James M. Atkinson, Comm-Eng Date: Wed Jul 12, 2000 10:06am Subject: Re: Streetlights out At 6:49 AM -0700 7/12/00, Dr. Pepper wrote: >Get real, , , , , , , , , > >The cost of all this equipment alone is such that no working stiff >could afford it. > >= Perhaps Ron, but then again many of the TSCM'ers on this list have this exact equipment sitting on the bench ready to be deployed on a TSCM sweep on a moments notice. While no ORDINARY "working stiff" would have this equipment, a legitimate TSCMer would have it... and more... much more. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 876 From: Robert G. Ferrell Date: Wed Jul 12, 2000 10:19am Subject: Re: James Bond stuff >One of AT&T's projects >under development is a pair of Internet-accessible ski goggles with a >built-in wireless phone that would allow skiers to hold conversations, >transmit a video of their downhill descent or pull down a course map >projected onto a visor. Yep, I'm sure Michael Kennedy and Sonny Bono would have been early adopters of this technology... RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 877 From: Robert G. Ferrell Date: Wed Jul 12, 2000 10:21am Subject: RE: Streetlights out >"7a. Why do aging sodium lamps sometimes cycle repeatedly on and off? Ha! I thought so. Thanks for the info. RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 878 From: Date: Wed Jul 12, 2000 11:03am Subject: RE: Streetlights out re streetlights going out; when i was in college ,one of my friend's first jobs was repossessing [ repo'ing] cars for the local bank,from unwitting late payers. his associates became very adept at having light switches thrown at the power company ,in order to provide cover of darkness, for the reclaiming of property. HAVE A GREAT DAY !!! 879 From: DrPepper Date: Wed Jul 12, 2000 10:59am Subject: Re: Streetlights out OK, James, , , , , , , , Are you saying that you have a four ft square of copper sheet in your shop? Maybe you are a pro, after all, , , , , , :-} I've been doing this for about 35 years (since 1963), and I've never seen the need for such an item. And I really don't think that it's necessary. If you need such a ground plane, a large piece of wire window screen will work much better, but I've never had that much use for a large plane for an antenna to work against. Also, antenna designs are now such that a ground plane is just not required. As far as the other equipment is concerned, You forgot to mention the best and most effective equipment. YOUR EYES, and an inquireing mind. VR Ron C. aka Dr Pepper (no flames intended) aci@i... ========================================== "James M. Atkinson, Comm-Eng" wrote: > At 6:49 AM -0700 7/12/00, Dr. Pepper wrote: > >Get real, , , , , , , , , > > > >The cost of all this equipment alone is such that no working stiff > >could afford it. > > > >= > > Perhaps Ron, but then again many of the TSCM'ers on this > list have this exact equipment sitting on the bench ready to be > deployed on a TSCM sweep on a moments notice. > > While no ORDINARY "working stiff" would have this equipment, > a legitimate TSCMer would have it... and more... much more. > > -jma > > =================================================================== > Everybody's into computers... Who's into yours?Å > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > "By the pricking of my thumbs, something wicked this way comes." > - Macbeth, Shakespeare > =================================================================== > > ------------------------------------------------------------------------ > Still looking for the complete Application Server solution? > Find answers and a $75 gift certificate at the Intraware App Server > Webinar. Sign up at: > http://click.egroups.com/1/6756/1/_/507420/_/963415192/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- - - - Dr Pepper, aka Ron Cheshire, WB6GKI, 3537.26N/11740.02W China Lake, CA USA 90 miles West of Death Valley, 200 miles North of LAX - - - 880 From: James M. Atkinson, Comm-Eng Date: Wed Jul 12, 2000 0:24pm Subject: Re: Copper Ground Planes (was: Streetlights out) Ron, Government and commercial specifications require that many EMC, TEMPEST, TSCM, and related measurement be performed over a ground plane. The most common requirement is for a 24*24 or 48*48 solid copper sheet, but it varies to something larger at times. One specific measurement I perform periodically requires (by written specification) a copper sheet ground plane of at least 96 inches by 96 inches, which ends up being four 4 ft segments with beryllium-copper fingers around the edges (which then bolt together). In commercial EMC labs its common to see 2*2, 4*4, and larger copper sheets for their emission analysis requirement. In fact any of the TEMPEST measurements require the equipment to operated on a "Copper Top" table. Yes, I have a number of copper sheets that I can use including ones bonded to ultrablack panels. The largest that is practical to transport in the field are the 2*2 and 4*4 panels. Also, it is a tab bit tough to get a Active Rod antenna system to work unless you have a good ground plane (have you every tried running a clamp test without a ground plane) You are right about the EYES... a flashlight, a pair of eyes, and two calloused and well experienced hands can find more bugs then anything else. With that in mind I would point out that the equipment is only used to tell the eyes where to look. -jma At 8:59 AM -0700 7/12/00, DrPepper wrote: >OK, James, , , , , , , , > >Are you saying that you have a four ft square of copper sheet in your shop? >Maybe you are a pro, after all, , , , , , :-} > >I've been doing this for about 35 years (since 1963), and I've never seen >the need for such an item. And I really don't think that it's necessary. > >If you need such a ground plane, a large piece of wire window screen will >work much better, but I've never had that much use for a large plane for >an antenna to work against. Also, antenna designs are now such that a >ground plane is just not required. As far as the other equipment is concerned, >You forgot to mention the best and most effective equipment. YOUR EYES, >and an inquireing mind. > >VR >Ron C. aka Dr Pepper >(no flames intended) >aci@i... >========================================== =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 881 From: Robert G. Ferrell Date: Wed Jul 12, 2000 0:53pm Subject: Re: Carnivore and Echelon (was: Encryption...) >I am more concerned about Klingons gaining access >to federation warp core technology. I heard they already had it, but couldn't understand the documentation... ;-) RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 882 From: A Grudko Date: Wed Jul 12, 2000 1:40pm Subject: RF & streetlights ----- Original Message ----- From: Robert G. Ferrell > I have on a number of occasions perceived there to be some correlation between > the proximity of my vehicle and the state of the lamp; In the early days of 27 MHz CB I recall seeing guys with bulbs/diodes (?) on the end of their antennas which glowed when TXing. I have a 50ohm dummy load which is a normal 12v bulb fitted to a PL259 plug which lights when the TX is keyed. Neon striplight starter coils radiate RF noise and Kirlian (sp?) electro-photography uses RF or flux fields to get a 'picture' on light sensitive film. So - there is probably something out there - ask a light manufacturer. If nothing else it sounds like a great school science project for my daughter. For last one she studied bombs, including demonstrating how terrorists remote detonate IEDs (Garage door opener. RX CO output to 2 nails stuck in wire wool with 4 9v mini batteries in series.).... Andy Jo'burg 883 From: Date: Wed Jul 12, 2000 10:22am Subject: *INVESTIGATOR-PALM PILOT PROGRAM* CyberCop-Software has released a series of investigator/law enforcement specific applications for Palm OS users. Software Release Announcement CyberCop-Software has released a series of investigator/law enforcement specific applications for Palm OS users. CyberCop-Software is used by federal, state and local investigators, police officers, security professionals, analysts, compliance officers and private investigators, or anyone else who has a need for a professional investigative tracking system. Featured applications include real world, tested solutions designed to assist investigators in tracking and managing cases, leads, subpoenas, HealthCare Fraud investigations, net worth or non-accountable funds analysis, computer crime investigations, tracking alibis, discovering assets, evidence collection, mail covers, incident management, and many others. Applications Include Case Management Lead Management Alibi Management Subpoena Tracking Unaccountable Funds Analysis Computer Crimes Investigator's Checklist Vehicle Information Management Target Information Management Property Management Incident Management Location Management Uncovering Fraud through Bank Records Asset Discovery Business/Location Management Mail Cover Management Surveillance Management Firearms Management Evidence Processing Financial Records Discovery Background Investigations Medical Documents Medical Risk Areas Featuring the portable power of the Palm OS along with the dynamic, ever changing action of the professional investigator, CyberCop-Software focuses on the practical need of real-time, tried, and tested database applications to solve today's complicated investigative problems. CyberCop-Software relies on the combined input of its users to update and strengthen its already powerful suite of applications to aid investigators with resolving tomorrow's challenges. Ordering CyberCop-Software is as easy as going to http://www.cybercop-software.com/ and completing the easy-to-use order form. _____________________________ Questions should be addressed by calling 301-752-0787 or eMail to Info@c.... CyberCop-Software is copyright 2000. All rights reserved. 884 From: Oscar Date: Wed Jul 12, 2000 1:14pm Subject: FBI\'s System to Covertly Search E-Mail On Tue, 11 Jul 2000 20:47:07 -0700 Michael Pugliese wrote: Wall Street Journal - July 11, 2000 FBI's System to Covertly Search E-Mail Raises Legal Issues, Privacy Concerns By NEIL KING JR. and TED BRIDIS Staff Reporters of THE WALL STREET JOURNAL WASHINGTON -- The U.S. Federal Bureau of Investigation is using a superfast system called Carnivore to covertly search e-mails for messages from criminal suspects. Essentially a personal computer stuffed with specialized software, Carnivore represents a new twist in the federal government's fight to sustain its snooping powers in the Internet age. But in employing the system, which can scan millions of e-mails a second, the FBI has upset privacy advocates and some in the computer industry. Experts say the system opens a thicket of unresolved legal issues and privacy concerns. The FBI developed the Internet wiretapping system at a special agency lab at Quantico, Va., and dubbed it Carnivore for its ability to get to "the meat" of what would otherwise be an enormous quantity of data. FBI technicians unveiled the system to a roomful of astonished industry specialists here two weeks ago in order to steer efforts to develop standardized ways of complying with federal wiretaps. Federal investigators say they have used Carnivore in fewer than 100 criminal cases since its launch early last year. Word of the Carnivore system has disturbed many in the Internet industry because, when deployed, it must be hooked directly into Internet service providers' computer networks. That would give the government, at least theoretically, the ability to eavesdrop on all customers' digital communications, from e-mail to online banking and Web surfing. The system also troubles some Internet service providers, who are loath to see outside software plugged into their systems. In many cases, the FBI keeps the secret Carnivore computer system in a locked cage on the provider's premises, with agents making daily visits to retrieve the data captured from the provider's network. But legal challenges to the use of Carnivore are few, and judges' rulings remain sealed because of the secretive nature of the investigations. Issue briefing: Net Privacy * * * Internet wiretaps are conducted only under state or federal judicial order, and occur relatively infrequently. The huge majority of wiretaps continue to be the traditional telephone variety, though U.S. officials say the use of Internet eavesdropping is growing as everyone from drug dealers to potential terrorists begins to conduct business over the Web. The FBI defends Carnivore as more precise than Internet wiretap methods used in the past. The bureau says the system allows investigators to tailor an intercept operation so they can pluck only the digital traffic of one person from among the stream of millions of other messages. An earlier version, aptly code-named Omnivore, could suck in as much as to six gigabytes of data every hour, but in a less discriminating fashion. Still, critics contend that Carnivore is open to abuse. Mark Rasch, a former federal computer-crimes prosecutor, said the nature of the surveillance by Carnivore raises important privacy questions, since it analyzes part of every snippet of data traffic that flows past, if only to determine whether to record it for police. "It's the electronic equivalent of listening to everybody's phone calls to see if it's the phone call you should be monitoring," Mr. Rasch said. "You develop a tremendous amount of information." Others say the technology dramatizes how far the nation's laws are lagging behind the technological revolution. "This is a clever way to use old telephone-era statutes to meet new challenges, but clearly there is too much latitude in the current law," said Stewart Baker, a lawyer specializing in telecommunications and Internet regulatory matters. Robert Corn-Revere, of the Hogan & Hartson law firm here, represented an unidentified Internet service provider in one of the few legal fights against Carnivore. He said his client worried that the FBI would have access to all the e-mail traffic on its system, raising dire privacy and security concerns. A federal magistrate ruled against the company early this year, leaving it no option but to allow the FBI access to its system. "This is an area in desperate need of clarification from Congress," said Mr. Corn-Revere. "Once the software is applied to the ISP, there's no check on the system," said Rep. Bob Barr (R., Ga.), who sits on a House judiciary subcommittee for constitutional affairs. "If there's one word I would use to describe this, it would be 'frightening."' Marcus Thomas, chief of the FBI's Cyber Technology Section at Quantico, said Carnivore represents the bureau's effort to keep abreast of rapid changes in Internet communications while still meeting the rigid demands of federal wiretapping statutes. "This is just a very specialized sniffer," he said. He also noted that criminal and civil penalties prohibit the bureau from placing unauthorized wiretaps, and any information gleaned in those types of criminal cases would be thrown out of court. Typical Internet wiretaps last around 45 days, after which the FBI removes the equipment. Mr. Thomas said the bureau usually has as many as 20 Carnivore systems on hand, "just in case." FBI experts acknowledge that Carnivore's monitoring can be stymied with computer data such as e-mail that is scrambled using powerful encryption technology. Those messages still can be captured, but law officers trying to read the contents are "at the mercy of how well it was encrypted," Mr. Thomas said. Most of the criminal cases where the FBI used Carnivore in the past 18 months focused on what the bureau calls "infrastructure protection," or the hunt for hackers, though it also was used in counterterrorism and some drug-trafficking cases. www.ctrl.org DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance≠not soap-boxing≠please! These are sordid matters and 'conspiracy theory'≠with its many half-truths, mis- directions and outright frauds≠is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html Archives of CTRL@P... http://archive.jab.org/ctrl@listserv.aol.com/ ctrl ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] LISTSERV@L... To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] LISTSERV@L... Om *** NOTICE: In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. Feel free to distribute widely but PLEASE acknowledge the source. *** http://www.angelfire.com/mi/smilinks/thirdeye.html 885 From: Oscar Date: Wed Jul 12, 2000 2:07pm Subject: The Feds Can Read Your E-Mail Sorry for any crossposting. On Wed, 12 Jul 2000 08:47:13 -0500 n0bl3 10ng wrote: Why can't we read theirs?? Noble http://www.newsmax.com/articles/?a=2000/7/11/214653 The Feds Can Read Your E-Mail NewsMax.com Wednesday, July 12, 2000 First it was Echelon, the global eavesdropping system Uncle Sam and John Bull have been using to spy on satellite-transmitted phone calls, e-mails and fax messages. Now itís Carnivore, the FBIís newest electronic snooping device that can read your e-mail right off your mail server. Capable of scanning millions of e-mails a second, Carnivore can easily be used to monitor everybodyís e-mail messages and transactions, including banking and Internet commerce. If they want to, the feds can find out what books youíre buying online, what kind of banking transactions you conduct ñ in short, everything you do when you go online and send e-mail, whether private or commercial. The FBI has been quietly monitoring e-mail for about a year. Two weeks ago the feds went public and explained the high-tech snooping operation to what the Wall Street Journal called "a roomful of astonished industry specialists." According to the bureau, theyíve used Carnivore ñ so called because it can digest the "meat" of the information they're looking for ñ in less than 100 cases, in most cases to locate hackers but also to track terrorist and narcotics activities. But there is nothing to stop Carnivore from making a meal of your e-mail messages and transactions if they decide thatís what they want to do and can get a judge to issue a court order allowing them to tap your e-mail as they would your phones. Thatís scant comfort considering the underhanded means the feds employed to get court orders to raid the Branch Davidian compound, or to win a judgeís permission to stage what amounted to an illegal armed raid on Elian Gonzalezís Miami home. Carnivore is nothing but a store-bought personal computer with special software that the FBI installs in the offices of Internet service providers (ISPs). The computer is kept in a locked cage for about a month and a half. Every day an agent comes by and retrieves the previous dayís e-mail sent to or by someone suspected of a crime. But critics say that Carnivore, like some ravening beast, is simply too hungry to be trusted ñ that it gives the feds far too much access to too much private information. "This is more of a vacuum cleaner-type approach ñ it apparently rifles through everything," David Sobel, general counsel for the Electronic Privacy Information Center, told Fox News. "It's potentially much more invasive than telephone surveillance." Carnivore could conceivably monitor all the e-mail that moves through an ISP ñ not merely messages sent to or from the subject allegedly being monitored. Critics compare it to eavesdropping on all the phones in a neighborhood simply to zero in on just one phone. Disturbingly, the FBI has prevailed in challenges against forcing ISPs to allow Carnivore to be installed in their offices. According to the Wall Street Journal, one unidentified ISP put up a legal fight against Carnivore early this year and lost. The FBI defends Carnivore, insisting it is used selectively and monitors only the e-mail of the subject. They say that messages belonging to those not being probed, even if criminal, would not be admissible in court. "The volume of e-mail in a location is generally fairly small and being managed by a small number of e-mail servers on a fairly low-speed network," said Marcus Thomas, chief of the FBI's cyber technology section. "The system is not unlike 'sniffers' used within the networks every day." That fails to satisfy critics such as Sobel. He says Carnivore is similar to Russia's surveillance system, called "SORM," which all Russian ISPs are forced to install to allow the government to spy on whomever it chooses. Itís also similar, he says, to the notorious Echelon, the National Security Agencyís global eavesdropping system, which intercepts telecommunications transmissions from around the world and looks for keywords that could indicate illegal activity. "Carnivore is really the latest indication of a very aggressive stance that the bureau is taking in collecting as much information as technically possible," Sobel said. FBI spokesman Paul Bresson insists that law-abiding citizens have nothing to fear from Carnivore. "Anytime we develop a system, we're basically balancing the interests of national security against that of the privacy of the public," he said. "This issue's always going to come up. We're always going to get questions. We understand that."

Why can't we read theirs??
 
Noble
 
 
The Feds Can Read Your E-Mail
NewsMax.com
Wednesday, July 12, 2000
First it was Echelon, the global eavesdropping system Uncle Sam and John Bull have been using to spy on satellite-transmitted phone calls, e-mails and fax messages. Now itís Carnivore, the FBIís newest electronic snooping device that can read your e-mail right off your mail server.

Capable of scanning millions of e-mails a second, Carnivore can easily be used to monitor everybodyís e-mail messages and transactions, including banking and Internet commerce. If they want to, the feds can find out what books youíre buying online, what kind of banking transactions you conduct ñ in short, everything you do when you go online and send e-mail, whether private or commercial.

The FBI has been quietly monitoring e-mail for about a year. Two weeks ago the feds went public and explained the high-tech snooping operation to what the Wall Street Journal called "a roomful of astonished industry specialists."

According to the bureau, theyíve used Carnivore ñ so called because it can digest the "meat" of the information they're looking for ñ in less than 100 cases, in most cases to locate hackers but also to track terrorist and narcotics activities.

But there is nothing to stop Carnivore from making a meal of your e-mail messages and transactions if they decide thatís what they want to do and can get a judge to issue a court order allowing them to tap your e-mail as they would your phones.

Thatís scant comfort considering the underhanded means the feds employed to get court orders to raid the Branch Davidian compound, or to win a judgeís permission to stage what amounted to an illegal armed raid on Elian Gonzalezís Miami home.

Carnivore is nothing but a store-bought personal computer with special software that the FBI installs in the offices of Internet service providers (ISPs).

The computer is kept in a locked cage for about a month and a half. Every day an agent comes by and retrieves the previous dayís e-mail sent to or by someone suspected of a crime.

But critics say that Carnivore, like some ravening beast, is simply too hungry to be trusted ñ that it gives the feds far too much access to too much private information.

"This is more of a vacuum cleaner-type approach ñ it apparently rifles through everything," David Sobel, general counsel for the Electronic Privacy Information Center, told Fox News.

"It's potentially much more invasive than telephone surveillance."

Carnivore could conceivably monitor all the e-mail that moves through an ISP ñ not merely messages sent to or from the subject allegedly being monitored. Critics compare it to eavesdropping on all the phones in a neighborhood simply to zero in on just one phone.

Disturbingly, the FBI has prevailed in challenges against forcing ISPs to allow Carnivore to be installed in their offices. According to the Wall Street Journal, one unidentified ISP put up a legal fight against Carnivore early this year and lost.

The FBI defends Carnivore, insisting it is used selectively and monitors only the e-mail of the subject. They say that messages belonging to those not being probed, even if criminal, would not be admissible in court.

"The volume of e-mail in a location is generally fairly small and being managed by a small number of e-mail servers on a fairly low-speed network," said Marcus Thomas, chief of the FBI's cyber technology section.

"The system is not unlike 'sniffers' used within the networks every day."

That fails to satisfy critics such as Sobel. He says Carnivore is similar to Russia's surveillance system, called "SORM," which all Russian ISPs are forced to install to allow the government to spy on whomever it chooses.

Itís also similar, he says, to the notorious Echelon, the National Security Agencyís global eavesdropping system, which intercepts telecommunications transmissions from around the world and looks for keywords that could indicate illegal activity.

"Carnivore is really the latest indication of a very aggressive stance that the bureau is taking in collecting as much information as technically possible," Sobel said.

FBI spokesman Paul Bresson insists that law-abiding citizens have nothing to fear from Carnivore. "Anytime we develop a system, we're basically balancing the interests of national security against that of the privacy of the public," he said.

"This issue's always going to come up. We're always going to get questions. We understand that."

*** NOTICE: In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. Feel free to distribute widely but PLEASE acknowledge the source. *** http://www.angelfire.com/mi/smilinks/thirdeye.html 886 From: James M. Atkinson, Comm-Eng Date: Wed Jul 12, 2000 3:23pm Subject: Re: The Feds Can Read Your E-Mail At 7:07 PM +0000 7/12/00, Oscar wrote: >Sorry for any crossposting. > >On Wed, 12 Jul 2000 08:47:13 -0500 n0bl3 10ng wrote: >Why can't we read theirs?? > What makes you think we don't read their Email? ;-) (just kidding folks... don't get your LEO shorts in a bunch). Postings regarding "look how evil the government is" are just a tad inappropriate for this forum (there are a bunch of ex-gvt types on the list). Of course we're interested in surveillance, but primary the type based around bugging devices, wiretaps, and so on. So long as the government is using a surveillance technology, product, and device in accordance with the law the list strongly applauds its development and usage. James M. Atkinson List Moderator =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 887 From: James M. Atkinson, Comm-Eng Date: Wed Jul 12, 2000 3:27pm Subject: High-tech research chilled by spy fears High-tech research chilled by spy fears http://www.digitalmass.com/news/daily/07/11/spy_fears.html By David Abel, Globe Correspondent, 7/11/2000 Mounting fears of spies stealing the nation's high-technology secrets are beginning to take a toll at prominent research universities such as MIT, where foreign students and researchers are often barred from helping to build software, satellites, and other sophisticated items. More than a year ago, in the wake of security breaches at the Los Alamos National Laboratory in New Mexico and a spate of other perceived compromises of US national security, Congress moved to shore up defenses against the export of sensitive technical information. But now, an increasingly vocal chorus of professors, scientists, and company officials argues that the new regulations jeopardize the traditional collaboration between universities, corporations, and government, isolate US scientists from foreign scientists, and could severely inhibit innovation. At the Massachusetts Institute of Technology in Cambridge, which receives more than $150 million for research from the Pentagon and the US Department of Energy, the problem so far has been fear of the unknown. No foreign students or professors have been removed from security-sensitive research projects. But MIT officials recently declined to submit proposals for two NASA-related projects out of concern the university could not do the work without violating the law. ''There's a chilling atmosphere that has caused a lot of anxiety,'' said Julie Norris, director of MIT's Office of Sponsored Programs. ''What we need are clear rules. So everyone, including industry, knows what they can and cannot do.'' The main problem, university officials say, is that the new rules do not clearly define sensitive research. And the ambiguity breeds trepidation: Scientists and military contractors, who often sponsor university research, will not risk the stiff penalties, with jail sentences of up to 10 years and fines nearing $1 million. The law changed in March when Congress moved oversight of satellite technology from the Commerce Department to the State Department. Research unhindered by the Commerce Department is now subject to the State Department's International Traffic in Arms Regulation. The result: Exemptions for basic research no longer apply and scientific satellites, related data, software, and components, are considered military munitions. Now, universities are required to apply for export licenses if they want to include foreign students, professors, or researchers in such work as a Jupiter probe or a communications satellite. But the long wait for a license, the ambiguity over what constitutes sensitive research, and a de facto limit on foreign participation undermines many sophisticated projects, university and NASA officials contend. Scientists and companies also fear prosecution for even the unintentional transfer of unclassified technical data - such as in a phone conversation - with scientists from 10 blacklisted countries, including China, Taiwan, Israel, Pakistan, and India. In a letter sent last month to President Clinton's chief science adviser, Neil Lane, the presidents of three organizations that lobby Washington officials on behalf of universities called on the administration to review or clarify the new regulations. They are ''already having an adverse impact on university research ... some existing projects may be unable to go forward,'' stated the letter, signed by Nils Hasselmo, president of the Association of American Universities, and two others. ''University counsels have been unable to reach a common understanding of the current requirements, as advice given by various agencies tends to be different.'' For their part, State Department officials say the regulations are clear and should not obstruct research. But they promise to work with university officials and companies to resolve ambiguities. Still, meetings held last month with MIT and other university representatives, NASA, and State Department officials have failed to resolve the tension. ''A lot of people are twitching over this policy,'' said Claude Canizares, director of MIT's Center for Space Research, who attended the Washington meetings. ''People are worried and upset by how it's affecting research.'' In testimony before Congress, Hasselmo and others last month recounted a list of problems universities have experienced under the new regulations. In one case, NASA would not authorize a university scientist to travel to Europe to help fix a glitch on a major international space-exploration project, despite its cost to the US space agency of about $1 million a day. In another case, a Turkish graduate student studying at a US university has been hampered in developing a new type of rocket fuel. Midway through the research, the corporate sponsor required the student to apply for a State Department license before receiving more money. And, in a third case, NASA suspended a review of work the agency commissioned from a Chinese post-doctorate student on a ''gravity probe'' until the student received a license. ''The biggest problem to me is the new regulations scare people away from even participating,'' said General Spence M. ''Sam'' Armstrong, a senior adviser to NASA's administrator, who has fielded questions on the new law from schools including Stanford University, the University of Maryland, Ohio State University, and MIT. ''What we have lost is not exactly clear yet. But the most alarming thing is if people are being deterred from joining in the research.'' Those against the new regulations, such as Armstrong and Hasselmo, recognize the need for limits on the dissemination of technical research. But, they say, protecting such sensitive information from falling into the wrong hands is not complicated. They support a relatively simple means of ending the ambiguities: Classify sensitive research as secret. Other technical data, they say, should be free-flowing. Eugene Skolnikoff, a retired MIT political science professor who specializes in technology transfer issues, said the government must redress the fallout on scientists from its effort to ward off spies. ''The biggest problem I see now is the climate of fear,'' he said. ''Scientists shouldn't be wary about collaboration. That's not an effective policy.'' =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 888 From: Miguel Puchol Date: Wed Jul 12, 2000 4:22pm Subject: RE: The Feds Can Read Your E-Mail Just one question... > The Feds Can Read Your E-Mail ...how, without the ISPs full cooperation??? What about foreign ISPs??? Cheers, Mike 889 From: James M. Atkinson, Comm-Eng Date: Wed Jul 12, 2000 7:14pm Subject: RE: The Feds Can Read Your E-Mail At 11:22 PM +0200 7/12/00, Miguel Puchol wrote: >Just one question... > > > The Feds Can Read Your E-Mail > >...how, without the ISPs full cooperation??? What about foreign ISPs??? > >Cheers, > >Mike By simply tapping or sniffing the line that you use to download your Email, or by obtaining your password and then logging into the SMTP server and reading the Email (this can usually be done from a remote machine). On a side note... It is actually quite simple to remotely download a persons Email... if you don't delete the mail from the server they will never know you grabbed the Email. Also, many ISP's spool the mail into publicly readable directories that anybody can access (if you know where to look). Generally all you need to pull off something like that is a shell account on the same machine that your target... no special passwords... no deception is required. Piece of cake... -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 890 From: Charles Patterson Date: Wed Jul 12, 2000 5:30pm Subject: Re: RF & streetlights Not that I do this for fun on a regular basis but... I was interesting to note how my 2 meter ham rig (10 watts) would trip some car alarms as I drove by, it would also disable EZ-Pass toll machines too. I learned to stop transmitting until after I made it through the toll booths. Charles ----- Original Message ----- From: "A Grudko" To: Sent: Wednesday, July 12, 2000 2:40 PM Subject: [TSCM-L] RF & streetlights > > ----- Original Message ----- > From: Robert G. Ferrell > > I have on a number of occasions perceived there to be some correlation > between > > the proximity of my vehicle and the state of the lamp; > > In the early days of 27 MHz CB I recall seeing guys with bulbs/diodes (?) on > the end of their antennas which glowed when TXing. I have a 50ohm dummy load > which is a normal 12v bulb fitted to a PL259 plug which lights when the TX > is keyed. Neon striplight starter coils radiate RF noise and Kirlian (sp?) > electro-photography uses RF or flux fields to get a 'picture' on light > sensitive film. So - there is probably something out there - ask a light > manufacturer. > > If nothing else it sounds like a great school science project for my > daughter. For last one she studied bombs, including demonstrating how > terrorists remote detonate IEDs (Garage door opener. RX CO output to 2 nails > stuck in wire wool with 4 9v mini batteries in series.).... > > Andy > Jo'burg > > > ------------------------------------------------------------------------ > Need technology solutions for your business? > Respond.com will Help! > http://click.egroups.com/1/6829/1/_/507420/_/963429458/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 891 From: Oscar Date: Wed Jul 12, 2000 4:09pm Subject: Re: The Feds Can Read Your E-Mail On Wed, 12 Jul 2000 16:23:46 -0400 "James M. Atkinson, Comm-Eng" wrote: Of course we're interested in surveillance, but primary the type based around bugging devices, wiretaps, and so on. So long as the government is using a surveillance technology, product, and device in accordance with the law the list strongly applauds its development and usage. ======================= am i to assume that the fairness of a particular law [or lack thereof] is not discussable here? 892 From: Date: Wed Jul 12, 2000 5:06pm Subject: Re: Digest Number 305 I am certain there must be some link between the Federation warp core technology leaking the the Klingon Empire, and the Streetlights mysteriously offing themselves. Although at this time, the connection escapes me. (Smirk). Shin shin, shin gan. Negative-. 893 From: Miguel Puchol Date: Thu Jul 13, 2000 2:48am Subject: RE: The Feds Can Read Your E-Mail Hi James, > By simply tapping or sniffing the line that you use to download your > Email, or by obtaining your password and then logging into the SMTP > server and reading the Email (this can usually be done from a remote > machine). Would that not be classified as wiretapping? Court order, etc. etc. > On a side note... It is actually quite simple to remotely download a > persons Email... if you don't delete the mail from the server they > will never know you grabbed the Email. True, but to massively obtain each of the account holder's passwords means a very serious breach of security for any ISP, I imagine someone would have noticed by now and the cryout would be inmense - unless all this has just started to happen, in which case we can sit and wait with some popcorn :-) > Also, many ISP's spool the mail into publicly readable directories > that anybody can access (if you know where to look). Publicly from the ISPs internal network or from any outside machine? I wasn't aware of this. > Generally all you need to pull off something like that is a shell > account on the same machine that your target... no special > passwords... no deception is required. Agreed, but then again, isn't this classed as something rather illegal when done massively, as it is said 'Carnivore' does? It's just that here in Spain the State has some powers but they can in no way go as far as it has been said the FBI ones do. All the best, Mike 894 From: Robert G. Ferrell Date: Thu Jul 13, 2000 8:29am Subject: Re: RF & streetlights >Not that I do this for fun on a regular basis but... >I was interesting to note how my 2 meter ham rig (10 watts) would trip some >car alarms as I drove by, it would also disable EZ-Pass toll machines too. >I learned to stop transmitting until after I made it through the toll >booths. Great. So now we have a denial of service attack for smart toll booths. This could open up a whole new area of hacking/phreaking. We could call it toll-hacking, or 'thacking.' RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 895 From: Robert G. Ferrell Date: Thu Jul 13, 2000 8:38am Subject: RE: The Feds Can Read Your E-Mail >By simply tapping or sniffing the line that you use to download your >Email, or by obtaining your password and then logging into the SMTP >server and reading the Email (this can usually be done from a remote >machine). Folks, email is transmitted using SMTP, which by design only accepts ASCII characters. In other words, unless you arrange otherwise, your email flies around the world in plain text, available for reading by anyone who cares to intercept it. If the idea that someone may be reading your email bothers you, I suggest you at the very least use some asymmetric encryption technology such as PGP to make your messages a little more private. Cheers, RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 896 From: Robert G. Ferrell Date: Thu Jul 13, 2000 8:42am Subject: Re: RF & streetlights >For last one she studied bombs, including demonstrating how >terrorists remote detonate IEDs (Garage door opener. RX CO output to 2 nails >stuck in wire wool with 4 9v mini batteries in series.).... Been dipping into the Anarchist's Cookbook, have we? ;-) RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 897 From: Hoffman Date: Thu Jul 13, 2000 8:07am Subject: Informative wiretap site. I'm not sure if anyone has posted this site yet, but I find it quite interesting. It pertains to a longstanding debate about the alleged misconduct of police wiretapping in California for using illegal practices known as "hand-offs", and also the misconduct of the prosecutor who has failed to provide 'notice', as required by law. Also alleged, is the gross intentional underreporting of statistics (also required by law) so as to deceive and hide the misconduct. The site is hosted by the L.A. Public Defenders office. There is adequate documentation at this site to take the matter seriously. It also is a good resource site because it has some good background info on the legal aspects of wiretapping. - hoffman@n... - 898 From: James M. Atkinson, Comm-Eng Date: Thu Jul 13, 2000 11:42am Subject: The Wonderfully Logarithmic World of Gain Since I keep getting questions from people on Gain I thought it would be best to post the materials to the list. 1) When I set up equipment for a TSCM survey I like to use a gain factor of 48 or 50 dB. 2) What this means is that the sum of all of the gain, noise levels, cable losses, filter losses, and so on between the antenna and the instrument turn out to be at least 48 dB. 3) If we look at a low gain antenna of say 3-4 dB log we have to "punch it up" quite a bit to obtain the gain we are seeking. 4) On the other hand a nice octave microwave feed horn can have a gain of 35-40 dB, if you add a reflector then the gain can skyrocket to well over this. 5) Of course we have to back out the noise figure of all amplifiers, and take into account the attenuation caused by all cables and connectors. To deal with this I like to use RG-214 cable, N-Type connectors, an low noise lab grade pre-amplifiers for anything below X-Band. Above X-band I stay with SMA or mm connectors and rigid/semi-rigid cables. 6) Take the following for example: A typical pyramidal antenna with a gain of 17 dB in the 2.4 GHz band. Add to that a 25 dB preamplifier on the horn we get a total gain so far of 42 dB. Subtract 4.5 dB due to connector losses, and 2.5 dB for the noise figure of the pre-amp with drops our effective gain down to 35 dB. Now run the signal from the antenna platform though as short and as low loss a cable as possible, preamp it again (by 20-25 dB) and squirt it into your SA or receiver. Just take great care not to saturate your antenna or any of the amplifiers or you will have to filter and/or attenuate some of the signal to keep your equipment happy. 7) Of course your can then back it off the amps as needed, but's it better to have more then enough signal, then not enough. 8) I like to use cables that are as short as possible, and move my antenna's around during the sweep to maximize polarization, angle, and distance to the emitter. 9) In some cases I have actually modified the antenna (say a 200-500 MHz hand held Log) and have added a battery powered 32 dB LNA preamp and bandpass filter right on the antenna (which replaces the balun). I then dump the signal into a 6-12 foot piece of RG-214 cable (with a soldered connection on the antenna end, and a N-Type connector on the SA end). The signal is then dumped into an SA where it hits another 22 dB preamp (which can be turn off). By keeping the bandwidth so narrow we maximize gain. The computer that runs the SA can then hunt for peaks using narrow BW filters, and all of those little SAW toys sold at Spy-Shops have no place to hide. 10) I have also found it helpful to start a TSCM sweep with a "Paper Clip Antenna" on the SA, then shift to a Condor rubber ducky, and then a small spiral log each connected directly to the SA connector (with no cables or adapters involved). This way you can see if there is anything that could saturate your "big antenna" or amplifiers. I cant the SA at 45 degrees and slowly rotate it around it's axis to maximize polarization. Of course your mileage may vary. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 899 From: andre holmes <1ach@g...> Date: Thu Jul 13, 2000 0:44pm Subject: Carnivore Carnivore = Capability to read millions of email and other information of many Internet subscribers. It was reported in the first post from OSCAR that Carnivore would be used against a crime suspect with a court order and would be used in that fashion only. I dont see blowing the capabilites of Carnivore out of porportion. Monitoring of Internet information is being conducted overseas by Govts so it was a matter of time for the same to happen here in the USA. [Non-text portions of this message have been removed] 900 From: James M. Atkinson, Comm-Eng Date: Thu Jul 13, 2000 2:53pm Subject: Some Defectors 'Out in the Cold' Paris, Wednesday, July 12, 2000 Some Defectors 'Out in the Cold' http://www.iht.com/IHT/TODAY/WED/IN/cia.2.html People Who Spied for U.S. Accuse the CIA of Reneging on Deals By Vernon Loeb Washington Post Service WASHINGTON - During the Cold War, the diplomat and his wife were prized recruits. If they just stayed in place and spied against their Soviet bloc homeland for a while longer, the Central Intelligence Agency promised, they would eventually get new names and comfortable lives in the United States. They wanted to defect immediately but felt they could not say no to the CIA. So they committed espionage, risking their lives. Now, years later and half a world away, the couple is virtually penniless in Seattle and suing the CIA, claiming that the agency reneged on the deal and cut off their $27,000 annual stipend. ''They feel betrayed,'' said Steven Hale, their attorney. ''The CIA promised they would have health insurance and financial security for a lifetime, and they declined it for as long as they were able to earn a living. And now the agency has given them nothing, zero - the back of the hand.'' The couple's lawsuit is the latest chapter in the CIA's long and troubled history with defectors who come to the United States in return for spy services rendered abroad - and often come to feel ignored, abused, even cheated by their CIA handlers. There was Viktor Gundarev, a KGB colonel who defected in 1986 and came close to redefecting three years later because he felt misled and mistreated by his CIA handlers. And just last year, there was Viktor Sheymov, a KGB major and computer guru who charged publicly that CIA officials never paid him much of the $1 million promised when he defected in 1980. The CIA's critics have complained for years that the agency shortchanges defectors from the very start, making them sign resettlement agreements they cannot understand, cheating them on routine expenses and changing the terms in midstream. ''It is stupidity, just plain stupidity,'' said William Geimer, a former State Department attorney and president of the Jamestown Foundation, a group that was founded in the early 1980s to work with defectors and that has fought more than its share of battles with CIA officials. Shaking his head over the latest court battle, involving the Seattle couple and their $27,000 a year stipend, Mr. Geimer wondered how the CIA could hope to coax future defectors out of countries like Iraq and North Korea. ''The way to do that is to let them know that defectors have a good life here,'' Mr. Geimer said, attributing the agency's behavior to a combination of bureaucratic indifference, legal arrogance and cultural elitism in which CIA officers resent having to ''baby-sit cantankerous Soviets.'' Mr. Sheymov, who reached a settlement with the CIA last autumn and now runs a computer security company called Invicta Networks, said defectors faced daunting problems even under the best of circumstances. ''It is very, very difficult, take my word for it,'' he said last week in an interview. ''You have a hard time making people understand what you want and understanding what they want.'' CIA officials acknowledge some past problems with the defector program. But they insist that the vast majority of defectors are treated well, receive princely compensation packages and assimilate into American society without unnecessary complications. ''These are not people we hold in low regard,'' said one senior intelligence official. ''These are people we genuinely believe are heroes. We accept them under public law as defectors, we give them a new name, and they start their lives over again. It is a tremendously traumatic experience.'' Federal law allows the director of central intelligence to bring as many as 100 defectors a year into the country and to grant them immediate citizenship when it ''is in the interest of national security or essential to the furtherance of the national intelligence mission.'' In practice, defector status is usually granted to those who have spied diligently for the United States - and there appears to be no shortage of applicants, even 10 years after the end of the Cold War. The CIA takes care of several hundred defectors - the exact number is a secret - and is adding new ones at a steady clip that has not changed much over the last two decades, intelligence officials said. But instead of a diplomat, a typical defector today is someone who has provided information on terrorists, drug traffickers, weapons merchants or ''transnational'' criminals. ''We're not wanting for business,'' a senior intelligence official said. ''People aren't thinking that they're going to be treated shabbily here and, therefore, that they won't cooperate.'' But the CIA's promises to defectors do vary. Without commenting directly on the Seattle couple's lawsuit, intelligence officials say the only lifetime obligation the CIA routinely incurs with defectors is to ensure their safety, beginning with new identities upon arrival. Compensation is another matter. All defectors sign secret contracts providing them with resettlement benefits that can include lump-sum payments, annual stipends and help with health insurance, housing and education. Although some benefits are conferred for life, officials said, most are designed to keep defectors off welfare and aid their assimilation over a 10-year period of adaptation. What a defector gets, they say, is based on what a defector gives - the better the secrets, the better the package of money and assistance. The Seattle couple, identified in court papers only as John and Jane Doe, signed an initial agreement in the early 1980s entitling them to health insurance benefits and an annual stipend that grew over time from $20,000 to $27,000. They lost those benefits when the husband went to work, having signed a contract modification at the CIA's request calling for benefits to be terminated in the event of employment. Even so, a CIA official assured them at the time that, if needed, ''the agency would always be there.'' But when the husband, in his late 50s and suffering from health problems, lost his job in early 1997, the CIA refused to restart the couple's cash stipend and health benefits, saying the agency's obligations were over. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 901 From: James M. Atkinson, Comm-Eng Date: Thu Jul 13, 2000 4:11pm Subject: DOE gets chewed out by House panel http://search.newschoice.com/GPC_StoryDisplay.asp?story=d:\index\newsarc hives\angts\fpg\20000712\345190_t1as612.txt&searchtext=nuclear">http://search. newschoice.com/GPC_StoryDisplay.asp?story=d:\index\newsarchives\angts\fpg\2000 0712\345190_t1as612.txt&searchtext=nuclear DOE gets chewed out by House panel July 12, 2000 By Lisa Friedman WASHINGTON BUREAU WASHINGTON -- Hamburger flippers at MacDonalds, clerks at 7-Eleven and librarians at the Menominee, Mich., public library all keep better track of their inventories than Department of Energy officials do with the nation's nuclear arsenal, members of Congress charged Tuesday. One after another, both Republicans and Democrats at a House Commerce oversight hearing criticized DOE leaders as well as the directors of Los Alamos and Sandia national laboratories in New Mexico and California's Lawrence Livermore laboratory. The verbal poundings were part of federal lawmakers' ongoing attempts to get to the bottom of security scandals that have plagued the labs, particularly Los Alamos, for months. "I'm getting tired of having these hearings and not finding out who is responsible for these things," said Rep. Greg Ganske, R-Iowa. Few answers surfaced Tuesday, but federal auditors did reveal a decade-long pattern of weakened security at the DOE. Fueled by a post-Cold War mood that called for more relaxed policies, minimum requirements for safeguarding secret documents were watered down or scrapped altogether beginning in 1992. Lab employees no longer had to write unique identifying numbers on papers or receive written approval before copying information. Inventories were performed annually instead of twice a year. Scientists no longer had to verify each night that all top secret documents had been returned to the vault before they went home. The changes reduced security costs and produced the then-desired "openness" at DOE laboratories. But over time, lab directors warned that the pendulum had swung too far. "Where is the road back?" asked C. Paul Robinson, director of Sandia National Laboratory. He and the other DOE officials vowed to find it. Among a set of recommendations made Tuesday was to reinstitute requirements for a formal accountability system for certain types of classified information. Other proposals included: Establishing clear guidelines for determining the importance of sensitive information. Clarifying the DOE's need-to-know policy to better limit access to information. Expand drug-testing and medical evaluations to ensure that everyone who handles nuclear secrets as well as weapons is "reliable and fit for duty." Legislators Tuesday were skeptical of the recommendations. They noted a decade of weakened standards were still no excuse for the spate of security fiascos. The latest debacle occurred at Los Alamos, where a computer hard drive containing information about nuclear terrorism vanished, only to reappear behind a photocopier days later. Investigators have largely ruled out espionage, blaming the incident on careless staff and potentially criminal coverups. But the fact that the hard drives were lost, not stolen, hasn't seemed to placate legislators. "I don't think we should celebrate the fact that they were lost. I think we should be terrified," said Rep. Brian Bilbray, R-San Diego. The University of California, which has managed the laboratories for more than 50 years, has taken much of the blame for security lapses. Several members of Congress have called for Energy Secretary Bill Richardson to tear up the university's contract, and several continued that call on Tuesday. The DOE recently announced that critical changes indeed will be made to UC's contract. The agency plans to hire a private outside firm to manage security, while the university will maintain authority over scientific work. The arrangement is still being ironed out, but several members of Congress said they are already skeptical. The Department of Energy already has created a sub-agency specifically to oversee security at the labs, but no one knows yet how a private agency will fit into the scheme of things. Rep. Bart Stupak, D-Michigan, called the changes "cosmetic" and "another disaster waiting to happen," while Rep. Heather Wilson, R-New Mexico, said the plan "sounds pretty dysfunctional to me." =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== From: Guy Urbina Date: Thu Jul 13, 2000 6:12pm Subject: Continuous look through technology.... (ColtC interference cancel ler) Hello all.... I surprisedly came across this item while searching the web for a frequency agile 2.4Ghz transceiver. From what I've read it looks like it can be a useful tool for a TSCM firm. here's the address www.xetron.com/coltc.html and it shows a color picture of the unit. and here's a snippet of what I found: (snip-snip) COLT, or COntinuous Look Through, is a proprietary Xetron RF cancellation technique for the extraction of a weak Signal of Interest (SOI) in the presence of a large Interfering (I) signal on the exact same frequency. The COLT process is successful even when the SOI is entirely contained within the spectral energy of the Interferer. Further, the process is largely independent of the modulation or format of the SOI. COLT cancellation techniques can be applied to virtually any type of receiving or demodulating equipment from audio frequencies through RF. The COLT processor does not require an independent (i.e. cooperative) sample of the Interferer and is therefore ideal for processing down-converted or pre-recorded signals. The COLT C unit is commonly used as an IF processor. The circuit board is designed to fit within the case of an ICOM IC-R7000 receiver or a portable spectrum analyzer. (snip-snip) best regards, -Guy : 903 From: Hoffman Date: Thu Jul 13, 2000 1:42pm Subject: oops.. Here is the correct link. Regarding my previous message: It seems I forgot to include the link in my previous message regarding the LA Public Defenders office web page on wiretapping. Premature senility must be setting in. http://pd.co.la.ca.us/index.htm 904 From: James M. Atkinson, Comm-Eng Date: Thu Jul 13, 2000 9:07pm Subject: Raster Analysis I am working on a white paper and tutorial on Raster Analysis or RAID systems are in applies to both video and non video, data, and telemetry signals. I already have a video signal analysis tutorial online, but would like to add materials regarding the analysis of signals other video. I intend to address using stand alone instruments, as well as turnkey systems such as the Kaiser RAS-515 (which is a great unit... plus there is supposed to a new version available). -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 905 From: A Grudko Date: Thu Jul 13, 2000 1:37pm Subject: Re: Feds ----- Original Message ----- > So long as the government is using a surveillance technology, product, and device in accordance with the law the list strongly applauds its development and usage. March 1990, one of my then ex-staff, Christopher John Clark, an 'independent's, was caught room-bugging Sadam Hussein's brother-in-law's office at the Iraqi embassy in Switzerland. It was well publicised at the time. His actions were clearly illegal under numerous Swiss laws. The Magistrate ruled no prosecution, on the grounds that Clark's action was PROBABLY in the interest of justice and under the instruction of 'a government agency', although Chris' client was never revealed. August 1990 Iraq invaded Kuwait. Was Chris a hero (to the West) or a criminal (to some Arab States) ? The answer must be irrelivant to this group, and indeed to any TSCM professional. A country's laws are subject to the flick of the leader's signature. Today illegal, tomorrow legal (booze, dope, speed limits, porn, commies, Pintos, witchcraft, using a cigar as a sex aid ad infinitum). But we sweep, we report. Technical facts, to the best of our ability; minimal opinion, no judgement. Here in SA it has been suggested by some groups that the intel. agencies' bugs should be licensed, coded for identification if found! Duh! Whatever happened to 'plausible deniability'? How better to tip off an organised crime figure or spy that the time has come to quietly leave the country with all the loot and kill the minions than find a bug marked 'FBI etc.'....If I was a major crime figure I'd vote for this suggestion. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 906 From: James M. Atkinson, Comm-Eng Date: Fri Jul 14, 2000 9:07am Subject: Carrier Current Methods Good Morning, Let me throw out this topic for discussion on the list, and invite other list members to share their methods of detection, parameters, and so on. 1) Are you performing checks for "Conducted Emissions" (aka: Carrier Current) during your TSCM services? 2) Are you using a CC detector such as the 2030 or SCD-5 3) Are you using an Oscilloscope 4) Are you using a Spectrum Analyzer 5) Are you using any kind of TSCM receivers such as a Scanlock, CPM-700, OSCOR, and if so which conductor combinations are you checking? 6) Are you using any other equipment? 7) What frequency ranges are you checking? 8) Where do you perceive the primary threats to be located in the spectrum? 9) If your are using a filter to knock out 60 Hz or other signals how are your filters configured, or are you just using a "Capacitive Reactance" circuit to just de-couple the line.? 10) Are you checking for audio and video signals, or just audio? 11) What kinds of modulation are you looking for? If you would like to post your answers to the list, but would like to do it anonymously they privately send me your post and I will post it for you. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 907 From: James M. Atkinson, Comm-Eng Date: Fri Jul 14, 2000 9:11am Subject: Re: Feds At 8:37 PM +0200 7/13/00, A Grudko wrote: >----- Original Message ----- > > So long as the government is using a surveillance technology, product, and >device in accordance with the law the list strongly applauds its development >and usage. > > >March 1990, one of my then ex-staff, Christopher John Clark, an >'independent's, was caught room-bugging Sadam Hussein's brother-in-law's >office at the Iraqi embassy in Switzerland. It was well publicised at the >time. His actions were clearly illegal under numerous Swiss laws. > >The Magistrate ruled no prosecution, on the grounds that Clark's action was >PROBABLY in the interest of justice and under the instruction of 'a >government agency', although Chris' client was never revealed. > >August 1990 Iraq invaded Kuwait. > >Was Chris a hero (to the West) or a criminal (to some Arab States) ? The >answer must be irrelivant to this group, and indeed to any TSCM >professional. > >A country's laws are subject to the flick of the leader's signature. Today >illegal, tomorrow legal (booze, dope, speed limits, porn, commies, Pintos, >witchcraft, using a cigar as a sex aid ad infinitum). > >But we sweep, we report. Technical facts, to the best of our ability; >minimal opinion, no judgement. [snip] Good point, You right Andy, in TSCM it is our job to sweep, report, and then go to the next job. The point I was trying to make in my previous post was that the list is for the technical, and not the political discussion of bugs. It doesn't matter to us (as TSCM'ers) if it is a legal bug, an illegal bug, or a bug installed by Klingons... a TSCM'er STILL has to be familiar with it, and still has to be able to find it. If list members don't like the laws fine, but they shouldn't start bitching and moaning to the list... we are all TSCM people not politicians. If someone thinks the halls of justice and law enforcement are run by crack whores, fine... but please they shouldn't take their gripes to the list. This list is about TSCM... TSCM... TSCM... We find bugs, wiretaps, technical surveillance threats, and other such related problems, that is where the list is focused. Instead of moaning about (snicker) "Echelon", list members should research it independently and then tell the list which register on the switch permits its detection. Instead of griping about "Omnivore or Carnivore" list members should research it, and explain it's vulnerability to simple SNMP commands. Tell us about bugs, tell us about various methods used to find bugs, tell us about equipment, tell us about what you do to find bugs, and what you do once you find something. We are catching spies... not lobbying for legal reforms... I hope this post has not offended anybody on the list, but I just want to maintain a TECHNICAL focus for the list. So speaks the Moderator, -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 908 From: A Grudko Date: Fri Jul 14, 2000 2:02pm Subject: Re: RF & streetlights ----- Original Message ----- > >For last one she studied bombs, including demonstrating how > >terrorists remote detonate IEDs (Garage door opener. RX CO output to 2 nails > >stuck in wire wool with 4 9v mini batteries in series.).... > Been dipping into the Anarchist's Cookbook, have we? Yard Anti Terroist/CS course, Hendon, UK, 1984. Trying to keep it in the family. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 909 From: Marty Kaiser Date: Fri Jul 14, 2000 10:52am Subject: Re: Raster Analysis...Treat Hi Jim: Attached is a photo of the NEW RAS515A system in operation. The system consists of a modified Avcom (IF output), VM515 baseband demodulator, AV/SC59 matrix, SCD-5 Sub Carrier Detector, RAS515A Raster Analysis System and an inexpensive oscilloscope. The picture on the screen is from a channel 13 program at the time I took the picture. The raster box also has an RJ11 on the back to view telephone or data lines. It is a two wire input but if you want to go as high as 8 wires, add the 1080E matrix. Instruction sheets for all these products are on www.martykaiser.com/prod~1.htm Hope this information is useful to you. Marty ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Sent: Friday, July 14, 2000 2:07 AM Subject: [TSCM-L] Raster Analysis I am working on a white paper and tutorial on Raster Analysis or RAID systems are in applies to both video and non video, data, and telemetry signals. I already have a video signal analysis tutorial online, but would like to add materials regarding the analysis of signals other video. I intend to address using stand alone instruments, as well as turnkey systems such as the Kaiser RAS-515 (which is a great unit... plus there is supposed to a new version available). -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== ------------------------------------------------------------------------ Need technology solutions for your business? Respond.com will Help! http://click.egroups.com/1/6829/1/_/507420/_/963542091/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 910 From: Marty Kaiser Date: Fri Jul 14, 2000 11:01am Subject: Re: Raster Analysis Whoops...gave you a partially wrong site address...use www.martykaiser.com/newspec1.htm for the RAS515A and VM515. Thanks, Marty ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Sent: Friday, July 14, 2000 2:07 AM Subject: [TSCM-L] Raster Analysis I am working on a white paper and tutorial on Raster Analysis or RAID systems are in applies to both video and non video, data, and telemetry signals. I already have a video signal analysis tutorial online, but would like to add materials regarding the analysis of signals other video. I intend to address using stand alone instruments, as well as turnkey systems such as the Kaiser RAS-515 (which is a great unit... plus there is supposed to a new version available). -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== ------------------------------------------------------------------------ Need technology solutions for your business? Respond.com will Help! http://click.egroups.com/1/6829/1/_/507420/_/963542091/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 911 From: James M. Atkinson, Comm-Eng Date: Sat Jul 15, 2000 0:37pm Subject: IMPORTANT MEMO: Los Alamos National Laboratory [Humor] Subject: Los Alamos Security Crackdown IMPORTANT MEMO To: All staff, Los Alamos National Laboratory From: Bill Richardson, Secretary of Energy Dear staff members: Due to an unfortunate overreaction by the Republican Congress to our minor difficulties in the security area, we're being forced to tighten up just a bit. Effective Monday: 1. The brown paper bag in which we store the computer disk drives that contain the nation's nuclear secrets will no longer be left on the picnic table at the staff commissary during lunch hour. It will be stored in "the vault." I know this is an inconvenience to many of you, but it's a sad sign of the times. 2. The three-letter security code for accessing "the vault" will no longer be "B-O-B." To confuse would-be spies, that security code will be reversed. Please don't tell anybody. 3. Visiting scientists and graduate students from Libya, North Korea and mainland China will no longer be allowed to wander the hallways without proper identification. Beginning Monday, they will be required to wear a stick-on lapel tag that clearly states, "Hello, My Name Is . . . ." The stickers will be available at the front desk. 4. The computer network used for scientific calculations will no longer be hyperlinked via the Internet to such Web sites as www.moammar.com, www.swedechicks.com, or www.hackers-r-us.com. Links to all Disney sites will be maintained, however. 5. Researchers bearing a security clearance of Level 5 and higher will no longer be permitted to exchange updates on their work by posting advanced-physics formulas on the men's room walls. 6. On "Bowling Night," please check your briefcases and laptop computers at the front counter of the Bowl-a-Drome instead of leaving them in the cloakroom. Mr. Badonov, the front-counter supervisor, has promised to "keep un eye on zem" for us. 7. Staff members will no longer be allowed to take home small amounts of plutonium, iridium or uranium for use in those "little weekend projects around the house." That includes you parents who are helping the kids with their science fair projects. 8. Thermonuclear devices may no longer be checked out for "recreational use." We've not yet decided if exceptions will be made for Halloween, the Fourth of July or New Year's Eve. We'll keep you posted. 9. Employees may no longer "borrow" the AA batteries from the burglar alarm system to power their Game Boys and compact-disc players during working hours. 10. And, finally, when reporting for work each day, all employees must enter through the front door. Raoul, the janitor, will no longer admit employees who tap three times on the side door to avoid clocking in late. I know this crackdown might seem punitive and oppressive to many of you, but it is our sworn duty to protect the valuable national secrets that have been entrusted to our care. Remember: Security isn't a part-time job -- it's an imperative, all 37 1/2 hours of the week! Sincerely, =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 912 From: A Grudko Date: Sat Jul 15, 2000 0:26pm Subject: Re: Re: Feds ----- Original Message ----- > We are catching spies... not lobbying for legal reforms... Agreed 100% Andy Jo'burg 913 From: Marty Kaiser Date: Mon Jul 17, 2000 4:54am Subject: Re: Raster Analysis...Treat Don't know where the photo got to but here is is again. Marty ----- Original Message ----- From: Marty Kaiser To: Sent: Friday, July 14, 2000 3:52 PM Subject: Re: [TSCM-L] Raster Analysis...Treat Hi Jim: Attached is a photo of the NEW RAS515A system in operation. The system consists of a modified Avcom (IF output), VM515 baseband demodulator, AV/SC59 matrix, SCD-5 Sub Carrier Detector, RAS515A Raster Analysis System and an inexpensive oscilloscope. The picture on the screen is from a channel 13 program at the time I took the picture. The raster box also has an RJ11 on the back to view telephone or data lines. It is a two wire input but if you want to go as high as 8 wires, add the 1080E matrix. Instruction sheets for all these products are on www.martykaiser.com/prod~1.htm Hope this information is useful to you. Marty ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Sent: Friday, July 14, 2000 2:07 AM Subject: [TSCM-L] Raster Analysis I am working on a white paper and tutorial on Raster Analysis or RAID systems are in applies to both video and non video, data, and telemetry signals. I already have a video signal analysis tutorial online, but would like to add materials regarding the analysis of signals other video. I intend to address using stand alone instruments, as well as turnkey systems such as the Kaiser RAS-515 (which is a great unit... plus there is supposed to a new version available). -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== ------------------------------------------------------------------------ Need technology solutions for your business? Respond.com will Help! http://click.egroups.com/1/6829/1/_/507420/_/963542091/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] ------------------------------------------------------------------------ Get a NextCard Visa, in 30 seconds! 1. Fill in the brief application 2. Receive approval decision within 30 seconds 3. Get rates as low as 2.9% Intro or 9.9% Fixed APR http://click.egroups.com/1/6628/1/_/507420/_/963626302/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 914 From: Marty Kaiser Date: Mon Jul 17, 2000 5:00am Subject: Re: Raster Analysis...Treat ----- Original Message ----- From: Marty Kaiser To: Sent: Friday, July 14, 2000 3:52 PM Subject: Re: [TSCM-L] Raster Analysis...Treat Hi Jim: Attached is a photo of the NEW RAS515A system in operation. The system consists of a modified Avcom (IF output), VM515 baseband demodulator, AV/SC59 matrix, SCD-5 Sub Carrier Detector, RAS515A Raster Analysis System and an inexpensive oscilloscope. The picture on the screen is from a channel 13 program at the time I took the picture. The raster box also has an RJ11 on the back to view telephone or data lines. It is a two wire input but if you want to go as high as 8 wires, add the 1080E matrix. Instruction sheets for all these products are on www.martykaiser.com/prod~1.htm Hope this information is useful to you. Marty ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Sent: Friday, July 14, 2000 2:07 AM Subject: [TSCM-L] Raster Analysis I am working on a white paper and tutorial on Raster Analysis or RAID systems are in applies to both video and non video, data, and telemetry signals. I already have a video signal analysis tutorial online, but would like to add materials regarding the analysis of signals other video. I intend to address using stand alone instruments, as well as turnkey systems such as the Kaiser RAS-515 (which is a great unit... plus there is supposed to a new version available). -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== ------------------------------------------------------------------------ Need technology solutions for your business? Respond.com will Help! http://click.egroups.com/1/6829/1/_/507420/_/963542091/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] ------------------------------------------------------------------------ Get a NextCard Visa, in 30 seconds! 1. Fill in the brief application 2. Receive approval decision within 30 seconds 3. Get rates as low as 2.9% Intro or 9.9% Fixed APR http://click.egroups.com/1/6628/1/_/507420/_/963626302/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 915 From: Marty Kaiser Date: Mon Jul 17, 2000 5:03am Subject: Raster Analysis Hi Jim: Attached is a photo of the NEW RAS515A system in operation. The system consists of a modified Avcom (IF output), VM515 baseband demodulator, AV/SC59 matrix, SCD-5 Sub Carrier Detector, RAS515A Raster Analysis System and an inexpensive oscilloscope. The picture on the screen is from a channel 13 program at the time I took the picture. The raster box also has an RJ11 on the back to view telephone or data lines. It is a two wire input but if you want to go as high as 8 wires, add the 1080E matrix. Instruction sheets for all these products are on www.martykaiser.com/prod~1.htm Hope this information is useful to you. Marty ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Sent: Friday, July 14, 2000 2:07 AM Subject: [TSCM-L] Raster Analysis I am working on a white paper and tutorial on Raster Analysis or RAID systems are in applies to both video and non video, data, and telemetry signals. I already have a video signal analysis tutorial online, but would like to add materials regarding the analysis of signals other video. I intend to address using stand alone instruments, as well as turnkey systems such as the Kaiser RAS-515 (which is a great unit... plus there is supposed to a new version available). -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== ------------------------------------------------------------------------ Need technology solutions for your business? Respond.com will Help! http://click.egroups.com/1/6829/1/_/507420/_/963542091/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] ------------------------------------------------------------------------ Get a NextCard Visa, in 30 seconds! 1. Fill in the brief application 2. Receive approval decision within 30 seconds 3. Get rates as low as 2.9% Intro or 9.9% Fixed APR http://click.egroups.com/1/6628/1/_/507420/_/963626302/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 916 From: Marty Kaiser Date: Mon Jul 17, 2000 5:18am Subject: Raster analysis Steve Uhrig tells me I'm supposed to send people directly to my web site to view pictures. Here is the one on the Raster Analysis System in action... http://www.martykaiser.com/ras515a.htm Marty ----- Original Message ----- From: Marty Kaiser To: Sent: Monday, July 17, 2000 10:00 AM Subject: Re: [TSCM-L] Raster Analysis...Treat ----- Original Message ----- From: Marty Kaiser To: Sent: Friday, July 14, 2000 3:52 PM Subject: Re: [TSCM-L] Raster Analysis...Treat Hi Jim: Attached is a photo of the NEW RAS515A system in operation. The system consists of a modified Avcom (IF output), VM515 baseband demodulator, AV/SC59 matrix, SCD-5 Sub Carrier Detector, RAS515A Raster Analysis System and an inexpensive oscilloscope. The picture on the screen is from a channel 13 program at the time I took the picture. The raster box also has an RJ11 on the back to view telephone or data lines. It is a two wire input but if you want to go as high as 8 wires, add the 1080E matrix. Instruction sheets for all these products are on www.martykaiser.com/prod~1.htm Hope this information is useful to you. Marty ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Sent: Friday, July 14, 2000 2:07 AM Subject: [TSCM-L] Raster Analysis I am working on a white paper and tutorial on Raster Analysis or RAID systems are in applies to both video and non video, data, and telemetry signals. I already have a video signal analysis tutorial online, but would like to add materials regarding the analysis of signals other video. I intend to address using stand alone instruments, as well as turnkey systems such as the Kaiser RAS-515 (which is a great unit... plus there is supposed to a new version available). -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== ------------------------------------------------------------------------ Need technology solutions for your business? Respond.com will Help! http://click.egroups.com/1/6829/1/_/507420/_/963542091/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] ------------------------------------------------------------------------ Get a NextCard Visa, in 30 seconds! 1. Fill in the brief application 2. Receive approval decision within 30 seconds 3. Get rates as low as 2.9% Intro or 9.9% Fixed APR http://click.egroups.com/1/6628/1/_/507420/_/963626302/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] ------------------------------------------------------------------------ Need technology solutions for your business? Respond.com will Help! http://click.egroups.com/1/6829/1/_/507420/_/963842502/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 917 From: James M. Atkinson, Comm-Eng Date: Mon Jul 17, 2000 10:22am Subject: Russia's New Concept Of Internal National Security [Moderators Note: What the article fails to mention is that Putin is scrambling to rebuild the "Soviet Intelligence Machine" and has launched a major recruiting drive both at home and abroad.] July 16, 2000 Russia's New Concept Of Internal National Security http://www.washtimes.com/commentary/commentary-2000716115857.htm Richard Staar On the 10th day of his acting presidency, Vladimir V. Putin signed Decree No. 24, which had the force of law and did not require parliamentary approval. It proclaims a world outlook regarding Russia's national interests, threats to their attainment, as well as world objectives of the new regime in Moscow. Should one take such a programmatic statement seriously or treat it as a fanciful excursion into an ideal and unattainable future? Obviously one must watch for indications of both, since the two are not mutually exclusive. President Putin, sworn into office on May 7, most probably will remain in the Kremlin during the next four years. If re-elected, that would mean eight years. However, should the current four-year term be changed to seven years (as Mr. Putin said "others" have suggested), the two terms would not end until 2011, when he will be only 58 years of age. Hence, the new national security concept may even last that long. What does it portend? The document begins with a general statement that two contradictory trends exist in the world today. The first involves Russia's currently avowed intention to mold an ideological foundation for a multipolar world based upon integration with a considerable number of countries that share the same outlook. The other trend is based on alleged attempts to create an international structure under the domination of developed Western countries under U.S. leadership. The latter applies military force to decide key problems in the world, ignoring international law, or so asserts the new security concept. National interests of Russia are said to be centered on protecting sovereignty, strengthening great power status, consolidating relations with all countries and, especially, members of the CIS or Commonwealth of Independent States (all former parts of the Soviet Union). Leaders of four CIS states in Central Asia signed a security pact or defense union on April 21, the same day Russia proclaimed a new military doctrine. Leaders of Kazakhstan, Kyrgyzstan, Tajikistan, and Uzbekistan probably know more about Russian intentions than do outside observers. International threats to its security are perceived in Moscow as being aimed at "weakening Russia's political, economic, and military influence throughout the world" by: . Strengthening blocs and alliances, especially the eastward expansion of NATO. . Foreign military bases in immediate proximity to Russian borders. . Proliferation of mass destruction weapons and their delivery systems. . Weakening integration processes throughout the CIS. . Escalating conflicts close to Russian borders and those of CIS states. . Foreign claims to territories within the Federation of Russia. These threats are aimed at blocking Russia from becoming one of the centers of influence within a multipolar world and at "weakening its positions in Europe, the Middle East, Trans-Caucasus, Central Asia, and the Asian-Pacific region." This would suggest that only Africa, the Western Hemisphere, and the Atlantic Ocean remain outside Russia's proclaimed sphere of influence. How will the Kremlin counteract the foregoing perceived threats? The new national security concept suggests measures to be taken along the following lines, among others: . Strengthening state regulation of the domestic economy. . Breaking the scientific and technological dependence on foreign countries. . Guaranteeing equal cooperation with mutual benefit between Russia and leading countries of the world. . Increasing support at sufficiently high levels for Russia's military potential. . Effective counteraction against espionage and subversive activities by foreign governments. Finally, the document suggests military measures that will be undertaken by Moscow. Aggression is to be countered at all levels, including aggression involving the use of nuclear weapons against Russia and/or its allies. In the interests of guaranteeing the Kremlin's national security, it is considered mandatory - under certain unspecified circumstances - for Russia to maintain a presence in certain strategic regions of the world. Stationing, by treaty, of its "limited military contingents" on land as well as at naval bases would guarantee the readiness of Moscow to fulfill its obligations and contribute to the maintenance of a world strategic balance. It should be noted that on Nov. 23, 1999, then-Prime Minister Putin had promised to provide additional funds for deployment in the Mediterranean of Russia's sole aircraft carrier, the Adm. Kuznetsov -along with one destroyer, a frigate, a tanker, and nuclear-powered submarines - by November 2000. They will be stationed at the reactivated Tartus base in Syria. Improvements at the Cam Ranh Bay naval installation for Russia's 15th Operational Squadron are also being planned under an agreement with Vietnam that expires in 2004. Examples of former Soviet "limited military contingents" have included 100,000 troops in Afghanistan over 11 years (1978-1989) and the much smaller force on the island of Cuba (Oct. 25-Dec. 25, 1962), the latter having included Russian crews for intermediate-range nuclear weapons aimed at targets in the continental United States. It is assumed the law school graduate and former KGB lieutenant colonel may in this respect be endowed with more intelligence than the late Nikita S. Khrushchev, who had made the decision to install the missiles in Cuba. It does behoove U.S. policy-makers, however, to study the implications of the new national security concept as well as the new military doctrine (a component part of the concept). Perhaps they would learn something more about Russian intentions that are not the same as capabilities. It is doubtful, however, that the face-to-face encounter in Moscow in June between the current American and Russian presidents provided more insight for the United States government than the two documents mentioned above. ---------------------- Richard F. Staar is a senior fellow of the Hoover Institution at Stanford University and a visiting professor of political science at Duquesne University as well as author of "The New Military in Russia." =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 918 From: Date: Mon Jul 17, 2000 9:18am Subject: White House Proposes Wiretap Law White House Proposes Wiretap Law .c The Associated Press By KALPANA SRINIVASAN WASHINGTON (AP) - The White House proposed legislation Monday to update wiretapping rules so that legal protections currently applied to telephone calls are extended to new forms of electronic communication, like e-mail. The plan would require law enforcement officials to obtain high-level approval before applying for a court order to intercept the content of e-mail - in line with current rules that govern listening to phone calls. ``Basically, the same communication, if sent different ways - through a phone call or a dial-up modem - is subject to different and inconsistent privacy standards,'' said White House Chief of Staff John Podesta, in announcing the proposals. ``It's time to update and harmonize our existing laws to give all forms of technology the same legislative protections as our telephone conversations.'' The measure also addresses so-called ``trap and trace'' orders which allow law enforcement officials to identify the source of a phone call or an e-mail, but not intercept its content. Under the proposal, law enforcement officials would only need one order to trace an e-mail or a phone call, even though such communications may travel through multiple phone carriers or Internet providers. Officials also could trace such communications without prior approval in an emergency situation, such as when a computer is under attack. But for the first time, the administration is proposing that a federal or state judge independently determine whether the facts support such a trace order. Under current rules, judges accept the declaration of law enforcement officials agencies that such an order is warranted. The proposed measures would also address inconsistencies in how current law applies to different networks carrying Internet traffic. For example, now that cable systems are being upgraded to offer two-way services, laws that apply to dial-up modems over phone lines should be extended to cable connections, Podesta said. The proposal requires congressional approval, and several lawmakers already have introduced their own versions. The Clinton administration also announced Monday updates to its export control policy for powerful data and voice-scrambling technology. Under the change, American companies can sell encryption products to any end user in the European Union or these eight other trading partners: Australia, Norway, Czech Republic, Hungary, Poland, Japan, New Zealand and Switzerland. The policy change will also remove a previous technical review waiting period of 30 days. AP-NY-07-17-00 1404EDT 919 From: James M. Atkinson, Comm-Eng Date: Mon Jul 17, 2000 3:09pm Subject: Re: White House Proposes Wiretap Law See, Now this is the kind of excellent news article post I was talking about earlier. It is right on target for this group, contains solid facts, no political agenda's, and it gets right to the point. Since we are involved with finding bugs, hunting down wiretaps and ferreting out spies (no matter which side they are on) this is perfect. Note how there is o bitching about "how unfair the world is", but an objective news article for all to discuss. Thank you, and good job. -jma On a side note: I feel that the law is a really good idea, and that is is something that is badly needed. A court order should be required for anything that intrudes upon, into, or around the customers loop to include all related records, and so on. At 2:18 PM -0400 7/17/00, MACCFound@a... wrote: >White House Proposes Wiretap Law > >.c The Associated Press > > By KALPANA SRINIVASAN > >WASHINGTON (AP) - The White House proposed legislation Monday to update >wiretapping rules so that legal protections currently applied to telephone >calls are extended to new forms of electronic communication, like e-mail. > >The plan would require law enforcement officials to obtain high-level >approval before applying for a court order to intercept the content of e-mail >- in line with current rules that govern listening to phone calls. > >``Basically, the same communication, if sent different ways - through a phone >call or a dial-up modem - is subject to different and inconsistent privacy >standards,'' said White House Chief of Staff John Podesta, in announcing the >proposals. ``It's time to update and harmonize our existing laws to give all >forms of technology the same legislative protections as our telephone >conversations.'' > >The measure also addresses so-called ``trap and trace'' orders which allow >law enforcement officials to identify the source of a phone call or an >e-mail, but not intercept its content. Under the proposal, law enforcement >officials would only need one order to trace an e-mail or a phone call, even >though such communications may travel through multiple phone carriers or >Internet providers. > >Officials also could trace such communications without prior approval in an >emergency situation, such as when a computer is under attack. > >But for the first time, the administration is proposing that a federal or >state judge independently determine whether the facts support such a trace >order. Under current rules, judges accept the declaration of law enforcement >officials agencies that such an order is warranted. > >The proposed measures would also address inconsistencies in how current law >applies to different networks carrying Internet traffic. For example, now >that cable systems are being upgraded to offer two-way services, laws that >apply to dial-up modems over phone lines should be extended to cable >connections, Podesta said. > >The proposal requires congressional approval, and several lawmakers already >have introduced their own versions. > >The Clinton administration also announced Monday updates to its export >control policy for powerful data and voice-scrambling technology. Under the >change, American companies can sell encryption products to any end user in >the European Union or these eight other trading partners: Australia, Norway, >Czech Republic, Hungary, Poland, Japan, New Zealand and Switzerland. The >policy change will also remove a previous technical review waiting period of >30 days. > >AP-NY-07-17-00 1404EDT =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 920 From: James M. Atkinson, Comm-Eng Date: Mon Jul 17, 2000 8:23pm Subject: Postings Regarding Used Equipment Offered For Sale Good Evening, I would like to take a moment and invite list members to offer TSCM related items up for sale via the TSCM-L mailing list. This is only for USED equipment, only and is not to be used to sell stuff at a retail level. Please keep the listings limited to ONE item per post, with no more then 6 single items offered each day (unless I give you explicit verbal permission otherwise). You can only list a single item ONCE during any 90 day period, but may announce a price decrease on an item every 30 days). Also, please include a title for each item in the subject line so people can skip over the message if it is not something that they are interested in. All items must have a set price, and "Best Offers" are not permitted. Be sure to spell out the name of the manufacture, and include something about it's age, condition, specifications, manuals included, and so on (include a paragraph or two in the post). Please do not try to attach images of the stuff, but offer list members a link to the images on your website. Please do not try to turn the list into "you own personal Spam machine", and don't try selling equipment other then used TSCM gear (or I'll bounce you off the list). Don't try selling computer software, used cars, leather jackets, and so on. As a professional courtesy please offer members of this list a modest discount, and treat everybody with courtesy (if you cheat somebody, the list will find out about it... I promise). While I don't want to turn this place into E-Bay I feel that it would help folks to clear out some of the stuff that is gathering dust, and such equipment could still be helpful to another TSCM'er. -jma ----------------------------- Here is a example (this is an example only... I am not actually offering the instrument for sale): From:jmatk@tscm.com To: TSCM-L@egroups.com Date: 7/17/00 14:23:23 GMT Subject:FS: Tektronix 494 A/P System Analyzer w/ CPU I have a used Tektronix 494 Microwave Spectrum Analyzer system in excellent condition that I would like to retire from active service. This unit has been modified by Tek for all hardware revs, and is under a calibration and service plan. It has gone in for calibration every 12 months (since 1989), and will be due again in April 2001 (so it is still in calibration). The current service and calibration contract runs out April 2003 (so you have just under 3 years left). I will transfer the service and calibartion contract to the buyer only after the final payment (1/4 of the purchase price) The instrument would normally cover from 10 kHz to 22 GHz with internal mixers, and 10 kHz to 325 GHz when using external mixers. However, the instrument has been "tweaked" by Tektronix to allow CALIBRATED measurement down to 30 Hz, and a switchable DC block has been added. The Marker/Video input has also been removed (by Tektronix) and replaced with a modified option 42 (with a 30 MHz BW instead of the normal 4.5 MHz) Included with the instrument is Option 22 which gives you external mixer coverage to 60 GHz (WM490K, WM490A, WM490U, Diplexer Assembly, and various cables). Also included are mixers to take the instrument to 325 GHz (all are under a current Tektronix service and calibration program)... WM780E, WM780F, WM780G, WM780G. I will also include a legal version of the Tektronix GRASP software, a ESPON color printer and all manuals for the instrument, GRASP software manuals, Service Manuals, Programmers Manual, and so on. The instrument has the optional MATE/CIIL extension which permits direct memory access by the computer. Also included is S26EM00 EMI Pre-qualification Software with option 09 (source code) and a legal copy of R.O.S.E., and several related EMI/ECM programs. Also included is a 333 MHz Panasonic Tough-book laptop with a IEEE-488 PCMIA interface Cards, 18 GB HD, 128 MB RAM, DVD, floppy, etc. (The software is on the laptop, and the laptop controls the SA). The laptop is not under warranty, but all of the books and software is included (the computer is 12 months old). I will include an older PEP301 controller (with software) at no charge, but it is offered AS-IS due to it's age. Included is an oversized Hardigg roller transit case which can hold the instrument, all mixers, laptop, cables, and several feed horns (the horns are not included). The entire System totally fits inside the case. I also have about 50 pounds of virgin repair parts for the instrument including TWO new CRT's, a mixer board, various overlays, various knobs, buttons and so on (about $8,500 in original value, but worth much more now). The instrument along with the various options, computer, mixers, service plan (the part still outstanding), parts, and so on cost just a hair over $97,600.00. I will let the entire system go for $33,600 ($28,600 for list members), plus whatever delivery charges are involved. The full system in the Hardigg case weighs in at about 168 pounds, the books, manulas and SW are about 240 pounds, and the parts weight in at 50 pounds (minus packing materials). Terms are 3/4th in advance of shipment, and the balance within 7 days of delivery. I will not break the instrument up into subsystems, nor will I ship it outside of the United States. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 921 From: David Miller Date: Tue Jul 18, 2000 7:42am Subject: Download Utilities ARE Spying On Us I received this on one of the other lists I belong to and thought it was important enough to forward here. Sorry if it is a little off topic. Download Utilities *ARE* Spying On Us The NetZip, Netscape/AOL, and Real Networks Download Utilities *ARE* Spying On Us! Before I tell you about this latest threat to our privacy ... I MUST ASK YOU PLEASE not to reply directly to this eMail. This mailing is being sent to more than 320,000 people, so there is JUST NO WAY for us to read and answer individual questions. However, we have created a FREE DISCUSSION FORUM you are invited to use for asking questions and getting more information. Any standard Internet newsreader-like those included in Internet Explorer and Netscape Navigator-can be used to participate in the free discussion forums at grc.com. Just click the link below to launch your reader and begin participating ... The Newsletter Forum Or, if that doesn't work, you can access the forum through our web-based interface (though it is much less cool.) Web Discussion A SERIOUS New Spyware Threat ... NetZip's "Download Demon" was purchased by Real Networks and renamed "Real Download". then Netscape/AOL licensed it from Real and called it "Netscape Smart Download." By watching the "packet traffic" flowing in and out of one of my machines while downloading a file through the Internet, I verified the rumors which you may have heard regarding these programs: All of these programs immediately tag your computer with a unique ID, after which EVERY SINGLE FILE you download from ANYWHERE on the Internet (even places that might not be anyone else's business) is immediately reported back to the program's source where it is logged and recorded along with your machine's unique ID. They also have the opportunity to capture and record your machine's unique Internet IP address. This information is then compiled and used to create a detailed "profile" about who you are based upon the web sites you visit and the files you have downloaded. Perhaps you don't mind being watched and tracked as you move around the Internet ... and then having every file you download logged and cataloged and used to assemble "your profile". But the idea of this seems extremely invasive to me, and unless you have carefully read the program's license you might not be aware that this is going on or that "you agreed to it" when you accepted the terms of the license! More than 14 Million people are already using the original NetZip Download Demon. NetZip knows the exact number, since every copy of their program "phones home" to report on what their users are doing! And I'm sure people are downloading Real Network's ReadDownload and Netscape's SmartDownload like crazy. A Class Action lawsuit was recently filed against Netscape/AOL because of this privacy invasion, so perhaps the PC industry will begin to receive the message that this sort of secret spying and profiling is not okay with the rest of us, even if it is buried within a lengthy license agreement. You decide. And, of course, the next release of my own OptOut spyware detection and removal utility WILL consider these programs to be dangerous, and warn its users of their presence in their systems. But I wanted to be sure that you knew RIGHT AWAY what was going on, and that I had independently confirmed that this invasive file download tracking really was occurring. If you have questions or comments, please see ... The Newsletter Forum [Non-text portions of this message have been removed] 922 From: Robert G. Ferrell Date: Tue Jul 18, 2000 10:10am Subject: Re: Download Utilities ARE Spying On Us >All of these programs >immediately tag your computer with a unique ID, after which EVERY SINGLE >FILE you download from ANYWHERE on the Internet (even places that might not >be anyone else's business) is immediately reported back to the program's >source where it is logged and recorded along with your machine's unique ID. I dunno, 14 million people surfing the Web are going to generate an insane amount of file ID traffic if every file downloaded is reported back to some central point. Say the average URL footprint is 65 bytes, and your ID is another 10 bytes, for a total of 75 bytes per file downloaded. If the average Web page contains 28 separate files (including graphics) and each file generates a separate packet, that's 28 packets/2.1 KB per visit per person. If the average person visits 10 Web pages a day (that's a pretty conservative estimate), that works out to around 21 KB of traffic per person per day/294 GB total per day, or a sustained transfer rate of a little over 27 Mbps. That would generate over 13 TB of data per year, sent in > 1,430,000,000,000 packets. Quite a substantial overhead, although not completely unmanageable. If all you have is the URL of a file, however, mining for useful data is going to require either some sort of (huge) index matching file URLs to their content, or a really sophisticated fuzzy logic algorithm. In other words, if they really are doing this, they've invested an obscene amount of money in it. Frankly, I'm a bit leery of this claim. It might be fun to write a little hack that spoofs your identifier or sends spurious/erroneous information to the collector. Bad intelligence is, after all, more useless than no intelligence. Cheers, RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 923 From: A Grudko Date: Tue Jul 18, 2000 7:18am Subject: Re: Used Equipment & visit to US Tongue-in-cheek reply followed by real message.... ----- Original Message ----- From: James M. Atkinson, Comm-Eng > Please keep the listings limited to ONE item per post, with no more > then 6 single items offered each day. You can only list a single item ONCE > during any 90 day period, but may announce a price decrease on an > item every 30 days). I punched this program into my Palm V and it spat it back out as insufficient processing available. ;-) > Don't try selling computer software, used cars, leather jackets, and so on. But I'm looking for a leather jacket....;-) > While I don't want to turn this place into E-Bay..... Of course not - who would want to have a business capitalised at $ 620 000 000 ? ;-) But seriously folks... I'll be arriving in Houston mid October for 3 - 4 days, driving through to Dallas for a day and then on to LA. I'd be happy to meet any of the listmembers who are on the route and would like to hear about the exploits of a one-armed bug-sweeper in Africa. A few of my stories are actually true...... Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 924 From: Steve Uhrig Date: Tue Jul 18, 2000 11:10am Subject: Nonlinear junction detector for sale For sale is an ISA-1 Nonlinear Junction Detector, with all accessories and fitted hard case. Unit has been gone over completely by me, several minor repairs made, aligned for max output and aluminum threads in antenna where pole and universal attaches have had a helicoil insert for maximum strength. Power levels may not necessarily be FCC legal in the U.S. as I tuned for max, not for a crippled legal level. Receiver also is very sensitive and the thing hears my signal generator at about 13 dBm into a paperclip from an adjacent room about 30 feet away, when polarization matches. Unit has a good fresh rechargeable battery, and uses a standard $22 gelcell, not some exotic battery pack available only from the U.K. for 150 pounds. Complete with instruction and theory manual. ISA is a premier manufacturer of high end countersurveillance equipment. They are still in business and will service their products, although this one should not need anything for a good long while. This unit is circa 1988. Construction is top quality, all welded heavy gauge metal, not plastic or sheet metal. The duplexers are reinforced for stability and will not detune during shipping like another well known brand of NLJ. Cables use standard TNC connectors, easy to find if you ever want to make a set of different length cables. Unit shows no measureable harmonics on the fundamental frequency. Any harmonics around are being generated in the target, not this thing. Adjustable sensitivity helps reduce false alarms and speed operation in high background alarm areas like metal studs. Antenna can be rotated 90 degrees for sweeping in both antenna polarizations. No plastic in this thing. Made to last. All cavities and internal microwave connectors are gold plated. Includes control unit, remote meter indicator, headphone output, high sensitivity headphones, antenna, universal joint, rugged metal extendable pole of adjustable length, shoulder strap for control unit, internal gelcell, charger, coax and remote meter cables, extendable metal tapper for thumping suspect joints, instruction manual, battery test function on meter, LED power and battery charge indicator, and fitted hard carrying case with combination lock. The NLJD will detect electronic surveillance items, tape recorders, most microphones (electret w/ preamp), video cameras, transmitters, receivers, repeaters, anything electronic containing semiconductors (diodes, transistors or integrated circuits). It will detect them whether they are working or not, whether they even have batteries in them or not. Detection distances depend on several factors, but ranges from 6 inches to maybe12 inches. This device can detect a bug buried in solid concrete, although that is unlikely to happen in real life. It will detect devices on the other side of a wall, so don't freak when you get a hit until you inspect the adjoining areas. It merely may be detecting a clock on the opposite side of the wall. This can be an extremely effective tool in capable hands. Until fairly recently, nonlinear junction detectors were restricted to government use and were classified. Now they are available for nongovernment use, at new prices starting at about $15,000 and going to nearly twice that for rugged commercial units. There are two ways to find a bug whose battery has run down: physical inspection and nonlinear junction detection. You can save a tremendous amount of time over a physical search with competent use of this unit. Plus, you don't have to disturb the area as much, which is a factor when you are in an executive office. A piece like this can separate the men from the boys. I am advertising this piece elsewhere for only $5500 plus freight. This is about 25% of original cost. For one week, until July 25th, members of this list may take another 10% off, for a lowered total of $5000. Save $500 by being a member of this list. Can take credit cards for payment. Call today and you can have it tomorrow. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 925 From: James M. Atkinson, Comm-Eng Date: Tue Jul 18, 2000 8:33pm Subject: Dirty Deeds In Industry Spy Wars Dirty Deeds In Industry Spy Wars http://www.it.fairfax.com.au/industry/20000718/A11980-2000Jul17.html Tuesday 18 July 2000 David Ditzel chuckles at the memory of the sudden interest in his company's garbage weeks before it unveiled its top-secret computer chip. But with hundreds of millions of dollars in research on the line, keeping the microprocessor's specifications secret was no laughing matter. Ditzel and his employees at Transmeta's sprawling office complex, located in an area tightly packed with semiconductor companies, kept careful watch on their garbage bins and chased off several people, including one whose car bore the bumper sticker of a well-known rival. "We made sure all they got were orange rinds," said Ditzel, Transmeta's chief executive. "Dumpster diving", hacking, bribery, poaching key employees and not-so-casual conversations with unsuspecting relatives of company executives have become conventional tools in the unconventional business of corporate espionage. Even Oracle's hiring of detectives to dig up information on its arch-rival Microsoft did not shock executives in Silicon Valley, where "security" companies say it is standard procedure to get down in the dirt to muddy the image of competitors or profit from their work. Fortune 1000 companies lost more than $US 45 billion ($A77 billion) last year from trade theft, according to a survey by the American Society for Industrial Security and PricewaterhouseCoopers. Other estimates put the figure closer to $US 100 billion. In the game of spy vs. spy, few players are willing to admit involvement unless caught. In recent years, admissions of unorthodox tactics have come from Microsoft, America Online, and now Oracle. Oracle chairman Larry Ellison said he authorized payments to a private detective agency to spy on several trade and policy groups that publicly supported Microsoft in the federal anti-trust case. According to executives at firms involved in corporate espionage, what has been called "Larrygate" by some is not an isolated incident. "Corporate wars are just like real wars: They're ugly, and they are won and lost in the details," said Eric Dezenhall, whose Washington firm Nichols-Dezenhall hires private detectives, former law enforcement and secret service officers for corporate investigations. Amit Yoran, chief executive of RIPTech, a security-monitoring company, said: "It's not something that's openly talked about because most people think it does smell. "But you have to realize this is a global economy we're now talking about. In the international and global economies where we are competing, these are commonly accepted business practices." =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 926 From: James M. Atkinson, Comm-Eng Date: Wed Jul 19, 2000 7:13pm Subject: Pentagon red-faced over award to security company Pentagon red-faced over award to security company http://www.cnn.com/2000/US/07/18/defense.award.snafu/index.html July 18, 2000 Web posted at: 11:26 p.m. EDT (0326 GMT) From CNN National Security Producer Chris Plante WASHINGTON (CNN) -- The Defense Department says it is embarrassed about having presented an award for industrial security to a company that is being investigated for giving a sensitive report on missile technology to the government of China. The Defense Security Service (DSS) presented the Cogswell Award Monday to the Loral Space & Communication company for "Outstanding Industrial Security Achievement" -- then learned several hours later that Loral is the subject of an ongoing three-year investigation into the alleged security breach. The decision to give the award to Loral was almost immediately reversed. "I'd describe it as an embarrassment and something that was unfortunate," said Pentagon spokesman Ken Bacon. "As soon as it was learned that Loral was under investigation, the award was withdrawn." A grand jury has been looking into allegations that Loral violated export control laws when they provided the Chinese government with an assessment of a failed Chinese missile launch, perhaps contributing to China's ballistic missile program. The failed Chinese missile was contracted to carry a Loral satellite into orbit. "I think it's seen upstairs (in the office of Defense Secretary William Cohen) as an embarrassment, and it was quickly corrected," Bacon said. The decision to present the award for sound security practices to Loral and 49 other companies had been approved by the office of the Secretary of Defense. "I don't have a good explanation for this, but I suspect that the award -- I know that the award was for a national industrial security program, which involves steps that companies take to deal with the way classified information is handled within their facilities. And the people who made this award were probably unaware of the fact that Loral was under investigation for another matter, which is a violation of export control, an alleged violation of export control policies," Bacon said. "So it was just a question of somebody not being omniscient enough to have a complete picture of Loral's dealings across the board." =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 927 From: James M. Atkinson, Comm-Eng Date: Wed Jul 19, 2000 7:18pm Subject: Secrets of Russia's elite put on Internet Secrets of Russia's elite put on Internet Wednesday 19 July 2000 Secrets of Russia's elite put on Internet http://www.telegraph.co.uk/et?ac=000579381554028&rtmo=qXspKtd9&atmo=99 999999&pg=/et/00/7/19/wrus19.html By Marcus Warren in Moscow TRANSCRIPTS of phone conversations among Russia's tycoons have found their way on to the Internet as rival clans struggle for power. The conversations, accepted to be genuine, are the result of thousands of hours of phone-tapping, tailing and investigation. The overall portrait of official cynicism and greed is all too credible, despite evidence that some of the "facts" have been tampered with. Reading all the files on the Internet would take weeks and be depressing, confirming the worst suspicions about the nation's elite. Those curious as to which tycoon allegedly killed someone in a car crash, how officials wriggle out of criminal investigations and which madam supplied a senior government figure with prostitutes need look no further than the sites. One businessman is followed from Luton airport to an address in Kensington, with the registration numbers and chauffeurs of his cars identified. Some of the revelations are sordid, others banal. Many are simply descriptions of their flats, workplaces and relations with colleagues. Others document the links between big business and crime. Sergei Sokolov, editor of an Internet site that is posting 20,000 pages of files, said: "A huge number of people had their private lives spied on. Russia has 10 official intelligence services and some 20 private ones violating our rights." The publication of the material could not be more timely for President Putin, whose assault on Russia's tycoons has put the nation's espionage under renewed scrutiny. Much of the material analyses the "oligarchs" who, at the height of their power in the Nineties, headed large private armies of former KGB and police officers. Mr Putin has exploited the widely held belief that the tycoons have been waging an espionage war against the state and each other to help justify the authorities' crackdown on big business. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 928 From: James M. Atkinson, Comm-Eng Date: Thu Jul 20, 2000 1:51am Subject: re: Carrier Current/Subcarrier Another list member forward this to me, and asked that I remove his name prior to posting it to the list: >Jim; > >My subcarrier capabilities are: >VLF receiving upconvertor (4 Mhz IF or output) >AOR3000 receiver >Tek 492 (grunt) anaylzer >Blocking capacitors/power adaptor >Tek 2336 YA O-scope > >Adequate for the "lower and medium" threat levels I believe. > >I normally sweep 10 Khz -540 Khz in residential or perceived >lower-threat settings and HF/VHF in corporate or industrial settings. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 929 From: Date: Thu Jul 20, 2000 8:13am Subject: Avcom PSA 65C for sale I have the following for sale. An Avcom PSA 65C, 2 frequency extenders (1250-2500Mhz,2500-3750Mhz),Fm video demodulator/AM video converter, Software/Converter for IBM PC, and an Avsac Black Nylon Carrying case. I paid $5600 new in August '99. This unit has never been used in the field. Software never used. All equiptment is in Excellent A++ condition. Unit has not been calibrated since first purchased. I am asking $4000 for all, but I will discount to $3750 and pay shipping only for members of this list. This offer good until July 31st. Will not ship outside the U.S.. Personal or Company Checks must clear my bank prior to shipping. Regards, Brad Hayes 930 From: DrPepper Date: Thu Jul 20, 2000 8:22am Subject: Re: re: Carrier Current/Subcarrier Hmmmmmm! That's why I use a near feild frequency counter for my preliminary sweeps. If I'm looking for bugs that are suspected to be put there by a private party, and not a gov't agency, then I let the counter find it no matter where it is, usuually under 1.2 Gigs. If it's OVER that, then it's something I don't want to be mixed up in. That doesn't count VIDEO signals, that may be at around 2.4 gigs.but those are easier to find than an audio bug. ============================================= "James M. Atkinson, Comm-Eng" wrote: > Another list member forward this to me, and asked that I remove his > name prior to posting it to the list: > > >Jim; > > > >My subcarrier capabilities are: > >VLF receiving upconvertor (4 Mhz IF or output) > >AOR3000 receiver > >Tek 492 (grunt) anaylzer > >Blocking capacitors/power adaptor > >Tek 2336 YA O-scope > > > >Adequate for the "lower and medium" threat levels I believe. > > > >I normally sweep 10 Khz -540 Khz in residential or perceived > >lower-threat settings and HF/VHF in corporate or industrial settings. > > =================================================================== > Everybody's into computers... Who's into yours?Å > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > "By the pricking of my thumbs, something wicked this way comes." > - Macbeth, Shakespeare > =================================================================== > > ------------------------------------------------------------------------ > Remember four years of good friends, bad clothes, explosive chemistry > experiments. > http://click.egroups.com/1/7077/1/_/507420/_/964076095/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- - - - Dr Pepper, aka Ron Cheshire, WB6GKI, 3537.26N/11740.02W China Lake, CA USA 90 miles West of Death Valley, 200 miles North of LAX - - - 931 From: Steve Uhrig Date: Thu Jul 20, 2000 11:36am Subject: re: Carrier Current/Subcarrier Once upon a midnight dreary, DrPepper pondered, weak and weary: > Hmmmmmm! > That's why I use a near feild frequency counter for my preliminary sweeps. A frequency counter, even a high end unit, is so insensitive as to be essentially worthless for sweeping. A low powered device will not register reliably on the thing unless you are very close. "Near field" by definition, is within a wavelength. A full wavelength for a typical 500 megacycle transmitter is about 22 inches. At 2.4 gigs, it is 4.5 inches. A more appropriate device, not sold at Radio Shack or ham radio outlets, will hear a potential hostile transmitter one hundred times as far as a typical high end frequency counter. Sweeping my office with a fifteen thousand dollar IFR service monitor incorporating a counter, using a remote antenna on a length of cable, results in reading dozens of signals, none of them hostile, many of them in suspicious frequency regions. How would you tell the difference? If you are using a frequency counter you are fooling yourself. If you are charging money for doing so, you are cheating your customer. Your conscience. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: David Alexander Date: Sun Jul 13, 2003 4:59am Subject: RE: Corning Cable Systems - Laser point to point Matt I can't comment on the technical capability to capture laser traffic, there are plenty of others on this list who are far better qualified to do that. I can comment on how to protect the traffic with crypto, because I am an Information Security consultant. Put some decent hardware encryptors on either end (if it's gigabyte bandwidth you're after, then software encryptors won't be able to cope). I would hope they already have their own digital certificate server if so generate a nice long key with a tough, secure algorithm (RSA, 1024 bits would do) and use that to encrypt all the traffic over the link. It doesn't matter if someone captures traffic then, all they get is garbage that will prove uneconomical to break. Hope that helps David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: mpaulsen6 [mailto:mpaulsen6@a...] Sent:12 July 2003 21:40 To:TSCM-L@yahoogroups.com Subject:[TSCM-L] Corning Cable Systems - Laser point to point I have a need for multi-gb/s wireless networking connection. Have met with Corning, which suggested their multibeam laser for site-to- site. They referenced a few govt. sector customers. I'd like to know what people think of their product from a security standpoint with this technology before shelling out 6 figures for the installation. I must be able to show that the technology is nearly impossible to penetrated while still enabling a high throughput rate. Corning suggests it is by referencing their client list. Anyone? ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7564 From: kondrak Date: Sun Jul 13, 2003 2:30pm Subject: RE: Corning Cable Systems - Laser point to point The multiplexing of a signal to keep power levels constant over bandwidth (symbol density) is usually pretty good security, but even a low number encryption key like 40, would render it real secure before multiplexing. This would add to the speed factor, which he seems to need for this huge bandwidth. At 10:59 7/13/2003 +0100, you wrote: >Matt > >I can't comment on the technical capability to capture laser traffic, there >are plenty of others on this list who are far better qualified to do that. > >I can comment on how to protect the traffic with crypto, because I am an >Information Security consultant. > >Put some decent hardware encryptors on either end (if it's gigabyte >bandwidth you're after, then software encryptors won't be able to cope). I >would hope they already have their own digital certificate server if so >generate a nice long key with a tough, secure algorithm (RSA, 1024 bits >would do) and use that to encrypt all the traffic over the link. It doesn't >matter if someone captures traffic then, all they get is garbage that will >prove uneconomical to break. 7565 From: Fernando Martins Date: Mon Jul 14, 2003 0:29pm Subject: Cell phones that repel mosquitoes South Korea's SK Telecom has developed a service that will turn cell phones into a mosquito repellant. The company is to offer a downloadable program that enables cell phones to emit a sound that mosquitoes cannot tolerate. The range of the sound "shield" is estimated at about 1 meter. The application does use up the handset battery faster, but the service is still expected to be hugely popular at outside cafes where the phone can create a mini-shield round the user during the evening. The sound shield is inaudible to human ears. Posted on 10-Jul-03 Read this article on the web at: www.cellular-news.com/story/9257.shtml [when I was a kid I made a similar device in an old fashoin stand alone version, no cellphone included ... and it worked, anybody wanting that info in portuguese I can scan some yellow old pages and send via email .. the circuit to build, the components, bla bla bla ... if I can find again those pages :] 7566 From: Steve Uhrig Date: Tue Jul 15, 2003 1:17pm Subject: Some items for sale New, used, tradeins, excess inventory, contract overruns. Communications, test equipment, surveillance, countersurveillance, misc electronics and some things 'not otherwise classified'. http://www.swssec.com/equipment_for_sale.html Check the References section or ebay under my email ID for that info if you need to. Credit cards accepted and will ship to any non-embargoed country. Please read the notice of restricted sales on some items. It is not a sales tactic. Email if questions. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7567 From: Robert Dyk Date: Tue Jul 15, 2003 2:46pm Subject: Thermal Cameras Has anyone on the list had any experience with ISAP thermal imaging equipment ? In particular non-cooled thermal surveillance cameras. Any feedback would be most appreciated. Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. 7568 From: Date: Wed Jul 16, 2003 0:29pm Subject: Funding for TIA All But Dead Funding for TIA All But Dead By Ryan Singel Story location: http://www.wired.com/news/politics/0,1283,59606,00.html 02:00 AM Jul. 14, 2003 PT The controversial Terrorism Information Awareness program, which would troll Americans' personal records to find terrorists before they strike, may soon face the same fate Congress meted out to John Ashcroft in his attempt to create a corps of volunteer domestic spies: death by legislation. The Senate's $368 billion version of the 2004 defense appropriations bill, released from committee to the full Senate on Wednesday, contains a provision that would deny all funds to, and thus would effectively kill, the Terrorism Information Awareness program, formerly known as Total Information Awareness. TIA's projected budget for 2004 is $169 million. TIA is the brainchild of John Poindexter, a key figure from the Iran-Contra scandal, who now heads the research effort at the Defense Advanced Research Projects Agency. Critics on the left and right have called TIA an attempt to impose Big Brother on Americans. The program would use advanced data-mining tools and a mammoth database to find patterns of terrorist activities in electronic data trails left behind by everyday life. The Senate bill's language is simple but comprehensive: "No funds appropriated or otherwise made available to the Department of Defense ... or to any other department, agency or element of the Federal Government, may be obligated or expended on research and development on the Terrorism Information Awareness program." The removal of funds from the program marks the strongest Congressional reaction to TIA since it first gained prominent media attention in November 2002. The Senate likely will vote on and pass the bill early next week as lawmakers hope to send the spending bill to the White House before Congress recesses in August. After the Senate votes, the provision's fate will be decided by a joint committee, which will reconcile the Senate's bill with the House version. The House version contains no explicit provision to deny funds to TIA. But Congress watchers say opponents of the TIA likely will succeed in killing it. "The provision was added by the consensus of the committee," said David Carle, a spokesman for Sen. Patrick Leahy, a member of the Defense Appropriations subcommittee. Carle also said that the drive to include the provision denying funds was led by Republican Sen. Ted Stevens, who chairs both the defense subcommittee and the appropriations committee. "The defunding has a chance of surviving committee," said Ari Schwartz, associate director of the Center for Democracy and Technology. "If Stevens is behind it, then it almost certainly will happen." Both bills also seek to prevent the use of the data-mining system on American citizens without Congressional approval. That provision was included in the Senate version at the request of Sen. Ron Wyden. Wyden, a prominent critic of the program, inserted a similar limitation on TIA in a bill passed in February. His amendment also required the Pentagon to submit a report to Congress or face loss of funds for the program. Darpa submitted the 108-page report to Congress on May 19. The report detailed the program's many components and announced the renaming of the program. Privacy advocates lambasted the name change as "cosmetic." The Electronic Frontier Foundation's analysis, which called the report a "major disappointment," noted that discussions of privacy or civil liberties issues were "conspicuously absent." [Non-text portions of this message have been removed] 7569 From: Date: Fri Jul 11, 2003 8:15am Subject: Re: Sweeping for 2.4 GHz video If you are strictly looking for video the Scout won't do you much good as there are a lot of things that operate on that frequency, such as cordless phones, wireless Ethernet and microwave ovens. All you need is a Wavecom receiver (check out eBay) and a portable black and white TV ($25 at Target). If you are lucky you can accomplish your task for around $50. If you want to really look cool you could use an Icom IC-R3 which is a scanner with a built-in monitor. It's about $400, though. See http://www.icomamerica.com/receivers/handheld/icr3main.html for details. (Embedded image moved to file: pic24272.pcx) ******************* N O T I C E ******************* The information contained in this e-mail, and in any accompanying documents, may constitute confidential and/or legally privileged information. The information is intended only for use by the designated recipient. If you are not the intended recipient (or responsible for the delivery of the message to the intended recipient), you are hereby notified that any dissemination, distribution, copying, or other use of, or taking of any action in reliance on this e-mail is strictly prohibited. If you have received this e-mail communication in error, please notify the sender immediately and delete the message from your system. *************************************************** [Non-text portions of this message have been removed] 7570 From: Thomas Shaddack Date: Sat Jul 12, 2003 9:20am Subject: GSM encryption in Russia switched off (article link) Police and FSB Listen In on Mobile Phone Calls http://www.themoscowtimes.com/stories/2003/07/10/012.html By Valeria Korchagina Staff Writer MT A mobile phone showing encryption is off. Mobile phone providers switched off their encryption systems for 24 hours on a government order, allowing the Federal Security Service and the police to eavesdrop on all calls. An alert notifying callers that their conversations could be listened in on popped up on cellphones around Moscow at 9 p.m. Tuesday and lasted until 9 p.m. Wednesday on an order by the Communications Ministry. The alert, depending on the model of cellphone, is usually either an exclamation point or an unlocked padlock. The Communications Ministry said it issued the order at the request of the Interior Ministry, Interfax reported Wednesday. The Interior Ministry could not be reached for comment. The FSB refused to comment. "The action taken to shut down the encryption system was conducted in accordance to the existing law and in order to prevent crimes," Mobile TeleSystems said in a statement Wednesday. "All cellular operators provide technical support to law enforcement agencies as required under the law. We do not comment about the actions of the special services -- they do their work in the best interests of Moscow residents," Megafon said. The decision to shut down encryption follows the double suicide bombings that killed 14 people at the Krylya rock festival Saturday. A cellphone was found on one of the female suicide bombers, and the FSB is examining its SIM card for clues as to whether the bombers coordinated the attack with accomplices, according to local media reports. The last time Moscow callers saw the encryption alert on their cellphones was during the Dubrovka theater crisis in October, when a group of 41 Chechen rebels took more than 800 people hostage. After a three-day standoff, special forces piped gas into the theater to knock out the captors and rescue the hostages. But more than 120 hostages died, most from the effects of the gas. The only court conviction in the theater tragedy was handed down last month to Zaurbek Talkhigov, who was charged with using his cellphone to pass key information about law enforcement activities during the crisis. The charge was based on tapes of Talkhigov's cellphone conversations. A Moscow court sentenced Talkhigov, 25, to 8 1/2 years in prison on June 20 and ordered the tapes destroyed. Mobile phone providers shut down their encryption systems in St. Petersburg for security reasons during the city's 300th anniversary celebrations attended by world leaders early last month. 7571 From: Thomas Shaddack Date: Sat Jul 12, 2003 6:25pm Subject: Recovery of data from DRAM-based answering machines (a thought) > (From a post by Eric Murray from Cypherpunks-L) > > DRAM also has power-off memory persistence > and nearly everyone in security ignores that as well. > > But not the spooks : > > "The FEI-374i-DRS is a data recovery system that captures and preserved > digital data, in its original format, directly from the Dynamic Random > Access Memory (DRAM) of Digital Telephone Answering Machines (DTAMs) > .. > The FEI-374i-DRS is an indispensable tool for forensic investigators > required to evaluate residual audio and tag information retained in > today's DRAM-based DTAMs." > > http://www.nomadics.com/374idrs.htm The DTAMs are obviously poorly designed from the point of security. They use the DRAM for storage of sampled audio data in a sort of a filesystem, and just deallocate the used memory instead of overwriting it. Which is enough under normal threat models; the erased data aren't available through any user-accessible interfaces, just stay in the memory until they are overwritten with new ones. However, more sophisticated adversary (eg, who uses the instrument described above) can acquire the raw memory content, then reconstruct the data thought to be erased. DRAM cells lose charge (and, hence, their content) when powered off or not refreshed for longer period, but the DTAMs often have battery-powered circuits to backup their content when powered off. Which leads me to an idea. In the age of embedded computers, of relatively cheap StrongARM and MIPS computer cores capable of running stripped down (or entirely unmodified) freely available and fully documented operating systems (NetBSD, Linux...), it should not be a big problem to design a DTAM with all necessary security features - from secure deleting of messages from memory, to storing them in encrypted form (for the highest threat models). Using a PC instead of a dedicated embedded computer is possible as well, and in the age of garage-sale $50 computers maybe even financially better - the system can boot from a floppy or a CD, if diskless operation is desired. Encrypted message storage should be performed using asymmetric approach; the adversary, once he gains physical access to the device, shouldn't be able to extract the decrypting key, which is achieved the best way if the key isn't physically present in the device at all. Access may be realized by plugging in a medium with the appropriate key (USB disk, smartcard, etc.), or by accessing the DTAM from a standalone computer, either over LAN or over the Internet, downloading the encrypted stored messages, and listening to them locally. An important loss of a feature in the encrypted system is the remote access to the messages; however, in the threat level where this measure becomes necessary there is too high risk of tapped line anyway. A possible workaround is using a VoIP-like encrypted link, accessing the DTAM in a way similar to dialing an ISP. Would require a laptop with a modem or a Net connection, though. Secure answering machines seem to be technically feasible. Why they aren't on the market (or at least on so common market I'd be aware about their existence)? Are answering machines a threat anyway? Is any significant amount of intelligence ever being recovered from them? Do they pose threat at all? PS: Regarding answering machines, we had a case here (.cz) with someone attacking the "green lines" (800- ones), usually information services of various government/county services, and overwriting the greeting messages on the answering machines found there with lewd ones. Seems their users didn't ever reset their remote access code from the factory default. 7572 From: Dave Emery Date: Sat Jul 12, 2003 8:56pm Subject: Re: VCRs on endangered species list On Sat, Jul 12, 2003 at 07:16:11AM -0700, Mitch D wrote: > > --- MACCFound@a... wrote: > > VCRs on endangered species list > > > > Thursday, July 03, 2003 With prices for DVD recorders falling > > fast, VCRs > > will be obsolete within a few years > > I dont believe they will be completely obsolete,as both DVR and > video tape recorders have their purposes,and respective user > market.Tape is simple to use, DVR requires thought and minor > programming. > Pure marketing hype. I think you are confusing DVRs and DVD recorders. There is a new consumer product family that is basicly a DVD player that has a NTSC to MPEG chip in it and the ability to write DVD+Rs and DVE+RWs so it can both play rented or purchased DVDs and make DVDs from NTSC input. As far as I can discern from seeing them in stores (don't have one yet) they can be made to record TV signals much as a VCR can with similar controls and user interface concepts. No more programming required than a VCR as far as I can tell. Of course if one wishes to do more than record a program on a DVD (DVD mastering) a computer with a DVD+RW drive on it and DVD mastering software is more useful since it enables all the chapter markers and other formating to be written along with the video. And that DOES take some programming (or user interface manipulation, more properly - no actual coding involved). Eventually if the copyright issues ever get settled there may be a consumer DVD recorder that will record from digital input rather than analog NTSC.... -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass 02493 PGP fingerprint 1024D/8074C7AB 094B E58B 4F74 00C2 D8A6 B987 FB7D F8BA 8074 C7AB 7573 From: Intercept Investigations Date: Sun Jul 13, 2003 10:39pm Subject: Re: VCRs on endangered species list >> Thursday, July 03, 2003 With prices for DVD recorders falling >>fast, VCRs >>will be obsolete within a few years > > > I dont believe they will be completely obsolete,as both DVR and > video tape recorders have their purposes,and respective user > market.Tape is simple to use, DVR requires thought and minor > programming. > Pure marketing hype. > I respectfully disagree. There will be available DVRs that will be as simple as inserting the disc and pressing 'record' (just as simple as any VCR), if they are not already available. Based upon the progression of previous 'quantum leap' type technology advances, "if it ain't digital it's already obsolete," and in the not too distant future, analog will be 'ancient history'. Just take a look at vinyl records, and very soon, audio cassette tapes. Soon, you'll only be able to find used VCRs and pre-recorded VHS movies. Of course, that's just my opinion. -- Steven W. Gudin, Director Intercept Investigations 700 NW Gilman Boulevard #463 Issaquah (Seattle), WA 98027 Tel: (425) 313-1776 Fax: (425) 313-1875 Web: www.InterceptInvestigations.com Email: mail@I... Washington License # 602225499 Nevada License # 847 NATIONWIDE & INTERNATIONAL INVESTIGATION SERVICES This communication is intended for the sole use of the individual to whom it is addressed and may contain information that is privileged, confidential and exempt from disclosure under applicable law. If the reader of this communication is not the intended recipient or the employee or agent for delivering the communication to the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication may be strictly prohibited. If you receive this email in error, please notify us immediately and delete this message from your computer. Nothing contained within this email message is intended, nor should it be interpreted as, legal advice or counsel. 7574 From: L A Date: Mon Jul 14, 2003 11:12am Subject: Trojans - and how to protect your network against them Trojans - and how to protect your network against them from GFI Software Ltd on Thursday, July 10, 2003 Introduction This white paper outlines what Trojans are and why they pose a danger to corporate networks. As early as 2001, an eWeek article reported that tens of thousands of machines are infected with Trojans. This is still the case today - and the use of more sophisticated technology makes them all the more alarming: Trojans can be used to steal credit card information, passwords, and other sensitive information, or to launch an electronic attack against your organization. The white paper discusses the need for a Trojan and executable scanner at mail server level in addition to a virus scanner, to combat this threat. What is a Trojan horse? In the IT world, a Trojan horse is used to enter a victim's computer undetected, granting the attacker unrestricted access to the data stored on that computer and causing great damage to the victim. A Trojan can be a hidden program that runs on your computer without your knowledge, or it can be 'wrapped' into a legitimate program meaning that this program may therefore have hidden functions that you are not aware of. (For a quick look at how Trojans work, please click here.) What the attacker looks for Trojans can be used to siphon off confidential information or to create damage. Within the network context, a Trojan is most likely to be used for spying and stealing private and sensitive information (industrial espionage). The attacker's interests could include but are not limited to: Credit card information (often used for domain registration or shopping sprees) Any accounting data (email passwords, dial-up passwords, Web services passwords, etc) Confidential documents Email addresses (for example, customer contact details) Confidential designs or pictures Calendar information regarding the user's whereabouts Using your computer for illegal purposes, such as to hack, scan, flood or infiltrate other machines on the network or Internet. Different types of Trojans There are many different types of Trojans, which can be grouped into seven main categories. Note, however, that it is usually difficult to classify a Trojan into a single grouping as Trojans often have traits would place them in multiple categories. The categories below outline the main functions that a Trojan may have. Remote access Trojans These are probably the most publicized Trojans, because they provide the attacker with total control of the victim's machine. Examples are the Back Orifice and Netbus Trojans. The idea behind them is to give the attacker COMPLETE access to someone's machine, and therefore full access to files, private conversations, accounting data, etc. The Bugbear virus that hit the Internet in September 2002, for instance, installed a Trojan horse on the victims'machines that could give the remote attacker access to sensitive data. The remote access Trojan acts as a server and usually listens on a port that is not available to Internet attackers. Therefore, on a computer network behind a firewall, it is unlikely that a remote (off-site) hacker would be able connect to the Trojan (assuming that you have blocked these ports, of course). HOWEVER, an internal hacker (located behind the firewall) can connect to this kind of Trojan without any problems. Data-sending Trojans (passwords, keystrokes etc.) The purpose of these Trojans is to send data back to the hacker with information such as passwords (ICQ, IRC, FTP, HTTP) or confidential information such as credit card details, chat logs, address lists, etc. The Trojan could look for specific information in particular locations or it could install a key-logger and simply send all recorded keystrokes to the hacker (who in turn can extract the passwords from that data). An example of this is the Badtrans.B email virus (released in the wild in December 2001) that could log users' keystrokes. Captured data can be sent back to the attacker's email address, which in most cases is located at some free web-based email provider. Alternatively, captured data can be sent by connecting to a hacker's website - probably using a free web page provider - and submitting data via a web-form. Both methods would go unnoticed and can be done from any machine on your network with Internet and email access. Both internal and external hackers can use data-sending Trojans to gain access to confidential information about your company. Destructive Trojans The only function of these Trojans is to destroy and delete files. This makes them very simple to use. They can automatically delete all the core system files (for example, .dll, .ini or .exe files, and possibly others) on your machine. The Trojan can either be activated by the attacker or can work like a logic bomb that starts on a specific day and time. A destructive Trojan is a danger to any computer network. In many ways, it is similar to a virus, but the destructive Trojan has been created purposely to attack you, and therefore is unlikely to be detected by your anti-virus software. Denial of service (DoS) attack Trojans These Trojans give the attacker the power to start a distributed denial of service (DDoS) attack if there are enough victims. The main idea is that if you have 200 infected ADSL users and you attack the victim simultaneously from each, this will generate HEAVY traffic (more than the victim's bandwidth can carry, in most cases), causing its access to the Internet to shut down. WinTrinoo is a DDoS tool that has recently become very popular; through it, an attacker who has infected many ADSL users can cause major Internet sites to shut down; early examples of this date back to February 2000, when a number of prominent e-commerce sites such as Amazon, CNN, E*Trade, Yahoo and eBay were attacked. Another variation of a DoS Trojan is the mail-bomb Trojan, where the main aim is to infect as many machines as possible and simultaneously attack specific email address/addresses with random subjects and contents that cannot be filtered. Again, a DoS Trojan is similar to a virus, but the DoS Trojan can be created purposely to attack you, and therefore is unlikely to be detected by your anti-virus software. Proxy Trojans These Trojans turn the victim's computer into a proxy server, making it available to the whole world or to the attacker alone. It is used for anonymous Telnet, ICQ, IRC, etc., to make purchases with stolen credit cards, and for other such illegal activities. This gives the attacker complete anonymity and the opportunity to do everything from YOUR computer, including the possibility to launch attacks from your network. If the attacker's activities are detected and tracked, however, the trail leads back to you not to the attacker - which could bring your organization into legal trouble. Strictly speaking, you are responsible for your network and for any attacks launched from it. FTP Trojans These Trojans open port 21 (the port for FTP transfers) and let the attacker connect to your machine via FTP. Security software disablers These are special Trojans, designed to stop/kill programs such as anti-virus software, firewalls, etc. Once these programs are disabled, the hacker is able to attack your machine more easily. The Bugbear virus installed a Trojan on the machines of all infected users and was capable of disabling popular anti-virus and firewalls software. The destructive Goner worm (December 2001) is another virus that included a Trojan program that deleted anti-virus files. Security software disablers are usually targeted at particular end-user software such as personal firewalls, and are therefore less applicable to a corporate environment. How can I get infected? For a network user who is protected by a firewall and whose ICQ and IRC connections are disabled, infection will mostly occur via an email attachment or through a software download from a website. Many users claim never to open an attachment or to download software from an unknown website, however clever social engineering techniques used by hackers can trick most users into running the infected attachment or downloading the malicious software without even suspecting a thing. An example of a Trojan that made use of social engineering was the Septer.troj, which was transmitted via email in October 2001. This was disguised as a donation form for the American Red Cross's disaster relief efforts and required recipients to complete a form, including their credit card details. The Trojan then encrypted these details and sent them to the attacker's website. Infection via attachments It is amazing how many people are infected by running an attachment sent to their mailbox. Imagine the following scenario: The person targeting you knows you have a friend named Alex and also knows Alex's email address. The attacker disguises a Trojan as interesting content, for example, a Flash-based joke, and emails it to you in your friend's name. To do so, the attacker uses some relaying mail server to falsify the email's FROM field and make it look like Alex is the sender: Alex's email address is alex@e... so the attacker's FROM field is changed to alex@e.... You check your mail, see that Alex has sent you an attachment containing a joke, and run it without even thinking that it might be a malicious "because, hey, Alex wouldn't do something like that, he's my friend!" Information is power: Just because the attacker knew you had a friend Alex, and knew and guessed that you would like a joke, he succeeded in infecting your machine! Various scenarios are possible. The point is that it only takes ONE network user to get your network infected. In addition, if you are not running email security software that can detect certain exploits, then attachments could even run automatically, meaning that a hacker can infect a system by simply sending you the Trojan as an attachment, without any intervention on a user's part. Infection by downloading files from a website Trojans can also be distributed via a website. A user can receive an email with a link to an interesting site, for instance. The user visits the site, downloads some file that he thinks he needs or wants, and without his knowing, a Trojan is installed and ready to be used by attacker. A recent example is the ZeroPopUp Trojan, which was disseminated via a spam broadcast and enticed users to download the Trojan, describing it as a product that would block pop-up ads. Once installed, the Trojan would send a mail to everybody in the infected user's address book promoting the ZeroPopUp URL and software. As this email is sent from a friend or colleague, one is more likely to check out the URL and download the software. In addition, there are thousands of "hacking/security" archives on free web space providers like Xoom, Tripod, Geocities and several others. Such archives are full of hacking programs, scanners, mail-bombers, flooders and various other tools. Often several of these programs are infected by the person who created the site. Again, a single network user could infect your whole network. In January 2003, TruSecure, the risk management firm that also owns ICSA Labs and InfoSecurity Magazine, warned that malware code writers will increasingly disguise remote access Trojans as 'adult' entertainment, for example, and post these programs to pornography sites or news groups, to target new users. Specific users will also be targeted in this way, as the attacker can then send the URL containing the disguised malware to an unsuspecting victim. How to protect your network from Trojans So how do you protect your network from Trojans? A common misconception is that anti-virus software offers all the protection you need. The truth is anti-virus software offers only limited protection. Anti-virus software recognizes only a portion of all known Trojans and does not recognize unknown Trojans. Although most virus scanners detect a number of public/known Trojans, they are unable to scan UNKNOWN Trojans. This is because anti-virus software relies mainly on recognizing the "signatures" of each Trojan. Yet, because the source code of many Trojans is easily available, a more advanced hacker can create a new version of that Trojan, the signature of which NO anti-virus scanner will have. If the person planning to attack you finds out what anti-virus software you use, for example through the automatic disclaimer added to outgoing emails by some anti-virus engines, he will then create a Trojan specifically to bypass your virus scanner engine. Apart from failing to detect unknown Trojans, virus scanners do not detect all known Trojans either - most virus vendors do not actively seek new Trojans and research has shown that virus engines each detect a particular set of Trojans. To detect a larger percentage of known Trojans, you need to deploy multiple virus scanners; this would dramatically increase the percentage of known Trojans caught. To effectively protect your network against Trojans, you must follow a multi-level security strategy: You need to implement gateway virus scanning and content checking at the perimeter of your network for email, HTTP and FTP - It is no good having email anti-virus protection, if a user can download a Trojan from a website and infect your network. You need to implement multiple virus engines at the gateway - Although a good virus engine usually detects all known viruses, it is a fact that multiple virus engines jointly recognize many more known Trojans than a single engine. You need to quarantine/check executables entering your network via email and web/FTP at the gateway. You have to analyze what the executable might do. Fortunately there are tools available that will automate a large part of this process. Malicious executable analysis - Trojan and executable scanner Detecting unknown Trojans can only be done by manually reviewing the executable, or by using a Trojan and executable scanner. The process of manually reviewing executables is a tedious and time-intensive job, and can be subject to human error. Therefore it is necessary to tackle this process intelligently and automate part of it. This is the purpose of a Trojan and executable analyzer. An executable scanner intelligently analyses what an executable does and assigns a risk level. It disassembles the executable and detects in real time what the executable might do. It compares these actions to a database of malicious actions and then rates the risk level of the executable. This way, potentially dangerous, unknown or one-off Trojans can be detected. The Trojan and executable scanner deals with advanced hackers who create their own versions of Trojans, the signatures of which are not known by anti-virus software. Gateway protection, together with multiple anti-virus engines AND a Trojan and executable scanner will guard your network from the dangerous effects of Trojans. Gateway protection Two products that offer gateway protection that includes multiple virus engines and a Trojan and executable scanner, as well as other security features are: GFI MailSecurity for Exchange/SMTP is an email content checking, exploit detection, Trojan and executable scanning, threats analysis and anti-virus solution that removes all types of email-borne threats before they can affect your email users. GFI MailSecurity's key features include multiple virus engines, for virus engine independence and better security; email content and attachment checking, to quarantine dangerous attachments and content; an exploit shield, to detect emails with OS and application exploits; an HTML threats engine, to disable HTML scripts; and a Trojan & Executable Scanner, to detect potentially malicious executables. Read more and download a trial version at http://www.gfi.com/mailsecurity/. GFI DownloadSecurity for ISA Server enables you to assert control over what files your users download from HTTP and FTP sites. Downloaded files are content checked for malicious content, viruses, and Trojans and can be quarantined based on file type and user. GFI DownloadSecurity handles the security risk of file downloads without resorting to blocking all file downloads at firewall level. Read more and download a trial version at http://www.gfi.com/dsec/. About GFI GFI (www.gfi.com) is a leading provider of Windows-based messaging, content security and network security software. Key products include the GFI FAXmaker fax connector for Exchange and fax server for networks; GFI MailSecurity email content/exploit checking and anti-virus software; and the GFI LANguard family of network security products. Clients include Microsoft, Telstra, Time Warner Cable, Shell Oil Lubricants, NASA, DHL, Caterpillar, BMW, the US IRS, and the USAF. GFI has five offices in the US, UK, Germany, Australia and Malta, and has a worldwide network of distributors. GFI is a Microsoft Gold Certified Partner and has won the Microsoft Fusion 2000 (GEM) Packaged Application Partner of the Year award. © 2003 GFI Software Ltd. All rights reserved. http://www.ds-osac.org/view.cfm?key=7E44524B425C&type=2B170C1E0A3A0F162820 ===== Leopold Altman, Investigator Caliber Investigation Agency cia@e... http://cia1.bravepages.com Tel# 1-718-318-2214 Fax# 1-718-318-2866 Queens, NY __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com 7575 From: ldudlyd Date: Tue Jul 15, 2003 9:18am Subject: skycam It takes pictures from aywhere in a limited 3D space. See EDN Mag: http://a330.g.akamai.net/7/330/2540/14631f1003ffea/www.e-insite.net/ed nmag/contents/images/307871.pdf Best Regards to all, Larry Dillard 7576 From: Lawrence Dillard Date: Wed Jul 16, 2003 7:41am Subject: Flying skycam EDN Mag. has a piece on a cable suspended camera. Goto: http://www.e-insite.net/ednmag/index.asp?layout=article&stt=000&articleid=CA307871&pubdate=7%2F10%2F2003 Larry Dillard 7577 From: kondrak Date: Wed Jul 16, 2003 11:55pm Subject: Re: Funding for TIA All But Dead OPEN funding that is, its not dead, but being moved to black ops. Big brother never goes away, it just morphs into a black project somewhere out of sight. Seeing it was the brainchild of Poindexter, well known previous administration felon and conspirator, its widely embraced by the present proponents of police-state USA. At 17:29 7/16/2003 -0400, you wrote: >Funding for TIA All But Dead > >By HREF="http://www.wired.com/news/feedback/mail/1,2330,742,00.html">Ryan >Singel > >Story location: HREF="http://www.wired.com/news/politics/0,1283,59606,00.html">http://www.wired.com/news/politics/0,1283,59606,00.html > >02:00 AM Jul. 14, 2003 PT > >The controversial Terrorism Information Awareness program, which would troll >Americans' personal records to find terrorists before they strike, may soon >face the same fate Congress meted out to John Ashcroft in his attempt to >create >a corps of volunteer domestic spies: death by legislation. > >The Senate's $368 billion version of the 2004 defense appropriations bill, >released from committee to the full Senate on Wednesday, contains a provision >that would deny all funds to, and thus would effectively kill, the HREF="http://www.darpa.mil/iao/TIASystems.htm">Terrorism >Information Awareness program, formerly known as Total Information >Awareness. >TIA's projected budget for 2004 is $169 million. > > >TIA is the brainchild of John Poindexter, a key figure from the Iran-Contra >scandal, who now heads the research effort at the Defense Advanced Research >Projects Agency. > >Critics on the left and right have called TIA an attempt to impose Big >Brother on Americans. The program would use advanced data-mining tools and >a mammoth >database to find patterns of terrorist activities in electronic data trails >left behind by everyday life. > >The Senate bill's language is simple but comprehensive: "No funds >appropriated or otherwise made available to the Department of Defense ... >or to any other >department, agency or element of the Federal Government, may be obligated or >expended on research and development on the Terrorism Information Awareness >program." > >The removal of funds from the program marks the strongest Congressional >reaction to TIA since it first gained prominent media attention in >November 2002. > >The Senate likely will vote on and pass the bill early next week as lawmakers >hope to send the spending bill to the White House before Congress recesses in >August. > >After the Senate votes, the provision's fate will be decided by a joint >committee, which will reconcile the Senate's bill with the House version. >The House >version contains no explicit provision to deny funds to TIA. But Congress >watchers say opponents of the TIA likely will succeed in killing it. > >"The provision was added by the consensus of the committee," said David >Carle, a spokesman for Sen. Patrick Leahy, a member of the Defense >Appropriations >subcommittee. > >Carle also said that the drive to include the provision denying funds was led >by Republican Sen. Ted Stevens, who chairs both the defense subcommittee and >the appropriations committee. > >"The defunding has a chance of surviving committee," said Ari Schwartz, >associate director of the Center for >Democracy and Technology. "If Stevens is >behind it, then it almost certainly will happen." > >Both bills also seek to prevent the use of the data-mining system on American >citizens without Congressional approval. That provision was included in the >Senate version at the request of Sen. Ron Wyden. > >Wyden, a prominent critic of the program, HREF="http://www.wired.com/news/politics/0,1283,57650,00.html">inserted > a similar limitation on >TIA in a bill passed in February. His amendment also required the Pentagon to >submit a report to Congress or face loss of funds for the program. > >Darpa HREF="http://www.wired.com/news/privacy/0,1848,58936,00.html/">submitted >the 108-page report to Congress on May 19. The HREF="http://www.darpa.mil/body/tia/tia_report_page.htm">report >detailed the program's many components and announced the renaming of the >program. > >Privacy advocates lambasted the name change as "cosmetic." The Electronic >Frontier Foundation's HREF="http://www.eff.org/Privacy/TIA/20030523_tia_report_review.php/">analysis, >which called the report a "major disappointment," >noted that discussions of privacy or civil liberties issues were >"conspicuously absent." > > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7578 From: Steve Uhrig Date: Thu Jul 17, 2003 10:35pm Subject: Decent NLJD For Sale Not by me (this time) http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=2544242655 or http://tinyurl.com/haov(same URL as above) The seller is a list member and a competent man. The item is honestly described, and currently sitting at $2235 which is a lot less than it's worth. Your money would be a lot better spent on a quality item such as this than some piece of overpriced spy junk sold to the public. Microlab Nonlinear Junction Detector. Closes 11:30AM Friday morning East Coast time, so only 12 hours from the time I am posting this to take action if interested. Don't screw around or the clock will run out on you. While I know the seller personally, he does not know I am posting this and I get no commission on the thing. It's just a good deal on a good piece and I'm sharing the opportunity. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7579 From: Date: Fri Jul 18, 2003 7:20am Subject: Deciphering Cellphone Geek-Speak Deciphering Cellphone Geek-Speak From 1xEV-DO to 1xRTT, Shoppers Face Baffling Jargon By Walter Mossberg - The Wall Street Journal Shopping for a cellphone, or for a wireless PDA, often requires navigating through a bewildering set of jargon terms and acronyms. This week, we present a glossary of cellphone technology that should help you become a more informed shopper and phone user. First, let's take the 30,000-foot view. Digital vs. Analog: Decades ago, when wireless telephony began, every country used so-called analog technologies in their wireless networks. The U.S. version of this analog system was called AMPS, for Advanced Mobile Phone Service. More recently, these analog networks have been superseded in urban areas by digital technologies, but analog is still important in rural areas. Digital cellphones tend to have better sound and longer battery life than analog models, and digital networks can much more easily handle data, like e-mail, text messages and Web sites. Some digital phones can use analog as a fallback for voice calls when digital reception is poor or absent. 2G vs. 3G: The wireless phone industry labels various technologies with "G" ratings -- as in "generation." These have technically complex criteria, but to the average consumer they mainly reflect how fast a network, and the phones that use it, can receive and send data, like e-mail and Web pages. Most digital phones today are 2G and receive data very slowly. A few carriers, outside the U.S., have achieved speeds considered 3G, which is the holy grail for the industry, and is the equivalent of broadband computer networks. The newest technologies available to most consumers are considered "2.5G," because they are faster than 2G phones, but much slower than 3G phones. Now, let's discuss the various competing digital technologies used by cellular carriers and phone makers. These technological acronyms aren't usually printed on the actual phones or phone bills, but because each carrier normally uses only one type of technology, if you know your carrier's name, you should be able to easily determine which technology you're using. GSM: Global System for Mobile Communications. This is the standard digital technology for wireless phones in Europe and much of the rest of the world -- but not in the U.S., which lacks a single standard. GSM is gaining ground in the U.S., though it is broadcast on a different frequency than the system used in Europe. GSM is offered domestically by T-Mobile, and by Cingular and AT&T Wireless, which are converting their networks to GSM. GSM phones have a distinctive feature: a small, removable plastic card, called a SIM card, that stores a user's account information, including the phone number and speed-dial entries, on an embedded chip. You can buy a new GSM phone and simply pop your old SIM card into the new phone and it will be activated on your account. GPRS: General Packet Radio Service. This is a faster version of GSM, which speeds up data reception and transmission for things like e-mail and Web browsing. It operates at about the speed of a slow home dial-up modem, usually 30 or 40 kilobits per second. In wireless phone lingo, it is considered a "2.5G" technology, which will eventually be replaced by much faster "3G" data technologies. CDMA: Code-Division Multiple Access. This digital technology is the main competitor to GSM, and is used mostly in the U.S. and South Korea. CDMA is the most popular cellphone technology in the U.S., and is primarily offered domestically by Sprint PCS and Verizon Wireless. CDMA phones don't use the portable SIM cards found in GSM phones. Many cellphone makers produce nearly identical models of handsets for the U.S. market that differ only in whether their innards contain radios that work on CDMA or GSM. But, even if two such phones look identical, they aren't interchangeable. A CDMA phone can't be used on a GSM network, and a GSM phone can't be used on a CDMA network. 1xRTT: This is the faster version of CDMA, just as GPRS is the faster version of GSM. Because the name is a mouthful, Sprint calls it "PCS Vision" and Verizon calls it "Express Network." It is faster than GPRS, and operates at speeds typically between 40 kilobits per second and 70 kilobits per second -- about the speed of a fast home dial-up modem, or a bit faster. Like GPRS, 1xRTT is a "2.5G" technology that will be replaced by faster "3G" systems, though Sprint, relying on a technicality, deems it to be "3G." 1xEV-DO: An evolution of the 1x technology that boosts data rates into true 3G territory, equal to a very fast home DSL or cable modem. Verizon plans an experimental deployment of EV-DO this year in two cities, San Diego and Washington. But no carrier has announced plans to make it commercially available nationwide. TDMA: Time-Division Multiple Access. Once one of the three major wireless digital phone technologies in the U.S., TDMA is being phased out by major carriers, including its former main proponent, AT&T Wireless. If you have a TDMA phone, it may be useless in a few years. Finally, a few terms related to digital cellphones. World Phone: This is a GSM or GPRS phone that is capable of operating on the GSM/GPRS frequencies used in both Europe and the U.S. -- as opposed to standard phones designed for one continent or the other. To use such a phone, you also have to purchase a calling plan that covers international use. WAP: Wireless Application Protocol. This was an early effort to bring the Internet and e-mail to cellphones. It was slow and clumsy and has largely been a failure. SMS: Short Message Service. Wildly popular in Europe and Japan, but only now gaining traction in the U.S., this is the ability to tap out short text messages on a cellphone and send the messages to other phones, or to an e-mail address. These messages are usually limited to 160 characters, and must be entered on phone keypads, which are lousy text-entry mechanisms. So they tend to be packed with abbreviations that have become a new jargon among SMS addicts. MMS: Multimedia Messaging Service. This is a new version of SMS designed to handle photos, video and audio clips in addition to text. So far, in the U.S., it has been poorly and inconsistently implemented, making the exchange of multimedia complicated and unreliable. Bluetooth: This is a short-range wireless networking technology that's designed to replace cables linking high-tech devices. It's used to connect headsets to cellphones wirelessly, and to link cellphones to laptops. There are scores of other techno terms used in the cellphone business, but these basic definitions should take you a long way. For more of this stuff, see the glossary offered by the excellent Web site, Phone Scoop, at www.phonescoop.com/glossary. --With reporting by Katherine Boehret. Updated July 9, 2003 Copyright (c) 2003 | Dow Jones & Company, Inc. | All Rights Reserved [Non-text portions of this message have been removed] 7580 From: Mitch D Date: Fri Jul 18, 2003 8:07pm Subject: DVR vs VHS Being more specific,its easier and cost effective for a large agency to have 500 master tapes sitting, awaiting trial, versus 500 hard drives.If theres 1 hr of illegal activity on a DVR HDD the entire HDD must be extracted,processed,and held.Chain of custody procedures currently require hard drives to be kept at bay until ready for court.Duplicate or mirrored HDD's of the original may be produced for examination,playback, and forensic work in order to maintain the original in a perfect state until its time for the original to be produced for evidence,and then release. I'm a fan of DVR and we use DVR gear in our operations.Of course the client pays for a HDD upon completion of obtaining imaging,as we don't absorb the cost.We love the features of DVR's,but there currently are some major drawbacks involving use of DVR's which will eventually be litigated,mostly involving the transfer of the imaging,and COC. Tape will be around for a decent amount of time,and wont fall as fast as BETA tapes did. In retail stores,it seems that whatever is the smallest,and holds the most will win,as long as the hype is there to push it. __________________________________ Do you Yahoo!? SBC Yahoo! DSL - Now only $29.95 per month! http://sbc.yahoo.com 7581 From: kondrak Date: Sat Jul 19, 2003 11:26am Subject: Picking Up the Pieces > > >http://www.nytimes.com/2003/07/17/technology/circuits/17shre.html > >By DOUGLAS HEINGARTNER >July 17, 2003 > >BERLIN -- THROUGHOUT the 1980's, Sascha Anderson, a poet, musician and >literary impresario, was one of the leading voices to speak out >against the East German government and its dreaded secret police, the >Stasi. > >But his credibility gradually evaporated after the Communist >government's collapse as rumors about him acquired the weight of >proof: he had been informing on his dissident compatriots all along. > >He had been told that his Stasi file had been destroyed. In fact, it >was manually reconstructed from some of the millions of shreds of >paper that panicked Stasi officials threw into garbage bags during the >regime's final days in the fall of 1989. > >Now, if all goes as planned by the German government, the remaining >contents of those 16,000 bags will also be reconstructed. > >Advanced scanning technology makes it possible to reconstruct >documents previously thought safe from prying eyes, sometimes even >pages that have been ripped into confetti-size pieces. And although a >great deal of sensitive information is stored digitally these days, >recent corporate scandals have shown that the paper shredder is still >very much in use. > >"People perceive it as an almost perfect device," said Jack Brassil, a >researcher for Hewlett-Packard who has worked on making shredded >documents traceable. If people put a document through a shredder, >"they assume that it's fundamentally unrecoverable," he said. "And >that's clearly not true." > >In its crudest form, the art of reconstructing shredded documents has >been around for as long as shredders have. After the takeover of the >United States Embassy in Tehran in 1979, Iranian captors laid pieces >of documents on the floor, numbered each one and enlisted local carpet >weavers to reconstruct them by hand, said Malcolm Byrne of the >National Security Archive at George Washington University. "For a >culture that's been tying 400 knots per inch for centuries, it wasn't >that much of a challenge," he said. The reassembled documents were >sold on the streets of Tehran for years. > >That episode helped convince the United States government to update >its procedures for destroying documents. The expanded battery of >techniques now includes pulping, pulverizing and chemically >decomposing sensitive data. Yet these more complex methods are not >always at hand in an emergency, which is why the vagaries of >de-shredding will be of interest to intelligence officials for some >time to come. > >"It's been an area of interest for a very long time," said William >Daly, a former F.B.I. investigator who is a vice president at Control >Risks Group, a security consulting firm. "The government is always >trying to keep ahead of the curve." > >Like computer encryption and hacking, "it's kind of a cat-and-mouse >game, keeping one step ahead," he said. "That's why the government is >always looking at techniques to help them ensure their documents are >destroyed properly." > >Modern image-processing technology has made the rebuilding job a lot >easier. A Houston-based company, ChurchStreet Technology, already >offers a reconstruction service for documents that have been >conventionally strip-shredded into thin segments. The company's >founder, Cody Ford, says that reports of document shredding in recent >corporate scandals alerted him to a gap in the market. "Within three >months of the Enron collapse at end of 2001, we had a service out to >electronically reconstruct strip shreds," he said. > >The Stasi archives are a useful reference point for researchers >tackling the challenge, though perhaps more for the scale than the >sophistication of the shredding. Most of the Stasi papers were torn by >hand because the flimsy East German shredding machines collapsed under >the workload. The hastily stored bags of ripped paper were quickly >discovered and confiscated. > >In 1995 the German government commissioned a team in the Bavarian town >of Zirndorf to reassemble the torn Stasi files one by one. Yet by >2001, the three dozen archivists had gone through only about 300 bags, >so officials began a search for another way to piece together the >remaining 33 million pages a bit faster. > >Four companies remain candidates for the job, including Fraunhofer IPK >of Berlin, part of the Fraunhofer Gesellschaft research institute, >which helped develop the MP3 music format. The institute is drafting >plans to sort, scan and archive the millions of pages within five >years, drawing on expertise in office automation, image processing, >biometrics and handwriting analysis as well as sophisticated software. > >"It's more than just the algorithms about the puzzles," said Bertram >Nickolay, the head of the security and testing technologies >department. Indeed, the archive is a massive grab bag of randomly torn >documents, many with handwritten and typewritten text on the same >page. Combining all these technologies in a project of this scope "is >on the borders of what's possible," Mr. Nickolay said. > >His system's accuracy rate is about 80 percent. "It will take time for >the algorithms to be optimized," Mr. Nickolay said, noting that >handwriting analysis began with accuracy levels of around 50 percent, >and are now at 90 percent and above. > >Some of the companies competing for the job concentrated on the shape, >color and perforations of the shreds, while other contenders opted for >semantically driven systems, which looked for keywords and likely text >matches. > >The Fraunhofer plan is to combine its smart scanning software with the >know-how of the Zirndorf archivists, who have amassed years of >experience working with these tiny pieces of history. After all the >shreds have been scanned (at 200 dots per inch), the interactive >software will suggest possible matches, which an operator can accept >or reject. > >While Fraunhofer IPK eventually plans to use a similar technique, >several companies say they can do so already. > >ChurchStreet's software analyzes the graphical patterns that go to the >edge of each piece. First, workers paste the random shreds onto >standard sheets of paper, which takes three to seven minutes per page. >The pages are scanned, and software analyzes the shreds for possible >matches. > >Mr. Ford, the company founder, said the ChurchStreet service can >recover up to 70 percent of a document's content, although he stressed >that the goal was to get blocks of information rather than to >re-create the original formatting. The blocks are presented to the >client, who determines where they might belong in the overall scheme. >"We don't make any guesswork about reconstruction," Mr. Ford said. "We >make no assumptions." > >ChurchStreet, whose clients are mainly law agencies and private law >firms, charges roughly $2,000 to reconstruct a cubic foot of >strip-shreds. A cubic foot of shreds is generally less than 100 pages. >Mr. Ford said ChurchStreet would soon offer a service to reconstruct >cross-shredded documents - that is, those cut in two directions - for >$8,000 to $10,000 per cubic foot. A common standard in cross-shredding >is particles one thirty-second by seven-sixteenths of an inch, which >results in thousands of grain-like shreds per page. > >Cross-shredding makes the job a lot trickier, but not for lack of >processing power. "The problem is not whether it's possible with the >software, which is possible," said Werner Vˆgeli, the managing >director of the German office of SER Solutions, a company in Dulles, >Va., that also competed for the contract to reconstruct the Stasi >documents. "The problem is how to scan these documents." > >Fred Cohen, a security consultant who reconstructed many pages while >working at Sandia National Laboratories, also sees limits. "When you >get down to very small shreds, then the numbers start to eat you," he >said. "You start to get to where there isn't enough text per shred to >be of any use. You've got a completely black shred; whether it's the >middle of the cross of a t or the dot of an i, you can't tell." > >Adding to the challenge, the smaller the pieces are, the farther apart >they can fall, and thus the less likely they are to cluster in a >conveniently retrievable form. Security experts also say that using >large type (for less text per shred), and feeding the paper into a >shredder perpendicular to the direction of the text (so no complete >phrases stay together) makes shredding less vulnerable. > >Professional document reconstructions are generally recognized by the >courts in much the way that fingerprint or handwriting evidence is. An >expert may not be able to vouch for the accuracy of the information on >a given page, said Mr. Daly, the former F.B.I. investigator, but he >can testify that a reconstructed document "was at one time one piece >of paper that was cut into little pieces of paper, and now it's back >into one piece of paper." > >Mr. Daly added that investigators often use reassembled pages as part >of a larger forensic puzzle. "Once we have a hard-copy document, we >can then go back and look at databases and put in search criteria, and >to be able to actually come up with the original electronic version," >he said. "One becomes a pathway to the other." > >The demand for such investigative services is clear. "I probably get a >call every month," said Robert Johnson of the National Association for >Information Destruction, an American trade group, from clients looking >for "a way to reverse the process." > >Other projects, like Mr. Brassil's at Hewlett-Packard, focus on >designing a shredder that leaves telltale traces on the documents it >destroys, allowing them to be pinpointed later. > >In Germany, meanwhile, a decision about whether to proceed with the >reconstruction of Stasi documents is not expected before September. >Mr. Vˆgeli of SER Solutions, whose firm withdrew from bidding for the >project, said he doubted that financing would materialize. "These >documents contain lots of information that might be dangerous to a few >politicians who are still active, still in power," he said. "So >there's no political majority for any such investment." > >Sascha Anderson, the dissident discredited by the files, is among >those who hope the project goes forward. "Of course I would have >preferred that they weren't found," he said by phone from Frankfurt. >"But I realize that it's a unique chance for a society to have access >to this information." > >And since he was exposed, he said, he has been able to sleep better: >"I've ultimately been freed of my burden by history." 7582 From: James M. Atkinson Date: Sun Jul 20, 2003 8:31am Subject: The Queen At Heathrow Airport a 300-foot long red carpet stretches out to Air Force One and President Bush strides to a warm but dignified handshake from Queen Elizabeth II. They ride in a silver 1934 Rolls Royce limousine to the edge of central London where they then board an open 17th century coach pulled by six magnificent white matching horses. They ride toward Buckingham Palace, each looking sideways and waving to the thousands of cheering Britons. So far everything is going well ... Suddenly the right rear horse lets fly with the most horrendous, earth-shaking, eye-smarting blast of flatulence ever heard in the British Empire, so powerful that it shakes the coach. Uncomfortable ...but; under control, the two Dignitaries of State do their best to ignore the incident, but embarrassed, the Queen decides it is impossible to ignore it. "Mr. President, please accept my regrets. I'm sure you understand that there are some things not even a Queen can control." Ever the Texas gentleman he is, the President replies, "Your Majesty, please don't give the matter another thought. You know, if you hadn't said something, I would have thought it was one of the horses!" -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- I Will Lift Up My Eyes to the Hill, From Whence Does My Help Come. -------------------------------------------------------------------------------------------------- 7583 From: jim33060 Date: Thu Jul 17, 2003 0:56pm Subject: Microwave Down Convertor MDC-2100 HAS ANYONE HAD ANY EXPERIENCE WITH REI'S MDC-2100 AND ARE THERE ANY ON THE USED T.S.C.M. MARKET. THANKS TAPMAN@B... 7584 From: Thomas Shaddack Date: Thu Jul 17, 2003 4:48pm Subject: De-shredding the shreds Summary: Technology allows taking the "noodles" of shredded document, scanning them, and reconstructing the pages with various degrees of manual and automated effort. New approaches are necessary for high-security operations. Source: New York Times Author: Douglas Heingartner Title: Picking up the pieces URL: http://www.nytimes.com/2003/07/17/technology/circuits/17shre.html Highlight: Mr. Brassil's project at Hewlett Packard, aimed at tracing the source of shredded document by the micromarks on the shreds, both of vanilla shredders and by custom-modifying the shredders to leave a defined signature on the strips. http://www.hpl.hp.com/techreports/2002/HPL-2002-215.html (abstract) http://www.hpl.hp.com/techreports/2002/HPL-2002-215.pdf Full text: Picking Up the Pieces By DOUGLAS HEINGARTNER BERLIN -- THROUGHOUT the 1980's, Sascha Anderson, a poet, musician and literary impresario, was one of the leading voices to speak out against the East German government and its dreaded secret police, the Stasi. But his credibility gradually evaporated after the Communist government's collapse as rumors about him acquired the weight of proof: he had been informing on his dissident compatriots all along. He had been told that his Stasi file had been destroyed. In fact, it was manually reconstructed from some of the millions of shreds of paper that panicked Stasi officials threw into garbage bags during the regime's final days in the fall of 1989. Now, if all goes as planned by the German government, the remaining contents of those 16,000 bags will also be reconstructed. Advanced scanning technology makes it possible to reconstruct documents previously thought safe from prying eyes, sometimes even pages that have been ripped into confetti-size pieces. And although a great deal of sensitive information is stored digitally these days, recent corporate scandals have shown that the paper shredder is still very much in use. "People perceive it as an almost perfect device," said Jack Brassil, a researcher for Hewlett-Packard who has worked on making shredded documents traceable. If people put a document through a shredder, "they assume that it's fundamentally unrecoverable," he said. "And that's clearly not true." In its crudest form, the art of reconstructing shredded documents has been around for as long as shredders have. After the takeover of the United States Embassy in Tehran in 1979, Iranian captors laid pieces of documents on the floor, numbered each one and enlisted local carpet weavers to reconstruct them by hand, said Malcolm Byrne of the National Security Archive at George Washington University. "For a culture that's been tying 400 knots per inch for centuries, it wasn't that much of a challenge," he said. The reassembled documents were sold on the streets of Tehran for years. That episode helped convince the United States government to update its procedures for destroying documents. The expanded battery of techniques now includes pulping, pulverizing and chemically decomposing sensitive data. Yet these more complex methods are not always at hand in an emergency, which is why the vagaries of de-shredding will be of interest to intelligence officials for some time to come. "It's been an area of interest for a very long time," said William Daly, a former F.B.I. investigator who is a vice president at Control Risks Group, a security consulting firm. "The government is always trying to keep ahead of the curve." Like computer encryption and hacking, "it's kind of a cat-and-mouse game, keeping one step ahead," he said. "That's why the government is always looking at techniques to help them ensure their documents are destroyed properly." Modern image-processing technology has made the rebuilding job a lot easier. A Houston-based company, ChurchStreet Technology, already offers a reconstruction service for documents that have been conventionally strip-shredded into thin segments. The company's founder, Cody Ford, says that reports of document shredding in recent corporate scandals alerted him to a gap in the market. "Within three months of the Enron collapse at end of 2001, we had a service out to electronically reconstruct strip shreds," he said. The Stasi archives are a useful reference point for researchers tackling the challenge, though perhaps more for the scale than the sophistication of the shredding. Most of the Stasi papers were torn by hand because the flimsy East German shredding machines collapsed under the workload. The hastily stored bags of ripped paper were quickly discovered and confiscated. In 1995 the German government commissioned a team in the Bavarian town of Zirndorf to reassemble the torn Stasi files one by one. Yet by 2001, the three dozen archivists had gone through only about 300 bags, so officials began a search for another way to piece together the remaining 33 million pages a bit faster. Four companies remain candidates for the job, including Fraunhofer IPK of Berlin, part of the Fraunhofer Gesellschaft research institute, which helped develop the MP3 music format. The institute is drafting plans to sort, scan and archive the millions of pages within five years, drawing on expertise in office automation, image processing, biometrics and handwriting analysis as well as sophisticated software. "It's more than just the algorithms about the puzzles," said Bertram Nickolay, the head of the security and testing technologies department. Indeed, the archive is a massive grab bag of randomly torn documents, many with handwritten and typewritten text on the same page. Combining all these technologies in a project of this scope "is on the borders of what's possible," Mr. Nickolay said. His system's accuracy rate is about 80 percent. "It will take time for the algorithms to be optimized," Mr. Nickolay said, noting that handwriting analysis began with accuracy levels of around 50 percent, and are now at 90 percent and above. Some of the companies competing for the job concentrated on the shape, color and perforations of the shreds, while other contenders opted for semantically driven systems, which looked for keywords and likely text matches. The Fraunhofer plan is to combine its smart scanning software with the know-how of the Zirndorf archivists, who have amassed years of experience working with these tiny pieces of history. After all the shreds have been scanned (at 200 dots per inch), the interactive software will suggest possible matches, which an operator can accept or reject. While Fraunhofer IPK eventually plans to use a similar technique, several companies say they can do so already. ChurchStreet's software analyzes the graphical patterns that go to the edge of each piece. First, workers paste the random shreds onto standard sheets of paper, which takes three to seven minutes per page. The pages are scanned, and software analyzes the shreds for possible matches. Mr. Ford, the company founder, said the ChurchStreet service can recover up to 70 percent of a document's content, although he stressed that the goal was to get blocks of information rather than to re-create the original formatting. The blocks are presented to the client, who determines where they might belong in the overall scheme. "We don't make any guesswork about reconstruction," Mr. Ford said. "We make no assumptions." ChurchStreet, whose clients are mainly law agencies and private law firms, charges roughly $2,000 to reconstruct a cubic foot of strip-shreds. A cubic foot of shreds is generally less than 100 pages. Mr. Ford said ChurchStreet would soon offer a service to reconstruct cross-shredded documents - that is, those cut in two directions - for $8,000 to $10,000 per cubic foot. A common standard in cross-shredding is particles one thirty-second by seven-sixteenths of an inch, which results in thousands of grain-like shreds per page. Cross-shredding makes the job a lot trickier, but not for lack of processing power. "The problem is not whether it's possible with the software, which is possible," said Werner Vˆgeli, the managing director of the German office of SER Solutions, a company in Dulles, Va., that also competed for the contract to reconstruct the Stasi documents. "The problem is how to scan these documents." Fred Cohen, a security consultant who reconstructed many pages while working at Sandia National Laboratories, also sees limits. "When you get down to very small shreds, then the numbers start to eat you," he said. "You start to get to where there isn't enough text per shred to be of any use. You've got a completely black shred; whether it's the middle of the cross of a t or the dot of an i, you can't tell." Adding to the challenge, the smaller the pieces are, the farther apart they can fall, and thus the less likely they are to cluster in a conveniently retrievable form. Security experts also say that using large type (for less text per shred), and feeding the paper into a shredder perpendicular to the direction of the text (so no complete phrases stay together) makes shredding less vulnerable. Professional document reconstructions are generally recognized by the courts in much the way that fingerprint or handwriting evidence is. An expert may not be able to vouch for the accuracy of the information on a given page, said Mr. Daly, the former F.B.I. investigator, but he can testify that a reconstructed document "was at one time one piece of paper that was cut into little pieces of paper, and now it's back into one piece of paper." Mr. Daly added that investigators often use reassembled pages as part of a larger forensic puzzle. "Once we have a hard-copy document, we can then go back and look at databases and put in search criteria, and to be able to actually come up with the original electronic version," he said. "One becomes a pathway to the other." The demand for such investigative services is clear. "I probably get a call every month," said Robert Johnson of the National Association for Information Destruction, an American trade group, from clients looking for "a way to reverse the process." Other projects, like Mr. Brassil's at Hewlett-Packard, focus on designing a shredder that leaves telltale traces on the documents it destroys, allowing them to be pinpointed later. In Germany, meanwhile, a decision about whether to proceed with the reconstruction of Stasi documents is not expected before September. Mr. Vˆgeli of SER Solutions, whose firm withdrew from bidding for the project, said he doubted that financing would materialize. "These documents contain lots of information that might be dangerous to a few politicians who are still active, still in power," he said. "So there's no political majority for any such investment." Sascha Anderson, the dissident discredited by the files, is among those who hope the project goes forward. "Of course I would have preferred that they weren't found," he said by phone from Frankfurt. "But I realize that it's a unique chance for a society to have access to this information." And since he was exposed, he said, he has been able to sleep better: "I've ultimately been freed of my burden by history." 7585 From: Ticom Date: Fri Jul 18, 2003 7:43am Subject: Re: Sweeping for 2.4 GHz video --- In TSCM-L@yahoogroups.com, cory.bys@f... wrote: > If you want to really look cool you could use an Icom IC-R3 which is a > scanner with a built-in monitor. It's about $400, though. See That's $400 that could be best spent elsewhere. What a disapointing piece of equipment. On the subject of 2.4 Ghz. video, Radio Shack has discontinued the 15-1971/15-1972 "video senders" and replaced them with model # 15-2572 which is probably the same Wavecom unit with a different case (and still $100). The discontinued models are now down to about $57 each. Those of you who've read Steve Uhrig's 2.4 Ghz. article and want to put together a 2.4 Ghz. sweep unit will probably not be able to find a new set for less than that (and if you do, please post it to the list). There was an article in a past issue of _Scanning USA_ magazine http://www.scanningusa.com/ that detailed replacing the channel switch and associated resistors with a potentimoeter in order to expand the tuning range of the Wavecom. 7586 From: Date: Sun Jul 20, 2003 2:09pm Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7587 From: Date: Sun Jul 20, 2003 2:09pm Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7588 From: Date: Mon Jul 21, 2003 8:56am Subject: Re: Sweeping for 2.4 GHz video Thanks for letting me know the Icom IC-R3 is junk. At $400 the price/features ratio is pretty crummy even if it worked perfectly. I have also seen a P3 "Video Camera Detector" at Radio Shack that is the size of a key chain. From a technical standpoint I can't see how they can reduce false positives to a point it would be useful, so I am guessing it is crap as well. It's risky enough that I don't want to gamble the $30 to find out. ******************* N O T I C E ******************* The information contained in this e-mail, and in any accompanying documents, may constitute confidential and/or legally privileged information. The information is intended only for use by the designated recipient. If you are not the intended recipient (or responsible for the delivery of the message to the intended recipient), you are hereby notified that any dissemination, distribution, copying, or other use of, or taking of any action in reliance on this e-mail is strictly prohibited. If you have received this e-mail communication in error, please notify the sender immediately and delete the message from your system. *************************************************** 7589 From: Monty Date: Sun Jul 20, 2003 11:37pm Subject: Re: Microwave Down Convertor MDC-2100 I have been using them for a couple of years now. Found they are some problems with using them in the auto mode. (not all the time). I mainly use the MDC-2100 in the manual mode. Not that hard. They do a decent job when looking for something close. Not the most sensitive, however, when looking for toys that are near too much sensitivity can actually hurt you. Monty --- jim33060 wrote: > HAS ANYONE HAD ANY EXPERIENCE WITH REI'S MDC-2100 > AND ARE THERE ANY > ON THE USED T.S.C.M. MARKET. THANKS > > TAPMAN@B... > > > __________________________________ Do you Yahoo!? SBC Yahoo! DSL - Now only $29.95 per month! http://sbc.yahoo.com 7590 From: frost_bitten_ca Date: Mon Jul 21, 2003 9:52am Subject: using netstat to scan for open IRC channels netstat -an | find ":6667" Open an MS-DOS Prompt window and type the command line above, then press the "Enter" key. If a line resembling the one shown below is NOT displayed, your computer does not have an open connection to an IRC server running on the standard IRC port. If, however, you see something like this: TCP 192.168.1.101:1026 70.13.215.89:6667 ESTABLISHED . . . then the only question remaining is how quickly you can disconnect your PC from the Internet! A second and equally useful test can also be performed. Since IRC servers generally require the presence of an "Ident" server on the client machine, IRC clients almost always include a local "Ident server" use to keep the remote IRC server happy. Every one of the Zombie/Bots I have examined does this. Therefore, the detection of an Ident server running in your machine would be another good cause for alarm. To quickly check for an Ident server, type the following command at an MS-DOS Prompt: netstat -an | find ":113 " As before, a blank line indicates that there is no Ident server running on the default Ident port of "113". (Note the "space" after the 113 and before the closing double-quote.) If, however, you see something like this: TCP 0.0.0.0:113 0.0.0.0:0 LISTENING 7591 From: James M. Atkinson Date: Mon Jul 21, 2003 6:12pm Subject: Understanding Engineers Understanding Engineers - Take One Two engineering students were walking across campus when one said, "Where did you get such a great bike?" The second engineer replied, "Well, I was walking along yesterday minding my own business when a beautiful woman rode up on this bike. She threw the bike to the ground, took off all her clothes and said, "Take what you want." The second engineer nodded approvingly, "Good choice; the clothes probably wouldn't have fit." Understanding Engineers - Take Two To the optimist, the glass is half full. To the pessimist, the glass is half empty. To the engineer, the glass is twice as big as it needs to be. Understanding Engineers - Take Three A pastor, a doctor and an engineer were waiting one morning for a particularly slow group of golfers. The engineer fumed, "What's with these guys? We must have been waiting for 15 minutes!" The doctor chimed in, "I don't know, but I've never seen such ineptitude!" The pastor said,"Hey, here comes the greens keeper. Let's have a word with him." "Hi, George. Say, what's with that group ahead of us? They're rather slow, aren't they?" The greens keeper replied, "Oh, yes, that's a group of blind firefighters who lost their sight saving our clubhouse from a fire last year, so we always let them play for free anytime." The group was silent for a moment. The pastor said, "That's so sad. I think I will say a special prayer for them tonight." The doctor said, "Good idea. And I'm going to contact my ophthalmologist buddy and see if there's anything he can do for them." The engineer said, "Why can't these guys play at night?" Understanding Engineers - Take Four There was an engineer who had an exceptional gift for fixing all things mechanical. After serving his company loyally for over 30 years, he happily retired. Several years later the company contacted him regarding a seemingly impossible problem they were having with one of their multimillion dollar machines. They had tried everything and everyone else to get the machine to work but to no avail. In desperation, they called on the retired engineer who had solved so many of their problems in the past. The engineer reluctantly took the challenge. He spent a day studying the huge machine. Finally, at the end of the day, he marked a small "x" in chalk on a particular component of the machine and said, "This is where your problem is." The part was replaced and the machine worked perfectly again. The company received a bill for $50,000 from the engineer for his service. They demanded an itemized accounting of his charges. The engineer responded briefly: One chalk mark $1; Knowing where to put it $49,999. It was paid in full and the engineer retired again in peace. Understanding Engineers - Take Five What is the difference between Mechanical Engineers and Civil Engineers? Mechanical Engineers build weapons. Civil Engineers build targets. Understanding Engineers - Take Six Three engineering students were gathered together discussing the possible designers of the human body. One said, "It was a mechanical engineer. Just look at all the joints." Another said, "No, it was an electrical engineer. The nervous system has many thousands of electrical connections." The last said, "Actually it was a civil engineer. Who else would run a toxic waste pipeline through a recreational area?" Understanding Engineers - Take Seven "Normal people ... believe that if it ain't broke, don't fix it. Engineers believe that if it ain't broke, it doesn't have enough features yet." Understanding Engineers - Take Eight An architect, an artist and an engineer were discussing whether it was better to spend time with the wife or a mistress. The architect said he enjoyed time with his wife, building a solid foundation for an enduring relationship. The artist said he enjoyed time with his mistress, because of the passion and mystery he found there. The engineer said, "I like both." "Both?" they asked. Engineer: "Yeah. If you have a wife and a mistress, they will each assume you are spending time with the other woman, and you can go to the lab and get some work done." Understanding Engineers - Take Nine An engineer was crossing a road one day when a frog called out to him and said, "If you kiss me, I'll turn into a beautiful princess." He bent over, picked up the frog and put it in his pocket. The frog spoke up again and said, "If you kiss me and turn me back into a beautiful princess, I will stay with you for one week." The engineer took the frog out of his pocket, smiled at it and returned it to the pocket. The frog then cried out, "If you kiss me and turn me back into a princess, I'll stay with you and do ANYTHING you want." Again the engineer took the frog out, smiled at it and put it back into his pocket. Finally, the frog asked, "What is the matter? I've told you I'm a beautiful princess, that I'll stay with you for a week and do anything you want. Why won't you kiss me?" The engineer said, "Look I'm an engineer. I don't have time for a girlfriend, but a talking frog, now that's cool." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Knowledge will forever govern ignorance, and a people who mean to be their own governors, must arm themselves with the power knowledge gives. A popular government without popular information or the means of acquiring it, is but a prologue to a farce or a tragedy or perhaps both." --- James Madison (Fourth President of the United States) -------------------------------------------------------------------------------------------------- 7592 From: kondrak Date: Mon Jul 21, 2003 9:03pm Subject: Re: using netstat to scan for open IRC channels You might check out the free program "netmon": http://www.webmasterfree.com/netmon.html it does all that and more...check ALL your ports for strange behaviour. At 14:52 7/21/2003 +0000, you wrote: >netstat -an | find ":6667" > >Open an MS-DOS Prompt window and type the command line above, then >press the "Enter" key. If a line resembling the one shown below is >NOT displayed, your computer does not have an open connection to an >IRC server running on the standard IRC port. If, however, you see >something like this: From: Steve Uhrig Date: Sun Jul 14, 2002 0:08am Subject: Surveillance literature package The package of catalogs, textbooks, etc. as I described the other day has been sold. Please stop calling. Thanks ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5794 From: Steve Uhrig Date: Sun Jul 14, 2002 1:08am Subject: Re: Cell phone passive repeater question On 12 Jul 2002 at 18:04, John McCain wrote: > My employer recently moved to a rural office complex, and I'm now > "living" on the ground floor of a tight metal building. This place > is like a faraday cage... metal window screen, two layers of steel > walls with foil-backed insulation behind the sheet rock. I can't even > get a broadcast band AM or FM radio to pick up anything here, and my > ham HTs are useless inside. > The point... I use a TDMA/AMPS dual-band (800/1.9) cell phone, which > is useless inside the building now. We're several miles from the > closest cell site, and signal levels are so poor in here that I have > to do something. I considered adding an outside antenna and coax to > the phone the way I've done in the past, but that ties me to one > office using the phone. I'm now leaning towards a passive > repeater... two antennae and a short chunk of coax. You probably never switch to the 1.8 or 1.9 or whatever band in those tri mode phones. I've had mine a year and a half and it's never been off of 800 anywhere in the country. A passive repeater should help for the situation you describe. In addition to directly helping on the cellular network, it will act as a translator to an extent on all other frequencies from DC to light, although not efficiently. But a few dB may be all you need to copy an FM broadcast station to hear the ball game or whatever. Locate the nearest cell site and point the highest gain Yagi at it you can find, vertically polarized of course. The more signal you can snag with the antenna, the better your system will operate. Fractions of a dB are worth fighting for. Use a wide bandwidth antenna, as the system needs to work bidirectionally, because of course the cell site needs to hear you as well as you need to hear it. Remember the difference between the forward and reverse channels is 45 megacycles. Pick antennas that will cover that spread without problems. The more elements the better, but remember more elements = more gain which = tighter beamwidth which = need for accurate pointing towards the cell site. Remember, also, if that particular site goes down, which happens more often than you might suspect, or gets fully loaded and tries to hand you off, you may have no service into another site unless you are lucky and it is in line with the first one or you get enough signal off the side or the back of the beam to work. Use as short a length of low loss feedline as you can, maybe even hardline. Use decent Amphenol connectors properly installed. Not many can install connectors properly, especially on hardline. Remember a decent hardline connector costs about sixty bucks. Tessco www.tessco.com would be a good source for all this stuff except the feedline and connectors. They sell those also, but a better source for anything cable and connector related is Joel at RF Connection here in Maryland. http://www.therfc.com or 301-840-5477. He can make up cable assemblies for you too, doing a military grade installation of connectors of whatever style and sex you specify onto whatever feedline you specify with boots, sealant, sweeping it for frequency response, etc. He's making some harnesses for a government contract for me now. He can do a better job than we can, and quicker. And he has all the outrageously expensive connector tools and special test equipment that is not practical to buy for small quantity runs yourself. Tell him I sent you. He's good people. Avoid Maxrad antennas. They lie about their specs. DB Products probably is top of the line. Anything in between should be fine. At 800, even large Yagis are not expensive. You should be able to do this whole thing for less than a few hundred bucks by the time you add in all the little things. For the inside antenna, use an inverted unity ground plane in the elevator shaft or wherever you can centrally locate it. Inverted, because directly underneath a right-side-up mounted ground plane is a dead area. Mounting them upside down concentrates the signal directly underneath it, which is what you want for a passive repeater. Make sure it is tuned for the same frequencies as the Yagi outside. Keep it away from any other metal. It should be light enough to where you can just hang it from the coax in whatever area you will be using it. The antenna probably would fit inside a basketball. Not large at 800, unity. Stay away from gain antennas inside. Use an inverted unity ground plane only. This is not the place to try to economize on antennas, feedline and connectors. You're fighting for every fraction of a dB you can get. Remember, you need to talk out as well as hear in. Your max power output on your handset is 200 milliwatts, and since the site tells your handset how much power to transmit, you'll probably be squirting out your max, which will make a big difference in battery life. I've used passive repeaters many times for surveillance operations as well as general commo like penetrating into hospitals, or into shielded areas or basements and to allow paging signals to leak into areas like X-ray rooms with enough signal to trigger a pager. Do it as I described above and it should help some, maybe a lot. Depends on a lot of things, some being pure luck. If you have a spectrum analyzer or receiver with a signal strength meter which will cover those frequencies, use it to aim your Yagi for best signal. If you don't have a direct LOS path, you may be able to pick up a reflection from a building or something which is stronger than the signal you get trying to go LOS if there are obstructions. Spin the Yagi 360 degrees, and also elevate it maybe +/- 20 degrees. You may be very surprised where it points when you see the strongest signal. Make an adjustment maybe 20 degrees at a time, keep notes, and back away from the antenna after each adjustment so your carcass is not detuning anything or causing multipath. Don't nail down the antenna alignment until you have checked it perhaps three times, a week apart. You could have some weird conditions giving you a strong reflection which change from day to day, maybe with trains moving or trucks relocated in a parking lot or whatever. When you see a consistent steady signal from a particular azimuth and elevation over a period of time, you then can secure the antenna to those coordinates. Be sure to use Coax Seal or equivalent on the outside connector. Coax of any type wicks up moisture very readily if it is not well sealed, and moist coax is very lossy. If there are any two way or paging transmitters on your roof, try to stay as far away from them as you can. You don't want to swamp your inside areas with RF on unwanted frequencies. Very bad juju. There also are active repeaters designed specifically for your exact problem, but they are expensive (several thousand dollars). Tessco again. They are black boxes you bolt to the wall, again with antennas inside and outside. They repeat both ways, and generally are quite effective. If you go this route, still do all the antenna stuff the same way as described for a passive repeater. It's much cheaper to get a few dB of gain passively than actively. Tessco sells only to legitimate communications dealers, not to end users. If they give you any trouble, contact me off list and I will order it on my account to be shipped directly to you. MCM Electronics has a good, inexpensive selection of antenna mounting hardware of all sorts, to let you mount anything anywhere. Tessco has it all too, but MCM is cheaper and has a wider selection. Maybe a rooftop tripod and a section or two of thinwall mast (10 feet per section) from Radio Shack would be a start. You can weight the legs of the tripod down with bricks if you don't want to mount the thing to the roof. If you do screw it down, lag bolts and duxseal come with the tripods. http://www.mcmelectronics.com. Let us know how it works out. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5795 From: James M. Atkinson Date: Mon Jul 15, 2002 2:10pm Subject: Terrorists Multiplying in the Southeast Terrorists Multiplying in the Southeast The governors of Alabama, Georgia, Mississippi, and Louisiana announced they have made a disturbing discovery in their states. Apparently, a small number of terrorists have become romantically involved with the locals. The result is not pretty, and we now have the sad task of reporting a new sector of the human race: ISLAMABUBBAS. So far, only a smattering of actual births have been reported, and we are hard at work trying to isolate and seal them off. To date, we have identified the following: Mohammed Billy Bob Ahbubba Mohammed Jethro bin Thinkin Boutdat Mohammed Forrest Gumpa Ahbubba Mohammed Rubba Dub Dubba Ahbubba Bobbie Joe Bubba Charlene Atat Betty Jean Hasbeena Badgurl Cleavie Daba Havatampoo Linda Sue bin Theredundat Not surprisingly, they all seem to have sprung from one couple: Mohammed Whoozyadaddy and Yomamma bin Lovin. We'll keep you posted on further Developments -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5796 From: James M. Atkinson Date: Mon Jul 15, 2002 4:08pm Subject: Sneaky history at new spy museum http://www.cnn.com/2002/TECH/ptech/07/15/spy.museum.ap/index.html Sneaky history at new spy museum Genuine tools of spycraft on display Friday WASHINGTON (AP) --Imagine a gun disguised as a silvery tube of lipstick, a camera hidden behind a coat button or a tree stump that's really an eavesdropping device. Props for the next James Bond movie? Maybe. They're also genuine tools of spycraft, used by real-life spooks around the world. These implements and hundreds of other items are going on display when the International Spy Museum opens Friday. Organizers say it's the first public museum in the United States dedicated to espionage, and the only one to provide a global perspective on an art form dating back to biblical times, when Moses assigned 12 Israelites to "spy out the land" of Canaan, promised to them by God. A particularly prized exhibit -- never before seen in public -- is a one-page letter Gen. George Washington wrote in February 1777. In it, Washington offers Nathaniel Sackett, a New York political activist and merchant for the Continental Army, $50 a month to set up a network to obtain "the earliest and best Intelligence of the designs of the enemy." Museum officials recently bought the letter from a private collector. It had remained with Sackett's family until a few years ago and was reprinted in a newspaper in 1931. "Espionage is as old as recorded time, and probably older," says E. Peter Earnest, a 36-year CIA veteran who spent two decades in the agency's clandestine service. He is now the museum's executive director. Former spies who serve on the museum's advisory boards, including former FBI and CIA chief William Webster and retired KGB Gen. Oleg Kalugin, helped gather more than 1,000 spy tools from the United States and other countries, including England, East Germany and the Soviet Union. About 600 pieces will be displayed initially. Range of gadgets Among the gizmos: -- The lipstick pistol was issued in the mid-1960s and used during the Cold War by operatives for the KGB, the former Russian secret police and intelligence agency. The 4.5-mm one-shot tube was called "The Kiss of Death." -- The coat with buttonhole camera was issued in the 1970s and used by the KGB. When triggered by a device inside the pocket, the center of the false button opened to snap a photo. -- The tree stump listening device was issued by the CIA in the early 1970s. The solar-powered device was stashed in the woods near a Soviet military base to capture secret military radio transmissions. Throughout the museum, visitors get quizzed on the details of a cover they're asked to adopt -- name, age and reason for travel. They can also create and break secret codes and test their ability to find examples of common surveillance, ordinary-looking spies or dead drops -- prearranged locations where undercover operatives and their handlers exchange messages, money or the goods. Exhibitions director Kathleen Coakley says patrons can see whether they measure up as spies or the people who catch them. "We hope that visitors keep asking themselves that question: 'Could I ever use that? Could I ever do that?"' Includes 007 It was at a dead drop in suburban Virginia where Robert Hanssen was arrested last year on charges of spying for Moscow for more than 15 years. The 25-year FBI agent had just dropped off documents for his Russian contacts. Hanssen recently was sentenced to life in prison for his role in what authorities say was one of the most damaging espionage cases in U.S. history. His story, and that of CIA turncoat Aldrich Ames, who also fed secrets to Moscow, are among the more modern tales of rogue spying featured. The blue Postal Service mailbox that Ames marked with chalk to signal his handlers also is displayed. "You won't go through the museum and become a spy, but you will be sensitized to a number of things that make up the world of espionage," said Earnest, the CIA veteran. Hanging from the lobby's ceiling is an imposing sculpture of Feliks Dzerzhinsky, a Polish Communist and founder of the KGB's predecessor. On video, former spies describe life under cover. Of course, no spy museum would be complete without a nod to Agent 007. This gallery has a replica of Bond's silver Aston Martin DB5 sports car from the movie "Goldfinger." In development since 1996, the $40 million complex encompasses five historic buildings and includes the museum, a restaurant, a cafe and a gift shop. One of the buildings was a district headquarters for the U.S. Communist Party in the 1940s. Admission is $8-$11. Other exhibits focus on women spies, World War II espionage and celebrity spies. Among the star spies: chef Julia Child, who processed classified documents for the Office of Strategic Services, the CIA's forerunner, and Oscar-winning director John Ford, who ran the OSS photography unit. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5797 From: Hawkspirit Date: Tue Jul 16, 2002 5:20pm Subject: Sweep Needed Anyone who can handle a residential sweep in Birmingham UK please contact me. Roger Tolces Electronic Security 5798 From: atsi999 Date: Tue Jul 16, 2002 7:37pm Subject: Antenna Help I have recently purchased a tektronix spectrum analyzer and now have a need for some good antennas for TSCM work. I have always used an oscor in the past which has built in antennas, and am not familiar with any good antennas that would be useful for this. If anyone could respond with some exact model numbers and web sites for some companies that sell antennas useful for tscm work, I would be very thankful. I am hoping to cover up to 18ghz. Thx. Jeff 5799 From: greendots . Date: Tue Jul 16, 2002 10:18pm Subject: [HUMOR] - Latest Investment Opportunity Latest investment opportunity. If you had bought $1000.00 worth of Nortel stock one year ago, it would now be worth $49.00. With Enron, you would have $16.50 of the original $1,000.00. With Worldcom, you would have less than $5.00 left. If you had bought $1,000.00 worth of Budweiser (the beer, not the stock) one year ago, drank all the beer, then turned in the cans for the 10 cent deposit, you would have $214.00. Based on the above, my current investment advice is to drink heavily and recycle. _________________________________________________________________ Send and receive Hotmail on your mobile device: http://mobile.msn.com 5800 From: iDEN-i100 Date: Wed Jul 17, 2002 9:56am Subject: Customs on the lookout http://www.fcw.com/print.asp -- [Non-text portions of this message have been removed] 5801 From: Gordon Mitchell Date: Wed Jul 17, 2002 10:21am Subject: Re: Antenna Help Its best to live a simple life when it comes to antennas. For the above 800 MHz portion use a simple log conical spiral like the one that is for sale on ebay as item 1366194047. Below that use a piece of wire. When you get ready to spend more money buy a Rohde & Schwartz model HE200. It is a briefcase full of directional antennas that work so well you will feel good spending $5K for it. -- Gordon (888) 284-5457 or +1 (425) 489-0446 see cases we have worked ... www.FutureFocus.com eSleuth.com finding clues in computers Bug-Killer.com preventing electronic eavesdropping atsi999 wrote: > > I have recently purchased a tektronix spectrum analyzer and now have a > need for some good antennas for TSCM work. I have always used an > oscor in the past which has built in antennas, and am not familiar > with any good antennas that would be useful for this. If anyone could > respond with some exact model numbers and web sites for some companies > that sell antennas useful for tscm work, I would be very thankful. I > am hoping to cover up to 18ghz. Thx. > > Jeff > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5802 From: Matt Paulsen Date: Wed Jul 17, 2002 10:12am Subject: RE: [HUMOR] - Latest Investment Opportunity They forgot Andersen, PWC, Qwest and GE and NAI. For example If you had bought $1,000.00 worth of Qwest stock. You'd have $64.00. -----Original Message----- From: greendots . [mailto:greendots@h...] Sent: Tuesday, July 16, 2002 8:18 PM To: tscm-l@yahoogroups.com Subject: [TSCM-L] [HUMOR] - Latest Investment Opportunity Latest investment opportunity. If you had bought $1000.00 worth of Nortel stock one year ago, it would now be worth $49.00. With Enron, you would have $16.50 of the original $1,000.00. With Worldcom, you would have less than $5.00 left. If you had bought $1,000.00 worth of Budweiser (the beer, not the stock) one year ago, drank all the beer, then turned in the cans for the 10 cent deposit, you would have $214.00. Based on the above, my current investment advice is to drink heavily and recycle. _________________________________________________________________ Send and receive Hotmail on your mobile device: http://mobile.msn.com ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5803 From: Andrus Aaslaid Date: Wed Jul 17, 2002 11:56am Subject: Active scope probe schematics Hello! I recently acquired a russian C1-97 350/500MHz two channel scope in working order for a good price, but as this was a surplus unit, it did not come with active probes. The inputs of the scope are 50ohm only. Does someone have a good suggestion for the active scope probe schematics? Shall not neccessarily run all the way to 500MHz tho. And christmas wish ... I have 4 channel digital Tectronix in my office, but the reason I bought this one is that I sometimes mess around with tube audio and SW transmission and do not accidentally want to fry the fancy one with statics. Being said so, my dream would be to have an active scope probe with tube(s), so it would stand some statics ... but this is not essential, of course :) Best, Andrus. -- Andrus Aaslaid CTO, Artec Group O‹ Tel. (+372) 671 8550 Fax: (+372) 671 8555 Direct: (+372) 50 28018 andrus.aaslaid@a... http://www.artecgroup.com 5804 From: James M. Atkinson Date: Wed Jul 17, 2002 11:51am Subject: Re: Antenna Help At 12:37 AM +0000 7/17/02, atsi999 wrote: >I have recently purchased a tektronix spectrum analyzer and now have a >need for some good antennas for TSCM work. I have always used an >oscor in the past which has built in antennas, and am not familiar >with any good antennas that would be useful for this. If anyone could >respond with some exact model numbers and web sites for some companies >that sell antennas useful for tscm work, I would be very thankful. I >am hoping to cover up to 18ghz. Thx. > >Jeff Piece of cake, you will need the following 1) a 50 kHz active loop for magnetic fields, 100 kHz low pass filter, and a 40+ dB LNA (critical for finding video cameras, and lines being used to carry video signals). A 60+ dB amplifier is perfect for this, buy your going to have to knock down the 500 kHz AM BCB band by 100 dB or you risk saturating your instrument. http://www.emctest.com/productpage.cfm?model=7604&producttype=Antennas http://www.sonoma-instrument.com/pdf/1055ds.pdf 2) a 30 Hz to 50 MHz (to 110 MHz optional) high dynamic range active rod antenna with a removable ground radials or 24 inch plate. Lean towards antenna elements that can be broken down and transported in a briefcase. Battery powered is a big plus, and the antenna has to have a very wide dynamic range. Also, you will need to have filters to put between the antenna and the instrument or you get get Intermod that will drive you nuts. I personally prefer the ARA RAM-110/B http://www.emctest.com/productpage.cfm?model=3301B&producttype=Antennas http://www.ara-inc.com/imagesapr00/pdfs/38_39.pdf http://www.ara-inc.com/bbh.htm 3) a 9 kHz to 30 MHz (to 50 MHz is best) active loop antenna, a nice 24 inch should be fine. http://www.emctest.com/productpage.cfm?model=6502&producttype=Antennas http://www.ara-inc.com/FrameEMC.htm 4) a quality biconical antenna with balun and Delrin spacer blocks. It has to have the impedance bar in the "bird-cages," and avoid the portable elements as you get poor results below 50 MHz. You will need a really good LNA you can dedicate to this antenna and I would recommend the Sonoma 310. I would also recommend that you obtain a set of bandpass filters (with really low insertion loss) so you can keep the Intermod to a bare minimum. The filters are important as the low VHF TV channels and FM BCB can play havoc with the LNA. A fire-wall 30 MHz highpass filter will also be helpful. This antenna is best used from 88 MHz to 300 MHz. Remember that with a biconical that you can not have metal interfering with the pattern of the elements (hence the Delrin spacers) http://www.emctest.com/productpage.cfm?model=3110B&producttype=Antennas http://www.ara-inc.com/bicons.htm http://www.sonoma-instrument.com/pdf/310ds.pdf http://www.sonoma-instrument.com/pdf/317ds.pdf 5) Next you want an equiangular, spiral log periodic antenna (it look like a big cone) that covers 200 MHz to 1 GHz, a 200 MHz high pass filter, and another Sonoma 310 LNA. Of course you will also need some bandpass filters as well, or you risk saturating the spectrum analyzer, and/or getting poor sensitivity. Also, the antenna is best used from 300 MHz to 1.5 GHz http://www.emctest.com/productpage.cfm?model=3101&producttype=Antennas http://www.emctest.com/productpage.cfm?model=3148&producttype=Antennas http://www.ara-inc.com/imagesapr00/pdfs/41.pdf 6) A 450 MHz to 2.7 GHz discone is also helpful, and I would recommend the Ramsey unit, but get the passive version and add you own amplifier. http://www.ramseyelectronics.com/cgi-bin/commerce.exe?preadd=action&key=DA25 7) You may also find it helpful to obtains a lower band discone as well. The Diamond D-130J, Icom AH7000, and Radio Shack 20-043 discone antennas are all pretty good, and very inexpensive. http://www.hamradio.com/ http://www.radioshack.com/ 8) Things start to get a bit dicey above 800 MHz (at least here in the US). The big problems are the 800 MHz cellular bands, the pager bands, and the 1.8 GHz PCS bands. With this in mind you will need a dozen of so band pass filters, and a half dozen band reject filters. You can use the discone to detect the presence of the signal, and the spiral log to DF it. However, watch out for cellular/PCS phone being used as an eavesdropping device (mind the remote channels). http://www.sonoma-instrument.com/pdf/317ds.pdf 9) Above 2 GHz we can start using high gain antenna, and my own personal preference to to use calibrated standard gain horns instead of broadband horns for sweeps. The broadband horns are good for general EMI/EMC work, but the extra gain and flatness of the standard gain units make them more attractive for TSCM work. Of course each horn will need a bandpass filter and a high gain LNA. I lean toward a -80 dB out of band filter, and a 54 dB LNA mounted directly on the horn. This works well from 2 GHz to about 12.4 GHz. http://www.emctest.com/productpage.cfm?model=3160&producttype=Antennas http://www.emctest.com/productpage.cfm?model=3115&producttype=Antennas http://www.emctest.com/productpage.cfm?model=3116&producttype=Antennas http://www.emctest.com/productpage.cfm?model=3164&producttype=Antennas 10) On the extremely high threat 2.4 GHz and 5.8 GHz bands I also use a patch antenna (16-20 dB), a narrow band inter-digital filter, and a 32-54 dB LNA. I then split the signal and use half of it to drive a 90 dB RSSI indicator which makes it very easy to DF the offending signals. The other half goes through a detector, and then to a pair of headphones (or O'scope). I can bypass the splitter and drop the signal right to an SA if I need to. 11) Now about 12.4 GHz things get a little touchy. The standard gain horns will work, and so will the broadband horns, but a small tripod mounted 24 inch parabolic reflector and small spiral log tend to be more helpful up to about 40 GHz. 12) Above 2 GHz, but below 12.4 GHz you want about 45-70 dB of gain. This breaks down to 16 dB from horn gain , and 40-54 dB from the amplifier. Above 8.2 GHz or 12.4 you should stay with a dish with about 30 dB of gain, and amplifier with at least 40 dB of low noise gain (54 dB is a good number). 13) You may also find it handy to have a half dozen small antenna's and some method of attaching them to things like edges of desks. These are also great for hand-held use, and for general purpose scanner antennas. The Radio Shack 20-006, and 20-023 make a good combination, and you can attach it to a nice clamp you pick up at Home Depot or Lowes. If you don't yet use the Sonoma Instrument you should call them and ask to speak with Vladan Temer, his phone number is (707) 542-8569. For those of you not familiar with EMCO, they can be reached at : (512) 531-6400, and I would strongly encourage you to obtain several of their printed catalogs. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 5805 From: James M. Atkinson Date: Wed Jul 17, 2002 1:09pm Subject: BT suspends techie over Angus Deayton phone tap claim http://www.theregister.co.uk/content/6/26242.html BT suspends techie over Angus Deayton phone tap claim By Tim Richardson Posted: 17/07/2002 at 14:22 GMT A BT engineer has been arrested on suspicion of tapping the phone of TV celeb Angus Deayton. The Guardian reports that recording equipment was found in a junction box near to the TV presenter's home at a time when Deayton's private life was under scrutiny. A spokesman for BT said that it was assisting police with its enquiries and that the engineer in question had been suspended. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5806 From: Secdep Date: Wed Jul 17, 2002 2:30pm Subject: Definition - Mechanical Energy Search Can some one please give me a definition for a TSCM ''Mechanical Energy Search. Raymond --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 5807 From: Matt Paulsen Date: Wed Jul 17, 2002 9:49pm Subject: RE: Definition - Mechanical Energy Search I'm guessing HVAC and lighting is involved on this. -----Original Message----- From: Secdep [mailto:secdep@v...] Sent: Wednesday, July 17, 2002 12:30 PM To: TSCM-L Subject: [TSCM-L] Definition - Mechanical Energy Search Can some one please give me a definition for a TSCM ''Mechanical Energy Search. Raymond --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5808 From: Steve Uhrig Date: Thu Jul 18, 2002 10:09am Subject: Re: Definition - Mechanical Energy Search On 17 Jul 2002 at 21:30, Secdep wrote: > Can some one please give me a definition for a TSCM ''Mechanical Energy > Search. Wonder if this refers to the Chinese method of sweeping, where 400 bodies are popped into the area to be swept, each is given a cubic foot of the room, and told to disassemble it to the molecular level? Labor is cheap, the labor doesn't need to know anything, and it would be 100% effective. No equipment needed other than perhaps a hammer and cold chisel. Some on this list may earn more in a single sweep than some of those guys to in a lifetime. Just a guess. A permutation of a physical search? Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5809 From: Charles P. Date: Thu Jul 18, 2002 10:54am Subject: Re: Definition - Mechanical Energy Search Must refer to the task of trying to find good dolly and an elevator to help transport all the equipment to the sweep location. I would render a serious guess that it would be looking for those "things that go bump in the night", noises carried through ventillation ducts, etc. ----- Original Message ----- From: "Secdep" To: "TSCM-L" Sent: Wednesday, July 17, 2002 3:30 PM Subject: [TSCM-L] Definition - Mechanical Energy Search > > Can some one please give me a definition for a TSCM ''Mechanical Energy Search. > > Raymond > > --- > 5810 From: James M. Atkinson Date: Thu Jul 18, 2002 0:57pm Subject: History Lesson In ancient Israel, it came to pass that a trader by the name of Abraham Com did take unto himself a young wife by the name of Dot. And Dot Com was a comely woman, broad of shoulder and long of leg. Indeed, she had been called Amazon Dot Com. And she said unto Abraham, her husband, "Why doth thou travel far from town to town with thy goods when thou can trade without ever leaving thy tent?" And Abraham did look at her as though she were several saddle bags short of a camel load, but simply said, "How, Dear?" And Dot replied, "I will simply place drums in all the towns and drums in between to send messages saying what you have for sale and they will reply telling you which hath the best price. And the sale can be made on the drums and delivery made by Uriah's Pony Stable (UPS)." Abraham thought long and decided he would let Dot have her way with the drums. And the drums rang out and were an immediate success. Abraham sold all the goods he had at the top price, without ever moving from his tent. But this success did arouse envy. A man named Maccabia did secret himself inside Abraham's drum and was accused of insider trading. And the young man did take to Dot Com's trading as doth the greedy horsefly take to camel dung. They were called Nomadic Ecclesiastical Rich Dominican Siderites, or NERDS for short. And lo, the land was so feverish with joy at the new riches and the deafening sound of drums, that no one noticed that the real riches were going to the drum maker, one Brother William of Gates, who bought up every drum company in the land. And indeed did insist on making drums that would work only with Brother Gates' drumheads and drumsticks. And Dot did say, "Oh, Abraham, what we have started is being taken over by others." And as Abraham looked out over the Bay of Ezekiel, or as it came to be known "eBay" he said, "we need a name that reflects what we are." Dot replied, "Young Ambitious Hebrew Owner Operators." "YAHOO!!!", said Abraham. And that is how it all began. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5811 From: James M. Atkinson Date: Thu Jul 18, 2002 1:14pm Subject: Re: Definition - Mechanical Energy Search I suspect that what you are referring to is actually the "Physical Plant Energy Search" or ''Mechanical Plant Energy Search" which would refer to an inspection of the infrastructure of the building for eavesdropping signals. This infrastructure would include all heating, cooling, ventilation, draining, water supply, steam pipes, alarm, security, life safety and other mechanical elements of the building, but not including the actual structure itself. Look at the way a building is constructed... first the foundation, then the basic structure providing a weather proof shell, then the inner permanent structure. To this is added the "central physical plant" which drives localized physical or mechanical plant. Then we have quasi permanent walls (usually sheet rock and studs), ceiling tiles, and such which partition off work areas into which the "physical plant" or mechanical systems provide air, heat, cooling, and so on. The "physical plant" would not include the phone or data networks as they are considered "Communications Infrastructure" or Cabling Plant. The "physical plant" usually would not include the power circuits or any of the raw utilities, but it would be interpreted several ways depending on the size of the building. -jma At 9:30 PM +0200 7/17/02, Secdep wrote: >Can some one please give me a definition for a TSCM ''Mechanical >Energy Search. > >Raymond > >--- > >From the desk of Raymond van Staden >Van Staden and Associates cc > >P.O. Box 1150 >Amanzimtoti >4125 >South Africa > >Tel: +27 (0)31 916-1262 >Fax: +27 (0)31 916-1263 > >Email: raymond@v... >Internet: http://www.vanstaden.co.za -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5812 From: Aimee Farr Date: Thu Jul 18, 2002 1:23pm Subject: Aesop on Leaks. The Horse, Hunter and Stag A quarrel had arisen between the Horse and the Stag, so the Horse came to a Hunter to ask his help to take revenge on the Stag. The Hunter agreed, but said: "If you desire to conquer the Stag, you must permit me to place this piece of iron between your jaws, so that I may guide you with these reins, and allow this saddle to be placed upon your back so that I may keep steady upon you as we follow after the enemy." The Horse agreed to the conditions, and the Hunter soon saddled and bridled him. Then with the aid of the Hunter the Horse soon overcame the Stag, and said to the Hunter: "Now, get off, and remove those things from my mouth and back." "Not so fast, friend," said the Hunter. "I have now got you under bit and spur, and prefer to keep you as you are at present." If you allow men to use you for your own purposes, they will use you for theirs. 5813 From: Secdep Date: Thu Jul 18, 2002 1:38pm Subject: Mechanical Energy Search Thank You to the one and only person in the group who provided me with an explanation and definition.. The BROOKHAVEN NATIONAL LABORATORY Security manual refers to six categories of searches; The categories are: physical, electromagnetic energy, mechanical energy, telephone systems, intercommunications systems, and optics. This manual has been prepared to provide managers and supervisors with general information on asset protection; operations security; counterintelligence; security upgrades planning; personnel information, communication, computer, and emissions security; and technical surveillance countermeasures. Where appropriate, specific guidance is provided for access authorization/security clearance processing and for the handling and safeguarding of classified information. This manual complements and expands the guidance contained in Laboratory Standard Practice Instructions and identifies security practices, procedures, and requirements. Raymond --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 5814 From: Steve Uhrig Date: Thu Jul 18, 2002 9:47pm Subject: Full Coverage Receivers FS - May be last opportunity Hello list, Again I have a come up with a few unblocked ICOM receivers in excellent condition. Have two R8500 base receivers and two R100 portable/mobile receivers. Many are familiar with the R8500. This is ICOM's newest wideband HF/VHF/UHF receiver, quite common with sweepers or for surveillance listening posts. The problem is getting them with 800 megacycle coverage. All the ones sold commercially are cellular blocked, with no provision for TSCM practitioners to obtain unblocked ones legally. We do not want receivers with holes in the coverage. Here are some that don't have the holes. These are full coverage receivers originally restricted to and purchased by the government, generally used for one weekend in a surveillance, then traded in. Basic specs are 100kc to 2 gigs, AM, Wide FM, Narrow FM, CW, SSB. This is a triple conversion tabletop receiver powered by 12VDC or 110VAC with included power supply. Can be used portable or mobile or fixed station. Go here for full specs and a photo: http://www.icomamerica.com/receivers/tabletop/icr8500.html This receiver is the best one ICOM has released to date, significantly better than the R9000 and the R7100, and a later model in the series of R7000/R7100. Remember this is a full coverage receiver, and covers from 100kc (0.1 megacycles) to 2 gigs (2000 megacycles). You do not need an additional receiver to cover the HF portion of the spectrum. When not sweeping, you will use this as a lab receiver on your test bench. There is an RS232 input port as part of this receiver, so you do not need the expensive external level converter to computer control it. There are a number of third party software packages available to remotely operate the receiver. Rather than one of the computer- controlled black box receivers, the R8500 can be computer controlled as well as it has a full featured front panel for standalone use. There may be times when you do not want to drag a laptop around just to run your receiver. There also is an IF and discriminator output on the rear panel for accessories. One of the standard internal features will scan and store any signals found in a special memory bank for later review. ICOM recently raised the price on these substantially, and that higher price will soon be reflected on dealers' pricing. Even then, you can't buy them full coverage without a government sponsor willing to give you a blessing. And I never know when or if I will get more. I only have a few of these, so don't wait if you need a portable, decent full coverage receiver. Practically every time I list these, every one I have sells within a few days and I have to refuse orders from people who come too late. A wideband receiver is one of the first items in a professional sweep kit. When the other equipment sniffs a potentially hostile transmitter, you then tune this to the frequency and disassemble the signal manually. Price is $2000 shipped and insured via priority mail in the U.S. This is less than current government price for an unblocked receiver and about equal with unblocked receivers imported from Canada or England by the time you pay freight, with no chance of these being seized at the border. I take credit cards for payment. The R100 is a little brother to the R8500 receivers. The performance is basically the same as far as frequency coverage and modes, but the R100 does not have all the "soft" capabilities of the R8500, nor do they have the computer control port or ability to display alpha tags on programmed channels. These are good if you want a full coverage receiver to install in your vehicle or something a bit smaller for a portable sweep kit. These can be analog tuned with a knob and also cover the restricted 800 meg frequencies blocked on consumer receivers. Here are basic specs on the R100 mobile/portable receiver: Frequency Coverage: 100 kHz to 1856 MHz continuous Mode: AM, FM, Wide FM (WFM) Power Supply Requirement: 13.8 V DC +/-15% Current Drain (at 13.8 V DC): Less than 1.1 A The R100 was discontinued some time ago and unfortunately there is no replacement for these friendly and versatile receivers. The supply of these is dwindling, especially in the restricted unblocked (government) versions. They make excellent compact multimode demodulators for IF outputs of spectrum analyzers, and can be used standalone besides. Don't use a handheld with a wide open front end which is killed by intermod. Use this R100 which has both an excellent front end as well as filtering. Price of R100s is $650. Anyone buying either model receiver is eligible to purchase a wideband discone antenna for $75, which is a $50 discount off the normal price of $125. This antenna is ideal for this receiver, and is a good universal antenna for sweeping. Mount it on a tripod or microphone stand and move the antenna around the area you are sweeping. Antenna can be used for transmit also, from 25- 2000 megs. I guarantee everything for proper performance, because we personally align each receiver from antenna to speaker. They don't just come off the robotic assembly line 'good enough' to meet spec. We get the most performance each receiver is capable of suppying, which is a noticeable bit more than an out of the box receiver. Holler if interested and your receiver can ship immediately. Remember we pay the freight and insurance, which is considerable on equipment of this value. I also will consider trades towards the above, and I purchase surveillance, countersurveillance and communications equipment. Email me with anything you have to sell or trade. With the new heavy duty restrictions recently announced on full coverage receivers, these will become even more difficult to get. Don't miss this opportunity. As of this point, they are still legal to possess and sell used, but mere possession may be prohibited any day now, or any sales at all, new or used. Perhaps 30 people on this list have purchased receivers from me and use them regularly in their sweeping. Feel free to ask for references. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5815 From: kondrak Date: Thu Jul 18, 2002 1:39pm Subject: Re: Definition - Mechanical Energy Search More likely, its the definition of what the person who does the physical search does...also known as "working up a sweat"... At 11:54 7/18/02 -0400, you wrote: >Must refer to the task of trying to find good dolly and an elevator to help >transport all the equipment to the sweep location. > >I would render a serious guess that it would be looking for those "things >that go bump in the night", noises carried through ventillation ducts, etc. 5816 From: R. Snyder Date: Thu Jul 18, 2002 2:19pm Subject: Computer control software for Icom R7100 I'm looking for recommendations on computer control software for an Icom R7100 receiver. I'd like something that provides a crude approximation of a WJ-8607 for in situ monitoring in a low threat environment. Ideally, support for an external antenna selector would be provided, as well as support for A-to-D conversion of the IF output for PC-based DSP, similar to the WJ DSO option. If these ideals seem difficult to achieve with off-the-shelf products, I'd still be interested to hear any recommendations for less-than-ideal solutions. Thanks in advance. __________________________________________________ Do You Yahoo!? Yahoo! Autos - Get free new car price quotes http://autos.yahoo.com 5817 From: James M. Atkinson Date: Thu Jul 18, 2002 10:18pm Subject: US spies are wasting billions, inquiry says US spies are wasting billions, inquiry says By David Rennie in Washington (Filed: 18/07/2002) Daily Telegraph Spending billions of dollars more on espionage will not make any difference to America's ability to defend itself unless there is a revolutionary shift in intelligence thinking, a congressional inquiry concluded yesterday. The terrorism sub-committee of the house intelligence committee severely criticised the CIA, the FBI and the National Security Agency after an investigation of the September 11 attacks. It said America's spies are woefully ignorant of foreign languages, rely too heavily on intelligence from other countries, and spend too much time in their offices rather than on the streets. The report said the CIA closed or mothballed foreign stations throughout the 1990s and the basic work of the spy - collecting information from agents and informers - was neglected. America needs to maintain its own networks of agents, and stop relying so much on foreign partners who "may have different interests", the committee said. The report called for rules requiring the CIA to vet potential sources for criminal behaviour or human rights abuses to be scrapped. * A senior FBI official said yesterday he believes that Osama bin Laden is dead. But Dale Watson, the head of counter-terrorism, could not provide evidence to support his claim. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 5818 From: Rick Hofmann - MICROSEARCH Date: Thu Jul 18, 2002 11:18pm Subject: Equipment from SWS Security About three years ago I bought one of the used R8500 receivers Steve Uhrig had for sale. When it arrived I thought he had made an error and sent me a brand new one. It came with all the original packing material (including the twistems on the wires) and appeared to be completely unused. I called to make sure I didn't get the wrong piece of equipment and was assured that I got what I ordered. I would not hesitate to purchase equipment from SWS Security. In fact, I just ordered one of the R100's. Very truly yours, Rick Hofmann, CCO, CPP, PI16998 MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 http://home.earthlink.net/~microsearch 5819 From: Dave Emery Date: Fri Jul 19, 2002 0:46am Subject: Change in ECPA The House just passed the Cyber Security Enhancement Act (HR3482) last night (7/15/02) by an overwhelming margin of 385-3. Buried in an otherwise draconian bill that raises penalties for computer hacking that causes death or serious injury to life in prison and allows government monitoring of communications and email without warrants in even more circumstances is the following seeming obscure language: > SEC. 108. PROTECTING PRIVACY. > > (a) Section 2511- Section 2511(4) of title 18, United States Code, is amended-- > > (1) by striking paragraph (b); and > > (2) by redesignating paragraph (c) as paragraph (b). For those of you who don't realize what this means .... USC Section 2511 subsection 4 of title 18 (the ECPA) currently reads as foilows.... the CSEA will strike part (b) of this language. Penalties.. > (a) > > Except as provided in paragraph (b) of this subsection or in subsection > (5), whoever violates subsection (1) of this section shall be fined > under this title or imprisoned not more than five years, or both. > > [The following section will be eliminated by the new law...] > (b) > > If the offense is a first offense under paragraph (a) of this subsection > and is not for a tortious or illegal purpose or for purposes of direct > or indirect commercial advantage or private commercial gain, and the > wire or electronic communication with respect to which the offense under > paragraph (a) is a radio communication that is not scrambled, encrypted, > or transmitted using modulation techniques the essential parameters of > which have been withheld from the public with the intention of > preserving the privacy of such communication, then - > > (i) > > if the communication is not the radio portion of a cellular telephone > communication, a cordless telephone communication that is transmitted > between the cordless telephone handset and the base unit, a public land > mobile radio service communication or a paging service communication, > and the conduct is not that described in subsection (5), the offender > shall be fined under this title or imprisoned not more than one year, or > both; and > > (ii) > > if the communication is the radio portion of a cellular telephone > communication, a cordless telephone communication that is transmitted > between the cordless telephone handset and the base unit, a public land > mobile radio service communication or a paging service communication, > the offender shall be fined under this title. What this does is change the penalty for the first offense of intercepting an unscrambled and unencrypted radio communication that is not supposed to be listened to (eg AMPS cellular calls, commercial pagers, cordless phones, common carrier communications) for hobby purposes (eg not a tortuous or illegal purpose or for direct or indirect commercial advantage or private commercial gain) from a misdemeanor (one year or less prison time) to a federal FELONY (5 years prison time). And further this changes the status of the specific offense of listening to a cell call, cordless call, a pager, or a public land mobile radio service communication (eg a telephone interconnect) from a minor offense for which one can be fined a maximum of $500 to a federal FELONY for which one can be imprisoned for up to 5 years. In effect this removes a safe harbor created during the negotiations over the ECPA back in 1985-86 which ensured that first offenses for hobby radio listening were only treated as minor crimes - after this law is passed simply intentionally tuning a common scanner to the (non-blocked) cordless phone frequencies could be prosecuted as a felony for which one could serve 5 years in jail. And in case any of my readers have forgotten, a federal felony conviction (even without any jail time) deprives one of the right to vote, to own firearms, to be employed in a number of high level jobs and professions, to hold certain professional licenses and permits, and important for certain readers of these lists absolutely eliminates for life the possibility of holding any kind of security clearance whatever (a recent change in the rules) - something required for many if not most interesting government and government related jobs. So merely being stopped by a cop with the cordless phone frequencies in your scanner could conceivably result in life long loss of important rights and privileges. And worse, driving around listening to the flying traffic reporter's 450 mhz remote broadcast link to get a fresh traffic report on your scanner and getting stopped could also land you in felony level hot water, as such links are legally protected - something that most people simply don't know. For some of you out there this may seem small potatoes and irrelevant since it merely changes the penalties for an already illegal act (which you are not supposed to be engaged in) and doesn't make anything new illegal. But this is a rather naive view. The federal government was certainly not going to prosecute a hobbyist for radio communications interception under the old version of the ECPA if the worst penalty that could be levied was a $500 fine - there simply is not the budget or the staff to prosecute people for what would be a very minor offense (equivalent of a speeding ticket). And even prosecuting hobbyists for more serious interception (eg not cellular, cordless or pagers) was still a misdemeanor offense prosecution with jail time unlikely. So in practice the only prosecutions were of people who clearly had a commercial purpose or otherwise engaged in egregious and public (eg the Newt call) conduct - no hobbyist ever got prosecuted. And this was doubtless the intent of Congress back in 1985-86 - it would be illegal to monitor certain radio traffic but only a minor offense if you did so for hobby type personal curiosity or just to hack with the equipment or technology - and a serious felony if one engaged in such conduct for the purpose of committing a crime or gaining financial or commercial advantage (eg true spying or electronic eavesdropping). But after this bill is signed into law (and clearly it will be), it will be quite possible for a federal prosecution of a hobbyist for illegal radio listening to be justified as a serious felony offense worth the time and effort and money to try and put the guy in jail even if the offense is not for a commercial purpose or part of an illegal scheme. Thus "radio hacker" prosecutions have now become possible, and even perhaps probable. And federal prosecutors and law enforcement agents get career advancement and attention from senior management in their agencies in direct proportion to the seriousness of the offense they are investigating and prosecuting - nobody ever advances to senior agent for going after jaywalkers, thus by raising the level of less than legal hobby radio monitoring offenses from a jaywalking class offense to a serious felony for which there can be real jail time it becomes much more interesting from a career perspective to prosecute radio listeners. And needless to say, such prosecutions would be shooting fish in a barrel type things given that many individuals are quite open on Internet newsgroups and mailing lists about their activities. And of course this MAJOR change in the ECPA also has the effect of making the rather ambiguous and unclear meaning of "readily accessible to the general public" in 18 USC 2510 and 2511 much more significant, since intercepting something that isn't readily accessible to the general public is now clearly a serious crime even if done for hobby purposes as a first offense. Thus one has to be much more careful about making sure that the signal is a legal one... And further than all of this, and perhaps even MUCH more significant to radio hobbyists on Internet scanner lists .... The careful, thoughtful reader will note that section 4 has been revised a bit lately, and that this new section 4 (see above) now makes it a federal felony with 5 years in jail penalties to violate section 1 INCLUDING the following provisions of section 1: 18 USC 2511: > (1) > Except as otherwise specifically provided in this chapter any person who - > > (c) > > intentionally discloses, or endeavors to disclose, to any other person > the contents of any wire, oral, or electronic communication, knowing or > having reason to know that the information was obtained through the > interception of a wire, oral, or electronic communication in violation > of this subsection; > > (d) > > intentionally uses, or endeavors to use, the contents of any wire, oral, > or electronic communication, knowing or having reason to know that the > information was obtained through the interception of a wire, oral, or > electronic communication in violation of this subsection; or > > > shall be punished as provided in subsection (4) or shall be subject > to suit as provided in subsection (5). This seems to have changed the status of revealing as part of a hobby list any hint of the contents of a radio communications that might or might not have been legally intercepted from a potentially minor misdemeanor offense or less to a serious felony. Thus if a court finds that any communication reported on an Internet list was not legally intercepted, felony penalties apply for publishing the information even if the interception was for hobby purposes (which of course most scanner list intercepts are). Thus the legal climate has fundamentally changed, and one can assume that since the Bush administration has been pushing for the passage of this bill that they perhaps intend to start prosecuting at least some category of radio hobbyists under the new provisions - no doubt as an example meant to scare the rest of us into handing our radios in at the nearest police station... -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 5820 From: zack <10-33@c...> Date: Fri Jul 19, 2002 8:59am Subject: Question Gentleman and ladies: Having absorbed vast amounts of very useful information on this list, technical and informative suggestions, I have a simple question. How can one detect an individual who has a $69 Radio Shack ( or similar ) voice activated recorder device upon his person ?? I have seen complaints which seem to mirror my exact words. EX: Meeting with various group members, only later to see in print almost my exact words. We talk about $1000 to $5000 for various equipment to track cell phones, etc, etc, TSCM and all that. But it seems the most basic tools are un-detectable ??? If I were to meet you with a voice activated recorder, what could you do ??? Could you tell ?? What would you do to insure the conservation was secure ?? visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." George W Bush God Bless The USA .. NEVER forget 9-11-01 http://www.copscops.com/blessusa.htm [Non-text portions of this message have been removed] 5821 From: doc6363 Date: Fri Jul 19, 2002 9:34am Subject: Question about ISA ETA-4 Telephone Analyzer I would like to know if any members have a copy of a ISA ETA-4 telephone analyzer or equivalent instruction manual that I could purchase or obtain, a photo copy would be ok. Please let me know if you can help. Thankyou: 5822 From: Justin T. Fanning Date: Fri Jul 19, 2002 6:14pm Subject: Re: Question Zack, Someone will no doubt cover this in much more detail than myself, but I have seen many products that claim to detect the EMR from the motors, and/or the EMR of the recording head. A digital recorder would be generating even more 'noise'. Think of it this way, to move the magnetic tape from one spool to the other requires a fair amount of motor power. These units are built to a price, not built with any form of shielding in mind. I think if someone more knowledgeable on such topics (I do computers) picks this thread up and runs with it, you'll find your answer. Kind Regards, JF --- zack wrote: > > Gentleman and ladies: > > Having absorbed vast amounts of very useful information on this list, > technical and informative suggestions, I have a simple question. > > How can one detect an individual who has a $69 Radio Shack ( or similar > ) voice activated recorder device upon his person ?? I have seen > complaints which seem to mirror my exact words. EX: Meeting with various > group members, only later to see in print almost my exact words. > > We talk about $1000 to $5000 for various equipment to track cell phones, > etc, etc, TSCM and all that. But it seems the most basic tools are > un-detectable ??? > > If I were to meet you with a voice activated recorder, what could you do > ??? Could you tell ?? What would you do to insure the conservation was > secure ?? > > visit http://www.copscops.com > Washington DC Police Department http://mpdc.dc.gov/main.shtm > > "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." > George W Bush > > God Bless The USA .. NEVER forget 9-11-01 > http://www.copscops.com/blessusa.htm > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ From: kondrak Date: Wed Jul 14, 2004 1:55am Subject: Re: Caller ID spoofing Where implemented, its always sent in the stream, but a bit is flipped to allow or deny it for display. This is why its always present at a PSAP like 911. I work with the asterisk* Linux phone switch, and i can make a caller ID read anything I want. Ive got an extension that sends POTUS and his phone number. I could make that 911 just as easy. Bottom line is, don't trust CLID, never did, never will...calls should never be routed based on the caller ID. It should always be based on the SS7 signaling, even though its occasionally wrong as well. One nice feature is you can't hide telemarketers numbers...if its on the stream, its mine...if its not in the stream, the call goes to /dev/null where I give them the SIT tone. At 16:14 7/13/2004, you wrote: >I thought caller ID spoofing had been around for a long time. Originally >referred to as the "orange box" in "phreaking terms". You can do a search >for a program called CIDMage for windows on google and with hardware >allowing it makes the task pretty simple. However usually if the person >just hits the back button once on their caller ID it will show the real >sent info. However that's usually easily comprimised as well. Anyhow I'm >no expert on the subject, just two cents on it... > >Chris W. >Freelanced Technologies >www.freelancedtechnologies.com >chris@f... > > > > > > > > >----- Original Message ----- >From: NoPositiveWork@a... >Date: Tue, 13 Jul 2004 12:21:47 EDT >To: TSCM-L@yahoogroups.com >Subject: [TSCM-L] Caller ID spoofing > > > > > Implementation quirks in Voice over IP are making it easy for hackers > > to spoof Caller I.D., and to unmask blocked numbers. > > > > By Kevin Poulsen, SecurityFocus Jul 6 2004 1:54PM > > > > Caller I.D. isn't what it used to be. > > > > Hackers have discovered that the handy feature that tells you who's > > calling before you answer the phone is easily manipulated through > > weaknesses in Voice over IP (VoIP) programs and networks. They can > > make their phone calls appear to be from any number they want, and > > even pierce the veil of Caller I.D. blocking to unmask an anonymous > > phoner's unlisted number. > > > > At root, the issue is one of what happens to a nugget of authenti- > > cation data when it leaves the tightly-regulated realm of traditional > > telephony, and passes into the unregulated domain of the Internet. > > > > On the old-fashioned phone network, Caller I.D. works this way: your > > local phone company or cell phone carrier sends your "Calling Party > > Number" (CPN) with every call, like a return address on an > > envelope. Transmitted along with your CPN is a privacy flag that tells > > the telephone switch at the receiving end of the call whether or not > > to share your number with the recipient: if you have blocking on your > > line, the phone company you're dialing into knows your number, but > > won't share it with the person you're calling. > > > > This arrangement relies on telephone equipment at both ends of the > > call being trusted: the phone switch providing you with dial tone > > promises not to lie about your number to other switches, and the > > switch on the receiving end promises not to reveal your number if > > you've asked that it be blocked. In the U.S. that trust is backed by > > FCC regulations that dictate precisely how telephone carriers handle > > CPNs, Caller I.D. and blocking. Most subscribers have come to take > > Caller I.D. for granted, and some financial institutions even use > > Caller I.D. to authenticate customers over the phone. > > > > Despite that, the system has long been open to manipulation. "A lot of > > times you can offer any number you want, and carriers won't validate > > that," says Lance James, chief security office of Secure Science > > Corporation. But in the past, the power to misrepresent your number > > came with a high price tag: you typically had to be a business able to > > pay the local phone company for a high-volume digital connection. On > > the other side of the equation, companies who pay for toll free > > numbers can often access an incoming caller's phone number even if > > it's blocked. > > > > Voice over IP networks, currently outside FCC regulation, place those > > capabilities in the hands of ordinary netizens. In a telephone > > interview with SecurityFocus, 21-year-old phone hacker "Lucky 225" > > demonstrated how he could spoof his Caller I.D. to appear to be > > phoning from the reporter's office. In another demonstration, the > > reporter phoned Lucky's associate "Natas" from a residential phone > > with Caller I.D. blocked. Natas was able to rattle off the unlisted > > phone number. > > > > Full story at: > > http://www.securityfocus.com/news/9061 > > > > > > > > [Non-text portions of this message have been removed] > > > >-- >___________________________________________________________ >Sign-up for Ads Free at Mail.com >http://promo.mail.com/adsfreejump.htm > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9077 From: kondrak Date: Wed Jul 14, 2004 2:10am Subject: Re: Re: Patriot Act Wins House Vote >But you dont understand, theres nothing they can do about a determined >terrorist or crimnal until he does something. The whole of all this is to >scare everyone into thinking somethings being done, and advance the >police-state. > > I wish our representatives and other elected officials would wake up >and educate themselves about the current and future technologies (and >their risks) before they try to draft laws that will have little or >none of the "intended" impact on the criminal. Easier to park his ass at the airport and use the free wireless, or starbucks, or one of thousands of hotels. Again, its to advance the gooberments ability to repress freedom and liberty, nothing more. > Terrorists use public computers libraries to communicate!? They're usually broke anyways....anti-virus is always out of date, and they're chocked full of spyware and keystroke loggers. anyone using one would have to be terribly naive. >Sure >they do but if you want in on a dirty little secret? Get your laptop, >a wireless network card, and download a copy of Netstumbler (for free) >and see how long it takes for you to get access to a _completely_ >anonymous, wide open wireless LAN complete with high-speed Internet >access. This country is exploding with wireless access points, and >the vast majority of them are installed by the consumer with no >thought to preventing unauthorized access. Some of the worst offenders are lawyers and judges....I know a dozen places I can read dockets via wireless, unsecured.... Dont forget if your laptop is Linux, use Kismet....much better logging....Im not much for Netstumblers S/N meter...it could be a lot more accurate, but with the huge numbers of cards it supports, I suppose you're lucky it reads at all...I routinely see signals that are poor to negligible I can connect to with even my 30mw card. 9078 From: Steven Donnell WA1YKL Date: Wed Jul 14, 2004 9:12am Subject: Re: Caller ID spoofing kondrak wrote: > One nice feature is you can't hide telemarketers numbers...if its on the > stream, its mine...if its not in the stream, the call goes to /dev/null > where I give them the SIT tone. Hi, A few months back, I received a couple of calls that showed all 9's for the number(s). I even checked w/ the local phoneco to see what this was, they had no clue(?). It wasnt until I was at home one nite and took a call that I found out this was some new(?) telemarketing trick. More recently we have seen a cple of calls that were 999's just on the area code,. Steve 9079 From: kondrak Date: Wed Jul 14, 2004 11:16am Subject: Re: Caller ID spoofing Undoubtedly, theyre using some sort of softswitch like asterisk. At 10:12 7/14/2004, you wrote: >kondrak wrote: > > > One nice feature is you can't hide telemarketers numbers...if its on the > > stream, its mine...if its not in the stream, the call goes to /dev/null > > where I give them the SIT tone. > >Hi, A few months back, I received a couple of calls that showed all 9's >for the >number(s). I even checked w/ the local phoneco to see what this was, they had >no clue(?). It wasnt until I was at home one nite and took a call that I found >out this was some new(?) telemarketing trick. More recently we have seen a >cple of calls that were 999's just on the area code,. Steve > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9080 From: Steve Weinert Date: Wed Jul 14, 2004 11:27am Subject: RE: Re: Patriot Act Wins House Vote Would the PA seem more of use in discouraging the "copy-cat" wannabe problem maker? Agree that decent tradecraft negates the usefulness of some PA provisions, but certainly does not negate the PA's utility in discouraging other bottomfeeders. Don't think there is much TSCM impact of the PA. Would seem mostly a LE/CI type law. Steve W > -----Original Message----- > From: Bruce > Sent: Tuesday, July 13, 2004 3:35 PM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Re: Patriot Act Wins House Vote > > > --- In TSCM-L@yahoogroups.com, "savanted1" wrote: > > > ...The bill sought to block a section of > > the Patriot Act that required libraries and booksellers to provide > > federal investigators with records about patrons' purchases > > and Internet use. Representative Frank Wolf (R-Virginia) read a > > letter from the Justice Department describing how terrorists used > > computers at a public library to communicate. > > I wish our representatives and other elected officials would wake up > and educate themselves about the current and future technologies (and > their risks) before they try to draft laws that will have little or > none of the "intended" impact on the criminal. > > Terrorists use public computers libraries to communicate!? Sure > they do but if you want in on a dirty little secret? Get your laptop, > a wireless network card, and download a copy of Netstumbler (for free) > and see how long it takes for you to get access to a _completely_ > anonymous, wide open wireless LAN complete with high-speed Internet > access. This country is exploding with wireless access points, and > the vast majority of them are installed by the consumer with no > thought to preventing unauthorized access. > > I would doubt very seriously that many terrorists are stupid enough > to risk monitoring and/or detection at a public library when they > could quietly sit in a parking lot or on a side street in "Anywhere, > USA" and have the same or faster Internet access. This also allows > them to use their own laptops with their choice of encryption or > steganography software. > > Don't misunderstand me savanted1, this is not directed at you and I > appreciate your original posting... > > Bruce > > "Give me liberty, or make your peace..." 9083 From: Bruce Date: Wed Jul 14, 2004 0:52pm Subject: Re: Patriot Act Wins House Vote --- In TSCM-L@yahoogroups.com, "Steve Weinert" wrote: > Would the PA seem more of use in discouraging the "copy-cat" wannabe problem > maker? I am not sure I follow here, if you mean the addition of LE's ability to seize records from a library under the blanket of the PA helps prevent illegal use of these > > Agree that decent tradecraft negates the usefulness of some PA provisions, > but certainly does not negate the PA's utility in discouraging other > bottomfeeders. > > Don't think there is much TSCM impact of the PA. Would seem mostly a LE/CI > type law. > > Steve W Steve, I am not sure I follow here, but if you mean the addition of LE's ability to seize records from a library under the blanket of the PA is a "bonus" that helps prevent illegal use of these systems I have serious concerns. There are a number of things that could be done which would prevent or impede criminals/terrorists, but this is a VERY slippery slopeÖand it's these types of provisions under the PA that have me the most concerned. If provisions and other "technology" specific laws are introduced and implemented without a full understanding of their collateral impacts, this is where we could start seeing impact on TSCM functions and hardware user/possession. Don't get me wrong, I am a reserve deputy sheriff along with my "real" job and I enjoy nothing more than seeing those who break the law punished or prevented, but at the same time I try to pay attention to the bigger picture. If I misunderstood your intention I apologize, it's been Monday all weekÖ Bruce : ) "Give me liberty, or make your peace..." 9084 From: Bruce Date: Wed Jul 14, 2004 1:32pm Subject: Noise masking to defeat listening devices Noise masking to defeat listening devices I have been researching noise masking countermeasures and I was wondering if anyone has any advice or stories relating to actual application success/failures. This is an issue that I don‚Äôt see a lot of discussion and thought I would bring it up. I have also been testing a Windows application written by REI, the ‚ÄúASA-2000‚Äù audio spectrum analyzer. This seems to be a well written application and it provides a lot of good information using a standard laptop (with sound and microphone) but I have been afraid to ask what the purchase price is yet. Does anyone have any suggestions of other similar applications? Bruce : ) Give me liberty, or make your peace‚Ķ 9085 From: John McCain Date: Wed Jul 14, 2004 5:00pm Subject: Re: Noise masking to defeat listening devices Check the archives. There was a spirited discussion some time ago about PC software audio spectrum analysis. The program I use is no longer available (adobe took it off the market), but there are s number of excellent ones out there at low cost. Some of those provided by Amateur operators are excellent. Cheers, John M Bruce wrote: > > I have also been testing a Windows application written by REI, the > ‚ÄúASA-2000‚Äù audio spectrum analyzer. This seems to be a well written > application and it provides a lot of good information using a standard > laptop (with sound and microphone) but I have been afraid to ask what 9086 From: James M. Atkinson Date: Wed Jul 14, 2004 11:01pm Subject: Re: Noise masking to defeat listening devices We can supply the ASA-2000 software, plus and audio leakage probe for only $299, plus shipping. I would point out that the audio leakage probe alone is $199, which means the software is really only $100. You can download a free 30 day demo copy from our website at the following link: http://www.tscm.com/ASA-2000.msi Give me a call after you have a chance to evaluate the demo copy, and let me know what you think. You will also find the ANG-2200 to be really helpful as well as an audio masking system, but don't be bashful with the transducers as it take one transducer to protect a 4 ft by 4ft segment of wall, and each ANG-2200 can really only drive 12-16 transducers. -jma At 02:32 PM 7/14/2004, Bruce wrote: >Noise masking to defeat listening devices > > I have been researching noise masking countermeasures and I was >wondering if anyone has any advice or stories relating to actual >application success/failures. This is an issue that I don‚Äôt see a lot >of discussion and thought I would bring it up. > > I have also been testing a Windows application written by REI, the >‚ÄúASA-2000‚Äù audio spectrum analyzer. This seems to be a well written >application and it provides a lot of good information using a standard >laptop (with sound and microphone) but I have been afraid to ask what >the purchase price is yet. Does anyone have any suggestions of other >similar applications? > >Bruce : ) > >Give me liberty, or make your peace‚Ķ > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9087 From: Thomas Shaddack Date: Wed Jul 14, 2004 11:08pm Subject: Re: Noise masking to defeat listening devices I didn't play with signal analysis yet. But I was looking around for some software and there are some interesting pieces around. For Linux, there is often mentioned an excellent-looking one, Baudline . Not opensource but for no money. For Windows, there is the $99 shareware Sigview . A list of various digital signal processing programs is also here: but many links are dead. An interesting program is also SkySweep . Lots of software can be found here: libDSP is an open-source collection of various math functions for digital signal processing. A highly optimized library for Fourier transformation is FFTW, . These will be useful if you would like to grow your own DSP software. And there's much more. But Baudline is what I heard about the most often. On Wed, 14 Jul 2004, John McCain wrote: > Check the archives. There was a spirited discussion some time ago about > PC software audio spectrum analysis. The program I use is no longer > available (adobe took it off the market), but there are s number of > excellent ones out there at low cost. Some of those provided by Amateur > operators are excellent. > > Cheers, > John M > > Bruce wrote: > > > > > I have also been testing a Windows application written by REI, the > > ‚ÄúASA-2000‚Äù audio spectrum analyzer. This seems to be a well written > > application and it provides a lot of good information using a standard > > laptop (with sound and microphone) but I have been afraid to ask what > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > [Non-text portions of this message have been removed] 9088 From: Hawkspirit Date: Thu Jul 15, 2004 9:19am Subject: Dektor PSE-1 I have some friends that have this machine if anyone wants it. Roger We ran across a Dektor PSE-1 voice stress type lie detector on e-bay and bought it just to draw, and are planning on putting it back up there, but thought you might be interested in it. Or know some one who is. It has a bad recorder drive motor but otherwise seems to be in working order. It cost around $4,500 bucks back in the '70's when PSE was a hot item. We would like $150.00 for it to recoup our losses. We paid $175.00 for it on E-bay last month. [Non-text portions of this message have been removed] 9089 From: Bruce Date: Thu Jul 15, 2004 6:45am Subject: Re: Noise masking to defeat listening devices --- In TSCM-L@yahoogroups.com, John McCain wrote: > Check the archives. There was a spirited discussion some time ago about > PC software audio spectrum analysis. The program I use is no longer > available (adobe took it off the market), but there are s number of > excellent ones out there at low cost. Some of those provided by Amateur > operators are excellent. > > Cheers, > John M Thanks John... Bruce : ) 9090 From: James M. Atkinson Date: Thu Jul 15, 2004 2:50pm Subject: Re: Dektor PSE-1 Heh, In the 70's a lot of people did drugs and didn't recognize sham science when the PSE was introduced. They are artifacts, and a tribute as to how gullible people can really be. Tea leaves are equally effective. They generally have a value of about a hundred bucks, but only if they are in the Halliburton cases, without the case they are worth around $35-40 -jma At 10:19 AM 7/15/2004, Hawkspirit wrote: > > > I have some friends that have this machine if anyone wants it. Roger > > > >We ran across a Dektor PSE-1 voice stress type lie detector on e-bay and >bought it just to draw, and are planning on putting it back up there, but >thought you might be interested in it. Or know some one who is. It has a bad >recorder drive motor but otherwise seems to be in working order. It cost >around $4,500 bucks back in the '70's when PSE was a hot item. We would like >$150.00 for it to recoup our losses. We paid $175.00 for it on E-bay last >month. > > > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9091 From: Date: Thu Jul 15, 2004 3:14pm Subject: RE: Dektor PSE-1 Both this and the Mark II were good in their day, but are now boat anchors compared with the new laptop and PDA versions used by the government at Gitmo and Middle East. The problem with this unit, is a reliance on the Uher or Deck make by Dektor. The latter broke a few years back and could not be serviced. Good Luck ! -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Thursday, July 15, 2004 10:20 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Dektor PSE-1 I have some friends that have this machine if anyone wants it. Roger We ran across a Dektor PSE-1 voice stress type lie detector on e-bay and bought it just to draw, and are planning on putting it back up there, but thought you might be interested in it. Or know some one who is. It has a bad recorder drive motor but otherwise seems to be in working order. It cost around $4,500 bucks back in the '70's when PSE was a hot item. We would like $150.00 for it to recoup our losses. We paid $175.00 for it on E-bay last month. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9092 From: James M. Atkinson Date: Thu Jul 15, 2004 9:58pm Subject: RE: Dektor PSE-1 Yes, but then they also use dog leashes, S&M collars, rubber gloves, and digital cameras at the same facilities. I am sure that Ashcoft picked out the collars and leashes himself. -jma At 04:14 PM 7/15/2004, Ed.Steinmetz@c... wrote: >Both this and the Mark II were good in their day, but are now boat anchors >compared with the new laptop and PDA versions used by the government at >Gitmo and Middle East. > >The problem with this unit, is a reliance on the Uher or Deck make by >Dektor. The latter broke a few years back and could not be serviced. > >Good Luck ! > >- ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9093 From: James M. Atkinson Date: Thu Jul 15, 2004 10:17pm Subject: STILL OUT IN THE COLD - For intelligence agencies the message is clear: perform or perish http://www.telegraphindia.com/1040716/asp/opinion/story_3499354.asp STILL OUT IN THE COLD - For intelligence agencies the message is clear: perform or perish by: Swapan Dasgupta Espionage has always exercised a macabre fascination for both the macho and the cerebral. Depending on style and personal inclination, both James Bond and George Smiley have, at one time or other, tickled the fantasies of those who love a dash of adventure to oodles of gentlemanliness. Even after the anonymity of Cambridge Circus yielded way to the architectural garishness of Vauxhall, the SIS, or MI6 as it is better known, has retained its special status in the global intelligence community. MI6 conveyed a special type of romance that was so lacking in the sinister purposefulness of both the American CIA and the Israeli Mossad. It enjoyed such a monumental degree of respectability that the outgoing "C", Sir Richard Dearlove, has actually been appointed Master of Pembroke College, Cambridge, on his retirement from a lifetime of spying. Some of the MI6's undeniable aura appears to have been dulled by the understated but sharp indictment of its record in the Iraq conflict. The report of a committee headed by Lord Butler of Brackwell constitutes a damning indictment of the quality of intelligence supplied by MI6 to the British government. Butler has held the intelligence inputs into decision-making to be "seriously flawed" and "insufficiently robust" to suggest that the regime of Saddam Hussein was in violation of United Nations resolutions. In plain language, the inquiry has implied that Britain was led into a spurious conflict thanks to bogus intelligence which was fed to the public in the form of the notorious Iraq dossier. Of course, it is not the MI6 alone that has been faulted for misleading the politicians. A report of the Senate Intelligence Committee released last week has pulled no punches in its assault on the CIA. The CIA's failure, the senators argued, "to accurately analyse and describe the intelligence was the result of a combination of systemic weaknesses, primarily in analytic trade craft, compounded by a lack of information sharing, poor management and inadequate intelligence gathering". The premier intelligence service that boasts a $40 billion annual budget was flayed for being guilty of "groupthink", a euphemism for unthinking conduct, and perpetuating a "risk-averse corporate culture". These shortcomings, the senators concluded, "will not be solved by additional funding and personnel". Presumably, the senators desired the CIA reinvent itself. The Senate Intelligence Committee report is harsher on the CIA than the Butler report is with MI6. Yet, notwithstanding the cultural differences that mark the language of the reports, there is a feeling on both sides of the Atlantic that the intelligence services have become unduly politicized. In short, they have strayed from the straight and narrow path of information gathering and assessment to undertake a more proactive policy role. In the context of the Iraq war, the charge of "groupthink" can only mean that the presentation of intelligence was woefully selective and that White House and Downing Street were fed stories about Iraq they wanted to hear. Butler, in particular, has come down hard on the Joint Intelligence Committee for shedding its tradition of carefully-worded reports and putting its stamp of approval on a dossier drafted by spin doctors. There is no charge of fabrication but it is held that the spymasters stretched the "outer limits of intelligence available". To many, the furore over flawed intelligence seems a ridiculous diversion from the central question of political responsibility. It is hardly a well-kept secret that within hours of the 9/11 attacks on New York and Washington, an influential section of the Bush administration had come to the conclusion that Iraq was somehow responsible. So intense was the hatred of Saddam Hussein in the Bush camp that it did not require the niceties of either satellite photographs and communications intercepts or human intelligence to unilaterally extend the scope of the war on terrorism to Iraq. For the neo-conservatives, a war on Iraq was ideological and an instrument for making west Asia safe for democracy. To the pragmatists, toppling Saddam was a strategic necessity. Either way, the conclusion wasn't based on hard evidence of Baghdad actually possessing weapons of mass destruction. Likewise, regardless of what Blair claimed to the electorate, Britain's participation in the Iraq war was necessitated by the special Anglo-American relationship. For London, standing shoulder to shoulder with the US was a strategic necessity and a historic responsibility. Intelligence reports were incidental to the conclusion. They could, at best, bolster a decision taken for other reasons. "There is always," former British foreign secretary, Sir Douglas Hurd, admitted recently, "a temptation for politicians to exaggerate the importance of intelligence reports because of the glamorous badge of secrecy they carry." It was beyond the scope of both the senate inquiry and the Butler committee to explore the underlying rationale behind the Iraq war and pronounce whether or not it strengthened the war against terrorism. We must leave such a verdict to both the voters in the two countries and to history. What needs exploration, for the moment, is the importance of intelligence inputs in decision-making. Is intelligence blessed with such purity that it can skirt political realities? In an ideal world, it can. The Butler report is lavish in its praise for the MI6 role in unearthing the clandestine nuclear market of the Pakistani scientist A.Q. Khan. This was indeed a remarkable success story and the Western pressures on both Pakistan to disown Khan and on Libya to abandon its nuclear weapons programme were intelligence-led decisions. In the case of Pakistan, the endeavour of the intelligence agencies was sharply at variance with the diplomatic courting of President Pervez Musharraf. Yet, even on this count, the underlying political direction of intelligence is obvious. The MI6 and other friendly agencies were active in pursuing the underground nuclear trail because it was part of their non-proliferation brief. If, as the former head of MI6 told the Butler inquiry, his agency was "a victim of a lack of experience and a lack of sufficiently expert resources" to deploy in Iraq, it is because that country was not regarded as a priority. It was, of course, a priority for the US but the CIA messed it up by its over-dependence on the coloured information provided by Iraqi ÈmigrÈs. The CIA was even a victim of a crude forgery suggesting a massive Iraqi purchase of uranium in Niger. Political direction is central to the effective functioning of any intelligence agency, especially in an age of information overload. There has to be a clear identification of priorities and sufficient time for operational arrangements to be made. Selectivity is crucial when you consider that by the mid-Nineties, the CIA's sensors had the ability to collect intercepts to fill up a Library of Congress every three hours. At the same time, the identification of priorities cannot be confused with political involvement. The intelligence agency chief who imagines his job is to provide arguments in support of political beliefs of the ruling dispensation is doing neither himself nor his government a favour. Nor are national interests enhanced when the intelligence agency, as in Pakistan, becomes an autonomous player, shaping policy, choosing governments, organizing coups and assuming the role of a state within a state. For the free, democratic world, these are testing times. A successful war against political tyranny has yielded way to a new conflict against a hidden enemy who relies as much on the quiet deployment of terror as on medieval certitudes. The new situation demands new strategies and a complete understanding of the other side. The role of intelligence hasn't diminished. Its collection, assessment and eventual use have become a shade more demanding. For the intelligence agencies the message is clear: perform or perish. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9094 From: James M. Atkinson Date: Thu Jul 15, 2004 10:19pm Subject: CIA's Secret Auschwitz http://www.politrix.org/modules.php?name=News&file=article&sid=1182 Bush Administration and the CIA's Secret Auschwitz Posted on Thursday, July 15 @ 16:21:40 EST Topic: G. Bush FOR DECADES the United States led the denunciation of despots whose enemies "disappear" -- vanish into official custody, with no accounting for their whereabouts or treatment, no notification of their families and sometimes, no acknowledgement that they are being held. Now that same term is being applied to prisoners held by the Bush administration in the war on terrorism. According to the International Red Cross, a number of people apparently in U.S. custody are unaccounted for. Most are believed to be held by the CIA in secret facilities outside the United States. Contrary to the Geneva Conventions, the detainees have never been visited by the Red Cross; contrary to U.S. and international law, some reportedly have been subjected to interrogation techniques that most legal authorities regard as torture. According to the independent group Human Rights Watch, this exceptional practice is "perhaps unprecedented in U.S. history." Like the Pentagon's mishandling of Iraqi detainees, it cries out for congressional review and reform. The CIA's Prisoners Washington Post Thursday, July 15, 2004; Page A20 At least a dozen of the CIA detainees are senior figures in the al Qaeda organization, such as Khalid Sheikh Mohammed, an alleged organizer of the attacks of Sept. 11, 2001, and Abu Zubaida, the group's operations chief. Few question their status as dangerous enemy combatants or the need to interrogate them about al Qaeda's networks and plans for attacks -- and no one suggests that they have been murdered, like many of the "disappeared" in other countries. But some of these men have been held incommunicado since before April 2002, or long past the time when urgent questioning or strict seclusion might have been necessary. Yet still the administration refuses to reveal where they are or allow visits by the Red Cross -- something the United States often has advocated for prisoners elsewhere in the world, including other terrorists. The White House reportedly has exempted the CIA's prisoners from the reviews that have been granted to detainees held at the Guantanamo Bay, Cuba, prison. And it has not disclosed the interrogation techniques approved for use by the CIA, though it has released those for Guantanamo. What is known, mostly through leaks to the media, is that several of the CIA's detainees probably have been tortured -- and that a controversial Justice Department opinion defending such abuse was written after the fact to justify the activity. According to reports in The Post, pain medication for Abu Zubaida, who suffered from a gunshot wound in the groin, was manipulated to obtain his cooperation, while Khalid Sheikh Mohammed was subjected to "water boarding," which causes the sensation of drowning. Notwithstanding the Justice Department opinion, parts of which recently were repudiated by the White House, U.S. personnel responsible for such treatment may be guilty of violating the international Convention Against Torture and U.S. laws related to it. Nor has the CIA's illegal behavior been limited to senior al Qaeda militants. The agency has been responsible for interrogating suspects in both Afghanistan and Iraq, and it is believed to have held a number in secret detention facilities. According to official reports, the identities of several in Iraq were deliberately concealed from the Red Cross, a violation of the Geneva Conventions. At least two detainees have died while being interrogated by CIA personnel. One CIA contractor has been charged with assault by the Justice Department in the case of one of the deaths, and at least two other cases are reportedly under investigation. But no higher-ranking CIA officials have been held accountable for the abuses or the decisions that led to them, even though it is now known that former CIA director George J. Tenet was directly involved in the "ghost detainee" cases in Iraq. The Pentagon and Congress are investigating the Army's handling of foreign detainees; though they are slow and inadequate, these probes contrast with the almost complete absence of scrutiny of the CIA's activity. This failure of oversight must be corrected. Though the United States is at war, it cannot be acceptable to hold enemy combatants indefinitely in secret prisons, with no external review or humanitarian oversight of any kind. Congress, or the courts, must step in to correct what appears to be a systematic violation of international law -- and fundamental American values. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9095 From: Ocean Group Date: Fri Jul 16, 2004 4:28am Subject: Forensic computing uncloaks industrial espionage http://www.theregister.co.uk/2004/07/15/autocad_cads_foiled/ By John Leyden 15th July 2004 Forensic computing techniques proved decisive in winning a recent High Court action involving underhand dealings and industrial espionage in Britain's automotive tools industry. Computer forensics firm Vogon International was called in to help investigate the alleged theft of electronic copies of vital engineering drawings by a former director and members of staff who had left British Midland Tools, in Tamworth near Birmingham, to join Midland International Tooling Ltd (MIT). British Midland Tools' suspicions were aroused when MIT set up shop almost on its doorstep, offering identical services only weeks after its staff had left their former company. It was alleged the suspects had taken the electronic blueprints to their new company and had begun to attract business from customers of British Midland Tools valued at £3m. British Midland Tools began a legal action and obtained a search order authorising a raid on MIT. Vogon assisted British Midland Tools' solicitors, Cripps and Shone, in the search and seize order at the site of Midland International Tooling. Vogon's investigators took a complete image of the entire contents of Midland International Tooling's AutoCAD (engineering drawing software) system, providing an exact replica of the system at the time the forensic process took place. AutoCAD files record information on data that is deleted - much like the metadata recorded by Microsoft Word. Tooling up Vogon investigated drawings from both companies at its laboratories in Bicester, Oxfordshire. The initial investigation revealed no real problems, but a different picture was revealed when the drawings were converted into common formats. Vogonís investigators discovered that drawings found at Midland International Tooling contained one of British Midland Toolís address blocks, the original of which had been overwritten and replaced with the address of the new company. Further investigation revealed two pages of British Midland Toolsí quality manual in the slack space of Midland International Toolingís computer, which should not have been there. How was MIT going to defend itself against such damning evidence? At the eleventh hour, the defence presented Vogonís investigators with floppy disks, purporting to be Midland International Toolingís original drawings on their original disks. Midland International Tooling claimed that these drawings were made in 2000; but checks with Sony revealed that the floppy disks had not been manufactured until two years later, in 2002. In court, Justice Hart concluded that the drawings had been deliberately copied from British Midland Toolsí computer to the Midland International Toolingís computer, as part of its plans to set up a rival business. The Judge found in favour of British Midland Tools and made an award for substantial undisclosed damages and all costs. The original judgement was made in January 2003, but an appeal in the case against former MIT directors was only exhausted in January this year. Both Midland International Tooling and British Midland Tools were wound up last year following the failure of their respective businesses. Tony Dearsley, senior computer investigation manager at Vogon International, said its computer forensics expertise is split evenly between criminal and civil cases where the "same principles and attention to detail apply". "Company loyalty is a thing of the past and this has led to an increase in people taking vital company information with them when they leave. We're often called in cases where sales and contact databases going missing," he said. _________________________________________ Help InfoSec News with a donation: http://www.c4i.org/donation.html 9096 From: Steve Uhrig Date: Fri Jul 16, 2004 10:59am Subject: Re: CIA's Secret Auschwitz Once upon a midnight dreary, James M. Atkinson pondered, weak and weary: > http://www.politrix.org/modules.php?name=News&file=article&sid=1182 > Bush Administration and the CIA's Secret Auschwitz For The Nth time, can we PLEASE keep this list vaguely related to TSCM? Those who are on the web get this kind of stuff on feeds from a hundred other sources. There's very little, if anything, posted here in the way of news items any informed web user doesn't read from other sources. When there's too high a noise level, filters are engaged. The ultimate filter is the on/off switch. Infinite Q. Perfect solution. The noise level on this list is too high. If one out of ten posts pertain in any way to TSCM anymore we're doing good. Those who want to continue a conspiracy list, or whatever, please TAKE IT ELSEWHERE. Or in the alternative, maybe someone should start a list dedicated to TSCM, and not all the noise we get from every other direction on the web. Comments TO THE LIST solicited. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9097 From: Rick Hofmann Date: Fri Jul 16, 2004 11:32am Subject: Re: Re: CIA's Secret Auschwitz > > > Bush Administration and the CIA's Secret Auschwitz > >For The Nth time, can we PLEASE keep this list vaguely related to TSCM? Amen to that! Very truly yours, Rick Hofmann MICROSEARCH, LLC - Counter-eavesdropping specialists California PI License number PI16998 714-952-3812 www.microsearchllc.com [Non-text portions of this message have been removed] 9098 From: savanted1 Date: Fri Jul 16, 2004 11:27am Subject: Forensic computing uncloaks industrial espionage Computer forensics firm Vogon International has helped recover evidence to win a High Court case regarding industrial espionage within the British automotive industry. British Midland Tools grew suspicious when a manager and staff left the company to form Midland International Tooling within weeks, offering identical services and attracting £3 million of business from British Midland customers. Vogon International helped British Midland's solicitors search and seize data from Midland International's computers, and examined it to find engineering drawings identical to those of British Midland. In one drawing, a block with Midland International's address was found to have overwritten a similar block with British Midland's address. Midland International's computers also contained two pages of British Midland's quality manual. Midland International provided floppy disks they said contained the original drawings from 2000, but manufacturer Sony says the disks were not made until 2002. The judge found that Midland International copied their designs from British Midland and awarded the plaintiff undisclosed damages. http://www.theregister.co.uk/2004/07/15/autocad_cads_foiled 9099 From: Date: Fri Jul 16, 2004 7:19am Subject: Noise Masking Back 25 years ago, random noise masking was in theory useful, however with todays technology now very ineffective. The "Agencies" used as white noise generator that was mixed with an audio CD of babble talk or normal music then this mix was pumped into the walls using special drivers that were screwed into the wall board. It does help the situation, but it's not the perfect solution! That I did find is that over time the workers inside the work space became very irritated and complained of hearing this "noise" in their sleep. An acoustically treated conference room will work more effectively. RWM > Date: Wed, 14 Jul 2004 17:00:08 -0500 > From: John McCain > Subject: Re: Noise masking to defeat listening devices > > Check the archives. There was a spirited discussion some time ago about > PC software audio spectrum analysis. The program I use is no longer > available (adobe took it off the market), but there are s number of > excellent ones out there at low cost. Some of those provided by Amateur > operators are excellent. > > Cheers, > John M > > Bruce wrote: > > > > > I have also been testing a Windows application written by REI, the > > ‚ÄúASA-2000‚Äù audio spectrum analyzer. This seems to be a well written > > application and it provides a lot of good information using a standard > > laptop (with sound and microphone) but I have been afraid to ask what > > > > > ________________________________________________________________________ > ________________________________________________________________________ > > Message: 2 > Date: Thu, 15 Jul 2004 00:01:34 -0400 > From: "James M. Atkinson" > Subject: Re: Noise masking to defeat listening devices > > We can supply the ASA-2000 software, plus and audio leakage probe for only > $299, plus shipping. > > I would point out that the audio leakage probe alone is $199, which means > the software is really only $100. > > You can download a free 30 day demo copy from our website at the following > link: http://www.tscm.com/ASA-2000.msi > > Give me a call after you have a chance to evaluate the demo copy, and let > me know what you think. > > You will also find the ANG-2200 to be really helpful as well as an audio > masking system, but don't be bashful with the transducers as it take one > transducer to protect a 4 ft by 4ft segment of wall, and each ANG-2200 can > really only drive 12-16 transducers. > > -jma > > > > > > > At 02:32 PM 7/14/2004, Bruce wrote: > >Noise masking to defeat listening devices > > > > I have been researching noise masking countermeasures and I was > >wondering if anyone has any advice or stories relating to actual > >application success/failures. This is an issue that I don‚Äôt see a lot > >of discussion and thought I would bring it up. > > > > I have also been testing a Windows application written by REI, the > >‚ÄúASA-2000‚Äù audio spectrum analyzer. This seems to be a well written > >application and it provides a lot of good information using a standard > >laptop (with sound and microphone) but I have been afraid to ask what > >the purchase price is yet. Does anyone have any suggestions of other > >similar applications? > > > >Bruce : ) > > > >Give me liberty, or make your peace‚Ķ > > > > > > [Non-text portions of this message have been removed] 9100 From: Gregory Horton Date: Fri Jul 16, 2004 6:31pm Subject: Re: CIA's Secret Auschwitz Human Rights Watch an "independent group"? He he he. Ya sure. James M. Atkinson wrote: > > > http://www.politrix.org/modules.php?name=News&file=article&sid=1182 > > > Bush Administration and the CIA's Secret Auschwitz > Posted on Thursday, July 15 @ 16:21:40 EST > Topic: G. Bush > > FOR DECADES the United States led the denunciation of despots whose > enemies > "disappear" -- vanish into official custody, with no accounting for their > whereabouts or treatment, no notification of their families and sometimes, > no acknowledgement that they are being held. Now that same term is being > applied to prisoners held by the Bush administration in the war on > terrorism. According to the International Red Cross, a number of people > apparently in U.S. custody are unaccounted for. Most are believed to > be held > by the CIA in secret facilities outside the United States. Contrary to the > Geneva Conventions, the detainees have never been visited by the Red > Cross; > contrary to U.S. and international law, some reportedly have been > subjected > to interrogation techniques that most legal authorities regard as torture. > According to the independent group Human Rights Watch, this exceptional > practice is "perhaps unprecedented in U.S. history." Like the Pentagon's > mishandling of Iraqi detainees, it cries out for congressional review and > reform. > > The CIA's Prisoners > Washington Post > Thursday, July 15, 2004; Page A20 > > At least a dozen of the CIA detainees are senior figures in the al Qaeda > organization, such as Khalid Sheikh Mohammed, an alleged organizer of the > attacks of Sept. 11, 2001, and Abu Zubaida, the group's operations chief. > Few question their status as dangerous enemy combatants or the need to > interrogate them about al Qaeda's networks and plans for attacks -- and no > one suggests that they have been murdered, like many of the > "disappeared" in > other countries. But some of these men have been held incommunicado since > before April 2002, or long past the time when urgent questioning or strict > seclusion might have been necessary. Yet still the administration > refuses to > reveal where they are or allow visits by the Red Cross -- something the > United States often has advocated for prisoners elsewhere in the world, > including other terrorists. The White House reportedly has exempted the > CIA's prisoners from the reviews that have been granted to detainees > held at > the Guantanamo Bay, Cuba, prison. And it has not disclosed the > interrogation > techniques approved for use by the CIA, though it has released those for > Guantanamo. > > What is known, mostly through leaks to the media, is that several of the > CIA's detainees probably have been tortured -- and that a controversial > Justice Department opinion defending such abuse was written after the fact > to justify the activity. According to reports in The Post, pain medication > for Abu Zubaida, who suffered from a gunshot wound in the groin, was > manipulated to obtain his cooperation, while Khalid Sheikh Mohammed was > subjected to "water boarding," which causes the sensation of drowning. > Notwithstanding the Justice Department opinion, parts of which > recently were > repudiated by the White House, U.S. personnel responsible for such > treatment > may be guilty of violating the international Convention Against > Torture and > U.S. laws related to it. > > Nor has the CIA's illegal behavior been limited to senior al Qaeda > militants. The agency has been responsible for interrogating suspects in > both Afghanistan and Iraq, and it is believed to have held a number in > secret detention facilities. According to official reports, the identities > of several in Iraq were deliberately concealed from the Red Cross, a > violation of the Geneva Conventions. At least two detainees have died > while > being interrogated by CIA personnel. One CIA contractor has been charged > with assault by the Justice Department in the case of one of the > deaths, and > at least two other cases are reportedly under investigation. But no > higher-ranking CIA officials have been held accountable for the abuses or > the decisions that led to them, even though it is now known that > former CIA > director George J. Tenet was directly involved in the "ghost detainee" > cases > in Iraq. > > The Pentagon and Congress are investigating the Army's handling of foreign > detainees; though they are slow and inadequate, these probes contrast with > the almost complete absence of scrutiny of the CIA's activity. This > failure > of oversight must be corrected. Though the United States is at war, it > cannot be acceptable to hold enemy combatants indefinitely in secret > prisons, with no external review or humanitarian oversight of any kind. > Congress, or the courts, must step in to correct what appears to be a > systematic violation of international law -- and fundamental American > values. > > > > > > ----------------------------------------------------------------------------------------------------- > > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ----------------------------------------------------------------------------------------------------- > > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: > http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ----------------------------------------------------------------------------------------------------- > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > ------------------------------------------------------------------------ > Yahoo! Groups Links > > * To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > * To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > > * Your use of Yahoo! Groups is subject to the Yahoo! Terms of > Service . > > [Non-text portions of this message have been removed] 9101 From: Michael Puchol Date: Sat Jul 17, 2004 2:16pm Subject: Re: Cell phone camera ... Remote Viewing? Hi, There is an application out there for the Nokia 7650 (but is likely to work on newer models with better cameras) which provides remote control over the camera. Basically, you send the phone an SMS and it replies with an MMS with the current image attached. The problem (and our advantage) is that hiding the thing is rather difficult. Best regards, Mike ----- Original Message ----- From: "dp01011" To: Sent: Saturday, July 10, 2004 6:26 PM Subject: [TSCM-L] Cell phone camera ... Remote Viewing? > Is it likely that someone could remotely access the camera function > on the newer cell phones? Perhaps a live feed of the cell cam to a > remote location? I just got my first cam phone and Im ready to > color the lens with a sharpie... > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9102 From: David Alexander Date: Sat Jul 17, 2004 4:54am Subject: pardon ? This was on the BBC web site, so it must be true...... Che Guevara became governor of Cuba's national bank after he mistakenly put up his hand up at a post-revolution meeting, to the question: "Is there an economist in the room?" He had misheard the question as: "Is there a communist in the room?" David Alexander Towcester, Northamptonshire, England Competition Co-ordinator - MSA British Drag Racing Championship Founder member, European Top Methanol Racers Association http://home.rednet.co.uk/homepages/dave_ale/dave_ale.html Gone racing, back in 5.4 seconds 9103 From: Noel E. Hanrahan Date: Sun Jul 18, 2004 11:11pm Subject: Glad I don't live there 'Victims' unnerved by mock gas alert By Peter Wilson "We felt we would have died while we waited for the emergency services" is one family's experience of the UK's biggest mock terror exercise. Standing in a car park for two hours with 400 other angry and confused nerve gas "victims" has left many unnerved at the prospect of a real terror attack. Fed up with waiting, some have rushed the front doors of the NEC to try to find emergency crews themselves. Like others, the Groce family say they felt abandoned by emergency crews. Just after 0930 BST on Sunday several "suicide terrorists" played out a scenario of spraying nerve gas into a crowded hall 19 at Europe's busiest exhibition centre, near Birmingham. Cream cakes The emergency services arrived minutes later, but until they were sure what they were up against no crews were deployed. The "victims", dressed in tracksuits and T-shirts, were evacuated and security guards told them emergency crews would be with them imminently but the first fire engine did not move in to start decontamination until 1120 BST. "We would have died waiting," said Astley and Deloris Groce, from Birmingham, who were taking part in the day-long exercise along with their three children. They saw a crowd of people who were searching for help spill out of the front of the NEC and through an external cordon. People were angry at the lack of communication about what was happening, they added. As one photographer commented, the coffee and cream cakes arrived before the emergency services. Meanwhile, two army volunteers also found time to escape the exercise and grab a cup of coffee with expectant media crews mingling at what was called Exercise Horizon. "We could have escaped into Birmingham but, because this is just a training exercise, we thought we would have a cup of coffee instead," they told reporters, leaving organisers with much to reflect on after the region's first full scale "disaster". [Non-text portions of this message have been removed] 9104 From: Steve Uhrig Date: Mon Jul 19, 2004 0:06pm Subject: Re: Glad I don't live there Once upon a midnight dreary, Noel E. Hanrahan pondered, weak and weary: > 'Victims' unnerved by mock gas alert AND THIS PERTAINS TO TSCM EXACTLY HOW? IT'S JUST RAISING THE NOISE LEVEL ON AN ALREADY NOISY LIST. PLEASE POST THIS IRRELEVANT MATERIAL TO ONE OF THE OTHER 50,000 LISTS WHICH ARE *NOT* 'ALLEGEDLY' DEDICATED TO TSCM. YES, I'M SHOUTING. MODERATOR, PLEASE DISCIPLINE YOUR LIST OR CHANGE THE POSTED MISSION OF IT SO PEOPLE ARE NOT MISLED AND VALUABLE TIME WASTED. Anyone feeling the same way, please speak up. The number of people suggesting a *disciplined* TSCM list be established is increasing. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9105 From: Date: Mon Jul 19, 2004 5:47pm Subject: What is happening to this group? Gentlemen: Put the coffee cups down, step away and no one will get hurt. Professionalism, please. Geez.......I'm trying to learn here. Biliken [Non-text portions of this message have been removed] 9106 From: Red MGC_AH3000 Date: Mon Jul 19, 2004 2:52pm Subject: Re: Re: Glad I don't live there I think the moderator does a great job, and I believe the option your looking for is the D-E-L-E-T-E key. The D-E-L-E-T-E Key is most effective at eliminating SPAM or unwanted emails that you judge as not on point instead of creating more emails telling us it is spam or of know interest to you. I found the article very interesting and only wish we were practicing and prepared. Jon Asdourian Data Forensics Engineering --- Steve Uhrig wrote: > Once upon a midnight dreary, Noel E. Hanrahan > pondered, weak and weary: > > > 'Victims' unnerved by mock gas alert > > AND THIS PERTAINS TO TSCM EXACTLY HOW? > > IT'S JUST RAISING THE NOISE LEVEL ON AN ALREADY > NOISY LIST. > > PLEASE POST THIS IRRELEVANT MATERIAL TO ONE OF THE > OTHER 50,000 LISTS > WHICH ARE *NOT* 'ALLEGEDLY' DEDICATED TO TSCM. > > YES, I'M SHOUTING. > > > > MODERATOR, PLEASE DISCIPLINE YOUR LIST OR CHANGE THE > POSTED MISSION OF IT > SO PEOPLE ARE NOT MISLED AND VALUABLE TIME WASTED. > > Anyone feeling the same way, please speak up. > > The number of people suggesting a *disciplined* TSCM > list be established > is increasing. > > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website > http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > __________________________________ Do you Yahoo!? Vote for the stars of Yahoo!'s next ad campaign! http://advision.webevents.yahoo.com/yahoo/votelifeengine/ 9107 From: Date: Tue Jul 20, 2004 6:40am Subject: Mobile phone detector, 25/30m radius, at less than usa$50 http://news.bbc.co.uk/2/hi/technology/3890959.stm Ciao! Remo From: Steve Weinert Date: Sun Jul 15, 2001 7:26am Subject: PRAVDA: THE SHOCKING MENACE OF SATELLITE SURVEILLANCE http://english.pravda.ru/main/2001/07/11/9825.html JOHN FLEMING: THE SHOCKING MENACE OF SATELLITE SURVEILLANCE Unknown to most of the world, satellites can perform astonishing and often menacing feats. This should come as no surprise when one reflects on the massive effort poured into satellite technology since the Soviet satellite Sputnik, launched in 1957, caused panic in the U.S. A spy satellite can monitor a person's every movement, even when the "target" is indoors or deep in the interior of a building or travelling rapidly down the highway in a car, in any kind of weather (cloudy, rainy, stormy). There is no place to hide on the face of the earth. It takes just three satellites to blanket the world with detection capacity. Besides tracking a person's every action and relaying the data to a computer screen on earth, amazing powers of satellites include reading a person's mind, monitoring conversations, manipulating electronic instruments and physically assaulting someone with a laser beam. Remote reading of someone's mind through satellite technology is quite bizarre, yet it is being done; it is a reality at present, not a chimera from a futuristic dystopia! To those who might disbelieve my description of satellite surveillance, I'd simply cite a tried-and-true Roman proverb: Time reveals all things (tempus omnia revelat). Probably the most sinister aspect of satellite surveillance, certainly its most stunning, is mind-reading. As early as 1981, G. Harry Stine (in his book Confrontation in Space), could write that computers have "read" human minds by means of deciphering the outputs of electroencephalographs (EEGs). Early work in this area was reported by the Defense Advanced Research Projects Agency (DARPA) in 1978. EEG's are now known to be crude sensors of neural activity in the human brain, depending as they do upon induced electrical currents in the skin. Magnetoencephalographs (MEGs) have since been developed using highly sensitive electromagnetic sensors that can directly map brain neural activity even through even through the bones of the skull. The responses of the visual areas of the brain have now been mapped by Kaufman and others at Vanderbilt University. Work may already be under way in mapping the neural activity of other portions of the human brain using the new MEG techniques. It does not require a great deal of prognostication to forecast that the neural electromagnetic activity of the human brain will be totally mapped within a decade or so and that crystalline computers can be programmed to decipher the electromagnetic neural signals. In 1992, Newsweek reported that "with powerful new devices that peer through the skull and see the brain at work, neuroscientists seek the wellsprings of thoughts and emotions, the genesis of intelligence and language. They hope, in short, to read your mind." In 1994, a scientist noted that "current imaging techniques can depict physiological events in the brain which accompany sensory perception and motor activity, as well as cognition and speech." In order to give a satellite mind-reading capability, it only remains to put some type of EEG-like-device on a satellite and link it with a computer that has a data bank of brain-mapping research. I believe that surveillance satellites began reading minds--or rather, began allowing the minds of targets to be read--sometime in the early 1990s. Some satellites in fact can read a person's mind from space. JOHN FLEMING USA And also read on our site FULL VERSION OF THE ARTICLE http://english.pravda.ru/main/2001/07/14/10131.html 3363 From: James M. Atkinson, Comm-Eng Date: Sun Jul 15, 2001 9:48pm Subject: MURPHY'S LAW OF COMBAT MURPHY'S LAW OF COMBAT 1. If the enemy is in range, so are you... 2. Incoming fire has the right-of-way... 3. Don't look conspicuous, it draws fire... 4. Never forget that your weapon is made by the lowest bidder... 5. The easy way is always mined... 6. Try to look unimportant, they may be low on ammo... 7. Professionals are predictable, it's the amateurs that are dangerous... 8. The enemy always attacks on two occasions: a. When you are ready for them. b. When you are not ready for them. 9. Teamwork is essential, it gives them someone else to shoot at... 10. If you can't remember, then the Uzi is pointed at you. 11. The enemy diversion you have been ignoring, will be the main attack... 12. A "sucking chest wound" is nature's way of telling you to slow down... 13. If your attack is going well, you have walked into an ambush... 14. NEVER draw fire, it irritates everyone around you... 15. Anything you do can get you shot, including nothing... 16. Make it tough for the enemy to get in, and you won't be able to get out... 17. Never share a foxhole with anyone braver than yourself... 18. If you're short of everything, except the enemy, you're in a combat zone.. 19. When you have secured an area, don't forget to tell the enemy... 20. When encountering friendly fire, it ain't... 21. There is always a way... -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3364 From: Bob Washburne Date: Sun Jul 15, 2001 10:07pm Subject: Re: PRAVDA: THE SHOCKING MENACE OF SATELLITE SURVEILLANCE It must be true! Back in 1976 Dick Greggory was speaking at my campus and told us how the CIA was tracking our every movement through satalites monitoring our infrared images. They were even able to identify individuals based on their IR signature. If the CIA could do that back in 1976, what must they be doing now? Bob Washburne Steve Weinert wrote: > > http://english.pravda.ru/main/2001/07/11/9825.html > > JOHN FLEMING: THE SHOCKING MENACE OF SATELLITE SURVEILLANCE > > Unknown to most of the world, satellites can perform astonishing and > often menacing feats. This should come as no surprise when one > reflects on the massive effort poured into satellite technology since > the Soviet satellite Sputnik, launched in 1957, caused panic in the > U.S. A spy satellite can monitor a person's every movement, even when > the "target" is indoors or deep in the interior of a building or > travelling rapidly down the highway in a car, in any kind of weather > (cloudy, rainy, stormy). There is no place to hide on the face of the > earth. It takes just three satellites to blanket the world with > detection capacity. Besides tracking a person's every action and > relaying the data to a computer screen on earth, amazing powers of > satellites include reading a person's mind, monitoring conversations, > manipulating electronic instruments and physically assaulting someone > with a laser beam. Remote reading of someone's mind through satellite > technology is quite bizarre, yet it is being done; it is a reality at > present, not a chimera from a futuristic dystopia! To those who might > disbelieve my description of satellite surveillance, I'd simply cite > a tried-and-true Roman proverb: Time reveals all things (tempus omnia > revelat). > Probably the most sinister aspect of satellite surveillance, > certainly its most stunning, is mind-reading. As early as 1981, G. > Harry Stine (in his book Confrontation in Space), could write that > computers have "read" human minds by means of deciphering the outputs > of electroencephalographs (EEGs). Early work in this area was > reported by the Defense Advanced Research Projects Agency (DARPA) in > 1978. EEG's are now known to be crude sensors of neural activity in > the human brain, depending as they do upon induced electrical > currents in the skin. Magnetoencephalographs (MEGs) have since been > developed using highly sensitive electromagnetic sensors that can > directly map brain neural activity even through even through the > bones of the skull. The responses of the visual areas of the brain > have now been mapped by Kaufman and others at Vanderbilt University. > Work may already be under way in mapping the neural activity of other > portions of the human brain using the new MEG techniques. It does not > require a great deal of prognostication to forecast that the neural > electromagnetic activity of the human brain will be totally mapped > within a decade or so and that crystalline computers can be > programmed to decipher the electromagnetic neural signals. > In 1992, Newsweek reported that "with powerful new devices that peer > through the skull and see the brain at work, neuroscientists seek the > wellsprings of thoughts and emotions, the genesis of intelligence and > language. They hope, in short, to read your mind." In 1994, a > scientist noted that "current imaging techniques can depict > physiological events in the brain which accompany sensory perception > and motor activity, as well as cognition and speech." In order to > give a satellite mind-reading capability, it only remains to put some > type of EEG-like-device on a satellite and link it with a computer > that has a data bank of brain-mapping research. I believe that > surveillance satellites began reading minds--or rather, began > allowing the minds of targets to be read--sometime in the early > 1990s. Some satellites in fact can read a person's mind from space. > > JOHN FLEMING > USA > > And also read on our site > > FULL VERSION OF THE ARTICLE > http://english.pravda.ru/main/2001/07/14/10131.html > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3365 From: James M. Atkinson, Comm-Eng Date: Sun Jul 15, 2001 10:09pm Subject: Re: PRAVDA: THE SHOCKING MENACE OF SATELLITE SURVEILLANCE At 12:26 PM +0000 7/15/01, Steve Weinert wrote: >http://english.pravda.ru/main/2001/07/11/9825.html > >JOHN FLEMING: THE SHOCKING MENACE OF SATELLITE SURVEILLANCE > >Unknown to most of the world, satellites can perform astonishing and >often menacing feats. This should come as no surprise when one >reflects on the massive effort poured into satellite technology since [cough-cough] April Fools Day was 105 days ago. Come on folks, if you post some thing as a joke, please take a moment to indicate such. -jma -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3366 From: James M. Atkinson, Comm-Eng Date: Mon Jul 16, 2001 9:38am Subject: Monday Morning Dose of Humor Ever wonder about those people who spend $2 apiece on those little bottles of Evian water? Try spelling Evian backwards. NAIVE. Isn't making a smoking section in a restaurant like making a peeing section in a swimming pool? OK...so if the Jacksonville Jaguars are known as the "Jags" and the Tampa Bay Buccaneers are known as the "Bucs," what does that make the Tennessee Titans? If 4 out of 5 people SUFFER from diarrhea...does that mean that one enjoys it? There are three basic religious truths: 1. Jews do not recognize Jesus as the Messiah. 2. Protestants do not recognize the Pope as the leader of the Christian faith. 3. Baptists do not recognize each other in the liquor store or at Hooters. ouch -jma -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3367 From: James M. Atkinson, Comm-Eng Date: Mon Jul 16, 2001 10:14pm Subject: Hold On Folks, Price Increases On The Way - OSCOR, ORION, and Related Equipment Hold On Folks, I just wanted to let list members know that as of August 1, 2001 the pricing on the OSCOR, ORION, and all associated accessories will be going up in price by almost 10%. Also, the products will now only be available from and supported by a very, very small number of formally recognized Manufacturer's Representatives (which of course we will be). Over the last few years the factory has made a number of updates to both the hardware and software, and this is the first price increase that we have seen in a while, and it is long overdue. The OSCOR is going up $800.00, and the Deluxe Upgrade Option is increasing by $175.00; for an increase of almost $1000.00 for the entire system. The ORION is going up in price by just under $1,000.00; however, the CPM-700, TRD, ANG, PNG, and similar product will remain the same. Between now and the end of the month (July 2001) we can honor the old price schedule (for the next two weeks), but if your on the fence about picking an OSCOR or ORION you will save some serious money by making your order now before the price increases from the factory kick in. These are the prices in effect from NOW until 1 August 2001 OSC-5000 OSCOR Omni Spectral Correlator Base System$ 14,000.00 ODP-5000 Deluxe System Package$ 2,600.00 System Includes: OVM-5000 Video Option - Multi-format Video OVP-5000 Video Patch Cord OAR-5000 Audio Recorder with Cable OTL-5000 Ultrasonic Triangulate and Locate Option MPA-5000 Modular Phone Adapter CLA-5000 Cigarette Lighter Adaptor LPE-5000 Locator Probe Extension Cable MIC-5000 Microphone (for remote monitoring) MPC-5000 Multi-Purpose Cable MDC-2100 Microwave Down Convertor (3 GHz to 21 GHz)$ 9,850.00 OIF-5000 IF Output for Panoramic Signal Monitor (10.7 MHz) $ 230.00 OPC-5000 Computer Software Interface and Database Utilities software package$ 2,950.00 =========== Complete OSC-5000 System$ 29,630.00 NJE-4000 ORION Non-linear Junction Detector$ 14,860.00 OTK-4000 Tool Kit for ORION NLJD$ 2,350.00 =========== Complete ORION System$ 17,210.00 ------------------------------------------------------------------------------------------------------- These are the prices in effect from AFTER 1 August 2001 (Note the price increases) OSC-5000 OSCOR Omni Spectral Correlator Base System$ 14,800.00 ODP-5000 Deluxe System Package$ 2,750.00 System Includes: OVM-5000 Video Option - Multi-format Video OVP-5000 Video Patch Cord OAR-5000 Audio Recorder with Cable OTL-5000 Ultrasonic Triangulate and Locate Option MPA-5000 Modular Phone Adapter CLA-5000 Cigarette Lighter Adaptor LPE-5000 Locator Probe Extension Cable MIC-5000 Microphone (for remote monitoring) MPC-5000 Multi-Purpose Cable MDC-2100 Microwave Down Convertor (3 GHz to 21 GHz)$ 9,850.00 OIF-5000 IF Output for Panoramic Signal Monitor (10.7 MHz) $ 230.00 OPC-5000 Computer Software Interface and Database Utilities software package$ 2,950.00 =========== Complete OSC-5000 System$ 30,580.00 NJE-4000 ORION Non-linear Junction Detector$ 15,800.00 OTK-4000 Tool Kit for ORION NLJD$ 2,350.00 =========== Complete ORION System$ 18,150.00 Order now, and save some serious coin, Yes, I know it sucks.... but I am not the one who initiated the increase. James M. Atkinson -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 3368 From: Steve Uhrig Date: Tue Jul 17, 2001 9:32am Subject: Scanlock antennas Would anyone have any Scanlock antennas they don't need? Looking for the older style ones with an N connector and the insulated tube around the base so you could hand hold the thing without detuning it. Please reply OFF LIST if you have any to sell. Also looking for any other Scanlock units, accessories or options. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3369 From: James M. Atkinson, Comm-Eng Date: Tue Jul 17, 2001 4:14pm Subject: Sharpening The Axe -- Little Hinges Swing Big Doors Sharpening The Axe -- Little Hinges Swing Big Doors by James Sparks You may wonder what sharpening your axe has to do with marketing or business. Well, truthfully it's just an analogy I borrowed from a well know professional speaker, Zig Ziglar. I thought this was pretty catchy because Zig tells a story of two woodsmen, one, a grizzled old hand and the other a young newly hired apprentice. Both woodsmen chopped wood all day for a week, the younger woodsman worked tirelessly without rest all day, while the older one worked hard for several hours and then sat down and rested in the shade for 15 minutes or so, then returned to work. The younger woodsman laughed, yet after the day was done the older woodsman had always chopped more wood and had more to show for his days work than the younger and stronger woodsman. Finally the younger woodsman swallowed his pride and asked the older one what his secret was. How could he possibly be able to sit down on breaks for 15 minutes and still cut so much more wood in a day. The older woodsman simply explained to the younger one that every time he sat down to rest in the shade, he would sharpen his axe. This correlates perfectly with an often overlooked secret to the greatest success in business. Through magazine articles, networking and through seeking out knowledgeable experts in very specific field of expertise, one can easily gain a great advantage over our competitors by simply sharpening the axe, or improving our skills in any specific area. You must actively educate yourself on new concepts as well as re-vitalizing old tested and proven methods of getting the competitive edge above and beyond your competition if you hope for success. Napoleon Hill researched these topics of success very thoroughly in the preliminaries of his book "Think and Grow Rich". By researching, studying and comparing notes on the interviews he did with the most successful business people in the world, he came up with a set of basic success principals that these people, although very different individuals, had in common. One of these principals was the driving desire to improve and be more effective. This success principle is very effective and has since been coined into a phrase used by direct marketing guru Dan Kennedy that he calls "The Principle of the Slight Edge". Which simply defines a person who gets up each day, looking, striving and searching for that one morsel of information, that one edge on their competition that tips the balance of the scales in their direction in even the slightest way. "Little Hinges Swing Big Doors!", and small increases in effectiveness in the sales and marketing of your company add up to big increases in your bottom line. Many people mistakenly think of successful people as lucky. Well, that brings to mind one story of a man working on his garden and a passing minister stopped, called from his car window and said, "Hello sir, God sure has Blessed you with a beautiful Garden." The man clearly said, "Yes, I've been blessed alright, but you should have seen this Garden when God had it all to himself." Another instance is that of Armond Hammer who said, "I work 18 hours a day 7 days a week and a lot of lucky deals seem to fall in my lap". In order to reach success in business, life or anything else you must continue your education and put your best foot forward to continually improve. Too many people have taken on this outlook that your education stops after college or for some even before that. I'm here to tell you that to learn is to grow and growth is life, never stop. It's up to you to find your mentors in each field of interest to you because in order to reach your goals of success you can never stop "Sharpening the Axe". -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3370 From: D. Douglas Rehman Date: Tue Jul 17, 2001 4:39pm Subject: Toll Fraud Expert needed I received a call from an attorney in Georgia who needs an expert in toll fraud. A small business with a Panasonic KXT1232 (I could have written the model down wrong) telephone system received a long distance bill for approximately $90,000. The calls were made from pay phones in NY and NJ and handled via an international operator. According to a telephone technician, the calls were not going through the Panasonic telephone system (supposedly he blocked all toll calls and the long distance calls continued). The business has refused to pay the bill and is being sued by the long distance carrier. The business has filed an action before the FCC to force the long distance carrier to cease collection efforts. I do not have any further information on the case. I am merely doing this as a courtesy to the attorney. The attorney is looking for someone who is an EXPERT (not just familiar with toll fraud) who can explain in an affidavit exactly how the toll fraud could have been/was perpetrated. The EXPERT will need to be able to explain this in great detail, not just I think... Best Regards, Doug Rehman Rehman Technology Services, Inc. Specializing in Computer Forensics and Technology Related Investigations License A-9800119 Mount Dora, Florida (Orlando Area) (352)357-0500 http://www.surveil.com 3371 From: Charles P Date: Tue Jul 17, 2001 5:56pm Subject: Re: Toll Fraud Expert needed Hi Doug, Sounds like the calls may have been made through third party billing if as you say they were made from NY or NJ. That is tough to control because even if you request blocking on your lines, not all operators will check and many calls can still go through- although the client should not be responsible if the calls were unauthorized. Recently there has been a series of hacker attacks on Panasonic and ATT voicemail systems, causing them to automatically place international calls. If this is what has happened, their phone technician may not be aware of what took place. I have been certified by Panasonic for their KXT line of phone and voicemail systems and have dealt with a number of these cases. I'd be happy to talk to you or the attorney to see if I could be helpful. Charles Patterson charles@t... Global Communications Tarrytown, NY www.telephonesecurity.com 914-366-0291 ----- Original Message ----- From: "D. Douglas Rehman" To: "'TSCM-L Mailing List'" Sent: Tuesday, July 17, 2001 5:39 PM Subject: [TSCM-L] Toll Fraud Expert needed > I received a call from an attorney in Georgia who needs an expert in > toll fraud. A small business with a Panasonic KXT1232 (I could have > written the model down wrong) telephone system received a long distance > bill for approximately $90,000. The calls were made from pay phones in > NY and NJ and handled via an international operator. According to a > telephone technician, the calls were not going through the Panasonic > telephone system (supposedly he blocked all toll calls and the long > distance calls continued). The business has refused to pay the bill and > is being sued by the long distance carrier. The business has filed an > action before the FCC to force the long distance carrier to cease > collection efforts. > > I do not have any further information on the case. I am merely doing > this as a courtesy to the attorney. > > The attorney is looking for someone who is an EXPERT (not just familiar > with toll fraud) who can explain in an affidavit exactly how the toll > fraud could have been/was perpetrated. The EXPERT will need to be able > to explain this in great detail, not just I think... > > Best Regards, > > Doug Rehman > Rehman Technology Services, Inc. > Specializing in Computer Forensics and Technology Related Investigations > License A-9800119 Mount Dora, Florida (Orlando Area) (352)357-0500 > http://www.surveil.com > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 3372 From: Charles P Date: Tue Jul 17, 2001 5:57pm Subject: Re: Toll Fraud Expert needed Hi Doug, Sounds like the calls may have been made through third party billing if as you say they were made from NY or NJ. That is tough to control because even if you request blocking on your lines, not all operators will check and many calls can still go through- although the client should not be responsible if the calls were unauthorized. Recently there has been a series of hacker attacks on Panasonic and ATT voicemail systems, causing them to automatically place international calls. If this is what has happened, their phone technician may not be aware of what took place. I have been certified by Panasonic for their KXT line of phone and voicemail systems and have dealt with a number of these cases. I'd be happy to talk to you or the attorney to see if I could be helpful. Charles Patterson charles@t... Global Communications Tarrytown, NY www.telephonesecurity.com 914-366-0291 ----- Original Message ----- From: "D. Douglas Rehman" To: "'TSCM-L Mailing List'" Sent: Tuesday, July 17, 2001 5:39 PM Subject: [TSCM-L] Toll Fraud Expert needed > I received a call from an attorney in Georgia who needs an expert in > toll fraud. A small business with a Panasonic KXT1232 (I could have > written the model down wrong) telephone system received a long distance > bill for approximately $90,000. The calls were made from pay phones in > NY and NJ and handled via an international operator. According to a > telephone technician, the calls were not going through the Panasonic > telephone system (supposedly he blocked all toll calls and the long > distance calls continued). The business has refused to pay the bill and > is being sued by the long distance carrier. The business has filed an > action before the FCC to force the long distance carrier to cease > collection efforts. > > I do not have any further information on the case. I am merely doing > this as a courtesy to the attorney. > > The attorney is looking for someone who is an EXPERT (not just familiar > with toll fraud) who can explain in an affidavit exactly how the toll > fraud could have been/was perpetrated. The EXPERT will need to be able > to explain this in great detail, not just I think... > > Best Regards, > > Doug Rehman > Rehman Technology Services, Inc. > Specializing in Computer Forensics and Technology Related Investigations > License A-9800119 Mount Dora, Florida (Orlando Area) (352)357-0500 > http://www.surveil.com > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 3373 From: Charles P Date: Tue Jul 17, 2001 5:56pm Subject: Re: Toll Fraud Expert needed Hi Doug, Sounds like the calls may have been made through third party billing if as you say they were made from NY or NJ. That is tough to control because even if you request blocking on your lines, not all operators will check and many calls can still go through- although the client should not be responsible if the calls were unauthorized. Recently there has been a series of hacker attacks on Panasonic and ATT voicemail systems, causing them to automatically place international calls. If this is what has happened, their phone technician may not be aware of what took place. I have been certified by Panasonic for their KXT line of phone and voicemail systems and have dealt with a number of these cases. I'd be happy to talk to you or the attorney to see if I could be helpful. Charles Patterson charles@t... Global Communications Tarrytown, NY www.telephonesecurity.com 914-366-0291 ----- Original Message ----- From: "D. Douglas Rehman" To: "'TSCM-L Mailing List'" Sent: Tuesday, July 17, 2001 5:39 PM Subject: [TSCM-L] Toll Fraud Expert needed > I received a call from an attorney in Georgia who needs an expert in > toll fraud. A small business with a Panasonic KXT1232 (I could have > written the model down wrong) telephone system received a long distance > bill for approximately $90,000. The calls were made from pay phones in > NY and NJ and handled via an international operator. According to a > telephone technician, the calls were not going through the Panasonic > telephone system (supposedly he blocked all toll calls and the long > distance calls continued). The business has refused to pay the bill and > is being sued by the long distance carrier. The business has filed an > action before the FCC to force the long distance carrier to cease > collection efforts. > > I do not have any further information on the case. I am merely doing > this as a courtesy to the attorney. > > The attorney is looking for someone who is an EXPERT (not just familiar > with toll fraud) who can explain in an affidavit exactly how the toll > fraud could have been/was perpetrated. The EXPERT will need to be able > to explain this in great detail, not just I think... > > Best Regards, > > Doug Rehman > Rehman Technology Services, Inc. > Specializing in Computer Forensics and Technology Related Investigations > License A-9800119 Mount Dora, Florida (Orlando Area) (352)357-0500 > http://www.surveil.com > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 3374 From: Charles P Date: Tue Jul 17, 2001 6:52pm Subject: sorry if that last msg came through too many times two of my email accounts were screwing up but started working after I opted for the third... 3375 From: James M. Atkinson, Comm-Eng Date: Wed Jul 18, 2001 6:31am Subject: Spy Shop Bugs - Frequency Distribution Charts The following graphics may be of interest to the list members (but please do not steal them, or use them without my explicit permission). The following three charts represent the frequencies used by thousands of eavesdropping device identified during undercover operations, and/or seized in SpyShop raids around the United States. The population for this analysis was just over 2500 individual eavesdropping devices, and consisted of 43 different models. All models evaluated utilized power levels well below 50 mW, with most well below 15 mW. While the bugs were available on hundreds of frequencies the following 20 were the most common. All frequencies are in MHz : http://www.tscm.com/bugfreq003comb.gif http://www.tscm.com/bugfreq001VHF.gif http://www.tscm.com/bugfreq002UHF.gif All of the devices and frequencies have been added to my database, and I have a detailed profile on each (as several list members have discovered). The charts have been uploaded along with some new materials to the following page (check it out and let me know what you think) http://www.tscm.com/bugfreq.html ... and remember; the prices on OSCORs, ORIONs, and associated accessories is going up by almost 10% in just nine working days so get your orders booked ASAP if you want to save a hefty chunk of money. -jma -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 3376 From: DrPepper Date: Wed Jul 18, 2001 8:47am Subject: Re: Toll Fraud Expert needed OH YES, , , , , , , , I saw this on TV once, , , , The company was forced to pay the bill. The way it was done, was to access the company's switchboard by coming in on an 800 number, then hacking that to access long distance. It was amazing that the company had to pay for problems with something that the telephone company installed. The telephone company admitted that it was their equipment that was hacked, but demanded payment anyway. The courts agreed, and it put the company out of business. "D. Douglas Rehman" wrote: > I received a call from an attorney in Georgia who needs an expert in > toll fraud. A small business with a Panasonic KXT1232 (I could have > written the model down wrong) telephone system received a long distance > bill for approximately $90,000. The calls were made from pay phones in > NY and NJ and handled via an international operator. According to a > telephone technician, the calls were not going through the Panasonic > telephone system (supposedly he blocked all toll calls and the long > distance calls continued). The business has refused to pay the bill and > is being sued by the long distance carrier. The business has filed an > action before the FCC to force the long distance carrier to cease > collection efforts. > > I do not have any further information on the case. I am merely doing > this as a courtesy to the attorney. > > The attorney is looking for someone who is an EXPERT (not just familiar > with toll fraud) who can explain in an affidavit exactly how the toll > fraud could have been/was perpetrated. The EXPERT will need to be able > to explain this in great detail, not just I think... > > Best Regards, > > Doug Rehman > Rehman Technology Services, Inc. > Specializing in Computer Forensics and Technology Related Investigations > License A-9800119 Mount Dora, Florida (Orlando Area) (352)357-0500 > http://www.surveil.com > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 3377 From: James M. Atkinson, Comm-Eng Date: Wed Jul 18, 2001 9:22am Subject: Entry Level TSCM Equipment - "Do be careful with this one, 007" Entry Level TSCM Equipment On a regular basis, the author gets questions about what kind of simple-to-use bug sweep equipment that can be provided which a non-technical person or private investigator can use for quick, superficial bug sweeps. When at all possible a security professional or private investigator should not attempt to perform anything except a superficial bug sweep themselves, but should bring in an outside TSCM specialist such as those listed at: http://www.tscm.com/goldlist.html. These specialists have both the technical background, extensive technical equipment and tend to be hundreds of times more effective then any private investigator, law enforcement officer, or bodyguard with even very sophisticated bug detection equipment. A private investigator or protective specialist is not a medical doctor, and yet many of them are skilled in advance first aid and have a basic first responder kit. Most are not professional photographers and yet they use cameras in their line of work... same thing with TSCM equipment. That said; in many cases, it simply isn't practical to bring in an outside TSCM specialist. Very often, the client wants the bug sweep done "now", and does not want to wait around while the PI sets up an appointment with a sweeper. In some cases, the client just does not understand that real bug sweeps cost thousands of dollars, not hundreds. In other cases, the threat just is not high enough to warrant bringing in an outside TSCM specialist for several days (yes, real sweeps take days, not hours). The PI or security professional must tactfully drive home that he can only provide the client with a cursory sweep and that is only a stopgap measure until the "real nerds" can get there. If you are indeed stuck performing limited scope bug sweep services for the client just make sure that they understand in advance that for their limited budget they get limited time and capabilities for the sweep. Explain to them that all you can offer them is a "quick check" for less then it will cost for a full sweep. Let them know that the only way they can get "real TSCM" is to cough up a few extra grand so you can bring in an outside TSCM firm (with several hundred, if not thousand of pounds of equipment). Important Hint: If you are a PI, you will actually make a lot MORE money by bringing in an outside sweep specialist. Also, consider the massive risk of you having performed a bug sweep for a client and not finding a bug that was actually thereä On the other hand, what about a bug that is more sophisticated then the $499 magic box you found on E-bay? Will you be able to explain in court and to a jury how you were providing sweep services, but had neither legitimate equipment nor formal training to offer such services? 1) Broad-Band Diode Detector System The first and perhaps the most useful basic instrument for the PI to start with is the humble "Broad-Band Diode Detector". This instrument sucks in a wide chunk of RF spectrum applies it to a sensitive diode, then amplifies and displays the relative voltage variations. The only problem is that due to the WIDTH of the spectrum it is sucking in it generally much less sensitive then a tuned system. This becomes a bit of a compromise; on the one hand, you can very quickly sniff around a room (for minimal cost), but you have to be right on top of the bug to actually detect it. The person using the detector has to move the antenna and probes around, and use it much the same way you would a small three-inch wide paintbrush. When training someone to use this kind of instrument the instructor will sometimes give the student a three inch wide paint brush, a bucket of paint, and a sheet of wood to practice on. The antenna and/or probes must be use in horizontal, vertical, and diagonal positions, and remember that a slow moving technique is critical (just like when painting). A good example of this kind of equipment is the CPM-700, 2060, or 2044. Typically a "Broad-Band Diode Detector" system, plus amplified antenna, infrared, magnetic probes, cases and other accessories appropriate for sweep work will cost between $2500 and $3000. The "Broad-Band Diode Detector" systems are so important (and inexpensive) that each sweep detail (and anyone even remotely considering doing sweeps) should have at least one complete system for each person on the team. 2) Tuned Receiver System The second helpful piece of equipment is similar to the "Broad-Band Diode Detector", but a series of filters are used to "sharpen up" or isolate the signal, and can be tuned to a very narrow splinter of the spectrum being examined. This radically increases the sensitivity of the instrument hundreds, and in some cases thousands of times over that of a simple Broad-Band Diode Detector system. Some variations of this kind of product "fold" or compress the spectrum, while others meticulously pick out signals one at a time. There are units available that are little more then a fancy computer controlled scanners, other units that are purpose built for TSCM functions, an others still, which are highly sophisticated laboratory grade instruments. A good example of this kind of equipment would be the OSCOR, Eagle, and Scanlock TSCM systems. These systems are best used by locating them in a fixed position such as a clients desk, conference table, or other area where confidential discussion take place. The system is then allowed to run in an automatic mode for a certain amount of time, after which it is moved either to a different location in the room, or to an entirely new area to be checked. In the case of an OSCOR the area to be checked is divided into something between ten-by-ten or twelve-by-twelve grids with the instrument (in this case an OSCOR) being placed in the center of each grid and allowed to run for a period of time to complete multiple scans or the spectrum. The instrument is then moved to the next grid, and the process repeated. Since most executive office are only 250-300 square feet two or three placements can result in a fairy decent evaluation. Such a systems requires little or no technical background, and virtually no expertise in TSCM. Of course, they by no means replace modern laboratory grade diagnostic instruments, but they do provide a happy medium between a simple "Broad-Band Diode Detector" and high-end lab gear. Typically an entry level "Tuned Receiver System " system, plus amplified antenna, infrared, magnetic probes, cases and other accessories will cost between $15,000 and $25,0000. Of course, systems costing 10 times more are available, but they are only practical and cost effective for full time sweep teams. On the other en of the spectrum watch out for tuned systems costing less then $10,000 as they are typically nothing more then consumer grade radio scanners with a cobbled together computer interface, or some gadget based on a 25 year old product that someone is trying to milk for a revenue stream. However, do not use just a "Tuned Receiver System " system alone, but supplement it with a "Broad-Band Diode Detector" that you use to sweep the walls, floors, ceiling, and furniture while the larger system (such as an OSCOR) is running in an automatic mode. 3) Non-Linear Junction Detector The NLJD is a handy basic tool, but it requires a very slow moving technique and is very time consuming to use. It does not require a high level of either training, or technical expertise to use; and the entire system can be carried in something the size of a small briefcase. An NLJD is typically run around the room an a completely passive mode much the same way as the "Broad-Band Diode Detector" system are used so that every square inch of the room is "sniffed" while the other instruments are being used (a NLJD can not be used in an active mode when other TSCM instruments are in use). After the bulk of the sweep is completed, and the other instruments are off line the NLJD can be place in "Active Mode" and used to scan for eavesdropping devices not detected using previous equipment. A good example of this kind of equipment is the ORION or NJE-4000. Typically, an entry level "Non-Linear Junction Detector" system with accessories will cost between $15,000 and $20,0000. Stay away from the older designs with the larger shoulder carried controllers as they are virtually deaf, an extraordinary difficult to use. Hint: if it doesn't have digital signal processing then it is based on an obsolete design. A typical starter kit for an in-house TSCM function, or PI who periodically gets called on for sweeps would include a CPM-700, OSCOR, ORION NLJD and a small amount of hand tools and accessories. Such a kit should be small enough to permit a normal adult to carry all of it into a client site in one trip or take all of in on a plane as carry-on baggage. Equipment above these three basic types is strictly within the realm of professional TSCM specialists. There is no reason for a PI, EP specialist, or security officer to try to obtain or use a TDR, spectrum analyzer, impedance analyzer, X-ray, Thermal imaging, and so on as doing so will rapidly get them in way over their head. In all of this, do not forget the basic tools you will need for the physical inspection, such as flashlights, ladders, coveralls, and so on. If you do decide to build up a modest amount of equipment, don't get the bright idea that you can buy five thousand dollars in equipment and then parlay it into a daily fee of ten grand (many neophytes have made this mistake, and have learned an rather expensive and painful lesson). In the words of "Q", the patron saint of the business, "Do be careful with this one, 007". ... and now a word from our sponsors... If you need any kind of counter-measure gear, services, consulting, or advice then give us a call... We can meet or beat anybody else prices (in writing, from a legitimate dealer). We can also provide preferred product availability (so you don't have to wait a month for your gear). If your considering buying any kind of bug sweeping gear call us first... you may save a fortune. We will always give you straight reviews of equipment, and if something is a dog, we will let you know it... if something "has warts" we will always let you know the straight scoop. Call us for your requirements, and you will always get the unvarnished truth from people who have "been there, done that". -jma -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3378 From: Brian McDaniel Date: Wed Jul 18, 2001 11:48am Subject: Re: Toll Fraud Expert needed Ah, our specialty. We have worked on hundreds of similar cases, from security analysis of system configurations to forensic analysis and litigation support. Phone (AMA) billing records must be requested (usually court ordered) from the LEC and LDC(s) involved. System configuration information of the key system must be pulled and reviewed for insecure programming. Looping or third party billing sound likely at this point, without any further supporting information. We'd love to help. Brian McDaniel General Manager TeleDesign Security 800-547-1771 "D. Douglas Rehman" wrote: > I received a call from an attorney in Georgia who needs an expert in > toll fraud. A small business with a Panasonic KXT1232 (I could have > written the model down wrong) telephone system received a long distance > bill for approximately $90,000. The calls were made from pay phones in > NY and NJ and handled via an international operator. According to a > telephone technician, the calls were not going through the Panasonic > telephone system (supposedly he blocked all toll calls and the long > distance calls continued). The business has refused to pay the bill and > is being sued by the long distance carrier. The business has filed an > action before the FCC to force the long distance carrier to cease > collection efforts. > > I do not have any further information on the case. I am merely doing > this as a courtesy to the attorney. > > The attorney is looking for someone who is an EXPERT (not just familiar > with toll fraud) who can explain in an affidavit exactly how the toll > fraud could have been/was perpetrated. The EXPERT will need to be able > to explain this in great detail, not just I think... > > Best Regards, > > Doug Rehman > Rehman Technology Services, Inc. > Specializing in Computer Forensics and Technology Related Investigations > License A-9800119 Mount Dora, Florida (Orlando Area) (352)357-0500 > http://www.surveil.com > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ This email is intended to be received by the named individual(s) exclusively. Information contained in this message may be privileged, confidential and protected from disclosure. If you have either received this email in error or are not the intended recipient, you must not replicate, divulge or disseminate any of the information contained herein and must notify us immediately by replying to this message and deleting this message and all of its attachments (if any) from your computer. Thank you. TeleDesign Management, Inc. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [Non-text portions of this message have been removed] 3379 From: Date: Wed Jul 18, 2001 3:47pm Subject: Surveillance Privacy Concerns Digital frisking in Tampa must go Using facial recognition software is a slippery slopePolice in Tampa are using sophisticated new surveillance cameras to spot trouble. NBC's Pete Williams reports. OPINION By Richard M. Smith PRIVACY FOUNDATION July 16 ≠ I have never participated in a police line-up, but my next trip to Tampa, Fla., will change all that. The police department there made a big splash recently when it installed a new high-tech line-up system in Ybor City, the entertainment district of Tampa. This system uses a network of 36 video cameras installed on the streets of Ybor City to help police spot the bad guys and arrest them. THE SYSTEM is called Smart CCTV, a product of a company called Visionics Corp. What makes these cameras "smart" is that they use Visionics's FaceIT software to match snapshots of people's faces recorded by the cameras with a computerized database of 30,000 digital mug shots of wanted suspects and fugitives. On a busy weekend, more than 150,00 visitors can walk through Ybor City. The Tampa police are betting that with this many people in one place, there's a good chance to grab some fugitives. I'm guessing also that police are hoping that the system will scare away the criminal element from Ybor City - if the system works as advertised. I've got several problems with using facial recognition software this way. And so does the Tampa city council, which is reportedly reconsidering the Smart CCTV project after a barrage of criticism. Among the observers was the Law Enforcement Alliance of America, which termed the Tampa deployment "a violation of every American's 4th amendment right to privacy." Before addressing the ethical and societal issues, however, let's take a look at how the technology actually works. 'Big brother' cameras hit Tampa The Smart CCTV (an acronym for closed circuit television) video cameras are constantly taking snapshots of people as they walk around Ybor City. For what it's worth, signs are posted telling people that they are under video surveillance. Each snapshot is then compared with the 30,000 photos in the mug-shot database. The FaceIT software does its magic by analyzing 80 facial features, using the eyes used as anchor points. ïHome ïResources ïLegal Database ïWorkplace Surveillance If there is no match between the snapshot and any photos in the database, then the snapshot is discarded. However, if there is a close match between a snapshot and one of the mug shots, a police operator monitoring the system is shown the two photos. If the police officer identifies the same person in both photos, he or she dispatches a team of officers to question the suspect. The police aren't supposed to arrest a suspect simply because the FaceIT software shows a match. The police can only approach a suspect and ask them to identify themselves. If the person matches the name in the mug-shot database, then an arrest can be made. Who are the Tampa police putting in their mug-shot database? Here's the list: Suspects with outstanding warrants for serious crimes such as murders, sexual attacks, armed robbery, etc. Sexual predators under house arrest. Suspects on the FBI's ten most-wanted list. Runaway teenagers. The debate over surveillance cameras July 3, 2001 ≠ Det. Bill Todd of the Tampa Police Department and Howard Simon of the ACLU of Florida talk with NBC's Matt Lauer about the controversy surrounding a new surveillance camera system in Florida. The Tampa area typically has about 100,000 outstanding felon warrants, but the database is limited to 30,000 suspects. Playing the odds of catching criminals, the Smart CCTV system is only turned on if there is a large crowd at Ybor City. Tampa Police used a similar face matching system, from a company called Graphco Technologies, at this year's Super Bowl. It fingered 19 suspects (none of them on the football field) but no arrests where made because all the suspects were lost in the crowds, according to press reports. Advertisement My number one concern with the Ybor City system is safety. A crowded city street isn't the best place to be rounding up criminals, particularly those prone to violence. If an actual crime takes place in Ybor City, then the police must act in spite of the large crowds, as they would in any city. The Smart CCTV system may lead the Tampa police to make more arrests, but it could be at the expense of innocent bystanders who might get hurt if an arrest doesn't go smoothly. Visionics boasts that its technology is used in CCTV operations at Iceland's Keflavik Airport; the Newham Borough of London and Birmingham City Center; as well as in mug shot and booking systems throughout the U.S.; and in casinos. There are literally thousands of other video camera systems installed in United States that could be upgraded to Smart CCTV systems. Ybor City is reportedly the first installation of a Smart CCTV system by a police department in the U.S. (Tampa got a free one-year trial offer from Visionics.) Virginia Beach, Virginia is now considering upgrading their existing ten-camera system to a Smart CCTV system. At a cost of tens of thousands of dollars per upgrade, there is a very lucrative market for Smart CCTV systems if this technology catches on. From a privacy perspective, Ybor City is a slippery slope. A key question is who gets to decide what photos are put in the mug-shot database? In the current Ybor system, you have to be a nasty felon (or a runaway) to be in the database. But with computer systems and software upgrades relatively inexpensive, the photo database could easily be expanded. So, who's next? Pickpockets, shoplifters, and con artists are likely candidates. After that, is it folks who have overdue parking tickets or who have failed to come to court for a speeding ticket? Then comes the really provocative use: networking. Once enough Smart CCTV systems are up and running, police departments will want to connect them and leverage the power of databases. A mug-shot photo exchange network could easily be built with today's Internet, using peer-to-peer file sharing technology like Napster. That way, no matter where the bad guys go to, they could still be caught. A robbery suspect from New York City could be spotted anywhere a Smart CCTV network was in place. Net Privacy ï 'Big Brother' cameras hit Tampaï Invasion of privacyï Senators aim to boost Net privacyï Defense Web sites track visitorsï Uncle Sam: Where's the e-security?ï E-mail encryption use low despite potential for snooping Then, police departments will push for the right to do location tracking of suspects, somewhat like an electronic ankle bracelet. Rather than having the CCTV system point out people that can be arrested, the network can be used to tail a suspect and provide reports on their whereabouts. What's interesting about this suspect tracking capability is that it would be a software "upgrade" that requires no new equipment. Clearly, we need some strict rules about the use of Smart CCTV systems by law enforcement. In Ybor City, these rules were created by the Tampa Police Department. But decisions like these are too important for just the police to work out. Better forums are the Congress and state legislatures. Then there can be full public debate over the pros and cons of these systems. In the meantime, the Ybor City system should be turned off and a moratorium placed on future deployments of Smart CCTV systems by police departments. Copyright 2001 Privacy Foundation What do you think about Smart CCTV systems? Post your thoughts on our discussion board. Latest reports from the Privacy Foundation HAVE A GREAT DAY !!! ---------- http://64.4.16.250:80/cgi-bin/linkrd?_lang=EN&lah=d317bc9e423b8abba2e0b0b815cff3ba&lat=995487947&hm___action=http%3a%2f%2fwww%2emsnbc%2ecom%2fmodules%2fexports%2fct_infobeat%2easp%3f%2fnews%2f601262%2easp [Non-text portions of this message have been removed] 3380 From: James M. Atkinson, Comm-Eng Date: Thu Jul 19, 2001 10:03am Subject: THE COMPASSIONATE LAWYER THE COMPASSIONATE LAWYER One afternoon, a wealthy lawyer was riding in the back of his limousine when he saw two men eating grass by the road side. He ordered his driver to stop and he got out to investigate. "Why are you eating grass?" he asked one man. "We don't have any money for food," the poor man replied. "Oh, come along with me then," instructed the lawyer. "But, sir, I have a wife and two children!" "Bring them along!" replied the lawyer. He turned to the other man and said, "Come with us." "But sir, I also have a wife and six children as well!" the second man answered. "Bring them as well!" answered the lawyer as he headed for his limo. They all climbed into the car, which was no easy task, even for a car as large as the limo. Once underway, one of the poor fellows says, "Sir, you are too kind. Thank you for taking all of us with you." The lawyer replied, "No problem, the grass at my home is almost a foot tall." -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3381 From: James M. Atkinson, Comm-Eng Date: Thu Jul 19, 2001 10:09am Subject: FW: Dear Abby Subject: FW: Dear Abby My husband is a lying cheat. He tells me he loves me, but he has cheated our entire marriage. He is a good provider and has many friends and supporters. They all know he is a lying cheat, but they just avoid the issue. He is a hard worker but many of his coworkers are leery of him. Every time he gets caught, he denies it all. Then he admits that he was wrong and begs me to forgive him. This has been going on for so long, everyone in town knows he is a cheat. I don't know what to do. Signed, Frustrated H. ==================== Dear Frustrated, You should dump him. Now that you are a New York Senator, you don't need him anymore. -Abby -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3382 From: James M. Atkinson, Comm-Eng Date: Thu Jul 19, 2001 11:40am Subject: James Duncan; Teacher And NSA Cryptanalyst passed Away July 11 James Duncan; Teacher And NSA Cryptanalyst http://www.washingtonpost.com/wp-dyn/articles/A50245-2001Jul12.html Thursday, July 12, 2001; Page B07 James Thomas Duncan, 75, who worked from the early 1950s to the early 1970s as a National Security Agency cryptanalyst and then taught in the Montgomery County school system from 1973 to 1992, died July 11 at his home in Rockville. He had diabetes. He was the father of Montgomery County Executive Douglas M. Duncan. In Montgomery, he taught English-as-a-second-language at Hoover Middle School, the Mark Twain School, the old Northwood High School and Albert Einstein High School. In the 1990s, he also was a volunteer tutor and received the Nancy Dworkin Award for outstanding volunteer service from the county's Commission on Children and Youth. He was born in Paris and grew up in the Washington area. He was a graduate of St. Johns College High School in the District and Georgetown University's foreign service school. He served in the Marine Corps in the Pacific during World War II. His memberships included St. Mary's Catholic Church in Rockville and the Knights of Columbus in Derwood. Survivors include his wife of 53 years, Eleanor Hughes "Ellie" Duncan of Rockville; six sons, the county executive, of Rockville, Dwight G. Duncan of Boston, Bruce X. Duncan of Hagerstown, James T. Duncan Jr. of England, Glenn P. Duncan of Clarksville and Brian T. Duncan of Glendale, Calif.; seven daughters, Marie Therese Frank of Boston, Lee Anne Gerrick of Rockville, Mary Joan Raff of Darnestown, Nellie Lide of Rockville, Bernadette Zabel of Ellicott City, Mary Anne Harris of England and Monica Martinson of Evanston, Ill.; a brother, Donald Duncan of Alexandria; and 38 grandchildren. C 2001 The Washington Post Company -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3383 From: Dawn Star Date: Thu Jul 19, 2001 0:32pm Subject: Surveillance Concerns Subject: Surveillance Privacy Concerns Digital frisking in Tampa must go Using facial recognition software is a slippery slopePolice in Tampa are using sophisticated new surveillance cameras to spot trouble. NBC's Pete Williams reports. Last month I went in front of the Palm Springs, Ca, City Council and tried to talk them out of this same system. The money was coming from the Federal Government to put them in (oh! what a surprise) , I even submitted a seven page report. They voted for it 3 to 2, and they are going to install them soon. Of coarse they are only going to be hooked to video tape machines, no mention of facial recognition until I personally told them about the super bowl experiment. The Supreme Court in Kolender v. Lawson 461 US 352 found that police officers must have reasonable cause that a crime has been committed before they can demand personal identification. Does a computer bio-hit digital mug shot match arrive at the status of a crime. I think not, a machine alone should not be the basis of a reasonable cause detainment. If so big brother has arrived and our 4th and 5th amendment rights are history. Roger Tolces 3384 From: Date: Thu Jul 19, 2001 5:51am Subject: looking for equipment Am looking for TEK492 andCushman CE-15. Reply by private e-mail. Thanks. John Fulford WA4VPY [Non-text portions of this message have been removed] 3385 From: Dawn Star Date: Fri Jul 20, 2001 0:40am Subject: Great Thinkers Great Quotes from Great Skeptics All quotes except the last three are from The Experts Speak: The Definitive Compendium of Authoritative Misinformation by Christopher Cerf and Victor Navasky (Pantheon Books, 1984), as cited in The New American , March 27, 1989. -------------------------------------------------------------------------------- What can be more palpably absurd than the prospect held out of locomotives traveling twice as fast as stagecoaches? - The Quarterly Review, England (March 1825) The abolishment of pain in surgery is a chimera. It is absurd to go on seeking it. . . . Knife and pain are two words in surgery that must forever be associated in the consciousness of the patient. - Dr. Alfred Velpeau (1839) French surgeon Men might as well project a voyage to the Moon as attempt to employ steam navigation against the stormy North Atlantic Ocean. - Dr. Dionysus Lardner (1838) Professor of Natural Philosophy and Astronomy, University College, London The foolish idea of shooting at the moon is an example of the absurd length to which vicious specialization will carry scientists working in thought-tight compartments. - A.W. Bickerton (1926) Professor of Physics and Chemistry, Canterbury College, New Zealand [W]hen the Paris Exhibition closes electric light will close with it and no more be heard of. - Erasmus Wilson (1878) Professor at Oxford University Well informed people know it is impossible to transmit the voice over wires and that were it possible to do so, the thing would be of no practical value. - Editorial in the Boston Post (1865) That the automobile has practically reached the limit of its development is suggested by the fact that during the past year no improvements of a radical nature have been introduced. - Scientific American, Jan. 2, 1909 Heavier-than-air flying machines are impossible. - Lord Kelvin, ca. 1895, British mathematician and physicist Radio has no future - Lord Kelvin, ca. 1897. While theoretically and technically television may be feasible, commercially and financially I consider it an impossibility, a development of which we need waste little time dreaming. - Lee DeForest, 1926 (American radio pioneer) There is not the slightest indication that [nuclear energy] will ever be obtainable. It would mean that the atom would have to be shattered at will. - Albert Einstein, 1932. Where a calculator on the ENIAC is equipped with 19,000 vacuum tubes and weighs 30 tons, computers in the future may have only 1,000 vacuum tubes and perhaps only weigh 1.5 tons. - Popular Mechanics, March 1949. (Try the laptop version!) There is no need for any individual to have a computer in their home. - Ken Olson, 1977, President, Digital Equipment Corp. I think there is a world market for maybe five computers. - Thomas Watson, chairman of IBM, 1943. I have traveled the length and breadth of this country and talked with the best people, and I can assure you that data processing is a fad that won't last out the year. - The editor in charge of business books for Prentice Hall, 1957. But what ... is it good for? - Engineer at the Advanced Computing Systems Division of IBM, 1968, commenting on the microchip. ---------------------------------------------------------------------------- ---- 3386 From: Date: Thu Jul 19, 2001 6:38pm Subject: Looking for equipment I am looking for TEK 492 and also Cushman CE-15. Both are spectrum analyzers. Reply private e-mail. 73's thanks John Fulford--WA4VPY (if u r a ham) [Non-text portions of this message have been removed] 3387 From: Date: Fri Jul 20, 2001 3:30pm Subject: EQUIPMENT Am looking for TEK92 and Cushman CE-15. Both are spectrum analyzers. Please reply private e-mail. Thanks.. John Fulford--WA4VPY (if u r a ham) 3388 From: James M. Atkinson, Comm-Eng Date: Sat Jul 21, 2001 9:31am Subject: Who's Watching You in Your Hotel Room? Who's Watching You in Your Hotel Room? Wes Vernon Saturday, July 21, 2001 http://www.newsmax.com/archives/articles/2001/7/20/171557.shtml WASHINGTON - Next time you check into a hotel, you may want to consider asking if there are any hidden cameras in your assigned room. There could be cameras hidden in mirrors, television sets, lamps and even the radio alarm clock on your nightstand. "What? Hidden cameras in my hotel room? That's like placing a hidden camera in my own home without my knowledge or consent. Once I'm in my hotel room, I'm in my home away from home." That's your likely reaction. However, Fox News reports that at least two hotels have bought that kind of security equipment. More than that may be involved. In an interview with NewsMax.com, Arielle Jamil, director of public affairs for Counter Spy Shops, specialty stores for high-tech spy equipment and devices, did not dispute us when we asked if two hotel chains had bought the spy gear. Two hotel chains? Which ones? "We don't disclose the names of our customers," replied Jamil, director of public affairs for the Counter Spy Shop chains. So why on earth would a hotel want to jeopardize customer relations by risking the appearance of spying on its own guests? "They buy it for security reasons." Yes, but that same equipment that can be used for security reasons can just as easily be used to spy on the hotel guest. "Oh, but they use it only to look into the room at a time of the day when the guest is not there." You mean in midday when the maids are cleaning? "Maids, anyone else from housekeeping, engineering if there's a mechanical problem that needs to be fixed." Hotels don't want to be sued by guests who complain that something was stolen while they were out. Okay, but how does the guest know that some voyeur on the hotel staff won't use the equipment to peer in at a guest? And how does the hotel always know when the customer is out for the day? Some hotel guests keep odd hours. "Well, you know, we just sell the equipment. We can't be responsible for whatever the buyers choose to do with it," Jamil responded. "It's the same thing with people who sell butcher knives. They don't know if the customer is going to misuse it." True, there were those who wondered if the O.J. Simpson case would spark a movement for knife control. But there is less temptation for misuse of a butcher knife or a gun. That is why the gun-control movement in this country has been on the defensive of late. Most folks don't want to kill anybody. Putting spy equipment in the hands of a bored night clerk raises all kinds of temptations. And another distinction: Killing people, of course, is illegal. Spying on people through legally purchased spy or "security" equipment is legal. That's right. There's no law preventing it, especially if it's done in the name of "security." The Counter Spy Shops are owned by the CCS International Inc., headquartered in New Rochelle, N.Y. Shops are in such far-flung locations as New York City, Washington, Beverly Hills, Miami, Hong Kong, London and South Korea. Its Web site advertises a wide variety of spy equipment. One ad says, "Who would suspect a video system to be concealed within the functioning alarm clock radio? CCS presents the most recent advancement in miniature surveillance technology . Due to its unique disguise, the camera can shoot pictures discretely even from close up." Near the picture of a lamp, there is this: "This hi-tech portable system allows you to monitor in real time, your office, home, store, property, store, garage, or business while you're away." Or hotel room? CCS says it has been in business since 1959. This is an industry that apparently has been growing. CCS has competition for this market. Aimdiscount.com boasts "the best quality available in Wireless Hidden Camera Systems" that are "so successful because they appear to be everyday items." Among its advertised "everyday items" containing cameras are an alarm clock radio, a smoke alarm, a wireless wall clock, a picture frame, a lamp, an artificial plant basket, a night light, and even a "wireless tissue box." Jamil of CCS told NewsMax that the company has many different kinds of customers. Government agencies? "Lots," she replied. That is already universally suspected. But when you question your privacy in, of all places, your own hotel room, you might think of William Raspberry's recent column in the Washington Post saying that as far as privacy is concerned, the horse is out of the barn. NewsMax.com, however, will not throw up its hands and give up this fight. Americans are entitled to the privacy they have come to expect. If you lose all privacy, you have crossed the line from a republic to a police state. © NewsMax.com -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3389 From: Charles P Date: Sat Jul 21, 2001 1:33pm Subject: Foam for equipment cases I would like to get some new foam inserts for some of my halliburton cases but the prices from the usual dealers always seem quite high ($99 from Jensen for instance- that's for one case). Does anyone know of a good source for that type of foam? thanks Charles charles@t... Global Communications Tarrytown, NY www.telephonesecurity.com 3390 From: James M. Atkinson, Comm-Eng Date: Sat Jul 21, 2001 1:41pm Subject: Re: Foam for equipment cases At 2:33 PM -0400 7/21/01, Charles P wrote: >I would like to get some new foam inserts for some of my halliburton cases >but the prices from the usual dealers always seem quite high ($99 from >Jensen for instance- that's for one case). > >Does anyone know of a good source for that type of foam? > >thanks >Charles The foam you use will depend on how heavy/bulky the item in the case is, and the amount of shock it can handle. If you need "just regular foam" contact B&H Photo for the lowest price, but if you want something "better" look toward anti-static foam, or some of the higher density foam sheets. If you have something that has some really bizarre shapes (or is bulky) then consider a liquid foam that you can form around the item, and then trim away the excess once it is solid. -jma -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3391 From: Aimee Farr Date: Sat Jul 21, 2001 2:07pm Subject: "willful" wiretapping in Maryland I would say "duh," but somebody actually dissented. ~Aimee -------- Opinion at: http://www.courts.state.md.us/opinions/coa/2001/125a00.pdf "We are all familiar with the legend of Lady Godiva who, in response to a commitment by her husband, Leofric, Earl of Mercia, to repeal onerous taxes levied on the people of Coventry if she dared to ride naked through the town, supposedly did so. Part of that legend, added some 600 years after the event, was that one person in the town, a tailor named Tom, had the temerity to glance upon the noblewoman as she proceeded on her mission and was immediately struck either blind or dead. This probably-mythical tailor became known to history as Peeping Tom." "This case involves another peeping Tom ñ petitioner Thomas Deibler. Deibler gazed not upon a woman on horseback, but upon a woman taking a shower...." [...] -------- http://www.sunspot.net/news/printedition/bal-ar.deibler18jul18.story?coll=ba l-pe-arundel Court boosts taping laws Appeals judges say ignorance no defense in wiretapping cases; 'Willfully' is key word; Decision stems from surveillance of Edgewater home ---------------------------------------------------------------------------- ---- By Andrea F. Siegel Sun Staff Originally published July 18, 2001 In a decision that will benefit prosecutors, the state's highest court ruled yesterday that a person need not know it is illegal to bug conversations to be convicted of wiretapping. The 5-2 Court of Appeals opinion sets aside what had been the prevailing interpretation, in which the lower appellate court said a person who violates the state wiretapping law must know that what he did was illegal. The standard in yesterday's ruling says a defendant can be convicted if the wiretap was done on purpose, not inadvertently. Prosecutors, who have gnashed their teeth over the past interpretation, hailed the decision as one that will ease their way in wiretap prosecutions and enhance privacy protections. "It applies to any type of electronic recording," said Gary E. Bair, chief of criminal appeals for the Maryland attorney general's office. Yesterday's ruling hinged on the top court's interpretation of the word "willfully," which the top court said referred to a tap not done by court order but "done intentionally - purposely." "They have given greater privacy protection to Maryland citizens. They have held that the law is violated as long as the person intentionally as opposed to accidentally intercepts the communication," Bair said. He said that includes classic bugging, in which nobody knows the conversation is being preserved, and Linda Tripp-style wiretapping, in which one person knows the conversation is being recorded while others don't. Lawyers said they were unsure whether the new reading of the law would extend to Tripp-like wiretaps, and one of Tripp's lawyers said that if it does, it might have helped prosecutors. Tripp taped her 1997 telephone conversations with Monica Lewinsky, in which the White House intern discussed her sexual escapades with President Bill Clinton, unaware Tripp was recording her. Wiretapping charges were dropped last year after a Howard County judge ruled that Tripp's federal immunity tainted prosecution evidence and that prosecutors had no witness to testify that Tripp broke the law. "It may very well have affected the outcome of the Linda Tripp case if it applied," said Joseph Murtha, a Tripp lawyer. He said the change could make it easier for prosecutors to introduce recordings as evidence in other types of cases and, by erasing a burden, could ease prosecutors' reluctance to bring wiretap charges . The case was the highest court's first opportunity to weigh in on the wiretap issue since the Tripp case publicized Maryland wiretap law. The case arose from last year's conviction in Anne Arundel County of Thomas Paul Deibler, a Laurel tile installer who admitted that on June 19, 1999, he hid a video camera in a family friend's Edgewater bathroom so that he could tape a woman showering there. Though a silent video would not have been illegal at that time - a law criminalizing secret videos went into effect in October 1999 - Deibler captured the woman and her father talking about the discovery of the camera eye, and prosecutors pursued wiretap charges. Deibler said what he did was wrong but maintained that it was not against the law because he did not know that it was illegal and, as a voyeur, he did not intend to record sound. But he had plugged a separate audio wire into the video recorder. "In similar cases in the future, the state will not have the burden to prove that the defendant was actually aware of the law prior to installing a listening device," said Kristin Riggin, spokeswoman for the Anne Arundel County state's attorney's office. [...] From: James M. Atkinson Date: Fri Jul 19, 2002 8:07pm Subject: Re: Question Zack, Such equipment can be easily detected with either a ultrasonic or Doppler stethoscope. Viewing the person though a thermal camera also works well, but it's best to let them relax so that the circulation on the outside layer of their skin and clothes start to cool down. Also, cranking up the AC so the room is cool, and using minimal upholstery on the furnishings also helps. The eavesdropping device or recorder will show up as a hot spot. A hydrogen detector built into the furniture will detect certain battery emissions (if your lucky). Build some really sensitive 44 kHz ultrasonic transducers into the furnishings and run though a band pass filter. Also, use a couple of magnetically shielded loops built into the furniture the visitor will be sitting in., and shield the backside with mu-metal sheets. Basic TSCM 101. -jma At 9:59 AM -0400 7/19/02, zack wrote: >Gentleman and ladies: > >Having absorbed vast amounts of very useful information on this list, >technical and informative suggestions, I have a simple question. > >How can one detect an individual who has a $69 Radio Shack ( or similar >) voice activated recorder device upon his person ?? I have seen >complaints which seem to mirror my exact words. EX: Meeting with various >group members, only later to see in print almost my exact words. > >We talk about $1000 to $5000 for various equipment to track cell phones, >etc, etc, TSCM and all that. But it seems the most basic tools are >un-detectable ??? > >If I were to meet you with a voice activated recorder, what could you do >??? Could you tell ?? What would you do to insure the conservation was >secure ?? -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5824 From: James M. Atkinson Date: Fri Jul 19, 2002 8:09pm Subject: Re: Question about ISA ETA-4 Telephone Analyzer At 2:34 PM +0000 7/19/02, doc6363 wrote: >I would like to know if any members have a copy of a ISA ETA-4 >telephone analyzer or equivalent instruction manual that I could >purchase or obtain, a photo copy would be ok. >Please let me know if you can help. > >Thankyou: Both Sam and Rob (from ISA) are on this list... they can help you out. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf." - George Orwell -------------------------------------------------------------------------------------------------- 5825 From: Mitch D Date: Fri Jul 19, 2002 2:10pm Subject: re: question Physical Search,and curtailing verbal conveyance of sensitive information to any one unless they submit to a physical personal search,especially when the conversation can have non desireable repercussions........... __________________________________________________ Do You Yahoo!? Yahoo! Autos - Get free new car price quotes http://autos.yahoo.com 5826 From: Matt Paulsen Date: Sat Jul 20, 2002 0:23pm Subject: Poison umbrellas, lethal lipstick: Spy museum opens http://www.cnn.com/2002/TECH/ptech/07/19/spy.museum.opens/index.html July 19, 2002 Posted: 3:08 PM EDT (1908 GMT) From David Ensor CNN WASHINGTON (CNN) -- A bit more light is being shed on the shadowy world of the secret agent these days. The International Spy Museum opened Friday in Washington showcasing some of the tricks of the spy trade. People who remember the old TV spy parody "Get Smart" might think of Maxwell Smart answering his ringing shoe when they see a real-life shoe with an implanted listening device on display. It was used by Czech intelligence agents to bug American diplomats. Visitors can also see a gun disguised as a lipstick -- used by Stalin's secret police in the Soviet Union -- called the kiss of death. "At close range, right next to the person, behind the head it would be devastatingly accurate," says historian Keith Melton, who collected many of the items in the museum. "People know two spies in history," says museum president Dennis Barrie. "One is James Bond, who wasn't a spy, who was fiction. The other Barrie's museum helps separate fact from fiction through interactive exhibits and displays of actual espionage tools. In one exhibit for instance, visitors have to search a photograph for four "spy signals" that alert agents to a message or dead drop, Barrie explains. A dead drop is a prearranged location used for secret exchanges of packages, messages and payments. Another Soviet spy artifact: an umbrella that could deliver a fatal shot of poison. It was used in an infamous case, when Bulgarian defector and writer Georgi Markov was stabbed with a poisoned umbrella in London in 1978 and died four days later. Police believe the assassin was a KGB agent. "The Soviets were the best at spying," says Barrie. "I mean, we could talk about the CIA and MI-6, but nobody did it better." The tour also includes interactions with real-life spies and explore the ways agents use disguises -- to get out of hostile countries unnoticed, for example. According to its organizers, the International Spy Museum is the first public institution in the world dedicated to the history of espionage, and holds the largest collection of spying artifacts anywhere. More than 600 pieces are on exhibit. The museum, located at 800 F Street, between 8th and 9th streets, is open seven days a week from 10 a.m. to 8 p.m. through October. 5827 From: Date: Sat Jul 20, 2002 9:08am Subject: Creating a museum to honor spies can be a tricky business. from the July 19, 2002 edition - http://www.csmonitor.com/2002/0719/p01s03-ussc.html A new museum for lipstick guns, exploding trees By Dante Chinni | Special to The Christian Science Monitor WASHINGTON - Creating a museum to honor spies can be a tricky business. First off, it's difficult to create a "Hall of Fame" honoring the biggest stars because unlike, say, baseball players, the whole point of being a skillful spy is to remain unknown. There are no shoe-endorsement contracts for good secret agents. Second, espionage is a dirty and violent business. That much is apparent pretty quickly at the $40-million International Spy Museum, which opens here Friday. For every exhibit of a listening bug, there's another with a deadly device such as an exploding tree stump. "In the end, spies are really concerned with trying to gather information," says museum spokeswoman Jennifer Saxon as visitors stare at the "Bulgarian umbrella," a rain shield that fires poison pellets. "But assassinations do happen," she notes. Spies inhabit a vivid place in the American psyche, part very serious reality (Robert Hanssen, Aldrich Ames), part pop-culture myth (James Bond, Austin Powers). It's a wonder then, that no one has thought to assemble a collection of spy paraphernalia, gadgetry, and historical information before. The museum, a privately owned complex dreamed up by some of the people who created Cleveland's Rock and Roll Hall of Fame, comes during a nationwide museum building-boom. Many institutions are springing up to honor many of the people, experiences, and phenomena that have largely been ignored by curators in the past. The Smithsonian National Museum of the American Indian, for example, is set to open in 2004. And an expanded Newseum is slated for 2006. But the Spy Museum seems likely to be the biggest crowd pleaser. Even with its admission charge of $11 per head. It's not just the lucrative disguise kits in the gift shop or even the building's two restaurants that will encourage visitors to don dark glasses, turn up their collars, and rendezvous at 800 F Street, NW. It's the sheer variety of interactive exhibits. Ever wanted to have your own alias? You can choose a pre-concocted one and see if you remember enough to make it past the computerized border guard at the end. There is as yet, however, no virtual interrogation in a back room with a bright light aimed at a solitary chair if you fail. Only 5 percent of the space is devoted to the pop-culture artifacts such as 007's Aston Martin from "Goldfinger." Most of the museum opens the dossier on the real world of cloak and dagger. An exhibit called "School for Spies" features more than 200 espionage devices including a heel knife, a lipstick gun, and a "through the wall camera" able to snap photos through a pin-sized hole. Fans of "Get Smart" are sure to pause at the shoe heel transmitter, another lovable East German way to keep tabs on suspicious characters. And for sheer adolescent tittering excitement, it's hard to beat the "tiger dung" transmitter, used to mark important ground sites in Vietnam ‚Äì and presumably great fun at CIA parties. Another presentation, "The Secret History of History," shows how George Washington used invisible ink in the Revolutionary War and how pigeons were outfitted with cameras during World War I to shoot aerial photos behind enemy lines. The museum even revisits the earliest days of espionage: the Trojan Horse. There is a model of the equine traitor and its contraband of Grecian troops in the building (all that's missing is an ejector seat). But there are more mundane artifacts as well, including the actual mailbox CIA double agent Aldrich Ames marked with chalk to communicate with his Soviet handlers. Ironically, Saxon says, a Georgetown woman who lived near the box often complained about it being dirty and called the Postal Service to clean it regularly. Apparently, however, not often enough. Former FBI and CIA head William Webster, who sits on the museum's advisory board, says the museum is long overdue. While some have tried to honor the spy craft in the past ‚Äì there is, for instance, a small group of exhibits at CIA headquarters in Langley Va., ‚Äì but not many eyes have seen those efforts. "When you see everything at the Spy Museum you realize that every president has wanted ... more and more intelligence," Mr. Webster says. "And that has caused problems because you have to be careful in how you use it." If there is a shortcoming in the museum, Webster says, it is the gadgetry and stories may distract attention from the purpose of intelligence, "which is to gather information so that decisionmakers can make informed, thoughtful decisions." Not to mention that the museum, which has been in the works since 1996, faces a different world today from even a year ago. Much of the space is devoted to the "great game" that went on during the cold war between the two superpowers, and while some of the exhibits obviously have applications post 9/11 ‚Äì a good miniature camera never goes out of style ‚Äì the rules have clearly changed. In some ways, the museum almost makes one wistful for the most frigid days of the cold war when the enemies understood each other and, if nothing else, the lines between the players and spectators were better defined. "There was a time when the CIA and the KGB had a quiet understanding that they would let each other know if they were the target of a terrorist plot," Webster says. "We had back channels. There was a general understanding that all great powers suffered from terrorism. Whatever else we did not have in common, we had that one thing in common." Full HTML version of this story which may include photos, graphics, and related links 5828 From: Dave Emery Date: Sat Jul 20, 2002 9:20pm Subject: Re: Question On Fri, Jul 19, 2002 at 09:07:02PM -0400, James M. Atkinson wrote: > Zack, > > Such equipment can be easily detected with either a ultrasonic or > Doppler stethoscope. > > Viewing the person though a thermal camera also works well, but it's > best to let them relax so that the circulation on the outside layer > of their skin and clothes start to cool down. Also, cranking up the > AC so the room is cool, and using minimal upholstery on the > furnishings also helps. The eavesdropping device or recorder will > show up as a hot spot. > > A hydrogen detector built into the furniture will detect certain > battery emissions (if your lucky). > > Build some really sensitive 44 kHz ultrasonic transducers into the > furnishings and run though a band pass filter. Also, use a couple of > magnetically shielded loops built into the furniture the visitor will > be sitting in., and shield the backside with mu-metal sheets. > > Basic TSCM 101. > > -jma While I don't doubt for a moment that these techniques might work against a cassette recorder or other similar mechanical recorders with moving parts, would they really work against modern low power solid state flashcard EEROM based digital recorders ? I can't imagine that these generate much heat (true maybe a little) and no significant VLF magnetic radiation from bias circuitry (there isn't any) or motor switching power (there isn't that either). And while they no doubt emit a faint emi at harmonics and subharmonics of their digital clock frequencies (boy I remember fighting that getting networking devices to pass FCC B), I should imagine the bad guy could wrap the thing in copper tape or foil or perhaps even just tinfoil and reduce the emission level from a largely VLSI based design (as a modern mass produced product would be) to pretty far down in the mud... I guess if you knew the particular kinds of unit likely to be used against you you might be able to determine what specific internal clock frequencies it radiates and provide a tuned antenna and preamp for one of those spectral lines and hide it in the furniture, but an obvious countermeasure to that is to change the clock crystal on the recorder to something a little different... it would work just as well for most purposes with a small clock frequency error as playback error would cancel record error... -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 5829 From: pballaera Date: Sun Jul 21, 2002 10:03pm Subject: Hello All Hi everyone I was just wondering as Ben has told me a course is comming up in Tampa in feb which I plan to attend.I was wondering if any of you old pro's ever clean out your closets once in a while and if so im interested in buying any books and unwanted equiptment that you may not be using anymore as i realize how expensive all that new equiptment is wow!I was also looking at thermal cameras I was so fascinated on what there capable of doing.I can see why professionals such as yourselves should charge the fees you do,it must cost a small fortune just to update all the time.Well as some of you know I'm a Florida PI.I also do bodyguard work and just got out of Surety Bail Bonds School,I'm eager to start studing your art hopefully someday being a part of conducting Investigations in your so very special way. Best Regards, Paul 5830 From: Hawkspirit Date: Mon Jul 22, 2002 3:07pm Subject: GSM Signals The information below is from a report titled: THE PHYSIOLOGICAL AND ENVIRONMENTAL EFFECTS OF NON-IONISING ELECTROMAGNETIC RADIATION located at: http://www.sonic.net/~west/mc/hyland.htm Does anyone have any experience, or knowledge to comment on the accuracy of this information? Roger Tolces Electronic Security B-2. Why GSM Signals are Bio-active That the low intensity, pulsed microwave radiation currently used in GSM telephony can exert subtle, non-thermal influences on the alive human organism arises, in the first place, because microwaves are, after all, waves, and, as such, have properties other than solely intensity. In particular, GSM radiation has certain rather well defined frequencies, which facilitate its discernment by the living organism, and via which the organism can, in turn, be affected. This is so because the alive human organism itself supports a variety of oscillatory electrical biological activities, each characterised by a particular frequency, some of which happen to be close to those used in GSM! The particular frequencies utilised in GSM that must be anticipated to be particularly ëbio-activeí are those of the microwave carrier (900/1800 MHz) and those associated with certain pulsings that characterise the signal employed in the Time Division Multiple Access (TDMA) strategy that is used in GSM - specifically, the multi-frame repetition rate of 8.34Hz, and the 2Hz periodicity associated with the discontinuous transmission (DTX) mode of the phone ñ an energy saving mode that becomes active when the user is listening but not speaking. For there is evidence8 that adequately metabolising systems themselves support highly organised, oscillatory electrical activities at the cellular level, whose frequencies generally lie in the microwave band, in terms of which the dramatic effects of ultra-low intensity microwaves of specific frequencies on processes as fundamental as cell division and intercellular communication can be understood in a rather natural way9. It should be noted that this endogenous microwave activity is a quite general (non-equilibrium) prediction of modern, non-linear biophysics10 for living systems, under appropriate metabolic conditions. The two ELFs (at 8.34Hz and 2Hz), on the other hand, correspond to those found in the human EEG - specifically, in the ranges of the alpha and delta brain-waves, respectively. In the case of a GSM mobile phone, these two ELFs are reinforced by those of the essentially unscreenable magnetic fields associated with the current surges from the battery of the phone that are necessary in order to endow the microwave emission with the pulse characteristics required for TDMA. Peak magnetic field strengths as high as 40mT have been measured near the back of one particular model of phone11, 12, the noxiousness of which is indicated by recent experiments13, 14 employing chick embryos, which reveal an increased degree of mortality when the phone is protected by a proprietary shielding device that reduces the microwave output. With the device in place, the increased (microwave) power output necessary to maintain contact with the base-station necessitates stronger surges of current, associated with which are correspondingly stronger (and evidently more noxious) ELF magnetic fields. These ELF magnetic fields could thus pose an even greater hazard to human health than do those associated with the microwave emission, a matter that warrants further experimental investigation. In this connection, mention should be made of recent theoretical advances15 in understanding, at the quantum level, the disruptive influence that ELF fields (including pulsed ones) can have on the integrity of essential ion-protein links, resulting in an imbalance of intra and inter cellular ion concentrations; this can result in metabolism malfunction and high levels of stress that can be lethal to organisms in the early stages of development. It should be noted these ideas are also relevant to consideration of bio-negative influences of exposure to other kinds of electromagnetic fields, such the low frequency magnetic fields associated with power lines and the mains appliances that they supply, which have been the subject of controversy for a much longer time. 5831 From: Steve Uhrig Date: Mon Jul 22, 2002 8:34pm Subject: Re: GSM Signals On 22 Jul 2002 at 13:07, Hawkspirit wrote: > The information below is from a report titled: > THE PHYSIOLOGICAL AND ENVIRONMENTAL EFFECTS OF NON-IONISING > ELECTROMAGNETIC RADIATION > Does anyone have any experience, or knowledge to comment on the > accuracy of this information? > B-2. Why GSM Signals are Bio-active That the low intensity, pulsed > microwave radiation currently used in GSM telephony can exert subtle, > non-thermal influences on the alive human organism arises, in the first > place, because microwaves are, after all, waves, and, as such, have > properties other than solely intensity. Roger, if you don't have a Nut File, this would be a good beginning. Adding this one brings my email nut file to 229 in about 5 years online. Keys: implied conspiracies to cover up, excessive use of buzzwords, an overt impression of paranoia, spinning a gigantic story/conspiracy/impending end of the world out of a few innocuous facts, et al. Buzzwords are not necessarily to be avoided *if defined* or if the intended readership is certain to be familiar with each and every technical term used. Even then, the person who can communicate a concept using the fewest buzzwords is the most effective (See Spot run). None are the case in the illustration you used. People with stories like these CALL US on the phone. Why go *looking* for stuff like this? It's hard enough to avoid it when it's pushed on you. Steve (Just 'cuz you're paranoid doesn't mean they aren't really after you) ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5832 From: Mitch D Date: Mon Jul 22, 2002 5:51pm Subject: tektroniks spec a's Theres a boatload of tektronics 492spec a's FS on e bay,was just curious if anyone ever used,or owned 1,if so what did you do to add a audio demodulator if you did own one? One of the local rc airplane clubs near me was interested in getting something with more bang than a scanner to check primarily for interference for events,as well as any intermod on rc frequencies on 72kc. Thanx! Mitch D __________________________________________________ Do You Yahoo!? Yahoo! Health - Feel better, live better http://health.yahoo.com 5833 From: Mitch D Date: Mon Jul 22, 2002 5:56pm Subject: Purchases from SWS Security Once in a while Steve may post some goods for sale on the list.Just wanted to say that if anyone was curious,I've done business with Steve and you get exactly what is described,packed well,and shipped promptly. There is no second guessing as to the quality of any items,and he's a safe no bull source for different equipment thats utilized in the trade,in the field,or on the bench. MD __________________________________________________ Do You Yahoo!? Yahoo! Health - Feel better, live better http://health.yahoo.com 5834 From: Date: Mon Jul 22, 2002 5:05pm Subject: Truth Deception Devices Subj: Re: Voice Stress Analysis Date: 7/19/2002 12:00:47 AM Eastern Daylight Time From: Steve@s... (Steve Uhrig) Reply-to: Steve@s... To: Cal189@a... On 18 Jul 2002 at 17:58, Cal189@a... wrote: > I am a Det. Lt. in NY and I run our truth verification unit where we > utilize the CVSA mostly in homicides and other serious crimes As in > both the Poly or the CVSA the operator is most important key to a > successful test. We agree on one point! > My experience utilizing both instruments is that they both > are very valuable investigative tools that can assist in > investigations and that when misused and abused can cause incorrect > results and major problems. I have attained successful test results > from poly and also CVSA. I list CVSA as opposed to VSA or "Truth > Tester" etc., because there are many nonprofessional voice stress > instruments out there that are no more than interview props. I have seen too many of them, and have worked too closely with too many polygraph operators who couldn't care less what hardware they used as long as it worked. I personally have seen staged demos which took me a lot of time to figure out how they were faked, and the companies were high class outfits demonstrating to law enforcement. In spite of my pointing out precisely how the fake demo was conducted, the agencies bought the things anyway. I see a LOT, as a manufacturer, of agencies buying pure garbage just because it is presented well by a good ol' boy who talks the language and plays golf and probably liberally is sending out pictures of Ben Franklin at Christmas. I'm on one right now where I would file an antitrust suit if I could afford the $100K to ligitigate. A federal letter agency, beyond any question, is being paid to steer a large term contract to the only other manufacturer of a product I happen to manufacture, and in every side by side demo my product has proven superior. However, when the other company writes the spec, they have the order. > I am certified as a CVSA operator and this instrument has in many cases > focused my homicide investigation away from a suspected > boyfriend/husband or toward a casual acquaintance. I'm glad to hear that, but we will have to agree to disagree. In 30 years in this business, I've seen too much to change my stubborn mind on certain things. And then when places start running voice stress off tape or over the telephone, or off TV, that doesn't help either. > In many of these cases the test results were later supported by > confessions. Neither of these instruments are foolproof and rely > heavily on the skill and objectiveness of the operator. My comment is that a truly competent interviewer doesn't need any equipment. The hardware is there only as props and for intimidation purposes. There is a slight possibility I might change my mind if I went through some formal training AND witnessed several demos conducted under conditions I specify. I well admit I could be wrong and just an old buzzard with a closed mind. I don't believe that to be the case, but I admit it could be. BTW, neither your message or this went to the list. We set the list up so the default reply is to the sender of the message, not to the entire list. You are welcome to post your message as well as my reply to the list if you feel it would be of common interest. Thanks for the message ... Steve 5835 From: James M. Atkinson Date: Mon Jul 22, 2002 9:31pm Subject: Re: tektroniks spec a's You can get some good prices on them, but the parts are tough (if not impossible) to obtain. Good luck on trying to get a calibration lab to certify it; most will not even look at them. The 492 was obsolete over 10 years ago, but if you get get one that works for under $1500 go ahead it works... It's worth the gamble... But when it breaks use it for a boat anchor. To demod. simply take the IF output and drop it into a scanner. -jma At 3:51 PM -0700 7/22/02, Mitch D wrote: >Theres a boatload of tektronics 492spec a's FS on e bay,was just curious >if anyone ever used,or owned 1,if so what did you do to add a audio >demodulator if you did own one? >One of the local rc airplane clubs near me was interested in getting >something with more bang than a scanner to check primarily for >interference for events,as well as any intermod on rc frequencies on 72kc. >Thanx! >Mitch D -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5836 From: Date: Mon Jul 22, 2002 11:40pm Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. This file is set to automatically go out to list members every two weeks, Please review it, and ensure that you are listed properly (correct address, phone, etc). ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (including AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: tscm01@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 5837 From: Date: Mon Jul 22, 2002 11:40pm Subject: File - mission.txt TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 5838 From: kondrak Date: Tue Jul 23, 2002 2:12pm Subject: Fwd: [LMR] Camper comes to town & shuts down radio system. Why does this NOT surprise me? "Radio Schlack" thats why... >Last week our local Cable TV operator said that there base radio was >receiving nothing but HUM when it was receiving calls. The mobiles in the >field did not hear the hum nor did our shop. After traveling 35 miles as >we got within 1/2 mile of the base we could hear the HUM on our IFR. We >traced the interference to the camper trailer park near the base radio >that has around 175 to 200 small campers trailers. We located the camper >that was causing the interference & it was a RADIO SHACK RABBIT EARS >antenna that have a 15db gain amp built in. You could turn the tuning knob >on the unit & move the UHF carrier up & down in frequency. This is great >a $29.95 antenna can shut down a $20K radio system. Happy Hunting! 5839 From: Mitch D Date: Tue Jul 23, 2002 2:50pm Subject: transport cases for equipment Found a good outlet for good durable cases for electronic components www.thermodyne-online.com theyre cheaper than custom built flight cases,and you can add wheels and retractable handles as well,moveable latches etc... Cool stuff We've been using some here on the job I'm on and theyve held up really well compared to some of the others I've had with me Just a resource for baggage handler warfare ;) __________________________________________________ Do You Yahoo!? Yahoo! Health - Feel better, live better http://health.yahoo.com 5840 From: James M. Atkinson Date: Tue Jul 23, 2002 5:03pm Subject: Re: Fwd: [LMR] Camper comes to town & shuts down radio system. Many HDTV UHF antenna's with amplifiers built in do the same thing, the amplifier is of such poor quality that it is very easy to saturate... after which it starts to oscillate until someone kills the power. -jma At 3:12 PM -0400 7/23/02, kondrak wrote: >Why does this NOT surprise me? "Radio Schlack" thats why... > > > >>Last week our local Cable TV operator said that there base radio was >>receiving nothing but HUM when it was receiving calls. The mobiles in the >>field did not hear the hum nor did our shop. After traveling 35 miles as >>we got within 1/2 mile of the base we could hear the HUM on our IFR. We >>traced the interference to the camper trailer park near the base radio >>that has around 175 to 200 small campers trailers. We located the camper >>that was causing the interference & it was a RADIO SHACK RABBIT EARS >>antenna that have a 15db gain amp built in. You could turn the tuning knob >>on the unit & move the UHF carrier up & down in frequency. This is great > >a $29.95 antenna can shut down a $20K radio system. Happy Hunting! -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5841 From: Hawkspirit Date: Wed Jul 24, 2002 3:18pm Subject: Sweep Needed Small residential sweep needed in Arlington. Va. Contact me as soon as possible directly here at hawkspirit@e... or 323-462-1351 Roger Tolces Electronic Security 5842 From: Date: Wed Jul 24, 2002 9:16pm Subject: picture needed This may sound wierd, but I need a picture of the device used in the Watergate scandal. Surely someone on this esteemed list knows where to direct me. Thanks in advance. SteveP 5843 From: Matt Paulsen Date: Wed Jul 24, 2002 11:23pm Subject: RE: picture needed Bug, lockpicks and more thanks to the Washington Post. http://www.washingtonpost.com/ac3/ContentServer?pagename=gallery&galleryid=G 52119-2002Jun14&nextstep=3&node=photo/politics -----Original Message----- From: preflat@p... [mailto:preflat@p...] Sent: Wednesday, July 24, 2002 7:17 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] picture needed This may sound wierd, but I need a picture of the device used in the Watergate scandal. Surely someone on this esteemed list knows where to direct me. Thanks in advance. SteveP ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5844 From: Andre Holmes <1ach@g...> Date: Wed Jul 24, 2002 11:52pm Subject: Fw: picture needed ----- Original Message ----- From: "Andre Holmes" <1ach@G...> To: Sent: Thursday, July 25, 2002 12:45 AM Subject: Re: [TSCM-L] picture needed > Hello Steve > Before me Ihave a book called Electronic Surveillance by L.B.Tayler,JR. > ISBN 0-531-1032 > Mentioned devices which were to extract intelligence was a Tape Recorder > and. > Five men were arrested a bugging device was found on a person and a > walkie-talkie. > James Mccord testified in front of the Select Senate Watergate Investigating > Committee holding a rotary phone with the cover removed exposing the > network > there are four conductors attached to the handset wire group at the end one > of the conductors has a alligator clip attached to it. > Hope this is useful. > Andre Holmes > > > ----- Original Message ----- > From: > To: > Sent: Wednesday, July 24, 2002 10:16 PM > Subject: [TSCM-L] picture needed > > > > This may sound wierd, but I need a picture of the device used in the > > Watergate scandal. > > > > Surely someone on this esteemed list knows where to direct me. > > > > > > Thanks in advance. > > > > SteveP > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > 5845 From: Marty Kaiser Date: Thu Jul 25, 2002 8:05am Subject: Retired! My conditional retirement is now "OFFICIAL" and work hours sharply curtailed. I shall continue to work on "special projects" as time permits. You may still reach me at the existing telephone and fax numbers and e-mail address. Check into my NOSTALGIA page and FBI Story occasionally for comments on the highlights of my career. I wish to thank all of you for your support over the past forty years. 73s, Marty 5846 From: Andre Holmes <1ach@g...> Date: Thu Jul 25, 2002 11:22am Subject: Fw: Retired! Hello Marty Best of luck to you. Andre Holmes ----- Original Message ----- From: "Marty Kaiser" To: "TSCM-L" ; "TSCM-L" Sent: Thursday, July 25, 2002 9:05 AM Subject: [TSCM-L] Retired! > My conditional retirement is now "OFFICIAL" and work hours sharply > curtailed. I shall continue to work on "special projects" as time permits. > You may still reach me at the existing telephone and fax numbers and > e-mail address. Check into my NOSTALGIA page and FBI Story occasionally for > comments on the highlights of my career. I wish to thank all of you for > your support over the past forty years. > > 73s, Marty > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5847 From: Hawkspirit Date: Thu Jul 25, 2002 11:41am Subject: Info >Date: Wed, 24 Jul 2002 21:16:55 -0500 >From: preflat@p... >Subject: picture needed >This may sound wierd, but I need a picture of the device used in the >Watergate scandal. >Surely someone on this esteemed list knows where to direct me. > >Thanks in advance. >SteveP > >http://www.bugsweeps.com/info/telephone_taps.html > >Best, Roger 5848 From: James M. Atkinson Date: Thu Jul 25, 2002 2:20pm Subject: THE CAB RIDE [I am not the original author of this letter, but I am honored to post it to the list, and completely agree with the message. -jma] THE CAB RIDE Twenty years ago, I drove a cab for a living. When I arrived at 2:30 a.m., the building was dark except for a single light in a ground floor window. Under these circumstances, many drivers would just honk once or twice, wait a minute, then drive away. But I had seen too many impoverished people who depended on taxis as their only means of transportation. Unless a situation smelled of danger, I always went to the door. This passenger might be someone who needs my assistance, I reasoned to myself. So I walked to the door and knocked. "Just a minute," answered a frail, elderly voice. I could hear something being dragged across the floor. After a long pause, the door opened. A small woman in her 80's stood before me. She was wearing a print dress and a pillbox hat with a veil pinned on it, like somebody out of a 1940s movie. By her side was a small nylon suitcase. The apartment looked as if no one had lived in it for years. All the furniture was covered with sheets. There were no clocks on the walls, no knickknacks or utensils on the counters. In the corner was a cardboard box filled with photos and glassware. "Would you carry my bag out to the car?" she said. I took the suitcase to the cab, then returned to assist the woman. She took my arm and we walked slowly toward the curb. She kept thanking me for my kindness. "It's nothing," I told her. "I just try to treat my passengers the way I would want my mother treated." "Oh, you're such a good boy," she said. When we got in the cab, she gave me an address, then asked, "Could you drive through downtown?" "It's not the shortest way," I answered quickly. "Oh, I don't mind," she said. "I'm in no hurry. I'm on my way to a hospice." I looked in the rearview mirror. Her eyes were glistening. "I don't have any family or friends left," she continued. "and the doctor says I don't have very much long to live." I quietly reached over and shut off the meter. "What route would you like me to take?" I asked. For the next few hours, we drove through the city. She showed me the building where she had once worked as an elevator operator. We drove through the neighborhood where she and her husband had lived when they were newlyweds. She had me pull up in front of a furniture warehouse that had once been a ballroom where she had gone dancing as a girl. Sometimes she'd ask me to slow in front of a particular building or corner and would sit staring into the darkness, saying nothing. As the first hint of sun was creasing the horizon, she suddenly said, "I'm tired. Let's go now." We drove in silence to the address she had given me. It was a low building, like a small convalescent home, with a driveway that passed under a portico. Two orderlies came out to the cab as soon as we pulled up. They were solicitous and intent, watching her every move. They must have been expecting her. I opened the trunk and took the small suitcase to the door. The woman was already seated in a wheelchair. "How much do I owe you?" she asked, reaching into her purse. "Nothing," I said. "You have to make a living," she answered. "There are other passengers," I responded. Almost without thinking, I bent and gave her a hug. She held onto me tightly. "You gave an old woman a little moment of joy," she said. "Thank you." I squeezed her hand, then walked into the dim morning light. Behind me, a door shut. It was the sound of the closing of a life. I didn't pick up any more passengers that shift. I drove aimlessly, lost in thought. For the rest of that day, I could hardly talk and had tears running down both cheeks. What if that woman had gotten an angry driver, or one who was impatient to end his shift? What if I had refused to take the run, or had honked once, then driven away? On a quick review, I don't think that I have done anything more important in my life. We're conditioned to think that our lives revolve around great moments. But great moments often catch us unaware--beautifully wrapped in what others may consider a small one. PEOPLE MAY NOT REMEMBER EXACTLY WHAT YOU DID, OR WHAT YOU SAID, ~BUT ~ THEY WILL ALWAYS REMEMBER HOW YOU MADE THEM FEEL. Pass this on to all your friends and to the person who sent it to you as well. You won't get any big surprise in 10 days if you send it to ten people. But, you might help make the world a little kinder and more compassionate by sending it on. Thank you, my friend... -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5849 From: kondrak Date: Thu Jul 25, 2002 1:14pm Subject: Re: Info Man, that page brings back memories..... > > > >http://www.bugsweeps.com/info/telephone_taps.html > > > >Best, Roger 5850 From: Prokop Communications Date: Thu Jul 25, 2002 3:33pm Subject: Meridian 7208 10 -Button Set/Network Alternate Route Selection (NARS) System Gentlemen: My experience with the FBI as a TTA did not include the NARS System and the Meridian instrument described in the subject. It is also called a Norstar 7208. My client pursuant to a legal court order involving an IOC violation wishes to record the DTMF dialed at a specific instrument. In compliance with the court, video (non-audio) will be installed to identify the subject(s) doing the dialing. I have not been able to perform a preliminary inspection. The information obtained to date is the client's input. The video portion is not a concern. My questions are these: 1. Is there anyone in the group familiar with the features of this instrument and its interface with NARS ? 2. Is a schematic available within our group ? 3. Can the speaker telephone feature be disabled at an individual station, and if so, is there an administrator level access needed to perform this ? 4. Must the speaker telephone feature or any other feature be disabled at a master instrument with administrator level access ? 5. Is the microphone in the speaker feature controlled separately and can it be turned off at will ? 6. Can the volume of the audible beep that occurs when a caller activates the speaker telephone feature intra-office be raised ? 7. Since the DNRs I know interface with POTS, is there an off the shelf DNR that can record DTMF, date, time off-hook, time on-hook and duration of monitoring ? 8. Is there a source for used Meridian instruments ? 9. Are there remote capabilities, i.e., a caller accessing from the outside through a "backdoor" or especially programmed number ? 10. Can the NARS system be instructed to print out all calls or DTMF tones from a particular instrument and document the date, time, digits dialed, etc. ? 11. Is NARS a central office function and any changes in features must be made through authorized telephone personnel ? 12. Are there visual LEDs built into the instrument that would assist the user in knowing when the microphone has been activated by an outside caller ? Obiously, the one that can answer all the questions in this matter I can not approach Responses are welcome. I am open to suggestions. In depth discussion can continue via the landline. The line is secure. I am traveling this week, so I will review emails and telephone messages periodically. Rick Prokop -W9MLW Prokop Communications TSCM-ITC Certified Video Concealments Seattle, Washington (206) 378-5560 Seattle, WA [Non-text portions of this message have been removed] 5851 From: Date: Thu Jul 25, 2002 6:42pm Subject: Brazil's President Inaugurates Amazon Monitoring System Brazil's President Inaugurates Amazon Monitoring System MANAUS, Brazil, July 25 /PRNewswire/ -- President Fernando Henrique Cardoso today inaugurated the initial operating capability of the System for the Vigilance of the Amazon (SIVAM), a $1.4B system that provides comprehensive electronic surveillance of Brazil's immense and relatively undeveloped Amazon region. The ceremony, held in the city of Manaus in the heart of the Amazon, comes five years to the day after Raytheon Company (NYSE:RTN) and its partners, Embraer and ATECH, began work on SIVAM. The project will provide real time information on conditions across the breadth of the region to a wide range of government agencies, research institutions and other users. It includes the capabilities to build one of the world's largest environmental databases. Under the auspices of the Federal Government in Brasilia, SIVAM is the first step in Brazil's long range effort to protect and control this unique natural area that encompasses over half of the country's landmass. The event is a significant milestone in the realization of Brazilian commitments made at the UN Conference on the Environment and Development held in Rio de Janeiro in 1992, and SIVAM is a critical asset for maintaining Brazilian sovereignty over its national territory. The newly operating SIVAM system uses a diverse array of equipment to monitor both the surface of the vast Amazon jungle and the national airspace above it. SIVAM data will be used to support essential Brazilian government programs, university and private scientific research efforts, and sustainable development initiatives. It will also help to address the health, educational and economic needs of Brazilian families and individual citizens. Tied together by an innovative satellite telecommunications infrastructure, the system combines data generated by space-based, airborne and surface sensor and support systems. Satellite remote sensing data are received through the Government's ground station at Cuiaba and image processing site at Cachoeira Paulista, which have been upgraded by the National Space Research Institute (INPE) and Raytheon. Raytheon-supplied sensors -- including synthetic aperture radars, multispectral scanners, optical infrared sensors, high frequency direction finding equipment, and communications and non-communications exploitation gear -- have been installed onto three remote sensing aircraft, modified versions of the Embraer ERJ- 145. These jets give users the opportunity for remote mapping through the dense jungle canopy, forest fire detection, and photoreconnaissance. On the jungle floor and in the waters of the Amazon river system itself, Raytheon provides an array of weather and environmental monitors that provide a real time and comprehensive picture of regional environmental conditions ranging from meteorological and lightning information to water characteristics and air and river pollutants. SIVAM's air traffic control (ATC) and associated airspace surveillance for the first time provides Brazil with a comprehensive monitoring capability throughout the region. The system will contain 14 state-of-the-art Raytheon fixed base air traffic control radars and six transportable radars, supplemented by five existing government-furnished ATC radars. These ground- based radars are augmented by five newly developed SIVAM airborne radars, also adapted ERJ-145s, outfitted with Raytheon and Swedish sensors. Collectively these radars provide an area-wide monitoring capability permitting vastly enhanced counter-smuggling, border surveillance and law enforcement operations over an area the size of the United States west of the Mississippi. Data from the various airborne and ground-based sensors are sent to and processed in an Air Surveillance Center located in Manaus, Regional Coordination Centers located in Manaus, Porto Velho, and Belem, and a General Coordination Center to be located in Brasilia. Dick Nelson, Raytheon vice president for SIVAM, said, "Working with the extremely professional members of the Brazilian Air Force - led by Brigadeiro Teomar Fonseca Quirico, and earlier by Brigadeiros Marcos Antonio de Oliveira and Jose Orlando Bellon -- over the past five years has been one of the highlights of the project. Their operational, technical, and program management expertise so evident during the development and installation of the project ensures that SIVAM will meet all of the expectations that the Brazilian Government had in mind when the system was first conceived over a decade ago." With headquarters in Lexington, Mass., Raytheon Company is a global technology leader in defense, government and commercial electronics, and business and special mission aircraft. Contacts: Patricia Perlini Dave Shea 260.429.5547 703.284.4245 MAKE YOUR OPINION COUNT - Click Here http://tbutton.prnewswire.com/prn/11690X50238200 SOURCE Raytheon Company CO: Raytheon Company ST: Brazil SU: http://www.prnewswire.com [Non-text portions of this message have been removed] 5852 From: Hawkspirit Date: Fri Jul 26, 2002 0:04pm Subject: Article Needed Any one in the group have an original copy of the article "Spy Tech" appeared in the March 1988 Discover magazine? Thanks, Roger From: James M. Atkinson, Comm-Eng Date: Thu Jul 20, 2000 0:11pm Subject: Re: Carrier Current Methods At 10:07 AM -0400 7/14/00, James M. Atkinson, Comm-Eng wrote: >Good Morning, > >Let me throw out this topic for discussion on the list, and invite >other list members to share their methods of detection, parameters, >and so on. Since I asked the question I guess that I had better answer it myself. >1) Are you performing checks for "Conducted Emissions" (aka: Carrier >Current) during your TSCM services? Yes. >2) Are you using a CC detector such as the 2030 or SCD-5 I am using both the 2030, and an SCD-5, (I use one set for AC lines, and another set for phone lines). I have modified the impedance matching circuits in each for 15 ohms, and 900 ohms respectively and replaced the inputs with a little switch box. I use the boxes for quick checks prior to using a Spectrum Analyser. >3) Are you using an Oscilloscope Yes, with a 200 MHz BW, and I bring the raw line voltage directly into the scope without filtration and drop my timing base down until I can see the zero crossing become stable. I then trigger on the down stroke of the 60 Hz at about 100-250 mV, and VLF signals are easy to see. Every power outlet gets checked with the scope during the early phase of the sweep (before the plate is removed), and then again from the back of the outlet after the plate is pulled, but before the Spectrum Analyzer is used. I have found it very helpful to open the breaker panels so you can get access to all the phases in the building and check them with a scope early in the sweep, or during the pre-sweep segment. >4) Are you using a Spectrum Analyzer Yes, but I only check from 100 Hz to 250 MHz for Carrier Current signals on lower threat sweeps >5) Are you using any kind of TSCM receivers such as a Scanlock, >CPM-700, OSCOR, and if so which conductor combinations are you >checking? I am using the CPM-700 strictly for radiated emissions, and then only for quick checks before I break out the "big iron". I also use the OSCOR, and in the case of a low threat sweep depend on it heavily (due to time constraints). To more effectively use the OSCOR on low threat sweeps I took a small plastic box, added a little gooseneck light, and several switches so I can pass VLF signal combinations (Phone/Power/HVAC/etc) into the OSCOR via the power cord (if anybody is interested I will post a full description of this box to the list). Since I am a "belt and suspenders" type of engineer I use the OSCOR in parallel with other equipment (such as the SA). >6) Are you using any other equipment? Several items, but prefer to keep that confidential >7) What frequency ranges are you checking? It depends on the threat, but generally 100 Hz to 250 MHz on lower threat sweeps, and 30 Hz to above 400 MHz on higher threat sweeps. It also depends on the actual construction of the wiring, transformer locations, and so on. I would point out that there is a boatload of consumer products which place signals on the power and/or phone lines well above 500 kHz. A good example of this are the video transmitters that route wide-band FM modulated video signals at 17 and 22 MHz over the power lines Remember the FCC authorizes Carrier Current signals up to 30 MHz, but that eavesdropping devices may operate above this. Also keep in mind that several eavesdropping products use the power, phone, and other conduction combinations as the antenna. While such a device isn't actually "carrier current", it would be classified as a conducted emission, and/or a device using the power/phone/etc line as the antenna (I have personally seen such systems operating on frequencies above 175 MHz). >8) Where do you perceive the primary threats to be located in the spectrum? I perceive the primary threat to be from 100 Hz to 50 MHz, and the secondary threat to be 30 MHz to 200/400 MHz. On higher threat situations I consider everything to be a threat, and check EVERY conductor combination to well into the microwave range. >9) If your are using a filter to knock out 60 Hz or other signals how >are your filters configured, or are you just using a "Capacitive >Reactance" circuit to just de-couple the line.? I decouple from the line, then push the signal though a 5-25 pole high pass filter, and then amplify it to punch it up (usually at least 20 dB or more). In cases where I am getting video signal bleed I run the signal though comb filters, or simple band reject filters (to knock down the thunder lizards). If the thunder lizards are still causing a problem then I use additional "lizard filters" in front of the initial high pass filter. >10) Are you checking for audio and video signals, or just audio? Audio, Video, Fax, and Data... But I see the primary threat as being Audio and Video. >11) What kinds of modulation are you looking for? While I consider AM, FM, and pulse modulation to be the primary threat I consider any signal (no matter what kind of modulation is used) to be hostile until I can prove otherwise. > >If you would like to post your answers to the list, but would like to >do it anonymously they privately send me your post and I will post it >for you. > >-jma > =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 933 From: James M. Atkinson, Comm-Eng Date: Thu Jul 20, 2000 0:23pm Subject: re: Carrier Current/Subcarrier At 12:36 PM -0400 7/20/00, Steve Uhrig wrote: >Once upon a midnight dreary, DrPepper pondered, weak and weary: > > > Hmmmmmm! > > > That's why I use a near feild frequency counter for my preliminary >sweeps. > >A frequency counter, even a high end unit, is so insensitive as to be >essentially worthless for sweeping. Remember that BANDWIDTH and Sensitivity are always inversely proportional, the wider the bandwidth, the less sensitive the instrument or radio. >A low powered device will not register reliably on the thing unless you >are very close. > >"Near field" by definition, is within a wavelength. Actually the "Near Field" is the Wavelength divided over 2*pi... or one sixth the wavelength. >A full wavelength for a typical 500 megacycle transmitter is about 22 >inches. > >At 2.4 gigs, it is 4.5 inches. > >A more appropriate device, not sold at Radio Shack or ham radio outlets, >will hear a potential hostile transmitter one hundred times as far as a >typical high end frequency counter. Heck, a CPM-700 (or even a 2060LV) will do a better job of finding bugs then a frequency counter. Of course you should have a frequency counter, but don't use it to find the bug... but instead to evaluate the bug once it is found. The freq counter (such as the Scout) can be used to drive a radio, and used to lock only local signals (in case you get lucky) >Sweeping my office with a fifteen thousand dollar IFR service monitor >incorporating a counter, using a remote antenna on a length of cable, >results in reading dozens of signals, none of them hostile, many of them >in suspicious frequency regions. How would you tell the difference? > >If you are using a frequency counter you are fooling yourself. It's actually a common error made by TSCM people early in their career. The Frequency counter has it's place, but only after you have isolated the signal in the frequency or space domain. >If you are charging money for doing so, you are cheating your customer. > >Your conscience. > >Steve Well put -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 934 From: James M. Atkinson, Comm-Eng Date: Thu Jul 20, 2000 0:49pm Subject: Spying row blocks US-Russian deal Thursday, 20 July, 2000, 10:35 GMT 11:35 UK Spying row blocks US-Russian deal http://news.bbc.co.uk/hi/english/world/americas/newsid_842000/842343.stm The House of Representatives has passed a bill that would bar the US from rescheduling debts incurred by the former Soviet Union until Russia closes its spy station in Cuba. Under a deal reached last year, the US is allowing Russia to postpone the payment of $485m in Soviet-era debts. But supporters of the bill in the Republican-controlled House say it makes no sense to give Russia debt relief when it is pouring millions of dollars each year into an operation that eavesdrops on the US military, companies and private citizens, while helping the Cuban Government. The legislation is opposed by the Clinton administration, which argues that Russia needs intelligence facilities to monitor arms control agreements. The measure passed easily, by a vote of 275 to 146, with 61 Democrats joining Republicans to support the bill. 'Bristling with satellites' Legislators say Russia leases its listening post in Lourdes, near Havana, for up to $300m a year, and has spent more than $3bn in recent years to operate and upgrade the station used to intercept US telephone calls and computer communications. The eavesdropping facility is reported to house dozens of Russian intelligence officers using satellites and other high-tech electronic surveillance equipment. The chairman of the House of Representatives Intelligence Committee, Porter Goss, said it was similar to having a foreign aircraft carrier "bristling with satellites" sitting off American shores. Republican Representative Benjamin Gilman, of the International Relations Committee, said: "Supporting the Castro regime and spying on American citizens and our companies are not appreciated." 'Nail in Castro's coffin' The White House strongly opposes the legislation, although it admits to sharing congressional concerns over the intelligence collection activities of the Lourdes listening station. The top Democrat on the International Relations Committee, Sam Gejdenson, said the real purpose of the bill's backers was to put "one more nail in Fidel Castro's coffin." US officials have also warned that any refusal by Washington to reschedule the American share of the Russian debt would create tensions within the Paris Club of creditors. If the bill became law and Russia failed to repay the debt, it would automatically lose its normal trade relations status and Russian goods entering the US could be hit by higher tariffs. A similar measure to block postponement of Russian debt repayments is also moving through the Senate, sponsored by conservative Senator Jesse Helms of North Carolina. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 935 From: James M. Atkinson, Comm-Eng Date: Thu Jul 20, 2000 3:55pm Subject: Discovery Notification Procedures, Updated Post Several weeks ago I posted a "Discovery Notification Procedures" which resulted in quite a few private messages on the subject as well as a number of public postings. I cleaned up the posting, and expanded out some of the materials to answer some of the more common questions. As I have time I will code it up into HTML and upload it to my website. I wanted other list members to first be able to take a look at it first and add their comments and observations. I plan to make it another one of my free tutorial. On an added note... if you publish any kind of TSCM, law enforcement, or investigative newsletter and would like to republish this (or any other) of my materials please let me know so we can work out the details and appropriate permissions. ================================================ Eavesdropping Incident TSCM Discovery Notification Procedures I've gotten quite a few questions regarding "Notification Procedures" so I though it was time to publish something more on the subject. First, as a fact of law when you uncover an illegal eavesdropping device, or evidence of illegal eavesdropping activity, espionage, bugging, wiretapping, and so on you have a legal responsibility to notify appropriate law enforcement which has jurisdiction. Failure to report a crime or suspected crime may cause the words "Obstruction of Justice" to appear next to your name on an Indictment (which is not a good thing). Second, The issue of "jurisdiction" is a very touchy one. As a rule your safest bet is to always make your report initial in writing to at least one FEDERAL law enforcement agency, and optionally to one local law enforcement agency. Interception of Oral Communications is a Federal offence and is a violation handled by the FBI. The local police or sheriff may also have concurrent jurisdiction under applicable state statute. At a minimum the FBI should at least to offer to take the complaint, even if there is a doubt in the agents mind that the US Attorney's office would pursue the matter. Title 18 USC 2511 spells out quite clearly that wiretapping is a federal crime, and therefore the purview of the FBI. The Complaint Clerk or Duty Agent should write the matter up, even if no action was being taken, and the complaint forwarded to the appropriate supervisor for information or action. Of course every federal law enforcement agency attempts to weasel out of getting "bug finds" dropped on their lap, which is why you have to document everything and make all of your initial notifications in writing. (on a side note: FBI Agents really do like like arresting criminals, and putting them in jail.) I generally include a paragraph at the top of my notification letters that points out the jurisdiction issue, and ask that if they opt not to assist to direct the letter to an "appropriate agency". In the event that you "get anything less then an enthusiastic response" from a federal law enforcement agency then you should make sure that you provide your local U.S Attorneys office (send it to THE U.S. Attorney, and NOT an Assistant U.S. Attorney) with a copy of the notification letter. Also send a secondary letter where you mention the agent by name to refused to handle the complaint. Generally the "newly minted agents, still wet behind the ears" will give you the most problems, but the older agents are a bit more understanding (so long as your a legitimate TSCM person). Sadly, No federal law enforcement agency has never formally accepted or been given jurisdiction over bugging and wiretapping incidents unless the incident involves classified materials or industrial, military, or economic espionage. The U.S. is ripe for a major crackdown on the spy shops, eavesdroppers, and wiretappers, but nobody really cares about enforcing the law already on the books. Reference: FBI Manual of Investigative Operations and Guidelines (AKA: MIOG), Part II, Section 16, Pages 133-140 Third, You want someone in law enforcement to get out to the location and take control of the premises is quickly as possible. Fourth, It is CRITICAL that you collect as much documentation as quickly as humanly possible as the bug may vanish in all the commotion once LE gets involved. Also, take great care not to smear any of the fingerprints that might be on the device, battery, wires, or surrounding area. The same thing goes for tool marks, or elements of trace evidence. Fifth, Law Enforcement will (or should) ALWAYS suspect that the person who found the bug is also the person who planted the bug. You had better make damn sure that you "are as pure as the freshly laid snow", and that NOTHING in your possession (or at your office) could be even remotely considered an eavesdropping device. Sixth, When you take photographs of the find be sure to get INSTANT pictures in three copies (one for you, one for LE, and one for your clients), and be sure to sign each and add a date and time (these are your insurance pictures). Next, take a series of 35mm photographs with a "Normal" 50 or 60 mm lens and use COLOR print film (as slow speed as possible, I prefer 25 or 100 speed). Be sure to use a tripod and off camera flash, and stop-down to the minimum aperture so the photographs will be tack sharp when blown up. If you have time supplement the color photographs with a set of black and white picture shot on PANCHROMATIC film (as slow as possible, I prefer 50 speed or Tech-Pan). Take great care not to disturb anything that might be considered evidence. Don't rely on digital pictures only, but burn some film (LE folks, judges, and juries love big 30*40 prints). Seventh, Record every little detail on paper, and remember that you will need to sign , date, and time stamp each page. Remember to make a photocopy as you will usually give all of your originals to the LE person who comes out (be sure to get a property receipt... no property receipt, no evidence). Personally I have a 150+ page discovery checklist that goes into virtually all conceivable parameters of a discovery, and tracks all notifications, etc. (I also bring along some of my own property receipts in case they forget theirs). Eighth, This would be a good time to point out that you should make copies of everything, but that it may be wise to "forget" about these copies (and your insurance pictures) when you hand over the original documents. Funny things have been known to happen in property rooms, and it may end up being "your word against theirs", so CYA, CYA,CYA. Ninth, Always assume that there is more then the one bug or bugs you found, and assume that someone will attempt removal or at least some type of countermeasure against your discovery. Tenth, It is critical that you consider that what you have found is hostile, AND illegal until proven otherwise. AND THE MOST CRITICAL!!! Eleventh, Our job is to ensure that an area that we are inspecting is reasonably free of eavesdropping devices or technical weaknesses. We are never engaged to "find the bug", but to ensure that no bug is present. It is not our job to "investigate" who did it, but to scientifically document our find and then to turn the case over to someone in law enforcement for investigation. ================================================ Assorted Ramblings: My personal preference is to "preload" a notification form letter on a laptop with all of the location information, client information, and so on. I set it up so it can launch a fax off to the local FBI office in seconds (sent to the complaint duty officer). I also set up a similar form letter with contact information (via fax) for any other local LE agency that may also have interest in case I find something (State Police, Local Sheriff, City Police, etc). I also indicate that this is simply an "Initial Notification Letter" and that there will be more details to follow in a second fax and phone call. I then go down my discovery check list, key-in the appropriate details on the find and squirt a fax (with more details) to the appropriate agencies as soon as possible. This way the paper trail on the find is started immediately. I then follow up with a phone call about 5-10 minutes after I've confirmed that all of the faxes have gone though. Once that has been completed the rest of the discovery list is filled out. Photographs of the find are taken (both 35mm and Polaroid instant "insurance pics") and as much information written down and documented in as much depth and detail as possible. Be sure to observe the behavior of your contact and their employees when you tell them about your discovery as this often proves quite interesting (it may be THEIR bug). The area is then secured, and the law enforcement agencies re-contacted (and pushed) to get someone to "take control" of the area prior to your departure. Usually the LE folks will bitch and moan, but it is critically important to get someone (anyone) to come visit the location, and at least take down a written incident report or complaint (be sure that YOU get a copy). Also be sure to get the name, badge number, and contact information of the people who come out (be sure to record the plate number and/or car number). If someone in law enforcement claims that the device "is one of theirs" simply ask for the docket/case number, the court who issued the warrant, and the names/phone of the judge so you can get a protective order issued. If there is Court or Judges name given and no protective order is issued, then there is no legitimate warrant, in turn the cop is probably violating the felony, and you need to immediately talk to the FBI. (A protective order is a court order that will formally command you to "keep your mouth shut" regarding the discovery or activities involving a legitimate COURT ordered bugging. You should ask for this to be issued to protect you, and most judges will be quite happy to issue one as they understand the ethical position you are in.) If in fact you obtain good reason to belive that it is a legitimate COURT ORDERED activity then politely and immediately refund all of your clients money (with a little extra something for their trouble), and find some way to gracefully back out of the assignment (feigning an equipment malfunction, theft of gear, or a physical ailment are all good excuses). Just remember that when you find a bug keep your mouth shut, document everything, preserve evidence, officially notify law enforcement, and be ready to answer some awkward questions. ================================================ As a formality years ago I started writing down every little aspect of how I perform a TSCM or related service. My primary goal was to use computer controlled instruments, and to let it help ferret out potential threats. Of course to do this I first had to describe in detail every aspect of what I wanted the computer to do, which was then reduced to a series of C instructions. When a client contacts me for a sweep I have a 3 ring binder that I grab so I can collect on of the information on the assignment and "fill in the blanks". I then have my computer spit out a copy of the "Prep Worksheets", equipment checklists, and so on. Once I arrive on-site I have a RF worksheet that runs several hundred pages, and is mostly computer generated modeling information. Each wallplate, switch, light fixture, piece of furniture, and so on each has a different type of detailed checklist, and higher threat things such as doors and door frames have a 6+ pages list. I have one type of checklist for pocket calculators, another one for AC powered calculators, another for ashtrays, and so on. The checklist for a single telephone line is 16+ pages, and the inspection list for the phone instrument is over 20 pages. Years ago I learned not to assume anything, and learned that by documenting every aspect of what you do there is less chance to miss minor anomalies or details which could point to a bug. Customers also seem to be a lot happier when you can show them that you are working off of a formal plan of work or blueprints. Customers are also delighted that you have a formal scientific method and procedure that they can look at, touch, feel, and talk with you about. My "Procedural Guide" is currently a total of six (soon to be seven) 1.5-inch thick binders. Each binder covers the methods used on a specific segment of the TSCM survey. I insert copies of what ever worksheets are appropriate for the job into the back of each section once I arrive and "count the wallplates". Since most of my sweeps are repeat customers I can usually just pull the blueprints and prepare the worksheets in advance. When I roll out to perform a sweep I print off a current version of the "Procedural Guide" so that it becomes a living document. At the end of EVERY sweep, learn of a new threat, and so on I make a batch of updates to the "Procedural Guide" so that it evolves over time to be more useful. In any case, documentation is your friend, as is having a formal discovery and notification procedure already in place. -jma =================================== Here are the FBI Offices in major 56 U.S. cities. I suggest that you copy and past them into your discovery checklist. Federal Bureau of Investigation 200 McCarty Avenue Albany, New York 12209 (518) 465-7551 Federal Bureau of Investigation Suite 300 415 Silver Avenue, Southwest Albuquerque, New Mexico 87102 (505) 224-2000 Federal Bureau of Investigation 101 East Sixth Avenue Anchorage, Alaska 99501-2524 (907) 258-5322 Federal Bureau of Investigation Suite 400 2635 Century Parkway, Northeast Atlanta, Georgia 30345-3112 (404) 679-9000 Federal Bureau of Investigation 7142 Ambassador Road Baltimore, Maryland 21244-2754 (410) 265-8080 Federal Bureau of Investigation Room 1400 2121 8th. Avenue N. Birmingham, Alabama 35203-2396 (205) 326-6166 Federal Bureau of Investigation Suite 600 One Center Plaza Boston, Massachusetts 02108 (617) 742-5533 Federal Bureau of Investigation One FBI Plaza Buffalo, New York 14202-2698 (716) 856-7800 Federal Bureau of Investigation Suite 900, Wachovia Building 400 South Tyron Street Charlotte, North Carolina 28285-0001 (704) 377-9200 Federal Bureau of Investigation Room 905 E.M. Dirksen Federal Office Building 219 South Dearborn Street Chicago, Illinois 60604-1702 (312) 431-1333 Federal Bureau of Investigation Room 9000 550 Main Street Cincinnati, Ohio 45202-8501 (513) 421-4310 Federal Bureau of Investigation Room 3005 Federal Office Building 1240 East 9th Street Cleveland, Ohio 44199-9912 (216) 522-1400 Federal Bureau of Investigation 151 Westpark Blvd Columbia, South Carolina 29210-3857 (803) 551-4200 Federal Bureau of Investigation Suite 300 1801 North Lamar Dallas, Texas 75202-1795 (214) 720-2200 Federal Bureau of Investigation Federal Office Building, Room 1823 1961 Stout Street, 18th. Floor Denver, Colorado 80294-1823 (303) 629-7171 Federal Bureau of Investigation 26th. Floor, P. V. McNamara FOB 477 Michigan Avenue Detroit, Michigan 48226 (313) 965-2323 Federal Bureau of Investigation 660 S. Mesa Hills Drive El Paso, Texas 79912-5533 (915) 832-5000 Federal Bureau of Investigation Room 4-230, Kalanianaole FOB 300 Ala Moana Boulevard Honolulu, Hawaii 96850-0053 (808) 521-1411 Federal Bureau of Investigation 2500 East TC Jester Houston, Texas 77008-1300 (713) 693-5000 Federal Bureau of Investigation Room 679, FOB 575 North Pennsylvania Street Indianapolis, Indiana 46204-1585 (317) 639-3301 Federal Bureau of Investigation Room 1553, FOB 100 West Capitol Street Jackson, Mississippi 39269-1601 (601) 948-5000 Federal Bureau of Investigation Suite 200 7820 Arlington Expressway Jacksonville, Florida 32211-7499 (904) 721-1211 Federal Bureau of Investigation 1300 Summit Kansas City, Missouri 64105-1362 (816) 512-8200 Federal Bureau of Investigation Suite 600, John J. Duncan FOB 710 Locust Street Knoxville, Tennessee 37902-2537 (423) 544-0751 Federal Bureau of Investigation John Lawrence Bailey Building 700 East Charleston Boulevard Las Vegas, Nevada 89104-1545 (702) 385-1281 Federal Bureau of Investigation Suite 200 Two Financial Centre 10825 Financial Centre Parkway Little Rock, Arkansas 72211-3552 (501) 221-9100 Federal Bureau of Investigation Suite 1700, FOB 11000 Wilshire Boulevard Los Angeles, California 90024-3672 (310) 477-6565 Federal Bureau of Investigation Room 500 600 Martin Luther King Jr. Place Louisville, Kentucky 40202-2231 (502) 583-3941 Federal Bureau of Investigation Suite 3000, Eagle Crest Bldg. 225 North Humphreys Blvd. Memphis, Tennessee 38120-2107 (901) 747-4300 Federal Bureau of Investigation 16320 Northwest Second Avenue North Miami Beach, Florida 33169-6508 (305) 944-9101 Federal Bureau of Investigation Suite 600 330 East Kilbourn Avenue Milwaukee, Wisconsin 53202-6627 (414) 276-4684 Federal Bureau of Investigation Suite 1100 111 Washington Avenue, South Minneapolis, Minnesota 55401-2176 (612) 376-3200 Federal Bureau of Investigation One St. Louis Centre 1 St. Louis Street, 3rd. Floor Mobile, Alabama 36602-3930 (334) 438-3674 Federal Bureau of Investigation 1 Gateway Center, 22nd. Floor Newark, New Jersey 07102-9889 (973) 792-3000 Federal Bureau of Investigation Room 535, FOB 150 Court Street New Haven, Connecticut 06510-2020 (203) 777-6311 Federal Bureau of Investigation 2901 Leon C. Simon Dr. New Orleans, Louisiana 70126 (504) 816-3000 Federal Bureau of Investigation 26 Federal Plaza, 23rd. Floor New York, New York 10278-0004 (212) 384-1000 Federal Bureau of Investigation 150 Corporate Boulevard Norfolk, Virginia 23502-4999 (757) 455-0100 Federal Bureau of Investigation 3301 West Memorial Drive Oklahoma City, Oklahoma 73134 (405) 290-7770 Federal Bureau of Investigation 10755 Burt Street Omaha, Nebraska 68114-2000 (402) 493-8688 Federal Bureau of Investigation 8th. Floor William J. Green Jr. FOB 600 Arch Street Philadelphia, Pennsylvania 19106 (215) 418-4000 Federal Bureau of Investigation Suite 400 201 East Indianola Avenue Phoenix, Arizona 85012-2080 (602) 279-5511 Federal Bureau of Investigation Suite 300 U.S. Post Office Building 700 Grant Street Pittsburgh, Pennsylvania 15219-1906 (412) 471-2000 Federal Bureau of Investigation Suite 400, Crown Plaza Building 1500 Southwest 1st Avenue Portland, Oregon 97201-5828 (503) 224-4181 Federal Bureau of Investigation 111 Greencourt Road Richmond, Virginia 23228-4948 (804) 261-1044 Federal Bureau of Investigation 4500 Orange Grove Avenue Sacramento, California 95841-4205 (916) 481-9110 Federal Bureau of Investigation 2222 Market Street St. Louis, Missouri 63103-2516 (314) 231-4324 Federal Bureau of Investigation Suite 1200, 257 Towers Bldg. 257 East, 200 South Salt Lake City, Utah 84111-2048 (801) 579-1400 Federal Bureau of Investigation Suite 200 U.S. Post Office Courthouse Bldg. 615 East Houston Street San Antonio, Texas 78205-9998 (210) 225-6741 Federal Bureau of Investigation Federal Office Building 9797 Aero Drive San Diego, California 92123-1800 (619) 565-1255 Federal Bureau of Investigation 450 Golden Gate Avenue, 13th. Floor San Francisco, California 94102-9523 (415) 553-7400 Federal Bureau of Investigation Room 526, U.S. Federal Bldg. 150 Carlos Chardon Avenue Hato Rey San Juan, Puerto Rico 00918-1716 (787) 754-6000 Federal Bureau of Investigation Room 710 915 Second Avenue Seattle, Washington 98174-1096 (206) 622-0460 Federal Bureau of Investigation Suite 400 400 West Monroe Street Springfield, Illinois 62704-1800 (217) 522-9675 Federal Bureau of Investigation Room 610, FOB 500 Zack Street Tampa, Florida 33602-3917 (813) 273-4566 Federal Bureau of Investigation Washington Metropolitan Field Office 601 4th Street, N.W. Washington, D.C. 20535-0002 (202) 278-2000 =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 936 From: DrPepper Date: Thu Jul 20, 2000 0:49pm Subject: Re: re: Carrier Current/Subcarrier Well, Steve, , , , , , , , , , , , , I have been in the auditing business for over thirty five years, and I am a Registered Professional Engineer, retired from the "G" I have found bugs with this simple device, and it's actually very sensitive. Since you are an "expert", I expect that you sell fancy equipment and tell people thay can rely on them instead of their senses. You know, , , On second thought, , , , , , , I'm getting very tired of the snide remarks on this List, so I think that it's probably just a list for people who slap each other on the back, and tell everyone how big of an "expert" they are. Since I'm not really into penis measuring, I just think I'll drop this list! Good luck guys, , just keep on deluding yourselves. ================================================ Steve Uhrig wrote: > Once upon a midnight dreary, DrPepper pondered, weak and weary: > > > Hmmmmmm! > > > That's why I use a near feild frequency counter for my preliminary > sweeps. > > A frequency counter, even a high end unit, is so insensitive as to be > essentially worthless for sweeping. > > A low powered device will not register reliably on the thing unless you > are very close. Of course it won't!! > > > "Near field" by definition, is within a wavelength. > > By Whose definition? > > > A full wavelength for a typical 500 megacycle transmitter is about 22 > inches. > > At 2.4 gigs, it is 4.5 inches. > > A more appropriate device, not sold at Radio Shack or ham radio outlets, > will hear a potential hostile transmitter one hundred times as far as a > typical high end frequency counter. You mean the kind of equipment that YOU SELL??? Money wouldn't motivate this statement, would it? > > > Sweeping my office with a fifteen thousand dollar IFR service monitor > incorporating a counter, using a remote antenna on a length of cable, > results in reading dozens of signals, none of them hostile, many of them > in suspicious frequency regions. How would you tell the difference? By knowing what frequency band the signals would probably be located. > > > If you are using a frequency counter you are fooling yourself. IOW, Mine is longer than yours?? > > > If you are charging money for doing so, you are cheating your customer. Yeah, right. > > > Your conscience. > Damn right it is. > > Steve I decline to reply in terms that you will understand. Just keep in mind the source here, folks, Someone who is selling multi thousand dollar equipment. (see his sigfile) for "bug sweeps" IOW, just give me your dollars, and I will make you an instant "expert" > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* 937 From: James M. Atkinson, Comm-Eng Date: Thu Jul 20, 2000 10:27pm Subject: I am lumberjack and I am ok... At 10:49 AM -0700 7/20/00, DrPepper wrote: >Well, Steve, , , , , , , , , , , , , > >I have been in the auditing business for over thirty five years, and I am >a Registered Professional Engineer, retired from the "G" > >I have found bugs with this simple device, and it's actually very sensitive. >Since you are an "expert", I expect that you sell fancy equipment and >tell people thay can rely on them instead of their senses. Sure, but think of all the bugs you may have missed over all those years using just a frequency counter. I have detected "bugs" using nothing more then a flashlight, but it would be quite inappropriate for that to be the primary piece of equipment I was using for a sweep. >You know, , , On second thought, , , , , , , > >I'm getting very tired of the snide remarks on this List, so I think that it's >probably just a list for people who slap each other on the back, and tell >everyone how big of an "expert" they are. Quite a few people on this list are very well respected experts in the industry, and absolutely no qualms about pointing out the weakness in a method, or common error (such as using a frequency counter instead of a spectrum analyzer). The only "back slapping" that occurs on this list is when one member sees a wasp on the back of another member... belive it or not most of the list is here to help you out and to share their wisdom. >Since I'm not really into penis measuring, I just think I'll drop this list! If you would like to drop off the list then by all mean please do so, but the penis measuring sessions are by invitation only (but bring your own ruler) Come on folks... play nice, and let's be professional. >Good luck guys, , just keep on deluding yourselves. I am lumberjack and I am ok... I cut down tree, I wear high heel, suspenders, and a bra.... (oops, wrong mailing list) >================================================ > >Steve Uhrig wrote: > > > Once upon a midnight dreary, DrPepper pondered, weak and weary: > > > > > Hmmmmmm! > > > > > That's why I use a near feild frequency counter for my preliminary > > sweeps. > > > > A frequency counter, even a high end unit, is so insensitive as to be > > essentially worthless for sweeping. > > > > A low powered device will not register reliably on the thing unless you > > are very close. > >Of course it won't!! > > > > > > > "Near field" by definition, is within a wavelength. > > > > > By Whose definition? Ah... as defined by about 200 textbooks on basic electronics, as defined by the FCC, as defined by about three dozen government textbooks on the subject (its the wavelength divided by 2 pi). > > > > A full wavelength for a typical 500 megacycle transmitter is about 22 > > inches. > > > > At 2.4 gigs, it is 4.5 inches. > > > > A more appropriate device, not sold at Radio Shack or ham radio outlets, > > will hear a potential hostile transmitter one hundred times as far as a > > typical high end frequency counter. > >You mean the kind of equipment that YOU SELL??? >Money wouldn't motivate this statement, would it? Funny... Steve, doesn't sell any TSCM gear, nor does he fool around with Spy Shop or Radio Shack toys. While he occasionally offers some used gear (at one hell of a deal) he is not in the business of selling TSCM gear. I do know for a fact that he is legitimate designer, and manufacturer of legitimate SURVEILLANCE equipment. I also know for a fact that his equipment is sold exclusively to law enforcement and US intelligence agencies. While Steve may have stepped on your toes, he is telling the truth about the matter at hand, and his advice is quite sound. > > > > Sweeping my office with a fifteen thousand dollar IFR service monitor > > incorporating a counter, using a remote antenna on a length of cable, > > results in reading dozens of signals, none of them hostile, many of them > > in suspicious frequency regions. How would you tell the difference? > >By knowing what frequency band the signals would probably be located. Ah, but the IFR will lock onto a signal many times further away then even the best frequency counter is capable of. The frequency counter will only hit on a transmission if you get lucky... real lucky. If you already know where the bug is then you can walk a frequency counter over to it, and pop an ID, (but this is not the way it works in the real world unless the TSCM'er is a Psychic, has X-ray vision, or brought the bug with him). > > > > > > If you are using a frequency counter you are fooling yourself. > >IOW, Mine is longer than yours?? We are talking about antenna's here right? (This is not the urology mailing list) > > > > > > If you are charging money for doing so, you are cheating your customer. > >Yeah, right. Strong wording, but truthful. > > > > > > Your conscience. > > > >Damn right it is. > > > > > Steve > >I decline to reply in terms that you will understand. > >Just keep in mind the source here, folks, Someone who is selling >multi thousand >dollar equipment. (see his sigfile) for "bug sweeps" >IOW, just give me your dollars, and I will make you an instant "expert" I would take issue with your comments. Steve is an honest businessman, and a very competent TSCM person who goes out of his way to help guide other away from the pitfalls of the business. Steve does not sell TSCM gear, and he has no hidden agenda in what he is telling you. He cares solely about the quality and professionalism of the TSCM business, and as all of us do would point out a problem to keep you from embarrassing yourself in from of a client. I just wish more of the list members would have the courage to step forward and speak their mind. Don't get pissed off, and all defensive about it; but instead be willing to listen to others who are happy to help you. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 938 From: Miguel Puchol Date: Fri Jul 21, 2000 0:27am Subject: RE: re: Carrier Current/Subcarrier Dear Dr. Pepper, I have had the Opto MicroCounter, Cub, Scout and Xplorer, not one of the could detect your average wideband FM placed on Band II (88-108MHz), basically due to the overwhelming power of the kilowatt commercial sites. The one with the farthest 'range', so to speak, was the Xplorer, but only due to it being a fast scanner rather than a frequency counter. Once, while I was in a mountain range away from most of the RF usually present where I live, it picked up an airliner that passed some 20000' overhead. If you go anywhere near other RF sources you WILL need at least some good bandpass prefilters. Even then, you need to have the bug sooooooo close to the counter..... Please don't attack list members as you do, everyone has his methods, tools and equipment, aswell as experience, of which, from a scale of 1 to 100 I would say to be on 2 or 3....so not all is back-patting. Mike > -----Mensaje original----- > De: DrPepper [mailto:DrPepper@i...] > Enviado el: jueves, 20 de julio de 2000 19:49 > Para: TSCM-L@egroups.com > Asunto: Re: [TSCM-L] re: Carrier Current/Subcarrier > > > Well, Steve, , , , , , , , , , , , , > > I have been in the auditing business for over thirty five years, and I am > a Registered Professional Engineer, retired from the "G" > > I have found bugs with this simple device, and it's actually very > sensitive. > Since you are an "expert", I expect that you sell fancy equipment and > tell people thay can rely on them instead of their senses. > > You know, , , On second thought, , , , , , , > > I'm getting very tired of the snide remarks on this List, so I > think that it's > probably just a list for people who slap each other on the back, and tell > everyone how big of an "expert" they are. > > Since I'm not really into penis measuring, I just think I'll drop > this list! > > Good luck guys, , just keep on deluding yourselves. > > ================================================ > > Steve Uhrig wrote: > > > Once upon a midnight dreary, DrPepper pondered, weak and weary: > > > > > Hmmmmmm! > > > > > That's why I use a near feild frequency counter for my preliminary > > sweeps. > > > > A frequency counter, even a high end unit, is so insensitive as to be > > essentially worthless for sweeping. > > > > A low powered device will not register reliably on the thing unless you > > are very close. > > Of course it won't!! > > > > > > > "Near field" by definition, is within a wavelength. > > > > > By Whose definition? > > > > > > > A full wavelength for a typical 500 megacycle transmitter is about 22 > > inches. > > > > At 2.4 gigs, it is 4.5 inches. > > > > A more appropriate device, not sold at Radio Shack or ham radio outlets, > > will hear a potential hostile transmitter one hundred times as far as a > > typical high end frequency counter. > > You mean the kind of equipment that YOU SELL??? > Money wouldn't motivate this statement, would it? > > > > > > > Sweeping my office with a fifteen thousand dollar IFR service monitor > > incorporating a counter, using a remote antenna on a length of cable, > > results in reading dozens of signals, none of them hostile, many of them > > in suspicious frequency regions. How would you tell the difference? > > By knowing what frequency band the signals would probably be located. > > > > > > > If you are using a frequency counter you are fooling yourself. > > IOW, Mine is longer than yours?? > > > > > > > If you are charging money for doing so, you are cheating your customer. > > Yeah, right. > > > > > > > Your conscience. > > > > Damn right it is. > > > > > Steve > > I decline to reply in terms that you will understand. > > Just keep in mind the source here, folks, Someone who is selling > multi thousand > dollar equipment. (see his sigfile) for "bug sweeps" > IOW, just give me your dollars, and I will make you an instant "expert" > > > > > > > ******************************************************************* > > Steve Uhrig, SWS Security, Maryland (USA) > > Mfrs of electronic surveillance equip > > mailto:Steve@s... website http://www.swssec.com > > tel +1+410-879-4035, fax +1+410-836-1190 > > "In God we trust, all others we monitor" > > ******************************************************************* > > > > ------------------------------------------------------------------------ > Remember four years of good friends, bad clothes, explosive chemistry > experiments. > http://click.egroups.com/1/7077/1/_/507420/_/964130495/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 939 From: Date: Thu Jul 20, 2000 9:46pm Subject: Re: re: Carrier Current/Subcarrier In a message dated 7/20/00 3:04:16 PM Pacific Daylight Time, DrPepper@i... writes: << I just think I'll drop this list! >> Make the world a better place. 940 From: William Knowles Date: Fri Jul 21, 2000 3:58am Subject: Officer punished for loss of secrets http://www.the-times.co.uk/news/pages/tim/2000/07/21/timnwsnws01021.html See also: http://www.telegraph.co.uk:80/et?ac=003158974643279&pg=/et/00/7/21/noff21.html July 21st 2000 A Royal Navy officer has been severely reprimanded for leaving top secret documents and disks in the boot of his car, from which they were stolen. Commander Paul Lloyd, 39, admitted breaching security rules while working on advice on the Navy's readiness for the year 2000 in June last year. A court martial severely reprimanded Commander Lloyd. The court was told that he left a laptop computer, several floppy disks and confidential documents inside his car outside his lodgings in Northwood, West London. It was broken into and among the items stolen were three black floppy disks, one of which contained secret information relating to a exercise named Operation Hercules Casbah and a visit to East Africa. Three printed documents which formed part of the contingency plan for the Millennium entitled Operation Purple Wizard were also stolen as well as an attachable hard disc drive. The files and the floppy disks were recovered by members of the public from a common near South Harrow, but the laptop computer and the hard disc drive were not found. The court was told that Commander Lloyd joined the Royal Navy in 1979 and was quickly promoted to commanding officer of HMS Cygnet, before joining the aircraft carrier HMS Illustrious as navigator. Brigadier David Richards, commander joint forces, said Commander Lloyd "was the one who would take his work home with him and cut the weekend short". Commodore Robert Bradshaw, president of the hearing panel, acknowledged the officer's record but said: "The error of judgment and ignoring of basic security procedures cannot be overlooked." *-------------------------------------------------* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen. Alfred. M. Gray, USMC --------------------------------------------------- C4I Secure Solutions http://www.c4i.org *-------------------------------------------------* 941 From: DrPepper Date: Fri Jul 21, 2000 8:28am Subject: Re: re: Carrier Current/Subcarrier I agree wiyth you on the Opto Scout. It's worthless for this kind of work. I was not refering to that device. And I never mentioned it!. Miguel Puchol wrote: > Dear Dr. Pepper, > > I have had the Opto MicroCounter, Cub, Scout and Xplorer, not one of the > could detect your average wideband FM placed on Band II (88-108MHz), > basically due to the overwhelming power of the kilowatt commercial sites. > The one with the farthest 'range', so to speak, was the Xplorer, but only > due to it being a fast scanner rather than a frequency counter. Once, while > I was in a mountain range away from most of the RF usually present where I > live, it picked up an airliner that passed some 20000' overhead. > > If you go anywhere near other RF sources you WILL need at least some good > bandpass prefilters. Even then, you need to have the bug sooooooo close to > the counter..... > > Please don't attack list members as you do, everyone has his methods, tools > and equipment, aswell as experience, of which, from a scale of 1 to 100 I > would say to be on 2 or 3....so not all is back-patting. > > Mike > > > -----Mensaje original----- > > De: DrPepper [mailto:DrPepper@i...] > > Enviado el: jueves, 20 de julio de 2000 19:49 > > Para: TSCM-L@egroups.com > > Asunto: Re: [TSCM-L] re: Carrier Current/Subcarrier > > > > > > Well, Steve, , , , , , , , , , , , , > > > > I have been in the auditing business for over thirty five years, and I am > > a Registered Professional Engineer, retired from the "G" > > > > I have found bugs with this simple device, and it's actually very > > sensitive. > > Since you are an "expert", I expect that you sell fancy equipment and > > tell people thay can rely on them instead of their senses. > > > > You know, , , On second thought, , , , , , , > > > > I'm getting very tired of the snide remarks on this List, so I > > think that it's > > probably just a list for people who slap each other on the back, and tell > > everyone how big of an "expert" they are. > > > > Since I'm not really into penis measuring, I just think I'll drop > > this list! > > > > Good luck guys, , just keep on deluding yourselves. > > > > ================================================ > > > > Steve Uhrig wrote: > > > > > Once upon a midnight dreary, DrPepper pondered, weak and weary: > > > > > > > Hmmmmmm! > > > > > > > That's why I use a near feild frequency counter for my preliminary > > > sweeps. > > > > > > A frequency counter, even a high end unit, is so insensitive as to be > > > essentially worthless for sweeping. > > > > > > A low powered device will not register reliably on the thing unless you > > > are very close. > > > > Of course it won't!! > > > > > > > > > > > "Near field" by definition, is within a wavelength. > > > > > > > > By Whose definition? > > > > > > > > > > > A full wavelength for a typical 500 megacycle transmitter is about 22 > > > inches. > > > > > > At 2.4 gigs, it is 4.5 inches. > > > > > > A more appropriate device, not sold at Radio Shack or ham radio outlets, > > > will hear a potential hostile transmitter one hundred times as far as a > > > typical high end frequency counter. > > > > You mean the kind of equipment that YOU SELL??? > > Money wouldn't motivate this statement, would it? > > > > > > > > > > > Sweeping my office with a fifteen thousand dollar IFR service monitor > > > incorporating a counter, using a remote antenna on a length of cable, > > > results in reading dozens of signals, none of them hostile, many of them > > > in suspicious frequency regions. How would you tell the difference? > > > > By knowing what frequency band the signals would probably be located. > > > > > > > > > > > If you are using a frequency counter you are fooling yourself. > > > > IOW, Mine is longer than yours?? > > > > > > > > > > > If you are charging money for doing so, you are cheating your customer. > > > > Yeah, right. > > > > > > > > > > > Your conscience. > > > > > > > Damn right it is. > > > > > > > > Steve > > > > I decline to reply in terms that you will understand. > > > > Just keep in mind the source here, folks, Someone who is selling > > multi thousand > > dollar equipment. (see his sigfile) for "bug sweeps" > > IOW, just give me your dollars, and I will make you an instant "expert" > > > > > > > > > > > ******************************************************************* > > > Steve Uhrig, SWS Security, Maryland (USA) > > > Mfrs of electronic surveillance equip > > > mailto:Steve@s... website http://www.swssec.com > > > tel +1+410-879-4035, fax +1+410-836-1190 > > > "In God we trust, all others we monitor" > > > ******************************************************************* > > > > > > > > ------------------------------------------------------------------------ > > Remember four years of good friends, bad clothes, explosive chemistry > > experiments. > > http://click.egroups.com/1/7077/1/_/507420/_/964130495/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > ------------------------------------------------------------------------ > Old school buds here: > http://click.egroups.com/1/7081/1/_/507420/_/964157205/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 942 From: Mike F Date: Fri Jul 21, 2000 1:22pm Subject: Security Management Online Security Links Security Management Online Security Links . http://www.securitymanagement.com/library/000132.html#icompsec L8R4,Mike f. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 943 From: Mike F Date: Fri Jul 21, 2000 1:22pm Subject: Security Management Online Articles Here is Security Management's Online Articles and Resources Concerning Computer Security. Please go to their main Online Page near the Bottom of the web page. http://www.securitymanagement.com/library/000895.html L8R4,Mike f. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 944 From: Miguel Puchol Date: Fri Jul 21, 2000 1:30pm Subject: RE: re: Carrier Current/Subcarrier Could you then point to a worthy near field receiver / counter, something that will pick up a cordless phone from more than 4-5 meters away? I personally don't know of any, well, er, yes, a spectrum analyzer.... Cheers, Mike > -----Mensaje original----- > De: DrPepper [mailto:DrPepper@i...] > Enviado el: viernes, 21 de julio de 2000 15:29 > Para: TSCM-L@egroups.com > Asunto: Re: [TSCM-L] re: Carrier Current/Subcarrier > > > I agree wiyth you on the Opto Scout. > It's worthless for this kind of work. > I was not refering to that device. > And I never mentioned it!. 945 From: Dawn Star Date: Fri Jul 21, 2000 1:43pm Subject: bugs welcome here! Several weeks ago I posted a "Discovery Notification Procedures" which resulted in quite a few private messages on the subject as well as a number of public postings. jma In the 27 years that I've been sweeping more than half the time I found the bug or tap the client chose to leave the device in place and feed it bad info, in some cases the results were outstanding and the snoops ended up with completely undesirable results, saying this in the latest list verbology "they were left with their dicks in their hands!" Roger Tolces, Electronic Security, Los Angeles [Non-text portions of this message have been removed] 946 From: Robert G. Ferrell Date: Fri Jul 21, 2000 1:57pm Subject: Re: Security Management Online Articles >Here is Security Management's Online Articles and Resources Concerning >Computer Security. Good site, Mike. Thanks. RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 947 From: James M. Atkinson, Comm-Eng Date: Fri Jul 21, 2000 1:56pm Subject: Watch the Language Uh folks... let's try to watch the language on the list as some readers may have been offended by some of the more colorful comments made over the last few days. Let's keep it professional folks, -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 948 From: 1RCM <1RCM@M...> Date: Fri Jul 21, 2000 2:42pm Subject: Ouch! I have been a sweeper for a few years and once found a buck missing during an audit of my piggy bank - so there, the smacks in the face continue. Steve Uhrig's honor has been defended (not that HE needs anyone else to do that for him) and the gauntlet is again laid at the feet of Dr. Pepper. But Dr. Pepper, before you respond back this time try to lighten-up a bit and take a look at life from a slightly different perspective. The self-pats on the back, the egos (bruised or inflated), and all the rest of that crap are a normal part of every list. But thankfully that kind of petty BS has been kept pretty well in check on this one. The bottom line here is that you made a statement and then someone else called you on it in not to subtle of a way. Well then may I suggest that you fight back professionally with facts, figures, data, examples or information - don't throw a tantrum, call someone names, or pack your toys and go home. Strong words - naugh! But I will add my personal two-cents in that I believe that you as a list member did wrongly attack a fine, decent, professional and well-respected list member (whom I also count as a friend) improperly and unnecessarily. Steve's admittedly gruff and a very straight-shooter at times but I personally and professionally find every word of his response to be true. So I'll gladly read with great interest any technical or moral rebuttal that you or any other list member might offer to prove him wrong. But please Dr. pepper, don't go throwing personal/professional stones at the man - especially when you apparently don't even know him. So allow me to make the pre-fight introductions: In this corner we have Steve Uhrig who makes his living manufacturing and selling electronic stuff other than TSCM toys (although he does also cut a mean deal on a good used Minox camera). He certainly has enough contacts and clients whereby he can easily buy or make TSCM toys and re-sell them at a substantial mark-up (which he does not do) but, as was pointed out, he does at times deal in used TSCM goods. But I venture to say that I am by far, far not the only individual on this list who when he first started out or as he progressed in the business greatly benefited from Steve's referral to other sources for better prices, his refusal to sell used items that he had because the person's needs and the item were not a 'good match', his 'free' consultations and recommendations, etc., etc. And I never once remember hearing him call/consider himself an "expert" - although looking through the credits for the movie 'Enemy of the State' Jerry Bruckheimer called him that, and a number of private companies and Government alphabet agencies have called him that in their letters of testament, and quite a few list members consider him to be that - but hey, what's in a silly old title anyhow? And in the other corner we have Dr. Pepper. Sir I don't know you from Adam. In the past I seem to remember that you have made some credible and informative posts to the list - but this low-blow now has you on the ropes and way behind on points on my score card (and probably on that of many others on this list as well). So guys, shake hands and come out swinging to defend your opposing positions - but Dr. pepper, keep the cheap-shots out of it or many other list members might also challenge you to defend your honor as well as your statements in a bit more less-than-subtle way than I have. Well, my fingers are now too tired to type my own moral and technical defenses of Steve's reply. And so I think I'll just go and un-delude myself by measuring my own penis. For you never know when the moderator might to decide to post a "Is Your Penis Long Enough To Be A TSCM Expert?" chart on his already-amazing web site! Just another "Bob". 949 From: Miguel Puchol Date: Fri Jul 21, 2000 5:11pm Subject: RE: Ouch! Just a word in edgeways, regarding 'Enemy of the state': Do you remember the scene where Smith goes into the tunnel and the bad guys talk to the 'tunnel police' - on a HF rig!! If you look closely you will see that they talk on something like 2MHz (I don't remember exactly, but it was low HF). Also, they use a Scout to capture a cordless phone from some 10 miles away through a few city blocks..... Oh, and don't forget the morse code controlled super spy satellite !!! I do sincerely hope Steve didn't have anything to do with those bits ;-) I suppose it was more to do with the Faraday cage Hackman has, which was more 'believable'. Cheers! Mike P.S. These comments are not to be taken offensively, as personal or group criticism or anything else, or else I'll direct a remote-controlled (with DTMF by the way) meteorite directly at your house!!! Keep up the fun, not the flames !!! 950 From: James M. Atkinson, Comm-Eng Date: Fri Jul 21, 2000 5:14pm Subject: Re: Nonlinear junction detector for sale Looks like a real deal, but if you want it I expect that you'll have to move quick.It is one hell of a good price at only five grand (but you had better move fast or it will cost you more). Steve, is right about a NLJD separating the men from the boys... it is a very valuable piece of equipment that will pay for itself in a very short period of time. If your interested in reading a tutorial about how NLJD's are used you can check out the following link: http://www.tscm.com/tmdenljd.html -jma At 12:10 PM -0400 7/18/00, Steve Uhrig wrote: >For sale is an ISA-1 Nonlinear Junction Detector, with all accessories >and fitted hard case. > >Unit has been gone over completely by me, several minor repairs made, >aligned for max output and aluminum threads in antenna where pole and >universal attaches have had a helicoil insert for maximum strength. [snip} >There are two ways to find a bug whose battery has run down: physical >inspection and nonlinear junction detection. You can save a tremendous >amount of time over a physical search with competent use of this unit. >Plus, you don't have to disturb the area as much, which is a factor when >you are in an executive office. > >A piece like this can separate the men from the boys. > >I am advertising this piece elsewhere for only $5500 plus freight. This >is about 25% of original cost. For one week, until July 25th, members of >this list may take another 10% off, for a lowered total of $5000. Save >$500 by being a member of this list. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 951 From: James M. Atkinson, Comm-Eng Date: Fri Jul 21, 2000 5:30pm Subject: RE: Ouch! At 12:11 AM +0200 7/22/00, Miguel Puchol wrote: >Just a word in edgeways, regarding 'Enemy of the state': > >Do you remember the scene where Smith goes into the tunnel and the bad guys >talk to the 'tunnel police' - on a HF rig!! If you look closely you will see >that they talk on something like 2MHz (I don't remember exactly, but it was >low HF). Yah, so? Tunnelers and miners often use HF radios down below 6 MHz as UHF/VHF is virtually worthless underground. >Also, they use a Scout to capture a cordless phone from some 10 miles away >through a few city blocks.. (snicker) Hell, you can detect bugs with that sucker from miles away (snicker) >Oh, and don't forget the morse code controlled super spy satellite !!! The NRO is having budget problems these days so they are teaching monkey's how to ditty-bop and are launching them into space as spies. ...and for a real treat did you take a moment to copy down the hidden message contain in the morse code transmission in the movie? >I do sincerely hope Steve didn't have anything to do with those bits ;-) I >suppose it was more to do with the Faraday cage Hackman has, which was more >'believable'. Actually, I belive that Steve was the guy who designed the "Jar" that appeared in the movie... Hell, I would have been happy to but the thing after the movie, it was a great design. >Cheers! > >Mike > > >P.S. These comments are not to be taken offensively, as personal or group >criticism or anything else, or else I'll direct a remote-controlled (with >DTMF by the way) meteorite directly at your house!!! > >Keep up the fun, not the flames !!! > Nah, when producers create movies they engage technical consultants (such as Steve), and "Artist Consultants" to give the look and feel. I am aware of the consulting that Steve (and others) did concerning the movie, and ALL or it, REPEAT all of it that he was involved in was the legitimate and accurate real world of surveillance activities. On the other hand some of the "Artistic Consultants" took some serious licence with the technology, but all of Steve's stuff was "Real World Stuff" (which is why he was brought in). -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 952 From: James M. Atkinson, Comm-Eng Date: Fri Jul 21, 2000 5:31pm Subject: Re: Avcom PSA 65C for sale At 1:13 PM +0000 7/20/00, bradhayes_mentalist@y... wrote: >I have the following for sale. An Avcom PSA 65C, 2 frequency >extenders (1250-2500Mhz,2500-3750Mhz),Fm video demodulator/AM video >converter, Software/Converter for IBM PC, and an Avsac Black Nylon >Carrying case. I paid $5600 new in August '99. This unit has never >been used in the field. Software never used. All equiptment is in >Excellent A++ condition. Unit has not been calibrated since first >purchased. I am asking $4000 for all, but I will discount to $3750 >and pay shipping only for members of this list. This offer good until >July 31st. Will not ship outside the U.S.. Personal or Company Checks >must clear my bank prior to shipping. >Regards, >Brad Hayes Ahem, Four grand is a really good price, and the "professional courtesy price" is even better. The PSA-65 units are great little analyses, and the cost a fraction of the big lab grade units. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 953 From: Miguel Puchol Date: Fri Jul 21, 2000 5:44pm Subject: RE: Ouch! James, > Yah, so? Tunnelers and miners often use HF radios down below 6 MHz as > UHF/VHF is virtually worthless underground. When I used to be in Mountain Rescue the Cave Rescue guys used to lumber around these huge heavy HF radios to talk to the people underground - you're talking a lot of rock between rigs. It was the only thing that worked. Before they used cabled telephones!!! At least here in Spain all tunnels (and we don't have that many that need comms) use either VHF or radiant cable. The longest tunnel is some 5 miles long, and they use VHF for that. > Actually, I belive that Steve was the guy who designed the "Jar" that > appeared in the movie... Hell, I would have been happy to but the > thing after the movie, it was a great design. Maybe he can send us the schematics.... > On the other hand some of the "Artistic Consultants" took some > serious licence with the technology, but all of Steve's stuff was > "Real World Stuff" (which is why he was brought in). True. I have a list of such things, like when a computer screen's image reflects perfectly on the user's face, all OS systems are compatible between them - the top one being 'Independence Day' where a Mac brings down a whole alien empire with some kind of virus/worm. Regards, Mike 954 From: Steve Uhrig Date: Fri Jul 21, 2000 6:04pm Subject: Enemy of the State Once upon a midnight dreary, Miguel Puchol pondered, weak and weary: > Just a word in edgeways, regarding 'Enemy of the state': > Do you remember the scene where Smith goes into the tunnel and the bad > guys talk to the 'tunnel police' - on a HF rig!! If you look closely you > will see that they talk on something like 2MHz (I don't remember exactly, > but it was low HF). Yes. This was because we approached Kenwood, Yaesu and ICOM for loaner or donated equipment for the movie. Yaesu said sure, anything you want, and gave us quite a number of tiny handhelds. I don't remember the model number. Those were used in the scene where the NSA cats were raiding Hackman's secret lab. You have to look closely to see them. Kenwood said, sure, anything we wanted, name it. The director said something with a lot of knobs, very hi tech looking, so Kenwood donated a nice HF radio. Had to work it in somewhere. What did you want us to do, put it on a transverter to work the local UHF police channels? !!! ICOM said if we want anything we can go buy it from a dealer for whatever price the dealer charges. So we wrote them out of things. The R8500 you may see on the counter in the electronics shop (the scene where I appear, or at least my voice does) is my personal R8500 leased to the production. > Also, they use a Scout to capture a cordless phone from some 10 miles > away through a few city blocks. You mean this can't be done? > Oh, and don't forget the morse code controlled super spy satellite !!! I had to manually write the dits and dahs down on paper for the production assistant. I tried to work my ham call into the satellite's CW, which would be the ultimate ego trip, but it was beyond them. CQ has a nice repeating rhythm (dah di dah dit dah dah di dah). > I do sincerely hope Steve didn't have anything to do with those bits 90% of the thing was accurate, and most of the equipment shown was the genuine stuff we manufacture for governments worldwide. All the covert video was real. The wireless smoke detector actually had video and audio, worked over a fairly respectable range of several thousand feet, and had enough battery life to last through days of intermittent operation. The wireless video/audio body cameras were real. So was the camera and transmitter in the Christmas Tree ornament. And the wireless video/audio setup in the air vent in the Senator's suite. Phones bugged. Bumper Beeper. Transmitter in a lamp. Most of the tracking equipment. Etc. Some of the handheld gadgets the bad guys were using were Marty Kaiser's original creations. Again, the real thing, not dummy mockups for the screen. I leased an Xplorer to the production, which was used by the bad guys sweeping Hackman when he was in the Baltimore City Police uniform behind the fence. There was artificial rain at the time from a rain tower, which drowned the Xplorer, so they bought me another one. You can't see the thing very well. > ;-) I suppose it was more to do with the Faraday cage Hackman has, > which was more 'believable'. The set people did an excellent job of building the screen room to Marty and my specs. They used the mesh size they were told, and used real copper, with many of the seams actually soldered and the door RF gasketed. They used acid to artifically age the copper. The screen room worked so well that the sound people could not even hear the signals from the wireless mikes on Hackman and Will Smith literally ten feet away. The mikes are very low powered, and the sound guys were swapping all the equipment, hanging Yagi antennas etc. all to no avail. I took a piece of coax, stripped the center conductor out and cut off the braid, and shoved the coax down through a hole in the screen at the rear of the screen room. That worked well, and the audio you hear was received by that antenna. We did the original screen room in the first floor of the building in Baltimore, which later was blown up. In the movie, the screen room was on the second floor, but in reality it was on the ground floor. Upstairs was a styrofoam screen room, identical in appearance, which was never manned but was what you saw destruct when the bomb went off. The original screen room was disassembled and shipped back to Hollywood along with all the junk we had in it (hamfest and used test equipment floor sweepings). The scenes later had to be reshot for some reason, but the building had been blown up by then. So the set and screen room was reconstructed in Hollywood in the studio using some Polaroid photos and digital camera photos I had taken and emailed to them. I had to mail them a Tek O'scope and IFR service monitor you see Hackman playing with in the jar. They couldn't find one locally to match. In another excellent equipment scene, a listening post very elaborate with tons of our surveillance equipment (sanitized because it is current production, the genuine government issue), they had to reshoot that because of a lighting problem. The reshoots are months later after they have pretty much assembled the movie and critics have already commented on the prerelease. Some of the equipment in that listening post was new gear we had just completed and was already purchased by a South American government. I loaned it to them for one day and one day only of shooting. When they called me and said they needed to reshoot and could they lease all that gear again, I couldn't help them. I had already installed the stuff in Bogota. So that entire scene, hundreds of thousands of dollars worth of effort, set building, actors, 200+ filmmakers on union scale, all had to be scrapped. While I was sort of willing to make them a mockup, I could not do it to meet their timetable. Yeah, they were willing to throw money at it, but it still takes nine months to have a baby regardless of how many women you get pregnant. How many of you noticed Hackman sweeping the screen room (aka "jar") with a Scanlock when he first enters? I had a complete Scanlock with Compuscan, spectrum scope and all the accessories running on the left wall inside the door about chest level. You barely see it, but you do see Hackman doing a ten second sweep of the place using the Scanlock antenna on a cable. Later on in the Senator's suite, after they have found the bugs, you see NSA techs in the background sweeping the suite using my same Scanlock. There is a short guy with the thing over his shoulder sweeping using the same antenna. Could go into a lot more of the behind-the-scenes but enough for now. More info is available at: http://movieweb.com/movie/enemystate/enemy.txt Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 955 From: EDT Date: Fri Jul 21, 2000 5:43pm Subject: now now Is one you guys actually Mike Tyson incognito? 956 From: Date: Fri Jul 21, 2000 6:19pm Subject: Re: Enemy of the State GREAT MOVIE !!! Thanks Steve and Marty and others!! kept me on the edge of my seat!! HAVE A GREAT DAY !!! 957 From: Miguel Puchol Date: Fri Jul 21, 2000 6:35pm Subject: RE: Enemy of the State Hi Steve! > Once upon a midnight dreary, Miguel Puchol pondered, weak and weary: You poet! > Yaesu said sure, anything you want, and gave us quite a number of tiny > handhelds. I don't remember the model number. Those were used in the > scene where the NSA cats were raiding Hackman's secret lab. You have to > look closely to see them. I think it was the FT-50. Will see the movie again tonight and check. > Kenwood said, sure, anything we wanted, name it. The director said > something with a lot of knobs, very hi tech looking, so Kenwood donated a > nice HF radio. Had to work it in somewhere. What did you want us to do, > put it on a transverter to work the local UHF police channels? !!! For the movie effects it looked great. In 'The fugitive' the Marshalls use real Motorola trunked radios, you can even hear the FSK channel sync bursts... It's just that I can become very picky with movies in this areas - professional deformation as we say across the pond. > ICOM said if we want anything we can go buy it from a dealer for whatever > price the dealer charges. So we wrote them out of things. The R8500 you > may see on the counter in the electronics shop (the scene where I appear, > or at least my voice does) is my personal R8500 leased to the production. Typical....... > > Also, they use a Scout to capture a cordless phone from some 10 miles > > away through a few city blocks. > > You mean this can't be done? OK, let's drop that one. > 90% of the thing was accurate, and most of the equipment shown was the > genuine stuff we manufacture for governments worldwide. All the covert > video was real. The wireless smoke detector actually had video and audio, > worked over a fairly respectable range of several thousand feet, and had > enough battery life to last through days of intermittent operation. The > wireless video/audio body cameras were real. So was the camera and > transmitter in the Christmas Tree ornament. And the wireless video/audio > setup in the air vent in the Senator's suite. Phones bugged. Bumper > Beeper. Transmitter in a lamp. Most of the tracking equipment. Etc. OK, those are the things you don't pay attention to. It's usual to focus on details which 'dilute' reality, and not look closely at other details that make it much more real. > I leased an Xplorer to the production, which was used by the bad guys > sweeping Hackman when he was in the Baltimore City Police uniform behind > the fence. There was artificial rain at the time from a rain tower, which > drowned the Xplorer, so they bought me another one. You can't see the > thing very well. I forgot about that one!! Shame about the rig, it's not a cheap unit (for what it is). > How many of you noticed Hackman sweeping the screen room (aka "jar") with > a Scanlock when he first enters? I had a complete Scanlock with > Compuscan, spectrum scope and all the accessories running on the left > wall inside the door about chest level. You barely see it, but you do see > Hackman doing a ten second sweep of the place using the Scanlock antenna > on a cable. I do admit I didn't notice, see above regarding not paying attention to important details... Thanks for the info, it's great to know. I think I will enjoy the movie even more now!! All the best, Mike 958 From: James M. Atkinson, Comm-Eng Date: Fri Jul 21, 2000 6:28pm Subject: TSMC'er Measuring Contests In the world of "TSMC'er Measuring Contests" some are John Holmes... and some are John Bobbitt. Sorry, I just couldn't resist. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 959 From: Miguel Puchol Date: Fri Jul 21, 2000 7:02pm Subject: RE: TSMC'er Measuring Contests Sorry, I couldn' resist this either - I though it could be too much, but here goes The TSCM ScoreBoard Name Surname Email Years as TSCM'er Size of reproductory / urinary element ============================================================================ =========== - - - - Just fill it in and pass it along!!! Mike > -----Mensaje original----- > De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] > Enviado el: s·bado, 22 de julio de 2000 1:29 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] TSMC'er Measuring Contests > > > In the world of "TSMC'er Measuring Contests" > some are John Holmes... and some are John Bobbitt. > > Sorry, I just couldn't resist. > > -jma > > =================================================================== > Everybody's into computers... Who's into yours?Å > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > "By the pricking of my thumbs, something wicked this way comes." > - Macbeth, Shakespeare > =================================================================== > > ------------------------------------------------------------------------ > The future belongs to Wireless. > Learn Wireless Development Now! > http://click.egroups.com/1/6355/1/_/507420/_/964223511/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 960 From: Date: Fri Jul 21, 2000 3:06pm Subject: Re: TSMC'er Measuring Contests Those that can Sweep, those that can't or have no business make useless posts. 961 From: James M. Atkinson, Comm-Eng Date: Fri Jul 21, 2000 7:06pm Subject: RE: SLFCS Radio Gear "Earth Carrier" At 12:44 AM +0200 7/22/00, Miguel Puchol wrote: >James, > > > Yah, so? Tunnelers and miners often use HF radios down below 6 MHz as > > UHF/VHF is virtually worthless underground. > >When I used to be in Mountain Rescue the Cave Rescue guys used to lumber >around these huge heavy HF radios to talk to the people underground - you're >talking a lot of rock between rigs. It was the only thing that worked. >Before they used cabled telephones!!! > >At least here in Spain all tunnels (and we don't have that many that need >comms) use either VHF or radiant cable. The longest tunnel is some 5 miles >long, and they use VHF for that. I have personally worked with, designed, installed, and maintained SLFCS radio gear where the transmission antenna is actually buried in the ground, and the transmission frequency is rarely above 100 kHz. The receive antenna on the other end was buried under a mile or more of Granite, or deep underneath the ocean on a submarine. I was on the ELF-ONE and ELF-TWO projects back in the 80's and found them to be really interesting (you have to do some pretty bizarre things to get a signal to bounce around inside the Earths mantle. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== From: blacksunshine1999 Date: Tue Jul 20, 2004 7:55am Subject: Re: Glad I don't live there I have been in the background here for quite a few years, taking notes from all of yall. This is my first post. I recently changed my prefs to get a digest instead of every message to help weed out what I want to read. I agree with Steve's comments below. I've learned a great deal of information from this list from people such as Steve and James. However, I pay less attention to the boards messages than I once did because only 1 or 2 out of 10 even interest me anymore in reference to TSCM. If the list could be like it was a few years back, with posts about new threats, finds, equipment, occasional jokes, and James telling us he kicked someone out because they came here to hawk their crap that would be great. Sorry if I rattled on. Ted Swailes --- In TSCM-L@yahoogroups.com, "Steve Uhrig" wrote: > Once upon a midnight dreary, Noel E. Hanrahan pondered, weak and weary: > > > 'Victims' unnerved by mock gas alert > > AND THIS PERTAINS TO TSCM EXACTLY HOW? > > IT'S JUST RAISING THE NOISE LEVEL ON AN ALREADY NOISY LIST. > > PLEASE POST THIS IRRELEVANT MATERIAL TO ONE OF THE OTHER 50,000 LISTS > WHICH ARE *NOT* 'ALLEGEDLY' DEDICATED TO TSCM. > > YES, I'M SHOUTING. > > > > MODERATOR, PLEASE DISCIPLINE YOUR LIST OR CHANGE THE POSTED MISSION OF IT > SO PEOPLE ARE NOT MISLED AND VALUABLE TIME WASTED. > > Anyone feeling the same way, please speak up. > > The number of people suggesting a *disciplined* TSCM list be established > is increasing. > > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* 9109 From: kondrak Date: Tue Jul 20, 2004 11:57am Subject: Re: Re: Glad I don't live there I tend to agree. Many of us have close contacts with Emergency preparedness and DHS people, and the article was welcome. Not everyone is going to have a hot TSCM story to relate every time, every day. The list is fine and run well IMHO. At 15:52 7/19/2004, you wrote: >I think the moderator does a great job, and I believe >the option your looking for is the D-E-L-E-T-E key. >The D-E-L-E-T-E Key is most effective at eliminating >SPAM or unwanted emails that you judge as not on point >instead of creating more emails telling us it is spam >or of know interest to you. > >I found the article very interesting and only wish we >were practicing and prepared. > > > >Jon Asdourian >Data Forensics Engineering > > >--- Steve Uhrig wrote: > > Once upon a midnight dreary, Noel E. Hanrahan > > pondered, weak and weary: > > > > > 'Victims' unnerved by mock gas alert > > > > AND THIS PERTAINS TO TSCM EXACTLY HOW? > > > > IT'S JUST RAISING THE NOISE LEVEL ON AN ALREADY > > NOISY LIST. > > > > PLEASE POST THIS IRRELEVANT MATERIAL TO ONE OF THE > > OTHER 50,000 LISTS > > WHICH ARE *NOT* 'ALLEGEDLY' DEDICATED TO TSCM. > > > > YES, I'M SHOUTING. > > > > > > > > MODERATOR, PLEASE DISCIPLINE YOUR LIST OR CHANGE THE > > POSTED MISSION OF IT > > SO PEOPLE ARE NOT MISLED AND VALUABLE TIME WASTED. > > > > Anyone feeling the same way, please speak up. > > > > The number of people suggesting a *disciplined* TSCM > > list be established > > is increasing. > > > > > > > > >******************************************************************* > > Steve Uhrig, SWS Security, Maryland (USA) > > Mfrs of electronic surveillance equip > > mailto:Steve@s... website > > http://www.swssec.com > > tel +1+410-879-4035, fax +1+410-836-1190 > > "In God we trust, all others we monitor" > > >******************************************************************* > > > > > > > > > > >__________________________________ >Do you Yahoo!? >Vote for the stars of Yahoo!'s next ad campaign! >http://advision.webevents.yahoo.com/yahoo/votelifeengine/ > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9110 From: Michael Puchol Date: Tue Jul 20, 2004 0:34pm Subject: Off-topic proposal Hi, I'd like to make a proposal which I think may suit everyone - if you post anything which can be considered off-topic, simply add a text such as [OT] or similar to the subject line. This way it's very easy to create a filter (all email programs have this function) to automatically classify and send off-topic messages to a special folder, or to the trash bin if so desired. We'd all have to agree on the off-topic header text, but something that's unlikely to appear in a normal subject line (such as [OT], with square brackets and all) is enough. I'm willing to make a short tutorial explaining the process of creating the filter in the two or three most common email clients if this goes ahead. Best regards, Mike ----- Original Message ----- From: "kondrak" To: Sent: Tuesday, July 20, 2004 6:57 PM Subject: Re: [TSCM-L] Re: Glad I don't live there > I tend to agree. Many of us have close contacts with Emergency preparedness > and DHS people, and the article was welcome. Not everyone is going to have > a hot TSCM story to relate every time, every day. The list is fine and run > well IMHO. > > At 15:52 7/19/2004, you wrote: > >I think the moderator does a great job, and I believe > >the option your looking for is the D-E-L-E-T-E key. > >The D-E-L-E-T-E Key is most effective at eliminating > >SPAM or unwanted emails that you judge as not on point > >instead of creating more emails telling us it is spam > >or of know interest to you. > > > >I found the article very interesting and only wish we > >were practicing and prepared. > > > > > > > >Jon Asdourian > >Data Forensics Engineering > > > > > >--- Steve Uhrig wrote: > > > Once upon a midnight dreary, Noel E. Hanrahan > > > pondered, weak and weary: > > > > > > > 'Victims' unnerved by mock gas alert > > > > > > AND THIS PERTAINS TO TSCM EXACTLY HOW? > > > > > > IT'S JUST RAISING THE NOISE LEVEL ON AN ALREADY > > > NOISY LIST. > > > > > > PLEASE POST THIS IRRELEVANT MATERIAL TO ONE OF THE > > > OTHER 50,000 LISTS > > > WHICH ARE *NOT* 'ALLEGEDLY' DEDICATED TO TSCM. > > > > > > YES, I'M SHOUTING. > > > > > > > > > > > > MODERATOR, PLEASE DISCIPLINE YOUR LIST OR CHANGE THE > > > POSTED MISSION OF IT > > > SO PEOPLE ARE NOT MISLED AND VALUABLE TIME WASTED. > > > > > > Anyone feeling the same way, please speak up. > > > > > > The number of people suggesting a *disciplined* TSCM > > > list be established > > > is increasing. > > > > > > > > > > > > > >******************************************************************* > > > Steve Uhrig, SWS Security, Maryland (USA) > > > Mfrs of electronic surveillance equip > > > mailto:Steve@s... website > > > http://www.swssec.com > > > tel +1+410-879-4035, fax +1+410-836-1190 > > > "In God we trust, all others we monitor" > > > > >******************************************************************* > > > > > > > > > > > > > > > > > > >__________________________________ > >Do you Yahoo!? > >Vote for the stars of Yahoo!'s next ad campaign! > >http://advision.webevents.yahoo.com/yahoo/votelifeengine/ > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9111 From: William Knowles Date: Tue Jul 20, 2004 3:14pm Subject: Re: Off-topic proposal I would like to toss another idea to the list, what about another list, say TSCM-Off I am on another list full of security contractors, and when things got downright silly, (love of Krispy Kreme's - and shipping them to Iraq) the moderator punted things to the off list. The off list is totally unmoderated, topics range from being pseudo-related to security to again methods of shipping donuts to war zones unmolested, to basically anything but the discussion on the main list. The practitioners and the acedemics on the main list were happy to have their main list back from the shenanigans, and the usual suspects are happy they have a related soap-box to rant and rave, and not piss anyone off but themselves. I like the TSCM list, I really miss the old TSCM list, I would really like to see a TSCM-Off list so I can parse the signal from the noise. Cheers! William Knowles wk@c... On Tue, 20 Jul 2004, Michael Puchol wrote: > Hi, > > I'd like to make a proposal which I think may suit everyone - if you > post anything which can be considered off-topic, simply add a text > such as [OT] or similar to the subject line. This way it's very easy > to create a filter (all email programs have this function) to > automatically classify and send off-topic messages to a special > folder, or to the trash bin if so desired. We'd all have to agree on > the off-topic header text, but something that's unlikely to appear > in a normal subject line (such as [OT], with square brackets and > all) is enough. 9112 From: Steve Uhrig Date: Tue Jul 20, 2004 4:08pm Subject: Re: Off-topic proposal Once upon a midnight dreary, William Knowles pondered, weak and weary: > I would like to toss another idea to the list, what about another > list, say TSCM-Off That's this list. What we need is a list dedicated to TSCM. No lids, no kids, no space cadets. > I like the TSCM list, I really miss the old TSCM list, I would really like > to see a TSCM-Off list so I can parse the signal from the noise. You are not alone. This is the description of THIS list from Yahoogroups: ------ TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. ------ If a message doesn't fit the above, it doesn't belong here. That's half or more of the recent traffic, available on the yahoo website for this group for anyone who wants to do their own analysis. Or the description of the list should be changed so as not to be deceptive. We're supposed to be combatting deception, not abetting it. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9113 From: Ocean Group Date: Tue Jul 20, 2004 4:17pm Subject: RE: List Debate Steve If your interested the ATSCP has set up an online TSCM Professional Network open to all Bona Fide Professionals, it is sponsored by them and offered free of charge to all that qualify. You'll get info on their site and I'm sure you qualify just fine. The advantages are that there is less noise and dedicated news areas etc. The cons are that its fresh and that you can only access it online. In regards to this list, I have found many good topics throughout the past few years, but like ALL lists there is always some level of "noise". I should know, I have contributed to it! Cheers Ois 9114 From: Craig Meldrum Date: Tue Jul 20, 2004 5:00pm Subject: Re: Glad I don't live there I am afraid I have to agree with Steve. The whole purpose of "specialised" forums is to keep them related to the topic. I am sure there are hundreds of lists and forums dedicated to emergency preparedness, terrorism, law enforcement, emergency services etc etc to which anyone interested can also subscribe. As a receiver of a daily digest rather than individual postings from this list, it does annoy me to have to wade through 95% noise to find the odd bit of relevant information. Whilst on the subject, I have appealed before to people not to include the whole previous message in every posting. That just creates more noise. Thank you for your understanding. Regards Craig =============================== Craig Meldrum, Managing Director Communications Security Ltd PO Box 8314, Symonds St Auckland, New Zealand Ph: 64-9-3093386 Fax: 64-9-3021148 =============================== 9115 From: Hawkspirit Date: Tue Jul 20, 2004 6:15pm Subject: List Content Rogers comment: Right on Steve! I am doing three to five sweeps a week. Every sweep is different with different environments and phone systems to test in different ways with a variety of techniques. Every sweep can be a new learning experience. I could make a learning/ techniques applied comment to this list after every sweep. I can't be the only sweeper working in America? Or am I? How about some field comments from someone else! Roger Tolces Electronic Security Co. www.bugsweeps.com Date: Mon, 19 Jul 2004 13:06:01 -0400 From: "Steve Uhrig" Subject: Re: Glad I don't live there Once upon a midnight dreary, Noel E. Hanrahan pondered, weak and weary: > 'Victims' unnerved by mock gas alert AND THIS PERTAINS TO TSCM EXACTLY HOW? IT'S JUST RAISING THE NOISE LEVEL ON AN ALREADY NOISY LIST. PLEASE POST THIS IRRELEVANT MATERIAL TO ONE OF THE OTHER 50,000 LISTS WHICH ARE *NOT* 'ALLEGEDLY' DEDICATED TO TSCM. YES, I'M SHOUTING. MODERATOR, PLEASE DISCIPLINE YOUR LIST OR CHANGE THE POSTED MISSION OF IT SO PEOPLE ARE NOT MISLED AND VALUABLE TIME WASTED. Anyone feeling the same way, please speak up. The number of people suggesting a *disciplined* TSCM list be established is increasing. [Non-text portions of this message have been removed] 9116 From: Date: Tue Jul 20, 2004 7:34am Subject: Parabolic Dish Info Has anybody ever experimented with directional listening devices including the use of a Parabolic Dish. I am putting a few bits together to play around in my spare time. Nothing serious just interested more as a play/learning exercise, any of you Boffins out there with advice i.e. formulas, dish types, etc. would be most appreciated. Thanks Dave DEMTEC David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Countermeasures Specialist Electrical Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695 558544 07866206112 demtec@a... [Non-text portions of this message have been removed] 9117 From: Andy Cuff Date: Tue Jul 20, 2004 0:27pm Subject: Wireless Detector £12.51 Hi Thought a few of you might be interested in this following on from the mobile detector http://www.ebuyer.com/customer/products/index.html?rb=953129600&action=c2hvd19wcm9kdWN0X292ZXJ2aWV3&product_uid=63682 Kensington Wifi Finder "Your life on the road just got a lot easier. With the first and only WiFi detector on the market today, you no longer need to cross your fingers as you wait for your notebook to boot up. Just press a button and the Kensington WiFi Finder lets you know if your location is "hot"...instantly. No software or computer needed. What could be easier? " I haven't used one but wondered if anyone else had and what they thought? -andy Talisker Security Tools Directory http://www.securitywizardry.com 9118 From: Date: Tue Jul 20, 2004 3:30pm Subject: Rif: Re: Off-topic proposal > I would like to toss another idea to the list, what about another > list, say TSCM-Off Dear William, your proposal is a non sequitur. Your requirement is to diminish the noise. That is obtained by separating the noise from the signal. Michael's proposal does just that. You may object: "My proposal does it better" Perhaps, but it requires a lot of intervention by the moderator. Why not make life easier for the moderator? Thumbs up for Michael's proposal! Ciao! Remo 9119 From: larry chapman Date: Tue Jul 20, 2004 1:05pm Subject: Re: Mobile phone detector, 25/30m radius, at less than usa$50 The Mobile phone detector should have a number of uses. I can see Security and LEA applications. Has anyone used this device? ----- Original Message ----- From: cornali@r... Date: Tue, 20 Jul 2004 13:40:08 +0200 To: Subject: [TSCM-L] Mobile phone detector, 25/30m radius, at less than usa$50 > http://news.bbc.co.uk/2/hi/technology/3890959.stm > > Ciao! > Remo > > > -- _______________________________________________ Find what you are looking for with the Lycos Yellow Pages http://r.lycos.com/r/yp_emailfooter/http://yellowpages.lycos.com/default.asp?SRC=lycos10 9120 From: Lawrence Forde Date: Tue Jul 20, 2004 4:48pm Subject: A question for the TSCM community I have a question and very legitimate TSCM concern. How does one commission a TSCM sweep and search in an extremely hostile environment? Meaning, if the TSCM professional is either threatened, coerced or otherwise threatened not to contract and perform the TSCM sweep, search and discovery of hostile radio frequency, sattelite monitoring and tracking and video voyeurism in one's home, business and on the streets and motor thoroughfares of the subject's city? Please advise on how to effectively commission a TSCM sweep and search, beyond not using suspected telephones, etc. Please forward all professional responses to my email at: lforde_2001@h... telephone me at: (718) 276-1605. Lawrence Forde 9121 From: savanted1 Date: Tue Jul 20, 2004 4:44pm Subject: Gov't Did Not Wiretap Indonesian Embassy Myanmar's deputy minister for foreign affairs U Khin Win and the Indonesian Ambassador Wyoso Prodijowarsito both maintain Myanmar did not wiretap the Indonesian Embassy. Win maintains that the accusation is an attempt to discredit Myanmar in the international community. Prodijowarsito asserted "I believe Myanmar's government would not do such a thing as Myanmar and Indonesia enjoy a very close relationship." The accusation comes following a security check of the Indonesian Embassy where the electronic frequency of certain key phone lines were lower than normal. http://english1.peopledaily.com.cn/200407/13/eng20040713_149386.html 9122 From: Steve Uhrig Date: Tue Jul 20, 2004 8:51pm Subject: Re: Wireless Detector £12.51 Once upon a midnight dreary, Andy Cuff pondered, weak and weary: > Kensington Wifi Finder > "Your life on the road just got a lot easier. With the first and only > WiFi detector on the market today, you no longer need to cross your > fingers as you wait for your notebook to boot up. Just press a button > and the Kensington WiFi Finder lets you know if your location is > "hot"...instantly. No software or computer needed. What could be > easier? " > I haven't used one but wondered if anyone else had and what they thought? A friend of mine, knowledgeable in TSCM and a respected technical author, requested a sample from the manufacturer. They sent him one at no charge, which will be reviewed in an upcoming book. My friend lives in a busy downtown area on the West Coast of the U.S. According to him the device worked fine and identified a number of known Wi-Fi hotspots in his area and did not miss known ones. He is not easy to impress, and is very knowledgeable in the Wi-Fi business. Steve who doesn't believe there is a Wi-Fi network within 5 miles of here in the country. There definitely is not a traffic light within 5 miles. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9123 From: kondrak Date: Tue Jul 20, 2004 9:31pm Subject: Re: Re: Off-topic proposal Shades of W2OY....youre showing your age.... >What we need is a list dedicated to TSCM. No lids, no kids, no space >cadets. 9124 From: Charles Patterson Date: Tue Jul 20, 2004 9:48pm Subject: Re: Wireless Detector £12.51 The Kensington WiFi finder makes a great key-ring. It is not useful as a TSCM tool, though. Mine does respond to most 802.11b signals, but sometimes not. Mine did not respond to other 2.4 ghz signals -most of the time, but sometimes it did. I was often able to get a signal on my laptop yet the WiFi finder did not see it. i.e. the laptop was much more sensitive than the WiFi finder. So the result is, if it does light up, there is a good chance that there is a 802.11b network nearby, maybe. If it does not light up, there still may be a good network nearby, maybe. There are other brands that are supposed to work better ( I can't seem to find the links right now). Charles Charles Patterson Global Communications Tarrytown, NY cp@t... ----- Original Message ----- From: Andy Cuff To: TSCM-L@yahoogroups.com Sent: Tuesday, July 20, 2004 1:27 PM Subject: [TSCM-L] Wireless Detector £12.51 Hi Thought a few of you might be interested in this following on from the mobile detector http://www.ebuyer.com/customer/products/index.html?rb=953129600&action=c2hvd19wcm9kdWN0X292ZXJ2aWV3&product_uid=63682 Kensington Wifi Finder "Your life on the road just got a lot easier. With the first and only WiFi detector on the market today, you no longer need to cross your fingers as you wait for your notebook to boot up. Just press a button and the Kensington WiFi Finder lets you know if your location is "hot"...instantly. No software or computer needed. What could be easier? " I haven't used one but wondered if anyone else had and what they thought? -andy Talisker Security Tools Directory http://www.securitywizardry.com ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 9125 From: Steve Uhrig Date: Tue Jul 20, 2004 10:27pm Subject: Re: A question for the TSCM community Once upon a midnight dreary, Lawrence Forde pondered, weak and weary: > How does one commission a TSCM sweep and search in an extremely > hostile environment? Meaning, if the TSCM professional is either > threatened, coerced or otherwise threatened not to contract and perform > the TSCM sweep, search and discovery of hostile radio frequency, > sattelite monitoring and tracking and video voyeurism in one's home, > business and on the streets and motor thoroughfares of the subject's > city? If you threaten me, you have zero chance of obtaining any of my services. You have an excellent chance of having the phone dropped on your ear. As bad as most of us think we are, for the most part we're electronics geeks with pocket protectors and coke bottle glasses -- at least the honest ones. We use our technical skills to pick up the phone and call the guys with authority and organization and power to deal with threats of violence. Smithers, release the hounds. I know most think they're big bad evil Ninja (turtle) sweepers, but we're not police, we're not military and being generally intelligent, we will avoid confrontation. The guys with the war stories to tell generally are the incompetent bumblers. People who plan on being in this business learn early on to keep a low profile. That means walking away from situations such as you describe, if we even happened to be there in the first place which is rather unlikely as we generally do our homework and know how to read people. We are not motivated by threats. While we need to earn a living, few of the legitimate TSCM practitioners are motivated much by money either. AND ... Don't mistake a TSCM practitioner's refusal to work with you to mean he's been threatened by someone. That's largely fiction. He may just realize he can't help you for whatever reason, and you may not want to accept his decision. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9126 From: Vercingetorix Vercingetorix Date: Tue Jul 20, 2004 11:22pm Subject: Re: Re: Off-topic proposal Steve, I concur. TSCM question. Intrusion detection for chain link fence lines. How good is acoustic Intrusion Detection for a chain link fence and how is it defeated. I have three small maritime industrial locations (300 Meters each) to provide IDS and the budget is small. Some have recommended acoustic cable. The nature of the environment precludes the use of microwaves. What are the strengths and weaknesses? Any other technical considerations to take into account? I do not want to know about a vendor's product, just the technology, i.e. fiber optic cable etc. Thanks for your input. Russ Steve Uhrig wrote: Once upon a midnight dreary, William Knowles pondered, weak and weary: > I would like to toss another idea to the list, what about another > list, say TSCM-Off That's this list. What we need is a list dedicated to TSCM. No lids, no kids, no space cadets. > I like the TSCM list, I really miss the old TSCM list, I would really like > to see a TSCM-Off list so I can parse the signal from the noise. You are not alone. This is the description of THIS list from Yahoogroups: ------ TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. ------ If a message doesn't fit the above, it doesn't belong here. That's half or more of the recent traffic, available on the yahoo website for this group for anyone who wants to do their own analysis. Or the description of the list should be changed so as not to be deceptive. We're supposed to be combatting deception, not abetting it. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? New and Improved Yahoo! Mail - Send 10MB messages! [Non-text portions of this message have been removed] 9127 From: Lawrence Forde Date: Wed Jul 21, 2004 4:15am Subject: Issue Clarification and a restated request for a sensitive TSCM professional In response to Mr.Uhrig's response and post... It has never been my inference that I perceived or viewed the TSCM community as either motivated by threats of violence or money...rather, my question posted earlier and request is in the nature of addressing the intimidation and coercion of prospective TSCM professionals by third parties and their attempts to subvert legal contracts to professionally perform requested TSCM services for me and my family. I have been advised and invited to travel to other geographical areas and locations in order to obtain the professional services of the TSCM community. In another instance upon receiving a referral from one TSCM professional to another TSCM professional, the TSCM professional to whom I was referred neglected to even answer the telephone or his answering machine. I am a human rights victim who desperately needs the immediate professional TSCM services of a competent, sensitive and professional TSCM professional. Simply put, I have yet to find a single TSCM professional who is willing to contract to perform the much needed TSCM services outlined in my earlier post here in my current geographical location, the needed TSCM services being Radio frequency assault, sattelite and laser frequency assault and video burglary and the legal abatement of video voyeurism. My legal need and request for the professional services of a competent and sensitive TSCM professional is well within legal civil, constitutional and federal, state and local statutes as to privacy and the legal and technological enforcement of my legal right of privacy and protection against electronic assault and the safeguarding of my privacy. I would be happy to discuss my privacy and protection concerns with any member of the TSCM community. And so, my search for and immediate need for the performance of TSCM services and protection continues. If any professional member of the TSCM community is available to legally contract with me to immediately perform the TSCM services outlined herein and above, please contact me at (718) 276-1605 or email me at: lforde_2001@h... at your earliest convenience, your attention to this matter is appreciated. Thank you Sincerly, Lawrence Forde --- In TSCM-L@yahoogroups.com, "Steve Uhrig" wrote: > Once upon a midnight dreary, Lawrence Forde pondered, weak and weary: > > > How does one commission a TSCM sweep and search in an extremely > > hostile environment? Meaning, if the TSCM professional is either > > threatened, coerced or otherwise threatened not to contract and perform > > the TSCM sweep, search and discovery of hostile radio frequency, > > sattelite monitoring and tracking and video voyeurism in one's home, > > business and on the streets and motor thoroughfares of the subject's > > city? > > If you threaten me, you have zero chance of obtaining any of my services. > You have an excellent chance of having the phone dropped on your ear. > > As bad as most of us think we are, for the most part we're electronics > geeks with pocket protectors and coke bottle glasses -- at least the > honest ones. We use our technical skills to pick up the phone and call > the guys with authority and organization and power to deal with threats > of violence. > > Smithers, release the hounds. > > I know most think they're big bad evil Ninja (turtle) sweepers, but we're > not police, we're not military and being generally intelligent, we will > avoid confrontation. > > The guys with the war stories to tell generally are the incompetent > bumblers. > > People who plan on being in this business learn early on to keep a low > profile. That means walking away from situations such as you describe, if > we even happened to be there in the first place which is rather unlikely > as we generally do our homework and know how to read people. > > We are not motivated by threats. While we need to earn a living, few of > the legitimate TSCM practitioners are motivated much by money either. > > AND ... > > Don't mistake a TSCM practitioner's refusal to work with you to mean he's > been threatened by someone. That's largely fiction. He may just realize > he can't help you for whatever reason, and you may not want to accept his > decision. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* 9128 From: delta Date: Wed Jul 21, 2004 4:24am Subject: spread spectrum bug http://www.cb-security.com/catalogue/fugace.htm here is a link for a bug you can find in france david from paris 9129 From: Date: Tue Jul 20, 2004 10:26pm Subject: Directional Mics Thanks James I do now remember reading a Technical article about such a device "Gatling Gun" it was supposed to be very effective. Another theory I came across was the use of about 20 electret mics fixed in a straight line and connected in such a way as to become very directional. This sort of array can then be mounted on the base of a briefcase etc. Any other info you have would be very welcome. Thanks Dave DEMTEC David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Countermeasures Specialist Electrical Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695 558544 07866206112 demtec@a... [Non-text portions of this message have been removed] 9130 From: Loy Chapman Date: Wed Jul 21, 2004 7:45am Subject: Re: Re: A question for the TSCM community Well said! Even those of us who used to enter hostile environments as a requirement of our tasking, would not do so now, given a choice. LD Chapman USSS Retired --- Steve Uhrig wrote: > Once upon a midnight dreary, Lawrence Forde > pondered, weak and weary: > > > How does one commission a TSCM sweep and search in > an extremely > > hostile environment? Meaning, if the TSCM > professional is either > > threatened, coerced or otherwise threatened not to > contract and perform > > the TSCM sweep, search and discovery of hostile > radio frequency, > > sattelite monitoring and tracking and video > voyeurism in one's home, > > business and on the streets and motor > thoroughfares of the subject's > > city? > > If you threaten me, you have zero chance of > obtaining any of my services. > You have an excellent chance of having the phone > dropped on your ear. > > As bad as most of us think we are, for the most part > we're electronics > geeks with pocket protectors and coke bottle glasses > -- at least the > honest ones. We use our technical skills to pick up > the phone and call > the guys with authority and organization and power > to deal with threats > of violence. > > Smithers, release the hounds. > > I know most think they're big bad evil Ninja > (turtle) sweepers, but we're > not police, we're not military and being generally > intelligent, we will > avoid confrontation. > > The guys with the war stories to tell generally are > the incompetent > bumblers. > > People who plan on being in this business learn > early on to keep a low > profile. That means walking away from situations > such as you describe, if > we even happened to be there in the first place > which is rather unlikely > as we generally do our homework and know how to read > people. > > We are not motivated by threats. While we need to > earn a living, few of > the legitimate TSCM practitioners are motivated much > by money either. > > AND ... > > Don't mistake a TSCM practitioner's refusal to work > with you to mean he's > been threatened by someone. That's largely fiction. > He may just realize > he can't help you for whatever reason, and you may > not want to accept his > decision. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website > http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > __________________________________ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail 9131 From: Raymond Van Staden Date: Wed Jul 21, 2004 10:11am Subject: Re: spread spectrum bug Very Interesting, Good example why we have to do Physical Checks & be aided by a NLJD. Raymond ----- Original Message ----- From: delta To: TSCM-L@yahoogroups.com Sent: Wednesday, July 21, 2004 11:24 AM Subject: [TSCM-L] spread spectrum bug http://www.cb-security.com/catalogue/fugace.htm here is a link for a bug you can find in france david from paris [Non-text portions of this message have been removed] 9132 From: kondrak Date: Wed Jul 21, 2004 11:10am Subject: Re: Directional Mics I've built and used the mike array you describe as a Gatling gun. They work, they're cheap enough to build, but they're bulky. The first ones were made out of aluminium tubing, but now days, the availability of thin wall PVC tubing makes it even cheaper. At 03:26 7/21/2004, you wrote: >Thanks James I do now remember reading a Technical article about such a >device "Gatling Gun" it was supposed to be very effective. >Another theory I came across was the use of about 20 electret mics fixed in >a straight line and connected in such a way as to become very directional. >This sort of array can then be mounted on the base of a briefcase etc. >Any other info you have would be very welcome. >Thanks Dave > >DEMTEC >David McGauley >TSCM [Technical Surveillance and Countermeasures] >Electronic Surveillance and Countermeasures Specialist >Electrical Electronics Engineer ex Police >Demtec House >Ormskirk >Lancs L390HF >UK >01695 558544 >07866206112 >demtec@a... > > > >[Non-text portions of this message have been removed] > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9133 From: Steve Uhrig Date: Wed Jul 21, 2004 11:40am Subject: Re: Off-topic proposal Once upon a midnight dreary, Vercingetorix Vercingetorix pondered, weak and weary: > TSCM question. > Intrusion detection for chain link fence lines. How good is acoustic > Intrusion Detection for a chain link fence and how is it defeated. I don't know. I'm not an alarm installer. Small budget frequently = waste of time. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9134 From: delta Date: Wed Jul 21, 2004 9:40am Subject: radio rf problem http://www.washingtonpost.com/ac2/wp-dyn/A28217-2004Jul4 i m sure a sweep in this situation is very difficult as to open the door !!! lol david from paris 9135 From: Andy Cuff Date: Wed Jul 21, 2004 11:30am Subject: Re: spread spectrum bug Hi David, How much, any idea ?? 12/220V transformer isn't shown, with a 500mA drain a standalone cell isn't going to last long, though it's 8-12V DC input offers some flexibility especially in a car, shame they haven't reduced it down to 5.25V so they could try to power from USB, though if I remember that will only give 100mA. Nice to demo to customers though. Long live the NLJD !!! -andy Talisker Security Tools Directory http://www.securitywizardry.com ----- Original Message ----- From: "delta" To: Sent: Wednesday, July 21, 2004 10:24 AM Subject: [TSCM-L] spread spectrum bug > http://www.cb-security.com/catalogue/fugace.htm > here is a link for a bug you can find in france > david from paris > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9136 From: R. Snyder Date: Wed Jul 21, 2004 11:22am Subject: Off-Topic Proposal Useless for Digest Format The proposal to include [OT] for off-topic messages would not be a panacea. The OT messages would still get included in the digest distribution of all of the messages and would then be practically inseparable from the actual TSCM-related messages. Moreover, the [OT] proposal tacitly legitimizes off-topic messages, which, I believe, would be a poor policy decision. When I joined the list, the digests were typically in the range of about 3K-15K, while now they are typically 30K-50K with the recent 353K whopper with the SEC EDGAR cut-and-paste. I am quite familiar with SEC EDGAR, and a link would have more than sufficed. When I got an Apple II with 48K of RAM in 1981, there was truly a dearth of information in electronic form. A user with UUCP access could subscribe to all of the USENET newsgroups worth reading and actually read them all every day with time to spare. Also, the level of competency of USENET subscribers was extremely high, so the S/N ratio was correspondingly high. However, now practically all newsworthy information is in electronic form and can be found somewhere on the internet. Thus, adding OT messages to TSCM-L is duplicative with other internet news sources. I rarely read any OT TSCM-L content that I have not already read elsewhere. Moreover, with nearly universal internet access, the S/N ratio of the internet overall has fallen to where communication is truly impaired. It takes much longer to receive each unit of useful information because of the high noise level. The goodwill of the list depends upon its ability to filter the noise and limit itself to useful TSCM-related information. Enough nostalgia, complaining, and theorizing. Here's my proposed solution: Set up a new parallel list called something like TSCM-OT-L. If users want to get all of what they are getting now, including the OT stuff, subscribe to both. If not, just stick with TSCM-L. All of the noise is controlled at the transmitter, not by having every subscriber make an effort to implement e-mail filtering at his respective receiver. __________________________________ Do you Yahoo!? Vote for the stars of Yahoo!'s next ad campaign! http://advision.webevents.yahoo.com/yahoo/votelifeengine/ 9137 From: DATA_4N6_Engineering Date: Wed Jul 21, 2004 1:37pm Subject: RE: Chain link fence alarm Steve is right - low budget is not worth your effort to start. But , You can provide him the most effective alarm and protection system known to man. Charge him half what he is asking, buy him a Gaggle of geese and both of you are happy. And if things don't work out, it's a great meal, and as a once famous person said 'Thats a good thing'. Jon Asdourian Data Forensics Engineering ===== Jon Asdourian 61 356B Red Porsche Coupe 69 Red MGC GT 63 Burgundy Austin Healey 3000 BJ7 356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC __________________________________ Do you Yahoo!? Vote for the stars of Yahoo!'s next ad campaign! http://advision.webevents.yahoo.com/yahoo/votelifeengine/ From: James M. Atkinson, Comm-Eng Date: Fri Jul 21, 2000 7:27pm Subject: Re: TSMC'er Measuring Contests At 8:06 PM -0400 7/21/00, MACCFound@a... wrote: >Those that can Sweep, >those that can't or have no business make useless posts. We have spent way to much time on the "measuring issue" and all of this petty bickering, and you have a good point. I would like to propose a thread on this that list about what members can do to increase their business, raise profits, increase the number of customers they can support, and so on. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== 963 From: James M. Atkinson, Comm-Eng Date: Sat Jul 22, 2000 0:04am Subject: Fwd: Bickering that has been occurring between members Look folks, let's all just take a deep breath and stop the petty bickering on the list. Also, let's watch our language, and PLEASE let's be more polite with each other. The recent bickering episode has caused eight member to leave the list in the last 72 hours, so it has become destructive to the list. Please keep the subject matter related to TSCM, and let's not focus on name calling, petty jabs, and other such foolishness. If your doing something wrong and somebody on the list points out your error please do not come back with snide remarks and attack them. Keep it professional, if you think that they are wrong then say so... but be prepared to offer technical details about why you think your right. We all make mistakes, and we all (including myself) have much to learn from each other... so let's learn, and not bicker. There is much that we can learn from each other, and much that can be taught... but only if we maintain focus. This is the worlds largest mailing list regarding the TSCM profession and I intend to keep it professional. Enough said, -jma >X-From_: sendmail Fri Jul 21 23:13:36 2000 >Date: Fri, 21 Jul 2000 20:18:25 -0500 >Subject: Bickering that has been occurring between members >To: Jim Atkinson >X-Priority: 3 > >Jim: > >I would like to send you a comment on the bickering that has been >occurring between members. At the same time that I signed up for >your list, I signed up for a computer list as well. Eventually the >members of the computer list began to bicker with each other and the >language got very fouled and offensive. Within two months of that >happening the computer list literally disappeared. > >I respect your knowledge and the knowledge of everyone on the list. >I think everyone contributes >equally to better our understanding of the subject. However, I think >criticism should be addressed >as a way to better our understanding of the subject. And I think all >parties involved should criticize and/or accept criticism whenever >it is solely regarding to better understand TSCM procedures and >methods. > >Because of the nature of our profession, our reputation must be >impeccable and the bickering does >not in any way add to our reputation or prestige. So please ask the >members to refrain from foul >language and use the list for exchange of ideas and new procedures >solely relating to TSCM. >In doing this members will enhance our credibilty and the credibilty >of the TSCM list itself. > >If you would like to post this to the list, please do so but keep my >name and personal information >confidential. > >Thank you for your time and effort that you put on the list. > =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== "By the pricking of my thumbs, something wicked this way comes." - Macbeth, Shakespeare =================================================================== [Non-text portions of this message have been removed] 964 From: A Grudko Date: Sat Jul 22, 2000 2:21am Subject: Re: Suspicious signal gets more so Received from respected associate John Titterton in Cape Town on the strange signal I reported 2 weeks ago.: ----- Original Message ----- > I spoke to my contact at SATRA and played him the audio clip. > First, he said he has never heard a clip such as yours and thinks it could be a fail-safe signal. > Second, he looked up the freq. you gave (141.xxx) on his system and told > me that that freq. has NEVER been allocated for any commercial use and is a > > m-restricted freq. - in other words, it is allocated to the military. > John I frequently run the roads, lanes, paths and railtrack in the area of this signal so know the area of the signal well and am not aware of any military installation. There are military repeaters on the Magalisburg Mountains at least 6 km away and as I move in that direction the signal fades. Broederstroom Commando are some 20 km east at the Phalaborwa Atomic Energy research station and the signal is not present there. Ditto the Hartebeeshoek radio telescope/satelite tracking station. It fits my feeling that it is an illegal. I'm going to turn this into a training exercise for my staff and let them DF it. Stay tuned. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 965 From: A Grudko Date: Sat Jul 22, 2000 3:22am Subject: Back to basics Imagine you are Sam from 'Quantum Leap' being sent back in time to the era of the Russian Tsars, when the Romanoffs rulled but were about to be murdered in a giant conspiracy. You have a $100, 10 - 1000 mhz Field Strength Meter in your pocket. Marconi was not born so there was only ambient RF. A time travelling KGB spy codenamed Rasputin (who the supersticous locals consided a mad monk with magical powers) had actually placed a spread spectrum, 900 mhz frequency hopping, digital audio $ 2500 MilSpec room bug in a pot plant in the Prince's Chamber. It would be the only active source of RF on the planet. Would your cheap, hobby FSM find it find it ? I say yes, easilly and quickly, providing the bug was within the frequency range of the FSM, because the FSM is not frequency dependant and does not try to demodulate, so the mode of transmission is irrelivant. As you approach the pot plant the FSM needle just keeps going up 'cos all it looks for is RF. $100 toy finds $ 2500 bug! The Romanoffs live. Communism is defeated. Princess Anastasia marries Prince Philip of Greece. Queen Elizabeth of England dies a frustrated spinster and we are all spared the Charles and Dianna soapie. TSCM improves the quality of life for all humans. Zoom forward to the 21st century. That same FSM will still locate that high tech bug but it will also pick up all the other RF clutter. So you attenuate it way down into a Near Field device. It will pick up that 900 meg TX but my Xplorer - at 10 times the price won't 'cos it's looking for FM. My Scanlock won't pick it up either except in the locate mode, which simply makes it a very expensive FSM. Ditto my CPM 700. ----- Original Message ----- > I agree wiyth you on the Opto Scout. It's worthless for this kind of work. Actually it has value...I use it's brother, the Xplorer as part of my sweep. I'm not totally disagreeing with you...read on. > > I have had the Opto MicroCounter, Cub, Scout and Xplorer, not one of the > > could detect your average wideband FM placed on Band II (88-108MHz), > > basically due to the overwhelming power of the kilowatt commercial sites. FM capture effect helps here. We detect 10 mw ERP VHF WBFM Band II bugs with the Xplorer with an 18" whip antenna (the supplied helical stubby is not appropriate for sweeps) at 2 Mtrs in a suburban environment, less in the city. It can be a slow process because you have to first select 'Sweep' mode and then lockout all the commercials. Just one of 5 RF tools in our box of tricks. > > The one with the farthest 'range', so to speak, was the Xplorer, but only due to it being a fast scanner rather than a frequency counter. Biggest problem with the Xplorer is multiple images - on average 8 per signal, meaning 7 inaccurate 'hits'. If it is a suspect signal it takes 2 minutes to check all 8 signals on an AOR type scanner, and of course only low threat situations would be FM anyway. > Once, while I was in a mountain range away from most of the RF usually present where I live, it picked up an airliner that passed some 20000' overhead. My Xplorer only detects FM. Was this airline 108 - 134 AM or does your country also use some FM on aircraft (some of our military aircraft do)? Slope detection (-15db min)? or a modification? > > Please don't attack list members as you do, everyone has his methods, tools and equipment, as well as experience, Agreed, agreed, agreed I belong to many lists and this is the one I enjoy most and learn the most from. TSCM changes every hour. Let's use this as the forum for growth and education, not bitching and one-up-man-ship. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 966 From: A Grudko Date: Sat Jul 22, 2000 7:58am Subject: Re: Nonlinear junction detector for sale ----- Original Message ----- > Steve, is right about a NLJD separating the men from the boys... it > is a very valuable piece of equipment that will pay for itself in a > very short period of time. Only if the clients are capable of understanding the value of the tool and paying for it. Otherwise you might as well use a Hoover. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 967 From: A Grudko Date: Sat Jul 22, 2000 8:17am Subject: Enemy of the State - off topic ----- Original Message ----- > > Yaesu said sure, anything you want, and gave us quite a number of tiny > > handhelds. I don't remember the model number. Those were used in the > > scene where the NSA cats were raiding Hackman's secret lab. You have to > > look closely to see them. About 7 years ago a movie company hired a whole bunch of weapons and radios from me. 3 weeks later all the kit was returned and my bill was paid in full but I never found out what the movie was!!!! Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 968 From: James M. Atkinson, Comm-Eng Date: Sat Jul 22, 2000 0:27pm Subject: Re: Back to basics At 10:22 AM +0200 7/22/00, A Grudko wrote: > >It would be the only active source of RF on the planet. > >Would your cheap, hobby FSM find it find it ? > >I say yes, easilly and quickly, providing the bug was within the frequency >range of the FSM, because the FSM is not frequency dependant and does not >try to demodulate, so the mode of transmission is irrelivant. As you >approach the pot plant the FSM needle just keeps going up 'cos all it looks >for is RF. Er... a cheap ten dollar voltmeter and a diode would do the same thing. >$100 toy finds $ 2500 bug! The Romanoffs live. Communism is defeated. >Princess Anastasia marries Prince Philip of Greece. Queen Elizabeth of >England dies a frustrated spinster and we are all spared the Charles and >Dianna soapie. TSCM improves the quality of life for all humans. > >Zoom forward to the 21st century. > >That same FSM will still locate that high tech bug but it will also pick up >all the other RF clutter. So you attenuate it way down into a Near Field >device. It will pick up that 900 meg TX but my Xplorer - at 10 times the >price won't 'cos it's looking for FM. My Scanlock won't pick it up either >except in the locate mode, which simply makes it a very expensive FSM. Ditto >my CPM 700. The bigger problem here is that when the bandwidth increases so does the noise, and your signal to noise ratio goes to hell. Might I be so bold as to point out the following: http://www.tscm.com/TSCM101noise.html >----- Original Message ----- > > I agree wiyth you on the Opto Scout. It's worthless for this kind of work. > >Actually it has value...I use it's brother, the Xplorer as part of my sweep. >I'm not totally >disagreeing with you...read on. All equipment has value, and I carry a Opto Scout, and an Opto Scout (along with a several very high end frequency/function counters) on a most sweeps. Every little piece of equipment give you one more defense, but only if it is used in parallel with other equipment. You have to be aware of the weaknesses and strengths of each piece of equipment in your equipment kit, and having some functional overlap helps to counter this problem. By all means you should use a Scout, an Explorer, a CPM-700, and similar broadband equipment, but you must also use higher performance equipment as well such as the OSCOR, the MSS, and a higher end spectrum analyzer. > > > I have had the Opto MicroCounter, Cub, Scout and Xplorer, not one of the > > > could detect your average wideband FM placed on Band II (88-108MHz), > > > basically due to the overwhelming power of the kilowatt commercial >sites. > >FM capture effect helps here. We detect 10 mw ERP VHF WBFM Band II bugs with >the >Xplorer with an 18" whip antenna (the supplied helical stubby is not >appropriate for sweeps) at 2 Mtrs in a suburban environment, less in the >city. It can be a slow process because you have to first select 'Sweep' mode >and then lockout all the commercials. Just one of 5 RF tools in our box of >tricks. The Scout and Explorers are most sensitive in the VHF band, but is virtually deaf above 900 MHz, and below 100 MHz. Yes, they will hit on signals outside of that range, but it is "iffy". Try adding a simple bandpass filter to the front end of either device to reduce the input bandwidth. Start with filters in the following "high threat bands": 45-50, 50-88, 108-135, 135-150, 150-174, 174-200, 200-225, 225-300, 300-400 and so on. > > > The one with the farthest 'range', so to speak, was the Xplorer, but >only due to it being a fast scanner rather than a frequency counter. > >Biggest problem with the Xplorer is multiple images - on average 8 per >signal, meaning 7 inaccurate 'hits'. If it is a suspect signal it takes 2 >minutes to check all 8 signals on an AOR type scanner, and of course only >low threat situations would be FM anyway. > > > Once, while I was in a mountain range away from most of the RF usually >present where I live, it picked up an airliner that passed some 20000' >overhead. > >My Xplorer only detects FM. Was this airline 108 - 134 AM or does your >country also use some FM on aircraft (some of our military aircraft do)? >Slope detection (-15db min)? or a modification? For a real treat get permission from the pilot to run your Scout (or Spectrum Analyzer) during the flight for brief periods with an antenna located near a window. Most of the signals (other then aeronautical channels) you will get hits on will be TV broadcast signals. > > > Please don't attack list members as you do, everyone has his methods, >tools and equipment, as well as experience, > >Agreed, agreed, agreed > >I belong to many lists and this is the one I enjoy most and learn the most >from. TSCM changes every hour. Let's use this as the forum for growth and >education, not bitching and one-up-man-ship. Agree'd -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 969 From: James M. Atkinson, Comm-Eng Date: Sat Jul 22, 2000 0:40pm Subject: Re: Nonlinear junction detector for sale At 2:58 PM +0200 7/22/00, A Grudko wrote: >----- Original Message ----- > > Steve, is right about a NLJD separating the men from the boys... it > > is a very valuable piece of equipment that will pay for itself in a > > very short period of time. > >Only if the clients are capable of understanding the value of the tool and >paying for it. Otherwise you might as well use a Hoover. That is where client education comes in. A properly educated client will appreciate (and pay for) each step of what you are doing. Having a WRITTEN procedural manual also helps. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 970 From: A Grudko Date: Sat Jul 22, 2000 8:59am Subject: Movies details - off topic I can't remember the book, but once read of a spy charactor thumbing off the safety catch on a revolver. Duh! It ruined the rest of the book for me (no revolver that I know of from a major manufacturer has ever been made with a safety catch). In the first Die Hard movie (late 80's?) Bruce Willis was able to use what looked like Kenwood/Icom UHF (looking at the antenna) portables to talk to not only the terrorists (OK) but also the LAPD and the chaufeur, Argyle in the Cadi in the garage via 'CB' radio ?? Always wondered about that one Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 971 From: Miguel Puchol Date: Sat Jul 22, 2000 3:34pm Subject: RE: Back to basics Andy, Very interesting thoughts !!! > FM capture effect helps here. We detect 10 mw ERP VHF WBFM Band > II bugs with > the > Xplorer with an 18" whip antenna (the supplied helical stubby is not > appropriate for sweeps) at 2 Mtrs in a suburban environment, less in the > city. It can be a slow process because you have to first select > 'Sweep' mode > and then lockout all the commercials. Just one of 5 RF tools in our box of > tricks. From where I live I have to lock out some 17 FM stations that the Xplorer picks up, plust the images around 40MHz and VHF (the first to get caught) and then some of the other images, depending on the station's power and distance. Then, as you correctly point out, the Xplorer will pick up the device. Hard job though!! I asked Opto about the Xplorer and it's capabilities regarding remote control or sending the captured freq out the serial port automatically, but there is none of this. I have a utility for downloading all data from the Scout and Xplorer, it was available for free download from my web site, but it's down now pending server re-location. > > > The one with the farthest 'range', so to speak, was the Xplorer, but > only due to it being a fast scanner rather than a frequency counter. > > Biggest problem with the Xplorer is multiple images - on average 8 per > signal, meaning 7 inaccurate 'hits'. If it is a suspect signal it takes 2 > minutes to check all 8 signals on an AOR type scanner, and of course only > low threat situations would be FM anyway. Image problem is terrible with the Xplorer, the band II notch filter is a must. > > Once, while I was in a mountain range away from most of the RF usually > present where I live, it picked up an airliner that passed some 20000' > overhead. > > My Xplorer only detects FM. Was this airline 108 - 134 AM or does your > country also use some FM on aircraft (some of our military aircraft do)? > Slope detection (-15db min)? or a modification? Nope, it's all AM. Don't ask me how the Xplorer did it. If I TX with an Icom airband transceiver I have, the Xplorer does pick it up, although demodulation is obviously terrible. If you get a chance to go to an airfield, stand near the tower or an aircraft setting out, and try to capture some freqs. > I belong to many lists and this is the one I enjoy most and learn the most > from. TSCM changes every hour. Let's use this as the forum for growth and > education, not bitching and one-up-man-ship. Agreed totally :-) All the best, Mike 972 From: A Grudko Date: Sat Jul 22, 2000 3:29pm Subject: Re: Back to basics ----- Original Message ----- From: James M. Atkinson, Comm-Eng > For a real treat get permission from the pilot to run your Scout (or > Spectrum Analyzer) during the flight for brief periods with an > antenna located near a window. Most of the signals (other then > aeronautical channels) you will get hits on will be TV broadcast > signals. Did almost exactly this 5 Mondays ago. My partner and I took a night flit with 17 Squadron out of Zwartkops SAAF air base the 50 odd km south to Jo'burg and back. I had an Alinco DJ-V5 running 70.00 - 999.99 Mhz on 5 sec. busy delay all the way in an 'Oryx' helicopter. Ear protectors were standard but I had headphones on in stead. The scanner was running with the Captain's permission. Many, many signals RX'd at 5 - 6 000 ft ASL (average 1 000 ft AGL) but what P'd me off was that I couldn't hear our own Engineer's transmition - it was total distortion. But I could clearly hear the tower's response 50 Km away! ...a clear indictment against broadband equipment. I recall that TV signals were the biggest factor, especially the 'rastor' caused by video, followed by commercial FM radio stations, as one would expect - a 25 KW commercial transmitter is hard to ignore. Next up was the extensive SA Police Service repeater system. Luckily the Alinco ignored our 900 Mhz digital cellular haze - which is just where I'd hide a serious bug these days if I was in that game ! Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 973 From: A Grudko Date: Sat Jul 22, 2000 3:34pm Subject: Re: Nonlinear junction detector for sale ----- Original Message ----- > Steve, is right about a NLJD separating the men from the boys... it > is a very valuable piece of equipment that will pay for itself in a > very short period of time. >Only if the clients are capable of understanding the value of the tool and >paying for it. Otherwise you might as well use a Hoover. > That is where client education comes in. > A properly educated client will appreciate (and pay for) each step of what you are doing. > Having a WRITTEN procedural manual also helps. Agreed. Are these manuals available to buy? We (my agency) might only be able to attain a certain percentage of this level but it at least gives us something to compare ourselves with in the industry. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 974 From: Steve Uhrig Date: Sat Jul 22, 2000 8:00pm Subject: Written procedures Once upon a midnight dreary, A Grudko pondered, weak and weary: > > Having a WRITTEN procedural manual also helps. > Agreed. Are these manuals available to buy? Yes. An excellent choice would be Glenn Whidden's Handbook for the Beginning Sweeper, or some name very similar. All the info is there, well laid out, and you can format it for your particular needs and agency. This book will benefit everyone, from the novice sweeper to career professionals. I am sure there are others as well. Glenn Whidden Technical Services Agency k3do@e... 301-292-6430 (Maryland, USA) ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 975 From: James M. Atkinson, Comm-Eng Date: Sat Jul 22, 2000 10:20pm Subject: Re: Written procedures At 9:00 PM -0400 7/22/00, Steve Uhrig wrote: >Once upon a midnight dreary, A Grudko pondered, weak and weary: > > > > Having a WRITTEN procedural manual also helps. > > > Agreed. Are these manuals available to buy? > >Yes. An excellent choice would be Glenn Whidden's Handbook for the >Beginning Sweeper, or some name very similar. All the info is there, well >laid out, and you can format it for your particular needs and agency. > >This book will benefit everyone, from the novice sweeper to career >professionals. > >I am sure there are others as well. > >Glenn Whidden >Technical Services Agency >k3do@e... >301-292-6430 (Maryland, USA) I would STRONGLY recommend Glenn's books Your right about the "Handbook for the Beginning Sweeper", but I would also STRONGLY recommend all three volumes of "The Ear". I also recommend the telephone book written by Rick Udovich and would encourage others to obtain it and study it to help develop your own procedures. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 976 From: Date: Fri Jul 21, 2000 8:05pm Subject: Intro Hello. Am new to list but have 20+ yrs in both positive (retired from large law enforcement agency) and negative work. Question--Am looking for decent S/A that can be used for TSCM work. I have ooffer of AVCOM PSA35A (which has the 10K receive for FM audio) for $2100. Is this a decent unit?? Price in the ballpark?? I can add on the frequency convertor modules at later time to go up into microwave freqs. Thanks John Fulford WA4VPY (ham radio call for those that know--or don't know) 977 From: Date: Sat Jul 22, 2000 0:59pm Subject: Re: Enemy of the State - off topic Andy; Let me know if i can be of any assistance when you are in the States. I"m in Michigan. i think that the movie you are referring to,was Top Gun! just kidding ! Both great flicks. HAVE A GREAT DAY !!! 978 From: Date: Sat Jul 22, 2000 2:31pm Subject: Thanks. I wish to take a moment to thank Mr. Atkinson and the list for educating and informing my person within my brief sojourn on this list. Arigato gozaimasu. N. 979 From: Bob Washburne Date: Sat Jul 22, 2000 7:31pm Subject: Re: Movies details - off topic A Grudko wrote: > The three rules of understanding a movie are very similar to the three rules for comics, which I now relate: 1) IOACS (It's Only A Comic Strip [movie]) 2) The laws of physics will always be bent/broken to fit the gag. The gag will never be modified to fit the laws of physics. 3) The comic{movie] was written to fulfill the vision of the cartoonist, not the fantasy/world-view of the viewer. And specific to movies, we can add a fourth rule: 4) The plot/story-line will always be modified to fit the desired emotional responce. Never the oposite. Star Wars is a prime example. Bob Washburne - Re-entering Lurk mode... 980 From: A Grudko Date: Sat Jul 22, 2000 4:36pm Subject: Re: Back to basics ----- Original Message ----- > If you get a chance to go to an airfield, stand near the tower or an aircraft setting out, and try to capture some freqs. I have an airfield between my home & office called Lanceria. It was set up in the 80's as a sanction busting entry point for the apartheid govenment. Lots of jucy stuff there! Different context. I've tried some of my kit there but only got fairly standard local AM and distant FM coms. Incedentally, we picked up in the 80's that some of our SABC FM commercial stations carried subcarrier CCW data presumably aimed at our then boarder war troops. Interesting stuff from a technical point of view but we otherwise ignored it. 981 From: Miguel Puchol Date: Sun Jul 23, 2000 6:51am Subject: RE: Back to basics Andy, > I've tried some of my kit there but only got fairly standard > local AM and > distant FM coms. Incedentally, we picked up in the 80's that some of our > SABC FM commercial stations carried subcarrier CCW data > presumably aimed at > our then boarder war troops. Interesting stuff from a technical point of > view but we otherwise ignored it. Yep. Here the TV networks fit a lot of information, apart from Teletext, into the 'black lines' of the signal, like remote TV repeater control commands, telemetry, site monitoring, and all sorts of fun things! The FM broadcasters are different, only RASANT (a DGPS correction system), RDS data and that's about it. The potential of this kind of information flow is huge, and underutilised. For example, paging, which I believe is implemented in some countries. Best regards, Mike 982 From: James M. Atkinson, Comm-Eng Date: Sun Jul 23, 2000 3:05pm Subject: Alternate meanings for various words [Humor] The Washington Post published a contest for readers in which they were asked to supply alternate meanings for various words. Following are some of the winning entries: Abdicate (v.), to give up all hope of ever having a flat stomach. Carcinoma (n.), a valley in California, notable for its heavy smog. Esplanade (v.), to attempt an explanation while drunk. Willy-nilly (adj.), impotent. Flabbergasted (adj.), appalled over how much weight you have gained. Negligent (adj.), describes the condition in which you absentmindedly answer the door in your nightie. Lymph (v.), to walk with a lisp. Gargoyle (n.), an olive-flavored mouthwash. Bustard (n.), a very rude Metrobus driver. Coffee (n.), a person who is coughed upon. Flatulance (n.), the emergency vehicle that picks you up after you are run over by a steamroller. Balderdash (n.), a rapidly receding hairline. Testicle (n.), a humorous question on an exam. Semantics (n.), pranks conducted by young men studying for the priesthood, including such things as gluing the pages of the priest's prayer book together just before vespers. Rectitude (n.), the formal, dignified demeanor assumed by a proctologist immediately before he examines you. Marionettes (n.), residents of Washington who have been jerked around by the mayor. Oyster (n.), a person who sprinkles his conversation with Yiddish expressions. Circumvent (n.), the opening in the front of boxer shorts. Frisbatariansim (n.), the belief that, when you die, your soul goes up on the roof and gets stuck there. The Washington Post also asked readers to take any word from the dictionary, alter it by adding, subtracting or changing one letter, and supply a new definition. Winners included: Sarchasm: the gulf between the author of sarcastic wit and the reader who doesn't get it. Reintarnation: Coming back to life as a hillbilly. Giraffiti: Vandalism spray-painted very high. Foreplay: Any misrepresentation about yourself for the purpose of obtaining sex. Inoculatte: To take coffee intravenously. Osteopornosis: A degenerate disease. Karmageddon: It's like, when everybody is sending off all these really bad vibes, right? And then, like the Earth explodes and it's like a serious bummer. Glibido: All talk and no action. Dopelor effect: The tendency of stupid ideas to seem smarter when they come at you rapidly. Intaxication: Euphoria at getting a refund from the IRS, which lasts until you realize it was your money to start with. Ignoranus: A person who's both stupid and an asshole. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 983 From: James M. Atkinson, Comm-Eng Date: Sun Jul 23, 2000 3:11pm Subject: RE: Back to basics At 1:51 PM +0200 7/23/00, Miguel Puchol wrote: >Andy, > > > I've tried some of my kit there but only got fairly standard > > local AM and > > distant FM coms. Incedentally, we picked up in the 80's that some of our > > SABC FM commercial stations carried subcarrier CCW data > > presumably aimed at > > our then boarder war troops. Interesting stuff from a technical point of > > view but we otherwise ignored it. > >Yep. Here the TV networks fit a lot of information, apart from Teletext, >into the 'black lines' of the signal, like remote TV repeater control >commands, telemetry, site monitoring, and all sorts of fun things! >The FM broadcasters are different, only RASANT (a DGPS correction system), >RDS data and that's about it. The potential of this kind of information flow >is huge, and underutilised. For example, paging, which I believe is >implemented in some countries. > >Best regards, > >Mike Er... concealing data inside the "test lines" is not using subcarriers (as it is not actually modulated inside a signal, but is inserted as baseband signal multiplexed into the time domain. (Hint... it is inserted into the TIME domain, and not the frequency domain) Television broadcasters commonly conceal information inside the "hidden lines" on your screen (inside the video signal), and also in the numerous subcarriers on the audio signals. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 984 From: James M. Atkinson, Comm-Eng Date: Mon Jul 24, 2000 10:10am Subject: Video Signal Base Timing Chart Here is a Video Signal Timing Chart from my TSCM book that I though the list might find helpful. The Chart is for NTSC signals, but it is fairly simple to recompute it for SECAM, PAL, etc signals. Note: EVERYTHING (including the audio and subcarrier signals) in a NTSC signal are all based around the Chrominance Subcarrier Timing Signal at 3.58... MHz. -jma ============================== NTSC Video Signal Base Timing Chart Chrominance Subcarrier (base timing signal, highest frequency) = 63/88 * 5 MHz = 3.57954545ä MHz (Color Burst Frequency) Number of Scanning Lines (Interlaced) = 525 Total Lines (2 * 262.5 Interlaced lines) = 70 Lines not displayed (Vertical Blanking Interval) Line 10, Telecommunications Line 11, Telecommunications Line 12, Telecommunications Line 13, Telecommunications Line 14, Telecommunications Line 15, Telecommunications Line 16, Telecommunications Line 17, Telecommunications, Test Signals, Cue, and Control Signals Line 18, Telecommunications, Test Signals, Cue, and Control Signals Line 19, Reference Data, Test Signals, Cue, and Control Signals Line 20, Test Signals, Cue, and Control Signals Line 21, Program Data, NRZ Format, ASCII 7 bits plus parity + 455 Actually Displayed Lines Horizontal Frequency = 2/455 * Chrominance Subcarrier = 2/455 * 3.57954545ä MHz = 15.734264 kHz +/- 0.044 Hz = 15.750 kHz Vertical Frequency (Screen Refresh) = 2/525 * Horizontal Frequency = 2/525 * 15.734266 kHz +/- 10 Hz = 59.940 Hz (60 Hz) ============================== =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 985 From: Gregory Horton Date: Mon Jul 24, 2000 2:33pm Subject: Re: Written procedures Speaking of Glenn Whidden, check out this link: http://www.tlc.discovery.com/area/technology/countersurveillance/surveillance1.2.html Greg Horton 986 From: James M. Atkinson, Comm-Eng Date: Mon Jul 24, 2000 8:03pm Subject: A Spy in the Office Sunday 23 July 2000 A Spy in the Office http://www.montrealgazette.com/news/pages/000723/4497311.html Foreign intelligence agencies busy in our businesses, CSIS warns LEVON SEVUNTS The Gazette Attention, high-tech managers: Do you have an employee or a colleague who is really eager to work overtime or come in during weekends? Before rewarding such zeal, check with your security department: such an employee could be working for one of the 25 foreign intelligence agencies spying on Canadian companies. The startling estimate comes from the Canadian Security and Intelligence Service, which says that Montreal's aerospace, biotechnology, chemical, communications and information-technology companies are all prime targets for economic spying. "Given sufficient motivation, every country will engage in economic espionage," CSIS spokesman Jim Comeau said. And that includes our closest allies - as well as ourselves. Mike Frost, who used to work for Canada's Communications Security Establishment (CSIS's sister agency, which monitors communications systems), claims that in the early 1980s the Canadian government was eavesdropping on the U.S. embassy in Ottawa, using U.S.-produced technology. In 1982, Frost says in his autobiography, Spyworld, the CSE overheard U.S. Ambassador Paul Robinson discussing a pending grain sale to China. Using information thus gained, the Canadians were able to underbid the Americans and secure a $2.25-billion contract. When the stakes are that high, the simple fact of international life is that there's no such thing as a friendly nation. Ghislain Levesque, an economic-espionage investigator with CSIS's regional bureau in Montreal, says espionage costs Canadian companies billions in lost contracts, jobs and markets, and a diminished competitive edge. CSIS officials could offer no such dollar figure for Canada, but the U.S. Chamber of Commerce has said that losses to the American economy from economic espionage amount to about $2 billion every month. For more than eight years, CSIS has been trying to educate business executives about economic espionage, through a liaison and awareness program. As a part of that program, CSIS officers give presentations about economic spying to the leaders of Canada's public and private companies. "Our message to Canadian companies," Levesque said, "is that if you think you have a jewel - a unique technology, scientific or marketing expertise - you have to protect it. And we can show you how to do it." In exchange, these companies are supposed to let CSIS know when they feel that they have been targeted. Ideally for CSIS, that should allow the spy agency to keep an ear to the ground without actually having to put a counterintelligence officer in every high-tech company. But relations between businesses and CSIS are far from rosy. "Companies are often reluctant to admit that they've been targeted by foreign spy agencies, because they fear adverse effects on share prices and the company's reputation," Levesque said. Corporate security specialists, on the other hand, charge that the CSIS itself is not always forthcoming with information, for fear of compromising sensitive sources or methods. "If they come to me and ask for information without explaining why they need it, I won't give them anything," said Darell Booth, head of security of Mitel Corp. of Kanata, Ont. Two years ago, Mitel had what it believes was a brush with economic espionage. The company alleges that one of its employees, To Van Tran, conspired with Vietnamese government officials to defraud Mitel and steal sensitive technical data on its cutting-edge PBX (private branch exchange) telephone-switching system. Tran, arrested by the Ontario Provincial Police in March 1998, was charged with fraud and possession of stolen property, because the Canadian Criminal Code has no specific section covering economic espionage. Tran is to appear in court on Aug. 15. "We thought that since a foreign government is involved, we have to notify CSIS, but they weren't able to help us at all," Booth said. "They had no contacts in Vietnam and no powers. Frankly, I don't understand how they can work, the way they are set up with all that red tape." Many security experts agree with Booth. In an increasingly globalized marketplace, they say, the weak and restricted intelligence capability of CSIS puts Canadian businesses at a disadvantage compared with other industrialized nations, which do not shy away from using their offensive-intelligence capabilities to promote the interests of their flagship companies. Al Hensler agrees. Hensler is a former CSIS assistant director who has been a vocal advocate for the establishment of Canada's own foreign-intelligence agency - as opposed to CSIS, which is not allowed to spy on foreign governments abroad. "During the Cold War, our allies shared their political and military intelligence with us, but now the focus is shifting toward economic intelligence," Hensler said. "Americans are not going to share economic information with us. The reality has changed." During negotiations on setting up the North American Free Trade Agreement, "some Ottawa bureaucrats thought that we shouldn't spy on Americans, that it was unethical," he said. "But Americans were spying on us. If you don't use your intelligence, how do you know that you are getting the best deal? "If, let's say, Bombardier is negotiating a deal and is being undermined by unfair trade practices, the CSIS can offset that by warning Bombardier and the concerned Canadian government agencies." David Harris, former head of strategic planning for CSIS, does not agree that the agency should use its intelligence efforts help individual Canadian companies. "Using offensive intelligence to promote interests of Canadian businesses raises all kind of tricky questions," he said. "Who will receive this intelligence? Are we going to play favourites? And not least, in this fluid business environment, what is a Canadian company?" Hensler's response: "The same questions were raised by the Americans, but they found a way around them. So can we. Every billion in lost contracts translates into roughly 12,000 lost jobs." Despite the concerns, the CSIS liaison and awareness program is growing in popularity with business executives. The agency estimates that it has given more than 2,000 presentations across Canada since 1992. "We show them their vulnerable points," Levesque said. "Business executives are most vulnerable abroad. Foreign intelligence agencies collect up to 60 per cent of their information on their own soil." Methods can range from simple wiretapping and electronic eavesdropping to outright theft. The French intelligence agency DSGE is said to have bugged the first-class cabins of Air France jets to eavesdrop on traveling foreign business executives. Bugging of hotel suites and phone wiretaps are perfectly legal in many countries. Theft of laptop computers is a common way of gathering corporate intelligence. "I always say in my presentations," Levesque said, "that before taking a foreign trip, executives must do a mental check of what's on their laptop hard drive; they should take only the information that is absolutely necessary. "Don't take your entire company in your laptop; you may lose it all." Security specialists warn that sensitive documents should never be left in a hotel room. "In many countries, intelligence services and the hotel security often exchange little favours," Levesque said. Victor Ostrovsky, a defector from the Israeli spy agency Mossad, says in his book By Way of Deception that Mossad, which was famous for its lock-picking talent, had a collection of keys to most hotels in Europe, North America and the Middle East. British intelligence used to send locks for testing in Israel; Mossad would figure out how to pick a new model of lock, but would send back a report saying that the model was unpickable, he says. The principal spy agency of the old Soviet Union, the KGB, used to have an office in each major hotel in the country, and virtually all hotel employees were coerced to report on foreigners. The KGB's successor, the Federal Security Service (known under the Russian acronym FSB), continues this tradition. Russians are famous for using escort agencies to collect information on visiting dignitaries and business executives. Imagine the information you can pump from a half-drunk and completely satisfied visiting businessman. Levesque also teaches his students never to get into the first cab that pulls over in a foreign city. If you're an espionage target, the driver may be a bit overqualified and will probably speak English and/or French, though he may pretend not to, he said. Trade shows and job fairs can also be gold mines of information and contacts, not only for legitimate business people but for intelligence agencies. The Federal Bureau of Investigation in the U.S. estimates that one in 50 people at any given trade show is gathering intelligence for a foreign power. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 987 From: James M. Atkinson, Comm-Eng Date: Mon Jul 24, 2000 8:06pm Subject: More Eavesdropping in Russia Now Than During Red Years More Eavesdropping in Russia Now Than During Red Years http://www.newsmax.com/articles/?a=2000/7/23/161409 NewsMax.com Monday, July 24, 2000 In Russia it seems as if everyone is spying on everyone else, according to a shocking exposÈ by a group of investigative reporters who published 20,000 pages on the Internet of so-called operational reports that reveal highly confidential information about some of Russia's most prominent government officials, businessmen and celebrities. And it wasn't Big Brother doing the snooping, according to the reporters, who call themselves the Freelance Bureau ñ it was largely the work of moonlighting security agents for the FSB, the successor to the KGB, private security firms, and ex-KGB agents ñ all of them working for private clients seeking information on rival business firms. Included in the material were transcripts of bugged telephone calls and detailed dossiers on some of Russia's most important people. Among the documents published were biographical dossiers on politicians, showing their addresses, passport and telephone numbers, transcripts of phone conversations involving such people as the Russian Orthodox Patriarch Aleksy II, the oligarchs Boris Berezovsky and Vladimir Potanin, and the former chief of privatization Alfred Kokh. "We wanted to show that there's no privacy any more ñ for anyone," Alexei Chelnokov, one of the Freelance Bureau's founders told Britain's Electronic Telegraph. "Even in Soviet times, the KGB needed the prosecutor-general's permission to bug phones or tail someone. Now everyone does it, and no one can stop them." Chelnokov explained that he wanted to prompt an investigation into the whole matter of illegal phone-tapping. "This is a crime and the people responsible should be prosecuted," he told the Telegraph. One of those whose phones were tapped was Natalya Gevorkian, a top Russian journalist. She was overheard speaking to Lena Erikkson, a friend who was editing the potentially explosive tell-all autobiography of Boris Yeltsin's former bodyguard, Alexander Korzhakov. Miss Erikkson was heard complaining that she had gotten threatening phone calls and was afraid that her apartment was full of listening devices. "I never really believed they tapped ordinary people's phones until I saw that file," Miss Gevorkian, an expert on the KGB, who is now the Paris correspondent of the Russian newspaper Kommersant, told the Telegraph. She said she believed that most bugging was being done by security firms employed by Russia's "oligarchs" to spy on each other. These private detectives remain closely connected to former FSB and KGB colleagues. "The secret police have been privatized," she said. "These people used to be the servants of the Communist Party ñ now they just serve whoever pays them." But some observers say that the problem of covert bugging and surveillance is not merely the work of private entities. They say the government remains the worst offender. "I'm scared to use the phone, at work or at home," Genrikh Padva, a prominent lawyer, told the Telegraph. "You can't have a confidential conversation on the phone any more." Padva cited a sharp rise in the number of cases in which prosecutors have bugged a suspect's phone even before the official start of criminal proceedings ñ a move that is illegal under Russian law. Transcripts of the suspect's conversations are then used as evidence in court. He cited one transcript of talks between a lawyer and his client. Privacy rights activists have warned against the FSB's plan to install monitoring equipment, similar to the Carnivore system being used by the FBI in the U.S., at Internet service providers, allowing agents to read all electronic correspondence. They say the equipment will be used to fight terrorism and organized crime ñ the same excuse used by the FBI to justify the use of Carnivore on private citizens. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 988 From: Screaming Date: Mon Jul 24, 2000 5:02pm Subject: Glenn Whidden and TSCM Written Procedures thread Thanks for the link Gregory Very interesting - if that was a picture of Glenn then I would be scared if I was a felon thanks again jc [Non-text portions of this message have been removed] 989 From: James M. Atkinson, Comm-Eng Date: Tue Jul 25, 2000 6:32pm Subject: Rumblings and Mumblings Update In case anybody is interested. 1) Front Page of "Investor's Business Daily", Volume 17, No 75, right side of page, 1/3 of the way down (article takes up about 20% of front page). Title:"Top Secrets For Sniffing Out Company Spies" Date:Tuesday, July 25,2000 I am quoted several times about how to stop spies, and what to do to keep secrets secure. 2) The new CFE textbook from the Association of Certified Fraud Examiners on "Corporate Espionage". I contributed heavily to the chapter on Technical Surveillance, and TSCM (strictly white hat stuff). This is the fourth textbook in two years where I provided materials (where I am listed in the credits). 3) I am also working on several white papers for the TSCM and technical security business, and will announce them as they are formally published (within the next month or so). It has been a busy summer... -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== [Non-text portions of this message have been removed] 990 From: Doug Ellsworth Date: Tue Jul 25, 2000 10:57pm Subject: Re: Rumblings and Mumblings Update Great job Jim! (See how positive?) -Doug ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Sent: Tuesday, July 25, 2000 4:32 PM Subject: [TSCM-L] Rumblings and Mumblings Update In case anybody is interested. 1) Front Page of "Investor's Business Daily", Volume 17, No 75, right side of page, 1/3 of the way down (article takes up about 20% of front page). Title: "Top Secrets For Sniffing Out Company Spies" Date: Tuesday, July 25,2000 I am quoted several times about how to stop spies, and what to do to keep secrets secure. 2) The new CFE textbook from the Association of Certified Fraud Examiners on "Corporate Espionage". I contributed heavily to the chapter on Technical Surveillance, and TSCM (strictly white hat stuff). This is the fourth textbook in two years where I provided materials (where I am listed in the credits). 3) I am also working on several white papers for the TSCM and technical security business, and will announce them as they are formally published (within the next month or so). It has been a busy summer... -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 991 From: James M. Atkinson, Comm-Eng Date: Tue Jul 25, 2000 10:01pm Subject: Former DOE Intelligence Chief Blasts FBI's Investigation Into Stolen Nuclear Secrets Former DOE Intelligence Chief Blasts FBI's Investigation Into Stolen Nuclear Secrets http://www.foxnews.com/national/072400/trulock_manuscript.sml Monday, July 24, 2000 By Andrew Hard Fox News has obtained a copy of the controversial manuscript written by the former chief of intelligence at the Department of Energy, Notra Trulock, in which he firmly criticizes the FBI for mishandling investigations into whether China stole nuclear secrets from the United States. The Bureau, in what they claimed to be a preliminary investigation into whether the document revealed classified information about the investigations, seized a computer hard drive upon which the 62-page manuscript was stored from Trulock's home on July 14. The investigation was initiated by a CIA official, who decided that the manuscript contained classified material after Trulock had submitted it for possible publication in a CIA internal journal. In the manuscript, Trulock accuses the FBI and Energy Department officials of lying to Congress in an effort to cover up their mishandling of the "Kindred Spirit" case, an investigation into possible Chinese espionage in U.S. nuclear facilities. "During Congressional testimony in 1999, memory loss among DOE and lab officials reached epidemic proportions; in several instances, I watched DOE officials lie under oath," wrote Trulock. "One official, for example, disclaimed any knowledge of the Kindred Spirit case until 1997, although he had been continuously involved in the case since May 1995. In order to cover up its own mishandling of the espionage investigation, FBI officials provided misleading and distorted accounts of the early stages of the espionage investigation to various Congressional committees," Trulock wrote. That testimony before Congress ended up rebounding on the Bureau, according to Trulock, as funding for security measures at DOE labs and the FBI's own investigation was cut. "Not surprisingly, absent such information the Congress remained skeptical of DOE's requirements for significant funding increases for its flagging CI [counterintelligence] program, which only amounted to about $5 million annually. Even this was fought and whittled down by officials within the Administration's Office of Management and Budget. "... Meanwhile, the FBI investigation was dragging along with few results, Justice had kicked back [the] FBI's requests for technical surveillance, and the case seemed to just die out. All this time, any potential spy at the National Labs remained in place, continued his or her access to our most sensitive secrets, and just beavered away," Trulock wrote in the confiscated manuscript. Trulock also writes of how the Clinton administration blocked congressional inquiries for information on the Kindred Spirit case. "Not surprisingly, the Administration had stonewalled the Congress ≠ especially after the 1996 Presidential election," writes Trulock. "Once in 1997 and on at least three separate occasions in 1998, Administration officials, especially within the DOE, were evidently concerned that possible congressional outrage over the Administration's handling of this case could disrupt the President's China policy." While it was blocking the release of information to Congress, Trulock wrote that the Clinton administration did not respond with sufficient fervor to ensure that security countermeasures were put into place in DOE nuclear labs. "Altogether, more than a year passed after President Clinton mandated that DOE reform its security and CI efforts before any steps were taken to begin such reform ... it was really more like 4 years since the White House and senior Intelligence, Defense, and FBI officials had been made aware of Chinese espionage at the National Labs. ... "... Privately ... DOE security officers stress the increasing difficulties encountered during the Clinton years. During the Clinton Administration, security controls and safeguards were repeatedly loosened and frequently allowed to lapse altogether ≠ at the insistence of the labs." Trulock also criticized his former colleagues in DOE security, using the alleged computer transfer of secure information by Chinese-American Dr. Wen Ho Lee as an example that they were too quick to follow the Clinton administration's security policy. "Reports by the Government [General] Accounting Office detailed laboratory failures to follow procedures for monitoring the thousands of foreign visitors, the 'loss' of thousands of classified documents, inadequate computer security procedures, and an across the board lack of accountability. ... "... Wen Ho Lee's 1997 computer transfers took place exactly during the time that DOE labs were assuring all who listen that such 'transfers' were impossible and inconceivable. If nothing else, Mr. Lee's ability to undertake successfully such transfers is a damning indictment of Lab security managers," Trulock wrote. However, Trulock also asserts that the FBI investigation focused prematurely upon Dr. Lee and the Los Alamos lab when DOE labs in general saw a massive increase in foreign visitors from "sensitive" countries. "The labs' management of the foreign visitors and assignees program became symptomatic of the endemic security problems within the complex. ... Of greatest concern were scientists from countries deemed 'sensitive' by virtue of an existing nuclear weapons program or known efforts to develop such a program. This list includes Russia, China, Israel, and Taiwan and such 'rogue states' as North Korea, Iran, and Iraq. "... In 1997, the GAO (General Accounting Office) found that while foreign visitors overall had increased by only 35% annually, the number of visitors from sensitive countries had more than tripled in number. "According to public testimony by the LANL [Los Alamos National Laboratory] Director, in 1998 alone Los Alamos had nearly 1,000 visitors or assignees from sensitive countries, 196 employees from such countries and had also experienced a 20% increase in the number of visiting Chinese from 1995 to 1999, that is throughout the Chinese spy scandal." =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== From: Charles P Date: Sat Jul 21, 2001 2:54pm Subject: Re: Foam for equipment cases Ah, B&H is a good idea, I have their catalog. It would be nice to a bulk source for sheets of it, though. I often wondered about using the spray can insulation foam. Do you know if that would be similar to the liquid foam? It seemed a bit dense. Would you know source for the liquid foam? as always Thanks Charles ----- Original Message ----- From: "James M. Atkinson, Comm-Eng" To: "TSCM-L Mailing List" Sent: Saturday, July 21, 2001 2:41 PM Subject: Re: [TSCM-L] Foam for equipment cases > At 2:33 PM -0400 7/21/01, Charles P wrote: > >I would like to get some new foam inserts for some of my halliburton cases > >but the prices from the usual dealers always seem quite high ($99 from > >Jensen for instance- that's for one case). > > > >Does anyone know of a good source for that type of foam? > > > >thanks > >Charles > > > > The foam you use will depend on how heavy/bulky the item in the case > is, and the amount of shock it can handle. > > If you need "just regular foam" contact B&H Photo for the lowest > price, but if you want something "better" look toward anti-static > foam, or some of the higher density foam sheets. > > If you have something that has some really bizarre shapes (or is > bulky) then consider a liquid foam that you can form around the item, > and then trim away the excess once it is solid. > > -jma > -- > > -------------------------------------------------------------------------- ----------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > -------------------------------------------------------------------------- ----------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------- ----------------------- > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3393 From: DrPepper Date: Sat Jul 21, 2001 3:56pm Subject: Re: Foam for equipment cases yeah, , ,, just go to your local hardware store and get a can of foam, crack sealant. It will spray in and it works fine. Just be sure to use plastic liner on the stuff you don't want to damage. It's an adhesive, also.. ------------------------ Charles P wrote: > Ah, B&H is a good idea, I have their catalog. It would be nice to a bulk > source for sheets of it, though. > > I often wondered about using the spray can insulation foam. Do you know if > that would be similar to the liquid foam? It seemed a bit dense. Would you > know source for the liquid foam? > > as always > Thanks > Charles > > ----- Original Message ----- > From: "James M. Atkinson, Comm-Eng" > To: "TSCM-L Mailing List" > Sent: Saturday, July 21, 2001 2:41 PM > Subject: Re: [TSCM-L] Foam for equipment cases > > > At 2:33 PM -0400 7/21/01, Charles P wrote: > > >I would like to get some new foam inserts for some of my halliburton > cases > > >but the prices from the usual dealers always seem quite high ($99 from > > >Jensen for instance- that's for one case). > > > > > >Does anyone know of a good source for that type of foam? > > > > > >thanks > > >Charles > > > > > > > > The foam you use will depend on how heavy/bulky the item in the case > > is, and the amount of shock it can handle. > > > > If you need "just regular foam" contact B&H Photo for the lowest > > price, but if you want something "better" look toward anti-static > > foam, or some of the higher density foam sheets. > > > > If you have something that has some really bizarre shapes (or is > > bulky) then consider a liquid foam that you can form around the item, > > and then trim away the excess once it is solid. > > > > -jma > > -- > > > > -------------------------------------------------------------------------- > ----------------------- > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 http://www.tscm.com/ > > Gloucester, MA 01931-8008 jmatk@tscm.com > > -------------------------------------------------------------------------- > ----------------------- > > The First, The Largest, The Most Popular, and The Most Complete TSCM, > > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > > -------------------------------------------------------------------------- > ----------------------- > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 3394 From: James M. Atkinson, Comm-Eng Date: Sat Jul 21, 2001 7:28pm Subject: Re: Foam for equipment cases At 3:54 PM -0400 7/21/01, Charles P wrote: >Ah, B&H is a good idea, I have their catalog. It would be nice to a bulk >source for sheets of it, though. > >I often wondered about using the spray can insulation foam. Do you know if >that would be similar to the liquid foam? It seemed a bit dense. Would you >know source for the liquid foam? > >as always >Thanks >Charles B&H is OK when you need 3-4 sets of foam, but if you need much more then that you would do well for find a foam vendor local o you and but it in bulk. Also, to keep things nice and neat I find it desirable to periodically pull out all the foam and replace it with virgin pieces. -jma -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3395 From: James M. Atkinson, Comm-Eng Date: Sat Jul 21, 2001 7:31pm Subject: Re: Foam for equipment cases Use two plastic bags, one for the top, an one for the bottom. Place a thin board between then to make a clean dividing line. -jma At 1:56 PM -0700 7/21/01, DrPepper wrote: >yeah, , ,, just go to your local hardware store and get a can of foam, crack >sealant. It will spray in and it works fine. Just be sure to use plastic liner >on the stuff you don't want to damage. It's an adhesive, also.. > >------------------------ > >Charles P wrote: > >> Ah, B&H is a good idea, I have their catalog. It would be nice to a bulk >> source for sheets of it, though. >> >> I often wondered about using the spray can insulation foam. Do you know if >> that would be similar to the liquid foam? It seemed a bit dense. Would you >> know source for the liquid foam? >> >> as always >> Thanks > > Charles -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3396 From: Jack Miller Date: Sun Jul 22, 2001 3:25am Subject: Is spread spectrum safe? Any one knows what type of modulation do military people use? I am sure they should be more than just the standard FM and AM modulation!! Also is Spread Spectrum Modulation (FH, TH ...) interceptable and breakable? thanks ===== ======================================= Jack Miller Researcher Paython and Co. ======================================= __________________________________________________ Do You Yahoo!? Make international calls for as low as $.04/minute with Yahoo! Messenger http://phonecard.yahoo.com/ 3397 From: Steve Whitehead Date: Sun Jul 22, 2001 1:37pm Subject: Granddad caught in secret nude romp "RONNIE GOVENDER An Old Mutual financial adviser claims he was lured into a sex trap by a disgruntled client who secretly videotaped his nude romp with a young woman. Dharam Ramjuggernath, a 59-year-old Durban grandfather, told Judge Brian Galgut on Friday that Subash "Harold" Haribhai had threatened to show the tape to his wife and family. According to papers filed in the Durban High Court, Ramjuggernath sold insurance policies to Haribhai's mother. After her death in 1997, Haribhai was unhappy with the manner in which Old Mutual wound up her estate, and accused Ramjuggernath of defrauding him. Ramjuggernath said Haribhai was using the videotape to extort money from him. He asked the court to restrain Haribhai from harassing him and his family and to hand over the video. He said he had been lured to an Amanzimtoti flat on June 27 on the pretext of selling a policy to a man calling himself Terence Pillay and his "wife", Patsy. While Pillay was out of the room, he said, Patsy "suggested that I should meet her". They met at the flat on July 2, and ended up naked and kissing, he said. Two days later, Pillay arranged to meet Ramjuggernath to conclude the insurance deal - but instead produced a tape of his encounter with Patsy. At that point, Haribhai - who admitted owning the apartment - entered the room and accused Ramjuggernath of having defrauded his mother's estate. "He said that I must 'sort him out' . . . he then threatened to show the tape to my wife and family and threatened us with death. . ." Ramjuggernath said. Haribhai denied the allegations. "I don't know a Patsy or this Mr Pillay," he said" Story at http://www.suntimes.co.za/2001/07/22/news/news07.htm Steve Whitehead Managing Member E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa TSCM Services URL : http://www.tscm.co.za [Non-text portions of this message have been removed] 3398 From: Steve Whitehead Date: Sun Jul 22, 2001 1:41pm Subject: Counting the cost of computer hacking " An e-security expert says SA organisations face a one-in-20 chance of falling victim to cybercriminals, writes Lynne Rippenaar Mr Twig, a South African hacker who seems to have had his heart broken, has decided to profess his love on the website of the Internet Corporation for Assigned Names and Numbers, managing to deface the site as he tries to woo back his lover. But while the young suspect, believed to be based in Cape Town, may evoke some sympathy from the jilted, the extent of damage hackers like him cause to corporations is exorbitant. Mr Twig has defaced 30 sites over the past two years, and has threatened to attack another 1 000 vulnerable local sites. Two years ago Edgars, the clothing retailer, lost about R1-million in revenue after a computer programmer brought down the systems of more than 600 stores for a day. The good news is that professional hackers involved in industrial espionage in SA are few and far between. The bad news is that anyone who wants to try his or her hand at hacking can load information from the Internet on how to hack into systems and deface websites, and that most companies are often not aware that their systems have been hacked into. At least 147 companies in SA were attacked in June, according to specialist technology company Computer Security and Forensic Solutions. Computer security breaches are growing at an annual rate of 60%, says the company. Hacking has become such a concern that professional services firm Ernst and Young introduced a Counterhack course last year to equip organisations with skills to combat hackers. Mark O'Flaherty, partner in charge of e-security for Ernst and Young's Information Systems Assurance and Advisory Services, says organisations face a one-in-20 chance of being hacked and the more they understand and know about their network, the better equipped they are to protect it. "Because we believe that hacking is a major threat . . . and because we have direct access to in-house information and security experts and ex-hackers, our aim is to join forces with corporate South Africa." He said that once a hacker has compromised a system, he or she will return through installed "back doors" and spread the word to other hackers on how to penetrate the system. What aggravates the problem is the absence of laws against hacking and the defacing of websites, making South African cyber criminals difficult to prosecute. According to Wimpie Britz, the CEO of Computer Security and Forensic Solutions, companies can expect to spend about R10 000 to R100 000 a month on maintaining security. Reversing the defacing of a website could cost a company between R5 000 and R7 000 and may take anything from one day to one week to rectify. Finding a security breach and the plugging of the problem could take anything from one month to beyond one year. On the other hand, hackers could earn anything from R1 000 to over R1-million for information stolen per attack. Britz says hackers are getting cleverer and gaining access to more hacking tools, freely available on the Internet. "What companies do not seem to understand is that once you've done your security, it is an ongoing (operation). It is not something you can do in July and then hope in August you are still going to be secured, because new tools are being developed on a daily basis and new exploits are being developed on a daily basis." He says hackers often use the defacing of a website as a decoy to cover up what they are doing in the system. According to Britz, the most dangerous hacker is the professional, out to steal sensitive information such as company plans or data from large organisations and sell it to competitors or other interested parties. "From about 20 investigations that we get per month involving computer crimes being committed in companies, I would say about five revolve around industrial espionage, where information is stolen and either being used against the company for blackmailing or for financial or personal gain." While defacing a website is an easy attack, stealing information is much more difficult to pull off. Jaco Grobler, senior manager technology risk services at PricewaterhouseCoopers, says company losses due to hacking are not always tangible; but a company's reputation may suffer, and lost customer confidence "could cost millions in lost turnover". "Just investigating a security incident can cost many times the actual financial loss. Introducing appropriate controls after an incident will also cost a lot of money," says Grobler. Blackmailing by hackers is also becoming a big problem as hackers may start threatening prospective clients into buying their services. Glenn Kieser, manager of Infrastructure Consulting at Microsoft SA, says that the hacking industry in SA is not as huge as hacking in the US. However, hackers still cause extensive damage to businesses if they manage to get hold of sensitive information. "If a hacker sends (companies) . . . a list of files on their servers, they must assume that the hacker has had access to more files," he said. Microsoft itself has not escaped the clutches of hackers. In October a hacker gained access to some of the company's confidential source codes. The South African government has also not escaped the scourge. Amanda Blom, website manager at the State Information Technology Agency, says government websites have been hacked, but that the "design of websites limited damage to embarrassment and the time required to correct" the defaced website. Kieser also warns that hacking is moving away from a simple prank to what is considered a serious crime. "Hacking is turning very quickly from cult status, where people are revered and gain status, to where governments are passing legislation declaring hackers terrorists." Story at http://www.suntimes.co.za/2001/07/22/business/news/news04.htm Steve Whitehead Managing Member E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa TSCM Services URL : http://www.tscm.co.za [Non-text portions of this message have been removed] 3399 From: Bob Washburne Date: Sun Jul 22, 2001 6:23pm Subject: Ode to Code Red In case you hadn't heard, there is a worm crawling around on the web at the moment called "Code Red." It isn't out to damage your computer, like the "Melisa" virus, but is part os a DDOS (Distributed Denial Of Service) attack against whitehouse.gov. Basicly, for the first twenty days of the month it looks for Microsoft web servers which it can infest and replicate from. This has led to quite a bit of Internet slowdown and crashed a few routers over the past week. Then for the rest of the month it floods (what used to be but was quickly changed) the IP address of www.whitehouse.gov with http requests. If you aren't running a M$ web server, then all you will notice are some strange packets at port 80. Just some minor traffic, no damage or breach. If you ARE running MS IIS,... well, why AREN'T you running Apache? Details can be found in all the usual places; BugTraq, Slashdot, etc. http://slashdot.org/article.pl?sid=01/07/19/2230246&mode=thread But what can't be found everywhere is the following poem I shamelessly copied from a Slashdot poster. Enjoy. While I was working for the feds, I met a worm they called Code Red... And Code Red hit 100K hosts, And every host had 3 infections And every infection had 100 threads And every thread sent 100k And every k had a thousand bytes And every byte was sent in 1 packet And every packet had a 40-byte header Headers, packets, Bytes, k, Infections, hosts and threads... Once every month, just to piss off the Feds. Bob Washburne 3400 From: Tim Date: Sun Jul 22, 2001 10:06pm Subject: Standard message formats? I'm searching for documentation regarding standard message formats used by different world governments for different communications. The whys and the whats are what i'm most interested in, but other info would be great. Example: The US Navy uses the following standard message format for ship-to-ship communication (low-bandwidth) 0000Z/CRITIC FROM blah blah TO blah blah You get the idea. Thanks, Tim 3401 From: Miguel Puchol Date: Mon Jul 23, 2001 0:55pm Subject: RE: Standard message formats? Hi Tim, The WUN (Worldwide Utility News) is a great source of information regarding all types of comms (specialising in HF modes). Take a look at www.wunclub.com They have a very good FAQ on digital modes. All the best, Mike > -----Mensaje original----- > De: Tim [mailto:amnis@p...] > Enviado el: lunes, 23 de julio de 2001 5:07 > Para: tscm-l@yahoogroups.com > Asunto: [TSCM-L] Standard message formats? > > > I'm searching for documentation regarding standard message formats used > by different world governments for different communications. > > The whys and the whats are what i'm most interested in, but other info > would be great. > > Example: > > The US Navy uses the following standard message format for ship-to-ship > communication (low-bandwidth) > > 0000Z/CRITIC > > FROM blah blah > TO blah blah > > You get the idea. > > Thanks, > Tim > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3402 From: Dave Emery Date: Mon Jul 23, 2001 7:18pm Subject: Spread spectrum by military On Sun, Jul 22, 2001 at 01:25:39AM -0700, Jack Miller wrote: > Any one knows what type of modulation do military > people use? I am sure they should be more than just > the standard FM and AM modulation!! That is a very broad question. Army units in the field have traditionally used 30-74 mhz nbfm, but recently a lot of that gear has been replaced with SINGCARS radios which can also do frequency hopped digital modes with encryption. Hopping patterns can include tens or hundreds of frequencies with modulation on each hop being some form of GMSK I believe (? not sure I remember whether it is GMSK or something else correctly). In addition to SINGCARS, the military has various cell like systems such as MSE - this is secure digital with some level of frequency hopping. Low level military tactical units (platoon level) have recently been fooling around with modified FRS radios for low cost short range coordination between individual troops - these are simple nbfm. And lots of military units use more or less standard civilian type nbfm and secure FSK voice (DES-XL, Fascinator, Indictor, etc) VHF and UHF handheld radios, both in conventional direct and repeater configurations and increasingly in state of the art Astro digital (and mixed digital and analog) trunked systems - including such systems on board Navy carriers and other large ships. On HF in addition to the traditional SSB voice and FSK crypto RTTY, there is now the ANDVT secure digital voice system which uses 39 tone parallel tone data modulation in a SSB voice channel to transmit 2400 baud secure encrypted vocoded voice and data. And lots of 39 tone and 16 tone parallel tone high speed data and serial tone (PSK) high speed (2400 and 4800 baud) data as well. There are also systems that do narrowband and wideband freqeuncy hopping on HF including complex wideband signals 50 khz or more wide - these can supply substantial data rates when conditions are right in NVIS applications. Most military aircraft communication remains AM in VHF (136-144 primarliy) and the traditional 225-400 mhz band, but here too there is available digital signalling and encryption using AM digital modulation (KY-58). And for some time frequency hopping (Have Quick) has been available on UHF with ten or twenty or more hopping channels in the hopping set. Military tactical satcom in UHF (240-310 mhz) is almost all encrypted digital, using filtered FSK, BPSK, and QPSK with and without Forward Error Correction. Much of this is now Demand Assigned Multiple Access (DAMA) with actual transmissions being in timed bursts under control of a master station. As for systems used for higher level communications, much military satcom (DSCS and Milstar) is direct sequence spread spectrum using cryptographic spreading sequences generated from random keys, some of these systems also do frequency hopping. The military, particularly the Navy, also makes considerable use of commercial satcom on commercial satellites using modern QPSK digital modulation with Forward Error Correction to link most larger Navy ships back to shore with Internet (and SIPRNET and INTELINK) and multiple secure digital voice circuits. And tactical data distribution is done with hopped DS spread spectrum signals in L band (JTIDS and Link 16). And various classified systems for control of and return of intelligence from remote vehicles and sensors use a variety of exotic wideband modulations. So the answer to your question is yes, they use virtually every modulation scheme ever fielded somewhere for something. > > Also is Spread Spectrum Modulation (FH, TH ...) > interceptable and breakable? Yes. It becomes very difficult to usefully intercept FH if the hopping patterns are cryptographicly random and the number of hop frequencies in the hopping set is large. Not, however, impossible using lots of processing power if the signal to noise ratio of the signal is good. Intercepting direct sequence spread spectrum and recovering the underlying (digital) modulation requires knowing the spreading sequence. Thus if this is cryptographicly random such interception is essentially impossible without knowlage of the key. Detecting the signal and determining the raw chipping sequence is readily possible given sufficient signal to noise ratio as most DS signals look like very fast BPSK, but detecting such signals many db under the wideband noise floor where they are still readible to legitimate receivers that know the spreading sequence can of course be very challenging. Both FH and DS signals that use known or breakable or guessable hop and/or spreading sequences - such as almost all consumer devices that use spread spectrum - are quite readily interceptable with suitable gear and signal processing software. Needless to say traditional scanners or other receivers aren't much use, but this does not mean that such interception is impossible for those with the right equipment - and anyone evaluating the security such devices should always remember that at the very minimum the devices themselves - which are usually dirt cheap - can receive the signals, so it really does not take tens or hundreds of K of gear if one does things right. > > thanks > > ===== > ======================================= > Jack Miller > Researcher > Paython and Co. > ======================================= ----- End forwarded message ----- -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 3403 From: Craig Snedden Date: Tue Jul 24, 2001 6:45am Subject: Re: Standard message formats? Tim, Something of a specialist subject of mine. Contact me off list with some idea of what you are looking for. Generally there are simply "variations on a theme" and once you know what you are looking at, realising the format is relatively straightforward. Craig craig@d... ----- Original Message ----- From: "Tim" To: Sent: Monday, July 23, 2001 4:06 AM Subject: [TSCM-L] Standard message formats? > I'm searching for documentation regarding standard message formats used > by different world governments for different communications. > > The whys and the whats are what i'm most interested in, but other info > would be great. > > Example: > > The US Navy uses the following standard message format for ship-to-ship > communication (low-bandwidth) > > 0000Z/CRITIC > > FROM blah blah > TO blah blah > > You get the idea. > > Thanks, > Tim > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 3404 From: James M. Atkinson Date: Wed Jul 25, 2001 11:55am Subject: Performance Evaluations THESE QUOTES WERE TAKEN FROM ACTUAL CORPORATE PERFORMANCE EVALUATIONS. 1. "Since my last report, this employee has reached rock bottom and has started to dig." 2. "I would not allow this employee to breed." 3. "This associate is really not so much of a has-been, but more of a definitely won't be." 4. "This young lady has delusions of adequacy." 5. "Works well when under constant supervision and cornered like rat in a trap." 6. "When she opens her mouth, it seems that this is only to change whichever foot was previously in there." 7. "He sets low personal standards and then consistently fails to achieve them." 8. "This employee is depriving a village somewhere of an idiot." 9. "This employee should go far - and the sooner he starts, the better." THESE ARE ACTUAL LINES FROM MILITARY PERFORMANCE APPRAISALS 1. Got into the gene pool while the lifeguard wasn't watching. 2. A room temperature IQ. 3. Got a full 6-pack, but lacks the plastic thingy to hold it all together. 4. A gross ignoramus -- 144 times worse than an ordinary ignoramus. 5. A photographic memory but with the lens cover glued on. 6. As bright as Alaska in December. 7. Gates are down, the lights are flashing, but the train isn't coming. 8. He's so dense, light bends around him. 9. If he were any more stupid, he'd have to be watered twice a week. 10. It's hard to believe that he beat a 1,000,000 other sperm. 11. Takes him 2 hours to watch 60 minutes. 12. Wheel is turning, but the hamster is dead. -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3405 From: Miguel Puchol Date: Wed Jul 25, 2001 4:41pm Subject: Nigerian scam, round II Hi all, From the following page... http://www.goldhaven.com/scam_page/Nigerian1.htm quoted: "Any approach should be reported to the local police with all documents received being handed in. The local police can refer the matter to their INTERPOL National Central Bureau (NCB), who will in turn notify the Nigerian Federal Police." ...regarding the Nigerian scams. So now you know. I still keep a letter sent to us about 8 years ago, as something funny and laughable, aswell as the horrendous print of Nigerian stamps, that seem to be handpainted by kindergarten atendees. BTW James, the quotes from the performance evals got me ROTFL :-) All the best, Mike 3406 From: James M. Atkinson Date: Thu Jul 26, 2001 0:28pm Subject: New Tutorial Online I have a new tutorial online that the list will find of interest. http://www.tscm.com/TSCM102sweepgear.html -jma -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3407 From: James M. Atkinson Date: Thu Jul 26, 2001 8:56pm Subject: Get Off The fence Hey Folks, I don't mean to beat a dead horse, but if you are on the fence about grabbing up an OSCOR, ORION, or related accessories you need to do so very soon. The prices jump almost 10% on all orders placed after next Tuesday, so if your on the fence you would do well to get your order submitted ASAP... you have the next three business days. -jma -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3408 From: Marvin Date: Thu Jul 26, 2001 4:28pm Subject: Laser tapping thingy I've heard about a kind of device that's supposedly been in use a fair deal. I don't know what to call it but it would tap a location by, through optical means, picking up vibrations caused by sound in windows and other suitable objects near a conversation. Is it real, and how would it be detected? -- { marvin } 3409 From: Rob Muessel Date: Fri Jul 27, 2001 8:58am Subject: Re: Laser tapping thingy It's a nice concept. The laser beam, a continuous wave, strikes the windowpane, for example, and is reflected back off it. It is modulated by the mechnanical vibrations of the window. The beam is demodulated by the receive and, just like that, you have the room conversation. It works under controlled conditions and is very difficult to implement in the field. First, think of the vibration of the window. The beam will be modulated by all of the sound striking the window, not just the room conversation. This includes traffic noise, aircraft, and all other environmental sound. It also includes audio frequency mechanical vibrations carried by the building structure- HVAC blowers, plumbing, elevators, and lots of others. These all tend to mask the room audio and can be difficult to filter. There is also a matter of alignment of the device. The transmitter and receiver really have to be perpendicular to and at the same elevation as the window. The laser beam travels in a straight line and reflects off of the surface and an angle opposite that of the incidence. Think of triangulation of the transmitter and receiver as a banked pool shot, only in three dimensions, not just two. I'm not aware of any legitimate sources for this kind of device. CCS was advertising one a few years ago, but required a deposit of about $25000 if memory serves, before they'd make one. Have said all that, how do you detect one? If it's visible light which would be foolish to use, you'd see a small dot on the window and on some part of the room where the beam landed after passing through the window. If an infrared wavelength is used, detection depends on the wave length. Window glass is transmissive to near IR energy. A number of chip cameras are sensitive in the near IR region and could pinpoint the source. Performance is best at night. If used during the day, the camera should have a filter that block visible light. If the transmitter is in the mid and far IR regions, a device like Raytheon's Palm IR will do the same thing. But window glass is not transissive to these wavelengths, so the search must be made from the exterior of the building. Generally, though, laser listening is not real high on the list of real-life threats. -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 3410 From: Marcelrf Date: Fri Jul 27, 2001 2:12am Subject: [Fwd: Urgent attention] Here is the old scam again............ -------- Original Message -------- Subject: Urgent attention Date: Fri, 27 Jul 2001 07:03:54 +0000 From: "Alhaji Idris Bagudu" To: idalibagudu@h... Alhaji Idris Ali Bagudu E-mail: idalibagudu@h... Kano - Nigeria. Dear Sir, May I briefly introduce myself to you. I am Idris Ali Bagudu the son of Alhaji Abubakar Atiku Bagudu a very close associate of the Abachaís family the late Nigerian Military Head of State, General Sani Abacha who died on the 8th of June 1998. Ever since the death of the General, his family has been facing a lot of problems mostly with the present Civilian Government. Consequently his son (my friend) Mohammed Abacha has been under torture making a lot of confessions as regards valuables, money inclusive that his late father entrusted in his hand for safekeeping. The latest is his confession on the US$700,000,000.00(Seven Hundred Million United States Dollars) cash his late father gave him for safekeeping. Please check Newswatch Magazine of May 8th/15th, 2000 issue on [Website:http://www.newswatchngr.com/] to confirm the above story. Also the recent publication by THISDAY Newspaper on Thursday March 1st Edition, which London Court clear ways for more recovering of Abacha's family looted money. Please confirm this issue on website: http://www.thisdayonline.com/, click the Archive/2001/March 2001/Thursday March 1st. Being a very close friend of Mohammed Abacha, he sometime in 1999 shortly after his fatherís death gave me US$60,000,000.00 (Sixty Million United States Dollars) to transfer out of the country. Normally, we (I and Mohammed Abacha) usually do such transaction, by first sending the money out by Cargo to a security company outside Nigeria, as photographic materials. And thereafter go to the security company for claim before transferring it to any bank of our choice. Presently, I cannot travel out of Nigeria, because, if you have gone through the above mentioned website address, you will see how Mohammed Abachaís confession have implicated my father and in fact the whole of my family (The Baguduís). This has actually caused the Federal Government of Nigeria to confiscate our international passports, frozen every of my family member bank accounts both home and abroad, even our properties. My problem now is, since Mohammed Abacha has started confessing I want someone that can assist me to move the US$60,000,000.000 (Sixty Million United State Dollars) out from Nigeria, before Mohammed will open up to the Security Agents. To this regard I am soliciting for your assistance to claim the boxes containing the money in any country outside Nigeria where I can arrange and move the money to. I shall be ready to negotiate with you any percentage you might want from the sum. On your advice, I shall be ready to invest my own share of the sum in your country. I assure you that there will be no problems at all in the course of moving out the money. I shall give you details as soon as you accept assisting me. Please kindly contact me on my e-mail:idalibagudu@h.... I shall so much appreciate your immediate response for full details of the business. Thanking you in anticipation to your kind understanding and cooperation. Please when replying send me your private telephone and fax numbers. You can reply to the mail address above. Best Regards, Alhaji Idris Ali Bagudu. _________________________________________________________________ Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp 3411 From: Ray Van Staden Date: Thu Jul 26, 2001 11:15pm Subject: INTERCEPTION & MONITORING BILL - SOUTH AFRICA The South African government wants to pass a bill called the "Interception and monitoring bill". http://www.polity.org.za/govdocs/pr/2001/pr0718c.html INTERCEPTION AND MONITORING BILL Issued by: Parliament of the Republic of South Africa 18 July 2001 Press statement issued by Adv. Johnny de Lange, MP and Chairperson of the Portfolio Committee on Justice & Constitutional Development. The Interception and Monitoring Bill has been introduced in Parliament and is referred to the Portfolio Committee on Justice and Constitutional Development for consideration. The Bill aims to regulate the interception and Monitoring of certain communications; to provide for interception of postal articles and communications and for the monitoring of communications in the case of a serious offence or if the security or other compelling national interests of the republic are threatened; to prohibit the provision of certain telecommunication services which do not have the capacity to be monitored; to regulate authorised telecommunications monitoring; and to provide for matters connected therewith. If any person or organisation would like to make written representations on the Interception and Monitoring Bill he or she should do so by no later than 13 August 2001. Anyone who would like to give further oral evidence to the Committee in regard to his or her written submissions should notify the Committee by no later than 13 August 2001. If the need should arise public hearings will provisionally be scheduled to take place during the third term of parliament in 2001. The Committee requests all persons and institutions that wish to send submissions to make 30 copies available to the Committee, if possible. It should be pointed out that the Committee reserves the right to decide: Whether or not to hold public hearings on the Bill Whether or not to give individuals or representatives of organisations the opportunity to appear before it, and The date, time, venue, duration and form of the hearing. All correspondence in this regard should be addressed to: The Secretary to Parliament PO Box 15 Cape Town 8000 All correspondence should be marked for the attention of Collette Herzenberg or Zodwa Zenzile (fax 021-462 2142). Copies of the Bill may, upon availability, be obtained from Ms Herzenberg and Ms Zenzile. Issued by Adv Johnny de Lange, MP Contact Zodwa Zenzile (izenzile@p...) Tel: 021-403 3660 Collette Herzenberg (cherzenberg@p...) Tel: 021-403 3669 --- From the desk of Raymond van Staden Van Staden and Associates cc Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za 3412 From: Steve Uhrig Date: Fri Jul 27, 2001 11:48am Subject: Re: Urgent attention Once upon a midnight dreary, Marcelrf pondered, weak and weary: > Here is the old scam again............ > May I briefly introduce myself to you. I am Idris Ali Bagudu the > son of Alhaji Abubakar Atiku Bagudu a very close associate of the > Abachaís family the late Nigerian Military Head of State, General > Sani Abacha who died on the 8th of June 1998. Anyone active in international operations, or probably just the web in general anymore, sees several of these a week. It's just a waste of time and bandwidth to keep commenting on them. The same as all the virus warnings. Please, no more references to these scams. They're news to no one anymore. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3413 From: James M. Atkinson Date: Fri Jul 27, 2001 5:51pm Subject: PROPOSED VIRGINIA TSCM COUNTERINTELLIGENCE APPLICATION Due to all the requests for information regarding TSCM permits in the various state here is the following proposed application form. --------------------------------- PROPOSED VIRGINIA TSCM COUNTERINTELLIGENCE APPLICATION Last name: ________________ First name: (Check appropriate box) [_] Billy-Bob [_] Bobby-Sue [_] Billy-Joe [_] Bobby-Jo [_] Billy-Ray [_] Bobby-Ann [_] Billy-Sue [_] Bobby-Lee [_] Billy-Mae [_] Bobby-Ellen [_] Billy-Jack [_] Bobby-Beth Ann Sue Age: ____ (if unsure, guess) Sex: ____ M _____ F _____ Not sure Shoe Size: ____ Left ____ Right ____ Middle Occupation: [_] Farmer [_] Mechanic [_] Hair Dresser [_] Waitress [_] Un-employed [_] Dirty Politician Spouse's Name: __________________________ 2nd Spouse's Name: __________________________ 3rd Spouse's Name: __________________________ Lover's Name: __________________________ 2nd Lover's Name: __________________________ Relationship with spouse: [_] Sister [_] Aunt [_] Brother [_] Uncle [_] Mother [_] Son [_] Father [_] Daughter [_] Cousin [_] Pet Number of children living in household: ___ Number of children living in shed: ___ Number of children that are yours: ___ Mother's Name: _______________________ Father's Name: _______________________(If not sure, leave blank) Education: 1 2 3 4 (Circle highest grade completed) Do you [_] own or [_] rent your mobile home? (Check appropriate box) Vehicles you own and where you keep them: ___ Total number of vehicles you own ___ Number of vehicles that still crank ___ Number of vehicles in front yard ___ Number of vehicles in back yard ___ Number of vehicles on cement blocks Firearms you own and where you keep them: ____ truck ____ kitchen ____ bedroom ____ bathroom ____ shed Model and year of your pickup: _____________ 194__ Do you have a gun rack? [_] Yes [_] No; If no, please explain: Newspapers/magazines you subscribe to: [_] The National Enquirer [_] The Globe [_] TV Guide [_] Soap Opera Digest [_] Rifle and Shotgun ___ Number of times you've seen a UFO ___ Number of times you've seen Elvis ___ Number of times you've seen Elvis in a UFO ___ Number of times you've pretended to be Elvis How often do you bathe: [_] Weekly [_] Monthly [_] Not Applicable How many teeth? ___ Color of teeth: [_] Yellow [_] Brownish-Yellow [_] Brown [_] Black [_] N/A Brand of chewing tobacco you prefer: [_] Red-Man How far is your home from a paved road? [_] 1 mile [_] 2 miles [_] don't know How often are black helicopters flying over your trailer? [_] hourly [_] daily [_] weekly [_] don't know because they're stealth helicopters Do signs near you have covert NATO maps on them yet? [_] no [_] yes Is your telephone tapped by the government? [_] no [_] yes [_] yes, because my line voltage is under 46 volts [_] yes, because the government told me so [_] yes, because Elvis told me so [_] don't know What is the current national wiretap test number? [_] (800) 692-6447 [_] (703) 351-2505 [_] (800) 432-6600 [_] (202) 231-8857 [_] don't know What is touch tone code to deactivate or cancel a wiretap? [_] 1157 [_] 2222 [_] 1166 [_] *89 [_] don't know What TSCM training have you completed? [_] two week course (expert course) [_] one week course (required basic course) [_] half day certification course [_] one day seminar during Soldier of Fortune convention [_] taught TSCM by Elvis while abducted by aliens [_] what training What TSCM equipment do you own? [_] digital voltmeter [_] CPM-700 [_] linemans craft set [_] linemans tone generator [_] linemans tone tracer [_] punch tool [_] spy shop bug and wiretap detector [_] universal bug and wiretap detector [_] what equipment -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3414 From: Jack Miller Date: Sat Jul 28, 2001 6:07am Subject: tapping fiber optic cables!! Are fiber optic cables tappeble with out cutting the cable and inserting something in between? is there a similar method like with copper wires were you use induction to tap it? thanks ===== ======================================= Jack Miller Researcher Paython and Co. ======================================= __________________________________________________ Do You Yahoo!? Make international calls for as low as $.04/minute with Yahoo! Messenger http://phonecard.yahoo.com/ 3415 From: James M. Atkinson Date: Sat Jul 28, 2001 11:54am Subject: Re: tapping fiber optic cables!! Jack, Yes, fiber optic cables can be very easily tapped my creating a micro-crack in the cladding and simply collecting the light that bleeds out with a purpose built adapter. Fiber optic cables an also be easily tapped buy removing a small amount of cladding and fusing a secondary fiber to the target line. Such a tap would not break the target line, but a loss measurement would note a sub 1dB variation in the signal. In fact a common pieces of fiber optic called a "LID" of "Local Signal Injection and Detection" does just that where a non interfering test signal in pushed into a cable (without breaking it), and then measured some distance out to see how a segment of cable behaves. The cleanest way is to cut the line, insert a splitter (wave-guide division multiplexer), and thus minimize signal loss. -jma At 4:07 AM -0700 7/28/01, Jack Miller wrote: >Are fiber optic cables tappeble with out cutting the >cable and inserting something in between? is there a >similar method like with copper wires were you use >induction to tap it? > > >thanks > >===== >======================================= >Jack Miller >Researcher >Paython and Co. >======================================= -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3416 From: Dave Emery Date: Sat Jul 28, 2001 1:12pm Subject: Re: tapping fiber optic cables!! On Sat, Jul 28, 2001 at 12:54:26PM -0400, James M. Atkinson wrote: > Jack, > > Yes, fiber optic cables can be very easily tapped my creating a > micro-crack in the cladding and simply collecting the light that > bleeds out with a purpose built adapter. > Generally if you bend a fiber with a sharp enough bend some light will leak out of it in the vicinty of the bend. I am not sure whether the physical mechanism here is micro-cracks in the cladding or more fundementatlly related to the electromagnetics of the fiber cladding waveguide, but I do know that there are standard jig devices that clamp on a fiber and bend it in a controlled radius - these allow recovery of enough light light to make measurements of fiber characteristics and identify particular fibers in a bundle. In fact there are handheld devices for doing this in the field - 1 khz modulated light is stuffed in one end of a fiber and the lineman are able to trace it all the way to the other end by clamping the fiber in the handheld device and listening for the tone on a speaker - these devices also can detect normal traffic on the fiber and indicate they found that rather than the tone. > Fiber optic cables an also be easily tapped buy removing a small > amount of cladding and fusing a secondary fiber to the target line. > Such a tap would not break the target line, but a loss measurement > would note a sub 1dB variation in the signal. > This is more or less the standard approach as I understand it... > In fact a common pieces of fiber optic called a "LID" of "Local > Signal Injection and Detection" does just that where a non > interfering test signal in pushed into a cable (without breaking it), > and then measured some distance out to see how a segment of cable > behaves. > > The cleanest way is to cut the line, insert a splitter (wave-guide > division multiplexer), and thus minimize signal loss. But the cut line will set off alarms... > > -jma > > > > At 4:07 AM -0700 7/28/01, Jack Miller wrote: > >Are fiber optic cables tappeble with out cutting the > >cable and inserting something in between? is there a > >similar method like with copper wires were you use > >induction to tap it? > > > > > >thanks > > > >===== > >======================================= > >Jack Miller > >Researcher > >Paython and Co. > >======================================= > > > -- > > ------------------------------------------------------------------------------------------------- > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008jmatk@tscm.com > ------------------------------------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ------------------------------------------------------------------------------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 3417 From: Gordon Mitchell Date: Sun Jul 29, 2001 0:05am Subject: Re: tapping fiber optic cables!! Microcracks only cause fiber breakage, not light leakage. By the time a crack gets from the surface of a 125 micron diameter fiber to the region in the center (typically 10 micron diameter) where light is the fiber is broken! 'most all fibers in use today are single mode (they really guide 2 hybrid modes but are still called single mode). In these fibers the difference in core and cladding refractive index is small, the fibers typically have a numerical aperture of about 0.1. Because of this low NA bending does cause losses. When the fiber is bent with a radius of a cm or so lots of light leaks out. Half a dozen wraps around a pencil will cause loss of virtually all the light in the fiber. This light is lost from guided modes to the radiation spectrum. It strikes the clad/buffer interface and subsequently any cabling. Small count cables often fibers are often surrounded by hytrel, a bit of kevlar and IR transparent jackets. This allows the light to leak out inefficiently. The light injection and detection systems discussed below don't actually work in these circumstances they need access to the buffer. Of course normal telco fiber cables (with more than 100 fibers) are not easily tapped by bending. There are a number of schemes used for alarming fibers. This is not normally done in commercial applications. The simplest uses an optical time domain reflectometer. It sends a pulse of light down the fiber and watches Rayleigh scattering from the silica. The scattered light will sharply decrease at a bend... sometimes a reflection will be induced if the bend is sharp. Other alarming schemes observe basic characteristics of the fiber that are sensitive disturbances which would remove light. Fiber tapping is not quite as simple as putting a sniffer on a slow 100 MB ethernet cable. It requires a high speed system to manage the received information. Since an eavesdropper can cause damage with imperfect information he can work with less light than the intended recipient. An eavesdropper with a 10^-3 bit error rate is a significant threat whereas normal systems want better than a 10^9 bit error rate. This combined with the attenuation of the fiber means that an intruder near the transmitter doesn't need a large fraction of the light to steal information. This is why just monitoring received end signal strength is not an effective alarm. Fibers have a significant advantage over wires, however. An intruder must touch the fiber to get light out. That means that a physical inspection is more valuable for fiber systems than for wires carrying sensitive information. Gordon Mitchell Electronic eavesdropping detection & finding clues in computers. (425) 489-0446 Dave Emery wrote: > > On Sat, Jul 28, 2001 at 12:54:26PM -0400, James M. Atkinson wrote: > > Jack, > > > > Yes, fiber optic cables can be very easily tapped my creating a > > micro-crack in the cladding and simply collecting the light that > > bleeds out with a purpose built adapter. > > > Generally if you bend a fiber with a sharp enough bend some > light will leak out of it in the vicinty of the bend. I am not sure > whether the physical mechanism here is micro-cracks in the cladding or > more fundementatlly related to the electromagnetics of the fiber > cladding waveguide, but I do know that there are standard jig devices > that clamp on a fiber and bend it in a controlled radius - these allow > recovery of enough light light to make measurements of fiber > characteristics and identify particular fibers in a bundle. In fact > there are handheld devices for doing this in the field - 1 khz modulated > light is stuffed in one end of a fiber and the lineman are able to trace > it all the way to the other end by clamping the fiber in the handheld > device and listening for the tone on a speaker - these devices also can > detect normal traffic on the fiber and indicate they found that rather > than the tone. > > > Fiber optic cables an also be easily tapped buy removing a small > > amount of cladding and fusing a secondary fiber to the target line. > > Such a tap would not break the target line, but a loss measurement > > would note a sub 1dB variation in the signal. > > > This is more or less the standard approach as I understand it... > > > In fact a common pieces of fiber optic called a "LID" of "Local > > Signal Injection and Detection" does just that where a non > > interfering test signal in pushed into a cable (without breaking it), > > and then measured some distance out to see how a segment of cable > > behaves. > > > > The cleanest way is to cut the line, insert a splitter (wave-guide > > division multiplexer), and thus minimize signal loss. > > But the cut line will set off alarms... > > > > > -jma > > > > > > > > At 4:07 AM -0700 7/28/01, Jack Miller wrote: > > >Are fiber optic cables tappeble with out cutting the > > >cable and inserting something in between? is there a > > >similar method like with copper wires were you use > > >induction to tap it? > > > > > > > > >thanks > > > > > >===== > > >======================================= > > >Jack Miller > > >Researcher > > >Paython and Co. > > >======================================= > > > > > > -- > > > > ------------------------------------------------------------------------------------------------- > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 http://www.tscm.com/ > > Gloucester, MA 01931-8008 jmatk@tscm.com > > ------------------------------------------------------------------------------------------------- > > The First, The Largest, The Most Popular, and The Most Complete TSCM, > > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > > ------------------------------------------------------------------------------------------------- > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > -- > Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. > PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3418 From: Talisker Date: Sun Jul 29, 2001 6:54am Subject: Re: tapping fiber optic cables!! Jack In my limited experience cutting the fibres sets of an alarm, which is then reset and ignored. Every kind of tap I know involves cutting the cladding which reduces the light received at the distant end, this in itself will either set of an alarm with the correct fibre transceiver or will be detected the next time you run an Optical Time Domain Reflectometer (OTDM) over it. What I'm trying to say is that your tap could be detected therefore why not use something designed for the purpose ie http://www.shomiti.com/products/taps/index.html Though as I mentioned in my first sentence a temporary cut or a small detected dB loss may be ignored. Happy Tapping! -andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List Security Tools Notification http://groups.yahoo.com/group/security-tools/join ----- Original Message ----- From: "Jack Miller" To: Sent: Saturday, July 28, 2001 12:07 PM Subject: [TSCM-L] tapping fiber optic cables!! > Are fiber optic cables tappeble with out cutting the > cable and inserting something in between? is there a > similar method like with copper wires were you use > induction to tap it? > > > thanks > > ===== > ======================================= > Jack Miller > Researcher > Paython and Co. > ======================================= > > __________________________________________________ > Do You Yahoo!? > Make international calls for as low as $.04/minute with Yahoo! Messenger > http://phonecard.yahoo.com/ > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3419 From: Talisker Date: Sun Jul 29, 2001 0:54pm Subject: Re: tapping fiber optic cables!! deeper Apologies for my last mail, it was poorly explained, by way of an excuse I was camping with 2,500 scouts last night and the rascals didn't let me sleep I should have said that many fibre transceivers can be set to alarm if the signal drops by a preset level, as a matter of course signal levels degrade for a variety of reasons from wear and tear, x-rays in hospitals to rodents etc. A net admin dealing with hundreds of such links soon falls victim to a multitude of false positives and ignores them, only reacting to dead links. Even with dead links they occasionally come back to life after resetting the line driver card. Therefore if you were to tap a link through refracting some of the signal out, it may be ignored, but by the same token cutting the line inserting a tap may also be ignored. I seem to be concentrating on attack methods, so what can you do to counter the problem. Give the net admin sufficient time to investigate all alarms, and introduce severe penalties for not doing so, better still pass such alarms to a network security guy. When the fibres are installed make sure you retain the OTDR printouts, then schedule periodic OTDR repeats and compare the two. The printout will tell you how much and where the fibre throughput has altered. As the printout will be a measurement it's also crucial to have a precise plan from the installers of which route it takes. eg 5 dB loss 150Metres from term A. This will allow you to go directly to (ish) to the spot. If your data is so valuable, then use transparent trunking and ensure the trunking is visible throughout the run, this is very aesthetically displeasing but effective for policing the run. If this is still unclear please let me know, or if you think I'm talking **** take care -andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List Security Tools Notification http://groups.yahoo.com/group/security-tools/join ----- Original Message ----- From: "Talisker" To: ; "Jack Miller" Sent: Sunday, July 29, 2001 12:54 PM Subject: Re: [TSCM-L] tapping fiber optic cables!! > Jack > > In my limited experience cutting the fibres sets of an alarm, which is then > reset and ignored. Every kind of tap I know involves cutting the cladding > which reduces the light received at the distant end, this in itself will > either set of an alarm with the correct fibre transceiver or will be > detected the next time you run an Optical Time Domain Reflectometer (OTDM) > over it. > > What I'm trying to say is that your tap could be detected therefore why not > use something designed for the purpose ie > http://www.shomiti.com/products/taps/index.html > > Though as I mentioned in my first sentence a temporary cut or a small > detected dB loss may be ignored. > > Happy Tapping! > > -andy > http://www.networkintrusion.co.uk > Talisker's Network Security Tools List > > Security Tools Notification > http://groups.yahoo.com/group/security-tools/join > ----- Original Message ----- > From: "Jack Miller" > To: > Sent: Saturday, July 28, 2001 12:07 PM > Subject: [TSCM-L] tapping fiber optic cables!! > > > > Are fiber optic cables tappeble with out cutting the > > cable and inserting something in between? is there a > > similar method like with copper wires were you use > > induction to tap it? > > > > > > thanks > > > > ===== > > ======================================= > > Jack Miller > > Researcher > > Paython and Co. > > ======================================= > > > > __________________________________________________ > > Do You Yahoo!? > > Make international calls for as low as $.04/minute with Yahoo! Messenger > > http://phonecard.yahoo.com/ > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3420 From: Mike Dever Date: Mon Jul 30, 2001 11:56am Subject: Products for Protection of Fibre Optic Cables Members of the group might be interested to check out the following web site for products which can protect Fibre Optic cables against interference: http://www.fft.com.au Regards Mike Dever CPP Canberra Australia [Non-text portions of this message have been removed] 3421 From: Date: Sun Jul 29, 2001 4:53pm Subject: **ALERT: Code Red Is Set to Come Storming Back!** SANS Security Alert. Code Red Is Set to Come Storming Back! SANS, Microsoft, the NIPC, CERT/CC and four other leading security organizations released the following alert today at 4 pm. EDT. A Very Real and Present Threat to the Internet: July 31 Deadline For Action Summary: The Code Red Worm and mutations of the worm pose a continued and serious threat to Internet users. Immediate action is required to combat this threat. Users who have deployed software that is vulnerable to the worm (Microsoft IIS Versions 4.0 and 5.0) must install, if they have not done so already, a vital security patch. How Big Is The Problem? On July 19, the Code Red worm infected more than 250,000 systems in just 9 hours. The worm scans the Internet, identifies vulnerable systems, and infects these systems by installing itself. Each newly installed worm joins all the others causing the rate of scanning to grow rapidly. This uncontrolled growth in scanning directly decreases the speed of the Internet and can cause sporadic but widespread outages among all types of systems. Code Red is likely to start spreading again on July 31st, 2001 8:00 PM EDT and has mutated so that it may be even more dangerous. This spread has the potential to disrupt business and personal use of the Internet for applications such as electronic commerce, email and entertainment. Who Must Act? Every organization or person who has Windows NT or Windows 2000 systems AND the IIS web server software may be vulnerable. IIS is installed automatically for many applications. If you are not certain, follow the instructions attached to determine whether you are running IIS 4.0 or 5.0. If you are using Windows 95, Windows 98, or Windows Me, there is no action that you need to take in response to this alert. What To Do If You Are Vulnerable? a. To rid your machine of the current worm, reboot your computer. b. To protect your system from re-infection: Install Microsoft's patch for the Code Red vulnerability problem: Windows NT version 4.0: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=30833 Windows 2000 Professional, Server and Advanced Server: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=30800 Step-by-step instructions for these actions are posted at www.digitalisland.net/codered Microsoft's description of the patch and its installation, and the vulnerability it addresses is posted at: http://www.microsoft.com/technet/treeview/default.asp?url= /technet/security/bulletin/MS01-033.asp Because of the importance of this threat, this alert is being made jointly by: Microsoft The National Infrastructure Protection Center Federal Computer Incident Response Center (FedCIRC) Information Technology Association of America (ITAA) CERT Coordination Center SANS Institute Internet Security Systems Internet Security Alliance Bill Schneid Criminologist Director of Special Operations GLOBAL PROJECTS, LTD. Investigative Research Analysts Marina del Rey, California 310.314.8760 http://globalprojectsltd.com From: Rob Muessel Date: Wed Jul 21, 2004 3:39pm Subject: RE: spread spectrum bug The three fundamental rules of doing an RF sweep are to 1, identify the signal by it's demodulated audio. This lets you easily determine if it's something that should be there. TSCM guys should be able to identify a video signal by it's sound, and be able to tell whether or not it is a regular broadcast signal or a video tx watching the boardroom, again by the sound. This is true, too, for a whole host of other signals- pagers, various types of digital cell phones and cell site signals, computer and LAN noise to name a few. If you can't identify the signal by its sound, then, 2, determine whether it is emanating from the area of the sweep. Simple signal strength measurements can tell you this, assuming you are using a spectrum analyzer. If it's within the area being swept, then, 3, track it down using field strength measurement or physical search techniques. It's likely that this bug would fall into this category. If you are familiar with the RF spectrum, a signal like this should stand out quite plainly, or at least enough to make you perk up when you see it. Having looked at the spectrum from 50 kHz to 1 gig probably several thousand times in dozens of cities over 20 years, it would be hard not to notice a 6 MHz wide signal that hadn't been seen previously. This assumes your antenna is close enough to it so the signal isn't buried in the noise and, with a 200 mW output, it should be very plainly seen. So, once you determine that the signal is from the area you're working in, then it's time to get serious. The device in question appears to be large enough (4" x 2" x 1.2" per their specifications, though their numbers are probably wrong based on the picture, which makes me suspicious about all of the specs) that a thorough physical search will find it, or its power supply, or even its heat signature, if you use thermal imaging. Especially since it's drawing a half am, it's putting out some heat! An NLJD probably would find it. As it's been put before, you'll have lots of opportunities to miss it. -- -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 www.tscmtech.com USA [Non-text portions of this message have been removed] 9139 From: James M. Atkinson Date: Wed Jul 21, 2004 5:03pm Subject: DNC Dauphine http://cryptome.org/dnc-dauphine.htm ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9140 From: Steve Uhrig Date: Wed Jul 21, 2004 5:48pm Subject: Re: DNC Dauphine Once upon a midnight dreary, James M. Atkinson pondered, weak and weary: > http://cryptome.org/dnc-dauphine.htm Interesting, but this relates to TSCM how? ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9141 From: DATA_4N6_Engineering Date: Wed Jul 21, 2004 2:54pm Subject: Re: radio rf problem I have experienced this a couple times, on both occasions, I was well aware of who and why my remotes would not work. Just to agitate them, I picked up a couple very noisy(LO wise) scanners and ran them from DC to daylight (or their capability)just to watch them track and try to figure out what I was doing. Drove them crazy. Their LO was even worse than my poor quality scanners. Just a little fun for my counterpart. If you know "Our Lady of Radio Frequencies" you will understand who might be irritated. --- delta wrote: > http://www.washingtonpost.com/ac2/wp-dyn/A28217-2004Jul4 > > i m sure a sweep in this situation is very difficult > as to open the door !!! lol > david from paris > > > ===== Jon Asdourian 61 356B Red Porsche Coupe 69 Red MGC GT 63 Burgundy Austin Healey 3000 BJ7 356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - Send 10MB messages! http://promotions.yahoo.com/new_mail 9142 From: Bradford Smith Date: Wed Jul 21, 2004 3:56pm Subject: Re: Wireless Detector - Detailed Comparision The Kensington WiFinder is compared to the Smart ID WFS-1 in this article: http://www.securityfocus.com/infocus/1727 "From all five tests, the Smart ID WFS-1 clearly stands out as the device of choice for detecting 802.11b networks (no 802.11g networks were tested). The directional nature of the detection, the clear signal indicators and consistent performance under multiple scenarios make this a valuable tool in any 802.11 arsenal." [Non-text portions of this message have been removed] 9143 From: Charles Patterson Date: Wed Jul 21, 2004 9:03pm Subject: Re: Re: Acoustic cable perimeter protection Back when I worked with one capacitance cable system, it require a lot of attention. It did work, but was susceptable to rain, wind, animals, so the thresholds had to be carefully set. Then there was also a lot of maintenance to keep it in shape. regarding the TSCM aspect of it, While we could clearly reproduce the sound from the fence itself, we were unable to recover any voice audio. In the lab the cable could reproduce voice minimally, but it was not intelligible when it was out on the fence. This was many years ago, without the use of computerized filtering, now we could probably do a lot more with it. Charles ----- Original Message ----- From: Vercingetorix Vercingetorix To: TSCM-L@yahoogroups.com Sent: Wednesday, July 21, 2004 12:22 AM Subject: Re: [TSCM-L] Re: Off-topic proposal Steve, I concur. TSCM question. Intrusion detection for chain link fence lines. How good is acoustic Intrusion Detection for a chain link fence and how is it defeated. I have three small maritime industrial locations (300 Meters each) to provide IDS and the budget is small. Some have recommended acoustic cable. The nature of the environment precludes the use of microwaves. What are the strengths and weaknesses? Any other technical considerations to take into account? I do not want to know about a vendor's product, just the technology, i.e. fiber optic cable etc. Thanks for your input. Russ Steve Uhrig wrote: Once upon a midnight dreary, William Knowles pondered, weak and weary: > I would like to toss another idea to the list, what about another > list, say TSCM-Off That's this list. What we need is a list dedicated to TSCM. No lids, no kids, no space cadets. > I like the TSCM list, I really miss the old TSCM list, I would really like > to see a TSCM-Off list so I can parse the signal from the noise. You are not alone. This is the description of THIS list from Yahoogroups: ------ TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. ------ If a message doesn't fit the above, it doesn't belong here. That's half or more of the recent traffic, available on the yahoo website for this group for anyone who wants to do their own analysis. Or the description of the list should be changed so as not to be deceptive. We're supposed to be combatting deception, not abetting it. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? New and Improved Yahoo! Mail - Send 10MB messages! [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 9144 From: James M. Atkinson Date: Wed Jul 21, 2004 11:51pm Subject: Addendum to Mission Statement The list mission statement is hereby amended to allow the posting of articles, references, and materials which the list moderator(s) may feel the list membership will find of value as members of the security community. This will include, but not be limited to articles about security related things, coverage of political issues that directly impact our profession, and the occasional piece of humor or philosophy to "lighten things up a bit". The occasional posting of current affairs news articles of general interest to the profession is also encouraged, but please be gentle. Holiday greetings, birth announcement, death announcements, and wedding announcements are also welcome so that the person being mentioned is related to the TSCM profession in some fashion. But let's also not turn the list into some kind of a social knitting circle. Also, please try to be a control freak on the list, please no more whining, temper tantrums, and foot stamping when you don't get things your way. If any list member feels that they have transgressed in some way, and feel that they are in need of discipline I would encourage them to pay a visit to their local leather bar or dominatrix to make amends. Meanwhile, the list is fine. If you think the Signal-to-Noise Ratio is out of line then I suggest you post some relevant TSCM materials to lift the signal out of the noise instead of creating more noise. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9145 From: Spook Date: Thu Jul 22, 2004 0:17am Subject: Re: Off-topic proposal List members are free to add [OT] to the Subject line at their own discretion, and if it catches on we may adopt it.. -jma At 01:34 PM 7/20/2004, Michael Puchol wrote: >Hi, > >I'd like to make a proposal which I think may suit everyone - if you post >anything which can be considered off-topic, simply add a text such as [OT] >or similar to the subject line. This way it's very easy to create a filter >(all email programs have this function) to automatically classify and send >off-topic messages to a special folder, or to the trash bin if so desired. >We'd all have to agree on the off-topic header text, but something that's >unlikely to appear in a normal subject line (such as [OT], with square >brackets and all) is enough. > >I'm willing to make a short tutorial explaining the process of creating the >filter in the two or three most common email clients if this goes ahead. > >Best regards, > >Mike 9146 From: James M. Atkinson Date: Thu Jul 22, 2004 0:15am Subject: Re: Wireless Detector £12.51 I use the Kensington myself when I travel and want to do a quick check to see if there is a WLAN nearby I can hookup to at the hotel, Airport, restaurant, etc.. The next step to fire up NetStumbler to find where I can get a good signal that is friendly before I set up my latop. If all else fails then I switch to a data connection on the cellphone. The Kensington is a good unit, and I endorse it. -jma At 01:27 PM 7/20/2004, Andy Cuff wrote: >Hi >Thought a few of you might be interested in this following on from the >mobile detector >http://www.ebuyer.com/customer/products/index.html?rb=953129600&action=c2hvd19wcm9kdWN0X292ZXJ2aWV3&product_uid=63682 > >Kensington Wifi Finder > >"Your life on the road just got a lot easier. With the first and only WiFi >detector on the market today, you no longer need to cross your fingers as >you wait for your notebook to boot up. Just press a button and the >Kensington WiFi Finder lets you know if your location is "hot"...instantly. >No software or computer needed. What could be easier? " > >I haven't used one but wondered if anyone else had and what they thought? > >-andy >Talisker Security Tools Directory >http://www.securitywizardry.com > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9147 From: James M. Atkinson Date: Thu Jul 22, 2004 0:33am Subject: Re: A question for the TSCM community Most professional and honest TSCM'ers will not be concerned with threats, will not bend to coercion, and ignore other undue influence. If you need a bug sweep, then call a TSCM professional, tell him your concerns and have him do the sweep. However, also be aware that a TSCM professional is not going to break the law, is not going to commit trespass, not going to obstruct justice, and so on. -jma At 05:48 PM 7/20/2004, Lawrence Forde wrote: >I have a question and very legitimate TSCM concern. How does one >commission a TSCM sweep and search in an extremely hostile >environment? Meaning, if the TSCM professional is either threatened, >coerced or otherwise threatened not to contract and perform the TSCM >sweep, search and discovery of hostile radio frequency, sattelite >monitoring and tracking and video voyeurism in one's home, business >and on the streets and motor thoroughfares of the subject's city? > >Please advise on how to effectively commission a TSCM sweep and >search, beyond not using suspected telephones, etc. > >Please forward all professional responses to my email at: >lforde_2001@h... telephone me at: (718) 276-1605. > >Lawrence Forde ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9148 From: James M. Atkinson Date: Thu Jul 22, 2004 0:28am Subject: Re: Gov't Did Not Wiretap Indonesian Embassy Historically, allies spy on each other more the they spy on their enemies. The closer that two nations are diplomatically, the more likely they are to spy on each other. -jma At 05:44 PM 7/20/2004, savanted1 wrote: >Myanmar's deputy minister for foreign affairs U Khin Win and the >Indonesian Ambassador Wyoso Prodijowarsito both maintain Myanmar did >not wiretap the Indonesian Embassy. Win maintains that the >accusation is an attempt to discredit Myanmar in the international >community. Prodijowarsito asserted "I believe Myanmar's government >would not do such a thing as Myanmar and Indonesia enjoy a very close >relationship." The accusation comes following a security check of the >Indonesian Embassy where the electronic frequency of certain key >phone lines were lower than normal. > >http://english1.peopledaily.com.cn/200407/13/eng20040713_149386.html ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9149 From: delta Date: Thu Jul 22, 2004 3:05am Subject: digital bug hello everybody no idea for the price of this device but i m sure it is forbiden to buy it in france !!! i can make a phone call to have more info ... but something i do not understand is that they said they receive the encrypted digital audio of this device just with an old receiver frg9600 ... any idea about a modification ? david from paris *Hi David, *How much, any idea ?? *Subject: [TSCM-L] spread spectrum bug * http://www.cb-security.com/catalogue/fugace.htm 9150 From: James M. Atkinson Date: Thu Jul 22, 2004 3:45am Subject: Re: digital bug This bug would be extremely easy to find. It pushes 200 mW, which is a very, very hot signal, plus it uses a 6 MHz wide bandwidth. Any decent spectrum analyzer will pick this up at a considerable distance, and the CPM-700 will do a decent job of finding it if you get close enough. Results with the OSCOR will be marginal as the OSC-5000 will display a hump in the noise, but there is nothing there that would trip any alarms. -jma At 04:05 AM 7/22/2004, delta wrote: >hello everybody >no idea for the price of this device but i m sure it is forbiden to buy it >in france !!! i can make >a phone call to have more info ... >but something i do not understand is that they said they receive the >encrypted digital audio of this >device just with an old receiver frg9600 ... any idea about a modification ? >david from paris > >*Hi David, >*How much, any idea ?? >*Subject: [TSCM-L] spread spectrum bug >* http://www.cb-security.com/catalogue/fugace.htm > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9151 From: A Grudko Date: Thu Jul 22, 2004 7:01am Subject: RE: Gov't Did Not Wiretap Indonesian Embassy -----Original Message----- From: savanted1 [mailto:savanted1@y...] " The accusation comes following a security check of the Indonesian Embassy where the electronic frequency of certain key phone lines were lower than normal." What? Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.718 / Virus Database: 474 - Release Date: 2004/07/09 [Non-text portions of this message have been removed] 9152 From: Thomas Shaddack Date: Thu Jul 22, 2004 7:14am Subject: Re: Off-topic proposal On Thu, 22 Jul 2004, Spook wrote: > List members are free to add [OT] to the Subject line at their own > discretion, and if it catches on we may adopt it.. > -jma Which, as somebody mentioned earlier, makes certain problems for digest readers. However, it's not a big problem to set up a non-Yahoo digest generator that would ignore messages with subject line containing [OT] string. I can do it as a community service, if desired. Which has one caveat, though - the recipient won't be able to reply to the list, if he won't be registered on there. (I can add the Reply-To: address to point to the list, but then the one who sends mail there has to be known to the Yahoo list server in order to the mail from him being accepted there.) 9153 From: Hawkspirit Date: Thu Jul 22, 2004 10:10am Subject: TDR/cat 5 While sweeping a large company that has a voice over IP phone system I used TDR to radar all cables going from the executive offices to the local phone closet where the cables terminated in a router and then traveled by fiber down to the main IT room on the lower floor. The cables were cat 5 and I had them unterminated at both ends. I noticed that any pair I tested had ringing/echoes, about five visible past the termination distance. Each echo pulse was lower in amplitude that the one before. Does anyone know the reason this type of cable has this characteristic? Roger [Non-text portions of this message have been removed] 9154 From: James M. Atkinson Date: Thu Jul 22, 2004 10:36am Subject: Re: TDR/cat 5 Impedance mismatch from the TDR impedance not being properly matched to the impedance of this line under test. Were you using a Tek 1502/1503 without using a bridge? -jma At 11:10 AM 7/22/2004, Hawkspirit wrote: > > > While sweeping a large company that has a voice over IP phone system I used >TDR to radar all cables going from the executive offices to the local phone >closet where the cables terminated in a router and then traveled by fiber >down to the main IT room on the lower floor. > >The cables were cat 5 and I had them unterminated at both ends. I noticed >that any pair I tested had ringing/echoes, about five visible past the >termination distance. Each echo pulse was lower in amplitude that the one >before. Does anyone know the reason this type of cable has this >characteristic? > >Roger > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9155 From: James M. Atkinson Date: Thu Jul 22, 2004 10:43am Subject: RE: Gov't Did Not Wiretap Indonesian Embassy At 08:01 AM 7/22/2004, A Grudko wrote: > -----Original Message----- > From: savanted1 [mailto:savanted1@y...] > > " The accusation comes following a security check of the > Indonesian Embassy where the electronic frequency of certain key > phone lines were lower than normal." > > What? Probably a translation error... Likely they meant "Electronic Signature", not "Electronic Frequency" -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9156 From: kondrak Date: Thu Jul 22, 2004 11:26am Subject: Re: radio rf problem (Big grin) Ive got an old old Pentium computer, one with the old 1mb memory chips to give you an idea how old, that is abominable in RFI generation. I have the sides of the case off, the case off the power supply as well, and this thing emits from DC to light, every imaginable RF birdie, chirp and squeal. I run a video program called dazzle, (on the 1mb video card) which generates fractals in the video as a sort of screen saver. Avail here: http://home.flash.net/~labvid/misc/toybox/toybox.htm To make things interesting, ive got an old bearcat BC-80 scanner, that while its dead in the audio department, it certainly generates a good amount of pips in the scan mode. Ive modded it to scan much faster, about 10 times the original rate. If I need point source interference, these two together do an excellent job...I can see it on a nearby television, hear it on a shortwave radio right up to and thru 30mhz for a block...and it drives my wideband receivers nuts. Plop these two down, with about 3 feet of wire attached to rf hotspots for impromptu antennas...and watch them run........heh... At 15:54 7/21/2004, you wrote: >I have experienced this a couple times, on both >occasions, I was well aware of who and why my remotes >would not work. Just to agitate them, I picked up a >couple very noisy(LO wise) scanners and ran them from >DC to daylight (or their capability)just to watch them >track and try to figure out what I was doing. Drove >them crazy. Their LO was even worse than my poor >quality scanners. Just a little fun for my >counterpart. If you know "Our Lady of Radio >Frequencies" you will understand who might be >irritated. > >--- delta wrote: > > >http://www.washingtonpost.com/ac2/wp-dyn/A28217-2004Jul4 > > > > i m sure a sweep in this situation is very difficult > > as to open the door !!! lol > > david from paris > > > > > > > > >===== >Jon Asdourian >61 356B Red Porsche Coupe >69 Red MGC GT >63 Burgundy Austin Healey 3000 BJ7 >356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC > > > >__________________________________ >Do you Yahoo!? >New and Improved Yahoo! Mail - Send 10MB messages! >http://promotions.yahoo.com/new_mail > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9157 From: kondrak Date: Thu Jul 22, 2004 0:02pm Subject: Re: [Semi-OT] Wireless Card bargan Every once in a while one stumbles across a bargoon, and I think I've found one. At least from a WiFi standpoint. I've installed about 50 of the Zonet PCMCIA 802.11b cards, and their performance is simply outstanding on receive. (Theyre only like 30mw on xmit however) I pick them up wholesale for $23 and I've not had a bad one yet. They're totally Netstumbler friendly, at that price if you need one for a job they're cheap and work well. I've got three in my local LAN, and they also do 128bit crypto so securing them isn't a problem. Ive put them up against Agere cards and performance is as good if not better against this card that costs three times what the Zonet does. I used one to participate in the WWWD (World Wide War Drive) this past June, and performance was great, logged over 200 AP's in three days. (Incidentally, over 80% were "open" with no security at all) Good bang for the buck... At 01:15 7/22/2004, you wrote: >I use the Kensington myself when I travel and want to do a quick check to >see if there is a WLAN nearby I can hookup to at the hotel, Airport, >restaurant, etc.. > >The next step to fire up NetStumbler to find where I can get a good signal >that is friendly before I set up my latop. > >If all else fails then I switch to a data connection on the cellphone. > >The Kensington is a good unit, and I endorse it. > >-jma > > > > >At 01:27 PM 7/20/2004, Andy Cuff wrote: > >Hi > >Thought a few of you might be interested in this following on from the > >mobile detector > >http://www.ebuyer.com/customer/products/index.html?rb=953129600&action=c2 > hvd19wcm9kdWN0X292ZXJ2aWV3&product_uid=63682 > > > >Kensington Wifi Finder > > > >"Your life on the road just got a lot easier. With the first and only WiFi > >detector on the market today, you no longer need to cross your fingers as > >you wait for your notebook to boot up. Just press a button and the > >Kensington WiFi Finder lets you know if your location is "hot"...instantly. > >No software or computer needed. What could be easier? " > > > >I haven't used one but wondered if anyone else had and what they thought? > > > >-andy > >Talisker Security Tools Directory > >http://www.securitywizardry.com > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > >----------------------------------------------------------------------------------------------------- > > >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >----------------------------------------------------------------------------------------------------- > > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >----------------------------------------------------------------------------------------------------- > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9158 From: kondrak Date: Thu Jul 22, 2004 0:07pm Subject: Re: TDR/cat 5 Extremely tight bends? Incompetent installers? Water? Damage? Are all at approximately the same place, making for a common intercept point? Ive seen quality of Cat5 vary greatly, your mileage may vary. At 11:10 7/22/2004, you wrote: > > > While sweeping a large company that has a voice over IP phone system I used >TDR to radar all cables going from the executive offices to the local phone >closet where the cables terminated in a router and then traveled by fiber >down to the main IT room on the lower floor. > >The cables were cat 5 and I had them unterminated at both ends. I noticed >that any pair I tested had ringing/echoes, about five visible past the >termination distance. Each echo pulse was lower in amplitude that the one >before. Does anyone know the reason this type of cable has this >characteristic? > >Roger > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9159 From: James M. Atkinson Date: Thu Jul 22, 2004 0:13pm Subject: Your Land The following page contains information that does not directly relate to the TSCM profession, so don't start the drama queen antics over a little humor to lighten things up a bit. http://www.jibjab.com/ The video is 4 MB, so if you have a dial-up connection you will need to either wait for the download, or move into this century with a broadband connection. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9160 From: James M. Atkinson Date: Thu Jul 22, 2004 1:17pm Subject: Monmouth Piano Teacher http://www.iol.co.za/index.php?set_id=1&click_id=3&art_id=qw1090514880830B221 'Piano teacher taped students taking a leak' July 22 2004 at 06:48PM Middletown, New Jersey - A longtime piano teacher is accused of hiding "spy-sized" cameras in his bathroom to make hundreds of videotapes of students and others using his toilet, police said Thursday. George Johnson, 68, was arrested on July 1 and police said they have since identified 44 people from viewing only a fraction of the 1 500 tapes. Local authorities on Thursday asked for help tracking down other people on the tapes, and established a telephone hotline for witnesses. Johnson, a piano teacher for 40 years who had two prior convictions for sex-related crimes, taped students and their parents, guardians, drivers and siblings, authorities said. Those identified range in age from six to 72, police said. The charges against him include wiretapping, allowing a juvenile to be photographed in a sexual position, and observation of sexual contact. He also faces one weapons possession charge because, as a convicted felon, he was not allowed to have a handgun and rifles found in his home. Acting on a tip, authorities searched Johnson's home on July 1 and discovered hidden microphones and three "super tiny, spy-type cameras" hidden in a floor heating grate, molding and an air freshener," police detective Luietenant Mike Cerame said. About 84 boxes of videotapes were seized along with four computers and an "astronomical" amount of CDs, software and floppy discs, he said. The photographs are being assembled into notebooks for witnesses to examine. People have been asked to identify themselves and others they may have seen at Johnson's home. So far, police have determined that 22 of the identified people on the 353 tapes viewed so far are under 13. The alleged victims who have identified themselves say the oldest tapes date back four years. - Sapa-AP ====================== http://kyw.com/news/wcbskyw_story_204124551.html Cops: Piano Teacher Set Up Potty Spycam Police Set Up 24-Hour Hotline: 732-706-4100 Jul 22, 2004 1:15 pm US/Eastern MIDDLETOWN, N.J. (AP) A longtime piano teacher is accused of hiding "spy-sized" cameras in his bathroom to make 1,500 videotapes of students and others using his toilet, police said Thursday. George Johnson, 68, was arrested July 1 and police said they have since identified 44 people from a fraction of the tapes viewed so far. Authorities in this Monmouth County community on Thursday asked for help tracking down other people on the tapes, and established a telephone hot line for witnesses. Johnson, a piano teacher for 40 years who had two prior convictions for sex-related crimes, taped students and their parents, guardians, drivers and siblings, said authorities. Those identified are of both genders, and range in age from 6 to 72, police said. Johnson was charged with wiretapping, allowing a juvenile to be photographed in a sexual position, photographing a juvenile in a sexual position, observation of sexual contact and maintaining a nuisance. He also faces one weapons possession charge because, as a convicted felon, he was not allowed to have a handgun and rifles found in his house. Johnson taped "pretty much anybody who used his bathroom," police Detective Lt. Mike Cerame said. Cerame said authorities, acting on a tip, searched Johnson's home on July 1 and discovered hidden microphones and three "super tiny, spy-type cameras" hidden in a floor heating grate, molding and an air freshener. For two days, eight Middletown officers and two high-tech crime officers from Monmouth County removed evidence from the house, where Johnson had taught daily piano lessons. Some 84 boxes of videotapes were seized along with four computers and an "astronomical" amount of CDs, software and floppy discs, he said. The computer equipment is being checked over by the high-tech crime unit. Cerame described a lengthy process police are using to identify Johnson's alleged victims while at the same time trying to preserve some of their privacy. He said female officers are watching the tapes and, using a digital camera system, downloading images to a protected hard drive. Once those images are transferred to a CD, a different officer crops the images down to head shots of the people shown on the tape. The photographs are being assembled into notebooks for witnesses to examine. People have been asked to identify themselves and others they may have seen at Johnson's home. So far, police have determined that 22 of the identified people on the 353 tapes viewed so far are under 13. Authorities are identifying one to two people each day, Cerame said. Based the people's hairstyles and clothing, the alleged victims who identify themselves have said the oldest tape dates back four years. In 1982, Johnson was convicted of three counts of sexual assault and 20 years before that he was convicted of a "sex-related crime," but Cerame said a lack of computerized records from 1962 were making the conviction difficult to pin down. He was being held in Monmouth County Jail, where he had not posted $240,000 bail. It was not immediately clear whether he had been assigned an attorney. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9161 From: kondrak Date: Thu Jul 22, 2004 1:34pm Subject: Re: Your Land Dont be surprised if that page is extremely busy either.....its been on NBC... At 13:13 7/22/2004, you wrote: >The following page contains information that does not directly relate to >the TSCM profession, so don't start the drama queen antics over a little >humor to lighten things up a bit. > >http://www.jibjab.com/ > >The video is 4 MB, so if you have a dial-up connection you will need to >either wait for the download, or move into this century with a broadband >connection. > >-jma > > > > > > >----------------------------------------------------------------------------------------------------- > > >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >----------------------------------------------------------------------------------------------------- > > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >----------------------------------------------------------------------------------------------------- > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9162 From: Date: Thu Jul 22, 2004 3:12pm Subject: Boston battens down for DNC Boston battens down for DNC Security precautions cast a somber mood on festivities. By Sara B. Miller | Staff writer of The Christian Science Monitor BOSTON - A convoy of mobile command centers will be ready to respond at this year's Democratic National Convention if communication systems in the city of Boston shut down. If something suspicious occurs around federal buildings, 75 wireless cameras will be able to zoom in on the details - perhaps a birthmark on a face, or the last number on a license plate. And random bag and package searches - by police, bomb-sniffing dogs, or even small robots - will protect the land, while by sea, the US Coast Guard will use radar and special infrared imaging to monitor unauthorized vessels in the Boston Harbor and Charles River. The words "political convention" once conjured images of fanfare. But as July 26 nears, it is the unprecedented security measures that have, thus far, dominated the theme of the first national convention since Sept. 11. Thousands of local, state, and federal authorities are working to turn the FleetCenter into a virtual citadel. Bioterror antidotes have been flown into area hospitals. Authorities are removing trash cans and sealing manholes. And at the end of each day, a police officer is just as likely as a concierge to greet the 35,000 delegates, journalists, and politicians in their hotel lobbies. It is an attempt to create a security blanket over Boston worth an estimated $50 million. But experts say the measures - intended to soothe - have also heightened anxieties, creating a mood that could color the future of all public events, especially political ones, in America. "There will be a more cautious tone for sure," says John Barrett, director of research for the Beacon Hill Institute at Suffolk University in Boston. "I'm sure delegates across the country see a chance for a pseudo-vacation and will have a good time," Mr. Barrett says, but adds, "I don't think it will be quite the same as it was in the past." Both conventions are named National Special Security Events, as they have been in past election years, which gives the US Secret Service the lead role in coordinating security measures. (The Secret Service also coordinated security for the 2002 Olympics in Salt Lake City.) Among the more sophisticated measures in Boston are the half-dozen mobile command vehicles - essentially operations centers "on wheels," says Peter Judge, public information officer at the Massachusetts Emergency Management Agency. The mobile center his agency operates - a $600,000 vehicle complete with a meeting room - will be at the disposal of Gov. Mitt Romney (R) in case of an emergency. Local and federal cameras will also monitor the FleetCenter and buildings and streets across the city. Hundreds of cameras already in use by state and city agencies, including the Massachusetts Bay Transportation Authority and the Big Dig, will be available if necessary. The level of surveillance has vexed some. "This appears to be a pervasive set of video monitors, which will not be restricted to security purposes, either in their scope or their duration," says Barry Steinhardt, director of the Technology and Liberty Program of the American Civil Liberties Union. Ronald Libby, regional director of the Federal Protective Service, says the federal cameras will be used only to monitor criminal and suspicious behavior. "We are not going to worry about the guy on the street corner smoking a cigarette," he says. Experts say such security will become standard for political events. "[Conventions] are symbolically important. They bring a lot of people together, and [an attack could] destroy the political leadership of the country," says Robert Pfaltzgraff, professor of International Security Studies at the Fletcher School at Tufts University in Medford, Mass. Hotels are also ratcheting up security measures. Harvey Brandt, chairman of the International Lodging, Safety, and Security Association in Boston, says that security officers will check IDs at many hotels before guests enter and then again at the elevator bank. One boutique hotel in the South End will use retina technology for identification. "There'll be some things you don't see in Boston that often," says Mr. Brandt. Despite months of planning, there are always loopholes, says Rick Avery, president of the New England branch of Securitas Security Services, which is planning security for area hotels. "We could have the Army circle the entire city, and there's still no guarantee," he says. Seth Gitell, a spokesman for Mayor Thomas Menino's (D) office, says the city has worked tirelessly to educate the public about precautions during convention week. One of the city's looming problems - a contract dispute with the police union - may clear up before July 25, when delegation parties are scheduled. On Monday the state labor management board voted to send the dispute to immediate arbitration. The city has faced criticism for commuter disruptions - including the closure of one of the city's major rail hubs and a main interstate. The Beacon Hill Institute conducted an economic impact study showing that Boston stands to lose $8.2 million, after government subsidies. Playing host city may become unpopular, says Barrett, after considering the lengths Boston has had to go to secure the upcoming convention. "Kerry has been the presumptive candidate for months," he says. "The four-day event doesn't have this usefulness anymore." from the July 22, 2004 edition - http://www.csmonitor.com/2004/0722/p01s01-uspo.html Full HTML version of this story which may include photos, graphics, and related links www.csmonitor.com | Copyright © 2004 The Christian Science Monitor. All rights reserved. [Non-text portions of this message have been removed] 9163 From: A Grudko Date: Fri Jul 23, 2004 10:59am Subject: RE: Parabolic Dish Info -----Original Message----- From: DEMTEC@A... [mailto:DEMTEC@A...] > Has anybody ever experimented with directional listening devices including the use of a Parabolic Dish. I field tested and used a Sony PRM 300 (I think) in the 80's. It was good at excluding ambient noise outside of it's 15 degree capture area but did not exhibit any gain (as you would expect at those frequencies) so you needed a really high-gain low noise amp to get significant results. I have a related story in my forthcoming book. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.718 / Virus Database: 474 - Release Date: 2004/07/09 [Non-text portions of this message have been removed] 9164 From: contranl Date: Fri Jul 23, 2004 1:09pm Subject: No parabolic......Phased Array Microphones ! . I don't think that parabolic microphones are very usefull for surveillance...the main reason for that is : In order to get any usefull gain from such a mic you need to use a (to) large dish ...this will convert you into a "sitting duck" so such a mike would only be good for birdwatchers. The spyshop mics are really just gadgets...to give you an idea of the minimal size you need you may visit one of these childrens play areas where they have 2 large dishes (2 meters diagonal !) placed opposite of each other and in about 20 meters distance..the dishes have a hole in the middle where you can stick your head in,your friend sticks his head in the other one,you then can talk very low and still hear each other good...(caused by the effect of the 2 dishes added together!) I have seen other designs consisting of a bundle of pipes...each with a different length(between 0.3 and 1 meters long) the idea was that every length would have a different resonance frequency thus filtering out any non voice noise...in practice unworkable since it was to big,it would give you away in a second. Have a look at a different approach wich is called "Phased Array" where 2 or more(up to 30)microphones are connected in parallel trough adjustable phase filters...by changing the phase of each microphone you can create a very powerfull directional effect wich will effectively cut out any noise or sounds not coming from exactly the direction of where you point it at...the more mics the sharper the beam...very similar to "stacking" radio antennas. This technique is also used on warships...those big flat panels...they are electronically steerable radar antennas..they dont move but they scan 180 degrees. I have seen (do'nt remember where) a van with a very thin panel mounted on one of the sides,looking like a big magnetic sticker about 1 mtr x 0,5 mtr in size and only 0,5 cm thick. it contained an array of maybe 30 very small(condenser) microphones...inside was a control-unit with wich you could "steer" the mic's in any direction...the van is parked near the audio-source the mic's are then electronically steered until it's pointed for best reception...so no "mechanical" attention-drawing movements have to be made. A company that makes low cost commercial phased mic's for various purposes (not specifically surveillance) is here : http://www.andreaelectronics.com A must is to download their demonstration of a 2 mic only set wich can be connected to your laptop...the laptop then does the calculation to phase out any sounds from other directions very simple and cheap solution ! (also used on cellphones to block- out background noise) Download the interesting Demo wich uses phased-array + noise filtering ....here: http://www.andreaelectronics.com/Buy/Soundmax/tech_demo.htm I am shure you will easely find more info on this technique for surveillance purposes. You could even add an electronic correlator...wich is a unit that receives the unwanted noise only...from a source surrounding or in the background of the subject,it then subtracts the background noise from the received audio (wanted signal + noise) - (noise) = wanted signal such a combination would be very powerfull. A practical example of an electronic correlator would be: You are bugging a room using a wireless bug..there is a loud TV in the background wich makes it difficult to understand the conversation...in your van parked in front of the house you have a correlator connected to a TV tuner wich is tuned to exactly the same channel as the TV inside the room...the correlator then substracts the TV sound from the received audio and voila! you are left with the audio without the disturbing Tv sound. There is a company wich makes such a correlator with additional tuner if i remember well it even tunes automatically to the right Tv channel...is'nt that wonderfull ! If i remember well(again)...a variation of the audio phasing and (analog)correlation technique was used in an old Gene Hackman movie where he had to overhear a conversation of some people in the middle of a square surrounded by lots of other people talking loud...he solved that problem by placing microphones on each corner of the square...by comparing the signals he was able to get rid of the unwanted noise... Must have been 20 years ago that movie... at that time i was very impressed. Let us know what you find ! (keywords:microphone,phased,array,correlation) Tetrascanner www.tetrascanner.com The Netherlands . 9165 From: Samuel Hayes Date: Fri Jul 23, 2004 2:46pm Subject: Re: Request for Information Jim, Lawrence "Buck" Hall was at one time affiliated with an "executive protection training school" here in Georgia, that also offered classes on TSCM. I called the school once and spoke to someone trying to get some background info an the instructors technical training and capabilities and got the same line of bullshit I usually get when talking to wanna-be's. Is there any legwork you would like for me to do down here in Atlanta to see if I cvan scratch up any info on him and his business dealings? Sam --- "James M. Atkinson" wrote: > > > I am researching several of Steve Wilson's > associates, their links back to > him, and his money laundering activities, and would > like to know if anybody > on the list recognized any of the following names, > and if so you have any > comments or research on them that you could share > with me. > > James K. Cowan > > Lawrence "Buck" Hall > > John McCann > > Kenneth Buchanan > > Levi and Lizzie Fisher > > Jo S. Fischer > > Greg Scott > > Bob Bryant > > Demain Wilson > > John Prochaska > > Miles Hayes > > Brian Reece > > > > > ----------------------------------------------------------------------------------------------------- > > > We Expertly Hunt Real Spies, Real Eavesdroppers, and > Real Wiretappers. > ----------------------------------------------------------------------------------------------------- > > > James M. Atkinson > Phone: (978) 381-9111 > Granite Island Group Fax: > > 127 Eastern Avenue #291 > Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > ----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent > Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > ----------------------------------------------------------------------------------------------------- > > > > > __________________________________ Do you Yahoo!? Vote for the stars of Yahoo!'s next ad campaign! http://advision.webevents.yahoo.com/yahoo/votelifeengine/ 9166 From: R. Snyder Date: Fri Jul 23, 2004 1:58pm Subject: RE: TDR/cat 5 (Roger's regular reflections) Any time you see a series of regularly spaced echoes of decaying amplitude on a TDR, a pair of significant impedance discontinuities is implicated. Just like standing between two parallel mirrors and seeing infinite reflections, the pulse going down the line is bouncing between the two discontinuities, being attenuated by the length it travels along the cable. If the far end is unterminated, you should get a strong positive return pulse. If that return pulse hits another impedance discontinuity on its return trip, a portion of its energy will be reflected back toward the far end, where it will continue its endless loop (well, endless but for the damping of the cable loss). As a rule, you should test from both ends of the cable and compare, which in this case, would give symmetric results if you are just dealing with strong reflections from both ends of the cable. Of course, if that's the case, it begs the question that JMA asks, namely is your TDR properly matched to the cable impedance? If your TDR is properly matched to the cable impedance, you shouldn't get any reflection at the near end. If you terminate the far end with a load of Z0, you should lose the far end return pulse, too. Then, if you still have reflections, you have some impedance discontinuity along the way. As others have said, look for sharp bends, cable damage, splices or terminal blocks, and transitions between cables, particulary transitions between different types of cables, such as CAT 3 and CAT 5. Look for terminal blocks and jacks where installers have untwisted the pair. You can probably ignore any suspicions about water, as water exhibits more of a random noise, not regular echoes. Likewise, EMI sources will not be synched to your TDR output, so their effects will jump around enough to appear as noise if they appear at all, although I suppose it's theoretically possible to have narrowband EMI (or EMI containing such narrowband components) sitting at, at least for the short term, a fairly precise harmonic relationship to your TDR pulse repetition frequency to produce somewhat stable artifact on the TDR, but I digress. If I understand your question correctly, you are looking for TWO impedances discontinuities separated by the distance between the decaying echoes, which almost certainly include the unterminated far end and quite likely include an impedance-mismatched near end where the TDR is connected. __________________________________ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail 9167 From: sdresch8208 Date: Mon Jul 26, 2004 7:59am Subject: TSCM Yahoo block See http://cryptome.org/dncsec-yahoo.htm From: John Papaleo Date: Fri Jul 23, 2004 11:02am Subject: RE: Parabolic Dish Info these things are toys...........they are for the most part useless..... -----Original Message----- From: A Grudko [mailto:agrudko@i...] Sent: Friday, July 23, 2004 12:00 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Parabolic Dish Info -----Original Message----- From: DEMTEC@A... [mailto:DEMTEC@A...] > Has anybody ever experimented with directional listening devices including the use of a Parabolic Dish. I field tested and used a Sony PRM 300 (I think) in the 80's. It was good at excluding ambient noise outside of it's 15 degree capture area but did not exhibit any gain (as you would expect at those frequencies) so you needed a really high-gain low noise amp to get significant results. I have a related story in my forthcoming book. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.718 / Virus Database: 474 - Release Date: 2004/07/09 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9169 From: Steve Uhrig Date: Thu Jul 22, 2004 3:18pm Subject: Mason TT6 repairs This message is an extraction of some traffic from a gentleman owning one of these. Thought it might be of interest to others: ------------- > i have a Mason TT-6 Telephone Analyzer that is not working, i a seeking > someone to fix it, are you interested and approx. cost and charge rate? Hi xxxxxx, I haven't seen or worked on a TT6 in 20 years. I have worked on probably a dozen of them. Frank Mason used to tell people to send them to me when he was swamped. He died about the time I last worked on one. The unit has a design problem. Do not use alkaline batteries/cells in it unless you put the batteries in cardboard insulating tubes which may have been supplied with the unit. The case of an alkaline D cell is the positive terminal. On the earlier carbon/zinc cells for which the unit was designed, the case was negative. The only thing covering the positive terminal is the paint on the cell. The battery holders are riveted to ground. When you install alkaline cells in it without the cardboard insulating tubes, the clips holding the cells eventually wear through the paint and short the 12 volts to ground. I literally have seen smoke coming out of a brand new TT6 because of this. I identified the problem and told Mason right after he introduced the thing, and he started including the cardboard insulating tubes to cover the cells, with subsequent units. Many don't know the purpose for them and don't use them. I've never gotten a TT6 in for resale or repair which had the battery tubes. The best solution is to remount the battery holders and raise them above ground by using nylon mounting hardware to insulate them. The second best solution is to apply heavy glue filled heat shrink around the battery clips, to insulate them from the battery cases. You will have to bend the clips out a little bit to make up for the tight fit after the heatshrink. The next best solution after these is to use the cardboard insulating tubes Frank Mason started supplying with the thing after alkaline batteries came out. If you don't have those tubes you can buy them or make something. Just be sure the clips in the battery holders can't touch the battery cases directly. The above is 95% of the problems I've seen in the TT6. If yours had that problem, a fair bit of wiring may have burned up. Find it all and replace it. I prefer to use Teflon-insulated wiring for all power circuitry, and add a fuse in the power buss if the design didn't include one. The thing is pretty straighforward. Anyone in TSCM will have no problem repairing it. Nothing complicated, just takes time. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9170 From: Bruce Date: Thu Jul 22, 2004 6:19pm Subject: Re: Your Land Outstanding...thanks James : ) 9171 From: graniteislandgroup Date: Sun Jul 25, 2004 8:04pm Subject: Test Message This is a test message 9172 From: contranl Date: Mon Jul 26, 2004 3:14pm Subject: Test message 2 and HAPPY TO SEE YOU BACK !!!! . Congrats for being back in full working order! At first sight no damage...exept for a posting i send during the black-out (that was not so clever to do)i'll have to send that again :) Keep it up ! (a little boring expression but well in place) Tetrascanner . 9173 From: James M. Atkinson Date: Mon Jul 26, 2004 3:11pm Subject: Counter Punch Article http://www.counterpunch.org/forno07262004.html ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9174 From: contranl Date: Sun Jul 25, 2004 5:06pm Subject: Enemy of the State ....fantasy ? . Everybody has seen the "Enemy of the state" .....you must have thought ...yeah shure... WATCH THIS !!!! : http://www.skylinesoft.com/corporate/whatsnew/SLOracledemo3e.wmv After you have seen that go to this website wich is a little overwhelming... here and there you may find some amazing demo's http://www.skylinesoft.com/corporate/corporate_home.asp Here is a direct link to the interactive 3D tour...it will ask you to install a little program...wich i did ...sometimes it may say that something is missing just go on it works fine enjoy and find your own city: http://www.skylinesoft.com/corporate/corporate_home.asp# Tetrascanner www.tetrascanner.com The Netherlands ..................... PS) i did post this while the messages where unavailable ...i was able to preview this posting so i guess it will arrive...wonder wat happened on sunday anyway... this is the first time i have seen that happening. I did forget to fill in a subject name...it then came back to me saying " message has no subject"...nice ! new feature ? . 9175 From: graniteislandgroup Date: Sat Jul 24, 2004 2:53am Subject: Test Message Test Message, just ignore. 9176 From: Tech Sec Lab Date: Sat Jul 24, 2004 8:12am Subject: FW: [IEE Events] Secure Mobile Communications Forum I would recommend this to anyone in the UK, I think there are topics invloved that are quite valid for the TSCM industry and if anyone decides to go drop me an email. Regards Ois ************************************** The 2nd IEE Secure Mobile Communications Forum: EXPLORING THE TECHNICAL CHALLENGES IN SECURE GSM AND WLAN The IEE, Savoy Place, London, WC2R 0BL, on Thursday, 23 September 2004 Details and registration: http://www.iee.org/events/securemobile.cfm Join the leading experts in mobile communications at this exciting event, which will update you on the current status of mobile communication security, potential threats and countermeasures. It will also provide opportunities to discuss the technical and engineering challenges that remain. Key speakers include Prof. Mike Walker, Group R&D Director, Vodafone, Charles Brookson, Chair, Security Group, GSM Association and David Chater-Lea, Fellow of the Technical Staff, Motorola. 9177 From: Don C. Johnson Date: Sun Jul 25, 2004 5:26pm Subject: CSD-18 Repo Sale The Community Development Corporation of Ft. Wayne/Allen County, Indiana has repo-ed a CSD-18 "Bug" Detector. The model can be seen at www.greatsouthernsecurity.com. If you are interested, contact them directly: Matt Blair at 260-427-1127. I believe they have other tech gear also. Ask for details if interested. I am forwarding this message on request. I haven't seen the equipment, but have been told it's like new. The CDC wrote a small business loan on a company that didn't last long, I believe. __________________________________ Don C. Johnson, CLI, CII Trace Investigations (IN License PD58900651) PO Box 2603, Bloomington, IN 47402 Phone (812) 334-8857 Fax (812) 334-2274 dcjcli@i... www.traceinvestigations.com [Non-text portions of this message have been removed] 9178 From: Date: Fri Jul 23, 2004 10:53pm Subject: Re: No parabolic......Phased Array Microphones ! Tetrascanner [dont know your name] Many thanks for all the advice and links I will follow them all up. re the Gene Hackman movie I seem to remember a member of this group had an input into the tech side of the film I have no plans to manufacture a listening device for Surveillance purposes at present just to play around [I am semi retired] from the excellent feedback I am getting from the group I will have lots pf happy hours ahead DEMTEC David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Countermeasures Specialist Electrical Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695 558544 07866206112 demtec@a... _http:www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom made covert electronic audio and video devices. Audio Tape and Video Sound track cleanup and enhancement. Professional physical and electronic countermeasures [sweep] services. note: any fellow Private Investigator e-mail groups member welcome to call in or phone to discuss applications, projects or just seeking advice. Workshop located alongside the M58 junction 3 [Non-text portions of this message have been removed] 9179 From: Date: Fri Jul 23, 2004 10:42pm Subject: Re: Parabolic Dish Info Thanks Andy I have already built a very high gain low noise amp and now deciding on which dish to use .The Sony model you mentioned might be a good start I will look around the local surplus suppliers. Re your book please keep me informed I will buy a copy [maybe even a signed copy could be valuable one day LOL] Best Regards ps Just a thought any other member published a book on TSCM or related ??? dont be shy I for one would be interested in adding to my extensive library DEMTEC David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Countermeasures Specialist Electrical Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695 558544 07866206112 demtec@a... _http:www.demtec.co.uk_ (http://www.demtec.co.uk/) [Non-text portions of this message have been removed] 9180 From: Hawkspirit Date: Mon Jul 26, 2004 5:02pm Subject: TDR/cat 5 Yea, My Tek 1503 right into the cable, I never use any isolation devices. Roger Date: Thu, 22 Jul 2004 11:36:04 -0400 From: "James M. Atkinson" Subject: Re: TDR/cat 5 Impedance mismatch from the TDR impedance not being properly matched to the impedance of this line under test. Were you using a Tek 1502/1503 without using a bridge? -jma At 11:10 AM 7/22/2004, Hawkspirit wrote: > > > While sweeping a large company that has a voice over IP phone system >I used TDR to radar all cables going from the executive offices to the >local phone closet where the cables terminated in a router and then >traveled by fiber down to the main IT room on the lower floor. > >The cables were cat 5 and I had them unterminated at both ends. I >noticed that any pair I tested had ringing/echoes, about five visible >past the termination distance. Each echo pulse was lower in amplitude >that the one before. Does anyone know the reason this type of cable has >this characteristic? > >Roger > [Non-text portions of this message have been removed] 9181 From: Hawkspirit Date: Mon Jul 26, 2004 5:09pm Subject: Cordless Swap I just finished a sweep where I tested the client's cordless phone which was an AT&T. The base said right on the label it was 2.4GHZ but when I tested the phone it was operating at 916MHZ with simple analogue modulation that was easily demodulated by a scanner. Apparently someone switched the guts of the unit so they could have easy listening. This is the first time I have seen a cordless phone electronics swap. Roger Tolces www.bugsweeps.com [Non-text portions of this message have been removed] 9182 From: James M. Atkinson Date: Mon Jul 26, 2004 5:30pm Subject: Re: Cordless Swap Nope, Some 2.4 GHz cordless phones only use 2.4 GHz for one side of the link (base for example), and a 900 MHz link for the other side (handset for example). Also, the phones typically use Frequency Modulation for both sides of the conversation, so the Analog Demodulation you mention was likely just because you were tuned to the slope of the FM signal and not the main carrier. Sounds like the phone is perfectly fine, and operating normally. -jma At 06:09 PM 7/26/2004, Hawkspirit wrote: > > > I just finished a sweep where I tested the client's cordless phone which >was an AT&T. The base said right on the label it was 2.4GHZ but when I >tested the phone it was operating at 916MHZ with simple analogue modulation >that was easily demodulated by a scanner. Apparently someone switched the >guts of the unit so they could have easy listening. This is the first time I >have seen a cordless phone electronics swap. > >Roger Tolces > >www.bugsweeps.com ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9183 From: James M. Atkinson Date: Mon Jul 26, 2004 5:22pm Subject: Re: TDR/cat 5 Ahem, that is your problem, The line is "ringing" due to a massive impedance mismatch actually being caused by your TDR. This situation will prevent you from seeing hostile devices on the line, and will indicate that bugs are present when in fact they are not. You need to modify the TDR so that you can adjust it for the correct impedance match, or use an external loading box. Doing this will radically enhance your ability to find bugs (or anything else) on the line under test. Not having the instrument correctly matched to the line under test is a bit like using a using a belt sander on your forehead to get rid of a migraine headache... you may get rid of the headache, but the results are messy. You will also find it helpful to replace the avalanche diodes in the front end of your unit, as well as the "cut out" transistors and diodes unless you are using a proper impedance matching system, AND some kind of protective network. Use the correct impedance matching, -jma At 06:02 PM 7/26/2004, Hawkspirit wrote: > > >Yea, My Tek 1503 right into the cable, I never use any isolation devices. >Roger > > > >Date: Thu, 22 Jul 2004 11:36:04 -0400 > > From: "James M. Atkinson" > >Subject: Re: TDR/cat 5 > > > >Impedance mismatch from the TDR impedance not being properly matched to the >impedance of this line under test. > > > >Were you using a Tek 1502/1503 without using a bridge? > > > >-jma > > > > > >At 11:10 AM 7/22/2004, Hawkspirit wrote: > > > > > > > > > While sweeping a large company that has a voice over IP phone system > > >I used TDR to radar all cables going from the executive offices to the > > >local phone closet where the cables terminated in a router and then > > >traveled by fiber down to the main IT room on the lower floor. > > > > > >The cables were cat 5 and I had them unterminated at both ends. I > > >noticed that any pair I tested had ringing/echoes, about five visible > > >past the termination distance. Each echo pulse was lower in amplitude > > >that the one before. Does anyone know the reason this type of cable has > > >this characteristic? > > > > > >Roger > > > > > > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9184 From: Steve Uhrig Date: Mon Jul 26, 2004 4:59pm Subject: Re: No parabolic......Phased Array Microphones ! On 24 Jul 2004 at 3:53, DEMTEC@A... , who eschews obfuscation, wrote: > Tetrascanner [dont know your name] I thought it was Tetra Scanner. Don't have a middle initial. Hmmm. > re the Gene Hackman movie I seem to remember a member of this group > had an input into the tech side of the film Yes. Two of us. Marty Kaiser and me. See links here: http://www.swssec.com/links.html be sure to follow the link to Marty's site as well. Lot of good info there. They took some editorial license, but most of the surveillance gear you saw there was real, built by Marty and me. We started on that thing early on, and ended up spending 9 months nearly full time and extensive travel consulting to the production. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9185 From: Steve Uhrig Date: Mon Jul 26, 2004 5:15pm Subject: Re: Cordless Swap On 26 Jul 2004 at 15:09, Hawkspirit , who eschews obfuscation, wrote: > I just finished a sweep where I tested the client's cordless phone which > was an AT&T. The base said right on the label it was 2.4GHZ but when I > tested the phone it was operating at 916MHZ with simple analogue > modulation that was easily demodulated by a scanner. Apparently someone > switched the guts of the unit so they could have easy listening. This is > the first time I have seen a cordless phone electronics swap. There were/are some phones which were 2.4 gigs one way and 900 the other. They played up the 2.4 part in marketing when it was new and the hot item but still used the cheaper 900 analog stuff for half of the link. I believe they were mentioned here, although it's been a while. Yours may have been one of them. Did you absolutely inspect for 2.4 gigs from both the base and the handset as well as at 900, at the same time you were hearing the 900? I bet if you did, you'd find half the link on 2.4. Charles probably knows the details of the above. The label on the base could have been marketing hyperbole too. That may be more likely than someone switching guts. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9186 From: R. Snyder Date: Mon Jul 26, 2004 6:36pm Subject: Is everything back to normal in Airstrip One? [OT] My telescreen went on the blink over the weekend, and I was beginning to miss the familiar voice of Emmanuel Goldstein. __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail 9187 From: Mike Di Feo Date: Mon Jul 26, 2004 5:40pm Subject: RE: Cordless Swap Roger: I have found some of the cheaper 2.4 GHZ cordless sometimes bleed and/or transmit in the 900 MHZ frequency. Also it is worthwhile noting that just because it is 2.4GHZ does not mean it is digital broad spectrum. I tested a Panasonic 2.4GHZ cordless that was analog. When the client provided me the user's manual it clearly sated that it was analog and the base was transmitting on the 900 MHZ freq. In the face of the telephone base it said " 2.4 GHZ telephone with digital answering machine" So the client assumed that the phone was digital as well. -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Monday, July 26, 2004 3:10 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Cordless Swap I just finished a sweep where I tested the client's cordless phone which was an AT&T. The base said right on the label it was 2.4GHZ but when I tested the phone it was operating at 916MHZ with simple analogue modulation that was easily demodulated by a scanner. Apparently someone switched the guts of the unit so they could have easy listening. This is the first time I have seen a cordless phone electronics swap. Roger Tolces www.bugsweeps.com [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9188 From: Lawrence Dillard Date: Tue Jul 27, 2004 0:14am Subject: I started out with nothing & still have most of it left. 40 THINGS YOU WOULD LOVE TO SAY OUT LOUD AT WORK 1. I can see your point, but I still think you're full of shit. 2. I don't know what your problem is, but I'll bet it's hard to pronounce. 3. How about never? Is never good for you? 4. I see you've set aside this special time to humiliate yourself in public. 5. I'm really easy to get along with once you people learn to see it my way. 6. I'll try being nicer if you'll try being smarter. 7. I'm out of my mind, but feel free to leave a message. 8. I don't work here. I'm a consultant. 9. It sounds like English, but I can't understand a damn word you're saying. 10. Ahhh...I see the screw-up fairy has visited us again... 11. I like you. You remind me of myself when I was young and stupid. 12. You are validating my inherent mistrust of strangers. 13. I have plenty of talent and vision; I just don't give a damn. 14. I'm already visualizing the duct tape over your mouth. 15. I will always cherish the initial misconceptions I had about you 16. Thank you. We're all refreshed and challenged by your unique point of view. 17. The fact that no one understands you doesn't mean you're an artist. 18. Any connection between your reality and mine is purely coincidental. 19. What am I? Flypaper for freaks!? 20. I'm not being rude. You're just insignificant. 21. It's a thankless job, but I've got a lot of Karma to burn off. 22. Yes, I am an agent of Satan, but my duties are largely ceremonial. 23. And your crybaby whiny-assed opinion would be...? 24. Do I look like a people person? 25. This isn't an office. It's Hell with fluorescent lighting. 26. I started out with nothing & still have most of it left. 27. Sarcasm is just one more service we offer. 28. If I throw a stick, will you leave? 29. Errors have been made. Others will be blamed. 30. Whatever kind of look you were going for, you missed. 31. I'm trying to imagine you with a personality. 32. A cubicle is just a padded cell without a door. 33. Can I trade this job for what's behind door #1? 34. Too many freaks, not enough circuses. 35. Nice perfume. Must you marinate in it? 36. Chaos, panic, & disorder-my work here is done. 37. How do I set a laser printer to stun? 38. I thought I wanted a career; turns out I just wanted a salary. 39. Who lit the fuse on your tampon? 40. Oh I get it... like humor... but different. 9189 From: William Knowles Date: Tue Jul 27, 2004 1:27am Subject: Pentagon memo reveals bugging Sorry if this goes out twice, I am now on the digest until the list is directed more towards what I originally signed up for. - WK http://www.washtimes.com/national/20040726-122303-7795r.htm By Rowan Scarborough WASHINGTON TIMES July 26, 2004 When the Bush administration took over the Pentagon's beleaguered inspector general office in 2002, officials found something startling: The director's office, at some point, had been electronically bugged. Sorting out why the listening device was inside the walls of the office, with a cord leading to another office, is just one issue that had to be addressed by Joseph E. Schmitz, President Bush's pick three years ago to be the Defense Department's top cop. A Naval Academy graduate and civil litigation lawyer, Mr. Schmitz was tapped to run the office responsible for investigating million-dollar fraud in the far-flung defense industry and criminal misconduct by senior Defense Department employees. His nomination delayed by Senate Democrats, Mr. Schmitz finally came on board a year into the Bush administration. He set out to right a ship dogged by charges of corruption and cronyism. But he also had to deal with an electronic bug apparently left over from eight years of the Clinton administration. An internal "info memo," a copy of which was obtained by The Washington Times, was written by a staffer in Mr. Schmitz's office: "On June 19, 2002, during a routine meeting with the director of security for the Department of Defense, it was reported to my staff and me that a potential 'listening device' was previously discovered in the infrastructure of DoDIG. "The DoD directorate of security conducted a routine sweep for electronic listening devices in certain areas of the ninth and tenth floors of the DoDIG on Aug. 7, 2000. The sweep revealed that a wire had been installed inside the wall structure leading to and from the ninth and tenth floors of the DoDIG (areas which comprise the Defense Criminal Investigative Service and the personal office space of the inspector general)." And there was another touchy issue for Mr. Schmitz. A second series of internal memos from his staff showed that a Muslim who was employed as an auditor and granted a "top-secret" security clearance was not an American citizen. "He possesses a Social Security number tied to multiple confirmed aliases," a May 2002 memo said. Another paper said, "Using the improper granted interim clearance, [the employee] visited numerous installations where he had access to sensitive information. ... The Department of Justice Joint Terrorism Task Force is currently considering a criminal investigation into this matter." The Times faxed copies of the memos to Mr. Schmitz's office for comment. John R. Crane, his spokesman, responded in an e-mail: "Both matters contained in your fax ... have been addressed and resolved." "The memos provided contain information that is not releasable to you. In particular, the Privacy Act protects the personal information contained in one of the memos," he continued. "I would note that DoD [regulations] state 'unauthorized disclosure of ... information that is protected by the Privacy Act may also result in civil and criminal sanctions against responsible persons.' " A U.S. official later said the employee in question had resigned. On the bugging issue, this official said, "No one knows who was spying on who. They just removed it." Mr. Schmitz's biggest public headache was corruption inside an agency that is supposed to be a model for weeding out fraud. Sen. Charles E. Grassley, Iowa Republican and a longtime investigator of Defense Department wrongdoing, conducted an investigation that highlighted an inspector general office that falsified its investigative reports and fabricated witness statements in at least two investigations in the mid-1990s. Mr. Schmitz, a former aide to Attorney General Edwin Meese III in the Reagan presidency, did not take office until the second year of the Bush era, because Democrats leery of his conservative credentials delayed a final confirmation vote. He inherited a bureaucracy of auditors and investigators that Republicans think is more loyal to Democrats than to their party. But Mr. Schmitz appears to have overcome objections by vigorously investigating corporate fraud, while bringing in an independent assessment team to proposed reforms. "No member of the team has seen an organization, civil or military, manned by so many talented people, so ill-served by its senior leadership," the assessment team subsequently reported. A government official who has worked with Mr. Schmitz said, "He inherited a total mess and did a ... good job of turning that sinking ship around. He reorganized in order to eliminate offices that had demonstrated a refusal to operate as a unified team. He empowered and motivated midlevel and lower-level folks and brought back an esprit de corps the agency hadn't had in nearly a decade." In early June, Mr. Schmitz traveled to Iraq to advise the new government on how to set up a system of inspectors general to play watchdog. "I have a high level of hope," the Pentagon quoted him as saying. "The issue isn't whether these folks want to do it. They clearly want to do it. They want to go through the transition; they want to assume a sense of the rule of law. But it's going to be hard. It's going to take time. It might take a generation. "They are scared for their professional success ... and they are physically scared for their own lives and their families' lives," he said. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ---------------------------------------------------------------- C4I.org - Computer Security, & Intelligence - http://www.c4i.org ================================================================ Help C4I.org with a donation: http://www.c4i.org/contribute.html *==============================================================* 9190 From: Date: Mon Jul 26, 2004 10:06pm Subject: Re: Parabolic Dish Info That is exactly the point I like to play with toys in my spare time DEMTEC David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Countermeasures Specialist Electrical Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695 558544 07866206112 demtec@a... [Non-text portions of this message have been removed] 9191 From: Hawkspirit Date: Tue Jul 27, 2004 5:52am Subject: Cordless Swap Nope, No carrier at 2.4 and I could hear myself clear as day at 916 MHZ using the slope demodulator built into my spectrum analyzer with no problem, once again a analog transmission. Roger Date: Mon, 26 Jul 2004 18:30:50 -0400 From: "James M. Atkinson" Subject: Re: Cordless Swap Nope, Some 2.4 GHz cordless phones only use 2.4 GHz for one side of the link (base for example), and a 900 MHz link for the other side (handset for example). Also, the phones typically use Frequency Modulation for both sides of the conversation, so the Analog Demodulation you mention was likely just because you were tuned to the slope of the FM signal and not the main carrier. Sounds like the phone is perfectly fine, and operating normally. -jma At 06:09 PM 7/26/2004, Hawkspirit wrote: > > > I just finished a sweep where I tested the client's cordless phone which >was an AT&T. The base said right on the label it was 2.4GHZ but when I >tested the phone it was operating at 916MHZ with simple analogue modulation >that was easily demodulated by a scanner. Apparently someone switched the >guts of the unit so they could have easy listening. This is the first time I >have seen a cordless phone electronics swap. > >Roger Tolces > >www.bugsweeps.com [Non-text portions of this message have been removed] 9192 From: Hawkspirit Date: Tue Jul 27, 2004 6:01am Subject: TDR/cat 5 I think the ringing on the cable has to do with the increased conductivity of the cable in the sense that the cat 5 wire in and of itself has a wider bandwidth than normal pots telephone copper. Ringing does not interfere with the measurement quality because it extends beyond the distance range of the termination point on the display. Roger Date: Mon, 26 Jul 2004 18:22:14 -0400 From: "James M. Atkinson" Subject: Re: TDR/cat 5 Ahem, that is your problem, The line is "ringing" due to a massive impedance mismatch actually being caused by your TDR. This situation will prevent you from seeing hostile devices on the line, and will indicate that bugs are present when in fact they are not. You need to modify the TDR so that you can adjust it for the correct impedance match, or use an external loading box. Doing this will radically enhance your ability to find bugs (or anything else) on the line under test. Not having the instrument correctly matched to the line under test is a bit like using a using a belt sander on your forehead to get rid of a migraine headache... you may get rid of the headache, but the results are messy. You will also find it helpful to replace the avalanche diodes in the front end of your unit, as well as the "cut out" transistors and diodes unless you are using a proper impedance matching system, AND some kind of protective network. Use the correct impedance matching, -jma [Non-text portions of this message have been removed] 9193 From: James M. Atkinson Date: Tue Jul 27, 2004 6:34am Subject: Tear Down This Wall [Off Topic] Tear Down this Wall I was recently able to examine the so called "Free Speech Zone" located near the Fleet Center in Boston, MA at the site of the Democratic National Convention. I walked around the outside perimeter, and I walked around inside of it. What I saw was an absolute abomination, not only to the eye, but also to the very spirit of our nation. This cage should never be torn down, and should be preserved with a museum built around it to signify just how low we as a nation have fallen. This area and the surrounding land was once the birth site of democracy, patriotism, and freedom. This sacred ground has now been sullied with this contraption and itís significance. It was mere feet to the South that the Boston Massacre took place, and only a short distance to the North that the Battle of Bunker Hill was waged. To the West of this site we have the Old North Church, where Paul Revere saw the lights that sent him on his ride, and to the East the location where our Colonial forefathers expressed their outrage at King George by dumping his tea into Boston Harbor. These locations are not miles, tens of miles, or hundreds of miles from this site, but feet, from where people gave their lives to protect our freedom. The soil directly underneath this so called ìFree Speech Zoneî contains the blood of those early Americans who had the bravery and faith to stand up for what they believed in, and who were willing to die for it, in turn soaking this very ground with their lifeís blood. Not far from here are two old Colonial-era graveyards, which contain the mortal remains of those who died fighting for our freedom in the early days of our country. These graves include both rich and poor, sailors and preachers, sons and daughters, husbands and wives, both the well-educated and the simple. The markers in this graveyard list patriot after patriot, hero after hero, and yet the United States Government, the Secret Service, the Department of Homeland Security, and City of Boston saw fit to desecrate this holy ground with what has become an embarrassment to our entire country. When the City of Boston was summoned into court concerning this abomination the Judge could not believe the description that was given, and had to come out of the courtroom to observe it in person. U.S. District Court Judge Douglas P. Woodlock was deeply disturbed and blasted the ìFree Speech Zoneî in his published decision, and stated that it was "an affront to free expression". The ìzoneî is poorly constructed, no building permit was ever obtained for it; no building inspector every certified it for occupancy. Around the perimeter, this death trap is lined with a highly flammable fabric to hide the protester from public view, and yet no fire extinguishers can be found in the enclosure. Above the ìaffront to free expressionî (as the court has deemed it) the government has positioned soldiers armed with machine guns and chemical weapons to quell any voices that become too unruly, or unmanageable. The ìFree Speech Zoneî does not serve any legitimate security purposes, does not foster ìFree Speechî, and instead only exists to muzzle the voice of protest, and to try to hide it away under an old decrepit bridge. History records that following World War II, the Russian forces began their oppressive occupation of East Germany. Those living on the wrong side of the wall had to suffer under the iron rule of the Communist system, and risked imprisonment or death for speaking out or trying to seek freedom. Between 1949 and 1961 over 2.6 million East Germans escaped to West Berlin. The Communist government could find no way to control this mass exodus. On August 13, 1961 the Soviet Government officially closed the border between East and West Berlin and began building a series of walls through the city. These series of walls came to be known as the ìBerlin Wallî, and became a black mark in history, noting the Berlin Wall as a structure of oppression. Ironically, the United States considered the Berlin Wall as the centerpiece of the Soviet oppression present in East Germany during the Cold War. The Soviet Union permitted three places in this wall where a small number of their ìpolitically correctî citizens could cross into West Berlin, and where diplomats could meet to exchange spies. During the Cold War, the government posted signs at these three checkpoints that said ìYou are now leaving the American Sectorî. These same signs, with this same message could now be hung in Boston near the Fleet Center where the DNC convention is taking place. On June 12, 1987, the President of the United States of America, the late Ronald Reagan addressed the people of West Berlin, in Germany at the Brandenburg Gate. During this speech, President Reagan called on the leader of the Soviet Union and proclaimed: ìCome here to this gate! Mr. Gorbachev, open this gate! Mr. Gorbachev, tear down this wall!î The ìFree Speech Zoneî is only a few hundred feet from where the DNC candidates will be speaking about freedom, democracy, and the American ethic. This zone can be easily reached from the speakers platform of the convention by walking a few yards to the elevator, going down one floor, take a left though the glass doors to the street level, and then take a right to walk along the media pavilion. Directly ahead, and across the street will be the area in questionÖ it is hard to miss as it stands like some monument to oppression, and demonstrates to the entire world that some Americans, and the nation as a whole can, in fact, be muzzled. Is this a message that we as a democratic society wish to convey to the rest of the world, Mr. President? I formally ask that both Mr. Kerry, and Mr. Edwards visit the inside of the "Free Speech Zone", and that while visiting that they take a pair of wire cutters and cut a hole in the fence to demonstrate that they support and are willing to defend the Constitution of the United States. Then Mr. Kerry, during the convention have the ones responsible for erecting this contraption tear it down, this wall, this slap in the face of our Constitutional Rights, to Free Speech, to Gather, to Raise our Voices, in OUR own land. We the peopleÖ ìCome here to this wall! Mr. Kerry, open this gate! Mr. Kerry, tear down this wall!î James M. Atkinson, 7/24/04 Gloucester, MA jmatk@tscm.com www.tscm.com ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9194 From: James M. Atkinson Date: Tue Jul 27, 2004 6:49am Subject: Company Spied on Government Officials http://www.globalexchange.org/countries/brazil/2319.html Company Spied on Government Officials Americas.org July 22, 2004 A private investigative firm has spied upon top officials in the government of President Luiz In·cio Lula da Silva as part of the most startling corporate espionage case in Brazil's recent history. Kroll, a US-based consultancy, was originally contracted by representatives of Opportunity, a Brazilian investment company, to investigate Telecom Italia, with which it is fighting for control of Brasil Telecom, a national telephone company. But Kroll ended up spying on top government officials, including Luiz Gushiken, current communications secretary and Lula da Silva confidant, over alleged political favours for Telecom Italia. Excerpts of Kroll's reports in Thursday's Folha de S„o Paulo newspaper suggest government officials were helping Telecom Italia in an attempt to dislodge Opportunity from Brasil Telecom. Kroll also alleged campaign funding for the governing Workers' party (PT) was supplied by Luiz Roberto Demarco, a disgruntled former partner in Opportunity. Mr Gushiken on Thursday said the "sordid" investigations were in "flagrant violation of the constitution" and promised in a statement to take "appropriate legal action". The federal police and the justice department were investigating the case. Mr Gushiken confirmed in the Folha story his contacts with Mr Demarco over the Brasil Telecom case, but denied any wrongdoing. The episode comes after a scandal earlier this year involving a top presidential aide who was caught asking for a kickback from a kingpin gambler in exchange for political favours. That scandal threw the government into temporary disarray and rocked financial markets. The Kroll reports say Cassio Casseb, at present president of state-owned Banco do Brasil, the country's largest bank, also sought to weaken Opportunity's role in Brasil Telecom. While the investigations apparently began in 2000, before Mr Lula da Silva took office, Kroll spied on Mr Casseb as late as May 2003, when he allegedly met Telecom Italia executives in Lisbon. The bank said he was attending a business meeting there and considered it normal for him to meet executives from other companies. For years Telecom Italia and Opportunity have been engaged in Brazil's most conniving corporate battle. Opportunity is controlled by Daniel Dantas, considered one of the country's shrewdest bankers, and acts on behalf of Citicorp Venture Capital (CVC), a private equity firm owned by Citigroup of the US. Federal prosecutors are investigating the 1998 privatisation of Brasil Telecom to determine whether Opportunity, CVC or government officials acted illegally during and after the sale. In February, Telecom Italia and Pirelli, its owner, severed relations with Citigroup because of the dispute. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9195 From: contranl Date: Tue Jul 27, 2004 8:57am Subject: RE: No parabolic.......Phased Array Microphones ! . In my 2 previous messages i was referring to 2 different Gene Hackman movies To the "The conversation" (1974 !) for the phasing out trick To the "Enemy of the state" (1998) for the 3D building shots and positioning stuff By the way wich is the company that does the correlator with TV- tuner and the "steerable" phased array microphone panel mounted on a van ? ....can't find it back. Tetrascanner . 9196 From: Tech Sec Lab Date: Tue Jul 27, 2004 9:54am Subject: Re: No parabolic......Phased Array Microphones ! In that case, can you explain exactly how his "chicken wire" faraday cage was supposed to be effective....? Cheers Ois ******** Message: 22 Date: Mon, 26 Jul 2004 17:59:30 -0400 From: "Steve Uhrig" Subject: Re: No parabolic......Phased Array Microphones ! On 24 Jul 2004 at 3:53, DEMTEC@A... , who eschews obfuscation, wrote: > Tetrascanner [dont know your name] I thought it was Tetra Scanner. Don't have a middle initial. Hmmm. > re the Gene Hackman movie I seem to remember a member of this group > had an input into the tech side of the film Yes. Two of us. Marty Kaiser and me. See links here: http://www.swssec.com/links.html be sure to follow the link to Marty's site as well. Lot of good info there. They took some editorial license, but most of the surveillance gear you saw there was real, built by Marty and me. We started on that thing early on, and ended up spending 9 months nearly full time and extensive travel consulting to the production. Steve 9197 From: Steve Fulton Date: Tue Jul 27, 2004 9:51am Subject: ID of mystery dish.. Good to see TSCM-L back after that short amount of excitement.. I'm looking for identification of a dish, is it microwave? I've included links to the pictures below. http://www.esoteric.ca/special/mystery_dish_1.jpg http://www.esoteric.ca/special/mystery_dish_2.jpg http://www.esoteric.ca/special/mystery_dish_3.jpg -- Stephen Fulton. From: Hawkspirit Date: Thu Jul 24, 2003 4:26pm Subject: More TSCM oldies but goodies Here are some of the latest historical bug sweep articles added to my web site. http://www.bugsweeps.com/info/bug_boom.html http://www.bugsweeps.com/info/dont_let_them_bug_you.html http://www.bugsweeps.com/info/outwit_electronic_snoopers.html http://www.bugsweeps.com/info/pass_bug.html Roger Tolces Electronic Security Co. Los Angeles, Ca www.bugsweeps.com 7594 From: James M. Atkinson Date: Sun Jul 27, 2003 11:14pm Subject: Analogies and Metaphors Found in High School Essays Analogies and Metaphors Found in High School Essays (or, 'How to Write Good'...) Her face was a perfect oval, like a circle that had its two sides gently compressed by a Thigh Master. His thoughts tumbled in his head, making and breaking alliances like underpants in a dryer without Cling Free. He spoke with the wisdom that can only come from experience, like a guy who went blind because he looked at a solar eclipse without one of those boxes with a pinhole in it and now goes around the country speaking at high schools about the dangers of looking at a solar eclipse without one of those boxes with a pinhole in it. She grew on him like she was a colony of E-coli and he was room-temperature Canadian beef. She had a deep, throaty, genuine laugh, like that sound a dog makes just before it throws up. Her vocabulary was as bad as, like, whatever. He was as tall as a six-foot-three-inch tree. The revelation that his marriage of 30 years had disintegrated because of his wife's infidelity came as a rude shock, like a surcharge at a formerly surcharge-free ATM. The little boat gently drifted across the pond exactly the way a bowling ball wouldn't. McBride fell 12 stories, hitting the pavement like a Hefty bag filled with vegetable soup. From the attic came an unearthly howl. The whole scene had an eerie, surreal quality, like when you're on vacation in another city and Jeopardy comes on at 7:00 pm instead of 7:30. Her hair glistened in the rain like a nose hair after a sneeze. The hailstones leaped from the pavement, just like maggots when you fry them in hot grease. Long separated by cruel fate, the star-crossed lovers raced across the grassy field toward each other like two freight trains, one having left Cleveland at 6:36 pm traveling at 55 mph, the other from Topeka at 4:19 pm at a speed of 35 mph. They lived in a typical suburban neighborhood with picket fences that resembled Nancy Kerrigan's teeth. John and Mary had never met. They were like two hummingbirds who had also never met. He fell for her like his heart was a mob informant and she was the East River. Shots rang out, as shots are wont to do. The plan was simple, like my brother-in-law Phil. But unlike Phil, this plan just might work. The young fighter had a hungry look, the kind you get from not eating for awhile. "Oh, Jason, take me!"; she panted, her breasts heaving like a college freshman on $1-a-beer night. He was as lame as a duck. Not the metaphorical lame duck, either, but a real duck that as actually lame. Maybe from stepping on a land mine or something. It was an American tradition, like fathers chasing kids around with power tools. He was deeply in love. When she spoke, he thought he heard bells, as if she were a garbage truck backing up. She was as easy as the TV Guide crossword. Her eyes were like limpid pools, only they had forgotten to put in any pH cleanser. She walked into my office like a centipede with 98 missing legs. It hurt the way your tongue hurts after you accidentally staple it to the wall. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Knowledge will forever govern ignorance, and a people who mean to be their own governors, must arm themselves with the power knowledge gives. A popular government without popular information or the means of acquiring it, is but a prologue to a farce or a tragedy or perhaps both." --- James Madison (Fourth President of the United States) -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 7595 From: James M. Atkinson Date: Sun Jul 27, 2003 11:17pm Subject: The Pharmacist The Pharmacist A lady walks into the drugstore and asks the pharmacist for some arsenic. "Ma'am, what do you want with arsenic?", "To kill my husband.", "I can't sell you arsenic to kill a person!" The lady lays down a photo of a man and a woman in a compromising position. The man is her husband and the woman is the pharmacist's wife. He takes the photo and nods. "I didn't realize you had a prescription -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Knowledge will forever govern ignorance, and a people who mean to be their own governors, must arm themselves with the power knowledge gives. A popular government without popular information or the means of acquiring it, is but a prologue to a farce or a tragedy or perhaps both." --- James Madison (Fourth President of the United States) -------------------------------------------------------------------------------------------------- 7596 From: Mike Dever Date: Mon Jul 28, 2003 7:54pm Subject: To the list: Does anybody have a publicly available list of competencies for the selection of candidates for TSCM specialist positions? Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Voice: (02) 6254 5337 Email: dca@b... This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. 7597 From: kirk Date: Tue Jul 29, 2003 2:15am Subject: The 3rd annual Nigerian Email Conference The 3rd annual Nigerian Email Conference For those of you who are fed up with the Nigerian email scams, this is Hilarious, just don't send them any money. http://j-walk.com/other/conf/index.htm -- Kirk Adirim TACTRONIX Tactical Electronics for Critical Missions 468 North Camden Drive Beverly Hills, CA 90210 USA E: kirk@t... T: 323-650-2880 F: 310-388-5886 W: www.tactronix.com -- 7598 From: Hawkspirit Date: Tue Jul 29, 2003 0:21pm Subject: Original bug sweepers Who Were The Original Bug Sweepers? http://www.bugsweeps.com/info/original_bugsweepers.html 7599 From: Thomas Shaddack Date: Mon Jul 21, 2003 0:38pm Subject: Re: using netstat to scan for open IRC channels On Mon, 21 Jul 2003, frost_bitten_ca wrote: > netstat -an | find ":6667" You may also like Antiyports, a free program that (under Windows 2000 and XP and possibly NT) not only shows opened connections and ports, but also shows what processes are they mapped to. You may get it from eg. . If you find an IRC connection from your machine, and have more adventurous nature, you may use a network packet capture program to realtime-monitor the communication (IRC is usually unencrypted). One of popular packet capture programs is Ethereal, . Enjoy! :) 7600 From: Thomas Shaddack Date: Mon Jul 21, 2003 1:11pm Subject: Various little programs and anti-annoyance utilities It's a well-known "secret" that individual Windows and Windows Media Player installations have GUIDs, Globally Unique Identifiers. These can be used for tracking the users for various purposes, from marketing to espionage. However, countermeasures exist. There is a nifty utility, ID Blaster Plus, which randomizes the GUIDs in regular intervals, by default 30 seconds. More description and download at http://www.wilderssecurity.com/idblaster.html Another utility runs on the background and checks if the basic settings of MSIE weren't altered (eg, search page, home page, default page, and installation of various browser helper objects). Useful especially for visitors of the "darker" side of the Net (warez, porn...) where things like ActiveX attacks, evil javascripts, and self-installing premium-rate dialers tend to lurk. See more at http://www.wilderssecurity.com/bhblaster.html Yet another utility allows a manual check/repair of Windows settings changed by various installers and adware/spyware. Its name is "Hijack This!", it shows a list of nondefault settings for various browser registry keys and a list of installed Browser Helper Objects (frequent sources of MSIE crashes) and Download Program Files and other crud that is usually get rid of by reinstalling. See http://www.tomcoyote.org/hjt/ And yet another thingy is a list of registry keys called "IE-SPYAD" to import to automatically install the best-known spyware and tracking websites into High Security zone for browsing. No more hostile ActiveX crapplets from there, no more javascripts and cookies. As added benefit, prevents some kinds of pop-up ads. See http://www.staff.uiuc.edu/~ehowes/resource.htm You could also like to see these repositories: http://www.wilders.org/free_tools.htm http://www.lurkhere.com/~nicefiles/ Enjoy :) 7601 From: Michael Puchol Date: Sun Jul 27, 2003 3:32am Subject: Re: using netstat to scan for open IRC channels I've examined many zombies, eggdrops, etc. and they can be configured to run on any port in the host machine. Most decently-planted zombies will run on odd ports, or those belonging to other services, for example, ftp. So, while your advice is somewhat useful, it is by no means a method to check if you have been trojaned. Also, IRC servers use many ports in the 666x range, so your eggdrop doesn't have to connect using 6667 necessarily. Don't let netstat give you a false sense of security (while it IS a very useful tool). Cheers, Mike ----- Original Message ----- From: "frost_bitten_ca" To: Sent: Monday, July 21, 2003 4:52 PM Subject: [TSCM-L] using netstat to scan for open IRC channels > netstat -an | find ":6667" > > Open an MS-DOS Prompt window and type the command line above, then > press the "Enter" key. If a line resembling the one shown below is > NOT displayed, your computer does not have an open connection to an > IRC server running on the standard IRC port. If, however, you see > something like this: > > TCP 192.168.1.101:1026 70.13.215.89:6667 ESTABLISHED > > . . . then the only question remaining is how quickly you can > disconnect your PC from the Internet! > > A second and equally useful test can also be performed. Since IRC > servers generally require the presence of an "Ident" server on the > client machine, IRC clients almost always include a local "Ident > server" use to keep the remote IRC server happy. Every one of the > Zombie/Bots I have examined does this. Therefore, the detection of an > Ident server running in your machine would be another good cause for > alarm. To quickly check for an Ident server, type the following > command at an MS-DOS Prompt: > > netstat -an | find ":113 " > > As before, a blank line indicates that there is no Ident server > running on the default Ident port of "113". (Note the "space" after > the 113 and before the closing double-quote.) If, however, you see > something like this: > > TCP 0.0.0.0:113 0.0.0.0:0 LISTENING > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 7602 From: Lawrence Dillard Date: Sun Jul 27, 2003 7:55am Subject: "undetectable" phone tap EDN Mag. describes a capacitively coupled clip for phone tapping, GOTO: http://www.e-insite.net/ednmag/index.asp?layout=article&stt=000&articleid=CA310392&pubdate=7%2F24%2F2003&spacedesc=designideas Larry Dillard 7603 From: markhaugsten Date: Sun Jul 27, 2003 9:25pm Subject: 24/7 Audio and Video recording for an Automobile Group Please comment on your opinions on how to build a system into my truck/car that records 24/7, catches audio within 50 ft, 360 degree (preferably overlapped) video, can store min. 4 days, or dl's via cellphone at reg schedules. If we use a Tape or other media onboard I want redundancy, so that I may clearly label the 'find' unit', while protecting the secondary so that it may continue monitoring and dling. Mark 7604 From: 4phun Alert ≤∫∫≥ <4phun@c...> Date: Mon Jul 28, 2003 5:24am Subject: Tapping loophole 'needs closing' Tapping loophole 'needs closing' By Chris Summers BBC News Online Eavesdroppers, including stalkers and jealous spouses, are listening in on hundreds of thousands of private conversations in Britain every week because of a legal loophole, BBC News Online has discovered. http://news.bbc.co.uk/2/hi/uk_news/3067643.stm [Non-text portions of this message have been removed] 7605 From: Steve Weinert Date: Tue Jul 29, 2003 6:50am Subject: FOI All basic stuff, but the Link page is a nice summary: Global culture of secrecy By Clare Murphy BBC News Online Britain, with its Official Secrets Act, is not the only country whose establishment is terrified of public scrutiny. All over the world regimes conspire to keep information secret, either through legislation, dirty tricks or sheer intimidation. The buzzword is invariably "national security". Mention state secrecy, ........ Full (Light Weight Read BTW) Story from BBC NEWS: http://news.bbc.co.uk/go/pr/fr/-/2/hi/in_depth/3075475.stm Freedom of Information (FOI) Laws Link Summary Page http://home.online.no/~wkeim/foil.htm Steven W 7606 From: Steve Uhrig Date: Tue Jul 29, 2003 2:25pm Subject: Re: 24/7 Audio and Video recording for an Automobile On 28 Jul 2003 at 2:25, markhaugsten wrote: > Please comment on your opinions on how to build a system into my > truck/car that records 24/7, catches audio within 50 ft, 360 degree > (preferably overlapped) video, can store min. 4 days, or dl's via > cellphone at reg schedules. If we use a Tape or other media onboard I > want redundancy, so that I may clearly label the 'find' unit', while > protecting the secondary so that it may continue monitoring and dling. What you're seeking is impractical at a minimum although much of it not impossible if you have a blank check. You'll spend more than the value of the car, and results will be poor. Package will be large and power hungry, and will need a conditioned environment in which to operate, which demands even more power and real estate. What you describe would be a challenge even for a competent person to design, let alone install properly and make reliable. Mechanical storage (tape or hard drive) does not like to operate much outside the environment a human comfortably can tolerate. You don't have that in most parts of the world in an automobile. If you create the environment friendly to mechanical drives, you're talking space and power. Police car video systems duct heat or air conditioning from inside the car into the sealed recorder housing in the trunk. The drives in a police car video system never are running unless the engine is also, to condition the inside of the car. Cellular is far too narrow bandwidth to dump any usable amount of video. You can frame grab and dribble snapshots out across the channel, but that won't do you much good and is not reliable. Intercepting audio for 50 feet won't happen period. You will hear a lot of wind and traffic noise. You won't hear human voices beyond a few feet. If you seriously have a need, I'll design the system for you on a paid consulting basis the best which can be done. However, I would encourage you to try to find another solution to your application, whatever it happens to be. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7607 From: Date: Wed Jul 30, 2003 8:20am Subject: She'll still be around forever.............. Jane Barbe, voice-mail voice Elaine Woo Los Angeles Times Jul. 28, 2003 12:00 AM ROSWELL, Ga. - Jane Barbe, whose voice was familiar to millions of telephone users across the country who ever dialed a wrong number or had to "Please listen to the following options" in a voice-mail system, died July 18 of complications from cancer. She was 74. Barbe was the queen of telephone recordings, whose friendly but authoritative voice was heard an estimated 40 million times a day in the 1980s and early 1990s on everything from automated time and weather messages to hotel wake-up calls. During her unusual 40-year career, she articulated immortal lines including "At the tone, the time will be 7:22 and 40 seconds," "I'm sorry, the number you have dialed is no longer in service," and "Please press one for more options." Her voice was everywhere, but especially, as Ted Koppel once said on a segment of Nightline devoted to the topic, in "voice-mail jail." She was not the only person who recorded voice mail and other automated phone messages, but she likely did it longer than anyone else. "I think she was probably one of the first," said Pat Fleet, who has been in the telephone voice-recording business for 25 years and is known as the "AT&T Lady" for her work for the telecommunications giant. Barbe did most of her recordings for Atlanta-based Electronic Telecommunications Inc., which at one time produced 2,000 voice-messaging systems for businesses and government agencies, and for Octel Communications, now a part of Bell Labs/Lucent. In the 1980s and '90s, Barbe was the voice on 1,000 of Electronic Telecommunication's systems, according to recording services manager Michael Miller. She was heard on 90 percent of "intercept messages," the recording played when something is wrong with a phone number, and 6 percent of automated time and temperature calling programs. "You hear my voice in more than 1,000 cities in the United States, Saudi Arabia, Hong Kong, South America, Canada. . . . Vocally, I get around," she told the Chicago Sun-Times years ago. People wrote her letters, some saying they called a certain number to hear her voice when they were lonely. When she appeared at conventions, sometimes hundreds of people would line up for her autograph. Barbe, a Florida native who grew up in Atlanta, studied drama at the University of Georgia. There she learned how to remove the Southern inflections from her voice. "You haven't lived until you've heard Antigone in a Southern accent," she once quipped. In 1963, she began working for Audichron, the unit of Electronic Telecommunications that pioneered the time-weather telephone message industry. She had to speak in clear, measured tones, without any regional accent. [Non-text portions of this message have been removed] 7608 From: mpaulsen6 Date: Wed Jul 30, 2003 1:40pm Subject: lockout tagout for faceplate Problem - network faceplates that need to be lockout/tagout. Solutions? Tried Belkin, Panduit so far. They have tamper proof which can go down to universal lockout/tagout. Does anyone know of a lockout network faceplate that doesn't need to go from tamper proof to lockout/tagout? 7609 From: James M. Atkinson Date: Wed Jul 30, 2003 2:06pm Subject: Upgrades Paths Eighteen months ago I upgraded to Girlfriend 1.0 from Drinking Mates 4.2, which I'd used for years without any trouble. However, there are apparently conflicts between these two products and the only solution was to try and run Girlfriend with the sound turned off. To make matters worse, Girlfriend 1.0 is also incompatible with several other applications, such as Lads Night Out 3.1, Football 2 and Playboy 6.1. Successive versions of Girlfriend proved no better. A shareware beta-programme, Party Girl 2.1, which I tried, had many bugs and left a virus in my system, forcing me to shut down completely for several weeks. Eventually I tried to run Girlfriend 1.2 and Girlfriend 1.0 at the same time, only to discover that when these two systems detected each other they caused severe damage to my hardware. Sensing a way out, I then upgraded to FiancÈe 1.0 only to discover that this product soon had to be upgraded (at great cost) to Wife 1.0, which I reluctantly agreed to because, whilst Wife 1.0 tends to use up all my available resources, it does come bundled with FreeSex Plus and Cleanhouse 2000. Shortly after this upgrade however I then discovered that Wife1.0 can be very unstable and costly to run. For example, any mistakes I made were automatically stored in Wife 1.0's memory and could not be deleted. They then resurfaced months later when I had forgotten about them. Wife 1.0 also has an automatic Diary Explorer and E-mail porn filter and can, without warning, launch Photostrop and Whingezip! These latter products have no help files and I have to try and guess what the problem is myself. Additional costly problems are that Wife 1.0 needs updating regularly, requiring Shoe Shop Browser for new attachments and also Hairstyle Express which needs to be reinstalled every other week. Wife 1.0 also spawns unwelcome child processing that also drains my resources. It also conflicted with some of the new games I wanted to try, stating that they are an illegal operation. When Wife 1.0 attaches itself to my BMW 3.23 programme it often crashes or runs the system dry. Wife 1.0 also has a rather annoying pop-up called Mother-in-Law, which can't be turned off. Recently I've attempted to try Mistress 2001, but there could be problems: a friend has alerted me to the fact that if Wife 1.0 detects the presence of Mistress 2001 it tends to delete all my MS Money files before un-installing itself. Please can you help me? -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Knowledge will forever govern ignorance, and a people who mean to be their own governors, must arm themselves with the power knowledge gives. A popular government without popular information or the means of acquiring it, is but a prologue to a farce or a tragedy or perhaps both." --- James Madison (Fourth President of the United States) -------------------------------------------------------------------------------------------------- 7610 From: Fernando Martins Date: Wed Jul 30, 2003 4:48pm Subject: Re: Upgrades Paths Try to run any version of Slave in linux ;> FM PS - some days ago i upgraded to WifeButStillSlave2003, in a fresh SCO unix without X, just in case she get too confident ... ----- Original Message ----- From: "James M. Atkinson" To: "TSCM-L Mailing List" Sent: Wednesday, July 30, 2003 8:06 PM Subject: [TSCM-L] Upgrades Paths > > Eighteen months ago I upgraded to Girlfriend 1.0 from Drinking Mates 4.2, > which I'd used for years without any trouble. However, there are apparently > conflicts between these two products and the only solution was to try and > run Girlfriend with the sound turned off. > > To make matters worse, Girlfriend 1.0 is also incompatible with several > other applications, such as Lads Night Out 3.1, Football 2 and Playboy 6.1. > > Successive versions of Girlfriend proved no better. A shareware > beta-programme, Party Girl 2.1, which I tried, had many bugs and left a > virus in my system, forcing me to shut down completely for several weeks. > > Eventually I tried to run Girlfriend 1.2 and Girlfriend 1.0 at the same > time, only to discover that when these two systems detected each other they > caused severe damage to my hardware. > > Sensing a way out, I then upgraded to FiancÈe 1.0 only to discover that this > product soon had to be upgraded (at great cost) to Wife 1.0, which I > reluctantly agreed to because, whilst Wife 1.0 tends to use up all my > available resources, it does come bundled with FreeSex Plus and Cleanhouse > 2000. > > Shortly after this upgrade however I then discovered that Wife1.0 can be > very unstable and costly to run. For example, any mistakes I made were > automatically stored in Wife 1.0's memory and could not be deleted. They > then resurfaced months later when I had forgotten about them. > > Wife 1.0 also has an automatic Diary Explorer and E-mail porn filter and > can, without warning, launch Photostrop and Whingezip! These latter products > have no help files and I have to try and guess what the problem is myself. > > Additional costly problems are that Wife 1.0 needs updating regularly, > requiring Shoe Shop Browser for new attachments and also Hairstyle Express > which needs to be reinstalled every other week. > > Wife 1.0 also spawns unwelcome child processing that also drains my > resources. It also conflicted with some of the new games I wanted to try, > stating that they are an illegal operation. > > When Wife 1.0 attaches itself to my BMW 3.23 programme it often crashes or > runs the system dry. Wife 1.0 also has a rather annoying pop-up called > Mother-in-Law, which can't be turned off. > > Recently I've attempted to try Mistress 2001, but there could be problems: a > friend has alerted me to the fact that if Wife 1.0 detects the presence of > Mistress 2001 it tends to delete all my MS Money files before un-installing > itself. > > Please can you help me? > > > -- > > -------------------------------------------------------------------------- ------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------- ------------------------ > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > -------------------------------------------------------------------------- ------------------------ > "Knowledge will forever govern ignorance, and a people who mean to be > their own governors, must arm themselves with the power knowledge > gives. A popular government without popular information or the means > of acquiring it, is but a prologue to a farce or a tragedy or perhaps both." > --- James Madison (Fourth President of the United States) > -------------------------------------------------------------------------- ------------------------ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 7611 From: Chalres P. Date: Thu Jul 31, 2003 0:14am Subject: AOR AR3000a on ebay I'm selling on ebay an AOR AR-3000a with an IBM PC for controllling it mounted in a halliburton case. http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=3038584125&category=4673&rd=1 (Free shipping if high bidder mentions the TSCM-L list.) Charles 7612 From: Van Date: Tue Jul 29, 2003 2:49pm Subject: Re: Re: 24/7 Audio and Video recording for an Automobile At 12:25 PM 7/29/2003, Steve Uhrig wrote: >Cellular is far too narrow bandwidth to dump any usable amount of video. >You can frame grab and dribble snapshots out across the >channel, but that won't do you much good and is not reliable. With only the greatest respect Mr. Uhrig, I must disagree on this one point. The current 1x-RTT deployment of Sprint USA's CDMA network (Sprint's "PCS Vision" network) offers adequate bandwidth for low-res surveillance. I currently run an 800Mhz PII laptop with Win2k (I know, I know... Linux is the next system upgrade) and running RealNetwork's "Helix" encoder, to push a live video stream out of the field and onto a server at home. The field HD only runs while the OS & apps boot up, then it goes to sleep and the stream is archived at the server. I currently feed the encoder (an Osprey-50 USB) off a camcorder, but there's nothing stopping me from replacing that with a straight NTSC CCD to eliminate the camcorder mechanicals too. Granted at a mere 40-60k upstream, I can only run a 180x120 stream @ ~10fps, and it's heavily compressed. So much so that owing to the variable delta compression of the Real codec, any motion (save for a slow pan) renders it useless. But I can stop anywhere, give the codec a few seconds to settle, and be streaming live from the field with a minimum of fault intolerance and power consumption. Not what most of you might consider professional resolution, but the devil isn't always in the details. I've started filming a number of political protests this way, and the result is showing promise. -Van 7613 From: Kutlin, Josh Date: Wed Jul 30, 2003 7:25am Subject: RE: using netstat to scan for open IRC channels I have seen quite a few hosted web servers use port forwarding lately. That is a normal web server that is supposed to run on port 80 or 8080.. is actually forwarded to another port such as 22 (ssh)or 6667 (irc)ect.... This is done for many reasons, mostly to hide or cloak the actual nature of the traffic either from the ISP as to not get billed for running a website, getting around firewall rules or evading software designed to track web surfing. To be sure that the "irc" traffic is in fact irc and not some other webpage or application that is using that port, get a sniffer and take a look at the actual traffic. I have had good luck with ethereal on a windows box. Good luck Josh -----Original Message----- From: Michael Puchol To: TSCM-L@yahoogroups.com Sent: 7/27/2003 4:32 AM Subject: Re: [TSCM-L] using netstat to scan for open IRC channels I've examined many zombies, eggdrops, etc. and they can be configured to run on any port in the host machine. Most decently-planted zombies will run on odd ports, or those belonging to other services, for example, ftp. So, while your advice is somewhat useful, it is by no means a method to check if you have been trojaned. Also, IRC servers use many ports in the 666x range, so your eggdrop doesn't have to connect using 6667 necessarily. Don't let netstat give you a false sense of security (while it IS a very useful tool). Cheers, Mike ----- Original Message ----- From: "frost_bitten_ca" To: Sent: Monday, July 21, 2003 4:52 PM Subject: [TSCM-L] using netstat to scan for open IRC channels > netstat -an | find ":6667" > > Open an MS-DOS Prompt window and type the command line above, then > press the "Enter" key. If a line resembling the one shown below is > NOT displayed, your computer does not have an open connection to an > IRC server running on the standard IRC port. If, however, you see > something like this: > > TCP 192.168.1.101:1026 70.13.215.89:6667 ESTABLISHED > > . . . then the only question remaining is how quickly you can > disconnect your PC from the Internet! > > A second and equally useful test can also be performed. Since IRC > servers generally require the presence of an "Ident" server on the > client machine, IRC clients almost always include a local "Ident > server" use to keep the remote IRC server happy. Every one of the > Zombie/Bots I have examined does this. Therefore, the detection of an > Ident server running in your machine would be another good cause for > alarm. To quickly check for an Ident server, type the following > command at an MS-DOS Prompt: > > netstat -an | find ":113 " > > As before, a blank line indicates that there is no Ident server > running on the default Ident port of "113". (Note the "space" after > the 113 and before the closing double-quote.) If, however, you see > something like this: > > TCP 0.0.0.0:113 0.0.0.0:0 LISTENING > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7614 From: Kohlenberg, Toby Date: Wed Jul 30, 2003 4:15pm Subject: RE: Upgrades Paths Clearly the author needs to look at open source/shareware solutions. While there are definite risks with sharing software like Wife 1.0 (or worse, 2.0, 3.0 or above), the shareware versions are much more compatible with most versions of Girlfriend or Mistress 2001. Of course because it is shareware, you have much less certainty that it isn't bringing along virii or worse, includes a backdoor that indiscriminantly lets anyone into your system... Clearly there are costs either way, you simply have to decide which model works best for you. toby > -----Original Message----- > From: James M. Atkinson [mailto:jmatk@tscm.com] > Sent: Wednesday, July 30, 2003 12:06 PM > To: TSCM-L Mailing List > Subject: [TSCM-L] Upgrades Paths > > > > Eighteen months ago I upgraded to Girlfriend 1.0 from > Drinking Mates 4.2, > which I'd used for years without any trouble. However, there > are apparently > conflicts between these two products and the only solution > was to try and > run Girlfriend with the sound turned off. > > To make matters worse, Girlfriend 1.0 is also incompatible > with several > other applications, such as Lads Night Out 3.1, Football 2 > and Playboy 6.1. > > Successive versions of Girlfriend proved no better. A shareware > beta-programme, Party Girl 2.1, which I tried, had many bugs > and left a > virus in my system, forcing me to shut down completely for > several weeks. > > Eventually I tried to run Girlfriend 1.2 and Girlfriend 1.0 > at the same > time, only to discover that when these two systems detected > each other they > caused severe damage to my hardware. > > Sensing a way out, I then upgraded to FiancÈe 1.0 only to > discover that this > product soon had to be upgraded (at great cost) to Wife 1.0, which I > reluctantly agreed to because, whilst Wife 1.0 tends to use up all my > available resources, it does come bundled with FreeSex Plus > and Cleanhouse > 2000. > > Shortly after this upgrade however I then discovered that > Wife1.0 can be > very unstable and costly to run. For example, any mistakes I made were > automatically stored in Wife 1.0's memory and could not be > deleted. They > then resurfaced months later when I had forgotten about them. > > Wife 1.0 also has an automatic Diary Explorer and E-mail porn > filter and > can, without warning, launch Photostrop and Whingezip! These > latter products > have no help files and I have to try and guess what the > problem is myself. > > Additional costly problems are that Wife 1.0 needs updating regularly, > requiring Shoe Shop Browser for new attachments and also > Hairstyle Express > which needs to be reinstalled every other week. > > Wife 1.0 also spawns unwelcome child processing that also drains my > resources. It also conflicted with some of the new games I > wanted to try, > stating that they are an illegal operation. > > When Wife 1.0 attaches itself to my BMW 3.23 programme it > often crashes or > runs the system dry. Wife 1.0 also has a rather annoying pop-up called > Mother-in-Law, which can't be turned off. > > Recently I've attempted to try Mistress 2001, but there could > be problems: a > friend has alerted me to the fact that if Wife 1.0 detects > the presence of > Mistress 2001 it tends to delete all my MS Money files before > un-installing > itself. > > Please can you help me? > > > -- > > -------------------------------------------------------------- > ------------------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------- > ------------------------------------ > James M. Atkinson Ph: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com > -------------------------------------------------------------- > ------------------------------------ > "Knowledge will forever govern ignorance, and a people who mean to be > their own governors, must arm themselves with the power knowledge > gives. A popular government without popular information or the means > of acquiring it, is but a prologue to a farce or a tragedy or > perhaps both." > --- James Madison (Fourth President of the United States) > -------------------------------------------------------------- > ------------------------------------ > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> > Free shipping on all inkjet cartridge & refill kit orders to > US & Canada. Low prices up to 80% off. We have your brand: > HP, Epson, Lexmark & more. > http://www.c1tracking.com/l.asp?cid=5510 > http://us.click.yahoo.com/GHXcIA/n.WGAA/ySSFAA/kgFolB/TM > -------------------------------------------------------------- > -------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > 7615 From: James M. Atkinson Date: Thu Jul 31, 2003 2:21pm Subject: General Note of Warning I am aware that several list members have been cheated by some of the TSCM equipment floating around E-Bay. Please, Please, Please ask around (at least on this list) before coughing up cash for sweep gear on E-Bay. A lot of the stuff is stolen, screwed up, blown up, or seller never actually had it to begin with. DO NOT buy from spy-shop Now, that said... I would like to thank some of the LEGITIMATE firms like SWS, Charles Paterson, Gordon Mitchell, and others who offer used equipment, at a reasonable price on E-Bay. If you deal with these gentlemen you will be happy, you will get more then you expected, and will be it at a good price, with no bull. If anybody on the list have gotten ripped off, I would encourage them to speak out to help others not get cheated. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Knowledge will forever govern ignorance, and a people who mean to be their own governors, must arm themselves with the power knowledge gives. A popular government without popular information or the means of acquiring it, is but a prologue to a farce or a tragedy or perhaps both." --- James Madison (Fourth President of the United States) -------------------------------------------------------------------------------------------------- 7616 From: Craig Meldrum Date: Thu Jul 31, 2003 4:12pm Subject: Warning It is with great reluctance that I feel the necessity to post the following information as a possible warning to other members of this forum. I recently, through this site, advertised some excess TSCM equipment I had for sale and it was purchased by Dan Grissom trading as Taylor Group of Downers Grove Il 60515. He gave me a Fedex account on which to ship the equipment which turned out (after shipping) to be a false or non existent account. I have therefore been landed with the, not inconsiderable, international freight costs. All subsequent attempts to contact Dan Grissom have been ignored. This is an industry where integrity is not only essential but should be expected without question and I certainly did not expect to find such a recalcitrant on this list. Having given Dan Grissom several opportunites to fix this problem without result, I resorted to this naming as a last resort and on the advice of a prominent member of the list. If as a consequence he comes to his senses and does the right thing I will be more than happy to publicise that and withdraw this warning. Thank you all for your tolerance. Craig Meldrum =============================== Craig Meldrum, Managing Director Communications Security Ltd PO Box 8314, Symonds St Auckland, New Zealand Ph: 64-9-3093386 Fax: 64-9-3021148 =============================== 7617 From: Steve Uhrig Date: Thu Jul 31, 2003 11:43pm Subject: Busted covert video sys FS Hi all, I have a wireless video package I took in on trade from a police department which needs work. It is a working, very decent quality clock radio with a video camera and 2.4 gig transmitter and antenna installed in it. It's not a bad job but it's not excellent. I did NOT build the thing. The camera is bad and I don't feel like making the investment in a camera or my time to replace it. There's plenty of room, camera mounts with hot melt glue, and any board camera, color or B&W will work. 12 volts is available. The transmitter is working properly and has typical RF output. I don't have any convenient way to measure it, but on a spectrum analyzer it's as loud as a standard off the shelf Wavecom-type transmitter. No documentation is included, and none really is needed. The power supply was beefed up to handle the additional load of the camera and transmitter. A channel selector switch sticks down into the clock's original 9 volt backup battery compartment. Some plastic was machined away to allow the transmitter to fit snugly into a recess in the chassis. The antenna is mounted behind invisible IR plastic which covers the front panel of the radio. The camera looks through this IR plastic too. The only mod from standard Wavecom is something done to let the transmitter power up on the last selected (of 4) channels. Most of these things default to channel 1 on power up, The receiver is a standard 4 channel Wavecom-style standalone receiver with composite video out. Audio capability is not included. Package is transmitter and receiver, set up for 110 VAC mains and NTSC video. The camera needs replacing. Screws holding the plastic chassis together are Torx (tamper resistant, or used to be), so you will need a set of them to open it up. If anyone wants it, it's yours for a hundred dollars, and I'll ship anywhere in the world. Can take any credit card. I can include a decent B&W board camera for $25 additional if purchaser so desires. Camera not available separately. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7618 From: Steve Uhrig Date: Thu Jul 31, 2003 11:50pm Subject: 2.4 video frequencies About once a week I get an email from someone wanting the 4 standard 2,4 gig video channels such as are used in Wavecoms. These 4 are standard throughout the industry. Make a note of these: Channel 12433.75 megacycles Channel 22452.75 megacycles Channel 32472.75 megacycles Channel 42410.75 megacycles Yes, the frequencies are not ascending. No, you can't add a pot or capacitor to change the frequencies. Frequencies are burned into a ROM. Channel 1 is by far the most common frequency used, as most of the Wavecom-generation devices power up on channel 1. You don't need to be exactly on frequency to copy the things with most equipment other than high end stuff. If you're within 5 megs or so you'll see a picture. If you're within 15 megs, you'll see a raster, enough to know there's a transmitter on the air. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7619 From: James M. Atkinson Date: Fri Aug 1, 2003 0:19pm Subject: New type of material for TSCM Equipment The National Research Council (NRC) has recently announced the discovery of the heaviest chemical element yet known to science. The new element has been tentatively named Governmentium. Governmentium has 1 neutron, 12 assistant neutrons, 75 deputy neutrons, and 224 assistant deputy neutrons, giving it an atomic mass of 312. These 312 particles are held together by forces called morons, which are surrounded by vast quantities of lepton-like particles called peons. Since Governmentium has no electrons, it is inert. However it can be detected as it impedes every reaction with which it comes into contact. A minute amount of Governmentium causes one reaction to take over 4 days to complete when it would normally take less than a second. Governmentium has a normal half-life of 3 years; it does not decay, but instead undergoes a reorganization in which a portion of the assistant neutrons and deputy neutrons exchange places. In fact, Governmentium's mass will actually increase over time, since each reorganization will cause some morons to become neutrons, forming isodopes. This characteristic of moron-promotion leads some scientists to speculate that Governmentium is formed whenever morons reach a certain quantity in concentration. This hypothetical quantity is referred to as Critical Morass. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Knowledge will forever govern ignorance, and a people who mean to be their own governors, must arm themselves with the power knowledge gives. A popular government without popular information or the means of acquiring it, is but a prologue to a farce or a tragedy or perhaps both." --- James Madison (Fourth President of the United States) -------------------------------------------------------------------------------------------------- 7620 From: Mitch D Date: Fri Aug 1, 2003 1:36pm Subject: Homeland SecurityCD Was curious if anyone on the list has purchased the Homeland Security CD from FEDLEADS,if you have I was wondering if it was worth the 99 bucks,or is it another compilation of links etc. Thanks! Mitch __________________________________ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com 7621 From: Date: Sun Aug 3, 2003 11:51am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7622 From: Date: Sun Aug 3, 2003 11:51am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. From: Date: Tue Jul 25, 2000 10:51pm Subject: Re: Former DOE Intelligence Chief Blasts FBI's Investigation Into Stolen Nuclear Secrets The wholesale dissemination of nuclear secrets to China is a disgrace that every American citizen must bear responsibility for. Never in peacetime has such negligent guarding of our nations defense capabilities been exposed to prying eyes ,thus perhaps endangering the lives of future generations. The only good,that can come forth from this episode of malfeasance,is the impetus it will provide to America's Star War' s missile defense capabilties. Loral and Hughes corporatons should be enjoined from furher defense contracts, and those officials at the responsible agencies must be replaced forthright. Although the horse is ,already,out of the barn,we must now work to build a stronger gatekeeper structure.Fortunately ,much technology becomes obsolete before it's utilization. HAVE A GREAT DAY !!! [Non-text portions of this message have been removed] 993 From: Steve Uhrig Date: Wed Jul 26, 2000 7:18am Subject: Re: Former DOE Intelligence Chief Blasts FBI's Investigation Into Stolen Nuclear Secrets Once upon a midnight dreary, patedwards@w... pondered, weak and weary: > The wholesale dissemination of nuclear > secrets to China is a disgrace that every American > citizen must bear responsibility for Why must I bear any responsibility? I did not elect or appoint anyone involved. I did not write policy, or security procedures or anything like that. I am not involved in any way. If I had been, from the beginning, with sufficient authority, all these news stories you see would be about sports and your kid's birthday party, not felony ignorance and treason. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 994 From: A Grudko Date: Wed Jul 26, 2000 5:45am Subject: Re: Carrier current Some 'back to basics' thoughts from deepest darkest Africa. Our "Carrier current" threat comes mostly from what we refer to as Mains Modulation, but it does not have to be just the electrical mains; it is also the method of introducing signals into a cable already carrying some other current e.g. telephone, intercom, cctv, data, using suitable filters both ends... The first application of this I was aware of was a 'wireless' mains intercom. The carrier was 180khz or so, FM modulated some 25 years ago. Short range (maybe a 500m if lucky) and dependant on the phase, with plenty of 50 Hz humm in the background. Many large buildings here run the current over 3 phases to split the load, with it possible for a room with 3 wall sockets to have each on a different phase, meaning each must be tested. Every device of this type that I have seen operates under 5 Mhz but I recognise that there is no reason to think that the Fq. is not 100 times that. I am confident that my equipment will detect a signal over 1 Gig. but demodulation for identification and location is another issue. My CPM 700 came with a high pass mains filter which certainly works will on FM modulation, reduced sensitivity on AM. I doubt it would help much with more exotic modulation other than to show a 'silent' signal. For my Scanlock, which at least offers AM, FM & Sub Carrier) I took a plastic box, not metal, (safety reasons - insulation) with a rotary switch to select Live to N, L to gnd, N to gnd. Each feeds via a cap/safety resistor into 3 toroid cores with primary windings of different amount of turns - 100t on the large one, 20t on the medium 5t on the small of different sizes to cope with 3 bands, this arrangement provides 1. mains isolation, 2. the ability to have different filters/amplifiers per band 3. some local Lightning strike or spike protection of the equipment I have to admit that to detect exotic modulation we thereafter rely on experience and good old 'Eyes and ears' - reading the 'scope and listening to the signal. In 20 years I've only picked up one professional hostle device (we never found the receiver!), but lots of harmless intercoms, baby monitors and more recently, 'wireless' amplified hi-fi speakers, all of which could be used as simple bugs. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia Israel - www.grudko.com. - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 Members of : SCIP (Gauteng Chairman), SACI (President), GIN (Charter), WAD, CALI, SASFed, SASA, SAMLF, UKPIN, AFIO (OS),IWWF, PRETrust --- "When you need it done right - first time" --- 995 From: David Miller Date: Wed Jul 26, 2000 7:48am Subject: RE: Re: Former DOE Intelligence Chief Blasts FBI's Inves tigation Into Stolen Nuclear Secrets -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent:Wednesday, July 26, 2000 7:19 AM To:TSCM-L@egroups.com Subject:[TSCM-L] Re: Former DOE Intelligence Chief Blasts FBI's Investigation Into Stolen Nuclear Secrets Snip>> If I had been, from the beginning, with sufficient authority, all these news stories you see would be about sports and your kid's birthday party, not felony ignorance and treason.<< Surely, Steve, you are not proposing a less than open society/open press? [Non-text portions of this message have been removed] 996 From: Jay Coote Date: Wed Jul 26, 2000 11:51am Subject: Re: Re: Carrier current Andy and the list; Good points on Mains or Carrier-Current. I forgot about "wireless" speakers. A few ramblings- A few years back, I was doing some hobby monitoring in the VLF-LF bands. I stumbled across a strong 200-Khz FM signal which was a neighbors wireless intercom. It sounded as though the neighbor had installed the device in his kitchen so that he could bark at his wife (to bring him beer, no doubt), or monitor her kitchen activities. The intercom did not last a long time, no doubt an "accident" such as a prolonged immersion in dish water by the "subject"...? The interesting thing is I was able to monitor this carrier current signal with an active whip antenna and VLF upconvertor. No connection to the power lines. Of course the best CC or Mains detection practice is connection to the conductor, but it may be possible to hear these without direct connection. Jay Coote Los Angeles ---------- > Some 'back to basics' thoughts from deepest darkest Africa. > > Our "Carrier current" threat comes mostly from what we refer to as Mains > Modulation, but it does not have to be just the electrical mains; it is also > the method of introducing signals into a cable already carrying > some other current e.g. telephone, intercom, cctv, data, using suitable > filters both ends... > > The first application of this I was aware of was a 'wireless' mains > intercom. > The carrier was 180khz or so, FM modulated some 25 years ago. Short range > (maybe a 500m if lucky) and dependant on the phase, with plenty of 50 Hz > humm in the background. > > Many large buildings here run the current over 3 phases to split the load, > with it possible for a room with 3 wall sockets to have each on a different > phase, meaning each must be tested. > > Every device of this type that I have seen operates under 5 Mhz but I > recognise that there is no reason to think that the Fq. is not 100 times > that. I am confident that my equipment will detect a signal over 1 Gig. but > demodulation for identification and location is another issue. > > My CPM 700 came with a high pass mains filter which certainly works will on > FM modulation, reduced sensitivity on AM. I doubt it would help much with > more exotic modulation other than to show a 'silent' signal. > > For my Scanlock, which at least offers AM, FM & Sub Carrier) I took a > plastic box, not metal, (safety reasons - insulation) with a rotary switch > to select Live to N, L to gnd, N to gnd. > Each feeds via a cap/safety resistor into 3 toroid cores with primary > windings of different amount of turns - 100t on the large one, 20t on the > medium 5t on the small of different sizes to cope with 3 bands, this > arrangement provides > > 1. mains isolation, > 2. the ability to have different filters/amplifiers per band > 3. some local Lightning strike or spike protection of the equipment > > I have to admit that to detect exotic modulation we thereafter rely on > experience and good old 'Eyes and ears' - reading the 'scope and listening > to the signal. > > In 20 years I've only picked up one professional hostle device (we never > found the receiver!), but lots of harmless intercoms, baby monitors and more > recently, 'wireless' amplified hi-fi speakers, all of which could be used as > simple bugs. > > > Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime > investigation & intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia > Israel - www.grudko.com. - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 > Members of : SCIP (Gauteng Chairman), SACI (President), GIN (Charter), WAD, > CALI, SASFed, SASA, SAMLF, UKPIN, AFIO (OS),IWWF, PRETrust > --- "When you need it done right - first time" --- > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 997 From: James M. Atkinson, Comm-Eng Date: Wed Jul 26, 2000 0:33pm Subject: Re: Re: Carrier current I start my VLF inspection by first testing the outlet with a Neon Bulb Tester (the kind you buy at the hardware store for ten bucks). This tells me if the polarization correct. I then use a small plastic box with a rotary switch in it. The input to the box is an IEC connector, into which I can plug in a simple power cable, or a cable with alligator clips (in the case of a breaker panel or switch). I then use a DVM to read the voltage present on each of the conductor relative to each other. I then use a 200 MHz bandwidth O'Scope to view any modulated signals present on any conductor combination to ensure that their nothing on the line other then the 60 Hz signal. I then dump the conductors into a variety of filters, amps and demodulators (such as an SCD-5) for a quick test. Once I am done with that I feel "safe" in coupling a lab grade spectrum analyzer up to the line and poking around until I am satisfied that the outlet is reasonably clean. Of course I also perform a physical inspection with a bore scope, and document the wiring colors, wire guages, and so on. It takes me about 10-15 minutes to check a single outlet (working from a cart), and that assumes that everything is normal (hollow wall cavity, no wall box, steel screw studs, and that all I have to do is remove the plate). When I find an open ground, or reversed polarity I of course mention it in my report, and flag it as an action item for the next sweep. I also use an active directional loop antenna when I am doing the off site RF inspection, as this has proven valuable with detecting low powered VLF devices at a distance. But of course I still prefer to check the line with a hard wired connection. In some cases I also perform a TDR inspection of the AC wiring, but only in certain cases (as you have to design the wiring in a certain way to facilitate an effective power line TDR inspection) -jma At 12:56 PM -0400 7/26/00, Jay Coote wrote: >Andy and the list; >Good points on Mains or Carrier-Current. >I forgot about "wireless" speakers. >A few ramblings- >A few years back, I was doing some hobby monitoring in >the VLF-LF bands. I stumbled across a strong 200-Khz FM >signal which was a neighbors wireless intercom. >It sounded as though the neighbor had installed the >device in his kitchen so that he could bark at his wife >(to bring him beer, no doubt), or monitor her kitchen activities. >The intercom did not last a long time, no doubt an "accident" > such as a prolonged immersion in dish water by the "subject"...? > >The interesting thing is I was able to monitor this >carrier current signal with an active whip antenna and VLF upconvertor. >No connection to the power lines. >Of course the best CC or Mains detection practice is >connection to the conductor, but it may be possible >to hear these without direct connection. >Jay Coote >Los Angeles >---------- > > Some 'back to basics' thoughts from deepest darkest Africa. > > > > Our "Carrier current" threat comes mostly from what we refer to as Mains > > Modulation, but it does not have to be just the electrical mains; >it is also > > the method of introducing signals into a cable already carrying > > some other current e.g. telephone, intercom, cctv, data, using suitable > > filters both ends... > > > > The first application of this I was aware of was a 'wireless' mains > > intercom. > > The carrier was 180khz or so, FM modulated some 25 years ago. Short range > > (maybe a 500m if lucky) and dependant on the phase, with plenty of 50 Hz > > humm in the background. > > > > Many large buildings here run the current over 3 phases to split the load, > > with it possible for a room with 3 wall sockets to have each on a different > > phase, meaning each must be tested. > > > > Every device of this type that I have seen operates under 5 Mhz but I > > recognise that there is no reason to think that the Fq. is not 100 times > > that. I am confident that my equipment will detect a signal over 1 Gig. but > > demodulation for identification and location is another issue. > > > > My CPM 700 came with a high pass mains filter which certainly works will on > > FM modulation, reduced sensitivity on AM. I doubt it would help much with > > more exotic modulation other than to show a 'silent' signal. > > > > For my Scanlock, which at least offers AM, FM & Sub Carrier) I took a > > plastic box, not metal, (safety reasons - insulation) with a rotary switch > > to select Live to N, L to gnd, N to gnd. > > Each feeds via a cap/safety resistor into 3 toroid cores with primary > > windings of different amount of turns - 100t on the large one, 20t on the > > medium 5t on the small of different sizes to cope with 3 bands, this > > arrangement provides > > > > 1. mains isolation, > > 2. the ability to have different filters/amplifiers per band > > 3. some local Lightning strike or spike protection of the equipment > > > > I have to admit that to detect exotic modulation we thereafter rely on > > experience and good old 'Eyes and ears' - reading the 'scope and listening > > to the signal. > > > > In 20 years I've only picked up one professional hostle device (we never > > found the receiver!), but lots of harmless intercoms, baby >monitors and more > > recently, 'wireless' amplified hi-fi speakers, all of which could >be used as > > simple bugs. > > > > > > Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime > > investigation & intelligence > > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada >- Australia > > Israel - www.grudko.com. - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 > > Members of : SCIP (Gauteng Chairman), SACI (President), GIN (Charter), WAD, > > CALI, SASFed, SASA, SAMLF, UKPIN, AFIO (OS),IWWF, PRETrust > > --- "When you need it done right - first time" --- > > > > =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 998 From: Charles Patterson Date: Wed Jul 26, 2000 10:21am Subject: Re: Re: Carrier current I've found some of the carrier current telephone line extensions (Radio Shack, RCA and others) to be up in the 2-3 Mhz range. charles ----- Original Message ----- From: "Jay Coote" To: Sent: Wednesday, July 26, 2000 12:52 PM Subject: Re: [TSCM-L] Re: Carrier current > > Andy and the list; > Good points on Mains or Carrier-Current. > I forgot about "wireless" speakers. > A few ramblings- > A few years back, I was doing some hobby monitoring in > the VLF-LF bands. I stumbled across a strong 200-Khz FM > signal which was a neighbors wireless intercom. > It sounded as though the neighbor had installed the > device in his kitchen so that he could bark at his wife > (to bring him beer, no doubt), or monitor her kitchen activities. > The intercom did not last a long time, no doubt an "accident" > such as a prolonged immersion in dish water by the "subject"...? > > The interesting thing is I was able to monitor this > carrier current signal with an active whip antenna and VLF upconvertor. > No connection to the power lines. > Of course the best CC or Mains detection practice is > connection to the conductor, but it may be possible > to hear these without direct connection. > Jay Coote > Los Angeles > ---------- > > Some 'back to basics' thoughts from deepest darkest Africa. > > > > Our "Carrier current" threat comes mostly from what we refer to as Mains > > Modulation, but it does not have to be just the electrical mains; it is also > > the method of introducing signals into a cable already carrying > > some other current e.g. telephone, intercom, cctv, data, using suitable > > filters both ends... > > > > The first application of this I was aware of was a 'wireless' mains > > intercom. > > The carrier was 180khz or so, FM modulated some 25 years ago. Short range > > (maybe a 500m if lucky) and dependant on the phase, with plenty of 50 Hz > > humm in the background. > > > > Many large buildings here run the current over 3 phases to split the load, > > with it possible for a room with 3 wall sockets to have each on a different > > phase, meaning each must be tested. > > > > Every device of this type that I have seen operates under 5 Mhz but I > > recognise that there is no reason to think that the Fq. is not 100 times > > that. I am confident that my equipment will detect a signal over 1 Gig. but > > demodulation for identification and location is another issue. > > > > My CPM 700 came with a high pass mains filter which certainly works will on > > FM modulation, reduced sensitivity on AM. I doubt it would help much with > > more exotic modulation other than to show a 'silent' signal. > > > > For my Scanlock, which at least offers AM, FM & Sub Carrier) I took a > > plastic box, not metal, (safety reasons - insulation) with a rotary switch > > to select Live to N, L to gnd, N to gnd. > > Each feeds via a cap/safety resistor into 3 toroid cores with primary > > windings of different amount of turns - 100t on the large one, 20t on the > > medium 5t on the small of different sizes to cope with 3 bands, this > > arrangement provides > > > > 1. mains isolation, > > 2. the ability to have different filters/amplifiers per band > > 3. some local Lightning strike or spike protection of the equipment > > > > I have to admit that to detect exotic modulation we thereafter rely on > > experience and good old 'Eyes and ears' - reading the 'scope and listening > > to the signal. > > > > In 20 years I've only picked up one professional hostle device (we never > > found the receiver!), but lots of harmless intercoms, baby monitors and more > > recently, 'wireless' amplified hi-fi speakers, all of which could be used as > > simple bugs. > > > > > > Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime > > investigation & intelligence > > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia > > Israel - www.grudko.com. - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 > > Members of : SCIP (Gauteng Chairman), SACI (President), GIN (Charter), WAD, > > CALI, SASFed, SASA, SAMLF, UKPIN, AFIO (OS),IWWF, PRETrust > > --- "When you need it done right - first time" --- > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 999 From: Date: Wed Jul 26, 2000 1:34pm Subject: Re: Rumblings and Mumblings Update re IBD article. Jim; feel free to post article if you have a copy. i am sure that the list readers would be interested.Thanks! HAVE A GREAT DAY !!! [Non-text portions of this message have been removed] 1000 From: James M. Atkinson, Comm-Eng Date: Wed Jul 26, 2000 11:42pm Subject: Bug Sweep FAQ (revisited) Ok, I now have now collected a total of 88 question that commonly float to me. If you have any similar questions you would like to add then please sent them to me privately. I am pushing for over 100 questions in the FAQ list, but want to keep in restricted to TSCM related questions, etc. I plan to answer each of the questions with o one or two paragraph on each of them. The final FAQ will be posted on my website later this Fall (as time provides). -jma Bug Sweep FAQ version 26 July 2000 1. How common is bugging, wire taping, and related eavesdropping. 2. How hard is it for someone to bug a telephone 3. I have noticed for awhile that my phone has been clicking as if someone has been picking up the receiver. One day I picked up the phone while it makes this clicking noise and there was no dial tone. I did this a few times have been able to do the same thing. Is this a sign of some sort of phone tapping? What can I do? 4. I was told by a friend that if you called this phone # (xxx) xxx-xxxx it was used by corporations to check phone lines. I was told that if you get a clear tone, your phone was not bugged. Ever heard of this?? 5. Back in the sixties I remember reading about a special number you could call that would tell you if your phone was bugged. Is there a special 800 number that I can call that will tell me if my phone is bugged. 6. What is an Infinity Transmitter or Harmonica Bug 7. How much would it cost to check my phone for bugs 8. I am certain that my spouse of 20 yrs is having an affair. How do I tap is cell phone? Is it possible? And is it legal? 9. How much would it cost to check my office or home for bugs 10. How do I contact someone in my area to arrange to do a bug sweep for me 11. I was wondering how you can tell if your phone is tapped. Every time I call someone it calls my house back with a series of loud pulses. Also it will call my house for no reason with those same series of beeps. what do you think 12. The only realistic way to tell if your phone is taped is to engage a TSCM person to check it out for you. 13. I would like to buy a telephone eavesdropping device, how much would you charge 14. I would like to buy a tracking device so I can follow where my ex-girlfriend is going at night. 15. I would like to eavesdrop on my boyfriend's cellular telephone and would like to know if it is legal, and how can I do it. 16. I am up for a salary increase and I want to bug my boss's office, what can I buy to do this.. 17. Are Cellular Telephones secure 18. Are PCS Telephones secure 19. Are GSM telephones secure 20. Are Cordless Phones secure 21. Are Pagers and Beepers secure 22. Why should I always turn my cellular telephone off when I am not specifically making or expecting a phone call. 23. What are the more common ways that someone can follow my vehicle 24. I want to buy a small amount of inexpensive equipment so I can perform by own bug sweeps, what do you recommend. 25. I am a private investigator (or security consultant) and would like to start offer bug sweep services to my clients. What kind of equipment can I buy for less then $500.00 can I buy so I can make $250.00 per hour or more. 26. I work for a company and we are interested in obtain some basic equipment to provide an in-house TSCM capability. What kind of equipment should we start with, and is it a good idea to perform our own sweep0s instead of using an outside firm. 27. I am a bodyguard or executive protection specialist and would like to add a limited bug sweep capabilities to my protective detail and support functions. 28. Do you have any info on building your own FM transmitter that enables you to transmit a voice further than 300ft? 29. I have talked to a number of people through email and then follow-up telephone conversations. These people indicate that there is the existence of a communication system that, as hard as it is to believe, can transmit information directly to the human body. It has variously been termed energy directed audiograms, mental telepathy system, artificial intelligence network, and remote viewing. 30. I am a government guinea pig under the influence of bioelectronics, radio and microwaves radiation, ultrasonic bombardment and electronic destruction of memory and intense mid control. 31. Should I can the FBI if I think that I have found a bug 32. Should I call the FBI if I think I am bugged, or that a microphone has been implanted inside my body. 33. I recently hired a person to check my office for bugs, and all he needed was 15 minutes inside my office, and said there where no bugs. Does this sound legitimate? He only charged by $500 and had only a briefcase with some kind of gizmo in it. 34. The TSCM who was sweeping my office for bugs with some kind of handheld box found a bug taped underneath my metal desk. It was a small circuit board with a 9 volt battery, and he told me the spies where several miles away. He told me that if I want to keep this from happening again that I have to hire his company to sweep my office every two weeks. 35. I would like to buy a phone scrambler, can you help me. 36. I am hearing voices beamed to my by the CIA who is operating under the authority of the mind control courts headquartered at area 51. To this day I hear the voices in my head and I 100% believe the voices to come from an intelligence agency. They are using some sort of technology to beam messages into my mind 37. Someone is harassing me by beaming microwave and/or Ultrasonic energy at me, I am having really bad headaches, my teeth hurt, and I can not sleep. 38. Can you send me a hardcopy catalog of eavesdropping equipment 39. Several phone trucks were seen down the block. my phone seems to have a delay and echo in it, my scanners are not working, and there is a shadow going by the back window 40. I was wondering about the range of the VHF crystal controlled mini bug being advertised in magazines, which boast a 1/2 mile range. Do they really give a 1/2 mile range under normal conditions? What kind of range should I expect in a residential area? 41. Have you ever came across the type of bug the soviets used away back to eavesdrop on the US embassy in Moscow. The whole thing used no power, it depended on excitation from microwaves to resonate it, the resonant cavity was constructed as such to allow voice frequency sound to modulate it resonant frequency. What they would do was beam a signal at it and have the thing tuned just slightly off of resonance and then pick up its "new" reflected and modulated signal at another location. 42. I was wondering where does one buy the bugs. 43. I would like to obtain plans to build some bugs, can you please send me some designs. 44. Is PGP a good email encryption program? 45. Is there any way to make cordless phones more secure? 46. I would like to buy a scrambled telephone, which is the best on to buy. 47. I have been experiencing a constant non-directional tone in two-different indoor locations within a couple of miles of each other. The tone I would guess at being about 1500 Hz and it only lasts for about 30 seconds to a minute. Any suggestions you have on this would be much appreciated as I have now dismissed this as a one-off. Thank you very much, I hope you can suggest what this could be. 48. I am interested in the bumper beeper thing I saw in a movie, and need to purchase equipment immediately serious inquiry... thanks for reply soon... 49. if REMOBS can be detected and if so by which method. 50. Is there any books or manual available that show Hookswitch bypass methods and modifications? 51. Is there an easy way to determine whether a home is being subjected to electron eavesdropping. I need to determine this before going to the authorities with an accusation. Is there an equipment item that can be easily used to detect electronic surveillance? The situation is real and I am not paranoid. I do not want to contact the sheriff with an accusation that is unfounded. Can you help me by providing information about such equipment? 52. Can you suggest a source for the ultrasonic devices or jammers that can thwart microphones? 53. Are there any pocket-sized detectors that can alert one to the presence of a tape recorder's? 54. I bought a voice scrambler for a thousand dollars, but people are still able to hear the things I say over my cordless telephone, what is wrong. 55. I just bought one of those fancy 2.4 GHz spread spectrum telephone but I think my neighbor can still eavesdrop on the signal, is this possible? 56. The sales person at the cellular telephone place told me that people can not eavesdrop on the new telephones, is this correct, and if not why is the guy lying to me. 57. What percentage of sweeps actually turn up anything 58. If you perform a bug sweep how can you be sure the area is 100% free of bugs? What kind of assurances can you give. 59. Any recommendations on constructing a true faraday cage or bug proof room? 60. We are looking for an employee engaging in illegal eavesdropping who will probably use cheap radio Shack or Spy Shop type of transmitters. What equipment would suggest to detect this type of device at several feet, assuming that there is not much background noise? The equipment would need to be suitable for people with a non-technical background to use, and operate with little or no training. 61. Our company has provided a bug in their own Boardroom. It is a wireless microphone that is part of a speakerphone. When they use it, they set it on the table and turn it on. When not is use, it is then plugged into the charger. I've turned the thing over and looked on the bottom. There is a label which say 174 240, and sure enough that is the frequency I can pick up on my scanner. I found out that for some reason they never turn the transmitter off, and that I can pick up the signal 24 hours a day from outside the building. How many companies have a problem like this, and what can I do to point out how dangerous this situation is. 62. Do those $50 boxes you hook into your phone line to detect a tap really work? 63. We have a U.S. Robotics speakerphone in our conference room, and when we use it nobody can use their cellular telephone or receive a pager signal in the same room. However, if we walk about 10 feet away the equipment starts to work. Is it possible that our conference room is bugged? 64. I'm doing research paper for a class on security and such and this particular area seemed to intrigue me the most. I've run across references to the Van Eck experiments aired on BBC television back around 1990 and how the various alphabet agencies in the US didn't quite like this demonstration.... but for the most part, I find very little information about a topic 65. How much does a working telephone bug cost, and how does it work? 66. My instincts tell me something is wrong, should I look more carefully or is this just my imagination? 67. Should I trust long time employees? 68. If I think I am surveilled should I call the authorities? 69. What kind of response should I expect if I call the authorities? 70. What kind of potential problems or damage could being surveilled pose for me? 71. How do I prevent this sort of thing? 72. Do I have any legal recourse if tapping is discovered? (Before you answer remember the way the authorities react) 73. Should I tell anyone else before I call a TSCM expert? 74. How do I convince my banker that I need to spend this much based on a suspicion? 75. What do I do if I catch someone in the process of bugging my place? 76. Why should anyone want to bug a small business anyway? 77. I need to know how to tap or scan into a phone line...i prefer to somehow use a scanner but how does this works. This is a ASAP project and I've got a lot on the like...marriage...so if you could please give me some instruction or some type of direction it would be greatly appreciated 78. I need to learn how to get into a phone line...I want to maybe use a scanner but I don't know if this is possible it needs to be done remotely though. Please help my marriage is at stake. 79. What kind of equipment do you use to find bugs? 80. How long does it legitimately take to find a bug if one is there 81. How often should I have an area checked for bugs 82. Why is it important to consider physical security prior to having a bug sweep performed. 83. Can my copy machine be bugged, and how would you find such a bug. 84. Can my computer be bugged, and how would you find such a bug. 85. Is there anything I can do while designing or building a facility to make it more difficult for an eavesdropper to install a bug? 86. I have an office in Anchorage Alaska, Do you have a list of TSCM firm in my area that you can recommend. 87. We would like for you to come to our office in Chicago and spend several days there working with us to close up some of the holes we have that could facilitate an eavesdropping being installed. What would a service like this be called, and how many days would you need to spend here? 88. I am the security director for a publicly traded company near Boston. We would like to have a 3500 area in the executive area checked for bugging devices. What should we do to start the ball rolling for a TSCM program for our company. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== [Non-text portions of this message have been removed] 1001 From: James M. Atkinson, Comm-Eng Date: Thu Jul 27, 2000 10:17am Subject: Police worker on porn charge was 'MI6' (TSCM'er) officer Police worker on porn charge was 'MI6' officer http://www.the-journal.co.uk/cfm/newsstory.cfm?StoryId=194592 MI6 expert: Alan Coates. A NORTH-EAST senior police worker who claims he was set up on child pornography charges after carrying out "sensitive" internal work within his headquarters is a former MI6 surveillance expert, a court heard yesterday. Alan Coates is standing trial at Newcastle Crown Court charged with downloading pornography on to an office computer at Cleveland Police headquarters in Middlesbrough. The 52-year-old has denied the charges, claiming the images were planted on his computer because he was too involved in major internal inquiries at Cleveland Police including the ongoing controversial Operation Lancet. He claims others in the force believed he was learning too much about the investigations he was covertly working on. A jury has already heard former assistant chief constable David Earnshaw admit Coates was enlisted behind the backs of his superiors to help tap internal telephones at the police HQ. He was also used to check rooms for bugs before important Operation Lancet briefings and had been told to "sweep" the Crown Prosecution Service office in Middlesbrough. Coates, of Bishop Auckland, County Durham, was arrested on suspicion of making indecent images of children, after arriving back in Britain from a work trip to Berlin, and was later charged with 15 counts. Shortly before he was due to take the stand, an agreed statement detailing his past career was read to the court by defence barrister Beatrice Bolton. It revealed how Coates had joined the Army in 1967 and later in 1974, while posted to Germany, had worked with American Special Forces soldiers. He later joined the Royal Signals Corp where he specialised in surveillance and counter-surveillance for various Government departments. He was later discharged with good conduct and long service medals before joining MI6 where he was posted abroad. After leaving the secret service he worked in America as a surveillance expert and spent time with the US Board of Control before returning to England. After taking the stand, Coates told the jury he believed the pornographic material had been planted on the computers and discs but could not pinpoint who could have been responsible. He told the court: "Cleveland Police was split into three distinct camps with those who supported Ray Mallon and other officers, those very much against him and those with no firm opinion either way. "One senior officer once approached me and asked if I had bugged his office. It was a very, very uncomfortable atmosphere. "People may reasonably have thought I knew more than I did or was about to discover something. "There are several ways I could hide material on a computer and if I had put anything on a computer of the nature of these images it would have been very well hidden indeed. "Someone got in and tampered with the files on my computer." The hearing was adjourned and the jury is expected to be sent out tomorrow afternoon. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1002 From: James M. Atkinson, Comm-Eng Date: Thu Jul 27, 2000 10:58am Subject: ELF/VLF Transmission Systems For those list TSCM-L members who don't see the value of performing TSCM ELF/VLF inspections below 100 kHz. Remember... anything that appears on the conductors is of significant interest to us. -jma ----------------------------- Designing the Giant Antennas Synopsis of a presentation by Boynton Hagaman At the April 2000 AMRAD Meeting Thanks to AMRAD for granting permission to post this document. The career of Boynton Hagaman, AA4QY, spans many years and has had many interesting turns. He is an engineer, designer and builder of some remarkable antennas. These include the Trideco antenna used by NSS, Annapolis, Maryland, the antennas used by NAA, Culter, Maine and many others. His talk encompassed a period of three decades, spanning the time period from the end of the 1950s through the Cold War and until today. This is a story of the giant antennas unique in their own right, and rare. There are a decreasing number of opportunities to see giant antennas. International broadcast stations used them, for example, the Voice of America transmitting stations. HF antennas are conventional in many ways because they operate at reasonable wavelengths. Not so conventional are the giants used to send signals at just a few kilohertz in the very low frequency band that ranges from 3 to 30 kilohertz. Wavelengths here are measured in the thousands of meters, making it difficult to design an efficient antenna. These antennas are extremely sharp and their bandwidth at resonance is very narrow. It is so narrow, in fact, that one experimenter actually used this sharpness as an SSB filter to eliminate an unwanted sideband from a double-sideband AM signal. The antennas we heard about at the AMRAD meeting all operate in the band between 10 and 30 kilohertz and are used by the US Navy for one-way transmission to submerged submarines. In the early 1960s, Lester Carr, Hagaman and a few associates formed a company called DECO, short for Development Engineering Co. At about the same time, a partner, Jim Weldon, started Continental Electronics, a company in Dallas Texas that manufactures high power medium, short-wave and VLF transmitters. At that time the Navy wanted to upgrade their VLF transmitting capability, which included stations located in different geographical locations to achieve worldwide coverage. Each station sent continuous coded traffic using a narrow form of frequency-shift keying of a few Hertz wide. This allowed submerged submarines to receive slow speed commands while remaining submerged. Earlier, RCA built a station in this chain at Jim Creek in Washington state. This was another giant station generating a million watts into massive antennas that consisted of multiple cables stretched between adjacent mountaintops across a large valley. These antennas are known as valley span antennas. Although the performance of this station was not as efficient as planned, primary power was available at low rates and the antenna is still in use. The Navy required a more powerful and more efficient antenna. Hagaman and his associates felt they knew of such a design and prepared a proposal. After proposing what they thought was a unique design they now worried that the Navy would ask them to actually build one. And they did. Anyone who has done practical engineering knows this problem. Most times, the electrical problems are well understood and it's the practical engineering problems that occupy most of the time. This project was no different. The antenna design for NAA was called the Trideco and the chosen site was at Cutler, Maine. The antenna was required to have an efficiency of at least 50%, which, at that time, had never been achieved. A German antenna was erected during the Second World War called Goliath. It was quite efficient but was limited both in power and efficiency by the wartime lack of copper and other suitable materials. It was used for submarine communications. After the war, the then Soviet Union seized the Goliath antenna, packed up its massive cables and towers, and assembled it inside the Soviet Union near Gorky. (I'm not sure where we learned about the design of the Goliath. I wonder if it was from captured German plans?) NAA is located on a peninsula at Cutler, Maine. A diagram of this station shows two giant sub-antennas, each as large as several football fields and requiring twenty six 800-to-900 foot towers fed by two large transmitters. The antenna is split into a North and a South array. Each array is fed from a separate helix building and a transmitter building housing two transmitters is also located midway between the arrays. The transmitters can each supply one megawatt. Each antenna array resembles a six-sided compass rosette. The antenna feed point is located at the center of the rosette where the special building called the helix house is located. Looking over a schematic of the helix house equipment you see what looks like a simple matching network consisting of a few coils called variometers and something called a reactor. A variometer consists of two coils, a stator and a rotor. The rotor is located inside of the stator and is connected in series with the stator. When the rotor is rotated the mutual coupling either aids or reduces the effective inductance of the variometer. Since the antennas are operated below their natural resonance their impedance is capacitive and must be tuned by a series variometer. However, when looking at the equipment inside the helix house you see nothing familiar. In reality, this is a link-coupled antenna matching circuit, but that is where the similarity to familiar low powered equipment stops. The helix house is jammed full of giant coils and openly wound transformers, most larger than a large truck. The inductor wires are about 4 inches in diameter consisting of multiple strands of Litz wire. The antenna itself is tuned with a series variometer while a shunt variometer couples the signal into the antenna tuner from a coaxial feed line leading from the transmitter through a long underground tunnel. A part of this matching network called a "saturable reactor transformer" or a "stretchable" reactor is used to slightly change the tuning of the antenna. Direct current from the modulator is fed into a separate winding on the reactor transformer's core and saturates the transformer magnetic core slightly in response to the requirements of the frequency-shift signal. This causes a slight variation in the transformer's inductance thereby slightly shifting the point of resonance to keep the antenna in tune. Otherwise the frequency shift may cause the antenna band-pass to be out of tune. This change accommodates the antenna frequency shift even though the shift may be only a few Hertz away. For example, NAA is known to have a very narrow bandwidth, depending on the operating frequency. The reactor increases the antenna bandwidth by slightly shifting the center frequency back and forth, along with the keystream. The reactor transformer is designed to allow up to thirty-five words per minute FSK keying, which is well above the rate that this system usually operates. In other designs, a resistor, called a bandwidth resistor, is used to reduce the antenna Q instead of a stretchable reactor transformer. The last stage of the matching network is the helix that is simply a multi-turn link-coupling transformer. Like all the other components, it too is massive. A picture of the helix house interior shows the helix coil standing two stories in height and with the same diameter. A technician standing atop it is dwarfed by its size. The selection of the metal alloy from which to strand the antenna wires was critical. At Cutler the wires (over one inch in diameter) were stranded of Calsum Bronze. This material has a higher resistance than copper and is very strong. The higher resistance was necessary so that the antenna conductors could be heated during icing weather conditions. It requires a megawatt of 60 Hz power to de-ice either antenna array. Aluminum is relatively cheap and lightweight however it does not have the tensile strength required in long spans. Stranded Calsum Bronze cable is capable of providing low resistance to RF current due to the skin effect at radio frequencies yet has an appreciable resistance at 60 Hertz. Sending current into the strand causes it to heat up and this heat is used to melt off antenna ice accumulations during the winter. The power required to melt the ice is supplied by a large Diesel generating plant located on the NAA property. At NAA during the winter months, one of the arrays is sometimes shut down to melt ice accumulations while the other continues to operate. After installation of the antenna, engineers encountered something unexpected called Aeolian vibration. This was an effect known to builders of high voltage electric transmission lines. The Aeolian vibrations result from an interaction of the wind with the suspended cables. It starts being noticeable when a steady side wind reaches about five miles an hour and continuous for an extended period of time. Aeolian vibration caused unexplained breakage of some wires in the cable strand and stress on the antenna. Attaching "Stockbridge dampers" on the conductor strands at strategic locations can prevent it. These dampers absorb the vibration energy and dissipate it in the form of heat. Aeolian vibration may also be controlled to some extent by the very heavy insulators weighing up to 800 pounds each, that are used in the cables and tower guys. Static electricity is also a problem in the large antennas. The accumulation of worldwide lightning storms, rain static and other similar weather phenomena result in the generation of a large potential difference between the ionosphere and the earth. Electrical charge is constantly leaking down to the earth and is not ordinarily detectable without special equipment. However, the charge accumulates around highly conductive structures such as tall towers thereby generating dangerous voltages at their top. A recorder placed at the top of the 1200-foot NSS tower at Annapolis recorded a three to five kV/meter potential difference in the atmosphere during an approaching thunderstorm. These high voltages cause flashover to occur across the insulators that can disrupt the transmitter and take the station off the air. Similar voltages have also been observed during snowstorms. Since flashovers cannot be completely eliminated, a special device was designed to deal with it. It uses an ultraviolet or current sensor to detect when current flow begins at the start of a flashover and briefly cuts the RF excitation power to the final amplifier for the duration of the flashover. This solves the problem in most cases but not under all conditions. The device is called the CCO (carrier cut-off) unit and is now used in some form at all of the Navy's VLF stations. As previously mentioned, the antennas for the Navy VLF stations are giants. They are constructed to have a lot of capacitance on top of the towers. In fact, they are nothing so much as a large capacitor with a one plate formed by the tower- supported wire panels suspended 1500 feet or so in the air and the other plate being the earth. A million watts or so are fed into this circuit and, as you would expect, preventing corona discharge from the very high voltage is very important design issue. Determining in what part of the antenna structure corona may be a problem is interesting. A scaled model of the antenna is built and as much as 50,000 volts at 60 Hertz is pumped into the antenna. During darkness, and when the adjustable test voltage is at its highest, the antenna lights up like a Christmas tree with hundreds of small individual corona discharges occurring at critical points on the suspended mesh. Obviously, some coronas are in the higher voltage locations and may require the antenna configuration to be modified. Boynton gave us an interesting picture showing a model antenna under test, and the individual coronas were visible. It looked like the model was decorated with many small Christmas lights that illuminated its outline against the night sky. These locations were modified until the corona did not appear. The Trideco antenna, used until recently by NSS in Annapolis, is similar to the antennas used by other VLF stations in that they have several large supporting towers between 700 and 1500 feet tall. For example, in Annapolis several towers were used to suspend the top wire panels; the tallest being 1200 feet and its base was insulated from ground. The VLF station at Lualualei, Hawaii has similar towers (two base-insulated towers 1500 foot in height) although the antenna design is quite different. The towers are made of steel and remind me of those used in a large suspension bridge. The amazing thing about these towers is that they rest on a single porcelain insulator. This design is something like an amateur vertical monopole using a Coke bottle for a base insulator. In this case, however, the insulator holds up an antenna that weighs several million pounds. All that weight concentrated upon this one insulator is truly amazing to see and it is a wonder how such a thing could hold all that weight. In fact, as we learned, there have been problems with them. Cracks have been found in base insulators that required them to be changed out! How does one hoist up an antenna tower supporting a mile square of steel cable over 1500 feet in the sky? Well, amazingly, a system of hydraulic jacks are available to do just that. Modern towers are fabricated with "jacking pads" provided on the corners near the tapered lower section. The antenna tower can be lifted, the insulator changed and the tower lowered back into place. Although there are no pictures of the equipment is use, you can image what it must be like when you consider that these insulators are nearly two stories tall. So far, I've given you a pretty good idea of what Hagaman talked about, describing his days developing and building these giant antennas for the Navy's VLF stations. He told us that his company was located out in Leesburg, Virginia and that's were they did testing on small-scale mock-ups of the giant antennas they built. He said that newer designs use a top-loaded monopole and this kind of antenna is a good radiator and economical to build. The now defunct Ground Wave Emergency Network (GWEN) stations, also designed by DECO, used this type of antenna thought they operated at LF and not VLF. Some Omega navigation stations also use the top-loaded monopole. The US and Russian Navies use VLF for ship and submarine communications and both countries use giant antennas. The firm of Kershner, Wright & Hagaman recently designed a VLF antenna for a Southwest Asian country. It is similar to the Trideco array located in the NW part of Australia. Several other nations are planning VLF antennas also. With the end of the Cold War you might expected no further orders for giant VLF antennas but its not so. Additional nations now have submarines that must remain hidden and require one-way communications too. In that, they are practicing a Cold War art in place for the past fifty years. AMRAD =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1003 From: Jay Coote Date: Thu Jul 27, 2000 11:52am Subject: VLF Communications Jim's post on large ELF-VLF antenna arrays reminded me that the sweeper may find some unusual things on the air between 10 and 512 Khz. The GWEN stations and their data squawks are off the air now, but you may still hear some data communications. In the US, there is a no-license experimenter's band; 160-190 Khz. Users are limited to 1 watt input and a 50-foot antenna. While sweeping, you may run across one of these low-powered stations. Other countries may have different VLF or LF bands open to experimenters and amateurs. Check out those chirps! Jay Coote Los Angeles 1004 From: A Grudko Date: Thu Jul 27, 2000 0:44pm Subject: Re: Bug Sweep FAQ (revisited) ----- Original Message ----- > Ok, I now have now collected a total of 88 question that commonly > float to me. If you have any similar questions you would like to add > then please sent them to me privately. I am pushing for over 100 > questions in the FAQ list, but want to keep in restricted to TSCM > related questions, etc. > I plan to answer each of the questions with o one or two paragraph on > each of them. James, you have again gone up in my already high estimation of your abilities and knowledge. Some of these questions are simple, some are involved, some vague, some impossible to answer, and a few Loony Toons but you include them. Whatever you produce as a reply I want to buy a copy for those clients who think a de-bug is 15 minutes with a FSM. Andy - Joburg 1005 From: Steve Uhrig Date: Thu Jul 27, 2000 3:20pm Subject: Receivers for sale Hello list, We have accumulated a number of ICOM receivers which are available for sale. Traditionally these things sell quickly. Have ICOM R8500 and R100. R100 has been discontinued by ICOM and prices already are starting to go up. There is no replacement for the R100. R8500s are all cellular blocked. Some R100s are and some are not. Almost all are government trade ins after having been used for one weekend on a surveillance. Prices range from $1300-$1500 for R8500 depending mostly on whether or not they are in the original factory box and condition of the manuals. Some are as new untouched, others lost the box and the manuals were used some as this receiver is relatively complicated. R100s range from $600-$900 depending on condition and whether blocked or unblocked. Unblocked receivers are very scarce and will get scarcer and more expensive. It is very difficult even for the government to buy them as ICOM did not stock unblocked receivers and imported them only when they got an order from the government. Since the import time was like 3 months, most government users opted for blocked receivers rather than wait. Details on the R8500 are available here: http://www.icomamerica.com/receivers/tabletop/index.html Since the R100 has been discontinued, specs no longer are on the ICOM webpage. Do some web searching and you'll probably find something on another site. The R100 in broad terms is a mobile version of the R7000 family. Excellent receiver. All receivers have a guarantee from us, and we are the only facility in the U.S. other than ICOM who services the receivers in house. Can take credit cards for payment. Holler if questions or if you want one. If you are thinking of getting one, do it and don't piss around or you may pay more if you can even get the things at all. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1006 From: James M. Atkinson, Comm-Eng Date: Thu Jul 27, 2000 5:45pm Subject: Re: Bug Sweep FAQ (revisited) At 7:44 PM +0200 7/27/00, A Grudko wrote: >----- Original Message ----- > > Ok, I now have now collected a total of 88 question that commonly > > float to me. If you have any similar questions you would like to add > > then please sent them to me privately. I am pushing for over 100 > > questions in the FAQ list, but want to keep in restricted to TSCM > > related questions, etc. > > I plan to answer each of the questions with o one or two paragraph on > > each of them. > > >James, you have again gone up in my already high estimation of your >abilities and knowledge. Some of these questions are simple, some are >involved, some vague, some impossible to answer, and a few Loony Toons but >you include them. > >Whatever you produce as a reply I want to buy a copy for those clients who >think a de-bug is 15 minutes with a FSM. > >Andy - Joburg Thank you for the kind words, there are greatly appreciated. I will post the FAQ to this mailing list, and to my website as well. This way it will get the widest coverage, and everybody can use it as a resource at no charge (but I will gladly accept pizza and beer money). -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1007 From: Steve Uhrig Date: Thu Jul 27, 2000 7:16pm Subject: Excellent book on wiretap detection Hello list, Having spoken with a member of this list earlier regarding this book, I thought I would share the info with everyone. Ted Swift, a former government technical surveillance man, has written an outstanding book on the detection of telephone wiretaps. Everyone will learn something from this book even though it was written with the beginner in mind. I wrote the below review on the book in 1997. It is copyrighted to me, but anyone is welcome to use it anywhere it will hurt the bad guys. For any novices, I would recommend getting this book before spending one cent on equipment. If you learn the info in this book and score a quality digital VOM, you will be quite capable of detecting the major telephone surveillance attempts. The Fluke 87 DVM is kind of a standard TSCM meter, and is reliable and fairly inexpensive, but almost any quality DVM will suffice. You only need to spend hundreds, not thousands. Contact Ted through his website to buy the book. Tell him I sent you and ask him to autograph it. My highest recommendation, and I do not say that often. .... Steve ------------------------------------- WIRETAP DETECTION TECHNIQUES "A Guide to Checking Telephone Lines - Testing Procedures for Eavesdropping Countermeasures Surveys". The above is the title of a recently released book by veteran Electronic Countermeasures expert Ted Swift. This superb work is unusual in that it gives specific, hands on instruction for identifying the most common types of telephone wiretaps. No background or experience is required to take advantage of the wealth of information in this book. Ted Swift is a former Army intelligence officer and was employed by the DEA for over a decade. He has taught college level courses in the Law Enforcement program at Texas A&M University. He knows his stuff and presents it in a concise, accurate and friendly manner. By following straightforward and illustrated instructions in this book, a novice will be able to locate virtually all on-premise wiretap attacks. Certain basic tools and test equipment is required to perform these tests, and again the author provides illustrations and generic recommendations on equipment. Page 1 starts off discussing line start interfaces and tape recorders, which in my experience are by far the most common threat against phone lines by non-professionals. Simple electronic tests using a digital VOM are described to find these devices. The book continues on to discuss many other methods, techniques and equipment used in wiretapping. As a former government-trained and experienced electronic surveillance vet myself, I tend to stick my nose up in the air when I see books purporting to teach countersurveillance techniques to the novice. Generally, debugging is not a do-it-yourself proposition. However, in the case of "Wiretap Detection Techniques . . .", a novice has an excellent chance of providing reasonable security to his phone line against the vast majority of attacks. Enough theory is covered so the reader can understand the reasons for the various tests described. Diagrams clearly show how to set up and connect to the phone lines for all tests described. Telephone system terminology also is described and illustrated, so the reader has a basic understanding of how the telephone network works from his phone, through the phone company, and to the party at the other end. Voltage and current measurements, capacitance and resistance are explained clearly, and related to the subject at hand. The minimal necessary theory is presented in an interesting manner and is easy to grasp by anyone with a high school education. Covered in adequate depth for the intended audience are tape recorder starters, parallel and series wiretaps, inductive wiretaps, hookswitch bypasses, infinity transmitters, and other attacks best uncovered by physical inspection. Also mentioned are attacks one will not be able to uncover, such as legal (court-ordered) intercepts performed by law enforcement through the phone company central office. Mr. Swift also describes several tools and pieces of equipment used by countersurveillance professionals. From a simple digital volt-ohmmeter to nonlinear junction detectors to spectrum analyzers, time domain reflectometers and high end countermeasures receivers, he acknowledges them all and rates them honestly as to their utility. Virtually all the tests the reader will learn to perform use little more than a common digital VOM and a few dollars of parts available from any electronics supply shack. Refreshingly, the author is not married to a particular company supplying the equipment mentioned, and he does not push equipment from himself or any other vendor. The section on line balance alone easily is worth the price of the book, and many countermeasures professionals I've met do not understand or use this simple and extremely effective technique. An extensive question and answer section gently instructs the reader in the facts and myths surrounding wiretapping and the business of debugging. Where any technical term is used, the author defines it in accurate, easy to understand language and shows how to relate it to the matter being discussed. A handy glossary covers the technical and operational terms used throughout the text, and in the profession. In reading these sections, it is obvious that Mr. Swift has extensive real-world experience and is not an armchair commando like so many self-appointed "experts" publishing material of questionable accuracy and utility. Enough legal considerations are covered to convey to the reader in no uncertain terms the seriousness of illegal wiretapping. A suggestion to the reader intending to apply this material professionally - make your own worksheets and charts to use with each of the tests described. As the information is laid out so clearly, this will not be difficult and will be a useful tool when actually performing the tests. And the worksheets will help you perform the tests in an orderly, complete fashion. Completed worksheets will serve as a record of the work done and may serve as a baseline for future testing of the same location. If you intend to sell your services to others, worksheets will help you appear professional and organized. In summary - "Wiretap Detection Techniques . . ." is an excellent work of value to anyone interested in the nuts and bolts of telephone wiretapping and detecting wiretaps. Both novices and professionals will learn from this book. I'm rather long of tooth in this business, and I learned some useful techniques. I don't often encourage amateurs to try to locate eavesdropping devices themselves, but with this book, a serious individual, telephone technician, security professional or private detective will be equipped to identify the vast majority of common attacks. Anyone interested in this technology should read and study this book. Absolutely do not purchase any debugging equipment until you have read this book. It undoubtedly will save you many times its cost when you are selecting equipment. I highly recommend this book to anyone interested in wiretapping defense from either a theoretical or practical standpoint. Copyright (c) 1997 by Steve Uhrig, SWS Security ----------------------------- Ted Swift's website: http://www.angelfire.com/biz/investigator/index.html email: tnswift@e... ----------------------------- Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1008 From: James M. Atkinson, Comm-Eng Date: Thu Jul 27, 2000 7:45pm Subject: Re: Excellent book on wiretap detection I would also whole heatedly endorse Ted's book (but I am still waiting on my autographed copy... cough-cough). The book is very well written and is very easy to understand. (Tongue is cheek) I would however take issue with the DVM recommendations, and would lean toward the Model 89 IV instead of the 87. The computer interface and logging capability are very valuable to the TSCM'er, but the instruments are functionally identical. -jma At 8:16 PM -0400 7/27/00, Steve Uhrig wrote: >Hello list, > >Having spoken with a member of this list earlier regarding >this book, I thought I would share the info with everyone. > >Ted Swift, a former government technical surveillance man, >has written an outstanding book on the detection of >telephone wiretaps. Everyone will learn something from this >book even though it was written with the beginner in mind. > >I wrote the below review on the book in 1997. It is >copyrighted to me, but anyone is welcome to use it anywhere >it will hurt the bad guys. > >For any novices, I would recommend getting this book before >spending one cent on equipment. If you learn the info in >this book and score a quality digital VOM, you will be >quite capable of detecting the major telephone surveillance >attempts. The Fluke 87 DVM is kind of a standard TSCM >meter, and is reliable and fairly inexpensive, but almost >any quality DVM will suffice. You only need to spend >hundreds, not thousands. > >Contact Ted through his website to buy the book. Tell him I >sent you and ask him to autograph it. > >My highest recommendation, and I do not say that often. > >.... Steve > >------------------------------------- > >WIRETAP DETECTION TECHNIQUES > >"A Guide to Checking Telephone Lines - Testing Procedures >for Eavesdropping Countermeasures Surveys". > >The above is the title of a recently released book by >veteran Electronic Countermeasures expert Ted Swift. This >superb work is unusual in that it gives specific, hands on >instruction for identifying the most common types of >telephone wiretaps. No background or experience is required >to take advantage of the wealth of information in this >book. > >Ted Swift is a former Army intelligence officer and was >employed by the DEA for over a decade. He has taught >college level courses in the Law Enforcement program at >Texas A&M University. He knows his stuff and presents it in >a concise, accurate and friendly manner. > >By following straightforward and illustrated instructions >in this book, a novice will be able to locate virtually all >on-premise wiretap attacks. Certain basic tools and test >equipment is required to perform these tests, and again the >author provides illustrations and generic recommendations >on equipment. > >Page 1 starts off discussing line start interfaces and tape >recorders, which in my experience are by far the most >common threat against phone lines by non-professionals. >Simple electronic tests using a digital VOM are described >to find these devices. The book continues on to discuss >many other methods, techniques and equipment used in >wiretapping. > >As a former government-trained and experienced electronic >surveillance vet myself, I tend to stick my nose up in the >air when I see books purporting to teach >countersurveillance techniques to the novice. Generally, >debugging is not a do-it-yourself proposition. However, in >the case of "Wiretap Detection Techniques . . .", a novice >has an excellent chance of providing reasonable security to >his phone line against the vast majority of attacks. > >Enough theory is covered so the reader can understand the >reasons for the various tests described. Diagrams clearly >show how to set up and connect to the phone lines for all >tests described. Telephone system terminology also is >described and illustrated, so the reader has a basic >understanding of how the telephone network works from his >phone, through the phone company, and to the party at the >other end. Voltage and current measurements, capacitance >and resistance are explained clearly, and related to the >subject at hand. The minimal necessary theory is presented >in an interesting manner and is easy to grasp by anyone >with a high school education. > >Covered in adequate depth for the intended audience are >tape recorder starters, parallel and series wiretaps, >inductive wiretaps, hookswitch bypasses, infinity >transmitters, and other attacks best uncovered by physical >inspection. Also mentioned are attacks one will not be able >to uncover, such as legal (court-ordered) intercepts >performed by law enforcement through the phone company >central office. > >Mr. Swift also describes several tools and pieces of >equipment used by countersurveillance professionals. From a >simple digital volt-ohmmeter to nonlinear junction >detectors to spectrum analyzers, time domain reflectometers >and high end countermeasures receivers, he acknowledges >them all and rates them honestly as to their utility. >Virtually all the tests the reader will learn to perform >use little more than a common digital VOM and a few dollars >of parts available from any electronics supply shack. >Refreshingly, the author is not married to a particular >company supplying the equipment mentioned, and he does not >push equipment from himself or any other vendor. > >The section on line balance alone easily is worth the price >of the book, and many countermeasures professionals I've >met do not understand or use this simple and extremely >effective technique. > >An extensive question and answer section gently instructs >the reader in the facts and myths surrounding wiretapping >and the business of debugging. Where any technical term is >used, the author defines it in accurate, easy to understand >language and shows how to relate it to the matter being >discussed. A handy glossary covers the technical and >operational terms used throughout the text, and in the >profession. In reading these sections, it is obvious that >Mr. Swift has extensive real-world experience and is not an >armchair commando like so many self-appointed "experts" >publishing material of questionable accuracy and utility. > >Enough legal considerations are covered to convey to the >reader in no uncertain terms the seriousness of illegal >wiretapping. > >A suggestion to the reader intending to apply this material >professionally - make your own worksheets and charts to use >with each of the tests described. As the information is >laid out so clearly, this will not be difficult and will be >a useful tool when actually performing the tests. And the >worksheets will help you perform the tests in an orderly, >complete fashion. Completed worksheets will serve as a >record of the work done and may serve as a baseline for >future testing of the same location. If you intend to sell >your services to others, worksheets will help you appear >professional and organized. > >In summary - "Wiretap Detection Techniques . . ." is an >excellent work of value to anyone interested in the nuts >and bolts of telephone wiretapping and detecting wiretaps. >Both novices and professionals will learn from this book. >I'm rather long of tooth in this business, and I learned >some useful techniques. I don't often encourage amateurs to >try to locate eavesdropping devices themselves, but with >this book, a serious individual, telephone technician, >security professional or private detective will be equipped >to identify the vast majority of common attacks. Anyone >interested in this technology should read and study this >book. Absolutely do not purchase any debugging equipment >until you have read this book. It undoubtedly will save you >many times its cost when you are selecting equipment. > >I highly recommend this book to anyone interested in >wiretapping defense from either a theoretical or practical >standpoint. > >Copyright (c) 1997 by Steve Uhrig, SWS Security > >----------------------------- > >Ted Swift's website: > >http://www.angelfire.com/biz/investigator/index.html > >email: > >tnswift@e... >----------------------------- > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1009 From: Steve Uhrig Date: Thu Jul 27, 2000 9:24pm Subject: Used surveillance, TSCM and commo gear FS Hello list, We've updated our used equipment page: http://www.swssec.com/used.html A good bit of new, used, antique and oddball surveillance, countersurveillance and communications equipment for sale. Older models of stuff we built, took on trade or somehow found in the warehouse. Can take credit cards for anything. Holler if questions. I also buy new or used surveillance, countersurveillance and communications equipment. Please strobe me if you have any unused equipment to sell. List members ordering anything will receive more than they paid for. A free for nothing benefit of belonging to this motley group. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1010 From: James M. Atkinson, Comm-Eng Date: Thu Jul 27, 2000 11:51pm Subject: Three "families" of bug detectors. There are three "families" of bug detectors. On the low end are "Broad Band RF Field Detectors" which include the CPM-700, Transtec, 2044, 2057, 2060 and related devices. They suck in a wide chunk of the spectrum and tend to be relatively inexpensive. This type of system may or may not have a speak, and may, or may not have some kind of demodulation capability. A decent (and legitimate) system of this nature will run between $1500 to $3000, but technically you can do the same thing with a coat hanger, a 3 cent diode, and cheap ten dollar voltmeter. Second, and in the middle are the TUNED receiver systems. These take the above BROAD BAND systems and restrict frequency coverage to a very narrow section of the spectrum (Which you can then park of the SINGLE frequency you are testing). Generally these kind of systems actually demodulate a specific kind of signal. The OSCOR, Scanlock, MSS, are all within this type of equipment, but it can also include a simple hand held scanner. A decent (and legitimate) system of this nature will run between $10,000 to $150,000 (or more). Third, on the higher end, are full dress spectrum analyzers which are a combination of both a broad band and a narrow band instrument. A spectrum analyzer takes a segment of spectrum "or window" as small as a 10 Hz or as broad as 25+ MHz and sweeps the entire spectrum being checked with it several hundred times per second. In TSCM we generally use a mix of all three types. Each system has it's own benefits, but also it's own weaknesses (have you ever tried to conceal a 40 pound 494AP spectrum analyzer under a jacket, or tied to use an R10 on a power line?) A good example is to conceal a simple RF field detector (such as a 2062, Scout, R20, R10, Explorer, etc) in your suit coat pocket while walking around on your initial survey and sketching of the premises to be inspected. Then as you begin your actual sweep the first instrument used is a more sophisticated broadband field detector such as the CPM-700 that you use for a faster, but more sensitive "quickly check" for anything that is obvious. The OSC-5000, MSS-2100, or scanners can also be set up to run an automated sniffing (using the wide band filters) while you unpack your other gear, and set up your antennas. Then, while your other equipment is running you fire up your spectrum analyzer and check everything in detail between DC and light. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1011 From: Afolabi Oludoyi Date: Fri Jul 28, 2000 0:24am Subject: Re: Excellent book on wiretap detection pls what is the title of this wonder book ? >From: "Steve Uhrig" >Reply-To: TSCM-L@egroups.com >To: tscm-l@egroups.com >CC: tnswift@e... >Subject: [TSCM-L] Excellent book on wiretap detection >Date: Thu, 27 Jul 2000 20:16:21 -0400 > >Hello list, > >Having spoken with a member of this list earlier regarding >this book, I thought I would share the info with everyone. > >Ted Swift, a former government technical surveillance man, >has written an outstanding book on the detection of >telephone wiretaps. Everyone will learn something from this >book even though it was written with the beginner in mind. > >I wrote the below review on the book in 1997. It is >copyrighted to me, but anyone is welcome to use it anywhere >it will hurt the bad guys. > >For any novices, I would recommend getting this book before >spending one cent on equipment. If you learn the info in >this book and score a quality digital VOM, you will be >quite capable of detecting the major telephone surveillance >attempts. The Fluke 87 DVM is kind of a standard TSCM >meter, and is reliable and fairly inexpensive, but almost >any quality DVM will suffice. You only need to spend >hundreds, not thousands. > >Contact Ted through his website to buy the book. Tell him I >sent you and ask him to autograph it. > >My highest recommendation, and I do not say that often. > >.... Steve > >------------------------------------- > >WIRETAP DETECTION TECHNIQUES > >"A Guide to Checking Telephone Lines - Testing Procedures >for Eavesdropping Countermeasures Surveys". > >The above is the title of a recently released book by >veteran Electronic Countermeasures expert Ted Swift. This >superb work is unusual in that it gives specific, hands on >instruction for identifying the most common types of >telephone wiretaps. No background or experience is required >to take advantage of the wealth of information in this >book. > >Ted Swift is a former Army intelligence officer and was >employed by the DEA for over a decade. He has taught >college level courses in the Law Enforcement program at >Texas A&M University. He knows his stuff and presents it in >a concise, accurate and friendly manner. > >By following straightforward and illustrated instructions >in this book, a novice will be able to locate virtually all >on-premise wiretap attacks. Certain basic tools and test >equipment is required to perform these tests, and again the >author provides illustrations and generic recommendations >on equipment. > >Page 1 starts off discussing line start interfaces and tape >recorders, which in my experience are by far the most >common threat against phone lines by non-professionals. >Simple electronic tests using a digital VOM are described >to find these devices. The book continues on to discuss >many other methods, techniques and equipment used in >wiretapping. > >As a former government-trained and experienced electronic >surveillance vet myself, I tend to stick my nose up in the >air when I see books purporting to teach >countersurveillance techniques to the novice. Generally, >debugging is not a do-it-yourself proposition. However, in >the case of "Wiretap Detection Techniques . . .", a novice >has an excellent chance of providing reasonable security to >his phone line against the vast majority of attacks. > >Enough theory is covered so the reader can understand the >reasons for the various tests described. Diagrams clearly >show how to set up and connect to the phone lines for all >tests described. Telephone system terminology also is >described and illustrated, so the reader has a basic >understanding of how the telephone network works from his >phone, through the phone company, and to the party at the >other end. Voltage and current measurements, capacitance >and resistance are explained clearly, and related to the >subject at hand. The minimal necessary theory is presented >in an interesting manner and is easy to grasp by anyone >with a high school education. > >Covered in adequate depth for the intended audience are >tape recorder starters, parallel and series wiretaps, >inductive wiretaps, hookswitch bypasses, infinity >transmitters, and other attacks best uncovered by physical >inspection. Also mentioned are attacks one will not be able >to uncover, such as legal (court-ordered) intercepts >performed by law enforcement through the phone company >central office. > >Mr. Swift also describes several tools and pieces of >equipment used by countersurveillance professionals. From a >simple digital volt-ohmmeter to nonlinear junction >detectors to spectrum analyzers, time domain reflectometers >and high end countermeasures receivers, he acknowledges >them all and rates them honestly as to their utility. >Virtually all the tests the reader will learn to perform >use little more than a common digital VOM and a few dollars >of parts available from any electronics supply shack. >Refreshingly, the author is not married to a particular >company supplying the equipment mentioned, and he does not >push equipment from himself or any other vendor. > >The section on line balance alone easily is worth the price >of the book, and many countermeasures professionals I've >met do not understand or use this simple and extremely >effective technique. > >An extensive question and answer section gently instructs >the reader in the facts and myths surrounding wiretapping >and the business of debugging. Where any technical term is >used, the author defines it in accurate, easy to understand >language and shows how to relate it to the matter being >discussed. A handy glossary covers the technical and >operational terms used throughout the text, and in the >profession. In reading these sections, it is obvious that >Mr. Swift has extensive real-world experience and is not an >armchair commando like so many self-appointed "experts" >publishing material of questionable accuracy and utility. > >Enough legal considerations are covered to convey to the >reader in no uncertain terms the seriousness of illegal >wiretapping. > >A suggestion to the reader intending to apply this material >professionally - make your own worksheets and charts to use >with each of the tests described. As the information is >laid out so clearly, this will not be difficult and will be >a useful tool when actually performing the tests. And the >worksheets will help you perform the tests in an orderly, >complete fashion. Completed worksheets will serve as a >record of the work done and may serve as a baseline for >future testing of the same location. If you intend to sell >your services to others, worksheets will help you appear >professional and organized. > >In summary - "Wiretap Detection Techniques . . ." is an >excellent work of value to anyone interested in the nuts >and bolts of telephone wiretapping and detecting wiretaps. >Both novices and professionals will learn from this book. >I'm rather long of tooth in this business, and I learned >some useful techniques. I don't often encourage amateurs to >try to locate eavesdropping devices themselves, but with >this book, a serious individual, telephone technician, >security professional or private detective will be equipped >to identify the vast majority of common attacks. Anyone >interested in this technology should read and study this >book. Absolutely do not purchase any debugging equipment >until you have read this book. It undoubtedly will save you >many times its cost when you are selecting equipment. > >I highly recommend this book to anyone interested in >wiretapping defense from either a theoretical or practical >standpoint. > >Copyright (c) 1997 by Steve Uhrig, SWS Security > >----------------------------- > >Ted Swift's website: > >http://www.angelfire.com/biz/investigator/index.html > >email: > >tnswift@e... >----------------------------- > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* ________________________________________________________________________ Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com 1012 From: Ra˙l Ross Pineda Date: Thu Jul 27, 2000 8:03pm Subject: Re: Receivers for sale Dear Steve, I got one of those receivers brand new including free shipping for $1,499.95 from a welll known communications store. I believe this is the standard price out there. So, what will it be the advantage of buying it from you for folks in this list? >Prices range from $1300-$1500 for R8500 depending mostly on >whether or not they are in the original factory box and >condition of the manuals. Some are as new untouched, others >lost the box and the manuals were used some as this >receiver is relatively complicated. Saludos, Ra˙l Ross Pineda raulross@f... 2255 South Marshall Boulevard Chicago, Illinois 60623 (312)427-2533 oficina (773)277-4075 casa 1013 From: Steve Uhrig Date: Fri Jul 28, 2000 9:33am Subject: Re: Excellent book on wiretap detection Once upon a midnight dreary, Afolabi Oludoyi pondered, weak and weary: > pls what is the title of this wonder book ? > >WIRETAP DETECTION TECHNIQUES > >"A Guide to Checking Telephone Lines - Testing Procedures > >for Eavesdropping Countermeasures Surveys". > >The above is the title of a recently released book by > >veteran Electronic Countermeasures expert Ted Swift. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1014 From: James M. Atkinson, Comm-Eng Date: Fri Jul 28, 2000 11:13am Subject: Referral List Update Greetings, I will be updating my referral list located at: http://www.tscm.com/goldlist.html in a few days and I am looking for recommendations for legitimate TSCM firms in the midwest area. Feel free to nominate people (other then yourself) to me privately, but nobody will be placed on the referral list until I am satisfied that they can deliver legitimate TSCM services (hint: Attending 3-4 weeks of classes, and buying an OSCOR doesn't cut it). -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1015 From: DMI Date: Fri Jul 28, 2000 11:36am Subject: Re: Excellent book on wiretap detection Is it just me, or should there be a phone number (not just a fax) and an address (other than a P.O. Box) for contact info? I assume I am not the only Investigator that would not order a product from a business or person without this information? Just a thought, Bill ----- Original Message ----- From: Steve Uhrig To: TSCM-L@egroups.com Sent: Friday, July 28, 2000 10:33 AM Subject: Re: [TSCM-L] Excellent book on wiretap detection Once upon a midnight dreary, Afolabi Oludoyi pondered, weak and weary: > pls what is the title of this wonder book ? > >WIRETAP DETECTION TECHNIQUES > >"A Guide to Checking Telephone Lines - Testing Procedures > >for Eavesdropping Countermeasures Surveys". > >The above is the title of a recently released book by > >veteran Electronic Countermeasures expert Ted Swift. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ------------------------------------------------------------------------------ ------------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 1016 From: Date: Fri Jul 28, 2000 11:57am Subject: Carnivore Lawmakers Find Carnivore Unappetizing A House subcommittee challenges FBI officials on the privacy implications of the e-mail surveillance system. By Margret Johnston WASHINGTON ñ Democrat and Republican members of a U.S. House of Representatives subcommittee launched a barrage of questions at U.S. Federal Bureau of Investigation officials on Monday about a system known as Carnivore that federal law enforcement officials are using to track and read e-mail messages in criminal and national security investigations. In a contentious hearing, many members of the House Judiciary Committee's Subcommittee on the Constitution expressed grave concerns about the potential for privacy violations, and skepticism that Carnivore's operations are as confined as the FBI says they are. At least one member, J.C. Watts, a Republican from Oklahoma, called on the FBI to suspend the use of the system. Some subcommittee members also suggested the FBI has not been as forthcoming about Carnivore as it should have been. The system was brought to light only after Internet service provider Earthlink complained about it. Under the onslaught of questions, FBI officials and representatives from the Department of Justice remained firm in their defense of Carnivore. They called it a "minimalization tool" needed to catch drug dealers, child pornographers and terrorists who have begun using e-mail in illegal endeavors in the same way they have used the telephone and other technologies. "We think it's a well-focused capability," said Donald Kerr, director of the FBI's lab division. "It uses some of the very attributes of the Internet, in particular the Internet protocol addressing capability ñ the to and from lines ñ of the e-mail in order to restrict our collection to just those who are the targets of the court order. In a sense, it's automatic minimization up front." The FBI has worked on the development of Carnivore over the past three years, Kerr said. The system has been installed at ISPs 25 times, including in 16 cases this year ñ six involving criminal investigations and 10 involving national security investigations. The law enforcement officials declined to provide specific details about the cases because none has been fully prosecuted. Most of the ISPs that have installed Carnivore have been small companies that don't have the equipment and technical expertise to give investigators the information outlined in court orders. Larger ISPs, with the exception of Earthlink, haven't been affected by Carnivore, which Kerr said is passive on the network and doesn't interfere with the delivery of e-mail, because they have the ability to give the FBI what it needs. In every case but the one involving Earthlink, the ISPs cooperated with the court order, Kerr said. Earthlink tried to develop software "in real time," he said, and could not provide all the information the FBI sought. Consequently, the agents returned to the judge and Earthlink was "compelled to move ahead," Kerr said. Kerr described Carnivore as a desktop-like Windows-based PC and software, a package that is partly available off the shelf. It is attached to an ISP's network either to provide investigators with either the names of people with whom a suspect is communicating or the ability to read the full content of a suspect's e-mail. If investigators want to read e-mail content, they must meet the higher legal standard of "probable cause," which means they must have a strong reason to believe criminal activity is ongoing. However, if investigators only want to know with whom a suspect is communicating, they have to meet a lower standard. Those orders are called "trap and trace," which provide the names of the senders, and "pen register," which provide the names of the people to whom the suspect sends e-mail. The name Carnivore is something the FBI now regrets, agency officials have said, because it implies that the system devours large quantities of information the way a lion consumes fresh meat. Kerr explained that the system is actually a packet sniffer similar to the types of technology used by network administrators to diagnose problems on their networks. Carnivore can pick up only the packets that use the Internet protocol address to which the FBI has been granted access by court order, Kerr said. The system does not monitor all traffic moving across an ISP's servers but rather sees a subset of that data, which the ISP provides, depending on the specifications of the court order, and only data permitted by the court order is filtered out, Kerr said. "In every case, we require a court order; that court order is specific to the [IP addresses] we can target," Kerr said, reiterating details that the FBI released in a press briefing on Friday. In the case of trap and trace and pen register uses, law enforcement agents are not permitted to read the subject line of an e-mail and do not capture that information, Kerr said. However, there was a high degree of skepticism among members of the subcommittee on that point, because Carnivore must gather volumes of information and analyze it to return the desired information. Representative Spencer Bachus, a Republican from Alabama, said the FBI's explanation raised concern that some people in the FBI or close to it could have free rein to check up on what their ex-spouses or political enemies were doing. "You can't go to AT&T today and say, 'we are going to analyze all the phone calls that go through your system,' but you can do that with Carnivore?" Bachus asked. Kerr first said the FBI has neither "the right nor the ability to just go fishing," but when Bachus persisted, saying technology would enable law enforcement officers to monitor here and there, Kerr said, "In principle we could do that." But he said it would be extremely unlikely because an agent who did that would face a fine and up to five years in jail. Representative Bob Barr, a Republican from Georgia, complained that law enforcement officials are mistreating ISPs by telling them they will not be able to monitor the system. "There's new legal ground that you all are trying to break here where you are saying you have the authority to harvest large quantities of information, then you will filter out what you want ... those are two very, very large steps we are taking here," Barr said. "I don't think this has been well thought out." Democrats were equally outraged over Carnivore and its application under wiretap laws that were written for intercepting telephone conversations. Rep. Jerrold Nadler, a Democrat from New York, said a person's privacy is violated if investigators find out he has been communicating with a suspect or anyone else on the Internet using trap and trace or pen register, and he complained that the person would find out only if there is a court case. "As a practical matter, most people would be somewhat upset if they thought that [an investigator] was following exactly who they were talking to on the telephone or who they were sending e-mails to," Nadler said. "The guy should know about that, and maybe [he] should be able to say to the government, 'On what basis did you do this?' Right now, there's no provision for that." Rep. John Conyers, a Democrat from Michigan, said Congress might need to consult a technology expert to verify that Carnivore in fact works the way the FBI says it does. Kerr said the FBI was seeking an independent laboratory to carry out a verification and validation process and has contacted the San Diego Supercomputer Center in California to ask whether it would conduct the tests. The FBI intends to have the verification and validation within the next few months, Kerr said. Margret Johnston writes for the IDG News Service HAVE A GREAT DAY !!! 1017 From: Rob Muessel Date: Fri Jul 28, 2000 11:33am Subject: Telephone Problem Here is a problem I encountered in recently and have yet to come up with an acceptable explanation as to what happened and how. Any ideas? The situation: Two people are sitting in an office. Person A is the occupant of the office. Telephone service is ISDN Centrex. He is meeting with Person B, a consultant from another city. Together they are working on the acquisition of another company. At approximately 11:30 AM they place a call to the cell phone of person C, the president of the company they are trying to acquire. The cell phone is apparently turned off or is in a no service area and the caller hears the recorded message that the person they are calling is not available. The phone is hung up. There is no voice mailbox for the cell phone. Persons A and B then discuss certain aspects of the deal. At approximately 2 PM person B calls his office in the other city to check voice mail. He hears a very intriguing message: approximately 3 minutes of the conversation that took place in person Aís office after the attempt to reach person C. The time stamp on the voice mail was 1:20 PM. We examined toll records and found that the call to the cell phone was of short duration, less than 30 seconds. We also found that there were no calls made to person Bís office from any of phones in person Aís company. A second incident involved a conversation person A had with a receptionist at one of his companyís offices in another city while he was traveling. This conversation appeared on the voicemail of another employee in person Aís office five days after the conversation took place. Any thoughts?? -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 1018 From: Steve Uhrig Date: Fri Jul 28, 2000 1:17pm Subject: Re: Excellent book on wiretap detection Once upon a midnight dreary, DMI pondered, weak and weary: > Is it just me, or should there be a phone number (not just a > fax) and an address (other than a P.O. Box) for contact > info? I assume I am not the only Investigator that would > not order a product from a business or person without this > information? Ted operates a busy PI and consulting firm. Publishing the books is a side effort. I can tell you from long experience, you waste a lot of time letting your number out to the public. People who need him know how to get hold of him. And what PI wants to publish a physical address? That invites lunatics to drop in and waste your time, and thieves to keep an eye on your place thinking you have weapons and expensive equipment. Granted, a P.O. box does not inspire confidence, but mail can be received there and you weren't going to try to pick the thing up in person, were you? Ted is an honest man. You can order with confidence, or drop him an email and judge for yourself by the dialog with him. Ted is not the only place to buy the book, but he is the original source, and if you get it from him you can ask for it to be autographed. I understand the reluctance, and you are proper to exercise due diligence, especially in this field where frauds outnumber the real thing by a substantial margin. Asking here and receiving an endorsement hopefully will be adequate for you. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1019 From: Marty Kaiser Date: Fri Jul 28, 2000 9:26am Subject: Re: ELF/VLF Transmission Systems Ah, those ELF memories. In late fifty's and early sixty's I had a 1 megawatt 6 to 7 HERTZ submarine communication system humming away. The dipole antenna, located in South Carolina, looked like a power transmission line. There is a lot of stuff (not of much interest to countermeasure people) going on way down there.... not to mention it is close to the resonant frequency of the human body! Cordially, Marty ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Sent: Thursday, July 27, 2000 3:58 PM Subject: [TSCM-L] ELF/VLF Transmission Systems For those list TSCM-L members who don't see the value of performing TSCM ELF/VLF inspections below 100 kHz. Remember... anything that appears on the conductors is of significant interest to us. -jma ----------------------------- Designing the Giant Antennas Synopsis of a presentation by Boynton Hagaman At the April 2000 AMRAD Meeting Thanks to AMRAD for granting permission to post this document. The career of Boynton Hagaman, AA4QY, spans many years and has had many interesting turns. He is an engineer, designer and builder of some remarkable antennas. These include the Trideco antenna used by NSS, Annapolis, Maryland, the antennas used by NAA, Culter, Maine and many others. His talk encompassed a period of three decades, spanning the time period from the end of the 1950s through the Cold War and until today. This is a story of the giant antennas unique in their own right, and rare. There are a decreasing number of opportunities to see giant antennas. International broadcast stations used them, for example, the Voice of America transmitting stations. HF antennas are conventional in many ways because they operate at reasonable wavelengths. Not so conventional are the giants used to send signals at just a few kilohertz in the very low frequency band that ranges from 3 to 30 kilohertz. Wavelengths here are measured in the thousands of meters, making it difficult to design an efficient antenna. These antennas are extremely sharp and their bandwidth at resonance is very narrow. It is so narrow, in fact, that one experimenter actually used this sharpness as an SSB filter to eliminate an unwanted sideband from a double-sideband AM signal. The antennas we heard about at the AMRAD meeting all operate in the band between 10 and 30 kilohertz and are used by the US Navy for one-way transmission to submerged submarines. In the early 1960s, Lester Carr, Hagaman and a few associates formed a company called DECO, short for Development Engineering Co. At about the same time, a partner, Jim Weldon, started Continental Electronics, a company in Dallas Texas that manufactures high power medium, short-wave and VLF transmitters. At that time the Navy wanted to upgrade their VLF transmitting capability, which included stations located in different geographical locations to achieve worldwide coverage. Each station sent continuous coded traffic using a narrow form of frequency-shift keying of a few Hertz wide. This allowed submerged submarines to receive slow speed commands while remaining submerged. Earlier, RCA built a station in this chain at Jim Creek in Washington state. This was another giant station generating a million watts into massive antennas that consisted of multiple cables stretched between adjacent mountaintops across a large valley. These antennas are known as valley span antennas. Although the performance of this station was not as efficient as planned, primary power was available at low rates and the antenna is still in use. The Navy required a more powerful and more efficient antenna. Hagaman and his associates felt they knew of such a design and prepared a proposal. After proposing what they thought was a unique design they now worried that the Navy would ask them to actually build one. And they did. Anyone who has done practical engineering knows this problem. Most times, the electrical problems are well understood and it's the practical engineering problems that occupy most of the time. This project was no different. The antenna design for NAA was called the Trideco and the chosen site was at Cutler, Maine. The antenna was required to have an efficiency of at least 50%, which, at that time, had never been achieved. A German antenna was erected during the Second World War called Goliath. It was quite efficient but was limited both in power and efficiency by the wartime lack of copper and other suitable materials. It was used for submarine communications. After the war, the then Soviet Union seized the Goliath antenna, packed up its massive cables and towers, and assembled it inside the Soviet Union near Gorky. (I'm not sure where we learned about the design of the Goliath. I wonder if it was from captured German plans?) NAA is located on a peninsula at Cutler, Maine. A diagram of this station shows two giant sub-antennas, each as large as several football fields and requiring twenty six 800-to-900 foot towers fed by two large transmitters. The antenna is split into a North and a South array. Each array is fed from a separate helix building and a transmitter building housing two transmitters is also located midway between the arrays. The transmitters can each supply one megawatt. Each antenna array resembles a six-sided compass rosette. The antenna feed point is located at the center of the rosette where the special building called the helix house is located. Looking over a schematic of the helix house equipment you see what looks like a simple matching network consisting of a few coils called variometers and something called a reactor. A variometer consists of two coils, a stator and a rotor. The rotor is located inside of the stator and is connected in series with the stator. When the rotor is rotated the mutual coupling either aids or reduces the effective inductance of the variometer. Since the antennas are operated below their natural resonance their impedance is capacitive and must be tuned by a series variometer. However, when looking at the equipment inside the helix house you see nothing familiar. In reality, this is a link-coupled antenna matching circuit, but that is where the similarity to familiar low powered equipment stops. The helix house is jammed full of giant coils and openly wound transformers, most larger than a large truck. The inductor wires are about 4 inches in diameter consisting of multiple strands of Litz wire. The antenna itself is tuned with a series variometer while a shunt variometer couples the signal into the antenna tuner from a coaxial feed line leading from the transmitter through a long underground tunnel. A part of this matching network called a "saturable reactor transformer" or a "stretchable" reactor is used to slightly change the tuning of the antenna. Direct current from the modulator is fed into a separate winding on the reactor transformer's core and saturates the transformer magnetic core slightly in response to the requirements of the frequency-shift signal. This causes a slight variation in the transformer's inductance thereby slightly shifting the point of resonance to keep the antenna in tune. Otherwise the frequency shift may cause the antenna band-pass to be out of tune. This change accommodates the antenna frequency shift even though the shift may be only a few Hertz away. For example, NAA is known to have a very narrow bandwidth, depending on the operating frequency. The reactor increases the antenna bandwidth by slightly shifting the center frequency back and forth, along with the keystream. The reactor transformer is designed to allow up to thirty-five words per minute FSK keying, which is well above the rate that this system usually operates. In other designs, a resistor, called a bandwidth resistor, is used to reduce the antenna Q instead of a stretchable reactor transformer. The last stage of the matching network is the helix that is simply a multi-turn link-coupling transformer. Like all the other components, it too is massive. A picture of the helix house interior shows the helix coil standing two stories in height and with the same diameter. A technician standing atop it is dwarfed by its size. The selection of the metal alloy from which to strand the antenna wires was critical. At Cutler the wires (over one inch in diameter) were stranded of Calsum Bronze. This material has a higher resistance than copper and is very strong. The higher resistance was necessary so that the antenna conductors could be heated during icing weather conditions. It requires a megawatt of 60 Hz power to de-ice either antenna array. Aluminum is relatively cheap and lightweight however it does not have the tensile strength required in long spans. Stranded Calsum Bronze cable is capable of providing low resistance to RF current due to the skin effect at radio frequencies yet has an appreciable resistance at 60 Hertz. Sending current into the strand causes it to heat up and this heat is used to melt off antenna ice accumulations during the winter. The power required to melt the ice is supplied by a large Diesel generating plant located on the NAA property. At NAA during the winter months, one of the arrays is sometimes shut down to melt ice accumulations while the other continues to operate. After installation of the antenna, engineers encountered something unexpected called Aeolian vibration. This was an effect known to builders of high voltage electric transmission lines. The Aeolian vibrations result from an interaction of the wind with the suspended cables. It starts being noticeable when a steady side wind reaches about five miles an hour and continuous for an extended period of time. Aeolian vibration caused unexplained breakage of some wires in the cable strand and stress on the antenna. Attaching "Stockbridge dampers" on the conductor strands at strategic locations can prevent it. These dampers absorb the vibration energy and dissipate it in the form of heat. Aeolian vibration may also be controlled to some extent by the very heavy insulators weighing up to 800 pounds each, that are used in the cables and tower guys. Static electricity is also a problem in the large antennas. The accumulation of worldwide lightning storms, rain static and other similar weather phenomena result in the generation of a large potential difference between the ionosphere and the earth. Electrical charge is constantly leaking down to the earth and is not ordinarily detectable without special equipment. However, the charge accumulates around highly conductive structures such as tall towers thereby generating dangerous voltages at their top. A recorder placed at the top of the 1200-foot NSS tower at Annapolis recorded a three to five kV/meter potential difference in the atmosphere during an approaching thunderstorm. These high voltages cause flashover to occur across the insulators that can disrupt the transmitter and take the station off the air. Similar voltages have also been observed during snowstorms. Since flashovers cannot be completely eliminated, a special device was designed to deal with it. It uses an ultraviolet or current sensor to detect when current flow begins at the start of a flashover and briefly cuts the RF excitation power to the final amplifier for the duration of the flashover. This solves the problem in most cases but not under all conditions. The device is called the CCO (carrier cut-off) unit and is now used in some form at all of the Navy's VLF stations. As previously mentioned, the antennas for the Navy VLF stations are giants. They are constructed to have a lot of capacitance on top of the towers. In fact, they are nothing so much as a large capacitor with a one plate formed by the tower- supported wire panels suspended 1500 feet or so in the air and the other plate being the earth. A million watts or so are fed into this circuit and, as you would expect, preventing corona discharge from the very high voltage is very important design issue. Determining in what part of the antenna structure corona may be a problem is interesting. A scaled model of the antenna is built and as much as 50,000 volts at 60 Hertz is pumped into the antenna. During darkness, and when the adjustable test voltage is at its highest, the antenna lights up like a Christmas tree with hundreds of small individual corona discharges occurring at critical points on the suspended mesh. Obviously, some coronas are in the higher voltage locations and may require the antenna configuration to be modified. Boynton gave us an interesting picture showing a model antenna under test, and the individual coronas were visible. It looked like the model was decorated with many small Christmas lights that illuminated its outline against the night sky. These locations were modified until the corona did not appear. The Trideco antenna, used until recently by NSS in Annapolis, is similar to the antennas used by other VLF stations in that they have several large supporting towers between 700 and 1500 feet tall. For example, in Annapolis several towers were used to suspend the top wire panels; the tallest being 1200 feet and its base was insulated from ground. The VLF station at Lualualei, Hawaii has similar towers (two base-insulated towers 1500 foot in height) although the antenna design is quite different. The towers are made of steel and remind me of those used in a large suspension bridge. The amazing thing about these towers is that they rest on a single porcelain insulator. This design is something like an amateur vertical monopole using a Coke bottle for a base insulator. In this case, however, the insulator holds up an antenna that weighs several million pounds. All that weight concentrated upon this one insulator is truly amazing to see and it is a wonder how such a thing could hold all that weight. In fact, as we learned, there have been problems with them. Cracks have been found in base insulators that required them to be changed out! How does one hoist up an antenna tower supporting a mile square of steel cable over 1500 feet in the sky? Well, amazingly, a system of hydraulic jacks are available to do just that. Modern towers are fabricated with "jacking pads" provided on the corners near the tapered lower section. The antenna tower can be lifted, the insulator changed and the tower lowered back into place. Although there are no pictures of the equipment is use, you can image what it must be like when you consider that these insulators are nearly two stories tall. So far, I've given you a pretty good idea of what Hagaman talked about, describing his days developing and building these giant antennas for the Navy's VLF stations. He told us that his company was located out in Leesburg, Virginia and that's were they did testing on small-scale mock-ups of the giant antennas they built. He said that newer designs use a top-loaded monopole and this kind of antenna is a good radiator and economical to build. The now defunct Ground Wave Emergency Network (GWEN) stations, also designed by DECO, used this type of antenna thought they operated at LF and not VLF. Some Omega navigation stations also use the top-loaded monopole. The US and Russian Navies use VLF for ship and submarine communications and both countries use giant antennas. The firm of Kershner, Wright & Hagaman recently designed a VLF antenna for a Southwest Asian country. It is similar to the Trideco array located in the NW part of Australia. Several other nations are planning VLF antennas also. With the end of the Cold War you might expected no further orders for giant VLF antennas but its not so. Additional nations now have submarines that must remain hidden and require one-way communications too. In that, they are practicing a Cold War art in place for the past fifty years. AMRAD =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1020 From: Ted Swift Date: Fri Jul 28, 2000 9:44am Subject: Re: Re: Excellent book on wiretap detection Steve: Thanks for your kind words. You got it pegged just about right. I'm not exactly trying to "push" this book on people and Bill got the information about it from you and Jim Atkinson whose credentials are beyond challenge as anyone seriously connected with TSCM ought to know. He contacted me from a Hotmail account and wanted my telephone number and address, both of which are at my home. He expressed concerns about P.O. boxes and fraud. I didn't share with him my thoughts about Hotmail. I gave him my number. The phone rang a few minutes later. Don't know who it was as it came up "unavailable" on my Caller ID. I NEVER answer calls from "unavailable" numbers. That's why I have an answering machine to do the screening. The caller didn't leave a message. If it had been Bill, I would have picked up the line. Guess I'll never know. Anyway, thanks again for your support. Ted Swift At 02:17 PM 7/28/2000 -0400, you wrote: >Once upon a midnight dreary, DMI pondered, weak and weary: > >> Is it just me, or should there be a phone number (not just a >> fax) and an address (other than a P.O. Box) for contact >> info? I assume I am not the only Investigator that would >> not order a product from a business or person without this >> information? > >Ted operates a busy PI and consulting firm. Publishing the >books is a side effort. > >I can tell you from long experience, you waste a lot of >time letting your number out to the public. People who need >him know how to get hold of him. > >And what PI wants to publish a physical address? That >invites lunatics to drop in and waste your time, and >thieves to keep an eye on your place thinking you have >weapons and expensive equipment. Granted, a P.O. box does >not inspire confidence, but mail can be received there and >you weren't going to try to pick the thing up in person, >were you? > >Ted is an honest man. You can order with confidence, or >drop him an email and judge for yourself by the dialog with >him. > >Ted is not the only place to buy the book, but he is the >original source, and if you get it from him you can ask for >it to be autographed. > >I understand the reluctance, and you are proper to exercise >due diligence, especially in this field where frauds >outnumber the real thing by a substantial margin. Asking >here and receiving an endorsement hopefully will be >adequate for you. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > 1021 From: Gordon Mitchell Date: Fri Jul 28, 2000 1:53pm Subject: Re: Telephone Problem No solid answers but I have had some opportunities to observe situations which mimic these. 1. Lawyer calls opposing lawyer, leaves a voice mail message then (mistakenly thinks) he hangs up. Speakerphone is still on and records him discussing illegal eavesdropping that client did. Client later is sentenced to federal prison. This doesn't explain the lack of toll records but might be the beginning of some questions... Did B call his own phone number to check on something about 1:20? Did any of the participants of the meeting have a cellphone on them at the time (see following)? 2. President of company finds 30 seconds of a very confidential meeting recorded on his voice mail with message marked urgent. He concludes that someone is bugging his conference room and has recorded it to taunt him. Our conclusion is that after bumping the "talk" button (which redials to his voice mail) he bumps the buttons that record the call on voice mail and marks the call as urgent. This could be the explanation for both events... at least the last one. Rob Muessel wrote: > Here is a problem I encountered in recently and have yet to come up with > an acceptable explanation as to what happened and how. Any ideas? > > The situation: > > Two people are sitting in an office. Person A is the occupant of the > office. Telephone service is ISDN Centrex. He is meeting with Person B, > a consultant from another city. Together they are working on the > acquisition of another company. > > At approximately 11:30 AM they place a call to the cell phone of person > C, the president of the company they are trying to acquire. The cell > phone is apparently turned off or is in a no service area and the caller > hears the recorded message that the person they are calling is not > available. The phone is hung up. There is no voice mailbox for the > cell phone. > > Persons A and B then discuss certain aspects of the deal. > > At approximately 2 PM person B calls his office in the other city to > check voice mail. He hears a very intriguing message: approximately 3 > minutes of the conversation that took place in person Aís office after > the attempt to reach person C. The time stamp on the voice mail was > 1:20 PM. > > We examined toll records and found that the call to the cell phone was > of short duration, less than 30 seconds. We also found that there were > no calls made to person Bís office from any of phones in person Aís > company. > > A second incident involved a conversation person A had with a > receptionist at one of his companyís offices in another city while he > was traveling. This conversation appeared on the voicemail of another > employee in person Aís office five days after the conversation took > place. > > Any thoughts?? > > -- > Rob Muessel, Director email: rmuessel@t... > TSCM Technical Services Phone: 203-354-9040 > 11 Bayberry Lane Fax: 203-354-9041 > Norwalk, CT 06851 > USA > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS From: Matt Paulsen Date: Sat Jul 27, 2002 4:25am Subject: NIST - Acquisition of Design, Procurement and Installation of Wireless Data Network to Support a Digital Video Management System Somehow this is funny sad funny. http://www.eps.gov/spg/DOC/NIST/AcAsD/SB1341-02-Q-0596/SynopsisP.html D -- Acquisition of Design, Procurement and Installation of Wireless Data Network to Support a Digital Video Management System Modification 01 - Posted on Jul 10, 2002 Solicitation 01 - Posted on Jul 16, 2002 Amendment 01 - Posted on Jul 17, 2002 Amendment 02 - Posted on Jul 18, 2002 Amendment 03 - Posted on Jul 23, 2002 General Information Document Type: Presolicitation Notice Solicitation Number:SB1341-02-Q-0596 Posted Date:Jul 01, 2002 Original Response Date:Jul 23, 2002 Current Response Date:Jul 29, 2002 Original Archive Date:Aug 13, 2002 Current Archive Date:Aug 13, 2002 Classification Code:D -- Information technology services, including telecommunications services Set Aside:Total Small Business Contracting Office Address Department of Commerce, National Institute of Standards and Technology (NIST), Acquisition and Logistics Division, 100 Bureau Drive, Building 301, Room B129, Mail Stop 3571, Gaithersburg, MD, 20899-3571 Description This is a presolicitation notice for a competitive Request for Quotations (RFQ) to be conducted under Federal Acquisition Regulation (FAR) Part 13, Simplified Acquisition Procedures. The acquisition is a 100% small business set aside. The Government estimate for this acquisition is no more than $29,000.00. The scope of the acquisition requires a Contractor to design, procure and install a wireless data network that will support a Digital Video Management System providing 24 hour surveillance of Gate "F" of the U. S. Department of Commerce, National Institute of Standards and Technology's (NIST) Gaithersburg, Maryland campus that allows real time review capability to the NIST security office; and to provide a minimal amount of training for use of the system. The competitive RFQ, RFQ amendments, and all questions and answers related to this acquisition will be made available via the Internet at http://www.fedbizops.gov/. The RFQ is anticipated to be released to the vendor community on or about July 16, 2002 and will only be released and made available via the Internet at the above web site. Potential offerors are responsible for accessing the web site. Interested parties must respond to the RFQ in order to be considered for award of any resultant purchase order. There is no written "hard copy" RFQ document available, telephone requests will not be honored, and no bidders list will be maintained. Potential offerors are requested to direct all questions via email to Joseph.Widdup@n.... All responsible Offerors may submit a quotation. Quotation submission instructions will be included in the RFQ that is posted to the FedBizOps web site. Original Point of Contact Joseph Widdup, Contract Specialist, Phone (301) 975-6324, Fax (301) 975-8884, Email joseph.widdup@n... Current Point of Contact Joseph Widdup, Contract Specialist, Phone (301) 975-6324, Fax (301) 975-8884, Email joseph.widdup@n... 5854 From: James M. Atkinson Date: Sat Jul 27, 2002 6:49pm Subject: You can paint my porch A blonde, wanting to earn some money, decided to hire herself out as a 'handy-woman' and started canvassing a nearby well-to-do neighborhood. She went to the front door of the first house and asked the owner if he had any odd jobs for her to do. "Well, you can paint my porch," he said, "How much will you charge me?" The blonde, after looking about, responded, "How about $50?" The man agreed and told her that the paint and other materials that she might need were in the garage. The man's wife, inside the house, heard the conversation and said to her husband, "Does she realize that the porch goes all the way around the house?" The man replied, "She should; she was standing on it. Why...do you think she's dumb?" Humbled by her initial reaction, his wife said, "No. I guess I'm just guilty of being influenced by all the 'dumb blonde' jokes I've been hearing." A short time later, the blonde came to the door to collect her money. "You're finished already?" the husband asked. "Yes," the blonde replied, "and I had paint left over, so I gave it two coats." Impressed, the man reached into his pocket for the $50.00 and handed it to her. "And by the way," the blonde added, "it's not a Porch, it's a Lexus." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 5855 From: James M. Atkinson Date: Sat Jul 27, 2002 6:51pm Subject: Hoorah for Dennis Miller Hoorah for Dennis Miller! He said recently on his show, regarding the judges who declared the Pledge of Allegiance unconstitutional: "So, Your Honor, the Pledge is unconstitutional because it says 'Under God.' Guess that means when you were sworn in with your hand on a Bible, and at the end of your oath repeated, 'So Help Me God,' that makes your job unconstitutional, therefore you have no job, which means your ruling doesn't mean shit." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5856 From: Andre Holmes <1ach@g...> Date: Sun Jul 28, 2002 0:56am Subject: Emailing: abamoneylaundering2000 (2) Your files are attached and ready to send with this message. [Non-text portions of this message have been removed] 5857 From: Andre Holmes <1ach@g...> Date: Sun Jul 28, 2002 0:58am Subject: Emailing: abamoneylaundering2000 Money Laundering Pretext Identity Theft Social Engineering Robert Douglas American Privacy Consultants PrivacyToday.comT Global Privacy Issues At The Click Of Your MouseT Official website of American Privacy Consultants, Inc.T Home Contact Us Privacy News APC News Services Speeches -------------------------------------------------------------------------------- Privacy and Anti-Money Laundering Prevention: How To Handle Statutory Inconsistencies and Customer Expectations Money Laundering Enforcement Seminar American Bankers Association American Bar Association October 31, 2000 Emerging Threats To Financial Information Security: Identity Theft, Pretext, Social Engineering, Forgery, and Impersonation In The Information Age Robert Douglas, CEO American Privacy Consultants, Inc. (www.privacytoday.com) © 2000 Robert Smith Douglas, III More hi-tech methods of access to confidential customer account information are being developed by the financial services industry every day. At the same time threats to information security systems are on the rise. The challenge for the financial services industry, security professionals, law enforcement and Congress is to find the appropriate balance between ease of access for legitimate customers to their confidential information and the passage and enforcement of legislation designed to thwart the growing threats to customer information security. Access To Confidential Financial Information There can be no doubt that confidential customer account information is being accessed and sold every day. In fact, hundreds of web sites, newspapers, magazines, legal and investigative trade journals offer the sale of confidential financial information by private investigators and "information brokers". (For a detailed examination of fraud and access to financial information see Appendix I: Testimony of Robert Douglas before the U.S. House of Representatives, September 13, 2000) As an example, the following web page is from docusearch.com: Bank Account Search Search Price $249.00 Availability National Approximate Return Time 10-18 Business Days* Requires Subject's Full Name, Complete Street Address, Social Security Number* Search Description Given a Subject's full name, complete address and social security number, this search will return the bank name and address, account type, account number, (if available) and approximate current balance of all located personal accounts. We access a proprietary database and identify open accounts using the Subject's SSN, however this search will only identify accounts in the Subject's primary state the business resides. If you suspect accounts exist in more than the primary residing state, a separate search request for each state is required, and should include the Subject's address in that state. *This search requires the Subjects social security number. If the SSN is unknown, we will find it for the purposes of this search but it will not be included in your search result. NOTE: This search uses the Subject's social security number as the account identifier, so only primary account holders are returned. Also, be sure to include any additional information you may have, such as the Subject's home & work telephone, birthdate, mother's maiden name, etc, in the additional comments section. This will greatly increase the odds of a successful search. Responsible Purpose For Search This search may return sensitive, confidential, and/or private information. For this reason, DOCUSEARCH.COM requires an explanation stating the purpose for requesting this search, its' intended use and supporting documentation. Additionally, we reserve the right to decline to perform any search which we deem not to be for a legitimate legal purpose or may cause emotional or physical harm. ImportantDisclaimer Financial searches are for informational purposes only, and are not acceptable as an exhibit or as evidence. Every effort is made to provide a complete & thorough search result. However, no method of research is 100% fool-proof and no firm can offer an absolute guarantee that every account will be found. *This search requires many hours of research and can't be rushed, as we want to return thorough, accurate results. Therefore, this is an approximate return time. (End) In addition to the sale of account information, advertisements offer mechanical devises designed to thwart information security technology. As an example, the following pages list items for sale at hackershomepage.com: SECTION#8 FINANCIAL HACKING 800b MAGNETIC STRIPE CARD READER/WRITER MAGNETIC STRIPE CARD READER/WRITER This device will allow you to change the information on magnetic stripe cards, on ALL 3 tracks, both high and low coercivity. It connects to your computer, either personal or laptop, and runs using supplied software. You must be running Windows 95, 98 or higher and have 8mb of RAM. Using this device is simple. Turn on your computer and run the supplied software. Now, swipe a card through the machine and all the information on the card will be displayed on the computer including account number, credit available, balance, name, etc. Next, using your keyboard, change any and all the information you'd like. Once complete, re-swipe the card through the machine and now your card will have the new information recorded onto the magnetic stripe. You can change any information you'd like including balance and credit information. Magnetic stripe cards are easily recognizable by the brown or black stripe and are found on credit cards, ATM cards, transportation cards, security access cards, etc. For a device that will change the information on smart cards check out item #177. See Photo! Bonus! 802 "Pin Code Hacker",853...............................................ASSEMBLED...$1,500.00 800c BLANK MAGNETIC STRIP CARDS These cards are able to be programmed using the above devices...................................ASSEMBLED...$5.00 each. 800e CARD PRINTING MACHINE This machine will print to all kinds of plastic cards including, credit cards, ATM cards, drivers licenses, smart cards, etc. All software is included to print graphics and text. TECHNICAL SPECIFICATIONS: Technology: Thermal Transfer, Resolution: 300 DPI, Printing Speed: 70 per/hr, Printing Orientation: 0o,90o,180o,270o. ,Printing Area: Full card size, software: IMAGO for Windows or for Macintosh, interface: Serial RS 232, Communication Protocol: ACK/NACK, Baud Rate: 9600/ 19200/38400, Bar Codes: EAN 8-EAN 13-2/5S-2/5I-CODE 39-UPCA-Monarc, Card Size: ISO CR-80 86 x 54mm, Card Thickness :0.27 to 0.80mm (self adapting), Card Material: PVC. ABS, POLYESTER, Power Source : 110-120V, 220-240V, +/- 10%, 50-60 Hz, Weight: 6 Kg, Dimensions: 230mm x 190mm x 190mm. See Photo! Bonus! 853.ASSEMBLED.$4,500.00 800f CARD EMBOSSING MACHINE This machine embosses all kinds of plastic cards, raising the numbers and lettering perfectly just like on credit cards. See Photo! Bonus! 853..................................................................ASSEMBLED...$4,500.00 800h PORTABLE 100 CARD READER This is the device you've heard about and everyone has been asking me to offer. Some waitresses and store clerks are using this device at work. It will store 100 credit card and magnetic stripe card swipes to memory and is powered by lithium camera batteries. The size of this device makes it easily concealable in your pocket. Device can download the information from the swipes to your computer using the supplied cable and software. The software will also easily write the information to any magnetic stripe card using item #800b (sold separately). Download and write to a card in under 20 seconds. Some people have been known to charge as much as $8,000.00 for this device, but we think that's too much. This device can be shipped COD to anywhere in the US. Customers outside of the US must prepay before it can be shipped. All instructions are included. See Photo! Bonus! 802 "Pin Code Hacker", 853.......................................................ASSEMBLED...$1,500.00 800x CREDIT CARD BUSINESS PACKAGE DEAL Purchase the following 3 items together at a remarkably discounted price and get in on the lucrative credit card business. Includes: #800b MAGNETIC STRIPE CARD READER/WRITER, #800h PORTABLE 100 CARD READER, and #828 CREDIT & CALLING CARD NUMBER CAPTURING SYSTEM. All completely assembled, with instructions and software. Save $650.00. Bonus! 802 "Pin Code Hacker", 853................ASSEMBLED...$3,300.00 801 UNIVERSAL INTERFACE HACKING DEVICE The Universal interface is used to connect various devices like GSM phones, amateur radios, radio scanner, smart cards, smart card emulators, EEPROM's, PIC's, organizers, magnetic stripe readers/writers to the PC. The Universal interface has to be connected to a free 25 pin Serial/COM port. In case your PC has only 9 pin Serial/COM ports, a 9pin-to-25pin Adapter is needed, which you can find at any computer or office supply store. In order to connect it to various devices, you need only additional connectors and cables. We are offering as accessories a small range of various connectors and cables for multiple applications but will be expanding this accessory product line in the future. The greatest advantage is the modularity that the interface has. It has accessories for various applications, that can be combined or used separately. The needed power supply is taken from the COM/RS232 port and so it is perfectly suitable for mobile applications (Laptops and Notebooks). You don't have to carry everything with you, only the accessories that you will need. The interface was developed for mobile applications. It measures ONLY 55mm*17mm*66mm. The voltage supply (5V) is taken from the serial port. In the interface is also an integrated 3.579545MHz oscillator, this makes it possible to use the it as a smart card reader/writer. An inverter is additional integrated, so the possibility exists to invert all or individual lines. Thus highest compatibility is ensured, for current and future applications, by the most diverse adjustment possibilities. With this ability the interface can be used with a multiplicity of freeware, shareware as well as commercial software applications. It is suitable for 5V and also for 3.0V applications, full-duplex (3 lines) is supported as well as half-duplex (2 lines), with and without handshake. See Photo! .................................................................................ASSEMBLED...$595.00 ACCESSORIES for 801 801a SMARTCARD READER/WRITER ATTACHMENT (Compatible with DumbMouse, Phoenix, SerProg, SmartMouse, PC/SC driver available) Includes both large and small card slots. This product, in combination with product #801, is exactly the same as products #177 and #500, except that it includes both the normal-sized and smaller-sized card sockets, and will also work with software designed for parallel programmers. The greater advantage with this product is that it is expandable and compatible with upcoming future technologies. By using the various settings the interface offers, it is compatible with the mostly used smart card readers/writers like the Phoenix interface (mostly used in SatelliteTV applications), DumbMouse, SerProg, SmartMouse and others. With this compatibility the interface is working with a wide range of freely available software and drivers. With the interface and the included software and PC/SC driver, you are able to read/write almost all SmartCards like: * Memory SmartCards: TeleCards, I2C, 2-wire, 3-wire , MicroWire * CPU SmartCards: T=0, T=1, and all asynchrone SmartCards with 3.58 MHz clock. Like: GSM Sim cards, Cashcards, DSS, CryptoFlex, CyberFlex, GPK2000, MPCOS, MultiFlex, PayFley, Starcos, * White Wafer Cards (with a PIC16X84), Gold Wafer Cards (PIC16X84+EEPROM 24LC16), MM2 and other compatible. The disadvantage of most commercial readers/writers is that in most cases they are using a PIC or similar CPU to communicate with the smart card. In such cases you are only able to use software that you get with the reader/writer, and 3rd party software that explicitly supports that particular reader/writer. The software uses a driver/API that will in most cases not allow you to use or try some nonstandard commands. This is a limitation, not appreciated by software developers. Not to mention that you will not be able to use a wide range of application software available on the Internet. The interface is a direct reader/writer, communicating directly with the smart card, without drivers, you can directly and without any limitation access every card. The interface is the only available smart card reader/writer capable of programming wafer cards without a power supply. You can program the PIC16X84 and the EEPROM from the Wafercard using your notebook. Includes software on CD-ROM. See Photo!....ASSEMBLED...$195.00 801b & 801c SMARTCARD EMULATOR/DATALOGGER ATTACHMENT (compatible with: Season7, ASIM, and datalogger) Emulates: GSM, Irdeto, VideoCrypt I+II, EuroCrypt, D2Mac, Cashcards. The smart card emulator is a development tool for the hardware and software developer. The PCB has the standard smart card dimensions. It is inserted into the MasterDevice, instead the smart card, and the other end is connected to the PC, using the interface. With the proper use of emulator software the PC can emulate a smart card. The connection is Season7 and ASIM compatible. All 8 ISO contacts are taken to the socket, so the PCB can also be used to emulate/analyze non-standard smart cards. It can also be connected to the parallel port, in order to be used with software written for the parallel port. Beside the "Normal ISO 7816" version we also offer a "small" SIM version. This version is used mostly for GSM/PCN applications, for phones that are using the Small SIM format. The smart card emulator/datalogger can also be used on any device where smart cards are used, like satellite and network tv decoders and other applications. Includes software on CD-ROM. 801b Normal ISO 7816 version. See Photo!...................ASSEMBLED...$150.00 801c Small SIM version. See Photo!.......................................KIT...$100.00 828 CREDIT & CALLING CARD NUMBER CAPTURING SYSTEM This system is just like the one recently featured on TV news that is currently being used at airports and shopping malls, and netting millions of dollars for its operators. This all-in-one hardware system will allow you to remotely capture unlimited credit card and calling card numbers (including PIN numbers and expiration dates) when entered into pay telephones. You can even capture the names and billing addresses of the card holders. The system can be used remotely from the comfort of your home, a payphone, or a cell phone. Information is stored in memory and displayed via LCD. A REAL money-making system that can net you millions without ever being caught, and can pay for itself after just a few minutes of use. You can literally capture hundreds of valid numbers and related information every day, whenever you want. Can be used in conjunction with #800b to write your own credit cards. All instructions included. See Photo! Bonus! 802 "Pin Code Hacker", 853...........................................................................ASSEMBLED...$950.00 857 BILL CHANGER & VENDING MACHINE HACKER/JACKPOTTER This handheld, concealable device will cause various affects on different machines including BILL CHANGER MACHINES. It's portable, battery powered, and measures 2-1/4 inches by 4 inches. Included are complete instructions on how to obtain free products and to jackpot machines of coins by a simple push of a button. Many vending machines hold in excess of $50.00 change, while bill changer machines can hold in excess of $500.00. Device will work on both 120 and 220 volt systems, making it effective anywhere in the world. We've now combined features from our now-discontinued Soda Machine Hacker. Not only will this device jackpot the soda machine, but in many instances will cause cans of soda to drop down the chute. Bonus! 853..................ASSEMBLED...$375.00 867 EMP MANIPULATION DEVICE This device is so controversial that we can't tell you what it can be used for except for the general information in this description. However, ALL instructions are included with the purchase of this device. This device drastically affects ALL electronic machines when brought into close proximity (Within 1 meter or 36 inches approx.) The highly directional pulsed signal can make you RICH if used in an illegal fashion, which, of course, we do not recommend. This system includes a "general" antenna but several specialized antennas are also available. See Photo! Bonus! ...................................................ASSEMBLED*...$775.00 OPTIONAL ANTENNA PACKAGE FOR ITEM# 867 867a Antenna the width of paper currency (works in most countries). 867b Antenna the width of a coin (works in most countries). 867c Antenna the width of a credit card (works in ALL countries). See Photo! Kit and instructions to build ALL 3 antennas (no soldering required)...KIT...$175.00 We WILL NOT answer emails from anyone asking about illegal activities, or how to use our products for illegal activities...they will automatically be deleted. All products are designed for testing and exploring the vulnerabilities of CUSTOMER-OWNED equipment, and no illegal use is encouraged or implied. We WILL NOT knowingly sell to anyone with the intent of using our products for illegal activities or uses. It is your responsibility to check the applicable laws in your city, state, and country. (END) There also can be no doubt that traditional methods of identity theft coupled with information age ease of access to citizens biographical information is contributing to increases in both the number of cases resulting in financial losses and the size of the losses. Reuters recently reported a dramatic example of identity theft coupled with financial fraud resulting in substantial losses: Man pleads guilty to stealing executives' personal data Tuesday September 26, 5:27 pm Eastern Time By Gail Appleson, Law Correspondent NEW YORK, Sept 25 (Reuters) - A Tennessee man has pleaded guilty to using credit card and bank information stolen from top executives at major corporations to buy diamonds and Rolex watches, federal prosecutors said on Tuesday. James Rinaldo Jackson, 39, of Memphis pleaded guilty to 29 counts of conspiracy, credit card, mail, wire and bank fraud. Prosecutors said he entered his plea during a hearing on Monday in Manhattan federal court. Among the victims were John Alm, president of Coca-Cola Enterprises, the largest bottler of Coke; Richard Fuld, chief executive officer of Lehman Brothers Holdings; Stephen Bollenbach, chief executive of Hilton Hotels Corp., and Gorden Teter, the former CEO of Wendy's International, who is now deceased. Other victims included Dr. James Klinenberg, former administrator of Cedars-Sinai Medical Centre in Los Angeles and Nackey Loeb, former president of the Union Leader Corp. and publisher of the Union Leader and New Hampshire Sunday News. Teter, Klinenberg and Loeb had died shortly before the information was stolen. Jackson faces a possible maximum sentence of 30 years in jail and $1 million fine on each of 27 bank, mail and wire fraud charges; five years in prison and a $1 million fine on the the conspiracy charge, and 20 years in prison and $250,000 fine on the credit card fraud charge. The diamonds and Rolex watches he tried to buy were worth a total of more than $730,000. During the hearing, Jackson admitted that between December 1999 and last February he stole financial information about his victims. Impersonating the victims, he then contacted their banks and credit card companies to arrange for their billing addresses to be changed to various hotels in the Memphis, Tenn. area. He explained to the court that he had obtained the information by researching his victims in ``Who's Who In America'' and in some cases used the Internet to obtain personal information about the executives. Jackson admitted that he obtained information about Teter by deceiving Wendy's into believing that he was a potential franchisee. He learned through the Internet that Teter had died and then obtained personal information about the deceased executive through a variety of means including the funeral home. Using the names of his victims, he contacted jewelry dealers throughout the United States and bought diamonds and Rolex watches that he had seen on the dealers' Internet Web sites. Jackson paid for purchases by either charging them to the victims' credit card numbers, having banks wire money from the victims' bank accounts or mailing the dealers fraudulent checks. He then had the jewelry dealers ship the diamonds and watches to the Memphis-area hotels. Jackson then made reservations at the hotels in the victims' names and notified the hotels to expect a package delivery. He, sometimes along with an accomplice, then picked up the packages. Jackson was arrested on Feb 25 near Memphis by FBI agents who watched him trying to pick up a package addressed to one of his victims. (END) This case may be dramatic but does not stand alone. Recent figures have placed identity theft coupled with financial fraud as one of the fastest growing crimes in the United States today. Current estimates place the figure at 500,000 cases each year with an average loss of $17,000 per case. Indeed, the United States Secret Service has begun to note the presence of organized criminal activity in the area of identity theft and financial fraud. (see Appendix II: Testimony of Bruce A. Townsend, Special Agent In Charge, U.S. Secret Service - Financial Crimes Division; before the U.S. House of Representatives, September 13, 2000) Statutory Inconsistencies Create Hurdles To Law Enforcement Given the reality of the growing threat to the protection of customer account information, the challenge ahead is for the United States Congress and state legislatures to pass laws empowering state and federal law enforcement to combat these threats without choking off legitimate technological advances and ease of access for legitimate consumers to their own account information. With the passage of Gramm-Leach-Bliley Congress took a major step in trying to define who will have access to confidential and personal information and at the same time attempted to thwart the use of fraud by identity thieves to illegally access customer information. The federal regulatory agencies are in the process of enacting regulations to enforce the provisions of Gramm-Leach-Bliley as we meet here today. It is too early to determine how Gramm-Leach-Bliley and the subsequent regulations now under consideration will impact many important areas of privacy surrounding financial information. However, it is not too early to recognize that Gramm-Leach-Bliley has failed in thwarting the efforts of disreputable private investigators and "information brokers" in the advertising and sale of confidential account information as demonstrated above and in my numerous appearances before Congress. Section 521 of Gramm-Leach-Bliley has a child support exemption provision allowing for the use of fraud against financial institutions in order to obtain customer account information under certain conditions. This one exemption has allowed private investigators to continue to advertise the sale of confidential financial information and has created a hurdle for law enforcement in enforcing Gramm-Leach-Bliley. Gramm-Leach-Bliley needs to be amended at once. The narrowly crafted child-support exemption for the use of fraud is being used as an advertising shield by private investigators to hide behind while continuing the covert sale of financial information that falls outside of the GLB exemptions. The provisions of GLB that allow for pretext in a child support situation state as follows: Sec. 521 (g) NONAPPLICABILITY TO COLLECTION OF CHILD SUPPORT JUDGMENTS- No provision of this section shall be construed to prevent any State-licensed private investigator, or any officer, employee, or agent of such private investigator, from obtaining customer information of a financial institution, to the extent reasonably necessary to collect child support from a person adjudged to have been delinquent in his or her obligations by a Federal or State court, and to the extent that such action by a State-licensed private investigator is not unlawful under any other Federal or State law or regulation, and has been authorized by an order or judgment of a court of competent jurisdiction. The operative language is: "No provision of this section shall be construed to prevent any State-licensed private investigator.from obtaining customer information of a financial institution...to collect child support from a person adjudged to have been delinquent in his or her obligations by a Federal or State court...AND has been authorized by an order or judgment of a court of competent jurisdiction." This language clearly means from both the legislative history of the act and the plain face of the statute that a judge (Court) must specifically authorize the use of pretext to obtain customer information of "a financial institution". I am not aware of a single case where a Court has authorized a private investigator to intentionally deceive a financial institution in order to obtain customer information. It is easy to understand why this has not happened and most likely never will. The presumptive evidentiary burden that would be required to obtain such an order would easily support the issuance of a subpoena to the institution that the information is being sought from and is being contemplated for pretext. Unless Congress has evidence that financial institutions routinely falsify responses to subpoenas it is hard to fathom why this provision was placed in GLB. Further, this section states: "to the extent reasonably necessary to collect child support from a person adjudged to have been delinquent in his or her obligations by a Federal or State court." The legislative history of this exemption was a claim made by some representatives of the private investigative industry that pretext was needed as there was no other method available to locate the financial institution holdings of deadbeat parents who lie to the Courts. This claim was not true at the time, as there are many lawful ways to pursue overdue non-custodial child support payments and many taxpayer funded agencies designed to fill that role. However, even if this argument is accepted as a legitimate historical reason for the exemption, there is no longer any legislatively justifiable reason to maintain the exemption given the provisions of the Personal Responsibility and Work Opportunity Reconciliation Act of 1996 which are now in effect and mandate that all financial institutions cooperate with the government by providing the financial information of delinquent child support parents directly to the Federal government for asset forfeiture. The following excerpt describing this procedure is from a front-page article written by Robert O'Harrow, Jr. in the Sunday, June 27, 1999 edition of the Washington Post: As part of a new and aggressive effort to track down parents who owe child support, the federal government has created a vast computerized data-monitoring system that includes all individuals with new jobs and the names, addresses, Social Security numbers and wages of nearly every working adult in the United States. Government agencies have long gathered personal information for specific reasons, such as collecting taxes. But never before have federal officials had the legal authority and technological ability to locate so many Americans found to be delinquent parents -- or such potential to keep tabs on Americans accused of nothing. The system was established under a little-known part of the law overhauling welfare three years ago. It calls for all employers to quickly file reports on every person they hire and, quarterly, the wages of every worker. States regularly must report all people seeking unemployment benefits and all child-support cases. Starting next month, the system will reach further. Large banks and other financial institutions will be obligated to search for data about delinquent parents by name on behalf of the government, providing authorities with details about bank accounts, money-market mutual funds and other holdings of those parents. State officials, meanwhile, have sharply expanded the use of Social Security numbers. Congress ordered the officials to obtain the nine-digit numbers when issuing licenses -- such as drivers', doctors' and outdoorsmen's -- in order to revoke the licenses of delinquents. Enforcement officials say the coupling of computer technology with details about individuals' employment and financial holdings will give them an unparalleled ability to identify and locate parents who owe child support and, when necessary, withhold money from their paychecks or freeze their financial assets. (End of excerpt) (Emphasis added by Robert Douglas) O'Harrow went on to describe in more detail how the new system operates: Next month, financial institutions that operate in multiple states -- such as Crestar Financial Corp., Charles Schwab & Co. and the State Department Federal Credit Union -- will begin comparing a list of more than 3 million known delinquents against their customer accounts. Under federal law, the institutions are obligated to return the names, Social Security numbers and account details of delinquents they turn up. The Administration for Children and Families will then forward that financial information to the appropriate states. For security reasons, spokesman Kharfen said, the agency will not mix the financial data with information about new hires, wages and the like. Bank account information will be deleted after 90 days. In a test run this spring, Wells Fargo & Co. identified 72,000 customers whom states have identified as delinquents. NationsBank Corp. found 74,000 alleged delinquents in its test. Later this year, smaller companies that operate only in one state will be asked to perform a similar service. Officials say most of these institutions will compare their files against the government's. But some operations that don't have enough computing power -- such as small local banks, credit unions and securities firms -- will hand over lists of customers to state officials for inspection. States can then administratively freeze the accounts. In California, more than 100 financial institutions have already handed over lists of all their depositors to state officials, including names, Social Security numbers and account balances, a state official said. (End of excerpt) (Emphasis added by Robert Douglas) Finally, the exemption places GLB in direct conflict with other federal statutes outlawing wire and mail fraud and unfair and deceptive trade practices. The exemption also places GLB in direct conflict with many State laws and creates nothing short of a judicial quagmire. Simply put, there is no legitimate reason to continue the child support exemption to Gramm-Leach-Bliley. There is a legitimate reason to strike it from the statute as companies are using it as pretence to advertise their ability to locate financial institution customer information. All the ad need say is the request must be in compliance with applicable laws and that all requests are performed on that basis. Conclusion Threats to information security systems of the financial services industry abound. With advancing technology we see the re-emergence of traditional methods of identity theft, pretext and fraud on the rise again. Law enforcement must be aggressive in combating these crimes before citizens become concerned about the safety and integrity of the industry. Congress should not be in the business of creating hurdles to effective law enforcement protection of customers of the financial services industry. Congress should be in the business of assisting the industry and consumers by empowering law enforcement to aggressively prosecute identity thieves of all types. © 2000 Robert Smith Douglas, III Appendix I Statement by Robert Douglas before the Committee on Banking and Financial Services United States House of Representatives Hearing On Identity Theft and Related Financial Privacy Issues September 13, 2000 My name is Robert Douglas and I am the co-founder and Chief Executive Officer of American Privacy Consultants, Inc. located in Alexandria, Virginia (www.privacytoday.com). American Privacy Consultants assists organizations and businesses understand and implement appropriate privacy policies, strategies, defenses, educational programs, training, and auditing. I appreciate the opportunity to appear before this committee once again to address the issue of identity theft, "pretext calling", and other deceptive practices still in use by some "information brokers", private investigators, judicial judgment collectors and identity thieves to illegally access the personal and confidential information of customers of financial institutions. Unfortunately, in spite of the enactment of legislation drafted by this Committee to outlaw such practices, these methods not only survive but also continue to grow in volume, scope, and methodology. Chairman Leach, I want to personally thank you and the Committee for your continued willingness and desire to address this serious issue first by crafting and passing much needed legislation and now in an oversight capacity. I am personally aware of the amount of time the Committee members and staff have invested in this problem over the last three years and as a citizen applaud the Committee's willingness to tackle these issues. I also would like to single out for recognition Jim Clinger, the Committee's Senior Counsel and Assistant Staff Director. Over the last three years I have had the unique pleasure of working with Jim on a regular basis and he is a true credit to this Committee and to the United States Congress. Above all he is a true gentleman. Finally, I would like to thank John Forbes, Special Agent - United States Customs Service; and, Alison Watson, Professional Staff Member of the Committee for their work over the last month in preparation for this hearing. H.R. 4311 Although I was specifically asked to address the use of pretext and other deceptive techniques to access confidential financial information, I would like to make a few brief observations concerning HR 4311. There can be little doubt that identity theft is one of the fasting growing crimes in the United States today. Each year hundreds of thousands of Americans fall prey to identity thieves. The financial and credit damage implications are severe for the individual who is the victim of identity theft. Additionally, retailers and financial institutions suffer financial losses as a result of identity theft. Finally, the nation as a whole suffers in increased prices for retail products and financial services including the cost of credit. The advent of the World Wide Web has brought increased opportunities for identity thieves through ease of access to personal, biographical data needed to perpetrate identity crimes and facilitates ordering merchandise absent a face-to-face encounter with a store clerk. These facts require that we examine areas of weakness that identity thieves exploit. In 1998 I demonstrated for this Committee the ease with which an individual can purchase private and confidential financial information. It is even easier to obtain the name, address, date of birth, social security number, mother's maiden name, phone number, and often the employment of any individual in the United States today. All of this information is for sale on the web. In a nutshell, all the information needed to steal a citizen's identity and create financial havoc is available on the Internet for little or no cost. The largest source of up-to-date personal, biographical information is credit bureaus. The sale and resale of credit header information by credit bureaus to private investigators, information brokers and judicial judgment collection professionals results in this information being accessible to anyone for a fee. This is big business. Several large companies make millions of dollars each year reselling personal information gathered by the credit bureaus. When citizens apply for credit or enter into a credit transaction they do not know that their personal, biographical information is then resold to any individual with a few bucks and a web browser. If the level of trust in the Internet is ever to rise from the relatively low position it now occupies, the sale of personal information must be brought under control. A good place to begin is by curtailing the sale of credit header information absent a permissible purpose as defined currently within the FCRA. For that reason I believe Section 8 of HR 4311 is long overdue. Pretext and other Deceptive Practices July 1998 through September 2000 On July 28, 1998, while appearing before this Committee, I stated: "All across the United States information brokers and private investigators are stealing and selling for profit our fellow citizens personal financial information. The problem is so extensive that no citizen should have confidence that his or her financial holdings are safe." Sadly, I return today to inform this Committee that my statement of 1998 remains true today. While the illegal access of financial information continues, progress has been made. When we last met in July of 1998 four steps were required in order to stop these practices. First, the financial services industry needed to understand and take affirmative steps to combat the threat posed by unscrupulous information brokers, private investigators, and identity thieves. Second, tough federal legislation was needed to outlaw the use of pretext and deception as a means to access confidential financial information. Third, appropriate federal regulatory agencies needed to create standards and regulations designed to assist institutions in the safeguarding of financial information and to reflect the legislative intent encompassed within any legislation enacted by Congress. Finally, aggressive prosecution of individuals and companies who steal, buy, and/or sell personal financial information was required to signal that the integrity of our nation's financial system is a law enforcement priority. The first three sides of the square have been completed. The financial services industry has made significant progress in beginning to combat identity theft and pretext through a sober recognition that this is not a problem that can be ignored if the industry wishes to maintain a reputation for providing confidentiality to customers. This recognition has been acted upon through the use of training programs and educational materials to begin the education of financial services industry professionals to the threats posed by identity thieves of all types. Many financial institutions have begun to enact internal standards designed to identify and thwart the practices of identity thieves and infobrokers. Is there more to do? Absolutely. Is the financial services industry taking the confidentiality of the records it safeguards on behalf of customers seriously enough to continue to move forward in this area? I believe so. This Committee and Congress moved quickly to pass legislation designed to punish those who would impersonate others in order to gain access to private financial records. With the passage of Gramm-Leach-Bliley, there is now federal law outlawing the use of pretext and other deceptive techniques to gain access to personal financial information absent several narrowly defined and commonly misunderstood exceptions. The federal regulatory agencies with direct supervisory function of the financial services industry moved quickly in 1998, by means of an advisory letter and other steps, to alert all institutions to the practices of identity thieves and information brokers. These same agencies are continuing as we meet here today to develop standards and regulations in keeping with the intent of Gramm-Leach-Bliley. With the first three sides of the box either erected or under construction, it is now time to build the final wall through aggressive enforcement action. With the enactment of Gramm-Leach-Bliley last November, I assume that the Federal Trade Commission and appropriate criminal enforcement agencies are now preparing to use the tools Congress and the President handed them. To my knowledge there has been one federal enforcement action brought by the FTC against an information broker. That civil action was begun prior to the enactment of Gramm-Leach-Bliley under laws designed to thwart "unfair and deceptive trade practices". Several states, notably Massachusetts, have aggressively pursued illegal information brokers. Again, these actions were taken prior to GLB and under state laws against illegal trade practices. It is time for tough nationwide enforcement of the civil and criminal provisions contained within Gramm-Leach-Bliley. In the invitation letter I received from the Committee to testify today I was asked to specifically address three areas: 1) The extent to which the use of pretext and other deceptive means continue in spite of the passage of Gramm-Leach-Bliley; 2) The effectiveness of efforts by the financial services industry to deter and detect fraudulent attempts to obtain confidential account information; and, 3) Other threats to financial privacy emerging today. The Extent To Which Deceptive Practices Continue Post Gramm-Leach-Bliley The use of pretext and other means of deception to trick financial institution employees and customers into disclosing personal and confidential financial information that I testified about two years ago continue unabated. Books have been written about pretext to teach and share common methods. Discussion groups abound on the Internet with the trading of new and improved techniques almost on a daily basis. Classes are held in which pretext methods are shared for a price. The techniques are becoming more complex and refined. Advertisements on the World Wide Web have doubled in the past two years. Here is a typical example: Bank Account Search Search Price $249.00 Availability National Approximate Return Time 10-18 Business Days* Requires Subject's Full Name, Complete Street Address, Social Security Number* Search Description Given a Subject's full name, complete address and social security number, this search will return the bank name and address, account type, account number, (if available) and approximate current balance of all located personal accounts. We access a proprietary database and identify open accounts using the Subject's SSN, however this search will only identify accounts in the Subject's primary state the business resides. If you suspect accounts exist in more than the primary residing state, a separate search request for each state is required, and should include the Subject's address in that state. *This search requires the Subjects social security number. If the SSN is unknown, we will find it for the purposes of this search but it will not be included in your search result. NOTE: This search uses the Subject's social security number as the account identifier, so only primary account holders are returned. Also, be sure to include any additional information you may have, such as the Subject's home & work telephone, birthdate, mother's maiden name, etc, in the additional comments section. This will greatly increase the odds of a successful search. Responsible Purpose For Search This search may return sensitive, confidential, and/or private information. For this reason, DOCUSEARCH.COM requires an explanation stating the purpose for requesting this search, its' intended use and supporting documentation. Additionally, we reserve the right to decline to perform any search which we deem not to be for a legitimate legal purpose or may cause emotional or physical harm. ImportantDisclaimer Financial searches are for informational purposes only, and are not acceptable as an exhibit or as evidence. Every effort is made to provide a complete & thorough search result. However, no method of research is 100% fool-proof and no firm can offer an absolute guarantee that every account will be found. *This search requires many hours of research and can't be rushed, as we want to return thorough, accurate results. Therefore, this is an approximate return time. (End) This advertisement is remarkable in many regards. The ad claims to "access a proprietary database and identify open accounts using the subjects SSN", yet "this search requires many hours of research and can't be rushed, as we want to return thorough, accurate results" and the search may require "10-18 business days". There is no proprietary database available to private investigators or information brokers that by use of the SSN (social security number) banking information can be obtained. In fact this ad used to say the company accessed a "federal database" to obtain the information. The ad further states: "Also, be sure to include any additional information you may have, such as the Subject's home & work telephone, birthdate, mother's maiden name, etc, in the additional comments section. This will greatly increase the odds of a successful search." Why would a database accessed by SSN require this personal information? It wouldn't. But pretext does. Many financial institutions use the mother's maiden name as a password. Further, some institutions will ask for your home or work phone numbers to verify the account holder. Finally, the phone numbers are often required as part of a pretext contact made directly to the account holder. The ad also states: "Additionally, we reserve the right to decline to perform any search which we deem not to be for a legitimate legal purpose or may cause emotional or physical harm." Perhaps this is an attempt to signify that a search request must satisfy GLB and other applicable State and Federal laws. Perhaps not. Here is the transcript of an email contact I had with Docusearch: From: DOCUSEARCH.COM To: email address deleted Subject: Re: Information Request Sent: Mon 3/20/00 1:41 PM You will first have to locate his address in the current residence state. This may be accomplished with a Locate by Previous Address Search. Then you can order the Bank Account Search. At 01:38 PM 3/20/00 , you wrote: >------------Begin, Information Request from visitor----------- >My Name Is : Rob Douglas >My Email Address Is : (deleted) >My Telephone Number Is : (deleted) >My Question Pertains To : Other: Explain Below >Comments : I have a client who is owed a substantial amount of money >by a potential defendant who left the area and closed his personal and >corporate bank accounts. I have an old home address for the potential >defendant and know what state he moved to. What searches would you >recommend to locate the potential defendant and his personal and >corporate bank accounts? >------------End, Information Request from visitor ----------- The ">" portions represent the email I sent to Docusearch using their on-line request form. Three minutes later I received the reply that I could order the bank account search in a situation that would clearly be illegal under GLB if pretext were used. I would hope that members of this Committee would find the services offered and language of the advertisements by Docusearch to be as disturbing as I do. I suspect many of the members of this Committee would wonder why this firm is allowed to operate in this fashion given the provisions of GLB and the applicable "unfair and deceptive trade practice" sections of Federal law. The excuse might be offered that this is just one company that no one in a position of responsibility to address these practices was aware of. That excuse would ring hollow. Docusearch is the company that sold personal information concerning Amy Boyer to a stalker that resulted in the murder of Ms. Boyer and the suicide of the stalker. Amy's parents have testified before Congress and have been widely covered in the media. In fact, Amy's death has led to consideration of legislation by this Congress to outlaw the sale of social security numbers. Throughout all this attention Docusearch has made one change to the web site where it advertises. Docusearch no longer publicly advertises the sale of social security numbers. But Docusearch continues to do business selling personal and confidential information. The attention to Docusearch does not end there. Docusearch was the cover story for Forbes magazine on November 29, 1999. This was seventeen days after President Clinton signed GLB into law. In the article Dan Cohn of Docusearch literally bragged about his abilities to obtain personal information about a subject. Here is the opening quote from the Forbes cover story: THE PHONE RANG AND A STRANGER CRACKED SING-SONGY AT THE OTHER END OF the line: "Happy Birthday." That was spooky--the next day I would turn 37. "Your full name is Adam Landis Penenberg," the caller continued. "Landis?" My mother's maiden name. "I'm touched," he said. Then Daniel Cohn, Web detective, reeled off the rest of my "base identifiers"--my birth date, address in New York, Social Security number. Just two days earlier I had issued Cohn a challenge: Starting with my byline, dig up as much information about me as you can. "That didn't take long," I said. "It took about five minutes," Cohn said, cackling back in Boca Raton, Fla. "I'll have the rest within a week." And the line went dead. In all of six days Dan Cohn and his Web detective agency, Docusearch.com, shattered every notion I had about privacy in this country (or whatever remains of it). Using only a keyboard and the phone, he was able to uncover the innermost details of my life--whom I call late at night; how much money I have in the bank; my salary and rent. He even got my unlisted phone numbers, both of them. (End of excerpt) One might wonder who Dan Cohn is and whom he sells this information to. Forbes answered that as well: Cohn operates in this netherworld of private eyes, ex-spooks and ex-cops, retired military men, accountants and research librarians. Now 39, he grew up in the Philadelphia suburb of Bryn Mawr, attended Penn State and joined the Navy in 1980 for a three-year stint. In 1987 Cohn formed his own agency to investigate insurance fraud and set up shop in Florida. "There was no shortage of work," he says. He invented a "video periscope" that could rise up through the roof of a van to record a target's scam. In 1995 he founded Docusearch with childhood pal Kenneth Zeiss. They fill up to 100 orders a day on the Web, and expect $1 million in business this year. Their clients include lawyers, insurers, private eyes; the Los Angeles Pension Union is a customer, and Citibank's legal recovery department uses Docusearch to find debtors on the run. Cohn, Zeiss and 13 researchers (6 of them licensed P.I.s) work out of the top floor of a dull, five-story office building in Boca Raton, Fla., sitting in cubicles under a fluorescent glare and taking orders from 9 a.m. to 4 p.m. Their Web site is open 24 hours a day, 365 days a year. You click through it and load up an on-line shopping cart as casually as if you were at Amazon.com. (End of excerpt) Amazingly, Cohn admits to the use of fraud and bribery: The researchers use sharp sifting methods, but Cohn also admits to misrepresenting who he is and what he is after. He says the law lets licensed investigators use such tricks as "pretext calling," fooling company employees into divulging customer data over the phone (legal in all but a few states). He even claims to have a government source who provides unpublished numbers for a fee, "and you'll never figure out how he is paid because there's no paper trail." (End of excerpt) The following excerpt reveals methods used by Cohn directly relevant to today's hearing and HR 4311: Cohn's first step into my digital domain was to plug my name into the credit bureaus--Transunion, Equifax, Experian. In minutes he had my Social Security number, address and birth date. Credit agencies are supposed to ensure that their subscribers (retailers, auto dealers, banks, mortgage companies) have a legitimate need to check credit. "We physically visit applicants to make sure they live up to our service agreement," says David Mooney of Equifax, which keeps records on 200 million Americans and shares them with 114,000 clients. He says resellers of the data must do the same. "It's rare that anyone abuses the system." But Cohn says he gets his data from a reseller, and no one has ever checked up on him. Armed with my credit header, Dan Cohn tapped other sites. A week after my birthday, true to his word, he faxed me a three-page summary of my life. He had pulled up my utility bills, my two unlisted phone numbers and my finances. (End of excerpt) And should there be any question as to the ability of a determined criminal to gain access to confidential information including financial information, the following excerpt is on point: He had my latest phone bill ($108) and a list of long distance calls made from home--including late-night fiber-optic dalliances (which soon ended) with a woman who traveled a lot. Cohn also divined the phone numbers of a few of my sources, underground computer hackers who aren't wanted by the police--but probably should be. Knowing my Social Security number and other personal details helped Cohn get access to a Federal Reserve database that told him where I had deposits. Cohn found accounts I had forgotten long ago: $503 at Apple Bank for Savings in an account held by a long-ago landlord as a security deposit; $7 in a dormant savings account at Chase Manhattan Bank; $1,000 in another Chase account. A few days later Cohn struck the mother lode. He located my cash management account, opened a few months earlier at Merrill Lynch &Co. That gave him a peek at my balance, direct deposits from work, withdrawals, ATM visits, check numbers with dates and amounts, and the name of my broker. (End of excerpt) Cohn is even willing to lead officials to believe he is a law enforcement officer as this excerpt demonstrates: How did Cohn get hold of my Merrill Lynch secrets? Directly from the source. Cohn says he phoned Merrill Lynch and talked to one of 500 employees who can tap into my data. "Hi, I'm Dan Cohn, a licensed state investigator conducting an investigation of an Adam Penenberg," he told the staffer, knowing the words "licensed" and "state" make it sound like he works for law enforcement. Then he recited my Social Security, birth date and address, "and before I could get out anything more he spat out your account number." Cohn told the helpful worker: "I talked to Penenberg's broker, um, I can't remember his name...." "Dan Dunn?" the Merrill Lynch guy asked. "Yeah, Dan Dunn," Cohn said. The staffer then read Cohn my complete history--balance, deposits, withdrawals, check numbers and amounts. "You have to talk in the lingo the bank people talk so they don't even know they are being taken," he says. (End of excerpt) But the Forbes reporter (Penenberg) did some further digging and uncovered what appears to be direct evidence of the use of impersonation and pretext in the following excerpt: Sprint, my long distance carrier, investigated how my account was breached and found that a Mr. Penenberg had called to inquire about my most recent bill. Cohn says only that he called his government contact. Whoever made the call, "he posed as you and had enough information to convince our customer service representative that he was you," says Russ R. Robinson, a Sprint spokesman. "We want to make it easy for our customers to do business with us over the phone, so you are darned if you do and darned if you don't." Bell Atlantic, my local phone company, told me a similar tale, only it was a Mrs. Penenberg who called in on behalf of her husband. I recently attended a conference in Las Vegas but don't remember having tied the knot. (End of excerpt) Finally, Cohn believes he is justified in what he does: Daniel Cohn makes no apologies for how he earns a living. He sees himself as a data-robbing Robin Hood. "The problem isn't the amount of information available, it's the fact that until recently only the wealthy could afford it. That's where we come in." (End of excerpt) I have one question. Why are Dan Cohn and Docusearch still in business? Docusearch is not alone. There are now more information brokers and private investigators openly advertising their ability to obtain and sell financial information then there were in 1998. These ads continue to be found on the World Wide Web, in the yellow pages and in legal and investigative trade journals. In fact, there has been an ad running in the local edition of the Legal Times that can be found in many law firms and federal offices here in Washington. I suspect copies can be found at the FBI, U.S. Attorney's Office, the Department of Justice, and the Federal Trade Commission. One phone call to this company determined they offer the ability to locate an address for an individual for $65 if the social security number is provided and $115 if the social security number is not provided. Further, and more to the point, for $200 they will supply the name of the bank, the type of account maintained and the balance in the account for the individual specified. There was a further offer extended by the company to confirm that the funds are available and there would be no charge if there were only minimal funds in the account. The scenario presented to the company fell squarely within the four corners of Gramm-Leach-Bliley that would make the request and provision of the banking information illegal if accomplished by pretext. The company was informed that a woman was trying to locate a current address for a live-in boyfriend who had skipped town with money from her checking account. There was nothing in the scenario presented that even began to come close to the exceptions enacted as part of Gramm-Leach-Bliley. In fact, as the committee is aware, on August 30th Committee Senior Counsel Jim Clinger, Special Agent John Forbes, Committee Staff Member Alison Watson and I called numerous private investigators and information brokers around the country in an effort to determine how many would sell bank account information and under what circumstances. We decided that we would survey the first ten companies that we could reach by phone. The companies were selected randomly by Special Agent Forbes based upon their advertisements. All of the companies were presented with the scenario outlined above. In less than three hours the first ten companies we reached were all willing to sell us personal bank account information detailed enough to raise the educated belief that the information would be obtained by pretext or other deceptive means. Not a single company we reached turned us down. Not one. More to the point, two of the companies' representatives made specific mention of "privacy laws" and "federal statutes" being a hindrance to their ability to provide the information. However, we were told, they could still succeed but just "don't tell anybody" that we had obtained the information. One individual referred to the fact that he had 11 years banking experience and guaranteed that he could find the bank and that 80% of the time he could get the account number and balance. Several of the companies stated that they could get us individual transaction records including deposit information. One offered to teach us how to determine the amount in the account once he located the bank and account number. One company stated that it would check the Federal Reserve section for the part of the country where the individual was located. This same company claimed to work for "hundreds and hundreds of attorneys and collection agencies". Further, they stated that they had found $1.2 million dollars in an account just the previous day for an attorney. They advised us to wait for the banking information before going to Court. Another company stated they would locate the information if we had a "Court filing judgment" or a letter from an attorney giving the name of the person the account information was being sought for and the reason. This company stated they could find local bank information for $200 and statewide information for $500 including account numbers and balances. Several of the companies offered to locate safety deposit box locations and securities related information. One company charges $175 to locate the name and address of the bank if you have a judgment. However, the same company offered for $250 to locate all accounts, account numbers, balances, mutual funds, names on the accounts, dates of closure if an account was closed, and safety deposit box information if we didn't have a judgment. Here is just one example of the type of advertising we found: Welcome to (name omitted). We can perform bank account and investment searches anywhere in the USA and the World. Bank account searches can be used to collect judgements, verify net worth of individuals and companies, or any other purposes. We can search: Bank Accounts Checking Savings Investments Stocks Bonds Commodities Mutual Funds Safety deposit boxes And much, much more. We can search by: State Country Offshore account searches also available. Disclaimer: We limit retrieval to documents or information available from a public entity or public utility which are intended for public use and do not further elaborate on that information contained in the public entity or public utility records. Must Be 18 or Older for a Consultation or Record Search. We take no responsibility and assume no liability for any privacy claims as we neither utilize, reveal, nor attempt to access any confidential information concerning the parties involved in the search. We are not a licensed private investigator, and we do not engage in any activities for which a license is required. (End of excerpts) The disclaimer is amazing in light of the fact that this company offered to sell us the amount located in a checking account and the deposit history to the account for $275. I cannot fathom a single way that account balance and deposit transaction records could be "intended for public use". Indeed this would be a direct revelation of "confidential information". No company we reached asked any questions that would logically follow from the passage of Gramm-Leach-Bliley, even when they had disclaimers in the advertisements suggesting that there were restrictions on who could obtain banking information and under what circumstances. Further, in addition to the overt remarks made by several companies to the minor obstacles presented by "federal statutes" and "privacy laws" the advertisements and telephonic presentations bore all the classic signs of pretext operations. These include no-hit/no-fee guarantees; length of time required to complete the search; higher pricing; and types of information being sold. These results are troubling and point to the inescapable conclusion that there are now criminals hiding behind professional titles such as "information broker", "private investigator", and "judicial judgment collector". I do not make this statement lightly as I was a private investigator for seventeen years and was very proud of my profession. There are thousands of good, honest private investigators, information brokers, and collection professionals working everyday in this country to assist citizens and attorneys at all levels of our judicial system. I receive emails everyday from investigators and brokers who are upset and demoralized because of the practices of some who feel it is easier to steal information instead of using the lawful means that all others who obey the law do. The good, honest professionals are looking to their government to step in and stop these criminals. Further, many of the information brokers, private investigators, and judicial judgment collectors belong to national trade associations. In fact, many of these association members and their leaders can be found in Internet chat areas trading pretext methods. This begs the question: What are these associations doing to police their membership? The Effectiveness Of Efforts By The Financial Services Industry To Deter And Detect Fraudulent Attempts To Obtain Confidential Account Information The financial services industry has for many years utilized various methods of combating fraud and protecting the confidentiality of customer information. As I stated in my testimony two years ago, I believe the industry was not aware of the techniques being used by information brokers and investigators to penetrate their security protocols by means of pretext and impersonation. Indeed, most Americans remain ignorant of the practices of unscrupulous information brokers. The financial services industry is traditionally between a rock and a hard place when it comes to information security. Customers want their information to remain confidential. At the same time, they want easy access twenty-four hours a day to that same confidential information. It is this very dilemma that criminals exploit. The financial services industry is starting to move aggressively to combat the methods and deceptive practices used by identity thieves and infobrokers that seek to illegally gain access to confidential information and in many cases to steal the funds of institution customers. Upgraded and newly developed computer systems and programs work to oversee billions of transactions each day in an effort to identify potentially fraudulent activity. Education and training programs are being modified and instituted to teach all institution employees the signs of identity theft and fraud and what steps to take. Institutions that have taken steps to determine if information brokers are attempting to access confidential information have found that this is indeed the case. More and more institutions are moving to institute passwords and personal identification numbers (PINS) that provide true access protection. But, many more need to move in that direction. Customers are starting to be notified by institutions concerning the reason and need for certain security protocols. Again, more needs to be done in this area. There is much education, training and work that remains. I am convinced the financial services industry is up to the task. I have had a birds-eye view of the response of the financial services industry over the past two years. I have worked directly with institutions and professional associations to educate them on the issue of pretext and other deceptive practices used to penetrate information security systems. In each instance I have found that the privacy, administrative and security leaders in the institutions and at association meetings are genuinely concerned about solving this problem and are moving to do so. The financial services industry relies on a reputation for confidentiality to survive. Recent well publicized cases of institutions not protecting customer information both here and abroad illustrate the harm that will quickly be realized by an institution that does not protect customers. This concern has led, in one instance, to the American Bankers Association distributing to the entire membership an education and basic training program on pretext calling I was asked to author at the association's initiative. The portion I authored was just a small part of a comprehensive three part series the ABA has distributed to the membership to address the subject of identity theft and privacy in detail over the course of this past year. I believe these materials will aid in thwarting the practices of the Dan Cohns of this world. I have been asked to speak on a number of occasions to groups of bankers to demonstrate to them how to spot pretext calls, how to educate financial services employees about pretext, and what steps to take at the institution level to thwart information security intrusions. Indeed, you would be hard pressed to find a gathering of bankers anywhere today where the subject of privacy is not addressed at length as a major topic of discussion. Further, the financial services industry did not wait for the passage of GLB to address the issue of pretext. Almost immediately after my testimony in 1998 the ABA was distributing materials and videotapes to any institution concerning pretext and updated information security practices. It is too early to tell how effectively the defenses now being installed by financial institutions are working to thwart pretext. However, judging by the number of firms advertising the ability to obtain financial information there is still more to be done. However, unless we end legitimate customer access to account information, there will always be criminals who will attempt to steal that information. The financial services industry needs a helping hand from law enforcement. These criminals must be prosecuted. The message needs to be sent that Federal law enforcement is serious about protecting financial institution customers. It is time to act. Emerging Threats To Financial Privacy While the traditional methods of pretext presented before this Committee two years ago continue, there are new emerging threats to the security of information within financial institutions. Those who use creative means to obtain personal information are not resting and waiting to see what Congress or law enforcement will do next to protect the privacy and confidentiality of U.S. citizens. These individuals and companies continue to develop methods to locate citizens and their confidential information. There is much fear that the loss of routinely accessed credit headers will diminish the ability to easily access personal biographical information used as part of a pretext. Therefore, some who seek that information are moving to develop other "sources" and "methods" to develop personal information needed to begin a successful pretext. The fastest growing method used to "skiptrace" for the current address and other personal information of an individual is to obtain the information from the phone company. Most United States citizens believe that their phone records are private unless obtained by subpoena or other form of Court order. This is especially true for the millions of Americans who pay extra to have a non-published or unlisted phone number. Most citizens would further think that who they call and how long they talk is also a private matter. Most citizens would be wrong. For years I have seen the sale of private telephone information on the web and in investigative and legal trade journals. These services include the acquisition and sale of non-published and unlisted phone numbers and records; long distance toll records; cellular phone records; pager records; fax records; the current phone number and address for the owner of a disconnected phone, and much more. While these practices are bad enough, and need to be addressed by Congress and/or law enforcement, the latest development is equally worrisome. Currently, there are presentations of closed, highly secure classes for private investigators and information brokers, teaching the inner workings of the telecommunications industry. These classes are being coupled with databases being developed in the private investigative community to assist in obtaining information held by telecommunications companies. Once obtained this data can then be sold and/or used as part of further identity theft and pretexts used in any number of scenarios, but certainly as the starting point for information gathered as part of a pretext against a financial institution or directly against the financial consumer. Here is an advertisement being widely distributed for these classes: NOW! COMING TO LOS ANGELES! Telecom Secrets Seminar or Using Telecom as a new way to skiptrace and locate. by Michele "Ma Bell" Yontef, CMI Telecom Investigations Specialist, Licensed Private Investigator, Paralegal, Server of Process, Notary, Constable of Court ******************************************************************************************** This is a seminar that will take you from being someone who uses a phone in investigations, to someone who uses the whole telecommunications system to further your investigations. You will gain a comprehensive understanding of the phone system, and how to use that system to get the information you need to close the case. With so many of our "tools of the trade" being taken from us by recent privacy laws, this is a "must attend" seminar. Using Michele's completely legal methods we can continue to obtain the information that is vital to us and to our clients. Don't let yourself or your clients down, learn new and better ways to increase your services and your income. No recording of any kind will be permitted. There will be extensive security measures. Please contact Vicki for details. All attendees will be required to sign a non-disclosure agreement. West Coast Professional Services reserves the right to refuse admittance. These techniques are completely legal, but are being taught only to Investigators and Law Enforcement Officers. Restrictions apply. ************************************************************************************************ A statement from Michele regarding the content: I will be talking about everything from how to make totally anonymous calls to finding the carrier of any type of line. I will be explaining how things in the Telecom work, so that you will know how to legally maneuver around any obstacle. I will show you how to skip trace and locate like never before, by using the Telecom as a database. I will tell you what the operator knows about you, who can hear you talking on the phone, how to perform all types of procedures, and I will be giving you a ton of vital information in my booklets that accompany the seminar. I will also introduce a new form of searching for skips and will open to you first, my brand new database, that encompasses EVERY numerical search you have ever seen online, plus many more new search ideas that I can teach you about in the seminar as well. For example, did you know that the type of switching your telephone company has you hooked into can allow a listen in on your lines...I will explain how to tell what kind of switching you have, and how it can either lend to the listen in, or block it. I can also show you how to use my database to find that switching for any party, and use it to trace a number to CNA, without ever picking up the phone to pretext anyone! I have brought home missing children, using the secret searches I will disclose to all of you that attend. (End)(Emphasis added) Here is another widely distributed reference: Here's an unedited letter from (name deleted), who just experienced the Telecom Secrets Seminar by Michele "Ma Bell" Yontef... Colleagues: There are currently three days to prepare yourself, if you are attending the Los Angeles version of the "Telecom secrets" Seminar. You need to practice taking notes, and be ready to absorb the information like a sponge. There is a lot of it, but it's actually very easy to learn. Michele teaches you about how the entire telecommunications system works, then gives you the secrets of how you can use it to do your own non-pubs, CNA's and disconnects, as well as the rationale that leads you to be able to determine the location of some of the toughest skiptrace assignments and locates, you have ever attempted. I sat in awe, writing as furiously as I could, through the six hour session with the Iowa Association of Private Investigators, (IAPI), provided by Michele, on Friday afternoon. I cannot tell you how valuable this seminar will be to me, in the coming weeks and months, as I develop my skills, using her technique. The best part is that I'd never even thought of most of this stuff. It is all new, and a wonderful way to expand one's skiptracing skills. It will take practice, but she has given us all a true treasure chest, (and she knows how I love treasure chests! --), and all the other tools to do the job. The price is an absolute bargain, too! Please pay particular attention to the reason for her disclaimers and nondisclosure forms. With all the movement and political wrangling of the privacy advocates, (READ - "reactionaries"), we can't afford to have this excellent legal source tainted by the people who would strangle our profession, and shut off all our sources. End)(Emphasis added) The reference to "CNA's" means customer name and address. The reference to "non-pubs" means the ability to obtain the non-published phone number for an individual. The reference to "disconnects" means the ability to locate the new phone number, name and address for someone who disconnected a phone in addition to determining the owner of a previously disconnected phone number. The database being designed to aid in the acquisition of information maintained by the telecommunications industry has been named "The Last Treasure". The choice of this name is intentional. It was chosen to mean that this database will be the last method available to locate the overwhelming majority of citizens should the carte blanche acquisition of credit header information be restricted. As with the pretext of financial institutions two years ago, the presenters of these classes and the developers of this database claim that this is all legal. I will leave that to others to decide. As a citizen of this country I am dismayed that my phone records can be bought and sold on the Internet. As a former private investigator that has handled several stalking cases I am well aware of the damage that can be done through the acquisition and sale of this information. As a privacy consultant, I am well aware of the fact that information obtained from the phone company can and is often used to start a financial pretext. Should there be any doubt concerning the problems that can be created when confidential phone information is obtained, one look no further then a September 9, 2000 article by Lindsey A. Henry for The Des Moines Register: A West Des Moines woman contends that her ex-husband tracked her down and threatened her after MCI WorldCom gave out her phone number and other information. Peggy Hill, 33, is suing the long-distance company in federal court in Des Moines. The lawsuit says her ex-husband in Georgia called MCI at least 10 times in June 1999 asking for her billing information and the numbers she had called. MCI representatives gave him the information and even changed her calling plan at his request, the lawsuit said. (End of Excerpt) Here was a woman being stalked by her ex-husband and taking precautions, only to be thwarted by the ease with which her phone records were accessed: Hill thought she had protected herself, her lawsuit says. She moved several times after her divorce in 1992. She paid for an unlisted number. She asked MCI to keep her information confidential, according to the lawsuit. Only after Hill called to complain did MCI employees flag her account with a warning, according to subpoenaed MCI files. "Please do not look up numbers for him or give him names of where numbers are dialed to," the notation said. "Peggy is in danger!!!!!! . . . MCI should not have given this man any information!!!!!!" (End of excerpt) The following claim of rarity when it comes to the release of confidential phone records is laughable given the ease with which Infobrokers buy and sell phone company customer records every day and widely advertise their ability to do so on the Internet: Sandy Kearney, an investigator for the Iowa attorney general's office, said Hill's situation was rare. "I hear all the time from telephone companies claiming to not release information without permission," she said. Hill's lawyer, George LaMarca, said the lawsuit should remind companies of their obligation to protect customers. "We can't get services without entrusting our most confidential and personal information to companies," LaMarca said. "When we do that, we expect confidentiality. When that trust is breached, companies should expect to pay the consequences." (End of excerpt) Just as this husband was able to allegedly access his ex-wife's customer records, identity thieves, private investigators, information brokers and judicial judgment collectors use similar techniques everyday to access these same records. All they need do is impersonate the customer or the relative of a customer. This common knowledge amongst identity criminals is being used as the starting point for access to personally identifiable information that can then be used to access financial information. This committee will recall the testimony of one of the "Godfathers" of the information broker industry in this very room two years ago. Al Schweitzer instructed us all at that time that one of the most common financial pretexts begins with either a pretext call to the consumer impersonating someone from the phone company, or a pretext call to the phone company to develop personal information to be used as part of a further pretext against the consumer and/or financial institution. The problem continues today and is growing in scope and sophistication. I would like to ring one final warning bell concerning the use of pretext and deceptive information security penetration practices. These are the very techniques that are used by individuals engaged in corporate espionage. Every day these techniques are used to steal our nation's corporate and military trade secrets and other forms of confidential information. I know that our military is aware of this as representatives of the Pentagon asked me to present a private briefing after my last appearance here in 1998. I will not disclose in an open forum what I was able to demonstrate in that briefing other than to state that I believe it confirmed concerns on the part of the officials I met with in relation to a threat that could easily put our country at a disadvantage during a time of crisis. This Committee, which oversees the safety and soundness of our Nation's financial system, should be concerned about the threat that corporate espionage, both domestic and foreign, poses to the financial well being of our country. This is the "Information Age" and our country is the leader in that regard. It is precisely that leadership position which is driving this unprecedented economic boom we are all witnessing. Information technology advantages are paramount to our continued economic success. This is why information security is all-important to that success. Companies are discovering the need for computer system firewalls, yet are woefully unprepared when it comes to social engineering security penetrations and a laissez faire attitude concerning who information is disclosed to telephonically and otherwise. Simply put. Loose lips do sink the corporate ships of today and tomorrow. The most infamous computer "hacker" on the planet, Kevin Mitnick, obtained the plans for an unreleased Motorola product by direct "pretext" phone calls to Motorola employees who then faxed him the plans to his home! If you speak to Mr. Mitnick, you will learn that he obtained just as much confidential information via "dumpster diving" and social engineering (pretext) as he ever did by a true computer hack attack. Another method that is becoming more common is the use of a "Trojan check". An investigator or broker will create a fictitious business name and open a checking account in that business name. A small check will be mailed to the target as a "rebate" or "prize" stamped on the back "for deposit only". Once the check has been deposited and is returned to the fictitious company the banking information obtained on the back of the check can be used to further the pretext to determine the amount of funds held in the account. There is great debate in the investigative and broker communities as to the legality of this practice given Gramm-Leach-Bliley and the deceptive trade practices statutes. While the debate continues, so does the practice. Informal networks of investigators, infobrokers, judgment collectors, and collection professionals are found all over the Internet. It is not uncommon to see requests for "contacts" in financial services institutions. Some collection professionals openly advertise their ability to provide information maintained within their files. Routinely, there are account and file numbers along with the names of targets placed on the Internet for inspection by others to determine if information can be traded or obtained. Vehicle tracking devices are being offered for sale in order to follow or record the travels of citizens. While not directly relevant to the pretext of financial information, it demonstrates the length that some will go to in order to obtain information on citizens in the United States today. If law enforcement agencies of State and Federal governments were caught doing these practices absent a constitutionally permissible purpose and/or Court order there would be rioting in the streets. Yet every day these events are carried out by private investigators, information brokers and judgment collectors who have no authority above that of a private citizen and no one blinks. From where I sit, my privacy is just as violated whether the intrusion comes from a person with a badge or not. What Needs To Be Done I would like to make some suggestions concerning what needs to be done to continue the battle against the use of fraud and deception to access financial information. First, we need swift, aggressive, nationwide action by law enforcement to begin criminal investigation and prosecution of those who are thumbing their noses at the provisions of Gramm-Leach-Bliley and other appropriate statutes. I hope the information I provided in 1998 and today supports this conclusion. Second, GLB needs to be amended. The narrowly crafted child-support exemption for the use of pretext is being used as an advertising shield by private investigators to hide behind while continuing the covert sale of financial information that falls outside of the GLB exemptions. The provisions of GLB that allow for pretext in a child support situation state as follows: Sec. 521 (g) NONAPPLICABILITY TO COLLECTION OF CHILD SUPPORT JUDGMENTS- No provision of this section shall be construed to prevent any State-licensed private investigator, or any officer, employee, or agent of such private investigator, from obtaining customer information of a financial institution, to the extent reasonably necessary to collect child support from a person adjudged to have been delinquent in his or her obligations by a Federal or State court, and to the extent that such action by a State-licensed private investigator is not unlawful under any other Federal or State law or regulation, and has been authorized by an order or judgment of a court of competent jurisdiction. The operative language is: "No provision of this section shall be construed to prevent any State-licensed private investigator.from obtaining customer information of a financial institution...to collect child support from a person adjudged to have been delinquent in his or her obligations by a Federal or State court...AND has been authorized by an order or judgment of a court of competent jurisdiction." This language clearly means from both the legislative history of the act and the plain face of the statute that a judge (Court) must specifically authorize the use of pretext to obtain customer information of "a financial institution". I am not aware of a single case where a Court has authorized a private investigator to intentionally deceive a financial institution in order to obtain customer information. It is easy to understand why this has not happened and most likely never will. The presumptive evidentiary burden that would be required to obtain such an order would easily support the issuance of a subpoena to the institution that the information is being sought from and is being contemplated for pretext. Unless Congress has evidence that financial institutions routinely falsify responses to subpoenas it is hard to fathom why this provision was placed in GLB. Further, this section states: "to the extent reasonably necessary to collect child support from a person adjudged to have been delinquent in his or her obligations by a Federal or State court." The legislative history of this exemption was a claim made by some representatives of the private investigative industry that pretext was needed as there was no other method available to locate the financial institution holdings of deadbeat parents who lie to the Courts. This claim was not true at the time, as there are many lawful ways to pursue overdue non-custodial child support payments and many taxpayer funded agencies designed to fill that role. However, even if this argument is accepted as a legitimate historical reason for the exemption, there is no longer any legislatively justifiable reason to maintain the exemption given the provisions of the Personal Responsibility and Work Opportunity Reconciliation Act of 1996 which are now in effect and mandate that all financial institutions cooperate with the government by providing the financial information of delinquent child support parents directly to the Federal government for asset forfeiture. The following excerpt describing this procedure is from a front-page article written by Robert O'Harrow, Jr. in the Sunday, June 27, 1999 edition of the Washington Post: As part of a new and aggressive effort to track down parents who owe child support, the federal government has created a vast computerized data-monitoring system that includes all individuals with new jobs and the names, addresses, Social Security numbers and wages of nearly every working adult in the United States. Government agencies have long gathered personal information for specific reasons, such as collecting taxes. But never before have federal officials had the legal authority and technological ability to locate so many Americans found to be delinquent parents -- or such potential to keep tabs on Americans accused of nothing. The system was established under a little-known part of the law overhauling welfare three years ago. It calls for all employers to quickly file reports on every person they hire and, quarterly, the wages of every worker. States regularly must report all people seeking unemployment benefits and all child-support cases. Starting next month, the system will reach further. Large banks and other financial institutions will be obligated to search for data about delinquent parents by name on behalf of the government, providing authorities with details about bank accounts, money-market mutual funds and other holdings of those parents. State officials, meanwhile, have sharply expanded the use of Social Security numbers. Congress ordered the officials to obtain the nine-digit numbers when issuing licenses -- such as drivers', doctors' and outdoorsmen's -- in order to revoke the licenses of delinquents. Enforcement officials say the coupling of computer technology with details about individuals' employment and financial holdings will give them an unparalleled ability to identify and locate parents who owe child support and, when necessary, withhold money from their paychecks or freeze their financial assets. (End of excerpt) (Emphasis added by Robert Douglas) O'Harrow went on to describe in more detail how the new system operates: Next month, financial institutions that operate in multiple states -- such as Crestar Financial Corp., Charles Schwab & Co. and the State Department Federal Credit Union -- will begin comparing a list of more than 3 million known delinquents against their customer accounts. Under federal law, the institutions are obligated to return the names, Social Security numbers and account details of delinquents they turn up. The Administration for Children and Families will then forward that financial information to the appropriate states. For security reasons, spokesman Kharfen said, the agency will not mix the financial data with information about new hires, wages and the like. Bank account information will be deleted after 90 days. In a test run this spring, Wells Fargo & Co. identified 72,000 customers whom states have identified as delinquents. NationsBank Corp. found 74,000 alleged delinquents in its test. Later this year, smaller companies that operate only in one state will be asked to perform a similar service. Officials say most of these institutions will compare their files against the government's. But some operations that don't have enough computing power -- such as small local banks, credit unions and securities firms -- will hand over lists of customers to state officials for inspection. States can then administratively freeze the accounts. In California, more than 100 financial institutions have already handed over lists of all their depositors to state officials, including names, Social Security numbers and account balances, a state official said. (End of excerpt) (Emphasis added by Robert Douglas) Finally, the exemption places GLB in direct conflict with other federal statutes outlawing wire and mail fraud and unfair and deceptive trade practices. The exemption also places GLB in direct conflict with many State laws and creates nothing short of a judicial quagmire. Simply put, there is no legitimate reason to continue the child support exemption to Gramm-Leach-Bliley. There is a legitimate reason to strike it from the statute as companies are using it as pretence to advertise their ability to locate financial institution customer information. All the ad need say is the request must be in compliance with applicable laws and that all requests are performed on that basis. Once the investigator is comfortable that the requestor is not law enforcement running a sting operation-they sell any information in complete disregard of the law. Our survey proved this ten times over. Third, financial institutions must continue the work they have started to take every precaution necessary to teach all banking employees about the methods associated with identity theft and pretext so that employees can spot fraudulent acts and know what to do when an act is detected. This will require regular and ongoing education, training and auditing programs to maintain the highest level of information security possible. Infobrokers and identity thieves are constantly developing new techniques and methods. The financial services industry must work to stay abreast of these techniques. Fourth, the federal regulatory agencies must also continue to stay abreast of information security threats and implement appropriate standards and regulations. Audits need to assess the effectiveness of programs in place. Finally, this Committee must continue on a regular basis to exercise the appropriate oversight functions necessary to ensure that agencies of the federal government continue to take every step available to stop illegal access of personal and confidential customer information. I know that we are late in the Congressional session and that Chairman Leach will be passing the baton next year. I also am aware that when the baton passes there may be changes in the staff of the Committee. I genuinely hope that no matter who takes up the leadership of the Committee and no matter from which side of the aisle, that there will continue an institutional memory to follow this issue. I truly believe it is of profound import to the health of our financial services industry in this country. Conclusion In closing, when I appeared before this Committee in 1998 I recited a long laundry list of the dangers posed by the deceptive methods in use by some private investigators and information brokers to gain illegal access to confidential and protected information. There were some who found it hard to believe that what I claimed was true or as serious as I presented the problem. However, those in the investigative and information broker industries who were practicing these techniques knew that I had spoken honestly and were not pleased to have sunshine illuminating their practices. I soon began fielding phone calls from across the country. The hearing had been carried on C-SPAN. In brief, the attention to these techniques was not well received by some. I was condemned by many and even received two death threats. I mention this because the information being obtained illegally is in many cases both quite serious and lucrative for those buying and selling it and often places others in physical danger. One needs to look no further than the case of James and Regina Rapp of Touch Tone Services to see that this is true. They were running a million dollar a year operation in Denver Colorado with numerous employees when Denver and Los Angeles law enforcement officers caught up with them along with the FTC. Why so many agencies? A short list of the Rapp's alleged activities points to the answer. The following allegations were reported: Touch Tone had accessed and sold information concerning undercover Los Angeles police detectives including their private unlisted phone and pager records to a member of the "Israeli mafia", placing the lives of the officers, the officers' families, the officers' confidential informants, and active organized crime investigations in danger. Touchtone accessed and sold information concerning the murder of Ennis Cosby, son of famed comedian Bill Cosby. Touchtone accessed and sold personal and confidential information regarding the Columbine High School massacre victims and families including home addresses, unlisted home telephone numbers, banking, and credit card records. Touchtone inserted itself into the Jon Benet Ramsey investigation. Here is a list written by James Rapp to a California private investigator outlining the Rapp's work in the Jon Benet Ramsey murder investigation: Here is a list of all Ramsey cases we have been involved with during the past lifetime (sic). 1. Cellular toll records, both for John & Patsy. 2. Land line tolls for the Michigan and Boulder homes. 3. Tolls on the investigative firm. 4. Tolls and home location on the housekeeper, Mr. & Mrs. Mervin Pugh. 5. Credit card tolls on the following: a. Mr. John Ramsey, AMX & VISA b. Mr. John Ramsey Jr., AMX. 6. Home location of ex-wife in Georgia, we have number, address & tolls. 7. Banking investigation on Access Graphics, Mr. Ramsey's company, as well as banking information on Mr. Ramsey personal. 8. We have the name, address & number of Mr. Sawyer & Mr. Smith, who sold the pictures to the Golbe (sic), we also have tolls on their phone. 9. The investigative firm of H. Ellis Armstead, we achieved all their land and cellular lines, as well as cellular tolls, they were the investigative firm assisting the Boulder DA's office, as well as assisting the Ramseys. 10. Detective Bill Palmer, Boulder P.D., we achieved personal address and numbers. 11. The public relations individual "Pat Kroton" (sic) for the Ramseys, we achieved the hotel and call detail where he was staying during his assistance to the Ramseys. We also have his direct cellular phone records. 12. We also achieved the son's John Jr.'s SSN and DOB. 13. During all our credit card cases, we acquired all ticket numbers, flight numbers, dates of flights, departing times and arriving times. 14. Friend of the Ramseys, working with the city of Boulder, Mr. Jay Elowskay, we have his personal info. Of course, all the above have been repeatedly asked for over and over again. Let me know if I can be of further assistance in this or any matter. (End of letter) This one company, Touchtone, had a client list of more than 1,200 spread across the country. Another local Montgomery County, Maryland private investigator admitted to obtaining the phone records of Kathleen Willey, a witness in the criminal investigation of President Clinton. These are just two companies. There are dozens of companies still in operation today. There can be little doubt as to the serious implications of the activities of these companies. Mr. Chairman and members of the Committee, as I leave you today, I hope that the time and effort I have placed in this testimony will serve as a blueprint for further examination by this Congress of matters deserving attention. Thank you. Appendix II U.S. Secret Service Testimony of Mr. Bruce A. Townsend Special Agent in Charge - Financial Crimes Division For Presentation to the Committee on Banking and Financial Services U.S. House of Representatives September 13, 2000 Mr. Chairman, members of the Committee, thank you for the opportunity to address the Committee on the subject of identity theft and the Secret Service's efforts to combat this problem. I have prepared a comprehensive statement that will be submitted for the record, and with the Committee's permission, I will summarize my statement at this time. In addition to providing the highest level of physical protection to our nation's leaders, the Secret Service exercises broad investigative jurisdiction over a variety of financial crimes. As the original guardian of our nation's financial payment systems, the Secret Service has a long history of pursuing those who would victimize our financial institutions and law-abiding citizens. In recent years, the combination of the information technology revolution and the effects of globalization have caused the investigative mission of the Secret Service to evolve in a manner that cannot be overstated. Today we are faced with a new challenge--that of identity theft. The Secret Service views identity theft as a disturbing combination of old schemes and abuse of emerging technologies. However, it should be clear--this crime is about more than the theft of money or property. This crime is about the theft of things that cannot be so easily replaced--a person's good name, a reputation in the community--years of hard work and commitment to goals. Make no mistake about it; this crime is a particularly invasive crime that can leave victims picking up the pieces of their lives for months or even years afterward. Mr. Chairman, we in the Secret Service applaud your efforts in convening this hearing today. We stand ready to work with you and all the members of the committee in attacking the crime of identity theft. It is our belief that hearings such as this will be the catalyst to bring together the resources of both state and Federal Governments in a unified response to the identity theft problem. Congress has already taken an important step in providing increased protection for the victims of identity theft through the enhancements made to Title 18, United States Code, Section 1028, by the Identity Theft and Assumption Deterrence Act, which was signed into law in October of 1998. This law accomplished four things simultaneously. First, it identified people whose credit had been compromised as true victims. Historically with financial crimes such as bank fraud or credit card fraud, the victim identified by statute, was the person, business or financial institution that lost the money. All too often the victims of identity theft, whose credit was destroyed, were not even recognized as victims. This is no longer the case. Second, this law established the Federal Trade Commission (FTC) as the one central point of contact for these victims to report all instances of identity theft. This collection of all information involving ID theft cases allows us to identify systemic weaknesses and enables law enforcement to retrieve all investigative data from one central location. It further allows the FTC to provide people with the information and assistance they need in order to take the steps necessary to correct their credit records. Third, this law provided increased sentencing potential and enhanced asset forfeiture provisions. These enhancements help to reach prosecutorial thresholds and allow for the repatriation of funds to victims. Lastly, this law closed a loophole in Title 18, United States Code, Section 1028, by making it illegal to steal another person's personal identification information with the intent to commit a violation. Previously, under Section 1028, only the production or possession of false identity documents was prohibited. With advances in technology such as E-Commerce and the Internet, criminals today do not need actual documents to assume an identity. We believe the enactment of this legislation is an important component in bringing together both the federal and state government, in a focused and unified response to the identity theft problem. Today, law enforcement and regulatory and community assistance organizations have joined forces through a variety of working groups, task forces, and information sharing initiatives to assist the victims of identity theft. Victims no longer have to feel abandoned, with no where to turn. Policies and procedures are being initiated to expedite the reporting of this crime. Civil remedies are also being created allowing for victims to seek restitution. The Secret Service "Victim Witness Assistance Program" aids identity theft victims by providing resources and contact information for credit bureaus and service programs. The financial community continues to design and implement security measures that minimize the exploitation of true persons names and identification information. The Secret Service has broad investigative responsibilities relating to financial crimes. Today, some type of false identification is a prerequisite for nearly all financial fraud crimes. False ID's provide anonymity to criminals and allow for repeat victimization of the same individual while perpetrating a variety of fraud schemes. Often, in their attempt to remain anonymous, criminals may randomly assume the identity of another individual through the creation of false identification documents. In these cases, the goal may not be to target an individual for the purposes of stealing his or her identity. Yet, by coincidence, that individual's identity has been compromised through the criminal's use of their personal identifiers. False identification documents, either altered, counterfeited, or fraudulently obtained, are routinely used with loan and check fraud schemes, and almost all credit card fraud schemes. Ironically, the credit industry through capital investments over the past 10 years has strengthened the integrity of the system through security measures, which effectively thwart some types of direct counterfeiting. Subsequently, criminals no longer simply create names and identities; they must more often rely on the identifiers of real people. As we enter the next century, the strength of the financial industry has never been greater. A strong economy, burgeoning use of the Internet and advanced technology, coupled with increased spending has led to fierce competition within the financial sector. Although this provides benefits to the consumer through readily available credit, and consumer oriented financial services, it also creates a rich environment for today's sophisticated criminals, many of whom are organized and operate across international borders. In addition, information collection has become a common byproduct of the newly emerging e-commerce. Internet purchases credit card sales and other forms of electronic transactions are being captured, stored, and analyzed by entrepreneurs intent on increasing their market share. This has led to an entirely new business sector being created which promotes the buying and selling of personal information. With the advent of the Internet, companies have been created for the sole purpose of data mining, data warehousing, and brokering of this information. These companies collect a wealth of information about consumers, including information as confidential as their medical histories. Consumers routinely provide personal, financial and health information to companies engaged in business on the Internet. Consumers may not realize that the information they provide in credit card applications, loan applications, or with merchants they patronize, are valuable commodities in this new age of information trading. Data collection companies like all businesses are profit motivated, and as such, may be more concerned with generating potential customers rather than the misuse of this information by unscrupulous individuals. This readily available personal information in conjunction with the customer friendly marketing environment has presented ample opportunities for criminals intent on exploiting the situation for economic gain. The Secret Service has investigated numerous cases where criminals have used other people' s identities to purchase everything from computers to houses. Financial institutions must continually practice due diligence or they will fall victim to the criminal who attempts to obtain a loan or cash a counterfeit check using someone else's identity. As financial institutions and merchants become more cautious in their approach to "hand to hand" transactions the criminals are looking for other venues to compromise. Today, criminals need look no further than the Internet. For example, an Internet fraud investigation conducted by the secret service, Department of Defense, Postal Inspection Service, and the Social Security Administration Inspector General's Office highlighted the ease with which criminals can obtain personal information through public sources. These defendants accessed a web site that published the promotion list of high ranking military officers. This site further documented personal information on these officers that was used to fraudulently obtain credit, merchandise, and other services. In this particular case the financial institution, in an effort to operate in a consumer friendly manner issued credit over the Internet in less than a minute. Approval for credit was granted after conducting a credit check for the applicant who provided a "true name" and matching "true Social Security Number." All other information provided such as the date of birth, address and telephone number, that could have been used for further verification, was fraudulent. The failure of this bank to conduct a more comprehensive verification process resulted in substantial losses and more importantly a long list of high-ranking military officers who became victims of identity fraud. The Internet provides the anonymity criminals desire. In the past, fraud schemes required false identification documents, and necessitated a "face to face" exchange of information and identity verification. Now with just a laptop and modem, criminals are capable of perpetrating a variety of financial crimes without identity documents through the use of stolen personal information. The Secret Service has investigated several cases where cyber criminals have hacked into Internet merchant sites and stolen the personal information and credit card account numbers of their customers. These account numbers are then used with supporting personal information to order merchandise to be mailed throughout the world. Most account holders are not aware that their credit card account has been compromised until they receive their billing statement. Time and time again, criminals have demonstrated the ability to obtain information from businesses conducting commerce on the Internet. This information has been used to facilitate account takeover schemes and other similar frauds. It has become a frightening reality that one individual can literally take over another individual's financial identity without the true victim's knowledge. Cyber criminals are also using information hacked from sites on the Internet to extort money from companies. It is not unprecedented for international hackers to hack into business accounts, steal thousands of credit card account numbers along with the accompanying personal identifiers, and then threaten the companies with exposure unless the hackers are paid a substantial amount of money. The Secret Service continues to attack identity theft by aggressively pursuing our core violations. It is by the successful investigation of criminals involved in financial and computer fraud that we are able to identify and suppress identity theft. As stated earlier, identity theft, and the use of false identification has become an integral component of most financial criminal activity. In order to be successful in suppressing identity theft we believe law enforcement agencies should continue to focus their energy and available resources on the criminal activities that incorporate the misuse or theft of identification information. The Secret Service has achieved success through a consistent three -tiered process of aggressive pro-active investigations, identification of systemic weaknesses, and partnerships with the financial sector to adopt fixes to these weaknesses. The Secret Service's investigative program focuses on three areas of criminal schemes within our core expertise. First, the Secret Service emphasizes the investigation of counterfeit instruments. By counterfeit instruments, I refer to counterfeit currency, counterfeit checks, both commercial and government, counterfeit credit cards, counterfeit stocks or bonds, and virtually any negotiable instrument that can be counterfeited. Many of these schemes would not be possible without the compromise of innocent victim's financial identities. Second, the Secret Service targets organized criminal groups that are engaged in financial crimes on both a national and international scale. Again, we see many of these groups; most notably the Nigerian and Asian organized criminal groups, prolific in their use of stolen financial and personal information to further their financial crime activity. Finally, we focus our resources on community impact cases. The Secret Service works in concert with the state, county, and local police departments to ensure our resources are being targeted to those criminal areas that are of a high concern to the local citizenry. Further, we work very closely with both federal and local prosecutors to ensure that our investigations are relevant, topical and prosecutable under existing guidelines. No area today is more relevant or topical than that of identity theft. It has been our experience that the criminal groups involved in these types of crimes routinely operate in a multi-jurisdictional environment. This has created problems for local law enforcement that generally act as the first responders to their criminal activities. By working closely with other federal, state, and local law enforcement, as well as international police agencies we are able to provide a comprehensive network of intelligence sharing, resource sharing, and technical expertise which bridges jurisdictional boundaries. This partnership approach to law enforcement is exemplified by our financial crimes task forces located throughout the country. Each of these task forces pools the personnel and technical resources and to maximize the expertise of each participating law enforcement agency. A number of these task forces are focused on the Nigerian criminal element operating in this country. As mentioned earlier, this particular ethnic criminal group has historically been involved in a myriad of financial crimes, which incorporate false identification and identity theft. In addition to our inter-dependant working relationship with law enforcement on all levels, our partnership with the private sector has proved invaluable. Representatives from numerous commercial sectors to include the financial, telecommunications, and computer industries have all pledged their support in finding ways to ensure consumer protection while minimizing corporate losses. The secret service has entered into several cooperative efforts with members of the financial sector to address challenges posed by new and emerging technologies. These initiatives have created some new and innovative approaches to identification verification in business. Automated teller machines, E-Commerce, online banking, online trading, smart cards, all once considered futuristic concepts, are now a reality. Each of these technologies lends themselves to creating a "faceless society". In order for businesses to be successful, they can no longer rely upon personal contact as a means of identity verification. One innovative approach that appears to address the problems of identity verification for Internet commerce has been developed and introduced by a member of the financial community. This new product is the first commercial venture by the credit card industry to provide the public with an on line authentication process using chip technology and encryption. Although this product may not end credit card fraud on the Internet, it is the first step in providing a more secure environment in which to conduct Internet commerce. Efforts such as these provide a foundation by which law enforcement and the private sector can build upon. By applying the technologies used in this product and others being developed for the same purpose, we can systemically eliminate the weaknesses in our economic infrastructure, which allow for the misuse of personal information. In conjunction with these technological advances, the Secret Service is actively involved with a number of government sponsored initiatives. At the request of the Attorney General, the Secret Service joined an interagency identity theft subcommittee that was established by the Department of Justice. This group, which is made up of federal and state law enforcement, regulatory agencies, and professional agencies meets regularly to discuss and coordinate investigative and prosecutive strategies as well as consumer education programs. In addition, under the direction of the President, the Treasury Department, with the assistance of the Secret Service, convened a national summit on the subject of identity theft. This summit brought together various federal, state, and private sector entities to discuss and develop policies that will help to prevent identity theft crimes. Follow-up workshops are scheduled for October of this year to focus on ways of assisting consumers and preventing identity theft. As you have heard in this testimony some very positive steps are being taken to address and combat identity theft. The Secret Service will always encourage both business and law enforcement to work together to develop an environment in which personal information is securely guarded. In this age of instant access, knowledge is power. We cannot allow today's criminals to abuse the very systems that were created for the betterment of society. The emotional toll on the lives of those whose identities have been compromised cannot be fully accounted for in dollars and cents. It is all of our responsibilities to protect personal information. The Secret Service acknowledges that identity theft is a very real problem and pledges its support in the Federal Government's efforts to eliminate it. This concludes my prepared statement. I would be happy to answer any questions that you or any other member of the committee may have. Thank you. Home Contact Us Privacy News APC News Services Speeches [Non-text portions of this message have been removed] 5858 From: Andre Holmes <1ach@g...> Date: Sun Jul 28, 2002 0:58am Subject: Emailing: abamoneylaundering2000 Money Laundering Pretext Identity Theft Social Engineering Robert Douglas American Privacy Consultants PrivacyToday.comT Global Privacy Issues At The Click Of Your MouseT Official website of American Privacy Consultants, Inc.T Home Contact Us Privacy News APC News Services Speeches -------------------------------------------------------------------------------- Privacy and Anti-Money Laundering Prevention: How To Handle Statutory Inconsistencies and Customer Expectations Money Laundering Enforcement Seminar American Bankers Association American Bar Association October 31, 2000 Emerging Threats To Financial Information Security: Identity Theft, Pretext, Social Engineering, Forgery, and Impersonation In The Information Age Robert Douglas, CEO American Privacy Consultants, Inc. (www.privacytoday.com) © 2000 Robert Smith Douglas, III More hi-tech methods of access to confidential customer account information are being developed by the financial services industry every day. At the same time threats to information security systems are on the rise. The challenge for the financial services industry, security professionals, law enforcement and Congress is to find the appropriate balance between ease of access for legitimate customers to their confidential information and the passage and enforcement of legislation designed to thwart the growing threats to customer information security. Access To Confidential Financial Information There can be no doubt that confidential customer account information is being accessed and sold every day. In fact, hundreds of web sites, newspapers, magazines, legal and investigative trade journals offer the sale of confidential financial information by private investigators and "information brokers". (For a detailed examination of fraud and access to financial information see Appendix I: Testimony of Robert Douglas before the U.S. House of Representatives, September 13, 2000) As an example, the following web page is from docusearch.com: Bank Account Search Search Price $249.00 Availability National Approximate Return Time 10-18 Business Days* Requires Subject's Full Name, Complete Street Address, Social Security Number* Search Description Given a Subject's full name, complete address and social security number, this search will return the bank name and address, account type, account number, (if available) and approximate current balance of all located personal accounts. We access a proprietary database and identify open accounts using the Subject's SSN, however this search will only identify accounts in the Subject's primary state the business resides. If you suspect accounts exist in more than the primary residing state, a separate search request for each state is required, and should include the Subject's address in that state. *This search requires the Subjects social security number. If the SSN is unknown, we will find it for the purposes of this search but it will not be included in your search result. NOTE: This search uses the Subject's social security number as the account identifier, so only primary account holders are returned. Also, be sure to include any additional information you may have, such as the Subject's home & work telephone, birthdate, mother's maiden name, etc, in the additional comments section. This will greatly increase the odds of a successful search. Responsible Purpose For Search This search may return sensitive, confidential, and/or private information. For this reason, DOCUSEARCH.COM requires an explanation stating the purpose for requesting this search, its' intended use and supporting documentation. Additionally, we reserve the right to decline to perform any search which we deem not to be for a legitimate legal purpose or may cause emotional or physical harm. ImportantDisclaimer Financial searches are for informational purposes only, and are not acceptable as an exhibit or as evidence. Every effort is made to provide a complete & thorough search result. However, no method of research is 100% fool-proof and no firm can offer an absolute guarantee that every account will be found. *This search requires many hours of research and can't be rushed, as we want to return thorough, accurate results. Therefore, this is an approximate return time. (End) In addition to the sale of account information, advertisements offer mechanical devises designed to thwart information security technology. As an example, the following pages list items for sale at hackershomepage.com: SECTION#8 FINANCIAL HACKING 800b MAGNETIC STRIPE CARD READER/WRITER MAGNETIC STRIPE CARD READER/WRITER This device will allow you to change the information on magnetic stripe cards, on ALL 3 tracks, both high and low coercivity. It connects to your computer, either personal or laptop, and runs using supplied software. You must be running Windows 95, 98 or higher and have 8mb of RAM. Using this device is simple. Turn on your computer and run the supplied software. Now, swipe a card through the machine and all the information on the card will be displayed on the computer including account number, credit available, balance, name, etc. Next, using your keyboard, change any and all the information you'd like. Once complete, re-swipe the card through the machine and now your card will have the new information recorded onto the magnetic stripe. You can change any information you'd like including balance and credit information. Magnetic stripe cards are easily recognizable by the brown or black stripe and are found on credit cards, ATM cards, transportation cards, security access cards, etc. For a device that will change the information on smart cards check out item #177. See Photo! Bonus! 802 "Pin Code Hacker",853...............................................ASSEMBLED...$1,500.00 800c BLANK MAGNETIC STRIP CARDS These cards are able to be programmed using the above devices...................................ASSEMBLED...$5.00 each. 800e CARD PRINTING MACHINE This machine will print to all kinds of plastic cards including, credit cards, ATM cards, drivers licenses, smart cards, etc. All software is included to print graphics and text. TECHNICAL SPECIFICATIONS: Technology: Thermal Transfer, Resolution: 300 DPI, Printing Speed: 70 per/hr, Printing Orientation: 0o,90o,180o,270o. ,Printing Area: Full card size, software: IMAGO for Windows or for Macintosh, interface: Serial RS 232, Communication Protocol: ACK/NACK, Baud Rate: 9600/ 19200/38400, Bar Codes: EAN 8-EAN 13-2/5S-2/5I-CODE 39-UPCA-Monarc, Card Size: ISO CR-80 86 x 54mm, Card Thickness :0.27 to 0.80mm (self adapting), Card Material: PVC. ABS, POLYESTER, Power Source : 110-120V, 220-240V, +/- 10%, 50-60 Hz, Weight: 6 Kg, Dimensions: 230mm x 190mm x 190mm. See Photo! Bonus! 853.ASSEMBLED.$4,500.00 800f CARD EMBOSSING MACHINE This machine embosses all kinds of plastic cards, raising the numbers and lettering perfectly just like on credit cards. See Photo! Bonus! 853..................................................................ASSEMBLED...$4,500.00 800h PORTABLE 100 CARD READER This is the device you've heard about and everyone has been asking me to offer. Some waitresses and store clerks are using this device at work. It will store 100 credit card and magnetic stripe card swipes to memory and is powered by lithium camera batteries. The size of this device makes it easily concealable in your pocket. Device can download the information from the swipes to your computer using the supplied cable and software. The software will also easily write the information to any magnetic stripe card using item #800b (sold separately). Download and write to a card in under 20 seconds. Some people have been known to charge as much as $8,000.00 for this device, but we think that's too much. This device can be shipped COD to anywhere in the US. Customers outside of the US must prepay before it can be shipped. All instructions are included. See Photo! Bonus! 802 "Pin Code Hacker", 853.......................................................ASSEMBLED...$1,500.00 800x CREDIT CARD BUSINESS PACKAGE DEAL Purchase the following 3 items together at a remarkably discounted price and get in on the lucrative credit card business. Includes: #800b MAGNETIC STRIPE CARD READER/WRITER, #800h PORTABLE 100 CARD READER, and #828 CREDIT & CALLING CARD NUMBER CAPTURING SYSTEM. All completely assembled, with instructions and software. Save $650.00. Bonus! 802 "Pin Code Hacker", 853................ASSEMBLED...$3,300.00 801 UNIVERSAL INTERFACE HACKING DEVICE The Universal interface is used to connect various devices like GSM phones, amateur radios, radio scanner, smart cards, smart card emulators, EEPROM's, PIC's, organizers, magnetic stripe readers/writers to the PC. The Universal interface has to be connected to a free 25 pin Serial/COM port. In case your PC has only 9 pin Serial/COM ports, a 9pin-to-25pin Adapter is needed, which you can find at any computer or office supply store. In order to connect it to various devices, you need only additional connectors and cables. We are offering as accessories a small range of various connectors and cables for multiple applications but will be expanding this accessory product line in the future. The greatest advantage is the modularity that the interface has. It has accessories for various applications, that can be combined or used separately. The needed power supply is taken from the COM/RS232 port and so it is perfectly suitable for mobile applications (Laptops and Notebooks). You don't have to carry everything with you, only the accessories that you will need. The interface was developed for mobile applications. It measures ONLY 55mm*17mm*66mm. The voltage supply (5V) is taken from the serial port. In the interface is also an integrated 3.579545MHz oscillator, this makes it possible to use the it as a smart card reader/writer. An inverter is additional integrated, so the possibility exists to invert all or individual lines. Thus highest compatibility is ensured, for current and future applications, by the most diverse adjustment possibilities. With this ability the interface can be used with a multiplicity of freeware, shareware as well as commercial software applications. It is suitable for 5V and also for 3.0V applications, full-duplex (3 lines) is supported as well as half-duplex (2 lines), with and without handshake. See Photo! .................................................................................ASSEMBLED...$595.00 ACCESSORIES for 801 801a SMARTCARD READER/WRITER ATTACHMENT (Compatible with DumbMouse, Phoenix, SerProg, SmartMouse, PC/SC driver available) Includes both large and small card slots. This product, in combination with product #801, is exactly the same as products #177 and #500, except that it includes both the normal-sized and smaller-sized card sockets, and will also work with software designed for parallel programmers. The greater advantage with this product is that it is expandable and compatible with upcoming future technologies. By using the various settings the interface offers, it is compatible with the mostly used smart card readers/writers like the Phoenix interface (mostly used in SatelliteTV applications), DumbMouse, SerProg, SmartMouse and others. With this compatibility the interface is working with a wide range of freely available software and drivers. With the interface and the included software and PC/SC driver, you are able to read/write almost all SmartCards like: * Memory SmartCards: TeleCards, I2C, 2-wire, 3-wire , MicroWire * CPU SmartCards: T=0, T=1, and all asynchrone SmartCards with 3.58 MHz clock. Like: GSM Sim cards, Cashcards, DSS, CryptoFlex, CyberFlex, GPK2000, MPCOS, MultiFlex, PayFley, Starcos, * White Wafer Cards (with a PIC16X84), Gold Wafer Cards (PIC16X84+EEPROM 24LC16), MM2 and other compatible. The disadvantage of most commercial readers/writers is that in most cases they are using a PIC or similar CPU to communicate with the smart card. In such cases you are only able to use software that you get with the reader/writer, and 3rd party software that explicitly supports that particular reader/writer. The software uses a driver/API that will in most cases not allow you to use or try some nonstandard commands. This is a limitation, not appreciated by software developers. Not to mention that you will not be able to use a wide range of application software available on the Internet. The interface is a direct reader/writer, communicating directly with the smart card, without drivers, you can directly and without any limitation access every card. The interface is the only available smart card reader/writer capable of programming wafer cards without a power supply. You can program the PIC16X84 and the EEPROM from the Wafercard using your notebook. Includes software on CD-ROM. See Photo!....ASSEMBLED...$195.00 801b & 801c SMARTCARD EMULATOR/DATALOGGER ATTACHMENT (compatible with: Season7, ASIM, and datalogger) Emulates: GSM, Irdeto, VideoCrypt I+II, EuroCrypt, D2Mac, Cashcards. The smart card emulator is a development tool for the hardware and software developer. The PCB has the standard smart card dimensions. It is inserted into the MasterDevice, instead the smart card, and the other end is connected to the PC, using the interface. With the proper use of emulator software the PC can emulate a smart card. The connection is Season7 and ASIM compatible. All 8 ISO contacts are taken to the socket, so the PCB can also be used to emulate/analyze non-standard smart cards. It can also be connected to the parallel port, in order to be used with software written for the parallel port. Beside the "Normal ISO 7816" version we also offer a "small" SIM version. This version is used mostly for GSM/PCN applications, for phones that are using the Small SIM format. The smart card emulator/datalogger can also be used on any device where smart cards are used, like satellite and network tv decoders and other applications. Includes software on CD-ROM. 801b Normal ISO 7816 version. See Photo!...................ASSEMBLED...$150.00 801c Small SIM version. See Photo!.......................................KIT...$100.00 828 CREDIT & CALLING CARD NUMBER CAPTURING SYSTEM This system is just like the one recently featured on TV news that is currently being used at airports and shopping malls, and netting millions of dollars for its operators. This all-in-one hardware system will allow you to remotely capture unlimited credit card and calling card numbers (including PIN numbers and expiration dates) when entered into pay telephones. You can even capture the names and billing addresses of the card holders. The system can be used remotely from the comfort of your home, a payphone, or a cell phone. Information is stored in memory and displayed via LCD. A REAL money-making system that can net you millions without ever being caught, and can pay for itself after just a few minutes of use. You can literally capture hundreds of valid numbers and related information every day, whenever you want. Can be used in conjunction with #800b to write your own credit cards. All instructions included. See Photo! Bonus! 802 "Pin Code Hacker", 853...........................................................................ASSEMBLED...$950.00 857 BILL CHANGER & VENDING MACHINE HACKER/JACKPOTTER This handheld, concealable device will cause various affects on different machines including BILL CHANGER MACHINES. It's portable, battery powered, and measures 2-1/4 inches by 4 inches. Included are complete instructions on how to obtain free products and to jackpot machines of coins by a simple push of a button. Many vending machines hold in excess of $50.00 change, while bill changer machines can hold in excess of $500.00. Device will work on both 120 and 220 volt systems, making it effective anywhere in the world. We've now combined features from our now-discontinued Soda Machine Hacker. Not only will this device jackpot the soda machine, but in many instances will cause cans of soda to drop down the chute. Bonus! 853..................ASSEMBLED...$375.00 867 EMP MANIPULATION DEVICE This device is so controversial that we can't tell you what it can be used for except for the general information in this description. However, ALL instructions are included with the purchase of this device. This device drastically affects ALL electronic machines when brought into close proximity (Within 1 meter or 36 inches approx.) The highly directional pulsed signal can make you RICH if used in an illegal fashion, which, of course, we do not recommend. This system includes a "general" antenna but several specialized antennas are also available. See Photo! Bonus! ...................................................ASSEMBLED*...$775.00 OPTIONAL ANTENNA PACKAGE FOR ITEM# 867 867a Antenna the width of paper currency (works in most countries). 867b Antenna the width of a coin (works in most countries). 867c Antenna the width of a credit card (works in ALL countries). See Photo! Kit and instructions to build ALL 3 antennas (no soldering required)...KIT...$175.00 We WILL NOT answer emails from anyone asking about illegal activities, or how to use our products for illegal activities...they will automatically be deleted. All products are designed for testing and exploring the vulnerabilities of CUSTOMER-OWNED equipment, and no illegal use is encouraged or implied. We WILL NOT knowingly sell to anyone with the intent of using our products for illegal activities or uses. It is your responsibility to check the applicable laws in your city, state, and country. (END) There also can be no doubt that traditional methods of identity theft coupled with information age ease of access to citizens biographical information is contributing to increases in both the number of cases resulting in financial losses and the size of the losses. Reuters recently reported a dramatic example of identity theft coupled with financial fraud resulting in substantial losses: Man pleads guilty to stealing executives' personal data Tuesday September 26, 5:27 pm Eastern Time By Gail Appleson, Law Correspondent NEW YORK, Sept 25 (Reuters) - A Tennessee man has pleaded guilty to using credit card and bank information stolen from top executives at major corporations to buy diamonds and Rolex watches, federal prosecutors said on Tuesday. James Rinaldo Jackson, 39, of Memphis pleaded guilty to 29 counts of conspiracy, credit card, mail, wire and bank fraud. Prosecutors said he entered his plea during a hearing on Monday in Manhattan federal court. Among the victims were John Alm, president of Coca-Cola Enterprises, the largest bottler of Coke; Richard Fuld, chief executive officer of Lehman Brothers Holdings; Stephen Bollenbach, chief executive of Hilton Hotels Corp., and Gorden Teter, the former CEO of Wendy's International, who is now deceased. Other victims included Dr. James Klinenberg, former administrator of Cedars-Sinai Medical Centre in Los Angeles and Nackey Loeb, former president of the Union Leader Corp. and publisher of the Union Leader and New Hampshire Sunday News. Teter, Klinenberg and Loeb had died shortly before the information was stolen. Jackson faces a possible maximum sentence of 30 years in jail and $1 million fine on each of 27 bank, mail and wire fraud charges; five years in prison and a $1 million fine on the the conspiracy charge, and 20 years in prison and $250,000 fine on the credit card fraud charge. The diamonds and Rolex watches he tried to buy were worth a total of more than $730,000. During the hearing, Jackson admitted that between December 1999 and last February he stole financial information about his victims. Impersonating the victims, he then contacted their banks and credit card companies to arrange for their billing addresses to be changed to various hotels in the Memphis, Tenn. area. He explained to the court that he had obtained the information by researching his victims in ``Who's Who In America'' and in some cases used the Internet to obtain personal information about the executives. Jackson admitted that he obtained information about Teter by deceiving Wendy's into believing that he was a potential franchisee. He learned through the Internet that Teter had died and then obtained personal information about the deceased executive through a variety of means including the funeral home. Using the names of his victims, he contacted jewelry dealers throughout the United States and bought diamonds and Rolex watches that he had seen on the dealers' Internet Web sites. Jackson paid for purchases by either charging them to the victims' credit card numbers, having banks wire money from the victims' bank accounts or mailing the dealers fraudulent checks. He then had the jewelry dealers ship the diamonds and watches to the Memphis-area hotels. Jackson then made reservations at the hotels in the victims' names and notified the hotels to expect a package delivery. He, sometimes along with an accomplice, then picked up the packages. Jackson was arrested on Feb 25 near Memphis by FBI agents who watched him trying to pick up a package addressed to one of his victims. (END) This case may be dramatic but does not stand alone. Recent figures have placed identity theft coupled with financial fraud as one of the fastest growing crimes in the United States today. Current estimates place the figure at 500,000 cases each year with an average loss of $17,000 per case. Indeed, the United States Secret Service has begun to note the presence of organized criminal activity in the area of identity theft and financial fraud. (see Appendix II: Testimony of Bruce A. Townsend, Special Agent In Charge, U.S. Secret Service - Financial Crimes Division; before the U.S. House of Representatives, September 13, 2000) Statutory Inconsistencies Create Hurdles To Law Enforcement Given the reality of the growing threat to the protection of customer account information, the challenge ahead is for the United States Congress and state legislatures to pass laws empowering state and federal law enforcement to combat these threats without choking off legitimate technological advances and ease of access for legitimate consumers to their own account information. With the passage of Gramm-Leach-Bliley Congress took a major step in trying to define who will have access to confidential and personal information and at the same time attempted to thwart the use of fraud by identity thieves to illegally access customer information. The federal regulatory agencies are in the process of enacting regulations to enforce the provisions of Gramm-Leach-Bliley as we meet here today. It is too early to determine how Gramm-Leach-Bliley and the subsequent regulations now under consideration will impact many important areas of privacy surrounding financial information. However, it is not too early to recognize that Gramm-Leach-Bliley has failed in thwarting the efforts of disreputable private investigators and "information brokers" in the advertising and sale of confidential account information as demonstrated above and in my numerous appearances before Congress. Section 521 of Gramm-Leach-Bliley has a child support exemption provision allowing for the use of fraud against financial institutions in order to obtain customer account information under certain conditions. This one exemption has allowed private investigators to continue to advertise the sale of confidential financial information and has created a hurdle for law enforcement in enforcing Gramm-Leach-Bliley. Gramm-Leach-Bliley needs to be amended at once. The narrowly crafted child-support exemption for the use of fraud is being used as an advertising shield by private investigators to hide behind while continuing the covert sale of financial information that falls outside of the GLB exemptions. The provisions of GLB that allow for pretext in a child support situation state as follows: Sec. 521 (g) NONAPPLICABILITY TO COLLECTION OF CHILD SUPPORT JUDGMENTS- No provision of this section shall be construed to prevent any State-licensed private investigator, or any officer, employee, or agent of such private investigator, from obtaining customer information of a financial institution, to the extent reasonably necessary to collect child support from a person adjudged to have been delinquent in his or her obligations by a Federal or State court, and to the extent that such action by a State-licensed private investigator is not unlawful under any other Federal or State law or regulation, and has been authorized by an order or judgment of a court of competent jurisdiction. The operative language is: "No provision of this section shall be construed to prevent any State-licensed private investigator.from obtaining customer information of a financial institution...to collect child support from a person adjudged to have been delinquent in his or her obligations by a Federal or State court...AND has been authorized by an order or judgment of a court of competent jurisdiction." This language clearly means from both the legislative history of the act and the plain face of the statute that a judge (Court) must specifically authorize the use of pretext to obtain customer information of "a financial institution". I am not aware of a single case where a Court has authorized a private investigator to intentionally deceive a financial institution in order to obtain customer information. It is easy to understand why this has not happened and most likely never will. The presumptive evidentiary burden that would be required to obtain such an order would easily support the issuance of a subpoena to the institution that the information is being sought from and is being contemplated for pretext. Unless Congress has evidence that financial institutions routinely falsify responses to subpoenas it is hard to fathom why this provision was placed in GLB. Further, this section states: "to the extent reasonably necessary to collect child support from a person adjudged to have been delinquent in his or her obligations by a Federal or State court." The legislative history of this exemption was a claim made by some representatives of the private investigative industry that pretext was needed as there was no other method available to locate the financial institution holdings of deadbeat parents who lie to the Courts. This claim was not true at the time, as there are many lawful ways to pursue overdue non-custodial child support payments and many taxpayer funded agencies designed to fill that role. However, even if this argument is accepted as a legitimate historical reason for the exemption, there is no longer any legislatively justifiable reason to maintain the exemption given the provisions of the Personal Responsibility and Work Opportunity Reconciliation Act of 1996 which are now in effect and mandate that all financial institutions cooperate with the government by providing the financial information of delinquent child support parents directly to the Federal government for asset forfeiture. The following excerpt describing this procedure is from a front-page article written by Robert O'Harrow, Jr. in the Sunday, June 27, 1999 edition of the Washington Post: As part of a new and aggressive effort to track down parents who owe child support, the federal government has created a vast computerized data-monitoring system that includes all individuals with new jobs and the names, addresses, Social Security numbers and wages of nearly every working adult in the United States. Government agencies have long gathered personal information for specific reasons, such as collecting taxes. But never before have federal officials had the legal authority and technological ability to locate so many Americans found to be delinquent parents -- or such potential to keep tabs on Americans accused of nothing. The system was established under a little-known part of the law overhauling welfare three years ago. It calls for all employers to quickly file reports on every person they hire and, quarterly, the wages of every worker. States regularly must report all people seeking unemployment benefits and all child-support cases. Starting next month, the system will reach further. Large banks and other financial institutions will be obligated to search for data about delinquent parents by name on behalf of the government, providing authorities with details about bank accounts, money-market mutual funds and other holdings of those parents. State officials, meanwhile, have sharply expanded the use of Social Security numbers. Congress ordered the officials to obtain the nine-digit numbers when issuing licenses -- such as drivers', doctors' and outdoorsmen's -- in order to revoke the licenses of delinquents. Enforcement officials say the coupling of computer technology with details about individuals' employment and financial holdings will give them an unparalleled ability to identify and locate parents who owe child support and, when necessary, withhold money from their paychecks or freeze their financial assets. (End of excerpt) (Emphasis added by Robert Douglas) O'Harrow went on to describe in more detail how the new system operates: Next month, financial institutions that operate in multiple states -- such as Crestar Financial Corp., Charles Schwab & Co. and the State Department Federal Credit Union -- will begin comparing a list of more than 3 million known delinquents against their customer accounts. Under federal law, the institutions are obligated to return the names, Social Security numbers and account details of delinquents they turn up. The Administration for Children and Families will then forward that financial information to the appropriate states. For security reasons, spokesman Kharfen said, the agency will not mix the financial data with information about new hires, wages and the like. Bank account information will be deleted after 90 days. In a test run this spring, Wells Fargo & Co. identified 72,000 customers whom states have identified as delinquents. NationsBank Corp. found 74,000 alleged delinquents in its test. Later this year, smaller companies that operate only in one state will be asked to perform a similar service. Officials say most of these institutions will compare their files against the government's. But some operations that don't have enough computing power -- such as small local banks, credit unions and securities firms -- will hand over lists of customers to state officials for inspection. States can then administratively freeze the accounts. In California, more than 100 financial institutions have already handed over lists of all their depositors to state officials, including names, Social Security numbers and account balances, a state official said. (End of excerpt) (Emphasis added by Robert Douglas) Finally, the exemption places GLB in direct conflict with other federal statutes outlawing wire and mail fraud and unfair and deceptive trade practices. The exemption also places GLB in direct conflict with many State laws and creates nothing short of a judicial quagmire. Simply put, there is no legitimate reason to continue the child support exemption to Gramm-Leach-Bliley. There is a legitimate reason to strike it from the statute as companies are using it as pretence to advertise their ability to locate financial institution customer information. All the ad need say is the request must be in compliance with applicable laws and that all requests are performed on that basis. Conclusion Threats to information security systems of the financial services industry abound. With advancing technology we see the re-emergence of traditional methods of identity theft, pretext and fraud on the rise again. Law enforcement must be aggressive in combating these crimes before citizens become concerned about the safety and integrity of the industry. Congress should not be in the business of creating hurdles to effective law enforcement protection of customers of the financial services industry. Congress should be in the business of assisting the industry and consumers by empowering law enforcement to aggressively prosecute identity thieves of all types. © 2000 Robert Smith Douglas, III Appendix I Statement by Robert Douglas before the Committee on Banking and Financial Services United States House of Representatives Hearing On Identity Theft and Related Financial Privacy Issues September 13, 2000 My name is Robert Douglas and I am the co-founder and Chief Executive Officer of American Privacy Consultants, Inc. located in Alexandria, Virginia (www.privacytoday.com). American Privacy Consultants assists organizations and businesses understand and implement appropriate privacy policies, strategies, defenses, educational programs, training, and auditing. I appreciate the opportunity to appear before this committee once again to address the issue of identity theft, "pretext calling", and other deceptive practices still in use by some "information brokers", private investigators, judicial judgment collectors and identity thieves to illegally access the personal and confidential information of customers of financial institutions. Unfortunately, in spite of the enactment of legislation drafted by this Committee to outlaw such practices, these methods not only survive but also continue to grow in volume, scope, and methodology. Chairman Leach, I want to personally thank you and the Committee for your continued willingness and desire to address this serious issue first by crafting and passing much needed legislation and now in an oversight capacity. I am personally aware of the amount of time the Committee members and staff have invested in this problem over the last three years and as a citizen applaud the Committee's willingness to tackle these issues. I also would like to single out for recognition Jim Clinger, the Committee's Senior Counsel and Assistant Staff Director. Over the last three years I have had the unique pleasure of working with Jim on a regular basis and he is a true credit to this Committee and to the United States Congress. Above all he is a true gentleman. Finally, I would like to thank John Forbes, Special Agent - United States Customs Service; and, Alison Watson, Professional Staff Member of the Committee for their work over the last month in preparation for this hearing. H.R. 4311 Although I was specifically asked to address the use of pretext and other deceptive techniques to access confidential financial information, I would like to make a few brief observations concerning HR 4311. There can be little doubt that identity theft is one of the fasting growing crimes in the United States today. Each year hundreds of thousands of Americans fall prey to identity thieves. The financial and credit damage implications are severe for the individual who is the victim of identity theft. Additionally, retailers and financial institutions suffer financial losses as a result of identity theft. Finally, the nation as a whole suffers in increased prices for retail products and financial services including the cost of credit. The advent of the World Wide Web has brought increased opportunities for identity thieves through ease of access to personal, biographical data needed to perpetrate identity crimes and facilitates ordering merchandise absent a face-to-face encounter with a store clerk. These facts require that we examine areas of weakness that identity thieves exploit. In 1998 I demonstrated for this Committee the ease with which an individual can purchase private and confidential financial information. It is even easier to obtain the name, address, date of birth, social security number, mother's maiden name, phone number, and often the employment of any individual in the United States today. All of this information is for sale on the web. In a nutshell, all the information needed to steal a citizen's identity and create financial havoc is available on the Internet for little or no cost. The largest source of up-to-date personal, biographical information is credit bureaus. The sale and resale of credit header information by credit bureaus to private investigators, information brokers and judicial judgment collection professionals results in this information being accessible to anyone for a fee. This is big business. Several large companies make millions of dollars each year reselling personal information gathered by the credit bureaus. When citizens apply for credit or enter into a credit transaction they do not know that their personal, biographical information is then resold to any individual with a few bucks and a web browser. If the level of trust in the Internet is ever to rise from the relatively low position it now occupies, the sale of personal information must be brought under control. A good place to begin is by curtailing the sale of credit header information absent a permissible purpose as defined currently within the FCRA. For that reason I believe Section 8 of HR 4311 is long overdue. Pretext and other Deceptive Practices July 1998 through September 2000 On July 28, 1998, while appearing before this Committee, I stated: "All across the United States information brokers and private investigators are stealing and selling for profit our fellow citizens personal financial information. The problem is so extensive that no citizen should have confidence that his or her financial holdings are safe." Sadly, I return today to inform this Committee that my statement of 1998 remains true today. While the illegal access of financial information continues, progress has been made. When we last met in July of 1998 four steps were required in order to stop these practices. First, the financial services industry needed to understand and take affirmative steps to combat the threat posed by unscrupulous information brokers, private investigators, and identity thieves. Second, tough federal legislation was needed to outlaw the use of pretext and deception as a means to access confidential financial information. Third, appropriate federal regulatory agencies needed to create standards and regulations designed to assist institutions in the safeguarding of financial information and to reflect the legislative intent encompassed within any legislation enacted by Congress. Finally, aggressive prosecution of individuals and companies who steal, buy, and/or sell personal financial information was required to signal that the integrity of our nation's financial system is a law enforcement priority. The first three sides of the square have been completed. The financial services industry has made significant progress in beginning to combat identity theft and pretext through a sober recognition that this is not a problem that can be ignored if the industry wishes to maintain a reputation for providing confidentiality to customers. This recognition has been acted upon through the use of training programs and educational materials to begin the education of financial services industry professionals to the threats posed by identity thieves of all types. Many financial institutions have begun to enact internal standards designed to identify and thwart the practices of identity thieves and infobrokers. Is there more to do? Absolutely. Is the financial services industry taking the confidentiality of the records it safeguards on behalf of customers seriously enough to continue to move forward in this area? I believe so. This Committee and Congress moved quickly to pass legislation designed to punish those who would impersonate others in order to gain access to private financial records. With the passage of Gramm-Leach-Bliley, there is now federal law outlawing the use of pretext and other deceptive techniques to gain access to personal financial information absent several narrowly defined and commonly misunderstood exceptions. The federal regulatory agencies with direct supervisory function of the financial services industry moved quickly in 1998, by means of an advisory letter and other steps, to alert all institutions to the practices of identity thieves and information brokers. These same agencies are continuing as we meet here today to develop standards and regulations in keeping with the intent of Gramm-Leach-Bliley. With the first three sides of the box either erected or under construction, it is now time to build the final wall through aggressive enforcement action. With the enactment of Gramm-Leach-Bliley last November, I assume that the Federal Trade Commission and appropriate criminal enforcement agencies are now preparing to use the tools Congress and the President handed them. To my knowledge there has been one federal enforcement action brought by the FTC against an information broker. That civil action was begun prior to the enactment of Gramm-Leach-Bliley under laws designed to thwart "unfair and deceptive trade practices". Several states, notably Massachusetts, have aggressively pursued illegal information brokers. Again, these actions were taken prior to GLB and under state laws against illegal trade practices. It is time for tough nationwide enforcement of the civil and criminal provisions contained within Gramm-Leach-Bliley. In the invitation letter I received from the Committee to testify today I was asked to specifically address three areas: 1) The extent to which the use of pretext and other deceptive means continue in spite of the passage of Gramm-Leach-Bliley; 2) The effectiveness of efforts by the financial services industry to deter and detect fraudulent attempts to obtain confidential account information; and, 3) Other threats to financial privacy emerging today. The Extent To Which Deceptive Practices Continue Post Gramm-Leach-Bliley The use of pretext and other means of deception to trick financial institution employees and customers into disclosing personal and confidential financial information that I testified about two years ago continue unabated. Books have been written about pretext to teach and share common methods. Discussion groups abound on the Internet with the trading of new and improved techniques almost on a daily basis. Classes are held in which pretext methods are shared for a price. The techniques are becoming more complex and refined. Advertisements on the World Wide Web have doubled in the past two years. Here is a typical example: Bank Account Search Search Price $249.00 Availability National Approximate Return Time 10-18 Business Days* Requires Subject's Full Name, Complete Street Address, Social Security Number* Search Description Given a Subject's full name, complete address and social security number, this search will return the bank name and address, account type, account number, (if available) and approximate current balance of all located personal accounts. We access a proprietary database and identify open accounts using the Subject's SSN, however this search will only identify accounts in the Subject's primary state the business resides. If you suspect accounts exist in more than the primary residing state, a separate search request for each state is required, and should include the Subject's address in that state. *This search requires the Subjects social security number. If the SSN is unknown, we will find it for the purposes of this search but it will not be included in your search result. NOTE: This search uses the Subject's social security number as the account identifier, so only primary account holders are returned. Also, be sure to include any additional information you may have, such as the Subject's home & work telephone, birthdate, mother's maiden name, etc, in the additional comments section. This will greatly increase the odds of a successful search. Responsible Purpose For Search This search may return sensitive, confidential, and/or private information. For this reason, DOCUSEARCH.COM requires an explanation stating the purpose for requesting this search, its' intended use and supporting documentation. Additionally, we reserve the right to decline to perform any search which we deem not to be for a legitimate legal purpose or may cause emotional or physical harm. ImportantDisclaimer Financial searches are for informational purposes only, and are not acceptable as an exhibit or as evidence. Every effort is made to provide a complete & thorough search result. However, no method of research is 100% fool-proof and no firm can offer an absolute guarantee that every account will be found. *This search requires many hours of research and can't be rushed, as we want to return thorough, accurate results. Therefore, this is an approximate return time. (End) This advertisement is remarkable in many regards. The ad claims to "access a proprietary database and identify open accounts using the subjects SSN", yet "this search requires many hours of research and can't be rushed, as we want to return thorough, accurate results" and the search may require "10-18 business days". There is no proprietary database available to private investigators or information brokers that by use of the SSN (social security number) banking information can be obtained. In fact this ad used to say the company accessed a "federal database" to obtain the information. The ad further states: "Also, be sure to include any additional information you may have, such as the Subject's home & work telephone, birthdate, mother's maiden name, etc, in the additional comments section. This will greatly increase the odds of a successful search." Why would a database accessed by SSN require this personal information? It wouldn't. But pretext does. Many financial institutions use the mother's maiden name as a password. Further, some institutions will ask for your home or work phone numbers to verify the account holder. Finally, the phone numbers are often required as part of a pretext contact made directly to the account holder. The ad also states: "Additionally, we reserve the right to decline to perform any search which we deem not to be for a legitimate legal purpose or may cause emotional or physical harm." Perhaps this is an attempt to signify that a search request must satisfy GLB and other applicable State and Federal laws. Perhaps not. Here is the transcript of an email contact I had with Docusearch: From: DOCUSEARCH.COM To: email address deleted Subject: Re: Information Request Sent: Mon 3/20/00 1:41 PM You will first have to locate his address in the current residence state. This may be accomplished with a Locate by Previous Address Search. Then you can order the Bank Account Search. At 01:38 PM 3/20/00 , you wrote: >------------Begin, Information Request from visitor----------- >My Name Is : Rob Douglas >My Email Address Is : (deleted) >My Telephone Number Is : (deleted) >My Question Pertains To : Other: Explain Below >Comments : I have a client who is owed a substantial amount of money >by a potential defendant who left the area and closed his personal and >corporate bank accounts. I have an old home address for the potential >defendant and know what state he moved to. What searches would you >recommend to locate the potential defendant and his personal and >corporate bank accounts? >------------End, Information Request from visitor ----------- The ">" portions represent the email I sent to Docusearch using their on-line request form. Three minutes later I received the reply that I could order the bank account search in a situation that would clearly be illegal under GLB if pretext were used. I would hope that members of this Committee would find the services offered and language of the advertisements by Docusearch to be as disturbing as I do. I suspect many of the members of this Committee would wonder why this firm is allowed to operate in this fashion given the provisions of GLB and the applicable "unfair and deceptive trade practice" sections of Federal law. The excuse might be offered that this is just one company that no one in a position of responsibility to address these practices was aware of. That excuse would ring hollow. Docusearch is the company that sold personal information concerning Amy Boyer to a stalker that resulted in the murder of Ms. Boyer and the suicide of the stalker. Amy's parents have testified before Congress and have been widely covered in the media. In fact, Amy's death has led to consideration of legislation by this Congress to outlaw the sale of social security numbers. Throughout all this attention Docusearch has made one change to the web site where it advertises. Docusearch no longer publicly advertises the sale of social security numbers. But Docusearch continues to do business selling personal and confidential information. The attention to Docusearch does not end there. Docusearch was the cover story for Forbes magazine on November 29, 1999. This was seventeen days after President Clinton signed GLB into law. In the article Dan Cohn of Docusearch literally bragged about his abilities to obtain personal information about a subject. Here is the opening quote from the Forbes cover story: THE PHONE RANG AND A STRANGER CRACKED SING-SONGY AT THE OTHER END OF the line: "Happy Birthday." That was spooky--the next day I would turn 37. "Your full name is Adam Landis Penenberg," the caller continued. "Landis?" My mother's maiden name. "I'm touched," he said. Then Daniel Cohn, Web detective, reeled off the rest of my "base identifiers"--my birth date, address in New York, Social Security number. Just two days earlier I had issued Cohn a challenge: Starting with my byline, dig up as much information about me as you can. "That didn't take long," I said. "It took about five minutes," Cohn said, cackling back in Boca Raton, Fla. "I'll have the rest within a week." And the line went dead. In all of six days Dan Cohn and his Web detective agency, Docusearch.com, shattered every notion I had about privacy in this country (or whatever remains of it). Using only a keyboard and the phone, he was able to uncover the innermost details of my life--whom I call late at night; how much money I have in the bank; my salary and rent. He even got my unlisted phone numbers, both of them. (End of excerpt) One might wonder who Dan Cohn is and whom he sells this information to. Forbes answered that as well: Cohn operates in this netherworld of private eyes, ex-spooks and ex-cops, retired military men, accountants and research librarians. Now 39, he grew up in the Philadelphia suburb of Bryn Mawr, attended Penn State and joined the Navy in 1980 for a three-year stint. In 1987 Cohn formed his own agency to investigate insurance fraud and set up shop in Florida. "There was no shortage of work," he says. He invented a "video periscope" that could rise up through the roof of a van to record a target's scam. In 1995 he founded Docusearch with childhood pal Kenneth Zeiss. They fill up to 100 orders a day on the Web, and expect $1 million in business this year. Their clients include lawyers, insurers, private eyes; the Los Angeles Pension Union is a customer, and Citibank's legal recovery department uses Docusearch to find debtors on the run. Cohn, Zeiss and 13 researchers (6 of them licensed P.I.s) work out of the top floor of a dull, five-story office building in Boca Raton, Fla., sitting in cubicles under a fluorescent glare and taking orders from 9 a.m. to 4 p.m. Their Web site is open 24 hours a day, 365 days a year. You click through it and load up an on-line shopping cart as casually as if you were at Amazon.com. (End of excerpt) Amazingly, Cohn admits to the use of fraud and bribery: The researchers use sharp sifting methods, but Cohn also admits to misrepresenting who he is and what he is after. He says the law lets licensed investigators use such tricks as "pretext calling," fooling company employees into divulging customer data over the phone (legal in all but a few states). He even claims to have a government source who provides unpublished numbers for a fee, "and you'll never figure out how he is paid because there's no paper trail." (End of excerpt) The following excerpt reveals methods used by Cohn directly relevant to today's hearing and HR 4311: Cohn's first step into my digital domain was to plug my name into the credit bureaus--Transunion, Equifax, Experian. In minutes he had my Social Security number, address and birth date. Credit agencies are supposed to ensure that their subscribers (retailers, auto dealers, banks, mortgage companies) have a legitimate need to check credit. "We physically visit applicants to make sure they live up to our service agreement," says David Mooney of Equifax, which keeps records on 200 million Americans and shares them with 114,000 clients. He says resellers of the data must do the same. "It's rare that anyone abuses the system." But Cohn says he gets his data from a reseller, and no one has ever checked up on him. Armed with my credit header, Dan Cohn tapped other sites. A week after my birthday, true to his word, he faxed me a three-page summary of my life. He had pulled up my utility bills, my two unlisted phone numbers and my finances. (End of excerpt) And should there be any question as to the ability of a determined criminal to gain access to confidential information including financial information, the following excerpt is on point: He had my latest phone bill ($108) and a list of long distance calls made from home--including late-night fiber-optic dalliances (which soon ended) with a woman who traveled a lot. Cohn also divined the phone numbers of a few of my sources, underground computer hackers who aren't wanted by the police--but probably should be. Knowing my Social Security number and other personal details helped Cohn get access to a Federal Reserve database that told him where I had deposits. Cohn found accounts I had forgotten long ago: $503 at Apple Bank for Savings in an account held by a long-ago landlord as a security deposit; $7 in a dormant savings account at Chase Manhattan Bank; $1,000 in another Chase account. A few days later Cohn struck the mother lode. He located my cash management account, opened a few months earlier at Merrill Lynch &Co. That gave him a peek at my balance, direct deposits from work, withdrawals, ATM visits, check numbers with dates and amounts, and the name of my broker. (End of excerpt) Cohn is even willing to lead officials to believe he is a law enforcement officer as this excerpt demonstrates: How did Cohn get hold of my Merrill Lynch secrets? Directly from the source. Cohn says he phoned Merrill Lynch and talked to one of 500 employees who can tap into my data. "Hi, I'm Dan Cohn, a licensed state investigator conducting an investigation of an Adam Penenberg," he told the staffer, knowing the words "licensed" and "state" make it sound like he works for law enforcement. Then he recited my Social Security, birth date and address, "and before I could get out anything more he spat out your account number." Cohn told the helpful worker: "I talked to Penenberg's broker, um, I can't remember his name...." "Dan Dunn?" the Merrill Lynch guy asked. "Yeah, Dan Dunn," Cohn said. The staffer then read Cohn my complete history--balance, deposits, withdrawals, check numbers and amounts. "You have to talk in the lingo the bank people talk so they don't even know they are being taken," he says. (End of excerpt) But the Forbes reporter (Penenberg) did some further digging and uncovered what appears to be direct evidence of the use of impersonation and pretext in the following excerpt: Sprint, my long distance carrier, investigated how my account was breached and found that a Mr. Penenberg had called to inquire about my most recent bill. Cohn says only that he called his government contact. Whoever made the call, "he posed as you and had enough information to convince our customer service representative that he was you," says Russ R. Robinson, a Sprint spokesman. "We want to make it easy for our customers to do business with us over the phone, so you are darned if you do and darned if you don't." Bell Atlantic, my local phone company, told me a similar tale, only it was a Mrs. Penenberg who called in on behalf of her husband. I recently attended a conference in Las Vegas but don't remember having tied the knot. (End of excerpt) Finally, Cohn believes he is justified in what he does: Daniel Cohn makes no apologies for how he earns a living. He sees himself as a data-robbing Robin Hood. "The problem isn't the amount of information available, it's the fact that until recently only the wealthy could afford it. That's where we come in." (End of excerpt) I have one question. Why are Dan Cohn and Docusearch still in business? Docusearch is not alone. There are now more information brokers and private investigators openly advertising their ability to obtain and sell financial information then there were in 1998. These ads continue to be found on the World Wide Web, in the yellow pages and in legal and investigative trade journals. In fact, there has been an ad running in the local edition of the Legal Times that can be found in many law firms and federal offices here in Washington. I suspect copies can be found at the FBI, U.S. Attorney's Office, the Department of Justice, and the Federal Trade Commission. One phone call to this company determined they offer the ability to locate an address for an individual for $65 if the social security number is provided and $115 if the social security number is not provided. Further, and more to the point, for $200 they will supply the name of the bank, the type of account maintained and the balance in the account for the individual specified. There was a further offer extended by the company to confirm that the funds are available and there would be no charge if there were only minimal funds in the account. The scenario presented to the company fell squarely within the four corners of Gramm-Leach-Bliley that would make the request and provision of the banking information illegal if accomplished by pretext. The company was informed that a woman was trying to locate a current address for a live-in boyfriend who had skipped town with money from her checking account. There was nothing in the scenario presented that even began to come close to the exceptions enacted as part of Gramm-Leach-Bliley. In fact, as the committee is aware, on August 30th Committee Senior Counsel Jim Clinger, Special Agent John Forbes, Committee Staff Member Alison Watson and I called numerous private investigators and information brokers around the country in an effort to determine how many would sell bank account information and under what circumstances. We decided that we would survey the first ten companies that we could reach by phone. The companies were selected randomly by Special Agent Forbes based upon their advertisements. All of the companies were presented with the scenario outlined above. In less than three hours the first ten companies we reached were all willing to sell us personal bank account information detailed enough to raise the educated belief that the information would be obtained by pretext or other deceptive means. Not a single company we reached turned us down. Not one. More to the point, two of the companies' representatives made specific mention of "privacy laws" and "federal statutes" being a hindrance to their ability to provide the information. However, we were told, they could still succeed but just "don't tell anybody" that we had obtained the information. One individual referred to the fact that he had 11 years banking experience and guaranteed that he could find the bank and that 80% of the time he could get the account number and balance. Several of the companies stated that they could get us individual transaction records including deposit information. One offered to teach us how to determine the amount in the account once he located the bank and account number. One company stated that it would check the Federal Reserve section for the part of the country where the individual was located. This same company claimed to work for "hundreds and hundreds of attorneys and collection agencies". Further, they stated that they had found $1.2 million dollars in an account just the previous day for an attorney. They advised us to wait for the banking information before going to Court. Another company stated they would locate the information if we had a "Court filing judgment" or a letter from an attorney giving the name of the person the account information was being sought for and the reason. This company stated they could find local bank information for $200 and statewide information for $500 including account numbers and balances. Several of the companies offered to locate safety deposit box locations and securities related information. One company charges $175 to locate the name and address of the bank if you have a judgment. However, the same company offered for $250 to locate all accounts, account numbers, balances, mutual funds, names on the accounts, dates of closure if an account was closed, and safety deposit box information if we didn't have a judgment. Here is just one example of the type of advertising we found: Welcome to (name omitted). We can perform bank account and investment searches anywhere in the USA and the World. Bank account searches can be used to collect judgements, verify net worth of individuals and companies, or any other purposes. We can search: Bank Accounts Checking Savings Investments Stocks Bonds Commodities Mutual Funds Safety deposit boxes And much, much more. We can search by: State Country Offshore account searches also available. Disclaimer: We limit retrieval to documents or information available from a public entity or public utility which are intended for public use and do not further elaborate on that information contained in the public entity or public utility records. Must Be 18 or Older for a Consultation or Record Search. We take no responsibility and assume no liability for any privacy claims as we neither utilize, reveal, nor attempt to access any confidential information concerning the parties involved in the search. We are not a licensed private investigator, and we do not engage in any activities for which a license is required. (End of excerpts) The disclaimer is amazing in light of the fact that this company offered to sell us the amount located in a checking account and the deposit history to the account for $275. I cannot fathom a single way that account balance and deposit transaction records could be "intended for public use". Indeed this would be a direct revelation of "confidential information". No company we reached asked any questions that would logically follow from the passage of Gramm-Leach-Bliley, even when they had disclaimers in the advertisements suggesting that there were restrictions on who could obtain banking information and under what circumstances. Further, in addition to the overt remarks made by several companies to the minor obstacles presented by "federal statutes" and "privacy laws" the advertisements and telephonic presentations bore all the classic signs of pretext operations. These include no-hit/no-fee guarantees; length of time required to complete the search; higher pricing; and types of information being sold. These results are troubling and point to the inescapable conclusion that there are now criminals hiding behind professional titles such as "information broker", "private investigator", and "judicial judgment collector". I do not make this statement lightly as I was a private investigator for seventeen years and was very proud of my profession. There are thousands of good, honest private investigators, information brokers, and collection professionals working everyday in this country to assist citizens and attorneys at all levels of our judicial system. I receive emails everyday from investigators and brokers who are upset and demoralized because of the practices of some who feel it is easier to steal information instead of using the lawful means that all others who obey the law do. The good, honest professionals are looking to their government to step in and stop these criminals. Further, many of the information brokers, private investigators, and judicial judgment collectors belong to national trade associations. In fact, many of these association members and their leaders can be found in Internet chat areas trading pretext methods. This begs the question: What are these associations doing to police their membership? The Effectiveness Of Efforts By The Financial Services Industry To Deter And Detect Fraudulent Attempts To Obtain Confidential Account Information The financial services industry has for many years utilized various methods of combating fraud and protecting the confidentiality of customer information. As I stated in my testimony two years ago, I believe the industry was not aware of the techniques being used by information brokers and investigators to penetrate their security protocols by means of pretext and impersonation. Indeed, most Americans remain ignorant of the practices of unscrupulous information brokers. The financial services industry is traditionally between a rock and a hard place when it comes to information security. Customers want their information to remain confidential. At the same time, they want easy access twenty-four hours a day to that same confidential information. It is this very dilemma that criminals exploit. The financial services industry is starting to move aggressively to combat the methods and deceptive practices used by identity thieves and infobrokers that seek to illegally gain access to confidential information and in many cases to steal the funds of institution customers. Upgraded and newly developed computer systems and programs work to oversee billions of transactions each day in an effort to identify potentially fraudulent activity. Education and training programs are being modified and instituted to teach all institution employees the signs of identity theft and fraud and what steps to take. Institutions that have taken steps to determine if information brokers are attempting to access confidential information have found that this is indeed the case. More and more institutions are moving to institute passwords and personal identification numbers (PINS) that provide true access protection. But, many more need to move in that direction. Customers are starting to be notified by institutions concerning the reason and need for certain security protocols. Again, more needs to be done in this area. There is much education, training and work that remains. I am convinced the financial services industry is up to the task. I have had a birds-eye view of the response of the financial services industry over the past two years. I have worked directly with institutions and professional associations to educate them on the issue of pretext and other deceptive practices used to penetrate information security systems. In each instance I have found that the privacy, administrative and security leaders in the institutions and at association meetings are genuinely concerned about solving this problem and are moving to do so. The financial services industry relies on a reputation for confidentiality to survive. Recent well publicized cases of institutions not protecting customer information both here and abroad illustrate the harm that will quickly be realized by an institution that does not protect customers. This concern has led, in one instance, to the American Bankers Association distributing to the entire membership an education and basic training program on pretext calling I was asked to author at the association's initiative. The portion I authored was just a small part of a comprehensive three part series the ABA has distributed to the membership to address the subject of identity theft and privacy in detail over the course of this past year. I believe these materials will aid in thwarting the practices of the Dan Cohns of this world. I have been asked to speak on a number of occasions to groups of bankers to demonstrate to them how to spot pretext calls, how to educate financial services employees about pretext, and what steps to take at the institution level to thwart information security intrusions. Indeed, you would be hard pressed to find a gathering of bankers anywhere today where the subject of privacy is not addressed at length as a major topic of discussion. Further, the financial services industry did not wait for the passage of GLB to address the issue of pretext. Almost immediately after my testimony in 1998 the ABA was distributing materials and videotapes to any institution concerning pretext and updated information security practices. It is too early to tell how effectively the defenses now being installed by financial institutions are working to thwart pretext. However, judging by the number of firms advertising the ability to obtain financial information there is still more to be done. However, unless we end legitimate customer access to account information, there will always be criminals who will attempt to steal that information. The financial services industry needs a helping hand from law enforcement. These criminals must be prosecuted. The message needs to be sent that Federal law enforcement is serious about protecting financial institution customers. It is time to act. Emerging Threats To Financial Privacy While the traditional methods of pretext presented before this Committee two years ago continue, there are new emerging threats to the security of information within financial institutions. Those who use creative means to obtain personal information are not resting and waiting to see what Congress or law enforcement will do next to protect the privacy and confidentiality of U.S. citizens. These individuals and companies continue to develop methods to locate citizens and their confidential information. There is much fear that the loss of routinely accessed credit headers will diminish the ability to easily access personal biographical information used as part of a pretext. Therefore, some who seek that information are moving to develop other "sources" and "methods" to develop personal information needed to begin a successful pretext. The fastest growing method used to "skiptrace" for the current address and other personal information of an individual is to obtain the information from the phone company. Most United States citizens believe that their phone records are private unless obtained by subpoena or other form of Court order. This is especially true for the millions of Americans who pay extra to have a non-published or unlisted phone number. Most citizens would further think that who they call and how long they talk is also a private matter. Most citizens would be wrong. For years I have seen the sale of private telephone information on the web and in investigative and legal trade journals. These services include the acquisition and sale of non-published and unlisted phone numbers and records; long distance toll records; cellular phone records; pager records; fax records; the current phone number and address for the owner of a disconnected phone, and much more. While these practices are bad enough, and need to be addressed by Congress and/or law enforcement, the latest development is equally worrisome. Currently, there are presentations of closed, highly secure classes for private investigators and information brokers, teaching the inner workings of the telecommunications industry. These classes are being coupled with databases being developed in the private investigative community to assist in obtaining information held by telecommunications companies. Once obtained this data can then be sold and/or used as part of further identity theft and pretexts used in any number of scenarios, but certainly as the starting point for information gathered as part of a pretext against a financial institution or directly against the financial consumer. Here is an advertisement being widely distributed for these classes: NOW! COMING TO LOS ANGELES! Telecom Secrets Seminar or Using Telecom as a new way to skiptrace and locate. by Michele "Ma Bell" Yontef, CMI Telecom Investigations Specialist, Licensed Private Investigator, Paralegal, Server of Process, Notary, Constable of Court ******************************************************************************************** This is a seminar that will take you from being someone who uses a phone in investigations, to someone who uses the whole telecommunications system to further your investigations. You will gain a comprehensive understanding of the phone system, and how to use that system to get the information you need to close the case. With so many of our "tools of the trade" being taken from us by recent privacy laws, this is a "must attend" seminar. Using Michele's completely legal methods we can continue to obtain the information that is vital to us and to our clients. Don't let yourself or your clients down, learn new and better ways to increase your services and your income. No recording of any kind will be permitted. There will be extensive security measures. Please contact Vicki for details. All attendees will be required to sign a non-disclosure agreement. West Coast Professional Services reserves the right to refuse admittance. These techniques are completely legal, but are being taught only to Investigators and Law Enforcement Officers. Restrictions apply. ************************************************************************************************ A statement from Michele regarding the content: I will be talking about everything from how to make totally anonymous calls to finding the carrier of any type of line. I will be explaining how things in the Telecom work, so that you will know how to legally maneuver around any obstacle. I will show you how to skip trace and locate like never before, by using the Telecom as a database. I will tell you what the operator knows about you, who can hear you talking on the phone, how to perform all types of procedures, and I will be giving you a ton of vital information in my booklets that accompany the seminar. I will also introduce a new form of searching for skips and will open to you first, my brand new database, that encompasses EVERY numerical search you have ever seen online, plus many more new search ideas that I can teach you about in the seminar as well. For example, did you know that the type of switching your telephone company has you hooked into can allow a listen in on your lines...I will explain how to tell what kind of switching you have, and how it can either lend to the listen in, or block it. I can also show you how to use my database to find that switching for any party, and use it to trace a number to CNA, without ever picking up the phone to pretext anyone! I have brought home missing children, using the secret searches I will disclose to all of you that attend. (End)(Emphasis added) Here is another widely distributed reference: Here's an unedited letter from (name deleted), who just experienced the Telecom Secrets Seminar by Michele "Ma Bell" Yontef... Colleagues: There are currently three days to prepare yourself, if you are attending the Los Angeles version of the "Telecom secrets" Seminar. You need to practice taking notes, and be ready to absorb the information like a sponge. There is a lot of it, but it's actually very easy to learn. Michele teaches you about how the entire telecommunications system works, then gives you the secrets of how you can use it to do your own non-pubs, CNA's and disconnects, as well as the rationale that leads you to be able to determine the location of some of the toughest skiptrace assignments and locates, you have ever attempted. I sat in awe, writing as furiously as I could, through the six hour session with the Iowa Association of Private Investigators, (IAPI), provided by Michele, on Friday afternoon. I cannot tell you how valuable this seminar will be to me, in the coming weeks and months, as I develop my skills, using her technique. The best part is that I'd never even thought of most of this stuff. It is all new, and a wonderful way to expand one's skiptracing skills. It will take practice, but she has given us all a true treasure chest, (and she knows how I love treasure chests! --), and all the other tools to do the job. The price is an absolute bargain, too! Please pay particular attention to the reason for her disclaimers and nondisclosure forms. With all the movement and political wrangling of the privacy advocates, (READ - "reactionaries"), we can't afford to have this excellent legal source tainted by the people who would strangle our profession, and shut off all our sources. End)(Emphasis added) The reference to "CNA's" means customer name and address. The reference to "non-pubs" means the ability to obtain the non-published phone number for an individual. The reference to "disconnects" means the ability to locate the new phone number, name and address for someone who disconnected a phone in addition to determining the owner of a previously disconnected phone number. The database being designed to aid in the acquisition of information maintained by the telecommunications industry has been named "The Last Treasure". The choice of this name is intentional. It was chosen to mean that this database will be the last method available to locate the overwhelming majority of citizens should the carte blanche acquisition of credit header information be restricted. As with the pretext of financial institutions two years ago, the presenters of these classes and the developers of this database claim that this is all legal. I will leave that to others to decide. As a citizen of this country I am dismayed that my phone records can be bought and sold on the Internet. As a former private investigator that has handled several stalking cases I am well aware of the damage that can be done through the acquisition and sale of this information. As a privacy consultant, I am well aware of the fact that information obtained from the phone company can and is often used to start a financial pretext. Should there be any doubt concerning the problems that can be created when confidential phone information is obtained, one look no further then a September 9, 2000 article by Lindsey A. Henry for The Des Moines Register: A West Des Moines woman contends that her ex-husband tracked her down and threatened her after MCI WorldCom gave out her phone number and other information. Peggy Hill, 33, is suing the long-distance company in federal court in Des Moines. The lawsuit says her ex-husband in Georgia called MCI at least 10 times in June 1999 asking for her billing information and the numbers she had called. MCI representatives gave him the information and even changed her calling plan at his request, the lawsuit said. (End of Excerpt) Here was a woman being stalked by her ex-husband and taking precautions, only to be thwarted by the ease with which her phone records were accessed: Hill thought she had protected herself, her lawsuit says. She moved several times after her divorce in 1992. She paid for an unlisted number. She asked MCI to keep her information confidential, according to the lawsuit. Only after Hill called to complain did MCI employees flag her account with a warning, according to subpoenaed MCI files. "Please do not look up numbers for him or give him names of where numbers are dialed to," the notation said. "Peggy is in danger!!!!!! . . . MCI should not have given this man any information!!!!!!" (End of excerpt) The following claim of rarity when it comes to the release of confidential phone records is laughable given the ease with which Infobrokers buy and sell phone company customer records every day and widely advertise their ability to do so on the Internet: Sandy Kearney, an investigator for the Iowa attorney general's office, said Hill's situation was rare. "I hear all the time from telephone companies claiming to not release information without permission," she said. Hill's lawyer, George LaMarca, said the lawsuit should remind companies of their obligation to protect customers. "We can't get services without entrusting our most confidential and personal information to companies," LaMarca said. "When we do that, we expect confidentiality. When that trust is breached, companies should expect to pay the consequences." (End of excerpt) Just as this husband was able to allegedly access his ex-wife's customer records, identity thieves, private investigators, information brokers and judicial judgment collectors use similar techniques everyday to access these same records. All they need do is impersonate the customer or the relative of a customer. This common knowledge amongst identity criminals is being used as the starting point for access to personally identifiable information that can then be used to access financial information. This committee will recall the testimony of one of the "Godfathers" of the information broker industry in this very room two years ago. Al Schweitzer instructed us all at that time that one of the most common financial pretexts begins with either a pretext call to the consumer impersonating someone from the phone company, or a pretext call to the phone company to develop personal information to be used as part of a further pretext against the consumer and/or financial institution. The problem continues today and is growing in scope and sophistication. I would like to ring one final warning bell concerning the use of pretext and deceptive information security penetration practices. These are the very techniques that are used by individuals engaged in corporate espionage. Every day these techniques are used to steal our nation's corporate and military trade secrets and other forms of confidential information. I know that our military is aware of this as representatives of the Pentagon asked me to present a private briefing after my last appearance here in 1998. I will not disclose in an open forum what I was able to demonstrate in that briefing other than to state that I believe it confirmed concerns on the part of the officials I met with in relation to a threat that could easily put our country at a disadvantage during a time of crisis. This Committee, which oversees the safety and soundness of our Nation's financial system, should be concerned about the threat that corporate espionage, both domestic and foreign, poses to the financial well being of our country. This is the "Information Age" and our country is the leader in that regard. It is precisely that leadership position which is driving this unprecedented economic boom we are all witnessing. Information technology advantages are paramount to our continued economic success. This is why information security is all-important to that success. Companies are discovering the need for computer system firewalls, yet are woefully unprepared when it comes to social engineering security penetrations and a laissez faire attitude concerning who information is disclosed to telephonically and otherwise. Simply put. Loose lips do sink the corporate ships of today and tomorrow. The most infamous computer "hacker" on the planet, Kevin Mitnick, obtained the plans for an unreleased Motorola product by direct "pretext" phone calls to Motorola employees who then faxed him the plans to his home! If you speak to Mr. Mitnick, you will learn that he obtained just as much confidential information via "dumpster diving" and social engineering (pretext) as he ever did by a true computer hack attack. Another method that is becoming more common is the use of a "Trojan check". An investigator or broker will create a fictitious business name and open a checking account in that business name. A small check will be mailed to the target as a "rebate" or "prize" stamped on the back "for deposit only". Once the check has been deposited and is returned to the fictitious company the banking information obtained on the back of the check can be used to further the pretext to determine the amount of funds held in the account. There is great debate in the investigative and broker communities as to the legality of this practice given Gramm-Leach-Bliley and the deceptive trade practices statutes. While the debate continues, so does the practice. Informal networks of investigators, infobrokers, judgment collectors, and collection professionals are found all over the Internet. It is not uncommon to see requests for "contacts" in financial services institutions. Some collection professionals openly advertise their ability to provide information maintained within their files. Routinely, there are account and file numbers along with the names of targets placed on the Internet for inspection by others to determine if information can be traded or obtained. Vehicle tracking devices are being offered for sale in order to follow or record the travels of citizens. While not directly relevant to the pretext of financial information, it demonstrates the length that some will go to in order to obtain information on citizens in the United States today. If law enforcement agencies of State and Federal governments were caught doing these practices absent a constitutionally permissible purpose and/or Court order there would be rioting in the streets. Yet every day these events are carried out by private investigators, information brokers and judgment collectors who have no authority above that of a private citizen and no one blinks. From where I sit, my privacy is just as violated whether the intrusion comes from a person with a badge or not. What Needs To Be Done I would like to make some suggestions concerning what needs to be done to continue the battle against the use of fraud and deception to access financial information. First, we need swift, aggressive, nationwide action by law enforcement to begin criminal investigation and prosecution of those who are thumbing their noses at the provisions of Gramm-Leach-Bliley and other appropriate statutes. I hope the information I provided in 1998 and today supports this conclusion. Second, GLB needs to be amended. The narrowly crafted child-support exemption for the use of pretext is being used as an advertising shield by private investigators to hide behind while continuing the covert sale of financial information that falls outside of the GLB exemptions. The provisions of GLB that allow for pretext in a child support situation state as follows: Sec. 521 (g) NONAPPLICABILITY TO COLLECTION OF CHILD SUPPORT JUDGMENTS- No provision of this section shall be construed to prevent any State-licensed private investigator, or any officer, employee, or agent of such private investigator, from obtaining customer information of a financial institution, to the extent reasonably necessary to collect child support from a person adjudged to have been delinquent in his or her obligations by a Federal or State court, and to the extent that such action by a State-licensed private investigator is not unlawful under any other Federal or State law or regulation, and has been authorized by an order or judgment of a court of competent jurisdiction. The operative language is: "No provision of this section shall be construed to prevent any State-licensed private investigator.from obtaining customer information of a financial institution...to collect child support from a person adjudged to have been delinquent in his or her obligations by a Federal or State court...AND has been authorized by an order or judgment of a court of competent jurisdiction." This language clearly means from both the legislative history of the act and the plain face of the statute that a judge (Court) must specifically authorize the use of pretext to obtain customer information of "a financial institution". I am not aware of a single case where a Court has authorized a private investigator to intentionally deceive a financial institution in order to obtain customer information. It is easy to understand why this has not happened and most likely never will. The presumptive evidentiary burden that would be required to obtain such an order would easily support the issuance of a subpoena to the institution that the information is being sought from and is being contemplated for pretext. Unless Congress has evidence that financial institutions routinely falsify responses to subpoenas it is hard to fathom why this provision was placed in GLB. Further, this section states: "to the extent reasonably necessary to collect child support from a person adjudged to have been delinquent in his or her obligations by a Federal or State court." The legislative history of this exemption was a claim made by some representatives of the private investigative industry that pretext was needed as there was no other method available to locate the financial institution holdings of deadbeat parents who lie to the Courts. This claim was not true at the time, as there are many lawful ways to pursue overdue non-custodial child support payments and many taxpayer funded agencies designed to fill that role. However, even if this argument is accepted as a legitimate historical reason for the exemption, there is no longer any legislatively justifiable reason to maintain the exemption given the provisions of the Personal Responsibility and Work Opportunity Reconciliation Act of 1996 which are now in effect and mandate that all financial institutions cooperate with the government by providing the financial information of delinquent child support parents directly to the Federal government for asset forfeiture. The following excerpt describing this procedure is from a front-page article written by Robert O'Harrow, Jr. in the Sunday, June 27, 1999 edition of the Washington Post: As part of a new and aggressive effort to track down parents who owe child support, the federal government has created a vast computerized data-monitoring system that includes all individuals with new jobs and the names, addresses, Social Security numbers and wages of nearly every working adult in the United States. Government agencies have long gathered personal information for specific reasons, such as collecting taxes. But never before have federal officials had the legal authority and technological ability to locate so many Americans found to be delinquent parents -- or such potential to keep tabs on Americans accused of nothing. The system was established under a little-known part of the law overhauling welfare three years ago. It calls for all employers to quickly file reports on every person they hire and, quarterly, the wages of every worker. States regularly must report all people seeking unemployment benefits and all child-support cases. Starting next month, the system will reach further. Large banks and other financial institutions will be obligated to search for data about delinquent parents by name on behalf of the government, providing authorities with details about bank accounts, money-market mutual funds and other holdings of those parents. State officials, meanwhile, have sharply expanded the use of Social Security numbers. Congress ordered the officials to obtain the nine-digit numbers when issuing licenses -- such as drivers', doctors' and outdoorsmen's -- in order to revoke the licenses of delinquents. Enforcement officials say the coupling of computer technology with details about individuals' employment and financial holdings will give them an unparalleled ability to identify and locate parents who owe child support and, when necessary, withhold money from their paychecks or freeze their financial assets. (End of excerpt) (Emphasis added by Robert Douglas) O'Harrow went on to describe in more detail how the new system operates: Next month, financial institutions that operate in multiple states -- such as Crestar Financial Corp., Charles Schwab & Co. and the State Department Federal Credit Union -- will begin comparing a list of more than 3 million known delinquents against their customer accounts. Under federal law, the institutions are obligated to return the names, Social Security numbers and account details of delinquents they turn up. The Administration for Children and Families will then forward that financial information to the appropriate states. For security reasons, spokesman Kharfen said, the agency will not mix the financial data with information about new hires, wages and the like. Bank account information will be deleted after 90 days. In a test run this spring, Wells Fargo & Co. identified 72,000 customers whom states have identified as delinquents. NationsBank Corp. found 74,000 alleged delinquents in its test. Later this year, smaller companies that operate only in one state will be asked to perform a similar service. Officials say most of these institutions will compare their files against the government's. But some operations that don't have enough computing power -- such as small local banks, credit unions and securities firms -- will hand over lists of customers to state officials for inspection. States can then administratively freeze the accounts. In California, more than 100 financial institutions have already handed over lists of all their depositors to state officials, including names, Social Security numbers and account balances, a state official said. (End of excerpt) (Emphasis added by Robert Douglas) Finally, the exemption places GLB in direct conflict with other federal statutes outlawing wire and mail fraud and unfair and deceptive trade practices. The exemption also places GLB in direct conflict with many State laws and creates nothing short of a judicial quagmire. Simply put, there is no legitimate reason to continue the child support exemption to Gramm-Leach-Bliley. There is a legitimate reason to strike it from the statute as companies are using it as pretence to advertise their ability to locate financial institution customer information. All the ad need say is the request must be in compliance with applicable laws and that all requests are performed on that basis. Once the investigator is comfortable that the requestor is not law enforcement running a sting operation-they sell any information in complete disregard of the law. Our survey proved this ten times over. Third, financial institutions must continue the work they have started to take every precaution necessary to teach all banking employees about the methods associated with identity theft and pretext so that employees can spot fraudulent acts and know what to do when an act is detected. This will require regular and ongoing education, training and auditing programs to maintain the highest level of information security possible. Infobrokers and identity thieves are constantly developing new techniques and methods. The financial services industry must work to stay abreast of these techniques. Fourth, the federal regulatory agencies must also continue to stay abreast of information security threats and implement appropriate standards and regulations. Audits need to assess the effectiveness of programs in place. Finally, this Committee must continue on a regular basis to exercise the appropriate oversight functions necessary to ensure that agencies of the federal government continue to take every step available to stop illegal access of personal and confidential customer information. I know that we are late in the Congressional session and that Chairman Leach will be passing the baton next year. I also am aware that when the baton passes there may be changes in the staff of the Committee. I genuinely hope that no matter who takes up the leadership of the Committee and no matter from which side of the aisle, that there will continue an institutional memory to follow this issue. I truly believe it is of profound import to the health of our financial services industry in this country. Conclusion In closing, when I appeared before this Committee in 1998 I recited a long laundry list of the dangers posed by the deceptive methods in use by some private investigators and information brokers to gain illegal access to confidential and protected information. There were some who found it hard to believe that what I claimed was true or as serious as I presented the problem. However, those in the investigative and information broker industries who were practicing these techniques knew that I had spoken honestly and were not pleased to have sunshine illuminating their practices. I soon began fielding phone calls from across the country. The hearing had been carried on C-SPAN. In brief, the attention to these techniques was not well received by some. I was condemned by many and even received two death threats. I mention this because the information being obtained illegally is in many cases both quite serious and lucrative for those buying and selling it and often places others in physical danger. One needs to look no further than the case of James and Regina Rapp of Touch Tone Services to see that this is true. They were running a million dollar a year operation in Denver Colorado with numerous employees when Denver and Los Angeles law enforcement officers caught up with them along with the FTC. Why so many agencies? A short list of the Rapp's alleged activities points to the answer. The following allegations were reported: Touch Tone had accessed and sold information concerning undercover Los Angeles police detectives including their private unlisted phone and pager records to a member of the "Israeli mafia", placing the lives of the officers, the officers' families, the officers' confidential informants, and active organized crime investigations in danger. Touchtone accessed and sold information concerning the murder of Ennis Cosby, son of famed comedian Bill Cosby. Touchtone accessed and sold personal and confidential information regarding the Columbine High School massacre victims and families including home addresses, unlisted home telephone numbers, banking, and credit card records. Touchtone inserted itself into the Jon Benet Ramsey investigation. Here is a list written by James Rapp to a California private investigator outlining the Rapp's work in the Jon Benet Ramsey murder investigation: Here is a list of all Ramsey cases we have been involved with during the past lifetime (sic). 1. Cellular toll records, both for John & Patsy. 2. Land line tolls for the Michigan and Boulder homes. 3. Tolls on the investigative firm. 4. Tolls and home location on the housekeeper, Mr. & Mrs. Mervin Pugh. 5. Credit card tolls on the following: a. Mr. John Ramsey, AMX & VISA b. Mr. John Ramsey Jr., AMX. 6. Home location of ex-wife in Georgia, we have number, address & tolls. 7. Banking investigation on Access Graphics, Mr. Ramsey's company, as well as banking information on Mr. Ramsey personal. 8. We have the name, address & number of Mr. Sawyer & Mr. Smith, who sold the pictures to the Golbe (sic), we also have tolls on their phone. 9. The investigative firm of H. Ellis Armstead, we achieved all their land and cellular lines, as well as cellular tolls, they were the investigative firm assisting the Boulder DA's office, as well as assisting the Ramseys. 10. Detective Bill Palmer, Boulder P.D., we achieved personal address and numbers. 11. The public relations individual "Pat Kroton" (sic) for the Ramseys, we achieved the hotel and call detail where he was staying during his assistance to the Ramseys. We also have his direct cellular phone records. 12. We also achieved the son's John Jr.'s SSN and DOB. 13. During all our credit card cases, we acquired all ticket numbers, flight numbers, dates of flights, departing times and arriving times. 14. Friend of the Ramseys, working with the city of Boulder, Mr. Jay Elowskay, we have his personal info. Of course, all the above have been repeatedly asked for over and over again. Let me know if I can be of further assistance in this or any matter. (End of letter) This one company, Touchtone, had a client list of more than 1,200 spread across the country. Another local Montgomery County, Maryland private investigator admitted to obtaining the phone records of Kathleen Willey, a witness in the criminal investigation of President Clinton. These are just two companies. There are dozens of companies still in operation today. There can be little doubt as to the serious implications of the activities of these companies. Mr. Chairman and members of the Committee, as I leave you today, I hope that the time and effort I have placed in this testimony will serve as a blueprint for further examination by this Congress of matters deserving attention. Thank you. Appendix II U.S. Secret Service Testimony of Mr. Bruce A. Townsend Special Agent in Charge - Financial Crimes Division For Presentation to the Committee on Banking and Financial Services U.S. House of Representatives September 13, 2000 Mr. Chairman, members of the Committee, thank you for the opportunity to address the Committee on the subject of identity theft and the Secret Service's efforts to combat this problem. I have prepared a comprehensive statement that will be submitted for the record, and with the Committee's permission, I will summarize my statement at this time. In addition to providing the highest level of physical protection to our nation's leaders, the Secret Service exercises broad investigative jurisdiction over a variety of financial crimes. As the original guardian of our nation's financial payment systems, the Secret Service has a long history of pursuing those who would victimize our financial institutions and law-abiding citizens. In recent years, the combination of the information technology revolution and the effects of globalization have caused the investigative mission of the Secret Service to evolve in a manner that cannot be overstated. Today we are faced with a new challenge--that of identity theft. The Secret Service views identity theft as a disturbing combination of old schemes and abuse of emerging technologies. However, it should be clear--this crime is about more than the theft of money or property. This crime is about the theft of things that cannot be so easily replaced--a person's good name, a reputation in the community--years of hard work and commitment to goals. Make no mistake about it; this crime is a particularly invasive crime that can leave victims picking up the pieces of their lives for months or even years afterward. Mr. Chairman, we in the Secret Service applaud your efforts in convening this hearing today. We stand ready to work with you and all the members of the committee in attacking the crime of identity theft. It is our belief that hearings such as this will be the catalyst to bring together the resources of both state and Federal Governments in a unified response to the identity theft problem. Congress has already taken an important step in providing increased protection for the victims of identity theft through the enhancements made to Title 18, United States Code, Section 1028, by the Identity Theft and Assumption Deterrence Act, which was signed into law in October of 1998. This law accomplished four things simultaneously. First, it identified people whose credit had been compromised as true victims. Historically with financial crimes such as bank fraud or credit card fraud, the victim identified by statute, was the person, business or financial institution that lost the money. All too often the victims of identity theft, whose credit was destroyed, were not even recognized as victims. This is no longer the case. Second, this law established the Federal Trade Commission (FTC) as the one central point of contact for these victims to report all instances of identity theft. This collection of all information involving ID theft cases allows us to identify systemic weaknesses and enables law enforcement to retrieve all investigative data from one central location. It further allows the FTC to provide people with the information and assistance they need in order to take the steps necessary to correct their credit records. Third, this law provided increased sentencing potential and enhanced asset forfeiture provisions. These enhancements help to reach prosecutorial thresholds and allow for the repatriation of funds to victims. Lastly, this law closed a loophole in Title 18, United States Code, Section 1028, by making it illegal to steal another person's personal identification information with the intent to commit a violation. Previously, under Section 1028, only the production or possession of false identity documents was prohibited. With advances in technology such as E-Commerce and the Internet, criminals today do not need actual documents to assume an identity. We believe the enactment of this legislation is an important component in bringing together both the federal and state government, in a focused and unified response to the identity theft problem. Today, law enforcement and regulatory and community assistance organizations have joined forces through a variety of working groups, task forces, and information sharing initiatives to assist the victims of identity theft. Victims no longer have to feel abandoned, with no where to turn. Policies and procedures are being initiated to expedite the reporting of this crime. Civil remedies are also being created allowing for victims to seek restitution. The Secret Service "Victim Witness Assistance Program" aids identity theft victims by providing resources and contact information for credit bureaus and service programs. The financial community continues to design and implement security measures that minimize the exploitation of true persons names and identification information. The Secret Service has broad investigative responsibilities relating to financial crimes. Today, some type of false identification is a prerequisite for nearly all financial fraud crimes. False ID's provide anonymity to criminals and allow for repeat victimization of the same individual while perpetrating a variety of fraud schemes. Often, in their attempt to remain anonymous, criminals may randomly assume the identity of another individual through the creation of false identification documents. In these cases, the goal may not be to target an individual for the purposes of stealing his or her identity. Yet, by coincidence, that individual's identity has been compromised through the criminal's use of their personal identifiers. False identification documents, either altered, counterfeited, or fraudulently obtained, are routinely used with loan and check fraud schemes, and almost all credit card fraud schemes. Ironically, the credit industry through capital investments over the past 10 years has strengthened the integrity of the system through security measures, which effectively thwart some types of direct counterfeiting. Subsequently, criminals no longer simply create names and identities; they must more often rely on the identifiers of real people. As we enter the next century, the strength of the financial industry has never been greater. A strong economy, burgeoning use of the Internet and advanced technology, coupled with increased spending has led to fierce competition within the financial sector. Although this provides benefits to the consumer through readily available credit, and consumer oriented financial services, it also creates a rich environment for today's sophisticated criminals, many of whom are organized and operate across international borders. In addition, information collection has become a common byproduct of the newly emerging e-commerce. Internet purchases credit card sales and other forms of electronic transactions are being captured, stored, and analyzed by entrepreneurs intent on increasing their market share. This has led to an entirely new business sector being created which promotes the buying and selling of personal information. With the advent of the Internet, companies have been created for the sole purpose of data mining, data warehousing, and brokering of this information. These companies collect a wealth of information about consumers, including information as confidential as their medical histories. Consumers routinely provide personal, financial and health information to companies engaged in business on the Internet. Consumers may not realize that the information they provide in credit card applications, loan applications, or with merchants they patronize, are valuable commodities in this new age of information trading. Data collection companies like all businesses are profit motivated, and as such, may be more concerned with generating potential customers rather than the misuse of this information by unscrupulous individuals. This readily available personal information in conjunction with the customer friendly marketing environment has presented ample opportunities for criminals intent on exploiting the situation for economic gain. The Secret Service has investigated numerous cases where criminals have used other people' s identities to purchase everything from computers to houses. Financial institutions must continually practice due diligence or they will fall victim to the criminal who attempts to obtain a loan or cash a counterfeit check using someone else's identity. As financial institutions and merchants become more cautious in their approach to "hand to hand" transactions the criminals are looking for other venues to compromise. Today, criminals need look no further than the Internet. For example, an Internet fraud investigation conducted by the secret service, Department of Defense, Postal Inspection Service, and the Social Security Administration Inspector General's Office highlighted the ease with which criminals can obtain personal information through public sources. These defendants accessed a web site that published the promotion list of high ranking military officers. This site further documented personal information on these officers that was used to fraudulently obtain credit, merchandise, and other services. In this particular case the financial institution, in an effort to operate in a consumer friendly manner issued credit over the Internet in less than a minute. Approval for credit was granted after conducting a credit check for the applicant who provided a "true name" and matching "true Social Security Number." All other information provided such as the date of birth, address and telephone number, that could have been used for further verification, was fraudulent. The failure of this bank to conduct a more comprehensive verification process resulted in substantial losses and more importantly a long list of high-ranking military officers who became victims of identity fraud. The Internet provides the anonymity criminals desire. In the past, fraud schemes required false identification documents, and necessitated a "face to face" exchange of information and identity verification. Now with just a laptop and modem, criminals are capable of perpetrating a variety of financial crimes without identity documents through the use of stolen personal information. The Secret Service has investigated several cases where cyber criminals have hacked into Internet merchant sites and stolen the personal information and credit card account numbers of their customers. These account numbers are then used with supporting personal information to order merchandise to be mailed throughout the world. Most account holders are not aware that their credit card account has been compromised until they receive their billing statement. Time and time again, criminals have demonstrated the ability to obtain information from businesses conducting commerce on the Internet. This information has been used to facilitate account takeover schemes and other similar frauds. It has become a frightening reality that one individual can literally take over another individual's financial identity without the true victim's knowledge. Cyber criminals are also using information hacked from sites on the Internet to extort money from companies. It is not unprecedented for international hackers to hack into business accounts, steal thousands of credit card account numbers along with the accompanying personal identifiers, and then threaten the companies with exposure unless the hackers are paid a substantial amount of money. The Secret Service continues to attack identity theft by aggressively pursuing our core violations. It is by the successful investigation of criminals involved in financial and computer fraud that we are able to identify and suppress identity theft. As stated earlier, identity theft, and the use of false identification has become an integral component of most financial criminal activity. In order to be successful in suppressing identity theft we believe law enforcement agencies should continue to focus their energy and available resources on the criminal activities that incorporate the misuse or theft of identification information. The Secret Service has achieved success through a consistent three -tiered process of aggressive pro-active investigations, identification of systemic weaknesses, and partnerships with the financial sector to adopt fixes to these weaknesses. The Secret Service's investigative program focuses on three areas of criminal schemes within our core expertise. First, the Secret Service emphasizes the investigation of counterfeit instruments. By counterfeit instruments, I refer to counterfeit currency, counterfeit checks, both commercial and government, counterfeit credit cards, counterfeit stocks or bonds, and virtually any negotiable instrument that can be counterfeited. Many of these schemes would not be possible without the compromise of innocent victim's financial identities. Second, the Secret Service targets organized criminal groups that are engaged in financial crimes on both a national and international scale. Again, we see many of these groups; most notably the Nigerian and Asian organized criminal groups, prolific in their use of stolen financial and personal information to further their financial crime activity. Finally, we focus our resources on community impact cases. The Secret Service works in concert with the state, county, and local police departments to ensure our resources are being targeted to those criminal areas that are of a high concern to the local citizenry. Further, we work very closely with both federal and local prosecutors to ensure that our investigations are relevant, topical and prosecutable under existing guidelines. No area today is more relevant or topical than that of identity theft. It has been our experience that the criminal groups involved in these types of crimes routinely operate in a multi-jurisdictional environment. This has created problems for local law enforcement that generally act as the first responders to their criminal activities. By working closely with other federal, state, and local law enforcement, as well as international police agencies we are able to provide a comprehensive network of intelligence sharing, resource sharing, and technical expertise which bridges jurisdictional boundaries. This partnership approach to law enforcement is exemplified by our financial crimes task forces located throughout the country. Each of these task forces pools the personnel and technical resources and to maximize the expertise of each participating law enforcement agency. A number of these task forces are focused on the Nigerian criminal element operating in this country. As mentioned earlier, this particular ethnic criminal group has historically been involved in a myriad of financial crimes, which incorporate false identification and identity theft. In addition to our inter-dependant working relationship with law enforcement on all levels, our partnership with the private sector has proved invaluable. Representatives from numerous commercial sectors to include the financial, telecommunications, and computer industries have all pledged their support in finding ways to ensure consumer protection while minimizing corporate losses. The secret service has entered into several cooperative efforts with members of the financial sector to address challenges posed by new and emerging technologies. These initiatives have created some new and innovative approaches to identification verification in business. Automated teller machines, E-Commerce, online banking, online trading, smart cards, all once considered futuristic concepts, are now a reality. Each of these technologies lends themselves to creating a "faceless society". In order for businesses to be successful, they can no longer rely upon personal contact as a means of identity verification. One innovative approach that appears to address the problems of identity verification for Internet commerce has been developed and introduced by a member of the financial community. This new product is the first commercial venture by the credit card industry to provide the public with an on line authentication process using chip technology and encryption. Although this product may not end credit card fraud on the Internet, it is the first step in providing a more secure environment in which to conduct Internet commerce. Efforts such as these provide a foundation by which law enforcement and the private sector can build upon. By applying the technologies used in this product and others being developed for the same purpose, we can systemically eliminate the weaknesses in our economic infrastructure, which allow for the misuse of personal information. In conjunction with these technological advances, the Secret Service is actively involved with a number of government sponsored initiatives. At the request of the Attorney General, the Secret Service joined an interagency identity theft subcommittee that was established by the Department of Justice. This group, which is made up of federal and state law enforcement, regulatory agencies, and professional agencies meets regularly to discuss and coordinate investigative and prosecutive strategies as well as consumer education programs. In addition, under the direction of the President, the Treasury Department, with the assistance of the Secret Service, convened a national summit on the subject of identity theft. This summit brought together various federal, state, and private sector entities to discuss and develop policies that will help to prevent identity theft crimes. Follow-up workshops are scheduled for October of this year to focus on ways of assisting consumers and preventing identity theft. As you have heard in this testimony some very positive steps are being taken to address and combat identity theft. The Secret Service will always encourage both business and law enforcement to work together to develop an environment in which personal information is securely guarded. In this age of instant access, knowledge is power. We cannot allow today's criminals to abuse the very systems that were created for the betterment of society. The emotional toll on the lives of those whose identities have been compromised cannot be fully accounted for in dollars and cents. It is all of our responsibilities to protect personal information. The Secret Service acknowledges that identity theft is a very real problem and pledges its support in the Federal Government's efforts to eliminate it. This concludes my prepared statement. I would be happy to answer any questions that you or any other member of the committee may have. Thank you. Home Contact Us Privacy News APC News Services Speeches [Non-text portions of this message have been removed] 5859 From: kondrak Date: Sat Jul 27, 2002 10:44pm Subject: Re: You can paint my porch Excellent.... At 19:49 7/27/02 -0400, you wrote: >A blonde, wanting to earn some money, decided to hire herself out as a >'handy-woman' and started canvassing a nearby well-to-do neighborhood. She >went to the front door of the first house and asked the owner if he had any >odd jobs for her to do. > >"Well, you can paint my porch," he said, "How much will you charge me?" > >The blonde, after looking about, responded, "How about $50?" > >The man agreed and told her that the paint and other materials that she >might need were in the garage. > >The man's wife, inside the house, heard the conversation and said to her >husband, "Does she realize that the porch goes all the way around the >house?" > >The man replied, "She should; she was standing on it. Why...do you >think she's dumb?" > >Humbled by her initial reaction, his wife said, "No. I guess I'm just >guilty of being influenced by all the 'dumb blonde' jokes I've been >hearing." > >A short time later, the blonde came to the door to collect her money. > >"You're finished already?" the husband asked. > >"Yes," the blonde replied, "and I had paint left over, so I gave it >two coats." > >Impressed, the man reached into his pocket for the $50.00 and handed it to >her. > >"And by the way," the blonde added, "it's not a Porch, it's a Lexus." >-- > >-------------------------------------------------------------------------------------------------- >The First, The Largest, The Most Popular, and The Most Complete TSCM, >Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. >-------------------------------------------------------------------------------------------------- > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com >-------------------------------------------------------------------------------------------------- > Strategy without tactics is the slowest route to victory. > Tactics without strategy is the noise before defeat. - Sun Tzu >-------------------------------------------------------------------------------------------------- > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5860 From: kondrak Date: Sun Jul 28, 2002 4:37am Subject: Bookmark this...FCC ID Numbers search engine http://www.fcc.gov/oet/fccid/ In case you didn't have it... Bookmark this...FCC ID Numbers search engine.. very useful. 5861 From: Fernando Martins Date: Sun Jul 28, 2002 4:52pm Subject: RE: Brazil's President Inaugurates Amazon Monitoring System The official site of the project is http://www.sivam.gov.br/ (all in brazilian/portuguese) 800 V-SAT, SATCOM system, a 220 miles fixed radar and 6 mobile units... Seems cool. Some links: http://www.raytheon.com/c3i/c3iproducts/c3isivam/ http://www.american.edu/TED/SIVAM.HTM http://www.obt.inpe.br/mapsar/SIVAM/page_01.htm FM > -----Original Message----- > From: MACCFound@a... [mailto:MACCFound@a...] > Sent: sexta-feira, 26 de Julho de 2002 4:43 > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Brazil's President Inaugurates Amazon > Monitoring System > > > Brazil's President Inaugurates Amazon Monitoring System > > > MANAUS, Brazil, July 25 /PRNewswire/ -- President Fernando > Henrique Cardoso > today inaugurated the initial operating capability of the > System for the > Vigilance of the Amazon (SIVAM), a $1.4B system that provides > comprehensive > electronic surveillance of Brazil's immense and relatively > undeveloped Amazon > region. > > The ceremony, held in the city of Manaus in the heart of the > Amazon, comes > five years to the day after Raytheon Company (NYSE: HREF="aol://4785:RTN">RTN) and its partners, > Embraer and ATECH, began work on SIVAM. The project will > provide real time > information on conditions across the breadth of the region to > a wide range of > government agencies, research institutions and other users. > It includes the > capabilities to build one of the world's largest > environmental databases. > > Under the auspices of the Federal Government in Brasilia, > SIVAM is the first > step in Brazil's long range effort to protect and control > this unique natural > area that encompasses over half of the country's landmass. > The event is a > significant milestone in the realization of Brazilian > commitments made at the > UN Conference on the Environment and Development held in Rio > de Janeiro in > 1992, and SIVAM is a critical asset for maintaining Brazilian > sovereignty > over its national territory. > > The newly operating SIVAM system uses a diverse array of > equipment to monitor > both the surface of the vast Amazon jungle and the national > airspace above > it. SIVAM data will be used to support essential Brazilian government > programs, university and private scientific research efforts, > and sustainable > development initiatives. It will also help to address the > health, educational > and economic needs of Brazilian families and individual > citizens. Tied > together by an innovative satellite telecommunications > infrastructure, the > system combines data generated by space-based, airborne and > surface sensor > and support systems. Satellite remote sensing data are > received through the > Government's ground station at Cuiaba and image processing > site at Cachoeira > Paulista, which have been upgraded by the National Space > Research Institute > (INPE) and Raytheon. > > Raytheon-supplied sensors -- including synthetic aperture radars, > multispectral scanners, optical infrared sensors, high > frequency direction > finding equipment, and communications and non-communications > exploitation > gear -- have been installed onto three remote sensing > aircraft, modified > versions of the Embraer ERJ- 145. These jets give users the > opportunity for > remote mapping through the dense jungle canopy, forest fire > detection, and > photoreconnaissance. On the jungle floor and in the waters > of the Amazon > river system itself, Raytheon provides an array of weather > and environmental > monitors that provide a real time and comprehensive picture > of regional > environmental conditions ranging from meteorological and lightning > information to water characteristics and air and river pollutants. > > SIVAM's air traffic control (ATC) and associated airspace > surveillance for > the first time provides Brazil with a comprehensive > monitoring capability > throughout the region. The system will contain 14 > state-of-the-art Raytheon > fixed base air traffic control radars and six transportable radars, > supplemented by five existing government-furnished ATC > radars. These ground- > based radars are augmented by five newly developed SIVAM > airborne radars, > also adapted ERJ-145s, outfitted with Raytheon and Swedish sensors. > Collectively these radars provide an area-wide monitoring capability > permitting vastly enhanced counter-smuggling, border > surveillance and law > enforcement operations over an area the size of the United > States west of the > Mississippi. > > Data from the various airborne and ground-based sensors are > sent to and > processed in an Air Surveillance Center located in Manaus, Regional > Coordination Centers located in Manaus, Porto Velho, and > Belem, and a General > Coordination Center to be located in Brasilia. > > Dick Nelson, Raytheon vice president for SIVAM, said, > "Working with the > extremely professional members of the Brazilian Air Force - > led by Brigadeiro > Teomar Fonseca Quirico, and earlier by Brigadeiros Marcos > Antonio de Oliveira > and Jose Orlando Bellon -- over the past five years has been > one of the > highlights of the project. Their operational, technical, and program > management expertise so evident during the development and > installation of > the project ensures that SIVAM will meet all of the > expectations that the > Brazilian Government had in mind when the system was first > conceived over a > decade ago." > > With headquarters in Lexington, Mass., Raytheon Company is a global > technology leader in defense, government and commercial > electronics, and > business and special mission aircraft. > > Contacts: > > Patricia Perlini Dave Shea > > 260.429.5547 703.284.4245 > > MAKE YOUR OPINION COUNT - Click Here > http://tbutton.prnewswire.com/prn/11690X50238200 SOURCE Raytheon Company CO: Raytheon Company ST: Brazil SU: http://www.prnewswire.com [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5862 From: Matt Paulsen Date: Mon Jul 29, 2002 6:05pm Subject: CNN - Disposable cell phones on the way Took em long enough to pick up on it. -m http://www.cnn.com/2002/TECH/ptech/07/29/telecoms.throwaway.reut/index.html Throwaway cell phones are set to make their debut on United States convenience store shelves, down the aisle from plastic razors, beef jerky and disposable cameras they seek to emulate as spur-of-the-moment consumer purchases. Hop-On, a small company based in Garden Grove, California, said this week it had won U.S. regulatory approval to sell its first phones, clearing the way for a nationwide introduction of a no-frills recyclable phone for prepaid mobile calling. In an interview, Chairman and Chief Executive Peter Michaels said approval of the phones will allow Hop-On shortly to sell its stripped-down mobile phone and 60 minutes of initial service for a $40 flat fee, through an unnamed carrier. Hop-On mobile devices are plastic, two-way phones the size of a deck of playing cards. Users talk and listen to callers via a microphone/earpiece connected by a thin wire. 5863 From: James M. Atkinson Date: Mon Jul 29, 2002 8:25pm Subject: You Know You Are In The Summertime When... YOU KNOW YOU ARE IN THE SUMMERTIME WHEN... The birds have to use potholders to pull worms out of the ground. The trees are whistling for the dogs. The best parking place is determined by shade instead of distance. Hot water now comes out of both taps. You can make sun tea instantly. You learn that a seat belt buckle makes a pretty good branding iron. The temperature drops below 95 and you feel a little chilly. You discover that in July it only takes 2 fingers to steer your car. You discover that you can get sunburned through your car window. You actually burn your hand opening the car door. You break into a sweat the instant you step outside at 7:30 a.m. Your biggest bicycle wreck fear is, "What if I get knocked out and end up lying on the pavement and cook to death?" You realize that asphalt has a liquid state. The potatoes cook underground, so all you have to do is pull one out and add butter, salt and pepper. Farmers are feeding their chickens crushed ice to keep them from laying boiled eggs. The cows are giving evaporated milk. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5864 From: Charles P. Date: Tue Jul 30, 2002 10:54am Subject: handheld tdr on ebay I have an older Biddle CFL510 handheld TDR for sale on ebay if anyone is interested. I doesn't compare to the larger popular units (Riser Bond 1205, etc) but it is handy to have. Easily fits in a toolbox or briefcase. I found it useful for demonstrating how a tdr works. Ranges go from 300ft to 9500 ft. Reserve is set at $200. http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=1754522198&rd=1 free shipping to anyone from the TSCM list (be sure to let me know if it's you). Charles Charles Patterson Global Communications Tarrytown, NY www.telephonesecurity.com charles@t... 5865 From: iDEN-i100 Date: Tue Jul 30, 2002 3:16pm Subject: [Fwd: Pursuit Seminar for Law Enforcement Driver Trainers 2002] "Engler, Donna" wrote: > ********************************************************* > > Pursuit Seminar for Law Enforcement > Driver Trainers 2002 > > ********************************************************* > > The following seminar is not affiliated with > NLECTC or the National Institute of Justice. Please > contact the conference organizers for more > information. > > --------------------------------------------------------- > > Organizer: Association of Professional Law Enforcement > Emergency Response Trainers (ALERT) International > > Web site: www.alertinternational.com/training/eform.htm > > Point of contact: > > Bruce Cabral > President, ALERT International > 478-994-0876 > bcabral@g... > > The National Highway Safety Administration (NHTSA) and > the Association of Professional Law Enforcement Emergency > Response Trainers (ALERT) International will be > conducting the Pursuit Seminar for Law Enforcement > Driver Trainers in twelve various locations throughout > the United States in 2002. > > This seminar will provide the foundation for law > enforcement agencies and academies to develop appropriate > pursuit-training programs. The information will provide > guidance for police officers from the initiation of a > vehicular pursuit, through its conclusion. The safety of > the public will be emphasized as being paramount to the > total pursuit situation. The focus of the seminar is to > address legal and operational vehicular pursuit training > issues that include identifying factors to consider when > initiating, conducting, and terminating a vehicular > pursuit. > > There is no cost for tuition to attend this seminar; > however, the participants are responsible for their own > travel, lodging, and meals. > > --------------------------------------------------------- > Remaining Seminars for 2002 > Dates and Locations > --------------------------------------------------------- > > July 31, August 1, & 2, 2002 > New Hampshire Police Standards and Training Academy > Concord, New Hampshire > > August 28, 29, & 30, 2002 > Idaho Post Academy > Meridian, Idaho > > September, 11, 12, &13, 2002 > Minneapolis Police Department > Minneapolis, Minnesota > > October 16, 17, & 18, 2002 > Riverside County Sheriffs Department > Riverside, California > > October 28, 29, & 30, 2002 > Tallahassee Police Department > Tallahassee, Florida > > November 13, 14, &15, 2002 > North Carolina Justice Academy > Salemburg, North Carolina > > --------------------------------------------------------- > Registration Information > --------------------------------------------------------- > > Register for these seminars by calling 478-994-0876 or > visiting the web site > www.alertinternational.com/training/eform.htm. > > **************************************************** -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 5866 From: James M. Atkinson Date: Wed Jul 31, 2002 9:19am Subject: CIA Expert: Leaks of Classified Information Must Stop http://disc.server.com/discussion.cgi?id=149495&article=31248 BETRAYAL BY THE SENATE by Doug Fiedor - dfiedor@c... There is a traitor in the Senate of the United States. He has been there for a long time because the socialists in his state keep voting for him. And no, it's not (holy) Joe Lieberman. He is the driving force behind all of Capitol Hill's socialist organizations(1), but not necessarily an out and out traitor. There are two members of the United States Senate who have been leaking top secret security documents -- war plans, in the latest instance -- for many years. One is now a committee chairman and in position to leak everything we have. Almost everyone on Capitol Hill knows exactly who he is, just fear mouthing the name out loud. So, they are playing games by having the FBI investigate the leaks. This has got to be one of the stupidest games ever played in Washington. The FBI is not going to bust the responsible Senate committee chairman. He's too powerful. Instead, the FBI will search till they find a scapegoat; probably an aide who did the Senator's bidding by personally delivering the classified reports. Meanwhile, the senior Senator walks free, and continues leaking many of our nation's most sensitive documents. Such is the way of the Senate. They have an agreement in that chamber to never accuse another member of anything. Apparently, that arrangement also extends to Clinton administration Democrats. For instance, Senate committees made a big spectacle of publicly chiding business leaders of corporations that went bankrupt. Yet, their own Joe Lieberman, chairman of the Senate Governmental Affairs Committee (and at least four other Senators), had his fingers deep in that pie. Many of the socialist organizations Lieberman set up to route campaign funds to other socialists on Capitol Hill collected big bucks from the business leaders, banks and corporations most deeply involved in the new scandals. Actually, a couple years back, it was Lieberman and friends who were most instrumental in protecting many of these bad bookkeeping businesses against interference from federal regulators. Of course, then Treasury Secretary Robert Rubin was also involved in this with his friends in the Senate. Like certain socialist Democrat Senators, Bobby Rubin's name seems to turn up prominently when corporations perpetrating fraud on their stockholders are mentioned. We're not just talking about the corporations like Enron, either. Nope! These public officials were (and are) also involved with the banks that facilitated the fraud. They even had a code name for it: Roosevelt. Of course, that would be Franklin D. Roosevelt, we presume, since we are talking about perpetrating a fraud on the American people here. According to the New York Times last week, banks like "Citigroup and J. P. Morgan Chase have been repeatedly criticized by investigators and shareholders' lawyers for structuring billions of dollars of transactions for Enron involving entities with names like Mahonia, Yosemite, Delta and Stoneville Aegean." Rubin, of course, is paid a huge weekly salary as chairman of Citigroup's executive committee. And, if we search the campaign donation records of certain socialist Senators, we find a surprising array of names of wrongdoers making the news lately. Looking into the financial benefactors of Lieberman's socialist organizations, the same business and financial community names are found yet again. The Roosevelt transaction, deals between Enron and the banks, and other such shenanigans, were examined in a hearing before the Senate Permanent Subcommittee on Investigations last week. Afterwards, some members of the committee realized that the Roosevelt transaction violated accounting rules. "Citibank was a participant in this accounting deception," said committee chairman, Senator Carl Levin (D-MI). Levin is probably not personally involved in this mess. However, he knows perfectly well which Senators are. Yet, his committee has no plans to question any of those perpetrators. Instead, the Senate Permanent Subcommittee on Investigations seems to be doing everything it can to dance around the subject in a way that will protect all other members of the Senate. Meanwhile, many of these very same socialist Senators are quietly working to lay off at least part of the debt of WorldCom on the American people. Apparently, some telephone long distance providers were (are) very financially involved with WorldCom. Because WorldCom went bankrupt, these long distance providers feel they will lose money. So, these corporations are seeking the permission of government to raise charges to customers to recoup what they will lose from WorldCom. At least two of these long distance providers are also major campaign fund providers to certain Senators -- and help fund a couple of Joe Lieberman's Capitol Hill socialist groups -- so we suspect long distance telephone bills will be increasing soon. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5867 From: Date: Wed Jul 31, 2002 5:45am Subject: Intercepting E-Mails to Catch Spouses Cheating May Be Breaking the Law Intercepting E-Mails to Catch Spouses Cheating May Be Breaking the Law, Warn Nation's Top Divorce Attorneys CHICAGO, July 31 /PRNewswire/ -- People who intercept e-mails to catch their spouses cheating over the Internet in many cases are violating federal and state laws, warn the nation's top divorce attorneys. "Spouses are increasingly obtaining 'proof' of the other spouse's infidelity by reading electronic mail and retrieving records and conversations from Internet and cybersex chat rooms," says J. Lindsey Short, Jr., president of the American Academy of Matrimonial Lawyers, the nation's top 1,600 divorce and matrimonial law attorneys. Taking information from home computers to which both spouses have equal access probably does not violate any laws, say the attorneys. However, to the extent the e-mails are accessed through an on-line account, like America Online or Hotmail, or hacking into a password-protected file on a computer, the spouse surreptitiously accessing the account is most likely subject to civil and criminal penalties. "Internet romance is easy to find and simple to maintain. One of the beauties of cyber-chat is that one can be whomever one wishes," says divorce attorney Mark Gruber of New Jersey, who has co-authored an article for the Academy's Journal on cybersex, divorce and the retrieval of electronic communications in the marital home. "However, individuals who try to catch their spouses at cyber-cheating need to be aware that they could be breaking the law in doing so," Gruber says. The improper retrieval of electronic information may specifically constitute a violation of the Electronic Communications Privacy Act of 1986 and The Wiretap Act and Stored Communications Act, both passed in 1996. The latter two laws amended the earlier act to extend anti-wiretapping provisions to e-mails, chat rooms and electronic storage of information and communications. Persons violating the law can face both federal and state criminal penalties of up to five years in jail as well as civil penalties, fines, damages, including punitive damages, and legal fees. The matrimonial lawyers note that workplace e-mails and communications related to cyber-cheating have no similar protections or expectations of privacy, as employers have the right to monitor office e-mails. Matrimonial lawyers say other cyber-trends they are seeing in divorce cases include an increase in subpoenas for hard drives during discovery to uncover erased e-mails and spouses posing under pseudonyms in chat rooms to see if their spouses will cheat on them. The American Academy of Matrimonial Lawyers is composed of the nation's top 1,600 attorneys who are experts in the specialized field of matrimonial law, including divorce, prenuptial agreements, legal separation, annulment, custody, property valuations, support and the rights of unmarried cohabiters. The purpose of the Academy is to encourage the study, improve the practice, elevate the standards and advance the cause of matrimonial law. MAKE YOUR OPINION COUNT - Click Here http://tbutton.prnewswire.com/prn/11690X48611914 SOURCE American Academy of Matrimonial Lawyers CO: American Academy of Matrimonial Lawyers ST: Illinois SU: LAW http://www.prnewswire.com 07/31/2002 08:30 EDT 5868 From: Tim Jackson Date: Wed Jul 31, 2002 9:57am Subject: Can you help identify this room audio transmitter A client of mine recently found a working transmitter in his company board room. I need to try and find its origin. It's a black plastic box about the size of a twenties pack of cigarettes and operates off a single 9V battery (PP3 / 6F22 006P etc). The unit has an external microphone on a cord about two feet in length which plugs into the transmitter using a standard 1/8" minijack. The only controls are an on/off switch, gain control pot and a "battery low" LED. The box bears the following silk-screened label in gold ink: JOSEPH JP-818H MICROPHONE TRANSMITTER The unit transmits on 111.7MHz, immediately above the FM commercial broadcast band. Examination of the circuitry and the plastic housing reveals that it's probably a mass-produced unit intended to be a cheap wireless mic for stage use. It isn't even crystal-controlled. The battery fitted to the unit is of particular interest to me as it is not a type sold in this country (South Africa). The battery is black and green in the same sort of proportion as a Duracell battery is black and copper. It is branded "ZHANLI". Any idea where this is sold? Tim Tim Jackson Micro Delta +27 82 651 7272 Johannesburg South Africa --- [Non-text portions of this message have been removed] 5869 From: James M. Atkinson Date: Wed Jul 31, 2002 0:02pm Subject: Re: Can you help identify this room audio transmitter Piece of cake: It is a Cheap Chinese made Joseph JP-818 Microphone Transmitter with a frequency range between 110 - 120 MHz. Dynamic range is better then 80 dB and distortion is less then 190. Frequency Response is 80 Hz - 12 kHz @ 3 dB roll-off. Working distance is about 15 meters max (the eavesdropper has to be VERY close). Pre-Emphasis is 50 uS. Maximum RF power output is 30 mW, and the microphone cable itself is the antenna. It takes a standard MN1604 9V battery, and can run for about 6 hours on a typical battery (current draw is just under 21 mA). Size is roughly 105*63*23 mm, and weight is roughly 125 Grams You can find a picture of the little thing at : http://www.tscm.com/joesph-jp818h.jpg http://www.tscm.com/joesph-JP818.gif http://www.tscm.com/joseph-818b.gif Once again Raphael scores a clean, almost instantaneous match ( http://www.tscm.com/raphael.html ). -jma At 4:57 PM +0200 7/31/02, Tim Jackson wrote: >A client of mine recently found a working transmitter in his company >board room. I need to try and find its origin. > >It's a black plastic box about the size of a twenties pack of cigarettes >and operates off a single 9V battery (PP3 / 6F22 006P etc). > >The unit has an external microphone on a cord about two feet in length >which plugs into the transmitter using a standard 1/8" minijack. > >The only controls are an on/off switch, gain control pot and a "battery >low" LED. > >The box bears the following silk-screened label in gold ink: > > JOSEPH > JP-818H >MICROPHONE TRANSMITTER > >The unit transmits on 111.7MHz, immediately above the FM commercial >broadcast band. > >Examination of the circuitry and the plastic housing reveals that it's >probably a mass-produced unit intended to be a cheap wireless mic for >stage use. It isn't even crystal-controlled. > >The battery fitted to the unit is of particular interest to me as it is >not a type sold in this country (South Africa). > >The battery is black and green in the same sort of proportion as a >Duracell battery is black and copper. It is branded "ZHANLI". Any idea >where this is sold? > >Tim > > > >Tim Jackson >Micro Delta >+27 82 651 7272 >Johannesburg >South Africa > > > > >--- > > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 5870 From: iDEN-i100 Date: Wed Jul 31, 2002 4:02pm Subject: Agency to Impose Limits on Devices http://cnniw.yellowbrix.com/pages/cnniw/Story.nsp?story_id=31834565&ID=cnniw&scategory=Telecommunications%3AWireless& -- [Non-text portions of this message have been removed] 5871 From: Kutlin, Josh Date: Wed Jul 31, 2002 0:01pm Subject: RE: Can you help identify this room audio transmitter This link has a pic with the battery http://www.radios4you.com/WirelessMICS/JP919LapelMic/jp919lapelmic.html Josh -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Wednesday, July 31, 2002 1:03 PM To: tim@m...; TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Can you help identify this room audio transmitter Piece of cake: It is a Cheap Chinese made Joseph JP-818 Microphone Transmitter with a frequency range between 110 - 120 MHz. Dynamic range is better then 80 dB and distortion is less then 190. Frequency Response is 80 Hz - 12 kHz @ 3 dB roll-off. Working distance is about 15 meters max (the eavesdropper has to be VERY close). Pre-Emphasis is 50 uS. Maximum RF power output is 30 mW, and the microphone cable itself is the antenna. It takes a standard MN1604 9V battery, and can run for about 6 hours on a typical battery (current draw is just under 21 mA). Size is roughly 105*63*23 mm, and weight is roughly 125 Grams You can find a picture of the little thing at : http://www.tscm.com/joesph-jp818h.jpg http://www.tscm.com/joesph-JP818.gif http://www.tscm.com/joseph-818b.gif Once again Raphael scores a clean, almost instantaneous match ( http://www.tscm.com/raphael.html ). -jma At 4:57 PM +0200 7/31/02, Tim Jackson wrote: >A client of mine recently found a working transmitter in his company >board room. I need to try and find its origin. > >It's a black plastic box about the size of a twenties pack of cigarettes >and operates off a single 9V battery (PP3 / 6F22 006P etc). > >The unit has an external microphone on a cord about two feet in length >which plugs into the transmitter using a standard 1/8" minijack. > >The only controls are an on/off switch, gain control pot and a "battery >low" LED. > >The box bears the following silk-screened label in gold ink: > > JOSEPH > JP-818H >MICROPHONE TRANSMITTER > >The unit transmits on 111.7MHz, immediately above the FM commercial >broadcast band. > >Examination of the circuitry and the plastic housing reveals that it's >probably a mass-produced unit intended to be a cheap wireless mic for >stage use. It isn't even crystal-controlled. > >The battery fitted to the unit is of particular interest to me as it is >not a type sold in this country (South Africa). > >The battery is black and green in the same sort of proportion as a >Duracell battery is black and copper. It is branded "ZHANLI". Any idea >where this is sold? > >Tim > > > >Tim Jackson >Micro Delta >+27 82 651 7272 >Johannesburg >South Africa > > > > >--- > > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu ---------------------------------------------------------------------------- ---------------------- [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5872 From: kondrak Date: Wed Jul 31, 2002 2:31pm Subject: Re: Can you help identify this room audio transmitter That battery came from Red China..don't know about the box however.. At 16:57 7/31/02 +0200, you wrote: >A client of mine recently found a working transmitter in his company >board room. I need to try and find its origin. > >It's a black plastic box about the size of a twenties pack of cigarettes >and operates off a single 9V battery (PP3 / 6F22 006P etc). > >The unit has an external microphone on a cord about two feet in length >which plugs into the transmitter using a standard 1/8" minijack. > >The only controls are an on/off switch, gain control pot and a "battery >low" LED. > >The box bears the following silk-screened label in gold ink: > > JOSEPH > JP-818H >MICROPHONE TRANSMITTER > >The unit transmits on 111.7MHz, immediately above the FM commercial >broadcast band. > >Examination of the circuitry and the plastic housing reveals that it's >probably a mass-produced unit intended to be a cheap wireless mic for >stage use. It isn't even crystal-controlled. > >The battery fitted to the unit is of particular interest to me as it is >not a type sold in this country (South Africa). > >The battery is black and green in the same sort of proportion as a >Duracell battery is black and copper. It is branded "ZHANLI". Any idea >where this is sold? > >Tim > > > >Tim Jackson >Micro Delta >+27 82 651 7272 >Johannesburg >South Africa > > > > >--- > > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5873 From: kondrak Date: Wed Jul 31, 2002 8:55pm Subject: Fw: Groaner > > >A couple lived near the ocean and used to walk the beach a >lot. One summer >they noticed a girl who was at the beach pretty much every >day. She wasn't >unusual, nor was the travel bag she carried, except for one >thing; she would >approach people who were sitting on the beach, glance around >furtively, then >speak to them. Generally the people would respond negatively >and she would >wander off, but occasionally someone would nod and there >would be a quick >exchange of money and something she carried in her bag. The >couple assumed >she was selling drugs, and debated calling the >cops, but since they didn't know for sure they just >continued to watch her. >After a couple of weeks the wife said, "Honey, have you ever >noticed that >she only goes up to people with boom boxes and other >electronic devices?" >He hadn't and said so. Then she said, "Tomorrow I want you >to get a towel >and our big radio and go lie out on the beach. Then we can >find out what >she's really doing." >Well, the plan went off without a hitch and the wife was >almost hopping up >and down with anticipation when she saw the girl talk to her >husband and >then leave. The man walked up the beach and met his wife at >the road. >"Well, is she selling drugs?" she asked excitedly. >"No, she's not," he said, enjoying this probably more than >he should have. >"Well, What is it, then? What does she do?" his wife fairly >shrieked. The >man grinned and said, "She's a battery salesperson." >"Batteries?" Cried the wife. >"Yes,"he replied... >"She sells C cells down by the sea shore!" 5874 From: Paolo Sfriso Date: Thu Aug 1, 2002 2:35am Subject: Need help in accessing data on old 8-inch floppy Dear Colleagues. A potential client has posed the following request: > I am looking for someone who can access and read data from an old 8-inch > floppy. > > The floppy apparently contains a program for which no historical hard-copy > records exist > and my company is eager to have the program downloaded and written to a > current media. > > I know very little about the contents of the disk or what hardware was > used (possible HP) to create it. > > Can you provide any suggestions on how I might go about downloading the > data in question? Can anybody be of assistance ? I have not been able to find a system of this type still working over here. Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 5875 From: Hawkspirit Date: Thu Aug 1, 2002 6:52am Subject: Ebay Bugs Ebay keeps me working!, Roger SPY BUG PHONE TRANSMITTER Item # 1370068133 http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=1370068133 5876 From: D. Douglas Rehman Date: Thu Aug 1, 2002 8:04am Subject: RE: Need help in accessing data on old 8-inch floppy Try Computer Conversions in California; they can recover data from virtually any media. www.computerconversions.com Best Regards, Doug Rehman Rehman Technology Services, Inc. Specializing in Computer Forensics and Technology Related Investigations License A-9800119 Mount Dora, Florida (Orlando Area) (352)357-0500 http://www.surveil.com > -----Original Message----- > From: Paolo Sfriso [mailto:paulsfriso@t...] > Sent: Thursday, August 01, 2002 3:36 AM > To: tscm-l@yahoogroups.com > Subject: [TSCM-L] Need help in accessing data on old 8-inch floppy > > > > Dear Colleagues. > > A potential client has posed the following request: > > > I am looking for someone who can access and read data from an old > > 8-inch floppy. > > > > The floppy apparently contains a program for which no historical > > hard-copy records exist and my company is eager to have the program > > downloaded and written to a current media. > > > > I know very little about the contents of the disk or what > hardware was > > used (possible HP) to create it. > > > > Can you provide any suggestions on how I might go about downloading > > the data in question? > > Can anybody be of assistance ? I have not been able to find a > system of this type still working over here. > > Kind Regards. > > Paul Sfriso > Director > GRUPPO S.I.T. > Security, Investigations & Technology > Quarto d'Altino, Venice > ITALY > > phone +39 0422 828517 > fax +39 0422 823224 > 24hr GSM cellphone +39 335 5257308 > www.grupposit.com > paulsfriso@t... > > > > > [Non-text portions of this message have been removed] > > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> Access Your PC from Anywhere - Free > Trial http://us.click.yahoo.com/o5uw2C/0ncEAA/Ey.GAA/kgFolB/TM > -------------------------------------------------------------- > -------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire > speed, the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > 5877 From: James M. Atkinson Date: Thu Aug 1, 2002 7:52am Subject: Re: Ebay Bugs At 4:52 AM -0700 8/1/02, Hawkspirit wrote: >Ebay keeps me working!, Roger > >SPY BUG PHONE TRANSMITTER Item # 1370068133 >http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=1370068133 It's a very common "kit bug" which sells in qty for about $4.95, really easy to find. Just look for a drifty signal in or near the FM broadcast band, then notice the lack of sub-carriers. The circuit is L/C tuned, look for corrupted 200 kHz channel spacing as well. The transmit range is very limited, and concealment is difficult. VERY popular as a "throw down" or "insurance bug", so if you find one suspect the person who brought you in, or who may benefit from the bug being found. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5878 From: D. Douglas Rehman Date: Thu Aug 1, 2002 8:11am Subject: RE: Need help in accessing data on old 8-inch floppy Oops... Wrong URL... www.computer-conversions.com > -----Original Message----- > From: D. Douglas Rehman [mailto:rehman@s...] > Sent: Thursday, August 01, 2002 9:04 AM > To: tscm-l@yahoogroups.com > Subject: RE: [TSCM-L] Need help in accessing data on old 8-inch floppy > > > Try Computer Conversions in California; they can recover data > from virtually any media. www.computerconversions.com > > > Best Regards, > > Doug Rehman > Rehman Technology Services, Inc. > Specializing in Computer Forensics and Technology Related > Investigations License A-9800119 Mount Dora, Florida (Orlando > Area) (352)357-0500 http://www.surveil.com > > > > -----Original Message----- > > From: Paolo Sfriso [mailto:paulsfriso@t...] > > Sent: Thursday, August 01, 2002 3:36 AM > > To: tscm-l@yahoogroups.com > > Subject: [TSCM-L] Need help in accessing data on old 8-inch floppy > > > > > > > > Dear Colleagues. > > > > A potential client has posed the following request: > > > > > I am looking for someone who can access and read data from an old > > > 8-inch floppy. > > > > > > The floppy apparently contains a program for which no historical > > > hard-copy records exist and my company is eager to have > the program > > > downloaded and written to a current media. > > > > > > I know very little about the contents of the disk or what > > hardware was > > > used (possible HP) to create it. > > > > > > Can you provide any suggestions on how I might go about > downloading > > > the data in question? > > > > Can anybody be of assistance ? I have not been able to find a > > system of this type still working over here. > > > > Kind Regards. > > > > Paul Sfriso > > Director > > GRUPPO S.I.T. > > Security, Investigations & Technology > > Quarto d'Altino, Venice > > ITALY > > > > phone +39 0422 828517 > > fax +39 0422 823224 > > 24hr GSM cellphone +39 335 5257308 > > www.grupposit.com > > paulsfriso@t... > > > > > > > > > > [Non-text portions of this message have been removed] > > > > > > ------------------------ Yahoo! Groups Sponsor > > ---------------------~--> Access Your PC from Anywhere - Free > > Trial http://us.click.yahoo.com/o5uw2C/0ncEAA/Ey.GAA/kgFolB/TM > > -------------------------------------------------------------- > > -------~-> > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire > > speed, the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to > > http://docs.yahoo.com/info/terms/ > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> Access Your PC from Anywhere - Free > Trial http://us.click.yahoo.com/o5uw2C/0ncEAA/Ey.GAA/kgFolB/TM > -------------------------------------------------------------- > -------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire > speed, the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > 5879 From: A Grudko Date: Thu Aug 1, 2002 9:30am Subject: Re: Ebay Bugs ----- Original Message ----- From: James M. Atkinson > VERY popular as a "throw down" or "insurance bug", so if you find one > suspect the person who brought you in, or who may benefit from the > bug being found. Also a useful decoy. The buggist plants a more sophisticated device in the knowledge that many 'sweepers' will be too busy patting themselves on the back to look for a second, harder to detect device. "See Mr Client, you were right - you were bugged (Thinks - I'll send you an inflated bill tomorrow - snigger)" There was also a famous Jo'burg PI who made sure he got repeat business by making sure he 'found' something - 'til one day he missed the one way mirror that the client was watching from behind (it was a bank dealer room)....ohhh Andy Grudko (British) - D.P.M., Grad I.S, South Africa - PSIRA investigators Reg. No. 8642 Grudko Associates - www.grudko.com , andy@g... . Est. 1981. International business intelligence and investigations To contact us: (+27 12) 244 0255 - 244 0256 (Fax). ICQ : 146498943. Netmeeting : agrudko@h... IPA, SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust When you need it done right - first time 5880 From: James M. Atkinson Date: Thu Aug 1, 2002 10:00am Subject: Re: Ebay Bugs I agree, but always assume there are three bugs, not just two. Also the "throw down bug" is a real problem in NYC and surrounding areas, and I know of cases where a major company was having a spyshop sweep firm come in every two weeks, and each time they found at least one bug, and sometimes 5-6. The victim had covert CCTV installed and they video taped the "sweepers" actually planting the devices to enure they had future business. The sweep firm was of course fired, and banned from all properties. -jma At 4:30 PM +0200 8/1/02, A Grudko wrote: >----- Original Message ----- >From: James M. Atkinson >> VERY popular as a "throw down" or "insurance bug", so if you find one >> suspect the person who brought you in, or who may benefit from the >> bug being found. > >Also a useful decoy. > >The buggist plants a more sophisticated device in the knowledge that many >'sweepers' will be too busy patting themselves on the back to look for a >second, harder to detect device. > >"See Mr Client, you were right - you were bugged (Thinks - I'll send you an >inflated bill tomorrow - snigger)" > >There was also a famous Jo'burg PI who made sure he got repeat business by >making sure he 'found' something - 'til one day he missed the one way mirror >that the client was watching from behind (it was a bank dealer room)....ohhh > >Andy Grudko (British) - D.P.M., Grad I.S, South Africa - PSIRA investigators >Reg. No. 8642 >Grudko Associates - www.grudko.com , andy@g... . Est. 1981. >International business intelligence and investigations >To contact us: (+27 12) 244 0255 - 244 0256 (Fax). ICQ : 146498943. >Netmeeting : agrudko@h... >IPA, SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust >When you need it done right - first time -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5881 From: iDEN-i100 Date: Thu Aug 1, 2002 0:38pm Subject: CE*COMM Announces New Communications Security and Surveillance Product http://www.prnewswire.com/cgi-bin/stories.pl?ACCT=104&STORY=/www/story/07-31-2002/0001774861&EDATE= -- [Non-text portions of this message have been removed] 5882 From: George Shaw Date: Thu Aug 1, 2002 11:45am Subject: RE: Need help in accessing data on old 8-inch floppy I think that a company still operating in England have such a device. I will check with the tech support people and let you know (another source may be the Universities as they usually have things they never throw out). Failing that it is possible but expensive to get the file read on a bit level and stored to hard disk but if the file(s) are binary then it wont run on any new software (OS) other than that it was written for. If it is data files text or numbers then it is easily worked with. If they don't know what operating system it was written for they may never be able to run it unless the source code is on the disk. Caution would have to be exercised as to the contents of the disk and the true right to view. George Shaw MI3GTO Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... -----Original Message----- From: Paolo Sfriso [mailto:paulsfriso@t...] Sent: 01 August 2002 08:36 To: tscm-l@yahoogroups.com Subject: [TSCM-L] Need help in accessing data on old 8-inch floppy Dear Colleagues. A potential client has posed the following request: > I am looking for someone who can access and read data from an old 8-inch > floppy. > > The floppy apparently contains a program for which no historical hard-copy > records exist > and my company is eager to have the program downloaded and written to a > current media. > > I know very little about the contents of the disk or what hardware was > used (possible HP) to create it. > > Can you provide any suggestions on how I might go about downloading the > data in question? Can anybody be of assistance ? I have not been able to find a system of this type still working over here. Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS From: kondrak Date: Tue Jul 27, 2004 1:18pm Subject: Re: ID of mystery dish.. Looks like a standard ENG "Electronic news gathering" dish a TV station would set up. Did you follow the cable to see whats plugged into it? Its definitely a very high freq microwave, and thus fairly short hop. My guess it's to remote a particular video feed to a remote location where they will process it. A little better picture of the feed might give more clues as to the freq, but it looks very high, above 10 ghz. At 10:51 7/27/2004, you wrote: >Good to see TSCM-L back after that short amount of excitement.. > >I'm looking for identification of a dish, is it microwave? I've >included links to the pictures below. > >http://www.esoteric.ca/special/mystery_dish_1.jpg >http://www.esoteric.ca/special/mystery_dish_2.jpg >http://www.esoteric.ca/special/mystery_dish_3.jpg > >-- Stephen Fulton. > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9199 From: Agent Geiger Date: Tue Jul 27, 2004 0:56pm Subject: Re: Tear Down This Wall [Off Topic] At Smokey Mountain National Biosphere Reserve, the "free speech zone" is the size of parking space. The ranger told me that it was to keep Hare Krishnas from bothering people. --- "James M. Atkinson" wrote: > > Tear Down this Wall > > I was recently able to examine the so called "Free > Speech Zone" located > near the Fleet Center in Boston, MA at the site of > the Democratic National > Convention. I walked around the outside perimeter, > and I walked around > inside of it. > > What I saw was an absolute abomination, not only to > the eye, but also to > the very spirit of our nation. This cage should > never be torn down, and > should be preserved with a museum built around it to > signify just how low > we as a nation have fallen. This area and the > surrounding land was once the > birth site of democracy, patriotism, and freedom. > This sacred ground has > now been sullied with this contraption and itís > significance. > > It was mere feet to the South that the Boston > Massacre took place, and only > a short distance to the North that the Battle of > Bunker Hill was waged. To > the West of this site we have the Old North Church, > where Paul Revere saw > the lights that sent him on his ride, and to the > East the location where > our Colonial forefathers expressed their outrage at > King George by dumping > his tea into Boston Harbor. > > These locations are not miles, tens of miles, or > hundreds of miles from > this site, but feet, from where people gave their > lives to protect our > freedom. The soil directly underneath this so called > ìFree Speech Zoneî > contains the blood of those early Americans who had > the bravery and faith > to stand up for what they believed in, and who were > willing to die for it, > in turn soaking this very ground with their lifeís > blood. > > Not far from here are two old Colonial-era > graveyards, which contain the > mortal remains of those who died fighting for our > freedom in the early days > of our country. These graves include both rich and > poor, sailors and > preachers, sons and daughters, husbands and wives, > both the well-educated > and the simple. The markers in this graveyard list > patriot after patriot, > hero after hero, and yet the United States > Government, the Secret Service, > the Department of Homeland Security, and City of > Boston saw fit to > desecrate this holy ground with what has become an > embarrassment to our > entire country. > > When the City of Boston was summoned into court > concerning this abomination > the Judge could not believe the description that was > given, and had to come > out of the courtroom to observe it in person. U.S. > District Court Judge > Douglas P. Woodlock was deeply disturbed and blasted > the ìFree Speech Zoneî > in his published decision, and stated that it was > "an affront to free > expression". > > The ìzoneî is poorly constructed, no building permit > was ever obtained for > it; no building inspector every certified it for > occupancy. Around the > perimeter, this death trap is lined with a highly > flammable fabric to hide > the protester from public view, and yet no fire > extinguishers can be found > in the enclosure. Above the ìaffront to free > expressionî (as the court has > deemed it) the government has positioned soldiers > armed with machine guns > and chemical weapons to quell any voices that become > too unruly, or > unmanageable. > > The ìFree Speech Zoneî does not serve any legitimate > security purposes, > does not foster ìFree Speechî, and instead only > exists to muzzle the voice > of protest, and to try to hide it away under an old > decrepit bridge. > > History records that following World War II, the > Russian forces began their > oppressive occupation of East Germany. Those living > on the wrong side of > the wall had to suffer under the iron rule of the > Communist system, and > risked imprisonment or death for speaking out or > trying to seek freedom. > Between 1949 and 1961 over 2.6 million East Germans > escaped to West Berlin. > The Communist government could find no way to > control this mass exodus. On > August 13, 1961 the Soviet Government officially > closed the border between > East and West Berlin and began building a series of > walls through the city. > These series of walls came to be known as the > ìBerlin Wallî, and became a > black mark in history, noting the Berlin Wall as a > structure of oppression. > Ironically, the United States considered the Berlin > Wall as the centerpiece > of the Soviet oppression present in East Germany > during the Cold War. > > The Soviet Union permitted three places in this wall > where a small number > of their ìpolitically correctî citizens could cross > into West Berlin, and > where diplomats could meet to exchange spies. During > the Cold War, the > government posted signs at these three checkpoints > that said ìYou are now > leaving the American Sectorî. These same signs, with > this same message > could now be hung in Boston near the Fleet Center > where the DNC convention > is taking place. > > On June 12, 1987, the President of the United States > of America, the late > Ronald Reagan addressed the people of West Berlin, > in Germany at the > Brandenburg Gate. During this speech, President > Reagan called on the leader > of the Soviet Union and proclaimed: ìCome here to > this gate! Mr. Gorbachev, > open this gate! Mr. Gorbachev, tear down this wall!î > > The ìFree Speech Zoneî is only a few hundred feet > from where the DNC > candidates will be speaking about freedom, > democracy, and the American > ethic. This zone can be easily reached from the > speakers platform of the > convention by walking a few yards to the elevator, > going down one floor, > take a left though the glass doors to the street > level, and then take a > right to walk along the media pavilion. Directly > ahead, and across the > street will be the area in questionÖ it is hard to > miss as it stands like > some monument to oppression, and demonstrates to the > entire world that some > Americans, and the nation as a whole can, in fact, > be muzzled. Is this a > message that we as a democratic society wish to > convey to the rest of the > world, Mr. President? > > I formally ask that both Mr. Kerry, and Mr. Edwards > visit the inside of the > "Free Speech Zone", and that while visiting that > they take a pair of wire > cutters and cut a hole in the fence to demonstrate > that they support and > are willing to defend the Constitution of the United > States. Then Mr. > Kerry, during the convention have the ones > responsible for erecting this > contraption tear it down, this wall, this slap in > the face of our > Constitutional Rights, to Free Speech, to Gather, to > Raise our Voices, in > OUR own land. We the peopleÖ > > ìCome here to this wall! Mr. Kerry, open this gate! > Mr. Kerry, tear down > this wall!î > > James M. Atkinson, 7/24/04 > Gloucester, MA > jmatk@tscm.com > www.tscm.com > > > > ----------------------------------------------------------------------------------------------------- > > === message truncated === __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 9200 From: Date: Tue Jul 27, 2004 0:24pm Subject: RE: No parabolic......Phased Array Microphones ! This approach has been tested and thrown away probably before Tetrascanner was born. It doesn¥t work. The reason is as simple as that: acoustical signal is too broadbad for being eefectively picked by a phasede array. It works for birdwatchers where some 500 Hz bandwidth will do the job. For surveillance purposes you need at least 300Hz to 3000 Hz, or in terms of wavelength 1m down to 10cm. To yield a reasonable gain the spacing between elements in the array must be approximately 0.5 lambda, that is 5cm for 3000 Hz and 50 cm for 300 Hz. The array will not have a satisfactory radiation pattern if the distance between elements is greater than lambda and smaller than 0.5 lambda. Varidistance arrays and overlapped arrays were proposed but none of them works better than parabolics, horns or tubular microphones. The effect of frequency selectivity affects also latter type of directive microphones though. A lot of taxpayers¥ money on both sides of iron curtain were spent on that kind of research during the cold war. The return on that investment was zero. In general, the acoustical directive antennas are pure performer: the expected "distance gain" today is somewhat 3 to 5, exactly as it was 50 years ago (R.Dash. The Eavesdroppers. Rutgers University Press, 1959, page 350 - 352) Regards, A.W. "contranl" wrote: >. > > >I don't think that parabolic microphones are very usefull for >surveillance...the main reason for that is : > >In order to get any usefull gain from such a mic you need to use a >(to) large dish ...this will convert you into a "sitting duck" so >such a mike would only be good for birdwatchers. >The spyshop mics are really just gadgets...to give you an idea of the >minimal size you need you may visit one of these childrens play areas >where they have 2 large dishes (2 meters diagonal !) placed opposite >of each other and in about 20 meters distance..the dishes have a >hole in the middle where you can stick your head in,your friend >sticks his head in the other one,you then can talk very low and >still hear each other good...(caused by the effect of the 2 dishes >added together!) > >I have seen other designs consisting of a bundle of pipes...each >with a different length(between 0.3 and 1 meters long) >the idea was that every length would have a different resonance >frequency thus filtering out any non voice noise...in practice >unworkable since it was to big,it would give you away in a second. > > >Have a look at a different approach wich is called "Phased Array" >where 2 or more(up to 30)microphones are connected in parallel >trough adjustable phase filters...by changing the phase of each >microphone you can create a very powerfull directional effect wich >will effectively cut out any noise or sounds not coming from exactly >the direction of where you point it at...the more mics the sharper >the beam...very similar to "stacking" radio antennas. > >This technique is also used on warships...those big flat >panels...they are electronically steerable radar antennas..they dont >move but they scan 180 degrees. > >I have seen (do'nt remember where) a van with a very thin panel >mounted on one of the sides,looking like a big magnetic sticker >about 1 mtr x 0,5 mtr in size and only 0,5 cm thick. >it contained an array of maybe 30 very small(condenser) >microphones...inside was a control-unit with wich you could "steer" >the mic's in any direction...the van is parked near the audio-source >the mic's are then electronically steered until it's pointed for >best reception...so no "mechanical" attention-drawing movements have >to be made. > > >A company that makes low cost commercial phased mic's for various >purposes (not specifically surveillance) is here : > >http://www.andreaelectronics.com > >A must is to download their demonstration of a 2 mic only set wich >can be connected to your laptop...the laptop then does the >calculation to phase out any sounds from other directions >very simple and cheap solution ! (also used on cellphones to block- >out background noise) > >Download the interesting Demo wich uses phased-array + noise >filtering ....here: > >http://www.andreaelectronics.com/Buy/Soundmax/tech_demo.htm > > >I am shure you will easely find more info on this technique for >surveillance purposes. > >You could even add an electronic correlator...wich is a unit that >receives the unwanted noise only...from a source surrounding or in >the background of the subject,it then subtracts the background noise >from the received audio > >(wanted signal + noise) - (noise) = wanted signal > >such a combination would be very powerfull. > > >A practical example of an electronic correlator would be: > >You are bugging a room using a wireless bug..there is a loud TV in >the background wich makes it difficult to understand the >conversation...in your van parked in front of the house you have a >correlator connected to a TV tuner wich is tuned to exactly the same >channel as the TV inside the room...the correlator then substracts >the TV sound from the received audio and voila! >you are left with the audio without the disturbing Tv sound. > >There is a company wich makes such a correlator with additional >tuner if i remember well it even tunes automatically to the right Tv >channel...is'nt that wonderfull ! > >If i remember well(again)...a variation of the audio phasing and >(analog)correlation technique was used in an old Gene Hackman movie >where he had to overhear a conversation of some people in the middle >of a square surrounded by lots of other people talking loud...he >solved that problem by placing microphones on each corner of the >square...by comparing the signals he was able to get rid of the >unwanted noise... >Must have been 20 years ago that movie... >at that time i was very impressed. > > >Let us know what you find ! >(keywords:microphone,phased,array,correlation) > > >Tetrascanner >www.tetrascanner.com >The Netherlands > > >. > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > __________________________________________________________________ Switch to Netscape Internet Service. As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register Netscape. Just the Net You Need. New! Netscape Toolbar for Internet Explorer Search from anywhere on the Web and block those annoying pop-ups. Download now at http://channels.netscape.com/ns/search/install.jsp 9201 From: A Grudko Date: Tue Jul 27, 2004 4:40pm Subject: RE: Parabolic Dish Info -----Original Message----- From: John Papaleo [mailto:JPapaleo@N...] > these things are toys...they are for the most part useless... I disagree. For example. In one 1988 case I was a drug squad police officer (South African NArcotics Bureau - SANAB) at the time. Crouched in the bushes in the dark approx. 20 mtrs from a first floor apartment, with open windows and a noisy road behind me (Oxford Rd, Illovo, for SA members) I taped a 'vitamin C (cocaine)' deal go down. From that distance, unaided, I could hear nothing. But with the dish and a good amp I got info (that I could not directly use in court) that later resulted in a dealer's conviction. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" . --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.718 / Virus Database: 474 - Release Date: 2004/07/09 [Non-text portions of this message have been removed] 9202 From: A Grudko Date: Tue Jul 27, 2004 4:40pm Subject: RE: I started out with nothing & still have most of it left. -----Original Message----- From: Lawrence Dillard [mailto:ldudlyd@t...] > 40 THINGS YOU WOULD LOVE TO SAY OUT LOUD AT WORK WHAT? Moderator, please delete this person. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.718 / Virus Database: 474 - Release Date: 2004/07/09 [Non-text portions of this message have been removed] 9203 From: John McCain Date: Tue Jul 27, 2004 3:52pm Subject: Re: ID of mystery dish.. I have used identical looking (but not necessarily identical) equipment for a 10 Mbps LAN link running in the 23 Ghz band. Manufacturer for that stuff was Southwest Microwave, 800 and 900 series products (and have since been discontinued or changed) . They also manufacture a video ENG link that looks identical from outside the box. There are also a number of 5.8 Ghz ethernet links and video ENG links that have a similar apearance. Due to the temporary nature of the installation, I'd suspect a 5.8 Ghz, license free band LAN link or ENG. Many networking vendors will rent the 5.8 Ghz (or 2.4 Ghz) 10 Mbps links for use while telco lines are being ordered and installed. Cheers, JohnM kondrak wrote: > Looks like a standard ENG "Electronic news gathering" dish a TV station > would set up. Did you follow the cable to see whats plugged into it? Its > definitely a very high freq microwave, and thus fairly short hop. My guess > it's to remote a particular video feed to a remote location where they will > process it. > A little better picture of the feed might give more clues as to the freq, > but it looks very high, above 10 ghz. > > > At 10:51 7/27/2004, you wrote: > >>Good to see TSCM-L back after that short amount of excitement.. >> >>I'm looking for identification of a dish, is it microwave? I've >>included links to the pictures below. >> >>http://www.esoteric.ca/special/mystery_dish_1.jpg >>http://www.esoteric.ca/special/mystery_dish_2.jpg >>http://www.esoteric.ca/special/mystery_dish_3.jpg >> >>-- Stephen Fulton. >> >> >> >> >> >> >> >>======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >>=================================================== TSKS >>Yahoo! Groups Links >> >> >> >> > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9204 From: buster60091 Date: Tue Jul 27, 2004 3:34pm Subject: Re: Tear Down This Wall [Off Topic] The real tragedy of the cage is that aside from the Mr. Atkinson no one that I have seen has bitched about it. Not "fair and balanced" not "america's most watched" or "most important" or "no spin" or public radio/tv . . . no one. We have apparently gone so far down the road that we have no clue as to where we came from. What's next? Everyone is equal but some are more equal than others? 9205 From: J. Oquendo Date: Tue Jul 27, 2004 8:19pm Subject: Frequency Filtering Wallpaper Writing is on the wallpaper for noisy mobiles David Smith, technology correspondent Sunday July 25, 2004 The Observer ... British scientists have found a way to mass-produce frequency-selective 'wallpaper' screens (FSS) on a large scale for the first time. The screens are metal grids designed in an intricate pattern which filter out some radio signals and allow others through, depending on their wavelength. They can be fitted to walls and covered with real wallpaper so they disappear from view. http://observer.guardian.co.uk/uk_news/story/0,6903,1268797,00.html =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo GPG Key ID 0x51F9D78D Fingerprint 2A48 BA18 1851 4C99 CA22 0619 DB63 F2F7 51F9 D78D http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D sil @ politrix . org http://www.politrix.org sil @ infiltrated . net http://www.infiltrated.net "How can we account for our present situation unless we believe that men high in this government are concerting to deliver us to disaster?" Joseph McCarthy "America's Retreat from Victory" 9206 From: Steve Uhrig Date: Tue Jul 27, 2004 9:24pm Subject: Enemy of the State - screen room On 27 Jul 2004 at 16:54, Tech Sec Lab , who eschews obfuscation, wrote: > In that case, can you explain exactly how his "chicken wire" faraday cage > was supposed to be effective....? This refers to the Touchstone movie 'Enemy of the State' featuring Gene Hackman and Will Smith. Marty Kaiser and I were technical advisors on surveillance to the production. It wasn't chicken wire. It was proper copper mesh. Read on. --------- I will tell you the story of the screen room aka 'jar'. During an early meeting in Hollywood, Ben Fernandez, the set designer, asked about screen rooms. We explained the principle and theory. A screen room was part of the script, for Hackman's secret laboratory. They wanted it done right. They did a lot there, which few will ever know, to make things as accurate as possible. I went back to my hotel room that evening and pulled some formulas off the web. I spreadsheeted a chart of a bunch of variables like the alloy of copper, mesh size, gauge, attenuation levels vs frequency, etc. I don't carry a printer when I travel, so I faxed the spreadsheet from my laptop to the hotel's fax machine, and dumped the spreadsheet to a floppy also. The next day I delivered that info to the set designer. He did it right. He bought genuine copper mesh. Outrageously expensive. I had told him he could use any kind of inexpensive garbage and it would look the same; no one would be examining it through a microscope. He bought copper mesh, about the size of what farm boys in the U.S. call 'hardware cloth'. You could just about put a pencil into the holes in the mesh. Built a framework. Built the screen room. He (his team of about 40 people, not him personally) soldered all the seams. They designed a counterweighted fold down door/ladder as an entrance. They put finger stock and mesh gaskets on the door which wouldn't have passed NSA muster, but was a credible job. They sprayed the copper with acid to age it artificially and cut down on glare into the cameras. We had explained about restrictions, filtering, etc. on power and data lines going into the thing. They didn't want to go as far as powering the jar via hydraulic fluid pumped through the walls spinning a generator inside (hydraulic fluid can't conduct electrical signals in and out). But they did simulate independent power with a gasoline generator on a platform outside, next to the door. That generator was brand new but made to look aged by the propmaster. You see Hackman start the generator before going into the jar. Underneath that generator also is the LED readouts and countdown timer for the explosives you see Hackman trigger when they flee the jar. We filled the jar with electronic junk. A ton of stuff from surplus medical and military electronics outlets. Didn't matter what it was or if it worked. If we plugged it in and it lit up, we used it. I stuck my IFR, a Tek scope, another service monitor and a complete Scanlock setup in there as window dressing. The Scanlock was a full blown unit, my personal piece, with the spectrum monitor and many other accessories, Compuscan blinking all its colored LEDs etc. I don't think a good shot of that made it on screen, but you see Gene Hackman waving the Scanlock antenna around quickly inside the jar when he and Will Smith first go inside, with Hackman making a comment about sweeping for bugs. You see NSA people using the same Scanlock in the background elsewhere in the film, sweeping the Senator's hotel suite after bugs were found there. --------- For most of the filming, wireless mikes were used on the talent. They were in the 17x megacycle range, wide FM. They used parallel redundant receivers for each channel to minimize chances of failure if one receiver died. They used an antenna multicoupler to feed up to 8 receivers. Well, time came to film the scene inside the jar, which original footage was cut by 90% to the little snippet you see on screen. The sound guys, with a million dollars' worth of elaborate audio equipment and years of experience, can't get any of their wireless mikes to work in the jar scene. They keep swapping equipment. It all worked yesterday. They aren't RF types, but know they're getting no signal. They don't know why. Never seen this before. The mikes on Hackman and Smith's stand-ins (stand ins have the same build, skin tone, etc. as the real talent, and the real talent is brought in only at the last minute after all the preparations are made) were only about 20 feet away from the receive antennas, through the wall of the screen room/jar. Did all their gear fail overnight? Problem is not bad power (they use only battery power for everything, for safety and to keep noise down on the power buss). Not mikes. Not transmitters. They keep swapping mikes and frequencies. Batteries. Not getting signal. They know that. They put a 10 element VHF Yagi on a tripod pointed right at the jar. Looks ridiculous. Hams use antennas like that to talk halfway across the state. This is all early in the morning, before I got there about 6AM. They'd been working for hours at that point. They never sleep. I had long ago become well known around the production as the resident technoweenie. So they call me over and explain the situation. I had an idea what was happening. Not their equipment. My fault. I asked them for a long coax patch cord. They give me about a 30 foot piece of coax with BNCs on each end. I cut the BNC off one end with my pocket knife, stripped the coax, pulled the center conductor out of the braid using two hand span lengths (my hand span is 8 inches) to approximate the 16 inch 1/4 wave resonant length for the wireless mic frequencies. Cut off the braid. Spent all of 3 minutes doing this. Time is money and schedules were tight, and respected. I crawled up a ladder and stuck the stripped center conductor down through a hole in the mesh in the upper right rear of the jar. You couldn't see it. I handed the other BNC on the end of the jumper to Earl, the sound man, and told him to hook it up to his receiver multicoupler antenna input. He did, they got full quieting signals and proceeded to film the scene. I earned my pay that day, and every word you hear Gene Hackman and Will Smith speaking inside the jar was received via that field expedient antenna I made. The set designer, Ben Fernandez, had made the screen room so well the wireless mikes couldn't transmit out. We did too good a job. But it all worked out in the end. And reinforced their opinions of Marty and me as technoweenie wizards who could start with earth, air, water and fire and bug a place. ----------------- The jar actually was on the ground floor of the abandoned warehouse, not on the second floor as depicted. The original jar was disassembled and transported back to Hollywood in case the scene needed to be re-shot, which it did months later but that's another story. The jar which blew up with the warehouse was a phony one, made of styrofoam and spray paint. 200 people all on union scale, and Marty and me, worked on that warehouse for six weeks, all for 10 minutes on screen and to be blown up months later. It was right around Christmas when we were doing the work there, and very cold in that large abandoned warehouse which formerly was a Dr. Pepper bottling plant. They had large salamander heaters going which made it tolerable. And that's one tiny part of the story of the jar and the screen room. They asked for it, we gave it to them, and it worked too well. The true behind-the-scenes story is more interesting than the fictional one to many like us. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9207 From: R. Snyder Date: Tue Jul 27, 2004 11:17pm Subject: Ringing on TDR output I've got an early version of the Riser Bond 1220 TDR (sans RS-232) that exhibits severe undershoot immediately after the outgoing pulse on the 10 nS and 100nS pulses and, to a lesser extent on the 2 nS pulses, even with nothing connected to the output. The period of the ringing seems to be about 220 nS or, in the frequency domain, around 4.5 MHz (or 4.5 MC for you-know-who). It remains the same regardless of the impedance setting. I opened it up and took a look a the output circuitry, but didn't see reactive components of the sort that I would suspect of being able to cause such resonance. Does anyone have any ideas what might be causing such relatively low-frequency ringing? Also, I didn't see any proper impedance matching circuit, which leads me to suspect that the so-called impedance settings merely change the drive on the output transistors but do not actually change the source impedance. In any event, the changes in the waveform when the impedance settings are changed while connected to a real cable don't appear to coincide with the changes I would expect if the output impedance were actually changing. Is anyone familiar with Riser Bond's so-called impedance matching circuit who would care to explain its design? __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - Send 10MB messages! http://promotions.yahoo.com/new_mail 9208 From: A Grudko Date: Wed Jul 28, 2004 2:01am Subject: RE: Parabolic Dish Info -----Original Message----- From: DEMTEC@A... [mailto:DEMTEC@A...] > ps Just a thought any other member published a book on TSCM or related ??? dont be shy I for one would be interested in adding to my extensive library The book I'm working on at the moment is my memoirs (something I wish my dad had done as his early life was very interesting) but I did have 3 technical books published in 1993: The Locksmith's Box Of Secrets - ISBN 0-620-17888-4 Counter Surveillance Techniques - ISBN 0-620-18169-9 Covert Electronic Surveillance - ISBN 0-620-18168-0 © Coral Keyes Publishing, 1993, Nassau, New Providence, Bahamas They are all out of print but I'll look round for copies Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.718 / Virus Database: 474 - Release Date: 2004/07/09 [Non-text portions of this message have been removed] 9209 From: satcommunitfive Date: Wed Jul 28, 2004 2:42am Subject: Re: ID of mystery dish.. looks like a 10Ghz button feed my 2c worth --- In TSCM-L@yahoogroups.com, John McCain wrote: > I have used identical looking (but not necessarily identical) equipment > for a 10 Mbps LAN link running in the 23 Ghz band. Manufacturer for > that stuff was Southwest Microwave, 800 and 900 series products (and > have since been discontinued or changed) . They also manufacture a > video ENG link that looks identical from outside the box. > > There are also a number of 5.8 Ghz ethernet links and video ENG links > that have a similar apearance. > > Due to the temporary nature of the installation, I'd suspect a 5.8 Ghz, > license free band LAN link or ENG. Many networking vendors will rent > the 5.8 Ghz (or 2.4 Ghz) 10 Mbps links for use while telco lines are > being ordered and installed. > > Cheers, > JohnM > > > > > kondrak wrote: > > > Looks like a standard ENG "Electronic news gathering" dish a TV station > > would set up. Did you follow the cable to see whats plugged into it? Its > > definitely a very high freq microwave, and thus fairly short hop. My guess > > it's to remote a particular video feed to a remote location where they will > > process it. > > A little better picture of the feed might give more clues as to the freq, > > but it looks very high, above 10 ghz. > > > > > > At 10:51 7/27/2004, you wrote: > > > >>Good to see TSCM-L back after that short amount of excitement.. > >> > >>I'm looking for identification of a dish, is it microwave? I've > >>included links to the pictures below. > >> > >>http://www.esoteric.ca/special/mystery_dish_1.jpg > >>http://www.esoteric.ca/special/mystery_dish_2.jpg > >>http://www.esoteric.ca/special/mystery_dish_3.jpg > >> > >>-- Stephen Fulton. > >> > >> > >> > >> > >> > >> > >> > >>======================================================== > >> TSCM-L Technical Security Mailing List > >> "In a multitude of counselors there is strength" > >> > >> To subscribe to the TSCM-L mailing list visit: > >> http://www.yahoogroups.com/community/TSCM-L > >> > >> It is by caffeine alone I set my mind in motion. > >> It is by the juice of Star Bucks that thoughts acquire speed, > >> the hands acquire shaking, the shaking is a warning. > >> It is by caffeine alone I set my mind in motion. > >>=================================================== TSKS > >>Yahoo! Groups Links > >> > >> > >> > >> > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > 9210 From: James M. Atkinson Date: Wed Jul 28, 2004 6:04am Subject: Status of the List I would like to thank the list membership for the support and encouragement that I received after Yahoo took the list own last week. In the last week the list membership has increase to 1130+ Members, with 52 new members in the past week alone, which is a significant jump in membership. In the past 10 days, only 4 members were dropped from the list, a number which is well within the normal day-to-day parameters of a list of this size (the rumors of any kind of a mass exodus is fantasy). I would like to encourage the list membership to take an active role in the list, and not to just sit back and lurk. Please feel free to post occasionally, and to let us know your comments on subject matters. I would also like to apologize from some of the disruptive troublemakers on the list as several of them were working together to try to destroy the list, where having Napoleonic temper tantrums, and were attacking members whenever they could (they will not be a problem anymore). Welcome to the TSCM-L Mailing List, and thank you for being a member. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9211 From: James M. Atkinson Date: Wed Jul 28, 2004 6:23am Subject: Re: ID of mystery dish.. Yes, the pictures are of a typical microwave parabolic dish. You would need to get a closer picture of the feed assembly with something included to show scale to determine the frequency range. Where was is found, and did you look under the plastic sheet covering the top of the tripod/base of the dish? These are very common in the 10 GHz range of the spectrum, but it could be using pretty much any frequency above 1.5 GHz -jma At 10:51 AM 7/27/2004, Steve Fulton wrote: >Good to see TSCM-L back after that short amount of excitement.. > >I'm looking for identification of a dish, is it microwave? I've >included links to the pictures below. > >http://www.esoteric.ca/special/mystery_dish_1.jpg >http://www.esoteric.ca/special/mystery_dish_2.jpg >http://www.esoteric.ca/special/mystery_dish_3.jpg > >-- Stephen Fulton. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9212 From: James M. Atkinson Date: Wed Jul 28, 2004 0:09pm Subject: Chinese-American on Trial for China Espionage http://abcnews.go.com/wire/US/reuters20040728_69.html Chinese-American on Trial for China Espionage July 28, 2004 ≠ By Benjamin Kang Lim BEIJING (Reuters) - A Chinese-American businessman will go on trial in China soon, accused of spying on China for arch-rival Taiwan while in the United States, Chinese state media said Wednesday. David Dong, 52, also known as Dong Wei, is the latest in a string of U.S. citizens and permanent residents arrested in China on charges of spying for the self-ruled, democratic island which Beijing has claimed since the end of a civil war in 1949. "How big exactly the scope of Taiwan's spy network in the United States is has become an alarming question," said the Global Times, a subsidiary of the People's Daily, the mouthpiece of China's Communist Party. It was unclear if Dong's arraignment would strain China-U.S. ties, but the spy scandal -- splashed on the front pages of the Global Times tabloid and the official China Daily -- appeared aimed at embarrassing Taiwan. The former Chinese reporter was arrested last September shortly after entering China on a business trip and was being held in the southern city of Guangzhou, the China Daily said. Dong, who became an American citizen in 1995, was recruited by Taiwan military intelligence official Peter Wang in 1990 and received a monthly salary of $3,000 for stealing state secrets, the newspapers said. The Global Times said Dong's work not only undermined China's national security, but also broke a Taiwan pledge in 1984 not to carry out espionage activities in the United States. Beijing and Taipei have been spying on each other since their split in 1949. Beijing considers the island a wayward province that must be returned to the fold, by force if necessary. Tension has been simmering since the re-election of Taiwan President Chen Shui-bian in March. China is convinced he will push for formal independence during his second four-year term and China's 2.5 million-strong People's Liberation Army is readying for a possible showdown. A spokesman for the U.S. Embassy in Beijing said consular officials had been in contact with Dong and last met him in June. SERVE TIME Dong's case was different from that of Chinese-born U.S. citizens and permanent residents who were expelled after China convicted them of spying for Taiwan, the newspaper said. "It is very likely that he will serve time on the mainland," the Chinese-language paper said of Dong. Taiwan gave Dong a house in New York valued at $268,000 and a monthly expense account of $7,000, the papers said. He stole state secrets, including private speeches by China's top leaders, information about political and economic conditions and Beijing's policies toward Taiwan and the United States, the Times said. Dong had also helped Taiwan lobby U.S. politicians and confessed to showering U.S. government officials with gifts, including paintings, porcelain and expensive orchids, the Times said. The newspaper said he had also recruited Chinese students by granting them scholarships, drawing money from a $1 million fund set up by Taiwan intelligence. Dong left China to study in the United States in 1986. China has accused several Chinese-born academics who are either U.S. citizens or permanent residents of spying for Taiwan in recent years. In May, a Chinese court handed Boston-based scholar Yang Jianli a five-year prison sentence for entering China illegally and spying for Taiwan, a conviction that has been condemned by the U.S. Congress and international human rights groups. Last December, China announced it had detained 24 Taiwanese and 19 mainlanders for espionage, and that all had confessed. Copyright 2004 Reuters News Service. All rights reserved. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9213 From: contranl Date: Wed Jul 28, 2004 1:07pm Subject: Re: ID of mystery dish.. . Since the used frequency behaves just like light ,it may be interesting to establish the position of the other end of the link wich might either be the receiving or transmitting end. In that case you would have to follow the imaginairy line from the center of the dish to a point somewhere along this line. Chances are that you can see the other end by positioning yourself behind the dish ,you may even use a telescope Obviously the other end has to be at more or less the same height...probably the roof of another building some where along that line. Since this antenna installation looks fairly "temporarely" you should look for a similar "temporarely" dish at the other end. Allthough it might be a fixed microwave tower as well. On a detailled map of the area you could draw that line and see where it crosses buildings of similar heights...one of these buildings should have the other ends antenna..this antenna might be connected to a temporarely set up (news van / security container) Things get a little unusual when there is no other dish visible and the dish on your picture would be pointed at a window or wall of a surrounding building...it might be that another building is used as a reflector if they need to go around a corner... i do'nt expect that to be usual practice since that would need a lot of experimentation..but it's not impossible...in that case you could follow the reflected line Discovering the rf-frequency of this link may need some kind of receiver with a range to at least 15 ghz ...allthough knowing the frequency will not point you to many clues of what this antenna is used for...since frequency-list above 1 ghz are hard to find and usually give very unprecise information..and since this one looks temporarely,they wo'nt be of much help either..ofcourse if you have such a receiver you might be able to identify the signal (provided that this is the transmitting end and not the receiver)allthough many times even video-signals are digitised so you still won't know what the contents is) Also you can't determine the frequency by looking at the size of the dish...a dish at 10 ghz does not necessarely have a smaller size then one at lets say 5 ghz...the size of the dish could only give you some clues on the gain (a bigger dish would give more gain then a smaller one at the same frequency) what really determines the frequency is the size of the radiator wich is in this case at the tip of the rod in the center...usually the radiator is inside a plastic housing...so you can't see it. In pratice however you could say that a smaller dish points to a higher frequency...from what i have seen i estimate this one to be anywhere between 8 and 15 Ghz (do'nt compare this with dishes used for satellite receivers they usually neede more gain then terrestrial antennas) Also i notice that the transmitter or receiver is directly mounted on the dish (under the blue plastic bag)wich is standard pratice at these frequencies. So a physical look around would be the best...maybe it's easier to do some "social enginering" and simply ask some people in the building about it. If you have acess to the roof you may be able to see some numbers or ID's written on the antenna...they may point you to something. By far the qiuckest results you would get by simply turning the antenna the other way...and wait for someone to come to the roof They might then realize that someone has messed with there stuff so a better trick would be to make it look like the wind is to blame by covering the radiator with a wet newspaper or something else with screening properties. It all depends on if you are just curious about it ...or is your question part of a countersurveillance investigation ? Tetrascanner www.tetrascanner.com . 9214 From: kondrak Date: Wed Jul 28, 2004 3:21pm Subject: Re: Re: ID of mystery dish.. From the pix, it kind of looked like it was shooting down between the buildings afar...but the picture would of been more instructive in this respect if it had been parallel to the bore-sight of the horn. At 14:07 7/28/2004, you wrote: >. > >Since the used frequency behaves just like light ,it may be >interesting to establish the position of the other end of the link >wich might either be the receiving or transmitting end. 9215 From: Steve Fulton Date: Wed Jul 28, 2004 1:23pm Subject: Re: Re: ID of mystery dish.. First, thanks to everyone who replied, the info provided cleared a lot of mystery up. It wasn't obvious from the photos, but the dish is actually pointing to a group of similiar dishes a few hundred feet away. Later on, there were video cameras installed near the roof where the dish is located and connected to it. I'm in Toronto, Canada, and there is a festival this week called Caribana, which takes place on the streets below -- so it's purpose is probably feeding surveillence of the streets below to the authorities. Thanks again! -- Stephen Fulton. 9216 From: Date: Wed Jul 28, 2004 4:25pm Subject: RE: Status of the List Jim I don't post much, but I appreciate your efforts and the positive influence the list has on the profession. Hope to see you at the ERI conference. "Noli Illigitimum Carbarundum" Rough translation "Don't let the bastards get you down"! Ed Steinmetz -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Wednesday, July 28, 2004 7:04 AM To: TSCM-L Subject: [TSCM-L] Status of the List I would like to thank the list membership for the support and encouragement that I received after Yahoo took the list own last week. In the last week the list membership has increase to 1130+ Members, with 52 new members in the past week alone, which is a significant jump in membership. In the past 10 days, only 4 members were dropped from the list, a number which is well within the normal day-to-day parameters of a list of this size (the rumors of any kind of a mass exodus is fantasy). I would like to encourage the list membership to take an active role in the list, and not to just sit back and lurk. Please feel free to post occasionally, and to let us know your comments on subject matters. I would also like to apologize from some of the disruptive troublemakers on the list as several of them were working together to try to destroy the list, where having Napoleonic temper tantrums, and were attacking members whenever they could (they will not be a problem anymore). Welcome to the TSCM-L Mailing List, and thank you for being a member. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9217 From: James M. Atkinson Date: Wed Jul 28, 2004 7:38pm Subject: Hollywood Man Charged With Spying On Teen http://www.nbc6.net/news/3588723/detail.html Hollywood Man Charged With Spying On Teen Suspect Allegedly Secretly Videotaped 15-Year-Old Girl POSTED: 5:09 pm EDT July 28, 2004 HOLLYWOOD, Fla. -- A Hollywood man is in jail after being arrested for allegedly spying on his girlfriend's 15-year-old daughter by planting a tiny video camera in her room. Anthony Ces Swanson, 40, is charged with one count of voyeurism and four counts of possessing photos of sexual conduct by a child. Swanson lived with his girlfriend and her daughter when the teen girl discovered a pinhole video camera concealed in a box on a bookshelf in her bedroom. The girl told her biological father, who called the police. Swanson's girlfriend and her daughter told police Swanson is a computer technician who specializes in desktop support and networking. Swanson later talked to police and consented to having the computer removed from his home and taken to Hollywood police headquarters. Police found images of the 15 year-old alleged victim getting undressed, as well as a video clip and collection of child pornography pictures and Web sites. Swanson was then arrested. He is currently in Broward County Jail. Officials say there may be other victims and ask anyone with information about Swanson or the investigation to contact the Hollywood Police Department's child exploitation unit at (954) 967-4411. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9218 From: contranl Date: Wed Jul 28, 2004 8:00pm Subject: Re: No parabolic.....Phased Array Microphones ! ("SPOTMIC") . >This approach has been tested and thrown away probably before >Tetrascanner was born I do'nt think so .....Tetrascanner was born 50 years ago ! wich also means "not born yesterday" :) :) >It doesn¥t work. The reason is as simple as that: >acoustical signal is too broadband for being efectively picked up by >a phased array. I don't agree how do you think we humans pick up sounds (very effectively) ? ...right!...with 2 ears...developed by mother nature...your brains use the same phased array technique...by effectively phasing out unwanted signals from unwanted directions (time of arrival)...it uses a sophisticated computer and a software-program that was developed in a few million years...it uses only 2 mic's to do that (your ears) My ears have a bandwidth from 1 Hz to at least 18 khz. >or in terms of wavelength 1m down to 10cm. Not correct the wavelength of audible audio(1~20 khz) is in the kilometers/miles range 1 mtr wavelength is at 300 MHZ 10 cm wavelength is at 3000 Mhz >To yield a reasonable gain the spacing between elements in the >array >must be approximately >0.5 lambda, that is 5cm for 3000 Hz and 50 cm for 300 Hz. not correct see above wavelength/frequency comment Obviously there must be a minimal distance between the microphones but they are not very related to the wavelength ...in this case the gain is not obtained by ADDING ...2 PERFECT in-phase signals but by DISTRACTING any out-of-phase signals. As long as you are able to "hear" if a signal is out of phase than that would be enough...i think it is not neccesary that they have to be a full or 1/4 out of phase... Out of phase is out of phase even a little bit out of phase is out of phase...and as such identifyable as not coming from the same direction as the main sound of interest. If i said in previous posting "similar to stacking antennas" then i ment similar but not the same...it was just an example to explain phasing...the microphone phasing stuff is a little different...sorry if i put you on the wrong track there So the minimal distance between the microphones has to be a distance wich will allow a measurement that can distinguish a small difference in phase...it is not neccessary that such a phase difference is a full ,1/2,1/4 or even 1/1000 of a wavelength , a fast DSP could do even smaller differences. The main difference is that when stacking radio-antennas you more or less simply combine them and feed them to a receiver that's all... with phased array microphones you have a DSP processor inbetween therefore you don't need big phase differences or microphone distances. Have you ever tried this: go to a room with 20 people all talking loud..then notice when you concentrate on 1 person...you will be able to enhance his speech !...how do you do that ? not be adding extra ears but by throwing away the unwanted sounds. You do'nt even notice that since that process is so often used that it has become one of the automated processes in your brain ...just like breathing. and once again my head is not the size of a football- field :) :) Also how do you think you are able to know from wich side a certain sound is coming ? you could call that "stereo/spatial impression" wich is basically: your brain calculates a direction by comparing the time of arrival and translates that into an angle of arrival.. resuming: your brain can determine the direction of a sound your brain can effectively throw away sounds it does not want to hear it does that with only 2 microphones wich are spaced only 30 cm's apart ! Imagine what you could do if you had 96 ears :) :) A piece of equipment with some DSP processing could easely do the same and determine SLIGHTLY out of phase signals and simply throw them away. >The effect of frequency selectivity >affects also latter type of directive microphones though. not shure what you mean by that but: modern microphones can be manufactered to have a perfect response to human audio /speech or any frequency range wanted. >A lot of taxpayers¥ money on both sides of iron curtain were >spent on that kind >of research during the cold war. The return on that investment was >zero. I can't confirm that...the fact that it's not in the newspapers does'nt mean anything. most stuff you and i know about as "new" was invented years ago...God knows what scary stuff is hidden in many secret laboratories....would you believe me when i say that it is now possible to have a less then 1 Milliwatt bug that will do 5 KM's range ? (Ultra Wide Band / UWB) Look at some links i have put below here...i found back the link i was looking for,the company that produces such phased array mic device calls it a "SPOTMIC" Their website is here: http://www.dacaudio.com I have to say they certainly don't make a CCS or SPYSHOP impression and they are represented by other serious companies as well. on top of that i have seen it on their website 4 years ago...if it would'nt work they would have removed it. Look at the specs wich show that the "Spotmic" can be steered in all directions (3D) wich are up/down/left/right and distance !...you can even focus it at a certain distance similar to a binocular ! Sad enough the "mics-panel-on-the-surveillance-van-picture" is gone but you can imagine how that looked if you see the similair painting on the wall mic (notice that the mics are covered with a textile structure wich obviously is "open" enough to not cause any damping of importance) The same company does the correlator-box (if i remember well) wich could be used in addition ...like this: you connect an additional mic (wireless) to the correlator...this mike you point at a strong and unwanted sound near the wanted sound...the correlator then distracts this from your main sound thus leaving you with more wanted sound...i wasn't able to find that box on their website. So what can i say other then... "Phased array microphones exist and they work !" Let me know what you think ! Here's some links: http://www.dacaudio.com/products/spotmic.html (produces a "spotmic") http://www.dacaudio.com/downloads/newsletters/July2000News.pdf (more on "spotmic" showing an array of 96 ! microphones) http://www.dacaudio.com/downloads/manuals/SpotMic%20Manual.pdf (spotmic short manual) http://www.selectronic.de/DAC/Produkte/Pdfs/sam_spotmic.pdf (shows 96 microphone array hidden inside a wall painting !) http://www.digrec.com/financial/DRI_Annual.pdf (shows 96 microphone array hidden inside a wall painting !) http://www.danschreck.com/microphone.pdf how it works /mathematics http://techreports.larc.nasa.gov/ltrs/PDF/1998/aiaa/NASA-aiaa-98- 0471.pdf technical/ and heavvy mathematics http://www.alango.com/sound/WhitePapers/ADM/AES114_ADM202.pdf http://www.andreaelectronics.com/pdf_files/DSDA_spec.pdf http://mediafilter.org/CAQ/CAQ56brother2.html ("The FBI has already developed a solid-state briefcase-size electronically steerable microphone array prototype, that can discreetly monitor conversations across open areas"). By the way i have a good idea ! when we discuss some "difficult" or "exiting" equipment here why not invite their manufacturers to comment on it...here ! on the list ! ... something like that respons from REI on the NLJ frequencies...that was good. i really missed a respons from the manufacturer of that "Spyfinder" (optical camera detector) i am shure most of us still do'nt know if it's good or not. On the other hand many will not respond...for obvious or economical reasons. pffffff...why do i like this stuff...it took me 7 hours of a nice sunny day to get it all together :) :) Can somebody offer me a paid job to do these kind of things...somewhere close to a tropical beach please ? Greetings Tetrascanner www.tetrascanner.com . 9219 From: Mitch D Date: Wed Jul 28, 2004 8:08pm Subject: microwave dish ID Use better judgement before proceeding with this thought: simple solution to find out the "score" on the dish,if all else fails,with all other suggestions considered, pan it about 45 degrees from its original position,wait for the owner or techie to come upstairs to the roof and tell him about the "kids you just chased away",Tell him how they knocked the dish over,and how you saved it from uncertain juvenile related"death".I'm sure he'll comment on what it was for.....gratefully,and proudly,,,,,, __________________________________ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail 9220 From: Mitch D Date: Wed Jul 28, 2004 8:11pm Subject: Remote telephone sweeping scam Found this today,interesting process,must work great w a "bug zapper",they also claim cell triangulation for a fee........ http://www.tracerservices.com/bugged.htm __________________________________ Do you Yahoo!? Yahoo! Mail is new and improved - Check it out! http://promotions.yahoo.com/new_mail 9221 From: contranl Date: Wed Jul 28, 2004 9:24pm Subject: Re: No parabolic.....Phased Array Microphones ! ("SPOTMIC") . Now i think about it ....is'nt that wonderfull how nature itself developes such a "phased array microphone" all by itself...just by growing it in a few million years ? Tetrascanner www.tetrascanner.com . 9222 From: Steve Uhrig Date: Wed Jul 28, 2004 9:35pm Subject: Re: Phased Array Microphones On 29 Jul 2004 at 2:24, contranl , who eschews obfuscation, wrote: > Now i think about it ....is'nt that wonderfull how nature itself > developes such a "phased array microphone" all by itself...just by > growing it in a few million years ? Or by the simple wish of God on the 6th day of this planet's existence, for those of us who believe such. Yes, God did a great job in ergonomics and biological engineering. The more one studies nature and science, the more one appreciates the *perfect* job God did with things ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9223 From: contranl Date: Wed Jul 28, 2004 10:14pm Subject: Re: Phased Array Microphones . One of these days they will find out that also Spreadspectrum already exists in Nature...that would clear up some issues Tetrascanner 9224 From: kondrak Date: Wed Jul 28, 2004 10:15pm Subject: Re: microwave dish ID Ah yes, we call that "social engineering".. At 21:08 7/28/2004, you wrote: >Use better judgement before proceeding with this thought: > >simple solution to find out the "score" on the dish,if all else >fails,with all other suggestions considered, pan it about 45 >degrees from its original position,wait for the owner or techie >to come upstairs to the roof and tell him about the "kids you >just chased away",Tell him how they knocked the dish over,and >how you saved it from uncertain juvenile related"death".I'm sure >he'll comment on what it was for.....gratefully,and >proudly,,,,,, > > > > >__________________________________ >Do you Yahoo!? >Yahoo! Mail - 50x more storage than other providers! >http://promotions.yahoo.com/new_mail > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9225 From: Steve Whitehead Date: Thu Jul 29, 2004 0:47am Subject: Fw: WWW Form Submission List Members Is there a list member or manufacturer of secure phones in the area of the lady that can assist. Regards TSCM Services South Africa www.tscm.co.za ----- Original Message ----- From: To: Sent: Thursday, July 29, 2004 12:05 AM Subject: WWW Form Submission > Below is the result of your feedback form. It was submitted by > (absolutecc@a...) on Thursday, July 29, 2004 at 00:05:20 > -------------------------------------------------------------------------- - > > comments: I need equipment that can detect monitoring devices, whether by illegal bugging, phone monitoring, or outside listening devices. I need something that can also pick up those involved if possible, without major legal consequences. I am short on time to decipher for myself which would be best for me, but a secure telephone is a must at this time. Prices etc, and asap delivery and ease of use would be plus's! Thank You--Melissa > Please contact me immediatley because I already know that I am one step behind and it can't be made two. > > category: website > > name: Melissa Pohl > > company: Absolute > > Address: 328 Keller Ave N > Amery, WI 54001 > > tel_number: 715-268-5702 > > -------------------------------------------------------------------------- - > > > 9226 From: Michael Puchol Date: Thu Jul 29, 2004 3:34am Subject: Re: Cordless Swap Hi Roger, This is funny - I actually saw a DECT phone with the guts of an analogue 31 MHz (approved band over here), sold by none other than a spyware shop!. It was supposedly so that you could replace your bosse's or spouse's legit phone with this one, and listen to everything they spoke about. How someone wouldn't notice the switch (for starters, the LCD wasn't working properly) escapes my imagination, the only reason I can think of is that they had it there to impress people into buying their usual crap (FM-band mics, etc.). Best regards, Mike ----- Original Message ----- From: "Hawkspirit" To: Sent: Tuesday, July 27, 2004 12:09 AM Subject: [TSCM-L] Cordless Swap > > > I just finished a sweep where I tested the client's cordless phone which > was an AT&T. The base said right on the label it was 2.4GHZ but when I > tested the phone it was operating at 916MHZ with simple analogue modulation > that was easily demodulated by a scanner. Apparently someone switched the > guts of the unit so they could have easy listening. This is the first time I > have seen a cordless phone electronics swap. > > Roger Tolces > > www.bugsweeps.com > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9227 From: James M. Atkinson Date: Thu Jul 29, 2004 8:47am Subject: Re: Cordless Swap Mike, It sounds like a typical Spy Shop tactic. One of the more common ones in the U.S. is for them to take a wireless microphone they buy at Radio Shack, and transplant the innards into a clock radio, coffee maker, or such, and then pawn it off at 400-500 times the cost of materials. -jma At 04:34 AM 7/29/2004, Michael Puchol wrote: >Hi Roger, > >This is funny - I actually saw a DECT phone with the guts of an analogue 31 >MHz (approved band over here), sold by none other than a spyware shop!. It >was supposedly so that you could replace your bosse's or spouse's legit >phone with this one, and listen to everything they spoke about. How someone >wouldn't notice the switch (for starters, the LCD wasn't working properly) >escapes my imagination, the only reason I can think of is that they had it >there to impress people into buying their usual crap (FM-band mics, etc.). > >Best regards, > >Mike ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- From: James M. Atkinson, Comm-Eng Date: Fri Jul 28, 2000 2:00pm Subject: Re: ELF/VLF Transmission Systems My favorite ELF related project was the ELF-ONE antenna that I help design and install in the Middle East back in the early '80s. The antenna length was mind boggling, and the engineering crew spent several hours a day hopping around in the back of a helicopter with no markings. At night you could actually sit in the base camp and watch the "blue flame walk the mesh" until it vanished towards the horizons into the night in opposite directions... really awesome. When performing TSCM sweeps I generally check out anything above 100 Hz, but give special attention to anything above 3 kHz. The Lumanaries and video signals from computer monitors create the biggest headaches and often present false alarms.. -jma At 2:26 PM +0000 7/28/00, Marty Kaiser wrote: >Ah, those ELF memories. In late fifty's and early sixty's I had a 1 >megawatt 6 to 7 HERTZ >submarine communication system humming away. The dipole antenna, located in >South Carolina, looked like a power transmission line. >There is a lot of stuff (not of much interest to countermeasure people) >going on way down there.... not to mention it is close to the resonant >frequency of the human body! > >Cordially, Marty > >----- Original Message ----- >From: James M. Atkinson, Comm-Eng >To: TSCM-L Mailing List >Sent: Thursday, July 27, 2000 3:58 PM >Subject: [TSCM-L] ELF/VLF Transmission Systems > > >For those list TSCM-L members who don't see the value of >performing TSCM ELF/VLF inspections below 100 kHz. > >Remember... anything that appears on the conductors is of >significant interest to us. > >-jma > >----------------------------- > > >Designing the Giant Antennas > >Synopsis of a presentation by Boynton Hagaman >At the April 2000 AMRAD Meeting > >Thanks to AMRAD for granting permission to post this document. > >The career of Boynton Hagaman, AA4QY, spans many years and has had >many interesting turns. He is an engineer, designer and builder of >some >remarkable antennas. These include the Trideco antenna used by NSS, >Annapolis, Maryland, the antennas used by NAA, Culter, Maine and many >others. >His talk encompassed a period of three decades, spanning the time >period from the end of the 1950s through the Cold War and until >today. This is a story of >the giant antennas unique in their own right, and rare. There are a >decreasing number of opportunities to see giant antennas. >International broadcast stations >used them, for example, the Voice of America transmitting stations. >HF antennas are conventional in many ways because they operate at >reasonable >wavelengths. Not so conventional are the giants used to send signals >at just a few kilohertz in the very low frequency band that ranges >from 3 to 30 >kilohertz. Wavelengths here are measured in the thousands of meters, >making it difficult to design an efficient antenna. These antennas >are extremely sharp >and their bandwidth at resonance is very narrow. It is so narrow, in >fact, that one experimenter actually used this sharpness as an SSB >filter to eliminate an >unwanted sideband from a double-sideband AM signal. > >The antennas we heard about at the AMRAD meeting all operate in the >band between 10 and 30 kilohertz and are used by the US Navy for >one-way >transmission to submerged submarines. > >In the early 1960s, Lester Carr, Hagaman and a few associates formed >a company called DECO, short for Development Engineering Co. At about >the same >time, a partner, Jim Weldon, started Continental Electronics, a >company in Dallas Texas that manufactures high power medium, >short-wave and VLF >transmitters. At that time the Navy wanted to upgrade their VLF >transmitting capability, which included stations located in different >geographical locations to >achieve worldwide coverage. Each station sent continuous coded >traffic using a narrow form of frequency-shift keying of a few Hertz >wide. This allowed >submerged submarines to receive slow speed commands while remaining >submerged. > >Earlier, RCA built a station in this chain at Jim Creek in Washington >state. This was another giant station generating a million watts into >massive antennas >that consisted of multiple cables stretched between adjacent >mountaintops across a large valley. These antennas are known as >valley span antennas. Although >the performance of this station was not as efficient as planned, >primary power was available at low rates and the antenna is still in >use. > >The Navy required a more powerful and more efficient antenna. Hagaman >and his associates felt they knew of such a design and prepared a >proposal. After >proposing what they thought was a unique design they now worried that >the Navy would ask them to actually build one. And they did. > >Anyone who has done practical engineering knows this problem. Most >times, the electrical problems are well understood and it's the >practical engineering >problems that occupy most of the time. This project was no different. >The antenna design for NAA was called the Trideco and the chosen site >was at Cutler, >Maine. The antenna was required to have an efficiency of at least >50%, which, at that time, had never been achieved. > >A German antenna was erected during the Second World War called >Goliath. It was quite efficient but was limited both in power and >efficiency by the >wartime lack of copper and other suitable materials. It was used for >submarine communications. After the war, the then Soviet Union seized >the Goliath >antenna, packed up its massive cables and towers, and assembled it >inside the Soviet Union near Gorky. (I'm not sure where we learned >about the design of >the Goliath. I wonder if it was from captured German plans?) > >NAA is located on a peninsula at Cutler, Maine. A diagram of this >station shows two giant sub-antennas, each as large as several >football fields and requiring >twenty six 800-to-900 foot towers fed by two large transmitters. The >antenna is split into a North and a South array. Each array is fed >from a separate helix >building and a transmitter building housing two transmitters is also >located midway between the arrays. The transmitters can each supply >one megawatt. >Each antenna array resembles a six-sided compass rosette. The antenna >feed point is located at the center of the rosette where the special >building called the >helix house is located. > >Looking over a schematic of the helix house equipment you see what >looks like a simple matching network consisting of a few coils called >variometers and >something called a reactor. A variometer consists of two coils, a >stator and a rotor. The rotor is located inside of the stator and is >connected in series with the >stator. When the rotor is rotated the mutual coupling either aids or >reduces the effective inductance of the variometer. Since the >antennas are operated below >their natural resonance their impedance is capacitive and must be >tuned by a series variometer. However, when looking at the equipment >inside the helix >house you see nothing familiar. In reality, this is a link-coupled >antenna matching circuit, but that is where the similarity to >familiar low powered equipment >stops. The helix house is jammed full of giant coils and openly wound >transformers, most larger than a large truck. The inductor wires are >about 4 inches in >diameter consisting of multiple strands of Litz wire. The antenna >itself is tuned with a series variometer while a shunt variometer >couples the signal into the >antenna tuner from a coaxial feed line leading from the transmitter >through a long underground tunnel. > >A part of this matching network called a "saturable reactor >transformer" or a "stretchable" reactor is used to slightly change >the tuning of the antenna. Direct >current from the modulator is fed into a separate winding on the >reactor transformer's core and saturates the transformer magnetic >core slightly in response to >the requirements of the frequency-shift signal. This causes a slight >variation in the transformer's inductance thereby slightly shifting >the point of resonance to >keep the antenna in tune. Otherwise the frequency shift may cause the >antenna band-pass to be out of tune. This change accommodates the >antenna frequency >shift even though the shift may be only a few Hertz away. > >For example, NAA is known to have a very narrow bandwidth, depending >on the operating frequency. The reactor increases the antenna >bandwidth by >slightly shifting the center frequency back and forth, along with the >keystream. The reactor transformer is designed to allow up to >thirty-five words per >minute FSK keying, which is well above the rate that this system >usually operates. In other designs, a resistor, called a bandwidth >resistor, is used to reduce >the antenna Q instead of a stretchable reactor transformer. > >The last stage of the matching network is the helix that is simply a >multi-turn link-coupling transformer. Like all the other components, >it too is massive. A >picture of the helix house interior shows the helix coil standing two >stories in height and with the same diameter. A technician standing >atop it is dwarfed by >its size. > >The selection of the metal alloy from which to strand the antenna >wires was critical. At Cutler the wires (over one inch in diameter) >were stranded of Calsum >Bronze. This material has a higher resistance than copper and is very >strong. The higher resistance was necessary so that the antenna >conductors could be >heated during icing weather conditions. It requires a megawatt of 60 >Hz power to de-ice either antenna array. > >Aluminum is relatively cheap and lightweight however it does not have >the tensile strength required in long spans. Stranded Calsum Bronze >cable is capable >of providing low resistance to RF current due to the skin effect at >radio frequencies yet has an appreciable resistance at 60 Hertz. > >Sending current into the strand causes it to heat up and this heat is >used to melt off antenna ice accumulations during the winter. The >power required to melt >the ice is supplied by a large Diesel generating plant located on the >NAA property. At NAA during the winter months, one of the arrays is >sometimes shut >down to melt ice accumulations while the other continues to operate. > >After installation of the antenna, engineers encountered something >unexpected called Aeolian vibration. This was an effect known to >builders of high voltage >electric transmission lines. The Aeolian vibrations result from an >interaction of the wind with the suspended cables. It starts being >noticeable when a steady >side wind reaches about five miles an hour and continuous for an >extended period of time. Aeolian vibration caused unexplained >breakage of some wires in >the cable strand and stress on the antenna. Attaching "Stockbridge >dampers" on the conductor strands at strategic locations can prevent >it. These dampers >absorb the vibration energy and dissipate it in the form of heat. >Aeolian vibration may also be controlled to some extent by the very >heavy insulators >weighing up to 800 pounds each, that are used in the cables and tower guys. > >Static electricity is also a problem in the large antennas. The >accumulation of worldwide lightning storms, rain static and other >similar weather phenomena >result in the generation of a large potential difference between the >ionosphere and the earth. Electrical charge is constantly leaking >down to the earth and is not >ordinarily detectable without special equipment. However, the charge >accumulates around highly conductive structures such as tall towers >thereby generating >dangerous voltages at their top. A recorder placed at the top of the >1200-foot NSS tower at Annapolis recorded a three to five kV/meter >potential difference in >the atmosphere during an approaching thunderstorm. These high >voltages cause flashover to occur across the insulators that can >disrupt the transmitter and >take the station off the air. Similar voltages have also been >observed during snowstorms. Since flashovers cannot be completely >eliminated, a special device >was designed to deal with it. It uses an ultraviolet or current >sensor to detect when current flow begins at the start of a flashover >and briefly cuts the RF >excitation power to the final amplifier for the duration of the >flashover. This solves the problem in most cases but not under all >conditions. The device is >called the CCO (carrier cut-off) unit and is now used in some form at >all of the Navy's VLF stations. > >As previously mentioned, the antennas for the Navy VLF stations are >giants. They are constructed to have a lot of capacitance on top of >the towers. In fact, >they are nothing so much as a large capacitor with a one plate formed >by the tower- supported wire panels suspended 1500 feet or so in the >air and the other >plate being the earth. A million watts or so are fed into this >circuit and, as you would expect, preventing corona discharge from >the very high voltage is very >important design issue. > >Determining in what part of the antenna structure corona may be a >problem is interesting. A scaled model of the antenna is built and as >much as 50,000 volts >at 60 Hertz is pumped into the antenna. During darkness, and when the >adjustable test voltage is at its highest, the antenna lights up like >a Christmas tree >with hundreds of small individual corona discharges occurring at >critical points on the suspended mesh. Obviously, some coronas are in >the higher voltage >locations and may require the antenna configuration to be modified. >Boynton gave us an interesting picture showing a model antenna under >test, and the >individual coronas were visible. It looked like the model was >decorated with many small Christmas lights that illuminated its >outline against the night sky. >These locations were modified until the corona did not appear. > >The Trideco antenna, used until recently by NSS in Annapolis, is >similar to the antennas used by other VLF stations in that they have >several large >supporting towers between 700 and 1500 feet tall. For example, in >Annapolis several towers were used to suspend the top wire panels; >the tallest being 1200 >feet and its base was insulated from ground. The VLF station at >Lualualei, Hawaii has similar towers (two base-insulated towers 1500 >foot in height) >although the antenna design is quite different. The towers are made >of steel and remind me of those used in a large suspension bridge. >The amazing thing >about these towers is that they rest on a single porcelain insulator. > >This design is something like an amateur vertical monopole using a >Coke bottle for a base insulator. In this case, however, the >insulator holds up an antenna >that weighs several million pounds. All that weight concentrated upon >this one insulator is truly amazing to see and it is a wonder how >such a thing could >hold all that weight. In fact, as we learned, there have been >problems with them. Cracks have been found in base insulators that >required them to be changed >out! How does one hoist up an antenna tower supporting a mile square >of steel cable over 1500 feet in the sky? Well, amazingly, a system >of hydraulic jacks >are available to do just that. Modern towers are fabricated with >"jacking pads" provided on the corners near the tapered lower >section. The antenna tower can >be lifted, the insulator changed and the tower lowered back into >place. Although there are no pictures of the equipment is use, you >can image what it must be >like when you consider that these insulators are nearly two stories tall. > >So far, I've given you a pretty good idea of what Hagaman talked >about, describing his days developing and building these giant >antennas for the Navy's >VLF stations. He told us that his company was located out in >Leesburg, Virginia and that's were they did testing on small-scale >mock-ups of the giant >antennas they built. He said that newer designs use a top-loaded >monopole and this kind of antenna is a good radiator and economical >to build. The now >defunct Ground Wave Emergency Network (GWEN) stations, also designed >by DECO, used this type of antenna thought they operated at LF and >not VLF. >Some Omega navigation stations also use the top-loaded monopole. > >The US and Russian Navies use VLF for ship and submarine >communications and both countries use giant antennas. The firm of >Kershner, Wright & >Hagaman recently designed a VLF antenna for a Southwest Asian >country. It is similar to the Trideco array located in the NW part of >Australia. Several other >nations are planning VLF antennas also. With the end of the Cold War >you might expected no further orders for giant VLF antennas but its >not so. >Additional nations now have submarines that must remain hidden and >require one-way communications too. In that, they are practicing a >Cold War art in >place for the past fifty years. > >AMRAD > > =================================================================== > Everybody's into computers... Who's into yours?Å > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Lizard, The Other White Meat > =================================================================== > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1023 From: James M. Atkinson, Comm-Eng Date: Fri Jul 28, 2000 2:04pm Subject: Re: Re: Excellent book on wiretap detection Attention list: If you send money to Ted Swift for his book, and you feel that you have been defrauded (ie: you get nothing back) I will personally give you your money back, plus give you an additional 10 dollars for your trouble. Ted Swift is legitimate and I will put my money where my mouth is... -jma At 2:44 PM -0400 7/28/00, Ted Swift wrote: >Steve: > >Thanks for your kind words. You got it pegged just about right. I'm not >exactly trying to "push" this book on people and Bill got the information >about it from you and Jim Atkinson whose credentials are beyond challenge >as anyone seriously connected with TSCM ought to know. > >He contacted me from a Hotmail account and wanted my telephone number and >address, both of which are at my home. He expressed concerns about P.O. >boxes and fraud. I didn't share with him my thoughts about Hotmail. I gave >him my number. The phone rang a few minutes later. Don't know who it was as >it came up "unavailable" on my Caller ID. I NEVER answer calls from >"unavailable" numbers. That's why I have an answering machine to do the >screening. The caller didn't leave a message. If it had been Bill, I would >have picked up the line. Guess I'll never know. > >Anyway, thanks again for your support. > > >Ted Swift > > > > >At 02:17 PM 7/28/2000 -0400, you wrote: > >Once upon a midnight dreary, DMI pondered, weak and weary: > > > >> Is it just me, or should there be a phone number (not just a > >> fax) and an address (other than a P.O. Box) for contact > >> info? I assume I am not the only Investigator that would > >> not order a product from a business or person without this > >> information? > > > >Ted operates a busy PI and consulting firm. Publishing the > >books is a side effort. > > > >I can tell you from long experience, you waste a lot of > >time letting your number out to the public. People who need > >him know how to get hold of him. > > > >And what PI wants to publish a physical address? That > >invites lunatics to drop in and waste your time, and > >thieves to keep an eye on your place thinking you have > >weapons and expensive equipment. Granted, a P.O. box does > >not inspire confidence, but mail can be received there and > >you weren't going to try to pick the thing up in person, > >were you? > > > >Ted is an honest man. You can order with confidence, or > >drop him an email and judge for yourself by the dialog with > >him. > > > >Ted is not the only place to buy the book, but he is the > >original source, and if you get it from him you can ask for > >it to be autographed. > > > >I understand the reluctance, and you are proper to exercise > >due diligence, especially in this field where frauds > >outnumber the real thing by a substantial margin. Asking > >here and receiving an endorsement hopefully will be > >adequate for you. > > > >Steve =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1024 From: Charles Patterson Date: Fri Jul 28, 2000 11:57am Subject: Re: Telephone Problem Hi Rob, Outside of the intentional eavesdropping possibilities, here are a couple of thoughts. Of course, limited to speculation since details aren't known. Some people use a cellphone which needs to have a button pushed to end the call (or if they have flip cover, it can be turned off). If someone fails to hang up their cell phone properly or if they dial accidentally, the call could go through without their knowledge. Picture this: pressing "talk" on my phone redials the last number dialed. If the last number dialed was my office and I bump that button, it will place the call to my office. Since I'm not there, my voicemail will answer and begin taking a message. The message will be whatever audio is in range of my cell phone mic, until the vm timer runs out. I've seen this happen as a Security director was meeting with Sec Svc planning for Prez Clintons arrival. An assistant came up to another person present and said " I just heard your entire conversation on my voicemail". They had called, left a message and failed to hang up the cell phone properly. I was surprised that no one present grasped what had just happened. Other ideas: some phone systems now have a record-call capability. Press a button on the phone and the ongoing conversation is recorded into the voicemail box for later review, or transfer. (Panasonic KXTD series is one such small-business system with this feature) Less likely is one similar to the cell phone problem where a speaker phone or phone with a headset could have been dialed accidentally (on purpose?) and left a message of room audio. This is less likely to happen accidentaly since a speaker phone would usually be audible... phones with headsets often have the speaker function turned off to allow the headset to work automatically. Hope this is some food for thought. Charles Charles Patterson Global Communications Tarrytown, NY charles@t... http://www.telephonesecurity.com ----- Original Message ----- From: "Rob Muessel" To: Sent: Friday, July 28, 2000 12:33 PM Subject: [TSCM-L] Telephone Problem > > Here is a problem I encountered in recently and have yet to come up with > an acceptable explanation as to what happened and how. Any ideas? > > The situation: > > Two people are sitting in an office. Person A is the occupant of the > office. Telephone service is ISDN Centrex. He is meeting with Person B, > a consultant from another city. Together they are working on the > acquisition of another company. > > At approximately 11:30 AM they place a call to the cell phone of person > C, the president of the company they are trying to acquire. The cell > phone is apparently turned off or is in a no service area and the caller > hears the recorded message that the person they are calling is not > available. The phone is hung up. There is no voice mailbox for the > cell phone. > > Persons A and B then discuss certain aspects of the deal. > > At approximately 2 PM person B calls his office in the other city to > check voice mail. He hears a very intriguing message: approximately 3 > minutes of the conversation that took place in person A's office after > the attempt to reach person C. The time stamp on the voice mail was > 1:20 PM. > > We examined toll records and found that the call to the cell phone was > of short duration, less than 30 seconds. We also found that there were > no calls made to person B's office from any of phones in person A's > company. > > > A second incident involved a conversation person A had with a > receptionist at one of his company's offices in another city while he > was traveling. This conversation appeared on the voicemail of another > employee in person A's office five days after the conversation took > place. > > Any thoughts?? > > > -- > Rob Muessel, Director email: rmuessel@t... > TSCM Technical Services Phone: 203-354-9040 > 11 Bayberry Lane Fax: 203-354-9041 > Norwalk, CT 06851 > USA > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1025 From: James M. Atkinson, Comm-Eng Date: Fri Jul 28, 2000 2:29pm Subject: Re: Telephone Problem Rob, It is tough to say what happened with out examining the hardware involved, but that me suggest the following. When the cell phone call did not initially go though they hung up but the line did not fully disconnect (the line was still siezed). After a few seconds the cellular call directed into the person being called voicemail box (which is common). The voicemail box was a land line diversion, and not an "over the air" billable call. The cell phone call would have only been a few seconds as the call was either rejected or diverted (I can divert all calls that I am not expecting into voicemail so I can keep my phone available for an expected call). When the call went into voicemail the system simply recorded 180 seconds of audio until the mailbox was full and disconnected the call (unsiezed the line). The person who owns the cell phone then checked his voice mail and found the "interesting materials", called persons B voice mail and played the audio back to "flip him off" at 1:20 PM. If you check the voicemail records (not the cell records) of person C you will find that a three minute message was left at 11:30, that the message was retrieved shortly after that. If you then check the voicemail records of person B you will find a call from the outside when the message was off loaded. The second incident would cause me to suspect that the first incident was not a accident, and I would immediately launch a TSCM inspection of all of the hardware. Er... pray are any of the subjects in possession of any PCS or GSM telephones (TDMA, CDMA, FDMA), and where any of the phones turned on during the compromised call (but not on the air)? The reason I ask this is that several PCS/GSM phones can be remotely activated and commanded into a record and store mode (with limited capacity) or an open microphone mode (ie: the Nextel and Omnipoint units). Also, since some of these units are "always on the air", and they tend to run hot they can interfere with many telephones. I have personally confirmed (and demonstrated) problems with Merlin systems, Northern Telcom, and with (gasp) AT&T/Lucent STU-III's and secure fax machines. I feel that it is critical to NEVER bring any kind of RF device into an office where private, confidential or classified information is discussed... ever... Just my humble opinion... of course your milage may vary, -jma At 12:33 PM -0400 7/28/00, Rob Muessel wrote: >Here is a problem I encountered in recently and have yet to come up with >an acceptable explanation as to what happened and how. Any ideas? > >The situation: > >Two people are sitting in an office. Person A is the occupant of the >office. Telephone service is ISDN Centrex. He is meeting with Person B, >a consultant from another city. Together they are working on the >acquisition of another company. > >At approximately 11:30 AM they place a call to the cell phone of person >C, the president of the company they are trying to acquire. The cell >phone is apparently turned off or is in a no service area and the caller >hears the recorded message that the person they are calling is not >available. The phone is hung up. There is no voice mailbox for the >cell phone. > >Persons A and B then discuss certain aspects of the deal. > >At approximately 2 PM person B calls his office in the other city to >check voice mail. He hears a very intriguing message: approximately 3 >minutes of the conversation that took place in person Aís office after >the attempt to reach person C. The time stamp on the voice mail was >1:20 PM. > >We examined toll records and found that the call to the cell phone was >of short duration, less than 30 seconds. We also found that there were >no calls made to person Bís office from any of phones in person Aís >company. > > >A second incident involved a conversation person A had with a >receptionist at one of his companyís offices in another city while he >was traveling. This conversation appeared on the voicemail of another >employee in person Aís office five days after the conversation took >place. > >Any thoughts?? > > >-- >Rob Muessel, Director email: rmuessel@t... >TSCM Technical Services Phone: 203-354-9040 >11 Bayberry Lane Fax: 203-354-9041 >Norwalk, CT 06851 >USA > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1026 From: James M. Atkinson, Comm-Eng Date: Fri Jul 28, 2000 3:09pm Subject: Re: Telephone Problem Good afternoon, A major financial institution in New York had just completed negotiations of a major project that involved hundreds of millions of dollars, and over 400 people being assigned to the project. After a very tense session of negotiation on the final points of the agreement via a speaker phone in a "executive conference room" the first party goes on hook (hangs up). The senior people in the room then proceed to talk about how the company their are soliciting "are run by a bunch of dumb asses and worthless bastards", they then proceed to discuss how they intend to rape, pillage, and break up the business they are about to buy (and how they just got away with lying to the company they are about to buy). Several hours later the President of the "company who is about to be raped" calls the President of the company that was trying to buy him and plays back the conversation. The entire deal is called off (using very colorful language), over 400 people loose their jobs over the next year, red ink flows for 3 years, and an entire division is shutdown in a major publicly traded company. The company with the Speakerphone claims that they were bugged, but it turns out to be a simple case of a defective Speakerphone. -jma At 11:53 AM -0700 7/28/00, Gordon Mitchell wrote: >No solid answers but I have had some opportunities to observe >situations which mimic these. > >1. Lawyer calls opposing lawyer, leaves a voice mail message then >(mistakenly thinks) he hangs up. Speakerphone is still on and >records him discussing illegal eavesdropping that client did. >Client later is sentenced to federal prison. This doesn't explain >the lack of toll records but might be the beginning of some >questions... Did B call his own phone number to check on something >about 1:20? Did any of the participants of the meeting have a >cellphone on them at the time (see following)? > >2. President of company finds 30 seconds of a very confidential >meeting recorded on his voice mail with message marked urgent. He >concludes that someone is bugging his conference room and has >recorded it to taunt him. Our conclusion is that after bumping the >"talk" button (which redials to his voice mail) he bumps the buttons >that record the call on voice mail and marks the call as urgent. >This could be the explanation for both events... at least the last >one. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1027 From: Robert G. Ferrell Date: Fri Jul 28, 2000 2:41pm Subject: Re: Telephone Problem >A second incident involved a conversation person A had with a >receptionist at one of his companyís offices in another city while he >was traveling. This conversation appeared on the voicemail of another >employee in person Aís office five days after the conversation took >place. Occam's razor suggests that person A is somehow wired, and that the party on the other end likes to mess with the phonemail system. Maybe A has really unusual bridgework... ;-) Cheers, RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 1028 From: James M. Atkinson, Comm-Eng Date: Fri Jul 28, 2000 3:16pm Subject: Re: Excellent book on wiretap detection While we are on the subject of book recommendations I would like to submit the following: "Electronics Engineers' Handbook" by Donald Christiansen and Donald Fink ISBN: 0-07-021077-2 While it is 2400 pages you can get a companion CD-ROM that has the entire book in Acrobat format. This way you can drop the entire CD on your laptop hard drive and have an immediate reference in the field (without lugging a heavy book around). You can get the book by itself from at Barnes and Noble by following the listed link. http://shop.barnesandnoble.com/booksearch/isbnInquiry.asp?userid=2M5II OJWMU&mscssid=&sourceid=00003243031014114091&bfdate=07%2D28%2D2000+15% 3A42%3A37&isbn=0070210772 If you want the book WITH the CD-ROM you can following the listed link: http://shop.barnesandnoble.com/booksearch/isbnInquiry.asp?userid=2M5II OJWMU&mscssid=M38FDEFNC4SR2KH50017QRP4NDJL9EL6&sourceid=00003243031014 114091&bfdate=07%2D28%2D2000+15%3A42%3A37&isbn=0071355340 If you ONLY want the CD-ROM just you can order it by itself from: http://shop.barnesandnoble.com/booksearch/isbnInquiry.asp?userid=2M5II OJWMU&mscssid=M38FDEFNC4SR2KH50017QRP4NDJL9EL6&sourceid=00003243031014 114091&bfdate=07%2D28%2D2000+15%3A42%3A37&isbn=0071343784 Of course keep in mind that I maintain a "reading list" on the following page: http://www.tscm.com/pubs.html -jma Annotation This is the fourth edition of the Electronics Engineers' Handbook, probably the most widely used reference book in the fields of electronics engineering and related disciplines. It is translated into languages other than English at least three times. Four major sections of the handbook cover (1) Principles and Techniques, (2) Materials and Hardware, (3) Circuits and Functions, and (4) Systems and Applications. From the Publisher This is the fourth edition of the Electronics Engineers' Handbook, probably the most widely used reference book in the fields of electronics engineering and related disciplines. It is translated into languages other than English at least three times. Four major sections of the handbook cover (1) Principles and Techniques, (2) Materials and Hardware, (3) Circuits and Functions, and (4) Systems and Applications. The Platinum Edition Series is comprised of McGraw-Hill's peerless collection of engineering handbooks, in print and on CD-ROM. The industry-defining texts in this series--packaged with CDs that feature extensive graphics and problem-solving capabilities--representing the leading edge in all disciplines of engineering. FROM THE BOOK Table of Contents Basic Phenomena. Mathematics, Formulas, Definitions, and Theorems. Circuit Principles. Information, Communication, Noise and Interference. Systems Engineering. Reliability of Components and Systems. Computer-Assisted Design. Standards, Units Symbols, Constants, and Definitions. Properties of Materials. Electronic and Fiber Optic Components. Integrated Circuits and Microprocessors. UHF and Microwave Devices. Transducers and Sensors. Microsensors and Microactuators in Microelectrochemical Systems. Radiant Energy Sources and Sensors. Filters and Attenuators. Amplifiers and Oscillators. Modulators, Demodulators, and Converters. Power Electronics. Pulsed Circuits, Logic Circuits, and Waveform Generators. Measurement Circuits. Antennas and Wave Propagation. Audio Systems. Video and Facsimile Systems. Broadcasting Systems. Telecommunications. Digital Computer Systems. Electronics in Process Control. Electronic Navigation and Detection Systems. Electronics in Medicine and Biology. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1029 From: David Miller Date: Fri Jul 28, 2000 3:21pm Subject: RE: Telephone Problem I think the scenario in #2 is quite believable. I can't tell you the amount of times I have inadvertently called the last person I had talked to just by bumping the talk button on my cell phone on the arm of a chair. I finally had to get a phone that has a cover over the buttons for just that reason. If the client has an email system where he calls himself and can either obtain his messages or leave himself a message, usually the leave a message is by default. -----Original Message----- From: Gordon Mitchell [mailto:gordonm@b...] Sent:Friday, July 28, 2000 1:54 PM To:TSCM-L@egroups.com Subject:Re: [TSCM-L] Telephone Problem No solid answers but I have had some opportunities to observe situations which mimic these. 2. President of company finds 30 seconds of a very confidential meeting recorded on his voice mail with message marked urgent. He concludes that someone is bugging his conference room and has recorded it to taunt him. Our conclusion is that after bumping the "talk" button (which redials to his voice mail) he bumps the buttons that record the call on voice mail and marks the call as urgent. This could be the explanation for both events... at least the last one. [Non-text portions of this message have been removed] 1030 From: Date: Fri Jul 28, 2000 10:03am Subject: Re: Bug Sweep FAQ (revisited) Hey JMA Very nice list. One question. Will you be answering these questions by E-mail? Will you be charging? Is this going into a book? Etc. Etc. Thanks DMM 1031 From: James M. Atkinson, Comm-Eng Date: Fri Jul 28, 2000 4:35pm Subject: Re: Bug Sweep FAQ (revisited) At 3:03 PM -0400 7/28/00, Clockdepot@a... wrote: >Hey JMA >Very nice list. One question. Will you be answering these questions by >E-mail? Will you be charging? >Is this going into a book? Etc. Etc. >Thanks >DMM Nope, for the time being it will go up on my website, and will be posted to this mailing list and will be given away at no charge. Of course if you have some overwhelming reason that you would like to pay for it I would gladly take your money and use it for pizza, seafood, and beer (grin). I publish materials to educate those in our profession, to raise the quality of our work, to keep spies on the run, and to give eavesdroppers a really tough time (call it a holy crusade if you will). My motives are simple... catch the bad guy, period... My website, my mailing lists, my articles, my tutorials, and my work all serve to do this... if I make a little money along the way, great; but the money is strictly secondary to my primary goal of catching spies (including eavesdroppers). -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1032 From: A Grudko Date: Fri Jul 28, 2000 10:32am Subject: FAQ + ----- Original Message ----- > I will post the FAQ to this mailing list, and to my website as well. > This way it will get the widest coverage, and everybody can use it as > a resource at no charge (but I will gladly accept pizza and beer > money). A giant pizza with everything is in the post. This weekend we'll be DFing that 141Mhz 'failsafe' signal that the licencing authority can't identify, as a staff training exercise....also a good reason for a few beers round the barbeque afterwards! Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 1033 From: A Grudko Date: Fri Jul 28, 2000 11:23am Subject: Re: book on wiretap detection ----- Original Message ----- > (Tongue is cheek) I would however take issue with the DVM recommendations, and would lean toward the Model 89 IV instead of the 87. The computer interface and logging capability are very valuable to the TSCM'er, but the instruments are functionally identical. I'll be ordering this book as I feel 'phones are the biggest TSCM risk and the hardest to check and am always willing to learn. At risk of pre-empting it's content, and accepting possible differences between SA & US phone systems and bugging techniques, it's my field experience that most phone taps are located by physical search (especially when a leaky RF cable tracer is used to detect hard wired diverts). I've found that additional capacitance is the next best indicator. Finally, but only occasionally, Potential Difference and current change - using a DVM (1 decimal point V accuracy, 2 decimal point milliamp accuracy, calibrated) - will indicate amateur intercepts. In my somewhat dated book, Counter Surveillance Techniques - ISBN 0-620-18169-9, published 1994 by Coral Keyes Publications, I supplied tables of the changes in current, PD and capacitance over standard lengths of Telcom(Phone co.) cable. I then added various interception devices at different points BEFORE and AFTER the test point and tabulated the results. Clients don't realise just how hard - and time consuming - it is to reliably check a 'phone extension, never mind an exchange line. In 20 years of sweeping I have only positively located one (legal) exchange tap and 3 (illegal) remote line taps. But local line or PABX extension surveillances devices have been frequently found. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairma n), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 1034 From: DrPepper Date: Fri Jul 28, 2000 3:24pm Subject: Re: Telephone Problem Don't make unnecessarily complicated assumptions, is what O.R. says, , , , , "Robert G. Ferrell" wrote: > >A second incident involved a conversation person A had with a > >receptionist at one of his companyís offices in another city while he > >was traveling. This conversation appeared on the voicemail of another > >employee in person Aís office five days after the conversation took > >place. > > Occam's razor suggests that person A is somehow wired, and that the party on the > other end likes to mess with the phonemail system. Maybe A has really > unusual bridgework... > > ;-) > > Cheers, > > RGF > > Robert G. Ferrell, CISSP > ======================================== > Who goeth without humor goeth unarmed. > ======================================== > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- - - - Dr Pepper, Also known as Ron Cheshire, WB6GKI, 35.37.26N/117.40.02W China Lake, CA USA ----------------------------- 90 miles West of Death Valley, 200 miles North of LAX ----------------------------- DrPepper@i... nannycams@i... - - - 1035 From: pyrok Date: Fri Jul 28, 2000 3:55pm Subject: Re: Telephone Problem Rob- I have to different theories on this. I apologize if they're both a little long-winded with too many specifics or if I reiterate a point, but my mind is going faster than I can type. The 1st theory is the more likely of the two from what you have explained, but I'll give you both in case there is something related you didn't mention and also so you and/or anyone else on the list is in need of a long-winded story to help pass the time on a Friday afternoon because the 2nd theory is actually more of a personal experience I had regarding a similar incident a couple of years ago. . My first theory depends on the answer to this question (and you can probably assume what the follow-up answer would be if the answer is yes): do either of the individuals (most probably this should be aimed at Person B) carry a cellular phone that they may have used to place a call to the company's voice mail where the messages were left either to leave a message for someone else or to check their own messages at any point in the day prior to the calls? Or it's possible that it's still related to the cellular phone if Person B (or whoever's conversation was recorded) had one- depending on what type of phone it is. Most phones today are so small that they are designed with the buttons on one side of the phone without the "flip" feature covering them. Most people tend to skip the carrying cases so they have quick access to them and can easily slip them in and out of tight spaces (such as a small pocketbook, a briefcase, a breast or inside pocket on some suit coats, back pockets, or even some planners) without them being too awkwardly noticeable. While this portablity is a great convenience, the same advancing technology has also created better quality phones: the digital ones can be used within building where the analog ones previously had problems and they have also become much more sensitive and "clearer-sounding." They also have a variety of convenience features that could actually result in something like this occuring. Namely, the newer "speed dial" features with 'one button pushing' automatically activating a call and the 'silent' features (so a meeting isn't interrupted rudely). The buttons have to be made smaller and are compacted closer together as the size of the phones get smaller, creating a possibility of someone accidently hitting a wrong button when attempting to END the call. Cellular phones also have 'call-waiting' and 'three-way calling.' All these different factors create a multitude of ways a call could inadvertantly be made. So it is very possible for a phone call to be made without the user's knowledge if they have it in a pocket and lean against something such as a table or a desk or if it's in a purse or attache case or some other tightly compacted soft-sided thing and something presses against that or jostles next to it. The voicemail's time-out features and/or voice-sensitivity settings would explain only parts of conversations being recorded. Then, of course, there is always the classic "forgot to hit END" excuse but this would only be a possibility if the above situation occurred or if they had used their cell phone at some point prior to these conversations taking place -which you didn't mention so you may have already questioned that. So I would suggest maybe checking the phone records of the recorded "victims" before I would suspect a malicious prankster bugging then toying with these companies and their VIPs. And now the 2nd and longer (winded) theory/story: Once upon a time I worked at a corporation's HQ (which actually led to my desire to get into computers and analysing, deviating me briefly from my original Criminal Justice desires until it occurred to me that I could actually combine both fields to form the ideal job for me; but that's a whole other story). Anyway, this situation was one of those freak things that actually ended up having happened to about 3-4 different people in the office (as far as the people who reported it, that is) including myself. In one of the 3 separate incidents involving me, a conversation that occurred in my office ended up on my own voicemail, another conversation in my office ended up on someone else's voicemail and then there was a conversation from a vendor from a totally separate company calling from an office building on the other side of the country was actually talking to someone else on the phone after leaving me a message and part of that conversation ended up on my voice mail (and the really strange thing was, the messages were logged as separate messages about 20 minutes apart.) That incident actually hid the clue I needed to come to a finalized solution for what was going on. That factor was: the vendor's telephone conversation that was recorded on my voice mail only held his end of the conversation, not the other party's. I had already decided that it was all somehow related to either the phones themselves or a combination of our phones and the voice mail system. Here's what was going on: whenever someone called the voicemail system to either leave a message or check their own voicemail (of those incidents reported, only the vendor's was one that occured after leaving a message), if they didn't "exit the system" properly (by pushing a certain key such as * or 9 after being prompted by the system, the voicemail sytem remained active, still logged into the user's account. Usually after a certain point of silence or a certain time limit set by the system administrator on the system, it automatically disconnects from the user's account and resets itself (ever try calling your voice mail immediately after hanging up from it?) so it can saves those memory resources seen as "empty" (sometimes it does this if a caller leaving a message speaks too softly for the system to consider it to be anything and it cuts them off mid-message). The reason for the voice-sensitivity controls is to factor in "background" or "white" noise. The phones were a problem because they had speaker functionality. The speaker phone button was either accidently pushed when replacing the phone on the cradle, or it was some sort of design problem that automatically did it for whatever reason. Either way, that's what was going on. The speaker phone was being activated while the voice mail sytem was remaining active (our system had options for adding more comments to a voice mail if the alotted time wasn't enough and also for someone to send a spoken message or comment after listening to their own messages to the "system default" which was usually either our own phones, or in some cases, a team, secretary, boss, etc. or else they could specify another extension to send a message to. So conversations that occurred immediately following such an instance that were loud enough for the system to pick up on speaker were recorded as messages and cut off either after the time limit expired or when the conversation lulled or quieted beyond the system's settings for recording. So what we did was reset the system's settings for sensitivity so that it would only record messages that were considered to be loud enough to only be spoken directly into the mouthpiece itself. (This took a little trial and error so it wasn't set to a level where nobody could leave a message unless they were practically yelling.) We also did a physical check of the phones to make sure buttons (specifically the one marked "speaker") were marked correctly and weren't sticking or loose or completely missing (you'd be surprised ). We also checked the phones to make sure the lights next to the buttons lit up properly to indicate when they were active. After all the diagnostics tests, we never heard of any other incidents of this sort occurring. The End. Shannyn Barr pyrok@e... ----- Original Message ----- From: "Rob Muessel" To: Sent: Friday, July 28, 2000 11:33 AM Subject: [TSCM-L] Telephone Problem > Here is a problem I encountered in recently and have yet to come up with > an acceptable explanation as to what happened and how. Any ideas? > > The situation: > > Two people are sitting in an office. Person A is the occupant of the > office. Telephone service is ISDN Centrex. He is meeting with Person B, > a consultant from another city. Together they are working on the > acquisition of another company. > > At approximately 11:30 AM they place a call to the cell phone of person > C, the president of the company they are trying to acquire. The cell > phone is apparently turned off or is in a no service area and the caller > hears the recorded message that the person they are calling is not > available. The phone is hung up. There is no voice mailbox for the > cell phone. > > Persons A and B then discuss certain aspects of the deal. > > At approximately 2 PM person B calls his office in the other city to > check voice mail. He hears a very intriguing message: approximately 3 > minutes of the conversation that took place in person A's office after > the attempt to reach person C. The time stamp on the voice mail was > 1:20 PM. > > We examined toll records and found that the call to the cell phone was > of short duration, less than 30 seconds. We also found that there were > no calls made to person B's office from any of phones in person A's > company. > > > A second incident involved a conversation person A had with a > receptionist at one of his company's offices in another city while he > was traveling. This conversation appeared on the voicemail of another > employee in person A's office five days after the conversation took > place. > > Any thoughts?? > > > -- > Rob Muessel, Director email: rmuessel@t... > TSCM Technical Services Phone: 203-354-9040 > 11 Bayberry Lane Fax: 203-354-9041 > Norwalk, CT 06851 > USA > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1036 From: Ian Carter Date: Fri Jul 28, 2000 10:38pm Subject: Re: Telephone Problem > Here is a problem I encountered in recently and have yet to come up with > an acceptable explanation as to what happened and how. Any ideas? If possible could you please answer the following questions: With situation One. Do they have 3 way at the office? Does the ISSN or CENTREX offer conference options? Did party A call party B even hours before calling party C, or does party A have party B programed into the line for speed dial? In situation 2, did the call get found 5 days later, or was actually sent 5 days later...this is VERY important, as it could show the source of the problem, by process of elimination. If you could answer the above it may give me a better idea of what the Telco problem could be and how this can be established. Best Regards - Ian 1037 From: Dawn Star Date: Sat Jul 29, 2000 2:34pm Subject: parallel call diverters "A second incident involved a conversation person A had with a receptionist at one of his company's offices in another city while he was traveling. This conversation appeared on the voicemail of another employee in person A's office five days after the conversation took place." Any thoughts?? Rob Muessel, Director Some years ago I busted some parallel call diverters, small box, parasitic power, hooks to target line, dials up listening line from a separate loop, talks to receiving unit which initiates tape recorder. This thing really worked, nasty little device! Roger Tolces, Electronic Security, Los Angeles [Non-text portions of this message have been removed] 1038 From: DMI Date: Sat Jul 29, 2000 9:21am Subject: Re: Re: Excellent book on wiretap detection I did not mean to sound offensive to anyone, especially the author, and apologize if I may have. Steve your post is absolutely correct, and I appreciate it. Please understand that I would pobably NOT order anything from anyone without first asking for some opinions from this list. I just thought that a contact number would have been nice so I felt better about faxing my credit card info! Thanks, Bill Rust ----- Original Message ----- From: Steve Uhrig To: TSCM-L@egroups.com Sent: Friday, July 28, 2000 2:17 PM Subject: [TSCM-L] Re: Excellent book on wiretap detection Once upon a midnight dreary, DMI pondered, weak and weary: > Is it just me, or should there be a phone number (not just a > fax) and an address (other than a P.O. Box) for contact > info? I assume I am not the only Investigator that would > not order a product from a business or person without this > information? Ted operates a busy PI and consulting firm. Publishing the books is a side effort. I can tell you from long experience, you waste a lot of time letting your number out to the public. People who need him know how to get hold of him. And what PI wants to publish a physical address? That invites lunatics to drop in and waste your time, and thieves to keep an eye on your place thinking you have weapons and expensive equipment. Granted, a P.O. box does not inspire confidence, but mail can be received there and you weren't going to try to pick the thing up in person, were you? Ted is an honest man. You can order with confidence, or drop him an email and judge for yourself by the dialog with him. Ted is not the only place to buy the book, but he is the original source, and if you get it from him you can ask for it to be autographed. I understand the reluctance, and you are proper to exercise due diligence, especially in this field where frauds outnumber the real thing by a substantial margin. Asking here and receiving an endorsement hopefully will be adequate for you. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ------------------------------------------------------------------------------ ------------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 1039 From: DMI Date: Sat Jul 29, 2000 10:06am Subject: Re: Re: Excellent book on wiretap detection OK., as I read the several follow-ups to my post, I started to get a bit upset. Mostly because almost everyone who replied did not seem to look at my post as a simple thought, but as an attack on Mr. Swift's credentials. This is purely false. To be completely honest, I found out last week from a credit card company that someone has opened several accounts using my personal information. I have subsequently had to spend several hundred dollars to "fix" these problems. I have also had to place a "fraud alert" on my SSN (much to my reluctance). I am sure you all would be leery in the first place to place an order over a fax, but even more so (as I was) after dealing with my personal experience with fraud. I have learned a lot from the posts on this list. I have only posted a couple of times however. I understand and recognize who the "Big Boys" are, and never intended to step on anyone's feet. My company specializes in skiptracing and other investigations. I do not specialize, nor am I anywhere near a professional in TSCM (in the audio format). The book recommendation was an easy sale to me based SOLELY on the review and author. There was never a question in my mind about the integrity of the two people involved originally. However, for all of you who are in "defending" Mr. Swift, RELAX, and read the post again knowing what you now know. Mr. Swift, the following is my reply to your post; "Bill got the information about it from you and Jim Atkinson whose credentials are beyond challenge as anyone seriously connected with TSCM ought to know." I never challenged anyone, just asked stated my opinion. As you read above, I might have never been interested in your book were it naught discovered on this list. These are the two messages I sent you; "Do you have acontact number for ordering? Bill Rust Desperate Measures, Inc." and, Right, I got all that information from your site. I would have liked a contact number for obvious reasons. I am a member of TCSM @ e-groups, and this is where I got the link to your angelfire site. I think it is just good business practice to have a contact number and an address other then a P.O. Box for obvious fraud reasons. Your message makes it seem as if I was accusatory from the beginning. I understand why you have a P.O. Box, as I use one for the same reasons. I run my business from my home (and occasionally the Bob Evans up the street, hey, the rent is cheap, and the coffee is always fresh!) and do not give out my address to just anyone. I am always looking for other P.I. companies to network with for information and ideas. I may need help sometime, and being able to talk to you or one of your investigators is just the way I like to communicate. I dropped the list name because it is moderated, and I thought your might recognize that as an indication of trust. I didn't share with him my thoughts about Hotmail Please do! I use this box when our site experiences technical difficulties. I miss allot of mail from my site e-mail address because my web host sucks, and we recently moved. I have had the HM acct. for a long time, and it has never let me down when I have to get a message. The phone rang a few minutes later. Don't know who it was as it came up "unavailable" on my Caller ID. I NEVER answer calls from "unavailable" numbers. That's why I have an answering machine to do the screening. The caller didn't leave a message. If it had been Bill, I would have picked up the line. Guess I'll never know. Next time, try *69 before you make it sound as if I prank called you or something. I don't know if that was supposed to make it onto the list, but I feel my already limited credibility has dropped due to this part of your message. Bottom line, I did get your number, and will call you Monday to order the book. Again I apologize if I offended anyone, including Mr. Swift. I will stop now, as I feel like I may have gone too far anyway. Respectfully submitted, Bill Rust Desperate Measures, Inc. ----- Original Message ----- From: Ted Swift To: TSCM-L@egroups.com Sent: Friday, July 28, 2000 2:44 PM Subject: Re: [TSCM-L] Re: Excellent book on wiretap detection Steve: Thanks for your kind words. You got it pegged just about right. I'm not exactly trying to "push" this book on people and Bill got the information about it from you and Jim Atkinson whose credentials are beyond challenge as anyone seriously connected with TSCM ought to know. He contacted me from a Hotmail account and wanted my telephone number and address, both of which are at my home. He expressed concerns about P.O. boxes and fraud. I didn't share with him my thoughts about Hotmail. I gave him my number. The phone rang a few minutes later. Don't know who it was as it came up "unavailable" on my Caller ID. I NEVER answer calls from "unavailable" numbers. That's why I have an answering machine to do the screening. The caller didn't leave a message. If it had been Bill, I would have picked up the line. Guess I'll never know. Anyway, thanks again for your support. Ted Swift At 02:17 PM 7/28/2000 -0400, you wrote: >Once upon a midnight dreary, DMI pondered, weak and weary: > >> Is it just me, or should there be a phone number (not just a >> fax) and an address (other than a P.O. Box) for contact >> info? I assume I am not the only Investigator that would >> not order a product from a business or person without this >> information? > >Ted operates a busy PI and consulting firm. Publishing the >books is a side effort. > >I can tell you from long experience, you waste a lot of >time letting your number out to the public. People who need >him know how to get hold of him. > >And what PI wants to publish a physical address? That >invites lunatics to drop in and waste your time, and >thieves to keep an eye on your place thinking you have >weapons and expensive equipment. Granted, a P.O. box does >not inspire confidence, but mail can be received there and >you weren't going to try to pick the thing up in person, >were you? > >Ted is an honest man. You can order with confidence, or >drop him an email and judge for yourself by the dialog with >him. > >Ted is not the only place to buy the book, but he is the >original source, and if you get it from him you can ask for >it to be autographed. > >I understand the reluctance, and you are proper to exercise >due diligence, especially in this field where frauds >outnumber the real thing by a substantial margin. Asking >here and receiving an endorsement hopefully will be >adequate for you. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > ------------------------------------------------------------------------------ ------------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 1040 From: 1RCM <1RCM@M...> Date: Sat Jul 29, 2000 3:50pm Subject: I'll Take That Bet Jim, I have Ted Swift's book and would like to cash in on your bet - but when you receive my copy back don't pay any attention at all to the many, many dog-ears that mark the pages that are useful for quick reference, the pages that are yellowed from repeated photocopying (I will explain in advance they were copied for use in my reference binders and not for resale or plageristic purposes since the author is also a list member - LOL), the many, many names on a card inside (looks kind of like a library card) on which I have kept track of who has it during the times that everybody I know asks to borrow it again, or the finger smudge marks that indicate all of the times that I, and many others, leafed-through it or re-read it for various reasons. Nope - none of that in any way indicates the value of the book to me. Seriously list, I have a few telephone-related books on the shelf that are perhaps a bit better (and certainly cost more) but this is a book that everyone who is in any way in the TSCM business should have on the shelf. You simply can't beat what you get for the price. And for those that are understandably a bit hesitant to deal with the author for whatever reason - I ordered mine, didn't get burnt, and never regretted it. And no, I don't personally know the author nor do I receive royalties in any way. Just another "Bob' 1041 From: Ted Swift Date: Sat Jul 29, 2000 6:49pm Subject: Re: Re: Excellent book on wiretap detection Bill: I think we have a case here of a mountain out of a molehill. No need to rehash the events. I think I understand your point of view and I hope you appreciate mine. Give me a call Monday and we'll start fresh. I look forward to talking with you. Very Cordially, Ted Swift At 11:06 AM 7/29/2000 -0400, you wrote: >OK., as I read the several follow-ups to my post, I started to get a bit upset. Mostly because almost everyone who replied did not seem to look at my post as a simple thought, but as an attack on Mr. Swift's credentials. This is purely false. 1042 From: DMI Date: Sun Jul 30, 2000 2:28am Subject: Re: Re: Excellent book on wiretap detection Ted, I will definitely call on Monday! Thanks again, Bill ----- Original Message ----- From: Ted Swift To: TSCM-L@egroups.com Sent: Saturday, July 29, 2000 11:49 PM Subject: Re: [TSCM-L] Re: Excellent book on wiretap detection Bill: I think we have a case here of a mountain out of a molehill. No need to rehash the events. I think I understand your point of view and I hope you appreciate mine. Give me a call Monday and we'll start fresh. I look forward to talking with you. Very Cordially, Ted Swift At 11:06 AM 7/29/2000 -0400, you wrote: >OK., as I read the several follow-ups to my post, I started to get a bit upset. Mostly because almost everyone who replied did not seem to look at my post as a simple thought, but as an attack on Mr. Swift's credentials. This is purely false. ------------------------------------------------------------------------------ ------------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 1043 From: A Grudko Date: Sun Jul 30, 2000 10:41am Subject: Personal security ----- Original Message ----- From: Ted Swift > He expressed concerns about P.O. > boxes and fraud. I didn't share with him my thoughts about Hotmail. I gave > him my number. The phone rang a few minutes later. Don't know who it was as > it came up "unavailable" on my Caller ID. I NEVER answer calls from > "unavailable" numbers. Ted, we have not corrisponded before and this is certainly not meant as a 'flame'. Once you give whoever your 'phone number your 'phone and location security have been compromised...so why not answer the 'phone? If it had been me 'phoning you from South Africa would you have seen my number? I doubt it. Our caller ID shows 'unavailable' for all incoming overseas calls. And all spooks know how to make an incoming call 'unavailable', so if that 'suspect' call was coming from the Secret Service at the White House you might have missed an interesting assignment.... SA has the world's second highest peacetime murder rate. Our agency has at least one murder investigation going at any time. Investigations into organised crime syndicates operating in government are the norm for us. So we take personal security very seriously, including simple measures such as caller ID (where available) and recorders on all voice lines. We prefer to answer all calls, talk to the loonies and tape and store all risk profile calls. Know thy enemy. Unfortunately professionals do not make threat calls. Armatures and loonies do all the time. A humble opinion from the African bush :-) Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 1044 From: A Grudko Date: Sun Jul 30, 2000 11:01am Subject: Re: Telephone Problem The kind of people who are at the risk of gov. surveillance generally do not beleive they could be so foolish as to not hit the 'cut' button on a cellphone call and therefore 'bug' themselves. But they do. Most intel leaks, probably 90%+, are Humint, even in the digital 21st century. We used the local cellphone system to place room audio bugs for a while, but it is too unrelyable. But we still use cellphones to collect live info. from suspects, passive and active. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - first time" ICQ 78711262 1045 From: A Grudko Date: Sun Jul 30, 2000 11:04am Subject: Re: Re: Excellent book on wiretap detection ----- Original Message ----- > Ted Swift is legitimate and I will put my money where my mouth is... Your word is enough 1046 From: Ted Swift Date: Sun Jul 30, 2000 8:09am Subject: Re: Personal security Andy: I certainly understand the conection between the number and the address. Let's just say I was feeling a little "pissy" at the moment :-) I think Bill and I have things worked out now. TS At 05:41 PM 7/30/2000 +0200, you wrote: >----- Original Message ----- >From: Ted Swift >> He expressed concerns about P.O. >> boxes and fraud. I didn't share with him my thoughts about Hotmail. I gave >> him my number. The phone rang a few minutes later. Don't know who it was >as >> it came up "unavailable" on my Caller ID. I NEVER answer calls from >> "unavailable" numbers. > >Ted, we have not corrisponded before and this is certainly not meant as a >'flame'. > >Once you give whoever your 'phone number your 'phone and location security >have been compromised...so why not answer the 'phone? > >If it had been me 'phoning you from South Africa would you have seen my >number? I doubt it. Our caller ID shows 'unavailable' for all incoming >overseas calls. > >And all spooks know how to make an incoming call 'unavailable', so if that >'suspect' call was coming from the Secret Service at the White House you >might have missed an interesting assignment.... > >SA has the world's second highest peacetime murder rate. Our agency has at >least one murder investigation going at any time. Investigations into >organised crime syndicates operating in government are the norm for us. So >we take personal security very seriously, including simple measures such as >caller ID (where available) and recorders on all voice lines. > >We prefer to answer all calls, talk to the loonies and tape and store all >risk profile calls. Know thy enemy. > >Unfortunately professionals do not make threat calls. Armatures and loonies >do all the time. > >A humble opinion from the African bush :-) > >Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime >investigation & intelligence >Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - >Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 >11) 465 9673 - 465 1487 (Fax) - Est. 1981 >GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA >Chairman), CITTF, >UKPIN, AFIO (OS), IWWL, PRETrust, IPA, "When you need it done right - >first time" ICQ 78711262 > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > 1047 From: James M. Atkinson, Comm-Eng Date: Mon Jul 31, 2000 7:19pm Subject: NSA Lacks Slots, Pay To Hire Top Tech Talent NSA Lacks Slots, Pay To Hire Top Tech Talent http://www.washingtonpost.com/wp-dyn/articles/A7536-2000Jul30.html By Vernon Loeb Washington Post Staff Writer Monday, July 31, 2000; Page A17 When it comes to work-force problems in the federal government, the National Security Agency is a lot like the proverbial python that swallowed a pig: A huge bulge of employees hired in the boom years of the 1980s is moving slowly through the supersecret bureaucracy, leaving little room for anyone new to come into the system. This is exactly what NSA wanted throughout the Cold War. It stressed loyalty and eschewed layoffs as it remained largely a mystery to the outside world, intercepting electronic communications all over the world, breaking enemy codes and encrypting the nation's most sensitive communications. But now such paternalism is clouding the very future of an agency that is uniquely threatened by a new assortment of hard-to-intercept communication technologies and unable to quickly respond. The NSA is short on newer workers with cutting-edge high-tech expertise. "We have a huge problem, with the age of the work force and the very little hiring that we're doing behind that," said Deborah A. Bonanni, the NSA's chief of human resources services. "To try to completely churn and turnaround this work force without having a reduction in force is a very difficult problem. There is no silver bullet for that." It's actually even more complicated than that. While the agency doesn't have enough positions to offer new workers with cutting-edge computer skills, competition with private industry is fierce for those it is trying to fill. "We're getting people in, but for engineers and computer scientists, we're roughly $5,000 to $8,000 below entry-level salaries [in the private sector]," said Bill Cottrell, deputy director of the NSA's Office of Employment. "We're trying to sell the mission. It's attracting people. Are we where we want to be? No." Depending on level of education, entry-level engineers can earn from $41,927 to $59,094 at NSA; a computer science specialist, from $38,481 to $49,615; and a mathematician, from $38,481 to $62,680. And while competition is stiff for people coming out of college, it's even more intense for the agency's own mid-career computer scientists, who are suddenly resigning in large numbers, lured away by companies that have no trouble increasing their $60,000 to $70,000 salaries to $90,000 or more. "We're losing some of our best computer scientists," Bonanni said. To free up space for hiring young people with modern skills, the agency is continuing to offer early-out retirement incentives and $25,000 bonuses. Beginning in 1993, those incentives were open to all as the NSA retrenched after the Cold War--a work force that once numbered in excess of 40,000 employees has contracted by almost a third since then. But now, only those employees with outdated skills are eligible for early outs and separation bonuses--computer scientists need not apply. Within the past several months, the NSA has also begun denying internal transfers to those with critical skills--it used to encourage a computer scientist, for example, to work as an intelligence manager, but no more. There is no easy way to offset the salaries computer scientists are now being offered by the private sector, just as government salaries make it next to impossible to to bring mid-career computer scientists and innovators from private industry into the agency. "No matter how many things we try--and we have some very good programs that we offer--there's a certain point at which it becomes impossible to compete with huge salaries and stock options," Bonanni said. The NSA's recently announced decision to turn over to private industry the development and management of most of its nonclassified information technology in a single, 10-year contract will have major work force implications. Worth as much as $5 billion to the eventual winning bidder, the contract will eliminate by 2002 the jobs of 1,200 to 1,500 NSA employees and an additional 800 contractors now working in nonclassified network management and security, workplace computer systems, telecommunications and network development. All of the affected federal employees, however, will be guaranteed jobs at equivalent salary levels by the winning bidder. But the agency's review of what to outsource and what to keep in-house could eventually involve mission-critical technologies that involve new ways to intercept digital communications or break encryption software. With its work force evenly divided between support and "core" employees, the agency wants to realign itself so that 60 percent of its people are working at "core" functions. All current hiring involves only core personnel. "We have," said Bonanni, "some real strategic decisions we have to make." For related articles on the difficulties that other federal agencies face in recruiting and keeping workers with high-tech expertise, see the "Empty Pipeline" series published by The Washington Post in May, now at www.washingtonpost.com. Click on "onpolitics" and go to bottom of page for "Post Series." =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1048 From: James M. Atkinson, Comm-Eng Date: Mon Jul 31, 2000 7:37pm Subject: U.S. spies on corruption overseas U.S. spies on corruption overseas http://www.msnbc.com/news/434065.asp Listening devices used to compile data on who is bribing who By Robert Windrem NBC NEWS CORRESPONDENT NEW YORK, July 21 ≠ The U.S. intelligence community uses electronic eavesdropping to maintain and update a top secret database of international bribery cases, according to new reports by the State and Commerce departments and senior U.S. officials. The information is being used extensively as leverage to help American companies compete abroad and is being matched by similar efforts on the part of U.S. economic competitors. THE DATABASE built by U.S. intelligence agencies contains the names of foreign companies that offer bribes to win international contracts and is reported to list hundreds of contracts worth hundreds of billions of dollars that over the past 14 years went to the biggest briber rather than the highest bidder. The database is developed mainly through electronic eavesdropping, say U.S. intelligence officials. Such eavesdropping, called communications intelligence or COMINT, is at the center of the ìEchelonî controversy. European parliamentarians, among others, are accusing the United States of massive electronic spying for commercial purposes, using a worldwide network of spy sites linked by ferret software known as Echelon. Under a U.S. law known as the Foreign Corrupt Practices Act (FCPA), the U.S. Department of Justice can bring criminal charges against American companies makes payments to foreign government officials in order to obtain or retain business. Companies, officers, and directors risk expensive and disruptive investigations, criminal and civil sanctions, and private lawsuits if they fail to take the steps necessary to avoid prohibited payments. American companies have long complained that the law, which is tougher than legislation in many European and Asian nations, puts them at a disadvantage to competitors. Until recently, in some European countries, bribes could be written off as business expense for tax purposes. The United States has repeatedly denied, as recently as this March, that it spies on overseas companies to provide economic advantage for U.S. firms. But is has admitted for years that it attempts to ìlevel the playing fieldî for American companies by uncovering bribery by competitors. The database is used to help in that effort, say U.S. officials. ìNumbers like these indicate a lot of manpower is going into this effort,î said William M. Arkin, an independent military analyst and MSNBC consultant. ìThis is serious intelligence work.î The specifics included in the bribery database remain classified. But its existence and some general information on what has been found are not. The database is openly discussed in the congressionally mandated reports issued just before the July 4th holiday by the State and Commerce Departments. A copy of the database was sent to Congress with the reports. In its report, issued June 29, the State Department reported the database, lists foreign firms on which credible information exists indicating that they have been engaging in activities that would be prohibited by the [OECD] Convention [outlawing international bribery]. ìDuring that period, we received allegations that bribes had been offered in some 353 international contracts worth about $165 billion. In deals where there were bribery allegations reported, U.S. competitors, and known outcomes, American firms lost 92 contracts worth approximately $26 billion. ìA large number of competitor firms from other countries have been engaged in bribery of foreign public officials.î In an typical year, 1998, the U.S. intelligence community found that some 60 ìmajor international contractsî valued at $30 billion went to the biggest briber, according to a little noticed February 1999 speech by then Secretary of Commerce William Daley. ìThis was in just 12 months,î said Daley, the son of the former Chicago mayor and now campaign manager for Vice President Goreís presidential bid. ìCorruption, obviously, is big business.î ëItís hard to get morally exercised about French complaints about economic espionage.í ≠ U.S. INTELLIGENCE OFFICIAL Jeffrey T. Richelson, an intelligence historian, suspects the European outcry over Echelon maybe related to what the program has found. ìIt would be interesting to see how many instances of bribery involved companies from countries that are screaming the loudest about Echelon Ö particularly in Europe.î A senior U.S. intelligence official noted as well that European complaints were akin to ìthe pot calling the kettle blackî since European countries, including American allies, have long targeted U.S. economic secrets. ìItís hard to get morally exercised about French complaints about economic espionage!î The United States began intensively monitoring international bribery starting in May 1994 in hopes of using the data to reverse some of the contracting decisions and enable American companies to get a fair share of the contracts, many of which were worth billions of dollars each. A 1993 report by the CIA, based on an archival look at US intelligence files, indicated that U.S. spy agencies ìhad identified about 250 cases of aggressive lobbying by foreign governments on behalf of their domestic industries that are competing against U.S. firms for business overseasî between 1986 and 1993. And a 1995 report by the CIA indicated that in 1993 alone, the United States had found 51 contracts with a value of $28 billion that had been influenced by bribery or some other inappropriate activity by an overseas company. Combined with the latest reportsí figures, that means in the past 14 years the intelligence community has compiled a list of more than 650 contracts that were influenced by bribery. The database has been used by the U.S. government to try to get what could be called restitution for American companies that lost business because of the bribery, say officials. In one of the few public discussions of what the United States does with the data, then CIA Director R. James Woolsey told a Washington think tank in 1994: ìWe collect intelligence on those efforts to bribe foreign companies and foreign governments into, for example, awarding an airport contract to a European firm rather than an American firm. And when we find out about those, and we do a fair amount of the time, we go not to the American corporation thatís competing, but the secretary of state, and he sends an American ambassador to see a president or a king, and he - that ambassador says, ìMr. President,î or ìYour Majesty, your minister in charge of construction is on the take, and you have a lot going with the United States, and we donít really take kindly to your operating that way. And so rather frequently what happens - not always - is that the contract is re-bid , sometimes the American corporation gets a share of it, sometimes the whole thing is done right, sometimes not.î MSNBC.com has previously reported that in 1993 and 1994, the U.S. intelligence community had helped American firms win $16.5 billion in overseas contracts by alerting the governments in third world countries that ministers and others were ìon the take.î Among the U.S. companies that have benefited are Raytheon, Boeing and Hughes Network Systems. Intelligence officials have clamped down on the release of such data since then although officials at the CIA, NSA, and State Department have said such activities continue. Prior to 1992, the intelligence community did not monitor international trade communications for bribery. That year, the United States discovered inadvertently that a Japanese company had bribed a Syrian official in return for a $400 million power plant contract. After the Clinton administration, with its emphasis on economic security, came to power the next year, such monitoring became an intelligence community priority and the database was developed. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1049 From: Steve Uhrig Date: Mon Jul 31, 2000 8:45pm Subject: Professionalism? Below forwarded to me by another list member. There is at least one other team who does this. > Speaking of fraud, I spoke with a > Police Lieutenant yesterday about doing an inspection at > a business in their city. One of the questions I was > asked was how I would dress for the inspection. I > advised that I try to blend in with the environment, but > that I normally wear nice casual clothing. > They were concerned because the last TSCM firm they > hired came in wearing full "ninja" costumes, complete > with hoods. > They scared the crap out of the people at the business, > and embarrassed the hell out of the Chief. Maybe I'll > start wearing a top hat and tails. -------------------------------------- A few years ago, there was an emergency high dollar sweep for a very visible sports figure in the Wash DC area. Police had served a search warrant, and they were seen carrying in equipment and spent several hours in the place. There was a concern they had left something behind. I turned down the job on the pretext that the lawyer would not prepay, and no one gets credit from me. Generally, I do not care to do criminal defense work. They finally got a clown from the DC area to do the sweep. The fellow is a well known local space cadet. One of the generation of credit card sweepers. * The media was outside the gates when this gentleman arrived. Cameras, lights, mobile news vans with satellite link back to the studios. He gave an on-the-spot press conference on why he had been called in. The attorney had to ask him to leave and come back later to finish the job after the media had left. This same gentleman will tell anyone who asks how competent and ethical he is, and how incompetent all the rest of us are. No names will be mentioned. * A credit card sweeper is someone who plunks down plastic and buys a lot of equipment, with no knowledge of what to do with it. One can learn all the industry terminology and buzzwords and still not know how to draw the schematic of a flashlight. This is the majority of sweepers. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1050 From: James M. Atkinson, Comm-Eng Date: Tue Aug 1, 2000 0:04am Subject: State Slogans [Humor] Alabama: Yes, We Have Electricity Alaska: 11,623 Eskimos Can't Be Wrong! Arizona: But It's A Dry Heat Arkansas: Literacy Ain't Everything California: By 30, Our Women Have More Plastic Than Your Honda Colorado: If You Don't Ski, Don't Bother Connecticut: Like Massachusetts, Only The Kennedy's Don't Own It Yet Delaware: We Really Do Like The Chemicals In Our Water Florida: Ask Us About Our Grandkids Georgia: We Put The "Fun" In Fundamentalist Extremism Hawaii: Haka Tiki Mou Sha'ami Leeki Toru (Death To Mainland Scum, But Leave Your Money) Idaho: More Than Just Potatoes ... Well Okay, We're Not, But The Potatoes Sure Are Real Good Illinois: Please Don't Pronounce the "S" Indiana: 2 Billion Years Tidal Wave Free Iowa: We Do Amazing Things With Corn Kansas: First Of The Rectangle States Kentucky: Five Million People; Fifteen Last Names Louisiana: We're Not ALL Drunk Cajun Wackos, But That's Our Tourism Campaign Maine: We're Really Cold, But We Have Cheap Lobster Maryland: If You Can Dream It, We Can Tax It Massachusetts: Our Taxes Are Lower Than Sweden's (For Most Tax Brackets) Michigan: First Line Of Defense From The Canadians Minnesota: 10,000 Lakes ... And 10,000,000,000,000 Mosquitoes Mississippi: Come And Feel Better About Your Own State Missouri: Your Federal Flood Relief Tax Dollars At Work Montana: Land Of The Big Sky, The Unabomber, Right-Wing Crazies, And Very Little Else Nebraska: Ask About Our State Motto Contest Nevada: Whores and Poker! New Hampshire: Go Away And Leave Us Alone New Jersey: You Want A ##$%##! Motto? I Got Yer ##$%##! Motto Right Here! New Mexico: Lizards Make Excellent Pets New York: You Have The Right To Remain Silent, You Have The Right To An Attorney ... North Carolina: Tobacco Is A Vegetable North Dakota: We Really Are One Of The 50 States! Ohio: At Least We're Not Michigan Oklahoma: Like The Play, Only No Singing Oregon: Spotted Owl ... It's What's For Dinner Pennsylvania: Cook With Coal Rhode Island: We're Not REALLY An Island South Carolina: Remember The Civil War? We Didn't Actually Surrender South Dakota: Closer Than North Dakota Tennessee: The Educashun State Texas: Si' Hablo Ing'les (Yes, I Speak English) Utah: Our Jesus Is Better Than Your Jesus Vermont: Yep Virginia: Who Says Government Stiffs And Slackjaw Yokels Don't Mix? Washington: Help! We're Overrun By Nerds And Slackers! Washington, D.C.: Wanna Be Mayor? West Virginia: One Big Happy Family ... Really! Wisconsin: Come Cut The Cheese Wyoming: Where Men Are Men ... and the sheep are scared !!! >> =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1051 From: James M. Atkinson, Comm-Eng Date: Tue Aug 1, 2000 9:06am Subject: Re: Professionalism? - Ninja Uniforms At 9:45 PM -0400 7/31/00, Steve Uhrig wrote: >Below forwarded to me by another list member. > >There is at least one other team who does this. > > > Speaking of fraud, I spoke with a > > Police Lieutenant yesterday about doing an inspection at > > a business in their city. One of the questions I was > > asked was how I would dress for the inspection. I > > advised that I try to blend in with the environment, but > > that I normally wear nice casual clothing. > > > They were concerned because the last TSCM firm they > > hired came in wearing full "ninja" costumes, complete > > with hoods. > > > They scared the crap out of the people at the business, > > and embarrassed the hell out of the Chief. Maybe I'll > > start wearing a top hat and tails. > >-------------------------------------- On the Clothing issue... I've seen other people as well who show up for TSCM in full NINJA/SWAT or lab coat regalia. It's actually quite sad, but it seems to happen most often when when the TSCM'er has no credentials. I have actually had clients tell me that I was the only TSCM'er they engaged who actually wore a suit, or who conducted themselves in a professional manner. Personally, I always dress like one of vice presidents at the place I am visiting, and by default wear a very conservative business suit (when in doubt always wear a suit). In hospitals and research facilities I change to match what the doctors or senior scientists are wearing (but I try to stay away from lab coats unless the client insists). Of course I always bring several changes of clothing so I can "match up", but it also to give me something to change into when/if I crawl around in the ceiling or basement areas. My "TSCM Wardrobe" starts with dark very conservative business suits (none of the pansy-ass European stuff) with a bright white button-down oxford shirt, a dark paisley or similar tie, and black shoes/black socks. (This is my executive interface or VP outfit). The goal is to simply look like someone in senior management, a consultant, an accountant, an attorney, and so on. Since the initial on-site segment of my sweep involves hunkering down behind a spectrum analyzer near the targeted office for a few hours this works out well. I prefer to perform most of my sweep in a suits, and may remove the jacket as I start moving around more during the sweep. The next step down is tan dockers/slacks, blue long sleeve oxford, tan shoes, and a dark usually blue tie. I add to this a nice blue blazer with gold/brass buttons. Of course the tan trousers are only used in-season (This is my researcher/MD or Casual Friday outfit). It's amazing, but if I am at a hospital or medical facility in this clothing (during the appropriate season) I'll get addressed as Dr., and viewed as a member of the staff. Below that is a pair of black dockers or slacks, blue or white oxford shirt, muted tone tie, black shoes, etc. The shoes can be swapped out for black sneakers when I start going up on a ladder. (This is my "crawling around on the floor", and physical inspection clothing). This is suitable for almost all elements of the sweep EXCEPT those where you risk damage or injury to yourself... or for cases where I will be in mahogany row. Of course you get your clothes dirty, and you tear holes in stuff, but it's a cost of doing business. Then of course we have the popular blue jeans, polo/Izod shirt/T-Shirt, heavy boots, etc for when I have to work in a basement, attic, suspended ceiling, steam tunnel, man hole, and so on (hip high wadders are optional). I also use the "Blue Jeans" outfit when I have to crawl around under a car for 6 hours or more on a sweep (and will usually add several sets of latex gloves) Below that is my "climbers outfit" which I use when I have to use a cherry picker, hang off a pole, open access boxes (off-site) or otherwise look like an outside plant person. This usually includes a pair of jeans, a heavy flannel shirt, T-shirt or turtle-neck under that, climbers gloves, heavy boots, line mans belt, tool belt, climbers chaps, hard hat, and gaff sets. I save the NINJA outfits for Halloween, and years ago outgrew the need to wear military regalia in an effort to impress the ladies. When I was in the military I was taught that people who try to be a "pretender" by wearing tactical clothing at inappropriate times needed to visit a mental health clinic (as it is a sign of being pathologically delusion). In fact someone who came across a little too "gung-ho" would often have their security clearance pulled until they got some couch time with a medical professional. Also, folks from the base were generally forbidden to wear fatigues, BDU's, or other tactical uniforms off base unless they where en-route from their off-base home, or during an emergency (do you understand why?). Good rule of thumb... If you wouldn't wear it on a commercial airline flight then don't wear it on a TSCM sweep. Ninja suits, BDU's, tactical gear and so on tends to freak out airport security, and are thus highly inappropriate for TSCM work. Of course there are times when it is appropriate to wear tactical gear (such as being at the range or hunting), but providing legitimate TSCM services isn't one of them. If you show up for a sweep wearing a balaklava and Kelvar vest don't be surprised if your client never calls you back, and never refers clients to you (unless they need a clown for a party). > >A few years ago, there was an emergency high dollar sweep >for a very visible sports figure in the Wash DC area. >Police had served a search warrant, and they were seen >carrying in equipment and spent several hours in the place. >There was a concern they had left something behind. > >I turned down the job on the pretext that the lawyer would >not prepay, and no one gets credit from me. Generally, I do >not care to do criminal defense work. Ditto... I generally walk away from criminal defense work or any situation where the client may have bugged themselves in an effort to gain attention or publicity. Saldy, some attorneys will actually pay someone to install eavesdropping equipment into one of their clients building, and will then call in a TSCM person "to find the bugs". The attorney will then drag the incident into the public forum claiming that his client is the victim. >They finally got a clown from the DC area to do the sweep. >The fellow is a well known local space cadet. One of the >generation of credit card sweepers. * Gee... I can think of about a dozen people in the DC area... But one specific "TSCM Crack-Whore" comes to mind. >The media was outside the gates when this gentleman >arrived. Cameras, lights, mobile news vans with satellite >link back to the studios. > >He gave an on-the-spot press conference on why he had been >called in. The attorney had to ask him to leave and come >back later to finish the job after the media had left. A TSCM person giving a press conference? Sounds like the guy has some psychiatric problems. TSCM people NEVER identify their clients... ever... It is a major breach of professional ethics. It one thing to be interviewed about what you do for a living, but it is something else to talk about WHO you do it for. There is a fine line between legitimate publicity, and breaching your clients trust.. be careful not to cross it. >This same gentleman will tell anyone who asks how competent >and ethical he is, and how incompetent all the rest of us >are. Ah, now I know who your talking about... it's one thing for someone in the business to expose a fraud or cheat, but when they falsely attack legitimate people who are in the TSCM industry then it's their own credibility that is brought into question. Ahem... I would point out that some TSCM people appear legitimate on the surface, but that in some cases "the ice in thin" and people should be careful where they step. A legitimate TSCM person does not dress like a Ninja or wave irrelevant college degree's/titles around to impress people. Remember... it's not WHO you know, or WHAT you know... but what you can do. I know people who attended fairly respectable universities, but are some of the biggest crooks on Earth who have never designed a single piece of gear or written a single book (and couldn't find a bug with a million dollars worth of equipment). On the other hand there are TSCM experts who never attended college, yet have designed dozen of products from scratch, and have published numerous papers (and could find a bug with a coat hanger, a diode, and a ten dollar voltmeter). >No names will be mentioned. > >* A credit card sweeper is someone who plunks down plastic >and buys a lot of equipment, with no knowledge of what to >do with it. One can learn all the industry terminology and >buzzwords and still not know how to draw the schematic of a >flashlight. This is the majority of sweepers. > >Steve -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== From: James M. Atkinson Date: Thu Jul 29, 2004 10:25am Subject: Re: Remote telephone sweeping scam What tickles me is that they provide to provide you with the GPS coordinates of the phone, which is a hoot because most telephones do not have any kind of GPS receiver in them, nor GPS antenna, or any mechanism by which it could provide the coordinates even to the most sophisticated eavesdropper, government spy, CIA, etc.. The service they offer should be listed under "Too Good to be True" -jma At 09:11 PM 7/28/2004, Mitch D wrote: >Found this today,interesting process,must work great w a "bug >zapper",they also claim cell triangulation for a fee........ >http://www.tracerservices.com/bugged.htm ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9229 From: Michael Puchol Date: Thu Jul 29, 2004 1:29pm Subject: Re: Frequency Filtering Wallpaper May I suggest small-gauge (grounded) chicken wire under bog standard wallpaper, with maybe an extra layer or two of glue to flatten the surface and remove bumps? I'm sure it will be way cheaper than this FSS (argh! another acronym to remember!)...... Regards, Mike ----- Original Message ----- From: "J. Oquendo" To: Sent: Wednesday, July 28, 2004 3:19 AM Subject: [TSCM-L] Frequency Filtering Wallpaper > > Writing is on the wallpaper for noisy mobiles > David Smith, technology correspondent > Sunday July 25, 2004 > The Observer > > ... > > British scientists have found a way to mass-produce frequency-selective > 'wallpaper' screens (FSS) on a large scale for the first time. The screens > are metal grids designed in an intricate pattern which filter out some > radio signals and allow others through, depending on their wavelength. > They can be fitted to walls and covered with real wallpaper so they > disappear from view. > > http://observer.guardian.co.uk/uk_news/story/0,6903,1268797,00.html > > =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ > J. Oquendo > GPG Key ID 0x51F9D78D > Fingerprint 2A48 BA18 1851 4C99 > > CA22 0619 DB63 F2F7 51F9 D78D > http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D > > sil @ politrix . org http://www.politrix.org > sil @ infiltrated . net http://www.infiltrated.net > > "How can we account for our present situation unless we > believe that men high in this government are concerting > to deliver us to disaster?" Joseph McCarthy "America's > Retreat from Victory" > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9230 From: Steven Donnell WA1YKL Date: Thu Jul 29, 2004 11:45am Subject: Re: Remote telephone sweeping scam They just take the address the ph# is listed to and punch it into to a map search program.. SD "James M. Atkinson" wrote: > What tickles me is that they provide to provide you with the GPS > coordinates of the phone, which is a hoot because most telephones do not > have any kind of GPS receiver in them, nor GPS antenna, or any mechanism by > which it could provide the coordinates even to the most sophisticated > eavesdropper, government spy, CIA, etc.. > > The service they offer should be listed under "Too Good to be True" > > -jma > > At 09:11 PM 7/28/2004, Mitch D wrote: > >Found this today,interesting process,must work great w a "bug > >zapper",they also claim cell triangulation for a fee........ > >http://www.tracerservices.com/bugged.htm > > ----------------------------------------------------------------------------------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ----------------------------------------------------------------------------------------------------- > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ----------------------------------------------------------------------------------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ----------------------------------------------------------------------------------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > 9231 From: atsi999 Date: Thu Jul 29, 2004 10:55am Subject: Re: Remote telephone sweeping scam --- In TSCM-L@yahoogroups.com, Mitch D wrote: > Found this today,interesting process,must work great w a "bug > zapper",they also claim cell triangulation for a fee........ > http://www.tracerservices.com/bugged.htm > > This company has been in trouble before. See the below link http://www.ago.state.ma.us/sp.cfm?pageid=986&id=1175 Jeff Evert Arizona Technical Security www.aztscm.com 9232 From: Date: Thu Jul 29, 2004 11:36am Subject: RE: Re: No parabolic.....Phased Array Microphones ! ("SPOTMIC") "contranl" wrote: >. > > >>This approach has been tested and thrown away probably before >>Tetrascanner was born > >I do'nt think so .....Tetrascanner was born 50 years ago ! >wich also means "not born yesterday" :) :) Indeed? But then you had enough time to learn that acoustic wave and electromagnetic wave propagate with quite different speeds: 300 mps vs 300 000 kmps. That yields wavelength approximately 1m for 300 Hz. The rest you posted is a pure declaration. To get familiar with this subject one must read Journal Of Acoustical Society (USA) and Acoustic Journal (Russia) and not watch teenagers¥ internet sites. Phased array microphones do exist, but for surveillance purposes they are as bulky and bad as all other dicectional microphones. Sorry Gentlemen, now I will correct my initial posting: This technology was tried and thrown away when both Tetrascanner and I were teenagers. Regards A.W. > >>It doesn¥t work. The reason is as simple as that: >>acoustical signal is too broadband for being efectively picked up by >>a phased array. > > >I don't agree how do you think we humans pick up sounds (very >effectively) ? > >...right!...with 2 ears...developed by mother nature...your brains >use the same phased array technique...by effectively phasing out >unwanted signals from unwanted directions (time of arrival)...it >uses a sophisticated computer and a software-program that was >developed in a few million years...it uses only 2 mic's to do that >(your ears) > >My ears have a bandwidth from 1 Hz to at least 18 khz. > >>or in terms of wavelength 1m down to 10cm. > >Not correct the wavelength of audible audio(1~20 khz) is in the >kilometers/miles range > >1 mtr wavelength is at 300 MHZ >10 cm wavelength is at 3000 Mhz > > >>To yield a reasonable gain the spacing between elements in the >>array >>must be approximately >>0.5 lambda, that is 5cm for 3000 Hz and 50 cm for 300 Hz. > >not correct see above wavelength/frequency comment > >Obviously there must be a minimal distance between the microphones >but they are not very related to the wavelength ...in this case the >gain is not obtained by ADDING ...2 PERFECT in-phase signals but by >DISTRACTING any out-of-phase signals. > >As long as you are able to "hear" if a signal is out of >phase than that would be enough...i think it is not neccesary that >they have to be a full or 1/4 out of phase... >Out of phase is out of phase even a little bit out of phase is out >of phase...and as such identifyable as not coming from the same >direction as the main sound of interest. > >If i said in previous posting "similar to stacking antennas" then i >ment similar but not the same...it was just an example to explain >phasing...the microphone phasing stuff is a little different...sorry >if i put you on the wrong track there > >So the minimal distance between the microphones has to be a distance >wich will allow a measurement that can distinguish a small >difference in phase...it is not neccessary that such a phase >difference is a full ,1/2,1/4 or even 1/1000 of a wavelength , >a fast DSP could do even smaller differences. > >The main difference is that when stacking radio-antennas you more or >less simply combine them and feed them to a receiver that's all... >with phased array microphones you have a DSP processor inbetween >therefore you don't need big phase differences or microphone >distances. > >Have you ever tried this: go to a room with 20 people all talking >loud..then notice when you concentrate on 1 person...you will be >able to enhance his speech !...how do you do that ? >not be adding extra ears but by throwing away the unwanted sounds. >You do'nt even notice that since that process is so often used that >it has become one of the automated processes in your brain ...just >like breathing. and once again my head is not the size of a football- >field :) :) > >Also how do you think you are able to know from wich side a certain >sound is coming ? >you could call that "stereo/spatial impression" wich is basically: >your brain calculates a direction by comparing the time of arrival >and translates that into an angle of arrival.. > >resuming: > >your brain can determine the direction of a sound >your brain can effectively throw away sounds it does not want to hear >it does that with only 2 microphones wich are spaced only 30 cm's >apart ! > >Imagine what you could do if you had 96 ears :) :) > >A piece of equipment with some DSP processing could easely do the >same and determine SLIGHTLY out of phase signals and simply throw >them away. > >>The effect of frequency selectivity >>affects also latter type of directive microphones though. > >not shure what you mean by that but: >modern microphones can be manufactered to have a perfect response to >human audio /speech or any frequency range wanted. > > >>A lot of taxpayers¥ money on both sides of iron curtain were >>spent on that kind >>of research during the cold war. The return on that investment was >>zero. > >I can't confirm that...the fact that it's not in the newspapers >does'nt mean anything. most stuff you and i know about as "new" was >invented years ago...God knows what scary stuff is hidden in many >secret laboratories....would you believe me when i say that it is >now possible to have a less then 1 Milliwatt bug that will >do 5 KM's range ? (Ultra Wide Band / UWB) > > >Look at some links i have put below here...i found back the link i >was looking for,the company that produces such phased array mic >device calls it a > >"SPOTMIC" > >Their website is here: > >http://www.dacaudio.com > >I have to say they certainly don't make a CCS or SPYSHOP impression >and they are represented by other serious companies as well. on top >of that i have seen it on their website 4 years ago...if it would'nt >work they would have removed it. > >Look at the specs wich show that the "Spotmic" can be steered in all >directions (3D) wich are up/down/left/right and distance !...you can >even focus it at a certain distance similar to a binocular ! > >Sad enough the "mics-panel-on-the-surveillance-van-picture" is gone >but you can imagine how that looked if you see the similair painting >on the wall mic (notice that the mics are covered with a textile >structure wich obviously is "open" enough to not cause any damping >of importance) > >The same company does the correlator-box (if i remember well) >wich could be used in addition ...like this: >you connect an additional mic (wireless) to the correlator...this >mike you point at a strong and unwanted sound near the wanted >sound...the correlator then distracts this from your main sound thus >leaving you with more wanted sound...i wasn't able to find that box >on their website. > >So what can i say other then... > >"Phased array microphones exist and they work !" > >Let me know what you think ! > >Here's some links: > > >http://www.dacaudio.com/products/spotmic.html >(produces a "spotmic") > >http://www.dacaudio.com/downloads/newsletters/July2000News.pdf >(more on "spotmic" showing an array of 96 ! microphones) > >http://www.dacaudio.com/downloads/manuals/SpotMic%20Manual.pdf >(spotmic short manual) > >http://www.selectronic.de/DAC/Produkte/Pdfs/sam_spotmic.pdf >(shows 96 microphone array hidden inside a wall painting !) > >http://www.digrec.com/financial/DRI_Annual.pdf >(shows 96 microphone array hidden inside a wall painting !) > >http://www.danschreck.com/microphone.pdf >how it works /mathematics > >http://techreports.larc.nasa.gov/ltrs/PDF/1998/aiaa/NASA-aiaa-98- >0471.pdf >technical/ and heavvy mathematics > >http://www.alango.com/sound/WhitePapers/ADM/AES114_ADM202.pdf > >http://www.andreaelectronics.com/pdf_files/DSDA_spec.pdf > >http://mediafilter.org/CAQ/CAQ56brother2.html >("The FBI has already developed a >solid-state briefcase-size electronically steerable microphone array >prototype, that can discreetly monitor conversations across open >areas"). > > >By the way i have a good idea ! when we discuss some "difficult" >or "exiting" equipment here why not invite their manufacturers to >comment on it...here ! on the list ! ... something like that respons >from REI on the NLJ frequencies...that was good. >i really missed a respons from the manufacturer of that "Spyfinder" >(optical camera detector) i am shure most of us still do'nt know if >it's good or not. >On the other hand many will not respond...for obvious or economical >reasons. > > >pffffff...why do i like this stuff...it took me 7 hours of a nice >sunny day to get it all together :) :) > >Can somebody offer me a paid job to do these kind of >things...somewhere close to a tropical beach please ? > > >Greetings > >Tetrascanner >www.tetrascanner.com > >. > > > __________________________________________________________________ Switch to Netscape Internet Service. As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register Netscape. Just the Net You Need. New! Netscape Toolbar for Internet Explorer Search from anywhere on the Web and block those annoying pop-ups. Download now at http://channels.netscape.com/ns/search/install.jsp 9233 From: A.Lizard Date: Wed Jul 28, 2004 5:02pm Subject: Re: Frequency Filtering Wallpaper At 06:54 AM 7/28/04, you wrote: Is this something that anybody with a screen printer and metallic ink could do? A.Lizard >Message: 10 > Date: Tue, 27 Jul 2004 20:19:32 -0500 (EST) > From: "J. Oquendo" >Subject: Frequency Filtering Wallpaper > > >Writing is on the wallpaper for noisy mobiles >David Smith, technology correspondent >Sunday July 25, 2004 >The Observer > >... > >British scientists have found a way to mass-produce frequency-selective >'wallpaper' screens (FSS) on a large scale for the first time. The screens >are metal grids designed in an intricate pattern which filter out some >radio signals and allow others through, depending on their wavelength. >They can be fitted to walls and covered with real wallpaper so they >disappear from view. > >http://observer.guardian.co.uk/uk_news/story/0,6903,1268797,00.html > >=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ >J. Oquendo >GPG Key ID 0x51F9D78D >Fingerprint 2A48 BA18 1851 4C99 > >CA22 0619 DB63 F2F7 51F9 D78D >http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D > >sil @ politrix . org http://www.politrix.org >sil @ infiltrated . net http://www.infiltrated.net -- member The Internet Society (ISOC), The HTML Writers Guild. "They need to wake up and smell the fire, it is their pants that are burning." hombresecreto, re: the famous SCO threat letter Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@g..., alizardx@y... PGP 8.0 key available by request or keyserver. Download PGP from: http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html ***Looking for INTELLIGENT new technology public policy alternatives?*** http://www.ecis.com/~alizard/technology.html 9234 From: kondrak Date: Fri Jul 30, 2004 3:13am Subject: Scope-camera maker invents new product since I know everyone here likes toys: >http://www.pressrepublican.com/Archive/2002/04_2002/041120028.htm >Scope-camera maker invents new product 9235 From: Date: Thu Jul 29, 2004 11:21pm Subject: Re: Re: Frequency Filtering Wallpaper I think the difference is that they have perfected a way of filtering out unwanted signals i.e cellphone while still allowing wanted signals such as Security radio or pagers etc Dave DEMTEC David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Countermeasures Specialist Electrical Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695 558544 07866206112 demtec@a... _http:www.demtec.co.uk_ (http://www.demtec.co.uk/) [Non-text portions of this message have been removed] 9236 From: eyellbee Date: Fri Jul 30, 2004 11:02am Subject: Re: Remote telephone sweeping scam I assume it's a more expensive variant of what is offered here in the U.K. at: http://www.traceamobile.com/ ..though we also have http://www.urban75.com/Action/news118.html http://www.multimap.com/static/pr/pr11_cybertrackpartnership.htm to consider. TR --- In TSCM-L@yahoogroups.com, Steven Donnell WA1YKL wrote: > They just take the address the ph# is listed to and punch it into to a map search program.. SD > > "James M. Atkinson" wrote: > > > What tickles me is that they provide to provide you with the GPS > > coordinates of the phone, which is a hoot because most telephones do not > > have any kind of GPS receiver in them, nor GPS antenna, or any mechanism by > > which it could provide the coordinates even to the most sophisticated > > eavesdropper, government spy, CIA, etc.. > > > > The service they offer should be listed under "Too Good to be True" > > > > -jma > > > > At 09:11 PM 7/28/2004, Mitch D wrote: > > >Found this today,interesting process,must work great w a "bug > > >zapper",they also claim cell triangulation for a fee........ > > >http://www.tracerservices.com/bugged.htm > > > > -------------------------------------------------- --------------------------------------------------- > > > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > > -------------------------------------------------- --------------------------------------------------- > > > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > > -------------------------------------------------- --------------------------------------------------- > > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > > -------------------------------------------------- --------------------------------------------------- > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > 9237 From: J. Molay Date: Fri Jul 30, 2004 0:47pm Subject: Fleeting Experience, Mirrored in Your Eyes The NYTimes has a story, with some spooky-cool pictures, about software to extract exactly what image a person is seeing with their eyes, just from the reflection on their cornea. You can see even a wider image than the subject and tell what they're specifically focusing on. The possible applications listed include 'surveillance cameras that spot suspicious behavior.' http://www.nytimes.com/2004/07/29/technology/circuits/29next.html?ex=148753600&en=ff5bcfd82b552b5e&ei=5090&partner=rssuserland -- J. Molay 9238 From: kondrak Date: Fri Jul 30, 2004 4:17pm Subject: Re: Fleeting Experience, Mirrored in Your Eyes Theres been a lot of research into this for use in eye-sighted weapons systems, particularly for jet fighter pilots. At 13:47 7/30/2004, you wrote: >The NYTimes has a story, with some spooky-cool pictures, about software >to extract exactly what image a person is seeing with their eyes, >just from the reflection on their cornea. You can see even a wider image >than the subject and tell what they're specifically focusing on. The >possible applications listed include 'surveillance cameras that spot >suspicious behavior.' > >http://www.nytimes.com/2004/07/29/technology/circuits/29next.html?ex=148753600&en=ff5bcfd82b552b5e&ei=5090&partner=rssuserland > >-- >J. Molay > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9239 From: contranl Date: Fri Jul 30, 2004 6:20pm Subject: Re: No parabolic.....Phased Array Microphones ! ("SPOTMIC") . A.W. said: >Indeed? But then you had enough time to learn that acoustic wave >and electromagnetic wave propagate with quite different speeds: >300 mps vs 300 000 kmps. That yields wavelength approximately >1m for 300 Hz. The rest you posted is a pure declaration. Good point and you're right there...i should have used the speed of sound instead of the speed of light I agree that makes a big difference. But...using the correct formula is in favor of my point since it shows that the "acoustic wavelength" is even shorter then the "electromagnetic wavelength" (wich i used wrongfully) So the out-of-phase effect would be even stronger and easier to measure also the spacing between microphones can be smaller (compared to when using the wrong calculation) "They" have probaly tried this technique when whe were both teenagers and have thrown it away as "impossible" at that time...they also said that 100 years ago about flying to the moon...all because the needed techniques (hardware and software) were not available at that time,later some very powerfull Digital Signal Processors have come up and now it is possible. >Phased array microphones do exist, but for surveillance purposes >they are as bulky and bad as all other dicectional microphones. If it works for just a few mic's (see the andrea-demo) then i assume the effect will be even better when more mics are used...probably there is logarithm there...that will show that for every little small improvement you need to double the number of mics.. (the mentioned device uses 96 microphones) >Sorry Gentlemen, now I will correct my initial posting: >This technology was tried and thrown away when both Tetrascanner and I were >teenagers. True ...and it has been picked up again (now we're old and wasted), since better and different technology is available now. Also the company that produces it ...looks trustable and serious to me and their representatives too...i cannot imagine one good reason why they would advertise such a product during 4 years (just to show off ?...trying to make you buy their other products ?) I know some "Spyshop/CCS-style" of companies that do that...but not this one "It is too big" ...depends on when,how and for what you use it... I could imagine that a 2 mtr x 1 mtr panel mounted on/in the side of a surveillance-van could really work. Even a portable briefcase might work...in that case you could sit down in a park and point the "briefcase mic" at a group of people in 50 meters distance...you would then have the choice of: Pre-adjusting (before you arived) the mics for a sharp as possible beam and then pointing the "spotmic" at the group (in that case it might be conspicious looking when you move your briefcase several times) or Leaving the briefcase beside you and pointing the beam at the group by adjusting the electronic beam-steering controls Even if the results would be comparable with a reasonable big parabolic dish..then i would favor the briefcase since that would look way less conspicious. Same goes for a surveillance-van... Say you have to overhear a conversation on a parking lot...when you arrive you do'nt want to attrack to much attention by driving around looking for the right place with good audio...so you park your van more or less in a good spot and then adjust the beam in the right direction...also you may be able to "follow" the subjects while they walk around. The "old way" you would have to use a fixed mic wich would be peeping trough some small hole in the van's body...such a mic is not very directional and needs you to be relative close to the subject. A parabolic dish on top of such a van would be redicioulous... I guess the best way to find out is to ask for a demonstration from mentioned company. Maybe they have a demo-video or audio sample available ? Anyway i am not producing something like that ..so there is nothing to defend for me other then that "it is an interesting technique... and it might work fine in certain applications" Let's say "We are not shure if this works amazingly well" Thanks for your reply Greetings Tetrascanner www.tetrascanner.com . 9240 From: James M. Atkinson Date: Fri Jul 30, 2004 9:03pm Subject: TV Executive Charged with Spying on Fox FX Network http://www.reuters.com/newsArticle.jhtml?type=televisionNews&storyID=5833715 TV Executive Charged with Spying on Fox FX Network Fri Jul 30, 2004 07:45 PM ET LOS ANGELES (Reuters) - A former television executive was charged on Friday with wiretapping staff meetings at Fox's FX cable network after the company fired him and he went to work at competing networks, prosecutors said. Randolph Steve Webster, 38, is accused of wiretapping a conference room via telephone at FX between July 31, 2001 and Jan. 20, 2004, prosecutors said. Webster surrendered on Friday, and was charged with one count of felony wiretapping. If convicted, he faces up to three years in prison. Webster served as vice president of publicity at FX starting in 1999 but was fired in July of 2001. He went on to work at Sony Pictures, helping to plan the Game Show Network, then took a post at Universal Television Group in 2002, prosecutors said. District Attorney's spokeswoman Sandi Gibbons would not reveal what Webster purportedly did with the wiretapped data but said Fox went to authorities after its proprietary information was leaked to the public. Investigators served search warrants at Webster's home and office in February, she said. He is scheduled to be arraigned on Aug. 8. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9241 From: contranl Date: Sat Jul 31, 2004 1:15pm Subject: Broadband over powerline interference (video's) . Some video presentations on how the new "Broadband Over Powerline" (BPL) is interfering with radio-amateur communications. (and with other comms i gues) BPL might be used for Internet connections Security issues are not mentioned but obvious here's a video: http://www.arrl.org/news/stories/2004/06/18/8/BPL-and-HF-web.mpg and here's more: http://www.arrl.org/tis/info/HTML/plc/#Video Tetrascanner www.tetrascanner.com . 9242 From: Tim Van Driska Date: Sat Jul 31, 2004 3:04pm Subject: Re: Test Message --- graniteislandgroup wrote: > This is a test message > > Roger, out. _______________________________ Do you Yahoo!? Express yourself with Y! Messenger! Free. Download now. http://messenger.yahoo.com 9243 From: James M. Atkinson Date: Sat Jul 31, 2004 8:57pm Subject: ...and the lesson here is? The first rule of a homicide investigation is to suspect the killer is the same person who discovered the body, the first person who found the fire is often the one who found it, and the person who found the bomb is often the person who planted it... ... and the person who found the bug is often the person who found it. Which is why people who perform bug sweeps should not play with bugs, should not possess bugs, should not sell buys, should not build bugs, and so on. It doesn't matter if it is a legal bug, illegal bug, test transmitter. On a related note, if your doing a bug sweep, and detect an eavesdropping device... first, suspect the person who engaged you... and then the person that person works for. -jma http://www.nytimes.com/2004/08/01/nyregion/01cop.html Officer Charged in Bomb Blast at Station By MICHAEL BRICK Published: August 1, 2004 A transit officer who was initially lauded for courage and vigilance last month in warning commuters away from a pipe bomb in a Times Square subway station was arrested yesterday and charged with placing the bomb, the authorities said. The officer, Joseph Rodriguez, 27, was taken into custody yesterday morning at Columbia-Presbyterian Center of New York-Presbyterian Hospital, where he had been undergoing psychiatric evaluation, a police official said. Later in the day, he was ordered to undergo more tests to determine whether he was fit to stand trial. Through a lawyer, he has denied any wrongdoing. Mr. Rodriguez was the only person injured when the pipe bomb exploded just after the evening rush on July 19 on the mezzanine in the station leading to the A, C and E lines. But the bomb, inside a bag and packed with black powder and pellets, panicked riders who feared another terrorist attack, and shut down train service in one of the city's largest and busiest stations. That night, the police credited Mr. Rodriguez, who had just finished a shift at the Manhattan Transit Task Force in the Times Square station, with discovering the device, warning people away and calling for backup. Mr. Rodriguez was injured in the leg when the pipe bomb exploded. Within a day, though, he became the subject of the police investigation. The shift Mr. Rodriguez had completed that evening was already set to be the penultimate one in his four-year career; he was being retired on a psychological disability pension. He had been assigned to modified duty, working at a desk without a gun, since the end of 2001, when his superiors decided that he seemed too disturbed by the terror attack of Sept. 11 to function on patrol duty. Federal authorities soon joined the police in investigating Mr. Rodriguez, searching his apartment in Little Italy and finding firearms licenses in other people's names as well as other materials that generated leads. Agents of the federal Bureau of Alcohol, Tobacco, Firearms and Explosives pursued the investigation alongside detectives from the Police Department's Arson and Explosion Squad and its Internal Affairs Bureau. As Mr. Rodriguez underwent psychiatric evaluation, investigators built a case against him based in large measure on inconsistencies in his own statements, according to a deposition filed in court yesterday and signed by a lead investigator. The office of the Manhattan district attorney, Robert M. Morgenthau, issued an arrest warrant for Mr. Rodriguez, and he was taken into custody about 9:40 a.m. yesterday at the hospital in the company of family members, the police official said. The arrest was described as carefully planned, including arrangements for clearance by Mr. Rodriguez's doctors, and took place without incident. Mr. Rodriguez was charged with arson, criminal possession of a weapon and reckless endangerment. The deposition filed in court yesterday, signed by Detective Kevin Parrett of the Police Department's Special Investigations Division, focused on Mr. Rodriguez's statements and behavior at the time of the explosion. For instance, Mr. Rodriguez told investigators that he never touched the bag as he passed it on his way out of the subway station, but a fingerprint matching his was found on it. "Rodriguez initially stated that he couldn't describe the bag because he paid no attention to it, and he stated that he continued up the stairs paying the bag 'no mind,' " Detective Parrett said in the deposition. He added, "Rodriguez denied handling the plastic bag with his hands." The complaint also includes newly disclosed circumstantial evidence. It notes, for example, that on the night of the explosion Mr. Rodriguez was carrying a black backpack containing a piece of paper with the handwritten address of a Web site with bomb-making instructions. The deposition provides some new details of the authorities' version of events that evening, culled from unnamed witnesses and a videotape of the area maintained by the task force. One witness described seeing a man of Mr. Rodriguez's age, build and attire running up the stairs of the station entrance at 43rd Street and Eighth Avenue, pulling back a security gate, crouching and shielding himself immediately before the explosion. That account contradicted statements that Mr. Rodriguez made to Detective Parrett, according to his deposition. Detective Parrett said that Mr. Rodriguez told him he had been walking up the staircase to place a cellphone call. After his arrest, Mr. Rodriguez appeared in state Supreme Court in Lower Manhattan yesterday afternoon. He wore oversized black sunglasses, bluejeans, a short-sleeve button-down shirt and a neck brace, which his lawyer, Edgar DeLeon, said was for treatment of injuries Mr. Rodriguez received on the day of the explosion. Mr. Rodriguez entered no plea to the charges; rather, the court issued an order of examination, and he was taken to Bellevue Hospital Center for psychiatric tests to determine whether he was competent to stand trial. In court, a prosecutor said that Mr. Rodriguez had checked into Columbia-Presbyterian using a pseudonym and that he presented a flight risk. Mr. DeLeon denied that. "He wasn't hiding from the police," Mr. DeLeon said. "They knew where he was. That was only done so he can get treatment and avoid this media scrutiny." Outside Mr. Rodriguez's building on Mulberry Street yesterday, a man who identified himself as Mr. Rodriguez's younger brother but would not give his name said that lawyers had instructed him not to discuss the case. "He's innocent until proven guilty," the man said. "He's a person who doesn't get into trouble. He's a person who doesn't start nothing. He's just a cool guy." Colin Moynihan and Oren Yaniv contributed reporting for this article. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9244 From: Shawn Hughes (Road) Date: Sun Aug 1, 2004 0:33am Subject: Re:Parabolic Microphones At 12:46 PM 7/31/04 +0000, you wrote: >Say you have to overhear a conversation on a parking lot...when you >arrive you do'nt want to attrack to much attention by driving around >looking for the right place with good audio...so you park your van >more or less in a good spot and then adjust the beam in the right >direction...also you may be able to "follow" the subjects while they >walk around. > >The "old way" you would have to use a fixed mic wich would be >peeping trough some small hole in the van's body...such a mic is not >very directional and needs you to be relative close to the subject. Here is what bothers me about this. You are *supposing* this is the tradecraft for how to intercept this type of intelligence. There are several on this board who have conducted this kind of work. For many who do not know you, they assume that since you aren't clear that much of what you say is speculative and based in theory, you are speaking from a position of authority. Your comments concern me because you are stating a proveable fact, and sandwiching it between several paragraphs of guesswork. You waste a lot of bandwidth with your guessing dressed as statements. Is it possible that you could continue to bring interesting things to the list, and pose your questions, but limit your explanations on topics where your direct, hands - on background is limited? I truly apologize for being so direct and blunt, but it needs to be said. Sincerely, Shawn Hughes ============================= Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response, LLC www.warriormindset.com ////////////////////////////////////////////////////////////////////////////// ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. 9245 From: jim33060 Date: Sat Jul 31, 2004 4:34pm Subject: old Household Data Receiver Any oldtimers remeber this: HDS 1800MHz RSL Receiver 1802S Listening Device Bug E-Bay Item number: 5712566318 HDS RSL 1800MHz Receiver This auction is for an RSL Receiver manufactured by Household Data Services Inc. for the US Government. We believe this to be an older receiver for listening devices. It appears in good physical condition, minor scuffs and scratches on the metal casing from use. There is a Signal Strength Meter on the front, measured in DC Millamperes, an Audio control switch with a port for a 1/4" Headphone. The back of the unit has a toggle switch for Video filter, a BNC connection for video out and an RCA connection for audio out, as well as an antenna port. There are 2 ports for power, 11-16vdc and ground. It says it runs at a frequency of 1800mhz. This unit is being sold As-Is. 9246 From: Date: Sun Aug 1, 2004 3:33am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 9247 From: Date: Sun Aug 1, 2004 3:33am Subject: File - spec-ang-2200.pdf File : spec-ang-2200.pdf Description : ANG-2200 Dual Channel Noise Generator Attachment: (application/pdf) spec-ang-2200.pdf [not stored] 9248 From: Date: Sun Aug 1, 2004 3:33am Subject: File - specs-CPM700.pdf File : specs-CPM700.pdf Description : CPM-700 Spec Sheet Attachment: (application/pdf) specs-CPM700.pdf [not stored] 9249 From: Date: Sun Aug 1, 2004 3:33am Subject: File - spec-cpm700-deluxe.pdf File : spec-cpm700-deluxe.pdf Description : CPM-700 DELUXE Spec Sheet Attachment: (application/pdf) spec-cpm700-deluxe.pdf [not stored] 9250 From: Date: Sun Aug 1, 2004 3:33am Subject: File - specs-ORION.pdf File : specs-ORION.pdf Description : ORION Spec Sheet Attachment: (application/pdf) specs-ORION.pdf [not stored] 9251 From: Date: Sun Aug 1, 2004 3:33am Subject: File - specs-OSCOR.pdf File : specs-OSCOR.pdf Description : OSCOR Spec Sheet Attachment: (application/pdf) specs-OSCOR.pdf [not stored] 9252 From: Michael Puchol Date: Sun Aug 1, 2004 5:48am Subject: Large attachments sent to the list Hi, Just as a suggestion, since the Yahoo! groups provide a file-storage area where all members can upload and download from (permissions allowing), wouldn't it be better to upload information about equipment, spec sheets, etc. to this file area, rather than sending it to the whole group? Just today there has been some 2.6 MB of datasheets on the OSCOR, etc. coming via the list. I think I have received this same information twice already, maybe it's sent out with the mission statement, as it came all toghether. Best regards, Mike ----- Original Message ----- From: "Shawn Hughes (Road)" To: Sent: Sunday, August 01, 2004 7:33 AM Subject: [TSCM-L] Re:Parabolic Microphones > At 12:46 PM 7/31/04 +0000, you wrote: > >Say you have to overhear a conversation on a parking lot...when you > >arrive you do'nt want to attrack to much attention by driving around > >looking for the right place with good audio...so you park your van > >more or less in a good spot and then adjust the beam in the right > >direction...also you may be able to "follow" the subjects while they > >walk around. > > > >The "old way" you would have to use a fixed mic wich would be > >peeping trough some small hole in the van's body...such a mic is not > >very directional and needs you to be relative close to the subject. > > > Here is what bothers me about this. You are *supposing* this is the > tradecraft for how to intercept this type of intelligence. There are > several on this board who have conducted this kind of work. For many who do > not know you, they assume that since you aren't clear that much of what you > say is speculative and based in theory, you are speaking from a position of > authority. > > Your comments concern me because you are stating a proveable fact, and > sandwiching it between several paragraphs of guesswork. You waste a lot of > bandwidth with your guessing dressed as statements. > > Is it possible that you could continue to bring interesting things to the > list, and pose your questions, but limit your explanations on topics where > your direct, hands - on background is limited? > > I truly apologize for being so direct and blunt, but it needs to be said. > > > Sincerely, > > > Shawn Hughes > > > ============================= > Shawn Hughes > Special Projects Consultant and Subcontractor > 110 Hughes Hale Lane, Harriman, TN 37748 USA > (865) 335-7992 Voicemail > srh@e... > //////////////////////////////////////////////////////////////////////////// /// > Lead Instructor > Explosives, WMD, and Technical Operations > Tactical Response, LLC > www.warriormindset.com > //////////////////////////////////////////////////////////////////////////// // > > ******NOTICE: Due to the age of my email account, I have to set spam > filtering VERY high. If you do not receive a response in a reasonable > amount of time, please try an alternate communications method. I apologize > for the inconvienence. > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9253 From: kondrak Date: Sun Aug 1, 2004 3:28pm Subject: Re: Large attachments sent to the list With the recent events, I'd say Yahoo is the LAST place I'd store anything of value. At 06:48 8/1/2004, you wrote: >Hi, > >Just as a suggestion, since the Yahoo! groups provide a file-storage area >where all members can upload and download from (permissions allowing), >wouldn't it be better to upload information about equipment, spec sheets, >etc. to this file area, rather than sending it to the whole group? Just >today there has been some 2.6 MB of datasheets on the OSCOR, etc. coming via >the list. > >I think I have received this same information twice already, maybe it's sent >out with the mission statement, as it came all toghether. > >Best regards, > >Mike > > >----- Original Message ----- >From: "Shawn Hughes (Road)" >To: >Sent: Sunday, August 01, 2004 7:33 AM >Subject: [TSCM-L] Re:Parabolic Microphones > > > > At 12:46 PM 7/31/04 +0000, you wrote: > > >Say you have to overhear a conversation on a parking lot...when you > > >arrive you do'nt want to attrack to much attention by driving around > > >looking for the right place with good audio...so you park your van > > >more or less in a good spot and then adjust the beam in the right > > >direction...also you may be able to "follow" the subjects while they > > >walk around. > > > > > >The "old way" you would have to use a fixed mic wich would be > > >peeping trough some small hole in the van's body...such a mic is not > > >very directional and needs you to be relative close to the subject. > > > > > > Here is what bothers me about this. You are *supposing* this is the > > tradecraft for how to intercept this type of intelligence. There are > > several on this board who have conducted this kind of work. For many who >do > > not know you, they assume that since you aren't clear that much of what >you > > say is speculative and based in theory, you are speaking from a position >of > > authority. > > > > Your comments concern me because you are stating a proveable fact, and > > sandwiching it between several paragraphs of guesswork. You waste a lot of > > bandwidth with your guessing dressed as statements. > > > > Is it possible that you could continue to bring interesting things to the > > list, and pose your questions, but limit your explanations on topics where > > your direct, hands - on background is limited? > > > > I truly apologize for being so direct and blunt, but it needs to be said. > > > > > > Sincerely, > > > > > > Shawn Hughes > > > > > > ============================= > > Shawn Hughes > > Special Projects Consultant and Subcontractor > > 110 Hughes Hale Lane, Harriman, TN 37748 USA > > (865) 335-7992 Voicemail > > srh@e... > > >//////////////////////////////////////////////////////////////////////////// >/// > > Lead Instructor > > Explosives, WMD, and Technical Operations > > Tactical Response, LLC > > www.warriormindset.com > > >//////////////////////////////////////////////////////////////////////////// >// > > > > ******NOTICE: Due to the age of my email account, I have to set spam > > filtering VERY high. If you do not receive a response in a reasonable > > amount of time, please try an alternate communications method. I apologize > > for the inconvienence. > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9254 From: James M. Atkinson Date: Sun Aug 1, 2004 3:44pm Subject: Note to Federal Agents [OT: Humor and Satire] Explaining oneself in light of the USA Patriot Act Note to Federal Agents By Holly Hand Because I reported on a protest rally at the recent Democratic National Convention and also attended a couple other demonstrations, I realize I could now be under the scrutiny of federal agents. And because of the USA Patriot Act, these federal agents could enter and search my home at any time. So, Iíve posted this notice on the wall in my front hallway: Dear Federal Agents: The following information will hopefully save you some time if you break in when Iím not here, to snoop through my possessions. I understand that because of the USA Patriot Act, federal agents now have the right to search my home and belongings without a search warrant and without notifying me before or after. This includes you agents searching my books, my computer, and even my underwear, and taking whatever you want, even if Iím not suspected of having done anything wrong. As a patriotic American, I certainly support this law (especially because Osama Bin Laden is still on the loose and so could conceivably be hiding in my home, along with some weapons of mass destruction). Therefore Iíve decided Iíd better tell you agents right upfront about what you may find incriminating in my home and my defense for it. Otherwise I might have (as Ricky Ricardo used to say to Lucy) ìsome ësplaininí to do.î First, when you break into my home, youíll be greeted by my poodle. Because President Bush has been in a snit about France not supporting the US invasion of Iraq, I apologize for having a French dog. However, in my dogís defense, he does not have a French name nor does he understand a word of French. If you look at his AKC pedigree certificate (top shelf of bookcase in the living room), youíll see that he and his parents, grandparents, and seven out of eight great-grandparents were born and raised in the USA. The only exception is one great-grandfather that came from Columbia. Now I know it might raise suspicions that a relative of my dog may have been smuggling Columbian cocaine into the US. However, neither my dog nor I have any knowledge of this. I can also verify that Iíve never heard my dog say anything negative about America. So please do not take my dog into custody. Thank you. Now for my books (bookcases in living room) ≠ I expect youíll be pleased to know that I own several translations of the Bible. I do not own a copy of the Koran or any other Muslim books. And since the US is closely allied to the British (they are of course, the other half of our military ìCoalitionî against Iraq), I hope youíll notice that I have some books by British writers such as Kingsley Amis, Evelyn Waugh and C.S. Lewis. I do admit to having the anti-Ronald Reagan book Generation of Swine by Hunter S. Thompson, but I promise I totally disagree with Hunterís politics, sense of humor and drug/alcohol use. I just keep Generation of Swine around as an example of gonzo journalism. I also have Downsize This by Michael Moore, but I just have it to try to help me understand the ridiculous class-hatred of unemployed blue-collar workers who donít have enough guts or patriotism to make a career in the military. You may be pleased to discover that I have The Fountainhead and Atlas Shrugged, both autographed by Ayn Rand. (I havenít found any capitalists as brilliant and noble as the ones in Ayn Randís books, but Iím still looking!) I also have Own Your Own Corporation and Loopholes of the Rich ≠ two books our president might have read himself! Youíll undoubtedly be looking for my passport (top drawer of my bedroom bureau) and so will be happy to learn from it that since 9/11 Iíve made several visits to our great ally, England, and no visits to any countries harboring our enemies. I have no foreign money in the house except for a few British pounds (money belt in right-hand drawer under kitchen counter). If you look at my laptop computer (on desk in dining room) youíll see itís a Dell, purchased from Dell corporate headquarters in President Bushís great home state of Texas. And please note that I use the patriotically named America Online service. As for my personal items, if you look at my bathroom shelves youíll see that I continually infuse money into the presidentís home state by purchasing Mary Kay cosmetics (corporate headquarters: Dallas). And when you search my underwear (bedroom bureau drawers two through four), youíll discover that I patronize Victoriaís Secret, a British company. Well, I guess that about covers it. I know you federal agents hope to find some dirty laundry to make your break-in worthwhile. If I have any dirty laundry, itíll be in a pillowcase on the floor of the bedroom closet. And if you have time to do my laundry for me (washer and dryer in the basement) Iíd really appreciate it! In conclusion, I hope that when you break in youíll find my home in order and that you will all be convinced that I am a patriotic American. And Iíd appreciate it if when youíre all done snooping through my things you put everything back just the way you found it and lock the door after yourselves when you leave. Otherwise, youíll have some ësplaininí to do. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9255 From: kondrak Date: Sun Aug 1, 2004 4:06pm Subject: Re: Note to Federal Agents [OT: Humor and Satire] ROTFLMAO! At 16:44 8/1/2004, you wrote: >Explaining oneself in light of the USA Patriot Act >Note to Federal Agents > >By Holly Hand > > >Because I reported on a protest rally at the recent Democratic National >Convention and also attended a couple other demonstrations, I realize I >could now be under the scrutiny of federal agents. And because of the USA >Patriot Act, these federal agents could enter and search my home at any >time. So, Iíve posted this notice on the wall in my front hallway: > > >Dear Federal Agents: > >The following information will hopefully save you some time if you break in >when Iím not here, to snoop through my possessions. I understand that >because of the USA Patriot Act, federal agents now have the right to search >my home and belongings without a search warrant and without notifying me >before or after. This includes you agents searching my books, my computer, >and even my underwear, and taking whatever you want, even if Iím not >suspected of having done anything wrong. > >As a patriotic American, I certainly support this law (especially because >Osama Bin Laden is still on the loose and so could conceivably be hiding in >my home, along with some weapons of mass destruction). Therefore Iíve >decided Iíd better tell you agents right upfront about what you may find >incriminating in my home and my defense for it. Otherwise I might have (as >Ricky Ricardo used to say to Lucy) ìsome ësplaininí to do.î > >First, when you break into my home, youíll be greeted by my poodle. Because >President Bush has been in a snit about France not supporting the US >invasion of Iraq, I apologize for having a French dog. However, in my dogís >defense, he does not have a French name nor does he understand a word of >French. If you look at his AKC pedigree certificate (top shelf of bookcase >in the living room), youíll see that he and his parents, grandparents, and >seven out of eight great-grandparents were born and raised in the USA. The >only exception is one great-grandfather that came from Columbia. Now I know >it might raise suspicions that a relative of my dog may have been smuggling >Columbian cocaine into the US. However, neither my dog nor I have any >knowledge of this. I can also verify that Iíve never heard my dog say >anything negative about America. So please do not take my dog into custody. >Thank you. > >Now for my books (bookcases in living room) ≠ I expect youíll be pleased to >know that I own several translations of the Bible. I do not own a copy of >the Koran or any other Muslim books. And since the US is closely allied to >the British (they are of course, the other half of our military ìCoalitionî >against Iraq), I hope youíll notice that I have some books by British >writers such as Kingsley Amis, Evelyn Waugh and C.S. Lewis. > >I do admit to having the anti-Ronald Reagan book Generation of Swine by >Hunter S. Thompson, but I promise I totally disagree with Hunterís >politics, sense of humor and drug/alcohol use. I just keep Generation of >Swine around as an example of gonzo journalism. I also have Downsize This >by Michael Moore, but I just have it to try to help me understand the >ridiculous class-hatred of unemployed blue-collar workers who donít have >enough guts or patriotism to make a career in the military. You may be >pleased to discover that I have The Fountainhead and Atlas Shrugged, both >autographed by Ayn Rand. (I havenít found any capitalists as brilliant and >noble as the ones in Ayn Randís books, but Iím still looking!) I also have >Own Your Own Corporation and Loopholes of the Rich ≠ two books our >president might have read himself! > >Youíll undoubtedly be looking for my passport (top drawer of my bedroom >bureau) and so will be happy to learn from it that since 9/11 Iíve made >several visits to our great ally, England, and no visits to any countries >harboring our enemies. I have no foreign money in the house except for a >few British pounds (money belt in right-hand drawer under kitchen counter). > >If you look at my laptop computer (on desk in dining room) youíll see itís >a Dell, purchased from Dell corporate headquarters in President Bushís >great home state of Texas. And please note that I use the patriotically >named America Online service. > >As for my personal items, if you look at my bathroom shelves youíll see >that I continually infuse money into the presidentís home state by >purchasing Mary Kay cosmetics (corporate headquarters: Dallas). And when >you search my underwear (bedroom bureau drawers two through four), youíll >discover that I patronize Victoriaís Secret, a British company. > >Well, I guess that about covers it. I know you federal agents hope to find >some dirty laundry to make your break-in worthwhile. If I have any dirty >laundry, itíll be in a pillowcase on the floor of the bedroom closet. And >if you have time to do my laundry for me (washer and dryer in the basement) >Iíd really appreciate it! > >In conclusion, I hope that when you break in youíll find my home in order >and that you will all be convinced that I am a patriotic American. And Iíd >appreciate it if when youíre all done snooping through my things you put >everything back just the way you found it and lock the door after >yourselves when you leave. > >Otherwise, youíll have some ësplaininí to do. > > > > >----------------------------------------------------------------------------------------------------- > > >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >----------------------------------------------------------------------------------------------------- > > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >----------------------------------------------------------------------------------------------------- > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9256 From: Mike Dever Date: Sun Aug 1, 2004 4:15pm Subject: Re: Note to Federal Agents [OT: Humor and Satire] ROTFLMAO? Splain! On 02 Aug 2004, at 07:06, kondrak wrote: > ROTFLMAO! > > At 16:44 8/1/2004, you wrote: > > >> Explaining oneself in light of the USA Patriot Act >> Note to Federal Agents >> >> By Holly Hand >> >> > Regards Mike Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Voice: (02) 6254 5337 Email: dca@b... This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 9257 From: kondrak Date: Sun Aug 1, 2004 5:16pm Subject: Re: Note to Federal Agents [OT: Humor and Satire] Old Internet Acronym: R olling O n T he F loor L aughing M y A ss O ff At 17:15 8/1/2004, you wrote: >ROTFLMAO? > >Splain! > >On 02 Aug 2004, at 07:06, kondrak wrote: > > > ROTFLMAO! > > > > At 16:44 8/1/2004, you wrote: > > > > > >> Explaining oneself in light of the USA Patriot Act > >> Note to Federal Agents > >> > >> By Holly Hand > >> > >> > > > >Regards >Mike > >Michael J. Dever CPP >Dever Clark & Associates >GPO Box 1163 >Canberra ACT 2601 >Voice: (02) 6254 5337 >Email: dca@b... > >This message is sent in strict confidence for the addressee only. >It may contain legally privileged information. The contents are not to >be disclosed to anyone other than the addressee. >Unauthorised recipients are requested to preserve this confidentiality >and to advise the sender immediately of any error in transmission. > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > From: e cummings Date: Mon Jul 30, 2001 8:28am Subject: FBI gets millions for tapping DSL and cable modems, encrypted data >http://www.wired.com/news/print/0,1294,45632,00.html > > According to the report accompanying a spending bill that's awaiting a > floor vote in the Senate: > > * The FBI will receive an extra $7 million for technology to thwart > encryption. The appropriations committee intends for it to be > spent on: "(1) analysis/exploitation of systems to allow access to > data pre-encryption, (2) recognition/decryption of data hidden in > plain sight, and (3) decryption of encrypted data." > * Another $7 million goes to a plan to improve "intercept > capabilities." The fed-speak for this is "developing broadband > capabilities, and procuring prototypes capable of intercepting > transmissions outside of the FBI's technical reach." Translation: > Create better ways to eavesdrop on cable modems and DSL > connections. > * Antitrust enforcement gets a boost. The division, best known > recently for its dogged pursuit of Microsoft, receives $3.6 > million extra, but $10 million less than the Bush administration > requested. The committee predicts a slew of mergers because of > "the collapse of high technology stocks, and the resultant > downward pressure on all stock prices." > * Las Vegas, St. Louis, Charleston and Kansas City will split $6 > million earmarked for gun surveillance technology. The plan is to > spend it on acoustic sensors scattered around downtown areas so > the location of a gunshot can be triangulated and located. > >------------------------------------------------------------------------- >POLITECH -- Declan McCullagh's politics and technology mailing list >You may redistribute this message freely if you include this notice. >To subscribe, visit http://www.politechbot.com/info/subscribe.html >This message is archived at http://www.politechbot.com/ 3423 From: e cummings Date: Mon Jul 30, 2001 8:40am Subject: Washington Post magazine cover story: NSA's secret struggles http://www.washingtonpost.com/wp-dyn/style/postmagazine/A44781-2001Jul24.html Washington Post Sunday magazine By Vernon Loeb Test of Strength For two years, Air Force general Michael Hayden has waged a secret struggle to overhaul the world's most powerful spy agency. Nothing's riding on his success but the future of America's national security... 3424 From: Dragos Ruiu Date: Mon Jul 30, 2001 0:32am Subject: Re: tapping fiber optic cables!! On Sat, 28 Jul 2001, Jack Miller wrote: > Are fiber optic cables tappeble with out cutting the > cable and inserting something in between? is there a > similar method like with copper wires were you use > induction to tap it? Yes. I'm told by multiple reputable sources that ethernet induction taps are even being commercially manufactured, though I have no other references or public availability info. cheers, --dr 3425 From: Date: Sun Jul 29, 2001 6:39pm Subject: FBI Using High-Tech Gadgets FBI Using High-Tech Gadgets By D. Ian Hopper AP Technology Writer Saturday, July 28, 2001; 12:23 p.m. EDT WASHINGTON ‚Äì‚Äì By bugging a keyboard or using special software, FBI agents can remotely capture a computer user's every keystroke. With a black box, they can intercept e-mail from miles away. In a van parked outside, they secretly can recreate the pictures on a computer screen from its electromagnetic energy. The legal limits for these new investigative tools will get a test Monday when a federal court in New Jersey examines a mob case in which agents, without a wiretap order, recorded a suspect's computer keystrokes. Privacy experts are watching the case of Nicodemo S. Scarfo Jr. with great interest because it could bring major changes to investigative tactics in the online age. "It's the idea of secret government surveillance technology being installed with very little oversight or accountability," David Sobel of the Washington-based Electronic Privacy Information Center said. "It gets about as close to the common perception of Big Brother as anything I could really imagine." Armed only with a search warrant, the FBI broke into Scarfo's business and put either a program on his computer or an electronic bug in his keyboard ‚Äì officials will not say which ‚Äì and recorded everything typed by the son of the jailed former boss of the Philadelphia mob. The FBI says it needed a password in order to decrypt coded files that allegedly contained records of illegal gambling and loan-sharking operations. Scarfo used the software PGP ‚Äì Pretty Good Privacy ‚Äì to encode his records. PGP is a strong, free encryption program that can be used for e-mail or individual files. The FBI tried to break the encryption without the password, but failed. So agents surreptitiously bugged the computer to capture it from Scarfo himself. Scarfo's lawyer wants a Newark, N.J., federal court to suppress the evidence and make the FBI say how the bug worked. The lawyer says that because the FBI recorded everything Scarfo typed, they got private e-mails that were not part of the investigation. U.S. Attorney Robert J. Cleary has told the court that the surveillance device is a "highly sensitive law enforcement search and seizure technique" and should not be made public. Mark Rasch, former head of the Justice Department's computer crimes section, said that if the device transmitted the captured keystrokes back to the police via e-mail, or emitted them through radio signals, then it might be considered a wiretap. "You really need to understand at what point it captured things, and how it got it back to the government, in order to figure out what the Fourth Amendment concerns are," Rasch said. Authorities have to meet a much higher standard for a full wiretap, which includes filtering out nonrelevant communications and having stronger proof that a crime is taking place. The government argues it only needed a search warrant for Scarfo's computer because the captured keystrokes were not immediately being transmitted on the phone line or on the Internet, and should not be considered the products of a wiretap. There are many tools the FBI can use for secretly capturing computer information. Earlier this year, the FBI used a keystroke bug to nab two Russians suspected of hacking into U.S. Internet companies. The Russians have not yet gone to trial. In addition to the keystroke logger, technicians can sneak in a program that will take intermittent snapshots of the monitor, or install a hidden camera pointed at the computer. There is even a system called TEMPEST that detects electromagnetic emanations from a computer monitor. Agents in a van parked outside can then reconstruct the desktop. The FBI also has received widespread attention for a device ‚Äì formerly known as Carnivore and now called DCS 1000 ‚Äì that can follow suspects' Web browsing, e-mail and instant messages. "If they can find a way to read your mail or peek in your bedroom and find a way for a judge to authorize them to do it, they will do it," Rasch said. The Supreme Court recently reined in one high-tech tactic when it ruled police needed a warrant to use a special heat-sensing device to discover that a man was growing marijuana in his home. However the Scarfo case ends, Sobel said, the high-tech crime landscape is bound to change. "I think it has significant implications for future law enforcement investigations," he said. "This type of investigation is the wave of the future." ‚Äì‚Äì‚Äì On the Net: PGP: http://www.pgp.com Federal Bureau of Inv estigation: http://www.fbi.gov Electronic Privacy Information Center: http://www.epic.org 3426 From: Date: Mon Jul 30, 2001 9:14am Subject: NIGHTLINE: Whatever Happened to Privacy? Forwarded Message: Subj: NIGHTLINE: Whatever Happened to Privacy? Date: 7/30/01 9:43:07 AM Pacific Daylight Time From: listeditor@a... (Nightline) Reply-to: listeditor@a... (Nightline) To: nightlinemail-l@a... (Nightline Mailing List) TONIGHT'S SUBJECT: There are cameras that watch you on the street, at ATMs, sporting events, while you're driving. And you may also be tracked by satellites if you rent a car, or make a cellphone call, or use an electronic pass to pay your toll. Whatever happened to privacy? ---- The year 1984 passed with a whimper, rather than a bang. Aside from the flood of news stories about the fact that those dire predictions had not come about, Big Brother was not watching us. Maybe the year was just wrong. These days, there are cameras all over. Police departments have put them up in high crime areas. Cameras watch intersections, and if you run the light, they not only take a commemorative picture, they send you a ticket. No police officer is ever involved, you never get the chance to try to talk your way out of it with some lame excuse. A rental car company apparently uses GPS, the Global Positioning Satellite technology, to track their cars, and their customers. Break the law, you pay a fine. That electronic pass that lets you drive right through a toll plaza without stopping? It allows the authorities to time you. Get to the next toll booth too soon, and you get a ticket, because the only way to get there that fast is to speed. We had a pretty spirited debate on this subject here at the Nightline offices this morning. One question that came up is whether, assuming you're not doing anything wrong, you have anything to fear from this. Needless to say, we didn't all agree, and I'm betting all of you won‚Äôt agree either. The police say that cameras and other surveillance gear lets them concentrate on other, more important crimes. Others see that as an unwelcome intrusion into their private, and public, lives. John Donvan, who put together the piece tonight, questions whether what we have lost isn't our privacy ‚Äì we don't really expect that when we go out ‚Äì but rather our anonymity. I have to admit that I am somewhat perplexed by one of the channels on my cable TV system. There are cameras set up at various traffic intersections around this area. The channel switches to them in what appears to be a random pattern. Why would anyone watch this? If I'm at home, I'm not really worried about traffic. Is it so people can watch accidents in progress? I don't get it. Politics makes strange bedfellows, goes the old expression. Well, on this issue, the bedfellows are about as strange as they can be. Dick Armey, Republican congressman, is allied with the ACLU in opposing a lot of this. He'll be up against a police chief from San Diego who sees the positive side of this technology. If our debate this morning is any indication, it should be a lively discussion. After all, we didn't seem to mind that Santa Claus knew when we were sleeping, or knew when we were awake, or knew when we'd been bad or good for goodness sake. But do we really trust anyone else with this kind of information? Monday, July 30, 2001 Leroy Sievers Executive Producer Nightline Offices Washington, D.C. ----------- If you have questions or comments regarding this message or a recent "Nightline" broadcast, please do not hit reply; simply click on this link to send your message directly to the "Nightline" staff: http://abcnews.go.com/sections/nightline/Nightline/Nightline_email_form.html Or log on to the new "Nightline" Message Board: http://boards.go.com/cgi/abcnews/request.dll?LIST&room=nightline Chat with "Nightline" guests and find articles, transcripts and video excerpts on our Web site at: http://abcnews.go.com/Sections/Nightline/ You can unsubscribe to the "Nightline" e-mail at: http://login.mailpref.go.com/login Ask your friends to sign up! Send them this link: http://abcnews.go.com/sections/nightline/DailyNews/nightline_login.html 3427 From: DrPepper Date: Mon Jul 30, 2001 1:42pm Subject: Re: NIGHTLINE: Whatever Happened to Privacy? I have a long time friend, that is REALLY paranoid, and anti-government. He told me, many years ago, that this would happen, and I just brushed it off as the ravings of a Paranoid skitso. He told us of the ability of the G, to implant a device the size of a grain of rice under the skin, which would not only be used like a credit card to buy things, thus eliminating cash, but would also be able to track you anywhere in the world. As you may know, a similar device is now used for identifying pets. And credit cards can track you anywhere, now, even as we speak. When the big G gets to that point, cameras will be the least of our problems. And if you don't believe that this will come some day, you are dreaming. He called it the "New World Order", and although I don't think the danger is imminent, I DO think that state of the art technology is here now, that would permit it's use. And if it is available, the Government WILL use it sooner or later. Now I'm beginning to worry about ME!! :-}~ -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ================================================ MACCFound@a... wrote: > Forwarded Message: > Subj: NIGHTLINE: Whatever Happened to Privacy? > Date: 7/30/01 9:43:07 AM Pacific Daylight Time > From: listeditor@a... (Nightline) > Reply-to: listeditor@a... (Nightline) > To: nightlinemail-l@a... (Nightline Mailing List) > > TONIGHT'S SUBJECT: There are cameras that watch you on the street, at > ATMs, sporting events, while you're driving. And you may also be tracked > by satellites if you rent a car, or make a cellphone call, or use an > electronic pass to pay your toll. Whatever happened to privacy? > 3428 From: Aimee Farr Date: Mon Jul 30, 2001 1:55pm Subject: RE: NIGHTLINE: Whatever Happened to Privacy? > -----Original Message----- > From: DrPepper [mailto:DrPepper@i...] > I have a long time friend, that is REALLY paranoid, and anti-government. > He told me, many years ago, that this would happen, and I just > brushed it off as > the ravings of a Paranoid skitso. > He told us of the ability of the G, to implant a device the size > of a grain of > rice under the skin, which would not only be used like a credit > card to buy > things, thus eliminating cash, but would also be able to track > you anywhere in > the world. > As you may know, a similar device is now used for identifying > pets. Don't look now, but.... UK -- "In a trial believed to be a world first, a cross-section of soldiers have allowed themselves to be micro-chipped as part of a study into how new technology may be harnessed to revolutionize the bureaucracy of personal administration. All the troops involved in the project are volunteers. Impetus for phase one of the Army Personnel Rationalization Individual Listings project came from the acclaimed Passports for Pets scheme, from which much of the technology has been adapted. The trial, which began at the start of April, 2001, is to run for six months. Should it be the success which project managers anticipate, the whole of the Army could be micro-chipped by 2010." -- Biometric digest. *laughter* Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR 5400 Bosque, Ste. 675 Waco, Texas 76710 3429 From: DrPepper Date: Mon Jul 30, 2001 1:59pm Subject: Re: NIGHTLINE: Whatever Happened to Privacy? SEE,,, I told you, , , , , , The Brits have always been on the cutting edge of this type of technology. First the army then the crooks, then everybody I wonder why the Briitish Govenrment always wants to track it's people? ---------------------------------------------------------------- Aimee Farr wrote: > > -----Original Message----- > > From: DrPepper [mailto:DrPepper@i...] > > > I have a long time friend, that is REALLY paranoid, and anti-government. > > He told me, many years ago, that this would happen, and I just > > brushed it off as > > the ravings of a Paranoid skitso. > > He told us of the ability of the G, to implant a device the size > > of a grain of > > rice under the skin, which would not only be used like a credit > > card to buy > > things, thus eliminating cash, but would also be able to track > > you anywhere in > > the world. > > As you may know, a similar device is now used for identifying > > pets. > > Don't look now, but.... > > UK -- "In a trial believed to be a world first, a cross-section of soldiers > have allowed themselves to be micro-chipped as part of a study into how new > technology may be harnessed to revolutionize the bureaucracy of personal > administration. All the troops involved in the project are volunteers. > Impetus for phase one of the Army Personnel Rationalization Individual > Listings project came from the acclaimed Passports for Pets scheme, from > which much of the technology has been adapted. The trial, which began at the > start of April, 2001, is to run for six months. Should it be the success > which project managers anticipate, the whole of the Army could be > micro-chipped by 2010." -- Biometric digest. > > *laughter* > > Aimee Farr > mailto:aimfarr@p... > LAW OFFICE OF AIMEE FARR > 5400 Bosque, Ste. 675 > Waco, Texas 76710 -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 3430 From: James M. Atkinson Date: Mon Jul 30, 2001 1:55pm Subject: Re: NIGHTLINE: Whatever Happened to Privacy? Carefully administered dosage of lithium or other similar compound (by a physician) can deactivate most implanted devices and render them useless. ;-) -jma At 11:42 AM -0700 7/30/01, DrPepper wrote: >I have a long time friend, that is REALLY paranoid, and anti-government. >He told me, many years ago, that this would happen, and I just >brushed it off as >the ravings of a Paranoid skitso. >He told us of the ability of the G, to implant a device the size of a grain of >rice under the skin, which would not only be used like a credit card to buy >things, thus eliminating cash, but would also be able to track you anywhere in >the world. >As you may know, a similar device is now used for identifying pets. And credit >cards can track you anywhere, now, even as we speak. >When the big G gets to that point, cameras will be the least of our problems. > >And if you don't believe that this will come some day, you are dreaming. >He called it the "New World Order", and although I don't think the danger is >imminent, I DO think that state of the art technology is here now, that would >permit it's use. And if it is available, the Government WILL use it sooner or >later. > >Now I'm beginning to worry about ME!! >:-}~ >-- >Dr Pepper aka WB6GKI >in the High Desert of California. >Check out my LIVE Hamshack Cam at: >http://www1.iwvisp.com/DrPepper/ham/ham.htm >================================================ > >MACCFound@a... wrote: > >> Forwarded Message: >> Subj: NIGHTLINE: Whatever Happened to Privacy? >> Date: 7/30/01 9:43:07 AM Pacific Daylight Time >> From: listeditor@a... (Nightline) >> Reply-to: listeditor@a... (Nightline) >> To: nightlinemail-l@a... (Nightline Mailing List) >> >> TONIGHT'S SUBJECT: There are cameras that watch you on the street, at >> ATMs, sporting events, while you're driving. And you may also be tracked >> by satellites if you rent a car, or make a cellphone call, or use an > > electronic pass to pay your toll. Whatever happened to privacy? >> -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3431 From: Steve Uhrig Date: Mon Jul 30, 2001 2:50pm Subject: Re: Whatever Happened to Privacy? > I wonder why the Briitish Govenrment always wants to track > it's people? Because they are SUBJECTS of the CROWN, and in most cases, proud to be so. We declared our INDEPENDENCE from England, and the CROWN. We are free, allegedly. Or we were, at one point, until many of us voluntarily traded freedom for "security". Those who did so actually have neither. The Brits and other subjects of the U.K., are not. And my comments are only the tip of the iceberg, but this is not the proper forum. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3432 From: Steve Uhrig Date: Mon Jul 30, 2001 3:12pm Subject: Re: What is this list? Once upon a midnight dreary, Denis Baldwin pondered, weak and weary: > Speaking of the proper forum, what is the mailing list? I got > on here somehow. I'm enjoying it, but have no idea what it > really is. Sometimes we get off on tangents. Below clipped from the www.yahoogroups.com description of this list. Go there to unsubscribe or change options, etc. for this list. Yahoogroups is the web server who hosts this list (hosts=handling the mechanics of subscribing, mailing, etc.) The list has just under a thousand members currently. ________________ TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. _____________________ I am nothing other than just a member of the list. The list belongs to Jim Atkinson and he administrates it. His email is jmatk@tscm.com and his website is www.tscm.com. You may have subscribed there. BTW, TSCM = Technical Surveillance CounterMeasures. Ask if you need to know more. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3433 From: James M. Atkinson Date: Mon Jul 30, 2001 3:17pm Subject: Report: Hanssen key leader in spy unit http://www.infobeat.com/cgi-bin/WebObjects/IBFrontEnd.woa/wa/fullStory?article=410568745 Report: Hanssen key leader in spy unit LOS ANGELES (AP) - While former FBI agent Robert Hanssen was selling secrets to Moscow, he also was a key supervisor in a 1980s domestic program that questioned the loyalty of Americans in an effort to thwart Soviet spy activity, according to a newspaper report. The program monitored peace and anti-nuclear activists and other groups that the White House worried could be manipulated by Soviet propaganda. Its stated goal was to uncover Soviet attempts at altering U.S. policy by influencing targeted groups. Hanssen's initials appear on numerous files among 2,815 pages of formerly classified documents recently obtained under a Freedom of Information Act request, the Los Angeles Times reported Sunday. "It's astonishing that the very guy who was going after dissenters was in fact working for the Soviets,'' said Michael Ratner, vice president of the New York-based Center for Constitutional Rights, a left-leaning political group that has been monitored by the FBI in the past. As federal agents spent thousands of hours collecting political intelligence over a decade, Hanssen was giving his Soviet and Russian handlers a host of U.S. secrets on defense plans, nuclear weapons systems and American intelligence gathering. In a plea agreement reached this month, Hanssen, 57, admitted to 15 criminal counts, including 13 of espionage and one of attempted espionage. Under the agreement, Hanssen will give a full confession of his spying activities in exchange for a life sentence without parole, thus avoiding the death penalty. Hanssen's former boss, David Major, confirmed that Hanssen was ``one of a handful of experts'' on Soviet political influence operations inside the United States. Major is retired from the FBI and works as a counterintelligence consultant. Hanssen's assignment to the bureau's Soviet counterintelligence unit has been reported, but the documents disclosed in April show that he also was a key supervisor in the political intelligence operation. Hanssen declined to be interviewed and the FBI declined to comment further about the confessed spy's activity within the bureau. According to the files, the Soviet Analytical Unit would evaluate information collected about Soviet spies in the United States, analyze raw intelligence reports regarding alleged subversion and provide conclusions to the intelligence community and government officials. Major said Hanssen, who was deputy chief of the unit from 1987 to 1990, ``played a fundamental role in producing the final product. He was significantly involved in the process.'' And even though Hanssen was not head of the unit, he often was left in charge when its chief was supervising other matters. Some documents confirm this by showing Hanssen signing off for his boss. -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3434 From: Dawn Star Date: Mon Jul 30, 2001 5:05pm Subject: Big brother speeding contracts Watching You Rental Car Compay Sued for Tracking Customer's Speed By Bob Jamieson N E W H A V E N, Conn., July 5 ≠ Imagine traveling down the interstate with no police in sight ≠ but being charged by your rental car company for speeding. That's what happened to customers of a Connecticut car rental company, and state officials don't like it. "I feel that my privacy was invaded by being tracked across seven states," says James Turner, who was charged $450 for allegedly speeding three times. "And now I've got a car rental company acting as a state trooper." Turner's trip from Connecticut to Virginia was tracked by Acme Rent-a-Car of New Haven, where he rented the car. Acme installs a GPS system is every vehicle, and charges $150 every time the system catches a customer speeding. The system caught Turner three times: at 78 mph in Connecticut, 83 mph in New Jersey, and 78 mph in Virginia. Acme charged his debit card $450, without even telling him. Turner, a 44-year-old theater box office manager, says he was never given a speeding ticket or even stopped by the police, and that he was going no faster than other cars on the road. "I was keeping up with traffic, moving with the flow of traffic," he says. The company says Turner signed a rental agreement that made clear a fee would be charged for speeding, and that it does not matter whether the police caught him or not. "It's a little different than levying a fine for wrongdoing. It's something that's agreed to by contract," says Max Brunswick, a lawyer for Acme. The company penalizes customers for speeding in an effort to keep its insurance payments down, according to Brunswick. "We do suffer a lot when people speed, because the accident rate goes way up," he says. Turner has sued Acme in small claims court, and Connecticut's Consumer Protection Department has filed a complaint accusing Acme of violating the state's fair trading law by failing to warn customers properly about potential fines. Broader Concerns About GPS Although national rental car companies like Avis and Hertz do not track speed, thousands of their customers use GPS systems every day. The systems can help customers with directions, unlock cars when keys are lost, or help in an emergency by notifying authorities when an air bag is deployed. But every driver using a GPS system leaves an electronic footprint, and that has consumer advocates concerned. "The real issue here is whether the consumer or the individual is going to have any meaningful control over the collection and use of information about where they are," says David Sobel of the Electronic Privacy Information Center. 3435 From: Jordan Ulery Date: Tue Jul 31, 2001 8:45am Subject: Privacy - Political Comentary As Steve pointed out, too many have traded security for liberty. I believe it was that great statesman and reported ladies man Benjamin Franklin who said 'He who craves security over freedom deserves neither!' It is said that every 4th of July the voice of Daniel Webster can be heard over the fields of Marshfield, MA crying out, 'How goes the Union?' In today's nation the question can scarcely be answered for public records are being closed, the government is becoming more and more secretive, the lessons of Nixon are being forgot and when you ask about the state of government, in the town, city, county or state, the reply is too often, it none of your business! In the name of "security" Britain (followed by Canada and Australia) confiscated hand gun recently. The Tony Blair bunch stated that removing handguns from the general population would reduce violent crime and bring safety to the street. As a result, even the Metropolitan Police (Bobbies) are considering getting visibly armed (some already carry concealed); the crime rate is way up and home invasions alone have increased 36%. The reaction of the government (predictably) is to take away more personal liberties and pass more restrictive laws. You and I are responsible for our own actions, it is not the role of government to tell us what to do, rather to ensure that we can do what we want. The caveat being that I can not do anything that harms you and vice versa. At least that is how I read the Declaration of Independence and the Federalist Papers. Conspiracy Theory: Ever wonder why the mandatory reading of the Declaration and Constitution is no longer part of 4th of July celebrations, no longer required in school (along with the pledge)? And why American History as taught today does not detail the Revolutionary War, its Causes and Origins? Or the development of the US from the Colonies to Confederation to Constitutional government is not carefully taught in public schools? Perhaps it is because it is too much to ask that the hoi poi be kept informed about liberty (its duties and responsibilities) and a misconception that it is the role of government to do what is best for you and I. [Non-text portions of this message have been removed] 3436 From: James M. Atkinson Date: Tue Jul 31, 2001 11:12am Subject: In the words of Andy Rooney In the words of Andy Rooney.... These are written by Andy Rooney, a man who has the gift of saying so much, with so few words. Enjoy........ I've learned.... That the best classroom in the world is at the feet of an elderly person. I've learned.... That when you're in love, it shows. I've learned.... Just one person saying to me, "You've made my day!" makes my day. I've learned.... Having a child fall asleep in your arms is one of the most peaceful feelings in the world. I've learned.... Being kind is more important than being right. I've learned.... You should never say no to a gift from a child. I've learned.... I can always pray for someone when I don't have the strength to help in some other way. I've learned.... No matter how serious your life requires you to be, everyone needs a friend to act goofy with. I've learned.... Sometimes all a person needs is a hand to hold and a heart to understand. I've learned.... Simple walks with my father around the block on summer nights when I was a child did wonders for me as an adult. I've learned.... Life is like a roll of toilet paper. The closer it gets to the end, the faster it goes. I've learned.... We should be glad God doesn't give us everything we ask for. I've learned.... Money doesn't buy class. I've learned.... It's those small daily happenings that make life so spectacular. I've learned.... Under everyone's hard shell is someone who wants to be appreciated and loved. I've learned.... The Lord didn't do it all in one day. What makes me think I can? I've learned.... To inure the facts does not change the facts. I've learned.... When you plan to get even with someone, you are only letting that person continue to hurt you. I've learned.... Love, not time, heals all wounds. I've learned.... That the easiest way for me to grow as a person is to surround myself with people smarter than I am. I've learned.... Everyone you meet deserves to be greeted with a smile. I've learned.... There's nothing sweeter than sleeping with your babies and feeling their breath on your cheeks. I've learned.... No one is perfect until you fall in love with them. I've learned.... Life is tough, but I'm tougher. I've learned.... Opportunities are never lost; someone will take the ones you miss. I've learned.... When you harbor bitterness, happiness will dock elsewhere. I've learned.... I wish I could have told my Mom that I love her one more time before she passed away. I've learned.... One should keep his words both soft and tender, because tomorrow he may have to eat them. I've learned.... A smile is an inexpensive way to improve your looks. I've learned.... I can't choose how I feel, but I can choose what I do about it. I've learned.... When your newly born grandchild holds your little finger in his little fist, that you're hooked for life. I've learned.... Everyone wants to live on top of the mountain, but all the happiness and growth occurs while you're climbing it. I've learned ... It is best to give advice in only two circumstances; when it is requested and when it is a life threatening situation. I've learned.... The less time I have to work with, the more things I get done. -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3437 From: Farbox Date: Tue Jul 31, 2001 10:33am Subject: First everpost to the group, and it just had to be this link! http://www.satirewire.com/news/0010/international.shtml Thanks for the great info and expertise, and also the humour. ;-)) Keep It Coming! 3438 From: . Date: Wed Aug 1, 2001 8:14am Subject: re: political commentary. -Offtopic- Greetings list. In response to recent posts I thought I should place my 1 and a half cents in. I have, for years studied the history of the monetary/banking system, history of all known secret societies, illuminati and such. If you know what to look for, the trends in ours and the worlds society become painfully obvious. I assume that the model is planned just like the military is planned, after next. At this point, I am just sort of waiting, although I do not think I will see it in this life time, for Aldous Huxleys 'Brave New World', to come to be. I think we are within an Orwellian period, and will continue to be within it for some time. When I was younger, I was adverse to the idea of a 'managed society'. Now I do not see any other solution, at least with world wide unmitigated breeding..... Oh, and just to freak out anyone who has not utilized Mr. Atkinsons "Lithium Tracking Device Deactivator", by using Federal Reserve Notes you become a 3rd party stockholder in the Federal Reserve, which is Not a part of the U.S. government, hence their lack of ability to frank. The U.S. can at any point call all debts against it null and void, such as the Deficit, which it does not. Lincoln printed Lincoln Greenbacks/died. Kennedy was to do a similar action/died. I could go on for hours on this topic, but, I will not. Brave New World, by Aldous Huxley Society of the Spectacle, by Guy DeBorge History of Secret Societies, author forgotten? Free Agency Liturature, unavailable; monetary/banking history/why the federal reserve is Not part of the U.S. gov./voluntary soc. sec./rescinding federal citizen status/ Shin shin, shin gan. Erik. == The Mind is a Mirror. _____________________________________________________________ Yourname@i...
When you want them to remember!
http://burn.inhell.com 3439 From: Douglas Ellsworth Date: Wed Aug 1, 2001 10:24am Subject: Std Input and Encryption Hi Group, Since my knowledge of encryption algorithms and its progressive nature is exceedingly poor, I'm hoping the list can help me with a troubling thought. Here's the question: What if someone has control over standard input AND the capability to examine the encrypted product of known input. Would this give the person a "leg-up" on breaking the encryption scheme? This is obviously the case in simple coding, but it seems that encryption would add other obstacles. About how much of a "leg-up" would the person enjoy if any? If this is off-topic, a private answer would be appreciated. Many thanks, -Doug Doug Ellsworth Secure Communications Corp., Inc. email: do5ug@r... tel: 402.578.7709 [Non-text portions of this message have been removed] 3440 From: James M. Atkinson Date: Wed Aug 1, 2001 0:22pm Subject: Re: Std Input and Encryption If the analyst has access to ANY fragment of the clear text, or formatting of the text, then the crypto system has to be considered compromised. For example, if an encryption system passes both classified and unclassified materials, and the classified materials are destroyed, but the unclassified materials just go in the dumpster then the cipher can be solved using the unclassified materials. As a rule, if unclassified materials pass though any encryption device then they unclassified material has to become classified as it contains a "fingerprint" of the cipher, and those must be destroyed as classified. -jma At 10:24 AM -0500 8/1/01, Douglas Ellsworth wrote: >Hi Group, > >Since my knowledge of encryption algorithms and its progressive >nature is exceedingly poor, I'm hoping the list can help me with a >troubling thought. Here's the question: > >What if someone has control over standard input AND the capability >to examine the encrypted product of known input. Would this give >the person a "leg-up" on breaking the encryption scheme? This is >obviously the case in simple coding, but it seems that encryption >would add other obstacles. About how much of a "leg-up" would the >person enjoy if any? > >If this is off-topic, a private answer would be appreciated. > >Many thanks, > >-Doug > > >Doug Ellsworth >Secure Communications Corp., Inc. >email: do5ug@r... >tel: 402.578.7709 -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3441 From: James M. Atkinson Date: Wed Aug 1, 2001 0:42pm Subject: re: political commentary. -Offtopic- When I studied Economics is college in graduate school (polishing off my MBA) I was stunned to find out that most monetary systems used since WWII are are based strictly on the faith of the public, and that there really isn't anything backing the currency in use. I am not concerned about any kind of grand conspiracies and other such flights-of-fancy as doing so tend to be a distraction to more important things (like fining bugs and wiretaps). In this business a healthy level of paranoia is a good thing, but don't get so drawn up in it that you start to see things that are not there... because then it becomes an occupational hazard. Please keep the speculations of grand conspiracies off the list unless it involves TSCM or hunting spies. So speaks the moderator, -jma At 6:14 AM -0700 8/1/01, . wrote: >Greetings list. > >In response to recent posts I thought I should place my 1 and a half cents in. > >I have, for years studied the history of the monetary/banking >system, history of all known secret societies, illuminati and such. >If you know what to look for, the trends in ours and the worlds >society become painfully obvious. I assume that the model is planned >just like the military is planned, after next. > >At this point, I am just sort of waiting, although I do not think I >will see it in this life time, for Aldous Huxleys 'Brave New World', >to come to be. I think we are within an Orwellian period, and will >continue to be within it for some time. When I was younger, I was >adverse to the idea of a 'managed society'. Now I do not see any >other solution, at least with world wide unmitigated breeding..... > >Oh, and just to freak out anyone who has not utilized Mr. Atkinsons >"Lithium Tracking Device Deactivator", by using Federal Reserve >Notes you become a 3rd party stockholder in the Federal Reserve, >which is Not a part of the U.S. government, hence their lack of >ability to frank. The U.S. can at any point call all debts against >it null and void, such as the Deficit, which it does not. Lincoln >printed Lincoln Greenbacks/died. Kennedy was to do a similar >action/died. > >I could go on for hours on this topic, but, I will not. > >Brave New World, by Aldous Huxley >Society of the Spectacle, by Guy DeBorge >History of Secret Societies, author forgotten? >Free Agency Liturature, unavailable; monetary/banking history/why >the federal reserve is Not part of the U.S. gov./voluntary soc. >sec./rescinding federal citizen status/ > >Shin shin, shin gan. >Erik. > > > >== >The Mind is a Mirror. -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3442 From: e cummings Date: Wed Aug 1, 2001 10:27am Subject: is a keystroke logger a wiretap? the following case involves a device installed by the FBI in a target's personal computer to surreptitiously record/log everything typed on the keyboard. the FBI got a search warrant to look for data in the computer; it was looking for his PGP password to decrypt files. but they failed to get a Title III wiretap warrant. President Reagan signed the Electronics Communication Privacy Act into law on October 21, 1986. The ECPA was designed to expand Title III privacy protection to apply to radio paging devices, electronic mail, cellular telephones, private communication carriers, and computer transmissions. The ECPA extended Title III privacy protection to both the transmission and storage of digitized textual information exemplified by electronic mail. The Act amended the definition of the term "intercept... to make it clear that it is illegal to intercept the non-voice portion of a wire communication such as the data or digitized portion of a voice communication." The "non-voice portion" includes "electronic communication," which is defined as "any transfer of signs, signals, writing, images, sound, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectric or photo-optical system." so, is a keystroke logger surreptitiously installed in a computer a wiretap? list member's opinions are welcomed. http://www.wired.com/news/politics/0,1283,45730,00.html How Far Can FBI Spying Go? By Declan McCullagh (declan@w...) 9:00 a.m. July 31, 2001 PDT NEWARK, New Jersey -- Nicodemo S. Scarfo is not merely an affable computer aficionado, the son of Philadelphia's former mob boss and an alleged mastermind of a loan shark operation in New Jersey. He's also the defendant in a case that could -- depending on how a federal judge rules in the next few weeks -- dramatically expand the government's powers to spy on Americans or restrict police to traditional techniques. To hear federal prosecutors tell it, the FBI became so frustrated by Scarfo's use of Pretty Good Privacy software (PGP) to encode confidential business data that they had to resort to extraordinary means. With a judge's approval, FBI agents repeatedly snuck into Scarfo's business to plant a keystroke sniffer and monitor its output. On Monday, prosecutors and defense attorneys gathered in Newark's federal courthouse -- an oasis of modern design and skylight-punctuated ceilings surrounded by decaying tenements -- to wrangle over whether such an unusual investigative technique violates privacy rights. U.S. District Judge Nicholas Politan saved his sharpest needling for the assistant U.S. attorney prosecuting the case, asking how a court could accept the government's earnest assurances that its spy technology is permitted by federal law and the Bill of Rights. "Must the court itself accept the bare-faced representation as opposed to having a hearing?" Politan asked. Politan seemed visibly unsettled by how the law should treat the typing-tap and ordered both sides to submit additional briefs by Friday. Was it akin, he wondered, to a telephone wiretap, regulated by the federal law known as Title III? Perhaps it was a general search of the sort loathed by the colonists at the time of the American Revolution and thereafter outlawed by the Fourth Amendment? Or was it, as the government argued, just like cops rummaging in someone's home or office with a search warrant in hand? Politan acknowledged that the keyboard recorder "looks like a wiretap, but it's not." The difference is crucial: If Politan rules that the FBI's keystroke monitor is a wiretap, the evidence may have to be discarded and Scarfo would be far more likely to walk free. That's because wiretaps must follow stricter rules -- such as minimizing information that's recorded -- than the FBI followed. Complicating the case is the government's unwillingness to release details on how the keystroke-capturing system works. The government calls the key-logger "a sensitive law enforcement that is privileged" -- and that its details may be kept from defendants, like the secret locations of bugs and surveillance devices. "It's critical that the details of this technique be made public and be subject to a determination of its legality," says David Sobel, general counsel for the Electronic Privacy Information Center. "What the government is arguing is that it should have the right to surreptitiously install monitoring devices on computers without any obligation to explain what that device does." For their part, the Feds believe so strongly in keeping this information secret that they've hinted they may invoke the Classified Information Procedures Act (CIPA) if necessary. That 1980 law says that the government may say that evidence requires "protection against unauthorized disclosure for reasons of national security." If that happens, not only will observers be barred from the courtroom, but the trial could move to a classified location. Federal security procedures say that if a courtroom is not sufficiently secure, "the court shall designate the facilities of another United States Government agency" as the location for the trial. Prosecutors said in court documents that while they haven't yet invoked those security provisions, "the United States reserves the right, however, at some later date to re-assert all CIPA issues." (The judge has already imposed a gag order on attorneys in this case.) That's mildly puzzling for one very good reason: Spyware is hardly secret stuff. Google features a category called "Keyloggers and Spyware," and dozens of commercial applications are available. Any competent Windows programmer could create such a program in a day or two -- and, in fact, since Windows 95 and 98 and MacOS have security restrictions that aren't exactly water tight, they're ideal platforms to target. That didn't stop Ronald Wigler, an assistant U.S. attorney who specializes in organized crime prosecutions, from insisting that details must remain secret "when dealing with special law enforcement techniques." "The government did nothing improper in this case," Wigler said Monday. "There was no violation in terms of a general warrant.... This was not wholesale rummaging." Mark Rasch, a former Justice Department attorney now at Predictive Systems in Reston, Virginia, said he believed details should be revealed. "You've got to know what it's doing to know what the Fourth Amendment implications are," Rasch said. "It may actually be perfectly valid and appropriate. It may actually minimize (appropriately). You don't know until you know what it does." About the only clue to what kind of key logger was used -- it could be a physical bug hidden in a keyboard or software that runs in the background -- comes from a 24-page list of Scarfo's alleged keystrokes introduced as evidence as Exhibit I. "There's nothing from the output to show or even suggest that any transmission is taking place," Wigler argued, saying that if there was no transmission, it could not be a wiretap covered by Title III. He said, for instance, that a typing recorder could clearly be used on a computer without a network connection. But Scarfo's computer did have a modem, and he did connect to the Internet. And his defense attorneys argued that telephone logs show that their client logged on about once a day. "We should get a report from someone in the FBI's unit regarding what was done, how it was done, and what process was used," said Vincent Scoca of Bloomfield, New Jersey, who is representing Scarfo. He said that Dave Farber, a professor of engineering at the University of Pennsylvania and board member of the Electronic Frontier Foundation, would be testifying as a technical expert on behalf of the defense. Judge Politan may not have been persuaded by the government's arguments but he didn't seem terribly happy with the defense's position either. He wondered what would be the problem if prosecutors said, "We swear under oath we never touched the modem." "How does that different from a warrant for 122 West Market Street looking for drug paraphernalia?" Politan asked. "Isn't this parallel to that?" Norris Gelman, an attorney for Scarfo, replied: "The invasion of privacy is far more than a couple of hours the police could spend rummaging around." Gelman argued that the surreptitious monitoring violated federal wiretap laws and the Fourth Amendment, which requires a precise list of "things to be seized." "You say you did not abridge Title III (wiretap law)," Gelman said. "We want to know how it was that you can make that statement." At one point, Judge Politan complained that there was too much media interest in this case. He said Saturday that he was surprised to see it mentioned "when I was sipping a martini and watching the news on CBS." Politan warned both sets of attorneys not to talk to the media and said, "If I were Sherlock Holmes, I'd find out" who the blabbermouth was. Politan convened the hearing to rule on defense motions to toss out the search for the pass phrase -- which allowed investigators to unlock some allegedly incriminating files -- and to learn more about the technology. He said he wanted more background on some of the details. He ordered the defense to submit a follow-up brief by Wednesday morning and for the Justice Department to submit its response Friday. His ruling could happen anytime thereafter. 3443 From: Gordon Mitchell Date: Thu Aug 2, 2001 0:18pm Subject: Re: Std Input and Encryption What you describe is all that is needed to break some cryptosystems. For example the commonly used wireless LAN protocol described in IEEE 802.11 allows easy cracking of the pseudo random sequence that was used to encrypt data if both the plaintext and cyphertext are known. If a wireless access point doesn't change initialization vectors this gives complete access to all the encrypted data that is subsequently sent. If you would like to learn more about this sort of attack look up "chosen plaintext", a technique that aids cryptanalysis of even industrial strength cryptosystems. I wrote a vulnerability analysis on the 802.11 attack for SANS -- write me for a copy if you would like one. Gordon Mitchell Future Focus, Inc Woodinville, WA Electronic eavesdropping detection & finding clues in computers Douglas Ellsworth wrote: > > Hi Group, > > Since my knowledge of encryption algorithms and its progressive nature is exceedingly poor, I'm hoping the list can help me with a troubling thought. Here's the question: > > What if someone has control over standard input AND the capability to examine the encrypted product of known input. Would this give the person a "leg-up" on breaking the encryption scheme? This is obviously the case in simple coding, but it seems that encryption would add other obstacles. About how much of a "leg-up" would the person enjoy if any? > > If this is off-topic, a private answer would be appreciated. > > Many thanks, > > -Doug > > Doug Ellsworth > Secure Communications Corp., Inc. > email: do5ug@r... > tel: 402.578.7709 > > > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ [Non-text portions of this message have been removed] 3444 From: Dave Emery Date: Wed Aug 1, 2001 8:20pm Subject: Re: Std Input and Encryption On Wed, Aug 01, 2001 at 01:22:59PM -0400, James M. Atkinson wrote: > If the analyst has access to ANY fragment of the clear text, or > formatting of the text, then the crypto system has to be considered > compromised. > > For example, if an encryption system passes both classified and > unclassified materials, and the classified materials are destroyed, > but the unclassified materials just go in the dumpster then the > cipher can be solved using the unclassified materials. > > As a rule, if unclassified materials pass though any encryption > device then they unclassified material has to become classified as it > contains a "fingerprint" of the cipher, and those must be destroyed > as classified. > > -jma While this is true (or at least was true) of US COMSEC regs, what the questioner is asking about is what is called in the world of academic cryptography a known plaintext attack or perhaps the stronger attack called a chosen plaintext attack. Modern ciphers are designed to resist such attacks and every recent proposed cipher that has been examined by the academic crypto community has been very carefully studied for vulnerability to these attacks. Some have indeed fallen to varients of these attacks and have been disgarded as a result. One can fairly say that the current crop of academicly vetted ciphers in wide use (such as AES, Blowfish, Twofish, Idea, Cast, 3DES, RC6 etc) are highly resistant to such attacks, but it is also true that such attacks are certainly amoung the very most standard techniques used by a cryptanalyst to attack a cipher - and indeed attempting to anticipate what the plaintext was or was likely to be for a given ciphertext is standard procedure. And having the ability to supply plaintext to be encrypted has helped break many a cipher, as has discovering that a particular plaintext was enciphered to generate a particular message. Ciphers and codes used in the World War II era and before were particularly vulnerable to such attacks and many were broken through use of known plaintext "cribs". The mechanisms used by the code breaking "bombes" used to derive keys for the German Enigma critically depended on being able to guess that a particular snippet of a message had a particular plaintext - without such "cribs" it would not have been possible to determine the Enigma keys at all. It should be noted that modern crypto design doctrine holds that one should assume one's opponent has access to the encryption algorithm you are using in complete exhaustive detail - the only thing he does not have is the actual keys used to encrypt the message. And these are presumed to be completely random numbers which cannot be predicted. Thus the challenge for the cryptanalyst is to use pairs of plaintext and resulting ciphertext to derive the actual random key used to do the encryption, or at least determine enough information about it to greatly narrow the required search space for a try every-possible-key attack. I might add that modern ciphers such as the recently adopted AES standard and the old standby 3DES are considered extremely difficult to break even given extremely large numbers of chosen plaintexts encrypted with the key in use and their resultant ciphertexts. It is generally accepted that with 128 bit or longer keys none of these ciphers could be broken (the key determined) in the lifetime of a normal person or even the age of the human race even by using the fastest conceivable hardware and terrabytes of known plaintext-ciphertext pairs. Of course as in all such endeavors, human genius sometimes finds means to overcome such obstacles and it is hard to say never. But lots of very very smart people have tried over many years (especially with DES) and nobody has gotten very far, though considerable improvements over random guessing have been discovered. I think it is probably fair to say that properly employed (and that is very very critical) modern strong ciphers cannot be usefully broken even if one can get large numbers of chosen messages encrypted with the unknown key. Most breaks of modern cryptosystems based on known strong ciphers are because they were used improperly or because there was some way of stealing the key or getting access to the message before encryption or after decryption. Software bugs, computer and network security problems, human weaknesses, even TEMPEST issues are the modalities of attack rather than cryptanalysis of the underlying cipher given known plaintext. > > > At 10:24 AM -0500 8/1/01, Douglas Ellsworth wrote: > >Hi Group, > > > >Since my knowledge of encryption algorithms and its progressive > >nature is exceedingly poor, I'm hoping the list can help me with a > >troubling thought. Here's the question: > > > >What if someone has control over standard input AND the capability > >to examine the encrypted product of known input. Would this give > >the person a "leg-up" on breaking the encryption scheme? This is > >obviously the case in simple coding, but it seems that encryption > >would add other obstacles. About how much of a "leg-up" would the > >person enjoy if any? > > > >If this is off-topic, a private answer would be appreciated. > > > >Many thanks, > > > >-Doug > > > > > >Doug Ellsworth > >Secure Communications Corp., Inc. > >email: do5ug@r... > >tel: 402.578.7709 > > -- > > ------------------------------------------------------------------------------------------------- > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008jmatk@tscm.com > ------------------------------------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ------------------------------------------------------------------------------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 3445 From: Dave Emery Date: Wed Aug 1, 2001 9:11pm Subject: Re: is a keystroke logger a wiretap? On Wed, Aug 01, 2001 at 11:27:34AM -0400, e cummings wrote: > > so, is a keystroke logger surreptitiously installed in a computer a > wiretap? list member's opinions are welcomed. > To me there is no question at all that it is. As far as I understand it, there is no requirement that a tapped wire go out to the public street for an intercept to be considered a wiretap. I am pretty sure that someone intercepting traffic on the wires of an internal extension not used for outside calls on a PBX would still be considered to be wiretapping, thus by analogy intercepting traffic on the wire between the keyboard and the computer is clearly also wiretapping even though most of the traffic on it stays inside the computer and is not sent out on the network or modem connections to the outside world. In fact on most all PCs, the messages flowing over the cable between the keyboard and the motherboard are messages between computers on a network - in older machines connecting two 8048 micros - one in the keyboard that scans the keys and one on the motherboard that passes the keystrokes to the main cpu and controls it in other ways - in modern machines a true flexible network (USB) connecting all sorts of processors in many different devices attached to the machine. And I am sure that someone intercepting traffic on an internal ethernet would be wiretapping (I know of prosecutions for installing sniffers), why is tapping the traffic on a USB cable or micro to micro keyboard cable serial link any different - they are both messages between computers on a network after all... And I am very sure that someone who planted a bug on the transmitter of a telephone (the microphone) could not argue that his act was legal just because the audio from the transmitter goes through internal wires into the electronics (network) of the phone and only after running through various OP amps and the like gets sent out over the wire to the street. And certainly some keystrokes on a network or modem connected computer do wind up getting sent out the wires.... -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 3446 From: Tim Date: Wed Aug 1, 2001 9:39pm Subject: Cell phone service cars If you live in a major metropolitan area, you're likely to have seen the company cars operated by employees of cellular/wireless service providers. These vehicles, commonly cars but also SUVs and minivans, contain several cell phone antennas on the top of each vehicle. Can someone tell me what these vehicles are used for? I speculate they are field service engineers working on cell towers, but I also have considered that they may be triangulating signals. Can someone also provide rough ideas of the type of equipment in such vehicles, and whether the antennas can be concealed in the vehicle itself based on intended purpose and vehicle interference concerns? (Grounding, space inside vehicle panels, etc).... I have a hard time believing that the GSM/CDMA test sets I commonly see are designed for in-vehicle use, so i'm wondering what kind of mobile equipment these folks have. Thanks, Tim 3447 From: Tim Date: Wed Aug 1, 2001 9:42pm Subject: mobile crypto I'm looking for references to specialized cryptographic hardware designed for use in a mobile environment or man-packable - i'm not talking about your standard laptop with crypto toolkit software, although information on specialized crypto software would be welcome - i'm looking for hardware processing, both decryption and encryption. References made to gear commonly carried by foreign militaries would also be worthwhile. I'd be marginally more interested in gear available to the general public or commercial institutions, particularly if the gear can be operated in a parallel computing environment. Thanks, Tim 3448 From: e cummings Date: Thu Aug 2, 2001 4:07pm Subject: Re: is a keystroke logger a wiretap? At 08:19 PM 8/1/01 -0700, you wrote: >transmitted >=================================== >Assuming the key logger is a program installed on the computer, the key >logging information is not transmitted anywhere. It stays buried in the >computer. Therefore it does not come under Title III. > >Ed on the contrary--when someone types on a computer keyboard, keystroke data are *transmitted, by wire* to the computer's motherboard and elsewhere. Title III has no statutory exception for information transmitted by wire between two instruments or machines, which oftentimes, is the case anyway. how did you arrive at your assumption that the FBI's keylogger is "a program installed on the computer"? there are sound technical reasons for it to be a hardware--not a software--device. a hardware logging device surreptitiously installed inside a target's computer (or keyboard) would prevent the likelihood of the target accidentally (or intentionally) defeating the wiretap by reformatting their hard drive. moreover, mass-marketed, consumer-grade utility software (i.e., norton utilities) can readily detect any program running in the background (like a keystroke logger.) these facts seem to indicate that a hardware keylogging device makes more sense, and it could be why the FBI is fighting so hard to prevent their having to divulge even the slightest technical details behind their device in the discovery process. in any case, under the 1986 ECPA amendments to Title III, it seems that either hardware or software keylogging methods unambiguously meet the definition of a wiretap, which covers: "any transfer of signs, signals, writing, images, sound, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectric or photo-optical system." what part of that statutory language *doesn't* include keyboard data transmitted by wire(s) from the keyswitches to elsewhere? comments, anyone? -e.c. [Non-text portions of this message have been removed] 3449 From: Aimee Farr Date: Thu Aug 2, 2001 7:07pm Subject: RE: is a keystroke logger a wiretap? Defense "it had a modem" motion @ http://www2.epic.org/crypto/scarfo/def_supp_mot.pdf Guvmint "none of your business" response @ http://www2.epic.org/crypto/scarfo/gov_brief.pdf (see p. 23 for Title I ECPA "wiretap" analysis) Title III was 1968. Today we have Title I, Title II & Title III of the ECPA. The former Title III is Title I of the ECPA. Some courts refer to Title I was the Wiretap Act and Title II as the Stored Communications Act. [1] 2510 INTERCEPTION? See Steve Jackson Games (email wasn't "in flight.") Here, Guv says, we didn't get anything "in flight." And, what if they did? Electronic communications? Where is the suppression remedy? Isn't this the other side of the Steve Jackson Games coin? On the "wire theory" - the Guvmint says "DOES NOT AFFECT INTERSTATE OR FOREIGN COMMERCE." The attached phone recorder hardware question, somewhat analogous under wire communications, was settled by the "or other" addition to ECPA. Previously, courts differed as to whether it was an "aural acquisition" (Turk, 5th Cir.) or a "mere accessory designed to preserve the contents of the communication" (United States v. Harpel, 493 F.2d 346, 350 (10th Cir.1974). They changed it with the ECPA to address private carriers and in-house private systems because THEY AFFECT INTERSTATE OR FOREIGN COMMERCE (added clause). (Previously, in house systems were exempt from "wire communications," by the "common carrier" language, and analyzed under the "oral" provisions.) In a like manner, "electronic communication" includes any transfer....transmitted by a ....SYSTEM...that affects interstate or foreign commerce. See 2510(12). This was within one computer, is that an "electronic communications system" 2510(14)? If so, WHERE IS THE INTERSTATE COMMERCE CONNECTION BETWEEN YOUR KEYBOARD AND YOUR COMPUTER? [2] I am reminded of the video surveillance analysis in United States v. Torres, 751 F.2d 875 (7th Cir.1984). They had probable cause to search a "safe house," and got a warrant for video surveillance. The court looked to Title III procedure (2518) for guidance, but found it outside the act. "There is no right to be let alone while assembling bombs in safe houses," they said. Courts have adopted the Torres analysis for vid surv.... (1) probable cause, (2) particular description in court order for place/things [notice something missing?], (3) minimization of recording activities not related to the crime under investigation; (4) that normal investigative techniques have failed because they are either too dangerous or unlikely to be successful; (5) limitation of surveillance period. I find Torres analogous in terms of how the court might approach this, although it is distinguishable. Isn't a keystroke logger akin to vid surveillance of what my little fingers are doing right now? (The response did not cite to the Torres line of cases, but I think it is persuasive in terms of what they are DOING instead of "the thingie" they do it with.) [3] When in doubt - ask Congress. Maybe they will answer with the CESA (Cyberspace Electronic Security Act). However, public opinion on Carnivore kind of messed THAT up. Interested to hear other thoughts, I am new to surveillance law, and it is like a complex woman. I have 2,500 cases over here, but my eyes only have human optical character recognition capability. ~Aimee Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR 5400 Bosque, Ste. 675 Waco, Texas 76710 \ 3450 From: A Grudko Date: Fri Aug 3, 2001 3:40am Subject: Keystroke logger -- Original Message -- > ... a hardware logging device > surreptitiously installed inside a target's computer (or keyboard) would > prevent the likelihood of the target accidentally (or intentionally) > defeating the wiretap by reformatting their hard drive. I have read about keyboard transmitters, both real time and 'store & burst' (my term) but have never seen one. In our sweeps we only check PCs & laptops which the client indicates carry sensitive data. Our procedure is a combination of physical inspection and RF sweeping (the latter being confusing because of all the noise that the computer and any network facilities generate). By their nature I assume these devices to be expensive, sophisticated and used mainly in upper-end surveillance ops. and rarely encountered. Anyway, my point is that my interest has been peaked and as this is not the kind of thing one will see in 'The Spy Shop' here can anyone supply me links to sites where I can view these types of items, their specs. and any indications of special locate procedures. Thanks Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.icon.co.za/~agrudko, Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) GIN, SACI, WAD, CALI, SAMLF, SCIP, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom "When you need it done right - first time" "Experience is the name everyone gives to his mistakes" Oscar Wilde - A tribute to the late Roy Lawson. 3451 From: Steve Uhrig Date: Fri Aug 3, 2001 10:10am Subject: Opto Xplorer nicad replacement Hi all, I originally did this post for the Xplorer list (yahoogroups.com) and figured I would copy it here since I know a number of list members use the Optoelectronics Xplorer. Review the below before purchasing a replacement nicad pack from Opto for an older Xplorer. I recently bought a used Xplorer from a gentleman who had it updated to the new software by Opto a few months ago. My unit was manufactured in 1996. (In response to questions on the Xplorer list) No, Opto does not replace the nicads when you have the upgrade done. They charge $100 for the upgrade (which is probably a software flash done in 90 seconds without even opening the unit) and $39 for a nicad pack, so the economics are obvious. The nicad was not holding a charge in the unit I got from the fellow, and cycling it a few times didn't help. I even put it on a professional battery analyzer which we have here in the lab as a manufacturer of government electronics, many powered by nicads. We must test their packs 100%, and we generally cycle them 5x on the analyzer to bring them up to full capacity. The nicad was bad, so I called Opto and ordered, by part number listed on the shrink wrapped pack, another one from Opto. The order taker read the part number back to me. That was cheaper at $39 than building one from the military grade cells we have here which cost $15 each, and there are six in the pack. The pack came from Opto yesterday, and it was a different part number than the old one, and would not fit. The old pack was 5 cells side by side vertically in a row, and one sitting on top of the others, longways, all shrink wrapped. This physical configuration is necessary to clear the antenna connector on the top of the chassis (which sticks down inside about 3/4 of an inch) and a 90 degree connector where the other end of the coax jumper connects to the circuit board. The coax connector on the top of the unit is a standard BNC bulkhead mount, and the RG174 coax is swaged into the bottom. This makes for a long connector overall. The pack I got was six cells side by side, shrink wrapped. Different part number. I called Opto to see if they had sent the wrong pack and to arrange to get the proper one. Well, Opto has laid out the more recent Xplorers differently than the earlier ones. The 90 degree connector is in the center bottom of the foil side of the board on the older units. According to Adam, a knowledgeable tech at Opto, the new pack will not fit the older Xplorers because of clearance problems with that 90 degree connector. He offered to build me a pack in the right configuration to fit my unit, and I get to spend $1.49 to send the improper pack back to them. Adam did mention apparently there were three board layouts in the Xplorer, as he suggested removing the charging board from the back cover of the Xplorer where it is mounted horizontally above the nicad pack and rotating it 90 degrees and sticking it back down vertically. On mid production designs, apparently, that will provide clearance for the currently offered nicad pack to fit. My unit is the earliest design and the new pack will not fit no matter what you do. The Applied Power Inc part number for the proper pack in my older unit (discontinued by them according to Opto) is AP#551423. The pack they sent which does not fit is an AP#551786. So be sure to check/ask if you are ordering replacement nicad packs for your Xplorer! Yes, any idiot who can solder can get some solder tab AA nicads from Mouser or Radio Shack and make one himself in the proper old configuration. I did not, for reasons mentioned above. Cheaper for me to buy one than to use shop time and resources to make one. To replace the pack in the Xplorer, you merely unsolder two wires coming from the old battery pack going to the charging board, and solder in the wires from the new pack. Very easy solder job; they left huge long tinned pads on my unit. That charging board has a three pin mini male Molex connector on it, mounted at 90 degrees to the board. (Stupid; the connector with power on it should have been female). The rest of the Opto guts, which is all the electronics mounted to the front half of the chassis, has a short cable with mating connector. So you unplug that connector to separate the rear cover of the Opto to which the nicad pack is stuck with double sticky tape, so you have plenty of room to work. The charging board, as they call it, is merely a small PC board providing the interface from the solder pads to the Molex connector. Another point: the old nicad pack had a listing of 900 milliamp hours. The new one is listed as 1000 mAh. Voltage is 7.2V, not that it matters for purposes of this discussion. I had no way to test the old pack since it was bad, but the new one is lying. Our ($5000) nicad analyzer showed, after 5 cycles, an average of 662 mAh. Honesty would consider this a 650 mAh pack. I doubt I had a bad new pack. I suspect either the manufacturer is lying (very common; whoever quotes the best number wins the order or can justify a higher price), or the standards for measuring have changed. The world standard for secondary battery capacities has been to measure at the 20 hour discharge rate. This is the rate the government mandates in their spec, and the rate our analyzer uses in its computations. If there is a new standard which lets Applied Power and others claim a 650 mAh nicad pack is now 1000 mAh, it probably would be at something like a 100 hour discharge rate. Note the above applies to nicads only. Nickel metal might well be 1000 mAh in a AA size cell, and rechargeable lithiums a good bit more than that, in both performance and price. But these are nicads. Just wanted to share the above with the gang. If anyone is interested, there is an article on batteries in the Articles section of our website. Dated, but still valid. Regards .... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: Robert G. Ferrell Date: Tue Aug 1, 2000 11:16am Subject: Re: Professionalism? >> They were concerned because the last TSCM firm they >> hired came in wearing full "ninja" costumes, complete >> with hoods. Middle-aged Mutant Ninja Spooks. Probably want their own TV show next. If you want to inspire confidence in your competence, dress professionally. If you want to inspire terror (and deep misgivings) in your clients, dress like a paramilitary dork. Cheers, RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 1053 From: James M. Atkinson, Comm-Eng Date: Tue Aug 1, 2000 11:23am Subject: Pentagon Scrutinizes Handheld Security Pentagon Scrutinizes Handheld Security http://www.fcw.com/fcw/articles/2000/0731/news-pda-07-31-00.asp BY George I. Seffers 07/31/2000 The Defense Department is conducting a top-down review of security concerning the use of personal electronic devices, including palmtop computers, certain pagers, cell phones and laptop computers. The review is part of a larger DOD effort to institute tougher security measures and to treat the Pentagon as a command center for the nation's defense. "The basic concept of the renovation has evolved from treating the Pentagon as an "office buildingí to the recognition that it is in fact a "command center,í " wrote Rudy de Leon, deputy secretary of Defense, in a July 14 memo. Arthur Money, the assistant secretary of Defense for command, control, communications and intelligence, is conducting a review of "all physical security policies to ensure they remain applicable in todayís technologically sophisticated environment," according to de Leonís memo, which went to top leaders in the Pentagon. Pentagon spokeswoman Susan Hansen declined comment because the review is still in process. Martin Libicki, a senior policy analyst with the think tank Rand Corp., said the devices under review can be configured to pose threats in three general areas: remote access to networks, electronic eavesdropping and data removal. For example, a personal digital assistant (PDA) might be configured to download information and remove it from the building. "In theory, a [palmtop computer] has the capacity of a floppy disk. A person might only remember 100 words of text but can download thousands," Libicki said. Officials at the Air Force Research Laboratory (AFRL), which develops some of the service's most advanced technologies, are also crafting a policy to deal with security risks posed by the proliferation of electronic devices, and lab officials are debating whether it should be a formal or an informal policy. Among other things, AFRL recommendations forbid the use of wireless PDAs and the use of privately owned PDAs for official business. "If I issue a government PDA and classified information gets on it, and the only approved way of cleaning it is to destroy it, that's OK. But if they own it, they would be quite upset with me when I destroy their PDA," said Jeffrey Pound Sr., AFRL chief technology officer. Pound pointed out that current policies already address some concerns. Two-way communications devices such as cell phones and two-way pagers are already forbidden in sensitive or classified areas. But with the proliferation of new electronic devices, he said, current policies might not be enough. "A PDA, you could argue, is not a two-way communications device, but walking in, linking it up to a computer, downloading information and walking out again, in my mind, constitutes a two-way communications device," Pound said. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1054 From: James M. Atkinson, Comm-Eng Date: Tue Aug 1, 2000 11:31am Subject: ECHELON: Deaf Ears [Moderators Note: Finally, an article that deals with the reality of "Echelon", instead of spouting off wildly with paranoid ranting. An excellent, well written, and objective article on the subject matter.] Deaf Ears http://washingtonpost.com/cgi-bin/gx.cgi/AppLogic+FTContentServer?page name=wpni/print&articleid=A64431-2000Jul28 By William M. Arkin Special to washingtonpost.com Monday, July 31, 2000 You send an Email, fax a friend, talk on your cell phone or participate in an Internet chat session; you can be sure that the National Security Agency is listening. Get a grip. . . . The Internet might be all Echelon, all the time, but in the real world, the NSA can barely track all the foreign leaders, diplomats, governments, military units, terrorists, international drug dealers and criminals it is directed to snoop on. Add to that the explosion of fiber optics and wireless devices, which presents eavesdroppers with new challenges of interception at the very times when there is a quantum increase in the overall volume of communications. Throw in the increasingly difficult task of "breaking" ever more sophisticated codes, and you might ask yourself the question as to why any sane person would conclude that Big Brother has the resources, let alone the interest, to keep tabs on you or me. The Know Nothings A ha, I can hear the paranoids responding, that's where Echelon comes in. This five-government "global surveillance system" is the very computer system that allows huge volumes to be sifted without human intervention. Echelon, controlled by the NSA at Fort Meade, MD., in cooperation with Britain, Australia, Canada and New Zealand, allows governments to specify the subjects they are interested in, and Echelon automatically routes material - faxes, Email traffic, telephone calls - from the big ear to prying eyes. Is Echelon, as the American Civil Liberties Union says, "the most powerful intelligence gathering organization in the world"? Or is it, as the equally liberal National Security Archive says, "a more limited program"? I tend to fall in the archive's camp. One of the reasons the archive thinks Echelon's assault on privacy is overblown is not just the web of oversight that exists in the post-Vietnam, post-Watergate era. They and other sane skeptics of Echelon-mania point to technological barriers that stand in the way of an all-hearing, all-seeing network. Sifting Through While I agree that Echelon is only symbolic of American imperialism and privacy denied, the latest anti-McDonald's rant from Europeans who should be asking questions about their own governments, the Internet and portable device explosion has propelled the intelligence listeners to obtain new hardware and software to satisfy even the worst nightmares. Enter the Multi-Intelligence and Information Exploitation (MIITE) research program of the Air Force Research Laboratory in Rome, N.Y. The laboratory describes the $25 million three-year effort as focusing on "identifying and developing technology to support global awareness, data fusion, dynamic planning, data warehouse functions, and force execution." In English? Synetics Corp., a subsidiary of BAE Systems and the prime contractor, coordinates 45 teammates ranging from the largest defense contractors (Lockheed Martin, Computer Sciences Corp.) to niche intelligence companies such as Delfin and QuesTech, all of whom specialize in signal processing and data management to develop some of the very capabilities to do what Echelon opponents believe is already being done. According to Air Force documents associated with the May 1999 contract, MIITE brings together the efforts of 79 disparate information technology research projects, many of which have shown promise in dealing with huge amounts of information to create predictive intelligence on the battlefield. One goal is to solve the bottlenecks associated with intercepted material. You're Hearing Voices Projects 32 through 39 of MIITE are developing new automated audio exploitation techniques to improve the speed and breadth of intelligence collection. Intelligence agencies have identified a "serious shortfall in ability to identify and handle large volumes of communication messages," the Air Force documents say. Project 32 is developing the capability to identify languages and dialects "independent of speaker and what is being said." In the first phase of research, language databases were developed and tested against thousands of transmissions. The result? Eighty-one percent recognition of five languages by listening to less than a half a second of speech. Peruvian and Cuban dialects were distinguished in Spanish language traffic with 80 percent accuracy. Project 33 has demonstrated the ability to identify and sort 41 separate male speakers with 86 percent accuracy within just two seconds of hearing each speaker. Project 34 has demonstrated identical accuracy in recognizing 60 speakers after training on about six seconds of speech. The goal? Message sorting by speaker, aircraft identification by pilot's voice, automatic language to language and then voice to text transcription. Project 38 is even working on recognizing cellular phone and frequency hopping data with only one second or less of transmission so digital signals in the air that are sliced up into tiny packets for transmission to cell towers can be reconstructed both accurately and quickly without having to intercept the transmission at its source. MIITE is a rare opportunity to get a look at the state of art in the business of collecting and sifting huge amounts of difficult-to-process information. The technologies being researched should give some indication of both the enormous difficulties the intelligence monitors face in a world where their targets are so varied and the technologies so uncooperative. MIITE hardly scratches the surface of NSA's direct research efforts, to be sure. But the notion that the government can simply listen in on any communication in any mode and that someone in the government has the time or would actually be interested in analyzing stray traffic when extracting the target material is so difficult should demonstrate how utterly and totally off-base Echelon paranoia is. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1055 From: Steve Uhrig Date: Tue Aug 1, 2000 0:06pm Subject: Re: Professionalism? Once upon a midnight dreary, Robert G. Ferrell pondered, weak and weary: > >> They were concerned because the last TSCM firm they > >> hired came in wearing full "ninja" costumes, complete > >> with hoods. During my last sweep my ninja costume was out at the cleaners, so I had to wear an ordinary suit. No wonder I got no respect. I wear tasteful business attire but carry an old pair of Navy coveralls for the grubby work. I have ruined more than one suit in my day, chasing lines through rat infested basements where you are on your knees, or lines through elevator shafts. When you're only charging $200 for a sweep, you can't afford to wreck many suits. Remember, first impressions ... There is a well known ripoff sweep team with HQ in NY who shows up for sweeps in a limo. Maybe they know something we don't. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1056 From: Miguel Puchol Date: Tue Aug 1, 2000 3:44pm Subject: RE: ECHELON: Deaf Ears James, Great article, and well-balanced, in my opinion. Some comments: > The Internet might be all Echelon, all the time, but in the real > world, the > NSA can barely track all the foreign leaders, diplomats, governments, > military units, terrorists, international drug dealers and criminals it is > directed to snoop on. Add to that the explosion of fiber optics Well, it should be clear to anyone that the amount of information that can flow through the various voice and data channels available to mankind could not possibly be processed automatically, at least now. It requires an amount of computing power and storage space not available to anyone at this time. Targeted interception, aimed at particular channels, is more likely. For example, it is extremely easy to intercept ALL faxes sent via Inmarsat, with adequate hardware and at a moderate cost. Another example, Intelsat carries a huge amount of the long-distance calls placed around the world, so it's another sweet spot for interception. > Echelon, controlled by the NSA at Fort Meade, MD., in cooperation with > Britain, Australia, Canada and New Zealand, allows governments to specify > the subjects they are interested in, and Echelon automatically routes > material - faxes, Email traffic, telephone calls - from the big ear to > prying eyes. It's more feaseable that targeted surveillance combined with some automatic processing for keywords or speech patterns be successful. > Project 32 is developing the capability to identify languages and dialects > "independent of speaker and what is being said." In the first phase of > research, language databases were developed and tested against > thousands of > transmissions. The result? Eighty-one percent recognition of five > languages > by listening to less than a half a second of speech. Peruvian and Cuban > dialects were distinguished in Spanish language traffic with 80 percent > accuracy. If IBM can do it with ViaVoice and sell it for a few bucks, imagine someone with $25 million... > The goal? Message sorting by speaker, aircraft identification by pilot's > voice, automatic language to language and then voice to text > transcription. > Project 38 is even working on recognizing cellular phone and frequency > hopping data with only one second or less of transmission so > digital signals > in the air that are sliced up into tiny packets for transmission to cell > towers can be reconstructed both accurately and quickly without having to > intercept the transmission at its source. If you look at a GSM cellphone signal with freq-hopping on, on your spectrum analyzer, it takes a band around 1MHz wide and hops inside it, but only around some 15 or so different frequencies. So, it should be quite possible to do what it's stated in this article. Echelon paranoia - I think there is plenty going around !! All the best, Mike 1057 From: James M. Atkinson, Comm-Eng Date: Tue Aug 1, 2000 4:17pm Subject: Re: Professionalism? At 1:06 PM -0400 8/1/00, Steve Uhrig wrote: >Once upon a midnight dreary, Robert G. Ferrell pondered, weak and weary: > > > >> They were concerned because the last TSCM firm they > > >> hired came in wearing full "ninja" costumes, complete > > >> with hoods. > >During my last sweep my ninja costume was out at the >cleaners, so I had to wear an ordinary suit. When my Ninja outfit at the cleaner I have a rabbit suit I can use, but you have to watch those floppy ears. The stick on cotton tail has some static issue as well. >No wonder I got no respect. > >I wear tasteful business attire but carry an old pair of >Navy coveralls for the grubby work. > >I have ruined more than one suit in my day, chasing lines >through rat infested basements where you are on your knees, >or lines through elevator shafts. Yep... but damaged suits are a occupational hazard I guess. When I was in the service most of the technicians and engineers would wear old fatigues for work and just patch up the holes. Instead, I was an "up and comer" and stuck to dress blues. I used to destroy uniforms and was buying at least 2-3 new dress shirts, and a new pair of pants every month). Interestingly the guys who wore dress blues had an easier time getting promoted, and were treated better by the higher ups, and seemed to be the only ones selected for special assignments and leadership projects. >When you're only charging $200 for a sweep, you can't >afford to wreck many suits. > >Remember, first impressions ... Projecting a neat appearance, and being properly dressed for the job is often just as important as the equipment you use (at least in the eyes of your client). I've seen TSCM people who will spend a quarter million dollars on sweep gear, attend every class out there, but will not bathe, shave, or spend 20 dollars on a clean shirt. >There is a well known ripoff sweep team with HQ in NY who >shows up for sweeps in a limo. Maybe they know something we >don't. > >Steve Hmmmph, No doubt that they are the same clowns who flash "Miami Vice" shoulder holsters with fake guns in them, and dress in old trench coats and lab coats to WOW the clients. Sad... really sad... -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1058 From: Tom Mann Date: Tue Aug 1, 2000 4:46pm Subject: Re: Professionalism? - Ninja Uniforms Dear Jim: Unbelievable story about the ninja suit. Your advice is right on...dress like a professional, and blend in, but don't over do it, because you'll be made. Tom Mann Guardian International 1059 From: Rob Muessel Date: Mon Jul 31, 2000 9:08am Subject: Re: Telephone Problem To answer Ian's questions: 1. I'm not sure what you mean by 3 way. If it means bridging two calls together, yes. 2. ISDN Centrex service can offer conference capabilty. 3. No 4. No 5. The date stamp on the message was five days after the conversation took place. Also, for every other speculator, Person C did NOT have voice mail on the cell phone! -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 1060 From: David Miller Date: Tue Aug 1, 2000 0:32pm Subject: RE: Pentagon Scrutinizes Handheld Security Along the same lines as JA's post: From Security Portal By Jim Reavis jreavis@s... for SecurityPortal The Palm Pilot July 3, 2000 - I freely admit to often watching the cartoons with my children, and often laughing louder than they do. One of my favorites has always been Inspector Gadget, and the seemingly endless number of handy, albeit often inappropriate, devices he could produce from beneath his hat and trench coat. I often feel the same sort of wonder in the real world, as each day brings a new assortment of information appliances and gadgets, aiming to bring simplicity and productivity to the wired among us. As one of many people who has tried too long and too hard to realize all of my productivity gains on the back of an overworked PC, I am happy to try to find other solutions. Personal Digital Assistants and smart phones are the most popular of the new devices that let us take our work with us - that untether us from the corporate LAN and allow for a truly plug-and-play future. This trend towards smart devices, as opposed to running everything through a PC, is likely to provide long term benefits to the cause of information security as well, as simplicity in design is one of the best friends to security. However, as anyone who has had a firecracker blow up in their hand can tell you, size does not matter and many simple gadgets pack an amazing amount of power. With that comes a threat to a corporate LAN, if the issue is not properly understood. In this article, we will look at the most common of these devices, the ubiquitous PalmPilot from 3Com. Personal Digital Assistants, such as PalmPilots and Pocket PCs, pose a security threat for a number of reasons: they are relatively new; their small size and low cost make them easy to obtain and difficult to control; they have tremendous connectivity and storage capabilities; and most of all, they are extremely popular. It is a breeze for even a novice computer user to setup a PalmPilot to synchronize data with a desktop PC. The challenge isn't just the hidden sophistication of these devices, but the decentralized manner by which they are obtained. Whether or not you have a few of these productivity tools floating around your company, it is a good idea to understand the security issues and know how to secure them. In a nutshell, these are the major security topics of discussion we hear regarding PalmPilots: their lack of security by default; their poor user practices; their potential use by criminals; and the possibility of viruses and other mainstream malicious code being written for and adapted to the PalmOS environment. Insecure by Default If you are a devoted PDA user and misplaced your bags on a trip, your first fear may be losing your wallet, but fright number two is probably worrying about what would happen if someone got hold of your PalmPilot. Typically, a person who finds a PalmPilot will be able to view everything that is on it without so much as entering password: a shrunk-down version of a corporate spreadsheet, credit card numbers, passwords to the company mainframe, even your significant other's phone number and birthday. The PalmPilot is not a device that you would consider "secure by default." The security application allows you to lock your PalmPilot with password protection, but it is not possible to make this the default operating mode for your PDA. Rather, you must manually select the locking option from the security program before it automatically powers off, or it will be unprotected. Consequently, most PalmPilots are not normally locked down. When passwords are used, they are not masked upon entry, allowing people to use the old "shoulder surfing" method to get your password. In order to add satisfactory security to your PalmPilot, you must search out 3rd-party software to add the necessary components. Several software packages are available to automatically lock down the PalmPilot after a predefined period of inactivity, and require authentication to regain access to the system. Two popular choices that I have used successfully are TealLock! and OnlyMe. Both applications provide the needed functionality lacking in the core PalmPilot. In addition to automatically locking the PDA, they also mask passwords upon entry to prevent visual snooping. Additionally, you can input owner information, so, on the odd chance that an honest person finds your PalmPilot, he will know where to send it. TealLock! http://www.palmgear.com/software/showsoftware.cfm?sid=97240820000621020542&p rodID=1109 OnlyMe http://www.palmgear.com/software/showsoftware.cfm?sid=97240820000621020542&p rodID=2350 In addition to these simple systems for locking down your PalmPilot, we are beginning to see biometric products for restricting access. Taking advantage of the stylus input feature, a product called CIC Sign On uses signature verification to create a logon utility for PalmPilots. CIC Sign On http://www.palmgear.com/software/showsoftware.cfm?sid=97240820000621020542&p rodID=4662 Use Secured Applications Even if a PDA user is diligent about physically protecting their PalmPilot or has implemented a lockout system, they may not have their information stored securely. If someone gains unauthorized access to a PalmPilot, there are no inherent encryption capabilities to protect individual files, although you can use a password to hide records marked as private. A common security problem is using the stock memo pad utility for storing sensitive information. This application has no built-in security, but again there are 3rd-party products to do the job. There are two categories of applications that I would like to highlight for you Inspector Gadget wannabes - Secure Memo Pads and Secure Account Managers. Memo Safe is a very simple to use application. It is very similar to the stock Memo Pad application, but allows you to selectively encrypt memos, using the SAFER SK encryption algorithm. Memo Safe is very simple to use application. It is very similar to the stock Memo Pad application, but allows you to selectively encrypt memos, using the SAFER SK encryption algorithm. SAFER SK Encryption Algorithm http://home.ecn.ab.ca/~jsavard/crypto/co0403.htm Memo Safe 2.54 http://www.palmgear.com/software/showsoftware.cfm?sid=97240820000621020542&p rodID=4408 Certicom, well known as the developer of Elliptical Curve Cryptography (ECC) toolkits and solutions, has developed a freeware replacement for the Memo Pad application called Secure Memo Pad Encryptor. Certicom claims that this is a "workalike" replacement for the Memo Pad, capable of performing 163-bit ECC encryption. Certicom, Secure Memo Pad Encryptor 1.3 http://www.palmgear.com/software/showsoftware.cfm?sid=97240820000621020542&p rodID=2181 Because people use PDAs as "little black books" of sensitive information, applications have emerged specifically for the secure storage of account numbers, passwords, PINs, etc. Secret! is a quick and simple utility for storing these records, and uses 128-bit IDEA encryption. Mobile Account Manager is a similar application; although it's not as speedy, it has more features, including a nice desktop PC interface. Mobile Account Manager uses the SAFER encryption algorithm. CryptInfo is another nice option, using Triple DES for encryption security. Secret! http://pdacentral.xmission.com/palm/preview/028-011-002-006C.html 128 Bit IDEA Encryption http://home.ecn.ab.ca/~jsavard/crypto/co0404.htm Mobile Account Manager http://www.palmgear.com/software/showsoftware.cfm?sid=97240820000621020542&p rodID=954 CryptInfo http://pdacentral.xmission.com/palm/preview/028-011-002-017C.html Palms for the Bad Guys Beyond their relatively insecure architecture that can pose a threat to legitimate users, PalmPilots can also be handy tools for the bad guy. Their small size, pervasiveness and "instant" boot-up make them nice devices to sneak in and turn on for a variety of uses. Their robust connectivity capabilities can allow them to be used as a tiny network sniffer; they can "learn" some infrared codes to intercept data or control devices (my PalmPilot is also my VCR remote control) or they can simply provide a tiny platform for manually recording sensitive data. Tools that can be used responsibly can be used for malicious behavior as well. An interesting possibility that was raised late in 1998 was the scenario of using a PalmPilot in the commission of crimes. According to the British science publication New Scientist, a PalmPilot equipped with "learning" remote control software can capture the codes used to unlock doors or cars that use infrared signals. Most cars use an incompatible radio frequency system and/or "code shifting" that changes the code each time it is used. The hacker group L0pht Heavy Industries has done development work with the PalmOS platform and has devised a war-dialer for the PalmPilot, allowing you to scan a phone system or a range of phone numbers for answering modems. L0pht Heavy Industries http://www.l0pht.com/~kingpin/pilot.html Although it hasn't happened yet, PalmPilots are in theory susceptible to viruses and malicious code. The HotSync process used to add applications and to transfer data could be an easy conduit for Trojan horse programs. Anti-Virus companies are looking at the issue and doing research, although no software packages are currently available. It will likely take a Melissa-type issue to sell anti-virus solutions for the PalmPilot, as spare system resources can be minimal on a PDA. It could be that part of the solution will be desktop-based - checking the code before it gets downloaded via HotSync. However, as more and more PalmPilots go wireless, another communications conduit will be opened and another vulnerability exposed. Even though PalmPilots can be misused, it is difficult to identify anything an IT security manager could do to defend against PDA-based threats, above and beyond what should already be done to maintain overall systems security. You should develop an awareness of any infrared technologies you are using. Identify anything that uses an IR signal to get unlocked, and verify that it uses a technique that cannot be "learned" by a PalmPilot. PalmPilots are one of the better gadgets that do not reside solely in the cartoons. They are wonderful productivity tools, and you can have mine as soon as you can pry it out of my cold, dead hand. You will not be able to banish them from your network, but can instead take steps to keep your data out of the palms of the bad guy's hands. [Non-text portions of this message have been removed] 1061 From: Manny G. Date: Tue Aug 1, 2000 9:15am Subject: Letter of introduction Hello everyone. First and foremost, I would like to thank Mr. James Atkinson for adding me to this list and Mr. Steve Uhrig and Mr. Rick Hofmann for their advice. I enjoy the articles and comments made on the list. My name is Manuel Gonzales. I am a college student and will be graduating next year. My background is in computers and international studies. I am studying electronics on my own and it is really fascinating. I am planning to go into the military in the areas of Intelligence: Signals and/or Counter-Intelligence. I noticed that a lot of the members on the list come from various branches of service and agencies. I wanted to know, does it matter what branch of service you go into in the field of TSCM or SIGINT? How different are each branch considering the trend in the 21st century is joint-operations. Thank you everyone for your time. Sincerely, Manuel Gonzales ________________________________________________________________________ Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com 1062 From: Steve Uhrig Date: Wed Aug 2, 2000 7:18pm Subject: Professional attire? Hello list, Below is copied from an email from another member of this list who did not want to be identified. His words, not mine. The man is reliable. -------------------------------- True Story ... I was never actually able to get proof enough to say it's gospel in public nor did my friend know the name of the company the team worked for but I have a friend who is a third shift guard supervisor at a major pharmaceutical company in (somewhere in the U.S.) One night about three years ago he was instructed by his management to give some 'visitors' unescorted access to certain areas in the wee AM hours. His two top bosses and other company management later joined the party. Being good at his job he naturally 'snooped' and saw what he recognized to be an obvious sweep effort in progress (he used to wear a uniform for me and happened-upon me a time or two when I did some executive offices). What struck him to be a little bit odd was that the three dudes doing the job all wore white light- grade tyvek haz-mat coveralls with yellow rubber boots and gloves. And they all wore black web belts with Colt .45's on their sides. I guess the 'special' bugs they sought were classified as hazardous materials and if one was found and tried to run away the only way to neutralize it would have been with a hot shot of lead. I would have gladly forked-over a case of beer if my friend only had the presence of mind to take a candid picture or two. ----------------------- Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1063 From: Dawn Star Date: Wed Aug 2, 2000 7:53pm Subject: suit up "Personally, I always dress like one of vice presidents at the place I am visiting, and by default wear a very conservative business suit (when in doubt always wear a suit)." jma In the 2500 or so sweeps I've done, I've always dressed like a common phone man. Lineman's hand set, tool belt, and carry a business card of the local phone company. In that time I've never been challenged and all facilities doors have been opened for me every time no problem. Never bothered on a pole or in a street access. Low profile, low profile, low low low profile! Roger Tolces, Electronic Security Co., Los Angeles [Non-text portions of this message have been removed] 1064 From: Jeremy Funk Date: Wed Aug 2, 2000 9:44pm Subject: Re: Letter of introduction Hello Manuel: I am not a regular contributor to this group, but I, like you, enjoy the articles and the banter. I am an Army ex-SIGINTer. I spent 2.768 wonderful years in Ft Bragg, NC, pushing SINCGARs and PRD-13s out of planes. It was an enlightening experience, I would recommend it to anyone who enjoys one helluva challenge. The six month layover in Monterey,CA para aprender espanol was the best part, IMHO. I am now a Reservist in a relatively new IOC outfit in Texas. We do a lot of network scans, excellent classroom work and enjoy frequent TDY pay. Most of this falls under the 74B MOS listing. If you are interested in a military career, at least with the Army, check out the following MOS descriptions: 98C, 98G, 97E, 97B, 33T, and 74B. Perhaps the knowledgeable and esteemed fellows on this list could add further advice to mine. Thank you for your time. Jeremy Funk At 8/1/00 2:15:00 PM, you wrote: >Hello everyone. > >First and foremost, I would like to thank Mr. James Atkinson for adding me >to this list and Mr. Steve Uhrig and Mr. Rick Hofmann for their advice. > >I enjoy the articles and comments made on the list. > >My name is Manuel Gonzales. I am a college student and will be graduating >next year. My background is in computers and international studies. I am >studying electronics on my own and it is really fascinating. I am planning >to go into the military in the areas of Intelligence: Signals and/or >Counter-Intelligence. > >I noticed that a lot of the members on the list come from various branches >of service and agencies. I wanted to know, does it matter what branch of >service you go into in the field of TSCM or SIGINT? How different are each >branch considering the trend in the 21st century is joint-operations. > >Thank you everyone for your time. > >Sincerely, >Manuel Gonzales >________________________________________________________________________ >Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > 1065 From: Gordon Mitchell Date: Wed Aug 2, 2000 9:55pm Subject: Re: suit up Low ethics, low ethics, low low low ethics. Dawn Star wrote: > "Personally, I always dress like one of vice presidents at the place I > am visiting, and by default wear a very conservative business suit > (when in doubt always wear a suit)." jma > > In the 2500 or so sweeps I've done, I've always dressed like a common phone man. Lineman's hand set, tool belt, and carry a business card of the local phone company. In that time I've never been challenged and all facilities doors have been opened for me every time no problem. Never bothered on a pole or in a street access. Low profile, low profile, low low low profile! > Roger Tolces, Electronic Security Co., Los Angeles > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 1066 From: Ian Carter Date: Thu Aug 3, 2000 0:09am Subject: Re: Telephone Problem > To answer Ian's questions: > 1. I'm not sure what you mean by 3 way. If it means bridging two calls > together, yes. > 2. ISDN Centrex service can offer conference capabilty. > 3. No > 4. No > 5. The date stamp on the message was five days after the conversation > took place. > > Also, for every other speculator, Person C did NOT have voice mail on > the cell phone! > OK, by process of elimination; Hi Rob,, It has to be the switching, supporting the CENTREX in the CO (The Telco Central Office) that is not properly configured. (The Telco do need to be informed of this problem). Via process of elimination, if what I have been provided with is correct, then the following is happening: There is switching in the CO. A piece of equipment with many ports (10,000 in some, others like in Toronto which does have the capacity of zillions if integrated into virtual networks)...each port is assigned a station number...a 4 digit number, that of the actual station that the subscriber owns via the Telco. When a call is placed into a switch, the switch which was open when no call is placed, now closes when a call is routed. When a call is routed, the port of the callers station and the port of the called parties station is closed to create a loop line circuit so conversation can be commenced. There are different types of switches ...most now are SS7, standing for a signaling system grade 7 which supports the networking of internet needs, like DSL and ISDN. This is a very complex switching system, but basically, this system is called intelligent Network signaling. It allows POTS network via use of telephony to translate into ISDN...some parts of the switching actually route via virtual network. Basically, I feel because of the situation you have explained...this SS7 switch is not configured correctly, however it is in the area of the voice mail. I feel the port is being left closed onto the loop somewhere in the area of the CENTREX voice mail. What this means is you are damn lucky that dude C had no voice mail, but you need to get a tech to inspect the system. But the problem is, even if the tech fixes it...it will occur again, as just in a PC, glitches happen when dealing with virtual networks. For high level calls, the most basic system should be used. Like pots only line to line, no added features, no voice mail, no call waiting, no 3 way, not ISDN, nothing. For in fact VERY high level calls, he should use a pager, or a separate Trunk into the man he often calls (Like a dedicated line). He then should not use a DID line or any WAN or Voice Network Addressing lines (PBX to PBX). It is not a bug or anything like that...it is a glitch in voice mail...like when you are on the PC and you send me a letter....and I never receive it because of a minor protocol glitch, can be a minor glitch from outside my PC like my IP was down when you sent the letter, or even a inner glitch like the orders of my stacks did not set up right when I booted up one day. Whatever the reason, you send a letter, and around and around it goes. It is the same for the e-mail as it is for the voice mail in SS7. A glitch is occurring, and there will always be a chance of a glitch...that will route the call around and around in voice mail form till finally it hits a voice mail associated somehow with the system (Not in this case coming back to the owner, yet associated). The glitch is in the Voice mail section....so even though there was a conversation in the room it still went into a voice mail, but why of party B? Party B had to have been called sometime, and thus it was a port connection once processed from within the system...perhaps the system went to all the ports outside of the office or within and could not terminate, and kept going till it did find a place to route, and terminated at the party B because even if he was not the last called, it still was the route that was tried by the system as it had circled around till it found an acceptable port. The man A must have hit something that closed his port and opened a loop and started the cycle, without knowing it, as he was hanging up from party C. In the second situation, the same thing happens, only the Voice Mail does not land for 5 days. It cant be a simple 3 way mistake, because of the fact of the mail landing 5 days later in part 2 of the situation. It is not the ISDN malfunctioning as in the phone itself, because you are calling out in situation one, but calling in for situation 2, so it is an entry into the system, and an exit from the system that both cause a similar situation...thus, the problem has to be further down the line, which means it has to be the Switch which supports CENTREX. Since it is a voice mail that is receiving the talk, or the long to deliver message...it has to be the Voice Mail section of protocol that is not functioning correct. Confusing perhaps - But speak to the clients Telco Guys (not the operator) and they may be able to resolve the problem. In my opinion there's nothing to be suspicious about Tech wise - Its just the Telco Advancers that cant keep up with their promises. Brest Regards - Ian 1067 From: Perry Myers Date: Wed Aug 2, 2000 7:24pm Subject: RE: Professional attire? There is another way to remove an illegal listening device that is often not discussed. Shoot it! Perry D. Myers, CFE President Myers Service, Inc. Investigations 2076 N. Elston Ave. Suite 200 Chicago, IL. 60614-3940 Phone 773-342-8300 Facsimile 773-486-4430 e-mail: perry@m... For information on investigative services please visit our web site at www.myersservice.com This e-mail is strictly confidential. If you receive this e-mail in error, please forward immediately to info@d... -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Wednesday, August 02, 2000 7:18 PM To: TSCM-L@egroups.com Subject: [TSCM-L] Professional attire? Hello list, Below is copied from an email from another member of this list who did not want to be identified. His words, not mine. The man is reliable. -------------------------------- True Story ... I was never actually able to get proof enough to say it's gospel in public nor did my friend know the name of the company the team worked for but I have a friend who is a third shift guard supervisor at a major pharmaceutical company in (somewhere in the U.S.) One night about three years ago he was instructed by his management to give some 'visitors' unescorted access to certain areas in the wee AM hours. His two top bosses and other company management later joined the party. Being good at his job he naturally 'snooped' and saw what he recognized to be an obvious sweep effort in progress (he used to wear a uniform for me and happened-upon me a time or two when I did some executive offices). What struck him to be a little bit odd was that the three dudes doing the job all wore white light- grade tyvek haz-mat coveralls with yellow rubber boots and gloves. And they all wore black web belts with Colt .45's on their sides. I guess the 'special' bugs they sought were classified as hazardous materials and if one was found and tried to run away the only way to neutralize it would have been with a hot shot of lead. I would have gladly forked-over a case of beer if my friend only had the presence of mind to take a candid picture or two. ----------------------- Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1068 From: James M. Atkinson, Comm-Eng Date: Wed Aug 2, 2000 11:08pm Subject: Re: suit up At 5:53 PM -0700 8/2/00, Dawn Star wrote: >"Personally, I always dress like one of vice presidents at the place I >am visiting, and by default wear a very conservative business suit >(when in doubt always wear a suit)." jma > >In the 2500 or so sweeps I've done, I've always dressed like a >common phone man. Lineman's hand set, tool belt, and carry a >business card of the local phone company. In that time I've never >been challenged and all facilities doors have been opened for me >every time no problem. Never bothered on a pole or in a street >access. Low profile, low profile, low low low profile! > Roger Tolces, Electronic Security Co., Los Angeles Err... ok... But your going to have a seriously tough time convincing a CEO or a company to cough up a 5 digit check for you to consult with them for three days. Maybe I should duct tape a parabolic dish to my head and stick a dipole in my ears for the RF segment of my sweep... But's it going to get really touch humping around a 45 pound spectrum analyzer in my tool belt (no offense is meant). Seriously folks, but DO NOT try to look like a phone lineman unless you are actually climbing poles, crawling around in plenums, etc, etc, etc. There is a time and a place to look like a cable monkey, and a time to look like a professional. Under no conditions would I ever carry or present a business card unless it had my own name on it, my own address, and my own company name (officially sanctioned government projects excepted). -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1069 From: Date: Wed Aug 2, 2000 7:54pm Subject: Re: suit up In a message dated 8/2/00 7:58:58 PM Pacific Daylight Time, gordonm@b... writes: << Low ethics, low ethics, low low low ethics. >> If he doesn't have any problem sleeping or looking in the mirror, who are you to say his ethics are low? eth*ic (noun) [Middle English ethik, from Middle French ethique, from Latin ethice, from Greek ethike, from ethikos] First appeared 14th Century 1 plural but singular or plural in construction: the discipline dealing with what is good and bad and with moral duty and obligation 2 a : a set of moral principles or values b : a theory or system of moral values c plural but singular or plural in construction: the principles of conduct governing an individual or a group d : a guiding philosophy 1070 From: Tom Mann Date: Thu Aug 3, 2000 9:38am Subject: Re: suit up Interesting comment. Ethics is not a field determined person by person based upon each individuals beliefs. Ethics, at least in a true profession, are accepted norms of conduct that ensure that all the people participating in the profession conduct themselves in an appropriate manner. There are all sorts of things I could do and be able to "look myself in the mirror" over. But they may not be ethical. Whether the original post about how this person dresses is ethical or not is not the issue for me. The issue is, and always has been, when people decide for themselves their own ethical standard outside of the profession. It can make everyone look stupid. Food for thought. Tom Mann Guardian International MACCFound@a... wrote: > > In a message dated 8/2/00 7:58:58 PM Pacific Daylight Time, > gordonm@b... writes: > > << Low ethics, low ethics, low low low ethics. >> > > If he doesn't have any problem sleeping or looking in the mirror, > who are you to say his ethics are low? > > eth*ic (noun) > [Middle English ethik, from Middle French ethique, from Latin ethice, from > Greek ethike, from ethikos] > First appeared 14th Century > 1 plural but singular or plural in construction: the discipline dealing with > what is good and bad and with moral duty and obligation > 2 a : a set of moral principles or values > b : a theory or system of moral values > c plural but singular or plural in construction: the principles of conduct > governing an individual or a group > d : a guiding philosophy > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 1071 From: Date: Thu Aug 3, 2000 6:48am Subject: Re: suit up In a message dated 8/3/00 7:45:33 AM Pacific Daylight Time, guardian@n... writes: << Ethics, at least in a true profession, >> Let's lose this thread. Opinions are like noses, et al. I can see this deteriorating into a rant on sex organ size. This list is TSCM-L@egroups. Go to www.egroups.com and start a Sweep Ethics or TSCM Ethics list. Those that can do. What is it that people who criticize do? 1072 From: Dawn Star Date: Thu Aug 3, 2000 10:53am Subject: motivation "Err... ok... But your going to have a seriously tough time convincing a CEO or a company to cough up a 5 digit check for you to consult with them for three days" jma. In my view sweeping is not about money, it is about protecting and preserving the peoples 4th and 5th Amendment right to privacy. Attempting to preserve this right for the future. It is the core of our freedoms that allows our other rights to be exercised. This is why I've done over 2500 sweeps in 27 years, I've swept places for no money at all! Roger Tolces, Electronic Security Co., Los Angeles [Non-text portions of this message have been removed] 1073 From: Robert G. Ferrell Date: Thu Aug 3, 2000 10:49am Subject: Re: suit up >I can see this deteriorating into a rant on sex organ size. Well, over on the IETF-Announce list we're talking about hacking into elevators and why 'four' is a bad number in Japan. Must be something in the air... RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 1074 From: Pesach Lattin Date: Thu Aug 3, 2000 2:01pm Subject: Re: motivation Please come to sweep my house on a constant basis for free. I am pretty sure the 4th and 5th amendments apply to me a lot. ---------------------------------------------------------------- Pesach Lattin, Computer Crime Specialist Voice Mail: (914) 818-3727 Fax: (240) 337-8339 Webmaster, Federal Law Enforcement Officers Association HQ: ph: (717) 938-2300 fax: (717) 932-2262 Visit our website @ http://www.fleoa.org ---------------------------------------------------------------- ----- Original Message ----- From: Dawn Star To: Sent: Thursday, August 03, 2000 8:53 AM Subject: [TSCM-L] motivation > "Err... ok... But your going to have a seriously tough time > convincing a CEO or a company to cough up a 5 digit check for you to > consult with them for three days" jma. > > In my view sweeping is not about money, it is about protecting and preserving the peoples 4th and 5th Amendment right to privacy. Attempting to preserve this right for the future. It is the core of our freedoms that allows our other rights to be exercised. This is why I've done over 2500 sweeps in 27 years, I've swept places for no money at all! > Roger Tolces, Electronic Security Co., Los Angeles > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1075 From: Pesach Lattin Date: Thu Aug 3, 2000 10:40am Subject: Re: suit up Agreed - whenever phone guys enter anywhere I am working, I tend to call up the local phone company to check if the person is a "real" phone lineman. If they don't have the guy on record, you will get a knee in the back while you are being handcuffed. There has been enough problems both in Gov't and business with people dressing up like phone lineman to steal information, plant ESIDs and so on to make me paranoid. Maybe the tool belt exposing your crack brings you pleasure, but no matter what you do look as professional as possible. If it makes you happy, think of your self pretending to be a phone company executive. ---------------------------------------------------------------- Pesach Lattin, Computer Crime Specialist Voice Mail: (914) 818-3727 Fax: (240) 337-8339 Webmaster, Federal Law Enforcement Officers Association HQ: ph: (717) 938-2300 fax: (717) 932-2262 Visit our website @ http://www.fleoa.org ---------------------------------------------------------------- > Err... ok... But your going to have a seriously tough time > convincing a CEO or a company to cough up a 5 digit check for you to > consult with them for three days. > > Maybe I should duct tape a parabolic dish to my head and stick a > dipole in my ears for the RF segment of my sweep... But's it going to > get really touch humping around a 45 pound spectrum analyzer in my > tool belt (no offense is meant). > > Seriously folks, but DO NOT try to look like a phone lineman unless > you are actually climbing poles, crawling around in plenums, etc, > etc, etc. There is a time and a place to look like a cable monkey, > and a time to look like a professional. > > Under no conditions would I ever carry or present a business card > unless it had my own name on it, my own address, and my own company > name (officially sanctioned government projects excepted). > > -jma > > > =================================================================== > Everybody's into computers... Who's into yours?Å > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Lizard, The Other White Meat > =================================================================== 1076 From: Miguel Puchol Date: Thu Aug 3, 2000 1:05pm Subject: Cell-disturbing devices - self-inflicted tapping... Hi all, I came across a cellular phone 'disruptor'(to use Klingon terms) for some $140, which works rather well. Different cell bands are available, and up to three can be mixed in one device. Until now, the only reliable devices I've seen are made in Israel, but this one is straight out of Taiwan. There isn't a manufacturer's name anywhere on the device, so I can't provide more references. I now have to look at this thing with the SA, will keep posted. Could be useful (apart from illegal to use) in sensitive meetings, or to cure some of those self-inflicted wire tappings. It certainly disabled my GSM(900MHz) and DECT(1800MHz) phones. One more story on this - woman calls husband on cellphone. She say's she'll be late tonight, and proceeds to visit lover. She then presses unknowlingly the redial button on the handset. Husband hears all the 'action'.... All the best, Mike 1077 From: Miguel Puchol Date: Thu Aug 3, 2000 1:06pm Subject: RE: Professional attire? Steve, Great story. Being a pharmaceutical company, the hazmat gear could have been justified, but the Colts....nuff said! I think it's just a matter of time until we hear stories of companies turning up in Ghostbusters-style vans, with 100 flashing lights and wailing sirens, plasma guns, etc. All the best, Mike -----Mensaje original----- De: Steve Uhrig [mailto:steve@s...] Enviado el: jueves, 03 de agosto de 2000 2:18 Para: TSCM-L@egroups.com Asunto: [TSCM-L] Professional attire? Hello list, Below is copied from an email from another member of this list who did not want to be identified. His words, not mine. The man is reliable. 1078 From: Robert G. Ferrell Date: Thu Aug 3, 2000 1:11pm Subject: RE: Professional attire? >I think it's just a matter of time until we hear stories of companies >turning up in Ghostbusters-style vans, with 100 flashing lights and wailing >sirens, plasma guns, etc. Who ya gonna call? RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 1079 From: James M. Atkinson, Comm-Eng Date: Fri Aug 4, 2000 0:10am Subject: 19 Things That It Took Me 50 Years To Learn [Humor] 19 Things That It Took Me 50 Years To Learn by Dave Berry 1. Never under any circumstances take a sleeping pill and a laxative on the same night. 2. If you had to identify, in one word, the reason why the human race has not achieved, and never will achieve, its full potential, that word would be "meetings". (this does not pertain to church meetings) 3. There is a very fine line between "hobby" and "mental illness." 4. People who want to share their religious views with you almost never want you to share yours with them. 5. And when God, who created the entire universe with all of its glories, decides to deliver a message to humanity, He WILL NOT use, as His messenger, a person on cable TV with a bad hairstyle. 6. You should not confuse your career with your life. 7. No matter what happens, somebody will find a way to take it too seriously. 8. When trouble arises and things look bad, there is always one individual who perceives a solution and is willing to take command. Very often, that individual is crazy. 9. Nobody cares if you can't dance well. Just get up and dance. 10. Never lick a steak knife. 11. Take out the fortune before you eat the cookie. 12. The most powerful force in the universe is gossip. 13. You will never find anybody who can give you a clear and compelling reason why we observe daylight savings time. 14. You should never say anything to a woman that even remotely suggests that you think she's pregnant unless you can see an actual baby emerging from her at that moment. 15. There comes a time when you should stop expecting other people to make a big deal about your birthday. That time is age 11. 16. "The one thing that unites all human beings, regardless of age, gender, religion, economic status or ethnic background, is that, deep down inside, we ALL believe that we are above average drivers. 17. The main accomplishment of almost all organized protests is to annoy people who are not in them. 18. A person who is nice to you, but rude to the waiter, is not a nice person. 19. Your friends love you anyway. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1080 From: Date: Thu Aug 3, 2000 3:13pm Subject: RE: Cell-disturbing devices - self-inflicted tapping... Wow, a fantasy come true. I can't count how many times I've had to take evasive action on the highway because someone was more focused on their "cell" phone than on their driving. And how I've dreamed of a magic button which I could press to hang up their phone. Three times in a row and maybe they would give up and concentrate on driving? I know, illegal, immoral and the self-destructive idiots wouldn't give up anyway. But thanks for the dream. Bob Washburne - Who sometimes wonders, Hmmm...how would I do that?... --- Original Message --- "Miguel Puchol" Wrote on Thu, 3 Aug 2000 20:05:54 +0200 ------------------ Hi all, I came across a cellular phone 'disruptor'(to use Klingon terms) for some $140, which works rather well. Different cell bands are available, and up to three can be mixed in one device. Until now, the only reliable devices I've seen are made in Israel, but this one is straight out of Taiwan. There isn't a manufacturer's name anywhere on the device, so I can't provide more references. I now have to look at this thing with the SA, will keep posted. Could be useful (apart from illegal to use) in sensitive meetings, or to cure some of those self-inflicted wire tappings. It certainly disabled my GSM(900MHz) and DECT(1800MHz) phones. ----- Sent using MailStart.com ( http://MailStart.Com/welcome.html ) The FREE way to access your mailbox via any web browser, anywhere! 1081 From: Pesach Lattin Date: Thu Aug 3, 2000 8:35pm Subject: Re: Professional attire? Note to SAIC: get rid of the foil hats and red-white car. ---------------------------------------------------------------- Pesach Lattin, Computer Crime Specialist Voice Mail: (914) 818-3727 Fax: (240) 337-8339 Webmaster, Federal Law Enforcement Officers Association HQ: ph: (717) 938-2300 fax: (717) 932-2262 Visit our website @ http://www.fleoa.org ---------------------------------------------------------------- ----- Original Message ----- From: Robert G. Ferrell To: Sent: Thursday, August 03, 2000 11:11 AM Subject: RE: [TSCM-L] Professional attire? > >I think it's just a matter of time until we hear stories of companies > >turning up in Ghostbusters-style vans, with 100 flashing lights and wailing > >sirens, plasma guns, etc. > > Who ya gonna call? > > RGF > > Robert G. Ferrell, CISSP > ======================================== > Who goeth without humor goeth unarmed. > ======================================== > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > From: Hawkspirit Date: Thu Aug 1, 2002 3:35pm Subject: Sweep Needed A small office sweep is needed in Arlington, Virginia. Please contact me at my e-mail address by phone 323-462-1351 Roger Tolces Electronic Security 5884 From: Mitch D Date: Thu Aug 1, 2002 1:24pm Subject: Quick Sniff for 2.4 gig Was just browsing through Optoelectronics site and noticed they have a newer digital freq counter (aka) Digital Scout that goes up to 2.6 gig. I was thinking it may be handy for a quick check for wavecoms or other 2.4 TX presence,and may get even better performance with a patch antenna to increase gain as its a near field instrument. Has anyone tested this? Comments welcome,with the reminder that it would be only used for a quick floor reading w 2.4 capability.I have a older analog model,and it works really well,but its capability is less than 2.6g We had a discussion on using several different methods of finding 2.4 gig signals a while back,and thought this may be handy as an additional tool. Heres some spec info: The new Digital Scout RF frequency recorder / field strength meter is the only nearfield instrument capable of counting digital signals, as well as analog signals from 10MHz - 2.6GHz. Until now, the only signals that a frequency counter could lock onto were analog signals. In addition to locking onto digital and analog signals, the Digital Scout has a calibrated signal strength measurement from -45dBm to -5dBm. The Digital Scout is capable of detecting many different types of digital modulations that have a minimum pulse width of 300uS, signals such as TDMA, GSM, Frequency Hopping Spread Spectrum (FHSS), APCO 25, ON/OFF Keying, TETRA and more. Another breakthrough feature of the Digital Scout is the calibrated field strength measurement provided on the two line LCD display. The Digital Scout displays field strength in dBm with a signal strength bargraph serving as a reference. The Digital Scout reads and displays signal levels from -45dBm to -5dBm with an accuracy of +/- 5dBm. This feature is great for checking nearfield RF levels at remote sites, locating hidden transmitters, determining power levels from two-way radios and more. __________________________________________________ Do You Yahoo!? Yahoo! Health - Feel better, live better http://health.yahoo.com 5885 From: James M. Atkinson Date: Fri Aug 2, 2002 10:41am Subject: FBI Leak Probe Irks Lawmakers http://www.washingtonpost.com/wp-dyn/articles/A33821-2002Aug1.html?referer=email washingtonpost.com FBI Leak Probe Irks Lawmakers Many Spurn Polygraph Requests On Issue of NSA's 9/11 Intercept By Dana Priest Washington Post Staff Writer Friday, August 2, 2002; Page A01 FBI agents have questioned nearly all 37 members of the Senate and House intelligence committees and have asked many if they would be willing to submit to lie detector tests as part of a broad investigation into leaks of classified information related to the Sept. 11 attacks, according to officials involved in the inquiry. Most of the lawmakers have told the FBI they would refuse a polygraph, citing the constitutional separation of powers between the legislative and executive branches of government and the unreliability of the exam, those involved in the inquiry said. Although the chairmen of the intelligence committees, Sen. Bob Graham (D-Fla.) and Rep. Porter J. Goss (R-Fla.), asked the FBI to conduct the inquiry, its unprecedented scale has angered some lawmakers, according to people close to the investigation. The lawmakers are unhappy that the FBI, an agency they oversee, is investigating them. In addition to committee members, FBI agents have questioned 60 congressional staff members and officials at the CIA, the Defense Department and the National Security Agency. They are trying to find the source of news stories that quoted Arabic communications making vague references to an impending attack on the United States, which were intercepted by the NSA on Sept. 10 but not translated until Sept. 12. Ranit Schmelzer, spokeswoman for Senate Majority Leader Thomas A. Daschle (D-S.D.), said Daschle had "grave concerns about the congressional separation of powers issues raised by having one branch of government asking to polygraph employees of another branch." But, she added in a statement, "this matter is between the House and Senate intelligence committees and the Justice Department. The intelligence committees asked the Justice Department to conduct this investigation and it is up to these parties to determine the appropriate guidance" for members regarding the polygraph. Congressional leaders established a joint intelligence panel this year to review the performances of the CIA, FBI and other intelligence agencies leading up to the Sept. 11 attacks and to recommend improvements to the government's intelligence community. As the panel's hearings began, stories appeared about the NSA intercepts, drawing a heated White House rebuke. Vice President Cheney telephoned Goss and Graham to chastise them for the disclosures, while presidential spokesman Ari Fleischer said the information was "alarmingly specific" and could compromise the war on terrorism. Administration officials said the leaks could be a federal crime. Saying he was "chagrined" to have received the call from Cheney, Goss, along with Graham, wrote Attorney General John D. Ashcroft to request an investigation. The request was highly unusual because it bypassed the normal procedure of having a congressional ethics committee investigate an unwanted disclosure. The intercepts include two snippets of conversation, one stating "the match is about to begin," and the other saying, "tomorrow is zero hour." Intelligence officials have said the two messages, even if translated on Sept. 10, would not have provided enough information to prevent the attacks because they were unspecific as to the time or place where an attack would occur. But the disclosure was embarrassing to the NSA, highlighting chronic problems at an agency that for years has been criticized for being able to translate and analyze only a fraction of the millions of conversations and electronic transmissions it intercepts around the world. The Washington Times first reported the intercepts and the delay in translating them 11 days after the September attacks. Several news organizations published or broadcast similar stories in early June. But it was not until a June 19 CNN report that cited "two congressional sources," and June 20 reports in other major newspapers, including The Washington Post, that Cheney called Goss and Graham. Experts in the separation of powers said yesterday that the FBI investigation raised serious concerns about whether lawmakers would feel free to aggressively review the performance of intelligence agencies and the FBI. "Now the FBI can open dossiers on every member and staffer and develop full information on them. It creates a great chilling effect on those who would be critical of the FBI," said Charles Tiefer, a University of Baltimore law professor and former House deputy general counsel. "The FBI, with their great boots, are tramping around on ground that is privileged and privileged for good reason, to preclude intimidation of members." The Bush administration has aggressively tried to close down sources of news reporting that reveals information that is potentially embarrassing or, in the administration's view, harmful to national security. Defense Secretary Donald H. Rumsfeld has started an investigation at the Pentagon into the source of a New York Times story last month that laid out one possible plan in a war against Iraq. During a congressional hearing Wednesday, Sen. John McCain (R-Ariz.) questioned Rumsfeld about the level of the administration's concerns about leaks over Iraq policy, telling the defense secretary that unwanted disclosures are "a game that was played when you first came here nearly 30 years ago, and it will probably be played 30 years from now." "The fact is that there are competing proposals within the administration, and certain people are using or attempting to gain advantage by leaking information . . . and when it is resolved within the administration . . . then I think you'll find the leaks will stop," McCain said. © 2002 The Washington Post Company -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 5886 From: James M. Atkinson Date: Fri Aug 2, 2002 11:11am Subject: Trivia WHAT DO FISH SAY WHEN THEY HIT A CONCRETE WALL? Dam. WHAT DO ESKIMOS GET FROM SITTING ON THE ICE? Polaroids. WHAT DO YOU CALL A BOOMERANG THAT DOESN'T WORK? A stick WHAT DO YOU CALL CHEESE THAT ISN'T YOURS? Nacho cheese WHAT DO YOU CALL 4 BULLFIGHTERS IN QUICKSAND? Quatro sinko. WHAT DO YOU GET FROM A PAMPERED COW? Spoiled milk WHAT DO YOU GET WHEN YOU CROSS A SNOWMAN WITH A VAMPIRE? Frostbite. WHAT LIES AT THE BOTTOM OF THE OCEAN AND TWITCHES? A nervous wreck WHERE DO YOU FIND A DOG WITH NO LEGS? Right where you left him. WHAT'S THE DIFFERENCE BETWEEN ROAST BEEF AND PEA SOUP? Anyone can roast beef WHY DO GORILLAS HAVE BIG NOSTRILS? Because they have big fingers WHY DON'T BLIND PEOPLE LIKE TO SKY DIVE? Because it scares the hell out of the dog WHAT KIND OF COFFEE WAS SERVED ON THE TITANIC? Sanka. WHAT IS THE DIFFERENCE BETWEEN A HARLEY AND A HOOVER? The location of the dirt bag. [duck] WHY DOES A PILGRIMS PANTS ALWAYS FALL DOWN? Because they wear their belt buckles on their hat. WHAT'S THE DIFFERENCE BETWEEN A BAD GOLFER AND A BAD SKYDIVER? A bad golfer goes whack, darn. A bad sky diver goes darn, whack. HOW DO YOU CATCH A UNIQUE RABBIT? Unique up on it. HOW DO YOU CATCH A TAME RABBIT Tame way -- unique up on it. WHAT DO YOU CALL SKYDIVING LAWYERS? Skeet. HOW ARE A TEXAS TORNADO AND TENNESSEE DIVORCE THE SAME? Somebody's gonna lose a trailer -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5887 From: Date: Fri Aug 2, 2002 7:39am Subject: 12 to Face French Wiretapping Trial PARIS (AP) - A French judge has ordered 12 people, including a top aide to former Socialist President Francois Mitterrand, to stand trial for allegedly wiretapping leading lawyers, politicians and journalists two decades ago, judicial officials said Friday. The long-standing case was opened in 1993 after complaints were filed against former officials at the Elysee presidential palace for alleged illegal telephone tapping between 1983 and 1986. Investigating Judge Jean-Paul Valat did not fix a date for the trial, which is not likely to begin before 2004, the officials said, speaking on condition of anonymity. Among those under investigation in the wiretap scandal are Gilles Menage, the late Mitterrand's former Cabinet director, and Louis Schweitzer, the Cabinet chief of former Prime Minister Laurent Fabius, now a top Socialist Party leader. The scandal led to widespread fears in France about threats to democracy and left many wondering about the freedoms of their powerful president. French newspapers have in the past indicated Mitterrand was behind the wiretapping of journalists investigating the sinking of a Greenpeace ship and the existence of his illegitimate daughter, Mazarine, among others. A 1991 French law stipulates that wiretapping may be carried out only in cases involving national security, the safeguarding of information considered essential to France's scientific and economic interests and the prevention of terrorism and organized crime. 08/02/02 12:22 EDT 5888 From: gispaul2002 Date: Fri Aug 2, 2002 2:27pm Subject: URGENT!! Mobile signals Relating to a confirmed kidnapping with a demand of 400K, is it possible to locate the area of a mobile phone whilst it is simply turned on? All advice greatly appreciated. Paul Hagan Gibson Investigation Services Ltd 87 Oldham Road Rochdale OL16 5QR UK Tel: 01706 341 788/07957 278 357 E-mail: Gispaul@a... 5889 From: srhayes3 Date: Fri Aug 2, 2002 5:56pm Subject: No such thing as stupid questions.... My grandfather used to say " There is no such thing as a stupid question, only stupid people who ask questions". So having said that as an aspiring TSCM tech I have to ask, Can we discuss over the next week or so what a SCIF facility is and how to build one? Whats a Black chamber and how is it built? Whats a screen room and how its built and what are these things used for and in what type of envirionments are they needed? Also, what is DIAM 50-3, NSA- 65,DCID1/21 and DCID1/22. Sorry if these questions seem elementary to some of u "ole timers" but...get over it (just joking).I would be interested in answers from a number of list members to see how close u guys come to having the same info. I am particularly interested in what our illustrious list moderator, Mr Atkinson, has to add to my query in that techno jargon filled manner in which he so eloquently answers these types of questions (chicks really dig it when I memorize his answers and talk to them about TSCM).I anxiously await responses, and thank u in advance. Samuel R Hayes III TSCM tech in the making 5890 From: Fernando Martins Date: Sat Aug 3, 2002 7:57am Subject: Nmap 3.0.0 OS fingerprints Nmap is an utility for network security auditing (yeah, sure, and hacking), that just released version 3.0.0. Regarding what some people here (or their clients) may use (just considering radio and cams), this are the OS fingerprints that the new Nmap version uses: AXIS NetEye Camera Server V1.20 AXIS Camera 200pV1.41 AXIS Stack -- CD-ROM Server or Printer Server or Camera Server Axis 200+ Web Camera running OS v1.42 D-Link DCS-1000 webcam with firmware 1.06 Panasonic KX-HCM10 network camera KA9Q ARLAN BR2000E V5.0E Radio Bridge This information is from the source distribution of nmap. More information available in the file nmap-os-fingerprints, at http://download.insecure.org/nmap/dist/nmap-3.00.tgz Web page: http://www.insecure.org/nmap/ Hope it helps somebody FM 5891 From: James M. Atkinson Date: Sat Aug 3, 2002 7:57am Subject: Re: URGENT!! Mobile signals Yes, the phone company can do it for law enforcement. They will usually provide the signal levels from the antenna closest to person, and can often provide a relative bearing based on which sector of antenna the signal is coming in from. Even though the phone is not on an active call it has to "check in" periodically with network. When this happens, the phone can be located to a general area. Now grab your Yagi, LNA and spectrum analyzer. Take the channel the cell phone is using to check in, and set up two or three DF stations around the approximate area the cell phone is detected. Then you patiently wait for the phone to check in again... when it does you simply DF to it. It's a lot easier if you can get someone actually on a call, or can ring the phone while the rescue people are sniffing away. It is also possible to fool the phone with a cell site simulator, where you pretend to be a cell tower, and the remote cell phone checks in WITH YOU (with the cell providers permission of course). This is a common method for ferreting out CDPD/GPS tracking devices on cars. -jma At 7:27 PM +0000 8/2/02, gispaul2002 wrote: >Relating to a confirmed kidnapping with a demand of 400K, is it >possible to locate the area of a mobile phone whilst it is simply >turned on? > >All advice greatly appreciated. > >Paul Hagan >Gibson Investigation Services Ltd >87 Oldham Road >Rochdale >OL16 5QR >UK > >Tel: 01706 341 788/07957 278 357 >E-mail: Gispaul@a... -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5892 From: Justin T. Fanning Date: Sat Aug 3, 2002 7:57am Subject: Re: URGENT!! Mobile signals Yes. If the phone is on, it will periodically poll the nearest base(s) to alert them to its location (and also for the handset to keep an internal table of the closest base(s) should the user wish to make a call). If you get the telco(s) involved they will be able to give a fairly accurate location, once on the ground you could then DF the handset as you would any normal TX source. Do you have the caller ID from the call? From the prefix you can determine the carrier, and then know what part of the spectrum you'll be dealing with. In the UK GSM, that could be anywhere from ~ 800 Mhz to almost 2 Ghz. The telco can poll the handset, thus making the handset TX without ringing, this does though become a drain on the batteries if you believe the unit to be solely battery powered. Without the telco's co-operation, you would have to decode the reverse control channel. This would though require considerable specialised GSM equipment & a rough idea where to start looking. Hope this helps, JF --- gispaul2002 wrote: > > Relating to a confirmed kidnapping with a demand of 400K, is it > possible to locate the area of a mobile phone whilst it is simply > turned on? > > All advice greatly appreciated. > > Paul Hagan > Gibson Investigation Services Ltd > 87 Oldham Road > Rochdale > OL16 5QR > UK > > Tel: 01706 341 788/07957 278 357 > E-mail: Gispaul@a... > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5893 From: James M. Atkinson Date: Sat Aug 3, 2002 8:10am Subject: Re: No such thing as stupid questions.... Sam, A SCIF is a "secure room within a room" where classified materials are discussed and/or processed (ie: computers). A SCIF is usually shielded and filtered to keep an "stray signals" from getting out of the room, and will have multiple layers of physical security. A Black Chamber or Black Vault is a SCIF (see above) used for technical intercepts, crypt-analysis or code breaking. The phrase can also be used to refer to the section of a SCIF where cryptographic equipment is set up and/or used. A "Screen Room" is a not quite a SCIF, but an area enclosed by a screen or wire mesh that help stray signals find their way to ground. DIAM 50-3, NSA-65,and DCID 1/21 are basically the same document, and it provides some general technical specifications as to the building of SCIFs. The documents can be found on my website. DCID 1/22 is the CIA's policy on TSCM, but the Procedural Guides spell out the technical detail (although government TSCM folks consider it a silly document that is way out of date and pretty much ignore it). -jma At 10:56 PM +0000 8/2/02, srhayes3 wrote: >My grandfather used to say " There is no such thing as a stupid >question, only stupid people who ask questions". So having said that >as an aspiring TSCM tech I have to ask, Can we discuss over the next >week or so what a SCIF facility is and how to build one? Whats a >Black chamber and how is it built? Whats a screen room and how its >built and what are these things used for and in what type of >envirionments are they needed? Also, what is DIAM 50-3, NSA- >65,DCID1/21 and DCID1/22. Sorry if these questions seem elementary to >some of u "ole timers" but...get over it (just joking).I would be >interested in answers from a number of list members to see how close >u guys come to having the same info. I am particularly interested in >what our illustrious list moderator, Mr Atkinson, has to add to my >query in that techno jargon filled manner in which he so eloquently >answers these types of questions (chicks really dig it when I >memorize his answers and talk to them about TSCM).I anxiously await >responses, and thank u in advance. >Samuel R Hayes III >TSCM tech in the making -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5894 From: Jay Coote Date: Sat Aug 3, 2002 0:13pm Subject: ID of Telephone Lines? I'm looking for the latest ANAC or ANI numbers for Southern California. I need find the numbers for some unidentified POTS lines. It seems that 211-2345 no longer works here. Thanks, Jay Coote Los Angeles 5895 From: k9electron Date: Sat Aug 3, 2002 11:21am Subject: Training Hi all just wondering whether anyone here knows of a good TSCM training school in the uk? Thanks Paul 5896 From: Scott Malcolm Date: Sun Aug 4, 2002 2:00pm Subject: ID of Telephone Lines? ANAC: 1 800 877 2278 (FULL COVERAGE US) Regards, Scott Malcolm Malcolm & Associates, Inc. Your Confidential Alternative Serving the State of Wisconsin http://www.execpc.com/~conf-pi Office 262 965 4426 / Fax 262 965 4629 5897 From: Steve Uhrig Date: Sun Aug 4, 2002 2:38pm Subject: Re: ID of Telephone Lines? On 4 Aug 2002 at 14:00, Scott Malcolm wrote: > ANAC: 1 800 877 XXXX (FULL COVERAGE US) When you post stuff like this, remember: 1)Whoever owns the number gets your CNA info when you call it, 2)You practically guarantee the service will have the number changed once people start playing with it. If you come across a decent #, keep it to yourself and you'll maybe have a useful tool. Post it on the web and it's practically a guarantee it will be burned out soon. If you need an ID, call your own cell phone and see what comes up. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5898 From: Scott Malcolm Date: Sun Aug 4, 2002 2:58pm Subject: Re: ID of Telephone Lines? kondrak wrote: > Thought he was looking for local loop ANI, Ive also got these 1-800's The last ten digits from the computer generated read out when you call 800 877 2278 will ID the line. Do not know if he wants to put it in test mode or high and dry through the local loop? But thanks for the 800's you posted. Regards, Scott Malcolm Malcolm & Associates, Inc. Your Confidential Alternative Serving the State of Wisconsin http://www.execpc.com/~conf-pi Office 262 965 4426 / Fax 262 965 4629 5899 From: Date: Sun Aug 4, 2002 0:24pm Subject: Re: Re: ID of Telephone Lines? In a message dated 8/4/02 12:39:49 PM Pacific Daylight Time, steve@s... writes: << When you post stuff like this, remember: 1) Whoever owns the number gets your CNA info when you call it, 2) You practically guarantee the service will have the number changed once people start playing with it. If you come across a decent #, keep it to yourself and you'll maybe have a useful tool. Post it on the web and it's practically a guarantee it will be burned out soon. If you need an ID, call your own cell phone and see what comes up. >> Listen to Steve! 5900 From: Date: Sat Aug 3, 2002 8:56pm Subject: Cell Signals Many thanks for the many responses received. Your advice has helped. Regards Paul Hagan G.I.S Ltd 87 Oldham Road Rochdale OL16 5QR Tel: 01706 341 788 Fax: 01706 346 181 [Non-text portions of this message have been removed] 5901 From: George Shaw Date: Sun Aug 4, 2002 1:08pm Subject: RE: Training Me second that.... George Shaw MI3GTO Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... -----Original Message----- From: k9electron [mailto:k9sales@n...] Sent: 03 August 2002 17:22 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Training Hi all just wondering whether anyone here knows of a good TSCM training school in the uk? Thanks Paul ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5902 From: kondrak Date: Sun Aug 4, 2002 2:21pm Subject: Re: ID of Telephone Lines? Thought he was looking for local loop ANI, Ive also got these 1-800's ---paste 888-324-8686 888-352-5443 800-346-0152 800-532-7486 (press 1,1) 800-444-4444 800-444-3333 800-666-1379 (press 1) 800-314-4258 877-269-8825 (press 4) 888-294-7514 800-404-3733 800-555-1160 These next 3 will say the number you've reached isn't active, then read off 4 digits plus your ANI. 800-877-2278 800-235-8378 800-204-4653 ---end paste At 14:00 8/4/02 -0500, you wrote: >ANAC: 1 800 877 2278 (FULL COVERAGE US) > > > > > Regards, > > Scott Malcolm > Malcolm & Associates, Inc. > Your Confidential Alternative > Serving the State of Wisconsin > http://www.execpc.com/~conf-pi > Office 262 965 4426 / Fax 262 965 4629 > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ [Non-text portions of this message have been removed] 5903 From: openxmind Date: Sun Aug 4, 2002 3:24pm Subject: Computer Surveillance Hello everybody, I'm working on a presentation called "Eavesdropping on the hardware" concerning eavesdropping attacks on computer systems, with a focus on "technical attacks" eg bugs, compromising emanations, forensic harddisk examination, etc instead of attacks on the software level. I've been able to find information on general stuff, keystroke loggers like Keykatch or Falcon, a nice collection of rumours concerning compromising emanations and some tidbits regarding wavecom transmitters, wireless keyboards or WLAN. While that's better than nothing, I'm still lacking any real knowledge where and how these devices are utilized and what else is out there. So I'd be very happy if you could help me with some questions I have. - What kind of devices are used for attacks on computer systems (computer, monitor, keyboard, printer, scanner, LAN/WAN/modem, digital copying machine) and how difficult are the attacks to perform? How easily are the devices or components to aquire? - Are wavecom and similar transmitters installed inside the targeted system or outside on the cable? While I think a new box hanging from the printer cable would be rather noticeable, I've taken a look inside my printer and I don't see enough place for one of these transmitters plus a decent cable tap. - So far most attacks I've seen (wavecom, VGA signal splitters, LAN tapping) would have been acceptable for attacks on corporate networks with lots of cables running around but easiely detected on home PCs, like in the Scarfo case. So, are there any devices besides keystroke loggers that present a realistic threat to end users? - Are strong emission problem like with the Rockwell datapump chipset common in computer equipment or a rare ocurrence? - Do you encounter devices like these often during sweeps or is this just a minor problem? I'd be very grateful if you could help me with some of my questions or point me towards suitable websites or publications. While I'll doubt that most of you will be in Ulm, southern Germany on September the 9th, everyone who helps me and comes to the presentation is in for a free good German beer :) Regards, Berend Eggers 5904 From: Date: Sun Aug 4, 2002 5:12pm Subject: Tempest on a Notebook Over on www.eskimo.com/~joelm/tempestintro.html under "TEMPEST Urban Folklore" it says that one item of folklore is; >LCD displays on laptops eliminate the risks of TEMPEST attacks. Maybe, >maybe not. The technology behind LCD monitors versus typical CRT monitors >may somewhat reduce the risk, but I wouldn't bet my life on it. There have >been anecdotal accounts of noisy laptop screens being partially displayed >on TVs. If laptops were emanation proof, I seriously doubt there would be >TEMPEST standard portables on the market. What needs to be done to make a standard notebook computer TEMPEST proof, or to at least enhance prevention of such an attack? Presumably its VGA circuitry (eg my Sony Vaio has a VGA out port, and there is no way of disabling VGA output) will be emitting radiation which can be picked up a short distance from the computer. Joel's page mentions Faraday cages, metal tapes / conductive sprays, spark-gap generator to throw up radio "chaff". Alternatively, who makes TEMPEST shielded portables, are these hideously expensive compared to standard machines, what means do they achieve the result by? in one of the articles it mentions to use shielded cables inside your computer, ferrite toroids etc, but with the compactness of a notebook those measures look impossible. 5905 From: David Alexander Date: Mon Aug 5, 2002 2:46am Subject: re: Nmap 3.0.0 OS fingerprints >From: "Fernando Martins" >Subject: Nmap 3.0.0 OS fingerprints > >Nmap is an utility for network security auditing (yeah, sure, and hacking), that just released version 3.0.0. ........ For the record, I use the Nmap tool, among many others. I am not a hacker, one of the hats I wear is as company Information Security Officer. I use the tools to scan our own networks looking for vulnerabilities so I can find and fix them before some 'script kiddie' does and takes advantage to do harm to us or others. I have never 'hacked' in my life. I have performed penetration tests, where I have written permission from the network owner and I am checking his security for him. Said person gets a report and advice afterwards, just the same as any good TSCMer gives a report on what, if anything, was found after a sweep. Anyone involved in any kind or war of wits will tell you it's important to know your enemy - what tools will they use, how will they use them, what capabilities they have, etc. JMAs bug database is for just such a purpose. Some of these tools were written to help lock down networks, some to break into them. All can be used by both sides. In the real world, you have to do it to yourself before somebody else does. There are automated scanners that hackers leave running 24x7 looking for new and unsecured systems on the internet. If you don't believe me, go to project.honeynet.org and read on. I have hooked a system to the net and seen it scanned within 17 minutes of connection. It was attacked within 4 hours. My cyber risks insurance policy is lower in cost as a result, same as if you take the trouble to park your car in your garage every night, rather than leave it on the drive or park in the street, you get a lower insurance premium. My 2c. _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 5906 From: Mike Dever Date: Mon Aug 5, 2002 6:47am Subject: Computer control of WinRadio Has anyone in the group ever tried to drive the WinRadio series receivers and their software with 'Virtual PC' running on an Apple platform. I would greatly appreciate any comments or suggestions. Regards Mike Dever CPP Dever Clark & Associates Canberra, Australia Email: deverclark@b... 5907 From: Andy M Date: Tue Aug 6, 2002 2:29pm Subject: Equipment HIre Does anyone in the States know where I can hire some TSCM equipment for sweep to be done, by our own guys, on one of our offices over there? Many thanks, Andy M 5908 From: James M. Atkinson Date: Mon Aug 5, 2002 2:42pm Subject: Re: Equipment HIre You would do better having a TSCM firm in the US show up with a full set of equipment, and perform the sweep for you, or perform the sweep under the supervision of your TSCM folks. -jma At 8:29 PM +0100 8/6/02, Andy M wrote: >Does anyone in the States know where I can hire some TSCM equipment for >sweep to be done, by our own guys, on one of our offices over there? > >Many thanks, > >Andy M -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5909 From: SmartOldWolf Date: Mon Aug 5, 2002 8:59am Subject: Re: ID of Telephone Lines? Hi Folks, Was wondering if you had the ANI number for Oregon/Washington States? A few years back a baby Bell Vice Pres (one of my grateful customers...smiles) gave me a national list of test loop pairs for every area in the US. One could dial in on one of the 2 pairs and another person would dial the second of the 2 pairs, thus connecting to each other. The nice thing here was these test loops were not recorded by the switch, completely untraceable. (I had teams of telco security people trying to trace the calls without any success and they had access to the switch, etc.. for hours, sometimes days and still came up blank...smiles) The VP has been long gone and I haven't tried these test loop pairs in years myself, but last time I did, many still worked. The most common pairs for any NPA went something like this: 1st side of pair that one party dials: (1-Area code-)NPA-1000 2nd side of pair other party dials: (1-Area code-)NPA-1001 Combos like 1001 and 1002 sometimes worked as did 9000 and 9001. The 3 most likely numbers that would match 2 of the 3 are 000, 001, 002, with any NPA-? digits in front of these last 3 numbers. (I'm guessing one would have more luck with these in smaller communities served by older switches and older switch software. Forget ancient step by step switches as I doubt there are any left up in the US nowadays. Might find a few "Crossbars" in which case many other methods also become reality.) Most likely you'll find these on smaller 5ESS switches. But look in larger communities served by DMS100 switches as someytimes these test loop pairs are simply forgotten and not de-activated as their use is very limited by telco repairmen and hardly ever used. Probing NPAs for test loop pairs in the largest communities has yeilded mixed results. If one NPA loop is found, it's likely loops are active for all the NPAs served by that particular switch or telco. If none are found, they are using a newer randomized loop pair with non-similiar nimbers. By using several pairs of test loops, one could connect up as many people as needed with complete anoynominity for each party! I do mean COMPLETE as these used to be virtually 100% untraceable a few years back....nowadays ???? These were one of the secret ways that top phone phreaks connected unlimited numbers of other phone phreaks across the US and taunted and teased Bell Security for hours and sometimes continueously for days while also doing the same to hundreds of telco operators, cross connecting everyone together using Test Loop Pairs and Multiple Conference Call nodes of a dozen people, phone phreaks, operators, telco security, LEAs and just about anyone else. Though more work, the best phreakers used these test loop pairs in conjunction with Conference Calls, hacked PBXs, diverters and other tricks and were NEVER traced nor caught. Others that didn't use the test loops were caught eventually about 25% of the time. BTW, this is a nice way to share data or browse the web, send emails or do all types of mischief without being traced! When Telco security or Telco Technicians/Engineers try, the call seems to come from their inward switch with no other point of origination that can be found. I am a little curious if Cell-Co mtso switches also have these types of test loop pairs? An "infinity" phone bug hooked into one of these test loop pairs through an old standalone type call diverter could only be traced back to its source which would show as originating within the "Inward" switch. (Yes, I know one way to trace this type of bug back, but one would need several hours/days and access to a huge pool of knowlegeable techs everywhere that are extremely familiar with the above techniques in case the bugged call is bounced around the US or the world a few times through multiple switches, loops and diverters. Any current lists of these types of test loop pairs for either landlines/cellular or for ANI numbers you could email me privately would be appreciated? Regards, SmartOldWolf ----- Original Message ----- From: kondrak To: Scott Malcolm Cc: TSCM-L@yahoogroups.com Sent: Sunday, August 04, 2002 12:21 PM Subject: Re: [TSCM-L] ID of Telephone Lines? Thought he was looking for local loop ANI, Ive also got these 1-800's ---paste 888-324-8686 888-352-5443 800-346-0152 800-532-7486 (press 1,1) 800-444-4444 800-444-3333 800-666-1379 (press 1) 800-314-4258 877-269-8825 (press 4) 888-294-7514 800-404-3733 800-555-1160 These next 3 will say the number you've reached isn't active, then read off 4 digits plus your ANI. 800-877-2278 800-235-8378 800-204-4653 ---end paste At 14:00 8/4/02 -0500, you wrote: >ANAC: 1 800 877 2278 (FULL COVERAGE US) > > > > > Regards, > > Scott Malcolm > Malcolm & Associates, Inc. > Your Confidential Alternative > Serving the State of Wisconsin > http://www.execpc.com/~conf-pi > Office 262 965 4426 / Fax 262 965 4629 > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ [Non-text portions of this message have been removed] Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5910 From: smartoldwolf Date: Mon Aug 5, 2002 9:36am Subject: Surveillance and Detection using Test Loop Pairs Hi Folks, Was wondering if you had the ANI number for Oregon/Washington States? A few years back a baby Bell Vice Pres (one of my grateful customers...smiles) gave me a national list of test loop pairs for every area in the US. One could dial in on one of the 2 pairs and another person would dial the second of the 2 pairs, thus connecting to each other. The nice thing here was these test loops were not recorded by the switch, completely untraceable. (I had teams of telco security people trying to trace the calls without any success and they had access to the switch, etc.. for hours, sometimes days and still came up blank...smiles) The VP has been long gone and I haven't tried these test loop pairs in years myself, but last time I did, many still worked. The most common pairs for any NPA went something like this: 1st side of pair that one party dials: (1-Area code-)NPA-1000 2nd side of pair other party dials: (1-Area code-)NPA-1001 Combos like 1001 and 1002 sometimes worked as did 9000 and 9001. The 3 most likely numbers that would match 2 of the 3 are 000, 001, 002, with any NPA-? digits in front of these last 3 numbers. (I'm guessing one would have more luck with these in smaller communities served by older switches and older switch software. Forget ancient step by step switches as I doubt there are any left up in the US nowadays. Might find a few "Crossbars" in which case many other methods also become reality.) Most likely you'll find these on smaller 5ESS switches. But look in larger communities served by DMS100 switches as someytimes these test loop pairs are simply forgotten and not de-activated as their use is very limited by telco repairmen and hardly ever used. Probing NPAs for test loop pairs in the largest communities has yeilded mixed results. If one NPA loop is found, it's likely loops are active for all the NPAs served by that particular switch or telco. If none are found, they are using a newer randomized loop pair with non-similiar nimbers. By using several pairs of test loops, one could connect up as many people as needed with complete anoynominity for each party! I do mean COMPLETE as these used to be virtually 100% untraceable a few years back....nowadays ???? These were one of the secret ways that top phone phreaks connected unlimited numbers of other phone phreaks across the US and taunted and teased Bell Security for hours and sometimes continueously for days while also doing the same to hundreds of telco operators, cross connecting everyone together using Test Loop Pairs and Multiple Conference Call nodes of a dozen people, phone phreaks, operators, telco security, LEAs and just about anyone else. Though more work, the best phreakers used these test loop pairs in conjunction with Conference Calls, hacked PBXs, diverters and other tricks and were NEVER traced nor caught. Others that didn't use the test loops were caught eventually about 25% of the time. BTW, this is a nice way to share data or browse the web, send emails or do all types of mischief without being traced! When Telco security or Telco Technicians/Engineers try, the call seems to come from their inward switch with no other point of origination that can be found. I am a little curious if Cell-Co mtso switches also have these types of test loop pairs? An "infinity" phone bug hooked into one of these test loop pairs through an old standalone type call diverter could only be traced back to its source which would show as originating within the "Inward" switch. (Yes, I know one way to trace this type of bug back, but one would need several hours/days and access to a huge pool of knowlegeable techs everywhere that are extremely familiar with the above techniques in case the bugged call is bounced around the US or the world a few times through multiple switches, loops and diverters. Any current lists of these types of test loop pairs for either landlines/cellular or for ANI numbers you could email me privately would be appreciated? Regards, SmartOldWolf ----- Original Message ----- From: kondrak To: Scott Malcolm Cc: TSCM-L@yahoogroups.com Sent: Sunday, August 04, 2002 12:21 PM Subject: Re: [TSCM-L] ID of Telephone Lines? Thought he was looking for local loop ANI, Ive also got these 1-800's ---paste 888-324-8686 888-352-5443 800-346-0152 800-532-7486 (press 1,1) 800-444-4444 800-444-3333 800-666-1379 (press 1) 800-314-4258 877-269-8825 (press 4) 888-294-7514 800-404-3733 800-555-1160 These next 3 will say the number you've reached isn't active, then read off 4 digits plus your ANI. 800-877-2278 800-235-8378 800-204-4653 ---end paste At 14:00 8/4/02 -0500, you wrote: >ANAC: 1 800 877 2278 (FULL COVERAGE US) > > > > > Regards, > > Scott Malcolm > Malcolm & Associates, Inc. > Your Confidential Alternative > Serving the State of Wisconsin > http://www.execpc.com/~conf-pi > Office 262 965 4426 / Fax 262 965 4629 > 5911 From: Steve Uhrig Date: Mon Aug 5, 2002 5:23pm Subject: Re: Equipment HIre On 6 Aug 2002 at 20:29, Andy M wrote: > Does anyone in the States know where I can hire some TSCM equipment > for sweep to be done, by our own guys, on one of our offices over > there? You realize, of course, one must be trained and experienced in the use of the equipment, to do an honest and effective job? Asking where to find equipment is proof you have neither training or experience. There are plenty of U.K. based TSCM teams whom you should contact to have perform the work on your behalf. Several are on this list. No one is going to lease professional TSCM equipment to someone they don't know or trust. It's too personal, too expensive, too easy for you to blame the problems you WILL have on the equipment. Anyone offering to lease anything is playing with you. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5912 From: Date: Mon Aug 5, 2002 1:30pm Subject: Re: Re: Equipment HIre In a message dated 8/5/02 3:25:15 PM Pacific Daylight Time, steve@s... writes: << Anyone offering to lease anything is playing with you. >> Very much like leasing you the scalpels to perform do it yourself brain surgery with. From: Agent Geiger Date: Sun Aug 1, 2004 3:58pm Subject: Re: Large attachments sent to the list The best thing to do is setup a domain on some cheap hosting, then give people FTP access. It really easy to do. --- kondrak wrote: > With the recent events, I'd say Yahoo is the LAST > place I'd store anything > of value. > > > At 06:48 8/1/2004, you wrote: > >Hi, > > > >Just as a suggestion, since the Yahoo! groups > provide a file-storage area > >where all members can upload and download from > (permissions allowing), > >wouldn't it be better to upload information about > equipment, spec sheets, > >etc. to this file area, rather than sending it to > the whole group? Just > >today there has been some 2.6 MB of datasheets on > the OSCOR, etc. coming via > >the list. > > > >I think I have received this same information twice > already, maybe it's sent > >out with the mission statement, as it came all > toghether. > > > >Best regards, > > > >Mike > > > > > >----- Original Message ----- > >From: "Shawn Hughes (Road)" > >To: > >Sent: Sunday, August 01, 2004 7:33 AM > >Subject: [TSCM-L] Re:Parabolic Microphones > > > > > > > At 12:46 PM 7/31/04 +0000, you wrote: > > > >Say you have to overhear a conversation on a > parking lot...when you > > > >arrive you do'nt want to attrack to much > attention by driving around > > > >looking for the right place with good > audio...so you park your van > > > >more or less in a good spot and then adjust the > beam in the right > > > >direction...also you may be able to "follow" > the subjects while they > > > >walk around. > > > > > > > >The "old way" you would have to use a fixed mic > wich would be > > > >peeping trough some small hole in the van's > body...such a mic is not > > > >very directional and needs you to be relative > close to the subject. > > > > > > > > > Here is what bothers me about this. You are > *supposing* this is the > > > tradecraft for how to intercept this type of > intelligence. There are > > > several on this board who have conducted this > kind of work. For many who > >do > > > not know you, they assume that since you aren't > clear that much of what > >you > > > say is speculative and based in theory, you are > speaking from a position > >of > > > authority. > > > > > > Your comments concern me because you are stating > a proveable fact, and > > > sandwiching it between several paragraphs of > guesswork. You waste a lot of > > > bandwidth with your guessing dressed as > statements. > > > > > > Is it possible that you could continue to bring > interesting things to the > > > list, and pose your questions, but limit your > explanations on topics where > > > your direct, hands - on background is limited? > > > > > > I truly apologize for being so direct and blunt, > but it needs to be said. > > > > > > > > > Sincerely, > > > > > > > > > Shawn Hughes > > > > > > > > > ============================= > > > Shawn Hughes > > > Special Projects Consultant and Subcontractor > > > 110 Hughes Hale Lane, Harriman, TN 37748 USA > > > (865) 335-7992 Voicemail > > > srh@e... > > > > >//////////////////////////////////////////////////////////////////////////// > >/// > > > Lead Instructor > > > Explosives, WMD, and Technical Operations > > > Tactical Response, LLC > > > www.warriormindset.com > > > > >//////////////////////////////////////////////////////////////////////////// > >// > > > > > > ******NOTICE: Due to the age of my email > account, I have to set spam > > > filtering VERY high. If you do not receive a > response in a reasonable > > > amount of time, please try an alternate > communications method. I apologize > > > for the inconvienence. > > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is > strength" > > > > > > To subscribe to the TSCM-L mailing list > visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in > motion. > > > It is by the juice of Star Bucks that thoughts > acquire speed, > > > the hands acquire shaking, the shaking is a > warning. > > > It is by caffeine alone I set my mind in > motion. > > > > =================================================== > TSKS > > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== > TSKS > >Yahoo! Groups Links > > > > > > > > > > __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - 100MB free storage! http://promotions.yahoo.com/new_mail 9259 From: Robert G. Ferrell Date: Sun Aug 1, 2004 4:20pm Subject: Re: Note to Federal Agents [OT: Humor and Satire] At 07:15 AM 8/2/2004 +1000, you wrote: >ROTFLMAO? > >Splain! http://www.netlingo.com/emailsh.cfm RGF 9260 From: James M. Atkinson Date: Sun Aug 1, 2004 10:40pm Subject: Taking Time [OT: Philosophy] Take time to do nothing. To sit quietly. To clear your mind. Set aside the clutter of the day's activity, and allow your mind to go blank. Do this several times a day. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9261 From: Charles Patterson Date: Sun Aug 1, 2004 11:27pm Subject: Re: Taking Time [OT: Philosophy] For some of us, that's a "no-brainer". :) -cp ----- Original Message ----- From: James M. Atkinson To: TSCM-L Sent: Sunday, August 01, 2004 11:40 PM Subject: [TSCM-L] Taking Time [OT: Philosophy] Take time to do nothing. To sit quietly. To clear your mind. Set aside the clutter of the day's activity, and allow your mind to go blank. Do this several times a day. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 9262 From: Tech Sec Lab Date: Mon Aug 2, 2004 8:26am Subject: RE: ...and the lesson here is? Message: 3 Date: Sat, 31 Jul 2004 21:57:12 -0400 From: "James M. Atkinson" Subject: ...and the lesson here is? The first rule of a homicide investigation is to suspect the killer is the same person who discovered the body, the first person who found the fire is often the one who found it, and the person who found the bomb is often the person who planted it... ### Well Jim on this one you are sadly wrong, in Ireland for example, they are usually not found. They go off. On a very small percentage of cases they take the courier with it. I can't think of any instances when someone publicly declared finding a bomb and then ended up being the creator. In regards to people in the business, and the idea that they should have no contact with surveillance devices is utter rubbish, IMHO. Ask Shawn Hughes if he would be half an effective IED Technician if he did not train with the real thing at some stage. Having experience with what your looking for is essential. I would even venture to say that you have built many little tx's, even if only when you were a kid! My ?0.02 -Ois 9263 From: Pizza Waves Date: Mon Aug 2, 2004 10:01am Subject: Russian VHF/UHF Frequencies Hello, http://boozers.fortunecity.com/oldhouse/677/radio_frequencies_in_moscow_metropolitan_area.htm Russian Police and Intelligence Frequencies ! [Non-text portions of this message have been removed] 9264 From: moellerthy <1ach@g...> Date: Mon Aug 2, 2004 3:26pm Subject: STATE LICENSE REGULATIONS ACROSS THE U.S. I have recently contacted a couple of States reguarding there requirements for licensing Technical Surveillance Counter measures. I have found that the States are flexable in willing to work to accept a new license applicant which means granting of the license without the requirement of 4000 hrs under someone else's belt. I have gone to College did my time and earned the A's it would be a slap in the face for a State board to say sorry you have to work under someone that has never went to college and who does not have the expertise to testify scientifically about an anomaly. I bring to the Board, the Court , the contracted person who hired me the best of my ability backed up by my Education, credit ability ,and years of research, planning ,testing of a large volume test instruments that the adversary could not even imagine exist. I look forward to posting to the list here my evidence of my finds and progress on the subject. Andre Holmes 1ach@G... NEPTUNE ENTERPRISE SECURITY 9265 From: James M. Atkinson Date: Mon Aug 2, 2004 4:21pm Subject: New Regulations [OT: Humor] New Regulations in the New Jersey Registry of Motor Vehicle's 2004 Handbook: 1. Turn signals will give away your next move. A confident New Jersey Driver avoids using them. 2. Under no circumstance should you maintain a safe distance between you and the car in front of you, because the space will be filled in by somebody else, putting you in an even more dangerous situation. 3. The faster you drive through a red light, the less chance you have of getting hit. 4. WARNING! Never come to a complete stop at a stop sign. No one expects it and it will result in your being rear-ended. 5. Never get in the way of an older car that needs extensive bodywork, especially with PA, NY or Del plates. With no insurance, the other operator probably has nothing to lose. 6. Braking is to be done as hard and late as possible to ensure that your ABS kicks in, giving a vigorous, foot massage as the brake pedal violently pulsates. For those of you without ABS, it's a chance to strengthen your leg muscles. 7. Never pass on the left when you can pass on the right. It's a good way to prepare other drivers entering the highway. 8. Speed limits are arbitrary figures; given only as a suggestion and are not enforceable in New Jersey during rush hour. 9. Just because you're in the left lane and have no room to speed up or move over doesn't mean that a New York driver flashing his high beams behind you doesn't think he can go faster in your spot. 10. Always brake and rubberneck when you see an accident or even someone changing a tire. This is seen as a sign of respect for the victim. 11. Learn to swerve abruptly without signaling. New Jersey is the home of high-speed slalom-driving thanks to the Department of Public Works, which puts potholes in key locations to test drivers' reflexes and keep them alert. 12. It is tradition in New Jersey to honk your horn at cars in front of you that do not move three milliseconds after the light turns green. 13. To avoid injury in the event of a collision or rollover, it is important to exit your vehicle thru the windshield right away. Wearing your seat belt will only impede your hi-velocity escape from danger. 14. Remember that the goal of every New Jersey driver is to get ahead of the pack by whatever means necessary. 15. In New Jersey, 'flipping the bird' is considered a polite salute. This gesture should always be returned. Thank You, The New Jersey Registrar of Motor Vehicles ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9266 From: James M. Atkinson Date: Mon Aug 2, 2004 4:18pm Subject: TSCM Equipment ...and now a word from our sponsors... If any list member is in need of any kind of bug sweep equipment I would appreciate them contacting me as I can save you some headaches, and probably save you a few bucks. Thank you, -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9267 From: tali whacker Date: Mon Aug 2, 2004 1:52pm Subject: Re: ...and the lesson here is? ### Well Jim on this one you are sadly wrong, in Ireland for example, they are usually not found. They go off. On a very small percentage of cases they take the courier with it. I can't think of any instances when someone publicly declared finding a bomb and then ended up being the creator.### http://www.morristribunal.ie/asp/display_one.asp?ObjectID=310&Mode=0&RecordID=113 [Pages 521-25.] Rossnowlagh, 18th of July 1994 14.80. There are two different caches of homemade explosives involved in this find: one in a derelict house and the other in a farmer's shed, both in the Rossnowlagh area. This is to the south west of Donegal town. This is another occasion on which it is said by Superintendent Lennon and Detective Garda McMahon that the information of Ms. McGlinchey enabled them to make these finds. For her part, Ms. McGlinchey says that she, Detective Inspector Lennon and Detective Garda McMahon actually placed the finds in position. The Tribunal repeats that the only value of this account is that it identifies an area into which the Tribunal must enquire. The Tribunal has heard the evidence of Detective Garda McMahon and Superintendent Lennon and the Tribunal is satisfied that the accounts given by these two officers are so contradictory and unbelievable that the Tribunal is forced to the conclusion that they are a tissue of lies. From all of the evidence, it is also forced to the conclusion that these two officers had a significant involvement in preparing and placing these two caches of explosives. 14.81. The Tribunal wishes to emphasise that it is satisfied that Ms. McGlinchey's evidence could not, on its own, form the basis of a positive finding adverse to either Superintendent Lennon, Detective Garda McMahon, Garda management or any other Garda. The Tribunal has been much guided by circumstantial evidence on all of the matters detailed in the report. 14.82. The account given by Detective Garda McMahon is that on the evening of the 18th of July 1994, Ms. McGlinchey informed him of a cache of homemade explosives in the Rossnowlagh area. Immediately on learning of this, he said that he contacted Detective Inspector Lennon and, at once, the three set off for Rossnowlagh. On the way down, Detective Garda McMahon says that Ms. McGlinchey gave them further information about the use which the 'Provisional IRA' had intended for the homemade explosives. She said that they proposed to load the material into a caravan and to tow it to a border checkpoint and explode it once the tow vehicle for the caravan had hydraulically detached the caravan and driven away. He said that she even identified the caravan on the side of the road on the way down to Rossnowlagh. The account of both officers was that they visited the two locations where the explosives were stored with Ms. McGlinchey, and later Detective Inspector Lennon informed Superintendent Duffy of the find and he later on took them out of commission. 14.83. This account, however, was totally contradicted by the fact that some time prior to this date, Detective Inspector Lennon had sent two reports to the Chief Superintendent in Letterkenny. These reports would indicate that Detective Inspector Lennon knew of this find long in advance of the 18th of July. These therefore contradict the suggestion that Ms. McGlinchey only imparted the information to Detective Garda McMahon that night. 14.86. It is common case that Superintendent Lennon, Detective Garda McMahon and Ms. McGlinchey went to Rossnowlagh the evening previous to the find. Ms. McGlinchey says that they went there to put the homemade explosives in position. Superintendent Lennon and Detective Garda McMahon deny this. They say that they went there in order to identify the location of the find. Afterword 14.93. The Tribunal is satisfied that this entire set of circumstances followed an evolutionary path. It started with a mischievous young woman, Adrienne McGlinchey, who was anxious to portray herself to the GardaÌ as a useful informer on subversive matters. Why she set out on such a course, one does not know. 9269 From: syndracit Date: Mon Aug 2, 2004 5:05pm Subject: Re: STATE LICENSE REGULATIONS ACROSS THE U.S. Then how does one enter this field with out having to shell out 30k in cash upfront for training. And what would be the best way some one could enter this field then? --- In TSCM-L@yahoogroups.com, "moellerthy" <1ach@g...> wrote: > I have recently contacted a couple of States reguarding there > requirements for licensing Technical Surveillance Counter measures. > > I have found that the States are flexable in willing to work to > accept a new license applicant which means granting of the license > without the requirement of 4000 hrs under someone else's belt. > > I have gone to College did my time and earned the A's it would be a > slap in the face for a State board to say sorry you have to work > under someone that has never went to college and who does not have > the expertise to testify scientifically about an anomaly. > > I bring to the Board, the Court , the contracted person who hired me > the best of my ability backed up by my Education, credit > ability ,and years of research, planning ,testing of a large volume > test instruments that the adversary could not even imagine exist. > > I look forward to posting to the list here my evidence of my finds > and progress on the subject. > > Andre Holmes > 1ach@G... > NEPTUNE ENTERPRISE SECURITY 9270 From: syndracit Date: Mon Aug 2, 2004 5:12pm Subject: Re: Fleeting Experience, Mirrored in Your Eyes I beleive some hi end 35mm Cameras already do this for still shot photo professionals, And have done this sense the late 90's. There is also a device like this in the Apache helicoptors.. But I think that device is only line of sight not focus dependent. "What happens if your about to take off and your Sarge salutes you?; hehehe" --- In TSCM-L@yahoogroups.com, kondrak wrote: > Theres been a lot of research into this for use in eye-sighted weapons > systems, particularly for jet fighter pilots. > > > At 13:47 7/30/2004, you wrote: > > >The NYTimes has a story, with some spooky-cool pictures, about software > >to extract exactly what image a person is seeing with their eyes, > >just from the reflection on their cornea. You can see even a wider image > >than the subject and tell what they're specifically focusing on. The > >possible applications listed include 'surveillance cameras that spot > >suspicious behavior.' > > > >http://www.nytimes.com/2004/07/29/technology/circuits/29next.html?ex=148753600&en=ff5bcfd82b552b5e&ei=5090&partner=rssuserland > > > >-- > >J. Molay > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > 9271 From: moellerthy <1ach@g...> Date: Mon Aug 2, 2004 9:16pm Subject: Re: STATE LICENSE REGULATIONS ACROSS THE U.S. --- In TSCM-L@yahoogroups.com, "syndracit" wrote: == In Response == I do not think that spending 30k in equipment is going to help you reach you end result. You must have some money to get started for example Busines license, Business name, Federal tax id , College courses and trade school etc. Your equipment purchased will be based on your present knowledge of what you think the threat most likely would be. You need to know generally what a bug needs and its weakness. 98% of bugs sold all share simularities so that's why you don't need 30k to get started to find a bug. The other 2% has a weakness to but the maker of the bug is thinking modulation type and giving up stealth in doing so. I have been on the side line for years buying equipment while attending school. I have seen licensed PI'S in the field looking for bugs but really they did not have a plan and it was not professional what they did. I have not uncovered my equipment and did not advice anyone on how do find the bug. My equipment is for my company and will stay that way unless I am contracted then I will earn my pay and the client will be impressed with how and why I did what I had to do. Go to every event possible hosted by HP, TEK, FBI, you will understand better that way. Sit back and listen to the people that have evidence that they found a bug and don't get caught up in hype O that person planted the bug. When the Sweeper gets to the location he should have already found the bug operating before he could unload all his equipment. == End ANDRE HOLMES 1ach@G... NEPTUNE ENTERPRISE SECURITY > Then how does one enter this field with out having to shell out 30k in > cash upfront for training. And what would be the best way some one > could enter this field then? > --- In TSCM-L@yahoogroups.com, "moellerthy" <1ach@g...> wrote: > > I have recently contacted a couple of States reguarding there > > requirements for licensing Technical Surveillance Counter measures. > > > > I have found that the States are flexable in willing to work to > > accept a new license applicant which means granting of the license > > without the requirement of 4000 hrs under someone else's belt. > > > > I have gone to College did my time and earned the A's it would be a > > slap in the face for a State board to say sorry you have to work > > under someone that has never went to college and who does not have > > the expertise to testify scientifically about an anomaly. > > > > I bring to the Board, the Court , the contracted person who hired me > > the best of my ability backed up by my Education, credit > > ability ,and years of research, planning ,testing of a large volume > > test instruments that the adversary could not even imagine exist. > > > > I look forward to posting to the list here my evidence of my finds > > and progress on the subject. > > > > Andre Holmes > > 1ach@G... > > NEPTUNE ENTERPRISE SECURITY 9272 From: kondrak Date: Tue Aug 3, 2004 0:52am Subject: Re: Re: Fleeting Experience, Mirrored in Your Eyes Lets hope you dont sneeze when you salute... At 18:12 8/2/2004, you wrote: >I beleive some hi end 35mm Cameras already do this for still shot >photo professionals, And have done this sense the late 90's. There >is also a device like this in the Apache helicoptors.. But I think >that device is only line of sight not focus dependent. "What happens >if your about to take off and your Sarge salutes you?; hehehe" >--- In TSCM-L@yahoogroups.com, kondrak wrote: > > Theres been a lot of research into this for use in eye-sighted weapons > > systems, particularly for jet fighter pilots. > > > > > > At 13:47 7/30/2004, you wrote: > > > > >The NYTimes has a story, with some spooky-cool pictures, about software > > >to extract exactly what image a person is seeing with their eyes, > > >just from the reflection on their cornea. You can see even a wider >image > > >than the subject and tell what they're specifically focusing on. The > > >possible applications listed include 'surveillance cameras that spot > > >suspicious behavior.' > > > > > > >http://www.nytimes.com/2004/07/29/technology/circuits/29next.html?ex=1487 > 53600&en=ff5bcfd82b552b5e&ei=5090&partner=rssuserland > > > > > >-- > > >J. Molay > > > > > > > > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > the hands acquire shaking, the shaking is a warning. > > > It is by caffeine alone I set my mind in motion. > > >=================================================== TSKS > > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9273 From: David Alexander Date: Tue Aug 3, 2004 3:27am Subject: RE: Re: Fleeting Experience, Mirrored in Your Eyes The way the 'shoot where I'm looking' system works is no secret. I only ever flew fixed wing, but I knew some attack helicopter pilots. The original systems used a helmet-mounted monocle with a crosshairs and a set of magnets mounted on the helmet, the 3-D orientation of those magnets was detected by field sensors built into the cockpit. When a weapon was to be fired the appropriate selector switch said which type to use, the user lined up their monocle on the target and pressed the target select button. The sensing system calculated the exact orientation of the helmet and told the weapons system exactly where the pilot/weapons operator was looking so it could send a missile to that spot, or point the chain gun at it. I believe it calibrated during the weapons systems initialisation process of each flight by using a series of known reference points in the cockpit. David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: 03 August 2004 06:53 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Re: Fleeting Experience, Mirrored in Your Eyes Lets hope you dont sneeze when you salute... At 18:12 8/2/2004, you wrote: >I beleive some hi end 35mm Cameras already do this for still shot >photo professionals, And have done this sense the late 90's. There >is also a device like this in the Apache helicoptors.. But I think >that device is only line of sight not focus dependent. "What happens >if your about to take off and your Sarge salutes you?; hehehe" >--- In TSCM-L@yahoogroups.com, kondrak wrote: > > Theres been a lot of research into this for use in eye-sighted weapons > > systems, particularly for jet fighter pilots. > > > > > > At 13:47 7/30/2004, you wrote: > > > > >The NYTimes has a story, with some spooky-cool pictures, about software > > >to extract exactly what image a person is seeing with their eyes, > > >just from the reflection on their cornea. You can see even a wider >image > > >than the subject and tell what they're specifically focusing on. The > > >possible applications listed include 'surveillance cameras that spot > > >suspicious behavior.' > > > > > > >http://www.nytimes.com/2004/07/29/technology/circuits/29next.html?ex=1487 > 53600&en=ff5bcfd82b552b5e&ei=5090&partner=rssuserland > > > > > >-- > > >J. Molay > > > > > > > > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > the hands acquire shaking, the shaking is a warning. > > > It is by caffeine alone I set my mind in motion. > > >=================================================== TSKS > > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9274 From: syndracit Date: Mon Aug 2, 2004 11:03pm Subject: Re: STATE LICENSE REGULATIONS ACROSS THE U.S. Good advice but What I realy ment Is 30k upfront in education. But I should of made my self more clear. I'm still trieng to figure out the best way to merge in this field my self fully. I gues maybe 2 years electronic engineering and 2 years of compsci would be a good start. To bad they don't have a tscm tech school. --- In TSCM-L@yahoogroups.com, "moellerthy" <1ach@g...> wrote: > --- In TSCM-L@yahoogroups.com, "syndracit" wrote: > > == In Response > == I do not think that spending 30k in equipment is going to help > you reach you end result. > > You must have some money to get started for example Busines > license, Business name, Federal tax id , College courses and > trade school etc. > > Your equipment purchased will be based on your present knowledge > of what you think the threat most likely would be. > > You need to know generally what a bug needs and its weakness. > > 98% of bugs sold all share simularities so that's why you > don't need 30k to get started to find a bug. > > The other 2% has a weakness to but the maker of the bug is > thinking modulation type and giving up stealth in doing so. > > I have been on the side line for years buying equipment while > attending school. I have seen licensed PI'S in the field > looking for bugs but really they did not have a plan and it > was not professional what they did. > > I have not uncovered my equipment and did not advice anyone on > how do find the bug. My equipment is for my company and will > stay that way unless I am contracted then I will earn my pay > and the client will be impressed with how and why I did what I > had to do. > > Go to every event possible hosted by HP, TEK, FBI, you will > understand better that way. > > Sit back and listen to the people that have evidence that they > found a bug and don't get caught up in hype O that person > planted the bug. > > When the Sweeper gets to the location he should have already > found the bug operating before he could unload all his > equipment. > == End > ANDRE HOLMES > 1ach@G... > NEPTUNE ENTERPRISE SECURITY > > > > Then how does one enter this field with out having to shell out > 30k in > > cash upfront for training. And what would be the best way some one > > could enter this field then? > > --- In TSCM-L@yahoogroups.com, "moellerthy" <1ach@g...> wrote: > > > I have recently contacted a couple of States reguarding there > > > requirements for licensing Technical Surveillance Counter > measures. > > > > > > I have found that the States are flexable in willing to work to > > > accept a new license applicant which means granting of the > license > > > without the requirement of 4000 hrs under someone else's belt. > > > > > > I have gone to College did my time and earned the A's it would > be a > > > slap in the face for a State board to say sorry you have to work > > > under someone that has never went to college and who does not > have > > > the expertise to testify scientifically about an anomaly. > > > > > > I bring to the Board, the Court , the contracted person who > hired me > > > the best of my ability backed up by my Education, credit > > > ability ,and years of research, planning ,testing of a large > volume > > > test instruments that the adversary could not even imagine exist. > > > > > > I look forward to posting to the list here my evidence of my > finds > > > and progress on the subject. > > > > > > Andre Holmes > > > 1ach@G... > > > NEPTUNE ENTERPRISE SECURITY 9275 From: Steve Uhrig Date: Mon Aug 2, 2004 7:06pm Subject: Re: Entering the field On 2 Aug 2004 at 22:05, syndracit , who eschews obfuscation, wrote: > Then how does one enter this field with out having to shell out 30k in > cash upfront for training. And what would be the best way some one > could enter this field then? You need to crawl before you can walk. Then you need to walk before you can run. Many if not most overlook those facts. Presuming you're not in a position to get trained by the government, who if you get into the right position will spend a LOT more than $30K training you, you need to do it on your own. There's no realistic private sector training beyond a few introductory level courses. They're not going to do you much good. You need basic electricity and basic electronics. Few really have this, so few are really effective. You can enroll in a tech school and learn that way. Or you can self study using something like the NEETS course. If you are disciplined and work through the NEETS course (Navy Electricity and Electronics Training Series) you will have a firm grasp of the basics. You need this before going any further. NEETS is available online for free. I learned much of the basics in this course in a classroom environment, in 2 years of 4 hours per day over 30 years ago. It's superb. Some hobby interest in an electronics-related area, like ham radio, will go a long way towards getting you up to speed. While it's not an official prerequisite, few serious sweepers are not lifelong ham radio enthusiasts. Then, if you're interested in getting into the business, you need to know business. That's actually more important than technical skills, although you need both. There are plenty of talented electronics types who are lousy businessmen. Any community college offers business courses. Take some marketing classes too. Nothing happens until you sell something, and it's a lot more difficult to sell TSCM than you might imagine. Even if you would want to work for someone else, you'll still need the electronics training and some business background. In 5 years you could have a firm grasp of basic electronics and have some business smarts. Those are the tools you'll need to start in TSCM. Or in 5 years, you could be 5 years older and no closer to being qualified to start into the field. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9276 From: dj Date: Tue Aug 3, 2004 8:48am Subject: Re: Re: Entering the field If anyone is interested in a copy of the NEETS course I have the new 2004 course on pdf. Send me an email at garrettar@h... Thanks, IT2 --------------------------------- Do you Yahoo!? New and Improved Yahoo! Mail - 100MB free storage! [Non-text portions of this message have been removed] 9277 From: Rodney Peck Date: Tue Aug 3, 2004 11:16am Subject: Re: Digest Number 1640 TSCM-L@yahoogroups.com wrote: > With the recent events, I'd say Yahoo is the LAST place I'd store anything of value. oh, I don't know ... I think yahoo groups is a safe place for my data. -R 9278 From: James M. Atkinson Date: Tue Aug 3, 2004 0:38pm Subject: TSCM Reference Library For those list members who would like massive free reference library on basic electronics, communications, TSCM, and associated discipline I would direct them to the following link on my site: http://www.tscm.com/reference.html It's completely free, and is not being peddled on a CD for 50 bucks a copy. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9279 From: James M. Atkinson Date: Tue Aug 3, 2004 0:47pm Subject: Re: Re: STATE LICENSE REGULATIONS ACROSS THE U.S. Simple, join the military and obtain a tech job that requires at least six months of formal training. or, pay attention in high school, get good grades, be active in sports... apply for scholarship money. -jma At 06:05 PM 8/2/2004, syndracit wrote: >Then how does one enter this field with out having to shell out 30k in >cash upfront for training. And what would be the best way some one >could enter this field then? ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9280 From: James M. Atkinson Date: Tue Aug 3, 2004 0:41pm Subject: Methods of Payment We Take For those list members who are interested we accept payment by cash, major credit card (Visa, Mastercard, AMEX), and wire transfer. For international customer we will pay all shipping and handling charges for them by express courier (ie: Fed Ex), so they will save a lot of money of shipping charges. Call us at (978) 381-9111 or email for all of your TSCM equipment requirements... you will be very happy you did. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9281 From: James M. Atkinson Date: Tue Aug 3, 2004 4:55pm Subject: New CIA Director Named http://www.deadbrain.com/news/article_2004_08_02_2028.php James Earl Jones Named CIA Chief Aug 2 2004 by Ross Bender The White House today named James Earl Jones as top-secret Interim Director of Central Intelligence. He replaces George Tenet, who resigned as Director in June in order to spend more time with his family. Mr. Jones is expected to oversee a massive cleanup in the intelligence community following the devastating report of the 9/11 Commission. The Commission Report, the last and final installment of 137 preliminary reports published in serial form on the Internet over the last several months, found severe malfunctions in the performance of the American intelligence community over the last one hundred and fifty years. Commissioners Thomas Kean and Lee Hamilton announced that the last absolutely precise forecast generated by the various American spy agencies was presented to President James Buchanan in the year 1859. Buchanan was told to expect an American Civil War sometime in the next five years, and history has shown that this prediction was accurate. The Report itself, which according to the New York Times is written in a "gripping narrative style" resembling a "paperback thriller," immediately soared to the top of the Times' fiction bestseller list. Paramount Pictures has reportedly nailed down the movie rights. Mr. Jones has had a distinguished career in the military, having played General James Solomon in "Command and Conquer: Tiberian Sun" (1999), and in the CIA itself, having portrayed Admiral James Greer in "Clear and Present Danger" (1994). In addition, Jones served for many years as the voice of Darth Vader in the popular Star Wars series. He was the voice of Mufasa in the acclaimed "Lion King II: Simba's Pride," and has depicted many prominent American Negroes on television, including Frederick Douglass, the Rev. Dr. Martin Luther King, and the Angel Gabriel. President Bush pronounced himself "pleased" with his selection. In a Rose Garden news conference the President said "It a good selection. Only problem is, now I cain't tell the difference tween mah Secretary of State and mah ultra top-secret Interim CIA Director. Know what I mean? They all look like Denzel Washington to me. Heh." -jma PS: Oops, so that some of the more anal retentive members of the list don't get their knickers in a twist I should mention that this is an off-topic post, that it is unrelated to the TSCM industry; but is a parody of an intelligence agency that is pretty much a joke in and of itself. It's comedy. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9282 From: Samuel Hayes Date: Tue Aug 3, 2004 7:40pm Subject: Re: Re: STATE LICENSE REGULATIONS ACROSS THE U.S. By no far stretch of the imagination do I claim to be an expert on the topic of TSCM. What I am confident in speaking on however is getting into the field since this is a question I have asked a number of times on this list and recieved some very valuable information from the more experienced LEGITIMATE TSCMers on the list. My first bit of advice to you would be to find a mentor. I have identified 6 members of this list who, whether they know it or not have served as my mentors for over 5 years now and I would not know what I do now without their guidance (Thanks guys, you know who you are). Second, go back to college and get a degree in Electrical Engineering if joining the military is not an option for you. I have found, from corresponding with other list members, that an EE degree is an excellent STARTING POINT. Notice I emphasize "starting point". TSCM is a science not much unlike forensic pathology. To my knowledge there are no "certification courses" in forensic pathology, get my point? A BSEE will prepare you to learn TSCM in theory and it not sound like chinese if you are fortunate enough to gain employment with a government agency. On top of EE, I would highly recommend a strong academic background in computer engineering/science as well.Again, and I may be wrong, but once completing this academic path you will have a good foundation to learn TSCM. I would also strongly suggest taking an electronic fundamentals course at your local vocational-technical school for the hands on experience needed with test-measure equipment and soldering as well as an A+ certification. This is the academic path I am currently following and from time to time I will see a job announcement for a TSCM position and what I notice is that as I continue to press on with my education the gap narrows for me between educational requirements in the job announcment and where I am in my education, but I am still no where near being ready and I started this path close to 5 years ago.Incidently, if 30k is to much too much for you to spend, you've probably chosen the wrong field.Here is what I have done over the years to work toward becoming a TSCM tech: - Electronic Fundamentals course 8 months (night school) - Fiber Optic Facility Technician & Digital Tech for phone company (utilize tuiton assistance/re-imbursment to pay for alot of this stuff and expose you to communications systems and training). - Extensive background in physical security operations (since 1986 with exception of 3 years spent with phone company). - Extensive background in electronic security systems installation and systems integration design. - Read everything I can get my hands on about TSCM. - Enrolled in EE program at accredited university with minor in CompE (only 4 classes seperate the two degrees)with additional courswork in CompSci. - Network security certification (various) - Computer forensics (summer 2005) I also work hard to maintain a very high fitness level considering I will probably be 40 y/o when I complete my degree work if I pursue a MSEE. At which time I will pursue a position with the State Department as a Security Engineering Officer. Its a long road for those of us not military trained to "break into the field" if you want to be credible. If not, you can go to NC and take a course and get licensed and take a few classes offered by CCS, but I wouldnt suggest doing either. (stepping down of my cyber soap-box) See you in the "field" Samuel R Hayes III TSCMer 2009 --- syndracit wrote: > Yeah How does some one get into this field? With out > shelling 30 Grang > cash out for training up front? > --- In TSCM-L@yahoogroups.com, "moellerthy" > <1ach@g...> wrote: > > I have recently contacted a couple of States > reguarding there > > requirements for licensing Technical Surveillance > Counter measures. > > > > I have found that the States are flexable in > willing to work to > > accept a new license applicant which means > granting of the license > > without the requirement of 4000 hrs under someone > else's belt. > > > > I have gone to College did my time and earned the > A's it would be a > > slap in the face for a State board to say sorry > you have to work > > under someone that has never went to college and > who does not have > > the expertise to testify scientifically about an > anomaly. > > > > I bring to the Board, the Court , the contracted > person who hired me > > the best of my ability backed up by my Education, > credit > > ability ,and years of research, planning ,testing > of a large volume > > test instruments that the adversary could not even > imagine exist. > > > > I look forward to posting to the list here my > evidence of my finds > > and progress on the subject. > > > > Andre Holmes > > 1ach@G... > > NEPTUNE ENTERPRISE SECURITY > > > __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - 100MB free storage! http://promotions.yahoo.com/new_mail 9283 From: syndracit Date: Tue Aug 3, 2004 2:31pm Subject: Re: Fleeting Experience, Mirrored in Your Eyes Hahahah --- In TSCM-L@yahoogroups.com, kondrak wrote: > Lets hope you dont sneeze when you salute... > > > At 18:12 8/2/2004, you wrote: > >I beleive some hi end 35mm Cameras already do this for still shot > >photo professionals, And have done this sense the late 90's. There > >is also a device like this in the Apache helicoptors.. But I think > >that device is only line of sight not focus dependent. "What happens > >if your about to take off and your Sarge salutes you?; hehehe" > > > > >--- In TSCM-L@yahoogroups.com, kondrak wrote: > > > Theres been a lot of research into this for use in eye-sighted weapons > > > systems, particularly for jet fighter pilots. > > > > > > > > > At 13:47 7/30/2004, you wrote: > > > > > > >The NYTimes has a story, with some spooky-cool pictures, about software > > > >to extract exactly what image a person is seeing with their eyes, > > > >just from the reflection on their cornea. You can see even a wider > >image > > > >than the subject and tell what they're specifically focusing on. The > > > >possible applications listed include 'surveillance cameras that spot > > > >suspicious behavior.' > > > > > > > > > >http://www.nytimes.com/2004/07/29/technology/circuits/29next.html?ex=1487 > > 53600&en=ff5bcfd82b552b5e&ei=5090&partner=rssuserland > > > > > > > >-- > > > >J. Molay > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > > > TSCM-L Technical Security Mailing List > > > > "In a multitude of counselors there is strength" > > > > > > > > To subscribe to the TSCM-L mailing list visit: > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > > > It is by caffeine alone I set my mind in motion. > > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > > the hands acquire shaking, the shaking is a warning. > > > > It is by caffeine alone I set my mind in motion. > > > >=================================================== TSKS > > > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > 9284 From: A.Lizard Date: Tue Aug 3, 2004 5:34pm Subject: Re: Digest Number 1640 At 08:11 AM 8/3/04, you wrote: >Message: 1 > Date: Sun, 01 Aug 2004 16:28:19 -0400 > From: kondrak >Subject: Re: Large attachments sent to the list > >With the recent events, I'd say Yahoo is the LAST place I'd store anything >of value. > > >At 06:48 8/1/2004, you wrote: > >Hi, I presume you mean the LAST place you'd store *the only copy* of anything of value. This is not something I'd argue. As a file distribution point of non-sensitive information for list members, I see no reason not to use it, though there might be good arguments for moving it and the mailing list itself to somewhere less likely to be affected by political considerations than a major corporation is. A.Lizard -- member The Internet Society (ISOC), The HTML Writers Guild. "They need to wake up and smell the fire, it is their pants that are burning." hombresecreto, re: the famous SCO threat letter Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@g..., alizardx@y... PGP 8.0 key available by request or keyserver. Download PGP from: http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html ***Looking for INTELLIGENT new technology public policy alternatives?*** http://www.ecis.com/~alizard/technology.html 9285 From: syndracit Date: Tue Aug 3, 2004 5:10pm Subject: Re: STATE LICENSE REGULATIONS ACROSS THE U.S. Or option c.. Go back to college at age 27 and get student loans and get 2 years degree in electircal engineering? Yeah very valid points though. The military would Of been a good shot also though. --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > Simple, join the military and obtain a tech job that requires at least six > months of formal training. > > or, pay attention in high school, get good grades, be active in sports... > apply for scholarship money. > > -jma > > > At 06:05 PM 8/2/2004, syndracit wrote: > >Then how does one enter this field with out having to shell out 30k in > >cash upfront for training. And what would be the best way some one > >could enter this field then? > > > ----------------------------------------------------------------------------------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ----------------------------------------------------------------------------------------------------- > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ----------------------------------------------------------------------------------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ----------------------------------------------------------------------------------------------------- 9286 From: G P Date: Tue Aug 3, 2004 6:42pm Subject: Re: New CIA Director Named Funny! Anything would be an improvement over the current old guard. --- "James M. Atkinson" wrote: > > > http://www.deadbrain.com/news/article_2004_08_02_2028.php > > James Earl Jones Named CIA Chief > Aug 2 2004 by Ross Bender > > The White House today named James Earl Jones as > top-secret Interim Director > of Central Intelligence. He replaces George Tenet, > who resigned as Director > in June in order to spend more time with his family. > > Mr. Jones is expected to oversee a massive cleanup > in the intelligence > community following the devastating report of the > 9/11 Commission. The > Commission Report, the last and final installment of > 137 preliminary reports > published in serial form on the Internet over the > last several months, found > severe malfunctions in the performance of the > American intelligence > community over the last one hundred and fifty years. > > Commissioners Thomas Kean and Lee Hamilton announced > that the last > absolutely precise forecast generated by the various > American spy agencies > was presented to President James Buchanan in the > year 1859. Buchanan was > told to expect an American Civil War sometime in the > next five years, and > history has shown that this prediction was accurate. > > The Report itself, which according to the New York > Times is written in a > "gripping narrative style" resembling a "paperback > thriller," immediately > soared to the top of the Times' fiction bestseller > list. Paramount Pictures > has reportedly nailed down the movie rights. > > Mr. Jones has had a distinguished career in the > military, having played > General James Solomon in "Command and Conquer: > Tiberian Sun" (1999), and in > the CIA itself, having portrayed Admiral James Greer > in "Clear and Present > Danger" (1994). > > In addition, Jones served for many years as the > voice of Darth Vader in the > popular Star Wars series. He was the voice of Mufasa > in the acclaimed "Lion > King II: Simba's Pride," and has depicted many > prominent American Negroes on > television, including Frederick Douglass, the Rev. > Dr. Martin Luther King, > and the Angel Gabriel. > > President Bush pronounced himself "pleased" with his > selection. In a Rose > Garden news conference the President said "It a good > selection. Only problem > is, now I cain't tell the difference tween mah > Secretary of State and mah > ultra top-secret Interim CIA Director. Know what I > mean? They all look like > Denzel Washington to me. Heh." > > > > -jma > > PS: Oops, so that some of the more anal retentive > members of the list don't > get their knickers in a twist I should mention that > this is an off-topic > post, that > it is unrelated to the TSCM industry; but is a > parody of an intelligence > agency > that is pretty much a joke in and of itself. It's > comedy. > > > > ----------------------------------------------------------------------------------------------------- > > > We Expertly Hunt Real Spies, Real Eavesdroppers, and > Real Wiretappers. > ----------------------------------------------------------------------------------------------------- > > > James M. Atkinson > Phone: (978) 381-9111 > Granite Island Group Fax: > > 127 Eastern Avenue #291 > Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > ----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent > Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > ----------------------------------------------------------------------------------------------------- > > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > Make a clean sweep of pop-up ads. Yahoo! Companion > Toolbar. > Now with Pop-Up Blocker. Get it for free! > http://us.click.yahoo.com/L5YrjA/eSIIAA/yQLSAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail 9287 From: kondrak Date: Wed Aug 4, 2004 2:56am Subject: Re: Digest Number 1640 I agree 100%! The necessity of backup systems can not be over emphasized. let me relate the experiences of this past weekend to you in brief. My local ISP who I use for mail (another account) disappeared from the Internet on Saturday morning about 5am. I had job traffic in the pipe and was severely disrupted due to them forgetting to renew the domain registration for the domain name I'm on. I watched email fail slowly, sometime getting some, sometimes not, sometimes I could send, sometimes I got 550'ed (domain does not exist). I spent a rather frustrating weekend after I figured out that the domain had disappeared, trying to contact someone who gave a rat's rectum, but finally did Monday morning. Now just as a domain disappears slowly, it comes back online slowly as well, having to propagate through the top-level domain servers, which are daisy-chained. The processing of the re-registration takes a bit of time, and tonight I sat here and watched it take from 2300 Tue to 3:23 today for it to hit all TLD root servers. A good tool for looking up and watching exactly this can be found on this page: http://www.squish.net/dnscheck/ I watched the "A" record, and the mail (MX -mail exchange) record come up. The internet is truly a wonderful thing, but human mistakes do happen. I just put two new backup linux boxes up today, on separate IP addresses to insure this won't be a re-occurring problem. At 18:34 8/3/2004, you wrote: >At 08:11 AM 8/3/04, you wrote: > >Message: 1 > > Date: Sun, 01 Aug 2004 16:28:19 -0400 > > From: kondrak > >Subject: Re: Large attachments sent to the list > > > >With the recent events, I'd say Yahoo is the LAST place I'd store anything > >of value. > > > > > >At 06:48 8/1/2004, you wrote: > > >Hi, >I presume you mean the LAST place you'd store *the only copy* of anything >of value. This is not something I'd argue. > >As a file distribution point of non-sensitive information for list members, >I see no reason not to use it, though there might be good arguments for >moving it and the mailing list itself to somewhere less likely to be >affected by political considerations than a major corporation is. > >A.Lizard >-- >member The Internet Society (ISOC), The HTML Writers Guild. >"They need to wake up and smell the fire, it is their pants that are burning." > hombresecreto, re: the famous SCO threat letter >Personal Website http://www.ecis.com/~alizard >business Website http://reptilelabs.com >backup address (if ALL else fails) alizard@g..., alizardx@y... >PGP 8.0 key available by request or keyserver. Download PGP from: >http://www.pgpi.org for e-mail privacy. >Disaster prep info: http://www.ecis.com/~alizard/y2k.html >***Looking for INTELLIGENT new technology public policy alternatives?*** > http://www.ecis.com/~alizard/technology.html > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9288 From: Tech Sec Lab Date: Wed Aug 4, 2004 8:06am Subject: RE: Re: ...and the lesson here is? I fail to see any link in this, this was an example of a couple of corrupt Gardai that decided to plant some home made explosives and then magically find them... There was no intent to carry out a bombing, and we don't even know if the stuff was real explosives as they coincidentally didn't even call in a forensics unit or keep possession of the substances. There is no evidence that the Gardai actually created the "explosives". But back to topic, like I said, having no hands on experience of surveillance devices is in my opinion a mistake. Ask the former TSCM Intell agents if they never had experience with surveillance devices.... Message: 15 Date: Mon, 2 Aug 2004 11:52:37 -0700 From: tali whacker Subject: Re: ...and the lesson here is? ### Well Jim on this one you are sadly wrong, in Ireland for example, they are usually not found. They go off. On a very small percentage of cases they take the courier with it. I can't think of any instances when someone publicly declared finding a bomb and then ended up being the creator.### http://www.morristribunal.ie/asp/display_one.asp?ObjectID=310&Mode=0&RecordI D=113 [Pages 521-25.] Rossnowlagh, 18th of July 1994 14.80. There are two different caches of homemade explosives involved in this find: one in a derelict house and the other in a farmer's shed, both in the Rossnowlagh area. This is to the south west of Donegal town. This is another occasion on which it is said by Superintendent Lennon and Detective Garda McMahon that the information of Ms. McGlinchey enabled them to make these finds. For her part, Ms. McGlinchey says that she, Detective Inspector Lennon and Detective Garda McMahon actually placed the finds in position. The Tribunal repeats that the only value of this account is that it identifies an area into which the Tribunal must enquire. The Tribunal has heard the evidence of Detective Garda McMahon and Superintendent Lennon and the Tribunal is satisfied that the accounts given by these two officers are so contradictory and unbelievable that the Tribunal is forced to the conclusion that they are a tissue of lies. From all of the evidence, it is also forced to the conclusion that these two officers had a significant involvement in preparing and placing these two caches of explosives. 14.81. The Tribunal wishes to emphasise that it is satisfied that Ms. McGlinchey's evidence could not, on its own, form the basis of a positive finding adverse to either Superintendent Lennon, Detective Garda McMahon, Garda management or any other Garda. The Tribunal has been much guided by circumstantial evidence on all of the matters detailed in the report. 14.82. The account given by Detective Garda McMahon is that on the evening of the 18th of July 1994, Ms. McGlinchey informed him of a cache of homemade explosives in the Rossnowlagh area. Immediately on learning of this, he said that he contacted Detective Inspector Lennon and, at once, the three set off for Rossnowlagh. On the way down, Detective Garda McMahon says that Ms. McGlinchey gave them further information about the use which the 'Provisional IRA' had intended for the homemade explosives. She said that they proposed to load the material into a caravan and to tow it to a border checkpoint and explode it once the tow vehicle for the caravan had hydraulically detached the caravan and driven away. He said that she even identified the caravan on the side of the road on the way down to Rossnowlagh. The account of both officers was that they visited the two locations where the explosives were stored with Ms. McGlinchey, and later Detective Inspector Lennon informed Superintendent Duffy of the find and he later on took them out of commission. 14.83. This account, however, was totally contradicted by the fact that some time prior to this date, Detective Inspector Lennon had sent two reports to the Chief Superintendent in Letterkenny. These reports would indicate that Detective Inspector Lennon knew of this find long in advance of the 18th of July. These therefore contradict the suggestion that Ms. McGlinchey only imparted the information to Detective Garda McMahon that night. 14.86. It is common case that Superintendent Lennon, Detective Garda McMahon and Ms. McGlinchey went to Rossnowlagh the evening previous to the find. Ms. McGlinchey says that they went there to put the homemade explosives in position. Superintendent Lennon and Detective Garda McMahon deny this. They say that they went there in order to identify the location of the find. Afterword 14.93. The Tribunal is satisfied that this entire set of circumstances followed an evolutionary path. It started with a mischievous young woman, Adrienne McGlinchey, who was anxious to portray herself to the GardaÌ as a useful informer on subversive matters. Why she set out on such a course, one does not know. From: Hiram` Date: Thu Aug 3, 2000 3:43pm Subject: RF DETECTORS HELLO,I AM LOOKING FOR INFOR MATION ON HOW AN RF DETECTOR WORKS AND HOW TO MAKE ONE FROM SCRACH CAN ANYONE SEND ME INFO OR WEB SITES THAT CAN GIVE ME SUCH INFORMATION. THANK YOU H 1083 From: Tom Mann Date: Fri Aug 4, 2000 8:06am Subject: Re: suit up More interesting comments! Here in Oregon, if you are licensed by the State (state law), you have to have 32 hours of continuing education every two years, including a block on ethics. Most of us out here think its a pretty good idea...maybe folks that run around in Ninja suits disagree. Tom Mann MACCFound@a... wrote: > > In a message dated 8/3/00 7:45:33 AM Pacific Daylight Time, > guardian@n... writes: > > << Ethics, at least in a true profession, >> > > Let's lose this thread. Opinions are like noses, et al. > > I can see this deteriorating into a rant on sex organ size. > > This list is TSCM-L@egroups. Go to www.egroups.com and > start a Sweep Ethics or TSCM Ethics list. > > Those that can do. What is it that people who criticize do? > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 1084 From: Date: Fri Aug 4, 2000 4:34am Subject: Re: suit up In a message dated 8/4/00 6:13:03 AM Pacific Daylight Time, guardian@n... writes: << Here in Oregon, if you are licensed by the State (state law), you have to have 32 hours of continuing education every two years, including a block on ethics. >> Licensed by what division of the state and what profession? 1085 From: James M. Atkinson, Comm-Eng Date: Fri Aug 4, 2000 9:05am Subject: Judge Rules Evidence From Wiretaps Admissible In Drug Trial Judge Rules Evidence From Wiretaps Admissible In Drug Trial By Associated Press, 8/1/2000 08:24 PORTLAND, Maine (AP) A federal judge has refused to bar the use of wiretap evidence in next month's trial of a group of alleged drug traffickers arrested in conjunction with a fatal police raid at a Brunswick hotel. U.S. District Judge Gene Carter acknowledged that drug agents violated federal guidelines by using civilian translators, rather than police personnel, to conduct the hundreds of hours of eavesdropping that preceded the raid and by failing to inform a judge about the practice. But Carter concluded that the mistakes were inadvertent and not serious enough to warrant throwing out the evidence against the group accused of smuggling a large amount of cocaine and crack cocaine into Maine. In his 20-page decision Monday, Carter said Congress removed restrictions aimed at protecting the public's privacy when it amended the wiretap law in 1986. By allowing ''persons of unknown competence, training and motive'' to conduct wiretaps in place of trained agents, ''the original level of privacy protection intended by the Congress . . . becomes ephemeral, if it does not evaporate entirely,'' he wrote. Carter's decision, which sets a precedent for the way wiretaps are conducted in Maine, heightens the odds that federal prosecutors will win convictions in the drug case. The case is set to go to trial Sept. 11. Local and federal agents broke up the alleged drug-dealing operation in December after listening to about 1,700 conversations on the phone of the group's alleged leader, Orlando Santana Jr. The wiretap was approved the previous month by U.S. District Judge D. Brock Hornby. Santana, 22, was shot to death by drug agents in a scuffle during the raid at the hotel. Eighteen suspects were arrested during and after the raid. The defendants in the case, most from the Brunswick area and Connecticut, have been charged with conspiring to deal cocaine and crack cocaine, a crime punishable by 10 years to life in prison. After a federal grand jury indicted members of the group, defense lawyers challenged the government's use of wiretaps, saying authorities failed to obtain permission to use civilian translators. The civilians were supposed to translate conversations that were in Spanish, but Carter determined that they conducted the entire wiretap. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1086 From: DrPepper Date: Fri Aug 4, 2000 8:48am Subject: Re: RF DETECTORS Go to Radio Shack, and get a near field frequency counter. Best bet And please stop shouting, Hiram!! ========================================= Hiram` wrote: > HELLO,I AM LOOKING FOR INFOR MATION ON HOW AN RF DETECTOR WORKS AND > HOW TO MAKE ONE FROM SCRACH CAN ANYONE SEND ME INFO OR WEB SITES THAT > CAN GIVE ME SUCH INFORMATION. > THANK YOU > H > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- - - - Dr Pepper, Also known as Ron Cheshire, WB6GKI, 35.37.26N/117.40.02W China Lake, CA USA ----------------------------- 90 miles West of Death Valley, 200 miles North of LAX ----------------------------- DrPepper@i... nannycams@i... - - - 1087 From: Miguel Puchol Date: Fri Aug 4, 2000 1:17pm Subject: RE: Cell-disturbing devices - self-inflicted tapping... Some more info on the device. Yesterday I had to visit a costumer, and since a high-speed train is available I took this option (4-hour train ride versus 6-7 hour car drive), and something I cannot stand is that, the train being equipped with purpose-built cellphone cabins, so you can go and talk without disturbing other travellers, some insist on screaming away their conversation while everyone else tries to get some sleep. Sooooo...the device came in handy. I had to fiddle a bit to fit a 9-volt battery in it, but it worked wonders. All the carriage I travelled in lost cellphone coverage, but only up to the door, which meant that the cellphone cabins were fine. I only ran the experiment some 30 minutes, as some of the calls could be urgent. I think that with these kind of devices, properly licensed, and properly marked areas, like non-smoking you could have non-cellphone, a lot of aggravation could be spared. The device worked wonders from inside the car at close range, so if you installed an external antenna and maybe some kind of power amplifier.... This thing is called 'WAC 1000 Wave Shield', nothing more to identify it's origin. Best regards, Mike > -----Mensaje original----- > De: rcwash@c... [mailto:rcwash@c...] > Enviado el: jueves, 03 de agosto de 2000 22:14 > Para: TSCM-L@egroups.com > Asunto: RE: [TSCM-L] Cell-disturbing devices - self-inflicted tapping... > > > > Wow, a fantasy come true. > > I can't count how many times I've had to take evasive action > on the highway because someone was more focused on their "cell" > phone than on their driving. And how I've dreamed of a magic > button which I could press to hang up their phone. Three times > in a row and maybe they would give up and concentrate on driving? > > I know, illegal, immoral and the self-destructive idiots wouldn't > give up anyway. > > But thanks for the dream. > > Bob Washburne - Who sometimes wonders, Hmmm...how would I do > that?... > > --- Original Message --- > "Miguel Puchol" Wrote on > Thu, 3 Aug 2000 20:05:54 +0200 > ------------------ > Hi all, > > I came across a cellular phone 'disruptor'(to use Klingon terms) > for some > $140, which works rather well. Different cell bands are available, > and up to > three can be mixed in one device. > Until now, the only reliable devices I've seen are made in Israel, > but this > one is straight out of Taiwan. There isn't a manufacturer's name > anywhere on > the device, so I can't provide more references. I now have to > look at this > thing with the SA, will keep posted. > Could be useful (apart from illegal to use) in sensitive meetings, > or to > cure some of those self-inflicted wire tappings. > It certainly disabled my GSM(900MHz) and DECT(1800MHz) phones. > > > > ----- > Sent using MailStart.com ( http://MailStart.Com/welcome.html ) > The FREE way to access your mailbox via any web browser, anywhere! > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > 1088 From: James M. Atkinson, Comm-Eng Date: Fri Aug 4, 2000 1:15pm Subject: More Tech Support Transcripts [humor] Tech Support: "I need you to right-click on the Open Desktop." Customer: "Ok." Tech Support: "Did you get a pop-up menu?" Customer: "No." Tech Support: "Ok. Right click again. Do you see a pop-up menu?" Customer: "No." Tech Support: "Ok, sir. Can you tell me what you have done up until this point?" Customer: "Sure, you told me to write 'click' and I wrote 'click'." (At this point I had to put the caller on hold to tell the rest of the tech support staff what had happened. I couldn't, however, stop from giggling when I got back to the call.) Tech Support: "Ok, did you type 'click' with the keyboard?" Customer: "I have done something dumb, right?" ------------------------------------------------------------------ Customer: "I want to send an email. How do I do it from WordPerfect?" Tech Support: "Do you have an email program?" Customer: "No." Tech Support: "Are you on a network?" Customer: "No." Tech Support: "Do you have a modem?" Customer: "No." Tech Support: "Then you can't send email." Customer: "This program is useless! How am I going to send an email!?" Tech Support: "Well, if you push the send button a small door will open at the back of your monitor, and a pigeon will fly out with your message." ------------------------------------------------------------------ Customer: "What's the fastest way to move 500 megabytes of data daily from Santa Cruz to Los Angeles?" Tech Support: "Fed Ex." ------------------------------------------------------------------ Customer: "How fast will my COM ports go?" Tech Support: "How hard can you throw your computer?" ------------------------------------------------------------------ Customer: "Can I ask you a really stupid question?" Tech Support: "Yes. And history will bear me out on that." ------------------------------------------------------------------ Customer: "What does UART stand for anyway??" Tech Support: "It stands for UART gettin' online!" ------------------------------------------------------------------ Student: "How do I make a paper longer?" Consultant: "You write more." ------------------------------------------------------------------ Customer: "Hello, I have a problem. My name is Bob Murton." Tech Support: "I'm sorry, but I can't help you with that problem." ------------------------------------------------------------------ Tech Support: "Ok--" Customer: "Oh, now there's something like a spinning barber pole on the screen." Tech Support: "You didn't press 'OK' did you?" Customer: "Yes. You said 'OK'." Tech Support: (acting alarmed) "I just said 'Ok,' I didn't mean for you to press 'OK'!" Customer: (panicking) "What should I do now?" Tech Support: "Run! Get out of there! Run! Run!" The next thing he heard was the phone hitting the floor, the sound of rapidly retreating footsteps, and a door slam. After numerous calls over the course of an hour, the customer finally answered the phone. She had waited outside for an hour -- when the computer didn't explode, she went back inside and unplugged it. ------------------------------------------------------------------ Tech Support: "Sir, something has burned within your power supply." Customer: "I bet that there is some command that I can put into the AUTOEXEC.BAT that will take care of this." Tech Support: "There is nothing that software can do to help you with this problem." Customer: "I know that there is something that I can put in...some command...maybe it should go into the CONFIG.SYS." Minutes later: Tech Support: "Ok, I am not supposed to tell anyone this but there is a hidden command in some versions of DOS that you can use. I want you to edit your AUTOEXEC.BAT and add the last line as C:\DOS\NOSMOKE and reboot your computer." Pause. Customer: "It is still smoking." Tech Support: "I guess you'll need to call Microsoft and ask them for a patch for the NOSMOKE.EXE." Four hours later, he calls back. Tech Support: "Hello sir, how is your computer?" Customer: "I called Microsoft and they said that my power supply is incompatible with their NOSMOKE.EXE and that I need to get a new one. I was wondering when I can have that done?" ------------------------------------------------------------------ =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1089 From: andre holmes <1ach@g...> Date: Fri Aug 4, 2000 7:59pm Subject: SWEEPS Hello listies I work for a very large company 20yrs+ When a visitor shows up at the front office all hears are raised among the employees. Some times the visitors are legit sales people,other times customers. Lets say a security company shows up with ECM equip the security companies cover is mute at that point at least at my place of work. The best way to pick off a stuck xmitter is with a briefcase concealed intercept receiver. Employees know every square inch of the work areas they know all phone company installers because the same installers are used yearly due to work assignment of the Central Office. The same applies to alarm company installers . People dont try to out con the con during work hours example taking covers off the telephones,removing wall plates cause the hiring company has maintenance people etc. After hours is your best chance off getting to the bug before the buggers. GOOD LUCK Ps- Dont forget about the letter bug. [Non-text portions of this message have been removed] 1090 From: Tom Mann Date: Fri Aug 4, 2000 8:10pm Subject: Re: suit up Dear MACCFound: Anyone who engages in any activity defined as investigative, including any snooping whatsoever. The language is so broad that anyone engaged in any investigative field at all needs a PI license in Oregon, unless specifically exempted. Tom Mann MACCFound@a... wrote: > > In a message dated 8/4/00 6:13:03 AM Pacific Daylight Time, > guardian@n... writes: > > << Here in Oregon, if you are licensed by the State (state law), you have > to have 32 hours of continuing education every two years, including a > block on ethics. >> > > Licensed by what division of the state and what profession? > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 1091 From: Charles Patterson Date: Fri Aug 4, 2000 6:21pm Subject: On the subject of suits and armor... _Food for thought_ I picked this off another telecom list, it can lead one to speculate about many aspects of our work, as well as a number of recent threads: Recently we had a little episode happen on campus. Normally our maintenance guys wear the khaki uniforms with the college logo and their name patch above the pockets. But that day the air conditioning guy was wearing his regular street clothing. There was a problem with the air conditioning and he was checking the room temps with an InfraRed thermometer. This gizmo is black and looks much like a pistol, with a laser beam coming out the front so it can be aimed accurately. He was using this and some students saw him, and (presumably thanks to cell phones) SEVEN cop cars came screeching to a stop in front of the campus as all hell broke loose! Some students apparently thought this IR thermometer was a real gun! So he had a lot of explaining to do, and apparently now uses the 'weapon' with his uniform on so he looks more like a college employee and less like an intruder. cp 1092 From: A Grudko Date: Sat Aug 5, 2000 3:19am Subject: To be or not to be seen ? - that is the question Apologies to Bill Shakespear for my plagerism In my country dressing up as a 'phone company' employee is an offence as our 'public' phone company, Telcom, has only one shareholder, the SA government, and you could be charged with impersonating a government official. This having been said, you can buy Telcom uniforms from surplus outlets. You can also buy surplus Telcom vehicles from State auctions, still with the ladder on the roof. The Telcom logo and special number plates are off, but, hey, how difficult is it to replace those? About 9 months ago it was alledged that just such a setup was used by a Johannesburg PI to tap the phone of the Registrar of our Security Officers Board (SOB), Patrick Rownan. Unfortunatly for the buggers (yes I understand the double-entendre) their equipment caused line noise and Mr Ronan (a streetwise lawyer) called in a TSCM firm (not us) to check his lines. A physical search found the equipment and a trap was set. The bugger was caught and he and his brother (business partner) now face a string of criminal and civil charges, including impersonating a government official (to gain access to a 'secure' residential estate). The above is public knowledge, having appeared in the media, so I'm not breaking any confidences here. If the 2 PIs in question are found guilty I will have no option but to remove them from our PI association, SACI, in terms of it's Code of Conduct. Ironically, but perhaps related, I have been in frequent consultation with Mr Ronan on the issue of PI's being regulated by the SOB. A 39 000 word white paper goes before Parliament 14 Aug., and included is the specific regulation of Private Investigators and Private Intelligence Agents. In March this year I submitted a voluminous reply to the SOB discussion doccument on behalf of SACI and the South African chapter of the Society of Competitive Intelligence Professionals (www.scip.org) of which I am Chairman. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1093 From: A Grudko Date: Sat Aug 5, 2000 3:34am Subject: To be or not to be seen - part 2 Some clients want us to do sweeps covertly - when the staff can't see. Otheres want it to be overt, probably for deterrant/comefort effect. On overt sweeps we have 1" x 15" paper strips which we staple round the 'phone with 'Checked for bugs by Grudko Wilson Associates - 011 465 9673'. The staff member has to cut/tear off the strip to use the 'phone. You'd be surprised how many follow up calls, and even jobs we get from this simple matketing ploy. May be of use to some of you out there. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1094 From: A Grudko Date: Sat Aug 5, 2000 5:05am Subject: That odd RF signal It's gone!!!! I brought the DF kit out this weekend and that local unlicenced 'Beep, Beep, Beep, Beep, Beep, Beep, drop carrier - repeat cycle' signal in our military VHF band has gone! Which of course raises more questions. Was it a tracking device and the subject has moved on? Was it on batteries which have now died (4 weeks, 6 km line of sight range could be a battery powered device)? Did John Titterton's 'Men in black' from SATRA find it and remove the illegal kit? Has it been returned to Roswell?.......... Did Elvis have a 2 metre rig and key? ...but there's another signal I discovered yesterday, 525 Khz up. Voice, sounds like analogue double frequency inversion (old type of scrambling, easy to crack). Or is it clear speech from Roswell? Fade out to the tone sequences from 'Close Encounters'. I love this business! Andy Grudko G8RXE ZR6UU ZRAJ7795 (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1095 From: A Grudko Date: Sat Aug 5, 2000 8:55am Subject: Re: Cell-disturbing devices - self-inflicted tapping... ----- Original Message ----- > I think that with these kind of devices, properly licensed, and properly > marked areas, like non-smoking you could have non-cellphone, a lot of > aggravation could be spared. Wonderful...best invention since the fingerless prostrate examination. Where can I get these wonders? Please reply privatly. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1096 From: Date: Fri Aug 4, 2000 10:24am Subject: Re: RF DETECTORS Well will it locate a transmiter or a kel device and how big would one be i need somthing that is small and vibrates when a transmiter is being used near by Hiram 1097 From: DrPepper Date: Sat Aug 5, 2000 8:41am Subject: Re: Cell-disturbing devices - self-inflicted tapping... While this type of technology always amazes and fascinates me, I must say that It is VERY arrogant of you to decide which phone calls are "urgent" and which ones just are an annoyance to yoiu. If I was on the train at the time and knew what you were doing. I would not only call the cops, but I'd sue the socks off you. Do you really think that it is acting like a "professional" to do such a thing? I consider it just as irresponsible, if not more so than the people who scream into rtheir cell phones at the top of their voices. Also, it is most definitly illegal to jam radio transmissions. Sorry, but attaboy here. Ron C. ===================================================== Miguel Puchol wrote: > Some more info on the device. > > Yesterday I had to visit a costumer, and since a high-speed train is > available I took this option (4-hour train ride versus 6-7 hour car drive), > and something I cannot stand is that, the train being equipped with > purpose-built cellphone cabins, so you can go and talk without disturbing > other travellers, some insist on screaming away their conversation while > everyone else tries to get some sleep. > > Sooooo...the device came in handy. I had to fiddle a bit to fit a 9-volt > battery in it, but it worked wonders. All the carriage I travelled in lost > cellphone coverage, but only up to the door, which meant that the cellphone > cabins were fine. I only ran the experiment some 30 minutes, as some of the > calls could be urgent. > > I think that with these kind of devices, properly licensed, and properly > marked areas, like non-smoking you could have non-cellphone, a lot of > aggravation could be spared. > > The device worked wonders from inside the car at close range, so if you > installed an external antenna and maybe some kind of power amplifier.... > > This thing is called 'WAC 1000 Wave Shield', nothing more to identify it's > origin. > > Best regards, > > Mike > > > -----Mensaje original----- > > De: rcwash@c... [mailto:rcwash@c...] > > Enviado el: jueves, 03 de agosto de 2000 22:14 > > Para: TSCM-L@egroups.com > > Asunto: RE: [TSCM-L] Cell-disturbing devices - self-inflicted tapping... > > > > > > > > Wow, a fantasy come true. > > > > I can't count how many times I've had to take evasive action > > on the highway because someone was more focused on their "cell" > > phone than on their driving. And how I've dreamed of a magic > > button which I could press to hang up their phone. Three times > > in a row and maybe they would give up and concentrate on driving? > > > > I know, illegal, immoral and the self-destructive idiots wouldn't > > give up anyway. > > > > But thanks for the dream. > > > > Bob Washburne - Who sometimes wonders, Hmmm...how would I do > > that?... > > > > --- Original Message --- > > "Miguel Puchol" Wrote on > > Thu, 3 Aug 2000 20:05:54 +0200 > > ------------------ > > Hi all, > > > > I came across a cellular phone 'disruptor'(to use Klingon terms) > > for some > > $140, which works rather well. Different cell bands are available, > > and up to > > three can be mixed in one device. > > Until now, the only reliable devices I've seen are made in Israel, > > but this > > one is straight out of Taiwan. There isn't a manufacturer's name > > anywhere on > > the device, so I can't provide more references. I now have to > > look at this > > thing with the SA, will keep posted. > > Could be useful (apart from illegal to use) in sensitive meetings, > > or to > > cure some of those self-inflicted wire tappings. > > It certainly disabled my GSM(900MHz) and DECT(1800MHz) phones. > > > > > > > > ----- > > Sent using MailStart.com ( http://MailStart.Com/welcome.html ) > > The FREE way to access your mailbox via any web browser, anywhere! > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 1098 From: James M. Atkinson, Comm-Eng Date: Sat Aug 5, 2000 0:39pm Subject: Re: To be or not to be seen - part 2 At 10:34 AM +0200 8/5/00, A Grudko wrote: >Some clients want us to do sweeps covertly - when the staff can't see. >Otheres want it to be overt, probably for deterrant/comefort effect. > >On overt sweeps we have 1" x 15" paper strips which we staple round the >'phone with 'Checked for bugs by Grudko Wilson Associates - 011 465 9673'. >The staff member has to cut/tear off the strip to use the 'phone. > >You'd be surprised how many follow up calls, and even jobs we get from this >simple matketing ploy. > >May be of use to some of you out there. Periodically I get called in to perform what I call a "High Profile Bug Sweep", and do pretty much the same thing. For such sweeps I place the phone in a conductive (Farady Cage) pouch and snap a rubber band around entry point when I am finished with it. The pouch has a label in it with a Security warning, and a mention that it was checked for eavesdropping devices. Ditto for pocket calculators, tape recorders, cell phones, and so on (I bag all high threat devices). Inside the pouch I place a little report/white paper on telephone security. I also had poker chips made up with my name and contact information that I leave inside desk drawers, tapes under tables and so on (so that they will find the reminders at random future dates). The goal is not to blanket the company with marketing materials, but instead to "get their mind right" when it comes to security, it's more of a wake up call then anything else. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1099 From: Miguel Puchol Date: Sat Aug 5, 2000 5:53pm Subject: RE: Cell-disturbing devices - self-inflicted tapping... OK, so then maybe I should go and try the thing in a hospital, ambulance center, etc. - if I chose the train it was a)Because it has specifically marked cellphone cabins with doors b)It also has public telephones c)As the train is moving fast, there wasn't a chance that the device would be disturbing a particular cell for more than 30 seconds and d)I could turn on the device for spaces lasting 30 seconds, and off for some 5 to 10 minutes, so if anybody had to call or there were emergency calls, they could sure be made. I know perfectly well that what I did was illegal, and that these devices are illegal, but I see many perfectly reasonable applications for them. We've had at least 5 accidents at gas stations in Spain where it was proved that a cellphone had interfered with the pump's circuitry, and two at hospitals where life-support systems where interfered. I was only trying to test the device in the field, and I am SURE that no harm was done. Just some people looking funny at their phones for some time. I have done this same journey with a cellphone connected to a laptop, logging all cells we passed, which was a total of 214, and there was 20% of the trip that the phone had very poor or no coverage. So, I don't think the world could have come to an end by making this into 20.001%... A final comment, jamming transmissions is legal in some countries under certain circumstances, like terrorist threats. I bet in the US a lot of important people have jamming systems in their cars, and far more powerful and wide-band that this taiwanese-thing. Everyone has a right to their oppinion, and I accept and understand your comments, but frankly I don't think it's such a big deal. All the best, Mike > -----Mensaje original----- > De: DrPepper [mailto:DrPepper@i...] > Enviado el: s·bado, 05 de agosto de 2000 15:42 > Para: TSCM-L@egroups.com > Asunto: Re: [TSCM-L] Cell-disturbing devices - self-inflicted tapping... > > > While this type of technology always amazes and fascinates me, > I must say > that It is VERY arrogant of you to decide which phone calls are "urgent" > and which ones just are an annoyance to yoiu. > > If I was on the train at the time and knew what you were doing. I > would not > only call the cops, but I'd sue the socks off you. Do you really > think that it > > is acting like a "professional" to do such a thing? I consider it just as > irresponsible, if not more so than the people who scream into rtheir cell > phones at the top of their voices. Also, it is most definitly > illegal to jam > radio > transmissions. > > Sorry, but attaboy here. > > Ron C. > > ===================================================== > Miguel Puchol wrote: > > > Some more info on the device. > > > > Yesterday I had to visit a costumer, and since a high-speed train is > > available I took this option (4-hour train ride versus 6-7 hour > car drive), > > and something I cannot stand is that, the train being equipped with > > purpose-built cellphone cabins, so you can go and talk without > disturbing > > other travellers, some insist on screaming away their conversation while > > everyone else tries to get some sleep. > > > > Sooooo...the device came in handy. I had to fiddle a bit to fit a 9-volt > > battery in it, but it worked wonders. All the carriage I > travelled in lost > > cellphone coverage, but only up to the door, which meant that > the cellphone > > cabins were fine. I only ran the experiment some 30 minutes, as > some of the > > calls could be urgent. > > > > I think that with these kind of devices, properly licensed, and properly > > marked areas, like non-smoking you could have non-cellphone, a lot of > > aggravation could be spared. > > > > The device worked wonders from inside the car at close range, so if you > > installed an external antenna and maybe some kind of power amplifier.... > > > > This thing is called 'WAC 1000 Wave Shield', nothing more to > identify it's > > origin. > > > > Best regards, > > > > Mike > > > > > -----Mensaje original----- > > > De: rcwash@c... [mailto:rcwash@c...] > > > Enviado el: jueves, 03 de agosto de 2000 22:14 > > > Para: TSCM-L@egroups.com > > > Asunto: RE: [TSCM-L] Cell-disturbing devices - self-inflicted > tapping... > > > > > > > > > > > > Wow, a fantasy come true. > > > > > > I can't count how many times I've had to take evasive action > > > on the highway because someone was more focused on their "cell" > > > phone than on their driving. And how I've dreamed of a magic > > > button which I could press to hang up their phone. Three times > > > in a row and maybe they would give up and concentrate on driving? > > > > > > I know, illegal, immoral and the self-destructive idiots wouldn't > > > give up anyway. > > > > > > But thanks for the dream. > > > > > > Bob Washburne - Who sometimes wonders, Hmmm...how would I do > > > that?... > > > > > > --- Original Message --- > > > "Miguel Puchol" Wrote on > > > Thu, 3 Aug 2000 20:05:54 +0200 > > > ------------------ > > > Hi all, > > > > > > I came across a cellular phone 'disruptor'(to use Klingon terms) > > > for some > > > $140, which works rather well. Different cell bands are available, > > > and up to > > > three can be mixed in one device. > > > Until now, the only reliable devices I've seen are made in Israel, > > > but this > > > one is straight out of Taiwan. There isn't a manufacturer's name > > > anywhere on > > > the device, so I can't provide more references. I now have to > > > look at this > > > thing with the SA, will keep posted. > > > Could be useful (apart from illegal to use) in sensitive meetings, > > > or to > > > cure some of those self-inflicted wire tappings. > > > It certainly disabled my GSM(900MHz) and DECT(1800MHz) phones. > > > > > > > > > > > > ----- > > > Sent using MailStart.com ( http://MailStart.Com/welcome.html ) > > > The FREE way to access your mailbox via any web browser, anywhere! > > > > > > > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1100 From: Bob Washburne Date: Sat Aug 5, 2000 5:47pm Subject: Re: Cell-disturbing devices - self-inflicted tapping... DrPepper wrote: > > While this type of technology always amazes and fascinates me, I must say > that It is VERY arrogant of you to decide which phone calls are "urgent" > and which ones just are an annoyance to yoiu. > > If I was on the train at the time and knew what you were doing. I would not > only call the cops, but I'd sue the socks off you. Do you really think that it > > is acting like a "professional" to do such a thing? I consider it just as > irresponsible, if not more so than the people who scream into rtheir cell > phones at the top of their voices. Also, it is most definitly illegal to jam > radio > transmissions. In the case of the cell-phone-on-the-highway incident waaaay at the bottom of this thread, it is the cellular call that is both illegal and dangerous (no cell calls in a moving vehicals in my state.) But when was the last time you saw it enforced? Grumble, gripe, complain, fantasize about a better world. Bob Washburne - Who spends his full time as a professional Bob Washburne, and acts like it. > > Sorry, but attaboy here. > > Ron C. > > ===================================================== > Miguel Puchol wrote: > > > Some more info on the device. > > > > Yesterday I had to visit a costumer, and since a high-speed train is > > available I took this option (4-hour train ride versus 6-7 hour car drive), > > and something I cannot stand is that, the train being equipped with > > purpose-built cellphone cabins, so you can go and talk without disturbing > > other travellers, some insist on screaming away their conversation while > > everyone else tries to get some sleep. > > > > Sooooo...the device came in handy. I had to fiddle a bit to fit a 9-volt > > battery in it, but it worked wonders. All the carriage I travelled in lost > > cellphone coverage, but only up to the door, which meant that the cellphone > > cabins were fine. I only ran the experiment some 30 minutes, as some of the > > calls could be urgent. > > > > I think that with these kind of devices, properly licensed, and properly > > marked areas, like non-smoking you could have non-cellphone, a lot of > > aggravation could be spared. > > > > The device worked wonders from inside the car at close range, so if you > > installed an external antenna and maybe some kind of power amplifier.... > > > > This thing is called 'WAC 1000 Wave Shield', nothing more to identify it's > > origin. > > > > Best regards, > > > > Mike > > > > > -----Mensaje original----- > > > De: rcwash@c... [mailto:rcwash@c...] > > > Enviado el: jueves, 03 de agosto de 2000 22:14 > > > Para: TSCM-L@egroups.com > > > Asunto: RE: [TSCM-L] Cell-disturbing devices - self-inflicted tapping... > > > > > > > > > > > > Wow, a fantasy come true. > > > > > > I can't count how many times I've had to take evasive action > > > on the highway because someone was more focused on their "cell" > > > phone than on their driving. And how I've dreamed of a magic > > > button which I could press to hang up their phone. Three times > > > in a row and maybe they would give up and concentrate on driving? > > > > > > I know, illegal, immoral and the self-destructive idiots wouldn't > > > give up anyway. > > > > > > But thanks for the dream. > > > > > > Bob Washburne - Who sometimes wonders, Hmmm...how would I do > > > that?... > > > > > > --- Original Message --- > > > "Miguel Puchol" Wrote on > > > Thu, 3 Aug 2000 20:05:54 +0200 > > > ------------------ > > > Hi all, > > > > > > I came across a cellular phone 'disruptor'(to use Klingon terms) > > > for some > > > $140, which works rather well. Different cell bands are available, > > > and up to > > > three can be mixed in one device. > > > Until now, the only reliable devices I've seen are made in Israel, > > > but this > > > one is straight out of Taiwan. There isn't a manufacturer's name > > > anywhere on > > > the device, so I can't provide more references. I now have to > > > look at this > > > thing with the SA, will keep posted. > > > Could be useful (apart from illegal to use) in sensitive meetings, > > > or to > > > cure some of those self-inflicted wire tappings. > > > It certainly disabled my GSM(900MHz) and DECT(1800MHz) phones. > > > > > > > > > > > > ----- > > > Sent using MailStart.com ( http://MailStart.Com/welcome.html ) > > > The FREE way to access your mailbox via any web browser, anywhere! > > > > > > > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 1101 From: Pesach Lattin Date: Sun Aug 6, 2000 11:44am Subject: Re: Cell-disturbing devices - self-inflicted tapping... Agreed - on top of that, Mike is admitting on a public list that he committed a federal crime. Not a smart thing to do since there are mutliple people on this list who are federal officers who work in electronic crimes. You have given probable cause for a search of your premises, and if the device is found, arrest and proscecution. You have already admitted that you use it. ---------------------------------------------------------------- Pesach Lattin, Computer Crime Specialist Voice Mail: (914) 818-3727 Fax: (240) 337-8339 Webmaster, Federal Law Enforcement Officers Association HQ: ph: (717) 938-2300 fax: (717) 932-2262 Visit our website @ http://www.fleoa.org ---------------------------------------------------------------- > > ===================================================== > > Miguel Puchol wrote: > > > > > Some more info on the device. > > > > > > Yesterday I had to visit a costumer, and since a high-speed train is > > > available I took this option (4-hour train ride versus 6-7 hour car drive), > > > and something I cannot stand is that, the train being equipped with > > > purpose-built cellphone cabins, so you can go and talk without disturbing > > > other travellers, some insist on screaming away their conversation while > > > everyone else tries to get some sleep. > > > > > > Sooooo...the device came in handy. I had to fiddle a bit to fit a 9-volt > > > battery in it, but it worked wonders. All the carriage I travelled in lost > > > cellphone coverage, but only up to the door, which meant that the cellphone > > > cabins were fine. I only ran the experiment some 30 minutes, as some of the > > > calls could be urgent. > > > > > > I think that with these kind of devices, properly licensed, and properly > > > marked areas, like non-smoking you could have non-cellphone, a lot of > > > aggravation could be spared. > > > > > > The device worked wonders from inside the car at close range, so if you > > > installed an external antenna and maybe some kind of power amplifier.... > > > > > > This thing is called 'WAC 1000 Wave Shield', nothing more to identify it's > > > origin. > > > > > > Best regards, > > > > > > Mike 1102 From: James M. Atkinson, Comm-Eng Date: Sun Aug 6, 2000 9:35am Subject: List Demographics (Confession is good for the soul) Well let's see: We currently have just over 550 subscribers on the list, with quite a few of them being either government TSCM'ers, and/or federal law enforcement people. In fact 47 US government TSCM/Counterintelligence people were added to the last month alone (something about a government threat seminar I presented). I would consider it to be most unwise to commit any mischief or to confess to any kind of mischief on the list unless you have a really serious belief in paying penance. Of course fiddling about and jamming a cellular system on a train is a tad bit naughty, but I doubt that it is something that the FBI would rain on you for (on the other hand the FCC and Secret Service might want to have a little chat with you). Jamming a cellular telephone system is right up there with building bug kits... both are technically illegal, and both are activities which a legitimate TSCM'er should not engage in. -jma At 9:44 AM -0700 8/6/00, Pesach Lattin wrote: > Agreed - on top of that, Mike is admitting on a public list that he >committed a federal crime. Not a smart thing to do since there are mutliple >people on this list who are federal officers who work in electronic crimes. >You have given probable cause for a search of your premises, and if the >device is found, arrest and proscecution. You have already admitted that you >use it. > >---------------------------------------------------------------- >Pesach Lattin, Computer Crime Specialist >Voice Mail: (914) 818-3727 Fax: (240) 337-8339 > >Webmaster, Federal Law Enforcement Officers Association >HQ: ph: (717) 938-2300 fax: (717) 932-2262 >Visit our website @ http://www.fleoa.org >---------------------------------------------------------------- =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1103 From: Mike F Date: Sun Aug 6, 2000 9:47am Subject: RE: List Demographics (Confession is good for the soul) L8R4,Mike f. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." -----Original Message----- From: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] Sent: Sunday, August 06, 2000 9:35 AM To: TSCM-L@egroups.com Subject: [TSCM-L] List Demographics (Confession is good for the soul) Well let's see: We currently have just over 550 subscribers on the list, with quite a few of them being either government TSCM'ers, and/or federal law enforcement people. In fact 47 US government TSCM/Counterintelligence people were added to the last month alone (something about a government threat seminar I presented). I would consider it to be most unwise to commit any mischief or to confess to any kind of mischief on the list unless you have a really serious belief in paying penance. Of course fiddling about and jamming a cellular system on a train is a tad bit naughty, but I doubt that it is something that the FBI would rain on you for (on the other hand the FCC and Secret Service might want to have a little chat with you). Jamming a cellular telephone system is right up there with building bug kits... both are technically illegal, and both are activities which a legitimate TSCM'er should not engage in. -jma At 9:44 AM -0700 8/6/00, Pesach Lattin wrote: > Agreed - on top of that, Mike is admitting on a public list that he >committed a federal crime. Not a smart thing to do since there are mutliple >people on this list who are federal officers who work in electronic crimes. >You have given probable cause for a search of your premises, and if the >device is found, arrest and proscecution. You have already admitted that you >use it. > >---------------------------------------------------------------- >Pesach Lattin, Computer Crime Specialist >Voice Mail: (914) 818-3727 Fax: (240) 337-8339 > >Webmaster, Federal Law Enforcement Officers Association >HQ: ph: (717) 938-2300 fax: (717) 932-2262 >Visit our website @ http://www.fleoa.org >---------------------------------------------------------------- =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1104 From: Mike F Date: Sun Aug 6, 2000 10:04am Subject: RE: List Demographics (Confession is good for the soul) Even though I do not Know very much,I will say, I DO PAY ATTENTION! James,concerning your post below ,thank you. Though illegal, to me Miguel's alleged act ,is at Most to me as you said Naughty, at worst a Prank. Where is Miguel? I did not know he lived in good ole USA! Especially after statements he made concerning Train Time Vs Car Time. I wasn't aware of USA' trains being High speed,Mag lines. Any how What would upset me Much more than what Miguel supposedly did, would be If someone from any agency would waste My taxes to start an Investigation. That my friends would JARR ME!!! later4,mike fiorentino ps- sORRY FOR EMAIL I JUST SENT TO THE LIST,with nothing on it except my Confidentiality warning.I did not even Know I did it till it showed up,as email from list. From: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] Sent: Sunday, August 06, 2000 9:35 AM To: TSCM-L@egroups.com Subject: [TSCM-L] List Demographics (Confession is good for the soul) Well let's see: We currently have just over 550 subscribers on the list, with quite a few of them being either government TSCM'ers, and/or federal law enforcement people. In fact 47 US government TSCM/Counterintelligence people were added to the last month alone (something about a government threat seminar I presented). I would consider it to be most unwise to commit any mischief or to confess to any kind of mischief on the list unless you have a really serious belief in paying penance. Of course fiddling about and jamming a cellular system on a train is a tad bit naughty, but I doubt that it is something that the FBI would rain on you for (on the other hand the FCC and Secret Service might want to have a little chat with you). Jamming a cellular telephone system is right up there with building bug kits... both are technically illegal, and both are activities which a legitimate TSCM'er should not engage in. -jma At 9:44 AM -0700 8/6/00, Pesach Lattin wrote: > Agreed - on top of that, Mike is admitting on a public list that he >committed a federal crime. Not a smart thing to do since there are mutliple >people on this list who are federal officers who work in electronic crimes. >You have given probable cause for a search of your premises, and if the >device is found, arrest and proscecution. You have already admitted that you >use it. > >---------------------------------------------------------------- >Pesach Lattin, Computer Crime Specialist >Voice Mail: (914) 818-3727 Fax: (240) 337-8339 > >Webmaster, Federal Law Enforcement Officers Association >HQ: ph: (717) 938-2300 fax: (717) 932-2262 >Visit our website @ http://www.fleoa.org >---------------------------------------------------------------- =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1105 From: A Grudko Date: Sun Aug 6, 2000 2:13am Subject: TSCM marketing/informing ----- Original Message ----- From: James M. Atkinson, Comm-Eng > I also had poker chips made up with my name and contact information > that I leave inside desk drawers, tapes under tables and so on (so > that they will find the reminders at random future dates). We were considering doing something similar with CDs. Our company logo is circular and we think quite classy, so that would be in the center. The company' range of services and contact details would be round the outside but leaving enough unprinted area that you can see it's a CD. I like that 'cos I think it carries a message that we are a 'technical' company. Part of our thinking was that our CD would be used as a coffee coaster on exec's desks, keeping our name right there... but we are now looking at actually copying our website and some other related material onto the CD so that it can actually supply info. - but then the person might put it in their CD drawer, not using it as a coaster and we loose the visability. > The goal is not to blanket the company with marketing materials, but > instead to "get their mind right" when it comes to security, it's > more of a wake up call then anything else. Many years ago I made up about 20 some small kit FM room bug circuits, complete with battery holder and mini 'helical' antenna, which I cast into a block of clear epoxy with a black background and company logo (cut off my business card). The battery holder at the back doubled us as a 'foot' to support the giveaway, which was the size of a pack of cigarettes and made an interesting paperweight, but what was really cool was that the things usually worked (the trick was to keep the epoxy out of the mike!) - for a few metres. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1106 From: A Grudko Date: Sun Aug 6, 2000 3:19am Subject: Cell-disturbing devices ----- Original Message ----- From: Miguel Puchol > I know perfectly well that what I did was illegal, and that these devices > are illegal, but I see many perfectly reasonable applications for them. > We've had at least 5 accidents at gas stations in Spain where it was proved > that a cellphone had interfered with the pump's circuitry, and two at > hospitals where life-support systems where interfered. > > A final comment, jamming transmissions is legal in some countries under > certain circumstances, like terrorist threats. Or hostage situations. 'Secure rooms' can certainly benefit from this technology. Banks in South Africa have banned cellphone use as criminals in the inside were 'phoning accomplices on the outside with descriptions of persons leaving with cash. About a year ago a high profile gambling client requested this technology to stop certain cheating methods. I got quotes but the cost was 14 times that of the Taiwanese unit, and the client would have needed a number of them so it didn't happen. At about the same period the Israeli Defence Force banned troops carrying cell phones on duty for obvious security reasons. And surely people who are important enough to expect emergency calls are intelligent enough to know how to select silent ring mode or SMS (alpha-numeric pager operation) when in the cinema or theatre and polite enough not to answer the damned things until they have got out to the lobby. Incidentally, as of 1 Aug in SA it is illegal to drive a car and talk on a cell unless there is a hands-free car kit fitted. This caused a huge knee jerk reaction, similar to the reaction of smokers to non-smoking area laws, saying then that cops, ambulance drivers, taxis etc. must not use their radio mikes...... Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1107 From: A Grudko Date: Mon Aug 7, 2000 8:21am Subject: Re: List Demographics (Confession is good for the soul) ----- Original Message ----- From: James M. Atkinson, Comm-Eng > > Jamming a cellular telephone system is right up there with building > bug kits... both are technically illegal, and both are activities > which a legitimate TSCM'er should not engage in. Bug kits are freely available here in South Africa, openly advertised. Building and posession is not a crime but operating a non-type approved transmitter or operating on an unlicenced frequency may be. Some bands are open to experimentation and non-licenced, non-type approved equipment, for voice, signaling and data. Using such a device to monitor your child sleeping is legal - using the same device to hear what Bill really said to Monica would be illegal under a seperate Act dealing with the interception of communications. James, if TSCMers don't have access to test transmitters, particularly the illegal ones that a buggist might use, how do you test your equipment or demonstrate it to clients or students? Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1108 From: A Grudko Date: Mon Aug 7, 2000 8:11am Subject: Feds v. Cell-disturbing ----- Original Message ----- > Mike is admitting on a public list that he > committed a federal crime. Not a smart thing to do since there are mutliple > people on this list who are federal officers who work in electronic crimes. > You have given probable cause for a search of your premises, and if the > device is found, arrest and proscecution As I understand it, Mike is based in Spain. Must'a been a high power device to jam US cell phones. Visions of Waco; Ms Reno explaining to your local Chief of Police how it is in the interest of Word Peace that a 20 man SWAT team storms your villa to seize your Klingon Disruptor and take it back to Area 59. FCC do not read below this line>>>> I think if you were outside of the USA and took a 108 Mhz FM 1 watt TX and replaced the Oscillator/Modulator unit with a zener diode noise generator, the 5th harmonic might be made to centre on the 900 MHz band. This could provide a 10mwatt broadband "noise" generator which the cellphone hears as background noise instead of the control channel, thus it may declare no service. Tiny range, dependant on proximity to cellphone tower.. I think it would work but will not build one because of the 11th Commandment: 'Though shalt not deprive me of my cellphone' 1109 From: Jordan Ulery Date: Mon Aug 7, 2000 8:43am Subject: Klingon Disrupter Jim: You take all the fun out of life. I was hoping to get the plans for the device and give them to Click & Clack the Tappet Brothers (Bob & Ray on NPR's Car Talk) to aid them in their campaign against DWT, i.e., driving while talking on a cell phone. Those two would really enjoy such a unit. Imagine, boosting the power a tad, putting a directional antenna and aiming it at the guy who just cut you off at 70 mph (ok 65 is the speed limit). Its a joke son, its a joke. [Non-text portions of this message have been removed] 1110 From: Steve Uhrig Date: Mon Aug 7, 2000 8:43am Subject: Test transmitters? Once upon a midnight dreary, A Grudko pondered, weak and weary: > James, if TSCMers don't have access to test > transmitters, particularly the illegal ones that a > buggist might use, how do you test your equipment or > demonstrate it to clients or students? There is no exception for TSCM practitioners to possess covert transmitters in the U.S. Still a felony. If a prosecutor wants to get you, this can be his lever. And your career will be over. Use unmodulated signal sources. That's what you get if you buy a commercial test transmitter from reputable TSCM manufacturers. The signal can be RF at various frequencies or modes, perhaps radiated subcarrier, perhaps conducted subcarrier (power line), perhaps IR, perhaps digital or some form of spread spectrum. Use commonly available items such as a cordless phone handset. I disconnect the base from the telco line (to avoid busying out the line during the test), punch up the handset, hide it in a desk drawer or down in upholstery, and use that. A cordless phone handset can be heard for hundreds of meters with a proper listening post, showing that both the frequency and power level is indeed a realistic threat. Anyone can test themselves and their equipment this way. Have someone hide the handset. If you have difficulty finding this, what would be your results with something lower powered, higher frequency, and smaller? If the cordless phone is digital and/or 900 megacycles, the difficulty in finding it will increase, along with the threat level. You can do the same thing with a cordless baby monitor. They are available used at flea markets sometimes for as low as USD $5, and make excellent test transmitters also. NBFM, power levels I'm guessing at maybe 25-50 milliwatts, and as we all know they also have ranges of several hundred meters or better. A very vivid demo of a common household item being usurped for a surveillance device, and a good challenge to find it. I've also built test transmitters for training using a garage door opener remote control with a 555 pulser on it to keep it kicking. Frequency typically around 303 megacycles, low power level. Easy to see on a proper spectrum analyzer. Hard to find any other way. A few weeks ago I was visiting a private detective who had been using a Great Southern Security sweeper box for years. He was not a crook; he honestly believed he was doing a real sweep based on their instructions and marketing. He had an operating baby monitor listening to his young son. It could be heard clearly anywhere in his house. I had him follow his normal procedure and see if the sweep box heard the baby monitor transmitter. He had to literally touch the antennas before his sweep box would read, and he knew where the transmitter was. If the transmitter had been concealed, the chances of his finding it would have been very small. He was amazed, and I am fairly sure he will not be doing his own sweeps anymore. Remember with some of these unqualified sweepers -- they may honestly believe they are doing the job. Marketing hype is powerful and plays up to the PI psyche. Don't condemn them. Educate them. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1111 From: James M. Atkinson, Comm-Eng Date: Mon Aug 7, 2000 9:07am Subject: Re: List Demographics (Confession is good for the soul) At 3:21 PM +0200 8/7/00, A Grudko wrote: >----- Original Message ----- >From: James M. Atkinson, Comm-Eng > > > Jamming a cellular telephone system is right up there with building > > bug kits... both are technically illegal, and both are activities > > which a legitimate TSCM'er should not engage in. > >Bug kits are freely available here in South Africa, openly advertised. >Building and posession is not a crime but operating a non-type approved >transmitter or operating on an unlicenced frequency may be. Some bands are >open to experimentation and non-licenced, non-type approved equipment, for >voice, signaling and data. > >Using such a device to monitor your child sleeping is legal - using the same >device to hear what Bill really said to Monica would be illegal under a >seperate Act dealing with the interception of communications. > >James, if TSCMers don't have access to test transmitters, particularly the >illegal ones that a buggist might use, how do you test your equipment or >demonstrate it to clients or students? My preference for teaching and testing equipment is a frequency agile signal generator/synthesizer so I can create virtually any signal on Earth, hide it anywhere on the spectrum, and manipulate it to account for concealment losses, antenna loading, drift, harmonics, and so on. I also use a sweep generator for testing equipment, antennas, and cables (from DC into well into the GHz range). This confirms that every pice of equipment is fully functions prior to a sweep. I would NEVER demonstrate an eavesdropping device for a client unless the client was a government agency and they had provided the device. I feel that to "demonstrate" an eavesdropping device to impress/scare a client in order to bring in more business is inappropriate, and it smacks of "snake oil" and should be avoided. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== From: Dawn Star Date: Fri Aug 3, 2001 10:47am Subject: is a keystroke logger a wiretap? "Assuming the key logger is a program installed on the computer, the key >logging information is not transmitted anywhere. It stays buried in the >computer. Therefore it does not come under Title III. > >Ed on the contrary--when someone types on a computer keyboard, keystroke data are *transmitted, by wire* to the computer's motherboard and elsewhere. Title III has no statutory exception for information transmitted by wire between two instruments or machines, which oftentimes, is the case anyway." In my view the keyword is "interception", it doesn't really matter what flavor device, hardware or software or what flavor or format of voice/data was intercepted, what counts is, was there a reasonable expectation of privacy under the 4th and 5th Amendment protections and did an "interception" take place? Roger Tolces 3453 From: Date: Thu Aug 2, 2001 8:31pm Subject: Re: Std Input and Encryption Absolutely correct... very good cryptography is usually badly implemented, weakening the entire system to the point where it becomes quite susceptible to attack. *cough* Jawz Tech. crypto *cough* However, DES is vulnerable to linear / differential cryptanalysis techniques... yes, it can be optimized to further protect against the attack until someone finds a better way to implement the attack technique ;-) As well, there are certain known keys that are considered weak when used within a DES system. Heck, 3-key 3DES is more vulnerable than 2-key 3DES thanks to related-key differential cryptnalayis. Better, modern algorithms such as Rijndael, Twofish, etc. currently do not have any known weak keys and are much less susceptible to these types of attacks (until someone discovers otherwise).. - john Dave Emery on 08/01/2001 09:20:28 PM Please respond to die@d... To: "James M. Atkinson" cc: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Std Input and Encryption On Wed, Aug 01, 2001 at 01:22:59PM -0400, James M. Atkinson wrote: > If the analyst has access to ANY fragment of the clear text, or > formatting of the text, then the crypto system has to be considered > compromised. > > For example, if an encryption system passes both classified and > unclassified materials, and the classified materials are destroyed, > but the unclassified materials just go in the dumpster then the > cipher can be solved using the unclassified materials. > > As a rule, if unclassified materials pass though any encryption > device then they unclassified material has to become classified as it > contains a "fingerprint" of the cipher, and those must be destroyed > as classified. > > -jma While this is true (or at least was true) of US COMSEC regs, what the questioner is asking about is what is called in the world of academic cryptography a known plaintext attack or perhaps the stronger attack called a chosen plaintext attack. Modern ciphers are designed to resist such attacks and every recent proposed cipher that has been examined by the academic crypto community has been very carefully studied for vulnerability to these attacks. Some have indeed fallen to varients of these attacks and have been disgarded as a result. One can fairly say that the current crop of academicly vetted ciphers in wide use (such as AES, Blowfish, Twofish, Idea, Cast, 3DES, RC6 etc) are highly resistant to such attacks, but it is also true that such attacks are certainly amoung the very most standard techniques used by a cryptanalyst to attack a cipher - and indeed attempting to anticipate what the plaintext was or was likely to be for a given ciphertext is standard procedure. And having the ability to supply plaintext to be encrypted has helped break many a cipher, as has discovering that a particular plaintext was enciphered to generate a particular message. Ciphers and codes used in the World War II era and before were particularly vulnerable to such attacks and many were broken through use of known plaintext "cribs". The mechanisms used by the code breaking "bombes" used to derive keys for the German Enigma critically depended on being able to guess that a particular snippet of a message had a particular plaintext - without such "cribs" it would not have been possible to determine the Enigma keys at all. It should be noted that modern crypto design doctrine holds that one should assume one's opponent has access to the encryption algorithm you are using in complete exhaustive detail - the only thing he does not have is the actual keys used to encrypt the message. And these are presumed to be completely random numbers which cannot be predicted. Thus the challenge for the cryptanalyst is to use pairs of plaintext and resulting ciphertext to derive the actual random key used to do the encryption, or at least determine enough information about it to greatly narrow the required search space for a try every-possible-key attack. I might add that modern ciphers such as the recently adopted AES standard and the old standby 3DES are considered extremely difficult to break even given extremely large numbers of chosen plaintexts encrypted with the key in use and their resultant ciphertexts. It is generally accepted that with 128 bit or longer keys none of these ciphers could be broken (the key determined) in the lifetime of a normal person or even the age of the human race even by using the fastest conceivable hardware and terrabytes of known plaintext-ciphertext pairs. Of course as in all such endeavors, human genius sometimes finds means to overcome such obstacles and it is hard to say never. But lots of very very smart people have tried over many years (especially with DES) and nobody has gotten very far, though considerable improvements over random guessing have been discovered. I think it is probably fair to say that properly employed (and that is very very critical) modern strong ciphers cannot be usefully broken even if one can get large numbers of chosen messages encrypted with the unknown key. Most breaks of modern cryptosystems based on known strong ciphers are because they were used improperly or because there was some way of stealing the key or getting access to the message before encryption or after decryption. Software bugs, computer and network security problems, human weaknesses, even TEMPEST issues are the modalities of attack rather than cryptanalysis of the underlying cipher given known plaintext. > > > At 10:24 AM -0500 8/1/01, Douglas Ellsworth wrote: > >Hi Group, > > > >Since my knowledge of encryption algorithms and its progressive > >nature is exceedingly poor, I'm hoping the list can help me with a > >troubling thought. Here's the question: > > > >What if someone has control over standard input AND the capability > >to examine the encrypted product of known input. Would this give > >the person a "leg-up" on breaking the encryption scheme? This is > >obviously the case in simple coding, but it seems that encryption > >would add other obstacles. About how much of a "leg-up" would the > >person enjoy if any? > > > >If this is off-topic, a private answer would be appreciated. > > > >Many thanks, > > > >-Doug > > > > > >Doug Ellsworth > >Secure Communications Corp., Inc. > >email: do5ug@r... > >tel: 402.578.7709 > > -- > > ------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ------------------------------------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ------------------------------------------------------------------------------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3454 From: Dave Emery Date: Thu Aug 2, 2001 8:49pm Subject: Re: Cell phone service cars On Wed, Aug 01, 2001 at 10:39:24PM -0400, Tim wrote: > > If you live in a major metropolitan area, you're likely to have seen the > company cars operated by employees of cellular/wireless service providers. > These vehicles, commonly cars but also SUVs and minivans, contain several > cell phone antennas on the top of each vehicle. > > Can someone tell me what these vehicles are used for? I speculate they are > field service engineers working on cell towers, but I also have considered > that they may be triangulating signals. > The most standard application is driving around with multiple instrumented cellphones, one or more on your system and the rest on your competitors systems while making constant streams of two or three minute test calls to determine gaps in coverage, dropped calls, unintelligable calls, fast busies, interference, signal levels and so forth. This drive testing helps identify areas where new towers are needed, and where existing ones need adjustment (adding more directional antennas, changing equipment parameters, adding more channels). And it gives an objective indication as to how one carrier stacks up against another in a particular city or neighborhood. Typically the cellphones are driven by laptop computers with voice quality analyzer software and hardware to objectively measure the call quality on the various services by actually measuring transmission performance with digital signal processing techniques rather than relying on some bored operator to rate the audio quality. It is also not uncommon for the carrier that owns the vehicle to equip it with sophisticated test sets (such as those made by Agilent/HP) for actually measuring signal parameters on his system and monitoring the various digital streams to attempt to identify the causes of any impairments that are uncovered so they can be corrected. And it is usual to have GPS mapping support so all this information can be correlated with exact positions on a 3 D model of the terrain. > Can someone also provide rough ideas of the type of equipment in such > vehicles, and whether the antennas can be concealed in the vehicle itself > based on intended purpose and vehicle interference concerns? (Grounding, > space inside vehicle panels, etc).... These vehicles are not usually stealth vehicles at all, and the antennas are placed to where they will get good coverage or approximate those installed on customer vehicles rather than for covertness. There are, of course, also vehicles used to locate illegal cloned phones by triangulation or just RSSI - these may be much more covert and contain direction finding antenna arrays (4 antennas in a square type things). -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 3455 From: Shawn Hughes Date: Fri Aug 3, 2001 8:33am Subject: Re: Digest Number 669 Here are a few of my thoughts as one of the "untrained police officers" you guys are always referring to.... At 05:23 8/3/01 , TSCM-L@yahoogroups.com wrote: > As far as I understand it, there is no requirement that a tapped wire > go out to the >public street for an intercept to be considered a wiretap. I am pretty >sure that someone intercepting traffic on the wires of an internal >extension not used for outside calls on a PBX would still be considered >to be wiretapping, thus by analogy intercepting traffic on the wire >between the keyboard and the computer is clearly also wiretapping even >though most of the traffic on it stays inside the computer and is not >sent out on the network or modem connections to the outside world. This is **EXACTLY** correct. > And I am sure that someone intercepting traffic on an internal >ethernet would be wiretapping (I know of prosecutions for installing >sniffers) This also, with certain exceptions ( Quality Assurance, etc.) is true. > >Assuming the key logger is a program installed on the computer, the key > >logging information is not transmitted anywhere. It stays buried in the > >computer. Therefore it does not come under Title III. > > > > >how did you arrive at your assumption that the FBI's keylogger is "a >program installed on the computer"? there are sound technical reasons for >it to be a hardware--not a software--device. a hardware logging device >surreptitiously installed inside a target's computer This person is on to something . (Staying at the Unclassified / Nonsensitive discussion level, think translation of TTL to RF, and powering from the keyboard). HOWEVER, as a rule, when intercepting intelligence, from our viewpoint, we look at the situation more from a network engineer's than the CIA's. Sorry. This is because the majority of Law Enforcement Officers tend to not want to know about the gory details. They just want the evidence. So, for voice, its a bridge at the local CO. For transmitted data on dedicated computers its a datasplitter at a T1. For dial ups, we already are intercepting the voice pair, there is usually a clause that states all transmitted intelligence pertinent................... For data that doesn't leave the house, we had a portable hard drive, go in and basically ZipDrive the hard drive. Then the gurus would use Encase and whatever decryption stuff that they needed. >Title III was 1968. Today we have Title I, Title II & Title III of the ECPA. >The former Title III is Title I of the ECPA. Some courts refer to Title I >was the Wiretap Act and Title II as the Stored Communications Act. True, Aimee, but we still refer to it as "title III" Here is from the book of guidelines we used........... >IV. ELECTRONIC SURVEILLANCE IN COMMUNICATIONS NETWORKS >A. Introduction >Computer crime investigations often involve electronic surveillance. >Agents may want to monitor a hacker as he breaks into a victim computer >system, or set up a ìclonedî e-mail box to monitor a suspect sending or >receiving child pornography over the Internet. In a more traditional >context, agents may wish to wiretap a suspectís telephone, or learn whom >the suspect has called, and when. This chapter explains how the electronic >surveillance statutes work in criminal investigations involving computers. >Two federal statutes govern real-time electronic surveillance in federal >criminal investigations. The first and most important is the wiretap >statute, 18 U.S.C. ßß 2510-22, first passed as Title III of the Omnibus >Crime Control and Safe Streets Act of 1968 (and generally known as ìTitle >IIIî). The second statute is the Pen Registers and Trap and Trace Devices >chapter of Title 18 (ìthe Pen/Trap statuteî), 18 U.S.C. ßß 3121-27, which >governs pen registers and trap and trace devices. Failure to comply with >these statutes may result in civil and criminal liability, and in the case >of Title III, may also result in suppression of evidence. >∑ In general, the Pen/Trap statute regulates the collection of >addressing information for wire and electronic communications. Title III >regulates the collection of actual content for wire and electronic >communications. >Title III and the Pen/Trap statute coexist because they regulate access to >different types of information. Title III permits the government to obtain >the contents of wire and electronic communications in transmission. In >contrast, the Pen/Trap statute concerns the collection of mere addressing >information relating to those communications. See United States Telecom >Assín v. FCC, 227 F.3d 450, 454 (D.C. Cir. 2000); Brown v. Waddell, 50 >F.3d 285, 289-93 (4th Cir. 1995) (distinguishing pen registers from Title >III intercept devices). The difference between addressing information and >content is clear in the case of traditional communications such as >telephone calls. The addressing information for a telephone call is the >phone number dialed for an outgoing call, and the originating number (the >caller ID information) for an incoming call. In contrast, the content of >the communication is the actual conversation between the two parties to >the call. >The distinction between addressing information and content also applies to >Internet communications. For example, when computers attached to the >Internet communicate with each other, they break down messages into >discrete chunks known as ìpackets,î and then send each packet out to its >intended destination. Every packet contains addressing information in the >ìheaderî of the packet (much like the ìtoî and ìfromî addresses on an >envelope), followed by the content of the message (much like a letter >inside an envelope). The Pen/Trap statute permits law enforcement to >obtain the addressing information of Internet communications much as it >would addressing information for traditional phone calls. See 18 U.S.C. ß >3127(4) (defining ìtrap and trace deviceî broadly as ìa device which >captures the incoming electronic or other impulses which identify the >originating number of an instrument or device from which a wire or >electronic communication was transmittedî). However, reading the entire >packet ordinarily implicates Title III. The primary difference between an >Internet pen/trap device and an Internet Title III intercept device >(sometimes known as a ìsnifferî) is that the former is programmed to >capture and retain only addressing information, while the latter is >programmed to read the entire packet. >The same distinction applies to Internet e-mail. Every Internet e-mail >message consists of a header that contains addressing and routing >information generated by the mail program, followed by the actual contents >of the message authored by the sender. The addressing and routing >information includes the e-mail address of the sender and recipient, as >well as information about when and where the message was sent on its way >(roughly analogous to the postmark on a letter). The Pen/Trap statute >permits law enforcement to obtain the addressing information of Internet >e-mails (minus the subject line, which can contain contents, cf. Brown, 50 >F.3d at 292) using a court order, just like it permits law enforcement to >obtain addressing information for phone calls and individual Internet >ìpacketsî using a court order. Conversely, the interception of e-mail >contents, including the subject line, requires careful compliance with the >strict dictates of Title III. [Non-text portions of this message have been removed] 3456 From: Shawn Hughes Date: Fri Aug 3, 2001 8:50am Subject: Re: Digest Number 669 At 05:23 8/3/01 , Tim wrote: >Can someone tell me what these vehicles are used for? I speculate they are >field service engineers working on cell towers, but I also have considered >that they may be triangulating signals. Tim, most of the time, those vehicles are used by engineers to get to remote cell towers on the sides of mountains. There usually is a SMR radio in there, a cell phone, a sat phone ( that's the big dome antenna, looks like a fiberglass cereal bowl) and a test phone that recieves stuff like recieved signal strength and can scroll through forward voice channels. The vehicles that have a ring of antennas have the more advanced test gear ( I had a part time job with United States Cellular in MSE repair). The two systems we had were from Marconi, and Motorola. These things not only could decode all the stuff on all the data and voice channels, but they could tell the towers to do certain things. They also, on the bench, could pretend to BE a cell tower, and fake an attached cell phone into answering a call, or allow it to place a call. I wanted to run it into a 3 watt booster and see if I could make an obscene phone call to all the salespersons at once! I suppose that they have vehicles for triangulation, and the advanced units can triangulate, but I seriously doubt they would be looking for stolen/cloned phones in a white suv with a USCC logo on the side! Besides, the new standards say that triangulation capability has to be built into the system to assist 911, but I forget when it has to be implemented. Hope this helps! Shawn 3457 From: e cummings Date: Fri Aug 3, 2001 0:02pm Subject: Optoelectronics Scout NiMH retrofit while it's topical, it may be worth mentioning that i just replaced the four 900mAH(?) NiCd cells in an Optoelectronics Scout frequency recorder with the new Powerex 1700mAH NiMH AA cells and achieved excellent results: http://www.mahaenergy.com/products/PowerEx/Digicams/batteries.htm the unit's battery life is more than double what is was. now it's continuously usable for over 15 hours on a full charge. will probably now do the same with my Xplorer, since NiMH technology has some definate advantages over NiMH. -e.c. 3458 From: Date: Sat Aug 4, 2001 10:25am Subject: Whats is an Slave Can somebody explain what is an SLAVE, witch are its parts, plans, etc. any help will be appreciate. miguel 3459 From: James M. Atkinson Date: Sat Aug 4, 2001 10:55am Subject: Re: Whats is an Slave My understanding is a slave is someone who makes your bed, brings you breakfast, cleans your house, cooks for you, runs your errands. Generally a slave is someone who does things for you, without pay, and to who you claim some type of corporal ownership over. Owning a slave is currently illegal in most of the world. Slaves are handy on sweeps as they can unload your truck, unpack the transit cases, and ensure that your coffee is topped off at all times, and that your clothes are neat and are in order. ... or perhaps you were referring to some other kind of slave? -jma At 3:25 PM +0000 8/4/01, apoyosing@h... wrote: >Can somebody explain what is an SLAVE, witch are its parts, plans, >etc. > >any help will be appreciate. > >miguel -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3460 From: DrPepper Date: Sat Aug 4, 2001 11:06am Subject: Re: Whats is an Slave Would you be talking about a black female from Jamaica? If so, I have no idea what her plans might be. apoyosing@h... wrote: > Can somebody explain what is an SLAVE, witch are its parts, plans, > etc. > > any help will be appreciate. > > miguel > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3461 From: James M. Atkinson Date: Sat Aug 4, 2001 11:26am Subject: Re: Optoelectronics Scout NiMH retrofit At 1:02 PM -0400 8/3/01, e cummings wrote: >while it's topical, it may be worth mentioning that i just replaced the >four 900mAH(?) NiCd cells in an Optoelectronics Scout frequency recorder >with the new Powerex 1700mAH NiMH AA cells and achieved excellent results: >http://www.mahaenergy.com/products/PowerEx/Digicams/batteries.htm > >the unit's battery life is more than double what is was. now it's >continuously usable for over 15 hours on a full charge. will probably now >do the same with my Xplorer, since NiMH technology has some definate >advantages over NiMH. > >-e.c. I have always been unhappy with the Scout's battery capacity, and the selectivity, so I made a few changes. I first took a hand held AR-8000, and attached the Scout directly to the radio, basically mounting the Scout so that they top of the case was flush to the top of the radio. Next I built a small plastic box to go under the Scout to give some expansion room (for better batteries, some big NiCad D cells), and to balance things out. Next, I pulled out the batteries in both units, and salvaged some high NiMh cells out of some laptop batteries to form a long lasting power supply. I carver out the battery tray in the radio with a Dremel tool to provide some better space. Next I went into both the Scout and radio an disconnected the antenna inputs of both, and patched into the input capacitors to draw the "live" antenna connections into the small plastic box. Inside the box I brought the signal to a buffer circuit so that signals present on one item would not interfere with the other (hint: the Scout generates massive RFI). Basically I built a buffered multicoupler to keep the Scout and 8000 from interfering with each other,. The buffer circuit was in turn fed by a series of basic three pole band pass filter and 30 dB LNA dedicated to specific bands of interest (this increases the useful effective distance by at least 50 fold) I mounted a copper plate between the Scout and radio, and mounted a series of BNC connectors along the top where a "cut length" antenna can be used (the plate acts as a clean ground plane). The ground of both radios where then connected to the plates so in effect a "big block of copper" was created for a station ground. I mounted a helipot tuned varactor circuit to bring each antenna's to best Q for the frequency I am looking for (one helipot, one small 12 position two pole switch, 12 loading inductors, 12 varactors, and 12 biasing caps. Since I do not want a bunch of sloppy cables hanging out the radio, I neatly hardwired the control lines together though the backs of the respective cases. I can run both units for 14+ hours, and the entire brick can slide into a neat Cordura case with a small window flap cut out for the display. I completely removed the Scouts beeper, vibrator, and the AR's speaker to render the system completely stealthy and silent. The whole goal is to optimize the inputs for a specific bug band, and split the "tuned antenna and filter" into two isolated paths, preselect, pre-amp, and then use the Scout to detect, and the 8000 to monitor. I also wired an older palm into the Scout so it can capture and time stamp each signal. The whole thing can run for at least a full day on the D sized NiCads (assuming of course I dim the Palm display, and mute the AR volume). -jma -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3462 From: Date: Sat Aug 4, 2001 9:44am Subject: Re: Whats is an Slave In a message dated 8/4/01 8:30:38 AM Pacific Daylight Time, apoyosing@h... writes: << Can somebody explain what is an SLAVE, witch are its parts, plans, etc. any help will be appreciate. >> it's a soon to be extinct piece of Law Enforcement wiretapping equipment. 3463 From: James M. Atkinson Date: Sat Aug 4, 2001 8:52pm Subject: Re: Keystroke logger At 10:40 AM +0200 8/3/01, A Grudko wrote: >-- Original Message -- >> ... a hardware logging device >> surreptitiously installed inside a target's computer (or keyboard) would >> prevent the likelihood of the target accidentally (or intentionally) >> defeating the wiretap by reformatting their hard drive. > >I have read about keyboard transmitters, both real time and 'store & burst' >(my term) but have never seen one. In our sweeps we only check PCs & laptops >which the client indicates carry sensitive data. Look for the CIA property tag... [just kidding] >Our procedure is a combination of physical inspection and RF sweeping (the >latter being confusing because of all the noise that the computer and any >network facilities generate). Look for elements installed in the keyboard or on the keyboard run, and anything foreign attached to the USB bus. Most of the keystroke boxes attached either as a dongle, or look like a clamp on filter. It take me about 90 minutes to perform a physical inspection of a typical desktop PC, plus about 45-60 minutes additional for the software examination. >By their nature I assume these devices to be expensive, sophisticated and >used mainly in upper-end surveillance ops. and rarely encountered. Nope, dirt cheap, already available at many Spyshops >Anyway, my point is that my interest has been peaked and as this is not the >kind of thing one will see in 'The Spy Shop' here can anyone supply me links >to sites where I can view these types of items, their specs. and any >indications of special locate procedures. > >Thanks > >Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - >www.icon.co.za/~agrudko, Est. 1981 >National and international crime investigation, intelligence and protection >Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 >0255 - 244 0256 (Fax) >GIN, SACI, WAD, CALI, SAMLF, SCIP, UKPIN, AFIO (OS), IWWA, PRETrust, >AmChamCom >"When you need it done right - first time" >"Experience is the name everyone gives to his mistakes" Oscar Wilde - A >tribute to the late Roy Lawson. -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3464 From: James M. Atkinson Date: Sun Aug 5, 2001 8:18am Subject: Sometimes "Sometimes" Sometimes you will cry and no one will see your tears... Sometimes you will laugh and no one will see you smile... Sometimes you will fear and no one will see you shudder... Sometimes you will lie and no one will catch you... Sometimes you will fall and no one sees you struggle... Sometimes you will be late and no one seems to notice... But fart just one time... -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3465 From: James M. Atkinson Date: Sun Aug 5, 2001 6:27pm Subject: Fwd: High-tech thieves plant money 'bugs' [Moderators note: Skimming has been going on for well over 17 years, and I turned up my first case of it back in 1987 when I was asked to checkout some suspicious activities at a major department store regarding credit card fraud... the device found pre-dated 1985, with an estimated install date somewhere during the Fall of 1983] High-tech thieves plant money 'bugs' Device makes credit card terminals send data By Bob Sullivan MSNBC June 20 - Clever real-world credit card thieves apparently have a new high-tech tool in their arsenal. A credit card terminal maker says it has discovered the existence of small, number-stealing electronic "bugs." The devices can be secretly placed inside store terminals, where they "skim" card numbers with each transaction. The bugs are even smart enough to trick a terminal into "phoning home," delivering batches of stolen numbers to fake credit card manufacturing locations. While acknowledging the threat may be real, Visa International and other terminal makers caution that use of the James Bond-esque device is hardly widespread. "Skimming" is now considered an old trick in the credit card fraud business. A waiter takes your credit card, heads back into the kitchen and slides it through a secret, hand-held scanner before running it through the restaurant's cash register. At the end of the day, a busy waiter could have dozens of hot credit card numbers worth thousands of dollars. Since the hand-held readers glean all information hidden in a credit card's magnetic stripe, it's easy for organized criminals to take that stolen information and manufacture new plastic cards that are loaded with credit. It may be an old trick, but it's still very effective. Credit card firms estimate such skimming may amount to $2 billion in annual fraud. Of course, there's a lot of hard labor and risk-taking involved, and organizations that pay off waiters for the numbers incur a lot of "labor" costs. That's why an automated skimmer would be attractive - and that's just where high-tech criminals are headed, according to one credit card terminal maker. Officials at Hypercom Corp. say they recently discovered a small computer chip installed inside a point of sale terminal that "skimmed" credit cards as they were swiped through the register by legitimate employees. Since each terminal is equipped with a phone line, the skimming chip was even able to instruct the terminal to dial out at random times and send the stolen numbers to the thieves. NOT JUST RESTAURANTS "It's insidious. It can happen in any retail establishment, not just a restaurant," said George Devitt, senior vice-president and chief marketing officer of Hypercom. Restaurants are the traditional haunt of skimmers, because they are generally the only establishment where credit cards are taken away from a curious consumer's eyes. At most other establishments, skimmers don't get the private moments they need - but a chip placed inside the point of sale terminal would eliminate this barrier. Hacks, Attacks & Scams The bugs offer the potential of high-volume, low-risk thievery by organized credit card thieves, particularly since they can instantly "transmit the numbers to a place where magnetic cards are manufactured," Devitt said. Hypercom issued a press release about skimming "bugs" last week, calling attention to the new and more dramatic form of skimming. But both Visa and Hypercom competitor Verifone downplayed the discovery of skimming bugs, suggesting they are not in widespread use. Hypercom told MSNBC.com it has found only one such bug in use in Hong Kong, but Devitt said the company believed hundreds - if not thousands - were currently in use in Asia. ALARMIST WARNING? Officials at Visa disagreed. While declining an interview on the topic, Visa said in a statement that it is "hesitant to confirm alarmist warnings about certain new skimming practices as we have no evidence that these techniques are prevalent." Verifone officials didn't dismiss Hypercom's claims quite so fast. Stuart Taylor, director of emerging markets for Verifone, said, "there are documented cases of something being put inside a terminal," citing individual cases in Japan, Malaysia, Taiwan and Brazil. In Brazil, the automated skimming device is actually being marketed as a legitimate business tool. Advertisements claim the device can be put in place as a backup for a power failure, as it would let a merchant store card data and transmit it later when the power goes back on. But the company had yet to encounter any device that was smart enough to dial out and deliver stolen numbers to criminals. "Clearly, it is less costly to have something somewhat automated. Yes, it has happened....But probably point-something of one percent of skimming relates to the terminal," Taylor said. Nearly all skimming is done the old-fashioned way, with widely available hand-skimmers. "I find it a little questionable how much of it is terminal related." But DeVitt insists the threat is real, even if it's still unclear just how widespread it is. Automated skimmers are even smart enough to foil some of the fraud-tracking software used by Visa and Mastercard. Generally, it doesn't take long for the credit card companies to cross-check fraud trends and pinpoint restaurants where widespread skimming is occurring. "Fraudsters realize how easy it is to track the other form," Devitt said. "The people who are doing this are very knowledgeable -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 3466 From: Charles P Date: Sun Aug 5, 2001 7:56pm Subject: Re: Keystroke logger Andy, the hardware keystroke loggers are available from computer supply outlets for under $99. A small module that plugs between the keyboard cable and the pc, something we always at least visually check for even if we are not permitted to get into the pc software. see http://www.actcommunications.net/keykatcher/ Charles charles@t... ----- Original Message ----- From: "A Grudko" To: Sent: Friday, August 03, 2001 4:40 AM Subject: [TSCM-L] Keystroke logger > -- Original Message -- > > ... a hardware logging device > > surreptitiously installed inside a target's computer (or keyboard) would > > prevent the likelihood of the target accidentally (or intentionally) > > defeating the wiretap by reformatting their hard drive. > > I have read about keyboard transmitters, both real time and 'store & burst' > (my term) but have never seen one. In our sweeps we only check PCs & laptops > which the client indicates carry sensitive data. > > Our procedure is a combination of physical inspection and RF sweeping (the > latter being confusing because of all the noise that the computer and any > network facilities generate). > > By their nature I assume these devices to be expensive, sophisticated and > used mainly in upper-end surveillance ops. and rarely encountered. > > Anyway, my point is that my interest has been peaked and as this is not the > kind of thing one will see in 'The Spy Shop' here can anyone supply me links > to sites where I can view these types of items, their specs. and any > indications of special locate procedures. > > Thanks > > Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - > www.icon.co.za/~agrudko, Est. 1981 > National and international crime investigation, intelligence and protection > Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 > 0255 - 244 0256 (Fax) > GIN, SACI, WAD, CALI, SAMLF, SCIP, UKPIN, AFIO (OS), IWWA, PRETrust, > AmChamCom > "When you need it done right - first time" > "Experience is the name everyone gives to his mistakes" Oscar Wilde - A > tribute to the late Roy Lawson. > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3467 From: A Grudko Date: Sun Aug 5, 2001 11:54am Subject: Re: Sometimes Snipped weekend humour... - Original Message - From: James M. Atkinson > Sometimes you will cry and no one will see your tears... > But fart just one time... James, suggested mode of detection? - VVLF around 10 Hertz, in combination with an olfactory scan and possible detection of eye watering? Actually... We used to build tape recorders into briefcases. I went to a birthday/end of parole (long story) party yesterday where I bumped into an insurance client I hadn't seen for about 8 years; since they bought 4 of our special briefcases for claims investigation. He was describing their tactic of leaving the covert recorder running in the company of husbands and wives during an interview and then excusing themselves for 10 minutes to visit the bathroom. It was hoped that while the investigator was away the claimants would say something self-incriminating (not illegal then, might be now but not tested). His party piece was telling of deploying this technique in the company of an elegant woman who, whilst he was gone, produced a flatulence marathon. When I eventually write my book on being a PI in Africa's Wild, Wild West, technical surveillance will be a big part of the more humorous side. AG 3468 From: James M. Atkinson Date: Mon Aug 6, 2001 4:01pm Subject: Susan Vineberg Subject: FIRST WOMAN PRESIDENT The year is 2012 and the United States of America has recently elected the first woman as well as the first Jewish President, one Susan Vineberg. So the President-Elect calls up her mother a few weeks after election day. "So Ma, I assume you will be coming to my inauguration?" "I don't think so. It's a ten hour drive, and your father isn't as young as he used to be, and my gout is acting up again." "Don't worry about it Mom, I'll send Air Force One to pick you up and take you home. And a limousine will pick you up at your door." "I don't know. Everybody will be so fancy, I don't know what on earth I would wear." "Oh Mom," replies Susan, "don't worry about it. I'll make sure you have a wonderful gown by Christian Dior." "Honey," Mom complains, "you know I can't eat those rich foods you and your friends like to eat." The President-to-be responds, "Don't worry Mom. The entire affair is going to be handled by the best caterer in New York, kosher all the way. Mom, I want you to come." So Mom agrees and so on January 20, 2013, Susan Vineberg is being sworn in as President of the United States of America. In the front row sits the new President's mother, who leans over to a Senator sitting next to her; "You see that woman over there with her hand on the Bible, becoming President of the United States?" The Senator whispers back, "Yes I do." "Her brother's a doctor." -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3469 From: Aimee Farr Date: Mon Aug 6, 2001 7:09pm Subject: Stunning development (or, an acknowledgement) This just in: > The Current Reports of the ABA/BNA Lawyers Manual announces that the ABA has > reversed its position in Formal Op. 337 that the mere act of secretly tape > recording a conversation is inherently deceitful. The new opinion, ABA > Formal Op. 01-422, issued on 6-24-01, holds that if tape-recording a > conversation to which one is a party is lawful, then the Model Rules cannot > prohibit such activity. The opinion permits a lawyer to secretly tape > record conversations with a client, but recommends against it, even though > it is no longer unethical. > In those jurisdictions where one-party consent recordings are unlawful, the > lawyer would be violating Rule 8.4 (b) and (c). This is just like "pot" being a "gateway drug." IMO, lawyers should not smoke surveillance without close supervision, and never with their own damn clients. Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR 5400 Bosque, Ste. 675 Waco, Texas 76710 3470 From: Date: Mon Aug 6, 2001 3:42pm Subject: Men's chain letter This chain letter was started in hopes of bringing relief to other tired and discouraged men. Unlike most chain letters, this one does not cost anything. Just send a copy of this letter to five of your friends who are equally tired and discontented. Then bundle up your wife and/or girlfriend and send her to the man whose name appears at the top of the following list, and add your name to the bottom of the list. When your turn comes, you will receive 15,625 women. One of them is bound to be better than the one you already have. At the writing of this letter, a friend of mine had already received 184 women, of whom 4 were worth keeping. REMEMBER this chain brings luck. One man's pit bull died, and the next day he received a Playboy swimsuit model. An unmarried Jewish man living with his widowed mother was able to choose between a Hooters waitress and a Hollywood super model. You can be lucky too, but DO NOT BREAK THE CHAIN! One man broke the chain, and got his own wife back again. Let's keep it going, men! Just add your name to the list below! Bill Clinton 780 3rd Ave. New York, NY 10017 William Jefferson Clinton 780 3rd Ave. New York, NY 10017 W. J. Clinton 780 3rd Ave. New York, NY 10017 William Clinton 780 3rd Ave. New York, NY 10017 W Jefferson Clinton 780 3rd Ave. New York, NY 10017 William J Clinton 780 3rd Ave. New York, NY 10017 Slick Willie Clinton 780 3rd Ave. New York, NY 10017 Mr. Hillary Clinton 780 3rd Ave. New York, NY 10017 3471 From: James M. Atkinson Date: Mon Aug 6, 2001 7:45pm Subject: Re: Stunning development (or, an acknowledgement) At 7:09 PM -0500 8/6/01, Aimee Farr wrote: >This just in: > >> The Current Reports of the ABA/BNA Lawyers Manual announces that the ABA >has >> reversed its position in Formal Op. 337 that the mere act of secretly tape >> recording a conversation is inherently deceitful. The new opinion, ABA >> Formal Op. 01-422, issued on 6-24-01, holds that if tape-recording a >> conversation to which one is a party is lawful, then the Model Rules >cannot >> prohibit such activity. The opinion permits a lawyer to secretly tape >> record conversations with a client, but recommends against it, even though >> it is no longer unethical. > >> In those jurisdictions where one-party consent recordings are unlawful, >the >> lawyer would be violating Rule 8.4 (b) and (c). > >This is just like "pot" being a "gateway drug." > >IMO, lawyers should not smoke surveillance without close supervision, and >never with their own damn clients. > >Aimee Farr >mailto:aimfarr@p... >LAW OFFICE OF AIMEE FARR >5400 Bosque, Ste. 675 >Waco, Texas 76710 Good observation, but since most attorneys lack a background in electronics, and most lack a respect for lethal voltages; the smoke rising off of the bodies of an attorney may not in fact be caused by a "gateway rug"... er, "gateway drug". -jma -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3472 From: Aimee Farr Date: Mon Aug 6, 2001 10:35pm Subject: RE: Stunning development (or, an acknowledgement) The opinion was out June 24, we'll see what the states do....I was just discussing on another channel, and figured I would sling it over. Just to clarify, the ABA is a big deal, but states vary from the ABA "model rules" quite a bit. http://www.abanet.org/cpr/center_entities.html ~Aimee 3473 From: Date: Tue Aug 7, 2001 9:41am Subject: ABA Ethical Model Rules Ah hem..., Since when did lawyers start following ethical model rules ? ? :>) Present company excluded ,of course! HAVE A GREAT DAY !!! 3474 From: Aimee Farr Date: Tue Aug 7, 2001 1:24pm Subject: FW: Feds say keystroke logger details are covered by "national security" Any "hostile counterintelligence officers" in here? Is there another type of counterintelligence officer? ~Aimee > -----Original Message----- > From: owner-politech@p... > [mailto:owner-politech@p...]On Behalf Of Declan McCullagh > Sent: Tuesday, August 07, 2001 6:26 AM > To: politech@p... > Subject: FC: Feds say keystroke logger details are covered by "national > security" > > > The FBI's Kerr has been named the CIA's next deputy director for > science and technology: > http://www.washingtonpost.com/wp-dyn/articles/A30341-2001Aug3.html > > EPIC has placed the documents online: > http://www.epic.org/crypto/scarfo.html > > --- > > http://www.wired.com/news/politics/0,1283,45851,00.html > > Feds: Spy Tool Is a Secret > By Declan McCullagh (declan@w...) > 2:00 a.m. Aug. 7, 2001 PDT > > The U.S. government has invoked national security to argue that > details of a new electronic surveillance technique must remain secret. > > Justice Department attorneys told a federal judge overseeing the > prosecution of an alleged mobster that public disclosure of a > classified keystroke logger would imperil ongoing investigations of > "foreign intelligence agents" and endanger the lives of U.S. agents. > > In court documents (PDF) filed Friday, the Justice Department claims > that such stringent secrecy is necessary to prevent "hostile > intelligence officers" from employing "counter-surveillance tactics to > thwart law enforcement." > > [...] > > Donald Kerr, the director of the FBI's lab, said in an affidavit > filed Friday that "there are only a limited number of > effective techniques available to the FBI to cope with encrypted data, > one of which is the 'key logger system.'" He said that if criminals > find out how the logger works, they can readily circumvent it. > > The feds believe so strongly in keeping this information secret that > they've said they may invoke the Classified Information Procedures Act > if necessary. The 1980 law says that the government may say that > evidence requires "protection against unauthorized disclosure for > reasons of national security." > > If that happens, not only are observers barred from the courtroom, but > the trial could move to a classified location. Federal regulations say > that if a courtroom is not sufficiently secure, "the court shall > designate the facilities of another United States Government agency" > as the location for the trial. > > But the FBI's Kerr said that CIPA's extreme procedures aren't good > enough. Says Kerr: "Even disclosure under the protection of the court > ... cannot guarantee that the technique will not be compromised.... To > assume otherwise may well lead to the compromise of criminal and > national security investigations, and, in some cases, threaten the > lives of FBI or other government agency personnel." > > [...] > > > > ------------------------------------------------------------------------- > POLITECH -- Declan McCullagh's politics and technology mailing list > You may redistribute this message freely if you include this notice. > To subscribe, visit http://www.politechbot.com/info/subscribe.html > This message is archived at http://www.politechbot.com/ > ------------------------------------------------------------------------- > > > 3475 From: James M. Atkinson Date: Tue Aug 7, 2001 6:45pm Subject: CIA Names Kerr New 'Gizmo' Chief CIA Names Kerr New 'Gizmo' Chief http://www.newsfactor.com/perl/story/12564.html By Robyn Weisman NewsFactor Network August 6, 2001 While the rest of the high-tech world agonized over Code Red and its consequences, the U.S. Central Intelligence Agency (CIA) took time out to name its latest overseer for the development and deployment of cutting-edge devices and technologies. Late Friday, CIA director George Tenet tapped physicist Donald Kerr to be the agency's deputy director of science and technology. Kerr replaces Joanne Isham, who takes over as head of the National Imagery and Mapping Agency. Isham has run the science and tech office since January 2000. "As an agency, we are fortunate indeed to have a world-class talent like Don Kerr to add new chapters to CIA's long history of technical research, creativity, and outreach to government, the academic community, and industry," Tenet said in a prepared statement. Transferred from FBI Kerr is transferring over from the Federal Bureau of Investigation (FBI), where he was an assistant director in charge of the agency's laboratory division since October 1997. As assistant director, Kerr supervised the development of new surveillance and communications technologies, managed technical support services to investigations, and oversaw analysis of forensic evidence. Previously, Kerr headed the Los Alamos National Laboratory in New Mexico, the birthplace of nuclear weaponry, from 1979 to 1985. Said Tenet: "As director of Los Alamos in the early 1980s -- and as a scientist there in the 1960s and 1970s -- Don shaped path-breaking research on nuclear weapons, ionospheric physics, and alternative energy sources." Analysts expressed some degree of surprise that a former FBI man would have been selected to head a CIA post. "Inter-agency relations seem to be chronically strained," Ryan Russell, an incident analyst for SecurityFocus.com, told NewsFactor Network. "This extends into the various government infrastructure protection and information security efforts as well." "We often hear about frustration over lack of information between agencies, and not just [between] the FBI and CIA," Russell added. But sources claim that relations between the FBI and CIA have apparently improved over the last few years, due to the good rapport between Tenet and former FBI head Louis Freeh. There have been reports that the two intelligence agencies have worked jointly on several security projects. 21st Century Toys The newest gizmos being developed by the CIA are probably not as picturesque as those from the James Bond era; however, the cutting-edge devices upon which many have speculated are apropos to the Internet age. SecurityFocus.com's Russell, taking a break from the Code Red II threat, speculated on some of the items the CIA is rumored to be developing. Russell told NewsFactor that in addition to the garden-variety stamp-sized digital cameras, handheld photocopiers and remote tracking devices using GPS (Global Positioning Systems), Kerr will likely oversee the evolution of hardware and software-based keyboard sniffing devices. Both types have the ability to grab all the keystrokes from a given computer, so that intelligence officers can decrypt messages. 'Tempest' Tech Russell also mentioned reports of "tempest" devices that can monitor computers based on their radio waves, as well as tempest-shielding devices that prevent adversaries from doing the same to investigators' computers. As interesting as the new devices are, Russell questioned how they would impact on privacy concerns. "Personally, I'm in favor of the government driving fundamental research, but I'm a little leery about whether civil rights will be respected when it is put into use," he said. Russell added that he looks forward to seeing the new toys and hopes they won't be too heavily classified. -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3476 From: A.Lizard Date: Tue Aug 7, 2001 1:42pm Subject: Keystroke loggers CLASSIFIED Software-based loggers are readily available. Hardware-based loggers can be purchased over the counter at spy shops or over the Web. The fact that they are in use has already been admitted by the government. Now that everyone who cares knows this, the methods for finding them whether they are hardware or software are readily apparent, and anybody who is motivated enough to use encryption should be able to find them. Can anybody tell me just *what* the government is trying to keep secret here? A.Lizard Date: Tue, 7 Aug 2001 07:26:13 -0400 From: Declan McCullagh To: politech@p... Subject: FC: Feds say keystroke logger details are covered by "national security" Message-ID: <20010807072613.A17581@c...> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-URL: http://www.mccullagh.org/ Sender: owner-politech@p... Precedence: bulk Reply-To: declan@w... X-URL: Politech is at http://www.politechbot.com/ X-Author: Declan McCullagh is at http://www.mccullagh.org/ X-News-Site: Cluebot is at http://www.cluebot.com/ The FBI's Kerr has been named the CIA's next deputy director for science and technology: http://www.washingtonpost.com/wp-dyn/articles/A30341-2001Aug3.html EPIC has placed the documents online: http://www.epic.org/crypto/scarfo.html --- http://www.wired.com/news/politics/0,1283,45851,00.html Feds: Spy Tool Is a Secret By Declan McCullagh (declan@w...) 2:00 a.m. Aug. 7, 2001 PDT The U.S. government has invoked national security to argue that details of a new electronic surveillance technique must remain secret. Justice Department attorneys told a federal judge overseeing the prosecution of an alleged mobster that public disclosure of a classified keystroke logger would imperil ongoing investigations of "foreign intelligence agents" and endanger the lives of U.S. agents. In court documents (PDF) filed Friday, the Justice Department claims that such stringent secrecy is necessary to prevent "hostile intelligence officers" from employing "counter-surveillance tactics to thwart law enforcement." [...] Donald Kerr, the director of the FBI's lab, said in an affidavit filed Friday that "there are only a limited number of effective techniques available to the FBI to cope with encrypted data, one of which is the 'key logger system.'" He said that if criminals find out how the logger works, they can readily circumvent it. The feds believe so strongly in keeping this information secret that they've said they may invoke the Classified Information Procedures Act if necessary. The 1980 law says that the government may say that evidence requires "protection against unauthorized disclosure for reasons of national security." If that happens, not only are observers barred from the courtroom, but the trial could move to a classified location. Federal regulations say that if a courtroom is not sufficiently secure, "the court shall designate the facilities of another United States Government agency" as the location for the trial. But the FBI's Kerr said that CIPA's extreme procedures aren't good enough. Says Kerr: "Even disclosure under the protection of the court ... cannot guarantee that the technique will not be compromised.... To assume otherwise may well lead to the compromise of criminal and national security investigations, and, in some cases, threaten the lives of FBI or other government agency personnel." [...] ------------------------------------------------------------------------- POLITECH -- Declan McCullagh's politics and technology mailing list You may redistribute this message freely if you include this notice. To subscribe, visit http://www.politechbot.com/info/subscribe.html This message is archived at http://www.politechbot.com/ ------------------------------------------------------------------------- ************************************************************************ Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 3477 From: Dave Emery Date: Mon Aug 6, 2001 11:02pm Subject: Re: Stunning development (or, an acknowledgement) On Mon, Aug 06, 2001 at 07:09:51PM -0500, Aimee Farr wrote: > This just in: > > > The Current Reports of the ABA/BNA Lawyers Manual announces that the ABA > has > > reversed its position in Formal Op. 337 that the mere act of secretly tape > > recording a conversation is inherently deceitful. The new opinion, ABA > > Formal Op. 01-422, issued on 6-24-01, holds that if tape-recording a > > conversation to which one is a party is lawful, then the Model Rules > cannot > > prohibit such activity. The opinion permits a lawyer to secretly tape > > record conversations with a client, but recommends against it, even though > > it is no longer unethical. > > > In those jurisdictions where one-party consent recordings are unlawful, > the > > lawyer would be violating Rule 8.4 (b) and (c). > > This is just like "pot" being a "gateway drug." > I've got a bizzare hypothetical that this brings to mind and I would be interested in a lawyer's take on it... Specificaly, is it illegal in a two party state to use computer voice recognition software to covertly (eg without notice) transcribe in real time a conversation you are a party to ? Granted this is marginally practical at best with even the leading edge commercial products (lord knows what the classified world has), but the technology gets better as cpus and algorithms get more powerful and certainly some day with good microphones and clear audio it will be possible to produce useable transcripts by machine in real time that can be cleaned up into a fairly good record of what was said. And no question that even today, a corrupt and somewhat bizzare attempt at a transcript can be edited by someone with the conversation freshly in his memory into a pretty good record which vastly exceeds what the average person would be able to do from memory alone. Clearly it is legal to take notes on what was said without notifying the other party you are doing so, and AFAIK I suppose if you are a stenotypist and very fast, even to transcribe it by those means is legal as well, if rather hard. But is a computer that is grinding out an approximate and somewhat garbled transcript more akin to taking notes or making an audio recording ? Perhaps the answer is clear with a little research, but I have never heard this issue raised anywhere before ... Also what is the law if one puts the conversation on a speakerphone or another extension and has a real live human stenotypist doing the transcription ? -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 3478 From: e cummings Date: Tue Aug 7, 2001 0:36pm Subject: FBI invokes "national security" exception to discovery process for keystroke logger so, is a keyboard bug a wiretap, or not? apparently the FBI doesn't want the court to be able to find that it is: EPIC has placed the court documents online: http://www.epic.org/crypto/scarfo.html http://www.wired.com/news/politics/0,1283,45851,00.html Feds: Spy Tool Is a Secret By Declan McCullagh 2:00 a.m. Aug. 7, 2001 PDT The U.S. government has invoked national security to argue that details of a new electronic surveillance technique must remain secret. Justice Department attorneys told a federal judge overseeing the prosecution of an alleged mobster that public disclosure of a classified keystroke logger would imperil ongoing investigations of "foreign intelligence agents" and endanger the lives of U.S. agents. In court documents (PDF) filed Friday, the Justice Department claims that such stringent secrecy is necessary to prevent "hostile intelligence officers" from employing "counter-surveillance tactics to thwart law enforcement." U.S. District Judge Nicholas Politan heard arguments last Monday in the prosecution of Nicodemo S. Scarfo, the alleged mastermind of a loan shark operation in New Jersey. Politan asked both sides to submit additional briefs before he decided whether or not to order the feds to disclose details about their keystroke logging device, which captured Scarfo's PGP passphrase. Politan has barred attorneys in the case from talking to reporters. Donald Kerr, the director of the FBI's lab, said in an affidavit filed Friday that "there are only a limited number of effective techniques available to the FBI to cope with encrypted data, one of which is the 'key logger system.'" He said that if criminals find out how the logger works, they can readily circumvent it. The feds believe so strongly in keeping this information secret that they've said they may invoke the Classified Information Procedures Act if necessary. The 1980 law says that the government may say that evidence requires "protection against unauthorized disclosure for reasons of national security." If that happens, not only are observers barred from the courtroom, but the trial could move to a classified location. Federal regulations say that if a courtroom is not sufficiently secure, "the court shall designate the facilities of another United States Government agency" as the location for the trial. But the FBI's Kerr said that CIPA's extreme procedures aren't good enough. Says Kerr: "Even disclosure under the protection of the court ... cannot guarantee that the technique will not be compromised.... To assume otherwise may well lead to the compromise of criminal and national security investigations, and, in some cases, threaten the lives of FBI or other government agency personnel." Scarfo allegedly used PGP to encode his confidential and incriminating business data. With a judge's approval, FBI agents repeatedly sneaked into Scarfo's business to plant a keystroke sniffer -- it could be either software or hardware -- and monitor its output. During last Monday's hearing, Judge Politan wondered aloud how the law should treat the keyboard tap. Was it akin, Politan wondered, to a telephone wiretap, regulated by the federal law known as Title III? Perhaps it was a general search of the sort loathed by the colonists at the time of the American Revolution and thereafter outlawed by the Fourth Amendment? Or was it, as the government argued, just like cops rummaging around someone's home or office with a search warrant in hand? The difference is crucial: If Politan rules that the FBI's keystroke monitor is a wiretap, the evidence may have to be discarded and Scarfo would be more likely to walk free. That's because wiretaps must follow strict rules -- such as minimizing information that's recorded -- that the FBI's technique didn't. "If no court has yet assessed the legality of this technique, it seems clear that Scarfo should be entitled to make that inquiry," says David Sobel, general counsel of the Electronic Privacy Information Center. "Whether or not this was the equivalent of a wiretap is a central question -- how can that be answered without knowing how this worked and what it was capable of capturing?" For its part, the defense argues (PDF) that without public disclosure, judges will be giving their "approval to secret entries which do nothing less than spy on the citizen so targeted." Another thing that's suspicious, says the defense, is that the log from the program ended as soon as it shows Scarfo's PGP passphrase: "The odds of someone subject to a 60-day period of observation via keystroke recording providing what was sought on the very last typed entries are alarmingly high." 3479 From: Andrus Aaslaid Date: Tue Aug 7, 2001 7:23pm Subject: RE: Keystroke loggers CLASSIFIED > Software-based loggers are readily available. Hardware-based > loggers can be > purchased over the counter at spy shops or over the Web. The fact > that they > are in use has already been admitted by the government. Now that everyone > who cares knows this, the methods for finding them whether they are > hardware or software are readily apparent, and anybody who is motivated > enough to use encryption should be able to find them. > > Can anybody tell me just *what* the government is trying to keep > secret here? Hmm.. could it be connected to the rumours, that M$ has been creating a trapdoor for government purposes inside windowses? I can see in my dereams an assymetric encryption tied together with a kernel-level keystroke logger what can be remote-activated. I can also see conspiracy theorists jumping from one leg to another saying that it was part of the deal, so government did not split the company afterall. I seriously do hope I am talking silly things here ... I do not have ANY reference to whatsoever information about this subject. I must have heard this in some newsgroup somewhere. I am only speculating. But food for thought - I am darn sure I am not the first one having this idea crossing my mind. Andrus. 3480 From: Aimee Farr Date: Tue Aug 7, 2001 7:26pm Subject: bizarre hypos Dave wrote: > I've got a bizarre hypothetical Company A has biometric access controls. User (U) of Company A does a bad thing and now he might have [insert Congressional terror here]. U is an unknown. Government (G) wants to ID and find U, before he gets to [insert Congressional terror here]. G lifts a latent fingerprint or voiceprint or something from somewhere, gets the same biometric software and produces the template. G "asks" A to decrypt the template database and allow them to run the template they produced with the latent/surreptitiously gained biometric for a match. But what if A has a biometric application service provider?....[blah, blah, more silly Miss. Imp. stuff...]. Dave, go 'get bizarre' and come back. ;') > that this brings to mind and I > would be interested in a lawyer's take on it... > Specificaly, is it illegal in a two party state to use computer You have just directed a specific question to ME "a lawyer's take" = "legal advice." My ethical rules are pretty solid that I can't answer. Net and the email has my profession all in knots. I disagree with much of this. > voice recognition software to covertly (eg without notice) transcribe in > real time a conversation you are a party to ? Plenty of non-lawyer types in here could give you the Title I analysis. Pragmatic Title I analysis: find it -> find them -> go find somebody, that can find somebody that cares. :) The heart of the issue is: will the courts let the government techno-dance around the ECPA? When the courts considered visual surveillance, it was clearly outside the statute - but they still reached to it for procedure. Steve Jackson Games had no intercept and got the same information the statute was designed to protect (email) - but SJG was a seizure of equipment (certainly, a technique available in 1986 that Congress was well aware of). Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR 5400 Bosque, Ste. 675 Waco, Texas 76710 3481 From: Marcelrf Date: Wed Aug 8, 2001 3:12pm Subject: FCC Explores Adding 3G Spectrum - FCC Explores Adding 3G Spectrum 08/08/2001 The Federal Communications Commission (FCC) Thursday will hold an open meeting in an attempt to sort out the prickly issue of using frequency bands below 3 GHz to support the introduction of advanced wireless services, including 3G services, in the U.S. 3G systems are intended to provide access, by means of one or more radio links, to a wide range of telecommunication services supported by the fixed telecommunication networks and to other services that are specific to mobile users. A range of mobile terminal types will be used, linking to terrestrial and/or satellite-based networks, and the terminals may be designed for mobile or fixed use. Key features of 3G systems are a high degree of commonality of design worldwide, compatibility of services, use of small pocket terminals with worldwide roaming capability, Internet and other multimedia applications, and a wide range of services and terminals. And there is no small amount of money concerned. The FCC has said that capital investment in the wireless mobile industry has more than quadrupled since 1994, for a cumulative total of more than $70 billion through 1999. Additionally, the number of subscribers for wireless services has more than doubled since 1996 to more than 86 million subscribers through 1999 and revenues over the same period doubled to almost $21 billion while rates fell. The wireless carriers have taken a hit during the current economic slowdown, but the consensus is that the industry will continue to scale up rapidly. But as demand for services grow, more spectrum is needed to fulfill that demand, which means the FCC must make some difficult decisions. The issue is complicated by a number of factors, including: A mandate by Congress that 200 MHz of spectrum be reallocated for advanced mobile and fixed communication services in the next thee to five years A resolution by the 2000 World Radiocommunication Conference (WRC-2000) that an additional 160 MHz of spectrum will be needed by 2010 to meet the projected requirements for those areas where the traffic on these services is highest The International Telecommunication Union (ITU) plan for fostering the development of advanced wireless systems, commonly known as the International Mobile Telecommunications 2000 (IMT-2000) initiative, which defines key characteristics of IMT-2000 radio systems, including standards intended to minimize the number of different radio interfaces, maximize their commonality and provide a transition path to 3G systems. The ITU and WRC-2000 have identified a number of frequency bands that could be used to implement 3G systems while satisfying its standards. The recommendations include 806-890 MHz, 1710-1885 MHz, and 2500-2690 MHz for possible terrestrial use. The two groups identified bands in the 1885-2170 MHz range for high-altitude platform IMT-2000 use and also identified the 1525-1559, 1610-1660.5, 2483.5-2500, 2500-2520, and 2670-2690 MHz bands for mobile satellite IMT-2000 use. Some of those frequencies are already used for commercial mobile communications -- namely 825-845/870-890 MHz bands for cellular radio service, 806-821/851-866 MHz and 896-901/935-940 MHz bands for Specialized Mobile Radio (SMR) services, and 1850-1910/1930-1990 MHz bands for Personal Communication Service (PCS) -- and the FCC has proposed allowing those frequencies to be used for 3G as well. However, other suggested bands -- especially the 2500-2690 MHz band -- are already in use by differing services, and according to a study prepared in March by FCC staff in the Office of Engineering and Technology, Mass Media Bureau, Wireless Telecommunications Bureau, and International Bureau, sharing the band between 3G and incumbent services could cause extensive interference. The 2500-2690 MHz band is currently used by the Instructional Fixed Television Service (ITFS), Multipoint Distribution Service (MDS) and Multichannel Multipoint Distribution Service (MMDS). The MDS industry in particular has invested several billion dollars to develop broadband fixed wireless data systems in the band, including high-speed access to the Internet. According to the study, the MDS systems offer a "significant opportunity for further competition with cable and digital subscriber line (DSL) services in the provision of broadband services in urban and rural areas." Additionally, the spectrum is used to provide video services for education and training in schools, health care centers and a variety of other institutions, as well as provisioning wireless cable. Although some argue the spectrum is underutilized, the study said it is heavily licensed throughout the country. And, the study also found that ITFS and MDS use of the band varies from one geographic area to the other, presenting "serious challenges to developing band sharing or segmentation options that could be used across the country without severely disrupting ITFS and MDS use." Indeed, one study cited by the FCC's report suggested that segmentation of the band or relocation of ITFS/MDS could cost those operations as much as $19 billion over a 10-year period. Relocation would also require other services to relocate with costs estimated to range from $10.2 billion to $30.4 billion. The other bands may prove to be more workable. The 1710-1755 MHz band, which falls within the recommended 1710-1885 MHz band, was identified for transfer from the federal government to mixed use in 1995. An interim report completed by the FCC on Nov. 15, 2000, suggested that band could be paired with the 2110-2150/2160-2165 MHz bands, identified for reallocation by the commission under its Emerging Technologies proceeding. The FCC's open meeting will be held Thursday at 9:30 a.m. in Room TW-C305, at 445 12th Street, S.W., Washington, D.C. The FCC said the meeting can be viewed over George Mason University's Capitol Connection, which will also carry the meeting live via the Internet. The audio portion of the meeting will be broadcast live on the Internet via the FCC's Internet audio broadcast page. Additionally, the meeting can be heard via telephone, for a fee, from National Narrowcast Network at 202-966-2211. -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 From: James M. Atkinson Date: Sun Aug 3, 2003 4:52pm Subject: The Tree The Tree I hired a plumber to help me restore an old farmhouse, and after he had just finished a rough first day on the job: a flat tire made him lose an hour of work, his electric drill quit and his ancient one ton truck refused to start. While I drove him home, he sat in stony silence. On arriving, he invited me in to meet his family. As we walked toward the front door, he paused briefly at a small tree, touching the tips of the branches with both hands. When opening the door he underwent an amazing transformation. His tanned face was wreathed in smiles and he hugged his two small children and gave his wife a kiss. Afterward he walked me to the car. We passed the tree and my curiosity got the better of me. I asked him about what I had seen him do earlier. Oh, that's my trouble tree," he replied. "I know I can't help having troubles on the job, but one thing's for sure, those troubles don't belong in the house with my wife and the children. So I just hang them up on the tree every night when I come home and ask God to take care of them. Then in the morning I pick them up again. Funny thing is," he smiled, "when I come out in the morning to pick 'em up, there aren't nearly as many as I remember hanging up the night before." -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Knowledge will forever govern ignorance, and a people who mean to be their own governors, must arm themselves with the power knowledge gives. A popular government without popular information or the means of acquiring it, is but a prologue to a farce or a tragedy or perhaps both." --- James Madison (Fourth President of the United States) -------------------------------------------------------------------------------------------------- 7624 From: James M. Atkinson Date: Sun Aug 3, 2003 9:39pm Subject: The Consultation A lawyer's dog, running around town unleashed, heads for a butcher shop and steals a roast. The butcher goes to the lawyer's office and asks, "if a dog running unleashed steals a piece of meat from my store, do I have a right to demand payment for the meat from the dog's owner?" The lawyer answers, "Absolutely." "Then you owe me $8.50. Your dog was loose and stole a roast from me today." The lawyer, without a word, writes the butcher a check for $8.50. The butcher, having a feeling of satisfaction, leaves. Three days later, the butcher finds a bill from the lawyer: $100 due for a consultation. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Knowledge will forever govern ignorance, and a people who mean to be their own governors, must arm themselves with the power knowledge gives. A popular government without popular information or the means of acquiring it, is but a prologue to a farce or a tragedy or perhaps both." --- James Madison (Fourth President of the United States) -------------------------------------------------------------------------------------------------- 7625 From: Blake Bowers Date: Thu Jul 31, 2003 2:05pm Subject: Re: Re: 24/7 Audio and Video recording for an Automobile > At 12:25 PM 7/29/2003, Steve Uhrig wrote: > >Cellular is far too narrow bandwidth to dump any usable amount of video. > >You can frame grab and dribble snapshots out across the > >channel, but that won't do you much good and is not reliable. > > With only the greatest respect Mr. Uhrig, I must disagree on this one > point. The current 1x-RTT deployment of Sprint USA's CDMA network Actually, on a technicality, Steve is once again, correct. Sprints PCS system, is NOT a cellular service, by defination of the FCC. A true Cellular system consists of a system that uses specific frequencies in the 800 Mhz band, and Sprints system uses the PCS band, not those frequencies. Quibbling perhaps, but technicaly, correct. 7626 From: frost_bitten_ca Date: Fri Aug 1, 2003 7:38am Subject: U.S. fears large-scale hacker attack Jul. 31, 2003. 06:39 PM U.S. fears large-scale hacker attack TED BRIDIS ASSOCIATED PRESS WASHINGTON ≠ Government and industry experts consider brewing hacker activity a precursor to a broad Internet attack that would target enormous numbers of computers vulnerable from a flaw in Windows software from Microsoft Corp. Experts described an unusual confluence of conditions that heighten prospects for a serious disruption soon. They cite the high numbers of potential victims and increasingly sophisticated attack tools already tested successfully by hackers in recent days ... http://www.thestar.com/NASApp/cs/ContentServer? pagename=thestar/Layout/Article_Type1&c=Article&cid=1059648030943&call _pageid=968332188492&col=968705899037 7627 From: Vangelis Date: Sat Aug 2, 2003 0:32pm Subject: Re: 24/7 Audio and Video recording for an Automobile At 02:25 AM 7/28/2003 +0000, markhaugsten wrote: >Please comment on your opinions on how to build a system into my >truck/car that records 24/7, catches audio within 50 ft, 360 degree >(preferably overlapped) video, can store min. 4 days, or dl's via >cellphone at reg schedules. Are you using "cellphone" in the modern generic sense to include Sprint PCS (CDMA-USA), TMobile (GPRS), and all other conventional digital mobile phone technologies, or do you specifically mean to restrict the solution to older analog 800Mhz "cellular" technology only? If you don't know the difference, then you probably want the former - unless you *need* to operate out in remote backwater non-metropolitan areas where only the latter is available. -Van 7628 From: Date: Sun Aug 3, 2003 7:00pm Subject: Err...which bug did you want me to find? I think I found a Trojan Horse....in your auto. An article about a black box for the automobile, many interesting design capabilities are brought up. Speed limiters. Auto ticketing for speed limit breaches, etc. Interesting read. I'm sorry sir, I could only find the government tracking signal.... A thought, perhaps that what would /when/ the signal is either piggybacked or split channeled for another 'party' to utilize the existing infrastructure. Imagine if this was done on the back-end in a server. All the physical protection to prevent anyone from placing anything in/on an auto to be compromised because some one cracker the trackers.... http://observer.guardian.co.uk/uk_news/story/0,6903,1011463,00.html 7629 From: Jay Coote Date: Tue Aug 5, 2003 7:04pm Subject: AOR3000 help? I have an AOR AR3000 receiver that failed. The symptoms are: All characters in the LCD go on when power is applied, and has no relation to the power switch. The power switch has no effect. Inernal, covered fuse is OK but the lithium battery seems to be 0.4 volts.... is it the battery or is something else fried? Thanks, Jay Coote Los Angeles Specialist in Technical Surveillance Countermeasures Lic: PI17926 TSCM@j... 7630 From: Hawkspirit Date: Wed Aug 6, 2003 8:48pm Subject: Sweep needed Can anyone handle a home sweep in Warren, Ohio. Roger 7631 From: Jay Coote Date: Wed Aug 6, 2003 9:18pm Subject: Helpful List Members To those who helped with my AR-3000 receiver questions- Thanks. Jay Coote Los Angeles Specialist in Technical Surveillance Countermeasures Lic: PI17926 TSCM@j... 7632 From: Date: Thu Aug 7, 2003 3:10pm Subject: How safe is that safe-deposit box? How safe is that safe-deposit box? By Natalie G. Hall | Special to The Christian Science Monitor On her daughter's wedding day, Zulekha Kureshi made an early morning trek to her bank to pick up some prized possessions - tens of thousands of dollars worth of antique gold and diamond jewelry that the family had saved for such occasions. But she soon discovered that the jewelry was gone. "The bank had drilled our safe-deposit box without any witnesses and told us the box was empty when they opened it," says Latif Kureshi, Zulekha's husband. "We believed the bank was the safest place to keep our jewelry." The bank, Mr. Kureshi adds, "won't even talk to us." The family has since hired an attorney to file a lawsuit. Bank officials, citing privacy laws, declined to discuss the matter. Despite the fact that millions of Americans rely on bank safe boxes to protect their valuables, some box owners like the Kureshis have learned that these boxes are not as safe as they might have believed. "Banks do not insure the contents of safe-deposit boxes," says David McGuinn, founder and president Safe Deposit Specialists in Houston. "Many, many people assume the contents of their safe boxes are insured by the bank or by the FDIC, but they aren't. You have to arrange for your own insurance." Valuables in a safe box aren't like cash in a savings account that the bank can use to make loans to other clients, Mr. McGuinn points out. That is one key reason why items in a safe box is not FDIC- insured to $100,000, as are cash accounts. Banks carry only liability insurance. Individuals can collect only if they prove the bank was negligent, says McGuinn, who is often called as an expert witness in safe-deposit cases. To be absolutely sure that a specific item of value is covered, insurance industry experts recommend that individuals attach a separate "floater" to their homeowner's or tenant's insurance policy. Most policies fail to mention the words "safe deposit" or "safe box," says insurance agent Dick Van Duzer of Dick Van Duzer & Associates in Los Angeles. Such an omission could lead to a dispute if items in a safe-deposit box are lost or stolen. "For items that aren't scheduled, there's a big limitation on theft," he says. Mr. Van Duzer mentions that he can't recall a single instance of someone attempting to collect on an item missing from a safe-deposit box in his more than 40 years in the business, adding that he has only had one client who specifically requested in-vault coverage. McGuinn is now trying to get banks to be more proactive in letting people know that belongings in safe deposit are not insured. He has advised banks to post signs near the safe-deposit vault reminding people of this fact and to place a similar statement in the safe-box lease agreement. A safe-deposit vault located in one of the smaller World Trade Center buildings, for example, proved vulnerable to extreme heat that resulted from the Sept. 11 terrorist attacks. Burning jet fuel reduced documents inside to ash and jewelry into heaps of molten metal. "People are now claiming the bank never told them their belongings weren't insured," McGuinn says, adding that the wording of the lease was vague. The fine print on the lease told box holders that the contents of their safe-deposit boxes "may not be fully protected" by the insurance coverage maintained by the bank. That passage led some box renters to believe the items would be at least partly insured. However, the insurance ultimately covered only liability if the bank were found to be negligent. That was determined not to be the case in the WTC attacks, and a class-action lawsuit filed by several box holders was recently denied. "We now have the option of appealing that decision or just representing the class as individuals," says attorney Bill Dahill, but he doesn't know when that decision will be made. Mr. Dahill recalls that the bank initially showed no interest in working with the box holders. "But after the lawsuit was filed," he says, "the bank said it might consider making settlements with individuals, and it has, in fact, reached settlements with a number of victims." Water is often another cause of concern for safe-deposit-box holders. Severe flooding in Houston in 2001, reportedly ruined a 1952 Mickey Mantle rookie baseball card kept at the Houston branch of the Bank of America. The card was valued roughly at $30,000 and the owner had no insurance, says McGuinn. "It's virtually impossible for banks to offer safe-deposit boxes that are truly watertight," McGuinn adds. To make matters worse, he notes, many safe-deposit vaults are in a bank's basement - often the first place inundated when a river overflows. Other box holders have experienced problems with theft. An Idaho multimillionaire, after entering his bank's vault, discovered that his entire box was missing, according to Gary Slette, an attorney from Twin Falls, Idaho, who represented the victim. It seemed that a thief used a stolen key to access the box, absconding with rare gold coins, precious gems, and cash valued at hundreds of thousands of dollars. The multimillionaire, who did not want his name used for this story, won his case against the bank in court after proving that it was possible to have that amount of cash and valuables in a 2-by-5-inch safe box, says Mr. Slette. In spite of these perils, safe-deposit boxes remain one of the most secure ways to protect valuables. Experts recommend people use safe boxes for documents that are impossible - or at least a major nuisance - to replace. The list includes real estate deeds, titles, mortgages, leases and contracts; stock and bond certificates; insurance policies; birth, marriage, and death certificates; divorce decrees; and immigration papers, to name a few. Some box holders also like to keep photographs or a video of home possessions in a safe deposit in case they're stolen or destroyed by fire or flood. Safe-box users, experts say, should avoid storing anything that they might need to get their hands on immediately, like a passport for travel, because the bank might be closed. And what about a will? That depends on what state laws say about who has access to a safe-deposit box in the event of a person's death. Some states allow heirs and executors access to safe boxes in the event of the death of the box holder; some do not. And just as a precaution, McGuinn suggests visiting a safe-deposit box at least once a year to make sure everything's OK. "Lack of activity or unpaid rental fees on your safe-deposit account could lead a financial institution to believe you've abandoned your safe box," he says. Experts offer the following suggestions when renting a safe-deposit box: ‚Ä¢ Hold on to documents proving you possess a safe-deposit box. Keep the original lease agreement in a secure place at home. ‚Ä¢ Ask for a copy of your bank's rules and regulations in regard to safe boxes. Read and file it with the lease agreement. ‚Ä¢ Keep a detailed list of everything in the box. ‚Ä¢ Make photocopies of every document in the box, as well as photographs of val uable items like jewelry. Keep this evidence at home with your lease agreement, along with any proof of ownership. ‚Ä¢ Buy "floater" attachments for your homeowner's or tenant's insurance policy on any valuables stored in a safe box. ‚Ä¢ Visit your box at least once a year. ‚Ä¢ If you move, notify your bank's safe-deposit division of the new address. Changing the address on your bank accounts may not be sufficient. ‚Ä¢ If your area is prone to flooding, keep valuable documents in airtight containers inside the safe box. from the August 04, 2003 edition - http://www.csmonitor.com/2003/0804/p16s01-wmcn.html [Non-text portions of this message have been removed] 7633 From: Steve Uhrig Date: Thu Aug 7, 2003 9:56pm Subject: REI CPM-700 FS Research Electronics Inc (REI) CPM-700 for sale. Just checked and updated with latest engineering changes by REI factory in July 2003. Unit in excellent condition, with black ballistic nylon carrying case with accessory pouch and internal pockets for all items, instruction manual, standard RF probe, hardened RF probe, battery charger/AC power supply, VLF probe carrier current adapter for AC power lines, adapter for carrier current tests on other lines, new headphones, audio input cord for checking phone lines or unknown cables, shoulder strap. Unit appears and works as new. Carrying case is rugged and low profile for hand carry on airlines. Nice package, very popular and potent TSCM item for both radiated and conducted electronic sweeps. Latest factory mods and especially the hardened probe makes this unit especially desirable. Can ship via overnight freight if needed for an emergency. Full technical specs here: http//www.research-electronics.com/cgi- bin/main.cgi?action=viewprod&ct=products&pct=CPM&num=CPM-700 or here. http//tinyurl.com/he2y(same URL but shortened by www.tinyurl.com). The *best* price I found for this package with the hardened probe is $2795. You get this one for $1500. Such a deal! Can take credit cards and will ship to any non-embargoed country. Note battery charger is for 110VAC. Be sure to remind me if you are in a 220V mains country so I can include the proper transformer. This will be at no extra charge. Holler if interested in this very popular piece of TSCM gear. Other related items (surveillance, countersurveillance, communications, test equipment, etc.) can be reviewed here: http://www.swssec.com/equipment_for_sale.html I also am interested in purchasing unneeded electronic equipment. Please email if you have anything you don't need. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7634 From: James M. Atkinson Date: Thu Aug 7, 2003 11:44pm Subject: TOP TEN TWISTED PUNS TOP TEN TWISTED PUNS 1. Two vultures board an airplane, each carrying two dead raccoons. The stewardess looks at them and says: "I'm sorry, gentlemen, only one carrion allowed per passenger. 2. Two boll weevils grew up in South Carolina. One went to Hollywood and became a famous actor. The other stayed behind in the cotton fields and never amounted to much. The second one, naturally, became known as the lesser of two weevils. 3. Two Eskimos sitting in a kayak were chilly, but when they lit a fire in the craft, it sank, proving once again that you can't have your kayak and heat it, too. 4. A three-legged dog walks into a saloon in the Old West. He slides up to the bar and announces: "I'm looking for the man who shot my paw." 5. Did you hear about the Buddhist who refused Novocaine during the root canal? He wanted to transcend dental medication. 6. A group of chess enthusiasts checked into a hotel and were standing in the lobby discussing their recent tournament victories. After about an hour, the manager came out of his office and asked them to disperse. But why? they asked, as they moved off. Because, he said, I can't stand chess nuts boasting in an open foyer. 7. A woman has twins and gives them up for adoption. One of them goes to a family in Egypt and is named Ahmal. The other goes to a family in Spain; they name him Juan. Years later, Juan sends a picture of himself to his birth mother. Upon receiving the picture, she tells her husband that she wishes she also had a picture of Ahmal. Her husband responds, They're twins! If you've seen Juan, you've seen Ahmal. 8. These friars were behind in their belfry payments, so they opened up a small florist shop to raise funds. Since everyone liked to buy flowers from the men of God, a rival florist across town thought the competition was unfair. He asked the good fathers to close down, but they would not. He went back and begged the friars to close. They ignored him. So, the rival florist hired Hugh MacTaggart, the roughest and most vicious thug in town to persuade them to close. Hugh beat up the friars and trashed their store, saying he'd be back if they didn't close up shop. Terrified, they did so, thereby proving that Hugh, and only Hugh, can prevent florist friars. 9. Mahatma Gandhi, as you know, walked barefoot most of the time, which produced an impressive set of calluses on his feet. He also ate very little, which made him rather frail and with his odd diet, he suffered from bad breath. This made him . what? (Oh, man this is so bad, it's good) A super callused fragile mystic hexed by halitosis. 10. And finally, there was the person who sent ten different puns to friends, with the hope that at least one of the puns would make them laugh. Unfortunately, no pun in ten did. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- The credit belongs to the man who is actually in the arena; whose face is marred by the dust and sweat and blood; who strives valiantly; who errs and comes short again and again; who knows the great enthusiasms, the great devotions and spends himself in a worthy course; who at the best, knows in the end the triumph of high achievement, and who, at worst, if he fails, at least fails while daring greatly; so that his place shall never be with those cold and timid souls who know neither victory or defeat." --- THEODORE ROOSEVELT (Paris Sorbonne,1910) -------------------------------------------------------------------------------------------------- 7635 From: Hawkspirit Date: Sat Aug 9, 2003 0:30am Subject: Fwd: F.G MASON ENGINEERING >Delivered-To: rubydun2-bugsweeps:com-info@b... >From: ZAmer88505@a... >Date: Fri, 8 Aug 2003 20:03:59 EDT >Subject: F.G MASON ENGINEERING >To: info@b... >X-Mailer: 8.0 for Windows sub 6014 > >Dear Sir: >I have a unique unite made by F. G. MASON ENGINEERING. The model # TT4-B . >Please see the photo and let me know if you have any info about it. It >come with AWS digital multitester model EZ 6200 . >IT IS IN NEW CONDITION. > >Sincerely, > >Virginia Surplus Inc. > >Zackmei-1.jpgmei-2.jpg [Non-text portions of this message have been removed] 7636 From: Hawkspirit Date: Sat Aug 9, 2003 10:40am Subject: Fwd: Re: F.G MASON ENGINEERING >Date: Sat, 09 Aug 2003 08:39:36 -0700 >To: ZAmer88505@a... >From: Hawkspirit >Subject: Re: F.G MASON ENGINEERING > >I posted it to the TSCM list of professionals, someone will probably >contact you. It will sell if you put it on ebay . >best roger > >At 02:36 AM 8/9/03 -0400, you wrote: >>Thank you Roger for this information. >>DO you think there is any Value for this unit as Vintage test unit? >> >>Zack 7637 From: Date: Mon Aug 4, 2003 6:47am Subject: The test I thought this was right cute. > > The following short quiz consists of 4 questions, and it will tell you > whether you are qualified to be a professional. Scroll down for each > answer. The questions are NOT difficult. > > > > 1. How do you put a giraffe into a refrigerator? > > > > > > > > > > > > > > > > > > > > > > > > > > > > The correct answer is: Open the refrigerator, put in the giraffe, and close the door. This question tests whether you tend to do simple things in an overly complicated way. > > > > > 2. How do you put an elephant into a refrigerator? > > > > > > > > > > > > > > > > > > > > > > > > > > Did you say, "Open the refrigerator, put in the elephant, and close the refrigerator?" (Wrong Answer) > Correct Answer: Open the refrigerator, take out the giraffe, put in the elephant and close the door. This tests your ability to think through the repercussions of your previous actions. > > > > > 3. The Lion King is hosting an animal conference. All the animals attend except one. Which animal does not attend? > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Correct Answer: The elephant. The elephant is in the refrigerator. You just put him in there. This tests your memory. OK, even if you did not answer the first three questions correctly, you still have one more chance to show your true abilities. > > > > > 4. There is a river you must cross but it is inhabited by crocodiles. How do you manage it? > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Correct Answer: You swim across. All the crocodiles are attending the animal meeting. This tests whether you learn quickly from your mistakes. > > > According to Anderson Consulting Worldwide, around 90% of the professionals they tested got all questions wrong. But many preschoolers got several correct answers. Anderson Consulting says this conclusively disproves the theory that most professionals have the brains of a four year old. [Non-text portions of this message have been removed] 7638 From: Matthijs van der Wel Date: Thu Aug 7, 2003 7:36am Subject: Off topic: Computer Co-location Facility Vulnerabilities http://www.networkdweebs.com/colo.html Always "nice" to place an article like this on the internet: "How terrorists could smuggle and detonate explosives" Matthijs 7639 From: Ocean Group Date: Thu Aug 7, 2003 1:17pm Subject: CCS Product Got this email the other day.... I especially liked the way they class it as a product that counters the majority of threats out there including any RF or RF controlled explosive threats..... God forbid the terrorist uses a standard 100 euro off the self 2.4ghz dect phone or the spy uses a 2.4ghz camera. Point. ****** New Portable Counter-terrorism Detection & Prevention Unit for High Profile Individuals. The VIP-1 Bomb Ranger is a countermeasure system that searches for unauthorized transmitting devices in the frequency range of 20 to 2,000 MHz. This system will not only detect, analyze and jam radio-controlled bombs, the weapon of choice for most terrorists, but will also identify and jam hidden video cameras, and/or eavesdropping devices transmitting from home, car, office, hotel conference rooms, etc. Optionally, your VIP-1 Bomb Ranger can be delivered with a choice of such accessories as an NBC (nuclear, biological, chemical) gas mask and bomb blanket. Anti-terrorist specialist confirms that terrorists as well as criminals are adopting hi-tech tools to exploit and further their illicit activities. Subversive, political and industrial sabotage networks can now be defined by inroads into data intelligence acquisitions, mobile transmitting stations, invisible caches of ammunition, remote controlled bombs for ambush or street crime, tactical operation commands armed with modern commercial and military radio communications, and perhaps the simplest of all, bugs and wiretaps for the theft of information that will help promote their goals. The VIP-1 Bomb Ranger is being used by security companies and security professionals, high profile individuals, celebrities, wealthy individuals, corporate CEO's, judges and politicians, etc. -- those who are at risk of attack by dissidents, ruthless competitors, and disloyal insiders. Characteristics: Frequency Band: 20...1000, 1800...1950 MHz Interference Type: 24W Consumption Current, not more: 8.4 + 0.4A & nbsp; Supply Voltage: 12.6 + 2V & nbsp; Continuous Operation Time, no less - From Internal Battery: 45 min. From External Battery: 8 hrs. Efficiency Indication: built-in light side Weight, not more: 10K For more information on our products and services, please contact us on the details below. Plus, do not miss our technology update seminar to be held in New York, Beverly Hills, Washington, DC and Miami in August 2003. Tom Brady VP of Marketing/Sales CCS International, Ltd. (914)654-8700 Tel (914)654-1302 Fax ccssales@s... Email www.spyzone.com Website --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.502 / Virus Database: 300 - Release Date: 18/07/2003 7640 From: Lawrence Dillard Date: Thu Aug 7, 2003 5:52pm Subject: tracking Copyright © 2002 The International Herald Tribune | www.iht.com Mobile-tracing service raises eyebrows in U.K. Ed Johnson AP Thursday, August 7, 2003 LONDON It may seem Orwellian to some, but the first major commercial service that traces peopleís locations using their mobile phones is designed more to ease the minds of worried parents and suspicious bosses than to enable unauthorized spying. The mapAmobile service, unveiled last month in Britain, claims accuracy to within 50 yards. It charges an annual fee of £30, or $48, plus 30 pence per request. Even more precise services are likely in the United States within the next year as more phone models come with global positioning system, or GPS, chips already installed. Carphone Warehouse, which runs the British service, promotes it as offering parents peace of mind or allowing businesses to check on the whereabouts of wayward staff. ëëWe are responding to a real con sumer need by bringing to the market a reliable, affordable and effective way for people to locate each other without disturbing them,íí said the companyís chief executive, Andrew Harrison. The consent of the cellphone owner is required, Harrison said. Even so, privacy advocates said there was potential for abuse. ëëGiven that we know that schoolboys have hacked into the Pentagon computer, nothing is secure,íí said Barry Hugill of the rights group Liberty. ëëOnce the technology is there, it is there to be abused and I find it very hard to believe that it would be watertight. Potentially, we could see stalkers moving in on the act.íí The service is available from Britainís four main wireless operators: Vodafone Group, Orange, mmO2 and T-Mobile International. The smaller operators Virgin, Fresh and 3 Mobile are expected to join as well. Kate Marriot of the Mobile Data Association, an industry association, said mapAmobile was the first service ëëto be launched on such a large-scale commercial basis.íí MapAmobile locates users by tracing the unique identifier each cellphone transmits and triangulating between the network towers that transmit and receive signals to and from phones. Law enforcement agencies have used this method to track suspects for years, though accuracy varies between urban and rural areas. Last year, the FBI arrested a man accused of planting pipe bombs in Midwestern mailboxes after he turned on his cellphone in Nevada. Location requests can be made to mapAmobile on the Internet or by using text messaging or calling a toll-free number. The service will only work if the phone of the person being traced is on. The provider said safeguards were in place to protect civil liberties. Not only do cellphone users have to consent to being tracked; they are sent regular text messages to remind them their phones can be traced, and they can request a list of the people who can locate them. Niki Torrance, a spokeswoman for MI International, the British company that created the technology, said thousands of people had signed on. Torrance also said her company was talking to potential partners in the United States and Continental Europe, adding that the service could be available to U.S. consumers this autumn. The Associated Press Copyright © 2002 The International Herald Tribune 7641 From: Ocean Group Date: Fri Aug 8, 2003 6:41pm Subject: Cordless Phone - Long Range In conclusion to the long range cordless phone discussion we had a while back just wanted to let everyone know that we ordered in the Engenius 920(which is actually just a USA rebrand for a Senao product) and the customer was happy all the way. Range is never as good as it says on the tin but none the less the 1/2watt output did the trick for the premises. I'd say with an external antennae range would be better than any of the shelf cordless at that price. The phone is tough and made with partial metal casing and the size/style of any older mobile phone. Plus we're now agents for Senao(Engenius) if anyone needs anything! :) And a big thanks to Steve and Charles for their advice! Ocean Group, Technical Security Division, Ireland, Europe. --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.502 / Virus Database: 300 - Release Date: 18/07/2003 7642 From: Joe Gomez <1upserv@g...> Date: Sat Aug 9, 2003 3:44pm Subject: the tax man ...joke > > > A man has spent many days crossing the Simpson desert without water. His camel dies of thirst. He's crawling through the sands, certain that he has breathed his last breath, when all of a sudden he sees an object sticking out of the sand several yards ahead of him. He crawls to the object, pulls it out of the sand, and discovers what looks to be an old briefcase. He opens it and out pops a genie. But this is no ordinary genie. He is wearing an Australian Tax Office (ATO) badge and a dull grey suit. There's calculator in his pocket. He has a pencil tucked behind one ear. "Well, mate," say the genie. "You know how it goes. You have three wishes." "I'm not falling for this," says the man. "I'm not going to trust an ATO employee." "What do you have to lose?" says the genie. >"You've got no transportation, and it looks like you're a goner anyway!" The man thinks about this for a minute, and decides that the genie is right. "Ok, I wish I were in a lush oasis with plentiful food and drink." ***POOF*** > > > > > The man finds himself in the most beautiful oasis he has ever seen, surrounded with jugs of wine and platters of delicacies. I were rich beyond my wildest dreams." ***POOF*** The man finds himself surrounded by treasure chest filled with rare gold coins and precious gems. "Ok kid, you have just one more wish. Better make it a good one!" After thinking for a few minutes, the man says, "I wish that no matter where I go beautiful women will want and need me." > > > > > ***POOF*** He is turned into a tampon. The moral of the story?... If the ATO offers you anything, there's going to be a string attached. 7643 From: Joe Gomez <1upserv@g...> Date: Sat Aug 9, 2003 3:44pm Subject: resignation letter >This is an actual letter of resignation from an employee at Zantex >Computers, USA, to his boss. His boss apparently resigned very soon >afterwards! How many of us do not find ourselves in the same situation >either or.... > >Dear Mr Baker, > >As an employee of an institution of higher education, I have a few very >basic expectations. Chief among these is that my direct superiors have an >intellect that ranges above the common ground squirrel. After your >consistent and annoying harassment of my co-workers and myself during the >commission of our duties, I can only surmise that you are one of the >few true genetic wastes of our time. Asking me, a network administrator, >to explain every little nuance of everything I do each time you happen to >stroll into my office is not only a waste of time, but also a waste of >precious oxygen. I was hired because I know how to network computer >systems, and you were apparently hired to provide amusement to myself and >other employees, who watch you vainly attempt to understand the concept of >"cut and paste" for the hundredth time. > >You will never understand computers. Something as incredibly simple as >binary still gives you too many options. You will also never understand >why people hate you, but I am going to try and explain it to you, even >though I am sure this will be just as effective as telling you what an IP >is. >Your shiny new iMac has more personality than you ever will. You walk >around the building all day, shiftlessly looking for fault in others. You >have a sharp dressed useless look about you that may have worked for your >interview, but now that you actually have responsibility, you pawn it off >on overworked staff, hoping their talent will cover for your glaring >ineptitude. >In a world of managerial evolution, you are the blue-green algae that >everyone else eats and laughs at. Managers like you are a sad proof of the >Dilbert principle. > >Seeing as this situation is unlikely to change without you getting a full >frontal lobotomy reversal, I am forced to tender my resignation; however I >have a few parting thoughts. > >1. When someone calls you in reference to employment, it is illegal to >give me a bad recommendation. The most you can say to hurt me is "I prefer >not to comment." I will have friends randomly call you over the next >couple of years to keep you honest, because I know you would be unable to >do it on your own. > >2. I have all the passwords to every account on the system, and I know >every password you have used for the last five years. If you decide to get >cute, I am going to publish your "favourites list", which I conveniently >saved when you made me "back up" your useless files. I do believe that >terms like "Lolita" are not usually viewed favourably by the >administration. > >3. When you borrowed the digital camera to "take pictures of your mothers >b-day", you neglected to mention that you were going to take pictures of >yourself in the mirror nude. Then you forgot to erase them like the >techno-moron you really are. Suffice it to say I have never seen such odd >acts with a ketchup bottle, but I assure you that those have been copied >and >kept in safe places pending the authoring of a glowing letter of >recommendation. (Try to use a spell check please. I hate having to correct >your mistakes.) > > >Thank you for your time, and I expect the letter of recommendation on my >desk by 8:00 am tomorrow. One word of this to anybody, and all of your >little twisted repugnant obsessions will be open to the public. >Never f*** with your systems administrator. Why? Because they know what >you do with all that free time! > >Sincerely > >_ 7644 From: kirk Date: Mon Aug 11, 2003 3:27am Subject: He vs. She, Hilarious THE COLLEGE THEME PAPER : HE VS. SHE Remember the book "Men are from Mars,Women are from Venus"? Well, here's a prime example offered by an English professor at an American University. __________________________________ "Today we will experiment with a new form called the tandem story. The process is simple. Each person will pair off with the person sitting to his or her immediate right. One of you will then write the first paragraph of a short story. The partner will read the first paragraph and then add another paragraph to the story. The first person will then add a third paragraph, and so on back and forth. Remember to reread what has been written each time in order to keep the story coherent. There is to be absolutely NO talking and anything you wish to say must be written on the paper. The story is over when both agree a conclusion has been reached." The following was actually turned in by two of my English students: Rebecca-last name deleted, and Gary - last name deleted. ---------------------------------- STORY: (first paragraph by Rebecca) At first, Laurie couldn't decide which kind of tea she wanted. The camomile, which used to be her favourite for lazy evenings at home, now reminded her too much of Carl, who once said, in happier times, that he liked camomile But she felt she must now, at all costs, keep her mind off Carl. His possessiveness was suffocating, and if she thought about him too much her asthma started acting up again. So camomile was out of the question. ---------------------------------- (second paragraph by Gary) Meanwhile, Advance Sergeant Carl Harris, leader of the attack squadron now in orbit over Skylon 4, had more important things to think about than the neuroses of an air-headed asthmatic bimbo named Laurie with whom he had spent one sweaty night over a year ago. "A.S. Harris to eostation 17," he said into his transgalactic communicator. "Polar orbit established. No sign of resistance so far..." But before he could sign off, a bluish particle beam flashed out of nowhere and blasted a hole through his ship's cargo bay. The jolt from the direct hit sent him flying out of his seat and across the cockpit. ---------------------------------- (Rebecca) He bumped his head and died almost immediately but not before he felt one last pang of regret for psychically brutalising the one woman who had ever had feelings for him. Soon afterwards, Earth stopped its pointless hostilities towards the peaceful farmers of Skylon 4. "Congress Passes Law Permanently Abolishing War and Space Travel," Laurie read in her newspaper one morning. The news simultaneously excited her and bored her. She stared out the window, dreaming of her youth, when the days had passed unhurriedly and carefree, with no newspapers to read, no television to distract her from her sense of innocent wonder at all the beautiful things around her. "Why must one lose one's innocence to become a woman?" she pondered wistfully. ---------------------------------- (Gary) Little did she know, but she had less than 10 seconds to live. Thousands of miles above the city, the Anu'udrian mothership launched the first of its lithium fusion missiles. The dim-witted wimpy peaceniks who pushed the Unilateral Aerospace Disarmament Treaty through the congress had left Earth a defenceless target for the hostile alien empires who were determined to destroy the human race. Within two hours after the passage of the treaty the Anu'udrian ships were on course for Earth, carrying enough firepower to pulverise the entire planet. With no one to stop them, they swiftly initiated their diabolical plan. The lithium fusion missile entered the atmosphere unimpeded. The President, in his top-secret Mobile submarine headquarters on the ocean floor off the coast of Guam, felt the inconceivably massive explosion, which vaporised poor, stupid, Laurie and 85 million other Americans. The President slammed his fist on the conference table. "We can't allow this! I'm going to veto that treaty! Let's blow 'em out of the sky!" ---------------------------------- (Rebecca) This is absurd. I refuse to continue this mockery of Literature. My writing partner is a violent, chauvinistic semiliterate adolescent. ---------------------------------- (Gary) Yeah? Well, you're a self-centred tedious neurotic ning nong whose attempts at writing are the literary equivalent of Valium. "Oh shall I have camomile tea? Or shall I have some other sort of F**KING TEA??? Oh no, I'm such an air headed bimbo who reads too many Danielle Steele novels." ---------------------------------- (Rebecca) A***hole. ---------------------------------- (Gary) B**ch. ---------------------------------- (Rebecca) W**ker. ---------------------------------- (Gary) sl*t. ---------------------------------- (Rebecca) Get f**ked. ---------------------------------- (Gary) Eat sh*t. ---------------------------------- (Rebecca) F**K YOU - YOU NEANDERTHAL!!! ---------------------------------- (Gary) Go drink some tea - whore. ************************** (Teacher) A+ - I really liked this one. 7645 From: Steve Uhrig Date: Tue Aug 12, 2003 11:23am Subject: New Zealand Do we have anyone in New Zealand? If so, please contact me off list regarding a personnel matter. Tks .. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7646 From: Ocean Group Date: Tue Aug 12, 2003 5:57pm Subject: Books... Hey there I'm trying to locate copies of Ted Swifts and Taylor/Udovich telephone checking books at a reasonable price.... Can anyone help me out? Give me directions! ;) Cheers folks Ocean Group, Technical Security Division, Ireland, Europe. --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.502 / Virus Database: 300 - Release Date: 18/07/2003 7647 From: Steve Uhrig Date: Tue Aug 12, 2003 9:11pm Subject: Re: Books... On 12 Aug 2003 at 23:57, Ocean Group wrote: > I'm trying to locate copies of Ted Swifts and Taylor/Udovich telephone > checking books at a reasonable price.... Both highly recommended. Ask them to autograph them for you. ====== Ted: http://www.angelfire.com/biz/investigator/index.html ===== Rick Udovich: http://www.bugsweep.com/index.html Ask and it shall be given unto you. (I know where to find info on all forms of modulation but it's not here ... Try PWF) !! Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7648 From: kirk Date: Tue Aug 12, 2003 10:12pm Subject: TSCM work Found this ad for TSCM people wanted in the Southern California area, if anyone on the list is interested. Reply to: tscminc@h... Date: 2003-07-26, 5:49AM Need several RF engineers or electronic technicians to supplement our staff on countermeasures teams. Need solid knowledge of RF technology and must be very comfortable with spectrum analyzers (VLF to 325 gHz), TDRs, network analyzers, scopes and RF receivers. Extensive knowledge of telephone systems or computer systems and networking would be a plus. Hourly rate commensurate with knowledge. Possibility to evolve to full time. Email with qualifications and availability. We are currently looking for qualified technical candidates to supplement our staff on larger projects on a contract basis. There are two catagories available. Technician: Persons knowlegable in electronics to work as assistants but may not have any previous TSCM experience. Pay scale is $22 per hour. TSCM Technicians/Engineeers: Persons with verifiable experience in TSCM and related engineering training or degrees to supplement our primary staff when required. Pay scale will be commesurate with experience and knowledge. Minimum Requirements: (both categories) - Must have US cititzenship (not work permits or residency) - Must have clean record (all candidates will have to pass a financial and background check) - Must have a current valid drivers license - Must be bondable - Must be able to obtain a Federal Security clearance (at your expense) - Should have a clean driving record but certain allowances may be made If you meet the minimum requirements and have further interest in either category you may reply in detail with your formal resume showing all of your pertinent experience and capability related to TSCM and electronics. Thank you. This is a part-time job. Principals only. Recruiters, please don't contact this job poster. Please, no phone calls about this job! Please do not contact job poster about other services, products or commercial interests. Reposting this message elsewhere is OK. this is in or around SoCal 7649 From: Date: Wed Aug 13, 2003 1:55pm Subject: Confessions of a Baggage Screener - They're also sweepers Issue 11.09 - September 2003 Confessions of a Baggage Screener I used the CTX 5500 to keep bombs off your plane. I also go elbows deep in your underwear. By Beth Pinsker The suitcase was ticking. It was my third week on the job as one of 55,000 new airport screeners employed by the Transportation Security Administration, and the first day of the war in Iraq. The nationwide terror alert was at orange, and a pair of National Guardsmen patrolled the sprawling departure lobby of the US Airways terminal at LaGuardia, rifles at the ready, gas masks strapped to their thighs. All this made the egg-timer click coming from the bag, a black rolling cart with a pull-up handle, a matter of some urgency. Michele Asselin I had picked up the suitcase after it was singled out by one of the cream-colored, SUV-sized machines that x-ray checked luggage. I put it on a metal examination table, as I had been trained to do, and swabbed the surface with a cloth-tipped wand. It tested negative in the explosive trace detector. I unzipped the bag gingerly and faced a jumble of women's clothes, mostly polyester and flowered, then stuck in a latex-gloved hand to feel for solid objects. Almost immediately I discovered an item dense enough to have been flagged as a possible explosive - it was hair cream. But no clock, no bomb, and no explanation for the ticking. The sound stopped when I lifted up the bag, then started again when I set it down. Behind the frosted-glass partitions near the check-in counter, $5 million worth of bomb detection technology buzzed around me. None of it could help. Once the machine identified out a suitcase as suspicious, it was my job to search it by hand. The only way to determine the source of the ticking came down to a $13.21-an-hour worker: I'd need to follow my trainer's instructions and go EDU - elbows deep in underwear. So far I had seen the machines flag plenty of deodorant sticks, toothpaste tubes, and shoe heels, which showed up on the screen outlined in red. I had handled sex toys, machetes, and pistols (legal in checked bags). But the closest thing I had seen to a bomb were manufactured images on the screen created by the Threat Image Projection System, a software package developed by the government to make sure we were paying attention. Every once in a while, I learned, police let drug dogs find contraband so they don't grow discouraged. I didn't much care for the implied comparison. The ticking was real enough, though, and I couldn't let the suitcase through until I'd figured out the origin of the sound. A US Airways supervisor was hovering nearby, and jittery fliers were peeking at us through the breaks in the partitions. I took everything out, stacking clothes on the table. I felt around the lining. I turned the suitcase over once more, noted that the ticking stopped, and saw a bulge in a tiny pocket tucked between the rods for the extendable handle. It was an electric toothbrush that turned on when it pressed against the table but was packed too tight to vibrate. Picking through other people's skivvies was my very small part in a very big government initiative. "You're looking for a needle in a haystack," says Larry Johnson, a former deputy director in the State Department's Office of Counterterrorism in the early 1990s. Except you're doing it through a barn wall, without knowing which day the needle will arrive or what it might look like when it does. More than 4 million checked bags pass through the nation's 429 commercial airports on any given day, and since the beginning of the year, the Transportation Security Administration has been charged with examining all of them, on the slim chance that one contains a bomb. The ultimate ideal would mean trained workers going through every piece of luggage by hand. Since that's obviously impractical, the TSA depends on technology - the same basic technology that screens passengers and carry-on bags. The first stop for checked bags is what's called a CTX machine, which uses conventional X-ray technology as well as a CT scanner that slices beams through a piece of luggage to determine the density and volume of the contents. (The machines are made by two certified manufacturers, but the CTX 5500, built by InVision, predominates to such an extent that the brand name has become shorthand for the device.) "If you run a bomb through it, it will find it nearly 100 percent of the time," says Doug Laird, a former security chief of Northwest Airlines. The problem is that the CTX flags a whole lot of other things with the same volume and density as some explosives. These include peanut butter, toothpaste, chocolate, golf balls, shoe heels, Blow Pops, and, believe it or not, live crabs. The device also alerts screeners to any item it can't see through: laptop computers, camera equipment, cell phones, oxygen tanks, golf club heads, and physics textbooks. How flawed is the CTX? It stops 18 to 35 percent of all bags, depending on who's giving the numbers. False positives waste a lot of money; the machines cost millions, and more hand-searches mean more wage-earning workers, raising the total cost of airport security to $5 to $7 per passenger. More important, false positives undermine the efficacy of hand searches. A few alarms a day and screeners investigate every one thoroughly. A few dozen and they become inured to the routine. The current system discourages screeners from thinking for themselves, says Issac Yeffet, a former security chief of El Al who's now a consultant based in Manhattan. "Let's say I'm a screener, and I open the luggage to do a search and find chocolate or peanut butter - I'm happy because I found what the machine flagged." Although the CTX highlights suspect items, screeners don't run bags back through the machine after the hand search to make sure they've correctly identified what really caused the alarm. No one's taught to think in terms of how a would-be terrorist might try to game the system. "I can assure you, from my experience and knowledge," says Yeffet, "that most of the explosives will be in a false bottom." Yeffet's point is that screeners should be trained not as machine operators but as security personnel. If he's right, the TSA has a long way to go. Even the basic training we received was slapdash. Congress mandates that screeners spend 40 hours in the classroom, but my class spent about half that time. (We got paid for the entire 40.) For four days, we met in a hotel on the perimeter of the airport, where the instructor taught us the rudiments of what constitutes a bomb. He spent the rest of the time asking us about our experiences as New Yorkers since September 11. I touched the machines only once, on a field trip to the airport where we walked into a filthy side room in an airline terminal to find a screener slumped over asleep at a CTX unit. There was a Starbucks cup on top of one of the other devices and a pizza box on a third. I worked a regular shift for five weeks without getting any of my mandated 60 hours of on-the-job training. The system would be better if more screeners were like one of the guys on my shift, a former military man with a buzz cut and a crease in his pants that could slice bread. A few days after I started, he asked some of us why we were there. An older man who had been in book publishing said that he had to come out of retirement because his 401(k) tanked. One of the younger guys had been a prison guard and thought this would be less demanding; another was finishing a computer science degree and needed a part-time job in his Queens neighborhood. The military man listened to the rest of us and declared, "I wanted to serve my country." When he opened a bag, he purposefully examined each item. He turned tubes of toothpaste over in his hand, shook golf balls, and unfolded clothes. Most of my colleagues weren't so careful. One screener, a holdover from the private company that ran LaGuardia security before the TSA took over, would sometimes take bags that were supposed to be searched by hand and just leave them on the examination table until another worker, who assumed they had already been cleared, sent them to the plane. One day I was at the controls of the CTX, which ejects bags like a toaster, bouncing them against a hard backstop. Safety regulations required moving the luggage before making even a cursory check. My fellow screener, however, started searching a suitcase where it landed and was hit square in the head by the next bag. That was our interim supervisor. Some at the Transportation Security Administration are dissatisfied with the CTX. Because the machine is expensive, slow, and has a fairly high rate of false positives, Lyle Malotky, a top scientific and technical adviser at the TSA, acknowledges that the agency is looking for a better system. Devices that might be deployed are first brought for testing to the TSA's labs, a cluster of connected buildings at the Atlantic City airport. Behind the agency's hangar, there's a storage bunker full of explosives. The parking lot is littered with the dented shells of cargo containers technicians have blown up. The government funded the CTX machines in the early '90s but, due to the expense, didn't install many in airports. Two months after September 11, Congress ordered nearly 1,000 units as a stop-gap measure. Now Malotky would like to find a more sensitive machine that would support the CTX and make the screening process more efficient. Bags would still go through the CTX first, but anything flagged as suspicious would then be routed to a more sensitive machine that would further winnow down the amount of luggage that needs to be checked by human hands. The idea is that TSA employees could concentrate on searching a smaller number of bags more accurately. The only way to see what's in a bag or on a person is to bombard the subject with energy - like X rays, neutrons, or radio waves - measure the reaction, and use it to display an image on a screen. The conventional X ray, which came into widespread use during World War I and has been a part of airport security since the '70s, creates a simple two-dimensional image. The CT scan, a computerized cross-sectional X ray, can map a 3-D image in color. As of now, none of the technologies being used can detect every type of substance, so a machine that can spot explosive chemicals might not find metals or radiological materials. One of the highlights of my tour of the TSA labs is a backscatter X-ray machine, which produces a high-contrast image by bouncing beams against an object and measuring how many return. It can be used to screen luggage, but this model is configured for people. When lab codirector Susan Hallowell asks for volunteers to test the unit, she also offers a warning: "It not only makes you look naked, but fat, too." Grimacing, she steps up to demonstrate. As Hallowell stands against the unit, her body appears as a doughy white blob on the monitor, free of clothes. Also visible are the gun stashed in her belt and a plastic baggie of explosives tucked into her pocket. It's a remarkable piece of machinery, but there are reasons it's in the lab and not the airport: It's big, slow, and basically shows what someone looks like unclothed. (Thankfully, it leaves fine anatomical details to the imagination.) Already there's a locker-room atmosphere among the screeners, mostly male and bored. Have them stare at practically nude people all day and you're asking for trouble. Still, TSA chief technology officer Randal Null is enthusiastic about backscatter. "We may not put it in every lane," he says. "But we'll use this technology once we deal with the privacy, cost, and size issues." Another promising technology is X-ray diffraction, which InVision, the company that makes the CTX machines, invested in last year by buying a German firm that makes a diffraction unit called the Yxlon 3000. The device can check only 60 bags an hour - the CTX 5500 can handle about six times that - but it could help reduce false positives. "We believe that the magic bullet is the combination of CT and diffraction," says InVision CEO Sergio Magistri. By having a diffraction machine check what the CTX flags, "you can do 500 bags an hour." In case diffraction doesn't become the new standard, InVision also owns Quantum Magnetics, a San Diego company that's applying MRI techniques to security by using a process called nuclear quadrupole resonance. It involves shooting low-frequency radio waves into an object to stimulate the nuclei of the atoms in it. The electrical response of each substance is unique, so in theory, the units would pinpoint an explosive without false alarms. In Atlantic City, the tour is ending and Null takes me to the bag room. Here, the TSA tests new technologies on actual luggage - about 10,000 bags collected from airline lost-and-founds around the country. "If you lost a bag in the past 10 years it probably ended up here," he jokes. When the scientists look at a new system, Null explains, they build a bomb and place it in a piece of luggage selected at random. Then they run that bag and a bunch of others through the unit they're testing to see if it finds the bomb. What constitutes success? Null's looking for a machine that identifies every bomb while keeping false positives to a tolerable level. That's a formula sure to please passengers - not to mention my former colleagues on the front lines. Beth Pinsker (baggage@n...) is a freelance writer living in New York City. [Non-text portions of this message have been removed] 7650 From: James M. Atkinson Date: Wed Aug 13, 2003 11:10pm Subject: Profound Musings 1. I signed up for an exercise class and was told to wear loose-fitting clothing. If I HAD any loose-fitting clothing, I wouldn't have signed up in the first place! 2. When I was young we used to go "skinny dipping", now I just "chunky dunk". 3. The early bird still has to eat worms. 4. The worst thing about accidents in the kitchen is eating them. 5. Don't argue with an idiot; people watching may not be able to tell the difference. 6. Wouldn't it be nice if whenever we messed up our life we could simply press 'Ctrl-Alt-Delete' and start all over? 7. Stress is when you wake up screaming and then you realize you haven't fallen asleep yet. 8. My husband always said I never listened to him. At least I think that's what he said. 9. Just remember...if the world didn't suck, we'd all fall off. 10. Why is it that our children can't read a Bible in school, but they can in prison? 11. If raising children was going to be easy, it never would have started with something called labor! (Ouch!!!!) 12. Brain cells come and brain cells go, but fat cells live forever. 13. It will be a great day when our schools have all the money they need and the Air Force has to hold a bake sale to buy a new bomber. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "We have suffered a great loss. And in our grief and anger, we have found our mission and our moment...We will not waver, we will not tire, we will not falter and we will not fail!... George W. Bush 9/11/2001 -------------------------------------------------------------------------------------------------- 7651 From: James M. Atkinson Date: Wed Aug 13, 2003 11:11pm Subject: THEN GOD CREATED LOUISIANA THEN GOD CREATED LOUISIANA Once upon a time, God was missing for six days. Michael the archangel found him, resting on the seventh day. He inquired of God. "Where have you been?" God sighed a deep sigh of satisfaction, and proudly pointed downwards through the clouds, "Look what I've made." Archangel Michael looked puzzled, and said, "What is it?" "It's a planet," replied God, "and I've put Life on it. I'm going to call it Earth and it's going to be a great place of balance." "Balance?" Inquired Michael, still confused. God explained, pointing to different parts of earth . . . "For example, northern Europe will be a place of great opportunity and wealth, while southern Europe is going to be poor - Over there I've placed a continent of white people, and over there is a continent of black people," God continued ... "This one will be extremely hot, while this one will be very cold and covered in ice." The Archangel, impressed by God's work, then pointed to a land mass and said, "What's that one?" "Ah," said God.. "That's Louisiana, the most glorious place on earth. There are beautiful bayous, woods, and forests ... The people from Louisiana are attractive, modest, intelligent and humorous, and they are going to be found traveling the world. They will be extremely sociable, hardworking, and high-achieving, and they will be known throughout the world as diplomats, and carriers of peace...." Michael gasped in wonder and admiration, but then proclaimed,"What about balance, God? You said there would be balance!" God smiled......"Wait until you see the idiots I put in Baton Rouge" -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "We have suffered a great loss. And in our grief and anger, we have found our mission and our moment...We will not waver, we will not tire, we will not falter and we will not fail!... George W. Bush 9/11/2001 -------------------------------------------------------------------------------------------------- 7652 From: James M. Atkinson Date: Wed Aug 13, 2003 11:12pm Subject: Increasing Muscles Pass this along to your friends. For those getting along in years, here is a little secret for building arm and shoulder muscles. Three days a week works well. Begin by standing outside behind the house, and with a 5-lb. potato sack in each hand... extend your arms straight out to your sides and hold them there as long as you can. After a few weeks, move up to 10-lb. potato sacks and then 50-lb. potato sacks, and finally get to where you can lift a 100 lb. potato sack in each hand and hold your arms straight for more than a full minute. Next...start putting a few potatoes in the sacks, but be careful not to overdo it. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "We have suffered a great loss. And in our grief and anger, we have found our mission and our moment...We will not waver, we will not tire, we will not falter and we will not fail!... George W. Bush 9/11/2001 -------------------------------------------------------------------------------------------------- From: Doc Strait Date: Wed Aug 4, 2004 8:39am Subject: Re: Re: STATE LICENSE REGULATIONS ACROSS THE U.S. This is how I started. I spent several years with Marine Recon as a Hospital Corpsman. I learned from the MI community some of the basics just by watching and helping. After medical retirement from the military, I went to college (compliments of Uncle Sam) and received a A.A.S. in Electronic Engineering Technology. Next I spent five years working in the office equipment business as a field service technician. I worked on all electronic office equipment such as copiers, fax machines, computers, digital duplicators, folders, shredders, etc.. I attended the manufacture training courses to get certification to work on their equipment. Finally I am beginning to take TSCM classes from REI. Now all I need to do is find a good quality company that is looking for an electroninc technician with TSCM training so that I can build up the experience. syndracit wrote:Good advice but What I realy ment Is 30k upfront in education. But I should of made my self more clear. I'm still trieng to figure out the best way to merge in this field my self fully. I gues maybe 2 years electronic engineering and 2 years of compsci would be a good start. To bad they don't have a tscm tech school. --- In TSCM-L@yahoogroups.com, "moellerthy" <1ach@g...> wrote: > --- In TSCM-L@yahoogroups.com, "syndracit" wrote: > > == In Response > == I do not think that spending 30k in equipment is going to help > you reach you end result. > > You must have some money to get started for example Busines > license, Business name, Federal tax id , College courses and > trade school etc. > > Your equipment purchased will be based on your present knowledge > of what you think the threat most likely would be. > > You need to know generally what a bug needs and its weakness. > > 98% of bugs sold all share simularities so that's why you > don't need 30k to get started to find a bug. > > The other 2% has a weakness to but the maker of the bug is > thinking modulation type and giving up stealth in doing so. > > I have been on the side line for years buying equipment while > attending school. I have seen licensed PI'S in the field > looking for bugs but really they did not have a plan and it > was not professional what they did. > > I have not uncovered my equipment and did not advice anyone on > how do find the bug. My equipment is for my company and will > stay that way unless I am contracted then I will earn my pay > and the client will be impressed with how and why I did what I > had to do. > > Go to every event possible hosted by HP, TEK, FBI, you will > understand better that way. > > Sit back and listen to the people that have evidence that they > found a bug and don't get caught up in hype O that person > planted the bug. > > When the Sweeper gets to the location he should have already > found the bug operating before he could unload all his > equipment. > == End > ANDRE HOLMES > 1ach@G... > NEPTUNE ENTERPRISE SECURITY > > > > Then how does one enter this field with out having to shell out > 30k in > > cash upfront for training. And what would be the best way some one > > could enter this field then? > > --- In TSCM-L@yahoogroups.com, "moellerthy" <1ach@g...> wrote: > > > I have recently contacted a couple of States reguarding there > > > requirements for licensing Technical Surveillance Counter > measures. > > > > > > I have found that the States are flexable in willing to work to > > > accept a new license applicant which means granting of the > license > > > without the requirement of 4000 hrs under someone else's belt. > > > > > > I have gone to College did my time and earned the A's it would > be a > > > slap in the face for a State board to say sorry you have to work > > > under someone that has never went to college and who does not > have > > > the expertise to testify scientifically about an anomaly. > > > > > > I bring to the Board, the Court , the contracted person who > hired me > > > the best of my ability backed up by my Education, credit > > > ability ,and years of research, planning ,testing of a large > volume > > > test instruments that the adversary could not even imagine exist. > > > > > > I look forward to posting to the list here my evidence of my > finds > > > and progress on the subject. > > > > > > Andre Holmes > > > 1ach@G... > > > NEPTUNE ENTERPRISE SECURITY ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service --------------------------------- Do you Yahoo!? New and Improved Yahoo! Mail - 100MB free storage! [Non-text portions of this message have been removed] 9290 From: James M. Atkinson Date: Wed Aug 4, 2004 5:19pm Subject: [OT] Discontinuing of Blog http://www.theonion.com/news/index.php?issue=4031 CIA Asks Bush To Discontinue Blog WASHINGTON, DC≠In the interest of national security, President Bush has been asked to stop posting entries on his three-month-old personal web log, acting CIA director John E. McLaughlin said Monday. http://www.theonion.com/images/395/article2909.jpg Above: Bush adds an entry to his blog. According to McLaughlin, several recent entries on PrezGeorgeW. typepad.com have compromised military operations, while other posts may have seriously undercut the PR efforts of White House press secretary Scott McClellan. A July 24 posting read, "Just got back from a lunch with Colin and Adil Moussa (one of Prince Saud al-Faisal's guys). Colin wants the Saudis to send some troops to Najaf≠so some of the soldiers are Arab, I guess. This Moussa guy sure wears a lot of jewelry. A golden chain, a golden ring with his initials or something, and some other sparkling stuff≠kinda effeminate. Anyway, best of luck in Iraq, Iyad." McLaughlin, normally hesitant to express public disapproval of the president, said the blog was "ill-advised." "I would hate for the president to inadvertently put American soldiers at risk," McLaughlin said. "We work hard to maintain the integrity of state secrets. When we see the president posting details of troop movements, international counter-terrorism negotiations, and even the nuclear launch codes, as he did on Monday, we have to step up and say something." Bush said he could not understand McLaughlin's anger, characterizing his blog as a "personal thing written for friends and family or whoever" and therefore "none of the CIA's business." Nevertheless, U.S. Secret Service director W. Ralph Basham objected to the blog, as well. "He is compromising his safety and the safety of those in my department," Basham said, citing a post from last Thursday in which Bush revealed that he "had to go to some secret meeting with Norquist at some Marriot [sic] over in Virginia." "Someone could uncover some serious state secrets, if they took the time to wade through all of those photos he posted after he got that digital camera in June." Click here to view a larger or full version of this image. Above: The controversial Bush blog. On Saturday, Basham asked to pre-screen all blog activity before Bush posts it online. Bush rejected Basham's request and later that day wrote in his blog that "Some people who shall remain nameless apparently do not know there is such a thing as free speech in this country." Members of Bush's re-election team have urged the president to exercise caution with his blog, perhaps because of posts like the one dated July 8, 2004: "Another long day of speeches and fundraisers. Met with all these phony media company execs. Had to promise them some bill next term and shake a lot of stupid hands, but they did bring in two or three million or so. Whatever. Karl keeps a list. I got big laughs during my speech, so I'm happy." Republican National Committee chairman Ed Gillespie said he spoke to Bush about the blog last month. "After he mentioned our Monday message-of-the-day in a Saturday post, we've really been pushing him to not talk about campaign strategy," Gillespie said. "He's not that involved in the planning anyway, so it shouldn't be too much to ask." "We're not trying to stifle the president's creativity," Gillespie added. "We think it's great he's taking an interest in writing." http://www.theonion.com/images/395/article2910.jpg Bush maintained that he's doing nothing wrong. "I know so many people, but I'm way too busy to keep in touch with all of them," Bush said. "Whether I'm talking about our strategies in Gitmo or my dogs down in Crawford, the blog is an easy way to let everyone know what's been up with me. If I've just had a really good lunch at a new restaurant, or something funny happens in a briefing from the NSA, I want to let my friends and family know about it." McLaughlin said it's likely that Bush will eventually agree to submit his blog for review by the Secret Service. "Right now, the president insists it's his right to have it, as long as he doesn't work on it during White House work hours," McLaughlin said. "But I believe we'll be able to convince him, if we let him calm down. And even if we don't, frankly, I can't see the blog holding his interest for too long." --------- Hopefully, by now you have figured out for yourself that the above is off-topic Parody. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9291 From: syndracit Date: Wed Aug 4, 2004 4:27pm Subject: Re: STATE LICENSE REGULATIONS ACROSS THE U.S. Nice............ I'm shure that marine background should pull some strings or favour your resume. --- In TSCM-L@yahoogroups.com, Doc Strait wrote: > This is how I started. I spent several years with Marine Recon as a Hospital Corpsman. I learned from the MI community some of the basics just by watching and helping. After medical retirement from the military, I went to college (compliments of Uncle Sam) and received a A.A.S. in Electronic Engineering Technology. Next I spent five years working in the office equipment business as a field service technician. I worked on all electronic office equipment such as copiers, fax machines, computers, digital duplicators, folders, shredders, etc.. I attended the manufacture training courses to get certification to work on their equipment. Finally I am beginning to take TSCM classes from REI. Now all I need to do is find a good quality company that is looking for an electroninc technician with TSCM training so that I can build up the experience. > > syndracit wrote:Good advice but What I realy ment Is 30k upfront in education. But I > should of made my self more clear. I'm still trieng to figure out the > best way to merge in this field my self fully. > I gues maybe 2 years electronic engineering and 2 years of compsci > would be a good start. To bad they don't have a tscm tech school. > > > --- In TSCM-L@yahoogroups.com, "moellerthy" <1ach@g...> wrote: > > --- In TSCM-L@yahoogroups.com, "syndracit" wrote: > > > > == In Response > > == I do not think that spending 30k in equipment is going to help > > you reach you end result. > > > > You must have some money to get started for example Busines > > license, Business name, Federal tax id , College courses and > > trade school etc. > > > > Your equipment purchased will be based on your present knowledge > > of what you think the threat most likely would be. > > > > You need to know generally what a bug needs and its weakness. > > > > 98% of bugs sold all share simularities so that's why you > > don't need 30k to get started to find a bug. > > > > The other 2% has a weakness to but the maker of the bug is > > thinking modulation type and giving up stealth in doing so. > > > > I have been on the side line for years buying equipment while > > attending school. I have seen licensed PI'S in the field > > looking for bugs but really they did not have a plan and it > > was not professional what they did. > > > > I have not uncovered my equipment and did not advice anyone on > > how do find the bug. My equipment is for my company and will > > stay that way unless I am contracted then I will earn my pay > > and the client will be impressed with how and why I did what I > > had to do. > > > > Go to every event possible hosted by HP, TEK, FBI, you will > > understand better that way. > > > > Sit back and listen to the people that have evidence that they > > found a bug and don't get caught up in hype O that person > > planted the bug. > > > > When the Sweeper gets to the location he should have already > > found the bug operating before he could unload all his > > equipment. > > == End > > ANDRE HOLMES > > 1ach@G... > > NEPTUNE ENTERPRISE SECURITY > > > > > > > Then how does one enter this field with out having to shell out > > 30k in > > > cash upfront for training. And what would be the best way some one > > > could enter this field then? > > > --- In TSCM-L@yahoogroups.com, "moellerthy" <1ach@g...> wrote: > > > > I have recently contacted a couple of States reguarding there > > > > requirements for licensing Technical Surveillance Counter > > measures. > > > > > > > > I have found that the States are flexable in willing to work to > > > > accept a new license applicant which means granting of the > > license > > > > without the requirement of 4000 hrs under someone else's belt. > > > > > > > > I have gone to College did my time and earned the A's it would > > be a > > > > slap in the face for a State board to say sorry you have to work > > > > under someone that has never went to college and who does not > > have > > > > the expertise to testify scientifically about an anomaly. > > > > > > > > I bring to the Board, the Court , the contracted person who > > hired me > > > > the best of my ability backed up by my Education, credit > > > > ability ,and years of research, planning ,testing of a large > > volume > > > > test instruments that the adversary could not even imagine exist. > > > > > > > > I look forward to posting to the list here my evidence of my > > finds > > > > and progress on the subject. > > > > > > > > Andre Holmes > > > > 1ach@G... > > > > NEPTUNE ENTERPRISE SECURITY > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > Yahoo! Groups SponsorADVERTISEMENT > > > --------------------------------- > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service > > > > --------------------------------- > Do you Yahoo!? > New and Improved Yahoo! Mail - 100MB free storage! > > [Non-text portions of this message have been removed] 9292 From: Date: Thu Aug 5, 2004 7:34pm Subject: VoIP May Go Under Wiretap Laws VoIP May Go Under Wiretap Laws FCC's preliminary order finds new technology subject to same police access as traditional telecomm. Grant Gross, IDG News Service Thursday, August 05, 2004 WASHINGTON -- The Federal Communications Commission is taking its first steps toward requiring voice over Internet Protocol (VoIP) providers to comply with law enforcement wiretapping requests. Whether VoIP must give the same access to law enforcement as traditional telecomm services do has been unclear, and is one of the stumbling blocks to allowing VoIP to remain unregulated. Security agencies have especially expressed concern that VoIP could be a way for terrorists to communicate undetected. The FCC voted Wednesday to begin examining the policies needed to bring VoIP providers under the 1994 Communications Assistance for Law Enforcement Act (CALEA), which allows U.S. law enforcement agencies to listen in on telephone conversations. The commission's decision includes a tentative finding that communications services offered over broadband pipes, including VoIP, are subject to CALEA requirements to comply with law enforcement wiretap requests. Selective Enforcement The tentative rules also cover managed communications services offered over broadband connections, including managed instant message or video services, says Ed Thomas, chief of the FCC Office of Engineering and Technology. Non-managed peer-to-peer services, including consumer-grade instant messaging services and noncommercial VoIP services, are probably not subject to CALEA regulations under the proposed order, FCC staffers say. All five commissioners supported the "notice of proposed rulemaking" presented to them Wednesday. In the notice, the FCC tentatively concludes that CALEA applies to facilities-based providers of any type of broadband Internet access service--including wireline, cable modem, satellite, wireless, and powerline--and to managed VoIP services. The commission says these services fall under CALEA as "a replacement for a substantial portion of the local telephone exchange service." "More and more people are taking advantage of these new and exciting competitive voice offerings, and we are starting to see substantial consumer and economic benefits emerge," said FCC Chairman Michael Powell. "The development and success of the Internet has been a result, in part, of our desire to maintain its minimally regulated status. Above all, law enforcement access to IP-enabled communications is essential." The FCC's action came at the request of three federal law enforcement agencies: the Department of Justice, FBI, and Drug Enforcement Administration. Objections Remain While Commissioner Kathleen Abernathy noted "all of us are in complete support" of law enforcement requests, some senators and privacy groups are questioning applying CALEA to VoIP. Senator John Sununu, sponsor of the VoIP Regulatory Freedom Act of 2004, is challenging application of CALEA rules to apply to VoIP services, but not most instant message, e-mail, or P-to-P services. "Do you think the terrorists are not smart enough to use e-mail?" Sununu, a New Hampshire Republican, said during a June hearing. Earlier this year, privacy rights Web site Privacilla.org argued in a position paper that CALEA is "a dramatic departure from the fundamental practice in our free society of designing products, technologies and infrastructures first and foremost with consumers' interests in mind. Altering goods and services for the benefit of government investigators inverts American values and puts the interests of government and law enforcement ahead of the overwhelmingly honest and law-abiding people that make up our civil society." More Research Urged The commission's two Democrats, Michael Copps and Jonathan Adelstein, say they support the commission's decision to examine CALEA regulations. However, both expressed concern over the legal arguments that FCC staff used to tentatively conclude VoIP is subject to CALEA. The commission shouldn't try to "slice and dice" managed and non-managed services, Copps said, questioning whether the court would agree with the FCC's definition of VoIP as a substantial replacement for local phone service. Copps urged commission staff to come up with better reasons to bring VoIP under CALEA rules. "I believe today's item asks many of the right questions, but I also believe that too often it gets the reasoning wrong," Copps said. "It is flush with tentative conclusions that stretch the statutory fabric to the point of tear. If these proposals become the rules and reasons we have to defend in court, we may find ourselves making a stand on very shaky ground." [Non-text portions of this message have been removed] 9293 From: Date: Thu Aug 5, 2004 7:34pm Subject: FCC Seeks Internet Phone Wiretap Access Posted on Wed, Aug. 04, 2004 FCC Seeks Internet Phone Wiretap Access JENNIFER C. KERR Associated Press WASHINGTON - Internet phone calls should be subject to the same type of law enforcement surveillance as cell and landline phones, federal regulators said Wednesday. The Federal Communications Commission voted for proposed rules that would require Internet service providers to ensure their equipment will allow police wiretaps. Privacy advocates complained that the proposed rules could allow law enforcement to tap communications by thousands of individuals on the Internet, not just would-be criminals. Lawyers for the Justice Department, FBI and Drug Enforcement Administration asked the FCC in March to affirm that Internet calls - or Voice Over Internet Protocol - fall under the Communications Assistance for Law Enforcement Act (CALEA). The 1994 law requires the telecommunications industry to build into its products tools that federal investigators can use - after getting court approval - to eavesdrop on conversations. "Our support for law enforcement is unwavering," FCC chairman Michael Powell said. "It is our goal in this proceeding to ensure that law enforcement agencies have all of the electronic surveillance capabilities that CALEA authorizes to combat crime and terrorism." At the same time, Powell warned against placing "onerous regulations" on what he called the vibrant new services of voice Internet calls. Voice Over Internet Protocol, also known as VoIP, converts phone calls to data packets and sends them across high-speed Internet connections. David Sobel, general counsel for the Electronic Privacy Information Center, says the potential exists for law enforcement to intercept packets of data from subscribers other than the intended police target. "If there's going to be an expansion of CALEA's coverage, it should be made by Congress, not the FCC," Sobel said. The newer VoIP technology has unique privacy considerations that only lawmakers have the authority to consider, he said. Jeff Pulver, chief executive officer of Melville, N.Y.-based Free World Dialup, an Internet-based phone service, said the FCC is sending a subtle message to Internet phone providers. "What the FCC is really saying to the community and the industry is to wake up and to start innovating. If all you are going to offer are replacement services, eventually they will be treated as legacy" and be subject to traditional regulations. Pulver says many Internet-based phone offerings are essentially substitutes for regular phones. He says his is different because it sets up a peer-to-peer network, so two people can communicate directly without going through a central telephone company like AT&T. He doubts that the ruling will affect him because he says his service is more like instant messaging than a traditional phone. The FCC will solicit comments from industry and the public as it crafts final rules. --- Associated Press writer Anick Jesdanun in New York contributed to this report. On the Net: Federal Communications Commission: http://www.fcc.gov Electronic Privacy Information Center: http://www.epic.org © 2004 AP Wire and wire service sources. All Rights Reserved. http://www.siliconvalley.com [Non-text portions of this message have been removed] 9294 From: Agent Geiger Date: Fri Aug 6, 2004 2:25am Subject: Re: FCC Seeks Internet Phone Wiretap Access They never seem to have enough power. --- NoPositiveWork@a... wrote: > > Posted on Wed, Aug. 04, 2004 > > FCC Seeks Internet Phone Wiretap Access > > JENNIFER C. KERR > Associated Press > > WASHINGTON - Internet phone calls should be subject > to the same type of law > enforcement surveillance as cell and landline > phones, federal regulators said > Wednesday. > > The Federal Communications Commission voted for > proposed rules that would > require Internet service providers to ensure their > equipment will allow police > wiretaps. > > Privacy advocates complained that the proposed rules > could allow law > enforcement to tap communications by thousands of > individuals on the Internet, not > just would-be criminals. > > Lawyers for the Justice Department, FBI and Drug > Enforcement Administration > asked the FCC in March to affirm that Internet calls > - or Voice Over Internet > Protocol - fall under the Communications Assistance > for Law Enforcement Act > (CALEA). > > The 1994 law requires the telecommunications > industry to build into its > products tools that federal investigators can use - > after getting court approval - > to eavesdrop on conversations. > > "Our support for law enforcement is unwavering," FCC > chairman Michael Powell > said. "It is our goal in this proceeding to ensure > that law enforcement > agencies have all of the electronic surveillance > capabilities that CALEA authorizes > to combat crime and terrorism." > > At the same time, Powell warned against placing > "onerous regulations" on what > he called the vibrant new services of voice Internet > calls. > > Voice Over Internet Protocol, also known as VoIP, > converts phone calls to > data packets and sends them across high-speed > Internet connections. > > David Sobel, general counsel for the Electronic > Privacy Information Center, > says the potential exists for law enforcement to > intercept packets of data from > subscribers other than the intended police target. > > "If there's going to be an expansion of CALEA's > coverage, it should be made > by Congress, not the FCC," Sobel said. The newer > VoIP technology has unique > privacy considerations that only lawmakers have the > authority to consider, he > said. > > Jeff Pulver, chief executive officer of Melville, > N.Y.-based Free World > Dialup, an Internet-based phone service, said the > FCC is sending a subtle message > to Internet phone providers. > > "What the FCC is really saying to the community and > the industry is to wake > up and to start innovating. If all you are going to > offer are replacement > services, eventually they will be treated as legacy" > and be subject to traditional > regulations. > > Pulver says many Internet-based phone offerings are > essentially substitutes > for regular phones. He says his is different because > it sets up a peer-to-peer > network, so two people can communicate directly > without going through a > central telephone company like AT&T. > > He doubts that the ruling will affect him because he > says his service is more > like instant messaging than a traditional phone. > > The FCC will solicit comments from industry and the > public as it crafts final > rules. > --- > Associated Press writer Anick Jesdanun in New York > contributed to this > report. > > On the Net: > > Federal Communications Commission: > http://www.fcc.gov > > Electronic Privacy Information Center: > http://www.epic.org > © 2004 AP Wire and wire service sources. All Rights > Reserved. > http://www.siliconvalley.com > > > > [Non-text portions of this message have been > removed] > > __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - 100MB free storage! http://promotions.yahoo.com/new_mail 9295 From: Jonathan Young Date: Fri Aug 6, 2004 7:58am Subject: Re: FCC Seeks Internet Phone Wiretap Access There is one program that will not come under the scrutiny of law enforcement. Skype, which is based in Luxomburg, uses encryption in their voice and chat program. I for one will stop using yahoo and msn because of this ruling. __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - Send 10MB messages! http://promotions.yahoo.com/new_mail 9296 From: Steve Weinert Date: Fri Aug 6, 2004 10:31am Subject: RE: FCC Seeks Internet Phone Wiretap Access Depending on Skype's encryption protocol and the location of its geobase of incorporation as security protections of its version of VoIP?! Rather doubt either provide anymore than a cosy-comfy feeling - certainly neither would seem to offer any real security. Also Skype seems to load bags of malware/adware/spyware as part of its routine. BTW Have you read Skype's usage license agreement? Do you really agree to all that it says you will do & agree to? Few implimentations of VoIP can be considered "secure" to a level the technology would seem to promise and in some cases be promoted as having. regards, Steve W > -----Original Message----- > From: Jonathan Young > Sent: Friday, August 06, 2004 7:59 AM > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] FCC Seeks Internet Phone Wiretap Access > > > There is one program that will not come under the > scrutiny of law enforcement. Skype, which is based in > Luxomburg, uses encryption in their voice and chat > program. I for one will stop using yahoo and msn > because of this ruling. 9297 From: kondrak Date: Fri Aug 6, 2004 4:11pm Subject: Re: FCC Seeks Internet Phone Wiretap Access So I hear... I use ICQ and Trillian, and have full PGP encryption capabilities. The time had defiantly come to secure your communications channels against the JBT's. I work with VOIP, and it works just fine through a VPN or tunnel. I use them all the time. 2gb processors are cheap now. If we build pipes, VPN'ed and never touch the PSTN, where big brother mandates his tentacles be inserted we dont exist to the outside world. With vpn'ed channels up to many parts of the world, we even bypass echelon. Sniff our packets, theres nothing in real time you can decode thats worth the trouble. Trunks come and go on the fly, on different ports, utilizing pre established paths or new ones. You want a full encrypted video conference to Europe, type in a few lines of code, done. This is nothing short of the police-state mandating it be able to spy on you at will. If it can be done, you know it will be done. Theres no technology available that hasn't been whored by governments, one merely need look at consumer stuff like EZ-Pass, now its being used to provide a revenue stream via speeding tickets. The law-vultures use it in cases like divorces. RFID is next. Imagine your tires embedded with RFID chips, you KNOW big brother will implant sensors to track you at toll booths, bridges and other choke points. Imagine the JBT's being able to track your every move via roadside sensors. The need for "legal" like going to a judge and proving need for a search will be eliminated by such technology, as if it ever was obeyed. They'll wrap it up in "homeland security" flags or keep it black and hide it. They'll let advertisers and database whores like the shopper cards implement them, and get YOU to pay for them like they did with the raising of the prices of food in the case of shopper cards. If you're dumb enough to NOT take protective measures against big brother, you deserve to be spied on. There will be cottage industries spring up for devices that find and destroy RFID chips. Theres a device now that forces readers into an endless loop, they will become keychain fobs, or buttons for your clothes. Any chip that's sensitive enough to act as a radio receiver can be vaporized because its got tuned circuits. Any inductive device can be overpowered and damaged as well. All that's needed is sufficient power at the right frequency. We will inevitably be called to provide such services. BTW: My PGP key is attached and is on the servers. (cant remember if this list passes attachments, jma?) At 08:58 8/6/2004, you wrote: >There is one program that will not come under the >scrutiny of law enforcement. Skype, which is based in >Luxomburg, uses encryption in their voice and chat >program. I for one will stop using yahoo and msn >because of this ruling. > > > ---------- -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 7.0.3 for non-commercial use mQGiBD1ZP6kRBADIXUHEHLWfXP0pbymVpI4sk514HxT7H4q83xHPGeUFN6/oXKMN 3v9TBDMCPIcaGfyQkYoQsqow0op4a2cNhJV7htAXVLAMRs8UMqkW40nbx7gTUImM zkrhb4rSNzXBy6//tpTReW3YWtuSmPhmuBil+tFbDZre6wWuHekpwqmalwCg//mj cfZY0xXhhWGy4iuYOOFNnfsEAMcjgq80RZnHnti32DivqDurRl73lteS4/Lq+wrS yWvWoBO56wVSboIFx2BQ3UTY0XHTjDuY2OEdv3HR2Qbv1veqU3bo6I9FViAypkLp wKyfAYXFzgFSwkKRirTTTk+H4GdxfPg6ZqIDwJNMrlir1F/TLTcLXEVGEhKiAtOK 6omCA/90qA3YcnEHTIkev0UkotbEgd1i1+F81uwvZPd40okQgmdZrFY8t9PYysEd WxGD/4WOyQ+9oiho+RpXygC+vSyDdKwzkEE50EOXRFlB2PjG83zs80g47wyDUwyV LiBA8Lq9bRKJtMcCby1284cTKkP1zWEeEiZVxhpwYi+pjzYHwLQea29uZHJhayA8 a29uZHJha0Bzb2Z0aG9tZS5uZXQ+iQBYBBARAgAYBQI9WT+pCAsDCQgHAgEKAhkB BRsDAAAAAAoJEOJZnYFX9FjTef0An3a9mmHbK8ujlkXsgAHmzxHwHbeRAJ4+QTxT Mi+9IcptcjnFWnQ7TkoEWrkCDQQ9WT+qEAgA9kJXtwh/CBdyorrWqULzBej5UxE5 T7bxbrlLOCDaAadWoxTpj0BV89AHxstDqZSt90xkhkn4DIO9ZekX1KHTUPj1WV/c dlJPPT2N286Z4VeSWc39uK50T8X8dryDxUcwYc58yWb/Ffm7/ZFexwGq01uejaCl cjrUGvC/RgBYK+X0iP1YTknbzSC0neSRBzZrM2w4DUUdD3yIsxx8Wy2O9vPJI8BD 8KVbGI2Ou1WMuF040zT9fBdXQ6MdGGzeMyEstSr/POGxKUAYEY18hKcKctaGxAMZ yAcpesqVDNmWn6vQClCbAkbTCD1mpF1Bn5x8vYlLIhkmuquiXsNV6TILOwACAgf9 HAGwp+BEJWH3LyJuwWAshUrN9Kcg55vZQussD+6syYX1FHHhdX8IuAkeWNbqflLx ae3f/Jjk96aiOerRI1UmlihjcbvVwAEYlxMG6PjOuPe854lPN7m2rK7YdZiRWV5/ hrA5RqiLtfVwqTGUPktnAMxo4bOA2t/yodOVnDxLTGoy9qrvsdrc/HOknLUgNYMx WW98sd5iQK3pMIpdD/UxLsDGF5KCZrwNTzg6AJMEiGUYzAuMjk6Su8k0PU3vfbNu NnJRXbYr4fPchWkoTgzeCkrB0L2EPwbmMdn97rL2FiGdsE3EtRsFvvgrDz4A7Ift YN41GfjuE5S1S//Ba1GxJYkATAQYEQIADAUCPVk/qgUbDAAAAAAKCRDiWZ2BV/RY 0wDgAJ9Pak7YNV6q7Cs7KDnon8Hvi1M4ngCcDU/Pti4V++70sHxXUB0vtNhWJ4E= =EJOD -----END PGP PUBLIC KEY BLOCK----- [Non-text portions of this message have been removed] 9298 From: kondrak Date: Fri Aug 6, 2004 4:28pm Subject: Police Used Laptops To Duck Calls [Mildly OT] > > >Police Used Laptops To Duck Calls >By STEPHEN THOMPSON spthompson@t... >Published: Aug 6, 2004 > > > >ST. PETERSBURG - With laptop computers becoming as familiar a >crime-fighting tool as handguns and police dogs, two dozen St. >Petersburg patrol officers found a way to crack a database to find out >what calls were about to come over the radio. > >A few officers are suspected of using the advance warning of unpleasant >assignments to make themselves unavailable. >One such officer, Phillip Peyton, used someone else's password to access >the system the night of Jan. 30, according to internal affairs documents >made public Thursday. He learned dispatchers were about to send officers >to a suicide call, the documents say. A 52-year-old woman going through >a divorce had hanged herself in a bedroom closet with pantyhose. >``For the love of God,'' Peyton messaged another officer on the laptop >in his cruiser. ``Do a X-50 right now or west end.'' > >An X-50 is a traffic stop, which typically takes much less time than >dealing with a death. ``West end'' is code for going to the bathroom - >because bathrooms at the police station historically have been in the >western half of the building. > >Officer Ann Sener, who received the message, made a traffic stop. Peyton >was on a call, so he, too, technically was unavailable, documents show. >All told, 32 St. Petersburg police employees, most of them officers, >were believed to be involved in the improper accessing of the >department's computer-aided dispatch system, the department announced >Thursday after wrapping a months-long investigation. > >That number does not include the half-dozen or so former officers who >have gone to other agencies, including the Tampa Police Department, and >declined to cooperate, internal affairs investigators say. > >Only Peyton, Sener and another officer, who now works undercover in vice >and narcotics, were suspected of using the system to avoid handling a >call, the documents say. >On Thursday, Peyton was suspended for three days. > >Sener was given a written reprimand. She acknowledged it appeared she >was shirking the suicide, but she was adamant that she was looking for a >car to stop when Peyton's message appeared on her laptop screen. > >The undercover officer, who admitted avoiding a call regarding an >unattended death, was suspended for two days. > >The two officers who handled the suicide had suspected some of their >colleagues were using the dispatch system to dodge calls, and they >complained to Sgt. Mark Degan. But Degan didn't bring the matter to >internal affairs - and for that he was suspended for five days. > >Bill Beal was the dispatcher whose password many officers used to access >the system. > >``Kane11'' was a variation on the name of his great-grandfather, Thomas >Kane, a Chicago Police Department captain who later started a security >firm. Beal told internal affairs investigators he didn't share the >password with anyone. > >But an officer said Beal gave it to him two years ago. Beal said he >didn't remember doing so. Beal received a written reprimand. >Twenty-four other employees - including 22 officers - agreed to accept >written reprimands after acknowledging they used passwords of others to >get into the system, bringing the number of those punished to 29. Three >others were cleared of wrongdoing. > >Technically, the officers admitted to trying to ``subvert'' the agency's >security measures. But in internal affairs interviews, they said they >had used the system to respond to a call before it was dispatched and >others said they used it to keep track of their fellow officers. > >In a memorandum to his department circulated Thursday, Police Chief >Chuck Harmon told his troops they eventually might have access to >computerized dispatch information after the department finishes >negotiating with a new vendor. > >The reason access was cut off some months ago was that so many officers >were using it, the system was being slowed down, Harmon said. >Reporter Stephen Thompson can be reached at (727) 823-3303. >http://www.tampatrib.com/MGBEKWZRJXD.html 9299 From: Thomas Shaddack Date: Fri Aug 6, 2004 7:32pm Subject: Re: FCC Seeks Internet Phone Wiretap Access On Fri, 6 Aug 2004, kondrak wrote: > So I hear... > I use ICQ and Trillian, and have full PGP encryption capabilities. A good encryption-friendly protocol is Jabber. The system is open-source, the protocol is XML-based and quite non-complicated. You can either use third-party servers (jabber.org, jabber.cz, many others), or you can run your own. The user ID is of the format user@server, similar (well, confusingly similar - which can be both disadvanatge and advantage, though) to email. There are server implementations for both unix (Linux, BSD...) and Windows servers and client implementations for everything including Java phones. There is a single client-server connection, opened from the side of the client, so it is firewall-friendly and the server can accept connections in SSL, if compiled with this option. (The server-server communication in jabberd v1.4 is plaintext though, SSL and opportunistic TLS is (I believe) part of the jabberd2 (it's part of the standard, though).) However, SSL is only connection-level. For message-level crypto you need a client that supports GnuPG[1]; there are some (I think at least Gabber, Miranda[2], Psi, Gaim, and Tkabber, and perhaps many more) with such support. I am not sure about the compatibility between these solutions, but what I know for virtually certain is that there is a standard for GPG support in the Jabber protocol itself[3]. If you're about to select an IM standard for intra-corporate communication, Jabber is definitely one of the top choices, if not The One. One of the main factors is the possibility of being independent (while interoperable) on the Outside World, having full control over the architecture. [1] GnuPG, or GPG, is a fully-open and free alternative to PGP, which went too commercial for the likes of many people. Fortunately, there is the OpenPGP standard to which both GPG and PGP adhere, which makes them quite well-compatible. [2] This one is multi-standard, with plug-ins for virtually everything, from Jabber to ICQ, MSN, Yahoo, and AIM, IMHO the best for an user with friends on all the networks. Windows-only, though. [3] See JEP-0027, http://www.jabber.org/jeps/jep-0027.html (or the Google cache, as the jabber.org server seems to be down at this moment: http://216.239.59.104/search?q=cache:http://www.jabber.org/jeps/jep-0027.html ) > The time > had defiantly come to secure your communications channels against the > JBT's. What's JBT, please? > I work with VOIP, and it works just fine through a VPN or tunnel. I > use them all the time. 2gb processors are cheap now. > If we build pipes, VPN'ed and never touch the PSTN, where big brother > mandates his tentacles be inserted we dont exist to the outside world. More generally, red data - plaintext - should never touch the commercial infrastructure. Red zones should be carefully guarded and separated from the rest of the system. The appearance of popular and affordable small-factor integrated motherboards - eg. the NanoITX format - make the construction of computers dedicated for a single task - eg. a secure telephone - pretty attractive. Such approach is reportedly already used by some commercial manufacturers for some consumer devices, eg. some set-top boxes and PVRs. The best approach for such device could be using embedded Linux or BSD as the OS, GnuPG for authentication, and DTLS[4] (Datagram TLS, which is de facto SSL over UDP instead of TCP) or SRTP for the VoIP stream. I don't know enough about SIP to be able to put it into this equation, but it could be worthy. [4] http://www1.ietf.org/internet-drafts/draft-rescorla-dtls-01.txt > With vpn'ed channels up to many parts of the world, we even bypass > echelon. Sniff our packets, theres nothing in real time you can decode > thats worth the trouble. Beware of traffic analysis. That's the dangerous part and gets overlooked way too often. There are countermeasures, though. If you don't go through any connection-level (HTTPS, SOCKS...) proxy, and don't have somebody Carnivoring your comm already, you have reasonable chance your ISP doesn't keep the logs of what passes their gateways. It may be practical for them to log TCP/SYN packets, which carry the information about TCP connection open requests, but they usually don't watch UDP and there's not much gain in logging the TCP/SYN traffic anyway (but it's worth to watch for, as it's rather easy to do, doesn't require much space, and doesn't cause much overhead). There also are various solutions (mostly in prototype stage) for anonymizing the TCP/IP traffic, usually using various creative encryption/routing protocols, principially similar to remailers (which operate on SMTP message level, not on IP level as these). A relatively well-known one is the Onion Routing approach[5]. In my country (.cz), before the Revolution, state police (StB) used to wiretap dissidents and watch whom they called when. I can only imagine how happy would they be for the ability to come and get the call records the digital switchboards keep now. I am certain they would vote in favor of the mandatory data retention laws being discussed in the EU now. [5] http://www.onion-router.net/ > Trunks come and go on the fly, on different ports, utilizing > pre established paths or new ones. You want a full encrypted video > conference to Europe, type in a few lines of code, done. > This is nothing short of the police-state mandating it be able to spy on > you at will. If it can be done, you know it will be done. Theres no > technology available that hasn't been whored by governments, one merely > need look at consumer stuff like EZ-Pass, now its being used to provide a > revenue stream via speeding tickets. Don't forget auditing of financial transactions, including creditcard purchases. And the shopping lists for the bearers of the discount cards. Electronic data storage makes way too many things incomfortably easy to get access to. Or perhaps only my paranoia is getting worse (I wish). > The law-vultures use it in cases like divorces. There is a more scary danger than just uncovering the data, the danger the lawyres are so skilled with: using the data to reveal false conclusions. Anything and everything may (and will) become a dangerous weapon in hands of a divorce lawyer hired by the vengeful soon-to-be-ex spouse. > RFID is next. Imagine your tires embedded with RFID chips, you > KNOW big brother will implant sensors to track you at toll booths, bridges > and other choke points. Imagine the JBT's being able to track your every > move via roadside sensors. The need for "legal" like going to a judge and > proving need for a search will be eliminated by such technology, as if it > ever was obeyed. They'll wrap it up in "homeland security" flags or keep it > black and hide it. They'll let advertisers and database whores like the > shopper cards implement them, and get YOU to pay for them like they did > with the raising of the prices of food in the case of shopper cards. Alternatively, they will make it "hip" and "must-have", a matter of "coolness"[6] and convenience. [6] http://worldnetdaily.com/news/article.asp?ARTICLE_ID=38038 http://www.newscientist.com/news/news.jsp?id=ns99995022 > If you're dumb enough to NOT take protective measures against big > brother, you deserve to be spied on. There will be cottage industries > spring up for devices that find and destroy RFID chips. A nice device that coul dserve as a sort of deterrent against tag readers on unexpected places or long-range ones could be a device detecting the reader's radiation or the tag's response. > Theres a device now that forces readers into an endless loop, they will > become keychain fobs, or buttons for your clothes. A possible architecture for a micropower tag reader jammer, for personal privacy enforcement, can be forcing collisions into the communication. The tags broadcast packets with typically some constant beginning, the preamble. We can listen on their response frequency, detect the presence of the preamble, then transmit a suitably timed burst of pulses that force bad data into the rest of the tag's response. The reader then rejects the result (because the checksum is invalid) and retries. This requires only extremely low total power to be transmitted, making it unlikely to cause unintentional interference and giving longer battery life. With a suitably big receiver antenna, orders of magnitude bigger than the tag's one, we can even have it completely powered from the RFID reader itself. (It has to be tested that the jamming is good enough - some tags may use ECC, making their responses more jamming-resistant.) This could provide good protection until the tags start utilizing UWB. (Can UWB be jammed? How easily is it to detect? Does anybody here have any field experience with it?) Does the device you mentioned operate in the same way? > Any chip that's sensitive enough to act as a radio receiver can be > vaporized because its got tuned circuits. Any inductive device can be > overpowered and damaged as well. All that's needed is sufficient power > at the right frequency. Given the small size of the tags, their relative vulnerability, and their simplicity, a search-and-destroy short-range hand-held device shouldn't be too difficult to build. There are already open-source solutions for work with RFID tags. One of the most recent ones is the RF-Dump[7]. There is a system in development, using high-power EM pulse for disabling the electronics in cars[8]. If it gets deployed in wider scale, I predict it gets stolen or blackmarketed (and then perhaps reverse-engineered - it's only technology, not magic) rather sooner than later, and then used as an attack method against a range of adversaries, from computer networks to warehouse logistics system. Imagine a Walmart-sized warehouse, totally dependent on RFID, with sizable percentage of the chips fried - and the resulting mess; new threat models for businesses will appear, scaled-down versions of the nuclear EMP threat influencing the design of the military tech. Such threats will make things like conductive concrete popular between builders, and people with EMP hardening skills won't have military-only use anymore. (A welcomed side-effect will be perhaps some improvements in TEMPEST resistance.) Supply will follow demand; not only buildings will need to be hardened, and so sooner or later EMP-resistant cars or aftermarket mods appear on the market. The next round of the armament race will begin. [7] http://www.rf-dump.org/ [8] http://www.guardian.co.uk/life/news/story/0,12976,1259139,00.html > We will inevitably be called to provide such services. Usually post-factum, after a breach. At least in the phase when this threat model is still new. > BTW: > My PGP key is attached and is on the servers. (cant remember if this list > passes attachments, jma?) Beware. Your key is signed only by yourself, which makes it theoretically possible to mount a MITM attack at you if the sender doesn't verify the key fingerprint with you and the adversary can impersonate you. A possible countermeasure is having your key fingerprint widely published, eg. by using it in mail signature, or perhaps mail headers if you want to be unobtrusive (but in that case your audience has to know to look there). Mail headers can be used to store a lot of various information in a way that is easy to access, persistent, and not annoying. The theory says that the keys should be signed by several people, forming a "web of trust". The Cypherpunks of the SF Bay Area (and perhaps in many other places) used to throw key-signing parties, where people come and physically meet and sign each other's keys, explicitly saying that the one who is signing the key certifies that the person whose key is signed is who s/he claims to be. (The physical meeting ensures that the communication wasn't spoofed. The people should know each other, so it won't be likely that the key owner is impersonating. The requirement of the physical meeting can be sidestepped by checking the key fingerprint by some difficult-to-spoof, real-time communication,eg. reading it over the phone.) There is a slight privacy downside on this, though, the same disadvantage the social networking systems like Orkut present: you are revealing a subset of your connections to the potential adversaries. However, if you reveal that anyway, eg. because you are communicating by mail through public infrastructure with these people (or even on public mailinglists), this price paid for the proof that you are you isn't necessarily too high to pay. (The rule of thumb is that if you don't want to reveal your connection with X, don't let X sign your key.) There's also the possibility of combining approaches, combining web-of-trust with hierarchical structure of X.509 certificates common with SSL, signing your key with the private key of the certificate and publish the result (the hierarchy up to eg. Verisign then proves it's your X.509 cert that was used to sign your key). (The same approach can be done the other way, signing the SSL certificate of your HTTPS server with GPG, storing the detached signature on the server, and using the web-of-trust approach for verifying its authenticity. Can be an effective mechanism for the cases you don't want to buy a commercial SSL certificate and want to generate your own while still ensuring it's yours (but your key has to be signed by more people than just yourself, preferably people with many other web-of-trust links), or for the threat models where the adversary has the potential to compromise the commercial signature issuers (or where we don't fully trust the reliability of the issuer itself). Please correct me if I am wrong in any statement. 9300 From: G P Date: Fri Aug 6, 2004 9:57am Subject: Re: FCC Seeks Internet Phone Wiretap Access It's already a done deal, both VoIP traffic and SMR (push to talk) must now be provided to the FBI. --- Agent Geiger wrote: > They never seem to have enough power. > > --- NoPositiveWork@a... wrote: > > > > > Posted on Wed, Aug. 04, 2004 > > > > FCC Seeks Internet Phone Wiretap Access > > > > JENNIFER C. KERR > > Associated Press > > > > WASHINGTON - Internet phone calls should be > subject > > to the same type of law > > enforcement surveillance as cell and landline > > phones, federal regulators said > > Wednesday. > > > > The Federal Communications Commission voted for > > proposed rules that would > > require Internet service providers to ensure their > > equipment will allow police > > wiretaps. > > > > Privacy advocates complained that the proposed > rules > > could allow law > > enforcement to tap communications by thousands of > > individuals on the Internet, not > > just would-be criminals. > > > > Lawyers for the Justice Department, FBI and Drug > > Enforcement Administration > > asked the FCC in March to affirm that Internet > calls > > - or Voice Over Internet > > Protocol - fall under the Communications > Assistance > > for Law Enforcement Act > > (CALEA). > > > > The 1994 law requires the telecommunications > > industry to build into its > > products tools that federal investigators can use > - > > after getting court approval - > > to eavesdrop on conversations. > > > > "Our support for law enforcement is unwavering," > FCC > > chairman Michael Powell > > said. "It is our goal in this proceeding to ensure > > that law enforcement > > agencies have all of the electronic surveillance > > capabilities that CALEA authorizes > > to combat crime and terrorism." > > > > At the same time, Powell warned against placing > > "onerous regulations" on what > > he called the vibrant new services of voice > Internet > > calls. > > > > Voice Over Internet Protocol, also known as VoIP, > > converts phone calls to > > data packets and sends them across high-speed > > Internet connections. > > > > David Sobel, general counsel for the Electronic > > Privacy Information Center, > > says the potential exists for law enforcement to > > intercept packets of data from > > subscribers other than the intended police target. > > > > "If there's going to be an expansion of CALEA's > > coverage, it should be made > > by Congress, not the FCC," Sobel said. The newer > > VoIP technology has unique > > privacy considerations that only lawmakers have > the > > authority to consider, he > > said. > > > > Jeff Pulver, chief executive officer of Melville, > > N.Y.-based Free World > > Dialup, an Internet-based phone service, said the > > FCC is sending a subtle message > > to Internet phone providers. > > > > "What the FCC is really saying to the community > and > > the industry is to wake > > up and to start innovating. If all you are going > to > > offer are replacement > > services, eventually they will be treated as > legacy" > > and be subject to traditional > > regulations. > > > > Pulver says many Internet-based phone offerings > are > > essentially substitutes > > for regular phones. He says his is different > because > > it sets up a peer-to-peer > > network, so two people can communicate directly > > without going through a > > central telephone company like AT&T. > > > > He doubts that the ruling will affect him because > he > > says his service is more > > like instant messaging than a traditional phone. > > > > The FCC will solicit comments from industry and > the > > public as it crafts final > > rules. > > --- > > Associated Press writer Anick Jesdanun in New York > > contributed to this > > report. > > > > On the Net: > > > > Federal Communications Commission: > > http://www.fcc.gov > > > > Electronic Privacy Information Center: > > http://www.epic.org > > © 2004 AP Wire and wire service sources. All > Rights > > Reserved. > > http://www.siliconvalley.com > > > > > > > > [Non-text portions of this message have been > > removed] > > > > > > > > > > __________________________________ > Do you Yahoo!? > New and Improved Yahoo! Mail - 100MB free storage! > http://promotions.yahoo.com/new_mail > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > Yahoo! Domains - Claim yours for only $14.70 > http://us.click.yahoo.com/Z1wmxD/DREIAA/yQLSAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail 9301 From: George Shaw Date: Fri Aug 6, 2004 2:33pm Subject: Help with CCTV over fiber optic sought Folks sorry if this is OT but I am looking for someone to help with a bit of advice on distribution of CCTV images along fibre over a long distance. If anyone has experience of video over fibre and/or CCTV/CATV and would be willing to answer a few questions on setup and equipment please email me direct. Thanks. -- George Shaw MI3GTO / 2I0GTO " Any Sufficiently Advanced Technology is Indistinguishable from Magic" ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... Fax & Voicemail: +44 (0) 871 242 4946 EchoLink & eQSO (101English) connected 24/7 9302 From: Jonathan Young Date: Fri Aug 6, 2004 11:30am Subject: RE: FCC Seeks Internet Phone Wiretap Access i haven't heard of anyone hacking it yet, and it uses 256 bit encryption, whick i know it would take the FBI centuries to break a message. __________________________________ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail 9303 From: savanted1 Date: Fri Aug 6, 2004 2:53pm Subject: Stealth wallpaper keeps company secrets safe British defense contractor BAE Systems has developed new wallpaper that blocks Wi-Fi signals while allowing cellular phones and emergency service signals to pass. Based on the Frequency Selective Surface (FSS) sheeting used to hide radar antennae on warships and aircraft, the wallpaper can be switched on and off using connected diodes. It will be relatively inexpensive to produce, at approximately £500 (approximately $912) per square meter, and BAE Systems is currently developing a transparent covering for windows. The development is noteworthy because repeated security warnings relating to the vulnerability of wireless networks to eavesdropping and other threats have made organizations wary of Wi-Fi. http://www.newscientist.com/news/news.jsp?id=ns99996240 9304 From: Jonathan Young Date: Fri Aug 6, 2004 4:43pm Subject: Re: FCC Seeks Internet Phone Wiretap Access i agree with you about the government wanting to put their ears everywhere. The bad part about CALEA, is that it is a backdoor to telling people to give up their encryption keys. I would think that being able to tap their networks, would mean that their equipment would work, not keeping industries from using encryption, or handing over keys. That would come under handing something over that would imcriminate you. I don't think that the courts have ruled on that yet. There is some robust encryption algorithms out there. I beleive that they are out of the relm of our governments powers of cracking them. _______________________________ Do you Yahoo!? Express yourself with Y! Messenger! Free. Download now. http://messenger.yahoo.com 9305 From: kondrak Date: Sat Aug 7, 2004 3:51am Subject: Re: FCC Seeks Internet Phone Wiretap Access Couldn't agree more Tom, Jabber is here as well...for those so inclined...just didn't care to state that.... At 20:32 8/6/2004, you wrote: >On Fri, 6 Aug 2004, kondrak wrote: > > > So I hear... > > I use ICQ and Trillian, and have full PGP encryption capabilities. > >A good encryption-friendly protocol is Jabber. The system is open-source, >the protocol is XML-based and quite non-complicated. You can either use >third-party servers (jabber.org, jabber.cz, many others), or you can run >your own. The user ID is of the format user@server, similar (well, >confusingly similar - which can be both disadvanatge and advantage, >though) to email. There are server implementations for both unix (Linux, >BSD...) and Windows servers and client implementations for everything >including Java phones. There is a single client-server connection, opened >from the side of the client, so it is firewall-friendly and the server can >accept connections in SSL, if compiled with this option. (The >server-server communication in jabberd v1.4 is plaintext though, SSL and >opportunistic TLS is (I believe) part of the jabberd2 (it's part of the >standard, though).) > >However, SSL is only connection-level. For message-level crypto you need a >client that supports GnuPG[1]; there are some (I think at least Gabber, >Miranda[2], Psi, Gaim, and Tkabber, and perhaps many more) with such >support. I am not sure about the compatibility between these solutions, >but what I know for virtually certain is that there is a standard for GPG >support in the Jabber protocol itself[3]. > >If you're about to select an IM standard for intra-corporate >communication, Jabber is definitely one of the top choices, if not The >One. One of the main factors is the possibility of being independent >(while interoperable) on the Outside World, having full control over the >architecture. > >[1] GnuPG, or GPG, is a fully-open and free alternative to PGP, which went >too commercial for the likes of many people. Fortunately, there is the >OpenPGP standard to which both GPG and PGP adhere, which makes them >quite well-compatible. > >[2] This one is multi-standard, with plug-ins for virtually everything, >from Jabber to ICQ, MSN, Yahoo, and AIM, IMHO the best for an user with >friends on all the networks. Windows-only, though. > >[3] See JEP-0027, http://www.jabber.org/jeps/jep-0027.html (or the Google >cache, as the jabber.org server seems to be down at this moment: >http://216.239.59.104/search?q=cache:http://www.jabber.org/jeps/jep-0027.html >) > > > > The time > > had defiantly come to secure your communications channels against the > > JBT's. > >What's JBT, please? > > > > I work with VOIP, and it works just fine through a VPN or tunnel. I > > use them all the time. 2gb processors are cheap now. > > If we build pipes, VPN'ed and never touch the PSTN, where big brother > > mandates his tentacles be inserted we dont exist to the outside world. > >More generally, red data - plaintext - should never touch the commercial >infrastructure. Red zones should be carefully guarded and separated from >the rest of the system. > >The appearance of popular and affordable small-factor integrated >motherboards - eg. the NanoITX format - make the construction of computers >dedicated for a single task - eg. a secure telephone - pretty attractive. >Such approach is reportedly already used by some commercial manufacturers >for some consumer devices, eg. some set-top boxes and PVRs. > >The best approach for such device could be using embedded Linux or BSD as >the OS, GnuPG for authentication, and DTLS[4] (Datagram TLS, which is de >facto SSL over UDP instead of TCP) or SRTP for the VoIP stream. I don't >know enough about SIP to be able to put it into this equation, but it >could be worthy. > >[4] http://www1.ietf.org/internet-drafts/draft-rescorla-dtls-01.txt > > > > With vpn'ed channels up to many parts of the world, we even bypass > > echelon. Sniff our packets, theres nothing in real time you can decode > > thats worth the trouble. > >Beware of traffic analysis. That's the dangerous part and gets overlooked >way too often. > >There are countermeasures, though. If you don't go through any >connection-level (HTTPS, SOCKS...) proxy, and don't have somebody >Carnivoring your comm already, you have reasonable chance your ISP doesn't >keep the logs of what passes their gateways. It may be practical for them >to log TCP/SYN packets, which carry the information about TCP connection >open requests, but they usually don't watch UDP and there's not much gain >in logging the TCP/SYN traffic anyway (but it's worth to watch for, as >it's rather easy to do, doesn't require much space, and doesn't cause much >overhead). > >There also are various solutions (mostly in prototype stage) for >anonymizing the TCP/IP traffic, usually using various creative >encryption/routing protocols, principially similar to remailers (which >operate on SMTP message level, not on IP level as these). A relatively >well-known one is the Onion Routing approach[5]. > >In my country (.cz), before the Revolution, state police (StB) used to >wiretap dissidents and watch whom they called when. I can only imagine how >happy would they be for the ability to come and get the call records the >digital switchboards keep now. I am certain they would vote in favor of >the mandatory data retention laws being discussed in the EU now. > >[5] http://www.onion-router.net/ > > > > Trunks come and go on the fly, on different ports, utilizing > > pre established paths or new ones. You want a full encrypted video > > conference to Europe, type in a few lines of code, done. > > This is nothing short of the police-state mandating it be able to spy on > > you at will. If it can be done, you know it will be done. Theres no > > technology available that hasn't been whored by governments, one merely > > need look at consumer stuff like EZ-Pass, now its being used to provide a > > revenue stream via speeding tickets. > >Don't forget auditing of financial transactions, including creditcard >purchases. And the shopping lists for the bearers of the discount cards. >Electronic data storage makes way too many things incomfortably easy to >get access to. Or perhaps only my paranoia is getting worse (I wish). > > > > The law-vultures use it in cases like divorces. > >There is a more scary danger than just uncovering the data, the danger the >lawyres are so skilled with: using the data to reveal false conclusions. >Anything and everything may (and will) become a dangerous weapon in hands >of a divorce lawyer hired by the vengeful soon-to-be-ex spouse. > > > > RFID is next. Imagine your tires embedded with RFID chips, you > > KNOW big brother will implant sensors to track you at toll booths, bridges > > and other choke points. Imagine the JBT's being able to track your every > > move via roadside sensors. The need for "legal" like going to a judge and > > proving need for a search will be eliminated by such technology, as if it > > ever was obeyed. They'll wrap it up in "homeland security" flags or > keep it > > black and hide it. They'll let advertisers and database whores like the > > shopper cards implement them, and get YOU to pay for them like they did > > with the raising of the prices of food in the case of shopper cards. > >Alternatively, they will make it "hip" and "must-have", a matter of >"coolness"[6] and convenience. > >[6] http://worldnetdaily.com/news/article.asp?ARTICLE_ID=38038 > http://www.newscientist.com/news/news.jsp?id=ns99995022 > > > > If you're dumb enough to NOT take protective measures against big > > brother, you deserve to be spied on. There will be cottage industries > > spring up for devices that find and destroy RFID chips. > >A nice device that coul dserve as a sort of deterrent against tag readers >on unexpected places or long-range ones could be a device detecting the >reader's radiation or the tag's response. > > > Theres a device now that forces readers into an endless loop, they will > > become keychain fobs, or buttons for your clothes. > >A possible architecture for a micropower tag reader jammer, for personal >privacy enforcement, can be forcing collisions into the communication. The >tags broadcast packets with typically some constant beginning, the >preamble. We can listen on their response frequency, detect the presence >of the preamble, then transmit a suitably timed burst of pulses that force >bad data into the rest of the tag's response. The reader then rejects the >result (because the checksum is invalid) and retries. This requires only >extremely low total power to be transmitted, making it unlikely to cause >unintentional interference and giving longer battery life. With a suitably >big receiver antenna, orders of magnitude bigger than the tag's one, we >can even have it completely powered from the RFID reader itself. (It has >to be tested that the jamming is good enough - some tags may use ECC, >making their responses more jamming-resistant.) This could provide good >protection until the tags start utilizing UWB. (Can UWB be jammed? How >easily is it to detect? Does anybody here have any field experience with >it?) > >Does the device you mentioned operate in the same way? > > > > Any chip that's sensitive enough to act as a radio receiver can be > > vaporized because its got tuned circuits. Any inductive device can be > > overpowered and damaged as well. All that's needed is sufficient power > > at the right frequency. > >Given the small size of the tags, their relative vulnerability, and their >simplicity, a search-and-destroy short-range hand-held device shouldn't be >too difficult to build. > >There are already open-source solutions for work with RFID tags. One of >the most recent ones is the RF-Dump[7]. > >There is a system in development, using high-power EM pulse for disabling >the electronics in cars[8]. If it gets deployed in wider scale, I predict >it gets stolen or blackmarketed (and then perhaps reverse-engineered - >it's only technology, not magic) rather sooner than later, and then used >as an attack method against a range of adversaries, from computer networks >to warehouse logistics system. Imagine a Walmart-sized warehouse, totally >dependent on RFID, with sizable percentage of the chips fried - and the >resulting mess; new threat models for businesses will appear, scaled-down >versions of the nuclear EMP threat influencing the design of the military >tech. Such threats will make things like conductive concrete popular >between builders, and people with EMP hardening skills won't have >military-only use anymore. (A welcomed side-effect will be perhaps some >improvements in TEMPEST resistance.) Supply will follow demand; not only >buildings will need to be hardened, and so sooner or later EMP-resistant >cars or aftermarket mods appear on the market. The next round of the >armament race will begin. > >[7] http://www.rf-dump.org/ > >[8] http://www.guardian.co.uk/life/news/story/0,12976,1259139,00.html > > > > We will inevitably be called to provide such services. > >Usually post-factum, after a breach. At least in the phase when this >threat model is still new. > > > > BTW: > > My PGP key is attached and is on the servers. (cant remember if this list > > passes attachments, jma?) > >Beware. Your key is signed only by yourself, which makes it theoretically >possible to mount a MITM attack at you if the sender doesn't verify the >key fingerprint with you and the adversary can impersonate you. A possible >countermeasure is having your key fingerprint widely published, eg. by >using it in mail signature, or perhaps mail headers if you want to be >unobtrusive (but in that case your audience has to know to look there). >Mail headers can be used to store a lot of various information in a way >that is easy to access, persistent, and not annoying. > >The theory says that the keys should be signed by several people, forming >a "web of trust". The Cypherpunks of the SF Bay Area (and perhaps in many >other places) used to throw key-signing parties, where people come and >physically meet and sign each other's keys, explicitly saying that the one >who is signing the key certifies that the person whose key is signed is >who s/he claims to be. (The physical meeting ensures that the >communication wasn't spoofed. The people should know each other, so it >won't be likely that the key owner is impersonating. The requirement of >the physical meeting can be sidestepped by checking the key fingerprint by >some difficult-to-spoof, real-time communication,eg. reading it over the >phone.) There is a slight privacy downside on this, though, the same >disadvantage the social networking systems like Orkut present: you are >revealing a subset of your connections to the potential adversaries. >However, if you reveal that anyway, eg. because you are communicating by >mail through public infrastructure with these people (or even on public >mailinglists), this price paid for the proof that you are you isn't >necessarily too high to pay. (The rule of thumb is that if you don't want >to reveal your connection with X, don't let X sign your key.) There's also >the possibility of combining approaches, combining web-of-trust with >hierarchical structure of X.509 certificates common with SSL, signing your >key with the private key of the certificate and publish the result (the >hierarchy up to eg. Verisign then proves it's your X.509 cert that was >used to sign your key). (The same approach can be done the other way, >signing the SSL certificate of your HTTPS server with GPG, storing the >detached signature on the server, and using the web-of-trust approach for >verifying its authenticity. Can be an effective mechanism for the cases >you don't want to buy a commercial SSL certificate and want to generate >your own while still ensuring it's yours (but your key has to be signed by >more people than just yourself, preferably people with many other >web-of-trust links), or for the threat models where the adversary has the >potential to compromise the commercial signature issuers (or where we >don't fully trust the reliability of the issuer itself). > >Please correct me if I am wrong in any statement. > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9306 From: Thomas Shaddack Date: Sat Aug 7, 2004 8:06am Subject: Re: FCC Seeks Internet Phone Wiretap Access On Fri, 6 Aug 2004, Jonathan Young wrote: > i agree with you about the government wanting to put > their ears everywhere. I have growing suspicion that a typical US/EU government, if it'd be a person, would fit the profile of a paranoid schizophrenic, and perhaps psychopath. > The bad part about CALEA, is that it is a backdoor to telling people to > give up their encryption keys. Diffie-Hellman comes to rescue. This is a key exchange algorithm for the session key. The private keys in the certificates on both sides of the communication channel are used only to sign the key exchange messages, proving they aren't spoofed and there is no man-in-the-middle attack in progress. The key itself is generated for the single use and then forgotten after the connection is closed. Even if the adversary taps and records the communication, and later comes - either with a signed paper or with a black bag - and retrieves the private keys, they are of no help for him. He can use them for MITM for actively compromising future communication, but they are of no use for decrypting the already recorded transactions. Not that it's invulnerable - but the way doesn't go through the algorithm itself. If I'd want to attack such system, I'd attempt to compromise it physically. Make it leak the session key, damage the random number generator so the key can be easily bruteforced, something along this line. This makes the requirement for the equipment to be difficult to physically compromise and easy to audit. > I would think that being able > to tap their networks, would mean that their equipment > would work, not keeping industries from using > encryption, or handing over keys. That would come > under handing something over that would imcriminate > you. I don't think that the courts have ruled on that > yet. There is some robust encryption algorithms out > there. I beleive that they are out of the relm of our > governments powers of cracking them. Even if they *can* crack them, and that fact itself has enough value, they will be unlikely to use it against you (unless you happen to be a top-ten target). Remember Brits sacrificed Coventry (and lots of civilians in other cases too) in order to avoid even indirect hints they can read Enigma. Then there always are the time-proven one-time pads. If we decide to trust the symmetric algorithms themselves, we need fresh 32 bytes of key every time we do a call. This means a 32 kbit EEPROM can store enough keys for 128 calls (with one specific other side). A 2D-barcode can also be used for recording the keys, then they can be stored in a "codebook" which makes them easier to dispose of after use - erasing a block of memory is less intuitive for an average user than burning a strip of paper. It's fairly bulletproof, unless you screw up like Russians did (see Venona). There are many many many possible solutions. The most critical factor here remains - classically - the user. 9307 From: Thomas Shaddack Date: Sat Aug 7, 2004 8:17am Subject: RE: FCC Seeks Internet Phone Wiretap Access On Fri, 6 Aug 2004, Jonathan Young wrote: > i haven't heard of anyone hacking it yet, and it uses > 256 bit encryption, whick i know it would take the FBI > centuries to break a message. It shouldn't be centuries but billions years with current technology. However, the way to the core of this system won't go through the cipher bit strength. In the words of Bruce Schneier, the bit strength of the key is the thickness of the bank vault door. The critical thing is where the door is mounted at. If it is on a tent, you have a problem. Strong crypto algorithms have one big big big risk: lulling the users into false feeling of security because they are in use. "I have a big key, nothing can happen to me." Then the key is stolen from a badly guarded token (or from the computer disk by a worm), and its poorly chosen passphrase is bruteforced overnight. Or the system is compromised remotely, through a boring buffer-overflow vulnerability. Or your illegal-immigrant janitor is promised a green card for installation of a keylogger. (See Scarfo.) The algorithms themselves are important, but rather minor, part of the overall scheme. There are many ways to the secrets that don't involve breaking ciphers by brute force. While SIGINT is more sexy, HUMINT is too often a bigger risk. The tough part is to be aware of all of the risks, or at least all of the ones your adversary knows about and can reasonably exploit. The history of the war and cold-war espionage[1] tells a lot about the prior art. [1] Just finished an interesting book, Ernest Volkman: Spies - the secret agents who changed the course of history. 9308 From: Jonathan Young Date: Sat Aug 7, 2004 8:48am Subject: Re: FCC Seeks Internet Phone Wiretap Access excellent point. I wonder now if they will go after the posting of encryption source code on the net? My guess is that they will try something. It is an abuse of power with this government what they are doing. "Power corrupts, absolute power corrupts, absolutely." __________________________________ Do you Yahoo!? Yahoo! Mail is new and improved - Check it out! http://promotions.yahoo.com/new_mail 9309 From: Jonathan Young Date: Sat Aug 7, 2004 0:21am Subject: Re: FCC Seeks Internet Phone Wiretap Access But Skype is out of FBI reach. But any american company must get FBI approval, which i think is a load of bull. __________________________________ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail 9310 From: Jonathan Young Date: Sat Aug 7, 2004 8:31am Subject: RE: FCC Seeks Internet Phone Wiretap Access i would like to see a robust system that uses encryption in a secure & sensible way. If we don't do something about this, they will continue to walk over our privacy. __________________________________ Do you Yahoo!? Yahoo! Mail Address AutoComplete - You start. We finish. http://promotions.yahoo.com/new_mail 9311 From: Shawn Hughes (Road) Date: Sat Aug 7, 2004 11:28pm Subject: Re:the Government and your OPSEC At 01:55 PM 8/7/04 +0000, you wrote: >The algorithms themselves are important, but rather minor, part of the >overall scheme. There are many ways to the secrets that don't involve >breaking ciphers by brute force. While SIGINT is more sexy, HUMINT is too >often a bigger risk. I know that it must be fun to think, but truthfully, the USG has little to no interest in the majority of people. For the ones that it does develop interests in, do you *really* think you can secure your actions against the Federal Government? It's romantic to see the Feds as blind and bumbling, but I've worked for them. There hasn't been anyone I'm aware of we EVER investigated in the southeastern US that we couldn't eventually build a case on. We never needed high-end gear to sniff outbound computer traffic; all we needed was their trash or an ex-girlfriend or former associate......... or we'd get a warrant and take their box and paperwork. Kondrak, I'm polishing my jack boots. -Shawn 9312 From: Monty Date: Sat Aug 7, 2004 8:22pm Subject: Re: Help with CCTV over fiber optic sought George What do you consider long distance? How many images (cameras) are you talking about? What kind of budget? I use equipment from several venders to fill each need. Monty --- George Shaw wrote: > > Folks sorry if this is OT but I am looking for > someone to help with a bit of > advice on distribution of CCTV images along fibre > over a long distance. If > anyone has experience of video over fibre and/or > CCTV/CATV and would be > willing to answer a few questions on setup and > equipment please email me > direct. > > Thanks. > > -- > George Shaw MI3GTO / 2I0GTO > > " Any Sufficiently Advanced Technology > is Indistinguishable from Magic" > ---Arthur C. Clarke > > Mobile: +44 (0) 7740 361 163 > Email: george.shaw@u... > Fax & Voicemail: +44 (0) 871 242 4946 > EchoLink & eQSO (101English) connected 24/7 > > > > __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - 100MB free storage! http://promotions.yahoo.com/new_mail 9313 From: G P Date: Sat Aug 7, 2004 3:22pm Subject: RE: FCC Seeks Internet Phone Wiretap Access Good luck. I started work on a commercial STU-III variant a few years back and very quickly realized that it would never, ever, under any circumstances, make it to market unless it was an underground open source project. I ended up under investigation for it, business contacts were destroyed at every step, they (whomever "they" is) will not allow an encrypted phone to market without escrow. The best hope is that the VoIP industry migrates to encrypted transport, although I doubt the major players (Cisco et al) will allow any type of transport encryption for their SIP implementations - one only needs to look at the Cisco/Yahoo/China fiasco to see that shareholder profits are more important than democracy or privacy. --- Jonathan Young wrote: > i would like to see a robust system that uses > encryption in a secure & sensible way. If we don't > do > something about this, they will continue to walk > over > our privacy. > > > > > __________________________________ > Do you Yahoo!? > Yahoo! Mail Address AutoComplete - You start. We > finish. > http://promotions.yahoo.com/new_mail > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > Make a clean sweep of pop-up ads. Yahoo! Companion > Toolbar. > Now with Pop-Up Blocker. Get it for free! > http://us.click.yahoo.com/L5YrjA/eSIIAA/yQLSAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 9314 From: Jack Lloyd Date: Sat Aug 7, 2004 0:05pm Subject: Re: FCC Seeks Internet Phone Wiretap Access There are a number of systems for such under development. It's really not that hard, the basic stuff is all there. There are literally dozens of free crypto libraries, Speex was explicitly designed for voice compression, there are free RTP and SRTP libraries out there as well. Really, it's mostly integration and UI issues. Our system for encrypted VoIP/IM/file transfer will be presented+released at ToorCon this September. -Jack On Sat, Aug 07, 2004 at 06:31:21AM -0700, Jonathan Young wrote: > i would like to see a robust system that uses > encryption in a secure & sensible way. If we don't do > something about this, they will continue to walk over > our privacy. 9315 From: Agent Geiger Date: Sat Aug 7, 2004 11:00pm Subject: Re: Re:the Government and your OPSEC I think the issues you address are correct. It is NOT hard for the government to build a case against ANYONE, as the current legal system is so polluted, that most everyone is a criminal in one form or another. --- "Shawn Hughes (Road)" wrote: > At 01:55 PM 8/7/04 +0000, you wrote: > >The algorithms themselves are important, but rather > minor, part of the > >overall scheme. There are many ways to the secrets > that don't involve > >breaking ciphers by brute force. While SIGINT is > more sexy, HUMINT is too > >often a bigger risk. > > > I know that it must be fun to think, but truthfully, > the USG has little to > no interest in the majority of people. For the ones > that it does develop > interests in, do you *really* think you can secure > your actions against the > Federal Government? > > It's romantic to see the Feds as blind and bumbling, > but I've worked for > them. There hasn't been anyone I'm aware of we EVER > investigated in the > southeastern US that we couldn't eventually build a > case on. We never > needed high-end gear to sniff outbound computer > traffic; all we needed was > their trash or an ex-girlfriend or former > associate......... or we'd get a > warrant and take their box and paperwork. > > Kondrak, I'm polishing my jack boots. > > > -Shawn > > > _______________________________ Do you Yahoo!? Express yourself with Y! Messenger! Free. Download now. http://messenger.yahoo.com 9316 From: James M. Atkinson Date: Sun Aug 8, 2004 0:14am Subject: HF-4 Band HF-4 Band - This band begins at 45 MHz, and includes signals up to 50 MHz. This band is most hostile between 49.500 and 49.875 MHz and should be considered extremely hostile. 45.0000 45.6192 46.0000 46.0800 46.3080 46.5341 46.6650 46.9500 47.1859 47.9232 48.0000 48.0009 48.3840 48.7710 49.1520 49.5000 49.8300 - Very Hostile 49.8400 49.8550 - Extremely Hostile 49.8600 49.8900 - Extremely Hostile 49.8920 49.9000 49.9500 ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 9317 From: James M. Atkinson Date: Sun Aug 8, 2004 0:16am Subject: HF-3 Band HF-3 Band - This begins at 20 MHz and goes up to 45 MHz. While this band is not too heavily used anymore for surveillance, it still should be considered a serious threat due to older devices. Watch out for wide FM deviation devices operating between 36 and 39 MHz. 35.0000 35.2512 35.3894 35.7955 35.9424 35.9441 36.0000 36.0012 36.2500 36.2880 36.5000 36.6339 36.7500 36.8640 37.0000 37.2500 37.5000 37.6000 - Extremely Hostile 37.6100 37.7487 37.7500 38.0000 38.0005 38.2500 38.4000 38.5000 38.7500 38.8800 39.0000 39.1300 39.1900 39.3216 39.3750 39.8970 39.9026 40.0000 40.3200 40.5420 40.5504 40.9600 42.0000 42.9545 43.2000 43.5000 44.0700 44.2368 44.4000 ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 9318 From: James M. Atkinson Date: Sun Aug 8, 2004 0:18am Subject: VHF Bug Bands VHF-4 Band - This band is extremely hostile for eavesdropping and there are literally thousands of devices available. Much of this band usage is by amateur products, kit bugs, and ham radio toys. 135.0000 135.3000 135.4127 136.0000 136.0227 137.0000 138.0000 138.2400 138.2912 139.0000 139.6000 - Extremely Hostile 139.6023 139.8000 139.9500 140.0000 - Extremely Hostile 140.8500 - Extremely Hostile 141.0000 141.3800 141.5520 142.0000 143.0000 143.1818 143.5000 - Extremely Hostile 143.7696 143.7762 143.7800 144.0000 144.0008 144.0028 144.0047 144.8200 145.0000 145.1520 146.0000 146.3130 146.5350 - Extremely Hostile 146.5356 - Extremely Hostile 146.7614 146.9350 146.9400 147.0000 147.4560 148.0000 148.0050 - Extremely Hostile 149.0000 149.5800 149.9500 149.9900 ---------- VHF-5 Band - The band between 150 and 174 MHz is also extremely hostile and should be considered hot for eavesdropping activity. Pay very close attention to the popular wireless microphone frequencies in this band. 150.0000 150.3409 150.4500 150.9000 151.0500 151.3500 151.8000 151.8600 152.0000 152.2500 152.5704 152.7000 152.7200 153.0000 153.1500 153.2288 153.6000 153.9205 154.0500 154.3600 154.5000 154.9500 155.0000 155.4000 155.5200 155.8500 156.0000 156.3000 156.7500 156.7800 157.2000 157.2864 157.5000 157.6500 158.1000 158.5500 159.0000 159.6103 159.9500 160.0000 161.0795 161.2800 161.6500 162.0000 162.2016 162.4000 162.4750 162.5000 162.5500 163.8400 164.4625 - Red 164.6591 164.8625 - Green 165.0000 165.7500 165.8880 166.0000 166.6380 166.6625 - Bulldog 1 166.8625 - Bulldog 2 167.0000 167.4610 167.7722 168.0000 168.2386 169.0000 169.3300 169.4450 - Extremely Hostile 169.5050 - Extremely Hostile 169.9320 169.9500 169.9904 170.0000 170.1000 - Violet 170.2400 170.2450 - Extremely Hostile 170.3000 170.3050 - Extremely Hostile 170.4875 - Lime 170.6000 170.9750 - Extremely Hostile 171.0450 - Extremely Hostile 171.0500 171.1050 - Extremely Hostile 171.1100 171.4500 - Bug 1 171.6000 - Bug 2 171.8182 171.8250 - Bug 3 171.8450 - Extremely Hostile 171.9000 171.9050 - Extremely Hostile 172.0000 - Bug 4 172.2000 - Bug 5 172.8875 - Gold 172.8875 - Yellow 173.2250 173.2375 173.2450 173.3125 173.3500 - Extremely Hostile 173.3875 173.4625 173.5375 173.6125 173.6875 173.7625 173.8375 173.9125 173.9875 174.0000 174.0625 174.1375 174.2000 174.2125 174.2875 174.3625 174.6000 ---------- VHF-6 Band - The band between 175 and 200 MHz is moderately hostile. Pay very close attention to the popular wireless microphone frequencies in this band. 175.0000 175.0200 - Extremely Hostile 175.3977 175.8000 176.0000 176.2800 176.7360 176.9472 177.0000 177.3200 177.3447 177.6000 177.8000 178.0750 178.4000 178.4500 178.9773 179.0000 179.3500 179.4000 179.6480 179.6750 180.0000 180.6000 180.6750 180.8000 181.0000 181.2000 181.5750 181.6000 181.9500 182.5568 182.9000 183.0000 183.3950 183.6000 183.8000 184.3200 184.3718 184.4000 184.8500 - Extremely Hostile 185.0000 185.2771 185.3750 186.1000 186.1364 186.6000 186.6500 186.6667 187.0000 187.1500 187.8000 188.0380 188.8610 188.8750 189.0000 189.7159 189.8000 190.0000 190.4000 190.6000 - Extremely Hostile 190.9100 191.3000 191.6928 191.7016 191.7750 192.0000 192.0037 192.0063 192.1000 192.2500 192.6000 193.0500 193.2954 193.5360 195.0000 195.0840 195.2750 195.3808 195.6000 195.8000 196.6000 196.6080 196.6300 196.8750 197.0000 198.0000 198.1000 198.2750 198.6000 198.9500 199.0000 199.0656 199.6000 199.8800 199.9500 ---------- VHF-7 Band - This band is quite popular with eavesdroppers, and a large number of devices are produced to support these channels. 200.0000 200.4545 200.5000 201.0400 201.2500 201.6000 201.8000 202.1064 202.2000 202.7520 203.0000 - Extremely Hostile 203.0932 203.1000 203.6000 204.0341 204.1000 204.6000 204.7950 204.8000 204.8750 205.0000 205.7718 206.3800 206.6771 207.1000 207.3600 207.4000 207.6136 208.0000 208.2000 208.4000 208.4500 208.6000 209.2500 209.7250 210.0000 210.1000 210.3400 210.3800 210.8000 211.0000 211.1932 211.2000 211.5072 211.7250 211.9500 212.0000 212.3280 212.4750 212.5500 212.8137 213.0000 213.2000 213.3333 213.7500 213.8000 214.0000 214.7727 214.7750 215.0000 215.2500 215.3000 215.5000 215.7500 215.9750 216.0000 216.0013 216.1300 216.2500 216.2688 216.5000 216.7500 217.0000 217.2500 217.5000 217.7500 218.0000 218.2500 218.3523 218.5000 218.6850 218.7500 219.0000 219.2500 219.3100 219.5000 219.7500 219.8394 220.0000 220.9093 221.1840 221.5000 - Extremely Hostile 221.9318 222.0000 222.4400 223.5064 224.0000 224.4000 224.4932 224.5000 - Extremely Hostile 224.7000 ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- From: Matt Paulsen Date: Mon Aug 5, 2002 7:33pm Subject: RE: ID of Telephone Lines? hehe.. not any more :) -----Original Message----- From: Scott Malcolm [mailto:conf-pi@e...] Sent: Sunday, August 04, 2002 12:01 PM To: TSCM-L Subject: [TSCM-L] ID of Telephone Lines? ANAC: 1 800 877 2278 (FULL COVERAGE US) Regards, Scott Malcolm Malcolm & Associates, Inc. Your Confidential Alternative Serving the State of Wisconsin http://www.execpc.com/~conf-pi Office 262 965 4426 / Fax 262 965 4629 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5914 From: Fernando Martins Date: Mon Aug 5, 2002 6:12pm Subject: RE: re: Nmap 3.0.0 OS fingerprints > For the record, I use the Nmap tool, among many others. I am > not a hacker, one of the hats I wear is as company > Information Security Officer. I use the tools to scan our own > networks looking for vulnerabilities so I can find and fix > them before some 'script kiddie' does and takes advantage to > do harm to us or others. I don't use nmap probably for about an year or so ... I was just looking at some files at the source distribution to see some diferences, regarding older versions, and one thing I was after was webcam signatures/hints/whatever about them ... I only can test a few brands, so I was searching for the work of other people. Regarding security audits, when I used to work with them, I always tried not to use automated tools, or else I was in great risk to loose all the fun. For the record, the last automated tool I tested was for my PocketPC, along of course with a raw/telnet client. > Anyone involved in any kind or war of wits will tell you it's > important to know your enemy - what tools will they use, how > will they use them, what capabilities they have, etc. JMAs > bug database is for just such a purpose. Some of these tools > were written to help lock down networks, some to break into > them. All can be used by both sides. About that kind of databases I only use(d) CVE. And yeah, I know my enemy ... the worse one is myself. And of course, from time to time I read again Sun Tzu. > In the real world, you have to do it to yourself before > somebody else does. There are automated scanners that hackers > leave running 24x7 looking for new and unsecured systems on > the internet. Hhmmmm ... From what I think I know I don't beleave that ANY real hacker use THAT kind of red flag this days ... Can't say the same about kids. The problem is when hackers find NEW vulnerabilities that AV's and IDS's and other 's don't know yet. That's why I never trusted in automated scans (like if there isn't other reasons ... but that's for other forums ... hopefully). > project.honeynet.org and read on. > I have hooked a system to the net and seen it scanned within > 17 minutes of connection. It was attacked within 4 hours. I use to read Lance's work long before honeynet project was born, like his papers about hardening systems. Also I follow some other guys work (people that are also in that project), even when some were just known with their irc nicknames ... Regarding heavy attacks, some years ago I was betatester for some firewall and used to stay in irc networks at hostile channels saying "hit me baby ... I'm hot today" just to see the kids new technics ... using unpatched systems. Or doing the same but with my own irc bots. It's something like making contests in Artic waters to see how much time some lives before freezing ... I just used to use some of my PC's for that, it's almost the same. This days I don't have time for that anymore, so yes I'm following the honeynet project, it's a very nice one. > My cyber risks insurance policy is lower in cost as a result, > same as if you take the trouble to park your car in your > garage every night, rather than leave it on the drive or park > in the street, you get a lower insurance premium. It's crazy, but I have a garage that I never use eheheh Both cars stay on the street ... But since one of them has in large red letters " xxxxxx SECURITY", I suppose I'm not a nice target ;-) FM 5915 From: Date: Mon Aug 5, 2002 9:26pm Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. This file is set to automatically go out to list members every two weeks, Please review it, and ensure that you are listed properly (correct address, phone, etc). ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (including AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: tscm01@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 5916 From: Date: Mon Aug 5, 2002 9:26pm Subject: File - mission.txt TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 5917 From: Date: Mon Aug 5, 2002 5:59pm Subject: Re: ID of Telephone Lines? In a message dated 8/5/02 5:35:31 PM Pacific Daylight Time, mpaulsen6@a... writes: << hehe.. not any more :) >> Listen to Steve. 5918 From: kondrak Date: Mon Aug 5, 2002 5:46pm Subject: Loop Pairs Toss a pair of dsl modems on the line and see what thruput you get... I can get near megabit speeds over poor quality alarm lines...as long as theres battery on them... Nailed up alarm lines are like $6.00-9.00 a month here...and thats for DC pairs in some places as well.. 5919 From: Craig Snedden Date: Tue Aug 6, 2002 1:51am Subject: RE: Training Anyone in the UK interested in trainig forward your name to me along with any particular areas of training you are looking for. Once I have numbers I can fix a price. :-) Craig Snedden craig@d... -----Original Message----- From: George Shaw [mailto:george.shaw@u...] Sent: 04 August 2002 19:09 To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Training Me second that.... George Shaw MI3GTO Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... -----Original Message----- From: k9electron [mailto:k9sales@n...] Sent: 03 August 2002 17:22 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Training Hi all just wondering whether anyone here knows of a good TSCM training school in the uk? Thanks Paul ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5920 From: Matt Paulsen Date: Tue Aug 6, 2002 10:46am Subject: Joke - murder or suicide? If you contract a hit on yourself is it murder or suicide? 5921 From: Matt Paulsen Date: Tue Aug 6, 2002 11:29am Subject: Wireless comes to Georgia. http://www.cnn.com/2002/TECH/science/07/31/coolsc.wireless.cloud/index.html 5922 From: Craig Date: Tue Aug 6, 2002 5:41pm Subject: IP Phone Vulnerability Is there anyone who has done any work on the types of vulnerabilities and attacks that might be made on VOIP networks and IP phone systems. I would appreciate any feedback that anyone has. Cheers Craig =============================== Craig Meldrum, Managing Director Communications Security Ltd PO Box 8314, Symonds St Auckland, New Zealand =============================== 5923 From: Date: Tue Aug 6, 2002 5:07pm Subject: Re: Joke - murder or suicide? Taking it from a serious point of view - conspiracy to commit murder, accessory to murder for hire, inducement of another to commit a felony; of course, any wind of this in the mental health community will result in immediate commitment for evaluation (if you survive long enough to be committed). Realistically - while you are setting in motion the mechanism of your own demise, I don't think it would ever be viewed as suicide in the legal context because of the involvement of a third (so to speak) party. Just one lawyer's quick take. Paul Gormley Attorney Salem MA 5924 From: Rob Date: Tue Aug 6, 2002 5:58am Subject: They are very interesting bugs http://www.endoacustica.com/audio_accessori.htm 5925 From: iDEN-i100 Date: Wed Aug 7, 2002 11:05am Subject: DOJ missing hundreds of laptops http://www.fcw.com/fcw/articles/2002/0805/web-doj-08-06-02.asp -- [Non-text portions of this message have been removed] 5926 From: Kohlenberg, Toby Date: Wed Aug 7, 2002 2:00am Subject: RE: IP Phone Vulnerability Ofir Arkin (currently of @Stake) has done some research and recent papers on VoIP- check out his talk at CanSecWest (I believe you can find it at www.cansecwest.com). That would be the first place I'd go, toby > -----Original Message----- > From: Craig [mailto:craig@c...] > Sent: Tuesday, August 06, 2002 3:41 PM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] IP Phone Vulnerability > > > Is there anyone who has done any work on the types of > vulnerabilities and > attacks that might be made on VOIP networks and IP phone > systems. I would > appreciate any feedback that anyone has. > > Cheers > Craig > =============================== > Craig Meldrum, Managing Director > Communications Security Ltd > PO Box 8314, Symonds St > Auckland, New Zealand > =============================== > > > > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> > Will You Find True Love? > Will You Meet the One? > Free Love Reading by phone! > http://us.click.yahoo.com/it_ffB/R_ZEAA/Ey.GAA/kgFolB/TM > -------------------------------------------------------------- > -------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > 5927 From: Craig Snedden Date: Wed Aug 7, 2002 4:25am Subject: RE: Training Hi All, I should have expanded on the mail I sent to the list, but was very pushed for time. To explain: One of my partner companies runs TSCM training and has a very comprehensive course already set up. The course is fully documented and has been presented to a foreign ("UK friendly") government where it was well received. It covers "the threat", methods of search, types of TSCM equipment (not restricted to one manufacturer) and methods of dealing with any "bug" found etc. In short it equips the student with the practical knowledge required to run a sweep team. (I think it is fair to say that prior knowledge of electronics and telecomms is assumed). Cost is dependant on numbers attending (the more the cheaper). If anyone is interested in this please forward your names to me and I can then arrange further information to be sent out with a fuller description of course content, cost etc. The course can be presented anywhere, but for small numbers would probably be in the south/midlands of England. Regards, Craig Snedden craig@d... 5928 From: Kutlin, Josh Date: Wed Aug 7, 2002 7:49am Subject: RE: Training How about in the U.S. ? DC area? With a strong focus on large telephone (both analog and digital) systems Thanks Josh -----Original Message----- From: Craig Snedden [mailto:craig@d...] Sent: Tuesday, August 06, 2002 2:52 AM To: tscm-l@yahoogroups.com Subject: RE: [TSCM-L] Training Anyone in the UK interested in trainig forward your name to me along with any particular areas of training you are looking for. Once I have numbers I can fix a price. :-) Craig Snedden craig@d... -----Original Message----- From: George Shaw [mailto:george.shaw@u...] Sent: 04 August 2002 19:09 To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Training Me second that.... George Shaw MI3GTO Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... -----Original Message----- From: k9electron [mailto:k9sales@n...] Sent: 03 August 2002 17:22 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Training Hi all just wondering whether anyone here knows of a good TSCM training school in the uk? Thanks Paul ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5929 From: David Alexander Date: Thu Aug 8, 2002 5:31am Subject: the little guy can win I know this is slightly off topic, but it makes me feel good and it shows the little guy can win: I received some unsolicited text messages on my cellular phone and spam e-mail to my home address that I thought was misleading. It was trying to fool me into thinking that someone had the hots for me (if you had seen my picture you would know instantly why I was suspicious ) and to ring a premium rate number to find out more. I was not going to fall for that, but thought many people might. In the UK we have a body called ICSTIS who regulate these lines and their advertising. I tracked the spam back to its source and reported the company to ICSTIS for, IMHO, breaking the code. I just got a reply from them. ICSTIS agreed with me. The service is banned and they have been fined 7,500 pounds sterling (about 10,000 USD) Serves the b*stards right Yeeeeeeessssssssssssssssssss It may only be a small victory, but it's a start. cheers _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 5930 From: A Grudko Date: Thu Aug 8, 2002 6:00am Subject: Re: the little guy can win - Original Message - From: David Alexander > I just got a reply from them. ICSTIS agreed with me. The service is banned > and they have been fined 7,500 pounds sterling (about 10,000 USD) I wish we had such a system here. Andy Grudko (British) - D.P.M., Grad I.S, South Africa - PSIRA investigators Reg. No. 8642 Grudko Associates - www.grudko.com , andy@g... . Est. 1981. International business intelligence and investigations To contact us: (+27 12) 244 0255 - 244 0256 (Fax). ICQ : 146498943. Netmeeting : agrudko@h... IPA, SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust When you need it done right - first time 5931 From: Chrisman McSpadden Date: Thu Aug 8, 2002 9:29am Subject: Training Hail the Group, I normally sit quietly in the back, cloaked in the shadows with the other lurkers but in reference to the training thread I would like to offer assistance. My silence in the past has been primarily due to my affiliation with a well known countermeasures equipment manufacture and the perception that any comment must be a sales pitch. I have noticed a dramatic increase in the demand for countermeasures training in the last year and a half. A need which has always been there but current politics and world situation have dramatically brought countermeasures to the foreground. (Your right here comes the sales pitch, but the services we offer are amoung the best available and the question was posed.) My company has spent the last year developing a technical training center and courses to try to meet this need. We offer courses on our equipment, courses on computer forensics and more to this point, we offer courses on the procedural basics of TSCM. It is during this class that we cover the concepts from how to get into a facility with boxes of gear, the legal issues of doing the job, and equipment procedures that cover RF, NLJD, Thermal, Portable X-ray, bore scopes, Audio Amps, CODECs for digital processing and more. We utilize equipment from several vendors and invite students to bring their own kit as well. Our training facility is almost 5,000 square feet and includes two large classrooms and several student project rooms which emulate technically attacked conference rooms, hotel rooms, and office space. We have done our best to provide as complete a facility as possible. In addition, our training programs are flexible and can be adjusted to meet unique organizational needs. Okay I am off the soapbox but I wanted to explain what we had to offer and please trust that our training program is not a sales tool, our gear sells itself. Our training department is dedicated to training technicians on the procedures and concepts of TSCM. My company has trained federal, law enforcement, corporate and private practioners from all over the world. You can see more and learn more at our website, "www.reiusa.net", on our training page. Our Center for Technical Security is here to help. Thank you, Chrisman R. McSpadden Director of Training Research Electronics International 455 Security Place Algood, TN 38506 931-537-6032 chris@r... _________________________________________________________________ Chat with friends online, try MSN Messenger: http://messenger.msn.com 5932 From: James M. Atkinson Date: Thu Aug 8, 2002 3:20pm Subject: God Bless America How Budweiser handled those who laughed at those who died on the 11th of September, 2001... Thought you might like to know what happened in a little town north of Bakersfield, California. On September 11th, a Budweiser employee was making a delivery to a convenience store in a California town named McFarland. He knew of the tragedy that had occurred in New York when he entered the business to find the two Arabs, who owned the business, whooping and hollering to show their approval and support of this treacherous attack. The Budweiser employee went to his truck, called his boss and told him of the very upsetting event! He didn't feel he could be in that store with those horrible people. His boss asked him, "Do you think you could go in there long enough to pull every Budweiser product and item our beverage company sells out of there? We'll never deliver to them again. " The employee walked in, and proceeded to pull every single product his beverage company provided and left with an incredible grin on his face. He told them never to bother to call for a delivery again. Budweiser happens to be the beer of choice for that community. Just letting you know how Kern County handled this situation. And now the rest of the story: It seems that the Bud driver and the Pepsi man are neighbors. Bud called Pepsi and told him of the incident. Pepsi called his boss who told him to pull all Pepsi products as well!! That would include Frito Lay, etc. Furthermore, word spread and all the vendors followed suit! At last report, the store was closed indefinitely. Good ole American Passive-Agressive Ass Whoopin'! America needs to know that we're all working together. THIS ONES FOR YOU. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5933 From: Date: Thu Aug 8, 2002 11:31am Subject: Re: God Bless America In a message dated 8/8/02 1:25:21 PM Pacific Daylight Time, jmatk@tscm.com writes: << How Budweiser handled those who laughed at those who died on the 11th of September, 2001... >> Inspirational. 5934 From: Date: Thu Aug 8, 2002 0:30pm Subject: Report: CIA Agent Died After Injury Report: CIA Agent Died After Injury .c The Associated Press MOSCOW (AP) - Edward Lee Howard, the former CIA agent who defected to Moscow, was killed as a result of a head injury, a former KGB agent told a newspaper in a report Thursday. Confusion has surrounded the circumstances of Howard's July 12 death, with earlier reports saying the 50-year-old either fell down stairs or possibly died in a car crash in the exclusive Moscow suburb of Zhukovka. His body was cremated before reports of his death became public. Viktor Andrianov, a former KGB agent who said he got to know Howard well after being appointed one of his contacts following his defection, said Howard died after hitting his head and wasn't found until the next day. ``He was walking at sunset on the territory of his dacha, and the terrain is very steep there,'' Andrianov told Komsomolskaya Pravda newspaper. ``It's likely Edward slipped, and when he was falling he hit his head very hard on a stone. He was found only in the morning, when everything was over.'' Howard, a native of New Mexico, started at the CIA in 1981 and was fired by the agency in June 1983 after he was suspected of selling secrets to the Soviets. In 1985, Howard escaped FBI surveillance in Santa Fe, N.M., and fled to Moscow. His whereabouts were unknown publicly until a 1986 report in an official Soviet newspaper said he had been granted political asylum. The KGB provided him a Moscow apartment and a country house, and paid him a salary for five years until he set up a trade consulting business, Howard said in an 1995 interview. U.S. intelligence officials blamed him for the collapse of the CIA's spying operations in Moscow and the execution of a Soviet citizen for treason, but Howard had denied giving away information that hurt Americans or the United States. However, Andrianov said Howard had given the KGB information on CIA agents in Moscow, and in particular on an agent code-named ``Sphere.'' Howard also helped the KGB identify bugging equipment that had been disguised as tree stumps, Andrianov said. Howard had claimed in interviews to have dodged Western intelligence services and customs officials while traveling in France, Canada and Mexico. He also said he had traveled widely in Nicaragua, Cuba and Eastern Europe since asking for asylum in June 1986. 5935 From: Steve Uhrig Date: Thu Aug 8, 2002 4:32pm Subject: Re: Training - Another view On 8 Aug 2002 at 14:29, Chrisman McSpadden wrote: > My company has spent the last year developing a technical training > center and courses to try to meet this need. We offer courses on our > equipment, courses on computer forensics and more to this point, we > offer courses on the procedural basics of TSCM. > Okay I am off the soapbox but I wanted to explain what we had to offer > and please trust that our training program is not a sales tool, our > gear sells itself. Any training run by a manufacturer is subtly designed to be a sales presentation for their equipment. This is true for electronics of all sorts (is Tektronix going to train you on using your Hewlett Packard equipment, or are you going to leave the course wanting to throw your H-P in the dumpster and get a second mortgage on your house to buy the Tek pieces you trained on?), scuba gear, skydiving, pilot training, various security and surveillance manufacturer 'seminars' and many other training courses I have been through. Ask anyone who has attended ANY manufacturer's training, like AID's (Audio Intelligence Devices') National Intelligence Academy. I have trained at REI's facility. Although I got the training I was seeking on the particular piece of equipment I was researching, I also got time on stuff I didn't own, would not own, and had no interest in. Felt like I was at a grade school show and tell session. And I paid to fly there, rent a car and stay in a hotel. The best training is from people who have nothing to sell you. No ulterior motives. Remember that. REI's training is better than nothing, I am certain, and probably worth the time. Be aware, however, you will leave there virtually guaranteed to buy REI equipment whether you intended to, already own some, or can afford it or not. You're going to buy REI gear. And they know it. And you're paying to be there, which gives them a double profit on you. Manufacturers are in business to sell equipment. All efforts on their behalf are in support of that goal. I can speak from an authoritative position as an equipment manufacturer, and having been through dozens of training sessions and seminars by manufacturers all over the world. And having conducted training, on our products, for governments all over the world. It works. I train on our products, and the students buy them. If the training were free, I would have a slightly different attitude. But I dislike paying for a sales pitch, regardless of how subtle or regardless of the philanthropic claims to the contrary by the manufacturer conducting the training. Why do you think 99% of law enforcement surveillance equipment is (or was) purchased from AID before they had their recent problems? Because they conducted extensive training at their National Intelligence Academy, and turned out thousands of students who were convinced AID was the only product that would not get them killed on the street, and managed to propogate that concept throughout their departments. AID was and remains the most expensive products of their types on the market. Their sales team is closely integrated with their training team. They know what they are doing, and how to sell equipment. And so does REI. No offense meant to Mr. Mc S or REI, just an independent observation giving the other side of the story from someone who has been around 30 years in this industry. There are a lot of newcomers to the profession on this list, who need to know both side of the story. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5936 From: Charles P. Date: Thu Aug 8, 2002 5:37pm Subject: Re: God Bless America Just for the record... This story can be seen at: http://hoaxbusters.ciac.org/HBUrbanMyths.shtml#budhandles Charles ----- Original Message ----- From: To: Sent: Thursday, August 08, 2002 4:31 PM Subject: Re: [TSCM-L] God Bless America > In a message dated 8/8/02 1:25:21 PM Pacific Daylight Time, jmatk@tscm.com > writes: > > << How Budweiser handled those who laughed at those who died > on the 11th of September, 2001... >> > > Inspirational. > 5937 From: kondrak Date: Thu Aug 8, 2002 6:10pm Subject: Re: God Bless America >However, it's unfortunatly urban legend.. > Inspirational. 5938 From: Justin T. Fanning Date: Thu Aug 8, 2002 6:17pm Subject: Re: God Bless America Of course it is, in the real world the shop would have brought a class action against the distributors for racial / religious discrimination, received millions and funnelled the money back to ... JF --- kondrak wrote: > > >However, it's unfortunatly urban legend.. > > > Inspirational. > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5939 From: Date: Thu Aug 8, 2002 2:24pm Subject: Re: God Bless America In a message dated 8/8/02 3:39:50 PM Pacific Daylight Time, charles@t... writes: << http://hoaxbusters.ciac.org/HBUrbanMyths.shtml#budhandles >> Still inspirational 5940 From: James M. Atkinson Date: Thu Aug 8, 2002 6:30pm Subject: Re: God Bless America Yes, but then again it's an urban legend... -jma At 12:17 AM +0100 8/9/02, Justin T. Fanning wrote: >Of course it is, in the real world the shop would have brought a >class action against the distributors for racial / religious >discrimination, received millions and funnelled the money back to ... > > >JF > >--- > >kondrak wrote: >> >> >However, it's unfortunatly urban legend.. >> > > > Inspirational. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5941 From: Matt Paulsen Date: Thu Aug 8, 2002 7:15pm Subject: hmm. Nothing like a vigilante, he's lucky he's not in jail. I'm guessing this got filed under 'good job, it never happened as far as we're concerned' with the DOJ. http://www.cnn.com/2002/US/08/08/porn.patriot/index.html 5942 From: John McCain Date: Thu Aug 8, 2002 4:14pm Subject: Re: God Bless America Interesting story, but it's Urban Legend. See http://www.snopes2.com/index.html JohnM At 04:20 PM 8/8/02 -0400, you wrote: >How Budweiser handled those who laughed at those who died >on the 11th of September, 2001... > >Thought you might like to know what happened in a little town north of >Bakersfield, California. Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-897-6600 2949 CR 1000N Web: http://www.dcbnet.com Dewey, IL. 61840 Email: Jmccain@d... From: Dawn Star Date: Mon Aug 7, 2000 11:49am Subject: legal notice "I would consider it to be most unwise to commit any mischief or to confess to any kind of mischief on the list unless you have a really serious belief in paying penance." jma With this it seems you have served notice on us that we can no longer speak freely among ourselves in confidence, security, and trust about our work and experiences. Kind of a human "Carnivore" situation. Sad that our business is a victim of itself. Roger Tolces, Electronic Security Company, Los Angeles [Non-text portions of this message have been removed] 1113 From: Robert G. Ferrell Date: Mon Aug 7, 2000 11:50am Subject: Re: legal notice >With this it seems you have served notice on us that we can no longer speak >freely among ourselves in confidence, security, and trust about our work and >experiences. Kind of a human "Carnivore" situation. Sad that our business is a >victim of itself. Not at all. Jim is merely pointing out that law enforcement agents read this list, not because they are looking for criminals (I hope) but because they are interested in TSCM issues. If you admit to committing a crime on this list, however, they aren't always going to be at liberty to 'look the other way.' Just use common sense. RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 1114 From: James M. Atkinson, Comm-Eng Date: Mon Aug 7, 2000 0:51pm Subject: Re: legal notice At 9:49 AM -0700 8/7/00, Dawn Star wrote: >"I would consider it to be most unwise to commit any mischief or to >confess to any kind of mischief on the list unless you have a really >serious belief in paying penance." > jma > >With this it seems you have served notice on us that we can no >longer speak freely among ourselves in confidence, security, and >trust about our work and experiences. Kind of a human "Carnivore" >situation. Sad that our business is a victim of itself. > Roger Tolces, >Electronic Security Company, Los Angeles Let me be more clear on this issue: This list deals with catching the opposition. The "Opposition" is anybody using surveillance equipment. The Opposition" may be performing the surveillance legally (which is rare), or illegally (which is more common). If we discover a LEGAL surveillance operation then there are certain things that we do so as not to screw up the operation, but to also CYA. If we discover an ILLEGAL surveillance there are also things that we do, but they are designed, and developed to catch our opposition. You can of course speak freely, but only a fool would confess to committing serious federal felonies in a room full of federal law enforcement officers. It would be a bit like whipping out a joint in a airplane crowded with DEA agents, lighting it, and then asking if anybody else wanted a drag. I expect that not only would you be immediately arrested, but that you might gain a few bruises in the scuffle. But then if some feels that confession is good for the soul, them I would whole-heatedly encourage them "spill their guts" on the list about their illegal surveillance equipment and activities. I would however point out that the list moderator will gladly testify before the Grand Jury when or if criminal charges are brought against the person who confesses. -jma PS: I only play one side of this business, and give no quarter, shelter, or forum to the opposition. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1115 From: Gregory Horton Date: Mon Aug 7, 2000 1:34pm Subject: Re: legal notice I think this is getting way out of hand. It didn't seem to me that anyone was really intending to jam anyone. It sounded like wishful thinking sort of like when I wish that I had a laser to flatten the tire of a motorist who just cut me off (now please don't launch into a discussion on the feasability of a hand-held laser to accomplish this!). Great discussions and humor such as Jims Tec Support jokes are what makes this discussion group outstanding. Lighten UP! gh 1116 From: James M. Atkinson, Comm-Eng Date: Mon Aug 7, 2000 1:40pm Subject: Re: legal notice At 11:34 AM -0700 8/7/00, Gregory Horton wrote: >I think this is getting way out of hand. It didn't seem to me that >anyone was really intending to jam anyone. It sounded like wishful >thinking sort of like when I wish that I had a laser to flatten the tire >of a motorist who just cut me off (now please don't launch into a >discussion on the feasability of a hand-held laser to accomplish >this!). Great discussions and humor such as Jims Tec Support jokes are >what makes this discussion group outstanding. Lighten UP! >gh Pray, would it be a BATF approved laser cannon, or an outlaw cannon? Personally I envisions Sidewinders being launched at people who cut me off, but it's a matter of personal taste. Just kidding folks, Yes, lets lighten things up a bit. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1117 From: Hoffman Date: Sun Aug 6, 2000 3:18pm Subject: Question: Audio interception in "Waco". I thought a listmember might be able to answer a mystery which has been gnawing at me for the longest time? Is anyone here privy to the details regarding how federal agents were able to install the microphone(s) which were used to intercept the audio at the Seventh Adventist Church (a.k.a. Waco)? Being that the conversations, to my knowledge, were intercepted on the top floor of the residence (please... please do not call it a ""compound"") that seems to limit the possibilities for installation. My theory has been that the microphones were simply shot into the building via a tear gas gun.... using a commercial transmitter which was likely disguised as a tear gas canister... If such a thing does not exist... it probably should because it seems as if it would come in handy in counterterrorist or hostage type scenarios.. You fire the canister in, containing the mike, and the people inside are none the wiser... because they just think the canister is a "dud" and simply ignore it, not realizing it is intercepting audio. hoffman@n... 1118 From: DrPepper Date: Sun Aug 6, 2000 9:31am Subject: Re: Cell-disturbing devices - self-inflicted tapping... You missed my point. Who died and make YOU king? It's not YOUR responsibility to decide who needs a cell phone and when.. =================================================== Miguel Puchol wrote: > OK, so then maybe I should go and try the thing in a hospital, ambulance > center, etc. - if I chose the train it was a)Because it has specifically > marked cellphone cabins with doors b)It also has public telephones c)As the > train is moving fast, there wasn't a chance that the device would be > disturbing a particular cell for more than 30 seconds and d)I could turn on > the device for spaces lasting 30 seconds, and off for some 5 to 10 minutes, > so if anybody had to call or there were emergency calls, they could sure be > made. > > I know perfectly well that what I did was illegal, and that these devices > are illegal, but I see many perfectly reasonable applications for them. > We've had at least 5 accidents at gas stations in Spain where it was proved > that a cellphone had interfered with the pump's circuitry, and two at > hospitals where life-support systems where interfered. > > I was only trying to test the device in the field, and I am SURE that no > harm was done. Just some people looking funny at their phones for some time. > > I have done this same journey with a cellphone connected to a laptop, > logging all cells we passed, which was a total of 214, and there was 20% of > the trip that the phone had very poor or no coverage. So, I don't think the > world could have come to an end by making this into 20.001%... > > A final comment, jamming transmissions is legal in some countries under > certain circumstances, like terrorist threats. I bet in the US a lot of > important people have jamming systems in their cars, and far more powerful > and wide-band that this taiwanese-thing. > Everyone has a right to their oppinion, and I accept and understand your > comments, but frankly I don't think it's such a big deal. > > All the best, > > Mike > > > -----Mensaje original----- > > De: DrPepper [mailto:DrPepper@i...] > > Enviado el: s·bado, 05 de agosto de 2000 15:42 > > Para: TSCM-L@egroups.com > > Asunto: Re: [TSCM-L] Cell-disturbing devices - self-inflicted tapping... > > > > > > While this type of technology always amazes and fascinates me, > > I must say > > that It is VERY arrogant of you to decide which phone calls are "urgent" > > and which ones just are an annoyance to yoiu. > > > > If I was on the train at the time and knew what you were doing. I > > would not > > only call the cops, but I'd sue the socks off you. Do you really > > think that it > > > > is acting like a "professional" to do such a thing? I consider it just as > > irresponsible, if not more so than the people who scream into rtheir cell > > phones at the top of their voices. Also, it is most definitly > > illegal to jam > > radio > > transmissions. > > > > Sorry, but attaboy here. > > > > Ron C. > > > > ===================================================== > > Miguel Puchol wrote: > > > > > Some more info on the device. > > > > > > Yesterday I had to visit a costumer, and since a high-speed train is > > > available I took this option (4-hour train ride versus 6-7 hour > > car drive), > > > and something I cannot stand is that, the train being equipped with > > > purpose-built cellphone cabins, so you can go and talk without > > disturbing > > > other travellers, some insist on screaming away their conversation while > > > everyone else tries to get some sleep. > > > > > > Sooooo...the device came in handy. I had to fiddle a bit to fit a 9-volt > > > battery in it, but it worked wonders. All the carriage I > > travelled in lost > > > cellphone coverage, but only up to the door, which meant that > > the cellphone > > > cabins were fine. I only ran the experiment some 30 minutes, as > > some of the > > > calls could be urgent. > > > > > > I think that with these kind of devices, properly licensed, and properly > > > marked areas, like non-smoking you could have non-cellphone, a lot of > > > aggravation could be spared. > > > > > > The device worked wonders from inside the car at close range, so if you > > > installed an external antenna and maybe some kind of power amplifier.... > > > > > > This thing is called 'WAC 1000 Wave Shield', nothing more to > > identify it's > > > origin. > > > > > > Best regards, > > > > > > Mike > > > > > > > -----Mensaje original----- > > > > De: rcwash@c... [mailto:rcwash@c...] > > > > Enviado el: jueves, 03 de agosto de 2000 22:14 > > > > Para: TSCM-L@egroups.com > > > > Asunto: RE: [TSCM-L] Cell-disturbing devices - self-inflicted > > tapping... > > > > > > > > > > > > > > > > Wow, a fantasy come true. > > > > > > > > I can't count how many times I've had to take evasive action > > > > on the highway because someone was more focused on their "cell" > > > > phone than on their driving. And how I've dreamed of a magic > > > > button which I could press to hang up their phone. Three times > > > > in a row and maybe they would give up and concentrate on driving? > > > > > > > > I know, illegal, immoral and the self-destructive idiots wouldn't > > > > give up anyway. > > > > > > > > But thanks for the dream. > > > > > > > > Bob Washburne - Who sometimes wonders, Hmmm...how would I do > > > > that?... > > > > > > > > --- Original Message --- > > > > "Miguel Puchol" Wrote on > > > > Thu, 3 Aug 2000 20:05:54 +0200 > > > > ------------------ > > > > Hi all, > > > > > > > > I came across a cellular phone 'disruptor'(to use Klingon terms) > > > > for some > > > > $140, which works rather well. Different cell bands are available, > > > > and up to > > > > three can be mixed in one device. > > > > Until now, the only reliable devices I've seen are made in Israel, > > > > but this > > > > one is straight out of Taiwan. There isn't a manufacturer's name > > > > anywhere on > > > > the device, so I can't provide more references. I now have to > > > > look at this > > > > thing with the SA, will keep posted. > > > > Could be useful (apart from illegal to use) in sensitive meetings, > > > > or to > > > > cure some of those self-inflicted wire tappings. > > > > It certainly disabled my GSM(900MHz) and DECT(1800MHz) phones. > > > > > > > > > > > > > > > > ----- > > > > Sent using MailStart.com ( http://MailStart.Com/welcome.html ) > > > > The FREE way to access your mailbox via any web browser, anywhere! > > > > > > > > > > > > > > > > > > > > > > > > ======================================================== > > > > TSCM-L Technical Security Mailing List > > > > "In a multitude of counselors there is strength" > > > > > > > > To subscribe to the TSCM-L mailing list visit: > > > > http://www.onelist.com/community/TSCM-L > > > > > > > > or email your subscription request to: > > > > subTSCM-L@t... > > > > =================================================== TSKS > > > > > > > > > > > > > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- - - - Dr Pepper, Also known as Ron Cheshire, WB6GKI, 35.37.26N/117.40.02W China Lake, CA USA ----------------------------- 90 miles West of Death Valley, 200 miles North of LAX ----------------------------- DrPepper@i... nannycams@i... - - - 1119 From: Pesach Lattin Date: Mon Aug 7, 2000 11:39am Subject: Re: List Demographics (Confession is good for the soul) All "ESIDs" (electronic surreptitious interception devices) are illegal in the United States except for Law Enforcement. You may not monitor or record anyone's conversation without permission. Thus it is illegal for non Law Enforcement to possess any of these devices. There are arrests made of "spy stores" by the US Secret Service all the time of people violating these laws. ---------------------------------------------------------------- Pesach Lattin, Computer Crime Specialist Voice Mail: (914) 818-3727 Fax: (240) 337-8339 Webmaster, Federal Law Enforcement Officers Association HQ: ph: (717) 938-2300 fax: (717) 932-2262 Visit our website @ http://www.fleoa.org ---------------------------------------------------------------- ----- Original Message ----- > Bug kits are freely available here in South Africa, openly advertised. > Building and posession is not a crime but operating a non-type approved > transmitter or operating on an unlicenced frequency may be. Some bands are > open to experimentation and non-licenced, non-type approved equipment, for > voice, signaling and data. > > Using such a device to monitor your child sleeping is legal - using the same > device to hear what Bill really said to Monica would be illegal under a > seperate Act dealing with the interception of communications. > > James, if TSCMers don't have access to test transmitters, particularly the > illegal ones that a buggist might use, how do you test your equipment or > demonstrate it to clients or students? 1120 From: B.K. DeLong Date: Mon Aug 7, 2000 9:17am Subject: Debunk WSJ article on TEMPEST Can anyone on this list debunk whether the technical information on TEMPEST in this article is correct? I thought TEMPEST technology was the act of blocking such emanations. Are the companies in this article legit? August 7, 2000 -------------------------------------------------------------------------- ---------------------------------------------------------------------------- ---- 'Tempest' Program Addresses Pentagon Worries Over Computer-Screen Spying By MICHAEL J. MCCARTHY Staff Reporter of THE WALL STREET JOURNAL When most computer users worry about privacy in the digital age, they wonder who's reading their e-mail or watching where they go online. But inside the U.S. government, security officials have a much greater fear: Is someone with the right surveillance equipment tuning in to what is on their computer monitors from a nearby office, or a floor below or even across the street? http://interactive.wsj.com/articles/SB965597027984161252.htm 1121 From: DrPepper Date: Mon Aug 7, 2000 11:57am Subject: Re: legal notice jma has it right! This is a public, albeit moderated, forum. anyone telling tales on themselves should be prepared for a knock on their door by men in uniforms. Remember, , , , , , , Ignorance can be cured, but stupidity is forever. :-} Also remember what happend to the Newt Gingrich phone call. ======================================== Dawn Star wrote: > "I would consider it to be most unwise to commit any mischief or to > confess to any kind of mischief on the list unless you have a really > serious belief in paying penance." > jma > > With this it seems you have served notice on us that we can no longer speak freely among > ourselves in confidence, security, and trust about our work and experiences. Kind of a human > "Carnivore" situation. Sad that our business is a victim of itself. > Roger Tolces, Electronic Security Company, Los Angeles > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- - - - Dr Pepper, Also known as Ron Cheshire, WB6GKI, 35.37.26N/117.40.02W China Lake, CA USA ----------------------------- 90 miles West of Death Valley, 200 miles North of LAX ----------------------------- DrPepper@i... nannycams@i... - - - 1122 From: Pesach Lattin Date: Mon Aug 7, 2000 5:53pm Subject: Re: legal notice "I just killed someone as part of my job" -- Someone Should we look the other way? Geesh ---------------------------------------------------------------- Pesach Lattin, Computer Crime Specialist Voice Mail: (914) 818-3727 Fax: (240) 337-8339 Webmaster, Federal Law Enforcement Officers Association HQ: ph: (717) 938-2300 fax: (717) 932-2262 Visit our website @ http://www.fleoa.org ---------------------------------------------------------------- ----- Original Message ----- From: Robert G. Ferrell To: Sent: Monday, August 07, 2000 9:50 AM Subject: Re: [TSCM-L] legal notice > >With this it seems you have served notice on us that we can no longer speak > >freely among ourselves in confidence, security, and trust about our work and > >experiences. Kind of a human "Carnivore" situation. Sad that our business is a > >victim of itself. > > Not at all. Jim is merely pointing out that law enforcement agents read this > list, not because they are looking for criminals (I hope) but because they are > interested in TSCM issues. If you admit to committing a crime on this list, > however, they aren't always going to be at liberty to 'look the other way.' > > Just use common sense. > > RGF > > > Robert G. Ferrell, CISSP > ======================================== > Who goeth without humor goeth unarmed. > ======================================== > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1123 From: Steve Uhrig Date: Mon Aug 7, 2000 3:26pm Subject: Re: Debunk WSJ article on TEMPEST Once upon a midnight dreary, B.K. DeLong pondered, weak and weary: > Can anyone on this list debunk whether the technical > information on TEMPEST in this article is correct? Much of it isn't. Media doesn't particularly care as long as it interests readers and ultimately sells papers. > Are the companies in this article legit? Codex aka Frank Jones aka Spyking is a convicted felon. The device described as being manufactured by him does not exist. Typical hyperbole the industry has come to expect of this crook. Strictly vaporware. It is quite simple to fake demos of this sort of thing, also to hide behind legal shields when/if asked to demo nonexistent products. Consider some basic science, physics, communications and electromagnetic theory, coupled with a dose of reality, and a lot of these science fiction articles fall apart, this one included. Deep deep down there once was a nugget of truth, but it has been distorted way out of perspective. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1124 From: Charles Patterson Date: Mon Aug 7, 2000 1:55pm Subject: Re: Test transmitters? > I've also built test transmitters for training using a > garage door opener remote control with a 555 pulser on it > to keep it kicking. Oh, so that was YOU making my garage door go crazy. (and to think, I thought it was that CBer next door...) ;) cp -- 1125 From: Miguel Puchol Date: Mon Aug 7, 2000 7:14pm Subject: Re: Cell-disturbing devices - self-inflicted tapping... I'm lucky I don't live in the U.S.... I admitted I used it once in a more or less controlled environment for testing purposes. If that's going to put me in jail, well..... Mike ----- Original Message ----- From: "Pesach Lattin" To: Sent: Sunday, August 06, 2000 6:44 PM Subject: Re: [TSCM-L] Cell-disturbing devices - self-inflicted tapping... > Agreed - on top of that, Mike is admitting on a public list that he > committed a federal crime. Not a smart thing to do since there are mutliple > people on this list who are federal officers who work in electronic crimes. > You have given probable cause for a search of your premises, and if the > device is found, arrest and proscecution. You have already admitted that you > use it. > > ---------------------------------------------------------------- > Pesach Lattin, Computer Crime Specialist > Voice Mail: (914) 818-3727 Fax: (240) 337-8339 > > Webmaster, Federal Law Enforcement Officers Association > HQ: ph: (717) 938-2300 fax: (717) 932-2262 > Visit our website @ http://www.fleoa.org > ---------------------------------------------------------------- > > > > ===================================================== > > > Miguel Puchol wrote: > > > > > > > Some more info on the device. > > > > > > > > Yesterday I had to visit a costumer, and since a high-speed train is > > > > available I took this option (4-hour train ride versus 6-7 hour car > drive), > > > > and something I cannot stand is that, the train being equipped with > > > > purpose-built cellphone cabins, so you can go and talk without > disturbing > > > > other travellers, some insist on screaming away their conversation > while > > > > everyone else tries to get some sleep. > > > > > > > > Sooooo...the device came in handy. I had to fiddle a bit to fit a > 9-volt > > > > battery in it, but it worked wonders. All the carriage I travelled in > lost > > > > cellphone coverage, but only up to the door, which meant that the > cellphone > > > > cabins were fine. I only ran the experiment some 30 minutes, as some > of the > > > > calls could be urgent. > > > > > > > > I think that with these kind of devices, properly licensed, and > properly > > > > marked areas, like non-smoking you could have non-cellphone, a lot of > > > > aggravation could be spared. > > > > > > > > The device worked wonders from inside the car at close range, so if > you > > > > installed an external antenna and maybe some kind of power > amplifier.... > > > > > > > > This thing is called 'WAC 1000 Wave Shield', nothing more to identify > it's > > > > origin. > > > > > > > > Best regards, > > > > > > > > Mike > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1126 From: Miguel Puchol Date: Mon Aug 7, 2000 7:28pm Subject: Re: List Demographics (Confession is good for the soul) All, I agree with Andy's statement, I think that some slack should be cut for TSCM specialists, even though I understand that you cannot make laws that apply to all but a few. Even so, I like to keep up with what technology has to offer, so that tomorrow I will be better prepared. All I wanted was to see what effectiveness this device had, maybe one day I'll find one hidden away somewhere...also gives you perspective for things to look for in the future. Also, I see nothing wrong in confessing small things like this. If none of you were allowed to ever speak about bugs you found - admit it, you NEVER took home a bug for a closer look, even if it was bought somewhere? That means operating it, and so stepping on the other side of the legal line. I now have one question. Next time I travel to the U.S. (a great country by the way, my first choice if I had to move), will I be arrested as soon as I step across the INS officer's line? Only joking :-) All the best, Mike ----- Original Message ----- From: "A Grudko" To: Sent: Monday, August 07, 2000 3:21 PM Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > ----- Original Message ----- > From: James M. Atkinson, Comm-Eng > > > Jamming a cellular telephone system is right up there with building > > bug kits... both are technically illegal, and both are activities > > which a legitimate TSCM'er should not engage in. > > Bug kits are freely available here in South Africa, openly advertised. > Building and posession is not a crime but operating a non-type approved > transmitter or operating on an unlicenced frequency may be. Some bands are > open to experimentation and non-licenced, non-type approved equipment, for > voice, signaling and data. > > Using such a device to monitor your child sleeping is legal - using the same > device to hear what Bill really said to Monica would be illegal under a > seperate Act dealing with the interception of communications. > > James, if TSCMers don't have access to test transmitters, particularly the > illegal ones that a buggist might use, how do you test your equipment or > demonstrate it to clients or students? > > Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime > investigation & intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 > 11) 465 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > Chairman), CITTF, > UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done > right - first time" > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1127 From: Date: Mon Aug 7, 2000 3:29pm Subject: Re: Cell-disturbing devices - self-inflicted tapping... In a message dated 8/7/00 5:22:05 PM Pacific Daylight Time, mpuchol@w... writes: << I admitted I used it once in a more or less controlled environment for testing purposes. >> No one is to be trusted, nothing is to be believed and anyone is capable of anything. 1128 From: Miguel Puchol Date: Mon Aug 7, 2000 7:34pm Subject: Re: Cell-disturbing devices - self-inflicted tapping... You missed my experiement's point also...i think ;-) > You missed my point. > Who died and make YOU king? > It's not YOUR responsibility to decide who needs a cell phone and when.. 1129 From: Miguel Puchol Date: Mon Aug 7, 2000 7:35pm Subject: Re: Cell-disturbing devices - self-inflicted tapping... Agreed > No one is to be trusted, nothing is to be believed and anyone is > capable of anything. 1130 From: James M. Atkinson, Comm-Eng Date: Mon Aug 7, 2000 7:41pm Subject: Re: List Demographics (Confession is good for the soul) At 9:39 AM -0700 8/7/00, Pesach Lattin wrote: > All "ESIDs" (electronic surreptitious interception devices) are illegal >in the United States except for Law Enforcement. You may not monitor or >record anyone's conversation without permission. Thus it is illegal for non >Law Enforcement to possess any of these devices. There are arrests made of >"spy stores" by the US Secret Service all the time of people violating these >laws. and now to complicate matters even more... A law enforcement office may only possess the device when actually acting under court orders, hold the device of evidence, and so on. It was explained to me and was compared it to a "Flash Bang"... just because someone is a cop does not mean he can have a case of flash bangs or blocks of C4 rolling around in the trunk of his car. Nor can the LEO fire off flash bangs or High-X at parties, bars, or back yards instead of fireworks. There is an appropriate time, place, and conditions for both items... and misuse or possession at inappropriate times could cause some serious legal problems for both the agency and the officer. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1131 From: James M. Atkinson, Comm-Eng Date: Mon Aug 7, 2000 7:57pm Subject: Re: legal notice At 9:57 AM -0700 8/7/00, DrPepper wrote: >jma has it right! > >This is a public, albeit moderated, forum. > >anyone telling tales on themselves should be >prepared for a knock on their door by men in uniforms. > >Remember, , , , , , , >Ignorance can be cured, but stupidity is forever. :-} > >Also remember what happend to the Newt Gingrich phone call. > >======================================== Ahem, Let me point out the following... The list is not actually moderated, but instead new members have to have all of their posts approved until they demonstrate that they know how to post, know how to be polite, how to be professional, and that they are not talking out their sphincter (it's amazing how many ventriloquists we have in the TSCM business). Generally, after a list member makes a few dozen posts I will toggle them to have posting privileges. About half of the list can post with out any restrictions, but the other half have yet to earn that right. Just so that everybody understands... I delete about one message per month and ban about one member every three or four weeks (but for the most part everything and everyone gets though). I know that with other security lists of this nature only about one post in five actually gets though to the list, so I am proud of the open and professional nature of this list (but don't piss me off). If you notice a delay of more then a few minutes when you post to the list it is probably because you are still in a moderated mode... If you feel that you should be toggled for "un-moderated posting" then post some more helpful materials a few times and you status will change. At one point the list was over 3700 members, but about a year and a half ago I purged everybody who I did not personally know to clear out some of the dead wood and lids, kids, cranks, and crackpots. I then moved the list to a fully automated mailing list server to reduce the amount of time I was spending each day trying to moderate it. -jma James M. Atkinson List Moderator and Owner =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1132 From: James M. Atkinson, Comm-Eng Date: Mon Aug 7, 2000 8:17pm Subject: Re: List Demographics (Confession is good for the soul) At 2:28 AM +0200 8/8/00, Miguel Puchol wrote: >All, > >I agree with Andy's statement, I think that some slack should be cut for >TSCM specialists, even though I understand that you cannot make laws that >apply to all but a few. Nope... Being familiar with TSCM does not result is special laws for the profession... in reality there are no "get out of jail free cards". >Even so, I like to keep up with what technology has to offer, so that >tomorrow I will be better prepared. That is good... but why do you need to play with a bug to know how to find it? Just food for thought... if you "don't know what it looks like" they you will be searching for anything, and when you find something out of place you will find it more suspect. On the other hand if you are only looking for XYZ then you will only find XYZ. It is a bit like only checking certain know bug frequencies... that's all well and good... but what are you missing between those frequencies? Let's say you have a couple of Cony bugs, and a couple of Sun-Mechatronics devices. If you spend all of your time hunting for those they you will miss the spread spectrum VLF devices, and the digital video transmitters at 33 GHz. It is critically important to check the entire spectrum, not just specific frequencies. It is also critically important to check for "anything out of the ordinary" not just look for specific devices. >All I wanted was to see what effectiveness this device had, maybe one day >I'll find one hidden away somewhere...also gives you perspective for things >to look for in the future. > >Also, I see nothing wrong in confessing small things like this. If none of >you were allowed to ever speak about bugs you found - admit it, you NEVER >took home a bug for a closer look, even if it was bought somewhere? That >means operating it, and so stepping on the other side of the legal line. I have never, and will never illegally possess or use an eavesdropping device, period. I would also take great offense to anybody who tries to insinuate otherwise. >I now have one question. Next time I travel to the U.S. (a great country by >the way, my first choice if I had to move), will I be arrested as soon as I >step across the INS officer's line? Only joking :-) You might not be arrested, but don't be surprised if the contents of your suitcase seem to have been gone though (seriously). You may also find it wise to wear clean underwear the next time you travel to/from the US (no kidding). >All the best, > >Mike -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1133 From: Rocco Rosano Date: Mon Aug 7, 2000 8:45pm Subject: Re: List Demographics (Confession is good for the soul) et al, I have to agree with jma! The professional ethics of TSCM almost dictates that "WE" assist each other in maintaining the integrity and the competence of the profession. "WE" should avoid even the appearance of professional impropriety. "WE" should encourage our kind to act in a manner that promotes public confidence in the integrity and efficiency of our professional services to the government, private individuals and corporate concerns. "WE" should exercise professional judgment that inspires confidence, in our decisions and recommendations. Yes, I have to agree with Jim on this one, without reservation. Rocco Rosano Reynoldsburg, Ohio 1134 From: Robert G. Ferrell Date: Tue Aug 8, 2000 9:09am Subject: Re: Question: Audio interception in "Waco". >Is anyone here privy to the details >regarding how federal agents were able >to install the microphone(s) which were >used to intercept the audio at the >Seventh Adventist Church (a.k.a. Waco)? I'm not at liberty to discuss it further, but that's not how it was done. It was much simpler and more subtle than that. Cheers, RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 1135 From: Miguel Puchol Date: Tue Aug 8, 2000 9:34am Subject: Re: List Demographics (Confession is good for the soul) James, > >Even so, I like to keep up with what technology has to offer, so that > >tomorrow I will be better prepared. > > That is good... but why do you need to play with a bug to know how to find it? > It is a bit like only checking certain know bug frequencies... that's > all well and good... but what are you missing between those > frequencies? It's not a matter of need, it's a matter of knowing your opponent's technology. If US laws are so restrictive as to not allow a professional to have what could be classed as tools of the trade, then I think that this seriously hinders discovery efforts. I think that in most other countries possesion of interception devices by countermeasures specialists would not be considered illegal - albeit using one could land you in jail. > It is critically important to check the entire spectrum, not just > specific frequencies. It is also critically important to check for > "anything out of the ordinary" not just look for specific devices. Agreed. > >Also, I see nothing wrong in confessing small things like this. If none of > >you were allowed to ever speak about bugs you found - admit it, you NEVER > >took home a bug for a closer look, even if it was bought somewhere? That > >means operating it, and so stepping on the other side of the legal line. > > I have never, and will never illegally possess or use an > eavesdropping device, period. I would also take great offense to > anybody who tries to insinuate otherwise. Please don't take my comments personally, the reply was addressed to 'all'. I don't attempt to accuse anyone. > >I now have one question. Next time I travel to the U.S. (a great country by > >the way, my first choice if I had to move), will I be arrested as soon as I > >step across the INS officer's line? Only joking :-) > > You might not be arrested, but don't be surprised if the contents of > your suitcase seem to have been gone though (seriously). > You may also find it wise to wear clean underwear the next time you > travel to/from the US (no kidding). If something like this can put someone in a 'black' or 'most wanted' list...never mind. I think I will dispose of the device in question (death by fire probably), and drop all this. As things are, I now know not to post any information at all that could lead to self-incrimination in one way or the other. Pity, in other countries people are allowed to speak more freely, without the fear that one could become an 'enemy of the state'. All the best, Mike 1136 From: Dawn Star Date: Tue Aug 8, 2000 11:00am Subject: Impedance analyzer for sale I have a L.E.A. De-Bug 360 telephone line impedance analyzer for sale. This unit was sold by Law Enforcement Associates (N.J.) in the nineteen eighties. It was designed specifically for TSCM telephone line analysis. Its internal oscillator tests the line at the following frequencies, 80hz,210hz,530hz,1.3khz, 3,3khz, and 8.3khz. A digital readout gives resultant numbers at each frequency. This unit is best used in a comparative mode checking the line under test and comparing the results to a random line feeding from the same C.O.. I have an original spec sheet I could fax if interested. I paid $1,000.00 for this unit so make me a fair offer. Roger Tolces, Electronic Security Co., Los Angeles [Non-text portions of this message have been removed] 1137 From: James M. Atkinson, Comm-Eng Date: Tue Aug 8, 2000 10:57am Subject: Examining the Oppositions Toys At 4:34 PM +0200 8/8/00, Miguel Puchol wrote: >James, > > > >Even so, I like to keep up with what technology has to offer, so that > > >tomorrow I will be better prepared. > > > > That is good... but why do you need to play with a bug to know how to find >it? > > It is a bit like only checking certain know bug frequencies... that's > > all well and good... but what are you missing between those > > frequencies? > >It's not a matter of need, it's a matter of knowing your opponent's >technology. If US laws are so restrictive as to not allow a professional to >have what could be classed as tools of the trade, then I think that this >seriously hinders discovery efforts. >I think that in most other countries possesion of interception devices by >countermeasures specialists would not be considered illegal - albeit using >one could land you in jail. [snip] Ok, but if you want to examine the oppositions toys then arrange to go to some place where they are not legally considered contraband and examine them there. For example you could fly to Japan, buy 30 device from Cony and Sun-Mech. take them to your hotel room and examine/photograph them with lab grade instruments (use a copper box and a dummy load so that you don't radiate a signal). After examining them you could then disconnect all of the components from the PCB, photograph the PCB and evaluate all of the components. You could then load all of the component parameters and PCB layout into a CAD or SPICE program for circuit simulation. Imagine having hundreds of such operational models inside a computer. At some later date you could simply pull up the device model, run the SPICE model, and cough up a quantitative model of what the signal looks like. You could then overlap hundreds or thousands of these models to create a "master model" and from that develop a formal method for dealing with hostile devices. Of course the only thing that you would bring back to the US would be the photographs, circuit diagrams, SPICE models, etc. At no time would you ever bring back any devices, parts of a device, or circuit boards. Now to take that one step further... Let's suppose that you know of a location where RF eavesdropping devices are built, sold, or demonstrated (such as a New York Spyshop or PI Trade Show). Then you could simply sit in a nearby vehicle or hotel room for several hours (or days) and ID the signals as they appear on the airwaves (it's helpful to use a high gain antenna). For a practical exercise do the following... Go to Radio Shack or your local department store and purchase 2-3 "Baby Monitors" (legal ones, that transmits over the power lines). Then perform a technical analysis, sketch out the schematic by hand, and so on. Photograph every component on the circuit board, the positions of every adjustable component, and the appearance of every connection, etc. Also photograph the markings that appear on anything (chips, caps, etc) Take lots of measurements with a SA and O'scope, and document every major signal in the boards or connected to any control. What frequency are they using, how is it developed, and what power levels are involved? Then remove every single component (desolder them) from the circuit board and measure each with a DVM and/or LCR meter. Add these measurements to the schematic you have drawn (and note the variations from the marked values). Now photograph both sides of the bare PCB, and include backlighting when possible. (then have your photo's blown up to 8*10 or 11*14) At this point you should have at least 100 pages of notes, a perfect schematic, and some really good pictures. Contact the manufacture of every components you can ID, and obtain the data or spec. sheet for it (and add it to your notes). Optionally you may want to reassemble the device based on your notes (let's see what you didn't record properly) Now contact the manufacture of the device and order the SERVICE manuals. When you get them compare THEIR schematic and parts list with yours. Did you correctly trace out the circuit? Did you get the voltages or signals correct? Did you miss a single screw, test point, piece of hardware, or jumper? Now repeat the above sequence until you can perfectly record the details of a simple product, and have a good understand as to how they operate. After a dozen of so projects of this nature (using cheap consumer devices) obtain several commercial wireless microphones (ie: Telex or EV) and repeat the sequence on these more sophisticated devices. For a real treat obtain several Wavecom or similar 2.4 GHz surface mount devices and analyze those in detail as well. After that you would be ready to haul some lab gear out into the field and examine some devices or signals "in the wild"... However, make damn sure that the possession of such devices is completely legal in the country you are visiting. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1138 From: A Grudko Date: Tue Aug 8, 2000 0:38pm Subject: Re: Test transmitters? ----- Original Message ----- From: Charles Patterson > Oh, so that was YOU making my garage door go crazy. (and to think, I > thought it was that CBer next door...) Do you guys still have 27Mhz CB? It's dead here. We only had 9 ch licensed, not 40. I still have a licence and listen to the SSB skip. Andy ZRAJ7795 since 1980 1139 From: A Grudko Date: Tue Aug 8, 2000 0:59pm Subject: Confession - humour + time out ----- Original Message ----- > You may also find it wise to wear clean underwear the next time you > travel to/from the US (no kidding). > -jma Ah, yes, the old 'Homer Simpson Statute' of '96. Now we know why Sharon Stone didn't wear underware when interviewed... I'll be a bit quiet for the next 2 weeks as I have a retd. British Airways Comms/Data expert, Paul Matthews, G4AWZ, and family staying. I'll be taking him to a couple of TSCM suppliers here and to some other facilities like the CSIR/Telkom/NASA satilite station at Hertebeeshoek. Andy 1140 From: A Grudko Date: Tue Aug 8, 2000 3:03pm Subject: Re: Debunk WSJ article on TEMPEST ----- Original Message ----- > Can anyone on this list debunk whether the technical information on TEMPEST in this article is correct? I thought TEMPEST technology was the act of blocking such emanations. Are the companies in this article legit? ---------------------------- > Is someone with the right surveillance equipment tuning in to what is on their > computer monitors from a nearby office, or a floor below or even across the > street? B.K. - The simple answer in my experience is yes.....and no (I knew I should have been in politics). TEMPEST is not the blocking but the reception of RF emmissions from computers/periferals. Most computers carry FCC RF interference warning tags. Guess why... Most RF TSCM equipment reacts in the presence of a powered up PC. I love it when a trainee 'debugger' gets excited when he gets a ' suspicious signal' from a PC that has 'Intel Inside - 550Mhz' obviously emblazoned on the cover! At least he might be about to learn something (the 550Mhz should be an itsibitzi clue). But if he picks up the many RF emmissions that come from a PC and looks at the client with a 'Bill Murray' smile and says 'Don't worry - that's ormal' - I worry. We successfully experimented about 6 years ago with TEMPEST, which involves nothing more than a 'suitable' antenna, 'suitable' tuner (sensitivity in that case was 12dBSINAD, - 16dbu), a variable sync-pulse generator and a black & white (PAL) TV (never could get a colour pic!). I say 'suitable' because I'm unsure where the boundaries of acceptable technical info. are for a US based list. I'm happy to enter into private corrispondance with anyone as none of my experiments have broken South African law. The bad news TSCMers is; TEMPEST WORKS on a standard PC. We got a live 'wireless' clone of the screen in B&W, which could be fed into a VCR. The good news; Under workshop conditions - standard PC - no extra case or cable screening Max. range line of sight with 'suitable' antenna - 13 mtrs to below acceptable noise But, Add earthed PC case, range drops to 4 mtrs Add extra cable/connector screening, range < 1 Mtr So unless the spy can park a van full of equipment in the next office, a client has little to worry about. If there are other PCs in the immediate area the resultant interference means the spy gets extra noise, so less usable range; and if the client wraps tinfoil on the back of his PC (I think some governments have a slightly more sophisticated specification) he really has nothing to fear. There many other ways to capture PC data. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1141 From: A Grudko Date: Tue Aug 8, 2000 3:17pm Subject: WSJ article on TEMPEST ----- Original Message ----- > Can anyone on this list debunk whether the technical information on TEMPEST in this article is correct? I thought TEMPEST technology was the act of blocking such emanations. Are the companies in this article legit? ---------------------------- > Is someone with the right surveillance equipment tuning in to what is on their > computer monitors from a nearby office, or a floor below or even across the > street? B.K. - The simple answer in my experience is yes.....and no (I knew I should have been in politics). TEMPEST is not the blocking but the reception of RF emmissions from computers/periferals. Most computers carry FCC RF interference warning tags. Guess why... Most RF TSCM equipment reacts in the presence of a powered up PC. I love it when a trainee 'debugger' gets excited when he gets a ' suspicious signal' from a PC that has 'Intel Inside - 550Mhz' obviously emblazoned on the cover! At least he might be about to learn something (the 550Mhz should be an itsibitzi clue). But if he picks up the many RF emmissions that come from a PC and looks at the client with a 'Bill Murray' smile and says 'Don't worry - that's ormal' - I worry. We successfully experimented about 6 years ago with TEMPEST, which involves nothing more than a 'suitable' antenna, 'suitable' tuner (sensitivity in that case was 12dBSINAD, - 16dbu), a variable sync-pulse generator and a black & white (PAL) TV (never could get a colour pic!). I say 'suitable' because I'm unsure where the boundaries of acceptable technical info. are for a US based list. I'm happy to enter into private corrispondance with anyone as none of my experiments have broken South African law. The bad news TSCMers is; TEMPEST WORKS on a standard PC. We got a live 'wireless' clone of the screen in B&W, which could be fed into a VCR. The good news; Under workshop conditions - standard PC - no extra case or cable screening Max. range line of sight with 'suitable' antenna - 13 mtrs to below acceptable noise But, Add earthed PC case, range drops to 4 mtrs Add extra cable/connector screening, range < 1 Mtr So unless the spy can park a van full of equipment in the next office, a client has little to worry about. If there are other PCs in the immediate area the resultant interference means the spy gets extra noise, so less usable range; and if the client wraps tinfoil on the back of his PC (I think some governments have a slightly more sophisticated specification) he really has nothing to fear. As a surveillance tool I think this goes high on the 'wish list', low on reality. There many other ways to capture PC data. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" From: James M. Atkinson, Comm-Eng Date: Tue Aug 8, 2000 4:15pm Subject: Re: WSJ article on TEMPEST TEMPEST is a subset of the EMSEC program with includes TEAPOT, NONSTOP, SKIPJACK, STEERAGE, TSCM and a dozen other related acronyms. In a nutshell TEMPEST deals with "Shielding, Bonding, and Grounding"... not the actual interception of signals (It deals with blocking the signal... period). Generally if you can get the antenna INSIDE the Magnetic "Near Field" you should be able to get a decent signal, but your talking about being within just a few feet of the monitor (and getting really lucky). Now grabbing E-field "Far Field" signals at any distance is going to be tough, and simple physics shows us why. The wider the signal bandwidth, the high the noise, and the higher the noise the faster you "lose the signal in the noise". Of course you can use a high gain antenna, and preamp/filter the daylights out of it but you end up with a huge log periodic antenna to do so (which is non too covert). All you really need to is two signal generators, an O'scope with a Z-axis input, and a simple AGC circuit in a broadband tuner. What this does is let you perform RAID or raster analysis of a repeating signal (Marty's RAS-515 is a good example) -jma At 10:17 PM +0200 8/8/00, A Grudko wrote: >----- Original Message ----- > > Can anyone on this list debunk whether the technical information on >TEMPEST in this article is correct? I thought TEMPEST technology was the >act of blocking such emanations. Are the companies in this article legit? > ---------------------------- > > Is someone with the right surveillance equipment tuning in to what is on >their > > computer monitors from a nearby office, or a floor below or even across >the > > street? > > >B.K. - The simple answer in my experience is yes.....and no (I knew I should >have been in politics). > >TEMPEST is not the blocking but the reception of RF emmissions from >computers/periferals. Most computers carry FCC RF interference warning tags. >Guess why... > >Most RF TSCM equipment reacts in the presence of a powered up PC. I love it >when a trainee 'debugger' gets excited when he gets a ' suspicious signal' >from a PC that has 'Intel Inside - 550Mhz' obviously emblazoned on the >cover! At least he might be about to learn something (the 550Mhz should be >an itsibitzi clue). > >But if he picks up the many RF emmissions that come from a PC and looks at >the client with a 'Bill Murray' smile and says 'Don't worry - that's >ormal' - I worry. > >We successfully experimented about 6 years ago with TEMPEST, which involves >nothing more than a 'suitable' antenna, 'suitable' tuner (sensitivity in >that case was 12dBSINAD, - 16dbu), a variable sync-pulse generator and a >black & white (PAL) TV (never could get a colour pic!). > >I say 'suitable' because I'm unsure where the boundaries of acceptable >technical info. are for a US based list. I'm happy to enter into private >corrispondance with anyone as none of my experiments have broken South >African law. > >The bad news TSCMers is; > >TEMPEST WORKS > >on a standard PC. We got a live 'wireless' clone of the screen in B&W, which >could be fed into a VCR. > >The good news; > Under workshop conditions - standard PC - no extra case or cable screening > Max. range line of sight with 'suitable' antenna - 13 mtrs to below >acceptable noise >But, > Add earthed PC case, range drops to 4 mtrs > Add extra cable/connector screening, range < 1 Mtr > >So unless the spy can park a van full of equipment in the next office, a >client has little to worry about. If there are other PCs in the immediate >area the resultant interference means the spy gets extra noise, so less >usable range; and if the client wraps tinfoil on the back of his PC (I think >some governments have a slightly more sophisticated specification) he really >has nothing to fear. > >As a surveillance tool I think this goes high on the 'wish list', low on >reality. > >There many other ways to capture PC data. > >Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime >investigation & intelligence >Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - >Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 >11) 465 9673 - 465 1487 (Fax) - Est. 1981 >GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA >Chairman), CITTF, >UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done >right - first time" > =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1143 From: Pesach Lattin Date: Mon Aug 7, 2000 6:06pm Subject: Re: Cell-disturbing devices - self-inflicted tapping... Agreed - if it is ILLEGAL, it is ILLEGAL. Someone who is engaged in any field, especially one that is somewhat affiliated with LE shouldn't have this attitude. ---------------------------------------------------------------- Pesach Lattin, Computer Crime Specialist Voice Mail: (914) 818-3727 Fax: (240) 337-8339 Webmaster, Federal Law Enforcement Officers Association HQ: ph: (717) 938-2300 fax: (717) 932-2262 Visit our website @ http://www.fleoa.org ---------------------------------------------------------------- ----- Original Message ----- From: DrPepper To: Sent: Sunday, August 06, 2000 7:31 AM Subject: Re: [TSCM-L] Cell-disturbing devices - self-inflicted tapping... > You missed my point. > Who died and make YOU king? > It's not YOUR responsibility to decide who needs a cell phone and when.. > > =================================================== > > Miguel Puchol wrote: > > > OK, so then maybe I should go and try the thing in a hospital, ambulance > > center, etc. - if I chose the train it was a)Because it has specifically > > marked cellphone cabins with doors b)It also has public telephones c)As the > > train is moving fast, there wasn't a chance that the device would be > > disturbing a particular cell for more than 30 seconds and d)I could turn on > > the device for spaces lasting 30 seconds, and off for some 5 to 10 minutes, > > so if anybody had to call or there were emergency calls, they could sure be > > made. > > > > I know perfectly well that what I did was illegal, and that these devices > > are illegal, but I see many perfectly reasonable applications for them. > > We've had at least 5 accidents at gas stations in Spain where it was proved > > that a cellphone had interfered with the pump's circuitry, and two at > > hospitals where life-support systems where interfered. > > > > I was only trying to test the device in the field, and I am SURE that no > > harm was done. Just some people looking funny at their phones for some time. > > > > I have done this same journey with a cellphone connected to a laptop, > > logging all cells we passed, which was a total of 214, and there was 20% of > > the trip that the phone had very poor or no coverage. So, I don't think the > > world could have come to an end by making this into 20.001%... > > > > A final comment, jamming transmissions is legal in some countries under > > certain circumstances, like terrorist threats. I bet in the US a lot of > > important people have jamming systems in their cars, and far more powerful > > and wide-band that this taiwanese-thing. > > Everyone has a right to their oppinion, and I accept and understand your > > comments, but frankly I don't think it's such a big deal. > > > > All the best, > > > > Mike > > > > > -----Mensaje original----- > > > De: DrPepper [mailto:DrPepper@i...] > > > Enviado el: s·bado, 05 de agosto de 2000 15:42 > > > Para: TSCM-L@egroups.com > > > Asunto: Re: [TSCM-L] Cell-disturbing devices - self-inflicted tapping... > > > > > > > > > While this type of technology always amazes and fascinates me, > > > I must say > > > that It is VERY arrogant of you to decide which phone calls are "urgent" > > > and which ones just are an annoyance to yoiu. > > > > > > If I was on the train at the time and knew what you were doing. I > > > would not > > > only call the cops, but I'd sue the socks off you. Do you really > > > think that it > > > > > > is acting like a "professional" to do such a thing? I consider it just as > > > irresponsible, if not more so than the people who scream into rtheir cell > > > phones at the top of their voices. Also, it is most definitly > > > illegal to jam > > > radio > > > transmissions. > > > > > > Sorry, but attaboy here. > > > > > > Ron C. > > > > > > ===================================================== > > > Miguel Puchol wrote: > > > > > > > Some more info on the device. > > > > > > > > Yesterday I had to visit a costumer, and since a high-speed train is > > > > available I took this option (4-hour train ride versus 6-7 hour > > > car drive), > > > > and something I cannot stand is that, the train being equipped with > > > > purpose-built cellphone cabins, so you can go and talk without > > > disturbing > > > > other travellers, some insist on screaming away their conversation while > > > > everyone else tries to get some sleep. > > > > > > > > Sooooo...the device came in handy. I had to fiddle a bit to fit a 9-volt > > > > battery in it, but it worked wonders. All the carriage I > > > travelled in lost > > > > cellphone coverage, but only up to the door, which meant that > > > the cellphone > > > > cabins were fine. I only ran the experiment some 30 minutes, as > > > some of the > > > > calls could be urgent. > > > > > > > > I think that with these kind of devices, properly licensed, and properly > > > > marked areas, like non-smoking you could have non-cellphone, a lot of > > > > aggravation could be spared. > > > > > > > > The device worked wonders from inside the car at close range, so if you > > > > installed an external antenna and maybe some kind of power amplifier.... > > > > > > > > This thing is called 'WAC 1000 Wave Shield', nothing more to > > > identify it's > > > > origin. > > > > > > > > Best regards, > > > > > > > > Mike > > > > > > > > > -----Mensaje original----- > > > > > De: rcwash@c... [mailto:rcwash@c...] > > > > > Enviado el: jueves, 03 de agosto de 2000 22:14 > > > > > Para: TSCM-L@egroups.com > > > > > Asunto: RE: [TSCM-L] Cell-disturbing devices - self-inflicted > > > tapping... > > > > > > > > > > > > > > > > > > > > Wow, a fantasy come true. > > > > > > > > > > I can't count how many times I've had to take evasive action > > > > > on the highway because someone was more focused on their "cell" > > > > > phone than on their driving. And how I've dreamed of a magic > > > > > button which I could press to hang up their phone. Three times > > > > > in a row and maybe they would give up and concentrate on driving? > > > > > > > > > > I know, illegal, immoral and the self-destructive idiots wouldn't > > > > > give up anyway. > > > > > > > > > > But thanks for the dream. > > > > > > > > > > Bob Washburne - Who sometimes wonders, Hmmm...how would I do > > > > > that?... > > > > > > > > > > --- Original Message --- > > > > > "Miguel Puchol" Wrote on > > > > > Thu, 3 Aug 2000 20:05:54 +0200 > > > > > ------------------ > > > > > Hi all, > > > > > > > > > > I came across a cellular phone 'disruptor'(to use Klingon terms) > > > > > for some > > > > > $140, which works rather well. Different cell bands are available, > > > > > and up to > > > > > three can be mixed in one device. > > > > > Until now, the only reliable devices I've seen are made in Israel, > > > > > but this > > > > > one is straight out of Taiwan. There isn't a manufacturer's name > > > > > anywhere on > > > > > the device, so I can't provide more references. I now have to > > > > > look at this > > > > > thing with the SA, will keep posted. > > > > > Could be useful (apart from illegal to use) in sensitive meetings, > > > > > or to > > > > > cure some of those self-inflicted wire tappings. > > > > > It certainly disabled my GSM(900MHz) and DECT(1800MHz) phones. > > > > > > > > > > > > > > > > > > > > ----- > > > > > Sent using MailStart.com ( http://MailStart.Com/welcome.html ) > > > > > The FREE way to access your mailbox via any web browser, anywhere! > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ======================================================== > > > > > TSCM-L Technical Security Mailing List > > > > > "In a multitude of counselors there is strength" > > > > > > > > > > To subscribe to the TSCM-L mailing list visit: > > > > > http://www.onelist.com/community/TSCM-L > > > > > > > > > > or email your subscription request to: > > > > > subTSCM-L@t... > > > > > =================================================== TSKS > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ======================================================== > > > > TSCM-L Technical Security Mailing List > > > > "In a multitude of counselors there is strength" > > > > > > > > To subscribe to the TSCM-L mailing list visit: > > > > http://www.onelist.com/community/TSCM-L > > > > > > > > or email your subscription request to: > > > > subTSCM-L@t... > > > > =================================================== TSKS > > > > > > > > > > > > > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > -- > - - - > Dr Pepper, > Also known as > Ron Cheshire, WB6GKI, > 35.37.26N/117.40.02W > China Lake, CA USA > ----------------------------- > 90 miles West of Death Valley, > 200 miles North of LAX > ----------------------------- > DrPepper@i... > nannycams@i... > - - - > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1144 From: Pesach Lattin Date: Mon Aug 7, 2000 11:03pm Subject: Re: List Demographics (Confession is good for the soul) I don't think that is 100% true. Many agencies/departments have specialists whose job is to install and use these. They are in constant possession of them. We have several nice little bugs in pens sitting around that were seized. You are nice enough to have the laws on your site: http://www.tscm.com/USC18_119.html ---------------------------------------------------------------- Pesach Lattin, Computer Crime Specialist Voice Mail: (914) 818-3727 Fax: (240) 337-8339 Webmaster, Federal Law Enforcement Officers Association HQ: ph: (717) 938-2300 fax: (717) 932-2262 Visit our website @ http://www.fleoa.org ---------------------------------------------------------------- > and now to complicate matters even more... > > A law enforcement office may only possess the device when actually > acting under court orders, hold the device of evidence, and so on. > > It was explained to me and was compared it to a "Flash Bang"... just > because someone is a cop does not mean he can have a case of flash > bangs or blocks of C4 rolling around in the trunk of his car. Nor can > the LEO fire off flash bangs or High-X at parties, bars, or back > yards instead of fireworks. > > There is an appropriate time, place, and conditions for both items... > and misuse or possession at inappropriate times could cause some > serious legal problems for both the agency and the officer. > > -jma > > > =================================================================== > Everybody's into computers... Who's into yours?Å > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Lizard, The Other White Meat > =================================================================== > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1145 From: DrPepper Date: Tue Aug 8, 2000 8:56am Subject: Re: legal notice Hhmmmmm! Well, that sounds like "moderated" to me, , , , , , , , ================================ "James M. Atkinson, Comm-Eng" wrote: > At 9:57 AM -0700 8/7/00, DrPepper wrote: > >jma has it right! > > > >This is a public, albeit moderated, forum. > > > >anyone telling tales on themselves should be > >prepared for a knock on their door by men in uniforms. > > > >Remember, , , , , , , > >Ignorance can be cured, but stupidity is forever. :-} > > > >Also remember what happend to the Newt Gingrich phone call. > > > >======================================== > > Ahem, > > Let me point out the following... > > The list is not actually moderated, but instead new members have to > have all of their posts approved until they demonstrate that they > know how to post, know how to be polite, how to be professional, and > that they are not talking out their sphincter (it's amazing how many > ventriloquists we have in the TSCM business). > > Generally, after a list member makes a few dozen posts I will toggle > them to have posting privileges. About half of the list can post with > out any restrictions, but the other half have yet to earn that right. > > Just so that everybody understands... I delete about one message per > month and ban about one member every three or four weeks (but for the > most part everything and everyone gets though). > > I know that with other security lists of this nature only about one > post in five actually gets though to the list, so I am proud of the > open and professional nature of this list (but don't piss me off). > > If you notice a delay of more then a few minutes when you post to the > list it is probably because you are still in a moderated mode... If > you feel that you should be toggled for "un-moderated posting" then > post some more helpful materials a few times and you status will > change. > > At one point the list was over 3700 members, but about a year and a > half ago I purged everybody who I did not personally know to clear > out some of the dead wood and lids, kids, cranks, and crackpots. I > then moved the list to a fully automated mailing list server to > reduce the amount of time I was spending each day trying to moderate > it. > > -jma > > James M. Atkinson > List Moderator and Owner > > =================================================================== > Everybody's into computers... Who's into yours?Å > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Lizard, The Other White Meat > =================================================================== > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- - - - Dr Pepper, Also known as Ron Cheshire, WB6GKI, 35.37.26N/117.40.02W China Lake, CA USA ----------------------------- 90 miles West of Death Valley, 200 miles North of LAX ----------------------------- DrPepper@i... nannycams@i... - - - 1146 From: Pesach Lattin Date: Mon Aug 7, 2000 6:09pm Subject: Re: Question: Audio interception in "Waco". From what I remember, they were already installed. Also, you don't need a bug to get good reception. I have a very nice "umbrella" that works just fine. It had nothing to do with Seventh "day" Adventist Church, AFAIK. ---------------------------------------------------------------- Pesach Lattin, Computer Crime Specialist Voice Mail: (914) 818-3727 Fax: (240) 337-8339 Webmaster, Federal Law Enforcement Officers Association HQ: ph: (717) 938-2300 fax: (717) 932-2262 Visit our website @ http://www.fleoa.org ---------------------------------------------------------------- ----- Original Message ----- From: Hoffman To: Sent: Sunday, August 06, 2000 1:18 PM Subject: [TSCM-L] Question: Audio interception in "Waco". > I thought a listmember might be able > to answer a mystery which has been > gnawing at me for the longest time? > > Is anyone here privy to the details > regarding how federal agents were able > to install the microphone(s) which were > used to intercept the audio at the > Seventh Adventist Church (a.k.a. Waco)? > > Being that the conversations, to my knowledge, > were intercepted on the top floor of the residence > (please... please do not call it a ""compound"") > that seems to limit the possibilities for installation. > > My theory has been that the microphones were > simply shot into the building via a tear gas > gun.... using a commercial transmitter which > was likely disguised as a tear gas canister... > > If such a thing does not exist... it probably > should because it seems as if it would come > in handy in counterterrorist or hostage type > scenarios.. You fire the canister in, containing > the mike, and the people inside are none the > wiser... because they just think the canister > is a "dud" and simply ignore it, not realizing > it is intercepting audio. > > hoffman@n... > > 1147 From: Pesach Lattin Date: Mon Aug 7, 2000 11:29pm Subject: Re: List Demographics (Confession is good for the soul) To add to these great points -- even if you are a specialist, you are not law enforcement. Most civilized countries do not have laws that state "knowledge of illegal items gives right to possess." I don not believe anyone can argue otherwise, except those who want to play with "neat" toys. ---------------------------------------------------------------- Pesach Lattin, Computer Crime Specialist Voice Mail: (914) 818-3727 Fax: (240) 337-8339 Webmaster, Federal Law Enforcement Officers Association HQ: ph: (717) 938-2300 fax: (717) 932-2262 Visit our website @ http://www.fleoa.org ---------------------------------------------------------------- ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: Sent: Monday, August 07, 2000 6:17 PM Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > At 2:28 AM +0200 8/8/00, Miguel Puchol wrote: > >All, > > > >I agree with Andy's statement, I think that some slack should be cut for > >TSCM specialists, even though I understand that you cannot make laws that > >apply to all but a few. > > > Nope... Being familiar with TSCM does not result is special laws for > the profession... in reality there are no "get out of jail free > cards". > > > >Even so, I like to keep up with what technology has to offer, so that > >tomorrow I will be better prepared. > > > That is good... but why do you need to play with a bug to know how to find it? > > Just food for thought... if you "don't know what it looks like" they > you will be searching for anything, and when you find something out > of place you will find it more suspect. On the other hand if you are > only looking for XYZ then you will only find XYZ. > > It is a bit like only checking certain know bug frequencies... that's > all well and good... but what are you missing between those > frequencies? > > Let's say you have a couple of Cony bugs, and a couple of > Sun-Mechatronics devices. If you spend all of your time hunting for > those they you will miss the spread spectrum VLF devices, and the > digital video transmitters at 33 GHz. > > It is critically important to check the entire spectrum, not just > specific frequencies. It is also critically important to check for > "anything out of the ordinary" not just look for specific devices. > You might not be arrested, but don't be surprised if the contents of > your suitcase seem to have been gone though (seriously). > > You may also find it wise to wear clean underwear the next time you > travel to/from the US (no kidding). > > > >All the best, > > > >Mike > > > -jma > > > =================================================================== > Everybody's into computers... Who's into yours?Å > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Lizard, The Other White Meat > =================================================================== > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1148 From: Agent_X Date: Mon Aug 7, 2000 7:47pm Subject: Re: Question: Audio interception in "Waco". >I thought a listmember might be able >to answer a mystery which has been >gnawing at me for the longest time? > >Is anyone here privy to the details >regarding how federal agents were able >to install the microphone(s) which were >used to intercept the audio at the >Seventh Adventist Church (a.k.a. Waco)? > >Being that the conversations, to my knowledge, >were intercepted on the top floor of the residence >(please... please do not call it a ""compound"") >that seems to limit the possibilities for installation. > >My theory has been that the microphones were >simply shot into the building via a tear gas >gun.... using a commercial transmitter which >was likely disguised as a tear gas canister... > >If such a thing does not exist... it probably >should because it seems as if it would come >in handy in counterterrorist or hostage type >scenarios.. You fire the canister in, containing >the mike, and the people inside are none the >wiser... because they just think the canister >is a "dud" and simply ignore it, not realizing >it is intercepting audio. To the best of my knowledge the microphone, transmitter etc was embedded inside the Styrofoam packing forms that was used as coolers for milk that was shipped in to the "residence". This milk was present per the request of the occupants of said residence. As a side note any Tear Gas/CS gas canister that should fly into my presence that doesn't go off would most likely not stick around very long. -- Agent X PGP Keys available by request. PGP Fingerprint (6.5.2) : 1953 A923 9B1F C710 5C94 AE05 E0BA F51F E9B6 AD85 PGP Fingerprint (2.6.2): 8C 9A BE D5 41 3F 96 C8 D2 8C 1D B1 5F 59 55 FF 1149 From: David Mitchell Date: Tue Aug 8, 2000 0:06am Subject: Introduction Hello list members. My name is Craig Hartley, I am currently a student studying for my diploma in electrical engineering. I became interested in TSCM, while I was working for a security company in New Zealand, and was asked to assisted in a sweep. I have visited Mr Atkinson's home page and found what is required to work towards a career in TSCM. I would like to point out that I am not a fly by night person, and that I understand the hard road that I am taking. I would like to thank Mr Atkinson for the opportunity to become a list member. Any suggestions, ideas may be gratefully appreciated on a career in TSCM. Many thanks Craig Hartley Kougar@W... Sent by Webmail.net.nz. The way of the future. 1150 From: matson_assoc Date: Tue Aug 8, 2000 8:46pm Subject: UNSUBSCRIBE Please unsubscribe matson_assoc@c.... Thank you. Sam Matson 1151 From: Date: Tue Aug 8, 2000 6:03pm Subject: Re: UNSUBSCRIBE In a message dated 8/8/00 7:12:03 PM Pacific Daylight Time, murray@s... writes: << Wonder how he got on the mailing list, and why he now wants off? >> chuwa - clueless horny sweeper wannabe 1152 From: Date: Tue Aug 8, 2000 6:04pm Subject: Re: UNSUBSCRIBE correction CHUSWA 1153 From: Date: Tue Aug 8, 2000 6:07pm Subject: Re: UNSUBSCRIBE My apologies to the list. That response was meant to be private. Sincere remorse for the post. 1154 From: Rocco Rosano Date: Tue Aug 8, 2000 11:31pm Subject: Re: Introduction Craig Welcome to the list. Suggestions? If you know jma, then you probably have had the grand tour. Installing a clandestine surveillance package (CSD/CSP) is to planting a surveillance device, as cabinet making is to carpentry. While they use similar technologies, one is an art form while the other is more of a mechanic. Thus, the true TSCM Agent is an art critic that is capable of thinking in an asymmetrical fashion, while the other is not so critical a thinker. Rocco Rosano Ryenoldsburg, Ohio David Mitchell wrote: > Hello list members. > > My name is Craig Hartley, I am currently a student studying for my > diploma in electrical engineering. > > I became interested in TSCM, while I was working for a security > company in New Zealand, and was asked to assisted in a sweep. > > I have visited Mr Atkinson's home page and found what is required to > work towards a career in TSCM. I would like to point out that I am > not a fly by night person, and that I understand the hard road that I > am taking. > > I would like to thank Mr Atkinson for the opportunity to become a > list member. > > Any suggestions, ideas may be gratefully appreciated on a career in > TSCM. > > Many thanks > Craig Hartley > > Kougar@W... > > Sent by Webmail.net.nz. > The way of the future. > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 1155 From: Robert G. Ferrell Date: Wed Aug 9, 2000 7:49am Subject: Re: Introduction >My name is Craig Hartley, I am currently a student studying for my >diploma in electrical engineering. Hi Craig, and welcome. If you are serious about putting in the years of training and experience it takes to be a true professional in this field, you'll be doing not only yourself but the rest of the planet a bona fide service. There are so many people who call themselves TSCM experts, and so few who actually are. Be one of the few, not the many. I'm not a TSCM practitioner myself, by the way, but merely an interested observer who greatly respects the level of expertise present on this list. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U.S. Dept. of the Interior Robert_G_Ferrell@n... 1156 From: Miguel Puchol Date: Wed Aug 9, 2000 8:03am Subject: Re: List Demographics (Confession is good for the soul) In many countries the device itself is not illegal, what is illegal is it's use. In the US laws are particularly restrictive in this aspect. Mike ----- Original Message ----- From: "Pesach Lattin" To: Sent: Tuesday, August 08, 2000 6:29 AM Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > To add to these great points -- even if you are a specialist, you are > not law enforcement. Most civilized countries do not have laws that state > "knowledge of illegal items gives right to possess." I don not believe > anyone can argue otherwise, except those who want to play with "neat" toys. 1157 From: Mike F Date: Wed Aug 9, 2000 8:19am Subject: Flaws in Netscape, Here is the Link 4 the story about Netscapes flaws. http://cgi.zdnet.com/slink?/adeskb/adt0809/2613194:932881 NETSCAPE FLAW REVEALS YOUR DATA. "Brown Orifice" lets some Web sites view contents of victims' hard drives. L8R4,Mike f. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 1158 From: Dawn Star Date: Wed Aug 9, 2000 10:11am Subject: Re: List Demographics "As things are, I now know not to post any information at all that could lead to self-incrimination in one way or the other. Pity, in other countries people are allowed to speak more freely, without the fear that one could become an 'enemy of the state'." All the best, Mike Puchol Mike, After your comment here, I think you can see why I made the statement last week that TSCM should not be about money but about preserving our freedom of speech and privacy as guaranteed by our fourth and fifth amendments to our national constitution. Roger Tolces, Electronic Security Co., Los Angeles [Non-text portions of this message have been removed] 1159 From: Pesach Lattin Date: Wed Aug 9, 2000 11:17am Subject: Re: List Demographics (Confession is good for the soul) Yeah, because people tend not to possess illegal things for collection purposes. If the sole function of a device is to do something illegal, it only makes sense to make the device illegal. It's like claiming you are having cocaine only for asthetic reasons, as it looks really good on a mirror next to a razorblade. Citizens of the US have an expectation of privacy -- and one of the great things about TSCM is that it helps protect this unique characteristic of the United States. ---------------------------------------------------------------- Pesach Lattin, Computer Crime Specialist Voice Mail: (914) 818-3727 Fax: (240) 337-8339 Webmaster, Federal Law Enforcement Officers Association HQ: ph: (717) 938-2300 fax: (717) 932-2262 Visit our website @ http://www.fleoa.org ---------------------------------------------------------------- ----- Original Message ----- From: Miguel Puchol To: Sent: Wednesday, August 09, 2000 6:03 AM Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > In many countries the device itself is not illegal, what is illegal is it's > use. In the US laws are particularly restrictive in this aspect. > > Mike 1160 From: Date: Tue Aug 8, 2000 11:34pm Subject: Re: Debunk WSJ article on TEMPEST i am sure that many on this list are aware that the audio speakers on your computer can be utilized as room listening devices, from a remote location, via the internet. one way to disable this is to unplug the audio speakers when not in use,and or to completely disconnect from the internet. those with constantly "on" internet connections are most vulnerable. guess what? that recipe for the secret sauce your grandma handed down to you is not so secret anymore. HAVE A GREAT DAY !!! 1161 From: Miguel Puchol Date: Wed Aug 9, 2000 11:06am Subject: Re: List Demographics (Confession is good for the soul) OK, to follow on your examples, about 80% of pharmaceutical and disease research centers use marihuana, cocaine and other controlled substances regularly in their investigations, mainly concerning their pain-killing properties. Possessing illegal devices does not necessarily mean that you will do illegal things with them, I think that's a rather broad assumption. Mike ----- Original Message ----- From: "Pesach Lattin" To: Sent: Wednesday, August 09, 2000 6:17 PM Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > Yeah, because people tend not to possess illegal things for collection > purposes. If the sole function of a device is to do something illegal, it > only makes sense to make the device illegal. It's like claiming you are > having cocaine only for asthetic reasons, as it looks really good on a > mirror next to a razorblade. > > Citizens of the US have an expectation of privacy -- and one of the > great things about TSCM is that it helps protect this unique characteristic > of the United States. > ---------------------------------------------------------------- > Pesach Lattin, Computer Crime Specialist > Voice Mail: (914) 818-3727 Fax: (240) 337-8339 > > Webmaster, Federal Law Enforcement Officers Association > HQ: ph: (717) 938-2300 fax: (717) 932-2262 > Visit our website @ http://www.fleoa.org > ---------------------------------------------------------------- > ----- Original Message ----- > From: Miguel Puchol > To: > Sent: Wednesday, August 09, 2000 6:03 AM > Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > > > > In many countries the device itself is not illegal, what is illegal is > it's > > use. In the US laws are particularly restrictive in this aspect. > > > > Mike > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1162 From: Robert G. Ferrell Date: Wed Aug 9, 2000 11:28am Subject: Re: Debunk WSJ article on TEMPEST >i am sure that many on this list are aware that the >audio speakers on your computer can be utilized as room listening >devices, from a remote location, via the internet. Assuming this isn't supposed to be a joke, I'm having trouble envisioning the engineering behind this claim. Even if you could somehow convince the audio card to digitize a signal coming in through the speaker output, what mechanism are you going to use to send this over the Internet? Streaming audio? Convert slices to .wav or mp3/4 files and transfer them via binary FTP or encode them in SMTP? Any of those methods requires software on the subject's system. You couldn't collect, digitize, encapsulate, and transfer audio signal data via pure 'pull' technology. Unless you hack into a user's box first and plant all this stuff, I don't see how it can be done, but maybe I'm just ignorant. RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 1163 From: Miguel Puchol Date: Wed Aug 9, 2000 0:44pm Subject: Re: Debunk WSJ article on TEMPEST Robert, I agree with you completely. There is one possibility, though, and that is your victim being braindead and accepting to run some executable sent to them by a stranger, containing BO or NetBus. The latter does a very good job of silently recording audio from a computer's mike (assuming it has one) and sending it to a remote location. In any case, it involves at least some cooperation from the target. The statement regarding speakers recording audio is one for the books though :-) Cheers, Mike ----- Original Message ----- From: "Robert G. Ferrell" To: Sent: Wednesday, August 09, 2000 6:28 PM Subject: Re: [TSCM-L] Debunk WSJ article on TEMPEST > >i am sure that many on this list are aware that the > >audio speakers on your computer can be utilized as room listening > >devices, from a remote location, via the internet. > > Any of those methods requires software on the subject's system. You couldn't > collect, digitize, encapsulate, and transfer audio signal data via pure 'pull' > technology. > Unless you hack into a user's box first and plant all this stuff, I don't see > how it can be done, but maybe I'm just ignorant. 1164 From: James M. Atkinson, Comm-Eng Date: Wed Aug 9, 2000 2:13pm Subject: Re: List Demographics (Confession is good for the soul) At 6:06 PM +0200 8/9/00, Miguel Puchol wrote: >OK, to follow on your examples, about 80% of pharmaceutical and disease >research centers use marihuana, cocaine and other controlled substances >regularly in their investigations, mainly concerning their pain-killing >properties. >Possessing illegal devices does not necessarily mean that you will do >illegal things with them, I think that's a rather broad assumption. > >Mike Right, but if one of the vice presidents is having a bad day he can't go down to the lab and snort a few lines. Neither can he smurf a few kilo's out of the lab so his brother-in-law can peddle it on the street to college students. There is a legitimate and perfectly legal way to posses a narcotic substance or contraband... and then there is the illegal way. There is also a completely legal way to possess bugs, and a totally illegal way to possess them... and there is no gray area between the two. A large number of large biotech firms on the east coast are my clients, and some of them have production facilities where they measure the amount of narcotics produced daily in tons... Yes TONS. People working there do not "take home samples", fiddle with new formulas in their basement, or anything even remotely having an "appearance of mischief". The DEA would shut the facility in seconds if they though any such foolishness was going on. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1165 From: Pesach Lattin Date: Wed Aug 9, 2000 2:02pm Subject: Re: Debunk WSJ article on TEMPEST Blah... this is really not true. Someone would have to install a program on your computer that would allow this to happen, the speakers aren't really good enough to pick up anything and if you have a good personal firewall, it wouldn't allow anything like this to be installed or used. In theory, someone could break into your house, install a bunch of programs on your computer, and do lots of stuff. Highly unlikely. ---------------------------------------------------------------- Pesach Lattin, Computer Crime Specialist Voice Mail: (914) 818-3727 Fax: (240) 337-8339 Webmaster, Federal Law Enforcement Officers Association HQ: ph: (717) 938-2300 fax: (717) 932-2262 Visit our website @ http://www.fleoa.org ---------------------------------------------------------------- ----- Original Message ----- From: To: Sent: Tuesday, August 08, 2000 9:34 PM Subject: Re: [TSCM-L] Debunk WSJ article on TEMPEST > i am sure that many on this list are aware that the > audio speakers on your computer can be utilized as room listening > devices, from a remote location, via the internet. > one way to disable this is to unplug the audio > speakers when not in use,and or to completely disconnect from the > internet. those with constantly "on" > internet connections are most vulnerable. > guess what? that recipe for the secret sauce your > grandma handed down to you is not so secret anymore. > > > HAVE A GREAT DAY !!! > > > > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1166 From: Guy Urbina Date: Wed Aug 9, 2000 0:15pm Subject: RE: Debunk WSJ article on TEMPEST -----Original Message----- From: Robert G. Ferrell [mailto:rferrell@r...] Sent: Wednesday, August 09, 2000 9:29 AM To: TSCM-L@egroups.com Subject: Re: [TSCM-L] Debunk WSJ article on TEMPEST >i am sure that many on this list are aware that the >audio speakers on your computer can be utilized as room listening >devices, from a remote location, via the internet. Assuming this isn't supposed to be a joke, I'm having trouble envisioning the engineering behind this claim. Even if you could somehow convince the audio card to digitize a signal coming in through the speaker output, what mechanism are you going to use to send this over the Internet? Streaming audio? Convert slices to .wav or mp3/4 files and transfer them via binary FTP or encode them in SMTP? Any of those methods requires software on the subject's system. You couldn't collect, digitize, encapsulate, and transfer audio signal data via pure 'pull' technology. Unless you hack into a user's box first and plant all this stuff, I don't see how it can be done, but maybe I'm just ignorant. RGF I too, am skeptical of this claim..........while I will agree that a speaker is a transducer, I severely doubt that the hardware in the soundcard can access this signal especially when the speakers are connected to the output jack. (the signal path is one way, i.e. probably some DSP processor, D/A converter, preamp, audio power amp...how can you reverse this?) That's one hurdle you have to bypass........ the other is using the software already installed in your computer to perform such a feat. -Guy 1167 From: Perry Myers Date: Wed Aug 9, 2000 11:36am Subject: RE: Debunk WSJ article on TEMPEST I learned long ago that if the speaker works as a speaker, than it is not a microphone. If it does not work as a speaker, you better check it out or better yet, remove it. Perry D. Myers, CFE President Myers Service, Inc. Investigations 2076 N. Elston Ave. Suite 200 Chicago, IL. 60614-3940 Phone 773-342-8300 Facsimile 773-486-4430 e-mail: perry@m... For information on investigative services please visit our web site at www.myersservice.com This e-mail is strictly confidential. If you receive this e-mail in error, please forward immediately to info@m... -----Original Message----- From: Robert G. Ferrell [mailto:rferrell@r...] Sent: Wednesday, August 09, 2000 11:29 AM To: TSCM-L@egroups.com Subject: Re: [TSCM-L] Debunk WSJ article on TEMPEST >i am sure that many on this list are aware that the >audio speakers on your computer can be utilized as room listening >devices, from a remote location, via the internet. Assuming this isn't supposed to be a joke, I'm having trouble envisioning the engineering behind this claim. Even if you could somehow convince the audio card to digitize a signal coming in through the speaker output, what mechanism are you going to use to send this over the Internet? Streaming audio? Convert slices to .wav or mp3/4 files and transfer them via binary FTP or encode them in SMTP? Any of those methods requires software on the subject's system. You couldn't collect, digitize, encapsulate, and transfer audio signal data via pure 'pull' technology. Unless you hack into a user's box first and plant all this stuff, I don't see how it can be done, but maybe I'm just ignorant. RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1168 From: Date: Wed Aug 9, 2000 1:00pm Subject: Re: Debunk WSJ article on TEMPEST no joke! picked up some of the info off of a software developer newsletter that i subscribe to. Apparently ,it is even taught in various "trade" schools. i am not an expert on the methodology. seems it utilizes software that is either installed by the computer manufacturer for remote trouble-shooting or incorporates software by Microsoft? titled 'Backdoor". it could commonly be referred to as a virus. my interest being defensive,rather than offensive,has prompted me to examine ,primarily simple solutions for deterring audio invasion of privacy , such as unplugging audio speakers connected to a computer or disconnecting the physical internet connection.With time limitations ,being what they are, i am unable to follow up every sci-fi techno surveillance lead. However , i do believe this form of audio snooping to be currently employed. HAVE A GREAT DAY !!! 1169 From: Robert G. Ferrell Date: Wed Aug 9, 2000 2:29pm Subject: Re: List Demographics (Confession is good for the soul) >There is a legitimate and perfectly legal way to posses a narcotic >substance or contraband... and then there is the illegal way. There is also a distinction between a pharmaceutical agent, which even if synthesized is ultimately derived from a natural product whose original purpose was to support some process going on in a plant or animal, and an eavesdropping device of strictly human manufacture which really has no other application than to pick up and transmit audio signals. Even though possession of controlled substances without authorization is illegal, it isn't in truth that possession to which society objects. It boils down to the logical principle that if you don't have a legitimate use for something in you possession, your intention must be, ipso facto, to use it illegitimately and therefore contrary to the law. Since a bug can't really be used for anything but bugging someone, and since private citizens don't have any legitimate recourse to bugging, it's illegal to possess one. RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 1170 From: DrPepper Date: Wed Aug 9, 2000 2:41pm Subject: Re: Debunk WSJ article on TEMPEST Beside the fact that this is technically impossible, Just what would anyone at a home computer be saying that would be of interest to anyone who is such a wizard that he could even do it? I have a slogan I use occasionally in my sigfile: "HAM RADIO, where people who have nothing to say, are talking to people who aren't listening." vr & 73 de Ron C. ================================================= Pesach Lattin wrote: > Blah... this is really not true. Someone would have to install a program on > your computer that would allow this to happen, the speakers aren't really > good enough to pick up anything and if you have a good personal firewall, it > wouldn't allow anything like this to be installed or used. > > In theory, someone could break into your house, install a bunch of programs > on your computer, and do lots of stuff. Highly unlikely. > ---------------------------------------------------------------- > Pesach Lattin, Computer Crime Specialist > Voice Mail: (914) 818-3727 Fax: (240) 337-8339 > > Webmaster, Federal Law Enforcement Officers Association > HQ: ph: (717) 938-2300 fax: (717) 932-2262 > Visit our website @ http://www.fleoa.org > ---------------------------------------------------------------- > ----- Original Message ----- > From: > To: > Sent: Tuesday, August 08, 2000 9:34 PM > Subject: Re: [TSCM-L] Debunk WSJ article on TEMPEST > > > i am sure that many on this list are aware that the > > audio speakers on your computer can be utilized as room listening > > devices, from a remote location, via the internet. > > one way to disable this is to unplug the audio > > speakers when not in use,and or to completely disconnect from the > > internet. those with constantly "on" > > internet connections are most vulnerable. > > guess what? that recipe for the secret sauce your > > grandma handed down to you is not so secret anymore. > > > > > > HAVE A GREAT DAY !!! > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- - - - Dr Pepper, Also known as Ron Cheshire, WB6GKI, 35.37.26N/117.40.02W China Lake, CA USA ----------------------------- 90 miles West of Death Valley, 200 miles North of LAX ----------------------------- DrPepper@i... nannycams@i... - - - 1171 From: Pesach Lattin Date: Wed Aug 9, 2000 5:29pm Subject: Re: Debunk WSJ article on TEMPEST Actually, a microphone can be used as a mini-speaker. I've had the experience of plugging in my microphone and speakers in the wrong jacks and had music come out of the microphone. ---------------------------------------------------------------- Pesach Lattin, Computer Crime Specialist Voice Mail: (914) 818-3727 Fax: (240) 337-8339 Webmaster, Federal Law Enforcement Officers Association HQ: ph: (717) 938-2300 fax: (717) 932-2262 Visit our website @ http://www.fleoa.org ---------------------------------------------------------------- ----- Original Message ----- From: Perry Myers To: Sent: Wednesday, August 09, 2000 9:36 AM Subject: RE: [TSCM-L] Debunk WSJ article on TEMPEST > I learned long ago that if the speaker works as a speaker, than it is not a > microphone. If it does not work as a speaker, you better check it out or > better yet, remove it. > > Perry D. Myers, CFE > President > Myers Service, Inc. Investigations > 2076 N. Elston Ave. Suite 200 > Chicago, IL. 60614-3940 > Phone 773-342-8300 > Facsimile 773-486-4430 > e-mail: perry@m... > > For information on investigative services please visit our web site at > www.myersservice.com > > This e-mail is strictly confidential. If you receive this e-mail in error, > please forward immediately to info@m... > > > -----Original Message----- > From: Robert G. Ferrell [mailto:rferrell@r...] > Sent: Wednesday, August 09, 2000 11:29 AM > To: TSCM-L@egroups.com > Subject: Re: [TSCM-L] Debunk WSJ article on TEMPEST > > > >i am sure that many on this list are aware that the > >audio speakers on your computer can be utilized as room listening > >devices, from a remote location, via the internet. > > Assuming this isn't supposed to be a joke, I'm having trouble envisioning > the > engineering behind this claim. Even if you could somehow convince the audio > > card to digitize a signal coming in through the speaker output, what > mechanism > are you going to use to send this over the Internet? Streaming audio? > Convert > slices to .wav or mp3/4 files and transfer them via binary FTP or encode > them in > SMTP? > > Any of those methods requires software on the subject's system. You > couldn't > collect, digitize, encapsulate, and transfer audio signal data via pure > 'pull' > technology. > > Unless you hack into a user's box first and plant all this stuff, I don't > see > how it can be done, but maybe I'm just ignorant. > > RGF > > Robert G. Ferrell, CISSP > ======================================== > Who goeth without humor goeth unarmed. > ======================================== > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > From: none Date: Wed Aug 8, 2001 4:03am Subject: Re: Keystroke loggers CLASSIFIED You mean like the rumor that M$ maintains an office inside the NSA with a fully cleared staff? Nah, just coincidence I'm sure. Stu Andrus Aaslaid wrote: >>Software-based loggers are readily available. Hardware-based >>loggers can be >>purchased over the counter at spy shops or over the Web. The fact >>that they >>are in use has already been admitted by the government. Now that everyone >>who cares knows this, the methods for finding them whether they are >>hardware or software are readily apparent, and anybody who is motivated >>enough to use encryption should be able to find them. >> >>Can anybody tell me just *what* the government is trying to keep >>secret here? >> > > Hmm.. could it be connected to the rumours, that M$ has been creating a trapdoor for government purposes inside windowses? I can see in my dereams an assymetric encryption tied together with a kernel-level keystroke logger what can be remote-activated. I can also see conspiracy theorists jumping from one leg to another saying that it was part of the deal, so government did not split the company afterall. > > I seriously do hope I am talking silly things here ... > > I do not have ANY reference to whatsoever information about this subject. I must have heard this in some newsgroup somewhere. I am only speculating. But food for thought - I am darn sure I am not the first one having this idea crossing my mind. > > Andrus. > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 3483 From: Shawn Hughes Date: Wed Aug 8, 2001 7:40pm Subject: fbi secrets >Can anybody tell me just *what* the government is trying to keep secret here? > - A.Lizard >so, is a keyboard bug a wiretap, or not? apparently the FBI doesn't want the court to be able to find that it is I will be more than happy to answer both. I think that some may be missing the forest for the trees. Reread this statement: >Donald Kerr, the director of the FBI's lab, said in an affidavit filed Friday that "there are only a limited >number of effective techniques available to the FBI to cope with encrypted data, one of which is the 'key >logger system.'" He said that if criminals find out how the logger works, they can readily circumvent it. This is the whole issue. They cannot whip the encryption monster (yet), so they just resort to simpler methods, like a tap. YOU guys know what a logger looks like. But, the bad guys don't. They still look suspiciously at martini olives. I make this statement as a person who has done intercept work for the government. I am positive that there is almost no one on this list who could not identify what a body wire looks like. However, in over 1,500 applications, I never had a cooperating informant compromised, even though many were frisked. This is because the average stupid bad guy doesn't know what a body wire looks like, and therefore mimics what they see on TV. Publicity is why I fight tooth and nail against disclosure of specificities in intercept arrangements past the fact that electronic methods were used. If I had to "show & tell" just once, after the case was over, absent a sealing of the case, the information I provided would be on every tv and newspaper in the country, because it would then be public knowledge. Everyone wants a picture of the evil black box, with wires coming out of it. So, look at all the hubbub over carnivore now. If the FB1 had to disclose what the gear looked like, it would then be page one; top story on EVERY media outlet known, and then be rendered useless, because after looking at it on teevee, every paranoid drug dealer and average innocent home owner would be attacking their pcs with a screwdriver or butterknife. So, just like everything else, there truly aren't any secrets for those who will dig for them. But, lets not just hand over everything to anyone who can turn the page in USA Today. Shawn 3484 From: Date: Wed Aug 8, 2001 5:05pm Subject: Security Firms Call for Video-Surveillance Law http://dailynews.yahoo.com/htx/nm/20010808/pl/tech_privacy_surveillance_dc_1.h tml Wednesday August 8 5:24 PM ET Security Firms Call for Video-Surveillance Law By Andy Sullivan WASHINGTON (Reuters) - Facing a growing public backlash, the security industry called on Congress Wednesday to regulate the use of surveillance systems that match faces of people on the street with a database of known criminals. The developer of a prominent face-scanning system, along with the head of the industry trade group, said the federal government needed to step in to ensure that such systems could not be used by police or private corporations to track or compile profiles of innocent citizens. ``This discovery was intended to bring a benefit to society and the world, and my feeling about it is I need help from the federal government to make sure there is no room for misuse,'' said Dr. Joseph Atick, chief executive of Visionics Corp. . Since police in Tampa, Florida, first used Visionics' FaceIt system to scan the crowd at last January's Super Bowl football game, facial-recognition systems have come under fire from civil-liberties groups and lawmakers who say they invade privacy and create the potential for a Big Brother-like state of constant surveillance. Tampa has since linked FaceIt to 36 surveillance cameras in a popular nightlife district, but the City Council nearly discontinued its use in a 4-3 vote last week. Atick, backed by the Security Industry Association, said police departments and others should be limited to only using the system to track convicted criminals, search for fugitives and other specific purposes. Users should not be able to track ordinary citizens, he said, and should be penalized if they do so. A spokesman for House Majority Leader Dick Armey, a leading critic, predicted a chilly reception when the House of Representatives holds hearings on the issue in the fall. ``We'll see how members of Congress feel. My educated guess is they're not going to be enamored of this,'' said Richard Diamond, spokesman for the Texas Republican. Privacy advocates reacted with skepticism as well. ``I think the industry's getting very nervous,'' said Marc Rotenberg, executive director of the Electronic Privacy Information Center. ``I rather suspect the stuff they're emphasizing, a lot of that is to protect business interests.'' VALUABLE ENFORCEMENT TOOL At a Washington press conference, Atick and Security Industry Association director Richard Chace sought to emphasize the benefits of facial-recognition technology. ``It is time to stop focusing solely on how this technology could be potentially abused, and start talking about how this technology can be positively used in a responsible and effective way,'' Chace said. FaceIt creates a unique ``faceprint'' by analyzing facial structure. While the system measures about 80 different points, it can make a positive identification based on as little as 14, Atick said. It does not take into account skin color, hairstyles or other physical attributes. Newham, a neighborhood in London, has seen a 40 percent drop in crime since installing the system two years ago as police have been able to more effectively monitor trouble spots and track repeat offenders, Atick said. FaceIt has also been used in Mexico to deter voter fraud and in China to enable illiterate peasants to set up bank accounts, and can be used by private companies to control access to facilities, he said. ``Facial recognition is significantly cheaper, is less intrusive than a massive police presence, and does not inconvenience or interfere with the lives of the honest majority,'' Atick said. U.S. courts have established that citizens do not have a reasonable expectation of privacy in public spaces like streets and parks, Chace said. But Ari Schwartz, senior policy analyst at the Center for Democracy and Technology, said courts have also placed limits on cameras that, for example, look up women's skirts. ``Most Americans don't expect to be spied on everywhere they go,'' Schwartz said. 3485 From: e cummings Date: Wed Aug 8, 2001 0:36pm Subject: Federal Judge orders DOJ to tell him how keylogger worked >Background on U.S. v. Scarfo: >http://www.politechbot.com/p-02356.html >http://www.politechbot.com/p-02330.html > >********* > >http://www.nj.com/news/ledger/index.ssf?/page1/ledger/140dc21.html >Judge wants FBI to detail secret cyber 'wiretap' >2001-08-08 05:43:05 > >Judge wants FBI to detail secret cyber 'wiretap' >BY ROBERT RUDOLPH >STAR-LEDGER STAFF >A federal judge in Newark ordered U.S. authorities yesterday to >provide him with a confidential report describing how the FBI used >top-secret technology to crack the computer files of a New Jersey >mobster. The system, known as a "key-logger," enabled agents to crack >an encryption code that reputed mobster Nicodemo Scarfo Jr. allegedly >had used to protect his computerized gambling files from prying eyes. >U.S. District Judge Nicholas H. Politan said he "harbors serious >concerns" about the legality of the FBI's use of the system. And, he >said, the agency's description of the technology is so shrouded in >mystery, it "defies the human experience of this court." > >[...] > >But the mystery surrounding the system >left Judge Politan clearly exasperated yesterday. "In this new age of >rapidly evolving technology," Politan said, he "cannot make a >determination as to the lawfulness" of the government actions until he >knows how the system works. He gave the government 10 days to provide >him with a detailed explanation of how the technology works and why it >should not be made public during the course of the Scarfo trial. > >[...] > >********* > >http://dailynews.yahoo.com/htx/nm/20010807/tc/crime_surveillance_dc_2.html >FBI Must Reveal Computer Snooping Technique -Judge >2001-08-07 20:11:06 > >Tuesday August 7 6:28 PM ET > >FBI Must Reveal Computer Snooping Technique -Judge > >NEWARK, N.J. (Reuters) - A federal judge on Tuesday ordered the >government to reveal the high-tech computer snooping technique used by >the FBI to gather evidence against an alleged mobster. > >[...] > >Politan ruled that in order to decide the >lawfulness of the government surveillance, he must see a full report >on how the device works, imposing an Aug. 31 deadline. ``In this new >age of rapidly evolving technology, the court cannot make a >determination as to the lawfulness of the government's search ... >without knowing specifically how the search was effectuated,'' he >wrote. ``This requires an understanding of how the key logger device >functions. In most, if not all search and seizure cases, the court ... >understands the particular method by which the search is executed. ... >Because of the advanced technology used the court does not have the >benefit of such an understanding.'' > >[...] > > > > >------------------------------------------------------------------------- >POLITECH -- Declan McCullagh's politics and technology mailing list >You may redistribute this message freely if you include this notice. >To subscribe, visit http://www.politechbot.com/info/subscribe.html >This message is archived at http://www.politechbot.com/ >------------------------------------------------------------------------- > 3486 From: Date: Thu Aug 9, 2001 5:46am Subject: Handy bandwith meter.Works with all types of connections. DSL/cable/pots 2Wire - Bandwith Meter or http://www.2wire.com/services/bwm.html This meter will determine your maximum throughput to 2wire Web site. M. 3487 From: James M. Atkinson Date: Thu Aug 9, 2001 6:14pm Subject: Federal Judges Protest Monitoring Of Their Web Use by Washington http://interactive.wsj.com/articles/SB997297823385851173.htm Federal Judges Protest Monitoring Of Their Web Use by Washington By TED BRIDIS and GLENN R. SIMPSON Staff Reporters of THE WALL STREET JOURNAL WASHINGTON -- Privacy advocates hope a simmering dispute within the federal judiciary over Internet use will spark changes to federal laws on employer monitoring of company networks. A group of senior West Coast judges, angry that their online activity is monitored by a federal agency here that administers the court system, have suggested the scrutiny may be illegal and for one week earlier this year disabled the monitoring system in protest. Judge Alex Kozinski of San Francisco's U.S. Court of Appeals for the Ninth Circuit -- where the disabling took place -- has claimed in a memorandum that such oversight violates the federal wiretap statute. But experts in workplace law say the legality of such monitoring is widely accepted. Broad surveillance by system administrators is explicitly permitted under the 1986 Electronic Communications Privacy Act and has been upheld by several courts, and Congress has rejected attempts to craft a new policy. "This sounds like the judge had no clue how intrusive modern monitoring security is," said Stewart Baker of the Washington law firm Steptoe & Johnson, an expert on wiretap law. Calls to Judge Kozinski and the Ninth Circuit's media representative weren't returned. The dispute could spur lawmakers to re-evaluate federal policy on monitoring, privacy advocates said. "We may need to have people in a position of power affected by electronic monitoring before there is going to be an honest legislative evaluation of the current situation in the American workplace," said Jeremy Gruber, legal director at the National Workrights Institute in Princeton, N.J. Under the 1986 law, a network operator can intercept or disclose a user's messages "in the normal course of his employment" to protect the rights and property of the network's owner -- even without giving a warning, though experts frequently advise companies to do so. It isn't unusual for companies to monitor the online behavior of employees; a survey in July of 435 large U.S. companies by the American Management Association found more than 60% watched Internet connections. Most indicated they are worried about lawsuits, especially stemming from workers visiting pornographic Web sites or distributing sexually suggestive material, but many said they also check to detect network attacks by hackers. Sen. Charles Schumer (D., N.Y.) and Rep. Bob Barr (R., Ga.) are expected to introduce legislation later this year that would limit employer surveillance. A similar bill sponsored by the two was voted down last year. The judiciary dispute was reported July 5 by the Houston Chronicle and was also the subject of an article Wednesday in the New York Times. For the judges, the issue will be decided when the United States Judicial Conference meets on Sept. 11. The conference, which makes policy for the judiciary, "is actively studying the issue," conference spokesman David Sellers said. "There's really nothing to be said until the conference meets." -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3488 From: Date: Fri Aug 10, 2001 5:29am Subject: Birthday Reminder Birthday Reminder Marty Kaiser Friday, August 10, 2001 3489 From: Dawn Star Date: Fri Aug 10, 2001 10:42am Subject: Privacy chickens come home to roost! Judges Don't Like Their Computers Monitored! WASHINGTON, Aug. 7 - A group of federal employees who believed that the monitoring of their office computers was a major violation of their privacy recently staged an insurrection, disabling the software used to check on them and suggesting that the monitoring was illegal and unethical. This was not just a random bunch of bureaucrats but a group of federal judges who are still engaged in a dispute with the office in Washington that administers the judicial branch and that had installed the software to detect downloading of music, streaming video and pornography. It is a conflict that reflects the anxiety of workers at all levels at a time when technology allows any employer to examine each keystroke made on an office computer. In this case, the concern over the loss of privacy comes from the very individuals, federal judges, who will shape the rules of the new information era. The insurrection took root this spring in the United States Court of Appeals for the Ninth Circuit, based in San Francisco and the largest of the nation's 12 regional circuits, covering 9 Western states and two territories. The Judicial Conference of the United States, the ultimate governing body of the courts, is to meet on Sept. 11 to resolve the matter. The conflict between the circuit judges and the Administrative Office of the Courts, a small bureaucracy in Washington, deteriorated to a point that a council of the circuit's appeals and district judges ordered their technology staff to disconnect the monitoring program on May 24 for a week until a temporary compromise was reached. Because the Ninth Circuit's was also linked to the Eighth and Tenth Circuits, the shutdown affected about a third of the country and about 10,000 court employees, including more than 700 active and semiretired judges. Leonidas Ralph Mecham, who runs the Administrative Office of the Courts, and who ordered the monitoring of all federal court workers, said in a March 5 memorandum that the software was to enhance security and reduce computer use that was not related to judicial work and that was clogging the system. A survey by his office, he wrote, "has revealed that as much as 3 to 7 percent of the judiciary browser's traffic consists of streaming media such as radio and video broadcasts, which are unlikely to relate to official business." Officials in the judicial branch on both sides of the issue provided several internal memorandums written as the dispute continued over the weeks. After the shutdown, Mr. Mecham complained in a memorandum that disconnecting the software was irresponsible and might have resulted in security breaches, allowing unauthorized outsiders access to the judiciary's internal confidential computer network. "The weeklong shutdown put the entire judiciary's data communication network at risk," he wrote on June 15. Mr. Mecham warned in that memorandum that on the days before the software was disabled, there were hundreds of attempts at intrusion into the judiciary's network from places like China and Iran. But Chief Judge Mary Schroeder of the Ninth Circuit responded that the concerns were overblown and that the circuit's technical people carefully monitored computer activity during the week that the software was disabled. In a June 29 memorandum, she said that there was no evidence that the electronic firewall used to block hacking had been breached and suggested that Mr. Mecham had exaggerated the potential of a security breach because having hundreds of attempted breaches per day was routine and routinely blocked. The Ninth Circuit disconnected the software, she wrote, because the monitoring policy was not driven by concern over overloading the system but Mr. Mecham's concern over "content detection." Many employees had been disciplined, she noted, because the software turned up evidence of such things as viewing pornography, although they had not been given any clear notice of the court's computer use policy. Moreover, she wrote, the judiciary may have violated the law. "We are concerned about the propriety and even the legality of monitoring Internet usage," she wrote. Her memorandum said that the judiciary could be liable to lawsuits and damages because the software might have violated the Electronic Communications Privacy Act of 1986, which imposes civil and criminal liability on any person who intentionally intercepts "any wire, oral or electronic communication." She noted that the Ninth Circuit had ruled just this year that the law was violated when an employer accessed an employee Web site. In fact, the issues of what is permissible by employers have produced a patchwork of legal rulings and the matter has never been addressed directly by the Supreme Court. Judge Alex Kozinski, a member of the Ninth Circuit appeals court, drafted and distributed an 18-page legal memorandum arguing that the monitoring was a violation of anti- wiretap statute. Judge Kozinski, widely known for his libertarian views, said the court employees who were disciplined, an estimated three dozen, could be entitled to monetary damages if they brought a lawsuit. A spokesman for Mr. Mecham said that the software could not identify specific employees but workstations. When unauthorized use was detected, Mr. Mecham's deputy, Clarence Lee Jr., wrote to the chief judge of the district, urging that the employee who used the workstation be identified and disciplined. One such letter includes an appendix listing the Web sites that employee had visited, some of them pornographic. There is no evidence that any alleged abuse of the system involved judges. Judge Kozinski said: "Aside from my view that this may be a felony, it is something that we as federal judges have jurisdiction to consider. We have to pass on this very kind of conduct in the private sphere." Prof. Jeffrey Rosen of the George Washington University Law School, author of a recent book on privacy, "The Unwanted Gaze" (Vintage 2001), said, "It's fascinating that the courts have to grapple with these issues so close to home." The law is evolving, he said, adding: "This drama with the judges reminds us of how thin the privacy protections are. There's a real choice right now whether e-mail and Web browsing should be regarded like the telephone or a postcard." Judge Edwin L. Nelson, who is chairman of a judges' committee that deals with computer issues, said in an interview that his group met last week and drafted proposals to deal with monitoring. Judge Nelson would not discuss the proposals but they are almost certain to resemble policies used in the rest of the federal government, in which clear notice is given to computer users that they may be monitored. Jim Flyzik, vice chairman of an interagency group that considers computer privacy issues in the federal government, said that each department had its own policy but that clear and unambiguous notification of monitoring was usually an element. In the private sector, a survey by the American Management Association this year found that 63 percent of companies monitored employees' computer use. New York Times, August 8, 2001 Have a great day 3490 From: James M. Atkinson Date: Fri Aug 10, 2001 4:20pm Subject: Neglected computers hamper FBI - Ancient systems slow investigations http://chicagotribune.com/news/nationworld/chi-0108060127aug06.story?coll=chi%2Dnews%2Dhed From the Chicago Tribune Neglected computers hamper FBI Ancient systems slow investigations By Naftali Bendavid Washington Bureau August 6, 2001 WASHINGTON -- FBI agents, members of the world's top law-enforcement agency, cannot send e-mail outside the bureau from their own computers. They cannot access the Internet from their desks, use current software programs or even connect to the FBI's own databases. Robert Mueller, who was confirmed by the Senate last week as the next FBI director, must address the aftermath of headline-grabbing debacles such as the Robert Hanssen spy case. But an equal challenge will be repairing an aging computer system that has been neglected for years. Throughout the bureau's 700 offices, investigations are routinely slowed, and crucial information missed, while data is downloaded on these ancient systems, insiders say. Processes that many teenagers could perform at home in minutes take the nation's top investigators hours. "The average person in America would think the FBI, as the premier law-enforcement agency, would have top-of-the-shelf automation, but they are far from it," said William Esposito, the bureau's deputy director in the late 1990s. "The system definitely needed upgrading and it was a frustration on the part of a lot of people, at both management level and agent level, as to why this could not happen sooner and faster." The ailing computer system is more than an inconvenience. Better automation could have avoided such recent FBI embarrassments as the loss of hundreds of guns and laptop computers and the mishandling of documents that delayed the execution of Oklahoma City bomber Timothy McVeigh, experts say. Some critics even assert that the FBI could have caught Hanssen earlier if its computer system had been better designed. On a daily basis, investigators clearly could complete far more investigations if their computers worked faster, and agents say they find themselves going to stakeouts or interviews without crucial information. "Not every agent has access to an Internet terminal," said Nancy Savage, president of the FBI Agents Association. "Some of our smaller offices don't even have Internet access. We don't always have the ability to transfer photographs. Those kinds of things are basic to law enforcement now." Bureau leaders concede there are numerous computer problems, but say they are working hard to fix them. Mueller said at his confirmation hearing last week that he is determined to bring the FBI up to speed technologically. Bob Dies, a 30-year veteran of IBM, was brought in a year ago to renovate the bureau's computer systems. But Dies said the FBI is so far behind that even when his upgrading is finished in two years, its technology will not approach the level taken for granted by most companies. The neglect of the FBI's computers can be traced to several factors, according to knowledgeable observers inside and outside the bureau. The FBI certainly has not suffered from a lack of funds; its budget has exploded to $3.4 billion from $2 billion in 1994. But the money has gone to flashier causes, such as operating more than 40 FBI offices overseas--19 of which have opened in the last five years--rather than the mundane work of upgrading computers. Some say Congress has not allocated enough money for technology. Others say it did, but the FBI had to divert the money to costly, high-profile investigations. Technology a low priority Former FBI Director Louis Freeh and his lieutenants clearly placed little priority on technology until it threatened to erupt into a crisis. Computer specialists inside the FBI aggravated the problem by being slow to bring problems to Freeh's attention, said current and former agents. "There is absolutely no reason for this," said Sen. Patrick Leahy (D-Vt.), chairman of the Senate Judiciary Committee. "The FBI has had an extraordinary increase in its budget. It's a lack of management. It's an attitude of some that `We are the FBI and we have done it in this way for a long time, and this is how we are going to do it,'" Leahy said. Dies said he is appalled at the state of the bureau's technology. "The [agents] are better than I thought," Dies said. "The technology, on the other hand, is worse than I thought. And I had a very low expectation level." He cited one FBI satellite office with 30 employees that is connected to the outside world with a single, slow computer line. Dies persuaded Congress last fall to allocate $300 million to upgrade the FBI's computers, networks and applications. While that should bring the bureau to a basic functioning level, Dies said, the FBI still lag will far behind the rest of the world. "They have been starved for support for so long they don't know what to ask for," Dies said. The bureau's computer networks are so bad, he said, that they are forcing the FBI to use primitive computer programs, because that is all they can support. Primitive programs When the typical agent turns on a computer, it displays not the multi-colored screen familiar to many--with its landscape of toolbars, boxes, browsers and icons--but a green-and-black screen that was obsolete a decade ago. The FBI's internal system does not connect with the outside at all, which is why agents cannot access the Internet or send e-mail. Most FBI offices do have a few separate computers that link with the outside, but they have to be shared. The 10 agents in the FBI's office in Eugene, Ore., for example, share a single e-mail account. Robert Castelli, a professor at John Jay College of Criminal Justice in New York, said such problems are troubling. As criminals become adept at using computers for embezzlement, pornography and other high-tech wrongdoing, it is essential for investigators to keep up, he said. "We used to do this with paper and pencil, pocket calculators and slide rules," Castelli said. "But crime is becoming more sophisticated, especially white-collar crime and computer crime, which is one of the largest growing areas of crime and one of the hardest to investigate. Therein lies the situation they are faced with." Copyright © 2001, Chicago Tribune -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 3491 From: James M. Atkinson Date: Sat Aug 11, 2001 8:19am Subject: The Wronged Man: C.I.A. Officer Mistaken for Spy Down the Street Saturday August 11 08:57 AM EDT The Wronged Man: C.I.A. Officer Mistaken for Spy Down the Street By JAMES RISEN and DAVID JOHNSTON The New York Times Law enforcement and intelligence officials admit that a C.I.A. officer they investigated was not a Russian spy. The mole they had been hunting was F.B.I. agent Robert P. Hanssen. WASHINGTON, Aug. 10 Three months ago, the Central Intelligence Agency quietly reinstated a senior counterintelligence officer who had spent 18 months under investigation as a suspected Russian spy. There was no ceremony, no fanfare, no formal apology as he returned from professional exile. But in effect, the C.I.A was saying there had been a terrible mistake. For the C.I.A. officer, whose job is so highly classified that even his name is secret, the aftershocks of his ordeal continue to be felt as he tries to resume a life free of suspicion. He requested that his name not be used in this article because he has been advised that he could lose his covert status if he is identified. For a year and a half, he had lived under the shadow of suspected disloyalty as he was the target of an intensive investigation by the F.B.I. Then, on Feb. 18, the F.B.I. arrested one of its own: Robert P. Hanssen, a veteran F.B.I. agent and counter- intelligence expert, unmasking him as one of Moscow's most significant cold war spies. Law enforcement and intelligence officials now say that it was Mr. Hanssen, not the C.I.A. officer, who was the mole they had been hunting. The C.I.A. officer was the wrong man, a victim of what officials describe as an extraordinary mistake. A freakish web of coincidences had led the investigators to think that the C.I.A. employee was a spy. Among other things, he lived down the street from Mr. Hanssen, jogged in the same park, was about the same age, and had even traveled with Mr. Hanssen. Investigators now acknowledge that they wrongly suspected him. Mr. Hanssen pleaded guilty to espionage last month and is being interrogated by the F.B.I. Law enforcement officials say they believe that Mr. Hanssen knew, before his arrest, that the C.I.A. officer was under scrutiny. Knowing that the spotlight was focused elsewhere, the real spy felt less vulnerable to detection, the officials said. Now, more than five months after Mr. Hanssen's arrest, the C.I.A. officer still regards his treatment by the F.B.I. as unfair. While the C.I.A. has brought him back from a paid leave to working full time, and, he feels, has treated him with some dignity, the F.B.I. has not officially cleared him or apologized. The F.B.I. used covert surveillance, electronic eavesdropping, trash searches, lie detector tests administered under false pretenses, break-ins, interviews with his former wife and adult children, even sting operations set up by his colleagues, according to law enforcement and intelligence officials. "The corrosive effects of the F.B.I.'s wrongful and indiscriminate accusations are incalculable and pervasive," said John Moustakas, a lawyer for the C.I.A. officer. The investigation, Mr. Moustakas added, has been "emotionally devastating to both him and his family." Today, an F.B.I. spokesman said the bureau had privately expressed regret over the investigation of the C.I.A. officer. "We've acknowledged and expressed regret over the impact of the investigation of this person directly to his attorney," the spokesman said. "We continue to be in discussions with his attorney to resolve remaining concerns." Mr. Moustakas said the officer had been cautioned by C.I.A. lawyers that if he were publicly named, he would risk losing his classified status as an employee working under cover. C.I.A. officials would not discuss the matter. The intelligence officer authorized Mr. Moustakas, a partner in the Washington law firm of Shea & Gardner and a former federal prosecutor, to speak on his behalf to The New York Times. And the officer agreed to let a former associate and members of his family discuss the case. F.B.I. officials said that although they were sympathetic to the C.I.A. officer and convinced of his innocence, they had a legitimate basis to investigate him based on available information and used legally accepted techniques. They said that they had been careful not to name him publicly, even though the investigation became well known within the C.I.A.'s closed world of intelligence. "Everybody who knew about the investigation at the F.B.I. and the C.I.A. was convinced that he was the most logical suspect," said a senior law enforcement official. He added that he was convinced of the officer's guilt until late last year, when he first read secret Russian documents that unexpectedly shifted the focus of the investigation to Mr. Hanssen. F.B.I. officials have been criticized for failing to suspect that the spy might be within the bureau's own ranks. Instead, they focused their attention on the C.I.A., even though it later turned out that Mr. Hanssen, one of their own counterintelligence experts, fit the profile of the elusive mole even more closely than the C.I.A. officer did. The personal and professional resemblances between the C.I.A. officer and Mr. Hanssen are striking. The C.I.A. officer lived on the street in suburban Vienna, Va., where Mr. Hanssen had lived during his early days as a Russian spy. The C.I.A. officer jogged in the same park that Mr. Hanssen often used to drop off materials for the K.G.B., leaving plastic garbage bags filled with secret documents under a footbridge in Nottoway Park. The C.I.A. officer was about the same age as Mr. Hanssen, who is 57, and took at least one business trip with Mr. Hanssen on counterintelligence matters. The C.I.A. officer had once attended the same Latin Mass at the same Roman Catholic Church in Northern Virginia that Mr. Hanssen and his family attended. And, like Mr. Hanssen, he was a career counterintelligence expert who had rare access to many of the same highly secret operations that the authorities have now accused Mr. Hanssen of betraying. One of those was the 1989 investigation of Felix Bloch, a State Department official who the F.B.I. believes was able to thwart their inquiry after he was tipped off by the K.G.B. that he was under suspicion. The F.B.I. believed that the mole they were hunting for was the person who had warned the K.G.B. about the Bloch investigation. While under surveillance, the C.I.A. officer went to shopping malls and stores that were visited at the same time by Russian intelligence agents, whose movements are routinely monitored by the F.B.I. In the upside-down world of counterintelligence investigations, innocent habits became incriminating actions, leaving the suspect no escape from his nightmare. At one point, he kept a map of Nottoway Park, marking his jogging times from point to point. Investigators who found it during a surreptitious search of his house saw it as proof of his betrayal. On Aug. 18, 1999, he was summoned to a cramped conference room at C.I.A. headquarters, where two F.B.I. agents shoved in front of him a copy of his old jogging map, stamped "Secret" by the F.B.I. The map, the agents told him, was solid evidence that he was the Russian mole. The "X" marks and time notations were seen as telltale signs of where and at what time he had dropped off classified information. They called it a "spy map" and demanded that he confess. "How do you explain this?" one shouted. "Where did you get my jogging map?" he asked in return. In the four-hour F.B.I. interrogation, the C.I.A. officer offered to answer all questions without a lawyer, and to take a lie detector test. But his lawyer says the F.B.I. declined to take him up on the offer. He was escorted out of C.I.A. headquarters, stripped of his security badge and put on administrative leave. The C.I.A. officer was a veteran of the shadow world. After serving as an Air Force intelligence officer, he joined the Central Intelligence Agency in 1982, where he spent most of his career hunting Soviet spies. He played an important role in identifying a deep-cover Soviet agent named Reino Gikman. Agents monitoring Mr. Gikman's phone calls traced a call from his house in Austria to Mr. Bloch's home in Washington. That call led to the government's 1989 investigation of Mr. Bloch. But soon after the F.B.I. started investigating Mr. Bloch, he was warned by the K.G.B. With their investigation compromised, the F.B.I. was unable to arrest Mr. Bloch, who was eventually forced out of the State Department but was never charged with a crime. The mystery of how the Soviets knew of the Bloch investigation haunted American officials for years afterward. When Aldrich H. Ames, another C.I.A. officer, was charged in 1994 with spying for Moscow, officials concluded that he could not have known about the Bloch case. They surmised that Mr. Ames was not Moscow's only mole. The C.I.A. officer was rewarded for his work investigating Mr. Bloch, a former senior C.I.A. official said. But the C.I.A. officer's knowledge of the case later added to the suspicion that he was working for Moscow. By the late 1990's, the United States received tips from Russian agents about somebody who had been spying for Moscow for years, and who had disclosed the Bloch investigation, among other things. The spy was said to have taken diamonds in partial payment, and to have used Nottoway Park to do business with the K.G.B. He was believed to be at the C.I.A. To begin their search for a spy, F.B.I. and C.I.A. experts used a standard investigative approach: a "matrix," or database, matching clues about possible espionage against the profiles of American officers who had access to the material that was being purloined. As they received more information, the investigators fed the tips into the matrix and narrowed the list of potential suspects. By 1998, they had narrowed the search down from more than 100 people to one prime suspect: the C.I.A. officer. In an apparent effort to expose him, he was asked to join a supposedly sensitive joint operation involving a Russian agent who was about to come to the West, and who could solve the riddle of who sabotaged the Bloch case. But he was told that to join the team, he had to take a lie detector test. When he agreed, the investigators subtly probed his reaction to the possibility that the government would soon learn who compromised the Bloch investigation. He was told that he passed the test. But then he was told that the Russian defector was not arriving after all, and that he was no longer needed in the investigation. In retrospect, the C.I.A. officer and his lawyer suspect that the operation was a ruse. Law enforcement officials would not discuss the matter. Then in November 1998, a stranger appeared at the C.I.A. officer's home. Saying in an accent that the authorities were now aware of his espionage, the stranger handed him a written "escape plan." The man told him to be at a nearby subway station the next evening, and then quickly walked away. The next morning, the C.I.A. officer went to work and told the F.B.I. about the incident, describing the stranger for an artist to sketch. Law enforcement officials declined to comment on whether the incident was a sting operation. By the spring of 2000, investigators had a lengthy classified report on the case, detailing the circumstantial evidence against the C.I.A. officer. It seemed tantalizingly close to proof, but contained no direct evidence that he had done anything wrong. F.B.I. officials now say that their agency, despite the confrontational tactics, was never close to arresting him. Counterespionage officials began one more effort to recruit a source inside Russia who could finally identify the mole. That operation netted an unexpected return: a cache of documents from Russian intelligence files that law enforcement officials first thought would clinch the case against the C.I.A. officer. Instead, the documents upended their thinking. The papers provided a detailed description of how Mr. Hanssen was recruited and how he operated. One law enforcement official remarked: "Was I surprised it was Hanssen" and not the C.I.A. officer? "I was stunned." -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 3492 From: Marcelrf Date: Sat Aug 11, 2001 1:50pm Subject: [Fwd: Do You Need A Kidney Transplant?] Is this a new scam or just a sicko? -------- Original Message -------- Subject: Do You Need A Kidney Transplant? Date: Sat, 11 Aug 2001 14:43:52 From: jimsdad@b... To: marcelrf@m... If you need or know of someone who needs a KIDNEY, please contact me. I am offering a very healthy (Blood Type "O") KIDNEY by silent auction. Bidding will close on August 31, 2001. Make your offer by Email. Every bidder will be notified weekly of latest bid. Jim 3493 From: James M. Atkinson Date: Sat Aug 11, 2001 9:26pm Subject: Re: [Fwd: Do You Need A Kidney Transplant?] This is like the nine millionth time someone has tries this... and it is usually either a career scam artist, or someone really in a hurt for money (who needs help themselves... not organ removal). Also, most medical facilities in the US consider it to be highly unethical to transplant organs for money (where the donor is being paid for the organ, and not just receiving compensation for medical bills or time away from work, etc). -jma At 2:50 PM -0400 8/11/01, Marcelrf wrote: >Is this a new scam or just a sicko? > >-------- Original Message -------- >Subject: Do You Need A Kidney Transplant? >Date: Sat, 11 Aug 2001 14:43:52 >From: jimsdad@b... >To: marcelrf@m... > >If you need or know of someone who needs a KIDNEY, please contact me. > >I am offering a very healthy (Blood Type "O") KIDNEY by silent >auction. >Bidding will close on August 31, 2001. > >Make your offer by Email. Every bidder will be notified weekly of >latest bid. > >Jim -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3494 From: James M. Atkinson Date: Sat Aug 11, 2001 10:29pm Subject: Ex-Eagles cheerleaders sue 3 teams for locker-room spying SEATTLE POST-INTELLIGENCER http://seattlep-i.nwsource.com/football/34699_ts310.shtml Ex-Eagles cheerleaders sue 3 teams for locker-room spying Friday, August 10, 2001 SEATTLE POST-INTELLIGENCER NEWS SERVICES Two former Philadelphia Eagles cheerleaders have filed a federal lawsuit claiming players from visiting teams repeatedly spied on them as they changed clothes. The plaintiffs contend the "ability to peer into the cheerleaders' locker room (next to the visiting locker room at Veterans Stadium), and to view them in (various) states of undress, was considered one of the special 'perks' of being a visiting team." "It was common knowledge among virtually the entire National Football League ... that these conditions existed," the suit stated. Three teams -- the Cowboys, Redskins and Broncos -- were named in the suit. © 1998-2001 Seattle Post-Intelligencer -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3495 From: James M. Atkinson Date: Sun Aug 12, 2001 8:08am Subject: FBI Refuses to Apologize to Cleared CIA Officer FBI Refuses to Apologize to Cleared CIA Officer http://www.washingtonpost.com/wp-dyn/articles/A64592-2001Aug11.html By Dan Eggen Washington Post Staff Writer Sunday, August 12, 2001; Page A02 In the nearly six months since the arrest of FBI spy Robert P. Hanssen, the bureau has refused requests for a formal apology from a CIA officer who was wrongly targeted as a suspect for Hanssen's crimes, according to documents, government officials and the man's attorney. The officer, whose identity is secret because of his highly classified status, has been cleared and reinstated after being suspended two years ago from his CIA job. But the man has not yet received a formal apology or a letter of exoneration that he has requested from the FBI, his attorney said yesterday. FBI officials, while acknowledging that the man was wrongly identified as a suspected spy, are proceeding cautiously out of the fear that a full-fledged apology could be used against them in court, sources said. The case is the latest allegation of overzealous investigation by the FBI, which has faced condemnations and lawsuits over its treatment of security guard Richard Jewell in the Atlanta Olympics bombing in 1996 and its prosecution of former Los Alamos nuclear scientist Wen Ho Lee. In all three cases, the bureau is accused of pursuing one suspect despite evidence that should have led to others, and then being reluctant to admit making a mistake. "To cause my client to live one more day than necessary as the suspect in the nation's most damaging espionage case was reprehensible," said John Moustakas of Shea & Gardner in Washington, the CIA officer's attorney. "But to delay longer still the exoneration to which he is manifestly entitled is unforgivable." The 19-year CIA veteran was informed that he was suspected of spying for Russia in August 1999, when agents interrogated him and family members and threatened him with arrest, according to Moustakas. Investigators also allegedly threatened to confront the man's 84-year-old mother, who was in frail health and living in a nursing home. The man was suspended with pay from the CIA for 21 months and subjected to secret searches of his home and computers, taps on his telephone and physical surveillance of his comings and goings, according to a letter from Moustakas to the FBI. Moustakas said yesterday that his client now believes he was targeted as a suspect by the FBI as early as 1997, when he was transferred to a job considered unchallenging for an officer of his expertise. The man continued to be treated as a suspect despite passing several polygraph examinations given to him by the CIA and the FBI over the next several years, according to his attorney and government officials. Much of the government's suspicion was based on a map seized during a secret search of the man's home, which investigators took to be a depiction of drop-off points for Russian agents, officials said. Instead, his attorney and officials say, the officer was an avid distance runner who had merely penned a map outlining his jogging routes and times in Fairfax County's Nottoway Park. "This experience left indelible personal scars that will never fully heal and a cloud that will continue to mar his impressive career unless it is explicitly dispelled," Moustakas wrote on June 1 to then-FBI Director Louis J. Freeh. "Under the circumstances, our request is at the very low end of what fairness and decency require." But Freeh's deputy, Thomas J. Pickard, defended the FBI's investigation of the CIA officer in a June 14 response, writing that "all leads were followed to their logical conclusion." "I acknowledge and regret the impact of this investigation on the life of your client . . . and his family," wrote Pickard, who is now the FBI's acting director. "In view of the pending prosecution of Robert P. Hanssen, the FBI is not in a position to discuss this matter at the present time. However, it is anticipated that at the conclusion of this matter, the FBI will be willing to personally address any concerns." The FBI is continuing negotiations with Moustakas in hopes of reaching an accord, an FBI official said yesterday. The FBI's early focus on the CIA officer was first reported by The Washington Post on Feb. 23, five days after Hanssen's arrest. The New York Times reported further details on the case yesterday, including the FBI's refusal to apologize. Hanssen, 57, pleaded guilty last month to 15 counts of espionage as part of an agreement with federal prosecutors. He will be sentenced to life in prison, rather than the death penalty, in exchange for giving the government a full account of the material he turned over to the Soviet KGB and its Russian successor, the SVR, while working as a top counterintelligence agent at the FBI. In hindsight, officials said, Hanssen and the CIA officer shared a striking number of similarities: Both lived on the same street in Vienna, jogged in the same park and accompanied each other on at least one counterintelligence trip. But the CIA officer was initially singled out because he had contact with much of the classified information that had been compromised. However, the FBI concentrated its search at the CIA, where spy Aldrich H. Ames had worked, rather than at the bureau, where Hanssen spied undetected for two decades. By 1998, officials said, the CIA officer was the lone suspect in their hunt. The man was asked to take an FBI polygraph that year, ostensibly to take part in an ongoing intelligence operation; he passed the test, Moustakas said. Nonetheless, in August 1999, the CIA officer was called to a meeting at CIA headquarters that turned into an interrogation for hours by two FBI agents, according to Moustakas's letter. The agents declined his offer to take another polygraph, and he was stripped of his credentials and escorted out of the building, the letter said. Since then, Moustakas wrote, the man and his family "were made to endure an agonizing silence," without any word of the status of his case. The focus of the FBI's probe did not shift until late last year when investigators obtained documents pointing toward Hanssen. Finally on Feb. 19 -- the day after Hanssen's arrest -- the CIA officer was contacted by the FBI and asked to take another polygraph, which he passed. C 2001 The Washington Post Company -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3496 From: James M. Atkinson Date: Sun Aug 12, 2001 8:10am Subject: FBI ordered to reveal PC snooping technique FBI ordered to reveal PC snooping technique http://www.computerworld.com/storyba/0,4125,NAV47_STO62920,00.html By GEORGE A. CHIDI JR., IDG NEWS SERVICE (August 09, 2001) A federal court ordered the U.S. Department of Justice (DOJ) on Tuesday to reveal technology used to track the computer keystrokes of a suspect in a case observers say has an impact on privacy in this era of IT surveillance. In May 1999, agents from the FBI snuck into the New Jersey office of Nicodemo S. Scarfo Jr., according to court records. They went not to tap his phone but to plant a device to track the tap of his fingers on his keyboard, recording his keystrokes to glean the password for an encrypted file, according to the records. The DOJ, working with the FBI, is charging Scarfo with racketeering, illegal gambling and loan sharking as a member of what they call a Mafia crime family. When agents raided the computer system earlier, they discovered a file named "factors" that was protected with PGP encryption, according to the records. Suspecting the file contained records of gambling debts to support their loan sharking investigation, but unable to crack the encryption, agents installed the key logger to get the password as he typed. The cracked file later became key evidence in their case. What the court doesn't know is how the key logger system works; the government said national security prevents it from disclosing its methods. But U.S. District Court Judge Nicholas H. Politan wants a better explanation. Politan called the FBI's computer keystroke log printout "gobbledygook" and ordered the government to explain the technology used within the next 10 days. The case has broad implications in the escalating debate about technology and privacy in the U.S. The government asserts that revealing the technology used to learn Scarfo's PGP password would endanger the lives of U.S. agents and hurt ongoing investigations of foreign intelligence agents. But a software designer says it's unlikely that a keystroke logging program itself contains especially sensitive technology. "It's not rocket science...I sure hope our tax dollars didn't go to their top scientists to spend all their time developing a keystroke logger," said Richard Eaton, president of WinWhatWhere Corp., a Kennewick, Wash.-based software company that makes keystroke logging tools. "They said the methodology is the security issue.... It could be the way the data is transmitted out of the system. I don't know if it was e-mailed out of there or what." Court records describe the key logger system as "software, firmware, and/or hardware." Lawyers on both sides are under a court order not to speak publicly about the case. The warrant given to the FBI to secretly install the key logging system and learn Scarfo's PGP password specifically prohibited monitoring of Scarfo's Internet traffic. Internet communications are legally similar to phone conversations and require a warrant for a wiretap, which must meet a higher burden of justification. Politan's ruling may shape the boundaries for legal guidelines for IT surveillance technology, especially the government's use of emerging surveillance technology like the FBI's e-mail monitoring system, formerly known as Carnivore (see story). "In some ways. the law hasn't kept pace with the effect of intrusive technology," said David Sobel, general counsel for the Electronic Privacy Information Center, a nonprofit advocacy group in Washington. "In some cases, law enforcement is exploiting the gap between the development of new technology and its evaluation by the court." The case troubles him, he said, because of the FBI's desire to keep the technology secret. "The government is making the case that they can install sophisticated technology on computers and make a national security claim" to keep it secret, he said. If it became a routinely accepted argument for preventing its disclosure to defendants in court, "it would radically alter our concept of due process and the rights of criminal defendants." -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3497 From: DrPepper Date: Sun Aug 12, 2001 8:50am Subject: Re: [Fwd: Do You Need A Kidney Transplant?] Probably not, , , , , Kidneys are sold all over the world at ENORMOUS prices, like around $50,000 USD and UP! If you need one, what is your life worth? Ron C. =========================== Marcelrf wrote: > Is this a new scam or just a sicko? > > -------- Original Message -------- > Subject: Do You Need A Kidney Transplant? > Date: Sat, 11 Aug 2001 14:43:52 > From: jimsdad@b... > To: marcelrf@m... > > If you need or know of someone who needs a KIDNEY, please contact me. > > I am offering a very healthy (Blood Type "O") KIDNEY by silent > auction. > Bidding will close on August 31, 2001. > > Make your offer by Email. Every bidder will be notified weekly of > latest bid. > > Jim > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 3498 From: Aimee Farr Date: Sun Aug 12, 2001 2:40pm Subject: RE: FBI ordered to reveal PC snooping technique Wonder if they have surreptitious typing rhythm biometric identification on key loggers. That would help with investigation, and the particularization/identification/minimization requirements. Surreptitious biometrics seems to offer some unique possibilities. ~Aimee > -----Original Message----- > From: James M. Atkinson [mailto:jmatk@tscm.com] > Sent: Sunday, August 12, 2001 8:10 AM > To: TSCM-L Mailing List > Subject: [TSCM-L] FBI ordered to reveal PC snooping technique > > > > FBI ordered to reveal PC snooping technique > > http://www.computerworld.com/storyba/0,4125,NAV47_STO62920,00.html > > 3499 From: Aimee Farr Date: Sun Aug 12, 2001 7:55pm Subject: RE: FBI ordered to reveal PC snooping technique > Wonder if they have surreptitious typing rhythm biometric > identification on > key loggers. That would help with investigation, and the > particularization/identification/minimization requirements. Surreptitious > biometrics seems to offer some unique possibilities. > > ~Aimee Duh. I guess the flipside would be commercially-available two- or more-factor passphrase solution incorporating a biometric and/or a situational identifier (whatever you call the latter; time, visual background, technical environment...whatever), so that it is immune from both compelled disclosure and "blue paint" keystroke loggers. Net Nanny's http://www.biopassword.com (keystroke dynamic passphrase) is being licensed for digital rights management ...music downloads and e-books. ~Aimee 3500 From: Miguel Puchol Date: Mon Aug 13, 2001 5:13am Subject: RE: FBI ordered to reveal PC snooping technique There is a biometric product (more precisely fingerprint reader) called U.are.U, made by Digital Persona. It features a USB (hint - USB keyboards may still be inmune from hardware loggers) fingerprint reader, and management software. The nice thing is that it can substitute your password typing, so, you can generate a PGP passphrase very long, and when needed, just put your finger on the reader, and the software will type the password for you. It can work with most Windows programs that require at some stage password entering. The only way to catch this would then be to have a software logger, but I'm not sure if it will catch intra-system typed data, such as a software sending keys to another, like in this case. Cheers all, Mike > -----Mensaje original----- > De: Aimee Farr [mailto:aimee.farr@p...] > Enviado el: lunes, 13 de agosto de 2001 2:55 > Para: TSCM-L Mailing List > Asunto: RE: [TSCM-L] FBI ordered to reveal PC snooping technique > > > > > Wonder if they have surreptitious typing rhythm biometric > > identification on > > key loggers. That would help with investigation, and the > > particularization/identification/minimization requirements. > Surreptitious > > biometrics seems to offer some unique possibilities. > > > > ~Aimee > > Duh. I guess the flipside would be commercially-available two- or > more-factor passphrase solution incorporating a biometric and/or a > situational identifier (whatever you call the latter; time, visual > background, technical environment...whatever), so that it is immune from > both compelled disclosure and "blue paint" keystroke loggers. > > Net Nanny's http://www.biopassword.com (keystroke dynamic passphrase) is > being licensed for digital rights management ...music downloads > and e-books. > > ~Aimee > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3501 From: Date: Mon Aug 13, 2001 10:05am Subject: Privacy Concerns !? Tampabay facial recognition cameras Title; 'They made me feel like a criminal' He was just having lunch in Ybor City when a surveillance camera captured his image. Weeks later, the police show up. [Times photo: Thomas M. Goethe] An image from Ybor City's cameras was reprinted in a national magazine. An Oklahoma woman phoned Tampa police and said the man was wanted. They sought out Rob Milliron. Yes, that's him in the image. But no, he's never been to Oklahoma. And no, he's not wanted. By AMY HERDY © St. Petersburg Times, published August 8, 2001 TAMPA -- Rob Milliron has never married. He has never had kids, never been to Oklahoma. Yet three Tampa police officers went to Milliron's construction job site Monday and asked him whether he was wanted in Oklahoma for child neglect. Milliron It seems that his face wound up on a surveillance camera in Ybor City. News cameras captured that image. A woman in Tulsa saw his picture in U.S. News and World Report and called Tampa police. She said the man in the photo was her ex-husband and was wanted on felony child neglect charges. Turns out they had the wrong man. But the experience has turned Milliron into a vocal critic of the controversial surveillance system. "From that picture, I was identified as a wanted person," said Milliron, 32, whose only previous brush with the law involved a marijuana possession charge when he was 19. The surveillance system uses software called Face-It and is linked to 36 cameras throughout the Centro Ybor entertainment complex and along E Seventh Avenue. Images taken from the cameras are compared with a data base that includes wanted felons and sexual offenders. If the image is a match, officers are dispatched to question the person. But in this case it wasn't the system that flagged Milliron, but simply a woman who saw his picture with a news story. The plainclothes detective, accompanied by two uniformed officers, had a copy of the magazine, folded open to the page with Milliron's photo. After producing identification, answering the detective's questions and enduring curious stares and inquiries from his construction co-workers, a mortified Milliron went home. "He was absolutely horrified," said Cheryl Toole, 32, Milliron's girlfriend of nine years. "He said, "I was surrounded by the police today,' " Toole recalled. "We were worried they'd come to our home in the middle of the night." Equally upsetting, Milliron said, was the fact that beneath his photo in the magazine, a headline read, "You Can't Hide Those Lying Eyes in Tampa." "It made me out to be a criminal," he said. Tampa police Detective Bill Todd, who took the call from the Tulsa woman and interviewed Milliron, said Milliron did not seem upset. "He was laughing about it," said Todd, who spearheaded the software project that captured Milliron's image. Milliron's photograph was captured in June while he was on a lunch break in Ybor City. He didn't know it at the time, but the Police Department used his photo to demonstrate the system to local news media. The software costs $30,000, but is on loan for a year by its owner, Visionics Corp. of New Jersey, while the department decides whether to purchase it. Milliron's photo ran in the St. Petersburg Times June 30. A caption under the photo read, "The man in this image was not identified as wanted." The Times later sold the photo to U.S. News and World Report. The software system has sparked controversy nationwide. Protesters say the "spy cameras" intrude on citizens' privacy. Mayor Dick Greco, however, has said the system is no more intrusive than the cameras found in banks and shopping malls. Milliron, who says he plans to retain an attorney, hopes the software system will be removed. "I don't think it's right," he said. "They made me feel like a criminal." - Times researcher John Martin contributed to this report. Amy Herdy can be reached at (813) 226-3386 or herdy@s... HAVE A GREAT DAY !!! ---------- http://www.sptimes.com/News/080801/TampaBay/_They_made_me_feel_li.shtml [Non-text portions of this message have been removed] 3502 From: James M. Atkinson Date: Mon Aug 13, 2001 10:06am Subject: Spy Secrets of the CIA http://www.popsci.com/scitech/features/cia/index.html March, 2001 Spy Secrets of the CIA The agency's secret museum is a spymaster's dream. You can't get in for a tour but we did. By Hank Schlesinger Photography By John B. Carnett At the end of an ordinary tree-lined road in Langley, Virginia, beyond multiple security checkpoints, is the George Bush Center for Intelligence, headquarters of the Central Intelligence Agency. This is the nexus of America's expansive intelligence network. Information transmitted to the facility here is poured over and analyzed by agency officials. Given the necessarily secretive nature of the agency, it's surprising to find a museum on the premises. Not surprisingly, the museum is not open to the general public, but Popular Science got a sneak peek inside-under escort, of course. Right now the museum is presenting two exhibits. One comes from H. Keith Melton, a private collector of espionage artifacts and author of The Ultimate Spy. The second exhibit traces the agency's history from its beginnings as the Office of Strategic Services (OSS) in the second World War through the Cold War. "We're an organization that is 50 years old," says exhibit center curator Toni Hiley. "We have young people coming onboard and, like a lot of young people, they may not know their history from 50 years ago." Perhaps just as important, the museum displays the agency's technological legacy as well as that of its allies and enemies. The fictional gadgets of 007 are entertaining and perhaps even offer inspiration to the secret gadget makers, but the real thing has to be field-tested, as an agent's life may depend on it. Here is a sampling of what really worked. U-2 Spy Flights On May 1, 1960, U.S. pilot Francis Gary Powers took off from an air base in Pakistan in his high-flying U-2B spy plane on a mission that would have carried him across nearly 3,000 miles of the Soviet Union to a landing in Norway. He never got there. Downed by a Soviet missile, he was captured and convicted on spying charges by a Soviet court. Initiated in the mid-1950s and built by Lockheed's Skunk Works, the first generation of U-2 spy planes was said to have a top altitude of more than 70,000 feet. Because of the extreme altitude, U-2 pilots wore first generation pressure suits. The suit, film, and helmet exhibited are similar to what Powers wore on his ill-fated mission. A World War II American pilot on a vital mission has been shot down behind enemy lines. At that time, the United States could build planes faster than pilots could be trained, so it was essential that any downed pilot try to evade capture and that any captured pilot try to escape. To assist them, the OSS created several covert compasses and maps. Compasses were hidden in buttons, belt buckles, and even a pencil clip. Maps were concealed inside playing cards and even on garments. A map printed on silk not only provided accurate readings for escaping aviators but also could also be folded and unfolded silently. Spy Shopper With American ingenuity turning out an ever more expanding array of specialized cameras, weaponry, and concealment devices, intelligence officers were finally able to pick the right tool for any specific job. But the organization needed to keep intelligence officers-particularly those thousands of miles from Washington-up to date on the latest advances. The OSS looked to the Sears & Roebuck model of shopping, creating a catalog of the latest gear for the well-equipped spy. The first catalog was issued in July 1944, and included pictures, descriptions, and instructions for each item. Microdots A favorite device of classic espionage movies and books, microdots did in fact exist and were perhaps one of the most insidious means of transporting stolen information. Vast quantities of data could be shrunk down to virtually undetectable size. Microdots were used during the Cold War on both sides, as this miniature camera attests. The camera itself was small enough to be easily hidden. Two favorite locations for hiding a microdot were behind postage stamps or between the narrow layers of a postcard. In this way, ordinary mail became a favored, nearly foolproof means of transporting the most secret of messages. Hidden Camera The KGB surveillance workhorse for the Cold War was the famed F-21 camera. Originally introduced into service in 1948, the F-21 was in wide use by the 2nd and 7th Directorates of the KGB until the 1980s. The F-21 used a spring-driven motor to advance the film after each shot. Measuring approximately 3 inches by 2 inches and featuring a 28mm lens, the camera could shoot as many as 100 frames by utilizing special ultrathin film. Its size made it ideal for covert photo-graphy. By using a body harness and a remote handheld control to snap pictures and set F-stops, the KGB managed to conceal the F-21 in a huge assortment of everyday utilitarian objects. During the 1980 Moscow Olympics, the F-21 was fitted into an Olympic Seal belt buckle. As a fashion accessory, the Olympic multiringed logo was ubiquitous and attracted no attention. Dead Drops As a Cold War spy, the two most dangerous parts of your job are gathering information and then passing it along to your case officer. Direct contact with a known intelligence officer can blow your cover. Hence, the need for dead drops is vital. The term "dead drop" simply means that either the information or other valuables are left unattended in a set location for prearranged pickup. The requirements for a dead drop device were its ability to remain unobtrusive while protecting whatever was held within it from both the elements and curious passersby. Sometimes dead drop spikes were inserted into the ground; other devices were constructed to look like old bolts and were secured into fences or buildings. Milkmaid Mementos Virginia Hall was one of the great unsung heroes of the Allied effort in World War II. Despite having lost her left leg below the knee in a hunting accident prior to the war, Hall nevertheless worked effectively. When France fell to the Germans, Hall operated behind enemy lines in France undercover as a simple milkmaid. Her efforts and expertise with a radio assisted in the preparation for the Allied invasion. After the war, she became one of the agency's first female operations officers. Her memorabilia are on loan from her niece, Lorna Catling. The Thing On July 4, 1945, in recognition of Independence Day, a group of USSR schoolchildren presented the U.S. Ambassador to the Soviet Union a beautifully hand-carved United States Seal. The gift was hung above the ambassador's desk. "The Thing" was concealed in a hollowed-out portion of the seal, and for seven years, it transmitted every word said in the Ambassador's office. When the device was eventually uncovered in 1952, the CIA couldn't figure out how it worked, hence the ambiguous nickname, the Thing. England's MI5 security service finally realized the Thing was the world's first passive cavity resonator. A small hole in the Great Seal located in the beak of the eagle allowed sound to enter the device through several holes at its cylindrical top. The sound vibrations inside the cavity changed the charge on the long antenna at its bottom. When a high-frequency radio wave, administered by an operative in a nearby building, struck the antenna, its signal was reflected back. The modulations in the reflected radio beam were then converted back to sound. The device displayed at the museum is a detailed replica of the original. Tracking Scents You leave your East German apartment at the height of the Cold War on a perfectly normal spring day. And while you may suspect that you are being followed, surely your circuitous route through the city's crowded streets has thrown off whoever is following you. Don't count on it. The technology that keeps someone on your tail needn't be a sophisticated device that employs a microtransmitter. The East German Ministerium f¸r Staatischerheit (Ministry for State Security)-also known as Stasi-sometimes relied on what you could call a bio-tracking device: female dog hormones. Taken from female German Shepherds, the hormones were covertly sprayed on the doormat of a suspect's home, a bicycle tire, or even directly on the suspect. Agents using male German Shepherds could then track the subject's movements around a city for days. The Stasi eventually developed 10 different variations of the scent so that multiple subjects could be tracked simultaneously. Covert Transmitters A heavily armed enemy convoy transporting weapons and ammunition rumbles down a dirt road on a moonless night. Miles away, the activity is recorded by a remote listening station. In the 1970s, these covert seismic intruder devices were designed to blend in with the local terrain. Resembling stones, dried mud, or dung, they could detect movement of pedestrians or vehicles within 300 meters and then relay the information through coded impulses via a built-in dipole antenna. Powered by a trio of mercury cells, they could be planted along strategic areas without arousing suspicion. Mini Motorcycle Imagine parachuting behind enemy lines: You can bet that a fast getaway would be among your highest concerns. So why not take a motorcycle along with you? Designed for use by British Special Operations Executive during WW II, the collapsible Welbike motorcycle measured just 15 inches high and 51 inches long. When folded, the 70-pound vehicle easily fit into a standard issue torpedo-shaped parachute container. Once on the ground, the agent could crank up the 98cc two-cycle Villiers engine and cruise away from the drop zone at a top speed of 30 mph. With a modest cruising range of 90 miles, the Welbike allowed agents to make a relatively speedy departure. After the war, the bikes were marketed to the general public with little success. www.popsci.com The official Web site of Popular Science Magazine. © 2000 Times Mirror Interzines, a division of Times Mirror Magazines. -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3503 From: Aimee Farr Date: Mon Aug 13, 2001 0:42pm Subject: EPIC to FBI: Where is the legal analysis on Carnivore? http://www.newsbytes.com/news/01/168926.html Group Asks Court To Get Info On FBI E-Mail Snooping Tool By Brian Krebs, Newsbytes WASHINGTON, D.C., U.S.A., 10 Aug 2001, 2:10 PM CST A consumer group has asked a federal judge to depose top FBI officials in connection with hundreds of documents that could shed new light on the government's controversial e-mail surveillance tool, formerly known as "Carnivore." The Electronic Privacy Information Center (EPIC) filed the request on Thursday to determine the existence of papers that would show whether Justice Department conducted a thorough legal and constitutional inquiry into the device before using it in the field. During a six-month period last year, EPIC used the Freedom of Information Act to obtain nearly 2,000 Carnivore-related documents from the Justice Department. While many of those documents were heavily edited, EPIC General Counsel David Sobel noted that all of the information was related to Carnivore's technical specifications. "None of the documents reflect any policy or legal analysis of Carnivore and it's just impossible to believe that documents detailing that analysis donít exist," Sobel said. The motion, filed with the U.S. District Court for the District of Columbia requests sworn depositions from FBI Assistant Director Donald Kerr, FBI General Counsel Larry Parkinson and Associate Attorney General Kevin DeGregory. All three testified before the House and Senate Judiciary committees last year that the Justice Department had conducted a broad inquiry into the legality of Carnivore. EPIC is also requesting depositions from any FBI employees who may have helped prepare the congressional testimony. "If the answer is that there is no such material, then that means the FBI gave no consideration to the constitutional issues before it started using Carnivore," Sobel said. "And it means the assurances expressed to the congressional committees was a post-hoc rationale." FBI spokesman Paul Bresson said the agency is cooperating with the FOIA requests, but noted that such requests are labor-intensive and can often take months to complete. "I imagine there are documents that relate to the legal issues of Carnivore," Bresson said. "We'll consider their request like everyone else's and determine what is releasable under the law." Designed to attach to an Internet service provider's (ISP) network, Carnivore ñ since renamed a much less ominous-sounding DCS-1000 ñ is capable of sifting through loads of network traffic to pick out and store a suspect's e-mail communications. But EPIC and other consumer and privacy groups have charged that the device does not limit the collection of information that is unrelated to the investigation. Critics also challenge whether law enforcement officials should be forced to meet a higher standard of court approval before using the eavesdropping tool. Last year, an independent team of scientists and university researchers completed a technical review of Carnivore, and found that while the system does filter out unrelated communications, it lacks adequate safeguards that would prevent ensure law enforcement officials from tampering with the evidence collected. The Justice Department under the Bush administration has yet to act on the the recommendations in the report. Review of device's impact on privacy has now fallen to Daniel Collins, the Justice Department's new chief privacy officer. Collins could not be reached for comment on this story. At his confirmation hearing last month, FBI Director Robert Mueller said the agency's snooping ability via DCS-1000 will respect online privacy, though Congress might want to consider drafting additional statutes regarding criminal investigations online. In late July, the House of Representatives did just that, approving a bill that would require the FBI and the Justice Department to give Congress detailed information about how the e-mail-monitoring device is used by law enforcers. EPIC's filing is at http://www.epic.org/privacy/carnivore/discovery_motion.pdf . 3504 From: Gordon Mitchell Date: Mon Aug 13, 2001 1:04pm Subject: CPM-700 needed I just dropped my CPM-700 for the last time. It has given up working for me. Anybody have one that they want to sell? I am looking for the basic black box, no probes needed. Gordon Mitchell Future Focus, Inc Woodinville, WA (425) 489-0446 [Non-text portions of this message have been removed] 3505 From: James M. Atkinson Date: Tue Aug 14, 2001 4:32pm Subject: FBI Cherry Pickers - aka "Agent Dumbass" Now this is interesting, Within the past few days, while in my travels I spotted a telephone company "cherry picker" truck parked underneath a major cable run to the CO. OK, this in and of itself was normal, but the truck just didn't look right... the driver hadn't parked it the way most outside plant folks do, had neglected to put out his orange cones, didn't have the wheels chocked, lacked a hard hat, etc... Yes, the truck had clean and crisp Verizon logo on it, but too many things just didn't look right. Realizing that something wasn't right I made a loop around the block and came back for another look. I watched the bucket operator from a distance, and he looked really nervous as he worked on the SAC on the cable, his craft methods were not smooth, he was carrying his tools wrong, and was fumbling around like a teenage kid on prom night. Then I saw that the bucket operator was wearing a black T-Shirt with the three letters FBI plastered across the back in 8 inch letters. What the hell is this... either we have a freelance telephone guy up to some mischief (ie: installing illegal bugs), or we have a seriously clueless FBI dweeb (aka "Agent Dumbass") who needs to learn to be more discreet. Either way I would be interested in hearing the lists opinions. -jma -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3506 From: Miguel Puchol Date: Tue Aug 14, 2001 4:53pm Subject: RE: FBI Cherry Pickers - aka "Agent Dumbass" I'd go for Agent Dumbass...mainly because of the T-shirt. In any case, I'd be surprised that the FBI (or other agency in whatever country) climbed up poles to place taps, rather than just get a court order and do it at the exchange. Cheers, Mike > -----Mensaje original----- > De: James M. Atkinson [mailto:jmatk@tscm.com] > Enviado el: martes, 14 de agosto de 2001 23:32 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] FBI Cherry Pickers - aka "Agent Dumbass" > > > > Now this is interesting, > > Within the past few days, while in my travels I spotted a telephone > company "cherry picker" truck parked underneath a major cable run to > the CO. > > OK, this in and of itself was normal, but the truck just didn't look > right... the driver hadn't parked it the way most outside plant folks > do, had neglected to put out his orange cones, didn't have the wheels > chocked, lacked a hard hat, etc... Yes, the truck had clean and crisp > Verizon logo on it, but too many things just didn't look right. > > Realizing that something wasn't right I made a loop around the block > and came back for another look. > > I watched the bucket operator from a distance, and he looked really > nervous as he worked on the SAC on the cable, his craft methods were > not smooth, he was carrying his tools wrong, and was fumbling around > like a teenage kid on prom night. Then I saw that the bucket > operator was wearing a black T-Shirt with the three letters FBI > plastered across the back in 8 inch letters. > > What the hell is this... either we have a freelance telephone guy up > to some mischief (ie: installing illegal bugs), or we have a > seriously clueless FBI dweeb (aka "Agent Dumbass") who needs to learn > to be more discreet. > > Either way I would be interested in hearing the lists opinions. > > -jma > > > > -- > > ------------------------------------------------------------------ > ------------------------------- > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008jmatk@tscm.com > ------------------------------------------------------------------ > ------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ------------------------------------------------------------------ > ------------------------------- > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3507 From: Aimee Farr Date: Tue Aug 14, 2001 8:31pm Subject: RE: FBI Cherry Pickers - aka "Agent Dumbass" Verizon employee in rogue letters that he got a Target, and he's a rebel and a screw-up? Out of 9th Circuit today, cordless interception, pre-94: http://www.ca9.uscourts.gov/ca9/newopinions.nsf/92F503AB7C1ED29988256AA7007F 6785/$file/0015026.pdf?openelement Private party got a signed 'permission slip' from the Sheriff. *laughter* (Sloppy opinion, something strange there.) ~Aimee 3508 From: Date: Wed Aug 15, 2001 2:21am Subject: "Agent Dumbass" Honorable JMA and Esteemed Group: I could not resist this one - as a former narc, having "been there and done that," I herewith submit the following for the perusal of this fine group: On the other hand - look at their recent accomplishments. I think the proper word, best describing their business as usual, egomaniac approach to many jobs is 'INCREDIBLE, JUST ------- INCREDIBLE!" I rest my case... John R. Dillon THE DILLON INVESTIGATIVE FIRM INC. 518.463.6300 Facsimile: 518.435.1048 RECIPIENT TAKE NOTICE: This electronic transmission (e-mail) may contain confidential/privileged information that is intended only for the exclusive use by the entity/individual(s) to which it is directed. IF YOU ARE NOT the intended recipient, YOU ARE HEREBY NOTIFIED that any disclosure, copy/distribution thereof is prohibited. IF YOU HAVE received this electronic transmission in error, please notify the sender by telephone immediately so that we can arrange for the return or destruction of the information contained at no cost to you. [Non-text portions of this message have been removed] 3509 From: Shawn Hughes Date: Wed Aug 15, 2001 11:54am Subject: Re:Agent Dumbass Hmm, smells fishy. In the Southeast US, Field agents will *not* do technical work beyond application of a body wire. They send in a request to ATL for a tech to come out and do ALL their installs. I have only seen fedz swing from a phone line in one case in three years, and it wasn't a phone tap, but I can't elaborate. I have NEVER seen a non-SWAT agent wear a FBI t-shirt in the field, just at FLETC and Redstone. Most wear golf shirts or suits per field office policy, and because they are too pretty to wear an ol' T-shirt. Now, consider this............ Most field offices are agent - poor. But instead of recruiting new agents, they sucker a local Chief or Sheriff, and say, "If you'll loan me an officer, we can split any forfeits, awards and proceeds....." This is called a TFO; Task Force Officer. One a these locals ( I was obliquely involved in this program) might have gotten suckered into sitting in a bucket truck to visually watch for a suspect, handed a tool bag and told to 'act natural', and got the bright idea of using the bucket. That T-shirt is the problem. I watched a friend sign up in the DEA TFO deal, they HANDED him a Saber-3 out of a cardboard box, GAVE him a class IV vest, but made him sign about 6 pieces of paper before issuing him a ratty DEA raid jacket. How about this........... Have you been to your local mall lately? The teenybopper botique has two new t-shirts, one has FBI in about 8 inch letters front and back, and "Female Body Inspector" in about 10 point print below the FBI. Then they have one that says "Undercover police officer" (my personal favorite, I love watching boot narcotics guys, usually pulled off patrol, short hair, short mustache, wearing an old t-shirt and blue jeans, standing in the interview position trying to buy crack! ) Many variations on this theme, too easy to stop on the most obvious. Wished you had gotten a picture... Shawn 3510 From: Shawn Hughes Date: Wed Aug 15, 2001 0:11pm Subject: Compandering Hi, I'm in an argument with an individual. I am looking to the group for either more ammunition against the person, or if I am (ahem) mistaken, I'd rather hear it here, than from Mr. Blustery. As you all know, according to Federal law, you are narrowly limited in what you can do with the ORIGINAL audio signal. I posit that compandering is not altering the original voice, simply evening out a recording level automatically in a gross sense. Smart guy says that it is enhancement, and therefore verboten, only allowed downstream if you make a copy of the unadulterated voice path. Maybe he is right. Reason I ask is that I am building such a circuit for a shotgun mic, and have been told by a busybody that it won't be legal. Thanks in advance, /flame retardant mode ON Shawn 3511 From: Steve Uhrig Date: Wed Aug 15, 2001 0:59pm Subject: Re: Compandering Once upon a midnight dreary, Shawn Hughes pondered, weak and weary: > As you all know, according to Federal law, you are narrowly > limited in what you can do with the ORIGINAL audio signal. I > posit that compandering is not altering the original voice, > simply evening out a recording level automatically in a gross > sense. Smart guy says that it is enhancement, and therefore > verboten, only allowed downstream if you make a copy of the > unadulterated voice path. Maybe he is right. Speaking as an active expert witness in court several times a year on the subject matter, I'd fry you for using the thing. Legalities aside, the technical points of the law frequently only give you grounds for (expensive) appeal. How would a hostile prosecutor and a jury already intimidated likely rule on a technical matter way over their heads, especially on a currently very sensitive issue like potential invasion of privacy? > Reason I ask is that I am building such a circuit for a > shotgun mic, and have been told by a busybody that it won't > be legal. How would using it, or possibly even possessing it under the provisions of 18 USC 2511 and 2512 be legal? Even if you were in a one party consent state, enlighten us on how you, using a shotgun mike as neither party, could legally use the thing? If you're only birdwatching, you never would have posed the question. Therefore you are considering a surveillance application. And you lose, under federal and most state laws. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: James M. Atkinson Date: Sun Aug 8, 2004 0:20am Subject: UHF Bug Bands UHF-3 Band - Beginning at 365 MHz the spectrum becomes swamped with newer eavesdropping devices which are widely available, and heavily used. 365.0000 365.1136 366.0000 368.0000 368.6400 368.6932 369.0000 369.5000 370.0000 372.0000 372.2727 372.5000 374.0000 375.0000 375.8523 377.0000 377.4720 378.0000 379.0000 379.4318 379.5000 379.9500 380.0000 381.0000 381.8000 382.0000 383.0000 383.0114 384.0000 384.0022 384.3000 384.7500 384.7900 385.0000 386.0000 386.5909 388.0000 389.0000 390.0000 390.1680 390.1705 390.3000 391.2050 - Extremely Hostile 392.0000 392.7280 - Extremely Hostile 393.0000 393.2160 393.2660 393.3000 393.7500 395.0000 396.0000 397.0000 397.3295 398.0000 398.6050 - Extremely Hostile 398.7000 399.0000 399.0300 - Extremely Hostile 399.4550 - Extremely Hostile 399.9500 ---------- UHF-4 Band - A major band break for the UHF band is between 400 and 420 MHz which is used by many eavesdropping devices. 400.0000 400.9091 402.0000 402.0800 402.8000 403.0000 403.5500 403.9660 404.0000 404.4886 406.0000 407.0000 407.3000 407.3500 408.0000 408.0682 409.0000 409.5000 409.6000 410.0000 410.7000 411.5000 411.6477 411.6500 411.8000 412.0000 412.6100 413.0000 414.0000 414.5000 414.8000 414.9800 - Extremely Hostile 415.0000 415.2273 416.0000 416.2500 - Extremely Hostile 416.8450 - Extremely Hostile 417.0000 417.5000 417.8000 417.9000 418.0000 - Extremely Hostile 418.1000 418.4000 418.6500 418.8068 419.0000 ---------- UHF-5 Band - The next band break for the UHF band is between 420 and 450 MHz. The band is quite popular with a great deal of usage around the 433 and 434 MHz. 420.0000 420.0150 421.0000 422.0000 422.3864 422.5000 423.0000 423.0144 423.2000 423.2200 424.0000 424.9760 425.0000 425.9659 426.0000 427.0000 427.1250 - Extremely Hostile 427.4750 - Extremely Hostile 427.8250 - Extremely Hostile 428.0000 428.6350 - Extremely Hostile 429.0000 429.2500 429.5050 - Extremely Hostile 429.5454 429.5455 429.9500 430.0000 432.0000 432.5000 432.9200 433.0000 433.0150 433.1250 433.2000 433.4000 433.4200 433.5000 433.6000 433.7000 433.8000 433.8700 433.9000 433.9200 - Extremely Hostile 433.9250 433.9500 433.9700 434.0000 434.0100 435.0000 436.0000 436.7045 438.0000 439.2500 - Extremely Hostile 439.5000 440.0000 440.2841 441.8400 442.2000 442.3680 443.0000 443.8636 445.0000 445.9000 447.0000 447.2250 447.4432 447.7250 448.0000 448.7400 449.0000 449.1200 449.1900 ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 9320 From: kondrak Date: Sun Aug 8, 2004 5:03am Subject: Re: Re:the Government and your OPSEC Or just lie...I've been there and seen that myself... And crap like the patriot act just promotes them to do more and fudge the truth more. Sorry, but I've given up on their "truthful" motives from cases I've worked. Used to think most guys were honorable, but latest observations tend to disprove that. They're acting more like their Mossad teachers every day. Liberty and rule of law be dammed. Spit shine those boots, you'll look good in them. Death of liberty and rule of law follows. I worry for my country...you don't inspire much faith to the contrary.... Dumpster diving an shaking down associates isn't new, that's been done for 20 years by both sides,with varying results. Your mileage may vary. >It's romantic to see the Feds as blind and bumbling, but I've worked for >them. There hasn't been anyone I'm aware of we EVER investigated in the >southeastern US that we couldn't eventually build a case on. We never >needed high-end gear to sniff outbound computer traffic; all we needed was >their trash or an ex-girlfriend or former associate......... or we'd get a >warrant and take their box and paperwork. > >Kondrak, I'm polishing my jack boots. > > >-Shawn 9321 From: Fernando Martins Date: Sun Aug 8, 2004 7:18am Subject: Re: Help with CCTV over fiber optic sought I'm sending a small pdf with an 11 pages tutorial, from FiberOptions, regarding fiber optics in cctv systems. FM --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.732 / Virus Database: 486 - Release Date: 29-07-2004 [Non-text portions of this message have been removed] 9322 From: Cornolio Date: Sun Aug 8, 2004 3:14am Subject: Re: FCC Seeks Internet Phone Wiretap Access On Sat, Aug 07, 2004 at 01:22:01PM -0700, G P wrote: > Good luck. I started work on a commercial STU-III > variant a few years back and very quickly realized > that it would never, ever, under any circumstances, > make it to market unless it was an underground open > source project. I ended up under investigation for > it, business contacts were destroyed at every step, > they (whomever "they" is) will not allow an encrypted > phone to market without escrow. We have build a secure mobile phone (CryptoPhone GSM), and have not encountered any problems with 'them' (yet). But that is probably because we are based in Europe, and EU countries realize that _everyone_ is spying on each others industry. So we actually advocate encryption (for the moment). To protect ourselves against 'unwanted interference', and convince our customers that our product can be trusted, we publish the full source code of our product. And besides selling the complete CryptoPhone, a software only version is available for free that allows anyone to make secure calls using their computer and a modem. A lot of thought went in the design. We wanted to make a phone that is user friendly, and fool-proof. So we decided to pick the encryption algorithms for the user (AES 256 _and_ Twofish), and make sure there are no long keys they need to remember, or can be forced to turn over the used keys. For that we do use a 4096 Diffie Hellman key exchange that was mentioned on this list before. The nice thing about this is that every call a new 4096 Bit key is generated, and that the user has no knowledge about this key. After the call the key is wiped from memory, and the user can not be forced to turn over the key. At this moment organizations like Greenpeace USA are using/testing our phone. I could go on about our product for a long time, but I invite everyone to read our (long!) FAQ: http://www.cryptophone.de/html/faq_en.html Feel free to mail me off list if you have questions. With regards, Barry Wels GSMK CryptoPhone 9323 From: Gerald Michael Wieczorek Date: Sun Aug 8, 2004 3:47am Subject: Re: Digest Number 1644 The end is near??? They have won, at least it sure feels that way? Just cause I'm paranoid doesn't mean somebody isn't after me. I did a very small job for a student in Pakistan involving an fake escrow site, he sent me payment in cash, it never arrived. Maybe he lied, maybe it got lost. Next we were exchanging civil email and IM messages about how America is viewed in Moslem countries. Exchanges were civil but strong. Then Yahoo DELETES MY EMAIL ACCOUNT I was emailing him from, and one of my Yahoo groups "Terrorist Intel" is also deleted. All the rest of my groups are intact. Terrorist Intel was Osint, Automatically searching 18,696 news sources every 5 minutes, foreign and domestic and 300 blogs and 40 forums. We also track propaganda sites and terrorist sites. Intel YOU won't see on TV. 25 Terrorist websites with URL's, Lot of good stuff, gone. When you temp lost your group did it say "There is no group called " Weird and weirder. Gerald 9324 From: Shawn Hughes (Road) Date: Sun Aug 8, 2004 5:55pm Subject: Re: Digest Number 1645 At 01:17 PM 8/8/04 +0000, you wrote: >Or just lie...I've been there and seen that myself... You may have. To hear you talk, you posit that it is the norm and not the oddity. I assert it is not. >And crap like the patriot act just promotes them to do more and fudge the >truth more. I disagree. I will say that the patriot act has its' problems, but I disagree that it, in your words, "promotes fudging". To the contrary, it loosens several constraints, obviating the need to, uh, fudge. I have never worked a case where we needed to fudge. Either we got them, or there wasn't enough evidence, so we left them alone and moved on. Occams' razor at work. >Sorry, but I've given up on their "truthful" motives from cases I've worked. I don't understand this, and am not sure I want to delve into it. >Used to think most guys were honorable, but latest observations >tend to disprove that. I take offense to this statement. I am sorry that from your warped perspective that things 'seem' to be less honorable to you, but when you lower the entry standards, raise expectations, and restrict the ability to accomplish the mission, then you should start to expect to see the number of incidents rise. Especially in a country where lawsuits and second guessing has become the sport of kings. However little I think of your opinion, I still am calling you out on your assertation that honor has disappeared from Law Enforcement. To paint with such a broad brush when speaking about skin color is called racist, is it reasonable to use the same brush on a profession? >They're acting more like their Mossad teachers every day. Liberty and >rule of law be dammed. You don't spend much time in the Federal Circuit, do you? It has swung so far to the liberal that I am surprised ANY agency can get a conviction. Oh, I forgot. The judiciary are "in it" with "us", as well.... I enjoy "pronoun theorists" = THEY watch US about YOU know WHAT........ lol >Spit shine those boots, you'll look good in them. I do look just fine in my Danner Acadias. I prefer my hi-tek brown hiking boots, though. ;) >Death of liberty and rule of law follows. I agree that liberty is dwindling. However, if you will recall your middle - school American Government class, the legislative, not the executive branch makes the laws. As long as *you* keep electing liberal lawmakers, eventually, we will have the entire country eschewing the peaceful nirvana that liberals have made California. >I worry for my country Finally, a point we can agree on. I, too, worry for my country. When I have to arrest people for shooting someone breaking into their homes, something dreadfully wrong has happened. When rapists are afforded more protections than their victims, something has gone wrong. >...you don't inspire much faith to the contrary.... I'm sorry. I've never considered myself to be inspiring. I simply arrest the guilty, protect the innocent, and convince the undecided using the tools you the people will let me have. No more, no less. All - I apologize for commandeering the bandwidth. To make up for it, can anybody explain to me how to conduct a line noise test in the SE US without the fancy Bell meter the craftspeople use? I'm at a remote location and I'm having trouble logging in. Thanks, Shawn ==================================== Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response, LLC www.warriormindset.com ////////////////////////////////////////////////////////////////////////////// ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. 9325 From: kondrak Date: Sun Aug 8, 2004 6:54pm Subject: Re: Digest Number 1645 Well, I belive there's entirely too much judicial activism being legislated from the bench. I always thought you had to be able to read the laws before you were made a judge, (the 9th Circus comes to mind) as well as the old saw, "what do you call a lawyer with an IQ of 80?...Your Honor" > >Death of liberty and rule of law follows. > >I agree that liberty is dwindling. However, if you will recall your middle >- school American Government class, the legislative, not the executive >branch makes the laws. As long as *you* keep electing liberal lawmakers, >eventually, we will have the entire country eschewing the peaceful nirvana >that liberals have made California. > Point well taken, I can totally agree with you there Shawn. I certainly do my best to "not" elect liberals, but since the dead vote more often in my state than the living, theres not much you can do. Election fraud will be even worse once computerized voting becomes commonplace. Can you think of a bigger prize a hacker would try for than to change an election? Especially if the "other" party is funding him/her. > >I worry for my country > >Finally, a point we can agree on. I, too, worry for my country. When I have >to arrest people for shooting someone breaking into their homes, something >dreadfully wrong has happened. When rapists are afforded more protections >than their victims, something has gone wrong. Me too, and yes, I admit I was a little hasty with that broad brush. Sri >All - I apologize for commandeering the bandwidth. have you dialed into a quiet term and had a look at the noise with a scope? I find that and a 1004 hz port most helpful for a quick check for distortion, noise etc.. >To make up for it, can anybody explain to me how to conduct a line noise >test in the SE US without the fancy Bell meter the craftspeople use? I'm at >a remote location and I'm having trouble logging in. > > >Thanks, > >Shawn > > > > >==================================== >Shawn Hughes >Special Projects Consultant and Subcontractor >110 Hughes Hale Lane, Harriman, TN 37748 USA >(865) 335-7992 Voicemail >srh@e... >/////////////////////////////////////////////////////////////////////////////// >Lead Instructor >Explosives, WMD, and Technical Operations >Tactical Response, LLC >www.warriormindset.com >////////////////////////////////////////////////////////////////////////////// > >******NOTICE: Due to the age of my email account, I have to set spam >filtering VERY high. If you do not receive a response in a reasonable >amount of time, please try an alternate communications method. I apologize >for the inconvienence. > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9326 From: Steve Uhrig Date: Sun Aug 8, 2004 4:34pm Subject: Line noise On 8 Aug 2004 at 15:55, Shawn Hughes (Road), who eschews obfuscation, wrote: Hi Shawn, > To make up for it, can anybody explain to me how to conduct a line > noise test in the SE US without the fancy Bell meter the craftspeople > use? I'm at a remote location and I'm having trouble logging in. Just off the top of my head ... Connect an AC meter or oscilloscope to the phone line. Go off hook. Use the phone or a butt set or just bounce the line to simulate a dial pulse, and dial a single digit to kill the dial tone. That gives you battery and theoretically a clean line with nothing on it but DC. You'll have several seconds to measure before the telco kicks over and gives you a recording. If that happens, just go on hook then off hook again. ANY measured AC on the meter or scope is noise. Make a note of the level. Millivolts or dBm or whatever. Hopefully not volts. There is some spec for allowable noise. I don't know what it is (Charles?). There might be a lot of specs. Report your findings to the telco and see if your reading exceeds their spec. See if you can correlate the problem to anything, like rain, lack of rain, wind, temperature fluctuations, whatever. All this will help a competent repair person isolate the problem. Not a scientific method, but better to quantify a complaint. You'll have more credibility saying there is 350 millivolts of noise or AC hum, or +3dBm of noise (made up numbers; I have no idea as to the spec), than just saying you have noise on the line. The telco will have test numbers they can access which I think removes battery and shorts the loop at the C.O. end for several minutes, then releases automatically. That's what the test number does for my exchange. If you can get them to respond to a trouble call, that's much of the battle. Make sure you read the incoming C.O. line directly with the premises disconnected so they can't claim it's a problem on the premises which is not their responsibility. Virtually all telco repair people are competent and efficient, and if you can get them juump started they'll usually take care of things correctly and in short order. Very impressive skill set and experience with most of them. Some are surprised you talk their language, but others take it in stride. You know how to deal with the different personalities. I'm out in a rural area, and my credit card line had some noise on it which caused problems with the card processing. The telco said their responsibility was to provide a voice grade line and they were doing that; data was not their problem. I made the measurement as described above, reported it to them, and they then told me there were no more pairs back here to switch me to. After squeaking loudly enough, they traded my pair with another customer on the street who didn't use data and didn't complain. Hope you get a clear line out of this. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9327 From: Cristian Date: Mon Aug 9, 2004 0:53am Subject: Re: FCC Seeks Internet Phone Wiretap Access > >We have build a secure mobile phone (CryptoPhone GSM), > >To protect ourselves against 'unwanted interference', and convince our >customers that our product can be trusted, we publish the full source >code of our product. Sounds good, but who can see what's really inside a phone? Cristian ---------- --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.733 / Virus Database: 487 - Release Date: 02/08/04 [Non-text portions of this message have been removed] 9328 From: Cornolio Date: Mon Aug 9, 2004 2:47pm Subject: Re: FCC Seeks Internet Phone Wiretap Access On Mon, Aug 09, 2004 at 08:53:08AM +0300, Cristian wrote: > > > >We have build a secure mobile phone (CryptoPhone GSM), > > > >To protect ourselves against 'unwanted interference', and convince our > >customers that our product can be trusted, we publish the full source > >code of our product. > > Sounds good, but who can see what's really inside a phone? > Cristian Good point. You could compile the source that is available on our website, and compare it with the files in the phone. We are working on a way to make this more transparant (proper build instructions). With regards, Brry Wels GSMK CryptoPhone 9329 From: James M. Atkinson Date: Mon Aug 9, 2004 3:44pm Subject: Curious Manchurian Inquiries Hmm, In the past week I have seen a marked increase in the number of mentally ill people calling and asking to have themselves checked for government implants, mind control, and tracking devices. Needless to say, I am directing all of them to seek immediate medical help, and refusing their business. Are other people in the business getting similar calls, or am I the only one being so blessed? I suspect that it's because of that bloody Manchurian Candidate movie, any thoughts? -jma ps: Repeat after me: "People who claim to have implants are not "Crackpots" they are mentally ill, and need medical help, NOT bug sweeps" Repeat after me: "People who claim to have implants are not "Crackpots" they are mentally ill, and need medical help, NOT bug sweeps" Repeat after me: "People who claim to have implants are not "Crackpots" they are mentally ill, and need medical help, NOT bug sweeps" ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9330 From: Steve Weinert Date: Mon Aug 9, 2004 3:58pm Subject: RE: Curious Manchurian Inquiries > -----Original Message----- > From: James M. Atkinson > Sent: Monday, August 09, 2004 3:44 PM > To: TSCM-L > Subject: [TSCM-L] Curious Manchurian Inquiries > ..... > > Are other people in the business getting similar calls, or am I the only > one being so blessed? > > I suspect that it's because of that bloody Manchurian Candidate > movie, any > thoughts? Heard that there is somewhat of a 'wave' of unbalanced folk seeking treatment right now. The Manchurian Candidate movie is so recently out that it would be stunning if it had a statistically noticable effect, specially so quickly. Have a friend who is a senior adult intervention socialworker - will ask if they have any insight into the current batches of "unstables". Steve 9331 From: John Young Date: Mon Aug 9, 2004 7:13pm Subject: Re: Curious Manchurian Inquiries Perhaps the US Army is deploying its Voice to Skull devices, thanks to the Patriot Act domestic head-messing provisions: http://call.army.mil/products/thesaur_e/00016275.htm ----- voice to skull devices Definition/Scope: Nonlethal weapon which includes (1) a neuro-electromagnetic device which uses microwave transmission of sound into the skull of persons or animals by way of pulse-modulated microwave radiation; and (2) a silent sound device which can transmit sound into the skull of person or animals. NOTE: The sound modulation may be voice or audio subliminal messages. One application of V2K is use as an electronic scarecrow to frighten birds in the vicinity of airports. Acronym: V2K Broader Terms: nonlethal weapons ----- Observe that the Army web page is rigged to prevent copying and pasting. 9332 From: Steve Uhrig Date: Mon Aug 9, 2004 3:33pm Subject: NSA using latest commo intercept technology A little bit of what I do for a living. These are very capable people properly equipped and very effective at their mission. ... Steve ------------------ Director of NSA shifts to new path Hayden makes changes to keep up with technology; 'He's had to move the culture' By Scott Shane Sun National Staff August 8, 2004 Last year, long before CIA Director George J. Tenet resigned in advance of a series of damning reports on intelligence failures before the Sept. 11, 2001, attacks, the chief of an even larger spy agency was quietly asked to extend his term. Lt. Gen. Michael V. Hayden, director of the National Security Agency, was asked by Tenet and Defense Secretary Donald H. Rumsfeld to stay on as director until at least September 2005. The 6 1/2 -year term will make the three-star Air Force general by far the longest-serving NSA boss in the agency's 52-year history. Hayden's survival amid the harsh assessment of pre-Sept. 11 intelligence may reflect his ability to turn around the gargantuan eavesdropping agency in an era of shifting technology and threats. Even as stateless terrorists have replaced Soviet missile bases as the agency's prime target, so the boom in cell phones, the Internet and the spread of fiber-optic cable and computerized encryption have forced it to reinvent eavesdropping technology. "The whole ballgame of where and how you collect signals intelligence changed," says Charles G. Boyd, a retired Air Force general who was executive director of the Hart-Rudman Commission on national security in the late 1990s and now heads Business Executives for National Security. "And that's where [Hayden] has moved this institution. To do that, he's not only changed technologies and processes. He's had to move the culture itself, and that's very difficult to do." Boyd knows Hayden well from their Air Force service and has followed his work at NSA closely. "As a manager of change and a manager of intelligence overall, I think Mike Hayden is the best we have," he says. Agency changes Matthew M. Aid, a respected intelligence historian in Washington who is writing a book on the NSA, says the changes under Hayden appear to be producing results. "The al-Qaida operatives who are being tracked down and caught - that's largely the result of signals intelligence," which is spy lingo for the intercept of phone calls, e-mail and other messages that is NSA's turf, Aid says. "NSA is flush with cash. It's hiring thousands of new people. It's clearly an agency that's going places." Some NSA veterans complain that Hayden "brought in corporate types who gave him Harvard Business School models" that "don't work for an intelligence agency," Aid says. But the people at the CIA, the White House, the State Department and the Pentagon who receive NSA's reports see a difference, he says: NSA "has a lot more respect from intelligence consumers than it had when Hayden arrived in 1999." The changes at NSA have been wrenching, with large numbers of veterans taking early retirement and contractors brought in to handle much of the agency's retooling. More than 22 percent of the agency's civilian work force has been hired since 2000, with more than 1,300 new employees expected to come on board this year, agency officials say. Aid estimates that 25,000 civilian and military employees work on NSA's sprawling Fort Meade campus off the Baltimore-Washington Parkway, although the exact number is classified. At least an additional 10,000 eavesdroppers are scattered elsewhere in the United States and around the world, he says. Many agency old-timers aren't happy, says retiree Mike Levin, who worked at the agency from 1947 to 1993. "I have a very negative view of General Hayden. Before he had a chance to know what was going on, he announced he was going to clean the place out," Levin says. But others say the NSA was in need of radical surgery well before the Sept. 11 attacks. "NSA was set up to monitor an enormous country, the Soviet Union, that didn't go anywhere," says James Bamford, author of two books on the agency. "It was never set up to follow individual terrorists around the world using phone cards, disposable cell phones and e-mail." Of Hayden, Bamford says, "I think he's done about as good a job as anyone could do given the limitations." In fact, the author says, the cerebral 59-year-old intelligence veteran, a Bulgarian linguist early in his career, might emerge as a candidate for the post of national intelligence director proposed by the Sept. 11 commission. Keeping up When Hayden arrived in March 1999, the agency was by all accounts hurting. Its budget had been cut by about a third since the height of the Cold War, but it had to devise new intercept systems to keep up with what Hayden calls "the greatest revolution in communications since Gutenberg discovered movable type." The shift of international communications traffic from satellites and microwave links to hard-to-tap fiber-optic cables posed a major challenge. Encryption described by NSA officials as impossible to break was spreading. National magazine stories on the secret agency began to ask: Is the NSA going deaf? Then, in January 2000, a huge computer crash took the agency offline for days, dramatizing the need for an updated infrastructure. Russian linguists were in oversupply, while there was an extreme shortage of speakers of Arabic and other languages more relevant to terrorism. Older employees who had mastered radio and microwave intercepts were not so adept at monitoring cellular networks and the Internet. After Sept. 11, 2001 - when most of NSA was evacuated for fear it might be the hijackers' next target - it became obvious that the agency would be permitted to expand. But Hayden decided to go forward the next month with a final early-retirement program, watching 765 employees leave even as the agency geared up to hire. "It was not because anyone was dumb, incompetent, lazy or calcified or anything else," Hayden said in an interview last week in his whisper- quiet office at the top of one of NSA's massive glass towers at Fort Meade. "It was just a work force that historically did not change over very much. ... So if we were going to get new skills, we were going to have to get new people." The old Soviet target, Hayden said, was "exceptionally slow-moving, oligarchic and technologically inferior," and what NSA was then interested in was "big things. You wanted to know where their nuclear missile submarines were. You wanted to know about Soviet forces in Germany - were they in garrison or in the field? You wanted to know if there were bombers at Arctic staging bases." By contrast, he said, "in the current war, you're looking for infinitely more granular information. You want to know where this human being is. And it's not good enough to say he's in Afghanistan. In terms of our current ops [operations] tempo, it's not even good enough to know what city. You have to know what building he's in." Rather than the special communications systems used by foreign militaries, "al-Qaida rides on the global [commercial] communications structure." To listen in, "you're putting yourself into their communication pattern. If your pattern doesn't match their pattern ... you don't hear." Technology revolution Given the dire assessments a few years ago, it is notable that Hayden says the communications revolution has on the whole been a plus, not a minus, for the NSA. The NSA director declines to elaborate. But interviews with outside experts suggest that the agency has managed to overcome the challenges posed by fiber-optic cable and encryption. "My opinion is that at this point, those are little more than a speed bump to NSA," says Steve Uhrig, president of SWS Security, a Harford County firm that builds eavesdropping and counter-eavesdropping systems for U.S. and foreign police agencies. "They have a virtually unlimited budget, and they can put amazing resources to work on a problem." Several sources who regularly speak with NSA officials say they believe Uhrig is right. Although they do not know the details, they say the agency has almost certainly managed to tap fiber cables on a large-scale basis, making access to the information inside less of a problem than its overwhelming volume. The NSA has also found a silver lining to the use of encrypted e-mail: Even if a particular message cannot be read, the very use of encryption can flag it for NSA's attention. By tracking the relatively few Internet users in a certain country or region who take such security measures, NSA analysts might be able to sketch a picture of a terrorist network. Information 'in motion' And by focusing their electronic tricks on messages as they are first typed on a computer or when they are read on the other end - what security experts call "information at rest" - NSA technical experts might be able to bypass otherwise-unbreakable encryption used when the information is "in motion." Meanwhile, the popularity of e-mail and particularly of cell phones has worked to the NSA's advantage in the battle against terrorism. The NSA's computers can track and sort huge volumes of e-mail far more easily than they can manage telephone intercepts, because text is consistently represented in digital code. And cell phones - as handy for terrorist plotters as for everyone else - provide not just an eavesdropping target but also a way to physically track the user. Uhrig, who has installed cellular intercept systems in several countries, says that as cell phones have proliferated, the "cells" served by a tower or other antenna have correspondingly grown smaller. "A big hotel may have a cell for every other floor. Every big office building is its own cell," he says. Easier tracking By following a switched-on cell phone as it shifts from cell to cell, "you can watch the person move," Uhrig says. "You can tell the direction he's moving. If he's moving slow, he's walking. If he's moving fast, he's in a car. The tracking is sometimes of much more interest than the contents of a call." But Hayden will say nothing about reports in the news media and from outside specialists that NSA telephone intercepts led to the recent series of arrests of suspected terrorists in Pakistan. Confirming the agencies' victories would only warn future targets to take precautions against eavesdropping. The most devastating such loss in recent years came in 1998, when al- Qaida leader Osama bin Laden stopped using the satellite phone the NSA had used for years to track him and his plans. Whether he was tipped off by press reports - as the Sept. 11 commission has claimed - or by the United States' cruise missile attack on his camp in Afghanistan remains unclear. "This is the most fragile of all intelligence disciplines," Hayden said. "We would not want many of our successes broadcast." Copyright © 2004, The Baltimore Sun --------------------- ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9333 From: contranl Date: Mon Aug 9, 2004 5:46pm Subject: Digest Number XXXX ? . Can somebody explain me what these Digest Number xxxxx postings are about ? Why do these postings not have a header that show me what the contents is ? This seems to be the meaning of Digest: http://dictionary.reference.com/search?q=digest I would really prefer to read a header that tells me something about the message i am going to read...but maybe there is a good reason why this is done ? Tnx for explaining ! Tetrascanner 9334 From: James M. Atkinson Date: Mon Aug 9, 2004 6:51pm Subject: Re: Digest Number XXXX ? It is essentially the same as a volume number. Each day the list server bundles up all of the postings that have mad to the list that day (week or month), combines them into a single message, and squirts that single file to the subscriber. -jma At 06:46 PM 8/9/2004, contranl wrote: >. > > >Can somebody explain me what these Digest Number xxxxx >postings are about ? > >Why do these postings not have a header that show me what the >contents is ? > >This seems to be the meaning of Digest: > >http://dictionary.reference.com/search?q=digest > >I would really prefer to read a header that tells me something about >the message i am going to read...but maybe there is a good reason >why this is done ? > > >Tnx for explaining ! > >Tetrascanner ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9335 From: Bill Bennett Date: Mon Aug 9, 2004 7:32pm Subject: Scanlock Repair To our TSCM Colleagues, We are looking for someone in the US who has the parts and the ability to repair Scanlock Receivers -- AND return the unit within a reasonable ime -- AND at a reasonable price! We have had a most expensive and time consuming experience when we shipped a Scanlock that had been dropped to the UK . On May 11, 2004, we sent a Scanlock Radio Receiver to the manufacturer, Audiotel International, LTD at Corby Road, Weldon, Corby, UK for repairs. Shipment was via Fed Ex. Documentation included a cover letter, return authorization from Audiotel, a completed commercial invoice form provided by Fed Ex and Fed Ex International Air waybill - cost $170.00. We received an invoice from Fed Ex on May 18th stating a VAT tax had been paid by Fed Ex in the amount of $730.63. On June 17th, we obtained a certified check to pay for the repair of the Scanlock for $382.92 plus $120.00 for "carriage". On July 12th, Fed Ex advised the "VAT tax is non-refundable by customs...however the VAT is reclaimable by your recipient that is VAT registered in the UK". Audiotel said there was nothing they could do! We are attempting to get some relief from Fed Ex. The unit was returned on July 15th. Audiotel advertises they "can provide practical advice, equipment and training to help you protect your information". But they do not provide any repairs or maintenance facilities in the United States. If you have their equipment and it requires repairs, you must send it to the UK at your expense and be prepared to pay the Brits a VAT (Value Added Tax) and wait and wait for your equipment to be repaired. Our company has been in the TSCM business full time since 1980. One of the first pieces of equipment we purchased was a Scanlock from Glenn Whidden who was their US representative at that time . We used the unit for about 17 years and only twice was necessary that we return it for repairs. Glenn returned our Scanlock repaired and at a reasonable price within 10 working days. Today we received an invoice from UPS for $6.70 for "duty amount and disbursement fee". The equipment had been returned from Audiotel via UPS. Total amount paid for repairs, taxes, freight, etc. is $1,410.25 to date. William Bennett Walsingham Associate Inc PO Box 4264 San Rafael, CA 94913 (415) 492-1594 FAX (415) 499-1834 ---------------------------------------------------------------------------- ------------- William (Bill) Bennett Walsingham Associate Inc. PO Box 4264 San Rafael, CA 94913 415-492-1594 Office 9336 From: James M. Atkinson Date: Mon Aug 9, 2004 8:41pm Subject: Re: Scanlock Repair What are the symptoms (ie: Poor Sensitivity, Bad Power Supply)? Post the problem to the list, someone on the list may have an easy and inexpensive way to fix it. -jma At 08:32 PM 8/9/2004, Bill Bennett wrote: >To our TSCM Colleagues, > >We are looking for someone in the US who has the parts and the ability to >repair Scanlock Receivers -- AND return the unit within a reasonable >ime -- AND at a reasonable price! > >We have had a most expensive and time consuming experience when we shipped a >Scanlock that had been dropped to the UK . > >On May 11, 2004, we sent a Scanlock Radio Receiver to the manufacturer, >Audiotel International, LTD at Corby Road, Weldon, Corby, UK for repairs. >Shipment was via Fed Ex. Documentation included a cover letter, return >authorization from Audiotel, a completed commercial invoice form provided by >Fed Ex and Fed Ex International Air waybill - cost $170.00. > >We received an invoice from Fed Ex on May 18th stating a VAT tax had been >paid by Fed Ex in the amount of $730.63. > >On June 17th, we obtained a certified check to pay for the repair of the >Scanlock for $382.92 plus $120.00 for "carriage". > >On July 12th, Fed Ex advised the "VAT tax is non-refundable by >customs...however the VAT is reclaimable by your recipient that is VAT >registered in the UK". Audiotel said there was nothing they could do! We >are attempting to get some relief from Fed Ex. > >The unit was returned on July 15th. > >Audiotel advertises they "can provide practical advice, equipment and >training to help you protect your information". But they do not provide any >repairs or maintenance facilities in the United States. If you have their >equipment and it requires repairs, you must send it to the UK at your >expense and be prepared to pay the Brits a VAT (Value Added Tax) and wait >and wait for your equipment to be repaired. > >Our company has been in the TSCM business full time since 1980. One of the >first pieces of equipment we purchased was a Scanlock from Glenn Whidden who >was their US representative at that time . We used the unit for about 17 >years and only twice was necessary that we return it for repairs. Glenn >returned our Scanlock repaired and at a reasonable price within 10 working >days. > >Today we received an invoice from UPS for $6.70 for "duty amount and >disbursement fee". The equipment had been returned from Audiotel via UPS. > >Total amount paid for repairs, taxes, freight, etc. is $1,410.25 to date. > > >William Bennett >Walsingham Associate Inc >PO Box 4264 >San Rafael, CA 94913 >(415) 492-1594 >FAX (415) 499-1834 ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9337 From: Charles Patterson Date: Mon Aug 9, 2004 10:28pm Subject: Re: Digest Number XXXX ? ----- Original Message ----- From: James M. Atkinson To: TSCM-L@yahoogroups.com Sent: Monday, August 09, 2004 7:51 PM Subject: Re: [TSCM-L] Digest Number XXXX ? It is essentially the same as a volume number. Each day the list server bundles up all of the postings that have mad to the list that day (week or month), combines them into a single message, and squirts that single file to the subscriber. -jma [Non-text portions of this message have been removed] 9338 From: Charles Patterson Date: Mon Aug 9, 2004 10:33pm Subject: Re: Digest Number XXXX ? Oops, I slipped an pressed CTRL+ENTER and sent that last email without my text... It is essentially the same as a volume number.Each day the list server bundles up all of the postings that have mad to the list that day (week or month), combines them into a single message, and squirts that single file to the subscriber.-jmaAll subscribers to this list have an option to receive the emails one at a time, or as one large "digest" email daily. Thus the message the "digest readers" get has the subject line as the digest number. The result is that when they hit Reply, that is the subject unless they think to change it to something meaningful. cp [Non-text portions of this message have been removed] 9339 From: James M. Atkinson Date: Mon Aug 9, 2004 10:58pm Subject: Busting a Frequency Hopping Covert Transmitter The system consists of a small two channel/stereo Frequency Hopping Transmitter, and computer controlled receiver. Channel bandwidth is 100 MHz (moderately wide), and the system hops 500 times per second in a changeable psuedo-random sequence, with BPSK modulation and primitive scrambling. Actual bandwidth of the RF signal is 10 MHz wide, but it does have problems with code bleed, and harmonic suppression (which help in detection). Frequency range is 750 to 950 MHz, and it can be instructed to avoid certain frequencies, or to favor others which allows the eavesdropper to hide the signal inside the 900 MHz ISM band, cell band, UHF TV, etc. Maximum power output is 300 mW, but it can be dropped down as low as .3 mW (yes, that is three tenths of a milli-watt) to keep the power levels to an absolute minimum, and to minimize detection. Power supply is 4.5 to 6.5 volts, and if RF power levels are kept low enough even a small battery could run this for quite a while, but even in sleep mode it draws about 7 mA. External stereo microphones, 4 volts bias, but highly susceptible to ultrasonic chirping due to poor filtering on the audio inputs. It has VOX capability, and it can have a positive and negative time-out as high as 10 seconds so it may require a few seconds to stimulate the thing into waking up. Difficult to detect using older equipment, and cheap rod/whip antenna's. Virtually impossible to detect with "old school" methods. Don't count on demodulating the signal to assist in detection but watch for the characteristic signature of the occupied bandwidth, and behavior of the carrier in both the frequency and time domain. You might get lucky with broadband diode detector systems, but don't count on it. Extremely easy to detect from considerable distances with a decent gain Uda-Yagi or corner reflector antenna, and a modern low noise spectrum analyzer with peak hold function. Remember that your looking for a very low power signal, and that you need everything your using to detect it to be low attenuation, and low noise. Suggest that you start by examining the 750 to 850 MHz band for 10-15 minutes while you pan the area being checked with a high gain antenna with the peak hold, and minimum hold functions turned on, and then switching the instrument span from 850-950 MHz. You can also try a large discone antenna with a 700 MHz high pass filter, and while your at it watch out for the low power UHF wireless microphone channels. Be sure to check for it both in non-alerting (silent) segment of the sweep, but also in the alerting segment as well (with a steady audio source). As the power levels are supposed to be kept at a bare minimum with this unit, detection with thermal imaging will be touchy at best unless the installer was really sloppy, but the cost of this system it is out of the price range of most folks with poor installation skills. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9340 From: Steve Uhrig Date: Mon Aug 9, 2004 10:04pm Subject: Happy Birthday to Marty! To be read on August 10th: Happy birthday Marty, from your many friends who aspire to trail behind you in the distance. This industry pretty much started with you, and we acknowledge that. For anyone who hasn't had the pleasure, visit www.martykaiser.com. Best wishes for continued health and happiness Marty old buddy, and we wish you many more birthdays. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9341 From: Samizdatt Date: Mon Aug 9, 2004 11:18pm Subject: Re: NSA using latest commo intercept technology Although this may be an off-topic question, I think it's somewhat relevant to this thread. I recently found a posting to the "alt.privacy" news group that asks a question about the merits of Mixmaster anonymous remailers & steganography. Can any professional shed some light on this issue? POST: Do anonymous remailers like Mixmaster provide true anonymity, or is it better to use steganographic software like Steghide, available at: http://steghide.sourceforge.net/ to post to pornographic news groups like: alt.binaries.erotica alt.binaries.pictures.amateur alt.binaries.pictures.amateur.female alt.binaries.pictures.erotica Basically, I'd like to know if anyone can be sure that a TLA isn't running the remailers, or hasn't compromised the remailer's private key using the methods outlined in the post below. Isn't it safer to control your own security than to blindly trust a remailer network? Thanks. **************************************************************** How the FBI cracks PGP email... **************************************************************** Spy & CounterSpy 1998, by Lee Adams. http://rogerpbrown.com/spy/fs006.html ------------------------------------- How the FBI cracks PGP email... The FBI has resources and expertise. Their methods fall into four categories. Method 1 relies on their ability to break into your home or office undetected. Method 2 relies on their ability to bug your home or office. Method 3 uses electronic equipment that detects signals your computer makes. Method 4 is used in cases involving national security, where they rely upon the cryptanalysis capabilities of NSA. Know where you're vulnerable. The weakest part of your email security is you, the user. The mathematical algorithms that form the underpinnings of PGP are very robust. It is the manner in which you use them that creates vulnerabilities. The most vulnerable point is the manner in which you create and store your original plaintext message. The next weakest element is your passphrase. Next are the PGP files on your computer's hard disk. (From now on we'll refer to your hard disk drive as HDD). In a typical surveillance operation, the FBI will utilize the attacks described here. The ten attacks are listed in approximate order of increasing difficulty. It is standard operating procedure for the FBI surveillance team to use the simplest attacks first. In practice, their choice depends on the circumstances of the case. Attack #1 - Plaintext recovery. An FBI or BATF surveillance team will break into your home or office without your knowledge. Once inside, the agents will read the plaintext files on your hard disk, diskettes, or paper printouts. Local police also use this method. It is very effective. If you're like most people, you're probably thinking to yourself, "Aww, there's no way they could get in here without me knowing. I'd spot it right away." Yeah, right. That's exactly the attitude the FBI wants you to have. So dummy up. FBI penetration agents love people like you. You are the ideal target. Over confident. Easy to deceive. This is important enough for us to pause for a few moments and talk a bit about how surveillance teams really operate. What you are about to read has never been published before. The government does not want you to know this. Background - How they get inside. Many people are amazed to learn their home or office can be entered without their knowledge. And not just once, but repeatedly. A surveillance team often requires multiple entries in order to thoroughly pick through all your stuff. Good quality locks on your doors and windows are generally useless. The penetration team ignores them. They've found an easier way to get inside. Perhaps an example is the best way to illustrate the point. ... Case Study. Ever since we launched Spy & CounterSpy, we have been involved in running battles with FBI surveillance teams trying to get inside our offices. Because of our experience we are not an easy target. Their operations were complicated by the fact that the FBI is operating illegally in Canada and must act covertly at all times. The setup. Our former office was situated in an industrial park. We were located in a cindercrete masonry building equipped with high-security locks. We concluded it would be difficult for an FBI surveillance team to conduct a surreptitious entry without our knowledge. Our building abutted a similar cindercrete building next door - a welding shop. The bathroom cabinet sink is located against this wall. The arrangement provided a perfect opportunity for surreptitious entry. The photos tell the story. It's easy for FBI agents to enter a building next door and remove a few cindercrete blocks from two sets of exterior walls - and then enter our office through the back of the bathroom cabinet. Repair experts. Most people aren't aware that surveillance teams routinely break in through walls, ceilings, and up through floors. This is standard operating procedure. The FBI's restoration specialists can repair a damaged area in under 90 minutes using patch drywall, quick-drying compound, and special paint. Apartments and houses are a snap for these guys. This is your own government doing this to you, folks. My first experience with this sort of entry was when I was helping Vickie deal with 24-hour surveillance by US Naval Intelligence. (Return to our home page and click on About Us for more on this.) I showed her how to seal her house - doors, windows, attic panel, everything. But they tunneled over from the house next door. They came in under the driveway and broke through behind a false wall next to a fireplace in the downstairs family-room. They moved along a short crawlspace and entered the livingspace just behind the furnace. Their cover was clever. They used a ruse of major renovations next door to conceal the sound the tunnel crew made. Their mistake? Not enough attention to detail. They didn't match the original panel when they replaced the wall behind the furnace. Vickie and I had done a complete inspection of her house two months earlier. We both spotted the bogus panel immediately. She still becomes furious when she talks about it. The reason the goons like to break in through walls is simple - it's extremely difficult to defend against. But simply being able to detect that you've been penetrated gives you an advantage, especially if you don't reveal you're on to them. Now that you've got a better understanding of how resourceful and cunning these government agents are, let's return to the different attacks they use to crack your encrypted email. We've already covered Attack #1, plaintext recovery. ... Their goal is to grab your secret key and your passphrase so they can use any copy of PGP to read your email. Attack #2 - Counterfeit PGP program. After breaking into your home or office, FBI agents will install a counterfeit copy of PGP on your HDD. Encrypted messages created by this modified program can be decrypted with the FBI's master key. It can still be decrypted by the recipient's key, too, of course. A variation of this attack is the FBI's bot. Acting similar to a virus, the bot is a key-trap program. (Bot is an abbreviation of robot.) The bot intercepts your keystrokes without your knowledge. When the opportunity arises, the bot uses your Internet dial-up connection to transmit your passphrase to the surveillance team. FBI agents often hide bots in counterfeit copies of your word processing program, and so on. Attack #3 - PGP's working files. After entering your premises in your absence, FBI agents will make copies of certain PGP files on your HDD, especially the files containing your secret keys. The agents will then attempt to find where you've written down your passphrase. They'll methodically search your papers, desk, safe, filing cabinets, kitchen drawers, and so on. They'll use deception to gain access to your wallet, purse, money belt, briefcase, and pockets. Their goal is to grab your secret key and your passphrase so they can use any copy of PGP to read your encrypted email messages whenever they want. If their search fails to turn up your passphrase, they'll use cracker software to deduce it. This works because most people use passwords and passphrases consisting of words and numbers with special meaning like birth dates or pet names. Unfortunately, it's a simple matter for the FBI to collect information about you like your birth date, your mother's maiden name, the number of a PO Box you rented 10 years previous, the license plate of your vehicle, names of pets past and present, and so on. Here's how the FBI's cracker software works - it combines and recombines all these words and numbers and keeps submitting them to the PGP program. (They copy your entire HDD and do this work at their office.) They routinely crack the passphrases of PGP-users who fail to use random characters in their passphrase. Attack #4 - Video surveillance. After breaking into your home or office without your knowledge, FBI specialists will install a miniature video surveillance camera above your work area. The lens is the size of a pinhead. It's extremely difficult to detect. The FBI surveillance team watches your fingers on the keyboard as you type in your passphrase. Local police and private investigators have also been known to use this method. Attack #5 - Audio surveillance. This method is a variation of Attack #4. FBI technicians install an audio bug near your computer. The sounds generated by the keyboard can be analyzed. By comparing these sounds with the noises made during generation of a known piece of text, the FBI can often deduce your passphrase - or come so close that only a few characters need to be guessed. Attack #6 - AC power analysis. Using equipment attached to your outside power lines, the FBI can detect subtle changes in the current as you type on your computer's keyboard. Depending on the user profile in your neighborhood, the FBI's equipment can be located some distance from you. Attack #7 - EMT analysis. EMT is an acronym for electromagnetic transmission. Computer CPUs and CRTs operate somewhat like radio transmitters. CPU is an acronym for central processing unit. This is your Pentium chip. CRT is an acronym for cathode ray tube. This is your display. The FBI surveillance team uses a communications van (or motor home) parked across the street to capture the electromagnetic transmissions from your computer. This threat can be eliminated by a shielding system called Tempest. In many jurisdictions you need a special permit to buy a Tempest system, however. Attack #8 - Coercion. The previous seven attacks are quite easy for the FBI to implement. In fact, they use almost all of them on a routine basis. Even the local police in major US cities have access to vans that can pick up your computer's EMT. From this point on, however, things start to get very time-consuming and expensive for the FBI in their attempt to crack your PGP-encrypted email. So they may decide to take a more direct approach. They'll simply bend your thumb back. Until it breaks, if that's what it takes. Before they start, they'll make sure they've got enough biographical leverage on you to blackmail you into becoming an informant. Biographical leverage is spy-talk for blackmail information. The main defense against this threat is deception. An appropriate strategy is discussed later in this tutorial. Attack #9 - Random numbers. After breaking into your home or office without your knowledge, FBI agents will make a copy of PGP's randseed.bin file. PGP uses the pseudorandom data in this file to help it generate a unique block that it uses for creating a portion of the ciphertext. This type of attack borders on true cryptanalysis. It is time-consuming. It is expensive. It is generally worth neither the FBI's nor NSA's time, except in cases of national security. Attack #10 - Cryptanalysis. It is ridiculously easy for anyone, including the FBI, to intercept email on the Internet. After collecting a sampling of your encrypted email, the FBI submits the data to NSA for cryptanalysis. Cryptanalysis is egghead-talk for using mathematics, logic, and problem-solving skills to crack an encrypted message. It's all done with computers - and NSA has some monster computers. The best information available to us indicates that NSA can indeed crack PGP email, but a brute force attack is required. A brute force attack involves a lot of informed guessing. It's mostly just trial-and-error. Cracking a message can take weeks, months, years, or decades depending on the content, format, and length of your message. Later in this tutorial you'll see how to make your messages more resistant to this attack. Very few domestic cases warrant the involvement of NSA. Besides, FBI agents are usually successful in cracking your email using one of the other attacks, especially break-and-enter. So NSA devotes its resources to cracking the messages of other countries' governments and their intelligence agencies. ... Thinking outside the box... The preceding ten attack-scenarios are based on thinking inside the box. When we use this type of reasoning, we are staying within a set of fixed assumptions. We are, in effect, boxed in by our rigid assumptions - hence the phrase, thinking inside the box. The preceding attack-scenarios make two assumptions. First assumption - You've got an authentic copy of PGP. Second assumption - NSA has not yet discovered a mathematical method for decrypting PGP ciphertext. Neither assumption is necessarily correct. Counterfeit software. We have received one report about this. We must caution you that it is only one report, and we have been unable to verify it through other sources. Our contact says an FBI agent bragged to him that the CIA has been distributing doctored copies of PGP freeware over the Internet. According to our source, the FBI routinely decrypts messages encrypted with these doctored copies. It is our view that if this happened it was not over a wide-scale. Many copies of PGP are digitally signed by the manufacturer, who is no dummy. We believe that the fragmentary and decentralized character of the Internet prevents this type of ruse from succeeding - especially against savvy targets like the folks at PGP. Mathematical algorithm. It is unlikely that NSA has developed a mathematical algorithm for decrypting PGP ciphertext - not impossible, but unlikely. Because the algorithm and the source code for PGP are widely known and freely available, PGP has been subjected to rigorous testing and attacks by some of the brightest minds in the scientific community. This is called a review by your peers. It is a powerful method for vetting new ideas and methods. None of these bright scientific minds have come close to cracking the PGP algorithm, which is based on a complicated one-way math function. Sizing up your adversary... Clearly, FBI and BATF surveillance teams are a force to be reckoned with. They possess a lethal arsenal of capabilities that they can bring to bear against you and your email privacy. Their methods range from the simple to the sublime. They can break into your home or office without your knowledge and use your computer. They can use sophisticated electronic equipment to read your keystrokes - over the AC electrical connection, over the telephone line, or over the airwaves. And, finally, if these types of methods fail - which isn't very often - NSA will be called in to crack your PGP-encrypted message. Is the FBI difficult to beat? Yes. They've been at this game a long time. They've learned many lessons over the years. Can the FBI be beaten? Yes, you can beat them. It is easy? No, not at first, but it gets easier as you build up self-discipline. Beating the FBI requires that you stop thinking inside the box. http://rogerpbrown.com/spy/fs011.html ------------------------------------- The firewall method... The firewall method is centered on the way you use your computer. This includes where, when, and how you use your computer. Described here is a step-by-step method for obstructing the FBI. This is a very rigorous protocol. You likely won't need to go to this much trouble very often. Step 1 - Get cleaned up. Scrub your hard disk. The FBI can read deleted files using an undelete utility. The FBI can read file slack, RAM slack written to disk, free space, garbage areas, and the Windows swap file using a sector viewer or hex editor. Return to our main page and click on Security Software for more on this. Although other packages are available, we use Shredder. Then we use Expert Witness and HEdit to check the hard disk afterwards. (From now on we'll refer to your hard disk drive as HDD.) If you have previously used your computer to work with incriminating data, you should wipe the entire HDD and reinstall the operating system, application software, and user files. If surveillance poses a risk to your liberty, you must install a new hard disk drive. Then disassemble the old HDD, remove the platters, and sand them with coarse-grit sandpaper. Once you've got your computer sterilized, you'll want to keep it clean. Tidy up after each work session. Thereafter, don't leave your computer unattended. Step 2 - Get unplugged. During sessions when you're working on secret messages, you should take measures to frustrate FBI surveillance. This means physically disconnecting your computer from the AC power supply and from the telephone jack. You'll need a battery-powered computer - a laptop, notebook, or subnotebook. Remaining connected to the AC power supply is risky. Using equipment attached to your power line outside your home or office, the FBI can detect subtle changes in the current as you type on your computer's keyboard. Likewise, remaining connected to the telephone line is risky. If the FBI has broken in without your knowledge, they may have installed counterfeit programs on your computer. Your computer could be secretly sending data to the surveillance team over your dial-up connection. Just imagine the damage if you were unknowingly using a doctored copy of your favorite word processing program. Step 3 - Go somewhere else. In order to frustrate the FBI's electronic surveillance capabilities, you must relocate away from your usual working area. If you fail to take this step, an FBI video camera can watch your keystrokes. An FBI audio bug can listen to your keystrokes. An FBI communications van parked in the neighborhood can detect both your keystrokes and your display. Suitable locations for ensuring a surveillance-free environment are park benches, crowded coffee shops, busy fast food outlets, on a hiking trail, at a friend's place, in a borrowed office, at a bus depot waiting area, in an airport lounge, at the beach, and so on. Be creative and unpredictable. The trick is to select a location difficult for FBI agents to watch without you becoming aware. You may be surprised at what happens the first time you relocate. If you suddenly find people loitering nearby, you may already be under surveillance. (More about this later in the tutorial.) During your first relocated work session, use PGP to create your secret key ring. Your passphrase should contain random characters. Do not write down your passphrase. If you must, jot down just enough hints to help you remember. Save copies of the following files from the PGP directory to a diskette - Secring.skr, Secring.bak, Pubring.pkr, Pubring.bak, and randseed.bin. For safety, use two diskettes and make two backups. Keep the diskettes on your person. Delete the files from your HDD. Step 4 - Get serious. From now on, you've got a new standard operating procedure. Whenever you need to compose and encrypt a secret message, you must first relocate to a safe area. (You'll soon begin to appear like a busy person who checks in often with your contact software or scheduling software.) Save the encrypted document to diskette. Delete all working files. Return to your home or office. Then use a different computer to email the encrypted messages. Using a different computer is vital. It acts like a firewall. It keeps your relocatable computer sterile. Do not connect your relocatable computer to the telephone line. Ever. Do not leave your relocatable computer unattended. Ever. If this means carrying your relocatable computer with you all the time, then so be it. For ordinary working sessions, it's usually okay to connect your relocatable computer to AC power. However, don't do any sensitive work in this mode. Always disconnect and relocate first. But if absolutely watertight security is your goal, the only time you'll turn on your relocatable computer is when you've relocated. The only time you'll plug it in is to recharge the battery. When you receive incoming encrypted email on your firewall computer, save it as a text file to diskette. Relocate. Check the diskette with an antivirus program. Load the file into your sterile computer. Decrypt the ciphertext and read the plaintext. Delete the plaintext. Return to your regular work location. Summary. The firewall method involves nit-picking attention to detail. It is a methodical system for protecting the privacy of your PGP-encrypted email messages. It takes perseverance and patience to beat the FBI at this game. But it's preferable to the alternative. The firewall method will keep you out of the internment camps. You'll read about other protocols later in this tutorial. But if you choose to use the firewall method, you must follow it rigorously in order for it to be effective. Slip up once and the goons will nail you. They'll snatch your passphrase. They'll learn where you keep your key rings. Then it's interrogation, arrest, indictment, conviction. Or maybe they'll just kick in the door an hour before dawn and ship you off to the camps. The firewall method is watertight, but it only works if you use it. ... Protocol 2: The deception method... Protocol 2 is based on liveware, not software. Liveware refers to you, the human element in the countersurveillance scheme. Protocol 2 takes a human approach. It uses deception. Most people don't realize that FBI surveillance teams are vulnerable to deception. It's possible to mislead and confuse them. That's because most FBI targets are ordinary Americans with no countersurveillance training. In relative terms, only a few elite units within the FBI encounter hard targets. (A hard target is a trained operative who is actively maintaining secrecy and who will not reveal that he has detected the surveillance team.) So most FBI agents have never confronted a hard target. They never get any practice. They're accustomed to playing tennis with the net down. Deception provides four ways for you to protect the privacy of your PGP email. Deception method 1 - Decoy. This method involves duping the surveillance team into believing they have cracked your PGP email, when in fact they have uncovered merely a decoy. Your real protocol continues to run undetected in the background. This is called layered security. The best underground activists worldwide operate in this manner, including guerrilla movements, freedom fighters, and resistance groups. Inside the USA this method is mostly used by criminal groups (so far). The key to success is carefully and deliberately providing some mildly incriminating evidence for the FBI to find. This decoy data will often dissuade them from investigating further. The FBI will eventually downgrade the 24-hour surveillance to perimeter surveillance, then picket surveillance, and finally intermittent surveillance. They'll keep you on their watch-list and check up on you two or three times a year. They may drop you entirely. Here's how to implement this method. Step 1 - Set up Protocol 1 and then forget about it. Step 2 - Use your firewall computer as your primary computer. Create another set of secret keys. Leave the key ring files and randseed.bin on your HDD. This increases the chances the FBI will recover them during a surreptitious entry. Create and encrypt low-grade messages at your firewall computer. This increases the odds that the FBI will snatch your passphrase. Step 3 - Use this second configuration of PGP as a decoy. Use it to send only low-grade messages. In effect, you are now running two layers of PGP. From time to time you will use Protocol 1 and temporarily relocate in order to encrypt or decrypt high-risk secret messages. Step 4 - If you suspect or detect FBI surveillance, keep up the deception. Perhaps temporarily stop using your relocatable computer. If you use the technique of plausible denial, you increase your chances of completely concealing the fact that you've got a second PGP system. The principle of plausible denial is well-known in intelligence agencies, urban guerrilla movements, and resistance groups. Plausible denial means cover. Cover is spy-talk for innocent explanation. You must take the precaution of having a plausible, innocent explanation for everything you do. Absolutely everything. Don't ever do anything until you think up a believable excuse for doing it. Even if the FBI surveillance team discovers the second protocol, you will have purchased yourself some extra time. Use the time to encrypt, conceal, or destroy incriminating data. Use the time to warn other members in your group. Use the time to feed misinformation to the surveillance team. When systematically applied, the decoy method provides a good first line of defense against an FBI surveillance team. Deception method 2 - Thwarting cryptanalysis. When using Protocol 1, you can utilize deceptive techniques to reduce the chances of your message being cracked by NSA. If the case is serious enough, the FBI will provide NSA with a full set of your encrypted messages. The cryptanalysis experts at NSA will use Statistical Probability Analysis to begin detecting commonly used phrases, words, punctuation, and layout. The more footholds you give them, the sooner they'll crack your email. Here are three ways to use deception to impede their progress. Step 1 - Disguise the format of your message. Your goal is to camouflage the layout. Insert a random-length paragraph of nonsense at the beginning of each message. You do not want the salutation or other material to appear at always the same location. Your recipients should be alerted to ignore the first paragraph. You can also use a text editor to manually strip off the header and footer from PGP ciphertext. The recipient can likewise use a text editor to manually restore the header and footer so PGP will recognize the text as code to be decrypted. Step 2 - Make your content resistant to heuristic analysis. Heuristic analysis involves informed guessing and trial-and-error. Deliberately run some words together, eliminating the space. Intentionally add or delete punctuation. Occasionally insert a carriage return in the middle of a paragraph. Deliberately introduce spelling errors into your text. Step 3 - Write your message in a "foreign" language. You can do this by using homonyms such as "wood" instead of "would", or "urn" instead of "earn". Use "gnu" or "knew" instead of "new". Use "seas" instead of "seize". Use "mast" instead of "massed". Write numbers and dates out in full, such as "nineteen ninety eight" instead of 1998. Use code words such as competition instead of surveillance, competitor instead of FBI, market survey instead of countersurveillance, and so on. Use noms de guerre instead of real names. When properly used, these and other anti-cryptanalysis techniques can greatly increase the amount of time it takes the NSA to crack your PGP-encrypted email. Deception method #3 - Diagnostics. You can use PGP to detect the presence of a surveillance team. Countersurveillance experts refer to this as running diagnostics. When performed against pavement artists, it is called dry-cleaning. Here's how it works. Deliberately encrypt a provocative, bogus series of messages. Your goal is to use content that will elicit an aggressive response from the FBI. If surveillance intensifies, your email may have been cracked - or the FBI may simply be reacting to your increased traffic. That's spy-talk for the frequency, volume, and timing of your messages. On the other hand, you may notice that the surveillance team seems to know where you're going and who you're going to meet with. They arrive before you do. They break into your associate's home or office looking for items you've mentioned in your email. They're conspicuously nearby as you slip a written note to your contact, after mentioning the brushpass in your email. All these are warning signs that the FBI is reading your PGP-encrypted email. If you're using a decoy setup, switch to Protocol 1 to send secure email. If you're already using Protocol 1, you and your correspondents should create new passphrases. If further diagnostics suggest the FBI is still reading your email, you and your correspondents should reinstall PGP and create a fresh set of key rings and passphrases. Exchange the key rings by face-to-face contact, through live intermediaries, or by human courier. Tip - Anonymous email addresses activated through a cyber cafÈ can be used, but only if you set them up before the FBI puts you under surveillance. Go out and do it tomorrow. When properly applied, diagnostics can keep you one step ahead of an aggressive FBI surveillance team. Deception method #4 - Spoofing. You should routinely send out bogus encrypted messages. Your goal is to mislead and confuse the surveillance team. If the FBI is reading your email, you have an opportunity to confuse and mislead them with misinformation. If the FBI hasn't cracked your email yet, the traffic in bogus messages will provide cover for your authentic messages. If a mission requires an increased number of secret messages, simultaneously reduce your bogus messages, and the FBI won't detect any increased communication activity. When used systematically, spoofing can level the playing field between you and the FBI surveillance team. Summary... Using deception, you can confuse, mislead, obstruct, and frustrate the surveillance activities of your adversary. Deception can be very effective against an FBI, BATF, or DEA surveillance unit. It is particularly effective against standard police surveillance. If the deception techniques of Protocol 2 are used in combination with the firewall methods of Protocol 1, you boost your chances of stopping an FBI surveillance team from learning anything at all. **************************************************************** **************************************************************** ***************************************************** Using Steganography: ***************************************************** From: nemo outis@e... (nemo outis) Subject: Re: why using news groups to insure anonymity is superior to a remailer network Date: Fri, 19 Dec 2003 04:44:27 GMT The concept of using a broadcast method (i.e., newsgroups) rather than an (obscured) point-to-point method (i.e., mixmaster email) has considerable merit. However, I suggest the following refinements that I posted several years ago. Two words convey the refinements: steganography and pornography. 1. Use an (encrypted) message buried in a pornographic picture (jpg or mpeg) using steganographic techniques (I will gloss over which steganographic techniques and how to select the appropriate "carrier" porno file). Post the message to (porno) newsgroup "A." 2. The encrypted message will contain within its encrypted text the appropriate header and newsgroup to which the recipient should post a resonse. In general, it will *not* be to newsgroup A but to some other (pornographic) one, which I'll call Newsgroup "B." As you describe, both parties still download all (or at least a substantial portion) of the newsgroups (ideally several) which contain the messages intended for them. It is possible for each sequential message in a dialogue to "hop" to a different newsgroup, effectively achieving a poor man's "spread spectrum." Pornography is chosen as the appropriate medium for steganography because there is an enormous volume of cover traffic in general and because it is very common for folks accessing such newsgroups to do mass downloads. Much better cover than alt.anonymous.messages. Further, it is not uncommon for pornographic posters to be a touch paranoid - it would not be too out of the ordinary if the pornographic postings themselves were posted through a mixmaster chain and a mail2news gateway. One more option to consider. ***************************************************** ***************************************************** ***************************************************** Using Mixmaster: ***************************************************** Anonymity is your best defense on the Internet. You'll want to be able to surf the Internet, send & receive email, and post to news groups as anonymously as possible. (1) Surfing the net: Go through a proxy server, or a series of FREE, public proxy servers. The first step is to go to: http://www.aliveproxy.com or http://www.antiproxy.com/proxysearch.php or http://www.publicproxyservers.com/index.html or Google for public proxy servers and search for available proxies that work from a port your browser can access. You may want to search for proxies on port 80, which many firewalls allow to pass. The "www.antiproxy.com" web site has the ability to test and ensure that any listed proxy is accepting connections. Armed with a list of proxy servers, begin testing them on your browser. Look for a menu, on your browser, that will let you add or change a proxy / port. You may want to test several to see which proxy is the fastest. You should also change proxy servers several times a week. In fact, you'll find that quite a few are taken down after a few days because they were mistakenly left open by an inexperienced system administrator or home user. The next step is to use a proxy server that is accessed by appending a destination URL to its URL. The proxy listed below is a bit slow because everyone around the world uses it regularly. To access the smirkingchimp, just use the following URL: http://anonymouse.ws/cgi-bin/anon-www.cgi/http://www.smirkingchimp.com The proxy above is located in Germany. Unfortunately, it doesn't handle cookies. If you're in a hurry, or don't care to chain proxy servers, just use either the proxy listed above, or the first proxy you set by changing your browser settings. (2) Email & news group posting: PGP & GPG are popular encryption programs FREELY available on the Internet: http://www.pgpi.org/ http://www.gnupg.org/ http://www.philzimmermann.com/findpgp.shtml You should ALWAYS use PGP or GPG when sending email to your friends. Use the largest key length available, which varies with each PGP & GPG version. The command line versions usually have fewer problems because they're unaffected by operating system related, graphical user environment issues. Now you need to install Mixmaster client software to send email messages, and post to news groups anonymously. Volunteers around the world have set up these servers to successfully thwart attempts at tracing the source of email messages. As a user, you must assume that half of them are run by governmental agencies or servers that have been hacked. This isn't a problem as you normally route your email messages through a series of them - I usually route my messages through 11 servers, and send 3 copies to help ensure the messages reach their final destination. Sometimes it takes over 24 hours for a message to reach its recipient, but that's partially what makes messages virtually impossible to track. The software takes your message, and either breaks it up into 29K sized messages, or pads characters to make it about 29K in size. Then it encrypts your message with the keys of every email server you route your message through, so only the final Mixmaster server ever gets to see your actual email and recipient. Since every email is virtually the same size, encrypted and held for different lengths of time along with other waiting messages by each mixmaster server in the chain before it is re-mailed, out of sequence with its arrival time, it is impossible to perform "traffic analysis" to follow an email message from its origin to its destination. If you're really paranoid, send your PGP encrypted email through the Mixmaster remailer chain to the news group [alt.anonymous.messages]. You'll have to come up with a title that you & your correspondents secretly share. You can use the same title over & over again. When downloading the messages from the [alt.anonymous.messages] news group, be sure to download many - if not ALL - of the other messages. That way, no one will know which email actually contains the real message destined for you, and no one will ever know with whom you're corresponding - even if the entire Mixmaster remailer chain is ever compromised. Sending from Mixmaster remailers to the [alt.anonymous.messages] news group - or any news group, for that matter - only works for small messages [well under 29KB] that Mixmaster doesn't need to breakup. **************************************************************** NOTE: **************************************************************** If you have large messages, or find that your messages are not being posted to the "alt.anonymous.messages" news group when you send them via Mixmaster, just send your encrypted messages directly to the "alt.anonymous.messages" news group, and avoid using Mixmaster. You will not lose much in the way of anonymity. Just insure that you upload all your messages with one phrase, and your correspondent uploads all messages using another phrase. **************************************************************** **************************************************************** Since few use the software, installing it may be a bit difficult. I've installed both the Mac & Linux versions with little difficulty, but have used the Linux version exclusively for years. The same software is used to post to news groups anonymously. Windows users may want to try Quicksilver: http://www.quicksilvermail.net/ Mac users have to use: http://www.geocities.com:80/SiliconValley/Byte/6176/macmixmaster.html Linux and *nix users can get the goods at: http://sourceforge.net/project/showfiles.php?group_id=37891 9342 From: Lawrence Dillard Date: Tue Aug 10, 2004 0:08am Subject: (ot) weapons of math instruction At New York's Kennedy airport today, a high school teacher was arrested trying to board a flight with a ruler, a protractor, a setsquare, a slide rule and a calculator. Attorney General John Ashcroft said he believes the man is a member of the notorious al-gebra movement and is charged by the FBI with carrying weapons of math instruction. "Al-gebra is a fearsome cult," Ashcroft said, "They desire average solutions by means and extremes, and sometimes go off on tangents in a search of absolute value. They use secret code names like 'x' and 'y' and refer to themselves as 'unknowns,' but we have determined they belong to a common denominator of the axis of medieval with coordinates in every country. Besides, the Greek philanderer Isosceles used to say there are 3 sides to every triangle," Ashcroft declared. President Bush said, "If God had wanted us to have better weapons of math instruction, he would have given us more fingers and toes. "I am gratified that our government has given us a sine that it is intent on protracting us from these math-dogs who are willing to disintegrate us with calculus disregard. Murky statisticians love to inflict plane on every sphere of influence," the President said, adding: "Under the circumferences, we must differentiate their root, make our point, and draw the line." President Bush warned, "These weapons of math instruction have the potential to decimal everything in their math on a scalene never before seen unless we become exponents of a Higher Power and begin to factor-in random facts of vertex." Ashcroft said, "As our Great Leader would say, read my ellipse. Here is one principle he is uncertainty of: though they continue to multiply, their days are numbered as the hypotenuse tightens around their necks." 9343 From: taylortscm@y... Date: Mon Aug 9, 2004 10:04pm Subject: Re: Scanlock Repair bill: you mentioned 17 years is this a mk vb? if so these are great units, and I belive worthty of some repairs, the main problem with these units is the mofset can be damaged usually by static at the antenna, and the mofsets are no longer available, they can be replaced with the newer style and will require a complete alaignment . I have used the scanlocks for twenty years plus and have repaired many over the years and still manufacture the battery packs for these units several times a year if yo want I will look for a mofset if you like. or you can send it to taylor group 3859 douglas rd. it will only cost you postage to and from( we don't charge to look.) downers grove il 60515 or you can contact steve@swssecurity and maybe you can talk him into a repair he knows the units well. good luck dan taylor group Bill Bennett wrote: To our TSCM Colleagues, We are looking for someone in the US who has the parts and the ability to repair Scanlock Receivers -- AND return the unit within a reasonable ime -- AND at a reasonable price! We have had a most expensive and time consuming experience when we shipped a Scanlock that had been dropped to the UK . On May 11, 2004, we sent a Scanlock Radio Receiver to the manufacturer, Audiotel International, LTD at Corby Road, Weldon, Corby, UK for repairs. Shipment was via Fed Ex. Documentation included a cover letter, return authorization from Audiotel, a completed commercial invoice form provided by Fed Ex and Fed Ex International Air waybill - cost $170.00. We received an invoice from Fed Ex on May 18th stating a VAT tax had been paid by Fed Ex in the amount of $730.63. On June 17th, we obtained a certified check to pay for the repair of the Scanlock for $382.92 plus $120.00 for "carriage". On July 12th, Fed Ex advised the "VAT tax is non-refundable by customs...however the VAT is reclaimable by your recipient that is VAT registered in the UK". Audiotel said there was nothing they could do! We are attempting to get some relief from Fed Ex. The unit was returned on July 15th. Audiotel advertises they "can provide practical advice, equipment and training to help you protect your information". But they do not provide any repairs or maintenance facilities in the United States. If you have their equipment and it requires repairs, you must send it to the UK at your expense and be prepared to pay the Brits a VAT (Value Added Tax) and wait and wait for your equipment to be repaired. Our company has been in the TSCM business full time since 1980. One of the first pieces of equipment we purchased was a Scanlock from Glenn Whidden who was their US representative at that time . We used the unit for about 17 years and only twice was necessary that we return it for repairs. Glenn returned our Scanlock repaired and at a reasonable price within 10 working days. Today we received an invoice from UPS for $6.70 for "duty amount and disbursement fee". The equipment had been returned from Audiotel via UPS. Total amount paid for repairs, taxes, freight, etc. is $1,410.25 to date. William Bennett Walsingham Associate Inc PO Box 4264 San Rafael, CA 94913 (415) 492-1594 FAX (415) 499-1834 ---------------------------------------------------------------------------- ------------- William (Bill) Bennett Walsingham Associate Inc. PO Box 4264 San Rafael, CA 94913 415-492-1594 Office ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 9344 From: G P Date: Tue Aug 10, 2004 0:57am Subject: Re: NSA using latest commo intercept technology Aah, some more words of widsom from Frankie Boy Cilluffo, associate VP for homeland security at George Washington University and puppet for the homeland security/military/industrial complex ala WMD expert extraordinaire. Maybe Frankie Boy Cillufo should talk about his membership in the Council on Foreign Relations and his decidely pro-communist stance on virtually all things political. -------------------- "No, not tactically," said Frank Cilluffo, associate vice president for homeland security at George Washington University and a former senior terrorism adviser to Homeland Security Secretary Tom Ridge. It's not "within the realm of probability. But they are in the business of inflaming fear. They can win battles, but in the long term they cannot overcome our resilience and who we are as a nation." ... Some critics think the Bush administration has manipulated warnings about the timing of possible terrorist attacks for political purposes. Cilluffo, a Republican, dismissed such suggestions as "truly preposterous." -------------------- Dangers from terrorism scant compared to other risks, experts say By Miles Benson Newhouse News Service 08/08/04 "Seattle Times" -- WASHINGTON ≠ The terrorists can't win. They can't wreck the economy or inflict other forms of irreparable damage on the nation, despite their ability to impose great inconveniences, disruptions, expense and occasional scary periods of elevated alert, many experts say. To be sure, bombs or other forms of attack on the homeland could take lives, and the respite since Sept. 11, 2001, may not last. But the danger of average Americans or their loved ones becoming casualties in the war on terrorism is scant compared, say, to the daily risks they face from automobile accidents, crime or weather-related menaces. "A false sense of insecurity" grips the nation, spurred partly by war rhetoric from President Bush and his Democratic challenger, Sen. John Kerry, warns John Mueller, a political scientist at Ohio State University. The election campaign intensifies "a general tendency to exaggerate worst-case scenarios ≠ that terrorists can destroy our way of life," Mueller said. "That strikes me as basically wrong. Most likely there is some destruction here and there, which is very tragic ≠ we can't downplay the horror to the people directly involved ≠ but the idea that a tiny group of terrorists on the run can actually destroy the U.S. is extremely questionable." Other experts agree that the climate of danger and concern is out of proportion to the reality of terrorist capabilities. Al-Qaida might target the U.S. financial-services industry ≠ that threat triggered the current elevated alert in New York, Washington, D.C., and Newark, N.J. ≠ but even a successful attack would not bring the nation's economy to a halt. "Blowing up the International Monetary Fund or the New York Stock Exchange would be calamities, but not in that category, because the economy recovers from personal tragedies quite readily, in a heartless kind of way," said Henry Aaron, an economist at the Brookings Institution. "We should not be complacent," said Chester Crocker, a former assistant secretary of state under President Reagan, now a professor of diplomacy at Georgetown University. "But there is danger of people who don't know how the world is organized getting spooked and hysterical by the hype and emotional overreaction at the popular level." Terrorists may attempt to tear the fabric of society, but can they accomplish that? "No, not tactically," said Frank Cilluffo, associate vice president for homeland security at George Washington University and a former senior terrorism adviser to Homeland Security Secretary Tom Ridge. It's not "within the realm of probability. But they are in the business of inflaming fear. They can win battles, but in the long term they cannot overcome our resilience and who we are as a nation." While there is always the chance of losing hundreds of lives or critical parts of the infrastructure, "there is no danger of massive defeat of the United States" by terrorism, said Anthony Cordesman, a senior defense analyst at the Center for Strategic and International Studies. "Factors like the weather attack us all the time and produce casualties, but we are a great deal more resilient than most people understand." "Terrorism has become one more actuarial risk, like getting out of bed. Americans have shown they can live with the risks of getting out of bed, and terrorism as well, particularly if terrorism is as low as it has been." The National Center for Health Statistics, which tracks 113 causes of death in the United States, reported that in the same year that nearly 3,000 people died in the Sept. 11 attacks, 43,788 died in motor-vehicle accidents, 30,622 by suicide, 20,306 were murdered (including 11,348 by firearms), 14,078 died by accidental poisoning and 3,021 died as a result of complications from medical care. An additional 700,000 Americans died of heart disease, the No. 1 killer, according to the Centers for Disease Control and Prevention, while 553,768 died of cancer and 32,238 died of blood poisoning. "It's hard to compare the dangers of terrorism with other threats to life," said Dr. Robert Lifton, a psychiatrist who has studied and written extensively about the ways people react to extreme situations. "With terrorism, with Sept. 11, there was a shocking experience of violation of America's sense of safety," said Lifton, author of "Superpower Syndrome," a book about the nation's response to the terrorist threat. Some critics think the Bush administration has manipulated warnings about the timing of possible terrorist attacks for political purposes. Cilluffo, a Republican, dismissed such suggestions as "truly preposterous." Zbigniew Brzezinski, national-security adviser to former President Carter, is not so sure, and he worries about the degree to which perceived political imperatives drive leaders in both parties. "My grave concern is that we are hyping ourselves into a state of panic which is going to discredit us internationally even if it has some utility in the short run for the administration," Brzezinski said. "It reinforces the theme that we are at war. In a war you don't change your commander in chief. This is a pretend war. If it was a real war, we would have a draft, special taxes and a sense of sacrifice, posters with Uncle Sam pointing a finger at you and saying, 'I want you.' " Brzezinski acknowledged that Democratic presidential nominee Kerry also is talking "war" and using other language similar to Bush in describing the terrorist threat. "I suspect it's unnecessary," Brzezinski said. He blamed other party leaders, including Sen. Joe Lieberman of Connecticut and former House Democratic Leader Richard Gephardt of Missouri. "Democrats were stampeded into supporting Bush and enlarging the scope of the conflict," Brzezinski said. __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - Send 10MB messages! http://promotions.yahoo.com/new_mail 9345 From: G P Date: Tue Aug 10, 2004 0:58am Subject: Frankie Boy Cilluffo speaketh Aah, some more words of widsom from Frankie Boy Cilluffo, associate VP for homeland security at George Washington University and puppet for the homeland security/military/industrial complex ala WMD expert extraordinaire. Maybe Frankie Boy Cillufo should talk about his membership in the Council on Foreign Relations and his decidely pro-communist stance on virtually all things political. -------------------- "No, not tactically," said Frank Cilluffo, associate vice president for homeland security at George Washington University and a former senior terrorism adviser to Homeland Security Secretary Tom Ridge. It's not "within the realm of probability. But they are in the business of inflaming fear. They can win battles, but in the long term they cannot overcome our resilience and who we are as a nation." ... Some critics think the Bush administration has manipulated warnings about the timing of possible terrorist attacks for political purposes. Cilluffo, a Republican, dismissed such suggestions as "truly preposterous." -------------------- Dangers from terrorism scant compared to other risks, experts say By Miles Benson Newhouse News Service 08/08/04 "Seattle Times" -- WASHINGTON ≠ The terrorists can't win. They can't wreck the economy or inflict other forms of irreparable damage on the nation, despite their ability to impose great inconveniences, disruptions, expense and occasional scary periods of elevated alert, many experts say. To be sure, bombs or other forms of attack on the homeland could take lives, and the respite since Sept. 11, 2001, may not last. But the danger of average Americans or their loved ones becoming casualties in the war on terrorism is scant compared, say, to the daily risks they face from automobile accidents, crime or weather-related menaces. "A false sense of insecurity" grips the nation, spurred partly by war rhetoric from President Bush and his Democratic challenger, Sen. John Kerry, warns John Mueller, a political scientist at Ohio State University. The election campaign intensifies "a general tendency to exaggerate worst-case scenarios ≠ that terrorists can destroy our way of life," Mueller said. "That strikes me as basically wrong. Most likely there is some destruction here and there, which is very tragic ≠ we can't downplay the horror to the people directly involved ≠ but the idea that a tiny group of terrorists on the run can actually destroy the U.S. is extremely questionable." Other experts agree that the climate of danger and concern is out of proportion to the reality of terrorist capabilities. Al-Qaida might target the U.S. financial-services industry ≠ that threat triggered the current elevated alert in New York, Washington, D.C., and Newark, N.J. ≠ but even a successful attack would not bring the nation's economy to a halt. "Blowing up the International Monetary Fund or the New York Stock Exchange would be calamities, but not in that category, because the economy recovers from personal tragedies quite readily, in a heartless kind of way," said Henry Aaron, an economist at the Brookings Institution. "We should not be complacent," said Chester Crocker, a former assistant secretary of state under President Reagan, now a professor of diplomacy at Georgetown University. "But there is danger of people who don't know how the world is organized getting spooked and hysterical by the hype and emotional overreaction at the popular level." Terrorists may attempt to tear the fabric of society, but can they accomplish that? "No, not tactically," said Frank Cilluffo, associate vice president for homeland security at George Washington University and a former senior terrorism adviser to Homeland Security Secretary Tom Ridge. It's not "within the realm of probability. But they are in the business of inflaming fear. They can win battles, but in the long term they cannot overcome our resilience and who we are as a nation." While there is always the chance of losing hundreds of lives or critical parts of the infrastructure, "there is no danger of massive defeat of the United States" by terrorism, said Anthony Cordesman, a senior defense analyst at the Center for Strategic and International Studies. "Factors like the weather attack us all the time and produce casualties, but we are a great deal more resilient than most people understand." "Terrorism has become one more actuarial risk, like getting out of bed. Americans have shown they can live with the risks of getting out of bed, and terrorism as well, particularly if terrorism is as low as it has been." The National Center for Health Statistics, which tracks 113 causes of death in the United States, reported that in the same year that nearly 3,000 people died in the Sept. 11 attacks, 43,788 died in motor-vehicle accidents, 30,622 by suicide, 20,306 were murdered (including 11,348 by firearms), 14,078 died by accidental poisoning and 3,021 died as a result of complications from medical care. An additional 700,000 Americans died of heart disease, the No. 1 killer, according to the Centers for Disease Control and Prevention, while 553,768 died of cancer and 32,238 died of blood poisoning. "It's hard to compare the dangers of terrorism with other threats to life," said Dr. Robert Lifton, a psychiatrist who has studied and written extensively about the ways people react to extreme situations. "With terrorism, with Sept. 11, there was a shocking experience of violation of America's sense of safety," said Lifton, author of "Superpower Syndrome," a book about the nation's response to the terrorist threat. Some critics think the Bush administration has manipulated warnings about the timing of possible terrorist attacks for political purposes. Cilluffo, a Republican, dismissed such suggestions as "truly preposterous." Zbigniew Brzezinski, national-security adviser to former President Carter, is not so sure, and he worries about the degree to which perceived political imperatives drive leaders in both parties. "My grave concern is that we are hyping ourselves into a state of panic which is going to discredit us internationally even if it has some utility in the short run for the administration," Brzezinski said. "It reinforces the theme that we are at war. In a war you don't change your commander in chief. This is a pretend war. If it was a real war, we would have a draft, special taxes and a sense of sacrifice, posters with Uncle Sam pointing a finger at you and saying, 'I want you.' " Brzezinski acknowledged that Democratic presidential nominee Kerry also is talking "war" and using other language similar to Bush in describing the terrorist threat. "I suspect it's unnecessary," Brzezinski said. He blamed other party leaders, including Sen. Joe Lieberman of Connecticut and former House Democratic Leader Richard Gephardt of Missouri. "Democrats were stampeded into supporting Bush and enlarging the scope of the conflict," Brzezinski said. __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - Send 10MB messages! http://promotions.yahoo.com/new_mail 9346 From: G P Date: Tue Aug 10, 2004 0:58am Subject: Frankie Boy Cillufo speaketh Aah, some more words of widsom from Frankie Boy Cilluffo, associate VP for homeland security at George Washington University and puppet for the homeland security/military/industrial complex ala WMD expert extraordinaire. Maybe Frankie Boy Cillufo should talk about his membership in the Council on Foreign Relations and his decidely pro-communist stance on virtually all things political. -------------------- "No, not tactically," said Frank Cilluffo, associate vice president for homeland security at George Washington University and a former senior terrorism adviser to Homeland Security Secretary Tom Ridge. It's not "within the realm of probability. But they are in the business of inflaming fear. They can win battles, but in the long term they cannot overcome our resilience and who we are as a nation." ... Some critics think the Bush administration has manipulated warnings about the timing of possible terrorist attacks for political purposes. Cilluffo, a Republican, dismissed such suggestions as "truly preposterous." -------------------- Dangers from terrorism scant compared to other risks, experts say By Miles Benson Newhouse News Service 08/08/04 "Seattle Times" -- WASHINGTON ≠ The terrorists can't win. They can't wreck the economy or inflict other forms of irreparable damage on the nation, despite their ability to impose great inconveniences, disruptions, expense and occasional scary periods of elevated alert, many experts say. To be sure, bombs or other forms of attack on the homeland could take lives, and the respite since Sept. 11, 2001, may not last. But the danger of average Americans or their loved ones becoming casualties in the war on terrorism is scant compared, say, to the daily risks they face from automobile accidents, crime or weather-related menaces. "A false sense of insecurity" grips the nation, spurred partly by war rhetoric from President Bush and his Democratic challenger, Sen. John Kerry, warns John Mueller, a political scientist at Ohio State University. The election campaign intensifies "a general tendency to exaggerate worst-case scenarios ≠ that terrorists can destroy our way of life," Mueller said. "That strikes me as basically wrong. Most likely there is some destruction here and there, which is very tragic ≠ we can't downplay the horror to the people directly involved ≠ but the idea that a tiny group of terrorists on the run can actually destroy the U.S. is extremely questionable." Other experts agree that the climate of danger and concern is out of proportion to the reality of terrorist capabilities. Al-Qaida might target the U.S. financial-services industry ≠ that threat triggered the current elevated alert in New York, Washington, D.C., and Newark, N.J. ≠ but even a successful attack would not bring the nation's economy to a halt. "Blowing up the International Monetary Fund or the New York Stock Exchange would be calamities, but not in that category, because the economy recovers from personal tragedies quite readily, in a heartless kind of way," said Henry Aaron, an economist at the Brookings Institution. "We should not be complacent," said Chester Crocker, a former assistant secretary of state under President Reagan, now a professor of diplomacy at Georgetown University. "But there is danger of people who don't know how the world is organized getting spooked and hysterical by the hype and emotional overreaction at the popular level." Terrorists may attempt to tear the fabric of society, but can they accomplish that? "No, not tactically," said Frank Cilluffo, associate vice president for homeland security at George Washington University and a former senior terrorism adviser to Homeland Security Secretary Tom Ridge. It's not "within the realm of probability. But they are in the business of inflaming fear. They can win battles, but in the long term they cannot overcome our resilience and who we are as a nation." While there is always the chance of losing hundreds of lives or critical parts of the infrastructure, "there is no danger of massive defeat of the United States" by terrorism, said Anthony Cordesman, a senior defense analyst at the Center for Strategic and International Studies. "Factors like the weather attack us all the time and produce casualties, but we are a great deal more resilient than most people understand." "Terrorism has become one more actuarial risk, like getting out of bed. Americans have shown they can live with the risks of getting out of bed, and terrorism as well, particularly if terrorism is as low as it has been." The National Center for Health Statistics, which tracks 113 causes of death in the United States, reported that in the same year that nearly 3,000 people died in the Sept. 11 attacks, 43,788 died in motor-vehicle accidents, 30,622 by suicide, 20,306 were murdered (including 11,348 by firearms), 14,078 died by accidental poisoning and 3,021 died as a result of complications from medical care. An additional 700,000 Americans died of heart disease, the No. 1 killer, according to the Centers for Disease Control and Prevention, while 553,768 died of cancer and 32,238 died of blood poisoning. "It's hard to compare the dangers of terrorism with other threats to life," said Dr. Robert Lifton, a psychiatrist who has studied and written extensively about the ways people react to extreme situations. "With terrorism, with Sept. 11, there was a shocking experience of violation of America's sense of safety," said Lifton, author of "Superpower Syndrome," a book about the nation's response to the terrorist threat. Some critics think the Bush administration has manipulated warnings about the timing of possible terrorist attacks for political purposes. Cilluffo, a Republican, dismissed such suggestions as "truly preposterous." Zbigniew Brzezinski, national-security adviser to former President Carter, is not so sure, and he worries about the degree to which perceived political imperatives drive leaders in both parties. "My grave concern is that we are hyping ourselves into a state of panic which is going to discredit us internationally even if it has some utility in the short run for the administration," Brzezinski said. "It reinforces the theme that we are at war. In a war you don't change your commander in chief. This is a pretend war. If it was a real war, we would have a draft, special taxes and a sense of sacrifice, posters with Uncle Sam pointing a finger at you and saying, 'I want you.' " Brzezinski acknowledged that Democratic presidential nominee Kerry also is talking "war" and using other language similar to Bush in describing the terrorist threat. "I suspect it's unnecessary," Brzezinski said. He blamed other party leaders, including Sen. Joe Lieberman of Connecticut and former House Democratic Leader Richard Gephardt of Missouri. "Democrats were stampeded into supporting Bush and enlarging the scope of the conflict," Brzezinski said. __________________________________ Do you Yahoo!? Yahoo! Mail is new and improved - Check it out! http://promotions.yahoo.com/new_mail 9347 From: David Alexander Date: Tue Aug 10, 2004 2:58am Subject: RE: Police Used Laptops To Duck Calls [Mildly OT] What gets me is that the Dispatcher had been allowed to have the same password for at least 2 years. To avoid just such abuse, the system should have been set to force a change every 90 days David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: 06 August 2004 22:28 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Police Used Laptops To Duck Calls [Mildly OT] > > >Police Used Laptops To Duck Calls >By STEPHEN THOMPSON spthompson@t... >Published: Aug 6, 2004 > > > >ST. PETERSBURG - With laptop computers becoming as familiar a >crime-fighting tool as handguns and police dogs, two dozen St. >Petersburg patrol officers found a way to crack a database to find out >what calls were about to come over the radio. > >A few officers are suspected of using the advance warning of unpleasant >assignments to make themselves unavailable. >One such officer, Phillip Peyton, used someone else's password to access >the system the night of Jan. 30, according to internal affairs documents >made public Thursday. He learned dispatchers were about to send officers >to a suicide call, the documents say. A 52-year-old woman going through >a divorce had hanged herself in a bedroom closet with pantyhose. >``For the love of God,'' Peyton messaged another officer on the laptop >in his cruiser. ``Do a X-50 right now or west end.'' > >An X-50 is a traffic stop, which typically takes much less time than >dealing with a death. ``West end'' is code for going to the bathroom - >because bathrooms at the police station historically have been in the >western half of the building. > >Officer Ann Sener, who received the message, made a traffic stop. Peyton >was on a call, so he, too, technically was unavailable, documents show. >All told, 32 St. Petersburg police employees, most of them officers, >were believed to be involved in the improper accessing of the >department's computer-aided dispatch system, the department announced >Thursday after wrapping a months-long investigation. > >That number does not include the half-dozen or so former officers who >have gone to other agencies, including the Tampa Police Department, and >declined to cooperate, internal affairs investigators say. > >Only Peyton, Sener and another officer, who now works undercover in vice >and narcotics, were suspected of using the system to avoid handling a >call, the documents say. >On Thursday, Peyton was suspended for three days. > >Sener was given a written reprimand. She acknowledged it appeared she >was shirking the suicide, but she was adamant that she was looking for a >car to stop when Peyton's message appeared on her laptop screen. > >The undercover officer, who admitted avoiding a call regarding an >unattended death, was suspended for two days. > >The two officers who handled the suicide had suspected some of their >colleagues were using the dispatch system to dodge calls, and they >complained to Sgt. Mark Degan. But Degan didn't bring the matter to >internal affairs - and for that he was suspended for five days. > >Bill Beal was the dispatcher whose password many officers used to access >the system. > >``Kane11'' was a variation on the name of his great-grandfather, Thomas >Kane, a Chicago Police Department captain who later started a security >firm. Beal told internal affairs investigators he didn't share the >password with anyone. > >But an officer said Beal gave it to him two years ago. Beal said he >didn't remember doing so. Beal received a written reprimand. >Twenty-four other employees - including 22 officers - agreed to accept >written reprimands after acknowledging they used passwords of others to >get into the system, bringing the number of those punished to 29. Three >others were cleared of wrongdoing. > >Technically, the officers admitted to trying to ``subvert'' the agency's >security measures. But in internal affairs interviews, they said they >had used the system to respond to a call before it was dispatched and >others said they used it to keep track of their fellow officers. > >In a memorandum to his department circulated Thursday, Police Chief >Chuck Harmon told his troops they eventually might have access to >computerized dispatch information after the department finishes >negotiating with a new vendor. > >The reason access was cut off some months ago was that so many officers >were using it, the system was being slowed down, Harmon said. >Reporter Stephen Thompson can be reached at (727) 823-3303. >http://www.tampatrib.com/MGBEKWZRJXD.html ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9348 From: Tech Sec Lab Date: Tue Aug 10, 2004 6:24am Subject: UWB...Here we go... As these will now be available to all I hope to see some methods of signal analysis bing discussed....! -Ois FCC Approves First Commercial UWB Chipset By Roy Mark August 9, 2004 The promise of ultra wide band (UWB) products under the Christmas tree could actually become a reality this year with the Federal Communications Commission's (FCC) approval of Freescale Semiconductor's (http://www.freescale.com/) XS110 chipset for commercial multimedia use. UWB-enabled devices hold the promise of wireless, short-range, high-speed data transmissions fully capable of supporting broadcast-quality video. Analysts predict television sets that wirelessly send different programs to other television sets in the house, flat screen computer monitors that can be wirelessly tethered to a CPU located anywhere in the home, and wireless connections between VCRs, camcorders and televisions. ABI Research has predicted worldwide shipments of UWB-enabled devices by 2009 could be as high as 315 million units. Two years ago, promoters of the technology promised a wireless revolution with the advent of UWB but standards battles have delayed any widespread adoption. "This will be first public UWB chip offering to put into consumer and electronic products," said John Adams, Freescale's directory of radio technology. "I think you're going to see a limited number of products by Christmas." The FCC decision allows Freescale, the Motorola semiconductor spin-off, to immediately begin shipping the chipsets for inclusion in wireless consumer electronics products such as large screen displays, digital video recorders and set-top boxes. "By working closely with the FCC over the past two years, we felt confident that our direct sequence UWB (DS-UWB) approach would comply and enable coexistence with other wireless technologies," Martin Rofheart, director of UWB operations for Freescale, said in a statement. "With the FCC's action, we're now focused on delivering UWB products to our consumer electronics customers, so their products will be able to reach the U.S. market as early as the holiday season." The DS-UWB approach is one of two remaining competing UWB standards, along with orthogonal frequency division multiplexing (OFDM). A chipset operating on DS-UWB can achieve more than 110 megabits per second (Mbps) data rates and consumes minimal power. The FCC first approved rules for the commercial use of UWB in February of 2002. By April of that year, the FCC gave formal approval for the unlicensed use of the technology between 3.1 GHz and 10.6 GHz. Prior to last week's FCC certification, Freescale was operating under special license while sampling products to customers and undergoing FCC and third-party interference testing. Following testing by the FCC's Office of Engineering and Technology Laboratory, Freescale's XS110 solution met the Part 15 emission limits. Freescale said it also adhered to FCC rules for a spectral mask requiring UWB to operate at extremely low power levels to protect existing spectrum users, including cell phones, GPS systems and satellites. During the testing period, Adams said Freescale worked closely with consumer product developers. "We've been working with companies for the last 18 months or so," Adams said. "They are already tightly in the loop for developing products using our platform." Unlike conventional wireless radio systems that operate within a relatively narrow bandwidth (i.e. Bluetooth, IEEE 802.11b, IEEE 802.11a), UWB operates across a wide range of frequency spectrum by transmitting a series of very narrow and low-power pulses. The UWB industry says this combination of broader spectrum, lower power and pulsed data means that UWB causes less interference than conventional narrowband radio solutions. Source: http://www.internetnews.com/infra/article.php/3392771 From: Agent_X Date: Wed Aug 9, 2000 0:24pm Subject: Re: Debunk WSJ article on TEMPEST >>i am sure that many on this list are aware that the >>audio speakers on your computer can be utilized as room listening >>devices, from a remote location, via the internet. > >Assuming this isn't supposed to be a joke, I'm having trouble envisioning the >engineering behind this claim. Even if you could somehow convince the audio >card to digitize a signal coming in through the speaker output, what mechanism >are you going to use to send this over the Internet? Streaming audio? Convert >slices to .wav or mp3/4 files and transfer them via binary FTP or >encode them in >SMTP? > >Any of those methods requires software on the subject's system. You couldn't >collect, digitize, encapsulate, and transfer audio signal data via pure 'pull' >technology. > >Unless you hack into a user's box first and plant all this stuff, I don't see >how it can be done, but maybe I'm just ignorant. > >RGF > >Robert G. Ferrell, CISSP BO2K (http://www.bo2k.com )release by the CDC (Http://www.cultdeadcow.com) will do something akin to this. A client user could fire up the web cam and transfer the captured images to themselves for perusal. While not as nifty as audio a pictures is worth a thousand words. BO2K also has many other wonderful and fun features, such as keystroke logging, and encrypted traffic. And to top this all off BO2K is a really cheap and easy piece of software, meaning almost any fool could use it. So assuming that there are really smart and skilled people out there I'm sure someone could come up with a even more useful app. -- Agent X PGP Keys available by request. PGP Fingerprint (6.5.2) : 1953 A923 9B1F C710 5C94 AE05 E0BA F51F E9B6 AD85 PGP Fingerprint (2.6.2): 8C 9A BE D5 41 3F 96 C8 D2 8C 1D B1 5F 59 55 FF 1173 From: James M. Atkinson, Comm-Eng Date: Wed Aug 9, 2000 3:29pm Subject: RE: Debunk WSJ article on TEMPEST At 11:36 AM -0500 8/9/00, Perry Myers wrote: >I learned long ago that if the speaker works as a speaker, than it is not a >microphone. If it does not work as a speaker, you better check it out or >better yet, remove it. > >Perry D. Myers, CFE >President >Myers Service, Inc. Investigations >2076 N. Elston Ave. Suite 200 >Chicago, IL. 60614-3940 >Phone 773-342-8300 >Facsimile 773-486-4430 >e-mail: perry@m... Ah... but if you install a microphone onto a speaker line and then modulate the audio you can impress it back onto the speaker wire with a live signal and feed it back to the LP. You can even set up a slight phase delay and remove the audio audio being fed into the speaker so it does not interfere. Such systems feed a DC voltage up the wire to power the unit, which is then decoupled by the device so the DC doesn't appear on the speaker. This is why you should remove all speakers from sensitive areas and ensure that there is nothing in the area capable of a microphonic response, or capable to providing a conductive path for a covert signal. Now, on the issue of computer speakers... Any speaker can be used as a microphone, however; you can not simply send someone a chunk of code and toggle their speakers into eavesdropping mode (you have to fiddle with hardware). Of course you can send the computer a command to "open" the microphone and to stream the audio to a file, but you generally can not "activate" a speaker in the same manner. One of the service I provide for clients is to remove everything from a computer, or fax machine that is in anyway microphonic (speakers, microphones, etc). I also install -110 dB filters on all conductors (power, phones, alarm, HVAC, etc) so as to render those paths ineffective for eavesdropping. I also provide construction advice/supervision to ensure that facilities are built in such a way from the start that makes it tough to introduce eavesdropping devices. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1174 From: James M. Atkinson, Comm-Eng Date: Wed Aug 9, 2000 4:51pm Subject: Re: Debunk WSJ article on TEMPEST At 3:29 PM -0700 8/9/00, Pesach Lattin wrote: > Actually, a microphone can be used as a mini-speaker. I've had the >experience of plugging in my microphone and speakers in the wrong jacks and >had music come out of the microphone. >---------------------------------------------------------------- [Grin] I've known a few TSCM people who were very skillful at using their sphincter as a mini-speaker as well. Articles like the one in the WSJ regarding "Pentagon TEMPEST surveillance" highlights the capabilities that some "experts" have for sphincter ventriloquism. ...sort of talking out their ass if you know what I mean. [/Grin] =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1175 From: Pesach Lattin Date: Wed Aug 9, 2000 8:34pm Subject: Re: Debunk WSJ article on TEMPEST Hmm, I can only imagine the damage if you crossed wires. ---------------------------------------------------------------- Pesach Lattin, Computer Crime Specialist Voice Mail: (914) 818-3727 Fax: (240) 337-8339 Webmaster, Federal Law Enforcement Officers Association HQ: ph: (717) 938-2300 fax: (717) 932-2262 Visit our website @ http://www.fleoa.org ---------------------------------------------------------------- > [Grin] > > > I've known a few TSCM people who were very skillful at using their > sphincter as a mini-speaker as well. > > Articles like the one in the WSJ regarding "Pentagon TEMPEST > surveillance" highlights the capabilities that some "experts" have > for sphincter ventriloquism. > > ...sort of talking out their ass if you know what I mean. > > > [/Grin] > > > =================================================================== > Everybody's into computers... Who's into yours?Å > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Lizard, The Other White Meat > =================================================================== > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1176 From: James M. Atkinson, Comm-Eng Date: Wed Aug 9, 2000 5:45pm Subject: Re: Debunk WSJ article on TEMPEST [smirk] Yes... but the power surges can be interesting. [/smirk] -jma At 6:34 PM -0700 8/9/00, Pesach Lattin wrote: >Hmm, I can only imagine the damage if you crossed wires. >---------------------------------------------------------------- >Pesach Lattin, Computer Crime Specialist >Voice Mail: (914) 818-3727 Fax: (240) 337-8339 > >Webmaster, Federal Law Enforcement Officers Association >HQ: ph: (717) 938-2300 fax: (717) 932-2262 >Visit our website @ http://www.fleoa.org >---------------------------------------------------------------- > > > [Grin] > > > > > > I've known a few TSCM people who were very skillful at using their > > sphincter as a mini-speaker as well. > > > > Articles like the one in the WSJ regarding "Pentagon TEMPEST > > surveillance" highlights the capabilities that some "experts" have > > for sphincter ventriloquism. > > > > ...sort of talking out their ass if you know what I mean. > > > > > > [/Grin] > > =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1177 From: Miguel Puchol Date: Wed Aug 9, 2000 5:53pm Subject: Re: List Demographics (Confession is good for the soul) James, > Right, but if one of the vice presidents is having a bad day he can't > go down to the lab and snort a few lines. Neither can he smurf a few > kilo's out of the lab so his brother-in-law can peddle it on the > street to college students. But he still has access to it. This means that the company and it's workers can examine the substances, and in some case, use them for terapeutic purposes, and in some others, find a cure or antidote for them. The analogy in TSCM would be to allow companies, via special permits or some other formula, to have access to bugs and related technology, for study and learning purposes. I really don't see such a big moral dilemma in something like this, it's just that each country's laws are made (usually) for that country's circumstances. From what I can gather in the US there must have been some really big problems with privacy invasion to rule such restrictive laws. > There is a legitimate and perfectly legal way to posses a narcotic > substance or contraband... and then there is the illegal way. Agreed. > There is also a completely legal way to possess bugs, and a totally > illegal way to possess them... and there is no gray area between the > two. OK, so is there a legal way in the US to do so, without being a government agency? > A large number of large biotech firms on the east coast are my > clients, and some of them have production facilities where they > measure the amount of narcotics produced daily in tons... Yes TONS. > People working there do not "take home samples", fiddle with new > formulas in their basement, or anything even remotely having an > "appearance of mischief". The DEA would shut the facility in seconds > if they though any such foolishness was going on. We are not talking about TSCM specialists using the bugs they may have to plant them, we are talking about defeating the enemy with whatever tools we can get, and I truly believe in being able to study the enemy's weapons. Best regards, Mike 1178 From: Miguel Puchol Date: Wed Aug 9, 2000 5:59pm Subject: Re: Debunk WSJ article on TEMPEST The software you refer to is BackOrifice [SIC] or BO, detected by most antivirus programs as a trojan horse. It is NOT capable of recording audio from the speakers installed on a computer - this is a physical imposibility. The only way would be to plug the speakers into the microphone input, and even then it is highly unlikely that the speakers could generate high enough voltage levels to be recorded by a soundcard. Combine that with audio compression, noise, etc. and you have another urban myth. Cheers, Mike ----- Original Message ----- From: To: Sent: Wednesday, August 09, 2000 8:00 PM Subject: Re: [TSCM-L] Debunk WSJ article on TEMPEST > no joke! picked up some of the info off of a software developer > newsletter that i subscribe to. Apparently ,it is even taught in various > "trade" schools. > i am not an expert on the methodology. seems it utilizes > software that is either installed by the computer manufacturer for > remote trouble-shooting > or incorporates software by Microsoft? titled 'Backdoor". it could > commonly be referred to as a virus. > my interest being defensive,rather than offensive,has prompted > me to examine ,primarily simple solutions for > deterring audio invasion of privacy , such as unplugging audio speakers > connected to a computer or disconnecting the physical internet > connection.With time limitations ,being what they are, i am unable to > follow up every sci-fi techno surveillance lead. However , i do believe > this form of audio snooping to be currently employed. > > > > > > > HAVE A GREAT DAY !!! > > > > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1179 From: Miguel Puchol Date: Wed Aug 9, 2000 6:01pm Subject: Re: List Demographics (Confession is good for the soul) > Since a bug can't really be used for anything but bugging someone, and since > private citizens don't have any legitimate recourse to bugging, it's illegal to > possess one. It could be used for learning, training, advance knowledge, etc. by legitimate TSCM specialists. I don't see anything ilegitimate in these. Mike 1180 From: Charles Patterson Date: Wed Aug 9, 2000 3:17pm Subject: Re: Debunk WSJ article on TEMPEST He may mean more the microphone than the speakers. What we often have to caution executives about is that the laptops that are usually allowed in closed door/secure meetings can do a great job of recording conversations. Making people give up their tape recorders is only part of the job. charles ----- Original Message ----- From: To: Sent: Wednesday, August 09, 2000 12:34 AM Subject: Re: [TSCM-L] Debunk WSJ article on TEMPEST > > i am sure that many on this list are aware that the > audio speakers on your computer can be utilized as room listening > devices, from a remote location, via the internet. > one way to disable this is to unplug the audio > speakers when not in use,and or to completely disconnect from the > internet. those with constantly "on" > internet connections are most vulnerable. > guess what? that recipe for the secret sauce your > grandma handed down to you is not so secret anymore. > > > HAVE A GREAT DAY !!! > > > > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1181 From: Pesach Lattin Date: Wed Aug 9, 2000 9:08pm Subject: Re: List Demographics (Confession is good for the soul) No offense, but I don't care what a specialist you are, I don't want you possessing anything that could, in theory, infringe on MY rights of privacy. Here in the United States we are very protective of our privacy, because we see (no offense to those who don't live here) how the rest of the world lives, without these laws. Right now, we don't have laws that protect our privacy in instances of a camera, and we have every sicko and their dog taking pictures of our children as they get dressed in the local GAP. You might CLAIM to be an expert, but I don't want to have to create ANOTHER agency to monitor the so-called 'experts'/wannabe-spy to make sure they aren't selling these devices to every joe who wants to listen to their neighbors love-making sessions. Most TCSM experts have gotten along VERY well without possessing these devices. Anyone who argues otherwise is just interested in playing with the cool toys and pretending to be Inspector Gadget. It's the job of Law Enforcement to use and possess these items in the United States -- not self-proclaimed heroes. ---------------------------------------------------------------- Pesach Lattin, Computer Crime Specialist Voice Mail: (914) 818-3727 Fax: (240) 337-8339 Webmaster, Federal Law Enforcement Officers Association HQ: ph: (717) 938-2300 fax: (717) 932-2262 Visit our website @ http://www.fleoa.org ---------------------------------------------------------------- ----- Original Message ----- From: Miguel Puchol To: Sent: Wednesday, August 09, 2000 4:01 PM Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > > > Since a bug can't really be used for anything but bugging someone, and > since > > private citizens don't have any legitimate recourse to bugging, it's > illegal to > > possess one. > > It could be used for learning, training, advance knowledge, etc. by > legitimate TSCM specialists. I don't see anything ilegitimate in these. > > Mike > > 1182 From: James M. Atkinson, Comm-Eng Date: Wed Aug 9, 2000 6:07pm Subject: Debunking TEMPEST [The WSJ Article is a Complete Bullshit] The attached article was published on Monday 8/7/00 by the Wall Street Journal, and is so far off base as to be laughable. Hopefully, the Journal will act responsibly in this matter and issue a formal retraction an apology, or at least launch some spin control on some of the more major fabrications. For some reason the laws of physics do not apply to some technology (of course when you break Federal law, breaking the laws of physics is no big deal). Let me say again... TEMPEST (at least according to THOUSANDS of pages of government documents I have) deals with the "Shielding, Bonding, Grounding, and Filtering" of equipment processing classified materials. It DOES NOT involve eavesdropping equipment or methods, but instead involves the technology used to protect against "compromising emissions". I can direct you to dozens of government documents regarding TEMPEST which explain in GREAT detail what it is (and is not) all about. What the ridiculous article in the WSJ rants on about is actually known as "Raster Analysis and Identification" or RAID and is something that can be performed within VERY limited distances by equipment found in most high school and college electronics labs. However, note that these are VERY LIMITED distance... not hundreds of feet... but inches (if your lucky). Anybody who has formal experience in TSCM knows how to perform a RAID analysis, and it is something that is is done to evaluate wide band or repetitive signals that can not be otherwise identified. Sad... Really Sad... -jma PS: If your interested in information about what TEMPEST is (and is not) then check out the following tutorials on the subject matter: http://www.tscm.com/TSCM101tempest.html http://www.tscm.com/TSCM101antprot.html http://www.tscm.com/TSCM101video3.html >http://interactive.wsj.com/articles/SB965597027984161252.htm > >'Tempest' Program Addresses Pentagon >Worries Over Computer-Screen Spying >By MICHAEL J. MCCARTHY >Staff Reporter of THE WALL STREET JOURNAL > > >When most computer users worry about privacy in the digital age, they wonder >who's reading their e-mail or watching where they go online. But inside the >U.S. government, security officials have a much greater fear: Is someone >with the right surveillance equipment tuning in to what is on their computer >monitors from a nearby office, or a floor below or even across the street? > >It can be done through thin air -- no phone lines needed. Everyone's >video-display terminal emits unique radio-frequency waves that can be >isolated and captured with a "directional" antenna focused on a particular >computer or room. Those signals can then be amplified with fairly >inexpensive equipment and reconstructed to show precisely what is on your >screen. > >Letter by letter, a sales proposal, an R&D report or a note to a lawyer can >be captured from as far away as several hundred yards. > >Aside from scientists' demonstrations and one televised stunt in England in >the 1980s, instances of this kind of computer surveillance haven't come to >light. > >Seeking Spies > >But U.S. military and intelligence agencies have been concerned since at >least the 1980s, and maybe earlier, about what they call in official >documents "compromising emanations" from computers. The Department of >Defense operates a classified program known as Tempest, under which it is >designing and acquiring technology to defend against computer-screen >surveillance, according to defense contractors and ex-military officials. >The government is looking for protective materials and anti-surveillance >monitoring tools that can keep foreign spies from collecting stray signals >from computers in defense labs or U.S. embassies. > >A cottage industry of mostly small companies has quietly emerged to market >such protective equipment. The main buyers are U.S. agencies and >government-approved contractors. The official specifications for such >equipment are classified. > >But people involved in this shadowy trade say that it is possible that >nonapproved corporations also are acquiring the technology -- or making it >for themselves, as the ingredients and designs aren't particularly esoteric. >And while suppliers all say they sell only defensive equipment, some of them >concede that their products could easily be adjusted to do offensive >surveillance. > >NSA Endorsements > >Some large companies are also jumping into this cloak-and-dagger market. On >its Web site, Siemens AG, the German engineering and electronics giant, >advertises several "emission-proof PCs," including its Tempest Deskbook and >Tempest PC-DZ0. (www.ad.siemens.de/ tempest/html_76/ emission.htm) > >The secretive National Security Agency, the government's main >communications-intelligence organization, has listed 18 companies on its Web >site, including Motorola Inc., whose computer-protection equipment or >testing services meet government standards. An NSA spokeswoman, however, >refuses in a telephone interview to answer questions on the subject, saying >the only information available is on the bare-bones Web page. > >While it shops for computer-protection devices, the military is trying to >make sure that other potential buyers are thwarted. Codex Data Systems Inc. >has marketed over the Internet a scanner with which you can check whether a >VDT, once shielded, is still leaking radio waves strong enough for snoops to >pick up. The Army has begun buying the $20,000 units, according to the >company. But Codex also says that it has agreed to a Pentagon request that >it halt sales to anyone else. > >Fearing the dissemination of this kind of equipment, the U.S. government has >banned its sale abroad without a license. Last summer, the Federal Bureau of >Investigation arrested a man in Virginia, who has since been sentenced to >prison for trying to export a computer-monitor surveillance system. > >Legal Uncertainties > >The legality of spying on someone's VDT from afar is far from clear. States >have anti-eavesdropping laws that may apply but which vary widely, from >highly permissive to very restrictive. > >Federal criminal law specifically bars intercepting and disclosing "any >wire, oral or electronic communication." That rules out using a radio >receiver to eavesdrop on someone's cell-phone call. But the federal law >doesn't contemplate computer surveillance through the air and may not bar >it, legal scholars say. Courts haven't yet had a chance to examine the >question. > >"Typing to yourself is not a 'communication,' which requires two parties," >says Michael Froomkin, a University of Miami law professor who studies >privacy and computers. "It's a real open question." > >Some engineers and security experts say the threat of computer-screen spying >has been overblown. They argue that there has been an explosion of devices, >from PCs to cell phones, all emitting oceans of radio-frequency waves, which >makes it harder to pinpoint the relatively weak radio waves from a single >computer. > >While technically feasible, the whole exercise of retrieving signals >covertly, from vans parked outside offices, or otherwise, could be costly >and difficult, these skeptics add. It would be simpler in the corporate >context, for example, to bribe a janitor or a disloyal employee to >infiltrate the company and nab coveted data, according to this view. > >Capturing the contents of a computer screen is a surprisingly rudimentary >process. Wim van Eck, a Dutch research scientist, laid out the specifics as >far back as 1985, in an article in Computers & Security, a technical >journal. One of his conclusions: "If no preventive measures are taken, >eavesdropping on a video-display unit is possible at several hundreds of >meters distance, using only a normal black-and-white TV receiver, a >directional antenna and an antenna amplifier." > >In a computer, some of the most powerful radiation emanates from the >monitor, a cathode-ray tube in which electron guns fire streams of electrons >more than 60 times a second to produce the images displayed. That >bombardment produces wave frequencies, some of which overlap with the >familiar VHF and UHF television bands. > >In short, the invisible, information-bearing radio waves from a monitor are >remarkably similar to a broadcast TV signal. A spy's scanner need only tune >in the waves and process them line by line to replicate the image on the >original screen. > >Mr. van Eck did a little high-tech grandstanding 15 years ago, bringing >along a crew from British Broadcasting Corp. to film him as he used an >antenna-equipped van to snoop on computers inside buildings in London. The >BBC featured the caper on a show called "Tomorrow's World," but Mr. van Eck >didn't reveal any of the information he had viewed. > >At the time, his demonstration was seen as an oddity. Desktop computers >weren't yet fixtures in most offices or homes, processing everything from >personal bank records to corporate secrets. > >Tempest Expands > >Concern was growing in the U.S. military, though, which stepped up its >Tempest program in the mid-1980s, according to defense contractors and >ex-military people. The Pentagon took steps such as building "secure >compartmentalized information facilities," or SCIFs: whole rooms wrapped in >screening made of copper and other metals. Elsewhere, individual military >computers and monitors were similarly sheathed. The term Tempest is believed >to be an abbreviation for "transient electromagnetic pulse standard." The >"standard" refers to the level at which the military estimates computers can >safely "leak" radio waves and remain undetectable to snooping antennas. > >Lately, private companies are cropping up to sell the government things such >as portable tents, which shield computer equipment and can be quickly >pitched and dismantled. BEMA Inc., based in Manassas, Va., sold more than 25 >of the tents last year, mostly to the State Department and defense agencies, >says president Robert E. Thomas, a former Army computer specialist. The >tents, which run $30,000 each and up, are made of highly conductive fabric, >plated with copper and nickel. This material diminishes the strength of >unintended computer emissions. > >Mr. Thomas says he expects to sell even more tents this year, including a >fresh order for 10 from the State Department's Bureau of Diplomatic >Security. A spokesman for the bureau, which protects U.S. embassies >world-wide, confirms that it ordered BEMA tents but will say only that >information about their use is classified. > >Air Force Maj. Joe Wassel, Defense Secretary William Cohen's military >assistant for communications, confirms that the Pentagon has "purchased BEMA >products" but won't comment further. > >The Army signed a contract with Codex Data Systems 18 months ago to acquire >"under a dozen" of the Nanuet, N.Y., company's DataScan Tempest Monitoring >Systems, says Codex's Mr. Jones. The system, which alerts users to >potentially compromising signals from VDTs, employs a receiver that >resembles a ham radio and an electronic box the size of a cigarette carton, >called a convertor, which reconstructs signals. It also includes a four-foot >arrow-shaped aerial of the sort used by amateur radio operators. > >Mr. Jones says that this hardware is intended to be used defensively. But >"it could also be used offensively," meaning to spy on other people's >computers, he adds. > >The Army, Mr. Jones says, told him it wanted to test his system at the White >Sands Missile Range in New Mexico. Strikingly, the Army also asked him not >to sell the equipment to anyone else, until it completes its testing, he >adds. Mr. Jones says he agreed, in hopes that the Army will become a steady >customer. > >Officials at the White Sands range refer inquires about the DataScan system >to Maj. William Bigelow, an Army spokesman at the Pentagon, who declines to >comment. > >In the meantime, Codex still has information about the DataScan system on an >old Web site. Mr. Jones says the site has drawn inquiries from security >directors at large U.S. corporations, which he declines to name, and from >companies in China. Mr. Jones says he ignores all of these inquiries. > >Little Corporate Knowledge > >Mr. Jones's account of corporate curiosity notwithstanding, relatively few >U.S. companies outside of defense-contractor circles appear to know much >about the threat of computer-monitor surveillance or the government's >Tempest program. > >Louis Gnecco, president of Tempest Inc., in Herndon, Va., which supplies >government agencies with equipment to test shielding, as well as testing >services, says that over the years, corporate-security directors have >occasionally contacted him about his wares. "They say, 'If you think my >computer can be read from across the street, then show me.' And I have to >say, 'That's a classified demonstration.' " > >U.S. law enforcement is on the prowl for people who try to evade criminal >restrictions on shipping equipment overseas that could be used for either >computer surveillance or protection against it. Such equipment is >specifically mentioned in a 1992 federal regulation that lists export >restrictions on U.S. weaponry, including ballistic missiles, tanks and >howitzers. > >An FBI Sting > >In what is apparently the first case of its kind, the FBI in July of last >year arrested Shalom Shaphyr, an Israeli citizen who was in the U.S. under a >business visa, for attempting to export a monitoring system that could be >used to spy on computers. An informant told the FBI that Mr. Shaphyr was in >Virginia, hunting for the equipment on behalf of the Vietnamese government, >according to an FBI affidavit filed in the U.S. district court in >Alexandria, Va. > >With that tip, the FBI and U.S. Customs Service launched a sting operation. >After meeting with an undercover FBI agent posing as a >surveillance-equipment salesman, Mr. Shaphyr agreed to pay $30,000 for >"computer-intercept equipment," according to the FBI affidavit. He completed >shipping papers, dishonestly labeling the gear as "video-reception test >equipment," with a value of about $1,500, the affidavit said. > >After pleading guilty to attempting to export defense equipment without a >license, the 54-year-old Mr. Shaphyr was sentenced to 15 months in federal >prison in January. According to the affidavit, he told the undercover agent >that the monitoring equipment "would be used in an urban environment to view >computer screens in buildings and offices without the knowledge or consent >of the computer users." > >Write to Michael J. McCarthy at mike.mccarthy@w... =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1183 From: Pesach Lattin Date: Wed Aug 9, 2000 9:12pm Subject: Re: Debunking TEMPEST [The WSJ Article is a Complete Bullshit] Agreed - for the emmissions to be powerful enough to actually "catch" they would probably be in violation of FCC laws. As anyone who has a cell-phone next to their monitor, you can get some weird effects. ---------------------------------------------------------------- Pesach Lattin, Computer Crime Specialist Voice Mail: (914) 818-3727 Fax: (240) 337-8339 Webmaster, Federal Law Enforcement Officers Association HQ: ph: (717) 938-2300 fax: (717) 932-2262 Visit our website @ http://www.fleoa.org ---------------------------------------------------------------- ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Sent: Wednesday, August 09, 2000 4:07 PM Subject: [TSCM-L] Debunking TEMPEST [The WSJ Article is a Complete Bullshit] > > The attached article was published on Monday 8/7/00 by the Wall > Street Journal, and is so far off base as to be laughable. > > Hopefully, the Journal will act responsibly in this matter and issue > a formal retraction an apology, or at least launch some spin control > on some of the more major fabrications. > > For some reason the laws of physics do not apply to some technology > (of course when you break Federal law, breaking the laws of physics > is no big deal). > > Let me say again... TEMPEST (at least according to THOUSANDS of pages > of government documents I have) deals with the "Shielding, Bonding, > Grounding, and Filtering" of equipment processing classified > materials. > > It DOES NOT involve eavesdropping equipment or methods, but instead > involves the technology used to protect against "compromising > emissions". I can direct you to dozens of government documents > regarding TEMPEST which explain in GREAT detail what it is (and is > not) all about. > > What the ridiculous article in the WSJ rants on about is actually > known as "Raster Analysis and Identification" or RAID and is > something that can be performed within VERY limited distances by > equipment found in most high school and college electronics labs. > However, note that these are VERY LIMITED distance... not hundreds of > feet... but inches (if your lucky). > > Anybody who has formal experience in TSCM knows how to perform a RAID > analysis, and it is something that is is done to evaluate wide band > or repetitive signals that can not be otherwise identified. > > Sad... Really Sad... > > -jma > > > > PS: If your interested in information about what TEMPEST is (and is > not) then check out the following tutorials on the subject matter: > > http://www.tscm.com/TSCM101tempest.html > > http://www.tscm.com/TSCM101antprot.html > > http://www.tscm.com/TSCM101video3.html > > > > > >http://interactive.wsj.com/articles/SB965597027984161252.htm > > > >'Tempest' Program Addresses Pentagon > >Worries Over Computer-Screen Spying > >By MICHAEL J. MCCARTHY > >Staff Reporter of THE WALL STREET JOURNAL > > > > > >When most computer users worry about privacy in the digital age, they wonder > >who's reading their e-mail or watching where they go online. But inside the > >U.S. government, security officials have a much greater fear: Is someone > >with the right surveillance equipment tuning in to what is on their computer > >monitors from a nearby office, or a floor below or even across the street? > > > >It can be done through thin air -- no phone lines needed. Everyone's > >video-display terminal emits unique radio-frequency waves that can be > >isolated and captured with a "directional" antenna focused on a particular > >computer or room. Those signals can then be amplified with fairly > >inexpensive equipment and reconstructed to show precisely what is on your > >screen. > > > >Letter by letter, a sales proposal, an R&D report or a note to a lawyer can > >be captured from as far away as several hundred yards. > > > >Aside from scientists' demonstrations and one televised stunt in England in > >the 1980s, instances of this kind of computer surveillance haven't come to > >light. > > > >Seeking Spies > > > >But U.S. military and intelligence agencies have been concerned since at > >least the 1980s, and maybe earlier, about what they call in official > >documents "compromising emanations" from computers. The Department of > >Defense operates a classified program known as Tempest, under which it is > >designing and acquiring technology to defend against computer-screen > >surveillance, according to defense contractors and ex-military officials. > >The government is looking for protective materials and anti-surveillance > >monitoring tools that can keep foreign spies from collecting stray signals > >from computers in defense labs or U.S. embassies. > > > >A cottage industry of mostly small companies has quietly emerged to market > >such protective equipment. The main buyers are U.S. agencies and > >government-approved contractors. The official specifications for such > >equipment are classified. > > > >But people involved in this shadowy trade say that it is possible that > >nonapproved corporations also are acquiring the technology -- or making it > >for themselves, as the ingredients and designs aren't particularly esoteric. > >And while suppliers all say they sell only defensive equipment, some of them > >concede that their products could easily be adjusted to do offensive > >surveillance. > > > >NSA Endorsements > > > >Some large companies are also jumping into this cloak-and-dagger market. On > >its Web site, Siemens AG, the German engineering and electronics giant, > >advertises several "emission-proof PCs," including its Tempest Deskbook and > >Tempest PC-DZ0. (www.ad.siemens.de/ tempest/html_76/ emission.htm) > > > >The secretive National Security Agency, the government's main > >communications-intelligence organization, has listed 18 companies on its Web > >site, including Motorola Inc., whose computer-protection equipment or > >testing services meet government standards. An NSA spokeswoman, however, > >refuses in a telephone interview to answer questions on the subject, saying > >the only information available is on the bare-bones Web page. > > > >While it shops for computer-protection devices, the military is trying to > >make sure that other potential buyers are thwarted. Codex Data Systems Inc. > >has marketed over the Internet a scanner with which you can check whether a > >VDT, once shielded, is still leaking radio waves strong enough for snoops to > >pick up. The Army has begun buying the $20,000 units, according to the > >company. But Codex also says that it has agreed to a Pentagon request that > >it halt sales to anyone else. > > > >Fearing the dissemination of this kind of equipment, the U.S. government has > >banned its sale abroad without a license. Last summer, the Federal Bureau of > >Investigation arrested a man in Virginia, who has since been sentenced to > >prison for trying to export a computer-monitor surveillance system. > > > >Legal Uncertainties > > > >The legality of spying on someone's VDT from afar is far from clear. States > >have anti-eavesdropping laws that may apply but which vary widely, from > >highly permissive to very restrictive. > > > >Federal criminal law specifically bars intercepting and disclosing "any > >wire, oral or electronic communication." That rules out using a radio > >receiver to eavesdrop on someone's cell-phone call. But the federal law > >doesn't contemplate computer surveillance through the air and may not bar > >it, legal scholars say. Courts haven't yet had a chance to examine the > >question. > > > >"Typing to yourself is not a 'communication,' which requires two parties," > >says Michael Froomkin, a University of Miami law professor who studies > >privacy and computers. "It's a real open question." > > > >Some engineers and security experts say the threat of computer-screen spying > >has been overblown. They argue that there has been an explosion of devices, > >from PCs to cell phones, all emitting oceans of radio-frequency waves, which > >makes it harder to pinpoint the relatively weak radio waves from a single > >computer. > > > >While technically feasible, the whole exercise of retrieving signals > >covertly, from vans parked outside offices, or otherwise, could be costly > >and difficult, these skeptics add. It would be simpler in the corporate > >context, for example, to bribe a janitor or a disloyal employee to > >infiltrate the company and nab coveted data, according to this view. > > > >Capturing the contents of a computer screen is a surprisingly rudimentary > >process. Wim van Eck, a Dutch research scientist, laid out the specifics as > >far back as 1985, in an article in Computers & Security, a technical > >journal. One of his conclusions: "If no preventive measures are taken, > >eavesdropping on a video-display unit is possible at several hundreds of > >meters distance, using only a normal black-and-white TV receiver, a > >directional antenna and an antenna amplifier." > > > >In a computer, some of the most powerful radiation emanates from the > >monitor, a cathode-ray tube in which electron guns fire streams of electrons > >more than 60 times a second to produce the images displayed. That > >bombardment produces wave frequencies, some of which overlap with the > >familiar VHF and UHF television bands. > > > >In short, the invisible, information-bearing radio waves from a monitor are > >remarkably similar to a broadcast TV signal. A spy's scanner need only tune > >in the waves and process them line by line to replicate the image on the > >original screen. > > > >Mr. van Eck did a little high-tech grandstanding 15 years ago, bringing > >along a crew from British Broadcasting Corp. to film him as he used an > >antenna-equipped van to snoop on computers inside buildings in London. The > >BBC featured the caper on a show called "Tomorrow's World," but Mr. van Eck > >didn't reveal any of the information he had viewed. > > > >At the time, his demonstration was seen as an oddity. Desktop computers > >weren't yet fixtures in most offices or homes, processing everything from > >personal bank records to corporate secrets. > > > >Tempest Expands > > > >Concern was growing in the U.S. military, though, which stepped up its > >Tempest program in the mid-1980s, according to defense contractors and > >ex-military people. The Pentagon took steps such as building "secure > >compartmentalized information facilities," or SCIFs: whole rooms wrapped in > >screening made of copper and other metals. Elsewhere, individual military > >computers and monitors were similarly sheathed. The term Tempest is believed > >to be an abbreviation for "transient electromagnetic pulse standard." The > >"standard" refers to the level at which the military estimates computers can > >safely "leak" radio waves and remain undetectable to snooping antennas. > > > >Lately, private companies are cropping up to sell the government things such > >as portable tents, which shield computer equipment and can be quickly > >pitched and dismantled. BEMA Inc., based in Manassas, Va., sold more than 25 > >of the tents last year, mostly to the State Department and defense agencies, > >says president Robert E. Thomas, a former Army computer specialist. The > >tents, which run $30,000 each and up, are made of highly conductive fabric, > >plated with copper and nickel. This material diminishes the strength of > >unintended computer emissions. > > > >Mr. Thomas says he expects to sell even more tents this year, including a > >fresh order for 10 from the State Department's Bureau of Diplomatic > >Security. A spokesman for the bureau, which protects U.S. embassies > >world-wide, confirms that it ordered BEMA tents but will say only that > >information about their use is classified. > > > >Air Force Maj. Joe Wassel, Defense Secretary William Cohen's military > >assistant for communications, confirms that the Pentagon has "purchased BEMA > >products" but won't comment further. > > > >The Army signed a contract with Codex Data Systems 18 months ago to acquire > >"under a dozen" of the Nanuet, N.Y., company's DataScan Tempest Monitoring > >Systems, says Codex's Mr. Jones. The system, which alerts users to > >potentially compromising signals from VDTs, employs a receiver that > >resembles a ham radio and an electronic box the size of a cigarette carton, > >called a convertor, which reconstructs signals. It also includes a four-foot > >arrow-shaped aerial of the sort used by amateur radio operators. > > > >Mr. Jones says that this hardware is intended to be used defensively. But > >"it could also be used offensively," meaning to spy on other people's > >computers, he adds. > > > >The Army, Mr. Jones says, told him it wanted to test his system at the White > >Sands Missile Range in New Mexico. Strikingly, the Army also asked him not > >to sell the equipment to anyone else, until it completes its testing, he > >adds. Mr. Jones says he agreed, in hopes that the Army will become a steady > >customer. > > > >Officials at the White Sands range refer inquires about the DataScan system > >to Maj. William Bigelow, an Army spokesman at the Pentagon, who declines to > >comment. > > > >In the meantime, Codex still has information about the DataScan system on an > >old Web site. Mr. Jones says the site has drawn inquiries from security > >directors at large U.S. corporations, which he declines to name, and from > >companies in China. Mr. Jones says he ignores all of these inquiries. > > > >Little Corporate Knowledge > > > >Mr. Jones's account of corporate curiosity notwithstanding, relatively few > >U.S. companies outside of defense-contractor circles appear to know much > >about the threat of computer-monitor surveillance or the government's > >Tempest program. > > > >Louis Gnecco, president of Tempest Inc., in Herndon, Va., which supplies > >government agencies with equipment to test shielding, as well as testing > >services, says that over the years, corporate-security directors have > >occasionally contacted him about his wares. "They say, 'If you think my > >computer can be read from across the street, then show me.' And I have to > >say, 'That's a classified demonstration.' " > > > >U.S. law enforcement is on the prowl for people who try to evade criminal > >restrictions on shipping equipment overseas that could be used for either > >computer surveillance or protection against it. Such equipment is > >specifically mentioned in a 1992 federal regulation that lists export > >restrictions on U.S. weaponry, including ballistic missiles, tanks and > >howitzers. > > > >An FBI Sting > > > >In what is apparently the first case of its kind, the FBI in July of last > >year arrested Shalom Shaphyr, an Israeli citizen who was in the U.S. under a > >business visa, for attempting to export a monitoring system that could be > >used to spy on computers. An informant told the FBI that Mr. Shaphyr was in > >Virginia, hunting for the equipment on behalf of the Vietnamese government, > >according to an FBI affidavit filed in the U.S. district court in > >Alexandria, Va. > > > >With that tip, the FBI and U.S. Customs Service launched a sting operation. > >After meeting with an undercover FBI agent posing as a > >surveillance-equipment salesman, Mr. Shaphyr agreed to pay $30,000 for > >"computer-intercept equipment," according to the FBI affidavit. He completed > >shipping papers, dishonestly labeling the gear as "video-reception test > >equipment," with a value of about $1,500, the affidavit said. > > > >After pleading guilty to attempting to export defense equipment without a > >license, the 54-year-old Mr. Shaphyr was sentenced to 15 months in federal > >prison in January. According to the affidavit, he told the undercover agent > >that the monitoring equipment "would be used in an urban environment to view > >computer screens in buildings and offices without the knowledge or consent > >of the computer users." > > > >Write to Michael J. McCarthy at mike.mccarthy@w... > > > =================================================================== > Everybody's into computers... Who's into yours?Å > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Lizard, The Other White Meat > =================================================================== > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1184 From: James M. Atkinson, Comm-Eng Date: Wed Aug 9, 2000 6:20pm Subject: Re: List Demographics (Confession is good for the soul) Very well stated. TSCM Specialists CATCH spies, HUNT spies, TRACK spies, STUDY spies, and eventually STOP spies... period. -jma At 7:08 PM -0700 8/9/00, Pesach Lattin wrote: > No offense, but I don't care what a specialist you are, I don't want >you possessing anything that could, in theory, infringe on MY rights of >privacy. Here in the United States we are very protective of our privacy, >because we see (no offense to those who don't live here) how the rest of the >world lives, without these laws. > > Right now, we don't have laws that protect our privacy in instances of >a camera, and we have every sicko and their dog taking pictures of our >children as they get dressed in the local GAP. You might CLAIM to be an >expert, but I don't want to have to create ANOTHER agency to monitor the >so-called 'experts'/wannabe-spy to make sure they aren't selling these >devices to every joe who wants to listen to their neighbors love-making >sessions. > > Most TCSM experts have gotten along VERY well without possessing these >devices. Anyone who argues otherwise is just interested in playing with the >cool toys and pretending to be Inspector Gadget. It's the job of Law >Enforcement to use and possess these items in the United States -- not >self-proclaimed heroes. > >---------------------------------------------------------------- >Pesach Lattin, Computer Crime Specialist >Voice Mail: (914) 818-3727 Fax: (240) 337-8339 > >Webmaster, Federal Law Enforcement Officers Association >HQ: ph: (717) 938-2300 fax: (717) 932-2262 >Visit our website @ http://www.fleoa.org >---------------------------------------------------------------- >----- Original Message ----- >From: Miguel Puchol >To: >Sent: Wednesday, August 09, 2000 4:01 PM >Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > > > > > > > Since a bug can't really be used for anything but bugging someone, and > > since > > > private citizens don't have any legitimate recourse to bugging, it's > > illegal to > > > possess one. > > > > It could be used for learning, training, advance knowledge, etc. by > > legitimate TSCM specialists. I don't see anything ilegitimate in these. > > > > Mike > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1185 From: James M. Atkinson, Comm-Eng Date: Wed Aug 9, 2000 6:59pm Subject: Something to ponder... In the United States we have something magical called civil forfeiture. Simply put if you use something (such as a bug) directly or indirectly to commit a crime then the government can seize it and everything associated with it. Now I don't want to start a thread about how unfair the law is or is not, but instead want to point out that the POSSESSION of even ONE bug could cause you to loose every piece of equipment, your house, your vehicles, your tools and so on. The burden of proof could be on YOU to prove the equipment was innocently used, and YOU would have to prove that both you (and the equipment) is innocent. I would also point out that the law "loosely" authorizes the use of force to stop a felony from being committed (ahem) -jma At 7:08 PM -0700 8/9/00, Pesach Lattin wrote: > No offense, but I don't care what a specialist you are, I don't want >you possessing anything that could, in theory, infringe on MY rights of >privacy. Here in the United States we are very protective of our privacy, >because we see (no offense to those who don't live here) how the rest of the >world lives, without these laws. > > Right now, we don't have laws that protect our privacy in instances of >a camera, and we have every sicko and their dog taking pictures of our >children as they get dressed in the local GAP. You might CLAIM to be an >expert, but I don't want to have to create ANOTHER agency to monitor the >so-called 'experts'/wannabe-spy to make sure they aren't selling these >devices to every joe who wants to listen to their neighbors love-making >sessions. > > Most TCSM experts have gotten along VERY well without possessing these >devices. Anyone who argues otherwise is just interested in playing with the >cool toys and pretending to be Inspector Gadget. It's the job of Law >Enforcement to use and possess these items in the United States -- not >self-proclaimed heroes. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1186 From: Rocco Rosano Date: Wed Aug 9, 2000 7:22pm Subject: Re: List Demographics (Confession is good for the soul) et al, The whole idea behind TSCM (Technical Surveillance "Countermeasures") is to help maintain and secure the right of a "reasonable expectation of privacy" and to protect the nation (the citizens and their government) from those that would exploit our freedoms. It is a "countermeasures" program that has the mission to neutralize the unreasonable intrusion posed by clandestine or covert use of technology in violation of the law; or with the intent to further some criminal enterprise or inflict commercial injury. It is counterproductive (in direct opposition) in the mission of TSCM to engage in the use of methods, practices, equipment or procedures (MPEP - AKA: MO) that are (in themselves) a threat to the "reasonable expectation of privacy." If TSCM needs to engage or employ MPEP/MO that would otherwise be unethical, questionable or illegal - and the necessity is reasonable - there are established procedures through our legal system to accomplish those end. Otherwise, the professional ethics of TSCM mandates we do it by the numbers, pursuant to established law. That may not be easy, but it is the challenge. I do not contribute (on the list) very often; but on this theme I will make an exception. We must not confuse TSCM with commercial intelligence or research and collection programs. TSCM is always, without question, an aggressive detection and neutralization program that actively COUNTERS hostile commercial intelligence or research and collection activities that threaten the client or principal. Rocco Rosano Reynoldsburg, Ohio Pesach Lattin wrote: > No offense, but I don't care what a specialist you are, I don't want > you possessing anything that could, in theory, infringe on MY rights of > privacy. Here in the United States we are very protective of our privacy, > because we see (no offense to those who don't live here) how the rest of the > world lives, without these laws. > > Right now, we don't have laws that protect our privacy in instances of > a camera, and we have every sicko and their dog taking pictures of our > children as they get dressed in the local GAP. You might CLAIM to be an > expert, but I don't want to have to create ANOTHER agency to monitor the > so-called 'experts'/wannabe-spy to make sure they aren't selling these > devices to every joe who wants to listen to their neighbors love-making > sessions. > > Most TCSM experts have gotten along VERY well without possessing these > devices. Anyone who argues otherwise is just interested in playing with the > cool toys and pretending to be Inspector Gadget. It's the job of Law > Enforcement to use and possess these items in the United States -- not > self-proclaimed heroes. > > ---------------------------------------------------------------- > Pesach Lattin, Computer Crime Specialist > Voice Mail: (914) 818-3727 Fax: (240) 337-8339 > > Webmaster, Federal Law Enforcement Officers Association > HQ: ph: (717) 938-2300 fax: (717) 932-2262 > Visit our website @ http://www.fleoa.org > ---------------------------------------------------------------- > ----- Original Message ----- > From: Miguel Puchol > To: > Sent: Wednesday, August 09, 2000 4:01 PM > Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > > > > > > Since a bug can't really be used for anything but bugging someone, and > > since > > > private citizens don't have any legitimate recourse to bugging, it's > > illegal to > > > possess one. > > > > It could be used for learning, training, advance knowledge, etc. by > > legitimate TSCM specialists. I don't see anything ilegitimate in these. > > > > Mike > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 1187 From: James M. Atkinson, Comm-Eng Date: Wed Aug 9, 2000 11:48pm Subject: WE ARE OUT OF OIL WE ARE OUT OF OIL There are a lot of folks that can't understand how we ran out of oil here in the USA. Well, here's the answer: It's simple......... nobody bothered to check the oil. Didn't know we were getting low. And of course the reason for that is geographical. All the oil is in Texas and Oklahoma, and all the dipsticks are in Washington, D.C. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1188 From: Steve Uhrig Date: Thu Aug 10, 2000 7:56am Subject: Happy birthday to Marty Best wishes to our friend Marty Kaiser on this, the anniversary of his natal day. Another year bites the dust. Hope you see many more Marty, and that they are full of health and happiness. Live long and prosper. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1189 From: James M. Atkinson, Comm-Eng Date: Thu Aug 10, 2000 9:17am Subject: Re: Happy birthday to Marty Marty, Happy Birthday, and best wishes. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1190 From: Miguel Puchol Date: Thu Aug 10, 2000 10:37am Subject: Re: List Demographics (Confession is good for the soul) With one final question I will go back to lurk mode: In the U.S., is it then illegal for a TSCM specialist (or anyone else) to possess any kind of equipment that can tune to non-public bands and demodulate audio (and/or data)? For example, your average scanning receiver. This ARE devices that can, in theory, infringe one's right to privacy. To me, in some aspects, more dangerous than most bugs, as you don't have to plant them. I understand in many states it is illegal even to possess a scanner or have one in the car. Mike ----- Original Message ----- From: "James M. Atkinson, Comm-Eng" To: Sent: Thursday, August 10, 2000 1:20 AM Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > Very well stated. > > TSCM Specialists CATCH spies, HUNT spies, TRACK spies, STUDY spies, > and eventually STOP spies... period. > > -jma > > > At 7:08 PM -0700 8/9/00, Pesach Lattin wrote: > > No offense, but I don't care what a specialist you are, I don't want > >you possessing anything that could, in theory, infringe on MY rights of > >privacy. Here in the United States we are very protective of our privacy, > >because we see (no offense to those who don't live here) how the rest of the > >world lives, without these laws. > > > > Right now, we don't have laws that protect our privacy in instances of > >a camera, and we have every sicko and their dog taking pictures of our > >children as they get dressed in the local GAP. You might CLAIM to be an > >expert, but I don't want to have to create ANOTHER agency to monitor the > >so-called 'experts'/wannabe-spy to make sure they aren't selling these > >devices to every joe who wants to listen to their neighbors love-making > >sessions. > > > > Most TCSM experts have gotten along VERY well without possessing these > >devices. Anyone who argues otherwise is just interested in playing with the > >cool toys and pretending to be Inspector Gadget. It's the job of Law > >Enforcement to use and possess these items in the United States -- not > >self-proclaimed heroes. > > > >---------------------------------------------------------------- > >Pesach Lattin, Computer Crime Specialist > >Voice Mail: (914) 818-3727 Fax: (240) 337-8339 > > > >Webmaster, Federal Law Enforcement Officers Association > >HQ: ph: (717) 938-2300 fax: (717) 932-2262 > >Visit our website @ http://www.fleoa.org > >---------------------------------------------------------------- > >----- Original Message ----- > >From: Miguel Puchol > >To: > >Sent: Wednesday, August 09, 2000 4:01 PM > >Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > > > > > > > > > > > Since a bug can't really be used for anything but bugging someone, and > > > since > > > > private citizens don't have any legitimate recourse to bugging, it's > > > illegal to > > > > possess one. > > > > > > It could be used for learning, training, advance knowledge, etc. by > > > legitimate TSCM specialists. I don't see anything ilegitimate in these. > > > > > > Mike > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > >=================================================== TSKS > > > =================================================================== > Everybody's into computers... Who's into yours?Å > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Lizard, The Other White Meat > =================================================================== > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1191 From: Jay Coote Date: Thu Aug 10, 2000 10:57am Subject: Re: Test transmitters? In the US there are 40 CB channels for AM/SSB use in the 27 Mhz band. Self-styled "freebanders" have leaked out, and are now beginning to infect the 28 MHz hamband. No license is required for CB here. There is also FRS (Family Radio Service); 13 or so channels in 465 MHz; power limited to a few hundred MW and 2.5 deviation. In the US there is also a "new" band around 218 Mhz for low-powered 1-way devices. This band is channelized and as consumer equpment begins to show up, these channels should probably be added to the "list". Jay Coote Los Angeles > Do you guys still have 27Mhz CB? It's dead here. We only had 9 ch licensed, > not 40. I still have a licence and listen to the SSB skip. > > Andy > ZRAJ7795 since 1980 > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1192 From: Pesach Lattin Date: Thu Aug 10, 2000 2:10pm Subject: Re: List Demographics (Confession is good for the soul) That is done state-by-state. Federal law allows the listening of all bands, from what I understand. Some states don't allow it in the car, because of the people who follow police cars. ---------------------------------------------------------------- Pesach Lattin, Computer Crime Specialist Voice Mail: (914) 818-3727 Fax: (240) 337-8339 Webmaster, Federal Law Enforcement Officers Association HQ: ph: (717) 938-2300 fax: (717) 932-2262 Visit our website @ http://www.fleoa.org ---------------------------------------------------------------- ----- Original Message ----- From: Miguel Puchol To: Sent: Thursday, August 10, 2000 8:37 AM Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > With one final question I will go back to lurk mode: > In the U.S., is it then illegal for a TSCM specialist (or anyone else) to > possess any kind of equipment that can tune to non-public bands and > demodulate audio (and/or data)? For example, your average scanning receiver. > This ARE devices that can, in theory, infringe one's right to privacy. To > me, in some aspects, more dangerous than most bugs, as you don't have to > plant them. > I understand in many states it is illegal even to possess a scanner or have > one in the car. > > Mike > > ----- Original Message ----- > From: "James M. Atkinson, Comm-Eng" > To: > Sent: Thursday, August 10, 2000 1:20 AM > Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > > > > Very well stated. > > > > TSCM Specialists CATCH spies, HUNT spies, TRACK spies, STUDY spies, > > and eventually STOP spies... period. > > > > -jma > > > > > > At 7:08 PM -0700 8/9/00, Pesach Lattin wrote: > > > No offense, but I don't care what a specialist you are, I don't want > > >you possessing anything that could, in theory, infringe on MY rights of > > >privacy. Here in the United States we are very protective of our privacy, > > >because we see (no offense to those who don't live here) how the rest of > the > > >world lives, without these laws. > > > > > > Right now, we don't have laws that protect our privacy in instances > of > > >a camera, and we have every sicko and their dog taking pictures of our > > >children as they get dressed in the local GAP. You might CLAIM to be an > > >expert, but I don't want to have to create ANOTHER agency to monitor the > > >so-called 'experts'/wannabe-spy to make sure they aren't selling these > > >devices to every joe who wants to listen to their neighbors love-making > > >sessions. > > > > > > Most TCSM experts have gotten along VERY well without possessing > these > > >devices. Anyone who argues otherwise is just interested in playing with > the > > >cool toys and pretending to be Inspector Gadget. It's the job of Law > > >Enforcement to use and possess these items in the United States -- not > > >self-proclaimed heroes. > > > > > >---------------------------------------------------------------- > > >Pesach Lattin, Computer Crime Specialist > > >Voice Mail: (914) 818-3727 Fax: (240) 337-8339 > > > > > >Webmaster, Federal Law Enforcement Officers Association > > >HQ: ph: (717) 938-2300 fax: (717) 932-2262 > > >Visit our website @ http://www.fleoa.org > > >---------------------------------------------------------------- > > >----- Original Message ----- > > >From: Miguel Puchol > > >To: > > >Sent: Wednesday, August 09, 2000 4:01 PM > > >Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > > > > > > > > > > > > > > > Since a bug can't really be used for anything but bugging someone, > and > > > > since > > > > > private citizens don't have any legitimate recourse to bugging, it's > > > > illegal to > > > > > possess one. > > > > > > > > It could be used for learning, training, advance knowledge, etc. by > > > > legitimate TSCM specialists. I don't see anything ilegitimate in > these. > > > > > > > > Mike > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > >=================================================== TSKS > > > > > > =================================================================== > > Everybody's into computers... Who's into yours?Å > > =================================================================== > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 http://www.tscm.com/ > > Gloucester, MA 01931-8008 jmatk@tscm.com > > =================================================================== > > Lizard, The Other White Meat > > =================================================================== > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1193 From: (unknown) Date: Thu Aug 10, 2000 11:09am Subject: Re: List Demographics (Confession is good for the soul) f@f...> Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: 8bit From: DrPepper Correct! And some of these restrictive states, exempt ham radio operators. It's kinda flaky state by state. In any case, I am now contemplating the chore of installing several ham radios and scanners in my new (to me) auto. Not a real easy task for me. Ron C. =================================================== Pesach Lattin wrote: > That is done state-by-state. Federal law allows the listening of all bands, > from what I understand. > > Some states don't allow it in the car, because of the people who follow > police cars. > ---------------------------------------------------------------- > Pesach Lattin, Computer Crime Specialist > Voice Mail: (914) 818-3727 Fax: (240) 337-8339 > > Webmaster, Federal Law Enforcement Officers Association > HQ: ph: (717) 938-2300 fax: (717) 932-2262 > Visit our website @ http://www.fleoa.org > ---------------------------------------------------------------- > ----- Original Message ----- > From: Miguel Puchol > To: > Sent: Thursday, August 10, 2000 8:37 AM > Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > > > With one final question I will go back to lurk mode: > > In the U.S., is it then illegal for a TSCM specialist (or anyone else) to > > possess any kind of equipment that can tune to non-public bands and > > demodulate audio (and/or data)? For example, your average scanning > receiver. > > This ARE devices that can, in theory, infringe one's right to privacy. To > > me, in some aspects, more dangerous than most bugs, as you don't have to > > plant them. > > I understand in many states it is illegal even to possess a scanner or > have > > one in the car. > > > > Mike > > > > ----- Original Message ----- > > From: "James M. Atkinson, Comm-Eng" > > To: > > Sent: Thursday, August 10, 2000 1:20 AM > > Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > > > > > > > Very well stated. > > > > > > TSCM Specialists CATCH spies, HUNT spies, TRACK spies, STUDY spies, > > > and eventually STOP spies... period. > > > > > > -jma > > > > > > > > > At 7:08 PM -0700 8/9/00, Pesach Lattin wrote: > > > > No offense, but I don't care what a specialist you are, I don't > want > > > >you possessing anything that could, in theory, infringe on MY rights of > > > >privacy. Here in the United States we are very protective of our > privacy, > > > >because we see (no offense to those who don't live here) how the rest > of > > the > > > >world lives, without these laws. > > > > > > > > Right now, we don't have laws that protect our privacy in > instances > > of > > > >a camera, and we have every sicko and their dog taking pictures of our > > > >children as they get dressed in the local GAP. You might CLAIM to be an > > > >expert, but I don't want to have to create ANOTHER agency to monitor > the > > > >so-called 'experts'/wannabe-spy to make sure they aren't selling these > > > >devices to every joe who wants to listen to their neighbors love-making > > > >sessions. > > > > > > > > Most TCSM experts have gotten along VERY well without possessing > > these > > > >devices. Anyone who argues otherwise is just interested in playing with > > the > > > >cool toys and pretending to be Inspector Gadget. It's the job of Law > > > >Enforcement to use and possess these items in the United States -- not > > > >self-proclaimed heroes. > > > > > > > >---------------------------------------------------------------- > > > >Pesach Lattin, Computer Crime Specialist > > > >Voice Mail: (914) 818-3727 Fax: (240) 337-8339 > > > > > > > >Webmaster, Federal Law Enforcement Officers Association > > > >HQ: ph: (717) 938-2300 fax: (717) 932-2262 > > > >Visit our website @ http://www.fleoa.org > > > >---------------------------------------------------------------- > > > >----- Original Message ----- > > > >From: Miguel Puchol > > > >To: > > > >Sent: Wednesday, August 09, 2000 4:01 PM > > > >Subject: Re: [TSCM-L] List Demographics (Confession is good for the > soul) > > > > > > > > > > > > > > > > > > > Since a bug can't really be used for anything but bugging someone, > > and > > > > > since > > > > > > private citizens don't have any legitimate recourse to bugging, > it's > > > > > illegal to > > > > > > possess one. > > > > > > > > > > It could be used for learning, training, advance knowledge, etc. by > > > > > legitimate TSCM specialists. I don't see anything ilegitimate in > > these. > > > > > > > > > > Mike > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > > > TSCM-L Technical Security Mailing List > > > > "In a multitude of counselors there is strength" > > > > > > > > To subscribe to the TSCM-L mailing list visit: > > > > http://www.onelist.com/community/TSCM-L > > > > > > > > or email your subscription request to: > > > > subTSCM-L@t... > > > >=================================================== TSKS > > > > > > > > > =================================================================== > > > Everybody's into computers... Who's into yours?Å > > > =================================================================== > > > James M. Atkinson Phone: (978) 381-9111 > > > Granite Island Group Fax: > > > 127 Eastern Avenue #291 http://www.tscm.com/ > > > Gloucester, MA 01931-8008 jmatk@tscm.com > > > =================================================================== > > > Lizard, The Other White Meat > > > =================================================================== > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- - - - Dr Pepper, Also known as Ron Cheshire, WB6GKI, 35.37.26N/117.40.02W China Lake, CA USA ----------------------------- 90 miles West of Death Valley, 200 miles North of LAX ----------------------------- DrPepper@i... nannycams@i... - - - 1194 From: James M. Atkinson, Comm-Eng Date: Thu Aug 10, 2000 11:21am Subject: Re: List Demographics (Confession is good for the soul) Federal law does not prohibit the usage of a Radar Detector, however; they are contraband in some states and cities. Remember, there are state laws, and there are federal laws. Try no to run afoul of either. -jma t 12:10 PM -0700 8/10/00, Pesach Lattin wrote: >That is done state-by-state. Federal law allows the listening of all bands, >from what I understand. > >Some states don't allow it in the car, because of the people who follow >police cars. >---------------------------------------------------------------- >Pesach Lattin, Computer Crime Specialist >Voice Mail: (914) 818-3727 Fax: (240) 337-8339 > >Webmaster, Federal Law Enforcement Officers Association >HQ: ph: (717) 938-2300 fax: (717) 932-2262 >Visit our website @ http://www.fleoa.org >---------------------------------------------------------------- >----- Original Message ----- >From: Miguel Puchol >To: >Sent: Thursday, August 10, 2000 8:37 AM >Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > > > > With one final question I will go back to lurk mode: > > In the U.S., is it then illegal for a TSCM specialist (or anyone else) to > > possess any kind of equipment that can tune to non-public bands and > > demodulate audio (and/or data)? For example, your average scanning >receiver. > > This ARE devices that can, in theory, infringe one's right to privacy. To > > me, in some aspects, more dangerous than most bugs, as you don't have to > > plant them. > > I understand in many states it is illegal even to possess a scanner or >have > > one in the car. > > > > Mike > > > > ----- Original Message ----- > > From: "James M. Atkinson, Comm-Eng" > > To: > > Sent: Thursday, August 10, 2000 1:20 AM > > Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > > > > > > > Very well stated. > > > > > > TSCM Specialists CATCH spies, HUNT spies, TRACK spies, STUDY spies, > > > and eventually STOP spies... period. > > > > > > -jma > > > > > > > > > At 7:08 PM -0700 8/9/00, Pesach Lattin wrote: > > > > No offense, but I don't care what a specialist you are, I don't >want > > > >you possessing anything that could, in theory, infringe on MY rights of > > > >privacy. Here in the United States we are very protective of our >privacy, > > > >because we see (no offense to those who don't live here) how the rest >of > > the > > > >world lives, without these laws. > > > > > > > > Right now, we don't have laws that protect our privacy in >instances > > of > > > >a camera, and we have every sicko and their dog taking pictures of our > > > >children as they get dressed in the local GAP. You might CLAIM to be an > > > >expert, but I don't want to have to create ANOTHER agency to monitor >the > > > >so-called 'experts'/wannabe-spy to make sure they aren't selling these > > > >devices to every joe who wants to listen to their neighbors love-making > > > >sessions. > > > > > > > > Most TCSM experts have gotten along VERY well without possessing > > these > > > >devices. Anyone who argues otherwise is just interested in playing with > > the > > > >cool toys and pretending to be Inspector Gadget. It's the job of Law > > > >Enforcement to use and possess these items in the United States -- not > > > >self-proclaimed heroes. > > > > > > > >---------------------------------------------------------------- > > > >Pesach Lattin, Computer Crime Specialist > > > >Voice Mail: (914) 818-3727 Fax: (240) 337-8339 > > > > > > > >Webmaster, Federal Law Enforcement Officers Association > > > >HQ: ph: (717) 938-2300 fax: (717) 932-2262 > > > >Visit our website @ http://www.fleoa.org > > > >---------------------------------------------------------------- > > > >----- Original Message ----- > > > >From: Miguel Puchol > > > >To: > > > >Sent: Wednesday, August 09, 2000 4:01 PM > > > >Subject: Re: [TSCM-L] List Demographics (Confession is good for the >soul) > > > > > > > > > > > > > > > > > > > Since a bug can't really be used for anything but bugging someone, > > and > > > > > since > > > > > > private citizens don't have any legitimate recourse to bugging, >it's > > > > > illegal to > > > > > > possess one. > > > > > > > > > > It could be used for learning, training, advance knowledge, etc. by > > > > > legitimate TSCM specialists. I don't see anything ilegitimate in > > these. > > > > > > > > > > Mike =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1195 From: Date: Thu Aug 10, 2000 3:59am Subject: 'Have a dino-mite birthday!' by Karen Morse - from Pat Edwards Hello! Pat Edwards has just sent you a greeting card from Bluemountain.com. You can pick up your personal message here: http://www3.bluemountain.com/cards/box4292r/rtj3abyjzfjwxm.htm Your card will be available for the next 90 days This service is 100% FREE! :) Have a good day and have fun! ________________________________________________________________________ Accessing your card indicates agreement with Blue Mountain's Website Rules: http://www.bluemountain.com/home/WebsiteRules.html Send FREE Blue Mountain greeting cards to friends and family http://www.bluemountain.com 1196 From: James M. Atkinson, Comm-Eng Date: Thu Aug 10, 2000 2:21pm Subject: CIA 'Bonds' With 'Get Smart' CIA 'Bonds' With 'Get Smart' Reuters 10:25 a.m. Aug. 10, 2000 PDT LANGLEY, Va. -- An old black shoe displayed like a jewel on purple velvet in a glass case is the star of an exhibition that opened on Thursday at CIA headquarters. Befitting the spy agency atmosphere, where nothing is as it appears, the shoe is a telephone in disguise -- the first one used by actor Don Adams as fictional operative Maxwell Smart in the 1960s U.S. spy-spoof television series, Get Smart. The loafer is perched upside down with its sole removed to show off the listening device in the heel and a brass circle that lifts to reveal the microphone in the toe. The shoe is one of Danny Biederman's prized possessions. He has more than 4,000 pieces of memorabilia from spy movies and television shows, of which about 400 are in the CIA exhibition. "I was looking for this since the '60s, since I was a little kid," he said about the shoe, which he obtained through the original propmaker for an undisclosed price, though he admitted it was more than $1,000. The shoe phone is not the only footwear to be featured in a glass case. A pair of size 12, black loafers worn by actor Sean Connery as British agent James Bond in the 1983 movie Never Say Never Again is in an 007 section. But the 46-year-old Los Angeles screenwriter's absolute favorite is a gadget from the 1960s U.S. television show The Man From U.N.C.L.E.: a communication device disguised as a pack of cigarettes, which he sought for years and found only by chance. "To (the previous owner) it was a piece of junk, to me this should have been in a museum," he said. The CIA's Fine Arts Commission, which obtains exhibitions and artwork to display at the U.S. spy headquarters in Langley, Virginia, heard about Biederman's collection and called him about the possibility of mounting a show. Biederman said his initial reaction, when he heard the message on his telephone answering machine from the CIA, was that someone was playing a practical joke. "I came home from a meeting that day and on my answering machine it was just this 'Hi, could you please call the CIA,' and I thought I don't believe this, is this real or not?" "Many people who worked here were inspired to work here by these shows," said Rachel Apple, a member of the CIA's Fine Arts Commission. "Having the fictional and the real together provides very interesting comparisons and contrasts, it really makes you think about how we do our work versus what we see on TV." Many items he gets free or for a small price, but some are prohibitively expensive, like the bowler hat with a built-in blade worn -- and thrown -- by the manservant Odd Job in the 1964 Bond movie Goldfinger. Biederman wanted it, but it was out of his reach when it sold at auction for $110,000. From the 1960s television series The Avengers, actor Patrick Macnee's bowler hat and a pair of actress Diana Rigg's leather pants are on display. While most of Biederman's finds are from older television shows and movies, he does have some items from the more recent. For example, his collection includes the glasses worn by the swinging Sixties spy "Austin Powers" in the 1997 movie Austin Powers: International Man of Mystery. There is even a "jet itinerary" from Powers' plane that simply states: "6 p.m., orgy." From the 1996 Mission Impossible movie, the collection includes a stick of "two-in-one gum" -- with the half-red, half-green wrapper that actor Tom Cruise used as an explosive. His interest is forever stamped on his children, with all three named after fictional spies. The youngest is a son named Bond. The CIA exhibition is not open to the public. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1197 From: Date: Thu Aug 10, 2000 10:54am Subject: University to review FBI wiretap program WASHINGTON, Aug 10 (Reuters) - A U.S. Justice Department official said on Thursday he expected a university will be selected within 10 days to begin the long-awaited review of the FBI's Internet-wiretap system called Carnivore, which has drawn criticism for potential privacy abuses. Assistant Attorney General Stephen Colgate outlined the steps in the process calling for independent experts at a major university to review the software and hardware of the system, which has raised concern of privacy groups and some lawmakers. The system allows the FBI to intercept the e-mails of a criminal suspect among the flood of other data passing through an Internet service provider. FBI officials maintain the court-authorised wiretaps will only focus on criminal suspects who are targets of an investigation. But privacy advocates and some members of Congress fear the system may cast too wide a net, encompassing private information about legal activities and leading to potential abuses. Colgate told reporters he expects a total of nine universities will be contacted. Three have been so far. He declined to identify the universities. After getting reaction from privacy and law enforcement groups, one will be recommended to Attorney General Janet Reno. He said the university will be selected partly based on its technical expertise in computers and its ability to conduct a ``thorough and timely'' review. Reno said the university experts will have ``total access'' to any information they need to conduct their review. Colgate said that after completing their review he expects the university experts to make their report public so that comments can be received. Then a team of four Justice Department officials and one FBI official, chaired by Colgate, will review the report and the comments, and pass on their recommendations to Reno, who will have final say in the matter, he said. ``My hope is that we will have this whole process wrapped up by December,'' Colgate said. 1198 From: James M. Atkinson, Comm-Eng Date: Thu Aug 10, 2000 3:19pm Subject: DRDO official suspected of spying DRDO official suspected of spying http://www.timesofindia.com/090800/09mdel10.htm By A Staff Reporter NEW DELHI: The Delhi Police are reportedly questioning an official of the Defence Research and Development Organisation on suspicion that he may be part of a larger espionage ring. Senior police officers, however, refused to comment. The police had reportedly picked him up while he was leaving the Pakistan high commission. He had a computer floppy in his possession, whose contents are now being examined. Police sources said the official was picked up on the basis of a tip-off by intelligence agencies that had been tailing him for a while. ``He had been put under surveillance only because they had some information on such activities and had suspected that he was involved,'' an officer said. The officer said they were investigating reports that the DRDO officer had several relatives in Pakistan and whether that had any bearing on his activities. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1199 From: Miguel Puchol Date: Thu Aug 10, 2000 3:22pm Subject: Re: List Demographics (Confession is good for the soul) Still, receivers, and even more so specialist ones used in TSCM (I like R&S personally) could be used for potentially illegal activities. I think that a receiver's primary objective is to intercept communications, just like bugs' primary objective is collection of intelligence - but still it doesn't make them illegal. Scanners are available to the general public, and I think that in irresponsible hands a scanner can be much more dangerous than most bugs, as they don't need to be planted. Mike ----- Original Message ----- From: "Pesach Lattin" To: Sent: Thursday, August 10, 2000 9:10 PM Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > That is done state-by-state. Federal law allows the listening of all bands, > from what I understand. > > Some states don't allow it in the car, because of the people who follow > police cars. > ---------------------------------------------------------------- > Pesach Lattin, Computer Crime Specialist > Voice Mail: (914) 818-3727 Fax: (240) 337-8339 > > Webmaster, Federal Law Enforcement Officers Association > HQ: ph: (717) 938-2300 fax: (717) 932-2262 > Visit our website @ http://www.fleoa.org > ---------------------------------------------------------------- > ----- Original Message ----- > From: Miguel Puchol > To: > Sent: Thursday, August 10, 2000 8:37 AM > Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > > > > With one final question I will go back to lurk mode: > > In the U.S., is it then illegal for a TSCM specialist (or anyone else) to > > possess any kind of equipment that can tune to non-public bands and > > demodulate audio (and/or data)? For example, your average scanning > receiver. > > This ARE devices that can, in theory, infringe one's right to privacy. To > > me, in some aspects, more dangerous than most bugs, as you don't have to > > plant them. > > I understand in many states it is illegal even to possess a scanner or > have > > one in the car. > > > > Mike > > > > ----- Original Message ----- > > From: "James M. Atkinson, Comm-Eng" > > To: > > Sent: Thursday, August 10, 2000 1:20 AM > > Subject: Re: [TSCM-L] List Demographics (Confession is good for the soul) > > > > > > > Very well stated. > > > > > > TSCM Specialists CATCH spies, HUNT spies, TRACK spies, STUDY spies, > > > and eventually STOP spies... period. > > > > > > -jma > > > > > > > > > At 7:08 PM -0700 8/9/00, Pesach Lattin wrote: > > > > No offense, but I don't care what a specialist you are, I don't > want > > > >you possessing anything that could, in theory, infringe on MY rights of > > > >privacy. Here in the United States we are very protective of our > privacy, > > > >because we see (no offense to those who don't live here) how the rest > of > > the > > > >world lives, without these laws. > > > > > > > > Right now, we don't have laws that protect our privacy in > instances > > of > > > >a camera, and we have every sicko and their dog taking pictures of our > > > >children as they get dressed in the local GAP. You might CLAIM to be an > > > >expert, but I don't want to have to create ANOTHER agency to monitor > the > > > >so-called 'experts'/wannabe-spy to make sure they aren't selling these > > > >devices to every joe who wants to listen to their neighbors love-making > > > >sessions. > > > > > > > > Most TCSM experts have gotten along VERY well without possessing > > these > > > >devices. Anyone who argues otherwise is just interested in playing with > > the > > > >cool toys and pretending to be Inspector Gadget. It's the job of Law > > > >Enforcement to use and possess these items in the United States -- not > > > >self-proclaimed heroes. > > > > > > > >---------------------------------------------------------------- > > > >Pesach Lattin, Computer Crime Specialist > > > >Voice Mail: (914) 818-3727 Fax: (240) 337-8339 > > > > > > > >Webmaster, Federal Law Enforcement Officers Association > > > >HQ: ph: (717) 938-2300 fax: (717) 932-2262 > > > >Visit our website @ http://www.fleoa.org > > > >---------------------------------------------------------------- > > > >----- Original Message ----- > > > >From: Miguel Puchol > > > >To: > > > >Sent: Wednesday, August 09, 2000 4:01 PM > > > >Subject: Re: [TSCM-L] List Demographics (Confession is good for the > soul) > > > > > > > > > > > > > > > > > > > Since a bug can't really be used for anything but bugging someone, > > and > > > > > since > > > > > > private citizens don't have any legitimate recourse to bugging, > it's > > > > > illegal to > > > > > > possess one. > > > > > > > > > > It could be used for learning, training, advance knowledge, etc. by > > > > > legitimate TSCM specialists. I don't see anything ilegitimate in > > these. > > > > > > > > > > Mike > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > > > TSCM-L Technical Security Mailing List > > > > "In a multitude of counselors there is strength" > > > > > > > > To subscribe to the TSCM-L mailing list visit: > > > > http://www.onelist.com/community/TSCM-L > > > > > > > > or email your subscription request to: > > > > subTSCM-L@t... > > > >=================================================== TSKS > > > > > > > > > =================================================================== > > > Everybody's into computers... Who's into yours?Å > > > =================================================================== > > > James M. Atkinson Phone: (978) 381-9111 > > > Granite Island Group Fax: > > > 127 Eastern Avenue #291 http://www.tscm.com/ > > > Gloucester, MA 01931-8008 jmatk@tscm.com > > > =================================================================== > > > Lizard, The Other White Meat > > > =================================================================== > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1200 From: James M. Atkinson, Comm-Eng Date: Thu Aug 10, 2000 3:22pm Subject: Reward offered for information on missing State Department computer Reward offered for information on missing State Department computer http://www.vny.com/cf/News/upidetail.cfm?QID=108801 Wednesday, 9 August 2000 19:41 (ET) Reward offered for information on missing State Department computer By ELI J. LAKE WASHINGTON, Aug. 9 (UPI) -- After a fruitless five-month investigation to find a State Department laptop computer that likely contained highly classified information, the FBI is posting a $25,000 reward for any information leading to its recovery. In a statement issued Wednesday, department spokesman Richard Boucher identified the missing computer as a "black Dell laptop with a five-digit serial number ending in the letter 'Q' located on a sticker in the back near the TSKS ports." He said the FBI reward is meant to entice a potential thief who stole the machine in order to sell it, as opposed to a spy who would steal it for its secrets. "If people thought they were just swiping a laptop or pawning it or fencing it or whatever, it doesn't really matter to them what's on it, and this reward might induce them to look at the laptop and turn it over," Boucher said. In March, a routine inventory check of State Department laptops revealed that 18 of the computers were missing. After a preliminary investigation, Secretary of State Madeleine Albright said she was furious about the breach in security and ordered a thorough investigation within the department's headquarters in May. The computer belonged to the department's Bureau of Intelligence and Research, which is responsible for diplomatic espionage. When news of the disappearance was first reported, anonymous State Department officials were quoted as saying the laptop contained highly sensitive information on U.S. spying methods and sources. While the FBI's investigation is ongoing, so far none of the bureau's leads has turned up the laptop. In recent months the FBI has asked Washington-area pawn shops for information they might have on the missing computer. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1201 From: James M. Atkinson, Comm-Eng Date: Thu Aug 10, 2000 4:55pm Subject: The Tempest Surrounding Tempest [Debunking the Myth] http://www.forbes.com/tool/html/00/aug/0810/mu9.htm Forbes.com: 8/10/00 - News: The Tempest Surrounding Tempest August 10, 2000 The Tempest Surrounding Tempest By Arik Hesseldahl NEW YORK. 4:30 PM EDT-Echelon, Carnivore and Tempest. The names could come from the script of a techo-thriller movie. But to people who follow the intelligence community, they're real, and the cause for lots of speculative theories. Echelon is said to be the global telecommunications surveillance network run by the National Security Agency. Carnivore is an Internet eavesdropping tool used by the FBI. Then there's Tempest. With Tempest technology, the story goes, the information displayed on one's computer screen can be read from across the street by capturing the radiating emanations from the monitor itself using special equipment and a directional antenna. But the reality behind Tempest is much more mundane, according to government documents and people familiar with it. While the story behind Tempest is grounded in a kernel of truth, it has been so distorted in the retelling that it has become something of an urban myth. A front-page report in The Wall Street Journal on Aug. 7 attempted to get to the heart of Tempest technology, but instead perpetuated more bad information. For example, the Journal wasn't aware that one of the primary sources for the story, Frank Jones, of Codex Data Systems, pleaded guilty in 1997 to one federal count of possession of illegal surveillance devices, and is widely considered disreputable by several people in the surveillance industry. (A spokesman for Dow Jones Co., parent of the Journal, had no comment on the story.) Moreover, Codex says it no longer makes the "DataScan Tempest Monitoring System" that the Journal says the U.S. Army had contracted to buy at $20,000 each. Terrance Kawles, Codex's vice president and general counsel, insists, however, that the Army had at one time expressed in an interest in buying the system. (Full disclosure: Forbes.com published an item about Codex's Tempest device in 1998.) Steve Uhrig, president of SWS Security, a U.S.-based firm that manufactures surveillance and intelligence gathering equipment for governments and the military, says he is extremely skeptical about Jones. He says that, in his opinion, Jones gives the entire electronic surveillance industry a bad image by making "outrageous claims about nonexistent products." "Jones has been a spy groupie for about 17 or 18 years," he says. "I don't think he's ever manufactured a product or provided a legitimate service. He makes it difficult for legitimate companies who tell the truth about their product's capabilities." Jones says Codex stopped selling DataScan devices after finding there was little market for them. And while he says he doesn't have any of the devices left, he could, given the right components, still demonstrate his technique. Nor does he claim to have any expertise in Tempest technology. "We're now strictly involved with software development," he says. "Tempest is old news." The Journal story also left readers under the impression that the full content of a document displayed on a computer screen can be captured from several hundred yards away. That's not correct, says James Atkinson, president and chief engineer of the Granite Island Group, a security consulting firm in Gloucester, Mass. Atkinson is a telecommunications engineer who specializes in the field of technical surveillance countermeasures (TSCM), the practice of finding hidden bugs and wiretaps. A former U.S. Air Force officer, he says he is one of few people working in the private sector who have graduated from the NSA's Tempest School at Lackland Air Force Base outside San Antonio, Tex. Tempest is not a spying technology, he says, and anyone who says otherwise is either lying or misinformed. It is a classified government standard meant to prevent spying on computer monitors and other equipment from afar. Breaking down the acronym that is its name gives a hint: Telecommunications Electronics Material Protected from Emanating Spurious Transmissions, the key word being "protected," of course. And while its exact details are a secret, much about Tempest technology can be gleaned by reading between the lines of mind-numbing government documents with titles like "Requirements for the control of electromagnetic interference characteristics of subsystems and equipment." Another document, this one a military handbook entitled "Radio Frequency Shielded Enclosures," describes "Tempest shielding" as being designed to "reduce the conducted and radiated emissions from within the sensitive environment to an undetectable level outside the shielded enclosure in uncontrolled areas." Although sneaking a peak at what's on someone else's computer screen from a distance is theoretically possible, Atkinson says, it is very difficult to do, extremely costly and impractical. Atkinson says that government buildings where sensitive information is processed are designed with the idea of minimizing the leakage of emanations from computer monitors and other equipment. And while the government does take the threat of eavesdropping on these emanations seriously, picking up a signal from a monitor is "extraordinarily difficult." A would-be spy must either be really close to the monitor with the right equipment, or have a very sensitive, very large antenna and very favorable conditions when at a greater distance. "If you're doing this in a demonstration in a hotel room, from only a few feet away, it's a slam dunk," he explains. "But once you're beyond anything more a dozen feet, it gets really dicey. While technically you can do it, you'd need antennas that are 30 feet long and about 50 feet wide." He once calculated the size of the antenna that would be required, to pick up monitor emanations from a computer inside the White House while outside on the street. He estimates it would take an antenna 45 feet tall and 30 feet wide extended into the air about 30 feet. The antenna would have to be mounted on the trailer of the semi truck filled with complex signals intelligence equipment, parked right outside on Pennsylvania Ave. "Can you see someone doing that outside the White House without attracting attention?" he asks. "I don't think the Secret Service would be amused." But Jones maintains it can still be done using off-the-shelf components. "There are people who would have you believe that you need millions of dollars worth of equipment and years of training to do this, and I'm telling you that's a load of crap," he says. "This stuff is not rocket science. The fact is I get e-mails from college students who say they are building these scanners in the lab." And even without the practical limitations presented by first getting close enough to the signal and obtaining the right antenna and equipment, there's also the problem of finding the right signal. "There are so many competing electromagnetic signals from the surrounding environment that picking any one of them out is practically impossible, especially from any distance," says Uhrig of SWS. And even under the best of conditions, the odds are high against actually reproducing a full video image of exactly what is on the target monitor, says Atkinson. "If you have a big enough antenna, and point it at a computer that is not properly shielded, bonded and grounded, theoretically, you could pick up fragments of information that are useful from an intelligence point of view," he says. But he believes the government's Tempest standards are meant to act like a document-shredder of the air, only better. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== From: George Shaw Date: Fri Aug 9, 2002 6:42am Subject: RE: Re: Training - Another view Steve Agree 100% but where, if any, are the independent training courses being run and by whom? George Shaw Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... 5944 From: Steve Fulton Date: Thu Aug 8, 2002 4:36pm Subject: Re: God Bless America At 16:20 08/08/2002 -0400, James M. Atkinson wrote: >How Budweiser handled those who laughed at those who died >on the 11th of September, 2001... Hardly verifiable. No names, no store names, just anonymous employees of major corporation. This story has the whiff of pre-anniversary propaganda. James, I've come to expect better from you. -- Steve 5945 From: James M. Atkinson Date: Fri Aug 9, 2002 2:22pm Subject: Counter Measures Audio Amplifier I have just uploaded a new Counter Measures Audio Amplifier that list members may be interested in. It is a good general purpose audio amplifier, and would be good for anyone checking telephone lines for bugs. The next shipments of the amplifier are scheduled for late September, so get your order in soon so we can reserve one for you. http://www.tscm.com/cm100.html -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5946 From: Chrisman McSpadden Date: Fri Aug 9, 2002 5:40pm Subject: Training's other view I would first off like to Thank Mr. Uhr for his view point. It is absolutely true that training, run by a manufacture, is at the very least an attempt to expose students to their complete line of products and their fine corporate genre. However you have not received training at REI, several years ago you sat through product demostrations that were designed to be exactly as you have described, basic knowledge of the products and a sales tool. Two and half years ago I was hired to outline and establish REI's Center for Technical Security and its training goals, none of which believe it or not involve sales. The first course developed was designed to give a basic concept of technical threats and security and expose students to our entire line of products, knowledge wrapped up in a sales pitch to use your vernacular, and as you say it works. The second course however, the one that I pointed out in my first post, is designed to provide a student with the procedural concepts of running a TSCM investigation. During this course it is the security structure of an organization that we evaluate and I could care less what equipment is used and have had students bring in a varity of their own gear. Matter of fact we encourage it and strangly enough none of them ran out and threw their gear away to buy ours, poor salesmanship I guess. Spectrum analysis, space domaining, and comparative analysis are evaluation processes that are most definitely non-specific to the manufacture of the equipment. Inputs and outputs change but superheterodyning is superheterodyning. What we do with the data is what is important. How capably the box collects the data may alter how we conduct operations but the basic procedures remain pretty much unchanged. It is the procedures and the importance of the technician's knowledge of the security structure and environment he works in that we stress. That is how I presented training in the DoD school and how I presented training in other government schools as well. As you said there are alot of newcomers on this list but no matter where they obtain their training someone will profit. No matter where they get their gear someone will profit. The bottom line is that they truly begin to understand the complexity of this job and that the moment they stop learning is when they get beat by the opposition. No offense was taken and my 15 years of counterintelligence and technical counterintelligence investigation conducted all over the world can hardly compare to your 30 years but please forgive me I also am still learning. In closing, and I am sure Mr. Uhr you will roll your eyes, my goal is not sales, it is truly the education of technicians...... But enough is enough so I will go back to lurking....... _________________________________________________________________ Chat with friends online, try MSN Messenger: http://messenger.msn.com 5947 From: Date: Fri Aug 9, 2002 10:00pm Subject: H A P P Y B I R T H D A Y ! Birthday Reminder Marty Kaiser Saturday, August 10, 2002 May you enjoy the blessings of health, prosperity and happiness! 5948 From: Matt Paulsen Date: Sat Aug 10, 2002 0:52pm Subject: Two laptop computers missing from U.S. Central Command; one had classified information http://story.news.yahoo.com/news?tmpl=story&u=/ap/20020807/ap_wo_en_po/us_mi ssing_laptops_2 "The good news is that they were in a single room that is tightly controlled, where access is tightly controlled," Myers said. Uh.. Gen. Myers, one question - What's the bad news? ----------------------------------- AP World Politics Two laptop computers missing from U.S. Central Command; one had classified information Wed Aug 7, 2:38 PM ET TAMPA, Florida - Two laptop computers are missing from the military command center coordinating the war in Afghanistan ( news - web sites), including one with classified information, officials said Wednesday. The Air Force Office of Special Investigations is investigating the computers' possible theft from U.S. Central Command, office spokesman Maj. Mike Richmond said. The computers disappeared Thursday. Central Command would not release further details, such as what information was stored on the computers and what office or person was responsible for them. Gen. Richard Myers, chairman of the Joint Chiefs of Staff, told a news conference at the Pentagon ( news - web sites) that one of the computers contained classified information. He said it was too soon to say whether the computers were simply missing or stolen. "The good news is that they were in a single room that is tightly controlled, where access is tightly controlled," Myers said. Central Command, led by Army Gen. Tommy Franks, is responsible for U.S. security interests in the Middle East. It oversees the continuing military operation in Afghanistan and has been deeply involved in planning for a widely expected U.S. effort to topple Iraqi leader Saddam Hussein ( news - web sites). Just this week, a government audit was released that showed the Justice Department ( news - web sites) lost 400 computers last year. Most belonged to the FBI ( news - web sites) and the Immigration and Naturalization Service, and many had classified information. The agencies said poor tracking of equipment was likely to blame, not theft. 5949 From: James M. Atkinson Date: Sat Aug 10, 2002 1:16pm Subject: Re: H A P P Y B I R T H D A Y ! Happy Birthday Marty!!! -jma At 3:00 AM -0400 8/10/02, MACCFound@a... wrote: >Birthday Reminder Marty Kaiser Saturday, August 10, 2002 > >May you enjoy the blessings of health, prosperity and happiness! -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5950 From: Matt Paulsen Date: Sat Aug 10, 2002 5:05pm Subject: Advanced driving instructors in Seattle, WA? Received an email from a doctor in Seattle looking for an advanced driving instructor to do some onsite instruction for a patient for evasive driving techniques. If there is an instructor in the Seattle region please contact me with your contact information and I'll pass it along. PS - I've already sent these referrals, which others on the list may or may not be aware of, but which some may be interested in. Pro Drive 1940 N. Victory Blvd Portland, OR 97217 (503) 285-4449 prodrive@p... http://www.prodrive.net BSR, Inc. PO Box 190 Summit Point, WV 25446 USA Tel: (304) 725-6512 / Fax: (304) 728-7124 http://www.bsr-inc.com/index.html 5951 From: William Knowles Date: Sat Aug 10, 2002 9:30pm Subject: Re: Advanced driving instructors in Seattle, WA? On Sat, 10 Aug 2002, Matt Paulsen wrote: > Received an email from a doctor in Seattle looking for an advanced > driving instructor to do some onsite instruction for a patient for > evasive driving techniques. If there is an instructor in the > Seattle region please contact me with your contact information and > I'll pass it along. While not specifically training for the Seattle area, I'd recommend Tony Scotti's SecurityDriver.com as a possiblity for your client, and they will be happy to come to the client for training. http://www.securitydriver.com Cheers! William Knowles wk@c... P.S. I will be forwarding this message off to a friend at Scaletta Moloney who might know someone right in the Seattle area. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 5952 From: James M. Atkinson Date: Sat Aug 10, 2002 9:48pm Subject: Re: Advanced driving instructors in Seattle, WA? I would recommend Tony Scotti as well. -jma At 9:30 PM -0500 8/10/02, William Knowles wrote: >On Sat, 10 Aug 2002, Matt Paulsen wrote: > >> Received an email from a doctor in Seattle looking for an advanced >> driving instructor to do some onsite instruction for a patient for >> evasive driving techniques. If there is an instructor in the >> Seattle region please contact me with your contact information and >> I'll pass it along. > >While not specifically training for the Seattle area, I'd recommend >Tony Scotti's SecurityDriver.com as a possiblity for your client, and >they will be happy to come to the client for training. > >http://www.securitydriver.com > >Cheers! > >William Knowles >wk@c... > > >P.S. I will be forwarding this message off to a friend at Scaletta > Moloney who might know someone right in the Seattle area. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5953 From: alcook309 Date: Sat Aug 10, 2002 5:43pm Subject: UK Forum. This may be UK specific (as I live here), but it can also be looked at in a worldwide perspective. From the tone of some of the posts from UK practitioners (professional or not), it appears that there is a lack of direction, control and specific UK help and guidance. As a military practitioner, I am due to leave the RAF later this year to join the ranks of UK professionals. I too have suffered from the disjointed and sparse information as I attempt to learn all there is about my future industry. A small number of UK websites of companies offering multiple security services, with TSCM as a one liner in the list, are all that I have found. No one leader stands out as a centralised source of information and support for the UK industry. Recently, the posts on training have brought some positive responses. This is a good move. A focussing of resources to set-up a UK based programme. But should it end at training? What about pooling some of the wealth of experience and information that is undoubtedly locked up in some great professionals throughout the UK. Certain Black Hat and other Technical seminars in the US are perfect for getting people together with new ideas and ways that help the industry as a whole. Don't get me wrong. I'm not advocating hugging some trees and opening up your confidential files for all to see. I'm asking an open question as to the way we see our profession going. By setting up some UK forum or collective, we can police ourselves. Bring in the best, the talented and the up and coming. Exclude (or nurture) those who damage our image. Our image to industry is vitally important. We should protect it. There are many professional societies where networking and a professional collective gathering has brought integrity and respectability. A dislocated front confuses those who seek our help. Who can they trust? Who are the ones doing the right job, with the right training and the right equipment? I do not believe that such a society exists in the UK (or I wouldn't be writing this). I do not believe that a TSCM specific one exists in the US or even worldwide. There are many generalised societies such as ASIS (American Society for Industrial Security, with UK chapters), but this BB is the closest I have seen to a collective gathering (though I am a Borg fan, no Borg reference is intended. Indeed, I would not want to see us wearing tight leather clothes, with various technical equipment plugged in to our bodies, as we swaggered around a corporate office assimilating all the appliances!) I am not about to leap into the chairman's chair either! I just wish to open up a serious question that will hopefully bring in some intelligent and worthwhile debate. Who knows, maybe a British Society for Technical Security (BSTS) is exactly what is needed now to focus all of our energies, efforts and ideas? I look forward to your replies. Alan Cook 5954 From: James M. Atkinson Date: Sun Aug 11, 2002 6:22pm Subject: A Friend... A Friend... (A)ccepts you as you are! (B)elieves in "you" (C)alls you just to ! say "HI" (D)oesn't give up on you (E)nvisions the whole of you (even the unfinished parts) (F)orgives your mistakes (G)ives unconditionally (H)elps you (I)nvites you over (J)ust "be" with you (K)eeps you close at heart (L)oves you for who you are (M)akes a difference in your life (N)ever Judges (O)ffers support (P)icks you up (Q)uiets your fears (R)aises your spirits (S)ays nice things about you (T)ells you the truth when you need to hear it (U)nderstands you (V)alues you (W)alks beside you (X)-plains things you don't understand (Y)ells when you won't listen and (Z)aps you back to reality -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5955 From: James M. Atkinson Date: Mon Aug 12, 2002 10:29am Subject: A Trucker in Wisconsin As a trucker in Wisconsin stops for a red light, a blonde catches up. She jumps out of her car, runs up to his truck, and knocks on the door. The trucker lowers the window, and she says "Hi, my name is Heather and you are losing some of your load." The trucker ignores her and proceeds down the street. When the truck stops for another red light, the girl again catches up . She jumps out of her car, runs up and knocks on the door. Again, the trucker lowers the window. As if they've never spoken, the blonde says brightly, "Hi, my name is Heather, and you are losing some of your load!" Shaking his head, the trucker ignores her again and continues down the street. At the third red light, the same thing happens again. All out of breath, the blonde gets out of her car, runs up, knocks on the truck door. The trucker lowers the window. Again she says "Hi, my name is Heather, and you are losing some of your load!" When the light turns green, the trucker revs up and races to the next light. When he stops this time, he hurriedly gets out of the truck, and runs back to the blonde. He knocks on her window, and as she lowers it, he says "Hi, my name is Kevin, it is winter , the street is icy and I'm driving a SALT TRUCK!!" -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5956 From: Date: Mon Aug 12, 2002 3:40pm Subject: Tempest on a Notebook Perhaps I'm on the wrong mailing list, but I was looking for at least some information on who makes Tempest shielded portables, or whether some company shields regular retail portables like Sony or Dell. I won't trouble this list again with the question, but given the credentials of the people here, someone should be able to answer, to the list or by private email. Thanks. >Over on www.eskimo.com/~joelm/tempestintro.html under "TEMPEST Urban >Folklore" it says that one item of folklore is; > >>LCD displays on laptops eliminate the risks of TEMPEST attacks. Maybe, >>maybe not. The technology behind LCD monitors versus typical CRT monitors >>may somewhat reduce the risk, but I wouldn't bet my life on it. There >>have been anecdotal accounts of noisy laptop screens being partially >>displayed on TVs. If laptops were emanation proof, I seriously doubt >>there would be TEMPEST standard portables on the market. > >What needs to be done to make a standard notebook computer TEMPEST proof, >or to at least enhance prevention of such an attack? Presumably its VGA >circuitry (eg my Sony Vaio has a VGA out port, and there is no way of >disabling VGA output) will be emitting radiation which can be picked up a >short distance from the computer. Joel's page mentions Faraday cages, >metal tapes / conductive sprays, spark-gap generator to throw up radio "chaff". > >Alternatively, who makes TEMPEST shielded portables, are these hideously >expensive compared to standard machines, what means do they achieve the >result by? in one of the articles it mentions to use shielded cables >inside your computer, ferrite toroids etc, but with the compactness of a >notebook those measures look impossible. 5957 From: kondrak Date: Mon Aug 12, 2002 5:07pm Subject: Re: Tempest on a Notebook Go to google, punch in "tempest certified notebook" and theres a huge list. or click here: http://www.google.com/search?num=30&meta=hl%3D%26lr%3D&q=tempest+certified+notebook At 21:40 8/12/02 +0100, you wrote: >Perhaps I'm on the wrong mailing list, but I was looking for at least some >information on who makes Tempest shielded portables, or whether some >company shields regular retail portables like Sony or Dell. I won't trouble >this list again with the question, but given the credentials of the people >here, someone should be able to answer, to the list or by private email. >Thanks. 5958 From: James M. Atkinson Date: Mon Aug 12, 2002 6:21pm Subject: United States Marine Corps TSCM Job Descriptions United States Marine Corps (USMC) Enlisted Job Descriptions MOS 0212, Technical Surveillance Countermeasures (TSCM) Specialist (MSgt to Sgt)* a. Summary. Technical surveillance countermeasures trained and certified counterintelligence specialists are involved in all facets of planning and conducting tactical, strategic, and joint TSCM operations and activities. These activities are designed to locate, identify, and neutralize the threat of technical surveillance penetration of sensitive areas. These specialists are expected to possess a working knowledge of the techniques and equipment employed by foreign intelligence services and terrorist organizations for the technical penetration of spaces. These specialists normally perform as members of a CI TSCM sub-team or detachment; however, they may also perform duties in support of Naval Criminal Investigative Service; as a TSCM instructor at Ft Meade, MD; or as a TSCM representative to national level CI/investigative agencies. This MOS is to be assigned only as a skill designator MOS and will be assigned and voided only by the authority of the CMC (MM). b. Requirements/Prerequisites (1) Must hold primary MOS 0211. (2) Must be a sergeant or above. (3) Complete the Technical Surveillance Countermeasures Fundamentals Course and the Technical Surveillance Countermeasures Course (3C-ASI9L/244-ASI69). (4) Must have 36 months obligated service remaining upon completion of the TSCM Course. c. Duties. For a complete listing of duties and tasks, refer to MCO 3500.32, Intelligence Training and Readiness Manual. d. Related DOT Classification/DOT Code. None. e. Related Military Skill. Counterintelligence Specialist, 0211. Information Derived From MCO P1200.7V Part I and Part II. Current as of Nov 00 United States Marine Corps (USMC) Officer Job Descriptions See Explanation of Terms MOS 0215, Technical Surveillance Countermeasures (TSCM) Officer* a. Summary. Technical surveillance countermeasures trained and certified counterintelligence officers are involved in all facets of planning and conducting tactical, strategic, and joint TSCM operations and activities. These activities are designed to locate, identify, and neutralize the threat of technical surveillance penetration of sensitive areas. These officers are expected to possess a working knowledge of the techniques and equipment employed by foreign intelligence services and terrorist organizations for the technical penetration of spaces. These officers normally perform as members of a CI TSCM sub-team or detachment; however, they may also perform duties in support of Naval Criminal Investigative Service; as a TSCM instructor at Ft Meade, MD; or as a TSCM representative to national level CI/investigative agencies. This MOS is to be assigned as a skill designator MOS and voided only by the authority of the CMC (MM). b. Requirements/Prerequisites (1) Must hold primary MOS 0210. (2) Complete the Technical Surveillance Countermeasures Fundamentals Course and the Technical Surveillance Countermeasures Course (3C-ASI9L/244-ASI69). (3) Must have 16 months obligated service remaining upon completion of the TSCM Course. c. Duties. For a complete listing of duties and tasks, refer to MCO 3500.32 Part I, Part II, and Part III, Intelligence Training and Readiness Manual. d. Related DOT Classification/DOT Code. None. Information Derived From MCO P1200.7V Part 1. Current as of Nov 00 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 5959 From: Matt Paulsen Date: Tue Aug 13, 2002 0:25am Subject: GPS wristwatch http://www.wherifywireless.com/corp_home.htm ------------------------------------------ http://news.bbc.co.uk/2/hi/technology/2181469.stm Monday, 12 August, 2002, 07:48 GMT 08:48 UK Baby-sitting via satellite A child can lock the watch on their wrist By Alfred Hermida BBC News Online technology staff Satellite technology is being used in the US to keep track of children and offer peace of mind to parents. A wristwatch containing miniature Global Positioning System (GPS) technology has just gone on sale. The GPS Personal Locator developed by Silicon Valley company Wherify Wireless uses advances in satellite tracking and wireless technologies to allow parents to find their child within a minute. The hope is that a device like this one could act as either a deterrent to potential kidnappers, or at least aid police investigating a missing child case. Panic button The GPS Personal Locator allows parents to track a child's location and movements via the internet. "Let's say you have a seven-year-old who walks to school alone and they felt in danger. They could push one button on the watch and lock the device," said Wherify President Timothy Neher. The watch is designed to appeal to children "It will enable a consumer to locate this device, initially in the US, within 60 seconds or less," he told the BBC programme Go Digital. Designed around a wristwatch, the locator has a built-in pager and panic button for alerting the police. The device uses the same GPS technology that helps lost drivers or sailors find their way. 'Cool factor' The device is aimed at children between the ages of four and 12. "Kids think this watch is cool," said Mr Neher. "It's their first communication device, it's a watch, it's a pager, its a locator. There's a cool factor from what we are hearing from the children." I don't think we are selling the fear, I think we are giving parents peace of mind Timothy Neher, Wherify Wireless Parents can use the internet or phone to quickly identify their children's location within feet in about a minute. They are also able to constantly track a child 24 hours a day either by logging onto a computer and viewing aerial maps, or by calling Wherify's location centre. "If I had my five-year-old in downtown New York City at Christmas time, I want to just lock this on them and then when we are done shopping take it off," said Mr Neher. In the US, a child is reported missing every 42 seconds, according to official statistics. But Mr Neher denied his company are trading on parents' fears. "I don't think we are selling the fear, I think we are giving parents peace of mind," he said. Innovative uses All this technology does not come cheap. Wherify's GPS Personal Locator for Children has just gone on sale at a price of US$399.99, plus a monthly service charge of $25. Device aimed at children between four and 12 It is currently only available in the US although the company are developing a GSM model which could be used in the UK. Originally GPS receiver modules were large and bulky. But today the modules can be as small as a thumbnail. As GPS units shrink in size, more innovative uses of the technology will develop, say experts. Golf courses are already outfitting carts with GPS to help players measure distances between shots, car manufacturers are offering in-dash navigation and farmers are using the technology for precision mapping of crop yields. 5960 From: Fernando Martins Date: Tue Aug 13, 2002 2:48am Subject: RE: Tempest on a Notebook This is the Tempest site of Siemens, where you can find PC, notebook, LCD, CTR, scanner and printer http://www.ad.siemens.de/sitemp/index_76.htm This is the notebook http://www.ad.siemens.de/sitemp/html_76/zone1_noteb.htm Certifications: AMSG 788/784, zone 1/2 / BSI approval; Approved for "classified - top secret"; GS seal A project that uses Siemens Tempest "boxes": http://www.bsi.bund.de/fachthem/sina/descript/descript.htm The guys behind the project: http://www.secunet.com/ http://www.secunet.com/tol/sinavpn_e.pdf The good news is that it's all german technology without any US export regulations ;-) I worked in secunet and I'm friend of the manager for this (and other nice things)... So there goes the independent point of view eheheh FM > -----Original Message----- > From: mist@p... [mailto:mist@p...] > Sent: segunda-feira, 12 de Agosto de 2002 21:41 > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Tempest on a Notebook > > > Perhaps I'm on the wrong mailing list, but I was looking for > at least some > information on who makes Tempest shielded portables, or whether some > company shields regular retail portables like Sony or Dell. I > won't trouble > this list again with the question, but given the credentials > of the people > here, someone should be able to answer, to the list or by > private email. > Thanks. > > > >Over on www.eskimo.com/~joelm/tempestintro.html under > "TEMPEST Urban > >Folklore" it says that one item of folklore is; > > > >>LCD displays on laptops eliminate the risks of TEMPEST > attacks. Maybe, > >>maybe not. The technology behind LCD monitors versus > typical CRT monitors > >>may somewhat reduce the risk, but I wouldn't bet my life on > it. There > >>have been anecdotal accounts of noisy laptop screens being > partially > >>displayed on TVs. If laptops were emanation proof, I > seriously doubt > >>there would be TEMPEST standard portables on the market. > > > >What needs to be done to make a standard notebook computer TEMPEST > >proof, > >or to at least enhance prevention of such an attack? > Presumably its VGA > >circuitry (eg my Sony Vaio has a VGA out port, and there is > no way of > >disabling VGA output) will be emitting radiation which can > be picked up a > >short distance from the computer. Joel's page mentions > Faraday cages, > >metal tapes / conductive sprays, spark-gap generator to > throw up radio "chaff". > > > >Alternatively, who makes TEMPEST shielded portables, are these > >hideously > >expensive compared to standard machines, what means do they > achieve the > >result by? in one of the articles it mentions to use shielded cables > >inside your computer, ferrite toroids etc, but with the > compactness of a > >notebook those measures look impossible. > > > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> 4 DVDs Free +s&p Join Now > http://us.click.yahoo.com/pt6YBB/NXiEAA/RN.GAA> /kgFolB/TM > > > -------------------------------------------------------------- > -------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire > speed, the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > 5961 From: William Knowles Date: Tue Aug 13, 2002 4:02am Subject: Re: Tempest on a Notebook On Mon, 12 Aug 2002 Men in black helicopters forced mist@p... to write: > Perhaps I'm on the wrong mailing list, but I was looking for at > least some information on who makes Tempest shielded portables, or > whether some company shields regular retail portables like Sony or > Dell. I won't trouble this list again with the question, but given > the credentials of the people here, someone should be able to > answer, to the list or by private email. Thanks. The one group that I could recommend from associates is GSCS, Inc, formerly GRiD Government Systems. I should forwarn you, TEMPEST shielded laptops are not light, nor fast or cheap by any stretch of the imagination. http://www.grid.com/page4.html I have yet to see a company like Dell or Sony building TEMPEST shielded laptops from the factory. Retail prices might spook you, (no pun intended) you might want to look into MECO at: http://www.meco.org and tell Ira I said hello. Uncle Ira has all sorts of interesting govt surplus, and at one time, quite a few TEMPEST shielded products. You might just be happy with staying with your present computing setup and finding someone on the list that is a reseller of the BEMA TEMPEST tent, and hope that you have better air-conditioning remotely than I had for Blackhat/Defcon at the Embassy Suites Las Vegas, on Swenson. >> Over on www.eskimo.com/~joelm/tempestintro.html under "TEMPEST >> Urban Folklore" it says that one item of folklore is; Joel McNamara who I suspect is probably manning a fire line somewhere out west, has one of the most complete, unclassfied sites on the Internet, you really want to be looking at this part of his site. http://www.eskimo.com/~joelm/tempestsource.html Under TEMPEST Hardware & Consulting. Cheers! William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 5962 From: kondrak Date: Tue Aug 13, 2002 3:01am Subject: Re: GPS wristwatch I'm at a loss to know how the device, the size of a wristwatch transmits to the internet....is it very low power like a blackberry?, and what good would it be if the kid is inside a building, where the signal cant be heard. Whats the battery life? What prevents a kidnapper from removing the watch and throwing it in the trash? It's fluff....a NON solution.... At 22:25 8/12/02 -0700, you wrote: >http://www.wherifywireless.com/corp_home.htm > >------------------------------------------ >http://news.bbc.co.uk/2/hi/technology/2181469.stm > > >Monday, 12 August, 2002, 07:48 GMT 08:48 UK >Baby-sitting via satellite > >A child can lock the watch on their wrist > >By Alfred Hermida >BBC News Online technology staff > >Satellite technology is being used in the US to keep track of children and >offer peace of mind to parents. >A wristwatch containing miniature Global Positioning System (GPS) technology >has just gone on sale. > >The GPS Personal Locator developed by Silicon Valley company Wherify >Wireless uses advances in satellite tracking and wireless technologies to >allow parents to find their child within a minute. > >The hope is that a device like this one could act as either a deterrent to >potential kidnappers, or at least aid police investigating a missing child >case. > >Panic button > >The GPS Personal Locator allows parents to track a child's location and >movements via the internet. > >"Let's say you have a seven-year-old who walks to school alone and they felt >in danger. They could push one button on the watch and lock the device," >said Wherify President Timothy Neher. > > >The watch is designed to appeal to children > >"It will enable a consumer to locate this device, initially in the US, >within 60 seconds or less," he told the BBC programme Go Digital. > >Designed around a wristwatch, the locator has a built-in pager and panic >button for alerting the police. > >The device uses the same GPS technology that helps lost drivers or sailors >find their way. > >'Cool factor' > >The device is aimed at children between the ages of four and 12. > >"Kids think this watch is cool," said Mr Neher. > >"It's their first communication device, it's a watch, it's a pager, its a >locator. There's a cool factor from what we are hearing from the children." > > > >I don't think we are selling the fear, I think we are giving parents peace >of mind > >Timothy Neher, Wherify Wireless >Parents can use the internet or phone to quickly identify their children's >location within feet in about a minute. > >They are also able to constantly track a child 24 hours a day either by >logging onto a computer and viewing aerial maps, or by calling Wherify's >location centre. > >"If I had my five-year-old in downtown New York City at Christmas time, I >want to just lock this on them and then when we are done shopping take it >off," said Mr Neher. > >In the US, a child is reported missing every 42 seconds, according to >official statistics. But Mr Neher denied his company are trading on parents' >fears. > >"I don't think we are selling the fear, I think we are giving parents peace >of mind," he said. > >Innovative uses > >All this technology does not come cheap. Wherify's GPS Personal Locator for >Children has just gone on sale at a price of US$399.99, plus a monthly >service charge of $25. > > >Device aimed at children between four and 12 > >It is currently only available in the US although the company are developing >a GSM model which could be used in the UK. > >Originally GPS receiver modules were large and bulky. But today the modules >can be as small as a thumbnail. > >As GPS units shrink in size, more innovative uses of the technology will >develop, say experts. > >Golf courses are already outfitting carts with GPS to help players measure >distances between shots, car manufacturers are offering in-dash navigation >and farmers are using the technology for precision mapping of crop yields. > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5963 From: Date: Mon Aug 12, 2002 5:02pm Subject: Re: Tempest on a Notebook Check out this web site you will find what you need. http://www.2112systems.com/~joelm/tempestsource.html > Perhaps I'm on the wrong mailing list, but I was looking for at least some > information on who makes Tempest shielded portables, or whether some > company shields regular retail portables like Sony or Dell. I won't trouble > this list again with the question, but given the credentials of the people > here, someone should be able to answer, to the list or by private email. > Thanks. > > > >Over on www.eskimo.com/~joelm/tempestintro.html under "TEMPEST Urban > >Folklore" it says that one item of folklore is; > > > >>LCD displays on laptops eliminate the risks of TEMPEST attacks. Maybe, > >>maybe not. The technology behind LCD monitors versus typical CRT monitors > >>may somewhat reduce the risk, but I wouldn't bet my life on it. There > >>have been anecdotal accounts of noisy laptop screens being partially > >>displayed on TVs. If laptops were emanation proof, I seriously doubt > >>there would be TEMPEST standard portables on the market. > > > >What needs to be done to make a standard notebook computer TEMPEST proof, > >or to at least enhance prevention of such an attack? Presumably its VGA > >circuitry (eg my Sony Vaio has a VGA out port, and there is no way of > >disabling VGA output) will be emitting radiation which can be picked up a > >short distance from the computer. Joel's page mentions Faraday cages, > >metal tapes / conductive sprays, spark-gap generator to throw up radio "chaff". > > > >Alternatively, who makes TEMPEST shielded portables, are these hideously > >expensive compared to standard machines, what means do they achieve the > >result by? in one of the articles it mentions to use shielded cables > >inside your computer, ferrite toroids etc, but with the compactness of a > >notebook those measures look impossible. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > --------------------------------------------- This message was sent using Endymion MailMan. http://www.endymion.com/products/mailman/ 5964 From: Aimee Farr Date: Mon Aug 12, 2002 9:34pm Subject: RE: United States Marine Corps TSCM Job Descriptions > United States Marine Corps (USMC) > Enlisted Job Descriptions > > MOS 0212, Technical Surveillance Countermeasures (TSCM) Specialist > (MSgt to Sgt)* > > a. Summary. Technical surveillance countermeasures trained and > certified counterintelligence specialists are involved in all facets > of planning and conducting tactical, strategic, and joint TSCM > operations and ..... *snippy-snippy-snippy-snippy* ;) 11. SPIES OR SCOUTS. They should be sober, alert, healthy, and good looking. Stationed at intervals, depending on the nature of the terrain, before the battle and until it is over, they should keep both the enemy and their own units under observation to prevent any attack from ambush or any other hostile trick. 25. KEEPING THE POLISHED SURFACE OF THE WEAPONS FROM BEING SEEN BEFORE BATTLE. We find that Romans and almost all other peoples when observing each other's battle lines from a distance generally pick out the gloomy-looking line as more likely to win the battle than the one in gleaming armor. This common view is clearly wrong for, after the judgment of God, battle is decided by the leadership of the general and the morale of the troops. Be this as it may, the authorities say that if woods are hollows are found in the vicinity, the army should be concealed in them and not be visible to the enemy long enough so they will not be able to organize countermeasures; this would be until they are a mile or two away. If the ground is open and the air is clear, then the men should be trained not to wear their helmets but to carry them in their hands until very close to the enemy. If their shields are small, they should be carried on the chest to cover their mail coats, and their cloaks should be thrown over the shoulder pieces of the mail coat until the proper time. The points of their lances should also be hidden. In this way, then, from a distance our army will not shine at all. Finally, by presenting such an appearance, something our foes will also make use of, they will be impressed and even before the battle, will loose confidence. MAURICE, STRATEGIKON (George T. Dennis Trans.) 5965 From: Steve Uhrig Date: Tue Aug 13, 2002 7:55am Subject: Re: GPS wristwatch On 12 Aug 2002 at 22:25, Matt Paulsen wrote: > http://www.wherifywireless.com/corp_home.htm > http://news.bbc.co.uk/2/hi/technology/2181469.stm > Baby-sitting via satellite > A child can lock the watch on their wrist > Satellite technology is being used in the US to keep track of children > and offer peace of mind to parents. A wristwatch containing miniature > Global Positioning System (GPS) technology has just gone on sale. > The GPS Personal Locator developed by Silicon Valley company Wherify > Wireless uses advances in satellite tracking and wireless technologies > to allow parents to find their child within a minute. Don't get excited about this. This is a reseller of the Digital Angel/Mobiltrak vaporware scam which already has made its rounds in this country, scammed hundreds of potential investors, and been debunked repeatedly in the media by a number of persons including me. Some people will believe anything, even when it involves rewriting the laws of physics. These scammers hire PR agencies and send thousands of press releases to magazines and all over the media, who print it in their innocence and ignorance. Can't blame them; they need material and are only reporting what is supplied to them. You can, however, investigate independently, prove the scam, and supply your material to the same media who may or may not retract their original scam piece depending on their integrity. Investing in all these manportable consumer grade alleged GPS trackers is akin to getting involved with that poor guy in Nigeria whose dad was killed and has millions of dollars squirreled away he's willing to share with you if you'll only help him get it out of the country. Amongst others, here's one good article exposing the scam. There are dozens, but this one is the best: http://www.wired.com/wired/archive/7.10/spam.html The above article seems to only open in IE, not Netscape like they used to. When will people learn to test their sites with browsers other than IE? Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5966 From: kondrak Date: Tue Aug 13, 2002 0:34pm Subject: Re: Re: GPS wristwatch Yes indeed Steve...the laws of physics be dammed, give us your money.....I thought I'd smelled this before.... Having implemented wireless internet connectivity for some years now, I wanted to see if the yagi was mounted on the watch, or it used a flat panel...which I might add, either would make the tracking very directional...;) At 08:55 8/13/02 -0400, you wrote: >On 12 Aug 2002 at 22:25, Matt Paulsen wrote: > > > http://www.wherifywireless.com/corp_home.htm > > > http://news.bbc.co.uk/2/hi/technology/2181469.stm > > > Baby-sitting via satellite > > > A child can lock the watch on their wrist > > > Satellite technology is being used in the US to keep track of children > > and offer peace of mind to parents. A wristwatch containing miniature > > Global Positioning System (GPS) technology has just gone on sale. > > > The GPS Personal Locator developed by Silicon Valley company Wherify > > Wireless uses advances in satellite tracking and wireless technologies > > to allow parents to find their child within a minute. > >Don't get excited about this. > >This is a reseller of the Digital Angel/Mobiltrak vaporware scam >which already has made its rounds in this country, scammed hundreds >of potential investors, and been debunked repeatedly in the media by >a number of persons including me. > >Some people will believe anything, even when it involves rewriting >the laws of physics. These scammers hire PR agencies and send >thousands of press releases to magazines and all over the media, who >print it in their innocence and ignorance. Can't blame them; they >need material and are only reporting what is supplied to them. You >can, however, investigate independently, prove the scam, and supply >your material to the same media who may or may not retract their >original scam piece depending on their integrity. > >Investing in all these manportable consumer grade alleged GPS >trackers is akin to getting involved with that poor guy in Nigeria >whose dad was killed and has millions of dollars squirreled away he's >willing to share with you if you'll only help him get it out of the >country. > >Amongst others, here's one good article exposing the scam. There are >dozens, but this one is the best: > >http://www.wired.com/wired/archive/7.10/spam.html > >The above article seems to only open in IE, not Netscape like they >used to. When will people learn to test their sites with browsers >other than IE? > >Steve > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5967 From: Aimee Farr Date: Tue Aug 13, 2002 1:14pm Subject: MISSION IMPROBABLE http://leeclarke.com/mipages/mi.html Discusses the dangers of "fantasy planning" (Author also has an article out on the myth of panic in disasters, which I believe is of relevance to some here. Links from his main page.) ~Aimee 5968 From: Matt Paulsen Date: Tue Aug 13, 2002 2:26pm Subject: RE: Re: GPS wristwatch I was waiting for Steve's comment on this since I know he hates scammers as much as I do. I don't think these folks are related to Digital Angel, none of their executive staff names match, they don't appear to be resellers either, but rather totally separate manufacturers. The chipsets are based on SyChip - http://www.sychip.com/gps-module.html - and SiRF http://www.sirf.com/products-ss2t.html - where GPS data is transmitted via PCS and other landline networks (my guess being Sprint ala Thomas A. Gotuzzo, their sales guy being from there.) and will be US based only, ergo, no large bulk issues. But, as always, their equipment is not out on the market until September, 2002, and they are 'reserving orders' but not billing customers until a shipping product is sent, which is the law, but you know marketing. Steve, you should request a demo from them and find out if it changes your mind since it's hybridized, or perhaps you can tell us why this won't work either. With the resolution enhancements from the govt. for GPS around 2000ish, I'd like to know more about why couldn't become a valid item on the market. It really reminds me of RadioMail's wireless internet email where you got your email and PDA and in some cases voice messaging between devices for ~50/mo. Using RadioMail's network with Ardis and RAM, I could track your location pretty accurately to determine power, coverage and more. Add a mobile unit and we had meter level locationing or better. If the GPS chip can simply chew via GPS and spew via PCS, it seems like it could be a valid application of the technology. -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Tuesday, August 13, 2002 5:56 AM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Re: GPS wristwatch On 12 Aug 2002 at 22:25, Matt Paulsen wrote: > http://www.wherifywireless.com/corp_home.htm > http://news.bbc.co.uk/2/hi/technology/2181469.stm > Baby-sitting via satellite > A child can lock the watch on their wrist > Satellite technology is being used in the US to keep track of children > and offer peace of mind to parents. A wristwatch containing miniature > Global Positioning System (GPS) technology has just gone on sale. > The GPS Personal Locator developed by Silicon Valley company Wherify > Wireless uses advances in satellite tracking and wireless technologies > to allow parents to find their child within a minute. Don't get excited about this. This is a reseller of the Digital Angel/Mobiltrak vaporware scam which already has made its rounds in this country, scammed hundreds of potential investors, and been debunked repeatedly in the media by a number of persons including me. Some people will believe anything, even when it involves rewriting the laws of physics. These scammers hire PR agencies and send thousands of press releases to magazines and all over the media, who print it in their innocence and ignorance. Can't blame them; they need material and are only reporting what is supplied to them. You can, however, investigate independently, prove the scam, and supply your material to the same media who may or may not retract their original scam piece depending on their integrity. Investing in all these manportable consumer grade alleged GPS trackers is akin to getting involved with that poor guy in Nigeria whose dad was killed and has millions of dollars squirreled away he's willing to share with you if you'll only help him get it out of the country. Amongst others, here's one good article exposing the scam. There are dozens, but this one is the best: http://www.wired.com/wired/archive/7.10/spam.html The above article seems to only open in IE, not Netscape like they used to. When will people learn to test their sites with browsers other than IE? Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5969 From: Greg H. Walker, Attorney At Law Date: Tue Aug 13, 2002 5:46pm Subject: Re: GPS wristwatch Even if the company is legitimate (I know nothing about the company) it seems that once the child was taken inside of a building, in a heavy wooded area, etc. that the line of sight with the 3 or so required satellites would be lost. Another problem I visualize is battery life, especially for transmitting. Stop and think, what percentage of the time does your cellphone not work due to inability to connect with the system because you are in a dead spot, or in a building, etc.. Who would want to gamble a life on this technology? I will be the first to admit that I have the electronic skills of a smushed squirrel, however, in my, going on 5 years, use of locational systems (primarily Teletrac, an RF system) placement of antennas and battery life have always been a problem. Investigators I know that have tried GPS systems have either sold them for pennies on the dollar or simply thrown them away. My only direct experience with GPS has been when someone threw one of my units down into a wooded ravine, we changed from street names to longitude and latitude and went to the local hunting and fishing store and bought a decent GPS unit and never could get it to give us the same location twice -- always way off and I don't mean a block or so, I mean a couple of miles -- finally found the unit the old fashioned way -- hand searching. If I told a client about the GPS wristwatch for a child, or even an adult, I would probably have them sign a multipage disclaimer and release of liabilty. People are going to over trust this type of thing and believe it will work each and every time and it won't and the lawsuits will flow; but in the meantime a little child will have been lost because a parent believed the sales people who tauted that technology can solve all of your problems -- wrong, technology is a tool for the trained, not a cure-all for inattentive parents or caregivers of the elderly or disabled. It would be great and a wonderful aid for LEO, etc. if such a device was extremely reliable and if parents understood it was not a subtitute for good parenting practices -- but the advertisements won't say that it is not a subtitute for good parenting practices and it won't be as dependable under all conditions, especially big city conditions, as people will probably be led to believe. Please understand that this is not an attack or badmouthing of any company, etc. it is merely a comment on my experience and upon the technology in general. GREG -- Greg H. Walker, ARM* Attorney At Law President RisKontroL -- Risk Management, Security Consulting & Investigations Houston, Texas (713) 850-0061 * Associate in Risk Management Designation (Insurance Institute of America's Center For Advanced Risk Management Education) WARNING NOTICE BY GHW: Greg H. Walker's comments are not intended to be and should absolutely not be taken as legal advice. Unless you have entered into a specific written agreement with him for legal services, signed by both you and him, and paid him a retainer in good funds, then he is not your Attorney, does not intend to be your Attorney and you should not act nor refrain from acting based, in whole or in part, on his comments. 5970 From: Michael Puchol Date: Tue Aug 13, 2002 10:09am Subject: Re: Re: GPS wristwatch Hi there, Steve is right about this - I read the original Wired article, and then the one linked in his post - well worth a read. Dozens of people gave this scammer thousands of dollars for distributorship rights on devices that never existed, or even have a probability to exist in a few years time, given the current state of technology (mainly regarding batteries). It is funny however that about 10 minutes ago I finished lunch, while watching the news on TV, where this device was mentioned - the short clip talked about the device, showed technical drawings, a few screenshots of a website, and lots of children running around (without any trace of the bracelet of course). Not once a was the device physically show - the most likely cause being that it doesn't even exist. It was all about how this device was going to help with lost children, abductions, etc. - and they even mentioned a price! Around $450 each. Unbelievable. All the best, Mike ----- Original Message ----- From: "Steve Uhrig" To: Sent: Tuesday, August 13, 2002 2:55 PM Subject: [TSCM-L] Re: GPS wristwatch > > Don't get excited about this. > > This is a reseller of the Digital Angel/Mobiltrak vaporware scam > which already has made its rounds in this country, scammed hundreds > of potential investors, and been debunked repeatedly in the media by > a number of persons including me. 5971 From: Michael Puchol Date: Tue Aug 13, 2002 6:00pm Subject: Re: Re: GPS wristwatch Hi there, Steve is right about this - I read the original Wired article, and then the one linked in his post - well worth a read. Dozens of people gave this scammer thousands of dollars for distributorship rights on devices that never existed, or even have a probability to exist in a few years time, given the current state of technology (mainly regarding batteries). It is funny however that about 10 minutes ago I finished lunch, while watching the news on TV, where this device was mentioned - the short clip talked about the device, showed technical drawings, a few screenshots of a website, and lots of children running around (without any trace of the bracelet of course). Not once a was the device physically show - the most likely cause being that it doesn't even exist. It was all about how this device was going to help with lost children, abductions, etc. - and they even mentioned a price! Around $450 each. Unbelievable. All the best, Mike ----- Original Message ----- From: "Steve Uhrig" To: Sent: Tuesday, August 13, 2002 2:55 PM Subject: [TSCM-L] Re: GPS wristwatch > > Don't get excited about this. > > This is a reseller of the Digital Angel/Mobiltrak vaporware scam > which already has made its rounds in this country, scammed hundreds > of potential investors, and been debunked repeatedly in the media by > a number of persons including me. 5972 From: George Shaw Date: Tue Aug 13, 2002 1:15pm Subject: RE: Re: GPS wristwatch Gents, not that I dispute the scam of the personal kid finder on a wrist, I do have to point out that positional information based on GPS and viewable on a Internet page is perfectly possible and is being used by many radio hams around the world, APRS and Ui-View along with packet radios, though the size is a major factor in the technology. It don't need a Yagi but a decent 2m antenna to hit a digi-repeater. For a simple demo try http://www.findu.com/cgi-bin/find.cgi?call=M0CYP George Shaw MI3GTO Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: 13 August 2002 18:34 To: Steve@s... Cc: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Re: GPS wristwatch Yes indeed Steve...the laws of physics be dammed, give us your money.....I thought I'd smelled this before.... Having implemented wireless internet connectivity for some years now, I wanted to see if the yagi was mounted on the watch, or it used a flat panel...which I might add, either would make the tracking very directional...;) At 08:55 8/13/02 -0400, you wrote: >On 12 Aug 2002 at 22:25, Matt Paulsen wrote: > > > http://www.wherifywireless.com/corp_home.htm > > > http://news.bbc.co.uk/2/hi/technology/2181469.stm > > > Baby-sitting via satellite > > > A child can lock the watch on their wrist > > > Satellite technology is being used in the US to keep track of children > > and offer peace of mind to parents. A wristwatch containing miniature > > Global Positioning System (GPS) technology has just gone on sale. > > > The GPS Personal Locator developed by Silicon Valley company Wherify > > Wireless uses advances in satellite tracking and wireless technologies > > to allow parents to find their child within a minute. > >Don't get excited about this. > >This is a reseller of the Digital Angel/Mobiltrak vaporware scam >which already has made its rounds in this country, scammed hundreds >of potential investors, and been debunked repeatedly in the media by >a number of persons including me. > >Some people will believe anything, even when it involves rewriting >the laws of physics. These scammers hire PR agencies and send >thousands of press releases to magazines and all over the media, who >print it in their innocence and ignorance. Can't blame them; they >need material and are only reporting what is supplied to them. You >can, however, investigate independently, prove the scam, and supply >your material to the same media who may or may not retract their >original scam piece depending on their integrity. > >Investing in all these manportable consumer grade alleged GPS >trackers is akin to getting involved with that poor guy in Nigeria >whose dad was killed and has millions of dollars squirreled away he's >willing to share with you if you'll only help him get it out of the >country. > >Amongst others, here's one good article exposing the scam. There are >dozens, but this one is the best: > >http://www.wired.com/wired/archive/7.10/spam.html > >The above article seems to only open in IE, not Netscape like they >used to. When will people learn to test their sites with browsers >other than IE? > >Steve > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ From: Rocco Rosano Date: Thu Aug 10, 2000 6:16pm Subject: Re: The Tempest Surrounding Tempest [Debunking the Myth] Good, very good article. There are very few TEMPEST issues, these days. There are some exploitable emanations, Hi-Jacks, and Piggy-backs, but by and large, most of them are now TSCM problems. The days of RED, PINK (NATO) and BLACK bleeds-overs ---- and most over powered monitor issues are rectified with effective grounding. TEMPEST problems are only at issue when the target is immersed or surrounded by the opposition which can have access to power lines, grounds and other penetrators without the fear of discovery. A Piggy-Back devices can be used to capture to capture a RED signal, amplified it and retransmit it or jumper it to a BLACK area. While it exploits an exploitable emanation (the emanation being a TEMPEST issue) the attack is really a TSCM issue (overall) and involves (usually) some measure of penetration. The 30 year old RF flooding technique is an example of a one type Hi-Jack Operation. Not generally practices anymore, they are all variations of targeting a RED emanation with a very clean carrier. As the carrier passes through the target, an exploitable emanation modulates the carrier. Through an A-B subtraction (available on most S/As today) the RED signal is extracted. Again, the emanation (a TEMPEST issue) is the target; but, the Flooding carrier is a TSCM issue. Most exploitation potentials (RED emanations) rapidly degrade because the power behind them (using today's technology) is small to start with. The exploitation of RED emanations are further complicated because of the ambient EM noise in the spectrum. Oddly enough, a TSCM, itself was once vulnerable to TEMPEST problems. An old fashion WR-550 countermeasures receiver made a very distinctive sound when fired-up. If you heard a WR-550 go through a start-up sequence, a prudent HoIS operative would (naturally) remotely deactivate the active portion of a clandestine surveillance devise (CSD). Most of the older TSCM search receivers had a very prominent and powerful IF output. It was rumored that some CSDs had a protective receiver that terminated the active element of the CSD when ever in the proximity of a 21.4MHz signal (the standard IF out for a countermeasures receiver). But, again, most all of these types of threats are more than 30 or 40 years old; dating back to well before I graduated ITC and attended the TSCM course. Again, great article - congrat's to the contributors. Rocco Rosano Reynoldsburg, Ohio "James M. Atkinson, Comm-Eng" wrote: > http://www.forbes.com/tool/html/00/aug/0810/mu9.htm > > Forbes.com: 8/10/00 - News: The Tempest Surrounding Tempest > > August 10, 2000 > > The Tempest Surrounding Tempest > By Arik Hesseldahl > > NEW YORK. 4:30 PM EDT-Echelon, Carnivore and Tempest. The names > could come from the script of a techo-thriller movie. > > But to people who follow the intelligence community, they're > real, and the cause for lots of speculative theories. > > Echelon is said to be the global telecommunications surveillance > network run by the National Security Agency. Carnivore is an > Internet eavesdropping tool used by the FBI. > > Then there's Tempest. With Tempest technology, the story goes, > the information displayed on one's computer screen can be read > from across the street by capturing the radiating emanations > from the monitor itself using special equipment and a > directional antenna. > > But the reality behind Tempest is much more mundane, according > to government documents and people familiar with it. While the > story behind Tempest is grounded in a kernel of truth, it has > been so distorted in the retelling that it has become something > of an urban myth. > > A front-page report in The Wall Street Journal on Aug. 7 > attempted to get to the heart of Tempest technology, but instead > perpetuated more bad information. For example, the Journal > wasn't aware that one of the primary sources for the story, > Frank Jones, of Codex Data Systems, pleaded guilty in 1997 to > one federal count of possession of illegal surveillance devices, > and is widely considered disreputable by several people in the > surveillance industry. (A spokesman for Dow Jones Co., parent of > the Journal, had no comment on the story.) > > Moreover, Codex says it no longer makes the "DataScan Tempest > Monitoring System" that the Journal says the U.S. Army had > contracted to buy at $20,000 each. Terrance Kawles, Codex's vice > president and general counsel, insists, however, that the Army > had at one time expressed in an interest in buying the system. > (Full disclosure: Forbes.com published an item about Codex's > Tempest device in 1998.) > > Steve Uhrig, president of SWS Security, a U.S.-based firm that > manufactures surveillance and intelligence gathering equipment > for governments and the military, says he is extremely skeptical > about Jones. He says that, in his opinion, Jones gives the > entire electronic surveillance industry a bad image by making > "outrageous claims about nonexistent products." > > "Jones has been a spy groupie for about 17 or 18 years," he > says. "I don't think he's ever manufactured a product or > provided a legitimate service. He makes it difficult for > legitimate companies who tell the truth about their product's > capabilities." > > Jones says Codex stopped selling DataScan devices after finding > there was little market for them. And while he says he doesn't > have any of the devices left, he could, given the right > components, still demonstrate his technique. Nor does he claim > to have any expertise in Tempest technology. > > "We're now strictly involved with software development," he > says. "Tempest is old news." > > The Journal story also left readers under the impression that > the full content of a document displayed on a computer screen > can be captured from several hundred yards away. > > That's not correct, says James Atkinson, president and chief > engineer of the Granite Island Group, a security consulting firm > in Gloucester, Mass. Atkinson is a telecommunications engineer > who specializes in the field of technical surveillance > countermeasures (TSCM), the practice of finding hidden bugs and > wiretaps. A former U.S. Air Force officer, he says he is one of > few people working in the private sector who have graduated from > the NSA's Tempest School at Lackland Air Force Base outside San > Antonio, Tex. > > Tempest is not a spying technology, he says, and anyone who says > otherwise is either lying or misinformed. It is a classified > government standard meant to prevent spying on computer monitors > and other equipment from afar. Breaking down the acronym that is > its name gives a hint: Telecommunications Electronics Material > Protected from Emanating Spurious Transmissions, the key word > being "protected," of course. > > And while its exact details are a secret, much about Tempest > technology can be gleaned by reading between the lines of > mind-numbing government documents with titles like "Requirements > for the control of electromagnetic interference characteristics > of subsystems and equipment." > > Another document, this one a military handbook entitled "Radio > Frequency Shielded Enclosures," describes "Tempest shielding" as > being designed to "reduce the conducted and radiated emissions > from within the sensitive environment to an undetectable level > outside the shielded enclosure in uncontrolled areas." > > Although sneaking a peak at what's on someone else's computer > screen from a distance is theoretically possible, Atkinson says, > it is very difficult to do, extremely costly and impractical. > > Atkinson says that government buildings where sensitive > information is processed are designed with the idea of > minimizing the leakage of emanations from computer monitors and > other equipment. And while the government does take the threat > of eavesdropping on these emanations seriously, picking up a > signal from a monitor is "extraordinarily difficult." A would-be > spy must either be really close to the monitor with the right > equipment, or have a very sensitive, very large antenna and very > favorable conditions when at a greater distance. > > "If you're doing this in a demonstration in a hotel room, from > only a few feet away, it's a slam dunk," he explains. "But once > you're beyond anything more a dozen feet, it gets really dicey. > While technically you can do it, you'd need antennas that are 30 > feet long and about 50 feet wide." > > He once calculated the size of the antenna that would be > required, to pick up monitor emanations from a computer inside > the White House while outside on the street. He estimates it > would take an antenna 45 feet tall and 30 feet wide extended > into the air about 30 feet. The antenna would have to be mounted > on the trailer of the semi truck filled with complex signals > intelligence equipment, parked right outside on Pennsylvania > Ave. > > "Can you see someone doing that outside the White House without > attracting attention?" he asks. "I don't think the Secret > Service would be amused." > > But Jones maintains it can still be done using off-the-shelf > components. > > "There are people who would have you believe that you need > millions of dollars worth of equipment and years of training to > do this, and I'm telling you that's a load of crap," he says. > "This stuff is not rocket science. The fact is I get e-mails > from college students who say they are building these scanners > in the lab." > > And even without the practical limitations presented by first > getting close enough to the signal and obtaining the right > antenna and equipment, there's also the problem of finding the > right signal. > > "There are so many competing electromagnetic signals from the > surrounding environment that picking any one of them out is > practically impossible, especially from any distance," says > Uhrig of SWS. > > And even under the best of conditions, the odds are high against > actually reproducing a full video image of exactly what is on > the target monitor, says Atkinson. > > "If you have a big enough antenna, and point it at a computer > that is not properly shielded, bonded and grounded, > theoretically, you could pick up fragments of information that > are useful from an intelligence point of view," he says. > > But he believes the government's Tempest standards are meant to > act like a document-shredder of the air, only better. > > =================================================================== > Everybody's into computers... Who's into yours?* > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Lizard, The Other White Meat > =================================================================== > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 1203 From: James M. Atkinson, Comm-Eng Date: Thu Aug 10, 2000 7:15pm Subject: Re: The Tempest Surrounding Tempest [Debunking the Myth] At 7:16 PM -0400 8/10/00, Rocco Rosano wrote: >Good, very good article. > >There are very few TEMPEST issues, these days. > >There are some exploitable emanations, Hi-Jacks, and Piggy-backs, but by >and large, most of them are now TSCM problems. The days of RED, PINK >(NATO) and BLACK bleeds-overs ---- and most over powered monitor issues are >rectified with effective grounding. TEMPEST problems are only at issue >when the target is immersed or surrounded by the opposition which can have >access to power lines, grounds and other penetrators without the fear of >discovery. Assuming of course that the opposition can get inside the isolation or "stand off" zone, and can isolate and obtain enough of the signal before it diminishes into the noise floor. If we take a -85 dBm "Compromising Emanation" at say 310 MHz (common SA emanation) and apply a very modest path loss we end up with the signal in the noise floor after a very short distance. If we then put a little bit of "Shielding, Bonding, Grounding, and Filtering" on the equipment we can drive the initial emanation into the noise floor (reduce it) long before the signal is would be of use to an eavesdropper. If we have a -85 dBm signal, and then knock it down by 110 dB we end up knocking it down to below -195 dBm. Since this puts us 20 dB BELOW the thermal noise floor (on Earth) the eavesdropper is going to have a tough time exploiting the emanation (unless he has access to liquid nitrogen). >A Piggy-Back devices can be used to capture to capture a RED signal, >amplified it and retransmit it or jumper it to a BLACK area. While it >exploits an exploitable emanation (the emanation being a TEMPEST issue) the >attack is really a TSCM issue (overall) and involves (usually) some measure >of penetration. Agree'd... more then a few times a TSCM'er has found a compromising emanation and then traced it to a screw that was not torqued down right/snapped off or a bad gasket that had been sabotaged. In other cases filters had been manipulated or bypassed all together, ground compromised. My favorite were the senior officer who insisted on bringing their walkie talkies into the SCIF, or who got bent out of shape when you removed the microwave oven due to HI-JACK issues. >The 30 year old RF flooding technique is an example of a one type Hi-Jack >Operation. Not generally practices anymore, they are all variations of >targeting a RED emanation with a very clean carrier. As the carrier passes >through the target, an exploitable emanation modulates the carrier. >Through an A-B subtraction (available on most S/As today) the RED signal is >extracted. Again, the emanation (a TEMPEST issue) is the target; but, the >Flooding carrier is a TSCM issue. Ah, but with today's technology the eavesdropper can use the ambient RF environment to provide power for a hostile device (TEAPOT is a wonderful thing). >Most exploitation potentials (RED emanations) rapidly degrade because the >power behind them (using today's technology) is small to start with. The >exploitation of RED emanations are further complicated because of the >ambient EM noise in the spectrum. Agree'd... and since the size has also decreased (from acres to inches). What took up a 100,000 square foot 20 years ago can now go into a small safe the size of a file cabinet. Egads... look at the old KY-3 and KG-13, and then look at the new stuff that replaced it. I also look back fondly on the old equipment that used a digital signal with potentials of over 30 volts, and then compare it to the more modern ECL circuits. > >Oddly enough, a TSCM, itself was once vulnerable to TEMPEST problems. An >old fashion WR-550 countermeasures receiver made a very distinctive sound >when fired-up. If you heard a WR-550 go through a start-up sequence, a >prudent HoIS operative would (naturally) remotely deactivate the active >portion of a clandestine surveillance devise (CSD). Most of the older TSCM >search receivers had a very prominent and powerful IF output. It was >rumored that some CSDs had a protective receiver that terminated the active >element of the CSD when ever in the proximity of a 21.4MHz signal (the >standard IF out for a countermeasures receiver). Actually several CSD's in use today shutdown for 72 hours if a strong enough NLJD signal is detected. This is of course why the NLJD, Xray, and so on must be considered an alerting device. Heck, even some SA's should be considered an alerting device due to the rather strong signals they leak (which is why we want to terminate any unused port into a load, and add some extra screening to the instruments various ports. >But, again, most all of these types of threats are more than 30 or 40 years >old; dating back to well before I graduated ITC and attended the TSCM >course. > >Again, great article - congrat's to the contributors. > >Rocco Rosano >Reynoldsburg, Ohio =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1204 From: Screaming Date: Thu Aug 10, 2000 6:39pm Subject: RE: WE ARE OUT OF OIL First funny thing I have read for a long time It did make me chuckle thanks jma 1205 From: Night Baron Date: Fri Aug 11, 2000 0:39am Subject: Bugs Bugs are nothing more than transmitters or signal transducers that are illegal when used to eavesdrop on others with out court ordered authority in most cases. Some are not illegal when utilized, such as telephone listening devices employed by someone who is a party of the conversation (in some states)but it is not illegal to own them. You can buy simple stuff that mom,dad and the kiddies can use to sing songs or talk over thier radio as a toy, they have short ranges and are as legal as any other consumer device. Ham Radio hobbiest make transmitters all the time to engage in thier hobby. Electronic students make them to learn about RF and thousands of hobbiest do as well. Transmitters are used by industry in control systems and transmitting data on a process to a central location. So having a transmitter is not illegal. What you do with it is what is important. Sure there are guidelines as to how much power can be used, or how long an antenna may be or the strength of the signal, but the possesion of the object is not illegal, the way you use it may be. I could take a child's walkie talkie and set it up as a close range transmitter and it would not be illegal unless I used it to eavesdrop in an illegal way. Even then it is proven after the fact and the information has already been stolen. Ever hear a baby monitor in a home through a scanner or a handheld phone through a scanner, this isn't illegal but it is very effective in gathering information, and the transmitter is owned and used by the consumer legally, so your point of illegal to posse is false. I learned how to make transmitters and tap phones when I was 12 years old, are you going to go around and arrest everyone who builds a device like this, no you wouldn't have a police force large enough. Can you get those who use them illegally, yes some but even then you can't get everyone because anyone who has ever had a grudge against someone or a suspition that thier spose is cheating or just plain nosey will have thought to use thier kids toy walkie talkie or wireless mic or tape thier own phone (remember Monica and Linda?) to gather some information at one time or another. You should know how these work and how they are used and how they are hidden and that also includes the fact that to do this you need to have had one in your possesion at one time or another, else you will never be able to prtoect against it, and be just as blind and deaf to the treat as those you seek to help. Night Baron 1206 From: Doug Ellsworth Date: Fri Aug 11, 2000 4:43am Subject: Re: The Tempest Surrounding Tempest [Debunking the Myth] Once again, Congrats to Jim and Steve (and Forbes) for a responsible article. Also, remember the old composite video monitors? Composites pounded out a much higher amplitude signal than modern VDTs. The signals were more primitive and simplistic as well. Composites were in common usage during the infancy of the microcomputer, and this coincided with the advent of TEMPEST measures. Coincidence? Or co-incident? -Doug ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Sent: Thursday, August 10, 2000 2:55 PM Subject: [TSCM-L] The Tempest Surrounding Tempest [Debunking the Myth] http://www.forbes.com/tool/html/00/aug/0810/mu9.htm Forbes.com: 8/10/00 - News: The Tempest Surrounding Tempest August 10, 2000 The Tempest Surrounding Tempest By Arik Hesseldahl NEW YORK. 4:30 PM EDT-Echelon, Carnivore and Tempest. The names could come from the script of a techo-thriller movie. But to people who follow the intelligence community, they're real, and the cause for lots of speculative theories. Echelon is said to be the global telecommunications surveillance network run by the National Security Agency. Carnivore is an Internet eavesdropping tool used by the FBI. Then there's Tempest. With Tempest technology, the story goes, the information displayed on one's computer screen can be read from across the street by capturing the radiating emanations from the monitor itself using special equipment and a directional antenna. But the reality behind Tempest is much more mundane, according to government documents and people familiar with it. While the story behind Tempest is grounded in a kernel of truth, it has been so distorted in the retelling that it has become something of an urban myth. A front-page report in The Wall Street Journal on Aug. 7 attempted to get to the heart of Tempest technology, but instead perpetuated more bad information. For example, the Journal wasn't aware that one of the primary sources for the story, Frank Jones, of Codex Data Systems, pleaded guilty in 1997 to one federal count of possession of illegal surveillance devices, and is widely considered disreputable by several people in the surveillance industry. (A spokesman for Dow Jones Co., parent of the Journal, had no comment on the story.) Moreover, Codex says it no longer makes the "DataScan Tempest Monitoring System" that the Journal says the U.S. Army had contracted to buy at $20,000 each. Terrance Kawles, Codex's vice president and general counsel, insists, however, that the Army had at one time expressed in an interest in buying the system. (Full disclosure: Forbes.com published an item about Codex's Tempest device in 1998.) Steve Uhrig, president of SWS Security, a U.S.-based firm that manufactures surveillance and intelligence gathering equipment for governments and the military, says he is extremely skeptical about Jones. He says that, in his opinion, Jones gives the entire electronic surveillance industry a bad image by making "outrageous claims about nonexistent products." "Jones has been a spy groupie for about 17 or 18 years," he says. "I don't think he's ever manufactured a product or provided a legitimate service. He makes it difficult for legitimate companies who tell the truth about their product's capabilities." Jones says Codex stopped selling DataScan devices after finding there was little market for them. And while he says he doesn't have any of the devices left, he could, given the right components, still demonstrate his technique. Nor does he claim to have any expertise in Tempest technology. "We're now strictly involved with software development," he says. "Tempest is old news." The Journal story also left readers under the impression that the full content of a document displayed on a computer screen can be captured from several hundred yards away. That's not correct, says James Atkinson, president and chief engineer of the Granite Island Group, a security consulting firm in Gloucester, Mass. Atkinson is a telecommunications engineer who specializes in the field of technical surveillance countermeasures (TSCM), the practice of finding hidden bugs and wiretaps. A former U.S. Air Force officer, he says he is one of few people working in the private sector who have graduated from the NSA's Tempest School at Lackland Air Force Base outside San Antonio, Tex. Tempest is not a spying technology, he says, and anyone who says otherwise is either lying or misinformed. It is a classified government standard meant to prevent spying on computer monitors and other equipment from afar. Breaking down the acronym that is its name gives a hint: Telecommunications Electronics Material Protected from Emanating Spurious Transmissions, the key word being "protected," of course. And while its exact details are a secret, much about Tempest technology can be gleaned by reading between the lines of mind-numbing government documents with titles like "Requirements for the control of electromagnetic interference characteristics of subsystems and equipment." Another document, this one a military handbook entitled "Radio Frequency Shielded Enclosures," describes "Tempest shielding" as being designed to "reduce the conducted and radiated emissions from within the sensitive environment to an undetectable level outside the shielded enclosure in uncontrolled areas." Although sneaking a peak at what's on someone else's computer screen from a distance is theoretically possible, Atkinson says, it is very difficult to do, extremely costly and impractical. Atkinson says that government buildings where sensitive information is processed are designed with the idea of minimizing the leakage of emanations from computer monitors and other equipment. And while the government does take the threat of eavesdropping on these emanations seriously, picking up a signal from a monitor is "extraordinarily difficult." A would-be spy must either be really close to the monitor with the right equipment, or have a very sensitive, very large antenna and very favorable conditions when at a greater distance. "If you're doing this in a demonstration in a hotel room, from only a few feet away, it's a slam dunk," he explains. "But once you're beyond anything more a dozen feet, it gets really dicey. While technically you can do it, you'd need antennas that are 30 feet long and about 50 feet wide." He once calculated the size of the antenna that would be required, to pick up monitor emanations from a computer inside the White House while outside on the street. He estimates it would take an antenna 45 feet tall and 30 feet wide extended into the air about 30 feet. The antenna would have to be mounted on the trailer of the semi truck filled with complex signals intelligence equipment, parked right outside on Pennsylvania Ave. "Can you see someone doing that outside the White House without attracting attention?" he asks. "I don't think the Secret Service would be amused." But Jones maintains it can still be done using off-the-shelf components. "There are people who would have you believe that you need millions of dollars worth of equipment and years of training to do this, and I'm telling you that's a load of crap," he says. "This stuff is not rocket science. The fact is I get e-mails from college students who say they are building these scanners in the lab." And even without the practical limitations presented by first getting close enough to the signal and obtaining the right antenna and equipment, there's also the problem of finding the right signal. "There are so many competing electromagnetic signals from the surrounding environment that picking any one of them out is practically impossible, especially from any distance," says Uhrig of SWS. And even under the best of conditions, the odds are high against actually reproducing a full video image of exactly what is on the target monitor, says Atkinson. "If you have a big enough antenna, and point it at a computer that is not properly shielded, bonded and grounded, theoretically, you could pick up fragments of information that are useful from an intelligence point of view," he says. But he believes the government's Tempest standards are meant to act like a document-shredder of the air, only better. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1207 From: A Grudko Date: Thu Aug 10, 2000 3:41pm Subject: Re: Introduction ----- Original Message ----- > Installing a clandestine surveillance package (CSD/CSP) is to planting a > surveillance device, as cabinet making is to carpentry Moral of the story....never buy wooden furniture from jma O ~>)))}}}} /|` _____ / \ [ ] Andy Grudko - Johannesburg 1208 From: Stuart Wachs Date: Fri Aug 11, 2000 6:58am Subject: Re: The Law Regarding Bugs Is Complicated Hello list members. Although I've followed the discussion for a year or so, this is my first contribution. I am a lawyer who specializes in issues related to bugs. Some of the comments about bugs need to be addressed because they are incomplete. As all of you no doubt know, bugs are regulated under various state laws and under a federal law known as "title III." One section of title III defines bugs as any device which, because of how it's designed, makes the device "primarily useful for the surreptitious interception." Manufacture, sale, possession or advertising of bugs is illegal. Consequently, although having a transmitter is not illegal under title III, putting a transmitter in a pen is illegal. Another section of title III regulates the use of bugs. That section in general outlaws all uses of bugs or any other mechanical means of secretly intercepting communications, unless the use is permitted by state law. For example some states like New York allow a person to secretly record a conversation but only if the person doing the recording is a party to the conversation. This is called one-party consent. The two sections intersect in some instances. For example, using a telephone recorder can be legal or illegal depending on how the unit activates. If the user has to turn it on for each phone call, then the recorder is not "primarily useful for the surreptitious interception" and the person doing the recording in a state that allows it has one-party consent. In contrast, if lifting the receiver activates the recorder, then the recorder is illegal and the legality of its use will depend on whether the person using the recorder is part of the conversation. The odds of getting caught are low but hardly infinitesimal. Title III regularly finds its way into divorce cases. Moreover, the federal government periodically busts spy shops and similar businesses. When it does, agents seize business records including sales invoices. From there, the government's only decision is which fish to fry. This area of law is complicated because title III was not well written. However, every legal attack on title III has failed. The take-home message, therefore, is to proceed with great caution and, when in doubt, get advise. Stuart Wachs -----Original Message----- From: Night Baron To: TSCM-L@egroups.com Date: Friday, August 11, 2000 3:19 AM Subject: [TSCM-L] Bugs >Bugs are nothing more than transmitters or signal transducers that >are illegal when used to eavesdrop on others with out court ordered >authority in most cases. Some are not illegal when utilized, such as >telephone listening devices employed by someone who is a party of the >conversation (in some states)but it is not illegal to own them. You >can buy simple stuff that mom,dad and the kiddies can use to sing >songs or talk over thier radio as a toy, they have short ranges and >are as legal as any other consumer device. Ham Radio hobbiest make >transmitters all the time to engage in thier hobby. Electronic >students make them to learn about RF and thousands of hobbiest do as >well. Transmitters are used by industry in control systems and >transmitting data on a process to a central location. So having a >transmitter is not illegal. What you do with it is what is important. >Sure there are guidelines as to how much power can be used, or how >long an antenna may be or the strength of the signal, but the >possesion of the object is not illegal, the way you use it may be. I >could take a child's walkie talkie and set it up as a close range >transmitter and it would not be illegal unless I used it to eavesdrop >in an illegal way. Even then it is proven after the fact and the >information has already been stolen. Ever hear a baby monitor in a >home through a scanner or a handheld phone through a scanner, this >isn't illegal but it is very effective in gathering information, and >the transmitter is owned and used by the consumer legally, so your >point of illegal to posse is false. I learned how to make >transmitters and tap phones when I was 12 years old, are you going to >go around and arrest everyone who builds a device like this, no you >wouldn't have a police force large enough. Can you get those who use >them illegally, yes some but even then you can't get everyone because >anyone who has ever had a grudge against someone or a suspition that >thier spose is cheating or just plain nosey will have thought to use >thier kids toy walkie talkie or wireless mic or tape thier own phone >(remember Monica and Linda?) to gather some information at one time >or another. You should know how these work and how they are used and >how they are hidden and that also includes the fact that to do this >you need to have had one in your possesion at one time or another, >else you will never be able to prtoect against it, and be just as >blind and deaf to the treat as those you seek to help. > >Night Baron > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > 1209 From: Robert G. Ferrell Date: Fri Aug 11, 2000 11:11am Subject: Re: [The WSJ Article is a Complete Bullshit] >Let me say again... TEMPEST (at least according to THOUSANDS of pages >of government documents I have) deals with the "Shielding, Bonding, >Grounding, and Filtering" of equipment processing classified >materials. >It DOES NOT involve eavesdropping equipment or methods, but instead >involves the technology used to protect against "compromising >emissions". Absolutely correct. I recently finished dismantling a legacy TEMPEST facility in Reston, VA. It was 100% geared toward preventing unauthorized interception of signals generated by computer and communications equipment. Purely defensive. RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 1210 From: James M. Atkinson, Comm-Eng Date: Fri Aug 11, 2000 0:21pm Subject: Strange Request Here is one of my stranger requests, I am seeking a source from whom I can obtain several hundred pounds of ground up POPULATED circuit boards (I would prefer newer multi-layered fiberglass boards). I used to obtain such materials from a local salvage company, but they stopped grinding down PCB's last Fall. I need the pieces to be small enough to pass though a quarter inch screen, but I will also need pieces small enough to pass though even smaller screens. I actually need about 8 five gallon cans of four different sized "grindings" (19mm-3/4 inch, 6.3mm-1/4 inch, 2mm-#10 Screen, and 1.4mm-#14 Screen (32 cans total). The "grindings" will be used to teach TSCM students, and I will gladly travel anywhere in New England to pick up the materials (and will also be happy to supply the containers). -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1211 From: James M. Atkinson, Comm-Eng Date: Fri Aug 11, 2000 0:29pm Subject: Re: The Law Regarding Bugs Is Complicated At 7:58 AM -0400 8/11/00, Stuart Wachs wrote: > Hello list members. Although I've followed the discussion for a year or >so, this is my first contribution. > > I am a lawyer who specializes in issues related to bugs. Some of the >comments about bugs need to be addressed because they are incomplete. Your comments on the subject at hand are greatly appreciated. > As all of you no doubt know, bugs are regulated under various state laws >and under a federal law known as "title III." One section of title III >defines bugs as any device which, because of how it's designed, makes the >device "primarily useful for the surreptitious interception." Manufacture, >sale, possession or advertising of bugs is illegal. Consequently, although >having a transmitter is not illegal under title III, putting a transmitter >in a pen is illegal. It also applies to anything that has been modified to render it more useful as an eavesdropping device, and the shear act of concealing it could put someone in a pinch. > Another section of title III regulates the use of bugs. That section in >general outlaws all uses of bugs or any other mechanical means of secretly >intercepting communications, unless the use is permitted by state law. For >example some states like New York allow a person to secretly record a >conversation but only if the person doing the recording is a party to the >conversation. This is called one-party consent. Yes, but something else to consider is that the if the phone connection crossed state lines at any point then the federal courts have ruled in favor of the more restrictive state. For example is one side of the call is in a one party state, but the other side is in a two party state that the two party rule applies in both cases. Taking that one step further, if someone in a one party state calls someone in the two party state and records the call then they have just run afoul of T3 (both criminally and civilly). > The two sections intersect in some instances. For example, using a >telephone recorder can be legal or illegal depending on how the unit >activates. If the user has to turn it on for each phone call, then the >recorder is not "primarily useful for the surreptitious interception" and >the person doing the recording in a state that allows it has one-party >consent. In contrast, if lifting the receiver activates the recorder, then >the recorder is illegal and the legality of its use will depend on whether >the person using the recorder is part of the conversation. The device also has to comply with 47 CFR, Part 68 or it is also illegal (most recorder drop out units are not Part 68 compliant). > The odds of getting caught are low but hardly infinitesimal. Title III >regularly finds its way into divorce cases. Moreover, the federal >government periodically busts spy shops and similar businesses. When it >does, agents seize business records including sales invoices. From there, >the government's only decision is which fish to fry. I have seen (as recently as a few days ago) T3 get drawn into workmans comp cases, insurance cases, SEC cases, and so on. > This area of law is complicated because title III was not well written. >However, every legal attack on title III has failed. The take-home message, >therefore, is to proceed with great caution and, when in doubt, get advise. > >Stuart Wachs While the statute is a tad bit vague (to the layman) the case law is actually quite strong. The whole situation pivots on intent, and function the product was originally built, advertised, and marketed for. Once a company calls a product a "Phone Bug" (such as what Ramsey did) it is a little had for them to then backpedal and claim it was only a wireless microphone. If they then offer similar products to complement the other product (such as a pre-amplified microphone then they simply dig themselves into a deeper hole). When someone like XANDI or CONY offers large variants of devices they not only to they "curse" their products, but that also provide a "curse" on similar products. Look at some of the CONY specs, and then at the RAMSEY, DECO, DIY, Quantum, and other "kits"... the intent is rather clear. If a product is marketed, built, and sold as a surveillance device in Japan (ie: Cony, Sun-Mech. Micro) and some spy shop in the US sells it claiming it is for use as a "wireless microphone" then customs will be showing him the error of his ways. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1212 From: A Grudko Date: Fri Aug 11, 2000 2:34pm Subject: Re: WSJ article on TEMPEST Quote > In a nutshell TEMPEST deals with "Shielding, Bonding, and > Grounding"... not the actual interception of signals (It deals with > blocking the signal... period). I may have been misinformed. To err is human, unless you are a politician in which case my understanding of the terms of reference in the indictment depend on the definition of the act itself and as in this instance there was no direct contact between the probe and the device in question so I do not believe the sweep it self constituted the act of TEMPET. Andy Out of Jo'burg but not completely out of touch. 1213 From: Date: Sat Aug 12, 2000 5:36am Subject: Re: Strange Request Jim Are you taking any new students for a day or couple of days or week? Thanks DMM Clockdepot@a... 1214 From: James M. Atkinson, Comm-Eng Date: Sat Aug 12, 2000 0:57pm Subject: Re: WSJ article on TEMPEST At 9:34 PM +0200 8/11/00, A Grudko wrote: >Quote > > > In a nutshell TEMPEST deals with "Shielding, Bonding, and > > Grounding"... not the actual interception of signals (It deals with > > blocking the signal... period). > >I may have been misinformed. >To err is human, unless you are a politician in which case my understanding >of the terms of reference in the indictment depend on the definition of the >act itself and as in this instance there was no direct contact between the >probe and the device in question so I do not believe the sweep it self >constituted the act of TEMPET. > >Andy >Out of Jo'burg but not completely out of touch. [grin] Er, ah... What do you mean an "act of TEMPEST"? TEMPEST is a discipline within the umbrella of Emissions Security, and not an act in unto itself. You would engage in an act of TEMPEST evaluation, or TEMPEST design, TEMPEST Compliance Repair, TEMPEST Filtering etc... but not actually commit an act of TEMPEST. For example, you would not engage in "TEMPEST Eavesdropping" unless you are watching people measure shielding efficiency, or playing with magnetic loops, etc. Keep in mind that TSCM, TEAPOT, HIJACK, TEMPEST, etc are all SISTER programs that address technical security from a slightly different angle. For example you have a TEAPOT I am still trying to find out what the definitions of "IS" is... (ouch) -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1215 From: James M. Atkinson, Comm-Eng Date: Sun Aug 13, 2000 1:41am Subject: Biconical Antenna's [Groan] I've got to stop these 18 hours days, or at least clone myself. [Groan] I've gotten several questions about antenna distances on higher threat sweeps, and though it would be wise to post the following. The following is based on a modified version of about 40 separate government, commercial, and related EMC/EMI measurement (including such classics as 461, 462, 419, 285, part 18, etc). When using a 3110 or 3104 Biconical antenna I start with the antenna parallel to the closed entry door at a distance of four feet, measured from the centerline (not tips) of the bird cage elements. The antenna is oriented so that the balun is pointing towards the door and is mounted to on a tripod with wheels. The "boom" is extended just for enough for the antenna to clear the nylon standoff when the antenna is in the vertical position. The sequence is started with the balun 120 cm off of the floor (2 foot tripod and a 2 foot nylon stand off).Use a 100 kHz IFBW with a 15 second sweep time, collect 3 or more traces (at least 5000 points each), average them, and then download the traces to computer or dump it to disk The antenna platform is then moved 120 cm along the wall and the sequence repeated until the entire wall, floor, windows, and ceiling are completely covered. A similar sequence is then repeated around all furniture (from 120 cm away), and all open areas of the room not previously checked. Then switch the antenna to horizontal and diagonal polarizations and repeat These antenna can cover 20 MHz to 500 MHz, and I would suggest passing the signal though a 25-30 dB preamp mounted to the antenna with a one meter cable (RG-214 with N connectors) before passing it to the SA (where it gets another 20-25 dB of amplification). Be sure to keep your cable runs below 50 foot, and add filters as appropriate to reduce amplifier saturation. While the antenna are typically calibrated from 20/30 MHz to only 300 MHz they can be used higher (to 450-500 MHz) by simply applying an antenna correction table. A 30*30 foot conference room would give us 60 measurement positions with 4 polarization positions each. Budget about 60 seconds per position/polarization to do the sweeps, save the data, and move the antenna. This works out to about 1 hour per polarization, or four hours for the entire room. Of course we will still need to run a loop, double ridged horns, and rod around the room, but I have found the Biconical to be incredibly valuable on a radiated signals sweep as it really digs into the high threat bands. As we move closer to the threats (the under 7 cm surface sweeps) the Biconicals become less valuable, but for sweeping large volumes of space they are invaluable. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1216 From: A Grudko Date: Sat Aug 12, 2000 3:52am Subject: Re: Debunk WSJ article on TEMPEST . ----- Original Message ----- > >I learned long ago that if the speaker works as a speaker, than it is not a > >microphone. If it does not work as a speaker, you better check it out or > >better yet, remove it. As long as a speaker is emmiting sound (i.e. Musac) it can't be a mike, although as James pointed out you can phase a mike in in the cabling closeby. If it's a PA system, used occasionally, whilst there is no emmitted sound disturbing the diaphram, it will work as a mike. Assume 8 ohms at the speaker, add audio transformer up to 600 ohm and you have a 'dynamic' mike. Not very sensitive but......(thereafter read the books, do the courses). Many electriconic - and electrical - devices are telephonic, i.e. converting audio (vibration) to an electrical signal. It just so happens mikes are desisged to optimise the effect. Andy Somewhere in Sunny SA, Sunday morning. 1217 From: A Grudko Date: Sun Aug 13, 2000 3:06am Subject: Source of inaccurate TEMPEST info. In defence of my published errors in this regard, both in this list, in articles and in a TSCM book had published in the early 90's, the internet has helped debunk a lot of psudo-spy tech/ops. ideas. My original understanding of TEMPEST came from a single book, published in the US (somewhere in my library at the office), which described it as the reading of data from a PC monitor at a distance. At the same time we discovered that the technique worked on the bench and QED thought the description was correct. Of course, part of the problem for us, stuck at the tip of Africa, pre internet, was how to get full details on what appeared to be classified US research. If I ever get to publish a second edition of the book there will be many corrections. Humbled. From a secret destination in the African bush on holiday (typing quietly so the wife doesn't realise I'm on the 'net). Andy Grudko 1218 From: Date: Sat Aug 12, 2000 10:31pm Subject: Re: Strange Request Mr. Atkinson, I would greatly appreciate more information regarding the TSCM classes you mentioned in the message below. If any other list members have more information regarding TSCM courses/seminars, and/or computer forensics courses/seminars, please send it to this list or directly to me. Again, I will appreciate any responses I may get. Thank you. Niko On Fri, 11 Aug 2000, James M. Atkinson, Comm-Eng wrote: > Here is one of my stranger requests, > > I am seeking a source from whom I can obtain several hundred pounds > of ground up POPULATED circuit boards (I would prefer newer > multi-layered fiberglass boards). I used to obtain such materials > from a local salvage company, but they stopped grinding down PCB's > last Fall. > > I need the pieces to be small enough to pass though a quarter inch > screen, but I will also need pieces small enough to pass though even > smaller screens. I actually need about 8 five gallon cans of four > different sized "grindings" (19mm-3/4 inch, 6.3mm-1/4 inch, 2mm-#10 > Screen, and 1.4mm-#14 Screen (32 cans total). > > The "grindings" will be used to teach TSCM students, and I will > gladly travel anywhere in New England to pick up the materials (and > will also be happy to supply the containers). > > -jma > > > =================================================================== > Everybody's into computers... Who's into yours?Å > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Lizard, The Other White Meat > =================================================================== > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1219 From: Screaming Date: Sun Aug 13, 2000 0:39pm Subject: RE: Source of inaccurate TEMPEST info. (typing Quietly) Have a Great Holiday Andy jc 1220 From: James M. Atkinson, Comm-Eng Date: Mon Aug 14, 2000 8:28am Subject: WSJ TEMPEST Article Retraction Curious, The Wall Street Journal just ran the following retraction about the TEMPEST article they presented (but failed to research) last week. Sad, really sad... -jma > >Corrections & Amplifications >FRANK JONES, president of Codex Data Systems Inc., said in an Aug. 7 >page-one article that the company had signed a "contract" with the >Army 18 months earlier to produce "under a dozen" $20,000 >computer-screen monitoring devices for testing. Now, in response to >questions raised about the contract, Codex will say only that the >military has shown "interest" in the device and that the company >hasn't "actively marketed" it since July 1998. An Army spokesman >said the Army can find no record of any contract between Codex and >the Army. Since the article was published, it has been learned that >Banco do Brasil obtained a $109,451 court judgment in 1995 against >Mr. Jones and some of his companies for failing to deliver >electronic-surveillance equipment that the bank had paid for. While >not disputing the judgment, a Codex lawyer says the transaction was >a "business loan," notes that "businesses fail all the time," and >declines to elaborate. It also has been learned that Mr. Jones once >pleaded guilty to a federal felony charge of possession of illegal >interception devices and was sentenced last year to five years >probation. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1221 From: James M. Atkinson, Comm-Eng Date: Mon Aug 14, 2000 8:44am Subject: Re: Source of inaccurate TEMPEST info. At 10:06 AM +0200 8/13/00, A Grudko wrote: >In defence of my published errors in this regard, both in this list, in >articles and in a TSCM book had published in the early 90's, the internet >has helped debunk a lot of psudo-spy tech/ops. ideas. Isn't the Internet a great thing. Not only does it make the word a smaller place, but we can also use it to improve our profession, to share tips, and so on. >My original understanding of TEMPEST came from a single book, published in >the US (somewhere in my library at the office), which described it as the >reading of data from a PC monitor at a distance. At the same time we >discovered that the technique worked on the bench and QED thought the >description was correct. I know. Due to the van Wick article published in 1985 the public siezed on the subject, and in the absence of real information they simply created their own. Over the years I have read over a dozen books, articles, and mentions by "TEMPEST Experts" in the public sector who actually have zero formal technical training on the subject, and who have actually never worked in the field. Of course when we compare the "public books" about TEMPEST with the government textbooks, handbooks, and standards we find that most of the information in the public sector is based on pure fantasy and psuedo-science. >Of course, part of the problem for us, stuck at the tip of Africa, pre >internet, was how to get full details on what appeared to be classified US >research. If you would like I would be happy to upload the van Eck article to a directory on my website, as well as a few thousand pages of government standards on the subject. This way you can download and print them (free of charge). >If I ever get to publish a second edition of the book there will be many >corrections. > > >Humbled. >From a secret destination in the African bush on holiday (typing quietly so >the wife doesn't realise I'm on the 'net). >Andy Grudko Have a good holiday, and try to stay off of the computer while on vacation. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1222 From: James M. Atkinson, Comm-Eng Date: Mon Aug 14, 2000 10:09am Subject: Re: WSJ TEMPEST Article Retraction Whoops, I didn't mention the following: The retraction ran in todays (8/14/00) hard copy version of the Journal on page A-2, and the on-line version as well. It is one of the weakest of retractions, and fails to mention that the "secret technology of TEMPEST eavesdropping" in and of itself is a myth as well. The original WSJ article was pure hype, and was based on fantasy and urban legends. -jma At 9:28 AM -0400 8/14/00, James M. Atkinson, Comm-Eng wrote: >Curious, > >The Wall Street Journal just ran the following retraction about the >TEMPEST article they presented (but failed to research) last week. > >Sad, really sad... > >-jma > > > > > > >Corrections & Amplifications > >FRANK JONES, president of Codex Data Systems Inc., said in an Aug. 7 > >page-one article that the company had signed a "contract" with the > >Army 18 months earlier to produce "under a dozen" $20,000 > >computer-screen monitoring devices for testing. Now, in response to > >questions raised about the contract, Codex will say only that the > >military has shown "interest" in the device and that the company > >hasn't "actively marketed" it since July 1998. An Army spokesman > >said the Army can find no record of any contract between Codex and > >the Army. Since the article was published, it has been learned that > >Banco do Brasil obtained a $109,451 court judgment in 1995 against > >Mr. Jones and some of his companies for failing to deliver > >electronic-surveillance equipment that the bank had paid for. While > >not disputing the judgment, a Codex lawyer says the transaction was > >a "business loan," notes that "businesses fail all the time," and > >declines to elaborate. It also has been learned that Mr. Jones once > >pleaded guilty to a federal felony charge of possession of illegal > >interception devices and was sentenced last year to five years > >probation. > > > =================================================================== > Everybody's into computers... Who's into yours?Å > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Lizard, The Other White Meat > =================================================================== > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1223 From: Jordan Ulery Date: Tue Aug 15, 2000 10:16am Subject: Intern Seeking Position The following was posted on the Defense Investigator's list. I offered to post on other lists and the lady agreed. I do not know the woman, and am posting merely as a good deed (or as Sister would say , a corporal work of charity). At any rate: Sheila Leigh Bond wrote: > Good Afternoon Everyone, > > My name is S. Leigh Bond and I am a computer professional interested > in blending my present knowledge of IT Security into a career in > private investigation. I am interested in learning the business from > the ground up and hope to find a PI firm in the Philadelphia (PA) > area that would be interested taking on a NON-salaried intern. 1224 From: Date: Tue Aug 15, 2000 0:19pm Subject: BLack Ice Defender Anti-Virus/Hacker Software Heard this software is pretty good for security concerns. HAVE A GREAT DAY !!! ---------- http://www.networkice.com/ [Non-text portions of this message have been removed] 1225 From: Robert G. Ferrell Date: Tue Aug 15, 2000 0:52pm Subject: Re: BLack Ice Defender Anti-Virus/Hacker Software >Heard this software is pretty good for >security concerns. If you have a high speed (xDSL or Cable Modem) always-on Internet connection and are running any Windows OS, Black Ice Defender is your first and best line of defense. IMO. RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 1226 From: David Miller Date: Tue Aug 15, 2000 1:13pm Subject: RE: BLack Ice Defender Anti-Virus/Hacker Software Here is a URL that compares the personal firewalls (of which BlackIce is one). http://securityportal.com/cover/coverstory20000717.html -----Original Message----- From: Robert G. Ferrell [mailto:rferrell@r...] Sent:Tuesday, August 15, 2000 12:53 PM To:TSCM-L@egroups.com Subject:Re: [TSCM-L] BLack Ice Defender Anti-Virus/Hacker Software >Heard this software is pretty good for >security concerns. If you have a high speed (xDSL or Cable Modem) always-on Internet connection and are running any Windows OS, Black Ice Defender is your first and best line of defense. IMO. RGF Robert G. Ferrell, CISSP [Non-text portions of this message have been removed] 1227 From: Date: Tue Aug 15, 2000 3:04pm Subject: Court Throws Out Wiretapping Rules Court Throws Out Wiretapping Rules .c The Associated Press By KALPANA SRINIVASAN WASHINGTON (AP) - A federal appeals court dealt law enforcement authorities a setback Tuesday in their efforts to keep criminals from using such telephone features as conference calls and call-forwarding to thwart surveillance. The court determined that the Federal Communications Commission failed to adequately take into account consumer privacy concerns and costs imposed on the industry when the agency required surveillance capabilities added to the telecommunications network. The decision could also have implications for the FBI's new ``Carnivore'' surveillance system, which can monitor e-mails. One provision thrown out by the court required phone carriers to provide to law enforcement agents all numbers dialed after the subject of a wiretap order connects a call. That was intended to ensure authorities could get the actual number being called, even if a suspect first used a 1-800 number or a calling card. Privacy groups had argued that the provision could give authorities access to information beyond the scope of the wiretap such as credit card or bank account numbers. A three-judge panel of the U.S. Circuit Court of Appeals for the District of Columbia agreed and sent that back to the commission. Another provision struck down would have given investigators information about all parties to a conference call, even if some are put on hold and are no longer talking to the target of the legal wiretap. Authorities with a court order also could have determined when someone was using call-forwarding, three-way calling or other features or when that person placed a call even if it was not completed. Privacy groups, which had challenged the rules saying they expand government surveillance beyond what the law permitted, applauded the court action. ``The court told the FCC that it was wrong to give in to the FBI's surveillance demands at the cost of privacy,'' said James X. Dempsey, Center for Democracy and Technology, a privacy advocate. The United States Telecom Association said the items thrown out by the court would ``only serve to impose extraordinary and unnecessary costs on carriers'' and possibly raise phone rates for residential customers. The FCC's rules, set in place nearly a year ago, helped to implement a 1994 wiretapping law. The agency stepped in after the Justice Department, FBI and the telecommunications industry failed to agree on a plan. Federal officials expressed hope that the court's concerns can be addressed to keep the rules in place. ``Essentially, we're seeing now folks engaged in criminal activity using those types of technology to thwart law enforcement,'' said Stephen Colgate, assistant attorney general at the Justice Department. For example, some might use calling cards to frustrate agents, he said. Tuesday's ruling upheld provisions that require telecommunication carriers to provide information on so-called digital packet-switched communications. In these types of communications, calls are broken up into a number of data packets carrying both identifying information and content. These packets travel different routes on the network and are reassembled at their destination. Privacy advocates had argued that because the content and the information identifying the caller cannot be separated, the government would get more than a simple trace order allowed. The court did stipulate in its decision that law enforcement agencies still need lawful authorization to intercept content. That typically would require officials to meet a higher standard such as those of a search warrant. Privacy groups said the court's assertion could have implications for Carnivore, the FBI's court-approved system for monitoring people's e-mail messages. ``The court has clarified the legal standards that law enforcement must meet before monitoring new modes of communications. The decision calls into question the legality of the FBI's controversial Carnivore system,'' said David Sobel, general counsel of the Electronic Privacy Information Center. Colgate said the Justice Department will take into account the court's decision as part of its ongoing review of Carnivore. The court also left in tact a provision that allowed police, with a judge's permission, to track cellular phone users by their location at the beginning and end of a call. On the Net: Court opinion available at http://www.cadc.uscourts.gov/ Federal Communications Commission site: http://www.fcc.gov/ Electronic Privacy Information Center: http://www.epic.org/ Justice Department: http://www.usdoj.gov/ United States Telecom Association: http://www.usta.org/ 1228 From: Date: Tue Aug 15, 2000 1:54pm Subject: RE: BLack Ice Defender Anti-Virus/Hacker Software Decent package combining packet filtering with intrusion detection. Many people don't realize that cable modem/DSL/etc. connect your system to the Internet 24/7. Firewalls should be mandatory for anyone who wished to retain control of their systems. Good Points =========== Friendly administration. Automaticly updates firewall rules to deny attackers. Automated intruder traceback. Good pricing/support model. Bad Points ========== Runs on the user system. Good for a mobile laptop, but generally bad for a LAN situation. Firewalls should be on their own system. Only runs on Windoze systems. A program can only be as secure as the OS it is running under. The automated intruder traceback can itself be interpreted as a scan attack. The automatic firewall rule update is of limited value. What I Do ========= I have a small LAN in my home with a few systems on it for my kids and I. I use a separate Pentium 120 based system as my firewall/gateway to my ISP. I run OpenBSD ( http://www.openbsd.org ) with ipf and ipnat and NOTHING else. I am not running any servers, so I don't allow incoming traffic, anyway. My user systems all run Norton Anti-virus with Live Update scheduled weekly. If anyone has any questions, feel free to email me off-list. Bob Washburne - Computer Security Specialist and Professional Paranoid rcwash@c... Minor rant: The term "black ice" was coined by William Gibson in his cyber-punk novels. In his world people had interfaces installed in their brain and they would "jack in" to the net. ice - software copy protection grey ice - copy protection which would damage the attacker's computer (kind of like the old C=64 software which would jam your disk drive if it thought it was copied.) black ice - copy protection which would kill the attacker him/herself (remember, their brain is directly connected to the net...). So to call you program "black ice" is about as pretentious as placing a ninja icon in your TSCM ad (or wearing any of those funky costumes the list was ranting about earlier.) --- Original Message --- patedwards@w... Wrote on Tue, 15 Aug 2000 13:19:54 -0400 (EDT) ------------------ Heard this software is pretty good for security concerns. ---------- http://www.networkice.com/ ----- Sent using MailStart.com ( http://MailStart.Com/welcome.html ) The FREE way to access your mailbox via any web browser, anywhere! 1229 From: Agent_X Date: Tue Aug 15, 2000 0:37pm Subject: Re: BLack Ice Defender Anti-Virus/"cracker" Software >Heard this software is pretty good for >security concerns. > > > > > > HAVE A GREAT DAY !!! > > > > ---------- > >http://www.networkice.com/ > >Here are two know issues with Black Ice NetworkICE BlackICE High UDP Port Block Delay Vulnerability NetworkICE BlackICE Defender and Agent do not block incoming UDP port connections above 1021 when configured with either the Trusting, Caution, or Nervous setting. Back Orifice 1.2 utilizes a high UDP port by default, thus any command issued by a Back Orifice client can go unprotected by BlackICE. The infected machine's reply will trigger IP address blocking by BlackICE. A small time gap exists between the issue of the first Back Orifice command and the time at which BlackICE blocks the offending IP address. The number of Back Orifice commands that can bypass BlackICE depends on the speed the remote user can execute them (the commands can be easily automated with scripts to increase the speed or can be launched from different IP addresses). BlackICE may be vulnerable to other malicious attacks originating from UDP based programs. NetworkICE ICECap Manager Default Username and Password Vulnerability ICECap Manager is a management console for BlackICE IDS Agents and Sentries. By default, ICECap Manager listens on port 8081, transmits alert messages to another server on port 8082, and has an administrative username of 'iceman' possessing a blank password. A remote user could login to ICECap manager through port 8081 (using the default username and password if it hasn't been modified) and send out false alerts. In addition, the evaluation version of ICECap Manager has the option of utilizing Microsoft Access' JET Engine 3.5. This creates a security hazard because JET Engine 3.5 is vulnerable to remote execution of Visual Basic for Application code. Therefore, remote users may execute arbitrary commands on ICECap Manager through the use of the default username and password and JET Engine 3.5. More information can be found regarding the JET Database Engine 3.5 vulnerability at the following URL: http://www.securityfocus.com/bid/286 -- Agent X PGP Keys available by request. PGP Fingerprint (6.5.2) : 1953 A923 9B1F C710 5C94 AE05 E0BA F51F E9B6 AD85 PGP Fingerprint (2.6.2): 8C 9A BE D5 41 3F 96 C8 D2 8C 1D B1 5F 59 55 FF 1230 From: Ian Carter Date: Wed Aug 16, 2000 2:14am Subject: Re: BLack Ice Defender Anti-Virus/Hacker Software > Heard this software is pretty good for > security concerns. Black Ice is a nice firewall and AtGuard was also, till it was purchased for the Norton Internet Security program - (AtGuard was great at blocking out those annoying adverts). Personally I now use Black Ice and ZoneAlarm "both at the same time" * Black Ice because of its reliability (and reasonable cost) and Zone Alarm because its free, and blocks your outgoing ports which Black Ice does not. Together and programmed properly (ZoneAlarm, especially) they do make a formidable team. As an extra I use StealthLogger (Its a Key Logger and activity generator) which compiles an account of everything that happens to my computer,, what I type, what programs are in use etc. (A great file to back-up in case of crashes). It also has the facility to covertly email what I have done to any email address I choose, although I don't use that facility on my computer - but of course it could be useful. (Yes there are other programs that can do the same and catch pictures of the screen but, this one is so small its virtually unnoticeable). Reading between the lines - - Black Ice would not pick up the actions of StealthLogger - but ZoneAlarm would as it protects both the receiving and 'sending' through modem ports. StealthLogger, well,, enough said... Best Regards - Happy Computing - Ian. PS: * Whenever you install a program 'ALWAYS' close down everything else, then shut down and reboot. This avoids program conflicts later (crashes) between their operating files. 1231 From: James M. Atkinson, Comm-Eng Date: Wed Aug 16, 2000 9:55am Subject: Stalker Thread, NY Man Arrested For Threatening Lieberman Good Monring, In private sector TSCM we occasionally have to deal with a "raving lunatics and crackpots with stalker mentalities". Due to this I thought the following article would be of interest to the list. I would also like to suggest that the list discuss how to deal with such problems, how to handle "techno-stalkers" and review services and advice that we can offer our clients to counter the misuse of technology against them. On the one hand we may have a client (a CEO for a Fortune 500 firm) who wants their cat swept for "Implanted Orgonian Tracking and Surveillance Devices" who really needs to get therapy (God bless the X-Files). On the other hand we may have an attorney contact us who is being stalked by an ex-client who has bugged their phones and is constantly following and terrorizing them. -jma =========================================================== NY Man Arrested For Threatening Lieberman http://news.excite.com/news/r/000815/17/campaign-lieberman-threat Updated 5:52 PM ET August 15, 2000 By Gail Appleson, Law Correspondent NEW YORK (Reuters) - A 23-year-old New York man was placed under house arrest Tuesday on charges that he made a death threat to Sen. Joseph Lieberman, the Democratic vice presidential choice, during the Howard Stern radio talk show. Lawrence Christian Franco, who works in the paper distribution department at Newsday in Long Island, was arrested late Monday night by the Secret Service at his Farmingdale home. He was arraigned in Brooklyn federal court Tuesday afternoon. A federal magistrate judge placed him under house arrest, ordered him to wear an electronic monitoring bracelet and undergo a psychiatric examination. The magistrate also barred Franco from using the phone without the permission of his father, with whom he lives. If convicted of threatening to kill or inflict harm upon a major candidate for the office of vice president, Franco faces up to three years in prison. According to court papers, Franco had called the Howard Stern show at about 6:25 a.m. Monday and identified himself as "Nazarene." After an assistant screened Franco's call, he was allowed to go on the air and allegedly threatened to kill or harm Lieberman. Court papers said that Franco allegedly said that he "hates that Jesus crap. So that Lieberman guy has gonna go. He is gonna take my bullet. He's going to take it." When Stern asked Franco whether he was threatening Lieberman, Franco replied that he was "not threatening, I'm telling you right now. ... You got the killer on the air. ... And that is me right here." Stern told Franco that when callers make inflammatory statements that appear to be threats, law enforcement authorities take the comments seriously. Stern then told Franco that if he was joking, he should say so. Instead of apologizing, Franco then allegedly made additional threats against Lieberman and law enforcement in general. "I hate church. I hate churchgoers. I hate them all," he allegedly said. When Stern warned him that the FBI might come to his door, Franco allegedly responded "I'll kill them, I'll kill them all." He allegedly repeatedly said he was not joking and would have "guns out the window" if the FBI came to his home. The Secret Service traced the call, which lasted about five minutes, and determined that it came from Franco's home. Court papers said the occupants of the home allowed them to search Franco's room where they found a pellet gun. When Secret Service agents located Franco, he allegedly admitted making the call and said he had chosen Lieberman as a target because the Connecticut Senator had been popular topic on the Howard Stern Show. Lieberman, who was named by Al Gore last week as his vice presidential running mate, is an Orthodox Jew. He came to national prominence in September 1998 when he was the first Democratic senator to denounce President Clinton's affair with White House intern Monica Lewinsky as morally wrong. However, Lieberman voted against impeachment. He has also been an outspoken critic of the entertainment industry for years and Tuesday he lashed out at Hollywood for promoting sex and violence on screen. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== From: Cornolio Date: Tue Aug 10, 2004 5:33am Subject: Re: NSA using latest commo intercept technology On Mon, Aug 09, 2004 at 09:18:39PM -0700, Samizdatt wrote: > Although this may be an off-topic question, I think it's somewhat relevant to this thread. > > I recently found a posting to the "alt.privacy" news group that asks a question about the merits of Mixmaster anonymous remailers$ > > POST: > > Do anonymous remailers like Mixmaster provide true anonymity, > or is it better to use steganographic software like Steghide, > available at: http://steghide.sourceforge.net/ to post to > pornographic news groups like: > > alt.binaries.erotica > alt.binaries.pictures.amateur > alt.binaries.pictures.amateur.female > alt.binaries.pictures.erotica > > Basically, I'd like to know if anyone can be sure that a TLA > isn't running the remailers, or hasn't compromised the remailer's > private key using the methods outlined in the post below. > > Isn't it safer to control your own security than to blindly trust > a remailer network? It is all a matter of trust. I know a lot of knowledgeable people use remailers, and trust them. And if you use a chain of them this will improve security (but more risk to lose mail). I know a few remailer operators personally, and trust them with what they do. However, you can _never_ be 100% sure. Maybe driving around and looking for an open 802.11 network might be a better solution. Or combine mixmaster and wardriving to enhance security. > But they tunneled over from the house next door. They > came in under the driveway and broke through behind a > false wall next to a fireplace in the downstairs > family-room. They moved along a short crawlspace and > entered the livingspace just behind the furnace. > > Their cover was clever. They used a ruse of major > renovations next door to conceal the sound the tunnel > crew made. > > Their mistake? Not enough attention to detail. They > didn't match the original panel when they replaced the > wall behind the furnace. Vickie and I had done a > complete inspection of her house two months earlier. > We both spotted the bogus panel immediately. She still > becomes furious when she talks about it. > > The reason the goons like to break in through walls is > simple - it's extremely difficult to defend against. > But simply being able to detect that you've been > penetrated gives you an advantage, especially if you > don't reveal you're on to them. This whole story sounds a little fishy to me. I know for a fact that almost no lock is resistant against an N.D.E operation (Non Destructive Entry) from government agencies. A lot of time and money is put in circumventing locks, and the people who make tools to bypass the locks obviously have more skills than the people designing locks. And if they can not pick the lock they will simply drill out the lock, leaving the relevant pins intact. They will then put the old pins in a new lock, and mount it in the door for you ;) No need to go trough the wall in other words ... If you would like to know more about locks and security, I urge you to buy this book : http://www.security.org/dial-0/lss.htm We call it the 'lock bible', since almost any lock and locking mechanism is covered in it, and how it can be bypassed! The multimedia supplements are also a great resource, and the people with a government background can get access to some real interesting classified information regarding bypassing locks and alarm systems! For those of you who would like to learn some openings techniques for free, you can download some video's I put online : http://connect.waag.org/toool/ http://connectmedia.waag.org/toool/h2k2-lockpicking-vcd.mpg http://connectmedia.waag.org/toool/h2k-lockpicking.wmv With regards, Barry Wels 9350 From: G P Date: Tue Aug 10, 2004 6:07am Subject: Friends and Family of Frankie Boy Cilluffo Credited with coining the term "Homeland Security", FOW Frankie Boy Cilluffo had the curious foresight to mention an attack on US soil less than one week prior to the events of September 11 - more on that one later. Cilluffo and Co.'s MO is quite simple - pollute your company with lackey covert operatives, introduce you to foreign nationals "on the radar" by the US intelligence community, incite a FISA-sanctioned investigation, be conveniently prepared to scoop up the corporate assets and intellectual property while you're out to lunch dealing with a Spy vs. Spy fiasco in the company you built - viola, hostile takeover. The first of a multi-part series, entitled "Friends of Frankie Boy Cilluffo, Russian Organized Crime Expert Extraordinaire": ---------- Memorandum of Understanding BISHKEK, KYRGYZ REPUBLIC14 February 2000 PREAMBLE WHEREAS, Dr. Alexei VOYCHINSKY, Managing Director of TEK-P, St. Petersburg, Russia, Marat D. SHARSHEKEEV, President of Joint-Stock Company ìAKMARALî Corporation, Bishkek, Kyrgyz Republic, Emil U. BAIKOV, Managing Director of Company ìSECATELî, and Rafail R. GALIAMOV, Managing Director of Company ìSECATEL-XXIî (also acting as Agent for Telecom Equipment Corporation), met with Andrey V. TITOV, Director of National Agency of Communications of Kyrgyz Republic and Nickolay F. NICKOLAEV, Deputy Director of National Agency of Communications of Kyrgyz Republic on 14 February 2000 for the purpose of discussing a certain High Capacity Microwave Communications System, and WHEREAS, The National Agency of Communications of Kyrgyz Republic believes deployment of this High Capacity Microwave Communications System to be of interest and benefit for the Citizens, Residents and Businesses of the Kyrgyz Republic, THEREFORE, Telecom Equipment Corporation and the National Agency of Communications of Kyrgyz Republic have agreed to take the following action: RECITALS Telecom Equipment Corporation shall establish the national enterprise TEK-KYRGYZSTAN. TEK-KYRGYZSTAN/SEKATEL-XXI shall be authorized to provide the following subscription services to the Citizens, Residents and Businesses of the Kyrgyz Republic: Single and Multi-Channel Video Services; Single and Multi-Channel Radio Services; Data Services; Internet Services; and Telephony, by means of wireless radio broadcast, cable, or any combination thereof, including construction, use and operation of earth stations (both Uplink and Downlink) to facilitate the transmission and reception of satellite and terrestrial radio signals, and employing any means and methods of modulation (analogue, digital, or any combination thereof) and format. The National Agency of Communications of Kyrgyz Republic, in support of and in agreement with this above-named System and Enterprise, shall grant to SEKATEL-XXI, in accordance with the laws of the Kyrgyz Republic, the following radio frequency band allocations, with all appropriate operating authorities and business licenses: 27.5 GHz ~ 29.5 GHz; 31.0 GHz ~ 31.9 GHz; and 40.5 GHz ~ 42.5 GHz. ACKNOWLEDGED AND AGREED TO this ______ day of February, 2000. Andrey V. TITOV Director of National Agency of Communications, Kyrgyz Republic ___________________________ Nickolay F. NICKOLAEV Deputy Director of National Agency of Communications, Kyrgyz Republic ___________________________ Marat D. SHARSHEKEEV President of Joint-Stock Company îAKMARALî Corporation Bishkek, Kyrgyz Republic ___________________________ Rafail R. GALIAMOV Managing Director of Company ìSECATEL-XXIî Bishkek, Kyrgyz Republic ___________________________ Emil U. BAIKOV Managing Director of Company ìSECATELî Almaty, Kazakhstan ___________________________ Dr. Alexei VOYCHINSKY Managing Director of ìTEKñPî St. Petersburg, Russia ___________________________ __________________________________ Do you Yahoo!? Yahoo! Mail is new and improved - Check it out! http://promotions.yahoo.com/new_mail [Non-text portions of this message have been removed] 9351 From: G P Date: Tue Aug 10, 2004 6:11am Subject: Friends and Family of Frankie Boy Cilluffo 14 January 2000 Mr. Rovshan Kerkakov State Committee of Communications and Informatization of Turkmenistan Re:High Capacity Microwave Communications System Dear Chairman Rovshan Kerkakov: I hope you have had the opportunity to enjoy a Merry Christmas, and best wishes for a Happy New Year! We are very pleased with the positive response we have received from your government, its citizens, and the business and educational communities of Turkmenistan for this project, and thank you for the opportunity to share with you our thoughts and philosophy on why we have proposed this business venture, the benefits to be recognized by the citizens of Turkmenistan, and the required frequency allocations necessary to deliver these services. Our proposal for development of a High Capacity Microwave Communications System is, in fact, a proposal to establish a national Enterprise and develop a wireless communications network utilizing TEC technology to provide a variety of telecommunications services in Turkmenistan. These services include Video and Audio Programming in both analogue and digital formats, High-Speed Data/Internet Services, and Telephony, brought together within a single operation, and to be used and supported by the citizens served by the business. A critical requirement to achieving long term success will require the Enterprise to rely on other local businesses to help establish, maintain and expand its operations. In order to meet this objective, TEC intents to use its technology to educate, train and employ local technicians, service and broadcast personnel. We envision a cooperative effort with the local Universities to help develop the required technical and engineering courses, and design and develop ìDistance Learningî programs which would be available to subscribers and extend delivery of educational material beyond the traditional service area of the Universities. This particular aspect of the project is of great interest to faculty at Kyiv Polytechnical Institute and Kharkov University. We believe this Project will serve the public interests of the citizens of Turkmenistan by providing the following initial benefits: Promote the provision of a wide range of telecommunication services in the interest of the economic growth and development of Turkmenistan; Encourage the development of human resources in the telecommunications industry, including the empowerment and advancement of women in the telecommunications industry; Encourage investment and innovation in the telecommunications industry; Promote small, medium and micro-enterprises within the telecommunications industry; Encourage ownership and control of telecommunication services by persons from historically disadvantaged groups; and Ensure that, in relation to the provision of telecommunication services, the needs of the local communities and areas are duly taken into account; 14 January 2000 Mr. Rovshan Kerkakov State Committee of Communications and Informatization of Turkmenistan Page 2 Over a longer term, we believe this Project will: Ensure fair competition within the telecommunications industry; Promote the universal and affordable provision of telecommunication services; Make progress towards the universal provision of telecommunication services; Protect the interests of telecommunications users and consumers; and Promote the development of telecommunication services which are responsive to the needs of users and consumers. We believe that all these Benefits and Objectives may be achieved with the cooperation and support of Turkmenistan. In particular, we envision a broad range of video programming, including retransmission of digital satellite programming in the 40.5 GHz to 42.5 GHz radio frequency band, a combination of local, informational and educational programming in analogue format in the 27.5 GHz to 29.5 GHz radio frequency band, along with downstream data, and wireless local loop and back channel data/telephony in the 31.0 GHz to 31.9 GHz radio frequency band. We at TEC again thank you and the Committee for taking an active interest in our proposal. We welcome your guidance and look forward to any comments you or your staff may have regarding this Project or the required radio frequency allocations and operating authorities required in order to expedite the establishment and operation of this Enterprise. Sincerely, Dr. Alexei M. VOYCHINSKY, Ph.D., ìTEK-Pî Managing Director Personal E-mail: Voychi@F... __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com [Non-text portions of this message have been removed] 9352 From: savanted1 Date: Tue Aug 10, 2004 11:30am Subject: Surveillance Access to VoIP and Internet Broadband In a 5-0 ruling, the Federal Communications Commission (FCC) ruled in favor of a Federal Bureau of Investigation (FBI) and Justice Department proposal that compels Internet broadband and Voice over Internet Protocol providers to ensure law enforcement agencies can easily conduct surveillance on their networks. The ruling is open for public comment before taking effect. The Electronic Frontier Foundation, the American Civil Liberties Union, the Electronic Privacy Information Center and the Center for Democracy and Technology have all filed comments opposing the plan. http://www.theregister.co.uk/2004/08/05/fcc_approves_taps/print.html Related Article: Web-Tapping Battle Lines Drawn http://www.theregister.co.uk/2004/04/15/webtapping_battle/ 9353 From: G P Date: Tue Aug 10, 2004 6:18am Subject: more Cilluffo blowback 30 November 1999 Mr. Simon Henshaw Chief, Consular Section U.S. Consulate General Ulitsa Furshtadskaya, 15 191028 St. Petersburg RUSSIA Re: Letter of Introduction - Telecommunications Equipment Corporation Dear Mr. Henshaw: I had the opportunity to meet with Mr. Stuart L. SCHAAG and Ms. Maria CHERNOBROVKINA of the Commercial Service on Monday, 29 November. The purpose of the meeting was to introduce Telecommunications Equipment Corporation (ìTECî) and two members of our St. Petersburg management team, Dr. Isaak STEIN and Mr. Harry BAINDURASHVILI. Dr. Isaak STEIN is our local Managing Director; Mr. BAINDURASHVILI is our Director of Technical Installations and Quality Control for Eastern Europe. In response to an earlier inquiry regarding U.S. visas for current and/or prospective employees, Mr. Schaag has suggested I provide you with background material on TEC, its operations and intentions for Eurasia. Founded in 1992 and established as a Florida Corporation on 01 February 1993 (See enclosed copy of Articles of Incorporation), TEC is involved in the development of High Capacity Microwave Communications Systems - wireless broadband networks which will support Video, Data and Telephony. Our work in this area, a collaboration between TEC and Florida Atlantic University, has resulted in the grant of both U.S. and foreign patents for High Frequency Transmitters (Pending or granted in 30+ countries) and Broadcast Methodology (Pending or granted in 80+ countries). Dr. Thomas Wong, Ph.D., Professor and Director of the Microwave Laboratory at Florida Atlantic University, is the Inventor of Record and serves as the Director of Research and Development for TEC. A Non-Technical Summary describing our primary patents is enclosed for your reference. In conjunction with the grant of Eurasian Patent Number 444 this past summer (prosecuted by St. Petersburg Patent Attorney Vladimir RYBAKOV, ARS-Patent, Tel: (812) 312-1571), TEC commenced its Eurasian initiative with the formation and registration of ìTEK-Pî in St. Petersburg, with offices at 5 Promishlennaya Street, 198099, and the appointment of Dr. Isaak STEIN as our local Managing Director [Tel/Fax: (812) 186-7790/252-8726]. Our recent participation at the trade show TRBE í99 (Tele-Radio Broadcast Exposition and Conference) held 01 ~ 04 November in Moscow exceeded our expectations. With interest expressed throughout much of Eastern Europe, we accepted invitations to visit companies and institutions in Moscow, Alamaty, Kyiv and Minsk the week following the show. Our hosts, in two instances, arranged for waiver of entry visa requirements in order to conclude negotiations commenced during the Show, and others expedited the processing of multi-year multiple entry visas. I have now returned to Russia 28 November for a series of meetings in St. Petersburg and Moscow, before leaving for meetings in Almaty, Bishkek, Baku, Tblisi, Chisinau, Lviv, Kaunas/Vilnius, Riga/Daugavpils and Brussels. 30 November 1999 Mr. Simon Henshaw Chief, Consular Section Page 2 The weekend before returning to the U.S. on 15 November was spent conducting numerous interviews and discussing the commencement of a captive manufacturing and assembly operation in St. Petersburg. We have also hired Mr. Harry BAINDURASHVILI as our Director of Technical Installations and Quality Control for Eastern Europe, effective 01 January 2000. Mr. Baindurashvili has over twenty years of microwave and video broadcasting experience, and was most recently the General Director for Viewsonics-Russia. We continue to interview qualified candidates to staff seven (7) pilot deployments in six (6) countries scheduled for next summer, and will conclude acquisition discussions for companies in Kazakhstan and Ukrainia during our December travels. We anticipate employing a number of local technicians, engineers and other professionals, some of which will be required to travel to the U.S. for employment interviews or collaboration with our Research and Development Group. Therefore, I am very interested in understanding the scope of services available through your Consular Section, as well as becoming familiar with the requirements to secure single or multiple-entry visas for members of our St. Petersburg office, or single entry visas for certain employment-related interviews of prospective candidates, for travel to the United States. Enclosed with this correspondence are Letters of Support for two visa requests. I would ask that you please give these requests your support. It appears that I will be spending a minimum of two (2) weeks per month in Eastern Europe, and most trips will either commence or terminate with a visit to St. Petersburg. Although time is short this trip, perhaps we will have the opportunity to meet with you in the future and address any questions you may have regarding subsequent visa requests. Sincerely, Dr. Alexei VOYCHINSKY, Managing Director, TEC __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com [Non-text portions of this message have been removed] 9354 From: G P Date: Tue Aug 10, 2004 6:15am Subject: Friends and Family of Frankie Boy Cilluffo 19 October 1999 Seidov Farruh Mamed ogly Baku AzerbaijanE-mail: creator@i... Tel./Fax: +10 - 99412-600657 Dear Mr. Seidov: We are very pleased to hear that you are willing to accept our proposal to appoint you as Managing Director of TEC-OC (Operating Company)/Oblast of Baku. This marks the beginning of a long and successful relationship with our team! OVERVIEW We will move forward with two (2) paths. As I have described to you, TEC is to establish two local companies: TEC-AZ. TEC-AZ will be the Daughter Company of TEC, and will be the Holder of the Spectrum Rights and frequency licenses. TEC-OC. UA will be the Daughter Company of TEC, and will be Operating Company for all TEC operations in Azerbaijan. The TEC patent attorneys for Azerbaijan are located in Baku. Perhaps with your assistance, the patent attorneys (or a legal attorney affiliate of the patent attorneys) will be able to expedite the preparation and filing of registration documents for TEC-AZ and TEC-OC. Prior to your formal appointment as Managing Director of TEC-OC (Operating Company)/Oblast of Baku, and to avoid any conflict of interest, we ask you to: Secure the necessary licenses and authorizations for establishing the Operating Company (ìTEC-OCî) Enterprise in Azerbaijan. Negotiate the most favorable one-time ìGovernment paymentsî to the Committee on Communications. Confirm in writing your ability to secure substantial operating loans from one or more major Western European financial institutions at favorable rates. We outline our initial plans here, and the following pages will describe in detail the specific requirements. If you are in agreement, we will ask our attorneys in Azerbaijan to formalize this letter into proper legal form. You have discussed with me your interest and ability to assist our initial efforts to establish a National Enterprise in Azerbaijan. These discussions include: Secure the necessary licenses and authorizations for establishing the Operating Company (ìTEC-OCî) Enterprise in Azerbaijan. You have agreed to secure the necessary licenses and authorizations for establishing the Operating Company (ìTEC-OCî) Enterprise in Azerbaijan, and have stated your ability to: Secure an appropriate Allocation of Spectrum for TEC equipment. No other manufacturer or system operator will be allowed to sell or deploy wireless broadband equipment. Secure the License for TECís spectrum allocation. 19 October 1999 Farruh Mamed ogly SEIDOV Page 2 Arrange and secure the proper Operating Company business licenses and authorizations to operate video, data and telephony networks throughout AZerbaijan. Acquire all necessary authorizations for TEC system operation and deployment, including design, construction, operation and certifications. In addition, you have also stated: You guarantee that all necessary documents will be approved and issued no later than 29 October 1999. (Let us discuss this specific requirement and explore available alternatives). All documents will have protection during audit, different inspections and exams regarding issue of licenses and authorizations. The grant of all necessary licenses, operating permits and authorizations will be issued by the Committee on Communications to TEC-AZ or TEC-OC on an exclusive basis. Negotiate the most favorable one-time ìGovernment paymentsî to the Committee on Communications. The initial enterprise will require licenses and authorizations for the Oblasts of Baku, Hiandja, Sumgait, and Ali-Bairamly. You have agreed to negotiate the most favorable one-time ìGovernment paymentsî to the Committee on Communications. We understand these one-time fees will be payable once the license(s) are granted. We further understand that annual renewal fees will be of a minimal amount, and may be deferred at the option of the Company until the operations become profitable. Our hope is that both the Committee and the Oblasts recognize the commitment TEC is willing to make and because of our unique approach, we expect to add significantly to the local economies through assembly and manufacturing, employment of local engineers and technicians, training programs with the local universities, etc. Perhaps with this commitment, the Committee on Communications will accept little or no ìone-timeî payment (or defer payment of the one-time fee until we become profitable). Alternatively, if the Committee and the Oblasts require a significant one-time payment, then perhaps we could pay these fees over some period of time. Clearly, all parties should work to make this successful, because when TEC is successful, the quality of life will be better for Azerbaijan and his citizens. We will have to begin a substantial investment in Azerbaijan - time, money, technology and training - and from a business perspective, it would be better to focus all resources on system development and buildout, and locating and training engineers and technicians. We also recognize that competing with government-subsidized stations could become very tricky and complicated. We ask the Committee to help ensure success - success which would benefit the Azerbaijanian people for a long period of time. Yes, our approach is different. Confirm in writing your ability to secure substantial operating loans from one or more major Western European financial institutions at favorable rates. We will establish TEC-Operating Company (ìTEC-OCî) to operate the wireless network. This Company will have its headquarters in Baku. TEC-OC will require substantial capital investment and operating loans in order to deploy sufficient quantities of equipment and operate efficiently. 19 October 1999 Farruh Mamed ogly SEIDOV Page 3 You have represented that you have access to equity capital and operating loans. We have agreed to compensate you for all successfully arranged operating loans and equity investments which are acceptable to TEC [in the sole opinion of TEC] and are concluded on a satisfactory basis within six months from the date of this letter. We will pay you a commission or ìfinderís feeî which is to be calculated at one-percent (1% or .01) times the capital or operating loans actually closed or invested in TEC-OC. By way of example, if you are able to successfully secure an operating loan of USD$15 million (or equivalent) for TEC-OC under conditions acceptable to TEC, you will earn a commission of USD$150,000, payable upon closing. You will also have the opportunity to purchase up to five-percent (5%) of TEC-OC, at a fifteen-percent (15%) discount from the per-share price which other investors purchase their shares in TEC-OC. We will have the option to purchase your interest in TEC-OC. You can expect a high level of support from members of our engineering staff and me. It is our intention to move forward in a fast and efficient manner, and support your activities in a meaningful way. We have an ambitious schedule before us, and we believe in a high level of collaboration in order implement our Business Plan for Azerbaijan. I intend to be active in your discussions to secure operating loans and local investment. We will be involved from the beginning, to ensure success for ALL of us. Managing Director of TEC-OC (Operating Company)/Oblast of Baku. The headquarters of TEC-OC will be located in Baku, and we are very pleased that you wish to serve as the Managing Director of TEC-OC/Baku. Success in Baku will mean success through AZERBAIJAN. We look forward to discussing our strategy for Baku with you, and working with you to develop a Comprehensive, Multi-Year Business Plan. I will develop jointly this Plan. This Plan will make TEC-OC the main wireless network provider of video programming within the metropolitan areas of Azerbaijan, as well as one of the vendors of choice for Data/Internet services. Once our position is firm, we will begin offering fixed wireless local loop to our video and data subscribers. We are very pleased that you will be part of our Team! As the Managing Director, you will develop with us, and then be responsible for the successful implementation of the TEC Business Plan in Baku. This position will require you to commit at least 80% of your time to TEC-OC and related matters. You will be compensated for successful efforts and achieving specific goals, objectives and rates of deployment, and will be independent of any commission compensation you may earn from placing equity capital and operating loans. I am very pleased that we have been able to treat these discussions with you as a very high priority. It is our hope that you will find this proposal acceptable, achievable and rewarding for you. We look to formalizing your acceptance of these discussions within the next few days, in order to meet the target date of 29 October as noted above (or alternative, as agreed) for the issue of all necessary approvals and documents. Sincerely, Dr. Alexei Voychinsky, Ph.D __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - Send 10MB messages! http://promotions.yahoo.com/new_mail [Non-text portions of this message have been removed] 9355 From: Dragos Ruiu Date: Tue Aug 10, 2004 0:17pm Subject: RE: Police Used Laptops To Duck Calls [Mildly OT] On Tue, 2004-08-10 at 01:58, David Alexander wrote: > What gets me is that the Dispatcher had been allowed to have the same > password for at least 2 years. To avoid just such abuse, the system should > have been set to force a change every 90 days In some cases a GOOD password they can remember, can be much better than a BAD easy to remember password changed very often. Sometimes rapidly changing password policies can have a counter-intuitive effect on overall security. cheers, --dr 9356 From: Agent Geiger Date: Tue Aug 10, 2004 0:15pm Subject: Re: (ot) weapons of math instruction rofl --- Lawrence Dillard wrote: > At New York's Kennedy airport today, a high school > teacher was arrested > trying to board a flight with a ruler, a protractor, > a > setsquare, a slide rule and a calculator. > Attorney General John Ashcroft said he believes the > man is a member of > the notorious al-gebra movement and is charged by > the > FBI with carrying weapons of math instruction. > "Al-gebra is a fearsome cult," Ashcroft said, "They > desire average > solutions by means and extremes, and sometimes go > off on > tangents in a search of absolute value. They use > secret code names like > 'x' and 'y' and refer to themselves as 'unknowns,' > but we > have determined they belong to a common denominator > of the axis of > medieval with coordinates in every country. Besides, > the > Greek philanderer Isosceles used to say there are 3 > sides to every > triangle," Ashcroft declared. > President Bush said, "If God had wanted us to have > better weapons of > math instruction, he would have given us more > fingers and > toes. "I am gratified that our government has given > us a sine that it is > intent on protracting us from these math-dogs who > are willing > to disintegrate us with calculus disregard. Murky > statisticians love to > inflict plane on every sphere of influence," the > President said, > adding: "Under the circumferences, we must > differentiate their root, > make our point, and draw the line." > President Bush warned, "These weapons of math > instruction have the > potential to decimal everything in their math on a > scalene > never before seen unless we become exponents of a > Higher Power and begin > to factor-in random facts of vertex." > Ashcroft said, "As our Great Leader would say, read > my ellipse. Here is > one principle he is uncertainty of: though they > continue to > multiply, their days are numbered as the hypotenuse > tightens around > their necks." > > __________________________________ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail 9357 From: savanted1 Date: Tue Aug 10, 2004 11:37am Subject: Ohio Prison to Test RFID Technology The Ohio Department of Rehabilitation and Correction has approved a $415,000 contract to conduct a pilot test of radio frequency identification technology to track prison inmates. If the pilot test at the Ross Correctional Facility in Chillicothe, Ohio is successful, the technology will be used in all of the state's 33 prison facilities. The transmitters will be "wrist-watch-sized" and able to detect attempts to remove it. Staff will also wear transmitters on their belt which will trigger an alarm if prisoners try to remove it or the guard is knocked down. Three states, California, Illinois and Michigan already employ the technology in their prison systems. http://zdnet.com.com/2100-1103_2-5293154.html Related Article: Japan School Kids To Be Tagged With RFID Chips http://zdnet.com.com/2102-1104_2-5266700.html?tag=printthis Related Article: Under-The-Skin ID Chips Move Toward U.S. Hospitals http://zdnet.com.com/2102-1103_2-5285815.html?tag=printthis 9358 From: savanted1 Date: Tue Aug 10, 2004 11:39am Subject: NSA/CSS Requests Exemption of Proposed NSA Police Operational Files To increase the value of a proposed system of records for law enforcement purposes, the Department of Defense's National Security Agency/Central Security Services (NSA/CSS) are requesting that the NSA Police Operational Files system be exempted from coverage under the Privacy Act. Comments due: 08 October 2004. http://edocket.access.gpo.gov/2004/04-18079.htm 9359 From: contranl Date: Tue Aug 10, 2004 2:47pm Subject: Re: Digest Number XXXX ? . I don't understand it sorry...i would like any posting to have a real subject in the header...so i do'nt have to open such a message if the contents does'nt interest me... Tetrascanner 9360 From: James M. Atkinson Date: Tue Aug 10, 2004 6:19pm Subject: The Surveillance- Industrial Complex August 2004 The Surveillance- Industrial Complex: How the American Government Is Conscripting Businesses and Individuals in the Construction of a Surveillance Society The Surveillance- Industrial Complex: How the American Government Is Conscripting Businesses and Individuals in the Construction of a Surveillance Society Published August 2004 Written by Jay Stanley THE AMERICAN CIVIL LIBERTIES UNION is the nationís premier guardian of liberty, working daily in courts, legislatures and communities to defend and preserve the individual rights and freedoms guaranteed by the Constitution and the laws of the United States. OFFICERS AND DIRECTORS Nadine Strossen, President Anthony D. Romero, Executive Director Kenneth B. Clark, Chair, Executive Advisory Council Richard Zacks, Treasurer National Headquarters 125 Broad Street, 18th Fl. New York, NY 10004-2400 (212) 549-2500 www.aclu.org Table of Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Recruiting Individuals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 "Watch" programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 Citizen vigilance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 Recruiting Companies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8 Voluntary sharing of data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 Purchasing data on the open market . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12 Plentiful legal powers to demand private-sector data . . . . . . . . . . . . . . . . . . . .12 Building in surveillance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14 The Patriot Act: Drafting industry into the governmentís surveillance net . . . . .16 Enlistment in the governmentís surveillance web hurts business . . . . . . . . . . .21 Mass Data Use, Public and Private . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22 Data mining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 Data aggregators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 The advantages of private surveillance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27 Pro-Surveillance Lobbying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27 Six Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29 THE SURVEILLANCE-INDUSTRIAL COMPLEX Not so long ago, our lives were mostly recorded on paper. From the doctorís office to the supermarket, any record of where we had gone or what we had done could only be tracked by looking at paper and ink. Today, however, the most intimate details of our personal habits and behaviors are now computerized. On millions of hard drives and microchips, more and more of what we do every day is recorded ñ not only by the government, but also by corporations. And as this report shows, when it comes to preserving our privacy, that is increasingly a distinction without a difference. This special ACLU report, the 12th in our series on civil liberties since 9/11, paints a sobering picture of just how little control we have over our information today. It shows how information-age technology, anemic privacy laws and soaring profits have all combined to endanger our privacy rights to a point never before seen in our history. After you read this report, you will see that reform is clearly needed. Americans from across the political spectrum understand that ìthe right to be left aloneî is central to our constitutional democracy ñ that a secure sense of personal privacy is vital to preserving the openness of American life, and to protecting the boundless creativity, innovation and prosperity for which we are known around the world. If we allow the fear of terrorism to create a new industrial base for surveillance technology, unfettered by reasonable and effective privacy constraints, these special characteristics of the American way of life will wither on the vine. This report is packed with fascinating and frightening details about how the relationship between government and big business is changing before our eyes ñ or, all too often, behind our backs. Brought together, these details add up to a trend that would be almost hard to believe if it were not so well documented. We at the ACLU are not sitting passively as the growth of a ìsurveillance-industrial complexî continues. I hope that you will read this report, and then join us to help stop it. ANTHONY D. ROMERO Executive Director American Civil Liberties Union Foreword Introduction Acting under the broad mandate of the ìwarî on terrorism, the U.S. security establishment is making a systematic effort to extend its surveillance capacity by pressing the private sector into service to report on the activities of Americans. These efforts, which are often costly to private businesses, run the gamut from old-fashioned efforts to recruit individuals as eyes and ears for the authorities, to the construction of vast computerized networks that automatically feed the government a steady stream of information about our activities. Public-private surveillance is not new. During the Cold War, for example, the major telegraph companies ñ Western Union, RCA and ITT ñ agreed to provide the federal government with copies of all cables sent to or from the United States every day ñ even though they knew it was illegal. The program, codenamed ìOperation Shamrock,î continued for decades, coming to an end only with the intelligence scandals of the 1970s. But even such flagrant abuses as Operation Shamrock pale in comparison to the emergence of an information-age ìsurveillance-industrial complex.î The ongoing revolution in communications, computers, databases, cameras and sensors means that the technological obstacles to the creation of a truly nightmarish ìsurveillance societyî have now been overcome. And even as this dangerous new potential emerges, our legal and constitutional protections against such intrusion have been eroded to a frightening degree in recent years through various court rulings as well as laws like the Patriot Act. The ACLU has documented the confluence of these two trends in a separate report.1 But there is a third crucial obstacle that the American security establishment is seeking to overcome in its drive to access ever more information about ever more people. That obstacle is the practical limits on the resources, personnel and organization needed to extend the governmentís surveillance power to cover hundreds of millions of people. There will always be limits to the number of personnel that the U.S. security state can directly hire, and to the ìratio of watchers to watched.î This is the obstacle that the U.S. security establishment seeks to overcome by enlisting individuals and corporations as auxiliary members of its surveillance networks. 1 An ACLU Report THE SURVEILLANCEINDUSTRIAL COMPLEX: How the American Government is Conscripting Businesses and Individuals in the Construction of a Surveillance Society The advantages of privatized surveillance Besides allowing the government to overcome the practical limits on its resources (what political scientists call ìstate administrative capacityî), the technique of folding private individuals and organizations into a governmentís surveillance network has several advantages for the government: ï It gives the government access to privatesector databases. Most of the interactions and transactions in Americansí lives are not conducted with the government, but with corporations and other private entities, who therefore hold most of the details of Americansí lives ñ including much of what is private and important to them. ï It lets the government create a system of ìdistributed surveillanceî or ìswarm intelligenceî in which scattered, individual, independent sources of information are brought together to create a big picture that the government could never construct directly. ï It shifts costs from government to the private sector by forcing companies to take expensive steps such as hiring additional staff to meet information collection and analysis mandates ñ in effect, imposing a hidden ìsurveillance taxî on those companies. ï It creates constant uncertainty whenever people are in a situation where an informant might be present, enormously amplifying the effect of government surveillance on individual behavior and psychology. ï It offers what is often a path of least resistance to working around privacy laws. Our laws have historically protected information held by an individual, while information held by third parties was either assumed to be innocuous or protected by professional codes of confidentiality. But today, thirdparty information has become far more comprehensive and significant. ï It allows the government to carry out privacy- invading practices at ìarmís lengthî by piggy-backing on or actually cultivating data collection in the private sector that it could not carry out itself without serious legal or political repercussions. In this report, we look at many aspects of this trend ñ drawing together and setting in context many stories that in isolation might seem far less significant. The elements we examine are: ï Recruitment and exhortation of individuals to serve as eyes and ears for the authorities. ï Government recruitment of corporations and other private-sector organizations by forcing them either to turn over their customer databases, gather and store information in ways useful to the government or join regularized systems for reporting on individuals. ï Growing government partnerships with private- sector companies that specialize in building dossiers about individuals. ï Lobbying by companies in favor of increased surveillance. The privatization of government functions has always been a popular way of doing business in 2 THE SURVEILLANCE-INDUSTRIAL COMPLEX The privatization of government functions has always been a popular way of doing business in the United States, and surveillance is no exception. the United States, and surveillance has been no exception. There is a long history of cooperation between government security agencies and private- sector surveillance programs, from private ìdetectiveî agencies like the Pinkertons, which helped employers battle the labor movement in the 19th century, to the ìcorporate officials, labor spies, super-patriots, amateur detectives and assorted vigilantesî who worked with the government to combat radicalism after World War I and remained active in various forms right through the last years of the Cold War.2 But nothing in our past compares to the efforts at distributed mass-surveillance that are now underway, which combine the longstanding police impulse to expand privatesector information sources with awesome new technological capabilities for vacuuming up, storing and keeping track of vast oceans of information. Recruiting Individuals Homeland security starts at home. ñ U.S. Citizen Corps In January 2002 the Justice Department announced the creation of a program called the ìTerrorism Information and Prevention System,î or TIPS. Billed as ìA national system for concerned workers to report suspicious activity,î the program would have recruited ìmillions of American truckers, letter carriers, train conductors, ship captains, utility employees and othersî as government informants.3 The proposed scope of this project was stunning ñ it would have recruited, in its pilot program alone, one million informants in just 10 cities ñ or one in every 24 Americans living in those cities.4 Many of those targeted for inclusion in the scheme were workers with access to Americansí homes ñ utility workers, letter carriers and cable technicians ñ who were to report to the government anything that they considered an ìunusual or suspicious activity.î The recruitment of informants for particular investigations has long been a key tool of law enforcement, but only under the most oppressive governments have informants ever become a widespread, central feature of life. The East German Stasi, for example, not only employed 91,000 full-time workers, but also recruited from among the citizenry more than 170,000 non-professional informants, or as many as one in every 50 citizens, to spy and report on their fellow citizens. Stasi agents even used blackmail and other pressure tactics to get people to spy on their own family members. The result was to create a pervasive sense of mistrust that prevented citizens from sharing their complaints with each other, gaining strength from connecting with others of like mind and challenging those who were in power. Few believe that the U.S. will ever become a state like East Germany. But the TIPS proposal was rightly met by a storm of outrage, and the government quickly moved to eliminate the inclusion of workers who visit Americansí homes. Even in its reduced form, however, Congress shut it down. But while TIPS proved short-lived, it was only the most blatantly offensive and direct example of an idea ñ organizing private individuals to increase the governmentís surveillance capacity ñ that continues to live on. A massive effort is underway to turn regular Americans into 3 An ACLU Report A massive effort is underway to turn regular Americans into untrained government monitors. untrained government monitors who, pressed by constant urgings for vigilance and suspicion and lacking the training or accountability of professional law enforcement officers, are asked to report to the authorities anything they think is ìunusual or suspicious.î Some directives emanating from the government are undoubtedly beneficial, such as instructions on how to prepare for civil emergencies, and certainly there is nothing wrong with the authorities making rational requests for citizensí help. But the new warnings are enormously vague and broad, yet frightening and intense. Unlike ìwantedî posters and other traditional public appeals, they are based not on crimes that have already been committed, but on the prospect or suspicion that an individual might be planning something bad. Many ìsuspicious behaviorsî cited by the authorities have no rational or proven relationship to terrorism ñ and in fact, it is doubtful that there are such things as clearly defined behavioral predictors of terrorism. These kinds of broad directives leave a much wider scope for racial profiling and paranoia directed at anyone who is different or stands out ñ and are likely to generate large numbers of false positives that will swamp any useful information that might be obtained. In addition, none of these programs can be viewed apart from the larger context: a world where government has interrogated, fingerprinted and detained thousands of people based on their ethnicity. The governmentís constant exhortations to micro-vigilance, if taken to heart, will create an atmosphere of conformism and mistrust that encourages abuses, divides Americans from one another and casts a chill over the traditionally freewheeling nature of American life. ìWatchî programs When President Bush called for the creation of TIPS in his 2002 State of the Union address, it was just one element of a larger program called the ìCitizen Corpsî that is aimed at giving Americans a chance to get directly involved in homeland defense. Bush also called for ìNeighborhood Watchî programs to be doubled in number and expanded beyond their traditional role of deterring and detecting household burglary to ìmake them more attuned to preventing terrorism.î5 The means for carrying this out is a push to encourage the formation of ìCitizen Corps Councilsî around the nation. Citizen Corps materials urge Neighborhood Watch participants to ìtrain family members on identifying suspicious behaviors that could indicate terrorist activity.î6 The Citizen Corps home page still proclaims that its mission is to ìharness the power of every individual through education, training and volunteer service to make communities safer, stronger and better preparedî for terrorism and other threats.7 And indeed, though Congress may have ordered TIPS shut down, the government continues to run several programs that are very close in nature to TIPS. ï Marine Watch programs. AMaine program dubbed ìCoastal Beacon,î recruits fishermen and members of the general public to keep a watch out for ìsuspicious activity.î8 The fact 4 THE SURVEILLANCE-INDUSTRIAL COMPLEX Many ìsuspicious behaviorsî cited by the authorities have no rational or proven relationship to terrorism. ìBe our eyes and ears so we can calm your fears.î ñ River Watch slogan that this program does exactly what Congress banned under TIPS was confirmed by President Bush himself, who declared Coastal Beacon ìone of the most innovative TIP [sic] programs in the country.î9 An Ohio program called ìEyes on the Waterî urges boaters to report ìunusual behavior when you see it.î As one Coast Guard officer told a reporter, ìA guy who is not wearing the right gear or fishing in an unusual location ñ let us know about it.î A program in Michigan called ìRiver Watchî has as its slogan, ìBe our eyes and ears so we can calm your fears.î10 ï Highway Watch. Another TIPS program that has outlived TIPS is ìHighway Watch,î under which truck drivers are taught to recognize ìhighway dangersî and report them to a central dispatch center. The program has a heavy homeland security element ñ indeed, it is being funded by the Department of Homeland Security (DHS). A program fact sheet boasts that the more than three million truck drivers on the roads make up ìa potential army of eyes and ears to monitor for security threats.î Not only are drivers ìnaturally very aware of suspicious activity and behavior,î but ìtruck drivers are everywhere ñ ports, airports, malls, bridges, tunnels ñ thus giving greater range to homeland security observation efforts.î11 ï ìCAT Eyes.î A program called ìCommunity Anti-Terrorism Training Institute,î or ìCAT Eyes,î is working to ìeducate citizens in the civilian community to be effective eyes and ears for potential terrorist activities.î Embraced by police departments from across the eastern U.S., it aims for the formation of hierarchically structured ìneighborhood block watchesî including ìNeighborhood Coordinators,î ìBlock Captainsî and ìBlock Watchers,î each of whom ìacts as eyes and ears for law enforcement and reports any suspicious activity.î The programís motto is ìwatching America with pride not prejudice.î12 ï Real Estate Watch. Police outside Cincinnati have set up a pilot program in which the police train real estate agents ìhow to be observant.î The realtors keep their eyes open for suspicious activity as they make their rounds, based in part on alerts provided by the police, and report back anything suspicious they see.13 ï Floridaís TIPS. In a direct local imitation of the original TIPS concept, police in Orange County, Florida are planning to train emergency personnel, cable workers and other public and private workers to look for and report evidence of terrorism, drug trafficking, or child pornography in private homes. Overseen by Florida state police officials, the programís brochure originally included an element of explicit racial profiling. Though that was removed, the program is still underway, leaving homeowners to wonder if anything in their home might draw suspicion whenever a cable or utility worker comes in to do a repair.14 5 An ACLU Report ï Other State Reporting Programs. Many states and localities appear to have citizen reporting programs in place. New York, for example, has instituted a ìStatewide Public Security Tips Hotlineî the public can use to report ìsuspicious or unusual behaviorî to the police. ìIn protecting our homeland security,î declared a September 2002 news release on the program, ìthe public should consider themselves partners with our local, state and federal law enforcement agencies.î All tips, however raw, ìwill be cross-referenced through federal, state and local databases.î There is no mention of whether the name of an innocent person who is the subject of a tip will ever be purged from the record.15 In fact, it is far from clear what any of these programs do with information about ìsuspiciousî individuals that they receive ñ how reports are recorded, shared and stored in domestic intelligence or law enforcement databases or what is done to ensure that innocent individuals who are the subjects of raw suspicions and rumors will not have a permanent black mark associated with their names in some government database. Experience has shown that such safeguards are rarely created by security agencies on their own without intense outside pressure. A disturbing sub-genre of TIPS-like programs are those run by the military. They include: ï ìEagle Eyes.î This program is billed as ìan anti-terrorism initiative that enlists the eyes and ears of Air Force members and citizens in the war on terror.î In addition to a telephone tip line, the program offers training in how to detect terrorist activity. ìAnyone can recognize elements of potential terror planning when they see it,î boasts the programís Web page. Things to watch for include ìPeople who donít seem to belong in the workplace, neighborhood, business establishment or anywhere else. . . . If a person just doesnít seem like he or she belongs, thereís probably a reason for that.î16 ï ìTalon.î According to an internal memo obtained by Wired News, this Pentagon database contains ìraw, non-validatedî reports of ìanomalous activitiesî within the United States, and provides a mechanism to collect and share reports ìby concerned citizens and military members regarding suspicious incidents.î17 The Pentagon says the purpose of the Talon system is to protect Defense Department property and personnel. Of course, since a terrorist could try to attack those targets just like any others in the U.S., there is no limit to the amount of domestic surveillance that could be justified by that rationale. Interestingly, the same rationale of ìbase protectionî was given when it was discovered that the Army was involved in the construction of dossiers about millions of U.S. airline passengers (see p. 10). All this in a context where, as one expert puts it, the military is acting to ìbreak down long-established barriers to military action and surveillance within the U.S.î18 Citizen vigilance Beyond these organized watch programs are more diffuse campaigns of ìcitizen awarenessî featured on government Web sites around the nation. These campaigns 6 THE SURVEILLANCE-INDUSTRIAL COMPLEX A disturbing sub-genre of TIPS-like programs are those run by the military. Privacy safeguards are rarely created by security agencies on their own without intense outside pressure. urge Americans to be suspicious, and to report to the authorities anyone who fits a long list of suspicious characteristics. State and local governments have posted or linked to reams of materials that one way or another warn and instruct citizens ìhow to be vigilant.î19 Examples of this kind of material abound: ï A flyer from the Maryland State Police asks citizens to be alert for ìanyone who does not appear to belong.î20 ï The residents of Lucas County, Ohio, and many other localities around the country are admonished in materials prepared by the DHS to look for ìpersons not fitting into the surrounding environment,î including any ìbeggar, demonstrator, shoe shiner, fruit or food vendor, street sweeper, or a newspaper or flower vendor not previously recognized in the area,î who, it is explained, could be a terrorist in disguise.21 ï Messages on electronic highway signs in Virginia and Maryland list toll-free phone numbers and ask drivers to ìReport Info on Terrorismî and ìReport Suspicious Activityî ñ solicitations that leave many citizens puzzled over just how they are supposed to act on them.22 ï A widely distributed version of DHSís color-coded terrorism ìHomeland Security Advisory Systemî tells citizens to be ìwatchful for suspicious activities.î23 7 An ACLU Report The Citizensí Preparedness Guide A significant example of citizen ìlookout literatureî is a ì C i t i z e n s í Preparedness Guideî published by the federal Citizen Corps. After an introduction in which Attorney General John Ashcroft declares that ìyour country has never needed you more,î the guide urges Americans to ìbe alert as you go about your daily businessî and ìlearn the normal routinesî in order to ìhelp you to spot anything out of place.î Citizens should be ìon the lookoutî for suspicious activities ìin your neighborhood, in your workplace, or while travelingî ñ in short, everywhere. When it comes to the Internet, famous for being home to every imaginable activity, viewpoint, hobby and fetish, Americans are told to ìreport unusual activities to the authorities.î In addition to directing Americans to ìkeep your yard cleanî and ìprune shrubbery,î the guide asks citizens to contact the FBI ìimmediatelyî if they ìobserve a pattern of suspicious activity,î including ìsomeone unfamiliar to you loitering in a parking lot.î Concludes the guide, ìHomeland security starts at home.î24 Predictably, the tip centers that have been set up are already attracting malicious tips. ï A Coast Guard Web site lists ìsuspicious activityî that includes the distribution of ìAnti-American pamphlets, or flyersî25 ñ certainly an invitation to abuse, considering how broadly the label ìAnti-Americanî has been applied in the past. (In addition, it is unlikely that a genuine terrorist planning an attack would call attention to himself by leafleting beforehand.) Implicit racial profiling Predictably, the tip centers that have been set up are already attracting malicious tips from individuals ìturning inî neighbors they dislike, tips about strangers engaging in ìun-American activityî and of course many reports based on racial profiling. ìWeíve gotten calls from people whoíve seen someone who looks Middle Eastern in the store or library, maybe on the computer,î a Virginia police official told the Chicago Tribune.26 In fact, the generality of many of these warnings and reminders may be explained by an implicit element of racial profiling. Does the Coast Guard really want to receive reports on every ìguy who is not wearing the right gear or fishing in an unusual locationî? Or just when that ìguyî happens to be of Middle Eastern appearance? Truckers anxiously watching the highways, boat owners watching the shores, individuals constantly urged to watch for people who donít fit in ñ together it adds up to a vision very close to what was envisioned under the supposedly discontinued TIPS program. Recruiting Companies We regret to inform you that we have decided that it is not in our best interest to continue your banking relationship with us. ñ Letter from Fleet Bank to U.S. citizen Hossam Algabri As disturbing as the government-sponsored informer programs are, even more alarming is the governmentís recruitment of companies and other independent organizations into its growing surveillance machinery. The Privacy Act of 1974, although riddled with exceptions and loopholes, does restrict the ability of law enforcement agencies to maintain dossiers on individuals who are not suspected of involvement in wrongdoing.27 But the government is increasingly circumventing those restrictions simply by turning to private companies, which are not subject to the law, and buying or compelling the transfer of private data that it could not collect itself. A long history of privatesector surveillance The U.S. government actually has a long history of turning to the private sector for help in gathering information on individuals. Examples include: ï The Western Goals Foundation. In Los Angeles, thousands of files on activists of all kinds were ordered destroyed in the wake of the revelations of domestic spying in the 1970s. But in 1983 these raw intelligence files were discovered hidden away in the garage of an LAPD detective, who had been sharing them with the Western Goals Foundation, a Cold War anti-communist group that used the files to build private dossiers on progressive political activists around the nation. Western Goals acted as a 8 THE SURVEILLANCE-INDUSTRIAL COMPLEX The government is increasingly circumventing those restrictions simply by turning to private companies. private ìclearinghouseî of dossiers on political activists from police agencies in different states ñ collecting, disseminating and ìlaunderingî the sources of that information. 28 The group circulated information ñ much of it false and defamatory ñ about those activists not only to local police departments, but also to numerous federal police agencies including the Secret Service, the FBI, the State Department and the CIA.29 ï The ìSan Diego Research Library.î In another case, a retired military intelligence officer named Ralph H. van Deman established a legendary data collection facility in California, which kept dossiers on religious, labor, civil rights and other activists. For over 30 years beginning in 1929, this ìprivateî facility, operated with the support of private donors, the state of California and the Army, maintained 200,000 files based in part on confidential information provided by volunteer informers. The facility regularly exchanged material with federal and state intelligence agencies, and thus served as a quasi-governmental intelligence agency.30 ï Operation Shamrock. Perhaps the ultimate example was the Cold War program called ìOperation Shamrock,î in which the major U.S. telegraph companies ìsecretly turned over to the NSA, every day, copies of all messages sent to or from the United States.î31 As described by reporter and author James Bamford, the program began in 1945 when the presidents of the telegraph companies all agreed to participate after the government appealed to their patriotism. They took part knowing that their actions were illegal and against the uniform recommendations of their own corporate attorneys.32 When the carriers computerized their operations in the 1960s, Operation Shamrock gained the ability to conduct keyword searches through each dayís traffic. At that point, the NSA increasingly began to scan the nationís telegraphs against long lists of surveillance targets provided to the NSA by other security agencies ñ including American anti-war and civil rights protesters, and even such groups as the Quakers.33 The potential is greater today But even abuses like Operation Shamrock pale in comparison to what is possible with todayís technology: ï Computer hardware and software is far more sophisticated. Unwieldy tape reels have been replaced by swift and massive hard drives, and software today can, with increasing reliability, transcribe spoken words or analyze meaning based on the context of a communication. ï More business is conducted electronically. Because of the convenience of cell phones, the Internet and other innovations, the amount of business that Americans conduct via electronic communication has vastly increased. ï Corporations are gathering more data for their own reasons. Companies have discovered that information about customers has enormous cash value ñ and now have on hand cheap new technologies for collecting, storing and sharing such data. Americans are increasingly finding themselves pestered for personal 9 An ACLU Report The threat posed by government collection of third-party information is far greater today than it would have been in the 1950s, or even the early 1990s. details at every turn, or routinely tracked through stratagems like supermarket loyalty cards ñ all for the purpose of building a financially valuable record of their lifestyle and habits.34 The result of these developments is that the threat posed by the systematic government collection of personal information held by corporations and other third parties is far greater today than it would have been in the 1950s, or even the early 1990s. Many options for accessing private data The bottom line is that the private sector is tracking more and more of our activities for its own purposes, and the government is free to leverage this private collection as a way of extending its own powers of surveillance. The government has an array of options for accessing third-party information. It can: ï ¡sk for data to be shared voluntarily. ï Simply buy information. ï Demand it, using legal powers granted by the Patriot Act and other laws. ï Use laws and regulations to dictate how private-sector data is handled and stored in order to increase its surveillance value for the government. ï Create regularized systems for standing access to records of private activities. Corporate compliance with government datasurveillance efforts ranges from unwilling resistance to indifferent cooperation to eager participation to actual lobbying of the government to increase such activities. But with a range of options at its disposal, the government can acquire a rich stream of information about private activities from any source. These techniques add up to a startling advance in government monitoring of American life. Let us examine each of them. Voluntary sharing of data To obtain information about individualsí activities, the government often need do no more than ask. Many companies are willing to hand over the details of their customersí purchases or activities based on a simple request from the FBI or other authorities. Some companies believe they are being patriotic; others may be afraid to turn down ìvoluntaryî requests because they fear regulatory or law enforcement scrutiny of their own activities; others may simply be eager to please. Multiple airlines have admitted turning over the records of their customersí travels to the government. In each case, the information was turned over not to help the government solve a particular crime or track a particular suspect, but in order to examine each travelerís records in the hopes of identifying terrorists by detecting ìsuspiciousî patterns in his or her travels ñ in effect, turning every traveler into a suspect (see discussion of data mining, p. 23). 10 THE SURVEILLANCE-INDUSTRIAL COMPLEX To obtain information about individualsí activities, the government often need do no more than ask. Companies may be afraid to turn down ìvoluntaryî requests because they fear regulatory or law enforcement scrutiny of their own activities. ï At the request of an official now at DHS, the airline JetBlue gave a Pentagon subcontractor more than 5 million passenger records, which were combined with detailed personal files on each passenger purchased from a ìdata aggregatorî company called Acxiom.35 ï When the JetBlue story broke, Northwest Airlines said it had not shared its passengersí records, but a few months later it was discovered that in fact, it had given millions of passenger records to NASA.36 ï In April 2004, American Airlines admitted that it, too, had shared passenger records (1.2 million of them) with the TSA and four research companies.37 ï In May 2004 the nationís largest airlines, including American, United and Northwest, also admitted giving millions of passenger records ñ up to a yearís worth ñ to the FBI after the 9/11 attacks.38 Other known recent examples of ìvoluntaryî data sharing with the government include: ï Scuba shops. In May 2002 the Professional Association of Diving Instructors voluntarily provided the FBI with a disk containing the names, addresses and other personal information of about 2 million people, nearly every U.S. citizen who had learned to scuba dive in the previous three years.39 ï Colleges and universities. A 2001 survey found that 195 colleges and universities had turned over private information on students to the FBI, often in apparent violation of privacy laws; 172 of them did not even wait for a subpoena.40 ï Travel companies. A 2001 survey of travel and transportation companies found that 64 percent had provided customer or employee data to the government, many of them in violation of their own privacy policies.41 These are only some of the examples that have come to light; as the airline examples indicate, companies that have shared information are often far from open about it. InfraGard ñ a corporate TIPS program? A more systematic example of voluntary cooperation is a partnership between the FBI and private corporations called ìInfraGard.î This program is aimed at encouraging ìthe exchange of information by the government and the private sector membersî to protect against terrorism and other threats to the nationís infrastructure. The program has more than 10,000 members organized into 79 local chapters; the list of participating companies is kept secret. Members wishing to participate fully must undergo a security check and obtain clearance by the FBI.42 The Cleveland Plain Dealer described it as a ìa vast informal network of powerful friends,î a ìgiant group of tipstersî created by the FBI under a ìphilosophy of quietly working with corporate Americaî in order to ìfunnel security alerts away from the public eye and receive tips on possible illegal activity.î43 It is not clear what kind of information sharing takes place under InfraGard. The program was created as a means of stopping cybercrime, but has broadened to cover threats of all kinds to the nationís ìcritical 11 An ACLU Report There is a long and unfortunate history of cooperation between government security agencies and powerful corporations to deprive individuals of their privacy and other civil liberties. infrastructure.î The programís Web site suggests that it simply gives the FBI a quick way to spread specific, credible security alerts to companies that may be targets, and gives companies a discreet way to report attacks by hackers. But there is evidence that InfraGard may be closer to a corporate TIPS program, turning private- sector corporations ñ some of which may be in a position to observe the activities of millions of individual customers ñ into surrogate eyes and ears for the FBI. For example, several program members told the Plain Dealer that ìthey received through InfraGard a list of Web sites frequented by terrorists and were monitoring their computer networks to see if anyone on their systems visited those pages.î44 It is also possible that the program serves as a more controlled version of the FBIís watch list distribution program ìProject Lookoutî (see p. 19). There is a long and unfortunate history of cooperation between government security agencies and powerful corporations to deprive individuals of their privacy and other civil liberties, and any program that institutionalizes close, secretive ties between such organizations raises serious questions about the scope of its activities, now and in the future. Purchasing data on the open market Another option open to government agencies seeking information on individuals is to simply purchase it on the open market. As private- sector information-gathering has exploded in recent years, so has the amount of data that is now available to the government (and any other customer) willing to pay the price. Although government information- purchasing was once a minor matter, the explosion of private-sector data collection has begun to significantly undermine the laws meant to protect Americans from government snooping. Perhaps the ultimate example of the powerful information sources now available for purchase by the government is the existence of companies called data aggregators, which make it their business to gather, compile and distribute dossiers full of information about Americansí personal lives (see p. 25). Plentiful legal powers to demand private-sector data If a company wonít donate or sell its data on individuals, the government has a powerful arsenal of legal weapons with which to force it (as well as other entities such as doctorsí offices and libraries) to provide access to individualsí records in its possession.45 Even as private-sector companies hoard more and more details about our transactions, the governmentís powers to obtain that data are growing: ï The Patriot Act. The Patriot Act makes it much easier for the government to demand information from businesses and lowers the standard of evidence required for such demands. Section 215 of the act, for example, gives the FBI the power to demand customer records from Internet service providers (ISPs) and other communications providers, libraries, bookstores or any other business ñ with little judicial oversight. The businesses can be banned from telling anyone, including their affect- 12 THE SURVEILLANCE-INDUSTRIAL COMPLEX The government has a powerful arsenal of legal weapons with which to force third parties to provide access to individualsí records. ed customers, about the search. And the search orders do not even have to specify a particular target.46 ï National Security Letters. These obscure devices, which can be written by FBI officials in field offices without the approval of a judge, give the government broad power to demand records. Once upon a time this sweeping power could only be used to get information about ìagents of a foreign powerî from banks, credit agencies and Internet service providers. But the Patriot Act changed the law to allow their use against anyone, including persons not suspected of a crime.47 And a bill quietly signed into law by President Bush in December 2003 extends coverage to a wide variety of businesses, ranging from jewelry stores to stockbrokers to car dealerships to casinos. 48 Businesses are also subject to a gag order prohibiting them from talking about the governmentís data demands. Most restrictions on the use of information in government databases have exceptions for law enforcement and intelligence purposes. The scope of those exceptions was once clear: It was limited to attempts to solve crimes, and to stop foreign espionage. But under the new, post-9/11 security paradigm, which more than ever before views every American as a potential suspect, those exceptions may now be far wider than was ever intended when they were written into the law. Law enforcement is increasingly forwardlooking ñ trying not just to solve crimes but to anticipate and prevent them. And the boundaries between foreign intelligence and domestic law enforcement have come under sustained assault.49 Already ìfishingî with new powers The governmentís expanded surveillance powers are, in fact, being used. Phone companies, banks and retail stores report more requests by law enforcement for information about customers:50 ï In December 2003, the FBI presented national security letters to hotels in Las Vegas and obtained access to names and personal information on all their customers between December 22 and New Yearís Day. The FBI also vacuumed up information on anyone who flew into the city, rented a car or truck or patronized a storage facility. The FBI thus indiscriminately scrutinized the lawful activities of an estimated 270,000 Americans based on no individualized suspicion of wrongdoing.51 (Ironically, the incident came as the city was conducting an advertising campaign based on the slogan, ìwhat happens here, stays here.î) ï Since passage of the Patriot Act, the FBI has been using national security letters very aggressively in general, according to a January 2003 list obtained through a Freedom of Information Act request filed by the ACLU. The list was blacked out ñ but it was six pages long.52 ï Internet service providers report that search orders have ìgone through the roof.î53 ISPs maintain records of individualsí Internet use, including records of IP addresses (a number that is assigned to each computer that connects to the Internet) that can be combined with logs automatically maintained by most Web servers to identify which individuals have 13 An ACLU Report Law enforcement is increasingly forward-looking - trying not just to solve crimes but to anticipate and prevent them. visited a Web site, participated in ìanonymousî chat or message boards or adopted a particular online pseudonym. In 2002 alone, for example, BellSouth received about 16,000 subpoenas from law enforcement and 636 court orders for customer information.54 ï Attorneys who represent many of the affected companies report that it is not just the number of requests that is increasing, but also their scope; more requests take a ìshotgun approachî or are ìjust fishing.î55 What happens to all of this data when the authorities complete the investigation for which it was collected? As one former highranking intelligence official observed, ìThe FBI doesnít throw anything away.î56 In addition, private companies often do not have the time, resources or inclination to ìminimizeî the data that they hand over to the government. Instead of turning over just the names of its customers, for example, a hotel might find it easier to simply hand over its complete files, including all the details of customersí transactions. Building in surveillance In addition to requesting, purchasing or ordering the supply of private-sector data, the government is also taking steps to ensure that nothing is left to chance when it needs information from a particular company or industry. By affirmatively guiding, structuring or mandating the maintenance of information on individuals by private organizations, the government is ensuring that its agents will get what they want when they go looking for it. CALEA An early example of this trend is the Communications Assistance for Law Enforcement Act of 1994 (CALEA), which forced telecommunications providers to design their equipment according to the FBIís specifications in order to make eavesdropping easier and more convenient ñ in effect, requiring the architects of the nationís newest communications networks to twist those networks into designs that they would not otherwise take, simply to preserve the governmentís ability to eavesdrop. It is the constitutional equivalent of the government requiring that all new homes be built with a peephole for law enforcement to look through. Recently, the FBI and other law enforcement agencies have sought to expand CALEA even further. They have pushed for an aggressive interpretation of the statute that would allow it to monitor certain Internet content without a warrant, and to collect tracking information about the physical locations of cell phone users ñ turning cell phones into what, for all practical purposes, are location tracking bugs (a use that many, including the ACLU, assert is not authorized at all by CALEA). And now, the FBI is also trying to force broadband Internet providers to build their technical systems in a way that will allow the government to eavesdrop on Internet telephone calls.57 The fledgling Internet phone industry is still experimenting with a variety of technologies, yet the government would force companies to give law enforcement a ground-floor veto over the specifications of new products they develop ñ before theyíve even worked out the bugs or tested their success in the marketplace. 14 THE SURVEILLANCE-INDUSTRIAL COMPLEX The government is taking steps to ensure that nothing is left to chance when it needs information from a particular company or industry. Mandatory data retention Around the time that the FBI pushed for and won the surveillance-enabling CALEA statute, it also made a push for a national ìdata retentionî law, which would have forced ISPs and other communications providers to retain their records of individualsí communications for a set period of time just in case those records should prove helpful in an investigation. More recently, there were reports that an early draft of the Bush administrationís ìNational Strategy to Secure Cyberspaceî called for a mandatory customer data retention regime.58 In a legal environment where the government has very few limits on its ability to access information about individuals that is stored by third parties such as ISPs, a data retention law requiring such storage would short-circuit one of the few true privacy protections left ñ the disposal of records once they are no longer needed. The U.S. has pushed the European Union to adopt data retention laws. In October 2001, for example, President Bush himself directly asked the EU to change its rules to allow for the retention of communications traffic data.59 It is being adopted by 9 of the 15 EU member states.60 This is a perfect example of what has been called ìpolicy launderingî ñ the act of pushing laws through foreign and international bodies that could never win direct approval at home. Americans have long feared the specter of the government maintaining dossiers filled with information about the lives of individual, innocent citizens. Data retention, whether mandatory or de facto, achieves the same goal indirectly, by ensuring that information is stored by corporations ñ from where, as we have seen, it can easily be accessed by the authorities. Airline Profiling Another example of this dynamic can be found in airline profiling proposals such as the CAPPS II program, under which the government would conduct background checks on every traveler in order to give him or her a ìrisk assessmentî rating of ìred,î ìyellowî or ìgreen.î CAPPS II would require the airlines to collect and furnish to the government each passengerís full name, address, phone number and date of birth when they make a reservation. Computer systems in use today are not built to track ñ they are unable to tell if the John Doe who took one flight is the same Jonathan Doe who took another, and the same J.S. Doe Jr. who took a third. By imposing a standardized data-collection requirement, the government will make it easy to compile lifetime travel dossiers covering everyone who flies anywhere in the world.61 The Computer Reservation Systems ñ independent contractors that handle reservations for almost all airlines ñ are under absolutely no legal obligation to protect the privacy of that information. They do not have direct relationships with actual travelers, and thus have no consumer privacy policy by which they must abide (or market pressure for good privacy practices). And no U.S. privacy laws restrict their ability to compile, store and share their dossiers on individualsí travel. And of course, there are plenty of laws that would give the DHS and other government agencies easy access to these travel dossiers ñ if the CRSs donít simply sell them access outright.62 In July 2004, Homeland Security Secretary Tom Ridge seemed to indicate that the CAPPS II program would be terminated. Other DHS officials, howev- 15 An ACLU Report The U.S. has pushed the European Union to adopt data retention laws. er, indicated that while the CAPPS name may be retired, the concept will live on. As one spokesperson put it, ìThe process of creating an automated passenger pre-screening system. . . will continue.î63 Whether through CAPPS II or some other passenger- profiling system, it is clear that the government once again wants to make sure that personal data will be waiting in private hands (and in a suitable form) when agents want it. The Patriot Act: Drafting industry into the governmentís surveillance net As we have seen, the government has many options for accessing particular pools of information. Other developments, however, are potentially even more frightening than the governmentís free hand in gathering data on particular targets. Increasingly, the government is working to construct systematic mechanisms that provide constant feeds of (or open access to) private-sector data. Such systems truly turn private companies ñ in some cases, entire industries ñ into agents of the surveillance state. A prime example of such a system is the growing machinery for government monitoring of financial activities, which has been enabled by the Patriot Act and justified by the need to stop money laundering. Through the Patriot Act, the government has created a system for the near-total surveillance of the nationís financial system: ï It expanded a system for reporting ìsuspiciousî financial transactions. ï It set up a system for the government to conduct broad-ranging, nationwide ìGoogle searchesî through financial records. ï It required financial institutions to set up an identity verification process. ï It required financial institutions to check their customers against government ìwatch lists.î These steps involve the increased use of tools that were originally created to catch drug dealers and other traditional criminals in the fight against terrorism. But as a Federal Reserve official pointed out to Congress, Terrorist financing activities are unlike traditional money laundering in a very significant respect. Money used to finance terrorism does not always originate from criminal sources. Rather, it may be money derived from legitimate sources that is then used to support crimes. Developing programs that will help identify such funds before they can be used for their horrific purposes is a daunting task.64 In short, the new focus on ìterrorist financing activitiesî potentially involves much deeper scrutiny of everyday financial transactions than has been previously conducted, because it involves searches of ìmoney derived from legitimate sourcesî and scrutiny of individuals who have not committed any crime. 16 THE SURVEILLANCE-INDUSTRIAL COMPLEX The new focus on ìterrorist financing activitiesî potentially involves much deeper scrutiny of everyday financial transactions than has been previously conducted. Through the Patriot Act, the government has created a system for the near-total surveillance of the nationís financial system. Expanded system for reporting ìsuspiciousî financial transactions The nationís financial companies have been enlisted into an enormous effort to provide a steady stream of routine financial information to the government. Under the Bank Secrecy Act of 1970, every bank, thrift and credit union is required to file a report with the government whenever a customer deposits $10,000 or more. The Patriot Act has dramatically expanded that requirement, stating that ìany person who is engaged in a trade or businessî ñ meaning every shop owner, plumber, consultant, home-improvement contractor and so on ñ who receives $10,000 or more in cash must file a detailed report, called a ìSuspicious Activity Report,î with the government.65 Among the problems with this system: ï While $10,000 may seem like a lot of money, itís not as much as it used to be, and the law contains no provision indexing this reporting threshold to inflation. If, when this law was originally passed in 1970, the threshold had been set at a level equivalent to $10,000 of todayís spending power, it would be just $2,625 today. In effect, the threshold for reporting to the government has been lowered by nearly 75 percent. And if this law had been passed at the corresponding level in 1932, the threshold today would be just $855.66 ï Those affected the most may be immigrants and minorities, who tend to use the traditional banking system the least (and therefore, when making a large purchase, are less likely to be able to write a check). ï Given the lack of privacy protections for credit card records, which are routinely shared by financial institutions, cash is the only recourse for those who want to preserve their privacy when making a purchase. ï Itís far from clear how effective this system will be at its stated goal of stopping money laundering. ìYouíre trying to turn an untrained populace into the monitors of money laundering activity,î according to financial regulation expert James Rockett. ìIf you want to stop this, itís got to be done with police work, not tracking consumersí buying habits.î67 With all this information pouring into an enormous government database of financial transactions, the effect will be continuous government monitoring of an ever-growing proportion of individualsí economic activities. A system for government ìGoogle searchesî through Americansí private financial records Even more powerful than the ìSuspicious Activityî reporting requirement is a set of government regulations (stemming from Section 314 of the Patriot Act) that force financial institutions to check their records to see if they have engaged in any transactions with ìany individual, entity or organizations listed in a request submitted byî the government. This grants any arm of govern- 17 An ACLU Report The nationís financial companies have been enlisted into an enormous effort to provide a steady stream of routine financial information to the government. Any arm of government with a law enforcement function can now order a search of financial institutions across the nation for records matching a suspect. ment with a law enforcement function ñ including even agencies such as the Agriculture Department and the Postal Service ñ the power to order a search of financial institutions across the nation for records matching a suspect. These searches can be done to investigate any suspected cases of money laundering ñ an extremely broad offense that encompasses any effort to disguise illicit profits, and can be used in pursuit of more than 200 different crimes. According to figures obtained by Newsweek, in 2003 alone the government used the Patriot Act to conduct searches on 962 suspects ñ and two thirds of the documents obtained were for money laundering cases that had no apparent connection to terrorism.68 Of course, the names of suspects that the government runs by financial institutions can presumably be retained by those financial institutions, and nothing prevents them from blacklisting those individuals and refusing to give them loans or otherwise do business with them, even if they are perfectly innocent of any wrongdoing.69 The unprecedented effect of these rules is to create and put at the governmentís fingertips an enormous distributed database of every transaction recorded by a financial institution in the United States. New ID requirements Completing the circle of the governmentís systematic enlistment of financial companies in its surveillance web is Section 326 of the Patriot Act, which requires that such companies create a ìCustomer Identification Programî of strict identity checks. The law requires that when any customer opens an account, takes out a loan, obtains a credit card or performs any other financial business, the financial institution must obtain and verify the customerís name, address, date of birth and social security number. Usually this is done by demanding a picture ID. Furthermore, the law imposes a data-retention requirement, mandating that companies keep records of identity verification for five years past the closure of an account.70 This provision protects and enhances the governmentís other powers to search through financial records by seeking to ensure that those records can be consistently linked to all the other records that exist about an individual. Of course, like all ID-checking requirements, this is ultimately a futile measure against any even minimally motivated bad actor. Watch list checks Once financial institutions have verified a customerís identity, they face another significant requirement imposed by Section 326 of the Patriot Act: They must check whether the person is on a government list of known or suspected terrorists or other watch lists. This requirement goes beyond simply acquiring information from the private sector; it actually mandates that companies transform themselves into surrogate agents for the government, required to constantly watch for anyone listed on one of the governmentís lists of suspected terrorists. Individuals must now be checked against terrorist watch lists whenever they buy or sell property ñ including jewelers, pawnbrokers, and even average families buying or selling a home.71 Watch list searches can and do cause real harm to people. For example: ï An American citizen named Hossam Algabri received a statement in late 2002 18 THE SURVEILLANCE-INDUSTRIAL COMPLEX The Patriot Act mandates that companies transform themselves into surrogate agents for the government. from Fleet Bank discontinuing his account. The bank would not tell him what the problem was, except that he had been targeted for ìsuspicious activity.î72 Algabri was just one of many people with similar experiences. ï Under a program called ìProject Lookout,î the FBI circulated among corporations a list of hundreds of names of people whom it was seeking in connection with 9/11. The list, which was riddled with inaccuracies and contained the names of many people the Bureau simply wanted to talk to, was widely shared and re-shared, and quickly took on a life of its own. Companies began checking their customers against the list. The FBI admitted it had no way to remove innocent people from the list, because its distribution had spun beyond its control. No one knows how many innocent people have been denied jobs or suffered other harm because of the list.73 ï Two giant health insurance companies, Blue Cross-Blue Shield of Michigan and Aetna, conducted a search through millions of customersí health insurance records for terrorists (none were found). The search of 6 million Michigan records by Blue Cross yielded 6,000 false positives, all of whom were ìinvestigated furtherî by the companyís employees. Aetna, which searched through 13 million records across the nation, refused to say how many false positives its search generated or how they were handled.74 ï The governmentís ìno-flyî lists of terrorist suspects have ensnared hundreds of innocent Americans who find themselves facing intense security scrutiny every time they try to fly, yet have no way of finding out how they got on a list, and no practical way to have their names removed.75 As such stories demonstrate, there are numerous problems with the governmentís watch lists: ï Lack of due process. Despite the bad effects that can accrue to those placed on such a list, there are no due process procedures that apply to those who are blacklisted, such as a right of appeal or a right to see the information upon which a listing is based. This violates the core American principle that no one should be punished without due process. ï Slanted incentives. There may well be strong bureaucratic incentives within the security agencies to place names on watch lists, and strong disincentives to remove names. After all, who would want to be the person responsible for removing or failing to add a name that later turned out to belong to a terrorist?76 ï Bloated lists. Consistent with that dynamic, the U.S. governmentís watch lists appear to be ridiculously bloated; news reports have put the number of names in the millions.77 That suggests it will become increasingly common for someone to be flagged based on such lists (especially when the inevitable cases of mistaken identification are added to the equation). ï Private piggybacking. There are no limits on the private uses or abuses of such lists, which are increasingly being used by landlords and even car dealers.78 An entire archipelago of government-enforced watch lists has been created haphazardly and without the carefully constructed checks and balances that such a powerful instrument demands. And now that system is being plugged in to the private sector, where a million eyes can watch for the millions of people on these lists. 19 An ACLU Report Background checks: from reporting to enforcement Watch list requirements are actually qualitatively different from other forms of outsourced surveillance. While many programs have increased the information flowing inward to the government, watch lists are a mechanism by which the government sends information outward into society. That serves two purposes: ï It alerts the governmentís information-collection networks to search for particular kinds of information, thereby increasing the power of the distributed surveillance system. ï It turns companies into sheriffís deputies, responsible not just for feeding information to the government, but for actually enforcing the governmentís wishes, for example by effectively blacklisting anyone who has been labeled as a suspect under the governmentís less-than-rigorous procedures for identifying risks. A similar explosion of distributed enforcement/ surveillance is taking place through the construction of a massive new infrastructure for everyday background checks in American life: ï Off-the-shelf software for conducting background checks is now being sold at Wal-Mart-owned ìSamís Clubî stores for around $40. The software allows even the smallest business to carry out various checks by accessing databases compiled by the data aggregator Choicepoint.79 ï Congress passed legislation called the PROTECTAct, which created a pilot program for FBI background checks on people who donate their time to various volunteer organizations. The FBI estimates that 26 million Americans a year could be required to be fingerprinted under this program. The criteria for failing one of these checks include the commission of any felony, or a misdemeanor involving controlled substances.80 ï The Patriot Act required institution of checks on truck drivers with Hazmat licenses,81 so the government is gearing up to do 3.5 million criminal background checks (which may actually be conducted by a private contractor such as Lockheed Martin). In a perfect example of publicprivate synergy, employers in the trucking industry may begin requiring all their drivers to get Hazmat licenses so they can get background checks on their drivers, whom they often donít trust. ï A growing normalization of background checks by employers of all kinds is emerging. One survey found 80 percent of companies now conduct background checks on job candidates.82 ï The FBIís new Terrorist Screening Center plans to allow private-sector entities ìsuch as operators of critical infrastructure facilities or organizers of large eventsî to submit lists of names to the government to be checked for ìany nexus to terrorism.î83 These checks are one of the fastest-growing areas of integration between the surveillance/enforcement functions of government and the private sector. There may well be good reasons for implementing background checks in certain circumstances, but an entire infrastructure for such checks is being constructed, and in the long run, there are few 20 THE SURVEILLANCE-INDUSTRIAL COMPLEX A massive new infrastructure for everyday background checks in American life is being built. areas of our lives that will be untouched. Few are stopping to ask what the consequences will be of, for example, banning people from driving a truck or volunteering in sports organizations because they have been busted for possession of marijuana, had a credit problem (real or erroneous) or angered a former landlord. Enlistment in the governmentís surveillance web hurts business The government has forced businesses to hire new staff and assume other expensive burdens to help conduct its surveillance. A wide variety of businesses, including even pawn shops, are faced with the prospect of setting up employee training programs, hiring compliance officers, creating written procedures, conducting annual ìindependent auditsî or creating ìcustomer identification programs.î84 Bank of America, for example, had to create a new department with six employees to handle the governmentís new surveillance mandates.85 BellSouth employs a team of 16 full-time workers for the same purpose.86 The brokerage industry alone will have to spend up to an estimated $700 million in the next few years complying with the Patriot Act.87 All these employees are, in effect, ìoutsourcedî extensions of the governmentís growing surveillance machine, and these expenditures are hidden taxes that corporations often pass on to customers in the form of higher costs and fees. Even worse for some companies is the fact that sweeping laws expanding government access to information could endanger overseas business deals. Canadians have recently expressed concern that because of the Patriot Act, their personal information could be placed in the hands of the FBI if contracts to perform outsourced functions for the Canadian government are given to U.S. companies.88 Failure to comply with the governmentís new mandates can also entail more direct costs; already one company, Western Union, has been fined $8 million under the Patriot Act for failing to report multiple ìsuspiciousî transactions.89 The costs of airline passenger profiling Perhaps the biggest example of burdensome surveillance mandates is the standardization of airline reservations and identity data that would be required by CAPPS II or other passenger- profiling schemes. The independent contractors that handle reservations for most airlines and the other computer systems to which they connect, from Web sites to travel agencies, are simply not equipped to routinely collect names, addresses and telephone numbers for all travelers. Many people travel under group reservations, for example, in which a block of seats is reserved under just one name. And there is not even a field for date of birth in the existing databases ñ and it is no simple matter to add one. The cost of rebuilding these interlocking systems to airlines, travel agents and the traveling public would be enormous; no systematic study has been done, not even by the government, but for CAPPS II, travel writer Edward Hasbrouck has estimated the cost at $1 billion,90 and the International Air Transport Association reported estimates of more than $2 billion.91 The TSA has never explained who will bear this expense or even sought to detail it. And of course that expenditure is only the beginning; there is also the cost to travelers in new hassles and frustrations.92 The Association of Corporate Travel Executives testi- 21 An ACLU Report Sweeping laws expanding government access to information could endanger overseas business deals. fied that a ìconservative estimateî of the cost of CAPPS II to business in delays and denied boardings would be $2 billion.95 By assuming the expenses of hiring workers, building new systems and procedures and purchasing software, businesses are helping to finance the creation of a legal and technological infrastructure for the systematic surveillance of individuals through their private-sector transactions. The government has always enlisted the help of citizens and others in fighting criminals, through such devices as ìmost wantedî posters. But that relatively simple device is worlds away from the wholesale recruitment of private corporations as extensions of the governmentís mass information-collecting apparatus. Mass Data Use, Public and Private Ultimately, the U.S. may need huge databases of commercial transactions that cover the world or certain areas outside the U.S.... Acxiom could build this mega-scale database. ñ Doug Dyer of the Pentagonís Total Information Awareness program96 As we have seen, the government is recruiting both individuals and corporations into an emerging surveillance system. TIPS-like programs aim to promote and organize individualsí vigilance over each other, and feed the output of that mutual observation to the government. And, by plugging into the growing torrents of data swirling through private-sector computers, security agencies are doing the same thing with corporations: turning them into bigger, more far-reaching versions of the cable guy, able to inform on millions of customers in a single bound. 22 THE SURVEILLANCE-INDUSTRIAL COMPLEX Terrorist investigations in a box An entire industry has sprung up to p r o d u c e s o f t w a r e that makes it easier for companies to enforce the governm e n t í s blacklists and other mandates. An example is ìHomeland Tracker,î produced by a subsidiary of the giant database company Choicepoint to ìhelp any business comply with OFAC and USA PATRIOT Act regulations.î The manual proudly touts the softwareís ability to ìget identity verification, check individual names, scan customer filesî and ìbuild personal accept and deny listsî (otherwise known as blacklists). Once a companyís customer data is ìscanned for violations against all data listsî ñ that is, government watch lists ñ the software lets the company ìscan, block or reject business transactionsî involving any entities ìthat threaten national security.î93 This kind of product is offered by more than 50 companies and is being used, according to one survey, by 83 percent of financial companies for watch list screening, and by 50 percent to analyze transactions for money-laundering violations.94 But the progression toward a surveillance society involves much more than efforts to gather information from particular organizations or even particular industries. It also includes efforts at the mass aggregation of information about individuals that aim to do for the rest of American life what the Patriot Act is already doing for the financial sector. If allowed to go far enough, this trend would turn America into a truly Orwellian society. Data mining A primary motivation for and justification of mass data gathering about Americans is a group of techniques loosely labeled ìdata mining.î The idea behind data mining is to tap into the ever-growing number of databases containing details on individualsí behavior, aggregate that data to form rich pictures of individualsí activities and then use computer models to scrutinize them en masse for suspicious behavior. Interest in this concept within the government has sharply raised the stakes of government access to third-party data, because it takes scattered, disconnected databases that may be relatively harmless in isolation and transforms them into a means for the government to monitor individualsí activities. While data mining has never been validated as a method for catching terrorists, it has been pursued by numerous government agencies, from the Army to NASA. The most notorious example is the Pentagonís nowdefunct ìTotal Information Awarenessî program, which sought to use data mining to help identify terrorists from among the hundreds of millions of innocent individuals in the United States. From the start, TIA was premised on a tightly interlinked relationship between government and private-sector data companies. Program director John Poindexter of the Defense Advanced Research Projects Agency (DARPA) explained that the goal was to mine ìthe transaction spaceî in order to find ìsignaturesî of terrorist activity. A graphic on the TIA Web site listed the types of databases that would make up this ìtransaction space,î including financial, medical, travel, ìplace/event entry,î transportation, housing and communications. Private companies, of course, hold much of the data in these categories, and in order to achieve Poindexterís stated goal of weaving these databases together so that they can be treated ìas if they were one centralized database,î the government would clearly need to secure access to vast stores of privatesector data. 23 An ACLU Report Interest in this concept within the government has sharply raised the stakes of government access to third-party data. Parents, Siblings, Neighbors, Associates DOSSIER Name Social Security # Address Phone Date of Birth Travel History Credit Card Usage History Library Records & Book Purchases Music Preferences Internet Usage Logs Sexual Orientation Political Activities Religion Finances Criminal Record Driving Record Education Total Information Awareness: far from unique Congress ultimately voted to strip the funding from Poindexterís program. But TIA was hardly unique. Another program intended to aggregate and analyze vast amounts of private-sector information on the activities of Americans is the MATRIX, which stands for ìMulti-State Antiterrorism Information Exchange.î Like TIA, this program is based on bringing together vast amounts of information to detect terrorism and other crimes, except the MATRIX is run at the state level, and combines government databases from participating states with a private database that claims to have ì20+ billion records from 100ís of sources.î97 At one time 16 states had agreed to participate in the MATRIX. But as a result of the public light thrown on the program by the media and by freedom of information requests filed by the ACLU, at least two-thirds of its members dropped out as of March 2004.98 The program continues, and in a move that is typical of the industry, Seisint is being purchased by LexisNexis, a giant data company, raising the prospect that even more torrents of information will be fed into the program.99 Other government data mining projects are also afoot: ï The NSA has a program called ìNovel Intelligence From Massive Data,î about which little is known.100 ï The CIA reportedly is using a data-mining program called Quantum Leap that ìenables an analyst to get quick access to all the information available ñ classified and unclassified ñ about virtually anyone.î (The CIAís deputy chief information officer told a reporter that the technology is ìso powerful itís scaryî and ìcould be Big Brother.î)101 ï Parts of the original TIA program live on in the Pentagonís secret ìblack budget.î ï A May 2004 survey of federal government data-mining efforts by the General Accounting Office revealed at least four data-mining programs that use personal information from private-sector databases in the hunt for terrorists. For example, the GAO identified a program run by the Defense Intelligence Agency that mines data ìto identify foreign terrorists or U.S. citizens connected to foreign terrorism activities.î102 Regardless of the activities of any particular government agency, it is clear that because of data mining, and the data aggregation that it depends upon, the compilation and sharing of information gathered by the private sector has assumed a much greater importance than in the past. It raises the prospect that information collected by oneís broker, supermarket or catalog retailer will become data points in a frighteningly complete dossier, scrutinized by suspicious government security agencies. 24 THE SURVEILLANCE-INDUSTRIAL COMPLEX Data aggregators are operating in a world where their work is becoming increasingly frightening and politically charged. Parts of the original TIA program live on in the Pentagonís secret "black budget." Data aggregators Government agencies are not the only organizations that are interested in creating high-resolution pictures of individualsí activities by drawing together data from a variety of sources. Companies called ìdata aggregatorsî do the same thing for profit. These companies, which include Acxiom, Choicepoint, Lexis- Nexis and many others, are largely invisible to the average person, but make up an enormous, multi-billion-dollar industry. The Privacy Act of 1974 banned the government from maintaining information on citizens who are not the targets of investigations ñ but law enforcement agencies are increasingly circumventing that requirement by simply purchasing information that has been collected by data aggregators.103 Originally fueled by the economic drive to make expensive corporate marketing campaigns more efficient, these companies are operating in a world where their work is becoming increasingly frightening and politically charged ñ in part because of the new post 9/11 environment and the governmentís corresponding hunger to gather as much data as it can, and in part because of their very success in gathering more and more information about everyone. Data companies collect information from courthouses and other public sources, as well as marketing data ñ sometimes including extremely personal information, such as lists of individuals suffering from incontinence, prostate problems and clinical depression.104 Some databases are even co-ops in which companies agree to contribute data about their own customers in return for the ability to pull out rich profiles of their customers based on the data contributed by all members. Once such company, Abacus Direct, for example, boasts to prospective members that their data will be ìcombined with other 1,700+ 25 An ACLU Report How data mining is used: a snapshot The amount of information that is available about a person once you have his or her name and address is stunning. A marketing brochure published by the data company and credit rating giant Experian provides a snapshot of the kind of practices that have become common. The brochure describes how Experian helped the electronics retailer Best Buy ìdevelop a 360- degree view of their customers.î Having gathered basic information about its customers from ì19 customer touch-points,î Best Buy ìenhanced over 50 million customer recordsî with data compiled by Experian. That data came from ìmore than 3,500 public and proprietary data sources,î and includes age, estimated income, occupation, ìlifestyle dataî and data about individualís product purchases ìsuch as PC ownership and others.î105 It is unclear whether Experian was allowed to keep the purchase records of Best Buyís customers as part of this deal. It is clear, however, that many companies are betraying their customers by sharing the details of their transactions with data companies that add them to the dossiers they maintain about us. companiesí transactions,î that ìConsumer buying behavior [is] defined for over 90 million households (90 percent of U.S.),î that they have records of 3.5 billion transactions and that ñ lest any corporate members fret over betraying the details of their customersí activities ñ ìItís a confidential alliance.î106 Government customers As we have seen, all the information gathered by these companies is now easily available to government security agencies ñ whether through the many legal tools available to them for seizing personal information held by third parties like Experian, or by simply buying it. And the government is, in fact, buying information from these companies. One of the biggest data aggregators, for example, Choicepoint, claims to have contracts with at least 35 government agencies. It has an $8 million contract with the Justice Department that allows FBI agents to tap into the companyís vast database of personal information on individuals, as well as contracts with the Drug Enforcement Administration, the U.S. Marshals Service, the IRS, the Bureau of Citizenship and Immigration Services (formerly INS) and the Bureau of Alcohol, Tobacco and Firearms.107Another data aggregator, Seisint Inc., has received more than $9.2 million in grant money from the Department of Justice and the Department of Homeland Security to provide commercial data to the MATRIX program.108 The government is not just dipping into a preexisting commercial marketplace to purchase data; companies are actually creating and reshaping their products to meet the needs of government security agencies.109 The fact is, private companies are increasingly moving in to perform functions that used to be carried out by the police. Data companies provide information and services that include financial reports, education, professional credential and reference verification, felony checks, motor vehicle records, asset location services, and information on an individualís neighbors and family members, as well as the ìlocation of witnesses, suspects, informants, criminals, [and] paroleesî and the ìverification of identity in criminal and civil investigationsî and in ìnational security matters.î110 Tens of thousands of federal law enforcement agents have access to these services, with few safeguards against abuse.111 Not just federal agencies but also many local police departments subscribe to private-sector information services that can provide officers with information ñ such as a list of a personís past roommates ñ that would spark outrage if maintained directly by the police in their own files. In the newest twist, officers on the beat are even being given the power to access this kind of data on the fly using handheld wireless devices.112 Just as 19th century commercial file-keeping techniques began as a means of determining creditworthiness, and then were used to keep tabs on ìRedsî and labor agitators,113 so we are now witnessing the transmogrification of commercial databanks originally created for commercial purposes into security tools. And although these new tools are extremely powerful, they are constrained by few legal, procedural or technological safeguards against abuse. 26 THE SURVEILLANCE-INDUSTRIAL COMPLEX One of the biggest data aggregators claims to have contracts with at least 35 government agencies. The advantages of private surveillance The use of private-sector data aggregators allows the government to insulate surveillance and information-handling practices from privacy laws or public scrutiny. That is sometimes an important motivation in outsourced surveillance. Private companies are free not only from complying with the Privacy Act, but from other checks and balances, such as the Freedom of Information Act. They are also insulated from oversight by Congress and are not subject to civil-service laws designed to ensure that government policymakers are not influenced by partisan politics; unlike federal government workers, private employees can make donations to political campaigns.114 Other examples of government officials nurturing surveillance schemes that rest in private hands include: ï Minnesotaís ìMultiple Jurisdictional Network Organization.î In a case reminiscent of the mid-20th century private filekeeping groups, it emerged in 2003 that a private group, the Minnesota Chiefs of Police Association, was allowing the police to search its database of law enforcement case files from around the state. Raw case files contain not just criminal record information, but records of any interaction with the police, whether as victim, witness, gunpermit applicant or even the subject of an accusation by a disgruntled neighbor or coworker. The database has been shut down repeatedly because of privacy and security concerns, but may return as a purely stateowned and operated system.115 ï Image Dataís ìTrueIDî system. The Secret Service provided technical assistance and nearly $1.5 million in federal funds to a company attempting to compile a national database of driverís license photographs and make them available for security and commercial purposes. Under the scheme, individualsí photographs would pop up when they appeared at security checkpoints or used a credit card. The plan, which amounted to a privatized national ID system that security agencies would never have dared propose directly, collapsed after it provoked a public outcry.116 Pro-Surve i l l a n ce Lobbying ëIn 20 years, do you think the global database is going to exist, and will it be run by Oracle?í I asked. ëI do think it will exist, and I think it is going to be an Oracle database,í he replied. ëAnd weíre going to track everything.í ñ Jeffrey Rosen interview with Oracle CEO Larry Ellison117 As we have seen, there are many ways in which the government is pressuring corporations to do surveillance on its behalf. But the reverse is also true: Some corporations are pressuring the government to invest in surveillance. Surveillance is big business. Because of the explosion of computers, database technology and information gathering, surveillance technologies are emerging as one of the ripest plums for companies to pluck in the new ìanti-terrorism biz.î E-mails obtained by the 27 An ACLU Report Airport officials were receiving pitches from security technology companies within days of the 9/11 attacks. ACLU (as part of its effort to monitor facerecognition technology) show that airport officials were receiving pitches from security technology companies within days of the 9/11 attacks.118 Enormous sums of money are being poured into government research and development on anti-terror initiatives ñ an estimated $115 billion in 2003 alone, rising to an estimated $130 billion to $180 billion a year through 2010.119 And many companies want a piece of that action. Examples include: ï Lockheed Martin. The defense giant has received a five-year, $12.8 million contract to work on the CAPPS II airline profiling system. It also works on identification systems with the FBI and others and was a major recipient of contracts by Poindexterís office at DARPA.120 ï Acxiom. The Arkansas data aggregator paid Gen. Wesley Clark $830,000 to help it obtain post-9/11 contracts. Clark lobbied Treasury Secretary Paul OíNeill and aides to FBI Director Robert Mueller, and even met personally with Vice President Dick Cheney.121 ï Choicepoint. The Georgia data company increased its lobbying expenditures fourfold after 9/11, from $100,000 in 2000 to more than $400,000 in 2002.122 These companies are hardly alone; one 2003 study found that 569 companies had registered a homeland security lobbyist. As one lobbyist told The New York Times, ìthe major defense contractors want to move into the homeland security arena in a big way.î123 And often that means turning their focus inward from the development of fighter jets and other weapons designed for overseas combat to applications involving surveillance within the nationís borders. It is not possible to determine the overall extent to which private-sector lobbying has actually driven the governmentís push for increased surveillance, as opposed to simply helping companies fight for pieces of a pre-determined government pie. It will be up to historians and investigative reporters to measure the role of companies pushing new software products, or seeking to develop a homeland security market for their pre-existing data stores. But in at least some cases, major new impetus for surveillance-friendly policies has clearly come from the private sector: ï TIA. The Pentagonís TIA program was proposed by a private company, an engineering services firm called Syntek. Syntek vice president John Poindexter worked on components of TIA for years before eventually becoming director of the DARPAís Information Awareness Office, which oversaw the program.124 ï The MATRIX. The interstate MATRIX program similarly originated with a private company, the data aggregator Seisint. In 2001, the companyís founder approached Florida police with the idea, and Seisint began developing the program for Florida, which was later joined by other interested states.125 ï National ID Cards. Larry Ellison, the CEO of Oracle Software, almost singlehandedly created a national debate over the notion of a U.S. national identity card in late 2001 by calling for such a card and promising to provide the software for it without charge. Critics noted that he did not agree to pay for the far more lucrative servicing contracts on the system.126 28 THE SURVEILLANCE-INDUSTRIAL COMPLEX Defense contractors are turning their focus inward to applications involving surveillance within the nationís borders. ï Face Recognition. In the wake of 9/11, vendors of face-recognition software began to aggressively tout their product as a ìnationwide shieldî that would prevent future attacks, leading to the experimental deployment of the technology in airports around the nation. (Most quickly concluded that the technology was not up to the task.)127 Insufficient powers of surveillance was not Americaís problem on 9/11; a congressional investigation into the attacks as well as reports issued by the National Commission On Terrorist Attacks Upon The United States (the ì9/11 Commissionî) found that the governmentís failure to prevent them was a result of fundamental organizational breakdowns in the intelligence community, and the governmentís failure to make effective use of the surveillance powers it already had.128 But there is much more money to be made providing complex, cutting- edge technological solutions to security problems than there is in sorting out organizational or bureaucratic problems, or fixing problems with the basics of security by, for example, strengthening airplane cockpit doors or increasing the professionalism of airport security screeners. It would be a double tragedy if the emerging surveillance- industrial complex were not only to lobby for increased surveillance on Americans, but also to divert resources from security measures that would be far more likely to be effective in protecting Americans from attacks. Six Conclusions We should take nothing for granted. ñ President Eisenhower Conclusion #1: An alliance of unchecked interests Individual freedom is always at risk in the face of large, powerful institutions. In America, this problem has been addressed by setting power against power. In the case of government power, that has been accomplished through the system of checks and balances put in place in our Constitution. In the case of corporate power, that has been accomplished through competition, which sets company against company, and through regulation, which sets the power of government against the power of corporations (including the governmentís antitrust powers, to ensure that company remains set against company). In the area of privacy, however, these time-tested protective arrangements are increasingly breaking down: ï Insufficient and eroding checks on government. The checks and balances that are supposed to restrain government power are not being put in place, as shown by the lack of due process protections for watch lists, for example, or rules to handle data collected from citizen tip lines. Often, this is because of the rapidity with which new information technologies have emerged ñ but existing checks and balances are also being weakened, such as judicial oversight of surveillance, which was reduced sharply by the Patriot Act. ï Insufficient checks on corporations. The virtual absence of governmental reg- 29 An ACLU Report The power of government and the power of corporations, instead of being set against each other, are actually becoming aligned. ulation of corporate privacy in the U.S. ñ unique in the developed world ñ gives companies a free hand to sell, trade and share the details of their customersí transactions without their permission or knowledge. And while competitive forces may limit data sharing among some companies, the thriving marketplace of data brokers often serves the function of bridging that gap. The power of government and the power of corporations, instead of being set against each other, are actually becoming aligned. There are certainly companies and industries concerned about privacy, and others concerned about the costs of complying with the new surveillance mandates. But most companies have a strong incentive to maximize consumer data collection, and even the most privacy- protective company is helpless in the face of official demands for customer information. Other companies, as we have seen, actively lobby for wider government use of personal records. The United States has experienced occasional periods of intense social and political conflict, such as the Vietnam War, the Civil Rights movement and the labor movement earlier in the 20th century. Given the greatly enhanced surveillance powers of major corporations and government security agencies, which in the past have actively opposed such movements, how will the forces fighting for change fare today and the next time such a period emerges? Conclusion #2: Mass surveillance threatens freedom more than it threatens terrorists The governmentís post-9/11 efforts to vacuum up and sift through masses of private-sector data is premised on the impulse that ìif we had just known who those people were and what they were doing, we could have stopped them ñ so letís track everyone.î The tragedy is that mass surveillance is not only dangerous to our liberties, but is unlikely to be effective. Sifting through the lives of hundreds of millions of people is an inefficient, highly unreliable means of discovering a one-in-a-billion terrorist. The best way to stop terrorism is still through old-fashioned intelligence and law enforcement techniques that rely on working outward from known leads and suspects. Attempting to work inward from the entire resident and visitor population of the United States to locate a handful of terrorists will harm many innocent people yet leave us vulnerable. Working outward from known leads is not only more effective, but is also compatible with an entire body of law that has grown up over hundreds of years to prevent abuses by all-too-human investigators. The drive to detect wrongdoing through the mass scrutiny of individual records from the private sector, on the other hand, would violate a principle that is core to our legal system: The government cannot invade your privacy unless it has individualized reason to believe that you are involved in wrongdoing. The principle of individualized suspicion not only protects individuals against unfair treatment, but also imposes a necessary discipline on police investigators, who can be tempted at times to engage in wasteful and inefficient fishing expeditions. Unfortunately, as this report demonstrates, the fishing expedition 30 THE SURVEILLANCE-INDUSTRIAL COMPLEX The kinds of activities and information that the Founding Fathers sought to protect through the Fourth Amendment have moved out of the home in modern life. Sifting through the lives of hundreds of millions of people is an inefficient, highly unreliable means of discovering a one-in-a-billion terrorist. approach is rapidly being hardwired into our laws and even our technologies. Conclusion #3: The courts must catch up Historically, the courts have been slow to adapt the Fourth Amendment129 to new technology, and today is no different. When the telephone came into use, the Supreme Court failed to give legal protection to the content of telephone conversations against government wiretapping, instead engaging in literal-minded hairsplitting about whether particular eavesdropping devices physically penetrated a ìconstitutionally protected area.î It was almost 40 years before the Supreme Court finally ruled that a wiretap, just like a physical search, required a warrant based on probable cause, and that ìthe Fourth Amendment protects people, not places.î130 Today, the Supreme Court has still not recognized the right to privacy in highly personal information held by third parties ñ whether financial records, medical records or library and book records ñ on the theory that there can be no ìreasonable expectationî of privacy regarding such information. When the Constitution was written, the home was the center of economic, financial and even medical life, and personal records and writings were likely to be stored there, not on the servers of a multinational corporation. The Founders therefore created strong protections for peopleís ìhouses and effects.î Today our homes remain highly protected from government scrutiny, but the kinds of activities and information that the Founding Fathers sought to protect through the Fourth Amendment have moved outward due to computers, telecommunications and other developments of modern life. But though privacy in oneís affairs is no less necessary today, we are now exposed to easy scrutiny by the government and other powerful institutions. As with phone calls last century, so with third-party records today: The Court has yet to transcend the particular, 18th century formulation of privacy written into the Constitution and embrace the deeper ethos of privacy that the Founders intended to protect, and that is necessary to preserving a healthy democracy in an age of high technology. Our laws will probably catch up, as they did with the telephone, but we must ensure that they are given the chance. It is a very real danger that, given the time it takes the courts to adjust to new technology, our law enforcement and national security establishments will take advantage of the lag to institutionalize data mining and other surveillance practices that would never be accepted otherwise. Conclusion #4: The ACLU is leading the fight The ACLU is working hard across many of the dimensions described in this report to combat the emergence of a public-private surveillance state. In the past two years, the ACLU: ï Helped defeat TIPS. The ACLU led public opposition to this intrusive proposal, both in the media and in the halls of Congress. (See www.aclu.org/SafeandFree/ SafeandFree.cfm?ID=11295&c=206). ï Helped defeat TIA. The ACLU was instrumental in creating and maintaining public pressure on this program, leading to its eventual defeat by Congress. (See www.aclu.org/Privacy/Privacy.cfm?ID= 14729&c=130). Today the fight continues. The ACLU is: ï Fighting against racial profiling. Abroad assault on the kind of racial profiling implicitly encouraged by TIPS-like ìterrorism watchî programs has been one of the 31 An ACLU Report ACLUís highest priorities both before and after 9/11. (See www.aclu.org/profiling). ï Fighting the MATRIX. By coordinating action among the ACLUís state affiliates, including the filing of state open-records requests and efforts to inform state legislators about the program, the ACLU has helped reduce the number of participating states by two-thirds. (See www.aclu.org/matrix). ï Fighting CAPPS II. From media appearances to public testimony to generating citizen faxes to lobbying in the halls of Congress and the European Union headquarters in Brussels, the ACLU has helped point out the flaws of this unnecessary program and, so far, delay its deployment. (See www.aclu.org/capps). ï Working to discover how the governmentís secret watch lists operate. The ACLU has filed a lawsuit to force the government to comply with a Freedom of Information Act (FOIA) request seeking information on how the governmentís No- Fly list operates and how individuals can get off it. (See www.aclu.org/SafeandFree/ SafeandFree.cfm?ID=15422&c=206). ï Challenging the No-Fly list in court. In addition to seeking information, the ACLU has also directly challenged the No-Fly list through a class action lawsuit filed on behalf of innocent people caught up by the list. (See www.aclu.org/nofly). ï Fighting in court to find out how the Patriot Act is being implemented. The ACLU has filed a lawsuit to force the government to comply with a FOIA request for information on how often it has used the Patriot Act to obtain individualsí records from businesses or other third parties. (See www.aclu.org/patriotfoia). ï Challenging the Patriot Actís ìbusiness recordsî section in court. The ACLU has launched a direct legal challenge to Section 215 of the Patriot Act, which greatly expands the governmentís ability to secretly obtain data held by libraries, businesses and other third parties. (See www.aclu.org/section215). ï Challenging the use of ìNational Security Lettersî in court. The ACLU has also filed a direct legal challenge to the Patriot Actís dramatic expansion of law enforcementís authority to use National Security Letters to demand customer records without judicial oversight. (See www.aclu.org/nsl). ï Working in Congress to reverse the worst provisions of the Patriot Act. ACLU lobbyists have been working in Congress to pass legislation called the SAFE Act. (See www.aclu.org/SafeandFree/SafeandFree.cf m?ID=15962&c=206). ï Running a national grassroots campaign to build opposition to Patriot Act surveillance. With a full-time team of community organizers, the ACLU has helped hundreds of communities, representing nearly 20% of the U.S. population, to pass resolutions in opposition to the Patriot Act. (See www.aclu.org/resolutions). ï Exposing government and private-sector surveillance. The ACLU has produced numerous reports to inform the public and the news media about government surveillance. They include: ï ìBigger Monster, Weaker Chains: The Growth of an American Surveillance Societyî (www.aclu.org/monster) ï ìUnpatriotic Acts: The FBIís Power to Rifle Through Your Records and 32 THE SURVEILLANCE-INDUSTRIAL COMPLEX Personal Belongings Without Telling Youî (www.aclu.org/SafeandFree/ SafeandFree.cfm?ID=13246&c=206) ï ìThe Dangers of Domestic Spying by Federal Law Enforcement: A Case Study on FBI Surveillance of Martin Luther Kingî (www.aclu.org/Files/ OpenFile.cfm?id=9999). ï Working to discover how information has been shared by airlines. The ACLU has filed FOIA requests with DHS and the TSA seeking information about how personal travel information from JetBlue and American Airlines was shared and used. (See www.aclu.org/jetblue). ï Fighting expansion of CALEA. The ACLU is working to prevent the expansion of CALEA, which would force Internet telephony companies to design their software to enable government eavesdropping. (See www.aclu.org/Privacy/ Privacy.cfm?ID=15468&c=130). Conclusion #5: Individuals must act to stem the supply of personal data The governmentís strategy of relying on privatesector surrogates is a new and challenging development in the growth of surveillance. In the ACLUís view, the U.S. should emulate much of the rest of the developed world and create overarching data privacy laws that cover at least our most sensitive data, including data in the hands of the private sector. The United States is virtually alone among major industrialized nations in lacking such a law (or a federal privacy official charged with protecting the public). But regardless of oneís opinions about how the government should regulate the commercial sector, nearly everyone who cares about his or her personal privacy agrees that the governmentís use of the private sector to supply it with our personal information needs to be brought under control. One thing that consumers can do is to vote with their feet and their pocketbooks when they donít like what companies are doing behind their backs. In the short term, Americans must weigh in against the governmentís practice of ìoutsourcing surveillanceî and make use of their role as consumers, shareholders and activists to put pressure on companies that are voluntarily participating in this emerging system. The ACLU is creating a Web site to help individuals contact companies about their privacy practices: www.aclu.org/privatize. Conclusion #6: We should take nothing for granted In his Farewell Address of January 17, 1961, President Eisenhower famously warned that the ìconjunction of an immense military establishment and a large arms industry is new in the American experience.î We might update his words to describe what we are facing today: ìthe conjunction of an immense security establishment and a large data industry.î Eisenhowerís conclusion about what he dubbed the ìmilitary-industrial complexî was that: The potential for the disastrous rise of misplaced power exists and will persist. We must never let the weight of this combination endanger our liberties or democratic processes. We should take nothing for granted.131 This warning applies just as strongly to the ìsurveillance- industrial complexî that is emerging in our own time. And the consequences of ignoring it would be just as dire. 33 An ACLU Report ENDNOTES 1 See Jay Stanley and Barry Steinhardt, ìBigger Monster, Weaker Chains: The Growth of an American Surveillance Society,î ACLU, January 2003; online at http://www.aclu.org/Privacy/Privacy.cfm?ID=11573&c=39. 2 Frank J. Donner, The Age of Surveillance: The Aims and Methods of Americaís Political Intelligence System (New York: Alfred A. Knopf, 1980), chapter 12. 3 Operation TIPS Web pages from July 16 and August 8, 2002; available online at http://www.thememoryhole.org/policestate/ tips-changes.htm. 4 According to the 2000 census, the population of the 10 largest cities in the U.S. totaled 23,899,236. By recruiting 1 million participants from that population, TIPS would have turned one in every 24 residents of those cities into informants (and the proportion would be even higher if any smaller cities were included in the pilot program). 5 Sandra Sobieraj, ìBush Urges Americans to Volunteer,î Associated Press, January 30, 2002; available online at http://www.firehouse.com/news/2002/1/30_APbushvol.html. 6 Citizen Corps, ìCitizen Corps: A Guide for Local Officials,î April 2002, p. 25; online at http://www.citizencorps. gov/pdf/council.pdf. 7 Citizen Corps Councils home page at http://www.citizencorps. gov/councils/. 8 ìCoastal Beacon Program Continues,î Coast Guard press release, July 17, 2002; online at http://www.uscg.mil/d1/newengland/press_releases/081-02.htm. 9 ìPresident Promotes Citizen Corps for Safer Communities,î White House Press Release, April 8, 2002; online at http://www.whitehouse.gov/news/releases/2002/04/20020408-4.html. 10 Eyes on the Water program Web page at http://www.uscg.mil/d9/eyesonthewater/howdoihelp.htm; Paul Singer, ìCoast Guard asks help watching out for terrorism on Great Lakes,î Associated Press, July 25, 2002; River Watch Web page at http://www.michigan.gov/msp/0,1607,7-123-1589_3492-73050--,00.html. The primary difference between these programs and TIPS appears to be that while TIPS would have been centralized, now every Coast Guard district is setting up its own program. 11 ìHighway Watch Fact Sheet,î Highway Watch home page; online at http://www.highwaywatch.com/aboutus/fsheet.html. Like some of the coastal watch programs, Highway Watch was listed as an ìexisting systemî on an ìOperation TIPS Fact Sheetî published by Citizen Corps, but continues to operate despite Congressís decision to shut down TIPS. Citizen Corps Web site, ìOperation TIPS Fact Sheet,î undated. The fact sheet was removed from the governmentís Web site after TIPS was cancelled, but is available online at http://www.thememoryhole. org/policestate/last-tips.mht. See also Alice Lipowicz, ëHighway Watchí Truckers Are the Eyes and the Ears of ìHomeland Security,î Congressional Quarterly Homeland Security, June 8, 2004. 12 CAT Eyes, ìAbout Us,î and ìThe Program: Neighborhood Block Watch Duties Using CAT Eyes,î available at http://www.cateyesprogram.com. The program places a commendable emphasis on teaching trainees not to use race as a basis for suspicion. 13 Jennifer Steiner, ìAnderson Township Sheriffís Department Recruits Realtors,î WCPO 9News, July 8, 2004; online at http://www.wcpo.com/news/2004/local/07/07/realtors.html. Jennifer Edwards, ìRealty agents, sheriff team up,î Cincinnati Enquirer, July 20, 2004; online at http://www.enquirer.com/editions/ 2004/07/20/loc_loc4and.html. 14 Brian Baskin, ìWorkers recruited in war on terror,î Orlando Sentinel, July 8, 20042004; online at http://www.orlandosentinel. com/news/local/orange/orl-aseccap08070804jul08,1,152972.story. Baskin, ìëAwareí primer will be revised,î Orlando Sentinel, July 16, 2004; online at http://www.sun-sentinel.com/news/local/southflorida/ orl-loccapfolo16071604jul16,0,4840672.story. 15 ìGovernor Pataki Announces Public Security Tips Hotline,î press release, Office of the Governor, New York State, Sept. 16, 2002; online at http://www.state.ny.us/governor/ press/year02/sept16_1_02.htm. See also Nat Hentoff, ìAshcroftís Shadowy Disciple: Someone to Watch Over Us,î Village Voice, November 15th, 2002. 16 Air Force Office of Special Investigations, Eagle Eyes home page at http://www.dtic.mil/afosi/eagle/index.html. 17 Brian McWilliams, ìDoD Logging Unverified Tips,î Wired News, June 25, 2003; online at http://www.wired.com/news/politics/ 0,1283,59365,00.html. 18 See description of JetBlue case, p. 10. William M. Arkin, ìMission Creep Hits Home: American armed forces are assuming major new domestic policing and surveillance roles,î Los Angeles Times, November 23, 2003. 19 Quote is a link on Louisiana Homeland Security page at http://www.loep.state.la.us/homeland/hls-main-citizens.htm. Clicking on the link brings readers to the federal Citizen Corps homepage. 20 Maryland Joint Terrorism Task Force Flyer, ìMaryland Law Enforcement Seeks Your Help in Preventing Terrorism!"; online at http://baltimore.fbi.gov/mdjttfflyer1.pdf. 21ìRegional Terrorism Task Force Advises Public On ëThreat Level Orangeí Protections,î press release, Lucas County, Ohioassuming Web site, May 29, 2003; online at http://www.co.lucas.oh.us/HomelandSecurity/Stories/OrangeLevelProtectiveMeasures.asp. 34 THE SURVEILLANCE-INDUSTRIAL COMPLEX 22 Christopher Tripp, ìFlashing highway signs proliferate, but do they help?î (Fredericksburg, VA) Free Lance-Star, May 11, 2003; online at http://www.freelancestar. com/News/FLS/2003/052003/05112003/970175. 23 Example online at http://www.state.oh.us/odps/homelandsecurity/ homeresponseguidefamilies.pdf. The warning applies to all alert levels except the lowest ñ a status unlikely to be declared anytime in the foreseeable future. 24 National Crime Prevention Council, ìUnited for a Stronger America: Citizensí Preparedness Guide,î pp. 2, 6, 20; online at http://www.citizencorps.gov/pdf/cpg.pdf. This advice is reminiscent of Federal Civil Defense public-service films of the 1950s, which were long on frightening facts about possible attacks, and short on advice for citizens likely to be useful in case of attack. See for example, ìWhat You Should Know About Biological Warfare,î Federal Civil Defense Administration public-service film, 19521952; available online at http://www.archive.org/movies/details-db.php?collection= prelinger&collectionid=01449. This film explains in frightening detail the nature of the threat (reinforced by a soundtrack of scary music), and contains only vague suggestions for what to do about it, such as ìkeep yourself clean.î The filmís main message: ìcooperate with the authorities!î 25 U.S. Coast Guard, Marine Safety Office Pittsburgh; online at http://www.uscg.mil/d8/mso/pittsburgh/PittsburghBrochure.pdf. 26 Frank James, ìTerror tip lines prone to stereotyping,î Chicago Tribune, April 17, 2003; available online at http://www.sanluisobispo.com/mld/sanluisobispo/news/politics/ 5664237.htm. Dan Fesperman, ìMd. Tip center a model for U.S. security,î Baltimore Sun, Jan. 12, 2004. 27 Privacy Act of 1974, PL 93-579, Sec. 3, Dec. 31, 1974, 88 Stat. 1897. The privacy act does apply to subcontractors who are directly performing the governmentís work for it, but not companies that collect data for their own reasons. 28 ìReport to the Standing Committee on Governmental Operations of the New York State Assembly,î June 8, 1976, cited in Ross Gelbspan, Break-Ins, Death Threats and the FBI: The Covert War Against the Central America Movement (Boston: South End Press, 1991), 80-81. 29 Gelbspan, pp. 45, 77-84, 169-172. The LAPD files were the subject of a 1983 lawsuit filed by the ACLU on behalf of many of the victims of police spying, which eventually resulted in a $1.8 million settlement from the city of Los Angeles. 30 Donner, 417-419. 31 James Bamford, Body of Secrets: Anatomy of the Ultra-Secret National Security Agency: From the Cold War Through the Dawn of a New Century (New York: Doubleday, 2001), 434. 32 James Bamford, The Puzzle Palace: A Report on NSA, Americaís Most Secret Agency (Boston: Houghton Mifflin Co., 1982), 236-50. Operation Shamrock was not shut down until 1975. However, L. Britt Snider, who had investigated Operation Shamrock for the Church Committee in 1975 (and later became inspector general of the CIA), observed that ìrelations between intelligence agencies and the private sector endured.î Bamford, Body of Secrets, 440. 33 Bamford, Puzzle Palace, 244-45, 248-52. 34 See Stanley and Steinhardt, ìBigger Monster,î 4. 35 Ryan Singel, ìJetBlue Shared Passenger Data,îWired News, Sept. 18, 20032003; online at http://www.wired.com/news/privacy/ 0,1848,60489,00.html. Ryan Singel and Noah Shachtman, ìArmy Admits Using JetBlue Data,î Wired News, Sept. 23, 2003; http://www.wired.com/news/privacy/0,1848,60540,00.html. 36 Electronic Privacy Information Center, ìNorthwest Airlines Gave NASA Personal Info on Millions of Passengers; Disclosure Violated Privacy Policy,î press release, Jan. 18, 2004; online at http://www.epic.org/privacy/airtravel/nasa/pr1.18.04.html. See also Sara Kehaulani Goo, ìNorthwest Gave U.S. Data on Passengers,î Washington Post, Jan. 18, 2004; online at http://www.washingtonpost. com/wp-dyn/articles/A26422-2004Jan17.html. 37 ìAmerican Released Passenger Data,î Associated Press, April 10, 2004; available online at http://www.wired.com/news/privacy/0,1848,63018,00.html. 38 John Schwartz and Micheline Maynard, ìF.B.I. Got Records on Air Travelers,î New York Times, May 1, 2004; online at http://www.nytimes.com/2004/05/01/politics/01AIRL.html. 39 Eunice Moscoso, ìFeds demanding more info about companiesí customers,î Atlanta Journal Constitution, August 17, 2003; available online at http://www.ajc.com/business/content/ business/0803/17patriot.html. 40 Patrick Healy, ìColleges giving probers data on foreign studentsí finances,î Boston Globe, Oct. 3, 2001. American Association of Collegiate Registrars and Admissions Officers, ìPreliminary Results of the AACRAO Survey on Campus Consequences of the September 11 Attacks,î October 4, 2001; online at http://www.aacrao.org/transcript/index.cfm?fuseaction= show_view&doc_id=434. 41 Stephanie Stoughton, ìPoll: Firms Relaxed Privacy Rules,î Boston Globe, Oct. 8, 2001. 42 InfraGard Web site at http://www.infragard.net/. See also http://www.govjobs.com/Cont/InfraGard/Infragard%20Secure% 20Access%20Agreement.pdf. 43 Chris Seper, ìCombating Cybercrime: Different companies work together in groups organized by FBI,î Cleveland Plain Dealer, Nov. 4, 2002; available online at http://www.infragard. net/library/ig_promotes_awareness.htm. 44 Cleveland Plain Dealer, Nov. 4, 2002, op. cit. Two FBI agents in the Cleveland office denied such an arrangement. But the newspaper cites the chairwoman of the InfraGard national executive board: ìI have the list with me,î she told the paper. 35 An ACLU Report 45 For a useful overview see Jim Dempsey and Lara Flint, ìPrivacyís Gap: The Largely Non-Existent Legal Framework for Government Mining of Commercial Data,î Center for Democracy and Technology, May 28, 2003; online at http://www.cdt.org/security/usapatriot/030528cdt.pdf. 46 See Ann Beeson and Jameel Jaffer, ìUnpatriotic Acts: The FBIís Power to Rifle Through Your Records and Personal Belongings Without Telling You,î ACLU Report, July 20032003; online at http://www.aclu.org/SafeandFree/SafeandFree.cfm?ID=13246&c=206. See also http://www.aclu.org/patriot. 47 The only requirement is that the National Security Letter be ìrelevant toî an ongoing investigation. The ACLU has filed a lawsuit challenging the constitutionality of NSLs; see http://www.aclu.org/nsl. 48 Intelligence Authorization Act for Fiscal Year 2004, P.L. 108- 177, December 13, 2003, 117 Stat. 2599. See also Kim Zetter, ìBush Grabs New Power For FBI,î Wired News, January 6, 2004; online at http://www.wired.com/news/privacy/ 0,1848,61792,00.html. 49 In re Sealed Case, 310 F.3d 717, 746 (Foreign Intelligence Surveillance Court of Review 2002). 50 Eunice Moscoso, ìFeds demanding more info about companiesí customers,î Atlanta Journal Constitution, August 17, 2003; available online at http://www.ajc.com/business/content/ business/0803/17patriot.html. 51 Rod Smith, ìSources: FBI gathered visitor information only in Las Vegas,î Las Vegas Review Journal, January 7, 2004; online at http://www.reviewjournal.com/lvrj_home/2004/Jan- 07-Wed-2004/news/22934251.html. ìSurveillance City,î editorial, Las Vegas Review-Journal, Jan. 11, 2004; online at http://www.reviewjournal.com/lvrj_home/2004/Jan-11-Sun-2004/opinion/ 22961926.html. 52 ìTransactional Records NSLs Since 10/26/2001," available online at http://www.aclu.org/patriot_foia/foia3.html. See also Dan Eggen and Robert OíHarrow Jr., ìUS Steps Up Secret Surveillance: FBI, Justice Dept. Increase Use of Wiretaps, Records Searches,î Washington Post, March 24, 2003; online at http://www.washingtonpost.com/ac2/wp-dyn/A16287-2003Mar23. 53 Associated Press, ìNet Effect: Antiterror Eavesdropping: Privacy Advocates Worry Civil Rights May be Trampled,î May 27, 2002; available online at http://tinyurl.com/xmai. 54 Atlanta Journal Constitution, August 17, 2003, op. cit. 55 Miles Benson, ìIn the Name of Homeland Security, Telecom Firms Are Deluged With Subpoenas,î Newhouse News Service, April 10, 2002; online at http://www.newhouse. com/archive/story1a041002.html. 56 Stewart Baker, former General Counsel of the NSA, quoted in ibid. 57 U.S. Department of Justice, ìJoint Petition For Expedited Rulemaking,î March 10, 2004; available online at http://www.steptoe. com/publications/FBI_Petition_for_Rulemaking_on_CALEA.pdf. Declan McCullagh and Ben Charmy, ìFBI adds to wiretap wish list,î CNET News, March 12, 20042004; online at http://news.com.com/2100-1028-5172948.html. Declan McCullagh, ìInside Ciscoís Eavesdropping Apparatus,î CNET News, April 21, 2003, online at http://news.com.com/2010-1071-997528.html. 58 Kevin Poulsen, ìCyber Security Plan Contemplates U.S. Data Retention Law,î SecurityFocus, June 18, 2002. The report, which was based on unnamed sources, was denied by the White House. 59 Letter from James J. Foster, U.S. Mission to the EU (transmitting President Bushís proposal), to Romano Prodi, President of the European Commission, October 16, 2001, online at http://www.statewatch.org/news/2001/nov/06Ausalet.htm. 60 ìMajority of governments introducing data retention of communications,î Statewatch, January 12, 2003, online at http://www.statewatch.org/news/2003/jan/12eudatret.htm. 61 See Edward Hasbrouck, ìWhatís wrong with CAPPS-II?"; online at http://hasbrouck.org/articles/CAPPS-II.html. 62 Over the long run, the CRSs may reap significant financial benefits from selling the enhanced travel data they will be collecting, but the cost of collecting that data is still likely to be passed on to consumers (see p. 21). 63 Cynthia L. Webb, ìUncle Sam Mothballs Screening Program,î WashingtonPost.com, July 16, 2004; online at http://www.washingtonpost. com/wp-dyn/articles/A54487-2004Jul16.html. 64 Richard Spillenkothen, Federal Reserve Board, ìTestimony Before the Committee on Banking, Housing, and Urban Affairs, U.S. Senate,î January 29, 2002; online at http://www.federalreserve. gov/boarddocs/testimony/2002/20020129/default.htm. 65 The USA-Patriot Act, P.L. 107-56, Section 365, 115 Stat. 272 (Oct. 26, 2001). Scott Bernard Nelson, ìPatriot Act would make watchdogs of firms,î Boston Globe, November 18, 2001. 66 Inflation figures calculated using the historical inflation calculator at http://www.inflationdata.com. 67 Quoted in Nelson, op. cit. 68 ìFinancial Crimes Enforcement Network; Special Information Sharing Procedures to Deter Money Laundering and Terrorist Activity: Final Rule,î 67 Federal Register, 60,579 (Sept. 26, 2002); the regulations stem from section 314 of the Patriot Act. Michael Isikoff, ìShow Me the Money: Patriot Act helps the Feds in cases with no tie to terror,î Newsweek, Dec. 1, 2003, online at http://www.msnbc.com/news/997054.asp. 69 The rules do prohibit banks from disclosing the names to others, but they can themselves use them in ìdetermining whether to establish or maintain an account, or to engage in a transaction.î 67 Federal Register, 60,579, 60,586 (Sept. 26, 2002). 36 THE SURVEILLANCE-INDUSTRIAL COMPLEX 70 ìTransactions and Customer Identification Programs; Final Rules and Proposed Rule,î Federal Register, 25089 (May 5, 2003). See also Kathleen Pender, ìWould-be investor runs afoul of Patriot Act,î San Francisco Chronicle, August 28, 2003; online at http://www.sfgate.com/cgibin/ article.cgi?file=/chronicle/archive/2003/08/28/BU298595.DTL. Portland Press Herald, ìBanks tighten rules on proving identity,î Portland Press Herald, Sept. 22, 2003. 71 Brian Braiker, ìThe ëPatriotí Search,î Newsweek Online, June 3, 2004; online at http://msnbc.msn.com/id/5131685/site/newsweek. 72 Sara B. Miller, ìBlacklisted by the bank,î Christian Science Monitor, August 25, 2003; online at http://www.csmonitor.com/2003/0825/p15s01-wmcn.html. 73 Ann Davis, ìFar Afield: FBIís Post-Sept. 11 ëWatch ListíMutates, Acquires Life of Its Own,î Wall Street Journal, Nov. 19, 2002. 74 Amy Lee, ìBlues, Aetna help hunt terrorists: Client, worker files checked against fed list,î Detroit News, Nov. 16, 2003; ìInsurance Giants Search for Terrorists,î Associated Press, Nov. 17, 2003. 75 The ACLU has filed a lawsuit on behalf of individuals victimized by these inaccurate lists. See http://www.aclu.org/nofly. 76 Bruce Schneier, CRYPTO-GRAM newsletter, April 15, 2003; online at http://www.schneier.com/crypto-gram-0304.html. See also Schneier, Beyond Fear (New York: Copernicus Books, 2003), chapter 3. 77 James Gordon Meek, ì13 Million on Terror Watch List,î New York Daily News, April 8, 2003; online at http://www.nydailynews. com/04-08-2003/news/wn_report/story/73628p-68132c.html. Tom Godfrey, ì5 million on [U.S.] terrorism list,î Toronto Sun, January 20, 2004; online at http://www.canoe.ca/NewsStand/TorontoSun/News/2004/01/20/318488.html. 78 Dennis Hevesi, ìWhen the Credit Check Is Only the Start,î New York Times, October 12, 2003; online at http://query.nytimes.com/gst/fullpage.html?res=9C07E0D816 3FF931A25753C1A9659C8B63. Douglas Hanks III, ìCredit bureaus screening for terrorists,î Miami Herald, July 6, 2003; online at http://www.miami.com/mld/miamiherald/6231536.htm. 79 Adam Geller, ìHigh-Tech Background Checks Hit Stores,î Associated Press, March 8, 2004; available online at http://seattlepi.nwsource.com/business/aptech_story.asp?category= 1700&slug=Background%20Check. 80 PROTECT Act, P.L. 108-21, Section 108 (April 30, 2003); FBI presentation delivered at meeting of National Crime and Prevention and Privacy Compact Council, Alexandria, Virginia, October 3, 2003. 81 The USA-Patriot Act, Section 1012, P.L. 107-56, 115 Stat. 272 (Oct. 26, 2001). 82 Geller, op cit. 83 Donna A. Bucella, Director, FBI Terrorist Screening Center, ìStatement Before The House Judiciary Committee, Subcommittee on Crime, Terrorism, and Homeland Security, and the House Select Committee on Homeland Security, Subcommittee On Intelligence and Counterterrorism,î March 25, 20042004; online at http://www.fbi.gov/congress/congress04/bucella032504.htm. See also Guy Taylor, ìFBI up for private screens,î Washington Times, March 26, 2004; online at http://www.washtimes.com/national/20040326-124121-1245r.htm. 84 Caitlin Harrington, ìEven Pawn Shops Feel the Hand of the Patriot Act,î Congressional Quarterly, March 2, 2004. 85 Meredith Jordan, ìBanks Bracing for Effects of USA Patriot Act,î Atlanta Business Chronicle, November 8, 2002. 86 AJC, August 17, 2003. 87 Lucas Mearian, ìBrokerages face big IT bills to comply with USA Patriot Act,î ComputerWorld, March 17, 2003. 88 Judith Lavoie, ìCanada risks U.S. privacy invasion: Canadiansí personal information could be put in the hands of the FBI under American Patriot Act,î Times Colonist (Victoria), March 4, 2004. 89 New York State Banking Department, ìBanking Department Fines Western Union $8 Million for Violating Bank Secrecy, USA Patriot, New York Banking Laws,î press release and consent agreement, Dec. 18, 2002; online at http://www.banking. state.ny.us/pr021218.htm. 90 Edward Hasbrouck, ìComments Re: Docket Number DHS/TSA-2003-1, ëPassenger and Aviation Security Screening Recordsí" ; online at http://hasbrouck.org/articles/ Hasbrouck_TSA_comments-30SEP2003.pdf. See also Hasbrouck, ìWhy CAPPS-II would cost a billion dollars,î blog entry, February 13, 2004; online at http://hasbrouck.org/blog/archives/000149.html. 91 International Air Transport Association, ìAirline Reservation System and Passenger Name Record (PNR) Access by States,î March 15, 2004, p. 3; online at http://www.icao.int/icao/en/atb/fal/fal12/documentation/ fal12wp074_en.pdf. 92 See General Accounting Office, ìComputer-Assisted Passenger Prescreening System Faces Significant Implementation Challenges,î GAO-04-385, February 2004; online at http://www.gao.gov/new.items/d04385.pdf. 93 Bridger Systems, Inc., ìHomeland Tracker 5.5, OFAC Tracker 5.5, World Tracker 5.5: Windows Manual,î 2003; online at http://www.bridgertracker.com/Downloads/WindowsManual55.pdf. 94 Eunice Moscoso, ìFeds demanding more info about companiesí customers,î Atlanta Journal Constitution, August 17, 2003available online at http://www.ajc.com/business/content/ business/0803/17patriot.html. Deloitte & Touche 37 An ACLU Report LLP, Anti-Money Laundering Compliance Survey, October 10, 2003 at 2. Available at http://www.deloitte.com/dtt/cda/doc/content/dtt_financialservices_ AMLComplianceSurvey_101003.pdf. 95 Nancy Holtzman, Association of Corporate Travel Executives, testimony before the Subcommittee on Aviation of the House Transportation and Infrastructure Committee,î March 15, 2004; online at http://www.acte.org/resources/press_release/testimony_ to_congress.shtml. 96 ìRecommendations on Acxiom,î e-mail from Doug Dyer to John Poindexter and Robert Popp, all of DARPA, May 21, 2002 (obtained through a Freedom of Information Act Request by the Electronic Privacy Information Center [EPIC]); , available online at http://www.epic.org/privacy/profiling/tia/darpaacxiom. pdf. 97 Seisint, Inc., ìMatrix Michigan Briefing,î May 8, 2003, slide entitled ìSeisintís Core Capabilitiesî (document obtained through open-records requests filed by ACLU). 98 John Schwartz, ìPrivacy Fears Erode Support for a Network to Fight Crime,î New York Times, March 15, 2004; online at http://www.nytimes.com/2004/03/15/technology/15matrix.html. 99 Robert OíHarrow Jr., ìLexisNexis To Buy Seisint For $775 Million: Data Firmís Matrix Tool Generated Controversy,î Washington Post, July 15, 2004; online at http://www.washingtonpost. com/wp-dyn/articles/A50577-2004Jul14.html. 100 John Markoff, ìExperts Say Technology Is Widely Disseminated Inside and Outside Military,î New York Times, May 21, 2003; online at http://www.nytimes.com/2003/05/21/international/ worldspecial/21PROG.html. 101 Michael J. Sniffen, ìControversial Terror Research Lives On,î Associated Press, February 23, 2004; available online at http://www.washingtonpost.com/wp-dyn/articles/A63582-2004Feb23.html. Bill Powell, ìInside the CIA,î Fortune, Sept. 29, 2003. 102 General Accounting Office, ìData Mining: Federal Efforts Cover a Wide Range of Uses,î GAO-04-548, May 2004; online at http://www.gao.gov/new.items/d04548.pdf. The CIA and NSA did not participate in the GAOís survey. 103 See Chris Jay Hoofnagle, "Big Brother's Little Helpers: How ChoicePoint and Other Commercial Data Brokers Collect, Process, and Package Your Data for Law Enforcement," University of North Carolina Journal of International Law & Commercial Regulation, Vol. 29 No. 4 (Summer 2004). 104 Chris Hoofnagle, ìBarriers to the Constitutional Right to Privacy: Big Business is keeping an eye on you,î San Francisco Chronicle, January 29, 2004; online at http://www.sfgate.com/cgi-bin/article. cgi?file=/chronicle/archive/2004/01/29/EDGH14JBAN1.DTL. 105 ìExperian partners with Best Buy: INSOURCE data contributes to Best Buyís successful Customer Relationship Management (CRM) strategy," Experian brochure, online at http://www.experian.com/case_studies/best_buy.pdf. 106 Abacus Direct slide show, untitled, online at http://www.abacus- direct.com/resource/planningtools/Acquisition.ppt. Or see Experian, ìHarnessing the power of consumer data,î white paper, p. 7; online at http://www.experian.com/whitepapers/experian% 5fdata%5fwhite%5fpaper%5f2002.pdf. 107 See information on EPIC Freedom of Information Act lawsuit; online at http://www.epic.org/privacy/choicepoint/default.html; Glenn R. Simpson, ìBig Brother-in-Law: If the FBI Hopes to Get The Goods on You, It May Ask ChoicePointî Wall Street Journal, April 13, 2001; William Matthews, ìCommercial database use flagged,î Federal Computer Week, January 16, 2002; online at http://www.fcw.com/fcw/articles/2002/0114/web-epic-01-16-02.asp. 108 Seisint Inc., ìSeisintís FACTS ô For The Matrix Project,î September 29, 2003, p. 27; online at http://www.aclu.org/Privacy/Privacy.cfm?ID=15233&c=130. Institute for Intergovernmental Research, ìApplication for Federal Assistance to the Office of Justice Programs Bureau of Justice Assistance,î September 24, 2002, in possession of ACLU. 109 Hoofnagle ìLittle Helpers,î 611. 110 LexisNexis, ìExhibit B: Lexis-Nexis Select Limited Distribution Authorized Use Listî (document obtained by EPIC from the U.S. Marshalls Service); online at http://epic.org/privacy/choicepoint/cpusms7.30.02e.pdf. Cited in Hoofnagle, "Little Helpers," 604. 111 Hoofnagle ìLittle Helpers,î 607-610. 112 Martin Finucane, ìCop on the beat now a walking database,î Associated Press, June 24, 2004; available online at http://www.heraldtribune.com/apps/pbcs.dll/article? AID=/20040624/APN/406240822. 113 Christian Parenti, The Soft Cage (New York: Basic Books, 2003), 92-95; Donner, 414-451. 114 These points are made in a different context in Jane Mayer, ìContract Sport: What did the Vice-President do for Halliburton?î The New Yorker, Feb. 16, 2004; online at http://www.newyorker.com/fact/content/?040216fa_fact. 115 Patrick Howe, ìGrowing use of private police network raises concerns,î Associated Press, October 30, 20032003; available online at http://www.interesting-people.org/archives/interesting- people/200310/msg00220.html. Patrick Howe, ìExpert questions databaseís legality,î Associated Press, December 2, 2003; available online at http://www.twincities.com/mld/pioneerpress/news/local/7391055.htm. Patrick Howe, ìMinnesota Public Safety: Police Want Database back,î Associated Press, February 16, 2004; available online at http://www.sanluisobispo.com/mld/twincities/news/7962881.htm. 116 Robert OíHarrow Jr. and Liz Leyden, ìU.S. Helped Fund License Photo Database,î Washington Post, February 18, 1999; 38 THE SURVEILLANCE-INDUSTRIAL COMPLEX online at http://www.washingtonpost.com/ac2/wp-dyn?pagename= article&node=business/specials/privacy/robertoharrow& contentId=A48643-1999Feb18. Declan McCullagh, ìSmile for the U.S. Secret Service,î Wired News, September 7, 1999. 117 Jeffrey Rosen, ìSilicon Valleyís Spy Game,î New York Times Magazine, April 14, 2002 118 ìXybernaut ñ Wearable Computing ñ Face Recognition for Public Safety,î Email from Xybernaut Corp. executive to official at Dallas Fort-Worth Airport, September 18, 2001, in possession of ACLU. 119 Bob Davis, ìMassive Federal R&D Initiative To Fight Terror Is Under Way,î Wall Street Journal, November 25, 2002. Paul Magnusson and Mike McNamee, ìWelcome to Security Nation,î BusinessWeek, June 14, 2004; online at http://www.businessweek. com/magazine/content/04_24/b3887036_mz011.htm. See also Brendan I. Koerner, ìThe Security Traders,î Mother Jones, September 1, 2002; available online at http://www.newamerica. net/index.cfm?pg=article&pubID=1023. 120 Megan Lisagor, ìTSA awards passenger screening contract,î Federal Computer Week, March 4, 2004; online at http://www.fcw.com/fcw/articles/2003/0310/news-tsa-03-10-03.asp. 121 Center for Public Integrity, ìThe Buying of the President 2004: General Wesley K. Clark,î undated. Online at http://www.bop2004.org/bop2004/candidate.aspx?cid=12&act=bio. 122 United States Senate, Office of Public Records, Lobby Filing Disclosures; online at http://sopr.senate.gov/. 123 Philip Shenon, ìFormer Domestic Security Aides Switch to Lobbying,î New York Times, April 29, 2003; online at http://www.nytimes.com/2003/04/29/politics/29HOME.html. 124 Adam Mayle and Alex Knott, ìOutsourcing Big Brother: Office of Total Information Awareness Relies on Private Sector to Track Americans,î Center for Public Integrity, December 17, 20022002; online at http://www.publici. org/dtaweb/report.asp?ReportID=484. William New, ìBack to the Future,î National Journal, June 14, 2002. 125 Robert OíHarrow Jr., ìU.S. Backs Floridaís New Counterterrorism Database,î Washington Post, August 6, 2003; online at http://www.washingtonpost.com/ac2/wp-dyn/A21872-2003Aug5. 126 Paul Rogers and Elise Ackerman, ìOracle boss urges national ID cards, offers free software,î Mercury News, September 22, 2001. 127 See for example, Robert OíHarrow Jr., ìFacial Recognition System Considered For U.S. Airports,î Washington Post, September 24, 2001; online at http://www.washingtonpost.com/ac2/wp-dyn?pagename=article& node=&contentId=A14273-2001Sep23. 128 House Permanent Select Committee on Intelligence and the Senate Select Committee on Intelligence, ìReport of the Joint Inquiry Into the Terrorist Attacks of September 11, 2001,î December 2002, pp. 6-32; online at http://www.gpoaccess.gov/serialset/creports/911.html. National Commission on Terrorist Attacks Upon the United States, Staff Statements #9-12; online at http://www.9-11commission.gov/staff_statements. htm. 129 The Fourth Amendment reads, ìThe right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.î 130 In 1967 the Supreme Court finally recognized the right to privacy in telephone conversations in the case Katz v. U.S. (389 US 347), reversing the 1928 opinion Olmstead v. U.S. (277 US 438). 131 President Dwight D. Eisenhower, ìFarewell Address,î January 17, 1961; online at http://eisenhower.archives.gov/farewell.htm. 39 An ACLU Report OTHER SAFE AND FREE REPORTS Conduct Unbecoming: Pitfalls In The Presidentís Military Commissions (March 2004) Sanctioned Bias: Racial Profiling Since 9/11 (February 2004) Americaís Disappeared: Seeking International Justice For Immigrants Detained After September 11 (January 2004) A New Era of Discrimination? Why African Americans Should Be Alarmed About the Ashcroft Terrorism Laws (September 2003) Unpatriotic Acts: The FBIís Power to Rifle Through Your Records and Personal Belongings Without Telling You (July 2003) Seeking Truth From Justice: PATRIOT Propaganda≠The Justice Departmentís Campaign to Mislead The Public About the USA PATRIOT Act (July 2003) Independence Day 2003: Main Street America Fights the Federal Governmentís Insatiable Appetite for New Powers in the Post 9/11 Era (July 2003) Freedom Under Fire: Dissent in Post-9/11 America (May 2003) Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society (January 2003) Insatiable Appetite: The Governmentís Demand for Unnecessary Powers After September 11 (October 2002) Civil Liberties After 9/11: The ACLU Defends Freedom (September 2002) National Headquarters 125 Broad Street, 18th Fl. New York, NY 10004-2400 (212) 549-2500 www.aclu.org ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9361 From: Date: Wed Aug 11, 2004 11:39am Subject: CNN.com - Olympics' digital security unprecedented - Aug 10, 2004 *Please note, the sender's email address has not been verified. You have received the following link from molay@g... ******************** If you are having trouble with any of the links in this message, or if the URL's are not appearing as links, please follow the instructions at the bottom of this email. Title: CNN.com - Olympics' digital security unprecedented - Aug 10, 2004 Copy and paste the following into your Web browser to access the sent link: http://www.emailthis.clickability.com/et/emailThis?clickMap=viewThis&etMailToID=1479180971&pt=Y Copy and paste the following into your Web browser to SAVE THIS link: http://www.savethis.clickability.com/st/saveThisPopupApp?clickMap=saveFromET&partnerID=2016&etMailToID=1479180971&pt=Y Copy and paste the following into your Web browser to forward this link: http://www.emailthis.clickability.com/et/emailThis?clickMap=forward&etMailToID=1479180971&partnerID=2016&pt=Y ******************** Email pages from any Web site you visit - add the EMAIL THIS button to your browser, copy and paste the following into your Web browser: http://www.emailthis.clickability.com/et/emailThis?clickMap=browserButtons&pt=Y" ********************* Instructions: ----------------------------------------- If your e-mail program doesn't recognize Web addresses: 1. With your mouse, highlight the Web Address above. Be sure to highlight the entire Web address, even if it spans more than one line in your email. 2. Select Copy from the Edit menu at the top of your screen. 3. Launch your Web browser. 4. Paste the address into your Web browser by selecting Paste from the Edit menu. 5. Click Go or press Enter or Return on your keyboard. ******************** [Non-text portions of this message have been removed] 9362 From: Glen True Winstein Date: Wed Aug 11, 2004 0:11pm Subject: Re: The Surveillance- Industrial Complex Dear Mr. Atkinson: Please help. Is there a web page I can go to which explains what a non-expert like me should look for when they've made some grudges among criminals into illegal use of surveillance stuff and I want to check my apartment as best I can prior to hiring an expert? My place has been broken into and a VCR/cam setup fiddled with. One landlord wierdo, early on in the time I knew them, bragged to me about their (illegal) box of tapes of people, a friend of theirs later confiding to me the landlord used such gimmicks to snoop into tenant's bedrooms and showers! Another wierdo talked about their use of fiber optic cable, which I just recently realized was a connection from reading the emails of your group members.... I know expert TSCM people are professionals like docters and lawyers, which it would also be disrespectful to try to freebie a lot of consultations from. But I'm on the poor side in a handicapped people apartment, and I want to do all I can for myself about it. In preparing to save up the money to engage a proper professional, I don't want them thinking I believe the Kaiser stapled lasers to my sneakers and can read my thoughts or such, let alone do I want the other people it's ordinarilly proper to go to for help, but for whom this is beyond the normal scope of their jobs, to think that, just because it's an unlikely, uncommon problem. So I'd like to have something more than my experiences to tell when I approach them for help. The accused are liable to say, "He's just hearing things" in their denial, but I haven't started having my dreams while I'm awake at nearly fifty years old. I've never had people think that about me, and I don't want anyone starting to think so now. So far I've made some recordings of disturbance of the peace of a mean prank nature by some related jerks, too, during efforts to try to sleep, but proving the source of the sounds is impossible by the recordings alone. I know my microphone doesn't need psychotropic meds; what kind would that be--some kind of 3-in-1 oil? What is a good web page that explains what I can check for and defend myself about for now?--a sensible approach to preliminary evidence-gathering? Glen T. Winstein carolw_15106@y... 9363 From: satcommunitfive Date: Sat Aug 14, 2004 0:24am Subject: Re: Ohio Prison to Test RFID Technology lets hope they use a small explosive charge like the movie --- In TSCM-L@yahoogroups.com, "savanted1" wrote: > The Ohio Department of Rehabilitation and Correction has approved a > $415,000 contract to conduct a pilot test of radio frequency > identification technology to track prison inmates. If the pilot test > at the Ross Correctional Facility in Chillicothe, Ohio is successful, > the technology will be used in all of the state's 33 prison > facilities. The transmitters will be "wrist-watch-sized" and able to > detect attempts to remove it. Staff will also wear transmitters on > their belt which will trigger an alarm if prisoners try to remove it > or the guard is knocked down. Three states, California, Illinois and > Michigan already employ the technology in their prison systems. > > http://zdnet.com.com/2100-1103_2-5293154.html > Related Article: Japan School Kids To Be Tagged With RFID Chips > http://zdnet.com.com/2102-1104_2-5266700.html?tag=printthis > Related Article: Under-The-Skin ID Chips Move Toward U.S. Hospitals > http://zdnet.com.com/2102-1103_2-5285815.html?tag=printthis 9364 From: moellerthy <1ach@g...> Date: Sun Aug 15, 2004 4:13pm Subject: Re: Ohio Prison to Test RFID Technology --- In TSCM-L@yahoogroups.com, "satcommunitfive" Here's a nice place to learn about the tracking technology. http://www.sirtrack.com Andre Holmes 1ach@G... Neptune Enterprise Security wrote: > lets hope they use a small explosive charge like the movie > > > --- In TSCM-L@yahoogroups.com, "savanted1" wrote: > > The Ohio Department of Rehabilitation and Correction has approved a > > $415,000 contract to conduct a pilot test of radio frequency > > identification technology to track prison inmates. If the pilot > test > > at the Ross Correctional Facility in Chillicothe, Ohio is > successful, > > the technology will be used in all of the state's 33 prison > > facilities. The transmitters will be "wrist-watch-sized" and able > to > > detect attempts to remove it. Staff will also wear transmitters on > > their belt which will trigger an alarm if prisoners try to remove > it > > or the guard is knocked down. Three states, California, Illinois > and > > Michigan already employ the technology in their prison systems. > > > > http://zdnet.com.com/2100-1103_2-5293154.html > > Related Article: Japan School Kids To Be Tagged With RFID Chips > > http://zdnet.com.com/2102-1104_2-5266700.html?tag=printthis > > Related Article: Under-The-Skin ID Chips Move Toward U.S. Hospitals > > http://zdnet.com.com/2102-1103_2-5285815.html?tag=printthis 9365 From: James M. Atkinson Date: Sun Aug 15, 2004 11:09pm Subject: Power Diodes Here is one of my more queries to the list. I am looking for a product recommendation for high amperage power diodes. More specifically I need a diodes rated 30 volts or better, and capable of handling at least 2200 amps for extended periods. These will be mounted into heat sink, so something with a stud mount would be best. I initially need 230-250 single diodes, ...and in case your curious, it is for a TSCM project. Any suggestions or recommendations would be appreciated. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9366 From: Tech Sec Lab Date: Mon Aug 16, 2004 6:17am Subject: Olympic Sec JMA - Deja vue Boston? *************************** Athens Security: Seeing Isn't Believing By SELENA ROBERTS ATHENS WHERE the ominous black hull of the Queen Mary 2 protrudes into the port of Piraeus, the green water is so clear, you can almost see the frogmen who are no doubt swimming in a matching shade of Kermit so as not to be detected by aquatic thugs. Where a six-lane road passes the Ikea-style Olympic complex about 15 miles away, there is a line of empty plastic barriers that should be filled with sand but are not, forming a protective layer of Lego blocks for the common folk inside. In plain sight, for every villain to see, there is a gray gunboat in front of the performance-enhanced QM2 loaded with its precious cargo of dignitaries, politicians and LeBron James. A floating barrier bobs between the luxury liner and the port entry, where Coast Guard boats sometimes usher ferries through a passage 100 yards from the ship's deck chairs. The entrance to the Queen Mary 2's dock holds two concrete barriers, an electronic iron gate, at least eight surveillance cameras and a dozen machine-gun-carrying security troops with swivel heads and tight jaws. A loading dock at the Olympic complex has a sliding gate, a police academy officer on his first after-shave, a veteran Athens police officer on his motorbike, an unarmed volunteer and a National Guardsman named Thanassis Mallesskides. "I'm 27 and already divorced," Mallesskides offered unprompted on Wednesday. A few minutes earlier, Mallesskides was wielding his G3 automatic weapon as casually as a Super Soaker after he approached two reporters who were talking with the Athens police veteran and the volunteer. In a scrapbook moment for the National Rifle Association, Mallesskides began caressing the features of his G3 the way Vanna White touches vowels as he swung the barrel waist high toward his suddenly queasy audience. Pulling out the loaded cartridge, he said with a smile, "Now there's no bullets." Then he flipped open the chamber and - who knew? - a two-inch bullet popped out. With a smirk, Mallesskides was unfazed by the bullet's surprise appearance. He slammed the cartridge back into the gun and twisted the G3 around again until the Athens police veteran stopped the cavalier showmanship with a curt, "I don't like that." Mallesskides drifted back toward his corner by the gate, looked over the barrel of his gun and sat down at a plastic table with the police academy officer, who had a real live pistol in his holster. So, it may seem as if the five-star passengers aboard the QM2 are protected with elite forces while the Olympic compound is sealed with Rambo & Son in a kind of class system of security. Is it fair for the Coast Guard protecting the port of Piraeus - home to a conga line of luxury cruisers full of celebrity athletes, business tycoons and special guests - to consume almost a third of the $1.2 billion security budget? Is sand in a land of dust too expensive to fill up the plastic barriers protecting the buildings, competition sites and ticket- holders who can't afford to B.Y.O.B. (Bring Your Own Bodyguard)? Actually, there is nothing unequal here - except that one illusion of safety is grander than the other. Up a hill, a block from the guarded gate to the Queen Mary 2, a one- lane road traces a bluff overlooking the grand ship. Standing on the hill, with only a chain fence to obstruct the view, you can almost touch the buses full of dignitaries passing below, pick out passengers in the distance and, apparently, take notes on all the security machinations without being bothered. As of last week, security advisers also worried about the possibility of a ferry being hijacked and plowed into a ship's hull - frogmen or no frogmen. "What is at stake is protecting society, democracy, civilization and freedom," Jacques Rogge proclaimed this week in his role as the International Olympic Committee president. He believes Athens has met its security challenge - very confident, he has said - but Rogge didn't exactly cancel the I.O.C.'s $170 million insurance policy against a Summer Games debacle. The Greeks have done their best to create the look and feel of security by putting 70,000 uniformed bodies on the streets, but should they all have bullets? Or, a better question, do they all have bullets? Two guards said no, suggesting that not everyone you see is armed. "That's someone joking," said Regina Despiniotou, a police press officer. "Of course, they have bullets." She continued, asking incredulously: "Why would they be there? For decoration?" There is a Hollywood-set aspect to the Olympic security. What's real and what's for show? What's a barrier? What's an empty milk jug? Last week, two Mexican journalists said they were beaten by Greek Coast Guard officers at the port of Piraeus for taking photos of a restricted area near the flotilla of the famous. Whether it served as a deterrent, the tough love provided yet another example of a security detail serious about its work after a $1.2 billion investment. And yet, with all that dough, the Greeks' best safety mechanism cost them nothing: security by procrastination. By building competition sites at the last minute literally with duct tape and plastic tabs to hold the Erector set together, by assembling their security plans at the 11th hour, the Greeks may have foiled the bad guys after all. How can they coordinate an attack against an Olympic vision? No illusion necessary. No bullets required. What a plan. 9367 From: Tech Sec Lab Date: Mon Aug 16, 2004 7:18am Subject: RF Jammers http://www.globalgadgetuk.com/index.htm Any one have any experience with this company? 9368 From: Tech Sec Lab Date: Mon Aug 16, 2004 10:12am Subject: Mobile Laptop Systems [OT] I was hoping someone from the list might be able to help..... Can anyone recommend notebook stand systems for vehicles, that is, cars or vans, that would suit Dell Inspiron laptops to be fitted into vehicles? Much like what the Police use, but without the price tag! Power supply system would also be necessary, and if possible some sort of system that monitors the vehicle battery to prevent draining. Any suggestions welcome..... Regards -Ois 9369 From: Michael Puchol Date: Mon Aug 16, 2004 10:23am Subject: Re: Mobile Laptop Systems [OT] Hi Ois, I've quite good experiences with the MobileDesk series, they are rugged and do the job - don't settle for less, a good sturdy stand is well worth the money, and probably much cheaper than a busted laptop and lost data. The Xtreme is quite robust if it's likely to get knocked around a bit. If you don't want to drill holes, the Navigator is OK, but I don't recommend it for heavy laptops. Find them here: http://www.mobiledesk.com As for the supply system, I got myself a nice sine inverter that gets me 220V, and a spare power adapter for the laptop (you can get either the original or the Targus ones, they also work well). I have the concoction nicely tucked out of sight, so all you see lying about is the cable that goes to the laptop. A small timer that cuts battery supply to the inverter after the engine is switched off is all that's needed to prevent drain. A secondary battery or batteries can be added if you need to run long time without the car's engine on. Regards, Mike ----- Original Message ----- From: "Tech Sec Lab" To: Sent: Monday, August 16, 2004 5:12 PM Subject: [TSCM-L] Mobile Laptop Systems [OT] > I was hoping someone from the list might be able to help..... > > Can anyone recommend notebook stand systems for vehicles, that is, cars or > vans, that would suit Dell Inspiron laptops to be fitted into vehicles? Much > like what the Police use, but without the price tag! > > Power supply system would also be necessary, and if possible some sort of > system that monitors the vehicle battery to prevent draining. > > Any suggestions welcome..... > > Regards > > -Ois > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9370 From: moellerthy <1ach@g...> Date: Mon Aug 16, 2004 0:12pm Subject: Re: Power Diodes --- Result of a search try http://www.littelfuse.com TVS Diode working voltage 48-380 peak pulse current 6,000 amps. You can also try Laser diodes or a solar panel manufacture and can send a link if you need it. ANDRE HOLMES 1ach@G... Neptune Enterprise Security In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > Here is one of my more queries to the list. > > I am looking for a product recommendation for high amperage power diodes. > > More specifically I need a diodes rated 30 volts or better, and capable of > handling at least 2200 amps for extended periods. > > These will be mounted into heat sink, so something with a stud mount would > be best. > > I initially need 230-250 single diodes, > > ...and in case your curious, it is for a TSCM project. > > Any suggestions or recommendations would be appreciated. > > -jma > > > > > ------------------------------------------------------------------- ---------------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ------------------------------------------------------------------- ---------------------------------- > > James M. Atkinson Phone: (978) 546- 3803 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ------------------------------------------------------------------- ---------------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ------------------------------------------------------------------- ---------------------------------- 9371 From: Blake Bowers Date: Mon Aug 16, 2004 0:56pm Subject: Re: Re: Power Diodes I missed the original post, but I have a number of large power diodes, pulled from the battery banks at Microwave sites... > > TVS Diode working voltage 48-380 peak pulse current 6,000 amps. > > You can also try Laser diodes or a solar panel manufacture and > can send a link if you need it. > > > Here is one of my more queries to the list. > > > > I am looking for a product recommendation for high amperage power > diodes. 9372 From: contranl Date: Mon Aug 16, 2004 2:53pm Subject: Re: RF Jammers . Yes ..they are ok ...and send there goods quickly. Tetrascanner www.tetrascanner.com 9373 From: contranl Date: Mon Aug 16, 2004 3:08pm Subject: Re: Mobile Laptop Systems [OT] . Why do'nt you try "Mini-itx" wich is a series of very small (12x12cm) mini pc's that run on Windows XP at 1000 mhz and the great thing is they run directly from 12 Volts ! Connectors are there for video in and out ! audio in and out VGA/RGB,4 USB etc...perfect for surveillance and very cheap ! only 120 US $ !!!!!!! Insert a harddisk (from 50 U$) and you have a audiorecorder (1000 hours ?) or harddisk video-recorder (100~200 hours ?) Here's a website about it...these pc's are so small and cheap (but good) that they are a favorite to many "case-modders" who build them into anything you can imagine...some of them do'nt even need a blower so they are very silent. http://www.mini-itx.com/ They are made by the well know Taiwanese manufacturer Via technologies http://www.via.com.tw/en/index/index.jsp Good support and forums are available...these pc's (boards and cases) are available anywhere in the world. Tetrascanner www.tetrascanner.com . 9374 From: Date: Mon Aug 16, 2004 4:16pm Subject: Canadian Police Chiefs Propose Wiretap Fee Canadian Police Chiefs Propose Wiretap Fee, Canadian Press Says Aug. 16 (Bloomberg) -- Canada's police chiefs proposed a fee of about 25 cents (19 cents) on monthly telephone and Internet bills to cover wiretap costs, Canadian Press reported. The proposal is intended to resolve a dispute between police forces and telecommunication companies over who should pay, the news agency said. Police say they can't afford the costs involved in carrying out court-approved wiretaps and e-mail searches. Investigations that involve looking up phone numbers, hooking up to networks and relaying communications from one city to another while tracking criminals involved in things like terrorism, child pornography and money laundering can add up to thousands of dollars, Canadian Press said. BCE Inc., the country's biggest telephone company, opposes the idea because customers won't support the additional fee, spokeswomen Jacqueline Michelis told the news agency. [Non-text portions of this message have been removed] 9375 From: Guy Urbina Date: Mon Aug 16, 2004 3:13pm Subject: Re: Power Diodes Hi Jim, We've found that we like the product line from Semikron, they have excellent reverse recovery times and user friendly packages that are easy to mount to heat sinks. (see the SEMIPACK module line.) www.semikron.com brgds, -Guy _____________________________________________________________ Guy Urbina Defense Sciences Engineering Division Electronics Engineering Lawrence Livermore National Laboratory _____________________________________________________________ At 12:09 AM 8/16/2004 -0400, you wrote: >Here is one of my more queries to the list. > >I am looking for a product recommendation for high amperage power diodes. > >More specifically I need a diodes rated 30 volts or better, and capable of >handling at least 2200 amps for extended periods. > >These will be mounted into heat sink, so something with a stud mount would >be best. > >I initially need 230-250 single diodes, > >...and in case your curious, it is for a TSCM project. > >Any suggestions or recommendations would be appreciated. > >-jma > > > > >----------------------------------------------------------------------------------------------------- > > >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >----------------------------------------------------------------------------------------------------- > > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue > #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >----------------------------------------------------------------------------------------------------- > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > >http://www.yahoogroups.com/community/TSCM-L > >It is by caffeine alone I set my mind in motion. >It is by the juice of Star Bucks that thoughts acquire speed, >the hands acquire shaking, the shaking is a warning. >It is by caffeine alone I set my mind in motion. >=================================================== TSKS > > >Yahoo! Groups Sponsor >ADVERTISEMENT > > >---------- >Yahoo! Groups Links > * To visit your group on the web, go to: > * > http://groups.yahoo.com/group/TSCM-L/ > * > * To unsubscribe from this group, send an email to: > * > TSCM-L-unsubscribe@yahoogroups.com > > * > * Your use of Yahoo! Groups is subject to the > Yahoo! Terms of Service. 9376 From: contranl Date: Tue Aug 17, 2004 1:39pm Subject: Olympic games Athens security (Video) . How Olympic games security uses satellite positioning technology http://esa.capcave.com/wmp/egreece_20072004_wmphigh.wmv High Q video ...play in full screen Tetrascanner www.tetrascanner.com 9377 From: savanted1 Date: Tue Aug 17, 2004 1:19pm Subject: Unprecedented Surveillance at Olympics in Athens In a July protest letter to the Greek Parliament, six human rights group expressed their concern that "the Olympic Games are accompanied with extended security measures that are unprecedented for Greece. Although the state's right to take all necessary measures that it deems necessary is recognized, there is fear that these measures will have a negative impact on basic human rights." Among the surveillance measures deployed are: a sensor-laden surveillance airship; 1,000 hi-res and infrared surveillance cameras with intelligence-gathering features, such as speech recognition and automatic transcript; 4,000 vehicles, 12 patrol boats, nine helicopters and four mobile command centers. Transcribed text, as well as e-mail and image files, and other electronic communications entering and leaving the area will be searched for patterns using software from London-based Autonomy Corp., who counts the U.S. National Security Agency among its clients. http://www.usatoday.com/tech/news/surveillance/2004-08-09-security- software_x.htm 9378 From: Mitch D Date: Wed Aug 18, 2004 9:05am Subject: Olympic Surveillance I find it amazing that 1 billion,200m was spent on "security" at the olympics,(per the mayor of athens)and the "experts" still forget the basics........ http://sport.independent.co.uk/olympics/story.jsp?story=552478 Olympic inquiry into tutu diver Greek police are investigating a gatecrasher who wore a tutu to the Olympic diving finals to impress his wife. Wearing a ballerina's dress, he plunged from the diving board in "top bombing" style, screaming, "I love you," as bemused Greek security officials watched. The 31-year-old Canadian, who police have not named, had left his seat in the diving arena, clambered over hoardings and scaled the diving board before officials realised what was happening. "Experts" still cannot fathom that a human on the ground,or on the water armed with an HT can process more than data and report faster than all the wifi/gps/spyshop physics garbage combined.Once again history repeats itself...... From: Matt Paulsen Date: Tue Aug 13, 2002 6:59pm Subject: RE: Re: GPS wristwatch Correction, Steve is right about GlobalTrak, this is not GlobalTrak. Thanks, Matt Paulsen President/CEO Orange Networks LLC P: 503.892.8786 F: 503.892.8794 -----Original Message----- From: Michael Puchol [mailto:mpuchol@s...] Sent: Tuesday, August 13, 2002 4:00 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Re: GPS wristwatch Hi there, Steve is right about this - I read the original Wired article, and then the one linked in his post - well worth a read. Dozens of people gave this scammer thousands of dollars for distributorship rights on devices that never existed, or even have a probability to exist in a few years time, given the current state of technology (mainly regarding batteries). It is funny however that about 10 minutes ago I finished lunch, while watching the news on TV, where this device was mentioned - the short clip talked about the device, showed technical drawings, a few screenshots of a website, and lots of children running around (without any trace of the bracelet of course). Not once a was the device physically show - the most likely cause being that it doesn't even exist. It was all about how this device was going to help with lost children, abductions, etc. - and they even mentioned a price! Around $450 each. Unbelievable. All the best, Mike ----- Original Message ----- From: "Steve Uhrig" To: Sent: Tuesday, August 13, 2002 2:55 PM Subject: [TSCM-L] Re: GPS wristwatch > > Don't get excited about this. > > This is a reseller of the Digital Angel/Mobiltrak vaporware scam > which already has made its rounds in this country, scammed hundreds > of potential investors, and been debunked repeatedly in the media by > a number of persons including me. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5974 From: Matt Paulsen Date: Tue Aug 13, 2002 7:07pm Subject: RE: Re: GPS wristwatch While I agree that the effectiveness of the tool may not live up to expectations and does open up a nice avenue of litigation which will be good news for many a law firm in the US, there's enough research that shows that deterrent efforts towards increasing security significantly reduces the probability of an incident. This device is only that, a deterrent, nothing more, nothing less. The level of effectiveness of the deterrence in this case has yet to be proven. Thanks, Matt Paulsen President/CEO Orange Networks LLC P: 503.892.8786 F: 503.892.8794 -----Original Message----- From: Greg H. Walker, Attorney At Law [mailto:gwalker@r...] Sent: Tuesday, August 13, 2002 3:46 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: GPS wristwatch Even if the company is legitimate (I know nothing about the company) it seems that once the child was taken inside of a building, in a heavy wooded area, etc. that the line of sight with the 3 or so required satellites would be lost. Another problem I visualize is battery life, especially for transmitting. Stop and think, what percentage of the time does your cellphone not work due to inability to connect with the system because you are in a dead spot, or in a building, etc.. Who would want to gamble a life on this technology? I will be the first to admit that I have the electronic skills of a smushed squirrel, however, in my, going on 5 years, use of locational systems (primarily Teletrac, an RF system) placement of antennas and battery life have always been a problem. Investigators I know that have tried GPS systems have either sold them for pennies on the dollar or simply thrown them away. My only direct experience with GPS has been when someone threw one of my units down into a wooded ravine, we changed from street names to longitude and latitude and went to the local hunting and fishing store and bought a decent GPS unit and never could get it to give us the same location twice -- always way off and I don't mean a block or so, I mean a couple of miles -- finally found the unit the old fashioned way -- hand searching. If I told a client about the GPS wristwatch for a child, or even an adult, I would probably have them sign a multipage disclaimer and release of liabilty. People are going to over trust this type of thing and believe it will work each and every time and it won't and the lawsuits will flow; but in the meantime a little child will have been lost because a parent believed the sales people who tauted that technology can solve all of your problems -- wrong, technology is a tool for the trained, not a cure-all for inattentive parents or caregivers of the elderly or disabled. It would be great and a wonderful aid for LEO, etc. if such a device was extremely reliable and if parents understood it was not a subtitute for good parenting practices -- but the advertisements won't say that it is not a subtitute for good parenting practices and it won't be as dependable under all conditions, especially big city conditions, as people will probably be led to believe. Please understand that this is not an attack or badmouthing of any company, etc. it is merely a comment on my experience and upon the technology in general. GREG -- Greg H. Walker, ARM* Attorney At Law President RisKontroL -- Risk Management, Security Consulting & Investigations Houston, Texas (713) 850-0061 * Associate in Risk Management Designation (Insurance Institute of America's Center For Advanced Risk Management Education) WARNING NOTICE BY GHW: Greg H. Walker's comments are not intended to be and should absolutely not be taken as legal advice. Unless you have entered into a specific written agreement with him for legal services, signed by both you and him, and paid him a retainer in good funds, then he is not your Attorney, does not intend to be your Attorney and you should not act nor refrain from acting based, in whole or in part, on his comments. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5975 From: James M. Atkinson Date: Tue Aug 13, 2002 7:01pm Subject: Glossary I am putting together a comprehensive glossary of TSCM terms, phrases, and acronym's used by the TSCM community. This glossary will be made available via my website later this fall. I would ask that list members suggest terms, phrases, and acronym's they feel would be helpful to explain, and I will try to get then into the list. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5976 From: Steve Uhrig Date: Tue Aug 13, 2002 8:03pm Subject: Re: GPS wristwatch On 13 Aug 2002 at 17:46, Greg H. Walker, Attorney At Law wrote: > Even if the company is legitimate (I know nothing about the company) > it seems that once the child was taken inside of a building, in a > heavy wooded area, etc. that the line of sight with the 3 or so > required satellites would be lost. Yes. 4 satellites actually, if you want altitude. And, in a professional system you want to be locked on to more than 4 birds, so if one drops out momentarily, one of the others can fill in and keep a steady flow of information. I have a GPS engine on the workbench I use for precision timing, with a magmount antenna outside the window on top of a window air conditioner. It is a Rockwell 12 channel parallel receiver in the engine, and it usually has 6 and sometimes 7 birds. > Another problem I visualize is battery life, especially for > transmitting. Yes. When you're advertising vaporware, you can make any claims you want. Frank Jones and CCS do it all the time, as do 99% of the spy shops. Make that 100% of the spy shops. > I will be the first to admit that I have the electronic skills of a > smushed squirrel, however, in my, going on 5 years, use of locational > systems (primarily Teletrac, an RF system) placement of antennas and > battery life have always been a problem. You should do a white paper on these issues. It would be helpful to many, from the standpoint of an intelligent and experienced but non- technoweenie user. > Investigators I know that have tried GPS systems have either sold them > for pennies on the dollar or simply thrown them away. I have been preaching this for years, since the early systems came out and we had a government contract to evaluate the things. Everyone argues with me in public. In private, they relate the same things you did. GPS COVERT TRACKING SYSTEMS ARE A WASTE OF MONEY. DO NOT BUY THEM! Yes, I'm shouting. If the things were any good, we'd manufacture them. It's certainly little challenge, just time and packaging standard technology. Now people can argue with you too. I'm going to save your message to forward to people who argue with me, as backup! The things also can be illegal in any and every state the way many of them are described to be used. > If I told a client about the GPS wristwatch for a child, or even an > adult, I would probably have them sign a multipage disclaimer and > release of liabilty. People are going to over trust this type of > thing and believe it will work each and every time and it won't and > the lawsuits will flow; but in the meantime a little child will have > been lost because a parent believed the sales people who tauted that > technology can solve all of your problems -- wrong, technology is a > tool for the trained, not a cure-all for inattentive parents or > caregivers of the elderly or disabled. Since the product does not exist, the above is a non-issue. I've gotten messages from several PIs who were considering investing in these vaporware GPS tracking systems. They were smart enough to do their homework. Others will accept things in blind faith, and lose every penny. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5977 From: iDEN-i100 Date: Tue Aug 13, 2002 8:36pm Subject: Re: Re: GPS wristwatch Here is the user manual and pictures- https://gullfoss2.fcc.gov/prod/oet/forms/blobs/retrieve.cgi?attachment_id=182064&native_or_pdf=pdf https://gullfoss2.fcc.gov/prod/oet/forms/blobs/retrieve.cgi?attachment_id=182059&native_or_pdf=pdf https://gullfoss2.fcc.gov/prod/oet/forms/blobs/retrieve.cgi?attachment_id=182060&native_or_pdf=pdf https://gullfoss2.fcc.gov/prod/oet/forms/blobs/retrieve.cgi?attachment_id=182070&native_or_pdf=pdf https://gullfoss2.fcc.gov/prod/oet/forms/blobs/retrieve.cgi?attachment_id=182058&native_or_pdf=pdf Tscm-l@yahoogroups.com Steve Uhrig wrote: > On 13 Aug 2002 at 17:46, Greg H. Walker, Attorney At Law wrote: > > > Even if the company is legitimate (I know nothing about the company) > > it seems that once the child was taken inside of a building, in a > > heavy wooded area, etc. that the line of sight with the 3 or so > > required satellites would be lost. > > Yes. 4 satellites actually, if you want altitude. And, in a > professional system you want to be locked on to more than 4 birds, so > if one drops out momentarily, one of the others can fill in and keep > a steady flow of information. > > I have a GPS engine on the workbench I use for precision timing, with > a magmount antenna outside the window on top of a window air > conditioner. It is a Rockwell 12 channel parallel receiver in the > engine, and it usually has 6 and sometimes 7 birds. > > > Another problem I visualize is battery life, especially for > > transmitting. > > Yes. > > > > When you're advertising vaporware, you can make any claims you want. > Frank Jones and CCS do it all the time, as do 99% of the spy shops. > Make that 100% of the spy shops. > > > I will be the first to admit that I have the electronic skills of a > > smushed squirrel, however, in my, going on 5 years, use of locational > > systems (primarily Teletrac, an RF system) placement of antennas and > > battery life have always been a problem. > > You should do a white paper on these issues. It would be helpful to > many, from the standpoint of an intelligent and experienced but non- > technoweenie user. > > > Investigators I know that have tried GPS systems have either sold them > > for pennies on the dollar or simply thrown them away. > > I have been preaching this for years, since the early systems came > out and we had a government contract to evaluate the things. > > Everyone argues with me in public. > > In private, they relate the same things you did. > > GPS COVERT TRACKING SYSTEMS ARE A WASTE OF MONEY. DO NOT BUY THEM! > > Yes, I'm shouting. > > If the things were any good, we'd manufacture them. It's certainly > little challenge, just time and packaging standard technology. > > Now people can argue with you too. I'm going to save your message to > forward to people who argue with me, as backup! > > The things also can be illegal in any and every state the way many of > them are described to be used. > > > If I told a client about the GPS wristwatch for a child, or even an > > adult, I would probably have them sign a multipage disclaimer and > > release of liabilty. People are going to over trust this type of > > thing and believe it will work each and every time and it won't and > > the lawsuits will flow; but in the meantime a little child will have > > been lost because a parent believed the sales people who tauted that > > technology can solve all of your problems -- wrong, technology is a > > tool for the trained, not a cure-all for inattentive parents or > > caregivers of the elderly or disabled. > > Since the product does not exist, the above is a non-issue. > > I've gotten messages from several PIs who were considering investing > in these vaporware GPS tracking systems. They were smart enough to do > their homework. Others will accept things in blind faith, and lose > every penny. > > Steve > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 5978 From: Greg H. Walker, Attorney At Law Date: Wed Aug 14, 2002 8:11am Subject: Re: GPS wristwatch Matt Paulsen wrote: > > While I agree that the effectiveness of the tool may not live up to expectations and does open up a nice avenue of litigation which will be good news for many a law firm in the US, there's enough research that shows that deterrent efforts towards increasing security significantly reduces the probability of an incident. This device is only that, a deterrent, nothing more, nothing less. The level of effectiveness of the deterrence in this case has yet to be proven. GREG'S REPLY: The proven deterrent effect of security that Matt speaks about is the "hardening of a target", as to a physical site this can be done in a number of ways from better control of ingress/egress systems, to fencing, to CCTV, to CPTED (Crime Prevention Through Environmental Design), to visible guard patrols, etc. For a person this is usually accomplished by Level 2 and upward protective transportation, varying routes of travel to and from the office, changing routines in general, etc., a well trained and experienced executive protection team, and on a lesser and more personal level, the utiization of common sense, attention to surroundings, trust of gut feelings of uneasiness (things children have yet to develop), etc. This is not what a GPS wristwatch, if one even exists, would do -- it does not effectively harden the target in any manner. Why, even assuming that there is such a device, it would have to be readily apparent to the bad actor that the child was wearing such a device -- let's face it, kid's wristwatches come today in a whole range and variety of colors, shapes, sizes, etc. To be even a half way effective deterrent the child would need to wear a flashing neon sign on its forehead saying it was so equipped. If such a system existed it would not be a detterent tool, it would be a recovery tool -- sort of like strapping LoJack to a child (another system that doesn't always perform). If you want to harden a child against kidnap then let's go back to the basics of teaching a child when they get to an appropriate age about talking with strangers, about adults don't ask children to help them find lost kitty cats and puppies or for directions, about there is nothing wrong with running away from a stranger (to hell with political correctness), that the policeman is their friend (gee, Mom and Dad, that means you need to be polite to the policeman that gives you a traffic ticket when little Johnny or little Sally is in the car with you) and finally, parents need to be parents -- when you take you child to the mall or the park, watch them, play with them, don't spend your time on your cellphone, being engrossed in the latest fashions, or watching a softball game or talking with your friend -- good parenting is your most important responsibility. Sorry, don't mean to rant, but like Steve, I just can't stand to see either services or equipment marketed in such a manner as to mislead the consumer on what its real benefit is. GREG -- Greg H. Walker, ARM* Attorney At Law President RisKontroL -- Risk Management, Security Consulting & Investigations Houston, Texas (713) 850-0061 * Associate in Risk Management Designation (Insurance Institute of America's Center For Advanced Risk Management Education) WARNING NOTICE BY GHW: Greg H. Walker's comments are not intended to be and should absolutely not be taken as legal advice. Unless you have entered into a specific written agreement with him for legal services, signed by both you and him, and paid him a retainer in good funds, then he is not your Attorney, does not intend to be your Attorney and you should not act nor refrain from acting based, in whole or in part, on his comments. 5979 From: Steve Uhrig Date: Wed Aug 14, 2002 11:26am Subject: Re: GPS wristwatch On 14 Aug 2002 at 8:11, Greg H. Walker, Attorney At Law wrote: To further beat the stillborn horse into the ground, some of our work now involves GPS applications for non-clandestine use. I own a number of GPS systems generally on the high end ($2500 military grade, not $250 consumer, and that's just for the engine, not a complete packaged unit). We have found we can jam the GPS receiver with it using a handheld antenna up through a mobile magmount, fairly easily with little more than a glorified noise generator. Even in strong signal areas, an inexpensive device found in many households will completely and instantly disable a GPS from 6 feet away. The tiniest bit of research and using purpose-built electronics instead of a household item which coincidentally works, can extend this range by an order of magnitude, and that in a chassis about twice the size of a pack of cigarettes. Although we have no interest, the thing could be reproduced in quantity for less than the cost of a decent consumer grade GPS receiver. You can be sure as soon as GPS tracking, or even the concept, is thought to be deployed, the bad guys will routinely use jamming to counteract any potential covert GPS system. The U.S. military currently is dealing with both defensive and offensive jamming and spoofing of GPS signals. I won't discuss this any further. But realize the current GPS system is very fragile. Better is the newer, not consumer priced, satellite locating engines which combine the U.S. GPS and the Russian Glonass (GLObal NAvagational Satellite System) receivers into one device, acquire signals from both, average them and use that. The two systems are vaguely similar in function, but different enough so the vulnerabilities of one do not affect the other. Many professional and even some military applications use a combination of GPS and Glonass. This can be transparent to the user, as both receivers and their associated processing are integrated into one chip. The user sees coordinates, and that's all he cares about, not how they were derived. The next generation of GPS, on the immediate horizon, will have three beam patters/signal strengths. There will be a beam nearly pinpoint, to cover perhaps a few hundred square miles, with a very potent signal which will be stronger than attempts to jam. That would be a battlefield, for example. The middle layer would be a larger circle for the entire conflict area. Civilian and non-mission-critical areas would be the current large footprint, with relatively weak signals. Antenna patterns and even power levels on the GPS III birds could be dynamically reconfigured as the needs of the users changed. There also will be a completely separate set of frequencies for military and nonmilitary use. Selective Availability is a thing of the past, as too much transportation and other critical infrastructure relies on GPS, and differential error correction made it all a joke anyway. We are on the other end of the county from Edgewood Arsenal who transmitted GPS differential signals for a few years on VHF intended for basewide use only, and I could copy the low powered signals 20 miles airline from here perfectly with an outside antenna, and we are in the woods. > This is not what a GPS wristwatch, if one even exists, would do -- it > does not effectively harden the target in any manner. Why, even > assuming that there is such a device, it would have to be readily > apparent to the bad actor that the child was wearing such a device -- > let's face it, kid's wristwatches come today in a whole range and > variety of colors, shapes, sizes, etc. To be even a half way > effective deterrent the child would need to wear a flashing neon sign > on its forehead saying it was so equipped. If such a system existed > it would not be a detterent tool, it would be a recovery tool I have now worked 31 kidnappings. In virtually all, the victims were stripped completely naked within a few minutes at most, wrapped in a blanket, and vehicles changed 2 or 3 times within the first fifteen minutes. Any protective measures on the principal or his vehicle would be rendered ineffective. Kidnappers are not dumb for the most part. In the rare 3 or 4 instances where the principal's vehicle was taken, all visible antennas were cleaned off the vehicle within a minute or two, effectively killing any practical emergency beacon screaming for help or pinging a signal to be DF'ed. Even if the thing were semi-permanently attached like home detention bracelets, all you'd have to do is wrap it in aluminum foil to defeat both the downlink and the uplink. Granted, the pros targeting Latin American oil company executives and politicians may not be grabbing little Heather or Brandon, but the word trickles down. Once the word spreads on these alleged tracking devices, whether they are real or not, even amateur bad guys like noncustodial parents or whatever will adopt these strategies. There have been child-worn GPS tracking systems which did work. They were mounted in a backpack. Totally impractical for the real world, although they got their own share of publicity a while back. Got way off on a tangent here. But it's something we've been working on for a good while ... > Sorry, don't mean to rant, but like Steve, I just can't stand to see > either services or equipment marketed in such a manner as to mislead > the consumer on what its real benefit is. And remember all you kids out there in Radioland, the above paragraph is an *attorney* speaking! ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5980 From: Michael Puchol Date: Wed Aug 14, 2002 11:20am Subject: Re: Re: GPS wristwatch Hi all, Since this subject has turned into a rather involved thread, I'll add a few points, since I think I have enough experience with GPS systems to add my 0.02? worth. This may also serve as a quick fact sheet to those of you who get asked about covert GPS locators, as Steve rightly pointed out. 1. GPS receivers, and more precisely the antenna they use, need a clear view of the sky. Any obstruction will cause degradation of the received signal, so for example, a GPS receiver will NOT work indoors, in a garage, tunnel, under some gas station's roofs, etc. This also means that the antenna that the receiver uses MUST be placed in a position where the sky is most visible, as any obstruction caused by the vehicle's body will cause signal degradation. Installing an antenna in such position is rather difficult when you want the system to be covert - the obvious place is the car's roof, this providing a rather nice ground plane. It will also be obvious to the target that someone has planted something in his car if it suddenly develops a bump on the roof, hood, etc. So, the next best place to put the device would be inside the car, under the dashboard (assuming it's made of plastic and has no metallic parts around the antenna), or under the luggage compartment's cover (not always present). Both of these locations present problems - one is that under the dashboard/luggage cover, you are killing about 40% of the original 'sky' that the antenna saw, assuming an inclined windscreen - with a van or similar, you're reducing the view to about 50%. Oh, and they don't work with any of these new gold-tinted windscreens a lot of cars are equipped with now - the signal is totally lost - one example is Renaults. This means that in any given situation, your system will have at least 40 to 50% less satellites in view - this could be 100% signal loss if the constellation's position is such that all visible satellites are towards the rear of the vehicle. Remember, GPS satellites are not in geosynchronous orbit, they are LEO(ish), so their position will sometimes be favourable, right above you, and sometimes they can be mostly just above the horizon. So, what have we got left? Not much - the bumpers are even worse than the dashboard, and a lot of them are made of metal, so they're no good. The inside of the vehicle's roof, unless it's made of fiberglass or similar, will shield the satellites' signal, and so will the hood. CONCLUSION: there is no way to reliably install a covert GPS receiver and antenna in a vehicle without the user's knowledge, unless they are really dumb. Any covert installation will suffer from performance degradation, up to the point where urban tracking (where buildings kill off most of the satellites in view) will be impossible. Do NOT believe some internet spy shops that claim they use NASA technology in their antennas, which are so secret they can't even post a picture of them on the web site, and which they claim work even if installed under the vehicle - yes, through all that metal. My father used to say "Always remember the laws of physics when going shopping". 2. GPS receivers use power, and lots of it - an average OEM consumer-grade receiver (which is what you'll get in 99% of tracking systems) draws between 150 and 180mA when in use. This can be reduced with special 'sleep' modes, which turn off the receiver for a period of time, and start it occasionally to refresh the receiver's almanac and clock. In any case, the average consumption is high, making a self-battery powered system not viable but for short periods of time. Drawing power from the car's battery is a risk, as it can deplete it quite fast depending on it's condition, making the target suspicious. CONCLUSION: it's not practical to use self-powered devices, as they need rather large and bulky batteries, or the device needs to be powered from the vehicle's own battery, thus increasing detection risks. 3. There are basically two ways to get the information generated by the GPS to the tracker system, one is by real-time transmission of the coordinates, at set intervals, or sending a compressed message with various positions, and the other is to log the GPS positions to a buffer memory, which can later be read and downloaded. Each of these configurations has advantages and disadvantages. We will look at each in turn. a) Real-time transmission. This system employs a communications device, which can be conventional PMR radio, cellular telephone, trunked radio systems, and even satellite. The advantages of this are real-time tracking capability, where you can follow the target as it moves, with all the associated benefits, no need to make physical contact with the target's vehicle again to download GPS position logs, capability to interact with the vehicle (for example, you could inmobilise the target's vehicle at a convenient location). The disadvantages are that if the vehicle is not within the range of the communication system (for example, out of cell coverage), you will NOT be able to receive the vehicle's position. In some cases, this can be a complete no-no for a GPS tracking system, where coverage is marginal with all but satellite communications (very expensive). Another disadvantage is that it makes the system active, and so easier to find even by untrained personnel with a simple "bug detector". Careful transmitter design and choice of system can reduce this possibility, but it must be considered a risk factor, and taken into account when evaluating the target's technical capabilities. Also, an antenna must be installed for this system to work, and as with GPS but on the transmitting side, the more unobstructed view the antenna has, the better it will perform. Thus, the more hidden the antenna is, the more we will reduce the availability of the tracking system - with satellite systems we will need to place the antenna in a good location. Battery life is also an issue, as the transmitter can use a good deal of power. b) Memory logging & post-analysis. In this case, the GPS receiver system will feature an onboard memory module, usually non-volatile EEPROM, with a capacity matching the required length of time that the GPS will be recording positions. The main advantages here are reduced power consumption, no need for a 'noisy' transmitter, less installation & cabling work, better tracking resolution depending on the logging rate and time between log downloads. The disadvantages are all that could be obtained in a real-time tracking system and cannot be used in this configuration, plus the need to physically access the vehicle each time the log needs to be downloaded for analysis. CONCLUSION: Either way of getting the information from the vehicle to your tracking / monitoring software has it's advantages and disadvantages, which can make the system useless in certain scenarios. There are mixed systems that log the GPS data to a memory, which can then be periodically downloaded via wireless modem, thus avoiding physical contact with the vehicle. So where does all this bring us? Basically, to what Steve said - covert GPS tracking systems simply don't work, or are too impractical to use in a real environment. I sell GPS tracking systems for a living, which work with all possible configurations, but each time I've had a spy shop contact me to see if I could provide 'covert' systems, I just politely showed them the door. All the best, Mike ---- Original Message ----- From: "Greg H. Walker, Attorney At Law" To: Sent: Wednesday, August 14, 2002 3:11 PM Subject: [TSCM-L] Re: GPS wristwatch > Matt Paulsen wrote: > > > > While I agree that the effectiveness of the tool may not live up to expectations and does open up a nice avenue of litigation which will be good news for many a law firm in the US, there's enough research that shows that deterrent efforts towards increasing security significantly reduces the probability of an incident. This device is only that, a deterrent, nothing more, nothing less. The level of effectiveness of the deterrence in this case has yet to be proven. > 5981 From: Ed Naylor Date: Wed Aug 14, 2002 11:36am Subject: MORE INFO re ALLEGED GPS TRACKERS Wristwatches are 'LoJack for kids' Richard Winn of Pinegrove, Pa., doesn't think of himself as paranoid, but with so many abductions in the news lately, he wants to protect his daughters, ages 6 and 9. So he bought them special wristwatches that will track their locations 24 hours a day. "You hope like heck you're not over-paranoid and you're not too fearful of your child being dragged away," Winn says. "But you know the opportunity exists." http://www.usatoday.com/tech/techreviews/products/2002-08-12-gps-device_x.htm *********************************************************** 5982 From: Steve Uhrig Date: Wed Aug 14, 2002 0:57pm Subject: Re: GPS wristwatch On 14 Aug 2002 at 18:20, Michael Puchol wrote: > 1. GPS receivers, and more precisely the antenna they use, need a > clear view of the sky. Any obstruction will cause degradation of the > received signal, so for example, a GPS receiver will NOT work indoors, > in a garage, tunnel, under some gas station's roofs, etc. This also > means that the antenna that the receiver uses MUST be placed in a > position where the sky is most visible, as any obstruction caused by > the vehicle's body will cause signal degradation. Absolutely correct. A human body, too, blocks 85% of the signal if it is in the path. > 2. GPS receivers use power, and lots of it - an average OEM > consumer-grade receiver (which is what you'll get in 99% of tracking > systems) draws between 150 and 180mA when in use. > This can be reduced with special 'sleep' modes, which turn off the > receiver for a period of time, and start it occasionally to refresh > the receiver's almanac and clock. In any case, the average consumption > is high, making a self-battery powered system not viable but for short > periods of time. Drawing power from the car's battery is a risk, as it > can deplete it quite fast depending on it's condition, making the > target suspicious. > CONCLUSION: it's not practical to use self-powered devices, as they > need rather large and bulky batteries, or the device needs to be > powered from the vehicle's own battery, thus increasing detection > risks. Increasing detection risks is a major factor. Many if not most recent model automotive electrical systems are monitored by a computer, which knows how much current should be drawn in a particular branch circuit, and shuts it down if the current exceeds that amount. So you need to know the particular target vehicle, and usually need access to the interior, and have the vehicle in an enclosed facility for an hour if you're good and several hours if you're not. How many PIs are going to purchase the electrical wiring diagram for the target vehicle, much less be able to read and interpret it. I know I can't on the modern cars, and I'm not under a time constraint to install anything. And where are you if you blow up something on the target car, and it's disabled sitting in the shop where you're hiding the thing trying to install the tracker? It's happened to law enforcement. We have a fit on some modern cars trying to make a legitimate power tap for a simple two way radio. You can't even go right to the battery anymore on many vehicles, or the thing will sense current drain out of spec and flag the driver. A good design would draw a tiny amount of power from the target vehicle's electrical system, and store that in an onboard supercapacitor or secondary battery and squirt it out in pulses as needed. Integrating a tiny amount of power drain over a long period of time would be much less traumatic on the target vehicle than drawing a relatively large amount of power in realtime as needed. Watch this concept be implemented, or claimed to be, in some toy tracker now that I've brainstormed the idea in a public forum. But, much more importantly --- In the U.S., a federal court determined over a year ago that connecting to the target vehicle's electrical system for power was, in all cases, a 4th Amendment violation. That is illegal to do anywhere. Any evidence gathered illegally like this would be impeached, and there would be a likelihood of the installer coming under the federal eyeball, with their blank check and rubber stamp juries. You can be sure a well paid defense attorney would Shepherdize the cases and find the federal case(s) and there goes your evidence. I have not heard of any prosecutions yet, but it's only a matter of the next time a tracker is used and the case goes to court with a motivated and financed defense attorney that it will come out. In addition to your evidence being no good, you're then potentially a target for prosecution yourself. Since you were operating illegally, your insurance will be no good. Law enforcement is aware of this, and they rarely use anything attached to the target vehicle's power without a court order, regardless of whether one is needed or not for the basic vehicle tracking. Remember, no one is going to step forward and take a bullet for you, either. Disclaimers from the client are worthless. What are you going to do, put a lien on their house to cover your legal bills? Current high end GPS trackers use large external battery packs and primary lithium batteries for max independent battery life. > So where does all this bring us? Basically, to what Steve said - covert > GPS tracking systems simply don't work, or are too impractical to use > in a real environment. I sell GPS tracking systems for a living, which > work with all possible configurations, but each time I've had a spy > shop contact me to see if I could provide 'covert' systems, I just > politely showed them the door. When a man who sells a product tells you not to buy it, he's probably got a valid reason. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5983 From: Steve Uhrig Date: Wed Aug 14, 2002 1:14pm Subject: Re: MORE INFO re ALLEGED GPS TRACKERS On 14 Aug 2002 at 9:36, Ed Naylor wrote: > Wristwatches are 'LoJack for kids' Richard Winn of Pinegrove, Pa., > doesn't think of himself as paranoid, but with so many abductions in the > news lately, he wants to protect his daughters, ages 6 and 9. So he > bought them special wristwatches that will track their locations 24 > hours a day. Key words in the article: > 'should arrive in early September.' The photo is one from a press release, of a nonfunctioning piece of vaporware. I wouldn't hold my breath waiting for September. Here's another one who paid in advance, doesn't have it, and probably has paid for distributorship rights and hence submitted the article as part of the PR effort to attract other victims. Read the article, and you'll see plenty of promises of anticipated delivery. The claim Digital Angel has shipped 200 systems I do not believe, at least not in the configuration the article leads you to infer. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5984 From: iDEN-i100 Date: Wed Aug 14, 2002 1:47pm Subject: Re: Re: MORE INFO re ALLEGED GPS TRACKERS They did a demo at CTIA this year. It worked. They also had an FCC Lab certify its operation Steve Uhrig wrote: > > The photo is one from a press release, of a nonfunctioning piece of > vaporware. > > I wouldn't hold my breath waiting for September. > > Steve > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 5985 From: James M. Atkinson Date: Wed Aug 14, 2002 2:03pm Subject: Re: Re: MORE INFO re ALLEGED GPS TRACKERS At 2:47 PM -0400 8/14/02, iDEN-i100 wrote: >They did a demo at CTIA this year. It worked. They also had an FCC >Lab certify its >operation > >Steve Uhrig wrote: > >> >> The photo is one from a press release, of a nonfunctioning piece of >> vaporware. >> >> I wouldn't hold my breath waiting for September. >> > > Steve Negative, the FCC did no such thing... FCC received an "Emissions Report" from a test firm who ran an emission level check, and certified that the EMI levels where below a certain level. The FCC does the same thing with coffee pots, but those are also worthless as tracking devices. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 5986 From: ed Date: Wed Aug 14, 2002 2:08pm Subject: leaked info on PCS-based GPS tracking? this past saturday i had an interesting phone conversation with a Sprint PCS 3G specialist who told me, among other things, that Sprint PCS will be offering handset location services to consumers (it already offers a version of this to law-enforcement customers without a warrant.) the example this Sprint PCS 3G cited involved my giving a Sprint PCS handset equipped with GPS to "a 16 year old", who i would then be able to determine the location of by looking at a map displayed on my handset. i asked her if the other handset would have to initiate a call to accomplish this, and she said no--that as long as the handset was turned on and could see their network, that its physical location could be determined. the Sprint PCS 3G specialist seemed to be reading this from some document. when i asked her which handsets supported this service, she described two new 3G models w/GPS. at that point i got another call and couldn't continue the conversation, but i called back today to get more information. after speaking with several clueless drones, i reached a 3G supervisor who worriedly disavowed the existence of such a service. apparently i'd reached someone with preliminary info about services that have not been officially announced yet. in any case, Sprint PCS is poised to be the first wireless carrier to offer location-based consumer services, so they might be worth keeping an eye on. a work-around for GPS's line-of-sight limitations would be a PCS carrier offering a handset location service that supplements GPS data with (less accurate) handset location data from their switches. a GPS jammer or spoofer wouldn't affect this. Sprint PCS' 3G consumer info department can be reached at (866)588-9906. -ed 5987 From: Kevin D. Murray Date: Wed Aug 14, 2002 4:29pm Subject: Re: leaked info on PCS-based GPS tracking? October 1, 2001 Sprint PCS debuts GPS-equipped wireless phone for 911 calls http://www.computerworld.com/mobiletopics/mobile/story/0,10801,64380,00.html > this past saturday i had an interesting phone conversation with a Sprint > PCS 3G specialist who told me, among other things, that Sprint PCS will be > offering handset location services to consumers (it already offers a > version of this to law-enforcement customers without a warrant.) > > the example this Sprint PCS 3G cited involved my giving a Sprint PCS > handset equipped with GPS to "a 16 year old", who i would then be able to > determine the location of by looking at a map displayed on my handset. i > asked her if the other handset would have to initiate a call to accomplish > this, and she said no--that as long as the handset was turned on and could > see their network, that its physical location could be determined. > > the Sprint PCS 3G specialist seemed to be reading this from some > document. when i asked her which handsets supported this service, she > described two new 3G models w/GPS. at that point i got another call and > couldn't continue the conversation, but i called back today to get more > information. > > after speaking with several clueless drones, i reached a 3G supervisor who > worriedly disavowed the existence of such a service. apparently i'd > reached someone with preliminary info about services that have not been > officially announced yet. in any case, Sprint PCS is poised to be the > first wireless carrier to offer location-based consumer services, so they > might be worth keeping an eye on. > > a work-around for GPS's line-of-sight limitations would be a PCS carrier > offering a handset location service that supplements GPS data with (less > accurate) handset location data from their switches. a GPS jammer or > spoofer wouldn't affect this. Sprint PCS' 3G consumer info department can > be reached at (866)588-9906. > > -ed > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > Kevin D. Murray - CPP, CFE, BCFE Murray Associates Eavesdropping Detection and Counterespionage Consultants to Business & Government http://www.spybusters.com 5988 From: Michael Puchol Date: Wed Aug 14, 2002 5:44pm Subject: Re: leaked info on PCS-based GPS tracking? Hi ed, We've had this sort of service running here for about 5 months now, over the existing GSM networks. It's rather crude in it's current implementation, where it only gives you an estimated position based on the cell where the phone is registered. The telco markets it as LBS (location based services). They can tell you (roughly) which are the nearest services to you (cinemas, restaurants, etc.) by calling a number and following the voice menu - the information you request is sent in an SMS. This is already available as a semi-public service in the handset location format, where the telco offers the location data to a third party via a map server - of course with permission of the phone owner. This system eliminates the need for GPS built into the phone, or attached to it otherwise, and while in rural areas you can end up with a large error (rural cells have an approximate radius of 13 miles), in urban areas the location can be within 100 meters or so, when the handset is using microcells. I still don't see a practical use for this in the environment I operate, but more for extremely low-cost tracking systems with very basic features, personal tracking, etc. This opens a more realistic approach to personal tracking, where you could fit an OEM GSM board (Siemens has a board, which we currently use in our projects, that measures 55x36x7 mm) inside clothing, toghether with batteries that could last a relatively long time - this would enable you to be tracked by the sole use of the GSM network. In any case, as soon as you are stripped of your clothes, which has been the case in most of ETA's kidnappings here, any tracking device is worthless - read Steve's post on this subject. Cheers, Mike ----- Original Message ----- From: "ed" To: Sent: Wednesday, August 14, 2002 9:08 PM Subject: [TSCM-L] leaked info on PCS-based GPS tracking? > this past saturday i had an interesting phone conversation with a Sprint > PCS 3G specialist who told me, among other things, that Sprint PCS will be > offering handset location services to consumers (it already offers a > version of this to law-enforcement customers without a warrant.) > 5989 From: R. Snyder Date: Wed Aug 14, 2002 5:25pm Subject: GLONASS indoors? As Steve Uhrig noted: "Better is the newer, not consumer priced, satellite locating engines which combine the U.S. GPS and the Russian Glonass (GLObal NAvagational Satellite System) receivers into one device, acquire signals from both, average them and use that. The two systems are vaguely similar in function, but different enough so the vulnerabilities of one do not affect the other. Many professional and even some military applications use a combination of GPS and Glonass. This can be transparent to the user, as both receivers and their associated processing are integrated into one chip. The user sees coordinates, and that's all he cares about, not how they were derived." Even indoors, I've seen what appear to be some pretty strong GLONASS signals. Although I realize that GPS+GLONASS receivers are, quite literally, the best of both worlds, do GLONASS receivers perform demonstrably better indoors (or in other attenuated/reflected/partially shielded environments) than GPS receivers? __________________________________________________ Do You Yahoo!? HotJobs - Search Thousands of New Jobs http://www.hotjobs.com 5990 From: Steve Uhrig Date: Wed Aug 14, 2002 7:45pm Subject: Re: GPS wristwatch On 13 Aug 2002 at 21:36, iDEN-i100 wrote: > Here is the user manual and pictures- What you are seeing are conceptural drawings and mockups. This is not uncommon. I notice the wording always is, 'the product WILL do X and WILL do Y', never the product DOES do X or Y. Those are giveaways that the thing is conceptual only. CCS and other companies publish all sorts of fancy catalogs, spec sheets and photos of products which do not exist. That's standard. If you haven't seen things like these, I would be surprised. Re demos in your other message, I have seen CCS, LEA in their old days and other companies conduct demos, in my presence as a consultant to a foreign government, and with the government types there, which absolutely blew me away. They were performing the impossible. Took a second demo for me to figure out how they pulled off the scam, and the scam in itself was technically advanced and clever. If people are naÔve, or want to believe, you can scam them easily. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5991 From: iDEN-i100 Date: Wed Aug 14, 2002 8:08pm Subject: Re: Re: GPS wristwatch So you just believe this product in nonexistent and/or does not work? Steve Uhrig wrote: > On 13 Aug 2002 at 21:36, iDEN-i100 wrote: > > > Here is the user manual and pictures- > > What you are seeing are conceptural drawings and mockups. > > This is not uncommon. > > I notice the wording always is, 'the product WILL do X and WILL do > Y', never the product DOES do X or Y. Those are giveaways that the > thing is conceptual only. 5992 From: Steve Uhrig Date: Thu Aug 15, 2002 9:49am Subject: Re: GPS wristwatch On 14 Aug 2002 at 21:08, iDEN-i100 wrote: > So you just believe this product in nonexistent and/or does not work? The first which nullifies the second. I know you've been around, Marcel. I see you on all the lists. Most of them I never post to. I've been around this industry 30 years, all over the world. The majority of surveillance and intelligence gear advertised by spy shops literally does not exist, or the claimed specs are so grossly exaggerated as to convert a real item into vaporware. Have you ever seen a CCS catalog? Virtually NOTHING in there exists, yet governments pay them millions for the things and get ripped off. If you've never seen a CCS catalog or visited a CCS store, get one or do so. Ask for a written price sheet and watch the fancy footwork. If you visit a store, play the game and get invited into the secret back room. Play dumb technically, play rich, play paranoid, play gullible, play shady and play greedy. They sell things which anyone with any technical knowledge readily will know is impossible. Yet they have elaborate glossy color catalogs and spec sheets in several languages, expensive showrooms, slick looking phony demo pieces, and can do demos which are so cleverly faked you're hard pressed to figure out how they've pulled off the impossible before your very eyes. Some day I will describe some of them. They have no price sheets. Prices are determined by what you can afford to pay. Some people pay $2500. Some pay $25000. Some pay $250,000, for the identical item. The very best they do is repackage, and at that they do a very nice job. But repackaging a digital voltmeter and a tape recorder, adding some blinking lights and knobs and chrome, a slick brochure and salesman hyperbole doesn't make a $10,000 piece of telephone countersurveillance equipment to you or me, but it will to a drug dealer. If you think I'm exaggerating in the slightest, ask around. They have two websites. One is a company called G-Com Technologies or something similar. The other you can find easily through Google. Look at the psychology, and the phony products, and the phony dealerships and distributorships they sell. You've seen the Nigerian Scam letters. Hundreds of thousands of those go out every day, and have for years. You'd think no one would be stupid enough to fall for them, but if they weren't working they wouldn't be sending them. Secret Service gets several hundred complaints EACH DAY from people who have been victimized, usually over a period of 6-12 months. You ask who could be so stupid? And all the above is a lot more outrageous than these nonexistent GPS personal trackers. So a lot more people will fall for the tracker scam. I've personally spoken to probably a dozen people who have advanced money on these things with promises of imminent delivery, and all they got is excuses. I've repeatedly made written offers to the companies pushing these things to travel to witness a demo at my expense, which I will control, and if the thing is real I will publicly and humbly apologize and be an enthusiastic supporter. If they don't work, I'll tear them apart in several major magazines for which I am a contributor. They spend millions on PR, but none of the three companies I've contacted repeatedly have bothered to answer or even acknowledge my letters, phone calls or emails. Make your own decision. I know the state of the art, the vulnerability of potential users, and the guile of the vendors, and I have made up my own mind, without a single credible piece of evidence to the contrary. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5993 From: Robert Dyk Date: Thu Aug 15, 2002 10:42am Subject: RE: Re: GPS wristwatch Wow, This GPS wristwatch business has consumed a tremendous amount of space on this list. Why is it so hard to do as Steve suggests and wait and see. A plan which involves no risk at all... No doubt at some point in the future some sort of locator like this will be possible. At this point however, I have enough trouble getting real time covert in vehicle GPS + cell trackers to work reliably. Trying to do that job in a wristwatch and sell it as life safety device defies reason. In the security hardware business what we promote above all else is reliability. (I huff and puff every time somebody shows me some new Bill Gates OS driven piece of gear) Likewise wireless tracking and telemetry. If my son or daughter were kidnapped (why is he out of my control in the first place) would I rely on GPS + wireless + network provider + all in a wristwatch, to save the day ? Not bloody likely. Furthermore, as a vendor, could I sleep easily at night waiting for the first telephone call from the rich customer whose child is missing and they don't seem to be able to pick up his signal? If you're afraid your child might get lost at the county fair, go buy the new Garmin FRS +GPS locator radio. It's fun to play with, works like a charm and only costs $ 299.00. Plus there are lots of them out there with no problems. Once you've done that, listen to Steve, the voice of reason. Robert Dyk dyk@c... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. 5994 From: Guy Urbina Date: Wed Aug 14, 2002 7:54pm Subject: Re: Re: GPS wristwatch I agree with Michael and Steve on a lot of the technical caveats that relegate GPS surveillance trackers as impractical at the present time. A lot of that has to do with traditional GPS receivers. Sadly, the current GPS tracking market is bloated with shucksters, spygear fanatics and outright liars. Digital Angel's claims are disturbingly laughable. However, I take a less pessimistic view as the technology keeps improving in geometric fashion, and I do not want to wholly discard it's use as a surveillance tool unwisely. I design and fabricate many wireless GPS proof of concept demonstrators, some for AVL and some for other applications. I have improved my designs over the years and have noticed the size and power shrinking significantly on the hardware. There are new chipsets with thousands of correlators on them which can provide fixes in conditions with as much as 25db signal attenuation. On the firmware side, new DSP algorithms have decreased the time for a position fix, as well as clever unorthodox ways of processing the pseudoranges. The introduction of WAAS (Wide Area Augmentation System) has improved location resolution to ~15meters. I would like to share with the group some interesting developments in obtuse, unorthodox and non-traditional GPS receiver technologies with advantages and tongue in cheek disadvantages: 1.) Dead Reckoning Augmentation - This is an augmentation aid for integration into a GPS tracking system. Basically, it supplements your navigation during GPS signal outages. Provides the users lat/long relative to an initialization point. Error is 2% to 5% of distance traveled. Disadvantage: I'm afraid the error rises exponentially the longer the GPS signal is lost. www.pointresearch.com 2.) Hybrid server-aided distributed GPS location - This is the architecture that SnapTrack uses. Briefly, It uses servers to process the GPS fix for the handset. The handset takes a snapshot of the SV's above it, passes that info to the server. The server compares that with a network of reference servers (servers that have active GPS receivers on them, coverage of the CONUS) and the location server sends aiding data back to the handset. (doing the calcs for them) Lock on can be achieved with less than 3 SV's due to the server aiding method. The server is able to mitigate multipath and reflected signal effects. Other advantages are fast position fix, low power and high sensitivity which allow position fixes in most buildings, inside cars and in urban canyons where traditional GPS is unreliable and unusable. SnapTrack is wholly owned by Qualcomm and I believe they have incorporated SnapTrack's method in the GPSone chipset for their handsets. If the network is lost............well..........you're lost. see: www.snaptrack.com 3.) Massive correlator approach - a server aided method augmented by massive hardware correlators. 16000 correlators allow acquisition with satellites with signals below -158dbm, or C/No 15db -Hz) 250 msec fix times. These guys really do work indoors! Very tiny chipset form factor. GPS Chipsets Disadvantage: Still can't beat a silver mylar Fritos bag over the GPS antenna.....:) see: www.globallocate.com 4.) Snap-shot post processing approach -(similar to snaptrack) a method whereby the GPS sensor takes a snapshot of the raw GPS data and saves it for post processing later. (datalogger) This data can be retrieved via RS232 and the GPS signal processing can be performed on a laptop. The excellent benefits being: This sensor only needs to be powered up for 60 msec to acquire enough data for a position fix. It is tiny, 7 x 3 cm and estimated battery life is 4 years @ 1 position fix per hour. Disadvantage: lose the signal processing software you're out of luck. also see Fritos bag. website: www.navsys.com/products/tracktag.htm 5.) Balanced quadrifilar-helix GPS antennas - These antennas are balanced so that they require no ground plane. They do not detune if they are close to a human body. They have a broad beam width so that you can point the antenna other than straight up. (175 degrees) It generates a LHCP pattern underneath itself so that it can pick up bounced signals. I bought 2 of these, tested them and found them superior for applications requiring body worn GPS units. NOTE: if you don't have a bodyworn application, they perform similarly to the standard flat patch. Disadvantage: easy to break the ceramic, also see Fritos bag. website: www.sarantel.com My goal is to improve on the technology of the current junk that is out there and make a well engineered GPS surveillance application. Best Regards to all...... -Guy 5995 From: k9electron Date: Thu Aug 15, 2002 4:50am Subject: Alpha 5 Mist tracking system Hi, Ive been reading the post on GPS tracking and thought I would introduce a non GPS/GSM or even battery/mains powered tracking system with a range of 600Km. The crucial, most important feature is that the system is totally passive. There is absolutely no R.F. present. This has been tested with the best equipment on the market. Furthermore the tracking device or bug as we call it does not operate by battery power. The size of the bug is extremely small and they are made in different shapes, the largest one is like a vitamin capsule. The smallest one is to be implanted inside a tooth of the object. The operational range of the tracking system is guaranteed to 6000 kilometres. Looking at the technologies on the market today, the signal from the ALPHA FIVE MIST) can not be jammed in any way The absolutely main factor here is that the bug is 100% passive. The suspect will never know that there is anything installed or placed. More strategically on covert operations because no equipment will give any indication that an operation is going on. We even can supply the bugs in metal or plastic versions. Metal detectors, or non-linear junction detectors will of course not detect the latter. The truly "invisible" bug is here. Nothing else on the market today has these specifications. more info at http://www.spy-equipment.co.uk/Tracking/tracking.html Glenn 5996 From: ed Date: Thu Aug 15, 2002 10:58am Subject: Maryland to install tracking devices in drunk drivers' vehicles >Date: Thu, 15 Aug 2002 11:18:52 -0400 >To: politech@p... >From: Declan McCullagh >Subject: FC: Maryland implants tracking devices in cars of drunk drivers > >Section 1404 of the "Transportation Equity Act for the 21st Century" hands >hundreds of millions of dollars to states that provide "safety incentives >to prevent operation of motor vehicles by intoxicated persons." See: >http://thomas.loc.gov/cgi-bin/query/z?c105:H.R.2400.ENR: >http://www.fhwa.dot.gov/tea21/ >Date: Wed, 14 Aug 2002 >To: declan@w... >From: [name deleted per request --DBM] >Subject: [confidential]Feel the fear. > >http://www.sunspot.net/news/custom/guns/bal-md.ignition14aug14.story?coll=bal%2Dlocal%2Dheadlines > > >"Once a month, the drivers must take their cars to one of 26 service >centers in the state, where the travel information recorded by the >interlocks is transferred to a computer and turned over to the MVA. > >Valenzia said the travel information is checked to see if the driver has >changed his driving habits or might be using another car. > >"We know how far they have to travel to get to work and what their normal >driving routine is," she said. > >--------------------- >Method acting: Read that quote aloud earnestly with meaning, pretending >you are a government employee. > >Feel the fear. > > > >------------------------------------------------------------------------- >POLITECH -- Declan McCullagh's politics and technology mailing list >You may redistribute this message freely if you include this notice. >To subscribe to Politech: http://www.politechbot.com/info/subscribe.html >This message is archived at http://www.politechbot.com/ >Declan McCullagh's photographs are at http://www.mccullagh.org/ >------------------------------------------------------------------------- >Like Politech? Make a donation here: http://www.politechbot.com/donate/ >Recent CNET News.com articles: http://news.search.com/search?q=declan >CNET Radio 9:40 am ET weekdays: http://cnet.com/broadband/0-7227152.html >------------------------------------------------------------------------- > 5997 From: Date: Thu Aug 15, 2002 8:17am Subject: Re: Alpha 5 Mist tracking system In a message dated 8/15/02 9:48:34 AM Pacific Daylight Time, k9sales@n... writes: << Nothing else on the market today has these specifications. >> I believe this statement. 5998 From: Robert Dyk Date: Thu Aug 15, 2002 0:23pm Subject: RE: Alpha 5 Mist tracking system Translated to the German, "MIST" means manure. No Idea how ALPHA FIVE Translates... Robert Dyk dyk@c... Worldwide Security Ltd. Mississauga, Ontario Canada > The crucial, most important feature is that the system is totally > passive. > > There is absolutely no R.F. present. This has been tested with the > best equipment on the market. Furthermore the tracking device or bug > as we call it does not operate by battery power. The size of the bug > is extremely small and they are made in different shapes, the > largest one is like a vitamin capsule. The smallest one is to be > implanted inside a tooth of the object. > > The operational range of the tracking system is guaranteed to 6000 > kilometres. > > Looking at the technologies on the market today, the signal from the > ALPHA FIVE MIST) can not be jammed in any way > > The absolutely main factor here is that the bug is 100% passive. The > suspect will never know that there is anything installed or placed. > More strategically on covert operations because no equipment will > give any indication that an operation is going on. We even can > supply the bugs in metal or plastic versions. Metal detectors, or > non-linear junction detectors will of course not detect the latter. > The truly "invisible" bug is here. > > Nothing else on the market today has these specifications. > This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. > 5999 From: Matt Paulsen Date: Thu Aug 15, 2002 0:22pm Subject: RE: Re: GPS wristwatch Got folg.. where's horse.... Lets look at established firms with products on the market for a moment that sell locally and abroad - Qualcomm, Motorola, Sprint, etc. Arguably they could be considers hucksters given their stock rating and the current inquisition going on in Washington.... but their selling it and companies like Motorola don't generally bank on scams. This is a pdf on e911 from 99 that Motorola put out that shows assisted gps and other things. http://ftp.fcc.gov/realaudio/e911mot.pdf SnapTrack, part of Qualcomm, has over 1 million subscribers for GPS assisted services using CDMA which has been out since last year with 15 shipping devices from manufacturers to choose from. If SnapTrack can tie back a 911 call center to a location analysis system using a cell phone for 50-150 meter resolution, I don't see why a wristwatch or a pager like device could do which is exactly what Qualcomm says can be done. http://www.snaptrack.com Reference from their how it works section: SnapTrack's Personal Location Technologyô is based upon its thin-client Wireless Assisted GPSô system and may be incorporated into cellular phones, pagers, personal digital assistants, and other wireless devices. In fact, the SnapTrack system either runs as software on the handset's own digital signal processing (DSP) chip or as a tightly integrated enhanced GPS capability at the baseband chip level. -----Original Message----- From: Guy Urbina [mailto:urbina1@l...] Sent: Wednesday, August 14, 2002 5:55 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Re: GPS wristwatch I agree with Michael and Steve on a lot of the technical caveats that relegate GPS surveillance trackers as impractical at the present time. A lot of that has to do with traditional GPS receivers. Sadly, the current GPS tracking market is bloated with shucksters, spygear fanatics and outright liars. Digital Angel's claims are disturbingly laughable. However, I take a less pessimistic view as the technology keeps improving in geometric fashion, and I do not want to wholly discard it's use as a surveillance tool unwisely. I design and fabricate many wireless GPS proof of concept demonstrators, some for AVL and some for other applications. I have improved my designs over the years and have noticed the size and power shrinking significantly on the hardware. There are new chipsets with thousands of correlators on them which can provide fixes in conditions with as much as 25db signal attenuation. On the firmware side, new DSP algorithms have decreased the time for a position fix, as well as clever unorthodox ways of processing the pseudoranges. The introduction of WAAS (Wide Area Augmentation System) has improved location resolution to ~15meters. I would like to share with the group some interesting developments in obtuse, unorthodox and non-traditional GPS receiver technologies with advantages and tongue in cheek disadvantages: 1.) Dead Reckoning Augmentation - This is an augmentation aid for integration into a GPS tracking system. Basically, it supplements your navigation during GPS signal outages. Provides the users lat/long relative to an initialization point. Error is 2% to 5% of distance traveled. Disadvantage: I'm afraid the error rises exponentially the longer the GPS signal is lost. www.pointresearch.com 2.) Hybrid server-aided distributed GPS location - This is the architecture that SnapTrack uses. Briefly, It uses servers to process the GPS fix for the handset. The handset takes a snapshot of the SV's above it, passes that info to the server. The server compares that with a network of reference servers (servers that have active GPS receivers on them, coverage of the CONUS) and the location server sends aiding data back to the handset. (doing the calcs for them) Lock on can be achieved with less than 3 SV's due to the server aiding method. The server is able to mitigate multipath and reflected signal effects. Other advantages are fast position fix, low power and high sensitivity which allow position fixes in most buildings, inside cars and in urban canyons where traditional GPS is unreliable and unusable. SnapTrack is wholly owned by Qualcomm and I believe they have incorporated SnapTrack's method in the GPSone chipset for their handsets. If the network is lost............well..........you're lost. see: www.snaptrack.com 3.) Massive correlator approach - a server aided method augmented by massive hardware correlators. 16000 correlators allow acquisition with satellites with signals below -158dbm, or C/No 15db -Hz) 250 msec fix times. These guys really do work indoors! Very tiny chipset form factor. GPS Chipsets Disadvantage: Still can't beat a silver mylar Fritos bag over the GPS antenna.....:) see: www.globallocate.com 4.) Snap-shot post processing approach -(similar to snaptrack) a method whereby the GPS sensor takes a snapshot of the raw GPS data and saves it for post processing later. (datalogger) This data can be retrieved via RS232 and the GPS signal processing can be performed on a laptop. The excellent benefits being: This sensor only needs to be powered up for 60 msec to acquire enough data for a position fix. It is tiny, 7 x 3 cm and estimated battery life is 4 years @ 1 position fix per hour. Disadvantage: lose the signal processing software you're out of luck. also see Fritos bag. website: www.navsys.com/products/tracktag.htm 5.) Balanced quadrifilar-helix GPS antennas - These antennas are balanced so that they require no ground plane. They do not detune if they are close to a human body. They have a broad beam width so that you can point the antenna other than straight up. (175 degrees) It generates a LHCP pattern underneath itself so that it can pick up bounced signals. I bought 2 of these, tested them and found them superior for applications requiring body worn GPS units. NOTE: if you don't have a bodyworn application, they perform similarly to the standard flat patch. Disadvantage: easy to break the ceramic, also see Fritos bag. website: www.sarantel.com My goal is to improve on the technology of the current junk that is out there and make a well engineered GPS surveillance application. Best Regards to all...... -Guy ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6000 From: Matt Paulsen Date: Thu Aug 15, 2002 1:06pm Subject: Study: Lights better crime fighters than cameras Study: Lights better crime fighters than cameras August 14, 2002 Posted: 8:28 PM EDT (0028 GMT) http://www.cnn.com/2002/TECH/science/08/14/britain.cameras.crime.ap/index.ht ml LONDON, England (AP) -- Improved street lighting is a more effective crime-fighter than more expensive surveillance cameras, according to government-commissioned research released Wednesday. The British government has made closed-circuit TV cameras a big part of its campaign to cut crime, spending millions of pounds (dollars) to install them in shopping streets, sports stadiums, railway stations and other public places. But a study of the cameras' effect on crime found that while they "had a significant desirable effect on crime," the cameras reduced offenses overall by just 4 percent. The research found that CCTV cameras, as they are known in Britain [MP: Yea, it's a British thing, we American's have no idea what CCTV is, like tea, or bangers and eggs...], had no effect on violent crimes, but a significant effect on auto theft and vandalism. While cameras in urban areas reduced crime by just 2 percent, cameras in parking lots cut car crime by 41 percent. A separate survey of street lighting found that better, brighter lighting cut overall crime by 20 percent. The reports assessed 34 major studies of CCTV and street lighting published in Britain and North America between 1978 and 2000. The Home Office said it had allocated 170 million pounds ($262 million) for CCTV technology across England and Wales between 1999 and 2003, and had put tens of millions more into separate CCTV programs aimed at small shopkeepers and drug-plagued neighborhoods. The civil liberties group Privacy International has estimated there are as many as 1.5 million CCTV cameras in Britain. The Home Office said it could not say how much was spent in Britain on street lighting, which is funded by local authorities rather than the central government. The government said the studies supported its strategy of using a "package" of crime-prevention measures. "The pooled findings of research from the last 25 years consistently show that a common sense approach bears the best results -- using a variety of targeted crime reduction methods in an area can have a real impact on crime, and improves people's sense of safety," said Home Office minister John Denham. He said the government would "continue to evaluate how we can make best use of CCTV and street lighting, whether it's to reduce fear of crime for the public or to provide valuable evidence for the police." 6001 From: iDEN-i100 Date: Thu Aug 15, 2002 0:57pm Subject: Re: Re: GPS wristwatch I have asked the MSNBC Tech Reporter (whom I know) to obtain a demo unit and take it on a test drive. Lets see what the company says. He is fair and straight forward. Steve Uhrig wrote: > On 14 Aug 2002 at 21:08, iDEN-i100 wrote: > > > So you just believe this product in nonexistent and/or does not work? > > The first which nullifies the second. > > I know you've been around, Marcel. I see you on all the lists. Most > of them I never post to. > > I've been around this industry 30 years, all over the world. > > The majority of surveillance and intelligence gear advertised by spy > shops literally does not exist, or the claimed specs are so grossly > exaggerated as to convert a real item into vaporware. 6002 From: A Grudko Date: Thu Aug 15, 2002 0:20pm Subject: 1) Leaked info? 2) Big security event. - Original Message - From: ed > the example this Sprint PCS 3G cited involved my giving a Sprint PCS > handset equipped with GPS to "a 16 year old", who i would then be able to > determine the location of by looking at a map displayed on my handset. i > asked her if the other handset would have to initiate a call to accomplish > this, and she said no--that as long as the handset was turned on and could > see their network, that its physical location could be determined. We've had this facility here for about 6 months. The original handset supplier was a little known (here) company called 'Benaphone' (sp) which a friend of mine represents here, but there may be others now. Handsets which have been activated to locate each other can do so, but if you don't want me to know where you are you can exclude me to ensure SOME privacy. Location accuracy is limited to the usual commercial GPS bird availability - I usually see 6 'cos I live in the country but between the 10 - 30 storey buildings in Johannesburg I might not see none, so then it won't work. Less likely is moving out of GSM range, but it happens in many of our rural areas. I'd guess there's a second layer service - so that the service provider can locate you any time, just in case you are a suspected terrorist, owe on your taxes or did not vote for the current President :-) As an aside, I'm on a 3 day police SWAT refresher course in the bush as part of the security preparations for the forthcoming 'World Summit On Sustainable Development' in Sandton, Johannesburg - http://www.dfa.gov.za/events/wssd.htm . VIPs, possibly Heads Of State, will be visiting the area I live in. Tuesday there was a 2 hour operation in about a 1.5 km radius of my house involving 2 military (Oryx twin turbine), one badged SA Police (Puma) and 4 presumably UN charter Jet Ranger helicopters. This eMail is not a security breech - there were probably 2000 people watching the operation and many of the VIP visits here are already on public timetables. Those of us who enjoy conspiracy theories will be stimulated to hear that the 2 Oryxs were black, with no markings !!! During the period of the Summit the Sandton Conference Center becomes UN property and is protected by UN security forces, in concert with local police and military. Local organisers have anticipated 40 000 visitors. Local radical groups have promissed even more protestors. Yesterday, I had to move over on the highway for 5 UN blue Toyota Camries plus other vehicles in convoy, light bars strobing red and blue, black windows, diplomatic number plates and 2 coms antennas. I know one was for our local SA Police Service (SAPS), not because I'm a genius, but because the government contractor embosses ELITE - SAPS on the distinctive loading coil, just in case any criminal was not sure that the unmarked car tailing him was cops ! It's gonna be an interesting month. Andy Grudko (British) - D.P.M., Grad I.S, South Africa - PSIRA investigators Reg. No. 8642 Grudko Associates - www.grudko.com , andy@g... . Est. 1981. International business intelligence and investigations To contact us: (+27 12) 244 0255 - 244 0256 (Fax). ICQ : 146498943. Netmeeting : agrudko@h... IPA, SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust When you need it done right - first time From: James M. Atkinson Date: Thu Aug 14, 2003 5:52am Subject: Spy Shop Creed A wealthy old lady decided to go on a photo safari in Africa. She took her faithful pet Chihuahua along for company. One day, the Chihuahua starts chasing butterflies and before long the Chihuahua discovers that he is lost. So, wandering about, he notices a leopard heading rapidly in his direction with the obvious intention of having lunch. The Chihuahua thinks, "OK, I'm in deep trouble now! Then he noticed some bones on the ground close by, and immediately settles down to chew on the bones with his back to the approaching cat. Just as the leopard is about to leap, the Chihuahua exclaims loudly, "Boy, that was one delicious leopard. I wonder if there are any more around here." Hearing this, the leopard halts his attack in mid-stride, as a look of terror comes over him, and slinks away into the trees. "Whew," says the leopard. "That was close. That Chihuahua nearly had me." Meanwhile, a monkey who had been watching the whole scene from a nearby tree figures he can put this knowledge to good use and trade it for protection from the leopard. So, off he goes. But the Chihuahua saw him heading after the leopard with great speed, and figured that something must be up. The monkey soon catches up with the leopard, spills the beans and strikes a deal for himself with the leopard. The leopard is furious at being made a fool of and says, "Here monkey, hop on my back and see what's going to happen to that conniving canine." Now the Chihuahua sees the leopard coming with the monkey on his back, and thinks, "What am I going to do now?" But instead of running, the dog sits down with his back to his attackers, pretending he hasn't seen them yet... and just when they get close enough to hear the Chihuahua says...................... "Where's that darn monkey? I sent him off half an hour ago to bring me another leopard!" REMEMBER: IF YOU CAN'T DAZZLE THEM WITH BRILLIANCE, BAFFLE THEM WITH BULL ! -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "We have suffered a great loss. And in our grief and anger, we have found our mission and our moment...We will not waver, we will not tire, we will not falter and we will not fail!... George W. Bush 9/11/2001 -------------------------------------------------------------------------------------------------- 7654 From: Ocean Group Date: Fri Aug 15, 2003 11:12am Subject: Spy Hunters... http://www.fcw.com/fcw/articles/2003/0811/web-fbi-08-14-03.asp By Sara Michael Aug. 14, 2003 The Justice Department's inspector general (IG) has plenty of suggestions to improve FBI security, but the law enforcement agency said it has already carried out many of them. An IG report released today outlined 21 recommendations for the FBI to improve the security of national information from espionage. At the same time, the FBI released a response, outlining several changes it has already made. Since the arrest of former FBI agent Robert Hanssen two and a half years ago, the bureau has made several security reforms to better detect espionage, including creating a central warehouse for information about people given FBI clearance, and installing a system to track unauthorized access to sensitive documents. "The FBI has already implemented many new measures, including the creation of a special Counterespionage Section to protect critical national security information, and a Penetration Unit to uncover those who would steal and sell our national security secretes to foreign agents," Attorney General John Ashcroft said in a statement. The IG recommended a central repository for derogatory information about FBI agents with access to sensitive information. Bureau officials said they have contracted with a vendor to create a data store with a single interface to enter data on clearance actions and track a person's security clearance activities. "Although we found that the FBI has taken many important steps to improve its internal security program since Hanssen's arrest...some of the most serious weaknesses still have not been fully remedied," the report states. The agency is developing tools to ensure only cleared users can get specific data. The FBI is implementing the Public Key Infrastructure Program to provide users with a digital identity. "The FBI's state-of-the-art Trilogy network will have the capability to provide a new level of security and new capabilities, such as the ability to track unauthorized access to files," the FBI said in the response to the IG report. The report recommends that the FBI track classified information. Agency officials responded that they are in the process of issuing a contract to implement improved levels of security for sensitive electronic and paper documents. Other FBI security improvements that correspond to the IG's recommendations, include: * A permanent unit that was created in May 2002 under the bureau's Counterintelligence Division, to investigate allegations of penetration into the FBI. * Certification of the FBI's Top Secret network and legacy systems to ensure the information systems. * A financial disclosure program begun in May to verify financial information from selected employees. The IG criticized the FBI for "significant, longstanding deficiencies" in internal security. Hanssen used the bureau's Automated Case File system to track sensitive espionage investigations, including references to his own name, the report said. The system, which the report says lacked strong security measures, will be replaced by the Virtual Case File system, expected to be implemented by December. --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.502 / Virus Database: 300 - Release Date: 18/07/2003 7655 From: Fernando Martins Date: Sat Aug 16, 2003 5:03am Subject: Falun Gong take TV satellite http://www.news24.com/News24/World/News/0,,2-10-1462_1402860,00.html Falun Gong take TV satellite 15/08/2003 14:08 - (SA) Beijing - Practitioners of the Falun Gong spiritual movement commandeered China's major television satellite twice this week, the Chinese government said on Friday, reporting the latest satellite hacking by the outlawed group. Sino Satellite, known commonly as SinoSat, was "taken over by illegal TV signals" transmitted by Falun Gong at 21:05 on Tuesday and at 20:23 on Wednesday, the Ministry of Information Industry said. The action prevented Chinese audiences from watching programmes on China Central Television, China Education Television and 10 provincial stations, the government said. Though the government's Xinhua News Agency did not detail what programs were aired during the disruptions, Falun Gong - in hacking activities that began early last year - typically replaces regular fare with messages about its movement and the abuses it says it endures. Falun Gong representatives in the United States acknowledge their hacking activities and say it is the only way they can circulate their message within China. "(Falun Gong) practitioners in China have discovered a non-violent means - one that harms neither people nor equipment - to break through the information blockade and let the people see programs that openly show the human rights violations happening in their own country," Falun Gong spokesman Erping Zhang said last week in a release posted on the group's Web site. The Chinese government banned Falun Gong in 1999 as a threat to public safety and considers it an "evil cult." 7656 From: Steve Uhrig Date: Sat Aug 16, 2003 7:48am Subject: NY PI Conference/Seminar Reposted from the Maryland PI list for anyone who is interested. I am *not* endorsing this event primarily because I believe erroneous credentials are listed for one of the speakers. The organization is not at fault; they repeat what they are given. The organization certainly is professional and ethical. ... Steve ============ The Associated Licensed Detectives of New York State will hold a one- day intensive seminar Saturday, September 20, 2003 at the beautiful Canandaigua Inn-On-The-Lake, Canandaigua, New York. All private investigators and security firms are welcome to attend, including those outside of New York. This seminar will cover such topics as writing effective security surveys, how to avoid legal pitfalls as a private investigator or security firm operator, compliance auditing, corporate due diligence, risk management and the latest information on New York and Federal legislation and compliance issues affecting the investigative and security industries. Registration fee: $90.00 includes 2-hour welcome open bar Friday evening Sept 19th and Continental breakfast, Seminar, luncheon and handouts on Saturday Sept 20th. (After Sept 8th registration fee is $100.) There is an optional Saturday evening dinner with one-hour open bar at additional cost of $40.00. Speakers are: William Dunn, Esq. - General Counsel for Command Security, managing licensing, risk management and compliance in multiple states, Board member of the National Association of Security Companies, and served as NYPD Lieutenant Detective Commander, Bronx and managed fiscal affairs, integrity and contract compliance in Management Information Services Division. Bruce H. Hulme, CFE - NCISS past President and Board member and ALDONYS Legislative Chairman, "Spotlight" Editor and Past President, founder Special Investigations, Inc., and author of chapter "The FCRA and Corporate Investigations" in the book "Corporate Investigations" published by Lawyers and Judges Publishing Co., 2002. Anthony J. Luizzo, PhD, CFE - Founder and Past President of New York City Chapter of the Association of Certified Fraud Examiners and Past President of the Society of Professional Investigators with over 38 years law enforcement and security/safety administration, co-author of "Fraud Auditing: A Complete Guide, published by the Foundation for Accounting Education, and founder of LC Security and Accufacts Preemployment Screening. John D. McCann, CFE - Founder of McCann International, counter- intelligence specialist, lectured at Yale and Rice University on intelligence and covert operations, authored book and numerous articles on compliance auditing for security operations and threat assessments, and adjunct instructor Scotti School in Boston. For Hotel reservations call direct to Canandaigua Inn for discounted rate $109 per room at 1-800-228-2801. (Mention ALDONYS and make your reservations now for the reduced price rate) This rate is only in effect for Friday and/or Saturday stays. Make seminar conference checks/money orders payable to: ALDONYS, Inc. c/o Michael Hymanson, Treasurer Pan American Investigation 76 Mamaroneck Ave. White Plains, NY 10601 For credit card payment or questions call Mike Hymanson at 914 949 1888, or for updates and/or any changes concerning seminar contact Conference Co- Chairs Theresa Balfe at 518 765 5537 (theresapi@a...)or Richard Ingraham at 585 415 0505 (peye@r...) or go to www.aldonys.org ================== ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7657 From: James M. Atkinson Date: Sat Aug 16, 2003 10:14am Subject: On the Clothing issue... On the Clothing issue... Personally, I always dress like the CEO or one of the vice presidents at the place I am visiting, or by default wear a very conservative suit. In hospitals, academia, and research facilities I change to match what the doctors or senior scientists are wearing. Of course I always bring several changes of clothing so I can "match up or down", but also to give me something to change into when/if I crawl around in the ceiling. My "TSCM Wardrobe" starts with a dark very conservative suit (I have several dozen) with a white oxford shirt (you can never have enough of these), a dark paisley or similar tie (but a bunch each month), and black shoes. (This is my executive interface or VP outfit). I good quality CONSERVATIVE suit will only cost a few hundred bucks at J.C. Penny's or Sears, but Brooks Brothers also has nice clothes. NEVER buy just one suit, but instead buy two identical jackets, and four or six pair of matching slacks. This is important as the slacks will always wear out faster than the suit. The next step down is tan dockers/slacks, blue oxford, tan shoes, and a dark usually blue tie. Of course the tan trousers are only used in-season. I usually bring along a snappy blue blazer if it would be appropriate. (This is my researcher/MD or Casual Friday outfit) Below that is a pair of black dockers or slacks, blue or white oxford shirt, muted tone tie, black shoes, etc. The shoes can be swapped out for black sneakers when I start going up on a ladder. (This is my "crawling around on the floor", and physical inspection clothing). This is suitable for almost all elements of the sweep EXCEPT those where you risk personal injury... or for cases where your will be in mahogany row (in which case you will wear a suit). Then of course we have the popular blue jeans, polo/Izod shirt/T-Shirt, heavy boots, etc for when I have to work in a basement, attic, suspended ceiling, steam tunnel, man hole, and so on (hip high wadders are optional). Below that is my "climbers outfit" which I use when I have to use a cherry picker, hang off a pole, open access boxes (off-site) or otherwise look like an outside plant person. This usually includes a pair of jeans, a heavy flannel shirt, T-shirt or turtle-neck under that, climbers gloves, heavy boots, climbers belt, tool belt, climbers chaps, and gaff sets. I save the NINJA outfits and military style clothing for Halloween. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "We have suffered a great loss. And in our grief and anger, we have found our mission and our moment...We will not waver, we will not tire, we will not falter and we will not fail!... George W. Bush 9/11/2001 -------------------------------------------------------------------------------------------------- 7658 From: Date: Sun Aug 17, 2003 11:57am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7659 From: Date: Sun Aug 17, 2003 11:57am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7660 From: Ocean Group Date: Sun Aug 17, 2003 9:28pm Subject: On the Clothing issue... Simplified as: High Income Sweep: Suit Medium Income Sweep: Dockers and decks Low Income Sweep: Workman's gear :) ************************************** Message: 3 Date: Sat, 16 Aug 2003 11:14:13 -0400 From: "James M. Atkinson" Subject: On the Clothing issue... On the Clothing issue... Personally, I always dress like the CEO or one of the vice presidents at the place I am visiting, or by default wear a very conservative suit. In hospitals, academia, and research facilities I change to match what the doctors or senior scientists are wearing. Of course I always bring several changes of clothing so I can "match up or down", but also to give me something to change into when/if I crawl around in the ceiling. My "TSCM Wardrobe" starts with a dark very conservative suit (I have several dozen) with a white oxford shirt (you can never have enough of these), a dark paisley or similar tie (but a bunch each month), and black shoes. (This is my executive interface or VP outfit). I good quality CONSERVATIVE suit will only cost a few hundred bucks at J.C. Penny's or Sears, but Brooks Brothers also has nice clothes. NEVER buy just one suit, but instead buy two identical jackets, and four or six pair of matching slacks. This is important as the slacks will always wear out faster than the suit. The next step down is tan dockers/slacks, blue oxford, tan shoes, and a dark usually blue tie. Of course the tan trousers are only used in-season. I usually bring along a snappy blue blazer if it would be appropriate. (This is my researcher/MD or Casual Friday outfit) Below that is a pair of black dockers or slacks, blue or white oxford shirt, muted tone tie, black shoes, etc. The shoes can be swapped out for black sneakers when I start going up on a ladder. (This is my "crawling around on the floor", and physical inspection clothing). This is suitable for almost all elements of the sweep EXCEPT those where you risk personal injury... or for cases where your will be in mahogany row (in which case you will wear a suit). Then of course we have the popular blue jeans, polo/Izod shirt/T-Shirt, heavy boots, etc for when I have to work in a basement, attic, suspended ceiling, steam tunnel, man hole, and so on (hip high wadders are optional). Below that is my "climbers outfit" which I use when I have to use a cherry picker, hang off a pole, open access boxes (off-site) or otherwise look like an outside plant person. This usually includes a pair of jeans, a heavy flannel shirt, T-shirt or turtle-neck under that, climbers gloves, heavy boots, climbers belt, tool belt, climbers chaps, and gaff sets. I save the NINJA outfits and military style clothing for Halloween. -jma --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.502 / Virus Database: 300 - Release Date: 18/07/2003 7661 From: Lawrence Dillard Date: Sat Aug 16, 2003 3:30pm Subject: PE exam Louisiana Professional Engineering Exam: 1. Calculate the smallest limb diameter on a persimmon tree that will support a 10-pound possum. 2. Which of the following cars will rust out the quickest when placed on blocks in your front yard? a. 66 Ford Fairlane b. 69 Chevrolet c. Chevelle d. 64 Pontiac GTO 3. If your uncle builds a still that operates at a capacity of 20 gallons of shine per hour, how many car radiators are necessary to condense the product? 4. A woodcutter has a chain saw that operates at 2700 rpm. The density of the pine trees in a plot to be harvested is 470 per acre. The plot is 2.3 acres in size. The average tree diameter is 14 inches. How many Budweisers will it take to cut the trees? 5. If every old refrigerator in the state vented a charge of R-12 simultaneously, what would be the decrease in the ozone layer? 6. A front porch is constructed of 2x8 pine on 24-inch centers with a field rock foundation. The span is 8 feet and the porch length is 16 feet. The porch floor is 1-inch rough sawn pine. When the porch collapses, how many hound dogs will be killed? 7. A man in Ozone, Tennessee, owns a house and 3.7 acres of land in a hollow with an average slope of 15%. The man has 5 children. Can each of the children place a mobile home on the man's land? 8. A 20 ton truck is overloaded and proceeding 900 yards down a steep grade on a secondary road at 45 mph. The brakes fail. Given the average traffic on secondary roads, what are the chances that it will strike a vehicle that has a muffler? 9. A coalmine operated a NFPA Class 1, Division 2 Hazardous Area. The mine employs 120 miners per shift. A gas warning is issued at the beginning of 3rd shift. How many cartons of unfiltered Camels will be smoked during the shift? 10. At a reduction in gene pool variability rate of 7.5% per generation, how long will it take a town that has been bypassed by the interstate to breed a country-western singer? (From Louisiana Legionnaire-Spring 2003 edition.) 7662 From: zack Date: Mon Aug 18, 2003 8:36am Subject: Test Testing to see if I am able to post. Have had e-mail problems. 7663 From: James M. Atkinson Date: Tue Aug 19, 2003 3:39pm Subject: Re: NY PI Conference/Seminar [Semper Boolshitis] Semper Boolshitis We have a problem, and I don't know how to tactfully handle the issue, but suffice to say... John McCann is not what he claims, and a number of his claimed credentials are complete bullshit. He claims to be an instructor with the Scotti school, and yet the Scotti School says that his claim is complete bullshit. According to them he never attended their instructor course, never took their executive protection course, never took advanced driving classes, never took any of their firearms courses, and never completed anything more then a basic 2-3 day limo driver driving course (so, just how could he be teaching?) I am very familiar with Scotti as over the years I have attended virtually every course they teach and actually became CERTIFIED as an instructor several years ago (and have the paperwork, diploma, textbook, course manual, etc to prove it... and have no problem producing appropriate documentation). I should note that when the Scotti School found out about John's claims, they sent him several cease and desist orders (they were, and are still really pissed). A few days later John modified his website to remove his claim of being an instructor for the Scotti School, but every now and then he mentions it in a new forum such as someone elses website, or in a situation like this trade show. The bottom line is that John's claims to be an instructor for the Scotti School is a considerable falsehood. The funny thing is that he found out about the Scotti school through my website (I had a link to Scotti), and he dropped my name all though the class trying to convince other people in the class that he was working with or was associated with me (which he was not). One the one hand he claims, or has claimed on his and other web sites to be a licensed private investigator, and yet the State of New York says that is false and that they have no record of either him or his company being issued such a permit or licence (at least in recent history). An example of such a claim may be found at: http://www.lioninvestigationacademy.com/staffphotos.htm (the page has just recently been taken down) The State of New York also pointed out that it is a felony to claim to be a licensed PI in NY and not actually have such a CURRENT license (cough-cough). If course this is yet another major falsehood. However, according to others in the profession; it is claimed that several years years ago, John McCann submitted an article to Police & Security News. They published the article under his name, and he really played up the publicity, ran ads, etc. The article turned out later to be 100% plagiarized, word for word, from an obscure source. Several people in the business caught him red-handed and notified the editor, and he hasn't tried to get published since. OK, he claims to be a TSCM expert (or 30 years)... If so why has he have virtually nothing published under his name? he has not written TSCM articles, has not really published anything concerning TSCM on his website, has never published any white papers on TSCM, never written any articles on TSCM, and so on. On the one hand he brags about being published, and yet on the other hand there is nothing in print relative to TSCM (of which he claims to be an expert). If we look at the bio in his book (published by Paladin Press) nowhere does it mention he has any experience or expertise with TSCM, basic electronics, counter intelligence, counter espionage, in-grown toenails, or anything even remotely resembling the TSCM business, electronics, academic work or any technical credentials of any sort. When the book was published John was clambering for credibility, so if he was doing TSCM then, why didn't he put it on his bio? I mean after all, he claims to have 20 or 30 years in the business, and yet his bio at that time fails to mention such a credential or background. His bio in the book also fails to mention anything concerning his technical skills, or even the slightest technical capability, course, class, or education. John has previously stated to both me and others that he works for the CIA, how the FBI pays him to install bugs for them, how he is close personal friends with Dick Marcinko, how he trains with SEALs, how he knows everybody at Quantico and so on ad nauseam. He is a bit of an chain-smoking espionage groupie, and is essentially living on his wives money while living out his fantasies pretending to be James Bond (ie: Walter Mitty). He surrounds himself with spook mystique, movie posters, books on espionage, CIA coffee mugs, and so on yet he served only a token amount of time in the Marines, never held a Top Secret security clearance, and has very limited technical skills, background, or training. He joins any organization and collects paper from anyone who accepts his membership dues, but given his reputation and considerable falsehoods he would appear to bring serious discredit to such organizations. John is absolutely obsessed with who is a narc or fed and "who is cool". He is constantly looking over his shoulder, constantly looking for informants or agents, and constantly trying to manipulate others. According to him, the government is stalking him, the black helicopters are landing this weekend, the DEA and FBI has his phones taped, etc, etc, ad nauseam. This in and of itself should tell you something... when someone is overly paranoid, and un-naturally suspicious of others something is seriously amiss. John is rude, abusive, and tries to be a grand manipulator. He tries to get grand-fathered into everything that involves credentials, and expects to get special treatment just because he spent a couple of years in the Marine Corps (Semper Fi, my ass... more like semper bull-shitis). He holds himself out as a spy, and an expert on espionage who in fact commits, and has admitted to corporate espionage. On the one hand he will pretends to kiss your ass, and yet on the other he will stab you in the back in a heartbeat just to make himself feel more important and to fluff himself up (ditto for a few others). He is the only person I have ever met (who has told me in person) that he shows up to do a bug sweep wearing a full battle dress uniform (BDU), complete with a rappel harness, belt, K-Bar knives, semi-automatic pistol in a shoulder holster, and combat boots Of course the Halliburton briefcases, and rack mounted toys from Radio Shack and Super-circuits look impressive to a non-technical person, but instead they amuse those actually performing real TSCM services. He buys flashy toys totally inappropriate for TSCM, and dresses them up in fancy cases to impress his clients. He goes to great pains to conceal that the equipment is amateur toys, and goes out of his way to paint the stuff to look spookier. Sure you can put a $75 dollar scanner in a $400 case and scratch out all of the Radio Shack markings, but it's STILL a consumer toy and not a professional tool. Ditto for dressing up a few hundred pounds of ten year old scrap test equipment that you can buy by the pound. Sure he has some fancy toys, but think for a moment... are they really relevant to TSCM... or for illicit eavesdropping? He does possess a fairly elaborate metal working shop which he seems to have inherited from his father, and he does bend some pretty sheet metal good tin bender. This allows him to make up some impressive and functional packaging and racking and stacking. While his cases may look pretty they do not appears to have been used for any actual work (hint: a TSCM'er who actually DOES sweeps will scratch, scuff, and dent their cases... not have ones that look brand new, almost like they never went into the field). In my opinion (and based on my direct contact over several years with John), I feel that he is absolute poison to the industry, discredits those organizations who allow him to join, discredits people who associate with him, and is a destructive influence to those who he comes in contact with. I realized what he was up to several years back, and have since distanced myself from him (as have others). I also feel that he is just a laughing stock, and a bit of an inside joke in the TSCM business, and his antics makes him look like and even bigger ass-clown. But then of course, your mileage may vary. Also, I should mention that John is extremely envious of others in the profession, he secretly lusts to be like them, would give his left testicle to have equipment like others have, and goes off on a tantrum like a little girl when anyone questions his credentials. One of his favorite games is to have one of his friends vet him in to an organization, then he vets them into some other organization in return, and so on. Semper Boolshitis, It really quite sad, If any other list members have comments on this guy, please feel free to post them to this list. -jma At 8:48 AM -0400 8/16/03, Steve Uhrig wrote: >Reposted from the Maryland PI list for anyone who is interested. > >I am *not* endorsing this event primarily because I believe erroneous >credentials are listed for one of the speakers. The organization is >not at fault; they repeat what they are given. > >The organization certainly is professional and ethical. > >... Steve > >============ > >The Associated Licensed Detectives of New York State will hold a one- >day intensive seminar Saturday, September 20, 2003 at the beautiful >Canandaigua Inn-On-The-Lake, Canandaigua, New York. All private >investigators and security firms are welcome to attend, including >those outside of New York. This seminar will cover such topics as >writing effective security surveys, how to avoid legal pitfalls as a >private investigator or security firm operator, compliance auditing, >corporate due diligence, risk management and the latest information >on New York and Federal legislation and compliance issues affecting >the investigative and security industries. > >Registration fee: $90.00 includes 2-hour welcome open bar Friday >evening Sept 19th and Continental breakfast, Seminar, luncheon and >handouts on Saturday Sept 20th. (After Sept 8th registration fee is >$100.) There is an optional Saturday evening dinner with one-hour >open bar at additional cost of $40.00. > >Speakers are: > >William Dunn, Esq. - General Counsel for Command Security, managing >licensing, risk management and compliance in multiple states, Board >member of the National Association of Security Companies, and served >as NYPD Lieutenant Detective Commander, Bronx and managed fiscal >affairs, integrity and contract compliance in Management Information >Services Division. > >Bruce H. Hulme, CFE - NCISS past President and Board member and >ALDONYS Legislative Chairman, "Spotlight" Editor and Past President, >founder Special Investigations, Inc., and author of chapter "The FCRA >and Corporate Investigations" in the book "Corporate Investigations" >published by Lawyers and Judges Publishing Co., 2002. > >Anthony J. Luizzo, PhD, CFE - Founder and Past President of New York >City Chapter of the Association of Certified Fraud Examiners and Past >President of the Society of Professional Investigators with over 38 >years law enforcement and security/safety administration, co-author >of "Fraud Auditing: A Complete Guide, published by the Foundation for >Accounting Education, and founder of LC Security and Accufacts >Preemployment Screening. > >John D. McCann, CFE - Founder of McCann International, counter- >intelligence specialist, lectured at Yale and Rice University on >intelligence and covert operations, authored book and numerous >articles on compliance auditing for security operations and threat >assessments, and adjunct instructor Scotti School in Boston. > >For Hotel reservations call direct to Canandaigua Inn for discounted >rate $109 per room at 1-800-228-2801. (Mention ALDONYS and make your >reservations now for the reduced price rate) This rate is only in >effect for Friday and/or Saturday stays. > >Make seminar conference checks/money orders payable to: > >ALDONYS, Inc. c/o Michael Hymanson, Treasurer Pan American >Investigation 76 Mamaroneck Ave. White Plains, NY 10601 For credit >card payment or questions call Mike Hymanson at 914 949 1888, or for >updates and/or any changes concerning seminar contact Conference Co- >Chairs Theresa Balfe at 518 765 5537 (theresapi@a...)or Richard >Ingraham at 585 415 0505 (peye@r...) or go to >www.aldonys.org > >================== -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "We have suffered a great loss. And in our grief and anger, we have found our mission and our moment...We will not waver, we will not tire, we will not falter and we will not fail!... George W. Bush 9/11/2001 -------------------------------------------------------------------------------------------------- 7664 From: Date: Tue Aug 19, 2003 1:51pm Subject: CWA Charges Verizon and Two Officers with Wiretap Law Violation CWA Charges Verizon and Two Officers with Wiretap Law Violation for Spying on Union Conference Call With Reporters WASHINGTON, Aug. 19 /PRNewswire/ -- The Communications Workers of America today filed suit against Verizon Communications, Verizon Wireless (Cellco Partnership) and two Verizon officers charging that the company officials violated federal anti-wiretapping laws by accessing an invitation-only CWA teleconference with reporters on August 13. The complaint, filed in federal district court in the District of New Jersey, charges that Verizon Senior Vice President for Investor Relations Thomas Bartlett and Executive Director of Investor Relations Dominic Di Bucci violated Title III of the Omnibus Crime Control and Safe Streets Act through their unauthorized monitoring of the call. CWA had invited 27 specific journalists to hear about the union's negotiations with Verizon as well as plans by the AFL-CIO to support CWA members' bargaining efforts. The conference call was led by AFL-CIO Secretary-Treasurer Richard Trumka and CWA Executive Vice President Larry Cohen, and reporters were invited to ask questions of the two leaders. After the call, CWA learned that the two Verizon executives had gained access to the toll-free call-in number, which had been provided privately to the invited reporters, and listened in without announcing their presence, subsequently reporting the content of the conference to other company officials. "This is an outrageous throwback to the old days of labor turmoil before the Wagner Act of 1935 finally outlawed the practice of management infiltration and spying on union activities," said CWA President Morton Bahr. "Such behavior by senior management officials at a critical time in our negotiations is not helpful to the process. It's an insult to all of our members at Verizon and cannot be tolerated." The lawsuit seeks a declaration that the Verizon officials' actions violated the law, that Bartlett and Di Bucci be enjoined from further such conduct, and that the union be awarded punitive damages. SOURCE Communications Workers of America CO: Communications Workers of America; CWA; Verizon Communications; Verizon Wireless ST: District of Columbia SU: LAW LBR Web site: http://www.cwa-union.org http://www.prnewswire.com 08/19/2003 16:53 EDT [Non-text portions of this message have been removed] 7665 From: Dragos Ruiu Date: Wed Aug 20, 2003 2:38am Subject: Pacific Security (pacsec.jp) Call for Papers (Japanese Below) CALL FOR PAPERS PacSec.JP (Pacific Security) http://pacsec.jp Announcing the opportunity to submit papers for the PacSec/core03 network security training conference. The conference will be held November 6/7th in Tokyo. The conference focuses on emerging information security tutorials - it will be a bridge between the international information security technology community and Japan. Please make your paper proposal submissions before Aug 30 2003. Slides for the papers must be submitted by Oct 7th 2003. The conference is November 6th and 7th 2003, presenters need to be available in the days before to meet with interpreters. A number of invited papers have been confirmed, but a limited number of speaking slots are still available. The conference is responsible for travel and accomodations for the speakers. If you have a proposal for a tutorial session then please email a synopsis of the material and your biography and papers, speaking background to core03@p.... Tutorials are one hour in length, but with simultaneous translation should be approximately 45 minutes in English, or Japanese. Only slides will be needed for the October paper deadline, full text does not have to be submitted. The Pacific Security (PacSec) conference consists of tutorials on technical details about current issues, innovative techniques and best practices in the information security realm. The audiences are a multi-national mix of professionals involved on a daily basis with security work: security product vendors, programmers, security officers, and network administrators. We give preference to technical details and education for a technical audience. The conference itself is a single track series of presentations in a lecture theater environment. The presentations offer speakers the opportunity to showcase on-going research and collaborate with peers while educating and highlighting advancements in security products and techniques. The focus is on innovation, tutorials, and education instead of overt product pitches. Some commercial content is tolerated, but it needs to be backed up by a technical presenter - either giving a valuable tutorial and best practices instruction or detailing significant new technology in the products. Paper proposals should consist of the following information: 1) Presenter, and geographical location (country of origin/passport) and contact info (e-mail, postal address, phone, fax). 2) Employer and/or affiliations. 3) Brief biography, list of publications and papers. 4) Any significant presentation and educational experience/background. 5) Topic synopsis, Proposed paper title, and a one paragraph description. 6) Reason why this material is innovative or significant or an important tutorial. 7) Optionally, any samples of prepared material or outlines ready. Please forward the above information to core03@p... to be considered for placement on the speaker roster. ˨õʺîË´ñÊñáÂãüÈõÜ PacSec.JP (Pacific Security) http://pacsec.jp ÁèæÂú®„ÄÅPacSec/core03 „Éç„ÉÉ„Éà„É؄ɺ„Ç؄ɪ„Ǫ„Ç≠„É•„É™„ÉÜ„Ç£„ÄÄ„Éà„ɨ„ɺ„Éã„É≥„Ç∞„ɪ„Ç´„É≥„Éï„Ç°„ɨ „É≥„ÇπÈñãÂǨ„Å´Âêë„Åë„Ŷ„ÄÅË´ñÊñá„ÅÆÂè≠‰ªò„Åë„ÇíË°å„Å£„Ŷ„Åä„Çä„Åæ„Åô„ÄÇÂêå„Ç´„É≥„Éï„Ç°„ɨ„É≥„Çπ„ÅØ„ÄÅ2003 Âπ¥11Êúà6Ê≠•(Êú®)„ÄÅ7Ê≠•(Èáë)„ÅƉ∫åÊ≠•Èñì„Å´„Çè„Åü„ÇäÊù±‰∫¨„ÅßÈñãÂǨ„Åï„Çå„Äʼn∏ª„Å´ÂÖàÁ´ØÊÉÖ ±„Ǫ„Ç≠„É•„É™„ÉÜ„Ç£„ÅÆ „ÉÅ„É•„ɺ„Éà„É™„Ç¢„É´„ÇíÈáçÁÇπÁöÑ„Å´Âèñ„Çä‰∏ä„Åí„Åæ„Åô„ÄÇ„Åæ„Åü„ÄÅÊ≠•Êú¨„Å®ÊÉÖ ±„Ǫ„Ç≠„É•„É™„ÉÜ„Ç£ÊäÄË°ì„ÅÆ ÂõΩÈöõÁ§æ‰ºö„ÇíÁµê„Å∂„ÄåÊ ∂„ÅëÊ©ã„Äç„Å´„Å™„Çã„Åì„Å®„ÇíÁõÆÁöÑ„Å®„Å≠„Ŷ„ÅÑ„Åæ„Åô„ÄÇ „Ç´„É≥„Éï„Ç°„ɨ„É≥„Çπ„Å´„Åä„Åë„Çã˨õʺîË´ñÊñáÁô∫Ë°®„ÅÆÁî≥„Å≠Ë溄ÅøÂè≠‰ªò„Åë„ÅÆÁ∑ „ÇÅÂàá„Çä„ÅØ„ÄÅ2003Âπ¥8Êúà30 Ê≠•(Âúü)„Å®„Åï„Åõ„Ŷ„ÅÑ„Åü„Å „Åç„Åæ„Åô„ÄÇ„Çπ„É©„ǧ„Éâ„ÅÆÊúÄÁµÇÊèêÂá∫Ê≠•„ÅØ„ÄÅ2003Âπ¥10Êúà7Ê≠•(ÁÅ´)„Åß„Åô„ÄÇ ÂΩìÊ≠•„ÄÅÈÄöË®≥„ÅåÂøÖ˶ńřÊñπ„ÅØ„ÄÅ„Ç´„É≥„Éï„Ç°„ɨ„ÇπÈñãÂǨÊ≠•„ÅÆÊï∞Ê≠•Ââç„Å´„ÄÅÊâìÂêà„Çè„Åõ„ÅÆ„Åü„ÇŧöÂ∞ë„ÅäÊôÇ Èñì„ÇíÁî®ÊÑè„Å≠„Å¶È Ç„ÅèÂøÖ˶ńÅå„ÅÇ„Çä„Åæ„Åô„ÄÇ ÊãõÂæÖÂèÇÂä ËÄÖ„Å´„Çà„ÇãË´ñÊñá„ÅاöÊï∞Á¢∫ÂÆöÊ∏à„Åø„Åß„Åô„Åå„ÄÅÂΩìÊ≠•„ÅÆ˨õʺîÊ „Å´„Åä„ÅфŶ„ÅاöÂ∞ë„ÅƉ∫àÂÇôÊ „Åå„ÅÇ„ÇãÁÇ∫„ÄÅÁèæÂú®Ë¨õʺîËÄÖ„ÇíÂãüÈõÜ„Å≠„Ŷ„ÅÑ„Åæ„Åô„ÄÇ˨õʺîÊ≠•„ÅƉ∫§ÈÄöË≤ª„Åä„Çà„Å≥ÂÆøÊ≥äÁ≠âË®≠ÂÇô „ÅØ„Äʼn∏ªÂǨËÄÖÂÅ¥„ÅßË≤¨‰ªª„ÇíÊåÅ„Å£„ŶÊâãÈÖçË᥄Å≠„Åæ„Åô„ÄÇ„ÉÅ„É•„ɺ„Éà„É™„Ç¢„É´„ɪ„Ǫ„ÉÉ„Ç∑„Éß„É≥„Åß„ÅÆ˨õʺî„Çí Â∏åÊúõ„Åï„Çå„ÇãÊñπ„ÅØ„ÄÅ˨õʺî„É „ÉÜ„É™„Ç¢„É´„ÄÅË´ñÊñá„ÅÆÂÜÖÂÆπ„ÄÅÂèä„Å≥ÁµåÊ≠¥„ÄÅ˨õʺîÁµåÈ®ì„ÅÆʶÇ˶ńÇí„ÄÅ core03@p... ËøÑ„ÄÅÈõªÂ≠ê„É°„ɺ„É´„Å´„Ŷ„ÅäÈÄÅ„Çä‰∏ã„Åï„ÅÑ„ÄÇ Ë¨õʺî„ÅØ„Äʼn∏ĉ∫∫„ÅÇ„Åü„Çä1ÊôÇÈñì„Çí‰∫àÂÆö„Å≠„Ŷ„Åä„Çä„Åæ„Åô„Åå„ÄÅÂêåÊôÇÈÄöË®≥„ÅåÂøÖ˶ńř ¥Âêà„ÄÅ Ëã±Ë™ „Åæ„Åü„ÅØÊ≠•Êú¨Ë™ „Å´„Çà„Çã˨õʺîÊôÇÈñì„ÅØ„ÄÅÁ¥Ñ45ÂàÜÈñì„Å®„ÅäËÄÉ„Åà‰∏ã„Åï„ÅÑ„ÄÇ Â∞ö„ÄÅ„Çπ„É©„ǧ„Éâ„ÅÆÁ∑ „ÇÅÂàá„Çä„ÅØ10Êúà7Ê≠•(ÁÅ´)„Å®„Åï„Åõ„Å¶È Ç„ÅфŶ„Åä„Çä„Åæ„Åô„Åå„ÄÅ„Åù„ÅÆÈöõ„Å´Ë´ñÊñá„ÅÆ ÂÖ®Êñá„ÇíÊèêÂá∫„Å≠„Ŷ„ÅÑ„Åü„Å „ÅèÂøÖ˶ńÅØ„Åî„Åñ„ÅÑ„Åæ„Åõ„Çì„ÄÇ Pacific Security (PacSec) „Ç´„É≥„Éï„Ç°„ɨ„É≥„Çπ„ÅØ„ÄÅÊÉÖ ±„Ǫ„Ç≠„É•„É™„ÉÜ„Ç£„Å´Èñ¢„Åô„ÇãÁ¥∞„Åã „ÅÑÊäÄË°ì„ÇÑ„ÄÅÊúÄËøë„ÅƄǪ„Ç≠„É•„É™„ÉÜ„Ç£ÂïèÈ°å„ÄÅÊñ¨Êñ∞ÁöÑ„Å™„ÉÜ„ÇØ„Éã„ÉÉ„ÇØ„ÄÅÂèä„Å≥ÊúÄ„ÇÇÈÅ©Âàá„Å® ÊÄù„Çè„Çå„Çã„Ǫ„Ç≠„É•„É™„ÉÜ„Ç£ÂØæÁ≠ñ„Å™„Å©„Å´„ŧ„ÅфŶ„ÄÅ„ÉÅ„É•„ɺ„Éà„É™„Ç¢„É´ÂΩ¢Âºè„Å´„Çà„Çã˨õʺî„Å´„Çà„Çä ÊßãÊàê„Åï„Çå„Ŷ„ÅÑ„Åæ„Åô„ÄÇ„Ç´„É≥„Éï„Ç°„ɨ„É≥„Çπ„ÅÆÂèÇÂä ËÄÖ„ÅØ„ÄÅÂ∏∏„Å´„Ǫ„Ç≠„É•„É™„ÉÜ„Ç£„Å®Èñ¢„Çè„ÇãÁí∞¢ɄŴ„ÅÇ„Çä„ÄÅ „Åù„ÅÆÂàÜÈá „Å´„Åä„Åë„ÇãÂ∞ÇÈñÄÂÆ∂ÈÅî„Åß„ÅÇ„Çä„Åæ„Åô„ÄÇ„Åæ„Åü„Åù„ÅÆÂõΩÁ±ç„ÇÑÊñáÂåñ„ÇÇÊßò„ÄÖ„Åß„Åô„ÄÇ „Ǫ„Ç≠„É•„É™„É܄ǣˣΩÂìÅ„ÅÆ„Éô„É≥„ÉĄɺ„ÄÅ„É≠„É≠„Ç∞„É©„É „ɺ„ÄńǪ„Ç≠„É•„É™„ÉÜ„Ç£„ɪ„Ç™„Éï„Ç£„ǵ„ɺ„ÄÅ „Éç„ÉÉ„Éà„É؄ɺ„ÇØÁÆ°ÁêÜËÄÖ„Å™„Å©„ÄŧߧâÂπÖÂ∫É„ÅÑ„Ç∏„É£„É≥„É´„ÅƉ∫∫„ÄÖ„ÅåÂèÇÂä „Åï„Çå„ÇãÈñ¢‰ølj∏ä„ÄŠ˨õʺîÂÜÖÂÆπ„ÅØ„ÄÅÊäÄË°ìÁöÑ„Å´ÂÜÖÂÆπ„ÅÆÊ∑±„ÅÑ„ÇÇ„ÅÆ„ÄÅ„Åæ„Åü„ÅØÊäÄË°ìËÄÖ„Å´„Å®„Å£„Ŷ„ÇÇÊúâÁõä„Å®„Å™„ÇãÂÜÖÂÆπ„Çí ÂÑ™ÂÖà„Åï„Åõ„Å¶È Ç„Åç„Åæ„Åô„ÄÇ „Ç´„É≥„Éï„Ç°„ɨ„É≥„Çπ„ÅÆÊßãÊàê„ÅØ„ÄÅ„Åù„Çå„Å „ÇåÁã¨ËᙄÅÆ„É≠„ɨ„Ǻ„É≥„Ç®„ɺ„Ç∑„Éß„É≥„Çí˨õÁæ©ÂΩ¢Âºè„ÅßË°å„ÅÑ„Åæ„Åô„ÄÇ Ë¨õÂ∏´„ÅØ„ÄÅ„Åù„ÅÆ„É≠„ɨ„Ǻ„É≥„É܄ɺ„Ç∑„Éß„É≥„ÇíÈÄö„Å≠„Ŷ„ÄÅÁèæÂú®ÈÄ≤Ë°å‰∏≠„ÅÆÁ îÁ©∂„ÅÆÁ¥π‰ªã„ÄńǪ„Ç≠„É•„É™„É܄ǣˣΩÂìÅ„ÇÑ ÊäÄË°ìË£ΩÂìÅ„Å´„Åä„Åë„ÇãÊõ¥„Å™„ÇãÊïôËÇ≤„ÄÅÂêë‰∏ä„Å´„ŧ„ÅфŶ§ö„Åè„ÅÆ„Ç®„Ç≠„Çπ„Éë„ɺ„ÉàÈÅî„Å®ÊÉÖ ±‰∫§Êèõ„Çí„Åô„Çã ¥„ÇíÊåńŧ‰∫ã„Åå Âá∫Êù•„Çã„ÅÆ„Åß„Åô„ÄÇ „É≠„ɨ„Ǻ„É≥„É܄ɺ„Ç∑„Éß„É≥„ÅØ„ÄÅÊò ÁôΩ„Å´ÁâπÂÆö„ÅÆË£ΩÂìÅ„ÇíÂÆ£‰ºù„Åô„Çã„Çà„ÅÜ„Å™ÂÜÖÂÆπ„Åß„ÅØ„Å™„Åè„ÄÅ ÊäÄË°ìÈù©Êñ∞„ÄÅ„ÉÅ„É•„ɺ„Éà„É™„Ç¢„É´„ÄÅÊïôËÇ≤ÁöÑ„Å™„ÇÇ„ÅÆ„Å´ÈáçÁÇπ„Çí„Åä„ÅфŶ‰∏ã„Åï„ÅÑ„ÄÇ ÂïÜÁî®ÁöÑ„Å™„Ç≥„É≥„ÉÜ„É≥„ÉÑ„Åå„ÅÑ„Åè„Çâ„ÅãÂê´„Åæ„Çå„Ŷ„ÅфŶ„ÇÇÂ∑Æ„Å≠ÊîØ„Åà„ÅØ„ÅÇ„Çä„Åæ„Åõ„Çì„Åå„ÄÅ„Åù„ÅÆÈöõ„ÅØ„ÄÅ „Åù„ÅÆË£ΩÂìÅ„Å´Èñ¢„Åô„Çã„ÄÅË≤¥Èáç„Å™„ÉÅ„É•„ɺ„Éà„É™„Ç¢„É´„Åä„Çà„Å≥ÊúÄ„ÇÇÈÅ©Âàá„Å™„Ǫ„Ç≠„É•„É™„ÉÜ„Ç£ÂØæÁ≠ñ„ÅÆË™¨Êò „ÇÑ„ÄÅ Èáç§߄řÊñ∞ÊäÄË°ì„ÅÆË©≥Á¥∞„Å™„Å©„ÅßË£è„Å•„Åë„Çí„Åô„ÇãÂøÖ˶ńÅå„ÅÇ„Çä„Åæ„Åô„ÄÇ Ë´ñÊñá„ÅÆÊú∫‰∏äÊ°à„Å´„ÅØ„Äʼn∏ãË®ò„ÅÆÊÉÖ ±„ÇíÂøÖ„ÅöÂÖ•„Çå„Çã„Çà„ÅÜ„Å´„Å≠„Ŷ‰∏ã„Åï„ÅÑ„ÄÇ 1) ˨õÂ∏´ÊÉÖ ±„ÄÅÊâÄÂú®Âú∞ÔºàÂá∫ÁîüÂõΩ/„Éë„Çπ„Éù„ɺ„Éà„Å´Ë®òÂÖ•„Åï„Çå„Ŷ„ÅÑ„ÇãÂõΩÁ±çÔºâ„ÄÅ„Åä„Çà„Å≥ÈÄ£Áµ° ÂÖà (ÈõªÂ≠ê„É°„ɺ„É´„Ç¢„Éâ„ɨ„Çπ„ÄʼnΩèÊâÄ„ÄÅÈõªË©±Áï™Âè∑„ÄÅFAXÁï™Âè∑) 2) Âã§ÂãôÂÖà„ÄÅÊâı Âõ£‰Ωì 3) Á∞°Âçò„Å™ÁµåÊ≠¥„ÄÅÂá∫ÁâàÁâ©„Åä„Çà„Å≥Ë´ñÊñá„ÅÆ„É™„Çπ„Éà 4) §߄Åç„Å™„É≠„ɨ„Ǻ„É≥„É܄ɺ„Ç∑„Éß„É≥„Åä„Çà„Å≥˨õÂ∏´ÁµåÈ®ì/ÁµåÊ≠¥ 5) Ë©±È°å„ÅÆʶÇ˶ńÄÅË´ñÊñá„ÅÆË°®È°å (Ê°à) „ÄÅ„Åä„Çà„Å≥ÂÜÖÂÆπ„ÅÆÁ∞°Âçò„ř˙¨Êò (‰∏ÄÊƵËêΩ„Å´„Åæ„Å®„ÇÅ„Åü„ÇÇ„ÅÆ) 6) Áô∫Ë°®„Åô„ÇãÈ°åÊùê„Åå„ÄÅÈù©Êñ∞ÁöÑ„Åæ„ÅüÈáç§߄řÊÑèÂë≥„ÇíÊåÅ„Å£„Ŷ„ÅÑ„Çã„ÄÅ„ÅÇ„Çã„ÅÑ„ÅØÈáç˶ńř „ÉÅ„É•„ɺ„Éà„É™„Ç¢„É´„Åß„ÅÇ„ÇãÁêÜÁî± 7) ‰ªªÊÑè„Åß„ÄÅÁî®ÊÑè„Å≠„ÅüË≥áÊñô„Åæ„Åü„ÅØ˶ÅÊ≠®„ÅƄǵ„É≥„É≠„É´ „Ç´„É≥„Éï„Ç°„ɨ„É≥„Çπ˨õÂ∏´ÂØ©Êüª„ÅÆÂèÇËÄÉ„Å´„Åï„Åõ„Ŷ„ÅÑ„Åü„Å „Åç„Åæ„Åô„ÅÆ„Åß„Äʼn∏äË®òÈ ÖÁõÆ„Çí core03@p... ËøÑ„ÅäÈÄÅ„Çä‰∏ã„Åï„ÅÑ„ÄÇ -- pgpkey http://dragos.com/ kyxpgp 7666 From: James M. Atkinson Date: Wed Aug 20, 2003 9:29pm Subject: Semper Boolshittis Let me clarify something, The folks at the Department of State, of the State of New York pointed out something: John McCann himself is not a licensed private investigator, however; there is a "McCann International" with a PI license, but that John is not listed of the actual license. As such John McCann is not a licensed private investigator as he would have to be listed (by name) on the PI license. Sure he may have some kind of relationship with McCann International, but according to the state he is not a PI himself. Reference the following: http://wdb.dos.state.ny.us/lcns_public/LCNS_WDB.LICENSEE_DETAIL_FORM.show?p_arg_names=ID_NUMBER&p_arg_values=11000052095&p_arg_names=FULL_NAME&p_arg_values=NOT+APPLICABLE&p_arg_names=BUS_NAME&p_arg_values=MCCANN+INTERNATIONAL&p_arg_names=ADDR_1&p_arg_values=155+E+DORSEY+LN&p_arg_names=ADDR_2&p_arg_values=&p_arg_names=CITY&p_arg_values=POUGHKEEPSIE&p_arg_names=ST&p_arg_values=NY&p_arg_names=ZIP_CODE&p_arg_values=12601&p_arg_names=COUNTY_NAME&p_arg_values=DUTCHESS&p_arg_names=LIC_DESC&p_arg_values=PRIVATE+INVESTIGATOR&p_arg_names=EXPIRE_DATE&p_arg_values=08%2F11%2F2005&p_arg_names=_show_header&p_arg_values=YES&p_arg_names=_alt_rowid&p_arg_values=RECORD_ID ID Number:11000052095 Name:NOT APPLICABLE Business Name:MCCANN INTERNATIONAL Business Address:155 E DORSEY LN POUGHKEEPSIE, NY 12601 County:DUTCHESS License Type:PRIVATE INVESTIGATOR Expires:08/11/2005 Of course it could just be that the State of New York is lying to the public about him being a PI, and that the Scotti School is simply employing John McCann as a covert operative with a cover as a super-secret instructor. Please check your shoulder holsters at the door. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "We have suffered a great loss. And in our grief and anger, we have found our mission and our moment...We will not waver, we will not tire, we will not falter and we will not fail!... George W. Bush 9/11/2001 -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 7667 From: Tim Harrison Date: Wed Aug 20, 2003 11:08am Subject: [Fwd: A must Read] -------- Original Message -------- Subject: A must Read From: "evans" Date: Mon, August 18, 2003 7:32 pm To: "Glenn" Subject: Texas A and M Commencement Speech This is long, but an extremely interesting read. A commencement speech you won't hear at the University of California, Berkeley any time soon. This Texas A&M Commencement Speech by Neal Boortz (a Texan, lawyer, Texas Aggie, now nationally syndicated talk show host from Atlanta) is an exception. Agree or not, you will find his views thought provoking. It would have been particularly entertaining to witness the faculty's reaction. COMMENCEMENT SPEECH AT TEXAS A&M Neal Boortz Commencement Address: I am honored by the invitation to address you on this august occasion. It's about time. Be warned, however, that I am not here to wow you; you'll have enough smoke blown your way today. And you can bet your tassels I'm not here to impress the faculty and administration. You may not like much of what I have to say, and that's fine. You will remember it though. Especially after about 10 years out there in the real world. This, it goes without saying, does not apply to those of you who will seek your careers and your fortunes as government employees. This gowned gaggle behind me is your faculty. You've heard the old saying that those who can -- do. Those who can't -- teach. That sounds deliciously insensitive. But there is often raw truth in insensitivity, just as you often find feel-good falsehoods and lies in compassion. Say good-bye to your faculty, because now you are getting ready to go out there and do. These folks behind me are going to stay right here and teach. By the way, just because you are leaving this place with a diploma doesn't mean the learning is over. When an FAA flight examiner handed me my private pilot's license many years ago, he said, 'Here, this is your ticket to learn.' The same can be said for your diploma. Believe me, the learning has just begun. Now, I realize that most of you consider yourselves Liberals. In fact, you are probably very proud of your liberal views. You care so much. You feel so much. You want to help so much. After all, you're a compassionate and caring person, aren't you now? Well, isn't that just so extraordinarily special. Now, at this age, is as good a time as any to be a Liberal; as good a time as any to know absolutely everything. You have plenty of time, starting tomorrow, for the truth to set in. Over the next few years, as you begin to feel the cold breath of reality down your neck, things are going to start changing pretty fast... including your own assessment of just how much you really know. So here are the first assignments for your initial class in reality: Pay attention to the news, read newspapers, and listen to the words and phrases that proud Liberals use to promote their causes. Then compare the words of the left to the words and phrases you hear from those evil, heartless, greedy conservatives. From the Left you will hear "I feel." >From the Right you will hear "I think." From the Liberals you will hear references to groups -- The Blacks, The Poor, The Rich, The Disadvantaged, The Less Fortunate." From the Right you will hear references to individuals. On the Left you hear talk of group rights; on the Right, individual rights. That about sums it up, really: Liberals feel. Liberals care. They are pack animals whose identity is tied up in group dynamics. Conservatives and Libertarians think -- and, setting aside the theocracy crowd, their identity is centered on the individual. Liberals feel that their favored groups have enforceable rights to the property and services of productive individuals. Conservatives and Libertarians, (myself among them I might add) think that individuals have the right to protect their lives and their property from the plunder of the masses. In college you developed a group mentality, but if you look closely at your diplomas you will see that they have your individual names on them. Not the name of your school mascot, or of your fraternity or sorority, but your name. Your group identity is going away. Your recognition and appreciation of your individual identity starts now. If, by the time you reach the age of 30, you do not consider yourself to be a libertarian or a conservative, rush right back here as quickly as you can and apply for a faculty position. These people will welcome you with open arms. They will welcome you, that is, so long as you haven't developed an individual identity. Once again you will have to be willing to sign on to the group mentality you embraced during the past four years. Something is going to happen soon that is going to really open your eyes. You're going to actually get a full time job! You're also going to get a lifelong work partner. This partner isn't going to help you do your job. This partner is just going to sit back and wait for payday. This partner doesn't want to share in your effort, but your earnings. Your new lifelong partner is actually an agent. An agent representing a strange and diverse group of people. An agent for every teenager with an illegitimate child. An agent for a research scientist who wanted to make some cash answering the age-old question of why monkeys grind their teeth. An agent for some poor demented hippie who considers herself to be a meaningful and talented artist, but who just can't manage to sell any of her artwork on the open market. Your new partner is an agent for every person with limited, if any, job skills .... but who wanted a job at City Hall. An agent for tinhorn dictators in fancy military uniforms grasping for American foreign aid. An agent for multi-million-dollar companies who want someone else to pay for their overseas advertising. An agent for everybody who wants to use this agent's unimaginable power for their own personal enrichment and benefit. That agent is our wonderful, caring, compassionate, oppressive government. Believe me, you will be awed by the unimaginable power this agent has. Power that you do not have. A power that no individual has, or will have. This agent has the legal power to use force, deadly force, to accomplish its goals. You have no choice here. Your new friend is just going to walk up to you, introduce itself rather gruffly, hand you a few forms to fill out, and move right on in. Say hello to your own personal one-ton gorilla. It will sleep anywhere it wants to. Now, let me tell you, this agent is not cheap. As you become successful, it will seize about 40% of everything you earn. And no, I'm sorry, there just isn't any way you can fire this agent of plunder, and you can't decrease it's share of your income. That power rests with him, not you. So, here I am saying negative things to you about government. Well, be clear on this: It is not wrong to distrust government. It is not wrong to fear government. In certain cases it is not even wrong to despise government -- for government is inherently evil. Yes, a necessary evil, but dangerous nonetheless .... somewhat like a drug. Just as a drug that in the proper dosage can save your life, an overdose of government can be fatal. Now let's address a few things that have been crammed into your minds at this university. There are some ideas you need to expunge as soon as possible. These ideas may work well in the academic environment, but they fail miserably out there in the real world. First, that favorite buzz word of the media, government and academia: Diversity! You have been taught that the real value of any group of people -- be it a social group, an employee group, a management group, whatever -- is based on diversity. This is a favored liberal ideal because diversity is based not on an individual's abilities or character, but on a person's identity and status as a member of a group. Yes, it's that liberal group identity thing again. Within the great diversity movement, group identification -- be it racial, gender based, or some other minority status -- means more than the individual's integrity, character or other qualifications. Brace yourself. You are about to move from this academic atmosphere where diversity rules, to a workplace and a culture where individual achievement and excellence actually count. No matter what your professors have taught you over the last four years, you are about to learn that diversity is absolutely no replacement for excellence, ability, and individual hard work. >From this day forward, every single time you hear the word "diversity" you can rest assured that there is someone close by who is determined to rob you of every vestige of individuality you possess. We also need to address this thing you seem to have about "rights." We have witnessed an obscene explosion of so-called "rights" in the last few decades, usually emanating from college campuses. You know the mantra: You Have The Right To A Job. The right to a place to live. The right to a living wage. The right to health care. The right to an education. You probably even have your own pet right -- the right to a Beemer, for instance, or the right to have someone else provide for that child you plan on downloading in a year or so. Forget it. Forget those rights! I'll tell you what your rights are! You have a right to live free, and to the results of your labor. I'll also tell you have no right to any portion of the life or labor of another. You may, for instance, think that you have a right to health care. After all, Hillary said so, didn't she? But you cannot receive health care unless some doctor or health practitioner surrenders some of his time -- his life -- to you. He may be willing to do this for compensation, but that's his choice. You have no "right" to his time or property. You have no right to his or any other person's life or to any portion thereof. You may also think you have some "right" to a job; a job with a living wage, whatever that is. Do you mean to tell me that you have a right to force your services on another person, and then the right to demand that this person compensate you with their money? Sorry, forget it. I am sure you would scream if some urban outdoorsmen (that would be "homeless person" for those of you who don't want to give these less fortunate people a romantic and adventurous title) came to you and demanded his job and your money. The people who have been telling you about all the rights you have are simply exercising one of theirs - the right to be imbeciles. Their being imbeciles didn't cost anyone else either property or time. It's their right, and they exercise it brilliantly. By the way, did you catch my use of the phrase "less fortunate" a bit ago, when I was talking about the urban outdoorsmen? That phrase is a favorite of the Left. Think about it, and you'll understand why. To imply that one person is homeless, destitute, dirty, drunk, spaced out on drugs, unemployable, and generally miserable because he is "less fortunate" is to imply that a successful person - one with a job, a home and a future - is in that position because he or she was "fortunate." The dictionary says that fortunate means "having derived good from an unexpected place." There is nothing unexpected about deriving good from hard work. There is also nothing unexpected about deriving misery from choosing drugs, alcohol, and the street. If the Left can create the common perception that success and failure are simple matters of "fortune" or "luck," then it is easy to promote and justify their various income redistribution schemes. After all, we are just "evening out the odds" a little bit. This "success equals luck" idea the liberals like to push is seen everywhere. Democratic presidential candidate Richard Gephardt refers to high-achievers as "people who have won life's lottery." He wants you to believe they are making the big bucks because they are lucky. It's not luck, my friends. It's choice. One of the greatest lessons I ever learned was in a book by Og Mandino, entitled "The Greatest Secret in the World." The lesson? Very simple: "Use wisely your power of choice," That bum sitting on a heating grate, smelling like a wharf rat? He's there by choice. He is there because of the sum total of the choices he has made in his life. This truism is absolutely the hardest thing for some people to accept, especially those who consider themselves to be victims of something or other - victims of discrimination, bad luck, the system, capitalism, whatever. After all, nobody really wants to accept the blame for his or her position in life. Not when it is so much easier to point and say, "Look! He did this to me!" than it is to look into a mirror and say, "You S.O.B.! You did this to me!" The key to accepting responsibility for your life is to accept the fact that your choices, every one of them, are leading you inexorably to either success or failure, however you define those terms. Some of the choices are obvious: whether or not to stay in school. Whether or not to get pregnant. Whether or not to hit the bottle. Whether or not to keep this job you hate until you get another better-paying job. Whether or not to save some of your money, or saddle yourself with huge payments for that new car. Some of the choices are seemingly insignificant: Whom to go to the movies with. Whose car to ride home in. Whether to watch the tube tonight, or read a book on investing. But, and you can be sure of this, each choice counts. Each choice is a building block - some large, some small. But each one is a part of the structure of your life. If you make the right choices, or if you make more right choices than wrong ones, something absolutely terrible may happen to you. Something unthinkable. You, my friend, could become one of the hated, the evil, the ugly, the feared, the filthy, the successful, the rich. Quite a few people have made that mistake. The rich basically serve two purposes in this country. First, they provide the investments, the investment capital, and the brains for the formation of new businesses. Businesses that hire people. Businesses that send millions of paychecks home each week to the un-rich. Second, the rich are a wonderful object of ridicule, distrust, and hatred. Few things are more valuable to a politician than the envy most Americans feel for the evil rich. Envy is a powerful emotion. Even more powerful than the emotional minefield that surrounded Bill Clinton when he reviewed his last batch of White House interns. Politicians use envy to get votes and power. And they keep that power by promising the envious that the envied will be punished: "The rich will pay their fair share of taxes if I have anything to do with it.' The truth is that the top 10% of income earners in this country pays almost 50% of all income taxes collected. I shudder to think what these job producers would be paying if our tax system were any more "fair." You have heard, no doubt, that the rich get richer and the poor get poorer. Interestingly enough, our government's own numbers show that many of the poor actually get richer, and that quite a few of the rich actually get poorer. But for the rich who do actually get richer, and the poor who remain poor.... there's an explanation -- a reason. The rich, you see, keep doing the things that make them rich; while the poor keep doing the things that make them poor. Speaking of the poor, during your adult life you are going to hear an endless string of politicians bemoaning the plight of the poor. So, you need to know that under our government's definition of "poor" you can have a $5 million net worth, a $300,000 home and a new $90,000 Mercedes, all completely paid for. You can also have a maid, cook, and valet, and $1 million in your checking account, and you can still be officially defined by our government as "living in poverty." Now there's something you haven't seen on the evening news. How does the government pull this one off? Very simple, really. To determine whether or not some poor soul is "living in poverty," the government measures one thing - just one thing. Income. It doesn't matter one bit how much you have, how much you own, how many cars you drive or how big they are, whether or not your pool is heated, whether you winter in Aspen and spend the summers in the Bahamas, or how much is in your savings account. It only matters how much income you claim in that particular year. This means that if you take a one-year leave of absence from your high-paying job and decide to live off the money in your savings and checking accounts while you write the next great American novel, the government says you are 'living in poverty." This isn't exactly what you had in mind when you heard these gloomy statistics, is it? Do you need more convincing? Try this. The government's own statistics show that people who are said to be "living in poverty" spend more than $1.50 for each dollar of income they claim. Something is a bit fishy here. Just remember all this the next time Peter Jennings puffs up and tells you about some hideous new poverty statistics. Why has the government concocted this phony poverty scam? Because the government needs an excuse to grow and to expand its social welfare programs, which translates into an expansion of its power. If the government can convince you, in all your compassion, that the number of "poor" is increasing, it will have all the excuse it needs to sway an electorate suffering from the advanced stages of Obsessive-Compulsive Compassion Disorder. I'm about to be stoned by the faculty here. They've already changed their minds about that honorary degree I was going to get. That's OK, though. I still have my Ph.D. in Insensitivity from the Neal Boortz Institute for Insensitivity Training. I learned that, in short, sensitivity sucks. It's a trap. Think about it - the truth knows no sensitivity. Life can be insensitive. Wallow too much in sensitivity and you'll be unable to deal with life, or the truth. So, get over it. Now, before the dean has me shackled and hauled off, I have a few random thoughts. * You need to register to vote, unless you are on welfare. If you are living off the efforts of others, please do us the favor of sitting down and shutting up until you are on your own again. * When you do vote, your votes for the House and the Senate are more important than your vote for president. The House controls the purse strings, so concentrate your awareness there. * Liars cannot be trusted, even when the liar is the president of the United States. If someone can't deal honestly with you, send them packing. * Don't bow to the temptation to use the government as an instrument of plunder. If it is wrong for you to take money from someone else who earned it -- to take their money by force for your own needs -- then it is certainly just as wrong for you to demand that the government step forward and do this dirty work for you. * Don't look in other people's pockets. You have no business there. What they earn is theirs. What you earn is yours. Keep it that way. Nobody owes you anything, except to respect your privacy and your rights, and leave you the hell alone. * Speaking of earning, the revered 40-hour workweek is for losers. Forty hours should be considered the minimum, not the maximum. You don't see highly successful people clocking out of the office every afternoon at five. The losers are the ones caught up in that afternoon rush hour. The winners drive home in the dark. * Free speech is meant to protect unpopular speech. Popular speech, by definition, needs no protection. * Finally (and aren't you glad to hear that word), as Og Mandino wrote: 1. Proclaim your rarity. Each of you is a rare and unique human being. 2. Use wisely your power of choice. 3. Go the extra mile. Drive home in the dark. Oh, and put off buying a television set as long as you can. Now, if you have any idea at all what's good for you, you will get the hell out of here and never come back. Class dismissed. [Non-text portions of this message have been removed] 7668 From: Date: Thu Aug 21, 2003 4:16pm Subject: Re: Details See the attached file for details [Non-text portions of this message have been removed] 7669 From: frost_bitten_ca Date: Fri Aug 22, 2003 1:28pm Subject: suggests commercial interests have created the virus suggests commercial interests have created the virus Sobig's second attack due at 3 p.m. today By JACK KAPICA Globe and Mail Update Another surprise is in store for computers infected with the Sobig virus, security experts are warning. The virus, the world's most widespread worm which has caused extensive damage to e-mail systems, is set to enter a second phase today (Friday, Aug. 22) at 1900 UTC or 3:00 p.m. EDT. Co-ordinated by atomic clocks, consultants at CGI CIRT in Ottawa say, computers infected by Sobig will connect to 20 machines in the United States, Canada and South Korea. The list is encrypted in the virus body. The machines, CGI CIRT says, appear to be home computers connected by broadband to the Internet. Infected machines will then download a program from a certain Web address and run it. Currently, that Web address doesn't go anywhere, the security people said. They speculate that the address will become active only seconds before the 20 computers start the download, which gives analysts no time to examine the program to defuse it. As a result, no one knows what the program does or how much damage it is capable of doing. Previous versions of Sobig (there have been six in all) have downloaded programs that erase the virus but install a password- stealing program, and install an e-mail proxy that can send spam, without the owner's knowledge. Researchers were able to break into Sobig far enough to gather all the information except the source of the Web address. The spamming feature, CGI CIRT said, suggests commercial interests have created the virus, and not a "typical teenage virus writer." Meanwhile, an antivirus company is warning that a worm similar to the destructive Sobig.F virus, which was programmed to deactivate on Sept. 10, could follow on or near Sept. 11, an antivirus company has warned. If the Sobig virus creators continue their usual pattern, then Internet users should brace themselves on that day, warned Central Command, the Medina, Ohio-based maker of antivirus software and services. The Sobig.F worm, the sixth variant of a worm first seen in January, was discovered on Aug. 19, and is estimated to have infected-millions of systems worldwide. A new variant might draw on all the infected computers to create "a cyber army focusing a digital assault against major on-line services," Central Command said today. When particular conditions are met, the company explained, Sobig.F will attempt to download additional components of the attackers' choice. The conditions include performing tests to determine if the current day is Friday or Sunday between the hours of 19:00 (7 p.m.) and 22:00 (10 p.m.) UTC time. When these conditions are met, the worm will attempt to retrieve further instructions that may include the downloading and execution a back-door hacker program. Called "Trojan" programs, these back-door programs turn computers into zombies doing the bidding of the virus maker, including full control of the infected computer. "The virus authors of Sobig have developed a predictable pattern of releasing new variants soon after the current version deactivates itself," Central Command vice-president Steven Sundermeier said. "If the past repeats itself we could be looking at a newly constructed creation shortly after Sept. 10." Mr. Sundermeier said he feared that the massive army created by Sobig.F could be used to launch an attack on large Internet infrastructures by means of a denial-of-service attack (DoS). Sobig.F has been declared the fastest-spreading e-mail plague of all time. MessageLabs Inc., a company that filters e-mail for corporate clients around the world, said Wednesday it had intercepted more than a- million copies of the Sobig.F virus the previous day, the most it has ever intercepted in a single day. That was one in every 17 e-mail messages the firm scanned. "That's just a number we've never seen before," said Brian Czarny, MessageLabs' marketing director. The most widespread virus of all time, Klez, at its peak accounted for one in 125 messages scanned. Sobig.F continued to spread aggressively on Wednesday, though the pace eased off a bit to about one in 60 messages, he said. The virus spreads through Windows PCs via e-mail and corporate networks. It clogs e-mail systems with messages carrying subject lines like "Re: Details" and "Re: Wicked screensaver." "It's a seeding," Mr. Czarny said. "All they're looking to do is plant that Trojan." With a report from Associated Press http://www.globeandmail.com/servlet/story/RTGAM.20030822.gtsobigaug22/ BNStory/Technology/ 7670 From: Cornolio Date: Fri Aug 22, 2003 5:01pm Subject: high tech blackmail Hi, So far I have only found one English item in the news about this. http://www.expatica.com/index.asp?pad=2,18,&item_id=33655 So let me translate some of the dutch information about this interesting case : A 45-year old chip designer from Utrecht was arrested June 3. He confessed to have tried to blackmail the 'Campina' food company. He had threatened to poison their products, and demanded 200.000 euro. --- The most remarkable thing about this case is however how he communicated with Campina, and how he thought to receive the money. He forced Campina to open a bank account, and get a 'world card' with it. Then they had to deposit 200.000 Euro on it (about 185.000 US dollar). He ordered them to buy a credit card reader, and read the information off the magnetic-stripe of the 'world card'. Then they had to send him the output of the card reader, together with the pin code. With this information, he then could create a copy of the 'world card' using a card-writer and a blank card. To send him the information, he made them use steganography! Campina received an envelope via snailmail containing a floppy with a stego program and instructions. They had to encode the 'world card' info into a picture of a red VW golf, using the stego program, and a fixed crypto key that was included in the envelope. Finally, they had to place the picture in a fake add on a website where large amounts of people sell/buy second hand cars. He would then read the add, and make a copy of the picture. Decode the stego info out of it, write his own copy of the card, and withdraw money. Without ever having personal contact with Campina (or the police). To be real clever, he did not approach the website with the car adds directly. Police found out the add was approached trough a US anonymizer called SURFOLA.com. SURFOLA.com claims on their website : "We will not give out your name, residence address, or e-mail address to any third parties without your permission, for any reason, at any time, ever." The Utrecht police informed the FBI, and asked for assistance. Within 24 hours, the FBI cracked the case, supplying the Dutch police with a '@w...' e-mail address and some paypal.com financial data. This data led to the 45 year old chip programmer. After his identity was known, the police ofcourse started surveillance on him. The 'desert terrorist' was arrested red-handed when he withdrew money from an ATM using the world-card copy.... --- Greetings, Barry Wels. 7671 From: James M. Atkinson Date: Fri Aug 22, 2003 9:59pm Subject: FBI's Performance in Robert Philip Hanssen Case A Review of the FBI's Performance in Deterring, Detecting, and Investigating the Espionage Activities of Robert Philip Hanssen August 14, 2003 Office of the Inspector General ------------------------------------------------------------------------ UNCLASSIFIED EXECUTIVE SUMMARY I. Introduction In this report, the Office of the Inspector General (OIG) of the Department of Justice (DOJ) examines the performance of the Federal Bureau of Investigation (FBI) in deterring, detecting, and investigating the espionage of Robert Philip Hanssen, a former FBI Supervisory Special Agent. Hanssen's espionage began in November 1979 - three years after he joined the FBI - and continued intermittently until his arrest in February 2001, just two months before his mandatory retirement date. In addition to its management responsibility to detect espionage among its employees, the FBI is the lead agency for detecting and investigating espionage committed in the United States. Hanssen became an FBI agent in 1976. During his 25-year FBI career, he principally served in Soviet counterintelligence assignments in New York City and Washington, D.C. In the 1980s and 1990s, Hanssen held positions at FBI Headquarters and the State Department that gave him access to a broad range of highly sensitive counterintelligence and military information. On February 18, 2001, after a three-month investigation of Hanssen, he was arrested and charged with committing espionage on behalf of the KGB (Komitet Gosudarstvennoy Bezopasnosti, the intelligence service of the former Soviet Union) and its successors. On July 6, 2001, Hanssen pled guilty to espionage charges pursuant to a plea agreement in which he agreed to cooperate with the U.S. government and submit to debriefings. On May 10, 2002, Hanssen was sentenced to life imprisonment. Hanssen's espionage spanned three separate time periods: 1979-81, 1985-91, and 1999-2001. Over more than 20 years, Hanssen compromised some of this nation's most important counterintelligence and military secrets, including the identities of dozens of human sources, at least three of whom were executed. Hanssen gave the KGB thousands of pages of highly classified documents and dozens of computer disks detailing U.S. strategies in the event of nuclear war, major developments in military weapons technologies, information on active espionage cases, and many other aspects of the U.S. Intelligence Community's Soviet counterintelligence program. Shortly after Hanssen's arrest, the Senate Select Committee on Intelligence (SSCI) and the Attorney General asked the OIG to review the FBI's performance in connection with the Hanssen case. This report details the results of the OIG's investigation. II.Summary of the OIG Investigation and Structure of the Report The OIG assembled a team of three Special Investigative Counsel, a project director, three OIG Special Agents, two analysts, and a consultant to conduct this review. The team reported directly to the Inspector General. The team obtained, reviewed, and analyzed more than 368,000 pages of material from the FBI, the Central Intelligence Agency (CIA), the Justice Department, the National Security Agency (NSA), and the State Department. The team also conducted more than 200 interviews in 12 states and the District of Columbia. We interviewed Hanssen's former colleagues and supervisors at the FBI and State Department, as well as family, friends, and acquaintances who knew Hanssen throughout his life. We interviewed much of the operational hierarchy of the FBI's Intelligence/National Security Division (NSD) during the 1979 to 2001 period. In addition, we interviewed CIA and Justice Department personnel who had substantial involvement with the FBI regarding "penetration" matters - that is, investigating whether a foreign intelligence service has infiltrated or recruited agents within U.S. organizations. The team also interviewed Hanssen extensively. Our full 674-page report is classified at the Top Secret/Codeword level because it contains extremely sensitive classified information regarding sources involved in the Hanssen case and FBI counterintelligence activities. We also produced a 383-page report, classified at the Secret level, which does not contain the detailed information on the sensitive sources that is included in the Top Secret/Codeword version. In addition, we produced this 31-page unclassified executive summary to provide a public summary of the main findings in the more extensive classified reports. We previously provided a copy of all three reports to the FBI for its comments on their factual accuracy and classification, and we made changes where appropriate. In our reports, we divide Hanssen's FBI career into three phases that roughly correspond with the three periods of his espionage and with key FBI penetration-related efforts. One chapter is devoted to each phase, and within each chapter there are three parts: Hanssen's career, Hanssen's espionage, and the FBI's penetration efforts. Chapter One covers the time period between 1976, when Hanssen joined the FBI, and 1985, when he completed his first tour in the Soviet Analytical Unit at FBI Headquarters. This chapter also includes background information concerning Hanssen's childhood, education, and employment prior to becoming an FBI agent. Hanssen's first espionage - conducted on behalf of the GRU (Glavnoye Razvedyvatelnoye Upravleniye, the Soviet Union's military intelligence arm) - took place between 1979 and 1981. The FBI's investigation of Soviet-related penetration leads during this time period was minimal. Chapter Two covers the time period between 1985 - when Hanssen became the supervisor of an FBI technical surveillance squad in New York and volunteered to the KGB - and 1992. Hanssen's FBI career progressed normally during these years, which also constituted his most active period of espionage. With respect to the penetration issue, both the CIA and the FBI suffered catastrophic and unprecedented losses of Soviet intelligence assets in 1985 and 1986, which suggested that a mole was at work in the Intelligence Community. The FBI conducted several analytical efforts - including a major joint project with the CIA - that were unsuccessful at determining the cause of these compromises. Chapter Three begins in 1992 and ends with Hanssen's arrest in February 2001. In January 1992, Hanssen became the Chief of the National Security Threat List Unit at FBI Headquarters, the highest ranking position he held at the FBI. Hanssen's failings as a supervisor and his inability to properly handle classified information led the FBI to remove Hanssen from his Unit Chief position, and he was subsequently detailed to the State Department as the FBI liaison to the Office of Foreign Missions (OFM). He served for six years in the OFM, until shortly before his arrest. With respect to espionage, Hanssen made a clumsy and aborted approach to the GRU in 1993 and then successfully re-volunteered to the KGB in 1999. Hanssen's espionage - which during this period relied heavily on his improper use of the FBI's Automated Case Support (ACS) computer system - continued until his arrest in February 2001. The FBI's penetration-related investigations increased dramatically in the 1992 to 2001 period. The FBI substantially increased the resources it devoted to the penetration issue and successfully identified and prosecuted several individuals who spied for Russia, including CIA officer Aldrich Ames. The most significant espionage investigation that the FBI pursued after the 1994 arrest of Ames, however, was the search for the penetration of the U.S. Intelligence Community who was later determined to be Hanssen. The FBI believed early on that the mole worked at the CIA and subsequently pursued a lengthy investigation of a CIA employee. We now know that from the outset the FBI was focused on the wrong suspect at the wrong agency. Chapter Four of our report examines deficiencies in the FBI's internal security that were apparent during our investigation of the Hanssen matter. This chapter discusses how flaws and deficiencies in the FBI's programs and policies concerning background reinvestigations, financial disclosures, polygraph examinations, computer security, classified document handling, and procedures for reporting and documenting security violations made it easier for Hanssen to commit espionage and more difficult for the FBI to detect him. It also describes the changes that have been made, or not made, to the FBI's internal security program since Hanssen's arrest in 2001. Lastly, Chapter Five summarizes our principal factual findings and sets forth our recommendations for changes in the FBI's counterintelligence and security programs. III.Principal Findings of the OIG Investigation In the following paragraphs, we summarize the report's principal findings concerning Hanssen's career at the FBI, his espionage, and the FBI's penetration-related efforts from 1978 to 2001. A.Hanssen's FBI Career During his 25 years with the FBI, Hanssen was a mediocre agent who exhibited strong technical abilities but had weak managerial and interpersonal skills. Despite his failings as a supervisor, Hanssen was on the FBI's promotional track for much of his FBI career, and he generally received average to favorable performance evaluations. While Hanssen's day-to-day behavior did not suggest that he was engaged in espionage, he continually demonstrated an unwillingness to properly handle classified information. His indiscretions and security violations were largely ignored and wholly undocumented, however, and he was allowed to remain in positions offering him broad access to highly sensitive counterintelligence information. Ultimately, Hanssen's inability to effectively interact with subordinates and colleagues derailed his FBI career. Hanssen received minimal supervision in most of his positions, was not required to produce significant work product, and had ample time to plan and commit espionage while on duty. Hanssen also encountered few security checks at the FBI. He was never asked to submit to a polygraph examination or to complete a financial disclosure form, and he received only one background reinvestigation during his 25-year FBI career. To his FBI co-workers, Hanssen's personal life appeared completely inconsistent with that of a spy. He was married with six children, and appeared to be a devout Catholic who attended mass every day and who was actively involved in Opus Dei, a conservative Catholic lay organization. He also espoused politically conservative and anti-Communist views. Hanssen had no alcohol, drug, or gambling problems, and did not engage in ostentatious spending. Hanssen was an only child whose father, a lieutenant in the Chicago Police Department, emotionally abused him throughout his life. Starting from a young age, Hanssen enjoyed spy-related entertainment, especially James Bond books and movies, collected items associated with espionage, such as a Walther PPK pistol, a Leica camera, a shortwave radio, and opened a Swiss bank account. Hanssen was an average student in college, majoring in chemistry. He drifted through dental school and business school - and became a certified public accountant - before joining the Chicago Police Department. After four years, Hanssen left the police department to join the FBI in January 1976. Hanssen appeared to be an appropriate candidate for the FBI, in light of his college education, master's degree in business administration, experience as a certified public accountant, and service in the Chicago Police Department. The FBI's initial background investigation and interviews did not indicate that Hanssen was likely to commit espionage. While Hanssen came to the FBI with serious personal insecurities, low self-esteem, and a fascination with espionage, these characteristics did not emerge during the application process. Once in the FBI, Hanssen's personality traits set him apart from his FBI colleagues. He had poor interpersonal skills and a dour demeanor, and was an awkward and uncommunicative loner who conveyed a sense of intellectual superiority that alienated many of his co-workers. Early in his career, however, Hanssen demonstrated significant initiative and organizational skills, developing, for example, a case prioritization system that remains in use today at the FBI. He also had an interest in and aptitude for computer work that was highly unusual at the time, and a number of his early supervisors regarded him as smart, technically proficient, and analytical. After graduation from the FBI Academy at Quantico, Virginia, Hanssen served an initial two-year tour as a Special Agent in Gary, Indiana. While Hanssen sought out counterintelligence assignments in Gary, there was little such work available. At the end of his tour, Hanssen requested a transfer to the FBI's New York Office. Within six months of his arrival in New York, Hanssen arranged to be transferred from a Criminal Division squad to Soviet counterintelligence work, which remained his assignment for most of his FBI career. Hanssen quickly began exploiting weaknesses in the FBI's internal information security. While still assigned to a Criminal Division squad in the FBI's New York Office, Hanssen took advantage of the unrestricted and unmonitored access to the closed file room and spent hours reading Soviet espionage files - without any conceivable "need to know" - managing to identify some of the FBI's most significant Soviet sources in the process. Hanssen - who appeared to have little aptitude for operational work - demonstrated a strong interest in computers and in administrative assignments, and was given responsibility for managing the New York Office's counterintelligence database, a position that put him at the center of the information flow. In the early 1980s, Hanssen served in the Budget Unit and in the Soviet Analytical Unit at FBI Headquarters - positions that provided him with broad access to sensitive information and an opportunity to use his technical and computer skills, but did not require operational work. Because the Budget Unit was responsible for preparing materials justifying the FBI's budget requests to Congress, Hanssen obtained access to sensitive information from all components of the Intelligence Division, and worked closely with the NSA and the CIA to secure joint funding for certain projects. In the Soviet Analytical Unit, Hanssen gained access to the FBI's most sensitive human assets and technical operations against the Soviet Union. He also began a noticeable pattern of mishandling classified information, primarily by disclosing the existence of Soviet sources and investigations to people with no "need to know," such as FBI employees in other divisions and personnel from other agencies. While Hanssen's tours in the Budget and Soviet Analytical Units showed that he was an intelligent, analytical agent with significant computer skills, his performance also revealed that he lacked the interpersonal skills to communicate effectively and perform supervisory duties. Nonetheless, Hanssen's career at the FBI continued to advance. In 1985, Hanssen returned to the New York Office as the supervisor of a technical surveillance squad. Hanssen was a lackadaisical manager who did not interact effectively with his subordinates. Because the squad largely "ran itself," however, Hanssen's limited interpersonal skills did not become a significant issue. Similarly, Hanssen's mishandling of classified information was obvious to his subordinates but was not brought to the attention of his superiors. In 1987, Hanssen returned to the Soviet Analytical Unit in FBI Headquarters as a supervisor, a position that he told the OIG he found "overwhelmingly attractive" because of the extremely broad access to sensitive information it offered. Although Hanssen received very favorable performance evaluations during his second tour in the Unit, his supervisor regarded him as the "strangest person" he had ever worked with in the FBI - a "kind of cipher who was rigid, dour, and a religious zealot." As was the case during his first tour in the Unit, Hanssen produced little work product, and his subordinates regarded him as distant and arrogant. Shortly after his return to the Unit, Hanssen committed a serious security breach by disclosing sensitive information to a Soviet defector he was debriefing. Hanssen's colleagues recognized that he could not be trusted with highly sensitive information and informally attempted to restrict his access. Although this security breach was reported to an FBI supervisor, it was not documented, and no formal action was taken against Hanssen, whose access to sensitive information remained largely unchecked. In 1990, Hanssen became an Inspector's Aide in the Inspection Division, a position that was considered a prerequisite for advancement at the FBI. In this position, Hanssen traveled to FBI field offices to help rate their overall performance. In June 1991, Hanssen became a program manager in the Soviet Section at FBI Headquarters, where he supervised operational programs designed to counter Soviet efforts to acquire scientific and technical information. This assignment was brief and uneventful. In January 1992, Hanssen became chief of the National Security Threat List (NSTL) Unit, a new unit at FBI Headquarters that dealt with economic espionage, theft of trade secrets and critical technologies, and nuclear proliferation. This position required significant management skills and an ability to work effectively with the FBI's field offices, and Hanssen's deficiencies in these areas quickly became apparent. Hanssen's subordinates found him disinterested in the Unit's work and were frustrated by his failure to provide guidance and direction. Rather than engage in the daily work of the Unit, Hanssen frequently sat in his office listening to foreign language tapes for hours at a time. Hanssen also had poor relations with the FBI's field offices, which complained that he rejected an inordinately high percentage of their proposals for investigations. While in the NSTL Unit, Hanssen committed two serious and flagrant security breaches. First, he hacked into the FBI's computer system and accessed highly sensitive Soviet counterintelligence documents located on the hard drives of his colleagues and supervisors in the National Security Division. Hanssen grew nervous about what he had done and decided to report it to FBI management in the guise of revealing a flaw in the FBI's computer security. Hanssen's ruse succeeded, and no one questioned his breach of computer security. Hanssen's second significant breach occurred when, in direct contravention of a decision made by FBI management, he disclosed to the British intelligence service information about a highly sensitive FBI investigation. At about this time, Hanssen also came under investigation by the FBI's Office of Professional Responsibility because of a physical altercation with a female FBI support employee. The investigation resulted in a letter of censure and a five-day suspension. The physical altercation, the improper disclosure to British intelligence, and Hanssen's poor performance in the NSTL Unit doomed his chances for further advancement at the Bureau. As part of an FBI-wide program in which Headquarters personnel were reassigned to FBI field offices, Hanssen was involuntarily removed from his position as NSTL Unit Chief in April 1994 and transferred to the FBI's Washington Field Office (WFO), where he was assigned to a computer squad in a non-supervisory capacity. While not an official demotion, Hanssen was no longer on the management track for higher supervisory positions at the Bureau. Hanssen largely ignored his new assignment in the field office and soon began seeking work at FBI Headquarters. For several months, Hanssen worked on computer-related projects for senior NSD officials. In late 1994, FBI management began considering Hanssen as a candidate to fill an FBI position in the Office of Foreign Missions (OFM) at the State Department. OFM regulates selected activities of foreign missions in the United States to protect U.S. foreign policy and national security interests, and also helps foreign missions protect their diplomats and facilities. Hanssen's FBI superiors saw the OFM liaison position as a good "out of the mainstream" job for Hanssen, a supervisory agent who had proven incapable of supervising others. Hanssen started at OFM in February 1995 and remained at the State Department for the next six years. Hanssen's work responsibilities at OFM consumed no more than a few hours a day, and he was wholly unsupervised by either State Department or FBI personnel. The job carried no significant operational or managerial responsibilities, and once Hanssen was at OFM, FBI management largely forgot about him. No one checked on him or his work - or even ensured that he was at work. No performance evaluations concerning Hanssen were completed during the entire six years that he served at OFM. Hanssen took full advantage of the light workload and complete lack of supervision, spending hours each day out of the office, surfing the Internet and watching movies on his personal laptop computer, and visiting friends and acquaintances. During Hanssen's detail to the State Department, the FBI provided him with a desktop computer that was connected to the FBI's ACS computer system. The ACS system gave Hanssen access to thousands of internal FBI classified documents for which he had no "need to know." To determine whether he was under investigation by the FBI, Hanssen also frequently searched the ACS system for references to his own name and address. In addition, he successfully mined the system for information concerning the FBI's most sensitive espionage investigations. While the ACS system had audit capability, Hanssen's improper searches went undetected because the FBI did not conduct audit trail reviews absent an allegation of wrongdoing. Hanssen continued to commit security violations while at the State Department. He improperly disclosed classified information to others - including NSA and State Department employees, close friends, and members of the press. Hanssen's most egregious security breach at OFM - an attempt to install password breaker software on his FBI computer - was discovered by the FBI's computer specialists, who documented the incident and referred it to the FBI's Security Programs Manager. Hanssen told the Security Programs Manager that he had installed the hacking program in order to connect to a color printer, however, and he suffered no negative consequences as a result of this misconduct. As with Hanssen's other security violations, nothing about the matter was recorded in either his personnel or security file. In late 2000, after the FBI received information identifying Hanssen as a Russian mole, the FBI offered him a Senior Executive Service position at FBI Headquarters, where he could be closely monitored. Hanssen was arrested on February 18, 2001. B.Hanssen's Espionage Hanssen was the most damaging spy in FBI history, and he betrayed some of this nation's most important counterintelligence and military secrets, including the identities of dozens of human assets, at least three of whom were executed. Hanssen committed espionage intermittently, starting and stopping several times during his 25-year FBI career. He engaged in three discrete periods of espionage - 1979-81, 1985-91, and 1999-2001 - and unsuccessfully attempted to renew his espionage on behalf of the GRU in 1993. The reasons why Hanssen initially began committing espionage, and repeatedly returned to it, are complex and, as we explain below, changed over time. Many of the factors that have motivated or influenced traitors in the past - such as greed, ideology, career disappointments and resentment, and drug and alcohol abuse - do not apply to Hanssen or do not fully explain his conduct. Our review of the Hanssen case revealed that there was essentially no deterrence to espionage at the FBI during the 1979 to 2001 time period and that the FBI's personnel and information security programs presented few obstacles to Hanssen's espionage. His removal of hundreds of classified documents from the FBI - including original and numbered Top Secret documents - and improper searches of the Bureau's computer system for references to himself and to the Bureau's most sensitive espionage investigations went unnoticed. Because of lax supervision, Hanssen felt free to conduct many of his espionage-related activities while on duty, including creating encryption devices for communicating with the Russians, servicing dead drops, and counting his cash payments from the Russians. These deficiencies in deterrence, detection, and supervision played a major role in Hanssen's willingness and ability to commit espionage over a more than 20-year period. 1.First Period of Espionage: 1979 - 1981 Hanssen first began spying for the Soviets in November 1979, just eight months after he transferred to a counterintelligence squad in the FBI's New York Office. While on duty, Hanssen volunteered his services to the GRU by delivering a package to a GRU officer at a Soviet trade organization. In his correspondence with the GRU, Hanssen revealed that he was an FBI agent, but offered no other identifying information. Over the next year and a half, Hanssen conducted clandestine exchanges with the GRU, receiving cash payments totaling at least $21,000. Hanssen's initial decision to commit espionage arose from a complex blend of factors, including low self-esteem and a desire to demonstrate intellectual superiority, a lack of conventional moral restraints, a feeling that he was above the law, a lifelong fascination with espionage and its trappings and a desire to become a "player" in that world, the financial rewards he would receive, and the lack of deterrence - a conviction that he could "get away with it." We believe that the personality flaws and background that Hanssen brought with him into the FBI likely played a more significant role in his decision to commit espionage than anything that happened to him after he became an agent. Hanssen's first period of espionage ended in the spring of 1981, when his wife Bonnie inadvertently discovered him reviewing a GRU communication in the basement of their home. Although Hanssen minimized his espionage in discussions with his wife, he says that he confessed his espionage to an Opus Dei priest within days of Bonnie's discovery. According to Hanssen, the priest granted him absolution and told him that he did not have to turn himself in, but suggested that he donate the money he had received from the GRU to charity. Hanssen said that he broke off contact with the GRU and made multiple $1,000 donations to Mother Teresa's "Little Sisters of the Poor." The most significant information that Hanssen passed during this period concerned the identity of a long-time FBI asset in the GRU. Hanssen's first period of espionage was less damaging to the U.S. intelligence effort than his next two periods of espionage. 2.Second Period of Espionage: 1985 - 1991 Hanssen remained a dormant spy from 1981 until October 1985, when he volunteered to the KGB, the Soviet Union's principal intelligence service. In his letter to the KGB's Washington Residency, Hanssen was careful to maintain his anonymity and did not disclose his prior espionage on behalf of the GRU. Using the alias "Ramon" or "Ramon Garcia," Hanssen provided the KGB with information concerning the Intelligence Community's most important Soviet counterintelligence and military secrets, much of which he had learned while assigned to the Soviet Analytical Unit. Although Hanssen was working in New York from September 1985 to August 1987, all of his operational espionage activity during this period took place in the Washington area. According to Hanssen, he chose to volunteer to the KGB because he believed it was more professional, had a longer-term outlook, and paid more money than the GRU. We believe that Hanssen's decision to resume espionage was motivated by many of the same factors at play in 1979. His obsession with espionage (which he referred to as an "addiction"), his lack of self-esteem and desire for recognition, his belief that he could commit espionage without being detected, and the lack of effective deterrence all played a role. The fact that Hanssen had done it before made it easier for him to do it again. Hanssen's return to espionage also was likely fueled by his knowledge that he had successfully evaded detection in the past and was in a position to demand a large payment from the Russians for the highly sensitive information he had obtained in the Soviet Analytical Unit. During the next six years - the last stages of the Cold War - Hanssen delivered thousands of pages of highly classified documents and dozens of computer disks to the KGB detailing U.S. strategies in the event of nuclear war, major developments in military weapons technologies, identities of active and historical U.S. assets in the Soviet intelligence services, the locations of KGB defectors in the United States, analytical products from across the Intelligence Community, comprehensive budget and policy documents, and many other aspects of the Soviet counterintelligence program. He passed some of the most damaging information within his first two months of espionage, including the true names of the FBI's most significant Soviet sources at the time, KGB officers Sergey Motorin and Valeriy Martynov. Other significant operations that Hanssen compromised during this period included the FBI's espionage investigation of Felix Bloch, a senior State Department official suspected of providing information to the KGB, and an FBI analytical report regarding possible Soviet penetrations. Toward the end of Hanssen's second period of espionage, he became increasingly careless, passing documents that clearly marked him as an FBI employee. For example, when he was assigned to the Inspection Division, he gave the KGB FBI inspection reports and documents that he took from field offices while on inspection assignments. Hanssen also compromised Foreign Intelligence Surveillance Act (FISA) wiretap applications prepared by the FBI. In a particularly reckless move, Hanssen suggested to the KGB that it attempt to recruit Jack Hoschouer, Hanssen's closest friend, who was then serving as a military attachÈ at the U.S. Embassy in Bonn. Hanssen's second period of espionage contributed to the execution of at least three human sources - including Motorin and Martynov - and caused hundreds of millions of dollars worth of damage to U.S. intelligence programs. In return, the KGB gave Hanssen cash payments of at least $500,000, as well as three diamonds. He stored the cash, as much as $100,000 at a time, in a gym bag in his bedroom closet. He also deposited large amounts of the KGB's money into a passbook savings account in his own name at a bank located a block from FBI Headquarters. While Hanssen has not accounted for much of the money he received from the KGB, it is clear that he spent some of it on an addition to his home, cars, tuition payments for his children's private schools, gifts, a loan to his brother-in-law, and at strip clubs. In late 1989, Hanssen began a year-long relationship with a stripper, Pricillia Sue Galey. Hanssen paid for Galey to accompany him on an FBI Inspection Division trip to Hong Kong, bought her a Mercedes Benz, provided her with an American Express card, and gave her jewels, cash, and other gifts. In August 1990, Hanssen's brother-in-law, FBI Special Agent Mark Wauck, heard that Hanssen's wife Bonnie had found $5,000 in unexplained cash in Hanssen's dresser drawer. Wauck reported this and other incidents he found suspicious to a supervisor in the FBI's Chicago Field Office. Although Wauck and the supervisor now have significantly different recollections of their conversation, we believe that Wauck provided the supervisor with enough information to warrant some follow up. Instead, the supervisor readily dismissed Wauck's concerns, in part because there was no policy or procedure mandating that he pass the information on for analysis and possible investigation. This incident highlights deficiencies in the FBI's protocol for the receipt and investigation of derogatory information about an agent. There was no standard procedure for reporting and collecting such information, nor was there a central repository at the FBI responsible for collecting this information. After picking up a $12,000 KGB payment in December 1991, Hanssen again broke off contact with the Soviets. Hanssen told us that he took this action because of his increasing guilt and after confessing his espionage to Catholic priests. We are skeptical of this explanation, however, because Hanssen's decision to halt his espionage coincided with the fall of the Soviet Union, as well as with the initiation of a new FBI/CIA molehunt effort that Hanssen knew about. Both events increased the risk that Hanssen's espionage would be detected or disclosed. 3.Unsuccessful Approach to the GRU: 1993 A year and a half after breaking off contact with the KGB in late 1991, Hanssen made an awkward and unsuccessful attempt to reestablish contact with the GRU. The risks Hanssen took in approaching the GRU in 1993 far outweighed any he had taken during his first two periods of espionage. In July 1993, Hanssen approached a GRU officer in the garage of the officer's apartment building. Hanssen identified himself as an FBI agent, explained that he had worked for the KGB under the name Ramon Garcia, and tried to give the officer a package containing summaries of double agent cases that the FBI was running against the GRU. The GRU officer refused to accept the package, and then reported the approach to his superiors. The Russians filed a protest with the U.S. government - apparently believing that the approach had been an officially sanctioned provocation - and the FBI opened an investigation. Although Hanssen's approach to the GRU officer was reckless in a variety of ways, the FBI's investigation of this incident - which Hanssen monitored through the FBI's computer system - was unsuccessful. Hanssen claimed that two factors motivated this approach to the GRU. First, he wanted an explanation as to why the GRU was still running double agent cases that he had previously compromised to the KGB. Second, he "felt pity" for the GRU and wanted to ensure that it knew which of its sources were actually double agents. Although Hanssen denied that this approach was motivated by a need for money, he sought funds from a wide variety of sources at about this time. Indeed, the day of the failed approach, Hanssen asked his mother for $10,000. In addition, even though Hanssen made this approach the day after his father died, he claimed not to remember the proximity of these two events during his debriefings and OIG interviews. Hanssen's 1993 approach to the GRU was remarkable for its recklessness and self-destructive quality. Unlike his prior periods of espionage, Hanssen had face-to-face contact with a Russian intelligence officer, asked other FBI employees to conduct computer searches concerning this officer, and demonstrated virtually no regard for his personal security. Hanssen told the OIG that when the approach failed, it "shocked [him] back out of that mental state." 4.Third Period of Espionage: 1999 - 2001 In 1999, Hanssen revolunteered to the KGB. Over the next two years, Hanssen provided the Russians with information concerning some of the FBI's most significant KGB sources and most sensitive espionage investigations. Hanssen had obtained most of this information from improper searches of the FBI's ACS computer system. As with his second period of espionage, Hanssen used the pseudonym "Ramon Garcia" and communicated through dead drop exchanges, but passed many documents that were unmistakably FBI products. Hanssen's decision to resume espionage in 1999 was driven by two factors: (1) his discovery - through the ACS system - of the FBI's effort to identify a significant KGB mole believed to be a CIA officer; and (2) his deteriorating finances. While searching the ACS system in the spring of 1999, Hanssen stumbled upon the FBI's most significant ongoing Russian espionage investigation. This case was a search for the KGB mole who turned out to be Hanssen. At the time, however, the FBI's investigation was focused on a CIA officer. Although the FBI did not intend for documents related to this highly sensitive investigation to be uploaded into the ACS system - because of widespread concerns about the system's security - many such documents were uploaded due to failures in training, simple human error, and insufficient concern about maintaining operational security. Within a day of discovering the existence of the investigation, Hanssen obtained the CIA suspect's true name. Hanssen decided to warn the KGB about the investigation and thereby "save" the CIA suspect. Hanssen also stated that the case offered him all of the "excitement" and "stimulation" from espionage that he craved. At the same time, Hanssen's financial situation was the worst it had ever been. Although Hanssen was close to the top of the FBI pay scale, his spending continually outstripped his income. He had significant credit card debts, car loans, bank loans, and tuition payments for his children. While Hanssen's mother had previously supplemented his income, giving him more than $94,000 in the mid-1990s, she told Hanssen in 1997 that she was running out of money. Hanssen claimed that he set a goal of obtaining approximately $100,000 from the KGB, believing that this amount would stabilize his finances, at least until he retired from the FBI and entered the private sector. When Hanssen reestablished contact with the KGB in July 1999, he did so as "Ramon Garcia." Hanssen indicated that he needed money and provided a communications plan using a drop site from his second period of espionage. In August 1999, the KGB paid Hanssen $50,000. Over the next year, Hanssen made several attempts to pass information through dead drop exchanges, but the KGB failed to retrieve his packages. Accordingly, Hanssen resorted to mailing the KGB a disk and a letter which provided the true names of several individuals under investigation for espionage, as well as information concerning two FBI assets in the Russian intelligence services and two significant FBI technical operations. Hanssen's last successful dead drop exchange occurred in November 2000, when he gave the KGB a large stack of classified documents from the ACS system that he had been collecting for over a year. In late 2000, the FBI identified Hanssen as a spy and lured him back to FBI Headquarters - where he could be more easily monitored - with the offer of a temporary Senior Executive Service position involving computer security. Hanssen began his new position on January 13, 2001. On February 12, 2001, the FBI discovered a package containing $50,000 that the KGB had left for Hanssen in a dead drop site. Six days later, on February 18, 2001, after Hanssen had left a package for the KGB in a different dead drop site, he was arrested and charged with espionage offenses. Although Hanssen escaped detection for more than 20 years, this was not because he was a "master spy." While Hanssen took some important steps to maintain his security - such as refusing to reveal his identity to his Russian handlers - and used his knowledge of the FBI's counterintelligence practices and poor internal security to his advantage, much of Hanssen's conduct when committing espionage was reckless. For example, Hanssen (1) set up an FBI camera on a drop site he used for exchanges with the GRU during his first period of espionage; (2) used an FBI telephone line and answering machine for communications with the KGB in 1986; (3) deposited much of the KGB's cash directly into a passbook savings account in his name in the late 1980s; (4) suggested to his Russian handlers in 1991 that they attempt to recruit Jack Hoschouer, his best friend; (5) directly approached a GRU officer in 1993 and revealed that he was an FBI agent who had previously committed espionage for the KGB - an approach that led to a diplomatic protest from the Russians and an FBI investigation that could have identified Hanssen as a mole; and (6) searched the FBI's computer system, during his last period of espionage, for references to his own name, address, and drop and signal sites - conduct that would have been difficult to explain if the FBI had utilized the computer system's audit feature. In sum, Hanssen escaped detection not because he was extraordinarily clever and crafty, but because of longstanding systemic problems in the FBI's counterintelligence program and a deeply flawed FBI internal security program. C.FBI Analytical and Investigative Penetration Efforts: 1978 - 2001 The FBI's penetration efforts in the late 1970s and 1980s suffered from a lack of cooperation with the CIA and from inattention on the part of senior management. In 1985 and 1986, the CIA and FBI lost nearly every significant human asset then operating against the Soviet Union. These losses were unprecedented in scope, quantity, significance, and timing, yet the FBI undertook no sustained effort to determine their cause. Senior management was almost entirely unaware of the scope and significance of these losses, and throughout the 1980s the FBI failed to work cooperatively with the CIA to resolve the cause of these losses or to thoroughly investigate whether an FBI mole could be responsible for these setbacks. We now know that Hanssen compromised many of the assets and operations lost during the mid-1980s. The early 1990s saw significant improvement in FBI/CIA cooperation, with the two agencies undertaking a joint investigation concerning the cause of the 1985-86 asset losses. The FBI drastically increased the number of squads and personnel devoted to espionage investigations, and the FBI's senior management took a much more active role in supervising penetration investigations. The energized penetration efforts led to successful espionage prosecutions of CIA officers Aldrich Ames and Harold Nicholson, FBI Special Agent Earl Pitts, and NSA detailee David Boone. While the FBI worked closely with the CIA's Special Investigations Unit (SIU) on most of these cases, the SIU was not an equal partner. The FBI's failure to keep the CIA apprised of information concerning non-CIA espionage investigations - such as the case involving FBI agent Earl Pitts - undermined the effort to identify Hanssen. In attempting to identify the mole who turned out to be Hanssen, the FBI intensively pursued a CIA suspect. This investigation culminated in the submission of a report to the Justice Department that appeared to seek the prosecution of that CIA suspect, despite the fact that some senior FBI managers had serious reservations about the conclusions of the report and doubted whether the officer - who has since been exonerated by the FBI - was the correct target. Although the FBI pursued penetration leads in the 1990s that we now know related to Hanssen, he received no investigative scrutiny until late 2000. Indeed, the FBI never opened even a preliminary inquiry on any FBI employee in connection with the search for the mole ultimately identified as Hanssen. This was true even though the FBI had access to information suggesting that the mole might be an FBI employee, and believed that the mole had compromised certain FBI assets and operations. Longstanding systemic problems in the FBI's counterintelligence program played an important role in the FBI's failure to uncover Hanssen. Most importantly, the FBI demonstrated a reluctance to consider itself as a possible source for a penetration in the absence of leads identifying a specific FBI target. Thus, the FBI maintained a focus on the CIA as the mole's employer despite information indicating that the mole might be an FBI employee. Ineffective oversight by FBI management and poor coordination with the Justice Department also contributed to the length of the FBI's investigation of the wrong suspect and the failure to pursue alternative avenues. The FBI managers with supervisory authority over the investigation often deferred to line personnel - even when the managers harbored serious doubts about the progress of the investigation - resulting in a tacit endorsement of erroneous analysis and conclusions. This problem was compounded by the FBI's poor coordination with the Justice Department components responsible for overseeing intelligence investigations - the Office of Intelligence Policy and Review (OIPR) and the Criminal Division's Internal Security Section (ISS). Because the FBI did not provide the Justice Department with complete information about its investigation - omitting crucial information about weaknesses in proof and investigative setbacks - the Justice Department could not properly evaluate the strength of the FBI's case against the CIA suspect. 1.Ad Hoc Analytical and Investigative Efforts from the 1970s to 1993 In the 1970s and early 1980s, the FBI investigated several source reports of Soviet penetrations of the FBI and CIA. None of the leads from this time period appears to have any connection to Hanssen's espionage. In the 1980s and early 1990s, the FBI's response to learning that an important FBI Soviet asset was compromised or to receiving information indicating that a human penetration was at work was often to create an ad hoc team to examine the issue. These efforts were typically analytical rather than investigative. While each study considered the possibility of an FBI mole, none involved an actual investigation of this issue, and none resulted in an investigation being opened on a specific FBI employee. Likewise, none of these efforts concluded that a penetration of the FBI was responsible for the ongoing compromises that the FBI's Soviet program experienced from the mid-1980s to early 1990s. In late 1986, the FBI learned that its two most significant Soviet assets - KGB officers Motorin and Martynov - had been arrested for espionage within the previous year. This appears to be the first notice the FBI received concerning compromises attributable to Hanssen, who we now know compromised both assets in October 1985, confirming information that CIA officer Aldrich Ames had provided to the KGB in June 1985. After learning that its two most important KGB assets had been arrested, the FBI formed a six-person task force to determine how they had been compromised and whether an FBI mole was responsible. In the course of its review, the Task Force discovered that because of poor document controls and violations of the "need to know" principle it was impossible to determine who within the FBI had had access to the Motorin and Martynov cases. Accordingly, no FBI employee with knowledge of these assets was investigated. Nonetheless, in September 1987 the Task Force issued a final report stating that there was no evidence of a Soviet spy in the FBI. The Task Force, however, did not resolve how the assets had been compromised. During the Task Force effort, the FBI learned that the CIA had likewise suffered catastrophic and unprecedented losses in its Soviet program. Yet, the FBI failed to work cooperatively with the CIA to resolve the cause of these losses. Between 1987 and 1991, the FBI suffered continuing losses of Soviet human assets and technical operations that it could not explain. During this period, the FBI conducted two analytical studies that considered the penetration issue, but neither study led the FBI to investigate the possibility of an FBI mole. The first study was a two-year effort aimed at resolving historical allegations of an FBI penetration. The project proceeded chronologically, and by late 1988 the team had analyzed leads only from the 1950s and 1960s. In an interim report, the team concluded that two penetrations of the FBI existed before 1964, but the team never reached the time period relevant to the FBI's more recent and unprecedented losses. The project was abandoned in the summer of 1989. The second study systematically examined more than 50 FBI operations that had been compromised since 1986, including human assets, technical operations, double agent programs, and recruitment operations. The final report, issued in November 1988, described the continuing, across-the-board problems within the FBI's Soviet operations, but was equivocal with respect to the possibility of an FBI mole. The report suggested that a CIA penetration was a more likely explanation for the FBI's losses. We now know that Hanssen compromised most of the significant operations discussed in the report. In 1991, the FBI and the CIA formed the SIU, which was directed to analyze the numerous FBI and CIA cases lost after 1985 and to prepare a list of suspects who could account for the losses. Simultaneously, the FBI created a new investigative squad at WFO to pursue investigative leads generated by the SIU and, in the meantime, to reanalyze many of the same FBI compromises and penetration leads considered during the FBI's earlier analytical efforts. By the end of 1992, after reviewing numerous FBI and CIA historical compromises without any investigative progress, the squad began to disband while awaiting new leads from the SIU. While the SIU obtained compelling evidence that CIA officer Aldrich Ames was a Russian mole and was likely responsible for many of the compromises at issue, the team's March 1993 final report merely stated that there was a KGB penetration in the CIA who began his espionage in 1985. The report failed to highlight Ames as a suspect worthy of special investigative attention. Instead, Ames was presented simply as one of 40 CIA employees who had access to the Soviet operations compromised in the 1985-86 period. The report did not include a comparable list of FBI employees. Although the SIU's final report raised the possibility of a KGB penetration of the FBI, the team did not undertake or recommend any meaningful action concerning this possibility. 2.Penetration Investigations and the Search for Hanssen: 1993 - 2001 The years between 1993 and 2001 marked one of the most active and productive periods for espionage investigations in the FBI's history. The FBI greatly expanded its counterespionage effort and successfully apprehended a number of significant Russian spies. This period was dominated, however, by the search for a KGB mole who was reportedly more damaging than Ames. The FBI poured enormous resources into this search. The FBI believed early on, however, that the mole was a CIA employee and did not change that view. We now know that the FBI was on the wrong track from the beginning, because the mole the FBI was looking for was Hanssen, an FBI employee. As the investigation unfolded, the FBI focused on a specific CIA employee. Given the information it had at the time, the FBI's initial selection of this CIA employee as the lead suspect was understandable. Although an extensive investigation of this CIA suspect failed to yield any conclusive evidence of espionage, the FBI became convinced that he was a KGB mole. This was due in part to the suspect's ambiguous and sometimes suspicious behavior and in part to a belief that this individual had emerged as the lead suspect as the result of an objective and scientific process. Despite its lack of success in the investigation, the FBI, in a 70-page Investigative Report, informed the Justice Department that the CIA suspect was a significant KGB mole, and sought an opinion as to whether he could be prosecuted for espionage. The FBI should have seriously questioned its conclusion that the CIA suspect was a KGB spy and considered opening different lines of investigation. The squad responsible for the case, however, was so committed to the belief that the CIA suspect was a mole that it lost a measure of objectivity and failed to give adequate consideration to other possibilities. In addition, while FBI management pressed for the investigation to be completed, it did not question the factual premises underlying it. Similarly, the CIA's SIU did not serve as an effective counterbalance to the FBI, because it was not an equal partner in the molehunt. The supervisory failures in connection with the espionage investigation of the CIA suspect are most apparent in the context of the Investigative Report that the FBI presented to the Justice Department. Although several senior FBI managers had serious doubts that the CIA suspect was the correct target, and expected the Justice Department to decline prosecution for a lack of evidence, the Investigative Report was written as if the FBI had no doubt that the CIA suspect was a KGB mole who was the most damaging spy since Ames. Fortunately, the Justice Department never brought charges against the CIA suspect, because while prosecutors were reviewing the case the FBI determined that Hanssen was in fact the KGB mole. In late 2000, the FBI opened an investigation of Hanssen, and on February 18, 2001, he was arrested for espionage. The FBI later exonerated the CIA suspect. IV.Summary of the FBI's Security Programs During Hanssen's Career The Hanssen case highlighted significant, longstanding deficiencies in the FBI's internal security program, many of which were brought to the attention of FBI management over the years but were not corrected. Historically, the FBI has not been in compliance with Executive Orders, Justice Department regulations, and Intelligence Community standards regarding internal security. Although we found that the FBI has taken many important steps to improve its internal security program since Hanssen's arrest - including the implementation of a counterintelligence-focused polygraph examination program, the development of a financial disclosure program, and the creation of a Security Division - some of the most serious weaknesses still have not been fully remedied. These weaknesses expose the FBI to the risk of future serious compromises by another mole. Before Hanssen's arrest, the FBI's security program was based on trust. Rather than taking the sort of proactive steps adopted by other Intelligence Community components - such as requiring regular counterintelligence polygraph examinations, financial disclosures, and meaningful background reinvestigations, and utilizing audit functions regarding computer usage - the FBI trusted that its employees would remain loyal throughout their careers. The Hanssen case shows the danger of that approach. In our review, we observed serious deficiencies in nearly every aspect of the FBI's internal security program, from personnel security, to computer security, document security, and security training and compliance. These deficiencies led to the absence of effective deterrence to espionage at the FBI and undermined the FBI's ability to detect an FBI mole. Moreover, the absence of deterrence played a significant role in Hanssen's decision to commit espionage. As he explained during debriefings: "[I]f I had thought that the risk of detection was very great, I would never have done it." Hanssen also exploited many of these weaknesses - particularly in document and computer security - to pass sensitive information to the KGB. With respect to personnel security, Hanssen was never subject to a wide variety of basic security techniques and procedures that could have deterred or perhaps uncovered his espionage. For example, Hanssen was never asked to submit to a polygraph examination during his 25-year FBI career, despite his extraordinarily broad access to extremely sensitive human and technical intelligence information from across the Intelligence Community. After Ames's 1994 arrest, FBI National Security Division managers argued for an aperiodic, random polygraph program, but the FBI's most senior management rejected that request, largely because of concerns regarding false positives. Hanssen's arrest in 2001 finally prodded the FBI to make a polygraph examination part of the standard five-year background reinvestigation. According to the FBI, by June 2003 it had also expanded its polygraph program by implementing aperiodic, random polygraph examinations. Hanssen likewise was never asked to complete a detailed financial disclosure form during his FBI career. During our interviews, Hanssen identified meaningful financial disclosure as the security technique that would have provided the greatest deterrence to his espionage. As it was, Hanssen felt comfortable depositing thousands of dollars of the KGB's cash in a passbook savings account - listed in his own name - at a bank located a block away from FBI Headquarters. He also safely invented stories about family wealth and successful investments to explain his spending. The FBI reported in July 2003 that a financial disclosure program "will be implemented within the next month." Given that financial gain is often an important motive for committing espionage, developing a credible financial disclosure program is a critical element in improving the FBI's personnel security with respect to both deterrence and detection. Hanssen received his first - and only - background reinvestigation in 1996, 20 years after he had joined the FBI. The FBI has conceded that a number of "red flags" emerged during Hanssen's reinvestigation that were not resolved. The FBI's perfunctory background reinvestigation of Hanssen was not atypical, however. The system in place for background reinvestigations discouraged thoroughness. The principal investigators were not given access to the necessary source materials, such as the employee's personnel file, security file, and credit reports, and they primarily interviewed references supplied by the employee. They did not interview the employee. Moreover, the principal investigators merely collected information; they were not required to provide analysis or to make investigative recommendations. As a result, information developed through background reinvestigations received little analysis. In committing espionage, Hanssen exploited serious weaknesses in the FBI's document and information security. His access to classified national security information - for both hard copies and computer files - was subject to little control or monitoring throughout his FBI career. As a result, he walked out of the FBI with copies and originals of some of the U.S. government's most sensitive classified material - including numbered Top Secret documents - with little fear of being stopped or detected. The FBI's inability to account for its most sensitive documents and failure to limit this information to those with a "need to know" has been noted both by the OIG and by the FBI's internal reviews in the past, but remains uncorrected. This deficiency is significant with respect to both deterrence and detection, because the FBI's inability to account for its most sensitive documents makes an access-based investigation for an FBI mole extremely difficult to pursue. The starting point for any such investigation is a list of those employees who had access to a compromised operation; at the FBI, that determination is often impossible to make. During his last period of espionage, Hanssen used the FBI's ACS computer system to track the FBI's most sensitive espionage investigations - including the investigation that was looking for him. Hanssen also routinely searched the system for references to his own name and home address, and to the signal and drop sites that he used, to assure himself that he was not under investigation. Hanssen conducted thousands of searches for highly sensitive information that he had no conceivable "need to know," without fear that a computer audit would reveal his misconduct. As with his record of cash deposits, it would have been difficult for Hanssen to invent an innocent explanation for his repeated searches regarding his name, address, and signal and drop sites. Even more significantly, an audit of Hanssen's ACS activity would have identified him as someone worthy of investigation. The serious security flaws in the FBI's ACS system - which have been discussed in prior OIG reviews and internal FBI inspection reports - have been apparent since the system's inception in 1995, but have not been remedied. Access restrictions are subject to ready override by Headquarters personnel who, like Hanssen, have no "need to know" about the sensitive operations the access restrictions are designed to protect. The system is likewise prone to human error, with documents concerning highly sensitive operations - such as the Hanssen investigation - being made available to any curious user because of improper uploading or inadequate restriction codes. The ACS system's audit function, mandated by Justice Department regulations and a principal tool against unauthorized usage as well as espionage, was rarely utilized before Hanssen's arrest. Today, more than two years after Hanssen's arrest, the ACS system remains insecure and vulnerable to misuse. The current audit program relies on case agent review rather than third-party auditing. Moreover, the program has only retroactive effect; case agents do not receive real-time notice when someone seeks unauthorized access to their cases. The "need to know" principle is not adequately applied in the computer context within the Counterintelligence Division; all Headquarters Counterintelligence Division agents have access to all cases in the Division whether or not their section or unit is connected to the case. Finally, the system's susceptibility to human error has not been remedied. In response to the OIG's findings regarding the ACS system, the FBI reported in July 2003 that "attempting technical changes to improve ACS security would not be a smart business decision" in light of plans to implement a new automated case system known as the Virtual Case File (VCF). The FBI stated that the first delivery of VCF is scheduled for December 2003. In developing and implementing VCF, it is vital for the FBI to rectify the types of security flaws that have been evident in the ACS system for many years. The FBI's lax approach to personnel and information security also was apparent in its handling of security violations. Hanssen's career was replete with security breaches, none of which were documented in his personnel or security file or (with one exception) reported to the FBI's Office of Professional Responsibility, the Security Programs Manager, the NSD's Security Countermeasures Section, the Justice Department Security Officer, or any other central location for review and consideration of appropriate disciplinary action. While these security breaches did not necessarily show that Hanssen was engaged in, or was predisposed to engage in, espionage, they demonstrated that he was unfit to have access to sensitive information. Our review revealed unwillingness within the FBI to report security violations and take them seriously, even when highly sensitive information was involved. The Hanssen case also highlighted the absence of a centralized reporting program for security violations at the FBI, as well as the absence of a unit at FBI Headquarters responsible for collecting derogatory information concerning FBI employees, particularly in the counterintelligence context. In July 2003, the FBI reported that a security incident program had been instituted that will be managed by a new Security Compliance Unit. According to the FBI, the Security Division and the Counterintelligence Division will meet on a monthly basis to discuss counterintelligence-related issues. Many of the security issues that emerged from our review of the Hanssen case stem from deficiencies in training. For example, FBI personnel specialists responsible for employee background reinvestigations did not have the necessary analytical training to assess issues that commonly arise during background investigations. FBI employees using the ACS system did not have sufficient knowledge and training to use the security controls that were built into the system to regulate access to sensitive cases. FBI employees were not knowledgeable regarding the requirements for handling classified materials, particularly at the Sensitive Compartmented Information (SCI) level. And employees and supervisors were not properly trained in how to report and document security violations. We believe that the FBI will not see significant improvement in its internal security until its employees are better trained on security issues. In sum, the absence of adequate security controls at the FBI made espionage too easy for Hanssen to commit. Because of inadequate document security, he felt comfortable removing thousands of pages of classified documents from FBI offices. Because of lax controls over even the most sensitive information and violations of the "need to know" principle, he knew that he could compromise the FBI's most important Soviet/Russian assets and operations with little risk that the loss of these cases would be traced to him. Because of inadequate computer security, he felt free to conduct thousands of searches on the ACS system for references to himself and for information concerning the FBI's most sensitive counterintelligence cases. Because of the absence of financial disclosure, he felt comfortable depositing thousands of dollars in espionage proceeds into his bank accounts. Because of the absence of polygraph examinations for onboard employees, he never had to confront the issue of what would happen when he failed polygraph questions aimed at determining whether he was or had ever been an agent of a foreign power. And because of a flawed and inadequate background reinvestigation program, he never had to fear that the FBI would uncover spending and other behavior inconsistent with his position at the FBI. The defects in the FBI's security program were the product of decades of neglect. Historically, FBI management did not allot sufficient resources to security and rejected internal recommendations - for example, in the polygraph area - to make necessary improvements to the program. As a consequence, following Hanssen's arrest, the FBI faced enormous challenges in the areas of personnel, computer, and document security. While the FBI has made progress in many of these areas, in others - particularly computer security - problems have not been fully remedied and significant work still needs to be done. The FBI's Security Division must receive appropriate resources and support to ensure that the security program is significantly improved. V.The Failure to Deter and Detect Hanssen's Espionage The FBI's failure to deter and detect Hanssen's espionage over a more than 20-year period cannot be attributed to any individual FBI employee or small group of FBI supervisors. In addition, it is important to note that the agents and analysts who conducted the FBI's penetration investigations were extremely dedicated and hard-working, and demonstrated an impressive commitment to the counterintelligence mission. Their work produced many successes. At the same time, we found overarching problems in the FBI's internal security efforts. Most of the deficiencies discussed in our report are of longstanding vintage and reflect the cumulative decisions of many FBI employees, including the Directors and senior managers who failed to remedy serious flaws in the FBI's personnel, document, and information security programs; the Directors and senior managers who failed to devote sufficient resources and attention to the penetration issue in the 1980s and early 1990s, and failed to resolve how important FBI human sources and operations had been compromised; the unwillingness of line personnel working on the espionage investigation of the CIA suspect to reconsider initial conclusions and judgments in the face of investigative failures, and senior managers' failure to insist that they be revisited; the failure of senior managers to ensure that accurate information was supplied to the Justice Department concerning the investigation of the CIA suspect; the supervisors and colleagues who ignored Hanssen's pattern of security violations and his obvious lack of suitability for handling sensitive information; and the managers who provided such lax supervision of Hanssen that he was able to spend much of his time on non-work related matters, or worse, committing espionage. These were widespread failings. We believe that what is needed at the FBI is a wholesale change in mindset and approach to internal security. The FBI must recognize and take steps to account for the fact that FBI employees have committed espionage in the past and will likely do so in the future. A unit at the FBI must be responsible for asking every day whether there is evidence that the FBI has been penetrated, and the FBI's internal security program must shift from a program relying on trust to a program based on deterrence and detection. The following 21 recommendations are concrete steps the FBI should take to improve its internal security and ability to deter and detect espionage in its midst. VI.Recommendations A.Improving the FBI's Performance in Detecting an FBI Penetration Recommendation No. 1: New Penetration Unit at FBI Headquarters A specialized permanent unit should be created within the Counterespionage Section at FBI Headquarters dedicated to determining whether the FBI has been penetrated. This Unit would be responsible for, among other things, analyzing relevant source information, resolving how compromised assets and operations were lost, and reviewing operations that lost their productivity or effectiveness for no apparent reason, all with a view towards determining whether the Bureau has been penetrated. Recommendation No. 2: Senior Operational Post for Intelligence Community Representative in FBI Counterespionage Section The FBI should create a senior operational position in the Counterespionage Section at FBI Headquarters that will be filled - on a rotating basis - by senior executives from the CIA and other components of the Intelligence Community. B.Improving Coordination with the Justice Department Recommendation No. 3: Criminal Division Involvement in Counterintelligence Investigations Department of Justice Criminal Division personnel should be full participants in counterintelligence investigations once suspicion has focused on a specific individual. Recommendation No. 4: More Substantive Role for OIPR Attorneys OIPR attorneys should have a larger oversight role in ensuring the accuracy and fairness of factual assertions in FISA applications and have direct access to the case agent and the source information relied on in the application. C.Improving Source Recruitment, Security, and Handling Recommendation No. 5: Greater Emphasis on and Resources for New Source Recruitment The FBI should place greater emphasis on and provide more resources for targeting and recruiting intelligence officers in hostile intelligence services who are likely to have knowledge of penetrations of the Intelligence Community. Recommendation No. 6: Stricter Standards for Handling and Tracking Sensitive Information from Significant Human Sources The FBI should adopt stricter standards for handling and tracking sensitive information from significant human sources and should enforce the "need to know" policy in disseminating information from such sources. The FBI should also adopt special handling techniques to better account for dissemination of such information. Recommendation No. 7: Guidelines for Handling Recruitments-in-Place/Defectors The FBI should adopt guidelines for handling active recruitments-in-place and recent defectors that, among other things, limit the disclosure of sensitive information, such as details of ongoing espionage investigations, to such individuals. D.Security Improvements Recommendation No. 8: Central Repository for Derogatory Information The FBI should create a central repository for the receipt, collection, storage, and analysis of derogatory information concerning FBI employees with access to sensitive information. This repository should be directly accessible to Counterespionage Section personnel responsible for determining whether the FBI has been penetrated. The FBI should mandate that information or allegations that reflect on the integrity, suitability, or trustworthiness of an employee be documented and transmitted to this central repository for analysis. The FBI should also train employees in recognizing the types of behavior that should be reported. Recommendation No. 9: Documentation of Security Violations The FBI should create policies and procedures designed to ensure that security violations are reported, documented in an employee's security file, and properly investigated and resolved. A database should be created to track security violations by employees and identify patterns and trends. The FBI should conduct regular security awareness training of its personnel, and this training should include clear instructions regarding the reporting of security violations. Recommendation No. 10: Meaningful Background Reinvestigations The FBI should adopt new procedures to ensure that background reinvestigations are thorough, meaningful, and timely. Responsibility for this program should be consolidated within the Security Division, and an automated case management system should be installed that captures, stores, and facilitates the analysis of personnel security information. Recommendation No. 11: Financial Disclosure The FBI should implement an annual, computer-based financial disclosure program for employees with access to sensitive information. The program - which should include disclosure of all accounts held by the employee and immediate family members in financial institutions - should be designed to detect unusual fluctuations in assets and cash flow as well as extraordinary levels of debt, and should involve both collection of information and analysis. Recommendation No. 12: Random Counterintelligence Polygraph Program The FBI should fully implement a counterintelligence polygraph program for employees with access to sensitive information and develop a counterintelligence polygraph program for non-FBI personnel who are given access to sensitive information. Recommendation No. 13: Enhanced Security Measures for FBI Employees with Unusually Broad Access to Sensitive Information The FBI should consider enhanced security measures - for example, more frequent polygraph examinations, more frequent and thorough background reinvestigations, and more detailed financial disclosures - for employees who enjoy unusually broad access to sensitive information. Recommendation No. 14: Detecting Improper Computer Usage and Enforcing "Need to Know" The FBI should implement measures to improve computer security, including (a) an audit program to detect and give notice of unauthorized access to sensitive cases on a real-time basis; (b) an audit program designed to detect whether employees or contractors are using the FBI's computer systems to determine whether they are under investigation; (c) procedures designed to enforce the "need to know" principle in the context of computer usage; and (d) a program designed to ensure that restricted information cannot be improperly accessed through the use of security overrides or other means. Recommendation No. 15: Tracking Classified Information The FBI should create and implement a program enabling it to account for and track hard copy documents and electronic media containing sensitive information. This program should also be designed to prevent the unauthorized removal of sensitive information from FBI facilities, either through the use of technology that "tags" classified documents and computer media or through other means. The FBI should likewise develop a program to prevent the improper copying of classified information. Recommendation No. 16: Security Compliance Program The FBI should implement a security inspection program that ensures that deficiencies in security are detected and remedied within a reasonable time. Compliance with recommendations from internal audits and inspection reviews, as well as from external oversight reviews, should be tracked and monitored until resolution. Recommendation No. 17: Improving Security Education and Awareness The FBI should make implementation of an FBI-wide security education and awareness program a top management priority. In addition, the FBI should track and regularly monitor the status of employee security training. E.Management and Administrative Improvements Recommendation No. 18: Exercise of Managerial Authority over Espionage Investigations FBI supervisors must guard against excessively deferring to line personnel when supervising significant espionage investigations and must ensure that the Department of Justice is properly briefed on the strengths and weaknesses of potential espionage prosecutions. Recommendation No. 19: Damage Assessments for FBI Spies Damage assessments concerning FBI employees who have committed significant acts of espionage should be led by experienced counterintelligence personnel and be conducted by an Intelligence Community entity, such as the National Counterintelligence Executive (NCIX). Recommendation No. 20: Recusal Procedures for FBI Employees The FBI should adopt written policies and procedures for recusal of FBI employees and supervisors who may be suspects in an espionage investigation. Recommendation No. 21: Supervision of FBI Detailees The FBI should ensure that FBI detailees serving in other Intelligence Community components and elsewhere are properly supervised and receive regular performance evaluations. August 2003 ------------------------------------------------------------------------ Glenn A. Fine Inspector General OIG Investigative Team Scott M. Barden Kevin F. Becks Paul G. Gardephe Stephen D. Kelly Mei Lin Kwan-Gett Jeffrey D. Long Jeffrey K. Vasey Dominic N. Russoli L. Susan Woodside -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "We have suffered a great loss. And in our grief and anger, we have found our mission and our moment...We will not waver, we will not tire, we will not falter and we will not fail!... George W. Bush 9/11/2001 -------------------------------------------------------------------------------------------------- 7672 From: Charles Patterson Date: Sat Aug 23, 2003 0:13pm Subject: Re: NY PI Conference/Seminar [Semper what?... comments on John McCann Hi Jim, >If any other list members have comments on this guy, please feel free >to post them to this list. >-jma Many on this list and most of the other tscmers on your Gold List know me personally and can vouch for my honesty and sincerity. I have found, especially in the TSCM business, that honesty is by far one of the most important virtues. Therefore I feel the need to add a response to your comments about John McCann. A little about my own background for those who don't know me. Before I began TSCM work on my own in 1995, I worked 18 years in executive protection, specializing in electronic and communications support. Along with the tech support for the ep team, I was responsible for overseeing the organization's PBX and T1 circuits. During those 18 years I came in contact with a number of tscm practitioners and saw the wide range of skill and lack of skill available. The tremendous lack of skill and knowlege, and need for better ethics that I saw in this field is what motivated me to get into TSCM on my own. As you know, Jim, I have been aquainted with John McCann since I first met him at an ASIS show in 1996. He lives a short distance from me and since we were interested in the same field we kept in contact fairly often. During the first few years after meeting him, I had the opportunity to work with John on many projects that included tscm sweeps, in-place monitoring, as well as executive protection assistance (communications). John, like many others on this list, has sought my assistance, particularly in the field of telephone communications, to help supplement their own knowledge and understanding. During this time, John's clients whom I met were often very well respected corporations and security agencies. He was always adamant about being sure his clients were NOT on the wrong side of the law. Your comments included a number of points that I cannot disagree with, yet there are other statements that I find to be inaccurate and some are, frankly, ridiculous. I know that he is a CFE (Certified Fraud Examiner), as he seems to spend more time doing auditing than sweeps these days. As far as Scotti school is concerned, a close friend of mine who is president of a guard agency in Manhattan attended one of Scotti's seminars on executive protection where John was one of the instructors. Thus while John may not be one of their regular driving instructors he has taught classes for them. It appears that some of his better skills may be in executive protection. I have met a number of local security personel who have received ep training from John and they all seem very happy with it. Technical knowledge? yes it's limited, but he keeps good contacts. When I first became aquainted with him, his sweep crew included two guys from local law enforcement and another who was the head of a local two way radio company. When he needed help with phones, that's when he would call me up. Most people cannot be masters of all technical areas, thus it seems appropriate to keep in touch with others who can help. I reguarly get calls from many on this list when they have questions about telephone systems or equipment. TSCM Gear? what I have seen at John's office is 3 spectrum analyzers, (two avcom and one 492P), 1 non lin, 2 Scanlocks, and the usual other assorted tools that make up a good tscm kit. Going on sweeps in battle dress? Whenever I saw John on a sweep he was always very professional and well dressed. Is John paranoid? Absolutely (although some might call it "security concious"), but no black helicopters. Is John rude? probably to some, but he never was to me Does he appear arrogant and self inflated? you bet (like so many others in this field!) -luckily I'm still humble, and proud of it, too. ;-) He does have a machine tool shop in his basement and does some pretty darn good work at fitting equipment into cases. A number of people on this list have seen and publicly admired some of his work at conferences. Yes, there are a couple of Radio Shack scanners in a case with the RS labels covered over, along with an ICOM receiver and a Scanlock in the same case- I never saw that equipment on sweeps, but I did see them in use for in-place monitoring where they were very effective. Does he have CIA mugs? sure (actually quite a large mug collection), Movie posters in his office include "The Conversation" and "Three Days of the Condor". I wouldn't mind getting a copy of that "Conversation" one myself. Does he live on money from his wife? That comment could be considered quite offensive. I have met his wife and she is by far one ot the most humble and nicest people anyone could ever know. She does not come from a wealthy backgound, though, and certainly does not deserve to be part of any personal attacks. I do not know much of John's past before I met him, and I do not know what claims he may have made prior to that time. I have not read his book and cannot find it mentioned at Paladin Press, so it too must be from a while back. I do realize though, that there is bad blood between him and yourself and some others here. My impression is that these things too go back quite a number of years. Your description, though, does not fit the person I have known for the past 7 years. Perhaps time has changed people? Perhaps not. My purpose here is just to testify to what I have seen personnally. In the interest of honesty and fairness I could not let your comments go by uncontested on these points. Thanks for listening. Sincerely, Charles Patterson ----- Original Message ----- From: James M. Atkinson To: tscm-l@yahoogroups.com Sent: Tuesday, August 19, 2003 4:39 PM Subject: Re: [TSCM-L] NY PI Conference/Seminar [Semper Boolshitis] Semper Boolshitis We have a problem, and I don't know how to tactfully handle the issue, but suffice to say... John McCann is not what he claims, and a number of his claimed credentials are complete bullshit. He claims to be an instructor with the Scotti school, and yet the Scotti School says that his claim is complete bullshit. According to them he never attended their instructor course, never took their executive protection course, never took advanced driving classes, never took any of their firearms courses, and never completed anything more then a basic 2-3 day limo driver driving course (so, just how could he be teaching?) I am very familiar with Scotti as over the years I have attended virtually every course they teach and actually became CERTIFIED as an instructor several years ago (and have the paperwork, diploma, textbook, course manual, etc to prove it... and have no problem producing appropriate documentation). I should note that when the Scotti School found out about John's claims, they sent him several cease and desist orders (they were, and are still really pissed). A few days later John modified his website to remove his claim of being an instructor for the Scotti School, but every now and then he mentions it in a new forum such as someone elses website, or in a situation like this trade show. The bottom line is that John's claims to be an instructor for the Scotti School is a considerable falsehood. The funny thing is that he found out about the Scotti school through my website (I had a link to Scotti), and he dropped my name all though the class trying to convince other people in the class that he was working with or was associated with me (which he was not). One the one hand he claims, or has claimed on his and other web sites to be a licensed private investigator, and yet the State of New York says that is false and that they have no record of either him or his company being issued such a permit or licence (at least in recent history). An example of such a claim may be found at: http://www.lioninvestigationacademy.com/staffphotos.htm (the page has just recently been taken down) The State of New York also pointed out that it is a felony to claim to be a licensed PI in NY and not actually have such a CURRENT license (cough-cough). If course this is yet another major falsehood. However, according to others in the profession; it is claimed that several years years ago, John McCann submitted an article to Police & Security News. They published the article under his name, and he really played up the publicity, ran ads, etc. The article turned out later to be 100% plagiarized, word for word, from an obscure source. Several people in the business caught him red-handed and notified the editor, and he hasn't tried to get published since. OK, he claims to be a TSCM expert (or 30 years)... If so why has he have virtually nothing published under his name? he has not written TSCM articles, has not really published anything concerning TSCM on his website, has never published any white papers on TSCM, never written any articles on TSCM, and so on. On the one hand he brags about being published, and yet on the other hand there is nothing in print relative to TSCM (of which he claims to be an expert). If we look at the bio in his book (published by Paladin Press) nowhere does it mention he has any experience or expertise with TSCM, basic electronics, counter intelligence, counter espionage, in-grown toenails, or anything even remotely resembling the TSCM business, electronics, academic work or any technical credentials of any sort. When the book was published John was clambering for credibility, so if he was doing TSCM then, why didn't he put it on his bio? I mean after all, he claims to have 20 or 30 years in the business, and yet his bio at that time fails to mention such a credential or background. His bio in the book also fails to mention anything concerning his technical skills, or even the slightest technical capability, course, class, or education. John has previously stated to both me and others that he works for the CIA, how the FBI pays him to install bugs for them, how he is close personal friends with Dick Marcinko, how he trains with SEALs, how he knows everybody at Quantico and so on ad nauseam. He is a bit of an chain-smoking espionage groupie, and is essentially living on his wives money while living out his fantasies pretending to be James Bond (ie: Walter Mitty). He surrounds himself with spook mystique, movie posters, books on espionage, CIA coffee mugs, and so on yet he served only a token amount of time in the Marines, never held a Top Secret security clearance, and has very limited technical skills, background, or training. He joins any organization and collects paper from anyone who accepts his membership dues, but given his reputation and considerable falsehoods he would appear to bring serious discredit to such organizations. John is absolutely obsessed with who is a narc or fed and "who is cool". He is constantly looking over his shoulder, constantly looking for informants or agents, and constantly trying to manipulate others. According to him, the government is stalking him, the black helicopters are landing this weekend, the DEA and FBI has his phones taped, etc, etc, ad nauseam. This in and of itself should tell you something... when someone is overly paranoid, and un-naturally suspicious of others something is seriously amiss. John is rude, abusive, and tries to be a grand manipulator. He tries to get grand-fathered into everything that involves credentials, and expects to get special treatment just because he spent a couple of years in the Marine Corps (Semper Fi, my ass... more like semper bull-shitis). He holds himself out as a spy, and an expert on espionage who in fact commits, and has admitted to corporate espionage. On the one hand he will pretends to kiss your ass, and yet on the other he will stab you in the back in a heartbeat just to make himself feel more important and to fluff himself up (ditto for a few others). He is the only person I have ever met (who has told me in person) that he shows up to do a bug sweep wearing a full battle dress uniform (BDU), complete with a rappel harness, belt, K-Bar knives, semi-automatic pistol in a shoulder holster, and combat boots Of course the Halliburton briefcases, and rack mounted toys from Radio Shack and Super-circuits look impressive to a non-technical person, but instead they amuse those actually performing real TSCM services. He buys flashy toys totally inappropriate for TSCM, and dresses them up in fancy cases to impress his clients. He goes to great pains to conceal that the equipment is amateur toys, and goes out of his way to paint the stuff to look spookier. Sure you can put a $75 dollar scanner in a $400 case and scratch out all of the Radio Shack markings, but it's STILL a consumer toy and not a professional tool. Ditto for dressing up a few hundred pounds of ten year old scrap test equipment that you can buy by the pound. Sure he has some fancy toys, but think for a moment... are they really relevant to TSCM... or for illicit eavesdropping? He does possess a fairly elaborate metal working shop which he seems to have inherited from his father, and he does bend some pretty sheet metal good tin bender. This allows him to make up some impressive and functional packaging and racking and stacking. While his cases may look pretty they do not appears to have been used for any actual work (hint: a TSCM'er who actually DOES sweeps will scratch, scuff, and dent their cases... not have ones that look brand new, almost like they never went into the field). In my opinion (and based on my direct contact over several years with John), I feel that he is absolute poison to the industry, discredits those organizations who allow him to join, discredits people who associate with him, and is a destructive influence to those who he comes in contact with. I realized what he was up to several years back, and have since distanced myself from him (as have others). I also feel that he is just a laughing stock, and a bit of an inside joke in the TSCM business, and his antics makes him look like and even bigger ass-clown. But then of course, your mileage may vary. Also, I should mention that John is extremely envious of others in the profession, he secretly lusts to be like them, would give his left testicle to have equipment like others have, and goes off on a tantrum like a little girl when anyone questions his credentials. One of his favorite games is to have one of his friends vet him in to an organization, then he vets them into some other organization in return, and so on. Semper Boolshitis, It really quite sad, If any other list members have comments on this guy, please feel free to post them to this list. -jma At 8:48 AM -0400 8/16/03, Steve Uhrig wrote: >Reposted from the Maryland PI list for anyone who is interested. > >I am *not* endorsing this event primarily because I believe erroneous >credentials are listed for one of the speakers. The organization is >not at fault; they repeat what they are given. > >The organization certainly is professional and ethical. > >... Steve > >============ > >The Associated Licensed Detectives of New York State will hold a one- >day intensive seminar Saturday, September 20, 2003 at the beautiful >Canandaigua Inn-On-The-Lake, Canandaigua, New York. All private >investigators and security firms are welcome to attend, including >those outside of New York. This seminar will cover such topics as >writing effective security surveys, how to avoid legal pitfalls as a >private investigator or security firm operator, compliance auditing, >corporate due diligence, risk management and the latest information >on New York and Federal legislation and compliance issues affecting >the investigative and security industries. > >Registration fee: $90.00 includes 2-hour welcome open bar Friday >evening Sept 19th and Continental breakfast, Seminar, luncheon and >handouts on Saturday Sept 20th. (After Sept 8th registration fee is >$100.) There is an optional Saturday evening dinner with one-hour >open bar at additional cost of $40.00. > >Speakers are: > >William Dunn, Esq. - General Counsel for Command Security, managing >licensing, risk management and compliance in multiple states, Board >member of the National Association of Security Companies, and served >as NYPD Lieutenant Detective Commander, Bronx and managed fiscal >affairs, integrity and contract compliance in Management Information >Services Division. > >Bruce H. Hulme, CFE - NCISS past President and Board member and >ALDONYS Legislative Chairman, "Spotlight" Editor and Past President, >founder Special Investigations, Inc., and author of chapter "The FCRA >and Corporate Investigations" in the book "Corporate Investigations" >published by Lawyers and Judges Publishing Co., 2002. > >Anthony J. Luizzo, PhD, CFE - Founder and Past President of New York >City Chapter of the Association of Certified Fraud Examiners and Past >President of the Society of Professional Investigators with over 38 >years law enforcement and security/safety administration, co-author >of "Fraud Auditing: A Complete Guide, published by the Foundation for >Accounting Education, and founder of LC Security and Accufacts >Preemployment Screening. > >John D. McCann, CFE - Founder of McCann International, counter- >intelligence specialist, lectured at Yale and Rice University on >intelligence and covert operations, authored book and numerous >articles on compliance auditing for security operations and threat >assessments, and adjunct instructor Scotti School in Boston. > >For Hotel reservations call direct to Canandaigua Inn for discounted >rate $109 per room at 1-800-228-2801. (Mention ALDONYS and make your >reservations now for the reduced price rate) This rate is only in >effect for Friday and/or Saturday stays. > >Make seminar conference checks/money orders payable to: > >ALDONYS, Inc. c/o Michael Hymanson, Treasurer Pan American >Investigation 76 Mamaroneck Ave. White Plains, NY 10601 For credit >card payment or questions call Mike Hymanson at 914 949 1888, or for >updates and/or any changes concerning seminar contact Conference Co- >Chairs Theresa Balfe at 518 765 5537 (theresapi@a...)or Richard >Ingraham at 585 415 0505 (peye@r...) or go to >www.aldonys.org > >================== -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "We have suffered a great loss. And in our grief and anger, we have found our mission and our moment...We will not waver, we will not tire, we will not falter and we will not fail!... George W. Bush 9/11/2001 -------------------------------------------------------------------------------------------------- Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 7673 From: Jay Coote Date: Sat Aug 23, 2003 10:02pm Subject: Xcelite tools as a secret weapon? Does Xcelite or another manufacturer make plastic screwdriver handles that do not smell like someone hurled. You could chuck one of these puppies into a room and clear it in 30 seconds. Needless to say I would not subject a client to them. Is there something better on the market? Jay Coote Los Angeles Specialist in Technical Surveillance Countermeasures Lic: PI17926 TSCM@j... 7674 From: James M. Atkinson Date: Sat Aug 23, 2003 11:20pm Subject: Corporate Profile Hooters: A Case Study 'This thing has incredible legs,' an early investor said. Twenty years later, the restaurant chain has finally hit its stride. FORTUNE Monday, August 11, 2003 By John Helyar Some corporate slogans speak to improving the human condition (DuPont: "Better things for better living through chemistry"). Some speak to elevating human relations (Hallmark: "When you care enough to send the very best.") And then there's the Hooters restaurant chain, which cheerfully admits to no higher calling than lowbrow pleasure: "Delightfully tacky, yet unrefined." So how on earth, in such a politically correct age, in such a failure-prone business, could Hooters have reached age 20 and still be busting out all over? From a single Florida beach bar, Hooters has expanded to 342 locations (27 of them, ahem, abroad), four lines of retail food, one golf tour, and two car-racing circuits (stock and drag). If you laid out the 30 million pounds of Hooters wings served each year, they'd encircle the globe at the equator. If you piled up the 15,000 current Hooters Girls ... well, they'd really be stacked. Even the sky is no longer the limit: Hooters Air started flying in March. It provides service from Newark, N.J., Baltimore, and Atlanta to Myrtle Beach, S.C. Painted in the corporate colors of orange and white, the four 112-seat jets are airborne billboards, with the trademark Hooters owl roosting on their tails. Two Hooters Girls are aboard each flight, emceeing trivia games, hawking Hooters merchandise, and on the whole acting a lot perkier than flight attendants on other airlines who've just taken 20% pay cuts. Is this any way to run an airline? Well, considering that many experienced operators are trying to recover from record-breaking losses, Hooters could hardly do worse. But then Hooters Air is more about building the brand than becoming a serious player in aviation. Hooters' flights of fancy have already brought in reams of free publicity. "You're here, aren't you?" notes Bob Brooks, the man who has sent Hooters soaring. We are at one of his restaurants in Atlanta, sitting amid a swirl of Hooters Girls serving the lunchtime crowd. Brooks hardly seems to notice them. There have been 200,000 Hooters Girls over the years, after all-and the chairman of Hooters of America is no Hugh Hefner. Brooks, 66, is a Methodist family man who grew up on a South Carolina tobacco farm and today lives in a modest home in Myrtle Beach (that, and the area's golf attractions, explain the Hooters hub). His voice is so quiet it's hard to hear in the midday din. But he is no pushover. He has fought diabetes, overcome a stroke, and endured the death of a son, Mark, in a plane crash that also took the life of Alan Kulwicki, a Hooters-sponsored NASCAR driver. He has a simple view of the restaurant business: "Good food, cold beer, and pretty girls never go out of style," says Brooks, who sees great augmentation in Hooters' future. It is already America's tenth-largest full-service restaurant chain, with 2003 revenues estimated at $750 million, and Brooks thinks the country can support 1,000 Hooters. That may be stretching it as much as a Hooters Girl's tank top, says Chicago restaurant consultant Ron Paul. The only two comparable chains that have more than 800 locations (Applebee's and Chili's) draw a large number of women and families. Hooters' relies on 25- to 54-year-old males, who account for 70% of business. On the other hand, "nobody's trying to do what they do," Paul says. "It allows them to stand out in a crowded field." The history of Hooters has more curves and swerves than one of its waitresses wending her way across a crowded room-and is considerably less appealing. For years Brooks and the founders of Hooters fought over everything from menu items to whether Lycra was part of the Hooters ethos. For all the acrimony, which ended in 2001, everyone agrees that Hooters began with a beach bar in Clearwater, Fla., in October 1983. They also agree that the ball got rolling when a restaurant executive named Hugh Connerty wandered in one night in 1984. The six friends who launched Hooters were not seeking to create an American icon. They were a bunch of fun-loving Midwestern transplants who wanted to create their kind of place and who scraped together $140,000 to do it. Three were tradesmen-L.D. Stewart, a painting contractor; Ken Wimmer, his partner; and Dennis Johnson, a brick mason. The others were Ed Droste, a real- estate executive; Gil DiGiannantonio, a liquor salesman; and William Ranieri, a retired service station owner who went by "Uncle Billy" because he was a good 30 years older than his thirtysomething partners. The six didn't know much about the restaurant business, but they knew what they liked: finger food, girls, and golden oldies on the jukebox. Connerty was in Florida scouting locations for a steak house chain he'd started, Colorado Joe's, but he abruptly changed plans after a night at Hooters. The place was lots of fun and, he thought, had loads of potential. He would give the six co-founders $50,000; they would continue to own the trademark and get 3 cents on every dollar the Hooters Girls brought in. They would also keep the rights to build more Hooters locations in a six-county area of Tampa Bay. (They later added the Chicago metro territory.) For his $50,000, Connerty got the right to build Hooters everywhere else in the U.S. He was required to stay faithful to every aspect of the original, right down to the secret wing sauce. The deal was very much in the early Hooters spirit: Originally drafted on a napkin and considered over pitchers, it was sealed days after Connerty proposed it. Beginning in 1985, he took Hooters to other Florida cities and then to other Southeastern markets. But it was soon clear that he had more vision than capital. So Connerty approached Bob Brooks, a business acquaintance, for loans. Brooks was rich, and he knew the restaurant business because some of the big chains bought from his food-service company, Naturally Fresh. He was also tough. In 1988, Brooks called the notes, and when Connerty couldn't pay, took over the Hooters development rights. Connerty's consolation prize: ownership of Hooters restaurants in Jacksonville and Tallahassee. (He no longer owns them and today has no connection with Hooters.) Brooks' takeover stabilized one end of the business but unsettled relations with the founders. There was Hooters Inc. in Clearwater, the corporate entity owned and run by the original six. And there was Hooters of America in Atlanta, owned and run by Brooks. He had the capital to push Hooters into new states, which the founders liked, since they got a piece of every chicken wing sold. But he also kept pushing the restaurants to buy huge quantities of items like salad dressings from Naturally Fresh. The Hooters Six bridled, believing that their version of blue-cheese dressing was sacred. They prevailed in that battle, but the war was on. "You had one group that had the power," says Jim Hammond, an early Hooters executive and now a franchisee with restaurants in three states. That was Hooters Inc., whose trademark ownership restricted what could be done under the Hooters name. Then there was Hooters of America, "which had the money and didn't want to be told what to do." Part of the problem was that Hooters wasn't just about the externals of blond wood and blond bombshells. It was about the subtleties of its leering yet giggling essence. When co-founder Ed Droste started the Hooters calendar in 1986, he made sure it was very good cheesecake but also very funny. The months were out of order, each day had a joke, and the whole month of March was devoted to Iowa humor-e.g., "You know you're from Iowa if you consider being called a Pork Queen an honor." (Droste and Dennis Johnson both hail from Waverly, Iowa.) Ed Droste shaped the Hooters persona, recruiting the first face of Hooters on Clearwater Beach in 1983. Lynne Austin didn't immediately accept his job offer, since she was in the middle of an important bikini contest. But she soon signed on and not only made for great eye candy on Hooters' billboards but also had a gift for sports trivia and a quick wit. When Hooters entered a new market, Droste went to local radio stations with Austin and a complimentary platter of wings. She had listeners eating out of her hand-and, often enough, at the new Hooters. Austin was the prototype of the Hooters Girl-bosomy but also bubbly, an approachable all-American girl, not a distant Miss Universe. And Hooters is great at overcoming the objections of God-fearing communities by establishing itself as a good citizen. It's hard to hate a Hooters Girl who's just helped you raise $10,000 for the Special Olympics. It was the girls that gave Hooters legs that other theme restaurants lacked. The movie memorabilia in a Planet Hollywood might interest a diner the first time, but on the next visit it palls (as did the restaurants, which went bankrupt). Hooters Girls are a renewable resource. Waitresses get a $200 "buddy bounty" for bringing in new talent. Cruder knockoffs like the defunct Knockers chain missed the cheerful insouciance that made Hooters a hit. The Clearwater co-founders thought the suits in Atlanta lacked soul and missed these vital subtleties. "To Eddie Droste, Hooters was a work of art-naughty but not too naughty, an elaborate PG-13 joke," says one person involved in the early days. "Brooks didn't really get it, and if you're not on the same wavelength, it's hard to amicably settle differences." To be fair, some of the conflict may have been due to sellers' remorse as the founders realized that they had sold their baby too quick and too cheap. Some of it was due to the founders' starting to take themselves seriously. In 1983, as the Hooters menu tells it, they could have been "arrested for impersonating restaurateurs." Eventually they came to regard themselves as savvy restaurant pros who knew best. In fact, both sides could be hardheaded. Says Brooks: "It became a matter of 'we' vs. 'them.' " The co-founders maintained that they, as licensors, must approve all aspects of each Hooters. Brooks disagreed. So they would fight over things like tank tops. In the early 1990s, the Six agreed it was time to abandon the bare-midriff look and tuck in the Hooters Girls' tops. First, they had a hard time getting franchisees to comply with the navel blockade. Then Brooks offered his franchisees an alternative to the traditional cotton tank top: Lycra. The Six were appalled; they considered the material too form-fitting and the tone all wrong. As Hooters Inc. president Neil Kiefer puts it, "When the shirt gets too tight and the boobs are hanging out, mama and the kids aren't coming in." Brooks was tired of making big investments in his restaurants and still having to argue about these kinds of things. So in 1994 he leaped at co-founder L.D. Stewart's offer to sell his share in Hooters Inc. Brooks agreed to pay Stewart $10 million for his 51% stake. But since Stewart owned just two of the seven voting shares of Hooters Inc., others needed to be won over. They were instead enraged because under the original agreement, they had the right of first refusal to buy Stewart's shares. In 1995 a Florida judge blocked the sale of Stewart's stake. The five got back the stock and retained control of Hooters Inc. (Now estranged from the group, Stewart couldn't be reached for comment.) But nothing was resolved. That same year the combatants set aside their differences long enough to fight a common enemy. The Equal Employment Opportunity Commission, a U.S. federal agency, filed a complaint against Hooters, charging its exclusive employment of women as waitresses discriminated against men. It was a potential calamity. As president Rick Akam testified in a court proceeding, "The guiding principle of the system has always been vicarious sexual entertainment to customers." In 1995 the chain counterattacked. It dressed up a restaurant manager named Vince in a Hooters Girl outfit and, complete with blond wig and five o'clock shadow, substituted him for Lynne Austin on billboards and ads bearing their anti-EEOC message, washington, get a grip! It staged a Hooters Girl March on Washington and aired its case at a National Press Club briefing. The era of good feelings did not last: When the EEOC eventually dropped the matter, Hooters of America produced a T-shirt saying She Survives! Hooters Inc. declared the T-shirts a license violation and demand that sales cease. It was back to infighting as usual. In 1998 the co-founders went to federal court, alleging that Brooks had committed various license violations. By then the hostilities were taking a toll on the business. For instance, a TV show called Hooters Movie of the Weak (lame movies interspersed with comedy sketches) was syndicated on stations in 13 major markets-but it was pulled from the air when the Brooks camp challenged its legality. The turmoil at the top slowed the pace of expansion, as franchisees were leery of investing in such a poisoned atmosphere. But then a funny thing happened on the way to Armageddon. The Hooters Inc. crowd in Clearwater began to develop more respect for the Hooters of America crowd in Atlanta. "There was friendship despite all the fighting," says Droste, "and we had to hand it to Bob Brooks. He put his money where his mouth was." It was his idea, for example, to make a splash in sports, the second-biggest interest of the Hooters core clientele. In 1992, Brooks sponsored Alan Kulwicki, who won the Winston Cup as NASCAR's top driver that year. In 1995, Brooks dropped NASCAR to run his own series, the Hooters ProCup stock-car races, and in the same year he added the Hooters minor-league golf circuit. Every time a Hooters tour alum breaks through to win a bigtime tournament-as Ben Curtis did most recently at the British Open-Hooters gets free publicity. By the new millennium, the spirit of detente was taking root. At the end of a day's legal wranglings, the warring factions would go out to dinner together. In 2001, as part of a settlement of the federal litigation, the founders sold Brooks the Hooters trademark for $60 million. They retained the rights to the Tampa Bay and Chicago territories, plus Manhattan. Hooters Inc. also has the rights to develop a Hooters hotel and casino in Las Vegas and to take Hooters to Hollywood. (Ed Droste is working on Hooters: The Movie.) Hooters of America has domain over the rest, giving it the control it has coveted. With the outbreak of peace, Hooters has picked up the pace, adding 38 restaurants last year and 16 already in 2003, about twice the rate of the late 1990s. And Hooters Air may be only the beginning when it comes to Hooters line extensions. Is the world ready for a Hooters cable channel? That's on Brooks' drawing board now. The Methodist from Myrtle Beach may not be as wacky as the Hooters Six, but he seems to have gotten the hang of delightfully tacky. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "We have suffered a great loss. And in our grief and anger, we have found our mission and our moment...We will not waver, we will not tire, we will not falter and we will not fail!... George W. Bush 9/11/2001 -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 7675 From: Date: Sun Aug 24, 2003 2:57pm Subject: Report: U.S. Recruiting Saddam's Spies Report: U.S. Recruiting Saddam's Spies WASHINGTON (Reuters) - U.S.-led occupation authorities in Iraq have begun a covert campaign to recruit and train Iraqi spies to help identify resistance to American forces, The Washington Post said on Sunday. Citing unnamed U.S. and Iraqi officials, the newspaper said the move to recruit agents of ousted president Saddam Hussein underscores a growing recognition among U.S. officials that American forces alone cannot prevent attacks like the bombing of U.N. headquarters in Baghdad on Tuesday. One senior U.S. official said authorities have stepped up recruitment over the past two weeks. While U.S. officials acknowledged the sensitivity of cooperating with a force that embodied the ruthlessness of Hussein's rule, the officials said an urgent need for better intelligence had forced unusual compromises. The report said officials were reluctant to disclose how many former agents have been recruited. The emphasis in recruitment appeared to be on the intelligence service known as the Mukhabarat but that was not the only source, the Post said. Within that service officials have tried to recruit agents once assigned to Syria and Iran. 08/24/03 07:03 © Copyright Reuters Ltd. All rights reserved. The information contained In this news report may not be published, broadcast or otherwise distributed without the prior written authority of Reuters Ltd. [Non-text portions of this message have been removed] 7676 From: Andre Holmes <1ach@g...> Date: Sun Aug 24, 2003 7:59pm Subject: GOOD NEWS COVERAGE Asia Times ----- Original Message ----- From: Andre Holmes To: ANDRE HOLMES Sent: Sunday, August 24, 2003 8:54 PM Subject: Emailing: ED24Ak05 Middle East THE ROVING EYE The Mukhabarat's shopping list By Pepe Escobar BAGHDAD - While the buildup to the war on Iraq was convulsing world capitals, world opinion and the United Nations, the Mukhabarat - the feared Saddam Hussein secret service machine - was still living in its own Thousand and One Nights bubble. This is what is revealed by a document found by Asia Times Online, among other files, in a nondescript, abandoned Mukhabarat safe house in the Qadissiya district of the capital. Iraqis who read it and translated it had no reason to doubt its authenticity. The handwritten document details a series of meetings between June 2002 and March 2003 (even when war was already raging in Iraq), probably in the same safehouse, involving Mukhabarat agents and representatives of firms from many Arab countries but also from France, Russia and the Netherlands. The document should constitute additional proof that the secret services indeed operated as a parallel state in Iraq - way beyond the reach of United Nations sanctions and trade embargo. All negotiations were secret. And everything was paid in US dollars, cash. All manner of other secrets and not-such-secrets are to be found in what remains of Baghdad. Detailed personal files by Internal Security in Mukhabarat abandoned safe houses in Karada. Compromising files at the torched and looted Ministry of Foreign Affairs. Secret graves in the al-Qarah cemetery of nearly 1,000 political prisoners tortured and mostly hanged at Abu Ghraib prison. And in the basement of another Mukhabarat safe house in Wahda, after a poor torch job, an astonishing room brimming with the latest high-tech surveillance equipment is still practically intact. Possibly much of the equipment was purchased following the meetings detailed at the document found in Qadissiya. From the Alwaeth firm in Syria, the Mukhabarat negotiated to buy machines to conceal fax numbers. They could be delivered in three days. From an unnamed Egyptian firm, it wanted wireless communication systems for buildings, at US$55,000, and a more sophisticated system for $100,000. It also wanted wireless systems from the Iraqi firm, al-Azhal. From an unnamed corporation in Abu Dhabi, the Mukhabarat wanted an array of goods: wireless systems; wireless pinhole cameras with a maximum range of 100 meters (delivery in one month); four-channel AV receivers; pen cameras with a maximum range of 100 meters, connected to video, recording audio and operating on 12V batteries; cameras with a range of 1 kilometers, and upgraded with an outer antenna for 3 kilometers; and night vision goggles with a 1 kilometer range. The goggles could be the most explosive item in the shopping list as Washington had all but accused Syria of selling them to Iraq. According to the document, the negotiations were actually conducted with this unnamed Abu Dhabi corporation. From the Dutch firm Haiman, and also from an unnamed Lebanese firm, the Mukhabarat wanted spray to detect fingerprints on paper and wood, and to detect separate fingerprints from different people. Mukhabarat agents questioned Haiman for any new technology and also wanted to know the prices for card-operated security systems. From the French firm APX, the Mukhabarat wanted to buy listening devices, portable satellites and private security systems. The document states that the Mukhabarat had "direct contacts with a minister in France" who could help the negotiations. The document also states the Mukhabarat desire of trying to improve the security systems of Iraqi embassies around the world. Thus the quest for sophisticated listening devices; small microphones; telephone bugs; transmitter pens; laser systems to check camera performance; listening devices to monitor what happens inside a building from the outside; hidden espionage cameras; night cameras to identify people from a distance of 150 meters; and the smallest color cameras available on the market. From the Alsalam company - country of origin non-identified - the Mukhabarat was trying to buy video cameras inside pens and made-in-Russia long-distance cameras, with a range of 2 to 3 kilometers. In another meeting with an unidentified French firm, the Mukhabarat wanted to purchase equipment to recognize fingertips on glass and wood; machine guns disguised as suitcases; and voice identifying systems that can be matched with databases. It also wanted a spray to identify fingerprints; laser tools to identify fingerprints; a system to identify food poisoning (a key Saddam Hussein obsession); tools to identify explosive materials and give the exact distance between the target and the explosives; and a robot to remove explosives. From the al-Asriya firm - not identified as Iraqi or foreign - the Mukhabarat wanted to buy three different computer systems for $199,000 each (with a discount, it could come to $130,000 each). The systems are called Spread Spectrum (operating between 1,5 and 5 gigahertz). There was an explicit condition for the purchase: the manager of the firm had to send Mukhabarat agents for training out of Iraq - with specialists from Lebanon. And all spare parts should be free. On this particular negotiation, the Mukhabarat was dealing with Muhamad Halewi, a doctor and manager of the Fica firm in Baghdad. And it was also comparing prices with the Abu Dhabi office of a firm called Teltec. The Mukhabarat complains that the prices quoted by the Reeger company - country of origin non-specified - are very high. The document states that if they buy anything from Reeger, training will have to be conducted in Malaysia. The Mukhabarat was actively comparing prices between Iraqi and Syrian firms. It was negotiating to buy Toyota Camrys at $20,500 apiece and Mercedes sedans for $55,000 apiece from the Aldahi dealership in Baghdad, imported from a firm in the United Arab Emirates. From the al-Azar firm, also in Baghdad, it wanted Mercedes vans. From the Jawrah and Hensi corporation in Syria, it received an assurance that the cars could be delivered in two months. And it could also buy on request air-conditioners, Hyundai elevators, copy machines, Panasonic videos and TVs and paper shredders. One thing is certain: not all Mukhabarat papers were shredded as the Americans arrived at the gates of Baghdad. (©2003 Asia Times Online Co, Ltd. All rights reserved. Please contact content@a... for information on our sales and syndication policies.) Apr 24, 2003 -------------------------------------------------------- Oh no, not again (Apr 23, '03) Saddam everywhere but nowhere to be seen (Apr 23, '03) Affiliates Click here to be one) No material from Asia Times Online may be republished in any form without written permission. Copyright Asia Times Online, 6306 The Center, Queen's Road, Central, Hong Kong. [Non-text portions of this message have been removed] 7677 From: mpaulsen6 Date: Tue Aug 26, 2003 10:30pm Subject: STU-III products / OMNI from L3 Com East and other products. I'd like to know if anyone has utilized these items. I'm looking at a deployment for 100-200 of the units and other products from L3 or another vendor, and would like to have a few real world feedbacks. My deployment time is end of q4 04 to q2 05 so I don't want to focus on military/government available only items, as PM's with the companies may have soon to be commercial items ready when we're ready to purchase. Regards, Matt 7678 From: mpaulsen6 Date: Tue Aug 26, 2003 10:34pm Subject: Partnership for Public Warning (PPW) Emergency Alert System (EAS) draft report Comments Wanted The Partnership for Public Warning (PPW) has issued a draft report on the Emergency Alert System (EAS). The purpose of the assessment report is to review the history of EAS, assess the current state of the national warning system, and provide recommendations regarding its future. PPW is now seeking public comment on this report. In addition providing comments, reviewers are invited to suggest recommendations about EAS that should be considered for inclusion in the final report. Comments are due by September 5, 2003. Please see http://www.partnershipforpublicwarning.org/ppw/eas.html for complete details. PPW may be contacted at 7515 Colshire Drive, Mail Stop N655, McLean, VA 22102; (703) 883-2745; e-mail: information@p... 7679 From: mpaulsen6 Date: Tue Aug 26, 2003 10:41pm Subject: ot: Surviving the Secondary Device - the Rules Have Changed Video For those that are first line respondants this may be of interest ************************************************************** Point of Contact: Barbara T. Wisniewski Biehn Training Program Analyst Office for Domestic Preparedness Phone: 202-353-0281 Pager: 877-858-9235 Fax: 202-616-2922 Email: wisniews@o... --- Good morning all The secondary device video is available through the Office for Domestic Preparedness. www.ojp.usdoj.gov/odp Synopses of that video and two others follow below. Also currently in production are videos on Incident Command, Unified Command, and Responding to a WMD/HazMat Crime Scene. These are in addition to the monthly CoMNET and Live Response programs that DOJ co-sponsors with TSWG and FEMA. http://www.ojp.usdoj.gov/odp/docs/comnet.htm You may access all ODP resources through the helpline number below: ODP Help Line - 1-800-368-6498 ODP also operates an information clearinghouse with a virtual library of information and resources, including abstracts, publications, videos, articles, templates, models, samples, and links to other sites. You may access the clearinghouse at http://odp.ncjrs.org You may order up to 5 copies each of the videos through the DOJ Response Center at 1-800-421-6770 For those who require than 5 copies, please fax a request on letterhead to 202-616-2922, please label VIDEO REQUEST Surviving the Secondary Device - the Rules Have Changed Video Produced in partnership with the Georgia Emergency Management Agency, this video is designed to assist public safety officials in making informed decisions concerning the real potential of secondary explosive devices. These devices, which detonate after the initial explosion, target blast survivors, other individuals who converge on the scene, and, more often, responding public safety personnel. The possibility of secondary devices require that public safety officials not only look at how to protect the lives our citizens, but how to protect the responders. This video discusses policies and procedures for effectively responding to and managing a bomb incident, and for better ensuring the safety of the public and the emergency responder. Surviving Weapons of Mass Destruction Video The threat of terrorist incidents involving chemical or biological agents is very real. This training video is designed to enhance the survival and safety of emergency responders during such incidents. Although protecting the public is the principal mission of all public safety agencies, it is also important that emergency responders do not forget their own safety. This video, produced in partnership with the Georgia Emergency Management Agency, approaches safety from the individual responder and an agency perspective. Weapons of Mass Destruction - the First Responder Video Being prepared for incidents involving weapons of mass destruction means knowing what to look for and how to react. Preparation means that all emergency response agencies, including law enforcement, fire, emergency medical services and others, at all levels of government, work together in responding to such events. This video, produced in partnership with the City of Seattle Fire Department, was prepared to familiarize emergency responders with steps they can take to mitigate the effects of such incidents and to better ensure their own and the public's safety. Hope this info is helpful. Regards, Barb Barbara T. Wisniewski Biehn Training Program Analyst Office for Domestic Preparedness Phone: 202-353-0281 Pager: 877-858-9235 Fax: 202-616-2922 Email: wisniews@o... 7680 From: mpaulsen6 Date: Tue Aug 26, 2003 11:21pm Subject: Here we go again... From a few years ago on the list.. this was posted...-m --------------------------------------------------------- Keep this in mind as "Election 2000" gains momentum... On July 1, 1947, witnesses claim a spaceship with five aliens aboard crashed on a sheep and cattle ranch outside Roswell NM, an incident they say has been covered up by the military. On March 31, 1948, exactly nine months after that day, Al Gore was born. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 7681 From: mpaulsen6 Date: Tue Aug 26, 2003 11:29pm Subject: international intercept capabilities of eschelon, Frenchelon, DCS1000 Hi, Recently this topic has been presented in separate conversations I've had with two gentlemen, one in the industry, one not but related to it as part of their position, so I'd like to know if anyone has current information on these capabilities and the potential reasons for it occurring in a post-cold war scenario with a viewpoint from corporate espionage/information sale over the next 2-3 years from countries that oppose US interests overtly or covertly - ie: france/britain/ US/EU, us/cuba/russia, etc. Thanks, Matt 7682 From: Ocean Group Date: Mon Aug 25, 2003 8:26pm Subject: Req Info... Does anyone know where one can obtain a copy of the National Wiretap Commission report in full? Kind regards John McClane --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.512 / Virus Database: 309 - Release Date: 19/08/2003 From: Miguel Puchol Date: Wed Aug 15, 2001 1:17pm Subject: RE: Re:Agent Dumbass My favourite one is a t-shirt reading, in big bold letters: "BOMB SQUAD", and underneath, in smaller print, "If you see me running, try to keep up" > How about this........... Have you been to your local mall lately? The > teenybopper botique has two new t-shirts, one has FBI in about 8 inch > letters front and back, and "Female Body Inspector" in about 10 > point print > below the FBI. Then they have one that says "Undercover police > officer" (my > personal favorite, I love watching boot narcotics guys, usually > pulled off > patrol, short hair, short mustache, wearing an old t-shirt and > blue jeans, > standing in the interview position trying to buy crack! ) Cheers, Mike 3513 From: James M. Atkinson Date: Wed Aug 15, 2001 3:23pm Subject: Report: Energy Department misled FBI in bungled espionage investigation [Note: Oh No, the DOE counterintelligence department got caught lying yet again, tsk-tsk-tsk.] Report: Energy Department misled FBI in bungled espionage investigation http://www.nandotimes.com/politics/story/60728p-878737c.html By PETE YOST, Associated Press WASHINGTON (August 13, 2001 4:53 p.m. EDT) - Misleading reports from the Energy Department led to the FBI's investigation into nuclear scientist Wen Ho Lee, a review of the bungled espionage inquiry concludes. The report also faults the FBI for accepting the department's assessment. The Energy Department's inquiry in 1996 "was a deeply flawed product whose shortcomings went unrecognized and unaddressed due to the FBI's own inadequate investigation," said the report. The Justice Department released two heavily censored chapters of the report Monday. A judge ordered the release in a lawsuit filed by former Energy Department counter-intelligence chief Notra Trulock. "To say that DOE misled the FBI and to say that DOE improperly focused its conclusion only on Wen Ho Lee is only to describe half the problem," said the report. "The other half was the FBI's unfortunate and unwarranted acceptance of DOE's description" of Chinese nuclear capabilities and the FBI's "unhesitating and unquestioning acceptance of DOE's identification of Lee as 'the most logical suspect,"' said the report. The report stated that at the very start, the Energy Department made "inaccurate representations" to the FBI. The department had assembled a panel called the Kindred Spirit Analytical Group (KSAG) to assess possible Chinese theft of U.S. nuclear secrets. The group concluded that U.S. secrets had been compromised and had helped the Chinese in determining what they could hope to achieve and how to "avoid blind alleys in their own research and development." "What KSAG concluded, however, and what the FBI would be told these DOE experts had determined, were two different matters," the review stated. "This inaccurate communication of the predicate resulted in the FBI spending years investigating the wrong crime." Trulock is suing two other Energy Department investigators who said that Lee was targeted because of his race. The report concluded that Lee wasn't targeted based on race, but said the DOE singled him out without considering other possible suspects. Messages left with former Energy Secretary Bill Richardson were not immediately returned. DOE officials were reviewing the document. -- ------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------------- 3514 From: Date: Wed Aug 15, 2001 2:39pm Subject: Re: FBI Cherry Pickers - aka "Agent Dumbass" In my experience, all the wirework with court blessing goes on in the 'wire room' which is a place with lotsa bandwidth and lotsa tape recorders (still analog the last time I saw...though they're probably somewhat digital now). The field work - like what JMA described - is mostly reserved for setting up remote listening posts or handling assignments that do not have legal backing. The field techs around L.A. that do this kind of thing take great pride in writing with magic marker, "FBI TAP or FBI MONITOR," on pieces of paper they rubberband around their connections inside the B boxes. Very clever. In a kinda related note, recently a three letter agency working a field surveillance had an agent inside their 'wire room' who keyed down his portable's PTT so the guys in the field could hear a phone call between a UC and an informant. All unencrypted - and it continued for the better part of 15 minutes on and off. -Eric Leonard --- In TSCM-L@y..., "James M. Atkinson" wrote: > > Now this is interesting, > > Within the past few days, while in my travels I spotted a telephone > company "cherry picker" truck parked underneath a major cable run to > the CO. > > OK, this in and of itself was normal, but the truck just didn't look > right... the driver hadn't parked it the way most outside plant folks > do, had neglected to put out his orange cones, didn't have the wheels > chocked, lacked a hard hat, etc... Yes, the truck had clean and crisp > Verizon logo on it, but too many things just didn't look right. > > Realizing that something wasn't right I made a loop around the block > and came back for another look. > > I watched the bucket operator from a distance, and he looked really > nervous as he worked on the SAC on the cable, his craft methods were > not smooth, he was carrying his tools wrong, and was fumbling around > like a teenage kid on prom night. Then I saw that the bucket > operator was wearing a black T-Shirt with the three letters FBI > plastered across the back in 8 inch letters. > > What the hell is this... either we have a freelance telephone guy up > to some mischief (ie: installing illegal bugs), or we have a > seriously clueless FBI dweeb (aka "Agent Dumbass") who needs to learn > to be more discreet. > > Either way I would be interested in hearing the lists opinions. > > -jma > > > > -- > > -------------------------------------------------------------------- ----------------------------- > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008jmatk@tscm.com > -------------------------------------------------------------------- ----------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------- ----------------------------- 3515 From: Scott Malcolm Date: Wed Aug 15, 2001 5:04pm Subject: Re: FBI Cherry Pickers Jim, Probably a repairman coming or going from his liquid lunch. With all the major Phone companies getting "Lean and Mean" anyone that can hold a screw driver and drive a truck is out in the field. Regards, Scott Malcolm Malcolm & Associates, Inc. Serving the State of Wisconsin http://www.execpc.com/~conf-pi Office 262 965 4426 / Fax 262 965 4629 What the hell is this... either we have a freelance telephone guy up to some mischief (ie: installing illegal bugs), or we have a seriously clueless FBI dweeb (aka "Agent Dumbass") who needs to learn to be more discreet. Either way I would be interested in hearing the lists opinions. -jma 3516 From: D. Douglas Rehman Date: Wed Aug 15, 2001 5:09pm Subject: RE: Re: FBI Cherry Pickers - aka "Agent Dumbass" In Florida, it depends on which telco's area the wire is in as to where the equipment gets installed. GTE and Sprint install the equipment in the CO for the agency (I always insisted on being there when the hookup was done- explaining that someone had to testify about the right phone being tapped usually resolved any problems they had with letting a cop into the CO). Bellsouth, on the other hand, insisted the tap be done outside the CO. They would supply an appearance point and the appropriate binding post ID's. A good tech agent took pride in doing the install in such a manner that detection was not very easy. We always marked our equipment with the contact for the Telco's security department. Regardless of which Telco's area we were in, some court authorized activity does require access to the lines, including aerial. (Ever try to covertly climb a pole wearing spikes in the dark when the pole is at the end of the target's driveway...) Best Regards, Doug Rehman Rehman Technology Services, Inc. Specializing in Computer Forensics and Technology Related Investigations License A-9800119 Mount Dora, Florida (Orlando Area) (352)357-0500 http://www.surveil.com 3517 From: Aimee Farr Date: Wed Aug 15, 2001 5:30pm Subject: RE: Compandering Hm. My opinion is that Steve could beat up a couple of "expert" surveillance lawyers I know. (I created a small advisory/mentor board made up of 'licensed professionals' for privacy and surveillance law. I erred somewhere, and unwittingly gave rise to the "wrong-answer-confusion-get-me-in-trouble board" and the "why/what/how _it_ works-is-not-a-consideration committee." Young lawyers are like kids, our neural pathways are in a state of development. I want to sue them for "brain-tangling," based on a novel tort theory.) ~Aimee 3518 From: Shawn Hughes Date: Thu Aug 16, 2001 1:11am Subject: so, you say... Voice cloning: Software advances speech simulation AT&T Labs will start selling speech software that it says is so good at reproducing the sounds, inflections and intonations of a human voice that it can re-create voices and even bring the voices of long-dead celebrities back to life. The software, which turns printed text into synthesized speech, makes it possible for a company to use recordings of a person's voice to utter new things that the person never said. http://www.siliconvalley.com/docs/news/svfront/040501.htm [Non-text portions of this message have been removed] 3519 From: Roger Pilkington Date: Thu Aug 16, 2001 4:43am Subject: Re: Re: FBI Cherry Pickers A jaded phone engineer with a sense of humour and a collection of shirts suitable for all occasions? 3520 From: Ron Cheshire Date: Thu Aug 16, 2001 9:29am Subject: Help with camera selection I need some advice. I have a customer that needs to update his security camera system.The existing cameras are so old that you can't see anything more than shadows. I need an outside color camera that will operate on a swivel of about 120 degrees and be sharp enough to recognize faces at about 100 yards. NEXT, I need a covert color camera in a fire alarm that can be put on the ceiling of a room, to watch two employees desks. I then need a duplexer that will allow both video images to be placed on ONE screen that can be video taped and also be sent to the internet. Any help for types and sources would be appreciated. Thanx Ron C. ACI International [Non-text portions of this message have been removed] 3521 From: Steve Uhrig Date: Thu Aug 16, 2001 10:21am Subject: Re: Help with camera selection Once upon a midnight dreary, Ron Cheshire pondered, weak and weary: > I need some advice. > I have a customer that needs to update his security camera > system.The existing cameras are so old that you can't see > anything more than shadows. I need an outside color camera > that will operate on a swivel of about 120 degrees and be > sharp enough to recognize faces at about 100 yards. Unlike the common misconception, CCTV is NOT a black box plug and play deal. 95% of people installing this stuff have no idea what they are doing. 99% of the people selling this stuff do not have enough or any field experience to make proper recommendations. You are sold whatever line the salesmen are told to push that week to maintain their sales quota. Sometimes you are sold whatever gear the distributor can get credit with the company for that week. Call some of these places with a sample typical configuration 3 times in 3 months and you'll get 3 vastly different recommendations. If you are asking these questions, you do not have the background or experience to do the job properly. You should recommend to the customer he call an experienced, full time, local CCTV installer. There is FAR more to the above than just getting the equipment. And, frankly, to do it properly is beyond most people's ability and beyond what most clients are willing to pay. It's real unusual to see a properly done CCTV job. The only spec most people look at is price. The camera may recognize faces at 100 yards with a proper long lens and good light. And a VERY stiff mounting pole, because at that magnification you cannot afford any movement. It will be difficult to do that. 4x4 inch 200 pound metal poles set deeply in concrete sometimes aren't stable enough. And you will be paying a significant resolution and sensitivity penalty for a color camera. Then you need a very low light camera even in full sun, because zoom lenses are slow. Of course an autoiris lens with neutral density filter, and an environmental housing with heater and blower. Ask for these and most suppliers won't even know what you are talking about, much less know why you need it. And a lens controller as well as a pan and tilt controller. And proper coax, not the cheap CATV crap sold by most suppliers. Good quad shield RG-6 will cost you at least fifty cents a foot in 10,000 foot quantities in 1000 foot putups. 3 piece crimp BNCs of decent quality will run between $1 and $3 each. Remember there are both 50 ohm and 75 ohm BNCs and barrels. Proper crimping tools $60. Use anything less and you likely will pick up some AC on the coax and have to spend a hundred bucks per camera on a ground isolation transformer. And you need a TDR with waveform display, to sweep everything. If you can even see a connector, you probably need to replace it. On top of all this, you've got to put all this on tape and take it back off. The tape is the bottleneck with resolution. Don't demo the camera into a monitor. Demo what you can put on and pull off tape. Big difference. High end timelapse recorders are available if you know what to ask for, like the S-VHS Panasonic AG6740 at $1500 a pop and tapes at $15 a pop. Almost anything less, and you will not recover enough off of tape to do you any good. Change tapes frequently, replace them frequently, and have the recorders professionally overhauled by DJL Video no less than once a year. Etc. The only practical camera system for your job is the Pelco Spectra, and then the best one in the series. With an outdoor pendant mount and outdoor heated dome (mandatory), you will spend over $3000 exclusive of the mounting arrangements. Then a controller, like a KBD-300, will be another $550 eacn. More than one camera or controller and you should go to a matrix switch. Add another $5000. Don't forget power (24VAC), and we're not talking about a wall transformer for these things. Read the articles in the Articles section of our website for some info on video systems. Do I practice what I preach? Since January my crew of 3 guys has been installing an extensive covert surveillance system at Tom Clancy's personal residence, 3 days a week, using a lot of video, and figure we are about half finished. We are replacing some garbage work done by an alarm company who thought all they had to was ask a question on a newsgroup and pull cable and all these cameras would magically work. We'll end up somewhere between $250K in hardware and that much more in labor. You want advice? Farm the job out to someone with experience who will not be cheating the customer by experimenting at his expense. I am available to design and spec systems for *serious* applications. Contact me for rates. As I am going out tomorrow on medical, I will not be available until the beginning of September. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3522 From: Date: Thu Aug 16, 2001 0:24pm Subject: AT&T Labs Speech Technologies - Demos: Recorded, English click to hear message ! ; http://duet.research.att.com:80/cgi-bin/ttsdemo-act/@892/output_11.wav scroll to bottom of link page for demo. HAVE A GREAT DAY !!! ---------- http://www.naturalvoices.att.com/demos/index.html [Non-text portions of this message have been removed] 3523 From: Date: Thu Aug 16, 2001 0:33pm Subject: re ATT audio mesage ,link would not transfer audio. sorry for error! check out the demo page ,though! thanks Shawn! HAVE A GREAT DAY !!! 3524 From: Date: Thu Aug 16, 2001 1:39pm Subject: Fwd: AT&T Labs Speech Technologies - Demos: Recorded, English HAVE A GREAT DAY !!! [Non-text portions of this message have been removed] 3525 From: James M. Atkinson Date: Thu Aug 16, 2001 2:51pm Subject: Alleged voyeur taping has DA pushing limits http://www.boston.com/dailyglobe2/227/metro/Alleged_voyeur_taping_has_DA_pushing_limitsP.shtml Alleged voyeur taping has DA pushing limits Roommate cameras spur civil case By John Ellement, Globe Staff, 8/15/2001 In what could become a precedent-setting case, a Jamaica Plain man is facing civil rights charges, accused of violating the privacy of his female roommates by secretly videotaping them in their bedrooms and bathroom. The novel use of the state's civil rights laws was the only way to prosecute Douglas P. Williams, because Massachusetts lacks a law against secret videotaping, Suffolk County prosecutors say. So, the Suffolk district attorney's office is trying to apply the law that makes it a crime to violate a person's constitutional rights, a statute historically used to prosecute hate crimes. ''We are going into new territory here, and this is one of the few statutes that fit the crime,'' said Suffolk Assistant District Attorney Jeremy Silverfine. ''We have been getting lots of calls about secret videotaping, and lots of times we are in the very tough situation of having to say we can't assist in any criminal prosecution.'' Despite the lack of a law against secret videotaping, it is a crime in Massachusetts to secretly audiotape someone. Williams, 29, has pleaded not guilty in Suffolk Superior Court to two counts of violating the civil rights of his former roommates. Williams is also charged with possessing child pornography. ''We contend these people had an expectation to privacy,'' Silverfine said. ''I don't know how much more private you can get than your own bathroom and bedroom.'' Williams could not be reached for comment yesterday. According to records in Suffolk Superior Court and West Roxbury District Court, the case against Williams began in April when a woman who had recently moved into the apartment noticed a black box mounted on her bedroom wall. At the time, Williams was the tenant of the apartment and was subleasing rooms in the three-story Gartland Street duplex. The woman questioned Williams about the box, which he dismissed as the innocent handiwork of an electrician doing repairs. He also told her the box did not hold a camera, according to court records. The woman taped over the viewfinder. Later that week, as the woman stepped out of the shower, she noticed a clock positioned on a towel rack in the bathroom. The clock's face was pointed directly at the toilet. She saw what she thought was a video lens inside the clock. She then went into her bedroom, opened the black box, and found a video camera, court records say. Alerted, a second female roommate searched and found a camera hidden inside the electric wall socket in her bedroom, according to court records. The two women then followed the wiring attached to the cameras, all of which led, through closets and walls, into Williams's bedroom, where he had as many as six laptop and desktop computers, according to court records. The women confronted Williams, who admitted the clock was his, but said it held a ''light sensor'' and not a camera. When the women tried to take the clock apart, Williams objected. ''Don't go destroying my property just because you're paranoid,'' he said, according to court records. The two women contacted Boston police. Williams told police he had no idea how the wires led into his room and then asked permission to get shoes from his bedroom. The officer checked on him later and found him ''furiously'' typing on a laptop. With a search warrant, police seized Williams's computer equipment and discovered video images of his female roommates. They also found photos of nude children and children engaging in sex acts, according to Silverfine. Silverfine said Williams has been a volunteer for an organization trying to help rebuild the Balkan countries devastated by years of ethnic warfare. He said investigators have not found evidence suggesting the child pornography came from that region. This story ran on page B1 of the Boston Globe on 8/15/2001. © Copyright 2001 Globe Newspaper Company. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3526 From: Shawn Hughes Date: Thu Aug 16, 2001 3:20pm Subject: Compandering, deux >Speaking as an active expert witness in court several times a >year on the subject matter, I'd fry you for using the thing. Speaking as an active expert for the prosecution, nah; no you wouldn't. (Just several times a year? I wished I could get bonus miles for Federal Court time. Judge Jarvis and I aughta be engaged by now...) I have only had about four things excluded in 10 years. Best one was having an ex-FBI agent who whored himself to some Mexican Cartel-types one time, spent $8,000.00 on just the physical examination of the tape, and my evidence still flew through. Follow the law, protect the persons' right to privacy as much as the persons' offenses against the government will allow, and fear no defense-hired gun. I aughta get that tattoed. Oh, and you can never carry too much tape, or nine-volt batteries. >Legalities aside, the technical points of the law frequently only give you >grounds for (expensive) appeal. How would a hostile prosecutor and a jury >already intimidated likely rule on a technical matter way over their >heads, especially on a currently very sensitive issue like potential >invasion of privacy? Uh, considering that I have in the past had to lecture the prosecutors in my area on this very subject, prolly in my favor, Steve. :O) > > Reason I ask is that I am building such a circuit for a shotgun mic, > and have been told by a busybody >that it won't be legal. > >How would using it, or possibly even possessing it under the provisions of >18 USC 2511 and 2512 be legal? Because we Law Enforcement types, like Batman, always have the coolest stuff. >Even if you were in a one party consent state, enlighten us on how you, >using a shotgun mike as neither party, could legally use the thing? I am kind of disappointed in you Steve, it should have been fairly apparent. Without discussing details that could compromise the case, we have an individual who has some countersurveillance knowledge who likes to sell machine guns by the barrel. We have a cooperating witness, but cannot wire witness because individual has one of them damn spyshop scanlock wannabe things, and the distance from CI to LP, well, anyways; a wire is out. Have tried cheapie recorders, because I don't know that the guy has a bias oscillator detection capability, with limited success. Since his area of operations is wooded, I was thinking parabolic or shotgun microphone, because I am in there videoing anyways. I field tested a proof of concept microphone, but I determined that I would have to spend a long time cleaning up the audio. So, that's where I am at. (Or, for you, Steve, I have consent of one [maybe more, can't disclose] party. I just need a way to intercept the audio.) >If you're only birdwatching, you never would have posed the question. >Therefore you are considering a surveillance application. Which is why I posed this query to a surveillance newsgroup, and not alt.audibon.peeping.tom.whatever. But, honestly enough, I have learned a great deal about those types of audio intercept techniques from them. Those people lay down some SERIOUS cash; DAT gear, Dan whatshisface parabolics, broadcast video. They're crazy. >And you lose, under federal and most state laws. Well, not only being a practicing spook, but a bomb tech as well, I never lose. It's not personal. I stop people from doing their naughty things. I don't care what the jail time or fines are. To rip off and bastardize a motto from some guys I've trained with, I arrest the guilty, protect the innocent, and convince the undecided. As long as I stay in my parameters, how CAN I lose? I was really hoping for some words of encouragement from Mr. Kaiser, are you still on this list? from other responses......... >The field techs around L.A. that do this kind of thing take great pride in >writing with magic marker, "FBI TAP or FBI MONITOR," on pieces of paper >they rubberband around their connections inside the B boxes. Is this for real? It really shouldn't surprise me, though. I ACTUALLY had Federal agents attempt to order me to carry prisoners in a surveillance van one time. Them guys can move paper like nobody, but they can NOT run a street-level operation. >Bellsouth, on the other hand, insisted the tap be done outside the CO.They >would supply an appearance point and the appropriate binding post ID's. They tried that with us, too. I really don't blame them, considering *some* of the contact that they've had with Law Enforcement. I have never had any problems, though. Quick call to BS security, appropriate paperwork, no problems. But, it is easier to run audio and pin registers from the office, so having them bridge and punch down a spare pair at the office aint too bad either. I still haven't talked them out of a BS hardhat yet, though..... (Ever try to covertly climb a pole wearing spikes in the dark when the pole is at the end of the target's driveway...) yup! Gotta be careful with that around here, though. Even covertly, too many would people pester ya, trying to give you $100 to 'fix' their cable while you're up there! Shawn 3527 From: Shawn Hughes Date: Fri Aug 17, 2001 0:52pm Subject: Re:CCTV questions Ron, In essence, I have to agree with the jib of Mr. Uhrig's statements. I have come to the conclusion that in order to be any good at surveillance / observation video, you have to have the eye of a big-screen Director of Photography, the heart of a jewel thief, and the butt of a techno-nerd. However, I think that you can handle the job yourself. Farming out jobs is a good answer because it insulates you from a TON of aggravation, and there's no tools to buy! The key to a successful install, is to truly know what you want to accomplish. Most people will say, "I need a camera here, and here." My stock response is always, " What EXACTLY are you wanting to see?" Then, I ask, "What do you want to do with it once you see it?" The more defined answer you can obtain, the easier your job becomes. For instance...... "I need an outside color camera that will operate on a swivel of about 120 degrees and be sharp enough to recognize faces at about 100 yards. " This, video-wise, is a very tall and expensive order to fill. (Mr. Uhrig is dead on about those Pelco Spectra domes. Them things, while very expensive, are AWESOME!) Instead, find out what he is wanting to see. Is it a parking lot? Is it two seperate targets? Could it be handled by two (or more) $200 cameras, instead of a $1200 low-lux pan rig? When is what he is wanting to observe happening? Color falls off towards night. Black and white is cheaper, with a little help, can see in the dark, and is cheaper. Color cameras are very light greedy (ever see a movie set?) The second part of that is the "100 yards" part. Take your video camera outside, and shoot something at that distance. The best answer is always to bring the intercept device closer. It is a MAJOR pain in the butt to produce readable images at that distance. I regularly do bank robbery surveillance pictures, they are crappy @ 15 -20 feet! Next is on the covert cam for the employee desks. If it is to protect their desks from marauding cleaners, and operated when the cleaners are there, that's one subject. If he is watching them, and has warned them, that's another. If he is observing them w/o consent absent an articulable cause (recurring thefts, etc.), he might be in for some trouble, should he be discovered. Aimee might be able to pick this one up, I always say no to this kind of install ( I do this stuff outside of work, by the way ). Finally, is the transmit over Internet option. This will effectively take your $10,000 system, and magically transform it into baby-monitor quality video. This will take your $1,000 system, and really put it at the threshhold of intelligibility. The system relies on compression and bandwidth for transmission, the two enemies of a signal. So, if it's hooked into a DSL / ADSL / cable modem, it might be ok, but a >56k dial up, it's gonna suffer. Once again, ask him what he is wanting to do, just watch it from the house, or does he travel a lot? Finally, on the topic of installation, I know you're a ham, so no lecture from me on connector theory. Did you know that BNC stands for British Naval Connector? Thats what I was told. Anyways, apply your transmission theory knowledge to an average 1v p-p signal, and respond accordingly. Here are two excellent places to buy things: www.supercircuits.com http://www.shieldselectronics.com/ ask for Katrina or Tim in the Knoxville Store. They also got good deals on security alarm system components too. Just tell them where you know me from. ( I've prolly purchased over 20 grand worth of stuff from them....) And, of course, after you go back and talk to him, feel free to email me off-list. I'll get as in-depth as you need (or want!) Good luck! Shawn At 03:55 8/17/01 , you wrote: >Message: 2 > Date: Thu, 16 Aug 2001 07:29:38 -0700 > From: Ron Cheshire >Subject: Help with camera selection > >I need some advice. >I have a customer that needs to update his security camera system.The existing >cameras are so old that you can't see anything more than shadows. I need an >outside color camera that will operate on a swivel of about 120 degrees and be >sharp enough to recognize faces at about 100 yards. > >NEXT, I need a covert color camera in a fire alarm that can be put on the >ceiling of a room, to watch two employees desks. > >I then need a duplexer that will allow both video images to be placed on ONE >screen that can be video taped and also be sent to the internet. > >Any help for types and sources would be appreciated. > >Thanx > >Ron C. >ACI International 3528 From: James M. Atkinson Date: Fri Aug 17, 2001 1:58pm Subject: Re:CCTV questions At 1:52 PM -0400 8/17/01, Shawn Hughes wrote: >Ron, >In essence, I have to agree with the jib of Mr. Uhrig's statements. I have >come to the conclusion that in order to be any good at surveillance / >observation video, you have to have the eye of a big-screen Director of >Photography, the heart of a jewel thief, and the butt of a techno-nerd. Partially correct... you are right about the eye of a director.... however, you need the hands of a surgeon, the heart or a nerd, and the balls (not the heart) of a cat burglar (sorry for being rude) >However, I think that you can handle the job yourself. Farming out jobs is >a good answer because it insulates you from a TON of aggravation, and >there's no tools to buy! The key to a successful install, is to truly know >what you want to accomplish. Most people will say, "I need a camera here, >and here." My stock response is always, " What EXACTLY are you wanting to >see?" Then, I ask, "What do you want to do with it once you see it?" The >more defined answer you can obtain, the easier your job becomes. > >For instance...... "I need an outside color camera that will operate on a >swivel of about 120 degrees and be sharp enough to recognize faces at about >100 yards. " This, video-wise, is a very tall and expensive order to >fill. (Mr. Uhrig is dead on about those Pelco Spectra domes. Them things, >while very expensive, are AWESOME!) Instead, find out what he is wanting >to see. Is it a parking lot? Is it two seperate targets? Could it be >handled by two (or more) $200 cameras, instead of a $1200 low-lux pan rig? >When is what he is wanting to observe happening? Color falls off towards >night. Black and white is cheaper, with a little help, can see in the dark, >and is cheaper. Color cameras are very light greedy (ever see a movie set?) IMHO, lots of static cameras are better then PTZ platforms. Of course you still want PTZ for parking lots and in cases where you simply can't mount a camera in a tree. >The second part of that is the "100 yards" part. Take your video camera >outside, and shoot something at that distance. The best answer is always to >bring the intercept device closer. It is a MAJOR pain in the butt to >produce readable images at that distance. I regularly do bank robbery >surveillance pictures, they are crappy @ 15 -20 feet! They are crappy at 15-20 feet because in reality banks rarely take surveillance seriously, if they did they would be using digital image recorders, an not tape. >Next is on the covert cam for the employee desks. If it is to protect their >desks from marauding cleaners, and operated when the cleaners are there, >that's one subject. If he is watching them, and has warned them, that's >another. If he is observing them w/o consent absent an articulable cause >(recurring thefts, etc.), he might be in for some trouble, should he be >discovered. Aimee might be able to pick this one up, I always say no to >this kind of install ( I do this stuff outside of work, by the way ). > >Finally, is the transmit over Internet option. This will effectively take >your $10,000 system, and magically transform it into baby-monitor quality >video. This will take your $1,000 system, and really put it at the >threshhold of intelligibility. The system relies on compression and >bandwidth for transmission, the two enemies of a signal. So, if it's hooked >into a DSL / ADSL / cable modem, it might be ok, but a >56k dial up, it's >gonna suffer. Once again, ask him what he is wanting to do, just watch it >from the house, or does he travel a lot? > >Finally, on the topic of installation, I know you're a ham, so no lecture >from me on connector theory. Did you know that BNC stands for British Naval >Connector? Thats what I was told. Anyways, apply your transmission theory >knowledge to an average 1v p-p signal, and respond accordingly. Ah, nope... BNC means "Bayoneted Naval Connector" >Here are two excellent places to buy things: > >www.supercircuits.com I would disagree, in my professional opinion Supercircuits products are utter and complete shit, and are little more then Radio Shack quality junk hawked for outrageous prices. Stay with professional equipment, not consumer toys. >http://www.shieldselectronics.com/ ask for Katrina or Tim in the >Knoxville Store. They also got good deals on security alarm system >components too. Just tell them where you know me from. ( I've prolly >purchased over 20 grand worth of stuff from them....) > > >And, of course, after you go back and talk to him, feel free to email me >off-list. I'll get as in-depth as you need (or want!) > >Good luck! > >Shawn -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3529 From: Date: Fri Aug 17, 2001 5:13am Subject: Broward Officials Want Students to Try Hacking Mock Election http://ap.tbo.com/ap/florida/MGAJ6W8YGQC.html Aug 16, 2001 Broward Officials Want Students to Try Hacking Mock Election FORT LAUDERDALE, Fla. (AP) - Broward County officials considering the $20 million purchase of a touchscreen voting system want students to try to tamper with the computers during a mock election. "One of the biggest concerns raised is whether there is the potential for computer abuse, and we really need to see how foolproof or tamperproof this equipment is," county commission Chairman John Rodstrom said. "If there is a problem, it will happen now or later. And some of these kids are pretty smart." Broward Supervisor of Elections Miriam Oliphant is pushing for the touch-screen system, which records votes on computer discs after voters use a video monitor to choose candidates. Broward is forced to get rid of the punchcard ballots used in the last election. State lawmakers outlawed punchcards as part of an election reform package quickly pulled together after the embarrassing presidential election. Florida was the butt of jokes around the world as the country waited for a resolution to the presidential election while election workers squinted at ballots looking for dimples, pinpricks or hanging chads. Commissioners have two concerns about touch-screen voting: the cost and security. They want to hold mock elections at high schools and senior citizen communities to test computerized voting systems. The commission also wants the students to try to hack in during the mock vote. Some school board members don't want to send the wrong message to students by asking them to break into computers. "Hackers in training? I don't think so," said school board chairman Paul Eichner. "It's not the image I want for the Broward County School District." Not that there isn't precedent. A student once used a school district computer to hack into Canada's version of the CIA. Commissioners could also choose a far less expensive optical scan voting system, which Oliphant has said would cost the county $7 million. But Oliphant has said optical scan ballots, on which voters fill in a bubble or connect the ends of an arrow, can lead to missed votes and mistakes. The touch screen test would help show if the computers are as easy to use and mistake-free as touted and how easy it is to create a paper record of the vote from the computer discs. AP-ES-08-16-01 1547EDT ******************************************** John R. Angier II M-Group P.O. Box 721388 Norman, OK 73070-8070 USA w 405.321.1015 f 405.321.1259 A fundamental principle is never to remain completely passive, but to attack the enemy frontally and from the flank, even while he is attacking us. - Clausewitz:Principles of War, 1812 3530 From: Date: Fri Aug 17, 2001 11:41am Subject: GAO: FBI Doesn't Always Share Info GAO: FBI Doesn't Always Share Info By KAREN GULLO .c The Associated Press WASHINGTON (AP) - When the FBI investigates spy cases, it doesn't always tell federal prosecutors that it uncovered possible federal crimes, a government report said. When the FBI does share the information, often it's too late to be of any use, concluded a report by the General Accounting Office released Wednesday. Justice Department policies require the FBI to coordinate counterintelligence investigations involving suspected criminal violations with lawyers from the department's criminal division. Sen. Fred Thompson, R-Tenn., who requested the report, said the problem hurts the government's chances of prosecuting spies. ``Opportunities may be lost to preserve and enhance the government's option of bringing criminal prosecutions against spies, terrorists or other criminals,'' said Thompson, a ranking member of the Senate Governmental Affairs Committee. The report comes at a sensitive time for the FBI, which has had a number of black eyes in recent months, including the arrest of an FBI spy, and the disclosure of hundreds of lost or missing weapons and computers. The GAO findings also come on the heels of a Justice Department report, portions of which were released Monday, highly critical of the FBI's handling of the Wen Ho Lee case. The department's report said the FBI did not provide the Justice Department with all the information it had collected when it requested permission to bug Lee's home and office. The department rejected the FBI request. Lee was never charged with spying and denied giving information to China. The GAO report focused on intelligence gathered through surveillance allowed under the Foreign Intelligence Surveillance Act, which authorizes wiretapping. Evidence gathered under an FISA warrant may be used in a criminal proceeding as long as the primary purpose of the warrant was to obtain foreign intelligence information rather than to pursue a possible criminal prosecution. Current Justice Department procedures require the FBI to notify the criminal division when wiretaps uncover facts ``that reasonably indicate'' a crime has been, is being or may be committed. The FBI is supposed to brief division officials on investigations that merit their attention. But the FBI has been reluctant to share intelligence information gathered through wiretaps for fear that federal courts and a special court that approves wiretap requests would raise questions about the primary purpose of the surveillance, the report said. The Justice Department's Office of Intelligence Policy and Review, which must approve FBI requests for wiretaps, shared the bureau's concerns, the GAO reported. Justice Department procedures ``led to a significant decline in coordination between the FBI and the criminal division,'' the GAO said, because of disagreements between the FBI and the criminal division about what potential criminal violations are significant enough to merit coordination. The GAO recommended several steps to ensure that the FBI is alerting the criminal division of possible criminal violations it uncovers as part of its investigations. Janis Sposato, acting assistant attorney general for administration, said the Justice Department, of which the FBI is part, has fully or partially implemented the GAO's recommendations. Deputy Attorney General Larry Thompson sent a memo to the criminal division, the Office of Intelligence Policy and Review and the FBI reiterating the department's policies for intelligence sharing. A spokesman said they were being followed. ``As part of a collaborative process, these procedures were developed and are now implemented by the FBI,'' bureau spokesman John Collingwood said. ``They were needed to bring further clarity in a sensitive area of operations.'' 3531 From: James M. Atkinson Date: Fri Aug 17, 2001 5:16pm Subject: Accused spy's counsel to talk with Riken staff Saturday, August 18, 2001 Accused spy's counsel to talk with Riken staff http://www.japantimes.co.jp/cgi-bin/getarticle.pl5?nn20010818b5.htm WASHINGTON (Kyodo) Lawyers for one of two Japanese researchers accused of stealing genetic material from a U.S. laboratory said Thursday they plan to interview staff of a Japanese science institute where the two formerly worked before full-fledged court deliberations begin. The plan was unveiled in a preparatory hearing for Hiroaki Serizawa in the federal district court in Akron, Ohio. The lawyers said they will first study the contents of a report presented by the Institute of Physical and Chemical Research, or Riken, in late July on the industrial spying allegations. They will then submit a petition to the court to interview Riken staff in Japan if they find the report includes evidence that could help their client. After the hearing, the lawyers said they will also interview Takashi Okamoto, the other Japanese scientist indicted for espionage. Conducting such interviews is expected to take about three months, they said. If the lawyers carry out investigative interviews in Japan, the scheduled Nov. 5 start of Serizawa's trial may be delayed. Federal prosecutors in Ohio indicted Okamoto and Serizawa in May on charges of stealing genetic materials on Alzheimer's disease developed by the federally funded Cleveland Clinic. After resigning from his research position at the Cleveland Clinic in July 1999, Okamoto was employed by Riken in Japan. On July 31, Riken issued a statement denying organized involvement in the alleged spying. On the same day, Riken accepted a letter of resignation from Okamoto, which he tendered earlier in the month. He remains in Japan. Restrictions announced AKRON, Ohio (AP) A federal judge has decided not to bar the public and reporters from the trial of a Japanese scientist accused of helping to steal research materials from a Cleveland Clinic. But because of concerns that the trial may reveal research secrets, there will be restrictions when the espionage trial opens Nov. 5. U.S. District Judge David Dowd Jr. will take the unusual step of preventing courtroom spectators from seeing some of the evidence. A video screen in the courtroom where researcher Hiroaki Serizawa will be tried will be removed or covered so spectators can't see documents that the judge, lawyers and jury will view on computer monitors. Anyone who wants to review the evidence will have to seek permission in writing, explaining whom they work for and why they want to inspect the material. Prosecution or defense lawyers will have 24 hours to object. "In the court's view, the plan is a measured response which protects the competing interests of all concerned," said Dowd in his ruling, released Thursday. Serizawa, a researcher at the University of Kansas Medical Center, and his friend and former Cleveland Clinic scientist Takashi Okamoto are charged with violating the Economic Espionage Act. Okamoto allegedly stole or destroyed materials used for Alzheimer's disease studies in a Cleveland Clinic lab after taking a research job in Japan. Serizawa is accused of briefly storing some of the stolen materials and aiding in covering up the theft. The 1996 law makes it a crime to steal trade secrets to benefit a foreign entity, in this case the government-funded brain institute where Okamoto worked until he resigned last month. Okamoto is living in Japan and it is unclear whether he will return to face trial. Justice Department attorneys contend the biological materials Serizawa and Okamoto are accused of stealing or destroying are trade secrets. The Japan Times: Aug. 18, 2001 -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3532 From: Date: Sat Aug 18, 2001 0:15am Subject: Bill to monitor terrorists and criminals through telecommunications interception Off Jane's News Briefs 16 August 2001 - South Africa - A bill to monitor terrorists and criminals through telecommunications interception, which was quietly passed by South Africa's cabinet in July, is being opposed widely in the country, BBC reported on 13 August. Opponents say the Interception and Monitoring Bill is draconian, describing it as a charter for government spying. The bill provides for state monitoring of all telecommunications systems, including mobile phones, internet and e-mail, once permission has been granted by relevant authorities. In most cases a judge must grant the order, but in some instances a police or army officer of a particular rank may do so. Opposition to the bill was slow at first, but some media organizations are now attacking the proposed legislation as a threat to the constitutional right to privacy and freedom of speech. *************************************** John R. Angier II M-Group P.O. Box 721388 Norman, OK 73070-8070 USA w 405.321.1015 f 405.321.1259 "For every complex problem there's a simple solution. And it's wrong." H.L Mencken 3533 From: Shawn Hughes Date: Sat Aug 18, 2001 4:46am Subject: huh >I would disagree, in my professional opinion Supercircuits products >are utter and complete shit, and are little more then Radio Shack >quality junk hawked for outrageous prices. Stay with professional >equipment, not consumer toys. You're kidding? Ok, I then pose the question, if you were on a shoestring budget, where would you get a camera from? I try to look at all the trade journals and websites I can, so that not only can I price compare, but so that I can familiarize myself with what to look for on a sweep. It all looks the same, just varying prices. I wished I had a direct Japan source sometimes. Back to the Supercircuits issue, I've had a lot of luck with the b/w w/ built-in IR lipstick cams. Shawn 3534 From: Shawn Hughes Date: Sat Aug 18, 2001 2:47pm Subject: bnc not to disagree with you, Jim, but here is the actual definition, from an email I recieved........ >Short for British Naval Connector or Bayonet Nut Connector or Bayonet >Neill Concelman, a type of connector used with coaxial cables such as the >RG-58 A/U cable used with the 10Base-2 Ethernet system. The basic BNC >connector is a male type mounted at each end of a cable. This connector >has a center pin connected to the center cable conductor and a metal tube >connected to the outer cable shield. A rotating ring outside the tube >locks the cable to any female connector. PS - THANKS to all who have emailed me off line about the compandering subject. Thats what I thought too. On a different subject, who has the best tale about the strangest place they found a device? I would like a couple of good stories to relate............ Shawn [Non-text portions of this message have been removed] 3535 From: James M. Atkinson Date: Sun Aug 19, 2001 9:28am Subject: Your Father Is a Spy 'Your Father Is a Spy' http://www.washingtonpost.com/wp-dyn/articles/A20983-2001Aug16.html Lives of CIA Man, Family Turned Into Turmoil as FBI Pursued Wrong Guy By Dan Eggen Washington Post Staff Writer Sunday, August 19, 2001; Page A01 The 28-year-old CIA personnel employee was escorted into a cramped, windowless room with a small table and four metal chairs. "Please sit down," a waiting FBI agent told her. "We have some bad news for you." "Your father is a spy," the agent told the woman. "He's working for the Russians." In another building on the CIA campus in Langley, in another small and windowless room, her father -- a decorated agency veteran of nearly 20 years -- was being accused of espionage. Thus began one family's ordeal at the hands of the FBI, which fingered the wrong man in its quest to unmask a spy, upending the lives of the CIA officer and his three children for the next two years. The accusations leveled in August 1999 prompted the CIA to suspend the officer for 21 months. He remained under surveillance, and his daughter was denied a promotion. His ex-wife, two sons and two sisters were interrogated at work and at home by FBI agents who cast doubt on the man they thought they knew. Friends and colleagues whispered about the traitor in their midst. All of it turned out to be wrong. The real spy was Robert P. Hanssen, an FBI counterintelligence agent who pleaded guilty last month to 15 counts of espionage. The CIA officer returned to work in May with all his security clearances restored. "There are no lingering doubts or suspicions here," a CIA official said. FBI officials say that while they regret the impact on the intelligence officer and his family, the bureau's rough tactics were justified by the magnitude of the national security breach. The FBI partly blames a startling coincidence: Both the man and Hanssen lived on the same street near Nottoway Park in Fairfax County, where Hanssen left some of the secrets he compromised to the Russians. But the CIA officer's sons and daughter said in interviews with The Washington Post last week that they are still haunted by the actions of the FBI, which left their family in limbo for two years and has rebuffed their request for a full apology. Because The Post does not identify covert U.S. intelligence operatives except in rare circumstances, the names of the man and his family have been withheld from this article. His children wonder what would have happened if the FBI had not obtained a KGB dossier that pointed to Hanssen. The daughter says she still has nightmares about the investigation. The sons are suspicious of a government they once revered. "We were raised to be patriotic, to love our country and respect authority," said the youngest son, 32, who co-owns a copy-machine business in Virginia. "I'm still patriotic today, but I don't feel the same way about a lot of things -- about the FBI, about people in power. They're not always telling the truth like they say they are." 'We Know What He Did' The CIA officer's youngest child loved and revered her father. She followed in his footsteps by joining the agency, thrilled by its clandestine side and comforted by its familial culture. When the FBI accused her father of treason, her world was set on end. Trapped in the stifling room, she began to weep uncontrollably. She stood up and turned away from the two FBI agents and the CIA representative who were there, facing the wall as the sobs came in waves. "I was hysterical," recalls the woman, now 30. "I was ashamed." When she resumed her seat, an older male agent began the interrogation while a younger female took notes. The agent showed the daughter one of her father's jogging maps, alleging it pinpointed the location of "dead drops," hiding places for passing secrets to Russian operatives. He said her father -- who clips coupons and drives to Woodbridge for less expensive gasoline -- had a fascination with diamonds and other luxuries. He said that the man who typed with two fingers on his outdated Tandy PC was a mastermind of computer codes. Her denials only angered him. "Come on!" the agent screamed, pounding the table repeatedly. "We know what he did!" The story was similar from Virginia to Connecticut, from New York to Kentucky. FBI agents fanned out in pairs on Aug. 18, 1999, descending on scattered members of the family wherever they could be found. The message was always the same: Your beloved relative, awarded five commemorative medals for his work on behalf of the United States, is really a Russian spy. We have all the proof we need, and only need to confirm a few basic facts. In Connecticut, two agents warned one of the officer's sisters that, if she didn't cooperate, the FBI would go to a nursing home to interrogate her infirm mother, 84. In Kentucky the next morning, two agents caught up with the officer's youngest son at his office. He had just returned to work after the birth of his second child. They accused the son of holding property he did not really own, and of using a Social Security number that was not his. They asked about his father's alleged financial extravagance, and showed him a map he did not understand. The agents said it came from his father's den, and that it reflected a secret life of espionage. After more than an hour, the son stumbled out of the interrogation, past whispering co-workers and into the drizzle outside. "I felt like I didn't want to be alive," recalls the man, who has since moved back to Northern Virginia. "You believe your father and all that. But when they come in like that and say they have it all locked up, it's hard not to wonder: Could it be true?" By the end of the second day, Aug. 19, the FBI had tracked down the last of the CIA officer's direct relatives. His oldest son was in Manhattan on business, and was about to catch a flight back to Washington when his phone rang. Three FBI agents insisted on giving him a ride to LaGuardia Airport, quizzing him while trapped in rush hour traffic. He called his father the minute he got home that night, and drove over to his Vienna house, which happens to be on the same street as Hanssen's. His father met him in the driveway. "I just want to make sure you believe me," the father said. "You never have to worry about that," the son replied, and they hugged. 'Wrong Conclusions' The investigation that eventually netted Hanssen was not the first time that the FBI, or any other intelligence agency, has been so terribly wrong. Just last week, the Justice Department released portions of a report on the investigation of Los Alamos nuclear scientist Wen Ho Lee. It concluded that the FBI and the Energy Department may have gotten the wrong man, and for a crime that might not even have been committed in the first place. Meanwhile, a fugitive abortion clinic bomber is now the suspect in the Atlanta Olympics bombing case, first pinned on security guard Richard Jewell. Yet many intelligence experts are particularly discomfited by the emerging details of the case against the CIA officer, which sources said was based largely on the man's circumstantial connections to several cases that later turned out to have been compromised by Hanssen. One of these was the investigation of Felix Bloch, a State Department official suspected of, but never charged with, spying. The CIA officer was awarded a medal for his role in unmasking a Soviet agent who had telephoned Bloch and thus cast Bloch under suspicion. But Bloch was soon warned by the KGB, derailing a planned arrest. The interrogations also indicate that the FBI placed a great deal of stock in the mysterious map recovered from the officer's home, which turned out to be the jottings of an avid distance runner with meticulous record-keeping habits. He also keeps a list of radio stations he tunes in during trips to Connecticut, and maps out all journeys before departing, his family says. The man jogged in Nottoway Park near his home, an area that the FBI learned had been used for exchanges with Russian agents. In hindsight, there are other connections between the CIA officer and Hanssen -- besides living near each other, they were companions on an intelligence-related trip, for example -- but those connections were coincidences learned after the probe shifted to Hanssen, sources said. "There are a whole litany of examples throughout the western world of counterintelligence services jumping to the wrong conclusions," said David Major, a former FBI counterintelligence official. "This phenomenon of putting people on lists and investigating them goes with the territory. But if you can't prove it, you have a responsibility not to go too far in your tactics." The tactics used against the CIA officer were many and varied. Before the FBI confronted him as a suspect, for example, the man was subjected to a polygraph test under false pretenses, which he passed, according to his attorney, John Moustakas of Shea & Gardner. Later, a person posing as a Russian emissary was sent to his house to say that his espionage had been detected and to offer an escape plan; the CIA officer reported the incident the next day, the lawyer said. The FBI also engaged in secret searches of the man's garbage and of his home, which turned up the alleged spy map. He was put under physical and electronic surveillance. His family says they had chronic telephone problems during that period, and a Bell Atlantic technician discovered a bug on the line at his Vienna home. FBI officials did not respond to three telephone calls seeking comment for this article. But in a June letter to the man's attorney, Acting FBI Director Thomas J. Pickard said that while he regretted the investigation's impact on the officer and his family, "I do not doubt the necessity of the investigation, nor the integrity of the personnel who carried it out." Moustakas compared that response to the form letter that an airline would send a passenger whose flight was delayed. "My client was not merely inconvenienced," Moustakas wrote Pickard. "His life was turned upside down." The FBI had no other contact with the officer or his family after he was placed on paid administrative leave in August 1999, according to his relatives and Moustakas. For 18 months, the family said, they were left hanging, wondering when a knock would come on the officer's door or if his name would suddenly flash on television. "What hurts most is having to keep it all inside," said the officer's eldest son, 36, who is married and has a young daughter. "You can't tell anyone what you're going through." Six months ago, on Feb. 18, a friend of the oldest son asked if he had seen the news: The FBI had arrested a spy. The son caught his breath. "What was the name?" he asked. His friend couldn't recall. The son picked up the phone to dial his father, fearing that he wouldn't be there because he was in jail. His father answered. Dad wasn't a spy after all. C 2001 The Washington Post Company -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3536 From: James M. Atkinson Date: Sun Aug 19, 2001 1:39pm Subject: Darwin Awards ---------------- MORTAL INSULT -- Darwin Award Nominee Snake Got Your Tongue? (1992, California) Snakes flick their forked tongues in the air to "smell" the world, collecting molecules then pressing the tips into small olfactory pits. An inebriated twenty-year-old man took umbrage when a wild rattlesnake stuck out its tongue at him. Tit for tat! He held the snake in front of his face and stuck his tongue out right back at the rattler. The snake expressed his displeasure at this turn of events by biting the conveniently offered body part. The toxic venom swelled the man's face and throat, choking him to death. -Reference San Francisco Chronicle (confirmed) ---------------- WIPED OUT -- Darwin Award Nominee It's still not clean! (4 September 1999, Tokyo, Japan) Shoshi was a part-time janitor until his eagerness to do a good job collided with an unhealthy inability to attend to his own safety. The elevator he was cleaning had water leaking from its ceiling, so he rode a second elevator up the shaft, climbed out its hidden side door, and hopped on top of the first elevator. As he cleaned the puddle from the roof, the car rose to the top floor, fatally crushing him. The 24-year-old had forgotten to turn off the leaking elevator before wiping up the spill, leaving the roof messier than before. Reference: Mainichi Daily News ---------------- ROB PETER TO PAY PAUL -- Honorable Mention (16 July 2001, Union City, Tennessee) A woman ordered to pay off $1100 in bad checks left the courthouse, drove to her hometown, and pulled a gun on employees at the First State Bank. She fled into a cornfield with $7000, eluded the hastily-organized search party, and made her way back to Union City to pay her debt. But given the small size of her hometown, with a population of 344, it was inevitable that one of the tellers would recognize her. Police were waiting at her home to arrest her and confiscate the remainder of the money. Reference: Boston Globe ---------------- -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3537 From: William Knowles Date: Mon Aug 20, 2001 2:11am Subject: Soviet coup was sparked by wiretap http://www.theage.com.au/breaking/2001/08/20/FFX6EP55LQC.html Source: AFP|Published: Monday August 20, 10:57 AM WASHINGTON - A wire-tapped conversation between President Mikhail Gorbachev and other Soviet leaders in which he discussed plans to remove the KGB chief and the minister of defence triggered a 1991 coup attempt, Gorbachev revealed in an interview published today. The revelation, in an interview with the Los Angeles Times, gives a new insight into the rationale behind the failed putsch, which precipitated the collapse of the Soviet Union 10 years ago. Coup organisers have claimed they were driven by a patriotic desire to save their country from disintegration and chaos while their opponents have insisted the plotters were out to protect the bankrupt Communist regime. But Gorbachev said the plotters were prompted to make a move by a confidential conversation he had with Boris Yeltsin, then president of the Russian Republic, and Nursultan Nazarbayev, the Kazakh leader, on either July 29 or 30. He said the three discussed the upcoming signing of a new union treaty between the 15 Soviet republics as well as the future of KGB chief Vladimir Kryuchkov and defence minister Dmitry Yazov. "The issue came up that many people should be replaced, those who had reached retirement age, who were a burden," Gorbachev pointed out. "And we listed names - Yazov, Kryuchkov." The former Soviet leader said no harm was meant to either of the two officials. "They would have been pensioned off as generals and marshals, with their dachas intact," he said. But he said the conversation was being secretly taped by the KGB secret police, and Kryuchkov soon learned his days in office were numbered. "They were recording everything. We were being wire-tapped," the former president complained. He said Kryuchkov, seen as the chief mastermind of the botched coup, later used the recording to persuade a reluctant Yazov to join the plot and order troops into Moscow. Tanks moved into key positions in the Soviet capital August 19, 1991, when Gorbachev was vacationing in Crimea. But the coup, led by Kryuchkov and other members of the so-called "emergency committee," fizzled as rank-and-file soldiers refused to crack down against reformers and declared their support for Yeltsin. Gorbachev said the plotters had been ultimately fighting for their jobs and perks and their assertions that they were out to save the Soviet Union "is just a smokescreen." *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 3538 From: Craig Snedden Date: Mon Aug 20, 2001 2:48am Subject: Re: bnc I'd agree with both British Naval Connector & Bayonet Neil Concelman. During my military days it was called both. AMP connectors call it a Bayonet Neil Concelman and since they make the things....... Have a nice week! Craig ----- Original Message ----- From: "Shawn Hughes" To: Sent: Saturday, August 18, 2001 8:47 PM Subject: [TSCM-L] bnc > not to disagree with you, Jim, but here is the actual definition, from an > email I recieved........ > > > >Short for British Naval Connector or Bayonet Nut Connector or Bayonet > >Neill Concelman, a type of connector used with coaxial cables such as the > >RG-58 A/U cable used with the 10Base-2 Ethernet system. The basic BNC > >connector is a male type mounted at each end of a cable. This connector > >has a center pin connected to the center cable conductor and a metal tube > >connected to the outer cable shield. A rotating ring outside the tube > >locks the cable to any female connector. > > > PS - THANKS to all who have emailed me off line about the compandering > subject. Thats what I thought too. > > On a different subject, who has the best tale about the strangest place > they found a device? I would like a couple of good stories to > relate............ > > Shawn > > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 3539 From: James M. Atkinson Date: Mon Aug 20, 2001 4:22pm Subject: A jury of peers A jury of peers: 1. January 2000: Kathleen Robertson of Austin Texas was awarded $780,000.00 by a jury of her peers after breaking her ankle tripping over a toddler who was running amok inside a furniture store. The owners of the store were understandably surprised at the verdict, considering the misbehaving tyke was Ms. Robertson's son. 2. June 1998: A 19 year old Carl Truman of Los Angeles won $74,000.00 and medical expenses when his neighbor ran his hand over with a Honda Accord. Mr. Truman apparently didn't notice someone was at the wheel of the car whose hubcap he was trying to steal. 3. October 1998: A Terrence Dickson of Bristol, PA, was exiting a house he finished robbing by way of the garage. He was not able to get the garage door to go up, the automatic door opener was malfunctioning. He couldn't reenter the house because the door connecting the house and garage locked when he pulled it shut. The family was on vacation, so Mr. Dickson found himself locked in the garage for eight days. He subsisted on a case of Pepsi he found, and a large bag of dry dog food. This upset Mr. Dickson, so he sued the homeowner's insurance claiming the situation caused him undue mental anguish. The jury agreed to the tune of half a million dollars and change. 4. October 1999: Jerry Williams of Little Rock, AK was awarded $14,500.00 and medical expenses after being bitten on the buttocks by his next door neighbor's beagle. The beagle was on a chain in its owner's fenced-in yard, as was Mr. Williams. The award was less than sought after because the jury felt the dog may have been provoked by Mr. Williams who, at the time, was shooting it repeatedly with a pellet gun. 5. May 2000: A Philadelphia restaurant was ordered to pay Amber Carson of Lancaster, PA, $113,500.00 after she slipped on a spilled soft drink and broke her coccyx. The beverage was on the floor because Ms. Carson threw it at her boyfriend 30 seconds earlier during an argument. 6. December 1997: Kara Walton of Claymont, Delaware, successfully sued the owner of a night club in a neighboring city when she fell from the bathroom window to the floor and knocked out her two front teeth. This occurred while Ms. Walton was trying to sneak through the window in the lady's room to avoid paying the $3.50 cover charge. She was awarded $12,000.00 and dental expenses. -jma -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3540 From: Miguel Puchol Date: Mon Aug 20, 2001 5:25pm Subject: RE: A jury of peers This, to me, shows that this legal system is somewhat imperfect - before you throw back a bucket of flames, I'll say that every country has it's own legal imperfections - here in Spain, for example, we have a problem with reincident criminals. There are two guys who, between them, account for more than 600 arrests -last year-, and every time they get put right back on the street...it's nuts. Whenever I hear these stories, I just can't imagine how people in their right minds would award such compensations, specially in cases where the person had put himself into the situation, like the robber surviving on dog food and pepsi (I can, however, imagine the mental stress he suffered...he he he). In any case, we had a really good laugh with them, all the best, Mike > -----Mensaje original----- > De: James M. Atkinson [mailto:jmatk@tscm.com] > Enviado el: lunes, 20 de agosto de 2001 23:22 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] A jury of peers > > > > A jury of peers: > > > > 1. January 2000: Kathleen Robertson of Austin Texas was awarded > $780,000.00 > by a jury of her peers after breaking her ankle tripping over a toddler > who was running amok inside a furniture store. The owners of the > store were > understandably surprised at the verdict, considering the misbehaving > tyke was Ms. Robertson's son. > > > > 2. June 1998: A 19 year old Carl Truman of Los Angeles won $74,000.00 > and medical expenses when his neighbor ran his hand over with a Honda > Accord. Mr. Truman apparently didn't notice someone was at the > wheel of the > car whose hubcap he was trying to steal. > > > > 3. October 1998: A Terrence Dickson of Bristol, PA, was exiting a house > he finished robbing by way of the garage. He was not able to get > the garage > door to go up, the automatic door opener was malfunctioning. > > He couldn't reenter the house because the door connecting the house > and garage locked when he pulled it shut. The family was on vacation, so > Mr. Dickson found himself locked in the garage for eight days. He > subsisted > on a case of Pepsi he found, and a large bag of dry dog food. > > This upset Mr. Dickson, so he sued the homeowner's insurance > claiming the situation caused him undue mental anguish. The jury agreed to > the tune of half a million dollars and change. > > > > 4. October 1999: Jerry Williams of Little Rock, AK was awarded > $14,500.00 and medical expenses after being bitten on the buttocks by his > next door neighbor's beagle. The beagle was on a chain in its > owner's fenced-in > yard, as was Mr. Williams. The award was less than sought after because > the jury felt the dog may have been provoked by Mr. Williams who, at the > time, was shooting it repeatedly with a pellet gun. > > > > 5. May 2000: A Philadelphia restaurant was ordered to pay Amber Carson > of Lancaster, PA, $113,500.00 after she slipped on a spilled soft > drink and > broke her coccyx. The beverage was on the floor because Ms. Carson threw > it at her boyfriend 30 seconds earlier during an argument. > > > > 6. December 1997: Kara Walton of Claymont, Delaware, successfully sued > the owner of a night club in a neighboring city when she fell from the > bathroom window to the floor and knocked out her two front teeth. This > occurred while Ms. Walton was trying to sneak through the window > in the lady's > room to avoid paying the $3.50 cover charge. She was awarded > $12,000.00 and > dental expenses. > > > > -jma > -- > > ---------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ---------------------------------------------------------------------- > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008jmatk@tscm.com > ---------------------------------------------------------------------- > Come, my friends, > 'Tis not too late to seek a newer world. > Push off, and sitting well in order smite > The sounding furrows; for my purpose holds > To sail beyond the sunset, and the baths > Of all the western stars, until I die. > - Tennyson, "Ulysses" > ---------------------------------------------------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3541 From: Aimee Farr Date: Mon Aug 20, 2001 5:53pm Subject: DOD Contractor Case ROTHE DEV. CORP. v. US DEP'T OF DEF., No 00-1171 (Fed Cir. August 20, 2001) Regarding DOD Contracts, and the "disadvantaged" preferences of 10 USC 2323 - court held it was subject to strict scrutiny and remanded @ http://laws.lp.findlaw.com/fed/001171.html ~Aimee From: Steve Uhrig Date: Thu Aug 15, 2002 2:12pm Subject: Re: Alpha 5 Mist tracking system On 15 Aug 2002 at 9:50, k9electron wrote: > Hi, Ive been reading the post on GPS tracking and thought I would > introduce a non GPS/GSM or even battery/mains powered tracking system > with a range of 600Km. > There is absolutely no R.F. present. This has been tested with the > best equipment on the market. Furthermore the tracking device or bug > as we call it does not operate by battery power. The size of the bug > is extremely small and they are made in different shapes, the largest > one is like a vitamin capsule. The smallest one is to be implanted > inside a tooth of the object. > The operational range of the tracking system is guaranteed to 6000 > kilometres. This is a classic example of what I have been referring to. The above product does not exist, cannot exist, and the SPY SHOP selling it has never seen it in operation. If they claim they have, they're lying. Textbook example of HYPERBOLE. I guess even spy shop operators have no limit as to the extent to which they themselves can be deceived. Of course, they claim to be experts. The fellow posting this and the website advertising it merely picked it up from some vaporware press release, act as if they invented it and actually have them to deliver. To save you the effort, if my mental math is correct, 6000 KM is roughly 3500 miles, or approximately the distance from the U.S. East Coast to the West Coast. You can implant this passive device in a tooth, and I.D. someone from the other end of the continent. Right. I'll take two. Better yet, let me be a distributor. Even if the infrastructure for receiving and monitoring, which conveniently was not mentioned, were all the NRO satellite assets this would still be impossible. Sad. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6004 From: Michael Puchol Date: Thu Aug 15, 2002 2:36pm Subject: Re: Re: Alpha 5 Mist tracking system Er... ----- Original Message ----- From: "Steve Uhrig" To: Sent: Thursday, August 15, 2002 9:12 PM Subject: [TSCM-L] Re: Alpha 5 Mist tracking system > To save you the effort, if my mental math is correct, 6000 KM is > roughly 3500 miles, or approximately the distance from the U.S. East > Coast to the West Coast. You can implant this passive device in a > tooth, and I.D. someone from the other end of the continent. Take this statement from the website: "Calibration requirements Minimum 18 months. Customer specified" So if I want to plant this inside some drug dealer's tooth, I'd have to send the drug dealer plus implanted bug to the manufacturer for an 18 month+ calibration period? Who's paying the accomodation, food, etc.? Says it all me thinks. Cheers, Mike 6005 From: A Grudko Date: Thu Aug 15, 2002 3:00pm Subject: Re: Alpha 5 Mist tracking system No, come on James, you wrote this to tease us ? ----- Original Message ----- From: k9electron <> To: Sent: Thursday, August 15, 2002 11:50 AM Subject: [TSCM-L] Alpha 5 Mist tracking system > Hi, Ive been reading the post on GPS tracking and thought I would > introduce a non GPS/GSM or even battery/mains powered tracking > system with a range of 600Km. > > The crucial, most important feature is that the system is totally > passive. > > There is absolutely no R.F. present. This has been tested with the > best equipment on the market. Furthermore the tracking device or bug > as we call it does not operate by battery power. The size of the bug > is extremely small and they are made in different shapes, the > largest one is like a vitamin capsule. The smallest one is to be > implanted inside a tooth of the object. > > The operational range of the tracking system is guaranteed to 6000 > kilometres. > > Looking at the technologies on the market today, the signal from the > ALPHA FIVE MIST) can not be jammed in any way > > The absolutely main factor here is that the bug is 100% passive. The > suspect will never know that there is anything installed or placed. > More strategically on covert operations because no equipment will > give any indication that an operation is going on. We even can > supply the bugs in metal or plastic versions. Metal detectors, or > non-linear junction detectors will of course not detect the latter. > The truly "invisible" bug is here. > > Nothing else on the market today has these specifications. > > more info at http://www.spy-equipment.co.uk/Tracking/tracking.html > Glenn 6006 From: Kirk Adirim Date: Thu Aug 15, 2002 1:37pm Subject: RE: Alpha 5 Mist tracking system Wow, I can't believe that they're still hawking this crap. I had my hands on this unit over 10 years ago at a surveillance trade show. It's nothing more than a block of plastic with a telescopic "rabbit ears" t.v. antenna and an insertable card tray that held what looked like carbon paper. I was told by the huckster that the trays (purchased seperately of course) held the molecular composition of whatever you were looking for, be it bugs, narcotics, explosives etc. The antenna was on a swivel base and would "point" to the target. You just followed it like a Divining Rod. All that was necessary was to insert the card of that particular "molecular property" to make the "Detector" sensitive to that item. You would purchase cards for each type of eavesdropping device, narcotic or explosive. Today they've jumped on the bandwagon offering Bio-chemical and GPS cards. Prime Time or 20/20 did an expose' story on this company where they had conned some police dept. into buying these units to sniff out drugs in high school lockers, cars, persons etc. Needless to say that it failed miserably This company was succesfully prosecuted by the Federal Govt. and paid some major fines. This product is SO outragious that even CCS won't touch it. Now THAT tells you something. Kirk www.tactronix.com -----Original Message----- From: k9electron [mailto:k9sales@n...] Sent: Thursday, August 15, 2002 2:51 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Alpha 5 Mist tracking system Hi, Ive been reading the post on GPS tracking and thought I would introduce a non GPS/GSM or even battery/mains powered tracking system with a range of 600Km. The crucial, most important feature is that the system is totally passive. There is absolutely no R.F. present. This has been tested with the best equipment on the market. Furthermore the tracking device or bug as we call it does not operate by battery power. The size of the bug is extremely small and they are made in different shapes, the largest one is like a vitamin capsule. The smallest one is to be implanted inside a tooth of the object. The operational range of the tracking system is guaranteed to 6000 kilometres. Looking at the technologies on the market today, the signal from the ALPHA FIVE MIST) can not be jammed in any way The absolutely main factor here is that the bug is 100% passive. The suspect will never know that there is anything installed or placed. More strategically on covert operations because no equipment will give any indication that an operation is going on. We even can supply the bugs in metal or plastic versions. Metal detectors, or non-linear junction detectors will of course not detect the latter. The truly "invisible" bug is here. Nothing else on the market today has these specifications. more info at http://www.spy-equipment.co.uk/Tracking/tracking.html Glenn ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6007 From: Steve Uhrig Date: Thu Aug 15, 2002 3:40pm Subject: Re: GPS frauds On 15 Aug 2002 at 13:57, iDEN-i100 wrote: > I have asked the MSNBC Tech Reporter (whom I know) to obtain a demo > unit and take it on a test drive. Lets see what the company says. Reporters are early on to be taken in, even technically oriented ones. Several dozen magazines have endorsed these things after attending invitations to faked demos. I've consulted with several of them. If this reporter is able to obtain one for demo as claimed on the website, which I am positive he will not, I'd like to give him a specific list of things to try and questions to ask. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6008 From: iDEN-i100 Date: Thu Aug 15, 2002 3:49pm Subject: Re: Re: GPS frauds Ok, I will fwd your info to him. Steve Uhrig wrote: > On 15 Aug 2002 at 13:57, iDEN-i100 wrote: > > > I have asked the MSNBC Tech Reporter (whom I know) to obtain a demo > > unit and take it on a test drive. Lets see what the company says. > > Reporters are early on to be taken in, even technically oriented > ones. > > Several dozen magazines have endorsed these things after attending > invitations to faked demos. I've consulted with several of them. > > If this reporter is able to obtain one for demo as claimed on the > website, which I am positive he will not, I'd like to give him a > specific list of things to try and questions to ask. > > Steve-- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 6009 From: Fernando Martins Date: Thu Aug 15, 2002 4:16pm Subject: RE: Study: Lights better crime fighters than cameras > The research found that CCTV cameras, as they are known in > Britain [MP: Yea, it's a British thing, we American's have no > idea what CCTV is, like tea, or bangers and eggs...], had no > effect on violent crimes, but a significant effect on auto > theft and vandalism. While cameras in urban areas reduced > crime by just 2 percent, cameras in parking lots cut car > crime by 41 percent. BTW ... CCTV is turning more and more to OCTV, and some American vendors are already saying "this is not CCTV, this is an open video system". In IT terms, this days it's like comparing a LAN with the Internet. So, I hope that if americans have no idea what CCTV is, good for them :> As for the food in UK, you better don't know anything, because it's just to bad to be true. Of course, at least in London or Manchester (the ones that I know of) there is the salvation of the portuguese restaurantes eheheh (yeah, and italian too). FM 6010 From: Fernando Martins Date: Thu Aug 15, 2002 4:21pm Subject: RE: Re: GPS wristwatch Any experience/opinion about Chubb's CabWatch (or alternatives, if any)? http://www.chubb.co.uk/ FM 6011 From: Date: Thu Aug 15, 2002 0:37pm Subject: Interesting Manual Available as a Download. Electronic Crime Scene Investigation 93 pages Click here: http://www.ncjrs.org/pdffiles1/nij/187736.pdf Interesting and a good read. 6012 From: Matt Paulsen Date: Thu Aug 15, 2002 4:46pm Subject: RE: Re: GPS wristwatch Zurich - leads to... http://www.zurich.com/global_locator/locator_service_bulist.jhtml;jsessionid =JF4J31TN0QJH4CR4SJSB5VQ?_DARGS=/_body/en/products_solutions_en.jhtml.2 ...Empire Fire & Marine - http://www.empirefireandmarine.com/productsframe.htm Also check http://www.zurichna.com/ the North American division or www.zurich.co.uk for the UK division. Thanks, Matt Paulsen President/CEO Orange Networks LLC P: 503.892.8786 F: 503.892.8794 -----Original Message----- From: Fernando Martins [mailto:fernando.martins@e...] Sent: Thursday, August 15, 2002 2:21 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Re: GPS wristwatch Any experience/opinion about Chubb's CabWatch (or alternatives, if any)? http://www.chubb.co.uk/ FM ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6013 From: Matt Paulsen Date: Thu Aug 15, 2002 4:46pm Subject: RE: Study: Lights better crime fighters than cameras It's all my grandfathers fault, he was Irish. I have bad taste... and nose.. and teeth... and... -----Original Message----- From: Fernando Martins [mailto:fernando.martins@e...] Sent: Thursday, August 15, 2002 2:16 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Study: Lights better crime fighters than cameras > The research found that CCTV cameras, as they are known in > Britain [MP: Yea, it's a British thing, we American's have no > idea what CCTV is, like tea, or bangers and eggs...], had no > effect on violent crimes, but a significant effect on auto > theft and vandalism. While cameras in urban areas reduced > crime by just 2 percent, cameras in parking lots cut car > crime by 41 percent. BTW ... CCTV is turning more and more to OCTV, and some American vendors are already saying "this is not CCTV, this is an open video system". In IT terms, this days it's like comparing a LAN with the Internet. So, I hope that if americans have no idea what CCTV is, good for them :> As for the food in UK, you better don't know anything, because it's just to bad to be true. Of course, at least in London or Manchester (the ones that I know of) there is the salvation of the portuguese restaurantes eheheh (yeah, and italian too). FM ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6014 From: Michael Puchol Date: Thu Aug 15, 2002 4:48pm Subject: Re: Re: GPS wristwatch Hi Fernando, We developed a prototype system that sent video captures over analog trunked radio (MPT1327) using SSTV, which had superimposed the GPS coordinates of the vehicle at the time. We have video capture boards that can capture frames from up to four color/bw camera inputs and send them via GSM, PMR, or other means, or store them on memory for later retrieval. This can be easily integrated with a standard AVL system. Chubb just made it look nice and flashy for the public / media. The only problem I have dealing with taxi companies is that they don't pay. Plain and simple. Just recently the Madrid taxi service got a system like this, minus the video (GPS location and audio via GSM), but only some drivers bought it, others didn't, in all, a bit of a mess. All the best, Mike ----- Original Message ----- From: "Fernando Martins" To: Sent: Thursday, August 15, 2002 11:21 PM Subject: RE: [TSCM-L] Re: GPS wristwatch > Any experience/opinion about Chubb's CabWatch (or alternatives, if any)? > http://www.chubb.co.uk/ > > FM > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 6015 From: iDEN-i100 Date: Thu Aug 15, 2002 4:56pm Subject: Re: Re: GPS wristwatch Here is the advanced chip set in the GPS Watch- http://www.sirf.com/ Michael Puchol wrote: > Hi Fernando, > > We developed a prototype system that sent video captures over analog trunked > radio (MPT1327) using SSTV, which had superimposed the GPS coordinates of > the vehicle at the time. We have video capture boards that can capture > frames from up to four color/bw camera inputs and send them via GSM, PMR, or > other means, or store them on memory for later retrieval. This can be easily > integrated with a standard AVL system. Chubb just made it look nice and > flashy for the public / media. > > The only problem I have dealing with taxi companies is that they don't pay. > Plain and simple. Just recently the Madrid taxi service got a system like > this, minus the video (GPS location and audio via GSM), but only some > drivers bought it, others didn't, in all, a bit of a mess. > > All the best, > > Mike > > ----- Original Message ----- > From: "Fernando Martins" > To: > Sent: Thursday, August 15, 2002 11:21 PM > Subject: RE: [TSCM-L] Re: GPS wristwatch > > > Any experience/opinion about Chubb's CabWatch (or alternatives, if any)? > > http://www.chubb.co.uk/ > > > > FM > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 6016 From: Michael Puchol Date: Thu Aug 15, 2002 5:30pm Subject: Re: Re: GPS wristwatch Hi Marcel, SiRF makes a large portion of all the GPS chipsets currently in use by consumer-grade GPS receivers/systems. They are to the GPS industry what Intel is to the PC industry (well, almost). Check out this page for some taiwanese GPS receivers that use the SiRF chipset, and work rather well for their price http://www.sanav.com They now have a unit that integrates receiver, antenna and 4Mbit memory for logging at configurable intervals, in a rather small package. I've had one of these units under the passenger seat in a Chrysler Voyager, in good conditions (open road, no buildings or other obstructions), giving a valid fix - this was however quite touchy, and lost fix when non-ideal constellation configuration occured. Cheers, Mike ----- Original Message ----- From: "iDEN-i100" To: "Michael Puchol" ; ; "Steve Uhrig" Sent: Thursday, August 15, 2002 11:56 PM Subject: Re: [TSCM-L] Re: GPS wristwatch > Here is the advanced chip set in the GPS Watch- > > http://www.sirf.com/ > > Michael Puchol wrote: > > > Hi Fernando, > > > > We developed a prototype system that sent video captures over analog trunked > > radio (MPT1327) using SSTV, which had superimposed the GPS coordinates of > > the vehicle at the time. We have video capture boards that can capture > > frames from up to four color/bw camera inputs and send them via GSM, PMR, or > > other means, or store them on memory for later retrieval. This can be easily > > integrated with a standard AVL system. Chubb just made it look nice and > > flashy for the public / media. > > > > The only problem I have dealing with taxi companies is that they don't pay. > > Plain and simple. Just recently the Madrid taxi service got a system like > > this, minus the video (GPS location and audio via GSM), but only some > > drivers bought it, others didn't, in all, a bit of a mess. > > > > All the best, > > > > Mike > > > > ----- Original Message ----- > > From: "Fernando Martins" > > To: > > Sent: Thursday, August 15, 2002 11:21 PM > > Subject: RE: [TSCM-L] Re: GPS wristwatch > > > > > Any experience/opinion about Chubb's CabWatch (or alternatives, if any)? > > > http://www.chubb.co.uk/ > > > > > > FM > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > the hands acquire shaking, the shaking is a warning. > > > It is by caffeine alone I set my mind in motion. > > > =================================================== TSKS > > > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > -- > "NEXTEL1 IT'S NOT JUST NEXTEL" > Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 > > "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" > Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 > > "WIRELESS FORUM HOMELAND SECURITY GROUP" > The Complete Resource for Wireless Homeland Security. > Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG > > 6017 From: Greg H. Walker, Attorney At Law Date: Thu Aug 15, 2002 5:29pm Subject: Re: Alpha 5 Mist tracking system I love their website -- "It uses molecular identification to locate the object". This is the old "divining rod" scam -- in the divining rod scam you had a rod bent in an "L" shape with a handle on one end that was fitted with ball bearings so that it swung easily and on the other end you had a case (actually its real purpose was to be a weight to make the rod swing with just a minor movement of the hand) and in the case you could put cocaine, money, oil, hair from a lost child, etc. or whatever you wanted to find and then it would point you in the direction of whatever was in the case. Their demonstrators would "salt" the demo site with money (oh, by the way, if you wanted to find only $ 20 bills, then put a $ 20 bill in the case, it would overlook $ 10s and $ 5s) -- they actually did one with cocaine and got a municipal police department's narcotic unit to buy one after they seen the demo -- needless to say the defense bar laughed themselves silly along with the jury. But when the city sued the seller for fraud, the seller convinced the jury that it worked and walked -- juries, don't you just love'em! Folks, listen to Steve because he has seen almost of the tricks -- remember, if it seems to good to be true, then it probably isn't true. GREG -- Greg H. Walker, ARM* Attorney At Law President RisKontroL -- Risk Management, Security Consulting & Investigations Houston, Texas (713) 850-0061 * Associate in Risk Management Designation (Insurance Institute of America's Center For Advanced Risk Management Education) WARNING NOTICE BY GHW: Greg H. Walker's comments are not intended to be and should absolutely not be taken as legal advice. Unless you have entered into a specific written agreement with him for legal services, signed by both you and him, and paid him a retainer in good funds, then he is not your Attorney, does not intend to be your Attorney and you should not act nor refrain from acting based, in whole or in part, on his comments. 6018 From: iDEN-i100 Date: Thu Aug 15, 2002 5:50pm Subject: Re: Re: GPS wristwatch Yep true- as well as a majority of ?handsets like iDEN Michael Puchol wrote: > Hi Marcel, > > SiRF makes a large portion of all the GPS chipsets currently in use by > consumer-grade GPS receivers/systems. They are to the GPS industry what > Intel is to the PC industry (well, almost). > > Check out this page for some taiwanese GPS receivers that use the SiRF > chipset, and work rather well for their price http://www.sanav.com They now > have a unit that integrates receiver, antenna and 4Mbit memory for logging > at configurable intervals, in a rather small package. I've had one of these > units under the passenger seat in a Chrysler Voyager, in good conditions > (open road, no buildings or other obstructions), giving a valid fix - this > was however quite touchy, and lost fix when non-ideal constellation > configuration occured. > > Cheers, > > Mike > > ----- Original Message ----- > From: "iDEN-i100" > To: "Michael Puchol" ; ; > "Steve Uhrig" > Sent: Thursday, August 15, 2002 11:56 PM > Subject: Re: [TSCM-L] Re: GPS wristwatch > > > Here is the advanced chip set in the GPS Watch- > > > > http://www.sirf.com/ > > > > Michael Puchol wrote: > > > > > Hi Fernando, > > > > > > We developed a prototype system that sent video captures over analog > trunked > > > radio (MPT1327) using SSTV, which had superimposed the GPS coordinates > of > > > the vehicle at the time. We have video capture boards that can capture > > > frames from up to four color/bw camera inputs and send them via GSM, > PMR, or > > > other means, or store them on memory for later retrieval. This can be > easily > > > integrated with a standard AVL system. Chubb just made it look nice and > > > flashy for the public / media. > > > > > > The only problem I have dealing with taxi companies is that they don't > pay. > > > Plain and simple. Just recently the Madrid taxi service got a system > like > > > this, minus the video (GPS location and audio via GSM), but only some > > > drivers bought it, others didn't, in all, a bit of a mess. > > > > > > All the best, > > > > > > Mike > > > > > > ----- Original Message ----- > > > From: "Fernando Martins" > > > To: > > > Sent: Thursday, August 15, 2002 11:21 PM > > > Subject: RE: [TSCM-L] Re: GPS wristwatch > > > > > > > Any experience/opinion about Chubb's CabWatch (or alternatives, if > any)? > > > > http://www.chubb.co.uk/ > > > > > > > > FM > > > > > > > > > > > > > > > > ======================================================== > > > > TSCM-L Technical Security Mailing List > > > > "In a multitude of counselors there is strength" > > > > > > > > To subscribe to the TSCM-L mailing list visit: > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > > > It is by caffeine alone I set my mind in motion. > > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > > the hands acquire shaking, the shaking is a warning. > > > > It is by caffeine alone I set my mind in motion. > > > > =================================================== TSKS > > > > > > > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > > > > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > the hands acquire shaking, the shaking is a warning. > > > It is by caffeine alone I set my mind in motion. > > > =================================================== TSKS > > > > > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > > -- > > "NEXTEL1 IT'S NOT JUST NEXTEL" > > Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 > > > > "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" > > Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 > > > > "WIRELESS FORUM HOMELAND SECURITY GROUP" > > The Complete Resource for Wireless Homeland Security. > > Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 6019 From: Matt Paulsen Date: Thu Aug 15, 2002 7:36pm Subject: RE: Re: GPS wristwatch Oh yea sure.. didn't you know that's why Motorola partnered with SiRF, because their questionable and they wanted questionable chips in their iDEN handsets. http://www.motorola.com/mediacenter/news/detail/0,1958,1202_893_23,00.html -----Original Message----- From: iDEN-i100 [mailto:Marcelrf@B...] Sent: Thursday, August 15, 2002 3:50 PM To: Michael Puchol Cc: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Re: GPS wristwatch Yep true- as well as a majority of ?handsets like iDEN Michael Puchol wrote: > Hi Marcel, > > SiRF makes a large portion of all the GPS chipsets currently in use by > consumer-grade GPS receivers/systems. They are to the GPS industry what > Intel is to the PC industry (well, almost). > > Check out this page for some taiwanese GPS receivers that use the SiRF > chipset, and work rather well for their price http://www.sanav.com They now > have a unit that integrates receiver, antenna and 4Mbit memory for logging > at configurable intervals, in a rather small package. I've had one of these > units under the passenger seat in a Chrysler Voyager, in good conditions > (open road, no buildings or other obstructions), giving a valid fix - this > was however quite touchy, and lost fix when non-ideal constellation > configuration occured. > > Cheers, > > Mike > > ----- Original Message ----- > From: "iDEN-i100" > To: "Michael Puchol" ; ; > "Steve Uhrig" > Sent: Thursday, August 15, 2002 11:56 PM > Subject: Re: [TSCM-L] Re: GPS wristwatch > > > Here is the advanced chip set in the GPS Watch- > > > > http://www.sirf.com/ > > > > Michael Puchol wrote: > > > > > Hi Fernando, > > > > > > We developed a prototype system that sent video captures over analog > trunked > > > radio (MPT1327) using SSTV, which had superimposed the GPS coordinates > of > > > the vehicle at the time. We have video capture boards that can capture > > > frames from up to four color/bw camera inputs and send them via GSM, > PMR, or > > > other means, or store them on memory for later retrieval. This can be > easily > > > integrated with a standard AVL system. Chubb just made it look nice and > > > flashy for the public / media. > > > > > > The only problem I have dealing with taxi companies is that they don't > pay. > > > Plain and simple. Just recently the Madrid taxi service got a system > like > > > this, minus the video (GPS location and audio via GSM), but only some > > > drivers bought it, others didn't, in all, a bit of a mess. > > > > > > All the best, > > > > > > Mike > > > > > > ----- Original Message ----- > > > From: "Fernando Martins" > > > To: > > > Sent: Thursday, August 15, 2002 11:21 PM > > > Subject: RE: [TSCM-L] Re: GPS wristwatch > > > > > > > Any experience/opinion about Chubb's CabWatch (or alternatives, if > any)? > > > > http://www.chubb.co.uk/ > > > > > > > > FM > > > > > > > > > > > > > > > > ======================================================== > > > > TSCM-L Technical Security Mailing List > > > > "In a multitude of counselors there is strength" > > > > > > > > To subscribe to the TSCM-L mailing list visit: > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > > > It is by caffeine alone I set my mind in motion. > > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > > the hands acquire shaking, the shaking is a warning. > > > > It is by caffeine alone I set my mind in motion. > > > > =================================================== TSKS > > > > > > > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > > > > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > the hands acquire shaking, the shaking is a warning. > > > It is by caffeine alone I set my mind in motion. > > > =================================================== TSKS > > > > > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > > -- > > "NEXTEL1 IT'S NOT JUST NEXTEL" > > Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 > > > > "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" > > Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 > > > > "WIRELESS FORUM HOMELAND SECURITY GROUP" > > The Complete Resource for Wireless Homeland Security. > > Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6020 From: iDEN-i100 Date: Thu Aug 15, 2002 7:51pm Subject: Re: Re: GPS wristwatch Who said they were questionable? Matt Paulsen wrote: > Oh yea sure.. didn't you know that's why Motorola partnered with SiRF, > because their questionable and they wanted questionable chips in their iDEN > handsets. > http://www.motorola.com/mediacenter/news/detail/0,1958,1202_893_23,00.html > > -----Original Message----- > From: iDEN-i100 [mailto:Marcelrf@B...] > Sent: Thursday, August 15, 2002 3:50 PM > To: Michael Puchol > Cc: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] Re: GPS wristwatch > > Yep true- as well as a majority of ?handsets like iDEN > > Michael Puchol wrote: > > > Hi Marcel, > > > > SiRF makes a large portion of all the GPS chipsets currently in use by > > consumer-grade GPS receivers/systems. They are to the GPS industry what > > Intel is to the PC industry (well, almost). > > > > Check out this page for some taiwanese GPS receivers that use the SiRF > > chipset, and work rather well for their price http://www.sanav.com They > now > > have a unit that integrates receiver, antenna and 4Mbit memory for logging > > at configurable intervals, in a rather small package. I've had one of > these > > units under the passenger seat in a Chrysler Voyager, in good conditions > > (open road, no buildings or other obstructions), giving a valid fix - this > > was however quite touchy, and lost fix when non-ideal constellation > > configuration occured. > > > > Cheers, > > > > Mike > > > > ----- Original Message ----- > > From: "iDEN-i100" > > To: "Michael Puchol" ; > ; > > "Steve Uhrig" > > Sent: Thursday, August 15, 2002 11:56 PM > > Subject: Re: [TSCM-L] Re: GPS wristwatch > > > > > Here is the advanced chip set in the GPS Watch- > > > > > > http://www.sirf.com/ > > > > > > Michael Puchol wrote: > > > > > > > Hi Fernando, > > > > > > > > We developed a prototype system that sent video captures over analog > > trunked > > > > radio (MPT1327) using SSTV, which had superimposed the GPS coordinates > > of > > > > the vehicle at the time. We have video capture boards that can capture > > > > frames from up to four color/bw camera inputs and send them via GSM, > > PMR, or > > > > other means, or store them on memory for later retrieval. This can be > > easily > > > > integrated with a standard AVL system. Chubb just made it look nice > and > > > > flashy for the public / media. > > > > > > > > The only problem I have dealing with taxi companies is that they don't > > pay. > > > > Plain and simple. Just recently the Madrid taxi service got a system > > like > > > > this, minus the video (GPS location and audio via GSM), but only some > > > > drivers bought it, others didn't, in all, a bit of a mess. > > > > > > > > All the best, > > > > > > > > Mike > > > > > > > > ----- Original Message ----- > > > > From: "Fernando Martins" > > > > To: > > > > Sent: Thursday, August 15, 2002 11:21 PM > > > > Subject: RE: [TSCM-L] Re: GPS wristwatch > > > > > > > > > Any experience/opinion about Chubb's CabWatch (or alternatives, if > > any)? > > > > > http://www.chubb.co.uk/ > > > > > > > > > > FM > > > > > > > > > > > > > > > > > > > > ======================================================== > > > > > TSCM-L Technical Security Mailing List > > > > > "In a multitude of counselors there is strength" > > > > > > > > > > To subscribe to the TSCM-L mailing list visit: > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > > > > > It is by caffeine alone I set my mind in motion. > > > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > > > the hands acquire shaking, the shaking is a warning. > > > > > It is by caffeine alone I set my mind in motion. > > > > > =================================================== TSKS > > > > > > > > > > Your use of Yahoo! Groups is subject to > > http://docs.yahoo.com/info/terms/ > > > > > > > > > > > > > > > > > > > > > > ======================================================== > > > > TSCM-L Technical Security Mailing List > > > > "In a multitude of counselors there is strength" > > > > > > > > To subscribe to the TSCM-L mailing list visit: > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > > > It is by caffeine alone I set my mind in motion. > > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > > the hands acquire shaking, the shaking is a warning. > > > > It is by caffeine alone I set my mind in motion. > > > > =================================================== TSKS > > > > > > > > Your use of Yahoo! Groups is subject to > > http://docs.yahoo.com/info/terms/ > > > > > > -- > > > "NEXTEL1 IT'S NOT JUST NEXTEL" > > > Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 > > > > > > "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" > > > Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 > > > > > > "WIRELESS FORUM HOMELAND SECURITY GROUP" > > > The Complete Resource for Wireless Homeland Security. > > > Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > -- > "NEXTEL1 IT'S NOT JUST NEXTEL" > Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 > > "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" > Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 > > "WIRELESS FORUM HOMELAND SECURITY GROUP" > The Complete Resource for Wireless Homeland Security. > Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 6021 From: Guy Urbina Date: Thu Aug 15, 2002 4:28pm Subject: RE: Alpha 5 Mist tracking system This system reminds me of the: Static/Ionic "human presence" perturbation sensor that supposedly detected the "static" and "capacitive" displacement of a human body. It was (and still is advertised) as a means of detecting people trying to hide in cargo containers. It looked like a sci-fi movie prop with an antenna sticking out of the pistol grip. It too supposedly worked like a divining rod. They tried to sell some to the Gov't. Fortunately, someone was smart and called them out on the carpet. They set up a battery of tests at Sandia National Laboratories where it was soundly debunked. Sandia reverse engineered it and found "child-like" soldering and fabrication techniques, a maze of wires and a supposed "passive" sensor that turned out to be a hunk of plastic with a lock of human hair inside. Basically, their circuit design didn't jive with accepted EE standards and practices. Incredibly, even after having been debunked, they are still in business hawking their product as an alternative to millimeter wave heart-beat detectors. How they can conduct business with a straight face for a worthless product and actually have people buy it is utterly uncanny and unbelievable. -Guy 11:37 AM 8/15/2002 -0700, you wrote: >Wow, I can't believe that they're still hawking this crap. I had my hands on >this unit over 10 years ago at a surveillance trade show. It's nothing more >than a block of plastic with a telescopic "rabbit ears" t.v. antenna and an >insertable card tray that held what looked like carbon paper. I was told by >the huckster that the trays (purchased seperately of course) held the >molecular composition of whatever you were looking for, be it bugs, >narcotics, explosives etc. The antenna was on a swivel base and would >"point" to the target. You just followed it like a Divining Rod. All that >was necessary was to insert the card of that particular "molecular property" >to make the "Detector" sensitive to that item. You would purchase cards for >each type of eavesdropping device, narcotic or explosive. Today they've >jumped on the bandwagon offering Bio-chemical and GPS cards. > Prime Time or 20/20 did an expose' story on this company where they had >conned some police dept. into buying these units to sniff out drugs in high >school lockers, cars, persons etc. Needless to say that it failed miserably >This company was succesfully prosecuted by the Federal Govt. and paid some >major fines. This product is SO outragious that even CCS won't touch it. Now >THAT tells you something. >Kirk >www.tactronix.com > > 6022 From: James M. Atkinson Date: Thu Aug 15, 2002 8:19pm Subject: Re: Alpha 5 Mist tracking system Bullshit, utter and complete bullshit. Anybody with even a basic understanding of chemistry, physics, and electronics will realize that the product is a complete fraud, a hoax, a sham, and a con. Heck most first year college student would recognize this product as being a scam. It would be easier to track someone by sniffing their farts from 2500 miles away. What a steaming crock of shit, Of course if the poster of the message with the wild claims would like to fly to Washington DC and perform a demonstration under controlled conditions I will arrange for a dozen or so professionals to evaluate the product and submit their written opinions which I will be happy to publish. -jma At 9:50 AM +0000 8/15/02, k9electron wrote: >Hi, Ive been reading the post on GPS tracking and thought I would >introduce a non GPS/GSM or even battery/mains powered tracking >system with a range of 600Km. > >The crucial, most important feature is that the system is totally >passive. > >There is absolutely no R.F. present. This has been tested with the >best equipment on the market. Furthermore the tracking device or bug >as we call it does not operate by battery power. The size of the bug >is extremely small and they are made in different shapes, the >largest one is like a vitamin capsule. The smallest one is to be >implanted inside a tooth of the object. > >The operational range of the tracking system is guaranteed to 6000 >kilometres. > >Looking at the technologies on the market today, the signal from the >ALPHA FIVE MIST) can not be jammed in any way > >The absolutely main factor here is that the bug is 100% passive. The >suspect will never know that there is anything installed or placed. >More strategically on covert operations because no equipment will >give any indication that an operation is going on. We even can >supply the bugs in metal or plastic versions. Metal detectors, or >non-linear junction detectors will of course not detect the latter. >The truly "invisible" bug is here. > >Nothing else on the market today has these specifications. > >more info at http://www.spy-equipment.co.uk/Tracking/tracking.html > >Glenn > -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6023 From: Matt Paulsen Date: Thu Aug 15, 2002 8:53pm Subject: RE: Alpha 5 Mist tracking system > Heck most first year college student would recognize this product as being a scam. True, but the sad part is I know a guy that was actually replying to those Nigerian fraud scams and he has a masters in computer science and 10 years of experience in software development doing security products. Lets put that in perspective against Farmer Bob Jones in Hockeypuck, Iowa that uses AOL on a garage sale 14.4k modem using an eMachine his grandson sent him. Knows the security industry, works in it, and is in front of a computer for 4000+ hours a year, probably a good portion of which is Internet based (yes, he has no life, like most coders). Not your average victim, but goes to show anyone can be scammed. I caught a response email from one of the idiots before he got to it and soundly slapped my friend on the back of the head and asked him where his brain was at. It's a numbers game, just like direct mail or telemarketing, just a different industry. (yes, the above is a true story) -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Thursday, August 15, 2002 6:20 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Alpha 5 Mist tracking system Bullshit, utter and complete bullshit. Anybody with even a basic understanding of chemistry, physics, and electronics will realize that the product is a complete fraud, a hoax, a sham, and a con. Heck most first year college student would recognize this product as being a scam. It would be easier to track someone by sniffing their farts from 2500 miles away. What a steaming crock of shit, Of course if the poster of the message with the wild claims would like to fly to Washington DC and perform a demonstration under controlled conditions I will arrange for a dozen or so professionals to evaluate the product and submit their written opinions which I will be happy to publish. -jma At 9:50 AM +0000 8/15/02, k9electron wrote: >Hi, Ive been reading the post on GPS tracking and thought I would >introduce a non GPS/GSM or even battery/mains powered tracking >system with a range of 600Km. > >The crucial, most important feature is that the system is totally >passive. > >There is absolutely no R.F. present. This has been tested with the >best equipment on the market. Furthermore the tracking device or bug >as we call it does not operate by battery power. The size of the bug >is extremely small and they are made in different shapes, the >largest one is like a vitamin capsule. The smallest one is to be >implanted inside a tooth of the object. > >The operational range of the tracking system is guaranteed to 6000 >kilometres. > >Looking at the technologies on the market today, the signal from the >ALPHA FIVE MIST) can not be jammed in any way > >The absolutely main factor here is that the bug is 100% passive. The >suspect will never know that there is anything installed or placed. >More strategically on covert operations because no equipment will >give any indication that an operation is going on. We even can >supply the bugs in metal or plastic versions. Metal detectors, or >non-linear junction detectors will of course not detect the latter. >The truly "invisible" bug is here. > >Nothing else on the market today has these specifications. > >more info at http://www.spy-equipment.co.uk/Tracking/tracking.html > >Glenn > -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu ---------------------------------------------------------------------------- ---------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6024 From: James M. Atkinson Date: Thu Aug 15, 2002 9:01pm Subject: Bug Problems in the Intelligence Community http://cryptome.org/ic-bugs.htm 15 August 2002 These documents are from the U.S. State Department, Johnson Administration, Foreign Relations 1964-1968, Volume X, National Security Policy, published 15 August 2002. ------------------------------------------------------------------------ Source: http://www.state.gov/r/pa/ho/frus/johnsonlb/x/9015.htm 8. Editorial Note Following the discovery of audio surveillance devices or "bugs" in the Great Seal at the U.S. Embassy in Moscow, along with the microwave bombardment of that Embassy, the U.S. Government increasingly sought methods to counter this threat to sensitive information. While an NSC subcommittee (NSC Special Committee on Technical Surveillance Countermeasures) had been in existence for many years, during the Kennedy administration the issue engaged the President, the President's Special Assistant for National Security Affairs, the Director of Central Intelligence, and senior Department of State and Defense and FBI officials. A coordinated program was undertaken to install secure facilities in many overseas posts, and regular progress reports on the program were provided to the NSC. Details remain classified. Documents covering the issue are in the Johnson Library, National Security File, Intelligence File, Foreign Intelligence Advisory Board, Vol. 1, Box 5; ibid., Agency File, Central Intelligence Agency, Vol. II, Box 9; ibid., Subject File, President's Foreign Intelligence Advisory Board, Box 41; and ibid., Agency File, Central Intelligence Agency, Filed by LBJ Library, Box 10. ------------------------------------------------------------------------ Source: http://www.state.gov/r/pa/ho/frus/johnsonlb/x/9016.htm 27. Memorandum From the Executive Secretary of the Department of State (Read) to the President's Special Assistant for National Security Affairs (Bundy)/1/ /1/Source: Johnson Library, National Security File, Intelligence File, Foreign Intelligence Advisory Board, Vol. 1 [1 of 2], Box 5. Secret. Washington, April 15, 1964. SUBJECT Audio Surveillance and Countermeasures Problems Within the United States Intelligence Community REFERENCE (a) March 20 memo from Mr. Bundy to the Secretary of Defense, Secretary of State, and the Attorney General/2/ /2/Dated March 20, 1963; not found. (b) March 12 memo on subject to Mr. Bundy by the Acting DCI/3/ /3/Document 18. (c) August 14, 1963 report of the NSC Special Committee on Audio Surveillance Countermeasures/4/ /4/Not found. In reply to your memorandum of March 20, 1963, appropriate officers of the Department of State have reviewed the referenced Acting DCI memorandum and the annual NSC Special Committee report. 1. The Department would first like to comment on the DCI memorandum of March 12 which in part deals with audio countermeasure activities. The Department's primary role in the field of audio countermeasures is based on the authority and responsibility of the Department as the major foreign affairs agency of the United States Government. We are strongly opposed to any change of leadership in the audio countermeasure community and we object to relinquishing our role as Chairman of the NSC Special Committee or of any resultant new committee that may evolve. The Department of State has been the leader in the U.S. audio countermeasures community since the late 1940's and continues to hold this position today. The Department's position of leadership in the audio countermeasures field has been established by the fact that the Office of Security of the Department of State is responsible for the over-all security of approximately 300 U.S. diplomatic and consular establishments. The Department of State cannot delegate the authority to guide and coordinate audio countermeasures activities to any other agency in view of the Department's responsibility for the security of the greatest bulk of penetration target areas. The Department's position is further supported by having in effect the largest number of trained engineers and technicians in the field supported by a major research and development effort under the guidance of experienced engineers. The present Department of State research and development efforts have been in effect since 1961 and these efforts have been successfully translated into operational countermeasure equipments and techniques. A few specific examples of Department of State accomplishments in this area are the acoustic conference room, the panoramic receiver, the signal recognizer system and standardization of a secure telephone system. Further evidence of the Department's leadership in the audio countermeasures field is witnessed by the fact that Department of State security engineers have been responsible for over 95 per cent of all U.S. Government "finds", including six additional microphones and one transmitter discovery since the NSC Special Committee report of August, 1963. For the same reason [2 lines of source text not declassified] the Department of State feels that it must also chair any audio countermeasures body in view of the Department's primary role in this field. Regarding Sections 7(c) and 7(d) of the DCI report, we wish to make the following comments: (1) Technical Inspections The question of coordination of "sweeps" or technical inspections as stated in the DCI memorandum does not exist. Clear-cut areas of responsibility for the security of our overseas military and diplomatic missions have been long established. The Office of Security of the Department of State is clearly responsible for the over-all security of all U.S. diplomatic representation and has provided security services to all tenant agencies operating within U.S. diplomatic missions abroad. Security within U.S. military installations is clearly a military responsibility and conflict between military and the Department of State interests does not exist. [4 lines of source text not declassified] The Department of State feels that the coordination of countermeasures equipment requirements are best resolved directly in the committee responsible for the coordination of research and development efforts as provided for in the present NSC Special Committee. A division of the operational elements from the research and development elements of any countermeasures body can serve only to delay translation of these requirements into tangible results. This condition characterizes the confusion and lack of progress of the NSC Special Committee during the initial period of its formation. It is the Department's opinion, therefore, that the proposal for a new technical subcommittee to coordinate inspection schedules and stimulate requirements has little foundation. (2) Counter-audio Research and Development The Department of State is in favor of coordinating countermeasure development, equipment and procedure requirements and believes the present NSC Special Committee on Technical Surveillance Countermeasures has made significant progress in this regard within the last three years. The impetus gained by this Committee in translating these requirements into realistic development objects is, in the opinion of the Department of State, a direct result of (a) the growing awareness of all member agencies of the need for close cooperation in establishing policy and program guidelines, and (b) technically competent and experienced leadership of the Special Committee by the Department of State. The Department of State recognizes the need for expansion of basic and applied research within the countermeasures field and for greater coordination of this research among the member agencies. The inability of the present NSC Special Committee to achieve greater progress can be attributed to (1) its lack of member representation of a sufficiently high level of individual authority and technical competence and (2) the unavailability of information concerning current U.S. advances in positive audio surveillance equipment and techniques. The offer by the Acting DCI of cooperation in regard to this latter impeding factor is warmly accepted. The Department of State can see no need for the proposed transfer of the present Special Committee from the NSC to the USIB. Analysis of the Special Committee's structure has not revealed any deficiencies in this body that can be attributed to its relationship with the NSC. However, if such a transfer is determined as being in the best interests of the United States, the Department of State feels that any audio countermeasures body established under the USIB should occupy full committee status. The importance of the efforts of any body concerned with the problem of audio surveillance countermeasures, in view of known existing threats, is of far too major a magnitude to be relegated to subcommittee status. 2. We concur with the recommendations contained in the NSC Special Committee report of August 14, 1963. These recommendations have in fact been enacted during the past three years by the Department of State. The Department of State feels that the Special Committee's report is both timely and comprehensive in view of present day threats against the security of the U.S. Government. However, the Department considers the list of recommendations generated by the Special Committee lacking in one major respect. Specifically, there is needed a recognition of and an appropriate recommendation for action on the present lack of cooperation and exchange of information between the positive Intelligence and the Counter Surveillance Communities. The alarm expressed by the Scientific Guidance Panel in Section II-4 of the Guidance Panel's interim report dated August 19, 1963/5/ was, in the opinion of the Department of State, not well founded. The Scientific Guidance Panel has not reviewed the Department of State's present countermeasure program with the exception of having received a comprehensive briefing in February, 1964 by the Department of State on the present status of our efforts in resolving the Moscow Signal problem. /5/Attached to Document 9. Summary In reply to those recommendations in Sections 7(c) and 7(d) of the DCI memorandum, we submit the following recommendations: (1) That the present Special Committee be retained under the NSC, or if deemed necessary be established as an independent committee under the USIB. (2) That membership of a new audio countermeasure coordinating body be limited to technically-qualified representatives from the Department of Justice, the CIA, the Department of State and the DIA. (3) That the present Technical Subcommittee of the NSC Special Committee be retained as a working technical group with representatives from all U.S. Government agencies having formal technical countermeasure programs in effect. (4) That the Department of State retain chairmanship of any inter-agency audio countermeasures body. John A. McKesson/6/ /6/Printed from a copy that indicates McKesson signed for Read. ------------------------------------------------------------------------ Source: http://www.state.gov/r/pa/ho/frus/johnsonlb/x/9015.htm 9. Final Report of the Central Intelligence Agency/Defense Intelligence Agency Scientific Guidance Panel Washington, February 3, 1964. [Source: Johnson Library, National Security File, Intelligence File, Foreign Intelligence Advisory Board, Vol. 1 [2 of 2], Box 5. Secret. 7 pages of source text (including 5-page Appendix A) not declassified.] ------------------------------------------------------------------------ Source: http://www.state.gov/r/pa/ho/frus/johnsonlb/x/9015.htm 18. Memorandum From Acting Director of Central Intelligence Carter to the President's Special Assistant for National Security Affairs (Bundy) Washington, March 12, 1964. [Source: Johnson Library, National Security File, Intelligence File, Foreign Intelligence Advisory Board, Vol. 1 [2 of 2], Box 5. Secret. 7 pages of source text not declassified.] ------------------------------------------------------------------------ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6025 From: kondrak Date: Thu Aug 15, 2002 10:00pm Subject: Re: Alpha 5 Mist tracking system I tend to agree...but there IS some new stuff coming out that will hear a heartbeat inside a container, i've seen it demo'd at a prison, and it caught 100% of the people hiding in trucks, shipping containers and even in a garbage truck...it's nothing but a very sensitive microphone, and a frequency counter, and a graphic chart recorder..you can bang on the container, and see the heartbeat raise....heh.. At 21:19 8/15/02 -0400, you wrote: >Bullshit, utter and complete bullshit. > >Anybody with even a basic understanding of chemistry, physics, and >electronics will realize that the product is a complete fraud, a >hoax, a sham, and a con. Heck most first year college student would >recognize this product as being a scam. > >It would be easier to track someone by sniffing their farts from 2500 >miles away. > >What a steaming crock of shit, > >Of course if the poster of the message with the wild claims would >like to fly to Washington DC and perform a demonstration under >controlled conditions I will arrange for a dozen or so professionals >to evaluate the product and submit their written opinions which I >will be happy to publish. > >-jma > > >At 9:50 AM +0000 8/15/02, k9electron wrote: > >Hi, Ive been reading the post on GPS tracking and thought I would > >introduce a non GPS/GSM or even battery/mains powered tracking > >system with a range of 600Km. > > > >The crucial, most important feature is that the system is totally > >passive. > > > >There is absolutely no R.F. present. This has been tested with the > >best equipment on the market. Furthermore the tracking device or bug > >as we call it does not operate by battery power. The size of the bug > >is extremely small and they are made in different shapes, the > >largest one is like a vitamin capsule. The smallest one is to be > >implanted inside a tooth of the object. > > > >The operational range of the tracking system is guaranteed to 6000 > >kilometres. > > > >Looking at the technologies on the market today, the signal from the > >ALPHA FIVE MIST) can not be jammed in any way > > > >The absolutely main factor here is that the bug is 100% passive. The > >suspect will never know that there is anything installed or placed. > >More strategically on covert operations because no equipment will > >give any indication that an operation is going on. We even can > >supply the bugs in metal or plastic versions. Metal detectors, or > >non-linear junction detectors will of course not detect the latter. > >The truly "invisible" bug is here. > > > >Nothing else on the market today has these specifications. > > > >more info at http://www.spy-equipment.co.uk/Tracking/tracking.html > > > >Glenn > > >-- > >-------------------------------------------------------------------------------------------------- >The First, The Largest, The Most Popular, and The Most Complete TSCM, >Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. >-------------------------------------------------------------------------------------------------- > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com >-------------------------------------------------------------------------------------------------- > Strategy without tactics is the slowest route to victory. > Tactics without strategy is the noise before defeat. - Sun Tzu >-------------------------------------------------------------------------------------------------- > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6026 From: Matt Paulsen Date: Thu Aug 15, 2002 10:27pm Subject: DCID 1/21 explained I remember someone asking about DCID 1/21 earlier. Doc format. http://www.afmc.wpafb.af.mil/HQ-AFMC/IN/ins/dcid-1.htm 6027 From: David Alexander Date: Fri Aug 16, 2002 2:26am Subject: Engineer joke An architect, an artist and an engineer were discussing whether it was better to spend time with the wife or a mistress. The architect said he enjoyed time with his wife, building a solid foundation for an enduring relationship. The artist said he enjoyed time with his mistress, because of the passion and mystery he found there. The engineer said, "I like both." "Both?" they asked. The Engineer said "Yeah. If you have a wife and a mistress, they will each assume you are spending time with the other woman, and you can go to the lab and get some work done." _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 6028 From: Kirk Adirim Date: Thu Aug 15, 2002 6:02pm Subject: Re; Alpha 5 mist tracking If it can detect a bug or tracking device over a 6000 km distance, that equates to a 12000 km radius, now how many tracking devices are within 12000 km? And in which direction do you run first? I guess you can only place 1 device in a 12000 km radius or confusion reigns supreme. Here's some other vendor of the same product, this one has the pics. http://www.chiare.com/products/spy/moleE.htm http://www.chiare.com/products/PDF/Moledm.pdf "Remember, it takes 42 muscles to frown and only 4 to pull the trigger of a decent sniper rifle." Kirk [Non-text portions of this message have been removed] 6029 From: Mitch D Date: Thu Aug 15, 2002 8:19pm Subject: better than a gps wristwatch A 42 inch leather belt,like my father had,it always made sure that myself, and my brothers, always gave him verbal reports with reference to our mission,etd,eta,and etr,and ensured prompt performance without being late. This piece of leatherware was muchmore effective as it didnt require dental transponder implants,or gps leg irons as the belt insured perfect performance without any deviation from our submitted itinerary. This piece of gear was in use until we had reached the age of 17 or had moved out to a dwelling of our own.....;) Best of all the only noise it produced was from us for mission and plan failure... Have a great weekend ! __________________________________________________ Do You Yahoo!? HotJobs - Search Thousands of New Jobs http://www.hotjobs.com 6030 From: Ben Evans Date: Thu Aug 15, 2002 8:56pm Subject: Kids and Kidnapping on CNN Connie Chung has a "special" on technology tracking kids at 11pm EST on CNN. Couldn't have asked for a funnier time given the recent WherifyWireless discussions going on. :-) Enjoy, -Ben 6031 From: Aimee Farr Date: Fri Aug 16, 2002 7:20am Subject: "The FBI U-2 Incident" A toast to the FBI's success. Oh, foiled again. First, Russian counterintelligence beat me to it, and now THIS. http://gazeta.ru/2002/08/15/FSBrapsFBIfo.shtml "FSB raps FBI for hacking Russian hackers" Russiaís domestic intelligence service has accused an FBI official of an unauthorized incursion into Russian computer networks in an attempt to procure evidence proving the guilt of two Russian hackers charged by the US on over 20 counts of computer-related crime, the Federal Security Service (FSB) said on Thursday. If the Russian hackers are convicted on the basis of evidence obtained by the Americans through hackersí methods, that would mean that the intelligence services of the United States will continue to use illegal ways of gathering information both in Russia and in other countries,'' an FSB spokesman said. [...] ***RANT WARNING *** U-2 (1960) Due to pre-packaging cover stories, planning errors, continuation after complaints, and discoordination (?), Khrushchev fished the flawed cover story for the U-2 overflights to the point where he embarrassed leading decision makers, up to and including the President. Khrushchev also used it to capitulate a summit, and as justification for other "denial" actions. (There is a redneck song with lyrics "that's my story" that tells the tale.) The U-2 was the wedge which soon grew into "the credibility gap" which decapitated American intelligence/counterintelligence and imprinted a generation. Whatever the arguments and their legitimacy, the feedback on this incident "carried the flower of success." This meant more fertilizer for certain gardens. I understand the distinctions, as well as the justifications of this incident, but in some matters, we must consider the perceptions of other countries, the utility of certain allegations in respect of strategy, and the ramifications of certain actions. I would think this is especially true when it implicates target populations in the former Soviet Union with parallel interests and sympathies among target populations in the U.S. I hear some countries have an operational code and will protect groups with subversive potential from outside interference -- of any sort, especially if they are signal carriers. This incident is now in "replay." In addition to wedge-driving, stories like this were later used to attribute illegal and unethical activity to our agencies -- with disturbingly good results. Later, when a question arises, they bolster the credibility of an associated spurious signal. (The U-2 story psychologically underpinned the Soviet suggestions of American responsibility for Korean Airlines 007.) Perhaps we need new coordination and risk assessment on the criminal-international policy front, especially with target populations that wield dual-potential, implicating criminal, national security, and foreign policy concerns. I don't mean to suggest the FBI might start WW III, but it is lurking at the corner of my mind as we transition to nontraditional adversaries and new domains. Also, the FBI is limited in it's ability to respond to certain endeavors. Notably, on the heels of a 'propaganda offensive' is often ....something bad. (It is very proactive and provocative in nature, relying equally on manipulating reality as much as mere perceptions, and concepts of propaganda will blur an important distinction.) Mistakes aren't just easy to make here, they are induced. The old Soviet strategy of "burdening gifts" is worth noting, and I'm not speaking of plants. (They placed certain target populations almost out-of-bounds -- that affected the fates of nations, not just a handful of people.) While most likely opportunistic in nature, this and recent related events were directly used to distance certain populations from American interests and to discourage travel, in coordination with an overall attempt to reduce the profile of the Russian signal and American intelligence in Russia. I question if we have sufficient processes to recognize and reconcile competing considerations. I consider it rather dire that somebody with an appropriately broad frame of reference is balancing what I would hope are now considered long-term strategic interests. If not, history would suggest bad results -- for everybody. Perceptions transition to affect the entire intelligence community. At the time of the U-2 incident, nobody had the foresight to see how perceptual rose gardens grow -- until they blossomed into bodybags in Vietnam. ~Aimee 6032 From: iDEN-i100 Date: Fri Aug 16, 2002 4:21pm Subject: DOC) Responding to Growing Customer Inquiries http://cnniw.yellowbrix.com/pages/cnniw/Story.nsp?story_id=32209158&ID=cnniw&scategory=Telecommunications%3AWireless& From: Robert G. Ferrell Date: Wed Aug 16, 2000 11:35am Subject: Re: Stalker Thread, NY Man Arrested For Threatening Lieberman >The Secret Service traced the call, which lasted about five minutes, and >determined that it came from Franco's home. Court papers said the occupants >of the home allowed them to search Franco's room where they found a pellet >gun. The pellet he was going to use was at least Kosher, I should hope. ;-) RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 1233 From: James M. Atkinson, Comm-Eng Date: Wed Aug 16, 2000 11:47am Subject: Re: Stalker Thread, NY Man Arrested For Threatening Lieberman At 11:35 AM -0500 8/16/00, Robert G. Ferrell wrote: > >The Secret Service traced the call, which lasted about five minutes, and > >determined that it came from Franco's home. Court papers said the occupants > >of the home allowed them to search Franco's room where they found a pellet > >gun. > >The pellet he was going to use was at least Kosher, I should hope. > >;-) > >RGF (snicker) I sort of reminds me of the folks who buy a cheap bug detector, attend a two week course and think that they actually know something about TSCM. ;-) -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1234 From: James M. Atkinson, Comm-Eng Date: Wed Aug 16, 2000 8:55pm Subject: TEMPEST Page Updated Greetings, I have just finished updating my web page on the subject of TEMPEST and would like to invite list members to visit it and provide some constructive criticism on the material presented (I would REALLY appreciate your comments). http://www.tscm.com/TSCM101tempest.html My goal is to present some unclassified information as to what TEMPEST is, and is not, and to dispel some the the crap that is floating around on the subject (such as the recent WSJ article). There is a big difference between SIGINT, COMINT, RASTER ANALYSIS and TEMPEST and I hope the page will help clear things up a bit and remove some of the confusion out there. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1235 From: James M. Atkinson, Comm-Eng Date: Wed Aug 16, 2000 9:02pm Subject: Referral List has been updated Good Evening, Earlier this evening I updated the "Gold List" on my website and would like to invite list members to check it out and to send your comments (privately if you wish). http://www.tscm.com/goldlist.html If you are listed on the page PLEASE make sure that your all of your information is listed correctly. I am also considering adding a website address, email address, and logo to each of the listings, but would appreciate some discussion on the matter. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1236 From: James M. Atkinson, Comm-Eng Date: Thu Aug 17, 2000 11:49am Subject: FCC Wiretap Order Overturned FCC Wiretap Order Overturned http://www.wired.com/news/politics/0,1283,38258,00.html by Oscar S. Cisneros 3:00 a.m. Aug. 17, 2000 PDT Privacy groups are cheering a federal appeals court decision that promises to curb the ability of law enforcement agencies to get access to Internet-style communications. The decision also reins in the hungry maw of the government's Carnivore monitoring system. Tuesday's ruling re-affirms in a digital context a long-held and constitutionally imposed restraint on the powers of law enforcement to monitor the contents of communications: that the "probable cause" standard must be met before a warrant is issued and a search can take place. "If the government is going to intercept message content, it can't get by with a lower standard," said Jim Dempsey, senior staff counsel with the Center for Democracy and Technology. The decision by Federal Circuit arises from an appeal made by privacy, civil liberties, telecommunications, and wireless industry groups all challenging the Federal Communications Commission's implementation of 1994 federal wiretap law. That law mandated that telecom carriers make their systems able to track calls on behalf of the cops, and provided a safe harbor for carriers that comply with industry standards in line with the Communications Assistance for Law Enforcement Act. The CALEA was drafted by Congress to help law enforcement agencies continue the surveillance abilities they had enjoyed with traditional telephone services. The Telecommunications Industry Association crafted such a standard after consulting with law enforcement and industry experts. But the FCC found the standard deficient because it did not meet the needs of law enforcement in a number of key areas. Dempsey was quick to point out that the ruling will have a direct impact on the Federal Bureau of Investigation's much-maligned Carnivore system. Carnivore originally came to light at a meeting of telecommunications experts who were preparing a report for the FCC on standards for monitoring of Internet-style traffic. The FBI, according to a draft version of that telecommunications industry report, pitched Carnivore as a system that would give law enforcement only the information it was authorized by a court to receive. "In a pen register or trap-and-trace order only the relevant information from the target's packets are stored to disk," the draft stated. "The filter program separates the relevant information from the target's content and law enforcement then collects the information." The FBI's Carnivore show-and-tell before the experts is consistent with its continuing rationale for using the system. Carnivore, the FBI claims, may chew all the data on the network, but it only actually eats the information authorized by a court order. "The Carnivore device provides the FBI with a 'surgical' ability to intercept and collect the communications which are the subject of the lawful order while ignoring those communications which they are not authorized to intercept," the FBI said on its website. But Dempsey cast doubt on what he called the FBI's "trust us" policy, calling instead for the government to hand over the leash of the beast. "Their argument that it's not a search under the Fourth Amendment until a human eyeball looks at it is a pretty thin read," Dempsey said. "I would have far less concerns about Carnivore if it was owned, controlled, and operated by the carrier." The technical distinctions parsed in the ruling were, if arcane, of constitutional relevance. In an order set down last year, the FCC sent the telecom industry back to the drawing board to incorporate the additional requests made by the government. The government wanted the ability to monitor conference calls, call signals such as call waiting, and the ability to monitor digits dialed after an individual has connected to an "800" service such as a calling card. The commission's order then took an unprecedented step in granting law enforcement agencies the ability to monitor to the contents of call. It stated LEAs could get access to communications over packet-mode networks under a lower standard of proof. Unlike traditional circuit-based networks, packet-mode networks break up communications sent through them into bit-sized packets of data. Like an envelope in the mail, each packet contains destination information and contents encoded in a variety of protocols. The technical distinction parallels a legal one. The standard of proof that LEAs must meet to get access to call-identifying information -- such as telephone numbers dialed and the duration of a call -- are dramatically lower than the standard needed for a warrant that grants access to the actual contents of a call. A call-identifying information warrant -- sometimes called a pen register or trap-and-trace warrant -- only requires that law enforcement asserts that the request is relevant to an ongoing investigation. A magistrate has no discretion over these warrants; they are issued without substantive review. A call-content warrant requires that LEAs have probable cause that the communications in question involve a specific crime, and that the warrant will be effective in netting the communications. The FCC decision allowed LEAs access to all packet-mode communications -- even upon the lower standard required for call identifying information -- on an interim basis while the telecom industry finds ways of separating the two. The court, however, said that the FCC was simply mistaken in its judgement. "CALEA authorizes neither the commission nor the telecommunications industry to modify either the evidentiary standards or procedural safeguards for securing legal authorization to obtain packets from which call content has not been stripped, nor may the commission require carriers to provide the government with information that is not authorized to be intercepted," the court wrote. Dempsey said that the court's decision flipped the FCC's order on its head. Before, the lower standard got LEAs all packet-mode communications with the caveat that content not be used unless authorized by a court order. Under the Federal Circuit's ruling, LEAs now need to rise to a content warrant's level of proof to get access to call-identifying information if it's not separated from call content. In another victory for privacy groups, the Federal Circuit's decision also vacated portions of the FCC's order that mandated the inclusion of additional monitoring capabilities enclosing features such as a call-waiting conference called "post-cut-through dialed digits," or those digits dialed after a caller connects to an 800 service. The court said the FCC failed to consider the privacy interests and the cost of such monitoring systems and that it failed to document the rationale for its actions. It also said that some "post-cut-through dialed digits" might require the higher protection mandated for call content information. "Post-cut-through dialed digits can also represent call content," the court wrote. "For example, subjects calling automated banking services enter account numbers. When calling voicemail systems, they enter passwords. When calling pagers, they dial digits that convey actual messages. And when calling pharmacies to renew prescriptions, they enter prescription numbers." Privacy groups were not so successful in their bid to stop the FCC from including cell phone location monitoring provisions in the industry's surveillance standard. As cell phone users travel around, their signals are picked up by "cell sites" -- areas covered by a single antenna on the cellular network. A cell site can give clues to a user's location down to a few blocks in a city environment and several miles in a rural setting. The court affirmed the FCC's decision to include cell-site information in the standard, but also held that "something more" than a simple call ID information warrant was needed to get access to a user's cell-site location. The court's ruling left legal experts wondering if a new, slightly higher standard was created. "No one really knows right now," said Michael Altschul, vice president and general counsel for the Cellular Telecommunications Industry Association. "It's probably going to be something less than what's required for a (call content warrant) and something more than what's required to get access to (call identifying information)." =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1237 From: James M. Atkinson, Comm-Eng Date: Thu Aug 17, 2000 4:15pm Subject: Analysis: Tokyo 'spy capital' of the world Analysis: Tokyo 'spy capital' of the world http://www.vny.com/cf/News/upidetail.cfm?QID=109889 Thursday, 17 August 2000 2:10 (ET) Analysis: Tokyo 'spy capital' of the world By EDWARD NEILAN TOKYO, Aug. 11 (UPI) -- The worst-kept secret in diplomatic chanceries and corporate boardrooms is that Tokyo is the spy capital of the world. From industrial espionage and Internet codes to old-fashioned surveillance and disinformation, analysts agree, no place can hold a flickering candle to the capital of Japan. "There is so much information of every kind from every nation available here," said a Western diplomat. "Because of scant preventive laws, foreign spies can operate with near impunity." In one recent case, police said they discovered that four Russian intelligence agents collected information about unreleased electronic products in Japan. The activities, which involved a Japanese accomplice, indicate that the SVR-the successor of Russia's KGB intelligence agency-has developed an interest in industrial espionage because Russia's economy is in such poor shape. Nikolai Kovalyov, the head of Russia's domestic Federal Security Service , said in March his agency had stopped the espionage activities of 28 foreign spies, all with contacts in Japan and in the process had arrested seven agents hired by secret service organizations in the United States, Britain, China, Spain and Japan. The end of the Cold War actually produced a glut of unemployed spies on the Tokyo market, forcing many to scramble of them to maintain their visa status. Because many of these spies had computer training, some have managed to secure employment as "information technology" or IT specialists with commercial firms. "Big Brother" used to be the euphemism applied to the eavesdropping and surveillance activities of Soviet and Chinese Communist intelligence organizations. But now the United States National Security Agency based at Fort Meade, Md., with its all-seeing Echelon super-Internet system, is the world's most sophisticated. Or is it? Several European nations -- and Japan, South Korea and Taiwan -- are quickly catching up. The system known as Carnivore, the FBI's new e-mail surveillance system, has been virtually cloned in Japan and holds dangers for abuse of personal privacy as well as espionage. Technology may be in the forefront, but there is still demand for the old-fashioned human espionage operative. One former spy was so effective with his cover that he was head-hunted by a London management consulting firm and is now working for a major multinational firm in Oman. His income is more than when he was the top intelligence agent of his nation's espionage team in Tokyo. Among the reasons that Japan is a clandestine agent's paradise is that there is no anti-espionage law, due primarily to lingering sensitivities about the old Kempeitai (thought police) of the World War II era. Also, lax patent laws and shipping regulations make Japan an "easy come, easy go" destination. Example computer software that can't be shipped from Canada to the U.S. directly is shipped first to Japan "in a plain wrapper" and then shipped back to the U.S. Lately, some shipments of bootleg Viagra, the sexual empowerment drug, have been intercepted. The sheer numbers of foreign residents is another problem in keeping track of suspected spies. Monitoring 657,000 Koreans, 234,000 Chinese, 201,795 Brazilians, 84,508 Filipinos, 44,168 Americans, 37,000 Peruvians, 18,000 Thais, 13,000 Britons, 10,000 Vietnamese, 8,000 Indonesians, 8,000 Iranians and 100,000 "others" living amid 125.9 million Japanese strains the capabilities of the National Police Agency. Police suspect that most of the spies come from the ranks of businessmen, diplomats and journalists -- "anyone who can handle a laptop computer," a police agency official was quoted as saying. At least 200,000 of the foreigners call themselves "businessmen" and live in Tokyo with their families, communicating regularly around the world by telephone, fax, e-mail and regular mail. There are 124 embassies, 24 sub-embassies or international organizations such as trade offices as well as the Chosen Soren North Korea Residents Association establishment that is widely believed to function as a de facto foreign ministry for North Korea. There are 1,536 accredited diplomats , or "legal spies," as some Japanese call them. There are 832 news correspondents representing 280 news organizations from 48 countries and territories. The United States accredits 334 correspondents in Japan, Britain, 159; South Korea, 52; France, 46; Germany, 40; Taiwan, 21; Australia, 19; Hong Kong, 18; Russia, 15; down to one each from places such as Belgium, Finland, Hungary, Israel, Malaysia, Nigeria and Norway. Long neglected, interest has been revived in Japanese intelligence recently with the North Korean firing of a rocket over Japanese territory in August 1998. Politicians hurried to propose legislation that would allow building of Japanese "spy satellites" and joint research with the United States on the Theater Missile Defense(TMD) system. Up to now, Japan has had to be satisfied with leftover crumbs from U.S. satellite intelligence reports. There is interest, but little information available on the other side of the coin, Japanese intelligence. Even before the North Korean rocket shot called attention to weak Japanese intelligence, an American, Andrew L. Oros, was looking into the situation. A doctoral candidate in the Department of Political Science at Columbia University in New York, Oros had begun investigating for his thesis "Change and Continuity in Japan's Foreign Intelligence-Related Activities Institutional Evolution in Post-Cold War Japan." He had heard rumors of an intelligence build-up in Tokyo. To get closer to the action, he gained a research fellowship at the Graduate School of Law and Politics, University of Tokyo. Aware of Japan's "closed intellectual shop," as detailed by Ivan Hall in his book "Cartels of the Mind," Oros was nonetheless astounded by the cool reception to his efforts. "Never have so many doors closed so fast," he said. "I may have to broaden the scope of my paper. " One of the most revealing books on modern spy activities in Tokyo is "On The Wrong Side My Life in The KGB" by Stanislav Levchenko , published in Washington in 1988. In the book and in a later interview Levchenko gave a spy's-eye view of life in Tokyo and how easy it was to compromise Japanese newsmen .and gain information from them. "Often they would give me important information for no money just for the sense of getting even with a bad boss, a betraying spouse or other lack off self-esteem," he said. This picture may not have changed a great deal since the end of the Cold War. Thus, even while Japan may finally be making some moves to beef up its own previous neglected intelligence capabilities, Tokyo appears to remain a wide open city for espionage operations by other powers. (Edward Neilan is a Tokyo-based analyst of Northeast Asian affairs.) =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1238 From: Date: Thu Aug 17, 2000 4:50pm Subject: Re: BLack Ice Defender Anti-Virus/Hacker Software re Black Ice ; thanks for all the input! you guys are good ...very,very,good ! HAVE A GREAT DAY !!! 1239 From: Date: Thu Aug 17, 2000 5:48pm Subject: computer security software books from ITKNOWLEDGE.Com We've been reading stories about computer crime and security for so long that they're starting to lose the punch they once had. It's been the hype for years: be careful on the Internet! Beware the thief of credit card numbers, the author of viruses, the antisocial genius who wants to snoop into your files when you're away! Be sure to encrypt your files and run that virus-scan software! And when we read these words, too many of us yawn and flip on to the next page. But this is becoming an ever more dangerous attitude. As the Melissa and Love Bug viruses proved, viruses are still out there, and new software (especially Microsoft Office) makes them easy to create and spread. And many businesses and individuals are getting DSL and other high-speed always-on Internet connections, which have static IP addresses that are easier to break into. What's a poor technophile to do? The first step, of course, is to be informed, and that's where ITKnowledge comes in. Today, we'll be looking at books that can give you the tools to make your daily business computing more secure. One of the classic texts regarding encryption is Bruce Schneier's "Applied Cryptography," now in its second edition. http://corpitk.earthweb.com/reference/pro/0471128457/ewtoc.html "Applied Cryptography" introduces cryptographic terminology, explores social and political ramifications of encryption, and also provides detailed explanations for a number of encryption algorithms. Source code (in C) is included. Schneier's book is not for beginners, but programmers fluent in C will find plenty to tinker with. And the political and historical perspectives make "Applied Cryptography" fascinating even for non-programmers. You can find an example of a working encryption algorithm in another book by Schneier et al, "The Twofish Encryption Algorithm: a 128-Bit Block Cipher." http://corpitk.earthweb.com/reference/pro/0471353817/ewtoc.html This one, being an exhaustive analysis of the design and implementation of a single algorithm, is primarily of interest to programmers. The book includes source code. For those looking to optimize security on a Windows 2000 system, look no further than "Configuring Windows 2000 Security" by Thomas Shinder et al. http://corpitk.earthweb.com/reference/pro/1928994024/ewtoc.html This is a nice in-depth "how to" manual that digs deep into subjects such a PKI, Kerberos server authentication, and smart cards. The organization could be clearer--one wonders why the brief overview of security issues at the book's end didn't come at the beginning. Finally, "Firewalls 24/7" by Matthew Strebe and Charles Perkins http://corpitk.earthweb.com/reference/pro/0782125298/ewtoc.html is an excellent introduction to security technology that begins with one of the best explanations of the varying meanings of the word "hacker" that I have yet seen. There's also plenty of coverage of particular firewall products, but the detailed explanation of various firewall technologies (packet filtering, proxies, VPNs) makes "Firewalls 24/7" stand out. It's also a good overview of computer security. HAVE A GREAT DAY !!! 1240 From: James M. Atkinson, Comm-Eng Date: Thu Aug 17, 2000 5:59pm Subject: Gentle Reminder I would like to offer the following gentle reminder to the list. Please remember that this list is for the discussion of tools, equipment, methods, and procedures used to hunt down bugs, spies, and eavesdroppers. An occasional posting about a computer security topic is fine, but lets not over do it... the list focus is *** TSCM *** not computer security. Of course computer security is involved in TSCM (cough-cough), but let's not over do it. Having "Black Ice" on your PC is not going to detect digital microwave eavesdropping devices, nor it going to be of much help in ferreting a hardwired microphone system. How about a posting about how detection thresholds, preferred bandwidths for detection, and sweep speeds. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1241 From: Dawn Star Date: Fri Aug 18, 2000 11:25am Subject: Carnivore Market Update | My Portfolio | Broker Reports | Tech Sectors | IPOs | Splits EarthLink will do FBI's surveillances itself By The Associated Press Special to CNET News.com July 14, 2000, 3:55 p.m. PT update ATLANTA--EarthLink Network today said it has reached an agreement with the FBI to avoid future use of the email surveillance device "Carnivore," which disrupted Internet access for some EarthLink customers earlier this year. The Atlanta-based company, which has about 4.2 million subscribers nationwide, said it had installed the snooping software for the FBI at a data center in Pasadena, Calif., earlier this year after it lost a decision on the matter in federal court. . Get the "Big Picture" . Related News . Message Boards Quote Snapshot ELNK 9.88 +0.25 Enter symbol: ∑ Symbol Lookup Quotes delayed 20+ minutes When Carnivore wouldn't work with an operating system on the company's machines, an older system was installed for the device, which then led some servers to crash, EarthLink's director of technology acquisition, Steve Dougherty told The Wall Street Journal. Dougherty said "many" customers were affected, although he declined to say how many or where. Carnivore, which an FBI spokesman said was first used in spring 1999, scans all incoming and outgoing emails for messages of suspected criminals. FBI spokesman Steven Berry said the device gives the agency "a surgical ability to intercept and collect the communications which are the subject of a court order" and ignores everything else. EarthLink spokesman Kurt Rahn said the company and FBI officials have agreed that the company will collect such data itself when investigators obtain court orders in the future. "Basically, we reached a mutual agreement with the FBI that we would be able to monitor and gather the information that they needed ourselves," Rahn said. "That way, they got what they wanted, and we were able to maintain the integrity of our network." Berry declined to confirm any such agreement or discuss which Internet service providers (ISP) have installed Carnivore. Berry said the bureau is using the device, but he declined to say in how many cases or where. All Carnivore installations are done "in close cooperation" with ISPs, Berry said, but the FBI collects the data itself. Rahn said the company has no problem with following court orders to provide customer information to law enforcement but is concerned when doing so compromises its operations. "It wasn't necessarily anything that was terribly disruptive, but it was more sort of the potential that it could have been worse," Rahn said of the outage Carnivore caused. "And basically, since delivering email and delivering the Internet to our members is what we do, having that threatened is not going to work for us." U.S. Attorney General Janet Reno said this week that she will review the use of Carnivore to address privacy concerns. Copyright © 2000 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed. [Non-text portions of this message have been removed] 1242 From: Date: Thu Aug 17, 2000 2:12am Subject: Re: Referral List has been updated I am not sure about Sam Daskim... Please check his name once more. I think the website address and email address will be OK, but logo is an option the owner must pay for ;-) Best regards, Janis "James M. Atkinson, To: TSCM-L Mailing List Comm-Eng" cc: 00.08.17 04:02 Please respond to TSCM-L Good Evening, Earlier this evening I updated the "Gold List" on my website and would like to invite list members to check it out and to send your comments (privately if you wish). http://www.tscm.com/goldlist.html If you are listed on the page PLEASE make sure that your all of your information is listed correctly. I am also considering adding a website address, email address, and logo to each of the listings, but would appreciate some discussion on the matter. -jma 1243 From: Jason Miles Dibley Date: Fri Aug 18, 2000 1:36pm Subject: Laser Microphone technology Please could the list ease my curiosity on one matter, during sweeps and in professional reports written post inspection, the use of laser microphone technology is evaluated and recommendations are made to guard against their use. However in the 12 years that I have been involved in technical surveillance operations and countermeasures for law/government agencies in the UK and now in the private sector, I have never encountered any laser microphone equipment. Even during restricted trade exhibitions and multi agency excercises. Is this old technology that never really caught on, or a case of price prohibiting only the most committed and well funded eavesdroppers. Could the list advise me on the actual risk posed by these instruments, their current availability, and if the technology can be realistically applied to modern urban building structures in light of increased vibration due to air-conditioning, traffic (air, ground and subterranean). If so the range, frequency, attainable audio bandwidth. etc. Any information would be of help. Many Thanks. Signed J M Dibley QCC Interscan Ltd. ************************************************************** Please visit our associates Web site at http:\\www.qcc.co.uk This message is intended only for the use of the person(s) to whom it is addressed. It may contain information which is privileged and confidential or material which is protected under attorney-client privilege. In addition, this message may not necessarily represent the views of QCC Interscan Ltd. Accordingly any unauthorised use is strictly prohibited. If you are not the Intended Recipient, please contact QCC Interscan Ltd as soon as possible or send mail to contact@q.... QCC Information Interscan Ltd. Registered in England and Wales No. 03773029 [Non-text portions of this message have been removed] 1244 From: Steve Uhrig Date: Fri Aug 18, 2000 2:45pm Subject: Re: Laser Microphone technology Once upon a midnight dreary, Jason Miles Dibley pondered, weak and weary: > Could the list advise me on the actual risk posed by these > instruments, their current availability, and if the > technology can be realistically applied to modern urban > building structures in light of increased vibration due to > air-conditioning, traffic (air, ground and subterranean) Read the articles on our website "This Bug's For You". I believe there is coverage there on laser eavesdropping. For the most part, lab curiousity only. Think through the physics of the process, as you started to, and the matter should become plain. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1245 From: Miguel Puchol Date: Fri Aug 18, 2000 5:10pm Subject: RE: Carnivore All, Some statements below make you think. Allegedly, the device only retrieves email that is to or from a person subject to court ordered surveillance. So, what if this somebody just opens a new email account with Hotmail? How can they trace that? There are many ways of sending annonymous email. I think that these devices can be used, realistically, to do word searches on all or most of the email traffic through a server, and this I think counts as invasion of privacy. Mike -----Mensaje original----- De: Dawn Star [mailto:bratkid@e...] Enviado el: viernes, 18 de agosto de 2000 18:25 Para: TSCM-L@egroups.com Asunto: [TSCM-L] Carnivore Market Update | My Portfolio | Broker Reports | Tech Sectors | IPOs | Splits EarthLink will do FBI's surveillances itself By The Associated Press Special to CNET News.com July 14, 2000, 3:55 p.m. PT update ATLANTA--EarthLink Network today said it has reached an agreement with the FBI to avoid future use of the email surveillance device "Carnivore," which disrupted Internet access for some EarthLink customers earlier this year. 1246 From: Date: Sat Aug 19, 2000 0:51am Subject: Emission-proof PCs HAVE A GREAT DAY !!! ---------- http://www.ad.siemens.de/tempest/html_76/emission.htm [Non-text portions of this message have been removed] 1247 From: Nick Robson Date: Sat Aug 19, 2000 9:48pm Subject: Bluetooth - From Crypto-Gram 15 Aug 2000 Bluetooth Sometime in the 1950s, various governments realized that you could eavesdrop on data-processing information from over a hundred feet away, through walls, with a radio receiver. In the U.S., this was called TEMPEST, and preventing TEMPEST emissions in radios, encryption gear, computers, etc., was a massive military program. Civilian computers are not TEMPEST shielded, and every once in a while you see a demonstration where someone eavesdrops on a CRT from 50 feet away. Soon it will get easier. Bluetooth is a short-range radio communcations protocol that lets pieces of computer hardware communicate with each other. It's an eavesdropper's dream. Eavesdrop from up to 300 feet away with normal equipment, and probably a lot further if you try. Eavesdrop on the CRT and a lot more. Listen as a computer communicates with a scanner, printer, or wireless LAN. Listen as a keyboard communicates with a computer. (Whose password do you want to capture today?) Is anyone developing a Bluetooth-enabled smart card reader? What amazes me is the dearth of information about the security of this protocol. I'm sure someone has thought about it, a team designed some security into Bluetooth, and that those designers believe it to be secure. But has anyone reputable examined the protocol? Is the implementation known to be correct? Are there any programming errors? If Bluetooth is secure, it will be the first time ever that a major protocol has been released without any security flaws. I'm not optimistic. And what about privacy? Bluetooth devices regularly broadcast a unique ID. Can that be used to track someone's movements? The stampede towards Bluetooth continues unawares. Expect all sorts of vulnerabilities, patches, workarounds, spin control, and the like. And treat Bluetooth as a broadcast protocol, because that's what it is. Bluetooth: A list of Bluetooth articles, none of them about security: One mention of security: An essay about the Bluetooth hype: ------- Nick Robson The Security Centre Ltd. [Non-text portions of this message have been removed] 1248 From: James M. Atkinson, Comm-Eng Date: Sun Aug 20, 2000 1:47am Subject: Re: Bluetooth - From Crypto-Gram 15 Aug 2000 At 9:48 PM -0500 8/19/00, Nick Robson wrote: >Bluetooth > >Sometime in the 1950s, various governments realized that you could >eavesdrop on data-processing information from over a hundred feet away, >through walls, with a radio receiver. In the U.S., this was called >TEMPEST, and preventing TEMPEST emissions in radios, encryption gear, >computers, etc., was a massive military program. Civilian computers are >not TEMPEST shielded, and every once in a while you see a demonstration >where someone eavesdrops on a CRT from 50 feet away. TEMPEST date back a lot further then that... much further... In fact during World War I both side used to "spy on" the "compromising emanations" created by field phones, etc, etc. During the early 80's I worked on a number of classified system (some on which date back as far as 1952 and ALL of them complied with the TEMPEST program (frickin torque wrench, and 200 screws just to change a blown fuse). TEMPEST has nothing... repeat nothing... zippo, nadda, ixnay, NOTHING to do with actual eavesdropping. TEMPEST deal with bonding, grounding, shielding, and filtering to the signals radiated (or conducted) to a level low enough so as to really annoy someone try to eavesdrop on the signal. Contrary to urban legend you can indeed eavesdrop on many devices which is in fact TEMPEST certified. However, you have to use very high gain antenna, really powerful preamplifiers and amplifiers, and most importantly you have to get really, really close. >Soon it will get easier. > >Bluetooth is a short-range radio communcations protocol that lets pieces of >computer hardware communicate with each other. It's an eavesdropper's >dream. Eavesdrop from up to 300 feet away with normal equipment, and >probably a lot further if you try. Eavesdrop on the CRT and a lot >more. Listen as a computer communicates with a scanner, printer, or >wireless LAN. Listen as a keyboard communicates with a computer. (Whose >password do you want to capture today?) Is anyone developing a >Bluetooth-enabled smart card reader? No, Blue tooth os primaly aimed at providing seemless integrate between various types of consumer electronic devices. Such as Cell Phones, MP3 players, pocket recorders, and so on. >What amazes me is the dearth of information about the security of this >protocol. I'm sure someone has thought about it, a team designed some >security into Bluetooth, and that those designers believe it to be >secure. But has anyone reputable examined the protocol? Is the >implementation known to be correct? Are there any programming errors? If >Bluetooth is secure, it will be the first time ever that a major protocol >has been released without any security flaws. I'm not optimistic. Bluetooth used a simple multi-stage shit (er, shift) cipher systems based on x- number of feedback stages. >And what about privacy? Bluetooth devices regularly broadcast a unique >ID. Can that be used to track someone's movements? Yep... the same we can use a cellular and PCS phone to track someone movements >The stampede towards Bluetooth continues unawares. Expect all sorts of >vulnerabilities, patches, workarounds, spin control, and the like. And >treat Bluetooth as a broadcast protocol, because that's what it is. > >Bluetooth: > > >A list of Bluetooth articles, none of them about security: > > >One mention of security: > > >An essay about the Bluetooth hype: > > >------- > >Nick Robson >The Security Centre Ltd. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1249 From: Miguel Puchol Date: Sun Aug 20, 2000 7:29am Subject: RE: Bluetooth - From Crypto-Gram 15 Aug 2000 Nick, Bluetooth will (all being well) be delivered in OEM-type transceivers that you will be able to use in any device that requires short-range communications - that' what the blurb says. Now then, just like any wireless device, it's signal could be used to track Bluetooth-enabled systems. In Europe, a tracking system based on the GSM network will be implemented early this year. In some test runs we made, you could achieve accuracies better than 500 meters in most cases, depending on the physical coverage of the cell the phone was registered on. My opinion is that it will be prohibitive to implement any kind of decent security/encryption features in Bluetooth. It's intended as a cheap short range intercom, basically. Some GSM networks don't encrypt the calls, this seems to vary from cell to cell within the same network operator, so anyone with capable GSM demodulators could very easily intercept a call. This is also true with most new digital standards & systems, like TETRA, TetraPol, DECT, etc. For example, with TETRA, adding encryption to the digitized audio signal bitstream represents effectively reducing the codec's sampling frequency from 8kHz to around 2.2kHz - which you can see will make the quality of the recovered audio very poor. This is why all the TETRA networks I know don't implement encryption - again, just a modified TETRA transceiver is capable of silently listening to any logical channel of a system, network operators have these for call-quality monitoring. Don't expect great privacy with Bluetooth, but I think that it will only be the target of very high-level attacks in very particular situations - nevertheless it's users should be warned, just like I think that most consumer RF devices (cordless phones, baby monitors, etc.) should have warning labels regarding security / privacy. All the best, Mike -----Mensaje original----- De: Nick Robson [mailto:sci.ltd@c...] Enviado el: domingo, 20 de agosto de 2000 4:49 Para: Reply to TSCM List Asunto: [TSCM-L] Bluetooth - From Crypto-Gram 15 Aug 2000 Bluetooth Sometime in the 1950s, various governments realized that you could eavesdrop on data-processing information from over a hundred feet away, through walls, with a radio receiver. In the U.S., this was called TEMPEST, and preventing TEMPEST emissions in radios, encryption gear, computers, etc., was a massive military program. Civilian computers are not TEMPEST shielded, and every once in a while you see a demonstration where someone eavesdrops on a CRT from 50 feet away. Soon it will get easier. Bluetooth is a short-range radio communcations protocol that lets pieces of computer hardware communicate with each other. It's an eavesdropper's dream. Eavesdrop from up to 300 feet away with normal equipment, and probably a lot further if you try. Eavesdrop on the CRT and a lot more. Listen as a computer communicates with a scanner, printer, or wireless LAN. Listen as a keyboard communicates with a computer. (Whose password do you want to capture today?) Is anyone developing a Bluetooth-enabled smart card reader? What amazes me is the dearth of information about the security of this protocol. I'm sure someone has thought about it, a team designed some security into Bluetooth, and that those designers believe it to be secure. But has anyone reputable examined the protocol? Is the implementation known to be correct? Are there any programming errors? If Bluetooth is secure, it will be the first time ever that a major protocol has been released without any security flaws. I'm not optimistic. And what about privacy? Bluetooth devices regularly broadcast a unique ID. Can that be used to track someone's movements? The stampede towards Bluetooth continues unawares. Expect all sorts of vulnerabilities, patches, workarounds, spin control, and the like. And treat Bluetooth as a broadcast protocol, because that's what it is. Bluetooth: A list of Bluetooth articles, none of them about security: One mention of security: An essay about the Bluetooth hype: ------- Nick Robson The Security Centre Ltd. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1250 From: Vector Date: Sun Aug 20, 2000 8:55am Subject: Wiretapping Internet in Europe The European Union is quietly getting ready to approve legislation that will allow the police to eavesdrop both on Internet conversations and Iridium satellite telephone calls without obtaining court authorization... ref: http://www.wired.com/news/politics/0,1283,16588,00.html 1251 From: Rocco Rosano Date: Sun Aug 20, 2000 10:41am Subject: Re: Wiretapping Internet in Europe Vector, et al, What is the status of that legislation? Did that die? Or has some of that been enacted? They have been discussing that for almost 2 years. I though the FBI system (Carnivore) was part of that concept! Rocco Reynoldsburg, Ohio Vector wrote: > The European Union is quietly getting ready to approve legislation that > will allow the police to eavesdrop both on Internet conversations and > Iridium satellite telephone calls without obtaining court authorization... > > ref: http://www.wired.com/news/politics/0,1283,16588,00.html > 1252 From: James M. Atkinson, Comm-Eng Date: Sun Aug 20, 2000 1:11pm Subject: Nowhere to hide Nowhere to hide http://theage.com.au/news/20000820/A13431-2000Aug18.html By DUNCAN CAMPBELL Sunday 20 August 2000 Governments all over the world have suddenly become embroiled in controversy about electronic surveillance of the Internet. In the United States, a political storm has arisen over a new FBI Internet tapping system codenamed Carnivore. In Britain, the Regulation of Investigatory Powers Act has just extended telephone-tapping powers to cover Internet service providers, and allows the government to arrange indiscriminate tapping or e-mail interception for foreign police forces and security agencies. In the Netherlands, the Dutch security service BVD admitted two weeks ago that it had been collecting e-mails sent abroad by companies. In the Hague, laws are being prepared to allow the Justice Ministry to tap into e-mail and subscriber records, scan messages and mobile phone calls, and track users' movements. (In Australia, law enforcement agencies are not required to obtain a court order to demand disclosure of information provided it is in the course of a criminal investigation or is part of an ASIO operation against a threat to national security. The Commonwealth's Telecommunications (Interception) Legislation Amendment Bill 2000 amends the Telecommunications (Interception) Act 1979 and the Australian Security Intelligence Organisation Act. Within the amendments, interception warrants against a named person are enabled, as are warrants covering foreign communications.) These developments are no coincidence, but the direct result of secret planning over seven years by an international coordinating group set up by the FBI, after Congress twice refused to extend its telephone tapping powers for digital networks. Under the innocuous title of the International Law Enforcement Telecommunications Seminar, the group has met annually to plan for and lobby to make telecommunications systems "interception-friendly". The seminar excluded lawyers and industry specialists who might have advised on the arrangements to protect privacy and human rights, or on the feasibility and cost of the intelligence officers' wish list of interception requirements. As a result, the laws based on their recommendations have repeatedly caused controversy. The work of the group came to light in late 1997, when British researcher Tony Bunyan revealed collaboration between EU staff and the FBI for many years. Details of plans to compel Internet service providers worldwide to install secret interception "black boxes" in their premises appeared in Online in The Guardian last year. (www.guardianunlimited.co.uk/Archive/Article/0,4273,3859496,00.html). A month ago, the European Parliament appointed 36 parliamentarians to lead a year-long investigation into Echelon - the codename for a mainly US system for monitoring traffic on commercial communications satellites. Echelon has become common parlance for the worldwide electronic eavesdropping or signals intelligence network run by Britain's Government Communications Headquarters together with the US National Security Agency. The inquiry will ask if the rights of European citizens are adequately protected and ascertain whether European industry is put at risk by the global interception of communications. French politicians and lawyers have taken the lead in accusing the US and Britain of using their electronic intelligence networks to win business from foreign rivals. US politicians have riposted that France runs a worldwide electronic intelligence system of its own - Frenchelon, based at Domme, near Sarlat in the Dordogne, and includes an eavesdropping station in New Caledonia in the Pacific (see www.zdnet.co.uk/news/2000/25/ns-16207.html). Electronic eavesdropping has become a battleground between the US and Russia. The Russian-American Trust and Cooperation Act of 2000, passed on July 19, prohibits the US President from rescheduling or writing off billions of dollars of Russian debts unless a Russian spy base in Cuba is "permanently closed". This base at Lourdes, located on leased land near Havana, was the former Soviet Union's most important intelligence facility. It uses Echelon-type systems to collect data from telephone calls and satellite links covering the US. Lourdes allegedly provides "between 60 per cent and 70 per cent of all Russian intelligence data about the US". A defector has said that spying from Lourdes had grown dramatically following an order by Boris Yeltsin to step up economic and technological espionage against the West. The White House wants to stop the campaign to close Lourdes because other countries might then ask the US to close down similar bases. Documents suggest the US would particularly fear the Lourdes effect spreading to Britain, Germany and Australia, where the National Security Agency operates large sites. The US is not alone in this spying. By the end of the year, the Government Technical Assistance Centre will have begun operations from inside MI5's headquarters at Thames House, Millbank. Its primary purpose will be to break codes used for private e-mail or to protect files on personal computers. It will also receive and hold private keys to codes which British computer users may be compelled under law to give to the government. The development of the Government Technical Assistance Centre has been pioneered by the Home Office's Encryption Coordination Unit, which says that the centre will "provide the capability to produce plain text/images/audio from lawfully intercepted communications and lawfully seized computer media which are encrypted". The Home Office has not confirmed reports that the centre will also be the collecting point for intercepted internet communications relayed from the "sniffer" boxes to be installed inside British Internet service providers. The cost of building the centre, said to be $38 million, is likely to include the price of ultra-fast super-computers, of the type previously used only to break Soviet codes and attack other special military targets. Code-breakers from the Government Communications Headquarters will be seconded to work at the centre. The communications headquarters has used sophisticated computers for many years to examine foreign or "external" messages and phone calls, as part of the worldwide intelligence network operated with other English-speaking countries. The key part of this system uses computers called Dictionaries, which hold lists of thousands of target names, addresses and key words. They are used to select messages of interest, while discarding most communications. The headquarters was not normally permitted to encroach on domestic communications. Now, the Regulation of Investigatory Powers Act says that as many domestic Internet communications travel on the same "trunks" as external communications, it will be allowed to trawl through these messages without restriction. Another limitation, which had prevented the direct targeting of people in Britain by the headquarters without specific authorization has also been dropped. The Home Secretary can sign an "overriding" warrant every three months, which will allow general surveillance without the need for individual warrants. This will apply to "serious crime", which can include organizing demonstrations that may affect public order. The Act will also allow any agency nominated by the Home Secretary to tap into the addresses of e-mails sent and received (though not their content) without a warrant. Caspar Bowden, whose lobbying organization, the Foundation for Information Policy Research, helped to bring some important changes to the new law, believes that letting Dictionary-type computers carry out broad-ranging surveillance on much internal UK traffic will break the new Human Rights Act (see www.fipr.org). The FBI has just been granted $85 million for an electronic surveillance program called Digital Storm. This foresees the quadrupling of telephone tapping in the US over the next decade. The FBI hopes to build in automated transcription and translation systems. According to its budget application for the next US fiscal year, a related program called Casa de Web will include central computer archives for intercepted audio and data reports. The existence of Carnivore was revealed three months ago as the result of a lawsuit between an Internet service provider and federal marshals, who demanded that the provider wire a Carnivore box into its network. The FBI initially wanted to install its own version of a commercial "sniffer" program called Etherpeek. Then it turned up with Carnivore and a court order to install it. The FBI claims there are only 20 Carnivores, and that they have been used only 25 times in the past 18 months (www.fbi.gov/programs/carnivore/carnivore.htm). But the system is so controversial that the US Congress held special hearings two weeks ago. A judge has ordered the FBI to answer requests for details made under the Freedom of Information Act. Carnivore consists of a laptop computer and communications interface cards. It runs a packet sniffer program to select the data it wants from inside the Internet service provider local network. According to Marcus Thomas, head of the FBI's Cyber Technology Section, they are PCs using proprietary software and acting as a "specialised sniffer". The bureau claims that although Carnivore's hardware sees all the traffic passing through the provider where it is installed, its software looks only at the origin and the destination of each Internet packet. If the addresses correspond with those specifically authorised in a court order, then the information and/or the contents are extracted and forwarded to the FBI. The agency claims no other data is recorded or examined. But US computer experts do not believe this is possible. For example, many providers allocate Internet addresses to their customers. This means that every time you dial in to your provider, you will use a different Internet address. Unless Carnivore is also intercepting this type of data, it cannot work. The FBI has been asked to reveal Carnivore's source code, but has refused. US Attorney-General Janet Reno has publicly regretted the selection of the codename Carnivore. It will be changed to a less threatening name. - GUARDIAN =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1253 From: gerry Date: Sun Aug 20, 2000 4:06am Subject: Re: LA Background check hi are there any LA based fellows here who can contact me by direct email? there is a small job that needs some attention. thanks gerry 1254 From: James M. Atkinson, Comm-Eng Date: Mon Aug 21, 2000 8:56am Subject: You Know You're In California When... You Know You're In California When... 1. Your co-worker has 8 body piercings and none is visible. 2. You make over $150,000 and still can't afford a house. 3. You take a bus and are shocked at 2 people carrying on a conversation in English. 4. Your child's 3rd grade teacher has purple hair, a nose ring, is named Breeze, and you are not sure of it's gender. 5. You can't remember...is pot illegal? 6. You've been to a baby shower that has two mothers and a sperm donor. 7. You have a very strong opinion about where your coffee beans are grown and can taste the difference between Sumatra and Ethiopian. 8. You know which restaurant serves the freshest arugula. 9. A really great parking space can move you to tears. 10. A low speed pursuit will interrupt ANY TV broadcast. 11. Gas cost 75 cents per gallon more than anywhere else in the U.S. 12. A man gets on the bus in full leather regalia and crotchless chaps. You don't even notice. 13. Unlike back home, the guy at 8:30 am at Starbucks wearing the baseball cap and sunglasses who looks like George Clooney IS George Clooney. 14. Your car insurance costs as much as your house payment. 15. Your hairdresser is straight, your plumber is gay, the woman who delivers your mail is into BDSM and your Mary Kay rep is a guy in drag. 16. It's raining and there's a report on every news station about "STORM WATCH 2000." 17. You have to leave the big company meeting early because Billy Blanks himself is teaching the 4:00 PM Tae Bo class. 18. You pass an elementary school playground and the children are all busy with their cell phones or pagers. 19. It's sprinkling outside, so you leave for work an hour early to avoid all the weather-related accidents. 20. You AND your dog have therapists. =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1255 From: A Grudko Date: Mon Aug 21, 2000 3:27pm Subject: Re: Bluetooth - From Crypto-Gram 15 Aug 2000 ----- Original Message ----- . > TEMPEST has nothing... repeat nothing... zippo, nadda, ixnay, NOTHING > to do with actual eavesdropping. Interesting. Not the civilian and in at least 2 government Intel services, understanding of the term. 1256 From: A Grudko Date: Mon Aug 21, 2000 3:29pm Subject: Cell tapping in SA. ----- Original Message ----- (City Press 19 / 08 / 2000) The full article can be read at : http://news.24.com/City_Press/City_Press_News/0,1885,186-187_899929,00.html The article quotes Mr Sellschop, MTN group executive as saying. " his company supported every endeavour to reduce crime and would encourage initiatives for the careful and controlled monitoring of cellphone-to-cellphone communication, on condition the privacy of innocent cellphone users was not compromised." Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" [Non-text portions of this message have been removed] 1257 From: Miguel Puchol Date: Mon Aug 21, 2000 5:47pm Subject: RE: Wiretapping Internet in Europe Er...Iridium is dead. I suppose that other more useful sources, like Inmarsat, Intelsat, or GlobalStar are being cosidered - the bit I don't like is the 'without a court order'. Regarding email, I think all this hubbub will only make people use stronger encryption every time, this including criminals. There was a discussion not so long ago regarding tracking criminals via their mobile phones, but the conclusion reached was that once one or two were caught, then what they would do is to change phone every couple of days...I think the same principle can be assumed for email, specially when it's much easier to change ISP and email accounts. All the best, Mike -----Mensaje original----- De: Vector [mailto:vector@q...] Enviado el: domingo, 20 de agosto de 2000 15:56 Para: TSCM-L@egroups.com Asunto: [TSCM-L] Wiretapping Internet in Europe The European Union is quietly getting ready to approve legislation that will allow the police to eavesdrop both on Internet conversations and Iridium satellite telephone calls without obtaining court authorization... ref: http://www.wired.com/news/politics/0,1283,16588,00.html ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1258 From: Jay Coote, W6CJ Date: Mon Aug 21, 2000 8:35pm Subject: Re: LA Background check Hard to contact you if the list shuts off your email address. I am in Los Angeles. Jay Coote TSCM@j... ---------- > > > hi > are there any LA based fellows here who can contact me by direct email? > there is a small job that needs some attention. > thanks > gerry > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1259 From: James M. Atkinson, Comm-Eng Date: Mon Aug 21, 2000 8:48pm Subject: Re: LA Background check Ahem... The list DOES NOT shut off your Email address. If your list postings are not getting though then something is wrong with your incoming Email. -jma At 9:38 PM -0400 8/21/00, Jay Coote, W6CJ wrote: >Hard to contact you if the list shuts off your email address. >I am in Los Angeles. >Jay Coote >TSCM@j... > >---------- > > > > > > hi > > are there any LA based fellows here who can contact me by direct email? > > there is a small job that needs some attention. > > thanks > > gerry =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1260 From: Bryan Herbert Date: Mon Aug 21, 2000 1:09pm Subject: Re: You Know You're In California When... Sadly, that is sooo true :) "James M. Atkinson, Comm-Eng" wrote: > You Know You're In California When... > > 1. Your co-worker has 8 body piercings and none is > visible. > > 2. You make over $150,000 and still can't afford a > house. > > 3. You take a bus and are shocked at 2 people > carrying on a conversation in English. > > 4. Your child's 3rd grade teacher has purple hair, a > nose ring, is named Breeze, and you are not sure of > it's gender. > > 5. You can't remember...is pot illegal? > > 6. You've been to a baby shower that has two mothers > and a sperm donor. > > 7. You have a very strong opinion about where your > coffee beans are grown and can taste the difference > between Sumatra and Ethiopian. > > 8. You know which restaurant serves the freshest > arugula. > > 9. A really great parking space can move you to > tears. > > 10. A low speed pursuit will interrupt ANY TV > broadcast. > > 11. Gas cost 75 cents per gallon more than anywhere > else in the U.S. > > 12. A man gets on the bus in full leather regalia and > crotchless chaps. You don't even notice. > > 13. Unlike back home, the guy at 8:30 am at Starbucks > wearing the baseball cap and sunglasses who looks like > George Clooney IS George Clooney. > > 14. Your car insurance costs as much as your house > payment. > > 15. Your hairdresser is straight, your plumber is gay, > the woman who delivers your mail is into BDSM and your > Mary Kay rep is a guy in drag. > > 16. It's raining and there's a report on every news > station about "STORM WATCH 2000." > > 17. You have to leave the big company meeting early > because Billy Blanks himself is teaching the 4:00 PM > Tae Bo class. > > 18. You pass an elementary school playground and the > children are all busy with their cell phones or > pagers. > > 19. It's sprinkling outside, so you leave for work an > hour early to avoid all the weather-related accidents. > > 20. You AND your dog have therapists. > > =================================================================== > Everybody's into computers... Who's into yours?Å > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Lizard, The Other White Meat > =================================================================== > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- Bryan Herbert (661) 714-2611 25006 Walnut St #2 Newhall, Ca. 91321 http://www.geocities.com/b_herbert_91321/index.html AIM: EAVE5DR0P | CAP: Yosemite 845 | Ham: KE6ZGP ICQ: 23631907 | IPN: CAL-013 | mIRC: SCMC-001 MSR: KCA6ZY | NAMA: NAMA-151 | RACES-DCS: F-150 Storm Spotter: LAC-505 1261 From: Matthijs van der Wel Date: Mon Aug 21, 2000 9:21am Subject: Encrypted messages -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, Although I keep reading messages about Carnivore, Echelon and how even our own Dutch Intelligence BVD (Binnenlandse Veiligheids Dienst) 'reads' all my E-mail messages, the TSCM mailing list doesn't offer any encryption possibilities. All messages are sent in plain text via different mail servers. Don't you think it's a good idea to offer members of this list the option to upload their PGP key and send the messages of this list in encrypted form? Even though I've read that encrypted E-mail messages marks them as 'suspicious' messages? Just a thought. Yours sincerely, Matthijs van der Wel Consultant E-Commerce - ------------------------------------ PAC Finance & Communications Raamweg 21 - 22 2596 HL THE HAGUE THE NETHERLANDS - ------------------------------------ T +31 - 70 - 31 30 209 (direct) F +31 - 70 - 31 30 221 E mailto:mwe@p... U http://www.pac.nl - ------------------------------------ "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s)or entity named/indicated above. If you are not the dentified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact me immediately for instructions." -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.3 for non-commercial use iQA/AwUBOaEs05+uKjzZYzkREQKC9ACgvmGfqALOdIA+P1XR4JhMKID4iAIAn2tZ 0c44XCIcTXZZRuUxv62fzkOq =JVC1 -----END PGP SIGNATURE----- From: Steve Uhrig Date: Sat Aug 17, 2002 8:04am Subject: Wireless, Defenseless Wireless, Defenseless Protect your wireless network before someone takes advantage By Lincoln D. Stein New Architect September 2002 A few days ago, I was waiting at Delta gate D13 at LaGuardia airport when I noticed something odd. The connect light on my wireless (IEEE 802.11b or "Wi-Fi") card lit up, indicating that it had found an access point somewhere to bind to. I sat up in surprise. Some U.S. airports have installed public-access wireless throughout their terminals, but LaGuardia isn't so forward thinking. Looking around, I spied the doorway of the nearby American Airlines Admiral's Club. As innocently as I could, I walked toward the door, keeping my eye on the signal power. As I moved closer, the signal increased. Popping up a Web browser confirmed my suspicion. Instead of seeing my usual home page, I was taken to a login page for a wireless Internet service that operates out of Starbucks, several hotel chains, and, yes, the American Airlines Admiral's Club. Bingo. I thought I would take advantage of this windfall by reading my email and surfing the Net. Unfortunately, the service wasn't free, and the subscription fee was too rich for my blood. Without purchasing the service, I couldn't get past the registration Web server. Sniffing the Net So I decided to do a little security research. I popped up my favorite network sniffing tool, the tcpdump application that's found on all Unix systems. A few seconds later, I was listening in on all of the wireless traffic in the Admiral's Club network. I detected three users on the network. One was actively reading his email using POP. I intercepted his incoming and outgoing messages, and because POP sends passwords in the clear, I also captured his login username and password. The second user wasn't using the Web actively, but his laptop was checking his office every five minutes for new mail. I soon had his login information as well. The third user was browsing the Web. I could see the address and content of each of the Web pages he accessed, along with all of his cookies and the contents of the online forms he submitted. Occasionally, he connected to a secure site using SSL, and then all I saw was encrypted gibberish. Well, at least someone was doing their job. Because the second computer user wasn't actively working on the network, I borrowed his connection for a while. I noted the IP address of his laptop and assigned it to my own machine. Seconds later, I had full Internet access. Having stolen a legitimate owner's IP address, the registration server now thought that I was a paying customer. I spent the next few minutes surfing the Internet freely. If the user noticed anything, he would only have thought that his Internet connection went down for a short period of time. Not Just Airports Was the ease with which I was able to hack into the Admiral's Club wireless network an isolated incident? Sadly, no. A few weeks earlier, I had done essentially the same thing while sitting in a public cafÈ adjacent to the National Science Foundation (NSF) building in Washington, D.C. Some employee had set up a wireless access point for mobile access to the NSF's network, but he or she didn't realize that this gave everyone else in the vicinity access as well. In this case, I didn't have to do any hacking. The network was wide open. For more examples, take a look at the article "Exploiting and Protecting 802.11b Wireless Networks" at Extreme Tech (www.extremetech.com/article/0,3396,s=1024&a=13880,00.asp). The authors explain how they drove through the streets of major metropolitan areas with sensitive antennas. In just a few days, they had identified hundreds of unsecured corporate networks. Wireless Insecurity If you're running a wireless network, there are some things you can do immediately that will make it harder for strangers to hitchhike on your network. You can activate Wireless Equivalent Privacy, change your network's service set identifier, and configure your access points to reject connections from unknown wireless cards. Other wireless security measures are described in "LAN Sharks" by Paul Sholtz (New Architect, May 2002). Ubiquitous public mobile networking is the manifest destiny of the Internet, and nothing will stand in its way. To work, the public mobile Internet has to be open, letting people join and drop out at will. This means that public wireless communication will be vulnerable to sniffing, so there's no longer any excuse for failing to use end-to-end encryption for email, Web, and login protocols. Encryption must become easier, more transparent, and ubiquitous. If it doesn't, the innocent-looking fellow with the laptop at American Airlines gate D13 is sure to find you, too. Lincoln is an M.D. and Ph.D. who designs information systems for the human genome project at Cold Spring Harbor Laboratory in New York, NY. You can contact him at lstein@c.... http://www.newarchitectmag.com/print/documentID=28050 ===================== ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6034 From: James M. Atkinson Date: Sat Aug 17, 2002 10:08am Subject: Remember, and Never Forget I sat in a movie theater watching "Schindler's List," asked myself; "Why didn't the Jews fight back? Now I know why. I sat in a movie theater, watching "Pearl Harbor and asked myself, "Why weren't we prepared?" Now I know why. Civilized people cannot fathom, much less predict, the actions of evil people. On September 11, dozens of capable airplane passengers allowed themselves to be overpowered by a handful of poorly armed terrorists because they did not comprehend the depth of hatred that motivated their captors. On September 11, thousands of innocent people were murdered because too many Americans naively reject the reality that some nations are dedicated to the dominance of others. Many political pundits, pacifists and media personnel want us to forget the carnage. They say we must focus on the bravery of the rescuers and ignore the cowardice of the killers. They implore us to understand the motivation of the perpetrators. Major television stations have announced they will assist the healing process by not replaying devastating footage of the planes crashing into the Twin Towers. I will not be manipulated. I will not pretend to understand. I will not forget. I will not forget the liberal media who abused freedom of the press to kick our country when it was vulnerable and hurting. I will not forget that CBS anchor Dan Rather preceded President Bush's address to the nation with the snide remark, "No matter how you feel about him, he is still our president." I will not forget that ABC TV anchor Peter Jennings questioned President Bush's motives for not returning immediately to Washington DC and commented, "We're all pretty skeptical and cynical about Washington." And I will not forget that ABC's Mark Halperin warned if reporters weren't informed of every little detail of this war, "they aren't likely nor should they be expected -- to show deference." I will not isolate myself from my fellow Americans by pretending an attack on the USS Cole in Yemen was not an attack on the United States of America. I will not forget the Clinton administration equipped Islamic terrorists and their supporters with the world's most sophisticated telecommunications equipment and encryption technology, thereby compromising America's ability to trace terrorist radio, cell phone, land lines, faxes and modem communications. I will not be appeased with pointless, quick retaliatory strikes like those perfected by the previous administration. I will not be comforted by "feel-good, do nothing" regulations like the silly "Have your bags been under your control?" question at the airport. I will not be influenced by so called,"antiwar demonstrators" who exploit the right of statement to chant anti-American obscenities. I will not forget the moral victory handed the North Vietnamese by American war protesters who reviled and spat upon the returning soldiers, airmen, sailors and Marines. I will not be softened by the wishful thinking of pacifists who chose reassurance over reality. I will embrace the wise words of Prime Minister Tony Blair who told Labor Party conference, "They have no moral inhibition on the slaughter of the innocent. If they could have murdered not 7,000 but 70,000, does anyone doubt they would have done so and rejoiced in it? There is no compromise possible with such people, no meeting of minds,no point of understanding with such terror. Just a choice: defeat it or be defeated by it. " And defeat it we must!" I will force myself to: * hear the weeping; * feel the helplessness; * imagine the terror; * sense the panic; * smell the burning flesh; * experience the loss,* remember the hatred. I sat in a movie theater, watching "Private Ryan" and asked myself, "Where did they find the courage?" Now I know. We have no choice. Living without liberty is not living. Remember, and Never Forget!!! -- Ed Evans, MGySgt., USMC (Ret.) Not as lean, Not as mean, But still a MARINE. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6035 From: Mitch D Date: Fri Aug 16, 2002 6:35pm Subject: Another equipment case mfgr in the US Heres another case manufacturer that makes a good product for transporting gear.All ata approved,with options out the wazoo http://www.skbcases.com/home/index.html. Ill be visiting this manufacturer as well as Thermodyne next week in LA. If anyone wants any additional info, e mail me off the list if youd like! Cheers! __________________________________________________ Do You Yahoo!? HotJobs - Search Thousands of New Jobs http://www.hotjobs.com 6036 From: George Shaw Date: Sat Aug 17, 2002 8:17am Subject: RE: Re: GPS wristwatch http://www.quiktrak.nl/nederlands.html QuikTrak are developing a system to embed into any electronic device such as mobile phone etc and comments on this system from anyone? George Shaw MI3GTO Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... 6037 From: Aimee Farr Date: Sat Aug 17, 2002 1:42pm Subject: RE: Remember, and Never Forget "Following my direct observations during my years of immigration, I must conclude that what one calls the cultivated circles of Western Europe and America are totally incapable of comprehending either the present situation or the real correlation of forces. These circles must be considered deaf-mutes. The revolution never develops in a straight line or by uninterrupted exchange; revolution consists of a series of accelerations, sudden brakes, attacks, truces, and periods of relative calm, during which he power of the revolution reinforces itself and prepares itself for final victory . . . . given the long length of time required for the growth of a world socialist revolution, we must resort to special maneuvers that can accelerate the ultimate victory over capitalistic countries. A. Announce, with a view to reassuring the deaf-mutes, the fictitious separation of our government and government organs, on the one hand, and the Politburo -- especially the Comintern -- on the other. The Comintern must be clearly categorized as an independent policy group whose presence is merely tolerated within our borders. The deaf-mutes will believe this. B. Express our hope to establish immediate diplomatic relations with all capitalist countries on the basic of total non-interference in their internal affairs. The deaf-mutes will believe us again. They will even be delighted and will throw their doors wide open. Through these doors will enter the emissaries of the Comintern and our secret service under the cover of diplomatic, cultural, and trade representatives. To tell the truth is a petty bourgeois habit, whereas to lie is justified by our objectives. The capitalists of the whole world and their governments will close their eyes on the kind of activities I have described and will become blind as well as deaf-mutes. They will extend loans which will provide us with the equipment and technology we lack and will thus help rebuild our military industry which we need to launch subsequent victorious attacks against our suppliers. In other words, the capitalist nations will always work to prepare their own suicide." --- Memo attributed to Lenin Regards, "MASTER PLOTTER" 6038 From: James M. Atkinson Date: Sat Aug 17, 2002 5:19pm Subject: Messing with them I went to the store the other day, I was only in there for about 5 minutes and when I came out there was a damn motorcycle cop writing a parking ticket. So I went up to him and said, 'Come on buddy, how about giving a guy a break?' He ignored me and continued writing the ticket. So I called him a pencil necked nazi. He glared at me and started writing another ticket for having bald tires!! So I called him a pile of horse manure. He finished the second ticket and put it on the car with the first. Then he started writing a third ticket! This went on for about 20 minutes, the more I abused him, the more tickets he wrote. I didn't give a damn. My car was parked around the corner... -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6039 From: Aimee Farr Date: Sat Aug 17, 2002 9:58pm Subject: RE: Messing with them Trust genre? (1920s, 1950s) -- wedge drivers, channel discreditation, trial displays and embarrassment tactics. Blach. Some people sure are connecting their dots and throwing up a dazzling array of focus points. Rather than mirror-imaging what we see as responsive and tactical measures, one might be more correct to consider actions as reflecting strategic intentions. I'm not ashamed to admit I thought hard about 9/11 having a "Designed by Lefebvre" label. The Soviets fired up the Middle East in 1967, feeding Nasser with confirming intelligence that affected his risk perceptions with fabricated intelligence about an Israeli surprise attack -- b.s. fed through Egyptian, Syrian, Lebanese and Soviet channels. To this day, people wonder just what they were thinking. Some suspect military factional agendas. I'm a little unclear what all went on. However, they certainly used American aggression as a re-alignment and justification tactic, as well as "strawman" image-enhancing games in the Middle East. It would seem that things are not always what they seem in the Middle East. Probably pays to keep your pants zipped. ~ Aimee Iphicrates, an Athenian general, was making the rounds of the sentries. He found one of the guards asleep at his post and stuck him with his spear. His troops were horrified. He answered, "I left him as I found him." 6040 From: James M. Atkinson Date: Sun Aug 18, 2002 9:29am Subject: "E-bomb" may see first combat use in Iraq http://www.newscientist.com/news/news.jsp?id=ns99992654 "E-bomb" may see first combat use in Iraq 17:45 08 August 02 David Windle Weapons designed to attack electronic systems and not people could see their first combat use in any military attack on Iraq. It is widely believed that the US is planning for an attack that could overthrow Iraq's leader, Saddam Hussein, who it believes is developing weapons of mass destruction. The Iraqi president responded publicly for the first time on Thursday, exhorting Iraqis to be prepared "with all the force you can to face your enemies". US intelligence reports indicate that key elements of the Iraqi war machine are located in heavily-fortified underground facilities or beneath civilian buildings such as hospitals. This means the role of non-lethal and precision weapons would be a critical factor in any conflict. High Power Microwave (HPM) devices are designed to destroy electronic equipment in command, control, communications and computer targets and are available to the US military. They produce an electromagnetic field of such intensity that their effect can be far more devastating than a lighting strike. Pumped flux The effect exploited by HPM weapons was accidentally demonstrated in the 1950s when street lights in Hawaii were knocked out by the electromagnetic pulse produced by high altitude nuclear tests. One unclassified approach to producing the required pulse is a device called an Explosive Pumped Flux Generator. In this a charged bank of capacitors energises a coil wrapped around a copper tube, which itself contains high explosives. On detonation, the explosives expand the tube from the back and moves rapidly forward, forcing the tube to make progressive contact with the coil and causing a short circuit. This has the effect of crushing the magnetic field at the same time as reducing the coil's inductance. The resultant spike lasts tens to hundreds of microseconds and can produce peak currents of tens of millions of Amps and peak energies of tens of millions of Joules. By comparison, a typical lighting strike produces around 30,000 Amps. Single use HPM weapons would be single-use and could be delivered on almost any a cruise missile or unmanned aircraft. Future devices are likely to be re-usable. Military planners will be particularly interested in claimed ability of HPM weapon's to penetrate bunkers buried deep underground by using service pipes, cables or ducts to transmit the spike. Insulating equipment from such spikes, for example by using Faraday cages, is believed to be very difficult and expensive. Another weapon that targets electronic equipment has already seen use in the Balkan conflicts of the 1990s. Blackout bombs, such as the formerly classified BLU-114/B, releases a spider's web of fine carbon filaments into the air above electrical distribution infrastructures. This causes short circuits when the filaments touch the ground. Tomahawk cruise missiles fitted with warheads operating on similar lines attacked the Iraqi power grid during the 1990 Gulf war. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6041 From: kondrak Date: Sun Aug 18, 2002 4:25pm Subject: EMP Bomb Heres Popular Mechanics take on it from last year... http://popularmechanics.com/science/military/2001/9/e-bomb/ 6042 From: Gregory Perry Date: Sat Aug 17, 2002 0:31pm Subject: Fwd: Remember, and Never Forget > I will not forget the Clinton administration equipped Islamic > terrorists and their supporters with the world's most sophisticated > telecommunications equipment and encryption technology, thereby > compromising America's ability to trace terrorist radio, cell > phone, land lines, faxes and modem communications. Very interesting. I would love to find out more information on this sophisticated telecommunications equipment and encryption technology that the Clinton administration provided the terrorists (maybe his portable Immarsat terminal? Hardly high tech, and certainly not encrypted). I assume the author is talking in part about relaxed encryption export regulations that the Clinton administration fought for. Maybe Osama picked up those toys back in the day when he was a CIA asset in good standing, and very much on our payroll helping us fight the Evil Empire: http://www.orlingrabbe.com/binladin_timosman.htm8 http://www.lycaeum.org/books/books/last_circle/1.htm Speaking of tracing radios, cell phones, land lines, faxes and modem communications, I wonder if the author is aware of our problems with Israel, the problem where we passed wiretap legislation (called CALEA, essentially a backdoor in every phone switch), then awarded the contracts to several Israeli-based companies who are (allegedly) using these backdoors to eavesdrop on some of our nation's most sensitive secrets, including monitoring STU-III telephony devices used for securing voice comms: http://www.angelfire.com/oh2/elevatorbrewing/houston52.htm http://www.washington-report.org/backissues/072000/0007043.html http://www.whatreallyhappened.com/spyring.html The word "blackmail" comes to mind. >Living without liberty is not living. I couldn't agree more. Our current administration has done more to eradicate our precious civil liberties than all previous administrations combined. Anyone with half a mind can read the US Patriot Act, and see that the US government can now: - detain American citizens indefinitely, without being charged with a crime, and without access to legal counsel - gain entry into your private residence without a warrant, plant listening devices covertly, and leave without a trace (legal or otherwise) - monitor telephone conversations without a court order - search and seize property without a court order or warrant These are, of course, just the highlights. Now there are talks of government sanctioned torture. What separates us from the terrorists now? Orwell would have been proud, GW and his cabal have pulled off a coup that shadows Hitler's burning of the Reichstag (and subsequent suspension of the German Constitution). This planet needs more crypto, not less. --greg 6043 From: Charles P. Date: Mon Aug 19, 2002 0:23am Subject: Re: Another equipment case mfgr in the US SKB music/rack cases are very popular and reasonably priced, but they are NOT very rugged for shipping. I have not seen their "industrial" versions so I would be glad to hear what you find out when you visit them. Charles ----- Original Message ----- From: "Mitch D" To: Sent: Friday, August 16, 2002 7:35 PM Subject: [TSCM-L] Another equipment case mfgr in the US > Heres another case manufacturer that makes a good product for transporting > gear.All ata approved,with options out the wazoo > http://www.skbcases.com/home/index.html. > Ill be visiting this manufacturer as well as Thermodyne next week in LA. > If anyone wants any additional info, e mail me off the list if youd like! > Cheers! > > > __________________________________________________ > Do You Yahoo!? > HotJobs - Search Thousands of New Jobs > http://www.hotjobs.com > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 6044 From: Aimee Farr Date: Mon Aug 19, 2002 6:42am Subject: RE: Remember....The Reichstag Fire Plot (long post warning) > -----Original Message----- > From: Gregory Perry [mailto:gvp@c...] > > I will not forget the Clinton administration equipped Islamic > > terrorists and their supporters with the world's most > sophisticated > > telecommunications equipment and encryption technology, thereby > > compromising America's ability to trace terrorist radio, cell > > phone, land lines, faxes and modem communications. > > Very interesting. I would love to find out more information on > this sophisticated telecommunications equipment and encryption > technology that the Clinton administration provided the > terrorists (maybe his portable Immarsat terminal? ....... Bishop: "How forward thinking of you. Any idea where to find the records we need?" Wolverine: "My heightened senses being what they are, combined with my ability to read, I'd say they're down this way." -- Uncanny X-Men #295 http://www.wolverinex.net/review.php?ID=44 "Fed up getting beaten by Wolverine every time they challenge him [,] some of his arch enemies have banded together to be sneaky and take out his friends. No one is safe. Not X-Men, not Alpha Flight and not trained fighters..... ----- After reflection, I thought about how the original FWD would be perceived by somebody with a slightly different predisposition. To "outsiders," might it reinforce visions of a military "Rogue Elephant" that needs to be brought under control before it starts WW III? Does history suggest it might be harmful to American military, intelligence, and CI interests, as well as our long-term security? We all pass along things based on their intent and emotional lodes, rather than the truth of the propositions contained therein. These days, I suspect some pass-alongs target the sympathies of decision-making elites with associations. (The sugar pill hides the bitter taste.) Here, I note that once you are encouraged to make an association of the actions of past administrations to terrorists, and blame for 9/11, it hardens a category association -- laying the groundwork for you to believe in future associations and the transference of like blame to contemporary leadership. (Likely somebody's honest opinion, I have no idea.) And....predictably, now comes the association....to the CIA, naturally. > Maybe Osama picked up those toys back in the day when he was a > CIA asset in good standing, and very much on our payroll helping > us fight the Evil Empire: > > http://www.orlingrabbe.com/binladin_timosman.htm8 > http://www.lycaeum.org/books/books/last_circle/1.htm ....... "I notice a faint scent on the blade -- familiar, but I can't quite place it. I file it away, for future reference." -- Wolverine, # 2. ....... > Speaking of tracing radios, cell phones, land lines, faxes and > modem communications, I wonder if the author is aware of our > problems with Israel, the problem where we passed wiretap > legislation (called CALEA, essentially a backdoor in every phone > switch), then awarded the contracts to several Israeli-based > companies who are (allegedly) using these backdoors to eavesdrop > on some of our nation's most sensitive secrets, including > monitoring STU-III telephony devices used for securing voice comms: > > http://www.angelfire.com/oh2/elevatorbrewing/houston52.htm > http://www.washington-report.org/backissues/072000/0007043.html > http://www.whatreallyhappened.com/spyring.html > > The word "blackmail" comes to mind. ........ "I'm the best there is at what I do. But what I do isn't very nice." -- Wolverine, #1 ........ > These are, of course, just the highlights. Now there are talks > of government sanctioned torture. What separates us from the > terrorists now? ....... "Ya wanna rumble all up close and personal? I'm just the man to accommodate ya." - Wolverine, Uncanny X Men #340 ....... Mirror-image themes are resurfacing so as to give the patina of legitimacy to the actions of other countries and security services by playing off of the American tendency to mirror-image cultural constructs and categories (i.e., "we're fighting terrorists, too," or "we're just doing what you're doing/did"). War crime themes and imperialism themes are also making a comeback. Propaganda here also plays off of associated truth deception games. Such "torture talk" makes later spurious allegations seem more plausible. I believe some made typical (and predictable) errors in response to 9/11, aided by the Pearl Harbor frame set and emotional trauma. (Perhaps a more appropriate frame is the Tet Offensive.) It is a natural post-surprise response to see the problem as one of "if only we had the signals," or "if only we had more information," and apply that to future solution-frames supporting the (future) imperative goal structures of government organizations. Wohlstetter's Pearl Harbor signal/noise theory does not apply to all situations -- IMO, like September 11. History would suggest that it is not in the interests of counterintelligence to be baited down past paths, and I think history offers a nice blueprint for others to study. > Orwell would have been proud, GW and his cabal have pulled off a > coup that shadows Hitler's burning of the Reichstag (and > subsequent suspension of the German Constitution). ..... "I got no stomach for guttin' animals. People though -- that's another matter." -- Wolverine, #1 ..... The Reichstag Fire Plot" ----- wasn't. Rather than a Nazi plot, it was a communist plot, and one in the true sense of the words. I truly dislike this association, especially if it is being propagated. Rather than any benefit lying with the U.S. government, the STRATEGIC BENEFIT would lie with those interests who seek to defer or shorten U.S. intervention/policy action by dropping red herrings based on the Reichstag model after a terrorist attack -- deflecting us into a conspiracy chase. Such an attempt could be opportunistic playing upon the actions of third parties, or planned. (The anthrax piggyback does raise disturbing questions, certain U.S. capabilities have been noted targets for discreditation initiatives.) Hitler-Goering and the Communists both suggested competing conspiracy theories for the Reichstag Fire, respectively: the "communists did it," and "the Nazi's did it." The plot you reference was scripted by Munzenberg, the master spinmaster of the Comintern under Lenin, who wrote the "Brown Book," (blaming Goering) which floated anonymously around the world, in two editions. To understand the potential impact of such operations, should they be adequately supported, the "Brown Book Plot" (according to some authors) was a political force on the level of Paine's Common Sense. Time-to-Truth on the Reichstag Fire Plot was delayed for decades and MOST have no idea that it is in disrepute. (I didn't, either.) Today, the same tactics are used to delay our foreign policy and internal security goal-formation, by inciting internal controversies. In foreign policy, this leads to a policy of "wait and see" -- especially if pre-sensitized to the fear of "burn." (The Cuban-Nicaraguan Model.) With regard to internal security, introducing or encouraging ambiguity and controversy in the guise of debate also serves to disperse defenses, or result in a mis-concentration of defensive forces. Controversy also offers the opportunity for adversaries to reinforce certain decisions by influence or direct action. (For example, in the past, the co-development of South American fronts to deflect U.S. decisive action and goal-formation in the Middle East.) The effect ---- to present the U.S. with a fait accompli. By enlarging the debate and decision-cycle, the initial situation becomes "dated," which is sometimes a polite word to say that the situation has changed from initial estimates because of covert influx. This effects additional delay via re-planning processes, and can make leaders appear deceptive to the public as they are forced to change their estimates and plans. A "triggering" event like the Reichstag Fire generates a firestorm of facts and rumors, which can then be "turned," so as to offer the appearance of confirmation and credibility. (Most facts are ambiguous.) In light of predispositions and factual friction, certain stories seem plausible. People think the Nazi's are "evil," predisposing them to belief. (Much like your reference to the Evil Empire.) It also underscores that by playing into target goals, you can mask obvious lies, or even covert action: "They believe that I have set light to the building myself. They take me for the devil in person. That's a good thing." -- Hitler. For some Vietnam anti-war deceptions, (and there were notorious ones) the Time-to-Truth was decades for deceptions that played against their own people -- who were complaining of government deception. Perceptually, we never left Vietnam. In this sense, the timely question is not how to sell a war -- but how to (finally) win it. The issue isn't fighting, but credibility. Because of current dynamics, I fear the Reichstag Fire Plot incorporated into operational theories of "perceptual sabotage." Perhaps we all should, given history. ~Aimee 6045 From: Matt Paulsen Date: Mon Aug 19, 2002 4:21pm Subject: RE: DCID 1/21 explained I received a report about problems receiving the files at the listed site: You can download the all files in a single PDF that is zipped at: http://12.224.28.142:28647/dcid/dcidguide.zip 928k (vs the original size of 11-12mb.) --- Matt Paulsen wrote: > I remember someone asking about DCID 1/21 earlier. > Doc format. > http://www.afmc.wpafb.af.mil/HQ-AFMC/IN/ins/dcid-1.htm > > ------------------------ Yahoo! Groups Sponsor > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > __________________________________________________ Do You Yahoo!? HotJobs - Search Thousands of New Jobs http://www.hotjobs.com 6046 From: Date: Mon Aug 19, 2002 6:39pm Subject: File - mission.txt TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6047 From: Date: Mon Aug 19, 2002 6:39pm Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County, San Francisco, Silicon Valley, San Jose, San Diego, and Las Vegas. (Also, anywhere in a thousand mile radius from Los Angeles.) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 6048 From: A.Lizard Date: Mon Aug 19, 2002 7:42pm Subject: PGP is back A new company bought the rights to the PGP software from NAI and hired the development team, Phil Zimmermann and Bruce Schneier are involved. PGP 8 is either available now or will be shortly. Freeware versions will continue to be available. http://www.pgp.com Wait until tomorrow to try the site, it's slashdotted. A.Lizard ************************************************************************ new voicemail number,ask if you need it. Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@C... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 6049 From: kondrak Date: Mon Aug 19, 2002 9:48pm Subject: Re: PGP is back YES!!!! If Phil is involved, there will be NO compromises...thats more than one could be assured of from NAI. I look forward to 8.0... At 17:42 8/19/02 -0700, you wrote: >A new company bought the rights to the PGP software from NAI and hired the >development team, Phil Zimmermann and Bruce Schneier are involved. PGP 8 is >either available now or will be shortly. Freeware versions will continue to >be available. > >http://www.pgp.com > >Wait until tomorrow to try the site, it's slashdotted. > >A.Lizard >************************************************************************ >new voicemail number,ask if you need it. >Personal Web site http://www.ecis.com/~alizard >Disaster prep info: http://www.ecis.com/~alizard/y2k.html >Littleton Killings: http://www.ecis.com/~alizard/littleto.html >backup address (if ALL else fails) alizard@C... >IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the >new version with the bug fixed is available NOW. >PGP 6.5.8 key available by request,keyserver,or on my Web site >For e-mail privacy, download PGP from http://www.pgpi.org >PGPfone v1.02 and v2.1 available for secure voice conferencing, get >your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ >************************************************************************ > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6050 From: Steve Uhrig Date: Mon Aug 19, 2002 10:51pm Subject: Fluke DVM recall Since the Fluke series of DVMs are popular with TSCMers, you may want to check and make sure you do not have one of these: I believe the yellow and black refers to the yellow (removeable) rubber boot/holster, and a black meter. Check the model number. This model was sold for a good while and may still be current. The 100- series is the later/higher end model from the 77, 87 and 89. ======================= Company Recalls Electrical Meters Mon Aug 19, 2:37 PM ET WASHINGTON (AP) - About 40,000 digital multimeters are being recalled because they can put users at risk of shock, thermal burns and even electrocution. The meters, which measure voltage, resistance and current, can take longer than normal, up to 18 seconds, to display readings of voltages over 500 volts. The delay could be misinterpreted to mean there is not a high voltage. Fluke Corp., of Everett, Wash., has received a total of four reports from Canada and Australia in which meters gave a delayed response, although no injuries have been reported, the Consumer Product Safety Commission said Monday. More than 17,000 of the meters were sold in the United States. Those included in the recall are yellow and black, have the numbers 175, 177 or 179 written on the front and have a serial number of 79,000,000 or below. Meters should be returned for a free repair. The company can be reached at 1-800-260-4819 Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6051 From: Charles P. Date: Mon Aug 19, 2002 11:23pm Subject: Handheld TDR on ebay A Biddle handheld TDR that I had on ebay a few weeks ago is back there again. The previous high bidder disappeared without a trace. http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=1760146570 It won't compare with a good Riser Bond, but it is handy to have always available in a tool kit. tnx Charles Charles Patterson Global Communications Tarrytown, NY charles@t... Free shipping to TSCM-List members 6052 From: kondrak Date: Tue Aug 20, 2002 4:45am Subject: FYI: Fluke DVM recall UPDATE: Further info from Fluke: http://www.fluke.com/whatsnew/ProductNotices/notices_02-08-15.asp At 23:51 8/19/02 -0400, you wrote: >Since the Fluke series of DVMs are popular with TSCMers, you may want >to check and make sure you do not have one of these: > >I believe the yellow and black refers to the yellow (removeable) >rubber boot/holster, and a black meter. Check the model number. This >model was sold for a good while and may still be current. The 100- >series is the later/higher end model from the 77, 87 and 89. > >======================= > >Company Recalls Electrical Meters >Mon Aug 19, 2:37 PM ET > >WASHINGTON (AP) - About 40,000 digital multimeters are being recalled >because they can put users at risk of shock, thermal burns and even >electrocution. > >The meters, which measure voltage, resistance and current, can take >longer than normal, up to 18 seconds, to display readings of voltages >over 500 volts. The delay could be misinterpreted to mean there is >not a high voltage. > >Fluke Corp., of Everett, Wash., has received a total of four reports >from Canada and Australia in which meters gave a delayed response, >although no injuries have been reported, the Consumer Product Safety >Commission said Monday. > >More than 17,000 of the meters were sold in the United States. Those >included in the recall are yellow and black, have the numbers 175, >177 or 179 written on the front and have a serial number of >79,000,000 or below. > >Meters should be returned for a free repair. The company can be >reached at 1-800-260-4819 > > > >Steve > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6053 From: Michael Puchol Date: Tue Aug 20, 2002 5:06am Subject: Re: Fluke DVM recall Well that's just my luck !! I happen to have a 177 serial 78.940.183, which means had I bought it after 59.818 other people, I wouldn't have to return it....sigh.... Cheers, Mike ----- Original Message ----- From: "Steve Uhrig" To: Sent: Tuesday, August 20, 2002 5:51 AM Subject: [TSCM-L] Fluke DVM recall > Since the Fluke series of DVMs are popular with TSCMers, you may want > to check and make sure you do not have one of these: > > I believe the yellow and black refers to the yellow (removeable) > rubber boot/holster, and a black meter. Check the model number. This > model was sold for a good while and may still be current. The 100- > series is the later/higher end model from the 77, 87 and 89. > 6054 From: Matt Paulsen Date: Tue Aug 20, 2002 0:16pm Subject: RE: PGP is back Granted, yes, Phil didn't like the direction it was taking, but it's not only a compromise issue. NAI wasn't make enough money off PGP after milking it for 10 years hence slashing the entire division. Their focus is Magic and VS/NS2k and to a much smaller extent Sniffer - like PGP was. I'm surprised their even selling Sniffer still. PGP will be better off in other hands so it can mature and become a more easily used application for the masses which is what non-security applications need with the introduction of wifi networks in large. -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: Monday, August 19, 2002 7:48 PM To: A.Lizard Cc: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] PGP is back YES!!!! If Phil is involved, there will be NO compromises...thats more than one could be assured of from NAI. I look forward to 8.0... At 17:42 8/19/02 -0700, you wrote: >A new company bought the rights to the PGP software from NAI and hired the >development team, Phil Zimmermann and Bruce Schneier are involved. PGP 8 is >either available now or will be shortly. Freeware versions will continue to >be available. > >http://www.pgp.com > >Wait until tomorrow to try the site, it's slashdotted. > >A.Lizard >************************************************************************ >new voicemail number,ask if you need it. >Personal Web site http://www.ecis.com/~alizard >Disaster prep info: http://www.ecis.com/~alizard/y2k.html >Littleton Killings: http://www.ecis.com/~alizard/littleto.html >backup address (if ALL else fails) alizard@C... >IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the >new version with the bug fixed is available NOW. >PGP 6.5.8 key available by request,keyserver,or on my Web site >For e-mail privacy, download PGP from http://www.pgpi.org >PGPfone v1.02 and v2.1 available for secure voice conferencing, get >your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ >************************************************************************ > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6055 From: Michael Puchol Date: Tue Aug 20, 2002 0:52pm Subject: Re: PGP is back Hi Matt, > Granted, yes, Phil didn't like the direction it was taking, but it's not > only a compromise issue. I always wondered why Phil let it turn into what it did when NAI took it over. There wasn't any of the original spirit behind PGP. > NAI wasn't make enough money off PGP after milking > it for 10 years hence slashing the entire division. Well, I guess that having a freeware version developed on the sidetrack had something to do with that :-) >Their focus is Magic > and VS/NS2k and to a much smaller extent Sniffer - like PGP was. I'm > surprised their even selling Sniffer still. PGP will be better off in other > hands so it can mature and become a more easily used application for the > masses which is what non-security applications need with the introduction of > wifi networks in large. Agreed - the reason they still sell the Sniffer range is that (I guess) there are still people buying it, for whatever reason which escapes me - there are cheaper and usually better alternatives to most of their product range. For wireless, you have AiroPeek (a factor of 10 cheaper than NAI's last time I looked), for wired, you have Ethereal - cost: $0, etc. Regarding encryption in wireless networks, the issue is that the protocols are hardwired into every product already shipped - some could be upgradeable to stronger protocols, some cannot - this would create a chaotic situation where nobody would know what works with what (already happens with 128-bit encryption, where there are some interoperability issues). The best way to secure such setups is to use VPN / secure tunnels - you get strong encryption over a weak link, like it's done on internet. All these new standards coming out, like 802.1X, are slightly better than WEP, but attacks have already been formulated against them, and flaws have been found. All the best, Mike 6056 From: Matt Paulsen Date: Tue Aug 20, 2002 1:57pm Subject: RE: PGP is back -----Original Message Start----- > Granted, yes, Phil didn't like the direction it was taking, but it's not > only a compromise issue. I always wondered why Phil let it turn into what it did when NAI took it over. There wasn't any of the original spirit behind PGP. -----Original Message End----- I could give you a few million reasons why Phil decided to, but so could his accountant or lawyer. Or you can call him and ask. :) -----Original Message Start----- > NAI wasn't make enough money off PGP after milking > it for 10 years hence slashing the entire division. Well, I guess that having a freeware version developed on the sidetrack had something to do with that :-) -----Original Message End----- Not really, beta.mcafee.com exists for the same reason and the product still produces about $500,000,000.00 annually in sales and climbing. NAI just glutted the market with poor enterprise management applications on top of end user applications that were difficult to implement within a broad non-educated user base in the PGP market where things don't work seamlessly or easily - PGP Admin and PGP Keyserver were starting to come to grips with this, but it was way off from doing anything to dramatically resolve the problem. We'll see what PGP Corporation does with it. Either way, NAI's implementation created poor sales for larger companies since it was hard to implement and support, which created a downward spiral from management to further produce applications in that arena as sales kept funnelling more resources into support and services. Look what they did with Management Edition and ePolicy Orchestrator for VS/NS2k - both are good applications that do what their supposed to do, decrease costs of operations and decrease support costs for incidents to NAI. Whereas NAI's PGP server suite created obsticles for implementation. Another focus problem with PGP @ NAI was on Lotus and Solaris. Not exactly the Microsoft world where NAI makes its bread & butter. NAI is a self proclaimed Microsoft environment company but you won't see any Exchange Server integration support for Exchange environments using the workflow management functions and DME/DMS extensions for Exchange. A bit mistake. NAI doesn't focus on Novell. They don't focus on IBM and they don't focus on Sun - even though they have a firewalls, AV apps, encryption and more that run on these platforms. If you saw the cost:sales breakdown you'd wonder why they even bother with them at all. I wouldn't have been surprised to see GroupWise Server support for PGP before you saw Exchange Server if things had continued. Another item is LDAP. It's difficult to do and understand for those that don't do enterprise systems. This is why ePolicy Orchestrator no longer uses LDAP - customer feedback, yet... here we are at PGP 7.1 and it's still around. ePO uses MSSQL / MSDE now, works great. LDAP is big, ungainly, slow and not user friendly. Yet, PGP still uses it. Take your average okie dokie network administrator over 300 desktops with all Microsoft and maybe that one Novell box or old Irix box in the back that the accountant won't let go of, and ask him (80-90%) her (10-20%) to import an ldif, or extend a schema, or explain the function of a slapd.conf file or to examine the database (of perhaps, a different manufacturer from the LDAP implementation) for object queuing problems between sync and asynch requests which may require more threads to resolve, or not. Or ask them to setup a proper disk subsystem and allocate processes on processors properly and you'll get the same blank stare. -----Original Message Start----- >Their focus is Magic > and VS/NS2k and to a much smaller extent Sniffer - like PGP was. I'm > surprised their even selling Sniffer still. PGP will be better off in other > hands so it can mature and become a more easily used application for the > masses which is what non-security applications need with the introduction of > wifi networks in large. Agreed - the reason they still sell the Sniffer range is that (I guess) there are still people buying it, for whatever reason which escapes me - there are cheaper and usually better alternatives to most of their product range. For wireless, you have AiroPeek (a factor of 10 cheaper than NAI's last time I looked), for wired, you have Ethereal - cost: $0, etc. Regarding encryption in wireless networks, the issue is that the protocols are hardwired into every product already shipped - some could be upgradeable to stronger protocols, some cannot - this would create a chaotic situation where nobody would know what works with what (already happens with 128-bit encryption, where there are some interoperability issues). The best way to secure such setups is to use VPN / secure tunnels - you get strong encryption over a weak link, like it's done on internet. All these new standards coming out, like 802.1X, are slightly better than WEP, but attacks have already been formulated against them, and flaws have been found. -----Original Message End----- Agree for the most part. Sniffer does have some advantages over competitive products, but not worth the price point if you're not a major corporation. I'll just stick with Sniffer 4.03 on NT thankyouverymuch. Does what I need for wired. I wouldn't use Sniffer on wireless for the main reason you mentioned.. $0. Or I'd just get a licensed version burned out for me as a VAR :) PGP being segmented from the hardware encryption is a start in the right direction for WIFI. It doesn't resolve the mess that WIFI is by any level of competence but at least if you have a secure pipe that is signed and encrypted, you're on the right track. Too bad the 802 group never bothered to understand that and is more interested in politics vs. engineering these days. But that can be linked back to my bestus friends.. the marketers. 6057 From: James M. Atkinson Date: Tue Aug 20, 2002 8:13pm Subject: Red Light Two elderly ladies were out driving in a large car. Both could barely see over the dashboard. As they were cruising along, they came to an intersection. The stoplight was red but they just went on through. The woman in the passenger seat thought to herself, "I must be losing it. I could have sworn we just went through a red light." After a few more minutes they came to another intersection, the light was red, and again they went right through. This time, the passenger was almost sure that the light had been red, but was also concerned that she might be seeing things. She was getting nervous and decided to pay very close attention. At the next intersection, sure enough, the light was definitely red and they blew right through it. She turned to the other woman and said, "Mildred! Did you know that you ran through three red lights in a row? You could have killed us." Mildred turned to her and said, "Oh Shit! Am I driving?" -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6058 From: Matt Paulsen Date: Tue Aug 20, 2002 11:36pm Subject: Hacked - AID - Audio Intelligence Devices, Inc. http://www.msnbc.com/news/796315.asp Stolen data reveal undercover cops Surveillance firmís client list is stolen and posted on Internet; undercover police officers, Secret Service names revealed By Bob Sullivan MSNBC Aug. 20 ≠ Computer intruders have allegedly broken into the online files of a Florida company that provides surveillance technology to the U.S. military, federal agencies and local police forces, and posted confidential information, including the names and email addresses of undercover police officers on a public Web site, MSNBC.com has learned. INFORMATION ABOUT UNDERCOVER narcotics officers, U.S. Secret Service Investigators, Department of Defense special agents and hundreds of other local and federal law enforcement workers was revealed when the data from Audio Intelligence Devices Inc.ís files were posted on the Internet. The Florida-based private company sells highly specialized video surveillance equipment and teaches spy courses to federal agencies and local police forces in the United States, and to some foreign governments. Lon D. Guarino, Vice President, Sales & Marketing for Audio Intelligence Devices did not answer questions about the incident, but in an e-mail to MSNBC.com defended the companyís security practices. ìContrary to any recent reports, Audio Intelligence Devices is confident in its current security practices and treats its customer information with complete confidentiality,î Guarino wrote. ìWe are actively investigating the origin of the information in question at this time.î MSNBC.com contacted each law enforcement official whose e-mail address was taken from the AID files and listed on an Internet page ≠ 349 in all. Of those who replied, none said they knew their information had been made public until they were contacted by MSNBC.com. AID only sells to law enforcement workers, according to the companyís Web site. The list viewed by MSNBC.com was a Whoís Who of domestic and international law enforcement agencies, including the U.S. Army, Navy and Air Force, Sandia National Laboratories, Ministry of Foreign Economic Relations in Uzbekistan, and the Montreal Police Department. Until recently, the site offered a Web form that allowed agents to request equipment catalogs or information on spy classes. It appears that a computer criminal managed to access the data entered on the form by AIDís customers. The form on AIDís site is currently disabled. A message on the site says: ìThe online catalog request is temporarily unavailable.î UNDERCOVER DRUG COPS LISTED The stolen data lists hundreds of names, addresses, job titles, phone numbers and e-mail addresses of investigators, and in some cases, details on the kind of equipment they were seeking to buy. The data appeared on a Web site, Cryptome.org, earlier this month. Site operator John Young says Cryptome.org is devoted to publicizing various government efforts to monitor U.S. citizens. He said an anonymous contributor sent him the data. Young is a well-known First Amendment advocate and a popular critic of government surveillance efforts. Young speculated that the data may have been stolen and leaked by a competitor or former employer, citing the often cutthroat nature of the spying business. But itís not clear how the computer thieves got their hands on AIDís data. Young says that the anonymous contributor who tipped him off about the file told him it was left up for grabs by AID, available for download to anyone using simple File Transfer Protocol software. The file is no longer available at AIDís site, Young said. The data doesnít include financially sensitive information like credit card numbers. But in some cases it includes names of undercover narcotics detectives who rely on their anonymity in their everyday work. ìI wouldnít have wanted anyone to know I was working narcotics,î said one police officer, whose name was on the list. The officer, who said he has since moved out of drug enforcement work, was concerned that criminals might now know what kind of video surveillance technologies law enforcement agents are using, and be able to prepare counter-measures. ìWe certainly donít want the frequencies to be out there. If they know how widespread it is, they will probably start checking the frequencies.î Another narcotics detective, whose name was also on the list, echoed those comments. ìThis is a problem. Most people contacting AID are in narcotics task force groups, or money laundering, where confidentiality and undercover work go hand in hand,î he said. Most of the information in the file is available from public sources such as main police phone numbers or street addresses. But some of the e-mail addresses, agents contacted by MSNBC.com said, were designed for obscurity, and some may double as network login names for government computer systems. Advertisement ìThis is very important as AID is a company that sells intelligence equipment for law enforcement purposes,î said one officer who was named. ìI would of hoped that a company such as AID was working with a secure severer. I guess not.î Interviews with AID customers suggest that the data was stolen within the past month or so ≠ one customer whose information was stolen indicated heíd only used the site a month ago. But other customers who hadnít visited AIDís Web page in nearly a year were also listed in the stolen data, suggesting the text file represents nearly a yearís worth of AID Web site visitors. PEEK AT SURVEILLANCE WORK Young said he published the data in an effort to provide a peek at the kind of surveillance operations U.S. government agencies regularly perform. The data does provide an interesting snapshot. Among the entries: ìInterested in up-dating our system. The Drug Task Force is looking for a long range video surveillance camera. Similar to a spotting scope with a video camera mounted to it, also with the ability to record.î ìI run a majors drug unit and have some money to spend on a variety of equipment. We need a new wire, GPS tracking, Video recorders, and even a new surveillance van. I worked with you guys when I last worked dope. I need catalog etc.î ìI plan on attending your courses relating to lock picking because I use that in my present job on many occasions. I am also interested in the audio courses and would like to get news and updates on those areas as well. I need product support for a body bug manufactured by you, is it possible to get service schematics, parts etc.î ìI am member of 3-town drug task force. Weíre looking to upgrade/purchase new body wire to be used by undercover officers for safety purposes only (canít record in MA without warrant). Looking for compact, wireless system for street level buys. Currently have 10-year old body wire with large suitcase receiver. Looking to reduce size and increase efficiency of receiver and come up with compact (easy conceal) transmitter, preferably wireless one.î ìWe need to install some audio intelligence systems in Saudi Arabia. Please send me the catalog. If SGT {removed} is not available direct calls to SFC {removed}. I am well pleased with the products from your company so far. Keep up the good work.î î ìWe have a persistent theft problem in our mill. We are looking for covert cameras that are either capable of withstanding a severe industrial environment or are cheap enough to be ëdisposable.í We have significant RF to overcome yet hard wiring is difficult or impossible in some situations. If you have any products to recommend we would appreciate your feed back.î Other U.S. agencies requesting information from AID included the U. S. Postal Inspection Service, the Centers for Disease Control and Prevention, the U.S. Border Patrol, the U.S. Customs Service, the Bureau of Land Management, and the Drug Enforcement Administration Internationally, catalog requesters included the Guam Police Department, the British Consulate, the National Bureau of Investigation of the Philippines, and Sao Paulo police department in Brazil. Inclusion in the stolen data means only a government worker from the agency was interested in pricing surveillance equipment; it does not necessarily mean the agency actually uses hidden cameras or other spy-like devices. 6059 From: Matt Paulsen Date: Tue Aug 20, 2002 11:39pm Subject: RE: Hacked - AID - Audio Intelligence Devices, Inc., 2nd & final part Forgot this in the first post. PEEK AT SURVEILLANCE WORK Young said he published the data in an effort to provide a peek at the kind of surveillance operations U.S. government agencies regularly perform. The data does provide an interesting snapshot. Among the entries: ìInterested in up-dating our system. The Drug Task Force is looking for a long range video surveillance camera. Similar to a spotting scope with a video camera mounted to it, also with the ability to record.î ìI run a majors drug unit and have some money to spend on a variety of equipment. We need a new wire, GPS tracking, Video recorders, and even a new surveillance van. I worked with you guys when I last worked dope. I need catalog etc.î ìI plan on attending your courses relating to lock picking because I use that in my present job on many occasions. I am also interested in the audio courses and would like to get news and updates on those areas as well. I need product support for a body bug manufactured by you, is it possible to get service schematics, parts etc.î ìI am member of 3-town drug task force. Weíre looking to upgrade/purchase new body wire to be used by undercover officers for safety purposes only (canít record in MA without warrant). Looking for compact, wireless system for street level buys. Currently have 10-year old body wire with large suitcase receiver. Looking to reduce size and increase efficiency of receiver and come up with compact (easy conceal) transmitter, preferably wireless one.î ìWe need to install some audio intelligence systems in Saudi Arabia. Please send me the catalog. If SGT {removed} is not available direct calls to SFC {removed}. I am well pleased with the products from your company so far. Keep up the good work.î î ìWe have a persistent theft problem in our mill. We are looking for covert cameras that are either capable of withstanding a severe industrial environment or are cheap enough to be ëdisposable.í We have significant RF to overcome yet hard wiring is difficult or impossible in some situations. If you have any products to recommend we would appreciate your feed back.î Other U.S. agencies requesting information from AID included the U. S. Postal Inspection Service, the Centers for Disease Control and Prevention, the U.S. Border Patrol, the U.S. Customs Service, the Bureau of Land Management, and the Drug Enforcement Administration Internationally, catalog requesters included the Guam Police Department, the British Consulate, the National Bureau of Investigation of the Philippines, and Sao Paulo police department in Brazil. Inclusion in the stolen data means only a government worker from the agency was interested in pricing surveillance equipment; it does not necessarily mean the agency actually uses hidden cameras or other spy-like devices. -----Original Message----- From: Matt Paulsen [mailto:mpaulsen6@a...] Sent: Tuesday, August 20, 2002 9:36 PM To: TSCM-L Mailing List Subject: [TSCM-L] Hacked - AID - Audio Intelligence Devices, Inc. http://www.msnbc.com/news/796315.asp Stolen data reveal undercover cops Surveillance firmís client list is stolen and posted on Internet; undercover police officers, Secret Service names revealed By Bob Sullivan MSNBC Aug. 20 ≠ Computer intruders have allegedly broken into the online files of a Florida company that provides surveillance technology to the U.S. military, federal agencies and local police forces, and posted confidential information, including the names and email addresses of undercover police officers on a public Web site, MSNBC.com has learned. INFORMATION ABOUT UNDERCOVER narcotics officers, U.S. Secret Service Investigators, Department of Defense special agents and hundreds of other local and federal law enforcement workers was revealed when the data from Audio Intelligence Devices Inc.ís files were posted on the Internet. The Florida-based private company sells highly specialized video surveillance equipment and teaches spy courses to federal agencies and local police forces in the United States, and to some foreign governments. Lon D. Guarino, Vice President, Sales & Marketing for Audio Intelligence Devices did not answer questions about the incident, but in an e-mail to MSNBC.com defended the companyís security practices. ìContrary to any recent reports, Audio Intelligence Devices is confident in its current security practices and treats its customer information with complete confidentiality,î Guarino wrote. ìWe are actively investigating the origin of the information in question at this time.î MSNBC.com contacted each law enforcement official whose e-mail address was taken from the AID files and listed on an Internet page ≠ 349 in all. Of those who replied, none said they knew their information had been made public until they were contacted by MSNBC.com. AID only sells to law enforcement workers, according to the companyís Web site. The list viewed by MSNBC.com was a Whoís Who of domestic and international law enforcement agencies, including the U.S. Army, Navy and Air Force, Sandia National Laboratories, Ministry of Foreign Economic Relations in Uzbekistan, and the Montreal Police Department. Until recently, the site offered a Web form that allowed agents to request equipment catalogs or information on spy classes. It appears that a computer criminal managed to access the data entered on the form by AIDís customers. The form on AIDís site is currently disabled. A message on the site says: ìThe online catalog request is temporarily unavailable.î UNDERCOVER DRUG COPS LISTED The stolen data lists hundreds of names, addresses, job titles, phone numbers and e-mail addresses of investigators, and in some cases, details on the kind of equipment they were seeking to buy. The data appeared on a Web site, Cryptome.org, earlier this month. Site operator John Young says Cryptome.org is devoted to publicizing various government efforts to monitor U.S. citizens. He said an anonymous contributor sent him the data. Young is a well-known First Amendment advocate and a popular critic of government surveillance efforts. Young speculated that the data may have been stolen and leaked by a competitor or former employer, citing the often cutthroat nature of the spying business. But itís not clear how the computer thieves got their hands on AIDís data. Young says that the anonymous contributor who tipped him off about the file told him it was left up for grabs by AID, available for download to anyone using simple File Transfer Protocol software. The file is no longer available at AIDís site, Young said. The data doesnít include financially sensitive information like credit card numbers. But in some cases it includes names of undercover narcotics detectives who rely on their anonymity in their everyday work. ìI wouldnít have wanted anyone to know I was working narcotics,î said one police officer, whose name was on the list. The officer, who said he has since moved out of drug enforcement work, was concerned that criminals might now know what kind of video surveillance technologies law enforcement agents are using, and be able to prepare counter-measures. ìWe certainly donít want the frequencies to be out there. If they know how widespread it is, they will probably start checking the frequencies.î Another narcotics detective, whose name was also on the list, echoed those comments. ìThis is a problem. Most people contacting AID are in narcotics task force groups, or money laundering, where confidentiality and undercover work go hand in hand,î he said. Most of the information in the file is available from public sources such as main police phone numbers or street addresses. But some of the e-mail addresses, agents contacted by MSNBC.com said, were designed for obscurity, and some may double as network login names for government computer systems. Advertisement ìThis is very important as AID is a company that sells intelligence equipment for law enforcement purposes,î said one officer who was named. ìI would of hoped that a company such as AID was working with a secure severer. I guess not.î Interviews with AID customers suggest that the data was stolen within the past month or so ≠ one customer whose information was stolen indicated heíd only used the site a month ago. But other customers who hadnít visited AIDís Web page in nearly a year were also listed in the stolen data, suggesting the text file represents nearly a yearís worth of AID Web site visitors. PEEK AT SURVEILLANCE WORK Young said he published the data in an effort to provide a peek at the kind of surveillance operations U.S. government agencies regularly perform. The data does provide an interesting snapshot. Among the entries: ìInterested in up-dating our system. The Drug Task Force is looking for a long range video surveillance camera. Similar to a spotting scope with a video camera mounted to it, also with the ability to record.î ìI run a majors drug unit and have some money to spend on a variety of equipment. We need a new wire, GPS tracking, Video recorders, and even a new surveillance van. I worked with you guys when I last worked dope. I need catalog etc.î ìI plan on attending your courses relating to lock picking because I use that in my present job on many occasions. I am also interested in the audio courses and would like to get news and updates on those areas as well. I need product support for a body bug manufactured by you, is it possible to get service schematics, parts etc.î ìI am member of 3-town drug task force. Weíre looking to upgrade/purchase new body wire to be used by undercover officers for safety purposes only (canít record in MA without warrant). Looking for compact, wireless system for street level buys. Currently have 10-year old body wire with large suitcase receiver. Looking to reduce size and increase efficiency of receiver and come up with compact (easy conceal) transmitter, preferably wireless one.î ìWe need to install some audio intelligence systems in Saudi Arabia. Please send me the catalog. If SGT {removed} is not available direct calls to SFC {removed}. I am well pleased with the products from your company so far. Keep up the good work.î î ìWe have a persistent theft problem in our mill. We are looking for covert cameras that are either capable of withstanding a severe industrial environment or are cheap enough to be ëdisposable.í We have significant RF to overcome yet hard wiring is difficult or impossible in some situations. If you have any products to recommend we would appreciate your feed back.î Other U.S. agencies requesting information from AID included the U. S. Postal Inspection Service, the Centers for Disease Control and Prevention, the U.S. Border Patrol, the U.S. Customs Service, the Bureau of Land Management, and the Drug Enforcement Administration Internationally, catalog requesters included the Guam Police Department, the British Consulate, the National Bureau of Investigation of the Philippines, and Sao Paulo police department in Brazil. Inclusion in the stolen data means only a government worker from the agency was interested in pricing surveillance equipment; it does not necessarily mean the agency actually uses hidden cameras or other spy-like devices. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6060 From: Matt Paulsen Date: Tue Aug 20, 2002 11:44pm Subject: RE: Hacked - AID - Audio Intelligence Devices, Inc., 2nd & final part Here's the database on cryptome - http://cryptome.org/aid-nia-db.htm -----Original Message----- From: Matt Paulsen [mailto:mpaulsen6@a...] Sent: Tuesday, August 20, 2002 9:40 PM To: TSCM-L Mailing List Subject: RE: [TSCM-L] Hacked - AID - Audio Intelligence Devices, Inc., 2nd & final part Forgot this in the first post. PEEK AT SURVEILLANCE WORK Young said he published the data in an effort to provide a peek at the kind of surveillance operations U.S. government agencies regularly perform. The data does provide an interesting snapshot. Among the entries: ìInterested in up-dating our system. The Drug Task Force is looking for a long range video surveillance camera. Similar to a spotting scope with a video camera mounted to it, also with the ability to record.î ìI run a majors drug unit and have some money to spend on a variety of equipment. We need a new wire, GPS tracking, Video recorders, and even a new surveillance van. I worked with you guys when I last worked dope. I need catalog etc.î ìI plan on attending your courses relating to lock picking because I use that in my present job on many occasions. I am also interested in the audio courses and would like to get news and updates on those areas as well. I need product support for a body bug manufactured by you, is it possible to get service schematics, parts etc.î ìI am member of 3-town drug task force. Weíre looking to upgrade/purchase new body wire to be used by undercover officers for safety purposes only (canít record in MA without warrant). Looking for compact, wireless system for street level buys. Currently have 10-year old body wire with large suitcase receiver. Looking to reduce size and increase efficiency of receiver and come up with compact (easy conceal) transmitter, preferably wireless one.î ìWe need to install some audio intelligence systems in Saudi Arabia. Please send me the catalog. If SGT {removed} is not available direct calls to SFC {removed}. I am well pleased with the products from your company so far. Keep up the good work.î î ìWe have a persistent theft problem in our mill. We are looking for covert cameras that are either capable of withstanding a severe industrial environment or are cheap enough to be ëdisposable.í We have significant RF to overcome yet hard wiring is difficult or impossible in some situations. If you have any products to recommend we would appreciate your feed back.î Other U.S. agencies requesting information from AID included the U. S. Postal Inspection Service, the Centers for Disease Control and Prevention, the U.S. Border Patrol, the U.S. Customs Service, the Bureau of Land Management, and the Drug Enforcement Administration Internationally, catalog requesters included the Guam Police Department, the British Consulate, the National Bureau of Investigation of the Philippines, and Sao Paulo police department in Brazil. Inclusion in the stolen data means only a government worker from the agency was interested in pricing surveillance equipment; it does not necessarily mean the agency actually uses hidden cameras or other spy-like devices. -----Original Message----- From: Matt Paulsen [mailto:mpaulsen6@a...] Sent: Tuesday, August 20, 2002 9:36 PM To: TSCM-L Mailing List Subject: [TSCM-L] Hacked - AID - Audio Intelligence Devices, Inc. http://www.msnbc.com/news/796315.asp Stolen data reveal undercover cops Surveillance firmís client list is stolen and posted on Internet; undercover police officers, Secret Service names revealed By Bob Sullivan MSNBC Aug. 20 ≠ Computer intruders have allegedly broken into the online files of a Florida company that provides surveillance technology to the U.S. military, federal agencies and local police forces, and posted confidential information, including the names and email addresses of undercover police officers on a public Web site, MSNBC.com has learned. INFORMATION ABOUT UNDERCOVER narcotics officers, U.S. Secret Service Investigators, Department of Defense special agents and hundreds of other local and federal law enforcement workers was revealed when the data from Audio Intelligence Devices Inc.ís files were posted on the Internet. The Florida-based private company sells highly specialized video surveillance equipment and teaches spy courses to federal agencies and local police forces in the United States, and to some foreign governments. Lon D. Guarino, Vice President, Sales & Marketing for Audio Intelligence Devices did not answer questions about the incident, but in an e-mail to MSNBC.com defended the companyís security practices. ìContrary to any recent reports, Audio Intelligence Devices is confident in its current security practices and treats its customer information with complete confidentiality,î Guarino wrote. ìWe are actively investigating the origin of the information in question at this time.î MSNBC.com contacted each law enforcement official whose e-mail address was taken from the AID files and listed on an Internet page ≠ 349 in all. Of those who replied, none said they knew their information had been made public until they were contacted by MSNBC.com. AID only sells to law enforcement workers, according to the companyís Web site. The list viewed by MSNBC.com was a Whoís Who of domestic and international law enforcement agencies, including the U.S. Army, Navy and Air Force, Sandia National Laboratories, Ministry of Foreign Economic Relations in Uzbekistan, and the Montreal Police Department. Until recently, the site offered a Web form that allowed agents to request equipment catalogs or information on spy classes. It appears that a computer criminal managed to access the data entered on the form by AIDís customers. The form on AIDís site is currently disabled. A message on the site says: ìThe online catalog request is temporarily unavailable.î UNDERCOVER DRUG COPS LISTED The stolen data lists hundreds of names, addresses, job titles, phone numbers and e-mail addresses of investigators, and in some cases, details on the kind of equipment they were seeking to buy. The data appeared on a Web site, Cryptome.org, earlier this month. Site operator John Young says Cryptome.org is devoted to publicizing various government efforts to monitor U.S. citizens. He said an anonymous contributor sent him the data. Young is a well-known First Amendment advocate and a popular critic of government surveillance efforts. Young speculated that the data may have been stolen and leaked by a competitor or former employer, citing the often cutthroat nature of the spying business. But itís not clear how the computer thieves got their hands on AIDís data. Young says that the anonymous contributor who tipped him off about the file told him it was left up for grabs by AID, available for download to anyone using simple File Transfer Protocol software. The file is no longer available at AIDís site, Young said. The data doesnít include financially sensitive information like credit card numbers. But in some cases it includes names of undercover narcotics detectives who rely on their anonymity in their everyday work. ìI wouldnít have wanted anyone to know I was working narcotics,î said one police officer, whose name was on the list. The officer, who said he has since moved out of drug enforcement work, was concerned that criminals might now know what kind of video surveillance technologies law enforcement agents are using, and be able to prepare counter-measures. ìWe certainly donít want the frequencies to be out there. If they know how widespread it is, they will probably start checking the frequencies.î Another narcotics detective, whose name was also on the list, echoed those comments. ìThis is a problem. Most people contacting AID are in narcotics task force groups, or money laundering, where confidentiality and undercover work go hand in hand,î he said. Most of the information in the file is available from public sources such as main police phone numbers or street addresses. But some of the e-mail addresses, agents contacted by MSNBC.com said, were designed for obscurity, and some may double as network login names for government computer systems. Advertisement ìThis is very important as AID is a company that sells intelligence equipment for law enforcement purposes,î said one officer who was named. ìI would of hoped that a company such as AID was working with a secure severer. I guess not.î Interviews with AID customers suggest that the data was stolen within the past month or so ≠ one customer whose information was stolen indicated heíd only used the site a month ago. But other customers who hadnít visited AIDís Web page in nearly a year were also listed in the stolen data, suggesting the text file represents nearly a yearís worth of AID Web site visitors. PEEK AT SURVEILLANCE WORK Young said he published the data in an effort to provide a peek at the kind of surveillance operations U.S. government agencies regularly perform. The data does provide an interesting snapshot. Among the entries: ìInterested in up-dating our system. The Drug Task Force is looking for a long range video surveillance camera. Similar to a spotting scope with a video camera mounted to it, also with the ability to record.î ìI run a majors drug unit and have some money to spend on a variety of equipment. We need a new wire, GPS tracking, Video recorders, and even a new surveillance van. I worked with you guys when I last worked dope. I need catalog etc.î ìI plan on attending your courses relating to lock picking because I use that in my present job on many occasions. I am also interested in the audio courses and would like to get news and updates on those areas as well. I need product support for a body bug manufactured by you, is it possible to get service schematics, parts etc.î ìI am member of 3-town drug task force. Weíre looking to upgrade/purchase new body wire to be used by undercover officers for safety purposes only (canít record in MA without warrant). Looking for compact, wireless system for street level buys. Currently have 10-year old body wire with large suitcase receiver. Looking to reduce size and increase efficiency of receiver and come up with compact (easy conceal) transmitter, preferably wireless one.î ìWe need to install some audio intelligence systems in Saudi Arabia. Please send me the catalog. If SGT {removed} is not available direct calls to SFC {removed}. I am well pleased with the products from your company so far. Keep up the good work.î î ìWe have a persistent theft problem in our mill. We are looking for covert cameras that are either capable of withstanding a severe industrial environment or are cheap enough to be ëdisposable.í We have significant RF to overcome yet hard wiring is difficult or impossible in some situations. If you have any products to recommend we would appreciate your feed back.î Other U.S. agencies requesting information from AID included the U. S. Postal Inspection Service, the Centers for Disease Control and Prevention, the U.S. Border Patrol, the U.S. Customs Service, the Bureau of Land Management, and the Drug Enforcement Administration Internationally, catalog requesters included the Guam Police Department, the British Consulate, the National Bureau of Investigation of the Philippines, and Sao Paulo police department in Brazil. Inclusion in the stolen data means only a government worker from the agency was interested in pricing surveillance equipment; it does not necessarily mean the agency actually uses hidden cameras or other spy-like devices. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6061 From: Matt Paulsen Date: Tue Aug 20, 2002 11:58pm Subject: After looking at AID's website I'd bet they forgot to change the password for sa on their db. Their website is cookiecutter Microsoft IIS / Macromedia dreamweaver / fireworks and active server pages. Additionally, their system still isn't secured properly... Basic such as ping work still. 6062 From: Secdep Date: Wed Aug 21, 2002 0:55am Subject: OPTICAL SECURITY I am looking for specifications for a film to be put on some large boardroom windows to help prevent optical surveillance (infra red etc....) Raymond --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za From: James M. Atkinson Date: Wed Aug 18, 2004 4:21pm Subject: New CIA Director Wants Power to Spy On, Arrest, U.S. Citizens http://www.capitolhillblue.com/artman/publish/article_5040.shtml New CIA Director Wants Power to Spy On, Arrest, U.S. Citizens By MICHAEL ISIKOFF & MARK HOSENBALL Newsweek Aug 16, 2004, 07:20 Rep. Porter Goss, President Bushs nominee to head the CIA, recently introduced legislation that would give the president new authority to direct CIA agents to conduct law-enforcement operations inside the United Statesincluding arresting American citizens. The legislation, introduced by Goss on June 16 and touted as an intelligence reform bill, would substantially restructure the U.S. intelligence community by giving the director of Central Intelligence (DCI) broad new powers to oversee its various components scattered throughout the government. But in language that until now has not gotten any public attention, the Goss bill would also redefine the authority of the DCI in such a way as to substantially alterif not overturna 57-year-old ban on the CIA conducting operations inside the United States. The language contained in the Goss bill has alarmed civil-liberties advocates. It also today prompted one former top CIA official to describe it as a potentially dramatic change in the guidelines that have governed U.S. intelligence operations for more than a half century. This language on its face would have allowed President Nixon to authorize the CIA to bug the Democratic National Committee headquarters, Jeffrey H. Smith, who served as general counsel of the CIA between 1995 and 1996, told NEWSWEEK. I cant imagine what Porter had in mind. Goss himself could not be reached for comment today. But a congressional source familiar with the drafting of Gosss bill said the language reflects a concern that he and others in the U.S. intelligence community sharethat the lines between foreign and domestic intelligence have become increasingly blurred by the war on terrorism. At the time he introduced the bill, Goss thought the 9/11 commission might recommend the creation of a new domestic intelligence agency patterned after Britains M.I.5. The commission ended up rejecting such a proposal on civil-liberties grounds. But in his bill Goss wanted to give the DCI and a newly empowered CIA the flexibilityif directed by the presidentto oversee and even conduct whatever domestic intelligence and law-enforcement operations might be needed to combat the terrorism threat, the congressional official said. This is just a proposal, said the congressional official familiar with the drafting of Gosss bill. It was designed as a point of discussion, a point of debate. Its not carved in stone. But other congressional staffers predicted that the Goss bill, even if it has little chance of passage, is likely to get substantial scrutiny at his upcoming confirmation hearingsin part as an opportunity to explore his own attitudes toward civil liberties. Those hearings are already expected to be unusually contentiouspartly because of concerns among Democrats that the Florida Republican, a former CIA officer himself who has chaired the House Intelligence Committee, has been too partisan and too close to the Bush White House. But so far, most staffers expect Goss to be confirmed eventuallyif only because Democrats are loath to appear overly obstructionist on a matter that might be portrayed as central to national security. The Goss bill tracks current law by stating that the DCI shall collect, coordinate and direct the collection of intelligence by the U.S. governmentexcept that the CIA may not exercise police, subpoena, or law enforcement powers within the United States. The bill then adds new language after that clause, however, saying that the ban on domestic law-enforcement operations applies except as otherwise permitted by law or as directed by the president. In effect, one former top U.S. intelligence community official told NEWSWEEK, the language in the Goss bill would enable the president to issue secret findings allowing the CIA to conduct covert operations inside the United Stateswithout even any notification to Congress. The former official said the proposal appeared to have been generated by Gosss staff on the House Intelligence Committee, adding that the language raises the question: If you cant control a staff of dozens, how are you going to control the tens of thousands of people who work for the U.S. intelligence community? A CIA spokeswoman said today that, while familiar with the provision, she was not aware of any agency official seeking such a modification to the longstanding ban on the CIA from conducting domestic law-enforcement operations. (Ever since the creation of the CIA in 1947, the agency has been excluded from federal law-enforcement within the United States. That function was left to the FBIwhich must operate in conformity to domestic laws and, in more recent years, under guidelines promulgated by the attorney general designed to insure protection of the rights of citizens.) Sean McCormack, a White House spokesman, said the presidents own proposal for the creation of a national intelligence directorseparate from the director of the CIAto oversee the entire U.S. intelligence community does not envision any change along the lines called for in the Goss bill. I have not heard any discussion of that, said McCormack about the idea of allowing the CIA to operate domestically. Some congressional staffers speculated today that Goss most likely had reached an understanding with President Bush that, if Congress does create the new position of a national intelligence director, he would move into that position rather than serve in the No. 2 position of CIA director. Asked if such a deal had been reached, McCormack responded: Nothing has been ruled in or out. Goss introduced his legislation, H.R. 4584, on June 16before the September 11 commission issued its own recommendations for the creation of a national intelligence director as well as a new National Counterterrorism Center that would conduct joint operational planning of counterterrorism operations involving both the FBI inside the United States and the CIA abroad. The congressional official familiar with the Goss bill pointed to that proposal as a recognition of the increasingly fuzzy lines between foreign intelligence operations and domestic law enforcement. The proposal comes at a time when the Pentagon is also seeking new powers to conduct intelligence operations inside the United States. A proposal, adopted last spring by the Senate Intelligence Committee at the request of the Pentagon, would eliminate a legal barrier that has sharply restricted the Defense Intelligence Agency and other Pentagon intelligence agencies from recruiting sources inside the United States. That restriction currently requires that Pentagon agencies be covered by the Privacy Act, meaning that they must notify any individual they contact as to who they are talking to and what the agency is talking to them aboutand then keep records of any information they collect about U.S. citizens. These are then subject to disclosure to those citizens. Pentagon officials say this has made it all but impossible for them to recruit intelligence sources and conduct covert operations inside the countryintelligence gathering, they say, that is increasingly needed to protect against any potential terror threats to U.S. military bases and even contractors. But critics have charged the new provision could open the door for the Pentagon to spy on U.S. citizensa concern that some said today is only amplified by the language in the Goss bill. Olympic Threats How serious is the terror threat to the Olympics? Because Greece has a long and intricate coastline with dozens of islands, the country is viewed as relatively vulnerable to infiltration. And while security for Olympic venues is tight, Athens presents a whole range of civilian "soft targets" that are less well protected. Nevertheless, U.S. intelligence officials tell NEWSWEEK, its not Al Qaeda they are most worried about. Instead, officials say the most imminent threat to the peace of the games is anarchist and antiglobalization activists of the type who caused significant violence and property damage at a summit several years ago in Seattle. Officials believe such protestors plan to swarm Athens and conduct a campaign of disruption and vandalism. Its not that officials are complacent. But sources say that the chatter they are picking up on Al Qaeda-linked Web sites is focused more on targeting the United States mainland and American interests abroad than on possible threats against the Olympics. Specific Al Qaeda threats to the U.S., to U.S. interests abroad and to countries working with Washington in Iraq are regarded by American intelligence as more foreboding than possible threats to the Olympics. Several months ago, Osama bin Laden issued a message threatening to attack countries which did not withdraw from Iraq within 90 days, a deadline which expired in July. "I think we will be seeing some serious attempts to make good on that promise," a senior U.S. counterterror official told NEWSWEEK. But the official said he was unaware of any more specific threat that bin Laden made against the Olympics. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9380 From: James M. Atkinson Date: Wed Aug 18, 2004 7:52pm Subject: Government Warning on Pipeline Bugging and Eavesdropping The amusing part about this government warning is that they fail to mention most illicit pipeline monitoring is done with a shovel dug pit (dug manually) and not a backhoe or other heavy equipment (that would alert the pipeline owner). The most common method to find this kind of eavesdropping is through the use of aircraft flying the right of way one or twice a week and taking stereo color infrared and panchromatic 10 inch films at a scale of 1:100 or less; with an inspection team on the ground physically walking the line every 90 days, plus an in-house security team driving the line several times a day. Also, you just haven't lived until you (a TSCM firm) get engaged by a company that owns a pipeline to walk their right of way during wet weather looking for illicit monitoring sites (hint: the wet weather helps you find the buried monitoring locations). More often than not the eavesdropper will use an off the shelf "Little-LEO" packet-switched/VSAT satellite based pipeline monitoring platforms with low data rate systems like 2400 bps ORBCOMM (148-150.5 MHz), CDMA (824-849, 1850-1910), or GSM so it's quite easy to find the relatively high power up-links out in the woods/desert/etc running at several watts as the stand out like sore thumbs on the RF spectrum. Since the most desirable monitoring point are those that are remote, and mechanically quiet the adjacent RF signals tend to be minimal. Statistically, the majority (but not all) of illicit real-time pipeline monitoring equipment operates on the ORBCOMM channels (819 of them, inside a 2.5 MHz bandwidth). On the other hand, equipment to intercept long term trends will use a CDMA/GSM method for access, or the more old fashion method of "hike into the woods and retrieve the Pelican case". Either way a decent pipeline technical/physical security program will catch the eavesdroppers not long after the bug or monitoring device is installed. Here are a few related links on the acoustic monitoring of pipelines: http://www.battelle.org/environment/pipeline-pdfs/acoustic-basedmonitoring.pdf http://www.netl.doe.gov/scng/projects/transmission/ngi/td/pubs/10211TechStatusAssess-Final.pdf http://www.nygas.org/M-2002-011.htm Here is an example of the type of acoustic monitoring device they are referring to in the warning. http://www.pacndt.com/downloads/Sensors/CH30I.pdf http://www.pacndt.com/downloads/Sensors/CH15I.pdf Here is a link to some background on ORBCOMM: http://www.orbcomm.com/wwwroot/public/about/technology/howItWorks.html Here is a link to a document which spells out ownership of ORBCOMM and lists where the U.S. government (and others) have a back door into the ORBCOMM system. It is reasonable to assume that other world governments with control centers in their country have a similar backdoor into the system. Hint: It would be extremely helpful for an oil producing country to have pipeline statistics on a country to whom they ae selling oil (ie: Saudi Arabia keeping an eye on U.S. oil and gas production). http://www.fcc.gov/transaction/orbcomm-orbcomm/orbcomm_suppl022502.pdf http://www.fcc.gov/transaction/orbcomm-orbcomm/orbcomm_resp022802.pdf To date, Granite Island Group is one of the only TSCM or "bug sweep" firm in North America with the equipment, training, and experience required to find illicit monitoring equipment of this nature. -jma ----------------------------------------------------------------------- [Federal Register: August 18, 2004 (Volume 69, Number 159)] [Notices] [Page 51348-51349] From the Federal Register Online via GPO Access [wais.access.gpo.gov] [DOCID:fr18au04-117] ----------------------------------------------------------------------- DEPARTMENT OF TRANSPORTATION Research and Special Programs Administration Pipeline Safety: Unauthorized Excavations and the Installation of Third-Party Data Acquisition Devices on Underground Pipeline Facilities AGENCY: Office of Pipeline Safety (OPS), Research and Special Programs Administration (RSPA), DOT. ACTION: Notice; issuance of advisory bulletin. ----------------------------------------------------------------------- SUMMARY: RSPA/OPS is issuing this advisory bulletin to owners and operators of gas and hazardous liquid pipeline systems on the potential for unauthorized excavations and the unauthorized installation of acoustic monitoring devices or other data acquisition devices on pipeline facilities. These devices are used by entities that hope to obtain market data on hazardous liquid and gas movement within the pipelines. Recent events have disclosed that devices were physically installed on pipelines without the owners permission. Operators must control construction on pipeline right-of-ways and ensure that they are carefully monitored to keep pipelines safe. This is in line with our efforts to prevent third-party damage as reflected by our support of the Common Ground Alliance, which is a nonprofit organization dedicated to shared responsibility in damage prevention and promotion of the damage prevention Best Practices. This advisory bulletin emphasizes the need to ensure that only authorized and supervised excavations are undertaken along the nation's pipeline systems. FOR FURTHER INFORMATION CONTACT: John Pepper by phone at (713) 270- 9376, by fax at (713) 270-9515, or by e-mail at john.pepper@r..., regarding the subject matter of this advisory bulletin. General information about the Research and Special Programs Administration, Office of Pipeline Safety (RSPA/OPS) programs may be obtained by accessing OPS' home page at http://ops.dot.gov. SUPPLEMENTARY INFORMATION: Background RSPA/OPS had been advised of the unauthorized installation of devices on an operator's pipeline for the purpose of obtaining flow data for marketing purposes. The pipeline safety regulations require pipeline operators to carry out a written damage prevention program for buried pipelines. RSPA/OPS is encouraging operators to carefully review their damage prevention programs and to survey their right-of-ways to ensure the discovery of similar inappropriate actions. RSPA/OPS also reminds owners and operators of pipelines and the public of the critical importance of accurately locating underground piping and ensuring the qualifications of personnel performing this work. RSPA/OPS believes that this Advisory Bulletin is necessary to make operators aware of a potential threat to their pipelines and to ensure that they take appropriate action to detect and correct any damage associated with these unauthorized installations. Advisory Bulletin (ADB-04-03) To: Owners and operators of gas transmission and hazardous liquid pipelines. Subject: Potential for unauthorized excavations and the installation of acoustic monitoring devices or other data acquisition devices on pipeline facilities. Purpose: To ensure that pipeline owners and operators are aware of and take actions to prevent or mitigate the dangers associated with unauthorized excavations and the attendant installation of devices by entities seeking to exploit the pipelines for other purposes, and to remind operators and the public of the need to ensure that underground pipeline facilities are adequately located and protected from inadvertent damage prior to excavations. Advisory: RSPA/OPS urges all owners and operators of gas and hazardous liquid pipelines to vigilantly monitor their right-of-ways for unauthorized excavation and the installation of data acquisition devices by third parties seeking to extract product movement information from the pipelines. This activity can impact pipeline integrity either through damage to the pipeline caused by the excavation activities or damage to the pipe coating caused by the attachment of the devices to the pipeline. The installation of pipeline monitoring devices should only be performed with the express knowledge, consent, and support of the pipeline operators. Damage to underground facilities caused by unauthorized excavation can occur without any immediate indication to the operator. Sometimes a damaged underground pipeline facility will not fail for years after the completion of excavation activities. Excavation equipment does not need to fully rupture a pipeline facility to create a hazardous situation. Damage to coatings and other corrosion prevention systems can increase the risk of a delayed [[Page 51349]] corrosion failure. Escaping and migrating gas can create a safety issue for people living and working near these facilities long after the completion of excavation activities. Leakage from a damaged or ruptured hazardous liquid pipeline can create environmental and safety issues. The primary safety concern is to ensure that excavation operations do not accidentally contact existing underground pipeline facilities. This can be averted by knowing the precise locations of all underground pipeline facilities in proximity to excavation operations and closely monitoring excavation activities. Issued in Washington, DC, on August 12, 2004. Stacey L. Gerard, Associate Administrator for Pipeline Safety. [FR Doc. 04-18903 Filed 8-17-04; 8:45 am] BILLING CODE 4910-60-P ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 9381 From: James M. Atkinson Date: Wed Aug 18, 2004 9:12pm Subject: WR-550R SIng-Song Schematic Needed I am looking for someone who may have copies of the four pages of the WR-500R service manual that includes the latest sing-song circuit. I have the rest of the manual, but need those four pages as mine are the first incantation of the sing-song, and not the last. Please email me privately is you get send me a copy. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9382 From: Michael Puchol Date: Thu Aug 19, 2004 3:24am Subject: Re: Government Warning on Pipeline Bugging and Eavesdropping Hi James, Very interesting and informative post. I have developed tracking systems based around Orbcomm (for fishing buoys, don't ask!), and found that their modulation and data transmission system on the uplink and downlink was not encrypted, at least at the time we tested it. This was shortly after Orbcomm was put into service, so I don't know if they have improved security, but basically, anyone near a ground downlink station with the right receiver and demodulator can capture anything coming from the satellites. And since satellite tracking software is good, cheap and available to anyone, one could accurately predict the satellite he's interesting in capturing, based on the ground it covers before reaching the downlink station. Best regards, Mike ----- Original Message ----- From: "James M. Atkinson" To: "TSCM-L" Sent: Thursday, August 19, 2004 2:52 AM Subject: [TSCM-L] Government Warning on Pipeline Bugging and Eavesdropping > > The amusing part about this government warning is that they fail to mention > most illicit pipeline monitoring is done with a shovel dug pit (dug > manually) and not a backhoe or other heavy equipment (that would alert the > pipeline owner). > 9383 From: geist_technologies Date: Thu Aug 19, 2004 2:10am Subject: Howdy from Texas! I just thought I'd take a break from lurking and throw in my 2 cents about this industry / profession / hobby. As this "brave new world" that the monopolists have coined progresses, and the lust for information pertaining to everything from ones cradle to ones grave - by the globalist state increases, this profession will not only be necessary for privacy and peace of mind, but will be a nice little gold mine unto itself. Now, with that said, how far behind cutting technology is the civilian sector TSCM guy? 1 year? 5 years? 10? Just a thought. G.T. P.S. Some one raise a hand if there's any business opportunities or wants to correspond on this subject in the area between Dallas and Houston. Are there any TSCM firms in Texas? Here's a link to an outfit that deals in some nice toys that just so happens to be from Texas. www.bats.org 9384 From: Lawrence Forde Date: Thu Aug 19, 2004 5:06am Subject: A question for the group... Hello All.... I am seriously considering commissioning a TSCM sweep, and my question for the group is: I understand how the use of equipment might be used to terminate and foreclose RF eavesdropping in one's home or business space, but, how would a TSCM professional accomplish the secured enforcement of the client's privacy in the streets?, meaning, what TSCM countermeasures or equipment would be used to accomplish countermeasures against sattelite monitoring (such as the type of monitoring employed by correctional and law enforcement agencies, Pro Tech Monitoring and others come to mind) and radio frequency monitoring outside of one's living space? And, does anyone have any information with regard to accomplishing the cessation of video burglary in a residential living space? If you have any information with regard to any of the points and issues I have outlined above, please contact me immediately at: (718) 276-1605. Thank you. Lawrence Forde 9385 From: savanted1 Date: Thu Aug 19, 2004 8:39am Subject: DoJ Publishes Guidelines for Preserving Electronic Evidence The US Justice Department's National Institute of Justice has published Forensic Examination of Digital Evidence: A Guide for Law Enforcement. The guidelines are intended to help law enforcement agents preserve the integrity of digital evidence so it will be admissible in court. The publication recommends that digital evidence should be examined only by trained professionals and that examinations should be conducted on copies of digital evidence while the original remains intact. This publication is the second in a series; future guidelines will cover using technology in investigations, investigating IT crimes, creating a digital evidence forensic unit and presenting digital evidence in court. http://www.gcn.com/cgi-bin/udt/im.display.printable? client.id=gcndaily2&story.id=26961 9386 From: Andy Cuff Date: Thu Aug 19, 2004 4:27pm Subject: Hiring TSCM Equipment Hi, Is there anyone in the UK hiring out TSCM equipment ? Cheers in advance -andy cuff Talisker's Computer Security Portal Computer Network Defence Ltd http://www.securitywizardry.com 9387 From: Linda Lilienfeld Date: Thu Aug 19, 2004 4:21pm Subject: Spyfinder Personal I have been trying for 2 months to purchase a spyfinder personal. I have tried to call c&c technology and have emailed them. They have not answered my emails and a recorded message comes on when I call that says voice mail has not been set up. Can anyone suggest any other way to get a spyfinder or know about something that is similar. I'm being spied on in my townhouse by a neighbor who is putting pinhole cameras in the fans and vents in my cathedral ceilings and in other inconspicuous places . Thanks for your help. __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - Send 10MB messages! http://promotions.yahoo.com/new_mail 9388 From: Leanardo Date: Thu Aug 19, 2004 7:58pm Subject: Hackers planning electronic "civil disobedience" targeting RNC [OT?] The following is an active communication being distributed requesting participation in electronic "attacks" directed at the republican national convention in New York City. Many will argue that this is a harmless act, but if you will notice toward the end of the document the organizers include targeting fax machines and voice lines. They specifically endorse "Ödisrupting their communication systems by preventing them from making / receiving callsÖ" I am surprised that there is no mention of attacking the conventions handheld and 2-way repeated communications. I monitor all of my companies large scale meetings for attempted jamming of their UHF communications (largely GMRS band) and wireless microphones. I may be wrong, but if organized attacks like the one mentioned below are "successful" and legal prosecution is not swift and painful, I expect it only a matter of time before "terror-vists" start targeting 2-way communications. Bruce --- Begin Communication --- ECD - ALL HACKERS OUT TO DISRUPT THE RNC - BATTLE LOGISTICS ENCLOSED Contact: CrimethInc Black Hat Hacker's Bloc Campaign Website: http://phil.ist-backup.de/rncelectronic/ Email: rainbowskies@g... Hackers are organizing for a massive electronic civil disobedience campaign against the Republican party to coincide with the massive protests in New York City for the Republican National Convention. This document contains logistical information on how people can participate in this campaign. We won't stand idly by while the Republican Party exploits the democratic city of New York to further their agenda of endless war, attacks on our freedoms and and breaks for corporations. We demand an end to the so- called "war on terrorism", which is nothing more than a pretext for empire and the erosion of our civil rights. As long as Amerikkka continues to further their war on the poor for the benefit of the rich, we will use all weapons at our disposal to disrupt the RNC - on the streets, and on the net. All are encouraged to help out this campaign in any way they can. Deface websites, flood email servers, cause financial disruption, change electronic billboards. Turn the system over and put the people on top. Hacktivists of the world, unite! What will be happening? August 22nd - Day of online direct action a week before the convention begins. All are encouraged to attack as many right-wing, corporate, government or military sites as possible. Web defacements, email attacks, financial disruption, anything and everything. These attacks will be used to stir discussion of the RNC, encourage people to participate in the protests in NYC itself, and to build for the mainstream electronic sit-in on the 29th. August 29 - September 2nd - Mainstream electronic sit-in while the RNC is in session. The actions will commence on noon of each day. The protests will utilize a wide diversity of tactics including email, web, fax and phone disruption. The logistical details of this campaign are included in this document below. Who are we flooding? The email addresses, fax numbers, and phone numbers listed below are various contacts of the Republican National Committee and the official George W. Bush re-election staff. Isn't this cyber terrorism? It is important to make a distinction between electronic civil disobedience and terrorism. Civil disobedience is a fundamental part of the democratic process which our country was founded upon. Like Henry David Thoreau and our revolutionary forefathers who shot up the pigs at Lexington and Concord, electronic civil disobedience is the logical continuation of these theories applied towards the internet as a medium for disruption. ECD is a legitimate protest act. Terrorism tries to instill fear into people through violence and destruction. Terrorism is not an act of liberation or unity but of division fear and conquer. A bitter act of desperation that solves no problems, makes no statement, and disempowers many. Electronic civil disobedience causes no harm to people or property. Instead of disempowering, ECD tries to bring people together to realize and exercise their power over oppressive governments and corporations using hacking as a means of fighting for social justice. Who are we? There is no 'us'. This is a decentralized campaign - there are no leaders or orders or hierarchy. Most of us don't know the other people working on this project. None of us know what sorts of attacks are being planned. This is an autonomous call out, anyone who agrees with what we've said and wants to participate in this campaign is welcome to resist the RNC in any way they can. This call out is issued by the CrimethInc Black Hat Hacker's Bloc. We are not participating in any of the actions or any illegal activities ourselves. We recognize the political significance of the RNC and realize that one way or another there is going to be some sort of cyber attack. We are simply serving as a press tool to communicate with the media about different electronic methods people are employing to protest the RNC. Contact Us: CrimethInc Black Hat Hacker's Bloc Campaign Website: http://phil.ist-backup.de/rncelectronic/ Email: rainbowskies@g... DISCLAIMER: This is an autonomous call out for electronic direct action against the RNC. This document contains a number of resources that can help people who choose to participate in such actions. If you decide to help out, you do so on your own terms and accept responsibility for what might happen. However, there is safety in numbers and there are a number of people who plan on a number of actions and there is a very low risk. So hack on! If you participate... Let us know what you're up to! We are communicating with the media on this project and we want to post on our website what sorts of attacks are being made. Feel free to rip bits of text from our website, this document, or any other press release we have made and use it in your messages. Make sure to link to our page! Fellow citizens, PARTICIPATE! ----------------------------- You do not need to be an experienced hacker to help this campaign: we've made it easy for people to help out through a variety of different ways. The mainstream electronic sit-in is composed of several methods of disruption: flooding RNC websites, email addresses, fax and phone numbers. Listed below are the targets and explanations / tools you can use to help this campaign. WEB SITE FLOODING ----------------- We are asking people to use all tools at their disposal to bombard the given servers with so much traffic that it will become unable to serve any more web requests. People can participate in the actions by using the given floodnet scripts on the campaign website or by launching your own distributed denial of service attacks. The Republican National Convention: http://www.2004nycgop.org/ The Republican National Committee: http://www.rnc.org/ George W. Bush official re-election site: http://www.georgewbush.com/ You can help flood these servers by going to our website and running the FloodNet tools on our website. There is a web-based tool and several perl scripts that you can use to flood the targets. You can also download and run several denial of service applications on your home machine and point them to the above servers. A list of good denial of service tools for the Mac is available at http://freaky.staticusers.net/dos.shtml (Freaky's Mac Archive) and http:// undergroundmac.com/hacking.html#dos (Underground Mac) A list of good denial of service tools for Windows is available at http://www.elitehackers.com/f/old.htm#denial (Elitehackers.com) ... but denial of service attacks isn't hacking! DoS attacks are seen as somewhat lame in the hacking community because it does not require any actual skills to perform such attacks - any script kiddie can simply download a few tools and launch attacks against major servers. It can hardly be considered hacking. But it is a method of electronic disruption that can bring the enemy's servers to it's knees. No reason to overlook tools at our disposal. E-MAIL BOMBING -------------- E-mail bomb attacks are done by sending tens of thousands of emails to the enemy's contact addresses. This can make it painful to send and receive emails while simultaneously consuming server resources, possibly slowing or shutting it down. There are numerous tools that one can use to perform such attacks. There are a number of Windows email bombers available for download at http://www.elitehackers.com/f/old.htm#mail (Elitehackers.com) A number of good email bombers for the mac are available at http://undergroundmac.com/hacking.html#e-mail (Underground Mac) Targets: webmaster@g... Info@g... RNCommunications@g... MemberRelations@g... Administration@g... Counsel@g... Chairman@g... Political@g... Finance@g... NOS@g... BushCheney04@G... Blog@G... FAX BOMBING ----------- Fax bombing is a method of electronic disruption that clogs the enemy's fax communications and wastes their paper and toner resources. Tape together a few sheets of black construction paper and start faxing to the following targets. When the first page goes through, roll it back and tape it to the other end of your sheet to form an infinite loop of black construction paper. Then sit back and watch the mayhem begin. Use any and all fax machines at your availability - the more the merrier! Targets: 703.647.2993 202.863.8820 202-863-8774 202-863-8609 202-863-8773 202-863-8654 202-863-8808 202-863-8851 202-863-8851 PHONE BOMBING ------------- Phone bombing is another method of disrupting their communication systems by preventing them from making / receiving calls. You can either call these numbers and tell them what you think about the Bush agenda, or you can beige box into someone else's line and set up auto-dialing scripts to flood their lines. Targets: 703.647.2700 202.863.8500 202-863-8700 202-863-8545 202-863-8560 202-863-8614 202-863-8638 202-863-8743 202-863-8720 202-863-8600 202-863-8670 202-863-8888 That's all for today, kids. Stay out of trouble, and don't get caught! --- End of Communication --- 9389 From: Leanardo Date: Thu Aug 19, 2004 8:09pm Subject: Re: Spyfinder Personal Since you seem to know quite a bit about the surveillance devices being used against you, it seems redundant to buy something to help you locate them. I would suggest you contact your prosecuting attorney and ask them to help you get in touch with the proper persons in law enforcement. If you have your mind set on only locating these devices I would suggest you contact a trustworthy TSCM service. Your money would be better spent than with some spy-shop gadget. Bruce --- In TSCM-L@yahoogroups.com, Linda Lilienfeld wrote: > I have been trying for 2 months to purchase a > spyfinder > personal. I have tried to call c&c technology and > have emailed them. They have not answered my emails > and a recorded message comes on when I call that says > voice mail has not been set up. Can anyone suggest > any other way to get a spyfinder or know about > something > that is similar. I'm being spied on in my townhouse > by a neighbor who is putting pinhole cameras in the > fans and vents in my cathedral ceilings and in other > inconspicuous places . Thanks for your help. > > > > __________________________________ > Do you Yahoo!? > New and Improved Yahoo! Mail - Send 10MB messages! > http://promotions.yahoo.com/new_mail 9390 From: James M. Atkinson Date: Thu Aug 19, 2004 10:33pm Subject: New Coverage Area Due to copious requests, and the fact that at least a dozen people providing sweep services on the East Coast have either died, been disabled, went bankrupt, or got incarcerated; I am considering expanding all of my regular TSCM, bug sweep, and wiretap detection coverage and related services to include all states North of the North Carolina/Virginia state border, and East of the Ohio State Border. Coverage would include not only all of New England (Mass, Rhode Island, Connecticut, Vermont, New Hampshire, and Maine) but also the entire State of Pennsylvania, all of New York State, Manhattan, New Jersey, Delaware, Maryland, Washington DC, Virginia, and West Virginia. I can also cover Albany, Syracuse, and Buffalo New York, and as far south as Norfolk, VA. I am in the unique position of having multiple trucks pre-loaded with racks and cases of TSCM equipment and can be rolling with any of them to a clients site in a matter of minutes, not days. I can be anywhere in the New England area in a matter of hours, and down in DC, Philadelphia, New York the next business day (same day if I get dispatched early enough). I would appreciate hearing feedback from list members before I take this any further. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9391 From: Gerald Date: Thu Aug 19, 2004 10:56pm Subject: The Return of COINTELPRO: Thursday, August 19th, 2004 The Return of COINTELPRO: FBI Launches Nationwide Surveillance Of Activists Ahead of GOP Convention Listen to: Segment || Watch 128k stream Watch 256k stream Read Transcript Help Printer-friendly version Email to a friend Purchase Video/CD ---------------------------------------------------------------------- ---------- The FBI has begun interrogating activists in Colorado, Kansas and other states about their plans to protest at the convention. Meanwhile the NYPD has put 56 activists around the country under 24 hours surveillance. Reports indicate the NYPD has assigned one supervisor and six police officers to track each of the 56 activists. [includes rush transcript] ---------------------------------------------------------------------- ---------- The Federal Bureau of Investigation has visited political activists in at least six states to question them about their involvement in protests at the Democratic and Republican National Conventions. FBI officials describe the questioning as part of a larger effort to track any planned disruptions related to the conventions, the presidential debates or the November election. An FBI spokesman told The New York Times this week that the individuals visited in recent weeks are "people that we identified that could reasonably be expected to have knowledge of such plans and plots if they existed." But civil rights groups say the 40 to 50 documented cases of FBI questioning amount to harassment and result in the chilling of free speech. Now, ABC is reporting that the NYPD has identified 56 so- called "primary anarchists" who will be followed 24 hours a day. One supervisor and six cops will be assigned to each person. Several Democratic legislators this week issued a letter to the Justice Department's Inspector General calling for an investigation into the FBI questioning calling it" "systematic political harassment and intimidation of legitimate antiwar protesters." Today, we hear several stories today from individuals who have faced intimidation and interrogation from the FBI and other law enforcement agencies. Sarah Bardwell, activist and intern with the American Friends Service Committee Denver chapter, questioned by FBI and Denver Police at her home. Mark Silverstein, Legal Director of the ACLU of Colorado. Esther Sassaman, Palestinian Rights Activist in Cleveland who was told she was on a terrorist watch list and intimidated at her job Eric Laursen, a member of the A31 Coalition which has called for direct action protests on Aug. 31 during the Republican National Convention. ---------------------------------------------------------------------- ---------- RUSH TRANSCRIPT JUAN GONZALEZ: We're joined first by Sarah Bardwell, an activist and intern with the American Friends Service Committee, Denver chapter, questioned by the F.B.I. And Denver police at her home. She joins us by phone from Denver. Welcome to Democracy Now! SARAH BARDWELL: Thank you. JUAN GONZALEZ: Well, Sarah, could you tell us a little bit about your experience with the F.B.I.? SARAH BARDWELL: It was Thursday on July 22nd, there were four F.B.I. Agents and two Denver police officers who came to our house in the afternoon, and told us that -- came into our house and we asked them to stay on the front porch, and they told us that they were doing preemptive investigations into suspected terrorists about actions planned at the R.N.C. and the D.N.C. Then they proceeded to ask us if we were planning any criminal activity or if we knew anybody who was planning any criminal activity for the convention. JUAN GONZALEZ: And what did you tell them? SARAH BARDWELL: Myself and several of my roommates told them that they were choosing not to answer those questions. JUAN GONZALEZ: Did they -- did they persist or did they tell you had to answer any questions? SARAH BARDWELL: At the time they didn't persist about the questions. They spent a lot of time sort of looking into our house, taking notes on the things that were on the walls in the living room, asking us about what our house was, and who we all were, and they asked us what our names were, which we also told them that they wouldn't give. Finally, though, they did say that since we weren't giving them the information that they wanted, they were taking that as non- cooperation and they were going to have to therefore take more intrusive effort in the future to find out what they needed to know, but they wouldn't specify what they needed to know specifically or what those more intrusive efforts were. JUAN GONZALEZ: Well, we're joined on the phone also by Mark Silverstein, legal director of the ACLU of Colorado. Your reaction to these visits and any others in the Denver area? MARK SILVERSTEIN: There have been a number of other such visits or similar visits in Colorado that we're aware of, and of course, there's always the possibility that there have been additional ones that we're not aware of. I'm very, very skeptical that these visits are what the F.B.I. Claims them to be. They don't sound like a good faith investigation of reasonably suspected criminal activity. They sound much more like visits designed to intimidate these young people from engaging in protest activity or from associating with people who are engaging in such activities. The questions the F.B.I. asked are not the kind of questions that would be asked if they were really trying to investigate suspected criminal activity. JUAN GONZALEZ: In the reports that you have gotten of other people in the Denver area, what have been the actions or the statements of the F.B.I. agents? MARK SILVERSTEIN: The questions are similar. In several of them the F.B.I. people have clipboards with papers that include pictures, photographs of the young people. And I think one of the things that communicates is we have files on you, and you're in those files. The larger message that it communicates is that if you participate in actions critical of the government or government policies, you might wind up with an F.B.I. file. The danger, of course, is that these kinds of actions on the part of the F.B.I. Could deter people from joining a protest, from signing a petition, from writing a letter to the editor if they feel that that's going to prompt F.B.I. scrutiny and maybe an F.B.I. file. It's unwarranted for peaceful, non-violent activity that's 100% protected by the first amendment. You shouldn't risk having a government police file because you criticized the government. JUAN GONZALEZ: Well, we're also joined on the telephone from Cleveland by Esther Sassaman, a Palestinian rights activist who was told she was on a terrorist watch list and intimidated at her job in that city. Welcome. ESTHER SASSAMAN: Thank you for having me on. JUAN GONZALEZ: Can you tell us about your experience with the F.B.I.? ESTHER SASSAMAN: I actually didn't have an experience with the F.B.I. I had a much more informal experience with the Department of Homeland Security. The first Wednesday in July, I was called on the carpet at work. My supervisor was there, and so was the head of security at my job. He said that he had gotten an informal notification from, quote, a buddy of his, that works at the Department of Homeland Security, and they said that they had been monitoring my internet activity, and that they thought that I was a terrorist. That was the first thing that happened. My boss told me to delete everything that from my computer at work before that to show them -- representative examples of the communications I had made, and they said if they had gotten one more comment like this, then I would be losing my job. Since then, I have not gotten any kind of formal contact from the Department of Homeland Security. This was an entirely informal contact. I believe it was meant to intimidate me, and there has been no written record of it or physical show-up by these agents whatsoever. JUAN GONZALEZ: I'd like to ask Mark Silverstein of the ACLU in Colorado, this, even though it's an informal contact sounds like it's even more, an even bigger problem because it's one thing to visit somebody at home, another to make contact with someone's employer and to put their job in jeopardy. MARK SILVERSTEIN: This is the first that I have heard of this, I don't have the specifics, so I'm not going to be able to answer questions about that, that specific episode. I'm sorry. JUAN GONZALEZ: Just in general of people being contacted, employers being contacted by federal agencies about suspicions or allegations about individual employees. You don't feel that you can comment on that? MARK SILVERSTEIN: Well, I'm sorry. I know about what's going on here in Colorado. JUAN GONZALEZ: Okay. ESTHER SASSAMAN: Maybe I can say something -- after it happened, I did contact the local ACLU office, and the director of that office notified me that this is a common tactic, that they will use Department of Homeland Security or the F.B.I. Or whatever will make a cold call even to the head of security at a workplace where some kind of responsible official is, and just make these statements. I do know that the individual supposedly called the head of security up at my job about a week later to see if I was terminated. I was not. I think that they were just trying to cause a hard time for me. There's just no paper trail of it, so you're right it, is hard to keep track of these. I'm sure there's a lot of people out there who are not even reporting that this is happening to them, and they're just sort of sitting in fear. MARK SILVERSTEIN: I guess one of the missing things, I think -- I think one of the -- I don't know what the content of these internet communications were, but I mean, it sounds like you're saying that these -- I mean, depending on what the content of them were that could inform whether the F.B.I. action is wholly unjustified or whether there's some basis for it. I'm assuming that these were just commentaries that are just criticisms about particular issues. ESTHER SASSAMAN: Yeah. A lot of them weren't even that. What happened was I went to Palestine for two weeks in September of 2003, and I came back, and I had made lots of contacts with people there, especially young people, students. A lot of folks have internet communication there, and you can chat with them in real-time or send emails back and forth. Basically, I was just, you know, sending emails back and forth during my lunch hour. Most of them weren't even political in nature. They were about personal matters like people's studies at school and so on. I think that they just don't like you to reach out and talk to Palestinians. I think that that itself might be part of the problem that they had. MARK SILVERSTEIN: And how did the F.B.I. Find out what -- that you were engaged in these communications? ESTHER SASSAMAN: I have no way of knowing that. I can only conjecture that it was through the internet monitoring systems that we all know and love so well like Echelon and Carnivore. You know. full story: http://www.democracynow.org/article.pl?sid=04/08/19/1354257 Resource: http://cigars.bravepages.com/ciserv.html This site was closed by yahoo and Homeland security once. Gerald 9392 From: satcommunitfive Date: Fri Aug 20, 2004 5:40am Subject: Re: Spyfinder Personal put a video sender on one of the cameras [cheap one on the TV bands] and then get everyone to watch he`ll make new freinds 9393 From: Doc Strait Date: Fri Aug 20, 2004 8:31am Subject: Re: New Coverage Area Hi Jim. Glad to hear that you are expanding your coverage area. If you need help when out my way, drop me a email or phone call. My number is (231)788-1924. I gladly volunteer my time just so I can keep current with the equipment and not forget what I have learned at REI on the equipment. I have set up a savings plan so that I can eventually purchase some dedicated TSCM equipment. If you know of any TSCM places in Michgian, please pass that along to me. As much time on equipment and in sweeps, the more proficient I can become in this area. Thanks Rich aka "Doc" Doc's Electronics & Music "James M. Atkinson" wrote: Due to copious requests, and the fact that at least a dozen people providing sweep services on the East Coast have either died, been disabled, went bankrupt, or got incarcerated; I am considering expanding all of my regular TSCM, bug sweep, and wiretap detection coverage and related services to include all states North of the North Carolina/Virginia state border, and East of the Ohio State Border. Coverage would include not only all of New England (Mass, Rhode Island, Connecticut, Vermont, New Hampshire, and Maine) but also the entire State of Pennsylvania, all of New York State, Manhattan, New Jersey, Delaware, Maryland, Washington DC, Virginia, and West Virginia. I can also cover Albany, Syracuse, and Buffalo New York, and as far south as Norfolk, VA. I am in the unique position of having multiple trucks pre-loaded with racks and cases of TSCM equipment and can be rolling with any of them to a clients site in a matter of minutes, not days. I can be anywhere in the New England area in a matter of hours, and down in DC, Philadelphia, New York the next business day (same day if I get dispatched early enough). I would appreciate hearing feedback from list members before I take this any further. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. I --------------------------------- Do you Yahoo!? Win 1 of 4,000 free domain names from Yahoo! Enter now. [Non-text portions of this message have been removed] 9394 From: walshingham2000 Date: Fri Aug 20, 2004 3:25am Subject: Compromised Cryptographic Hash Functions -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 TSCM-L Moderators Note*** We are new here, and not quite sure if the piece below is too "off topic" for your board. However, the implications of the recent breaks concerning MD5 and SHA-0 are quite important for the crypto community. Hopefully, the issues with SHA-1 will not develop quickly, or else the whole subject of digital signatures and varification will be completely "up in the air". PGPBOARD GROUP MESSAGE ====================== In our last newsletter, we published a piece by Mr. Sam Simpson concerning the vulnerability of the MD5 hash function. Sam concluded his piece with the following statement:- "The uniformed view is that "MD5 is secure until someone demonstrates a break" - this is just not true. For example, we knew that DES was ineffectual against a determined adversary even before the Internet and later the EFF broke the cipher. I think Schneier has the right idea on this subject: "History has taught us: never underestimate the amount of money, time, and effort someone will expend to thwart a security system. It's always better to assume the worst. Assume your adversaries are better than they are. Assume science and technology will soon be able to do things they cannot yet. Give yourself a margin for error. Give yourself more security than you need today. When the unexpected happens, you'll be glad you did."..(Sic..) For quite some time, many cryptographers have been voicing their concerns about the vulnerability of the MD5 hash function, and the majority of the end users of cryptographic products (PGPBOARD INCLUDED)have tended to treat these concerns as a purely academic issue, and have been content to observe the cryptographers verbally jousting with each other, and scratching each others eyes out. Well more the fools us!!!! Within the last couple of weeks, we (the complacent end users of crypto products) have been firmly brought down to earth with a resounding thump!! Antoine Joux, of DCSSI Crypto Lab in France, has broken the hash function of the SHA-0 algorithm. Unconfirmed reports from the Crypto 2004 conference suggest a partial break of the more widely used SHA-1 hash function has also been demonstrated. SHA-1 is embedded in popular email encryption programs such as PGP and is also used in SSL browser security. And Chinese researchers from Shandong University have published a paper (PDF) outlining mathematical attacks on MD5 that have been independently reproduced. The MD5 break effectively ends the effective use of all legacy versions of PGP 2.6.x, or ANY cryptographic functions that employ the MD5 hashing function. The fall out from this MD5 break also affects some of PGPBOARDS members, particularly those who are still using PGP 2.6.2. The main reasons for the reluctance to abandon PGP 2.6.2 has been its portability, being resident on a 1.44 MB diskette, the whole encryption package could easily be used on the fly in Internet cafes etc. In addition there has always been an extremely high level of confidence in the MIT release of PGP 2.6.2. These portability, and confidence issues no longer hold sway, and there is now no alternative but for the concerned PGPBOARD members to decamp from PGP 2.6.x versions that employ the MD5 hashing function. To this end, we have been in contact with Mr. Robert J. Hansen, who has now released an alternative diskette friendly version of Gnupg 1.2.5. Occupying less than 400K of disk space, MinPG offers increased security, and additional features such as the choice of block ciphers (PGP 2.6.2 used exclusively the IDEA 64 bit block cipher). After almost 10 years, PGP version 2.6.2 passes the torch to MinPG. There is now valid argument to prevent PGPBOARD PGP 2.6.2 users from migrating to Robert Hansens MinPG. PGPBOARD will no longer process any PGP 2.6.2 traffic after 31 November 2004. Copies of MinPG can be downloaded from the files area of PGPBOARD, or from the Iowa University site indicated below. We reproduce, with Robert Hansens permission his overview of the current situation, and his tutorial for Gnupg 1.2.5 Best Regards Alan Taylor PGPBOARD Administrator Angeles City, Philippines ************************** This document (PART I and PART II); © 2004, Robert J. Hansen. All rights reserved. Verbatim copies of this document (including copyright notice and redistribution permission) may be redistributed freely. This document may be reformatted for display purposes and/or subjected to any markup which is formally specified in an open standard (e.g., HTML, XML, XHTML,TeX, Texinfo, SGML) as long as none of the informational content is changed. (To contact me directly, check for current email addresses on OpenPGP key 0x5B8709EB.) PART I - - ------ TABLE OF CONTENTS I. Dobbertin's 1996 Attack II. Living on Borrowed Time: 1996-2004 III. So What's It All Mean? IV. Migration to GnuPG I. DOBBERTIN'S 1996 ATTACK ========================== In 1996, a cryptographer named Hans Dobbertin broke MD5. Eight years later, the world has finally taken notice. While it pleases me that people are finally moving away from MD5-based systems, such as PGP 2.6, it's more than a little frustrating that users ignored our warnings for eight years. Still, there's time for I-told-you-sos later: now, the important thing is for anyone who still uses MD5 to migrate to a safer hash algorithm. MD5 belongs to a class of algorithms called "iterated cryptographic hash functions" (or ICHFs). All ICHFs have certain similarities in design. The core of an ICHF is called the "compression function". It's been formally proven that the strength of an ICHF cannot be greater than the strength of its compression function. If the compression function is strong, then the ICHF may--if the rest of it is well-designed--be strong. If the compression function is weak, then the ICHF is weak--it doesn't matter how strong the rest of the ICHF is. In 1996, Hans Dobbertin, a respected cryptographer and one of the designers of the RIPEMD-160 ICHF, proved MD5's compression function was weak. How weak? Under an hour of time on a Pentium-90, that's how weak. So according to what we know of ICHFs, we knew it was possible to break MD5 in under an hour on a Pentium-90, since the strength of MD5 could not be greater than the strength of MD5's compression function. Immediately after the Dobbertin paper was published, every cryptographer with half a brain started advising people to move away from MD5. Generally speaking, we were met with laughter and scorn. The attitude was generally that Dobbertin broke MD5 in only a _theoretical_ sense, and nobody had any clue how to break MD5 in a _practical_ sense. The attitude was that cryptographers were playing Chicken Little, running around screaming that the sky was falling. The attitude was that theory was a long way removed from practice. The problem with that attitude was that, when it comes to breaking an algorithm, there really is no difference between theory and fact. If, according to theory, it's possible to break something in under an hour on a Pentium-90, then it's only a matter of time until someone figures out how to actually do it. II. LIVING ON BORROWED TIME: 1996-2004 ====================================== - - From 1996 until a few days ago, we were living on borrowed time. That time has just run out. Four Chinese researchers (one of them, Xiii La i, was the co-developer of the IDEA encryption algorithm) have completely broken MD5. There was a very slight technical fault in their first draft of their paper, an understandable and trivial error, but within a couple of days this fault had been corrected. MD5 is now quite thoroughly dead. Still, things are not as bad as they appear. These researchers have not been able to construct arbitrary messages which hash out to some arbitrary value. That is to say, they can't write a message of their choosing and make it have whatever hash value they choose. All they can do is work in reverse: given a hash value, they can create messages one after another which all hash out to that value. Most of those messages are gibberish. If they were to take one of your messages, they could create a gibberish message which hashed out the same, lift your signature off your message and put it on theirs; and then the world would think you signed total nonsense. Not very useful, is it? III. SO WHAT'S IT ALL MEAN? =========================== At the same time, though, what they've done is conclusively proven that you can construct two messages which hash out to the same value. That means MD5 has failed in its number one job: creating unique hash values for each message. Attacks only get better over time. They never, ever get worse. In1996, Hans Dobbertin proved this was possible. In 2004, four Chinese researchers showed how to create random gibberish messages that hash out identically. Who knows what someone will do tomorrow? So far, everything I've talked about has been purest fact. Now, I'm going to raise some unanswered questions. I have no answers to these questions; as far as I know, nobody knows. The first question: was Dobbertin the first person to discover the MD5 vulnerability? Or did intelligence agencies discover it before Dobbertin did? The second question: were Wang, Feng, Lai and Yu the first to discover how to create collisions in MD5? Or did intelligence agencies discover it before they did? The third question: how further ahead is the intelligence world of the civilian world when it comes to MD5? Can they create arbitrary messages which hash out to arbitrary values? I have no answer to any of these. My hunch is that Dobbertin was the first person to discover the vulnerability. If that's the case, then GCHQ and the NSA would both have grabbed their best mathematicians, locked them in a room with a whiteboard, a coffeepot and lots of pizza, and told them "don't come out until you've figured out how to break it". If that's the case, then the NSA and GCHQ are probably far ahead of Wang, Feng, Lai and Yu. IV. MIGRATING TO GNUPG ====================== We know MD5 is weak. We've known it for years. Anyone who's been using MD5 since 1996 has been trusting their security to an algorithm that's been known to be weak. Anyone who's advocated MD5 since 1996 has been unconscionably irresponsible. The good news is that better options exist. GnuPG 1.2.5 is an excellent replacement for PGP 2.6; in almost every way it's measurably superior. Some people think it's too large to fit on a single floppy, but this isn't the case. A lot of GnuPG's size is taken up with documentation and translations of GnuPG into different languages. If you get rid of everything that's unnecessary, what you're left is nice and small. The GnuPG installation I'm using right now fits in 268k. I've made it available (under the name "MinPG", for "Minimal GnuPG") at: http://cs.uiowa.edu/~rjhansen/minpg-1.2.5.zip A detached signature of the MinPG files can be found at: http://cs.uiowa.edu/~rjhansen/minpg-1.2.5.zip.asc The copyright license of GnuPG requires that I also make source code available for anyone who's interested. The source code is not necessary to run GnuPG; it's being included here to comply with the license requirements of GnuPG, _not_ because you need it. http://cs.uiowa.edu/~rjhansen/gnupg-1.2.5.tar.bz2 Once you have MinPG downloaded, it'll easily fit onto a floppy. - - From here, I'd suggest you look at one of the excellent online tutorials for GnuPG. My own tutorial is up at: http://cs.uiowa.edu/~rjhansen/gnupg-howto.html A text version of the tutorial is reproduced below: At the least, you'll need to generate a new key and edit the gpg.conf file. Part II (TUTORIAL) ================== HOW TO USE THE GNUPG PRIVACY GUARD by ©Robert J. Hansen ++++++++++++++++++++++++++++++++++++ +Introduction:the Dangers of Email + ++++++++++++++++++++++++++++++++++++ Almost all of us in the online world use email daily. It's quick, convenient, and you can check it anywhere in the world you've got a computer and a Net connection. Unfortunately, it's not a very private medium. It was never intended to be. When you send an email off into the world, it gets handed off to a computer system whose administrators you probably don't know. - - From there it gets handed off to another computer system, and another, and another, until somehow it gets to the intended recipient. At any link in this chain, your email can be read≠perhaps by an unscrupulous sysadmin who satisfies his delusions of grandeur by peeking into people's private lives, or by an FBI investigation that's hoovering up all emails that pass through a site suspected of being used for criminal activity, or Ö the possibilities are limitless. But what it boils down to is when you send an email, you don't know who's going to read it. Your intended recipient, hopefullyÖ but maybe other people, too. ++++++++++++++++++++++++++++++++++++ +WHAT PEOPLE DECIDED TO DO ABOUT IT+ ++++++++++++++++++++++++++++++++++++ In the early 1990s, a few people decided they didn't like this state of affairs. Using cryptography≠the science of codes and ciphers≠they developed software which would transform data into gobbledygook. You'd send this nonsense to your recipient, who would decrypt it and recover the original message. Several people came up with different email encryption standards, from Mark Riordan's PrivacyñEnhanced Mail (PEM) to Phil Zimmermann's Pretty Good Privacy (PGP) to RSA Data Security, Inc.'s corporate offerings to Ö +++++++ +TODAY+ +++++++ Today things have stabilized to the point where there are only two major competing email encryption standards: PGP and S/MIME. Both of these have undergone IETF standardization processes, and as a result anyone can create their own implementation of either. The IETF standard governing PGP is RFC2440, also called "OpenPGP". ++++++++++++++++++++++++ +PURPOSE OF THIS HOWTO:+ ++++++++++++++++++++++++ This HOWTO will teach you how to start working with the GNU Privacy Guard≠a complete implementation of OpenPGP. We'll start from scratch; we'll create a set of cryptographic keys; and then we'll start using our keys with Evolution and KMail. We'll also cover how to share your keys with other people, how to get keys from Internet key databases, and how to use Codebook, a quick and simple app that I wrote to make GnuPG use easier. ++++++++ +WARNING+ ++++++++ It's very hard to speak accurately about cryptography without using sophisticated math. This is because cryptography is a branch of mathematics. Most people aren't very comfortable with mathematics, though, and so I'm going to simplify things so that they can be explained in plain English. While nothing I'm telling you is a lie, there are a lot of places where I'm not going to be telling the whole truth. ++++++++++++++++++++++ +BEGINNING WITH GNUPG+ ++++++++++++++++++++++ Getting GNUPG - - ------------- Your distro probably included GnuPG; as of this writing it's a standard part of Red Hat, Mandrake, Debian, Slackware, SuSE, FreeBSD and more. Even if GnuPG came with your distro, though, please check and see if an update is available. As of this writing, the most recent version of GnuPG is 1.2.5, and that's the version this HOWTO will cover. If your distro doesn't have a GnuPG 1.2.5 package, then try checking out the main GnuPG website at gnupg.org. Source downloads and binary packages for many operating systems are available from there. For those of you who need a diskette friendly version of GNUPG that can be used on the fly in an Internet cafe, then the good news is that better options exist. GnuPG 1.2.5 is an excellent replacement for PGP 2.6; in almost every way it's measurably superior. Some people think it's too large to fit on a single floppy, but this isn't the case. A lot of GnuPG's size is taken up with documentation and translations of GnuPG into different languages. If you get rid of everything that's unnecessary, what you're left is nice and small. The GnuPG installation I'm using right now fits in 268k. I've made it available (under the name "MinPG", for "Minimal GnuPG") at: http://cs.uiowa.edu/~rjhansen/minpg-1.2.5.zip A detached signature of the MinPG files can be found at: http://cs.uiowa.edu/~rjhansen/minpg-1.2.5.zip.asc The copyright license of GnuPG requires that I also make source code available for anyone who's interested. The source code is not necessary to run GnuPG; it's being included here to comply with the license requirements of GnuPG, _not_ because you need it. http://cs.uiowa.edu/~rjhansen/gnupg-1.2.5.tar.bz2 Once you have GnuPG 1.2.5 or MinPG installed, we can get this show on the road. +++++++++++++++++ +HOW GNUPG WORKS+ +++++++++++++++++ Please Read This Section Carefully. - - ----------------------------------- Imagine that you have a box with two separate keyholes and two separate keys. One keyhole is used to lock the box; the other key is used to open it. The locking key you give to the world, and the opening key you keep for yourself. If a friend wants to leave you a message, they put their message in the box and lock it using the key you gave them. Later on, you visit the box and unlock it with your own key. You then reach inside and get the message your friend left. This is a simplification of how encryption works, but all in all it's reasonably accurate. Just like in the metaphor, GnuPG uses two keys. One key you share with the world (a "public key"). One key you keep for yourself (a "private key"). Anything that is encrypted with the public key can only be decrypted with the private key (and viceñversa, as you'll find out in the next paragraph). The system is safe only so long as you're the only one with the private key. As soon as you lose control of the private key, the game is over. The same math that lets encryption work also lets something called "signing" work. Without going into too much detail, the public and private keys are inverses of each other. If you encrypt something with the public key, only the private key can decrypt it. If you encrypt something with the private key, only the public key can decrypt it. So if you encrypt a message with your private key, anyone with your public key can decrypt it and see your message. This doesn't sound very important, except for one thing≠since you're the only person who has your private key, you're the only person who could have encrypted that message. This is what we mean when we talk about "signing" a message; you use the private key to guarantee to the world that a particular message really did come from you, and wasn't forged. ++++++++++++++++++++++++++++++++++ +RUNNING GNUPG FOR THE FIRST TIME+ ++++++++++++++++++++++++++++++++++ Before you can do anything useful with GnuPG, you need to set up GnuPG's needed directories. You can do this just by typing "gpg" at a command line. You'll see a few informational messages and then GnuPG will wait for more input≠just hit CtrlñC to break out. +++++++++++++++++++++++ +GENERATING A KEY PAIR+ +++++++++++++++++++++++ Once you have GnuPG installed, the first thing to do is generate a keypair. Unfortunately, there are no good GUIñbased tools for this (yet≠but I am working on it). You have to use the command line. Fortunately, it's pretty easy: gpg --gen-key Unless you really know what you're doing, choose 1. You'll now be asked to choose a keysize. At this point you may be asking, "well, what's a keysize?" The answer is≠it's a lot of propellerhead nonsense that you don't need to know about, much less understand, in order to use GnuPG. Unless you're doing something really dramatic like plotting the overthrow of a government or securing nuclear weapon launch codes, a 1024ñbit key is wonderful. I personally use a 1024ñbit key with the plainñvanilla GnuPG defaults and I feel perfectly safe with it. (Sidebar: if you talk to many cryptofreaks, you'll discover they fall into two categories. There are rational ones who assess cryptography in terms of mathematics and what can be formally proven, and irrational ones who assess it in terms of paranoia and superstition. Rational ones will give a thoughtful nod to my recommendations here. Paranoids will insist that you need a 16,000ñbit key in order to be safe. Learning how to tell the two types apart is an important skill.) GnuPG will now ask you when these keys should expire≠that is to say, how long these keys will be usable. Some people think it's a good idea to have keys expire after a limited time≠one year, two years, whatever. Others think it best for keys to last indefinitely. Good arguments exist on both sides of this issue. In the interests of keeping things simple, just type 0 here and your key will never expire. Now ask you'll be asked to give your name, email address and a comment. You don't need to give a comment, but it's almost always a good idea to give a name and address. For instance: Real name: Jane Q. Scott Email address: janeq@y... Comment: Chief Sysadmin, Yoyodyne Inc. +++++++++++++++++++++++++++++++ +NOW TO SELECT YOUR PASSPHRASE+ +++++++++++++++++++++++++++++++ What's a Passphrase, and Why Do I Need One? - - ------------------------------------------- Protecting your private key is extremely important. It's so important that GnuPG gives you the option of controlling access to your private key with a passphrase. If someone steals your private key, they can't use it until and unless they also steal your passphrase. Short passphrases can be bruteñforced. As a result, using a single word≠or even a pair of words≠is usually no protection at all. A safe passphrase is one which is too long to be brute forced, too obscure to be guessed, and easy for you to remember. ++++++++++++++++++ +BACK TO THE SHOW+ ++++++++++++++++++ Once you choose your passphrase, type it in. GnuPG will ask you to type it again, just to make sure. If you don't want a passphrase≠which is probably a really bad idea≠just hit Return at the passphrase prompt. GnuPG will throw what appears to be a bunch of line noise on your screen. Relax; everything's going according to plan. The major caveat is if this is your first time running GnuPG, key generation will fail. Just go through this process again if that happens. Soon, you'll have a brand spanking new keypair. Wasn't so difficult, was it? :) GnuPG will display a few last lines of confusing data and then exit. One of the lines will read "Key fingerprint = " followed by forty hexadecimal numbers listed in groups of four. Write down the last eight; you'll need them in the next step. +++++++++++++++++++ +~/.gnupg/gpg.conf+ +++++++++++++++++++ A wellñconfigured gpg.conf file can save you from worlds of trouble. The following isn't exactly the configuration file I use, but it's pretty close: noñgreeting noñsecmemñwarning defaultñkey 5B8709EB encryptñto 5B8709EB keyserver xñhkp://pgp.mit.edu keyserverñoptions autoñkeyñretrieve pgp6 Ö Instead of 5B8709EB you'll want to use the eight hex digit sequence you just wrote down. You want to use your key as the default, not mine. :) This configuration file will give you excellent interoperability with many different kinds of software, from Network Associates PGP 5.0 to PGP Corporation's PGP 8.0.3. Also, please note that it's an eight digit sequence, not two fourñdigit sequences separated by a space. ++++++++++++++++++++++++++++++ +HOW TO SHARE YOUR PUBLIC KEY+ ++++++++++++++++++++++++++++++ Remember the metaphor of the lockbox? You want the world to have your public key; you want to keep your private key secret. So how do you share your public key with the world? There's an easy way and a hard way. The easy way is Ö well, easy. :) The easy way is to use large Internet key databases, called keyservers. Now that you have your gpg.conf file set up properly, using the keyservers is quick, painless and easy. "gpg - - --send-key janeq@y..." and you're done! If you have to do it the hard way≠first, relax: it's not that hard. If you type "gpg --armor --export janeq@y... > my_public_key.asc", GnuPG will create a keyfile that you can email to anyone you like. Just send my_public_key.asc as an attachment to people, and they'll have a copy of your public key. Simple, eh? +++++++++++++++++++++++++++++++++ +HOW TO USERS OTHERS PUBLIC KEYS+ +++++++++++++++++++++++++++++++++ Getting Other Peoples Public Keys - - --------------------------------- So what do you do if you get a keyfile attachment? First, save it to disk (for sake of argument, let's say you save it as "foo_key.asc"). Then type "gpg --import foo_key.asc" and presto≠the key is available to GnuPG. Alternately, if your build of GnuPG has keyserver support, you can ask your recipient for his/her key ID. (Remember how I told you to write down the last eight hex digits of the fingerprint? That's your key ID. If you forget, type "gpg --listñkey janeq@y...". The first row should read "pub 1024D/xxxxxxxx". The letters after the "1024D/" are your key ID.) Once armed with a key ID, you can search the keyservers by typing "gpg --recvñkey ". Try it right now. Type "gpg --recv-key 5B8709EB" and, provided all goes well, you'll import my public key to your keyring. ++++++++++++++++++++++++++++++++ +SO WHO'S ON MY KEYRING ANYWAY?+ ++++++++++++++++++++++++++++++++ Now type "gpg --list-keys". It'll give you a listing of all the keys you have on your keyring, along with all the email addresses associated with each key. For instance, type "gpg - - --listñkeys 5B8709EB" and you'll see my key and all the email addresses I have associated with that key. (Some people have a lot of email addresses associated with a key. Try importing 09AC0A6A and see how many email addresses he has on his key.) ++++++++++++++++++++++++++++++ +VALIDATING OTHER PEOPLE KEYS+ ++++++++++++++++++++++++++++++ There's a big problem with other people's keys. In email, anybody can pretend to be anybody. If you receive an email that claims to be from your friend Joe, how do you really know it's from Joe? How do you know this key which claims to belong to Joe really belongs to Joe? You could call Joe up and ask him if he sent a key. But even if he did≠imagine that you have an enemy named Eve who listens in on your email with Joe. When Joe sent you his key, Eve intercepted it and replaced it with her own key. Now, whenever you're encrypting email to Joe, you're really encrypting it to Eve. Eve gets the email, decrypts it, reads it, then reñencrypts it with Joe's key and sends it on to him. This is called a Man in the Middle attack, and it's a very real concern. So whenever you get a key, you have to validate the key. That means calling Joe up, or sending a letter, or whatnot, and comparing the key you got against Joe's own key. Don't ask Joe in email what his key fingerprint is; if Eve is playing tricks in email, she can screw this one up for you and Joe. Ask in some medium other than email. The telephone is usually a good bet. (If you can't do this, skip ahead two paragraphs to "What If I Can't Verify the Key?".) You compare keys by comparing key fingerprints. Just like real fingerprints, a key fingerprint is a marker unique to the key which cannot be faked or forged. You can get a key's fingerprint by giving the command "gpg --list-keys --with-fingerprint joe@s...". Compare the fingerprint of the key you received with the fingerprint of Joe's key. If the two match, then the next step is to sign Joe's key. Signing Joe's key is a way to announce to the world that you've checked the key and certify it to be valid. If you later send Joe's key to the keyservers, or to another person, they'll be able to look at Joe's key and see that you've signed it. If they trust your judgment, they might be more inclined to trust Joe's key. +++++++++++++++++++++++++++++++++ +WHAT IF I CAN'T VERIFY THE KEY?+ +++++++++++++++++++++++++++++++++ If you can't verify the key with Joe, for whatever reason, you can locally sign the key instead. A local signing says "I haven't checked the key, but I believe it to be valid anyway." If you later send Joe's key to the keyserver, or to another person, they won't see your signature on Joe's key. A local signature is just that≠a signature local to your computer. So now let's cover how to sign and locally sign keys. ++++++++++++++++++++++++++++++ +THE gpg --edit-key INTERFACE+ ++++++++++++++++++++++++++++++ Typing "gpg --edit-key joe@s..." will bring up a short listing of the properties of Joe's key, along with an (unhelpful) command prompt. First off, type "help", just so you can see the staggering options available. The only commands we're interested in are: fpr Ö displays the fingerprint of the key signÖ signs the key with your key lsignÖ locally signs the key with your key trustÖ sets how much you trust the owner of this key Now you need to decide if you want your signature to be local or not. Either "sign" or "lsign" as appropriate. +++++++++++++++++++ +NORMAL SIGNATURES+ +++++++++++++++++++ If you choose a normal signature, you'll be asked to assess how carefully you verified the key, on a 0ñ3 scale. If you've followed all the steps so far, you can answer this one with a 3. GnuPG will ask you for your passphrase; enter it and you're done. Now that you've signed it, you should consider either sending Joe his public key back or sending it to a keyserver. If other people trust you and see your signature on Joe's key, they'll be more inclined to trust Joe's key. ++++++++++++++++++ +lOCAL SIGNATURES+ ++++++++++++++++++ If you choose a local signature, you'll likewise be asked to assess how carefully you verified the key. However, since you haven't been able to verify the key, answer this one with a 1. GnuPG will ask you for your passphrase; enter it and you're done. Don't bother sending Joe his key back, though; since your signature is local, it doesn't show up to anyone except you. +++++++ +TRUST+ +++++++ Remember how I said "if other people trust you and see your signature on Joe's key, they'll be more inclined to trust Joe's key"? The trust interface (which you access by typing "trust") is how you tell GnuPG which users you trust. When you edit someone's trust, GnuPG will ask you to evaluate just how much you trust them on a 1ñ5 scale. A 1 means you don't know how much you trust them; a 2 means you know for a fact they're untrustworthy; a 3 means you have some trust in them; a 4 means you trust them completely. Even though GnuPG offers you another trust value, 5, I'd suggest you not use it for any key except your own. If you get a key that's signed by someone you trust, you won't need to validate the signature in order to use the key. GnuPG will see the signature of your trusted friend and think, "Ah! This person has already validated Joe's key, and I know I can trust them; so I can trust Joe's key, too." +++++++++++++++++ +REMEMBER...!!!!+ +++++++++++++++++ You need to go through this process for each key you wish to validate. +++++++++++++++++++++++++++++ +USING GNUPG WITH EVOLUTION:+ +++++++++++++++++++++++++++++ Now that you've got GnuPG set up, configured, and a couple of keys on the keyring, let's get Evolution set up to use it. I used Evolution 1.4.6 for this. Getting it working is a pretty straightforward process: Click on Tools≠>Settings to access the Evolution Settings menu. Click on "Mail Accounts" in the leftmost pane. Click on one of your mail accounts in the center pane. Click "Edit" in the button panel on the right. This will bring up the Evolution Account Editor. Click the far rightmost tab, "Security", in the Evolution Account Editor window. Under "PGP/GPG Key ID", enter your key ID. Click "Always encrypt to myself when sending encrypted mail" Click on the others as you like. The others are a matter of personal preference. If you want to encrypt a message as well as sign it, click on Securityñ>PGP Encrypt in the Mail Composer window. +++++++++++++++++++++++++ +USING GNUPG WITH KMAIL:+ +++++++++++++++++++++++++ Making KMail 1.6.2 work with GnuPG is just as easy. Open up the Configure window (Settingsñ>Configure KMail). Click on "Security" in the lefthand window. Click on the "OpenPGP" tab in the "Security and Privacy Settings" window. In the "Encryption Tool" frame, select "GNU Privacy Guard". Make sure "Always encrypt to self" and "Automatically encrypt messages whenever possible" are checked. Click on "Apply". Click on "Identity" in the lefthand window. Click on "Advanced" in the "Personal Information" window. To the right of the label reading "OpenPGP Key", you'll see a button labeled "Change". Click on it, and select your key. Click "OK". Ö and you're in business! =========================================================== -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3-nr1 (Windows XP) - GPGshell v3.02 Comment: PGPBOARD Angeles City Philippines Comment: http://groups.yahoo.com/group/pgpboard/ iD8DBQFBJbTI7H26LUxZn78RAgDIAJ0aht7oBMYun9WOE1qgqEj4QcAWTACfQoFG gFMufH1ay08vPf9he491njo= =J16t -----END PGP SIGNATURE----- 9395 From: Lee Bowyer Date: Fri Aug 20, 2004 10:23am Subject: Hello Hello, just joined. Thanks. -- Lee Bowyer Lee@n... www.networkpenetration.com 9396 From: A Grudko Date: Fri Aug 20, 2004 0:07pm Subject: Cellular intercept Two stories from www.702.co.za ----- Vodacom admits that people were able to tap into conversations 8/20/2004 9:07:23 AM Vodacom has admitted that people have been able to tap into cellphone conversations using the network. This follows an investigation by Talk Radio 702 and The Star where it was found by dialling a particular code; a person using Vodacom can eavesdrop on another person's conversation, without their knowledge. It's understood the calls are picked up randomly within a 15 kilometre radius. Last night, Talk Radio 702 and The Star newspaper tapped into several people's calls. Vodacom says they've now made it impossible for anyone to tap into cellphone conversations. Back to headlines Vodacom refuses to comment after cellphone tapping revelation 8/20/2004 8:11:14 AM Vodacom is this morning refusing to comment after Talk Radio 702 revealed that it's relatively easy to tap into another person's cellphone conversation. It's been found by dialling a particular code; a person using Vodacom can eavesdrop on another person's conversation, without their knowledge. It's understood the calls are picked up randomly within a 15 kilometre radius. This has sparked concerns from businessmen, that sensitive information raised during cellphone calls, can be accessed without their knowledge. Last night, Talk Radio 702 and The Star newspaper tapped into several people's calls. Back to headlines [A Grudko] Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.737 / Virus Database: 491 - Release Date: 2004/08/11 [Non-text portions of this message have been removed] 9397 From: James M. Atkinson Date: Fri Aug 20, 2004 0:38pm Subject: Re: Cellular intercept You can do the same type of thing with a Nextel phone. -jma At 01:07 PM 8/20/2004, A Grudko wrote: >Two stories from www.702.co.za > ----- > Vodacom admits that people were able to tap into conversations 8/20/2004 >9:07:23 AM > Vodacom has admitted that people have been able to tap into cellphone >conversations using the network. This follows an investigation by Talk Radio >702 and The Star where it was found by dialling a particular code; a person >using Vodacom can eavesdrop on another person's conversation, without their >knowledge. It's understood the calls are picked up randomly within a 15 >kilometre radius. Last night, Talk Radio 702 and The Star newspaper tapped >into several people's calls. Vodacom says they've now made it impossible for >anyone to tap into cellphone conversations. Back to headlines > > > Vodacom refuses to comment after cellphone tapping revelation 8/20/2004 >8:11:14 AM > Vodacom is this morning refusing to comment after Talk Radio 702 revealed >that it's relatively easy to tap into another person's cellphone >conversation. It's been found by dialling a particular code; a person using >Vodacom can eavesdrop on another person's conversation, without their >knowledge. It's understood the calls are picked up randomly within a 15 >kilometre radius. This has sparked concerns from businessmen, that sensitive >information raised during cellphone calls, can be accessed without their >knowledge. Last night, Talk Radio 702 and The Star newspaper tapped into >several people's calls. Back to headlines > [A Grudko] > > Andy Grudko (British), DPM, Grad IS (South Africa) > MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 > www.grudko.com , agrudko@i... > Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > Mid Rand (+27 11) 318 1451 - 318 6846(Fax) > Cellular (+27) 82 778 6355 - ICQ 146498943 > SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. > "When you need it done right - first time" > > > > >--- >Outgoing mail is certified Virus Free. >Checked by AVG anti-virus system (http://www.grisoft.com). >Version: 6.0.737 / Virus Database: 491 - Release Date: 2004/08/11 > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9398 From: Shawn Hughes (Road) Date: Fri Aug 20, 2004 4:07pm Subject: Re:Hacktivist activities Good warning, but the more I read this section: >This call out is issued by the CrimethInc Black Hat Hacker's Bloc. We >are not participating in any of the actions or any illegal activities >ourselves. We >recognize the political significance of the RNC and realize that one >way or another there is going to be some sort of cyber attack. We are >simply >serving as a press tool to communicate with the media about different >electronic methods people are employing to protest the RNC. Without more intel, it reads like a nobody is trying to position himself / themselves as the progenitor for whatever inevitably will occur, while not being directly (read legally) culpable. In other words, so he / they can say "Yeah, we caused that!" I don''t forsee a lot of hacktivist countermeasures in the GMRS and FRS bands, because in addition to their whistles and drums (you didn't think they were beating those things for solely religious purposes, did you), they widely use those types of comm systems during protest activities here in the US. -Shawn ==================================== Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response, LLC www.warriormindset.com ////////////////////////////////////////////////////////////////////////////// ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. 9399 From: James M. Atkinson Date: Fri Aug 20, 2004 2:14pm Subject: Any Ship Any ship can be a minesweeper . . . . once. -jma 9400 From: gkeenan Date: Fri Aug 20, 2004 3:29pm Subject: Re: Any Ship ooohh! That was cold, James ;-) Jerry K USN, Ret (1 cruiser, 6 carriers, 3 shore stations (3 times at one, twice at another, once at one, not counting schools) Gerard P. Keenan 16 E. Beech St. Central Islip, NY 11722 ph/fax (631) 582-1262 cell (516) 762-9602 secureops@o... gkeenan@s... ----- Original Message ----- From: James M. Atkinson To: TSCM-L Sent: Friday, August 20, 2004 3:14 PM Subject: [TSCM-L] Any Ship Any ship can be a minesweeper . . . . once. -jma [Non-text portions of this message have been removed] 9401 From: contranl Date: Fri Aug 20, 2004 6:53pm Subject: Far East Spystuff . Far East manufacturer of Video tx and rx Gsm jammers Wireless videocam jammers http://www.lawmate.com.tw/PSS/en/ProductsItem.aspx?id=21 Still wondering how such a wireless-video-cam-jammer-works cant be just a transmitter on 2,4 or 1,2 ? (wideband noise) They have a lcd monitor with built-in 2.4 ghz rx...i estimate it will cost max 250 Euro/$$$.(wholesale) there are lots of these available on the net... I am looking for such a lcd with receiver but one that can scan the whole 2.4 ghz band (2300~2500 Mhz) and not just 4 channels and low cost(max 400 Euro/$$$ )...do a search for "baby video monitor" and you will find 50 different models of small video receivers with built-in lcd display ..they start from only 100 $(consumer)... but the same...they only do 4 fixed channels and not able to search the whole band Anyone ? Tetrascanner www.tetrascanner.com 9402 From: Leanardo Date: Fri Aug 20, 2004 2:13pm Subject: Re:Hacktivist activities Shawn I tend to agree with you but I don't want to explain to my people why I was not prepared to identify and locate RF interference intentional or otherwise. I intentionally monitor these bands also as a means of counterintelligence since GMRS and FRS handhelds are frequently used at the more "organized" protests and disturbances. Bruce --- In TSCM-L@yahoogroups.com, "Shawn Hughes (Road)" wrote: > Good warning, but the more I read this section: > I don''t forsee a lot of hacktivist countermeasures in the GMRS and FRS > bands, because in addition to their whistles and drums (you didn't think > they were beating those things for solely religious purposes, did you), > they widely use those types of comm systems during protest activities here > in the US. > > > -Shawn > ==================================== > Shawn Hughes > Special Projects Consultant and Subcontractor > 110 Hughes Hale Lane, Harriman, TN 37748 USA > (865) 335-7992 Voicemail > srh@e... 9403 From: Johnny Crow Date: Fri Aug 20, 2004 2:20pm Subject: Re: Re:Hacktivist activities They will most likely only shutdown or disrupt activities on websites. With the help of all those script-kiddies out there who will do the dirty work, there is no need for them to position themselves in the forefront of the backlash. This method has been used before, though not as mainstream. The Real Hacktivists you have to look out for are the ones, who actually do real computer security, and know what the insecurities of systems are. They will most likely gain access to Computer and Telephone systems through a variety of on-site and off-site measures that they have access to. Including the use of zombie machines to spread virus or disrupt communiquÈs through the DNC. There are methods, such as War-driving and Etc. that will allow anyone with a Wifi Card, Laptop and car. To be able to listen and gain access to WiFi networks, including Bluetooth enabled phones. Which could ultimately be used as bugs, much like a regular house phone. These are only a few areas that need to be looked after, other than normal counter-surveillance. -Johnny Crow --- "Shawn Hughes (Road)" wrote: > Good warning, but the more I read this section: > > >This call out is issued by the CrimethInc Black Hat > Hacker's Bloc. We > >are not participating in any of the actions or any > illegal activities > >ourselves. We > >recognize the political significance of the RNC and > realize that one > >way or another there is going to be some sort of > cyber attack. We are > >simply > >serving as a press tool to communicate with the > media about different > >electronic methods people are employing to protest > the RNC. > > Without more intel, it reads like a nobody is trying > to position himself / > themselves as the progenitor for whatever inevitably > will occur, while not > being directly (read legally) culpable. In other > words, so he / they can > say "Yeah, we caused that!" > > I don''t forsee a lot of hacktivist countermeasures > in the GMRS and FRS > bands, because in addition to their whistles and > drums (you didn't think > they were beating those things for solely religious > purposes, did you), > they widely use those types of comm systems during > protest activities here > in the US. > > > -Shawn > ==================================== > Shawn Hughes > Special Projects Consultant and Subcontractor > 110 Hughes Hale Lane, Harriman, TN 37748 USA > (865) 335-7992 Voicemail > srh@e... > /////////////////////////////////////////////////////////////////////////////// > Lead Instructor > Explosives, WMD, and Technical Operations > Tactical Response, LLC > www.warriormindset.com > ////////////////////////////////////////////////////////////////////////////// > > ******NOTICE: Due to the age of my email account, I > have to set spam > filtering VERY high. If you do not receive a > response in a reasonable > amount of time, please try an alternate > communications method. I apologize > for the inconvienence. > __________________________________ Do you Yahoo!? Take Yahoo! Mail with you! Get it on your mobile phone. http://mobile.yahoo.com/maildemo __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - 100MB free storage! http://promotions.yahoo.com/new_mail 9404 From: Steve Uhrig Date: Fri Aug 20, 2004 7:10pm Subject: Re: Jamming wireless video On 20 Aug 2004 at 23:53, contranl , who eschews obfuscation, wrote: Hi Tetra, > Still wondering how such a wireless-video-cam-jammer-works > cant be just a transmitter on 2,4 or 1,2 ? (wideband noise) Yes. It could be that simple, considering virtually all inexpensive video is FM. You only need a few dB louder signal to overcome another one due to FM capture effect. I don't remember the difference needed, but it's not much. Maybe 6dB. Wireless video at higher frequencies is plagued with multipath dropouts anyway and is intermittent in many situations, especially when not a fixed point to point link with plenty of fade margin. So you wouldn't need to be too much louder with your jammer to capture a receiver. Remember moving a little bit closer equals increasing your power a lot, and a directional/gain antenna if usable makes a lot more difference than more power. > I am looking for such a lcd with receiver but one that can scan the > whole 2.4 ghz band (2300~2500 Mhz) and not just 4 channels and low > cost(max 400 Euro/$$$ )...do a search for "baby video monitor" and you > will find 50 different models of small video receivers with built-in > lcd display ..they start from only 100 $(consumer)... but the > same...they only do 4 fixed channels and not able to search the whole > band > Anyone ? http://www.videoscanner.co.uk Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9405 From: Michael Puchol Date: Sat Aug 21, 2004 2:34am Subject: Re: Far East Spystuff Hi, Check this one out: http://www.g1mfg.com/website/microwave_video_rx.html it can scan 2.2 to 2.7 GHz, has 10 memories, etc. I've see people use this for all kinds of stuff, but they all seemed happy with it's performance. Best regards, Mike ----- Original Message ----- From: "contranl" To: Sent: Saturday, August 21, 2004 1:53 AM Subject: [TSCM-L] Far East Spystuff > . > > Far East manufacturer of > > Video tx and rx > Gsm jammers > Wireless videocam jammers > > http://www.lawmate.com.tw/PSS/en/ProductsItem.aspx?id=21 > > > Still wondering how such a wireless-video-cam-jammer-works > cant be just a transmitter on 2,4 or 1,2 ? (wideband noise) > > They have a lcd monitor with built-in 2.4 ghz rx...i estimate it > will cost max 250 Euro/$$$.(wholesale) there are lots of these > available on the net... > > I am looking for such a lcd with receiver but one that can scan the > whole 2.4 ghz band (2300~2500 Mhz) and not just 4 channels and low > cost(max 400 Euro/$$$ )...do a search for "baby video monitor" > and you will find 50 different models of small video receivers with > built-in lcd display ..they start from only 100 $(consumer)... > but the same...they only do 4 fixed channels and not able to search > the whole band > > Anyone ? > > Tetrascanner > www.tetrascanner.com > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9406 From: contranl Date: Sat Aug 21, 2004 10:25am Subject: Re: Far East Spystuff / Video-scanner . Steve look at the specs: > 1.Jamming Freq: 0.9~2.5GHz > 2.Output Power: 500mW > 3.Range: 5-10 Meters (radius) It does the whole band 0.9 ~ 2,5 ghz ? i have my doubts. Output power 500 mW ?...so it spreads its power over the whole range by either sweeped carrier or wideband noise...so effective power as seen trough one channel would be considerably less since one channel only receives a fractional amount of power (over time) Range 5-10 meters ?...range to what ?..to the receiver ? to the transmitter ?...o... i got it now ...you have to be no more then 10 meters from the (unknown) receiver :) :) my conclusion for now GADGET ! .......................... On the video-scanner: Thanks for the links...but i know these apparatus for 5 years now and as matter of fact i do produce such a receiver myself :) :) It's a lot of work so they are a little expensive: http://www.tetrascanner.com/otherprojects.html What i meant was ...a small(er) handheld device about the size of a pocket radio scanner...something like the Icom R3 (wich doesn't work and does not cover the whole band) with a built-in lcd display... Or something like a so called "baby video monitor" wich is available at very low cost (from 100 $ including a camera)) But instead of only 4 fixed channels wich they all have...i would like it to be able to scan the whole band wich is 2300~2500 mhz...in lets say 1 mhz steps Have a look at some of these lowcost "Baby Video Monitors" : ................................. http://grandtec.com/eyeztogo.htm http://www.araneusa.com/s-awv9600.html http://www.rimax.net/products.asp?id=68 http://www.rfconcepts.co.uk/wireless-baby_monitor.htm http://www.smarthome.com/7855.html http://www.team-electronic.de/englisch/produkte/cameras/monica_e.htm http://www.fontusa.com/index4.html http://www.alibaba.com/trade/search/1i2p0tyfc0h0m0s/baby_monitor.html http://www.mommysthinkin.com/baby_video_monitor.htm .................................................... All you would have to do is change the frequencies it receives Before most wireless 2.4 ghz video receivers where using a module made by Comtech from Taiwan ...such a module's receiving frequency is controlled by a so called I2C bus...wich in turn is controlled by a small PIC (small microprocessor) that sends the right codes If you reprogram this PIC you can make it scan the whole band This is what everybody is doing...the guys in the links you send me and me too... These modules are not usable to make a small handheld 2.4 ghz video receiver...because they are to big and draw to much power...also they need lots of external components (baseband-video demodulator) you would also have to add a small monitor wich alone wants 500 mA Obviously these lowcost "Baby Video Monitors" use a different module that can not be tuned to other then the preprogrammed frequencies... they are fixed inside the receiver..also they use very efficient low power lcd screens and last but not least they already have a nice casing around them. A module that might be used inside such a "baby video monitor" is also made by Comtech Taiwan and includes all parts inside it that where previously on a big external printed circuit board. it can be found here: http://www.lechner-cctv.de/produkt.php?ID=4&Product_ID=224 a technical pdf is here: http://www.lechner-cctv.de/ppvxfile/224/EM2400V8RX.pdf As you can see it does not use a I2C bus anymore so it cannot be programmed from the outside anymore...but there might be a slight chance that you could still reach such a IC2 bus inside the module. If this could be reprogrammed to do the entire band in a scanning/searching mode then you would have a perfect pocket sized video receiver..very lowcost...with lot's of purposes like surveillance and countersurveillance. So this is what i like to know : Does anyone have such a " Baby Video Monitor" ? Does it use above module? or another one...wich ? Could it be reprogrammed (is there a microprocessor inside wich determines the frequency ?) Would'nt you like to have such a low cost video-scanner to check if there are any wireless video devices around ? 99% of the commercial/spyshop wireless video stuff is in the 2,4 ghz band. Tetrascanner www.tetrascanner.com . 9407 From: Michael Puchol Date: Sat Aug 21, 2004 1:43pm Subject: Re: Re: Far East Spystuff / Video-scanner Hi, In short words, > Does anyone have such a " Baby Video Monitor" ? I did have one (briefly) and THEY ARE CRAP. Complete and utterly useless. Your milage may vary. I found that one concrete wall would kill off the signal considerably, and it was hard to get them to receive anything from a distance. Their sensitivity must be sub-zero. So, I guess such a handheld scanner won't be too easy to make - take a long, hard look at the R3 you mentioned. How far could you pick up any usable signal with it, never mind with the stock antenna, but with a 2.4GHz yagi? Not very far. And the batteries died faster than you could go down the shop and buy another set. > Does it use above module? or another one...wich ? Didn't even bother opening it up and promptly returned it, it was SO bad. The electronics inside would have probably peeved me off even more. > Could it be reprogrammed (is there a microprocessor inside wich > determines the frequency ?) I guess they can, as they all tend to work in the same fashion. > Would'nt you like to have such a low cost video-scanner to check > if there are any wireless video devices around ? I'd rather take my SA. I know it's limitations, so I know what to expect. Anything else is just buying more gear for the sake of it. Regards, Mike 9408 From: contranl Date: Sat Aug 21, 2004 2:09pm Subject: Re: Far East Spystuff / Video-scanner Thanks Mike, > I did have one (briefly) and THEY ARE CRAP. Complete and utterly > useless.Your milage may vary. I found that one concrete wall would > kill off the > signal considerably, Wich is normal at 2.4 ghz ...the higher you go the less penetration i agree ofcourse that this effect gets stronger when using "deaf" receivers >and it was hard to get them to receive anything from a >distance. Their sensitivity must be sub-zero. So, I guess such a >handheld I get conflicting reports from others that own both such a baby monitor and comtech modules (from the link you send me before) they say that they are very usable....adding an external antenna may help ! > take a long, hard look at the R3 you > mentioned. How far could you pick up any usable signal with it, > never mind Don't mention the Icom R3 i have tested 3 of them when they just came out...i could not receive anything..and i mean NOTHING while standing 5 meters from a 1o mW transmitter..while my own hobby receiver (with comtech module) did 700 meters...also the dÛn't cover the whole band How come those spyshops still advertise them ? > batteries died faster Agre...useless batteries > Didn't even bother opening it up and promptly returned it, it was > SO bad.The electronics inside would have probably peeved me off > even more. If you used it to look at other cam's : Did you realise that you cant tune to the correct frequency ? Did you realise that you might have been on NTSC while the TX might have been PAL.(or the other way around).. >SA. I know it's limitations, so I know what to expect. Do you have a pocket SA with video display ?...less then 200$ ? :) Tetrascanner From: James M. Atkinson Date: Mon Aug 20, 2001 10:32pm Subject: Satellite car spy set to run down cost of cover Satellite car spy set to run down cost of cover http://www.unison.ie/irish_independent/stories.php3?ca=9&si=498745&issue_id=5125 Treacy Hogan tries out a car equipped with a global tracking device A HITECH satellite tracking device that monitors a car's speed could mean cheaper insurance premiums for up to 50,000 young drivers. The on-board monitor offers a choice for young drivers - if they stay within the speed limit, their insurance premiums will be reduced by close to 50pc. But there is a sting in the tail as the young motorist will have to foot the bill for the expensive on-board Global Positioning Satellite (GPS) kit, although the precise cost is not yet known. However, insurance sources maintained that despite the cost there would still be significant savings over a number of years because of the reduced insurance premium. The system called Traksure has been developed here over the past two years with the backing of AXA, the country's biggest motor insurance company. AXA will launch the scheme on a pilot basis tomorrow and eventually it could benefit up to 50,000 young drivers. The Opel Astra is one of the first cars to be installed with the high-tech device and has been given to the Irish Independent to test the system over the next 24 hours. The on-board satellite monitor will constantly monitor the speed of the young drivers and anyone who breaks the limit will lose out on reduced premiums. The monitor knows the precise location and speed of the car at all times and will relay the information back to AXA's technology partners headquarters where it is displayed on a computer screen. The screen tracks the car on a detailed map showing every street in every city, town and village as well country roads, by-roads and motorways and the speed limits in these areas. The device is linked to the GPS system developed by the US military and it is the first time the GPS has ever been used to monitor speed, one of the biggest killers on roads in this country. It sends a message every ten seconds to headquarters in Dublin showing the exact position of the car, the speed and the speed limit. Drivers who sign up for the voluntary scheme and accept the monitor will be offered substantial reductions in premiums and encouraged to slow down. But if they are detected speeding during constant computer screen monitoring they will be hit with cash penalties. Inexperienced young drivers, especially male, are responsible for most of the escalating spiral of deaths on roads through reckless speeding and dangerous overtaking. Men under 24 now account for more crashes than any other group. A total of 55 young car drivers aged 18-24 died during 2000, 50 of whom were male. The Opel Astra being tested by the Irish Independent will be constantly monitored everywhere it goes and, more importantly, at what speeds it travels. Meanwhile, the National Roads Authority reported that of the people killed in two-vehicle crashes during 2000, 37pc resulted from driving on the wrong side of the road causing head-on collisions, 24pc were caused by speeding, 9pc by improperly overtaking, and 1pc drove through stop or yield signs. Significantly the driver was blamed by gardai as a contributory factor in 82pc of all accidents. Single vehicle accidents associated with speeding and/or alcohol were reported in 33pc of fatalities with young male drivers accounting for many casualties. Treacy Hogan, Environment Correspondent -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3543 From: Andrus Aaslaid Date: Tue Aug 21, 2001 6:15am Subject: CCTV and equipment (was: CCTV questions) Hello all! > Partially correct... you are right about the eye of a director.... > however, you need the > hands of a surgeon, the heart or a nerd, and the balls (not the > heart) of a cat > burglar (sorry for being rude) Related to above topic, I would like to have a list opinion about a hardware device what has been in a concept stage for quite some time now here. The proposed item would be a video recorder module for low-end CCTV surveillance systems. The module itself is a 3.5" HDD size board mounted on top of HDD and entire thing inside a compact housing or 19" rack-mounting depending on an option. Features of such device would be: - analog in (composite and S-VHS) - incorporated digital frame timestamp fingerprint (frame continuity fingerprint) - network interface - simultaneous record/fetch - frames will be fetched only digitally - Activity sensor input The usage scenario is following: The module acts as stand-alone single-channel digital video recorder module. Module is AC-powered. The image compression is based on a hardware encoded MPEG stream. The input for a module is analog composite video or S-VHS, depending on the board population option. For a security reasons, the recorder embedds into each frame the authentication fingerprint. This fingerprinting is performed for MPEG full frames (i-frames) only, consisting of encryption over all pixels in image plus user-defined information plus timestamp. The module has internal real-time clock for timestamping. Recorder interface to outside world is 100Mbit ethernet network. This is providing both, the configuration interface and data collection interface. The frames are possible to fetch in digital form, based on a desired timestamp. As the video is MPEG compressed, it is possible to start fetching only from i-frames. The data playback is occuring simultaneously to recordin on a module. For increased foult tolerance, system can incorporate two hard-disks with mirrored information. For complete system, there is a several recorder modules hooked into network, using ordinary network hub. Depending on a security level, such network can exist separately or be a part of computer network (for home or small corporate users, for example). There is a host software needed for stream playback and if the system exists in isolated network, a dedicated PC to do so. The proposed price range will be in magnitude of $400 per one module, including one 20G hard disk. For reference, such system should be able to hold approximately 8 hours of near-DVD quality motion video, or if configured for surveillance operation in slow frame rate, up to 10 times more (if there are lot of steady frames, this number can be significantly higer). Like I said, this is a conceptual product. As for credentials, the company I am envolved with is Artec Design Group (http://www.artecdesign.com). This is an electronics design firm and if there is a sufficient positive feedback, this may be included in our product line. Please let me know if you feel such product to have any value from integrators perspective, also if there are any features what would make the unit more efficient. And of course the answers like "why bother, you can buy your unit already today from ... for $.." are valuable. Thanx in advance, Andrus. 3544 From: James M. Atkinson Date: Tue Aug 21, 2001 8:03am Subject: Firearms Refresher Course 101 Firearms Refresher Course a. An armed man is a citizen. An unarmed man is a subject. b. A gun in the hand is better than a cop on the phone. c. Glock: The original point and click interface. d. Gun control is not about guns; it's about control. e. If guns are outlawed, can we use swords? f. If guns cause crime, then pencils cause misspelled words. g. Free men do not ask permission to bear arms. h. If you don't know your rights you don't have any. i. Those who trade liberty for security have neither. j. The United States Constitution (c) 1791. All Rights reserved. k. What part of "shall not be infringed" do you not understand? l. The Second Amendment is in place in case they ignore the others. m. 164,999,987 firearms owners killed no one yesterday. n. Guns only have two enemies: rust and liberals. o. Know guns, know peace and safety. No guns, no peace nor safety. p. You don't shoot to kill; you shoot to stay alive. q. 911 - government sponsored Dial-a-Prayer. r. Assault is a behavior, not a device. s. Criminals love gun control - it makes their jobs safer. t. If guns cause crime, then matches cause arson. u. Only a government that is afraid of its citizens tries to control them. v. You only have the rights you are willing to fight for. w. Enforce the "gun control laws" we have, don't make more. x. When you remove the people's right to bear arms, you create slaves. y. The American Revolution would never have happened with gun control. z. "...a government of the people, by the people, for the people..." -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3545 From: Date: Tue Aug 21, 2001 5:04am Subject: Interesting Specs with pictures. Computer Key Stroke Logger or http://www.electronickits.com/spy/finish/computer/key.htm 3546 From: e cummings Date: Tue Aug 21, 2001 9:26am Subject: Re: Interesting Specs with pictures. also worth noting is that this particular keystroke logger will not work with pc's equipped with a USB or IrDA keyboard, or with apple macintosh computers, or with any laptop computer. nor will it record keystrokes when the computer is accessed remotely with a program like pcAnywhere or BackOrifice. At 10:04 AM 8/21/01 -0400, you wrote: > Date: Wed Aug 22, 2001 2:32am Subject: AOR receiver may come true Hi all, It may have been posted before, but apparently they are going to roll out this thing early next year. To save non-interested parties clicking the link, basically it's a high-performance receiver with DSP functions built-in. It's RX frequency range is "a few kHz" (quoted!) to 2.5GHz, and the bandwidth is selectable from "a few Hz" (quoted again!) to 250kHz. Custom algorithms may be implemented, i.e. you get to play with the DSP, so you can check and demodulate all kinds of stuff. http://www.aoruk.com/jt2000.htm Cheers all, Mike (going through the mid-week crisis) 3548 From: James M. Atkinson Date: Wed Aug 22, 2001 8:18am Subject: Quit Bugging Me, Mate Quit Bugging Me, Mate Mail & Guardian (Johannesburg) July 27, 2001 Posted to the web July 26, 2001 http://allafrica.com/stories/200107260273.html Paul Kirk Four high-profile bugging scandals recently made news. Now a professional debugger says telephone monitoring is on the increase. With some relief I recently learned my telephone lines were free of bugs and eavesdroppers. The check did not take long. A private detective offered to demonstrate his equipment and within about 30 minutes established that nobody was listening in to my mostly very boring conversations. These days buggers don't hide microphones inside telephones. They can be hidden almost anywhere along the telephone line. Serious buggers don't need to gain access to your home to tap your telephone. A top Durban private investigator said he would have been amazed if a bug had been found on my line. "People tend to think they are more important than they really are. Never forget that tapping a person's phone properly costs a small fortune. "For a tap to be worth anything it must be monitored 24 hours a day. That usually means three people working eight-hour shifts. If something explosive, something important, is said over the telephone then someone may need to be alerted straight away," he said. Not that cost puts a bugger off. Another private investigator said most buggers simply left tape recorders running on telephone lines. He said modern bugs are voice activated, alerting the bugger as soon as a conversation begins. Four high-profile bugging scandals have recently hit the press: l Umgeni Water boss Cromet Molepo was implicated in illegally tapping the telephones of trade unionists. l Andrew Brophy, the owner of the Spy Shop in Durban, was arrested and charged with allegedly bugging a telephone. Brophy, court records show, has a previous conviction for telephone bugging. l Governor of the South African Reserve Bank Tito Mboweni admitted that the National Intelligence Agency had discovered bugs inside its headquarters. The agency was called in after an important bank directive was leaked to a London financial institution. l Last week the Human Rights Commission summonsed Northern Cape Premier Manne Dipico to answer allegations that he invaded an employee's privacy by monitoring telephone calls. Telephone bugging is increasing, says Raymond van Staden, a trained electro-mechanic with 20 years' experience. Owing to massive retrenchments in the public service many experienced police and intelligence operatives have entered the private sector. Adding to their number are scores of Telkom technicians, now retired, who offer their (often illegal) services on the open market. The once feared telephone-tapping resources of the apartheid security apparatus are also up for sale to the highest bidder. Van Staden said he would not bug a telephone illegally. He makes his bread and butter by debugging offices. "In almost any newspaper you see adverts for telephone bugging services. Bugging is a crime. What view would the state take if a housebreaker were to advertise his services in the press?" he asked. Debugging is capital intensive, the tools cost a lot of money. Van Staden, in contrast to the Durban private investigator, says that bugging, on the other hand, can cost very little. A few thousand rands and a bugger is equipped and ready to go. Competition among buggers is, as a result, cut-throat. The basic tool kit used by a debugger costs about R500 000. Van Staden has two sets of these tools. Van Staden made few friends when he labelled the bugging of the Democratic Alliance's offices in Cape Town a "hoax". He believes the discovery of a "bug" in the party's offices in 1999 was nothing but a publicity stunt for the person the party hired to do the sweep. The DA claimed to have employed a private investigator who discovered a laser beam aimed at a window. This, the DA claimed, was used to monitor conversations in their office. Van Staden pooh-poohs the claim. "Such equipment does exist. But it is only effective in clinical conditions. Birds singing, cars passing by, and background music make this equipment fail." The devices used to bug telephones and boardrooms are almost limitless. Telephones can be modified to act as microphones, allowing a listener to hear conversations 6m or more away. Tiny transmitters can be wired on to telephone lines. Tiny bugs can also be hidden in wall plugs, phones, televisions and a host of other devices. "Probe" microphones can be inserted into holes drilled in walls, while "contact" microphones act like enormously powerful stethoscopes, allowing the bugger to hear conversations through walls and thick doors. Bugs can even be wired into the mains wiring of a room to transmit signals down electricity lines. According to the head of the South African Council of Investigators, Andy Grudko, there are probably only about six qualified, competent and properly equipped operators in the private sector who can provide specialist technical surveillance investigations -- or debugging services. The government only has a right to bug phones, offices or homes of suspected criminals. Most bugs Van Staden finds are put in place for the purposes of industrial espionage. The two main pieces of equipment used by Van Staden -- and most government agencies -- are the Locator Pro and the Scanlock Select Plus, both imported from the United Kingdom. The Locator Pro picks up the presence of electronic items with diodes in them -- whether they are switched on or not. Tape recorders, microphones and almost anything electronic will be picked up by this device. The Scanlock Select Plus is used to pick up radio transmissions in a room. Because radio transmitters can be small, debuggers have to have a large array of tools to look into the tiniest nooks and crannies. Some transmitters are so small they can be hidden in keyholes. Copyright © 2001 Mail & Guardian. Distributed by AllAfrica Global Media (allAfrica.com). -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3549 From: James M. Atkinson Date: Wed Aug 22, 2001 8:53am Subject: Flaw in Windows 2000 Software Bugs PCs by Light Buggy Beaming Flaw in Windows 2000 Software Bugs PCs by Light Aug. 21 - A recently discovered flaw in Microsoft's Windows 2000 software could allow pranksters to shut down computers by remote control. According to a warning bulletin issued by Microsoft today, the fault in its Windows 2000 program, a basic piece of software that manages all the other software programs on a computer, lies with so-called infrared support. Using standards developed by the Infra Red Data Association (IRDA), computers can use invisible infrared beams - the same type used in TV remote controls - to share information with each other. Owners of handheld computers such as Palm Pilots, for example, typically use this feature to "beam" short notes and phone numbers to each other in small chunks or data "packets." In laptop computers, IRDA transmissions can send data to a printer without cables. But according to Microsoft's warning, a clever hacker could create a special packet that exploits Windows 2000's built-in support for IRDA. The packet, sent via the invisible light waves, would flood the computer with data to create a so-called buffer overflow and cause the computer to restart. However, most users shouldn't be concerned since the bulletin states the hole can't be exploited to send malicious programs or otherwise permanently damage a vulnerable computer. And since the fault affects only infrared connections, Microsoft doubts it is a major risk. To exploit this vulnerability, "an attack would have to be mounted from a machine that could transmit infrared packets to the potential victim's machine," says the bulletin. "In practical terms, this means that an attacker would most likely be in line-of-sight with a machine, making it very difficult to mount an attack without being noticed." Microsoft has released a patch on the Web for Windows 2000 users that may be vulnerable to a prankster in their computer room. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3550 From: James M. Atkinson Date: Wed Aug 22, 2001 8:57am Subject: How to Balance Rights of Employees and Your Company http://more.abcnews.go.com/sections/business/corneroffice/corneroffice_010731.html The Privacy Divide How to Balance Rights of Employees and Your Company By Bob Rosner, Allan Halcrow and Alan Levins July 31 - While doing the laundry you find a note in your son's pocket that suggests he may be using drugs. Do you ignore it? Do you ask him about it when he gets home? Or do you rush to his room and search for evidence? What if instead of a note you find a permit to buy a gun? The answers aren't easy. If you ignore the evidence someone could get hurt, or worse. Your son's grades, reputation and health are at risk. But if you search his room you risk shattering his trust in you and undercutting any willingness he might have to discuss difficult topics with you. Unfortunately, these are dilemmas faced by parents every day. Managers face them, too. On the one hand you have a responsibility to protect employees and company property, including equipment, data and money. But getting results demands communication, and employees are less likely to talk with someone they don't trust. Surveillance in the Workplace The issue is further complicated by the fact that the workplace privacy issue is far from crystal clear. All of us struggle with where the right to privacy begins and where it ends because there is no single authority on the topic. There isn't a single word in the U.S. Constitution about privacy, yet the Supreme Court has ruled there is a "penumbra" of rights that address the issue. Yet because the Constitution restricts government action, decisions on privacy rights in the workplace involving the Constitution apply mostly to federal employees. That hasn't stopped many states from including guarantees to privacy in their constitutions that apply to private employers. And privacy standards have been shaped by state and federal statutes and regulations and by court decisions. By now that may sound like enough to send you running from the room. But stay with us, because there are ways to balance employees' right to privacy with your rights to protect people and your company's assets. Taking Action Establish expectations. Ironically, the less your employees expect privacy the less likely you are to have a problem. Practically speaking, low expectations mean employees are not disappointed or surprised by their employer's actions. Low expectations also provide the legal defense often needed if there is a lawsuit. Employee handbooks, job application forms, written policies and contracts should all carefully set forth your right to inspect, search, test and check for illegal substances and objects, illegal activity, and improper use of company equipment (including computers, telephones, desks, lockers, locks and e-mail) consistent with applicable laws. Focus on business reasons. Just because you can search an employee's desk doesn't make it a good idea. If employees feel their privacy is invaded they may feel distrusted and angry, and morale may suffer. There's no reason to even think about conducting a search unless you have evidence or a strong, verifiable reason to believe that: Employees are stealing. Employees are using company equipment improperly. Employees are engaged in illegal activity (such as selling or possessing illegal drugs). An employee's safety may be at risk. Don't mistake suspicion for a reason based on objective fact. Always have a compelling reason based on objective fact to jeopardize an environment of trust. Consider doing a search only as a last resort. First, try old-fashioned detective work and simple questioning of employees; that's often enough to "crack the case" if you think there's a problem. Stay out of employees' private lives. Don't ask employees about their marital status, the health of their personal relationships, or other issues unrelated to work performance. In addition, it's usually best not to try to regulate employee's off-duty activities. Some employers, for example, have tried to dissuade employees from parachuting or bungee jumping (for fear of injury and, therefore, expensive medical claims). Others have sought to keep employees from moonlighting or from participating in events that the employer feels may cast it in a negative light (marching in a political protest, for example). But 28 states now limit such restrictions, and four (California, Colorado, New York and North Dakota) ban any employer restrictions on lawful activities after hours. Bob Rosner is the co-author of the No. 1 Amazon business best-seller The Boss's Survival Guide (McGraw-Hill, 2001), along with Allan Halcrow, former editor of Workforce Magazine and Alan Levins, senior partner of San Francisco-based employer law firm Littler Mendelson. Rosner is also founder of the award-winning workingwounded.com and RetentionEvangelist.com. He can be reached via fax at (206) 780-4353, and via e-mail at: bob@R.... ABCNEWS.com publishes a new Corner Office column every Tuesday. Staying Out of Jail Because so many jurisdictions govern privacy law, be sure you know and understand the law that applies to you. Consult with your HR department or with an attorney. A misstep can result in a lawsuit involving emotional distress damages and punitive damages, as well as poor public relations. Jurors take privacy issues seriously. You should, too. Be very careful about searching anything that isn't company property, such as purses, briefcases or pockets. Such action should always be discussed with an attorney first, should never be done without an objective reason for suspecting an individual, and should be supported by "airtight" language (such as in your handbook). Consult your policies, and follow them. Don't make up the rules as you go along. Never conduct a search or inspection with respect to an employee because he is a member of a group (e.g., a minority or a political group). Don't overreact or react emotionally. Drugs in the workplace, pornography, and illegal gambling are serious offenses and you can't ignore them. But whatever you do should reflect reality. The fact there may be (or is) a problem on the manufacturing floor does not mean that employees' rights may be ignored. If an employee shares personal information with you, keep it to yourself. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3551 From: e cummings Date: Wed Aug 22, 2001 11:37am Subject: Pennsylvania supreme court says no privacy rights in phone calls COURT SAYS NO PRIVACY FOR HOME PHONE CALLS A split Pennsylvania Supreme Court has ruled that individuals have no reasonable expectation of privacy in telephone calls made in their own home. The judge reasoned that with speakerphones, cell phones and the like, users have no way of knowing who might be listening in on a conversation and thus no reasonable expectation that the call will be private. Majority opinion at http://www.courts.state.pa.us/OpPosting/Supreme/out/J-52-2000-mo.pdf Coverage at: http://www.law.com/cgi-bin/nwlink.cgi?ACG=ZZZHW8CDOQC 3552 From: James M. Atkinson Date: Wed Aug 22, 2001 7:03pm Subject: Coordination Within Justice on Counterintelligence Criminal Matters Is Limited [Neither organization seems to be able to detect a fart in an elevator] FBI Intelligence Investigations: Coordination Within Justice on Counterintelligence Criminal Matters Is Limited (16-JUL-01, GAO-01-780). This report reviews the coordination efforts involved in foreign counterintelligence investigations where the Foreign Intelligence Surveillance Act has been or may be employed. The act, among other things, established (1) requirements and a process for seeking electronic surveillance and physical search authority in national security investigations seeking foreign intelligence and counterintelligence information within the United States and (2) the Foreign Intelligence Surveillance Court, which has jurisdiction to hear applications for and grant orders approving Foreign Intelligence Surveillance Act surveillance and searches. GAO found that coordination between the Federal Bureau of Investigation (FBI) and the Department of Justice's (DOJ) Criminal Division has been limited in those foreign counterintelligence cases where criminal activity is indicated and surveillance and searches have been, or may be, employed. A key factor inhibiting this coordination is the concern over how the Foreign Intelligence Surveillance Court or another federal court might rule on the primary purpose of the surveillance or search in light of such coordination. In addition, the FBI and the Criminal Division differ on the interpretations of DOJ's 1995 procedures concerning counterintelligence investigations. In January 2000, the Attorney General issued additional procedures to address these coordination concerns. These procedures, among other things, required the FBI to submit case summaries to the Criminal Division and established a protocol for briefing Criminal Division officials about those investigations. In addition, the FBI established two mechanisms to ensure compliance with the Attorney General's 1995 procedures. These mechanisms include (1) requiring the Office of Intelligence Policy and Review to notify the FBI and the Criminal Division of investigations it believes meets the requirements of the 1995 procedures and (2) establishing a core group of high-level officials to oversee coordination issues. However, these efforts have not been institutionalized in management directives or written administrative policies or procedures. -------------------------Indexing Terms------------------------- REPORTNUM: GAO-01-780 ACCNO: A01392 TITLE: FBI Intelligence Investigations: Coordination Within Justice on Counterintelligence Criminal Matters Is Limited DATE: 07/16/2001 SUBJECT: Domestic intelligence Electronic surveillance Federal intelligence agencies Interagency relations Law enforcement agencies Military intelligence Search and seizure ****************************************************************** ** This file contains an ASCII representation of the text of a ** ** GAO Testimony. ** ** ** ** No attempt has been made to display graphic images, although ** ** figure captions are reproduced. Tables are included, but ** ** may not resemble those in the printed version. ** ** ** ** Please see the PDF (Portable Document Format) file, when ** ** available, for a complete electronic file of the printed ** ** document's contents. ** ** ** ****************************************************************** GAO-01-780 Report to the Ranking Minority Member, Committee on Governmental Affairs, U. S. Senate United States General Accounting Office GAO July 2001 FBI INTELLIGENCE INVESTIGATIONS Coordination Within Justice on Counterintelligence Criminal Matters Is Limited GAO- 01- 780 Page i GAO- 01- 780 FBI Intelligence Investigations Letter 1 Results in Brief 3 Background 6 Scope and Methodology 9 Concern Over Possible Adverse Consequences of Judicial Rulings Has Been a Key Factor Impeding Coordination 11 Procedures Established to Ensure Proper Coordination Led to Problems 16 DOJ Has Taken Additional Action to Address Coordination, but Some Impediments Remain 21 Mechanisms Created to Ensure Compliance With the Procedures Have Not Been Institutionalized 26 Conclusions 30 Recommendations for Executive Action 32 Agency Comments and Our Evaluation 32 Appendix I Chronology of Key Events Relating to FBI/ DOJ Coordination 36 Appendix II Comments From the Department of Justice. 37 GAO Comments 43 Tables Table 1: Key Events Relating to FBI/ DOJ Coordination 36 Abbreviations FBI Federal Bureau of Investigation DOJ Department of Justice FISA Foreign Intelligence Surveillance Act OIPR Office of Intelligence Policy and Review Contents Page ii GAO- 01- 780 FBI Intelligence Investigations Page 1 GAO- 01- 780 FBI Intelligence Investigations July 16, 2001 The Honorable Fred Thompson Ranking Minority Member Committee on Governmental Affairs United States Senate Dear Senator Thompson: Recent Federal Bureau of Investigation (FBI) intelligence investigations identifying possible significant criminal violations have brought to light serious problems that have limited whether and when the FBI coordinates its investigations with the Department of Justice's (DOJ) Criminal Division. These investigations involved allegations that the Peoples Republic of China was seeking to influence the 1996 Presidential election in the United States and that nuclear weapons design secrets at the Los Alamos National Laboratory had been compromised. Timely coordination 1 on such intelligence investigations can be important because the Criminal Division may be able to advise the FBI on ways to (1) preserve its intelligence sources so that they would not be compromised in the event of subsequent prosecution and (2) enhance the evidence needed to prosecute the alleged crimes. In addition, prosecutors need sufficient time to familiarize themselves with a case in order to address any court proceedings emanating from the perpetrators' arrests. Most of the coordination problems have arisen in the context of foreign counterintelligence investigations that involve or anticipate the use of electronic surveillance or physical searches under the Foreign Intelligence Surveillance Act of 1978, as amended. 2 The act was designed to strike a balance between the government's need for intelligence information to protect the national security and the protection of individual privacy rights. The act provided the first legislative authorization for wiretapping and other forms of electronic surveillance for intelligence investigation purposes of foreign powers and their agents in the United States. The act, among other things, established (1) requirements and a process for 1 For this report, coordination includes the initial notification of case activity by the FBI, subsequent consultation with the Criminal Division, and any other exchange of information. 2 Foreign Intelligence Surveillance Act of 1978, P. L. 95- 511, 92 Stat. 1783 (1978). United States General Accounting Office Washington, DC 20548 Page 2 GAO- 01- 780 FBI Intelligence Investigations seeking electronic surveillance and physical search authority 3 in national security investigations seeking to obtain foreign intelligence and counterintelligence information 4 within the United States and (2) a special court- the Foreign Intelligence Surveillance Court- with jurisdiction to hear applications for and grant orders approving Foreign Intelligence Surveillance Act surveillance and searches. Because the standards for obtaining a foreign intelligence surveillance order are different than those required to obtain authorization for a search or a surveillance in a criminal investigation, there will often be situations in which it is possible to obtain a foreign intelligence surveillance order that would not satisfy the standards for a criminal search warrant or electronic surveillance order. At your request, we reviewed the current policies, procedures, and processes for coordinating FBI intelligence investigations within DOJ, as well as DOJ's efforts to resolve problems that were identified in recent internal reviews of this issue. 5 Specifically, we agreed to determine the following: 1. The key factors that have affected coordination. 2. The DOJ and FBI policies, procedures, and processes that are in place for coordinating with appropriate DOJ units foreign counterintelligence investigations that indicate possible criminal violations. 3. The actions DOJ has taken to address identified coordination problems and the concerns and impediments that remain. 3 Hereafter referred to as "surveillance and searches." 4 This report focuses on the coordination efforts involved in foreign counterintelligence investigations where the Foreign Intelligence Surveillance Act has been or may be employed. According to DOJ, foreign counterintelligence investigations nearly always include an inherent criminal violation (e. g., espionage, sabotage, or international terrorism), regardless of the government's ultimate decision whether or not to prosecute the target. In some circumstances, the FBI, as a member of the intelligence community, may collect foreign intelligence information, but such cases are less likely to result in criminal prosecutions than foreign counterintelligence investigations. 5 Office of Inspector General's report on "The Handling of FBI Intelligence Information Related to the Justice Department's Campaign Finance Investigation" (July 1999). The Attorney General's Review Team's report on the "Handling of the Los Alamos National Laboratory Investigation" (May 2000). Page 3 GAO- 01- 780 FBI Intelligence Investigations 4. The mechanisms that have been put into place to ensure compliance with the policies, procedures, and processes. Coordination between the FBI and the Criminal Division has been limited in those foreign counterintelligence cases where criminal activity is indicated and surveillance and searches have been, or may be, employed. A key factor inhibiting this coordination is the concern over how the Foreign Intelligence Surveillance Court or another federal court might rule on the primary purpose of the surveillance or search in light of such coordination. The judicially established "primary purpose" test has been adopted as a test by most federal courts in such foreign counterintelligence cases where evidence gathered by surveillance and searches was challenged. Under the primary purpose test, most federal courts have held that foreign intelligence information may subsequently be used in criminal prosecutions so long as the primary purpose of the Foreign Intelligence Surveillance Act surveillance or search was to obtain foreign intelligence information. According to officials of the Office of Intelligence Policy and Review- the DOJ unit responsible for overseeing Foreign Intelligence Surveillance Act surveillance and search applications- the Foreign Intelligence Surveillance Court also has used this test to determine whether to grant DOJ's requests for Foreign Intelligence Surveillance Act surveillance and searches. According to Criminal Division officials, since the act was enacted, no court using the primary purpose test has upheld a challenge to the government's use of Foreign Intelligence Surveillance Act obtained intelligence information for criminal prosecution purposes. Moreover, according to Office of Intelligence Policy and Review officials, no surveillance or search request has been denied by the Foreign Intelligence Surveillance Court. These officials said that, nonetheless, FBI and Office of Intelligence Policy and Review officials remain concerned that coordination with the Criminal Division, on court review, could raise the primary purpose question, and, thus, place at risk the FBI's authorization to use the intelligence surveillance and search tools and/ or lead to the suppression of evidence gathered from them. On the other hand, Criminal Division officials believe these concerns, while well- intentioned, are overly cautious. These officials contend that their advice can help preserve and enhance the criminal prosecution option. Policies for coordinating FBI foreign counterintelligence investigations involving suspected criminal violations with the Criminal Division were promulgated by the Attorney General in procedures that were issued in July 1995. However, rather than ensuring that DOJ's intelligence and Results in Brief Page 4 GAO- 01- 780 FBI Intelligence Investigations criminal functions are properly coordinated, according to Division officials, the implementation and interpretation of the procedures and the previously noted concerns led to a significant decline in coordination between the FBI and the Criminal Division. These procedures, which were in effect at the time of our review, require, in part, that the FBI notify the Criminal Division and the Office of Intelligence Policy and Review whenever a foreign counterintelligence investigation utilizing authorized surveillance and searches develops "...facts or circumstances... that reasonably indicate that a significant federal crime has been, is being, or may be committed...."6 However, according to Criminal Division officials, subsequent to the procedures' issuance, required notifications did not always occur and often, when they did, were not timely. In January 2000, to address some coordination concerns, the Attorney General issued additional coordination procedures. These procedures (1) required the FBI to share with the Criminal Division memorandums summarizing certain types of foreign counterintelligence investigations involving U. S. persons, (2) established a core group of high- level DOJ officials to identify from among the FBI's most critical investigations those that met the Attorney General's requirements for notification, and (3) established a protocol for briefing Criminal Division officials about those investigations. Criminal Division officials opined that these procedures had helped to improve coordination. The core group and briefing protocol were discontinued in October 2000, but were replaced in April 2001, by a reconstituted core group with broader oversight responsibilities. Despite the additional January 2000 coordination procedures and the reconstituted core group, impediments to coordination remain. For example, Office of Intelligence Policy and Review, Criminal Division, and FBI officials disagreed as to the type of advice the Criminal Division may provide the FBI on foreign counterintelligence investigations involving Foreign Intelligence Surveillance Act surveillance and searches without affecting possible judicial interpretations of the primary purpose of the surveillance or searches. To address these impediments, a coordination working group headed by the Principal Associate Deputy Attorney General developed a decision memorandum in late 2000. The memorandum, which required the Attorney General's approval, recommended revisions to the 1995 procedures and detailed several options, including a preferred option, 6 The Attorney General's procedures, in addition to establishing a requirement and criteria for notification, set out guidelines for coordination. The notification requirement is to be the first step in achieving coordination. Page 5 GAO- 01- 780 FBI Intelligence Investigations to address the differing interpretations on the advice issue. However, as of the completion of our review, no decision had been made on the memorandum. Consequently, these issues continue to be impediments to coordination. According to working group officials, among those issues discussed in the decision memorandum were (1) the type of advice the Criminal Division should be permitted to provide the FBI and (2) varying interpretations as to whether certain criminal violations are considered "significant violations" and, thus, trigger the Attorney General's 1995 coordination procedures. Beyond the decision memorandum, an additional impediment, according to Criminal Division officials, relates to the adequacy and timeliness of foreign counterintelligence case summary memorandums that the FBI provides to the Criminal Division. Criminal Division officials, while recognizing some improvement in coordination due to the January 2000 procedures, continue to question whether the Attorney General's 1995 procedures were always being followed for notifying the Criminal Division about relevant investigations. Office of Deputy Attorney General and FBI officials acknowledged that historically no mechanisms had been specifically created to help ensure compliance with the Attorney General's 1995 procedures. Other than its routine managerial oversight of investigations, the FBI has not had in place an oversight mechanism specifically targeted at ensuring compliance with the Attorney General's 1995 procedures. Recently, however, two mechanisms have been developed to help improve coordination with the Criminal Division. First, in mid- 2000, the Office of Intelligence Policy and Review implemented a practice to notify both the FBI and the Criminal Division of FBI Foreign Intelligence Surveillance Act cases that Office attorneys believed met the requirements of the Attorney General's procedures. Second, with the reestablishment of the core group in April 2001, a new high- level mechanism has been created to oversee coordination issues. The reconstituted core group's principal role will be to decide whether particular FBI investigations meet the requirements of the Attorney General's procedures for notification and to identify for the Attorney General's attention any extraordinary situations where compliance with the guidelines needs to be considered. However, these efforts have not been institutionalized in management directives or written administrative policies or procedures. This report contains recommendations to the Attorney General that (1) address the identification and proper coordination of those FBI intelligence investigations that detect, potential or actual, criminal violations meeting the requirements established in the Attorney General's Page 6 GAO- 01- 780 FBI Intelligence Investigations 1995 procedures and (2) would establish mechanisms to help ensure compliance with the those procedures. In its June 21, 2001, written comments on a draft of this report, DOJ said that it has taken steps to implement two of our recommendations and that our remaining recommendations are under review. The main purpose of a foreign counterintelligence investigation is to protect the U. S. government from the clandestine efforts of foreign powers and their agents to compromise or to adversely affect U. S. military and diplomatic secrets or the integrity of U. S. government processes. At the same time, however, many of the foreign powers' clandestine efforts may involve a violation of U. S. criminal law, usually espionage or international terrorism, which falls within the federal law enforcement community's mandate to investigate and prosecute. As a result, foreign counterintelligence investigations often overlap with law enforcement interests. To provide a statutory framework for electronic surveillance conducted within the United States for foreign intelligence purposes, the Congress, in 1978, enacted the Foreign Intelligence Surveillance Act (FISA). The legislative effort emerged, in part, from the turmoil that surrounded government intelligence agencies' efforts to apply national security tools to domestic organizations during the 1970s. For example, congressional hearings identified surveillance abuses within the United States by intelligence agencies that were carried out in the name of national security. 7 FISA was designed to strike a balance between the government's need for intelligence information to protect the national security and the protection of individual privacy rights. 8 In 1994, the Congress amended the 1978 act to include physical searches for foreign intelligence purposes under the FISA warrant procedures. 9 7 See, S. Rep. No. 95- 604, at 15 (1977). 8 Id. The Senate committee report provided that the basis for this legislation was the understanding that even if the President had an 'inherent' constitutional power to authorize warrantless surveillance for foreign intelligence purposes, the Congress had the power to regulate the exercise of this authority by legislating a reasonable warrant procedure governing foreign intelligence surveillance. 9 Intelligence Authorization Act for Fiscal Year 1995, P. L. 103- 359, 108 Stat. 3423 (1994). Background Page 7 GAO- 01- 780 FBI Intelligence Investigations Within DOJ, various components have responsibilities related to the investigation and prosecution of foreign intelligence, espionage, and terrorism crimes. The Criminal Division has responsibility for developing, enforcing, and supervising the application of all federal criminal laws, except those specifically assigned to other divisions. Within the Criminal Division, the Internal Security Section and the Terrorism and Violent Crime Section have responsibility for supervising the investigation and prosecution of crimes involving national security. Among such crimes are espionage, sabotage, and terrorism. The Office of Intelligence Policy and Review (OIPR) is, among other things, to assist the Attorney General by providing legal advice and recommendations regarding national security matters and is to approve the seeking of certain intelligence- gathering activities. OIPR represents the United States before the Foreign Intelligence Surveillance Court (hereinafter, the FISA Court). OIPR prepares applications to the FISA Court for orders authorizing surveillance and physical searches by U. S. intelligence agencies, including the FBI, for foreign intelligence purposes in investigations involving espionage and international terrorism and presents them for FISA Court review. When evidence obtained under FISA is proposed for use in criminal proceedings, OIPR is to obtain the FISArequired advance authorization from the Attorney General. In addition, in coordination with the Criminal Division and U. S. Attorneys, OIPR has the responsibility of preparing motions and briefs required in U. S. district courts when surveillance authorized under FISA is challenged. The FBI is DOJ's principal investigative arm with jurisdiction over violations of more than 200 categories of federal crimes, including espionage, sabotage, assassination, and terrorism. To carry out its mission, the FBI has over 11,000 agents located primarily in 56 field offices and its headquarters in Washington, D. C. Among its many responsibilities, within the United States, the FBI is the lead federal agency for protecting the United States from foreign intelligence, espionage, and terrorist threats. The FBI's National Security and Counterterrorism Divisions are the units responsible for countering these threats. To accomplish their task, the National Security and Counterterrorism Divisions engage in foreign intelligence and foreign counterintelligence investigations. Within the Judicial Branch, FISA established a special court (the FISA Court). The FISA Court, as noted previously, has jurisdiction to hear applications for and grant orders approving FISA surveillance and searches. The FISA Court is comprised of seven district court judges from seven different districts who are appointed by the Chief Justice of the U. S. Page 8 GAO- 01- 780 FBI Intelligence Investigations Supreme Court to serve rotating terms of no longer than 7 years. The Chief Justice also designates three federal judges from the district or appeals courts to serve on a Foreign Intelligence Surveillance Review Court. The Foreign Intelligence Review Court was established to rule on the government's appeals of Foreign Intelligence Surveillance Court denials of government- requested surveillance and search orders. As noted previously, foreign counterintelligence and law enforcement investigations often overlap, but at the same time different legal requirements apply to each type of investigation. For intelligence and counterintelligence purposes, electronic surveillance and physical searches against foreign powers and agents of foreign powers in the United States are governed by FISA, 10 as amended. FISA, among other things, contains requirements and a process for seeking electronic surveillance and physical search authority in investigations seeking to obtain foreign intelligence and counterintelligence information within the United States. For example, FISA permits surveillance only when the purpose of the surveillance is to obtain foreign intelligence information. FISA also requires prior judicial approval by the FISA Court for surveillance and searches. 11 With respect to FBI foreign counterintelligence investigations, the FBI Director 12 must certify, among other things, to the FISA Court that the purpose of the surveillance is to obtain foreign intelligence information and that such information cannot reasonably be obtained by normal investigative techniques. However, FISA also contains provisions permitting intelligence agencies to share with law 10 FISA surveillance and searches, under certain circumstances, may be conducted with respect to any persons, including U. S. persons (defined, in part, to include U. S. citizens and permanent resident aliens), who, among other things, knowingly or pursuant to the direction of an intelligence service or network, engage in clandestine intelligence gathering activities for or on behalf of a foreign power, which activities involve or may involve a violation of the criminal statutes of the United States; or knowingly engages in sabotage or international terrorism, or in activities that are in preparation therefor; or knowingly aids or abets any person in the conduct of such activities. 11 In certain emergency situations, in general, FISA allows the Attorney General to authorize surveillance and searches for a limited period after which judicial approval is needed. 12 By executive orders, in addition to the FBI Director, the following individuals have been designated to make the certifications required by FISA in support of applications to conduct electronic surveillance or physical searches: the Secretaries and Deputy Secretaries of State and Defense and the Director and Deputy Director of Central Intelligence. Moreover, none of the foregoing officials, nor anyone officially acting in that capacity, may make such certifications, unless that official has been appointed by the President, by and with the advice and consent of the Senate. Page 9 GAO- 01- 780 FBI Intelligence Investigations enforcement intelligence information that they have gathered that implicates federal criminal violations. For federal criminal investigations, the issuance and execution of search warrants, for example, is generally governed by the Federal Rules of Criminal Procedure. 13 In addition, electronic surveillance or wiretapping in criminal investigations is, in general, governed by title III of the Omnibus Crime Control and Safe Streets Act of 1968, as amended. 14 The differing standards and requirements applicable to criminal investigations and intelligence investigations are evident with respect to electronic surveillance of non- U. S. persons where the requisite probable cause standard under FISA differs from that required in a criminal investigation. In criminal investigations, the issuance of court orders authorizing electronic surveillance must, in general, be supported by a judicial finding of probable cause to believe that an individual has committed, is committing, or is about to commit a particular predicate offense. 15 In contrast, FISA, in general, requires that a FISA Court judge find probable cause to believe that the suspect target is a foreign power or an agent of a foreign power, and that the places at which the surveillance is directed is being used, or is about to be used, by a foreign power or an agent of a foreign power. To determine what key factors affected coordination between the FBI and the Criminal Division, we interviewed DOJ officials, including officials from the Office of the Deputy Attorney General, OIPR, the Criminal Division, the Division's Internal Security and Terrorism and Violent Crime Sections, the Office of Inspector General, and the FBI's National Security and Counterterrorism Divisions and Office of General Counsel. We also reviewed congressional committee reports and hearing transcripts regarding intelligence coordination issues and the DOJ Inspector General's July 1999 unclassified report on intelligence coordination problems related to DOJ's campaign finance investigation. In addition, we reviewed the classified report of the Attorney General's Review Team on the FBI's handling of its investigation at the Los Alamos National Laboratory. 13 Federal Rules of Criminal Procedure, Rule 41, Search and Seizure (2000). 14 P. L. 90- 351, 82 Stat. 197 (1968). 15 See title III of the Omnibus Crime Control and Safe Streets Act of 1968, P. L. 90- 351, as amended. Scope and Methodology Page 10 GAO- 01- 780 FBI Intelligence Investigations To determine what policies, procedures, and processes are in place for coordinating foreign counterintelligence investigations that indicate possible criminal violations within appropriate DOJ units, we reviewed applicable laws, Executive Orders 12139 on Foreign Intelligence Electronic Surveillance and 12949 on Foreign Intelligence Physical Searches, and copies of existing guidance provided by DOJ and the FBI. We interviewed Criminal Division, OIPR, and FBI officials to determine the pertinent coordination policies, procedures, and processes in effect and their views on their effectiveness. In order to provide you with an unclassified report, we agreed with the Committee not to review specific cases to try to identify instances of compliance or noncompliance with the 1995 coordination procedures. To determine what actions DOJ has taken to address identified coordination problems and what concerns and impediments, if any, remain, we reviewed certain legal requirements pertaining to disseminating and safeguarding information from foreign counterintelligence investigations and criminal investigations. For foreign counterintelligence investigations, we reviewed FISA, as amended; relevant federal court cases; Executive Order 12333 on United States Intelligence Activities; and Congressional Research Service reports. For criminal investigations, we reviewed sections of the United States Code and Federal Rules of Criminal Procedure; federal court cases; and news articles related to espionage prosecutions. In addition, we obtained and reviewed congressional committee reports and hearing transcripts regarding intelligence coordination issues. We also reviewed internal DOJ reports, as mentioned earlier, the DOJ Inspector General's unclassified report on DOJ's campaign finance investigation and the Attorney General's Review Team's classified report concerning the FBI's Los Alamos National Laboratory investigation. Furthermore, we met with Criminal Division, OIPR, coordination working group, and FBI officials to discuss the proposed revisions to the July 1995 guidelines and any issues the working group was unable to resolve. During our review, decision memorandums containing recommendations concerning the coordination of FBI intelligence investigations with the Criminal Division, prepared by the coordination working group, remained draft internal documents. We were not provided and did not have the opportunity to review the working group's documents. As such, our findings and conclusions relating to DOJ's proposed actions and remaining impediments are based on testimonial evidence. To determine what mechanisms have been put into place to ensure compliance with intelligence coordination policies and procedures, we Page 11 GAO- 01- 780 FBI Intelligence Investigations reviewed applicable OIPR and FBI internal policies and procedures. We also interviewed officials from the Office of Deputy Attorney General, including the then Principal Associate Deputy Attorney General in charge of the intelligence coordination working group, OIPR, and the Office of the Inspector General and FBI officials, including the the General Counsel and representatives of the FBI's Inspection Division. We performed our work from May 2000 to May 2001 in accordance with generally accepted government auditing standards. In June 2001, we requested comments on a draft of this report from the Attorney General. On June 21, 2001, we received written comments from the Acting Assistant Attorney General for Administration. The comments are discussed on pages 32 and 33 and reprinted in appendix II. DOJ also provided technical comments, which we have incorporated where appropriate. A key factor impeding coordination of foreign counterintelligence investigations involving the use or anticipated use of the FISA surveillance and search tools has been the FBI's and OIPR's concern about the possible consequences that could result should a federal court rule that the line between an intelligence and a criminal investigation had been crossed due to contacts and/ or information shared between the FBI and the Criminal Division. Specifically, FBI and OIPR were concerned over the consequences should a court find that the primary purpose of the surveillance or search had shifted from intelligence gathering to collecting evidence for criminal prosecution. While these concerns inhibited coordination, Criminal Division officials questioned their reasonableness and believe that they had an adverse effect on the strength of subsequent prosecutions. A further concern of FBI intelligence investigators, not necessarily related to the question of the primary purpose of the surveillance or search, has been the potential revelation of its sources and methods during criminal proceedings. The consequences about which the FBI and OIPR were concerned included the potential (1) rejection of the FISA application or the loss of a FISA renewal and/ or (2) suppression of evidence gathered using FISA tools, which, in turn, might lead to loss of the criminal prosecution. According to OIPR officials, differences of opinion existed among OIPR, the Criminal Division, FBI, and other DOJ officials, regarding their perceptions of the likelihood that the FISA Court or another federal court might, upon review, find that the line between an intelligence and criminal surveillance or search had been crossed and, therefore, the primary Concern Over Possible Adverse Consequences of Judicial Rulings Has Been a Key Factor Impeding Coordination Concerns Inhibited FBI and OIPR Coordination Page 12 GAO- 01- 780 FBI Intelligence Investigations purpose had shifted from intelligence gathering to a criminal investigation. Complicating the resolution of these differences has been DOJ's disinclination to risk rejection of a FISA application or loss of a prosecution, for example, by requiring the FBI to more closely coordinate with the Criminal Division. The FBI has long recognized that the investigative tools FISA authorized were often the FBI's most effective means to secure intelligence information. However, since the mid- 1990s, FBI investigators, cautioned by OIPR, became concerned that their interaction with the Criminal Division regarding an investigation might result in the FISA Court denying a FISA application, the renewal of an existing FISA, or limit the FBI's options to seek the use of the FISA tools at a later date should the FISA Court interpret these interactions as an indication that intelligence gathering was not, or no longer was, the primary purpose of the investigation. As a result, according to the Attorney General's Review Team- the team established to review the FBI's handling of the Los Alamos National Laboratory investigation- even in foreign counterintelligence investigations not involving FISA tools, the FBI and OIPR were reluctant to notify the Criminal Division of possible federal crimes as they feared such contacts could be detrimental should they decide to subsequently seek the use of FISA tools. According to an Associate Deputy Attorney General, resolving these concerns is complicated because DOJ's interactions with the FISA Court take place during FISA proceedings before the court. Introducing new policies or procedures during an investigation for which the court was considering a FISA application or renewal (e. g., requiring greater coordination), might result in the FISA Court rejecting that FISA. The official also said that DOJ officials did not want to take such a risk. Contacts between FBI intelligence investigators and the Criminal Division may also raise concerns with respect to the preservation of certain evidence in criminal prosecutions. As noted earlier, FISA provides that evidence of criminal violations gathered during an intelligence investigation may be shared with law enforcement and, for example, used in a criminal prosecution. Under the primary purpose test, most courts have held that information gathered using the FISA tools may be used in subsequent criminal prosecutions only so long as the primary purpose of the FISA surveillance or search was to obtain foreign intelligence information. According to Criminal Division officials, since FISA's Concerns Regarding Loss of FISA Investigative Tools Concerns Regarding Loss of Evidence in a Criminal Prosecution Page 13 GAO- 01- 780 FBI Intelligence Investigations enactment, no court using the primary purpose test has upheld a challenge to the government's use of FISA- obtained intelligence information for criminal prosecution purposes. However, OIPR and FBI officials expressed concern that a federal court could determine that the primary purpose of the surveillance or search was for a criminal investigation, and, could potentially suppress any FISA evidence gathered subsequent to that time. According to Criminal Division officials, the FBI's and OIPR's more restrictive interpretation of what could be shared with the Criminal Division stemmed from the application of the judicially created primary purpose test, articulated prior to the enactment of FISA. 16 Most federal courts have adopted the primary purpose test in post- FISA cases. 17 Under this test, most federal courts have held that foreign intelligence information gathered using FISA tools may be used in subsequent criminal proceedings so long as the primary purpose of the FISA surveillance or search was to obtain foreign intelligence information. These officials suggested that the application of the primary purpose test had not raised potential coordination problems between the FBI and the Criminal Division until the Aldrich Ames case. In 1994, Aldrich H. Ames, a Central Intelligence Agency official, was arrested on espionage charges of spying for the former Soviet Union and subsequently Russian intelligence. The FISA Court authorized an electronic surveillance of the computer and software within the Ames' residence. In addition, the Attorney General had authorized a warrantless physical search of the residence. At that time, FISA did not apply to physical searches. DOJ obtained a guilty plea from Ames who was sentenced to life in prison without parole. Criminal Division and FBI officials said that some in DOJ were concerned that, had the Ames case proceeded to trial, early and close coordination between the FBI and the Criminal Division might have raised a question as to whether the primary purpose of the surveillance and searches of Ames' residence had been a criminal investigation and not intelligence gathering. According to these officials, had this question been raised, a court might have ruled that information gathered using the FISA surveillance and/ or the warrantless search be suppressed, thereby possibly jeopardizing Ames' 16 See, e. g., United States v. Truong Dinh Hung, 629 F. 2d 908 (1980), cert. denied, 454 U. S. 1144 (1984). The facts in this case occurred prior to FISA's enactment in 1978. 17 See, e. g., United States v. Duggan, 743 F. 2d 49 (1984). Page 14 GAO- 01- 780 FBI Intelligence Investigations prosecution. To date, this issue remains a matter of concern to the FBI and OIPR. OIPR officials indicated that while such a loss had not occurred because Ames had pleaded guilty, the fear of such a loss, nonetheless, was real. Criminal Division officials consider OIPR's and FBI's concern in the Ames case to be overly cautious. In their opinion, the coordination that occurred during the investigation had been carried out properly and, had the case been tried, any challenges to the evidence gathered would have been denied and the prosecution would have been successful. Moreover, with regard to FBI and OIPR concerns, Criminal Division officials said that they stemmed from an unduly strict interpretation of the primary purpose test. As noted earlier, the primary purpose test was articulated prior to FISA. Division officials cited the opinion of the Attorney General's Review Team, which stated, in general, that FISA was not a codification of the primary purpose test and that FISA, itself, with all its attendant procedures and safeguards, was to be the measure by which such surveillance and searches were to be judged. While recognizing that the FBI's and OIPR's concerns were well- intentioned, Criminal Division officials said that as a result of these concerns the primary purpose test had been, in effect, interpreted by the FBI and OIPR to mean 'exclusive' purpose. OIPR officials did not dispute this characterization of OIPR's historical concerns relative to primary purpose. However, these officials said that OIPR's current position regarding FBI and Criminal Division coordination was based on their understanding of the FISA Court's position on the primary purpose issue relating to such coordination. As a result, Division officials contend that they have been unable to provide advice that could have helped the FBI preserve and enhance the criminal prosecution option. For example, the Division could advise the FBI on ways to preserve its intelligence sources against compromise during a subsequent criminal trial. Division officials further contend that their involvement in the investigation can help to ensure that the case the government presents for prosecution is the strongest it can produce. According to OIPR, whenever the government decides to pursue both national security and law enforcement investigations simultaneously, it may have to decide, in some instances, whether, or at what point, one of the investigations must be ended to preserve the integrity of the other. Criminal Division Believes OIPR and FBI Concerns Are Overly Cautious Concerns Regarding Revelation of Intelligence Sources and Methods Page 15 GAO- 01- 780 FBI Intelligence Investigations OIPR officials said that the possibility of intelligence sources and methods being exposed, if evidence gathered during an intelligence investigation is later used and challenged in a criminal prosecution, remains a concern of FBI investigators. 18 If the intelligence source or method is deemed to be of great value, DOJ may have to decide whether protection of the source or method outweighs the seriousness of the crime and, accordingly, decline prosecution. As discussed previously, the primary legislation governing intelligence investigations of foreign powers and their agents in the United States is FISA. FISA also provides, however, that intelligence information implicating criminal violations may be shared with law enforcement. FISA further contains provisions to help maintain the secrecy of lawful counterintelligence sources and methods where such information is used in a criminal proceeding. Specifically, the act provided that where FISA information is used, introduced, or disclosed in a trial and the Attorney General asserts that disclosure of such information in an adversary hearing would harm the national security of the United States, the Attorney General may seek court review, without the presence of defense counsel, as to whether the surveillance or search was lawfully authorized and conducted. OIPR officials emphasized that while the act may provide for such a review, a judge may decide that the presence of defense counsel was necessary. Furthermore, officials asserted that, as a result, the presence of the defendant's attorney raised the risk that classified information reviewed during the proceeding could be subsequently revealed, despite these proceedings being subject to security procedures and protective orders. Consequently, they added that intelligence investigators might be reluctant to share with the Criminal Division evidence of a possible federal crime that had been gathered during an intelligence investigation. 18 According to OIPR officials, the Classified Information Procedures Act, as amended (P. L. 96- 456, 94 Stat. 2025 (1980)), mitigates against, but does not eliminate, the risk that prosecution would involve public disclosure of classified information not covered by the specific statutory protections afforded FISA applications and related materials. Page 16 GAO- 01- 780 FBI Intelligence Investigations Stemming, in part, from concerns raised over the timing and extent of coordination on the Aldrich Ames case, the Attorney General in July 1995 established policies and procedures for coordinating FBI foreign counterintelligence investigations with the Criminal Division. 19 One purpose of the 1995 procedures was to ensure that DOJ's criminal and counterintelligence functions were properly coordinated. However, according to Criminal Division officials and conclusions by the Attorney General's Review Team, rather then ensuring proper coordination, problems arose soon after the Attorney General's 1995 procedures were promulgated. As discussed, those problems stemmed from the FBI's and OIPR's concerns about the possible consequences that could damage an investigation or prosecution should a court make an adverse ruling on the primary purpose issue. In January 2000, the Attorney General promulgated coordination procedures, which were in addition to the 1995 procedures. 20 These procedures were promulgated to address problems identified by the Attorney General's Review Team during its review of the FBI's investigation of the Los Alamos National Laboratory. Criminal Division officials believed that the 2000 procedures had helped to improve coordination, especially for certain types of foreign counterintelligence investigations. According to DOJ officials, following the conviction of Aldrich Ames, OIPR believed that the close relationship between the FBI and the Criminal Division had been near to crossing the line between intelligence and criminal investigations, thereby risking a decision against the government if a court had applied the primary purpose test. To address the concerns raised, in part, by the FBI's contacts with the Criminal Division in the Ames case, the Attorney General promulgated coordination procedures on July 19, 1995. 19 Attorney General memorandum dated July 19, 1995, 'Procedures for Contacts Between the FBI and the Criminal Division Concerning Foreign Intelligence and Foreign Counterintelligence Investigations.' 20 Memorandum for the Attorney General, dated January 18, 2000, 'To Recommend that the Attorney General Authorize Certain Measures Regarding Intelligence Matters in Response to the Interim Recommendations Provided by Special Litigation Counsel Randy Bellows.' Procedures Established to Ensure Proper Coordination Led to Problems The Attorney General's 1995 Guidelines Were Promulgated to Try to Ensure Proper Coordination Page 17 GAO- 01- 780 FBI Intelligence Investigations The purposes of the 1995 procedures were to establish a process to properly coordinate DOJ's criminal and counterintelligence functions and to ensure that intelligence investigations were conducted lawfully. To accomplish its coordination purpose, the 1995 procedures, among other things, established criteria for when and how contacts between the FBI and the Criminal Division were to occur on foreign counterintelligence investigations. The procedures identify the circumstances under which the FBI was to notify the Criminal Division and set forth procedures to govern subsequent coordination that arises from the initial contact. In investigations involving FISA, the notification procedures established criteria that 'If in the course of an'[ foreign counterintelligence] investigation utilizing electronic surveillance or physical searches under the Foreign Intelligence Surveillance Act' facts or circumstances are developed that reasonably indicate that a significant federal crime has been, is being, or may be committed, the FBI and OIPR each shall independently notify the Criminal Division.' Following the Criminal Division's notification, the procedures require the FBI to provide the Criminal Division with the facts and circumstances, developed during its investigation that indicated significant criminal activity. 21 After the initial notification, the FBI and the Criminal Division could engage in certain substantive consultations. The procedures allowed the Criminal Division to provide the FBI guidance to preserve the criminal prosecution option; however, the procedures also established limitations on consultations between the FBI and the Criminal Division. To protect the intelligence purpose of the investigation, the procedures limited the type of advice the Criminal Division could provide the FBI in cases employing FISA surveillance or searches. Specifically, the procedures prohibited the Division from instructing the FBI on the operation, continuation, or expansion of FISA surveillance or searches. Additionally, the FBI and the Criminal Division were to ensure that the Division's advice did not inadvertently result in either the fact or appearance of the Division directing the foreign counterintelligence investigation toward, or controlling it for, law enforcement purposes. Criminal Division officials indicated that they believed the procedures permitted the Division to advise the FBI on ways to preserve or enhance 21 The procedures also place limitations on the FBI's contacts with U. S. Attorneys' Offices. Except for exigent circumstances, the procedures in investigations involving FISA require both OIPR's and the Criminal Division's approval prior to any contact. Page 18 GAO- 01- 780 FBI Intelligence Investigations evidence for subsequent criminal prosecutions. The officials said that the Criminal Division might be able to advise the FBI on ways to preserve its intelligence sources, for example, by utilizing other sources to develop the information needed in a prosecution without risking the revelation of its more valuable sources. Moreover, the Criminal Division may also be able to advise the FBI on ways to enhance the evidence needed for prosecution, for example, by developing information that is needed to prove the elements of a criminal offense. To implement the new procedures, the FBI Director, in August 1995, sent a memorandum with the Attorney General's notification procedures attached to all Special Agents In Charge of FBI field offices. The Director's memorandum provided guidance on the parameters of the Attorney General's notification procedures and methods intended to ensure compliance with them. Among the instructions implementing the Attorney General's procedures was an instruction that when investigations met the Attorney General's criteria for notification, FBI headquarters, not field offices, ordinarily would be responsible for notifying the Criminal Division. 22 Moreover, when those investigations employed FISA techniques, FBI headquarters was to notify OIPR before notifying the Criminal Division. The purpose of notifying OIPR before the Criminal Division was so that OIPR could ensure that in subsequent contacts between the FBI and the Division, the primary purpose of the subject foreign counterintelligence FISA surveillance or search would continue to be intelligence gathering. Emphasizing the importance of FBI headquarters in the notification process, the FBI Director cautioned in his August 1995 memorandum as follows: 'It is critical that the value of the FBI's most sensitive and productive investigative techniques not be affected by their use for purposes for which they were not principally intended. Careful coordination in these matters by [FBI headquarters] is essential in order to avoid the inappropriate characterization or management of intelligence investigations as criminal investigations, the potential devaluation of intelligence techniques, or the loss of prosecutive opportunities.' 22 The implementing procedures only permit FBI field offices to contact the Criminal Division or a U. S. Attorney's Office directly when exigent circumstances involving potential danger to life or property are present. FBI and OIPR Concerns Affected Implementation of the 1995 Procedures Page 19 GAO- 01- 780 FBI Intelligence Investigations According to information provided by FBI officials, after issuance of the procedures, agents received training on them. The FBI's Office of General Counsel developed presentations, which according to FBI officials, were provided to both new agent trainees at the FBI's Quantico, VA, training facility and to experienced special agents. Additional training on the procedures continued in subsequent years and, on occasion, agents were sent reminders on the importance of reporting evidence of significant federal crimes to FBI headquarters so that it could properly coordinate them with the Criminal Division. According to the Attorney General's Review Team's report, almost immediately following the implementation of the Attorney General's 1995 procedures, coordination problems arose. Rather than ensuring that DOJ's criminal and counterintelligence functions were properly coordinated, as intended, the implementation and interpretation of the procedures triggered coordination problems. Those problems stemmed from concerns FBI and OIPR officials had over the possible legal consequences, discussed above, should the FISA Court or another federal court rule that the primary purpose of the surveillance or search was for criminal investigation purposes rather than intelligence gathering. According to Criminal Division officials, coordination of foreign counterintelligence investigations dropped off significantly following the implementation of the 1995 procedures. The Attorney General's Review Team reported and Criminal Division officials confirmed that when the FBI did notify the Criminal Division about its foreign counterintelligence investigations, the notifications tended to occur near the end of the investigation. As a result, during the investigations the Division would have been playing little or no role in decisions that could have affected the success of potential subsequent criminal prosecutions. An FBI official acknowledged that soon after the implementation of the Attorney General's 1995 procedures, coordination concerns surfaced. According to the official, after the FBI contacted OIPR about an investigation that needed to be coordinated with the Criminal Division, OIPR would determine whether and when such coordination should occur. Moreover, according to OIPR and FBI officials, when OIPR did permit coordination to take place, it participated in the meetings to help ensure that the contacts between the agents and the prosecutors did not jeopardize the primary intelligence purpose of the FISA's search and surveillance tools. Thus, OIPR became the gatekeeper for complying with the 1995 procedures. While the 1995 procedures allowed OIPR to participate in consultations between the FBI and the Criminal Division, the procedures did not set out a gatekeeper role for OIPR. Moreover, the Page 20 GAO- 01- 780 FBI Intelligence Investigations procedures permitted the Criminal Division to provide the FBI guidance aimed at preserving its criminal prosecution option. Subsequently, DOJ established working groups in 1996 and again in 1997 to address coordination problems and the issues underlying FBI, OIPR, and Criminal Division concerns. But, they were unsuccessful in resolving the concerns. Remedial actions to address the coordination issues were not taken until, as discussed below, (1) another working group was established in August 1999, specifically to address the coordination of intelligence information among the FBI, OIPR, and the Criminal Division and (2) the Attorney General's Review Team submitted interim recommendations to the Attorney General in October 1999. In January 2000, based on the Attorney General's Review Team's interim recommendations, the coordination working group recommended to the Attorney General additional procedures to address the FBI/ Criminal Division coordination issues. These procedures were designed to stimulate increased communication between the FBI and the Criminal Division for investigations that met the notification criteria contained in the 1995 procedures. In January 2000, the Attorney General approved these procedures. These procedures, in part, required the FBI to provide the Criminal Division copies of certain types of foreign counterintelligence case summary memorandums involving U. S. persons. In addition, the procedures established a briefing protocol whereby, monthly, FBI National Security Division and Counterterrorism Division officials judgmentally were to select cases that they believed to be their most critical and brief the Principal Associate Deputy Attorney General and the OIPR Counsel on them. These officials together formed what DOJ officials termed a 'core group.' During these 'core group critical- case briefings,' Criminal Division officials were to be briefed on those cases that the core group agreed met the criteria established in the 1995 procedures for Criminal Division notification. According to FBI officials, one criterion used to decide which cases to include in the critical- case briefings was whether a suspected felony violation was involved. 23 The briefing protocol also established procedures for subsequent briefings of pertinent Criminal Division section chiefs and allowed for the Criminal Division to follow up with the FBI in those critical cases that the Division believed it needed 23 According to DOJ officials, because of the large volume of foreign counterintelligence investigations, not all investigations implicating a criminal violation were presented. DOJ Promulgated Additional Procedures to Address Some Coordination Problems Page 21 GAO- 01- 780 FBI Intelligence Investigations more information. According to OIPR and Criminal Division officials, OIPR maintained its gatekeeper role at these briefings. However, in October 2000, core group meetings and the briefing protocol were discontinued. According to DOJ officials, the briefings were discontinued because some participants believed that these briefings somewhat duplicated sensitive- case briefings that the FBI provided quarterly to the Attorney General and Deputy Attorney General. Appendix I provides a chronology of key events related to the coordination issue. Subsequent to its 1999 interim recommendations, the Attorney General's Review Team, in May 2000, issued its final report to the Attorney General. In its report, the Review Team raised additional coordination issues and provided recommendations to resolve them. To address these issues and recommendations, the coordination working group developed a decision memorandum in October 2000, for the Attorney General's approval. According to working group officials, the memorandum recommended revisions to the 1995 procedures and included decision options for consideration for the issues on which the working group could not reach agreement, including an option advocated by the Office of the Deputy Attorney General. The primary issue on which the coordination working group could not agree reflects differences of opinion among the Criminal Division, OIPR, and the FBI as to what advice the Division may provide the FBI without jeopardizing either the intelligence investigation or any resulting criminal prosecution. This issue reflects the same underlying concern- judicially acceptable contacts and information sharing between the FBI and the Criminal Division- that affected proper implementation of the 1995 procedures and earlier disagreements over coordination in foreign counterintelligence FISA investigations. As of the completion of our review, no decision on the memorandum had been made. Thus, issues addressed in the memorandum remain. These include the advice issue and varying interpretations of whether certain criminal violations are considered 'significant violations' that would trigger the Attorney General's coordination procedures, as well as other issues. Another issue identified that could impede coordination, but was not addressed in the memorandum, is the adequacy and timeliness of the FBI's case summary memorandums. DOJ Has Taken Additional Action to Address Coordination, but Some Impediments Remain Page 22 GAO- 01- 780 FBI Intelligence Investigations In May 2000, the Attorney General's Review Team sent to the Attorney General its final report on and recommendations to address problems identified during its review of the FBI's investigation of possible espionage at the Los Alamos National Laboratory. To address those problems dealing with coordination between the FBI and the Criminal Division, the established coordination working group, which was led by the Principal Associate Deputy Attorney General and included representatives from FBI, OIPR, and the Criminal Division, was given responsibility to review the report and the Review Team's recommendations. In addition to the Review Team's report, the coordination working group considered intelligence coordination issues raised in the DOJ Office of Inspector General's report on DOJ's campaign finance investigation. On the basis of its deliberations, the coordination working group developed a decision memorandum and sent it to the Attorney General for approval in October 2000. According to working group officials, the group was able to reach consensus on most issues. For example, these officials said that the group had agreed to recommend that for clarity the reference to the phrase 'significant federal crime' in the 1995 procedures be changed to 'federal felony,' since they believed that the term 'significant' was too ambiguous and that the term 'felony' would be open to less interpretation as the particular elements comprising any particular felony violation are set out in statute. The working group officials told us that on issues on which the group could not reach consensus, the memorandum presented options, including an option advocated by the Office of the Deputy Attorney General. Specifically, working group officials indicated that the group could not reach a consensus regarding the permissible advice the Criminal Division should be allowed to provide to intelligence investigators. Although the working group agreed that the Criminal Division should play an active role in foreign counterintelligence investigations employing FISA tools, it could not agree on the type of advice the Criminal Division should be allowed to provide. For example, OIPR officials indicated that they believed that the FISA Court held a restrictive view on the issue of notification and advice and that this view would affect the FISA Court's decisions to authorize a FISA surveillance or search. 24 In contrast, a working group official said that the Criminal Division and Attorney General's Review Team held less restrictive views on the notification and advice issues. Criminal Division 24 OIPR officials believe that the direction of the FISA Court may be gleaned from the orders that it issues when it grants a FISA surveillance or search. Working Group Continued Efforts to Address Foreign Counterintelligence Coordination Issues Page 23 GAO- 01- 780 FBI Intelligence Investigations officials said that FISA did not prohibit contact between investigators and prosecutors. They said that it was inconceivable that the Division should be left in the dark in these cases, which they characterized as being of extraordinary importance. They argued that in these cases effective coordination was important to develop the best case possible to bring to prosecution. In its report, the Attorney General's Review Team asserted that there should be little restriction on the advice the Criminal Division should be allowed to provide. The working group left the matter for the Attorney General to decide. After the Attorney General took no action on the memorandum between October and December 2000, the working group again reviewed their positions for possible areas of consensus and made minor changes to the memorandum, which they resubmitted to the Attorney General in December. Since the basic positions of the working group participants did not change materially, the outstanding issues remained areas of disagreement. The Attorney General did not make a decision on the recommendations before leaving office on January 20, 2001. In March 2001, the decision memorandum was sent to the Acting Deputy Attorney General for the Attorney General's decision. On the basis of the Acting Deputy Attorney General's review, a new core group process was implemented. As of the completion of our review, no other action had been taken on the memorandum or the recommendations therein. Despite reported improvements in coordination between intelligence investigators and criminal prosecutors, in part, as a result of the implementation of the January 2000 procedures, several of the same coordination impediments remain. Some of these impediments stemmed from the longstanding differences of opinion regarding possible adverse judicial interpretations of what might be acceptable contacts and information sharing between the FBI and the Criminal Division. Also, Criminal Division officials expressed some concerns regarding the case summary memorandums provided by the FBI. Despite the efforts of the coordination working group, differences of opinion remained regarding the possible consequences of potential adverse judicial interpretation of the notification of the Criminal Division and the type of advice it may provide without crossing the line between an intelligence investigation and a criminal investigation. Furthermore, since the Attorney General had not approved the memorandum, the working group's recommendation to clarify language in the 1995 procedures that Some Impediments to Coordination Remain Differing Opinions on the Requirements and Prohibitions of the Attorney General's Coordination Procedures Persist Page 24 GAO- 01- 780 FBI Intelligence Investigations trigger the Criminal Division's notification was not implemented and, therefore, that issue remains. OIPR, FBI, and Criminal Division officials have continued to strongly differ in their interpretation as to when the Criminal Division should be notified of FBI intelligence investigations involving suspected significant federal crimes, and what type of advice the Criminal Division is permitted to provide FBI intelligence investigators without compromising the primary purpose of the intelligence surveillance or search (i. e., risk losing a FISA application or renewal, or future FISA request). Specifically, the issue revolved around the officials' different perceptions of how restrictively the FISA Court might interpret Criminal Division notification or any subsequent advice the Division may provide. Working group officials indicated that the pertinent parties continued to disagree on procedural issues, such as the type of the advice that the Criminal Division should be allowed to give. For example, a working group official suggested that numerous categories of the types of advice the Criminal Division can provide could be created. However, such distinctions made it difficult to determine what advice under which circumstances could be provided without risking the loss of FISA authority. According to working group officials, these differences were left unresolved in the December 2000 decision memorandum. In addition, the language indicating when the Criminal Division is to be notified remained an issue. Although the working group's December 2000 memorandum recommended clarifying the language in the 1995 memorandum which triggered the Criminal Division's notification by changing the term 'significant federal crime' to 'federal felony,' the significant federal crime language remains in effect without the Attorney General's approval. OIPR officials said that the coordination workinggroup members had agreed to the proposed change in language in order to make it clearer when the Criminal Division was to be notified. Although the working group members agreed, our interviews with some FBI officials, responsible for recommending that the Criminal Division be notified, indicated that they continued to use the significant threshold and that there were still disagreements as to its meaning. For example, FBI Counterterrorism Division officials told us that there still were disagreements over what constituted significant, and, therefore, differences of opinion as to when the Criminal Division should be notified. The officials said that these differences might have to be resolved at the highest levels of DOJ and the FBI. These FBI officials remained cautious regarding contacts between FBI intelligence investigators and the Criminal Division, preferring a higher threshold. Although addressed in the working Page 25 GAO- 01- 780 FBI Intelligence Investigations group's memorandum, this issue remains pending action by the Attorney General. According to Criminal Division officials, while the 2000 procedures had increased intelligence coordination, questions and concerns remained regarding the adequacy of FBI case summary memorandums for the Criminal Division's purposes and the timeliness of the memorandums. Criminal Division officials said that they had questions as to whether some FBI case summary memorandums were sufficiently comprehensive to indicate criminal violations. They said that while it is relatively easy to discern from some FBI case summary memorandums whether criminal violations have been committed, in others it is not. OIPR officials also noted that FBI case summary memorandums were not always clear from the way they were written as to whether intelligence investigators had reason to believe that the criteria established by the Attorney General's 1995 guidelines for notification had been triggered. According to the Criminal Division and OIPR officials, the case summary memorandum format does not require agents to address whether or not a possible criminal violation was implicated or contain a specific section for doing so. Criminal Division officials also asserted that for their purposes the case summary memorandums were not always timely. Criminal Division officials indicated that there could be a significant time lag between the time when a significant criminal violation was revealed or investigative actions in a case occurred and when the memorandums were provided to the Division. They added that the timeliness of the memorandums could be a problem, because events can often overtake an investigation. For example, the officials said that should an investigative target be planning to go overseas, the Criminal Division would like to have information in a timely manner so that it can assess its prosecutorial equities against the risk that the target may flee the country. Division officials said that the Division only receives the initial memorandums within 90 days after the investigation had been opened and, subsequently, annually thereafter. Thus, the memorandums the Criminal Division receives may not be timely enough to protect its prosecutorial equities in a case. No matter what impediments remain, the question exists as to how and how often has the lack of timely coordination adversely affected DOJ prosecutions. In its report on the FBI's handling of the Los Alamos National Laboratory investigation, the Attorney General's Review Team The Criminal Division Has Concerns About the Adequacy and Timeliness of the Case Summary Memorandums Page 26 GAO- 01- 780 FBI Intelligence Investigations found that, by not coordinating with the Criminal Division at an earlier point, the FBI's intelligence investigation might have been harmed and that had the Criminal Division been allowed to provide advice it could have helped the FBI to better develop its case. Since the 1995 guidelines were implemented, for those intelligence investigations of which they were aware, Criminal Division officials were able to identify one other case in which the prosecution may have been impaired by poor and untimely coordination. Regardless of the number of prosecutions that may have been adversely affected by poor or untimely coordination, Division officials argued that due to the significance of these types of cases, it was important that the strongest cases be developed and brought forward for prosecution. The officials said that the practical effect of not being involved during an investigation is that the Criminal Division was not aware of interviews conducted or approaches made, such as certain types of undercover operations, that could have helped make sure the prosecutorial equities were preserved or enhanced. Moreover, commenting on the adverse effects of being informed about investigations at the last minute, the officials said that it takes time to prepare cases for prosecution. They indicated that being informed of an investigation at the last minute could be problematic because it takes more than 2 or 3 days to prepare search warrants or obtain orders to freeze assets. In addition to the impediments noted above, Criminal Division officials continued to question whether all investigations that met the criteria of the 1995 procedures were being coordinated. Such concerns indicate that an oversight mechanism to help ensure compliance with the Attorney General's 1995 coordination procedures was lacking. Office of the Deputy Attorney General and FBI officials acknowledged that, historically, no mechanisms had been created to specifically ensure compliance with the Attorney General's 1995 procedures. Recently, two mechanisms have been created to help ensure Criminal Division notification. However, both mechanisms lacked written policies or procedures to institutionalize them and help ensure their perpetuation. Criminal Division officials said that while they knew which investigations were being coordinated, they did not know whether any existed about which they were not being notified. Furthermore, Division officials said they were still concerned that the FBI and OIPR might not notify the Division or provide the Division with the information in sufficient time for Mechanisms Created to Ensure Compliance With the Procedures Have Not Been Institutionalized Criminal Division's Concerns Indicate That an Oversight Mechanism Was Lacking Page 27 GAO- 01- 780 FBI Intelligence Investigations it to provide appropriate advice to the investigation or protect its prosecutorial equities in the case. Division officials also questioned whether foreign counterintelligence investigations involving possible federal criminal violations were being closed without the Criminal Division being notified and, thereby, potentially affecting the Division's ability to exercise its prosecutorial equities in those cases. These concerns indicate that an oversight mechanism to ensure compliance with the Attorney General's coordination procedures was lacking. Historically, DOJ had not developed oversight mechanisms specifically targeted at ensuring compliance with the 1995 requirements for notification. DOJ officials noted that ordinarily, DOJ expects components to comply with the Attorney General's directives. According to the former Principal Associate Deputy Attorney General, no mechanism existed to provide systematic oversight of compliance with the notification procedures. Other than its normal oversight of investigations, such as periodic supervisory case reviews and reviews of FISA applications, the FBI did not have a specific or independent oversight mechanism that routinely checked whether FBI investigations complied with the 1995 procedures. FBI Inspection Division officials said that every 3 years the Inspection Division is to review the administration and operation of FBI headquarters and field offices, including whether or not policies and guidelines were being followed. The officials said that in the course of field offices inspections, certain aspects of investigations employing FISA surveillance or searches are reviewed, including whether the applications were properly prepared and accurately supported and whether there were appropriate field office administrative checks of the process. However, the Inspection officials said that, where such investigations had detected possible criminal violations, compliance with the Attorney General's coordination procedures was not an issue that Inspection reviewed. Thus, the FBI had no assurance that foreign counterintelligence investigations that met the criteria for notification established by the 1995 procedures were being coordinated with the Criminal Division. Since mid- 2000, two new mechanisms have been created to help better ensure that FBI foreign counterintelligence investigations meeting the Attorney General's requirements for notification are coordinated with the Criminal Division. First, in mid- 2000, OIPR implemented a practice aimed at identifying from FBI submitted investigation summaries those DOJ Lacked Oversight Mechanisms to Ensure Compliance With Notification Requirement Recently Created Mechanisms Should Help Better Ensure Notification Page 28 GAO- 01- 780 FBI Intelligence Investigations investigations that met the notification criteria established in the 1995 procedures. Then, in April 2001, DOJ reconstituted the core group and gave it a broader role in overseeing coordination issues and in better ensuring Criminal Division notification. However, these mechanisms have not been institutionalized in writing and, thus, their perpetuation is not ensured. Federal internal control standards require that internal controls be documented. 25 OIPR officials said that, based in part on the Attorney General's Review Team's findings and to ensure greater compliance with the 1995 procedures, OIPR managers began emphasizing at weekly meetings with OIPR attorneys, and in a February 2001 e- mail reminder to them, the importance of coordinating relevant intelligence investigations with the Criminal Division. According to OIPR officials, OIPR attorneys were instructed that when they reviewed FBI FISA applications, case summary memorandums, or other FBI communications, they were to be mindful of OIPR's obligation to identify and report to the Criminal Division FBI investigations involving appropriate potential violations. When the OIPR attorneys identify FBI investigations in which there is evidence of violations that meet the criteria established in the 1995 guidelines, they are to notify OIPR management. Management then is to contact both the FBI and the Criminal Division to alert them that in OIPR's opinion, the notification requirement had been triggered. Then, whenever the FBI and the Criminal Division meet to coordinate the intelligence investigation, OIPR attends to help ensure that the primary purpose of the surveillance or search is not violated. OIPR officials believed that its practice has been working well. In commenting on improved coordination, both the Criminal Division Deputy Assistant Attorney General responsible for intelligence matters and the Chief of the FBI's International Terrorism Section noted instances where OIPR had contacted them to alert them to investigations that met the criteria established by the Attorney General's coordination procedures. As of April 2001, the Criminal Division Deputy Assistant Attorney General estimated that since OIPR had initiated its practice, it had contacted the Division about approximately a dozen FBI investigations that OIPR believed met the Attorney General's requirements for notification. 25 Standards for Internal Control in the Federal Government (GAO/ AIMD- 00- 21. 3. 1, Nov. 1999). OIPR's Practice Identified FBI Investigations Meeting the Attorney General's Notification Requirements Page 29 GAO- 01- 780 FBI Intelligence Investigations In April 2001, the acting Deputy Attorney General decided to reconstitute the core group and to give it a broader role for overseeing coordination issues. The core group, similar to the prior core group, is comprised of several officials from the Office of Deputy Attorney General, an official representing the Office of Intelligence Policy and Review, and the Assistant Directors of the FBI's National Security and Counterterrorism Divisions. Whereas the previous core group's role was to decide which of the FBI's most critical cases met the requirements of the Attorney General's coordination procedures and needed to be coordinated with the Criminal Division, the new core group's role is broader. According to an Associate Deputy Attorney General and core group member, the new group is to be responsible for deciding whether particular FBI investigations meet the requirements of the coordination procedures and to identify for the Attorney General's attention any cases involving extraordinary situations where compliance with the guidelines requires the Attorney General's consideration. According to the Associate Deputy Attorney General, the FBI is to bring to the core group's attention any investigation in which it is not clear that the Attorney General's procedures have been triggered. For example, during an FBI investigation should it not be clear whether a criminal violation should be considered a significant federal crime, as indicated in the procedures, the FBI is to bring the matter to the core group for resolution. Thus, this is a much broader scope of responsibility than the prior core group's which only considered the need for coordination in those critical cases that were judgmentally selected by the FBI. Furthermore, the core group also is to be responsible for identifying for the Attorney General's attention those extraordinary situations where the FBI believes there may be good reason not to notify the Criminal Division. For extraordinary situations, the Associate Deputy Attorney General opined that it was expected that the number of such questions brought to the core group would be extremely few. While both mechanisms, if implemented properly, should help to ensure notification of the Criminal Division, neither mechanism has been written into policies or procedures. OIPR's Counsel pointed out that while OIPR would try to ensure better coordination by employing this practice, it was not a part of OIPR's mission. OIPR's priority was to make sure that the FBI had what it needed to protect national security. She added that ensuring coordination could not be a priority for OIPR without additional attorney resources. OIPR's Counsel further said that OIPR frequently has had its hands full trying to process requests for FISA surveillance and searches Reconstituted Core Group to Provide Broader Oversight to Coordination Issues Mechanisms Have Not Been Institutionalized Page 30 GAO- 01- 780 FBI Intelligence Investigations without having to worry about the criminal implications of those cases. She noted that over the last few years, the FBI has received a significant number of additional agent resources and had increased its efforts to combat terrorism, espionage, and foreign intelligence gathering. As a result, FISA requests had increased significantly, while OIPR resources needed to process those requests had not kept apace. 26 While the practice may be working well to date, the practice has not been put into writing and, thus, has not been institutionalized. On the basis of our conversations with OIPR, the Criminal Division, and FBI officials, the extent to which OIPR has allowed coordination and advice to occur, currently and in the past, has varied depending upon the views and convictions of the Counsel responsible for OIPR at the time. As OIPR's coordination practices have varied over the years, the perpetuation of the current practice could depend on future Counsels' views on the coordination issue and, more importantly, how restrictively they believe the FISA Court views coordination with the Criminal Division. Likewise, the core group has not been institutionalized. Although at the time of our review it had met on two occasions since its creation, according to the Associate Deputy Attorney General there has been no written documentation establishing the core group or defining its role and responsibilities. Federal internal control standards require that internal controls need to be clearly documented. Furthermore, these standards require that such documentation appear in management directives, administrative policies, or operating manuals. Differing interpretations within DOJ of adverse consequences that might result from following the Attorney General's 1995 coordination procedures for counterintelligence investigations involving FISA surveillance and searches have inhibited the achievement of one of the procedures' intended purpose- to ensure that DOJ's criminal and counterintelligence functions were properly coordinated. These interpretations resulted in less coordination. Additional procedures implemented in January 2000, 26 The Conference Report related to DOJ's appropriation for fiscal year 2001, includes additional resources for OIPR with respect to FISA applications (H. R. Conf. Rep. 106- 1005, at 195 (2000)). According to OIPR officials, these resources were, in part, for additional attorneys; however, as of April 1, 2001, those resources had not as yet come on board. According to OIPR officials, as a result, its attorney resources should double by the end of the year. Conclusions Page 31 GAO- 01- 780 FBI Intelligence Investigations requiring the sharing of certain FBI investigative case summaries, creating a core group, and instituting the core group critical- case briefing protocol helped to improve the situation by making the Criminal Division aware of more intelligence investigations with possible criminal implications. Subsequently, the core group and the critical- case briefing protocol were discontinued. However, in April 2001, a revised core group was created with a broader coordination role. It is too early to tell how effective a mechanism the new core group process will be for overseeing the requirement for notification. Nevertheless, other impediments remain. The differing interpretations comprise the main impediment to coordination. Intelligence investigators fear that the FISA Court or another federal court could find that the Criminal Division's advice to the investigators altered the primary intelligence purpose of the FISA surveillance or search. Such a finding could lead to adverse consequences for the intelligence investigation or the criminal prosecution. As such cases involve highly sensitive national security issues, this is no small matter and caution is warranted. However, this longstanding issue has been reviewed at high- levels within DOJ on multiple occasions and Criminal Division officials believe the concerns, while well intentioned, are overly cautious given the procedural safeguards FISA provides. While the problems underlying the lack of coordination have been identified, the solutions to these problems are complex and involve risk. These solutions require balancing legitimate but competing national security and law enforcement interests. On the one hand, some risk and uncertainty will likely remain regarding how the FISA Court or another federal court might upon review interpret the primary purpose of a particular surveillance or search in light of notification of the Criminal Division and the subsequent advice it provided. On the other hand, by not ensuring timely coordination on these cases, DOJ may place at risk the government's ability to bring the strongest possible criminal prosecution. Therefore, a decision is needed to balance and resolve these conflicting national security and law enforcement positions. Beyond resolving these differences, DOJ and the FBI can take several actions to better ensure that possible criminal violations are identified and reported and that mechanisms to ensure compliance with the notification requirements of Attorney General's 1995 procedures are institutionalized. Such actions could facilitate the coordination of DOJ's counterintelligence and prosecutorial functions. Page 32 GAO- 01- 780 FBI Intelligence Investigations To facilitate better coordination of FBI foreign counterintelligence investigations meeting the Attorney General's coordination criteria, we recommend the Attorney General establish a policy and guidance clarifying his expectations regarding the FBI's notification of the Criminal Division and types of advice that the Division should be allowed to provide the FBI in foreign counterintelligence investigations in which FISA tools are being used or their use anticipated. Further, to improve coordination between the FBI and the Criminal Division by ensuring that investigations that indicate a criminal violation are clearly identified and by institutionalizing mechanisms to ensure greater coordination, we recommend that the Attorney General take the following actions: 1. Direct that all FBI memorandums sent to OIPR summarizing investigations or seeking FISA renewals contain a section devoted explicitly to identifying any possible federal criminal violation meeting the Attorney General's coordination criteria, and that those memorandums of investigations meeting the criteria for Criminal Division notification be timely coordinated with the Division. 2. Direct the FBI Inspection Division, during its periodic inspections of foreign counterintelligence investigations at field offices, to review compliance with the requirement for case summary memorandums sent OIPR to specifically address the identification of possible criminal violations. Moreover, where field office case summary memorandums identified reportable instances of possible federal crimes, the Inspection Division should assess whether the appropriate headquarters unit properly coordinated with the Criminal Division those foreign counterintelligence investigations. 3. Issue written policies and procedures establishing the roles and responsibilities of OIPR and the core group as mechanisms for ensuring compliance with the Attorney General's coordination procedures. In written comments on a draft of this report, the Acting Assistant Attorney General for Administration responding for Justice responded that on two of our recommendations, the Department has taken full or partial action. Concerning our recommendation to institutionalize OIPR's role and responsibilities for ensuring compliance with the Attorney General's coordination procedures, the Acting Counsel for Intelligence Policy on Recommendations for Executive Action Agency Comments and Our Evaluation Page 33 GAO- 01- 780 FBI Intelligence Investigations June 12, 2001, issued a memorandum to all OIPR staff. That memorandum formally articulated OIPR's policy of notifying the FBI and the Criminal Division whenever OIPR attorneys identify foreign counterintelligence investigations that meet the requirements established by the Attorney General for coordination. We believe this policy should help perpetuate OIPR's mechanism for ensuring compliance with the 1995 coordination procedures beyond any changes in OIPR management. Moreover, establishing a written policy places the Department in compliance with the documentation standard delineated in our 'Standards for Internal Control in the Federal Government.' Concerning our recommendation regarding the FBI's Inspection Division, the Deputy Attorney General directed the FBI to expand the scope of its periodic inspections in accord with our recommendation or explain why it is not practical to do so and, if not, to suggest alternatives. While this is a step in the right direction, full implementation of the recommendation will depend on whether the FBI can expand the scope of its inspections, or develop acceptable alternatives, to address coordination of foreign intelligence investigations where federal criminal violations are implicated. This, in turn, will depend on the extent to which the FBI case summary memorandums seeking FISA renewals, or whatever medium is subsequently used to accomplish that purpose, contains a separate section indicating possible federal criminal violations. Concerning our recommendation that the Attorney General establish a policy and guidance clarifying his expectations regarding the FBI's notification of the Criminal Division and the types of advice the Division should be allowed to provide, DOJ, citing the sensitivity and difficulty of the issue, said that the Attorney General continues to review the possibility of amending the July 1995 coordination procedures. Our report recognizes the complexity of the issue and DOJ's concerns about the uncertainties that any change in the procedures will create on how the courts may view such changes in their rulings. Nevertheless, as we pointed out, this issue has been longstanding and the concerns that it has generated by some officials has inhibited the achievement of one of the intended purposes of the procedures, that is, to ensure that DOJ's criminal and counterintelligence functions were properly coordinated. Because such coordination can be critical to the successful achievement of both counterintelligence investigations and criminal prosecutions, the issue needs to be resolved as soon as possible. We remain concerned that delays in resolving these issues could have serious adverse effects on critical cases involving national security issues. Page 34 GAO- 01- 780 FBI Intelligence Investigations Concerning our two remaining recommendations-( 1) that all FBI memorandums sent to OIPR summarizing investigations seeking FISA renewals contain a section specifically devoted to identifying federal criminal violations and (2) that the Attorney General institutionalize the role of the Core Group-- DOJ said that they were being reviewed, but offered no timeframe for their resolution. With respect to other points raised in Justice's comments, we have incorporated in our report, where appropriate, the Department's technical comments concerning our discussion of the primary purpose test and the courts' views on it. Regarding the Department's point that it is probably more accurate to divide the concept of coordination into an informationsharing component and an advice- giving component, we believe our report adequately differentiates between the two concepts and that we accurately report that the issue concerning the type of advice the Criminal Division can provide has been the primary stumbling block to better coordination. Thus, we made no change regarding this matter. Moreover, while the Department wrote that all relevant Department components agree that information sharing is usually appropriate for all felonies, we found and our report notes that the timing of the information sharing has been an issue. Furthermore, notifications tended to occur near the end of the investigation, with the Criminal Division playing little or no role in decisions that could effect the success of potential subsequent prosecutions. Even with the later procedural changes to coordination, the Criminal Division still had concerns about the timeliness issue. In this regard, the actions DOJ said it has taken in response to our report and our recommendation concerning FBI case summary memorandums, if implemented, should help improve coordination timeliness. As agreed with your office, unless you publicly release its contents earlier, we plan no further distribution of this report until 30 days from its issue date. At that time, we will provide copies of this report to the Chairman of the Committee on Governmental Affairs; the Chairmen and Ranking Minority Members of the Committee on the Judiciary and the Select Committee on Intelligence, United States Senate; the Chairmen and Ranking Minority Members of the Committee on Government Reform, the Committee on the Judiciary, and the Permanent Select Committee on Intelligence, House of Representatives; the Attorney General; the Acting Director of the Federal Bureau of Investigation; and the Director of the Office of Management and Budget. We will also make copies available to others on request. Page 35 GAO- 01- 780 FBI Intelligence Investigations If you should have any questions about this report, please call Daniel C. Harris or me on (202) 512- 8777. Key contributors to this report were Robert P. Glick, Barbara A. Stolz, Jose M. Pena III, and Geoffrey R. Hamilton. Sincerely yours, Richard M. Stana Director, Justice Issues Appendix I: Chronology of Key Events Relating to FBI/ DOJ Coordination Page 36 GAO- 01- 780 FBI Intelligence Investigations The following table shows key events relating to coordination of FBI foreign counterintelligence investigations with the Criminal Division. Table 1: Key Events Relating to FBI/ DOJ Coordination Date Event 1978 Foreign Intelligence Surveillance Act (FISA) is enacted. 1980 U. S. Court of Appeals for the 4th Circuit sustains the application of the 'primary purpose' test in U. S. vs. Truong Dinh Hung. Facts in the case were developed prior to FISA's enactment. 1994 FISA is amended to include physical search authority. July 1995 Attorney General's coordination procedures are promulgated. 1996 DOJ working group created to address coordination issues and concerns. The working group was unable to resolve the issues and concerns. 1997 Second working group created to address continuing coordination issues and concerns. The group also was unable to resolve them. 1999 Third coordination working group is established. January 2000 Attorney General issues additional coordination procedures, which establish a 'core group' and critical- case briefing protocol and require the sharing of certain case summary memorandums. Mid- 2000 Office of Intelligence Policy and Review implements a mechanism intended to help ensure that the FBI notifies the Criminal Division of cases meeting the criteria for notification. October 2000 Coordination working group drafts memorandum recommending to the Attorney General revisions to the July 1995 coordination procedures. The memorandum, with minimal revisions, was resubmitted in December 2000. October 2000 The core group and critical- case briefing protocol are discontinued. April 2001 The core group is reconstituted with expanded responsibilities. Source: GAO analysis based on legal documents and DOJ documents and interviews. Appendix I: Chronology of Key Events Relating to FBI/ DOJ Coordination Appendix II: Comments From the Department of Justice Page 37 GAO- 01- 780 FBI Intelligence Investigations Appendix II: Comments From the Department of Justice Note: GAO comments supplementing those in the report text appear at the end of this appendix. See comment 1. See comment 1. Appendix II: Comments From the Department of Justice Page 38 GAO- 01- 780 FBI Intelligence Investigations See comment 1. See comment 1. Appendix II: Comments From the Department of Justice Page 39 GAO- 01- 780 FBI Intelligence Investigations See comment 1. See comment 1. Appendix II: Comments From the Department of Justice Page 40 GAO- 01- 780 FBI Intelligence Investigations Now on p. 30. See comment 4. See comment 3. See comment 2. Appendix II: Comments From the Department of Justice Page 41 GAO- 01- 780 FBI Intelligence Investigations See comment 5. See comment 4. Appendix II: Comments From the Department of Justice Page 42 GAO- 01- 780 FBI Intelligence Investigations Appendix II: Comments From the Department of Justice Page 43 GAO- 01- 780 FBI Intelligence Investigations The following are GAO's comments on the Department of Justice's letter dated June 21, 2001. 1. See 'Agency Comments and Our Evaluation' section. 2. DOJ suggested in its comments that we address the question of whether or not the 1995 coordination procedures were being applied correctly. As we noted in the scope and methodology section of this report, as agreed with the requester of the report, we did not review specific cases to try to identify instances of compliance or noncompliance with the coordination procedures. 3. DOJ also suggested in its comments that we address whether and how the coordination procedures ought to be changed. Given that since 1995, this issue has been studied by three high- level DOJ working groups and the Attorney General's Review Team and because of the concerns expressed by some DOJ officials in our report, we believe that DOJ is in the best position to address any changes to its procedures. 4. The Department suggested that we emphasize to a greater extent throughout our report the sensitivity and complexity of the issues. In addition, it provided additional language for the report to reflect the issues' sensitivity and complexity. We agree that the issues discussed are sensitive and complex, however, we believe the report adequately conveys these points and, thus, we did not revise our report to address the Department's suggestion. 5. DOJ suggested a factual correction to recognize that two decision memorandums were submitted to the Attorney General; one in October 2000, and a second in December 2000. On pages 22 and 23 of our report, we discuss the submission of both memorandums. Concerning DOJ's suggestion that we note the options that these memorandums presented, we did not adopt this suggestion as DOJ had opted not to provide us with the details of its options when we met to discuss the memorandums. GAO Comments (182097) The first copy of each GAO report is free. Additional copies of reports are $2 each. A check or money order should be made out to the Superintendent of Documents. VISA and MasterCard credit cards are also accepted. Orders for 100 or more copies to be mailed to a single address are discounted 25 percent. Orders by mail: U. S. General Accounting Office P. O. Box 37050 Washington, DC 20013 Orders by visiting: Room 1100 700 4 th St., NW (corner of 4 th and G Sts. NW) Washington, DC 20013 Orders by phone: (202) 512- 6000 fax: (202) 512- 6061 TDD (202) 512- 2537 Each day, GAO issues a list of newly available reports and testimony. To receive facsimile copies of the daily list or any list from the past 30 days, please call (202) 512- 6000 using a touchtone phone. A recorded menu will provide information on how to obtain these lists. Orders by Internet For information on how to access GAO reports on the Internet, send an email message with 'info' in the body to: Info@w... or visit GAO's World Wide Web home page at: http://www.gao.gov Contact one:  Web site: http://www.gao.gov/fraudnet/fraudnet.htm  E- mail: fraudnet@g...  1- 800- 424- 5454 (automated answering system) Ordering Information To Report Fraud, Waste, and Abuse in Federal Programs *** End of document. *** -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3553 From: Steve Uhrig Date: Wed Aug 22, 2001 10:12pm Subject: Tektronix 494 I would like to hear from anyone who uses a Tek 494 for TSCM, for me to pick your brain for some tips. I'd also be interested in any accessories anyone has for the 494 they'd like to sell. Tks ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3554 From: Aimee Farr Date: Thu Aug 23, 2001 9:51am Subject: RE: Pennsylvania supreme court says no privacy rights in phone calls The headline is misleading. _Rekasie_ was a participant monitoring case (See ECPA 2511). This case is about the widely-recognized "ratfink exception" in a state that has very strong privacy protections. Footnote 11: "Our decision today is limited to telephonic communication in the context of consensual wire interceptions." Stupid media. ~Aimee 3555 From: Shawn Hughes Date: Thu Aug 23, 2001 9:52am Subject: Re: sweep times At 05:42 8/23/01 , you wrote: >. The check did not take long. A private detective offered to demonstrate >his equipment and within about 30 >minutes established that nobody was listening in to my mostly very boring >conversations. Sweep a tel line in 30 minutes???? I must REALLY suck. Is this what you guys can do a single line sweep in? 3556 From: Miguel Puchol Date: Thu Aug 23, 2001 0:58pm Subject: RE: Re: sweep times Well, in 30' I can just about get the equipment unpacked, checked and turned on....what I think they mean can be done in 30 minutes is your typical PI <-> spy shop gadget tandem "sweep". And I'm surprised it takes them -that- long. Cheers, Mike > -----Mensaje original----- > De: Shawn Hughes [mailto:srh@e...] > Enviado el: jueves, 23 de agosto de 2001 16:52 > Para: TSCM-L@yahoogroups.com > Asunto: [TSCM-L] Re: sweep times > > > At 05:42 8/23/01 , you wrote: > >. The check did not take long. A private detective offered to > demonstrate > >his equipment and within about 30 > >minutes established that nobody was listening in to my mostly > very boring > >conversations. > > > Sweep a tel line in 30 minutes???? I must REALLY suck. Is this what you > guys can do a single line sweep in? > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3557 From: Agent Lovato Date: Thu Aug 23, 2001 0:55am Subject: wEB BUGS 4 Those of U that wanted a way to detect web+bugs... http://www.bugnosis.org/ Unthinking respect for authority is the greatest enemy of truth Agent_Lovato --------------------------------- Do You Yahoo!? Make international calls for as low as $0.04/minute with Yahoo! Messenger. [Non-text portions of this message have been removed] 3558 From: James M. Atkinson Date: Thu Aug 23, 2001 2:18pm Subject: RE: Re: sweep times Heck.... I unload the truck, unpack the transit cases, plug all my gear into my UPS, apply power, and then let everything warm up for a least 30 minutes before I take even the first measurement. While I am waiting for the equipment to warm up I perform a check for "Hot Spots" and then perform a very basic physical search (the big physical search is done later). Once the equipment is up to temperature, I connect up the antennas, and initiate a computer controlled (totally passive) sweep of the spectrum. In my experience most "PI Rain Dances" last only 5-10 minutes per room, and normally take 30-45 for the entire sweep (at least the magic box part of it). In my opinion the slower and more methodical the sweep the greater likelihood of success in actually ferreting out the spy (without the spy clueing in to what we are doing). -jma At 7:58 PM +0200 8/23/01, Miguel Puchol wrote: >Well, in 30' I can just about get the equipment unpacked, checked and turned >on....what I think they mean can be done in 30 minutes is your typical PI ><-> spy shop gadget tandem "sweep". And I'm surprised it takes them -that- >long. > >Cheers, > >Mike -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3559 From: Charles P Date: Thu Aug 23, 2001 7:49pm Subject: Re: Re: sweep times Of course, there are those few potential clients who call, and after about 10 minutes of talking with them, you can be pretty sure that taps and bugs are the least of their problems! charles ----- Original Message ----- From: "Shawn Hughes" To: Sent: Thursday, August 23, 2001 10:52 AM Subject: [TSCM-L] Re: sweep times > At 05:42 8/23/01 , you wrote: > >. The check did not take long. A private detective offered to demonstrate > >his equipment and within about 30 > >minutes established that nobody was listening in to my mostly very boring > >conversations. > > > Sweep a tel line in 30 minutes???? I must REALLY suck. Is this what you > guys can do a single line sweep in? > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3560 From: James M. Atkinson Date: Fri Aug 24, 2001 8:59am Subject: Spies in the corner office? from the August 20, 2001 edition - http://www.csmonitor.com/2001/0820/p11s1-wmwo.html Spies in the corner office? By Kelly Hearn | Special to The Christian Science Monitor As rapidly as technology has given talkative humans new ways to connect with one another, it has added to the listening power of the third-party snoop. And these days - if you believe the statistics - nobody is listening in more than employers. Experts say frenzied competition, cheap monitoring technologies, and worries about litigation motivate bosses to look over employees' shoulders. The Privacy Foundation, an advocacy group based in Denver, released a study earlier this year that says about 1 of every 3 Americans who use e-mail or the Internet regularly are being monitored by employers. By the foundation's counting, that's roughly 14 million workers out of the 40 million who regularly go online at work. The American Management Association also released its annual survey of its corporate members: Three-quarters of the responding US firms reported that they record and review "employee communications and activities on the job, including their phone calls, e-mail, Internet connections, and computer files." That figure, says the association, has doubled since its last study, in 1997. Critics of monitoring call the reported rise potentially damaging to worker morale. But studies like the AMA's are often misinterpreted or not fully reported, cautions Carl Botan, a professor of communications at Purdue University. "In the AMA study, those firms questioned tended to be the biggest and most sophisticated 5 to 10 percent of American employers," Professor Botan says, adding that the study did not ask respondents how much they watch or what percentage of their employees they target. "It only asked if they monitored any [employees] at all, and what kinds of methods they used," he says. "A lot of media outlets have misreported the study. AMA is not saying that three-quarters of all employers monitor." Firms accept personal Web use Some corporate managers don't have a problem with personal Internet use at work. According to an April survey of 200 corporate chief information officers by CIO Magazine, most (62 percent) said "personal e-mail and Internet use at work increases employee productivity, because it empowers employees to multitask." Only 17 percent in that study said they conducted even sporadic employee e-mail checks. Sixteen percent didn't monitor employee e-mail at all, and 11 percent reported peeking only at the e-mail of "problem employees." Thirty-eight percent reportedly intervene only after a complaint. To get a clearer picture of what's happening, Botan is asking the National Science Foundation for a grant to conduct "the first ever national probability sampling in the US, to find out just how many people are actually surveilled, and what variations there are by region, industry, age, race, and sex." Experts agree that companies have good reasons to monitor. Worker productivity is often at issue. Personal phone calls and e-mail can eat company time. New technologies - such as downloadable music - offer new distractions. In July, Northwestern University in Evanston, Ill., allegedly fired one of its secretaries for downloading music files on her work computer. She had downloaded some 2,000 files, despite her employer's prohibition against using company resources for personal reasons. As more workers acquire home-based and portable technology, they may rely less on corporate hardware. The need to keep workers from personal Web surfing may also wane on its own. "A decade ago, when Solitaire started coming out on Windows, managers lost a lot of time [to people] playing," says Eric Rolfe Greenberg of the AMA. "But the novelty wore off. The same will happen with people surfing the Internet." In the meantime, the fear of litigation is no small motivator. Companies are eager to ensure that workers aren't exposed to pornographic material, for example, that may appear on a co-worker's screen. Employment attorney Curtis Cotton, of the California-based firm GrayCary, says employers realize that many workplace lawsuits balance on what's been said in e-mail. Call it a virtual paper trail. "Because workers use e-mail for everything, it often winds up being a huge discovery issue," Mr. Cotton says. "When faced with a lawsuit, we might end up getting on someone's hard drive and going back six months." More about high-tech than curiousity From the monitoring side, technology remains a big driver. Computer power is growing, and software for monitoring e-mail and Web behavior is relatively cheap. Experts say much of the boom in workplace surveillance is due to such technological changes more than to rises in corporate curiosity or suspicion. "It's easier and cheaper to engage in surveillance of computers and Internet activity than other kinds of communication," says Lee Tien of the Electronic Frontier Foundation in California. "It is not that easy to review telephone conversations," Mr. Tien says. "In most cases, a person has to listen in real time." Tien's observations are supported by the AMA study: Some 12 percent of employers reported recording and reviewing telephone conversations at least occasionally, and only about 8 percent said they ever reviewed voicemail messages. But 36 percent stored and reviewed computer files, while 47 percent "monitored" e-mail on some level. (Such monitoring can include scanning the message traffic for words that arouse suspicion.) Even so, many firms may run monitoring systems not to scrutinize and catalog employee communication, but to stay technologically current. The flip side of monitoring is preemptive control, the use of blocking software to limit what workers can do online. Workplace civil libertarians argue that such moves impose an employer's value system on workers. Others argue that removing temptation is a simple way to avoid messy problems. What about the law? Do workers hang their privacy rights in the coatroom? "People should be aware companies have these rights in law," says Mr. Greenberg. "Workers have practically no reasonable expectation of privacy in the workplace. We assume we take our constitutional rights of privacy to work with us, and the technology itself gives the illusion of privacy," he says. "But the Constitution protects from what the government can and can't do, not what employers can and can't do." Cotton, the employment lawyer, agrees. "Even if companies fail to put employees on notice that they monitor, it is still legal," he says. A legal swing toward workers That may not be the case for long. Writing last year in the law journal The Green Bag, Judge James M. Rosenbaum of the United States District Court for the District of Minnesota proposed a "cyber statute of limitations" of about six months. His proposal "acknowledges that even the best humans may have a somewhat less than heavenly aspect," and that "anyone is entitled to make a mistake and to think a less than perfect thought." Judge Rosenbaum's article suggests that "a pattern of egregious behavior" might well be worth acting upon. But it also holds that crossing into questionable areas of legal cyberspace probably should not. "This is the stuff which, in less electronic times, would have been wadded up and thrown into a wastebasket," he wrote. "This is what the delete button was meant for." Earlier this month, judges at the Ninth US Circuit Court of Appeals in San Francisco, whose own Web habits were being monitored, instructed staff to shut down the courthouse's surveillance system. They suggested monitoring programs could be illegal under the Electronic Communications Privacy Act of 1986, which prohibits certain interceptions of wire, oral, and electronic communications. Other workers object more on general principles than on legal grounds. In Boston last month, a city councilor objected in the press to the installment of a hidden camera near the entrance to City Council chambers, recording the movements of visitors and officials alike. "I don't think we need that level of scrutiny," he told The Boston Globe. Such a backlash to monitoring may be fueled by overstatements. One expert, for example, was quoted in a national paper as saying the "entire workforce is now under suspicion." Other articles have raised questions about the degree to which even telecommuters, working odd hours in home offices, increasingly face keystroke counts as a measure of their productivity. Accurately gauging the scope of actual monitoring may be impossible, given the varying definitions among firms. Also, reports that appear to refer to all working Americans often fail to remind readers that a great many workers remain electronically untethered to their superiors. Still, "with what's changed in software, we must all realize that surveillance is now simply a part of our lives," says Botan of Purdue. "We are misapplying presumptions of an earlier generation," he says, "presumptions that don't fit in the Information Age." Wonder where your managers stand? Unclear on, or uncomfortable with, the issue of monitoring where you work? (That doesn't mean you're a miscreant, by the way.) Experts suggest these basic steps: Consult your employee handbook. The vast majority of companies that do monitor inform their employees of their policies (not that they are required to). Check for signs. If a website is blocked, for example, there may be reason to believe that someone has seen you try to get access to it. (Some sites also leave "cookies," which are stored on your computer's hard drive, itself the company's property.) Don't fight back by installing spy-detection software. Andrew Schulman of The Privacy Foundation says such systems aren't usable at work. Company monitoring systems are network-based, he says, "and don't leave footprints on employee computers." Stay informed. To track employee firings related to communications monitoring, visit http://www.privacyfoundation.org/workplace/job_loss/index.asp Be direct. If you really want to know, head over to the boss's office. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3561 From: Date: Fri Aug 24, 2001 7:06am Subject: RE: Introduction We just wanted to take a minute and tell the group that we are new members and that our firm, Don C. Haworth & Associates, Inc. has provided electronic counter measures to the Chicagoland area for over 10 years, as well as private investigation services. Please contact us should any of you require assistance. Don C. Haworth, L.P.D., C.F.E., C.I.I. e-mail: falconpi@a... 3562 From: James M. Atkinson Date: Fri Aug 24, 2001 6:16pm Subject: FBI Arrests Ex-Air Force Member for Alleged Spying FBI Arrests Ex-Air Force Member for Alleged Spying Updated: Fri, Aug 24 1:39 PM EDT http://news.excite.com/news/r/010824/13/news-crime-spy-dc WASHINGTON (Reuters) - A former U.S. Air Force serviceman attached to a U.S. agency that operates spy satellites has been arrested on espionage charges, the Justice Department said on Friday. It said Brian P. Regan, who retired from the Air Force in August last year and has since been employed by a government contractor and assigned to the highly secretive National Reconnaissance Office, was arrested as he tried to fly to Europe on Thursday evening. The arrest followed a series of spy incidents that have embarrassed the U.S. government and prompted reforms in the counter-intelligence agencies. Most of these incidents involved passing classified information to Moscow. A statement by the U.S. attorney's office in the Eastern District of Virginia, announcing the Regan case, did not say for whom he was alleged to have been spying. It said Regan, 38, from Bowie, Maryland, would be charged at a federal court in Alexandria, Virginia, on Friday afternoon with conspiracy to commit espionage. He was arrested by the FBI as he was about to take a flight from Dulles Airport outside Washington to Zurich via Frankfurt on Thursday evening. The statement said Regan had access to classified information in his work at the National Reconnaissance Office, an agency based in Northern Virginia which designs, builds and operates spy satellites. It gave no further details about his alleged activities. In one of the most damaging spy cases in U.S. history, FBI counter-intelligence agent Robert Hanssen was arrested earlier this year and admitted to spying for Moscow over a period of 20 years. He was accused of selling secrets related to satellites, early warning systems, defense systems and communications intelligence. His arrest prompted a reevaluation of security within the FBI, including an order for 500 agency employees with access to intelligence information to undergo lie detector tests. In the wake of his arrest, Washington also ordered 50 Russian diplomats withdrawn from the United States and Moscow retaliated by ordering 50 Americans out of Russia. © 2001 Reuters Limited. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3563 From: James M. Atkinson Date: Fri Aug 24, 2001 6:19pm Subject: Feds Charge Retired Airman With Spying Feds Charge Retired Airman With Spying By Karen Gullo Associated Press Writer Friday, Aug. 24, 2001; 4:46 p.m. EDT http://www.washingtonpost.com/wp-srv/aponline/20010824/aponline164627_000.htm ALEXANDRIA, Va. -- A retired decorated Air Force sergeant who worked as a civilian at the super-secret office that builds and operates U.S. spy satellites was charged Friday with conspiracy to commit espionage. Brian P. Regan, 38, appeared in federal court a day after federal authorities took him into custody as he was passing through a security checkpoint to take a Lufthansa flight to Zurich, Switzerland, via Frankfurt, Germany. Prosecutors would not name the country for which Regan allegedly conspired to spy. "Mr. Regan conspired to transmit classified U.S. national defense information to a person or persons he knew was working for a foreign government with the intent to aid that foreign government and bring injury to United States," said U.S. Attorney Kenneth Melson. Regan, a native of Brooklyn, N.Y., had received a number of military honors, including an award for distinguished service involving his work as an intelligence analyst following the Iraqi invasion of Kuwait in 1990. The arrest came not long after federal prosecutors negotiated a plea-bargain deal with Robert Hanssen, who pleaded guilty to several counts of spying over several years for Russia. Melson said he knew of no connection between the Regan and Hanssen cases. Regan, sporting a goatee and dressed in a green, blue and white striped polo shirt and dark green slacks, appeared before U.S. Magistrate Judge Welton Sewell. Regan, who was not handcuffed, was asked whether he had a lawyer. "No, your honor" he replied in a barely audible voice. "Are you in a position to hire counsel?" Sewell asked. "No," Regan replied. The judge advised him he could have a court-appointed lawyer. Prosecutors asked that Regan be held without bond, and a hearing was set for Wednesday. Prosecutors said the maximum sentence for the charges were life in prison or, in certain cases, the death penalty, and a $250,000 fine. According to an affidavit, Regan served in the Air Force from August 1980 until retiring in August 2000. He was trained in cryptanalysis and his responsibilities included administering the Intelink Web site, a classified U.S. government computer system accessible only to certain members of the U.S. intelligence community. Regan's last assignment with the Air Force was at the National Reconnaissance Office, where he had access to top-secret defense information. His access to this information was terminated in August 2000 when he retired from the Air Force, but it was reinstated in July, when he went back to work at NRO as an employee of TRW, a government contractor in Fairfax, Va. The affidavit said Regan was suspected of being the source of a number of classified documents received by an unnamed country. The documents consisted of secret electronic images, a secret CIA intelligence report and a secret document related to a foreign country's satellite capability, among others, the affidavit said. Investigators discovered that Regan, on Thursday, had logged onto Intelink and accessed classified material. He was also seen looking at a secret document on his computer terminal and taking notes in a small notebook, which he put in his front pants pocket, according to the affidavit. Authorities said that on Thursday morning, while Regan was in a meeting at NRO, the FBI searched his Dodge Caravan and found a carryon bag that contained encrypted messages and handwritten addresses and phone numbers for unnamed foreign countries' diplomatic offices in Switzerland and Austria. Regan had told colleagues he was going to Orlando, but the affidavit said he had reservations to fly Thursday to Zurich, Switzerland, through Frankfurt, Germany, with plans to return Thursday. FBI agents stopped Regan at Dulles Airport Thursday night as he was trying to pass through a security checkpoint. When FBI agents questioned him, Regan denied knowing about cryptanalysis and coding, but when showed photos of documents that had been seized from his carryon bag, he said, "This is my stuff." The National Reconnaissance Office is an agency of the Defense Department and is staffed by employees of the Central Intelligence Agency and the Defense Department. The existence of the NRO was an official secret until 1992. The case is being investigated by the FBI's Washington field office foreign intelligence squad. Regan, whose citations also include the Defense Meritorious Service Medal and the Joint Service Achievement Medal, lives in one of about a half-dozen attached townhouses at the end of a quiet street in suburban Bowie, Md. On Friday, an Associated Press reporter knocked on the slightly ajar door to the home, which was quickly closed after a resident looked out the window. Neighbors said the family was quiet and kept to themselves. Several bicycles were seen outside the two-story, red brick home with white trim. A neighbor who refused to be identified said the Regans have lived in the home for eight years and have four children. © Copyright 2001 The Associated Press -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3564 From: James M. Atkinson Date: Fri Aug 24, 2001 11:43pm Subject: FBI Affidavit Tells Spy Case Details FBI Affidavit Tells Spy Case Details http://www.guardian.co.uk/breakingnews/US/0,3560,1128478,00.html Saturday August 25, 2001 2:40 am WASHINGTON (AP) - Nearly a year after he retired from a job at a top-secret Defense Department agency, Brian Regan returned as a civilian, his security access to government secrets documents restored for a civilian job with a government contractor, according to an FBI affidavit. Federal authorities alleged Friday that Regan, a retired Air Force sergeant, used his access and his expertise in encryption to collect an array of sensitive secret documents and conspire to hand them over to a foreign government. A government source, speaking on condition of anonymity, said Libya had received the documents. Regan, 38-year-old father of four from Bowie, Md., was arrested Thursday at Dulles International Airport outside Washington as he prepared to board a German airliner to Switzerland via Germany. He was charged with conspiracy to commit espionage since last fall and ordered held without bail. A 16-page FBI affidavit alleged that Regan was intermittently careless and careful over a period of approximately 10 months, starting last October, when he worked as a government contractor at the National Reconnaissance Office, a supersecret Defense Department agency that designs and builds U.S. spy satellites. These are among the affidavit's allegations: -Regan communicated with his handlers through an e-mail address with a free Internet e-mail provider and used computers with Internet access at public libraries near his home. In one instance, the affidavit said, Regan failed to sign off the library computer, enabling investigators who had him under surveillance to see that a site he had visited contained the address for the diplomatic office of an unnamed country in Switzerland. -Regan made numerous U-turns while driving and pulled over to the side of the road in an apparent effort to see if he was being followed. -Under surveillance, Regan was seen looking at a secret document on his work computer and taking notes on a spiral notebook, which was found in his possession when he was arrested Thursday as he tried to board the Lufthansa jet. -Before he left work Thursday, Regan told a co-worker that he was taking his family on a Disney World vacation in Florida. He even wrote ``Orlando, Florida'' on a bulletin board in his office suite to show where he would be while off. -When Regan was bumped to a later flight Thursday, he went back to his office at NRO for a few hours and later returned to the airport. -Regan had a handheld global positioning system in his carryon bag when he was stopped by the FBI before boarding the flight. The GPS unit can be used to locate a specific site for drop or signal sites, the affidavit said. When confronted by FBI agents at the airport, Regan denied that he knew about cryptology. The agents showed him photos of alphanumeric tables found in his carryon bags. ``This is my stuff,'' he said. ^--- On the Net: National Reconnaissance Office: http://www.nro.gov/ -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3565 From: gkeenan Date: Fri Aug 24, 2001 11:45pm Subject: Fw: TN/LEO - Misc. I received this query from a subscriber to my terrorism list and, sorry to say, I can't answer it. I figure someone on here should have the expertise to one. If anyone can help, please email me directly. If you wish to contact the originator of this query directly please let me know because the subscribers to my list(s) prefer to remain 'low profile' -- they are mostly government agencies, military, NASA locations, NATO, and foreign government/private specialists. Not even the subscribers to my lists know who any of the other subs are so if you'd prefer to contact them directly with the info, please let me know and I'll contact them. Thanks a bunch guys. I'm not a TSCM pro, but I do learn a lot from this list. And I can't tell you how much I appreciate this. But this one I haven't seen before. Can anyone help? Jerry Keenan GPKeenan Co., Int'l Security Services West Islip, NY 11795 > Jerry, > > I need some information. I don't have much to add to your list. I am > trying to protect my chemical plant. I was working on a bomb threat plan > for my plant. I have always heard that radios will set off a bomb. We have > so much radio traffic that the bomb would go off as soon as they get near > the plant. So my question is how close do you have to get to a bomb with a > Motorola HT 1000 transmitting around 150 MHz before it sets off? > 3566 From: Charles P Date: Sat Aug 25, 2001 1:38am Subject: Re: Fw: TN/LEO - Misc. Hi Gerry, Seems to be some misunderstandings in the way his question is worded. Others with more experience in the explosives field might add more. I hope this might shed some light on it (at 2 am I'm not sure I can understand my own writing though). The problem is not that "radios cause bombs to explode". It's kind of like asking: I hear that drunk drivers cause innocent people to have car accidents, how close do you have to get to a drunk driver before you have an accident if you're driving a Mercury Marquis at 55 mph. Simplified answer- it depends; it would most likely be an accident, though. Some devices are designed to be triggered by radio. They normally would have a receiver tuned to a certain frequency, hopefully the intended transmitter would have some kind of encoded signaling to prevent it from falsely triggering. Ideally, you would need to be on that specific frequency with the proper signaling to trigger it. BUT a radio could be sending spurious signals on the bomb receiver's frequency by accident or with enough power to overload the receiver or to overload an electric initiator like a blasting cap. A 4-5 watt HT1000 might cause a problem at 3 feet, but it might also cause a problem at 10 feet or 20 feet away, or it might not cause a problem at all, many factors are involved. You sometimes see signs that say "no radio transmissions, blasting area" because many radios are not made well enough to prevent stray signals from emanating. Especially some truckers with 200 watt amplifiers on their cb's. They've been doing blasting behind my house for a few months now (Rt 87, NY). No one ever came by to ask if I had any radio transmitters, could of had some fun on July 4th. There may be some good recommended standard procedures for radio usage but I haven't seen any. A few web sites I looked at don't say much about radios other than "be careful" (good advice on a bomb search!). I hope someone else may be able to offer something more precise. Charles some sites: http://www.atf.treas.gov/explarson/information/ http://www.lsp.org/hazmat.html http://www.cbdc-ccdb.org/publications/bomb_threat_planning_guide.htm ----- Original Message ----- From: "gkeenan" To: Sent: Saturday, August 25, 2001 12:45 AM Subject: [TSCM-L] Fw: TN/LEO - Misc. > I received this query from a subscriber to my terrorism list and, sorry to > say, I can't answer it. I figure someone on here should have the expertise > to one. > > If anyone can help, please email me directly. If you wish to contact the > originator of this query directly please let me know because the subscribers > to my list(s) prefer to remain 'low profile' -- they are mostly government > agencies, military, NASA locations, NATO, and foreign government/private > specialists. Not even the subscribers to my lists know who any of the other > subs are so if you'd prefer to contact them directly with the info, please > let me know and I'll contact them. > > Thanks a bunch guys. I'm not a TSCM pro, but I do learn a lot from this > list. And I can't tell you how much I appreciate this. But this one I > haven't seen before. > > Can anyone help? > > Jerry Keenan > GPKeenan Co., Int'l Security Services > West Islip, NY 11795 > > > > Jerry, > > > > I need some information. I don't have much to add to your list. I am > > trying to protect my chemical plant. I was working on a bomb threat plan > > for my plant. I have always heard that radios will set off a bomb. We > have > > so much radio traffic that the bomb would go off as soon as they get near > > the plant. So my question is how close do you have to get to a bomb with > a > > Motorola HT 1000 transmitting around 150 MHz before it sets off? > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 3567 From: Miguel Puchol Date: Sat Aug 25, 2001 5:45am Subject: RE: Fw: TN/LEO - Misc. Jerry, Currently, I know that terrorists take good precautions to protect their bombs from RF interference (unless they are dumb) - they drive their bombs very long distances. A few weeks ago a car bomb travelled about 500 miles into Madrid, which is one of the most RF-congested cities in Spain, you have from low-power devices to kilowatt pager transmitters at all sorts of frequencies, and it only went off when they had programmed it to. So, I would assume that they could safely (so-to-speak) park a car bomb near a plant and have it go off when required. They are starting to use more sophisticated detonation methods, such as GSM phones. In any case, here is a link to useful info on RF and electric blasting caps, which are the most vulnerable to this kind of energy. http://www.cagc.ca/s6.html It gives specific info on minimum safety distances between the caps and a transmitter in different bands and using various TX power levels. Also, if you can find them, there are tables by ANSI/IEEE which deal with safety distance in blasting & explosive environments where RF energy is present. I hope it helps, all the best, Mike > -----Mensaje original----- > De: gkeenan [mailto:gkeenan@s...] > Enviado el: s·bado, 25 de agosto de 2001 6:46 > Para: TSCM-L@yahoogroups.com > Asunto: [TSCM-L] Fw: TN/LEO - Misc. > > > I received this query from a subscriber to my terrorism list and, sorry to > say, I can't answer it. I figure someone on here should have the expertise > to one. > > If anyone can help, please email me directly. If you wish to contact the > originator of this query directly please let me know because the > subscribers > to my list(s) prefer to remain 'low profile' -- they are mostly government > agencies, military, NASA locations, NATO, and foreign government/private > specialists. Not even the subscribers to my lists know who any of > the other > subs are so if you'd prefer to contact them directly with the info, please > let me know and I'll contact them. > > Thanks a bunch guys. I'm not a TSCM pro, but I do learn a lot from this > list. And I can't tell you how much I appreciate this. But this one I > haven't seen before. > > Can anyone help? > > Jerry Keenan > GPKeenan Co., Int'l Security Services > West Islip, NY 11795 > > > > Jerry, > > > > I need some information. I don't have much to add to your list. I am > > trying to protect my chemical plant. I was working on a bomb > threat plan > > for my plant. I have always heard that radios will set off a bomb. We > have > > so much radio traffic that the bomb would go off as soon as > they get near > > the plant. So my question is how close do you have to get to a > bomb with > a > > Motorola HT 1000 transmitting around 150 MHz before it sets off? > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3568 From: Jay Coote Date: Sat Aug 25, 2001 11:32am Subject: Re: Re: sweep times That half-hour is what it takes the spy shop expert to locate the ON switch. ---------- Well, in 30' I can just about get the equipment unpacked, checked and turned on....what I think they mean can be done in 30 minutes is your typical PI <-> spy shop gadget tandem "sweep". And I'm surprised it takes them -that- long. Cheers, Mike > -----Mensaje original----- > De: Shawn Hughes [mailto:srh@e...] > Enviado el: jueves, 23 de agosto de 2001 16:52 > Para: TSCM-L@yahoogroups.com > Asunto: [TSCM-L] Re: sweep times > > > At 05:42 8/23/01 , you wrote: > >. The check did not take long. A private detective offered to > demonstrate > >his equipment and within about 30 > >minutes established that nobody was listening in to my mostly > very boring > >conversations. > > > Sweep a tel line in 30 minutes???? I must REALLY suck. Is this what you > guys can do a single line sweep in? > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3569 From: Robert Motzer <1RCM@M...> Date: Sat Aug 25, 2001 0:21pm Subject: Used Piece Wanted Hi List, I'm looking for a used Kaiser 1080-H telephone analyzer. If anyone has a lead on one please contact me off-list at: 1RCM@M... Thanks ... Bob Motzer _________________________________________________________________ Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp 3570 From: Shawn Hughes Date: Sat Aug 25, 2001 1:25pm Subject: bomb threats Jerry, I am a practicing bomb technician. What Charles said is substantively correct, but I wanted to clarify and offer my services for future queries ( I noticed the initials TN in the body of the email, I live in the Tennessee area, and can travel to give bomb threat training.) There are two factors to consider in bomb threat / response planning re: radios. I always make this a little broader by saying rf, because not only do portable radios emit rf, so do cell phones, cordless phones, telemetry, practically everything. (Contrary to public opinion, pagers which do NOT have a response capability are not a threat.) The first factor is what's called HERO; the Hazards of Electromagnetic Radiation on Ordnance. Many devices, military, commercial, and improvised, are susceptible to rf because of the same reason your tv or car stereo goes nuts around a nextel phone: the energy from the rf source overloads the electronic brains. The second factor is that a small portion of devices contain a feature that will intentionally function the device when exposed to rf of a certain wavelength. Some triggers can be widebanded and will only function when a strong source appears, i.e. a person with a portable radio standing over the device; some are designed to function on a certain frequency, i.e., a remote control, or your portable radio emergency response frequency. If either is the case, most likely the device will function before it ever gets a chance to get to a sensitive position in your facility. If it is widebanded, or rf-susceptible, a passing big-rig or AM radio station will function it as soon as it becomes armed. If it is wired to your portable frequency, well, they have to arm it somewhere, and the odds that you will key when they hit the arm button is quite good. So, the best you can do is to initiate a policy of hardwire communications when you recieve a bomb threat or locate a suspicious object. All cell phones and radios should be turned off. As your search teams complete their areas of operations, they should check in to the command post by hardwire phone. If you guys use radio telemetry to monitor critical functions within the plant, uh, well,......hm. Honestly, out of all the scenarios to consider, the radio-controlled job lives more on the big screen than in real life. Most threats are just that: threats. Threats are designed to cost you money and make you mad. While I am **NOT** telling you to take them lightly, I am telling you that you should keep perspective in planning your response. If you shut process lines down for every phoned in threat as policy, every time somebody doesn't wanna work, you're gonna get a call. This is the crux of bomb threat response: instead of giving the complete responsibility of protection and response to the local law enforcement, you can take some matters into your own hands, and demonstrate that you take the issue seriously, and won't allow threats to paralyze operations. Places where we've helped implement aggressive bomb threat procedures universally saw a dramatic decrease in threats. Hope this helps, Shawn 3571 From: A Grudko Date: Sat Aug 25, 2001 4:49pm Subject: Used Piece Wanted A colleague here in South Africa is looking for a used/demo NLJD as a second kit piece. If there is such a thing and the price is right he'll pay to ship it over here. Please contact me off list if you can help. Andy Grudko. D.P.M., Grad I.S, (S.A.) agrudko@i... Grudko Associates - www.icon.co.za/~agrudko, Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, SCIP, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time "Experience is the name everyone gives to his mistakes" Oscar Wilde - A tribute to the late Roy Lawson. From: Timothy Schiechl Date: Mon Aug 21, 2000 0:03pm Subject: Re: Digest Number 347 Is there anyone on this list that has had experience with FASTLane or TACLane devices. TSCM-L@egroups.com wrote: > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > ------------------------------------------------------------------------ > > There are 5 messages in this issue. > > Topics in this digest: > > 1. RE: Bluetooth - From Crypto-Gram 15 Aug 2000 > From: "Miguel Puchol" > 2. Wiretapping Internet in Europe > From: Vector > 3. Re: Wiretapping Internet in Europe > From: Rocco Rosano > 4. Nowhere to hide > From: "James M. Atkinson, Comm-Eng" > 5. Re: LA Background check > From: gerry > > ________________________________________________________________________ > ________________________________________________________________________ > > Message: 1 > Date: Sun, 20 Aug 2000 14:29:30 +0200 > From: "Miguel Puchol" > Subject: RE: Bluetooth - From Crypto-Gram 15 Aug 2000 > > Nick, > > Bluetooth will (all being well) be delivered in OEM-type transceivers that > you will be able to use in any device that requires short-range > communications - that' what the blurb says. > Now then, just like any wireless device, it's signal could be used to track > Bluetooth-enabled systems. > In Europe, a tracking system based on the GSM network will be implemented > early this year. In some test runs we made, you could achieve accuracies > better than 500 meters in most cases, depending on the physical coverage of > the cell the phone was registered on. > > My opinion is that it will be prohibitive to implement any kind of decent > security/encryption features in Bluetooth. It's intended as a cheap short > range intercom, basically. > Some GSM networks don't encrypt the calls, this seems to vary from cell to > cell within the same network operator, so anyone with capable GSM > demodulators could very easily intercept a call. This is also true with most > new digital standards & systems, like TETRA, TetraPol, DECT, etc. > > For example, with TETRA, adding encryption to the digitized audio signal > bitstream represents effectively reducing the codec's sampling frequency > from 8kHz to around 2.2kHz - which you can see will make the quality of the > recovered audio very poor. > This is why all the TETRA networks I know don't implement encryption - > again, just a modified TETRA transceiver is capable of silently listening to > any logical channel of a system, network operators have these for > call-quality monitoring. > > Don't expect great privacy with Bluetooth, but I think that it will only be > the target of very high-level attacks in very particular situations - > nevertheless it's users should be warned, just like I think that most > consumer RF devices (cordless phones, baby monitors, etc.) should have > warning labels regarding security / privacy. > > All the best, > > Mike > > -----Mensaje original----- > De: Nick Robson [mailto:sci.ltd@c...] > Enviado el: domingo, 20 de agosto de 2000 4:49 > Para: Reply to TSCM List > Asunto: [TSCM-L] Bluetooth - From Crypto-Gram 15 Aug 2000 > > Bluetooth > > Sometime in the 1950s, various governments realized that you could > eavesdrop on data-processing information from over a hundred feet away, > through walls, with a radio receiver. In the U.S., this was called > TEMPEST, and preventing TEMPEST emissions in radios, encryption gear, > computers, etc., was a massive military program. Civilian computers are > not TEMPEST shielded, and every once in a while you see a demonstration > where someone eavesdrops on a CRT from 50 feet away. > > Soon it will get easier. > > Bluetooth is a short-range radio communcations protocol that lets pieces of > computer hardware communicate with each other. It's an eavesdropper's > dream. Eavesdrop from up to 300 feet away with normal equipment, and > probably a lot further if you try. Eavesdrop on the CRT and a lot > more. Listen as a computer communicates with a scanner, printer, or > wireless LAN. Listen as a keyboard communicates with a computer. (Whose > password do you want to capture today?) Is anyone developing a > Bluetooth-enabled smart card reader? > > What amazes me is the dearth of information about the security of this > protocol. I'm sure someone has thought about it, a team designed some > security into Bluetooth, and that those designers believe it to be > secure. But has anyone reputable examined the protocol? Is the > implementation known to be correct? Are there any programming errors? If > Bluetooth is secure, it will be the first time ever that a major protocol > has been released without any security flaws. I'm not optimistic. > > And what about privacy? Bluetooth devices regularly broadcast a unique > ID. Can that be used to track someone's movements? > > The stampede towards Bluetooth continues unawares. Expect all sorts of > vulnerabilities, patches, workarounds, spin control, and the like. And > treat Bluetooth as a broadcast protocol, because that's what it is. > > Bluetooth: > > > A list of Bluetooth articles, none of them about security: > > > One mention of security: > > > An essay about the Bluetooth hype: > > > ------- > > Nick Robson > The Security Centre Ltd. > > [Non-text portions of this message have been removed] > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > ________________________________________________________________________ > ________________________________________________________________________ > > Message: 2 > Date: Sun, 20 Aug 2000 21:55:47 +0800 > From: Vector > Subject: Wiretapping Internet in Europe > > The European Union is quietly getting ready to approve legislation that > will allow the police to eavesdrop both on Internet conversations and > Iridium satellite telephone calls without obtaining court authorization... > > ref: http://www.wired.com/news/politics/0,1283,16588,00.html > > ________________________________________________________________________ > ________________________________________________________________________ > > Message: 3 > Date: Sun, 20 Aug 2000 11:41:53 -0400 > From: Rocco Rosano > Subject: Re: Wiretapping Internet in Europe > > Vector, et al, > > What is the status of that legislation? > > Did that die? Or has some of that been enacted? They have been discussing > that for almost 2 years. > > I though the FBI system (Carnivore) was part of that concept! > > Rocco > Reynoldsburg, Ohio > > Vector wrote: > > > The European Union is quietly getting ready to approve legislation that > > will allow the police to eavesdrop both on Internet conversations and > > Iridium satellite telephone calls without obtaining court authorization... > > > > ref: http://www.wired.com/news/politics/0,1283,16588,00.html > > > > ________________________________________________________________________ > ________________________________________________________________________ > > Message: 4 > Date: Sun, 20 Aug 2000 14:11:35 -0400 > From: "James M. Atkinson, Comm-Eng" > Subject: Nowhere to hide > > Nowhere to hide > > http://theage.com.au/news/20000820/A13431-2000Aug18.html > > By DUNCAN CAMPBELL > Sunday 20 August 2000 > > Governments all over the world have suddenly become embroiled in controversy > about electronic surveillance of the Internet. In the United States, a > political storm has arisen over a new FBI Internet tapping system codenamed > Carnivore. In Britain, the Regulation of Investigatory Powers Act has just > extended telephone-tapping powers to cover Internet service providers, and > allows the government to arrange indiscriminate tapping or e-mail > interception for foreign police forces and security agencies. > > In the Netherlands, the Dutch security service BVD admitted two weeks ago > that it had been collecting e-mails sent abroad by companies. In the Hague, > laws are being prepared to allow the Justice Ministry to tap into e-mail and > subscriber records, scan messages and mobile phone calls, and track users' > movements. > > (In Australia, law enforcement agencies are not required to obtain a court > order to demand disclosure of information provided it is in the course of a > criminal investigation or is part of an ASIO operation against a threat to > national security. The Commonwealth's Telecommunications (Interception) > Legislation Amendment Bill 2000 amends the Telecommunications (Interception) > Act 1979 and the Australian Security Intelligence Organisation Act. Within > the amendments, interception warrants against a named person are enabled, as > are warrants covering foreign communications.) > > These developments are no coincidence, but the direct result of secret > planning over seven years by an international coordinating group set up by > the FBI, after Congress twice refused to extend its telephone tapping powers > for digital networks. Under the innocuous title of the International Law > Enforcement Telecommunications Seminar, the group has met annually to plan > for and lobby to make telecommunications systems "interception-friendly". > > The seminar excluded lawyers and industry specialists who might have advised > on the arrangements to protect privacy and human rights, or on the > feasibility and cost of the intelligence officers' wish list of interception > requirements. As a result, the laws based on their recommendations have > repeatedly caused controversy. > > The work of the group came to light in late 1997, when British researcher > Tony Bunyan revealed collaboration between EU staff and the FBI for many > years. Details of plans to compel Internet service providers worldwide to > install secret interception "black boxes" in their premises appeared in > Online in The Guardian last year. > (www.guardianunlimited.co.uk/Archive/Article/0,4273,3859496,00.html). > > A month ago, the European Parliament appointed 36 parliamentarians to lead a > year-long investigation into Echelon - the codename for a mainly US system > for monitoring traffic on commercial communications satellites. Echelon has > become common parlance for the worldwide electronic eavesdropping or signals > intelligence network run by Britain's Government Communications Headquarters > together with the US National Security Agency. The inquiry will ask if the > rights of European citizens are adequately protected and ascertain whether > European industry is put at risk by the global interception of > communications. > > French politicians and lawyers have taken the lead in accusing the US and > Britain of using their electronic intelligence networks to win business from > foreign rivals. US politicians have riposted that France runs a worldwide > electronic intelligence system of its own - Frenchelon, based at Domme, near > Sarlat in the Dordogne, and includes an eavesdropping station in New > Caledonia in the Pacific (see www.zdnet.co.uk/news/2000/25/ns-16207.html). > > Electronic eavesdropping has become a battleground between the US and > Russia. The Russian-American Trust and Cooperation Act of 2000, passed on > July 19, prohibits the US President from rescheduling or writing off > billions of dollars of Russian debts unless a Russian spy base in Cuba is > "permanently closed". > > This base at Lourdes, located on leased land near Havana, was the former > Soviet Union's most important intelligence facility. It uses Echelon-type > systems to collect data from telephone calls and satellite links covering > the US. > > Lourdes allegedly provides "between 60 per cent and 70 per cent of all > Russian intelligence data about the US". A defector has said that spying > from Lourdes had grown dramatically following an order by Boris Yeltsin to > step up economic and technological espionage against the West. The White > House wants to stop the campaign to close Lourdes because other countries > might then ask the US to close down similar bases. Documents suggest the US > would particularly fear the Lourdes effect spreading to Britain, Germany and > Australia, where the National Security Agency operates large sites. > > The US is not alone in this spying. By the end of the year, the Government > Technical Assistance Centre will have begun operations from inside MI5's > headquarters at Thames House, Millbank. Its primary purpose will be to break > codes used for private e-mail or to protect files on personal computers. It > will also receive and hold private keys to codes which British computer > users may be compelled under law to give to the government. > > The development of the Government Technical Assistance Centre has been > pioneered by the Home Office's Encryption Coordination Unit, which says that > the centre will "provide the capability to produce plain text/images/audio > from lawfully intercepted communications and lawfully seized computer media > which are encrypted". The Home Office has not confirmed reports that the > centre will also be the collecting point for intercepted internet > communications relayed from the "sniffer" boxes to be installed inside > British Internet service providers. > > The cost of building the centre, said to be $38 million, is likely to > include the price of ultra-fast super-computers, of the type previously used > only to break Soviet codes and attack other special military targets. > Code-breakers from the Government Communications Headquarters will be > seconded to work at the centre. > > The communications headquarters has used sophisticated computers for many > years to examine foreign or "external" messages and phone calls, as part of > the worldwide intelligence network operated with other English-speaking > countries. The key part of this system uses computers called Dictionaries, > which hold lists of thousands of target names, addresses and key words. They > are used to select messages of interest, while discarding most > communications. > > The headquarters was not normally permitted to encroach on domestic > communications. Now, the Regulation of Investigatory Powers Act says that as > many domestic Internet communications travel on the same "trunks" as > external communications, it will be allowed to trawl through these messages > without restriction. > > Another limitation, which had prevented the direct targeting of people in > Britain by the headquarters without specific authorization has also been > dropped. The Home Secretary can sign an "overriding" warrant every three > months, which will allow general surveillance without the need for > individual warrants. This will apply to "serious crime", which can include > organizing demonstrations that may affect public order. The Act will also > allow any agency nominated by the Home Secretary to tap into the addresses > of e-mails sent and received (though not their content) without a warrant. > > Caspar Bowden, whose lobbying organization, the Foundation for Information > Policy Research, helped to bring some important changes to the new law, > believes that letting Dictionary-type computers carry out broad-ranging > surveillance on much internal UK traffic will break the new Human Rights Act > (see www.fipr.org). > > The FBI has just been granted $85 million for an electronic surveillance > program called Digital Storm. This foresees the quadrupling of telephone > tapping in the US over the next decade. > > The FBI hopes to build in automated transcription and translation systems. > According to its budget application for the next US fiscal year, a related > program called Casa de Web will include central computer archives for > intercepted audio and data reports. > > The existence of Carnivore was revealed three months ago as the result of a > lawsuit between an Internet service provider and federal marshals, who > demanded that the provider wire a Carnivore box into its network. The FBI > initially wanted to install its own version of a commercial "sniffer" > program called Etherpeek. Then it turned up with Carnivore and a court order > to install it. > > The FBI claims there are only 20 Carnivores, and that they have been used > only 25 times in the past 18 months > (www.fbi.gov/programs/carnivore/carnivore.htm). But the system is so > controversial that the US Congress held special hearings two weeks ago. A > judge has ordered the FBI to answer requests for details made under the > Freedom of Information Act. > > Carnivore consists of a laptop computer and communications interface cards. > It runs a packet sniffer program to select the data it wants from inside the > Internet service provider local network. According to Marcus Thomas, head of > the FBI's Cyber Technology Section, they are PCs using proprietary software > and acting as a "specialised sniffer". > > The bureau claims that although Carnivore's hardware sees all the traffic > passing through the provider where it is installed, its software looks only > at the origin and the destination of each Internet packet. If the addresses > correspond with those specifically authorised in a court order, then the > information and/or the contents are extracted and forwarded to the FBI. The > agency claims no other data is recorded or examined. > > But US computer experts do not believe this is possible. For example, many > providers allocate Internet addresses to their customers. This means that > every time you dial in to your provider, you will use a different Internet > address. Unless Carnivore is also intercepting this type of data, it cannot > work. > > The FBI has been asked to reveal Carnivore's source code, but has refused. > US Attorney-General Janet Reno has publicly regretted the selection of the > codename Carnivore. It will be changed to a less threatening name. > > - GUARDIAN > > =================================================================== > Everybody's into computers... Who's into yours?Å > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Lizard, The Other White Meat > =================================================================== > > ________________________________________________________________________ > ________________________________________________________________________ > > Message: 5 > Date: Sun, 20 Aug 2000 17:06:25 +0800 > From: gerry > Subject: Re: LA Background check > > hi > are there any LA based fellows here who can contact me by direct email? > there is a small job that needs some attention. > thanks > gerry > > ________________________________________________________________________ > ________________________________________________________________________ 1263 From: William Knowles Date: Tue Aug 22, 2000 2:59am Subject: Re: Encrypted messages On Mon, 21 Aug 2000, Men in black helicopters with the 160th S.O.A.R. forced Matthijs van der Wel to write: > Although I keep reading messages about Carnivore, Echelon and how > even our own Dutch Intelligence BVD (Binnenlandse Veiligheids > Dienst) 'reads' all my E-mail messages, the TSCM mailing list > doesn't offer any encryption possibilities. All messages are sent > in plain text via different mail servers. I really don't see the point in encrypting messages on this list, (What is there to hide?) James will probably confirm that there are likely members of several intelligence agencies actively lurking on the list, and I moderate a mailing list with more than several intelligence agencies on that list, and there hasn't been any reason to encrypt that traffic either. It sounds like you're a little paranoid of the company you keep being on all these mailing lists, If I were you, I would recommend unsubscribing from the list with your current address, Getting a ZKS Freedom account ( http://www.freedom.net ) and resubscribing back on again. > Don't you think it's a good idea to offer members of this list the > option to upload their PGP key and send the messages of this list > in encrypted form? Even though I've read that encrypted E-mail > messages marks them as 'suspicious' messages? I think its a good idea to tell the list in your signature file that your PGP key is on the major key servers, and if there is something that you don't want the mailing list and your friends and fans at Fort Meade Maryland listening into, Then you and the other party can take the conversation to encrypted private mail. Cheers! William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 1264 From: Robert G. Ferrell Date: Tue Aug 22, 2000 7:53am Subject: Re: TEMPEST >Interesting. Not the civilian and in at least 2 government Intel services, >understanding of the term. This is the 'standard definition" of TEMPEST, derived from National Communications Security Instruction 5004 (which itself is classified, so this is a paraphrase): "TEMPEST is an unclassified short name referring to investigations and studies of compromising emanations, conducted or radiated, on complete equipment." While some people use the term TEMPEST when referring to equipment or methods used to intercept ECE (electromagnetic compromising emanations), they are really referring to attempting to defeat TEMPEST shielding. The TEMPEST standard itself has no interception component. If you want to see an exhaustive analysis of all things TEMPEST-related, go take a look at http://www.eskimo.com/~joelm/tempest.html Cheers, RGF > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 1265 From: James M. Atkinson, Comm-Eng Date: Tue Aug 22, 2000 9:54am Subject: Re: Encrypted messages Matthijs, While I appreciate your concerns about encrypting the list I feel that it would be quite inappropriate, and would actually do little good. There is no reason to hide the contents of this list from government entities. In fact there are quite a few government types already on the list, and since nobody on the list is engaging in illicit activities (we hope) there is no reason to "hide from the government". On another note... what make you think that PGP provides anything more then a minor annoyance to any government intelligence or investigative agency? PGP is right up there with voice inversion scrambling and other such security measures (both are a joke). -jma At 4:21 PM +0200 8/21/00, Matthijs van der Wel wrote: >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > >Hi, > >Although I keep reading messages about Carnivore, Echelon and how >even our own Dutch Intelligence BVD (Binnenlandse Veiligheids Dienst) >'reads' all my E-mail messages, the TSCM mailing list doesn't offer >any encryption possibilities. All messages are sent in plain text via >different mail servers. > >Don't you think it's a good idea to offer members of this list the >option to upload their PGP key and send the messages of this list in >encrypted form? Even though I've read that encrypted E-mail messages >marks them as 'suspicious' messages? > >Just a thought. > > >Yours sincerely, > >Matthijs van der Wel >Consultant E-Commerce > >- ------------------------------------ > > PAC Finance & Communications > Raamweg 21 - 22 > 2596 HL THE HAGUE > THE NETHERLANDS > >- ------------------------------------ > >T +31 - 70 - 31 30 209 (direct) >F +31 - 70 - 31 30 221 >E mailto:mwe@p... >U http://www.pac.nl > >- ------------------------------------ =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== 1266 From: Miguel Puchol Date: Tue Aug 22, 2000 1:45pm Subject: RE: Encrypted messages James, On the point of PGP, I thought that it's algorithms had been through very tough peer-review scrutiny, at international levels, and by well-considered encryption experts (yes, we know, the NSA has'em all...). I think that PGP-encrypted messages, specially when long (4098-bit) keys are used, are reasonably secure - even from government supercomputers. The time and effort to retrieve information on such messages, albeit some quantum or massively parallel processing technique having been developed that we wouldn¥t/don't know about, is tremendous, and not within the reach of today's supercomputers. The problem usually is that as with any tool, you have to know how to use it, for example avoiding repetitive text or common 'speech' patterns or expressions to avoid known plaintext attacks, etc. Key security is also important, not having the same one for long, etc. Also, one coud consider using both hard encryption and steganography, which I believe is hardly detectable. I do agree completely that list contents should not be encrypted, for obvious reasons already stated. Maybe too much off-topic, if so, my apologies. All the best, Mike -----Mensaje original----- De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] Enviado el: martes, 22 de agosto de 2000 16:55 Para: TSCM-L@egroups.com Asunto: Re: [TSCM-L] Encrypted messages Matthijs, While I appreciate your concerns about encrypting the list I feel that it would be quite inappropriate, and would actually do little good. There is no reason to hide the contents of this list from government entities. In fact there are quite a few government types already on the list, and since nobody on the list is engaging in illicit activities (we hope) there is no reason to "hide from the government". On another note... what make you think that PGP provides anything more then a minor annoyance to any government intelligence or investigative agency? PGP is right up there with voice inversion scrambling and other such security measures (both are a joke). 1267 From: James M. Atkinson, Comm-Eng Date: Tue Aug 22, 2000 2:44pm Subject: McDonnell Douglas Product Registration Thank you for purchasing a McDonnell Douglas military aircraft. In order to protect your new investment, please take a few moments to fill out the warranty registration card below. Answering the survey questions is not required, but the information will help us to develop new products that best meet your needs and desires. 1. [_] Mr. [_] Mrs. [_] Ms. [_] Miss [_] Lt. [_] Gen. [_] Comrade [_] Classified [_] Other Last Name ................................................ Initial: ..... First Name: ........................... Password: ......................... (max. 8 char) Code Name: ................................................... Latitude-Longitude-Altitude: ........... ........... 2. Which model of aircraft did you purchase? [_] F-14 Tomcat [_] F-15 Eagle [_] F-16 Falcon [_] F-117A Stealth [_] Classified 3. Date of purchase (Year/Month/Day): ..... .... ..... 4. Serial Number: ........................................... 5. Please indicate where this product was purchased: [_] Received as gift / aid package [_] Catalogue / showroom [_] Independent arms broker [_] Mail order [_] Discount store [_] Government surplus [_] Classified 6. Please indicate how you became aware of the McDonnell Douglas product you have just purchased: [_] Heard loud noise, looked up [_] Store display [_] Espionage [_] Recommended by friend / relative / ally [_] Political lobbying by manufacturer [_] Was attacked by one 7. Please indicate the three (3) factors that most influenced your decision to purchase this McDonnell Douglas product: [_] Style / appearance [_] Speed / maneuverability [_] Price / value [_] Comfort / convenience [_] Kickback / bribe [_] Recommended by salesperson [_] McDonnell Douglas reputation [_] Advanced Weapons Systems [_] Backroom politics [_] Negative experience opposing one in combat 8. Please indicate the location(s) where this product will be used: [_] North America [_] Iraq [_] Iraq [_] Aircraft carrier [_] Iraq [_] Europe [_] Iraq [_] Middle East (not Iraq) [_] Iraq [_] Africa [_] Iraq [_] Asia / Far East [_] Iraq [_] Misc. Third World countries [_] Iraq [_] Classified [_] Iraq 9. Please indicate the products that you currently own or intend to purchase in the near future: [_] Color TV [_] VCR [_] ICBM [_] Killer Satellite [_] CD Player [_] Air-to-Air Missiles [_] Space Shuttle [_] Home Computer [_] Nuclear Weapon 10. How would you describe yourself or your organization? (Indicate all that apply:) [_] Communist / Socialist [_] Terrorist [_] Crazed [_] Neutral [_] Democratic [_] Dictatorship [_] Corrupt [_] Primitive / Tribal 11. How did you pay for your McDonnell Douglas product? [_] Deficit spending [_] Cash [_] Suitcases of cocaine [_] Oil revenues [_] Personal check [_] Credit card [_] Ransom money [_] Traveler's cheque 12. Your occupation: [_] Homemaker [_] Sales / marketing [_] Revolutionary [_] Clerical [_] Mercenary [_] Tyrant [_] Middle management [_] Eccentric billionaire [_] Defense Minister / General [_] Retired [_] Student 13. To help us better understand our customers, please indicate the interests and activities in which you and your spouse enjoy participating on a regular basis: [_] Golf [_] Boating / sailing [_] Sabotage [_] Running / jogging [_] Propaganda / misinformation [_] Destabilization / overthrow [_] Default on loans [_] Gardening [_] Crafts [_] Black market / smuggling [_] Collectibles / collections [_] Watching sports on TV [_] Wines [_] Interrogation / torture [_] Household pets [_] Crushing rebellions [_] Espionage / reconnaissance [_] Fashion clothing [_] Border disputes [_] Mutually Assured Destruction Thank you for taking the time to fill out this questionnaire. Your answers will be used in market studies that will help McDonnell Douglas serve you better in the future - as well as allowing you to receive mailings and special offers from other companies, governments, extremist groups, and mysterious consortia. As a bonus for responding to this survey, you will be registered to win a brand new F-117A in our Desert Thunder Sweepstakes! Comments or suggestions about our fighter planes? Please write to: McDONNELL DOUGLAS CORPORATION Marketing Department Military,Aerospace Division =================================================================== "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== IMPORTANT: This email is intended for the use of the individual addressee(s) named above and may contain information that is confidential privileged or unsuitable for overly sensitive persons with low self-esteem, no sense of humor or irrational religious beliefs. If you are not the intended recipient, any dissemination, distribution or copying of this email is not authorized (either explicitly or implicitly) and constitutes an irritating social faux pas. Unless the word absquatulation has been used in its correct context somewhere other than in this warning, it does not have any legal or no grammatical use and may be ignored. No animals were harmed in the transmission of this email, although the small kelpie next door is living on borrowed time, let me tell you. Those of you with an overwhelming fear of the unknown will be gratified to learn that there is no hidden message revealed by reading this warning backwards, so just ignore that Alert Notice from Microsoft. However, by pouring a complete circle of salt around yourself and your computer you can ensure that no harm befalls you and your pets. If you have received this email in error, please add some nutmeg and egg whites, whisk and place in a warm oven for 40 minutes. =================================================================== 1268 From: A Grudko Date: Tue Aug 22, 2000 2:12pm Subject: Digital phones I was relayed a question by a client during a sweep my team under took yesterday which I realised I couldn't fully answer, especially in non-jargon. Having recently learned that I was misinformed on the TEMPEST technology, I'd like to put it to the group. Private or group response is up to the sender. The client had recently upgraded to a digital Private Automatic Branch eXchange with a mixture of digital and analogue ports. The simple question was why can't a digital phone extension on the client's PABX be tapped ? - which was the info. given to the client by the installer. Part of my answer was that it *can* be done but it's far more complicated than tapping an analogue phone. For example, we would pick up the side tone in the body of the phone pre-digitising and work with that as appropriate. Obviouly different manufacturers will operate in different ways, but as these types of systems are becoming more common I'm looking trying to formulate a description in laymans' terms which I can include in my report. My standard report is about 4 pages long. There is also a seperate log attached of all frequencies received, signal type, number of 'hits' in the period, origin and threat assesment. An extra half page would be fine. Something on the lines of..... ____________________________ Tapping/bugging of an older 'analogue' phone relies on up to 4 things to work: each phone has it's own, unique pair (or more) of wires the power which drives the phone the presence of clear voice and a voltage drop or current drain when the phone is picked up. A modern digital phone supplies far less power, does not use clear voice (you can't just listen in) and there is no voltage drop or current drain when the phone is picked up. In addition, many digital phones can be connected to one pair of wires, sending private 'packets' of digitised sound, coded just for that phone so they don't hear one another, plus other data. These differences mean that a person who wishes to eavesdrop cannot use most of the techniques used to tap a 'normal' phone. As a result the interception of a conversation on a digital phone is technicaly far more difficult, and normal business security measures should keep out the few people who do understand the few ways that such a phone can be 'bugged'. _____________________ Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1269 From: Graham Bignell Date: Mon Aug 21, 2000 10:49pm Subject: Wireless IP Just chatting with some friends in IRC tonight, when one mentioned that he was wandering around the office: Yikes, I just took a walk up the escalator and am outside on the sidewalk now I think I better encrypt this wireless network > :) I didn't think it would reach outside of our bunker here Didn't even drop a packet in the ping I have running > someone with a good antenna can probably grab the signal from a few blocks away. yeah.. I wonder how many corporate intranets I could get onto by driving to random parking lots in the valley Right now anybody walking by on the sidewalk outside could grab an ip via dhcp and get onto our Intranet We are in the basement without any windows and surrounded by a massive amount of concrete. I didn't think we would leak this much > are you using the airport cards? No, Lucent Wavelan 802.11b 11Mbps The range is really impressive > are you still outside? how far can you get? No, I am back inside I should head home. I'll walk to my car with my laptop on and see how far I get before dropping > sumsar: do you have a routable IP on it that I could ping as you walk to the car? "ping sumsar and watch him fall off the network!" *** Signoff: Sumsar (Ping timeout) Any thoughts on just how vunerable companies are making themselves with the careless addition of wireless TCP/IP to their networks? The IEEE 802.11 standard includes the option of something called Wired Equivalency Privacy (WEP) encryption, which is RC4 PRNO. I have installed a couple of line-of-site links using microwave and laser endpoints, but ensure everything is encrypted long before it travels through the air (ppp inside ssh / ipsec). These campus broadcast systems seem to be just asking for trouble... and not from Big Evil, just Bored Kid. Hopefully that brushes close enough to TSCM to be on topic... I can easily see someone dressed as a bicycle courier riding the elevator in an office tower when people are arriving in the morning and snooping quite a collection of passwords and such. --- Graham Bignell L: 416 366 9755 C: 416 678 3263 Chief Paranoia Officer -- Agrivane Inc. 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 1270 From: Izaac Date: Tue Aug 22, 2000 11:14am Subject: Re: Encrypted messages On Tue, Aug 22, 2000 at 10:54:40AM -0400, James M. Atkinson, Comm-Eng wrote: > On another note... what make you think that PGP provides anything > more then a minor annoyance to any government intelligence or > investigative agency? PGP is right up there with voice inversion > scrambling and other such security measures (both are a joke). I'm going to look beyond the odd comparison and assume that your criticism lies with PGP's frequently bungled management and not in the mathematics of the encryption itself .. -- ___ ___ . . ___ \ / |\ |\ \ _\_ /__ |-\ |-\ \__ 1271 From: Date: Tue Aug 22, 2000 10:55am Subject: Re: Encrypted messages Very rarely do I respond to posts unless I feel I have some good info to offer. Another option to just encrypting your information, is to hide it as well encrypt it. The only two I have played with to date are Steganos which is for Winblows, and Steghide which is a Unix/Linux console mode client. What these applications do is encrypt then hide that data within a host file(html, bmp, wav, txt), among other things. Again, this is NOT 100% guaranteed to keep your info safe, but if someone doesn't know to look within a specific file it does make it a bit more difficult to find, then un-encrypt. I offer this info only because it may be usefull to those on both sides of the fence; those trying to hide info, and those trying to find hidden info. I am on my way out the door so I don't have time to find the links right at this second, however, I can tell you off hand that any good search engine will find both by name. If anyone has any challenges locating either please just say so and I will send the links to the list. Thank you. Niko On Tue, 22 Aug 2000, James M. Atkinson, Comm-Eng wrote: > Matthijs, > > While I appreciate your concerns about encrypting the list I feel > that it would be quite inappropriate, and would actually do little > good. > > There is no reason to hide the contents of this list from government > entities. In fact there are quite a few government types already on > the list, and since nobody on the list is engaging in illicit > activities (we hope) there is no reason to "hide from the government". > > On another note... what make you think that PGP provides anything > more then a minor annoyance to any government intelligence or > investigative agency? PGP is right up there with voice inversion > scrambling and other such security measures (both are a joke). > > -jma > > > At 4:21 PM +0200 8/21/00, Matthijs van der Wel wrote: > >-----BEGIN PGP SIGNED MESSAGE----- > >Hash: SHA1 > > > >Hi, > > > >Although I keep reading messages about Carnivore, Echelon and how > >even our own Dutch Intelligence BVD (Binnenlandse Veiligheids Dienst) > >'reads' all my E-mail messages, the TSCM mailing list doesn't offer > >any encryption possibilities. All messages are sent in plain text via > >different mail servers. > > > >Don't you think it's a good idea to offer members of this list the > >option to upload their PGP key and send the messages of this list in > >encrypted form? Even though I've read that encrypted E-mail messages > >marks them as 'suspicious' messages? > > > >Just a thought. > > > > > >Yours sincerely, > > > >Matthijs van der Wel > >Consultant E-Commerce > > > >- ------------------------------------ > > > > PAC Finance & Communications > > Raamweg 21 - 22 > > 2596 HL THE HAGUE > > THE NETHERLANDS > > > >- ------------------------------------ > > > >T +31 - 70 - 31 30 209 (direct) > >F +31 - 70 - 31 30 221 > >E mailto:mwe@p... > >U http://www.pac.nl > > > >- ------------------------------------ > > > =================================================================== > Everybody's into computers... Who's into yours?Å > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Lizard, The Other White Meat > =================================================================== > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1272 From: CDS INC. Date: Tue Aug 22, 2000 4:22pm Subject: Re: Snazzy Uniforms For Your Next Sweep Check out this site for some snazzy sweep uniforms, complete with hard hat & company logo. They even have their "technician's" photo on their web page. Need equipment? Their prices are something else! How about an O-scope, low end for only $6,000.00. This site is definitely worth a look...and a laugh! www.bugged.com [Non-text portions of this message have been removed] 1273 From: Date: Tue Aug 22, 2000 0:26pm Subject: Re: Re: Snazzy Uniforms For Your Next Sweep In a message dated 8/22/00 2:21:13 PM Pacific Daylight Time, cds@w... writes: << This site is definitely worth a look...and a laugh! www.bugged.com >> ROFPMFGU 1274 From: James M. Atkinson, Comm-Eng Date: Tue Aug 22, 2000 5:04pm Subject: Re: Re: Snazzy Uniforms For Your Next Sweep At 5:26 PM -0400 8/22/00, MACCFound@a... wrote: >In a message dated 8/22/00 2:21:13 PM Pacific Daylight Time, cds@w... >writes: > ><< This site is definitely worth a look...and a laugh! www.bugged.com >> > > Oh please, I laughed so hard I almost had to change my shorts. -jma =================================================================== "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== IMPORTANT: This email is intended for the use of the individual addressee(s) named above and may contain information that is confidential privileged or unsuitable for overly sensitive persons with low self-esteem, no sense of humor or irrational religious beliefs. If you are not the intended recipient, any dissemination, distribution or copying of this email is not authorized (either explicitly or implicitly) and constitutes an irritating social faux pas. Unless the word absquatulation has been used in its correct context somewhere other than in this warning, it does not have any legal or no grammatical use and may be ignored. No animals were harmed in the transmission of this email, although the small kelpie next door is living on borrowed time, let me tell you. Those of you with an overwhelming fear of the unknown will be gratified to learn that there is no hidden message revealed by reading this warning backwards, so just ignore that Alert Notice from Microsoft. However, by pouring a complete circle of salt around yourself and your computer you can ensure that no harm befalls you and your pets. If you have received this email in error, please add some nutmeg and egg whites, whisk and place in a warm oven for 40 minutes. =================================================================== 1275 From: James M. Atkinson, Comm-Eng Date: Tue Aug 22, 2000 5:30pm Subject: Re: Digital phones *** ANY Extension *** on a digital PBX can be tapped. If fact many PBX systems pass live audio over the station wiring even when the instrument in on the hook (sometimes 80-90 dB down). Just because it is a digital phone does not mean it is secure. Also, many PBX instruments can be told to go "open mike" remotely, and in some cases can spool the audio right into the voice mail system and eavesdropper can then download the spool file via the Ethernet network connection (I have direct personal knowledge of a case where this was going on). Also, some PBX's "transmit" or radiate the PCM backplane like all hell unless they are properly terminated, have a clean ground, and all covers are in place (and locked down). The cleanest way to tap a PBX is to manipulate the software in the switch, or to send fake commands to the extensions to force it off hook (using a "blip box"). PBX systems also give us lots of extra wires which can support covert microphones/video anywhere along the run, or modifications of the instrument itself. -jma At 9:12 PM +0200 8/22/00, A Grudko wrote: >I was relayed a question by a client during a sweep my team under took >yesterday which I realised I couldn't fully answer, especially in >non-jargon. > >Having recently learned that I was misinformed on the TEMPEST technology, >I'd like to put it to the group. Private or group response is up to the >sender. The client had recently upgraded to a digital Private Automatic >Branch eXchange with a mixture of digital and analogue ports. > >The simple question was why can't a digital phone extension on the client's >PABX be tapped ? - which was the info. given to the client by the installer. > >Part of my answer was that it *can* be done but it's far more complicated >than tapping an analogue phone. For example, we would pick up the side tone >in the body of the phone pre-digitising and work with that as appropriate. >Obviouly different manufacturers will operate in different ways, but as >these types of systems are becoming more common I'm looking trying to >formulate a description in laymans' terms which I can include in my report. > >My standard report is about 4 pages long. There is also a seperate log >attached of all frequencies received, signal type, number of 'hits' in the >period, origin and threat assesment. An extra half page would be fine. >Something on the lines of..... >____________________________ > >Tapping/bugging of an older 'analogue' phone relies on up to 4 things to >work: > each phone has it's own, unique pair (or more) of wires > the power which drives the phone > the presence of clear voice and > a voltage drop or current drain when the phone is picked up. > >A modern digital phone supplies far less power, does not use clear voice >(you can't just listen in) and there is no voltage drop or current drain >when the phone is picked up. > >In addition, many digital phones can be connected to one pair of wires, >sending private 'packets' of digitised sound, coded just for that phone so >they don't hear one another, plus other data. These differences mean that a >person who wishes to eavesdrop cannot use most of the techniques used to tap >a 'normal' phone. > >As a result the interception of a conversation on a digital phone is >technicaly far more difficult, and normal business security measures should >keep out the few people who do understand the few ways that such a phone can >be 'bugged'. >_____________________ > >Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime >investigation & intelligence >Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - >Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 >11) 465 9673 - 465 1487 (Fax) - Est. 1981 >GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA >Chairman), CITTF, >UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done >right - first time" ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1276 From: Jay Coote, W6CJ Date: Tue Aug 22, 2000 7:44pm Subject: Re: Digital phones Possibly in keeping with the thread, I was browsing a test equipment catalog and came across a digital adaptor for a telephone test set (or butt set) the adaptor was supposed to plug into a conventional telephone test set, allowing the technician to test some of the "digital" telephones. I haven't examined one yet. Jay Coote Los Angeles ---------- > I was relayed a question by a client during a sweep my team under took > yesterday which I realised I couldn't fully answer, especially in > non-jargon. > > Having recently learned that I was misinformed on the TEMPEST technology, > I'd like to put it to the group. Private or group response is up to the > sender. The client had recently upgraded to a digital Private Automatic > Branch eXchange with a mixture of digital and analogue ports. > > The simple question was why can't a digital phone extension on the client's > PABX be tapped ? - which was the info. given to the client by the installer. > > Part of my answer was that it *can* be done but it's far more complicated > than tapping an analogue phone. For example, we would pick up the side tone > in the body of the phone pre-digitising and work with that as appropriate. > Obviouly different manufacturers will operate in different ways, but as > these types of systems are becoming more common I'm looking trying to > formulate a description in laymans' terms which I can include in my report. > > My standard report is about 4 pages long. There is also a seperate log > attached of all frequencies received, signal type, number of 'hits' in the > period, origin and threat assesment. An extra half page would be fine. > Something on the lines of..... > ____________________________ > > Tapping/bugging of an older 'analogue' phone relies on up to 4 things to > work: > each phone has it's own, unique pair (or more) of wires > the power which drives the phone > the presence of clear voice and > a voltage drop or current drain when the phone is picked up. > > A modern digital phone supplies far less power, does not use clear voice > (you can't just listen in) and there is no voltage drop or current drain > when the phone is picked up. > > In addition, many digital phones can be connected to one pair of wires, > sending private 'packets' of digitised sound, coded just for that phone so > they don't hear one another, plus other data. These differences mean that a > person who wishes to eavesdrop cannot use most of the techniques used to tap > a 'normal' phone. > > As a result the interception of a conversation on a digital phone is > technicaly far more difficult, and normal business security measures should > keep out the few people who do understand the few ways that such a phone can > be 'bugged'. > _____________________ > > Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime > investigation & intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 > 11) 465 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > Chairman), CITTF, > UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done > right - first time" > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1277 From: ZeroBreak Date: Tue Aug 22, 2000 5:06pm Subject: Re: Wireless IP That definatly brings up a good point as far as I am concerned. More and more companies are setting up wireless intranets. Or atleast have some peripherals like laptops that are wireless. You could easily be a human network sniffer without anyone knowing. I would definatly like to get into this aspect more and hear about some of the security advancments that are taken place to avoid snooping. ----- Original Message ----- From: "Graham Bignell" To: Sent: Monday, August 21, 2000 11:49 PM Subject: [TSCM-L] Wireless IP > > Just chatting with some friends in IRC tonight, when one mentioned that > he was wandering around the office: > > Yikes, I just took a walk up the escalator and am outside on the sidewalk now > I think I better encrypt this wireless network > > :) > I didn't think it would reach outside of our bunker here > Didn't even drop a packet in the ping I have running > > someone with a good antenna can probably grab the signal from a few blocks away. > yeah.. I wonder how many corporate intranets I could get onto by driving to random parking lots in the valley > Right now anybody walking by on the sidewalk outside could grab an ip via dhcp and get onto our Intranet > We are in the basement without any windows and surrounded by a massive amount of concrete. I didn't think we would leak this much > > are you using the airport cards? > No, Lucent Wavelan > 802.11b 11Mbps > The range is really impressive > > are you still outside? how far can you get? > No, I am back inside > I should head home. I'll walk to my car with my laptop on and see how far I get before dropping > > sumsar: do you have a routable IP on it that I could ping as you walk to the car? > "ping sumsar and watch him fall off the network!" > *** Signoff: Sumsar (Ping timeout) > > Any thoughts on just how vunerable companies are making themselves with the careless addition of wireless TCP/IP > to their networks? The IEEE 802.11 standard includes the option of something called Wired Equivalency Privacy (WEP) encryption, > which is RC4 PRNO. > > I have installed a couple of line-of-site links using microwave and laser endpoints, but ensure everything is > encrypted long before it travels through the air (ppp inside ssh / ipsec). > > These campus broadcast systems seem to be just asking for trouble... and not from Big Evil, just Bored Kid. > > Hopefully that brushes close enough to TSCM to be on topic... I can easily see someone dressed as a bicycle courier > riding the elevator in an office tower when people are arriving in the morning and snooping quite a collection of > passwords and such. > > --- > Graham Bignell L: 416 366 9755 C: 416 678 3263 > Chief Paranoia Officer -- Agrivane Inc. > 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1278 From: ZeroBreak Date: Tue Aug 22, 2000 5:12pm Subject: Re: Re: Snazzy Uniforms For Your Next Sweep yeah but their theme song just tops it all off... ----- Original Message ----- From: "CDS INC." To: Cc: "CDS INC." Sent: Tuesday, August 22, 2000 5:22 PM Subject: [TSCM-L] Re: Snazzy Uniforms For Your Next Sweep > Check out this site for some snazzy sweep uniforms, complete with hard hat & company logo. They even have their "technician's" photo on their web page. Need equipment? Their prices are something else! How about an O-scope, low end for only $6,000.00. This site is definitely worth a look...and a laugh! www.bugged.com > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1279 From: Doug Ellsworth Date: Wed Aug 23, 2000 3:22am Subject: Re: Digital phones I too have heard of digital adapters for butt sets, but have not used one. I seems to me that there would not be a universal one that would work with every PBX, so it appears likely that if one were so inclined he'd have to have at least a few such adapters. There are digital buttsets manufactured to work on selected PBXs. I, for one, would be interested in the efficacy of adapters if anyone has examined them. Modifying a digital telephone unit (or voice terminal) can be accomplished where it is analog (handset, handset cord, termination of handset conductors within the base unit) These points are vulnerable to ordinary RF (including carrier current) transmitters as well as spare pair exploits. Obviously a unit can be "souped-up" in like manner and exchanged for the original. This type of attack requires entry even if only briefly. Our clients need to be aware too, that there are digital PBX intercept attacks that do not require entry. Remember that a PBX is a computer and as such can be cracked from the "outside". The process of "diverting" for the purpose of stealing free long distance calls is an example of a cracked PBX. Now, while the theft of toll will alert the victim in short order, cracker attacks aimed at intercept might not alert. Every modern PBX contains certain optional features that can be enabled by remote crack. One such feature is known as "Executive Bypass" and also by other terms. This feature is designed so that executives will not have to wait for an available line in the event of a "bottle neck" at the switch; something that might occur during a crisis or natural disaster, as examples. (Many top execs insist on it.) Basically, this feature enables the routing of all calls to/from a particular extension to one of the leased subscriber loops, exclusively. With Executive Bypass enabled for any particular extension, that extension enjoys no more security than a single line phone from demarc to CO. A proficient cracker with knowledge of PBX systems can rather quickly enable this embedded feature to assign specific targeted extension(s) to dedicated leased loop(s). The really easy part is compiling a list of leased loops (pretext calls and grabbing loop numbers from callbacks using Caller ID. Now all that's required is locating and tapping the reassigned loop(s) anywhere between demarc and CO using traditional trade craft. Moreover, lest our clients become complacent with their new digital systems, any organization of the scale that would benefit from PBX probably has a number of FAX machines; at least one for each department / workgroup. FAX machines operate on dedicated loops, (all I've seen are analog) and most importantly, carry more sensitive information on a regular basis than all the voice terminals put together. What's more, an intercepted and printed-out FAX exchange could even be submitted as evidence in a court if stained, crumpled and claimed to have been recovered through dumpster diving. -Doug Ellsworth Secure Communications Corp., Inc. ----- Original Message ----- From: A Grudko To: Sent: Tuesday, August 22, 2000 12:12 PM Subject: [TSCM-L] Digital phones > I was relayed a question by a client during a sweep my team under took > yesterday which I realised I couldn't fully answer, especially in > non-jargon. > > Having recently learned that I was misinformed on the TEMPEST technology, > I'd like to put it to the group. Private or group response is up to the > sender. The client had recently upgraded to a digital Private Automatic > Branch eXchange with a mixture of digital and analogue ports. > > The simple question was why can't a digital phone extension on the client's > PABX be tapped ? - which was the info. given to the client by the installer. > > Part of my answer was that it *can* be done but it's far more complicated > than tapping an analogue phone. For example, we would pick up the side tone > in the body of the phone pre-digitising and work with that as appropriate. > Obviouly different manufacturers will operate in different ways, but as > these types of systems are becoming more common I'm looking trying to > formulate a description in laymans' terms which I can include in my report. > > My standard report is about 4 pages long. There is also a seperate log > attached of all frequencies received, signal type, number of 'hits' in the > period, origin and threat assesment. An extra half page would be fine. > Something on the lines of..... > ____________________________ > > Tapping/bugging of an older 'analogue' phone relies on up to 4 things to > work: > each phone has it's own, unique pair (or more) of wires > the power which drives the phone > the presence of clear voice and > a voltage drop or current drain when the phone is picked up. > > A modern digital phone supplies far less power, does not use clear voice > (you can't just listen in) and there is no voltage drop or current drain > when the phone is picked up. > > In addition, many digital phones can be connected to one pair of wires, > sending private 'packets' of digitised sound, coded just for that phone so > they don't hear one another, plus other data. These differences mean that a > person who wishes to eavesdrop cannot use most of the techniques used to tap > a 'normal' phone. > > As a result the interception of a conversation on a digital phone is > technicaly far more difficult, and normal business security measures should > keep out the few people who do understand the few ways that such a phone can > be 'bugged'. > _____________________ > > Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime > investigation & intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 > 11) 465 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > Chairman), CITTF, > UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done > right - first time" > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1280 From: Robert G. Ferrell Date: Wed Aug 23, 2000 7:32am Subject: Re: Re: Snazzy Uniforms For Your Next Sweep << This site is definitely worth a look...and a laugh! www.bugged.com >> They may have "thousands of dollars" invested in equipment, but their Web site was a $19.95 special. Makes my teeth grind just trying to read it. >:-( RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 1281 From: Robert G. Ferrell Date: Wed Aug 23, 2000 8:05am Subject: Re: Wireless IP >That definatly brings up a good point as far as I am concerned. More and >more companies are setting up wireless intranets. Or atleast have some >peripherals like laptops that are wireless. You could easily be a human >network sniffer without anyone knowing. I would definatly like to get into >this aspect more and hear about some of the security advancments that are >taken place to avoid snooping. Both the 802.1x and IPSec folks at the IETF are working on various end to end encryption solutions for wireless. See, for example http://www.ietf.org/internet-drafts/draft-ietf-ipsra-reqmts-01.txt "Requirements for IPsec Remote Access Scenarios" Cheers, RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 1282 From: Mike F Date: Wed Aug 23, 2000 8:24am Subject: RE: Re: Snazzy Uniforms For Your Next Sweep About equipment on the site you mentioned,yikes. The price for the 8-hour digital recorder is a little HIGH, by a few hundred dollars. later4,mike f -----Original Message----- From: Robert G. Ferrell [mailto:rferrell@r...] Sent: Wednesday, August 23, 2000 7:32 AM To: TSCM-L@egroups.com Subject: Re: [TSCM-L] Re: Snazzy Uniforms For Your Next Sweep << This site is definitely worth a look...and a laugh! www.bugged.com >> They may have "thousands of dollars" invested in equipment, but their Web site was a $19.95 special. Makes my teeth grind just trying to read it. >:-( RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1283 From: Miguel Puchol Date: Wed Aug 23, 2000 1:39pm Subject: RE: Digital phones Andy, I think that any attacker that's going to face a digital system will get one and bash it to death until he knows it inside out - probably using circuit-hacking techniques as described by James a while ago. I don't consider myself an expert on digital PABXs, but I assume that portions or replicas of switching/signal processing or handset circuitry could be used to tap such system. It could be possible to tap into the digital line, and demodulate the data passing through it, then forward this information onto the attacker. To give a simple explanation, I would say to someone that a) the analog part of the extension (i.e. the phone) could be tapped, and b) special demodulator circuits could be used to retrieve valuable information from the digital bitstream. All, as you say, far more complex than analogue taps. Cheers, Mike -----Mensaje original----- De: A Grudko [mailto:agrudko@i...] Enviado el: martes, 22 de agosto de 2000 21:12 Para: TSCM-L@egroups.com Asunto: [TSCM-L] Digital phones I was relayed a question by a client during a sweep my team under took yesterday which I realised I couldn't fully answer, especially in non-jargon. Having recently learned that I was misinformed on the TEMPEST technology, I'd like to put it to the group. Private or group response is up to the sender. The client had recently upgraded to a digital Private Automatic Branch eXchange with a mixture of digital and analogue ports. The simple question was why can't a digital phone extension on the client's PABX be tapped ? - which was the info. given to the client by the installer. Part of my answer was that it *can* be done but it's far more complicated than tapping an analogue phone. For example, we would pick up the side tone in the body of the phone pre-digitising and work with that as appropriate. Obviouly different manufacturers will operate in different ways, but as these types of systems are becoming more common I'm looking trying to formulate a description in laymans' terms which I can include in my report. My standard report is about 4 pages long. There is also a seperate log attached of all frequencies received, signal type, number of 'hits' in the period, origin and threat assesment. An extra half page would be fine. Something on the lines of..... ____________________________ Tapping/bugging of an older 'analogue' phone relies on up to 4 things to work: each phone has it's own, unique pair (or more) of wires the power which drives the phone the presence of clear voice and a voltage drop or current drain when the phone is picked up. A modern digital phone supplies far less power, does not use clear voice (you can't just listen in) and there is no voltage drop or current drain when the phone is picked up. In addition, many digital phones can be connected to one pair of wires, sending private 'packets' of digitised sound, coded just for that phone so they don't hear one another, plus other data. These differences mean that a person who wishes to eavesdrop cannot use most of the techniques used to tap a 'normal' phone. As a result the interception of a conversation on a digital phone is technicaly far more difficult, and normal business security measures should keep out the few people who do understand the few ways that such a phone can be 'bugged'. _____________________ Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), CITTF, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1284 From: Dawn Star Date: Wed Aug 23, 2000 1:41pm Subject: Fax "FAX machines operate on dedicated loops, (all I've seen are analog) and most importantly, carry more sensitive information on a regular basis than all the voice terminals put together. What's more, an intercepted and printed-out FAX exchange could even be submitted as evidence in a court if stained, crumpled and claimed to have been recovered through dumpster diving." -Doug Ellsworth Secure Communications Corp., Inc. This reminds me of a case I had some years ago of a company who every time they faxed a new client a contract a solicitation came over the new clients fax machine from a competitor offering the service at a reduced price. The fax line was not bugged, the competitor was pulling toll and long distance records. The outgoing fax had to be removed to a covert location with its outgoing I.D.# disabled. This solved the problem. A loose fax can hammer you! Roger Tolces, Electronic Security Co., Los Angeles [Non-text portions of this message have been removed] 1285 From: James M. Atkinson, Comm-Eng Date: Wed Aug 23, 2000 2:04pm Subject: An atheist was taking a walk through the woods... [humor] An atheist was taking a walk through the woods, admiring all that the "accident of evolution" had created. "What majestic trees! What beautiful fish! What magnificent animals!", he said to himself. As he was walking alongside the river he heard a rustling in the bushes behind turned to look, he saw a 7-foot grizzly charge towards him. He began to run as fast as he could up the path. He looked over his shoulder and saw that the bear was closing in on him. He tried to run even faster, so scared that tears were coming to his eyes. He looked over his shoulder again and the bear was even closer. His heart was pumping frantically as he tried to run even faster, but he tripped and fell on the ground. He rolled over to pick himself up and saw the bear right on top of him raising his paw to kill him. At that instant he cried out "Oh my God!" Just then, time stopped. The bear froze, the forest was silent, the river even stopped moving. A bright light shone upon the man, and a voice came out of the sky saying, "You deny my existence all of these years, teach others I don't exist and even credit my creation to an cosmic accident and now do you expect me to help you out of this predicament? Am I to count you as a believer?" The atheist, ever prideful, looked into the light and said "it would be rather hypocritical to ask to be a Christian after all these years, but could you make the bear a Christian?" "Very well", said the voice. As the light went out, the river ran, the sounds of the forest continued, and the bear miraculously put his paw down. The bear then brought both paws together, bowed his head and said, "Lord I thank you for this food which I am about to receive". Amen. -jma ps: I hope that this does not offend anybody, but it is rather poetic justice... ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1286 From: Date: Wed Aug 23, 2000 11:19am Subject: Re: An atheist was taking a walk through the woods... [humor] In a message dated 8/23/00 12:24:01 PM Pacific Daylight Time, jmatk@tscm.com writes: << ps: I hope that this does not offend anybody, but it is rather poetic justice... >> We need a whole lot more of Jesus and a lot less TSCM 1287 From: Richard Thieme Date: Wed Aug 23, 2000 2:56pm Subject: Re: An atheist was taking a walk through the woods... [humor] this story would only offend the bear, I think. I read a serious study recently in the Journal of Gastrointestinology about the contents of the stomachs of dead grizzly bears found in the wild. The study was quite thorough - it took over six years and hundreds of dead bears were autopsied. I do not recall the precise list of the remains found most often in their guts -- it included fish, acorns, apples, and ants -- but I do recall that several bears had eaten fundamentalists and not one had eaten an atheist. This may have had nothing to do with belief-systems or ideology, but then again, it might have, so before you post something about what bears do and don't eat, I would think it through a little more thoroughly next time. This was posted in haste, I assume, because you thought it was a humorous story rather than a swipe at our near cousins the bears, so I am willing to let it go - this time. Bears are seventh in intelligence you know after bonobos (the smartest) apes pigs elephants chimps and surprisingly great Komodo dragons. Not including aquatic mammals of course. At 03:04 PM 08/23/2000 -0400, you wrote: >An atheist was taking a walk through the woods, admiring all that the >"accident of evolution" had created. "What majestic trees! What >beautiful fish! What magnificent animals!", he said to himself. > >As he was walking alongside the river he heard a rustling in the >bushes behind turned to look, he saw a 7-foot grizzly charge towards >him. He began to run as fast as he could up the path. He looked over >his shoulder and saw that the bear was closing in on him. He tried >to run even faster, so scared that tears were >coming to his eyes. He looked over his shoulder again and the bear >was even closer. His heart was pumping frantically as he tried to run >even faster, but he tripped and fell on the ground. He rolled over >to pick himself up and saw the bear right on top of him raising his >paw to kill him. >At that instant he cried out "Oh my God!" > >Just then, time stopped. The bear froze, the forest was silent, the >river even stopped moving. A bright light shone upon the man, and a >voice came out of the sky saying, "You deny my existence all of >these years, teach others I don't exist and even credit my creation >to an cosmic accident and now do you expect me to help you out of >this predicament? Am I to count you as a believer?" > >The atheist, ever prideful, looked into the light and said "it would >be rather hypocritical to ask to be a Christian after all these >years, but could you make the bear a Christian?" "Very well", said >the voice. As the light went out, the river ran, the sounds of the >forest continued, and the bear miraculously put his paw down. The >bear then brought both paws together, bowed his head and said, "Lord >I thank you for this food which I am about to receive". > >Amen. > > >-jma > > >ps: I hope that this does not offend anybody, but it is rather poetic >justice... > > > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= >Do not try the patience of Wizards, >for they are subtle and quick to anger. > ======================================================================= > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > 1288 From: John McCain Date: Wed Aug 23, 2000 0:19pm Subject: Wireless IP security Finally... another topic where I know more than the average 3rd grader and can talk about it :,) Working at mny day job, I've seen to the installation of thousands of wireless LAN and WAN products ranging from low to high speed, ISM band (900 Mhz and 2.4 Ghz) point-to-point and multi-point networks, 23 Ghz point-to-point links to wireless LAN networks. In almost all cases with spread spectrum equipment, the mfr promises "higher security" than a wired system due to system complexity, frequency hopping (or DSSS), and "proprietary methods". In most applications, I believe they are being honest and think they provide an adequate level of security. I also believe that most provide a reasonable level of security. Can it be defeated... You bet, but not without a large investment in time and a bit of knowledge and equipment! We all know that most anything can be defeated if the motivation is high enough. It's the same old balance of risk vs. cost. Current products are being produced with both proprietary protocols and with industry-standards. Newer products almost always include an industry-standard protocol that pays some attention to security. And at the top of the heap, you could always implement a VPN (virtual private network using encryption) on top of the wireless (and wired) network. A prime example of wireless LAN technology is the venerable Proxim RangeLan line of pcmcia, isa, and stand-alone interface devices with their "access point" wireless server. This product line has been around for quite a while, and at one time had over 70% of the market (considering it's oem incarnations). The RangeLan has several security safeguards... 1. a domain (which selects a hopping pattern of one of 15) [defeat this by using 15 laptops]. 2. a security ID (which is a 20 character string that they hash (unix crypt() ?) into a 20 bit value to mangle along with the serial number into each packet) 3. Access list on the access point, (a list of remote serial numbers that it will talk to). THey also have IP filters, and some other minor filtering. Access Lists and filtering don't prevent eavesdropping, but do prevent someone outside from getting onto the network unless they are adept at using IP & MAC spoofing techniques. Their info on security is at http://www.proxim.com/wireless/whiteppr/rl2security.shtml . I've never tried to defeat this. No doubt, with unlimited time and money I think I could. (Nice criteria...) But, I know that it's "reasonable" security for the customers where we install it. An out-of-the-box install is the greatest security risk. Use all factory defaults, plug it in, and collect ya' money. Yes, I've actually done that too, but a computer lab in an elementary school isn't exactly high risk, and that makes it easy to recreate the system when someone messes it up. On more "real" customers though, Fortune 100, .gov, research labs, etc. we always select a random domain and security value. However, I doubt that I'd use this stuff in a security critical installation. In a parking lot with the monitor program running on a laptop, you'll notice that range on these pcmcia units is amazing. It is also amazing how many people buy this stuff mail-order (or through clueless vendors) and just plug it in with factory defaults. Those are easy to find and ugh.. less than secure. I also wonder about bluetooth, all those laptop IR ports, and the rapid growth of techie toys with no thought to security. Makes TSCM a fun challenge. Back to TSCM, practitioners should have a protocol for wireless LANs when they are encountered, as well as for all the wireless point-to-point links that are popping up. It's easy for someone to buy a Symphony wireless PCMCIa card and access point at Best Buy for a few hundred dollars so they can roam around their office jungle... without the boss knowing it. Wonder if that thing can be heard across the street? Cheers, JohnM Manager, Corporate SecurityVoice: 217-352-3207 Data Comm for Business, Inc.Fax: 217-352-0350 807 PioneerWeb: http://www.dcbnet.com Champaign, IL. 61820Email: Jmccain@d... 1289 From: James M. Atkinson, Comm-Eng Date: Wed Aug 23, 2000 9:37pm Subject: Re: Wireless IP security At 12:19 PM -0500 8/23/00, John McCain wrote: >Finally... another topic where I know more than the average 3rd grader and >can talk about it :,) > >Working at mny day job, I've seen to the installation of thousands of >wireless LAN and WAN products ranging from low to high speed, ISM band (900 >Mhz and 2.4 Ghz) point-to-point and multi-point networks, 23 Ghz >point-to-point links to wireless LAN networks. > >In almost all cases with spread spectrum equipment, the mfr promises >"higher security" than a wired system due to system complexity, frequency >hopping (or DSSS), and "proprietary methods". In most applications, I >believe they are being honest and think they provide an adequate level of >security. I also believe that most provide a reasonable level of security. > Can it be defeated... You bet, but not without a large investment in time >and a bit of knowledge and equipment! We all know that most anything can >be defeated if the motivation is high enough. It's the same old balance of >risk vs. cost. Most spread spectrum systems use a "canned sequence" and it just a single matter of initiating the sequence in the proper order, and with the proper code.Since most spread spectrum systems use this "canned set of codes" it is actually quite simple to use these to eavesdrop on a SS signal. The primary function of this code is to RANDOMIZE the data stream to break it up so we get a "smoother" appearance in the frequency domain (we actually strain out all of the chunks). Contrary to much of the marketing hype out there only a small number of wireless SS systems actually ENCRYPT the data, but instead only randomize it (yes, there is a big difference). >Current products are being produced with both proprietary protocols and >with industry-standards. Newer products almost always include an >industry-standard protocol that pays some attention to security. And at >the top of the heap, you could always implement a VPN (virtual private >network using encryption) on top of the wireless (and wired) network. Ah, but very few of these use off the shelf Gold Codes... hence the problem. >A prime example of wireless LAN technology is the venerable Proxim RangeLan >line of pcmcia, isa, and stand-alone interface devices with their "access >point" wireless server. This product line has been around for quite a >while, and at one time had over 70% of the market (considering it's oem >incarnations). The RangeLan has several security safeguards... 1. a domain > (which selects a hopping pattern of one of 15) [defeat this by using 15 >laptops]. 2. a security ID (which is a 20 character string that they hash >(unix crypt() ?) into a 20 bit value to mangle along with the serial number >into each packet) 3. Access list on the access point, (a list of remote >serial numbers that it will talk to). THey also have IP filters, and some >other minor filtering. Access Lists and filtering don't prevent >eavesdropping, but do prevent someone outside from getting onto the network >unless they are adept at using IP & MAC spoofing techniques. Yes, but you can still chip an external unit (copy the PGA), and intrude into the wireless network remotely. > >Their info on security is at >http://www.proxim.com/wireless/whiteppr/rl2security.shtml . > >I've never tried to defeat this. No doubt, with unlimited time and money I >think I could. (Nice criteria...) But, I know that it's "reasonable" >security for the customers where we install it. An out-of-the-box install >is the greatest security risk. Use all factory defaults, plug it in, and >collect ya' money. Yes, I've actually done that too, but a computer lab in >an elementary school isn't exactly high risk, and that makes it easy to >recreate the system when someone messes it up. On more "real" customers >though, Fortune 100, .gov, research labs, etc. we always select a random >domain and security value. However, I doubt that I'd use this stuff in a >security critical installation. It will keep kids out of the network, cause some problems for amateurs, but it will do virtually nothing to keep a professional eavesdropper out. >In a parking lot with the monitor program running on a laptop, you'll >notice that range on these pcmcia units is amazing. It is also amazing how >many people buy this stuff mail-order (or through clueless vendors) and >just plug it in with factory defaults. Those are easy to find and ugh.. >less than secure. Hey, just use a nice parabolic dish or octave waveguide at 2.4 GHz and you can get some killer range on most of these devices. One of the funniest situations I've seen were MIT students who were tied into into a wireless LAN at a local company (near their dorms) and were runny amuck via their new found network connection to the Internet. >I also wonder about bluetooth, all those laptop IR ports, and the rapid >growth of techie toys with no thought to security. Makes TSCM a fun >challenge. I'll post a little something to the list from a while back about irDA in a little bit. >Back to TSCM, practitioners should have a protocol for wireless LANs when >they are encountered, as well as for all the wireless point-to-point links >that are popping up. It's easy for someone to buy a Symphony wireless >PCMCIa card and access point at Best Buy for a few hundred dollars so they >can roam around their office jungle... without the boss knowing it. Wonder >if that thing can be heard across the street? (cough-cough) IMHO: Companies that use wireless networking in any capacity are usually so incredibly clueless about other security that TSCM and technical security is the least of their concerns. >Cheers, >JohnM >Manager, Corporate SecurityVoice: 217-352-3207 >Data Comm for Business, Inc.Fax: 217-352-0350 >807 PioneerWeb: http://www.dcbnet.com >Champaign, IL. 61820Email: Jmccain@d... -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1290 From: James M. Atkinson, Comm-Eng Date: Wed Aug 23, 2000 9:44pm Subject: IrDA Threat Alert - Beware the Little Red Window [Repost] Beware of the little red window on modern computers, video equipment (camcorders), or other peripheral devices (such as the Hewlett Packard 5MP). This red window provides an IrDA communications port which may allow unrestricted access to both the computer, and in some cases the entire computer network of your client. If your computer is equipped with infrared technology that uses the IrDA protocol, you can establish a wireless TCP/IP connection to a network using an IrDA network access device, or exchange files with another computer. IrDA operates on a peak wavelength of between 850 nm and 900 nm with a maximum intensity within a 30 degree cone. Link length is typically 0 to 1 meters with an error rate of virtually zero with extremely low power level requirements (typical desktop environments). When the "cone" is narrowed, the power levels increased, or the data rates decreased the range may be increased to over 11.3 meters. Each IrDA port may support up to 8 peripheral devices or other computers. Each devices requires a 5-10 second handshaking period after which data speeds of 4 mbps are available. According to BIS Strategic Research, 85% of the new notebook computers (150 manuf) have IrDA capability built into the systems. Unlike the earlier IR predecessors which use proprietary protocols, this new crop of IrDA compliant equipments are inter-operative across applications, across manufacturers, and across platforms. The data is coded using a 16-Pulse Sequence multiplied by a 1.5 MHz subcarrier. ModeData rateStandard Async Serial-IR9600-115.2kb/sIrDA-1.0 Sync Serial-IR1.152Mb/s Sync 4PPM4Mb/s IrDA-1.1 (Most common) Future15 Mbps +Pending - Near term Future50 Mbps +Pending - 2-3 years On a recent flight to San Jose, CA thirty one laptop computers being used by passengers were identified as having an active IrDA port. In twenty six cases the IrDA port allowed unrestricted access to all files on the respective laptops. This vulnerability allowed roughly 5000 pages of documents to be downloaded from the computer during a one minute period. Since up to 8 sessions may be active at any time this would allow over 600 pages per minute to be downloaded in parallel from eight computers all at the same time. This vulnerability also allows an eavesdropper to not only intercept IrDA data, but allows the computer to be used as a gateway into the corporate computer network. An eavesdropper may also access an IrDA port by locating an access device just outside a targets office window. This vulnerability was tested with excellent results where the subject simply "walked up to" a ground floor office, accessed the target computer, and then downloaded over 250 Mb of data files. This vulnerability was also found to be active on several consumer camcorders and video products with "Wireless Video Links" (mostly Sony) -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1291 From: Charles Patterson Date: Wed Aug 23, 2000 9:02pm Subject: Re: Digital phones > I was browsing a test >equipment catalog and came across a digital adaptor for a >telephone test set Hi, The "P Phone" adapter (made by Chesivale Electronics) converts an analog butt set for what is known as a P-phone. It is usually a Northern Telecom digital phone designed for use on a digital Centrex line, cost is only around $175 in the Jensen catalog. For Nortel Meridian PBX's an audio digital/analog convertor is available for about the same price, it provides tape recorder output and notification via relays that the ext is in use. It attaches in parallel to a station pair. (keep the tdr handy) Charles ----- Original Message ----- From: "Jay Coote, W6CJ" To: Sent: Tuesday, August 22, 2000 8:44 PM Subject: Re: [TSCM-L] Digital phones > > Possibly in keeping with the thread, I was browsing a test equipment catalog and came across a digital adaptor for a telephone test set (or butt set) the adaptor was supposed to plug into a conventional telephone test set, allowing the technician to test some of the "digital" telephones. > I haven't examined one yet. > Jay Coote > Los Angeles > > ---------- From: Michael Puchol Date: Wed Aug 21, 2002 5:56am Subject: Re: Hacked - AID One big problem a lot of medium to large firms have is security at subcontractors - here the role is a bit different, but the principle still applies. I've seen a large bank here that had all sorts of security measures, policies, etc. all well implemented - but they used a subcontractor for their ATM machine networks (I won't mention who, but a rather large multinational corporation), which had a wide open wireless access point - this gave any passer by access to very sensitive information about the ATM network, the ATM machines themselves, etc. So, security doesn't end at the perimeter fence of a company, or at their ISP / telco, but extends to ALL subcontractors, home-office workers, etc. Cheers, Mike 6064 From: James M. Atkinson Date: Wed Aug 21, 2002 6:53am Subject: Re: OPTICAL SECURITY Simple... add drapes. -jma At 7:55 AM +0200 8/21/02, Secdep wrote: >I am looking for specifications for a film to be put on some large boardroom >windows to help prevent optical surveillance (infra red etc....) > >Raymond > >--- > >From the desk of Raymond van Staden >Van Staden and Associates cc > >P.O. Box 1150 >Amanzimtoti >4125 >South Africa > >Tel: +27 (0)31 916-1262 >Fax: +27 (0)31 916-1263 > >Email: raymond@v... >Internet: http://www.vanstaden.co.za -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6065 From: Kevin D. Murray Date: Wed Aug 21, 2002 8:03am Subject: Re: OPTICAL SECURITY > I am looking for specifications for a film to be put on some large boardroom > windows to help prevent optical surveillance (infra red etc....) Hi Ray, You can attenuate visible light surveillance and still afford the client a bit of a view by applying window films to the glass (3M or equivalent). Check here for details... International Window Film Association http://www.iwfa.com/ Glass is opaque in the thermal infrared range frequency range. Kevin Kevin D. Murray - CPP, CFE, BCFE Murray Associates Eavesdropping Detection and Counterespionage Consultants to Business & Government http://www.spybusters.com 6066 From: Shawn Hughes Date: Wed Aug 21, 2002 11:59am Subject: AID Lawsuit Found this link at Cryptome while following up another article. I'm sure it's old news to some, but I thought it was funny. Where did AID get their ideas from, themselves? Shawn Source: Law.com ---------------------------------------------------------------------------- ---- Spy vs. Spy Suits against ex-employees shed light on a little-known Florida firm that trains agents for the feds Dan Christensen Miami Daily Business Review May 15, 2000 It's real life spy vs. spy, tucked away in a quiet northern section of Broward County, Fla. Audio Intelligence Devices, a super-secret Coral Springs, Fla., company that sells surveillance equipment and operates secret agent training courses to law enforcement agencies worldwide -- including the FBI, CIA, Drug Enforcement Administration and the Internal Revenue Service -- has gone to court claiming it's a victim of corporate espionage. In two civil cases, one of which recently was sealed by a judge, Audio Intelligence accuses former company executives who now work for competitors of swiping highly sensitive corporate trade secrets on their way out the door. Meanwhile, one of the executives accuses the company of illegally selling spying equipment to the New York City Police Department. If the equipment was used to gather evidence, the executive claims, the evidence may be tainted. Little is known about the company, Audio Intelligence, which has been manufacturing and selling surveillance equipment to the government for nearly three decades. The company originally was operated by owner Jack Holcomb, a mysterious businessman who ran the company out of offices at Fort Lauderdale Executive Airport. Then, in 1992, Holcomb sold his business to a unit of giant Westinghouse Electric. In January 1998, Delaware-based Audio Intelligence was sold again. The seller was CBS, which earlier had merged with Westinghouse. Audio Intelligence is owned by privately held Liberty Associates Management Group L.C., a holding company that in turn is owned by ex-Army officer, Joseph Wortley, according to Wortley's business partner, William R. Gates. Gates -- no, not Microsoft's Bill Gates -- recently served as president of Audio Intelligence, but now oversees AID as managing member of Liberty Associates. He said he was a Naval officer in the submarine program. He declined to give his former rank. The company, with gross annual sales Gates said were $12 million to $15 million, is involved in a trade whose course work includes teaching police officers and agents from around the nation up-to-the-minute lock-picking techniques and covert entry skills. Clients include unlikely agencies such as the Department of Housing and Urban Development. Products include transmitters and "video surveillance kits" disguised to look like briefcases, surge protectors, cigarettes, billfolds, smoke alarms and tape measures. (In an interview, Gates said the CIA is no longer a company client. Court papers filed by the company last November, and now sealed, say the company does work for the CIA.) Helping the company maintain its low profile is the fact that the surveillance devices sought by the government are so exotic that Audio Intelligence often is the sole source of the supply. Federal rules allow government buyers to use so-called "simplified acquisition procedures" when making sole-source purchases ≠ a practice that eliminates the need to follow public bidding requirements. But while little is known about the company, a dispute now taking place could affect the company's ability to maintain some of that secrecy. In addition, it raises questions about the propriety and legality of some of the company's activity. Charles W. Goforth, one of two former Audio Intelligence executives who've been sued, says in court papers that he quit last September after learning the company unlawfully sold about 60 spy transmitters to the New York City Police Department. Kim Douglas Sherman, Goforth's Fort Lauderdale attorney, said in court papers that those electronic bugs weren't legal at the time because they were not sanctioned by the Federal Communications Commission. If police used the devices to make cases without getting approval, he said in a brief interview, any evidence they produced would be tainted. At the New York Police Department, spokesman Alan Krawitz said the department is not aware of any problems with its devices. "But we would not even comment about something like this, even if we were aware," he said. In the court documents, Goforth claims that when he objected to the sale, the senior vice president of operations responded, "I like to live dangerously." Goforth, via his attorney, declined to comment for this story. Goforth, who's now president of his own surveillance device firm, Digital Security Solutions Inc. of Pompano Beach, also says in court documents that the company's chief operating officer told him the action was approved despite the illegality. The company officials in question aren't identified by name in court papers. Gates said there "was no basis" for Goforth's allegations and they were untrue. He said Goforth, whom he accused of trying to swipe AID's international business, was in charge of the department that handled those kinds of sales. The dispute with Goforth isn't the company's only battle with a former employee. Audio Intelligence is involved in a civil case against the former administrator of its National Intelligence Academy, a spy school for law enforcement types. Laurie Thurmond, who ran the academy from December 1997 until last May, is accused by Audio Intelligence of breach of contract and violating Florida's Trade Secrets Act. Thurmond now helps run the similar Law Enforcement Technology Centre -- a division of a rival Coral Springs firm, Innovative Surveillance Technology. Audio Intelligence, in a complaint now sealed by Broward Circuit Judge Jeffrey E. Streitfeld, alleges Thurmond stole the company's secrets -- including the names and address of its government customers and students -- and gave them to her new bosses at Innovative Surveillance. "In disseminating those names either by herself or through a third party, [Thurmond] has or is attempting to destroy the credibility of [Audio Intelligence] in maintaining the anonymity of the law enforcement officers that are trained," say court papers filed by the company. "In so doing, [Audio Intelligence] will lose its customers due to the impression that [it] cannot protect the people that it trains." The suit, similar to the one brought against Goforth, sought unspecified damages and an injunction to halt the "misappropriation" of Audio Intelligence's trade secrets. Thurmond declined to comment for this story. Plantation, Fla., attorney Robert D. Klausner, who represents Thurmond, was unavailable for comment. An attorney in his office, Adam Levinson, would not comment. Gates and AID's Boca Raton lawyer, Carol A. Kartagener, also declined to comment on the Thurmond suit. Ira Libanoff, a Fort Lauderdale lawyer who represents Innovative Surveillance, indicated he'd like to talk, but said he was "prevented" from doing so by the seal order imposed at the company's request. Shawn ---------------------------------------------------------------------------- ----------------------------------------------- This is a free country. I have the permits, licenses, certifications, tax stamps, insurance, paperwork in triplicate, and blessings from the city, county, state, and US Government to tell you so..... 6067 From: Aimee Farr Date: Wed Aug 21, 2002 7:18pm Subject: RE: RE: Remember....The Reichstag Fire Plot (long post warning) w/in 24 after my long-winded fret about blame-game operations to discredit intelligence agencies, I give you, "The Reichstag Fire Plot." (I didn't mean to sound nasty, just humor.) [1] http://www.nytimes.com/2002/08/21/international/europe/21GERM.html?todayshea dlines [2] http://www.washingtonpost.com/ac2/wp-dyn/A42041-2002Aug20?language=printer "BERLIN, Aug. 20 -- German police stormed the Iraqi Embassy here this evening, freeing two hostages and ending a five-hour occupation of the mission by a previously unknown Iraqi opposition group urging the ouster of President Saddam Hussein, officials said." ----- Rather than garner any German support, which the story tends to implicate, my guess would be that somebody wants to drive a wedge between the U.S. and Germany. Looks scripted to implicate the U.S. (scripted for the media, that is). It's a transparent sort of layered deception, allowing you to place the "doubt" (the blame comes later, for people that are predisposed to it) on somebody else, congruent with somebody else's interests. It's very nature introduces conspiracy, and linkage to the patsy. (i.e., linkages of "Democratic," offers a mutually-consistent motive, etc.) The post-incident comments work on known prejudices and are associated-truth whisper-scripts. Deniable, but they have their intended effect. (Historical example: "Stalin is visiting for a rest cure" carried the meaning "friendly relations continue between Germany and Russia.") Those sort of comments aren't usually off-the-cuff. These days, increasingly carried by anonymous sources. The media won't explain this phenomenon, rarely go beyond mere source attribution, and refuse to point to the possibility of deception. If anything, they tend to milk the story...which incredulously intimidates U.S. involvement. Deception hits their invulnerability bias, and like intelligence analysts, admitting to deception makes them question some basic belief structures. It's too complicated, too awkward, and doesn't sell print or make a career. Seems like old-fashioned journalists were a bit smarter, asked more questions, and responsible. I also note this was near the terrorist 3-shot suicide, which plays off a time-correlation tactic to fuel speculation. While probably not intentional, a suspicious "deceptive correlation," as people are inclined to see events that occur in close time-proximity as somehow related. (The recent "cache" of terrorist tapes on CNN "ended" with a Sept. 11 tape, which could be designed to reinforce the Sept. 11 connection to OBL, and reinforce the focus on Afghanistan (away from Iraq), by playing on events-in-motion to suggest a chronological and a cause-effect relationship. I found the little biochem doggie clip rather interesting, too.) I said...."Notably, on the heels of a 'propaganda offensive' is often....something bad." And, at first blush, there it is. Somebody needs to get their "APPROVED" stamp out and take it for 10 laps around their desk. I wasn't knocking our agencies, anything but. I'm advocating new capabilities, or the resurrection of old ones. Our communication dynamics and mass perceptual filters have changed since the 70s, and even early 80s. These blame ops affect my long-term security, and I have every right to be mad about this, himf. ~Aimee 6068 From: Kirk Adirim Date: Tue Aug 20, 2002 9:29pm Subject: AID hacked Stolen data reveal undercover cops Surveillance firmís client list is stolen and posted on Internet; undercover police officers, Secret Service names revealed By Bob Sullivan MSNBC Aug. 20 ≠ Computer intruders have allegedly broken into the online files of a Florida company that provides surveillance technology to the U.S. military, federal agencies and local police forces, and posted confidential information, including the names and email addresses of undercover police officers on a public Web site, MSNBC has learned. http://www.msnbc.com/news/796315.asp?pne=msn [Non-text portions of this message have been removed] 6069 From: spyworldltd Date: Wed Aug 21, 2002 0:15pm Subject: CSD-18????? Great Southern Security produce a RFD that has a range just short of 5Khz, John Meyner is mentioned all over the site and makes a number of positive statements about his CDS-18. My question is this, does anybody have any opinions experience with Great Southern Security (positive or negative)or of John Meyner. I have attached a link below. http://www.greatsouthernsecurity.com/cardor7n.htm You opinions would be useful... Cheers David Emery Spyworld Ltd Tel. +44 8701 206185 Fax. +44 08701 206186 Mob. +44 7971 187561 Email. david-emery@s... E&OE 6070 From: Kirk Adirim Date: Tue Aug 20, 2002 9:35pm Subject: AID hacked/UC officers exposed INFORMATION ABOUT UNDERCOVER narcotics officers, U.S. Secret Service Investigators, Department of Defense special agents and hundreds of other local and federal law enforcement workers was revealed when the data from Audio Intelligence Devices Inc.ís files were posted on the Internet. The Florida-based private company sells highly specialized video surveillance equipment and teaches spy courses to federal agencies and local police forces in the United States, and to some foreign governments. Lon D. Guarino, Vice President, Sales & Marketing for Audio Intelligence Devices did not answer questions about the incident, but in an e-mail to MSNBC defended the companyís security practices. ìContrary to any recent reports, Audio Intelligence Devices is confident in its current security practices and treats its customer information with complete confidentiality,î Guarino wrote. ìWe are actively investigating the origin of the information in question at this time.î MSNBC contacted each law enforcement official whose e-mail address was taken from the AID files and listed on an Internet page ≠ 349 in all. Of those who replied, none said they knew their information had been made public until they were contacted by MSNBC. AID only sells to law enforcement workers, according to the companyís Web site. The list viewed by MSNBC was a Whoís Who of domestic and international law enforcement agencies, including the U.S. Army, Navy and Air Force, Sandia National Laboratories, Ministry of Foreign Economic Relations in Uzbekistan, and the Montreal Police Department. Until recently, the site offered a Web form that allowed agents to request equipment catalogs or information on spy classes. It appears that a computer criminal managed to access the data entered on the form by AIDís customers. The form on AIDís site is currently disabled. A message on the site says: ìThe online catalog request is temporarily unavailable.î UNDERCOVER DRUG COPS LISTED The stolen data lists hundreds of names, addresses, job titles, phone numbers and e-mail addresses of investigators, and in some cases, details on the kind of equipment they were seeking to buy. The data appeared on a Web site, Cryptome.org, earlier this month. Site operator John Young says Cryptome.org is devoted to publicizing various government efforts to monitor U.S. citizens. He said an anonymous contributor sent him the data. Young is a well-known First Amendment advocate and a popular critic of government surveillance efforts. Young speculated that the data may have been stolen and leaked by a competitor or former employer, citing the often cutthroat nature of the spying business. But itís not clear how the computer thieves got their hands on AIDís data. Young says that the anonymous contributor who tipped him off about the file told him it was left up for grabs by AID, available for download to anyone using simple File Transfer Protocol software. The file is no longer available at AIDís site, Young said. The data doesnít include financially sensitive information like credit card numbers. But in some cases it includes names of undercover narcotics detectives who rely on their anonymity in their everyday work. ìI wouldnít have wanted anyone to know I was working narcotics,î said one police officer, whose name was on the list. The officer, who said he has since moved out of drug enforcement work, was concerned that criminals might now know what kind of video surveillance technologies law enforcement agents are using, and be able to prepare counter-measures. ìWe certainly donít want the frequencies to be out there. If they know how widespread it is, they will probably start checking the frequencies.î Another narcotics detective, whose name was also on the list, echoed those comments. ìThis is a problem. Most people contacting AID are in narcotics task force groups, or money laundering, where confidentiality and undercover work go hand in hand,î he said. Most of the information in the file is available from public sources such as main police phone numbers or street addresses. But some of the e-mail addresses, agents contacted by MSNBC said, were designed for obscurity, and some may double as network login names for government computer systems. ìThis is very important as AID is a company that sells intelligence equipment for law enforcement purposes,î said one officer who was named. ìI would of hoped that a company such as AID was working with a secure severer. I guess not.î Interviews with AID customers suggest that the data was stolen within the past month or so ≠ one customer whose information was stolen indicated heíd only used the site a month ago. But other customers who hadnít visited AIDís Web page in nearly a year were also listed in the stolen data, suggesting the text file represents nearly a yearís worth of AID Web site visitors. PEEK AT SURVEILLANCE WORK Young said he published the data in an effort to provide a peek at the kind of surveillance operations U.S. government agencies regularly perform. The data does provide an interesting snapshot. Among the entries: ìInterested in up-dating our system. The Drug Task Force is looking for a long range video surveillance camera. Similar to a spotting scope with a video camera mounted to it, also with the ability to record.î ìI run a majors drug unit and have some money to spend on a variety of equipment. We need a new wire, GPS tracking, Video recorders, and even a new surveillance van. I worked with you guys when I last worked dope. I need catalog etc.î ìI plan on attending your courses relating to lock picking because I use that in my present job on many occasions. I am also interested in the audio courses and would like to get news and updates on those areas as well. I need product support for a body bug manufactured by you, is it possible to get service schematics, parts etc.î ìI am member of 3-town drug task force. Weíre looking to upgrade/purchase new body wire to be used by undercover officers for safety purposes only (canít record in MA without warrant). Looking for compact, wireless system for street level buys. Currently have 10-year old body wire with large suitcase receiver. Looking to reduce size and increase efficiency of receiver and come up with compact (easy conceal) transmitter, preferably wireless one.î ìWe need to install some audio intelligence systems in Saudi Arabia. Please send me the catalog. If SGT {removed} is not available direct calls to SFC {removed}. I am well pleased with the products from your company so far. Keep up the good work.î î ìWe have a persistent theft problem in our mill. We are looking for covert cameras that are either capable of withstanding a severe industrial environment or are cheap enough to be ëdisposable.í We have significant RF to overcome yet hard wiring is difficult or impossible in some situations. If you have any products to recommend we would appreciate your feed back.î Other U.S. agencies requesting information from AID included the U. S. Postal Inspection Service, the Centers for Disease Control and Prevention, the U.S. Border Patrol, the U.S. Customs Service, the Bureau of Land Management, and the Drug Enforcement Administration Internationally, catalog requesters included the Guam Police Department, the British Consulate, the National Bureau of Investigation of the Philippines, and Sao Paulo police department in Brazil. Inclusion in the stolen data means only a government worker from the agency was interested in pricing surveillance equipment; it does not necessarily mean the agency actually uses hidden cameras or other spy-like devices. [Non-text portions of this message have been removed] 6071 From: Charles P. Date: Wed Aug 21, 2002 10:03pm Subject: Re: CSD-18????? re: CSD-18 > You opinions would be useful... > worthless 6072 From: Ben Evans Date: Wed Aug 21, 2002 9:05pm Subject: Re: CSD-18????? It looks like a private investigators wannabe bug detector. ;-) Here's a "off the top of my head" shortcomings of the product: - Finds a bug? What is the frequency, it doesn't tell you. - Doesn't go above 5GHz - It blinks red if there is a telephone tap? This is cute. - Claims to detect infinity transmitters yet doesn't emit any tones to turn one on. - Claims to find "any recording devices". If I wire up a simple battery powered digital recorder to the lines, it will not find this. (A TDR or physical search would). - Telephone taps to be found are only voltage dependant ones, and it still doesn't tell you *where* the tap is or if the tap is legitimate. Just blinks a red light. That's just a partial list of the reasons this product is useless. It's a "high tech" spy shop toy. Nothing more. They even have the "SBD-5A" which if you are within 25 feet of a video camera it will alert you to its presence? Surrrre. :-) While I admit I have no experience with the company or John Meyner, just from looking at their website, their products are loaded with poop. A simple voltage meter for the phone lines and a 5GHz frequency counter is all the product really is. -Ben At 05:15 PM 8/21/2002 +0000, spyworldltd wrote: >Great Southern Security produce a RFD that has a range just short of >5Khz, John Meyner is mentioned all over the site and makes a number >of positive statements about his CDS-18. > >My question is this, does anybody have any opinions experience with >Great Southern Security (positive or negative)or of John Meyner. I >have attached a link below. > >http://www.greatsouthernsecurity.com/cardor7n.htm > >You opinions would be useful... > >Cheers > >David Emery >Spyworld Ltd >Tel. +44 8701 206185 >Fax. +44 08701 206186 >Mob. +44 7971 187561 >Email. david-emery@s... > >E&OE > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ----------------------------------------------- Counter Intelligence Solutions Group, Inc. http://www.cisginc.com/ http://www.slantback.com Automobile Collection 585.889.2321(v) 585.889.0823(f) ----------------------------------------------- 6073 From: Gregory Perry Date: Wed Aug 21, 2002 10:04pm Subject: RE: RE: Remember....The Reichstag Fire Plot (long post warning) BERLIN (AP) - Recounting the five hours he was held hostage by gunmen, Iraq's acting ambassador said Wednesday that he is convinced his captors were either Israeli or American agents whose goal was to raise German support for a U.S. attack on Baghdad. http://www.guardian.co.uk/worldlatest/story/0,1280,-1961731,00.html "Oil that is... Black gold... Texas T!" -- The Beverly Hillbillies The following message was sent by "Aimee Farr" on Wed, 21 Aug 2002 19:18:39 -0500. > w/in 24 after my long-winded fret about blame-game operations to discredit > intelligence agencies, I give you, "The Reichstag Fire Plot." (I didn't > mean > to sound nasty, just humor.) > > [1] > http://www.nytimes.com/2002/08/21/international/europe/21GERM.html?todayshea > dlines > [2] > http://www.washingtonpost.com/ac2/wp-dyn/A42041-2002Aug20?language=printer > "BERLIN, Aug. 20 -- German police stormed the Iraqi Embassy here this > evening, freeing two hostages and ending a five-hour occupation of the > mission by a previously unknown Iraqi opposition group urging the ouster > of > President Saddam Hussein, officials said." > > ----- > > Rather than garner any German support, which the story tends to implicate, > my guess would be that somebody wants to drive a wedge between the U.S. > and > Germany. > > Looks scripted to implicate the U.S. (scripted for the media, that is). > It's > a transparent sort of layered deception, allowing you to place the "doubt" > (the blame comes later, for people that are predisposed to it) on somebody > else, congruent with somebody else's interests. It's very nature introduces > conspiracy, and linkage to the patsy. (i.e., linkages of "Democratic," > offers a mutually-consistent motive, etc.) > > The post-incident comments work on known prejudices and are associated-truth > whisper-scripts. Deniable, but they have their intended effect. (Historical > example: "Stalin is visiting for a rest cure" carried the meaning "friendly > relations continue between Germany and Russia.") Those sort of comments > aren't usually off-the-cuff. These days, increasingly carried by anonymous > sources. > > The media won't explain this phenomenon, rarely go beyond mere source > attribution, and refuse to point to the possibility of deception. If > anything, they tend to milk the story...which incredulously intimidates > U.S. > involvement. Deception hits their invulnerability bias, and like > intelligence analysts, admitting to deception makes them question some > basic > belief structures. It's too complicated, too awkward, and doesn't sell > print > or make a career. Seems like old-fashioned journalists were a bit smarter, > asked more questions, and responsible. > > I also note this was near the terrorist 3-shot suicide, which plays off > a > time-correlation tactic to fuel speculation. While probably not intentional, > a suspicious "deceptive correlation," as people are inclined to see events > that occur in close time-proximity as somehow related. (The recent "cache" > of terrorist tapes on CNN "ended" with a Sept. 11 tape, which could be > designed to reinforce the Sept. 11 connection to OBL, and reinforce the > focus on Afghanistan (away from Iraq), by playing on events-in-motion to > suggest a chronological and a cause-effect relationship. I found the little > biochem doggie clip rather interesting, too.) > > I said...."Notably, on the heels of a 'propaganda offensive' is > often....something bad." > > And, at first blush, there it is. > > Somebody needs to get their "APPROVED" stamp out and take it for 10 laps > around their desk. > > I wasn't knocking our agencies, anything but. I'm advocating new > capabilities, or the resurrection of old ones. Our communication dynamics > and mass perceptual filters have changed since the 70s, and even early > 80s. > These blame ops affect my long-term security, and I have every right to > be > mad about this, himf. > > ~Aimee > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6074 From: Steve Uhrig Date: Wed Aug 21, 2002 10:39pm Subject: Re: CSD-18????? On 21 Aug 2002 at 17:15, spyworldltd wrote: > Great Southern Security produce a RFD that has a range just short of > 5Khz, 5 kc must be a mistake. Do you mean Gig instead of Kilo? 5kc essentially is DC relative to RF surveillance. Of course, some of us feel anything below a few gigs is useful only for audio or I.F., but that's a different story. > My question is this, does anybody have any opinions experience with > Great Southern Security (positive or negative) I was a guest recently in the home of a PI who proudly showed me his new CSD-18, and explained how he had learned to use it one evening and now was equipped to do his own sweeps. He formerly had contracted them to me. The 10% referral I paid him typically would buy 2 of the GSS boxes, but he thinks he's a badass sweeper now, as do all who buy these things. The world knows Jim Ross and I are the only badass sweepers around. I had him unplug his 49 megacycle analog cordless phone from its base so as not to be connected to the CO, and take the handset off hook. I hid it in his kid's bedroom under a crib. And invited him to find the handset. He even knew it was upstairs. He didn't find it. When I showed it to him, we literally had to touch the antennas to get a reading on the GSS piece of crap. We were operating it according to instructions. I went out to my truck and tuned a Yaesu amateur wideband coverage portable to the cordless frequency range. I spun the dial and found the phone in seconds, all the way at the other end of the house. And it was full quieting. I did this more to prove the handset was transmitting with some reasonable amount of power and had a decent battery. I buy and sell used TSCM equipment. I get offers and inquiries worldwide from people buying and selling TSCM gear. I've had perhaps 50 GSS boxes offered to me over the years, and I offer $25 shipped and frankly would not take one for the cost of shipping it. I've never had a request from anyone to buy one. Of course, the owners get all pissed off because they paid so much for the thing and can't use it, can't earn a penny with it let alone $250/hour as claimed, and can't get anything for it resale. I don't know the gentleman you mentioned, but if he is involved with selling GSS garbage, he's selling snake oil and knows it. Extrapolate from there. They also sell a body wire pocket RF detector. Someone I swept a while back had bought one. It didn't trigger on my 5 watt UHF portable -- a Motorola Systems Saber III on conventional 460 -- in the same room. It did trip when I got within perhaps 5 feet, and that was with 5 watts into the antenna. At a few milliwatts typical of most RF bugs, I am certain the thing would have to be touching it to detect it. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6075 From: James M. Atkinson Date: Wed Aug 21, 2002 10:34pm Subject: Re: CSD-18????? The Great Southern Security products are worthless trash being fraudulently offered. The equipment does not work are claimed, the quality is amazingly poor, and they flat out lie in their advertising. -jma At 5:15 PM +0000 8/21/02, spyworldltd wrote: >Great Southern Security produce a RFD that has a range just short of >5Khz, John Meyner is mentioned all over the site and makes a number >of positive statements about his CDS-18. > >My question is this, does anybody have any opinions experience with >Great Southern Security (positive or negative)or of John Meyner. I >have attached a link below. > >http://www.greatsouthernsecurity.com/cardor7n.htm > >You opinions would be useful... > >Cheers > >David Emery >Spyworld Ltd >Tel. +44 8701 206185 >Fax. +44 08701 206186 >Mob. +44 7971 187561 >Email. david-emery@s... -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6076 From: Matt Paulsen Date: Thu Aug 22, 2002 0:12am Subject: RE: RE: Remember....The Reichstag Fire Plot (long post warning) In the entertainment industry they call this a media stunt. The INA's website on this is a good example of positioning... http://www.uruklink.net/iraqnews/enews24.htm Notice no mention of outcome, and "those terrorists" are listed as American Zionists (American Jewish/Israeli state/nation supporters) prior to the release of the prisoners and the development of the article that was posted, interesting how a closed hostage environment can yield such detailed information about previously unknown terrorists to an entire country. ------------------------------------------------------- Baghdad, August 21, INA ìTerrorist gunmen from American and Zionist intelligence squads attacked the Iraqi embassy in Berlin leaving one employee wounded, and arrested the rest of employees inside the buildingî, a spokesman for Iraqi Foreign Ministry told INA Tuesday. Iraqi Foreign Ministry is making contacts with German authorities to make the necessary procedures to evacuate the building and oust those terrorists, and protect employees from such terrorist attack ------------------------------------------------------- Thanks, Matt Paulsen President/CEO Orange Networks LLC P: 503.892.8786 F: 503.892.8794 -----Original Message----- From: Gregory Perry [mailto:gvp@c...] Sent: Wednesday, August 21, 2002 8:04 PM To: aimee.farr@p...; TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] RE: Remember....The Reichstag Fire Plot (long post warning) BERLIN (AP) - Recounting the five hours he was held hostage by gunmen, Iraq's acting ambassador said Wednesday that he is convinced his captors were either Israeli or American agents whose goal was to raise German support for a U.S. attack on Baghdad. http://www.guardian.co.uk/worldlatest/story/0,1280,-1961731,00.html "Oil that is... Black gold... Texas T!" -- The Beverly Hillbillies The following message was sent by "Aimee Farr" on Wed, 21 Aug 2002 19:18:39 -0500. > w/in 24 after my long-winded fret about blame-game operations to discredit > intelligence agencies, I give you, "The Reichstag Fire Plot." (I didn't > mean > to sound nasty, just humor.) > > [1] > http://www.nytimes.com/2002/08/21/international/europe/21GERM.html?todayshea > dlines > [2] > http://www.washingtonpost.com/ac2/wp-dyn/A42041-2002Aug20?language=printer > "BERLIN, Aug. 20 -- German police stormed the Iraqi Embassy here this > evening, freeing two hostages and ending a five-hour occupation of the > mission by a previously unknown Iraqi opposition group urging the ouster > of > President Saddam Hussein, officials said." > > ----- > > Rather than garner any German support, which the story tends to implicate, > my guess would be that somebody wants to drive a wedge between the U.S. > and > Germany. > > Looks scripted to implicate the U.S. (scripted for the media, that is). > It's > a transparent sort of layered deception, allowing you to place the "doubt" > (the blame comes later, for people that are predisposed to it) on somebody > else, congruent with somebody else's interests. It's very nature introduces > conspiracy, and linkage to the patsy. (i.e., linkages of "Democratic," > offers a mutually-consistent motive, etc.) > > The post-incident comments work on known prejudices and are associated-truth > whisper-scripts. Deniable, but they have their intended effect. (Historical > example: "Stalin is visiting for a rest cure" carried the meaning "friendly > relations continue between Germany and Russia.") Those sort of comments > aren't usually off-the-cuff. These days, increasingly carried by anonymous > sources. > > The media won't explain this phenomenon, rarely go beyond mere source > attribution, and refuse to point to the possibility of deception. If > anything, they tend to milk the story...which incredulously intimidates > U.S. > involvement. Deception hits their invulnerability bias, and like > intelligence analysts, admitting to deception makes them question some > basic > belief structures. It's too complicated, too awkward, and doesn't sell > print > or make a career. Seems like old-fashioned journalists were a bit smarter, > asked more questions, and responsible. > > I also note this was near the terrorist 3-shot suicide, which plays off > a > time-correlation tactic to fuel speculation. While probably not intentional, > a suspicious "deceptive correlation," as people are inclined to see events > that occur in close time-proximity as somehow related. (The recent "cache" > of terrorist tapes on CNN "ended" with a Sept. 11 tape, which could be > designed to reinforce the Sept. 11 connection to OBL, and reinforce the > focus on Afghanistan (away from Iraq), by playing on events-in-motion to > suggest a chronological and a cause-effect relationship. I found the little > biochem doggie clip rather interesting, too.) > > I said...."Notably, on the heels of a 'propaganda offensive' is > often....something bad." > > And, at first blush, there it is. > > Somebody needs to get their "APPROVED" stamp out and take it for 10 laps > around their desk. > > I wasn't knocking our agencies, anything but. I'm advocating new > capabilities, or the resurrection of old ones. Our communication dynamics > and mass perceptual filters have changed since the 70s, and even early > 80s. > These blame ops affect my long-term security, and I have every right to > be > mad about this, himf. > > ~Aimee > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6077 From: Secdep Date: Thu Aug 22, 2002 2:36am Subject: Sometimes it DOES take a Rocket Scientist!! Sometimes it DOES take a Rocket Scientist!! Scientists at NASA built a gun specifically to launch dead chickens at the windshields of airliners, military jets and the space shuttle, all travelling at maximum velocity. The idea is to simulate the frequent incidents of collisions with airborne fowls to test the strength of the windshields. British engineers heard about the gun and were eager to test it on the windshields of their new high-speed trains. Arrangements were made, and a gun was sent to the British engineers. When the gun was fired, the engineers stood shocked as the chicken hurled out of the barrel, crashed into the shatterproof shield, smashed it to smithereens, blasted through the control console, snapped the engineer's backrest in two and embedded itself in the back wall of the cabin, like an arrow shot from a bow. The horrified Brits sent NASA the disastrous results of the experiment, along with the designs of the windshield and begged the US scientists for suggestions. NASA responded with a one-line memo: " Defrost the chicken" --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za 6078 From: Steve Uhrig Date: Thu Aug 22, 2002 0:16pm Subject: Everyone please check Hi all, Two of us are investigating the strong likelihood of someone's machine on this list being infected with a minimum of the Klez virus, and possibly others. Anyone having these two email addresses in their address book, please contact me ASAP off list: minox@s... AND 1rcm@m... OR 1rcm@e... In other words, if you have minox@s... in your address book, then check to see if you have EITHER of the 1rcm addresses. Also, whether they are in your email address book or not, if you recall emailing one or the other addresses within the last few months, I would appreciate an email off list. If we turn up anything of substance I will report back. ANYONE not running either McAfee or Norton Anti Virus AND updating definitions daily is a bloody fool. Anyone using ANY Microsoft application as an email client also is a bloody fool. Much better is Pegasus, www.pmail.com, which is free, elegant, and immune from viruses unless you go out of your way to manually open virus executables. No, I did not get a virus. However, one tried to work its way in, and my server caught it before I even downloaded. Once I permitted the header only to download, Norton caught it. I've intercepted an average of 50 new variations of the Klez virus per day most of this week, down from the usual 5 to 10. Thanks .... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6079 From: Aimee Farr Date: Thu Aug 22, 2002 3:26pm Subject: RE: RE: Remember....The Reichstag Fire Plot > In the entertainment industry they call this a media stunt. > > The INA's website on this is a good example of positioning... > http://www.uruklink.net/iraqnews/enews24.htm Notice no mention > of outcome, > and "those terrorists" are listed as American Zionists (American > Jewish/Israeli state/nation supporters) Obvious attempt to implicate and discredit American intelligence -- planned with finger paint. Which begs the question, "Just how dumb do you think we are?" (Answer: WAY DUMB.) See, you can't even make fun of it, it just invites an return-insult. Maddening. The telling part is the immediacy. It violated the "work principle" -- you believe something more if you have to work the conclusion out for yourself. Here, innuendo was the surface feature. The conveyance was immediate. Perhaps it indicates who it is aimed for, and for what ultimate purpose? With some of this recent brouhaha, it seems to take only seconds for many people to "work out" ONE ANSWER. In my opinion, it's one somebody has planned for them -- U.S. intelligence manipulation of their perceptions, or "dirty tricks." (Just go sit in a coffee shop with CNN on, and somebody is sure to make a negative comment.) It doesn't occur to people that somebody else might have a mutually-consistent motive that they attribute to U.S. interests. Nothing makes the American public hotter under the collar, or destroys trust, more than an insinuation along "Gulf of Tonkin story-lines." Most people, at some point or another, have been imprinted by these stories, lending certain lines of speculation the patina of plausibility. Mentally, we use stories as patterns, and without realizing it, we use them to "fill in the missing pieces" when we are presented with a new story. -Think some people might be well aware of that fact and seek to use it to their advantage? -Think they might use it to lay a line of bull to discredit American intelligence and covert action abroad? -Think they might use an American intelligence perceptual patsy to effectuate cover for their own operations -- everything from perception management to assassinations? -Think they might actually go so far as to do it "obviously" for leverage? Fiddle-dee-dee, who I am to say, but history suggests they might. ~Aimee 6080 From: Matt Paulsen Date: Thu Aug 22, 2002 4:01pm Subject: RE: RE: Remember....The Reichstag Fire Plot Our friends at cryptome are having fun compiling information. http://cryptome.org/cia-raid.htm [Non-text portions of this message have been removed] 6081 From: Fernando Martins Date: Thu Aug 22, 2002 4:10pm Subject: RE: Everyone please check http://www.f-secure.com/v-descs/klez.shtml http://www.f-secure.com/v-descs/elkern.shtml ftp://ftp.europe.f-secure.com/anti-virus/tools/fsklez.exe ftp://ftp.europe.f-secure.com/anti-virus/tools/kleztool.zip http://www.f-secure.com/virus-info/u-vbs/remove-vbs-w95.shtml http://www.f-secure.com/virus-info/u-vbs/uninstall-vbs.shtml http://www.f-secure.com/virus-info/u-vbs/remove-vbs-w2k.shtml http://www.f-secure.com/virus-info/u-vbs/remove-vbs-nt4.shtml http://www.microsoft.com/windows/ie/downloads/critical/q290108/default.a sp http://www.hbedv.com/download/download.htm http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=pegasus http://www.iss.net/security_center/search.php?type=2&pattern=pegasus&sor t=score&display=all&show=10 http://www.annoyances.org/exec/show/article09-115 Is Windows a Virus? =================== No, Windows is not a virus. Here's what viruses do: They replicate quickly - okay, Windows does that. Viruses use up valuable system resources, slowing down the system as they do so - okay, Windows does that. Viruses will, from time to time, trash your hard disk - okay, Windows does that too. Viruses are usually carried, unknown to the user, along with valuable programs and systems. Sigh... Windows does that, too. Viruses will occasionally make the user suspect their system is too slow (see 2) and the user will buy new hardware. Yup, that's with Windows, too. Until now it seems Windows is a virus but there are fundamental differences: Viruses are well supported by their authors, are running on most systems, their program code is fast, compact and efficient and they tend to become more sophisticated as they mature. So Windows is not a virus. It's a bug. 6082 From: Date: Thu Aug 22, 2002 2:15pm Subject: Special Court Rejects Ashcroft Rules Special Court Rejects Ashcroft Rules WASHINGTON (AP) - A special court that oversees sensitive law enforcement surveillance forced Attorney General John Ashcroft to change his guidelines for FBI terrorism searches and wiretaps, according to documents released Thursday. The U.S. Foreign Intelligence Surveillance Court, which has not publicly disclosed any of its rulings in nearly two decades, rejected some of the Ashcroft guidelines in May as ``not reasonably designed'' to safeguard the privacy of Americans. The Justice Department quickly amended its guidelines and won the court's approval. The court also disclosed the FBI acknowledged making more than 75 mistakes in applications for espionage and terrorism warrants under the surveillance law, including one instance in which former Director Louis Freeh gave inaccurate information to judges. ``How these misrepresentations occurred remains unexplained to the court,'' the special court said. The court's May 17 orders, signed by U.S. District Judge Royce Lamberth, were disclosed Thursday to the Senate Judiciary Committee, which has raised questions about the Justice Department's use of wiretap laws in espionage and terrorism cases. The court, now headed by U.S. District Judge Colleen Kollar-Kotelly, said it intended separately to publish the rulings and promised similarly to disclose any future unclassified orders. Ashcroft's instructions in March, in a memorandum to FBI Director Robert Mueller and senior Justice officials, made it easier for investigators in espionage and terrorism cases to share information from searches or wiretaps with FBI criminal investigators. But the surveillance court, which approves requests during secret deliberations, found that Ashcroft's rules could allow misuse of information in criminal cases, where prosecutors must meet higher legal standards to win approval for searches or wiretaps. ``These procedures cannot be used by the government to amend the (surveillance) act in ways Congress has not,'' the court wrote. In its rare public rebuke, it said the Justice Department spent ``considerable effort'' arguing its case, ``but the court is not persuaded.'' Ashcroft had argued that, under changes authorized by the USA Patriot Act, the FBI could use the surveillance law to perform searches and wiretaps ``primarily for a law enforcement purpose, so long as a significant foreign intelligence purpose remains.'' The Patriot Act, passed late in 2001, changed the surveillance law to permit its use when collecting information about foreign spies or terrorists is ``a significant purpose,'' rather than ``the purpose,'' of such an investigation. Critics at the time said they feared government might use the change as a loophole to employ espionage wiretaps in common criminal investigations. ``The attorney general seized authority that has not been granted to him by the constitution or the Congress,'' said Marc Rotenberg, head of the Washington-based Electronic Privacy Information Center. In a follow-up order also disclosed Thursday, the court accepted new Justice guidelines amending Ashcroft's instructions. The court also demanded to be told about any criminal investigations of targets under the surveillance act and about discussions between the FBI and prosecutors at Justice. ``The first Ashcroft order sort of snugged up against the new line that was being drawn, and that may not have been prudent,'' said Stewart Baker, an expert on the law and former general counsel at the National Security Agency. ``You might be able to justify it legally, but I can see why the court would have reacted badly.'' Stewart called the surveillance law ``a pretty heavy-duty weapon.'' Critics have worried that the surveillance court is too closely allied with the government, noting that judges have rarely denied a request under the 1978 law. But the newly disclosed court's orders indicated irritation with serious FBI blunders in 2000 and 2001. The court said the FBI admitted in September 2000 to mistakes in 75 wiretap applications, including then-FBI Director Freeh's erroneous statement to judges that the target of a wiretap request wasn't also under criminal investigation. The court also noted that in March 2000, information from espionage wiretaps in at least four cases was passed illegally to FBI criminal investigators and U.S. prosecutors in New York. Clearly frustrated, the court said it barred one FBI agent from appearing before it. The FBI admitted more recently, in March 2001, that it inappropriately shared surveillance information among a squad of agents, the court said. 08/22/02 19:04 EDT 6083 From: Matt Paulsen Date: Thu Aug 22, 2002 10:15pm Subject: RE: RE: Remember....The Reichstag Fire Plot It appears Cryptome pulled our posts from http://cryptome.org/cia-raid.htm. Interesting. It's a magic trick.. Now you see it now you don't. Thanks, Matt Paulsen President/CEO Orange Networks LLC P: 503.892.8786 F: 503.892.8794 -----Original Message----- From: Matt Paulsen [mailto:mpaulsen6@a...] Sent: Thursday, August 22, 2002 2:02 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] RE: Remember....The Reichstag Fire Plot Our friends at cryptome are having fun compiling information. http://cryptome.org/cia-raid.htm [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6084 From: Date: Fri Aug 23, 2002 4:16am Subject: RE: RE: Remember....The Reichstag Fire Plot On 23 Aug 2002 at 1:15, Gregory Perry wrote: > One entry found for pedant. Ow. .....But I am much more than a pedant. I am often mistaken, certainly never perfectly right, and always misunderstood. On the good side, my faults are stunningly obvious. Please accept my apologies. ~Aimee 6085 From: Date: Fri Aug 23, 2002 5:21am Subject: News from the Associated Press.txt -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG ---------- News from the Associated Press [Non-text portions of this message have been removed] 6086 From: iDEN-i100 Date: Fri Aug 23, 2002 6:09am Subject: FBI Raids Firm After Hacking Claim AUGUST 22, 19:00 ET FBI Raids Firm After Hacking Claim SAN DIEGO (AP) ≠ The FBI raided the offices of a consulting firm after a newspaper trumpeted the company's claims that it found security loopholes in U.S. military computers. In demonstrating how easy it was to penetrate sensitive military computers, four-month-old ForensicTec Solutions may have violated federal law prohibiting unauthorized intrusions. The FBI raided the offices of the San Diego firm over the weekend. ForensicTec said it identified 34 military sites where they said network security was easily compromised, including Army computers at Fort Hood, Texas; NASA's Ames Research Center in Northern California and Navy facilities in Maryland and Virginia. The company reportedly used free software to identify vulnerable computers and then peruse hundreds of confidential files containing military procedures, e-mail, Social Security numbers and financial data. The company's president, Brett O'Keeffe, told The Post that its goal was to call attention to the need for better security and ``get some positive exposure'' for the fledgling firm. Hours after the claims were reported in a front page article Friday in The Washington Post, the FBI began searching the firm's offices. A spokesman for ForensicTec did not immediately return a phone call Thursday from The Associated Press. The FBI confirmed the search, but a spokesman declined to discuss the case. Army investigators also joined the investigation. ``Regardless of the stated intent, unauthorized entry into Army computer systems is a federal offense,'' said Marc Raimondi, spokesman for the Army Criminal Investigation Command in Virginia. ``If there is an intrusion and we are notified or we detect it, then we lauch a criminal investigation into the act.'' Even though the raid may look to some like retribution, Mark Rasch, the Justice Department's former top computer crimes prosecutor, said ForensicTec stepped over the line. ``Just because you can break into Army computers doesn't mean you either should do it, have a right to do it, or can avoid criminal liability for doing it,'' Rasch said. ForensicTec should have gotten permission from the Army before probing their computers, Rasch said. ``They thought they were doing a public service,'' Rasch said. ``What they did, at best, was exercised a monumental lack of judgment.'' r -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 6087 From: Date: Fri Aug 23, 2002 3:33am Subject: White House Appeals Wiretap Ruling White House Appeals Wiretap Ruling WASHINGTON (AP) - Setting up the next showdown over anti-terrorism powers, the Bush administration appealed a court ruling that forced Attorney General John Ashcroft to change new guidelines for FBI terrorism searches and wiretaps. Documents released Thursday showed that the U.S. Foreign Intelligence Surveillance Court, which has not publicly disclosed any of its rulings in nearly two decades, rejected some of Ashcroft's guidelines as ``not reasonably designed'' to safeguard the privacy of Americans. The secretive court oversees government's most sensitive surveillance efforts. The Justice Department amended the guidelines and won the court's approval. But the Bush administration it was appealing the court's restrictions, arguing that the new limits inhibit the sharing of information between terrorism investigators and criminal investigators. The Justice Department declined to release a copy of the appeal Thursday night to reporters. Officials said it was coincidence that the appeal was filed the same day the court's May 17 order was made public. The court also disclosed the FBI acknowledged making more than 75 mistakes in applications for espionage and terrorism warrants under the surveillance law, including one instance in which former Director Louis Freeh gave inaccurate information to judges. ``How these misrepresentations occurred remains unexplained to the court,'' the special court said. The court's orders, signed by U.S. District Judge Royce Lamberth, were disclosed to the Senate Judiciary Committee, which has raised questions about the Justice Department's use of wiretap laws in espionage and terrorism cases. The court, now headed by U.S. District Judge Colleen Kollar-Kotelly, said it intended separately to publish the rulings and promised similarly to disclose any future unclassified orders. Congress last year passed and President Bush signed the USA Patriot Act, which among other things loosened standards for obtaining warrants. In March, Ashcroft, in a memorandum to FBI Director Robert Mueller and senior Justice officials, made it easier for investigators in espionage and terrorism cases to share information from searches or wiretaps with FBI criminal investigators. But the surveillance court, which considers federal search and wiretap requests in secret under the 1978 Foreign Intelligence Surveillance Act, found that Ashcroft's rules could allow misuse of information in criminal cases. Prosecutors in criminal cases must meet higher legal standards to win approval for searches or wiretaps. ``These procedures cannot be used by the government to amend the (surveillance) act in ways Congress has not,'' the court wrote. In its rare public rebuke, it said the Justice Department spent ``considerable effort'' arguing its case, ``but the court is not persuaded.'' Justice spokeswoman Barbara Comstock said that the decision hampers use of the surveillance law. ``They have in our view incorrectly interpreted the Patriot Act, and the effect of that incorrect interpretation is to limit the kind of coordination that we think is very important,'' she said. Ashcroft had argued that, under changes authorized by the Patriot Act, the FBI could use the 1978 surveillance law to perform searches and wiretaps ``primarily for a law enforcement purpose, so long as a significant foreign intelligence purpose remains.'' Critics of the 1978 law said it may have hampered the federal investigation of Zacarias Moussaoui prior to the Sept. 11 attacks. Moussaoui now is awaiting trial on conspiracy charges in the attacks. The Patriot Act changed the surveillance law to permit its use when collecting information about foreign spies or terrorists is ``a significant purpose,'' rather than ``the purpose'' of an investigation. Critics at the time said they feared government might use the change to employ espionage wiretaps in common criminal investigations. ``The attorney general seized authority that has not been granted to him by the Constitution or the Congress,'' said Marc Rotenberg, head of the Washington-based Electronic Privacy Information Center. In a follow-up order also disclosed Thursday, the court accepted new Justice guidelines amending Ashcroft's instructions. The court also demanded to be told about any criminal investigations of targets under the surveillance act and about discussions between the FBI and prosecutors at Justice. ``The first Ashcroft order sort of snugged up against the new line that was being drawn, and that may not have been prudent,'' said Stewart Baker, an expert on the law and former general counsel at the National Security Agency. ``You might be able to justify it legally, but I can see why the court would have reacted badly.'' Critics have worried that the surveillance court is too closely allied with the government, noting that judges have rarely denied a request under the 1978 law. But the newly disclosed court's orders indicated irritation with serious FBI blunders in 2000 and 2001. The court said the FBI admitted in September 2000 to mistakes in 75 wiretap applications, including Freeh's erroneous statement to judges that the target of a wiretap request wasn't also under criminal investigation 6088 From: infospy_com Date: Thu Aug 22, 2002 11:57am Subject: Optoelectronics Malfunctions Hi Group, I have bought a few pieces from Optoelectronics and they all seem to go bad (do not work) after a few months. Has anyone else experienced this? Thanks, Bruce Info@I... Infospy.Com 6089 From: atsi999 Date: Thu Aug 22, 2002 10:39pm Subject: Telephone Analyzer Recommendations I am in the market for a telephone analyzer to test business telephone instruments. I was wondering what models the group would recommend. I am leaning towards the ISA ETA-3A, but was wondering what other models the group uses or recommends. Jeff Evert 6090 From: Gregory Perry Date: Fri Aug 23, 2002 1:15am Subject: RE: RE: Remember....The Reichstag Fire Plot One entry found for pedant. Main Entry: ped∑ant Pronunciation: 'pe-d&nt Function: noun Etymology: Middle French, from Italian pedante Date: 1588 1 obsolete : a male schoolteacher 2 a : one who makes a show of knowledge b : one who is unimaginative or who unduly emphasizes minutiae in the presentation or use of knowledge c : a formalist or precisionist in teaching Main Entry: pe∑dan∑tic Pronunciation: pi-'dan-tik Function: adjective Date: circa 1600 1 : of, relating to, or being a pedant 2 : narrowly, stodgily, and often ostentatiously learned 3 : UNIMAGINATIVE, PEDESTRIAN - pe∑dan∑ti∑cal∑ly /-'dan-ti-k(&-)lE/ adverb One entry found for pedagogue. Main Entry: ped∑a∑gogue Variant(s): also ped∑a∑gog /'pe-d&-"g‰g/ Function: noun Etymology: Middle English pedagoge, from Middle French, from Latin paedagogus, from Greek paidagOgos, slave who escorted children to school, from paid- ped- + agOgos leader, from agein to lead -- more at AGENT Date: 14th century : TEACHER, SCHOOLMASTER; especially : a dull, formal, or pedantic teacher The following message was sent by "Aimee Farr" on Thu, 22 Aug 2002 15:26:38 -0500. > Obvious attempt to implicate and discredit American intelligence -- planned > with finger paint. Which begs the question, "Just how dumb do you think > we > are?" (Answer: WAY DUMB.) See, you can't even make fun of it, it just > invites an return-insult. Maddening. > > The telling part is the immediacy. It violated the "work principle" -- > you > believe something more if you have to work the conclusion out for yourself. > Here, innuendo was the surface feature. The conveyance was immediate. > Perhaps it indicates who it is aimed for, and for what ultimate purpose? > > With some of this recent brouhaha, it seems to take only seconds for many > people to "work out" ONE ANSWER. In my opinion, it's one somebody has > planned for them -- U.S. intelligence manipulation of their perceptions, > or > "dirty tricks." (Just go sit in a coffee shop with CNN on, and somebody > is > sure to make a negative comment.) It doesn't occur to people that somebody > else might have a mutually-consistent motive that they attribute to U.S. > interests. > > Nothing makes the American public hotter under the collar, or destroys > trust, more than an insinuation along "Gulf of Tonkin story-lines." Most > people, at some point or another, have been imprinted by these stories, > lending certain lines of speculation the patina of plausibility. Mentally, > we use stories as patterns, and without realizing it, we use them to "fill > in the missing pieces" when we are presented with a new story. > > -Think some people might be well aware of that fact and seek to use it > to > their advantage? > > -Think they might use it to lay a line of bull to discredit American > intelligence and covert action abroad? > > -Think they might use an American intelligence perceptual patsy to > effectuate cover for their own operations -- everything from perception > management to assassinations? > > -Think they might actually go so far as to do it "obviously" for leverage? > > > Fiddle-dee-dee, who I am to say, but history suggests they might. > > ~Aimee > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6091 From: Matt Paulsen Date: Fri Aug 23, 2002 10:11am Subject: RE: FBI Raids Firm After Hacking Claim Like that wasn't an obvious outcome. Reminds me of a potential customer that wouldn't sign a master services agreement but wanted me to hack his WAP. Yea, right. -----Original Message----- From: iDEN-i100 [mailto:Marcelrf@B...] Sent: Friday, August 23, 2002 4:10 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] FBI Raids Firm After Hacking Claim AUGUST 22, 19:00 ET FBI Raids Firm After Hacking Claim SAN DIEGO (AP) ≠ The FBI raided the offices of a consulting firm after a newspaper trumpeted the company's claims that it found security loopholes in U.S. military computers. In demonstrating how easy it was to penetrate sensitive military computers, four-month-old ForensicTec Solutions may have violated federal law prohibiting unauthorized intrusions. The FBI raided the offices of the San Diego firm over the weekend. ForensicTec said it identified 34 military sites where they said network security was easily compromised, including Army computers at Fort Hood, Texas; NASA's Ames Research Center in Northern California and Navy facilities in Maryland and Virginia. The company reportedly used free software to identify vulnerable computers and then peruse hundreds of confidential files containing military procedures, e-mail, Social Security numbers and financial data. The company's president, Brett O'Keeffe, told The Post that its goal was to call attention to the need for better security and ``get some positive exposure'' for the fledgling firm. Hours after the claims were reported in a front page article Friday in The Washington Post, the FBI began searching the firm's offices. A spokesman for ForensicTec did not immediately return a phone call Thursday from The Associated Press. The FBI confirmed the search, but a spokesman declined to discuss the case. Army investigators also joined the investigation. ``Regardless of the stated intent, unauthorized entry into Army computer systems is a federal offense,'' said Marc Raimondi, spokesman for the Army Criminal Investigation Command in Virginia. ``If there is an intrusion and we are notified or we detect it, then we lauch a criminal investigation into the act.'' Even though the raid may look to some like retribution, Mark Rasch, the Justice Department's former top computer crimes prosecutor, said ForensicTec stepped over the line. ``Just because you can break into Army computers doesn't mean you either should do it, have a right to do it, or can avoid criminal liability for doing it,'' Rasch said. ForensicTec should have gotten permission from the Army before probing their computers, Rasch said. ``They thought they were doing a public service,'' Rasch said. ``What they did, at best, was exercised a monumental lack of judgment.'' r -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6092 From: Steve Uhrig Date: Fri Aug 23, 2002 10:20am Subject: Telephone Analyzer Recommendations On 23 Aug 2002 at 3:39, atsi999 wrote: > I am in the market for a telephone analyzer to test business > telephone instruments. I was wondering what models the group would > recommend. I am leaning towards the ISA ETA-3A, but was wondering > what other models the group uses or recommends. Jeff, you will find telephone analyzers have very little contemporary following. I don't know anyone personally who uses one. Back when the phones were electromechanical, it was a different story. Multiple pair combinations were involved with 25^2 possibilities, high voltages to trip hookswitch bypasses was used, electronics wasn't. A telephone analyzer is not much more than a few standard pieces of test equipment packaged in a convenient carrying case. They work, but are expensive and of limited utility. You will find competent sweepers using two main tools: a decent DVM (Digital Volt-ohm Meter) like one of the Fluke series, and a TDR (Time Domain Reflectometer), with Riser Bond www.riserbond.com being the best in my opinion having owned, bought and sold every model they sell and using one for fifteen years in my own work. Ted Swift wrote a superb book, described on his webpage: http://www.angelfire.com/biz/investigator/index.html on telephone sweeping. It's understandable, not too technical, but holds you by the hand and takes you through telephone countermeasures. It's cheap, and describes the line balance test, which is simple, quick and cheap, and effective. I don't know what telephone analyzers sell for now, but the DVM new and TDR used would set you back less than $2000 for both, and whatever the cost is for the book. That's 90% of what you need for sweeping phone lines. You will find the price of a Fluke DVM to be the same everywhere, within one or two points. No sense in shopping as the price is fixed. Jensen, Tessco or anywhere is OK as a source of a DVM. Doesn't matter where you buy it; Fluke does the warranty. You should pay under $300. A good model would be the best you can afford in the 1xx series. A used Riser Bond TDR might run $1250 +/- depending on the exact model and the condition. I have several available, as do other used equipment dealers. If you already have a decent oscilloscope, you can use a lower end TDR for around $550 and do just as well. If you don't already have a scope, don't buy one. You likely already have a DVM if you are into electronics or do anything electronics related. Holler to the list if you need any more info on anything. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: Shawn Hughes (Road) Date: Sat Aug 21, 2004 5:35pm Subject: Re: COINTELPRO At 01:46 PM 8/21/04 +0000, you wrote: >The larger message that it communicates is that if you participate in >actions critical of the government or government policies, you might >wind up with an F.B.I. file. Well.......DUH! -Shawn ==================================== Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response, LLC www.warriormindset.com ////////////////////////////////////////////////////////////////////////////// ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. 9410 From: gkeenan Date: Sat Aug 21, 2004 4:40pm Subject: Re: Re: COINTELPRO Actually, it doesn't matter if you're critical of the gov't or not - you could still have an FBI file. I know for a fact that I have one, as well as a CIA file, NIS (better know today as NCIS - Naval Criminal Investigative Service) file, DIS file (I think it's now DSS), DIA (Def. Intel. Agency), and a few others. I even have an SEC file (I worked as a stockbroker for a couple of years). All of these have fingerprints on file as well as tons of other stuff (I've already FOIA'd these files). Jerry K. Gerard P. Keenan 16 E. Beech St. Central Islip, NY 11722 ph/fax (631) 582-1262 cell (516) 762-9602 secureops@o... gkeenan@s... ----- Original Message ----- From: Shawn Hughes (Road) To: TSCM-L@yahoogroups.com Sent: Saturday, August 21, 2004 6:35 PM Subject: [TSCM-L] Re: COINTELPRO At 01:46 PM 8/21/04 +0000, you wrote: >The larger message that it communicates is that if you participate in >actions critical of the government or government policies, you might >wind up with an F.B.I. file. Well.......DUH! -Shawn ==================================== Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response, LLC www.warriormindset.com ////////////////////////////////////////////////////////////////////////////// ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 9411 From: Brian Varine Date: Sat Aug 21, 2004 2:46pm Subject: Re:Hacktivist activities I saw this dude (Crimethinc) at DEFCON 12 and he indicated some of the things his group and others had planned. He started out his rant saying they were going to get things like floodnets going to shut down servers at the RNC and other Republican sites, he then went on and detailed how they were going to "Fuck things up". Among those were smashing out the windows and messing up the brakes of busses that were to take delegates/attendees to the convention. Then he went on to say hey said they had a list of delegates, what hotel they were staying at, and that they were going to target them for harassment from the minute the left their room until they got to the convention. After his rant continued, the DEFCON organizers politely ended his tirade. While it's one thing to protest, I don't see how launching a DoS is a 'free speech' tool. If you DoS someone, you are trying to kill their right to free speech. Stalking delegates and damaging busses is just plain illegal. So while a lot of people think the big bad USG is doing all kinds of stuff to stifle free speech, one has to really look at what a few groups have admittedly planned. When WTO happened people said the Government should have done something to prevent the groups from trashing the city. Well, now they are doing that. For more on Crimethinc at DEFCON http://forum.defcon.org/showthread.php?t=4251 >Good warning, but the more I read this section: >>This call out is issued by the CrimethInc Black Hat Hacker's Bloc. We >>are not participating in any of the actions or any illegal activities >>ourselves. We >>recognize the political significance of the RNC and realize that one >>way or another there is going to be some sort of cyber attack. We are >>simply >>serving as a press tool to communicate with the media about different >>electronic methods people are employing to protest the RNC. >Without more intel, it reads like a nobody is trying to position himself / >themselves as the progenitor for whatever inevitably will occur, while not >being directly (read legally) culpable. In other words, so he / they can >say "Yeah, we caused that!" >I don''t forsee a lot of hacktivist countermeasures in the GMRS and FRS >bands, because in addition to their whistles and drums (you didn't think >they were beating those things for solely religious purposes, did you), >they widely use those types of comm systems during protest activities here >in the US. 9412 From: A Grudko Date: Sun Aug 22, 2004 10:54am Subject: RE: Re: COINTELPRO -----Original Message----- > Actually, it doesn't matter if you're critical of the gov't or not - you could still have an FBI file. I know for a fact that I have one... I think my wife has one on me. I know a former business partner has; he boasted that he had copied EVERYTHING and threatened to use it against me - yawn. The SA police used to have one but I discovered in 2000 that they had lost it, so I helped them reconstruct it... Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.737 / Virus Database: 491 - Release Date: 2004/08/11 [Non-text portions of this message have been removed] 9413 From: contranl Date: Sun Aug 22, 2004 0:17pm Subject: More far east stuff (Japan) . Here is another page with some more far east stuff..this time Japan There are some (low cost)products that have not made it yet to the syshops (yet) like a few lowcost fiberscope cams and something they call: "Digital Gum shot" not shore what that is it's not a mistake and it's not "cum shot" can somebody figure out what that is ? is it a digital video-tx ? Follow all the links at : http://www.catascopoz.com/ A good translator (better then babelfish wich is not working at the moment: http://www.worldlingo.com/wl/pages/T1/B100/UP20260/P1/l/products_serv ices/worldlingo_translator.html Tetrascanner . 9414 From: Shawn Hughes (Road) Date: Sun Aug 22, 2004 4:38pm Subject: Re: FOIA Hey, Jerry..... I've always wanted to hear from someone who REALLY was in your position. (IF this is too OT or something you don't want to share, I understand), but how did that go? Can you actually FOIA and get your files, or do you get four pages where someone used up three sharpies redacting? I expected they would stonewall or play dumb until you just gave up. Agree on the multiple files. *WISH* cc's of your fingerprints were adequate for everybody else, it gets a little annoying after a while. Oh, and that everyone would just accept a copy of the 86. Seems everybody has their own SSBI forms, too...... -Shawn At 12:57 PM 8/22/04 +0000, you wrote: >(I've already FOIA'd these files). ==================================== Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response, LLC www.warriormindset.com ////////////////////////////////////////////////////////////////////////////// ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. 9415 From: Shawn Hughes (Road) Date: Sun Aug 22, 2004 4:46pm Subject: Re: Digest Number 1656 At 12:57 PM 8/22/04 +0000, you wrote: >On the video-scanner: > >Thanks for the links...but i know these apparatus for 5 years now >and as matter of fact i do produce such a receiver myself :) :) >It's a lot of work so they are a little expensive: > >http://www.tetrascanner.com/otherprojects.html > >What i meant was ...a small(er) handheld device about the size of a >pocket radio scanner... Contranl, It seems you have done your research on this topic. Since one isn't offered, and you understand what is needed, why not build one and sell it? Something sensitive that would be inexpensive and cover the threat area might not be a bad 'throw down' tool to supplant other methods. Not sure you'd absolutely have to have a video demod, maybe just use a LCD bargraph to show relative strength, with a tap for a baseband addon? I like the specan, but, if you could have something reliable to provide extra attention in a known threat area, I'd be for that. Plus, you could offer a $300 "NO, you're not on a wireless camera" sweep special....... lol -Shawn ==================================== Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response, LLC www.warriormindset.com ////////////////////////////////////////////////////////////////////////////// ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. 9416 From: contranl Date: Sun Aug 22, 2004 4:05pm Subject: Re: Digest Number 1656 / video scanner . Thanks for the idea Shawn...that is exactly what i had in mind it's just that i am trying to gather information (from possible other owners) to decide wich existing lowcost unit to modify. make your choice: http://www.sharperimage.com/us/en/catalog/productview.jhtml? pid=40682000&source=10716&cm_ven=LINKSHR&cm_cat=feed&cm_ite=SI519SIL& siteid=agXlDjSD2Ug-TWSCHOa2SxHQgrwfqI6Evw http://www.onestepahead.com/jump.jsp? itemID=207760&LS=1&URL=http://www.onestepahead.com/http://www.onestep ahead.com/L=&sourceid=00410247217915188450&cm_cat=0041024721&cm_ven=b efree_aff&cm_ite=osa_redirect&BFURL=http://www.onestepahead.com/jump. jsp% 3fitemID=207760&itemType=PRODUCT&lGen=detail&iMainCat=117&iProductID= 207760&change=117 http://shop.store.yahoo.com/spytechagency/por24ghzvidr.html http://www.rfconcepts.co.uk/wireless-baby_monitor.htm http://www.rmxdirect.co.uk/index.html?target=p_20.html&lang=en-gb (very intersing ! ) http://www.rimax.net/products.asp?id=68 http://www.araneusa.com/s-awv9600.html http://www.smarthome.com/7855.html http://www.smarthome.com/7604.html (put received 2,4 ghz online at internet) http://www.fontusa.com/index4.html http://www.healthchecksystems.com/baby_quiet_sounds_video_monitor.htm http://www.provantage.com/buy-22088685-aiptek-secucam-av100-wireless- baby-monitor-audio-video-security-system-shopping.htm http://www.aiptek.com/Merchant2/merchant.mvc? Screen=CTGY&Store_Code=AS&Category_Code=WD1 http://www.alibaba.com/trade/sample/list/showsample/~spgermany? sample_id=10816257 http://www.alibaba.com/trade/search/1i2p0tyfc0h0m0s/baby_monitor.html http://www.alibaba.com/trade/sample/list/showsample/~sherryau? sample_id=10809641 http://www.mommysthinkin.com/baby_video_monitor.htm http://www.electronics.globalsources.com/gsol/GeneralManager? &catalog_id=2000000011011&catalog_id=2000000011011&design=clean&langu age=en&action=GetSupplier&page=supplier/ProductDetail&supplier_id=600 8802828577&product_id=1000377920&action=GetProduct http://homesecuritystore.com/ezStore123/DTProductZoom.asp? productID=1027 http://www.shopharmony.com/product.asp?i=AV100 http://store.yahoo.com/dealsurprise/seavwi2bamoa.html http://www.transaction-one.com/gs/html/vgs/f4/en/products.jsp? sfid=34253&pubid=1669 http://www.transaction-one.com/gs/html/vgs/f4/en/products.jsp? sfid=34253&pubid=1669 http://www.babyviewcam.co.uk/Babyview_camera-specs.htm#specs http://www.avtechsolutions.com/v02090.htm http://www.wireless-audio-video.com/home-surveillance/AWS960.htm http://www.wireless-audio-video.com/rf-module.htm http://www.x10.com/products/x10_vk45a.htm video mpg http://www.tranwo.com/english/02_product/02_product_overview.php? Category=2 http://www.c3scripts.com/cgi-bin/ae.pl?asinsearch=B00005BSXI http://grandtec.com/eyeztogo.htm http://www.gadgetuniverse.com/cgi-bin/sgsc0101.exe? SRCCODE=WECJ2000&FNM=04&GEN0=TC557&AID=10273747&PID=961619 http://www.grandtec.com/lcdcam.htm http://www.grandtec.com/webcam.htm .....2,4ghz internet online http://www.lechner-cctv.de/produkt.php?ID=4&Product_ID=224 minituner module http://www.lechner-cctv.de/ppvxfile/224/EM2400V8RX.pdf http://www.team-electronic.de/englisch/produkte/cameras/monica_e.htm ...................................... http://www.electronics.globalsources.com/gsol/Index/1/3catalog_id/220 00000011011/3page/2Browse/3action/2GetPoint/3point_id/23000000153001/ 3prod_id/215509/3resetbean/2on?a=b ^^^^ alle china wireless video manuf ^^^^^ .............................................. http://www.globalsources.com/gsol/Index/1/3catalog_id/22000000003868/ 3point_id/23000000149762/3action/2GetPoint/3sort_by/2Standard/3page/2 Browse/3sort_by/2Standard/3dothis/2null/3product_pg/21?a=b ^^^^^^ all china tuners ^^^^ ................................................ http://www.telecom.globalsources.com/gsol/GeneralManager? &catalog_id=2000000003844&design=clean&language=en&action=GetSupplier &page=supplier/ProductDetail&supplier_id=6008800009733&product_id=100 0259202&action=GetProduct ^^^^^^ 2,4 ghz video walkie talkie ^^^^^^ ........................................... http://www.burnabyradio.com/dhtml/atv/expand.html pc control ................................... http://www.cel.com.tw/wireless1.htm http://www.catascopoz.com/products/eizou/detail_ez/ga251.htm http://www.marasst.com/product-3.htm http://www.apa-direct.com/camera/image/ga-251/wireless.pdf http://www.gate.jp/top/topics/topics.php ....................................... http://www.ghz-link.com/global/product/receiver/hvr2000.html ^^^^^with included harddisk recorder 30 gb / 36 hours !!^^^^^^ NOVELTY !!! ....................................... http://www.catascopoz.com/products/eizou/detail_ez/mk16a.htm http://www.ghz-link.com/global/index.html http://www.maxgarage.co.jp/page/rf/tuner.htm http://www.axiontv.com/www/ProductDetail.asp?did=18 Tetrascanner (Contranl) www.tetrascanner.com 9417 From: Gerald Date: Sun Aug 22, 2004 11:55am Subject: What have the terrorist won? Anthropologist view The loss of common sense in Government. Fingernail clippers can't be carried on planes, but they didn't check stored luggage. Al Gore, Senator Kennedy and other Congressmen refused on airlines because their names showed up on a terrorist watch list. Mike Wallace arrested for asking questions. All videos of beheadings removed from Internet. US citizen arrested and held without hearing or attorney. FBI intimidating free speech. The Supreme Court ruling against our Government violating the constution. So far the terrorist have gotten our government to violate the Constution and rights of Individual Americans. Town and communities passing laws forbidding thier police from cooperating with the Patrotic act. I wonder if the Patrotic act would have been passed if it had been name what it was? "Police state, permission to violate the constution and US citizens rights." Someone said absolute power corrupts absolutely. Even England knows to seperate the powers of criminal investigation from domestic spying. MI 5 & MI 6. We have given both these powers to the FBI and it will corrupt the FBI, and destroy US citizens. So far the terrorist have turned our government against the people and ran us into huge debts our grand children will have trouble paying off. Israel and Palestine have shown that violence won't end terrorism, they have tried it for 32 years. We are spending money in the wrong places, and ignoring the root of the problem. American culture is the most powerful in the world, Democracy, music, movies, McDonalds and coke cola. Exposure to our culture leads to undersanding. We need US Cable TV in the Middle East. A strong PR program in Islamic countries, not more bombers. Freedom does present problems, violating those freedoms isn't a solution, when this happens the terrorists WIN! Taking videos of public buildings in public is one of those freedoms that presents us with these problems, how we handle it will determine if the terrorists win. Gerald Wieczorek Internet Anthropologist, Ad Magnum From my news letter: http://cigars.bravepages.com/ciserv.html 9418 From: Steve Weinert at Excel.Net Date: Mon Aug 23, 2004 5:18am Subject: Re: What have the terrorist won? Anthropologist view This has zero to do with our list's TSCM topic. I am sure there are othe venues where the discussion of these perceptions has merit, but not only is this not the right place for it, it is not the right place to hawk a political eNewsletter. With this being a USA campaign year political passions will be a cyclical high, hopefully we all can remember our list's mission and avoid staying so far off topic. Back to TSCM please. Steve W ----- Original Message ----- From: "Gerald" To: Sent: Sunday, August 22, 2004 11:55 AM Subject: [TSCM-L] What have the terrorist won? Anthropologist view > Gerald Wieczorek > Internet Anthropologist, Ad Magnum > >From my news letter: > http://cigars.bravepages.com/ciserv.html 9419 From: David Alexander Date: Mon Aug 23, 2004 5:29am Subject: RE: What have the terrorist won? Anthropologist view You forgot: "The huge reduction in tourism to the US because we won't put up with the long waits (up to 7 hours) at embassies to get visas, and at your points of entry where we get to wait for even more hours, kept in the dark as to why and are treated with scorn and disdain by the staff who are often discourteous." I was planning a trip to the US with my wife, not any more. That is the only 2c. that Uncle Sam is getting from me and a lot of others while this appalling treatment continues. That doesn't mean I think those of you on the list are like that or responsible for these activities. Just wanted you to be aware of the effect they have on many others outside your borders. David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: Gerald [mailto:geraldmsu@y...] Sent: 22 August 2004 17:55 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] What have the terrorist won? Anthropologist view The loss of common sense in Government. Fingernail clippers can't be carried on planes, but they didn't check stored luggage. Al Gore, Senator Kennedy and other Congressmen refused on airlines because their names showed up on a terrorist watch list. Mike Wallace arrested for asking questions. All videos of beheadings removed from Internet. US citizen arrested and held without hearing or attorney. FBI intimidating free speech. The Supreme Court ruling against our Government violating the constution. So far the terrorist have gotten our government to violate the Constution and rights of Individual Americans. Town and communities passing laws forbidding thier police from cooperating with the Patrotic act. I wonder if the Patrotic act would have been passed if it had been name what it was? "Police state, permission to violate the constution and US citizens rights." Someone said absolute power corrupts absolutely. Even England knows to seperate the powers of criminal investigation from domestic spying. MI 5 & MI 6. We have given both these powers to the FBI and it will corrupt the FBI, and destroy US citizens. So far the terrorist have turned our government against the people and ran us into huge debts our grand children will have trouble paying off. Israel and Palestine have shown that violence won't end terrorism, they have tried it for 32 years. We are spending money in the wrong places, and ignoring the root of the problem. American culture is the most powerful in the world, Democracy, music, movies, McDonalds and coke cola. Exposure to our culture leads to undersanding. We need US Cable TV in the Middle East. A strong PR program in Islamic countries, not more bombers. Freedom does present problems, violating those freedoms isn't a solution, when this happens the terrorists WIN! Taking videos of public buildings in public is one of those freedoms that presents us with these problems, how we handle it will determine if the terrorists win. Gerald Wieczorek Internet Anthropologist, Ad Magnum From my news letter: http://cigars.bravepages.com/ciserv.html ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9420 From: David Alexander Date: Mon Aug 23, 2004 5:37am Subject: RE: What have the terrorist won? Anthropologist view Sorry Steve I didn't see your post until after I had sent my reply to the original. Please accept my humble apologies, I wasn't ignoring your request Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: Steve Weinert at Excel.Net [mailto:srw@e...] Sent: 23 August 2004 11:18 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] What have the terrorist won? Anthropologist view This has zero to do with our list's TSCM topic. I am sure there are othe venues where the discussion of these perceptions has merit, but not only is this not the right place for it, it is not the right place to hawk a political eNewsletter. With this being a USA campaign year political passions will be a cyclical high, hopefully we all can remember our list's mission and avoid staying so far off topic. Back to TSCM please. Steve W ----- Original Message ----- From: "Gerald" To: Sent: Sunday, August 22, 2004 11:55 AM Subject: [TSCM-L] What have the terrorist won? Anthropologist view > Gerald Wieczorek > Internet Anthropologist, Ad Magnum > >From my news letter: > http://cigars.bravepages.com/ciserv.html ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9421 From: gkeenan Date: Mon Aug 23, 2004 6:22am Subject: Re: Re: FOIA Hi Shawn, It's pretty weird, actually. I requested the FOIAs quite some time before 9/11 when things were a little more open. But even though I got many more than four pages, the powers that be did use up a lot of magic markers :-). Basically, though, the stuff that was redacted (or 'sanitized' as we called it back then) were privacy things regarding other people. For instance, I held an alphabet soup of clearances and SAPs (Special Access Programs); including TS, SCI, SIOP, SIOP-ESI, TICON, NATO COSMIC/ATOMAL, CODEWORD, and ad infinitum. For each of these a new and separate BI was required which, of course, meant interviews with co-workers, subordinates, superiors, civilian contacts, relatives, etc. and the inevitable fingerprinting. And since I spent my entire Navy career (20 years) and civil service time (5 years) in Europe, N. Africa and Middle East I had daily contact with more foreigners than Americans for a 1/4 century. So there were a lot of civilian contact interviews - as you can probably guess ;-). I was also married to a foreigner for 11 years (British subject in Northern Ireland) and had/have 3 kids and a step-son still in N. Ireland, as well as my ex, and 2 grand children. When I got the FOIAs (from all the agencies concerned) they had all made liberal use of the magic markers - but basically this was mainly to black out SSNs and/or other personal identifiers from anyone interviewed in connection with any investigations in which I was either the subject, or an interviewee myself in someone else's BI. Oddly enough, they never blacked out the names of people interviewed, or their ranks/rates if they were military. Addresses were blacked out, as were phone numbers. In a couple of the investigations service personnel from the British forces were also interviewed, since I hung out with a lot of them in Naples as my command was a major NATO as well as US command and worked with the MoD in London on a daily basis in the course of my duties and these personnel's ranks and branches of service were also left in - but addresses and the specific commands they were attached to were blacked out. I've heard that these days the various agencies do just what you mentioned - sandbag or stonewall in the hope you'll just give up in frustration. CIA actually did that to me when I FOIA'd them - but I didn't give up and, even though it took 18 months, I finally got the stuff I asked for. Took a lot of letters, too :-). My own opinion of the PA and FOIA rules/laws is very low 'cause redacted info is still relatively easy to get hold of. I already had more info in my files on all these investigations than any of the agencies provided me with. Including nearly all the blacked out info. Seems the gov't doesn't realize that people talk to each other. Just about everyone, American and foreigner, interviewed in any BIs on me came to me and told me everything - including the kinds of questions they were asked, whether they were phone interviews, face-to-face, etc. And it was done completely voluntarily. So even though a lot was redacted, I already knew the phone numbers, addresses, names, ranks/rates, etc. of nearly everyone ever interviewed in any investigation. I never had a single negative report from anyone interviewed, so in my case it wasn't really a big deal - except that it prepared me for anything the interviewers might bring up in the final interview with me before approving the clnc or SAP access. This was only my experience, of course, but it was common knowledge that this same situation existed in just about every BI in all the services. And, of course, since family members are also interviewed, it's unlikely most people will get a negative review from their family - unless, like me, they went through a particularly nasty, dirty divorce. The ex's aren't usually prone to say nice things about their ex's :-). With all these BIs, of course, came the mandatory fingerprinting. That's why I said my fingerprints are everywhere! Most of those SAPs I mentioned also required fingerprints be on file. And, of course, they can't just take them from one of the other files. They have to be fresh - like my prints will change or something ;-). And, of course, my prints were also on my military ID card and these days, being retired military, they are also on my retired ID card. I just got a new retired ID about 18 months ago and this one is updated and digitized. There's a bar code on these newer ones so when I got this one I once more had to be fingerprinted and my prints are digitized into the bar code along with other info. And there are also the fingerprints on file with the SEC I mentioned. I'm surprised the bank hasn't asked for fingerprints before we could make a withdrawal :-). Jerry Gerard P. Keenan 16 E. Beech St. Central Islip, NY 11722 ph/fax (631) 582-1262 cell (516) 762-9602 secureops@o... gkeenan@s... ----- Original Message ----- From: Shawn Hughes (Road) To: TSCM-L@yahoogroups.com Sent: Sunday, August 22, 2004 5:38 PM Subject: [TSCM-L] Re: FOIA Hey, Jerry..... I've always wanted to hear from someone who REALLY was in your position. (IF this is too OT or something you don't want to share, I understand), but how did that go? Can you actually FOIA and get your files, or do you get four pages where someone used up three sharpies redacting? I expected they would stonewall or play dumb until you just gave up. Agree on the multiple files. *WISH* cc's of your fingerprints were adequate for everybody else, it gets a little annoying after a while. Oh, and that everyone would just accept a copy of the 86. Seems everybody has their own SSBI forms, too...... -Shawn At 12:57 PM 8/22/04 +0000, you wrote: >(I've already FOIA'd these files). ==================================== Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response, LLC www.warriormindset.com [Non-text portions of this message have been removed] 9422 From: szabo4381 Date: Mon Aug 23, 2004 4:48am Subject: Re: Far East Spystuff / Video-scanner --- In TSCM-L@yahoogroups.com, "contranl" wrote: > Thanks Mike, > > > I did have one (briefly) and THEY ARE CRAP. Complete and utterly > > useless.Your milage may vary. I found that one concrete wall would > > kill off the > > signal considerably, > > Wich is normal at 2.4 ghz ...the higher you go the less penetration > i agree ofcourse that this effect gets stronger when using "deaf" > receivers > > >and it was hard to get them to receive anything from a > >distance. Their sensitivity must be sub-zero. So, I guess such a > >handheld > > I get conflicting reports from others that own both such a baby > monitor and comtech modules (from the link you send me before) > they say that they are very usable....adding an external antenna may > help ! > > > take a long, hard look at the R3 you > > mentioned. How far could you pick up any usable signal with it, > > never mind > > Don't mention the Icom R3 i have tested 3 of them when they just > came out...i could not receive anything..and i mean NOTHING while > standing 5 meters from a 1o mW transmitter..while my own hobby > receiver (with comtech module) did 700 meters...also the dÛn't cover > the whole band > > How come those spyshops still advertise them ? > > > batteries died faster > > Agre...useless batteries > > > > Didn't even bother opening it up and promptly returned it, it was > > SO bad.The electronics inside would have probably peeved me off > > even more. > > > If you used it to look at other cam's : > > Did you realise that you cant tune to the correct frequency ? > Did you realise that you might have been on NTSC while the TX might > have been PAL.(or the other way around).. > > >SA. I know it's limitations, so I know what to expect. > > Do you have a pocket SA with video display ?...less then 200$ ? :) > > Tetrascanner Hi, I know something, that is selled as "CATV spectrum analyzer" ( hehe..) manufactured in China, and priced under 200$... some tech. specs : -freq. coverage : 5-870 MHz -span ( variable ) from 1 to 865 MHz -sensitivity ( variable) from 10 dBmicrovolts to 10 dbmilivolts -large LCD screen ( about 4x8 cmxcm) -in-builded NiCd batt.pack ( about 4 houres lifetime ) I use this item with an ATV downconverter ( 2300-2500 MHz down to 200- 400 MHz)...total bill is well under 400$... and +of course, a homemade SBF 12 dBi antenna, not priced here.. Rgrds 9423 From: szabo4381 Date: Mon Aug 23, 2004 4:48am Subject: Re: Far East Spystuff / Video-scanner --- In TSCM-L@yahoogroups.com, "contranl" wrote: > Thanks Mike, > > > I did have one (briefly) and THEY ARE CRAP. Complete and utterly > > useless.Your milage may vary. I found that one concrete wall would > > kill off the > > signal considerably, > > Wich is normal at 2.4 ghz ...the higher you go the less penetration > i agree ofcourse that this effect gets stronger when using "deaf" > receivers > > >and it was hard to get them to receive anything from a > >distance. Their sensitivity must be sub-zero. So, I guess such a > >handheld > > I get conflicting reports from others that own both such a baby > monitor and comtech modules (from the link you send me before) > they say that they are very usable....adding an external antenna may > help ! > > > take a long, hard look at the R3 you > > mentioned. How far could you pick up any usable signal with it, > > never mind > > Don't mention the Icom R3 i have tested 3 of them when they just > came out...i could not receive anything..and i mean NOTHING while > standing 5 meters from a 1o mW transmitter..while my own hobby > receiver (with comtech module) did 700 meters...also the dÛn't cover > the whole band > > How come those spyshops still advertise them ? > > > batteries died faster > > Agre...useless batteries > > > > Didn't even bother opening it up and promptly returned it, it was > > SO bad.The electronics inside would have probably peeved me off > > even more. > > > If you used it to look at other cam's : > > Did you realise that you cant tune to the correct frequency ? > Did you realise that you might have been on NTSC while the TX might > have been PAL.(or the other way around).. > > >SA. I know it's limitations, so I know what to expect. > > Do you have a pocket SA with video display ?...less then 200$ ? :) > > Tetrascanner Hi, I know something, that is selled as "CATV spectrum analyzer" ( hehe..) manufactured in China, and priced under 200$... some tech. specs : -freq. coverage : 5-870 MHz -span ( variable ) from 1 to 865 MHz -sensitivity ( variable) from 10 dBmicrovolts to 10 dbmilivolts -large LCD screen ( about 4x8 cmxcm) -in-builded NiCd batt.pack ( about 4 houres lifetime ) I use this item with an ATV downconverter ( 2300-2500 MHz down to 200- 400 MHz)...total bill is well under 400$... and +of course, a homemade SBF 12 dBi antenna, not priced here.. Rgrds 9424 From: contranl Date: Mon Aug 23, 2004 9:26am Subject: Re: Far East Spystuff / Video-scanner . > I know something, that is selled as "CATV spectrum analyzer" ( > hehe..) manufactured in China, and priced under 200$... Thanks Szabo...good suggestion ...i like to look at that. Do you have a link for me...to the manufacturer of that Chinese analyzer ? Tetrascanner www.tetrascanner.com 9425 From: Charles Patterson Date: Mon Aug 23, 2004 9:48am Subject: Re: More far east stuff (Japan) and something they call: "Digital Gum shot" not shore what that is it's not a mistake and it's not "cum shot" can somebody figure out what that is ? is it a digital video-tx ? Follow all the links at : http://www.catascopoz.com/ Ah, I see you're not quite fluent in Jenglish. That would translate as "Digital Gum Shoe" ! (25 years with a Japanese wife gives me an edge). Looks like it's just a small battery powered wired camera. Description didn't say anything about transmitting. Charles [Non-text portions of this message have been removed] 9426 From: A Grudko Date: Mon Aug 23, 2004 11:18am Subject: The Call Is Cheap. The Wiretap Is Extra. From the Johnmacsgroup. We have similar laws here in South Africa, placing a responsibility on any carrier of information to make it interceptable under the Prohibition of Monitoring and Interception of Communications Act. Andy G Johannesburg From the New York Times -- http://www.nytimes.com/2004/08/23/technology/23wiretap.html The Call Is Cheap. The Wiretap Is Extra. By KEN BELSON At first glance, it might seem like the simple extension of a standard tool in the fight against the bad guys. But in fact, wiretapping Internet phones to monitor criminals and terrorists is costly and complex, and potentially a big burden on new businesses trying to sell the phone service. Earlier this month, the Federal Communications Commission voted unanimously to move forward with rules that would compel the businesses to make it possible for law enforcement agencies to eavesdrop on Internet calls. But developing systems to wiretap calls that travel over high-speed data networks - a task that the companies are being asked to pay for - has caused executives and some lawmakers to worry that helping the police may stifle innovation and force the budding industry to alter its services. That requirement, they say, could undermine some of the reasons Internet phones are starting to become popular: lower cost and more flexible features. The commission's preliminary decision, announced on Aug. 4, is a major step in the long process of deciding how Internet-based conversations could be monitored. Regulators will now hear three months of public testimony on the ruling. Few expect a resolution of the issue this year, but it is not hard to figure out who will ultimately pay for the wiretapping capability. "All the costs carriers incur are ultimately going to be passed on to the consumer," said Tom Kershaw, vice president for voice-over-Internet services at VeriSign, which provides surveillance support for Internet phone companies. Tapping Internet phones is far more complicated than listening in on traditional calls because the wiretapper has to isolate voice packets moving over the Internet from data and other information packets also traveling on the network. While traditional calls are steady electronic voice signals sent over a dedicated wire, Internet calls move as data packets containing as little as a hundredth of a second of sound, or less than one syllable, which follow often-unpredictable paths before they are reassembled on the receiving end to form a conversation. To make wiretapping possible, Internet phone companies would have to buy equipment and software as well as hire technicians, or contract with VeriSign or one of its competitors. The costs could run into the millions of dollars, depending on the size of the Internet phone company and the number of government requests. The requirement to cooperate with law enforcement agencies is unlikely to drive any Internet phone company out of business, though it could cut into profits. Last year, the agencies conducted about 1,500 wiretaps, with the bulk of them in major cities like New York and Miami. The Federal Bureau of Investigation has yet to complete a wiretap over Internet phone services. "It doesn't break the business model, but it means free telephone service is impossible," said John Pescatore, the lead security analyst at Gartner Inc., a research group. "You might see add-on surcharges." Internet companies are starting to gear up for the federal requirements. Many Internet phone companies, including Vonage, which has the largest number of subscribers, already supply the police with the phone numbers that a person under court-sanctioned surveillance dials and the origin of calls he or she receives, plus information about the connections, like whether a conference call was convened. The vast majority of court orders for wiretapping involve this kind of monitoring, known as "trap and trace," which is typically used at the beginning of an investigation. The less frequent, but more complicated, monitoring request is to allow the police to listen to conversations as they occur. In those cases, the differences between the architecture of traditional circuit-switched phone networks and the Internet are crucial. With traditional phone networks, calls are routed through central circuit-switching stations, which connect long-haul phone networks and the wires that go into homes and offices. Typically, phone carriers have installed dedicated servers at or near the switches, which can isolate conversations from a specific phone number and send them to police agencies in a standardized format. In 1994, when federal wiretapping laws were revised, Congress initially set aside $500 million to help carriers pay for this extra equipment to route calls to the police. In tapping an Internet phone, police first need to find out which company is responsible for maintaining the phone number. That could be a big phone company, a cable company, an Internet phone provider or peer-to-peer services that match callers but do not aid in the transmission of the call. Law enforcement agencies could also ask broadband providers to isolate voice streams on their networks that are traveling to and from a specific location. "In the circuit-switch world, the caller and content were in the domain of a single carrier," said Julius P. Knapp, a deputy chief in the Office of Engineering and Technology at the Federal Communications Commission. "In the Internet world, you have to identify who is in the best position to get the information." Once the F.B.I. determines the suspect's Internet phone provider, it orders the company to program its servers to intercept specified calls to and from the suspect's phone. When a phone call is not tapped, the server sends the call to its destination. When a call is to be tapped, the phone company's server instructs an Internet router to make a copy of the call and send it to the law enforcement agency. The task is complicated because the phone provider has to use special software to sniff out specific voice packets from among all the data packets traveling from the suspect's connection. Unlike traditional phone taps, this process does not reveal the caller's location, because users can plug their Internet phone modems into any broadband connection, even overseas. But like any security check, this monitoring can slow networks and even degrade the quality of the call. It could also potentially intercept data packets along with other types of voice packets - from cellphones, for example - a possibility that alarms privacy groups worried that the police will collect information beyond their authority. "The potential for misuse is pretty broad because what you are doing is a form of packet-sniffing," said Lee Tien, a staff lawyer at the Electronic Frontier Foundation in San Francisco. "The problem is that if you are using a sniffer box to perform the interception, you may handle all the traffic going through. In the end, a packet sniffer gets you everything." Some groups, like the American Civil Liberties Union, say law enforcement agencies are trying to turn phone companies into government spies. Law enforcement groups and service providers, however, say software is sufficiently sophisticated to only siphon relevant calls. They also say that having the companies take charge of finding a solution should allay suspicion that the government is trying to overstep its authority. The F.B.I. is not trying to use the wiretap law "to dip into the Internet," said one senior official at the bureau. Another issue involves decoding encrypted conversations. It is easier to encrypt digital conversations than those in an analog format, and a growing number of Internet phone providers are encrypting their calls. Unscrambling the calls requires another piece of software. "It's an added layer of complexity," said Richard Tworek, the chief executive of Qovia, which provides software to Internet service providers to make sure the networks are running properly. The biggest challenge, Mr. Tworek and others say, is tracking down phone conversations that are connected by peer-to-peer software. This software essentially piggybacks on the networks of its users; calls are not connected at a central location. To trace such calls, investigators would have to sift through trillions of packets at routers that channel data around Internet networks - a daunting task, industry experts say. This type of peer-to-peer calling is still emerging, so the threat is rather remote. But some companies that offer this software operate overseas, so they fall outside the jurisdiction of the United States government. The communications commission's recent ruling does not cover this type of peer-to-peer communication. Industry experts, though, expect this decentralized form of Internet phone service to spread, which will require even more sophisticated Internet wiretapping solutions. About that challenge, Mr. Tworek could only say, "It's a huge headache." Copyright 2004 The New York Times Company *** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. The 'johnmacsgroup' Internet discussion group is making it available without profit to group members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of literary, educational, political, and economic issues, for non-profit research and educational purposes only. I believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.742 / Virus Database: 495 - Release Date: 2004/08/19 [Non-text portions of this message have been removed] 9427 From: James M. Atkinson Date: Mon Aug 23, 2004 6:26pm Subject: How to prepare for a deployment in Iraq 1. Sleep on a cot in the garage. 2. Replace the garage door with a curtain. 3. Six hours after you go to sleep, have your wife or girlfriend whip open the curtain, shine a flashlight in your eyes and mumble, "Sorry, wrong cot." 4. Renovate your bathroom. Hang a green plastic sheet down from the middle of your bathtub and move the shower-head down to chest level. Keep four inches of soapy cold water on the floor. Stop cleaning the toilet and pee everywhere but in the toilet itself. Leave two to three sheets of toilet paper. Or for best effect, remove it altogether. For a more realistic deployed bathroom experience, stop using your bathroom and use a neighbor's. Choose a neighbor who lives at least a quarter mile away. 5. When you take showers, wear flip-flops and keep the lights off. 6. Every time there is a thunderstorm, go sit in a wobbly rocking chair and dump dirt on your head. 7. Put lube oil in your humidifier instead of water and set it on "HIGH" for that tactical generator smell. 8. Don't watch TV except for movies in the middle of the night. Have your family vote on which movie to watch and then show a different one. 9. Leave a lawnmower running in your living room 24 hours a day for proper noise level. 10. Have the paperboy give you a haircut. 11. Once a week, blow compressed air up through your chimney making sure the wind carries the soot across and on to your neighbor's house. Laugh at him when he curses you. 12. Buy a trash compactor and only use it once a week. Store up garbage in the other side of your bathtub. 13. Wake up every night at midnight and have a peanut butter and jelly sandwich on a saltine cracker. 14. Make up your family menu a week ahead of time without looking in your food cabinets or refrigerator. Then serve some kind of meat in an unidentifiable sauce poured over noodles. Do this for every meal. 15. Set your alarm clock to go off at random times during the night. When it goes off, jump out of bed and get to the shower as fast as you can. Simulate there is no hot water by running out into your yard and breaking out the garden hose. 16. Once a month, take every major appliance completely apart and put it back together again. 17. Use 18 scoops of coffee per pot and allow it to sit for five or six hours before drinking. 18. Invite at least 185 people you don't really like because of their strange hygiene habits to come and visit for a couple of months. Exchange clothes with them. 19. Have a fluorescent lamp installed on the bottom of your coffee table and lie under it to read books. 20. Raise the thresholds and lower the top sills of your front and back doors so that you either trip over the threshold or hit your head on the sill every time you pass through one of them. 21. Keep a roll of toilet paper on your night stand and bring it to the bathroom with you. And bring your gun and a flashlight. 22. Go to the bathroom when you just have to pass gas, "just in case." Every time. 23. Announce to your family that they have mail, have them report to you as you stand outside your open garage door after supper and then say, "Sorry, it's for the other Smith." 24. Wash only 15 items of laundry per week. Roll up the semi-wet clean clothes in a ball. Place them in a cloth sack in the corner of the garage where the cat pees. After a week, unroll them and without ironing or removing the mildew, proudly wear them to professional meetings and family gatherings. Pretend you don't know what you look or smell like. Enthusiastically repeat the process every week. 25. Go to the worst crime-infested place you can find, go heavily armed, wearing a flak jacket and a Kevlar helmet. Set up shop in a tent in a vacant lot. Announce to the residents that you are there to help them. 26. Eat a single M&M every Sunday and convince yourself it's for Malaria. 27. Demand each family member be limited to 10 minutes per week for a morale phone call. Enforce this with your teenage daughter. 28. Shoot a few bullet holes in the walls of your home for proper ambiance. 29. Sandbag the floor of your car to protect from mine blasts and fragmentation. 30. While traveling down roads in your car, stop at each overpass and culvert and inspect them for remotely detonated explosives before proceeding. 31. Fire off 50 cherry bombs simultaneously in your driveway at 3:00 a.m. When startled neighbors appear, tell them all is well, you are just registering mortars. Tell them plastic will make an acceptable substitute for their shattered windows. 32. Drink your milk and sodas warm. 33. Spread gravel throughout your house and yard. 34. Make your children clear their Super Soakers in a clearing barrel you placed outside the front door before they come in. 35. Make your family dig a survivability position with overhead cover in the backyard. Complain that the 4x4s are not 8 inches on center and make them rebuild it. 36. Continuously ask your spouse to allow you to go buy an M-Gator. 37. When your 5-year-old asks for a stick of gum, have him find the exact stick and flavor he wants on the Internet and print out the web page. Type up a Form 9 and staple the web page to the back. Submit the paperwork to your spouse for processing. After two weeks, give your son the gum. 38. Announce to your family that the dog is a vector for disease and shoot it. Throw the dog in a burn pit you dug in your neighbor's back yard. 39. Wait for the coldest/ hottest day of the year and announce to your family that there will be no heat/air conditioning that day so you can perform much needed maintenance on the heater/ air conditioner. Tell them you are doing this so they won't get cold/hot. 40. Just when you think you're ready to resume a normal life, order yourself to repeat this process for another six months to simulate the next deployment you've been ordered to support . ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9428 From: Date: Mon Aug 23, 2004 8:22am Subject: Re: Re: Far East Spystuff / Video-scanner In a message dated 8/23/04 7:28:26 AM Pacific Daylight Time, contranl@y... writes: > I know something, that is selled as "CATV spectrum analyzer" ( > hehe..) manufactured in China, and priced under 200$... Wavetek makes a number of handheld CATV Signal Level Meters with Spectrum display called the Micro stealth MS-1000 MS-1200 MS-1400, they seem to be a pretty hot item on ebay these days, if you can find the proper downconverter they might work quite well for you, with the proper antenna. However they are no match to a good spectrum analyzer. Greg [Non-text portions of this message have been removed] 9429 From: Jack Lloyd Date: Mon Aug 23, 2004 1:20pm Subject: Re: The Call Is Cheap. The Wiretap Is Extra. On Mon, Aug 23, 2004 at 06:18:20PM +0200, A Grudko wrote: [...] > Another issue involves decoding encrypted conversations. It is easier to > encrypt digital conversations than those in an analog format, and a > growing number of Internet phone providers are encrypting their calls. > Unscrambling the calls requires another piece of software. [...] One would sort of hope that it wouldn't be as trivial as 'another piece of software'. I suppose if vendors roll their own crypto protocols (distressingly common) it might be, but SRTP and DTLS pretty decent... -Jack 9430 From: szabo4381 Date: Tue Aug 24, 2004 2:08am Subject: Re: Far East Spystuff / Video-scanner --- In TSCM-L@yahoogroups.com, rkymntcolo1@a... wrote: > > In a message dated 8/23/04 7:28:26 AM Pacific Daylight Time, > contranl@y... writes: > > > I know something, that is selled as "CATV spectrum analyzer" ( > > hehe..) manufactured in China, and priced under 200$... > > > > > Wavetek makes a number of handheld CATV Signal Level Meters with Spectrum > display called the Micro stealth MS-1000 MS-1200 MS-1400, they seem to be a > pretty hot item on ebay these days, if you can find the proper downconverter > they might work quite well for you, with the proper antenna. However they are no > match to a good spectrum analyzer. Agree, that item is a spectrum monitor only, but still helpfull for some purposes...and really cheep.... ( the sweep-speed is verry slow, about 15 sec for the full screen, regardless of the span's width..) Here is a link to the manufacturer's website : http://www.jiuzhoutech.com If you can't succed, try in the google " lm-870 WR ", you will find it. Rgrds to all... 9431 From: contranl Date: Tue Aug 24, 2004 11:32am Subject: Re: Far East Spystuff / Video-scanner . Thanks again, for the hints to the portable cable-analyzers but since i would have to add: a lcd video screen a downconverter a video baseband demodulator I would probably be better off in trying to modify a "baby video monitor" wich has everything inside I would only need to make a relative easy modification to make it free scanning instead of only 4 channels I'll let you know if it works. Greetings Tetrascanner wwww.tetrascanner.com 9432 From: contranl Date: Tue Aug 24, 2004 11:42am Subject: Codegrabber for wireless car alarms ? . Is this whar i think it is ? : http://tinyurl.com/6u4pn A unit that receives the codes off "the air" as they are transmitted from wireless car openers and alarms...including the rolling code ones Offcourse you would have to know the tx frequncies and maybe it will not work on all systems...but still . i wonder if such a unit could be used to copy the code from a 200.000 $ Ferrari ? Shure such expensive cars will probably use a rolling code type of door opener...so knowing the current code won't be of much help since the next code should be different ! (there are some tricks however) It might work well with non rolling code types ? Tetrascanner . 9433 From: David C Williams Date: Tue Aug 24, 2004 1:41pm Subject: Tourist Question for Washington DC area folks My family and I will be in Washington, DC for the Labor Day weekend. How does anyone since 9/11 get a tour of the White House? Does anyone have any congressional or senate contacts to help facilitate this tour? Should we also get tickets to the Spy Museum before we get there? Any advice or guidance would be appreciated. Thanks. David C. Williams DCW & Associates 7400 Center Avenue, Suite 209 Huntington Beach, CA 92647 (714)892-0442 Fax (714)892-3543 CA PI License # PI 12300 Website: www.dcwpi.com Email: dwilliams@d... Driver Record/Vehicle Registration/Automated Name Index Information for California Serving Southern California's Investigative, Process Service and Computer Security Needs [Non-text portions of this message have been removed] 9434 From: Date: Tue Aug 24, 2004 1:10pm Subject: Congressman Illegally Shared Wiretap Tape, Judge Rules August 24, 2004 Congressman Illegally Shared Wiretap Tape, Judge Rules By ADAM LIPTAK congressman who passed along to reporters a tape of an illegally intercepted telephone call violated a federal law prohibiting wiretapping, a federal judge in Washington ruled on Friday. Legal experts said the logic of the decision could apply to information received by journalists as well and so affect routine news reporting. The case was brought by Representative John A. Boehner, Republican of Ohio, against Representative Jim McDermott, Democrat of Washington. It arose from a conference call in 1996 in which Newt Gingrich, who was speaker of the House, discussed how to deal with a finding against him by a House ethics subcommittee. Mr. Boehner participated by cellphone. A Florida couple, Alice and John Martin, recorded the call using a radio scanner. They delivered the tape to Mr. McDermott, who has said he passed it along to The New York Times and The Atlanta Journal-Constitution. The Martins pleaded guilty to using a radio scanner to intercept a call and were fined $500 each. Thomas F. Hogan, chief judge of the Federal District Court in Washington, will decide at a hearing next month how much Mr. McDermott must pay Mr. Boehner, who seeks lawyers' fees and punitive damages. Mr. McDermott defended his conduct. "I believed important public issues were involved," he said in a statement, "and that I had the right under the First Amendment to release the taped conversation to the news media." The wiretap law makes the knowing disclosure of an illegally intercepted communication both a crime and the basis for a civil lawsuit. In 2001, however, the Supreme Court ruled that the law was unconstitutional, at least when used to punish disclosure of information about matters of public concern by people who did not themselves participate in obtaining it unlawfully. "A stranger's illegal conduct does not suffice to remove the First Amendment shield from speech about a matter of public concern," Justice John Paul Stevens wrote for the majority. Judge Hogan said that decision did not protect Mr. McDermott because "he knew of the illegality of the Martins' disclosure at the time he voluntarily accepted it." That distinction, experts in First Amendment law said, is novel and at odds with the conventional understanding of the Supreme Court's decisions in this area. "Applied to journalists, if this holds, it would be a disaster," said Lee Levine, who represented defendants in the Supreme Court case. The Times published an article about the tape but was neither prosecuted nor sued, said George Freeman, an assistant general counsel of The New York Times Company. "Judge Hogan's decision may be extremely harmful," Mr. Freeman said, "since it goes well beyond past cases to hold that a totally passive recipient of information, who did not solicit or pay for it, can be held liable. Under this new rule, much of the information reporters acquire every day, from the Pentagon Papers on down, would become legally suspect." [Non-text portions of this message have been removed] 9435 From: moellerthy <1ach@g...> Date: Tue Aug 24, 2004 8:54pm Subject: Linear Log Peroid Antenna Greetings I have located a nice Antenna on Ebay item number is 5716672375. I would grad this iF I did not already have this type in my collection. Add a Patch antenna together with a nice microwave spectrum analyzer one could locate close to everything transmitting near field up to maybe 15 gig. Andre Holmes Neptune Enterprise Security 1ach@G... 9436 From: Steve Uhrig Date: Tue Aug 24, 2004 5:45pm Subject: Re: Tourist Question for Washington DC area folks On 24 Aug 2004 at 11:41, David C Williams , who eschews obfuscation, wrote: > My family and I will be in Washington, DC for the Labor Day weekend. How > does anyone since 9/11 get a tour of the White House? Does anyone have any > congressional or senate contacts to help facilitate this tour? Should we > also get tickets to the Spy Museum before we get there? Any advice or > guidance would be appreciated. I recently set up tours of the White House and Capitol for my wife's family reunion a few weeks ago (I couldn't make it that week but I've been before as a guest rather than a tourist). Tours are for a minimum of 10 people, and you'll get much better reception if your group is 25 or more. For less than 10 they will not be able to accommodate you. You need to start at least a month or so ahead of time. It takes that long to get scheduled. I started in May for tours in August and barely made it. There were only two slots at the White House left for the week my wife's family was in town. Holidays may be worse. Tours are not conducted on weekends and holidays, so watch your dates. If the government is closed so are government buildings. For a scheduled tour (only kind there is) of the White House and Capitol, you need to contact your Senator or Congressional Rep. They will have an aide assigned specfically to tours. You'll need a window of dates, the more flexible the better, and the number of visitors. Do not exaggerate the number. They have been known to turn away groups which showed up with substantially fewer members than had been approved. The aide will get back to you with a date, via phone. They are efficient and polite. You'll probably get a date if you give them a reasonable window with some alternate dates well enough in advance. It may take a month or more to get a date. Once you get a date and accept it, things start happening quickly. Tours are EARLY. For the White House, you need to be there usually by 0900 latest, and you really want to be there a good bit earlier. Do not count on getting anywhere in a hurry in DC esp during rush hour. This includes using the Metro from the outskirts. For the Capitol, you'll be approved hopefully, and will be given a confirmation number. You give that confirmation number to the Visitor's Booth and they'll give you your tickets. If you want to go to the Senate Floor observation room upstairs, you will need to visit the Senator's office in person the morning of your tour after having been appoved for a general Capitol tour and get special passes. There is no charge for any of this. For the White House, some weeks before the date, you'll be emailed an Excel spreadsheet file which contains a template. You are required to provide background info on every potential visitor, including name, Social inSecurity number, DOB, country of birth, and if U.S. citizen. You will have a VERY VERY tight window in which to return this info in Excel format via email. I had less than 2 days, with no notice, to get all the mentioned info from 28 people all over the country, half of whom didn't have email. The aide from my Senator's office called every half hour towards the end of the deadline reminding me to get that file to her before 4:30PM. It must be in a precise format, with fields filled out properly, as the file is handled electronically by the Secret Service. Anything improper and it will be rejected. Several of my wife's family did not get approved because they dragged their feet getting me info on their kids. Once you submit that info, you cannot add anyone else. I emailed it at 4:22PM and she got it at 4:30 exactly. If all are approved, you'll get an email with directions and instructions on which entrance to report to, and when. It will be early, tours are staggered, and there is ZERO flexibility. You are there at the time specified or you are not admitted. It is an efficient operation. You will be faxed instructions, a map and restrictions on what you can and cannot bring on your person. There is no holding area for restricted items. You can surrender them or be refused admittance. Any medicines, for example, must be declared and at their option may need to be surrendered to the tour director and returned at the end of the tour. No cameras, no purses, no food at all which includes bottles of water. You present your approval letter to the White House visitor's gate at the southeast corner and they admit you and process you through security which is a bit more involved than just passing through a metal detector. All that said, the people responsible for the tours are friendly, efficient and good to their word. If they say they will call you Tuesday at 4PM with info, the phone will ring at 4PM. In the same vein, when they specify a deadline for info they need from you, they mean it. Have all the personal data for visitors mentioned above in your hands before you even start to apply, as Secret Service gives the aide approval then they need the background info back almost immediately. It's not the aide. It's Secret Service. They beat up the aides for the info and the aides beat you up, politely and apologetically. Tours officially are held, but are subject to being cancelled at zero notice as late as the morning of the tour. Most people I have spoken with recently who jumped through all the hoops to get tours ended up getting cancelled, one group as they were standing at the visotor's entrance gate waiting to be processed in. So be prepared to do something else that day if security changes or whatever and tours are cancelled. You are given a phone number to call the evening before you're scheduled to see if there have been any last minute changes. My wife's family got to the Capitol but not to the White House. This was in the period of an increased alert status, but I don't think that really made much difference. Fortunately the weather was mild as you need to walk a good bit, and DC is hotter and more humid than other areas around here for some reason. Not good for geriatrics. The Metro is good, but in many cases you have to walk a block or two from the Metro stop to the place you're visiting. www.whitehouse.gov probably has a tour link. There is a virtual tour on the website which actually shows you more than you'd see on your own. My wife mentioned they spent more time in security processing than in touring the Capitol. You need reliable phone, email and fax, because all three will be needed for the tour coordinator to communicate with you. I personally would not spend five cents or five minutes to tour the Spy Museum, but that's a matter of personal choice. Loan them some old piece of spy junk and you'll get free admission for you and your immediate family in perpetuity. Even with that I wouldn't bother to go. The White House is worth the effort. The Capitol is not particularly interesting unless from the purely historical point of view of being there. The Air & Space Museum at Dulles is worth seeing. Plenty to do and see in DC. Lot of walking. Mild weather is best. Everything is expensive, and almost any tourist attraction has long waiting times unless you have arranged things in advance. The FBI museum no longer is open to visitors. Roads are closed off in the middle of downtown for several blocks around the White House for security reasons, not that there's the slightest chance of finding a parking spot anywhere in D.C. anytime. You need to park at a Metro station somewhere in the suburbs and take that everywhere you want to go. Hope this helps. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9437 From: Gerald Date: Tue Aug 24, 2004 7:44pm Subject: No way to secure computers, mic, and web cam. A dirty litte secret of the Internet is that none of our computers have been secure and they are not able to secure them. The Russian Hang up group knows this and sells credit card info on the internet in IRC chat rooms.. http://p082.ezboard.com/ffraudevidencelocker50744frm54.showMessage? topicID=31.topic They are in the process of seting up attack bots using megasploit http://p082.ezboard.com/ffraudevidencelocker50744frm61.showMessage? topicID=25.topic Hacking bots use your web cam and mic to spy on you. http://p082.ezboard.com/ffraudevidencelocker50744frm61.showMessage? topicID=31.topic and rootkits, http://cigars.bravepages.com/antispy.htm which force your security systems to lie to you. The new Microsoft security patch will cripple your computer and many Universitis have chose to NOT allow it to be down loaded onto University computer systems. http://www.bizreport.com/article.php?art_id=7855 Teh computer industry want you to believe that a firewall and anti- virus and a sweeper keep you protected, and its a lie. Wou can't stoop intrusions but you can spot them. http://cigars.bravepages.com/antispy.htm Terrorist attack in USA on Oct 30th 2004. http://p082.ezboard.com/ffraudevidencelocker50744frm71.showMessage? topicID=33.topic Gerald Internet Anthropologist, Ad Magnum 9438 From: Lou Novacheck Date: Tue Aug 24, 2004 8:33pm Subject: Re: Tourist Question for Washington DC area folks I haven't lived in that area since 9/11, but when I did live there, I'd usually advise people to contact their local Senator or Rep's office to arrange it. I'm retired Army, and that used to carry a little weight for some official tourist things. Dunno if it still does. Right after 9/11, they stopped the tours entirely. Also dunno if that's the way it is now. However, if they are, in fact, offering tours, I'd also advise people that in order to get tix on a walkup basis, you better be in line at 0-dark-thirty or you better make other plans. I did get tix on a few occasions for some family, and I'd usually be in line around 6am for the 0800? ticket scramble. Not sure about the time, but if you're going to do the lineup, be there an hour and a half, minimum, before the scrum begins. Tours back then, pre 9/11, were offered only 2hrs daily, 1000-1200. I know at least one of the list is nearby, so perhaps somebody still in the area can give you recent info. FWIW, literally every person I took was very disappointed with the FBI tour. And finally, dunno if the number's still good, but the info line used to was 202-456-7041. Lou Novacheck David C Williams wrote: My family and I will be in Washington, DC for the Labor Day weekend. How does anyone since 9/11 get a tour of the White House? Does anyone have any congressional or senate contacts to help facilitate this tour? Should we also get tickets to the Spy Museum before we get there? Any advice or guidance would be appreciated. Thanks. David C. Williams DCW & Associates 7400 Center Avenue, Suite 209 Huntington Beach, CA 92647 (714)892-0442 Fax (714)892-3543 CA PI License # PI 12300 Website: www.dcwpi.com Email: dwilliams@d... Driver Record/Vehicle Registration/Automated Name Index Information for California Serving Southern California's Investigative, Process Service and Computer Security Needs [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. From: James M. Atkinson Date: Fri Aug 23, 2002 11:11am Subject: Re: Telephone Analyzer Recommendations I have had really good results with a Riser Bond Model 6000 (with printer), a Fluke hand-held oscilloscope, a general purpose two line ping box/impedance sweeper, a TSCM audio amplifier, and a spectrum analyzer. Steve is right about using the Riser Bond products for TSCM. -jma At 11:20 AM -0400 8/23/02, Steve Uhrig wrote: >On 23 Aug 2002 at 3:39, atsi999 wrote: > >> I am in the market for a telephone analyzer to test business >> telephone instruments. I was wondering what models the group would >> recommend. I am leaning towards the ISA ETA-3A, but was wondering >> what other models the group uses or recommends. > >Jeff, you will find telephone analyzers have very little contemporary >following. I don't know anyone personally who uses one. > >Back when the phones were electromechanical, it was a different >story. Multiple pair combinations were involved with 25^2 >possibilities, high voltages to trip hookswitch bypasses was used, >electronics wasn't. > >A telephone analyzer is not much more than a few standard pieces of >test equipment packaged in a convenient carrying case. They work, but >are expensive and of limited utility. > >You will find competent sweepers using two main tools: a decent DVM >(Digital Volt-ohm Meter) like one of the Fluke series, and a TDR >(Time Domain Reflectometer), with Riser Bond www.riserbond.com being >the best in my opinion having owned, bought and sold every model they >sell and using one for fifteen years in my own work. > >Ted Swift wrote a superb book, described on his webpage: > >http://www.angelfire.com/biz/investigator/index.html > >on telephone sweeping. It's understandable, not too technical, but >holds you by the hand and takes you through telephone >countermeasures. It's cheap, and describes the line balance test, >which is simple, quick and cheap, and effective. > >I don't know what telephone analyzers sell for now, but the DVM new >and TDR used would set you back less than $2000 for both, and >whatever the cost is for the book. That's 90% of what you need for >sweeping phone lines. > >You will find the price of a Fluke DVM to be the same everywhere, >within one or two points. No sense in shopping as the price is fixed. >Jensen, Tessco or anywhere is OK as a source of a DVM. Doesn't matter >where you buy it; Fluke does the warranty. You should pay under $300. >A good model would be the best you can afford in the 1xx series. > >A used Riser Bond TDR might run $1250 +/- depending on the exact >model and the condition. I have several available, as do other used >equipment dealers. If you already have a decent oscilloscope, you can >use a lower end TDR for around $550 and do just as well. If you don't >already have a scope, don't buy one. > >You likely already have a DVM if you are into electronics or do >anything electronics related. > >Holler to the list if you need any more info on anything. > >Regards ... Steve -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6094 From: kondrak Date: Fri Aug 23, 2002 0:44pm Subject: Warning about possible "research" ruse > > >WARNING ABOUT POSSIBLE <> "RESEARCH" RUSE: "The Defense Security >Service has reported an apparent e-mail intelligence collection scheme >that has been traced to e-mail addresses in foreign countries. > >Cleared industrial facilities have been requested to report any >attempts as described below. In the recent past several employees of >cleared defense contractors have received e-mails from persons >purporting to be students, who asked for help with alleged educational >projects they were working on. > >The employees contacted did not know the "students." The "students" >somehow knew who had some degree of expertise pertaining to the focus >of their educational project. In some instances, the employees >contacted were working on classified projects. > >It appears classified information may have been requested. Should you >receive an e-mail from someone you do not know requesting information >for a Masters Thesis, or any other educational research paper, from >someone claiming to be a student at an institute of higher learning, >do not respond. > >Keep the e-mail and contact the NCI Facility Security Officer >responsible for your location. He/she will contact a Defense Security >Service Industrial Security Representative for guidance. > >REMEMBER!!! You do not have to hold a security clearance or work with >classified information to be a target of foreign intelligence >collection efforts!" > >[Monty Westmeyer, VP, NCI Information Systems, Inc. at www.nciinc.com > ]. 6095 From: A Grudko Date: Fri Aug 23, 2002 8:16pm Subject: Re: Optoelectronics Malfunctions - Original Message - From: infospy_com > I have bought a few pieces from Optoelectronics and they all seem to > go bad (do not work) after a few months. Has anyone else experienced > this? My Xplorer worked for a month and then went seriously deaf and would not 'sweep'. Andy Grudko (British) - D.P.M., Grad I.S, South Africa - PSIRA investigators Reg. No. 8642 Grudko Associates - www.grudko.com , andy@g... . Est. 1981. International business intelligence and investigations To contact us: (+27 12) 244 0255 - 244 0256 (Fax). ICQ : 146498943. Netmeeting : agrudko@h... IPA, SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust When you need it done right - first time 6096 From: Gregory Perry Date: Fri Aug 23, 2002 1:18pm Subject: Re: Optoelectronics Malfunctions I picked up a Digital Scout when they were first released, and had nothing but problems with it - captured freqs were completely off kilter, and the internal antenna connector had a kink in it which I had to replace. In their defense, Opto's technical support were more than willing to fix the unit at no cost, recalibrate it for free, etc. Seems like they are a small outfit, probably lacking in the quality control department. The following message was sent by "infospy_com" on Thu, 22 Aug 2002 16:57:01 -0000. > Hi Group, > > I have bought a few pieces from Optoelectronics and they all seem to > go bad (do not work) after a few months. Has anyone else experienced > this? > > Thanks, > > Bruce > Info@I... > Infospy.Com > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6097 From: Monty Date: Fri Aug 23, 2002 10:20pm Subject: Re: CSD-18????? Not a bad unit... If you do not mind throwing away your money. Just go to REI. --- spyworldltd wrote: > Great Southern Security produce a RFD that has a > range just short of > 5Khz, John Meyner is mentioned all over the site and > makes a number > of positive statements about his CDS-18. > > My question is this, does anybody have any opinions > experience with > Great Southern Security (positive or negative)or of > John Meyner. I > have attached a link below. > > http://www.greatsouthernsecurity.com/cardor7n.htm > > You opinions would be useful... > > Cheers > > David Emery > Spyworld Ltd > Tel. +44 8701 206185 > Fax. +44 08701 206186 > Mob. +44 7971 187561 > Email. david-emery@s... > > E&OE > > > __________________________________________________ Do You Yahoo!? Yahoo! Finance - Get real-time stock quotes http://finance.yahoo.com 6098 From: Andre Holmes <1ach@g...> Date: Sat Aug 24, 2002 8:14pm Subject: TSCM EQUIPMENT Hello all Check this site http://www.audiotel-int.com/ for product Sig-Net. Looks to be a hot seller per spec sheet. ANDRE HOLMES [Non-text portions of this message have been removed] 6099 From: Jay Coote Date: Sat Aug 24, 2002 8:56pm Subject: AOR-3000 Reveiver Mods? I would like to modify an AOR-3000 receiver for 10.7 MHz IF output to a spectrum analyzer, as well as an output to an SCD5 or other subcarrier receiver in 10-500 KHz. Has this been done? Thanks, Jay Coote Los Angeles 6100 From: James M. Atkinson Date: Sun Aug 25, 2002 5:26am Subject: Re: TSCM EQUIPMENT I would have to disagree; The specification indicates that it has poor sensitivity, and that you have to be be very, very close to the device for it to trip. Note the H and L on the sensitivity chart... they really need to add a nice LNA on the front end or the SIG*NET will miss quite a bit. Yes, it's a cute little broadband diode detector... but's its not much different then a Digital Scout, or a CPM-700 From what I can see the CPM-700 is better then the SIG*NET, but I would love to do a side-by-side write up on both of them. -jma At 9:14 PM -0400 8/24/02, Andre Holmes wrote: >Hello all > >Check this site http://www.audiotel-int.com/ for product Sig-Net. > >Looks to be a hot seller per spec sheet. > > ANDRE HOLMES -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6101 From: Kevin D. Murray Date: Sun Aug 25, 2002 8:31am Subject: Re: TSCM EQUIPMENT - SigNet v. CPM-700 My firm has tested both to assist clients with solution / purchasing decisions. Both are quality units from very reputable companies. Both fulfilled their stated specifications. The SigNet is new this year and has some very worthy and novel features (not easily gleaned from reading the literature alone). (Subjective...) Surprise. After street-testing, it became clear that they are not actually competitors. Each instrument has certain things it does very well. Each will leave a little something to be desired if your expectations exceed the manufacturer's. Final application will guide the purchase. (Just for the benefit of other list members who don't know me.) No, I don't sell either product, or accept commissions for the sale of any products. Our clients pay us to test and make recommendation. Test units were not loaned to us by the manufacturer. They were purchased and retained. Kevin Kevin D. Murray - CPP, CFE, BCFE Murray Associates Eavesdropping Detection and Counterespionage Consultants to Business & Government http://www.spybusters.com 6102 From: Andre Holmes <1ach@g...> Date: Sun Aug 25, 2002 8:55am Subject: Fw: AOR-3000 Reveiver Mods? ----- Original Message ----- From: "Andre Holmes" <1ach@G...> To: "Jay Coote" Sent: Sunday, August 25, 2002 12:47 AM Subject: Re: [TSCM-L] AOR-3000 Reveiver Mods? > Hello Jay > Try this > Tap the volume control or the head phone jack that takes the demod straight > to your input of your subcarrier receiver. > Tune the subcarrier to mid range gain and choose the upper freq 10-500 KHz > on the subcarrier receiver. The two conductor audio cable from the tap > connection is input to your AOR3000 OR ANY RADIO next tune slowly the entire > range of your radio and you should pick up the subcarrier audio from the > freq that you choose. > When you get audio, tune your SA to the carrier and there you have it. > I used a subcarrier receiver that tunes 10-100 KHz > then 80-690 KHz I have not used the Kaiser box for said purpose I used the > SCD5 for Telco. > I bought the subcarrier receiver that was in a Electronic Countermeasures > kit 10 yrs ago form Executive Protection Products, Inc. was located in Napa > California they no longer sale equipment but are in the Industry still, > under a new name I cant remember now but you might know of them really good > people. > I cannot advice on the input to your SA cause you may overload the 1st LO of > your radio. > ANDRE HOLMES > > > ----- Original Message ----- > From: "Jay Coote" > To: > Sent: Saturday, August 24, 2002 9:56 PM > Subject: [TSCM-L] AOR-3000 Reveiver Mods? > > > > I would like to modify an AOR-3000 receiver for 10.7 MHz IF output > > to a spectrum analyzer, as well as an output to an SCD5 or other > > subcarrier receiver in 10-500 KHz. > > Has this been done? > > Thanks, > > Jay Coote > > Los Angeles > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > 6103 From: A Grudko Date: Sun Aug 25, 2002 10:55am Subject: Re: Optoelectronics Optoelectronics : Are they represented on this group? ----- Original Message ----- From: Gregory Perry To: infospy_com Cc: Sent: Friday, August 23, 2002 8:18 PM Subject: Re: [TSCM-L] Optoelectronics Malfunctions > I picked up a Digital Scout when they were first released, and had nothing but problems with it - captured freqs were completely off kilter, and the internal antenna connector had a kink in it which I had to replace. > > In their defense, Opto's technical support were more than willing to fix the unit at no cost, recalibrate it for free, etc. Seems like they are a small outfit, probably lacking in the quality control department. > > The following message was sent by "infospy_com" on Thu, 22 Aug 2002 16:57:01 -0000. > > > Hi Group, > > > > I have bought a few pieces from Optoelectronics and they all seem to > > go bad (do not work) after a few months. Has anyone else experienced > > this? > > > > Thanks, > > > > Bruce > > Info@I... > > Infospy.Com 6104 From: A Grudko Date: Sun Aug 25, 2002 1:06pm Subject: AOR-3000 Reveiver Mods I suppose almost any FM receiver can be modified to provide an output to feed a subcarrier Rx - just sniff around with your 'scope & find the demod audio output on the demod chip, look for lots of "Grass" - high amplitude spikes. The best connection is the one that goes off to the noise amplifier, and detector that is used for the squelch switch, inside the same chip. It's usually taken off through a low value (300 pf?) cap, this is to feed only the high audio frequencies and noise, which is the main component that changes, dramatically with signal. This point will contain any subcarriers.up to 500k or so.. If this is not the case, and the squelch is performed by some other method, look for the ordinary audio pin. There you will usually find a 1n cap to ground, or a series resistor and a cap to ground, this is used for De-Emphasis. Disconnect the print around the chip leg ,push a small piece of sleeving over & take the signal from this pin, insert a series resistor of 330ohm or so, reconnect the cap beyond here and the original signal path remains intact. Andy Grudko (British) - D.P.M., Grad I.S, South Africa - PSIRA investigators Reg. No. 8642 Grudko Associates - www.grudko.com , andy@g... . Est. 1981. International business intelligence and investigations To contact us: (+27 12) 244 0255 - 244 0256 (Fax). ICQ : 146498943. Netmeeting : agrudko@h... IPA, SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust When you need it done right - first time 6105 From: Jay Coote Date: Sun Aug 25, 2002 5:40pm Subject: Optoelectronics Items For Sale I have the following Optoelectronics items for sale: 1.SCOUT MODEL 40, Version 2.0 Good cosmetic and working condition Rubber whip antenna No charger or manual 2.DC440 DECODER, Version 3.1 Good cosmetic and working condition No charger or manual 3.R10 INTERCEPTOR Fair cosmetic condition, some scratches on edges of case. Unknown working condition- I'm basicaly throwing in the R10 with the two units above- No manual or charger. $400 + Shipping within USA Thanks, Jay 6106 From: Charles P. Date: Sun Aug 25, 2002 8:04pm Subject: Re: Optoelectronics Whenever I spoke with people at Opto (last time was a few years ago), they admittedly were not up on the TSCM applications, their target being the hobbyist. They knew we were buying them but seemed to feel it wasn't a big market. Charles ----- Original Message ----- From: "A Grudko" To: Sent: Sunday, August 25, 2002 11:55 AM Subject: Re: [TSCM-L] Optoelectronics > Optoelectronics : Are they represented on this group? > > > ----- Original Message ----- > From: Gregory Perry > To: infospy_com > Cc: > Sent: Friday, August 23, 2002 8:18 PM > Subject: Re: [TSCM-L] Optoelectronics Malfunctions > > > > I picked up a Digital Scout when they were first released, and had nothing > but problems with it - captured freqs were completely off kilter, and the > internal antenna connector had a kink in it which I had to replace. > > > > In their defense, Opto's technical support were more than willing to fix > the unit at no cost, recalibrate it for free, etc. Seems like they are a > small outfit, probably lacking in the quality control department. > > > > The following message was sent by "infospy_com" on Thu, > 22 Aug 2002 16:57:01 -0000. > > > > > Hi Group, > > > > > > I have bought a few pieces from Optoelectronics and they all seem to > > > go bad (do not work) after a few months. Has anyone else experienced > > > this? > > > > > > Thanks, > > > > > > Bruce > > > Info@I... > > > Infospy.Com > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 6107 From: Mike Dever Date: Sun Aug 25, 2002 7:00pm Subject: Transient Limiter/RF Coupler Does anyone on the group know where I might be able to source a commercially available 'transient limiter/ RF Coupler' device for connection of a SA or oscilloscope to the AC mains looking for VLF and AC mains devices (JMA suggests 100Hz to 400MHz). I am aware that REI has a VLF probe but its frequency range is limited (15kHz to 1 MHz). Regards Mike Dever CPP DEVER CLARK & Associates Canberra, Australia Email: deverclark@b... 6108 From: Mitch D Date: Sun Aug 25, 2002 10:14am Subject: Re: AOR-3000 Reveiver Mods? I know Scancat software supports the AOR 3K, www.scancat.com I've used the software before to change the parameters for AOR products and it works well,runs in windows,lots of features,safe to use... Hope this helps --- Jay Coote wrote: > I would like to modify an AOR-3000 receiver for 10.7 MHz IF output > to a spectrum analyzer, as well as an output to an SCD5 or other > subcarrier receiver in 10-500 KHz. > Has this been done? > Thanks, > Jay Coote > Los Angeles > __________________________________________________ Do You Yahoo!? Yahoo! Finance - Get real-time stock quotes http://finance.yahoo.com 6109 From: Mitch D Date: Sun Aug 25, 2002 1:57pm Subject: Re: Optoelectronics --- A Grudko wrote: > Optoelectronics : Are they represented on this group? I dont think so.If you need a live person for help,contact Kevin Cox,Operations Manager, thru sales@o... tel 954 771 2050 nice guy,knows his product line very well. I've had several of their products for over 6 years and have had good luck with them,had a scout recalibrated once and that was about all I ever needed. __________________________________________________ Do You Yahoo!? Yahoo! Finance - Get real-time stock quotes http://finance.yahoo.com 6110 From: Monty Date: Sun Aug 25, 2002 2:54pm Subject: Re: TSCM EQUIPMENT - SigNet v. CPM-700 Kevin In your message you said . . . "Each instrument has certain things it does very well. Each will leave a little something to be desired if your expectations exceed the manufacturer's." However, you did not back up you statement. Can you please list side-by-side the pros and cons of each that support what you say? Monty --- "Kevin D. Murray" wrote: > My firm has tested both to assist clients with > solution / purchasing > decisions. Both are quality units from very > reputable companies. Both > fulfilled their stated specifications. The SigNet is > new this year and > has some very worthy and novel features (not easily > gleaned from > reading the literature alone). > > (Subjective...) > Surprise. After street-testing, it became clear that > they are not > actually competitors. Each instrument has certain > things it does very > well. Each will leave a little something to be > desired if your > expectations exceed the manufacturer's. Final > application will guide > the purchase. > > (Just for the benefit of other list members who > don't know me.) > No, I don't sell either product, or accept > commissions for the sale of > any products. Our clients pay us to test and make > recommendation. Test > units were not loaned to us by the manufacturer. > They were purchased > and retained. > > Kevin > > Kevin D. Murray - CPP, CFE, BCFE > Murray Associates > Eavesdropping Detection and > Counterespionage Consultants > to Business & Government > http://www.spybusters.com > > __________________________________________________ Do You Yahoo!? Yahoo! Finance - Get real-time stock quotes http://finance.yahoo.com 6111 From: Date: Mon Aug 26, 2002 6:31am Subject: SigNet v. CPM-700 - Let's make a deal. In a message dated 8/26/02 7:51:59 AM Pacific Daylight Time, monty399@y... writes: << However, you did not back up you statement. Can you please list side-by-side the pros and cons of each that support what you say? Monty --- "Kevin D. Murray" wrote: Our clients pay us to test and make recommendation. >> Kevin is a professional. Who's going to pay him? 6112 From: Kevin D. Murray Date: Mon Aug 26, 2002 11:18am Subject: Re: TSCM EQUIPMENT - SigNet v. CPM-700 > Kevin > > In your message you said . . . > > "Each instrument has certain things it does very well. Each will leave > a little something to be desired if your expectations exceed the > manufacturer's." However, you did not back up you statement. Can > you please list side-by-side the pros and cons of each that support > what you say? > > Monty Hi Monty, Good observation. I was sharing a bit of experience gained from my work product. The objective was to tease out an element of balance in the discussion, promote open-mindedness, and foster individual thinkspertation. (Simply glancing at a subject - but not touching - can be stimulating.) Just think of me as a TSCM Pro-stitute. (one of many on the list) Kevin P.S. As many of you know, I have no problem helping my colleagues with detailed information on individual problems and questions. I won't do your homework for you, and I won't give away something my client has had to pay for, but I will do my best in all other ways. This is usually done via private correspondence. Suggestion... When writing to me (or the list, for that matter) it would be nice if you identified (as below). My mother said don't talk to strangers, but hey, she doesn't know I'm a pro-stitute either. Shhhhhh. Kevin D. Murray - CPP, CFE, BCFE Murray Associates Eavesdropping Detection and Counterespionage Consultants to Business & Government http://www.spybusters.com 6113 From: James M. Atkinson Date: Tue Aug 27, 2002 6:43am Subject: Terror-war wiretaps get tangled in new scrutiny of FBI http://www.csmonitor.com/2002/0826/p02s01-usju.html Terror-war wiretaps get tangled in new scrutiny of FBI Court ruling sets back attorney general's attempt to widen surveillance powers. By Brad Knickerbocker | Staff writer of The Christian Science Monitor A major campaign in the war on terrorism involves lawmakers, lawyers, and jurists as combatants arrayed along a battle line marked by minute readings of law. Until now, their home front struggle has been mostly clandestine. But recently it's broken out onto open ground. A normally secretive federal court dealing with intelligence matters has openly criticized the US Justice Department for overstepping its bounds in ferreting out terrorists. And in Congress, prominent Republicans as well as Democrats are butting heads with Attorney General John Ashcroft over lawmakers' oversight role in the effort to fight terrorism. The essential issue is the degree to which the US Justice Department pursue terrorist suspects using court-approved searches and wiretaps. To investigate them as part of an intelligence operation is one thing; going after them as criminal suspects is quite another. This may seem like arguing over legalistic angels on the head of an irrelevant pin. but there is an important difference involving the "probable cause" necessary to charge someone with a crime. It is generally more difficult to get court approval to use wiretaps in criminal prosecutions than it is in an intelligence probe. The secret Foreign Intelligence Surveillance Court (established in 1978 in the wake of abuses by the Nixon administration) typically settles such questions. The Justice Department asserts that the USA Patriot Act, passed after Sept. 11, widened the powers to investigate terrorism, including wiretaps and sharing information between intelligence investigators and criminal prosecutors. Not so, declared the intelligence surveillance court in a ruling made public last week. Citing "the troubling number of inaccurate FBI affidavits in so many [Foreign Intelligence Surveillance Act] applications," the court said, "In virtually every instance, the government's misstatements and omissions in FISA applications and violations of the Court's orders involved information sharing and unauthorized disseminations to criminal investigators and prosecutors." Justice Department lawyers quickly appealed the ruling to the Foreign Intelligence Surveillance Court of Review - the next judicial step up made up of a three-member panel of semiretired senior federal judges appointed by Chief Justice William Rehnquist. In its appeal seeking more law enforcement powers (including wiretaps and searches), the Justice Department asserts that in passing the USA Patriot Act, lawmakers agreed that "the country and its people can no longer afford a fragmented, blinkered, compartmentalized response to international terrorism and espionage." Civil Liberties advocates were quick to applaud the court's ruling. "When the government is investigating crime, it must be able to show a judge strong evidence of wrongdoing before it is allowed to search a home or record telephone conversations," says Gregory Nojeim, chief legislative counsel of the American Civil Liberties Union in Washington. Some important lawmakers agree. "What ... the court properly rejected, was the idea that absent probable cause that a crime has been committed, a law enforcement official could direct our nation's spies to conduct surveillance on someone they claim is a criminal suspect," Rep. John Conyers (D) of Michigan, senior Democrat on the House Judiciary Committee, wrote to Ashcroft. Citing their power to oversee Justice Department conduct, Mr. Conyers and Rep. James Sensenbrenner (R) of Wisconsin, chairman of the committee, sent Ashcroft a list of 50 questions about implementation of the USA Patriot Act. That was more than two months ago; Ashcroft has yet to reply fully. Mr. Sensenbrenner said last week he will "start blowing a fuse" if answers are not provided soon, perhaps issuing the attorney general a subpoena. Senators of both parties have expressed frustration as well, including Judiciary Committee chairman Patrick Leahy (D) of Vermont and Republican committee members Arlen Specter of Pennsylvania and Charles Grassley of Iowa. They have complained that unclassified information from the intelligence court was being withheld. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6114 From: James M. Atkinson Date: Tue Aug 27, 2002 6:34pm Subject: FBI leaks probe eyes senators [I can name a short list of the five offenders in the Senate -jma] http://news.com.au/common/story_page/0,4057,4973711%255E401,00.html FBI leaks probe eyes senators August 26, 2002 THE US Federal Bureau of Investigation has narrowed its investigation of a potentially damaging leak of intelligence dealing with the events of September 11, focusing it on members of the US Senate, lawmakers have said. "We have currently under review not only members and staff of Congress, but also executive agency and intelligence agency officials who heard the same information during the same closed hearings," said Bob Graham, chairman of the Senate Intelligence Committee, appearing on the CBS "Face the Nation" program yesterday. The comment came after the FBI, in a move unseen since the Vietnam War, asked 17 senators to submit their notebooks, calendars and telephone logs in an apparent attempt to determine whether they had contacts with journalists, according to congressional officials. At the same time, Democratic Congresswoman Nancy Pelosi, who sits of the House Intelligence Committee, said she was not aware of any such request directed to members of the House of Representatives, an indication the FBI may now have a rough idea of where the leak came from. Justice officials have refused to comment on the probe. The investigation was launched in June after several US newspapers and at least one television network reproduced a portion of a September 10 National Security Agency intercept, in which two people communicating in Arabic made what is believed to be a reference to the impending attack on the United States. "The match is about to begin," one of the interlocutors was quoted as saying. The other responded: "Tomorrow is zero hour." The intercept, which reportedly was not translated until September 12, is seen by many on Capitol Hill as crucial evidence that US intelligence agencies failed to protect the country from the terrorist plot allegedly hatched by Islamic militant Osama bin Laden and his al-Qaeda associates. Members of Congress were briefed about the intercept by NSA Director Lieutenant General Michael Hayden during a closed meeting, but the agency has refused all comment on the matter. The leak has triggered an angry reaction from Vice President Dick Cheney, who called Graham and House Intelligence Committee Chairman Porter Goss and upbraided them for their failure to keep government secrets, according to congressional officials. In response, Graham and Goss, who are leading a congressional probe into the events leading-up to September 11, formally asked the FBI to find the culprits. Graham said the senators were "fully cooperating" with the investigators and were trying to fulfill their requests. But Pelosi, who appeared on ABC's "This Week" show, expressed concern the probe of members of Congress who are, in turn, investigating the FBI's performance in the run-up to September 11, could undercut the separation of powers doctrine. "I think that the FBI has to understand that they should proceed cautiously because of the balance of power and the checks and balances that we have between the executive and the legislative branch," the California Democrat said. Agence France-Presse -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6115 From: iDEN-i100 Date: Wed Aug 28, 2002 9:07am Subject: $25 million - Secure home $25 million - Secure home http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=1761906773 6116 From: James M. Atkinson Date: Wed Aug 28, 2002 11:09am Subject: Re: $25 million - Secure home At 10:07 AM -0400 8/28/02, iDEN-i100 wrote: > $25 million - Secure home > >http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=1761906773 Too bad it's only worth about $250,000. The "20 acres" of land has some value, but the Right of Way and private road puts a pinch on the value (hence the private airstrip). The LCC and silo are actually of minimal value as the site was previously contaminated with hydrazine fuel, hydrogen proxide, asbestos, and beryllium, and the deeds would have to be branded as such. Sure it's nice hat they cleaned it up... but who's to say there will not be problems in the future. The silo has a habit of filling with ground water, and you have to run a dehumidifier and sump pumps all the time as the concrete weeps and water collects. The company selling the site has been trying to unload this white elephant for a number of years, and there are around 400+ sites similar to it across the US that you can pick up for a fraction of what they are asking. I spend most of the early 80's crawling all over these and related sites for the government, and know most of them by heart. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6117 From: iDEN-i100 Date: Wed Aug 28, 2002 11:25am Subject: Re: $25 million - Secure home I like the idea of having an air strip at you front door. There is a community in Ga that also has an airstrip at their front door. "James M. Atkinson" wrote: > At 10:07 AM -0400 8/28/02, iDEN-i100 wrote: > > $25 million - Secure home > > > >http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=1761906773 > > Too bad it's only worth about $250,000. > > The "20 acres" of land has some value, but the Right of Way and > private road puts a pinch on the value (hence the private airstrip). > > The LCC and silo are actually of minimal value as the site was > previously contaminated with hydrazine fuel, hydrogen proxide, > asbestos, and beryllium, and the deeds would have to be branded as > such. Sure it's nice hat they cleaned it up... but who's to say there > will not be problems in the future. > > The silo has a habit of filling with ground water, and you have to > run a dehumidifier and sump pumps all the time as the concrete weeps > and water collects. > > The company selling the site has been trying to unload this white > elephant for a number of years, and there are around 400+ sites > similar to it across the US that you can pick up for a fraction of > what they are asking. > > I spend most of the early 80's crawling all over these and related > sites for the government, and know most of them by heart. > > -jma > > -- > > -------------------------------------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------------------------------- > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > -------------------------------------------------------------------------------------------------- > Strategy without tactics is the slowest route to victory. > Tactics without strategy is the noise before defeat. - Sun Tzu > -------------------------------------------------------------------------------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 6118 From: Fernando Martins Date: Wed Aug 28, 2002 2:19pm Subject: trivia ... or not Hi2all radar1: long range tridimentional, OTAN standard radar2: with IFF mark 12 mode 4/super mode 4 simulator: RES comm's: Link 11, land and air misc: consoles and stuff ... I can think in Harris and Raytheon, can others refer some other options? Thanks FM 6119 From: Date: Wed Aug 28, 2002 9:43am Subject: Parametric Cavities I came across this and would like comment "...devices were called "PARAMETRIC CAVITIES" , physically they were simply shaped like small cylinders with thin gold diaphrams mounted in them. The theory of operation was based on metallic substances of a specific shape having the ability to interact with microwave frequencies in such a fashion as to oscillate in sympathy and generate a lower harmonic radio frequency which could then be received by a nearby receiver. This theory worked very well for clandestine eavesdropping equiptment. The device needed no power source, looked completely innocuous, and could not be detected via traditional means" ************************************** This email is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient, you must not make any use of this information, copy or show it to any person. Any use, forwarding, printing or copying of this message is strictly prohibited. 6120 From: Matt Paulsen Date: Wed Aug 28, 2002 4:12pm Subject: RE: Parametric Cavities John Gregory Lambros Reg. No. 00436-124 U.S. Penitentiary Leavenworth P.O. Box 1000 Leavenworth, Kansas 66048-1000 USA www.brazilboycott.org/may_pressrelease.html It's sad really, if he wasn't tortured and abused, he's obviously mentally unstable. If he was tortured and abused, then he may have at one time been a stable and social individual who is now mentally unstable. Either way it's a sad sad thing to see. -----Original Message----- From: mcresearch@w... [mailto:mcresearch@w...] Sent: Wednesday, August 28, 2002 7:44 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Parametric Cavities I came across this and would like comment "...devices were called "PARAMETRIC CAVITIES" , physically they were simply shaped like small cylinders with thin gold diaphrams mounted in them. The theory of operation was based on metallic substances of a specific shape having the ability to interact with microwave frequencies in such a fashion as to oscillate in sympathy and generate a lower harmonic radio frequency which could then be received by a nearby receiver. This theory worked very well for clandestine eavesdropping equiptment. The device needed no power source, looked completely innocuous, and could not be detected via traditional means" ************************************** This email is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient, you must not make any use of this information, copy or show it to any person. Any use, forwarding, printing or copying of this message is strictly prohibited. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6121 From: William Knowles Date: Wed Aug 28, 2002 11:09pm Subject: Man faces charges in guinea pig dissection http://www.insidevc.com/vcs/county_news/article/0,1375,VCS_226_1352635,00.html By Andrea Cavanaugh, acavanaugh@i... August 28, 2002 An Oxnard man faces felony charges for torturing and dissecting his daughter's pet guinea pig because he thought it was a camera-equipped robot placed in his home by government agents, a prosecutor said Tuesday. Benny Zavala, 34, is set to go to trial Oct. 1 on two counts of felony animal cruelty and one count of being under the influence of methamphetamine, Deputy District Attorney Tom Connors said. If convicted on all counts, Zavala faces a maximum sentence of three years in prison, he said. Zavala's attorney, Deputy Public Defender Robert Dahlstedt, did not return a phone call Tuesday. The guinea pig belonged to Zavala's 6-year-old daughter, Connors said. Zavala called a neighbor over to his home the night of Sept. 13, 2001, Connors said. The neighbor found Zavala poking the guinea pig with a utility knife, he said. "He said the guinea pig was a robot and it was spying on him," Connors said. "He said it had a camera in the back of its head." Zavala called the neighbor the next day to report he had killed the animal and learned it was not a robot, Connors said. "She went over, and he had dissected it," he said. The neighbor contacted mental health officials, who called police. Zavala told police he had killed the guinea pig because it was diseased and could no longer stand, Connors said. A necropsy revealed the animal was being starved to death, he said. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 6122 From: Raymond Date: Thu Aug 29, 2002 3:53am Subject: Lose one cell and gain another Lose one cell and gain another THE STAR, August 27 2002 http://www.iol.co.za/index.php?click_id=6&art_id=ct20020827203923827C414396& set_id=1 You could be jailed for up to 20 years or fined R20-million for not reporting your lost, stolen or destroyed cellphone and/or SIM card. These seemingly draconian penalties are to be imposed in terms of a bill presently before parliament. The aim is to help nab cellphone thieves. In terms of the Regulation of Interception of Communications Bill, which is under consideration by the National Assembly's Justice Committee, any owner of a cellphone or SIM card which is stolen, lost or destroyed, "or any other person who was in possession or had control thereof", must within a reasonable time report the incident to the police. The report can be made telephonically but the person doing the reporting must receive a case number from the South African Police Service (SAPS). The penalty for not complying, which is contained within a broad range of offences, is imprisonment not exceeding 20 years or a fine not exceeding R20-million. Justice Committee chairperson Johnny de Lange said on Tuesday it was not the intention of lawmakers to imprison someone for 20 years for failing to report a lost cellphone. "These are merely the outer parameters," he said. The penalties for the offence had been contained within a broad range of penalties to simplify the bill, he added. "We have given the courts incredibly wide discretion in a number of offences," De Lange added. The penalties are to be used to protect the privacy of individuals and would apply to law enforcement officials and intelligence agents who abuse the bill. They would also apply to cellphone operators who do not comply with the law. Civil rights groups are concerned about the presumptions of guilt contained in the bill, which may be challenged in the Constitutional Court. --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za From: Miguel Puchol Date: Thu Aug 24, 2000 2:40am Subject: bugged.com Hi All, Just took a look at this 'super-site' - if they can charge sweeps by squared feet, I think we could do so by cubed feet, or by MHz sweeped, or by watts consumed by our equipment...aarrgh! The song is sooooo great I think I too will ask her 5-year old son to bang on his Casio piano to compose one for me - you may have noticed that under the player it says 'Composed by Bill Conelly', who is a great Scottish comedian. I doubt he's the source of such concoction though. He could be, though, the source of the uniform, or maybe the whole web site... Cheers, Mike 1293 From: Date: Thu Aug 24, 2000 6:22am Subject: Global Phone Deals Face Scrutiny From a New Source: The FBI August 24, 2000 Global Phone Deals Face Scrutiny From a New Source: The FBI By NEIL KING JR. and DAVID S. CLOUD Staff Reporters of THE WALL STREET JOURNAL WASHINGTON -- Foreign telecommunications companies doing deals in the U.S. expect scrutiny from federal antitrust enforcers and telecom regulators. But lately they've had to confront a new potential deal-buster: Special Agent Alan McDonald of the Federal Bureau of Investigation. When TMI Communications Inc. wanted to sell satellite-phone service to U.S. subscribers, the Canadian company sought permission from the Federal Communications Commission. The FCC was preparing to approve the plan last year when lawyers and agents led by Mr. McDonald showed up to voice the FBI's objections -- delaying the approval of the deal by a year. "It was something we never expected," says Laurier Boisvert, TMI's chief executive officer. The FBI feared it would have no legal or practical way to wiretap a phone service operated entirely outside the U.S. After months of negotiations, TMI agreed last fall to install a call-switching station in New England through which it would route all its U.S. traffic. The whole process, says Mr. Boisvert, was "like pulling hen's teeth," and cost nearly $3 million. Since a 1996 law deregulated the U.S. telecom business, Mr. McDonald and the FBI have elbowed their way into nearly every big deal involving foreign and U.S. telecom companies. Their mission: preserve the FBI's decades-old snooping capacity and safeguard the country from foreign spies. Now, an agency known for chasing mobsters and dueling with drug cartels is playing spoiler in the global telecom business. More Interceptions As the industry has grown in recent years, so too has electronic surveillance by federal authorities. State and federal courts approved 2,236 so-called intercepts last year, up from 1,309 a decade ago. Today's drug smugglers and terrorists have more ways than ever to communicate, including satellite phones, pagers and e-mail. Such services are now being offered by companies in Great Britain, Canada, Japan and other foreign nations, complicating the task of surveillance. The FBI's worries go beyond chasing criminals. The agency also fears that foreigners could use control of phone networks in the U.S. to eavesdrop on business conversations and steal trade secrets. FBI officials also worry that foreign companies might work on behalf of their own countries' intelligence services, using U.S. networks to funnel information back home. Increasing Risk "Back in the good old days, with AT&T, we had one-stop shopping," says Patrick Kelly, the FBI's deputy general counsel. "Now things are becoming increasingly risky to us, as the points of contacts are spread out in an increasingly global world." So the FBI has thrust itself into a string of transactions, from British Telecom's failed bid to buy MCI Communications Corp. in 1996 to Verizon Communications Inc.'s joint venture this year with Britain's Vodafone PLC. Deutsche Telekom AG's recent $50 billion offer for VoiceStream Wireless Corp. of Bellevue, Wash., is sure to draw close FBI scrutiny thanks to the German government's large stake in Deutsche Telekom. Lately, the FBI extended its regulatory reach to the Internet, holding up Nippon Telegraph & Telephone Corp.'s $5.5 billion offer to acquire U.S. Internet Web-hosting company Verio Inc. until the Japanese buyer agreed to strict national-security safeguards. The agency hasn't killed any deals. But some executives complain that the FBI's virtual veto power forces companies into concessions -- such as locating switching systems in the U.S. -- that don't make business sense. FBI demands also have varied from deal to deal, adding more ambiguity to the regulatory process. Also, with communications technology changing so rapidly and blurring international borders, the FBI's role is likely to become more difficult to maintain and more controversial over time. A Pound of Flesh It's a "case-by-case extortion where the FBI tries to extract whatever pound of flesh it can from each company that comes along," says James Dempsey, a telecom specialist at the Center for Democracy and Technology, a Washington privacy group. FCC Commissioner Harold Furchtgott-Roth agrees. "You talk to [FCC] staff and they all hate what the FBI's doing, but publicly no one will say a word," he says. When the U.S. was preparing to open its telecom market in the mid-1990s, the FCC, an independent agency, promised "deference to the views of the executive branch" on national-security concerns. Since then, when the FBI wants to attach conditions to foreign deals, the FCC delays its approval until the FBI and companies agree on safeguards. The FBI says it's using the regulatory process to perform a valuable national service. Each time a U.S. communications company comes under foreign control, a new security threat is born, the agency says. Each threat must be handled carefully, even if it means delays in approval of the deals. FBI Director Louis Freeh began warning Congress of such threats in 1995, before such mergers were possible. Enter the Bulldog British Telecom and MCI learned about the FBI's expanding role in a three-page memorandum that arrived at the FCC several weeks after the companies announced merger plans in 1996. The FBI memo raised concerns about "the potential for a foreign-based carrier to surreptitiously conduct electronic surveillance monitoring of U.S. persons and companies." Attached to the memo was the business card of Mr. McDonald, a 25-year FBI veteran whose title is special counsel for electronic surveillance. Since the early 1990s, the 52-year-old agent's job has been to make sure the FBI's covert surveillance capabilities aren't diminished by changes such as the shift from copper wires to fiber optics. He's a lawyer with a .38-caliber sidearm, but he tries not to carry it during attorney meetings. People who have dealt with him say he's a bulldog. "He's a true believer in maintaining what he sees as the bureau's ability to monitor information, and every position he takes flows from that," says David Banisar, a lawyer with the Electronic Privacy Information Center, a Washington privacy group. Speaking at a conference in Montreal in 1997, Mr. McDonald cautioned that the "extreme" agenda of privacy advocates threatened to "handcuff" law-enforcement agencies. In negotiations he has warned company lawyers that, if they don't succumb to FBI demands, they could be responsible for the next terrorist bombing or kidnapping. Teams of FBI and Justice Department officials are involved in vetting the deals. But it's Mr. McDonald, a former field agent who handled organized crime and drug cases, who focused the FBI's attention on this issue and who has often taken the lead in negotiations. He's suited to the role because "he's been on the street, he's done wiretaps, and he knows how hard it is to do investigations," says assistant FBI director John Collingwood. In the proposed BT-MCI merger, which collapsed when WorldCom Inc. made a better offer for MCI, the companies were astounded by the FBI's implying that one of America's closest allies, Britain, would try to use BT for espionage. BT for years had laid high-capacity cable at Menwith Hill, the U.S. National Security Agency's electronic monitoring station in rural England, and MCI had more than 20 contracts with the U.S. Defense Department. But FCC officials made it clear that the deal wouldn't win approval so long as there were national-security objections. So the companies started negotiating with a team of Pentagon and FBI experts, including Mr. McDonald. The talks lasted five months. The Pentagon worried that MCI's network operating center in North Carolina, which was designated for high-priority military traffic during war, might be moved overseas. The companies promised to leave the center there, and that, more or less, was enough to satisfy the Pentagon. Satisfying Mr. McDonald proved much tougher. For one thing, the FBI wanted to bar all non-U.S. citizens from handling the companies' billing and call information. Mr. McDonald said he worried that a foreign intelligence service might approach these employees. The FBI didn't consider British intelligence a threat, he explained, but the agency wanted to set a precedent for dealings with less trusted allies. Yet MCI already employed noncitizens with access to sensitive records. Promising to hire only U.S. citizens, the companies argued, would violate U.S. equal-employment laws. When Mr. McDonald wouldn't budge, the companies appealed to higher-ranking officials at the FBI and the Justice Department. Eventually, he dropped the idea, but "it took us weeks to finally get that idea off the table," fumes one of the lawyers for the companies. When a 10-page list of conditions was agreed upon in May 1997, the FBI had scaled back other proposals. For example, the companies agreed to give the agency 14 days for background checks on employees with access to wiretaps, not the three months the FBI wanted. But what remained testified to the agency's newfound clout: The companies promised to keep all equipment for domestic traffic in the U.S., so the FBI would have wiretapping access. Vodafone heard from the FBI in March of 1999, two months after the British cellular company had announced plans to merge with AirTouch Communications of San Francisco. In a small conference room at AirTouch's Washington office, Mr. McDonald briskly laid out for the companies' lawyers what they came to call "the five fears." "It was so Old World, it just made my jaw drop," says Pamela Riley, a lawyer for AirTouch. Trustworthy Personnel First, all facilities handling U.S. traffic had to remain in the U.S. Next, all record-keeping facilities would also be based in the U.S. Third, the FBI wanted a guarantee that Vodafone would hire only "trustworthy personnel" to monitor the network and handle wiretap requests. Vodafone also had to promise that no wiretap information would filter back to any foreign government. And, finally, the FBI had to be satisfied that Vodafone wouldn't use the U.S. network for economic espionage. Vodafone found that last item, in particular, "absurd," Ms. Riley says. Mr. McDonald had raised the possibility that the company would eavesdrop on Silicon Valley calls and then feed information to high-tech companies in Britain. "Competitors are competitors," Ms. Riley says. "Are British companies really that different from U.S. ones? But for the FBI, Vodafone's national allegiance was automatically suspect." Other demands cropped up as negotiations continued. For instance, the FBI wanted Vodafone to train FBI agents on new technology that came along. "We said, 'Wait a minute, how can we do that when technology is changing every day? We'd be running a school,' " Ms. Riley says. The deal closed in June 1999 after the company signed an agreement that promised, among other things, never to share wiretap information with foreign governments. The FBI, which has longstanding relationships with domestic carriers, says it is trying to build the same kind of cooperative relationships with foreign companies. Mr. McDonald says negotiations are cordial. "We're just trying to say, 'Yes, but let's make sure that no one is harmed here with what you plan to do.' " By the time the Vodafone deal closed, TMI was deep into its own struggle with the FBI. The satellite-phone company, which is owned by Canadian telecom giant BCE Inc., had applied for an FCC license in March 1998, shortly after the World Trade Organization ratified an agreement to open up the world's telecom markets. "For us, the U.S. was the perfect market to move into after Canada," says TMI CEO Mr. Boisvert. "That there would be any U.S. national security concerns had never crossed our minds." Late in 1998, TMI heard rumors that the FBI had some concerns with the company's plans. But not until April 1999, more than a year after TMI filed with the FCC, did the company receive formal notice that the FBI wanted to block the deal. Trusting Canadians TMI suggested that the FBI work with Canadian intelligence to monitor calls. "Clearly, they had to trust Canadian intelligence," recalls Mr. Boisvert. But the FBI said it couldn't turn its wiretapping duties over to a foreign government, a response that frustrated Mr. Boisvert. By early June, TMI had agreed to run its U.S. calls through the new switching center in New England. But the FBI still wasn't satisfied. TMI phones also had to be equipped with geo-positioning technology so the FBI could pinpoint a suspect's location when he made a call. This was crucial, as Deputy Attorney General Eric Holder wrote in a June 14, 1999, letter to FCC Chairman William Kennard. "Finding out that a drug deal, murder or bombing is about to occur without having any indication of the location of the criminal is only marginally useful," he wrote. Unless TMI addressed the shortcomings, Mr. Holder wrote, its phones would become "a communication tool of choice among drug dealers, organized crime and terrorist groups." By late last fall, TMI had grown so desperate to move ahead that it persuaded Canadian Prime Minister Jean Chretien to raise the issue when President Clinton visited Ottawa in October. The matter was resolved just days before Mr. Clinton arrived, after TMI agreed to help the FBI pinpoint TMI calls within the U.S. Mr. Furchtgott-Roth of the FCC blasted the FBI in a dissent issued with TMI's licensing approval. "The commission may well have been able to approve this application a year ago, but for the last-minute epiphany of the FBI that the application raised grave national-security issues," the commissioner wrote. He added that the FCC's licensing procedure was being "hijacked to achieve other agencies' public-policy goals," and called the FBI's role "particularly unfortunate." The FBI has its own version of the story, asserting that TMI prolonged the process by refusing to negotiate on key issues. Mr. Holder also noted that TMI's technology simply fell short of U.S. requirements, further complicating the talks. Courting Favor As the FBI's role has become better known in telecom circles, companies have begun courting the agency's favor. When Verizon Wireless, a unit of the former Bell Atlantic Corp., announced plans for a joint venture with Vodafone last fall, company lawyers requested a meeting at the Justice Department and offered a draft national-security agreement incorporating provisions the FBI had demanded in previous deals. Two meetings and a conference call later, the companies and the FBI had an agreement. Until this year, the FBI hadn't gotten involved in Internet-related transactions. When Britain's Cable and Wireless bought MCI's Internet backbone for $1.75 billion two years ago, the FBI didn't say a word. The deal was "too new for them to realize that they might have an interest," says Stewart Baker, a Washington lawyer who represented MCI. FBI officials declined to comment on the deal. But this spring, when Japan's NTT stepped up to buy Verio, which handles Web traffic for hundreds of U.S. companies, the FBI did get involved. The FCC didn't review the acquisition, but the FBI found a way in via an obscure federal law. The 1988 law, intended mainly to apply to sales of U.S. defense companies, allows the president to block any foreign acquisition that "could affect the national security of the United States." The FBI and Justice Department cited the law in insisting that the companies address their concerns. Negotiations with NTT delayed the merger for nearly three months as the FBI pushed to assure that the Japanese government, which owns 53% of NTT, would have no role in Verio's day-to-day operations or involvement in wiretapping Verio's network. The agency also demanded -- and the companies agreed to -- a variety of restrictions on who could have access within Verio to federal wiretapping information. The next likely subject for FBI scrutiny: Deutsche Telekom's proposed purchase of VoiceStream, which has caused more anxiety in the U.S. than any previous global deal. The fact that the German government has a big stake in Deutsche Telekom has raised great concerns and has some U.S. lawmakers threatening legislation to block the merger. The FBI is in a position to deploy more leverage than ever. "We have things that we have to do to protect the American people and U.S. security," says Mr. McDonald. "That's what we get paid for." Write to Neil King Jr. and David S. Cloud at neil.king@w... and david.cloud@w... 1294 From: Miguel Puchol Date: Thu Aug 24, 2000 0:35pm Subject: RE: Global Phone Deals Face Scrutiny From a New Source: The FBI I find particularly candid to ask for GPS locators being installed in satellite phones. It's probably the easiest form of location to bypass - aluminium foil over the GPS antenna being the best in price-to-effectiveness ratio. And I doubt that the service provider will not allow you to make a call without first broadcasting your location - this would be dumb and defeat the whole purpose of a sat phone. Cheers, Mike -----Mensaje original----- De: MACCFound@a... [mailto:MACCFound@a...] Enviado el: jueves, 24 de agosto de 2000 17:23 Para: TSCM-L@egroups.com Asunto: [TSCM-L] Global Phone Deals Face Scrutiny From a New Source: The FBI August 24, 2000 Global Phone Deals Face Scrutiny From a New Source: The FBI By NEIL KING JR. and DAVID S. CLOUD Staff Reporters of THE WALL STREET JOURNAL 1295 From: Date: Thu Aug 24, 2000 2:42pm Subject: Surveillance Expo could be interesting! HAVE A GREAT DAY !!! ---------- http://www.surveillance-expo.com/ [Non-text portions of this message have been removed] 1296 From: maxs Date: Thu Aug 24, 2000 1:45pm Subject: Re: Digest Number 349 2 QuestionAnswers according eliciting techniques: ================================== Who goeth without humor goeth unarmed. >> Humor is a tool sometimes, isn't it ? For example : On another note... what make you think that PGP provides anything more then a minor annoyance to any government intelligence or investigative agency? PGP is right up there with voice inversion scrambling and other such security measures (both are a joke). << >> PGP seems to me like chastity belt. I read somewhere that not only one key have existed - to get what you want to have. Why not PGP ? << >>Or next one Jokelike: Thank you for taking the time to fill out this questionnaire. Your answers will be used in market studies that will help McDonnell Douglas serve you better in the future - as well as allowing you to receive mailings and special offers from other companies, governments, extremist groups, and mysterious consortia. As a bonus for responding to this survey, you will be registered to win a brand new F-117A in our Desert Thunder Sweepstakes! Comments or suggestions about our fighter planes? Please write to: McDONNELL DOUGLAS CORPORATION Marketing Department Military,Aerospace Division << =================================================================== "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell =================================================================== ================================================================== Long after we have ceased to exist - people continue in finding the truth. ....... My question: Absolut truth or next chapter of theory of relativity about relative truth from relative point of view ? MaxS ================================================================== One girl wrote to me : "Be afraid !!! " My answer was: " Yes I am, Iam,I'm,mmmmmm" 1297 From: Date: Thu Aug 24, 2000 2:46pm Subject: Electronic eavesdropping, informative site. HAVE A GREAT DAY !!! ---------- http://www.spyking.com/ [Non-text portions of this message have been removed] 1298 From: James M. Atkinson, Comm-Eng Date: Thu Aug 24, 2000 3:27pm Subject: Re: Electronic eavesdropping, At 3:46 PM -0400 8/24/00, patedwards@w... wrote: >informative site. > >http://www.spyking.com/ Ah Patrick... I hate to tell you this but the guy who runs the "SpyKing" site is actually a convicted felon, and a mental patient with a history of criminal activity. Hell, the US government even indicted him of federal felony fraud charges a few years ago (and he has a rather considerable arrest record). He recently told the Wall Street Journal (in a front page article no less) that he has been providing the Army with some kind of technical eavesdropping mumbo-jumbo, but the Journal found that they had been grossly misled and printed a formal retraction a week later (which is a very big deal for them). It seems that the laws of physics prohibit the what he was claiming to do, and that government documents completely debunked everything else. Smart Computing Magazine also got recently hoaxed by the guy, and also printed a formal retraction (and that is just the tip of the iceberg). You and other list members would do well to avoid the guy, and to avoid ANYTHING that he is involved in even remotely. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1299 From: Date: Thu Aug 24, 2000 3:56pm Subject: Re: Electronic eavesdropping, accept my formal retraction! HAVE A GREAT DAY !!! 1300 From: CDS INC. Date: Fri Aug 25, 2000 9:23am Subject: Spyking!!! Dear List Members, In today's postings, we saw reference to "Spyking" and their web site. Granted Spyking has a fairly interesting web site, with some good links, but WATCH OUT. Last year we attended their computer security seminar, for which the fee charged was $500. for a one day session. In the promotional advertising Spyking, a.k.a, Frank Jones (he uses several aliases) offered that "drinks are on me" after the seminar. After this "seminar" we needed a drink. But I digress. The seminar was held in a "no tell, motel" in a distant suburb of New York City (Rockland County), near Spyking's office in Bardonia, New York. The seminar was initially advertised as taking place in New York, with the inference that it was New York City (Manhattan). The seminar was a day long group of presenters, who were there ostensibly as vendors of various unproven and undependable products, hawking their wares. All of the attendees, including security managers from a major New York bank, the local police department, et cetera, were as bored as we were. Everything that Frank Jones tried to demonstrate failed to work. The seminar promised to show how various software and hacking/cracking programs work. Let me tell you that every demo failed...miserably! All the Spyking products could not do what was promised, and it was embarrassing to say the least. A Trojan horse-type of spying program known as D.I.R.T., was the highlight of the day, and when that didn't work, and the demo computers crashed, you could have heard a pin drop in the room. Spyking said "Well its supposed to do this...." Most attendees left after the "free" rubber chicken lunch. Many legitimate security practitioners confided in me that it was a day away from the office - nothing more. Before attending, I was warned not to waste my money, that the presenter was a crook, a charlatan, and a scammer. But I figured that I would learn something, even from someone who was not totally legitimate. The only thing I learned was pay by credit card, because if you get ripped off (like I did) you can always dispute the charge. Spyking's "expertise" changes every few months, as they change the focus of their business. First they were a spy shop - hence the name Spyking. Then they became TSCM experts. Then they became security/business consultants. Now they are computer security experts, with the emphasis on key stroke logging software, and other privacy invasion devices . They claim to sell to law enforcement, but we have learned that this is just another lie. Bottom line - the guy is good at getting media coverage and hyping his snake oil, but he doesn't deliver. Caveat emptor! Enjoy your weekend! Jeff [Non-text portions of this message have been removed] 1301 From: Screaming Date: Thu Aug 24, 2000 6:29pm Subject: RE: You Know You're In California When... hahaha jc 1302 From: Date: Fri Aug 25, 2000 5:35am Subject: Re: Spyking!!! In a message dated 8/25/00 7:23:51 AM Pacific Daylight Time, cds@w... writes: << Caveat emptor! >> Thank you. I guess you won't be attending the "Surveillance Expo." 1303 From: James M. Atkinson, Comm-Eng Date: Fri Aug 25, 2000 9:37am Subject: Live Postings verses Digest Mode I have gotten questions from some list members about how to convert their account to digest mode. There are three "flavors" of the list. The first is a "Real Time" mode where you receive a copy of each message a few seconds after it was sent to the list server. For most people this is perfect, but some people find it to be cumbersome. You can easily get 10-15 or even more postings per day (but that is a good thing). The second is the "Digest Mode", which compiles all of the postings for a day into a single message that you get only only once a day. This is fairly convenient, but you only get a single Email per day and it can be tough to respond to postings. The third method is "web-only" where you have to go visit a website to read any postings. You would use this method when you were on vacation and didn't want your Email to fill up. Since some companies restrict your Email box contents this comes in handy in such cases. The "flavor" of mailing list you choose may be found on your E-Groups membership page, or you may contact me privately and I will manually toggle you. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1304 From: James M. Atkinson, Comm-Eng Date: Fri Aug 25, 2000 9:56am Subject: Focus of List I would point out that this list is for the discussion of TSCM methods, techniques, TSCM concerns, counter-intelligence, and so on. The list is strictly "White Hat" and it exists to raise the level of professionalism in our business and to give the eavesdroppers, spies, and related predators no quarter. Since our targets are spies, spy shops, eavesdroppers, bugs, wiretaps, monitoring software and so on discussions related to catching same, and/or hunting same is also appropriate (but please be polite about it). Remember that since eavesdroppers, spies, spy shops, stalkers, and so on are included in our target list that articles, comments, and so on are appropriate for postings. HOWEVER, please limit postings concerning government "intrusions into privacy" (ie: Omnivore, Carnivore, SINS, Blackjack, NCIS, AFIS, etc...) On the other hand please feel free to post information about spy cases so long as technical eavesdropping was involved (ie: the State Department bugging). Polite, and politically humor is also invited as we could all use a few laughs a day, but please keep it clean, and try no to seriously offend anybody. For the most part the list is completely un-moderated, and the moderator maintains no control over what is posted (so please play-nice). New members are initially placed into a moderated mode until they demonstrate that they can add to the list (and be civil about it). Only in very rare cases will I actually delete an Email sent by a moderated user, and then only if it is abusive to the list, incites a flame war, or is some silly money making scheme (ie: someone pitching AMWAY or MLM schemes). If you are upset with something another list member said, then please call them and straighten out any hurt feelings, and PLEASE do not vent to the list about it. However, if someone ripped you off, or is ripping off the public then please let the list know about it so that the list membership can be protected against the scam (but be polite about it). -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1305 From: A Grudko Date: Thu Aug 24, 2000 2:50pm Subject: Re: IrDA Threat Alert ----- Original Message ----- > Beware of the little red window on modern computers, video equipment, or other devices (such as the HP 5MP). Actually, I'd prefer an HK MP5 - specialist joke! > If your computer is equipped with infrared technology that uses the IrDA protocol, you can establish a wireless TCP/IP > connection to a network using an IrDA network access device, or exchange files with another computer. I've warned clients about these Wicked Windows since they first appeared. Screening the unintentional emmissions of computers is bad enough, but to deliberatly send out info on IR!!! It's like clients who ask us to de-bug their 49 Mhz 'cordless' 'phone... Luckilly the fix is simple if you don't need to use the IR port - an inch of black insulation tape! Even better, open the case and dis. the IRLED. A sort of TSCM vascetomy..... Andy Jo'burg 1306 From: A Grudko Date: Thu Aug 24, 2000 3:24pm Subject: Re: Wireless IP security ----- Original Message ----- From: John McCain > In most applications, I > believe they are being honest and think they provide an adequate level of > security. I also believe that most provide a reasonable level of security. > Can it be defeated... You bet, but not without a large investment in time > and a bit of knowledge and equipment! We all know that most anything can > be defeated if the motivation is high enough. It's the same old balance of > risk vs. cost. Just what I was getting at on the digital phone question. I've spoken to digital PABX technicians who just work straight out of their manuals and don't even know ohm's law. But I've also taken gifted amateurs into digital RF/cable environments who can break the systems in hours - given the basic operating system info (which they might guess at anyway) - for free, just for the love of it (the original 'hacker syndrome') . Andy Jo'burg 1307 From: A Grudko Date: Thu Aug 24, 2000 3:32pm Subject: Re: Digital phones ----- Original Message ----- > For Nortel Meridian PBX's an audio digital/analog convertor is available > for about the same price, it provides tape recorder output and notification > via relays that the ext is in use. It attaches in parallel to a station > pair. Does this imply one user per cable pair on a specific make of PABX/PBX system? That I could see being tappable with a digi/ana converter preset offsite or adjusted/programmed on site....all you woud need a typical phone and a tech. manual. Andy Joburg 1308 From: A Grudko Date: Thu Aug 24, 2000 4:41pm Subject: Re: Digital phones ----- Original Message ----- > To give a simple explanation,...I and b) special > demodulator circuits could be used to retrieve valuable information from the > digital bitstream. All, as you say, far more complex than analogue taps. I agree. Given the time and money a good tech. can crack these systems. But won't your building security wonder about this nurd in the basement with a laptop? Most non-gov clients I know won't pay what is required on such a project, so all we really have to consider is Bill's, sorry, George/Dan's boys, and if they do the paperwork they can do what they like. Andy Johannesburg 1309 From: A Grudko Date: Thu Aug 24, 2000 4:24pm Subject: Re: Fax ----- Original Message ----- > This reminds me of a case I had some years ago of a company who every time they faxed a new client a contract a solicitation came over the new clients fax machine from a competitor offering the service at a reduced price. In the mid '80s we monitored a company that smuggled a illegal substance into South Africa, from a high security building at a time when we were in a war situation. My partner joined a gym in the building which gave him access and contact with tenants. Through them eventually hired a quarter of a floor of offices in the building, through a landlord who had been deserted by previous tenants and who gave us 3 month's rent for 'storage'. He was happy with our cash and requested no ID although we had official credentials if needed. In those days fax intercept was digitally difficult. It was so long ago that they still had Telex machines, and we had installed Crawford relays and recorders on the line to catch them (separate topic). But we patched onto the one analogue fax line, which in those days changed polarity according to incoming/outgoing call status. A simple diode/relay network on our side differentiated between incoming and outgoing faxes, which were switched to our fax machine for a manual response!.....and a 9v alarm buzzer made sure the night shift reacted. We received in and out going faxes and immediately forwarded them to the recipients, who never noticed the half minute or so delay, or the slight loss in quality. Today I understand it's just a question of software at the exchange. Much less romantic. Andy Grudko Jo'burg 1310 From: A Grudko Date: Thu Aug 24, 2000 6:04pm Subject: Digiphones - Argh... ----- Original Message ----- From: James M. Atkinson, Comm-Eng > *** ANY Extension *** on a digital PBX can be tapped. Argh....the sound of self strangulation. > If fact many PBX systems pass live audio over the station wiring even > when the instrument in on the hook (sometimes 80-90 dB down). OK, I give up. I'm gonna get a real job, dancing with the Chippendales. -----FOR SALE----- 20 years worth of TSCM equipment plus manuals, assistant and technical backup by cellphone. PRICE - 5 years on a Key West beach (the above was humour - for those who....well) Andy Grudko Jo'burg 1311 From: A Grudko Date: Fri Aug 25, 2000 1:19pm Subject: Re: Digital phones An interesting article about an arrogant SA businessman turned politician, turned 'phone tapper. I don't know who his security consultants are but they gave him dubious advice. My comments in ( ). --------------------------------------------------- Luyt says he tapped phones to uncover plot' CAPE TOWN. Federal Alliance (a small political party), leader and former SA rugby president, (Dr.) Louis Luyt (pronounced 'Late') has been tapping the phones of employees of the Golden Lions Rugby Union in an apparently illegal pursuit of a "conspiracy" at Ellis Park (rugby field & HQ). Employees alleged by Luyt to be involved in the conspiracy include coach Laurie Mains, star player Hennie le Roux and CEO Johan Prinsloo. Luyt, who is no longer an elected Golden Lions office bearer but is the chairman of the Golden Lions Rugby Sports Trust and Ellis Park Stadium, admitted yesterday that Prinsloo's phone was tapped on the advice of a private security company as a means of getting to the bottom of "leaks of sensitive information to a third party". Luyt said it was his opinion the taps were legal as the phones were in offices within Ellis Park and "the company is paying rental and costs of the phone". However, lawyers said yesterday the tapping of phones, even of employees, was a breach of the Interception and Monitoring Prohibition Act and was a criminal offence (a phone conversation can be recorded without court order but only if all parties consent). It was also a clear invasion of privacy, and thus in conflict with constitutional provisions for the protection of privacy. Luyt said the taps "uncovered a devious conspiracy involving Prinsloo, Mains and Le Roux" which would have "seriously undermined the (union), the (trust) and Ellis Park". He said he would take further legal action in the matter. Union president Jomo King said last night his executive felt the tapping of phones was illegal and the information gathered could not be used. He was not aware of any conspiracy and the issue of players' perceived grievances needed further deliberation. Mains said he had always acted in the best interests of the players and the union and in this he had the union's support. There had been a minor conflict with Ellis Park but "to suggest a conspiracy is a complete fabrication". The Golden Lions players said that at no time had Prinsloo or Mains jeopardised the union's position and they had always acted in the best interests of the union and the players. "We deny any form of conspiracy," they said a statement issued by the players' committee. They pledged "unequivocal" support for Mains and the union. Aug 25 2000 12:00 AM, Wyndham Hartley, (Johannesburg) Business Day 1st Edition Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1312 From: James M. Atkinson, Comm-Eng Date: Fri Aug 25, 2000 0:39pm Subject: Return Receipts I have been getting complaints from list members about people posting to the list with a return receipts on their messages. I would point out that it is rude to post to a list and to request a receipt as it can cause the list to get hit with a number of returns. PLEASE DO NOT ADD RETURN RECEIPTS or attach documents to any of your postings to the list. I have RR'ed this specific post simply so I can track back and remove the receipts that stacked up from a list member who RR'ed the list on a posting from earlier today. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1313 From: James M. Atkinson, Comm-Eng Date: Fri Aug 25, 2000 1:09pm Subject: Pretty Good Privacy (PGP) Vulnerability From one of the government run mailing lists: -jma Recently, a vulnerability in Pretty Good Privacy (PGP) has been widely discussed in the information security community. Certain versions of PGP software don't automatically check to see if the Additional Decryption Key (ADK) has been signed, altered, or appended. A moderately to highly skilled attacker could exploit the contents of a victim's PGP-encrypted communications if the following conditions are met: (1) the attacker has access to the victim's key, (2) the attacker alters and propagates the victim's key, and (3) the attacker has access to victim's email encrypted with the altered key. This vulnerability only provides access to the encrypted contents of PGP message provided all three of these prior conditions are already met. Using this vulnerability, an attacker can insert his own key into any valid certificate. What this means is that an attacker can take a PGP certificate, append his own key to the victim's valid certificate as an ADK, and spread it out to the world. This tampered version of the certificate will remain unnoticed by anyone using affected versions of PGP who doesn't manually examine the bytes, and anyone using that tampered version will automatically and invisibly encrypt all messages to the attacker as well as the certificate owner. The encryption software industry has identified a solution for this vulnerability and will be releasing a patch. A full description of the vulnerability can be found at these websites: Cert.org http://cert.org/advisories/ Slashdot.org http://slashdot.org/articles/00/08/24/155214.shtml Please report any illegal or malicious activities to your local FBI office or the NIPC, and to your military or civilian computer incident response group, as appropriate. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1314 From: Miguel Puchol Date: Fri Aug 25, 2000 1:30pm Subject: RE: Spyking!!! Some links on this guy's page go straight to tscm.com..... Makes you think :-) Mike -----Mensaje original----- De: CDS INC. [mailto:cds@w...] Enviado el: viernes, 25 de agosto de 2000 16:24 Para: TSCM-L@egroups.com Asunto: [TSCM-L] Spyking!!! Dear List Members, In today's postings, we saw reference to "Spyking" and their web site. Granted Spyking has a fairly interesting web site, with some good links, but WATCH OUT. Last year we attended their computer security seminar, for which the fee charged was $500. for a one day session. 1315 From: Date: Fri Aug 25, 2000 9:33am Subject: Re: Spyking!!! In a message dated 8/25/00 11:30:18 AM Pacific Daylight Time, mpuchol@w... writes: << Some links on this guy's page go straight to tscm.com.....>> Maybe I will attend " Surveillance Expo." 1316 From: Robert G. Ferrell Date: Fri Aug 25, 2000 1:31pm Subject: Re: Spyking!!! >Maybe I will attend " Surveillance Expo." Or you could just watch it from out in your van. ;-) RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 1317 From: James M. Atkinson, Comm-Eng Date: Fri Aug 25, 2000 1:37pm Subject: Re: Digital phones At 11:41 PM +0200 8/24/00, A Grudko wrote: >----- Original Message ----- > > To give a simple explanation,...I and b) special > > demodulator circuits could be used to retrieve valuable information from >the > > digital bitstream. All, as you say, far more complex than analogue taps. > >I agree. Given the time and money a good tech. can crack these systems. But >won't your building security wonder about this nurd in the basement with a >laptop? > >Most non-gov clients I know won't pay what is required on such a project, so >all we really have to consider is Bill's, sorry, George/Dan's boys, and if >they do the paperwork they can do what they like. > >Andy >Johannesburg The equipment is actually fairly inexpensive (compared to a spectrum analyzer), and is easy to get (if you have a legitimate use for them). They are not at all suitable for eavesdropping, but are used for engineering lines, and resolving technical problems. I have several boxes that I can connect to virtually any digital phone made, or kind or combinations of digital lines (including a ISDN, T-Carrier, SONET, ATM, DS lines, or OC lines up to an OC-3) and extract any signal from any part of the circuit. I feel that the conducted threat is far more dangerous then the radiated threat and as such requires a considerable quantity of equipment and knowledge of modern telecommunications to address the threat. For example... why are there audio fragments of the voicemail port appearing on the "other half" of a half T-Carrier line that leaves the building. Also ponder this... why is the computer that hosts the voicemail system hanging off of a network card, and why is it plugged in live to the company network (which is in turn accessible to the Internet?) Could it be that someone is downloading your voicemail files in real time? Why does the PCM backbone signals from the PBX appear on the power lines in traverse mode? It could be a bad cap in the power supply, or it could be a manipulation. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1318 From: James M. Atkinson, Comm-Eng Date: Fri Aug 25, 2000 1:37pm Subject: RE: Spyking!!! Ha Ha ha, He is only doing it to piss me off (the guy hates my guts). Several "black hats" also do it in an attempt to divert traffic from my site to their own site. It is his attempt at a traffic diversion, nothing more. I do not and will not have anything to do with the guy, in any way. -jma At 8:30 PM +0200 8/25/00, Miguel Puchol wrote: >Some links on this guy's page go straight to tscm.com..... > >Makes you think :-) > >Mike > >-----Mensaje original----- >De: CDS INC. [mailto:cds@w...] >Enviado el: viernes, 25 de agosto de 2000 16:24 >Para: TSCM-L@egroups.com >Asunto: [TSCM-L] Spyking!!! > > >Dear List Members, > >In today's postings, we saw reference to "Spyking" and their web site. >Granted Spyking has a fairly interesting web site, with some good links, but >WATCH OUT. Last year we attended their computer security seminar, for which >the fee charged was $500. for a one day session. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1319 From: Miguel Puchol Date: Fri Aug 25, 2000 1:42pm Subject: RE: Pretty Good Privacy (PGP) Vulnerability James, This is the classic man-in-the-middle attack, replace your victim's key with your own, route all messages via your system, and voil‡! One method of fighting this is to add third (trusted) parties certificates or signatures of authenticity. It's only one more barrier, but can be quite effective within closed circles. Mike -----Mensaje original----- De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] Enviado el: viernes, 25 de agosto de 2000 20:09 Para: TSCM-L Mailing List Asunto: [TSCM-L] Pretty Good Privacy (PGP) Vulnerability From one of the government run mailing lists: -jma Recently, a vulnerability in Pretty Good Privacy (PGP) has been widely discussed in the information security community. Certain versions of PGP software don't automatically check to see if the Additional Decryption Key (ADK) has been signed, altered, or appended. A moderately to highly skilled attacker could exploit the contents of a victim's PGP-encrypted communications if the following conditions are met: (1) the attacker has access to the victim's key, (2) the attacker alters and propagates the victim's key, and (3) the attacker has access to victim's email encrypted with the altered key. This vulnerability only provides access to the encrypted contents of PGP message provided all three of these prior conditions are already met. 1320 From: Miguel Puchol Date: Fri Aug 25, 2000 1:45pm Subject: RE: Spyking!!! Yes, get one of their super-duper 100-yard range "TEMPEST" (yes, I know) interception kits, that apparently run on your average laptop, and tap into the overhead video & audio feeds from outside. I have a picture somewhere of a R&S DKV van modified with tons of surveillance gear, even had a 70' hydraulic mast to raise antennas as needed! I promised myself one if I won the lottery... Mike -----Mensaje original----- De: Robert G. Ferrell [mailto:rferrell@r...] Enviado el: viernes, 25 de agosto de 2000 20:32 Para: TSCM-L@egroups.com Asunto: Re: [TSCM-L] Spyking!!! >Maybe I will attend " Surveillance Expo." Or you could just watch it from out in your van. ;-) RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1321 From: Robert G. Ferrell Date: Fri Aug 25, 2000 1:44pm Subject: RE: Spyking!!! >Yes, get one of their super-duper 100-yard range "TEMPEST" (yes, I know) >interception kits, that apparently run on your average laptop, and tap into >the overhead video & audio feeds from outside. Bet you could even program their microwave oven and adjust the thermostat on their AC from out there... RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== From: frost_bitten_ca Date: Sun Aug 24, 2003 9:52am Subject: JPHIDE and JPSEEK JPHIDE and JPSEEK - JPHIDE and JPSEEK are programs which allow you to hide a file in a jpeg visual image. There are lots of versions of similar programs available on the internet but JPHIDE and JPSEEK are rather special. The design objective was not simply to hide a file but rather to do this in such a way that it is impossible to prove that the host file contains a hidden file. Given a typical visual image, a low insertion rate (under 5%) and the absence of the original file, it is not possible to conclude with any worthwhile certainty that the host file contains inserted data. As the insertion percentage increases the statistical nature of the jpeg coefficients differs from "normal" to the extent that it raises suspicion. Above 15% the effects begin to become visible to the naked eye. Of course some images are much better than others when used a host file - plenty of fine detail is good. A cloudless blue sky over a snow covered ski paradise is bad. A waterfall in a forest is probably ideal ... http://www.webattack.com/get/jphide.shtml 7684 From: frost_bitten_ca Date: Sun Aug 24, 2003 10:06am Subject: Rent-a-weapon Sun, August 24, 2003 Rent-a-weapon Brokers offer guns for day, hour By TOM GODFREY, TORONTO SUN A ring of gun brokers who are renting weapons for up to $250 an hour to thugs is being investigated by Toronto Police. And detectives are trying to determine if rented handguns were used earlier this month in gang shootings and weapons-related crimes at two Rexdale housing projects. "This (gun-for-rent) is something we are investigating," Supt. Ron Taverner said. "We have heard from our sources that guns can be rented by criminals to commit crimes." Taverner said his officers have seized at least six guns from criminals in the last three weeks. He said one was seized from a 13- year-old boy, who is accused of providing a handgun used in a gang shooting at an Orpington Cres. complex a week ago. "Every gun taken off the street is significant," Taverner said, adding most of the illegal weapons, including .25- or .38-calibre Colts or Smith and Wessons, are smuggled into Canada from the U.S. "We have been told the weapons can be rented by the day or hour," Taverner said. "Weapons are too readily available to commit crimes." Police are also investigating if rented guns were used in a gang- related shootout at a Jamestown Cres. complex where 30 shots were fired near 30 children attending a birthday party. He said officers were shocked to seize a loaded gun from a 13-year- old, who also allegedly used the weapon to fire warning shots. "How does a 13-year-old get a gun and participate in gunfire?" he said. "I can't recall someone this age having access to a weapon." Undercover officers and street-gang insiders said the weapons, with serial numbers removed, are rented for up to $250 hourly by brokers operating from private homes and a few nightclubs. "It is very hard for us to infiltrate this subculture," one officer said. "These people are tightly knit and very leery of newcomers." Gang insiders said the guns are rented only to those who have been recommended by someone known by the gun broker. Police and gang sources said if a weapon isn't returned the renter is usually shot by a gang gunman. Police suspect criminals rent the weapons because they don't want to take the chance of getting caught with them by police. http://www.canoe.ca/NewsStand/TorontoSun/News/2003/08/24/167526.html 7685 From: mpaulsen6 Date: Wed Aug 27, 2003 0:57am Subject: Hatfill Sues Ashcroft, FBI http://www.cnn.com/2003/LAW/08/26/lawsuit.hatfill/index.html Excerpt: Hatfill's attorneys said the FBI tipped the news media to searches of Hatfill's home to deflect attention from what the attorneys characterize as a floundering anthrax investigation. They said 24- hour surveillance and wiretaps violated Hatfill's privacy. 7686 From: mpaulsen6 Date: Wed Aug 27, 2003 1:07am Subject: mini bug detector I had the pleasure of seeing someone with this recently. After I stopped laughing, asked how much he spent, laughed more, stopped laughing and began fiddling with it we both lost it and started laughing when we found out it pegged out the led when we held it to our head. Great fun for the whole family -m http://force-ten-store.com/find.lasso?-database=products.fp3&- layout=www_products&-sortField=Name&-sortOrder=ascending&- logicalOperator=OR&-op=cn&Uses=dr&-op=cn&ID=dr&-op=cn&Name=dr&- op=cn&Description=dr&-maxRecords=1&-skipRecords=15&-token=find&- search&-response=detail.lasso 7687 From: Steve Uhrig Date: Wed Aug 27, 2003 6:09pm Subject: TDRs For Sale Miscellaneous late model Riser Bond. All have been calibrated and are working perfectly. All have fresh batteries, appropriate test leads, carrying case, charger, instruction manual and anything else factory supplied. Almost all are capable of connecting to a computer and downloading stored traces. You then can print the traces for reference, incorporate them into written reports, save for comparison on future sweeps, etc. Very professional appearance. Most current version of WaveView software is available free on www.riserbond.com. A TDR separates the men from the boys on telephone sweeps. They're easy to use, potent and saves an enormous amount of time. Basic tutorials on using the things is available on Riser Bond's website. Info on TDRs for sale is here: http://www.swssec.com/equipment_for_sale.html Can take credit cards and ship worldwide. I've sold perhaps 50 of these TDRs to people on this list in many countries. All have been satisfied. Check the References section on the website for info. Save half or more on a critical tool you need to do your job. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7688 From: Thomas Shaddack Date: Wed Aug 27, 2003 1:24am Subject: Re: JPHIDE and JPSEEK On Sun, 24 Aug 2003, frost_bitten_ca wrote: > JPHIDE and JPSEEK - > http://www.webattack.com/get/jphide.shtml JPHIDE is already broken. The images can be detected by Stegdetect: http://www.outguess.org/detection.php More complete list of steganography software can be found at http://www.petitcolas.net/fabien/steganography/stego_soft.html An interesting twist is usage of MP3 files as containers: http://www.petitcolas.net/fabien/steganography/mp3stego/ New encodings are based on spread spectrum algorithms, making the detection (especially with low content/container ratio) rather difficult. The field of steganalysis is currently reportedly heavily funded and (with exception of some private efforts like eg. Stegdetect) also top-secret. And top-interesting. I remember playing with LSBs of WAV and BMP files back in sometimes between '93 and '96, knowing nothing about steganography and naively calling it "noise-level encoding" instead. Good old times... 7689 From: George Shaw Date: Wed Aug 27, 2003 3:04pm Subject: Audio clean-up OK folks, before anyone states that I need to seek a professional for help (that is after all what I am doing here :-), I am NOT looking for very advanced services. My quest is to clean-up audio recordings made with a telephone recording unit (www.nice.com). The recordings are all legal recordings made by a licensed utility that records all emergency phones and calls made to its control, trains and signal cabins, (yes a railway company). A recent incident has prompted a request to look into the cleaning up of the recordings which vary with background noise, line noise, low volume, varying volume, lack of tone, in clarity of conversation loss etc. I have used Sound Forge, Cool Edit and a few others to enhance wave files in the past but I am interested in what you have used and what was the most effective, we are not adverse to spending money on software or hardware or indeed training. I know the legal side of what is proposed as far as UK law is concerned regarding court admission etc. So the question is what is the best software/hardware out there that would allow the clean-up of audio files? -- George Shaw MI3GTO " Any Sufficiently Advanced Technology is Indistinguishable from Magic" ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... Fax & Voicemail: +44 (0) 871 242 9183 7690 From: Thomas Shaddack Date: Wed Aug 27, 2003 0:43am Subject: Re: international intercept capabilities of eschelon, Frenchelon, DCS1000 > Recently this topic has been presented in separate conversations > I've had with two gentlemen, one in the industry, one not but > related to it as part of their position, so I'd like to know if > anyone has current information on these capabilities and the > potential reasons for it occurring in a post-cold war scenario with > a viewpoint from corporate espionage/information sale over the next > 2-3 years from countries that oppose US interests overtly or > covertly - ie: france/britain/ US/EU, us/cuba/russia, etc. I don't know much about Echelon and SIGINT capabilities of countries in general, but as a computer security person I have certain experiences with devices of the class of DCS1000, aka Carnivore. It is internally a device for listening on IP traffic and storing data pertaining to specified IPs to a file. Internally it's built on Windows NT (or 2000?), but that's fairly irrelevant; the devices of the same class can be realized on basically any operating system with decent IP stack (my personal favorite would be Linux or something from the family of *BSD). This device can store all the IP packets specified (from everything that goes through the tapped line to just a specified kind of connections (being it specified by port numbers or by IP addresses or both)); sky and the disk space are the limits. Technically it can be an off-the-shelf computer fast enough for the given connection. May be a tap on the router, tap on the wire, or a transparent Ethernet proxy, anything goes here. From the intercepted packet stream you may reconstruct all the communication that happened on the line in cleartext - from email to messaging to VoIP. Most people don't bother with encryption even if their systems offer it as an option. Plus there are the issues of closed-source systems (finger points to Microsoft and couple snake-oil purveyors, never trust anything that is "secret and proprietary") - non-US subjects on all levels are increasingly suspicious about the possibility of Microsoft leaving backdoors in their products (either intentional, or unintentional-but-known in the form of bugs) for the US government. In the case of their cooperation it is also far from impossible to trojanize any given machine running Windows XP during Windows Update - the machines authorize themselves to the update servers with their GUID. Even within the US the risk exists; Watergate didn't happen that long ago. Or maybe I am way too paranoid. In whitehat side of the business such interceptors are fairly common as data loggers for honeypots or experimental or higher-risk installations, to make it possible to review all communication from the time when a suspicious event happened. Eavesdropping may be done on the user's machine itself, if it gets compromised. That's rather easy if the machine isn't manned by an experienced (and paranoid) operator and doesn't run countermeasures. It is a fairly common way how blackhats are getting access passwords to various systems; once a machine gets compromised, everything goes. This is rather the domain of individuals, though. A lot of intelligence is possible to harvest from POP3/IMAP/FTP passwords that are still typically traveling in cleartext as next to nobody bothers with SSL (and the content of the communication is interesting as well); many people when allowed the choice choose the same password for several accounts. Then the password intercepted in cleartext (eg. by the means of a keylogger) may be easily the same password for eg. the user's SSH account on another machine or for an encrypted document. Also various passworded web services typically use weak authentication schemes that can be cracked, and lots of programs store their passwords in Windows Registry either entirely unencrypted, or encrypted weakly and easy to attack (one would hope for at least salted MD5, it isn't THAT difficult - though I admit to sometimes sinning here myself). Using the transparent proxy approach it is possible also to mount a man-in-the-middle attack on the transaction. If the users don't check the fingerprint of the communication partner's certificate, they may fall victims of this. Beware of HTTPS as some unpatched MS Internet Explorers (and couple other browsers) contain a vulnerability that allows a certificate to look like it is signed by one CA while it is signed by another CA (or, more accurately, MSIE won't tell you that something is wrong). Together with the transparent proxy or a DNS hijack the adversary may mount MITM on this connection, both passive (eavesdropping) and active (modifying passing informations on-fly). The only viable defense is to jealously guard the integrity/security of the endpoint computers and use strong cryptography for securing communication between the endpoints. Very tired. May come up with more ideas after getting some sleep. Very interested in this topic myself. Have luck! :) 7691 From: Mitch D Date: Sat Aug 30, 2003 3:28pm Subject: Resistor proficiency test Boot camp training is here for reading resistor values: http://www.gibsonteched.com/media/ccchv1.swf Have Fun! __________________________________ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com 7692 From: James M. Atkinson Date: Sun Aug 31, 2003 10:21am Subject: Literate Put-Downs "I feel so miserable without you, it's almost like having you here." - Stephen Bishop "He is a self-made man & worships his creator." - John Bright "He has all the virtues I dislike and none of the vices I admire." - Winston Churchill "A modest little person, with much to be modest about." - Winston Churchill "I've just learned about his illness. Let's hope it's nothing trivial." - Irvin S. Cobb "I have never killed a man, but I have read many obituaries with great pleasure." - Clarence Darrow "He has never been known to use a word that might send a reader to the dictionary." - William Faulkner (about Ernest Hemingway) "Poor Faulkner. Does he really think big emotions come from big words?" - Ernest Hemingway (about William Faulkner) "Thank you for sending me a copy of your book; I'll waste no time reading it." - Moses Hadas "He is not only dull himself, he is the cause of dullness in others." - Samuel Johnson "He had delusions of adequacy." - Walter Kerr "There's nothing wrong with you that reincarnation won't cure." - Jack E. Leonard "He can compress the most words into the smallest idea of any man I know." - Abraham Lincoln "I've had a perfectly wonderful evening. But this wasn't it." - Groucho Marx "He inherited some good instincts from his Quaker forebears, but by diligent hard work, he overcame them." - James Reston (about Richard Nixon) "In order to avoid being called a flirt, she always yielded easily." - Charles, Count Talleyrand "He loves nature in spite of what it did to him." - Forrest Tucker "Why do you sit there looking like an envelope without any address on it?" - Mark Twain "I didn't attend the funeral, but I sent a nice letter saying I approved of it." - Mark Twain "His mother should have thrown him away and kept the stork." - Mae West "Some cause happiness wherever they go; others whenever they go." - Oscar Wilde "He has no enemies, but is intensely disliked by his friends." - Oscar Wilde "He has Van Gogh's ear for music." - Billy Wilder "He uses statistics as a drunken man uses lamp-posts... for support rather than illumination." - Andrew Lang (1844-1912) -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "We have suffered a great loss. And in our grief and anger, we have found our mission and our moment...We will not waver, we will not tire, we will not falter and we will not fail!... George W. Bush 9/11/2001 -------------------------------------------------------------------------------------------------- 7693 From: James M. Atkinson Date: Sun Aug 31, 2003 2:39pm Subject: Funeral Three friends from the local congregation were asked "When you're in your casket, and friends and congregation members are mourning over you, what would you like them to say?" Artie said: "I would like them to say I was a wonderful husband, a fine spiritual leader, and a great family man. Eugene commented: "I would like them to say I was a wonderful teacher and servant of God who made a huge difference in people's lives." Don said: "I'd like them to say, "Look, he's moving!" -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "We have suffered a great loss. And in our grief and anger, we have found our mission and our moment...We will not waver, we will not tire, we will not falter and we will not fail!... George W. Bush 9/11/2001 -------------------------------------------------------------------------------------------------- 7694 From: James M. Atkinson Date: Sun Aug 31, 2003 2:40pm Subject: The Rabbi A man goes to see the Rabbi. "Rabbi, something terrible is happening and I have to talk to you about it." The Rabbi asked, "What's wrong?" The man replied, "My wife is poisoning me." The Rabbi, very surprised by this, asks, "How can that be?" The man then pleads, "I'm telling you, I'm certain she's poisoning me, what should I do?" The Rabbi then offers, "Tell you what. Let me talk to her, I'll see what I can find out and I'll let you know." A week later the Rabbi calls the man and says, "Well, I spoke to your wife. I spoke to her on the phone for three hours. You want my advice?" The man said, "yes", and the Rabbi replied,"Take the poison." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "We have suffered a great loss. And in our grief and anger, we have found our mission and our moment...We will not waver, we will not tire, we will not falter and we will not fail!... George W. Bush 9/11/2001 -------------------------------------------------------------------------------------------------- 7695 From: Date: Sun Aug 31, 2003 11:13am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7696 From: Date: Sun Aug 31, 2003 11:13am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7697 From: James M. Atkinson Date: Sun Aug 31, 2003 2:38pm Subject: Mt. Sinai Smith climbs to the top of Mt. Sinai to get close enough to talk to God. Looking up, he asks the Lord. "God, what does a million years mean to you?" The Lord replies, "A minute." Smith asks, "And what does a million dollars mean to you?" The Lord replies, "A penny." Smith asks, "Can I have a penny?" The Lord replies, "In a minute. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "We have suffered a great loss. And in our grief and anger, we have found our mission and our moment...We will not waver, we will not tire, we will not falter and we will not fail!... George W. Bush 9/11/2001 -------------------------------------------------------------------------------------------------- 7698 From: James M. Atkinson Date: Sun Aug 31, 2003 6:50pm Subject: Thoughts of the Summer As I lay on my bed, thinking about you, I feel this strong urge to grab you and squeeze you, because I can't forget last night...... You came to me while my eyes were closed, unexpectedly during the balmy and calm night, and what happened in my bed still leaves a tingling sensation. You appeared from nowhere and shamelessly, without any reservations, laid on my naked body...you sensed my indifference, so you started to bite my body without any guilt or humiliation, and you drove me crazy while you slowly sucked me dry. Finally I went to sleep. Today when I woke up, you were gone. I searched for you but to no avail, only the sheets bore witness to last nights events. My body still shows your marks, making it harder to forget you. Tonight I will remain awake .......waiting for you....you fucking mosquito. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "We have suffered a great loss. And in our grief and anger, we have found our mission and our moment...We will not waver, we will not tire, we will not falter and we will not fail!... George W. Bush 9/11/2001 -------------------------------------------------------------------------------------------------- 7699 From: Steve Uhrig Date: Mon Sep 1, 2003 1:01pm Subject: Man steals tracking device, is found Man Charged With Stealing Tracking Device Man Is Arrested and Charged With Stealing Computerized Tracking Device; Cops Turned on Device to Find Him The Associated Press JANESVILLE, Wis. Sept. 1 ≠ To track down this alleged thief, all police had to do was flick on a computer. A 40-year-old man was arrested Wednesday and charged with stealing a computerized tracking device that uses a global positioning system to keep track of jail prisoners on home detention. "He apparently didn't know what he had because he would be awfully stupid to steal a tracking device," said correctional officer Thomas Roth, who runs the home detention program at the Rock County Jail. The $2,500 device was temporarily placed outside a home by a woman serving home detention. The device, which is a little bigger than a brick in size, has a built-in GPS satellite receiver. Prisoners wear a transmitter about as big as a cigarette pack on the ankle, and it acts as a 100-foot tether to the portable tracking device. By the time the prisoner called to report the theft Monday night, the device had automatically notified the jail that it had been taken outside the prisoner's home area. Roth then tracked the device through the Internet on his home computer. A trail of electronic dots led authorities to an apartment building, where the suspect was captured. ============= ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7700 From: Jay Coote Date: Mon Sep 1, 2003 7:11pm Subject: Items For Sale The following are for sale: Optoelectronics R10 Interceptor Near field FM demodulator with deviation and RSSI meters, volume, squelch controls, phones output. No charger, antenna or manual $50 + shipping Optoelectronics Model 40 Scout RF sniffer-freq counter with RSSI meter, CI-V output for receiver, hold and capture mode No charger or manual $120 + shipping Thanks, Jay Coote Los Angeles Specialist in Technical Surveillance Countermeasures Lic: PI17926 TSCM@j... 7701 From: mooty_7 Date: Sun Aug 31, 2003 7:15pm Subject: xp-pro...laptop I need some help...i have xp-pro loaded on a toshiba satellite laptop...the password in the start up has been changed...not the xp start up ,but the system start up...how can i get in this machine to change the pass word back so i can use this machine...thaks for you help in advance... 7702 From: Monty Date: Mon Sep 1, 2003 11:47am Subject: TSCM Jokes Hi guys I am looking for jokes about and for the community. My intent is to put up a new joke in our office atleast once a week. Also... I would like to have permission to also post them to a web site later as I build it Up. Thanks alot in advance Monty Washington, D.C. Providing mobile VIP TSCM protection __________________________________ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com 7703 From: James M. Atkinson Date: Tue Sep 2, 2003 9:22am Subject: Re: TSCM Jokes Q: How many West Point graduates does it take to screw in a light bulb? A: You do not need a TDR to screw in a light bulb, it is a government conspiracy to infringe on our freedoms. The light bulbs are being covertly supplied by the CIA to permit Echelon eavesdropping, and mind control. The light bulbs emit harmful infrared radiation that will burn your eyes, and make you impotent. I have never found a light bulb during a bug sweep, and therefor they do not exist. A spectrum analyzer can not find light bulbs, but the product I am endorsing this week will find them. Blah, blah, blah... rant, rant, rant... It's a government conspiracy I will be talking about on the Jim Bell show tonight. The voices, the voices, there are voices in my light bulb, but the light bulb does not exist, and I don't need a TDR because it can't find light bulbs, but there really isn't any light bulbs, and... and... and... I have studied light bulbs for the last 40 years, and see no need to screw them in, and anybody who tells you to screw them in does not understand basic electronics. It is better to live in darkness, then to screw in a light bulb. [duck] [snicker, snicker] -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7704 From: James M. Atkinson Date: Tue Sep 2, 2003 9:32am Subject: Hollywood Squares If you remember the original "Hollywood Squares" and its comics, this will bring a tear to your eyes. These great questions and answers are from the days when "Hollywood Squares" game show responses were spontaneous and clever, not scripted and (often) dull as they are now. Peter Marshall was the host asking the questions, of course. The younger readers among you won't know who some of these people are. Q. Do female frogs croak? A. Paul Lynde: If you hold their little heads under water long enough. Q. If you're going to make a parachute jump, at least how high should you be? A. Charley Weaver: Three days of steady drinking should do it. Q. True or False, a pea can last as long as 5,000 years. A. George Gobel: Boy, it sure seems that way sometimes. Q. You've been having trouble going to sleep. Are you probably a man or a woman? A. Don Knotts: That's what's been keeping me awake. Q. According to Cosmo, if you meet a stranger at a party and you think that he is attractive, is it okay to come out and ask him if he's married? A. Rose Marie: No, wait until morning. Q. Which of your five senses tends to diminish as you get older? A. Charley Weaver: My sense of decency. Q. In Hawaiian, does it take more than three words to say "I Love You"? A. Vincent Price: No, you can say it with a pineapple and a twenty. Q. What are "Do It," "I Can Help," and "I Can't Get Enough"? A. George Gobel: I don't know, but it's coming from the next apartment. Q. As you grow older, do you tend to gesture more or less with your hands while talking? A. Rose Marie: You ask me one more growing old question Peter, and I'll give you a gesture you'll never forget. Q. Paul, why do Hell's Angels wear leather? A. Because chiffon wrinkles too easily Q. Charley, you've just decided to grow strawberries. Are you going to get any during during the first year? A. Charley Weaver: Of course not, I'm too busy growing strawberries. Q. In bowling, what's a perfect score? A. Rose Marie: Ralph, the pin boy. Q. It is considered in bad taste to discuss two subjects at nudist camps. One is politics, what is the other? A. Paul Lynde: Tape measures. Q. During a tornado, are you safer in the bedroom or in the closet? A. Rose Marie: Unfortunately Peter, I'm always safe in the bedroom. Q. Can boys join the Camp Fire Girls? A. Marty Allen: Only after lights out. Q. When you pat a dog on its head he will wag his tail. What will a goose do? A. Paul Lynde: Make him bark? Q. If you were pregnant for two years, what would you give birth to? A. Paul Lynde: Whatever it is, it would never be afraid of the dark. Q. According to Ann Landers, is their anything wrong with getting into the habit of kissing a lot of people? A. Charley Weaver: It got me out of the army. Q. While visiting China, your tour guide starts shouting "Poo! Poo! Poo!" What does this mean? A. George Gobel: Cattle crossing. Q. It is the most abused and neglected part of your body, what is it? A. Paul Lynde: Mine may be abused but it certainly isn't neglected. Q. Back in the old days, when Great Grandpa put horseradish on his head, what was he trying to do? A. George Gobel: Get it in his mouth. Q. Who stays pregnant for a longer period of time, your wife or your elephant? A. Paul Lynde: Who told you about my elephant? Q. When a couple have a baby, who is responsible for its sex? A. Charley Weaver: I'll lend him the car, the rest is up to him. Q. Jackie Gleason recently revealed that he firmly believes in them and has actually seen them on at least two occasions. What are they? A. Charley Weaver: His feet -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7705 From: James M. Atkinson Date: Tue Sep 2, 2003 9:30am Subject: Things that make you go hhhhhmmmmm. It must have been a slow day when the person figured this out. While sitting at your desk, make clockwise circles with your right foot. While doing this, draw the number "6" in the air with your right hand. Your foot will change direction. Even when you try not to, your foot still changes direction. Now meditate on how or why this happens? -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7706 From: James M. Atkinson Date: Tue Sep 2, 2003 9:34am Subject: Washington Post's "Style Invitational" The Washington Post's "Style Invitational" once again asked readers to take any word from the dictionary, alter it by adding, subtracting, or changing one letter, and supply a new definition. Here are some recent winners: 1. Intaxication: Euphoria at getting a tax refund, which lasts until you realize it was your money to start with. 2. Reintarnation: Coming back to life as a hillbilly. 3. Bozone (n.): The substance surrounding stupid people that stops bright ideas from penetrating. The bozone layer, unfortunately, shows little sign of breaking down in the near future. 4. Foreploy: Any misrepresentation about yourself for the purpose of getting laid. 5. Cashtration (n.): The act of buying a house, which renders the subject financially impotent for an indefinite period. 6. Giraffiti: Vandalism spray-painted very, very high. 7. Sarchasm: The gulf between the author of sarcastic wit and the person who does not get it. 8. Inoculatte: To take coffee intravenously when you are running late. 9. Hipatitis: Terminal coolness. 10. Osteopornosis: A degenerate disease. (This one got extra credit.) 11. Karmageddon: It's like, when everybody is sending off all these really bad vibes, right? And then, like, the Earth explodes and it's like, a serious bummer. 12. Decafalon (n.): The grueling event of getting through the day consuming only things that are good for you. 13. Glibido: All talk and no action. 14. Dopeler effect: The tendency of stupid ideas to seem smarter when they come at you rapidly. 15. Arachnoleptic fit (n.): The frantic dance performed just after you've accidentally walked through a spider web. 16. Beelzebug (n.): Satan in the form of a mosquito that gets into your bedroom at three in the morning and cannot be cast out. 17. Caterpallor (n.): The color you turn after finding half a grub in the fruit you're eating. And the pick of the literature: 18. Ignoranus: A person who is both stupid and an asshole. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7707 From: James M. Atkinson Date: Tue Sep 2, 2003 9:38am Subject: The Little Firefighter A fire fighter is working on the engine outside the station when he notices a little girl next door in a little red wagon with little ladders hung off the sides and a garden hose tightly coiled in the middle. The girl is wearing a fire fighter's helmet. The wagon is being pulled by her dog and her cat. The fire fighter walked over to take a closer look. "That sure is a nice fire truck," the fire fighter says with admiration. "Thanks" the girl says. The firefighter looks a little closer and notices the girl has tied the wagon to her dog's collar and to the cat's testicles. "Little Partner". the fire fighter says, "I don't want to tell you how to run your rig but if you were to tie that rope around the cat's collar, I think you could go faster." The little girl replies thoughtfully, " You're probably right, but then I wouldn't have a siren." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7708 From: James M. Atkinson Date: Tue Sep 2, 2003 9:08am Subject: Re: TSCM Jokes At 9:47 AM -0700 9/1/03, Monty wrote: >Hi guys > >I am looking for jokes about and for the community. > >My intent is to put up a new joke in our office >atleast once a week. > >Also... I would like to have permission to also post >them to a web site later as I build it Up. > > >Thanks alot in advance > >Monty >Washington, D.C. > >Providing mobile VIP TSCM protection Feel free to post them on this mailing list. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7709 From: Date: Tue Sep 2, 2003 10:23am Subject: Re: xp-pro...laptop Toshiba was unable to assist you? Either via their website support or a phone call? At 19:15 08/31/2003, mooty_7 wrote: > I need some help...i have xp-pro loaded on a toshiba satellite >laptop...the password in the start up has been changed...not the xp >start up ,but the system start up...how can i get in this machine to >change the pass word back so i can use this machine...thaks for you >help in advance... 7710 From: Date: Tue Sep 2, 2003 10:11am Subject: Re: xp-pro...laptop well, if it was a desktop, you could pop out the CMOS battery, but finding it on a laptop is tedious - but you could try. many laptops instead are programmed to accept a key combo on boot. i used ctrl-alt-ins successfully first. look at this page: http://www.uktsupport.co.uk/reference/biosp.htm "TOSHIBA BIOS Most Toshiba laptops and some desktop systems will bypass the BIOS password if the left shift key is held down during boot" hope this helps. On Mon, 1 Sep 2003 12:15am, mooty_7 wrote: > I need some help...i have xp-pro loaded on a toshiba satellite > laptop...the password in the start up has been changed...not the xp > start up ,but the system start up...how can i get in this machine to > change the pass word back so i can use this machine...thaks for you > help in advance... > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 7711 From: Jon Asdourian Date: Tue Sep 2, 2003 11:37am Subject: Toshiba Boot up Password In the past, I have used a dongle to bypass the toshiba boot up password, I am not completly sure what models this works. Google for 'toshiba dongle password bypass' there are several for sale, I know at one time the insturctions for building one were on the net, good luck. Jon Asdourian Senior Forensic Examiner __________________________________ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com 7712 From: David Alexander Date: Tue Sep 2, 2003 11:21am Subject: RE: xp-pro...laptop Mooty As an Information Security professional, I know about this sort of thing. I'm going to assume that this is your PC and your request is legitimate. If you mean the BIOS password, then the first step is ask the person who set it. In the 'good old days' you just opened the case and removed the CMOS/BIOS battery for a few hours, then replaced it. Sometimes, if you have the schematic, there is a bios reset jumper, but not always. With the advent of NVRAM these tend not to work any more, so if you can't do that, here are two possibilities: The first way is to bypass the Power On BIOS password. This method should work on all Toshiba models. You need: 1. Your notebook 2. An empty formatted diskette 3. A second computer (e.g. a DOS desktop PC) 4. A hex-editor (e.g. Norton DiskEdit or HexWorks) This is what you have to do: 1. Start the desktop PC and start the hex-editor 2. Put the disk in drive A: 3. Change the first five bytes of sector 2 (boot sector is sector 1) to: 4B 45 59 00 00 4. Save it! Now you have a KEYDISK 5. Remove the disk from drive A: 6. Put the disk in the notebook drive 7. Start the notebook in Boot Mode (push the reset button) 8. Press Enter when asked for Password: 9. You will be asked to Set Password again. Press Y and Enter. 10. You now see the BIOS configuration where you can set a new password. Another way is to make a 'key' for the parallel port that should unlock the bios password (only works on newer Toshibas) Make this from parts available from Tandy/Radio Shack and connect it to your parallel port, a lot of Toshiba computers will remove the password when you boot it up. Connect the following pins: 1-5-10, 2-11, 3-17, 4-12, 6-16, 7-13, 8-14, 9-15 For those who wish to know, this what you are connecting: 1-5-10, 1=Strob, 5 =data bit 3, 10 = ack 2-11, 2=data bit 0, 11=Busy 3-17, 3=data bit 1, 17=SLCT IN 4-12, 4=data bit 2, 12=Paper End 6-16, 6=data bit 4, 16=reset 7-13, 7=data bit 5, 13=SLCT (out) 8-14, 8=data bit 6, 14=Auto feed 9-15 9=data bit 7, n/c sometimes +5v regards David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: mooty_7 [mailto:mooty_7@y...] Sent:01 September 2003 01:16 To:TSCM-L@yahoogroups.com Subject:[TSCM-L] xp-pro...laptop I need some help...i have xp-pro loaded on a toshiba satellite laptop...the password in the start up has been changed...not the xp start up ,but the system start up...how can i get in this machine to change the pass word back so i can use this machine...thaks for you help in advance... ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS From: A Grudko Date: Fri Aug 25, 2000 1:52pm Subject: Re: Snazzy Uniforms ----- Original Message ----- > Check out this site for some snazzy sweep uniforms, complete with hard hat & company logo. They even have their "technician's" photo on their web page. This site is definitely worth a look...and a laugh! www.bugged.com My hard hat is better - it has 2 'eyeballs' bobbing on long springs (secretly resonant at 146.030, one of Cony's most popular bug frequencies). I think the music is great, reminds me of a porno movie (yes, I am over 18). More than 90% of our sweeps are conducted after business hours because most of our clients don't want the staff to know that sweeps take place, for obvious security reasons, so what we wear is largely irrelevant. But in those instances where we think that timer or remote operated TXs might be in use we go in in overalls which say 'XYZ Aircon Services' or something appropriate. Wandering around in overalls with a gas mask and a big gas bottle marked 'poison' to 'regas the aircon' or 'terminate rats' is a great way to get people out of their offices so that you can check if they have a recorder secretly parallel into the boss' phone. Another good pretext is 'adjusting the network lines'. (None of the above is posted to encourage illegal activity) Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1323 From: Robert G. Ferrell Date: Fri Aug 25, 2000 2:28pm Subject: Re: Re: Snazzy Uniforms >But in those instances where we think that timer or remote operated TXs >might be in use we go in in overalls which say 'XYZ Aircon Services' or >something appropriate. You should just get black tee shirts that say "Bug Zappers" or something like that. People will think you're into pest control, which is really fairly accurate. I saw a shirt the other day that said "I am a Bomb Technician. If you see me running, try to keep up." Have a good weekend. RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 1324 From: James M. Atkinson, Comm-Eng Date: Fri Aug 25, 2000 3:44pm Subject: Feeling Old? Hope this is the one Feeling Old? Hope this is the one This one will scare you a little! Just in case you weren't feeling too old today, this will certainly change things. Each year, the staff at Beloit College in Wisconsin puts together a list to try to give the faculty a sense of the mindset of that year's incoming freshmen. Here is this year's list: The people who are starting college this fall across the nation were born in 1982. They have no meaningful recollection of the Reagan Era and probably do not even know that he had ever been shot. They were prepubescent when the Persian Gulf War was waged. Black Monday, 1987 is as significant to them as the Great Depression. There has only been one Pope. They were 11 when the Soviet Union broke apart and do not remember the Cold War. They have never feared a nuclear war. They are too young to remember the space shuttle blowing up. Tiananmen Square means nothing to them. Their lifetime has always included AIDS. Bottle caps have always been screw off and plastic. Atari predates them, as do vinyl albums. The expression "you sound like a broken record" means nothing to them. They have never owned a record player. They have likely never played Pac Man and have never heard of Pong. They may have never heard of an 8 track. The Compact Disc was introduced when they were 1 year old. As far as they know, stamps have always cost about 33 cents. They have always had an answering machine. Most have never seen a TV set with only 13 channels, nor have they seen a black-and-white TV. They have always had cable. There have always been VCRs, but they have no idea what BETA is. They cannot fathom not having a remote control. They were born the year that the Walkman was introduced by Sony. Roller-skating has always meant "inline" for them. Jay Leno has always been on the Tonight Show They have no idea when or why Jordache jeans were cool. Popcorn has always been cooked in the microwave. They have never seen Larry Bird play. They never took a swim and thought about Jaws. The Vietnam War is as ancient history to them as W.W.I, W.W.II, and the Civil War. They have no idea that Americans were ever held hostage in Iran. They can't imagine what hard contact lenses are. They don't know who Mork was or where he was from. They never heard: "Where's the beef?", "I'd walk a mile for a Camel", or "De plane, de plane!" They do not care who shot J.R. and have no idea who J.R. is. The Titanic was found? They thought we always knew where it was. Michael Jackson has always been white. Kansas, Chicago, Boston, America and Alabama are all places, not groups. McDonalds never came in Styrofoam containers. There has always been MTV. They don't have a clue as to how to use a typewriter. Do you feel old yet? Pass this on to all the other old fogies. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1325 From: A Grudko Date: Fri Aug 25, 2000 6:17pm Subject: Re: Spyking!!! ----- Original Message ----- > I have a picture somewhere of a R&S DKV van modified with tons of surveillance gear, even had a 70' hydraulic mast to raise antennas as needed! Subtle. In the late 80's, as a reservist cop with some special skills, I was assigned to a unit that needed to surveille suspected terrorists (if Steve White is still on this group he'll probably know my then JVS-SB boss, Lieutenant Robert Whitecross). On my first day on the job I proudly told my superior that we had broad RF surveillance capabilities via a van with up to 6 antennas on it. He then said, 'Our cars have no antennas but we can get any signal'. I then went on to Humility 101. The proliferation of cell phones has since made the presence of an antenna far less suspicious. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1326 From: Jay Coote, W6CJ Date: Fri Aug 25, 2000 7:51pm Subject: Re: Spyking!!! There are some interesting comm antennas out there; Larsen, STI-CO and a number of vendors have flat "frisbee" or patch antennas for a number of bands in VHF through UHF. Of course (those of us who have won lotteries) could use a van body with a fiberglass camper top. The plastic top would allow standing room and plenty of room for gain antennas.... Less noticeable than a plain .gov van. Musings... Jay Coote Los Angeles ---------- > ----- Original Message ----- > > I have a picture somewhere of a R&S DKV van modified with tons of > surveillance gear, even had a 70' hydraulic mast to raise antennas as > needed! > > Subtle. > > In the late 80's, as a reservist cop with some special skills, I was > assigned to a unit that needed to surveille suspected terrorists (if Steve > White is still on this group he'll probably know my then JVS-SB boss, > Lieutenant Robert Whitecross). > > On my first day on the job I proudly told my superior that we had broad RF > surveillance capabilities via a van with up to 6 antennas on it. He then > said, 'Our cars have no antennas but we can get any signal'. > > I then went on to Humility 101. > > The proliferation of cell phones has since made the presence of an antenna > far less suspicious. > > Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime > investigation & intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 > 11) 465 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > Chairman), > UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done > right - first time" > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1327 From: Date: Fri Aug 25, 2000 4:18pm Subject: Re: Spyking!!! In a message dated 8/25/00 5:52:56 PM Pacific Daylight Time, TSCM@j... writes: << Spyking!!! >> ROFPMFGU The FCC has enforcement sedans with fiberglass roofs concealing switchable, RDF antennas covering all bands. As of 1995 the models they were working on had all the receivers and electronics concealed in the trunk. The RDF display they were experimenting with was a removable / concealable flat screen. The FCC engineers I was working with were attempting to arrange to combine audio and video tape of the signal for evidence. These sedans were completely covert and were in use in all field offices. 1328 From: James M. Atkinson, Comm-Eng Date: Fri Aug 25, 2000 8:16pm Subject: Re: Fiberglass Van [was: Spyking!!!] For a number of years I have been using rented Ryder panel trucks when I needed to set up a big array of antenna's and I couldn't get close enough to the target by using a rental room somewhere. Generally I prefer to get into a fixed position for my pre-sweeps, but sometimes it just isn't possible. I simply charge up a dozen or so deep cycle marine batteries and plug them into a set of AC inverters so I can run on batteries all day for the pre-sweep. I then set up my equipment and strap everything down so I am ready to go online as soon as I climb into the back of the cabin. I usually point the truck at the facility (at a distance) and direct some rather large waveguides and log periodics at the facility I will be checking the next day. I prefer to use the vehicles with an "attic" so I can keep the antennas and amplifier (over the cabin) and away from the test equipment (all the way in the back). This way I can keep all of the antenna's inside the vehicle, and if you get one with a translucent roof you will not need interior lights. Just my humble opinion. -jma At 8:55 PM -0400 8/25/00, Jay Coote, W6CJ wrote: >There are some interesting comm antennas out there; Larsen, STI-CO >and a number of vendors have flat "frisbee" or patch antennas for a >number of bands >in VHF through UHF. Of course (those of us who have won lotteries) could >use a van body with a fiberglass camper top. The plastic top would allow >standing room and plenty of room for gain antennas.... >Less noticeable than a plain .gov van. >Musings... >Jay Coote >Los Angeles > >---------- > > ----- Original Message ----- > > > I have a picture somewhere of a R&S DKV van modified with tons of > > surveillance gear, even had a 70' hydraulic mast to raise antennas as > > needed! > > > > Subtle. > > > > In the late 80's, as a reservist cop with some special skills, I was > > assigned to a unit that needed to surveille suspected terrorists (if Steve > > White is still on this group he'll probably know my then JVS-SB boss, > > Lieutenant Robert Whitecross). > > > > On my first day on the job I proudly told my superior that we had broad RF > > surveillance capabilities via a van with up to 6 antennas on it. He then > > said, 'Our cars have no antennas but we can get any signal'. > > > > I then went on to Humility 101. > > > > The proliferation of cell phones has since made the presence of an antenna > > far less suspicious. > > > > Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime > > investigation & intelligence > > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > > Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 > > 11) 465 9673 - 465 1487 (Fax) - Est. 1981 > > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > > Chairman), > > UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done > > right - first time" > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1329 From: James M. Atkinson, Comm-Eng Date: Fri Aug 25, 2000 8:31pm Subject: Re: Spyking!!! At 8:55 PM -0400 8/25/00, Jay Coote, W6CJ wrote: >There are some interesting comm antennas out there; Larsen, STI-CO >and a number of vendors have flat "frisbee" or patch antennas for a >number of bands >in VHF through UHF. Of course (those of us who have won lotteries) could >use a van body with a fiberglass camper top. The plastic top would allow >standing room and plenty of room for gain antennas.... >Less noticeable than a plain .gov van. >Musings... >Jay Coote >Los Angeles The nice "flying saucer" antenna's with internal 20 dB amplifier are great for hunting down things that have horizontal polarization, but you have to tweak the final balun to get a decent impedance match to your 50 ohm equipment. It works really well on the little Cony toys (assuming the antenna is laid out horizontally). However, watch out because it it really easy to saturate the antenna (er, amplifier inside the antenna) and create some serous deafness in your gear. Place your antenna 2 feet off the floor and slowly roll it around the room (10 seconds per ten square feet), raise the antenna two more feet and repeat until you are an inch or so below the ceiling. Rotate the antenna sideways so that it if vertically polarized and pass it along the walls and flat surfaces as well. I've had good luck with a 21 inch unit with 20 dB LNA from Radio Shack (stock number 15-1624) , and also with a big 36 inch unit with a 32 dB LNA (unknown manuf). You may also want to take a look at the RS Wall-Mounted amplified AM/FM antenna with an internal 42 dB amplifier (part number 15-1846). -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1330 From: James M. Atkinson, Comm-Eng Date: Fri Aug 25, 2000 8:41pm Subject: Re: Fiberglass Van [was: Spyking!!!] The last one I saw (and got to play with recently) was being used by the Department of Transportation/Navy and was a used for hunting down MIJI and similar problems. Several hundred pounds of gear in the trunk, two 200 amp alternators, and the display was concealed in a six inch LCD panel that flipped down from the ceiling (really neat). They are fine for hunting down transmitters strong enough to interfere with aircraft communications, but virtually worthless for bug hunting. -jma At 9:18 PM -0400 8/25/00, MACCFound@a... wrote: >In a message dated 8/25/00 5:52:56 PM Pacific Daylight Time, TSCM@j... >writes: > ><< Spyking!!! >> > >ROFPMFGU > >The FCC has enforcement sedans with fiberglass roofs concealing switchable, >RDF >antennas covering all bands. As of 1995 the models they were working on had >all the receivers and electronics concealed in the trunk. The RDF display >they >were experimenting with was a removable / concealable flat screen. The FCC >engineers I was working with were attempting to arrange to combine audio and >video tape of the signal for evidence. These sedans were completely covert and >were in use in all field offices. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1331 From: Date: Fri Aug 25, 2000 5:38pm Subject: A Good Read I recently purchased a dynamite book which was of great interest to me and would benefit anyone in TSCM with a serious interest in learning more about the field and it's origins. The 64 page, privately published in book is entitled "As I Recall" and covers the history of E. S. as recalled By Bob Doms. He's been there and seen it and done it. He spent 20 plus years with the Army at Ft. Holobird in USAIMSO (US Army Intelligence Material support Office). BTW He's the guy who got Marty Kaiser into the business. Upon retiring, he went on to work for AID (Audio Intelligence Devices) and NIA (National Intelligence Academy). People that have a definite interest in technical surveillance will enjoy As I Recall. Chapters include: Telegraph & Telephone Development Of Wireless & Recording Roaring 20's Thirties Forties The Real Beginning Was It Legal? Vehicle Tracking AID & NIA TSCM Night Vision Potpourri Epilogue It does have many illustrations that you will find nowhere else. The photograph of the Great Seal transmitter was originally classified, even if only CONFIDENTIAL. People can view a "replica" in the National Cryptology museum at Fort Meade. Also, very few people today have ever seen a Blattnerphone or a Mini-Phon. In our current generation, very few people have ever seen the Mason A-2 or the WR 550-D. Current CM techs may have heard about these relics, but very few remember when they were "state of the art." $30.00. Orders are sent out by Priority Mail so they do get two day delivery. His web site is at www.rdoms.com. You can send a check or money order to: Robert W. Doms, Sr. PO Box 1 Timonium, MD 21094 His number 410-252-8545 Don't be a piker. Ask your wives for the $30. You'll be glad you did. 1332 From: James M. Atkinson, Comm-Eng Date: Fri Aug 25, 2000 9:44pm Subject: Noise Floors, Signal Thresholds and so on I have been asked to mention something on the list about noise floors, signal thresholds and so on, so here goes. My personal preference is to park the spectrum analyzer on a confirmed hostile frequency (typically a house frequency), use a 100 kHz dispersion, a 200 or 300 Hz RBW, sweep at 5 seconds, and then collect 3-10 sweeps (of min, max, and average) and average the active trace to further reduce the noise floor. I then flag, isolate, and investigate anything that presents any energy above -140 dBm (which is about 18 nV) if the band is congested or noisy I can increase the threshold to -125 dB, but I don't like to go much higher then that. Using this method I can clear about 75-100 known hostiles an hour with extreme instrument sensitivity, but can take several days to clear DC to 3 GHz in detail. When I don't have time to perform a full procedure then I raise the RBW to 1 kHz, expand the dispersion to 1 MHz, increase my scan speed to 2.5 seconds, and only run 5 averages. I then hunt down anything that appears above -131 dBm (my noise floor will be at about -128 dBm). By using this "rougher" version I can cover about 3000 known hostiles between DC and 3 GHz in about 12 hours. I prefer to keep my displayed amplitude at no more then 30 dB for full deflection (3 dB per graticule). I also like to collect at least 4000 samples per instrument sweep. Of course I check the entire spectrum, but I also like to "look hard" at known hostile frequencies, or hunt for anomalies in a known hostile band. Performing sweeps above 3 GHz gets a wee bit trickier as the noise of amplifiers and gain of the antennas start to stomp on us quite a bit. Personally I like to spend at least 6 hours digging at the spectrum (with a laptop computer controlling the instrument). -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1333 From: James M. Atkinson, Comm-Eng Date: Fri Aug 25, 2000 9:46pm Subject: Re: A Good Read I would second the recommendation of Bobs book, it is really a good book and is well written. -jma At 10:38 PM -0400 8/25/00, MACCFound@a... wrote: >I recently purchased a dynamite book which was of great interest to me >and would benefit anyone in TSCM with a serious interest in learning more >about the field and it's origins. > >The 64 page, privately published in book is entitled "As I Recall" and covers >the history of E. S. as recalled By Bob Doms. He's been there and seen it and >done it. He spent 20 plus years with the Army at Ft. Holobird in USAIMSO >(US Army Intelligence Material support Office). BTW He's the guy who got >Marty Kaiser into the business. Upon retiring, he went on to work for AID >(Audio Intelligence Devices) and NIA (National Intelligence Academy). > >People that have a definite interest in technical surveillance will enjoy As >I Recall. > >Chapters include: > >Telegraph & Telephone >Development Of Wireless & Recording >Roaring 20's >Thirties >Forties >The Real Beginning >Was It Legal? >Vehicle Tracking >AID & NIA >TSCM >Night Vision >Potpourri >Epilogue > >It does have many illustrations that you will find nowhere else. The >photograph >of the Great Seal transmitter was originally classified, even if only >CONFIDENTIAL. People can view a "replica" in the National Cryptology museum >at Fort Meade. Also, very few people today have ever seen a Blattnerphone or >a Mini-Phon. In our current generation, very few people have ever seen the >Mason A-2 or the WR 550-D. Current CM techs may have heard about these >relics, but very few remember when they were "state of the art." > >$30.00. Orders are sent out by Priority Mail so they do get two day delivery. > > His web site is at www.rdoms.com. > You can send a check or money order to: >Robert W. Doms, Sr. >PO Box 1 >Timonium, MD 21094 > >His number 410-252-8545 > >Don't be a piker. Ask your wives for the $30. You'll be glad you did. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1334 From: William Knowles Date: Fri Aug 25, 2000 10:46pm Subject: Canada said probing possible spying by U.S., Israel http://news.excite.com/news/r/000825/11/canada-spying Updated 11:54 AM ET August 25, 2000 OTTAWA (Reuters) - Canadian police are investigating whether U.S. and Israeli spies used rigged computer software to hack into Canada's top secret intelligence files, the Toronto Star newspaper said Friday. The paper said the probe revolved around Promis, a software program first developed to assist prosecutors in the United States Department of Justice which was the centre of a U.S. scandal a decade ago. The Star said police were probing whether the software -- used by the Mounties and Canada's spy service to co-ordinate secret investigations -- had been rigged with a so-called "trap door" allowing unauthorized access to sensitive data. "That could include economic intelligence on trading partners, detailed information on the whereabouts of terrorism suspects in Canada or strategic information on the positions Canada intends to take in international relations," it said. The Mounties did not return calls seeking comment on the allegations and no one was immediately available at the Israeli or U.S. embassies. Promis was developed by U.S. company Inslaw Inc., which alleged in the late 1980s that the U.S. government had stolen their software and -- working with Israel -- pedaled pirated versions to intelligence agencies around the world. The case was eventually thrown out of court. The Toronto Star said the Mounties had interviewed a number of people linked to the Promis affair to see whether there might have been a breach in Canadian national security. Canada's national counterintelligence agency said in a June report that friendly nations were making concerted efforts to steal sensitive technology and information. The Canadian Security Intelligence Service said outsiders were particularly interested in aerospace, biotechnology, chemicals, communications, information technology, mining and metallurgy, nuclear energy, oil and gas, and the environment. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 1335 From: A Grudko Date: Sat Aug 26, 2000 0:34pm Subject: Re: Digital phones ----- Original Message ----- From: James M. Atkinson, Comm-Eng > Why does the PCM backbone signals from the PBX appear on the power lines in traverse mode? It could be a bad cap in the power supply, or it could be a manipulation. I give up, part 2.... In my defence, your honnor, I have always told my clients to have sensitive meetings at a last moment randomly chosen remote location. That is the best TSCM strategy I can offer. When I tell clients I cannot guarantee that a room is 100% clean after 3 hours of examination they often look at me as if I'm ripping them off, and then they look sideways at the bill. Selling Amway must be easyer 1336 From: James M. Atkinson, Comm-Eng Date: Sat Aug 26, 2000 0:11pm Subject: Prosecution of Ex-CIA Chief Urged in Computer Case Prosecution of Ex-CIA Chief Urged in Computer Case, People Say http://quote.bloomberg.com/fgcgi.cgi?ptitle=Technology%20News&s1=blk&t p=ad_topright_tech&T=markets_fgcgi_content99.ht&s2=blk&bt=ad_bottom_te ch&s=AOabIRhV9UHJvc2Vj By James Rowley Washington, Aug. 25 (Bloomberg) -- A U.S. prosecutor has recommended that former CIA Director John M. Deutch be charged with illegally storing government secrets on home computers and lying about the security breach, people familiar with the case said. Central Intelligence Agency internal investigations reported in February that Deutch kept a large volume of top-secret government documents on computers that were not designed to protect classified information. The CIA concluded that Deutch violated security rules because classified files could have been retrieved from his computers when he used the Internet. Paul E. Coffey, a career government prosecutor summoned from retirement to investigate the case for the Justice Department, recommended the criminal prosecution of Deutch, the people said. It is up to Attorney General Janet Reno to decide whether to act on the recommendation. She declined to prosecute last year after reviewing the CIA's internal investigation before it was made public. Amid mounting congressional pressure, the Justice Department reopened its criminal investigation of Deutch. Senate Intelligence Committee Chairman Richard Shelby said after Deutch appeared before the panel that the conduct by the former head of the spy agency ``continues to baffle members of the committee, and his explanations were not wholly satisfactory.'' Justice Department spokeswoman Chris Watney declined to comment today, except to say ``the review is continuing.'' Neither Deutch nor his attorney, Terrence O'Donnell, returned telephone calls seeking comment. Defense Secrecy Laws Any of three defense-secrets statutes could be invoked to prosecute Deutch. All three were listed as potentially applicable to the case by the CIA inspector general. The most likely statute to form the basis of a prosecution bars ``unauthorized removal and retention of classified material'' with the intent to keep them ``at an unauthorized location.'' It carries a one-year prison term and a $1,000 fine. Two other provisions carry 10-year sentences but may not apply because there is no evidence the information on Deutch's computers was stolen or compromised, one government official said. A second statute outlaws willful use of certain classified information ``in any manner prejudicial to the safety or interest of the United States.'' A third prohibits removal of records from safekeeping ``through gross negligence.'' Earlier Case In any event, CIA Inspector General L. Britt Snider noted that another high-ranking CIA official found to have stored classified information on a home computer also used by his family was demoted a pay grade and disciplined. That official was not prosecuted by the Justice Department, said CIA spokesman Mark Mansfield. The Deutch case has proven sensitive for the Justice Department, complicated by the inevitable comparison to its handling of the prosecution of Wen Ho Lee, a former nuclear physicist at the government's Los Alamos National Laboratories who is suspected of passing nuclear secrets to China. Critics had accused the government of applying a double standard by declining to prosecute Deutch. While Lee hasn't been charged with espionage, he is accused of downloading classified information onto an unsecured computer. A federal judge this week ruled that he could be released on bail, rejecting government arguments that he posed a risk of flight. `Highly Classified Information' In Deutch's case, the CIA discovered classified information - - including ``Top Secret'' memos to the president -- on government-issued computers in Deutch's Bethesda, Maryland, home several days after he left office as CIA director in December 1996. Deutch deleted files following the discovery and before the computer hard drives were retrieved by CIA investigators, the CIA report said. He also kept classified information on computers at his residence in the Boston area, where he teaches at Massachusetts Institute of Technology, the report said. The CIA found that Deutch ``intentionally processed . . . large volumes of highly classified information'' on the unprotected computers even though he was ``specifically informed that he was not authorized'' to do so. With the computers linked to the Internet, the classified information ``was at risk of compromise'' though it was unknown whether any data was stolen, the CIA inspector general concluded. Deutch told the inspector general he wasn't aware of the risk. But the report cited evidence he was briefed about the danger in 1995 and reminded again by a computer specialist who helped him recover lost files. Snider criticized CIA officials for lax handling of the investigation, including lengthy delays in notifying both the Justice Department and Congress of the security breach and for their failure to interview Deutch. Officials Reprimanded Deutch, who continued to work as a consultant for the CIA after returning to MIT, kept his security clearance for nearly three years after the security breach was discovered. Deutch was stripped of the security clearance by CIA Director George Tenet, and he issued a formal apology. As a result of further review, Deputy CIA Director John Gordon disciplined six current or former CIA officials for failure to follow normal procedures in investigating what the agency called ``a serious security incident.'' Tenet, who was cited by the inspector general for failing to forcefully involve himself in the security investigation, acknowledged to President Bill Clinton that he shared responsibility for problems in the investigation. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1337 From: Jordan Ulery Date: Sat Aug 26, 2000 2:48pm Subject: Disappearing email The following is not strictly TSCM, but may be of interest in your business lives: InformationWeek Daily Online ** Disappearing Inc. May Ease Worries Over E-Mail Corporate E-mail has an afterlife that can come back to haunt companies and their executives. Witness the use of sensitive communications by Microsoft officials in the Department of Justice suit against the software giant. But startup Disappearing Inc. has a solution that should give companies control over their sensitive electronic communications. "Many businesspeople are reticent to use E-mail for sensitive communications," says Disappearing CEO Maden Marvit. The concerns over intellectual property getting into the wrong hands are great." Disappearing Email lets users write their messages in the electronic equivalent of disappearing ink. Users can set a time period after which a message can no longer be read. The system consists of client software, which is currently available for Microsoft Outlook, and a service that resides on Disappearing's servers. Once the message has expired, the key that opens the message is deleted from its server. The company last week revealed plans to develop a version of the software for Lotus Notes. Disappearing also offers a developers' kit that lets users port the system to other mail clients. Users can download a free trial copy of the client software from the company's Web site. - Karyl Scott [Non-text portions of this message have been removed] 1338 From: John McCain Date: Fri Aug 25, 2000 5:25pm Subject: Chicago Cruisers Bugged in Internal Probe Interesting article from APBnews.com today.... BUT, searching both major Chicago newspapers on-line didn't get any hits on relevent keywords :) JohnM Aug. 25, 2000 By Richard Zitrin CHICAGO (APBnews.com) -- Bugging devices found in police cars in a city precinct were being used in an internal probe into possible criminal activity, authorities said today. The devices found in patrol cars in the Jefferson Park district Thursday evening were part of an investigation into specific officers, police spokesman Pat Camden said. "It's no way citywide," Camden told APBnews.com. "It's not a witch hunt. It's not something being put out there frivolously. It's something that is the result of allegations of criminal behavior." Camden said he's unsure if the officers who uncovered the bugs are the targets of the investigation. He also said he could not provide specifics of the probe. .... http://www.apbnews.com/newscenter/breakingnews/2000/08/25/bugs0825_01.html?s =syn.applet_bugs0825 1339 From: A.Lizard Date: Sat Aug 26, 2000 2:27pm Subject: for those of you who are using PGP... As most of you know, a major bug was found in v6.5.x and earlier PGP distributions. (except for v2.6.2, which uses a different type of key.) The ADK bugfixed freeware 6.5.8 version is available at: http://www.pgpi.com (international) http://web.mit.edu/network/pgp.html (US/Canada) If you're using the commercial version, go to http://www.pgp.com to get information on how to get your upgrade. If you run across anybody (e.g. your clients) using versions 4.5-6.5.3, tell them it's upgrade time. Whether or not the NSA can crack it, as far as I know it's perfectly adequate for ordinary commercial use. I'll be happy to post a *short* message encrypted using PGP to the list upon request for anyone who believes that PGP encryption is easy to crack and would like to demonstrate. A.Lizard 1340 From: James M. Atkinson, Comm-Eng Date: Sun Aug 27, 2000 7:17pm Subject: Practical Joke In Japan Initiates Fears About Virus Attacks On Mobiles [Moderators Note: My favorite cell related security problem comes from the NEXTEL, Omnipoint, and Sprint units and their vulnerability to the Hijack exploitation.] Practical Joke In Japan Initiates Fears About Virus Attacks On Mobiles http://www.zdnet.co.uk/news/2000/31/ns-17205.html Japan's i-mode mobile phones were hit by a bizarre attack Tuesday which security experts warn may be just the first of many security worries for broadband mobile Internet. Hundreds of Japanese i-mode users were stung by a prank which forced phones to dial "110" -- the police emergency telephone number in Japan -- during an online quiz. The Internet quiz about relationships was designed especially for i-mode phones and was configured so that if contestants answered "yes" to a particular question their phones immediately established a connection with the police. According to reports, the police were inundated by 400 fake calls in a single day. A spokesman for NTT DoCoMo -- the Japanese company behind the i-mode standard -- has reportedly blamed the prank on a command hidden within the program running the quiz. The practical joke has triggered concern among security experts that it is just the first of many mobile virus attacks. Jack Clark, European product manager for security firm Network Associates takes it as a sign of things to come. "It demonstrates that malicious people are looking into this," he says. It is already possible for email viruses and worms to find their way onto standard GSM mobile phones through SMS (Short Messaging Service) gateways on the Internet. This was demonstrated during the outbreak of the LoveBug virus and by a worm aimed specifically at Spanish mobile phone users named Timofonica. According to antivirus vendors, Europe's current mobile Internet standard, WAP, does not feature capabilities that could be exploited maliciously. Future generations of European mobile phones based on broader connectivity, using firstly GPRS and eventually UMTS technology will, however, offer far greater functionality which in turn will make them more vulnerable to virus attacks. Clark says that security firms already have one eye on possible security exploits with these technologies. "This [attack] is a glimpse of the future," he warns. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1341 From: Jay Coote, W6CJ Date: Sun Aug 27, 2000 7:24pm Subject: Norstar Vulnerability Could someone email me and discuss vulnerabilities in a Norstar telephone system? Are these ordinarily "dirty" with RF grunge all over the 2-30 Mhz band? Pretty broad questions, I know- I can furnish some model numbers later. Thanks, Jay Coote Los Angeles 1342 From: James M. Atkinson, Comm-Eng Date: Sun Aug 27, 2000 7:33pm Subject: Fwd: Dial E for Eavesdropping >Dial E for Eavesdropping > >Find out about 'copy cats,' bugged power strips, and cell trackers >-- some of the 'most dangerous eavesdropping devices,' according to >the US Secret Service. > >By Iolande Bloxsom >August 25, 2000 > > Heard a strange click on your cell phone? It just might have been >someone listening in. Ever seen an unknown number on your phone >bill? Someone may have cloned your phone. > >The devices are out there. They're contraband. It's illegal to >possess them, to use them, and illegal to use any of the information >gained from using them. > >From pens used to eavesdrop on conversations to "magic boxes" for >cloning cell phones, the US Secret Service has confiscated a wide >array of eavesdropping gadgets. These high tech tools have been used >in the latest round of scams, schemes, and underhanded shenanigans. > >Robert Weaver has seen most of them. He heads the New York >Electronic Crimes Task Force and is the the assistant to the special >agent in charge at the US Secret Service in New York. > >'We're still seeing a lot of very intrusive illegal eavesdropping >devices being marketed, both in traditional forms and over the >Internet.' > >-- Assistant US Attorney Eric Friedberg > >The contraptions at his offices are "confiscated equipment, >representing five years of work and over eight hundred cases [with] >arrests and convictions," he told CyberCrime's Alex Wellen. "Each >one of them [that] we progressed with, we learned from." > >Weaver described how one device first recorded the credit card >number, then the passcode from unsuspecting travelers using pay >phones in "one of the largest telecommunications scams in the United >States." > >And that was one of the simpler eavesdropping devices the team has >seen. Since 1995, Weaver and his crew have used the confiscated >gadgets to educate and train other law enforcement agencies, along >with private sector groups. > >Cloning, without the sheep > >Magic boxes and "copy cats" are two contraband items that clone >mobile phones. Just plug them into a cell phone, and suddenly you >can reprogram the phone to accept a stolen phone number. > >If that doesn't do the trick, Weaver advises, "what the bad guys do >is they open it up on the back, they reprogram the chips on the >inside, and they make this phone do something illegal and accept >stolen information and stolen property." > >Get > >tips to prevent cell phone fraud from expert feds Weaver's >collection also includes telephone plugs, pens, and power strips, >all used to surreptitiously eavesdrop on conversations. One plug was >a crucial piece of evidence in the Bernhart Bowitz case. > >"We started to focus on an individual," said Assistant US Attorney >Eric Friedberg. "Bernard Bowitz market[ed] over the Internet, which >was somewhat unusual at that time. Back in 1995, [he] started >marketing an illegal device [to] clone cellular phones." > >Unlike the magic box (which stored only one stolen number), Bowitz' >cell tracker could store 99 phone numbers. That's the key to fraud. > >"If I spread my usage over a hundred stolen telephone numbers so >there's only ten stolen calls on each number," Friedberg explained, >"it flies under the radar of the programs that the telephone company >is running [to detect fraud]." > >Beyond cloning, the cell tracker could also be used to monitor other >cell phone conversations or even bug a room. To do that, someone >calls the phone number of the cell tracker, then dials a special >code, and the phone in the room never actually rings. The phone's >owner never even knows that someone's called the number, but the >phone can monitor the room's conversation. > >Packed with features as it is, the cell tracker did not actually >steal the phone numbers. > >"In this case," Friedberg said, "the defendant was using another >peripheral device called an ESN reader." > >An ESN reader works by intercepting the phone's unique Electronic >Serial Number, as well as its MIN (Mobile Identification Number) - >in other words, your telephone number. Normally, both numbers are >authenticated at a cell tower, but with an ESN reader someone can >intercept and steal the pair, in a "man-in-the-middle attack." > >The ESN and the MIN are then uploaded to a cloned cell phone. > >"If I took an ESN reader, such as the one that this defendant sold >and put it on this table," Friedberg asserted, "by the end of this >interview, that ESN reader would probably have captured a thousand >stolen numbers." > >Two more > >high tech firsts: intercepting police pages and getting data from >police cruisers Bowitz "sold at least a dozen ESN readers to the >undercover [agent], and they came with pamphlets about how you >program them, how you use them to capture numbers." > >The first email wiretap > >But capturing Bowitz back in 1995 called for groundbreaking >investigative techniques - including the first email wiretap. > >"We basically made it up as we went [along]," Friedberg admitted. >"The Internet service provider that we were dealing with had no >precedent for technically being able to do this, and they actually >had to write software that would create a BBC box, like a blind >carbon copy, so that anything that went in or out of the defendant's >email box would be blind carbon copied to our email box that we then >could access." > >"We did an email wiretap, court-ordered, for eighty-five days, and >[got] over thirteen hundred intercepts. Twenty-four hours a day, >domestically, internationally, around the world, we intercepted them >here," Weaver concluded. > >"It proved to be very fruitful," added Friedberg, "because we could >see who else the defendant was dealing with, in terms of both the >distribution of the phones stateside and the manufacture of the >phones overseas." > >'The most dangerous eavesdropping devices' > >Even though the case is five years old, the cell tracker phone and >ESN reader remain two of the most dangerous eavesdropping devices >smuggled into the country, according to Friedberg and Weaver. > >"I think now there are still very serious attacks on privacy of >communications through a variety of different software and >hardware," Friedberg said. "We're still seeing a lot of very >intrusive illegal eavesdropping devices being marketed, both in >traditional forms and over the Internet." > >This article is based on original reporting by CyberCrime legal >analyst Alex Wellen. > >Continued... >∑ > >Two Eavesdropping Firsts ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= [Non-text portions of this message have been removed] 1343 From: James M. Atkinson, Comm-Eng Date: Sun Aug 27, 2000 7:35pm Subject: Fwd: Two Eavesdropping Firsts > >This is the second part of the article. > >Two Eavesdropping Firsts > > In addition to the Bowitz case, the New York office has seen >landmark high tech cases. Suspects have intercepted police pages and >eavesdropped on information sent to police cruisers. > >Robert Weaver, of the US Secret Service, outlined the case against >Breaking News Network. > >Pager intercepts can be found online, he explained. When linked with >the appropriate software and cabling device, they can allow anyone >with a scanner to see pages. "Connect the scanner to the computer, >and set it to pager frequencies," said Weaver, "in this particular >case, a news agency, Breaking News Network, intercepted the New York >City police and fire departments' [messages]." > >In fact, Fort Lee, New Jersey-based Breaking News Network pled >guilty to intercepting the alpha-numeric text messages in New York >City in 1997. The case was "the first time, in history, that a news >agency pled guilty to eavesdropping on [law enforcement]." > >And while police frequencies are in the public domain, the pager >traffic and text messages are not. > >Then there was the mobile data terminal (MDT) intercept case back in 1998. > >"When [an MDT] is connected to a scanner," explained Weaver, "it >receives and understands and translates the frequency, which are the >police frequencies and fire and emergency service frequencies. It'll >print out on the screen the user ID and the terminal ID of all the >computer terminal transmissions of the police and fire departments." > >Assistant US Attorney Eric Friedberg continued, "a defendant was >capturing from the air a digital stream of information transmitted >from police department headquarters to something called 'mobile data >terminals,' which are the computers that are in police cruisers, and >this was highly sensitive information. Then the scanner was >essentially hooked up with a peripheral device to a laptop and the >laptop software, or the software that was running on the laptop, and >decoded the stream of digital information." > >What sort of digital information? > >"It's your social security number, your date of birth, maybe a >criminal history record," Weaver said. "Certainly it's not to be >displayed on public domain. In this case, it was sold illegally on >the Internet.... We bought it in an undercover capacity." > >"The MDT case was very serious." Friedberg concluded. "I mean that >was a case in which you're taking highly sensitive information [and] >sometimes people's lives depend on that information; you're stealing >it and possibly using it to your own advantage." ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= [Non-text portions of this message have been removed] 1344 From: Richard Thieme Date: Sun Aug 27, 2000 5:01pm Subject: Re: BLack Ice Defender Anti-Virus/Hacker Software At 12:14 AM 08/16/2000 -0700, you wrote: >Black Ice is a nice firewall and AtGuard was also, till it was purchased for >the Norton Internet Security program - (AtGuard was great at blocking out >those annoying adverts). > >Personally I now use Black Ice and ZoneAlarm "both at the same time" * > >Black Ice because of its reliability (and reasonable cost) and Zone Alarm >because its free, and blocks your outgoing ports which Black Ice does not. > >Together and programmed properly (ZoneAlarm, especially) they do make a >formidable team. By "programmed properly," you mean what exactly? I am running Black Ice and downloaded ZoneAlarm and wanted to be sure I knew what you meant before installing it. Thanks. Richard Thieme ThiemeWorks ... professional speaking and business consulting: ThiemeWorks P. O. Box 170737 the impact of computer technology Milwaukee Wisconsin on people in organizations: 53217-8061 helping people stay flexible voice: 414.351.2321 and effective fax: 414.351.5779during times of accelerated change. cell: 414.704.4598 http://www.thiemeworks.com http://www.richardthieme.com - for information on Professional Speaking 1345 From: Ian Carter Date: Sun Aug 27, 2000 10:18pm Subject: Re: Chicago Cruisers Bugged in Internal Probe > Interesting article from APBnews.com today.... BUT, searching both major > Chicago newspapers on-line didn't get any hits on relevent keywords :) > JohnM Cut & Pasted from the following News Report... The officers were in the squadrol when they saw a blinking light under the glove box, Nolan said. Initially, they were "scared to death," thinking the device could be a bomb, he said. http://www.suntimes.com/output/news/cop26.html They found an object marked "vehicle locator device" and a microphone, ........ (LoL)! Best Regards - Ian > Aug. 25, 2000 > > By Richard Zitrin > > CHICAGO (APBnews.com) -- Bugging devices found in police cars in > a city precinct were being used in an internal probe into possible > criminal activity, authorities said today. > > The devices found in patrol cars in the Jefferson Park district > Thursday evening were part of an investigation into specific officers, > police spokesman Pat Camden said. > > "It's no way citywide," Camden told APBnews.com. "It's not a > witch hunt. It's not something being put out there frivolously. It's > something that is the result of allegations of criminal behavior." > > Camden said he's unsure if the officers who uncovered the bugs > are the targets of the investigation. He also said he could not provide > specifics of the probe. .... > > > http://www.apbnews.com/newscenter/breakingnews/2000/08/25/bugs0825_01.html?s > =syn.applet_bugs0825 1346 From: Ian Carter Date: Sun Aug 27, 2000 11:20pm Subject: Re: BLack Ice Defender Anti-Virus/Hacker Software > At 12:14 AM 08/16/2000 -0700, you wrote: > > >Black Ice is a nice firewall and AtGuard was also, till it was purchased for > >the Norton Internet Security program - (AtGuard was great at blocking out > >those annoying adverts). > > > >Personally I now use Black Ice and ZoneAlarm "both at the same time" * > > > >Black Ice because of its reliability (and reasonable cost) and Zone Alarm > >because its free, and blocks your outgoing ports which Black Ice does not. > > > >Together and programmed properly (ZoneAlarm, especially) they do make a > >formidable team. > > By "programmed properly," you mean what exactly? I am running Black Ice and > downloaded ZoneAlarm and wanted to be sure I knew what you meant before > installing it. What I meant by that was BlackIce does not need to be programmed - you simply tell it what threat level you would prefer it to operate under (Paranoid, Nervous Cautious, Trusting). Whereas with Zone Alarm whenever a program on your computer such as your Browser, Email Program, Windows Update, AntiVirus Updates etc etc,, wants to get out it will ask you if you want to allow it (and it will remember this if you want it to) - (BlackIce will allow anything 'out'). The same applies when something wants to 'come in', you must tell ZoneAlarm if you want to allow it. I do like ZoneAlarm but when first installed, if I am working on a report or something and it pops up asking me if I want to allow in or out, this or that, it is so easy to overlook whats happening - one MUST look at what your allowing, as if you say, for example; allow this keylogger program out, always... then whatever you do on your computer could be emailed to any Tom, Dick, or Harry. A couple of pointers here: When you go to install ZoneAlarm (or any other program for that matter) close down everything else by pressing 'ctrl - alt - delete' ONCE. Then 'end task' everything there except explorer. Doing this will prevent a new program conflicting with programs already installed on your system. Then after you install ZoneAlarm (and restart your computer) open up your regular programs one at a time to allow them access to the internet - this way it is easier to see what you want to allow out. (ZoneAlarm will ask you 'if you want' to allow it out). All in all - programming ZoneAlarm is a very simple task,, well worth doing,, and as I have said, my BlackIce and ZoneAlarm work well together. Best Regards - Ian 1347 From: DMI Date: Sun Aug 27, 2000 11:45pm Subject: Re: Practical Joke In Japan Initiates Fears About Virus Attacks On Mobiles Hey James, Your note perked my ears. Can you please share the NEXTEL vulnerability with me and/or the list. Several of my clients use the NEXTEL system for most of their communications. I have talked to my rep at length ref. security, and have always been satisfied with his answers. Thanks, Bill Rust Desperate Measures, Inc. ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Sent: Sunday, August 27, 2000 8:17 PM Subject: [TSCM-L] Practical Joke In Japan Initiates Fears About Virus Attacks On Mobiles [Moderators Note: My favorite cell related security problem comes from the NEXTEL, Omnipoint, and Sprint units and their vulnerability to the Hijack exploitation.] Practical Joke In Japan Initiates Fears About Virus Attacks On Mobiles http://www.zdnet.co.uk/news/2000/31/ns-17205.html Japan's i-mode mobile phones were hit by a bizarre attack Tuesday which security experts warn may be just the first of many security worries for broadband mobile Internet. Hundreds of Japanese i-mode users were stung by a prank which forced phones to dial "110" -- the police emergency telephone number in Japan -- during an online quiz. The Internet quiz about relationships was designed especially for i-mode phones and was configured so that if contestants answered "yes" to a particular question their phones immediately established a connection with the police. According to reports, the police were inundated by 400 fake calls in a single day. A spokesman for NTT DoCoMo -- the Japanese company behind the i-mode standard -- has reportedly blamed the prank on a command hidden within the program running the quiz. The practical joke has triggered concern among security experts that it is just the first of many mobile virus attacks. Jack Clark, European product manager for security firm Network Associates takes it as a sign of things to come. "It demonstrates that malicious people are looking into this," he says. It is already possible for email viruses and worms to find their way onto standard GSM mobile phones through SMS (Short Messaging Service) gateways on the Internet. This was demonstrated during the outbreak of the LoveBug virus and by a worm aimed specifically at Spanish mobile phone users named Timofonica. According to antivirus vendors, Europe's current mobile Internet standard, WAP, does not feature capabilities that could be exploited maliciously. Future generations of European mobile phones based on broader connectivity, using firstly GPRS and eventually UMTS technology will, however, offer far greater functionality which in turn will make them more vulnerable to virus attacks. Clark says that security firms already have one eye on possible security exploits with these technologies. "This [attack] is a glimpse of the future," he warns. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= ------------------------------------------------------------------------------ ------------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 1348 From: James M. Atkinson, Comm-Eng Date: Mon Aug 28, 2000 6:25pm Subject: How Many Programmers does it take... How Many Programmers does it take... Q: Why do programmers always get Christmas and Halloween mixed up? A: Because DEC 25 = OCT 31 Q: Did you hear about the Microsoft crystal ball? A: Ask it something and it replies: "Answer unclear. Add 20 Meg of RAM and ask again later." Q: How many MS engineers does it take to screw in a light bulb? A: None, they just define darkness as an industry standard! Q: Why don't the British build computers? A: Because they can't figure out how to make them leak oil! Q. Somebody asked me "What happens to programmers when they die?" They get deallocated? Their values become undefined? The get re-intialized? Their structues break down? they become WORM food... They start dropping bits........ They branch to a new address! Their social system resources are released? They dump core? [a coredump is the result of an abort()ion] Q. What do you get when you cross 200K of apples and lots of garbage? A. A core dump ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1349 From: Date: Tue Aug 29, 2000 7:09am Subject: Re: BLack Ice Defender Anti-Virus/Hacker Software In a message dated 8/28/00 6:09:05 AM Pacific Daylight Time, saladin@a... writes: > > >Black Ice is a nice firewall and AtGuard was also, till it was purchased > for > > >the Norton Internet Security program - (AtGuard was great at blocking out > > >those annoying adverts). > > > > > >Personally I now use Black Ice and ZoneAlarm "both at the same time" * I believe Zone Alarm has been bought out by a company called ReleaseNow. I could not locate an updated "free" copy on the net a few days ago, when I realized I wanted it updated before purchase was a requirement. It is now between $29.95 - $39.95. Curious in view of Phil Zimmerman's strong and long hold out to remain independent, and the now surfacing reports of "oh, we found a flaw" quite some time after it was integrated and marketed by Network Associates... Actually, I'm considering asking a hacker acquaintance for a copy of his personal program... In the 1998 report "The Risks of Key Recovery, Key Escrow, & Trusted Third Party Encryption," from the Center for Democracy and Technology, key recovery is sited as being very expensive; in their words, "New costs are introduced across a wide range of entities and throughout the lifetime of every system that uses recoverable keys" (p. 24). At least two of the authors of this report are among those demanding access and independent review of Carnivore's souce code. If someone just feels like sharing an old copy of the free Black Ice software, please contact me personally. Thanks. Al 1350 From: James M. Atkinson, Comm-Eng Date: Tue Aug 29, 2000 11:16am Subject: Re: BLack Ice Defender Anti-Virus/Hacker Software Recently I was asked to help out a company where someone was breaking into their machines from outside the company (though a firewall). The first thing I did was set up a packet sniffer (invisible to anybody on the network) to grab everything that floated over the network. I then attached a box to collect network statistics and to probe anything which would permit a SNMP. Next, I attached a laptop with my guardian software running in passive mode to flag any obvious mischief or intruders. I then let the instruments for for two hours to collect a baseline of information. While there were some phantom pings from outside the network, some port scanning, the was also some fairly hostile activity detected. I logged a rouge ftp server with MP3 files found operating inside the firewall. There were also several outside connections and we could actually watch intruders from outside the network downloading highly privileged and confidential files from some of the senior executives computers. After that we located the machines being attacked they were discovered to have Black ICE installed... but the security had not been set high enough to raise an alarm. Even after the threat level was raised to "Paranoid" the software only alerted on less then a 1/10th of the suspect traffic (remember I was logging and analyzing every packet on the network). Up to this point nothing had been done to alert of cut off the intruder while I traced the mischief back to a specific person at a specific computer on the other side of the country (and worked with some security people on his end to preserve the appropriate logs). The security folks on his end arranged to pay the suspect a visit, and to escort him off the property (he got fired). A short time later his connection went dead and the mischief stopped. The point I am trying to make is that BlackICE did not alert on the attack even though the attacker was sucking down tons of highly confidential data, and was attacking multiple machines. For BlackICE or any similar software to be effective you have to install it, configure it, and then test it. Also, security software has to be installed on EVERY machine on a network or an unsecured friendly/trusted machine can be compromised and used as "jumping off point" by an outside attacker. -jma At 9:20 PM -0700 8/27/00, Ian Carter wrote: > > At 12:14 AM 08/16/2000 -0700, you wrote: > > > > >Black Ice is a nice firewall and AtGuard was also, till it was purchased >for > > >the Norton Internet Security program - (AtGuard was great at blocking out > > >those annoying adverts). > > > > > >Personally I now use Black Ice and ZoneAlarm "both at the same time" * > > > > > >Black Ice because of its reliability (and reasonable cost) and Zone Alarm > > >because its free, and blocks your outgoing ports which Black Ice does >not. > > > > > >Together and programmed properly (ZoneAlarm, especially) they do make a > > >formidable team. > > > > By "programmed properly," you mean what exactly? I am running Black Ice >and > > downloaded ZoneAlarm and wanted to be sure I knew what you meant before > > installing it. > >What I meant by that was BlackIce does not need to be programmed - you >simply tell it what threat level you would prefer it to operate under >(Paranoid, Nervous Cautious, Trusting). Whereas with Zone Alarm whenever a >program on your computer such as your Browser, Email Program, Windows >Update, AntiVirus Updates etc etc,, wants to get out it will ask you if you >want to allow it (and it will remember this if you want it to) - (BlackIce >will allow anything 'out'). > >The same applies when something wants to 'come in', you must tell ZoneAlarm >if you want to allow it. > >I do like ZoneAlarm but when first installed, if I am working on a report or >something and it pops up asking me if I want to allow in or out, this or >that, it is so easy to overlook whats happening - one MUST look at what your >allowing, as if you say, for example; allow this keylogger program out, >always... then whatever you do on your computer could be emailed to any Tom, >Dick, or Harry. > >A couple of pointers here: > >When you go to install ZoneAlarm (or any other program for that matter) >close down everything else by pressing 'ctrl - alt - delete' ONCE. Then 'end >task' everything there except explorer. Doing this will prevent a new >program conflicting with programs already installed on your system. > >Then after you install ZoneAlarm (and restart your computer) open up your >regular programs one at a time to allow them access to the internet - this >way it is easier to see what you want to allow out. (ZoneAlarm will ask you >'if you want' to allow it out). > >All in all - programming ZoneAlarm is a very simple task,, well worth >doing,, and as I have said, my BlackIce and ZoneAlarm work well together. > > >Best Regards - Ian > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1351 From: Date: Tue Aug 29, 2000 9:16am Subject: Re: BLack Ice Defender Anti-Virus/Hacker Software In a message dated 8/29/00 9:22:02 AM Pacific Daylight Time, jmatk@tscm.com writes: << Also, security software has to be installed on EVERY machine on a network or an unsecured friendly/trusted machine can be compromised and used as "jumping off point" by an outside attacker. >> That should be a real wake up call! From: James M. Atkinson Date: Sat Aug 25, 2001 7:18pm Subject: Re: Used Piece Wanted At 1:21 PM -0400 8/25/01, Robert Motzer wrote: >Hi List, > >I'm looking for a used Kaiser 1080-H telephone analyzer. If anyone has a >lead on one please contact me off-list at: 1RCM@M... > >Thanks ... Bob Motzer I am interested in used Micro-tel/MA-Com gear, Watkins Johnson stuff (special pieces), TRW Sigint goodies, Xetron, Condor, Sonoma, and EMI/EMC gear, and so on. I am also interested in purchasing used REI, Dektor, Kaiser, TSA, Cooke, bell, an just about any other hard-core TSCM gear, plus manuals, courseware, and related items. I am most interested in "used and abused", defective, and even broken equipment. -jma -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3573 From: gkeenan Date: Sat Aug 25, 2001 11:47am Subject: Re: Fw: TN/LEO - Misc. Hi Charles, Thanks for the info. I'll pass it on along with the links. Over the weekend I'll have a look at those sites myself. Tell the truth, it's got me kinda curious as well; especially since I'm not a pro in this area. I have heard of this before; bombs being accidentally triggered by a signal from another transmitter -- probably because there was no encryption on the receiver to differentiate between the bomber's transmitter and another tuned to the same freq. But I never really was sure just how things like this worked; only very basically since I spent 20 years in the Navy as a telecommunications specialist (I retired in '83, though, so I imagine things have changed somewhat (hehe)). Thanks again! Jerry ----- Original Message ----- From: "Charles P" To: ; "gkeenan" Sent: Saturday, August 25, 2001 2:38 AM Subject: Re: [TSCM-L] Fw: TN/LEO - Misc. > Hi Gerry, > > > > 3574 From: Steve Uhrig Date: Sat Aug 25, 2001 7:55pm Subject: Radios and explosives? Once upon a midnight dreary, gkeenan pondered, weak and weary: > So my question is how close do you have to get to a bomb with > a Motorola HT 1000 transmitting around 150 MHz before it sets > off? As a state licensed explosives shooter with 10 years' experience there, and 160 hours' formal schooling in electroexplosive devices courtesy of Holex and your tax money, I can discuss this with some degree of authority. The answer is: 2.8 feet. Scratch that. Change it to: "It depends". Some bombs will not be affected by any (reasonable) level of RF. Some bombs will trigger with a small amount of RF on the proper frequency barely above the noise floor. Most devices will fall somewhere between these two extremes. A mechanically triggered device may not be affected at all by RF, unless the RF is loud enough and of a suitable frequency to cook the thing, as if it were in a microwave oven. This is not likely. If a device is set to trigger by RF, all bets are off, as you can not know the level of sophistication the bomber has built into the thing. The crudest thing might be a simple receiver, cheap scanner, walkie talkie or some other piece of junk with a wide open front end. These potentially could be susceptible to low levels of RF at any frequency. More likely, the bomber would have something more sophisticated, at a minimum a pager and more typically something more elaborate. There would be nothing to be gained by discussing this in any more detail here and now. When you see the signs in construction areas about turning off two way radios, that is a basic mandatory requirement which largely is a useless effort. A lot of work has been done determining the susceptibility of squibs to RF at different frequencies, power levels, length of "Seminole" wiring (the bright yellow insulated 22 gauge solid conductor zip cord wiring you see) to the squibs, etc. These charts all assume a professional explosives tech is handling the squibs on the construction site. A professional operation will maintain a short on the "bridge wire" of the squib until the instant of firing, as well as many other safety factors. None of these apply to a bomber who does not care about being in compliance with NFPA (National Fire Protection Ass'n) guidelines, safety, or keeping his license. But in reference to the above, very strong RF levels are needed to fire the squibs. A squib, by the way, is a small explosive charge usually electrically triggered by a bridge wire. A bridge wire is a resistive element which heats, instantaneously, when you apply sufficient voltage and current to it. The squib is a low level initiator, used to trigger a high explosive. High explosives must be inititated in stages, starting with something easy to ignite like a squib, then progressing through several intermediate stages, up to the main charge. You can't just light a fuse coming out of a stick of dynamite like in the cartoons. Low frequencies, like amateur shortwave, at high power levels, like many hundreds of watts, at close ranges, were shown in tests to be a potential danger to commercial blasting operations. Higher frequencies, like VHF and UHF public safety, cell phones, etc. were not threats in any normal installation. What happens is the relatively long leads from the firing point to the electric squib in a commercial installation act as antennas. Even though the squib is shorted, it is shorted at the blasting device control panel. This leaves coincident lengths, which of course will be different with each installation, where the leads are resonant at some or another frequency and could couple significant energy into the squib if RF close to that frequency is present. In the real world, for this to happen would require a combination of conditions so complex as to be almost impossible. It is unlikely one of the demolition team members would be operating a high powered amateur radio transmitter in his car in immediate proximity to the Seminole wiring laid out to the squibs. Even were this to be the case, he would have to be at a frequency coincidentally close to resonant with one of the squib lines. Anymore, displaying signs advising of blasting activity and requesting one to turn off two way radios merely tempts burrheads with CB linears to go key down as they drive by the area. Getting back to the question presented, remember basic physics and basic theory which should be instinctive to anyone involved in TSCM, where field strength decreases exponentially with an increase in distance. The well known "inverse square law" is how many of us count on Scanlocks and CPM-700s and the like to detect low powered devices. Double the distance between a transmitter and a receive antenna, and the field strength drops to 1/4 the strength. Quadruple the distance, and the field strength is down to one sixteenth. This holds true whether you go from one foot away to four feet away, or one hundred feet to four hundred feet away. The reverse is also true. Move in closer (halfway) to an unknown transmitter you are sniffing, and the field strength quadruples. This is how a few milliwatt bug can be found by a Scanlock when a many thousand watt transmitter is a few miles away. At some point when you get close enough, the small bug will be louder than the remote high powered transmitter. Move maybe a few inches away, though, and you might lose the bug and pick up the high powered signal. That is not the purpose of this discussion, though. Just laying some foundation. The points with RF around explosive are: 1)Moving an RF source (two way radio, cell phone) a little further away decreases the strength of RF into the suspect device by a much larger amount. 2)Only the most crude explosive devices would be triggered by simple RF. 3)Low frequencies, very unlikely to be used, are far more of a threat than higher frequencies where public service two way communications operate. This may be a bit of a misnomer, as in an IED (Improvised Explosive Device), leads may be shorter and thus closer to resonance and more effective at picking up RF at higher frequencies. Path loss increases as frequency increases though (this means higher frequencies work in our favor). 4)You must specify a number of exact parameters before you can say whether "X" condition is a danger or not. You would have to know the details of the IED, the frequency of the two way radio, the power output, the antenna efficiency, the precise distance from the transmitter's antenna to the IED, whether anything other than atmosphere is between the transmitter and the IED, and a number of other factors. Most of these are unknown. 5)SOP when dealing with any suspected explosive device is to avoid any RF near the thing. The further away the better, the higher the frequency the better. The chances of your two way radio triggering a bomb are slim. However, the chances are not zero. Therefore, avoid using the radio in the vicinity of any suspected device. Moving away a distance from a suspected device before you use your radio gives you a substantially larger safety margin. The gentleman asking the original question, if he is tasked with writing a response plan where lives may hang on his work, should consult an expert in the subject matter, not clowns like us on various lists. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3575 From: James M. Atkinson Date: Sun Aug 26, 2001 8:36am Subject: A former US Air Force sergeant could face the death penalty after being charged with spying. US Arrests Satellite 'Spy' http://www.sky.com/skynews/storytemplate/storytoppic/0,,30200-1027518,00.html A former US Air Force sergeant could face the death penalty after being charged with spying. Brian Regan was arrested http://static.sky.com/images/pictures/1038600.jpg as he tried to board a flight to Europe and is accused of passing damaging national defence secrets to unidentified foreigners. Satellite He had been working as a contract worker for the agency that runs spy satellites. It is claimed Regan passed several 'top secret' documents and aerial photographs from CIA reports, newsletters, and a document relating to satellite capabilities of another country to foreign contacts. His home and office have been searched and encrypted messages, addresses and phone numbers of foreign diplomats confiscated. 'Conspired' Kenneth Melson, attorney for Virginia, said Regan "conspired to transmit classified US national defense information to a person or persons he knew was working for a foreign government with the intent to aid that foreign government and to injure the United States." He refused to say which country or countries Regan, 38, was accused of serving. A hearing next Wednesday will decided whether Regan, a married man with four children, be held pending his trial. If convicted he could face a life sentence or even the death penalty. FBI counter-intelligence agent Robert Hanssen was arrested earlier this year and admitted to spying for Moscow over a period of 20 years. He was accused of selling secrets related to satellites, early warning systems, defense systems and communications. Last Modified: 11:23 UK, Saturday August 25, 2001 -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3576 From: James M. Atkinson Date: Sun Aug 26, 2001 8:34am Subject: Spy 'sold top secrets to Libya' Vol XXIV NO. 159 Sunday 26 August 2001 Spy 'sold top secrets to Libya' http://www.gulf-daily-news.com/Articles.asp?Article=4490&Sn=WORL WASHINGTON: Retired US Air Force sergeant Brian P Regan had access to some of the nation's most sensitive defence secrets, and federal prosecutors allege he took elaborate steps to share that information with a foreign government that a federal source identified as Libya. The FBI capped an investigation of Regan, 38, by arresting him at Washington's Dulles International Airport before he could board a flight to Zurich, Switzerland. According to a government affidavit, FBI agents were watching when Regan, went to his job at a National Reconnaissance Office (NRO) facility in Chantilly, Virginia, earlier on Thursday. Regan's last assignment with the Air Force had been at the NRO, the builder and operator of US spy satellites, whose very existence was an official secret until 1992. In July, Regan returned there as a civilian employee of TRW, a government contractor in Fairfax, Virginia, and his security access was reinstated. According to the affidavit: monitoring Regan's office with a video camera, the FBI watched him log on to Intelink, a classified computer system for the US intelligence community. Regan read a secret document on his computer, taking notes in a small notebook, which he put in his front pants pocket. Later in the morning, while Regan was in a meeting, the FBI searched his minivan and found a bag containing encrypted messages and handwritten notes listing addresses and phone numbers for the diplomatic offices of an unidentified country in Switzerland and Austria. Regan had reservations to fly to Zurich via Frankfurt, Germany. The father of four had told colleagues he and his family were going to Disney World, in Florida. At about 5.30pm, FBI agents stopped Regan as he was trying to pass through an airport security checkpoint. FBI Special Agent Steven A Carr questioned him, and Regan denied knowing about cryptanalysis and coding. But the agents then showed photos of documents found earlier in his bag. "This is my stuff," he said, shortly before he was arrested. In addition to the documents, the affidavit said agents found items in Regan's possession including the small notebook that he had been using in his office, three rubber gloves, a hand-held global positioning system device and a piece of paper in his shoe listing names and addresses in a European country. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3577 From: James M. Atkinson Date: Sun Aug 26, 2001 8:38am Subject: Accused Air Force Spy May Have Been Working for Libya Accused Air Force Spy May Have Been Working for Libya http://www.foxnews.com/story/0,2933,32878,00.html Saturday, August 25, 2001 An artist's rendering of Brian P. Regan appearing before U.S. Magistrate Judge Welton Sewell on Friday in U.S. District Court in Alexandria, Va . http://www.foxnews.com/images/34820/7_21_airforcespy.jpg Federal prosecutors said Friday that retired Air Force Sergeant Brian P. Regan had access to some of the United States' most sensitive defense secrets, and that he shared that information with a foreign government. A federal source identified that government as Libya. The FBI arrested Regan, 38, at Washington's Dulles International Airport Thursday before he could board a flight to Zurich, Switzerland. The bureau had earlier that day watched him go to work at a National Reconnaissance Office facility in Chantilly, Va., earlier Thursday, according to an affidavit released Friday. The NRO - a builder of U.S. spy satellites whose very existence was an official secret until 1992 - was Regan's last assignment with the Air Force. In July, Regan returned there as a civilian employee of TRW, a government contractor in Fairfax, Va., and his security access was reinstated. According to the affidavit, the FBI had been monitoring Regan's office with a video camera and observed him logging on to Intelink, a classified computer system for the U.S. intelligence community. Regan read a secret document on his computer, took notes in a small notebook, and then put the notebook in his front pants pocket. At about 9 a.m Thursday, while Regan was in a meeting, the FBI searched his minivan and found a bag containing encrypted messages and handwritten notes listing addresses and phone numbers for the diplomatic offices of an unidentified country in Switzerland and Austria. Regan had reservations to fly to Zurich via Frankfurt, Germany. A father of four, Reagan had told colleagues he and his family were going to Disney World. At about 5:30 p.m., FBI agents stopped Regan as he was trying to pass through an airport security checkpoint. FBI Special Agent Steven A. Carr questioned him, and Regan denied knowing about cryptanalysis and coding. But the agents then showed photos of documents found earlier in his bag. "This is my stuff," he said, shortly before he was arrested. In addition to the documents, the affidavit said agents found items in Regan's possession including the small notebook that he had been using in his office, three rubber gloves, a hand-held global positioning system device and a piece of paper in his shoe listing names and addresses in a European country. On Friday, Regan had little to say before U.S. Magistrate Judge Welton Sewell in nearby Alexandria, Va. Sporting a goatee and dressed in a striped polo shirt, Regan told the judge in a barely audible voice that he couldn't hire a lawyer. The judge said the court could appoint one. Prosecutors asked that Regan be held without bond on a charge of conspiracy to commit espionage, and a combined detention and preliminary hearing was set for Wednesday. Prosecutors said the maximum sentence on conviction were life in prison or, in certain cases, the death penalty, and a $250,000 fine. Prosecutors would not name the country or countries for which Regan allegedly conspired to spy. But a government source, speaking on condition of anonymity, said one was Libya. The affidavit said Regan was suspected of being the source of a number of classified documents received by an unnamed country. The documents included secret electronic images, a secret CIA intelligence report and a secret document related to a foreign country's satellite capability. It was unclear what interest Libya might have in such material. Private analysts said Libya is chiefly concerned with the military activities of its North African neighbors and U.S. knowledge of Libya's chemical weapons program. A search of Regan's work computer showed that his password had been used to access some of the documents and to access Intelink addresses associated with other documents, authorities said. The affidavit didn't say whether Regan received any compensation for his alleged actions, but did mention he had debts of $53,000 earlier this year. Regan, a native of Brooklyn, N.Y., lives with his wife and children in one of about a half-dozen attached townhouses at the end of a quiet street in suburban Bowie, Md. Regan served in the Air Force from August 1980 until retiring in August 2000 as a master sergeant with a number of military honors. He was trained in cryptanalysis and his responsibilities included administering the Intelink Web site, the affidavit said. The Associated Press contributed to this report -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3578 From: James M. Atkinson Date: Sun Aug 26, 2001 8:37am Subject: Former GI is charged with spying - Codebreaker left Air Force for private contractor Former GI is charged with spying http://www.chicagotribune.com/news/nationworld/chi-0108250166aug25.story?coll=chi%2Dnews%2Dhed Codebreaker left Air Force for private contractor By Naftali Bendavid Washington Bureau Published August 25, 2001 WASHINGTON -- A former U.S. Air Force sergeant was charged Friday with conspiracy to commit espionage, making him the second individual with high-level access to government secrets to be accused of spying this year. Brian Regan, 38, worked at the National Reconnaissance Office, which operates the nation's spy satellites, until last year when he was hired by defense contractor TRW. Regan was arrested Thursday evening at Dulles International Airport outside Washington as he prepared to board a Lufthansa flight to Switzerland. When he was stopped, Regan had a spiral notebook in which officials say he had apparently jotted notes from classified documents. Hidden in his shoe was a piece of paper with names and addresses in Europe, and his carry-on bag contained a handheld "Global Positioning System" device, which officials said can be used to locate specific sites for espionage exchanges. Prosecutors provided only sketchy information about Regan's alleged espionage activities, suggesting that their investigation was continuing. They would not say which countries Regan allegedly spied for, and in court documents they referred only to "Country A" through "Country D." U.S. Atty. Kenneth Melson, the chief prosecutor for Eastern Virginia, spoke briefly to reporters outside the courthouse. "Mr. Regan conspired to transmit classified U.S. national defense information to a person or persons he knew was working for a foreign government, with the intent to aid that foreign government and bring injury to the United States," Melson said, echoing the language of espionage laws. Probe began last fall The arrest came seven weeks after prosecutors reached a plea deal with Robert Hanssen, a longtime agent in the FBI's counterespionage unit who spied for Moscow for 15 years. While two espionage cases in such a short period are an embarrassment for the intelligence community, Regan's alleged activities appear to pale in comparison with Hanssen's. It was last fall that the FBI began investigating Regan, a resident of Bowie, Md., who is married with four children. During his 20-year Air Force career, Regan became an expert in cryptanalysis, or deciphering codes, and he ran a classified Web site called Intelink that was part of a computer network for U.S. intelligence officials. Regan's last posting for the Air Force was at the National Reconnaissance Office, a spy satellite agency whose existence was an official secret until 1992. When he was hired by TRW, Regan was assigned to continue working with the highly secretive office. The FBI focused on Regan after discovering that a batch of classified documents, from secret photographs to CIA papers, had been illegally provided by someone in a sensitive position to an unnamed foreign country. The documents were accompanied by instructions on how to avoid detection by the U.S. government. They also included encrypted messages outlining contact information, including an e-mail address. Suspicious data found The FBI discovered that this e-mail account had been accessed nine times from public libraries in Maryland, investigators said in court papers, and all of those libraries were near Regan's house or on the route between his home and office. FBI agents also searched Regan's computer at the National Reconnaissance Office, allegedly turning up suspicious information. For example, someone using Regan's password had allegedly accessed the same documents that had found their way to the unnamed foreign country. In addition, agents found misspellings on Regan's computer that allegedly coincided with those in the messages that had been sent to the foreign country. When FBI agents began conducting surveillance on Regan, they said in court papers, they began observing mysterious cloak-and-dagger behavior on the part of the former military man. "FBI agents have observed Regan conducting what appear to be surveillance detection runs, that is, conducting multiple U-turns, pulling over to the side of the road, and appearing to be checking to see whether he is under surveillance," the FBI said. The investigation came to a head Thursday, when Regan was allegedly planning to fly to Zurich via Frankfurt, Germany. That day, the FBI conducted surveillance on Regan in his office via closed-circuit TV. They allegedly saw him looking at secret documents on his computer and then jotting notes in a small notebook. Regan allegedly did not tell his employer, TRW, that he planned to leave the country that day, as required by his security clearances. Instead, he told a co-worker he was driving to Orlando to take his family to Disney World, and even scrawled "Orlando, Florida" on a board in his office to indicate where he would be. When Regan arrived at Dulles at 5:30, he was approached by FBI agents while passing through a security checkpoint. In addition to several encrypted messages, Regan was allegedly carrying five blank business envelopes, three rubber gloves and four finger-sleeves, which could be used for clandestine activities. `This is my stuff' When questioned by agent Steven Carr, Regan allegedly denied knowing anything about cryptanalysis and coding. But when he was shown photos of code-related documents that had been seized from his carry-on bag, Regan acknowledged, "This is my stuff." In contrast to Hanssen's 15-year spying spree, which included providing sensitive documents that led to the execution of two double agents, Regan is suspected of turning over a few documents that were mostly available on a Web site, albeit a classified one. Also, while Hanssen received $1.4 million in cash and jewelry, court papers cite no evidence that Regan received any money, though they did note that he had debts of $53,000. Still, more information could emerge on the Regan case. Regan appeared in court in Alexandria, Va., Friday afternoon. Magistrate Judge Welton Sewell told Regan he would receive a court-appointed lawyer and then ordered him held without bond. Copyright C 2001, Chicago Tribune -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3579 From: James M. Atkinson Date: Sun Aug 26, 2001 8:41am Subject: Regan Spy Case Chronology Spy Case Chronology http://www.guardian.co.uk/breakingnews/US/0,3560,1129514,00.html Saturday August 25, 2001 8:10 pm Events leading up to the arrest of retired Air Force master sergeant Brian P. Regan, who was arrested Thursday and charged Friday with conspiring to commit espionage. An FBI affidavit says: 2000: August: Regan retires from the Air Force, gives up his high-level security clearance and his access to Intelink, a classified computer system for the U.S. intelligence community. His last assignment had been at the National Reconnaissance Office, the builder and operator of U.S. spy satellites. October: Regan Goes to work for military contractor TRW Inc., in Fairfax, Va. Fall: U.S. officials learn that a nation - identified as Country A in the affidavit and said to be Libya by a government source - had received classified U.S. national defense documents. They include electronic images taken by satellites, a CIA intelligence report and a secret document related to a foreign country's satellite capability. Country A also received messages with details on how to communicate without being detected by the U.S. government; an offer to provide more classified information; and instructions to send responses to an e-mail address on a free e-mail service. That e-mail account had been set up under the name ``Steven Jacobs'' on Aug. 3, 2000. The account was accessed nine times between August 2000 and January 2001 from computers at public libraries, most of them in Maryland near Regan's home. 2001: April: Investigators search Regan's former office and computer at the NRO in Chantilly, Va. They find that Regan's password was used to access many of the documents received by Country A. A search of electronic records shows that on the same day that Regan accessed a copy of a CIA report, he flew to Iceland and then to countries in Europe. June: FBI agents begin watching Regan. Also this month, Regan uses the Internet at a public library but does not sign off the computer. That allows the agents watching him to find out which Web sites he visited. One site contained the address for the diplomatic office of an unidentified country in Switzerland. On June 21, Regan sends an e-mail from an account in his own name to his wife. The e-mail includes encryption information that is similar to the technique used in encrypted documents received by Country A. Five days later, Regan flies to Munich, Germany. The FBI searches his checked suitcase and finds glue and packing tape. July: Regan is assigned to work at the NRO for his company as a civilian. His security clearance is reinstated. Aug. 23: FBI agents monitoring Regan's NRO office with a video camera watch him log on to Intelink to read a secret document. Reagan takes notes in a small notebook, which he puts in his front pants pocket. At about 9 a.m., while Regan is in a meeting, the FBI searches his minivan. Agents find a bag containing encrypted messages and handwritten notes listing addresses and phone numbers for the diplomatic offices of an unidentified country in Switzerland and Austria. In a suitcase, they find a bottle of Elmer's glue and role of tape. Regan had reservations to fly to Zurich, Switzerland, via Frankfurt, Germany. The father of four tells a co-worker he and his family are driving to Disney World. He writes ``Orlando, Florida'' on a board in his office suite to show where he would be while off. At about 1 p.m., Regan arrives at Dulles International Airport near Washington. He checks his suitcase, which is later taken by the FBI. But Regan is bumped to a later flight. He returns to the NRO for a few hours and later goes back to the airport. At about 5:30 p.m., FBI agents stop Regan as he was trying to pass through an airport security checkpoint. FBI Special Agent Steven A. Carr questions him, and Regan denies knowing about cryptanalysis and coding. The agents then show him photos of documents found earlier in his bag. ``This is my stuff,'' Regan says, shortly before he is arrested. The agents find in Regan's possession: the small notebook that he had been using in his office, three rubber gloves, a hand-held global positioning system device and a piece of paper in his shoe listing names and addresses in a European country. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3580 From: James M. Atkinson Date: Sun Aug 26, 2001 8:42am Subject: Article from German c't magazine. http://www.heise.de/ct/english/99/04/174/ Article from German c't magazine. English translation by Eva Wolfram. PRICKED EARS by Stefan Krempl, Michael Schmidt, J¸rgen Kuri Bugging operations on data lines and computers are a profitable business 'Telekom - die machen das' (Telekom - they do it) has been on TV screens all over Germany. But it's not only German Telekom who do it - in many cases, there are more parties involved in data transmission. Uninvited guests hope for confidential and economically exploitable information when listening in on data lines and computer systems. In the business world, industrial espionage has always been a part of everyday life. And the modern means of communication as well as the booming Internet have also made individual users the targets of snoopers. Although a home user's AOL password or home banking data will be of little interest to industrial spies, simply accessing a company network via Telekom from home can enable competitors to start snooping around. And in industrial espionage, whatever seems imaginable will also be put into practice. What many people may consider to be far-fetched conspiration theories is unfortunately very real in this area. The more important research and development become for a company in a 'knowledge-based' economy, the more will the value of ideas and lab results increase in its competitors' eyes. The increasing importance of know-how correlates with the increasing use of computer technology in industry: Monitors and computers can be found in any office and are interconnected, telephones and fax machines incorporate chips and are controlled through software like all other communications devices. More electronic company devices mean better possibilities for increasingly inconspicuous bugging operations as business technology is bound to have its weaknesses somewhere. There are no exact figures describing the unlawful distortion of competition. 'Industrial espionage is a very dark area', says Michael Dickopf, media spokesman for the German Bundesamt für Sicherheit in der Informationstechnik (federal office for the security in information technology, BSI). Every now and again, we find reports with examples of the damage snoopers do in the media. In 1986, for example, the German Bundesamt fuer Verfassungsschutz (federal office responsible for defending the constitution) is said to have already estimated annual losses of up to DM 20 billion for the German economy (Manfred Fink, Lauschziel Wirtschaft, Abhörgefahren und -techniken, Vorbeugen und Abwehr, Stuttgart 1996, http://www.fink-consulting.de/lausch.htm). The American Society for Industrial Security's (ASIS) investigation for the U.S. even resulted in a damage of about US$ 515 billions for the year 1996. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3581 From: James M. Atkinson Date: Sun Aug 26, 2001 8:43am Subject: Espionage -- How France Listens to the Whole World Paris Weekly Details French Electronic 'Espionnage' Abilities EUP20010406000153 Paris Le Nouvel Observateur (Internet Version-WWW) in French 05 Apr 01 [Article by Vincent Jauvert: "Espionage -- How France Listens to the Whole World"] [FBIS Translated Text] It is one of the largest tapping centers in the world. At this secret base protected by watchtowers, police dogs and electrified barbed wire, 13 immense parabolic antennas spy day and night on all the international communications transiting through the satellites they monitor. Where is this base whose photo Le Nouvel Observateur has published here? In the United States? In Russia? No, in the Perigord region, on the Domme plateau, next to Sarlat airport. The site is officially (and modestly) referred to as the "radio center." Here, the French spy service, the DGSE [General Directorate for External Security], monitors hundreds of thousands -- millions? -- of telephone calls, e-mails, files, and faxes on a daily basis. This is the main site for the French Republic's "big ears." It is not the only one. Like the United States and the English- speaking countries with close ties to it, France has over the past ten years set up a global interception network. Le Nouvel Observateur can confirm the existence -- and publish photos -- of three other DGSE "satellite" tapping bases. One -- code- named "Fregate" -- is hidden in the Guyanese forest, at the heart of the Kourou space center. The other, completed in 1998, is attached to the side of the Dziani Dzaha crater on the French island of Mayotte in the Indian Ocean. Both are managed jointly with the BND (Bundesnachrichtendienst), the German secret service. The third center is located in the western suburbs of Paris, on the Orgeval plateau, at Alluets-le-Roi. A total of about 30 antennas "cover" nearly the entire globe, with the exception of the Siberian North and a part of the Pacific. There will soon be other stations. Expanding its "satellite" tapping network is one of the DGSE's "priorities," the rapporteur for the 2001 defense budget, Jean-Michel Boucheron, writes. The French secret service has more resources available every year for this purpose. A new station is being built on the Albion plateau, where nuclear missiles were stored before the silos were dismantled; a fifth is planned for the Tontouta naval air base in New Caledonia. Of course, this network is -- and will remain -- much less powerful and efficient than the US system on which it is modeled, one which has often been discussed in recent months and is commonly referred to as "Echelon." The American NSA [National Security Agency] is 30 times richer than its French counterpart, the technical directorate of the DGSE. The former employs 38,000 people, the latter 1,600. The smaller Frenchelon," as the Americans and their partners call it, is no less of a threat to privacy. Including that of the French. Here is why: When they are transmitted by one of the satellites monitored by the Domme, Kourou, or Mayotte bases, our communications with other countries or the DOM-TOM [French Overseas Dominions and Territories] may be intercepted, copied, and disseminated by the DGSE, without any monitoring commission having any say in the matter. None! A situation that is unique in the West. Every democratic country that has equipped itself with satellite tapping services has set up safeguards -- laws and monitoring bodies -- to protect its citizens from the curiosity of the "big ears." Every one, led by Germany and the United States. But not France. Nonetheless, our country has been spying on communications satellites for 30 years. The SDECE [Foreign Intelligence and Counterintelligence Service] set up its first parabolic antenna at Domme, at the site of a small radio interception center, in 1974. The antenna measured 25 centimeters in diameter and still exists. Another followed soon afterwards. "At the beginning, there were only a few satellites, the Intelsats," explains a veteran of the technical directorate. "We were able to 'suck up' a large portion of international traffic." However, in 1980, as the explosion in global telephony began, more and more satellites were put into orbit: Eutelsat, Molniya, Inmarsat, Panamsat, Arabsat. "We were quickly overwhelmed," recounts a former senior official. "The Domme center found itself under-equipped, ridiculous -- and we at the DGSE were a laughingstock for our American and British colleagues." In 1984, the head of the secret service, Admiral Lacoste, pressed Francois Mitterrand: "We need another interception station." France, he claimed, had an ideal site for this type of operation: the Kourou space center. Ideal? It was located very near the Equator, that is, in the best possible spot for listening in on communications satellites, nearly all of which are geostationary. The base would be located a few kilometers from the Ariane launching pad, meaning that its antennas would not attract attention. And moreover, economic espionage was the French secret service's new priority, and the United States its main target. And the satellites "covering" the United States were in orbit precisely above Guyana. To share the costs and reinforce the Franco-German alliance, Lacoste proposed bringing the BND into the adventure. The joint effort would be all the easier, the admiral explained, because the two services were already working together closely in interception stations in West Berlin and elsewhere in the FRG. The president gave the go-ahead in late 1984. The Rainbow Warrior [Greenpeace ship sunk by the DGSE in New Zealand] scandal, which arose a few months later, delayed the operation. The "Fregate" base would be inaugurated secretly in 1990 by Claude Silberzahn, the new director of the DGSE, and his German counterpart. Silberzahn wanted to go even farther. In his view, to reclaim its place among the major players, the DGSE needed new stations. The Gulf War gave him new arguments. American spies' technical exploits in Iraq were breathtaking. Francois Mitterrand and Prime Minister Michel Rocard were convinced. Silberzahn was authorized to launch a wide-ranging ten-year investment plan. He modernized the Domme center, bought a Cray supercomputer, and had the first parabolic antennas installed at Alluets-le-Roi, at a base previously reserved for the interception of radio waves. Finally, with the BND, he launched the site on Mayotte. This French territory in the Comoros archipelago is also close to the Equator. The tapping center would be located on Petite-Terre, a miniscule island where the Foreign Legion already had a base. From Mayotte, the DGSE's technical directorate could better "cover" Africa, the Middle East, and Asia, the up-and-coming continent. Completing the project would take five years. Sordid stories of cheated-on husbands are said to have slowed down the work. Today, the Republic's "big ears" have, as we have already said, 30 antennas on three continents. These mobile antennas can change direction several times a day, depending on the schedule or objectives of the service. All countries are subject to tapping, even allies. Member countries of the European Union too? "Of course," says the official. "Thanks to these satellites, we can spy on everyone where they live. No crazy plots, no risk of diplomatic incidents. This is why we invested so much." Which satellites are priority targets? "The ones that can provide us with the most political and economic information," says an expert. The Inmarsats, for example. Thanks to these satellites, anyone can telephone or send an e-mail or fax to (almost) anywhere on earth. All it takes is a little suitcase weighing two kilos. At its beginnings in 1982, subscribers to this service were mainly professional sailors and oil companies. Then the customer base expanded to include wealthy yachtsmen. "What a windfall for economic espionage! You cannot imagine the things these businessmen say 'in clear' over their boat telephones," a specialist explains. "They think they are safe in the middle of the ocean. They talk about contracts, projects, discoveries." And that is not all. The Inmarsat company has signed contracts with most major airlines and 650 business aircraft. When a passenger makes a telephone call in flight, it transits via one of these satellites ... to the satisfaction of the "big ears." Inmarsat is also used on the ground, most often in the earth's "hot spots," where telephone equipment is poor. The company has a total of 200,000 subscribers: journalists, diplomats, international civil servants, NGO officials, etc. "No very powerful computer is necessary to spy on this choice clientele," says an expert. "A maximum of 2,000 messages pass through an Inmarsat satellite simultaneously. This is ten to 50 times fewer than for the others." The others are the giants of global telephony: Intelsat, Eutelsat, PanAmSat. Several billion messages from every continent transit via these satellites every day. "It is impossible to ignore them," says an expert, "but difficult to process them as a whole. We have to choose the segments of the beam that interest us." And in particular, to identify the channels leased by the military, diplomats, or companies. Some companies use a new, inexpensive service known as VSAT: This network enables them to keep all their establishments throughout the world connected on a permanent basis. In Domme and Kourou, the DGSE "sucks up" traffic from Intelsat 801, which provides thousands of VSAT links between America and Europe. The big satellites also transmit the Internet. They have become highways -- backbones -- for the Web. Says one specialist, "10 percent of the traffic passes through them. This is not much, but we can intercept this 10 percent: The rest, which transits via optic fiber cables, is something else." Staff at the Mayotte center are impatiently awaiting the new Intelsat 902, which within a few months will be furnishing "backbones" in Africa, in Asia, and part of Russia. It will be positioned at 62 degrees east, just above the French island in the Indian Ocean. Other types of satellites targeted: Regional satellites, which "cover" only a portion of the planet. Like the Arabsats for the Middle East and North Africa. "Ah, the Arabsats!" sighs a former listener." "The information they provided us in the 1980s! On Qadafi during the Chad conflict or on Israel during the invasion of South Lebanon." Finally, there are the national satellites. Some countries are too poor and too large to set up a network of telephone cables throughout their territory. For internal communications, they use satellites: the Raduga in Russia, the Mabuhay in the Philippines, or the Dong Fang Hong in China. But the increase in the number of satellite operators -- there are more than 100 today! -- poses a problem for the DGSE. "Each one codes its beam and does not make the code for deciphering it public," says a former official. Obtaining the key requires all the secret service's resources. "Several methods exist, not all of them 'clean'," the expert continues. "You can negotiate with the operator. You say: 'France will give you part of its international traffic; in exchange, you give us this confidential protocol'." Another technique: "Bribe a company executive or promise him a medal." Yet another: "If you learn that a foreign secret service has this software, trade it for something else." You can also discreetly enter the operator's facility and steal the precious diskette. "The DGSE has a division that is very good at this type of burglary," says the expert. There remains the homemade solution: Discover the code yourself. "But that can take a long time. In the meantime, you miss a lot of things." For several months, one satellite has been a particular thorn in the side of French secret service engineers. It is Thuraya, launched last October by an Abu Dhabi company that offered its subscribers total coverage of mobile telephony in the Arab world. Its service will be operational in April. Its customers: senior Syrian officials, Libyan businessmen, Egyptian military officers. So many targets for the DGSE. "There is a catch," says the expert. "The Emirates are financing the operation, but Hughes, the American aerospace giant, is managing the system. And as concerns codes for the beam, Hughes knows a whole range of them. We have not yet found a solution." With greater or lesser difficulty, dozens of beams are thus sucked up every day by the DGSE's parabolic antennas. What happens afterwards? In cellars at the bases of these antennas, technicians and operators with "defense secrecy" clearance work in air- conditioned computer rooms. Grouped into day and night teams, some 200 work at Domme and Alluets-le-Roi, 40 or so at Mayotte and Kourou. The technicians scurry around in front of electronic control panels. They control the powerful equipment (amplifiers, demodulators, analyzers, decoders) that transforms satellite beams into faxes, e-mail, files, or voice messages. Their primary concern: deciphering encrypted communications, which is becoming more and more difficult. The operators, meanwhile, are seated in front of computer consoles. They check the automatic sorting of traffic. Only a few thousand intercepted messages reach secret service HQ on Boulevard Mortier in Paris each day. They are sent by optical fibers or protected radio links. The rest, the great majority, are thrown into an electronic trashcan. Selection is conducted on the basis of a dictionary of addresses and key words. "Addresses?" These are telephone numbers and e-mail addresses that the DGSE monitors constantly. Those of embassies, ministries, international organizations, NGOs, multinational companies -- the computer of the "big ears" holds several thousand from all over the world. When one of these addresses appears in the beam of a satellite being spied on, the communication is automatically recorded and sent to Paris. This type of surveillance has a name in tapping jargon: "routine." Key words? Another method of filtering flows of data. "A key word can be a proper name, a nickname, a chemical formula, a slang term, or an acronym," an expert explains. "We enter them into a file and wait." When one of these words appears, the computer goes into reverse and records the communication from the beginning. At the DGSE, this practice is known as "standby" or "trawling." "For e-mails, this computer sorting is very efficient," says another specialist. He adds: "Given the computers' capacities, we can in this way filter several million electronic messages a minute. A good search engine is all it takes. We need simply adapt it to our needs." It seems highly like that the DGSE uses the search tool developed by Lexiquest, a French company. When it comes to faxes, the sorting process is less efficient. Experts estimate the success rate at no more than 60 percent. Why so many failures? Because the computer does not "read" the fax directly. It must first be converted into bits by a character recognition program. If this phase is disrupted by transfer problems or illegible handwriting, the retranscribed fax will not make sense. It is lost to the "big ears." Despite these difficulties, the DGSE has always been one of the best spy services as concerns automatic processing of faxes -- hence its success in economic espionage. The situation is entirely different as regards speech. The DGSE has not developed techniques as effective as those of the NSA or Israel's Mossad. One expert confides, "Contrary to popular belief, it is very difficult to teach a computer to catch key words spoken during a telephone conversation 'on the fly'." Explanation: "Some people speak quickly, others slowly, some stammer, others have an accent. Result: The failure rate is very high." The French service is studying another sorting method that the Americans and Israelis have already developed: automatic transcription. The computer transcribes the entire telephone conversation, then a search engine finds the key words in the file that has thus been constituted. "Strange as it may seem, it is simpler to proceed like this." The Defense Ministry has just asked the best French speech processing laboratory, the Limsi in Orsay, to develop software for this purpose. After sorting comes listening. At the DGSE, several hundred people -- 300, 500? -- spend their days wearing headphones. "Keeping in mind that a good professional can process 50 to 100 conversations a day, you do the math!" says a veteran. The total is more than 15,000 a day or at least 5 million a year. Is the game worth the candle? This mass of information -- these millions of intercepted conversations, e-mails, or faxes -- is it really useful? The unanimous opinion is that "pearls," bits of secret information worthy of being transmitted to levels as high as that of the president of the Republic, are very rare. "A few dozen in the space of 20 years," says the former senior official. "And even then..." There were the cases, already cited, of Qadafi and Israel in the 1980s. Later, instructions for voting in the UN Security Council were intercepted. Recently, recordings of senior Serbian dignitaries have been transmitted to the Elysee [president's residence]. In fact, the real "gems" have other clients: several large French industrial groups. For two decades, the DGSE has been working in symbiosis with some 15 private or public firms. Between spies and bosses, it is a matter of give and take. The former provide economic and technological intelligence (the DGSE's specialized research service employs about 50 people). The latter furnish cover stories for agents on missions abroad. Former DGSE staffers who have been recruited by the firms involved serve as liaisons. At their former employer's HQ on Boulevard Mortier, they regularly take delivery of copies of faxes, e-mails, or draft contracts intercepted by tapping stations. The yield is sometimes excellent. "We often receive thanks from bosses," says the senior official. In 1998, the "big ears" enabled the French industrialists concerned to follow developments in a set of crucial negotiations on the merger -- which fell through in the end -- of German aerospace manufacturer Dasa and its British counterpart, British Aerospace. But there are not just "pearls," far from it. There is the rest of the work, the everyday routine, these thousands of reports of interceptions, "raw" reports as they are referred to at the DGSE, which pile up in the analysis department and are not always read. "For one good piece of information, there is so much useless bla-bla," says a secret service manager. "I wonder if all this is worth it." Many would prefer to see the DGSE invest in human intelligence services rather than technical systems. "With the fortunes we spend every year, we could set up so many agents abroad. After all, that is our real job." Threat to privacy? Without a doubt. Some of the millions of communications tapped could be yours. The risk is even higher if you call a region with few cable connections, like Africa, Russia, or the DOM-TOMs. Nothing prohibits the DGSE from intercepting your conversations or e-mails if they are transmitted by satellite. Worse, this type of espionage is implicitly authorized by a 1991 law establishing the Commission on Monitoring of Wiretaps. Article 20 of this law indeed stipulates that it is not within the powers of this new commission to monitor "measures taken by the public authorities to (...) monitor (...) transmissions via hertzian channels [Le Nouvel Observateur editor's note: That is, via the airwaves]." In other words, the body may monitor everything except "satellite" taps. "This exception was demanded by the highest state authorities," confides a former advisor to then Defense Minister Pierre Joxe. "Why? You may remember that at that time, the DGSE was launching a wide-ranging plan to modernize its 'big ears.' Compromising it was out of the question." A former Elysee staffer: "We wanted to give the secret service a free hand, not enclose it in a quota of authorized taps." The members of parliament could not make head nor tail of it. They should have been more curious. They would have learned that many democratic countries had already rigorously regulated the activities of their "big ears." In Germany, eight independent experts appointed by the parliament have monitored the BND's wiretapping activities since 1968; they constitute the "G10" commission. They have considerable power. They can interrogate all employees of the BND and view the entire tap production process. "The objective: to protect Germans' privacy," according to Professor Claus Arndt, who served on this commission from 1968 to 1999. When, during random sorting, the name of a German citizen or company appears, the BND must erase it, barring the express consent of the commission. "By the same token," says Professor Arndt, "the secret service must submit the entire list of key words it intends to use. It is not allowed to include the name of a German." By next June, a law should allow super-inspectors to visit any of the German secret service's sites, including the Kourou station. If France refuses to allow this, the president of the commission could call for the BND's withdrawal from the Guyanese base. In Australia, the "big ears" are under the surveillance of an inspector general designated by the government. He has the power to verify that the DSD, the espionage service, applies highly restrictive laws. For example, any information about an Australian collected by tapping stations must be destroyed. A destruction report must even be submitted to the inspector general. In Canada, a commissioner designated by the parliament is responsible for this task of monitoring. Each year, he drafts a public report. In the United States, the NSA's activities are monitored by an inspector general and the US attorney general. When will France follow suit? In recent months, members of Parliament have taken an interest in "big ears" ... belonging to the Americans. The Defense Commission recently issued a spiteful report about "Echelon" and the NSA (footnote: On the subject of Echelon, see "Global Electronic Surveillance," by Duncan Campbell, Allia Publishing). It is time for it also to study the practices of the DGSE and propose ways of monitoring them. This is an opportune time. A revolution in "tapping" is on the way. The secret service is planning to invest massively in interception of undersea cables. Before plunging into this adventure, could it not be subjected to a few democratic rules? [Description of Source: Paris Le Nouvel Observateur (Internet Version-WWW) in French -- left-of-center weekly magazine featuring domestic and international political news] -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3582 From: Marcelrf-iDEN Mobile Date: Sat Aug 25, 2001 8:37pm Subject: MAFIA Uses Nextel Phones- "Sammy The Bull" on Nextel- "How Business Gets Done Mafia Style" Bada-Bing Bada-Boom! CALEA At Work........ MAFIA Uses Nextel Phones- "Sammy The Bull" on Nextel- "How Business Gets Done Mafia Style" August 17, 2001 -- In the goofy world of the modern-day Mafia, a flexed biceps is worth a thousand words. Court documents unsealed yesterday reveal that Salvatore "Sammy Bull" Gravano - who pleaded guilty in May to running an Arizona "ecstasy" syndicate - has adopted nonverbal communication skills to keep his underlings in line. Brooklyn federal prosecutor Linda Lacewell wrote in a presentencing letter that after Gravano and his drug-ring lieutenant, Michael Papa, were busted on Arizona state charges of peddling millions of the mind-bending pills, they ran into each other in the hallway of a courthouse. "Papa saw Gravano in the [court] hallway," Lacewell wrote. "Gravano flexed his arm [indicating that Papa should 'be strong'] and winked at Papa." Later, abandoning nuance, Gravano allegedly had someone call Papa with a more direct message. Last April, prosecutors charge, Papa received a phone call "warning him that if he spoke [to authorities] about Gravano, the caller would 'chop [his] head off.'" Gravano's entreaties fell on deaf ears - Papa became a cooperating witness, anyway. It brought to an end a unique mob mentoring program born in the arid desert plains of Phoenix. During the formation of what Gravano called his "Arizona Mafia," the pugnacious Gambino hit man "schooled his underlings as to how to evade detection by law enforcement," Lacewell wrote. "For example, Gravano told the younger members not to carry drugs and large amounts of cash at the same time (in case of an encounter with law-enforcement officers) and not to conduct drug transactions in the same place (in case of surveillance)," according to the presentencing letter. But bad information will hamper even the best mob mentoring program."Gravano handed out Nextel brand cellular phones and told his underlings, incorrectly, that these telephones could not be wiretapped," Lacewell wrote. -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 3583 From: DrPepper Date: Sun Aug 26, 2001 9:27am Subject: Re: Espionage -- How France Listens to the Whole World This is an interesting article. My question is, , , Why would anyone think that the French government would have any restrictions against listening to it citizens? They are, after all , , , A SOCIALIST Government. A perfect example of what can happen when the people choose safety and protection over freedom. Actually, they have neither one. -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ============================================= "James M. Atkinson" wrote: > Paris Weekly Details French Electronic 'Espionnage' Abilities > > EUP20010406000153 Paris Le Nouvel Observateur (Internet Version-WWW) > in French 05 Apr 01 > > [Article by Vincent Jauvert: "Espionage -- How France Listens to the > ------------ major snippy de deee ------------------------------ > > DOM-TOM [French Overseas Dominions and Territories] may be > intercepted, copied, and disseminated by the DGSE, without any > monitoring commission having any say in the matter. None! A > situation that is unique in the West. > > Every democratic country that has equipped itself with satellite > tapping services has set up safeguards -- laws and monitoring > bodies -- to protect its citizens from the curiosity of the "big > ears." Every one, led by Germany and the United States. But not > France. > [Non-text portions of this message have been removed] 3584 From: Aimee Farr Date: Sun Aug 26, 2001 1:03pm Subject: RE: Espionage -- How France Listens to the Whole World Which reminds me.... "This transmission is confidential and intended for the named recipient. If made for the purpose of obtaining legal advice or preparing for legal proceedings, legal privilege will be claimed. If you are not the named recipient, any review, dissemination, distribution or copying of this communication is prohibited. If you received this transmission in error, please contact me immediately for instructions." I've been trying to track down the lawyer that came up with that crap, and arrest him as part of a spy plot for the longest. Leave it to lawyers to come up with, and propagate boilerplate confidentiality disclaimers so as to CYA while increasing the chances of interception and snooping. Moral: When a lawyer sees a problem, rather than fix it, we throw words at it. *shakes head* ~Aimee 3585 From: Steve Uhrig Date: Sun Aug 26, 2001 3:10pm Subject: Email and fax disclaimers > If you are not the named recipient, any review, dissemination, > distribution or copying of this communication is prohibited. > If you received this transmission in error, please contact me > immediately for instructions." The people who add these nonsense disclaimers to their emails and faxes have overblown egos. Such prattle is a waste of bandwidth, useless and worthless. Anyone appending this kind of garbage to their emails (especially) and faxes, permanently brands themselves in my mind as someone who thinks what they have to say is a lot more important than anyone else would think it was. Yeah. You sent this email on the web. I read it by mistake. I will instantly delete it, send you a certified letter saying I accidentally read it, cancel all my appointments and wait for your instructions on what to do, agree to make a series of appointments with a psychologist and take a series of hypnotic drugs to purge any memory of your secret squirrel critically important message from my mind, and hire a lawyer to defend me from the mayhem that certainly will come my way as a result of the legal action you will take against me because I profited from accidentally reading your misdirected fax or email. Yeah. We all know your communications are life and death critical, and nations can topple if they would fall into the wrong hands. You are important. Your communications are so vital you have to waste bandwidth and my time and storage with all these warnings and disclaimers. Get real. Sign your name, use an accepted email signature, and leave it at that. Forget all this crap you copied from someone who copied it from someone else who copied it from yet another someone else, and which none of you understand, but makes you feel warm and wet. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3586 From: sebastien rittner Date: Sun Aug 26, 2001 4:08pm Subject: RE: Espionage -- How France Listens to the Whole World >How France Listens to the Whole World Does anyone can honestly tell me he believes, in a good faith, the NSA or other US agency does not use its power against its own civilians sometimes? If you THINK no, you've got to open your eyes. If you only SAY no, you've got to look at yourself in the mirror and watch your body language. Let's be honest... ===== email : sebastien@t... web : www.tscm-technician.net voicemail : (510)-496-2740 x2159 __________________________________________________ Do You Yahoo!? Make international calls for as low as $.04/minute with Yahoo! Messenger http://phonecard.yahoo.com/ 3587 From: Aimee Farr Date: Sun Aug 26, 2001 5:35pm Subject: RE: Email and fax disclaimers > Forget all this crap you copied from someone who copied it > from someone else who copied it from yet another someone else, > and which none of you understand, but makes you feel warm and > wet. Hold on a minute... that's the practice of law. Riddle: What's above a confidentiality email disclaimer on a PI mailing list? ~Aimee Mors et vita in manibus lingue. 3588 From: Steve Uhrig Date: Sun Aug 26, 2001 6:54pm Subject: RE: Email and fax disclaimers On Sunday 26 Aug 2001, the heroic and fearless Aimee Farr took time off from slaying several thousand ferocious Mongolian tribesmen employed as opposing counsel to post : > > Forget all this crap you copied from someone who copied it from > > someone else who copied it from yet another someone else, and > > which none of you understand, but makes you feel warm and wet. > Riddle: What's above a confidentiality email disclaimer on a PI > mailing list? Answer #1: A quote of all the last month's messages in one long 500K digest, ending with my verbiage on confidentiality disclaimers, also including all the headers, list footers, list ads and other garbage, with the sender of the message adding "me too". Answer #2: Same as above, except with the sender mailing to the list "unsubscribe". Steve 3589 From: Aimee Farr Date: Sun Aug 26, 2001 11:25pm Subject: RE: RE: Email and fax disclaimers > > Riddle: What's above a confidentiality email disclaimer on a PI > > mailing list? Steve wrote: > Answer #1: > > A quote of all the last month's messages in one long 500K > digest, ending with my verbiage on confidentiality disclaimers, > also including all the headers, list footers, list ads and other > garbage, with the sender of the message adding "me too". > > Answer #2: > > Same as above, except with the sender mailing to the list > "unsubscribe". Good answers, Steve. :-D ANSWER: _Something that used to be confidential_. ~Aimee 3590 From: James M. Atkinson Date: Mon Aug 27, 2001 10:04am Subject: Justice Department slams probe of Lee Justice Department slams probe of Lee 'A paradigm of how not to manage an important ... case,' report says By Dan Eggen THE WASHINGTON POST WASHINGTON, Aug. 27 - The FBI's investigation of Wen Ho Lee was more seriously bungled than officials have previously disclosed, with inept agents making amateurish mistakes and ignoring orders to consider other suspects, according to an unreleased portion of a classified Justice Department report. Originally charged with 59 felony counts, Wen Ho Lee pleaded guilty in September to one felony charge of mishandling classified information. THE 166-PAGE CHAPTER, part of a larger report on the Lee probe, outlines a succession of blunders, misjudgments and faulty assumptions by the FBI that contributed to the government's shoddy investigation of the former Los Alamos National Laboratory scientist. Lee was suspected of giving nuclear secrets to China. Inattentive FBI supervisors in Washington compounded the problem by failing to correct the mistakes or to keep the investigation on track. The chapter says FBI Director Louis J. Freeh was not kept informed of the case's shortcomings, including problems with the investigation in New Mexico and disagreement among government experts over the seriousness of the suspected security loss. "This investigation was a paradigm of how not to manage and work an important counterintelligence case," says the report, written by federal prosecutor Randy I. Bellows. If Lee was a spy, Bellows concludes, the FBI let him get away. If he was not, the bureau blew repeated opportunities to consider other options - including the possibility that nuclear weapons secrets were not obtained by the Chinese in the first place. Originally charged with 59 felony counts, Lee pleaded guilty in September to one felony charge of mishandling classified information after the government's case against him fell apart. He was not charged with espionage and has repeatedly denied giving information to China. Two other chapters of the exhaustive Bellows inquiry were released by the government earlier this month. They faulted the FBI and the Energy Department for their "slapdash" investigation. But the latest chapter, obtained by The Washington Post with some sensitive information blacked out, underscores how investigators botched the case. Among its revelations: Investigators in the FBI's Albuquerque office ignored an order from top FBI officials in December 1997 to open inquiries into suspects other than Lee and his wife, Sylvia. Those inquiries were not begun until 15 months later, after Lee had been fired. The photocopying of the outside of Lee's mail, known as a "mail cover" operation, was allowed to lapse for three months in 1997 because investigators failed to file a routine renewal application. Most of the supervisors and agents on the case didn't bother to read or question a flawed 1995 Energy Department report that Bellows called a "virtual indictment" of Lee. That report was the basis for opening a full FBI investigation. When the new head of Albuquerque's FBI office finally read the report in December 1998, he described it as a "piece of junk" that called into question the entire probe. The agent in charge of the case for its first three years, from 1994 to 1997, did not see the document obtained by the CIA that detailed what the Chinese knew about the W-88 nuclear warhead, the weapon that Lee was suspected of compromising. For years, the Lee probe was handled by solo agents who also investigated robberies and other duties, and it was frequently ranked as the lowest intelligence priority in the Albuquerque office. Top Washington officials also were unaware that when two rookie agents were sent to Albuquerque to bolster the Lee case in November 1996, they were assigned to other cases. Several agents assigned to the probe were unqualified for the task, Bellows found. One supervisor said that working with the first agent was "like pushing a cart with a dead donkey." Another supervisor called the second agent on the case a "reject." Taken together, FBI Assistant Director Neil Gallagher told the Bellows team, the first two agents to head the probe added up to "a third of an agent." STRING OF FBI EMBARRASSMENTS The report by Bellows, an assistant U.S. attorney in Alexandria, is the government's official account of the botched probe that led to Lee's nine-month incarceration. The prosecution of the former Los Alamos scientist spawned congressional hearings, civil lawsuits and a strong rebuke from the judge in the case, who said the treatment of Lee "had embarrassed this entire nation." Bellows's assessment is another in an extraordinary string of embarrassments for the FBI this year, including the compromise of national security secrets by spy Robert P. Hanssen; the FBI's failure to turn over thousands of pages of documents to defense attorneys in the Oklahoma City bombing case; and the loss of weapons and laptops computers by FBI agents. At least six reviews of FBI conduct are underway. FBI officials said the Bellows report, which was delivered to former attorney general Janet Reno in May 2000, has formed the foundation for wide-ranging reforms in the way the FBI and other U.S. intelligence agencies deal with national security investigations. FBI spokesman John Collingwood also said the bureau deserves criticism for its early mistakes in the Lee case. "Clearly, when the institution turned its full attention to the case [in 1999] as it should have from day one, the resources and expertise were in abundance," Collingwood said. "We should have done that earlier on." Lee's attorney did not return a telephone message left for him Friday. Bellows, who has not commented publicly on his report, could not be reached for comment. For 41 2 years, Bellows wrote, the case "proceeded at a pace that can only be described as languid, if not torpid," and "suffered from neglect, faulty judgment, bad personnel choices, inept investigation and the inadequate supervision of that inept investigation." The chapter, which serves as the report's overview of the FBI's role in the Lee case, also confirms and expands on many previously publicized missteps. These include the failure to examine Lee's computer use despite waivers allowing the FBI and the Energy Department to do so; the diversion of agents from the case; and the failure to monitor two trips that Lee made to Taiwan in 1998. Lee, a U.S. citizen born in Taiwan, was charged in December 1999 with 59 felony counts of mishandling classified information and violating the Atomic Energy Act, which could have brought a life sentence on conviction. After pleading guilty to the charge of mishandling classified information, he was sentenced to the time he had already served. Lee ultimately acknowledged copying classified nuclear data onto portable computer tapes and removing them from Los Alamos. Despite an intensive debriefing by the FBI under the terms of his plea agreement, the tapes have never been found. Lee has not publicly explained why he made them or what became of them. Lee is pursuing a civil lawsuit against the FBI and the departments of Energy and Justice for violating his privacy by leaking his name as a suspect. He is also sparring with the government to obtain clearances for the release of his memoirs. NO CRIME MAY HAVE OCCURRED Because the 800-page Bellows report was completed in May 2000, when Lee was in jail, it focuses largely on ways in which investigators failed to be aggressive enough in pursuit of the case. Nonetheless, Bellows also faults the FBI and the Energy Department for focusing exclusively on Lee and ignoring the possibility that the alleged crime - providing nuclear weapons secrets to China - may never have occurred. The FBI is not the only target of the critique. Another chapter of the report, also obtained by The Post, faults the Justice Department's Office of Intelligence Policy and Review for not granting the FBI a warrant to secretly monitor Lee's computer - although it says in hindsight that the bureau misstated facts underlying the request. Bellows also devotes chapters, including those already released, to criticism of the Energy Department for being too quick to focus on Lee and his wife as espionage suspects. The 1995 Energy report that prompted the FBI investigation, Bellows wrote, included "misleading representations" that further sharpened the focus on the Lees to the exclusion of others. But much of the most withering criticism is aimed at the FBI, which conducted an inquiry of Lee from April 1994 to November 1995 and launched a full-blown investigation in May 1996. For the next three years, Bellows concludes, the probe faltered and was often dormant because of the incompetence of the agents assigned to it. For extended periods, Bellows found, the investigation essentially ground to a halt. An agent said he did nothing on the probe for several weeks because he was working on other crime cases. In another instance, the investigation stalled for four months in late 1997 while the Albuquerque office awaited instructions from FBI headquarters. Yet when the investigative plan finally arrived that December from Washington, "they largely ignored it," Bellows found. One of the items was a mandatory directive to open preliminary inquiries on other suspects, which did not happen until March 1999. These and other blunders went largely unnoticed by Freeh, Bellows found. The FBI director was not briefed on the investigation until more than a year after it began, and important decisions - such as a 1996 memo requesting mail cover authority - were made by subordinates. As a result, Bellows concludes, "the Attorney General received a written briefing on the FBI's Wen Ho Lee investigation before the Director did." After June 1997, Freeh got regular updates on the case but was not informed that the Albuquerque office was, in the words of an FBI official, "screwing up and sitting on a time bomb." "By the time Director Freeh was finally briefed on the case, it was in trouble and the prognosis for the case seemed grim," Bellows wrote. "So much had already gone wrong." © 2001 The Washington Post Company -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3591 From: Aimee Farr Date: Mon Aug 27, 2001 11:45am Subject: Scarfo CIPA motion http://www.epic.org/crypto/scarfo/gov_cipa_motion.pdf FBI Invokes Classified Information Procedures Act in Computer Intrusion Case ~Aimee 3592 From: Aimee Farr Date: Mon Aug 27, 2001 0:05pm Subject: Private facial scanning databases Scottish bookstore scanning for "known shoplifters" The idea of private databases of "known agents" strikes me as uncool, and not altogether fantastical considering the lack of oversight past point-of-sale among biometric vendors. What casinos have put together gives one pause for thought. (Probably looks like a Pokemon card trading ring.) I would go bitch on the biometric guvvie list, but I think my talk of surreptitious biometrics "for the 4th Amendment" [*snicker*] might have me kicked off without explanation. If so, somebody in here was sure right about that kind of talk. ~Aimee 3593 From: Date: Mon Aug 27, 2001 2:28pm Subject: Reporter's Phone Records Subpoenaed Reporter's Phone Records Subpoenaed By PETE YOST .c The Associated Press WASHINGTON (AP) - The Justice Department obtained by subpoena the home telephone records of an Associated Press reporter for a period in which he wrote about the investigation of Sen. Robert Torricelli, the U.S. attorney's office in Manhattan has disclosed. In an Aug. 20 letter, the office of U.S. Attorney Mary Jo White said the government subpoenaed telephone records of John Solomon for incoming and outgoing calls at the reporter's home from May 2 to May 7. White was appointed last spring to oversee the Torricelli investigation. Justice Department spokeswoman Susan Dryden declined to comment on the matter Monday. On May 4, an AP story under Solomon's byline quoted unidentified law enforcement officials as saying Torricelli had been recorded on a wiretap in 1996 discussing fund-raising with relatives of a prominent Chicago crime figure. Law enforcement officials can face criminal penalties for disclosing information obtained under federal wiretaps. The unidentified officials told the AP that the intercepted call received new scrutiny two years later when allegations surfaced of thousands of dollars in illegal straw donations to Torricelli's campaign. According to the AP story, the law enforcement officials said several people have been questioned about the intercept and whether Torricelli or his staff ever encouraged them to disguise donations. ``We are outraged by what the Justice Department has done and we will seek any available legal redress,'' said AP President and CEO Louis D. Boccardi. ``Their actions fly in the face of long-standing policy that recognizes what a serious step it is to go after a reporter's phone records. We hope that this secret assault on the press is not an indication of the Bush administration's attitude toward a press free of government interference,'' Boccardi said. First Amendment lawyer Floyd Abrams said a Justice Department subpoena of a journalist's telephone records was extremely rare. ``I cannot say that every time the government seeks to obtain telephone records of journalists it necessarily violates the First Amendment, but there's no doubt that the decision of the government to go so far as to obtain these telephone records raises constitutional questions of a high order of delicacy,'' Abrams said. Deputy Attorney General Larry Thompson approved the subpoena for the reporter's records, according to the letter mailed to Solomon. Attorney General John Ashcroft disqualified himself from the matter. Torricelli campaigned last year for Ashcroft's Democratic opponent in the U.S. Senate race in Missouri. Ashcroft lost to Jean Carnahan, who stepped in after her husband was killed in a plane crash. ``I think the Ashcroft Justice Department is sending a bad signal,'' said Gregg Leslie, legal defense director of the Reporters Committee for Freedom of the Press. ``They are reopening avenues of investigation concerning journalists that we had hoped had been resolved.'' Leslie said that once the Justice Department determined it would subpoena the reporter's phone records, the agency could have given advance notification, providing the news media an opportunity to contest the matter. ``The idea here is that none of this is the typical kind of criminal evidence that can be destroyed, so why not give the news media a chance to challenge it?'' asked Leslie. The Code of Federal Regulations says negotiations are necessary prior to subpoenaing telephone records of a member of the news media if ``such negotiations would not pose a substantial threat to the integrity of the investigation.'' AP-NY-08-27-01 1924EDT 3594 From: A.Lizard Date: Mon Aug 27, 2001 5:29pm Subject: RE: RE: Email and fax disclaimers At 10:23 AM 8/27/01 +0000, you wrote: >Message: 15 > Date: Sun, 26 Aug 2001 23:25:33 -0500 > From: "Aimee Farr" >Subject: RE: RE: Email and fax disclaimers > > > > > Riddle: What's above a confidentiality email disclaimer on a PI > > > mailing list? > >Steve wrote: > > > Answer #1: > > > > A quote of all the last month's messages in one long 500K > > digest, ending with my verbiage on confidentiality disclaimers, > > also including all the headers, list footers, list ads and other > > garbage, with the sender of the message adding "me too". > > > > Answer #2: > > > > Same as above, except with the sender mailing to the list > > "unsubscribe". > >Good answers, Steve. :-D > >ANSWER: _Something that used to be confidential_. > > >~Aimee If it's *really* confidential, the sender has no business posting it to a mailing list. If it *really* needs to be secure, anyone who doesn't encrypt via PGP or hushmail or (is there a decent one-time-pad program out there?) is an idiot. A.Lizard ************************************************************************ Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 3595 From: James M. Atkinson Date: Mon Aug 27, 2001 8:42pm Subject: FBI Affidavit - Alleged NRO spy [So where at the other two spies at the TRW facility?] United States District Court Eastern District of Virginia CRIMINAL COMPLAINT UNITED STATES OF AMERICA v. Brian P. Regan I, the undersigned complainant being duly sworn state the following is true and correct to the best of my knowledge and belief. From in or about fall 2000 through August 23, 2001, in Chantilly, Virginia, and elsewhere, in the Eastern District of Virginia defendant(s) did, unlawfully and knowingly conspire to commit espionage, that is, with intent and reason to believe that they were to be used to the injury of the United States and to the advantage of a foreign nation, communicate, deliver, and transmit to a foreign government and to a representative and agent thereof, directly and indirectly, documents and information relating to the national defense, in violation of Title 18 United States Code, Section(s) 794(c). I further state that I am a(n) Special Agent and that this complaint is based on the following facts: See Attached Affidavit Continued on the attached sheet and made a part hereof: Yes Signature of Complainant: Steven A. Carr Special Agent Federal Bureau of investigation at Alexandria, Virginia AUSA Robert A. Spencer Sworn to before me and subscribed in my presence, Date_______________ Name & Title of Judicial Officer_________________ Signature of Judicial Officer_______________ --------------------------------------------------------------------- AFFIDAVIT IN SUPPORT OF CRIMINAL COMPLAINT AND SEARCH WARRANT I, Steven A. Carr, being duly sworn, hereby state: 1. I am a Special Agent of the Federal Bureau of Investigation (FBI) and have been so employed for six years. I am currently assigned to the Washington Field Office to a squad responsible for foreign counterintelligence matters; I have worked in this field for six years. As a result of my involvement in counterintelligence investigations, and foreign counterintelligence training I have received, I am familiar with the tactics, methods, and techniques of foreign intelligence services and their agents. 2. As more fully described below, I respectfully submit that Brian P. Regan violated 18 U.S.C. ß 794(c) in that he conspired to commit espionage by transmitting classified U.S. national defense information to a person he believed was an agent of a foreign government. Regan, with reason to believe that they were to be used to the injury of the United States and the advantage of a foreign nation, knowingly and unlawfully conspired to communicate, transmit, and deliver to a foreign government documents and information relating to the national defense of the United States, and did commit an overt act in furtherance thereof in the Eastern District of Virginia. 3. Information in this affidavit is based on my personal knowledge and on information provided to me by other counterintelligence investigators and law enforcement officers during this investigation. This affidavit relies on information provided by agencies of the United States Intelligence Community, which have cooperated with this investigation. This affidavit is not intended to be an exhaustive summary of the investigation against Regan, but is for the purpose of setting out probable cause in support of: a. A complaint charging Brian P. Regan with a violation of Title 18, United States Code, Section 794(c)(conspiracy to commit espionage); and b. A search warrant for a bag checked by Brian P. Regan onto a Lufthansa flight at Washington Dulles International Airport on August 23, 2001, which bag is more fully described in Attachment C to this affidavit. 4. Pursuant to the Foreign Intelligence Surveillance Act of 1978, as amended, Acting Attorney General Theodore B. Olson has approved use in this application, for law enforcement purposes, of information obtained and derived from searches and surveillance conducted under the authority of the act. BACKGROUND 5. Brian P. Regan is 30 years old, and he lives at [address deleted] Bowie, Maxyland. Regan is married and has two daughters and two sons. He served in the U.S. Air Force from August 1980 until retiring in August 2000. His training in the Air Force included cryptanalysis. His responsibilities included the administration of an Intelink website. Intelink is a classified U.S. government computer system accessible only by certain members of the U.S. Intelligence Community. Regan's last assignment with the Air Force was at the headquarters of the National Reconnaissance Office ("NRO"a) located in Chantilly, in the Eastern District of Virginia. During Regan's Air Force assignment at NRO, he had authorized access to classified U.S. national defense information up to the TOP SECRET level, and also had authorized access to sensitive compartmented information ("SCI"). Regan's access to Sensitive Compartmented Information was terminated when he retired from the Air Force on August 30, 2000. 6. The NRO is the national program to meet the U.S. government's intelligence needs through spaceborne reconnaissance. The NRO is an agency of the U.S. Department of Defense and receives its budget through that portion of the National Foreign Intelligence Program known as the National Reconnaissance Program, which is approved by both the Secretary of Defense and the Director of Central Intelligence. 7. Since October 2000, Regan has been employed by TRW in Fairfax, Virginia. On July 25, 2001, Regan's access to SCI was reinstated for his work for NRO as a TRW contractor. On July 30, 2001, Regan, as a TRW contractor, has been assigned to an NRO facility in Chantilly, Virginia. 8. Pursuant to Executive Order 12958 and its predecessor Executive Orders, information must be classified as TOP SECRET and properly safeguarded if the release of that information could reasonably be expected to cause "exceptionally grave damage to the national security." Pursuant to Executive Order 12958, and its predecessor, Executive Order 12356, information, the unauthorized disclosure of which reasonably could be expected to cause "serious damage to the national security," must be classified as "Secret." Pursuant to these same executive orders, "Confidential" information is information the unauthorized disclosure of which reasonably could be expected to cause damage to the national security. THE INVESTIGATION 9. In the Fall of 2000, reliable source information indicated that a number of U.S. government documents were provided to the government of Country A. The large majority of these documents are classified and relate to the U.S. national defense, and are not authorized for release to Country A. The remaining documents are portions of classified documents, which portions are unclassified, but which documents in their entirety are also not authorized for release to Country A. Most of the classified documents provided to country A consisted of electronic images, classified "Secret," taken from overhead platforms. Another document consisted of classified portions of a Centra1 Intelligence Agency intelligence report, classified "Secret," issued on a specific date. The particular copy of this report provided to Country A had been printed out eight days after the date the report was issued. Another of the documents consisted of two classified pages from a CIA newsletter, which newsletter overall is classified "Secret." Another of the documents was a document, classified "Secret," relating to a foreign country's satellite capability. Another of these documents was the unclassified cover page of a defense intelligence reference document classified "Top Secret." Another such document was one page from a document containing "Top Secret" information. Another such document was the unclassified table of contents for a particular intelligence manual classified "Top Secret." The documents also include two photographs, one classified "Secret" and the other classified "Confidential." 10. Also in the Fall of 2000, reliable source information revealed that an agent had provided the government of Country A separate information intended to accompany the documents described in paragraph 9, above. This accompanying information consisted of an introductory message, in English, and separate encrypted messages. The initial, unencrypted message appears to be an introductory letter containing instructions to prevent detection of the messages by the U.S. government. 11. The encrypted messages, which were decrypted by the U.S. government, set forth contact instructions, establish bona fides, and offered to provide additional classified information. In particular, the encrypted message gives instructions to respond to a specified email address on a free email provider. This email address was ostensibly established by one "Steven Jacobs," of a specific address in Alexandria, Virginia. Records of the provider indicate that this email address was established on August 3, 2000, and was accessed nine times between August 2000 and January 2001. Eight of the nine times this email address was accessed were from public libraries located in Anne Arundel and Prince George's Counties, Maryland. Regan's residence is located one half mile from a Prince George's County library with public internet access. One of the Anne Arundel County libraries used to access this account is in Crofton, approximately five miles from Regan's residence. Physical surveillance of Regan during May through August 2001 indicated that Regan regularly utilized the public internet access located in the Crofton library. The ninth library is the Tysons-Pimmit Library, in Falls Church, Virginia, which is located along the route Regan used to commute between his residence and his office. 12. The office formerly occupied by Brian P. Regan at the NRO, Chantilly, Virginia, was searched in April 2001. A copy of the intelligence manual referred to in paragraph 9, above, bearing Regan's name, was found on a shelf behind his former desk. 13. The computer formerly assigned to Brian P. Regan at the NRO, Chantilly, Virginia, was searched in April 2001. FBI special agents analyzed the hard drive of this computer and found that someone using Regan's password had surfed a large number of Intelink Uniform Resource Link ("URL") addresses pertaining to countries A, B and C. One of these URL addresses is for one of the overhead images discussed in paragraph 9, above. Also on the hard drive of Regan's computer were four URLs that correspond to the URL addresses for other documents described in paragraph 9, above. Other such URL addresses contain direct links to some of the other documents discussed in paragraph 9, above. In addition, NRO server records indicate that Regan's computer was used to gain access to three other documents described in paragraph 9, above. 14. Intelink audit records indicate that the URL for the CIA intelligence report described in paragraph 9, was accessed from the computer in Regan's former office at 8:52 p.m. on the date the particular copy of the report described in paragraph 9 had been printed out. NRO records indicate that Regan's electronic entry badge was used to enter his office suite at 1:55 p.m. on that date. Separate NRO security records indicate that Regan's passcode was used to set the alarm on the suite at 1:15 a.m. the following morning. Later that same day, Regan flew on a "space available" U.S. Air Force flight from Norfolk, Virginia, to Iceland, and thereafter traveled to additional locations in other countries in Europe. 15. The document noted in paragraph 9, above, which related to a foreign country's satellite capability, was composed expressly for and distributed at a course given at Colorado Springs, Colorado, that Regan attended July 28 through August 8, 1997. The course was given for members of the U.S. Intelligence Community with appropriate clearances. Regan was one of two NRO members who attended the course. Regan was the designated recipient for NRO for all classified materials distributed at the course. 16. Agents also have established that there are common spelling errors in the messages described in paragraphs 10, 11 and 12 above, and in documents typed on Regan's former NRO computer. 17. The FBI has had Regan under surveillance since June 2001. On several occasions while under surveillance, FBI personnel have observed Regan conducting what appear to be surveillance detection runs, that is, conducting multiple U-turns, pulling over to the side of the road, and appearing to be checking to see whether he is under surveillance. 18. On June 21, 2001, Regan sent an email from an account registered in his own name to an email account in the name of his wife. The email attached one page of alphanumeric encryption key that appears to be similar to the encryption technique described in paragraphs 10, 11 and 12, above. 19. On June 26, 2001, Regan traveled from Washington Dulles International Airport to Munich, Germany, on Lufthansa. Earlier, in June 2001, FBI surveillance observed Regan log onto the internet at a public library. When Regan departed, he failed to sign off the internet, so FBI personnel were able to observe which internet sites Regan had visited. One of the sites that Regan had visited provided the address for a diplomatic office of Country C in Switzerland. Regan also looked up a hotel in Zurich. Before Regan's flight departed on June 26, 2001, the FBI searched his checked suitcase, pursuant to a court order. Regan's suitcase contained glue and packing tape. Regan returned to Washington Dulles International Airport on July 3, 2001. 20. On August 23, 2001, the FBI conducted surveillance of Regan's office at NRO in Chantilly, Virginia, by closed circuit television, pursuant to a court order. Regan was observed looking at a "Secret" document on his computer terminal while taking notes in a small notebook which he took from, and returned to, his front pants pocket. A court-authorized search of Regan's computer confirmed that he had been logged onto Intelink accessing classified material. 21. Regan had reservations to Zurich, Switzerland, through Frankfurt, Germany, on Lufthanea, departing from Washington Dulles International Airport on August 23, 2001. Regan confirmed these reservations on August 11, 2001. Regan had reservations to return August 30, 2001. On August 23, 2001, Regan told a co-worker that he was driving to Orlando, Florida, to take his family to Disney World, leaving on August 27 and returning August 30, 2001. In addition, Regan wrote "Orlando, Florida" on a dry-erase board in his office suite, to indicate to his colleagues where he would be for this time period. Regan did not report to his employer, as required in light of his security clearances, that he would be traveling outside the country. 22. On August 23, 2001, at approximately 9:00 a.m., while Regan was occupied in a meeting at NRO, the FBI conducted a court-authorized search of Regan's Dodge Caravan. In that search, the FBI found a carry-on bag which contained four pages of what appears to be handwritten encrypted messages, one page of what appears to be a typewritten encrypted message, and what appears to be one page of a decryption key. The carry-on bag also contained handwritten addresses and phone numbers for diplomatic offices of Country D in Bern, Switzerland, and Vienna, Austria, and for a diplomatic office of Country C in Vienna. Also on the same day, the FBI searched, pursuant to a court order, the brown suitcase that is described in Attachment B. In that suitcase was a bottle of Elmer's glue and a roll of tape. 23. On August 23, 2001, Regan drove to Dulles Airport, arriving at approximately 1:00 p.m. Regan checked a brown suitcase at the Lufthansa counter. This suitcase was secured by the FBI and is in the custody of the FBI at Tyson's Corner, Virginia. Regan was bumped to a later flight. Regan then departed Dulles Airport and returned to his office at NRO. Regan drove back to Dulles Airport at approximately 5:3O p.m. and was stopped by the FBI in the airport terminal. Regan had with him, in his same carry-on bag, the same documents that were found in the search of his van earlier in the day. Also in Regan's carry-on bag when he was stopped by the FBI was an NRO document, marked "For Official Use Only," that listed classes available to members of the U.S. Intelligence Community. This document indicates the security clearance required to attend each class. This document consists of two pages, front and back, and FBI personnel had earlier observed Regan (via court-authorized closed circuit television) create this document by cutting and taping together documents, and then photocopying the taped-up document. When he was stopped, Regan was also carrying: approximately five blank, business-sized envelopes; three rubber gloves; and four finger sleeves. 24. Also in Regan's carry-on bag when he was stopped by the FBI at Dulles Airport on August 23, 2001, was a hand-held global positioning system ("GPS"). Based on my training and experience in intelligence matters, I know that a GPS unit can be used to locate a specific site for drop or signal sites. 25. On Regan's person when he was stopped by the FBI at Dulles Airport on August 23, 2001, was a spiral notebook, which appears to be the notebook in which Regan was taking notes while looking at classified information on his computar terminal earlier in the day on August 23, 2001. In addition, hidden in Regan's shoe, Regan had a piece of paper on which was written names and addresses in a country in Europe. 26. Regan was confronted by FBI special agents at the airport at approximately 5:35 p.m. In response to a question from this affiant, Regan denied knowledge of cryptology, coding and decoding. However, when shown photographs of the alphanumeric tables, which appear to be related to cryptology, which tables had been in his carry-on bag, he stated "This is my stuff." Regan was arrested shortly thereafter. 27. Financial checks indicated that in February 2001, Regan had consumer debts amounting to $53,000. 28. Based on the foregoing, I respectfully submit that there is probable cause to believe that Brian P. Regan knowingly and unlawfully conspired to commit espionage, that is, with intent and reason to believe that it would be used to the injury of the United States and to the advantage of a foreign nation, communicate, deliver, and transmit to a foreign government and to a representative and agent thereof, directly and indirectly, documents and information relating to the national defense, in violation of 18 U.S.C. ß 794(c). I also respectfully submit that probable cause exists that fruits, evidence, and instrumentalities of a crime, namely, conspiracy to commit espionage, may be found in the suitcase that Regan checked at Dulles Airport on August 23, 2001, which suitcase is more fully described in Attachment B. Accordingly, I request a warrant to search the suitcase described in Attachment B for the items listed in Attachment A. Steven A. Carr Special Agent Federal Bureau of investigation Sworn to and subscribed before me this ____ of August 2001, ________________________ UNITED STATES MAGISTRATE JUDGE Alexandria, Virginia --------------------------------------------------------------------- ----------- ATTACHMENT A ITEMS TO BE SEIZED 1. Espionage paraphernalia, including devices designed to conceal and transmit national defense and classified intelligence information and material, and implements used by espionage agents to communicate with their handlers and with a foreign government, including, coded pads, signaling devices or implements, microdots, secret writing papers, any notes, letters, or written correspondence between Brian P. Regan and any agents of a foreign country, any computers (including laptops), computer disks, cameras, film, codes, telephone numbers, maps, photographs, and other materials relating to communication procedures or correspondence. 2. Records, notes, calendars, journals, maps, instructions, and classified documents and other papers relating to the transmittal of national defense and classified intelligence information. 3. United States and foreign currency, financial instruments, precious metals, jewelry, and other items of value, which are the proceeds of or assets derived from illegal espionage activities; any financial records of foreign or domestic bank accounts, including cancelled checks, statements, deposit slips, withdrawal slips, wire transfer requests and confirmations, account numbers, addresses, credit cards and credit card statements, financial and investment account records, reflecting proceeds or wealth from espionage activities, including financial records or documents in aliases. 4. Passports, visas, calendars, date books, address books, credit card and hotel receipts, airline records, reflecting travel in furtherance of espionage activities. 5. Identity documents (including those in aliases), including passports, licenses, visas, U.S. and foreign currency, instructions, maps, photographs, bank account numbers, and other materials related to emergency contact procedures and escape routes. 6. Materials used to alter documents, including glue and tape. 7. Safety deposit box records, including signature cards, bills, and payment records; any documents relating to storage sites where the defendant may be storing classified information or other items relating to espionage activities. 8. Federal, state, and local tax returns, work sheets, W-2 forms, 1099 forms, and related schedules. 9. Telephone bills and records, including calling cards and pager records. 10. Photographs, including photographs of co-conspirators. 1l. Computer hardware, software, and storage media, including any computer, laptop computer, modem, server, records, information and files contained within such computer hardware, software, or storage media. 12. Classified or official documents or information. --------------------------------------------------------------------- ----------- ATTACHMENT B DESCRIPTION OF SUITCASE TO BE SEARCHED The suitcase is a two-tone brown, cloth and leather-like, suitcase, approximately 24 by 18 inches, with two straps, with buckles, encircling the suitcase. The suitcase opens with zippers, and bears the words "Ricardo Beverly Hills." The suitcase has a Delta tag on it that reads: "K. Q. Feeley, [address deleted] Skaneatles, NY [deleted]" The suitcase has a Lufthansa tag on it that reads: "Brian Regan, [address deleted], Bowie, MD [deleted]" The suitcase is in the custody of the FBI in Tysons Corner, Virginia. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3596 From: Scott Malcolm Date: Tue Aug 28, 2001 3:27pm Subject: Re:Private facial scanning databases > Subject: Private facial scanning databases The best part of the system is when a person wears a pair of sun glasses or a baseball cap their in a stealth mode and the data base no longer picks them out. ______________________________________________________________________ >Subject: Scarfo CIPA motion: http://www.knock-knock.com/federal_guidelines.htm (When warm milk just won't do.) Regards, Scott Malcolm Malcolm & Associates, Inc. Serving the State of Wisconsin http://www.execpc.com/~conf-pi Office 262 965 4426 / Fax 262 965 4629 3597 From: James Goldston Date: Wed Aug 29, 2001 7:13am Subject: RE: Email and fax disclaimers While the referenced disclaimer may be a personally-derived disclaimer, many firms attach banners at the bottom of every email message. In these cases it is beyond the control of the sender. James > -----Original Message----- > From: Steve Uhrig [mailto:steve@s...] > Sent: Sunday, August 26, 2001 4:11 PM > To: tscm-l@yahoogroups.com > Subject: [TSCM-L] Email and fax disclaimers > > > > If you are not the named recipient, any review, dissemination, > > distribution or copying of this communication is prohibited. > > If you received this transmission in error, please contact me > > immediately for instructions." > > The people who add these nonsense disclaimers to their emails > and faxes have overblown egos. [snip] 3598 From: Steve Uhrig Date: Wed Aug 29, 2001 9:18am Subject: RE: Email and fax disclaimers Once upon a midnight dreary, James Goldston pondered, weak and weary: > While the referenced disclaimer may be a personally-derived > disclaimer, many firms attach banners at the bottom of every > email message. In these cases it is beyond the control of the > sender. Regardless of the source, it still makes one look like someone with an overblown ego. And his employer, too. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3599 From: James M. Atkinson Date: Wed Aug 29, 2001 9:52am Subject: Newspapers 1. The Wall Street Journal is read by the people who run the country. 2. The New York Times is read by people who think they run the country. 3. The Washington Post is read by people who think they ought to run the country. 4. USA Today is read by people who think they ought to run the country but don't understand the Washington Post. 5. The Los Angeles Times is read by people who wouldn't mind running the country, if they could spare the time. 6. The Boston Globe is read by people whose parents used to run the country. 7. The New York Daily News is read by people who aren't too sure who's running the country. 8. The New York Post is read by people who don't care who's running the country, as long as they do something scandalous. 9. The San Francisco Chronicle is read by people who aren't sure there is a country, or that anyone is running it. 10. The Miami Herald is read by people who are running another country. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3600 From: James M. Atkinson Date: Wed Aug 29, 2001 10:14am Subject: Arkansas Woman Killed in Mistaken Rapture Arkansas Woman Killed in Mistaken Rapture ARKANSAS CITY (EAP) -- A Little Rock woman was killed yesterday after leaping through her moving car's sun roof during an incident best described as a "mistaken rapture" by dozens of eye-witnesses. Thirteen other people were injured after a twenty-car pile-up resulted from people trying to avoid hitting the woman who was apparently convinced that the rapture was occurring when she saw twelve people floating up into the air, and then passed a man on the side of the road who she claimed was Jesus. "She started screaming 'He's back!, He's back!' and climbed right out of the sunroof and jumped off the roof of the car," said Everet Williams, husband of 28-year-old Georgann Williams who was pronounced dead at the scene. "I was slowing down but she wouldn't wait till I stopped," Willams said. She thought the rapture was happening and was convinced that Jesus was gonna lift her up into the sky," he went on to say. "This is the strangest thing I've seen since I've been on the force," said Paul Madison, first officer on the scene. Madison questioned the man who looked like Jesus and discovered that he was on his way to a toga costume party, when the tarp covering the bed of his pickup truck came loose and released twelve blow-up sex dolls filled with helium which then floated up into the sky. Ernie Jenkins, 32, of Fort Smith, who's been told by several of his friends that he looks like Jesus, pulled over and lifted his arms into the air in frustration, just as the Williams' car passed him, and Mrs. Williams was sure that it was Jesus lifting people up into the sky as they passed by him, according to her husband, who says his wife was a devout Christian. When asked for comments about the twelve sex dolls, Jenkins replied, "This is all just too weird for me. I never expected anything like this to happen." -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3601 From: Aimee Farr Date: Wed Aug 29, 2001 11:03am Subject: Konop to get a workover http://www.siliconvalley.com/docs/news/tech/026405.htm Appeals court reworking opinion in pilot lawsuit HONOLULU (AP) -- A federal appeals court panel said Tuesday it has withdrawn an opinion that supported the claims of a Hawaiian Airlines pilot who accused company officials of illegally entering his secure Internet site. The three-judge panel of the 9th U.S. Circuit Court of Appeals ruled in January that a California court erred when it did not order a trial on Robert Konop's claims that airline officials violated the Wiretap Act and other federal laws in 1995 by reading the Web site. The ruling was hailed as a victory for operators of private Web sites who want to guard against trespassers. [...] This is the result of heavy lobbying by LEA. A Google search should turn up some news material, for those interested. ~Aimee From: szabo4381 Date: Wed Aug 25, 2004 1:32am Subject: Re: Far East Spystuff / Video-scanner --- In TSCM-L@yahoogroups.com, "contranl" wrote: > . > > Thanks again, for the hints to the portable cable-analyzers > > but since i would have to add: > > a lcd video screen > a downconverter > a video baseband demodulator > > I would probably be better off in trying to modify a > "baby video monitor" wich has everything inside > I would only need to make a relative easy modification to make it > free scanning instead of only 4 channels > > I'll let you know if it works. > > Greetings > > Tetrascanner > wwww.tetrascanner.com Hi, the practical solution for your goal could be a palmsize lcd-screen TV ( Casioxxx, etc) + (say) CalAmp 2,4 GHz antenna with in-builded downconverter... total bill is under 500 $, and no time wasting... With this arrangement you could pick-up a douzens of crying babies even in far-field ( hehe, ..:) ) Greetings, and success.... 9440 From: David Alexander Date: Wed Aug 25, 2004 5:51am Subject: RE: No way to secure computers, mic, and web cam. Gerald I'm sorry, but as an Information Security professional I have to take issue with your posting. I urge people not to take what Gerald has to say too seriously. In my personal opinion, based on 10+ years as an Infosec practitioner, it's not 'new news' and it's far too pessimistic, doom-laden and downright misguided. I could be wrong in this (and if I am I apologise unreservedly) but it sounds like someone with a little knowledge reading articles written by journos with even less knowledge and making 2+2 add up to 5. The things he mentions can happen if you don't bother to protect your systems - in the same way your house will probably be burgled or your car stolen if you don't lock your doors and windows. Decent firewalls and anti-virus/intrusion detection systems cannot absolutely guarantee to protect you - there's always a possibility of a zero day defect being used to get through, but they do very, very, very significantly reduce the risk to the point where is it most unlikely to happen if you keep them patched and properly configured. The fact is that 99.9% of attacks are automated and will fail against decent defences. Most 'manual hackers' will go find an easier target if they see you have good defences. The ones that won't are probably the ones who found the zero day defect in the first place but they tend to concentrate on high profile or high value targets that will bring them kudos or cash. As ever, the most vulnerable asset of any system is your staff (to a social engineering attack or good old fashioned bribe). Good policy, procedures and awareness training, not technology, are required to defeat those. Have a look at Andy Cuffs excellent site or another good one is www.honeynet.org for more info. Regards Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: Gerald [mailto:geraldmsu@y...] Sent: 25 August 2004 01:45 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] No way to secure computers, mic, and web cam. A dirty litte secret of the Internet is that none of our computers have been secure and they are not able to secure them. The Russian Hang up group knows this and sells credit card info on the internet in IRC chat rooms.. http://p082.ezboard.com/ffraudevidencelocker50744frm54.showMessage? topicID=31.topic They are in the process of seting up attack bots using megasploit http://p082.ezboard.com/ffraudevidencelocker50744frm61.showMessage? topicID=25.topic Hacking bots use your web cam and mic to spy on you. http://p082.ezboard.com/ffraudevidencelocker50744frm61.showMessage? topicID=31.topic and rootkits, http://cigars.bravepages.com/antispy.htm which force your security systems to lie to you. The new Microsoft security patch will cripple your computer and many Universitis have chose to NOT allow it to be down loaded onto University computer systems. http://www.bizreport.com/article.php?art_id=7855 Teh computer industry want you to believe that a firewall and anti- virus and a sweeper keep you protected, and its a lie. Wou can't stoop intrusions but you can spot them. http://cigars.bravepages.com/antispy.htm Terrorist attack in USA on Oct 30th 2004. http://p082.ezboard.com/ffraudevidencelocker50744frm71.showMessage? topicID=33.topic Gerald Internet Anthropologist, Ad Magnum ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9441 From: Hawkspirit Date: Wed Aug 25, 2004 11:51am Subject: Sweeps Needed Two residential sweeps are needed, one in Lynn Massachusetts, the other in Denver Colorado. Contact me on one of my cell phones ASAP. Roger Tolces Electronic Security Co. Los Angeles, Ca. 760-409-1652 760-861-7595 [Non-text portions of this message have been removed] 9442 From: Leanardo Date: Wed Aug 25, 2004 7:07am Subject: Re: No way to secure computers, mic, and web cam. Here is another dirty little secret, your posting is not only off-topic but a complete blur of unfounded drivel intended to scare those unfamiliar with IT security into paying you their hard earned moneyÖ If you were truly informed you would have mentioned any of the other more active and effective mal-code groupsÖHangUP has only been an active organization since 2003 and are usually a "hired gun" for other organizations. Why don't act like all the other scam artists (i.e. Viagra, and male organ enlargement offers) and spread your "news" via SPAM so I we can all filter it out before wasting our time reading it? Bruce Gabbard CISSP, CHSP --- In TSCM-L@yahoogroups.com, "Gerald" wrote: > A dirty litte secret of the Internet is that none of our computers > have been secure and they are not able to secure them. > The Russian Hang up group knows this and sells credit card info on > the internet in IRC chat rooms.....bla, bla, bla, bla... 9443 From: Gerald Date: Wed Aug 25, 2004 7:14am Subject: No way to secure computers, mic, and web cam. David Alexander,apology accepted, David seems to be a reactive security pro, sitting on his 10 yr old Laurels. Dave is right 2 years ago. it sounds like someone who just reads the security alerts, and is espousing just what the industry wants you to think. A case of adding 2+2 and getting 3+. He makes my point exactly, "The things he mentions can happen if you don't bother to protect your systems - in the same way your house will probably be burgled or your car stolen if you don't lock your doors and windows" Go ahead lock them, that doesn't stop being burgled. Fully protected PC were comprimised recently by the Hangup group,( btw they call themselves Nazis.) http://p082.ezboard.com/ffraudevidencelocker50744frm69.showMessage? topicID=8.topic "Decent firewalls and anti-virus/intrusion detection systems cannot absolutely guarantee to protect you - there's always a possibility of a zero day defect being used to get through, but they do very, very, very significantly reduce the risk to the point where is it most unlikely to happen if you keep them patched and properly configured." He is right there, 2 years ago. Patches, patches and patches for the patches. And now a MEGA patches that will cripple your system trying to fill the holes in the swiss cheese known as MS os...They are already working on patches for the holes in the patch. Dave goes on to say, "The fact is that 99.9% of attacks are automated and will fail against decent defences." 3 months ago this was true. The new attack bots will be using Megasploit: point, click, ROOT, combined with a rootkit and a worm, it will be 99.9% automated all right. http://p082.ezboard.com/ffraudevidencelocker50744frm61.showMessage? topicID=23.topic Again Dave is correct "The ones that won't are probably the ones who found the zero day defect in the first place but they tend to concentrate on high profile or high value targets that will bring them kudos or cash." First the cash part, 'YOUR' passwords to paypal or Ebay or your bank accounts all tracked by a keylogger. Second the zero day defect, I think there have been 300 of them so far and no end in sight, not to mention the revisited holes in zeroday exploit patches. And finally "As ever, the most vulnerable asset of any system is your staff (to a social engineering attack or good old fashioned bribe). Good policy, procedures and awareness training, not technology, are required to defeat those." Again he is right poor security policy's let them right into your swiss cheese, but it still is swiss cheese. In the last month you were at risk if (opened a hole), you opened a win.doc from the Internet, or a pdf or used IM or IRC or yahoo email. And NONE of the current security systems can spot a rootkit, http://p082.ezboard.com/ffraudevidencelocker50744frm61.showMessage? topicID=2.topic As a professional Dave is behind the learning curve by at least 3 months. (and if I am I apologise unreservedly) but it sounds like someone with a lot of reactive historical knowledge reading security alerts, and less knowledge about state of the art hacking or proactive research. I'm not about to quote my one activities or research in public, the news articles will have to suffice. Gerald 9444 From: Steve Uhrig Date: Wed Aug 25, 2004 10:06am Subject: Re: Tourist Question for Washington DC area folks On 24 Aug 2004 at 18:33, Lou Novacheck , who eschews obfuscation, wrote: > I haven't lived in that area since 9/11, but when I did live there, > I'd usually advise people to contact their local Senator or Rep's > office to arrange it. I'm retired Army, and that used to carry a > little weight for some official tourist things. Dunno if it still > does. You're right. Need to coordinate through Senator or Rep's office. If retired Army doesn't carry some weight, it should. Faggots probably get priority scheduling. > Right after 9/11, they stopped the tours entirely. Also dunno if that's > the way it is now. However, if they are, in fact, offering tours, I'd > also advise people that in order to get tix on a walkup basis, you better > be in line at 0-dark-thirty or you better make other plans. No walk-up tours anymore. Only scheduled. But the scheduled tours are early. My wife's family had to get up at 5AM and gobble breakfast at the hotel to get there in time for the only slot I could get them for the Capitol. Not nice on a vacation. > FWIW, literally every person I took was very disappointed with the FBI > tour. Agreed. You didn't see much. You saw what is called the 'monkey house'. Not worth the wait in line. Even visiting there in an official capacity was patently unimpressive. For many, the weapons demo at the end may have been the first time they'd seen a live weapon fired. There's a lot to see in D.C. and the surrounding area. Personally I got a lot more out of touring Philly. But then I worked in D.C. (NoVa actually) for years and had my fill of anything inside the Beltway. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9445 From: Johnny Crow Date: Wed Aug 25, 2004 10:50am Subject: Re: No way to secure computers, mic, and web cam. Well Technical there is no such thing as a secure computer. There are always holes/bugs/problems and most of those are cause by human error. Whether bad programming, or physical access it is humans who for the most part or insecure. Besides that, if you are running a winbox and expect it to be secure you had better have tore it apart and rebuilt it from scratch. Other than that a more secure alternative is *nix (although still vulnerable) but in the case of bots, and virus (currently) there is very little worry for these machines. It is essential that you read security and bug reports. It is also good to know what you have open and what you dont. A good resourse to use is a HoneyPot or a machine desgined to attract would be hijackers in order to find out what type of exploit and vulnerabilities they are using. Another good thing to be wary of is Social Engineering. This is by far the easiest method of gaining access to computers, materials, passwords, or anything you want. This involves an attacker using direct contact (whether by phone or face to face) to convice the victim that they are someone they aren't (usually an offical or managment personnel) in order to divulge certian information. This is sometimes also known as phising. -Johnny Crow --- Gerald wrote: > A dirty litte secret of the Internet is that none of > our computers > have been secure and they are not able to secure > them. > The Russian Hang up group knows this and sells > credit card info on > the internet in IRC chat rooms.. > http://p082.ezboard.com/ffraudevidencelocker50744frm54.showMessage? > topicID=31.topic > > They are in the process of seting up attack bots > using megasploit > http://p082.ezboard.com/ffraudevidencelocker50744frm61.showMessage? > topicID=25.topic > > Hacking bots use your web cam and mic to spy on you. > http://p082.ezboard.com/ffraudevidencelocker50744frm61.showMessage? > topicID=31.topic > > and rootkits, > http://cigars.bravepages.com/antispy.htm > > which force your security systems to lie to you. > The new Microsoft security patch will cripple your > computer and many > Universitis have chose to NOT allow it to be down > loaded onto > University computer systems. > http://www.bizreport.com/article.php?art_id=7855 > > Teh computer industry want you to believe that a > firewall and anti- > virus and a sweeper keep you protected, and its a > lie. > > Wou can't stoop intrusions but you can spot them. > http://cigars.bravepages.com/antispy.htm > > Terrorist attack in USA on Oct 30th 2004. > http://p082.ezboard.com/ffraudevidencelocker50744frm71.showMessage? > topicID=33.topic > > Gerald > Internet Anthropologist, Ad Magnum > > > > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 9446 From: Steve Uhrig Date: Wed Aug 25, 2004 0:10pm Subject: NASA TSCM RFQ http://www.eps.gov/spg/NASA/HQ/OPHQDC/NNH04073384Q/SynopsisP.html Sole sourced to SystemWare Inc. of Thousand Oaks, California. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9447 From: Kohlenberg, Toby Date: Wed Aug 25, 2004 0:06pm Subject: RE: No way to secure computers, mic, and web cam. First off, it's METASPLOIT not "megasploit", secondly the goal isn't to "secure" the system, (the only completely secure system is the one soaked in salt water and filled with concrete sitting at the bottom of the ocean). The point is to make them sufficiently secure that you can accept the remaining risk. That said, you can make it very very very unlikely that anyone will be able to break into your system without specifically targeting you. Use a firewall and make sure it is set to default deny. Use antivirus software and keep it up to date. Don't run programs that have been sent to you by random people on the Internet or any program you didn't specifically request. Don't use P2P applications (or be very careful if you do). Second, what exactly is an "Internet Anthropologist"? t >-----Original Message----- >From: Gerald [mailto:geraldmsu@y...] >Sent: Tuesday, August 24, 2004 5:45 PM >To: TSCM-L@yahoogroups.com >Subject: [TSCM-L] No way to secure computers, mic, and web cam. > >A dirty litte secret of the Internet is that none of our computers >have been secure and they are not able to secure them. >The Russian Hang up group knows this and sells credit card info on >the internet in IRC chat rooms.. >http://p082.ezboard.com/ffraudevidencelocker50744frm54.showMessage? >topicID=31.topic > >They are in the process of seting up attack bots using megasploit >http://p082.ezboard.com/ffraudevidencelocker50744frm61.showMessage? >topicID=25.topic > >Hacking bots use your web cam and mic to spy on you. >http://p082.ezboard.com/ffraudevidencelocker50744frm61.showMessage? >topicID=31.topic > > and rootkits, >http://cigars.bravepages.com/antispy.htm > >which force your security systems to lie to you. >The new Microsoft security patch will cripple your computer and many >Universitis have chose to NOT allow it to be down loaded onto >University computer systems. >http://www.bizreport.com/article.php?art_id=7855 > >Teh computer industry want you to believe that a firewall and anti- >virus and a sweeper keep you protected, and its a lie. > >Wou can't stoop intrusions but you can spot them. >http://cigars.bravepages.com/antispy.htm > >Terrorist attack in USA on Oct 30th 2004. >http://p082.ezboard.com/ffraudevidencelocker50744frm71.showMessage? >topicID=33.topic > >Gerald >Internet Anthropologist, Ad Magnum > > > > > > >------------------------ Yahoo! Groups Sponsor >--------------------~--> >$9.95 domain names from Yahoo!. Register anything. >http://us.click.yahoo.com/J8kdrA/y20IAA/yQLSAA/UBhwlB/TM >--------------------------------------------------------------- >-----~-> > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > 9448 From: Michael Puchol Date: Wed Aug 25, 2004 0:59pm Subject: Re: NASA TSCM RFQ Hi Steve, " The ScenarioFlex Portable TSCM System is a self contained computer using the vendor's proprietary hardware and software configured in such a way by the vendor that it can detect, analyze, identify, and discriminate among radio frequency signals and electrical impulses in a far more sophisticated manner than lesser such systems available to private industry " Is this true, or just some Good Old Snake Oil? Regards, Mike ----- Original Message ----- From: "Steve Uhrig" To: Sent: Wednesday, August 25, 2004 7:10 PM Subject: [TSCM-L] NASA TSCM RFQ > http://www.eps.gov/spg/NASA/HQ/OPHQDC/NNH04073384Q/SynopsisP.html > > Sole sourced to SystemWare Inc. of Thousand Oaks, California. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9449 From: Michael Puchol Date: Wed Aug 25, 2004 1:05pm Subject: Re: No way to secure computers, mic, and web cam. Hi all, This is just a tip that may be useful to some, there is a piece of software called VMWare, with Windows and Linux version, which basically create 'virtual' computers inside your computer. In these virtual PCs you can install almost any OS you can think of, from MS-DOS, to Windows XP or Linux flavours. I had a problem with some old radios that wanted MS-DOS for the programming software, using the serial port, and VMWare solved the problem, as you can map your PCs real serial ports to the virtual machine, which can use them transparently, I just installed MS-DOS in one, mapped the serial port, and it worked! All from inside XP. The point here is that the virtual computer is isolated from your system, which means that it can have it's own IP on the LAN, and so you can use it to test software, open ports, run honeypots, etc., and all you will ever get compromised is a virtual machine with a virtual hard disk, nothing else. So, you can use it to run 'dangerous' apps such as P2P clients, etc. http://www.vmware.com Regards, Mike ----- Original Message ----- From: "Kohlenberg, Toby" To: Sent: Wednesday, August 25, 2004 7:06 PM Subject: RE: [TSCM-L] No way to secure computers, mic, and web cam. > > > First off, it's METASPLOIT not "megasploit", secondly the goal isn't > to "secure" the system, (the only completely secure system is the one > soaked in salt water and filled with concrete sitting at the bottom > of the ocean). The point is to make them sufficiently secure that you > can accept the remaining risk. > That said, you can make it very very very unlikely that anyone will > be able to break into your system without specifically targeting you. > Use a firewall and make sure it is set to default deny. > Use antivirus software and keep it up to date. > Don't run programs that have been sent to you by random people on the > Internet or any program you didn't specifically request. > Don't use P2P applications (or be very careful if you do). > > Second, what exactly is an "Internet Anthropologist"? > > t > > >-----Original Message----- > >From: Gerald [mailto:geraldmsu@y...] > >Sent: Tuesday, August 24, 2004 5:45 PM > >To: TSCM-L@yahoogroups.com > >Subject: [TSCM-L] No way to secure computers, mic, and web cam. > > > >A dirty litte secret of the Internet is that none of our computers > >have been secure and they are not able to secure them. > >The Russian Hang up group knows this and sells credit card info on > >the internet in IRC chat rooms.. > >http://p082.ezboard.com/ffraudevidencelocker50744frm54.showMessage? > >topicID=31.topic > > > >They are in the process of seting up attack bots using megasploit > >http://p082.ezboard.com/ffraudevidencelocker50744frm61.showMessage? > >topicID=25.topic > > > >Hacking bots use your web cam and mic to spy on you. > >http://p082.ezboard.com/ffraudevidencelocker50744frm61.showMessage? > >topicID=31.topic > > > > and rootkits, > >http://cigars.bravepages.com/antispy.htm > > > >which force your security systems to lie to you. > >The new Microsoft security patch will cripple your computer and many > >Universitis have chose to NOT allow it to be down loaded onto > >University computer systems. > >http://www.bizreport.com/article.php?art_id=7855 > > > >Teh computer industry want you to believe that a firewall and anti- > >virus and a sweeper keep you protected, and its a lie. > > > >Wou can't stoop intrusions but you can spot them. > >http://cigars.bravepages.com/antispy.htm > > > >Terrorist attack in USA on Oct 30th 2004. > >http://p082.ezboard.com/ffraudevidencelocker50744frm71.showMessage? > >topicID=33.topic > > > >Gerald > >Internet Anthropologist, Ad Magnum > > > > > > > > > > > > > >------------------------ Yahoo! Groups Sponsor > >--------------------~--> > >$9.95 domain names from Yahoo!. Register anything. > >http://us.click.yahoo.com/J8kdrA/y20IAA/yQLSAA/UBhwlB/TM > >--------------------------------------------------------------- > >-----~-> > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9450 From: Dotzero Date: Wed Aug 25, 2004 2:42pm Subject: Re: No way to secure computers, mic, and web cam. First time poster, short time lurker. Actually, Metasploit is an interesting tool. Too bad Gerald didn't take the time to go beyond a news article. The included exploits and payloads are, for the most part, older and if someone is current on patches and taken a little bit of effort to harden their box, not very effective. The vncinject.dll payload caught my eye. Overall it's a useful tool for pen testing and the fact that it can be misused by people with bad intentions is no different than any other tool. The price is certainly right compared to Core Impact or Canvas. Mike 9451 From: Robert G. Ferrell Date: Wed Aug 25, 2004 0:40pm Subject: RE: No way to secure computers, mic, and web cam. At 10:06 AM 8/25/2004 -0700, Kohlenberg, Toby wrote: >First off, it's METASPLOIT not "megasploit", secondly the goal isn't >to "secure" the system, (the only completely secure system is the one >soaked in salt water and filled with concrete sitting at the bottom >of the ocean). The point is to make them sufficiently secure that you >can accept the remaining risk. I don't wish to appear contrary, but infosec is not really the primary focus of this list. There are plenty of other venues for this sort of discussion. While there are a couple of people on this list I'd consider highly knowledgeable in this field, I think we'd all be better off to stay on topic. RGF 9452 From: Monty Date: Wed Aug 25, 2004 3:41pm Subject: Re: NASA TSCM RFQ For the most part it is true. I love using this system. Lets the operater spend more time on what is important. Monty --- Michael Puchol wrote: > Hi Steve, > > " The ScenarioFlex Portable TSCM System is a self > contained computer using > the vendor's proprietary hardware and software > configured in such a way by > the vendor that it can detect, analyze, identify, > and discriminate among > radio frequency signals and electrical impulses in a > far more sophisticated > manner than lesser such systems available to private > industry " > > Is this true, or just some Good Old Snake Oil? > > Regards, > > Mike > > > ----- Original Message ----- > From: "Steve Uhrig" > To: > Sent: Wednesday, August 25, 2004 7:10 PM > Subject: [TSCM-L] NASA TSCM RFQ > > > > > http://www.eps.gov/spg/NASA/HQ/OPHQDC/NNH04073384Q/SynopsisP.html > > > > Sole sourced to SystemWare Inc. of Thousand Oaks, > California. > > > > Steve > > > > > > > ******************************************************************* > > Steve Uhrig, SWS Security, Maryland (USA) > > Mfrs of electronic surveillance equip > > mailto:Steve@s... website > http://www.swssec.com > > tel +1+410-879-4035, fax +1+410-836-1190 > > "In God we trust, all others we monitor" > > > ******************************************************************* > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > > > =================================================== > TSKS > > Yahoo! Groups Links > > > > > > > > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail 9453 From: James M. Atkinson Date: Wed Aug 25, 2004 3:52pm Subject: Moderators Gentle Guidance As the list moderator and owner I would like to gentle remind the list membership to try to keep the majority of list traffic focused on TSCM, bug sweeping, wiretap detecting, and related topics. A little bit of humor, political tidbits, or news and such is fine, but lets not turn this into a forum for computer security and information security (too many of those already). As part of what we do involves a lot of analysis of physical security, intelligence analysis, access controls, IDS, and many of us come from a military background such topics of a related nature is fine. The problem is that the noise level of Info-Sec issues tends to be extremely high, and the signal level tends to be extremely low. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9454 From: G P Date: Wed Aug 25, 2004 6:29pm Subject: Re: NASA TSCM RFQ Those guys have some pretty neat hardware, including a portable PDA-based analysis system based on the R&S FSH6 handheld spectrum analyzer. Basically the PDA interfaces via optical link, and can be used for RF "fingerprinting" of hostile devices including spread spectrum, modulation signatures, subcarrier detection etc. Lots of different demodulators onboard, including every mobile spec (has audio out) and can dump GSM to disk for subsequent analysis - cool device for analyzing A5/1 for less than $20K. --- Steve Uhrig wrote: > http://www.eps.gov/spg/NASA/HQ/OPHQDC/NNH04073384Q/SynopsisP.html > > Sole sourced to SystemWare Inc. of Thousand Oaks, > California. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website > http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > $9.95 domain names from Yahoo!. Register anything. > http://us.click.yahoo.com/J8kdrA/y20IAA/yQLSAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail 9455 From: Mitch D Date: Thu Aug 26, 2004 1:48am Subject: Re: NASA TSCM RFQ In accordance with the paperwork reduction act,I decoded the RFP: Gateway Laptop with Win Radio,must include a companion AOR 3000 in a pelican case,complete w Nevada discone antenna on a cart with a 12 foot ground strap,and a BON equipped alligator clip,system must be configured w green "all clear light",and amber and red wig wag illumination to advise of threat presence ;)SBA set aside 1 Sorry Steve, I couldnt resist --- Steve Uhrig wrote: > http://www.eps.gov/spg/NASA/HQ/OPHQDC/NNH04073384Q/SynopsisP.html > > Sole sourced to SystemWare Inc. of Thousand Oaks, California. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 9456 From: James M. Atkinson Date: Thu Aug 26, 2004 1:15am Subject: TSCM Referals I am interested in increasing the database I have of TSCM folks to whom I can refer sweep work out to, and would be happy hear from list members who offer weep services, and I would be happy to review any resume, document, brochures you may care to send. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9457 From: Lee Bowyer Date: Thu Aug 26, 2004 4:45am Subject: Re: No way to secure computers, mic, and web cam. I can't get to your links... "The post you selected no longer exists. It may have been recently deleted." -- Lee Bowyer Lee@n... www.networkpenetration.com 9458 From: spectreman51 Date: Wed Aug 25, 2004 8:32pm Subject: Optoelectronics X Sweeper Hello all. I am wondering how suitable the Optoelectronics X Sweeper is for TSCM work. Has anyone had any experience with this unit ? I have owned a Xplorer, but was no good for TSCM use. Kept locking up on broadcast signals all the time. The X Sweeper sounds much better. Regards, Chris. 9459 From: delta Date: Thu Aug 26, 2004 5:23am Subject: gsm interceptor hello everybody a link with an interceptor but maybe a probleme with the price .... hummmm very low price .... http://trans.voila.fr/voila?systran_lp=en_fr&systran_f=1093382427&systran_id =Voila-fr&systran_url=http%3A%2F%2Fwww.gsmss.as.ro%2FVersions_of_Products.ht m and this one for the technical part http://trans.voila.fr/voila?systran_lp=en_fr&systran_f=1093383440&systran_id =Voila-fr&systran_url=http%3A%2F%2Fwww.gsmss.as.ro%2FTechnical_Part.htm david from paris 9460 From: Cristian Date: Thu Aug 26, 2004 0:12pm Subject: Re: gsm interceptor www.as.ro is the direct link. ro means Romania, my country. It seems to be a performance measurement device, rather than a listening one.. Cristian >hello everybody >a link with an interceptor but maybe a probleme with the price .... hummmm >very low price .... >http://trans.voila.fr/voila?systran_lp=en_fr&systran_f=1093382427&systran_id ---------- --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.733 / Virus Database: 487 - Release Date: 02/08/04 [Non-text portions of this message have been removed] 9461 From: contranl Date: Thu Aug 26, 2004 0:14pm Subject: Re: gsm interceptor (scam ?) . Here is the direct link: http://www.gsmss.as.ro/ First sight conlusion: It is to cheap..(4000 Euro's)....so can't be true. Why 1) Why sell something that if it works could be sold for 4 to 10 times that price...i know people who would easely pay that but don''t know where to get it... Why 2) If you look at the obviously purpose built (dual) receivers alone wich do look expensive...at 4000 Euro they won't make any profit. then there is the laptop wich alone costs 1000 Euro's Would you sell such a "hot item" for 200 Euro's profit ? Why 3) To much attention is given on the antenna amplifiers... for a real gsm interceptor manufacturer...antennas are something not even worth to mention..said different...if you make such a real unit...you won't spend 30% of your website on just the antenna- amplifier Why 4) There ordering system is certainly very unusual....and it looks to me like they first are trying to find out whith whom they are dealing to establish there "selling" tactics (and risks) Why 5) A little to much attention on UPS and DHL ...wich are well respected companies...so they use them to get a "solid" look Why 6) Then there is the pop-up ad ...inviting you to make online money when you click on it it directs you to a non-existing page very bad to do that ...specially when your visitors are already very suspicious...it could be that they are to stupid to realise that.. Why 7) I won't even discuss the technical part...one or 2 things i notice is that they say they use the soundcard to input whatever is received into the computer !!!!! very unlikely. So they don't use a dedicated demodulator for that i have serious doubts if that is possible..a Gsm signal is not a simple and slow fsk signal. It looks like the laptop has to do everyting at the same time Demodulating the GSM signal (analog to digital conversion) Controlling the receivers Separating the signalling and voice parts Decrypting the A5 encryption All of that at the same (real) time. .................................... I dont know but ...i don't trust it. I guess we never know untill someone wants to risk the 4000 Euro These kind of advertisements have been around for almost 3 years now and i have never heard if such a lowcost system really works. A5 encryption has only recently been cracked ..i do'nt know what kind of processing power was used for that...but i doubt if it is do- able with just a laptop ( you may look that up using Google and look for "A5 encryption") There are some Far East interceptors being advertised with little or no computing power...they must be intended for systems (like China) that dont have A5 encryption...these systems where installed before A5 was released from the restricted export lists The problem ofcourse is that if someone uses such a system and it works well the won't tell me :) :) Anyway if someone can come up with the money i would certainly like to take part of a little investigative reporting. Very soon i will prepare a list of all "Gsm interceptors" available on the net...i would like to add some comments to that list about if they are "real" or "scams"...i hope you understand that is a difficult task Feel free to mail me here or private with any information that i could add(or not)to such a page. Tetrascanner www.tetrascanner.com 9462 From: Robert Dyk Date: Thu Aug 26, 2004 0:47pm Subject: Yagis I have 6 pole mountable UHF YAGIs for sale, all excellent condition. (456 MHz, 6 element, 2 reflector + 4 director) originally manf. by Lindsay (I think). UHF type connector requires PL259 on the cable. Pole hardware is included. Any interest please respond via private email, Cheers Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada 9463 From: Shawn Hughes (Road) Date: Thu Aug 26, 2004 4:37pm Subject: Re:Autonomous Threat Analysis At 02:23 PM 8/26/04 +0000, you wrote: >In accordance with the paperwork reduction act,I decoded the >RFP: >Gateway Laptop with Win Radio, Pretty funny, Mitch! To help tweak the list back OT, what DOES everybody think about Autonomous (not just Automated) Threat Analysis? I see several people whose RF segment comprises an OSCOR and a wideband RF detector. Does standalone detection and analysis have a place in the professionals' toolbox? Or is it an item for low-threat continuous monitoring and less - knowledgeable sweepers? -Shawn ==================================== Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response, LLC www.warriormindset.com ////////////////////////////////////////////////////////////////////////////// ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. 9464 From: James M. Atkinson Date: Thu Aug 26, 2004 2:32pm Subject: Re: NASA TSCM RFQ If it is an official DOD/DOS sanctioned, U.S. Government TSCM system, then it is going to need an color overhead projector, a DVD player, a copy of PowerPoint for the laptop, and a color laser printer to make pretty handouts, and copy of Excel to figure out the expense report, and a copy of Word to tweak up the standardized reports.. -jma At 02:48 AM 8/26/2004, Mitch D wrote: >In accordance with the paperwork reduction act,I decoded the >RFP: >Gateway Laptop with Win Radio,must include a companion AOR 3000 >in a pelican case,complete w Nevada discone antenna on a cart >with a 12 foot ground strap,and a BON equipped alligator >clip,system must be configured w green "all clear light",and >amber and red wig wag illumination to advise of threat presence >;)SBA set aside 1 >Sorry Steve, I couldnt resist >--- Steve Uhrig wrote: > > > >http://www.eps.gov/spg/NASA/HQ/OPHQDC/NNH04073384Q/SynopsisP.html > > > > Sole sourced to SystemWare Inc. of Thousand Oaks, California. > > > > Steve ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9465 From: James M. Atkinson Date: Thu Aug 26, 2004 3:49pm Subject: Re: Re:Autonomous Threat Analysis Shawn, By far the best way to find covert eavesdropping devices is an extremely sensitive spectrum analyzers (such as the Agilent ESA and PSA) and high quality receivers with multiple external antenna and low noise amplifiers. The equipment is typically operated under computer control, and often multiple instruments (more then one spectrum analyzer) is used at a time so as to reduce the time required for the sweep. Essentially the spectrum analyzer and receiver is used to identify ANYTHING that rises up of the -174 dBm noise floor, then the signal is indexed and cataloged so it can be "handed off" to the operator for analysis, or is subjected to really intense automated signal analysis. The whole secret in doing this is to use an antenna that is as close to resonance as possible, or at least does not attenuate the signal more than a few dB, then pre-select the signal of interest to isolate it from the rest of the RF spectrum as much as possible (to cut down harmonic interference, IMD, etc), and then pre-amplify it so that the -174 dBm noise floor can be "lifted" into the measurement range of the instrument. You do have to be careful about cable and connection attenuation, and the noise figures of your amplifiers (usually under 3 dB below 18 Ghz, but under 1 dB is best). Same applies for your instruments, but the noise fiq. A good rule of thumb is to indicate a suspect signal relative to the -174 dBm noise floor relative to a 1 Hz IF RBW.. ie: +40 dBnf(-174, 1Hz) or just as 40 dBnf. So, in answer to your question... Yes, stand alone RF analysis has a MAJOR, repeat MAJOR place in every TSCM'ers knowledge base, and equipment inventory. The only impediment to being able to do this is the very high cost of equipment, and the complexity of using it. -jma At 05:37 PM 8/26/2004, Shawn Hughes (Road) wrote: >At 02:23 PM 8/26/04 +0000, you wrote: > >In accordance with the paperwork reduction act,I decoded the > >RFP: > >Gateway Laptop with Win Radio, > >Pretty funny, Mitch! > >To help tweak the list back OT, what DOES everybody think about Autonomous >(not just Automated) Threat Analysis? I see several people whose RF segment >comprises an OSCOR and a wideband RF detector. > >Does standalone detection and analysis have a place in the professionals' >toolbox? Or is it an item for low-threat continuous monitoring and less - >knowledgeable sweepers? > >-Shawn ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9466 From: Tech Sec Lab Date: Thu Aug 26, 2004 5:59pm Subject: Wi-Fi Detector Going back to what Andy from SA said about gift ideas for clients.... Here's one.... http://www.smithmicro.com/default.tpl?sku=WIFISEEKER&cart=1093563962272397&g roup=product_full Quality unknown. 9467 From: James M. Atkinson Date: Thu Aug 26, 2004 8:01pm Subject: Does anybody have any interest? I am trying to determine if there would be much interest by list members for a program to drive an R8500, R20, or PCR1000 and make it "DO TSCM". I am asking this as I have several A.I.s (Artificial Intelligence, or Daemons) that I developed, and have taught them to perform essential TSCM functions on these radios completely under computer control. I am interested in putting these AI's out in the wild for a while for other TSCM folks to use and see if the users have any feedback. Does anybody on the list have any comments, suggestions, or idea's on the topic? -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9468 From: Charles Patterson Date: Thu Aug 26, 2004 8:51pm Subject: Re: TSCM Referals ----- Original Message ----- From: James M. Atkinson To: TSCM-L Sent: Thursday, August 26, 2004 2:15 AM Subject: [TSCM-L] TSCM Referals would be happy hear from list members who offer weep services, and I would be happy to review any resume, document, brochures you may care to send. -jma hmm, "weep services" I suppose that would include such as for funerals, weddings, stock market crashes, and perhaps some computer crashes... :) ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ---------------------------------------------------------------------------- From: James M. Atkinson Date: Thu Aug 26, 2004 9:12pm Subject: Re: TSCM Referals Bunch of smart asses on the list. ;-) That is SWEEP services, not weep services. -jma At 09:51 PM 8/26/2004, Charles Patterson wrote: > ----- Original Message ----- > From: James M. Atkinson > To: TSCM-L > Sent: Thursday, August 26, 2004 2:15 AM > Subject: [TSCM-L] TSCM Referals > > > would be happy hear from list members who > offer weep services, and I would be happy to review any resume, document, > brochures you may care to send. > > -jma > > >hmm, "weep services" >I suppose that would include such as for funerals, weddings, stock market >crashes, and perhaps some computer crashes... > >:) ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9470 From: J. Molay Date: Thu Aug 26, 2004 11:21am Subject: Re: gsm interceptor On Thu, 26 Aug 2004 12:23:27 +0200 "delta" wrote: > hello everybody > a link with an interceptor but maybe a probleme with the price .... hummmm > very low price .... > http://trans.voila.fr/voila?systran_lp=en_fr&systran_f=1093382427&systran_id > =Voila-fr&systran_url=http%3A%2F%2Fwww.gsmss.as.ro%2FVersions_of_Products.ht > m > > and this one for the technical part > http://trans.voila.fr/voila?systran_lp=en_fr&systran_f=1093383440&systran_id > =Voila-fr&systran_url=http%3A%2F%2Fwww.gsmss.as.ro%2FTechnical_Part.htm > > david from paris It sounds like a scam... You should NOT (under any circumstances) send the money through Western Union to east europe countries. Once money is sent via Western Union, especially to Europe, no password or anything else is needed to claim the funds. Some outlets require an ID, which is easily bypassed by using a fake one, and in some countries, no ID is necessary at all, as long as the scammer has the transaction number of the funds. Keep in mind, they will try to sweet talk to you, and reassure you that the transaction will be secure and in your best interest. NO MATTER WHAT SECURITIES THEY OFFER YOU, do not carry through with the transaction. > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > -- J. Molay 9471 From: G P Date: Thu Aug 26, 2004 3:17pm Subject: Re: Re: gsm interceptor (scam ?) There is no way that it's doing realtime A5/1 decoding, not possible with that hardware. --- contranl wrote: > . > > Here is the direct link: > > http://www.gsmss.as.ro/ > > > First sight conlusion: > > It is to cheap..(4000 Euro's)....so can't be true. > > > Why 1) > > Why sell something that if it works could be sold > for 4 to 10 times > that price...i know people who would easely pay that > but don''t know > where to get it... > > > Why 2) > > If you look at the obviously purpose built (dual) > receivers alone > wich do look expensive...at 4000 Euro they won't > make any profit. > then there is the laptop wich alone costs 1000 > Euro's > > Would you sell such a "hot item" for 200 Euro's > profit ? > > > Why 3) > > To much attention is given on the antenna > amplifiers... > for a real gsm interceptor manufacturer...antennas > are something > not even worth to mention..said different...if you > make such a real > unit...you won't spend 30% of your website on just > the antenna- > amplifier > > > Why 4) > > There ordering system is certainly very > unusual....and it looks to > me like they first are trying to find out whith whom > they are dealing > to establish there "selling" tactics (and risks) > > > Why 5) > > A little to much attention on UPS and DHL ...wich > are well respected > companies...so they use them to get a "solid" look > > > Why 6) > > Then there is the pop-up ad ...inviting you to make > online money > when you click on it it directs you to a > non-existing page > very bad to do that ...specially when your visitors > are already very > suspicious...it could be that they are to stupid to > realise that.. > > > Why 7) > > I won't even discuss the technical part...one or 2 > things i notice > is that they say they use the soundcard to input > whatever is received > into the computer !!!!! very unlikely. > So they don't use a dedicated demodulator for that > > i have serious doubts if that is possible..a Gsm > signal is not a > simple and slow fsk signal. > > It looks like the laptop has to do everyting at the > same time > > Demodulating the GSM signal (analog to digital > conversion) > Controlling the receivers > Separating the signalling and voice parts > Decrypting the A5 encryption > > All of that at the same (real) time. > > .................................... > > > I dont know but ...i don't trust it. > > I guess we never know untill someone wants to risk > the 4000 Euro > These kind of advertisements have been around for > almost 3 years now > and i have never heard if such a lowcost system > really works. > > A5 encryption has only recently been cracked ..i > do'nt know what > kind of processing power was used for that...but i > doubt if it is do- > able with just a laptop ( you may look that up using > Google and look > for "A5 encryption") > > There are some Far East interceptors being > advertised with little or > no computing power...they must be intended for > systems (like China) > that dont have A5 encryption...these systems where > installed before > A5 was released from the restricted export lists > > The problem ofcourse is that if someone uses such a > system and it > works well the won't tell me :) :) > > Anyway if someone can come up with the money i would > certainly like > to take part of a little investigative reporting. > > Very soon i will prepare a list of all "Gsm > interceptors" available > on the net...i would like to add some comments to > that list about > if they are "real" or "scams"...i hope you > understand that is a > difficult task > > Feel free to mail me here or private with any > information that i > could add(or not)to such a page. > > Tetrascanner > www.tetrascanner.com > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > $9.95 domain names from Yahoo!. Register anything. > http://us.click.yahoo.com/J8kdrA/y20IAA/yQLSAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > === message truncated === __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail 9472 From: Jack Lloyd Date: Thu Aug 26, 2004 4:50pm Subject: Re: Re: gsm interceptor (scam ?) On Thu, Aug 26, 2004 at 05:14:21PM -0000, contranl wrote: > A5 encryption has only recently been cracked ..i do'nt know what > kind of processing power was used for that...but i doubt if it is do- > able with just a laptop ( you may look that up using Google and look > for "A5 encryption") A5/1 (the strongest version) was broken in 2000. With some one time precomputation (which takes up 300 Gb of data), you can break A5/1 in real-time on a 2000-era PC given a small amount of traffic. And A5/2 is trivially weak, it can easily be broken on a laptop. Also, there are attacks against GSM authentication with, for example, basestations that do a man in the middle attack between a phone and a real basestation. You can find some details of these systems in Anderson's Security Engineering -- he mentions systems like what you described, though he doesn't refer to cost. Apparently they are fairly commonly used in police investigations in areas that use GSM. Jack 9473 From: David Rom Date: Thu Aug 26, 2004 9:42pm Subject: RE: TSCM Referrals Hi James I'm your man in Israel and Europe. If you have any job at those areas, I will be more than happy to make the sweeps. David Rom david@g... CTO GD Intelligence Security LTD. www.gdis.co.il Office: +972-9-7676663 Fax: +972-9-7676665 Mobile: +972-54-449979 -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Thursday, August 26, 2004 8:16 AM To: TSCM-L Subject: [TSCM-L] TSCM Referals I am interested in increasing the database I have of TSCM folks to whom I can refer sweep work out to, and would be happy hear from list members who offer weep services, and I would be happy to review any resume, document, brochures you may care to send. -jma ---------------------------------------------------------------------------- ------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9474 From: Edward Hirst Date: Thu Aug 26, 2004 0:45pm Subject: Re: Re: gsm interceptor (scam ?) Also worth noting.. Their only contact details are an email address. Their site is just on a hosting account on some local Romanian server (explaining the pop up ads) They only accept payment by MoneyGram or Western Union. So nothing to stop them taking the money and running. Given the wonderful version of Romanian English - (worthy of translations in the old Micro Catalogs from Japan) can you imagine the menus and documentation that will come with the software. Go on send 4000 Euro cash to an anonymous Romanian for a hot product.. If it arrives let us know ;o) Edward Hirst Equinox Research Ltd. +44 777 000 0000 On 26/8/04 6:14 pm, "contranl" wrote: > . > > Here is the direct link: > > http://www.gsmss.as.ro/ > > > First sight conlusion: > > It is to cheap..(4000 Euro's)....so can't be true. > > > Why 1) > > Why sell something that if it works could be sold for 4 to 10 times > that price...i know people who would easely pay that but don''t know > where to get it... > > > Why 2) > > If you look at the obviously purpose built (dual) receivers alone > wich do look expensive...at 4000 Euro they won't make any profit. > then there is the laptop wich alone costs 1000 Euro's > > Would you sell such a "hot item" for 200 Euro's profit ? > > > Why 3) > > To much attention is given on the antenna amplifiers... > for a real gsm interceptor manufacturer...antennas are something > not even worth to mention..said different...if you make such a real > unit...you won't spend 30% of your website on just the antenna- > amplifier > > > Why 4) > > There ordering system is certainly very unusual....and it looks to > me like they first are trying to find out whith whom they are dealing > to establish there "selling" tactics (and risks) > > > Why 5) > > A little to much attention on UPS and DHL ...wich are well respected > companies...so they use them to get a "solid" look > > > Why 6) > > Then there is the pop-up ad ...inviting you to make online money > when you click on it it directs you to a non-existing page > very bad to do that ...specially when your visitors are already very > suspicious...it could be that they are to stupid to realise that.. > > > Why 7) > > I won't even discuss the technical part...one or 2 things i notice > is that they say they use the soundcard to input whatever is received > into the computer !!!!! very unlikely. > So they don't use a dedicated demodulator for that > i have serious doubts if that is possible..a Gsm signal is not a > simple and slow fsk signal. > > It looks like the laptop has to do everyting at the same time > > Demodulating the GSM signal (analog to digital conversion) > Controlling the receivers > Separating the signalling and voice parts > Decrypting the A5 encryption > > All of that at the same (real) time. > > .................................... > > > I dont know but ...i don't trust it. > > I guess we never know untill someone wants to risk the 4000 Euro > These kind of advertisements have been around for almost 3 years now > and i have never heard if such a lowcost system really works. > > A5 encryption has only recently been cracked ..i do'nt know what > kind of processing power was used for that...but i doubt if it is do- > able with just a laptop ( you may look that up using Google and look > for "A5 encryption") > > There are some Far East interceptors being advertised with little or > no computing power...they must be intended for systems (like China) > that dont have A5 encryption...these systems where installed before > A5 was released from the restricted export lists > > The problem ofcourse is that if someone uses such a system and it > works well the won't tell me :) :) > > Anyway if someone can come up with the money i would certainly like > to take part of a little investigative reporting. > > Very soon i will prepare a list of all "Gsm interceptors" available > on the net...i would like to add some comments to that list about > if they are "real" or "scams"...i hope you understand that is a > difficult task > > Feel free to mail me here or private with any information that i > could add(or not)to such a page. > > Tetrascanner > www.tetrascanner.com > > > > > > > > > > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9475 From: G P Date: Thu Aug 26, 2004 8:31pm Subject: Re: Does anybody have any interest? I'm already working on one for the R10 via the CT-17, done in Python for detecting GPS chipping birdies - eventual design is handheld control based on the Zaurus PDA (linux running Python). What language is your existing code in? --- "James M. Atkinson" wrote: > > I am trying to determine if there would be much > interest by list members > for a program to drive an R8500, R20, or PCR1000 and > make it "DO TSCM". > > I am asking this as I have several A.I.s (Artificial > Intelligence, or > Daemons) that I developed, and have taught them to > perform essential TSCM > functions on these radios completely under computer > control. > > I am interested in putting these AI's out in the > wild for a while for other > TSCM folks to use and see if the users have any > feedback. > > Does anybody on the list have any comments, > suggestions, or idea's on the > topic? > > -jma > > > > > ----------------------------------------------------------------------------------------------------- > > > We Expertly Hunt Real Spies, Real Eavesdroppers, and > Real Wiretappers. > ----------------------------------------------------------------------------------------------------- > > > James M. Atkinson > Phone: (978) 381-9111 > Granite Island Group Fax: > > 127 Eastern Avenue #291 > Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > ----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent > Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > ----------------------------------------------------------------------------------------------------- > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > $9.95 domain names from Yahoo!. Register anything. > http://us.click.yahoo.com/J8kdrA/y20IAA/yQLSAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > _______________________________ Do you Yahoo!? Win 1 of 4,000 free domain names from Yahoo! Enter now. http://promotions.yahoo.com/goldrush 9476 From: contranl Date: Thu Aug 26, 2004 11:53pm Subject: Interactive demo of Rhode & Schwarz FSH3 Spectrum Analyzer . (Not shure if this has been posted before) Have a look at this very nice: Interactive demo of Rhode & Schwarz FSH3 Spectrum Analyzer There is skip-intro button somewhere wich you may not see right away since the screen is very big...best is to open it in full screen ! http://www.cms.rohdeschwarz.com/live/rs/product/product_simulation/si m/40c46d72aaedc.sim/fsh3mov.html If link ist kaputt dann bitte hier: http://tinyurl.com/46unp Tetrascanner www.tetrascanner.com 9477 From: Mike Dever Date: Fri Aug 27, 2004 3:13am Subject: Re: Does anybody have any interest? Jim I for one would be interested in such a program.I have a couple of questions: What exactly do you mean by "DO TSCM"? I noticed that the receivers you listed are all Icom. What about other 'software controlled' receivers on the market (dare I mention WinRadio)? Regards Mike On 27 Aug 2004, at 11:01, James M. Atkinson wrote: > > I am trying to determine if there would be much interest by list > members > for a program to drive an R8500, R20, or PCR1000 and make it "DO TSCM". > > I am asking this as I have several A.I.s (Artificial Intelligence, or > Daemons) that I developed, and have taught them to perform essential > TSCM > functions on these radios completely under computer control. > > I am interested in putting these AI's out in the wild for a while for > other > TSCM folks to use and see if the users have any feedback. > > Does anybody on the list have any comments, suggestions, or idea's on > the > topic? > > -jma > > > > > ----------------------------------------------------------------------- > ------------------------------ > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ----------------------------------------------------------------------- > ------------------------------ > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: > http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ----------------------------------------------------------------------- > ------------------------------ > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ----------------------------------------------------------------------- > ------------------------------ > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Voice: (02) 6254 5337 Email: dca@b... This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 9478 From: Michael Puchol Date: Fri Aug 27, 2004 3:14am Subject: Re: Re: gsm interceptor (scam ?) What we must always remember is that if > Apparently they are fairly commonly used in police > investigations in areas that use GSM. then the investigation is being conducted illegally. I'm not sure what the state of affairs on court orders for wiretaps is like in the U.S. post-PATRIOT act, so maybe these requirements have been waived and it's a free-for-all. AFAIK if a LEA needed to intercept a cellular phone, it was much easier to call the operator and have *them* set up a trace, to which they can listen in the comfort of their office rather than a hot, uncomfortable roving van. The only use for these interceptors is to a) conduct illegal surveillance or b) conduct surveillance on foreign networks to which you don't have legal access. Other possiblities come to mind but they are all shady anyhow. Best regards, Mike 9479 From: taylortscm@y... Date: Fri Aug 27, 2004 1:51am Subject: Re: Does anybody have any interest? jim: I would be interested, and also what did you think of the icom r-20? dan "James M. Atkinson" wrote: I am trying to determine if there would be much interest by list members for a program to drive an R8500, R20, or PCR1000 and make it "DO TSCM". I am asking this as I have several A.I.s (Artificial Intelligence, or Daemons) that I developed, and have taught them to perform essential TSCM functions on these radios completely under computer control. I am interested in putting these AI's out in the wild for a while for other TSCM folks to use and see if the users have any feedback. Does anybody on the list have any comments, suggestions, or idea's on the topic? -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 9480 From: fjansgmxnet Date: Fri Aug 27, 2004 3:53am Subject: Re: Far East Spystuff / Video-scanner > Hi, > I know something, that is selled as "CATV spectrum analyzer" ( > hehe..) manufactured in China, and priced under 200$... > some tech. specs : > -freq. coverage : 5-870 MHz > -span ( variable ) from 1 to 865 MHz > -sensitivity ( variable) from 10 dBmicrovolts to 10 dbmilivolts > -large LCD screen ( about 4x8 cmxcm) > -in-builded NiCd batt.pack ( about 4 houres lifetime ) > I use this item with an ATV downconverter ( 2300-2500 MHz down to 200- > 400 MHz)...total bill is well under 400$... > and +of course, a homemade SBF 12 dBi antenna, not priced here.. > Rgrds Hi, a CATV monitor device would demodulate AM modulated TV-signals, correct? But transmissions in the 2300-2500 MHz range are in 99.9% of all cases FM modulated signals (like SATV), correct? So with a simple ATV-downconverter I think you will see only very very few pictures. You could use a simple downconverter together with a SATV-RX. But that is not a comfortable portable solution. Regards Frank 9481 From: J. Molay Date: Fri Aug 27, 2004 3:08am Subject: Re: Wi-Fi Detector On Fri, 27 Aug 2004 00:59:34 +0200 "Tech Sec Lab" wrote: > Going back to what Andy from SA said about gift ideas for clients.... > > Here's one.... > > http://www.smithmicro.com/default.tpl?sku=WIFISEEKER&cart=1093563962272397&g > roup=product_full > > Quality unknown. All those Wifiseekers are rebranded from CHRYSALIS DEVELOPMENT LLC http://www.wifiseeker.com/ http://www.smallnetbuilder.com/Reviews-146-ProdID-SEEKER.php (interesting review, and some "reverse engineering" or a wifiseeker) If you ask, they will send free sample for evaluation, the unit works very well with 802.11 b/g (medium to full power signals, low power gets undetected), and do not get affected (false positives) by bluetooth (even at a few cm from a Class I device) or others RF signals in the 2.4 Ghz band. The also can print your logo in the wifiseeker at low price. 9482 From: delta Date: Fri Aug 27, 2004 4:50am Subject: Re: Does anybody have any interest? hello james i do tscm in france since 1995 ( we re not a lot in france doing this) i use an old csr1, an old helwet packard and some opto counter ( m1 , scout , digital , sweeper ...) some receiver as aor 8200 , yeasu etc etc ... i m going to buy the deluxe cpm700 as soon as possible ( may be in september ) but her in france there is not a lot of work in tscm ... i can send you ( but in french) the paper i give to the client if you want but in private mail david from paris http://www.deltafrance.com 9483 From: fjansgmxnet Date: Fri Aug 27, 2004 4:00am Subject: Re: Far East Spystuff / Video-scanner > Hi, > the practical solution for your goal could be a palmsize lcd-screen TV > ( Casioxxx, etc) + (say) CalAmp 2,4 GHz antenna with in-builded > downconverter... total bill is under 500 $, and no time wasting... > With this arrangement you could pick-up a douzens of crying babies > even in far-field ( hehe, ..:) ) > Greetings, and success.... Hi, I think it is the same problem as like with the use of a CATV monitor: The Casio will demodulate AM TV-signals and in the 2.4GHZ range you will find 99.9% FM TV-signals. So you will receive only very few signals with this setup. Regards Frank 9484 From: Date: Fri Aug 27, 2004 9:46am Subject: Re: Re: gsm interceptor (scam ?) Virtually every government uses GSM interception. That is a plain fact of life, no matter what we think about legal aspects. They cannot call operator for help if they do not know what the number is or what name the GSM card was issued for. Even in Europe anyone can buy a no-name GSM card without showing any ID. Basically two systems exist: active (emulation of a cell station) and passive (signal interception and real time decoding). Every method of interception has its advantages and disadvantages. Wih active interception it is possible to swith off frequency hopping so that exact location can be fould with a simple handheld DF, for instance. A typical active system is G-900 made in Germany by Rohde und Schwarz, while Harris makes a complete passive system. Similar systems are produced in Russia and probably in Israel. Regards, A.W. "Michael Puchol" wrote: >What we must always remember is that if > >> Apparently they are fairly commonly used in police >> investigations in areas that use GSM. > >then the investigation is being conducted illegally. I'm not sure what the >state of affairs on court orders for wiretaps is like in the U.S. >post-PATRIOT act, so maybe these requirements have been waived and it's a >free-for-all. AFAIK if a LEA needed to intercept a cellular phone, it was >much easier to call the operator and have *them* set up a trace, to which >they can listen in the comfort of their office rather than a hot, >uncomfortable roving van. > >The only use for these interceptors is to a) conduct illegal surveillance or >b) conduct surveillance on foreign networks to which you don't have legal >access. Other possiblities come to mind but they are all shady anyhow. > >Best regards, > >Mike > > __________________________________________________________________ Switch to Netscape Internet Service. As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register Netscape. Just the Net You Need. New! Netscape Toolbar for Internet Explorer Search from anywhere on the Web and block those annoying pop-ups. Download now at http://channels.netscape.com/ns/search/install.jsp 9485 From: dj Date: Fri Aug 27, 2004 0:50pm Subject: ASIS International Anyone going to ASIS? www.asisonline.org Sept 27 and 28 I will be there. The Navy has cut me orders to attend. If anyone else is going we should do dinner and chat a few about TSCM. v/r, IT2 Garrett --------------------------------- Do you Yahoo!? New and Improved Yahoo! Mail - Send 10MB messages! [Non-text portions of this message have been removed] 9486 From: Shawn Hughes (Road) Date: Fri Aug 27, 2004 4:15pm Subject: Re: TSCM mod for the PCR At 01:59 PM 8/27/04 +0000, you wrote: >I am trying to determine if there would be much interest by list members >for a program to drive an R8500, R20, or PCR1000 and make it "DO TSCM". Jim, I kept one of those squirrelled away, waiting for people like you to start porting applicable software. With good antennas, filters and amplification, would a PCR1000 be a good platform for TSCM? I always wanted to get a copy of the HOKA Gold and see if it worth the price......... -Shawn ==================================== Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response, LLC www.warriormindset.com ////////////////////////////////////////////////////////////////////////////// ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. 9487 From: James M. Atkinson Date: Fri Aug 27, 2004 4:20pm Subject: Re: Re: TSCM mod for the PCR The PCR100 and PCR-1000 are great radio's for TSCM, but I have found it helpful to add a bandpass filter to the input as the PCR series lack the ability to knock down strong interfering signals, and are very prone to overload due to HF, CB's, etc. The radio provides good results if used with a 35 MHz and 130 MHz high pass filter (not at the same time), but tends to be touchy with the 150 MHz pager channels. I like the small size of the PCR100 (you can put it INSIDE a laptop), but the features of the PCR1000 are superior for the nominal extra cost. The PCR100 is no longer available, but its big brother is still available. The software that comes from ICOM is fine for listening to regular radio traffic, but I had to write my own software to optimize it for TSCM. Either radio works well in multiples, and you can run 8 of them from a single PCMCIA expansion card. In such a case you can give each radio a different bandpass filter, pre-amplifier, and tuned whip antenna. -jma At 05:15 PM 8/27/2004, Shawn Hughes (Road) wrote: >At 01:59 PM 8/27/04 +0000, you wrote: > >I am trying to determine if there would be much interest by list members > >for a program to drive an R8500, R20, or PCR1000 and make it "DO TSCM". > > >Jim, I kept one of those squirrelled away, waiting for people like you to >start porting applicable software. With good antennas, filters and >amplification, would a PCR1000 be a good platform for TSCM? I always >wanted to get a copy of the HOKA Gold and see if it worth the price......... > > >-Shawn >==================================== >Shawn Hughes >Special Projects Consultant and Subcontractor >110 Hughes Hale Lane, Harriman, TN 37748 USA >(865) 335-7992 Voicemail >srh@e... >/////////////////////////////////////////////////////////////////////////////// >Lead Instructor >Explosives, WMD, and Technical Operations >Tactical Response, LLC >www.warriormindset.com >////////////////////////////////////////////////////////////////////////////// > >******NOTICE: Due to the age of my email account, I have to set spam >filtering VERY high. If you do not receive a response in a reasonable >amount of time, please try an alternate communications method. I apologize >for the inconvienence. > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9488 From: moellerthy <1ach@g...> Date: Fri Aug 27, 2004 6:25pm Subject: Re: Does anybody have any interest? --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: I like the Icom pcr1000 but have not been able to get it to scan zero to 1000 Mhz and write the hits along the way. After several calls to Icom they could not help me reach my goal although the radio can sweep as I'd like it to. I use the AOR8000 on a regular bases for which it's sensitivity is great I can capture signals with a directional antenna attached where as the Icom radio's could not detect the signal. I would like the radio to be computer controlled to sweep zero to 1800 Mhz and write the hits to a log, though the radio is very cabable to do just that I have not been able to program it correctly. I do use the ICOM 8500 and can control it's feature's as well as the ICOM R100. I use a HP 8569B GOOD TO 44 GIG and would like software to pull the stored traces and print as well otherwise I will have to print using my Avcom system. Andre Holmes 1ach@G... Neptune Enterprise Security > > I am trying to determine if there would be much interest by list members > for a program to drive an R8500, R20, or PCR1000 and make it "DO TSCM". > > I am asking this as I have several A.I.s (Artificial Intelligence, or > Daemons) that I developed, and have taught them to perform essential TSCM > functions on these radios completely under computer control. > > I am interested in putting these AI's out in the wild for a while for other > TSCM folks to use and see if the users have any feedback. > > Does anybody on the list have any comments, suggestions, or idea's on the > topic? > > -jma > > > > > ------------------------------------------------------------------- ---------------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ------------------------------------------------------------------- ---------------------------------- > > James M. Atkinson Phone: (978) 546- 3803 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ------------------------------------------------------------------- ---------------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ------------------------------------------------------------------- ---------------------------------- 9489 From: Patrick Ryals, CEO Date: Fri Aug 27, 2004 4:08pm Subject: High Temp Epoxy(?) What effect will high temp epoxy have on potted circuit boards? Will it raise the temp of the boards? Any help would be greatly appreciated. Please respond privately this is a bit off topic. Sincerely, Patrick Ryals, CEO Nexus Investigations LA CA #22920 9490 From: contranl Date: Sat Aug 28, 2004 0:24am Subject: Re: High Temp Epoxy(?) . Usually all parameters that you need to know are indicated in the specs sheet of the stuff you want to use..that includes: The temperature it will generate during the hardening process,time it takes to completely stabilize,the % of shrinking,electrical resistance ,capacity etc... Just visit a website of a manufacturer and the specs should be there some of it is usuable for electrical circuits sometimes up to 3 Ghz. Take care if you go up to such high freqencies it might change a few pF's...so keep tuned circuit's free or accessable. Greetings Tetrascanner www.tetrascanner.com 9491 From: John and Sheryl Date: Sat Aug 28, 2004 0:28am Subject: RE: Does anybody have any interest? I also would be interested in developing software to automate some TSCM procedures. Is anyone familiar with BugFighter by Monteria? Possibly as a group we could work on your code and add features / functions. I am using a AOR8600 Mark2 and a Icom Ic-R7000. I would be willing to purchase a IC-R20 to work on this project and/or evaluate or provide feedback on the work you have already completed. John -----Original Message----- From: taylortscm@y... [mailto:taylortscm@y...] Sent: August 27, 2004 12:51 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Does anybody have any interest? jim: I would be interested, and also what did you think of the icom r-20? dan "James M. Atkinson" wrote: I am trying to determine if there would be much interest by list members for a program to drive an R8500, R20, or PCR1000 and make it "DO TSCM". I am asking this as I have several A.I.s (Artificial Intelligence, or Daemons) that I developed, and have taught them to perform essential TSCM functions on these radios completely under computer control. I am interested in putting these AI's out in the wild for a while for other TSCM folks to use and see if the users have any feedback. Does anybody on the list have any comments, suggestions, or idea's on the topic? -jma -------------------------------------------------------------------------- --------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. -------------------------------------------------------------------------- --------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com -------------------------------------------------------------------------- --------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -------------------------------------------------------------------------- --------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 9492 From: APL Date: Sat Aug 28, 2004 4:16am Subject: Re: TSCM Referals Hello James With reference to your request, I am happy to let you know that my company has been performing sweep works for more than 12 years. TSCM job here is good and we work on an average basis of 40-50 assigments/ year. We are based in France and work on a regular basis in Europe, North africa, Africa and Asia for major private companies. We have 2 TSCM teams, an IT security team and a little R&D lab. As we know that it is very difficult since 9/11 to travel with electronic gears, we have already done some assigments here and in europe on behalf of hight reputation american sweepers and for american companies, so we are used to work with american companies according to hight standard procedures. Any contact or information request will be welcome. Thanks in advance. Best regards Alain-Pierre Laclotte APL Consultants Tel : +33 (0) 238 742 220 Fax: +33 (0) 238 746 327 E-mail : apl@a... Web site : www.apl-consultants.com ----- Original Message ----- From: "James M. Atkinson" To: "TSCM-L" Sent: Thursday, August 26, 2004 8:15 AM Subject: [TSCM-L] TSCM Referals > > I am interested in increasing the database I have of TSCM folks to whom I > can refer sweep work out to, and would be happy hear from list members who > offer weep services, and I would be happy to review any resume, document, > brochures you may care to send. > > -jma > > > > > > > > > -------------------------------------------------------------------------- --------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > -------------------------------------------------------------------------- --------------------------- > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------------- --------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------------- --------------------------- > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > 9493 From: Leanardo Date: Sat Aug 28, 2004 8:26am Subject: Re: Does anybody have any interest? James, I think this would be a great idea. I have a PCR-1000 that I use all the time, but the software develpoment for it is fairly limited. My personal favorite control application "TALK-PCR" is no longer being developed so I have migrated to using a Winradio. Bruce : ) --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > I am trying to determine if there would be much interest by list members > for a program to drive an R8500, R20, or PCR1000 and make it "DO TSCM". > > I am asking this as I have several A.I.s (Artificial Intelligence, or > Daemons) that I developed, and have taught them to perform essential TSCM > functions on these radios completely under computer control. > > I am interested in putting these AI's out in the wild for a while for other > TSCM folks to use and see if the users have any feedback. > > Does anybody on the list have any comments, suggestions, or idea's on the > topic? > > -jma > > > > > -------------------------------------------------------------------- --------------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > -------------------------------------------------------------------- --------------------------------- > > James M. Atkinson Phone: (978) 546- 3803 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------- --------------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------- --------------------------------- 9494 From: contranl Date: Sat Aug 28, 2004 7:40pm Subject: U.S. arrests over 100 in internet crime sweep U.S. arrests over 100 in Internet crime sweep Thu 26 August, 2004 22:40 By Andy Sullivan and Peter Kaplan WASHINGTON (Reuters) - More than 100 people have been arrested in the largest global crackdown to date on identity theft, hacking and other Internet-based crimes, U.S. Attorney General John Ashcroft says. The arrests followed a three-month investigation into a range of crimes from reselling co-workers' Social Security numbers to disabling Web sites, Ashcroft said. "The common thread here is the Internet," he told a news conference. "We do not believe the Internet to be off base for law enforcement. We will be there with as much intensity and presence as we can muster." Officials from the Justice Department, the Federal Trade Commission and the U.S. Postal Inspection Service said the crackdown is designed to deter cyber-criminals and reassure consumers and businesses that the Internet is safe. "The Internet is stimulating the development of innovative products and services that were barely imaginable only a few years ago," said FTC chairwoman Deborah Majoras. "There is a risk, however, that these benefits will not be fully realised if consumers associate the Internet with fraudulent operators." The crackdown, dubbed "Operation Web Snare," involved some 150,000 victims who lost more than $215 million, Ashcroft said, adding that 53 people had already been convicted. Nevertheless, officials acknowledged that the operation represents only a fraction of the crimes being committed on the Internet. Identity theft alone costs the U.S. businesses more than $50 billion a year, Ashcroft said. Law enforcement officials in Romania, Nigeria and Cyprus helped track down people involved in fraudulent auctions, trafficking in stolen credit card numbers and other crimes, Ashcroft said. In all, authorities have opened more than 160 investigations and filed 117 criminal complaints, indictments and other court papers, according to the Justice Department. As a result of one investigation, for example, a grand jury on Wednesday indicted the chief executive of a Massachusetts communications company and five other people suspected of launching an Internet attack against competing companies. The indictment against Jay Echouafni accuses him of using computer hackers in the United States and Britain to disable the Web sites of three competitors. The episode cost Echouafni's rivals more than $2 million in lost revenue and extra costs, Ashcroft said. In another case, federal prosecutors in Los Angeles filed charges August 20 against a man who they say stole almost $800,000 over the Internet by conducting more than 5,000 fraudulent sales through the online auction site eBay Inc. Ashcroft also said he was ordering prosecutors to put into effect new, stiffer penalties against identity theft that were recently enacted by Congress. Source: http://www.reuters.co.uk Tetrascanner 9495 From: A Grudko Date: Sun Aug 29, 2004 0:01am Subject: RE: Does anybody have any interest? -----Original Message----- > I am asking this as I have several A.I.s (Artificial Intelligence, or > Daemons) that I developed, and have taught them to perform essential TSCM > functions on these radios completely under computer control. Fast ID and elimination (as non threatening) of common digital signals such as DECT or GSM would be very useful. I'd think this where a proper DSP type of PCI/ PCMCIA card could come into use with a regular laptop. However you have to have the complete suite of software to identify the mode 'cos as I understand it even 'standard' WI-FI has 4 modulation modes depending on the basic channel speed, using multiple channels to increase the throughput. And 'buggers' might tweak a standard unit off mode (the fiends)... Then you have to get down to the IP layer to start decoding the Data to confirm. Ouch! Mucho processing. I tend to revert to basics - "there's a 2.4775 Gig signal coming out of this ashtray - I can't confirm it's a bug but it's very unusual for ashtrays to do this" - but am open to new methods Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.744 / Virus Database: 496 - Release Date: 2004/08/24 [Non-text portions of this message have been removed] 9496 From: Gerald Date: Sun Aug 29, 2004 2:33am Subject: technical surveillance penetration of PCs Thank you for the Gentle notice. I gained some very valuable insights from observations of the reactions to my post regarding wire taps using PC Mic's and web cams. Post is located here: http://finance.groups.yahoo.com/group/TSCM-L/message/9437 I do use metasploit for testing (sorry about the typo). In my attempt to "raise the bar" regarding technical surveillance penetration of PCs I was very surprised to find so many professionals in denial about the security of their computers. The personal attacks stem from the need to believe their computer and the Internet is safe, and the investment they have in this belief even when presented with evidence to the contrary. We are experiencing a paradigm shift in capability of automated technical surveillance penetration of PCs. The financial motive for this is huge, ID theft, the fall out is very high risk, for bug detection and PC's as the vector. Granted it isn't there yet that I can demonstrate, but I can present a very good circumstantial case. Crossing Rootkits, automated attack bots, metasploit, keylogger or eavesdropper and a worm presents almost impossible detection case, and wide spread infection potential, with ease of use by a Newbie. There are exploits for MS IE and OS that are not publicly known yet or patched. And it is just a matter of time if it hasn't already been done before we are facing that, if we are not already (combined threat virii). These are already being done without hooks, hiding in sectors marked bad on your hard drive or flash memory or in the kernel. My evidence is good, but of course I cannot yet prove these thinga have been combined, yet. And I do have a method of discovering rootkits regardless of where or how they are hidden. I think all my links are good if not please contact me here wiezor8@m... What is an Internet anthropologist? http://www.msu.edu/~wieczor8/def.htm I'd like to thank everyone who replied to my post and contributed to my research. Gerald Internet Anthropologist 9497 From: James M. Atkinson Date: Sun Aug 29, 2004 2:37pm Subject: Looking for Supplier - Precision Inductors I am looking for a supplier of a large number of precision shielded inductors, I need both adjustable (can type) and small fixed value (axial leads). I would prefer to buy the cores/forms for the axial inductors and wind them myself, but I need a matching mu sleeve. Both will be used for TSCM -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9498 From: Date: Sun Aug 29, 2004 5:43am Subject: From Cryptome.org 28 August 2004. NASA has removed this announcement of a TSCM sole-source contract award, and asked a mail list to remove the link to it (Cryptome has not been contacted). Apparently the announcement revealed a classified TSCM system and provided evaluation of other TSCM systems used by the government. NASA, State Department and the Central Intelligence Agency were reportedly involved in contracting for the system. The system is now likely to be abandoned due to this announcement being published. Source on 25 August 2004: http://www.eps.gov/spg/NASA/HQ/OPHQDC/NNH04073384Q/SynopsisP.html 63--SCENARIOFLEX PORTABLE TECHNICAL SURVEILLANCE COUNTER MEASURES SYSTEM General Information Document Type: Presolicitation Notice Solicitation Number: NNH04073384Q Posted Date: Aug 24, 2004 Original Response Date: Sep 07, 2004 Current Response Date: Sep 07, 2004 Original Archive Date: Aug 24, 2005 Current Archive Date: Aug 24, 2005 Classification Code: 63 -- Alarm, signal & security detection equipment Naics Code: 561621 -- Security Systems Services (except Locksmiths) Contracting Office Address NASA/Goddard Space Flight Center, NASA Headquarters Acquisition Branch, Code 210.H, Greenbelt, MD 20771 Description NASA intends to award a sole source contract to SystemWare, Inc. of Thousand Oaks, California, pursuant to 10 U.S.C. 2304(c)(1), only one responsible source. This procurement is for the purchase of the ScenarioFlex Portable Technical Surveillance Countermeasures (TSCM) System. This system will include the hardware and software that make up the system plus an extended warranty and maintenance agreement of three years. The ScenarioFlex Portable TSCM System is a self contained computer using the vendor's proprietary hardware and software configured in such a way by the vendor that it can detect, analyze, identify, and discriminate among radio frequency signals and electrical impulses in a far more sophisticated manner than lesser such systems available to private industry. This ScenarioFlex Portable TSCM System being purchased was developed by SystemWare, Inc. to meet standards set by the U. S. Army and the Department of Defense. Those standards are considered in the counter surveillance community to be the highest and most sensitive available for use by U. S. Government agencies. SystemWare is the sole supplier of the ScenarioFlex Portable TSCM System. The ScenarioFlex Portable TSCM System also is an upgrade of this type of system usually found in private industry applications. The private industry version would not be acceptable to NASA. The upgraded application is available only to U. S. Government agencies, and it was developed to U. S. Army and Department of Defense specifications. This is the highest level and most capable radio frequency and electronic signal detection, analysis and identification system available for counter surveillance inspection and detection work generally available to U. S. Government agencies. The ScenarioFlex Portable TSCM System contains 17 hardware and software components, among which 10 are proprietary items that only SystemWare, Inc. can provide. Any such counter surveillance inspection and detection equipment acquired needs to be the same as used by other Federal agencies, because NASA Security Specialists team with those other agencies to perform inspection and detection sweeps at different locations. All the different agency specialists involved in those sweeps have to be able to operate each other's equipment without difficulty or delay in order to conduct the sweeps effectively. Familiarity with the equipment and its capabilities and characteristics is of paramount importance to the NASA Security Specialists and the Security Specialists of other Federal agencies who will be sharing each other's equipment. The ScenerioFlex Portable TSCM System not only fulfills NASA's functional requirements, but, more importantly, it is the system being used by most of the other Federal agencies that Code NASA Security Specialists will be working with in shared services situations. The Government does not intend to acquire a commercial item using FAR Part 12. See Note 26. See note 22. Oral communications are not acceptable in response to this notice. All responsible sources may submit an offer which shall be considered by the agency. Any determination by the Government not to compete this proposed effort on a full and open competition basis, based upon responses to this notice, is solely within the discretion of the government. An Ombudsman has been appointed. See NASA Specific Note "B". Any referenced notes may be viewed at the following URLs linked below. Original Point of Contact Delia B. Robey, Contracting Officer, Phone (301) 286-8109, Fax (301) 286-0357, Email Delia.B.Robey.1@g... Email your questions to Delia B. Robey at Delia.B.Robey.1@g... Current Point of Contact Delia B. Robey, Contracting Officer, Phone (301) 286-8109, Fax (301) 286-0357, Email Delia.B.Robey.1@g... Email your questions to Delia B. Robey at Delia.B.Robey.1@g... Additional Information Click here for the latest information about this notice Government-wide Numbered Notes You may return to Business Opportunities at: NASA HQ listed by [Posted Date] NASA Agencywide listed by [Posted Date] --------------------------------------------------------------------- From: Robert G. Ferrell Date: Tue Aug 29, 2000 1:21pm Subject: Re: BLack Ice Defender Anti-Virus/Hacker Software ><< Also, security software has to be installed on EVERY machine on a > network or an unsecured friendly/trusted machine can be compromised > and used as "jumping off point" by an outside attacker. >> > >That should be a real wake up call! I don't think it would appropriate on this list to go into excrutiating detail on this point, but just remember that the Internet Protocol, upon which the Internet is based, was designed to be an end-to-end data transmission and delivery service. There was absolutely no security designed into the original IP specs. There was no need for security when IP was developed (when the Internet was ARPAnet), because everyone using it was more or less a trusted party. The upshot of this is that network security is an oxymoron. It has to be forced. It has to be active. There are no passive security mechanisms. Protect it, or lose it. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 1353 From: Robert G. Ferrell Date: Tue Aug 29, 2000 2:20pm Subject: Be a TV Star What do you folks think about this? http://www.x10.com/home/offer.cgi?!TO5,.../onion2.htm? Wireless color video cameras @2.4 GHz. Sounds like a good candidate for spraying your own (inadvertent) TV show all over the neighborhood to me. It's a little hard to take them seriously, since this ad is a link from The Onion.... Cheers, RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 1354 From: James M. Atkinson, Comm-Eng Date: Tue Aug 29, 2000 3:35pm Subject: Spies in the Attic Moderators Note: So the question has to be asked... Is the problem the FBI, DOE, or Lee, and what is going to happen when the government drops the case, or when Lee is found innocent? It's going to really give DOE a black eye if this gets in front of a jury and the DOE experts are found to have lied to investigators. First they find out that none of the information was actually classified, then they find that Lee didn't actually steal anything, then they find that the actual criminals were the investigators (ouch-ouch-ouch). At a minimum the investigators seem (at least according to the article) to have tried to use Lee as a scape-goat, and to make it appear that he alone was responsible for all the DOE security problems. Only time will tell how this case will end up, but it's not going to be a pretty thing... and it's getting uglier day-by-day. -jma ================================== August 29, 2000 PUBLIC INTERESTS / By GAIL COLLINS Spies in the Attic http://www.nytimes.com/library/opinion/collins/082900coll.html here were very few public enemies as nefarious as the 1999 version of Wen Ho Lee, the 60-year-old scientist who's accused of downloading the "crown jewels" of our nuclear secrets with the intent of harming the United States. The 1999 Lee model, brought to you courtesy of the F.B.I. and the Department of Energy, lied to his colleagues in order to get mounds of top secret data out of the secure computers in the Los Alamos labs and put it on tapes, which are still missing -- out there somewhere. He had fishy-looking contacts with Chinese scientists when he was abroad, and kept them secret from American authorities. The director of nuclear weapons at Los Alamos testified that if the data Dr. Lee downloaded fell into the wrong hands it could "change the global strategic balance." Well, you could see why they put the guy in a segregated cell. With manacles. "For a long time, during his one hour of exercise, he'd have to try to kick the soccer ball around with leg shackles," said his lawyer. But after being held for eight months without bail, the biggest danger to national security since Benedict Arnold is starting to look a tad less threatening. It turns out: The data Dr. Lee downloaded was classified as secret only after the fact. Defense experts -- who seem just as smart as the prosecution experts -- say virtually all of it is already public knowledge, and what isn't probably wouldn't pose a threat even if it wound up on Muammar el-Qaddafi's bedside table. The lie Dr. Lee told his colleague to get access to the computer existed only in the mind of an F.B.I. agent, who now says he made "an honest error." That agent, Robert Messemer, also now acknowledges that Dr. Lee did file reports of his meetings with Chinese scientists. Mr. Messemer threatened Dr. Lee with the death penalty during one interview, pointing out what happened to Julius and Ethel Rosenberg when they refused to come clean. The agent, unlike Dr. Lee, is still working at his job. Nobody is denying that Dr. Lee spent hours and hours downloading one large mountain of codes. And nobody has a good explanation for why. Did he want a backup file? A scientific version of the "Collected Works of Wen Ho Lee"? So far, he hasn't explained himself, although his lawyer says the missing tapes were all destroyed. Other Los Alamos employees in the past have been fired or disciplined for mishandling classified information. But Asian-American civil rights groups point out that Dr. Lee, an American citizen who was born in Taiwan, is the first person in the lab's history to be charged in a criminal case, let alone one carrying a penalty of life in prison. Whatever Dr. Lee was doing, the government has offered not one iota of evidence that it was espionage. The prosecution, despite its grim talk of Chinese spies, claimed in its court papers that Dr. Lee wanted to use the data to impress potential employers during a job search. We have gone from worrying about rogue nations to a research lab in Switzerland. And there seems to be no evidence, by the way, that he ever actually contacted anybody about a job. Last week a judge in New Mexico ruled that the government's case "no longer has the requisite clarity and persuasive character" needed to keep holding Dr. Lee without bail. Security cases always involve the politics of paranoia. Dr. Lee looks harmless from here. (How many spies call the computer help line for advice while they're stealing secrets?) But maybe the F.B.I. can't tell us the whole story because laying it all out in court would compromise our security even more. If the prosecution says "hundreds of millions of people could be killed," who wants to take a risk? The problem is that right now, an average citizen might conclude that the multitudinous embarrassments over Los Alamos left federal officials desperate for somebody to arrest. They might assume that, in a facility where security was so lax even the vending machine was probably downloading secrets, the authorities picked on Dr. Lee because of his race. They might suspect that the F.B.I. ignored evidence that he was telling the truth, gave false testimony about his past activities in court, and kept a 60-year-old man isolated in a maximum security prison for months in the hopes of getting him to confess to something that would allow them to save face. Paranoia works both ways. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1355 From: Steve Uhrig Date: Tue Aug 29, 2000 8:26pm Subject: Re: Be a TV Star Once upon a midnight dreary, Robert G. Ferrell pondered, weak and weary: > What do you folks think about this? > http://www.x10.com/home/offer.cgi?!TO5,.../onion2.htm? > Wireless color video cameras @2.4 GHz. Low res camera, needs quite a bit of light. Range "up to" 100 feet. Read: through one wall possibly, but not with a decent signal. You gets what you pays for. At $100 for the system, don't expect much. Our *manufacturing* cost for the 2.4 gig receiver we manufacture is approx $1500. The most basic antenna alone is $160. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1356 From: James M. Atkinson, Comm-Eng Date: Wed Aug 30, 2000 10:11am Subject: Being an Engineer Q: When does a person decide to become an engineer? A: When he realizes he doesn't have the charisma to be an undertaker. Q: What do engineers use for birth control? A: Their personalities. Q: How can you tell an extroverted engineer? A: When he talks to you, he looks at your shoes instead of his own. Q: Why did the engineers cross the road? A: Because they looked in the file and that's what they did last year. Q: How do you drive an engineer completely insane? A: Tie him to a chair, stand in front of him, and fold up a road map the wrong way. You might be an engineer if ... ... choosing between buying flowers for your girlfriend and upgrading your RAM is a moral dilemma. ... you take a cruise so you can go on a personal tour of the engine room. ... in college, you thought Spring Break was metal fatigue failure. ... the salespeople at the local computer store can't answer any of your questions. ... at an air show, you know how fast the skydivers are falling. ... for your wife/girlfriend/husband/boyfriend's last birthday, you gave a new CD-ROM drive (or a Palm Pilot). ... you can quote scenes from any Monty Python movie. ... you can type 70 words per minute but can't read your own handwriting. ... you comment to your wife that her straight hair is nice and parallel. ... you sit backwards on the Disneyland rides to see how they do the special effects. ... you have saved every power cord from all your broken appliances. ... you have more friends on the Internet than in real life. ... you know what http:// stands for. ... you look forward to Christmas so you can put the kids' toys together. ... you see a good design and still have to change it. ... you spent more on your calculator than you did on your wedding ring. ... you still own a slide rule and know how to use it. ... you think that people yawning around you are sleep-deprived. ... you window shop at Radio Shack. ... your laptop computer cost more than your car. ... your wife hasn't the foggiest idea of what you do at work. ... you've already calculated how much you make per second. ... you've tried to repair a $5 radio. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= [Non-text portions of this message have been removed] 1357 From: Doug Ellsworth Date: Wed Aug 30, 2000 9:13am Subject: Re: BLack Ice Defender Anti-Virus/Hacker Software I hope this isn't off-topic already. Jim's post points out one of the problems with mainstream high-profile automated detection systems. Ones using "profiling" of normative behavior suffer weaknesses in that, even though most of us are creatures of habit, many top management types defy profiling. This is because of the broad range of responsibilites and the urgency of the particular mixture of priorities. Bothersome false positives (alarms) are common, and the response is to lower the tolerance of threshholds. This can lead to false negatives that are quite dangerous. Profiling systems also can be "fooled" by patient attackers gaining ground in slow increments. The other method of detection can be called "scenario matching" or "pattern" matching. These compare the current network state with a database of KNOWN attack signatures. The problem here, besides heavy overhead, is that attackers won't use known methods, or will devise a new "variety" by slightly changing the known attack so it's signature differs just enough. Changing the sequential order of an attack can thwart signature matching as well. Generally speaking, this is the state of automated detection systems. Yet almost all detection systems rely upon one (or both in some cases) of the above recognition methods. Almost all. [GRIN] The more valuable the information is, the more front-end work needs be done to establish criteria, gauges, and indicators of what is unacceptable or suspicious activity. The occurrence of such demands a heightened alert status (human intervention) and the tools for swift collection of supportive evidence. -Doug Douglas Ellsworth Secure Communications Corp., Inc. email: do5ug@r... tel: 402.578.7709 ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: Sent: Tuesday, August 29, 2000 9:16 AM Subject: Re: [TSCM-L] BLack Ice Defender Anti-Virus/Hacker Software > > Recently I was asked to help out a company where someone was breaking > into their machines from outside the company (though a firewall). > > The first thing I did was set up a packet sniffer (invisible to > anybody on the network) to grab everything that floated over the > network. I then attached a box to collect network statistics and to > probe anything which would permit a SNMP. Next, I attached a laptop > with my guardian software running in passive mode to flag any obvious > mischief or intruders. I then let the instruments for for two hours > to collect a baseline of information. > > While there were some phantom pings from outside the network, some > port scanning, the was also some fairly hostile activity detected. I > logged a rouge ftp server with MP3 files found operating inside the > firewall. There were also several outside connections and we could > actually watch intruders from outside the network downloading highly > privileged and confidential files from some of the senior executives > computers. > > After that we located the machines being attacked they were > discovered to have Black ICE installed... but the security had not > been set high enough to raise an alarm. > > Even after the threat level was raised to "Paranoid" the software > only alerted on less then a 1/10th of the suspect traffic (remember I > was logging and analyzing every packet on the network). > > Up to this point nothing had been done to alert of cut off the > intruder while I traced the mischief back to a specific person at a > specific computer on the other side of the country (and worked with > some security people on his end to preserve the appropriate logs). > The security folks on his end arranged to pay the suspect a visit, > and to escort him off the property (he got fired). A short time later > his connection went dead and the mischief stopped. > > The point I am trying to make is that BlackICE did not alert on the > attack even though the attacker was sucking down tons of highly > confidential data, and was attacking multiple machines. For BlackICE > or any similar software to be effective you have to install it, > configure it, and then test it. > > Also, security software has to be installed on EVERY machine on a > network or an unsecured friendly/trusted machine can be compromised > and used as "jumping off point" by an outside attacker. > > -jma > > > > > At 9:20 PM -0700 8/27/00, Ian Carter wrote: > > > At 12:14 AM 08/16/2000 -0700, you wrote: > > > > > > >Black Ice is a nice firewall and AtGuard was also, till it was purchased > >for > > > >the Norton Internet Security program - (AtGuard was great at blocking out > > > >those annoying adverts). > > > > > > > >Personally I now use Black Ice and ZoneAlarm "both at the same time" * > > > > > > > >Black Ice because of its reliability (and reasonable cost) and Zone Alarm > > > >because its free, and blocks your outgoing ports which Black Ice does > >not. > > > > > > > >Together and programmed properly (ZoneAlarm, especially) they do make a > > > >formidable team. > > > > > > By "programmed properly," you mean what exactly? I am running Black Ice > >and > > > downloaded ZoneAlarm and wanted to be sure I knew what you meant before > > > installing it. > > > >What I meant by that was BlackIce does not need to be programmed - you > >simply tell it what threat level you would prefer it to operate under > >(Paranoid, Nervous Cautious, Trusting). Whereas with Zone Alarm whenever a > >program on your computer such as your Browser, Email Program, Windows > >Update, AntiVirus Updates etc etc,, wants to get out it will ask you if you > >want to allow it (and it will remember this if you want it to) - (BlackIce > >will allow anything 'out'). > > > >The same applies when something wants to 'come in', you must tell ZoneAlarm > >if you want to allow it. > > > >I do like ZoneAlarm but when first installed, if I am working on a report or > >something and it pops up asking me if I want to allow in or out, this or > >that, it is so easy to overlook whats happening - one MUST look at what your > >allowing, as if you say, for example; allow this keylogger program out, > >always... then whatever you do on your computer could be emailed to any Tom, > >Dick, or Harry. > > > >A couple of pointers here: > > > >When you go to install ZoneAlarm (or any other program for that matter) > >close down everything else by pressing 'ctrl - alt - delete' ONCE. Then 'end > >task' everything there except explorer. Doing this will prevent a new > >program conflicting with programs already installed on your system. > > > >Then after you install ZoneAlarm (and restart your computer) open up your > >regular programs one at a time to allow them access to the internet - this > >way it is easier to see what you want to allow out. (ZoneAlarm will ask you > >'if you want' to allow it out). > > > >All in all - programming ZoneAlarm is a very simple task,, well worth > >doing,, and as I have said, my BlackIce and ZoneAlarm work well together. > > > > > >Best Regards - Ian > > > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > >=================================================== TSKS > > > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > Do not try the patience of Wizards, > for they are subtle and quick to anger. > ======================================================================= > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1358 From: Steve Uhrig Date: Wed Aug 30, 2000 7:44pm Subject: Doc on PBX Vulnerability available csrc.nist.gov/publications/PBX-draft.doc Free document by NIST (NAtional Institute of Standards and Technology). PBX vulnerability analysis. Find holes in your PBX before someone else does. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1359 From: Steve Uhrig Date: Wed Aug 30, 2000 7:40pm Subject: Computer forensics expert sought by Justice Dept. Independent contractor sought to review Carnivore The Justice Department is looking for an independent contractor to review the technical aspects of the FBI's new Carnivore e-mail surveillance program. Carnivore allows law enforcement officials to read e-mail as it passes through the gates of Internet service providers. While it would take a court order for investigators to begin using the program for surveillance, privacy experts worry Carnivore could violate Fourth Amendment prohibitions against unreasonable searches and seizures, and that it could easily be misused to spy on ordinary citizens. Internet experts are also concerned Carnivore could have the unintended side effect of slowing down Web traffic. Bidders for the contract are being asked to conduct a technical review of Carnivore. Questions the government want answered include: Assuming proper usage, will the Carnivore system provide investigators with all the information, and only the information, that it is designed and set to provide in accordance with a given court order? Assuming proper usage, will use of the Carnivore system introduce new, material risks of operational or security impairment of an ISP's network? Does use of the Carnivore system introduce new, material risks of the unauthorized acquisition, whether intentional or unintentional, of electronic communication information by FBI personnel or persons other than FBI personnel? Are the protections built into the Carnivore system, including both audit functions and operational procedures or practices, commensurate with the level of the risks, if any, identified in response to the question above? Proposals are due Sept. 6, and the contract will be awarded Sept. 25. After a contractor has been selected, the draft technical report will be due by Nov. 17. A period of public comment on the technical, as well as legal, aspects of Carnivore will be conducted after the report is made public. A final report will be issued reflecting those comments on Dec. 8. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1360 From: Date: Wed Aug 30, 2000 4:00pm Subject: Re: Doc on PBX Vulnerability available In a message dated 8/30/00 5:45:24 PM Pacific Daylight Time, steve@s... writes: << Free document by NIST (NAtional Institute of Standards and Technology). PBX vulnerability analysis. Find holes in your PBX before someone else does. >> Complete url is http://csrc.nist.gov/publications/PBX-draft.doc 1361 From: Richard Thieme Date: Mon Aug 28, 2000 9:11am Subject: Re: BLack Ice Defender Anti-Virus/Hacker Software Thank you very much. That's very helpful. RT At 09:20 PM 08/27/2000 -0700, you wrote: >> At 12:14 AM 08/16/2000 -0700, you wrote: >> >> >Black Ice is a nice firewall and AtGuard was also, till it was purchased >for >> >the Norton Internet Security program - (AtGuard was great at blocking out >> >those annoying adverts). >> > >> >Personally I now use Black Ice and ZoneAlarm "both at the same time" * >> > >> >Black Ice because of its reliability (and reasonable cost) and Zone Alarm >> >because its free, and blocks your outgoing ports which Black Ice does >not. >> > >> >Together and programmed properly (ZoneAlarm, especially) they do make a >> >formidable team. >> >> By "programmed properly," you mean what exactly? I am running Black Ice >and >> downloaded ZoneAlarm and wanted to be sure I knew what you meant before >> installing it. > >What I meant by that was BlackIce does not need to be programmed - you >simply tell it what threat level you would prefer it to operate under >(Paranoid, Nervous Cautious, Trusting). Whereas with Zone Alarm whenever a >program on your computer such as your Browser, Email Program, Windows >Update, AntiVirus Updates etc etc,, wants to get out it will ask you if you >want to allow it (and it will remember this if you want it to) - (BlackIce >will allow anything 'out'). > >The same applies when something wants to 'come in', you must tell ZoneAlarm >if you want to allow it. > >I do like ZoneAlarm but when first installed, if I am working on a report or >something and it pops up asking me if I want to allow in or out, this or >that, it is so easy to overlook whats happening - one MUST look at what your >allowing, as if you say, for example; allow this keylogger program out, >always... then whatever you do on your computer could be emailed to any Tom, >Dick, or Harry. > >A couple of pointers here: > >When you go to install ZoneAlarm (or any other program for that matter) >close down everything else by pressing 'ctrl - alt - delete' ONCE. Then 'end >task' everything there except explorer. Doing this will prevent a new >program conflicting with programs already installed on your system. > >Then after you install ZoneAlarm (and restart your computer) open up your >regular programs one at a time to allow them access to the internet - this >way it is easier to see what you want to allow out. (ZoneAlarm will ask you >'if you want' to allow it out). > >All in all - programming ZoneAlarm is a very simple task,, well worth >doing,, and as I have said, my BlackIce and ZoneAlarm work well together. > > >Best Regards - Ian > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > Richard Thieme ThiemeWorks ... professional speaking and business consulting: ThiemeWorks P. O. Box 170737 the impact of computer technology Milwaukee Wisconsin on people in organizations: 53217-8061 helping people stay flexible voice: 414.351.2321 and effective fax: 414.351.5779during times of accelerated change. cell: 414.704.4598 http://www.thiemeworks.com http://www.richardthieme.com - for information on Professional Speaking 1362 From: DMI Date: Wed Aug 30, 2000 0:10am Subject: Re: Be a TV Star The worst thing about this deal/product, is a close business associate bought 25 of them... He had them ALL sold in less than eight hours at a flea market in Ohio. The best part of it (for him), he sold them for $149.99. No one asked any questions. They all thought it was a great deal for the money. I never asked, knowing myself that X10.com was stamped on the units, how many called back to complain they could have got it off the net for half what they paid! Consumer beware! Bill Rust Desperate Measures, Inc. (888) 306-8312 ----- Original Message ----- From: Robert G. Ferrell To: TSCM-L@egroups.com Sent: Tuesday, August 29, 2000 3:20 PM Subject: [TSCM-L] Be a TV Star What do you folks think about this? http://www.x10.com/home/offer.cgi?!TO5,.../onion2.htm? Wireless color video cameras @2.4 GHz. Sounds like a good candidate for spraying your own (inadvertent) TV show all over the neighborhood to me. It's a little hard to take them seriously, since this ad is a link from The Onion.... Cheers, RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== ------------------------------------------------------------------------------ ------------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 1363 From: Screaming Date: Tue Aug 29, 2000 5:30pm Subject: RE: How Many Programmers does it take... LOL What are you colonials trying to say about us poor British? jc 1364 From: intel Date: Wed Aug 30, 2000 9:11pm Subject: Hello Hello to all, I have been an Investigator and Paralegal for 5 years and was a Naval Intelligence Professional for 6. I am new to this aspect of the business and have joined with the hopes of learning from the experts. My best regards to all of you. J. David Granneman CMPI President/Globalscan Investigations/Globalspy Technologies Phone (859) 586-4311/Fax (810) 454-5123 Alternate Phone (859) 578-9776/Voice/Pager (513) 510-0890 http://www.globalspy.com intel@g... globalspytech@n... central@g... ******************************************************************** This email is intended for the use of the recipient only and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use or dissemination of this communication is strictly prohibited. If you received this transmission in error, please notify us immediately, then delete this email. [Non-text portions of this message have been removed] 1365 From: Miguel Puchol Date: Thu Aug 31, 2000 8:38am Subject: RE: Practical Joke In Japan Initiates Fears About Virus Attacks On Mobiles All, A few days ago I was at a meeting concerning security issues in the new standards being used in cellular networks, and the possibilities are scary. Just as an example, Nokia has an SMS protocol for the GSM network and compatible terminals that allows operators and third parties to add, remove and modify items in the users's menu systems, via extended length SMS messages and a mark-up language, TTML. This in itself is OK, as when a new service, say stock quotes, becomes available, it can automatically be addedd to the user terminal's menu. However, there is a set of commands in this protocol that allow retrieval and forwarding of information such as IMEI, current cell ID where the phone is registered, vCard details (name, number, etc. of the owner), LAC, network code, and others. This could be associated to internal terminal events, which are available to control TTML program flow, so in theory a 'trojan' that was fully or at least partly visible to the user could be developed. All this information is current, and the SMS 2.0 protocol can be downloaded from http://forum.nokia.com Regards, Mike -----Mensaje original----- De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] Enviado el: lunes, 28 de agosto de 2000 2:18 Para: TSCM-L Mailing List Asunto: [TSCM-L] Practical Joke In Japan Initiates Fears About Virus Attacks On Mobiles [Moderators Note: My favorite cell related security problem comes from the NEXTEL, Omnipoint, and Sprint units and their vulnerability to the Hijack exploitation.] Practical Joke In Japan Initiates Fears About Virus Attacks On Mobiles http://www.zdnet.co.uk/news/2000/31/ns-17205.html Japan's i-mode mobile phones were hit by a bizarre attack Tuesday which security experts warn may be just the first of many security worries for broadband mobile Internet. 1366 From: James M. Atkinson, Comm-Eng Date: Thu Aug 31, 2000 1:59pm Subject: Video Pill Probes Intestines [Moderators Note: I can just see it now. The loonies, crackpots, and metal patients will be calling to have themselves checked for internal video cameras. No doubt someone in the media will seize on the article and try to prove how the CIA is hiding these cameras in McDonalds fish sandwiches, etc, etc, etc... I belive that I have some pictures of the device (or a similar device), and some limit technical information. The only problem (as I see it) are that they use several mercury cells for power, and as such there could be toxic leakage problems. Also the signal bandwidth is very slow, and low power which will make it very vulnerable to interference. Also, due to the rather large size of the thing it might be possible for the capsule to become lodged in the intestine, and have to be surgically removed.] -jma ====================== Video Pill Probes Intestines Associated Press 12:40 p.m. Aug. 30, 2000 PDT An Israeli company is ready to start testing its "video pill," a tiny video camera that monitors the human intestines of patients. The M2A Swallowable Imaging Capsule transmits two images a second. Designers for Given Imaging used their training in Israel's military industries to design the sensor, transmitter, and two chips that are the basis of the device. The video-quality images are picked up by a Walkman-sized receiver that is worn on a belt around the waist. The images are then loaded onto a hard disk and examined by a doctor. The capsule, which contains a miniature video camera, a battery, a tiny light, and a transmitter, passed preliminary U.S. Food and Drug Administration tests that were given to animals and healthy volunteers. Given Imaging executives in Jerusalem said they will launch clinical testing next month. FDA spokeswoman Sharon Snyder said that she could not confirm or deny the status of FDA action due to trade regulations. She noted, however, that the average elapsed time for FDA approval of diagnostic devices in 1999 was just over 12 months. Given Imaging applied for FDA approval in May. Company researchers claim the pill, 1 inch in length and one-third of an inch in diameter, offers a better and less painful alternative to conventional endoscopy, in which a probe is inserted orally or rectally. "The patient swallows it, and can go out, doing their own business," said Eitan Scapa, a gastroenterology specialist at Tel Aviv's Assaf Harofe hospital. Other researchers have expressed skepticism that the images would match fiber-optic endoscopes for detail, and they raised concerns that the camera's view might be obscured by bubbly saliva or green bile. The capsule cannot be stopped or steered to collect close-up details of the small intestine's millions of interior wrinkles where ailments often occur. Nor is it fitted with surgical tools like a conventional endoscope to take biopsies, treat bleeding lesions, and remove polyps. The pill, excreted after about four hours, was designed to examine the small intestine especially, Scapa said. Current probing methods can only reach the upper third of the intestine. An independent gastroenterologist, however, said the capsule poses medical risks. "It is a revolution, no question about it," said Simon Bar-Meir, director of the gastrointestinal department of the Chaim Sheba Medical Center in Tel Hashomer. "But the main problem is that if there is a partial obstruction in the small intestine, there is a risk that the pill will get stuck there." He said such a situation could become life-threatening. "A patient who might have come in for diagnostical reasons may end up in the emergency room for intestinal obstruction," Bar-Meir said. Given Imaging officials said such complications were unlikely but acknowledged that for now, it would prohibit use to those who have had major abdominal operations, a history of abdominal obstruction, pregnant women, those with pacemakers, and diabetes patients. Company officials say the pill itself will cost about $300 for patients. The entire system will cost $30,000 for hospitals, including the receptors and computer station. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1367 From: Robert G. Ferrell Date: Thu Aug 31, 2000 2:20pm Subject: Nightmare at 12 O'Clock High OK, folks, the hacking stakes just a little higher. Take a look at http://newscientist.com/news/news.jsp?id=ns225425 These folks have built an armed remote security robot that can be ordered over the Internet to shoot people. The fire command is "password protected." Gosh, that makes me feel a lot safer. "Brazil" is creeping ever closer... RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 1368 From: Robert G. Ferrell Date: Thu Aug 31, 2000 2:25pm Subject: Re: Nightmare at 12 O'Clock High >OK, folks, the hacking stakes just a little higher. Sorry, that should be "just _got_ a little higher." I was rattled. :-) RGF 1369 From: Date: Thu Aug 31, 2000 6:18pm Subject: Equiptment for sale Good evening list, Thanks to the courtesy of Mr. Atkinson, I am re-posting a couple of items I have for sale for anyone that may be interested. All items are in new/excellent condition and have never been used. They are as follows. An Avcom PSA65c spec. analyzer with freq. extender to 3750mhz. Handheld extendable antenna. A sub-carrier detector. AM/FM video demodulator/detector and IBM software(never used) with adapter to save and compare signal/trace on your laptop.Black Nylon AVSAC carrying case. In addition, I have an Optoelectronics APS104 Pre- selector with Scout freq. counter and AR8200 wide band reciever. I originally posted the AVCOM FOR $3750 and was willing to pay shipping within the U.S. I will let all of the above items go for $4300 and will still pay shipping within the U.S. I am closing up shop and charting a new course. If interested, send me an E-mail and I will provide you with my phone number. Thank you.:>) 1370 From: Jason Miles Dibley Date: Thu Aug 31, 2000 4:41pm Subject: Safeguard Investigations Ltd. Dear All, If anyone is feeling down or in need of their spirits lifting, please look at this web site. pay particular attention to the spelling employed by these skilled web designers. http://www.safeguard-investigations.ltd.uk/ [Non-text portions of this message have been removed] 1371 From: Rick Hofmann - MICROSEARCH Date: Fri Sep 1, 2000 8:46am Subject: Re: Equiptment for sale Brad, I would be willing to make an arrangement with you to buy the equipment over a short period of time. I would send you a deposit, and make two or three large monthly payments. You would keep the equipment until it is paid off. Since I really don't need the equipment, but would like to have it as a back up, I would prefer that you give my offer a few days. Perhaps someone will buy everything for cash immediately. Think about it and let me know. I was in Beirut, Lebanon from the 11th to the 16th. I had a great time and would go back in a heart beat. The people were wonderful, and the country is beautiful. They drive like they are being pursued by the hounds of hell, but nobody gets upset, no rude gestures, no road rage. I ended up only working one day because of scheduling errors. It was a very long day, but I was able to complete three separate facilities. Fortunately they were small facilities and I had help. I hope all's well with you. Please let me know what your new pursuit is going to be. At 11:18 PM 08/31/2000 +0000, you wrote: > >Good evening list, >Thanks to the courtesy of Mr. Atkinson, I am re-posting a couple of >items I have for sale for anyone that may be interested. All items >are in new/excellent condition and have never been used. They are as >follows. An Avcom PSA65c spec. analyzer with freq. extender to >3750mhz. Handheld extendable antenna. A sub-carrier detector. AM/FM >video demodulator/detector and IBM software(never used) with adapter >to save and compare signal/trace on your laptop.Black Nylon AVSAC >carrying case. In addition, I have an Optoelectronics APS104 Pre- >selector with Scout freq. counter and AR8200 wide band reciever. I >originally posted the AVCOM FOR $3750 and was willing to pay shipping >within the U.S. I will let all of the above items go for $4300 and >will still pay shipping within the U.S. I am closing up shop and >charting a new course. If interested, send me an E-mail and I will >provide you with my phone number. Thank you.:>) > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS Very truly yours, R.C.Hofmann, CCO, CPP MICROSEARCH - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 PI16998 1372 From: James M. Atkinson, Comm-Eng Date: Fri Sep 1, 2000 8:40am Subject: Lucent Spinning Off 3 Businesses [Since Lucent/AT&T makes one of the most popular PBX systems for business (which we in turn perform TSCM services on) I though the following would be of interest to the list.] 04:45 PM ET 08/31/00 Lucent Spinning Off 3 Businesses By LINDA A. JOHNSON= AP Business Writer= TRENTON, N.J. (AP) _ Telecommunications giant Lucent Technologies Inc. plans to create a new enterprise networking company, spinning off three businesses to its shareholders as part of a special dividend. Avaya will be created from Lucent's Enterprise Networks Group, which sells business telephone networks, voice and data switches for those networks, voice messaging systems such as its popular Intuity AUDIX, and other equipment and services to ``enterprises.'' Those include government agencies and large and small businesses, as opposed to the telephone companies and Internet service providers that are Lucent's primary customers. The new company will be based in Basking Ridge near Lucent's headquarters in Murray Hill, Lucent said Thursday. It will begin operating as a world leader in call centers, messaging systems and cable equipment that links telephones and computers inside companies. ``They'll start out with about an $8 billion-a-year business,'' said Lucent spokesman Bill Price. The spinoff will be complete on Sept. 30, the end of Lucent's fiscal year. On that date, Avaya shares will be distributed to everyone holding Lucent shares as of Sept. 20. Trading after the stock is issued will determine the stock price and market capitalization, Price said. Lucent shareholders will receive one share of Avaya common stock for every 12 Lucent shares they hold, creating about 275 million Avaya shares, according to Price. Any fractional shares will be distributed as cash, and that cash will be the only portion of the stock distribution subject to federal income taxes. Lucent's stock fell 94 cents to $41.88 in trading on the New York Stock Exchange. The stock has plunged from $84 per share last December before the company warned of unexpected weakness in its revenues and profits. Lucent, a former AT&T unit that has made a number of restructuring moves over the past year, announced the spinoff of the underperforming enterprise network business on March 1. Company executives said it would allow Lucent to focus more on serving telecommunications companies. Avaya, which brought in about 20 percent of Lucent's total revenues, will have 34,000 employees and nearly 1 million business customers in more than 90 countries. Those customers include more than three-fourths of the Fortune 500 companies. Lucent, which has about 116,000 other employees and total annual revenues of about $38 billion, plans by next spring to spin off its $4 billion-a-year microelectronics business, which has 16,000 employees. That business makes silicon chips and optoelectronic components such as lasers used to build the telephone, wireless and Internet communications systems Lucent sells. ___= On the Net: http://www.lucent.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1373 From: Steve Uhrig Date: Fri Sep 1, 2000 8:44am Subject: WAIT !! I can put you together with someone for a much better deal. Hold off if you can. Give me a minute to find the list and forward to you what a friend has. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1374 From: Steve Uhrig Date: Fri Sep 1, 2000 9:02am Subject: As you were Sorry, the last WAIT message was intended for one of the members of this list, not for the world in general. Disregard. Watch VERY carefully when replying to messages. They may go where you don't intend. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1375 From: Rick Hofmann - MICROSEARCH Date: Fri Sep 1, 2000 11:55am Subject: My apologies I apologize for sending a message meant for one person to the entire list. I've got to start watching what I'm doing. Very truly yours, R.C.Hofmann, CCO, CPP MICROSEARCH - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 PI16998 1376 From: Steve Uhrig Date: Fri Sep 1, 2000 2:38pm Subject: Full coverage receivers available again Hello list, We got in several more full coverage ICOM R100 receivers and can pass them along again. Finding any decent quality general coverage receiver which still receives in the cellular range is nearly impossible. Anything you buy anymore has the cellular frequencies blocked. This is a severe impediment to TSCM types. The R100 covers 500 kc to 1300 megs continuous. Continuous coverage receivers are now illegal to import or sell new except to government. These are government trade ins in various conditions but all working and most in excellent shape. ICOM has discontinued the R100 and there is no replacement. For those not familiar, the R100 is a professional compact receiver with all standard features like memories, various scan modes, different demodulators, different bandwidths and tuning steps, etc. It is approx the size of a cigar box and is powered by 12 VDC. I don't see many more coming in anytime soon. This may be an opportunity not available in the future. If you want a full coverage very decent receiver, contact me off list and we can discuss it. We take credit cards. Price depends on condition and accessories. I will consider trades of other quality equipment. Any TSCMer should have something like this for manually tuning into suspect signals. Or general monitoring. While the receiver does scan, it is considered more a professional communications receiver than a consumer scanner. A very few R8500s also are available. Inquire. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1377 From: Steve Uhrig Date: Fri Sep 1, 2000 8:19pm Subject: More on the unblocked receivers Having now fielded about 20 phone calls and emails, I will answer the universal questions on the unblocked R100 receivers we have available: Frequency coverage (I was wrong in my original message) 100 kc to 1856 megacycles. Specs guaranteed from 500 kc to 1800 megs, but it does cover 100 kc to 1856 megs. Dimensions: 6 x 2 x 7 inches without knobs. Weight 3.1 pounds. Large backlit LCD display. Price $550-$750 depending on condition and accessories. Most are near new. Accessories are mobile mounting bracket and AC power supply primarily. Antennas of various sorts are available. This works well with a wide coverage discone which we have for an additional $125 with purchase of receiver, $150 without. These are professional communications receivers with full frequency coverage. They are not cellular blocked and are now illegal to sell new. This may be one of the last opportunities to get something like this. Holler if you need anything additional. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1378 From: A Grudko Date: Sun Sep 3, 2000 3:37pm Subject: TSCM-Legislation On Thursday I met with the Registrar of the SA Interim Security Officer's Board re. the security industry (embargoed) White Paper which is before the SA government and will soon be open to public comment followed by promulgation towards the middle of next year (if interested visit www.sob.org.sa) which will specifically include Private Investigators. Included in the definition of a Private Investigator is anyone who offers 'Intelligence or Counter-Intelligence Services'. The Registrar is of the opinion that these WILL include TSCM services - the government are quite specific on this. Our existing Security Officers' Act is generally agreed to be one of the most advanced pieces of commercial security legislation in operation anywhere in the world. Our PI association, SACI, will be making representations to the ISOB on this legislation, and a number of our members are involved in TSCM activities, so there will be comments from our members in this regard. There is already considerable vocal debate (such as, is a Scanlock a 'receiver' or a 'test instrument'? Different laws apply according to it's description). As TSCM is so specialised I'd be interested to hear about any other specific legislation or related laws/rulings so that we do not 'reinvent the wheel' in our comments. In formulating our PI legislation I have encouraged the SA Board to look at the California model. Private replies are encouraged unless you want to share something with the group. Andy Grudko SACI (President) saci@i... andy@g... 1379 From: James M. Atkinson, Comm-Eng Date: Sun Sep 3, 2000 6:52pm Subject: Re: TSCM-Legislation Since you asked for feedback, >On Thursday I met with the Registrar of the SA Interim Security Officer's >Board re. the security industry (embargoed) White Paper which is before the >SA government and will soon be open to public comment followed by >promulgation towards the middle of next year (if interested visit >www.sob.org.sa) which will specifically include Private Investigators. > >Included in the definition of a Private Investigator is anyone who offers >'Intelligence or Counter-Intelligence Services'. The Registrar is of the >opinion that these WILL include TSCM services - the government are quite >specific on this. I private investigator has no business performing TSCM services unless he has a really strong technical background, years of technical experience, a boatload of technical training, and a ton of equipment. If the government wants to license TSCM people then someone other then the agency that handles PI's should be used (ie" lisc. them the same way you lisc. engineers, building contractors, and so on). PI's do not perform TSCM services, and TSCM'er do not do PI things. PI's, locksmiths, alarm installers, CCTV folks, polygraphers, firearms instructors, TSCM'ers, and so on should all be regulated by the government, but sadly there are many hidden agenda's when PI's start screaming for TSCM'ers to be regulated. >Our existing Security Officers' Act is generally agreed to be one of the >most advanced pieces of commercial security legislation in operation >anywhere in the world. Our PI association, SACI, will be making >representations to the ISOB on this legislation, and a number of our members >are involved in TSCM activities, so there will be comments from our members >in this regard. There is already considerable vocal debate (such as, is a >Scanlock a 'receiver' or a 'test instrument'? Different laws apply according >to it's description). IMHO: The Scanlock, OSCOR, MSS, and so on should not be classified as TSCM instruments but instead considered "evaluation aids". A "TSCM Instrument" should be strictly limited to laboratory grade instruments, cables, amplifiers, antenna's and so on. Also, all measurements should be taken in absolute units of measure (dBm or dBuV), and a solid paper trail of measurements should be required for all sweeps (to prove you actually took the measurements, and didn't just dance around for 15 minutes with some toy) The governmental agency should also require a formal written procedural guide for every single element of the sweep, and a formal protocol developed to handle discoveries.Government TSCM teams operate (or are suppose to operate) off of just such a plan. The regulatory agency also needs to mandate a solid technical background consisting of at least 1000 hours of technical training, followed by at least 2 years of full time hands on experience. Then the TSCM'er needs to complete a formal course of study of at least 8 weeks total just on TSCM. Sadly, many of the "TSCM experts" out there are unable to draw a schematic of a flashlight, hook up a PBX, or perform even the most basic of EMC/EMI measurements. Hint: Owning an OSCOR and owning a half dozen spy shop toys does not make you a competent TSCM'er anymore then buying an expensive violin will make you a musician. Remember... the right tools, in the right hands is what gets the job done. BTW: I like the OSCOR, Scanlock, and related tools (I own several), however; they have their place in any sweep. They are a really good investment when your first getting started in the business, but remember... they are where you START... not where you end up. >As TSCM is so specialised I'd be interested to hear about any other specific >legislation or related laws/rulings so that we do not 'reinvent the wheel' >in our comments. In formulating our PI legislation I have encouraged the SA >Board to look at the California model. > >Private replies are encouraged unless you want to share something with the >group. > >Andy Grudko >SACI (President) >saci@i... >andy@g... ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1380 From: James M. Atkinson, Comm-Eng Date: Sun Sep 3, 2000 6:55pm Subject: German panel may use East's spy wiretaps against Kohl Sunday, September 3, 2000, 12:00 a.m. Pacific German panel may use East's spy wiretaps against Kohl http://seattletimes.nwsource.com/news/nation-world/html98/kohl03_20000903.html by The Associated Press BERLIN - The agency overseeing the files of the Stasi, the old East German spy agency, said yesterday it has pulled together transcripts from wiretaps on former Chancellor Helmut Kohl that could be used by the parliamentary committee investigating the financial scandal surrounding him and his Christian Democratic Party during his 16 years in office. Committee leaders have said they won't use such files as evidence, but may use information from them to question witnesses. According to standard practice, the files will be made available first to Kohl, as the person directly affected, agency chief Joachim Gauck said. Kohl attorney Stephan Holthoff-Pfoertner said Kohl wants to see them. Kohl admitted in December that he accepted $1 million in anonymous donations in the 1990s, saying the money was given to help his party in former communist East Germany. The Stasi systematically bugged Kohl and other West German politicians and recorded their conversations. But Kohl has fought any release of the records, saying they are bound to be full of phony and doctored information. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1381 From: Date: Mon Sep 4, 2000 0:17pm Subject: PBX Security; NIST ( National Institute of Standards and Technology ) Re; SECURITY FOR PRIVATE BRANCH EXCHANGE SYSTEMS By Richard Kuhn Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Hacker attacks on computer networks are well known, but Private Branch Exchange (PBX) systems are also vulnerable. In one case, a hacker penetrated the Private Branch Exchange (PBX) system operated by a hospital in Escondido, California. For nearly two years, on various occasions, he blocked calls to and from the hospital, connected hospital operators to spurious numbers (including the county jail), and placed bogus emergency calls that appeared to be coming from inside the hospital. Unfortunately, the hospital's experience is not unique. Failure to secure a PBX system can result in exposing an organization to toll fraud, theft of proprietary, personal, and confidential information, loss of revenue, or legal entanglements. Depending on how the organization's network is configured and administered, information leading to intrusions of data networks may be compromised as well. A PBX is a sophisticated computer-based switch that can be thought of as essentially a small, in-house phone company for the organization that operates it. Protection of the PBX is thus a high priority. This bulletin introduces some of the vulnerabilities of PBX switches and describes some countermeasures that can be used to increase the security of your PBX. For a more detailed treatment of these issues, see NIST Special Publication (SP) 800-24, PBX Vulnerability Analysis (see http://csrc.nist.gov). Introduction Digital PBXs are widespread throughout government and industry, having replaced their analog predecessors. Today, even the most basic PBX systems have a wide range of capabilities that were previously only available only in large-scale switches. These new features have opened up many new opportunities for an adversary to attempt to exploit the PBX, particular mostly by using the features for a purpose that was never intended. The threats to PBX telephone systems are many, depending on the goals of attackers. Threats include: Theft of serviceñi.e., toll fraud, probably the most common of motives for attackers. Disclosure of information- data disclosed without authorization, either by deliberate action or by accident. Examples include both eavesdropping on conversations and unauthorized access to routing and address data. Data modification- data altered in some meaningful way by reordering, deleting, or modifying it. For example, an intruder may change billing information or modify system tables to gain additional services. Unauthorized access- actions that permit an unauthorized user to gain access to system resources or privileges. Denial of service- actions that prevent the system from functioning in accordance with its intended purpose. A piece of equipment or entity may be rendered inoperable or forced to operate in a degraded state; time-dependent operations may be delayed. Traffic analysis- a form of passive attack in which an intruder observes information about calls (although not necessarily the contents of the messages) and makes inferences, e.g., from the source and destination numbers or frequency and length of the messages. For example, an intruder observes a high volume of calls between a company's legal department and the Patent Office and concludes that a patent is being filed. PBX Characteristics PBXs are sophisticated computer systems, and many of the threats and vulnerabilities associated with operating systems are shared by PBXs. There are two important ways, however, in which PBX security is different from conventional operating system security: External access/control. Like larger telephone switches, PBXs typically require remote maintenance by the vendor. Instead of relying on local administrators to make operating system updates and patches, organizations normally have updates installed remotely by the switch manufacturer. This of course requires remote maintenance ports and access to the switch by a potentially large pool of outside parties. Feature richness. The wide variety of features available on PBXs, particularly administrative features and conference functions, provides the possibility of unexpected attacks. An attacker may use a feature in a manner that was not intended by its designers. Features may also interact in unpredictable ways, even when implemented correctly, leading to system compromise even if each component of the system conforms to its security requirements and the system is operated and administrated correctly. Maintenance Maintenance procedures are among the most commonly exploited functions in networked systems. The problem is even more acute with PBXs because PBX maintenance frequently requires the involvement of outside personnel. Ways in which an adversary could exploit vulnerabilities in maintenance features to gain unwanted access to the switch follow. Special Manufacturers Features There may be features that the manufacturer will rely on in the event a customer's PBX becomes disabled to such a point that on-site maintenance personnel cannot resolve the problems. The manufacturer could instruct the maintenance personnel to configure and connect a modem to the maintenance port. The manufacturer may then be able to dial in and use certain special features to resolve the problems without sending a representative to the customer's location.The potential cost savings is a primary reason for adding such special features. A switch manufacturer would not want the special features to be well known because of their potential for misuse. These types of features may be accessible via login IDs and passwords held privately by the manufacturer. Some possible special features are listed below: Database upload/download utility: Such a utility allows the manufacturer to download the database from a system that is malfunctioning and examine it at their location to try to determine the cause of the malfunction. It would also allow the manufacturer to upload a new database to a PBX in the event that the database became so corrupted that the system became inoperable. Compromise of such a utility could allow an adversary to download a system's database, insert a Trojan horse, or otherwise modify it to allow special features to be made available to the adversary, and upload the modified database back into the system. Database examine/modify utility: Such a utility allows the manufacturer to remotely examine and modify a system's database to repair damage caused by incorrect configuration, design bugs, or tampering. This utility could also provide an adversary with the ability to modify the database to gain access to special features. Software debugger/update utility: This type of utility gives the manufacturer the ability to remotely debug a malfunctioning system. It also allows the manufacturer to remotely update systems with bug fixes and software upgrades. Such a utility could grant an adversary the same abilities. This is perhaps the most dangerous vulnerability because access to the software would give an adversary virtually unlimited access to the PBX and its associated instruments. Dial-Back Modem Vulnerabilities Unattended remote access to a switch clearly represents a vulnerability. Many organizations have employed dial-back modems to control access to remote maintenance facilities. This access control method works by identifying the incoming call, disconnecting the circuit, and dialing the identified person or computer at a predetermined telephone number. Although helpful, this form of access control is weak because methods of defeating many dial-back modems are well known. Countermeasures Ensure that remote maintenance access is normally blocked unless unattended access is required. Whenever possible, require some involvement of local personnel in opening remote maintenance ports. Install two-factor (i.e., two different mechanisms) strong authentication on remote maintenance ports. Smart card-based systems or one-time password tokens, in addition to conventional login/password functions, make it much more difficult for attackers to breach your system's security. Keep maintenance terminals in a locked, restricted area. Turn off maintenance features when not needed, if possible. Administrative Databases Administrative databases represent "the keys to the kingdom" for a PBX. Among the most critical security tasks for PBX owners are administration of the PBX, the creation and modification of its user databases, and the operating software controlling the switch. Passwords Most PBXs grant administrative access to the system database through an Attendant Console or a generic dumb terminal. Username/password combinations are often used to protect the system from unwanted changes to the database. If remote access to the maintenance features is available, some form of password protection usually restricts it. There may be a single fixed maintenance account, multiple fixed maintenance accounts, or general user-defined maintenance accounts. The documentation provided with the PBX should state what type of maintenance access is available. Passwords may also be set to factory default values that can be changed by the user. Default values are typically published in the documentation provided with the PBX. If there are multiple maintenance accounts and maintenance personnel use only one, the others may remain at their published factory settings. Anyone who knew the factory default settings could then gain access to the switch. Physical Security Physical access to the PBX hardware grants access to the software, the configuration database, and all calls going in and out of the PBX. With access to the PBX, an adversary could exploit practically any conceivable vulnerability. The type of media on which the software and databases are stored is important to a PBX's physical security. If these are stored on ROM-type devices or on an internal hard disk, it is more difficult to gain access to them than if they are stored on floppy disks or CD-ROM. ROM devices are mounted on circuit boards and may be soldered rather than socketed, making removal and replacement difficult. Likewise, an internal hard disk is probably mounted internally and bolted to the chassis, making removal and replacement difficult. However, floppy disks are easily removable and replaceable. An adversary with access to the floppy disks could easily conceal a disk containing modified software/databases, gain access to the PBX, and replace the original disk with the modified disk. Similarly, CD-ROMs can be easily removed and replaced. Since equipment for creating CD-ROMs is readily available, an adversary may find it equally easy to copy and modify a CD-ROM-based system. If the PBX supports configuration and maintenance via a dumb terminal, the terminal may be located near the PBX. If the terminal is not at the same location as the PBX, the terminal port is still available and could be used by an adversary with a PC acting as a terminal. Some PBXs may be configured as a central system unit with peripheral units at remote locations. The remote peripheral units may also support configuration/maintenance via a dumb terminal and therefore have the same vulnerabilities as the system unit's terminal. Also, all calls routed through a particular peripheral unit are accessible to someone with physical access to the peripheral unit. Attendant Consoles may offer access to PBX maintenance and configuration software. Special features may also be available to Attendant Consoles such as Override, Forwarding, and Conferencing. If any of these features are available to the user of an Attendant Console, physical access to it should be restricted to prevent giving an adversary access to these features. Most PBXs have an attached system printer. Various information may be output to the printer including source and destination of calls that are made or received (possibly every call), access codes used to access certain features, account or authorization codes used for making special calls, etc. Access to these printouts could provide information enabling toll fraud or other compromises. Remote Access A very useful but potentially vulnerable feature of many PBXs is remote administrative access. The PBX may allow an administrator to make changes to the system configuration database through an Attendant Console or from a terminal that is not physically located near the PBX, perhaps over a dial-in line with a modem. Remote Access via an Attendant Console The degree of the vulnerability created by remote access via an Attendant Console is determined by several factors: password access, physical connection of the Attendant Console to the PBX, and availability of administrative features through the Attendant Console. Remote Access via a Terminal If a standard dumb terminal can be used for access to the administrative features, more opportunities become available for an adversary to gain unwanted access. A modem could be connected to a terminal port and an outside dial-in line allowing easy access for the PBX administrator to do remote configuration and maintenance. Unfortunately, it also gives easy remote access to an adversary. By setting up remote access in this manner, a poor password protection system, the existence of "backdoors" (e.g., a special key sequence that would bypass required authorization levels), or the use of easy-to-guess passwords would seriously undermine the security of the system. Software Loading and Update Tampering When software is initially loaded onto a PBX and when any software updates/patches are loaded, the PBX is particularly vulnerable to software tampering. An adversary could intercept a software update sent to a PBX administrator. The update could be modified to allow special access or special features to the adversary. The modified update would then be sent to the PBX administrator who would install the update and unknowingly give the adversary unwanted access to the PBX. Countermeasures Perhaps the most important task for password security is to make passwords resistant to cracking by automated tools. A password generator that creates random passwords can go a long way in defeating password crackers. Both free and commercial random password generation tools are available. Commercial products are available that can generate passwords of user-selectable length that are very resistant to cracking. Many software packages use error detection codes to protect against transmission or disk copying errors. Conventional error detection codes such as checksums or cyclical redundancy checks (CRC) are not sufficient to ensure tamper detection. Strong error detection based on cryptography must be used. These methods use cryptographic algorithms that guarantee detection of even a single bit modification. Because of the potential for exploitation by intruders, PBX boot disks and utilities must be given more protection than usually afforded typical office software such as word processing packages. Strong physical security should be provided for PBX software. Audit reports from the PBX should be shredded or destroyed in the same way as sensitive memos or financial information. To ensure the security of printouts, they must be shredded when discarded. User Features An adversary may be able to exploit vulnerabilities in a system's features and the way in which features can interact. As with many aspects of information technology, the proliferation of features that make PBXs easy to configure and use has led to an expansion of vulnerabilities. Many of these are inherent in the features themselves or arise out of feature interactions, making them difficult to avoid. This discussion illustrates some of these vulnerabilities so that administrators will be able to weigh the risks of features against their benefits. Attendant Console Attendant Consoles typically have more function keys and a larger alphanumeric display than standard instruments to support the extra features available to the Attendant Console. The Attendant Console may be used for access to maintenance and administrative functions, but there are potential vulnerabilities of the Attendant Console with respect to maintenance and administration. Some typical features available with an Attendant Console are Override, Forwarding, and Conferencing. Attendant Override Attendant Override is intended to allow the Attendant to break into a busy line to inform a user of an important incoming call. An adversary with access to an Attendant Console could use this feature to eavesdrop on conversations. The PBX should provide for some protection against such uses of Override by providing visual and/or audible warnings that an Override is in progress. Attendant Forwarding A common feature granted to the Attendant is the ability to control forwarding of other instruments. An adversary with access to the Attendant Console could use this feature to forward any instrument's incoming calls to a long-distance number. The adversary could then call the target instrument and be forwarded to the long-distance number, thereby gaining free long-distance access. Attendant Conferencing Attendants may also have the ability to initiate a conference or join into an existing conference. If this feature is available, the potential exists for an adversary logged in as an attendant to eavesdrop on a conversation or add an additional party to a conference without the knowledge of the other parties. Automatic Call Distribution (ACD) ACD allows a PBX to be configured so that incoming calls are distributed to the next available agent (e.g., reservation clerk) or placed on hold until an agent becomes available. Agents may be grouped together with each group having a supervisor. The group of supervisors may then even have a higher-level supervisor. The number of supervisors and number of levels of supervisors is dependent on the type of PBX being used. Most ACD systems grant a supervisor the ability to monitor the calls of the group they are supervising. Because of this feature, ACD systems are a potential vulnerability to the users of PBX. If an adversary could gain access to the configuration tools or the system database, they could become an ACD supervisor and set up an ACD group. The supervisor could then monitor the calls of any of the users in the group. Account Codes/Authorization Codes Account Codes are normally used for tracking calls made by certain people or projects so that bills can be charged appropriately. For example, a user may be required to enter an Account Code prior to placing a long-distance call. Depending on the configuration of the PBX, the Account Code may have to be on a list of approved codes for the call to be successful. If this is the case, the Account Code may be considered an Authorization Code because the user must dial a specific Account Code that is authorized for making long-distance calls. Another important use for Access Codes is for Dial In System Access (DISA). DISA typically allows a user to dial in to the PBX system from an outside line and gain access to the normal features of the PBX, almost as if they were a subscriber on the PBX instead of an outside caller. This feature is typically used to allow employees to make long-distance calls from the corporate PBX while out of the office by dialing in to the switch, then entering a code to make long-distance calls. It is easily abused by anyone with the authorization code, possibly leading to large fraudulent long-distance charges. Certain Account Codes may also be allocated for changing a user's Class of Service (COS). When the COS is changed, the user may have access to a different set of features. For example, most instruments may be assigned a COS that does not permit the use of an Override feature, but a special COS that is only accessible by using an Account Code may be created that does permit the use of Override. By using the Account Code, an adversary could then gain access to the Override feature. Since the Account Codes are used for billing, there are records kept of the calls that are made for the various Account Codes. These records generally include the source, destination, Account Code, and time/date of the call. The records may be stored as files on one of the system's disks or they may be printed out on a system printer. If the records are printed, an adversary who is able to gain access to the printer will have access not only to traffic information, but also to the printed Account Codes. Once the codes are known, the adversary will be able to use the codes for toll fraud, additional feature access, etc. Override (Intrude) An Override or Intrude feature is common to many PBXs. Due to its potential vulnerability, it is commonly selectable as a feature that can be allowed/disallowed on a single instrument or a group of instruments. Override is intended to allow one user (perhaps a supervisor) to break into a busy line to inform another user (perhaps a subordinate) of an important message. This feature could be used by an adversary with access to any instrument permitted to use the Override feature to eavesdrop on conversations. The PBX should provide for some protection against such uses of Override by providing visual and/or audible warnings that an Override is in progress. Diagnostics In addition to the major diagnostic features available at a maintenance terminal or Attendant Console, many PBXs provide diagnostics that can be initiated from any instrument. These diagnostic features may permit a user to make connections through the PBX by bypassing normal call processing restrictions. An adversary with access to these diagnostic features may be able to deny service or make undetected connections allowing for the monitoring of other calls. Feature Interaction With the advent of the digital PBX and its wealth of features, the interaction between features presents a significant possibility for vulnerabilities. For example, in some systems the return-call and camp-on features can be manipulated to defeat caller-ID blocking. With the large number of features available in modern PBXs, it becomes difficult for the manufacturer to consider all of the ways in which different features may interact. Because of this, vulnerabilities may exist that were undetected by the manufacturer that allow an adversary unwanted access to the PBX and its instruments. Since the actual Feature Interaction vulnerabilities found on a specific system depend heavily on the particular implementation of the features, it would be nearly impossible to describe every possibility for a generic system. NIST SP 800-24 includes detailed examples of some feature interactions. Countermeasures Vulnerabilities can be minimized if the Attendant Console connects to the PBX with a different physical connection than that of the telephone instruments. If the Attendant console connects to the PBX in the same manner as the telephone instruments, vulnerabilities can be reduced by having some sort of line configuration feature. Such a feature could reduce vulnerabilities by requiring that a line be specifically configured for use with an Attendant Console. With such a configuration requirement, a telephone instrument could not be easily replaced with an Attendant Console to gain access to the administrative features. When implementing a Class of Service, feature interaction should be given much thought. Many of the feature vulnerabilities discussed involve Feature Interaction since several COS items or system options may have to be enabled/disabled to allow them to occur. Because the vulnerabilities described in this section are inherent in feature implementation, they are difficult to defend against. The most effective strategy is to ensure that only essential features are activated. Computer Telephony One of the biggest new developments in telecommunications is the advent of computer-based telephony systems (CT). As microprocessor speeds have increased and memory prices dropped, it has become possible to implement a PBX on little more than a high-end PC. A CT system typically requires only the addition of specialized voice processing boards to an ordinary office PC with 64 MB of memory, a 3 GB disk, and a 300 MHz processor. Some CT systems use specialized real-time operating systems, but the trend is toward commercial off-the-shelf systems such as Windows, Linux, or other versions of UNIX. This development has brought great reductions in the cost of PBX systems, but means the possibility of enormously increased security risks. Two factors in particular can increase exposure: greatly expanded integration of telephony with the computer network and implementation of PBX functions over operating systems with widely known vulnerabilities. Some of the features appearing in new CT systems include: Voice over IP, Browser-based call handling and administration, Integration of IP PBX with legacy PBXs and voicemail systems, Integration of wireless networks with office network systems, and Virtual private networks. A complete exposition of the risks of CT systems is beyond the scope of this document. The safest course of action is to assume that most or all of the vulnerabilities described here apply to CT systems as well as traditional PBXs. CT systems may also have added vulnerabilities resulting from well-known weaknesses of PC operating systems. Future NIST publications may address CT security issues in more depth. Recommendations Not all of the security measures described in this bulletin will be applicable to every organization. The first step in improving PBX security is to assess the organization's current telephony applications. This bulletin describes important areas to consider. Following this assessment, NIST SP 800-24 can be used in conducting a detailed evaluation. SP 800-24 also includes a set of baseline security considerations for PBXs and a more complete set of countermeasures for common vulnerabilities. References NIST SP 800-24, PBX Vulnerability Analysis, National Institute of Standards and Technology, 2000. Online resources: NIST Computer Security Resource Clearinghouse: http://csrc.nist.gov DISA Information Assurance: http://www.disa.mil/infosec/iaweb/default.html Disclaimer: Any mention of commercial products or reference to commercial organizations is for information only; it does not imply recommendation or endorsement by the National Institute of Standards and Technology nor does it imply that the products mentioned are necessarily the best available for the purpose. HAVE A GREAT DAY !!! From: Miguel Puchol Date: Wed Aug 29, 2001 1:45pm Subject: RE: Arkansas Woman Killed in Mistaken Rapture Surely a good candidate for inclusion in the Darwin Awards... > Arkansas Woman Killed in Mistaken Rapture > > ARKANSAS CITY (EAP) -- A Little Rock woman was killed yesterday after > leaping through her moving car's sun roof during an incident best > described as a "mistaken rapture" by dozens of eye-witnesses. 3603 From: William Knowles Date: Wed Aug 29, 2001 4:47pm Subject: Two Men Arrested for Planning to Smuggle High-Tech Encryption Devices to China http://ap.tbo.com/ap/breaking/MGAJ2GYKZQC.html By Christopher Newton Associated Press Writer August 29, 2001 WASHINGTON (AP) - Two men have been arrested and accused of scheming to smuggle military encryption technology to China, the Customs Service said Wednesday. The technology, two devices known as KIV-7HS units, are used to encode classified government communications. "The technology that these individuals were attempting to export to China is among the most sensitive items on the U.S. munitions list," said Allan Doody, the U.S. Customs Service special agent in charge in Baltimore. Doody said sale of the technology must be approved by the National Security Agency. Customs agents have arrested Eugene Hsu of Blue Springs, Mo., and David Yang of Temple City, Calif. Carlson Ho, also charged with attempting to smuggle the technology, is in Singapore and has not been arrested. Ho is affiliated with the Singapore-based Wei Soon Loong Pvt. Ltd., which intended to buy the technology, according to a federal affidavit. The maximum sentence for smuggling sensitive technology is 10 years in prison and a $1 million fine for each violation. Wei Soon Loong, the Singapore company, did not immediately return telephone calls by The Associated Press. Customs agents discovered the alleged scheme when Hsu contacted representatives of the company Mykotronx, a private defense contractor based in Maryland. Hsu asked about the encryption technology and wanted a price quote. Company executives reported Hsu's telephone call to Customs agents in Baltimore. Undercover agents replaced Mykotronx representatives in later telephone conversations with Hsu. Hsu made clear that he understood the technology could not legally be sold to China, according to the Customs Service. In a taped conversation in May, an undercover agent told Hsu, "I can make a domestic sale to you, and then you can get it out however you want. But that would not be legal. It would be illegal, ... and I just want your assurance it's not going to come back to burn me." Hsu replied, "Everyone will keep their mouths shut." The Customs Service says that Hsu contacted David Yang to ship the freight, and Yang was informed that it was an illegal shipment. Yang told undercover agents that he'd been doing this businesses for 20 years and that he knew "how to handle these types of problems." *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 3604 From: Paolo Sfriso Date: Wed Aug 29, 2001 4:46pm Subject: Sweep equipment over 3GHz Dear Collegues. I am thinking of upgrading my TSCM maximum RF coverage which is now at 3GHz. Can you suggest any CHEAP and portable microwave meter/field strength indicator with coverage up to 10 or 20 GHz that can be used for TSCM sweeps ? Even if it does not actually have frequency reading functions it should be OK. Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 paulsfriso@t... www.grupposit.com [Non-text portions of this message have been removed] 3605 From: James M. Atkinson Date: Wed Aug 29, 2001 6:38pm Subject: Re: Sweep equipment over 3GHz Here are your options A Tek 492 S/A... they can be had for 2-2.5k on Ebay... but if you develop any problem with it your screwed. A 7600 series Oscope, and a 7L14 or 7L18 plug in HP 8565A (spit)... also cheap (under $1500), but they do not travel well. Next is a HP 182, 182, or 853 display frame, with a 8559A plug in. If you can find one in good shape your best buy is either a 8566B, or a 494 A/P. -jma At 11:46 PM +0200 8/29/01, Paolo Sfriso wrote: >Dear Collegues. > >I am thinking of upgrading my TSCM maximum RF coverage which is now at >3GHz. >Can you suggest any CHEAP and portable microwave meter/field strength >indicator with coverage up to 10 or 20 GHz that can be used for TSCM sweeps >? >Even if it does not actually have frequency reading functions it should be >OK. > >Kind Regards. > >Paul Sfriso >Director >GRUPPO S.I.T. >Security, Investigations & Tecnology >Quarto d'Altino, Venice >ITALY > >phone +39 0422 828517 >fax +39 0422 823224 >24hr GSM cellphone +39 335 5257308 >paulsfriso@t... >www.grupposit.com -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3606 From: James M. Atkinson Date: Wed Aug 29, 2001 9:47pm Subject: Sysadmin spy left digital trail http://www.theregister.co.uk/content/6/21327.html Sysadmin spy left digital trail By Kevin Poulsen Posted: 29/08/2001 at 11:48 GMT The FBI investigation that lead to last week's arrest of a former Air Force sergeant on espionage charges had more in common with a modern Internet hacker hunt than a John le Carre novel, court records show. Brian P. Regan, 38, was arrested Thursday at Washington Dulles International Airport while boarding a Lufthansa flight to Zurich, Switzerland. He's charged with conspiracy to commit espionage for allegedly passing classified satellite photos and secret documents to an unnamed foreign government, called 'County A' in court filings, identified in a Washington Post report as Libya. Regan had been posted at the super-secret National Reconnaissance Office (NRO) in Virginia, the Defense Department organization responsible for building and controlling the United States' network of orbiting reconnaissance satellites. According to a 19-page FBI affidavit filed in the case last week, which relies much on unidentified "reliable source information", Regan began his abortive espionage career in August 2000, shortly after retiring from military service. Regan allegedly introduced himself to 'Country A' by passing it a set of overhead satellite photos, as well as a CIA intelligence report, two pages from a classified CIA newsletter, and other documents. At the same time, Regan, a former system administrator, gave his would-be handlers a number of encrypted messages, and a plaintext message written in English. "The initial, unencrypted message appears to be an introductory letter containing instructions to prevent detection of the messages by the US government," reads the affidavit. While the court records don't indicate what encryption system Regan favored, it evidently didn't pose an insurmountable obstacle to the FBI. "The encrypted messages, which were decrypted by the US government, set forth contact instructions, establish bona fides, and offered to provide additional classified information," the affidavit reads. Regan's alleged contact instructions had a decidedly information age twist. Rather than arrange a rendezvous in a dark alley or a smoke-filled bar, Regan allegedly referred 'Country A' to a free Internet email account he established under the alias Steven Jacobs. When FBI agents obtained logs from the email provider, they found that the account had been used nine times, all of them from Internet terminals at public libraries near Regan's home or office. One of them, in Crofton, Maryland, was five miles from Regan's home. "Physical surveillance of Regan during May through August 2001 indicated that Regan regularly utilized the public internet access located in the Crofton library," reads the affidavit. While the free email provider's records incriminated Regan on one end, computer forensics and government network logs fingered him on the other. Suspect surfed secret Web According to the affidavit, most of the images and documents Regan is accused of passing came from Intelink, a classified global intranet that links the thirteen US intelligence agencies to each other, and to their 'customers' in the White House, Congress, the Pentagon and other government agencies. Developed in the mid-90s, Intelink is estimated to have over 50,000 users with access to 'special compartmentalized information' housed on some 200 servers at over 100 physical sites. Another 265,000 users have access at the lower 'secret' level. Intelink addresses take the form http://www.nro.ic.gov or http://www.cia.ic.gov. The resemblance to Internet URLs is not coincidental-- the classified network is isolated from public access, but uses the same protocols and software as the public Internet. Intelligence analysts and operatives surf its secrets with the ease of an Internet user shopping for books online. And like the Internet, Intelink has seen an explosion of growth in recent years -- albeit behind closed doors. "Just as the Web as taken off in the real world, the Intelink web has taken off in the intelligence community," says Fredrick Thomas Martin, a former NSA official and author of Top Secret Intranet --- How US Intelligence Built INTELINK, The World's Largest, Most Secure Network. "Anything that is Web enabled and uses Web technology, the intelligence community has latched onto on Intelink," Martin says. Martin, whose Web site includes an Intelink simulation, says that the network's unbridled expansion troubled some in the intelligence community, who were long accustomed to handling knowledge on a 'need to know' basis. "They finally realized that they have big security problem here... People might access things that they shouldn't have access to," Martin says. "They nearly shut it down." Instead, Intelink restricts which Web sites legitimate users can browse. "You have to have a digital certificate to access certain things," says Martin. "You have to be cleared for whatever you see." Those access control mechanisms may have played a critical role in the FBI's investigation of Regan. According to the affidavit, when FBI agents scoured the hard drive of Regan's former office computer in April 2001 they found that "someone using Regan's password" had surfed to an Intelink URL for one of the overhead photos offered to 'Country A', and visited four URLs for other documents that were passed at the same time. Server logs from Intelink web sites tied Regan's machine to three more documents, and "Intelink audit records indicate that the URL for the CIA intelligence report....was accessed from the computer in Regan's former office at 8:52 p.m." on the day that the copy passed to the 'Country A' was printed out. A few months after retiring from the Air Force in August 2000, Regan went back to work at NRO as a employee of defense contractor TRW. His security clearance was reinstated in July, one month before his arrest. Regan isn't the first accused spy with computer expertise. Computer logs provided damning evidence against FBI mole Robert Hanssen, who pleaded guilty last month to selling the United States' most precious counter-intelligence secrets to Russia. Hanssen, an experienced computer programmer, passed information to his Russian handlers on encrypted floppy disks, kept reminders of his clandestine appointments in his Palm organizer, and routinely searched FBI computers for hints that his co-workers might be on to him. © 2001 SecurityFocus.com, all rights reserved. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3607 From: James M. Atkinson Date: Wed Aug 29, 2001 10:04pm Subject: Two arrested for planning to smuggle high-tech encryption devices to China Two arrested for planning to smuggle high-tech encryption devices to China Posted at 12:45 p.m. PDT Wednesday, Aug. 29, 2001 Two arrested for planning to smuggle high-tech encryption devices to China http://www0.siliconvalley.com/docs/regions/asia/015113.htm http://www.wired.com/news/politics/0,1283,46422,00.html WASHINGTON (AP) -- Two men have been arrested and accused of scheming to smuggle military encryption technology to China, the Customs Service said Wednesday. The technology, two devices known as KIV-7HS units, are used to encode classified government communications. ``The technology that these individuals were attempting to export to China is among the most sensitive items on the U.S. munitions list,'' said Allan Doody, the U.S. Customs Service special agent in charge in Baltimore. Doody said sale of the technology must be approved by the National Security Agency. Customs agents have arrested Eugene Hsu of Blue Springs, Mo., and David Yang of Temple City, Calif. Carlson Ho, also charged with attempting to smuggle the technology, is in Singapore and has not been arrested. Ho is affiliated with the Singapore-based Wei Soon Loong Pvt. Ltd., which intended to buy the technology, according to a federal affidavit. The maximum sentence for smuggling sensitive technology is 10 years in prison and a $1 million fine. Wei Soon Loong, the Singapore company, did not immediately return telephone calls by The Associated Press. Customs agents discovered the alleged scheme when Hsu contacted representatives of the company Mykotronx, a private defense contractor based in Maryland. Hsu asked about the encryption technology and wanted a price quote. Company executives reported Hsu's telephone call to Customs agents in Baltimore. Undercover agents replaced Mykotronx representatives in later telephone conversations with Hsu. Hsu made clear that he understood the technology could not legally be sold to China, according to the Customs Service. In a taped conversation in May, an undercover agent told Hsu, ``I can make a domestic sale to you, and then you can get it out however you want. But that would not be legal. It would be illegal, ... and I just want your assurance it's not going to come back to burn me.'' Hsu replied, ``Everyone will keep their mouths shut.'' The Customs Service says that Hsu contacted David Yang to ship the freight, and Yang was informed that it was an illegal shipment. Yang told undercover agents that he'd been doing this businesses for 20 years and that he knew ``how to handle these types of problems.'' ============================== Two Arrested For Trying To Sell Encryption To China http://www.newsbytes.com/news/01/169546.html By Staff, Newsbytes WASHINGTON, D.C., U.S.A., 29 Aug 2001, 5:32 PM CST U.S. Customs Service agents have arrested two men for allegedly attempting to export military-grade encryption technology to China. Authorities on Tuesday arrested Eugene You Tsai Hsu, of Blue Springs, Mo., and David Tzu Wvi Yang, of Temple City, Calif., accusing the two of plotting to export an encryption technology designed for use exclusively by the U.S. government. A customs spokesman would not confirm whether the KIV-7HS encryption unit in question has ever been used outside of the U.S. government or exported to any other nations, saying only that the communications encryption device cannot be legally exported from the United States without permission from the State Department. According to an affidavit filed in federal court, Hsu contacted Columbia, Md.-based Mykotronx Inc. to find out the price of the encryption technology. A Mykotronx security officer then contacted U.S. Customs agents in Baltimore, who subsequently launched an 15-month undercover investigation together with the Defense Department's Defense Security Service. The Customs Service claims Yang and Hsu conspired to obtain the encryption device and ship it to Charlson Ho, a man reportedly affiliated with Wei Soon Loong Private LTD in Singapore. If convicted, both men face a maximum of 10 years in jail or a $1 million fine per violation of the Arms Export Control Act. Ho also faces charges that he laundered money to conceal the source of payment for the technology. Reported by Newsbytes.com, http://www.newsbytes.com . 17:32 CST Reposted 20:59 CST (20010829/WIRES TOP, ONLINE, LEGAL, ASIA, TELECOM, BUSINESS/) C 2001 The Washington Post Company -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3608 From: James M. Atkinson Date: Wed Aug 29, 2001 10:06pm Subject: Spy Probe Seeks Cache Of Classified Documents Spy Probe Seeks Cache Of Classified Documents http://www.washingtonpost.com/wp-dyn/articles/A10293-2001Aug28.html By Walter Pincus Washington Post Staff Writer Wednesday, August 29, 2001; Page A02 Andrea Bruce Woodall - The Post The investigation of Brian P. Regan, the retired Air Force master sergeant arrested last week on espionage charges, has been widened to determine whether he assembled a large trove of secret documents with the intention of selling them gradually to various countries, government officials said yesterday. Regan, 38, spent the last four years of his 20-year military career at the National Reconnaissance Office, the agency responsible for the nation's intelligence satellites, where he had daily access to Intelink, a computer system used by U.S. intelligence agencies to store and share highly classified information. If he was spying during most or all of that time, the damage to national security could be far greater than previously thought, the officials said. Regan was arrested at Dulles International Airport last Thursday as he was about to board a flight for Switzerland via Germany. He had been under intense FBI surveillance since June, and officials believe that he was caught before he could provide significant secrets to a nation identified in a 19-page FBI affidavit as Country A, which sources said was Libya. But officials said they fear that Regan may have begun stealing and setting aside secrets some time ago. "He may have been preparing for retirement, planning to sell the material off over the years," a senior government official said. Less than a month before his Aug. 30, 2000, retirement from the Air Force, Regan established an e-mail address under a pseudonym -- Steven Jacobs of Alexandria -- which he planned to use for surreptitious contacts with foreign governments, according to the FBI affidavit. In addition, a search this year of the computer that Regan used during the four years when he was an Air Force cryptanalyst, or code breaker, at the NRO shows that he accessed and may have downloaded much more secret information than the few samples he allegedly passed to Libya to establish his bona fides, according to government officials. As a result, investigators are concerned that he may have created a cache of classified documents somewhere, perhaps in computer files or on disks. The investigation is now focused on determining when he began collecting documents, what he did with them, and whether he started peddling them prior to leaving the service, the officials said. Nina Ginsberg, Regan's court-appointed attorney, declined to comment. Regan was arraigned Friday and was ordered held without bond pending a preliminary hearing in U.S. District Court in Alexandria. That hearing, originally scheduled for today, has been postponed until Sept. 28. In addition, Judge Claude M. Hilton yesterday gave the government until Oct. 19, a month longer than usual, to file an indictment because of the "complex nature of the investigation and the classified nature of much of the material involved." After retirement, Regan was hired last October by TRW, which does work for the NRO. Since he had lost access to top-secret data when he retired, his initial job at TRW was as a military liaison and did not involve highly classified data. By April 2001, when Regan's old office and computer were searched, the FBI had begun to focus on him as the possible source of secret documents that had been passed to Libya and turned over to U.S. government officials, presumably by an American agent. In June, the FBI began full-scale surveillance of Regan. According to the current issue of Newsweek, the FBI sent an e-mail to the Jacobs address purporting to come from a Libyan spy and induced Regan to fly to Munich. There, a U.S. operative posing as a Libyan met Regan and encouraged him to provide information, the magazine reported. Although senior U.S. officials declined yesterday to confirm that account, the FBI affidavit says that Regan flew to Munich on June 26, 2001, and that before the trip he used the Internet to get the diplomatic address of an unnamed country in Switzerland, said by sources to be either Iraq or a former Soviet republic. In July, with the approval of the FBI, Regan's top-secret clearance was restored, and he was moved to a TRW office at NRO headquarters. That office had been wired by the FBI, under a court-authorized warrant, with a hidden video camera. According to investigative sources, prosecutors wanted visual proof that Regan was taking classified information, rather than depending upon computer data that could have been accessed by someone else using Regan's password. C 2001 The Washington Post Company -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3609 From: Shawn Hughes Date: Wed Aug 29, 2001 8:27pm Subject: nsa on cbs National Security Nightmare The Largest Spy Agency Falls Behind Secret Operation Opens Up About Its Needs To Advance Soviet Technology Was Easier To Crack Than Bin Laden's Aug. 29, 2001 CBS The NSA's epicenter (CBS) The National Security Agency is the largest spy agency in the United States, and perhaps the world. Twice as big as the CIA, the NSA eavesdrops on communications worldwide. News cameras have never been allowed inside the ultra-secret agency - until now. Correspondent David Martin provides a look at America's most secret spy agency, which is located on 350 acres, south of Baltimore, studded with giant antennas and protected by barbed wire and guard dogs. A phone call intercepted by the NSA is often the first warning that a terrorist such as Osama bin Laden is planning an attack against Americans. To find that threatening phone call, email or radio transmission among the billions made daily, the NSA relies on rooms of supercomputers. But the NSA has fallen on difficult times. In January 2000, Gen. Mike Hayden, the director of the NSA, received a call from the agency's watch officer alerting him that all of its computers had crashed. Secrets of the NSA What does the NSA do with its secret documents when it's done with them? Find out in this Web-exclusive sidebar. "He told me that our computers were down," Hayden recalled. "We were dark. Our ability to process information was gone." As much of the East Coast dug out from a surprise snowstorm, Hayden went on closed-circuit television to warn his work force what was at stake. "I said, 'This is secret. This can't be the second half of a sentence that begins, 'Honey, you won't believe what happened to me at work today,'" Hayden said. "NSA headquarters was brain dead. We had some residual ability at our locations around the world, but I don't want to trivialize this. This was really bad." The computers were back up in three and a half days, but there was no denying the enormity of what had happened. The NSA's problems went beyond overworked computers. But almost none of this was understood outside the highly secretive organization. Does the NSA eavesdrop? "We're involved in signals intelligence," Hayden said. Signals intelligence means operating listening posts all over the world to intercept billions of radio transmissions, phone calls, emails and faxes and to uncover terrorist plots and other foreign threats to the United States. But the NSA will never reveal what all these antennas are listening to. "If the target didn't think he or she was communicating privately, they wouldn't communicate," Hayden said. "The key to this business is actually doing what your adversary believed to be impossible." Tools of the Spy Trade The tools spies use in their work have changed throughout the years. Click here to see a timeline and other secrets of the spies. At the epicenter of the NSA, intercepted communications are continually funneled through an operations center directed by Richard Beraradino. The NSA hears what some of our adversaries are saying as they say it, or as Beraradino puts it, "intelligence that's flowing from the horse's mouth." Conversations of air defense gunners preparing to take a shot at an American plane over Iraq are monitored and warnings are sent out via a top-secret chat room. The NSA has a gamut of security devices to protect its secrets. There is a finger identification system and scanners that can recognize eyeballs. Office keys are never taken home - they're issued by machine each morning. Some of what goes on here is straight out of a James Bond movie. Dave Murley is working on a computer that can recognize a face. It allows access to computers only when it recognizes the face of an authorized user. At the NSA even the trash is a government secret. The NSA gets rid of 40,000 pounds of classified documents each day, by recycling them into pulp shipped off to become tissue paper. Until recently NSA employees were forbidden to tell their neighbors or families their profession. On any given day, the majority of intelligence that shows up in the president's morning briefing comes from the NSA, considered by many to be the cornerstone of American intelligence. Some might therefore be alarmed to read a report by a team of NSA insiders concluding that the "NSA is in great peril." "We're behind the curve in keeping up with the global telecommunications revolution," Hayden said. The NSA is now trying to play catch-up to Silicon Valley and the cell phones and computers that have proliferated throughout the world. "In the previous world order, our primary adversary was the Soviet Union," Hayden said. "Technologically we had to keep pace with an oligarchic, resource-poor, technologically inferior, overbureaucratized, slow-moving nation-state." "Our adversary communications are now based upon the developmental cycle of a global industry that is literally moving at the speed of light ... cell phones, encryption, fiber optic communications, digital communications," he added. Documents introduced at the trial of the four men convicted of blowing up two American embassies in Africa indicate that the NSA was monitoring Osama bin Laden's satellite phone as he allegedly directed preparations for the attack from his hiding place in Afghanistan. Even so, the NSA was unable to collect enough intelligence to stop it. "Osama bin Laden has at his disposal the wealth of a $3 trillion-a-year telecommunications industry," Hayden said. The NSA's nightmare is terrorists like Osama bin Laden using technology developed in the United States to hide their plans to attack Americans. One way they can do it is via a software program to make messages unreadable. An independent computer programmer, Phil Zimmermann, developed the program, which he calls Pretty Good Privacy. He distributes it for free on the Internet as a protest against government surveillance. "We don't want to leave behind the privacy that we enjoyed before all this new technology came in," Zimmerman said. This is cryptography for the masses. "I can't think of a way of making it available to the good guys without also making it available to the bad guys," Zimmerman said. So a person who wants to protect their credit card number has the same access to Pretty Good Privacy as a terrorist. "It bothers me a great deal but I don't know how to solve that problem," he said. And that's a big problem for the NSA, which has top-of-the line supercomputers - some of them capable of performing more than 1 trillion operations per second - to help decipher unreadable jumbles of letters and numbers. They are increasingly hard-pressed to keep up with the sheer volume of traffic. As the demands grow, the system is stretched thinner and thinner. Until they broke down completely in the January 2000 incident that Hayden calls the ultimate wake-up call. Too Secretive? Is the U.S. government too secretive about its domestic spying? Share your views on 60 Minutes II's bulletin boards. When he became director two years ago, Hayden commissioned two studies of the organization and received a scathing indictment of a stagnant and unwieldy government bureaucracy. There is "confusion and paralysis," the reports said. "We have run out of time." Instead of hiding the problems, Hayden made sure those scathing reports were circulated inside and outside the NSA. Hayden is working to tear down some of the NSA's high walls of secrecy. Those walls kept the NSA's secrets safe but they also kept out the ideas and innovations the agency needs to stay vital, he said. So far, his transformation is still a work in progress. "This is about an agency that's grown up in one world, learned a way to succeed within that world and now finds itself in another world, and it's got to change if it hopes to succeed in that universe," Hayden said. Since last spring the NSA has appealed to Silicon Valley for help. Last month, it signed a contract with a group of computer firms to upgrade and reconfigure the agency's intelligence-gathering systems. The $2 billion contract is the largest ever awarded outside the super-secret agency. Copyright MMI Viacom Internet Services Inc. All Rights Reserved. [Non-text portions of this message have been removed] 3610 From: Marcelrf Date: Wed Aug 29, 2001 10:20pm Subject: Georgia State Patrol Troopers (SWAT Team)drunk at Cheddar's Restaurant =================================================== Wednesday, August 29, 2001 911 call: Troopers drunk at Cheddar's By Sharon E. Crawford The Macon Telegraph WARNER ROBINS --- State officials will not comment on whether a 911 call from a local eatery has anything to do with the suspension of three state troopers last week. The call, made Aug. 16 by a manager at Cheddar's Restaurant, alleged that "a truckful of drunk Georgia State (Patrol) troopers" had left the restaurant in a state-owned vehicle after spending the evening drinking in the eatery's bar. Jim Shuler, spokesman with the Georgia Department of Public Safety in Atlanta, said he could not comment on the 911 call. "I cannot get into the details of the investigation," Shuler said. Three troopers were placed on administrative leave with pay last Wednesday over an unspecified allegation of misconduct that occurred in Warner Robins the previous week. An investigation into the alleged misconduct began Aug. 17. The Georgia State Patrol's special weapons and tactics team spent that week training here. Shuler would not release the names of the troopers or the status of their employment Tuesday. Allen Peake, who co-owns Cheddar's parent company, C & P Seafood Co., confirmed last week that officials with the GSP's internal affairs unit have interviewed several of his employees about allegations that stemmed from the Aug. 16 incident. He did not want to comment further about the allegations. All 911 conversations are recorded, and the recording from shortly after midnight Aug. 16 indicates that Houston County emergency officials received a call from Cheddar's. A woman, who identified herself as a manager, said the troopers had left the restaurant in a state vehicle. She told the 911 dispatcher the troopers had told people "all around the bar" that they were SWAT team members. "I just want to make sure these jerks are not out there with my family," the manager told the dispatcher. "I just don't want my family out there with that bunch of drunks." When questioned by the dispatcher, the manager repeated the same license plate number three times. Shuler would not say whether the vehicle was assigned to the SWAT team. After the 911 dispatcher talked with the restaurant manager, a different dispatcher called the GSP post in Perry to find out where the SWAT team members were staying. During their conversation, the second dispatcher and the GSP dispatcher jokingly remarked that the SWAT team members were at Cheddar's allegedly drinking and "probably not going to remember what happened in the morning." The 911 dispatcher said the troopers had also been at Cheddar's the night before. The GSP dispatcher said the group was staying at the Comfort Suites, less than a half a mile down Watson Boulevard from the restaurant. The 911 dispatcher called the hotel moments later, and a man said all of the troopers were back in their rooms. Ricky Harlowe, director of Houston County 911, said the manager did not request a Warner Robins police officer to be dispatched to the scene. No police officer was ever called to the restaurant, nor was a lookout placed on the vehicle. A man who was also at Cheddar's on Aug. 16, speaking on condition of anonymity, said the group of troopers came into the restaurant's bar early in the evening and drank alcohol throughout the night. "A few of them let it get out of hand," the patron said. He said about five troopers stayed in the bar after the restaurant closed at 11 p.m., while the servers were cleaning up. When it was time for the bar to close at midnight, the patron said one of the troopers attempted to take a drink outside the restaurant and was stopped by the manager. Cheddar's' liquor license doesn't allow patrons to take drinks outside. "They had some choice words back and forth," the man said. "And then he spilled the drink all over her and dropped the glass in front of her." The patron said he wrote down the license plate number on the truck the troopers left in. According to the recording, the manager also reported that incident to the 911 dispatcher when asked whether the troopers had caused any problems at the restaurant. Cheddar's co-owner Peake was troubled by the incident. "I am just real disappointed with the conduct of the troopers," Peake said. "Our main concern is to look out for our employees and our customers." The SWAT team is now "standing down," and will not be sent out to support local law enforcement agencies until Oct. 1, Shuler said. He said this move is for training purposes only and has nothing to do with the investigation. "As of the middle of last week, the GSP troop commanders were told to notify post commanders that they should contact local law enforcement agencies (and tell them) that the GSP SWAT team is standing down to train troopers for key positions in the SWAT team," said GSP Lt. Col. Johnny Grimes, who heads GSP special operations. "This is a training issue, not an administrative issue." Georgia Public Safety Commissioner Robert Hightower said Tuesday the investigation by GSP internal affairs would be handled as swiftly as possible, Shuler said. "We promise to make a full and complete disclosure of any disciplinary actions at the completion of the internal investigation," Hightower said. -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 3611 From: Date: Wed Aug 29, 2001 10:27pm Subject: Re: Sweep equipment over 3GHz Paolo: For sweep equipment over 3 GHZ, look at the following web sites. Spectrum Analyzers, www.tucker.com Field Strength Meters, www.isa-tscm.com Used equipment, www.swssec.com Jack 3612 From: Miguel Puchol Date: Thu Aug 30, 2001 4:13am Subject: RE: Sweep equipment over 3GHz > A Tek 492 S/A... they can be had for 2-2.5k on Ebay... but if you > develop any problem with it your screwed. Agreed on the 492 being a good option, but I would clearly remove the 'portable' tag on it...my arms have grown a few inches since using this thing, it ought to come with a trolley as standard issue. Cheers, and happy hunting, Mike 3613 From: Miguel Puchol Date: Thu Aug 30, 2001 4:19am Subject: Portable S/A by Anritsu Hi all, Following on the trail of an earlier post regarding portable S/A gear, we are considering the purchase of a portable S/A, more precisely an Anritsu MS2711A, which covers 100kHz to 3.0GHz, and only weighs 4 lbs. (about 2 kg). Has anyone here any experience or recommendations regarding this equipment, or can suggest alternative models/manufacturers that would fall into this portability requirements? You can take a look at this one at http://www.us.anritsu.com/products/showProd.asp?prod=46 Thanks, all the best, Mike 3614 From: David Alexander Date: Thu Aug 30, 2001 7:50am Subject: re: newspapers you forgot The National Enquirer is read by people who don't care who runs the country, as long as she is blond, well-endowed and sleeping with someone famous. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 3615 From: James M. Atkinson Date: Thu Aug 30, 2001 9:47am Subject: Re: Portable S/A by Anritsu At 11:19 AM +0200 8/30/01, Miguel Puchol wrote: >Hi all, > >Following on the trail of an earlier post regarding portable S/A gear, we >are considering the purchase of a portable S/A, more precisely an Anritsu >MS2711A, which covers 100kHz to 3.0GHz, and only weighs 4 lbs. (about 2 kg). > >Has anyone here any experience or recommendations regarding this equipment, >or can suggest alternative models/manufacturers that would fall into this >portability requirements? > >You can take a look at this one at > >http://www.us.anritsu.com/products/showProd.asp?prod=46 > >Thanks, all the best, > >Mike No offense, but Since you asked: Using this instrument as your primary spectrum analyzer is dangerous because: 1) The sweep speed is incredibly slow, which means your likely to miss anything that is bursty or hopping. 2) The minimum IF bandwidth filter is 10 kHz which is fine if your looking for high power video signals, but a real liability if your looking for low power covert audio devices (ie: a narrow band UHF/VHF wireless microphones). 3) The widest IF bandwidth is 1 MHz which means it is worthless for examining video signals in Zero Span mode, and touchy to use when examining spread spectrum. 4) The dynamic range is (gasp) just over 65 dB, which in a nutshell means that it will be unable to detect very weak signals if the band is otherwise active. A dynamic range of at least 85 is good, and 110 is better. 5) The DANL or Displayed Average Noise Level of -97 dBm which means that is it fairly noisy, and again will not be able to detect weak eavesdropping signals. Since most modern spectrum analyzer have a DANL of about -150 dBm or better this indicates that the Anritsu unit is over 60,000 times LESS sensitive. This also means that you will have to be over 200 times CLOSER to the bug then if you were using a larger instrument. 6) The frequency coverage on the low end leaves a lot to be desired and it is going to be virtually worthless when trying to examine subcarrier signals, or for chasing down VLF signals. 7) The minimum displayed range is only 20 dB, which when added to -97 DANL which means that if your lucky you might be able to see signals, but only if they are hotter then about -85 dBm or so. Typically we want our signals to appear at least 6 dB above the noise floor, and we want to be able to make that signal take up at least 50-60% of our display. [Personally, I prefer to use instruments with a use a DANL of -150 dBm or better, and I look for signals less then 3 dB above the noise floor.... and in cases of a known a bugging frequency (ie: 398.6605 MHz) I drop this down to alerting on anything more then a half dB above the DANL.] 8) All things being equal, the Anritsu unit is fine for testing strong signals, signals where you already know the frequency, and stronger interfering signals (perfect for the land mobile techies). But, in TSCM we are not looking for those kinds of things, and instead have to concentrate on signals that just barely rise above the noise floor. It is a nice unit, but I don't feel that it is appropriate for TSCM work... it is like trying to cleave single mode glass fibers with a double sided woodsman axe. -jma -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3616 From: M. Geron, CFE, F.IPI, CII Date: Thu Aug 30, 2001 10:40am Subject: RE: Email and fax disclaimers > 1. RE: Email and fax disclaimers > From: "James Goldston" We currently use the following: =========================================== NOTICE: THIS EMAIL IS FOR THE CONFIDENTIAL USE OF THE INTENDED RECIPIENT/S, AND MAY BE PROTECTED BY CLIENT PRIVILEGE. UNAUTHORIZED REVIEW, DISSEMINATION, OR DISTRIBUTION OF THIS EMAIL IN WHOLE OR PART IS PROHIBITED. ============================================ And when required we use PGP signatures and encryption. Best regards, Michael __________________________________ F. & M. GERON (1979) LTD. - ISRAEL International Prevention, Investigation, Recovery, and Related Services Michael Geron, CFE, F.IPI, CII GIN Charter, IOA Charter, AIO (Israel), NALI, ABI, WIN, ASIS, IKD Founder & President of the Israel Chapter of A.C.F.E. Regional Director for Israel of the CII Email: m_geron@n... Corporate Profile: http://www.Israel-PI.com PGP key available on request. 3617 From: Miguel Puchol Date: Thu Aug 30, 2001 10:22am Subject: RE: Portable S/A by Anritsu Hi James, and thanks again for a frank, concise and good answer :-) > Using this instrument as your primary spectrum analyzer is > dangerous because: OK, I promise I won't use it as our primary - as commented before, we have a 492PGM going up to 21GHz, I agree there are better, newer and less heavy ones, but it does a good job. The target for the Anritsu is a basic (very, very basic) quick check for the likely bugs found in this country, which basically range from 10MHz up to 950MHz, although we have seen dual band (900/1800MHz) GSM phones used as bugs. These tend to be relatively high-powered. > 1) The sweep speed is incredibly slow, which means your likely to > miss anything that is bursty or hopping. Again, we are looking for the simpler bugs. This S/A is intended for a quick-deploy field kit, like the one you mentioned a couple of weeks back. Something you can pack in a carry-on luggage bag. > 2) The minimum IF bandwidth filter is 10 kHz which is fine if your > looking for high power video signals, but a real liability if your > looking for low power covert audio devices (ie: a narrow band UHF/VHF > wireless microphones). Agreed. This is a negative point, specially considering it's price tag. > 3) The widest IF bandwidth is 1 MHz which means it is worthless for > examining video signals in Zero Span mode, and touchy to use when > examining spread spectrum. Hmmmm....yes ok on the first part, S/S you'll see if only in part, and you can check more than one 1MHz portion with peak hold to reconstruct a pseudo-larger-image of what's going on. > 4) The dynamic range is (gasp) just over 65 dB, which in a nutshell > means that it will be unable to detect very weak signals if the band > is otherwise active. A dynamic range of at least 85 is good, and 110 > is better. That could be a problem in the Band II FM, where we see lots of home-brewed bugs. They put out 50mW max, although 1-watt devices have been spotted, mainly when they can run off the mains (hidden in a wall outlet or power splitter). > 5) The DANL or Displayed Average Noise Level of -97 dBm which means > that is it fairly noisy, and again will not be able to detect weak > eavesdropping signals. Since most modern spectrum analyzer have a > DANL of about -150 dBm or better this indicates that the Anritsu unit > is over 60,000 times LESS sensitive. This also means that you will > have to be over 200 times CLOSER to the bug then if you were using a > larger instrument. Agreed. But still, for such a portable device it ain't bad. > 6) The frequency coverage on the low end leaves a lot to be desired > and it is going to be virtually worthless when trying to examine > subcarrier signals, or for chasing down VLF signals. Yep, but we'd use other gear for that, as above. > 7) The minimum displayed range is only 20 dB, which when added to -97 > DANL which means that if your lucky you might be able to see signals, > but only if they are hotter then about -85 dBm or so. Typically we > want our signals to appear at least 6 dB above the noise floor, and > we want to be able to make that signal take up at least 50-60% of our > display. [Personally, I prefer to use instruments with a use a DANL > of -150 dBm or better, and I look for signals less then 3 dB above > the noise floor.... and in cases of a known a bugging frequency (ie: > 398.6605 MHz) I drop this down to alerting on anything more then a > half dB above the DANL.] Agreed. > 8) All things being equal, the Anritsu unit is fine for testing > strong signals, signals where you already know the frequency, and > stronger interfering signals (perfect for the land mobile techies). > But, in TSCM we are not looking for those kinds of things, and > instead have to concentrate on signals that just barely rise above > the noise floor. That's it's main target use, LMR testing, etc. It even has an option board to test TX power from transceivers. > It is a nice unit, but I don't feel that it is appropriate for TSCM > work... it is like trying to cleave single mode glass fibers with a > double sided woodsman axe. Have you ever tried it? A double sided woodsman axe is quite a fine instrument for chopping those thick F/O bundles... :-) All the best, and thanks for the comments, Mike 3618 From: zack <10-33@c...> Date: Thu Aug 30, 2001 10:50am Subject: e-mail disclaimers Something to think about ............ sure cant hurt to CYA. http://www.weblaw.co.uk/artemail.htm http://www.cr-law.co.uk/il6.html visit http://www.copscops.com Join the Law Enforcement community http://anexa.com/lawenforcement/index.Ihtml Washington DC Police Department http://mpdc.dc.gov/main.shtm The data contained herein is confidential. Unauthorized dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 3619 From: James M. Atkinson Date: Fri Aug 31, 2001 9:44am Subject: P&G Makes Admission on Violation [Here are the Big Boys battling it out over corporate espionage... ] [Here are the Big Boys battling it out over corporate espionage... ] http://cbs.marketwatch.com/tools/quotes/newsarticle.asp?symb=&guid=%7B43C12FC4%2D14C4%2D4C4B%2D841A%2D63246075C734%7D&siteid=mktw P&G Makes Admission on Violation 8/30/2001 9:16:00 PM CINCINNATI, Aug 30, 2001 (AP Online via COMTEX) -- Procter & Gamble Co. admitted that it gained information on competitor Unilever's hair care business in a way that violated P&G's policies, but it said it did nothing illegal. The Cincinnati-based company released a statement in response to a story posted Thursday night on Fortune magazine's Web site. The magazine reported that a company hired by P&G conducted the corporate espionage that included going through dumpsters. Fortune, citing a source it didn't identify, said operatives hired by P&G misrepresented themselves to Unilever employees, suggesting they were market analysts. P&G spokeswoman Linda Ulrey declined Thursday to comment on what took place or on negotiations that the magazine said are underway between P&G and Unilever. Fortune reported that negotiations to settle the dispute between Unilever and P&G have been ongoing since April, when P&G informed Unilever about the situation. The two companies have set a deadline of Friday to come up with a settlement, which could include a payment by P&G to Unilever that could reach tens of millions of dollars, the magazine said. "We are working very cooperatively with them to resolve the unfortunate situation as quickly as possible, and we regret that the situation occurred," said Ulrey, who would not comment specifically on negotiations. Stephen Milton, a U.S. spokesman for Unilever, confirmed Thursday night that negotiations were underway between the two companies. "The purpose of these discussions is to ensure that Unilever's interests are protected," he said, declining further comment. The magazine reported that spying against Unilever and other competitors began last fall and continued into the spring. The operation was halted earlier this year when senior P&G officials, including P&G chairman John Pepper, learned about it and P&G officials later outlined the transgressions to Unilever, the magazine said. Ulrey confirmed that three Procter & Gamble employees were discharged but would not comment on any actions taken by Pepper. Unilever's hair care business includes brands such as Salon Selectives, Finesse, and Thermasilk, while P&G manufactures Pantene, Head and Shoulders, and Pert. Douglas Christopher, an analyst that follows P&G for Crowell, Weedon & Co. said the hair care business is worth billions of dollars annually to both companies. "It's a big business," he said. "I know corporate espionage goes on in the business world, but I think that companies that try to get ahead by getting information about competitors are not focusing on what they should - on their core businesses and on coming up with innovations." --- On the Net: Procter & Gamble: http://www.pg.com Unilever: http//www.unilever.com By LISA CORNWELL Associated Press Writer Copyright 2001 Associated Press, All rights reserved -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3620 From: Aimee Farr Date: Fri Aug 31, 2001 11:10am Subject: PIs --> Competitive Intelligence Seems every time I turn around I see a PI talking about competitive intelligence as if it were a task-skill like "vacuum cleaning." I see lots of new links being added to web sites, PI associational sites, etc. Information collection is nothing new, but they are moving into analytics. What's the impression in here? Outlook? I don't have the "eons of perspective" that some of you have. :-) Factors? -------- - The lines between investigation and intelligence are blurring because some terms have greater marketing "polish." Intelligence has become a "buzzword." - The Net has led PIs to offer a wider array of services -- many offered as a value-added skillset. - Competitive Intelligence is accepted and practiced by small and mid-size firms. [I can't remember the recent study on this -- but it was a large number.] - Market forces (disintermediation, regulation and competition) make competitive intelligence more profitable. I fear that some PIs who use deceit in investigations are headed for trouble -- many don't understand the true breadth of what has been held to be a trade secret, or how "the lines" are closer here. (Few are members of SCIP, which has a no-deceit code of ethics.) I also fear buyer ignorance and the watering-down/tarnishment of the term. ~Aimee 3621 From: Larry Malmberg Date: Fri Aug 31, 2001 4:20pm Subject: Interesting reading regarding Private Investigators. http://www.abanet.org/journal/sep01/focus.html Larry Malmberg Investigations and Security 638 North D Street San Bernardino, CA 92401-1110 P.I. 15211, P.P.O. 12466 909-383-8565, 800-655-4549 Facsimile-909-383-8566 www.larrypi.com Not everything that counts can be counted and not everything that can be counted, counts. 3622 From: Craig Snedden Date: Fri Aug 31, 2001 11:39am Subject: Re: PIs --> Competitive Intelligence Aimee, I feel somewhat qualified to put a PI perspective on this. Obviously I don't know how the market is in the US, but from a UK point of view, I'd agree with every one of your Factors. Like every other industry the PI sector needs to continually evolve and I see PI's now, perhaps more than they ever have done in the past, trying to carve out new "market" sectors for themselves by "acquiring" new skill sets. (perhaps re-naming existing "skills" with what seems like a fashionable term like "competitive intelligence" would be a better description of the process). My personal background is in communications intelligence and what Winn Schwartau calls "Information Warfare". To that end I have been trained not only in the collection of information, but also analysis. However, I would never myself feel qualified to analyse "commercial intelligence" product to the degree needed to construct an accurate report which would be of value to the client. For that I'd have to engage an analyst with experience in the target sector (loads of other factors here too). So your point about deception is very valid. My personal morals (as well as the codes of conduct of the various associations I am a member of) wouldn't allow me to deceive a client. But then, there are many many unscrupulous people out there who think that being a PI is an easy way to earn a crust.... It aint! Good weekend to all. Craig Snedden The data contained herein is confidential. Unauthorised dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 3623 From: Aimee Farr Date: Fri Aug 31, 2001 6:41pm Subject: RE: PIs --> Competitive Intelligence I received some feedback (more like flashback) from the PI sector that makes me think I was disparaging and lecturing on ethics. Just to clarify, THIS is disparaging: Your industry evidences a complete educational, ethical, and organizational failure. However, many might say the same thing for mine. And, several did. *laughter* I'm asking a question, not criticizing the industry -- which I admit I do frequently. I think your industry should raise the bar. Quick. The privacy waterline is rising, your legal environment is growing increasingly complicated -- I'm concerned about your profession's reputation and welfare. I wasn't attacking the ethics of private investigators, merely pointing to a trend that I thought bore some relationship to espionage. Some investigative firms are really good at the competitive intelligence function. But, I wouldn't think it is the ordinary case. Finally, no, I'm not saying you can't pick up an additional skillset or competency. (If that were true, I would be in a hell of a fix.) Don't think I was offended by anybody's offlist commentary -- quite the opposite. :-) ~Aimee 3624 From: Gil Zimmerman Date: Fri Aug 31, 2001 5:55pm Subject: RE: PIs --> Competitive Intelligence Craig, There is one important underlying issue that affects both the image and the reality of the investigator experience and market in the UK. There is no standardized licensing nor is there a vetting process to keep criminals and riff-raff from hanging up a PI shingle. I know a number of highly credentialed investigators in the UK and Ireland whom I would trust not only to do work for me but also to deal directly with my clients. I also know there are a few ex-cons peddling their services as PIs. In the US, we have licensing in 41 states. The drive to create a seamless network of standardized and reciprocal licensing agreements may create the requirement that everyone conducting 'competitive intelligence' work be licensed in those states. There is a movement now to create a standard license procedure in the UK. Similar laws exist in France and other countries. Some will argue the issues of licensure and it's applicability to the competitive intelligence business but when you look at the statutes and compare them to what you do, I think you will have a difficult time making the case against licensure in quite a few of the US states and eventually, in the UK. We recently moved from France, where my wife continues to work as a licensed investigator, and to do your work there would require licensing, at least that's what the secret police say. PIs are not necessarily acquiring new skills. They may be putting a new face on them and as Aimee mentioned, there is some trade in buzzwords. But self-promotion is also a weeding out process and eventually, anyone who says they do one thing well will have to prove it or loose their share of the market and their business. For PIs in states and countries where statutes regulate business and activity, licensure helps with the weeding out. Serious investigative professionals not only collect information but provide analysis, when it's appropriate or part of the assignment. In that sense, there is little functional difference between some of what you do and some of what we do. We seek out qualified experts who can collaborate with us when data collection and analysis requires specialization. I know PIs who are accredited experts in specific categories and they are well qualified to provide analysis in their area of expertise. I don't think PIs have a lock on deceptive business practices. True, I know a few who I will never refer or call. But I also know a few attorneys whose legal perspectives will never warrant consideration. I think you will find a few in your area of expertise that you would choose not to consult with or trust with your clients interests. It's part of human nature, demographics, statistics, and business. When we consider a collaborator and referral partner, we look for recommendations from peers and clients. It's easy to find folks who share the same high values we (and you) have and it only takes a little time to sift through the pack to find one or two that will be a good match for us and our business over the long run. If you are having a challenge finding qualified PIs in the UK, or for that matter in any other global market, we would be happy to have a conversation with you (or anyone else) and share our experience and connections. Warmest regards, Gil Gil Zimmerman Erhart Sawyer International 676A Ninth Avenue, #207 New York, NY 10036-3611 nonsecure email gilzimm@a... secure email auto93971@h... text message 6462617378@m... (646) 261-7378 voice & messaging 24/7 (646) 349-1485 fax (877) 856-1774 US toll free (33) (0)1 43 66 81 05 Paris bureau (33) (0)1 43 66 14 94 Paris fax www.cabinet-erhart.com 3625 From: A Grudko Date: Sat Sep 1, 2001 4:03pm Subject: Re: Competitive Intelligence - Original Message - From: Aimee Farr > Seems every time I turn around I see a PI talking about competitive > intelligence as if it were a task-skill like "vacuum cleaning." I was Chairman of the South African chapter of the Society of Competitive Intelligence Professionals for 2001 and have been a member of SCIP (www.scip.org - well worth visiting) for 3 years. SCIP has over 7000 members and a full time staff of about 20, split between the US and UK. CI in current terminology uses legal information gathering and analasys to produce intelligence and PIs are generally (here in SA and IMHO) looked down on. CI here is comprised mostly of people with business qualifications and a few ex-intelligence operatives. PIs collecting business information using covert means are not considered to by CI practitioners but business 'spys' to different degrees. But then, some observers point out that SCIP's HO is at Alexandra, Virginia, sort of down the road from Langley...;-) Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.icon.co.za/~agrudko/fp.htm , Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, SCIP, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time "Experience is the name everyone gives to his mistakes" Oscar Wilde - A tribute to the late Roy Lawson. 3626 From: Martin Brown Date: Sat Sep 1, 2001 5:38pm Subject: Re: Re: Competitive Intelligence Well, Andy, being one of the great unwashed and under-educated "P.I.'s" that you chose to malign in your rather broad strokes ("P.I.'s are generally looked down upon), I decided to review www.scip.com. Honestly (and we are honest upon occasion), it sort of looked like someone with a solution trying to create a problem; like marketing feminine hygiene spray. Then gloss it up with a dash of mystique (sort of down the road from Langley..."). I am reminded that when I first left police work to become a "P.I.", the big deal was to get a "certified fraud examiner" certificate so you could put "C.F.E." after your name (become a man of letters, so to speak). Just had to send in $135 and take a short course. It was slightly harder than joining the the Flash Gordon Rocket Rangers Club, but at least you got a decoder ring when you were a Rocket Ranger. I work with other "P.I.'s" who had distinguished careers as police detectives, federal agents, military operators, even a few who weren't just "sort of down the road from Langley.." In defense of them, as of myself, you might be surprised what we have been able to accomplish, and continue to do so, for our clients. In this business, you are only as good as the last thing you did; and, believe it or not, some of us have been around a lot of years. Thought that in your quest for knowledge, this might be of interest. Martin Brown Brown & Sikes, Inc. Dallas, Texas A Grudko wrote: > - Original Message - > From: Aimee Farr > > Seems every time I turn around I see a PI talking about competitive > > intelligence as if it were a task-skill like "vacuum cleaning." > > I was Chairman of the South African chapter of the Society of Competitive > Intelligence Professionals for 2001 and have been a member of SCIP > (www.scip.org - well worth visiting) for 3 years. > > SCIP has over 7000 members and a full time staff of about 20, split between > the US and UK. > > CI in current terminology uses legal information gathering and analasys to > produce intelligence and PIs are generally (here in SA and IMHO) looked down > on. CI here is comprised mostly of people with business qualifications and a > few ex-intelligence operatives. > > PIs collecting business information using covert means are not considered to > by CI practitioners but business 'spys' to different degrees. > > But then, some observers point out that SCIP's HO is at Alexandra, Virginia, > sort of down the road from Langley...;-) > > Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - > www.icon.co.za/~agrudko/fp.htm , Est. 1981 > National and international crime investigation, intelligence and protection > Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 > 0255 - 244 0256 (Fax) > SACI, WAD, CALI, SAMLF, SCIP, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom > When you need it done right - first time > "Experience is the name everyone gives to his mistakes" Oscar Wilde - A > tribute to the late Roy Lawson. > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3627 From: James M. Atkinson Date: Sat Sep 1, 2001 8:05pm Subject: Tricks of the corporate spying trade Tricks of the corporate spying trade Going too far can put a company's reputation at risk, say Michael Skapinker Published: August 31 2001 19:11GMT Last Updated: August 31 2001 19:21GMT http://news.ft.com/ft/gx.cgi/ftc?pagename=View&c=Article&cid=FT3BFQLB2RC&live=true The Society of Competitive Intelligence Professionals in Alexandria, Virginia wrinkles its nose at the mention of "dumpster diving" or rifling through a competitor's rubbish in search of corporate secrets. "It's not professional," says Bill Weber, executive director of the society, which represents 6,000 corporate intelligence gatherers in 45 countries. Yet Procter & Gamble, one of the world's most respected companies, this week admitted that a company working on its behalf went through rubbish put out by Unilever, its fiercest rival, in an attempt to find out more about its hair-care business. P&G denied, however, that its contracted company's staff misrepresented themselves to Unilever as market analysts. P&G told Unilever about its lapses when its senior executives found out about them. Adding to the aura of intrigue, Fortune magazine, which broke the story, said the operation involved use of a safe house, "The Ranch". P&G is not the only company involved in such activities. Last year, Oracle, the US software group, admitted hiring investigators to go through rubbish thrown out by companies that supported Microsoft during its antitrust trial. Larry Ellison, Oracle's chief executive, said: "Maybe our investigation organisation may have done unsavoury things, but it's not illegal." Two engineers at Lucent, the US technology company, were arrested this year along with a third person, and charged with the theft of commercial secrets that were allegedly transferred to a company in China. Growing international competition means companies are under increased pressure to discover what rivals are up to. There is no shortage of people to help them find out. The end of the cold war has led to many former spies seeking work in the private sector. Mr Weber agrees that many of his society's members were formerly in "government service", although he says they also include database librarians and computer specialists. Even those who remain in government employment are increasingly turning their attention to commercial rather than military espionage. Explaining the way that spying changed when the cold war ended, Louis Freeh, then director of the US Federal Bureau of Investigation, told a congressional committee in 1996: "In today's world, a country's power and stature are increasingly measured by its economic and industrial capacity. Consequently, foreign government ministries that deal with finance and trade and major industrial sectors play a growing role in their respective countries' [intelligence] collection efforts." Mr Weber argues that so much public information is now available that subterfuge is unnecessary. He dislikes the term "espionage", which he says refers to illegal information-gathering. His society's code of practice requires members to act legally and never to obtain information by pretending to be someone else, such as a customer, supplier or journalist. "Most of the work is with open-source information. The internet has created a wealth of stuff that just has to be analysed," he says. Like Oracle, P&G said this week that it had not broken the law. It said the company that went through Unilever's rubbish was a "rogue operator". This would not come as a surprise to Marc Barry, self-confessed corporate spy, and co-author of Spooked: Espionage in Corporate America, published last year. Mr Barry alleges that companies that want to engage in "dumpster diving" or other underhand practices simply contract the work out to an independent operator or "kite", as P&G is alleged to have done. "The kite serves as a proxy," Mr Barry writes. "He does the dirty work but provides plausible deniability to a company in case an operation goes awry." He writes that he acted as a kite for Schwan's Sales Enterprises, a food company desperate to find out more about the "rising crust" pizza being developed by its rival, Kraft. The crust was designed to taste better because it had not been pre-cooked and was baked for the first time in the consumer's oven at home. Mr Barry says that, without Schwan's knowledge, he extracted reams of information from Kraft in a day and a half by posing on the telephone as, successively, a journalist, an environmental activist, a cardboard manufacturer, a Kraft employee and a food researcher. Patrick Grayson, a London-based specialist who advises companies on their dealings with corporate security firms, says much of the law on intelligence-gathering is a muddle. Some activities are clearly illegal. "You can assume bugging or breaking and entering is off-limits pretty much anywhere you go," Mr Grayson says. Rules on claiming to be someone else differ from country to country, as do laws on rifling through rubbish. "There should be a whole international law practice on garbage collection," he says. Alden Taylor, head of the business intelligence practice at Kroll Associates, the corporate security specialists, says rules on rubbish differ even within the US. In some states, rubbish is treated as "abandoned property" and is freely accessible. In others, the law depends on whether it is in a company's own bin or one owned by a refuse collector. The law is not everything, however. Corporate spying can cause long-term damage to a company's reputation, as British Airways discovered in the 1990s when it hacked into the computers of its rival Virgin Atlantic. By confessing to its errors, P&G attempted to limit the damage to its reputation. There are ways to avoid this sort of trouble, Mr Grayson says, apart from using the internet. He once answered a client's questions about a rival by simply organising a bona fide tour of its factory. www.ft.com/espionage © Copyright The Financial Times Limited 2001. ========== Unilever seeks review of P&G's product line By Adam Jones in London and Andrew Edgecliffe-Johnson in New York Published: August 31 2001 18:15GMT Last Updated: August 31 2001 23:43GMT http://news.ft.com/ft/gx.cgi/ftc?pagename=View&c=Article&cid=FT3BF1FA2RC&live=true&tagid=IXLI0L9Z1BC Unilever is seeking an independent review of Procter & Gamble's product launch plans for fear they may have been influenced by information obtained by rogue spies. Talks between the rival consumer products companies broke up for the weekend on Friday night, following P&G's admission that an operation to spy on Unilever's hair care arm violated its internal guidelines. P&G returned more than 80 documents to Unilever after discovering the breach - which included rooting through litter bins, a practice known in the trade as "dumpster diving". P&G has told Unilever that none of the information gleaned would be used in its business. On Friday, P&G would not elaborate on the situation, saying it remained eager to reach a settlement. To settle the affair, Unilever has demanded that an independent third party audit P&G's plans for new hair care products over the next two-to-three years to make sure they are not based on its own ideas. The auditor would not share the information with P&G but would be empowered to rule on any suspicious overlap. Unilever was also seeking a compensation payment worth $10m-$20m, but this was seen as secondary to the demand for an independent audit. Charlie Strauss, president and chief executive of Unilever USA, was leading Unilever's team in the talks, opposite John Pepper, chairman of P&G. It is understood that Unilever had warned that if significant progress towards a settlement was not made, it was prepared to take the matter to court next week. P&G's hair care sleuthing is thought to have been backed by a budget of $3m. Among the secrets gleaned from Unilever were precise plans for a product which is due to launch in February, it is understood. P&G's operatives learned the price of the product, when it would be shipped and how much was to be spent on advertising. Unilever has since tightened up the way it handles and disposes of sensitive documents. P&G brands have about 31 per cent of the US shampoo market, versus Unilever's 20 per cent. David Lang of Investec Henderson Crosthwaite said: "Unilever has added about 5 per cent of market share in the 1997-2001 period." It has also made gains in conditioners. P&G informed Unilever in early April that its own internal rules had been breached. In May, it bought Clairol for $4.95bn to increase its hair care business. In 1999, Mr Pepper told a trade association meeting that competitive intelligence was "of singular importance" to a company such as P&G. He said it had shifted "from collecting, analysing and disseminating information, to acquiring and using knowledge to create winning strategies", according to a report in Competitive Intelligence Magazine. © Copyright The Financial Times Limited 2001. ========== P&G admits it spied on arch-rival Unilever By Andrew Edgecliffe-Johnson in New York Published: August 31 2001 00:43GMT Last Updated: August 31 2001 00:58GMT http://news.ft.com/ft/gx.cgi/ftc?pagename=View&c=Article&cid=FT3ED8E81RC&live=true Procter & Gamble, the maker of Pantene shampoo, has admitted to having conducted a corporate espionage operation against Unilever, its Anglo-Dutch arch-rival, it emerged on Thursday night. Lawyers for the two companies were attempting to agree a settlement after P&G alerted Unilever that it had employed a competitive intelligence group that violated internal guidelines. The group, hired through a contractor, is understood to have operated out of a safe house in Cincinnati, Ohio known as "the ranch". The undercover operation sought information about Unilever's US hair care business and employed tactics including "dumpster diving" - going through P&G's rubbish. Unilever confirmed that it was in discussions with P&G "regarding their competitive intelligence operations directed against Unilever in the US". The operation was first reported by Fortune magazine. One person close to Unilever said it was seeking "tens of millions of dollars" in restitution. If no settlement can be reached by Friday night, Unilever is understood to have threatened to pursue the matter in court. P&G issued a statement saying "the specific means used to obtain the information [on Unilever] violated the company's strict policy regarding competitive business information gathering". It added that employees directly involved in the project have been "separated" from the group. P&G and Unilever have had frequent product disputes, including the "soap wars" of the 1990s, and corporate espionage is common in the industry. However, both groups are treating this case as serious. John Pepper, P&G's chairman, is understood to have flown to Europe on Tuesday for a meeting with Niall Fitzgerald, Unilever's co-chairman. P&G is understood to have alerted Unilever to the espionage operation in early April. P&G said the information was obtained lawfully, although "the means used did violate our policy". It added that, to its knowledge, P&G staff had not misrepresented themselves in their effort to glean information. © Copyright The Financial Times Limited 2001. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3628 From: Aimee Farr Date: Sat Sep 1, 2001 9:29pm Subject: RE: Tricks of the corporate spying trade > Patrick Grayson, a London-based specialist who advises companies on > their dealings with corporate security firms, says much of the law on > intelligence-gathering is a muddle. Some activities are clearly > illegal. "You can assume bugging or breaking and entering is > off-limits pretty much anywhere you go," Mr Grayson says. Don't you love how reporters pick quotes? This one threw such illumination on the subject. > Rules on claiming to be someone else differ from country to country, > as do laws on rifling through rubbish. "There should be a whole > international law practice on garbage collection," he says. Aimee E. Farr, Esq. INTERNATIONAL WASTE ARCHEOLOGY PRIVACY LAW Yeah! And yet, another reason why I don't tell my old country lawyer father about my practice interests. I office next to him. "Uhm, you got a book order in...." *he loiters around* "Somebody is here to see you..." *he loiters around* And my personal favorite: "Please give _Mr. Wolf_ your private number, he is scaring Susan with his messages." Did anybody see the website dumspterdiversomaha.com? It got yanked, but it was a handy community database of garbage gossip. It mentioned the development of a network of "cells." The splash page -- documents from a lawyer's office. They also hit up medical, etc. They sent you a "friendly note" informing you that your items were featured, presumably as a prelude to negotiations. The next one will be more stealthy than an aol account, and will make instant trash privacy headlines. > Alden Taylor, head of the business intelligence practice at Kroll > Associates, the corporate security specialists, says rules on rubbish > differ even within the US. In some states, rubbish is treated as > "abandoned property" and is freely accessible. In others, the law > depends on whether it is in a company's own bin or one owned by a > refuse collector. They differ considerably in the US. Many states have statutes on point, and a more subtle issue is in states with express or implied privacy in the state constitution. The "cop law" that people are looking at here.....the balance is increasingly likely to weigh different in the private sector. 4th Amendment privacy is for cops -- if you're private, you go to tort law. This site is very outdated: http://www.rbs2.com/privacy.htm#anchor666666 (see Garbage privacy) Actually, this is well within the purview of being addressed by legislation, as you can see by this identity-theft statute. Some privacy protection acts may give shelter, like this AZ bill: http://www.azleg.state.az.us/legtext/45leg/1r/bills/hb2351h.pdf Includes business customer record destruction/disposal requirements and... E. ANY PERSON WHO, FOR ANY PURPOSE, USES PERSONAL INFORMATION 20 CONTAINED IN RECORDS THAT WAS DISPOSED OF BY A BUSINESS IS LIABLE TO THE 21 INDIVIDUAL WHOSE PERSONAL INFORMATION IS CONTAINED IN THE RECORDS AND TO THE 22 BUSINESS THAT DISPOSED OF THOSE RECORDS FOR AN AMOUNT OF DAMAGES RESULTING 23 FROM THE USE OF THE PERSONAL INFORMATION. THIS PARAGRAPH DOES NOT APPLY TO A 24 PERSON WHO USES PERSONAL INFORMATION WITH THE CONSENT OF THE INDIVIDUAL WHOSE 25 PERSONAL INFORMATION IS CONTAINED IN THE RECORDS OR OF THE BUSINESS THAT 26 DISPOSED OF THOSE RECORDS. ---------- Pretexting ---------- Insurance investigation: http://www.ca9.uscourts.gov/ca9/newopinions.nsf/2420941536B4FA2588256A46005D 0DED/$file/9955963.pdf?openelement "Rep. Tazin asks - what is the law on pretexting?" http://www.techlawjournal.com/cong107/privacy/idtheft/20010619.asp See FTCA Sect. 5. 15 U.S.C. ß 45(a) and related decisions. > The law is not everything, however. See, spy stories talking about the law. They all do it. As we all know, every good spy reads the law and follows it. Maybe I should start a little "Spy Law Reporter." ~Aimee 3629 From: James M. Atkinson Date: Sun Sep 2, 2001 9:55am Subject: Peace talks in shampoo spy war September 2 2001 BRITAIN Peace talks in shampoo spy war http://www.sunday-times.co.uk/news/pages/sti/2001/09/02/stinwenws01019.html? Robert Winnett UNILEVER and Procter & Gamble will meet in New York on Tuesday to work out a compensation deal after P&G admitted that it had obtained internal documents from its rival. The company is understood to have employed a "corporate intelligence" agency to obtain information on Unilever's plans for the next few years. The firm is believed to have hired an agent who rifled through Unilever's rubbish and masqueraded as an investment analyst. If agreement is not reached, Unilever is planning to take P&G to court, claiming that it trespassed on private property in Chicago to obtain more than 80 documents, understood to reveal detailed plans about future launches of Unilever shampoos. Unilever owns the Salon Selective and Finesse brands, while P&G makes the Wash & Go, Head & Shoulders, Pantene and Vidal Sassoon brands. Unilever is demanding more than $10m in compensation and for executives working in P&G's shampoo department to be moved to other parts of the business. It also wants to stop P&G launching new products that would interfere with its own launches for several years and is proposing to appoint a third-party ajudicator to oversee P&G marketing plans during the period. Steve Milton, a Unilever spokesman in America, said: "There will be a resolution on Tuesday. The sticking point is over our request that Procter & Gamble restrict activity in the marketplace for several years." A spokesman for P&G would not comment on the details of the meetings or allegations. However, she said: "This is a very regrettable incident but we have not broken the law." P&G executives were the first to realise that its corporate intelligence team had gone too far earlier this year. The company sacked three employees and admitted to Unilever what it had done. Many large companies now have corporate intelligence departments, which employ outside agencies, often set-up by former spies. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3630 From: James M. Atkinson Date: Sun Sep 2, 2001 9:54am Subject: P&G spy caper won't leave lasting damage P&G spy caper won't leave lasting damage http://www.timesofindia.com/articleshow.asp?art_id=1093899153 CHICAGO: Procter & Gamble Co's admission it used covert means to gather intelligence about the hair care products of its main consumer products rival is unlikely to cause it more than a few split ends in its turnaround efforts. While the bad hair day is embarrassing for the company and may end up costing it through a financial settlement with Unilever NV, the Anglo- Dutch owner of such global brands as Lipton tea, Dove soap and Skippy peanut butter, any damage from the admission will not last long, analysts said. Wall Street is prepared to give P&G chief executive A.G. Lafley room for some missteps as he seeks to get sales back on an expansion path. Indeed, P&G's shares dipped just 44 cents to $ 74.15 on Friday, the day after the admission, which followed a Fortune article that broke the story. The company's decision to come clean when it realised outsiders it hired had "gained access to some Unilever information" through means that violated P&G policies has helped to reduce the damage to its image, analysts said. P&G has said it voluntarily informed Unilever of the issue and has been working cooperatively with its rival on a settlement. "I take this as a lightning strike, it's a random event that happens," said Dave Kolpak, an analyst at Victory Capital Management. "The thing we ought to watch is how does AG Lafley respond and it seems they are responding forcefully and quickly," he said. Lafley took over as CEO in June 2000 at a time when the maker of Ivory soap, Tide detergent and Head and Shoulders shampoo had suffered a series of setbacks, particularly in marketing, losing share to competitors. He has gone a long way toward correcting problems that had cropped up under previous management, setting more conservative growth targets, quickly dumping new products that failed in the marketplace and focusing on its biggest brands in its biggest markets, analysts said. "They've got a lot going on, so there'll be setbacks at some point," Dan Popowics, analyst at Fifth Third Bank, said. "But I think steady progress is the name of the game here." P&G hired private operatives, who learned their craft conducting covert operations in the Vietnam War, to scour Unilever dumpsters and pose as market analysts to glean information known in the trade as "competitive intelligence (CI)," Fortune said on its website. The magazine said that the two companies have been negotiating a settlement since April when P&G first told Unilever about the matter, calling it a rogue operation. When senior managers found out about the spying, which had begun last autumn, they fired three P&G employees, the article said. A source familiar with the talks said P&G allegedly used a "web of contractors and agents" to obtain marketing information from a Unilever hair care office in Chicago. Unilever has recovered 80 documents from P&G, the source said. Industry sources said Unilever wants third party monitors to make sure P&G does not use the information to launch products or ads ahead of Unilever. The admission of espionage is not the only problem Cincinnati-based P&G has faced under Lafley. Most notably, earlier this year the company announced a major deal to sell snacks and juices in a JV with Coca-Cola Co, only to have it fall apart when Coca- Cola backed out. And Lafley has gotten good marks for his stewardship at P&G. "Bottomline, I think they're moving in the right direction," Tim Drake, consumer non-durable goods analyst at Banc One Investment Advisors, said. "I think Lafley has made appropriate choices and instituted programmes that are going to get P&G on the right track. It just takes a bit of time to get everything going in the right direction." Analysts and investors said they could not remember another time in recent history where the company had been caught up in a similar controversy. Some say the incident may be a sign that P&G has changed over the past decade in the face of stiffer competition and consolidation among its retail customers. "Procter used to be a methodical, straight-forward kind of company," one industry source who declined to be identified, said. "Now you're starting to see a more aggressive Procter, a more shoot-from-the-hip story." Much of that more aggressive posture has been lauded by analysts. Unlike in its secretive past, Lafley has been more willing to work with outside partners to develop its business. Analysts also think P&G is handling the allegations as well as it can. While the information was obtained lawfully, the methods used to gain access to it had violated its strict policies, the company said. An executive that does marketing work for P&G said the company is very clear with outside vendors on what rules they need to follow. "I don't know too many other companies who would do what they did," said Ken Harris, a partner at Cannondale Associates, a consumer products marketing and sales consulting firm that works for P&G and has worked for Unilever in the past. "I know how strict they are." ( REUTERS ) -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3631 From: James M. Atkinson Date: Sun Sep 2, 2001 9:58am Subject: A Hairy Case of Espionage A Hairy Case of Espionage http://www.iht.com/articles/31180.html Reuters Reuters Saturday, September 1, 2001 NEW YORK It started with shampoo snooping and may end up with a corporate shave and haircut. . Two of the fiercest rivals in the consumer-products world have disclosed that they are in settlement talks over one company's use of covert operations to find out the other's hair-care secrets. . The consumer products giant Unilever, maker of such household items as Lipton tea, Dove soap and Skippy peanut butter, confirmed Thursday that it was meeting with Procter Gamble Co., maker of Ivory soap, Tide detergent and Tampax tampons, over P&G's efforts to gain details about its hair-care products, which include Finesse and Thermasilk. . Fortune Magazine, which broke the story, said the company could wind up paying tens of millions of dollars to Unilever or face a long court battle. . "We can confirm that discussions are continuing with Procter Gamble regarding their corporate intelligence operation aimed at Unilever in the United States," said Steve Milton, the U.S. spokesman for Unilever. . P&G in a statement said that it had been working with the British-Dutch giant to resolve an incident through which it had gained access to some information that Unilever does not want it to have. . A source close to the negotiations said the information concerned marketing and brand plans, and that the talks focused on ensuring that Procter Gamble would not use the information. . According to Fortune magazine, P&G hired private operatives to scour Unilever dumpsters and pose as market analysts to glean information that is known in the trade as "competitive intelligence." -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- From: Kevin D. Murray Date: Thu Aug 29, 2002 9:16am Subject: Re: Parametric Cavities Additional insight... http://www.spybusters.com/Great_Seal_Bug.html Kevin D. Murray - CPP, CFE, BCFE Murray Associates Eavesdropping Detection and Counterespionage Consultants to Business & Government http://www.spybusters.com > I came across this and would like comment > > "...devices were called "PARAMETRIC CAVITIES" , physically they were > simply shaped like small cylinders with thin gold diaphrams mounted in > them. The theory of operation was based on metallic substances of a > specific shape having the ability to interact with microwave > frequencies > in such a fashion as to oscillate in sympathy and generate a lower > harmonic radio frequency which could then be received by a nearby > receiver. This theory worked very well for clandestine eavesdropping > equiptment. The device needed no power source, looked completely > innocuous, and could not be detected via traditional means" > 6124 From: Date: Thu Aug 29, 2002 0:04pm Subject: Whoís spying on my Hotmail? Who's spying on my Hotmail?With new spyware, even your private Yahoo, Hotmail e-mails can be seen. By Bob Sullivan MSNBC Aug. 28 ≠ Think using Yahoo or Hotmail e-mail at work protects you from your boss' prying eyes? Think again. New spy software essentially lets employers or parents co-pilot virtually any kind of e-mail account, including private Web-based e-mail accounts like Yahoo and Hotmail. A new version of eBlaster spyware will secretly forward all e-mail coming and going through such Web-based accounts to a spy's e-mail, allowing anyone to "ride-along" even the supposedly private e-mail. SPYWARE FIRM ,SpectorSoft Corporation ,which makes eBlaster, is hardly a stranger to controversy. But the new e-mail monitoring technology, which company president Doug Fowler described as "almost a wiretap," is sure to stir even more. It's common for office workers to keep personal matters out of corporate e-mail; many set up free Web-based e-mail accounts at Hotmail or Yahoo to help separate work and private affairs. But eBlaster 3.0, released Wednesday by SpectorSoft, makes it easy for employers or other interested voyeurs to read all e-mail going in and out of almost any kind of e-mail account. "What our customers have asked for more than anything is the ability to capture e-mails, specifically Web-based e-mails like Hotmail," Fowler said. "We knew that's what our people wanted." Fowler wouldn't describe particulars about how the technology worked, but said essentially that the moment a spy subject sends or receives an e-mail, a copy of the correspondence is forwarded to the spy. As an example, SpectorSoft public relationships representative Kasey Sellati showed MSNBC.com a note that was written by her daughter at home and forwarded to Sellati's work e-mail. "Mrs. LaFrance," Shay Sellati's note to a teacher read. "Hi, this is Shay. I was just wondering if you'll be in your room tomorrow morning. I'm going to come on Thursday, but I just wanted to see if I could get help tomorrow also for the test on Thursday. Thanks!" eBlaster also works on POP3 accounts, used by many Internet Service Providers, AOL e-mail, and Microsoft Exchange e-mail systems. "It works on virtually any kind of email, except for some of the smaller Web-based e-mail services," Fowler said. Fowler said the software would be useful for parents who want to watch their children's e-mail activity in the early afternoon hours, when children are home from school but parents are still at work. Law enforcement agencies are also interested, he said ≠ Web-based e-mail like Hotmail was used extensively by the hijackers who planned the Sept. 11 attacks, sometimes in public libraries. "If our software had been installed in that library it would have recorded that Hotmail," he said. But word of the software's new feature disturbed privacy advocate Richard Smith of ComputerBytesMan.com ≠ and he suggested potential users think twice before installing the software, "This is e-mail wiretapping," Smith said. "I would put up a big warning flag. Anybody who would consider buying this product should check with a lawyer first. There is a high probability it runs afoul of the Electronic Communications Privacy Act. I would not take the company's word that it's legal." Enacted in 1986, the Electronic Communications Privacy Act prohibits interception and disclosure of wire, oral, or electronic communications in most cases. Spyware like that produced by SpectorSoft and competitor WinWhatWhere Corp. has not yet faced a definitive courtroom test. But David Sobel, general counsel of the Electronic Privacy Information Center, equated private Web-based e-mail account with an employee receiving a personal letter through the company mailroom. The contents of such a letter are protected by U.S. mail regulations. "The question is: Is there a reasonable expectation of privacy? I would argue that if a company.com account is provided to me for company business, I can assume it might be subject to monitoring ... but if I take additional step to set up a Hotmail account that I occasionally access from my desktop at work, I think that could be construed as an expression of an expectation of privacy." Nevertheless, the spyware makers generally argue that employers have the right to observe anything that happens on company-owned computers. "There's no question there's a controversial aspect to all this," Fowler said. "My advice to (employees): anything they are doing using company computers they should expect the employer may have a way to find out what's going on there." Fowler said his firm regularly advises customers to inform employees that all their activity is being monitored. But Richard Eaton, president of competitor WinWhatWhere, has regularly accused SpectorSoft of targeting the "suspicious husbands and wives" market ≠ where the software is used secretly to catch a potentially cheating spouse in the act. That kind of surreptitious e-mail monitoring would be more likely to run afoul of wiretap laws. But even in that case, Sobel said, wiretap laws are "very technology specific," and a judge wouldn't be able to rule on the legality of the software without knowing exact particulars about how the technology works. SpectorSoft would only provide a general sketch of its e-mail forwarding technology. So the legal status of eBlaster won't be determined until "someone sues," Sobel said. In the meantime, Eaton argues this is much ado about nothing. For years, he said, products like WinWhatWhere have been able to capture every keystroke a user types at a computer, or take screen shots at regular interval of everything a computer user does. That would include logging Web-based e-mail activity. "Whoop-de-do," Easton said when told about eBlaster's new feature. "They are forwarding (the e-mail) on immediately. Ours shows up in the report you get every day, or every hour, however often you want it." ---------- http://www.msnbc.com/news/800409.asp [Non-text portions of this message have been removed] 6125 From: Date: Thu Aug 29, 2002 8:10am Subject: Re: Who‚Äôs spying on my Hotmail? In a message dated 8/29/02 10:05:33 AM Pacific Daylight Time, patedwards@w... writes: << But the new e-mail monitoring technology, which company president Doug Fowler described as "almost a wiretap," is sure to stir even more. >> Could this be a Frank Jones alias? 6126 From: kondrak Date: Thu Aug 29, 2002 1:22pm Subject: Electronic Data Discovery Primer As if we didn't know this... >http://www.law.com/jsp/article.jsp?id=1029171611801 > >Albert Barsocchini >Law Technology News >08-28-2002 > >Electronic data discovery quickly is becoming mainstream in civil >discovery. Recent surveys confirm that more than 90 percent of all >documents produced since 1999 were created in digital form. You don't >need surveys to prove that point; just walk into any office these days >and the first thing you will see is a computer! > >Surprisingly, many attorneys fail to do any electronic discovery >because of concerns that it is costly, time-consuming and complicated. >The irony: It is usually wildly cheaper to conduct discovery >electronically. > >New computer forensic techniques allow the cost effective and safe >recovery of evidence normally invisible to the user. What used to cost >tens of thousands of dollars can now be done for less than $5,000 >using trained computer forensic examiners. > >There is an incredible amount of electronic evidence that can be >harvested, preserved, documented and authenticated. > >Some firms get it. Aggressive law firms are now seeking >computer-generated evidence, especially in cases related to >defamation, trade secret and intellectual property theft, sexual >harassment in the workplace, fraud, breach of contract, divorce >proceedings and spoliation of evidence. > >Even in small personal injury auto cases, defense attorneys are going >after e-mail and other electronic evidence related to wage and injury >claims. > >GETTING HELP > >Knowing where to get help is an important part of your successful >electronic discovery plan. Because of the growing demand, many legal >vendors are retooling their businesses to include electronic >discovery. There are a variety of services now available including >electronic discovery consultants, computer forensic investigators, and >litigation support services offering electronic document conversion, >scanning, indexing and online repositories. > >Depending upon the size, type of case, and experience of counsel in >electronic discovery, it may be wise to consider retaining an >electronic discovery consultant. He or she can help create an >effective strategy for collecting, analyzing and processing the data. >The scope of the consulting services normally includes assisting the >attorney in preparing discovery requests related to electronic >documents, reviewing and evaluating discovery responses, protecting >clients from overly broad demands, and assisting in the collecting, >analyzing and producing of relevant electronic data. > >Electronic discovery in civil litigation has been hampered in the past >by a lack of streamlined procedures to access computers in the control >of opposing litigants or third parties. Unlike government >investigators, who can seize computers pursuant to warrant without any >advance notice, a civil litigant often gains accesses to opponent's >computer systems only after weeks of protracted objections and >discovery motions. With the help of a good consultant, unnecessary >objections and motions can be avoided. Your best bet: an electronic >discovery consultant who is both a lawyer with litigation experience >and trained in computer forensics. > >WHAT TO DO > >Recent case law has helped define procedures that counsel should >consider when computer evidence may be relevant: > >1. Send a preservation letter. > >2. Appoint a neutral forensic expert. > >3. Prepare an order detailing the inspection protocol. > >4. Hire a forensic expert to acquire and preserve computer data for > examination. > >5. Examine and analyze image data files for evidence. > >6. Document the findings. > >See Playboy Enterprises v. Welles, 60 F.Supp.2d 1050, 1054 (S.D. CA >1999); Simon Property Group v. mySimon, Inc. 2000 WL 963035 (S.D.); >Trigon Insurance Company v. United States, 204 F.R.D. 277 (E.D. Va >2001); and Rowe Entertainment v. The William Morris Agency, 2002 WL >63190 (S.D.N.Y.). > >Proper electronic discovery should always begin with the issuance of a >demand letter requesting the preservation of all relevant computer >evidence. At that point in time, any document retention and >destruction policy in effect should be suspended and the company is on >notice that any destruction of documents from that time on could turn >into a spoliation of evidence case. > >After an electronic discovery plan has been created, interrogatories >and depositions follow to flush out information about what types of >relevant evidence might be found, what form that evidence may take, >information about the computer network configuration, what software is >in use, any document retention policies, data backup and storage >locations, and who has control and the most knowledge about a >particular computer network. From this first discovery fly-over, a >document production request can be carefully crafted. > >FORENSICS > >If the responses indicate that relevant evidence may exist in >electronic form, the next step is to bring in a computer forensic >examiner to perform the evidence harvesting. Computer forensics deals >with the collection, preservation, analysis, and presentation of >computer related evidence. > >Besides recovering documents in specified directories, evidence also >lives in so-called swap files, slack files and in unallocated space >(free space) on your hard drive. Important evidence called "shadow >data" can be also be found living within the imperfections on a hard >drive and by any misalignment in the hard disk head when it writes, >reads and deletes data. > >When looking for computer-related evidence, forensic experts first >create a complete non-invasive sector-by-sector "mirror image" backup >of all data contained on the target computer media in order to recover >all active, deleted and temporary files. This process allows the >examiner to "freeze time" by having a complete snapshot of the subject >drive at the time of acquisition. A so-called "hash file" (digital >fingerprint) is created of the original hard drive and the back copy >in order to prove that it has not been altered during the examination >process. > >After the mirror image is created, the examiner conducts the >examination on the mirror image without ever altering the contents of >the original hard drive. This process is the only practical means of >searching and analyzing computer files without altering date stamps or >other information. Oftentimes, a file date stamp (file creation date, >last modified, or last accessed) is a critical piece of evidence that >may weigh in the balance of a dispute. > >The importance of a proper forensic examination can be illustrated by >a single Word or WordPerfect document. Each document can include >historical information in a variety of places. Information can be >stored as "metadata," in timed backup files and related slack within >it, in a swap file, in temporary files and related slack within it, in >temporary print files and related slack within it, and possibly in OLE >files, too. So depending on how the discovery request is phrased, the >Request for Production of a single specific document can generate up >to 11 separate pieces of evidence with valuable historical information >about it. > >Depending upon the scope of the request and volume of evidence to be >produced, counsel may need to engage a litigation support service to >help in the conversion, scanning, coding and indexing of the >electronic evidence generated. For small cases with limited documents, >all you really need is a good computer forensic examiner. > >Many vendors and individuals offer these computer forensic services. >When engaging a forensic examiner, always scrutinize his or her rÈsumÈ >for the amount of training they have received, on-the-job experience >and how many times they have served as an expert witness in a civil >matter and actually testified in court. > >Normally, a forensic expert will be retained by both parties and >experienced ones often act as a discovery referee or a special master, >too. The requesting party normally pays the cost of the forensic >examination; however, many courts will shift the cost of the forensic >investigation when the producing party is shown to have deleted files >in bad faith. > >FRAGILE > >The bottom line: Electronic discovery must be both taken seriously and >done properly because the evidence is fragile, easily erased and can >be compromised by untrained parties. Litigators practicing in today's >digital environment must understand the various ways information can >be stored and retrieved not only to ensure compliance with discovery >rules, but to build the best possible case for their client. Failing >to do so may not only prejudice the case, but may be malpractice. > >California attorney Albert Barsocchini, a member of the Law Technology >News Editorial Advisory Board, is a senior law technologist and >electronic discovery consultant at San Rafael, Calif.'s The LawTek >Group. E-mail: lawtech@w... 6127 From: Date: Thu Aug 29, 2002 4:46pm Subject: Please Help If You Can... I'm only sending this to my friends who can afford this most worthy of causes........ Since September 11, 2001, Americans have come together as never before in our generation. We have banded together to overcome tremendous adversity. We have weathered direct attacks on our own soil, wars overseas, corporate scandal, layoffs, unemployment, stock price plunges, droughts, fires, and a myriad of economic and physical disasters both great and small. But now, we must come together once again to overcome our greatest challenge yet. Hundreds of Major League Baseball players in our very own nation are living at, just below, or in most cases far above the seven-figure salary level. And as if that weren't bad enough they could be deprived of their life giving pay for several months, possibly longer, as a result of the upcoming strike situation. But you can help! For only $20,835 a month, about $694.50 a day (that's less than the cost of a large screen projection TV) you can help a MLB player remain economically viable during his time of need. This contribution by no means solves the problem as it barely covers the annual minimum salary, but it's a start, and every little bit will help! Although $700 may not seem like a lot of money to you, to a baseball player it could mean the difference between spending the strike golfing in Florida or on a Mediterranean cruise. For you, seven hundred dollars is nothing more than a month's rent, half a mortgage payment, or a month of medical insurance, but to a baseball player, $700 will partially replace his daily salary. Your commitment of less than $700 a day will enable a player to buy that home entertainment center, trade in the year-old Lexus for a new Ferrari, or enjoy a weekend in Rio. HOW WILL I KNOW I'M HELPING? Each month, you will receive a complete financial report on the player you sponsor. Detailed information about his stocks, bonds, 401(k), real estate, and other investment holdings will be mailed to your home. Plus, upon signing up for this program, you will receive an unsigned photo of the player lounging during the strike on a beach somewhere in the Caribbean (for a signed photo, please include an additional $150). Put the photo on your refrigerator to remind you of other peoples' suffering. HOW WILL HE KNOW I'M HELPING? Your MLB player will be told that he has a SPECIAL FRIEND who just wants to help in a time of need. Although the player won't know your name, he will be able to make collect calls to your home via a special operator in case additional funds are needed for unforeseen expenses. YES, I WANT TO HELP! I would like to sponsor a striking MLB player. My preference is checked below: [ ] Infielder [ ] Outfielder [ ] Starting Pitcher [ ] Ace Pitcher [ ] Entire team (Please call our 900 number to ask for the cost of a specific team - $10 per minute) [ ] Alex Rodriguez (Higher cost: $60,000 per day) Please charge the account listed below $694.50 per day for the player for the duration of the strike. Please send me a picture of the player I have sponsored, along with an Alex Rodriguez 2001 Income Statement and my very own Donald Fehr MLB Players Union pin to wear proudly on my hat (include $80 for hat). Your Name: _______________________ Telephone Number: _______________________ Account Number: _______________________ Exp.Date:_______ [ ] MasterCard [ ] Visa [ ] American Express [ ] Discover Signature: _______________________ Alternate card (when the primary card exceeds its credit limit): Account Number: _______________________ Exp.Date:_______ [ ] MasterCard [ ] Visa [ ] American Express [ ] Discover Signature: _______________________ Mail completed form to MLB Players Union or to enroll by phone simply call 1-900-SCREW-THE-FANS now! ($10 per minute). Disclaimer: Sponsors are not permitted to contact the player they have sponsored, either in person or by other means including, but not limited to, telephone calls, letters, e-mail, or third parties. Contributions are not tax-deductible. 6128 From: iDEN-i100 Date: Fri Aug 30, 2002 4:48pm Subject: New Public Saftey Band Proposed By-Telesaurus Holdings Here is the proposal from Warren Havens and Telesaurus Holdings GB LLC, DBA LMS Wireless, they propose to dedicate some 902-928 MHz, 217-225 MHz and 4.9 GHz spectrum for public safety, critical infrastructure and private enterprise use. Under the plan, portions of each band would be available to specific user groups, while priority access on the private enterprise spectrum would provide additional capacity to emergency responders when needed. Equipment would be multi-band. The proposal is called an Advanced Technology Land Infrastructure and Safety Service (ATLIS) http://gullfoss2.fcc.gov/prod/ecfs/retrieve.cgi?native_or_pdf=pdf&id_document=6513289306 [Non-text portions of this message have been removed] 6129 From: iDEN-i100 Date: Fri Aug 30, 2002 6:02pm Subject: Re: [Wireless Forum Homeland Security Group] New Public Saftey Band Proposed By-Telesaurus Holdings Howard just advised me that the link is NG Try this one..... http://gullfoss2.fcc.gov/prod/ecfs/retrieve.cgi?native_or_pdf=pdf&id_document=6513289305 iDEN-i100 wrote: > Here is the proposal from Warren Havens and Telesaurus Holdings GB LLC, DBA LMS > Wireless, they propose to dedicate some 902-928 MHz, 217-225 MHz and 4.9 GHz spectrum > for public safety, critical infrastructure and private enterprise use. Under the plan, > portions of each band would be available to specific user groups, while priority access > on the private enterprise spectrum would provide additional capacity to emergency > responders when needed. Equipment would be multi-band. The proposal is called an > Advanced Technology Land Infrastructure and Safety Service (ATLIS) > [Non-text portions of this message have been removed] 6130 From: James M. Atkinson Date: Fri Aug 30, 2002 9:16pm Subject: Psst, kids: Spying is alive and well http://seattletimes.nwsource.com/html/artsentertainment/134507998_wspy07.htm l Wednesday, August 07, 2002 - 10:58 a.m. Pacific Psst, kids: Spying is alive and well By Dana Priest The Washington Post WASHINGTON ≠ Spying is as old as human civilization. Spies helped win the American Revolution, and they're working today to learn the latest al-Qaida secrets. But the golden age of espionage was during the Cold War, when the United States and the Soviet Union wrestled for power. Things never heated up so much that the two superpowers fought each other directly on the battlefield (that's why the period is known as the Cold War). Instead, they spied on each other constantly. Each country stole secrets that would give them clues to what the enemy was up to. These secrets, called "intelligence" in the spy world, included information about each others' nuclear weapons, military plans and spies. The Soviet Union broke up in 1989, and today the United States is friendly with the countries that were once part of it, including Russia, the largest. But spying still goes on. The Central Intelligence Agency uses American spies ≠ called "operatives" and "case officers" ≠ to snatch secrets and gather intelligence about foreign governments and overseas crime organizations, such as drug cartels and terrorist groups. The CIA does this in several ways. It eavesdrops on people using sophisticated electronic equipment, some of it high in the sky, on airplanes or satellites. U.S. spies also conduct espionage themselves. They have high-tech equipment that allows them to secretly tape-record discussions, photograph military facilities and listen in on telephone conversations. And the CIA recruits and hires foreign spies, called "agents" or "assets," to steal secrets for the United States. These people typically work inside a foreign government and agree to cheat on their own country. Many do it for money. The CIA pays its agents and assets. Some do it because they disagree with their government. Others do it because they want to immigrate to the United States or get their children into U.S. colleges. The CIA often makes these kinds of deals. After it's gathered, intelligence from lots of different sources goes back to CIA headquarters in suburban Langley, Va. There, analysts put the pieces of information together, like a puzzle, and figure out what it all means. Some of the questions they are trying to answer: ï Is Osama bin Laden dead or alive? If alive, where is he? ï Where are the rest of the al-Qaida terrorists? ï Are some people planning another attack on the United States? If so, who are they and what are their plans? A good place to learn all about spying is at the International Spy Museum, which opened recently in downtown Washington, D.C. One note: The museum is bugged. No kidding. Microphones have been planted at various locations in the walls. The conversations are piped into other parts of the museum, for visitors-turned-eavesdroppers to listen in on. The International Spy Museum is at 800 F St. NW, Washington. Hours are 10 a.m. to 8 p.m. daily; 10 a.m. to 6 p.m. November to March. Admission is $11 for adults, $9 for senior citizens and $8 for children ages 5 to 18. For information, www.spymuseum.org call 1-866-SPY-MUSEUM or, in Washington, 202-EYE-SPY-U. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6131 From: James M. Atkinson Date: Fri Aug 30, 2002 9:18pm Subject: FBI rebuked over 'illegal' spying [again, and again, and again...] http://www.guardian.co.uk/usa/story/0,12271,779746,00.html 2.45pm update FBI rebuked over 'illegal' spying Staff and agencies Friday August 23, 2002 A secret US court has accused the Bush administration of illegally expanding FBI powers to spy on suspects. According to documents released by Congress today, the foreign intelligence surveillance (FISA) court ruled in May that the government had increased the FBI's powers to place suspects under electronic surveillance and share information with criminal investigators. The court also voiced its concern that the FBI had provided false information in 75 requests for surveillance warrants against suspected terrorists or foreign spies. The cases involved stretched back several years, but the court became increasingly concerned after September 11, when the attorney general, John Ashcroft, attempted to give the FBI greater spying powers to combat terrorism. The FISA court, which rules on cases related to international terrorism and espionage, has not publicly disclosed any of its rulings in nearly two decades. In May the court rejected some of Mr Ashcroft's amended search and wiretap guidelines on the grounds that they were "not reasonably designed" to safeguard the privacy of Americans. Mr Ashcroft had issued a memorandum to FBI director Robert Mueller and senior justice officials in March which made it easier for investigators in espionage and terrorism cases to share information from searches or wiretaps with FBI criminal investigators. But the FISA court found that Mr Ashcroft's rules could allow misuse of information in criminal cases, where prosecutors must meet higher legal standards to win approval for searches or wiretaps. "These procedures cannot be used by the government to amend the [surveillance] act in ways Congress has not," the court wrote in a rare public rebuke. Mr Ashcroft had argued that, under changes authorised by the US Patriot Act, the FBI could use the surveillance law to perform searches and wiretaps "primarily for a law enforcement purpose, so long as a significant foreign intelligence purpose remains". The Patriot Act, passed late in 2001, changed the surveillance law to permit its use when collecting information about foreign spies or terrorists is "a significant purpose," rather than "the purpose", of such an investigation. Critics at the time said they feared the government might use the change as a loophole to employ espionage wire taps in common criminal investigations. "The attorney general seized authority that has not been granted to him by the constitution or the Congress," said Marc Rotenberg, head of the Washington-based Electronic Privacy Information Centre. The justice department quickly amended its guidelines and won the court's approval. Nevertheless, officials in Mr Bush's administration said today they have appealed against the restrictions, arguing that the new limits inhibit the sharing of information between terrorism investigators and criminal detectives. A spokeswoman for the justice department, Barbara Comstock, said: "They have in our view incorrectly interpreted the Patriot Act, and the effect of that incorrect interpretation is to limit the kind of coordination that we think is very important." The justice department declined to release a copy of the appeal to reporters last night. Officials said it was a coincidence that the appeal was filed on the same day that the court made its ruling public. The court also disclosed that the FBI acknowledged making more than 75 mistakes in applications for espionage and terrorism warrants under the surveillance law, including one instance in which former director Louis Freeh gave inaccurate information to judges. "How these misrepresentations occurred remains unexplained to the court," the FISA court said. The court's May 17 orders, signed by US district judge Royce Lamberth, were disclosed yesterday to the Senate judiciary committee, which has raised questions about the justice department's use of wiretap laws in espionage and terrorism cases. The court, now headed by US district judge Colleen Kollar-Kotelly, said it intended to publish the rulings separately and promised to disclose any future unclassified orders. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6132 From: Matt Paulsen Date: Sat Aug 31, 2002 4:43am Subject: RE: Psst, kids: Spying is alive and well Speaking of terrorist spying... http://www.cnn.com/2002/US/08/30/terror.hunt/index.html -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Friday, August 30, 2002 7:17 PM To: TSCM-L Mailing List Subject: [TSCM-L] Psst, kids: Spying is alive and well http://seattletimes.nwsource.com/html/artsentertainment/134507998_wspy07.htm l Wednesday, August 07, 2002 - 10:58 a.m. Pacific Psst, kids: Spying is alive and well By Dana Priest The Washington Post WASHINGTON ≠ Spying is as old as human civilization. Spies helped win the American Revolution, and they're working today to learn the latest al-Qaida secrets. But the golden age of espionage was during the Cold War, when the United States and the Soviet Union wrestled for power. Things never heated up so much that the two superpowers fought each other directly on the battlefield (that's why the period is known as the Cold War). Instead, they spied on each other constantly. Each country stole secrets that would give them clues to what the enemy was up to. These secrets, called "intelligence" in the spy world, included information about each others' nuclear weapons, military plans and spies. The Soviet Union broke up in 1989, and today the United States is friendly with the countries that were once part of it, including Russia, the largest. But spying still goes on. The Central Intelligence Agency uses American spies ≠ called "operatives" and "case officers" ≠ to snatch secrets and gather intelligence about foreign governments and overseas crime organizations, such as drug cartels and terrorist groups. The CIA does this in several ways. It eavesdrops on people using sophisticated electronic equipment, some of it high in the sky, on airplanes or satellites. U.S. spies also conduct espionage themselves. They have high-tech equipment that allows them to secretly tape-record discussions, photograph military facilities and listen in on telephone conversations. And the CIA recruits and hires foreign spies, called "agents" or "assets," to steal secrets for the United States. These people typically work inside a foreign government and agree to cheat on their own country. Many do it for money. The CIA pays its agents and assets. Some do it because they disagree with their government. Others do it because they want to immigrate to the United States or get their children into U.S. colleges. The CIA often makes these kinds of deals. After it's gathered, intelligence from lots of different sources goes back to CIA headquarters in suburban Langley, Va. There, analysts put the pieces of information together, like a puzzle, and figure out what it all means. Some of the questions they are trying to answer: ï Is Osama bin Laden dead or alive? If alive, where is he? ï Where are the rest of the al-Qaida terrorists? ï Are some people planning another attack on the United States? If so, who are they and what are their plans? A good place to learn all about spying is at the International Spy Museum, which opened recently in downtown Washington, D.C. One note: The museum is bugged. No kidding. Microphones have been planted at various locations in the walls. The conversations are piped into other parts of the museum, for visitors-turned-eavesdroppers to listen in on. The International Spy Museum is at 800 F St. NW, Washington. Hours are 10 a.m. to 8 p.m. daily; 10 a.m. to 6 p.m. November to March. Admission is $11 for adults, $9 for senior citizens and $8 for children ages 5 to 18. For information, www.spymuseum.org call 1-866-SPY-MUSEUM or, in Washington, 202-EYE-SPY-U. -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu ---------------------------------------------------------------------------- ---------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6133 From: Matt Paulsen Date: Sun Sep 1, 2002 2:22pm Subject: DSS is hiring - FOREIGN SERVICE SECURITY ENGINEERING OFFICER For those that don't know what DSS does/is read here. http://ds.state.gov/about/ http://www.foreignservicecareers.gov/ The job: http://ds.state.gov/career/seo_vacancy.html VACANCY ANNOUNCEMENT United States Department of State An Equal Opportunity Employer Announcement No: SEO 01-01 Opening Date: January 22, 2001 Closing Date: December 31, 2002 Position Title: FOREIGN SERVICE SECURITY ENGINEERING OFFICER Grade and Starting Salary Range: FP-04 $52,459 - $64,519 per annum FP-05 $47,842 - $49,277 FP-06 $46,736 (Step 14 only) Amendment to the Announcement Additional Benefits: Tax-Free Housing overseas; Tax-Free Education Allowance for eligible dependents, etc. (See "Benefits Package" brochure for more information.) Number of Vacancies: The Department of State is developing a rank-order List of Eligible Hires to fill a limited number of Foreign Service Security Engineering Officer (SEO) vacancies. The specific number to be hired will depend on the needs of the Foreign Service. Area of Consideration: All Sources Location: Selected candidates will report to Washington, DC, for approximately seven months of specialized training and orientation. Initial assignments will be made to domestic locations in the Washington, DC area or Ft. Lauderdale, FL, or to any of the Engineering Services Centers or Engineering Services Offices located overseas. All initial assignments will be made in accordance with the needs of the Foreign Service. DESCRIPTION OF DUTIES Foreign Service Security Engineering Officers of the Bureau of Diplomatic Security are responsible throughout the world for the protection of Department of State personnel, facilities, and sensitive information from acts of crime, terrorism, and technical espionage. As professional-level engineers, their mission is accomplished through the performance of some or all of the following functions: Manage technical and information security programs, projects, and resources worldwide. Conduct technical security assessments and recommend security upgrades to deter terrorism and technical espionage. Plan and conduct technical surveillance countermeasures (TSCM) surveys to detect and nullify technical penetrations of Department of State facilities at 260 locations around the world. Identify security risks, analyze those risks, and specify system requirements and procedural measures to ensure the integrity of stand-alone computers and network information systems. Plan, conduct certification tests, and maintain the security needs for information processing and secure conferencing facilities. Produce a variety of written documents, including memoranda; trip reports; telegraphic communications with posts; and engineering surveys or services reports detailing specific engineering services planned or performed. Extensive travel throughout the world to service overseas embassies and consulates, often in remote locations, including the transport of technical supplies and materials (and on occasion, diplomatic pouches) by airplane, train, and motor vehicle. Specify, design, procure, install, and certify equipment or products for technical security and information technology systems, such as: Technical systems - closed-circuit television (CCTV), intrusion detection systems (IDS) and alarms, explosive detection systems, metal detectors, locking devices, access control and denial systems, countermeasures equipment, and acoustic/RF attenuation technologies. Computer systems - encryption, firewalls, forensics, network intrusion monitoring, and system security audit products. Many of the functions performed by a Security Engineering Officer in the field are physically demanding. I. A CAREER IN THE FOREIGN SERVICE The Department of State is seeking Foreign Service Security Engineering Officers to serve at U.S. embassies and consulates worldwide. Candidates must agree not only to serve at any US diplomatic or consular post abroad, but also at domestic locations such as the Department of State in Washington, DC, and the Florida Regional Center in Ft. Lauderdale, FL. Security Engineering Officers also provide support to the US Mission to the United Nations in New York City, and various regional field offices located throughout the United States. The Foreign Service is more than a job - it's a career. As a member of a diplomatic team, you will not only help to accomplish the mission of the Department of State, but you will also be a representative of your country to the people of other nations. A career in the Foreign Service involves uncommon commitments and occasional hardships, as well as unique rewards and opportunities. A decision to enter this career involves unusual motivation, a firm dedication to public service, and a clear understanding of the high level of travel required. Many overseas posts are in small or remote countries where harsh climates, health hazards, and other discomforts exist, and where American-style amenities frequently are unavailable. Travel to and from some locations may involve hardships and oftentimes personal inconvenience. However, careers in the Foreign Service offer special rewards, including the pride and satisfaction of representing the United States and protecting US interests abroad. The Foreign Service strives to maintain diversity in the representation of gender, geographic regions, race, and ethnicity. II. FOREIGN SERVICE SELECTION PROCESS The Foreign Service selection process is lengthy, multi-staged, and due to the limited number of appointments available, highly competitive. It commences upon receipt of the candidate's application materials and will continue until the candidate is placed on a list of eligible candidates (a process which can take as long as a year) or is determined to be less competitive than other applicants, in which case the candidacy is terminated. INITIAL REVIEW A completed application package contains the materials listed in Section V of this Vacancy Announcement. Materials submitted become the property of the Department of State and will not be returned. An application may be terminated whenever any materials do not meet the eligibility requirements for employment in the Foreign Service. III. THE SECURITY ENGINEERING OFFICER CAREER INITIAL ASSIGNMENTS All Security Engineering Officers must complete approximately seven months of specialized training in the Washington, DC area upon their entry on duty with the Department of State. Failure to successfully complete all aspects of this training could result in separation. New Security Engineering Officers may be initially assigned to either a domestic or overseas position. Those assigned domestically will serve at one of the Department of State facilities in Washington, DC, or at the Florida Regional Center in Ft. Lauderdale, FL. On occasion, a new officer will be assigned to an overseas position at one of approximately 45 Engineering Services Centers or Engineering Services Offices that are located around the world. All initial assignments will be made in accordance with the needs of the Foreign Service. Domestic Assignments - A Security Engineering Officer appointed to a domestic position will be assigned to one of the functional areas within the Bureau of Diplomatic Security. Functional areas include: programs, systems, operations, maintenance, logistics, and engineering. Operational assignments may include countermeasures inspections (both domestically and at overseas posts), participation in worldwide maintenance programs, computer security assessments and planning, security engineering support for the Secretary of State, administrative support to overseas Engineering Services Offices, and a variety of engineering support functions and surveys. A domestic position may also involve overseas travel. Overseas - A Security Engineering Officer appointed to an overseas position will serve as a security engineer at any of the Engineering Services Centers or Engineering Services Offices located at US diplomatic or consular posts around the world. While working at Foreign Service posts, Security Engineering Officers are responsible for a broad range of technical security services to protect Foreign Service personnel, facilities, operations, and information against hostile intelligence, criminal, and terrorist activities. Security Engineering Officers serving at Engineering Services Centers are assigned responsibilities on a regional basis and support several countries. These assignments require frequent travel and some long duration temporary duty. INITIAL SALARY AND SALARY INCREASES GRADE SALARY RANGE SPECIALIZED EDUCATION LEVEL EXPERIENCE (YEARS) FP-04 $52,459 - $64,519 Bachelor of Science Degree 3 or more FP-05 $47,842 - $49,277 Bachelor of Science Degree 1 to 3 FP-06 $46,736 Bachelor of Science Degree 0 The beginning salary within the FP-04, FP-05, or FP-06 pay grades is dependent upon experience and education of the candidate, and will be determined at the time of a conditional offer of employment. The entry-level salary for Federal Civil Service employees appointed to the Foreign Service without a break in service will be set at the rate, within the Foreign Service grade to which they are appointed, that is nearest to the salary rate of their previous GS salary, provided the work performed in the previous position is relevant to Diplomatic Security Engineering activities. Salaries at the time of appointment may also be adjusted to include domestic locality pay. Overseas salaries may be adjusted to include cost-of-living allowances, post differentials, danger pay, and/or other allowances specific to the post of assignment. The actual differences in pay will be determined by the location of assignments. Performance is evaluated in writing annually by a supervisor. Security Engineering Officers are administratively promoted from FP-06 to FP-05 level after 12 months of satisfactory performance, and to the FP-04 level after an additional 18 months of satisfactory performance. At the FP-04 level and beyond, positions of increasingly higher responsibility are achieved as a result of competing for promotions which are earned through quality performance. Security Engineering Officers at the FP-04 level and above are considered for promotion annually in competition with others in their specialty. IV. QUALIFICATIONS AND REQUIREMENTS A qualifications evaluation panel will review all applicant files and recommend only the most competitive applicants take a proctored examination that assesses the applicant's writing skills. The ability to draft an essay demonstrating a strong command of English grammar, spelling and punctuation is essential. A passing grade on the written essay allows the applicant to proceed to the personal interview and oral assessment portion of the candidate selection process. Prior to appointment, Security Engineering Officer candidates must undergo a thorough background investigation to determine eligibility for a security clearance, undergo an extensive medical examination to obtain a medical clearance for worldwide service, and be determined suitable for appointment to the Foreign Service. EDUCATIONAL REQUIREMENT: Subject to the experience exception described later in this announcement, applicants must hold at the time of appointment at least a Bachelor of Science degree from an accredited US college or university in one of the following fields: Electrical Engineering, Electronics Engineering, Computer Engineering, Mechanical Engineering, Electrical Engineering Technology, Electronics Engineering Technology, Security Engineering Technology, Engineering Physics, or Physics. Students at least 20 years of age and currently pursuing a Bachelor of Science degree in one of the majors listed above may apply up to a year preceding their graduation knowing final acceptance will be predicated on receipt of the degree by the time of appointment. SPECIALIZED EXPERIENCE REQUIREMENTS: Applicants for this position should have academic achievements and/or job-related experience that reflect progressively increasing levels of performance and responsibility. They must be able to demonstrate experience and abilities in some or all of the following areas: Ability to logically and objectively analyze problems, apply sound judgment in assessing possible solutions, adjust to changing priorities, and meet tight deadlines; Effective written and oral communication skills, and ability to present technical findings in a clear and concise manner to non-technical personnel; Capacity to gain the cooperation and confidence of co-workers, supervisors (professors, teachers, etc.), and subordinates as well as non-technical individuals; Understanding of the electromagnetic spectrum, and RF interrelationships and characteristics as they relate to the design and operation of electronic and electromechanical systems; Hands-on experience in the operation and use of electronic instrumentation such as multimeters, oscilloscopes, spectrum analyzers, sound pressure level meters, time-delay reflectometers, network analyzers, and similar equipment that may be applied to test, certify, and troubleshoot electrical, electronic, mechanical, electromechanical, and computer systems; Knowledge and hands-on familiarity of computer systems, computer security, and familiarity with operating systems, hardware platforms, and networks; and Ability to read, interpret, and create electrical and electromechanical schematics and architectural drawings, including electrical and mechanical building systems drawings. PHYSICAL DEMANDS: Some of the essential functions of the job have a physically demanding component. For instance, in conducting technical surveillance countermeasures surveys, a Security Engineering Officer is periodically required to perform work that requires regular and recurring periods of prolonged standing, bending, and stretching. A Security Engineer is required periodically to climb ladders and work from heights in performing the essential duties. Other essential duties of the job may involve recurring lifting of moderately heavy equipment and tools. Related activities include crawling, maneuvering, and working in cramped spaces and the occasional moving and transporting of diplomatic pouches. The Office of Medical Services will conduct or arrange for a physical examination of each applicant offered a position to ensure that the candidate meets the physical and medical requirements necessary to perform the essential functions of the job. SUBSTITUTION OF EDUCATION FOR EXPERIENCE: Applicants may substitute educational achievements for specialized experience according to the following formula. Each full year (generally 18 semester credit hours) of graduate study may be substituted for one year of specialized experience provided the major is in a technical discipline relevant to Diplomatic Security engineering activities. SUBSTITUTION OF EXPERIENCE FOR SPECIFIC EDUCATIONAL REQUIREMENT: A candidate without a Bachelor of Science degree in one of the technical disciplines listed under the section "Educational Requirement" may nevertheless qualify for this position provided all of the following conditions are met: The applicant holds a four-year baccalaureate degree (Bachelor of Science or Bachelor of Arts) in any field from an accredited US college or university, and The applicant has attended the Interagency Training Center (ITC) and successfully completed all of the requirements of the ITC Fundamentals Course, and The applicant, since graduating from ITC, has worked for an agency of the US Federal Government as a technical surveillance countermeasures (TSCM) investigator for a minimum period of five (5) years. SUPPLEMENTARY QUESTIONNAIRE Purpose: The purpose of the Supplementary Questionnaire is to allow an opportunity to describe educational and job-related accomplishments and experiences reflecting the skills and abilities to accomplish the work of the Foreign Service Security Engineering Officer. Instructions: Using plain white paper and either a typewriter or a word processor, individually address each of the numbered items listed below limiting responses to 200 words or less for each item. Your response should be double-spaced. Examples can be drawn from any part of your experience, but must reflect personal accomplishments. You should compose your replies carefully as one of the skills required of a Security Engineering Officer is the ability to write clearly and concisely. Organizing Your Own Work: A specific achievement which demonstrates your organizational and planning skills in accomplishing complex tasks under pressure and against tight deadlines. Computer Knowledge and Skills: A specific achievement which reflects the level of your knowledge of computer systems, computer network operability (LAN and/or WAN), or computer security. Problem Solving and Troubleshooting: Using specific examples, describe your troubleshooting skills involving any of the following: electronic, electrical, electro-mechanical, mechanical, or computer systems. Leadership and Teamwork Abilities: Discuss your abilities to work as a team member toward a common goal, as well as examples of where you have lead such a team in the accomplishment of the goal. V. PROCEDURES FOR APPLYING The following numbered materials are required for a complete application package. They become the property of the Department of State and will not be returned: A completed Application for Federal Employment, DS-1950. A completed, signed, and dated Minimum Qualifications Check Sheet. A two page typed (double-spaced) narrative autobiography that discusses: Background, including personal interests and hobbies General comments on work and academic experiences Motivation for becoming a Foreign Service Security Engineering Officer A completed Supplementary Questionnaire. A college/university transcript, bearing an original, official seal, is required for eligibility standing. A copy may be submitted pending issuance of the official documentation. A completed Employment Data Form. (Page 6 of DS-1950) (This is an optional form that requests information to be used for statistical purposes only.) These documents must be submitted together, and addressed to: US Mail, Overnight or Federal Express deliveries: US Department of State Application Evaluation Branch Attn. Security Engineering Officer 2401 E Street, NW., Room H-518 Washington, DC 20522 Please Note: Applications can be faxed to 202-261-8939, but original applications must be received prior to final processing. Applications received through the Department of State's inter-office mail system or mailed in Government-franked envelopes will not be accepted. Executive Branch agencies are barred by 5 US Code 3303 as amended from accepting or considering prohibited political recommendations and are required to return any prohibited political recommendations to sender. In addition, as mandated by 5 US Code 310, sons and daughters of federal employees cannot be granted preference in competing for these employment opportunities. The Department of State is committed to equal opportunity and fair and equitable treatment for all without regard to race, color, national origin, sex, religion, age, sexual orientation, disabling condition, political affiliation, marital status, or prior statutory, constitutionally protected activity. The Department provides reasonable accommodation to applicants with disabilities. Applicants requiring reasonable accommodations for any part of the application or hiring process should so advise the Department. All decisions for granting reasonable accommodations are made on a case-by-case basis. ALL POTENTIAL APPLICANTS ARE STRONGLY URGED TO READ THIS ENTIRE VACANCY ANNOUNCEMENT TO ENSURE THAT THEY MEET ALL OF THE REQUIREMENTS FOR THIS POSITION AND THAT THEY FULLY UNDERSTAND THE SPECIAL CIRCUMSTANCES INVOLVING A CAREER IN THE FOREIGN SERVICE BEFORE APPLYING. Amendment to the Announcement Minimum Qualifications Checklist 6134 From: James M. Atkinson Date: Sun Sep 1, 2002 9:58pm Subject: TSCM Marketing 101 "THE DIFFERENCE BETWEEN ADVERTISING AND MARKETING!!!" This Guide outlines all the basic techniques you'll ever need to know about advertising vs. marketing. Now pay attention at the back of the class, kill the lights, let the slideshow begin... Slide #1: You see a gorgeous lass at a party. You go up to her and say: "I'm a fantastic shag." That's called DIRECT MARKETING. Slide #2: You're at a party with a bunch of mates and see a gorgeous lass. One of your friends goes up to her and, pointing at you, says: "See yer man there? He's a fantastic shag." Now that's called ADVERTISING. Slide #3: You see a gorgeous lass at a party. You go up to her and get her telephone number. The next day you call and say: "Hi, I'm a fantastic shag." That's called TELEMARKETING. Slide #4: You're at a party and see a gorgeous lass. You get up and straighten your tie. You walk up to her and pour her a drink. You open the door for her, pick up her bag after she drops it, offer her a lift, and then say: "Oh, by the way, I'm a fantastic shag." That's called PUBLIC RELATIONS, or PR. Slide #5: Finally, you're at a party and see a gorgeous lass. She walks up to you and says, "I hear you're a really fantastic shag." That's something called BRAND RECOGNITION. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6135 From: James M. Atkinson Date: Sun Sep 1, 2002 11:04pm Subject: A Dictionary of New Words and Expressions A Dictionary of New Words and Expressions ABENDHacker term for software crash. It stands for "ABnormal END" and comes from an error message on the old IBM 360, and also happens to be German for "evening", when these things are more likely to occur of course, just as you're about to don your coat. Alternative meanings include "Absent By Enforced Net Deprivation" - you've lost you Internet privileges, or you've no Net access due to computer downtime, or you're on holidays and offline, or your ISP has just gone belly-up... ACCORDIONATED (ah kor' de on ay tid) adj.Being able to drive and fold a road map at the same time. ADMINISPHEREThe rarefied organizational layers beginning just above the rank and file. Decisions that fall from the adminisphere are often profoundly inappropriate or irrelevant to the problems they were designed to solve. AJOPALISE, toTo apologise jokingly. ALT-TAB, toThe frequent workplace practice of hitting "alt+tab" on your keyboard to hide your current window (e.g. which shows you've been dossing on the Web again) and bring up a more official-looking one from behind. Example: "I couldn't post that joke to the boards because the boss sneaked up so I had to alt-tab." ALTABATIONThe frantic alt-tabbing between screens when boss enters the office. ANTICIPOINTMENTThat feeling you get when a product/event fails to live up to its own hype. Example #1: "That Windows XP was a huge anticipointment." Example #2: "Yeah, that Windows Millennium Edition anticipointment." AMBIDIGIDEXTERIOUSThe ability to easily manipulate your right mouse button easily. AMSOMNIAWhen you're dead tired at work and can't doze off but don't know it, or when you couldn't sleep but don't remember it. APLASTICATETo smash or squish with something plastic, as in "Aagh!! There's a wasp in the canteen! Let's APLASTICATE it!" ASSMOSISThe process by which some people seem to achieve success and advancement by kissing up to the boss. AQUADEXTROUSHaving the ability to turn bath taps on and off with your toes AQUALIBRIUM (ak wa lib' re um) n.The point at which the stream of drinking water is at its perfect height, thus relieving the drinker from (a) having to suck the nozzle, or (b) squirting himself in the eye. AQUADEXTROUS (ak wa deks' trus) adj.Possessing the ability to turn the bathtub faucet on and off with your toes. BALKAN CEASEFIREUnit of time, roughly equal to the time it takes to reload a gun. BEER COMPASSThe invisible device that ensures your safe arrival home after a booze cruise, even though you're too pissed to remember where you live, how you get there, and where you've come from. BEERIODWeekly malady suffered by men after a night on the tiles. Symptoms include headache, moodiness, bloated stomach. "Leave me alone lass, my beeriod started this morning." BEER COATThe invisible but warm coat worn when walking home after a booze cruise at 3 in the morning. BEER SCOOTERThe ability to get home after a night out on the pints but not remember it. e.g. "I don't even remember getting home last night, I must have caught a beer scooter". BELOW ZERO (BZ)Marketroid jargon for a customer who costs more to serve than they return in value. Example: A typical average BZ can tie up a sales assistant for half an hour while trying on a dozen pairs of top-of-the-range Gucci shoes, then he/she buys a pair of socks, complains about the price and fecks off without actually buying anything. Becoming a BZ is also an interesting tactic for delaying those canvassing TDs or strange religious sects on your doorstep. BERTIBOWL, theA proposed new national sports stadium in Ireland, championed by Ireland's Taoiseach (e.g. prime minister) Bertie Ahern. BETAMAXEDA technology that has been overtaken by an inferior technology with more marketing clout. Example: "The Apple Mac was betamaxed out of the market by the IBM PC." BIO-TUNINGBeing tuned into one radio station, but the signal drifts to another, then when you move around the room you find your own body alters which station you hear. BIT FLIPA 180-degree personality change. "Padraig did a major bit flip and became a Born Again Christian." BLAMESTORMINGSitting around in a group discussing why a deadline was missed or a project failed and who is responsible. BLINKENSPEILThe continous blinking of a digital readout on e.g. a clock radio or VCR. BLOWING YOUR BUFFERLosing one's train of thought. Occurs when the person you are speaking with won't let you get a word in edgewise or has just said something so astonishing that your train gets derailed. "Feck, I just blew me buffer!" BODY NAZIYou know the type - that hardcore gym fanatic who looks down on anyone who doesn't work out obsessively. BOOKMARK, toTo take note of a person for future reference. Example: "I bookmarked him after seeing his cool demo at the Internet World Show." BORINGNESSBeing bored and annoyed at the same time, such as finding nothing on Cable TV even though you've paid for 141 channels. BOTTOM-LININGPicking on affluent communities to "trial" (it's a verb) and "pilot" (another verb) your new interactive services. BRAINBAGA laptop carry-all, originally airline slang for a pilot's briefcase containing flight papers, passport and other personal effects. BRANDALISMDefacing public spaces such as footie stadiums, major thoroughfares and even our schools with logos, ads and corporate slogans. BRIDEZILLASThe new wave of fussy, over-perfectionist, style-fixated brides who ban guests from receptions for being too fat or frumpy, and dump registrars because they are "too ugly" for the official photos. BUNNY BOILERAn unhinged and overly possessive woman. From the rabbit boiling scene in "Fatal Attraction". e.g. "I don't like the look of yer wan - could be a bunny boiler". BURGACIDE (burg' uh side) n.When a hamburger can't take it anymore, and hurls itself through the grill into the coals. BUZZACKS (buz' aks)n. People in phone shops who walk around picking up display phones and listening for dial tones even when they know the phones are not connected. BUSTARDVery rude bus driver CALENDAR BATTLESHIPSA to-and-fro game played between a pair of overextended work colleagues attempting to agree upon a date for a meeting. CAREER-LIMITING MOVE (CLM)An ill-advised activity. For example, slagging off your boss while he/she is within earshot is a serious CLM. CARPERPETUATION (kar' pur pet u a shun) n.The act, when vacuuming, of running over a string or a piece of lint at least a dozen times, reaching over and picking it up, examining it, then putting it back down to give the vacuum one more chance. CHAINSAW CONSULTANTAn outside expert brought in to reduce the employee head count, leaving the brass with clean hands. CIRCULAR DEFINITIONSee "Definition, circular". COLD PEACEA relationship between two countries in which there is no war, no trade, no travel, and no diplomatic relations. CONSULTANTA title unemployed slackers use in Dublin while trying to find people prepared to pay them loads of money to be told what they already know. CRAPPLETA badly written or profoundly useless Java applet. (Example: "Mary - I just wasted 30 minutes downloading this bloody crapplet!") CRITICAL MESSAn unstable stage in a software project's life when any single change or bug fix can result in two or more new bugs. Continued development at this stage leads to an exponential increase in the number of bugs. CUBE FARM: An office filled with cubicles. CYLBRARIANReally fancy, smart and "with-it" name (well, librarians might think it is) for librarian-type person who makes a living doing online research and information retrieval. DARK FIBREWhen high-bandwidth fibre-optic cable is laid containing far more potential that can be currently used, the wire is said to be dark. Telecom companies aren't the only ones laying dark fibre - so are railways, oil and gas companies that own miles and miles of hollow pipe. DATA DUMPYuck! Either a brainstorming session, or a "project debriefing" - where the people handing over a project do a "data dump" for their successors' benefit. DAZPERATIONDiscovering your favourite top needs a frantic handwash before going out for the night, or you've no clean socks in the morning. DEAD END USERS (DEUs)Derogatory term that tech support uses to refer to clueless callers with painfully obvious questions (OK wake up - it's taking the piss out of the term "end users"). DEAD TREE EDITIONThe paper version of a publication available in both paper and electronic forms, as in: "The dead tree edition of the Irish Times..." DECEPTIONISTPerson who (a) receives visitors, mail, and phone calls, and performs any "little jobs" no one else wants to do, from collating the boss's post-it notes and unjamming the fax machine to proof-reading budgets and stalling unwelcome callers on the phone with diversionary tactics and (b) occupies a position, formerly known as a receptionist, that pays next to nothing. But the job is highly deceptive in this other sense: if the Deceptionist calls in sick or gives notice, Chaos Theory rules. DE-INSTALLEDEuphemism for being fired. DEJA MOOThe feeling that you've heard that bullshit before. DESIGNOSAURSA virtually extinct species of designers who refuse to work with computers. DESKFASTEating your breakfast at your desk (particularly in companies where workers are rarely "out to lunch" any more). DILBERTEDTo be exploited and oppressed by your boss. Derived from the experiences of Dilbert, the geek-in-hell comic strip character. "I've been dilberted again. That wally revised the specs for the sixth time this week." DIMP (dimp) n. A person who insults you in a cheap department store by asking, "Do you work here?" DISCONFECT (dis kon fekt') v.To sterilize the piece of confectionary you dropped on the floor by blowing on it, assuming this will somehow "remove" all the germs. DOCKERS' TEA BREAKDescriptive of something very long. DOORWAY SCAMA con where you (a) create a phony webpage, (b) submit it to search engines and get it a prominent ranking, (c) then once it's indexed and users start clicking on the link, you make sure they're automatically redirected to your real site - such as a porn one. DOT-COMMUNISTA dot-com's employee who's sitting on the stock options - "Hey, we own the company!" - and believes all that Global Digital New Economy bullshit. Not to be confused with a "venture communist", who doesn't believe the propaganda but will take the money anyway. ECNALUBMA (ek na lub' ma) n. A rescue vehicle which can only be seen in the rear-view mirror. EIFFELITES (eye' ful eyetz) n. Gangly people sitting in front of you in the cinema who, no matter what direction you lean in, always follow suit. EGO-SURFINGScanning search engines, databases etc for references to your own name. OK, admit it, everybody does it the first time they try a search engine. ELBONICS (el bon' iks) n.The actions of two people manoeuvering for one armrest in a cinema. ELECELLERATION (el a cel er ay' shun) n. The mistaken notion that the more you press a lift (elevator) button, the faster it will arrive. EMOTAGSSpoof HTML tags such as , or , used in email discussion groups and online forums instead of emoticons. Example: "Welcome back you toady slimeball". EMPLOYEE RUSTOUTNot quite as well known as its counterpart, employee burnout, this is a far more interesting workplace condition in which staff potential is underused and/or they are barely cranking through the job. ENRON, toVerb coined by US Senator Tom Daschle. When you've been enroned, you've been cheated big time. ENVELOPE, theThis is something you push. Don't ask why. ESPLANATIONAn attempt at an explanation at an office party while totally jarred. ETCH-A-SEXTrying to draw a smile on a person's face by twiddling both their nipples simultaneously like an Etch-a-Sketch thingummy. EUROCREEPNo, nothing to do with the band Radiohead, economists are using this term to describe how the euro currency will be adopted by UK high-street stores in 2002, as the new currency is brought into the sterling zone by tourists, returned holiday-makers and British business execs after trips to the euro zone. FEATURE ENHANCEMENTPosh software industry term for a bug fix. FLABBERGASTERISKGrammatical symbol expressing extreme emotion, used when a mere exclamation mark is just not enough. A Flabbergasterisk in Microsoft Word can take many designs, e.g. massive bullet-points, many pointy stars etc. FLASHBOXThat little box-shaped light that remains visible for some time after looking directly into the flash bulb on a camera. FLICKFLASHThat moment when you get that sudden realisation that you've dialled the fax number instead of the voice one. It's now too late to do anything about it as the telecom company has already charged you for the wasted call. But aren't the fax machine's whistles only brilliant? FOOLCENTThat habit Irish shops have of thinking that customers really will delude themselves that "§19.99" is effectively far less than §20. FORELOGOpposite of backlog - i.e. the huge amount of stuff people expect you to do before you go on holiday. FOREPLOYAny misrepresentation about yourself in chat rooms and discussion boards for the purpose of obtaining a shag. FUTURE-PROOFINGDesigning/building a product/system so that it won't be made obsolete by later waves of technological advancements. An aspiration that usually signals its complete failure. FRIGMAROLEUnnecessarily time-consuming foreplay. FRUST (frust) n. That small line of debris that refuses to be swept onto the dust pan and keeps backing a person across the room until he or she finally decides to give up and sweep it under the rug. GANG FAQWhen members of a group email a FAQ to some eejit who has asked a particularly stupid or old question in an email discussion list or on a newsgroup. Unlike a mailbomb, each person sends only one copy, but tons of members participate. GENERICAFeatures of the American (or Irish for that matter) landscape that are exactly the same no matter where one is, such as fast food joints, strip malls, subdivisions. Used as in: "We were so lost in generica that I forgot what city we were in." GLAZINGCorporate-speak for sleeping with your eyes open, particularly at boring conferences and breakfast meetings. "Didn't Jeff notice that half the room was glazing by the second set of PowerPoint slides?" GLOCALISATION(Or "Glocalisation") The work that US-based websites need to do to recognise that the Internet's population is increasingly likely to be other cultures and non-English speakers. Think of it as, um, "market-by-market localisation on a global scale". Also taken to mean the self-preservation drive or of individual countries and local cultures to create their own twist on - or resistance to - a globalisation trend. GOLDEN ROLODEX CIRCLEThe same handful of "experts" that newsrooms of broadcasters and publications always ring for an instant sound-bite or guest appearance. Example: "Who've we got in the golden rolodex under 'radio'? Try under 'W' - oh look, it's Harry Whatsit." GREYBAR LANDThe place you go while you're staring at a computer that's processing something very slowly (while you watch the grey bar creep across the screen). "I was in greybar land for what seemed like hours, thanks to that CAD rendering." HAVSHand-Arm Vibration Syndrome, medical condition from prolonged use of vibrating joypads on games consoles. HANG-TIMEDid this one come from basketball or something? It's the time when your PC's brand new Windows XP operating system freezes and you can't do sod all. HELIFINOShort for helifinocerous, a strange creature somewhat like a rhinoceros but never before seen by man. Often used as a generic reply to the question, "What is that?" HIMBOAt last, a male equivalent of a bimbo. HUMAN CAPITALNew buzzword for employees. Hence "Human Capital Managers" (formerly known as "Human Resources", formerly formerly known as "Them Bastards from Personnel"). Like Windscale nuclear reprocessing plant, sorry, Sellafield, they think that if they rename themselves often enough we'll either like them, or think they're safe, or forget that they exist. IDEA HAMSTERS: People who always seem to have their idea generators running. IGNORANUSA person who's both stupid and an arsehole. INFORMATION CENTREA room staffed by professional computer people whose job it is to tell you why you cannot have the information you require. INFORMATION TECHNOLOGY PROBLEM RESOLUTION ADVISORFancy term for a body on a helpdesk. INOCULATTEAn occupational hazard within the software industry, basically means "To take coffee intravenously". INSOMNITHOUGHTThat great idea you have late at night while lying in bed which can never be remembered the next day. IRRITAINMENTEntertainment and media spectacles that are annoying but you find yourself unable to stop watching them. The O.J. trials, Ally McBeal, Monica Lewinsky, etc. IT CONSULTANTSomeone who gets rich explaining to others why they are poor. JAVANT-GARDESomeone who champions 'new media' and the latest Web technologies as far cooler than 'traditional media' and technologies. Originated when Java was still cool and new. JEETShort for "Did you eat yet?" The response is usually "nahdija" (= No, did you?) KEEPAGEHold on, if "keepage" is the opposite of garbage, does that mean "keep" is the opposite of "garb"? KETCHSTUCKThe bits left in a Heinz tomato ketchup bottle that you can never get out. (coined by EvilSean) LACTOMANGULATION (lak' to man gyu lay' shun) n.Manhandling the "open here" spout on a tetrapak carton of milk so badly that one has to resort to the "illegal" side. LAGANOIAThe fear of being shunned or ignored because (thanks to network lag) someone has taken ages to reply to your discussion board posting, your email message or IRC conversation. LINK ROTThis is where a webpage's links became obsolete as the pages and external sites it's supposed to be connected to change location or die. LRF supportSounds like a genuine computer feature, but it's really for finding out if that sales assistant or computer know-it-all is really a prat. Example: "I was thinking of buying this system, but does it come with LRF support?" (LRF = "Little Rubber Feet") MAILBOTSSpotty drones, usually male, who by nature prefer dark, dank backrooms, but are required to occasionally surface to deliver mail to employees. They are technically equal in social status to the temp, thus creating an unspoken bond of respect between the two groups. MARKET LENINISMWhat succeeded Marxist-Leninism as China's new governing style. An amalgam of the "iron fist" political rule of Leninism and the economic hyper-permissiveness of laisser-faire capitalism. Think Singapore (which William Gibson once dubbed "Disneyland with the death penalty"). MARKETRIODSThe androids in your marketing department. McSHIT, going for aEntering a fast food restaurant with no intention of buying food - just going to the loo. MEETINGAn assembly of self-appointed experts coming together to decide what person or department not represented in the room must solve the problem. MILLENNIUM DOMESThe contents of a Wonderbra, extremely impressive when viewed from the outside, but there's actually sweet FA in there worth seeing. MOBILE COMMUNICATIONSA method of keeping staff permanently shackled to their workplace. MONETISE, toTo render as an impressionist painting. MONKEY BATHA bath so hot, that when lowering yourself in, you go: "Oo! Oo! Oo! Aa! Aa! Aa!". MOTIVAINTINGSWall decorations featuring daft slogans such as "Vision is not seeing things as they are, but as they will be," or "Challenge: the harder the course, the more rewarding the triumph." All inspired by Mao Tse Tung's early propaganda efforts of course. MOUSE POTATO: The on-line, wired generation's answer to the Couch Potato. MULDER, toTo find someone who you know has been plotting to deceive, inveigle, and obfuscate (but the truth is out there, kids!). MUTTER MACHINEA machine for playing office background noises such as ringing phones, laughter and chat, in order to make a small office sound much larger and busier. MYSTERY BUS, theThe vehicle that arrives at the pub on Friday night while you're in the loo after your 10th pint, and whisks away all the unattractive people so the pub is suddenly packed with stunners when you come back in. MYSTERY TAXI, theThe taxi that arrives at your place on Saturday morning before you wake up, whisks away the stunner you slept with, and leaves a 9-Pinter in your bed instead. NETOPATHAn extreme and deranged variety of Net abuser. NETSPLOITATION MOVIEHollywood film cashing in on the Net, which is always portrayed as big and scary (e.g. Sandra Bullock in "The Net", John Travolta in "Swordfish"). NEONPHANCY (ne on' fan see) n.A fluorescent light bulb struggling to come to life. NUTRACEUTICALOne of those so-called "functional foods" in our supermarkets (e.g. bacteria-enhanced yoghurt) that claim to be good for you and are a cross between pharmaceuticals and, er, plain old-fashioned food. NEVERENDUMA form of Irish referendum where the people have spoken, but they didn't vote the way the politicians wanted. So the politicians say we'll keep having referendums till eternity until they vote the other way. OHNO-SECONDThat minuscule fraction of time in which you realize that you've just made a BIG mistake. 1K BUFFERA techie insult, meaning you've a rather low capacity for handling new things: "She's got a 1K buffer when it comes to learning that new accounts software." OFFICE AUTOMATIONThe use of computers (q.v.) to improve efficiency in the office by removing anyone you'd want to talk with over coffee. OFFICE BOTTYAn occupational condition resulting from extensive subjection to the least comfortable chairs in the office. Example: "I've got a right case of office botty, and I can't feel my legs. OPENPLANANOIAThe awkward situation where you boss is moving towards you when you have contraband software running and you know that if you alt-tab it will draw his/her attention surer than if you leave things as they are (ta to Parsley for that). ORTHOREXIA NERVOSARecent nickname for an eating disorder in which concerns about healthy eating turn into a major obsession. OSTEOPORNOSISA degenerate disease caused by mouse-clicking through porn sites. PAPER CUTEither the most prevalent form of occupational injury in the modern Irish office, or the most common form of suicide attempt within the workplace. Other common methods include coffee overdose, sticking one's head in the microwave, throwing oneself in front of a speeding boss, and jumping from Microsoft Windows. PASTE BOMBSAs seen in chatrooms and on discussion boards, the random or non-sequitur chunks of text that are copied and pasted from your PC into an online conversation to aid, befuddle or frustrate others. PDFingEither turning a document into an Adobe Acrobat file or PDF (portable document format), or a near-expletive. Example: "Where's that PDFing file? It was there a minute ago...." PERCEPTION MANAGEMENTManipulating perceptions in your favour. Example: "For the past three years the NSA and FBI have been involved in perception management by telling anyone who'd listen that terrorists are using encryption - and Congress should approve restrictions on domestic use." PEPPIER (pehp ee ay') n. The waiter at posh restaurants whose sole purpose seems to be walking around asking customers if they want ground pepper. PERCUSSIVE MAINTENANCEThe fine art of whacking the crap out of an electronic device to get it to work again. PERMATEMPA kinder, gentler 21st-century euphemism for "indentured servant." See also under Oxford English Dictionary: slave, bitch. PETROPHOBIC (pet ro fob' ik) adj. One who is embarrassed to undress in front of a household pet. PHONESIA (fo nee' zhuh) n. The affliction of dialling a phone number and forgetting whom you were calling just as they answer. PINOCCHIO EFFECTTelling lies. Scientists have discovered that telling porkies does actually make liars' noses swell, and it triggers a bout of scratching. They noted that Bill Clinton touched his nose 26 times a minute during his denial of the Lewinsky affair. The researchers have dubbed it "the Pinocchio effect". PISSINFORMATIONNUnusual if somewhat limited form of English now used in Dublin pubs by some serving staff from abroad. PLASTIC CLOSETSaid about person who refuses to admit to having cosmetic surgery. Example: "Is [Mrs X from Dalkey] in the plastic closet or wha'?" POWER TEAMid-afternoon tea - what some posh hotels (e.g. the Ritz Carlton in Noo Yawk) are now offering busy business suits instead of the breakfast meeting or power lunch trip. And by "power" we don't just mean a pot of Barry's and a plate of scones and strawberry jam PLUG-AND-PLAYNew staff member who started last week but doesn't need any training. "That new fella Stephen is only great. He's totally plug-and-play." PONTIFF EFFECTOccurs when an aging, and egotistical con artist is unable to find work, is forced to mooch of their spouse, and they blur the line between reality and their silly fantasies of being something they can never be. As the effect reaches its terminal state they start to belive their own BS, and will go off on clueless rants which makes them look like a complete moron to everyone but themselves. PRESENTEEISMThe opposite of absenteeism. Persistently working longer hours and taking fewer holidays than the terms of your contract/employment demand - even when it's in your best interest. Particularly noticeable among either brown noses or staff enormously worried about or devoted to their jobs. PUPKUS (pup' kus) n. The moist residue left on a window after your dog presses its nose to it. PURRANIOAThe fear that your cats are up to something. PUSHING THE ENVELOPEApproaching or exceeding known performance boundaries. The expression was popularised by Tom Wolfe in "The Right Stuff", and originates in US test pilot speak from the late 1940s (the "performance envelope" is a range referring to a plane's performance capabilities and recommended limits at particular speeds and altitudes and under certain stress conditions). PRAIRIE DOGGING: When someone yells or drops something loudly in a cube farm, and people's heads pop up over the walls to see what's going on. RESPLUGNANTDazzlingly repulsive, e.g. when a supervisor arouses feelings of brilliant disgust. SAFETY USERSMobile phone owners who claim they have a phone only for emergency purposes. Service providers offer various enticements to turn such customers into full-time users. SALAD DODGEROverweight person. SCAREMAILAn email that has been circulated en masse to warn friends and colleagues about the latest urban myth "scare" that is spindling out of control. However, this original meaning is obviously bound to fade a bit after the anthrax postal attacks in the US. Seagull Manager:A manager who flies in, makes a lot of noise, craps over everything and then leaves. ShovelwareA document that was shovelled from paper onto an Internet version without anyone bothering to adapt it properly to the new medium. Telltale signs are papercentric phrases such as "Go to page so-and-so", "later in this booklet" etc. SLORKINESSThe feeling you get when you go somewhere (e.g. the kitchen), potter around for a while then leave without doing what you went in there to do. To feel slorky is to feel slightly silly and probably a bit annoyed. It also applies to logging onto the Net and checking out the latest sites, looking at the new messages on P45.net, then logging off and shutting down without checking your email which was what you switched the computer on for in the first place. SNOWSTORMERA colleague or superior who generates an inordinate number of memos SOLISTENINGSoliciting information from customers, while apparently listening to their needs. SPINQUISITIONSInquiries into how government/business spin-doctors got it so wrong this particular time. STARTER MARRIAGESShortlived first marriages that end in divorce - but with no kids, no property and no regrets. STUFFThe basic substance of which all matter is composed. Contrary to common belief, matter is not made of atoms and molecules. It is actually made of Stuff. This comes in many varieties and colours. For example Blue Stuff is the stuff that powers your PC. You can see it filling up the percentage bar as your computer does work. It's really bad when your computer runs out of blue stuff. Sometimes one of the blue stuff tubes bursts or springs a leak, and then the whole screen goes blue. That's really bad. SWIPED OUTWhat happens to your ATM or credit card because you've worn away the magnetic strip due to extensive use, rendering it useless. TALKITECTUREArchitecture as practised by a breed of architects (talkitects?) who talk a lot but don't actually build anything. TELECRASTINATION (tel e kras tin ay' shun) n. The act of always letting your phone ring at least twice before you pick it up, even when you're only six inches away. TEXT MESSAGEA mysterious piece of code that Bletchley Park would have taken three years to crack but is easily understood by anyone under the age of 15. THUMB CULTUREThe deft inputting skills required for text messaging and handhelds. TURFINGBrowsing the Web for crap sites about Irish genealogy... UMFRIENDA sexual relation of dubious standing or a concealed intimate relationship, as in; "This is Bridget, my ... um ...friend." UNINSTALLEDEuphemism for getting sacked or made redundant. "Nathan made a right pig's ear of that project, so they uninstalled him on Friday." UNDER MOUSE ARRESTGetting busted at work for going to The O'ByrneFiles too much or, in the UK, for violating their draconian new Regulation of Investigatory Powers (RIP) Act. Example: "Sorry I couldn't get back to you. They've been intercepting me email and put me under mouse arrest." UPGRADEATHONA race that begins after you've upgraded one piece of hardware or software, which necessitates more upgrades, ad infinitum. TREEWARE:Hacker slang for documentation or other printed material. VAMPIREWAREA project that sucks the lifeblood out of all staff unfortunate to be assigned to it, and which refuses to die even though it never actually sees the light of day. WANDINGThat process at airport security where they search you with one of those metal-detection wands. WEBLIFTA redesign or cosmetic surgery on your website for a new look and feel. XEROX SUBSIDYEuphemism for making excessive use of the photocopier in work for your own bits and pieces. ZIQXVA word with no meaning designed only for use in Scrabble to get a good score. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6136 From: James M. Atkinson Date: Mon Sep 2, 2002 10:39am Subject: So you've been broken into... http://www.fish.com/tct/help-when-broken-into So you've been broken into, and you're in a bit of a panic about what to do. You hunt around for help, answers, anything, and perhaps run across this software or had heard about it in the back of your mind. Since there's no way we can think of telling you that will soften the blow, let us simply say it outright - you're out of luck. This set of forensic tools probably won't help you out unless you've already looked at it, played with it, and know what the tools do as well as what to expect from them. The tools will run for a long time, give no immediate results, and at the end you'll quite possibly be none the wiser (and perhaps ticked off at wasting your time on our lame and so-called security tools). However, since a vast percentage of all security-related actions are in fact knee-jerk reactions to negative security incidents, we'll assume, without recrimination, that's why you're here (and, if not, congratulations! ;-)). If it comforts you to know, it doesn't really matter how good or careful you are - everyone's systems are at risk at being compromised, and most long-term Internet denizens have experienced this negative thrill first-hand (we certainly didn't write this in a hypothetical vacuum) And while yet another book could easily be written about dealing with intrusions and security incidents, here's a few quick pointers and a small bibliography. We'll hope that you at least know the system fairly well, what it does, what sort of valuable stuff is there (if anything), and if the system is connected or trusted by any other, perhaps even more critical systems. You might skip to the bibliography sections for more detailed ways of handling troubles and for additional resources. What to expect --------------- Running the toolkit (see below) is going to take a lot of time. But that's nothing compared to the time that people can spend on an incident. You may get away with a few hours with a "restore service as usual" response. The more fanatical can spend days or even months in a virtual pursuit of the intruder(s). Your basic goal is predicting the past based on the evidence you gather; as you uncover what happened in the past life of a machine you can often expect to stumble over evidence of additional break-ins as well! This is because it is rare to detect a compromise the first time it happens - more typically a system is compromised several times before it is found out. In one case we found traces of past break-ins dating back more than a year, apparently by completely different parties. Note that in the course of an investigation - especially when working on systems with multiple users - you'll frequently come across information that you'll have no "right" to examine. The legal ramifications are problematic enough, but the ethical ones are just as - if not more - serious. Personal correspondence, private notes, and web surfing patterns are a small sampling of some of the highly sensitive bits of information stored on computers today. Since even deleted files can be examined it is imperative that you remain highly scrupulous about your dealings with such information. If uncertain how to act *always* err on the side of caution. Never, under any circumstances, use the information gleaned from an investigation to your or other's personal advantage. What you'll need ----------------- oA pad of paper oSomething to write with oA secure, *OFF-LINE* location to store information A second computer that could talk to the network would be a welcome, but not necessary, aide. A laptop can be used to store results, notes, and data, but be cautious about who has access to the second system. Ideally it will only be accessible from you. Discretion is another fine thing to have. Do not email others about what is going on (and if you do, at least encrypt it!), don't keep logs or records of your activities where the wrong people can see it, etc. On the other hand, strongly consider initiating a dialogue (initially via the telephone) with an emergency response team (if your own organization doesn't have a security group or incident response team you can contact CERT, CIAC, and other FIRST groups) Since by definition a break-in involves the network, you aren't alone - you can get (or provide) valuable help if others have encountered the same intruder(s) or type of problem. What to do ----------- The first 3 basic steps to handling a "situation" (roughly taken from the wonderful Criminalistics, An Introduction to Forensic Science, by Saferstein (see the "bibliography" file) are: oSecure and isolate the scene oRecord the scene oConduct a systematic search for evidence And while speed is of the essence, attempt to stay calm and don't panic. And do *NOT* touch the keyboard or the computer yet unless you absolutely have to. We repeat. Do *NOT* touch the keyboard or the computer yet. Did you hear us? STAY AWAY FROM THE COMPUTER! Anything you do will destroy evidence, so simply don't touch it for now, or do as little as possible and don't start looking for damage yet. And while you might get lucky and find all the damage and evidence and perpetrator immediately, don't get your hopes up too much, this is still not an exact science, and almost every case has more than its share of disappointments. Secure & Isolate ----------------- If possible, a good first step is to simply disconnect the system from the network. Pull out the network cable, turn off the wireless NIC, whatever. Unless you're the one breaking into your own system there's usually not much an intruder will or can do to harm you when your system can't talk to anyone. A poor substitute for this is to disable as many network services as you can (inetd, sendmail, httpd, etc.) This all serves to isolate the scene of the crime. Record ------- Next, pull out a notebook (you know, those old paper things, not a laptop!) and take stock of the situation. What system is being affected? Note the time, date, who discovered the problem and how you were made aware of it. From now on every time you do something try to make a note of the situation describing what actions were taken, what results were found, and when & where it all took place. Evidence --------- The systematic search for evidence is where the TCT comes into play. Ideally it would be on a CDROM or other immutable media, ready for action, or perhaps built and ready to go on another, duplicate, system clone ready for NFS mounting, or at least close facsimile to the affected system, or perhaps even on a spare disk lying around somewhere. Failing all that, having it already precompiled on the system is barely acceptable; while the intruder could have messed with your toolkit, they would have had ample opportunity to do a lot more than that prior to your running it. At the very least know how to get it, drag it down from the network and get it ready (preferably on a *different* system than the affected one!) The easiest way to get started from scratch with the TCT is to type: make And hope that there are no grevious errors. Compiling the program after a break-in is a bad idea (it'll potentially destroy valuable forensic information), but sometimes there is no help for that. Once you have the TCT, you'll want to type something like: script grave-robber -v / (The "script" command saves everything that appears or is typed into a terminal window; type "exit" or "logout" to escape. The "grave-robber" is the main forensic data collecting agent that TCT has, and the -v flag gives a verbose listing of what the program does as it runs.) Have some disk space available (a few hundred megabytes at least) and wait a long time (30 minutes to several hours) for something to happen. The -v flag gives you some sense of what is going on, the "script" command creates a record of what is typed, which is good. When the grave robber says: Finished preprocessing your toolkit... you may now use programs or examine files in the above directories You should now start to read the TCT documentation. Hopefully you'll be done before time the program stops. At a minimum read the file "README.FIRST", as well as everything in the "docs" subdirectory. By the time the TCT ends its run of data collection, at least a bare-bones set of data will have been collected and ready to analyze. More evidence -------------- After the initial data gathering you should start the analysis of what it all means, as well as gathering additional information based on that data. This is the hard part, without a doubt, and, unfortunately, beyond the scope of this simple document (this is one of the things we knew you wouldn't like to read here) but you can find additional help at: http://www.cert.org (Good general information) Practical Unix & Internet Security, Garfinkle & Spafford; O'Reilly (The best book on Unix & Internet security out there, some good tips on intrusions and other topics.) One of the more difficult things to judge is how much effort to put into the analysis. Oftimes the more analytical sweat you emit the more clarity and understanding you have of the situation. That said, at times the intruders are more careful and/or skilled than others, and unfortunately you never know prior to the break-in what to expect. Indeed, the truly skilled intruders could easily try to fool you into thinking they're novices by placing some simple blunders that will easily be caught, obfuscating the real damage or mischief. The truth is you'll never absolutely, positively know that you've found all that you can. Experience will be your only guide here. What next? ----------- At this point you hopefully have at least some idea of what the extent of the problem is. It's now time to decide what course of action to take. Remember all throughout this process to keep your brain in gear - it doesn't help anyone, least of all yourself, to take uninformed or ill-though out actions. While setting your goals - do you want to simply get back to work and forget about it, catch the miscreant and string them up, monitor the situation but keep things running, etc. - you'll also need to consider how much time it will take to accomplish them. As a completely non-scientific WAG, we came up with this chart: ACTION EXPERTISE REQUIRED TIME CONSUMED ------- ------------------- -------------- Go back to work None Almost none Minimal effort Installing system software 1/2 - 1 day Minimum Recommended Jr. system administrator 1-2 days+ Serious effort Sr. SA 2+ days - weeks Fanaticism Expert SA days - months+ A tremendous amount of time can be consumed taking care of the problem at hand, but as a rule of thumb if you don't expend at least a day or two you're probably short changing yourself and your system - so much can be done to subvert a system once compromised you owe it to yourself to put in some time to at least prevent a recurrence. Many modern organizations now have internal security or response teams, which should ALWAYS be contacted in the case of security incidents, no matter how trivial they may initially seem. And while legal counsel should be sought whenever appropriate, we would highly advise contacting one of the many free (and often publically funded) incident teams about the incident. They're very discreet and can often lend significant technical assistance. The local police and governmental agencies (such as the FBI and Secret Service in the US) are also increasing the number of specialized personnel that can lend assistance if the incident is serious enough. After performing damage control to any serious bleeding wounds, unless you're interested in setting a trap or tracking the intruder you should immediately start securing your system. There are many documents about this on the Internet (see our bibliography), and many of the operating system vendors will have a guide on their web sites. In general you'll want to: oCreate a security policy. This can be the most important thing you can do - detail what you *want* the systems to look like so you can actually do it! Documenting the changes you made to secure your system can be an excellent start to such a document. oInstall any and all vendor security patches that you can find on your operating system vendor WWW site. oTurn off all network services that you don't use, use one-time passwords (logdaemon and s/key), encrypted login sessions (ssh), and run security/auditing tools on your system. oLearn your system better. Spend more time learning the ins and outs of your computers, including (especially?) the capabilities that you don't use. oTurn on logging & accounting. Almost all systems can be modified or configured to create more records. Do this - and look at them! oCreate a baseline. Create backups, run MD5's on your system files, save the output of a TCT run, etc., and keep them in a secure place to compare against later on when you have troubles. oRegularly audit or at least examine your systems. Need we say more? Deleted Data ------------- Sometimes data will be loss through malice, chance, or simple mistakes. Unlike PC's the Unix file system is optimized for performance and stability - but at a price. Files deleted in Unix have a hard time coming back to life unless a good backup strategy was previously implemented. TCT has a pair of programs that can potentially help - "unrm" and "lazarus" - but they are far from being a good, general purpose solution. Nonetheless they can potentially recover valuable data that was either left behind by the intruder(s) (break-in tools, files of interest, clues, etc.) or that were removed. See the individual "unrm" and "lazarus" documentation for more on these tools. The Future ----------- It's rarely entertaining to go through the process of recovering from a break-in. Our main advice is that you keep your eyes open and learn from your mistakes - both in the investigative process and the mistakes that got you in this situation in the first place. Good, recoverable backups are, without a doubt, your best defense against computerized disasters of almost any sort. Watch over your system and be alert, and, most of all, hope you don't have to go through any of this again! Bibliography ------------- [More information can be found in our "bibliography" file.] Slides of our forensics class & the TCT toolkit - relatively sketchy, but perhaps of some use: http://www.fish.com/forensics/ http://www.porcupine.org/forensics/ CERT's (Computer Emergency Response Team) home page, chock-full of information about how to report & respond to incidents: http://www.cert.org/ AUSCERT's (Australian CERT) nice Unix checklist about removing common security vulnerabilities: ftp://ftp.auscert.org.au/pub/auscert/papers/unix_security_checklist -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6137 From: James M. Atkinson Date: Mon Sep 2, 2002 11:47am Subject: The seven habits of highly ineffective people The seven habits of highly ineffective people By Daniel Jimenez * Bankrate.com http://www.bankrate.com/brm/news/advice/20000103a.asp Today's best-seller lists are full of self-help books aimed at improving work attitude and performance. The problem is that it usually takes a great deal of effort and determination to implement the advice. Inspired by author Stephen Covey's The Seven Habits of Highly Effective People, I've come up with my own list of short cuts for the worker who has neither the time nor the ambition to strive for excellence. 1. Wait until tomorrow Procrastinating is a simple yet highly effective way to avoid an unpleasant task. Sure, you may have to work extra hard one day because you've been goofing off all week. But look at how much you got to enjoy yourself during that free time! 2. Whine about everything Nobody likes a habitual complainer, and that is the reason you can use this strategy to your advantage. By complaining about everything from the break-room coffee to your customer's looks, you make sure that people treat you with kid gloves. For example, do you think your boss will assign you a difficult client if he thinks you'll make the poor soul miserable with your constant griping? This means people will eventually stop giving you tough assignments because they dread having to put up with your complaining. 3. Let others make the important decisions Avoiding responsibility can pay off big time. Here's an example: You've been told to assist on a crucial group project. What should you do? Absolutely nothing. If the project succeeds, you can bask in glory along with your resentful and much more deserving team members. If the project fails, you can avoid blame by truthfully stating, "I had nothing to do with that decision." 4. Keep your expectations low This bit of wisdom can apply to all aspects of life, not just to your career. There are few things as disappointing as striving hard for a goal only to come up short. You'll never have to worry about this happening if you learn to settle for less than the best. 5. Don't help co-workers The No. 1 reason why you shouldn't help your fellow employees: One of them could wind up getting a promotion that should be yours. Your fellow wage slaves will get the picture after you turn down the first few requests for help. At the same time, don't let being unhelpful stop you from taking credit for others' work. 6. Overstate the difficulty of the assignment Insist from the start that you can't meet your job deadline with the time and resources allotted. Keep on saying this even though you actually have plenty of both. Your supervisor will think that you're a miracle worker if you get the job done on time ... or at all! 7. Do only what is asked of you (and not one thing more) Following this principle will let you go home at 5 o'clock while those other poor suckers at your company are still slaving away. If somebody asks you to do something that sounds like extra work, answer with the time-honored words: "That is not in my job description." Some of us are never going to be super-successful no matter how hard we try. There are far more followers than there are leaders in the workplace and, guess what? There's nothing wrong with that. I'll leave you with the immortal words of wisdom I once saw on a postcard: "Success is a journey, not a destination. So stop running." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6138 From: iDEN-i100 Date: Mon Sep 2, 2002 3:06pm Subject: Safety threat may force airlines to ban laptop use Safety threat may force airlines to ban laptop use http://www.timesonline.co.uk/article/0,,2-401104,00.html [Non-text portions of this message have been removed] 6139 From: Date: Mon Sep 2, 2002 6:27pm Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County, San Francisco, Silicon Valley, San Jose, San Diego, and Las Vegas. (Also, anywhere in a thousand mile radius from Los Angeles.) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 6140 From: Date: Mon Sep 2, 2002 6:27pm Subject: File - mission.txt TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6141 From: James M. Atkinson Date: Mon Sep 2, 2002 9:33pm Subject: A Juggler and a Trooper... An Alexander County Deputy pulled a car over on I-57 about 2 miles north of the Missouri State line. When the Deputy asked the driver why he was speeding, the driver answered that he was a magician and a juggler and he was on his way to Branson to do a show that night and didn't want to be late. The deputy told the driver he was fascinated by juggling, and if the driver would do a little juggling for him that he wouldn't give him a ticket. The driver told the deputy that he had sent all of his equipment on ahead and didn't have anything to juggle. The deputy told him that he had some flares in the trunk of his squad car and asked if he could juggle them. The juggler stated that he could, so the deputy got three flares, lit them and handed them to the juggler. While the man was doing his juggling act, a car pulled in behind the squad car, a drunk got out ! and watched the performance briefly, he then went over to the squad car, opened the rear door and got in. The deputy observed him doing this and went over to his squad car, opened the door and asked the drunk what he thought he was doing. The drunk replied, "Might as well take my ass on to jail, there's no way in hell I can pass that test." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6142 From: Date: Tue Sep 3, 2002 1:48am Subject: Wireless Camera Detector Wireless Camera Detector Yea, and everything else between 50 Mhz and 3 Ghz lol! The easy to use Camera Detector is so small it can be carried or stored anywhere. Discreet sweeps of the home, office or hotel room can be done quickly and efficiently. When a wireless camera is discovered, a LED light flickers and an audible alarm sounds. An adjustable sensitivity tuner allows you to scan variable distances and can check multiple channels. It can detect frequencies anywhere from 50MHz to 3GHz, picking up most wireless cameras. Advanced circuitry eliminates background noise, minimizing false alarms. How to Operate: 1. Slide and remove battery lid. Install two CR2032 batteries matching (+) and (-) poles as shown (shows positive side up on both batteries). Slide lid back into place. 2. Switch unit on. Green light should appear on LED. IF LED lights red, remove and replace batteries. 3. When a wireless camera is discovered, LED will flash green and audio alarm will sound. http://www.radioshack.com/product.asp?catalog%5Fname=CTLG&category%5Fname=CTLG%5F006%5F003%5F002%5F001&product%5Fid=63%2D1151 [Non-text portions of this message have been removed] 6143 From: Steve Whitehead Date: Tue Sep 3, 2002 0:27am Subject: Countersurveillance Expert? ORLANDO -- Standing in a busy aisle at the International Security Conference Expo in Orlando, Roy Winkelmann is clutching a 4-ounce device he has just purchased called a "Zap Checker." It is a highly sensitive handheld counter-surveillance meter that detects wireless video or audio bugs as far away as 40 feet. As a counter-surveillance pioneer, Winkelmann has seen many devices before now that claimed to do what this one can. But none of them were any good. Either their frequency range was too limited, or you had to hold them right next to the bug for them to pick up the signal. This one, he says, is the real McCoy. Perfect for the traveling businessperson worried about privacy. Perfect merchandise for Spy Sarasota, the newest venture of an old spook. Winkelmann's wizened face, framed in closely cropped white hair, crinkles into a mischievous grin. For at least three decades, Winkelmann traveled the world in the counter-intelligence game before slowing down a bit to establish a Sarasota-based private investigator service called Winkling Associates in the mid-1990s. Born in the United Kingdom and transplanted to Utah as a boy, he became a criminal investigator in the Air Force in the 1950s. Now his resume, spanning both the Old and New World, looks like something out of a creative writing class for spy novelists: a.. Counter-intelligence adviser to the AFL/CIO on subversive methodologies conducted by Communist sympathizers to infiltrate and gain control of local unions, and suggested countermeasures. a.. Security for the safe transport of cash and negotiable instruments for Queen Elizabeth II. a.. Adviser to the newly elected government of Zimbabwe for safe shipment from the United Kingdom to Harare of the nation's newly printed currency and newly minted coin. a.. Adviser for the safety and security of the Gutenberg Bible while in transit in the United States. a.. Technical counter-intelligence adviser and instructor to the Iraqi military intelligence unit known as Mukhabarat (in the early 1980s). Those are just a few of the "Notable Security and Counterintelligence Assignments," listed in Winkelmann's resume. There are others that he prefers not to talk about "because we still do some work for them." Kelly Fromm, a former U.S. military counter-intelligence operator who now imports and sells surveillance equipment, checked Winkelmann out earlier this year before becoming a supplier to Spy Sarasota. "I would love for him to be with me for the next few months straight," Fromm said. "He has already taught me things that made me think, 'Why didn't they teach me this in the military?'" Back in Sarasota, it is clear that Winkelmann believes strongly in security. The door to his office, off Bee Ridge Road on Belmont Boulevard, is locked at all times. Before you even press the doorbell, you have been videotaped on a couple of cameras, and your face is visible inside on a high-resolution split screen monitor. In part Winkelmann and his wife, Judy, who runs the Spy Sarasota part of the business, are just showing off the wares they make available through www.SpySarasota.com. Starting a year ago, they began hearing from potential customers who wanted to buy a surveillance system and install it themselves. Sept. 11 might have raised general awareness of the need for security and protection. But just as importantly, the prices on equipment have been dropping sharply, making what used to be an elaborate system commonplace and affordable. You can buy a high-quality, four-camera surveillance system with digital recorder and remote access capability for $3,500, half of the price three years ago, Fromm said. Customers such as bar owners are lining up for the equipment, Winkelmann said. With it, they can go home early and still keep an eye on the help, just by logging on to their bar-TV station on the Web. Fromm said Winkelmann has moved at least $100,000 worth of the equipment just in the six months the two men have been working together. Winkelmann's greatest claim to fame, though, resides in a place of honor in his office off Bee Ridge Road in Sarasota. Resting on its own rack under a spotlight in an otherwise dimly lighted room is the world's first "portable microprocessor-controlled electronic surveillance countermeasures defense system." Translated, that means a computerized bug detector, a device designed to find potential bugs in a modern office building's telephone switching room. Every office building has a switching room where thick bundles of telephone cable pairs come into the building and then are distributed to phones, faxes and computers. It is between the phone room, which Winkelmann calls a frame room, and the device hooked up to the line where most wired bugs are placed. During the 1970s, there was no efficient way to find these bugs. That's because the voltage through a telephone line is not constant. Winkelmann, with cash in hand from the successful sale of the armored car business he started in London, poured $750,000 into the design of an instrument that recorded the voltage variations on each phone line, then analyzed them mathematically to come up with acceptable ranges. A bug, or listening device on a given phone line, would show up as a spike outside of this acceptable range. After that, Winkelmann and his small London-based crew would isolate the problem line. Sometimes they would find the bug and remove it. If they couldn't track it down, they would simply fire a powerful jolt of electricity through the line, frying the bug to permanently disable it. By 1980, Winkelmann was happily frying electronic bugs all over London, getting his jobs through an ex-Scotland Yard officer. "The three of us, we were earning from sweeping anywhere from $500,000 to $700,000 a year," Winkelmann said. "I mean, you do an embassy, $30,000." Then, one night in 1981, he got a call from the Iraqi Embassy, requesting him to bring his team and his debugging gear to Baghdad. He checked with his Scotland Yard buddies, and with the U.S. Embassy. There were no prohibitions. When Winkelmann and his partner arrived in Baghdad, a colonel who met them at the airport took their passports and their money and drove them to the headquarters of the Mukharbarat, Iraq's military intelligence service. At lunch, the colonel informed them that they would be tested. The Mukharbarat staff had planted a number of bugs within their own phone network, and Winkelmann's job was to find them. The colonel asked how many bugs Winkelmann found. Winkelmann asked, in turn, how many had been put in. The two men played the game for another round before the colonel said eight. Then Winkelmann said, "Well, here's two more for you." They were invited to dine with Saddam Hussein at one of his palaces that evening. Saddam never showed up. But the evening led to an order for the manufacture of three more debugging devices like the one they brought with them, at $60,000 each, plus an agreement to train Iraqis in their use. The device became the basis for another of Winkelmann's businesses: Winkelmann U.K. Ltd. The company sold dozens of the counter measure receivers after the Iraqi order. Winkelmann U.K. still operates and still sells sophisticated surveillance and counter-surveillance gear, although Winkelmann sold out his interest years ago. But he doesn't recommend the business to anyone. "I was in a gray zone all the time," Winkelmann says, his eyes wandering through the story of his life. "I've been hurt bad. When people put a device in and spend $50,000-$60,000, they don't want them taken out. So it is not a particularly safe business to be in." Link http://www.heraldtribune.com/apps/pbcs.dll/article?Site=SH&Date=20020901&Category=NEWS&ArtNo=209010932&Ref=AR&Profile=1007&SectionCat=FRONTPAGE Steve Whitehead e-mail : info@t... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) PO Box 16063, Lyttelton, 0140, Centurion, South Africa [Non-text portions of this message have been removed] 6144 From: Kirk Adirim Date: Tue Sep 3, 2002 2:17pm Subject: experts Beware of self-styled experts: an ex is a has-been, and a spurt is a drip under pressure. [Non-text portions of this message have been removed] 6145 From: Mitch D Date: Tue Sep 3, 2002 6:36am Subject: Re: Wireless Camera Detector Thanks to Radio Shack,A Minox convention will never again go undetected!(Steve's gonna be pissed!);) --- Marcelrf@B... wrote: > Wireless Camera Detector > > Yea, and everything else between 50 Mhz and 3 Ghz lol! > > The easy to use Camera Detector is so small it can be carried or stored > anywhere. Discreet > > sweeps of the home, office or hotel room can be done quickly and > efficiently. When a > wireless > camera is discovered, a LED light flickers and an audible alarm sounds. > An adjustable > sensitivity tuner allows you to scan variable distances and can check > multiple channels. > It can > detect frequencies anywhere from 50MHz to 3GHz, picking up most wireless > cameras. > Advanced circuitry eliminates background noise, minimizing false alarms. > How to Operate: > 1. Slide and remove battery lid. Install two CR2032 batteries matching > (+) and (-) poles > as > shown (shows positive side up on both batteries). Slide lid back into > place. > 2. Switch unit on. Green light should appear on LED. IF LED lights red, > remove and replace > > batteries. > 3. When a wireless camera is discovered, LED will flash green and audio > alarm will sound. > > > http://www.radioshack.com/product.asp?catalog%5Fname=CTLG&category%5Fname=CTLG%5F006%5F003%5F002%5F001&product%5Fid=63%2D1151 > > > [Non-text portions of this message have been removed] > > __________________________________________________ Do You Yahoo!? Yahoo! Finance - Get real-time stock quotes http://finance.yahoo.com 6146 From: Date: Wed Sep 4, 2002 4:37am Subject: Re: Wireless Camera Detector Page Not Found ------------------------------------------------------------------------------ -- If you arrived at this page via a link on some other site, please contact the site administrator and report the dead link. If you arrived at this page following selecting a bookmark (favorites) entry, then that bookmark has become obsolete. Please discard your bookmark and start over from our home page to find the page you wish to bookmark. If you arrived at this page following entering the URL in browser, then you have omitted one or more required arguments. To locate the page you are looking for, please start from home page. 6147 From: Greg H. Walker, Attorney At Law Date: Wed Sep 4, 2002 8:50am Subject: Re: Wireless Camera Detector Marcelrf@B... wrote: > > Wireless Camera Detector > > Yea, and everything else between 50 Mhz and 3 Ghz lol! GREG'S REPLY: I can see someone getting the flashing green light and audible tone and in desparation starting to take their house apart, taking down light fixtures, tearing off drywall, ripping out wiring and plumbing, etc. looking for that "wireless camera" that just won't go away, until their teenage daughter hangs up the 900 Mhz or 2.4 Ghz portable phone. Snake oil salesman have always made money while the patient kept on dying of cancer. GREG -- Greg H. Walker, ARM* Attorney At Law President RisKontroL -- Risk Management, Security Consulting & Investigations Houston, Texas (713) 850-0061 * Associate in Risk Management Designation (Insurance Institute of America's Center For Advanced Risk Management Education) WARNING NOTICE BY GHW: Greg H. Walker's comments are not intended to be and should absolutely not be taken as legal advice. Unless you have entered into a specific written agreement with him for legal services, signed by both you and him, and paid him a retainer in good funds, then he is not your Attorney, does not intend to be your Attorney and you should not act nor refrain from acting based, in whole or in part, on his comments. 6148 From: Michael Puchol Date: Wed Sep 4, 2002 3:17am Subject: When will they ever learn physics? Hi all, Last night I saw in the news a clip about a U.K. couple that are going to implant a 'tracking device' into their daughter's arm, following the recent spate of kidnappings and assaults on young girls. The device looked like one of those electronic tags that are inserted in dogs, nothing more than a coil, capacitor and a serial IC, enclosed in a glass capsule, which can be used to identify the animal and match it to it's owner. These devices need a special handheld reader which energizes the coil and surrounding circuit, which then transmits back it's unique serial number. It has a 'range' of a few inches. Similar systems used in cars have a range of a few meters. What the creator of this device (if he really is the creator, I guess he just bought a bunch of those capsules for the show) claimed is that this device could be implanted in an arm or in the stomach area, and it would send location signals to a satellite. The position of the tracked subject could then be plotted on a computerized map. Again, this claim seems ridiculous, and it doesn't cease to amaze me how the news people still fail to see a scam like this, and run the clip. Has anyone else seen information about this story? Cheers, Mike 6149 From: iDEN-i100 Date: Thu Sep 5, 2002 0:01am Subject: Re: Wireless Camera Detector Oh yea- Or their car! "Greg H. Walker, Attorney At Law" wrote: > Marcelrf@B... wrote: > > > > Wireless Camera Detector > > > > Yea, and everything else between 50 Mhz and 3 Ghz lol! > > GREG'S REPLY: > > I can see someone getting the flashing green light and audible tone and > in desparation starting to take their house apart, taking down light > fixtures, tearing off drywall, ripping out wiring and plumbing, etc. > looking for that "wireless camera" that just won't go away, until their > teenage daughter hangs up the 900 Mhz or 2.4 Ghz portable phone. > > Snake oil salesman have always made money while the patient kept on > dying of cancer. > > GREG > > -- > Greg H. Walker, ARM* > Attorney At Law > President > RisKontroL -- Risk Management, Security Consulting & Investigations > Houston, Texas > (713) 850-0061 > > * Associate in Risk Management Designation (Insurance Institute > of America's Center For Advanced Risk Management Education) > > WARNING NOTICE BY GHW: Greg H. Walker's comments are not intended to > be and should absolutely not be taken as legal advice. Unless you have > entered into a specific written agreement with him for legal services, > signed by both you and him, and paid him a retainer in good funds, then > he is not your Attorney, does not intend to be your Attorney and you > should not act nor refrain from acting based, in whole or in part, on > his comments. > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 6150 From: Ben Evans Date: Wed Sep 4, 2002 9:55am Subject: Re: When will they ever learn physics? They say there are a few complications, such as how to recharge the battery. ;-) -Ben At 10:17 AM 9/4/2002 +0200, you wrote: >Hi all, > >Last night I saw in the news a clip about a U.K. couple that are going to >implant a 'tracking device' into their daughter's arm, following the recent >spate of kidnappings and assaults on young girls. > >The device looked like one of those electronic tags that are inserted in >dogs, nothing more than a coil, capacitor and a serial IC, enclosed in a >glass capsule, which can be used to identify the animal and match it to it's >owner. These devices need a special handheld reader which energizes the coil >and surrounding circuit, which then transmits back it's unique serial >number. It has a 'range' of a few inches. Similar systems used in cars have >a range of a few meters. > >What the creator of this device (if he really is the creator, I guess he >just bought a bunch of those capsules for the show) claimed is that this >device could be implanted in an arm or in the stomach area, and it would >send location signals to a satellite. The position of the tracked subject >could then be plotted on a computerized map. > >Again, this claim seems ridiculous, and it doesn't cease to amaze me how the >news people still fail to see a scam like this, and run the clip. Has anyone >else seen information about this story? > >Cheers, > >Mike 6151 From: Kirk Adirim Date: Wed Sep 4, 2002 1:18pm Subject: RE: When will they ever learn physics? I saw the same news piece here in Los Angeles, except they were claiming the tiny glass tag contained a GPS receiver and a Cellphone that could be dialled up from anywhere. The daughters position would be displayed on a laptop to within feet. What absolutely amazes me is that when taping this piece for the news, doesn't the cameraman, soundman, or other technical production people question the validity of this story? After all, they're supposed to be technical people. You would think someone would ask, Where's the battery or how do you recharge that thing. How do YOU activate it when there's a "situation", or do you just wait until someone notices your missing and then dial you up to see where you are? Will it transmit from under water or through dirt, say a shallow grave? Well it looks like I'll be carrying a mylar space blanket or a roll of aluminum foil on my next kidnapping assignment, hmmmm maybe Kodak makes a giant lead lined film bag. Kirk www.tactronix.com -----Original Message----- From: Michael Puchol [mailto:mpuchol@s...] Sent: Wednesday, September 04, 2002 1:17 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] When will they ever learn physics? Hi all, Last night I saw in the news a clip about a U.K. couple that are going to implant a 'tracking device' into their daughter's arm, following the recent spate of kidnappings and assaults on young girls. The device looked like one of those electronic tags that are inserted in dogs, nothing more than a coil, capacitor and a serial IC, enclosed in a glass capsule, which can be used to identify the animal and match it to it's owner. These devices need a special handheld reader which energizes the coil and surrounding circuit, which then transmits back it's unique serial number. It has a 'range' of a few inches. Similar systems used in cars have a range of a few meters. What the creator of this device (if he really is the creator, I guess he just bought a bunch of those capsules for the show) claimed is that this device could be implanted in an arm or in the stomach area, and it would send location signals to a satellite. The position of the tracked subject could then be plotted on a computerized map. Again, this claim seems ridiculous, and it doesn't cease to amaze me how the news people still fail to see a scam like this, and run the clip. Has anyone else seen information about this story? Cheers, Mike ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6152 From: zack <10-33@c...> Date: Wed Sep 4, 2002 3:23pm Subject: Cell phone jammer Awhile back someone posted a link to a web site which sold " cell phone jammers " . This was a portable device which you could use Mobile ( car, on person) and range 50-200 feet ??? Thanks visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." George W Bush God Bless The USA .. NEVER forget 9-11-01 http://www.copscops.com/blessusa.htm [Non-text portions of this message have been removed] From: George Shaw Date: Sun Aug 29, 2004 10:46am Subject: Bluetooth For those that have not heard of the perils of Bluetooth... http://www.wired.com/news/privacy/0,1848,64463,00.html?tw=wn_tophead_1 also a commercial Bluetooth module is now available complete with a full development SDK that will allow programming of all sorts of BT devices for under $80. Along with a PDA I was able to knock up a BT device that allowed my PDA to download contact lists from my own phone. So the moral is if you or your clients have BT phones get them turned off or at least install the latest security patches by Nokia etc. 73 -- George Shaw MI3GTO / 2I0GTO " Any Sufficiently Advanced Technology is Indistinguishable from Magic" ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... Fax & Voicemail: +44 (0) 871 242 5365 EchoLink & eQSO (101English) connected 24/7 9500 From: DJ Date: Sun Aug 29, 2004 10:49am Subject: ASIS Conference Dallas TX 27-30 Sept The following vendors will be showing their equipment along with 1300 other vendors. Company Booth Add to Personal Planner? Alan Broadband Co. 2857 Audiotel International Ltd. 1004 Command Security Corporation 1047 Control Risks Group 5949 Dynasound Inc. 4100 Emsec Systems, LLC 237 Homeland Security Strategies 5347 Information Security Associates, Inc. 1642 Investigations Canada, Inc. 2144 MAI/MAGALLANES ASSOCIATES INTERNATIONAL 337 Research Electronics Int'l LLC 4719 SystemWare, Inc. 5743 If anyone is going to be attending please email me for maybe all the tscm'ers can have dinner night one. IT2 navyguyinil@y... 9501 From: J. Molay Date: Sun Aug 29, 2004 3:57pm Subject: Re: Looking for Supplier - Precision Inductors On Sun, 29 Aug 2004 15:37:10 -0400 "James M. Atkinson" wrote: > > > I am looking for a supplier of a large number of precision shielded > inductors, I need both adjustable (can type) and small fixed value (axial > leads). > > I would prefer to buy the cores/forms for the axial inductors and wind them > myself, but I need a matching mu sleeve. > > Both will be used for TSCM Have a look at http://www.coilcraft.com/ -- J. Molay 9502 From: Shawn Hughes (Road) Date: Sun Aug 29, 2004 4:18pm Subject: Re:ICOM pecularities At 02:18 PM 8/29/04 +0000, you wrote: >My personal favorite control application "TALK-PCR" is no longer >being developed so I have migrated to using a Winradio. Yes, isn't that strange??? They have this wonderful software driven radio system, and they basically code a throwaway ap for it and say, 'here ya go!' They put more effort into aftermarket stuff for the lowest - tier 2M ht... James, does your daemons simply tune and log, or is there more to it? Be VERY sexy if it could also correlate to a known database, and be able to fingerprint threat systems. Would it be possible for it to dissect strong signals to look for snugglebugs and spread spectrum? -Shawn ==================================== Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response, LLC www.warriormindset.com ////////////////////////////////////////////////////////////////////////////// ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. 9503 From: Mitch D Date: Sun Aug 29, 2004 10:32pm Subject: Re: From Cryptome.org Looks like the Gateway laptop w winradio,aor 3000,and a discone may have stirred some interest. The big question,is how much was the govt going to get "wopped" for the "flex"system ??? --- bernard_stan@y... wrote: > 28 August 2004. > > NASA has removed this announcement of a TSCM sole-source > contract > award, and asked a mail list to remove the link to it > (Cryptome has > not been contacted). Apparently the announcement revealed a > classified TSCM system and provided evaluation of other TSCM > systems > used by the government. NASA, State Department and the Central > > Intelligence Agency were reportedly involved in contracting > for the > system. The system is now likely to be abandoned due to this > announcement being published. > __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail 9504 From: Steve Uhrig Date: Sun Aug 29, 2004 6:02pm Subject: Re: From Cryptome.org On 29 Aug 2004 at 10:43, bernard_stan@y... , who eschews obfuscation, wrote: > The system is now likely to be abandoned due to this announcement being > published. It doesn't work this way. You all can stop patting yourselves on the back. The system or acquisition won't be abandoned. Purchasing simply will redo the requirement and generate the extra paperwork to do a sole source justification, and exempt it from being put out to bid. Some beancounter made a mistake floating a public tender on the thing originally. The same item will be purchased from the same vendor, but this time the vendor probably will charge more since he has to do paperwork all over again, he's not on GSA schedule and doesn't have to stick to a negotiated price sheet, his quote expired, and he now controls the sale. He's happy people raised a ruckus. So protesting it or publicizing it and getting it cancelled simply keeps the procurement out of public view where YOU'LL know nothing about it next time, and lets the vendor charge more. Keep protesting and publicizing and pretending you know something about the process and keep thinking you're fouling up the system. You're just terminating your own flow of information and allowing the vendors to earn more profit which is funded by your tax dollars. I'm a government contractor, been very active for a long long time, and how much of my stuff do you see in an RFQ released to the public? Virtually none. Now you know why. My clients are smarter than a NASA bean counter who has no idea of the products she's tasked to supply to her end users. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9505 From: Steve Uhrig Date: Sun Aug 29, 2004 7:22pm Subject: Re: ICOM pecularities On 29 Aug 2004 at 14:18, Shawn Hughes (Road) , who eschews obfuscation, wrote: > Yes, isn't that strange??? They have this wonderful software driven > radio system, and they basically code a throwaway ap for it and say, > 'here ya go!' They put more effort into aftermarket stuff for the > lowest - tier 2M ht... ICOM themselves carries ALL their receivers in their amateur line, not their government, commercial, land mobile or any other line. So they're telling you themselves how they classify their receivers. Even the vastly overhyped R9000 family is an AMATEUR (hobby) product according to ICOM. And they treat software, features, quality and especially customer support as they would for any other HOBBY product. I speak from the point of view of having sold over seven thousand receivers as an ICOM dealer before we got divorced for ethical reasons. For the cost ICOM makes an acceptable receiver. If I were to write code for any serious application, I'd sure pick another platform to support rather than ICOM. But if it's all you can afford, then go for it. The ICOM computer controlled receivers stink, and were released as a knee jerk reaction to the Winradio, not that I endorse Winradio either. I could, except for the people they selected to support it here in the U.S. Yes, we used the PCR-1000 then the PCR-100 in our Beeper Buster pager intercept system. We needed a cheap and simple, single channel, frequency agile computer controlled receiver which was on one circuit board we could replace without tools for ease of maintenance. We bought over 300 of them for integration into government platforms and ICOM wouldn't release the protocols, so we had to hack them. ICOM's R8500 and the discontinued R100 (NOT PCR-100) are the best two radios they've released. The R7000 was and is decent unless you've done any mods to it other than remote the power supply. The R7100 and R9000 are abominations, not worth the freight to ship them. The HF receivers are fair, and not needed with the R8500 covering HF to 2 gigs. The R7100 is full of birdies in the I.F. and worthless for using with a signal monitor. It also had two underrated FETs installed in the VCO. 100% of R7100s will experience those two FETs failing, and replacing them is a job because they're inside a sealed module and the receiver needs a realignment after replacement. ICOM pulled that radio off the market after only a year and a half because they couldn't afford the warranty claims. The R9000 is unserviceable. ICOM never got around to building extender boards or cables for it. You can't align it in realtime. You have to disassemble it, tweak something, reassemble it with all the screws and covers, and see if the tweak improved performance. Repeat x38 adjustments until you get sick of it and say it's 'good enough' and quit. The CRTs in ALL R9000s fail with calendar time as well as operating hours. The Nanao CRTs were made in one run and one run only, and that run had leaky seals around the pins. The CRTs are long extinct, and you can't just replace the CRT by itself. You have to replace the entire CRT assembly, which the last time I bought one (ten years ago) was about $800. The LCD R9000 gets around the CRT problems but not the maintenance problems. And ICOM does not stock components for the R9000, only complete subassemblies. Lose a fifty cent component you can't identify and you get to replace a thousand dollar module. Not a good deal. There are better choices than ICOM to use as the heart of a system. We thrived selling ICOM receivers to NSA. They bought most of them because they were so cheap and we integrated them with a signal monitor and some other accessories designed specifically for NSA by Atlantic Electronics. The receivers NSA bought went into the field for sustained data collection and had an average lifetime of six weeks, so they picked something cheap. NSA long ago declared ICOM PNG due to lack of support after the owner of EEB went to jail and we dropped the line, and they have been using W-J/CEI ever since. We now return you to your regularly scheduled programming. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9506 From: Monty Date: Mon Aug 30, 2004 2:06am Subject: Re: From Cryptome.org 200,000 to 450,000 depending on options --- Mitch D wrote: > Looks like the Gateway laptop w winradio,aor > 3000,and a discone > may have stirred some interest. > > The big question,is how much was the govt going to > get "wopped" > for the "flex"system ??? > > > > --- bernard_stan@y... wrote: > > > 28 August 2004. > > > > NASA has removed this announcement of a TSCM > sole-source > > contract > > award, and asked a mail list to remove the link to > it > > (Cryptome has > > not been contacted). Apparently the announcement > revealed a > > classified TSCM system and provided evaluation of > other TSCM > > systems > > used by the government. NASA, State Department and > the Central > > > > Intelligence Agency were reportedly involved in > contracting > > for the > > system. The system is now likely to be abandoned > due to this > > announcement being published. > > > > > > > > __________________________________ > Do you Yahoo!? > Yahoo! Mail - Helps protect you from nasty viruses. > http://promotions.yahoo.com/new_mail > __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - 100MB free storage! http://promotions.yahoo.com/new_mail 9507 From: Michael Puchol Date: Mon Aug 30, 2004 9:33am Subject: Re: From Cryptome.org > 200,000 to 450,000 depending on options Pffff....argh....balk balk....rash coming up.... 9508 From: Date: Mon Aug 30, 2004 5:20am Subject: Job Posting - TSCM Sales Specialist Homeland Security Strategies, Inc. a wholly owned subsidiary of Security Intelligence Technologies, Inc. Salary: $40,000 - $100,000 Location: United States Type: Full Time – Experienced Career Opportunities in NY, DC, Beverly Hills, Miami, and London. We are seeking persons to sell high tech security and surveillance system products which include: GPS Tracking, Communication Security Monitoring, Surveillance and Countermeasure Systems, RF Monitoring Systems, EOD/Bomb Jamming Systems. Proprietary/exclusive product lines to governments, law enforcement agencies, and security product distributors. Some travel is required. We offer a competitive salary, commission/bonus, stock option, 401(k) and, company benefits. Requirements: Background in military, law enforcement and/or corporate security highly recommended. Second language is a plus. Must have excellent communication and computer skills. International candidates will be considered. Please email resume and cover letter Attention Mr. Baldwin at CCSNYCHQ@A... [Non-text portions of this message have been removed] 9509 From: Merl Klein Date: Mon Aug 30, 2004 10:07am Subject: Re: TSCM Referals Hi Jim My Company, Technical Security Investigations Ltd ( TSI ) Has been incorporated since 1993. TSI Ltd. is solely dedicated to providing speach and communications security to its customers. We do not provide direct IT security support (A field of its own). Through a program of countermeasures inspections and subsequant compliance audits, TSI is able to maintain reasonable levels of communication privacy for our customers. We try our best to keep our activities to Western Canada, but will travel for our corporate customers if they insist. We do 80 to 90 inspections annually and can field 2 teams when nessessary. As the principal in the Company, I bring 30 years service with RCMP to the table. 25 years in technical operations, including the last 12 in charge of the federal countermeasures team in Western Canada. We also do support exhibit analysis for technical files with our expert testimony accepted in 5 jurisdictions. Equipment wise, we use a combination of Audiotel (M-2, and Superbroom Plus) Microtel (PR-700 &902's) Tek, Audiotel,& Homemade Telephone and line analysers (Just can't shake that realtime thing.) Attached find my CV for your perusal. M.H. (Merl) KLEIN Technical Security Investigations Ltd. 928 Alderside Rd. Port Moody, BC Canada V3H 3A6 Phone 604-469-2009, Fax 604-469-1107 E Mail tsi @ telus.net Thanks for the question Jim Merl ----- Original Message ----- From: James M. Atkinson To: TSCM-L Sent: Wednesday, August 25, 2004 11:15 PM Subject: [TSCM-L] TSCM Referals I am interested in increasing the database I have of TSCM folks to whom I can refer sweep work out to, and would be happy hear from list members who offer weep services, and I would be happy to review any resume, document, brochures you may care to send. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 9510 From: Tech Sec Lab Date: Mon Aug 30, 2004 10:12am Subject: RE: Re: ICOM pecularities Steve What would you recommend instead of the not so good as described Icom and WinRadio systems? Cheers -Ois ******************* Message: 9 Date: Sun, 29 Aug 2004 20:22:45 -0400 From: "Steve Uhrig" Subject: Re: ICOM pecularities On 29 Aug 2004 at 14:18, Shawn Hughes (Road) , who eschews obfuscation, wrote: > Yes, isn't that strange??? They have this wonderful software driven > radio system, and they basically code a throwaway ap for it and say, > 'here ya go!' They put more effort into aftermarket stuff for the > lowest - tier 2M ht... ICOM themselves carries ALL their receivers in their amateur line, not their government, commercial, land mobile or any other line. So they're telling you themselves how they classify their receivers. Even the vastly overhyped R9000 family is an AMATEUR (hobby) product according to ICOM. And they treat software, features, quality and especially customer support as they would for any other HOBBY product. I speak from the point of view of having sold over seven thousand receivers as an ICOM dealer before we got divorced for ethical reasons. For the cost ICOM makes an acceptable receiver. If I were to write code for any serious application, I'd sure pick another platform to support rather than ICOM. But if it's all you can afford, then go for it. The ICOM computer controlled receivers stink, and were released as a knee jerk reaction to the Winradio, not that I endorse Winradio either. I could, except for the people they selected to support it here in the U.S. Yes, we used the PCR-1000 then the PCR-100 in our Beeper Buster pager intercept system. We needed a cheap and simple, single channel, frequency agile computer controlled receiver which was on one circuit board we could replace without tools for ease of maintenance. We bought over 300 of them for integration into government platforms and ICOM wouldn't release the protocols, so we had to hack them. ICOM's R8500 and the discontinued R100 (NOT PCR-100) are the best two radios they've released. The R7000 was and is decent unless you've done any mods to it other than remote the power supply. The R7100 and R9000 are abominations, not worth the freight to ship them. The HF receivers are fair, and not needed with the R8500 covering HF to 2 gigs. The R7100 is full of birdies in the I.F. and worthless for using with a signal monitor. It also had two underrated FETs installed in the VCO. 100% of R7100s will experience those two FETs failing, and replacing them is a job because they're inside a sealed module and the receiver needs a realignment after replacement. ICOM pulled that radio off the market after only a year and a half because they couldn't afford the warranty claims. The R9000 is unserviceable. ICOM never got around to building extender boards or cables for it. You can't align it in realtime. You have to disassemble it, tweak something, reassemble it with all the screws and covers, and see if the tweak improved performance. Repeat x38 adjustments until you get sick of it and say it's 'good enough' and quit. The CRTs in ALL R9000s fail with calendar time as well as operating hours. The Nanao CRTs were made in one run and one run only, and that run had leaky seals around the pins. The CRTs are long extinct, and you can't just replace the CRT by itself. You have to replace the entire CRT assembly, which the last time I bought one (ten years ago) was about $800. The LCD R9000 gets around the CRT problems but not the maintenance problems. And ICOM does not stock components for the R9000, only complete subassemblies. Lose a fifty cent component you can't identify and you get to replace a thousand dollar module. Not a good deal. There are better choices than ICOM to use as the heart of a system. We thrived selling ICOM receivers to NSA. They bought most of them because they were so cheap and we integrated them with a signal monitor and some other accessories designed specifically for NSA by Atlantic Electronics. The receivers NSA bought went into the field for sustained data collection and had an average lifetime of six weeks, so they picked something cheap. NSA long ago declared ICOM PNG due to lack of support after the owner of EEB went to jail and we dropped the line, and they have been using W-J/CEI ever since. We now return you to your regularly scheduled programming. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9511 From: Steve Weinert Date: Mon Aug 30, 2004 10:30am Subject: RE: Re: ICOM pecularities Steve U If you are willing to comment, I am wondering what your take on the TenTec line is. I'm considering an RX-340 as an addition, and perhaps you can shed some light onto your experience and what you've heard concerning their products. Thanks in advance! Steve W > -----Original Message----- > From: Tech Sec Lab > Sent: Monday, August 30, 2004 10:13 AM > To: TSCM-L@yahoogroups.com > Subject: RE: [TSCM-L] Re: ICOM pecularities > > > > Steve > > What would you recommend instead of the not so good as described Icom and > WinRadio systems? > 9512 From: Steve Weinert Date: Mon Aug 30, 2004 10:48am Subject: FW: Returned mail: User unknown Could one of the moderators disable the bouncing address? Every time I post to TSCM-L@yahoogroups.com I get this bounce. Rather expect the address will be found in | Members | Bouncing | (Moderators and List Owners get more detail on the member lists) Thanks! Steve W > -----Original Message----- > From: Mail Delivery Subsystem [mailto:MAILER-DAEMON@a...] > Sent: Monday, August 30, 2004 10:31 AM > To: srw > Subject: Returned mail: User unknown > > > The original message was received at Mon, 30 Aug 2004 11:30:46 -0400 (EDT) > from siaag1aj.mx.compuserve.com [149.174.40.25] > > > *** ATTENTION *** > > Your e-mail is being returned to you because there was a problem with its > delivery. The address which was undeliverable is listed in the section > labeled: "----- The following addresses had permanent fatal errors -----". > > The reason your mail is being returned to you is listed in the section > labeled: "----- Transcript of Session Follows -----". > > The line beginning with "<<<" describes the specific reason your > e-mail could > not be delivered. The next line contains a second error message > which is a > general translation for other e-mail servers. > > Please direct further questions regarding this message to your e-mail > administrator. > > --AOL Postmaster > > > > ----- The following addresses had permanent fatal errors ----- > > > ----- Transcript of session follows ----- > ... while talking to air-yj01.mail.aol.com.: > >>> RCPT To: > <<< 550 MAILBOX NOT FOUND > 550 ... User unknown > 9513 From: James M. Atkinson Date: Mon Aug 30, 2004 11:27am Subject: Re: FW: Returned mail: User unknown Done At 11:48 AM 8/30/2004, Steve Weinert wrote: >Could one of the moderators disable the bouncing address? Every time I post >to TSCM-L@yahoogroups.com I get this bounce. > >Rather expect the address will be found in | Members | Bouncing | >(Moderators and List Owners get more detail on the member lists) > >Thanks! > >Steve W ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9514 From: Hawkspirit Date: Mon Aug 30, 2004 0:04pm Subject: Systemware Inc. CONTACT INFORMATION Systemware Inc Address: 325 East Hillcrest Dr Suite 100 Thousand Oaks, CA (USA) 91360 Phone: 805.497.9603 Fax: 805.494.9719 Company Website: www.sysware.com TSCM Dragon - a complete solution for comprehensive detection of RF signals. It has been developed for the specific needs of commercial entities and enforcement agencies that need to detect and monitor radio-frequency (RF) devices and signals in order to maintain the highest levels of security. TSCM Dragon eliminates potential threats to the security, secrecy and ownership of your intellectual property. SystemWare, Inc is a leading provider of radio-frequency (RF) signal collection and analysis systems to governments, military and intelligence agencies around the globe. Using its core technologies, SystemWare launched the TSCM Dragon product line to *State and local homeland security *Banks, brokerages and other financial institutions *Computer hardware and software companies *Biotechnology, pharmaceutical and healthcare companies *Legal firms *Corporations with valuable intellectual property to protect By Integrating industry-standard, state-of-the-art monitoring and communications components with the world-class SystemWare software suite, SystemWare delivers the best performance available to commercial entities and law enforcement agencies like yours - at a price you can afford. Some of the benefits of TSCM Dragon include: *Rapid detection of radio-frequency(RF) signal *Stationary and/or portable solution *Control of most receivers or spectrum analyzers *Utmost flexibility and power to investigate any signal found *Fastest commercially available RF sweeps [Non-text portions of this message have been removed] 9516 From: Andy Cuff Date: Mon Aug 30, 2004 0:58pm Subject: Getting Equipped Hi, This is a long one, the end result will be a website detailing all TSCM vendors Some of you may have noticed my post of a few weeks back enquiring about hiring TSCM equipment, I've had various responses which were mainly negative. The general feeling was I'm just a hobbyist wanting to try something that sounds exciting. If I was serious then I would either already have the equipment or I wouldn't hesitate in making the purchase. I have many years experience with TSCM, however, IT security has been my main concern over the last few years though I have kept up to speed with spread spectrum and frequency agile devices. I'm coming out of the Public Sector, setting up my own business, this is why I have the experience but not the equipment. I also have to hand quite a few guys who also have the same skills and experience wanting to work for me as freelance consultants. When I set up the business my main thrust has been IT security, though I do see a niche to be exploited in extending the services to include TSCM. Currently I outsource TSCM. At the end of the day I wanted to ensure a good ROI if I were to purchase all the equipment required. Hence my desire to initially hire until I scope the requirement for these services in the Private Sector. As the enquiries regarding TSCM have been coming thick and fast (due in part to an excellent Google ranking) I have started investigating the purchase of equipment, even sacrificing the new Ducati that I have promised myself over the last 23 years of "service" I've always had my kit imposed upon me and despite 2 emails and a phonecall cannot get my usual UK vendors to respond, so as I'm going to investigate other sources I thought I might as well create a TSCM category on my website and offer the information to one and all.. CATEGORIES I was thinking of listing products in the following categories, please recommend changes Spatial Scanners Line and Mains Scanners NLJD As soon as we agree on the categories I will upload the pages and start populating them. Thoughts? -andy cuff Talisker's Computer Security Portal Computer Network Defence Ltd http://www.securitywizardry.com 9517 From: James M. Atkinson Date: Mon Aug 30, 2004 11:54pm Subject: Rolls Surrette 8D and Tripp-Lite Inverted/Charger Systems For Sale I have *** NEW *** Rolls Surrette 8D batteries, and 2400/4800 watt inverter/charger suitable for vehicle mounting. These are extremely tough to find, and are very, very desirable. These are huge Rolls 12HHG-8D "Big Red" Deep Cycle Wet Cell Marine Batteries, and weigh almost 200 pounds each. The factory rates these at 1155 cold cranking amps, but mariners frequently can squeeze 1400-1500 amps out of them in the engine room. These are the finest batteries available, and the ones that commercial fisherman working the arctic seas and north Atlantic use. The batteries come with a 7 year factory warranty, and are the highest grade available. These batteries have to breath, so ensure that there is good ventilation to the outside of the vehicle, and run Teflon lines from the two drains on the bottom of each battery cases in case you boil-off the electrolyte. This batteries have a hinged battery cap, and an over-sized watering port. The inverter/chargers are the Tripp-Lite APS2448, 48 volt/120 volt units. The 48 volt units are desirable as you run four batteries in series instead of parallel which reduces the vampire effect between batteries. Essentially, you hook up four batteries (4 * 13.8 volts) in series with the inverter, then connect the inverter input to either a generator or 120 volt vehicle umbilicus. If the power coming into the inverter dies the batteries kick in so that your equipment never feel the interruption. These work great with generators such as the Honda EU-3000, but if you want to run equipment AND charge the batteries you will need about 60 amps of AC at 120 volts (use tandem gen-sets). Normally you would use these with a 30 amp twist lock inlet, or something heavier to charger the batteries, then use a standard NEMA 15-3 inlet to keep them topped off and to connect to shore power when in the field. These are great for sweep vehicles, and vehicles where you have to run a ton of electronics in a small space and may not be able to use outside power. Without the use of gen-sets and outside power one of these systems can run 1000-1500 watts of 120 volt equipment for extremely long periods (several days). Be sure to duct the heat from the inverter to the outside of the vehicle or things will get unbearable in the summer, but comfortably toasty in the winter (vent the heat into the vehicle in the winter). The hydrogen from the batteries also has to be vented outside the vehicle, and back sure these beasts are well bolted down as you don't want thousands of amps contacting conductive parts of your vehicles. I will include 50 feet of 2/3 and 50 feet of 8/3, plus a L14-30 30 amp twist-lock inlet and a L14-50 50 amp twist-lock inlet. You will have to supply the rest of the wiring, and I STRONGLY suggest that you only have one of these beasts installed by an experienced electrician familiar with vehicle and marine wiring. Everything has to be hard-wired I am offering four batteries, four heavy duty plastic shock mounted battery cases with drains, 20 feet of 3/8 teflon tubing, a set of heavy cables with paste and spray, remote control, remote digital 2000 amp shunt and auto-ranging ampmeter in a panel mount, and the inverter with remote control as a package for $5250, plus the cost of freight. These have to be shipped by truck as hazardous freight, and each system will be shipped on a two pallets. I have 8 complete systems available on hand at this price. I am also offering these systems to some of the local commercial fishing boats, so these systems may not be available for long. If you want to increase your capacity I can also sell additional "Big Red" batteries with boxes, drains, and cables for $2100 per set of four, but I do not suggest running more than 16 batteries/4 banks total on a single system (22-25,000 amps at 12 volts, and weighing over 3200 pounds) -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9518 From: James M. Atkinson Date: Tue Aug 31, 2004 0:15am Subject: Re: From Cryptome.org $200k-450k... is that in Yen? Labview with mods, National Instruments PCI/DA controller sub-controler, R&S FSH3 and Microwave Miniport, perhaps a nanocepter, a handful of antennas, and computer controlled cable switch. I would invite the Systemware folks on the list to make some posts concerning their system, so that the list can discuss in more detail. -jma At 03:06 AM 8/30/2004, Monty wrote: >200,000 to 450,000 depending on options > >--- Mitch D wrote: > > > Looks like the Gateway laptop w winradio,aor > > 3000,and a discone > > may have stirred some interest. > > > > The big question,is how much was the govt going to > > get "wopped" > > for the "flex"system ??? > > > > > > > > --- bernard_stan@y... wrote: > > > > > 28 August 2004. > > > > > > NASA has removed this announcement of a TSCM > > sole-source > > > contract > > > award, and asked a mail list to remove the link to > > it > > > (Cryptome has > > > not been contacted). Apparently the announcement > > revealed a > > > classified TSCM system and provided evaluation of > > other TSCM > > > systems > > > used by the government. NASA, State Department and > > the Central > > > > > > Intelligence Agency were reportedly involved in > > contracting > > > for the > > > system. The system is now likely to be abandoned > > due to this > > > announcement being published. > > > > > > > > > > > > > > > __________________________________ > > Do you Yahoo!? > > Yahoo! Mail - Helps protect you from nasty viruses. > > http://promotions.yahoo.com/new_mail > > > > > > > >__________________________________ >Do you Yahoo!? >New and Improved Yahoo! Mail - 100MB free storage! >http://promotions.yahoo.com/new_mail > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9519 From: savanted1 Date: Tue Aug 31, 2004 2:25pm Subject: The Basics of RFID This tutorial provides the layman with the basic knowledge needed to understand what radio frequency identification (RFID) is about. http://star-techcentral.com/tech/story.asp? file=/2004/8/24/corpit/8707960&sec=corpit 9520 From: James M. Atkinson Date: Tue Aug 31, 2004 4:13pm Subject: Ad Majorem Dei Gloriam I would like to give away free copies of the recently released movie "The Passion of the Christ" to those members of my TSCM-L list who would like a copy, AND who will promise to watch it. No sales gimmicks, no games, no kidding, no fooling, no tie ins, no strings, no payday, no gratuity, no favors, no preaching, nadda. All I ask is that you watch the movie, nothing more. Please email me your address privately if you would like a free copy, and I will have it shipped right to your door from Amazon.com. Be sure to mention if you prefer a DVD or VHS copy, if no preference is given I will assume you want a DVD. I have to ask that you only request one copy, and that the address to which it ships be limited to either the U.S. or Canada (the DVD will not play outside of those regions). This is my gift to members of the list, and I expect nothing in return. Ad Majorem Dei Gloriam -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9521 From: Shawn Hughes (Road) Date: Tue Aug 31, 2004 3:02pm Subject: Re:Mr. siaaag Steve, I was getting the EXACT same thing. Did a week of research, could NOT figure that out. Since noone else complained, I thought it was specific to me.... -Shawn At 03:46 PM 8/31/04 +0000, you wrote: > > The original message was received at Mon, 30 Aug 2004 11:30:46 -0400 (EDT) > > from siaag1aj.mx.compuserve.com [149.174.40.25] 9522 From: A Grudko Date: Wed Sep 1, 2004 0:50am Subject: RE: Bluetooth -----Original Message----- From: George Shaw [mailto:george.shaw@u...] > For those that have not heard of the perils of Bluetooth... Very handy -look Ma no Wires ? Bluetooth is yet another wireless technology that can be "snooped", unfortunately. They are being supplied to technically inept customers who expect them to work "out of the box" without regard to the security and will promptly return them,,, or send them back as ' not working'. Imagine buying a new 'phone at Dixons in Heathrow, together with a jabra earset to find no operation, to then have to wade through a 101 page manual whilst holding all your other Cabin Clutter,,, So to stay credible in the eyes of the sales returns critics, the manufacturers have to supply the units with bluetooth "switched on" Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.744 / Virus Database: 496 - Release Date: 2004/08/24 [Non-text portions of this message have been removed] 9523 From: Date: Wed Sep 1, 2004 3:17am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 9524 From: Date: Wed Sep 1, 2004 3:17am Subject: File - spec-ang-2200.pdf File : spec-ang-2200.pdf Description : ANG-2200 Dual Channel Noise Generator Attachment: (application/pdf) spec-ang-2200.pdf [not stored] 9525 From: Date: Wed Sep 1, 2004 3:17am Subject: File - specs-CPM700.pdf File : specs-CPM700.pdf Description : CPM-700 Spec Sheet Attachment: (application/pdf) specs-CPM700.pdf [not stored] 9526 From: Date: Wed Sep 1, 2004 3:17am Subject: File - spec-cpm700-deluxe.pdf File : spec-cpm700-deluxe.pdf Description : CPM-700 DELUXE Spec Sheet Attachment: (application/pdf) spec-cpm700-deluxe.pdf [not stored] 9527 From: Date: Wed Sep 1, 2004 3:17am Subject: File - specs-OSCOR.pdf File : specs-OSCOR.pdf Description : OSCOR Spec Sheet Attachment: (application/pdf) specs-OSCOR.pdf [not stored] 9528 From: Date: Wed Sep 1, 2004 3:17am Subject: File - specs-ORION.pdf File : specs-ORION.pdf Description : ORION Spec Sheet Attachment: (application/pdf) specs-ORION.pdf [not stored] 9529 From: Steve Whitehead Date: Wed Sep 1, 2004 3:55am Subject: Re: File - spec-ang-2200.pdf Is this really necessary? ----- Original Message ----- From: To: Sent: Wednesday, September 01, 2004 10:17 AM Subject: [TSCM-L] File - spec-ang-2200.pdf > > > File : spec-ang-2200.pdf > Description : ANG-2200 Dual Channel Noise Generator > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > From: Michael Puchol Date: Wed Sep 1, 2004 4:17am Subject: Re: File - spec-ang-2200.pdf I second that - receiving the SAME huge documents every month is not really necessary IMHO, I think I already mentioned it on a previous occasions. The mission & gold list files are fine, but receiving these specs, which I'm sure all of us have, or know where to get from if required, is over the top. Could the admin kindly get them off the auto-send-evey-month list and store them in the files area? Regards, Mike ----- Original Message ----- From: "Steve Whitehead" To: Sent: Wednesday, September 01, 2004 10:55 AM Subject: Re: [TSCM-L] File - spec-ang-2200.pdf > > Is this really necessary? > > > ----- Original Message ----- > From: > To: > Sent: Wednesday, September 01, 2004 10:17 AM > Subject: [TSCM-L] File - spec-ang-2200.pdf > > > > > > > > File : spec-ang-2200.pdf > > Description : ANG-2200 Dual Channel Noise Generator > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 9531 From: Tech Sec Lab Date: Wed Sep 1, 2004 8:05am Subject: Mobile Security Does anyone know exactly what type of encryption tech they want to implmenent....point to point or just self system security....? ***** Nokia goes security crazy Two new standards to save us from Microsoft. By Ephraim Schwartz and John Blau, InfoWorld Click here to find out more! Nokia is putting its weight between two new security standards for mobile devices in the hope of attracting businesses to its products and away from Microsoft. It has signed up with Pointsec Mobile Technologies to develop encryption technology for smart phones based on its Nokia Series 60 and 80 models, which run on Symbian. It has also announced it will work with Vodafone in creating a new spec for an open standards-based mobile Java services architecture. According to Bob Egan, principal analyst with Mobile Competency, although Microsoft laid down the gauntlet by stating unequivocally that Java is not the way to go on mobile, Sun disappointed many by not acting as Java evangelist. "Nokia has stepped up and said we will help everybody stage this battle. This announcement shows that they will continue to invest and do deals with Java," Egan said. Although the Nokia/Vodafone initiative won't introduce any new API specifications, it aims to establish a number of new component Java Specification Requests and clarifications to existing specifications so a consistent Java API services architecture is defined, according to the companies. This will enable Java applications to run on mobile devices from different companies. That architecture will also include security enhancements for services, such as software components dowloaded to mobile devices. Security is also behind the Pointsec agreement. As the first cell phone manufacturer to be hacked, Nokia wants to polish its security image, Egan said. "The minute you move up to more capable handsets and higher computing power and more applications that will attract the business market, you have to be thinking about security, and with thehacking incident that happened, encryption has to be high on the list," Egan said. The encryption technology provides the same security as desktop PCs, claimed Pekka Isosomppi, a spokesperson for Nokia's Enterprise Solutions division, and prevents unauthorised people from accessing stored data in a lost or stolen device. It is clear Nokia has its gun sites set on Microsoft. "They want to be the mobile equivalent of Windows," said Egan. 9532 From: Tech Sec Lab Date: Wed Sep 1, 2004 1:28pm Subject: RE: Ad Majorem Dei Gloriam [OT] Hmmpphhh....once again the international list members are told that Santa will not be coming this year!! :P ***** Message: 2 Date: Tue, 31 Aug 2004 17:13:45 -0400 From: "James M. Atkinson" Subject: Ad Majorem Dei Gloriam I would like to give away free copies of the recently released movie "The Passion of the Christ" to those members of my TSCM-L list who would like a copy, AND who will promise to watch it. No sales gimmicks, no games, no kidding, no fooling, no tie ins, no strings, no payday, no gratuity, no favors, no preaching, nadda. All I ask is that you watch the movie, nothing more. Please email me your address privately if you would like a free copy, and I will have it shipped right to your door from Amazon.com. Be sure to mention if you prefer a DVD or VHS copy, if no preference is given I will assume you want a DVD. I have to ask that you only request one copy, and that the address to which it ships be limited to either the U.S. or Canada (the DVD will not play outside of those regions). This is my gift to members of the list, and I expect nothing in return. Ad Majorem Dei Gloriam -jma 9533 From: dj Date: Wed Sep 1, 2004 1:14pm Subject: Anyone an ASIS member ? If so please email me at navyguyinil@y... __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com [Non-text portions of this message have been removed] 9534 From: Andy Cuff Date: Wed Sep 1, 2004 2:38pm Subject: TSCM - Product Categories Hi, In order to build a portal of TSCM products, I need to categorise them. I did post the other day but I suspect the mail was too long to raise any interest. So what am I missing, or what should I amend Spatial Scanners Line/Mains Scanners Non Linear Junction Detectors What would you add, or what categories should be divided to give a more granular presentation? cheers -andy cuff Talisker's Computer Security Portal Computer Network Defence Ltd http://www.securitywizardry.com 9535 From: Steve Uhrig Date: Wed Sep 1, 2004 3:15pm Subject: Re: TSCM - Product Categories On 1 Sep 2004 at 20:38, Andy Cuff, www.securitywizardry.com, who eschews obfuscation, wrote: > So what am I missing, or what should I amend > Spatial Scanners > Line/Mains Scanners > Non Linear Junction Detectors You're missing the basics. What do you have (rhetorical question) for detecting a simple attack on telephone lines, which are by far the greatest threats? You mention nonlinear junction tests. Do you have the ability to do a line balance test? List that. RF is glamourous, and gets the attention, the marketing money and consequential sales. But it's a comparatively low level threat. The majority of threats are to telephones/copper. Don't overlook that. Forget the buzzwords and fancy terms. It doesn't impress clients and doesn't impress peers. Start at the beginning. Don't jump over what should be a lifetime of ongoing learning and expect to land on your feet (general observation). You're trying to sell to non-technoweenies, so write your site so they can understand it. You're not writing to yourself, or to your peers. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9536 From: lfelia Date: Wed Sep 1, 2004 4:03pm Subject: Re: Compromised Cryptographic Hash Functions I have tried this mingp implementation and I have been having trouble with it. Can anyone help? 9537 From: Andy Cuff Date: Wed Sep 1, 2004 4:55pm Subject: Re: Re: TSCM - Product Categories Hi Steve, Thanks for your response. I fully understand that lines present a great threat hence I included "line/mains scanners" The term scanner doesn't necessarily mean RF. I'm not trying to sell to anyone, I'm looking to offer a portal where anyone can see what is available weenie or not. As for glamour, it may look like a glamorous job, but it's physically and mentally draining and let's be honest at times tedious. RF sweeps are still effective at locating Quick Plant Devices (QPD's) -andy Talisker's Computer Security Portal Computer Network Defence Ltd http://www.securitywizardry.com ----- Original Message ----- From: "Steve Uhrig" To: Sent: Wednesday, September 01, 2004 9:15 PM Subject: [TSCM-L] Re: TSCM - Product Categories > On 1 Sep 2004 at 20:38, Andy Cuff, www.securitywizardry.com, who eschews obfuscation, wrote: > > > So what am I missing, or what should I amend > > > Spatial Scanners > > Line/Mains Scanners > > Non Linear Junction Detectors > > You're missing the basics. > > What do you have (rhetorical question) for detecting a simple attack on > telephone lines, which are by far the greatest threats? > > You mention nonlinear junction tests. Do you have the ability to do a > line balance test? List that. > > RF is glamourous, and gets the attention, the marketing money and > consequential sales. But it's a comparatively low level threat. > > The majority of threats are to telephones/copper. > > Don't overlook that. > > Forget the buzzwords and fancy terms. It doesn't impress clients and > doesn't impress peers. Start at the beginning. Don't jump over what > should be a lifetime of ongoing learning and expect to land on your feet > (general observation). > > You're trying to sell to non-technoweenies, so write your site so they > can understand it. You're not writing to yourself, or to your peers. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9538 From: James M. Atkinson Date: Wed Sep 1, 2004 6:02pm Subject: Abbott Computer Store Abbott Computer Store COSTELLO CALLS TO BUY A COMPUTER FROM ABBOTT . . . . ABBOTT: Super Duper computer store. Can I help you? COSTELLO: Thanks.I'm setting up an office in my den and I'm thinking about buying a computer. ABBOTT: Mac? COSTELLO: No, the name's Lou. ABBOTT: Your computer? COSTELLO: I don't own a computer.I want to buy one. ABBOTT: Mac? COSTELLO: I told you, my name's Lou. ABBOTT: What about Windows? COSTELLO: Why? Will it get stuffy in here? ABBOTT: Do you want a computer with Windows? COSTELLO: I don't know. What will I see when I look in the windows? ABBOTT: Wallpaper. COSTELLO: Never mind the windows.I need a computer and software. ABBOTT: Software for Windows? COSTELLO: No. On the computer! I need something I can use to write proposals, track expenses and run my business. What have you got? ABBOTT: Office. COSTELLO: Yeah, for my ! office. Can you recommend anything? ABBOTT: I just did. COSTELLO: You just did what? ABBOTT: Recommend something. COSTELLO: You recommended something? ABBOTT: Yes. COSTELLO: For my office? ABBOTT: Yes. COSTELLO: OK, what did you recommend for my office? ABBOTT: Office. COSTELLO: Yes, for my office! ABBOTT: I recommend Office with Windows. COSTELLO: I already have an office with windows! OK, lets just say I'm sitting at my computer and I want to type a proposal. What do I need? ABBOTT: Word. COSTELLO: What word? ABBOTT: Word in Office. COSTELLO: The only word in office is office. ABBOTT: The Word in Office for Windows. COSTELLO: Which word in office for windows? ABBOTT: The Word you get when you click the blue "W". COSTELLO: I'm going to click your blue "w" if you don't start with some straight answers. OK, forget that. Can I watch movies on the Internet? ABBOTT: Yes, you want Real One. COSTELLO: Maybe a real one, maybe a cartoon. What I watch is none of your business. Just tell me what I need! ABBOTT: Real One. COSTELLO: If it's a long movie I also want to see reel 2, 3 & 4. Can I watch them? ABBOTT: Of course. COSTELLO: Great! With what? ABBOTT: Real One. COSTELLO: OK, I'm at my computer and I want to watch a movie. What do I do? ABBOTT: You click the blue "1". COSTELLO: I click the blue one what? ABBOTT: The blue "1". COSTELLO: Is that different from the blue w? ABBOTT: The blue "1" is Real One and the blue "W" is Word. COSTELLO: What word? ABBOTT: The Word in Office for Windows. COSTELLO: But there's three words in "office for windows"! ABBOTT: No, just one. But it's the most popular Word in the world. COSTELLO: It is? ABBOTT: Yes, but to be fair, there aren't many other Words left. It pretty much wiped out all the other Words out there. COSTELLO: And that word is real one? ABBOTT: Real One has nothing to do with Word. Real One isn't even part of Office. COSTELLO: STOP! Don't start that again. What about financial bookkeeping? You have anything I can track my money with? ABBOTT: Money. COSTELLO: That's right. What do you have? ABBOTT: Money. COSTELLO: I need money to track my money? ABBOTT: It comes bundled with your computer COSTELLO: What's bundled with my computer? ABBOTT: Money. COSTELLO: Money comes with my computer? ABBOTT: Yes. No extra charge. COSTELLO: I get a bundle of money with my computer? How much? ABBOTT: One copy. COSTELLO: Isn't it illegal to copy money? ABBOTT: Microsoft gave us a license to copy money. COSTELLO: They can give you a license to copy money? ABBOTT: Why not? THEY OWN IT! A FEW DAYS LATER . . ABBOTT: Super Duper computer store. Can I help you? COSTELLO: How do I turn my computer off? ABBOTT: Click on "START".......... ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9539 From: A Grudko Date: Thu Sep 2, 2004 2:19am Subject: RE: Nokia goes security crazy Sent: 01 September 2004 15:59 > Nokia goes security crazy Two new standards to save us from Microsoft. Does any one know if Nokia uses CPUís from Texas Instruments ? Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.749 / Virus Database: 501 - Release Date: 2004/09/01 [Non-text portions of this message have been removed] 9540 From: Tech Sec Lab Date: Thu Sep 2, 2004 7:26am Subject: PTT/CDMA Interception La norme GSM plus pratique pour intercepter les services "push-to-talk" Par Christophe Guillemin ZDNet France Vendredi 27 ao˚t 2004 Les communications en "push-to-talk" sur tÈlÈphones mobiles posent des problËmes díÈcoute aux grandes oreilles amÈricaines, du fait de la norme CDMA utilisÈe. Ce qui ne sera pas le cas en France, comme dans le reste de l'Europe, avec le GSM. Attendus ‡ l'automne en France, les services de tÈlÈphonie mobile en "push-to-talk" (PTT), sorte de talkie-walkie sur mobile avec possibilitÈ de rÈaliser des confÈrences, sont au cúur d'un polÈmique outre-Atlantique. Les forces de l'ordre, ‡ commencer par le FBI, s'inquiËtent du fait que ces communications rendent trËs compliquÈes les interceptions, c'est-‡-dire ‡ la possibilitÈ lÈgale d'Ècouter les conversations. Les services de push-to-talk proposÈs au public amÈricain, certains depuis 2003, par les plus grands opÈrateurs du marchÈ ñ Verizon Wireless, Sprint, AT&T Wireless ou Nextel ñ Èchappent ‡ ce type de contrÙle et sont donc considÈrÈs par les autoritÈs comme autant de zones de non-droit. DÈbut ao˚t, aprËs insistance du FBI, le rÈgulateur amÈricain chargÈ des tÈlÈcommunications, la Federal Communications Commission (FCC) a bien confirmÈ que les technologies PTT tombaient sous le coup de la loi de 1994 sur les Ècoutes lÈgales ("Communications Assistance for Law Enforcement Act", ou CALEA). RÈsultat, la police fÈdÈrale, a demandÈ aux diffÈrents fournisseurs de ce type de services de proposer des solutions techniques qui seront dÈvoilÈes dans les mois ‡ venir, comme le rapporte notre rÈdaction amÈricaine. Les Ècoutes possibles en France chez Orange Dans l'Hexagone, Orange devrait Ítre le premier opÈrateur ‡ lancer un service de push-to-talk dËs cet automne. L'opÈrateur est conscient des problËmes rencontrÈs par ses confrËres amÈricains. ´Effectivement, les systËmes push-to-talk aux …tats-Unis peuvent engendrer un incapacitÈ ‡ intercepter et surveiller les discussionsª, indique ‡ ZDNet un porte-parole de l'opÈrateur mobile de France TÈlÈcom. ´Mais ils utilisent des technologies diffÈrentes des nÙtres, comme par exemple la norme iDEN (*) chez Nextel, et des dÈrivÈs de voix sur IP chez les autres opÈrateursª, poursuit-il. Le procÈdÈ de voix sur IP (VoIP) permet la transmission de la voix numÈrisÈe sur un rÈseau au protocole internet. Une mÈthode utilisable aussi en tÈlÈphonie mobile mais sur la partie du rÈseau rÈservÈe ‡ l'Èchange de donnÈes. Les services d'AT&T et consorts sont ainsi disponibles uniquement via les forfaits "data". ´En Europe, c'est le format GSM qui domine, et il est suffisamment ÈvoluÈ pour ne pas avoir ‡ passer par la VoIP. Le GSM permet [par essence] la traÁabilitÈ et l'interception des appelsª, poursuit notre interlocuteur d'Orange. La solution "Talk Now" de l'opÈrateur mobile sera donc au format GSM et permettra aux services compÈtents d'opÈrer des Ècoutes. Le tout selon la procÈdure habituelle, avec notamment, pour les Ècoutes administratives (et non judiciaires), l'avis de la Commission nationale de contrÙle des interceptions (CNCIS). Pour autant, le choix d'Orange ne sera pas celui de tous les opÈrateurs europÈens. L'Èquipementier Alcatel a ainsi dÈvoilÈ en avril dernier une solution de PTT en mode VoIP. Elle est censÈe offrir aux opÈrateurs ´une nouvelle source de revenus pour les services de Voix sur IP (...) et de valoriser ‡ moindre co˚t leurs rÈseaux GPRS existantsª, indique-t-il dans un communiquÈ. Mais le groupe franÁais ne prÈcise pas que ce systËme rendra les Ècoutes plus compliquÈes. Reste que la loi exige dÈj‡ que les Èquipementiers mettent sur le marchÈ des appareils compatibles avec les interceptions, comme ce fut le cas lors du lancement des premiers services de tÈlÈphonie par satellite (comme Irridium), au milieu des annÈes 90. ContactÈ par ZDNet, Alcatel n'a pas retournÈ nos appels sur le sujet. Un seul utilisateur ‡ la fois Le service d'Orange sera d'abord proposÈ aux professionnels, puis au grand public. Aucun tarif n'est encore disponible. Il suffira, comme pour les autres services de push-to-talk, d'appuyer sur un bouton du terminal pour entrer en communication avec un ou plusieurs correspondants. Comme pour les messageries instantanÈes, ces derniers figurent dans une liste d'amis, et l'utilisateur voit en temps rÈel ceux qui sont joignables ou non. Il peut les appeler un par un, envoyer un message vocal ‡ plusieurs correspondants ou mÍme crÈer une confÈrence tÈlÈphonique. Seule restriction, de taille, comme pour les talkies-walkies, le canal de communication ne peut Ítre empruntÈ que par un seul utilisateur. C'est donc ‡ chacun son tour de parler. (*) Aux …tats-Unis la norme de tÈlÈphonie mobile dominante est le CDMA (Code Division Multiple Access), puis dans une moindre mesure le GSM 1900 MHz et l'iDEN 800 MHz. Cette derniËre est utilisÈe quasi exclusivement par lí opÈrateur Nextel. En Europe, les deux normes adoptÈes sont le GSM 900 et GSM 1800 MHz. Des rÈseaux CDMA sont cependant attendus sur le Vieux Continent. 9541 From: Steve Uhrig Date: Thu Sep 2, 2004 11:19am Subject: Privacy Expert Consultants needed by US Gov't Social inSecurity Administration: http://www.eps.gov/spg/SSA/DCFIAM/OAG/SSA-RFP-04-1068/SynopsisP.html Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9542 From: Glen True Winstein Date: Wed Sep 1, 2004 4:18pm Subject: Re: Ad Majorem Dei Gloriam Dear Mr. Atkinson: I would very much like to see a DVD of "The Passion of Christ." I studied the Bible, and many related dictionaries, archeology books, etc., a lot in my mid-twenties, and a bit since then; I'm nearly 50 now. I think I could write a book about the deceptions of the JW cult better than the ones I read, too. I'm not a TSCM expert, though, just a victim of some illegal misuse of spy ware stuff, and an ongoing disturbance of the peace prank, trying to figure out what to do about it besides record the sounds (which doesn't prove the source of them) and hearing the people I know to go to saying they don't do surveillance. I'm on SSI, and $2,500 for a sweep and search is kind of dear right now--it's a lot dear right now. I'm on the mailing list seeing if I can glean some kind of information that could help. If that's OK, I'd enjoy seeing the movie very much. Glen T. Winstein 1014 Sheffield St. Apt. 1104 Pittsburgh, PA 15233 carolw_15106@y... "James M. Atkinson" wrote: I would like to give away free copies of the recently released movie "The Passion of the Christ" to those members of my TSCM-L list who would like a copy, AND who will promise to watch it. No sales gimmicks, no games, no kidding, no fooling, no tie ins, no strings, no payday, no gratuity, no favors, no preaching, nadda. All I ask is that you watch the movie, nothing more. Please email me your address privately if you would like a free copy, and I will have it shipped right to your door from Amazon.com. Be sure to mention if you prefer a DVD or VHS copy, if no preference is given I will assume you want a DVD. I have to ask that you only request one copy, and that the address to which it ships be limited to either the U.S. or Canada (the DVD will not play outside of those regions). This is my gift to members of the list, and I expect nothing in return. Ad Majorem Dei Gloriam -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? Win 1 of 4,000 free domain names from Yahoo! Enter now. [Non-text portions of this message have been removed] 9543 From: Gerald Date: Thu Sep 2, 2004 2:11am Subject: The FBI's 'Magic Lantern' keystroke logger Snoopware: New Technologies, Laws Threaten Privacy The FBI's 'Magic Lantern' keystroke logger could help catch terrorists, but at what cost to your fundamental rights? Kim Zetter From the March 2002 issue of PC World magazine They say the first casualty of war is truth. In the digital age, however, the initial victim may be the right to privacy for many Americans--criminals and innocent suspects alike. Last November, the FBI acknowledged the existence of Magic Lantern, a Trojan horse program it is developing that will render encryption useless on a suspect's computer by logging the user's keystrokes. Coupled with laws that Congress passed following September 11th, Magic Lantern will give the agency unprecedented access to digital communications. But is the government using the fight against terrorism as an excuse to gain long-sought surveillance powers, or is it merely trying to keep pace with tech-savvy criminals? Genie in a Bottle Magic Lantern reportedly will allow an agent to plant a keystroke logger in a specific computer by using a virus-like program. Once activated, the logger will capture words and numbers as a subject types them (before encryption kicks in), and will transmit them back to the agent. Privacy advocates say the as-yet-undeployed program is the government's attempt to obviate a bid (so far unsuccessful) to collect master keys from encryption software vendors, which would have let officers unscramble a suspect's data. "The government wants to be able to get into people's computers-- that's the surveillance agenda," says Jim Dempsey, deputy director of the Center for Democracy and Technology. "Any capability that lets them [the government] do that, they will seek." The FBI says it needs such tools to combat criminals. "In many ways law enforcement is playing catch-up," says FBI spokesperson Paul Bresson. "It's no secret that criminals and terrorists are exploiting technology to further crime. The FBI is not asking for any more than to continue to have the ability to conduct lawful intercepts of criminals and terrorists," Bresson argues. Dempsey says the program goes too far, however. More than just getting into your data, he says, it lets the FBI get "into your brain." "The program would not only capture messages you sent, it would capture messages that you wrote but never sent--things that perhaps you thought were a bad idea and [deleted]. This is the government using the Internet to get into people's houses and into their minds." Knock, Knock At issue is the fundamental right the Fourth Amendment grants citizens to prior notice when the government conducts a search and seizure. "In order for the government to seize your diary or read your letters, they have to knock on your door with a search warrant," Dempsey explains. "But [this tool] would allow them to seize these without notice." Most privacy advocates say it's not the technology that worries them, but the lack of judicial oversight in its use. Jennifer Granick, director of Stanford Law School's Center for Internet and Society, says she doesn't object to the FBI's using such tools, but she says she worries about misuse. "Advances in technology may require new law enforcement techniques," Granick notes. "These tools, if properly used within the system of checks and balances, may work, and then we can embrace them." But, Granick says, the same privacy protections that apply everywhere else should also apply in the digital world. The Patriot Act, passed by Congress in October 2001, weakens those protections in two major ways, says the Center for Democracy's Dempsey. The Act lets law enforcement agencies conduct surveillance under looser rules previously applicable only to foreign intelligence cases, he says. It also broadens law enforcement's ability to intercept Internet transactional data such as e-mail addresses. And while the act aims to assist in "terrorist" investigations, its surveillance provisions are not limited to that area, according to Dempsey. Critics say they're also concerned that talk likening hackers to terrorists could lead to investigations of innocent PC owners when hackers surreptitiously commandeer their PCs to launch Internet attacks against government sites. Appeasing Critics To allay such concerns, Barry Steinhardt, associate director of the American Civil Liberties Union, wants the FBI to open Magic Lantern-- and any other similar program it creates--to congressional and independent review prior to its deployment. "We still don't know whether Carnivore has been used in the way it's suppose to be used," he says. Carnivore, a controversial tool the FBI uses to collect e-mail passing through the servers of Internet service providers, is supposed to pick up only e-mail messages relevant to an investigation (see January's Consumer Watch for more information). But critics say that there is little oversight to ensure that the FBI uses the tool appropriately. And Dempsey says that a keystroke logger--with its unlimited access possibilities--offers even more opportunity for abuse by over-eager law enforcement officials. Still, the primary concern of most critics is the legislative carte blanche that the Patriot Act seems to give the FBI for conducting its investigations. Though there has been talk on the Senate Judiciary Committee about "fixing" the Patriot Act, the ACLU's Steinhardt says we'll probably have to wait some 18 months to see how the Act plays out in court cases before there will be any movement to change it. In the meantime, he says, "People should contact members of Congress to get them to take their oversight responsibilities seriously." http://www.pcworld.com/news/article/0,aid,78070,00.asp Gerald 9544 From: James M. Atkinson Date: Fri Sep 3, 2004 7:53am Subject: Re: Getting Equipped Andy, Your best ROI (return on investment) is on your basic test equipment and hand tools, and you should spare no expense on these items. Buy the best, most reliable, and most accurate Oscilloscopes, digital voltmeters, LCR meters, and so on. If you can afford it, also buy hand-held versions of your basic instruments (mentioned above), and stay away from low end hobbyist toys. Invest some decent money in one of two really good laboratory grade microwave spectrum analyzers that will last a few year and which contains a sweep generator, and which is capable of being bumped around out in the field. Pick up your specialized antennas, amplifiers, and filters at this point as well. Buy a really good quality two channel time domain reflectometer, several craft sets, your essential telcom hand tools, fiberglass step ladders (never metal), and so on. Put heavy emphasis on the RF segment of the sweep as that is where you will find the greatest threat. Illicit spies generally like to operate from an off-set location, and by using a radio link they can secure some level of security/safety. Companies which design, manufacture, and distribute eavesdropping equipment know this, and in turn offer huge amounts of RF bugging devices when compared to their hardwired devices. Look at how much space AID, DTC, HD, and others gave RF threats in their catalogs, and schools, and look at how much of their sales was for RF vs. hardwired devices. Hardwired give you better quality intelligence, but RF gives you distance, and fast installation. Look at any of the "spy shop busts", busted PI, or court cases where large amounts of surveillance equipment was seized... the RF devices is what dominates the inventory... and hence the threat. Drive down any street in Washington DC and you will pick up on bugging devices generating an RF signal, same situation on many other major cities. -jma At 01:58 PM 8/30/2004, Andy Cuff wrote: >Hi, >This is a long one, the end result will be a website detailing all TSCM >vendors > >Some of you may have noticed my post of a few weeks back enquiring about >hiring TSCM equipment, I've had various responses which were mainly >negative. The general feeling was I'm just a hobbyist wanting to try >something that sounds exciting. If I was serious then I would either >already have the equipment or I wouldn't hesitate in making the purchase. > >I have many years experience with TSCM, however, IT security has been my >main concern over the last few years though I have kept up to speed with >spread spectrum and frequency agile devices. I'm coming out of the Public >Sector, setting up my own business, this is why I have the experience but >not the equipment. I also have to hand quite a few guys who also have the >same skills and experience wanting to work for me as freelance consultants. > >When I set up the business my main thrust has been IT security, though I do >see a niche to be exploited in extending the services to include TSCM. >Currently I outsource TSCM. At the end of the day I wanted to ensure a good >ROI if I were to purchase all the equipment required. Hence my desire to >initially hire until I scope the requirement for these services in the >Private Sector. As the enquiries regarding TSCM have been coming thick and >fast (due in part to an excellent Google ranking) I have started >investigating the purchase of equipment, even sacrificing the new Ducati >that I have promised myself over the last 23 years of "service" > >I've always had my kit imposed upon me and despite 2 emails and a phonecall >cannot get my usual UK vendors to respond, so as I'm going to investigate >other sources I thought I might as well create a TSCM category on my website >and offer the information to one and all.. > >CATEGORIES >I was thinking of listing products in the following categories, please >recommend changes > >Spatial Scanners > >Line and Mains Scanners > >NLJD > >As soon as we agree on the categories I will upload the pages and start >populating them. > >Thoughts? > >-andy cuff >Talisker's Computer Security Portal >Computer Network Defence Ltd >http://www.securitywizardry.com ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9545 From: Tech Sec Lab Date: Fri Sep 3, 2004 4:11pm Subject: RE: Re: Getting Equipped fiberglass step ladders (never metal), and so on. *** Really? How come? 9546 From: mpaulsen6 Date: Fri Sep 3, 2004 5:50pm Subject: san engineer with hipaa experience Hi, I'm starting to put feelers out for those that have HIPAA / SAN experience or related experience in Govt/Finance/Ed where adherance to regulations is a requirement. If you're interested email your resume offline. Senior engineer position, based in Hillsboro, OR. Out of state candidates will be considered based on experience. Relocation could probably be provided, local is best :) Thanks, Matt 9547 From: Steve Uhrig Date: Fri Sep 3, 2004 0:27pm Subject: Secure GSM handsets http://tinyurl.com/3jqe6 U.S. Gov't sole source procurement notification, with manufacturer indicated, for those who track such things. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9548 From: Steve Uhrig Date: Fri Sep 3, 2004 4:23pm Subject: Re: Getting Equipped On 3 Sep 2004 at 22:11, Tech Sec Lab , who eschews obfuscation, wrote: > fiberglass step ladders (never metal), and so on. > *** Really? How come? Because of OSHA (Occupational Safety and Health Administration). You probably have similar agencies of harrassment in the U.K. OSHA, back in 1975, prohibited aluminum ladders from being used on electrical and many commercial jobs because of the danger of them falling on mains wiring and killing someone. So, as a consequence, all contractors were required to replace their lightweight aluminum ladders with much heavier fiberglass, and sometimes to strengthen their truck rooftop ladder racks to hold the heavier weight. And because of the OSHA mandate, many thousands of aluminum ladders were made illegal, and found their way into other hands, for a low price. Which is why me and many other sweepers bought our first sets of ladders in 1975 and to this day have several different lengths of aluminum ladders. Fiberglass ladders are safer because they're so heavy not everyone can even lift a quality one, so they don't use the ladder at all. If you don't use it, you might not get hurt. If you're not paying attention and bop someone on the head with an aluminum ladder while you're carrying it or maneuvering it into position, you'll annoy them. Bean them with a fiberglass ladder and you may kill them. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9549 From: Date: Fri Sep 3, 2004 4:37pm Subject: RE: Re: Getting Equipped Aside from the safety implications of working around "wires" many of which carry steep voltage? Aside from having a medium that is close to your test equipment that is capable out bouncing some signals? Aside from the weight issues and corrosion/pitting? Aside from being able to scan your own ladder for unauthorized metallic items from some tango... They generally don't bend and deform like metal ladders and they look really sharp with a Earl Schibe paint job! At 04:11 PM 9/3/2004, Tech Sec Lab wrote: >fiberglass step ladders (never metal), and so on. > > > >*** Really? How come? > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9550 From: James M. Atkinson Date: Fri Sep 3, 2004 7:04pm Subject: RE: Re: Getting Equipped For the same reason that you do not wear a metal watch band, don't wear bracelets, nose rings, ear rings, or other conductive thing that could facilitate getting an accidental shock when working around flowing electrons. I've have personally seen cases where the ceiling tile grid had 200 volts on it because an electrician was sloppy and chaffed a high voltage cable for a ceiling light. I've also seen hot conduit that was floating, and a host of other conditions where some else was dangerously sloppy. Remember, it only takes a few milli-amps to kill someone, and at a minimum you don't want to take a half gainer backward off a ladder when you go to move a ceiling tile 12 feet in the air that has enough juice on it to make you loose you balance. Plus a fiberglass ladder is stronger than aluminum, and looks more professional than a wooden or aluminum one. -jma At 05:11 PM 9/3/2004, Tech Sec Lab wrote: >fiberglass step ladders (never metal), and so on. > > > >*** Really? How come? ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9551 From: syndracit Date: Fri Sep 3, 2004 5:41pm Subject: Re: The FBI's 'Magic Lantern' keystroke logger Also keep in mind that this program was possible going to spread threw known vulnerabilities. Very shady if you ask me. --- In TSCM-L@yahoogroups.com, "Gerald" wrote: > Snoopware: New Technologies, Laws Threaten Privacy > > The FBI's 'Magic Lantern' keystroke logger could help catch > terrorists, but at what cost to your fundamental rights? > > Kim Zetter > From the March 2002 issue of PC World magazine > > They say the first casualty of war is truth. In the digital age, > however, the initial victim may be the right to privacy for many > Americans--criminals and innocent suspects alike. > > Last November, the FBI acknowledged the existence of Magic Lantern, a > Trojan horse program it is developing that will render encryption > useless on a suspect's computer by logging the user's keystrokes. > Coupled with laws that Congress passed following September 11th, > Magic Lantern will give the agency unprecedented access to digital > communications. > > But is the government using the fight against terrorism as an excuse > to gain long-sought surveillance powers, or is it merely trying to > keep pace with tech-savvy criminals? > > Genie in a Bottle > Magic Lantern reportedly will allow an agent to plant a keystroke > logger in a specific computer by using a virus-like program. Once > activated, the logger will capture words and numbers as a subject > types them (before encryption kicks in), and will transmit them back > to the agent. > > Privacy advocates say the as-yet-undeployed program is the > government's attempt to obviate a bid (so far unsuccessful) to > collect master keys from encryption software vendors, which would > have let officers unscramble a suspect's data. > > "The government wants to be able to get into people's computers-- > that's the surveillance agenda," says Jim Dempsey, deputy director of > the Center for Democracy and Technology. "Any capability that lets > them [the government] do that, they will seek." The FBI says it needs > such tools to combat criminals. "In many ways law enforcement is > playing catch-up," says FBI spokesperson Paul Bresson. > > "It's no secret that criminals and terrorists are exploiting > technology to further crime. The FBI is not asking for any more than > to continue to have the ability to conduct lawful intercepts of > criminals and terrorists," Bresson argues. > > Dempsey says the program goes too far, however. More than just > getting into your data, he says, it lets the FBI get "into your > brain." "The program would not only capture messages you sent, it > would capture messages that you wrote but never sent--things that > perhaps you thought were a bad idea and [deleted]. This is the > government using the Internet to get into people's houses and into > their minds." > > Knock, Knock > At issue is the fundamental right the Fourth Amendment grants > citizens to prior notice when the government conducts a search and > seizure. > > "In order for the government to seize your diary or read your > letters, they have to knock on your door with a search warrant," > Dempsey explains. "But [this tool] would allow them to seize these > without notice." > > Most privacy advocates say it's not the technology that worries them, > but the lack of judicial oversight in its use. Jennifer Granick, > director of Stanford Law School's Center for Internet and Society, > says she doesn't object to the FBI's using such tools, but she says > she worries about misuse. > > "Advances in technology may require new law enforcement techniques," > Granick notes. "These tools, if properly used within the system of > checks and balances, may work, and then we can embrace them." But, > Granick says, the same privacy protections that apply everywhere else > should also apply in the digital world. > > The Patriot Act, passed by Congress in October 2001, weakens those > protections in two major ways, says the Center for Democracy's > Dempsey. > > The Act lets law enforcement agencies conduct surveillance under > looser rules previously applicable only to foreign intelligence > cases, he says. It also broadens law enforcement's ability to > intercept Internet transactional data such as e-mail addresses. > > And while the act aims to assist in "terrorist" investigations, its > surveillance provisions are not limited to that area, according to > Dempsey. Critics say they're also concerned that talk likening > hackers to terrorists could lead to investigations of innocent PC > owners when hackers surreptitiously commandeer their PCs to launch > Internet attacks against government sites. > > Appeasing Critics > To allay such concerns, Barry Steinhardt, associate director of the > American Civil Liberties Union, wants the FBI to open Magic Lantern-- > and any other similar program it creates--to congressional and > independent review prior to its deployment. "We still don't know > whether Carnivore has been used in the way it's suppose to be used," > he says. > > Carnivore, a controversial tool the FBI uses to collect e-mail > passing through the servers of Internet service providers, is > supposed to pick up only e-mail messages relevant to an investigation > (see January's Consumer Watch for more information). But critics say > that there is little oversight to ensure that the FBI uses the tool > appropriately. > > And Dempsey says that a keystroke logger--with its unlimited access > possibilities--offers even more opportunity for abuse by over-eager > law enforcement officials. > > Still, the primary concern of most critics is the legislative carte > blanche that the Patriot Act seems to give the FBI for conducting its > investigations. > > Though there has been talk on the Senate Judiciary Committee > about "fixing" the Patriot Act, the ACLU's Steinhardt says we'll > probably have to wait some 18 months to see how the Act plays out in > court cases before there will be any movement to change it. > > In the meantime, he says, "People should contact members of Congress > to get them to take their oversight responsibilities seriously." > http://www.pcworld.com/news/article/0,aid,78070,00.asp > > Gerald 9552 From: Richard T. Gray Date: Fri Sep 3, 2004 5:47pm Subject: TSCM Training? A couple of years ago I was contacted by an association that taught TSCM techniques to thier members. If I recall correctly, the owners were on this list. If so, please contact me via e-mail. Thanks in advance, Richard T. Gray Jr. ricky@l... 9553 From: Richard T. Gray Date: Fri Sep 3, 2004 6:01pm Subject: The Thing Peter Wright, the former Assistant Director of MI5, wrote of a technology that his organization had developed in the late 60's that worked on the same principle as "The Thing," which based on my limited understanding required an outside radio beam to be directed at the resonate cavity that then acted as a microphone. What was incredible about his development, was that they could use inanimate objects, such as a ashtray and based on the surface design of the outside, when struck with an unspecified freq. of RF, would act like a microphone. If this technology was available in the late 1960's, I shutter to think what is available today. I am curious about a couple of things: - Has anyone been exposed to such a threat from the private sector? - What freq. range is most probable for a resonate threat? - Is this in fact called a "resonate" threat? - Are there any companies that sell this type of equipment? (I assume, if so, they would have to be off shore companies.) Thanks in advance for your input or discussion on this matter. Richard T. Gray Jr. 337.207.6999 Voice ricky@l... 9554 From: Shawn Hughes (Road) Date: Fri Sep 3, 2004 11:17pm Subject: Nuclear micro - batteries (long) Sorry, I didn't get the link, but there is some very interesting data here that has application in TSCM. -Shawn The Daintiest Dynamos By harvesting energy from radioactive specks, nuclear microbatteries could power tomorrow's microelectromechanical marvels≠and maybe your cellphone, too By Amit LaL & James Blanchard For several decades, electronic circuitry has been shrinking at a famously dizzying pace. Too bad the batteries that typically power those circuits have not managed to get much smaller at all. In today's wrist-worn GPS receivers, matchbox-size digital cameras, and pocketable personal computers, batteries are a significant portion of the volume. And yet they don't provide nearly enough energy, conking out seemingly at the worst possible moment. The reason is simple: batteries are still little cans of chemicals. They function in essentially the same way they did two centuries ago, when the Italian physicist Alessandro Volta sandwiched zinc and silver disks to create the first chemical battery, which he used to make a frog's leg kick. Now, with technologists busily ushering in a new age of miniaturization based on microelectromechanical systems (MEMS), batteries have arrived at a critical juncture. MEMS are finding applications in everything from the sensors in cars that trigger air bags to injectable drug delivery systems to environmental monitoring devices. Many of these systems ideally have to work for long periods, and it is not always easy to replace or recharge their batteries. So to let these miniature machines really hit their stride, we'll need smaller, longer-lasting power sources. For several years our research groups at Cornell University and the University of Wisconsin-Madison have been working on a way around this power-source roadblock: harvesting the incredible amount of energy released naturally by tiny bits of radioactive material. The microscale generators we are developing are not nuclear reactors in miniature, and they don't involve fission or fusion reactions. All energy comes from high-energy particles spontaneously emitted by radioactive elements. These devices, which we call nuclear microbatteries, use thin radioactive films that pack in energy at densities thousands of times greater than those of lithium-ion batteries [see table, "Energy Content"]. A speck of a radioisotope like nickel-63 or tritium, for example, contains enough energy to power a MEMS device for decades, and to do it safely. The particles these isotopes emit, unlike more energetic particles released by other radioactive materials, are blocked by the layer of dead skin that covers our bodies. They penetrate no more than 25 micrometers in most solids or liquids, so in a battery they could safely be contained by a simple plastic package [see sidebar, "Not All Radioisotopes Are Equal."] Our current prototypes are still relatively big, but like the first transistors they will get smaller, going from macro- to microscale devices. And if the initial applications powering MEMS devices go well, along with the proper packaging and safety considerations, lucrative uses in handheld devices could be next. The small nuclear batteries may not be able to provide enough electric current for a cellphone or a PDA, but our experiments so far suggest that several of these nuclear units could be used to trickle charges into the conventional chemical rechargeable batteries used in handheld devices. Depending on the power consumption of these devices, this trickle charging could enable batteries to go for months between recharges, rather than days, or possibly even to avoid recharges altogether. "IT IS A STAGGERINGLY SMALL WORLD THAT IS BELOW," said physicist Richard P. Feynman in his famous 1959 talk to the American Physical Society, when he envisioned that physical laws allowed for the fabrication of micro- and nanomachines and that one day we would be able to write the entire Encyclopaedia Britannica on the head of a pin. Feynman's vision has finally begun to materialize, thanks to ever more sophisticated microelectronics. Micro- and nanoscale machines are poised to become a multibillion-dollar market as they are incorporated in all kinds of electronic devices. Among the revolutionary applications in development are ultradense memories capable of storing hundreds of gigabytes in a fingernail-size device, micromirrors for enhanced displays and optical communications equipment, and highly selective RF filters to reduce cellphone size and improve the quality of calls. But, again, at very small scales, chemical batteries can't provide enough juice to power these micromachines. As you reduce the size of such a battery, the amount of stored energy goes down exponentially. Reduce each side of a cubic battery by a factor of 10 and you reduce the volume≠and therefore the energy you can store≠by a factor of 1000. In fact, researchers developing sensors the size of a grain of sand had to attach them to batteries they couldn't make smaller than a shirt button. IN THE QUEST TO BOOST MICROSCALE POWER GENERATION, several groups have turned their efforts to well-known energy sources, namely hydrogen and hydrocarbon fuels such as propane, methane, gasoline, and diesel. Some groups are developing microfuel cells that, like their macroscale counterparts, consume hydrogen to produce electricity. Others are developing on-chip combustion engines, which actually burn a fuel like gasoline to drive a minuscule electric generator. There are three major challenges for these approaches. One is that these fuels have relatively low energy densities, only about five to 10 times that of the best lithium-ion batteries. Another is the need to keep replenishing the fuel and eliminating byproducts. Finally, the packaging to contain the liquid fuel makes it difficult to significantly scale down these tiny fuel cells and generators. The nuclear microbatteries we are developing won't require refueling or recharging and will last as long as the half-life of the radioactive source, at which point the power output will decrease by a factor of two. And even though their efficiency in converting nuclear to electrical energy isn't high≠about 4 percent for one of our prototypes≠the extremely high energy density of the radioactive materials makes it possible for these microbatteries to produce relatively significant amounts of power. For example, with 10 milligrams of polonium-210 (contained in about 1 cubic millimeter), a nuclear microbattery could produce 50 milliwatts of electric power for more than four months (the half-life of polonium-210 is 138 days). With that level of power, it would be possible to run a simple microprocessor and a handful of sensors for all those months. And the conversion efficiency won't be stuck at 4 percent forever. Beginning this past July we started working to boost the efficiency to 20 percent, as part of a new Defense Advanced Research Projects Agency program called Radio Isotope Micro-power Sources. Space agencies such as NASA in the United States have long recognized the extraordinary potential of radioactive materials for generating electricity. NASA has been using radioisotope thermoelectric generators, or RTGs, since the 1960s in dozens of missions, like Voyager and, more recently, the Cassini probe, now in orbit around Saturn. Space probes like these travel too far away from the sun to power themselves with photovoltaic arrays. RTGs convert heat into electricity through a process known as the Seebeck effect: when you heat one end of a metal bar, electrons in this region will have more thermal energy and flow to the other end, producing a voltage across the bar. Most of NASA's washing-machine-size RTGs use plutonium-238, whose high-energy radiation can produce enormous heat. But as it turns out, RTGs don't scale down well. At the diminutive dimensions of MEMS devices, the ratio between an object's surface and its volume gets very high. This relatively large surface makes it difficult to sufficiently reduce heat losses and maintain the temperatures necessary for RTGs to work. So we had to find other ways of converting nuclear into electric energy. ONE OF THE MICROBATTERIES WE DEVELOPED early last year directly converted the high-energy particles emitted by a radioactive source into an electric current. The device consisted of a small quantity of nickel-63 placed near an ordinary silicon p-n junction≠a diode, basically. As the nickel-63 decayed, it emitted beta particles, which are high-energy electrons that spontaneously fly out of the radioisotope's unstable nucleus. The emitted beta particles ionized the diode's atoms, creating paired electrons and holes that are separated at the vicinity of the p-n interface. These separated electrons and holes streamed away from the junction, producing the current. Nickel-63 is ideal for this application because its emitted beta particles travel a maximum of 21 µm in silicon before disintegrating; if the particles were more energetic, they would travel longer distances, thus escaping the battery. The device we built was capable of producing about 3 nanowatts with 0.1 millicurie of nickel-63, a small amount of power but enough for applications such as nanoelectronic memories and the simple processors for environmental and battlefield sensors that some groups are currently developing. The new types of microbatteries we are working on now can generate substantially more power. These units produce electricity indirectly, like minute generators. Radiation from the sample is converted first to mechanical energy and then to oscillating pulses of electric energy. Even though the energy has to go through the intermediate, mechanical phase, the batteries are no less efficient; they tap a significant fraction of the kinetic energy of the emitted particles for conversion into mechanical energy. By releasing this energy in brief pulses, they provide much more instantaneous power than the direct-conversion approach. For these batteries, which we call radioactive piezoelectric generators, the radioactive source is a 4-square-millimeter thin film of nickel-63 [see illustration, "Power From Within"]. On top of it, we cantilever a small rectangular piece of silicon, its free end able to move up and down. As the electrons fly from the radioactive source, they travel across the air gap and hit the cantilever, charging it negatively. The source, which is positively charged, then attracts the cantilever, bending it down. A piece of piezoelectric material bonded to the top of the silicon cantilever bends along with it. The mechanical stress of the bend unbalances the charge distribution inside the piezoelectric crystal structure, producing a voltage in electrodes attached to the top and bottom of the crystal. After a brief period≠whose length depends on the shape and material of the cantilever and the initial size of the gap≠the cantilever comes close enough to the source to discharge the accumulated electrons by direct contact. The discharge can also take place through tunneling or gas breakdown. At that moment, electrons flow back to the source, and the electrostatic attractive force vanishes. The cantilever then springs back and oscillates like a diving board after a diver jumps, and the recurring mechanical deformation of the piezoelectric plate produces a series of electric pulses. The charge-discharge cycle of the cantilever repeats continuously, and the resulting electric pulses can be rectified and smoothed to provide direct-current electricity. Using this cantilever-based power source, we recently built a self-powered light sensor [see photo, "It's Got the Power"]. The device contains a simple processor connected to a photodiode that detects light variations. - ------------------------- Nuclear batteries can pack in energy at densities THOUSANDS OF TIMES greater than those of lithium-ion batteries - ------------------------- Also using the cantilever system, we developed a pressure sensor that works by "sensing" the gas molecules in the gap between the cantilever and the source. The higher the ambient pressure, the more gas molecules in the gap. As a result, it is more difficult for electrons to reach and charge the cantilever. Hence, by tracking changes in the cantilever's charging time, the sensor even detects millipascal variations in a low-pressure environment like a vacuum chamber. To get the measurements at a distance, we made the cantilever work as an antenna and emit radio signals, which we could receive meters away≠in this application the little machine was "radio active" in more ways than one. The cantilever, built from a material with a high dielectric constant, had metal electrodes on its top and bottom. An electric field formed inside the dielectric as the bottom electrode charged. When it discharged, a charge imbalance appeared in the electrodes, making the electric field propagate along the dielectric material. The cantilever thus acted like an antenna that periodically emitted RF pulses, the interval between pulses varying accordingly to the pressure. What we'd like to do now is add a few transistors and other electronic components to this system so that it can not only send simple pulses but also modulate signals to carry information. That way, we could make MEMS-based sensors that could communicate with each other wirelessly without requiring complex, energy-demanding communications circuitry. NUCLEAR MICROBATTERIES MAY ULTIMATELY CHANGE the way we power many electronic devices. The prevalent power source paradigm is to have all components in a device's circuitry drain energy from a single battery. Here's another idea: give each component≠sensor, actuator, microprocessor≠its own nuclear microbattery. In such a scheme, even if a main battery is still necessary for more power-hungry components, it could be considerably smaller, and the multiple nuclear microbatteries could run a device for months or years, rather than days or hours. One example is the RF filters in cellphones, which now take up a lot of space in handsets. Researchers are developing MEMS-based RF filters with better frequency selectivity that could improve the quality of calls and make cellphones smaller. These MEMS filters, however, may require relatively high dc voltages, and getting these from the main battery would require complicated electronics. Instead, a nuclear microbattery designed to generate the required voltage≠in the range of 10 to 100 volts≠could power the filter directly and more efficiently. Another application might be to forgo the electrical conversion altogether and simply use the mechanical energy. For example, researchers could use the motion of a cantilever-based system to drive MEMS engines, pumps, and other mechanical devices. A self-powered actuator could be used, for instance, to move the legs of a microscopic robot. The actuator's motion≠and the robot's tiny steps≠would be adjusted according to the charge-discharge period of the cantilever and could vary from hundreds of times every second to once per hour, or even once per day. THE FUTURE OF NUCLEAR MICROBATTERIES depends on several factors, such as safety, efficiency, and cost. If we keep the amount of radioactive material in the devices small, they emit so little radiation that they can be safe with only simple packaging. At the same time, we have to find ways of increasing the amount of energy that nuclear microbatteries can produce, especially as the conversion efficiency begins approa chingourtargeted20percent.Onepossibility for improving the cantilever-based system would be to scale up the number of cantilevers by placing several of them horizontally, side by side. In fact, we are already developing an array about the size of a postage stamp containing a million cantilevers. These arrays could then be stacked to achieve even greater integration. Another major challenge is to have inexpensive radioisotope power supplies that can be easily integrated into electronic devices. For example, in our experimental systems we have been using 1 millicurie of nickel-63, which costs about US $25≠too much for use in a mass-produced device. A potentially cheaper alternative would be tritium, which some nuclear reactors produce in huge quantities as a byproduct. There's no reason that the amount of tritium needed for a microbattery couldn't cost just a few cents. Once these challenges are overcome, a promising use for nuclear microbatteries would be in handheld devices like cellphones and PDAs. As mentioned above, the nuclear units could trickle charge into conventional batteries. Our one-cantilever system generated pulses with a peak power of 100 milliwatts; with many more cantilevers, and by using the energy of pulses over periods of hours, a nuclear battery would be able to inject a significant amount of current into the handheld's battery. How much that current could increase the device's operation time depends on many factors. For a cellphone used for hours every day or for a power-hungry PDA, the nuclear energy boost won't help much. But for a cellphone used two or three times a day for a few minutes, it could mean the difference between recharging the phone every week or so and recharging it once a month. And for a simple PDA used mainly for checking schedules and phone numbers, the energy boost might keep the batteries perpetually charged for as long as the nuclear material lasts. Nuclear microbatteries won't replace chemical batteries. But they're going to power a whole new range of gadgetry, from nanorobots to wireless sensors. Feynman's "staggeringly small world" awaits. 9555 From: Hawkspirit Date: Sat Sep 4, 2004 1:06am Subject: Chicago I will be sweeping in Chicago in the next two weeks, any other TSCM specialists that would like to get together with me while I am in town let me know. Roger Tolces Electronic Security Co. 323-462-1351 www.bugsweeps.com [Non-text portions of this message have been removed] 9556 From: A Grudko Date: Sat Sep 4, 2004 6:26am Subject: RE: Re: Getting Equipped -----Original Message----- From: jamesworld@i... [mailto:jamesworld@i...] > Aside from being able to scan your own ladder for unauthorized metallic items from some tango... I have to ask. Tango as in; The dance The drink The phonetic ? And if you bring your own ladder onto a sweep isn't that authorised? Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.749 / Virus Database: 501 - Release Date: 2004/09/01 [Non-text portions of this message have been removed] 9557 From: mpaulsen6 Date: Sat Sep 4, 2004 10:47am Subject: job posting Hi, My company will be hiring a SAN engineer shortly. Expert level security awareness is a plus, as is PACS, HIPAA, Cisco, HP. This is a senior position responsible for high level network services in a medical environment with direct patient involvement. Hillsboro, Or (outside Portland, OR, west coast). Please send your resume via word attachment / sans virus :) Relocation may be an option, local is best :) Thanks, Matt 9558 From: mpaulsen6 Date: Sat Sep 4, 2004 10:48am Subject: Re: job posting, dupe sorry Sorry, this was supposed to be posted to another group. --- In TSCM-L@yahoogroups.com, "mpaulsen6" wrote: > Hi, > > My company will be hiring a SAN engineer shortly. Expert level > security awareness is a plus, as is PACS, HIPAA, Cisco, HP. This is > a senior position responsible for high level network services in a > medical environment with direct patient involvement. Hillsboro, Or > (outside Portland, OR, west coast). Please send your resume via word > attachment / sans virus :) Relocation may be an option, local is > best :) > > Thanks, > > Matt 9559 From: Gerald wieczorek Date: Fri Sep 3, 2004 7:55pm Subject: Re: Re: The FBI's 'Magic Lantern' keystroke logger From: http://finance.groups.yahoo.com/group/TSCM-L/message/9496 Crossing Rootkits, automated attack bots, metasploit, keylogger or eavesdropper and a worm presents almost impossible detection case, and wide spread infection potential, with ease of use by a Newbie. It's a wonder they don't have that in every feild office, but I've heard,unconfirmed, they are still running 386's. GW. syndracit wrote: Also keep in mind that this program was possible going to spread threw known vulnerabilities. Very shady if you ask me. --- In TSCM-L@yahoogroups.com, "Gerald" wrote: > Snoopware: New Technologies, Laws Threaten Privacy > > The FBI's 'Magic Lantern' keystroke logger could help catch > terrorists, but at what cost to your fundamental rights? > > Kim Zetter > From the March 2002 issue of PC World magazine > > They say the first casualty of war is truth. In the digital age, > however, the initial victim may be the right to privacy for many > Americans--criminals and innocent suspects alike. > > Last November, the FBI acknowledged the existence of Magic Lantern, a > Trojan horse program it is developing that will render encryption > useless on a suspect's computer by logging the user's keystrokes. > Coupled with laws that Congress passed following September 11th, > Magic Lantern will give the agency unprecedented access to digital > communications. > > But is the government using the fight against terrorism as an excuse > to gain long-sought surveillance powers, or is it merely trying to > keep pace with tech-savvy criminals? > > Genie in a Bottle > Magic Lantern reportedly will allow an agent to plant a keystroke > logger in a specific computer by using a virus-like program. Once > activated, the logger will capture words and numbers as a subject > types them (before encryption kicks in), and will transmit them back > to the agent. > > Privacy advocates say the as-yet-undeployed program is the > government's attempt to obviate a bid (so far unsuccessful) to > collect master keys from encryption software vendors, which would > have let officers unscramble a suspect's data. > > "The government wants to be able to get into people's computers-- > that's the surveillance agenda," says Jim Dempsey, deputy director of > the Center for Democracy and Technology. "Any capability that lets > them [the government] do that, they will seek." The FBI says it needs > such tools to combat criminals. "In many ways law enforcement is > playing catch-up," says FBI spokesperson Paul Bresson. > > "It's no secret that criminals and terrorists are exploiting > technology to further crime. The FBI is not asking for any more than > to continue to have the ability to conduct lawful intercepts of > criminals and terrorists," Bresson argues. > > Dempsey says the program goes too far, however. More than just > getting into your data, he says, it lets the FBI get "into your > brain." "The program would not only capture messages you sent, it > would capture messages that you wrote but never sent--things that > perhaps you thought were a bad idea and [deleted]. This is the > government using the Internet to get into people's houses and into > their minds." > > Knock, Knock > At issue is the fundamental right the Fourth Amendment grants > citizens to prior notice when the government conducts a search and > seizure. > > "In order for the government to seize your diary or read your > letters, they have to knock on your door with a search warrant," > Dempsey explains. "But [this tool] would allow them to seize these > without notice." > > Most privacy advocates say it's not the technology that worries them, > but the lack of judicial oversight in its use. Jennifer Granick, > director of Stanford Law School's Center for Internet and Society, > says she doesn't object to the FBI's using such tools, but she says > she worries about misuse. > > "Advances in technology may require new law enforcement techniques," > Granick notes. "These tools, if properly used within the system of > checks and balances, may work, and then we can embrace them." But, > Granick says, the same privacy protections that apply everywhere else > should also apply in the digital world. > > The Patriot Act, passed by Congress in October 2001, weakens those > protections in two major ways, says the Center for Democracy's > Dempsey. > > The Act lets law enforcement agencies conduct surveillance under > looser rules previously applicable only to foreign intelligence > cases, he says. It also broadens law enforcement's ability to > intercept Internet transactional data such as e-mail addresses. > > And while the act aims to assist in "terrorist" investigations, its > surveillance provisions are not limited to that area, according to > Dempsey. Critics say they're also concerned that talk likening > hackers to terrorists could lead to investigations of innocent PC > owners when hackers surreptitiously commandeer their PCs to launch > Internet attacks against government sites. > > Appeasing Critics > To allay such concerns, Barry Steinhardt, associate director of the > American Civil Liberties Union, wants the FBI to open Magic Lantern-- > and any other similar program it creates--to congressional and > independent review prior to its deployment. "We still don't know > whether Carnivore has been used in the way it's suppose to be used," > he says. > > Carnivore, a controversial tool the FBI uses to collect e-mail > passing through the servers of Internet service providers, is > supposed to pick up only e-mail messages relevant to an investigation > (see January's Consumer Watch for more information). But critics say > that there is little oversight to ensure that the FBI uses the tool > appropriately. > > And Dempsey says that a keystroke logger--with its unlimited access > possibilities--offers even more opportunity for abuse by over-eager > law enforcement officials. > > Still, the primary concern of most critics is the legislative carte > blanche that the Patriot Act seems to give the FBI for conducting its > investigations. > > Though there has been talk on the Senate Judiciary Committee > about "fixing" the Patriot Act, the ACLU's Steinhardt says we'll > probably have to wait some 18 months to see how the Act plays out in > court cases before there will be any movement to change it. > > In the meantime, he says, "People should contact members of Congress > to get them to take their oversight responsibilities seriously." > http://www.pcworld.com/news/article/0,aid,78070,00.asp > > Gerald ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com [Non-text portions of this message have been removed] From: factfind Date: Sun Sep 2, 2001 9:50am Subject: Re: Digest Number 698 While it may make for an amusing moment or two of e-mail content, the casting of aspersions on one professional group or another strikes me as a zero-sum game which will serve neither the individuals who practice Competitive Intelligence exclusively or the Private Investigators who have found a new area in which to ply their trade. Painting with such a broad brush as to denigrate the capability of either group lends an air of unprofessional character to all. The marketplace has a way of winnowing out those who cannot perform from those who can. I believe that satisfied clients and well executed operations will do more to determine the future of CI operations that all the finger waggling and rhetoric. Whatever you do,do it well. Fraternally D.A.Linsky President SSC Security and Investigations http://www.securesvc.com ******************************************* We are what we repeatedly do. Excellence, then, is a habit. Socrates .----- Original Message ----- From: To: Sent: Sunday, September 02, 2001 10:10 AM Subject: [TSCM-L] Digest Number 698 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS ------------------------------------------------------------------------ There are 4 messages in this issue. Topics in this digest: 1. Re: Competitive Intelligence From: "A Grudko" 2. Re: Re: Competitive Intelligence From: Martin Brown 3. Tricks of the corporate spying trade From: "James M. Atkinson" 4. RE: Tricks of the corporate spying trade From: "Aimee Farr" ________________________________________________________________________ ________________________________________________________________________ Message: 1 Date: Sat, 1 Sep 2001 23:03:01 +0200 From: "A Grudko" Subject: Re: Competitive Intelligence - Original Message - From: Aimee Farr > Seems every time I turn around I see a PI talking about competitive > intelligence as if it were a task-skill like "vacuum cleaning." I was Chairman of the South African chapter of the Society of Competitive Intelligence Professionals for 2001 and have been a member of SCIP (www.scip.org - well worth visiting) for 3 years. SCIP has over 7000 members and a full time staff of about 20, split between the US and UK. CI in current terminology uses legal information gathering and analasys to produce intelligence and PIs are generally (here in SA and IMHO) looked down on. CI here is comprised mostly of people with business qualifications and a few ex-intelligence operatives. PIs collecting business information using covert means are not considered to by CI practitioners but business 'spys' to different degrees. But then, some observers point out that SCIP's HO is at Alexandra, Virginia, sort of down the road from Langley...;-) Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.icon.co.za/~agrudko/fp.htm , Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, SCIP, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time "Experience is the name everyone gives to his mistakes" Oscar Wilde - A tribute to the late Roy Lawson. ________________________________________________________________________ ________________________________________________________________________ Message: 2 Date: Sat, 01 Sep 2001 17:38:45 -0500 From: Martin Brown Subject: Re: Re: Competitive Intelligence Well, Andy, being one of the great unwashed and under-educated "P.I.'s" that you chose to malign in your rather broad strokes ("P.I.'s are generally looked down upon), I decided to review www.scip.com. Honestly (and we are honest upon occasion), it sort of looked like someone with a solution trying to create a problem; like marketing feminine hygiene spray. Then gloss it up with a dash of mystique (sort of down the road from Langley..."). I am reminded that when I first left police work to become a "P.I.", the big deal was to get a "certified fraud examiner" certificate so you could put "C.F.E." after your name (become a man of letters, so to speak). Just had to send in $135 and take a short course. It was slightly harder than joining the the Flash Gordon Rocket Rangers Club, but at least you got a decoder ring when you were a Rocket Ranger. I work with other "P.I.'s" who had distinguished careers as police detectives, federal agents, military operators, even a few who weren't just "sort of down the road from Langley.." In defense of them, as of myself, you might be surprised what we have been able to accomplish, and continue to do so, for our clients. In this business, you are only as good as the last thing you did; and, believe it or not, some of us have been around a lot of years. Thought that in your quest for knowledge, this might be of interest. Martin Brown Brown & Sikes, Inc. Dallas, Texas A Grudko wrote: > - Original Message - > From: Aimee Farr > > Seems every time I turn around I see a PI talking about competitive > > intelligence as if it were a task-skill like "vacuum cleaning." > > I was Chairman of the South African chapter of the Society of Competitive > Intelligence Professionals for 2001 and have been a member of SCIP > (www.scip.org - well worth visiting) for 3 years. > > SCIP has over 7000 members and a full time staff of about 20, split between > the US and UK. > > CI in current terminology uses legal information gathering and analasys to > produce intelligence and PIs are generally (here in SA and IMHO) looked down > on. CI here is comprised mostly of people with business qualifications and a > few ex-intelligence operatives. > > PIs collecting business information using covert means are not considered to > by CI practitioners but business 'spys' to different degrees. > > But then, some observers point out that SCIP's HO is at Alexandra, Virginia, > sort of down the road from Langley...;-) > > Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - > www.icon.co.za/~agrudko/fp.htm , Est. 1981 > National and international crime investigation, intelligence and protection > Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 > 0255 - 244 0256 (Fax) > SACI, WAD, CALI, SAMLF, SCIP, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom > When you need it done right - first time > "Experience is the name everyone gives to his mistakes" Oscar Wilde - A > tribute to the late Roy Lawson. > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ________________________________________________________________________ ________________________________________________________________________ Message: 3 Date: Sat, 1 Sep 2001 21:05:27 -0400 From: "James M. Atkinson" Subject: Tricks of the corporate spying trade Tricks of the corporate spying trade Going too far can put a company's reputation at risk, say Michael Skapinker Published: August 31 2001 19:11GMT Last Updated: August 31 2001 19:21GMT http://news.ft.com/ft/gx.cgi/ftc?pagename=View&c=Article&cid=FT3BFQLB2RC&liv e=true The Society of Competitive Intelligence Professionals in Alexandria, Virginia wrinkles its nose at the mention of "dumpster diving" or rifling through a competitor's rubbish in search of corporate secrets. "It's not professional," says Bill Weber, executive director of the society, which represents 6,000 corporate intelligence gatherers in 45 countries. Yet Procter & Gamble, one of the world's most respected companies, this week admitted that a company working on its behalf went through rubbish put out by Unilever, its fiercest rival, in an attempt to find out more about its hair-care business. P&G denied, however, that its contracted company's staff misrepresented themselves to Unilever as market analysts. P&G told Unilever about its lapses when its senior executives found out about them. Adding to the aura of intrigue, Fortune magazine, which broke the story, said the operation involved use of a safe house, "The Ranch". P&G is not the only company involved in such activities. Last year, Oracle, the US software group, admitted hiring investigators to go through rubbish thrown out by companies that supported Microsoft during its antitrust trial. Larry Ellison, Oracle's chief executive, said: "Maybe our investigation organisation may have done unsavoury things, but it's not illegal." Two engineers at Lucent, the US technology company, were arrested this year along with a third person, and charged with the theft of commercial secrets that were allegedly transferred to a company in China. Growing international competition means companies are under increased pressure to discover what rivals are up to. There is no shortage of people to help them find out. The end of the cold war has led to many former spies seeking work in the private sector. Mr Weber agrees that many of his society's members were formerly in "government service", although he says they also include database librarians and computer specialists. Even those who remain in government employment are increasingly turning their attention to commercial rather than military espionage. Explaining the way that spying changed when the cold war ended, Louis Freeh, then director of the US Federal Bureau of Investigation, told a congressional committee in 1996: "In today's world, a country's power and stature are increasingly measured by its economic and industrial capacity. Consequently, foreign government ministries that deal with finance and trade and major industrial sectors play a growing role in their respective countries' [intelligence] collection efforts." Mr Weber argues that so much public information is now available that subterfuge is unnecessary. He dislikes the term "espionage", which he says refers to illegal information-gathering. His society's code of practice requires members to act legally and never to obtain information by pretending to be someone else, such as a customer, supplier or journalist. "Most of the work is with open-source information. The internet has created a wealth of stuff that just has to be analysed," he says. Like Oracle, P&G said this week that it had not broken the law. It said the company that went through Unilever's rubbish was a "rogue operator". This would not come as a surprise to Marc Barry, self-confessed corporate spy, and co-author of Spooked: Espionage in Corporate America, published last year. Mr Barry alleges that companies that want to engage in "dumpster diving" or other underhand practices simply contract the work out to an independent operator or "kite", as P&G is alleged to have done. "The kite serves as a proxy," Mr Barry writes. "He does the dirty work but provides plausible deniability to a company in case an operation goes awry." He writes that he acted as a kite for Schwan's Sales Enterprises, a food company desperate to find out more about the "rising crust" pizza being developed by its rival, Kraft. The crust was designed to taste better because it had not been pre-cooked and was baked for the first time in the consumer's oven at home. Mr Barry says that, without Schwan's knowledge, he extracted reams of information from Kraft in a day and a half by posing on the telephone as, successively, a journalist, an environmental activist, a cardboard manufacturer, a Kraft employee and a food researcher. Patrick Grayson, a London-based specialist who advises companies on their dealings with corporate security firms, says much of the law on intelligence-gathering is a muddle. Some activities are clearly illegal. "You can assume bugging or breaking and entering is off-limits pretty much anywhere you go," Mr Grayson says. Rules on claiming to be someone else differ from country to country, as do laws on rifling through rubbish. "There should be a whole international law practice on garbage collection," he says. Alden Taylor, head of the business intelligence practice at Kroll Associates, the corporate security specialists, says rules on rubbish differ even within the US. In some states, rubbish is treated as "abandoned property" and is freely accessible. In others, the law depends on whether it is in a company's own bin or one owned by a refuse collector. The law is not everything, however. Corporate spying can cause long-term damage to a company's reputation, as British Airways discovered in the 1990s when it hacked into the computers of its rival Virgin Atlantic. By confessing to its errors, P&G attempted to limit the damage to its reputation. There are ways to avoid this sort of trouble, Mr Grayson says, apart from using the internet. He once answered a client's questions about a rival by simply organising a bona fide tour of its factory. www.ft.com/espionage © Copyright The Financial Times Limited 2001. ========== Unilever seeks review of P&G's product line By Adam Jones in London and Andrew Edgecliffe-Johnson in New York Published: August 31 2001 18:15GMT Last Updated: August 31 2001 23:43GMT http://news.ft.com/ft/gx.cgi/ftc?pagename=View&c=Article&cid=FT3BF1FA2RC&liv e=true&tagid=IXLI0L9Z1BC Unilever is seeking an independent review of Procter & Gamble's product launch plans for fear they may have been influenced by information obtained by rogue spies. Talks between the rival consumer products companies broke up for the weekend on Friday night, following P&G's admission that an operation to spy on Unilever's hair care arm violated its internal guidelines. P&G returned more than 80 documents to Unilever after discovering the breach - which included rooting through litter bins, a practice known in the trade as "dumpster diving". P&G has told Unilever that none of the information gleaned would be used in its business. On Friday, P&G would not elaborate on the situation, saying it remained eager to reach a settlement. To settle the affair, Unilever has demanded that an independent third party audit P&G's plans for new hair care products over the next two-to-three years to make sure they are not based on its own ideas. The auditor would not share the information with P&G but would be empowered to rule on any suspicious overlap. Unilever was also seeking a compensation payment worth $10m-$20m, but this was seen as secondary to the demand for an independent audit. Charlie Strauss, president and chief executive of Unilever USA, was leading Unilever's team in the talks, opposite John Pepper, chairman of P&G. It is understood that Unilever had warned that if significant progress towards a settlement was not made, it was prepared to take the matter to court next week. P&G's hair care sleuthing is thought to have been backed by a budget of $3m. Among the secrets gleaned from Unilever were precise plans for a product which is due to launch in February, it is understood. P&G's operatives learned the price of the product, when it would be shipped and how much was to be spent on advertising. Unilever has since tightened up the way it handles and disposes of sensitive documents. P&G brands have about 31 per cent of the US shampoo market, versus Unilever's 20 per cent. David Lang of Investec Henderson Crosthwaite said: "Unilever has added about 5 per cent of market share in the 1997-2001 period." It has also made gains in conditioners. P&G informed Unilever in early April that its own internal rules had been breached. In May, it bought Clairol for $4.95bn to increase its hair care business. In 1999, Mr Pepper told a trade association meeting that competitive intelligence was "of singular importance" to a company such as P&G. He said it had shifted "from collecting, analysing and disseminating information, to acquiring and using knowledge to create winning strategies", according to a report in Competitive Intelligence Magazine. © Copyright The Financial Times Limited 2001. ========== P&G admits it spied on arch-rival Unilever By Andrew Edgecliffe-Johnson in New York Published: August 31 2001 00:43GMT Last Updated: August 31 2001 00:58GMT http://news.ft.com/ft/gx.cgi/ftc?pagename=View&c=Article&cid=FT3ED8E81RC&liv e=true Procter & Gamble, the maker of Pantene shampoo, has admitted to having conducted a corporate espionage operation against Unilever, its Anglo-Dutch arch-rival, it emerged on Thursday night. Lawyers for the two companies were attempting to agree a settlement after P&G alerted Unilever that it had employed a competitive intelligence group that violated internal guidelines. The group, hired through a contractor, is understood to have operated out of a safe house in Cincinnati, Ohio known as "the ranch". The undercover operation sought information about Unilever's US hair care business and employed tactics including "dumpster diving" - going through P&G's rubbish. Unilever confirmed that it was in discussions with P&G "regarding their competitive intelligence operations directed against Unilever in the US". The operation was first reported by Fortune magazine. One person close to Unilever said it was seeking "tens of millions of dollars" in restitution. If no settlement can be reached by Friday night, Unilever is understood to have threatened to pursue the matter in court. P&G issued a statement saying "the specific means used to obtain the information [on Unilever] violated the company's strict policy regarding competitive business information gathering". It added that employees directly involved in the project have been "separated" from the group. P&G and Unilever have had frequent product disputes, including the "soap wars" of the 1990s, and corporate espionage is common in the industry. However, both groups are treating this case as serious. John Pepper, P&G's chairman, is understood to have flown to Europe on Tuesday for a meeting with Niall Fitzgerald, Unilever's co-chairman. P&G is understood to have alerted Unilever to the espionage operation in early April. P&G said the information was obtained lawfully, although "the means used did violate our policy". It added that, to its knowledge, P&G staff had not misrepresented themselves in their effort to glean information. © Copyright The Financial Times Limited 2001. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- ________________________________________________________________________ ________________________________________________________________________ Message: 4 Date: Sat, 1 Sep 2001 21:29:31 -0500 From: "Aimee Farr" Subject: RE: Tricks of the corporate spying trade > Patrick Grayson, a London-based specialist who advises companies on > their dealings with corporate security firms, says much of the law on > intelligence-gathering is a muddle. Some activities are clearly > illegal. "You can assume bugging or breaking and entering is > off-limits pretty much anywhere you go," Mr Grayson says. Don't you love how reporters pick quotes? This one threw such illumination on the subject. > Rules on claiming to be someone else differ from country to country, > as do laws on rifling through rubbish. "There should be a whole > international law practice on garbage collection," he says. Aimee E. Farr, Esq. INTERNATIONAL WASTE ARCHEOLOGY PRIVACY LAW Yeah! And yet, another reason why I don't tell my old country lawyer father about my practice interests. I office next to him. "Uhm, you got a book order in...." *he loiters around* "Somebody is here to see you..." *he loiters around* And my personal favorite: "Please give _Mr. Wolf_ your private number, he is scaring Susan with his messages." Did anybody see the website dumspterdiversomaha.com? It got yanked, but it was a handy community database of garbage gossip. It mentioned the development of a network of "cells." The splash page -- documents from a lawyer's office. They also hit up medical, etc. They sent you a "friendly note" informing you that your items were featured, presumably as a prelude to negotiations. The next one will be more stealthy than an aol account, and will make instant trash privacy headlines. > Alden Taylor, head of the business intelligence practice at Kroll > Associates, the corporate security specialists, says rules on rubbish > differ even within the US. In some states, rubbish is treated as > "abandoned property" and is freely accessible. In others, the law > depends on whether it is in a company's own bin or one owned by a > refuse collector. They differ considerably in the US. Many states have statutes on point, and a more subtle issue is in states with express or implied privacy in the state constitution. The "cop law" that people are looking at here.....the balance is increasingly likely to weigh different in the private sector. 4th Amendment privacy is for cops -- if you're private, you go to tort law. This site is very outdated: http://www.rbs2.com/privacy.htm#anchor666666 (see Garbage privacy) Actually, this is well within the purview of being addressed by legislation, as you can see by this identity-theft statute. Some privacy protection acts may give shelter, like this AZ bill: http://www.azleg.state.az.us/legtext/45leg/1r/bills/hb2351h.pdf Includes business customer record destruction/disposal requirements and... E. ANY PERSON WHO, FOR ANY PURPOSE, USES PERSONAL INFORMATION 20 CONTAINED IN RECORDS THAT WAS DISPOSED OF BY A BUSINESS IS LIABLE TO THE 21 INDIVIDUAL WHOSE PERSONAL INFORMATION IS CONTAINED IN THE RECORDS AND TO THE 22 BUSINESS THAT DISPOSED OF THOSE RECORDS FOR AN AMOUNT OF DAMAGES RESULTING 23 FROM THE USE OF THE PERSONAL INFORMATION. THIS PARAGRAPH DOES NOT APPLY TO A 24 PERSON WHO USES PERSONAL INFORMATION WITH THE CONSENT OF THE INDIVIDUAL WHOSE 25 PERSONAL INFORMATION IS CONTAINED IN THE RECORDS OR OF THE BUSINESS THAT 26 DISPOSED OF THOSE RECORDS. ---------- Pretexting ---------- Insurance investigation: http://www.ca9.uscourts.gov/ca9/newopinions.nsf/2420941536B4FA2588256A46005D 0DED/$file/9955963.pdf?openelement "Rep. Tazin asks - what is the law on pretexting?" http://www.techlawjournal.com/cong107/privacy/idtheft/20010619.asp See FTCA Sect. 5. 15 U.S.C. ß 45(a) and related decisions. > The law is not everything, however. See, spy stories talking about the law. They all do it. As we all know, every good spy reads the law and follows it. Maybe I should start a little "Spy Law Reporter." ~Aimee ________________________________________________________________________ ________________________________________________________________________ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3633 From: Miguel Puchol Date: Sun Sep 2, 2001 11:47am Subject: RE: Re: Competitive Intelligence Hi Martin, > generally looked down upon), I decided to review www.scip.com. > Honestly (and we are honest upon occasion), it sort of looked Well, I for some reason decided to click on your link to this site, and not on the one in Andy's message, and was promptly taken to the "Specifications Consultants in Independent Practice" web site, where they also kindly provided a link to www.scip.org, I imagine they get tons of confused visits. Until I realised the error, I was trying to figure out if Andy had taken something funny in his last meal... :-) All the best, and happy typing! Mike 3634 From: Aimee Farr Date: Sun Sep 2, 2001 1:31pm Subject: Intelligence, Investigation, Spyin' (survey) Before people start placing their manly parts on the table, and because I started it with a hurried post... No conflict here. We are all feeling different parts of the elephant that is competitive intelligence, seeing different shades of meaning on the wall of the cave based on individual perspectives. (Plato's Allegory of the Cave.) All sorts of information collectors, skillsets and activities are part of the legitimate competitive intelligence function. Still, holistic competitive intelligence is a management theory. (See Jan P. Herring's _Competitors_. Warning: makes legal treatises look like they should come with a box of crayons.) Personally, I prefer the term "competitive investigation" if it is mere factual gathering. Here is the survey about small-tyme spyin'.... http://www.businesswire.com/webbox/bw.052301/211430137.htm FORT LAUDERDALE, Fla.--(BUSINESS WIRE)--May 23, 2001--The Manufacturing Marketing firm of TR Cutler, Inc. conducted a national survey of 462 manufacturing companies with fewer than one thousand employees. Fifty-six percent of the manufacturing respondents admitted to competitive spying in the past twelve months. According to Thomas R. Cutler, "Our survey findings validate that many manufacturers are increasingly aware that they are losing business to the competition and are taking measures to find out what the competition is offering to win business." Competitive spying was defined as using deception to determine information about a competitor. The most popular method of competitive spying was hiring outside organizations to gather bids, data, and client information. Cutler suggested, "The actual number is probably considerably higher, since not everyone surveyed was willing to admit to these types of activities. It reflects the increasingly competitive nature of manufacturing." ---- 56% -- the definition *included deception*, and they hire *outside contractors*. This study was on small firms, so I'm willing to make an "analytical leap," and say a significant number of those outside contractors are private investigators. With more buyers _AND_ PIs *new* to competitive intelligence, and the stakes ever-rising, the chances for litigation (or "term talks") are increasing. The shampoo case is a perfect example of where even mere allegations of something that could be "perfectly legal," can cost a client BIG BUCKS and tarnish unblemished careers. The rules are different here. ~Aimee 3635 From: Charles P Date: Sun Sep 2, 2001 1:40pm Subject: Re: Re: Competitive Intelligence Lest some chips may be falling off some shoulders unnecessarily. It appeared to me that Andy was only making an observation of other people's opinions. Reminds me of the number of times I'd mention to lay people that I practice "eavesdropping countermeasures" or "wiretap detection and debugging sweeps", The most common response was a wide-eyed look and the question "but isn't that illegal????" duh. Now I usually just say security consulting or communications security unless I know they can handle it. cp ----- Original Message ----- From: "A Grudko" To: "TSCM-L Mailing List" Sent: Saturday, September 01, 2001 5:03 PM Subject: [TSCM-L] Re: Competitive Intelligence > - Original Message - > From: Aimee Farr > > Seems every time I turn around I see a PI talking about competitive > > intelligence as if it were a task-skill like "vacuum cleaning." > > I was Chairman of the South African chapter of the Society of Competitive > Intelligence Professionals for 2001 and have been a member of SCIP > (www.scip.org - well worth visiting) for 3 years. > > SCIP has over 7000 members and a full time staff of about 20, split between > the US and UK. > > CI in current terminology uses legal information gathering and analasys to > produce intelligence and PIs are generally (here in SA and IMHO) looked down > on. CI here is comprised mostly of people with business qualifications and a > few ex-intelligence operatives. > > PIs collecting business information using covert means are not considered to > by CI practitioners but business 'spys' to different degrees. > > But then, some observers point out that SCIP's HO is at Alexandra, Virginia, > sort of down the road from Langley...;-) > > Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - > www.icon.co.za/~agrudko/fp.htm , Est. 1981 > National and international crime investigation, intelligence and protection > Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 > 0255 - 244 0256 (Fax) > SACI, WAD, CALI, SAMLF, SCIP, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom > When you need it done right - first time > "Experience is the name everyone gives to his mistakes" Oscar Wilde - A > tribute to the late Roy Lawson. > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 3636 From: A Grudko Date: Sun Sep 2, 2001 2:52pm Subject: Re: Competitive Intelligence - Original Message - From: Martin Brown > Well, Andy, being one of the great unwashed and under-educated "P.I.'s" that you chose to malign in your rather broad strokes ("P.I.'s are generally looked down upon)... "P.I.'s are generally looked down upon" referred to the bias I felt against me from the CI community here. I am proud to have been a PI for 20+ years. My post was meant to be informative and a little humorous. I have sent Martin a private reply. I resigned from SCIP in June. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.icon.co.za/~agrudko/fp.htm , Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, SCIP, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time "Experience is the name everyone gives to his mistakes" Oscar Wilde - A tribute to the late Roy Lawson. 3637 From: A Grudko Date: Sun Sep 2, 2001 3:53pm Subject: Re: Re: Competitive Intelligence - Original Message - From: Charles > Lest some chips may be falling off some shoulders unnecessarily. > It appeared to me that Andy was only making an observation of other people's > opinions. Exactly my point - apologies for confusion. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.icon.co.za/~agrudko/fp.htm , Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, SCIP, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time "Experience is the name everyone gives to his mistakes" Oscar Wilde - A tribute to the late Roy Lawson. 3638 From: Marcelrf-iDEN Mobile Date: Sun Sep 2, 2001 4:40pm Subject: Project "Condor" I have a Power Point presentation from the NSA on Project Condor. It's a good read. It features some high security communication devices. It even includes some pricing. If interested e-mail me and I will send it. (4 megs). Marcel -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 3639 From: Aimee Farr Date: Sun Sep 2, 2001 5:30pm Subject: RE: Re: Competitive Intelligence > "P.I.'s are generally looked down upon" referred to the bias I > felt against > me from the CI community here. I am proud to have been a PI for 20+ years. Eh, everybody knows this game. I don't think I would want a marketing/librarian CI-type for some information tasks. PIs are often better interviewers and human-focused. And, PIs are the professionals of choice for many organizations -- because they have existing relationships. They should be welcoming, not turfy, especially to those PIs that embrace their ideals are willing to share their knowledge and information networks. At any rate, the CI crowd is going to have to get used to the idea. ~Aimee 3640 From: Miguel Puchol Date: Sun Sep 2, 2001 6:13pm Subject: RE: Intelligence, Investigation, Spyin' (survey) An intel official once told me that they got tons of useful information by just cross-examining hundreds of local newspapers from all over the world, over the course of many days. It seemed amazing the kind of pictures that a good analyst could come up with by using this (and obviously other, more direct) sources. In any case it has been my impression that PIs mostly come up with evidence, but don't analyze it, they leave that to their costumers. In a husband-wife dispute, they would just take pictures of & gather other data about the offending family member, and give them to the other who contracted him, but wouldn't say anything else, they would leave their client to come up with his/her own conclusions. At least this is what it's like here in Spain, so I can't talk for other countries. But lately the trend is changing, now a lot of PI firms are also going into "intelligence" and "counter-intelligence", as they put it. Basically, they try to gather anything available by any means available, and that means sometimes using illegal or "unethical" methods - I try to distinguish both terms, there's a huge difference between the two. In any case, it seems to me that the corporate world is in an increasing need of good quality, contrasted intelligence on competition, and some will go past the line to get it. And there will always be those PIs (or consultants, attorneys, or whoever) willing to go past that line to get it for them. So, the dilemma is on where the line is drawn. Just my penny's worth, all the best, Mike > -----Mensaje original----- > De: Aimee Farr [mailto:aimee.farr@p...] > Enviado el: domingo, 02 de septiembre de 2001 20:32 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] Intelligence, Investigation, Spyin' (survey) > > > Before people start placing their manly parts on the table, and because I > started it with a hurried post... > > No conflict here. We are all feeling different parts of the > elephant that is > competitive intelligence, seeing different shades of meaning on > the wall of > the cave based on individual perspectives. (Plato's Allegory of the Cave.) > > All sorts of information collectors, skillsets and activities are part of > the legitimate competitive intelligence function. Still, holistic > competitive intelligence is a management theory. (See Jan P. Herring's > _Competitors_. Warning: makes legal treatises look like they should come > with a box of crayons.) Personally, I prefer the term "competitive > investigation" if it is mere factual gathering. > > Here is the survey about small-tyme spyin'.... > http://www.businesswire.com/webbox/bw.052301/211430137.htm > > FORT LAUDERDALE, Fla.--(BUSINESS WIRE)--May 23, 2001--The > Manufacturing > Marketing firm of TR Cutler, Inc. conducted a national survey of 462 > manufacturing companies with fewer than one thousand employees. Fifty-six > percent of the manufacturing respondents admitted to competitive spying in > the past twelve months. > According to Thomas R. Cutler, "Our survey findings validate that many > manufacturers are increasingly aware that they are losing business to the > competition and are taking measures to find out what the competition is > offering to win business." > Competitive spying was defined as using deception to determine > information about a competitor. The most popular method of competitive > spying was hiring outside organizations to gather bids, data, and client > information. > Cutler suggested, "The actual number is probably considerably higher, > since not everyone surveyed was willing to admit to these types of > activities. It reflects the increasingly competitive nature of > manufacturing." > ---- > > 56% -- the definition *included deception*, and they hire *outside > contractors*. This study was on small firms, so I'm willing to make an > "analytical leap," and say a significant number of those outside > contractors > are private investigators. > > With more buyers _AND_ PIs *new* to competitive intelligence, and > the stakes > ever-rising, the chances for litigation (or "term talks") are increasing. > The shampoo case is a perfect example of where even mere allegations of > something that could be "perfectly legal," can cost a client BIG BUCKS and > tarnish unblemished careers. The rules are different here. > > ~Aimee > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3641 From: James M. Atkinson Date: Sun Sep 2, 2001 6:52pm Subject: Call it intelligence or spying, it's here to stay Call it intelligence or spying, it's here to stay http://www.forbes.com/newswire/2001/09/02/rtr344643.html Reuters, 09.02.01, 2:42 PM ET By Carolyn Koo and David Howard Sinkman NEW YORK, Sept 2 (Reuters) - Executives beware: corporate supersleuths aren't going to stop picking through your garbage any time soon. Trying to stay a step ahead of the competition, companies are increasingly toeing a fine line between market intelligence and corporate espionage. Witness the revelation last week that Procter & Gamble Co. (nyse: PG - news - people) used covert means to gather intelligence about the hair care products of its main consumer products rival Unilever NV . This isn't the first recent case of corporate snooping by top tier American companies either. Oracle Corp. (nasdaq: ORCL - news - people) last year disclosed its detectives paid janitors to sift through Microsoft Corp.'s (nasdaq: MSFT - news - people) garbage in hopes of finding dirt to use against the software giant in court. But looking for information goes beyond picking through garbage. Sometimes it can cross legal and ethical lines. Alden Taylor, head of corporate intelligence at investigation firm Kroll Inc. (nasdaq: KROL - news - people), tells of a student who continuously clicked his pen while touring an unnamed European company. Executives thought the student was just hyperactive, but his pen was actually a sophisticated camera. Three years later, the company the student worked for released a product based on information from photos he took. FUZZY ETHICS Still, knowing what the competition is up to is a vital part of doing business. "A company would be stupid if they didn't try to know as much as they could about the products and activities of their competitors, as long as it is sort of public information, as long as it is out there for all to see," said Michael Hoffman, a philosophy professor and executive director of the Center for Business Ethics at Boston's Bentley College. Some 60 percent of companies have an organized system for collecting information on rivals, according to researchers at The Futures Group. Sniffing for information can be big business as a result. The market for business intelligence is worth about $2 billion a year worldwide, including services ranging from detective work to clipping news articles, Kroll's Taylor estimates. But the ethics of corporate intelligence can be fuzzy. "If you're selling Toyotas, I think it's appropriate to go buy a Honda and take it to your factory and find out if they're doing something better than you're doing," Professor Hoffman said. "But to go rifle around in Honda's garbage can, or to put surveillance equipment illegally in their offices, or to sit up in a building across from their factory with high-powered binoculars and spy on them, if not illegal that is certainly ethically questionable." NOT A NICE THING Stephen Miller, a spokesman for The Society of Competitive Intelligence Professionals, puts it another way. "Competitive intelligence is the legal and ethical collection and analysis of information about the competitive environment," said Miller. "Corporate espionage implies the theft of trade secrets, which is both illegal and unethical." Companies may shoot themselves in the foot if they engage in practices that are publicly revealed to be illegal or unethical. That alone can be the biggest incentive for companies to play by the rules. "Most companies act in a way that is not offensive because they do not want to be associaÙ???t consumers find offensive," said Peggy Daley, vice president for corporate investigative firm Pinkerton, America's oldest private investigation company. Companies that participate in corporate investigation have another take on the matter altogether. "In most cases if the trash is out, it's fair game, as long as there is no law," said Richard McCormick, head of Pinkerton's business risk division. "Shame on the person who allows himself to get chatted up on an airplane after too many drinks." Copyright 2001, Reuters News Service. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3642 From: A Grudko Date: Mon Sep 3, 2001 10:35am Subject: Intelligence, investigation & spying - Original Message - >And there will always be those PIs (or consultants, attorneys, or whoever) willing to go past that line to get it > for them. I've not seen the movie 'Traffic' yet, which deals with the drugs trade, but I recently read a review which makes me want to. Being primarilly in crime investigation, I'm interested in crime fiction if it's well researched, as this movie appears to be. My point, relevant to this thread, is that the movie deals with the high levels that drug money touches, from attorneys and bankers to State Presidents ('General' Noriega comes to mind). The same can be said of CI and I encourage those interested in intelligence matters to read 'Competitive Intelligence' by Larry Kahaner (Simon & Schuster, 1996) - the cover says 'From Black Ops to Boardrooms - '. CI professionals frequently say that '85% of what you want to know about your competition is in the public domain' and they then charge their clients fees to harvest and analyse some %age of it. What's not normally discussed is how you might get the 15% that's NOT in the public domain - which is the really 'valuable' stuff (and no, I don't support illegal surveillance/activities!). This was always a difficult area for me - I'd be speaking to a room full of eager CI people but I was critisised if I even hinted how the other 15% could be obtained. I was not promoting spying but was pointing out how spies work (on the principal of 'know thyne enemy'). As an example, I spoke at a government security briefing (SA ISOB) last year and touched on the illegal bugging activities of some PIs, and mentioned that ethical PI firms in SA, including mine, DO occasionally 'bug', but ONLY under the legal provisions of the Prohibition of Monitoring and Interception of Communications Act. Some 2 months later I was chastised by a local CI person for bringing CI into 'disrepute' by supporting 'phone tapping at that briefing and I was ORDERED by this self-appointed censor to close my SCIP-SA eGroup, which I obviously ignored. He simply didn't understand the difference between a legal and an illegal wiretap (which is perhaps excusable because he is not in our industry), and ignored the context, which was the investigation of criminal activity, not the collection of CI (which is NOT excusable because even 5 year olds know that LEOs can place suspects under legal surveillance). Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.icon.co.za/~agrudko/fp.htm , Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time "Experience is the name everyone gives to his mistakes" Oscar Wilde - A tribute to the late Roy Lawson. 3643 From: Aimee Farr Date: Mon Sep 3, 2001 6:15pm Subject: should read... Company puts secrets in trash: shareholders picket The US Economic Espionage Act: "We were stupid, we get to sue you because we were stupid." "Here, you dropped your trade secret." I wish I could say that's a candidate for the Darwinian Award, but it rewards stupidity. Andy wrote: > This was always a difficult area for me - I'd be speaking to a room full of > eager CI people but I was critisised if I even hinted how the other 15% > could be obtained. I was not promoting spying but was pointing out how spies > work (on the principal of 'know thyne enemy'). War Room, or Tea Party Room? > What's not normally discussed > is how you might get the 15% that's NOT in the public domain - which is the > really 'valuable' stuff (and no, I don't support illegal > surveillance/activities!). A lot of people question the really 'valuable' stuff as being secret. I see the argument, but sometimes I wonder if the private sector variables aren't a little different. Competitive Intelligence PowerPoint Pow-Wow with executive... Exec Q: "Who else knows about this?" A: "Everybody that wants to." Exec Q: "How is that a competitive advantage?" A: "Because I am the great super-analyst! I can tell you what it MEANS!" *executive mind-mice running in executive brain-wheel* $80,000 - $120,000 yr. analyst - $15,000 one-time spy-guy w/ primary source = $65,000 savings. Plus, the spy-guy is more fun, and he makes me feel like a powerful master-mind, instead of stupid, and his stuff is tainted with evil.....*ponder* [I don't mean to diss competitive intelligence pros, the diss is aimed at the exec. who probably didn't pay for a good competitive intelligence person] ----- Spying seems seriously high ROI for smaller U.S. firms who can't afford a competitive intelligence unit. What is their alternative? (Intelligence firms, interviewers, analysts = $$$) It used to be "down-spying" from the firms with the talent, and "up-intelligence" as employees got picked off from smaller firms. The intelligence flows are changing as smaller firms continue to embrace competitive intelligence theories -- it is more likely to be a gateway to espionage, much possibly done in ignorance. I also see the lay-offs from the tech sector. We could be moving to "up-spying" and "down/lateral-intelligence flows." I know everybody spies on everybody, but that's still a trend of significance. If you can't get the talent, you get the trix. Always been that way, but now... so much bigger of a problem. Furthermore, that's also a trend of significance for competitive intelligence professionals. See Andy? -- that's their loss, not yours. They are supposed to engage in cloaking, aren't they? if they don't have that skillset, they are less valuable. ~Aimee 3644 From: A.Lizard Date: Mon Sep 3, 2001 3:17am Subject: RE: Tricks of the corporate spying trade At 02:10 PM 9/2/01 +0000, you wrote: >________________________________________________________________________ >________________________________________________________________________ > >Message: 4 > Date: Sat, 1 Sep 2001 21:29:31 -0500 > From: "Aimee Farr" >Subject: RE: Tricks of the corporate spying trade > > >[snip] > >They differ considerably in the US. Many states have statutes on point, and >a more subtle issue is in states with express or implied privacy in the >state constitution. The "cop law" that people are looking at here.....the >balance is increasingly likely to weigh different in the private sector. 4th >Amendment privacy is for cops -- if you're private, you go to tort law. > >This site is very outdated: http://www.rbs2.com/privacy.htm#anchor666666 >(see Garbage privacy) > >Actually, this is well within the purview of being addressed by legislation, >as you can see by this identity-theft statute. > >Some privacy protection acts may give shelter, like this AZ bill: >http://www.azleg.state.az.us/legtext/45leg/1r/bills/hb2351h.pdf >Includes business customer record destruction/disposal requirements and... >E. ANY PERSON WHO, FOR ANY PURPOSE, USES PERSONAL INFORMATION 20 >CONTAINED IN RECORDS THAT WAS DISPOSED OF BY A BUSINESS IS LIABLE TO THE 21 Personally, I'd rather depend on shredders that meet the criteria posted by the moderator quite some time ago and on training of employees to *use* the shredders. Is there any reason not to shred *everything*? Larger facilities have the option of using paper pulping machines. Would *any* foriegn government extradite one of its nationals for going through the garbage of a US company? Would a state that doesn't have anti-garbage inspection laws extradite a resident for violating one in another state? The other point is that plenty of damage can be done with intel gathered via "dumpster diving" before any law can be enforced. If the results hit the newspapers, is a newspaper going to unprint all the copies of the embarrassing article based (knowingly or not) on salvaged documents printed the night before? Would Drudge do a complainant the favor of NOT publicizing a lawsuit threat? Better a "dumpster diver" waste lots of hours trying to paste thoroughly shredded confetti into usable documents. A.Lizard ************************************************************************ Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 3645 From: Paolo Sfriso Date: Mon Sep 3, 2001 10:23am Subject: GPS tracking antenna Dear Collegues. Has anybody field-tested an "under-vehicle" covert GPS tracker antenna ? Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 paulsfriso@t... www.grupposit.com [Non-text portions of this message have been removed] 3646 From: A Grudko Date: Tue Sep 4, 2001 4:29am Subject: Risk information - Original Message - From: Aimee Farr > Andy wrote: > > This was always a difficult area for me - I'd be speaking to a room full > of eager CI people but I was critisised if I even hinted how the other 15% > > could be obtained. I was not promoting spying but was pointing out how > spies work (on the principal of 'know thyne enemy'). > > War Room, or Tea Party Room? Breakfasts with a guest speaker every second month, all very civilised. I spoke twice on the methods used by corporate spies. I ronically I was on my way to day three of our second national CI conference when I rolled my car, costing me my left arm. > A lot of people question the really 'valuable' stuff as being secret. I see > the argument, but sometimes I wonder if the private sector variables aren't > a little different. My impression in this country - and perhaps in other countries - is that the differences are becoming less as national priorities on what are secrets (i.e. information which must be protected) change. It used to be that only government secrets had real protection under the law, but today criminal and civil law seems to moving in the same direction. Of course, one way to measure the perceived value of information is the cost which the owner will bare to protect it. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.icon.co.za/~agrudko/fp.htm , Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time "Experience is the name everyone gives to his mistakes" Oscar Wilde - A tribute to the late Roy Lawson. 3647 From: James M. Atkinson Date: Tue Sep 4, 2001 8:15am Subject: British defence secrets 'stolen' British defence secrets 'stolen' http://www.thisislondon.co.uk/dynamic/news/top_story.html?in_review_id=452981&in_review_text_id=403556 by Paul Cheston, Courts Correspondent A security guard appeared at the Old Bailey today charged with stealing secret documents "prejudicial to the safety or interests of the State" and "useful to the enemy". Rafael Bravo, 29, was arrested on 22 August by Special Branch officers who searched his Willesden flat. He is charged with four counts of obtaining documents belonging to British Aerospace contrary to the Official Secrets Act and one count of theft. Some of the areas covered by the documents include radars and attack helicopters. A defence source described the information Bravo is accused of stealing as "totally devastating" to British interests and British lives if it leaked out and "absolutely priceless" to an enemy. According to the charges the documents Bravo is accused of taking are: . Design requirement specification for Prophet Asic, designated a Nato secret. . DLH ship configuration and threat library data interface specification, designated "UK secret". . Das for the Wah-64 attack helicopter, designated "Secret UK eyes only". . Latest draft Zeus MDD, designated "UK secret". Prophet Asic is understood to be an electronic warfare system involving surveillance; the threat library data in the second charge would include secrets such as radar information; the third charge involves details of the defence aid subsystem of the Apache helicopter built by Westland; and the fourth involves a similar defence system for the Harrier jet. Bravo, who has cropped hair and glasses, was remanded in custody until 5 November. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3648 From: James M. Atkinson Date: Tue Sep 4, 2001 8:16am Subject: Sifting through garbage: Intelligence or spying? Sifting through garbage: Intelligence or spying? http://www.ciol.com/content/news/trends/101090301.asp Executives beware: corporate supersleuths aren't just going to stop picking through your garbage. With cut throat competition and an undying urge to stay ahead of the rest, companies are resorting to dubious ways to satisfy their needs. Oracle disclosed that its detectives paid janitors to sift through Microsoft garbage in hopes of finding dirt to use against the software giant in court. Reuters Monday, September 03, 2001 Carolyn Koo and David Howard Sinkman NEW YORK: Trying to stay a step ahead of the competition, companies are increasingly toeing a fine line between market intelligence and corporate espionage. Witness the revelation last week that Procter & Gamble Co. used covert means to gather intelligence about the hair care products of its main consumer products rival Unilever NV. This isn't the first recent case of corporate snooping by top tier American companies either. Oracle Corp. last year disclosed its detectives paid janitors to sift through Microsoft Corp.'s garbage in hopes of finding dirt to use against the software giant in court. But looking for information goes beyond picking through garbage. Sometimes it can cross legal and ethical lines. Alden Taylor, head of corporate intelligence at investigation firm Kroll Inc., tells of a student who continuously clicked his pen while touring an unnamed European company. Executives thought the student was just hyperactive, but his pen was actually a sophisticated camera. Three years later, the company the student worked for released a product based on information from the photos he took. Fuzzy ethics Still, knowing what the competition is up to is a vital part of doing business. "A firm would be stupid if they didn't try to know as much as they could about the products and activities of their competitors. As long as it is sort of public information, as long as it is out there for all to see," said Michael Hoffman, a philosophy professor and executive director of the Center for Business Ethics at Boston's Bentley College. Some 60 per cent of companies have an organized system for collecting information on rivals, according to researchers at The Futures Group. Sniffing for information can be big business as a result. The market for business intelligence is worth about $2 billion a year worldwide, including services ranging from detective work to clipping news articles, Kroll's Taylor estimates. But the ethics of corporate intelligence can be fuzzy. "If you're selling Toyotas, I think it's appropriate to go buy a Honda and take it to your factory and find out if they're doing something better than you're doing," Professor Hoffman said. "But to go rifle around in Honda's garbage can, or to put surveillance equipment illegally in their offices, or to sit up in a building across from their factory with high-powered binoculars and spy on them, if not illegal that is certainly ethically questionable." Not a nice thing Stephen Miller, a spokesman for The Society of Competitive Intelligence Professionals, puts it another way. "Competitive intelligence is the legal and ethical collection and analysis of information about the competitive environment," said Miller. "Corporate espionage implies the theft of trade secrets, which is both illegal and unethical." Companies may shoot themselves in the foot if they engage in practices that are publicly revealed to be illegal or unethical. That alone can be the biggest incentive for companies to play by the rules. "Most companies act in a way that is not offensive because they do not want to be associated with activities that consumers find offensive," said Peggy Daley, vice president for corporate investigative firm Pinkerton, America's oldest private investigation company. Companies that participate in corporate investigation have another take on the matter altogether. "In most cases if the trash is out, it's fair game, as long as there is no law," said Richard McCormick, head of Pinkerton's business risk division. "Shame on the person who allows himself to get chatted up on an airplane after too many drinks." (C) Reuters Limited 2001. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3649 From: Paolo Sfriso Date: Tue Sep 4, 2001 2:10am Subject: Link to the EU Parliament's Temporary Commitee on the Echelon interception system Link to the EU Parliament's Temporary Commitee on the Echelon interception system http://wwwdb.europarl.eu.int/oeil/oeil_ViewDNL.ProcedureView?lang=2&procid=5382 Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 paulsfriso@t... www.grupposit.com [Non-text portions of this message have been removed] 3650 From: Larry Hountz Date: Tue Sep 4, 2001 11:27am Subject: Wiretaps and the internet Hello: I have been reading about the US wiretap laws and being in the internet security business I have become concerned about wiretap law. I have been seeing more and more companies using monitoring devices log files and other types of software to tack user on they systems or accessing their websites. All of the laws are triggered only when the interception occurs. Therefore a sniffer or writing information to a log is the interception of data. Any comments or feedback Thanks Larry J Hountz 3651 From: Ray Van Staden Date: Wed Sep 5, 2001 4:51am Subject: Frequency Hopping Transmitter with Flashing Lights The electronics engineer who normally maintains my equipment told me an interesting story of the "Frequency Hopping Transmitter with Flashing Lights" . The engineer was recently given a device by a so called "TSCM expert" who found it hidden within a dry wall & asked to identify it as the TSCM Expert suspected it was "Frequency Hopping". On account when he connected a battery to it & the lights started flashing. The engineer quickly determined it was no transmitter, but one of the younger members in the work shop recognised the device as coming from the back of "training shoes" worn by some of the youth. --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 3652 From: A Grudko Date: Wed Sep 5, 2001 8:39am Subject: Transmitter with Flashing Lights ----- Original Message ----- From: Ray Van Staden > The engineer was recently given a device by a so called "TSCM expert" who found it hidden within a dry wall & asked to identify it as the TSCM Expert suspected it was "Frequency Hopping"...... > The engineer quickly determined it was no transmitter, but one of the younger members in the work shop recognised the device as coming from the back of "training shoes" worn by some of the youth. One has to wonder - if the expert had kept opening up the dry wall, would he have found the remains of the youth who wore the shoes, baseball cap on backwards and all?....and why the heck would someone hide a shoe LED flasher in a wall? Some of the list's SA members might remember a self professed Security Branch cop called George Mitchell. He was always a rebel, and one day in the mid '80s he asked me to rush to his office, next to Bara Hospital, Soweto - this was during the 'Total Onslaught' against communism in SA. He met me outside and excitedly showed me the 'bug' he had found in his 'phone (under the old style screw-in earpiece). It turned out to be a 1 cm length of black plastic IC storage tube which some wag had glued aluminium cigarette foil to, sealing both ends, with a 3 cm 'antenna' coming out of one end. I dined out on the long version of that story for years. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.icon.co.za/~agrudko/fp.htm , Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time "Experience is the name everyone gives to his mistakes" Oscar Wilde - A tribute to the late Roy Lawson. 3653 From: James M. Atkinson Date: Wed Sep 5, 2001 9:43pm Subject: Ex-FBI Analyst Pleads Guilty Ex-FBI Analyst Pleads Guilty http://www.newsday.com/news/nationworld/wire/sns-ap-fbi-arrest0904sep04.story?coll=sns%2Dap%2Dnationworld%2Dheadlines By Associated Press September 4, 2001, 11:20 PM EDT NEW YORK -- A former FBI security analyst pleaded guilty Tuesday and admitted involvement in a scheme to sell secret FBI information to organized crime figures. James Hill, 51, who worked in the FBI's Las Vegas bureau, pleaded guilty to conspiracy, obstruction of justice and other charges. He faces up to seven years and two months in prison at sentencing Dec. 7. A call to Hill's attorney was not immediately returned. Hill was one of 10 people, including former FBI agent Michael Levin, charged earlier this year in the scandal. Levin, who was working as a private investigator in Las Vegas, agreed to become a government informant following his arrest on June 13 in Oyster Bay, N.Y. He pleaded guilty to conspiracy, theft and other charges. Hill was arrested June 14 after the FBI caught him faxing Levin an FBI document about the target of a grand jury investigation, prosecutors said. Court papers accused Hill of providing Levin with hundreds of classified files since November 1999 on white collar crime, international alien smuggling and organized crime. Levin sold the inside information to reputed mobsters and other criminal defendants, the papers said. Copyright C 2001, The Associated Press -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3654 From: Marcelrf Date: Wed Sep 5, 2001 11:09pm Subject: Detecting the trackers Detecting the trackers Source: New Straits Times Publication date: 2001-09-05 BUGNOSIS is a Web bug detector. As users surf the Web, it analyses every page visited and alerts users when it finds any Web bugs. With Bugnosis, users do not have to be a code expert to tell when their browsing habits are being observed. Bugnosis runs a battery of tests on each suspicious graphic on a Web page when the users first open it. If the program finds a possible Web bug, it alerts users with a sound (uh-oh!) and gives some details about the Web bug in a little window. It also makes visible the Web bugs hidden on the page, so users can see where they are placed. In some cases, Bugnosis allows users to send an e-mail to the party that placed the Web bug. However, Bugnosis cannot detect spyware or surveillance software such, as key stroke or e-mail monitor. Bugnosis only detects Web bugs embedded in Web pages. The URL for Bugnosis is www.bugnosis.com. There are other products that protect users' online privacy. One such product is Norton Internet Security 2001 v.3. This all-in-one suite helps users defend their computer against viruses and other dangerous code with Norton AntiVirus. Also with Norton Personal Firewall, users can protect their PCs from hackers, while Norton Privacy Control safeguards personal information. It can prevent Web sites from tracking your actives with cookies. And with ad blocking, it keeps banner ads, pop-up windows, and other Web clutter off the screen. PGPMAIL Another product similar to that of Norton Internet Security 2001 version 3 is PGPmail and PGPfile Encryption - Message Privacy for e-mail, file attachments and ICQ instant messaging. PGPfile encrypts, decrypts, signs and verifies files for either e- mail or secure storage on the computer. PGPicq secures instant messaging communication. SAFE@HOME Desktop firewalls are another line of product which individuals can use to detect if they are being monitored. Essentially, they monitor external attacks and can be preconfigured to allow only specific individuals access. Any kind of probes will be blocked. These software can even block pings, distributed denial of service attacks, and other hacking or cracking attacks. Safe@home is one such product. Safe@Home, a product from Check Point Software Technologies, is a fully- integrated suite of Internet security and management products embedded in broadband devices such cable, DSL, satellite and wireless modems, for the home and home office broadband market. It is built on the FireWall-1 Internet security technology from Check Point. It protects the entire home and home office, including all PCs and other non-PC Internet-enabled devices from a single modem. It also offers remote security management capabilities for deployment by service providers as well. Its key features include the ability to be embedded in broadband modems that protects every device in the home with a single installation. Check Point's Stateful Inspection security technology provides network address translation (NAT), which allows multiple PCs to share a single Internet connection, which in turn shields each PC from being identified from outside for illegal purposes. -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 3655 From: James M. Atkinson Date: Thu Sep 6, 2001 9:10am Subject: Man Accused of Installing Spy Software Man Accused of Installing Spy Software By Laura Potts Associated Press Writer Thursday, Sept. 6, 2001; 6:30 a.m. EDT http://www.washingtonpost.com/wp-srv/aponline/20010906/aponline063055_000.htm LIVONIA, Mich. -- When Steven Paul Brown and his wife separated, authorities say he installed spy software on her computer that would allow him to track her every keystroke and read every file and message. Buying the software is perfectly legal, but if a court determines Brown used it the way Michigan Attorney General Jennifer Granholm thinks he did, it could land him in prison for up to five years, Granholm said Wednesday. "Just like breaking into someone's home, breaking into a person's computer is a crime," Granholm said. "These are crimes that hurt people because they make them feel vulnerable." Brown, 41, was charged with installing an eavesdropping device, eavesdropping, using a computer to commit a crime and having unauthorized computer access. He could not be reached for comment Wednesday. Granholm said Brown used a commercially available program called eBlaster to hack into his estranged wife's computer at her home in Warren this spring. The program caused all her Web surfing and Internet communication to be e-mailed to Brown as frequently as every 30 minutes without her knowledge, Granholm said. When Brown allegedly shared some of that information with his estranged wife's friend, the Michigan Attorney General's High Tech Crime Unit was alerted and investigators seized Brown's computer equipment. "People have to be very concerned about security," Granholm said. "You hate to be paranoid, but the reality is people get hacked all the time." The eBlaster software, made by Spectorsoft, is advertised as a way to monitor computers while away. The Vero Beach, Fla., company's Web site reads: "Are you concerned about what your spouse, employees or children do on the Internet while you're away? You can't always be around to watch over their shoulders, so hire a second pair of eyes with eBlaster." --- On the Net: Michigan Attorney General: http://www.ag.state.mi.us/index.asp eBlaster: http://www.spectorsoft.com/products/eblaster © Copyright 2001 The Associated Press -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3656 From: Marcelrf-iDEN Mobile Date: Thu Sep 6, 2001 9:47am Subject: [Fwd: 09/06/2001 - NLECTC News Summary] Law Enforcement & Corrections Technology News Summary Thursday, September 6, 2001. ***************************HEADLINES************************ "Police Snooper Camera Fight Still Alive" "Surveillance Cameras: Taking a Closer Look" "San Francisco Police Read Palms for Evidence" "Want a Car Stolen? Dumping in Mexico Isn't so Easy Anymore" "Pennsylvania State Police's High-Tech Crime-Fighting Tools Earn National Recognition" "New Technology Could Eliminate Need for Strip Searches" "Law Enforcers Report Spike in Cybercrime" "Vilas County Saves a Life With the Help of Technology" "Linking Public Safety Systems" "A Most-Wanted Web Site" "Information Technology: A Critical Addition to the Law Enforcement Arsenal" "Vested Interests" "Abuse Database Helps Cops" "CTIA Seeks Delay in E-Mail Interception Standards" "Public Safety Tilts Toward Wireless" "Fingerprinting Puts a More Foolproof Touch on Prime Time" ***************************ARTICLES************************* "Police Snooper Camera Fight Still Alive" Florida Times-Union (08/31/01) P. B1; Galnor, Matt Gwen Chandler-Thompson, a Jacksonville, Fla., councilwoman, is moving ahead with her plans to attempt to ban the use of facial recognition technology in her city. The equipment in question, currently on loan to Tampa, where it is used on weekends in the Ybor City entertainment district, compares images captured on surveillance cameras to a database of people wanted by the police. It was developed by N.J.-based Visionics, and first gained notoriety after it was used at the Super Bowl last January. (www.jacksonville.com) "Surveillance Cameras: Taking a Closer Look" New York Times (09/02/01) P. 6; Strunsky, Steve The public may not be aware that law enforcement agencies, casinos, retailers, and devious people are using sophisticated surveillance cameras, which sometimes can read the serial numbers on a dollar bill. However, New Jersey's Division on Civil Rights noticed when Caesar's Atlantic City employees were abusing the casino's eagle-eyed surveillance cameras by peering at women on the casino floor and on the escalators. Casino officials contend they are cooperating with authorities, but they would not disclose what action the casino would take. New Jersey Assemblymen Steve Corodemus and Tom Smith, meanwhile, recently saw the passing of their bill making it a crime to videotape intimate or sexual behavior without consent; it is currently awaiting a hearing before the Senate Judiciary Committee. In the meantime, Jersey City is home to Visionics, which provided surveillance cameras to Ybor City, Fla., where police monitor the city's entertainment district. Jersey City also uses Visionics cameras; city police have been able to arrest 64 individuals as part of the program, which the mayor intends to continue for the next two years. (www.nytimes.com/) "San Francisco Police Read Palms for Evidence" San Francisco Chronicle (09/04/01) P. A11; Hartlaub, Peter San Francisco law enforcement agencies finally caught up with technology with the recent installation of the first palm print database to be used in a major city by a police force. Law enforcement officials expect the $2.5 million system to decrease property crime by 15 percent to 20 percent. The Palmprint AFIS system, which was developed by Japanese NEC Technologies, works by matching palm prints with ones already entered into the database; the San Francisco Police Department computer currently holds 400,000 palm prints. Police officers expect the new system to solve crimes where fingerprints are not always present, such as when the criminal uses a baseball bat or steel rod. Meanwhile, law enforcement officers in Dayton, Ohio, also have access to a new palm print system, although it was created by another company. (www.sfgate.com/) "Want a Car Stolen? Dumping in Mexico Isn't so Easy Anymore" Associated Press (09/03/01); Fox, Ben If the U.S. economic downturn continues, law enforcement investigators expect so-called "owner give-up" cases to increase. In an owner give-up, the owner of a vehicle will purposely abandon it to collect the insurance payment. Mexico is a favored locale for people hoping that their vehicles are never recovered. According to experts, owner give-up cases are especially a big problem in Southern California, due to its close proximity to the Mexican border. Investigators become suspicious if they recover a vehicle reported to be stolen and find no harm to the ignition or other damage from forced entry. However, this does not constitute sufficient proof. To assist their searches, investigators began accessing data collected by the U.S. Customs' digital license-plate readers. The readers are placed at nine of the 34 border checkpoints and record the time at which a vehicle enters Mexico. (www.ap.org) "Pennsylvania State Police's High-Tech Crime-Fighting Tools Earn National Recognition" PRNewswire (08/29/01) A report by the Center for Digital Government recognized the Pennsylvania State Police Department (PSPD) as a "Best of Breed Program" for its innovative, wide-ranging utilization of computer technology to combat crime. The California-based group recently released its 2001 Digital State Survey, in which the State Police are recognized. In a continued effort to improve its department, the PSPD are installing computers in their patrol vehicles enabling troopers to have instant access to vehicle and crime information databases. The new computers will also allow the troopers to record information and prepare reports in their vehicles. In the future, the law enforcement agency plans to create computer-aided dispatch centers, as well as integrate bar-code scanning technology for evidence processing. (www.prnewswire.com) "New Technology Could Eliminate Need for Strip Searches" Associated Press (09/04/01) The Rapiscan Secure 1000's ability to see items under clothing and in body cavities may eliminate the need for prison guards to perform strip searches. The device offers the advantage of letting guards search at a physical distance from the inmates and allowing for saving of data for use as evidence. Porter County, Ind., Jail Warden Joe Widup is concerned about the Rapiscan's high price of between $100,000 and $130,000, and thinks that a significant surge in smuggling cases would be necessary to warrant the cost of such an instrument. (www.ap.org) "Law Enforcers Report Spike in Cybercrime" USA Today (08/31/01) P. 1B; Iwata, Edward Cybercrime units in high-tech areas of the United States, including Silicon Valley, Boston, and Austin, are reporting an increase in incidents of hacking, theft of trade secrets and hardware, and other computer crimes. Last year, a poll of 273 businesses conducted by the Computer Security Institute revealed that those firms lost $266 million to cybercrime, and the software industry estimates that it lost $12 billion in sales to piracy last year. The increase in reported incidents is largely due to the tightening economy, and the fact that many companies simply do not have the resources to investigate and prosecute cases. While in the past, many firms would not have reported an incident of a computer security breach, fearing that doing so would tarnish their reputation among consumers, now more cooperation exists between private companies and law enforcement agencies. IBM and Microsoft are among the giants that have taken an active role in stemming software piracy. (www.usatoday.com/) "Vilas County Saves a Life With the Help of Technology" Spillman News Release (09/04/01) Vilas County, Ind.'s Sheriff's Office's communications center, with the assistance of its software system from Logan, Utah-based Spillman Technologies, was recently able to keep a man from killing himself. A call screener at the area psychiatric hospital accepted a call from the man who was threatening to commit suicide; although he did not identify himself or where he was, with the help of caller ID, the call screener obtained the man's cell phone number and sent it on to the sheriff's office's communications dispatch center. The dispatcher who answered the call looked on the Spillman system's contact screen under the phone number field. Due to a previous call the man had made about a separate matter, the county had already established a name record for him. Therefore, the cell phone number was located and the dispatcher was able to look up this man's record to determine his location. Officials from the sheriff's department were able to respond to the situation and convince the man not to commit suicide. Through Spillman's Involvements screen, which tracks name data and any other incidents linked with a specific name, the dispatcher was able to find as well the name and location of the man's girlfriend to ascertain her safety. (www.spillman.com) "Linking Public Safety Systems" Civic.com (08/27/01); Sarkar, Dibya Kelly Harris, director at Justice Information Technology Services for SEARCH--a Sacramento-based, nonprofit consortium offering technical assistance to integrate information systems employed by state and local governments--believes that such integration improves the decision-making of officials working at justice, public safety, or social service agencies. She adds that integration offers a wide variety of other advantages, including improved efficiency, greater public access, and lower data entry errors. At least 38 states, along with 18 municipalities, are currently developing systems able to link different government agencies, according to the consortium's Web site. However, Harris notes it could still be some time before these systems are operational due to political issues surrounding their implementation. "A Most-Wanted Web Site" KM World Online (08/01); Weinberger, David The Seminole County Sheriff's Office in Florida hosts a Web site used by law enforcement agencies worldwide and by the public to track on-the-move criminals. The site contains more than 8,000 images of felons and advisories about fugitives' activities, as well as information about missing and endangered citizens and links to crime prevention and citizen safety sites. Seminole County's crime rate is half of that of the rest of the state, thanks to the crime-prevention efforts like the Sheriff's Office site, says special project coordinator and Web master, Pete Robinson. Administrators recently revamped the site, improving its speed by 30 percent and cutting down on the amount of time it takes to process a criminal from 18 minutes to less than seven minutes. (www.kmworld.com) "Information Technology: A Critical Addition to the Law Enforcement Arsenal" Sheriff (08/01) Vol. 53, No. 4, P. 18; Johnson, Terrance A.; Rivers, Elizabeth Computer-based Information Systems (CBIS) can increase response times and reduce costs to public safety operations. CBIS technology is comprised of the many information technology systems used by management to further their goals. The implementation of IT resources often heightens the need for more personnel to operate the systems. However, incorporating wireless systems would allow more police officers to continue their street duties. The deployment of CBIS can dramatically increase the efficiency of public safety agencies, which results in more lives being saved. For instance, the Baltimore City Police Department (BCPD) reports that implementation of its CBIS program has improved the amount of time required for operators to answer 911 calls by 67 percent. Meanwhile, public safety agencies located in Huntsville, Ala., have developed a 911 system that incorporates a Geographic Information System (GIS) and connects with local law enforcement. (www.sheriffs.org) "Vested Interests" Police (08/01) Vol. 25, No. 8, P. 40; Hayes, Gila Body armor manufacturers have taken a number of different approaches in making their product accommodate the female figure, including the use of darts, a princess-style bodice design, and custom-order fits. The companies profiled for the article on female body armor include Second Chance; Safariland; American Body Armor; Protective Apparel Corporation of America; Point Blank Body Armor; Pacific Safety Products; Reliance Armor Systems; and U.S. Armor. Second Chance relies on darts, detachable side straps, and full Velcro adjustability to achieve a better fit, while the front panel fabric of Safariland's Zero-G Female vest drapes over the bust line to adapt to different brassiere cup sizes. American Body Armor uses a flexible trauma insert, which molds itself to different contours, in its unique carrier that has back and front "shirt tails" to keep the vest in place. The company has also invented, in collaboration with Comfort Technologies, the Akwadyne Comfort Management System of fabrics, which can wick moisture and heat away in hot weather and trap heat inside in cold weather. Point Blank Body Armor has increased the comfort and concealability of their vests by producing a v-neck design, while Reliance Armor Systems is designing a female vest with a three-part front panel sewn in a princess-cut design that resulted in trauma reduction for the abdominal area and on the sides. Finally, U.S. Armor uses a modified princess-cut design, with a pair of seams in the front panel, and measurements taken to the quarter-inch to accommodate women's bust lines. (www.policemag.com/) "Abuse Database Helps Cops" Federal Computer Week Online (08/23/01); Sarkar, Dibya The Protection From Abuse Database (PFAD), which contains full text of active and archived materials from domestic violence cases, has been started by the Pennsylvania Coalition Against Domestic Violence. The voluntary database, which is being used by law enforcement in 40 of the state's 64 counties, was funded by a $2.2 million federal grant. Susan Emmons, a senior attorney with the Pennsylvania Coalition Against Domestic Violence, notes that reducing the time necessary for a police officer to check the paper documents pertaining to domestic violence cases can save lives in some situations. Jurisdictions using the PFAD can receive training and technical support from the coalition. (www.fcw.com) "CTIA Seeks Delay in E-Mail Interception Standards" Computerworld Online (08/27/01); DiSabatino, Jennifer The Cellular Telecommunications & Internet Association (CTIA) is lobbying the FCC for more time to develop standards for the interception of targeted wireless emails. Carriers must comply with the Communications Assistance for Law Enforcement Act, which stipulates that they be ready to help police and FBI agents find specific messages sent via their networks. But so far, companies have been unable to come up with a solution because of the different ways in which they package data for transmission. According to a letter sent from the CTIA to the FCC asking for a delay in finding a solution, the FBI's Carnivore digital snooping device is the only technology able to read wireless data regardless of platform. The FBI has said it does not consider Carnivore a solution and is looking to limit its use in the future in favor of having the industry self-monitor instead. (www.computerworld.com) "Public Safety Tilts Toward Wireless" m-business (08/01) Vol. 1, No. 8, P. 61; Bruzzese, Stephanie Law enforcement agencies across the United States are increasingly turning to wireless data devices as a means of rapidly retrieving essential information in emergency situations. Yankee Group estimates that 90,000 public employees now use such technology, and by 2003, it predicts that the number will grow to 3.7 million in the emergency services sector. Wireless technology reduces the number of calls that go to dispatch operators, and allows users, such as police officers, to gain instant access to databases containing such information as criminal histories, building plans, staff whereabouts, etc. However, the lack of infrastructure to support the widespread use of such technology, especially in the Midwest, along with the relatively high implementation costs, is proving a drawback to its adoption by many groups. Med-Media, a public safety wireless provider, is encouraging carriers to build cell towers in areas where they are needed. (www.mbusinessdaily.com) "Fingerprinting Puts a More Foolproof Touch on Prime Time" Washington Technology (08/27/01) Vol. 16, No. 11, P. 10; Jackson, Joab NASA decided to pay 50 percent more to convert from access-card security to Toronto-based BioScrypt's fingerprint-scanning system in order to make its Triana Science and Operations Center more secure. Industry observers feel that lower hardware prices and new interoperability standards will lead to fingerprint scanning becoming more prevalent in the near future. Last year's $25 million fingerprint system market is expected to reach $290 million in the next five years, according to Frost & Sullivan. Industry observers believe that making software and other component compatible over an enterprise-wide system is the top impediment to fingerprint scanning becoming more pervasive. Another potential problem is the lack of a common standard, with each provider offering proprietary models. Damon Wait, director of investor relations at Sunnyvale, Calif., identification solution provider Identix, points out that eliminating the costs of help-desk calls for forgotten passwords can actually make fingerprint scanning cheaper at the enterprise level than existing security systems. (www.washtech.com) ************************************************************ 3657 From: David Alexander Date: Thu Sep 6, 2001 11:01am Subject: re: Detecting the trackers I've been using Bugnosis for some time now. I can confirm that it's good at detecting the bugs, as described. The only downside is the annoying high-pitched 'uh-oh' sound every time it finds a web bug. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 3658 From: Scott Malcolm Date: Thu Sep 6, 2001 11:39am Subject: re: newspapers >From: David Alexander >Subject: re: newspapers >you forgot >The National Enquirer is read by people who don't care who runs the country, >as long as she is blond, well-endowed and sleeping with someone famous. _____________________________________________________________ David, Who cares if there famous. http://ipl.sils.umich.edu/reading/news/ Regards, Scott Malcolm Malcolm & Associates, Inc. Serving the State of Wisconsin http://www.execpc.com/~conf-pi Office 262 965 4426 / Fax 262 965 4629 3659 From: James M. Atkinson Date: Thu Sep 6, 2001 7:48pm Subject: MI5 offers to spy for British firms MI5 offers to spy for British firms http://news.independent.co.uk/uk/politics/story.jsp?story=92810 By Steve Boggan 07 September 2001 MI5 has told some of Britain's biggest companies that it may be prepared to provide intelligence on their business partners and rivals abroad. For the first time, the security service this week openly invited representatives from industry and finance to its headquarters in Millbank, London, for a seminar called Secret Work in an Open Society. The Independent has learnt that in between coffee and a buffet lunch, those attending were given a talk by Sir Stephen Lander, MI5's director general, on "What is the security service for?", during which he said companies ought to ask for help more often. Since the end of the Cold War, MI5 has been trying to evolve into a service more interested in catching criminals and terrorists than foreign spies. This week's move will be seen as another attempt to re-invent itself as a more user-friendly service. Among the companies invited to attend were BT, Rolls-Royce, HSBC, Allied Domecq, Consignia, BP, Ernst & Young, Cadbury Schweppes and BAE Systems. Of the 64 executives invited, a high proportion were in market development, security or risk-assessment. "Sir Stephen said he was sure that MI5 could help business more if only it were asked," said one delegate. "In situations where we are working abroad, he said MI5 might have information on companies or individuals it could help us with if it did not involve breaching legislation on data protection or human rights. "He made the point that, increasingly, organised crime, drugs and money laundering are our common enemy. When getting into deals abroad - particularly Eastern Europe at the moment - you can get into bed with the wrong people if you don't have good risk- assessment information on them. Basically, he was anxious that MI5 shouldn't be thought of solely as a domestic organisation ... In return, he said there might be occasions when we can pass information back." The list of delegates gives an insight into the sort of executive MI5 is trying to reach: Nigel Carpenter, BP's deputy head of group security in the eastern hemisphere; Mike McGinty, security director at BAE Systems; Mike Harris, information security manager for Consignia; Michael Weller, BT's head of government security; and John Smith, head of security for the Prudential Corporation. The seminar was organised in conjunction with the Whitehall and Industry Group, a body that aims to bridge the gap between business and government. Its patrons include Lord Haskins, chairman of Northern Foods and the Better Regulation task force in the Cabinet Office; Sir Andrew Turnbull, permanent secretary to the Treasury; Sir George Mathewson, chairman of the Royal Bank of Scotland Group; Sir Richard Wilson, Cabinet Secretary and head of the Home Civil Service; and Digby Jones, director general of the Confederation of British Industry. The practice of using the country's intelligence service to benefit companies is one performed in the United States for a number of years. There is evidence that it has used a communications eavesdropping system called Echelon to gather sensitive information on rivals in the European Union that has been passed on to US business. There is no suggestion that the British services intend to go that far, but this is thought to be the first time MI5 has brought in so many senior executives. Even though they were not explicitly asked to keep the meeting secret, none of the delegates approached by The Independent yesterday returned calls. In spite of a number of approaches, MI5 failed to comment. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3660 From: Miguel Puchol Date: Fri Sep 7, 2001 5:08am Subject: RE: MI5 offers to spy for British firms I really have no idea of what is going on in MI5's heads' heads, to be redundant...if the choose to go this way, they could end up with multi-million dollar lawsuits thrown at them, like the recent P&G scandal. Besides, I believe it is a terrible compromise of internal security for such an intelligence agency to interact with the private sector on this level. Cheers, Mike > -----Mensaje original----- > De: James M. Atkinson [mailto:jmatk@tscm.com] > Enviado el: viernes, 07 de septiembre de 2001 2:48 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] MI5 offers to spy for British firms > > > > MI5 offers to spy for British firms > > http://news.independent.co.uk/uk/politics/story.jsp?story=92810 > > By Steve Boggan > 07 September 2001 > > MI5 has told some of Britain's biggest companies that it may be > prepared to > provide intelligence on their business partners and rivals abroad. > > For the first time, the security service this week openly invited > representatives from industry and finance to its headquarters in Millbank, > London, for a seminar called Secret Work in an Open Society. > > The Independent has learnt that in between coffee and a buffet > lunch, those > attending were given a talk by Sir Stephen Lander, MI5's director general, > on "What is the security service for?", during which he said > companies ought > to ask for help more often. > > Since the end of the Cold War, MI5 has been trying to evolve into > a service > more interested in catching criminals and terrorists than foreign spies. > This week's move will be seen as another attempt to re-invent itself as a > more user-friendly service. > > Among the companies invited to attend were BT, Rolls-Royce, HSBC, Allied > Domecq, Consignia, BP, Ernst & Young, Cadbury Schweppes and BAE > Systems. Of > the 64 executives invited, a high proportion were in market development, > security or risk-assessment. > > "Sir Stephen said he was sure that MI5 could help business more if only it > were asked," said one delegate. "In situations where we are > working abroad, > he said MI5 might have information on companies or individuals it > could help > us with if it did not involve breaching legislation on data protection or > human rights. > > "He made the point that, increasingly, organised crime, drugs and money > laundering are our common enemy. When getting into deals abroad - > particularly Eastern Europe at the moment - you can get into bed with the > wrong people if you don't have good risk- assessment information on them. > Basically, he was anxious that MI5 shouldn't be thought of solely as a > domestic organisation ... In return, he said there might be occasions when > we can pass information back." > > The list of delegates gives an insight into the sort of executive MI5 is > trying to reach: Nigel Carpenter, BP's deputy head of group > security in the > eastern hemisphere; Mike McGinty, security director at BAE Systems; Mike > Harris, information security manager for Consignia; Michael Weller, BT's > head of government security; and John Smith, head of security for the > Prudential Corporation. > > The seminar was organised in conjunction with the Whitehall and Industry > Group, a body that aims to bridge the gap between business and government. > Its patrons include Lord Haskins, chairman of Northern Foods and > the Better > Regulation task force in the Cabinet Office; Sir Andrew Turnbull, > permanent > secretary to the Treasury; Sir George Mathewson, chairman of the > Royal Bank > of Scotland Group; Sir Richard Wilson, Cabinet Secretary and head of the > Home Civil Service; and Digby Jones, director general of the Confederation > of British Industry. > > The practice of using the country's intelligence service to benefit > companies is one performed in the United States for a number of > years. There > is evidence that it has used a communications eavesdropping system called > Echelon to gather sensitive information on rivals in the European > Union that > has been passed on to US business. > > There is no suggestion that the British services intend to go > that far, but > this is thought to be the first time MI5 has brought in so many senior > executives. > > Even though they were not explicitly asked to keep the meeting > secret, none > of the delegates approached by The Independent yesterday returned > calls. In > spite of a number of approaches, MI5 failed to comment. > -- > > ---------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ---------------------------------------------------------------------- > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008jmatk@tscm.com > ---------------------------------------------------------------------- > Come, my friends, > 'Tis not too late to seek a newer world. > Push off, and sitting well in order smite > The sounding furrows; for my purpose holds > To sail beyond the sunset, and the baths > Of all the western stars, until I die. > - Tennyson, "Ulysses" > ---------------------------------------------------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3661 From: Paul McDonald Date: Thu Sep 6, 2001 9:20pm Subject: Looking for Work Hello Group, I'm a Private Investigator in Minnesota and things are a little slow right know, I'm looking to see if anyone needs help or has any online work that I can do? Also I could do courthouses. Please send your reply to Mplsmnpi@c... Thank you mplsmnpi@c... From: Thomas Shaddack Date: Tue Sep 2, 2003 11:48am Subject: Re: xp-pro...laptop > I need some help...i have xp-pro loaded on a toshiba satellite > laptop...the password in the start up has been changed...not the xp > start up ,but the system start up...how can i get in this machine to > change the pass word back so i can use this machine...thaks for you > help in advance... One method is here: http://www.expage.com/page/toshibapassword Please let me know if it worked. The same method, and another one (a parallel port dongle) is here: http://www.plasma-online.de/english/help/solutions/bios_password_toshiba.html I successfully used the dongle approach couple years ago on a Toshiba, but don't remember anymore what type it was. Here is a more universal and more esoteric method. Quite many modern laptops and modern motherboards don't have a CMOS RAM anymore - the battery is only for the RTC chip, the BIOS setting is in a serial EEPROM, usually something like 24C08. Some time ago I developed a quite universal method how to deal with these. (A friend developed the same method independently, and I believe we are by far not the only authors as it is quite self-evident.) The EEPROM chips are usually I2C. We need the BIOS to either misread the EEPROM content (and reset to factory defaults), or to read null password. Disassemble the laptop. Find the EEPROM chip (usually a 8-pin SMD case), solder a thin enameled wire to its SDA pin. Reassemble the laptop. Switch it on. If you have an oscilloscope, watch the activity on SDA. We need to ground it at the right moment. The right moment may be the very bootup (though in many cases the I2C bus is then disabled and a lot of the chipset won't be initialized and the laptop refuses to run at all), or - more often - when it asks for the password. Ground the wire, press Enter, unground the wire. You should be in at that moment. Get to BIOS (if you will be asked for password again, repeat the process), disable or re-set password there. If you have the right equipment, you may desolder the EEPROM chip and reprogram it with eg. PonyProg programmer. You may also try to replace it with an empty chip, letting the laptop think it just left the assembly line. But this way is risky and you may damage the PCB. You may also take a dental whatever, and pull up the VCC, SCL, and SDA pins from the PCB and solder thin wires to them and then use a regular chip programmer. 7714 From: mooty_7 Date: Tue Sep 2, 2003 7:51pm Subject: and the winner is "TOSHIBA BIOS Most Toshiba laptops and some desktop systems will bypass the BIOS password if the left shift key is held down during boot" thanks so much for your time and help.....the left shift key idea worked.....says alot for bios pass word security huhhh 7715 From: Date: Tue Sep 2, 2003 8:52pm Subject: [Fwd: {Spam?} Fw: THE LOVING HUSBAND] ---------------------------- Original Message ---------------------------- Subject: {Spam?} Fw: THE LOVING HUSBAND From: "evans" Date: Tue, September 2, 2003 6:27 pm To: "Clg" -------------------------------------------------------------------------- The Loving Husband Several men are in the locker room of a golf club. A cell phone on a bench rings and a man engages the hands free speaker- function and begins to talk. Everyone else in the room stops to listen. MAN: "Hello" WOMAN: "Honey, it's me. Are you at the club?" MAN: "Yes" WOMAN: "I am at the mall now and found this beautiful leather coat. It's only $1,000. Is it OK if I buy it?" MAN: "Sure, go ahead if you like it that much." WOMAN: "I also stopped by the Mercedes dealership and saw the new 2003 models. I saw one I really liked." MAN: "How much?" WOMAN: "$60,000" MAN: "OK, but for that price I want it with all the options." WOMAN: "Great! Oh, and one more thing....the house we wanted last year is back on the market. They're asking $950,000." MAN: "Well, then go ahead and give them an offer, but just offer $900,000." WOMAN: "OK. I'll see you later! I love you!" MAN: "Bye, I love you, too." The man hangs up. The other men in the locker room are looking at him in astonishment. Then he asks: "Anyone know who this phone belongs to?" ____________________________________________________ IncrediMail - Email has finally evolved - Click Here [Non-text portions of this message have been removed] 7716 From: Date: Tue Sep 2, 2003 10:25pm Subject: Re: and the winner is woooooohooooooooo! hey thank YOU Mooty, that was ME!!! i am so happy to help you! it was a pleasure. so what did i win? LOL have a good one, it sux to be locked off your laptop, tell me about it! On Wed, 3 Sep 2003 12:51am, mooty_7 wrote: > "TOSHIBA BIOS > Most Toshiba laptops and some desktop systems will bypass the BIOS > password if the left shift key is held down during boot" > > thanks so much for your time and help.....the left shift key idea > worked.....says alot for bios pass word security huhhh > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 7718 From: Cornolio Date: Wed Sep 3, 2003 5:07pm Subject: GSM : listen in to a call while it is still at the ringing stage ... http://www.eetimes.de/at/news/OEG20030903S0018 GSM Association downplays mobile security concerns von John Walko September 3, 2003 (4:13 p.m. GMT) LONDON - The GSM Association is playing down concerns raised by a team of Israeli scientists about the security of GSM mobile calls. The researchers, from the Technion Institute of Technology in Haifa, revealed they had discovered a basic flaw in the encryption system of the GSM (Global System for Mobile)specification, allowing them to crack its encoding system. The GSM Association, which represents vendors who sell the world's largest mobile system, confirmed the security hole but said it would be expensive and complicated to exploit. Eli Biham, a professor at the Technion Institute, said he was shocked when doctoral student Elad Barkan told him he had found a fundamental error in the GSM code, according to a Reuters report on Wednesday (Sept. 3). The results of the research were presented at a recent international conference on cryptology. "We can listen in to a call while it is still at the ringing stage, and within a fraction of a second know everything about the user," Biham told the news agency. "Then we can listen in to the call." "Using a special device it's possible to steal calls and impersonate callers in the middle of a call as it's happening," he added. GSM code writers made a mistake in giving high priority to call quality, correcting for noise and interference and only then encrypting, Biham said. The GSM Association said the security holes in the GSM system can be traced to its development in the late 1980s when computing power was still limited. It said the particular gap could only be exploited with complex and expensive technology and that it would take a long time to target individual callers. "This [technique] goes further than previous academic papers, [but] it is nothing new or surprising to the GSM community. The GSM Association believes that the practical implications of the paper are limited," the group said in a statement. The association said an upgrade had been made available in July 2002 to patch the vulnerability in the A5/2 encryption algorithm. It said any attack would require the attacker to transmit distinctive data over the air to masquerade as a GSM base station. An attacker would also have to physically stand between the caller and the base station to intercept the call. The researchers claimed they also managed to overcome the new encryption system put in place as a response to previous attacks. 7719 From: Jay Coote Date: Thu Sep 4, 2003 7:48pm Subject: Nortel Digital-to-Analog Adapter? A client is also asking me to play "phone guy" and connect an analog fax machine to a digital line. The switch is a recent-model Nortel. Is there an adapter that will do this? Thanks, Jay Coote Los Angeles Specialist in Technical Surveillance Countermeasures Lic: PI17926 TSCM@j... 7720 From: Steve Uhrig Date: Thu Sep 4, 2003 8:37pm Subject: Carrrier current sniffing In keeping with the mission of this list (which is a long way from jokes ...) I was in a discussion recently with a competent sweeper, and will share the following regarding signals riding on the AC power lines, called 'carrier current' or 'subcarriers'. They're cheap and simple to both implement and detect, and you should test for them. Save this message. It is important. ============= > how would you locate a carrier current signal buries in the noise floor > of an AC line? Wouldn't I see it on my o-scope? If the signal is buried in the noise floor, the bloody receiver won't recover it. Common sense. A competent physical search will find nearly anything. Some feel differently. Everyone has the right to be wrong. If the signal is below the noise floor, the scope probably would have a problem. Carrier current is not magic and it's not spread spectrum. You have to have some signal to work with. Even if it is there, if it's unusable it's not a threat. You can always inject your own signal into the power line if you're concerned, and jam any hostile signal. Carrier current devices modulate an oscillator and maybe a subsequent power amp with desired audio in either AM or FM. Frequency can vary from maybe 50 kc to 500kc. I tend to hang around 300 kc just out of habit. Higher frequencies have more path loss on AC power wiring which is designed to pass 60 cycles only. Lower frequencies are harder to filter out. AM transmission is much cheaper and simpler circuitry for both the transmitter and receiver, however it's far less effective than FM because noise is AM. FM has all the advantages of FM, meaning mostly not affected by impulse noise on the power lines. However, the TX and RX are much more involved so if low cost is a factor you may not see FM as often. Due to the low frequencies involved, components, especially Ls and Cs, tend to be somewhat large. I don't see a transmitter being buried in an outlet box, for example. The entire transmitter might be nearly the size of a single gang box. So your physical search will be easier. Carrier current signals will not cross power phases, so in standard 220 VAC with center neutral single phase building power wiring, you only have a 50/50 chance of being on the proper phase anyway, with a listening post or a sweep receiver. I check several outlets on several branches in the same room and adjacent ones with my ancient but excellent Capri carrier current receiver (long out of production; the Kaiser piece also is excellent), to make sure I am on both phases. You can add a .1mfd 600VAC cap across the phases to couple some carrier current signal between phases, but it's inefficient. I have added this cap right at 220V powered electric stove and clothes dryer outlets so I didn't have to go into the electrical panel to get to both phases in jobs where I am trying to send housekeeping data across the power lines. Turning on a 220V powered device (which obviously are connected to both phases) will couple enough signal between phases through the device to let you sniff anything present from either phase. Few know this. Turn on an (electric) oven or 220 VAC clothes dryer while you're doing a carrier current inspection. Oven is better as it is purely resistive, where a dryer can introduce inductance and motor noise onto the mains. You also can go to the breaker panel and clip your carrier current receiver onto neutral, then one phase, then the other phase. That will let you hear anything there is to hear regardless of the circuit it's on. BE CAREFUL. Carrier current signals also do not pass through (60 cycle) transformers, so the listening post, if any, needs to be on the same side of the pole pig or whatever as the transmitter. While theoretically it is possible to put capacitors across the transformers to pass some signal, I've never seen this done in the real world for surveillance purposes. The power company has some couplers around the transformers as they send telemetry and some command down the power lines, but those couplers are resonant circuits tuned to a specific frequency. They won't pass any surveillance audio on a different frequency, and you can't use the same frequency as the coupler is tuned to since the utility is flowing data on that frequency. Sounds like hash, or a series of burps. I've never seen nor heard of a genuine carrier current intercept in the private sector. That doesn't mean they don't exist and shouldn't be a part of your inspection however. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7721 From: Robert Dyk Date: Fri Sep 5, 2003 6:54am Subject: RE: Nortel Digital-to-Analog Adapter? All you require is a so called "ATA" Analog telephone adapter from Nortel. Any dealer will have this in stock. Good Luck Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. > -----Original Message----- > From: Jay Coote [mailto:TSCM@j...] > Sent: July 10, 2893 6:44 PM > To: tscm-l@yahoogroups.com > Subject: [TSCM-L] Nortel Digital-to-Analog Adapter? > > > A client is also asking me to play "phone guy" and connect an > analog fax machine to a digital line. The switch is a > recent-model Nortel. Is there an adapter that will do this? > Thanks, > Jay Coote > Los Angeles > Specialist in Technical Surveillance Countermeasures > Lic: PI17926 > TSCM@j... > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 7722 From: Robert Dyk Date: Fri Sep 5, 2003 6:59am Subject: RE: Nortel Digital-to-Analog Adapter? Sorry, forgot to add, Most recent model Nortel KSU's can be programmed to accept an analog device on any available port. This feature is built in depending on the the model and year of manufacture. Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. > -----Original Message----- > From: Jay Coote [mailto:TSCM@j...] > Sent: July 10, 2893 6:44 PM > To: tscm-l@yahoogroups.com > Subject: [TSCM-L] Nortel Digital-to-Analog Adapter? > > > A client is also asking me to play "phone guy" and connect an > analog fax machine to a digital line. The switch is a > recent-model Nortel. Is there an adapter that will do this? > Thanks, > Jay Coote > Los Angeles > Specialist in Technical Surveillance Countermeasures > Lic: PI17926 > TSCM@j... > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 7723 From: Steve Uhrig Date: Fri Sep 5, 2003 8:54pm Subject: CPM-700 FS Available for immediate shipment anywhere in the world is a NEW CPM- 700 with all accessories. This is called the 'Ultra' kit. The receiver has been checked, but none of the accessories even have been opened. All options are included, specifically: Receiver Black ballistic nylon carrying case 110VAC power supply/charger (220V available on request) Standard probe Carrier current probe Audio input cords Headphones VLF probe Infrared probe Acoustic leakage probe Magnetic leakage probe (for tape recorders) Modular (telephone) adapter Tape recorder patch cord Cigarette lighter power cord Complete product details here: http://tinyurl.com/mf2h This is current production, latest model with all gingerbread, brand new, at an excellent price. If you do your part, this is a good basic kit for inspecting for both radiated and conducted threats. Can take credit cards. Price $1850, which is a lot less than $2575 end user. BONUS: will include a medium power, battery operated UV light for that portion of your inspection, at no extra charge. Also have a used unit, basic without all the accessory probes, for $1500. Excellent working condition, to factory in July for latest mods installed and complete checkout. Either would be good for first kit, spare kit, extra kit for an assistant or second location, kit to leave somewhere you sweep often so you don't have to carry it every time you travel (I have separate TSCM gear in Bogota and Mexico City to avoid the expense and hassles of transporting it every time). Etc. Holler if interested. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7724 From: Date: Sat Sep 6, 2003 6:17am Subject: Thank you! Please see the attached file for details. [Non-text portions of this message have been removed] 7725 From: kondrak Date: Sat Sep 6, 2003 0:49pm Subject: RFID: We Know What Your Buying > >We Know What You're Buying > >Will a new batch of wireless >identification devices change the world? > >By Paul Boutin >Friday, September 5, 2003 > > >This week, Hitachi announced the release of a tiny wireless ID chip that can >be "easily embedded in bank notes." Rumors have swirled that the European >Central Bank has been looking to embed such chips, called RFIDs, or Radio >Frequency Identification Devices, into Europe's paper money in another year >or two. The ECB hopes the chips will thwart both counterfeiters and money >launderers. So, what exactly are RFIDs, and how do they work? > > >In the simplest terms, RFID tags are radio devices that respond (See >http://www.transponder.co.za/tech.htm) to a scanning unit's signal when >they're brought near the scanner by transmitting back a digital code with a >serial number that uniquely identifies the tag. The scanner is connected to >a database in which the tag's serial number can be used to look up exactly >what (or who) it's attached to. The smart card or keychain fob that lets you >get into the office after hours by waving it at the door is an RFID, as is >the tollbooth fast lane pass that lets you drive through the booth without >stopping. Think of them as tiny wireless bar codes. The chips can be >battery-powered, but many aren't-they use the scanner's radio beam as their >power source when placed near it. > >No battery means RFIDs can be much smaller than most digital gadgets and can >be placed permanently in hard-to-reach places. The pet ID implanted under >the skin of my cat's neck is the size of a grain of rice, and it never needs >replacing. Hitachi's new chip, which carries its own built-in antenna, takes >the technology down to a new level of tiny: At less than half a millimeter >square, it's about the size of a pepper flake. Yet the 128-bit ID number >embedded in each Hitachi chip is big enough, in theory, to catalog every >grain of sand on the world's beaches and deserts, plus every star in the >known universe, several times over. (In practice, some of those bits are >taken up by the manufacturer's information about the chip itself.) > >Not surprisingly, manufacturers, wholesalers, and retailers are doing >handsprings over RFID's potential to remove inefficiency from their supply >chains. Radio tags make it easy to track inventory as it goes out a >loading-dock door, or gradually disappears from a supermarket shelf, without >sending an employee around to hand-scan every item. Even boxes hidden behind >other boxes can be scanned, allowing an entire shipping pallet to be tracked >in one blip as a forklift takes it away. Misplaced items in a warehouse can >be found by walking around with a scanner. (The readable distance on the >tags varies from a few inches up to about 5 feet, less if there are other >objects in the way; Hitachi's new tags have a much shorter range, requiring >close contact with the scanner.) More far-out uses for the tags are already >in the works: Italian appliance-maker Merloni is working with Benetton on a >washing machine that will read RFIDs woven into Benetton's upmarket Sisley >line of women's clothing and set its washing instructions >automatically-presumably warning you if you've tossed your red skirt in with >a load of whites. > >At less than 10 cents apiece in bulk, RFID tags are fast approaching a price >point that makes them a viable replacement for bar code stickers. First, >though, they'll have to run the same gauntlet that UPC bar codes did: >Privacy gurus and paranoids alike have already declared RFID the latest >incarnation of Big Brother (See http://news.com.com/2010-1069-980325.html. >Gillette's attempts to use the tech to track its oft-stolen Mach 3 Turbo >blades on store shelves ended in a PR fiasco (See >http://silicon.com/news/500022/1/5730.html), with consumer activists >protesting outside a U.K. department store that had set up cameras to snap >photos of customers who picked up packages of Gillette blades with RFID tags >inside them (See >http://www.stoprfid.org/gillette_razor_package_with_chips.htm). California >state Sen. Debra Bowen held a hearing last month to investigate potential >privacy issues with the chips, although she told reporters she's not ready >to introduce legislation. > >It's easy to dismiss end-timers who bray about the government embedding >"human bar codes" in our necks as if we were housecats, but there are more >plausible invasion-of-privacy scenarios that go something like this: I buy a >pair of Prada pants with an RFID tag at Saks with my credit card, tying my >name to that specific pair of pants. As I walk into other stores, >restaurants, and maybe a concert, I'm scanned by marketers. They only mean >to track the broad buying patterns of the Prada-wearing demographic, but the >details of my pants' travels end up in the hands of law enforcement >officers. The feds decide I'm a potential terrorist because I happen to >frequent the same nightclubs as another suspect, and I'm taken away without >knowing why. The idea was completely laughable three years ago, but now I'm >not so sure. > >The problem is simple: RFIDs embedded in a product to track inventory are >still active after a customer buys them, leaving the door open to track the >customer instead. To solve the problem, the Auto-ID Center (See >http://www.autoidcenter.org/aboutthecenter.asp), an RFID research >partnership of nearly 100 companies and five major universities, has >suggested what seems like a blindingly obvious fix: Create a standard for >RFIDs that includes a kill switch. Once the item is scanned at checkout, the >tag is told to permanently disable itself. Anxious consumers could run a >home scanner over their purchases to find and disable stray live tags. Of >course, the euro's guardians, who reportedly hope to tag bank notes by 2005, >won't want their chips to be so easily defeatable. In that case, the kind of >people who need to worry about being busted for the cash in their pockets >may fall back on the time-honored practice of dealing in U.S. dollars >instead. > >For more info on RFID, visit http://www.rfidjournal.com/ > >Source: http://slate.msn.com/id/2087976/ 7726 From: Date: Sat Sep 6, 2003 1:40pm Subject: Employee Sentenced for Leaking Information on Wiretap Investigations, Former Bell Atlantic Employee Sentenced for Leaking Information on Wiretap Investigations, Reports U.S. Attorney BOSTON, Sept. 4 /PRNewswire/ -- A Weymouth man was sentenced yesterday in federal court for leaking wiretap information to bookies in exchange for relief from his gambling debts while he was an employee of Bell Atlantic. United States Attorney Michael J. Sullivan; Special Department of Justice Prosecutor John H. Durham; Federal Bureau of Investigation Inspector Gary M. Bald; and Colonel Thomas J. Foley, Superintendent of the Massachusetts State Police, announced that RICHARD H. O'BRIEN, age 66, of 79 Donald Street, Weymouth, Massachusetts, was sentenced yesterday by Senior U.S. District Judge Morris E. Lasker to 5 months in prison, to be followed by 2 years of supervised release, the first 5 months of which are to be served in home detention with electronic monitoring. On April 2, 2003, O'BRIEN pleaded guilty to a one count Information charging him with obstruction of justice. At the earlier plea hearing, the prosecutor told the Court that, had the case proceeded to trial, the evidence would have proven that O'BRIEN was employed as a Network Operations Manager at Bell Atlantic telephone company located in Taunton, Massachusetts. In the regular course of its business, Bell Atlantic would receive sealed court orders directing that it assist law enforcement agencies in their efforts to carry out lawful orders authorizing wiretaps and pen registers. O'BRIEN, through his position at Bell Atlantic, had access to, and knowledge of, these court ordered wiretaps and pen registers. Between January and August of 1999, O'BRIEN, in exchange for cash payments and other debt relief, disclosed to bookies who were targets of investigations being conducted by the FBI and the Massachusetts State Police, information concerning wiretaps and pen registers that had been in sealed court orders served on Bell Atlantic. Bell Atlantic terminated O'BRIEN on September 1, 1999. The case is part of an ongoing investigation by the Justice Task Force which is comprised of federal prosecutors and members of the FBI who have no current or prior ties to the Boston area. The Task Force is under the direction of Special Assistant U.S. Attorney John Durham and FBI Inspector Gary Bald and was formed in January, 1999. The case was prosecuted by Special Assistant U.S. Attorneys John H. Durham and Cynthia Shepherd. SOURCE U.S. Attorney CO: U.S. Attorney ST: Massachusetts SU: LAW http://www.prnewswire.com 09/04/2003 15:46 EDT [Non-text portions of this message have been removed] 7727 From: Thomas Shaddack Date: Thu Sep 4, 2003 11:14pm Subject: Re: Carrrier current sniffing On Thu, 4 Sep 2003, Steve Uhrig wrote: > I've never seen nor heard of a genuine carrier current intercept in > the private sector. That doesn't mean they don't exist and shouldn't > be a part of your inspection however. Fairly common false positives could be various control signals of eg. X10 devices (120 kHz bursts for 1 msec starting in the first 200 usec from the zero crossing of the AC waveform). There are also other power-line modem technologies; they may occupy virtually any lower frequency, except the AM band between 535-1705 kHz. Older technologies were limited to FSK and ASK modulations using frequencies between 50-500 kHz. Some newer products already utilize spread-spectrum technologies, eg. Japanese manufacturer Omron produces such power-line modems. A promising modulation scheme here is OFDM, Orthogonal Frequency Division Multiplex, from the spread-spectrum family. In some areas there is emerging trend to test internet access over power lines. This technology is still in developement stage, though there were already successful trials in both Europe and USA. Idea: Could be carrier current useful not for directly transporting eavesdropped data, but rather just switch the bug on/off, using a scheme similar to eg. X10? A dormant bug built into the wall, waiting for the right sequence on the power line, could be quite difficult to find (except maybe disconnecting everything and then handling the power lines like the telephone lines, trying to detect and identify everything connected there). Am I right or wrong here, please? -- ...If you hold a Unix shell up to your ear, can you hear the C? 7728 From: Hawkspirit Date: Tue Sep 9, 2003 3:37am Subject: Historical Sweep Article Here is a new addition to my collection of historical sweep articles. Roger "Are You Safe from Electronic Snoopers? " by Senator Edward V. Long - (Popular Science May 1967 http://www.bugsweeps.com/info/are_you_safe.html 7729 From: Bob Beringer Date: Mon Sep 8, 2003 0:21am Subject: Re: [Re: Carrrier current sniffing] Thomas, I have attached some (sanitized) information that might very well relate to your posting. I believe that your idea is not only possible, but it is highly probably as well. It does not matter whether America decides to adopt powerline based connectivity or not (as the author below states). The fact is that other countries are developing this type of technology right now, and will allow for your idea to become a proof of concept by simply purchasing internationally available COTS gear. I would further add to your concept, by stating that broadband over powerline (BPL) type technologies will also allow for Voice / Data transmissions to be manipulated / modulated to allow for the powerlines themselves to be the broadcast agent for various HF / RF communications to occur (maybe even as a simple "piggyback"). Just a thought - Hope that it helps... ------------------------------------------------------------------------ There is a very serious issue under consideration at the FCC that needs your attention. It is a significant threat to Homeland Security. A new technology for providing high-speed internet access has been proposed, and is in trial use in 3 or 4 communities on the East Coast. This is called "Broadband over Power Lines" (BPL). As the name implies, it uses the electrical power system wiring to provide high-speed internet access. The problem with BPL is that to provide high speeds of data transfer, wide bandwidth is needed. It will use the radio spectrum from 2 MHz to 80 MHz. Transmitting this signal on the electrical power system which is completely UNshielded (unlike cable systems) means that the signals, covering the entire HF and low VHF spectrum, are being radiated everywhere for every radio to receive. We do NOT need BPL technology in our country! High-speed internet access is already being made available in the 2 GHz range with no interference to other radio spectrum users, and cable internet access is already high-speed. There is a glut of high-speed internet access that has ruined our economy and is STILL mostly unused. There is no need to wipe out the 2 to 80 MHz range of the spectrum to get the same thing! The tests made by Japan and also by the ARRL (American Radio Relay League) in our country have shown us that all HF communications users will be wiped out if BPL is implemented. This would include Red Cross, Department of Defense, National Guard, Forest Service and Amateur Radio communications. This is completely at odds with Homeland Defense! Our country is under attack by international terrorists and natural disasters are unpredictable. As I write this the North East is again experiencing widespread electrical power outages. We need local HF communications for backup of cellular telephone systems and BPL would destroy all of that. BPL will be disastrous to Homeland Defense. Please do not allow it to progress in our country. The Japanese government has denied it's use in Japan. Please visit the ARRL web site, www.arrl.org, to read more about BPL. Near the bottom of the article is a video/audio clip that can be watched that shows what BPL sounds like on a state-of-the-art HF radio. It demonstrates that BPL masks all but the very strongest signals of other HF users, including the WWV atomic clock time signals from Ft. Collins, Colorado! I am a former Navy Cryptologic Technician (Maintenance) and have been a licensed Radio Amateur for 35 years, and this is the worst threat to communications that I have ever heard on HF radio. Please, please do anything in your power to protect our radio spectrum and stop this threat to Homeland Security! Thank you for your time and consideration of this critical issue. ---------------------------------------------------------------------- FYI, Bob Beringer Thomas Shaddack wrote: On Thu, 4 Sep 2003, Steve Uhrig wrote: > I've never seen nor heard of a genuine carrier current intercept in > the private sector. That doesn't mean they don't exist and shouldn't > be a part of your inspection however. Fairly common false positives could be various control signals of eg. X10 devices (120 kHz bursts for 1 msec starting in the first 200 usec from the zero crossing of the AC waveform). There are also other power-line modem technologies; they may occupy virtually any lower frequency, except the AM band between 535-1705 kHz. Older technologies were limited to FSK and ASK modulations using frequencies between 50-500 kHz. Some newer products already utilize spread-spectrum technologies, eg. Japanese manufacturer Omron produces such power-line modems. A promising modulation scheme here is OFDM, Orthogonal Frequency Division Multiplex, from the spread-spectrum family. In some areas there is emerging trend to test internet access over power lines. This technology is still in developement stage, though there were already successful trials in both Europe and USA. Idea: Could be carrier current useful not for directly transporting eavesdropped data, but rather just switch the bug on/off, using a scheme similar to eg. X10? A dormant bug built into the wall, waiting for the right sequence on the power line, could be quite difficult to find (except maybe disconnecting everything and then handling the power lines like the telephone lines, trying to detect and identify everything connected there). Am I right or wrong here, please? -- ..If you hold a Unix shell up to your ear, can you hear the C? 7730 From: R. Snyder Date: Tue Sep 9, 2003 8:52am Subject: RE: RFIDs with a kill switch Hitachi's tiny (0.4mm x 0.4mm) new mu-chip RFID product operates at 2.45 GHz. I suspect a 1 KW microwave oven at 2.45 GHz (ISM) would make a fine "kill switch." __________________________________ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com 7731 From: Date: Fri Sep 12, 2003 4:42am Subject: Report: China Likely Got Spy Plane Data Report: China Likely Got Spy Plane Data By ROBERT BURNS .c The Associated Press WASHINGTON (AP) - Shuddering and out of control, the Navy spy plane plunged toward the Earth. Inside, 24 stunned Americans worked feverishly - first to save themselves, then, when survival looked within reach, to prevent national security secrets from falling into Chinese hands. They tossed classified materials out a hatch, smashed equipment with an ax and prepared to ditch their crippled aircraft. The crew of the EP-3 electronic surveillance plane survived, but, unfortunately, so did some of its secrets. A newly released Navy investigation report on the April 1, 2001, incident concludes that some of those classified materials likely were found by Chinese officials who took control of the plane when it landed on China's Hainan Island. The crew was detained on the island for 11 days and China refused Bush administration requests to fly the damaged plane home; it was cut up and flown back to U.S. territory in pieces. A partially censored copy of the report was provided to reporters Thursday after it was released to Jane's Defense Weekly in response to a Freedom of Information Act request. Deleted were specifics about the classified materials aboard the spy plane and procedures for handling the materials. Investigators found no fault with the crew's performance, although they recommended that aircrews of such planes be required to practice emergency destruction drills as part of regular training. The report made no assessment of the damage caused by the likely compromise of national secrets, which likely included information about U.S. electronic surveillance targets or techniques. The EP-3 was flying southeast of Hainan Island, five hours into a routine mission over the South China Sea, when two Chinese F-8 fighter jets approached it. One of the fighters eventually struck the Navy plane in its No. 1 propeller, ripping the fighter in half and throwing the EP-3 out of control. It fell into an uncontrolled dive from about 22,000 feet, descending at a rate of 4,000 feet per minute. ``The destruction of classified material was accomplished while the aircrew was probably still in shock from the aircraft collision and the subsequent rapid descent of the aircraft and with very little time prior to landing,'' the report said. After reviewing the investigators' findings, Adm. William Fallon, the vice chief of naval operations, in March 2003 recommended no disciplinary action against the crew, saying they ``performed well under dire circumstances.'' A copy of Fallon's letter was released with the investigative report. The EP-3 crew belonged to Fleet Air Reconnaissance Squadron One, based at Naval Air Station Whidbey Island, Wash. The report said they were fully qualified and ready for the mission. The EP-3 is designed to conduct reconnaissance and collect electronic signals intelligence. Materials classified as confidential, secret and top secret were, as a matter of normal practice, carried aboard the plane in papers, magnetic tapes, computer disks and computer hard drives, the report said. After the Chinese fighter struck the Navy plane, causing the U.S. plane to shake violently and snap-roll to the left at about a 140-degree angle of bank, the aircraft commander, Lt. Shane Osborn, gave the order for the crew to prepare to bail out. Out of control, the plane fell to about 15,000 feet when it began to level off but continued to vibrate violently. At 10,000 feet, the crew regained partial control of the plane. Procedures do not require that destruction of classified material begin in that situation. After the No. 1 engine was shut down and the plane became more controllable, the crew was redirected to ``prepare to ditch,'' meaning they would stay with the plane as it went down. Although not required at that point, the crew began to destroy classified material, the report said. Some was jettisoned out a hatch, and equipment was smashed with an ax and other hard objects such as metal containers. Upon landing at a military air base on Hainan Island some remaining classified papers were shredded. The Chinese military ordered the Americans off the plane and took control of it. The investigation report said the crew had hidden some classified materials on the plane and hand-shredded some papers. ``Therefore, compromise of undestroyed classified material is highly probable,'' it concluded. Associated Press writer John J. Lumpkin in Washington contributed to this report. 09/12/03 01:50 EDT Copyright 2003 The Associated Press. The information contained in the AP news report may not be published, broadcast, rewritten or otherwise distributed without the prior written authority of The Associated Press. All active hyperlinks have been inserted by AOL. [Non-text portions of this message have been removed] 7732 From: Date: Fri Sep 12, 2003 6:13am Subject: The Future AT&T to invest $3 billion in 2003 for global network Plans include moving to optics-based architecture, having edge-to-edge connectivity By Allison Taylor, ITWorldCanada.com September 11, 2003 AT&T will spend US$3 billion in capital expenditures this year to completely transform its global network from having a voice-based carrier infrastructure into a single Internet Protocol (IP)-based network, the telco said on Wednesday. The project is expected to be completed by 2005. "In essence our objective is to try to evolve and we are much further along than what is perceived in the industry," said Hossein Eslambolchi, president of AT&T Labs, chief technology officer (CTO) of AT&T and chief information officer (CIO) of AT&T Business. Over the summer, AT&T announced a global investment of $500 million this year to improve its worldwide network. In a global teleconference Eslambolchi said AT&T has several major strategic initiatives to build the network as the company evolves its network to an IP optical-based core architecture and continues to consolidate its legacy networks. Some of the planned initiatives include moving the optics into the edges of the network from beyond the core, moving from a circuit-based network to packets, having edge-to-edge connectivity, and becoming completely automated. AT&T plans to retire 270 legacy systems across the world by the end of 2005. Approximately 130 legacy systems were retired over the past 18 months, with another 140 systems slated for phase out over the next two years. "We already have more IP traffic or data traffic, as compared to voice traffic," Eslambolchi said. "Voice is still a critical application for customers globally." Eslambolchi said that as AT&T continues to switch over to voice over IP (VoIP), the adoption and deployment rates will likely take about a decade to be fully IP around the world. In the optical arena, the company has already deployed 104 intelligent optical switches. "The advantage is to allow point-and-click provisioning for customers, in essence as real-time bandwidth provisioning of the services to our customers," Eslambolchi said. Moving the network from circuits to packets is something that AT&T has already accomplished, Eslambolchi said, and the focus will eventually turn to evolving the network into an IP-based Multi-protocol label switching (MPLS) network. There are a total of 37,000TB of data moving across the network, he explained, with about 1,000TB of traffic on the IP network compared with the equivalent of 450TB a day moving on the voice switches. There is an 8:1 ratio of packet traffic on the AT&T network compared to voice traffic. Deploying IP-based MPLS allows the company to react to information in milliseconds, and to "drive services with higher level of quality," he said. He added that by implementing virtual private networks (VPNs) within the MPLS architecture the level of capability, reliability and security would improve. Currently, the MPLS is at the core of the network, but will eventually be deployed globally at the edge of the network as well. The idea of moving the network distribution from a top-to-top capability to having edge-to-edge connectivity is also something that AT&T will turn its attention to in the next few years. "The battleground in the 21st century is about who has got the best network from the edge-to-edge of network," Eslambolchi said. "To be able to access directly to customers is a fundamental strategy for AT&T." AT&T has traditionally been seen as having pipes and ports to applications in the network, but this perception and the idea of AT&T being a commodity based on services is changing as the company moves into having an application aware-network, he said. "A significant amount of energy has been put into improving cycle times and the defect rate, to offer services in much more dynamic time and real-time," he explained. Some of those services include the ordering system and the network management system. Eslambolchi did not discuss software or hardware programs or partners that would be involved in the network. However, on Tuesday Murray Hill, New Jersey-based Lucent Technologies Inc. announced a partnership with AT&T to provide advanced optical technology for its network. [Non-text portions of this message have been removed] 7733 From: Steve Uhrig Date: Fri Sep 12, 2003 1:38pm Subject: GPS tracking in Washington State http://www.charleston.net/stories/091203/wor_12track.shtml GPS covert vehicle tracking in Washington state now is restricted only to law enforcement with a court order. The ACLU rep quoted in the article stating Washington is the only state with such a restriction is wrong as usual. Tennessee, Michigan, Florida and California also have restrictions on use of covert tracking by non LE, and one other state I don't recall. If anyone knows of restrictions in any other state, please so inform me. I note the article and apparently the restriction applies to GPS tracking only. So I guess the beacon tracking fellows are OK? Loophole they probably overlooked. The general public can buy GPS trackers inexpensively through any of the spy shops and on the web, where beacon trackers generally are restricted sale to law enforcement only by gentleman's agreement of the manufacturers, to preclude abuse by civilians. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7734 From: James M. Atkinson Date: Fri Sep 12, 2003 11:03pm Subject: Profundity 1. Now that food has replaced sex in my life, I can't even get into my own pants. 2. Marriage changes passion. Suddenly you're in bed with a relative. 3. I saw a woman wearing a sweat shirt with "Guess" on it. So I said "Implants?" She hit me. 4. I don't do drugs. I get the same effect just standing up fast. 5. Sign in a Chinese Pet Store: "Buy one dog, get one flea..." 6. I live in my own little world. But it's OK. They know me here. 7. I got a sweater for Christmas. I really wanted a screamer or a moaner. 8. If flying is so safe, why do they call the airport the "terminal?" 9. I don't approve of political jokes. I've seen too many of them get elected. 10. There are two sides to every divorce: Yours and shithead's. 11. Everyday I beat my own previous record for the number of consecutive days I've stayed alive. 12. How come we choose from just two people to run for president and fifty for Miss America? 13. Isn't having a smoking section in a restaurant like having a peeing section in a swimming pool? 14. Why is it that most nudists are people you don't want to see naked? 15. Snowmen fall from Heaven unassembled. 16. Every time I walk into a singles bar I can hear Dad's wise words: "Don't pick that up, you don't know where it's been!" -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7735 From: Matthew Cole Date: Wed Sep 10, 2003 2:39pm Subject: Spooks Does anyone have a guess as to how many Intelligence offices are in MYC? Has NY taken the place of DC as America's central spy-ground? ===== Matthew Cole Journalist Website: http://www.matthewAcole.com Tel. 917. 345. 3731 __________________________________ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com 7736 From: human being Date: Wed Sep 10, 2003 3:23pm Subject: electromagnetic environments TSCM-L members interested in the scope of electromagnetism in the everyday environment, including cultural aspects usually not brought into scientific and technological approaches, may find interest and intrigue in a work just translated by Charles Halary, entitled: Art and Electromagnetism: A Relationship in the Form of a Wave http://www.electronetwork.org/articles/symposium.pdf (English translation. ~2 Megabytes .pdf file, 25 pages) Les Rapports Ondulatoires de l'…lectromagnÈtisme avec les Arts http://www.unites.uqam.ca/doctorat_arts/halarycadre.pdf (French. ~260 Kilobytes .pdf file, 25 pages) One of the most interesting aspects of this work, from a sociological perspective (not TV popular culture studies as might happen in .US academics) is that many aspects are brought into one view, from medical advances and understandings, to the historical advances and their historical contexts, to different ways the .US and USSR went about the exploration of electromagnetism, enough to consider what advances may be of the future, to contend with. This is not tinfoil-hat quality thinking, yet it addresses some of the basic legitimate concerns (of the unknown) in a larger, more comprehensive cultural context, FWIW. bc microsite http://www.electronetwork.org/bc/ ~e-list http://www.electronetwork.org/list/ 7737 From: mooty_7 Date: Fri Sep 12, 2003 3:28pm Subject: 60 volts on cable line... i got a good question for you guys ....i was moving a cable modem and computer to another room for a friend and got quite a jolt from the cable when i disconected it from the computer...thinking the modem or computer had a short i completely un hooked both and tested the cable line and walaaah ... 60 volts steady on the cable line in his office...IS THIS NORMAL ??? thanks in advance.. 7738 From: DAVID ROM Date: Sun Sep 14, 2003 0:36am Subject: Technion Researchers Crack GSM Cellular Phone Network Encryption Technion Researchers Crack GSM Cellular Phone Network Encryption It is possible to listen to and impersonate callers on the phones of 850 million users in 197 countries. The researchers: "We will allow use of this method only by law enforcement agencies." Technion researchers have succeeded in cracking the popular GSM cellular phone network encryption code. The researchers presented their findings at the recent Crypto Conference in Santa Barbara, California. The findings were greeted with shock and widespread interest on the part of the 450 conference participants, many of whom are world leaders in encryption research and encryption industry. The researchers, Prof. Eli Biham and doctoral student Elad Barkan, and Nathan Keller, discovered a basic flaw in the network's encryption system, and using this were able to develop a method for cracking the encryption system. "Elad discovered a serious flaw in the network's security system," explains Prof. Biham. "He found that the GSM network does not work in the proper order: First, it inflates the information passing through it in order to correct for interference and noise and only then encrypts it." In the wake of this discovery, the three Technion researchers developed a method that enables cracking the GSM encryption system at the initial ringing stage, even before the call begins, and later on, listening in on the call. With the aid of a special device that can also broadcast, it is possible to steal calls and even to impersonate phone owners, even in the middle of an ongoing call. Recently, a new and modern encryption system was chosen as a response to previous attacks on existing encryption system. But Technion researchers also succeeded in overcoming this improvement. The new method works for all GSM networks worldwide, including the U.S. and Europe. Prof. Biham explains that encryption ciphers were kept absolutely secret until 1999 when a researcher called Marc Briceno succeeded to reverse engineer their algorithms. "Since then many attempts have been made to crack them, but these attempts required knowing the call's content during its initial minutes in order to decrypt its continuation, and afterwards, to decrypt additional calls. Since there was no way of knowing call content, these attempts never reached a practical stage. Our research shows the existence of the possibility to crack the codes without knowing anything about call content," he notes. A copy of the research was sent to GSM authorities in order to correct the problem, and the method is being patented so that in future it can be used by the law enforcement agencies. Technion Spokesperson - Amos Levav 2/9/03 902/03 David Rom david@g... CTO GD Intelligence Security LTD. www.gdis.co.il TEL : +972-9-7676663 FAX : +972-9-7676665 MOBILE : +972-54-449979 P.O.Box 6027, Kfar Saba, 44641 [Non-text portions of this message have been removed] 7739 From: DAVID ROM Date: Sun Sep 14, 2003 1:56am Subject: Recommended - out of U.S. TSCM Firms Hi James I think that we have to have a recommended TSCM Firm list also out of the state. My company give expert TSCM services at : Israel, Europe, South America. Add my company to this gold list. As you remember, we met at the REI factory, two years ago. David Rom david@g... CTO GD Intelligence Security LTD. www.gdis.co.il TEL : +972-9-7676663 FAX : +972-9-7676665 MOBILE : +972-54-449979 P.O.Box 6027, Kfar Saba, 44641 [Non-text portions of this message have been removed] 7740 From: James M. Atkinson Date: Sun Sep 14, 2003 2:00pm Subject: Sweeps Gone Bad Howdy Folks, I am going to add a page to my website about how a TSCM client can determine if the person offering or performing bug sweeps for them is a con artist, thief, or scammer. I will post 25 questions which people/clients should when qualifying and before engaging a TSCM professional. I would appreciate list members suggesting questions of this nature to ask. Then I will post 25 things to look for while the sweep is being performed. Then a list of 25 questions to ask when the sweep has been completed. Then a list of 25 pieces of equipment that the sweep team MUST/Should possess when performing the sweep. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7741 From: Date: Sun Sep 14, 2003 4:14pm Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7742 From: Date: Sun Sep 14, 2003 4:14pm Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7743 From: William Knowles Date: Sun Sep 14, 2003 4:37pm Subject: Re: Spooks On Wed, 10 Sep 2003, Matthew Cole wrote: > Does anyone have a guess as to how many Intelligence offices are > in MYC? Someone once told me, but I forgot the answer, so since you said to guess, I would guess 42 as that is the answer to everything. > Has NY taken the place of DC as America's central spy-ground? Maybe... > ===== > Matthew Cole > Journalist > Website: http://www.matthewAcole.com > Tel. 917. 345. 3731 - WK *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ---------------------------------------------------------------- C4I.org - Computer Security, & Intelligence - http://www.c4i.org ================================================================ Help C4I.org with a donation: http://www.c4i.org/contribute.html *==============================================================* From: J. Oquendo Date: Fri Sep 3, 2004 8:32pm Subject: Re: The FBI's 'Magic Lantern' keystroke logger >> Also keep in mind that this program was possible going to >> spread threw known vulnerabilities. Very shady if you ask >> me. This is nothing new, a spinoff from Carnivore. A while back I wrote "How to Circumvent Carnivore" which was poorly written, but indeed gave someone without much technical skills the ability to protect themselves from illegal wiretaps courtesy of the feds. Haven't followed it since though. Carnivore was notorious at watching everyone on the line, meaning if you and I shared the same provider, and they intended on listening to you, they also listened to me. Pretty sad, and I now wonder how many people ended up having to explain why they intended on killing their dad to the feds only to find out down the line the son meant at a game of Quake. There are many tools available to monitor what files are being used even in Windows though, DLL files, and so forth, but to the layperson (non techie), many know little of them. Perhaps one day when I venture back into computer security I'll throw up a few pages of nifty tools. Since I generally use Solaris, or a BSD I usually have the capability of knowing what's running on my machine at any given time. Funny thing is, I wonder how long will it be before someone creates a random garbage generator; e.g.: OSAMA, DIE, BOMB, FUCK, SHIT, and so on, to feed these little espionageware programs false data. Will they consider the author a criminal too for defeating their poorly engineered illegalware? =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo GPG Key ID 0x51F9D78D Fingerprint 2A48 BA18 1851 4C99 CA22 0619 DB63 F2F7 51F9 D78D http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D sil @ politrix . org http://www.politrix.org sil @ infiltrated . net http://www.infiltrated.net "How can we account for our present situation unless we believe that men high in this government are concerting to deliver us to disaster?" Joseph McCarthy "America's Retreat from Victory" 9561 From: Steve Uhrig Date: Fri Sep 3, 2004 11:55pm Subject: Analysis of discovered RF device Recently an unknown device consisting of a black box and remote antenna was discovered underneath a gentleman's car. The device was submitted to me for analysis by the gentleman's attorney. A sanitized copy of my report with illustrations is here: http://www.swssec.com/jpegs/Reports/AVLReportX.pdf It's over 3 MB so will be a l-o-n-g download if you're on dialup. Investigation based on and subsequent to my report determined the device was being used illegally by a government agency. The government agency attempted to use the evidence in a prosecution of the businessman. Alleged, proven to be fabricated evidence claimed to have been gathered by the device was impeached. The government agency, prior to my report, had denied ownership or any knowledge of the device in court. Not cool. Information obtained illegally is not usable in legal proceedings. Some violate this, thinking they won't get caught. Unfortunately, sometimes people make errors in judgement, with expensive and embarrassing results. There is a part 2 to the report going into much more detail, but those details are unimportant outside the legal forum. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9562 From: Tech Sec Lab Date: Sat Sep 4, 2004 0:26pm Subject: RE: Getting equiped... Well boy do I feel stupid.... But more importantly so should every contractor in the country, I have never, and I repeat NEVER, seen any type of electrical contractor use anything but alu ladders. Usually the high quality type however. And the pole monkeys don't even use ladders...just spikey shoes....mind you if the monkey fell off the pole and landed on a passer by much the same result as the fibreglass ladder would occur. :) LOL. 9563 From: Rick Hofmann Date: Sat Sep 4, 2004 0:36pm Subject: Re: Analysis of discovered RF device Steve, At 09:55 PM 9/3/2004, you wrote: >Recently an unknown device consisting of a black box and remote antenna >was discovered underneath a gentleman's car. I have not read your entire report yet, but immediately recognized the device as those used by a firm named Teletrac. They are located at the Lincoln Way address in Garden Grove (as listed in your report) which is probably about 3 miles from my house. I have been to the location for a tour, and know the law enforcement liaison, Arnie Pellar. Teletrac units are used extensively by local, state and federal law enforcement. I also have a trucking company client who has several of the Teletrac units installed on their trucks. I will read the entire report in the next day or two. Very interesting. Best regards, Rick 9564 From: Thomas Shaddack Date: Sat Sep 4, 2004 2:51pm Subject: Re: Re: The FBI's 'Magic Lantern' keystroke logger On Fri, 3 Sep 2004, J. Oquendo wrote: > >> Also keep in mind that this program was possible going to > >> spread threw known vulnerabilities. Very shady if you ask > >> me. There are already in-the-wild alternatives, some even open-source. SubSeven, NetBus, or Back Orifice 2000 (BO2K) are the best-known examples[1]. Coupling a trojan with a rootkit[2] is only a natural extension of this approach. Because there is nothing magic on Magic Lantern, standard file-integrity-checking and access control methods are likely to be successful as protective measures. I also suppose it doesn't run on anything other than Windows, so a nice fresh SuSe Linux desktop installation will work well against it - at least until the Adversary buys another overpriced underfeatured solution from a suspicious vendor[3]. [1] http://downloads.securityfocus.com/library/NTtrojan_article.html [2] http://www.rootkit.com/index.php [3] http://www.crazylinux.net/downloads/articles/mgc_lntrn/dirty-lantern.htm A nice article with some technical details is here; its ending is interesting: http://www.theregister.co.uk/2001/12/03/fbi_magic_lantern_reality_check/ 3 years ago there was even a controversy between the antivirus vendors if they should include detection of the Magic Lantern trojan. Symantec was reportedly against detecting it, while Sophos was for. http://www.theregister.co.uk/2001/11/27/av_vendors_split_over_fbi/ http://www.sophos.com/virusinfo/articles/magiclantern.html See also: http://www.cotse.net/privacy/magic_lantern.htm http://slashdot.org/articles/01/11/20/2155251.shtml > This is nothing new, a spinoff from Carnivore. A while back I wrote "How > to Circumvent Carnivore" which was poorly written, but indeed gave someone > without much technical skills the ability to protect themselves from > illegal wiretaps courtesy of the feds. Carnivore is a passive wiretap. Not too much of threat, if SSL is used on all important connections. If you run your own email infrastructure, make sure that you support (and actually use!) both POP3S/IMAPS (POP3 and IMAP over SSL), to secure the picking up of mail, and have support of RFC-3207 for securing the upload of the mails to the server and the communication between the servers (if both have this extension enabled). My work-in-progress document explaining the problematics and how to enable the functionality in the clients and servers can be found at http://213.246.91.154/utils/queryehlo/why-tls.php The advantage of this approach is encrypting all the client-server and server-server mail communication, wherever enabled. Which makes it less easy for the casual observer that additional security measures, eg. PGP or its more open and free and compatible cousin GnuPG, are used. Which prevents the adversary from learning more about the communication patterns. Traffic analysis still shows the volume and number of messages exchanged and between which servers, but not the sender and recipient nor hints about the message contents (or further encryption usage, so no drawing attention). The most significant advantage of this approach: once set up, it runs mostly maintenance-free (except about once per year update the server certificates, and watch the vulnerabilities of the SSL library in use, which luckily are quite rare) and doesn't require the cooperation of the end users (keeping things up to date, using passphrases...), so is suitable for even lower-security installations. My practical experiences with its deployment are so far pretty good. As a bonus, Mozilla Mail and Thunderbird email clients have nice and straightforward support for SSL - including the possibility to log in via client certificate, which is something Outlook doesn't have, despite Microsoft's billion$ and hordes of developers-developers-developers-developers, as Steve Ballmer would say in his monkey-dancing mood[4]. (A stunnel-based solution can be used for client certs (or SSL in general) when clients don't have it built-in or it feels dodgy.) [4] http://www.ntk.net/ballmer/mirrors.html - nice video of a high Microsoft executive dancing and shouting. The sources don't mention what substance he was high on, though. Rumours say it was a very addictive one, known as Power, with megalomania as a side effect of prolonged abuse. Especially important is to set this up on all the mobile computers, as they are most likely to be used with dodgy infrastructure in questionable places like hotels and airports. Leave no laptop behind. (If your server has some spare bandwidth, you can snoop-proof even part of your web communication. Run a proxyserver on the server, using a suitable solution (eg. stunnel) to have the port require SSL handshake. Run stunnel on your laptop, with local "plaintext" TCP port forwarded to remote SSL/TCP port, where your proxyserver runs. Set up the browser to use the localhost:port as your HTTP/HTTPS proxy. The segment between the mobile computer and the fixed server is then wiretap-resistant. It is also a low-cost low-hassle alternative to a VPN (or in situations when you can't use VPN, eg. because a donkeyhole ISP filters out the IPsec packets for residential-grade accounts and requires more money for business-grade ones with IPsec allowed and you don't want to bother with OpenVPN and UDP tunneling), for eg. more secure intranet access.) > Haven't followed it since though. Carnivore was notorious at watching > everyone on the line, meaning if you and I shared the same provider, and > they intended on listening to you, they also listened to me. Carnivore functionality is virtually identical to "tcpdump" command from the unix world (or its "windump" port), with its ability to capture only packets matching a filter (usually a source/target IP address or MAC address). More recent (or, by now, less-obsolete) switches (by Cisco and presumably other major brands) have built-in CALEA capability, allowing access to any selected communication channel. Built-in wiretap. > Pretty sad, and I now wonder how many people ended up having to explain > why they intended on killing their dad to the feds only to find out down > the line the son meant at a game of Quake. Carnivore, or DCS-1000 (as they renamed it for PR reasons after the stink got too strong), usually doesn't watch all the communication indiscriminately; there are technical and legal constraints, making carpet wiretaps unsuitable for law enforcement purposes at this moment. The situation isn't that bad - *yet*. However, installations like Echelon, run by intelligence services, are different. If you are communicating over infrastructure under control of other governments (or even your own, if untrustable enough), and are competing with companies paying taxes there and employing their people, or possess any kind of technical or business knowledge they would like to have, their national interests may become part of your threat model. > There are many tools available to monitor what files are being used even > in Windows though, DLL files, and so forth, but to the layperson (non > techie), many know little of them. Perhaps one day when I venture back > into computer security I'll throw up a few pages of nifty tools. That sounds like a good idea. > Since I generally use Solaris, or a BSD I usually have the capability of > knowing what's running on my machine at any given time. Unless you get 0wned and r00ted and the monitoring utilities get compromised. A checksum check from a trusted bootable CD will help, though. > Funny thing is, I wonder how long will it be before someone creates a > random garbage generator; e.g.: OSAMA, DIE, BOMB, FUCK, SHIT, and so on, > to feed these little espionageware programs false data. Will they > consider the author a criminal too for defeating their poorly engineered > illegalware? Already happened; see the Jam Echelon Day. Many people also have sets of keywords in their mail signatures or headers, so far with no directly visible results except being a nice awareness-spreading protest statement. The Adversary likely uses more sophisticated processing than mere keyword scanning. But back to the topic. There is an excellent countermeasure against software keyloggers. Disconnect the machine from the LAN/Net, boot it from a trusted medium (eg. a bootable CD of Knoppix, or even the floppy disk of an ultra-paranoid Linux distro known as Tinfoil Hat Linux[5], which features even goodies like Tempest-protecting color schemes. It offers even limited protection against hardware keyloggers, using a randomly generated grid to enter your passphrase (which is more difficult, so has the side effect of making you likely to pick a short passphrase, easier to bruteforce - so beware of weakening your security model as a side effect of attempting to strengthen it). In paranoid mode, a second copy of GPG runs on the background, generating keys and encrypting random documents, making side-channel attacks like differential power analysis more difficult. You also don't risk accidentally leaving plaintext laying around, if you don't really try. [5] http://tinfoilhat.shmoo.com/ The page also contains link to Tempest Fur Elize, a nice program that plays music on an AM radio close to your monitor, using changing patterns of vertical black/white stripes. Shouldn't be impossible to rig it to broadcast data using a suitable modulation scheme, eg. FSK. In my own brief experiments I received the music broadcasted by a 17" CRT monitor in a next room through a solid brick wall, with an old FM/AM radio and fixed-mount antenna in a non-optimal orientation. I suppose much greater reception range could be achieved by tweaking the antenna. Software runs on Linux and requires X-Windows. No Linux/framebuffer nor Windows version yet. :( Question for the crowd: could this software be useful for orientational testing of TEMPEST shielding of computers/monitors? 9565 From: Jeremy Funk Date: Sat Sep 4, 2004 1:51pm Subject: Re: Getting equiped... Funny, all the Time Warner technicians in my area (Columbus, OH) were just briefed to use fiberglass and fiberglass only as their ladder of choice. Their reason? Alminum ladders look non-professional. Jeremy Tech Sec Lab wrote: >Well boy do I feel stupid.... > > >But more importantly so should every contractor in the country, I have >never, and I repeat NEVER, seen any type of electrical contractor use >anything but alu ladders. > >Usually the high quality type however. > >And the pole monkeys don't even use ladders...just spikey shoes....mind you >if the monkey fell off the pole and landed on a passer by much the same >result as the fibreglass ladder would occur. > >:) LOL. > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > 9566 From: rockdriver Date: Sat Sep 4, 2004 6:58pm Subject: Paper on cameras and detection Excellent white paper on cameras and camera detection.Excellent reading: http://www.franken.de/users/tentacle/papers/hiddencams.pdf 9567 From: Agent Geiger Date: Sat Sep 4, 2004 4:03pm Subject: Re: Analysis of discovered RF device That is very interesting. Was it a terrism-related/manoey laudering case? There are provisions in the PA that allow these types of ops wihtout a warrant. --- Steve Uhrig wrote: > Recently an unknown device consisting of a black box > and remote antenna > was discovered underneath a gentleman's car. > > The device was submitted to me for analysis by the > gentleman's attorney. > > A sanitized copy of my report with illustrations is > here: > > http://www.swssec.com/jpegs/Reports/AVLReportX.pdf > > It's over 3 MB so will be a l-o-n-g download if > you're on dialup. > > Investigation based on and subsequent to my report > determined the device > was being used illegally by a government agency. The > government agency > attempted to use the evidence in a prosecution of > the businessman. > Alleged, proven to be fabricated evidence claimed to > have been gathered > by the device was impeached. The government agency, > prior to my report, > had denied ownership or any knowledge of the device > in court. Not cool. > > Information obtained illegally is not usable in > legal proceedings. Some > violate this, thinking they won't get caught. > Unfortunately, sometimes > people make errors in judgement, with expensive and > embarrassing results. > > There is a part 2 to the report going into much more > detail, but those > details are unimportant outside the legal forum. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website > http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 9568 From: Greg Horton Date: Sat Sep 4, 2004 10:51pm Subject: Calif. Man Accused of Stalking Via GPS Not too sophisticated but it got the job done. http://start.earthlink.net/newsarticle?cat=6&aid=D84T7PEG1_story September 4, 2004 09:40 PM EDT GLENDALE, Calif. - Police arrested a man they said tracked his ex-girlfriend's whereabouts by attaching a global positioning system to her car. Ara Gabrielyan, 32, was arrested Aug. 29 on one count of stalking and three counts of making criminal threats. He was being held on $500,000 bail and was to be arraigned Wednesday. "This is what I would consider stalking of the 21st century," police Lt. Jon Perkins said. Police said Gabrielyan tracked the 35-year-old woman, who was not identified, after she ended their relationship, showing up unexpectedly at a book store, an airport and dozens of other places where she was. Police said Gabrielyan attached a cellular phone to the woman's car on Aug. 16 with a motion switch that turned on when the car moved, transmitting a signal each minute to a satellite. Information was then sent to a Web site that allowed Gabrielyan to monitor the woman's location. The woman learned how Gabrielyan was following her when she discovered him under her car attempting to change the cell phone's battery, police said. Police allege Gabrielyan threatened over a six-month period to kill himself and the woman. An attorney for Gabrielyan could not immediately be reached for comment Saturday. He faces up to six years in prison if convicted. [Non-text portions of this message have been removed] 9569 From: Andy Cuff Date: Sun Sep 5, 2004 4:45am Subject: Re: Calif. Man Accused of Stalking Via GPS Hi, Over here we've had these services for some time. They are marketed to help parents find their children through their mobile phone, but the potential for nefarious misuse is huge http://www.verilocation.com/192/ I was thinking of attaching one to my motorbike using an old mobile phone, hell of a lot cheaper than a tracking service. The bike was worth more than the kids ;o) Just kidding -andy cuff Talisker's Computer Security Portal Computer Network Defence Ltd http://www.securitywizardry.com ----- Original Message ----- From: "Greg Horton" To: Sent: Sunday, September 05, 2004 4:51 AM Subject: [TSCM-L] Calif. Man Accused of Stalking Via GPS > Not too sophisticated but it got the job done. > > > http://start.earthlink.net/newsarticle?cat=6&aid=D84T7PEG1_story > > > September 4, 2004 09:40 PM EDT > > > GLENDALE, Calif. - Police arrested a man they said tracked his > ex-girlfriend's whereabouts by attaching a global positioning system to > her car. > > Ara Gabrielyan, 32, was arrested Aug. 29 on one count of stalking and > three counts of making criminal threats. He was being held on $500,000 > bail and was to be arraigned Wednesday. > > "This is what I would consider stalking of the 21st century," police Lt. > Jon Perkins said. > > Police said Gabrielyan tracked the 35-year-old woman, who was not > identified, after she ended their relationship, showing up unexpectedly > at a book store, an airport and dozens of other places where she was. > > Police said Gabrielyan attached a cellular phone to the woman's car on > Aug. 16 with a motion switch that turned on when the car moved, > transmitting a signal each minute to a satellite. Information was then > sent to a Web site that allowed Gabrielyan to monitor the woman's location. > > The woman learned how Gabrielyan was following her when she discovered > him under her car attempting to change the cell phone's battery, police > said. > > Police allege Gabrielyan threatened over a six-month period to kill > himself and the woman. An attorney for Gabrielyan could not immediately > be reached for comment Saturday. > > He faces up to six years in prison if convicted. > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9570 From: Michael Puchol Date: Sun Sep 5, 2004 4:56am Subject: Re: Calif. Man Accused of Stalking Via GPS Hi, I've found this system (LBS) to be a belly flop in Spain, the system is so error-prone it's not worth using. In cities it can be somewhat accurate, but where I live, the system tells me I'm some 27 kilometers away, as my phone registers with a cell tower in another town. Thus, as there is no way of telling when the location is based on a rural cell, or in a small city microcell, the system is by definition unreliable. How can I be sure the position given is off by a few meters or a few kilometers? Usage here peaked when TV news came up with stories on the system, but it has now fallen to almost zero. Until true triangulation is used to give better accuracy, the system will be hopeless. Regards, Mike ----- Original Message ----- From: "Andy Cuff" To: Sent: Sunday, September 05, 2004 11:45 AM Subject: Re: [TSCM-L] Calif. Man Accused of Stalking Via GPS > Hi, > Over here we've had these services for some time. They are marketed to help > parents find their children through their mobile phone, but the potential > for nefarious misuse is huge http://www.verilocation.com/192/ I was thinking > of attaching one to my motorbike using an old mobile phone, hell of a lot > cheaper than a tracking service. The bike was worth more than the kids ;o) > Just kidding > 9571 From: Date: Sat Sep 4, 2004 11:19pm Subject: Re: Analysis of discovered RF device Dear All I am at a loss to understand what a "terrism-related/manoey laudering case" Any ideas anybody please. If this is a misspelling, surely it must be good manners to press the 'spell check' before sending to the group. What exactly is a 'TANGO'? Less jargon from our very knowledgeable American cousins, aimed at the members outside of the USA would be very helpful please. Regarding the aluminium ladder issue, I have been part of the Electrical industry for 40 years both here in the UK and in various parts of the world including the USA and I have never seen one single Fibreglass ladder. Regards to all Dave TSCM Operative Liverpool UK [Non-text portions of this message have been removed] 9572 From: George Shaw Date: Sun Sep 5, 2004 3:30am Subject: RE: The FBI's 'Magic Lantern' keystroke logger Looks fairly easy to get around this one. As the Magic lantern (ML) has to be installed it is not hard to detect its presence. A over-lay application could be written to sit before the keystroke interpreter and send a mixed combination to the ML, so rendering it useless. There are many way to detect the insertion of such an application. -- George Shaw MI3GTO / 2I0GTO " Any Sufficiently Advanced Technology is Indistinguishable from Magic" ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... Fax & Voicemail: +44 (0) 871 242 5365 EchoLink & eQSO (101English) connected 24/7 -----Original Message----- From: Gerald [mailto:geraldmsu@y...] Sent: 02 September 2004 08:11 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] The FBI's 'Magic Lantern' keystroke logger Snoopware: New Technologies, Laws Threaten Privacy The FBI's 'Magic Lantern' keystroke logger could help catch terrorists, but at what cost to your fundamental rights? 9573 From: syndracit Date: Sun Sep 5, 2004 5:26am Subject: Re: The FBI's 'Magic Lantern' keystroke logger Yeah I see your point. --- In TSCM-L@yahoogroups.com, Gerald wieczorek wrote: > From: > http://finance.groups.yahoo.com/group/TSCM-L/message/9496 > > Crossing Rootkits, automated attack bots, metasploit, keylogger or eavesdropper and a worm presents almost impossible detection case, and wide spread infection potential, with ease of use by a Newbie. > > It's a wonder they don't have that in every feild office, but I've heard,unconfirmed, they are still running 386's. > > GW. > > syndracit wrote: > Also keep in mind that this program was possible going to spread threw known vulnerabilities. Very shady if you ask me. > --- In TSCM-L@yahoogroups.com, "Gerald" wrote: > > Snoopware: New Technologies, Laws Threaten Privacy > > > > The FBI's 'Magic Lantern' keystroke logger could help catch > > terrorists, but at what cost to your fundamental rights? > > > > Kim Zetter > > From the March 2002 issue of PC World magazine > > > > They say the first casualty of war is truth. In the digital age, > > however, the initial victim may be the right to privacy for many > > Americans--criminals and innocent suspects alike. > > > > Last November, the FBI acknowledged the existence of Magic Lantern, a > > Trojan horse program it is developing that will render encryption > > useless on a suspect's computer by logging the user's keystrokes. > > Coupled with laws that Congress passed following September 11th, > > Magic Lantern will give the agency unprecedented access to digital > > communications. > > > > But is the government using the fight against terrorism as an excuse > > to gain long-sought surveillance powers, or is it merely trying to > > keep pace with tech-savvy criminals? > > > > Genie in a Bottle > > Magic Lantern reportedly will allow an agent to plant a keystroke > > logger in a specific computer by using a virus-like program. Once > > activated, the logger will capture words and numbers as a subject > > types them (before encryption kicks in), and will transmit them back > > to the agent. > > > > Privacy advocates say the as-yet-undeployed program is the > > government's attempt to obviate a bid (so far unsuccessful) to > > collect master keys from encryption software vendors, which would > > have let officers unscramble a suspect's data. > > > > "The government wants to be able to get into people's computers-- > > that's the surveillance agenda," says Jim Dempsey, deputy director of > > the Center for Democracy and Technology. "Any capability that lets > > them [the government] do that, they will seek." The FBI says it needs > > such tools to combat criminals. "In many ways law enforcement is > > playing catch-up," says FBI spokesperson Paul Bresson. > > > > "It's no secret that criminals and terrorists are exploiting > > technology to further crime. The FBI is not asking for any more than > > to continue to have the ability to conduct lawful intercepts of > > criminals and terrorists," Bresson argues. > > > > Dempsey says the program goes too far, however. More than just > > getting into your data, he says, it lets the FBI get "into your > > brain." "The program would not only capture messages you sent, it > > would capture messages that you wrote but never sent--things that > > perhaps you thought were a bad idea and [deleted]. This is the > > government using the Internet to get into people's houses and into > > their minds." > > > > Knock, Knock > > At issue is the fundamental right the Fourth Amendment grants > > citizens to prior notice when the government conducts a search and > > seizure. > > > > "In order for the government to seize your diary or read your > > letters, they have to knock on your door with a search warrant," > > Dempsey explains. "But [this tool] would allow them to seize these > > without notice." > > > > Most privacy advocates say it's not the technology that worries them, > > but the lack of judicial oversight in its use. Jennifer Granick, > > director of Stanford Law School's Center for Internet and Society, > > says she doesn't object to the FBI's using such tools, but she says > > she worries about misuse. > > > > "Advances in technology may require new law enforcement techniques," > > Granick notes. "These tools, if properly used within the system of > > checks and balances, may work, and then we can embrace them." But, > > Granick says, the same privacy protections that apply everywhere else > > should also apply in the digital world. > > > > The Patriot Act, passed by Congress in October 2001, weakens those > > protections in two major ways, says the Center for Democracy's > > Dempsey. > > > > The Act lets law enforcement agencies conduct surveillance under > > looser rules previously applicable only to foreign intelligence > > cases, he says. It also broadens law enforcement's ability to > > intercept Internet transactional data such as e-mail addresses. > > > > And while the act aims to assist in "terrorist" investigations, its > > surveillance provisions are not limited to that area, according to > > Dempsey. Critics say they're also concerned that talk likening > > hackers to terrorists could lead to investigations of innocent PC > > owners when hackers surreptitiously commandeer their PCs to launch > > Internet attacks against government sites. > > > > Appeasing Critics > > To allay such concerns, Barry Steinhardt, associate director of the > > American Civil Liberties Union, wants the FBI to open Magic Lantern-- > > and any other similar program it creates--to congressional and > > independent review prior to its deployment. "We still don't know > > whether Carnivore has been used in the way it's suppose to be used," > > he says. > > > > Carnivore, a controversial tool the FBI uses to collect e-mail > > passing through the servers of Internet service providers, is > > supposed to pick up only e-mail messages relevant to an investigation > > (see January's Consumer Watch for more information). But critics say > > that there is little oversight to ensure that the FBI uses the tool > > appropriately. > > > > And Dempsey says that a keystroke logger--with its unlimited access > > possibilities--offers even more opportunity for abuse by over-eager > > law enforcement officials. > > > > Still, the primary concern of most critics is the legislative carte > > blanche that the Patriot Act seems to give the FBI for conducting its > > investigations. > > > > Though there has been talk on the Senate Judiciary Committee > > about "fixing" the Patriot Act, the ACLU's Steinhardt says we'll > > probably have to wait some 18 months to see how the Act plays out in > > court cases before there will be any movement to change it. > > > > In the meantime, he says, "People should contact members of Congress > > to get them to take their oversight responsibilities seriously." > > http://www.pcworld.com/news/article/0,aid,78070,00.asp > > > > Gerald > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > Yahoo! Groups SponsorADVERTISEMENT > > > --------------------------------- > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > > __________________________________________________ > Do You Yahoo!? > Tired of spam? Yahoo! Mail has the best spam protection around > http://mail.yahoo.com > > [Non-text portions of this message have been removed] 9574 From: syndracit Date: Sun Sep 5, 2004 5:27am Subject: Re: The FBI's 'Magic Lantern' keystroke logger Yeah that is pretty shady... Makes you wonder what is next --- In TSCM-L@yahoogroups.com, "J. Oquendo" wrote: > > >> Also keep in mind that this program was possible going to > >> spread threw known vulnerabilities. Very shady if you ask > >> me. > > > This is nothing new, a spinoff from Carnivore. A while back I wrote "How > to Circumvent Carnivore" which was poorly written, but indeed gave someone > without much technical skills the ability to protect themselves from > illegal wiretaps courtesy of the feds. > > Haven't followed it since though. Carnivore was notorious at watching > everyone on the line, meaning if you and I shared the same provider, and > they intended on listening to you, they also listened to me. Pretty sad, > and I now wonder how many people ended up having to explain why they > intended on killing their dad to the feds only to find out down the line > the son meant at a game of Quake. > > There are many tools available to monitor what files are being used even > in Windows though, DLL files, and so forth, but to the layperson (non > techie), many know little of them. Perhaps one day when I venture back > into computer security I'll throw up a few pages of nifty tools. Since I > generally use Solaris, or a BSD I usually have the capability of knowing > what's running on my machine at any given time. Funny thing is, I wonder > how long will it be before someone creates a random garbage generator; > e.g.: OSAMA, DIE, BOMB, FUCK, SHIT, and so on, to feed these little > espionageware programs false data. Will they consider the author a > criminal too for defeating their poorly engineered illegalware? > > =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ > J. Oquendo > GPG Key ID 0x51F9D78D > Fingerprint 2A48 BA18 1851 4C99 > > CA22 0619 DB63 F2F7 51F9 D78D > http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D > > sil @ politrix . org http://www.politrix.org > sil @ infiltrated . net http://www.infiltrated.net > > "How can we account for our present situation unless we > believe that men high in this government are concerting > to deliver us to disaster?" Joseph McCarthy "America's > Retreat from Victory" 9575 From: Martin Peck Date: Sat Sep 4, 2004 10:52pm Subject: SDR analysis of covert transmissions I am interested in potential application of SDR hardware applied to analysis / detection of covert transmissions. This would seem to be a (relatively) inexpensive method for detection, and perhaps well suited to very wide band transmission detection that might be indistinguishable from the noise floor if only a narrow view of spectrum is available. Is anyone aware of existing products / techniques using this approach? I am particularly interested in the types of RF front ends which would be required to make this useful. Some hardware of interest: http://www.xilinx.com/ipcenter/dsp/development_kit.htm http://www.pentek.com/products/Detail.CFM?Model=6821 http://www.hunteng.co.uk/products/fpga/heron-io5.htm Best regards, --- P.S. Has the use of UWB or other very wide burst transmission methods been confirmed in covert monitoring applications? What kinds of devices utilize these communications? 9576 From: George Shaw Date: Sun Sep 5, 2004 8:41am Subject: Help needed with leased line specifications Can any one here help by providing a link to the electrical and signal specifications for a UK leased line as provided by BT commonly known as a kilostream? -- George Shaw MI3GTO / 2I0GTO " Any Sufficiently Advanced Technology is Indistinguishable from Magic" ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... Fax & Voicemail: +44 (0) 871 242 5365 EchoLink & eQSO (101English) connected 24/7 9577 From: Michael Puchol Date: Sun Sep 5, 2004 11:20am Subject: Re: Analysis of discovered RF device I'm not sure it's so much a spelling mistake as an attempt not to be flagged by some computerised mega-big-brother by using the t-word or other related 'bad' words. Regards, Mike ----- Original Message ----- From: To: Sent: Sunday, September 05, 2004 10:19 AM Subject: Re: [TSCM-L] Analysis of discovered RF device > Dear All > I am at a loss to understand what a "terrism-related/manoey laudering case" > Any ideas anybody please. > If this is a misspelling, surely it must be good manners to press the 'spell > check' before sending to the group. > What exactly is a 'TANGO'? > Less jargon from our very knowledgeable American cousins, aimed at the > members outside of the USA would be very helpful please. > Regarding the aluminium ladder issue, I have been part of the Electrical > industry for 40 years both here in the UK and in various parts of the world > including the USA and I have never seen one single Fibreglass ladder. > Regards to all > Dave > TSCM Operative Liverpool UK > > > [Non-text portions of this message have been removed] > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9578 From: Andy Cuff Date: Sun Sep 5, 2004 11:26am Subject: Re: Help needed with leased line specifications Hi George, Will this do http://www.blackburncollege.freeserve.co.uk/slatcomm/Modems%20and%20line%20drivers.doc Higher level info here http://www.midnight-computing.com/midcote/carrier_systems/data.htm -andy cuff Talisker's Computer Security Portal Computer Network Defence Ltd http://www.securitywizardry.com ----- Original Message ----- From: "George Shaw" To: Sent: Sunday, September 05, 2004 2:41 PM Subject: [TSCM-L] Help needed with leased line specifications > > Can any one here help by providing a link to the electrical and signal > specifications for a UK leased line as provided by BT commonly known as a > kilostream? > > -- > George Shaw MI3GTO / 2I0GTO > > " Any Sufficiently Advanced Technology > is Indistinguishable from Magic" > ---Arthur C. Clarke > > Mobile: +44 (0) 7740 361 163 > Email: george.shaw@u... > Fax & Voicemail: +44 (0) 871 242 5365 > EchoLink & eQSO (101English) connected 24/7 > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 9579 From: A Grudko Date: Sun Sep 5, 2004 0:05pm Subject: RE: SDR analysis of covert transmissions -----Original Message----- From: Martin Peck [mailto:coderman@g...] Sent: 05 September 2004 05:52 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] SDR analysis of covert transmissions I am interested in potential application of SDR hardware applied to analysis / detection of covert transmissions. SDR? --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.749 / Virus Database: 501 - Release Date: 2004/09/01 [Non-text portions of this message have been removed] 9580 From: Tech Sec Lab Date: Sun Sep 5, 2004 0:09pm Subject: RE: Ladders... Hmmm... I just talked to one of my work mates a minute ago mentionning the fact that; "Isn't it so weird that so many people here use alu ladders when its such a electric shock risk....?" To which he replied "You pratt, that's why they all have plastic legs....!" and sauntered away in disgust... And come to think of it, he was right.....all the professional alu ladders here have plastic legs(feet/paws/claws)...! SO, if its ok with the gov, I will keep my alu ladders! Pffff....fibreglass! ********* Message: 13 Date: Sun, 5 Sep 2004 04:19:59 EDT From: DEMTEC@A... Subject: Re: Analysis of discovered RF device Dear All I am at a loss to understand what a "terrism-related/manoey laudering case" Any ideas anybody please. If this is a misspelling, surely it must be good manners to press the 'spell check' before sending to the group. What exactly is a 'TANGO'? Less jargon from our very knowledgeable American cousins, aimed at the members outside of the USA would be very helpful please. Regarding the aluminium ladder issue, I have been part of the Electrical industry for 40 years both here in the UK and in various parts of the world including the USA and I have never seen one single Fibreglass ladder. Regards to all Dave TSCM Operative Liverpool UK 9581 From: James M. Atkinson Date: Sun Sep 5, 2004 11:49am Subject: Man accused of stalking with GPS Man accused of stalking with GPS Saturday, September 4, 2004 Posted: 6:09 PM EDT (2209 GMT) http://www.cnn.com/2004/US/West/09/04/gps.stalking.ap/index.html GLENDALE, California (AP) -- Police arrested a man they said tracked his ex-girlfriend's whereabouts by attaching a global positioning system to her car. Ara Gabrielyan, 32, was arrested August 29 on one count of stalking and three counts of making criminal threats. He was being held on $500,000 bail and was to be arraigned Wednesday. "This is what I would consider stalking of the 21st century," police Lt. Jon Perkins said. Police said Gabrielyan tracked the 35-year-old woman, who was not identified, after she ended their relationship, showing up unexpectedly at a book store, an airport and dozens of other places where she was. Police said Gabrielyan attached a cellular phone to the woman's car on August 16 with a motion switch that turned on when the car moved, transmitting a signal each minute to a satellite. Information was then sent to a Web site that allowed Gabrielyan to monitor the woman's location. The woman learned how Gabrielyan was following her when she discovered him under her car attempting to change the cell phone's battery, police said. Police allege Gabrielyan threatened over a six-month period to kill himself and the woman. An attorney for Gabrielyan could not immediately be reached for comment Saturday. He faces up to six years in prison if convicted. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9582 From: Michael Puchol Date: Sun Sep 5, 2004 2:14pm Subject: Re: SDR analysis of covert transmissions > SDR? SDR = Software Defined Radio. A good example of this is the SDR-14, which samples 0-30 MHz all in one go, and sends it to the PC via USB port. This means that ALL activity on this 30MHz segment can be recorded at once, thus making it a very useful intercept and monitoring system. Combined with the IF output of another receiver, it can be used over a much wider spectrum. http://www.rfspace.com/sdr14.html The beauty of an SDR is that it can be completely changed via software, i.e. it's not a fixed RF design. Some will say this sacrifices certain aspects of a receiver, and I believe this is true. The flexibility of it can pay back what you lose in RF perfomance in some situations. Regards, Mike 9583 From: Andy Cuff Date: Sun Sep 5, 2004 2:54pm Subject: Re: Man accused of stalking with GPS Hi Saw this on ebay http://cgi.ebay.co.uk/ws/eBayISAPI.dll?ViewItem&category=324&item=5517939286&rd=1&ssPageName=WDVW ÿ TRACK STOLEN ITEMS 'LIVE' VIA THE INTERNET ÿ SECRETLY 'LISTEN IN' TO EVENTS THRU YOUR LAND LINE OR MOBILE PHONE ÿ EASY-TO-USE VOICE GUIDED OPERATION AND SET-UP PROCEDURES ÿ HIGHLY SENSITIVE MICROPHONE RECORDS AND TRANSMITS PERFECT CLARITY ÿ NO RECURRING MONTHLY TRACKING FEES (EG-: WWW.FOLLOWUS.CO.UK) ÿ USES CHEAP 'PAY-AS-YOU-GO' SIM CARD ÿ IDEAL FOR HOME SURVEILLANCE (SYSTEM PHONES YOU WHEN INTRUSION OCCURS) ÿ BUILT IN RECHARGEABLE BATTERY (EXTERNAL HI-POWER BATTERY ALSO AVAILABLE) ÿ UTILISES STANDARD EUROPEAN GSM NETWORK TECHNOLOGY (900/1800 MHZ) ÿ TRACK AND LISTEN TO EVENTS FROM ANYWHERE IN THE WORLD! ÿ CONTROL THE ENTIRE UNIT REMOTELY USING YOUR LAND-LINE OR MOBILE PHONE ÿ THE SIZE OF A PACKET OF CIGARETTES (ONLY 128 * 84 MM) -andy cuff Talisker's Computer Security Portal Computer Network Defence Ltd http://www.securitywizardry.com ----- Original Message ----- From: "James M. Atkinson" To: "TSCM-L" Sent: Sunday, September 05, 2004 5:49 PM Subject: [TSCM-L] Man accused of stalking with GPS > > Man accused of stalking with GPS > > Saturday, September 4, 2004 Posted: 6:09 PM EDT (2209 GMT) > > http://www.cnn.com/2004/US/West/09/04/gps.stalking.ap/index.html > > > GLENDALE, California (AP) -- Police arrested a man they said tracked his > ex-girlfriend's whereabouts by attaching a global positioning system to her > car. > > Ara Gabrielyan, 32, was arrested August 29 on one count of stalking and > three counts of making criminal threats. He was being held on $500,000 bail > and was to be arraigned Wednesday. > > "This is what I would consider stalking of the 21st century," police Lt. > Jon Perkins said. > > Police said Gabrielyan tracked the 35-year-old woman, who was not > identified, after she ended their relationship, showing up unexpectedly at > a book store, an airport and dozens of other places where she was. > > Police said Gabrielyan attached a cellular phone to the woman's car on > August 16 with a motion switch that turned on when the car moved, > transmitting a signal each minute to a satellite. Information was then sent > to a Web site that allowed Gabrielyan to monitor the woman's location. > > The woman learned how Gabrielyan was following her when she discovered him > under her car attempting to change the cell phone's battery, police said. > > Police allege Gabrielyan threatened over a six-month period to kill himself > and the woman. An attorney for Gabrielyan could not immediately be reached > for comment Saturday. > > He faces up to six years in prison if convicted. > > > > > > > > -------------------------------------------------------------------------- --------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > -------------------------------------------------------------------------- --------------------------- > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------------- --------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------------- --------------------------- > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9584 From: Andy Cuff Date: Sun Sep 5, 2004 3:02pm Subject: Re: HUMOR Man accused of stalking with GPS Hi Just noticed this line "AT RISK ELDERLY RELATIVES OR CHILDREN (WORLDWIDE BABY MONITOR)" I'm fairly sure the authorities would have a dim view of going on vacation abroad and checking on your baby over the Internet! Though think of the savings in air fares. A whole new enterprise; you could out source child minding to the third world, call centres were so last year LOL -andy cuff Talisker's Computer Security Portal Computer Network Defence Ltd http://www.securitywizardry.com ----- Original Message ----- From: "Andy Cuff" To: Sent: Sunday, September 05, 2004 8:54 PM Subject: Re: [TSCM-L] Man accused of stalking with GPS > Hi > Saw this on ebay > > http://cgi.ebay.co.uk/ws/eBayISAPI.dll?ViewItem&category=324&item=5517939286&rd=1&ssPageName=WDVW > > ÿ TRACK STOLEN ITEMS 'LIVE' VIA THE INTERNET > > ÿ SECRETLY 'LISTEN IN' TO EVENTS THRU YOUR LAND LINE OR MOBILE PHONE > > ÿ EASY-TO-USE VOICE GUIDED OPERATION AND SET-UP PROCEDURES > > ÿ HIGHLY SENSITIVE MICROPHONE RECORDS AND TRANSMITS PERFECT CLARITY > > ÿ NO RECURRING MONTHLY TRACKING FEES (EG-: WWW.FOLLOWUS.CO.UK) > > ÿ USES CHEAP 'PAY-AS-YOU-GO' SIM CARD > > ÿ IDEAL FOR HOME SURVEILLANCE (SYSTEM PHONES YOU WHEN INTRUSION > OCCURS) > > ÿ BUILT IN RECHARGEABLE BATTERY (EXTERNAL HI-POWER BATTERY ALSO > AVAILABLE) > > ÿ UTILISES STANDARD EUROPEAN GSM NETWORK TECHNOLOGY (900/1800 MHZ) > > ÿ TRACK AND LISTEN TO EVENTS FROM ANYWHERE IN THE WORLD! > > ÿ CONTROL THE ENTIRE UNIT REMOTELY USING YOUR LAND-LINE OR MOBILE > PHONE > > ÿ THE SIZE OF A PACKET OF CIGARETTES (ONLY 128 * 84 MM) > > > > -andy cuff > > Talisker's Computer Security Portal > Computer Network Defence Ltd > http://www.securitywizardry.com > ----- Original Message ----- > From: "James M. Atkinson" > To: "TSCM-L" > Sent: Sunday, September 05, 2004 5:49 PM > Subject: [TSCM-L] Man accused of stalking with GPS > > > > > > Man accused of stalking with GPS > > > > Saturday, September 4, 2004 Posted: 6:09 PM EDT (2209 GMT) > > > > http://www.cnn.com/2004/US/West/09/04/gps.stalking.ap/index.html > > > > > > GLENDALE, California (AP) -- Police arrested a man they said tracked his > > ex-girlfriend's whereabouts by attaching a global positioning system to > her > > car. > > > > Ara Gabrielyan, 32, was arrested August 29 on one count of stalking and > > three counts of making criminal threats. He was being held on $500,000 > bail > > and was to be arraigned Wednesday. > > > > "This is what I would consider stalking of the 21st century," police Lt. > > Jon Perkins said. > > > > Police said Gabrielyan tracked the 35-year-old woman, who was not > > identified, after she ended their relationship, showing up unexpectedly at > > a book store, an airport and dozens of other places where she was. > > > > Police said Gabrielyan attached a cellular phone to the woman's car on > > August 16 with a motion switch that turned on when the car moved, > > transmitting a signal each minute to a satellite. Information was then > sent > > to a Web site that allowed Gabrielyan to monitor the woman's location. > > > > The woman learned how Gabrielyan was following her when she discovered him > > under her car attempting to change the cell phone's battery, police said. > > > > Police allege Gabrielyan threatened over a six-month period to kill > himself > > and the woman. An attorney for Gabrielyan could not immediately be reached > > for comment Saturday. > > > > He faces up to six years in prison if convicted. > > > > > > > > > > > > > > > > -------------------------------------------------------------------------- > --------------------------- > > > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > > -------------------------------------------------------------------------- > --------------------------- > > > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 Web: > http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > > -------------------------------------------------------------------------- > --------------------------- > > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > > -------------------------------------------------------------------------- > --------------------------- > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9585 From: James M. Atkinson Date: Sun Sep 5, 2004 9:20pm Subject: Re: SDR analysis of covert transmissions I have own some SDR-14's, and have been quite pleased with them, but I wish the factory would build them faster (do I can buy a few more). I use them as a two channel spectrum display on other radio's and instruments. For example I hang one off the back on an R-8500 connected to the 10.7 IF output for a fairly high performance spectrum display. I then use the secondary "raw" channel of the SDR to view the output of the detector after passing it through a bandpass filter so I can pick apart any sub-carrier or hidden signals riding the main carrier. I would like to see them add pulse and phase demodulation capability, and maybe squeeze in a some extra bandwidth. -jma At 03:14 PM 9/5/2004, Michael Puchol wrote: > > SDR? > > >SDR = Software Defined Radio. > >A good example of this is the SDR-14, which samples 0-30 MHz all in one go, >and sends it to the PC via USB port. This means that ALL activity on this >30MHz segment can be recorded at once, thus making it a very useful >intercept and monitoring system. Combined with the IF output of another >receiver, it can be used over a much wider spectrum. > >http://www.rfspace.com/sdr14.html > >The beauty of an SDR is that it can be completely changed via software, i.e. >it's not a fixed RF design. Some will say this sacrifices certain aspects of >a receiver, and I believe this is true. The flexibility of it can pay back >what you lose in RF perfomance in some situations. > >Regards, > >Mike ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9586 From: G P Date: Sun Sep 5, 2004 11:33am Subject: Re: The FBI's 'Magic Lantern' keystroke logger 'Magic Lantern' is more than likely deployed by way of Carnivore/DCS1000, what people don't realize about that technology is that it is _not_ a simple passive sniffer that collects network traffic and extrapolates email headers. Carnivore/DCS1000 contains a transparent layer-2 Ethernet bridge (Packeteer, http://www.packeteer.com) that can be used to intercept/modify/alter traffic "on-the-fly", without either end of the connection detecting the changes. The specs on the Packeteer box that they use and the GAO contract award has been published to Cryptome more than once, although there has been little outcry from various civil liberties groups about the very much active nature and capability of Carnivore/DCS1000, when used in tandem with a device like the Packeteer bridge. It's very powerful technology that is not passive (and almost impossible to defend against with unauthenticated and unencrypted network traffic), using a layer-2 bridge would give them the ability to inject traffic, transparently modify http requests with additional payload, silently bounce and/or intercept email etc. The use of these types of technologies really changes the dynamic of the courtroom scenario, I don't know how the FBI can, from a forensics standpoint, verify the validity and authenticity of siezed PCs after using Carnivore/DCS1000/Magic Lantern during the investigation. They could literally change/modify anything on the wire, and very quietly "plant" information on a subject PC with little effort. --- Gerald wrote: > Snoopware: New Technologies, Laws Threaten Privacy > > The FBI's 'Magic Lantern' keystroke logger could > help catch > terrorists, but at what cost to your fundamental > rights? > > Kim Zetter > From the March 2002 issue of PC World magazine > > They say the first casualty of war is truth. In the > digital age, > however, the initial victim may be the right to > privacy for many > Americans--criminals and innocent suspects alike. > > Last November, the FBI acknowledged the existence of > Magic Lantern, a > Trojan horse program it is developing that will > render encryption > useless on a suspect's computer by logging the > user's keystrokes. > Coupled with laws that Congress passed following > September 11th, > Magic Lantern will give the agency unprecedented > access to digital > communications. > > But is the government using the fight against > terrorism as an excuse > to gain long-sought surveillance powers, or is it > merely trying to > keep pace with tech-savvy criminals? > > Genie in a Bottle > Magic Lantern reportedly will allow an agent to > plant a keystroke > logger in a specific computer by using a virus-like > program. Once > activated, the logger will capture words and numbers > as a subject > types them (before encryption kicks in), and will > transmit them back > to the agent. > > Privacy advocates say the as-yet-undeployed program > is the > government's attempt to obviate a bid (so far > unsuccessful) to > collect master keys from encryption software > vendors, which would > have let officers unscramble a suspect's data. > > "The government wants to be able to get into > people's computers-- > that's the surveillance agenda," says Jim Dempsey, > deputy director of > the Center for Democracy and Technology. "Any > capability that lets > them [the government] do that, they will seek." The > FBI says it needs > such tools to combat criminals. "In many ways law > enforcement is > playing catch-up," says FBI spokesperson Paul > Bresson. > > "It's no secret that criminals and terrorists are > exploiting > technology to further crime. The FBI is not asking > for any more than > to continue to have the ability to conduct lawful > intercepts of > criminals and terrorists," Bresson argues. > > Dempsey says the program goes too far, however. More > than just > getting into your data, he says, it lets the FBI get > "into your > brain." "The program would not only capture messages > you sent, it > would capture messages that you wrote but never > sent--things that > perhaps you thought were a bad idea and [deleted]. > This is the > government using the Internet to get into people's > houses and into > their minds." > > Knock, Knock > At issue is the fundamental right the Fourth > Amendment grants > citizens to prior notice when the government > conducts a search and > seizure. > > "In order for the government to seize your diary or > read your > letters, they have to knock on your door with a > search warrant," > Dempsey explains. "But [this tool] would allow them > to seize these > without notice." > > Most privacy advocates say it's not the technology > that worries them, > but the lack of judicial oversight in its use. > Jennifer Granick, > director of Stanford Law School's Center for > Internet and Society, > says she doesn't object to the FBI's using such > tools, but she says > she worries about misuse. > > "Advances in technology may require new law > enforcement techniques," > Granick notes. "These tools, if properly used within > the system of > checks and balances, may work, and then we can > embrace them." But, > Granick says, the same privacy protections that > apply everywhere else > should also apply in the digital world. > > The Patriot Act, passed by Congress in October 2001, > weakens those > protections in two major ways, says the Center for > Democracy's > Dempsey. > > The Act lets law enforcement agencies conduct > surveillance under > looser rules previously applicable only to foreign > intelligence > cases, he says. It also broadens law enforcement's > ability to > intercept Internet transactional data such as e-mail > addresses. > > And while the act aims to assist in "terrorist" > investigations, its > surveillance provisions are not limited to that > area, according to > Dempsey. Critics say they're also concerned that > talk likening > hackers to terrorists could lead to investigations > of innocent PC > owners when hackers surreptitiously commandeer their > PCs to launch > Internet attacks against government sites. > > Appeasing Critics > To allay such concerns, Barry Steinhardt, associate > director of the > American Civil Liberties Union, wants the FBI to > open Magic Lantern-- > and any other similar program it creates--to > congressional and > independent review prior to its deployment. "We > still don't know > whether Carnivore has been used in the way it's > suppose to be used," > he says. > > Carnivore, a controversial tool the FBI uses to > collect e-mail > passing through the servers of Internet service > providers, is > supposed to pick up only e-mail messages relevant to > an investigation > (see January's Consumer Watch for more information). > But critics say > that there is little oversight to ensure that the > FBI uses the tool > appropriately. > > And Dempsey says that a keystroke logger--with its > unlimited access > possibilities--offers even more opportunity for > abuse by over-eager > law enforcement officials. > > Still, the primary concern of most critics is the > legislative carte > blanche that the Patriot Act seems to give the FBI > for conducting its > investigations. > > Though there has been talk on the Senate Judiciary > Committee > about "fixing" the Patriot Act, the ACLU's > Steinhardt says we'll > probably have to wait some 18 months to see how the > Act plays out in > court cases before there will be any movement to > change it. > > In the meantime, he says, "People should contact > members of Congress > to get them to take their oversight responsibilities > seriously." > http://www.pcworld.com/news/article/0,aid,78070,00.asp > === message truncated === _______________________________ Do you Yahoo!? Win 1 of 4,000 free domain names from Yahoo! Enter now. http://promotions.yahoo.com/goldrush 9587 From: Date: Sun Sep 5, 2004 0:08pm Subject: Re:Ladder Issue http://www.cdc.gov/niosh/89-110.html http://www.cdc.gov/niosh/face/stateface/md/98md019.html from 1973 http://www.oshrc.gov/decisions/html_1973/83.html Section 5(a)(1) provides that each employer shall furnish to each of his employees employment and a place of employment which are free from recognized hazards that are causing or are likely to cause death or serious physical harm to his employees. http://www.americanladderinstitute.org/ali/press_releases.asp Many a person has a choice to make a decision that will dictate the safety of others..... What choice would you make? At 03:19 AM 9/5/2004, DEMTEC@A... wrote: >Dear All ><> >Regarding the aluminium ladder issue, I have been part of the Electrical >industry for 40 years both here in the UK and in various parts of the world >including the USA and I have never seen one single Fibreglass ladder. >Regards to all >Dave >TSCM Operative Liverpool UK > 9588 From: Sir Nobody in Particular Date: Sun Sep 5, 2004 0:04pm Subject: bunches of zeros I've been on this list for years, quietly reading the posts and doing my best to understand what wasn't totally out of reach for my non-TSCM educated brain. Not too long ago, discussions were abounding regarding the various methods of masking or changing caller ID numbers and how those methods worked. In the past few weeks, some debt collector has been calling me trying to locate a rather beautiful but very X girlfriend. I would have gladly helped him find her as she made a mess out of everything she could before leaving for greener pastures. When the number came up as 000 000 0000, I knew from reading posts that this collector was using technology talked about on this site. I questioned him and he hung up. No balls. Too bad for him. But it struck me as highly illegal in that the deception couldn't be anything but nefarious in nature even if trying to coerce me into divulging the current whereabouts of this notorious blonde knockout. It didn't sit right with me at all. Now there is this article. How can these guys get away with this? Is there no current binding legislation that governs these practices? Evan The International Herald Tribune New service allows users to outfox caller ID Ken Belson NYT Friday, September 03, 2004 Like most bill collectors, Marvin Smith is always seeking ways to get chronic debtors to pay up. When he calls the first time, he typically hears excuses and requests for more time. When Smith calls again, the debtor often blocks his calls using caller ID technology from the phone company. That means Smith then visits in person, a time-consuming and sometimes dangerous task. But Smith, who runs a collection agency in Austin, Texas, says he may have found a solution: a new computerized service enabling him to create false outbound phone numbers with a click of a mouse, so he can skirt the call blockers. The service, the first commercial version of a technology known until now mainly among software programmers and the computer-hacker underground, was rolled out nationwide on Wednesday by a California company called Star38. The anti-caller-ID digital technology the company takes advantage of is theoretically available around the world - wherever phone companies use digital phones - but Star38 is probably the only company that is making a business out of it. For $19.99 a month and as little as 7 cents a minute, customers can go to the company's Web site (www.star38.com), log in and type the number they want to call and the number they want to appear on the caller ID screen of the recipient's phone. For an additional fee, they can also specify names that can appear along with their telephone numbers. "This product would be beneficial," Smith, the bill collector, said. "I'm going to look into it." Star38 says that others with reason to mask their telephone identities, including private detectives and law enforcement officials, are looking into it, too. But some privacy-rights advocates and consumer groups wonder whether angry ex-spouses, stalkers or fraud artists might not be far behind. But Star38 executives said the company had no immediate plans to sell its service to the general public because of the potential for misuse. The company also plans to cooperate with police forces, if asked, to provide records of what numbers customers dialed to and from, and what numbers they chose to show the recipients of their calls. "Law enforcement will have complete access to search our database," said Jason Jepson, the chief executive of Star38, of Newport Beach, California. "We don't want the insinuation that they can sign up, use it temporarily and then run off." Officials at the Federal Communications Commission indicated that there was nothing illegal, per se, in the Star38 system. And to some extent, it is merely the latest step in the continual cat-and-mouse game played since caller ID was introduced in the 1980s. But the new service goes beyond past techniques like withholding the caller's number or masking it with a series of meaningless digits. With Star38, for the first time it will be possible for vast numbers of people to place calls masquerading as someone else. "My concern is that private investigators will find out your mother's number so their number will pop up on your telephone as 'Mom,'" said Loretta Lynch, a member of the California Public Utilities Commission, which regulates the telecommunications industry in the state. "People will not trust what their phones tell them," she added. "It will spell the end of caller ID as a way for people to protect their privacy." An official of the Federal Communications Commission official said its rules require only that telephone companies provide caller ID capabilities and the ability to block caller ID. The rules do not cover add-on services like Star38 that are provided by nontelephone companies. But Star38 or any other service that helps companies deceive consumers does have the potential to run afoul of the federal Fair Debt Collection Practices Act. "Third-party debt collectors are prohibited from using any means that is likely to deceive consumers," said Rozanne Andersen, general counsel at the Association of Credit Collection Professionals, a trade group based in Minneapolis. "So unless the collector is presenting a telephone number that is meaningful to the consumer, it is arguably a deceptive practice," she said. She also said a service like Star38 could violate various state fraud laws. Jepson said the company's lawyers were confident that the service was legal. And he said debt collectors, who might be able to spoof caller ID systems by using Star38, would still be obligated to identify themselves once a recipient picked up the phone. At least one big telephone company, BellSouth, is concerned about the advent of Star38. "It raises safety issues," said Jeffrey Battcher, a BellSouth spokesman. "Our legal and regulatory departments are looking into it. Also, the service degrades a BellSouth service that people pay for - the caller ID information they pay for." The New York Times The International Herald Tribune New service allows users to outfox caller ID Ken Belson NYT Friday, September 03, 2004 Like most bill collectors, Marvin Smith is always seeking ways to get chronic debtors to pay up. When he calls the first time, he typically hears excuses and requests for more time. When Smith calls again, the debtor often blocks his calls using caller ID technology from the phone company. That means Smith then visits in person, a time-consuming and sometimes dangerous task. But Smith, who runs a collection agency in Austin, Texas, says he may have found a solution: a new computerized service enabling him to create false outbound phone numbers with a click of a mouse, so he can skirt the call blockers. The service, the first commercial version of a technology known until now mainly among software programmers and the computer-hacker underground, was rolled out nationwide on Wednesday by a California company called Star38. The anti-caller-ID digital technology the company takes advantage of is theoretically available around the world - wherever phone companies use digital phones - but Star38 is probably the only company that is making a business out of it. For $19.99 a month and as little as 7 cents a minute, customers can go to the company's Web site (www.star38.com), log in and type the number they want to call and the number they want to appear on the caller ID screen of the recipient's phone. For an additional fee, they can also specify names that can appear along with their telephone numbers. "This product would be beneficial," Smith, the bill collector, said. "I'm going to look into it." Star38 says that others with reason to mask their telephone identities, including private detectives and law enforcement officials, are looking into it, too. But some privacy-rights advocates and consumer groups wonder whether angry ex-spouses, stalkers or fraud artists might not be far behind. But Star38 executives said the company had no immediate plans to sell its service to the general public because of the potential for misuse. The company also plans to cooperate with police forces, if asked, to provide records of what numbers customers dialed to and from, and what numbers they chose to show the recipients of their calls. "Law enforcement will have complete access to search our database," said Jason Jepson, the chief executive of Star38, of Newport Beach, California. "We don't want the insinuation that they can sign up, use it temporarily and then run off." Officials at the Federal Communications Commission indicated that there was nothing illegal, per se, in the Star38 system. And to some extent, it is merely the latest step in the continual cat-and-mouse game played since caller ID was introduced in the 1980s. But the new service goes beyond past techniques like withholding the caller's number or masking it with a series of meaningless digits. With Star38, for the first time it will be possible for vast numbers of people to place calls masquerading as someone else. "My concern is that private investigators will find out your mother's number so their number will pop up on your telephone as 'Mom,'" said Loretta Lynch, a member of the California Public Utilities Commission, which regulates the telecommunications industry in the state. "People will not trust what their phones tell them," she added. "It will spell the end of caller ID as a way for people to protect their privacy." An official of the Federal Communications Commission official said its rules require only that telephone companies provide caller ID capabilities and the ability to block caller ID. The rules do not cover add-on services like Star38 that are provided by nontelephone companies. But Star38 or any other service that helps companies deceive consumers does have the potential to run afoul of the federal Fair Debt Collection Practices Act. "Third-party debt collectors are prohibited from using any means that is likely to deceive consumers," said Rozanne Andersen, general counsel at the Association of Credit Collection Professionals, a trade group based in Minneapolis. "So unless the collector is presenting a telephone number that is meaningful to the consumer, it is arguably a deceptive practice," she said. She also said a service like Star38 could violate various state fraud laws. Jepson said the company's lawyers were confident that the service was legal. And he said debt collectors, who might be able to spoof caller ID systems by using Star38, would still be obligated to identify themselves once a recipient picked up the phone. At least one big telephone company, BellSouth, is concerned about the advent of Star38. "It raises safety issues," said Jeffrey Battcher, a BellSouth spokesman. "Our legal and regulatory departments are looking into it. Also, the service degrades a BellSouth service that people pay for - the caller ID information they pay for." The New York Times [Non-text portions of this message have been removed] 9589 From: Agent Geiger Date: Sun Sep 5, 2004 1:25pm Subject: Re: Analysis of discovered RF device In news groups, people have typos all the time. You can still get the point across regardless. Please try and understand that if I had to grammatically analyze every newsgroup posting, I could never answer any. Being grammar police is a bit anal, and really does not address the points and contents of postings. PS To my knowlwedge, Yahoo does not have a spellchecker built in. PSS TANGO is the military alphabet pronunciation of the letter "T." When you are dealing with a topic such as this, you cannot get away from the use of jargon. --- DEMTEC@A... wrote: > Dear All > I am at a loss to understand what a > "terrism-related/manoey laudering case" > Any ideas anybody please. > If this is a misspelling, surely it must be good > manners to press the 'spell > check' before sending to the group. > What exactly is a 'TANGO'? > Less jargon from our very knowledgeable American > cousins, aimed at the > members outside of the USA would be very helpful > please. > Regarding the aluminium ladder issue, I have been > part of the Electrical > industry for 40 years both here in the UK and in > various parts of the world > including the USA and I have never seen one single > Fibreglass ladder. > Regards to all > Dave > TSCM Operative Liverpool UK > > > [Non-text portions of this message have been > removed] > > > From: Dawn Star Date: Mon Sep 4, 2000 4:00pm Subject: Check and Balence "If the government wants to license TSCM people then someone other then the agency that handles PI's should be used (ie" lisc. them the same way you lisc. engineers, building contractors, and so on)." jma I find the whole Idea of government regulation/control of the people who have some of the only expertise to determine whether four and fifth amendment rights of privacy are in tact or not is a complete conflict of interest. This would remove an important and necessary check and balance that is needed to safeguard our liberty as our founding fathers intended. Roger Tolces, Electronic Security, Los Angeles, Ca. [Non-text portions of this message have been removed] 1383 From: Mike F Date: Mon Sep 4, 2000 4:02pm Subject: RE: Check and Balence I think that PI'S are .licensed at the state level. Each state has differant requirements. Here is some info about PI licenses. Site for nationwide PI licensing units: http://www.oregonpi.com/licensing.htm later4,mike f From: Dawn Star [mailto:bratkid@e...] Sent: Monday, September 04, 2000 4:01 PM To: TSCM-L@egroups.com Subject: [TSCM-L] Check and Balence "If the government wants to license TSCM people then someone other then the agency that handles PI's should be used (ie" lisc. them the same way you lisc. engineers, building contractors, and so on)." jma I find the whole Idea of government regulation/control of the people who have some of the only expertise to determine whether four and fifth amendment rights of privacy are in tact or not is a complete conflict of interest. This would remove an important and necessary check and balance that is needed to safeguard our liberty as our founding fathers intended. Roger Tolces, Electronic Security, Los Angeles, Ca. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1384 From: James M. Atkinson, Comm-Eng Date: Mon Sep 4, 2000 5:32pm Subject: Re: Check and Balence Roger, One of the functions of government is to protect the public from various cons, scams, hoaxes, and so on. Sadly, many TSCM people out there are cheating their clients plain and simple. Many do not have any kind of a technical background and depend on the most primitive equipment to impress their clients. Their goal generally seems to take a few days of training, invest in a few thousand in equipment, and then start "raking in the big bucks" by offering some kind of magical service such as TSCM. To protect the public the government has two choices... First they can prosecute "rain dancing con artists" for unfair and deceptive business practices. Second, the government can force some kind of regulation of the industry. The only problem with the "regulation" issue is that every PI starts jumping up and down demanding to be grandfathered, or want the requirements modified so requirements for a technical background and training are removed. There are an amazing number of "TSCM Experts" out there who really don't have the foggiest idea what they are doing, and are charging their clients a fortune for a fraudulent and deceptive service. -jma . >"If the government wants to license TSCM people then someone other >then the agency that handles PI's should be used (ie" lisc. them the >same way you lisc. engineers, building contractors, and so on)." > >jma > >I find the whole Idea of government regulation/control of the people >who have some of the only expertise to determine whether four and >fifth amendment rights of privacy are in tact or not is a complete >conflict of interest. This would remove an important and necessary >check and balance that is needed to safeguard our liberty as our >founding fathers intended. > > Roger Tolces, Electronic >Security, Los Angeles, Ca. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1385 From: Dawn Star Date: Tue Sep 5, 2000 3:14pm Subject: Check and Balence "To protect the public the government has two choices... First they can prosecute "rain dancing con artists" for unfair and deceptive business practices. Second, the government can force some kind of regulation of the industry." jma I don't think it is the governments job to protect the public in all instances of commercial/consumer activity, nor do I think they have the manpower or expertise. The answer is not to build an administrative agency to regulate every activity to the expense of the consuming public. Recent court decisions have said that the government has no liability in protecting the public even in as basic a service as police protection. The answer is for the consumer to do his homework, get recommendations, word of mouth endorsements, and ask for competitive bids. Roger Tolces, Electronic Security, Los Angeles [Non-text portions of this message have been removed] 1386 From: DMI Date: Tue Sep 5, 2000 3:27pm Subject: Re: Check and Balence Very well said Roger! ----- Original Message ----- From: Dawn Star To: TSCM-L@egroups.com Sent: Tuesday, September 05, 2000 4:14 PM Subject: [TSCM-L] Check and Balence My Groups | TSCM-L Main Page | Start a new group! "To protect the public the government has two choices... First they can prosecute "rain dancing con artists" for unfair and deceptive business practices. Second, the government can force some kind of regulation of the industry." jma I don't think it is the governments job to protect the public in all instances of commercial/consumer activity, nor do I think they have the manpower or expertise. The answer is not to build an administrative agency to regulate every activity to the expense of the consuming public. Recent court decisions have said that the government has no liability in protecting the public even in as basic a service as police protection. The answer is for the consumer to do his homework, get recommendations, word of mouth endorsements, and ask for competitive bids. Roger Tolces, Electronic Security, Los Angeles [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 1387 From: James M. Atkinson, Comm-Eng Date: Wed Sep 6, 2000 9:55am Subject: I spy with my little ear I spy with my little ear http://www.independent.ie/2000/249/d14a.shtml It's not just the James Bonds of this world who bug phone conversations now as more and more suspicious spouses avail of advances in technology to check if their partners are cheating on them, writes Kim Bielenberg `Good morning, I would like to buy a device to record telephone conversations.'' I was shuffling nervously around an electronics shop in the north inner city of Dublin staring at an array of espionage equipment that would impress the CIA. ``Would that be for discreet listening?'' inquired the polite and helpful gentleman behind the counter. In other words, was I going to bug a telephone conversation with a hidden device? ``Well, yes,'' I replied, struggling to conceal my embarrassment. The look on the face of the shop assistant was understanding. He probably thought I was a suspicious spouse, rather than Dublin's answer to James Bond. The shop has everything that an aspiring sleuth would desire: discreet recording and listening devices; recording briefcases; teletaps; room-bugs and UHF equipment. The man behind the counter produced a simple gadget for bugging conversations for the bargain price of £69. The gadget has a connection for a phone line and can be hooked up to a separate voice-activated tape recorder, which costs £59. Both sides of all telephone conversations can be taped. So for just £128, eavesdroppers can begin their bugging careers. A recorder connected to a phone line could be hidden under the floorboards in a house or an office. The problem is that the snooper runs the risk that the recorder could be found, causing all sorts of bother. In order to solve this problem, the shop also sells a transmitter which can send a signal to a recorder somewhere away from the house. Transmitters can be bought for £350. The recently reported allegation that gardai had tapped the phone of lawyers representing a family who are taking a case against the force in Donegal caused consternation. Garda Commissioner Pat Byrne insisted that he did not sanction the interception of phone calls by anyone involved in the case in Donegal. Gardai normally have to receive a warrant from the Minister for Justice to tap a phone. The warrant is only granted for the investigation of serious criminal offences or in the ``interest of the security of the State''. Around 50 phone tap permits are granted every year. Private detectives freely admit that telephone bugging is widespread in Ireland without any authorisation. They insist that in many cases it is perfectly legal. Dublin private investigator Liam Brady has a vast array of bugging equipment and will frequently eavesdrop on conversations in cases of marital infidelity, or where employees of a company are on the fiddle. ``It is normally illegal to monitor conversations using a connection outside the premises. The equipment is freely available to do so, however,'' he says. Normally, telephone eavesdroppers who bug calls from outside establish a connection near the person's house by following the line towards the exchange. They might place a bug on a connection box near the house or on an overhead wire. `They usually use a transmitter to send the signal from the phone connection to a voice-activated recorder 50 to 100 metres away,'' says Liam Brady. Although he cannot tap phone lines outside a house, because of legal restrictions, Liam Brady says he can pick up radio signals from the cordless phones used in many houses. He claims he can also intercept GSM mobile phone calls legally using the latest modern equipment. Snooping on husbands and wives to see if they are having an affair or ``fidelity checking'' as it is known in the business is a major part of the private eye's work. Ian Withers, head of Dublin detective agency Priority Investigations, says he would tap a phone if a woman wanted to check up on her husband. ``As long as we had the right of entry, we would do it,'' he says. ``We can do it if the phone is in her own house, but if a woman asks us to go and check a phone in the new partner's house, we couldn't do that.'' Private detectives may believe that they have the right to tap phones when their client has legal access to the house, but this is disputed by barrister Denis Kelleher. ``It is very hard to stop telephone tapping in practice, but in terms of the law, people are protected. People have a right to privacy. Legislation prohibits the interception of telecommunications messages,'' he says. While phone tapping may be illegal, the equipment used to eavesdrop is becoming steadily more sophisticated and more difficult to detect. With modern equipment, the legendary phone tap click rarely happens, according to Priority Investigation's Ian Withers. He says it is difficult for legislators to keep up with recent developments in technology. ``Some of the latest equipment enables people to monitor the sounds coming from a building from anywhere in the world. By ringing the number of the premises using a special code, you can activate a microphone which picks up sounds in the building. This is relayed along the phone lines,'' he says. Ian Withers claims there are also devices which can monitor incoming and outgoing calls from anywhere in the world. Buildings can also be monitored on a computer screen from anywhere using hidden video cameras. ``In the future, it will be difficult for the authorities to stop people monitoring telephone conversations from outside their jurisdiction,'' he says. Many large companies now have telephone systems, which automatically record and log all incoming and outgoing calls on a computer disc. These systems were initially used by the emergency services, but are now also widely used in offices, according to Ian Withers. Phone bugging equipment is also available on the internet from Irish suppliers. A company based in south county Dublin, which cannot be named for legal reasons, is selling bugging transmitters and recorders and telephone surveillance kits over the net. The company is also selling a device that is capable of intercepting fax messages. Even if the authorities here decided to clamp down on the sale of bugging equipment, it is also widely available on the internet from foreign suppliers. Some of the spying devices now available on the internet are remarkably sophisticated. As well as the latest phone tapping equipment, the American Espionage Store sells a laser listening device known as a Sneak for $449. The website claims that the Sneak can pick up sounds through a window from a distance of up to 400 metres without a transmitter. ``Simply focus the laser on any window of your target's home or office and hear what's going on in the subject's house,'' it claims. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1388 From: James M. Atkinson, Comm-Eng Date: Wed Sep 6, 2000 10:48am Subject: You Know Your From The Texas Panhandle... You Know Your From The Texas Panhandle... How many of these can you relate to? 1. You have used the phrase "fixin' to" during the last month. 2. Someone you know has used a football schedule to plan their wedding date. 3. You've ever been excused from school because "the cows got out." 4. You can properly pronounce Chillicothe, Quitaque, and Quanah. 5. You can remember the name of the last state legislator to introduce a bill involving castration and he didn't mean farm animals. 6. You know exactly what calf fries are, and eat them anyway. 7. You can recall hot summers by the year they happened easier than you can remember your mother's birthday. 8. You think that people who complain about the wind in their states are wimps. 9. You know that the true value of a parking space is not determined by the distance to the door but by the availability of shade. 10. You have owned at least one belt buckle bigger than your fist. 11. A bad traffic jam involves two cars staring each other down at a four-way stop, each determined to be the most polite and let the other go first. 12. You know in which state 'Miam-uh' is and in which state 'Miam-ee' is. 13. Your "place at the lake" has wheels under it. 14. You aren't surprised to find movie rental, ammunition, and bait all in the same store. 15. A Mercedes Benz is not a status symbol. A Ford F150 4x4 is. 16. You know that everything goes better with Ranch. 17. You learned how to shoot a gun before you learned how to multiply. 18. A tornado warning siren is your signal to go out in the yard and look for a funnel. FINALLY, YOU ARE DEFINITELY FROM THE PANHANDLE IF YOU HAVE EVER HAD = THIS CONVERSATION: "Yaunt a Coke?" "Yeah." "What kind?" "Dr. Pepper." ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1389 From: Robert G. Ferrell Date: Wed Sep 6, 2000 10:57am Subject: Re: You Know Your From The Texas Panhandle... >"Yaunt a Coke?" >"Yeah." >"What kind?" >"Dr. Pepper." Ain't jest the panhandle, boys. It's anywhere in the state, so long as you are a native... RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 1390 From: Date: Wed Sep 6, 2000 7:13pm Subject: Surveillance Laws Targeted on Hill Surveillance Laws Targeted on Hill .c The Associated Press By D. IAN HOPPER WASHINGTON (AP) - Shocked at how simple it is for law enforcement to get court permission to see the telephone numbers people dial, legislators Wednesday discussed new bills aimed at tightening surveillance laws and put final touches on a plan to address workplace privacy. The proposed wiretap bill would make it more difficult for prosecutors to obtain court permission to monitor the telephone numbers dialed by a suspect. The bill would require the same standard of evidence now needed for permission to tap a telephone conversation. Two very similar bills, the Electronic Communications Privacy Act and the Digital Privacy Act, spawned from citizen concerns about their privacy online. Recent revelations about Carnivore, a law enforcement tool that can monitor e-mail messages, raised congressional interest in privacy legislation. The bills also extend existing law to cover conversations held on the Internet and other electronic means and make it tougher for authorities to monitor cell phones or use them to find suspects. Justice Department officials told a House subcommittee that the changes would threaten public safety and make it more difficult to find and prosecute criminals. ``It is not the kind of balanced comprehensive package that would benefit public safety and privacy,'' Kevin DiGregory, deputy associate attorney general, said of the bills. Under existing law, it is relatively simple for a prosecutor to get the most basic type of telephone tap, a ``pen register'' order which records only the frequency, source and destination of telephone calls. To get the tap, a prosecutor goes to a judge, who certifies only that the information would be relevant to an investigation. But if a prosecutor then wants to record telephone conversations, then probable cause must be shown that a crime has occurred or will occur. The new legislation would require prosecutors to present that kind of evidence to obtain a pen register order. Legislators, upset with the ease with which prosecutors can get pen register orders, grilled Justice Department officials Wednesday. ``My constitution wasn't written for the protection of the prosecutor. For the life of me, I can't see anything in my constitution that talks about the term 'relevant to an ongoing criminal investigation,''' said Rep. Mel Watt, D-N.C., ``I think what you're trying to do is get the Constitution subcommittee to write a prosecutor standard rather than a Constitution standard.'' DiGregory noted that the Supreme Court has held that the numbers dialed aren't covered by an expectation of privacy, as opposed to telephone conversations. He also said the rules would prevent prosecutors from getting information that would lead to probable cause. The Clinton administration has a plan to extend the laws to cover electronic messages, but critics say it contains too many loopholes that favor law enforcement agencies. Reps Charles Canady, R-Fla., who chaired the hearing, said his committee would try to find compromises between the House bills and the administration initiative in a meeting scheduled for next week. Civil liberties and privacy groups also attended the hearing, arguing that while the bills are a good first step, they don't go far enough to ensure the privacy of citizens. Sen. Charles Schumer, D-N.Y., attended the hearing to talk about his bill, which mirrors House legislation designed to force employers to notify workers if and how they're being monitored in the office. Legislators said they hope to pass the House and Senate bills before this Congress ends, and noted that there is little opposition. The House and Senate bills require ``clear and conspicuous notice'' on a yearly basis about an employer's methods of monitoring - whether it be via e-mail, telephone, Web browsing or even watching a worker's keystrokes - though they don't outlaw any methods. ``This legislation provides workers a first line of defense,'' Schumer said, calling the plan ``moderate, reasonable and fair.'' The bills are H.R. 5018, H.R. 4987, H.R. 4908 and S. 2898. On the Net: House Committee on the Judiciary: http://www.house.gov/judiciary/ Department of Justice: http://www.usdoj.gov/ Center for Democracy and Technology: http://www.cdt.org 1391 From: James M. Atkinson, Comm-Eng Date: Thu Sep 7, 2000 11:32am Subject: Bad Golfers and Skydivers What's the difference between a bad golfer and a bad skydiver? A bad golfer goes WHACK... Shit! A bad skydiver goes Shit!... WHACK ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1392 From: James M. Atkinson, Comm-Eng Date: Thu Sep 7, 2000 1:48pm Subject: TSCM Budgets and Other Such Ramblings Good Afternoon, I recently obtained the budgets for several government TSCM functions (moderate to low threat stuff) and thought the list might be interested in some of the particulars. A typical sweep involves two or more TSCM technicians, for three to five days on site (24-40 hours). This works out to be a minimum of 72-120 billable man-hours for even the most basic of sweeps. Over five years ago the budget for such a sweep was $10,000 or less, five years ago the budget for a single sweep increased to $15,000, and for this year (2000) it has increased to $20,000. The "labor value" only accounts for a 10-15% of the total sweep budget, the rest is equipment charges/depreciation, transportation, lodging and so on. The real kicker is that the "labor value" is worked out to be under $3,000 per sweep (or about $25-30 per hour) Of course all of this assumes that the TSCM folks are using older equipment, which was purchased on a discounted scale (ie: PR-700, MSS, 494, etc). If we adjust the budget to reflect modern equipment purchased at regular commercial prices, and adjust for civilian wages the number can easily jump at least 30-40 percent. Of course we can leverage equipment to reduce the number of people required for the job. However, reducing our personnel budget, increases our equipment budget. Now with this in mind consider how many private sector TSCM'ers run into a clients office with a briefcase (with broadband diode detectors) for an afternoon and then collect a few thousand dollars in sweep fees. The "quick walk though" sweeps (12 hours or less) are better then nothing, but when clients start taking TSCM seriously they will bring someone in for a few days (or even a week), and not a few hours. Consider this... a government sweep team is given a 15-20 thousand dollar budget for a single low end sweep, how much is the CEO of a major corporation budgeting? Also, if the company is properly budgeting for TSCM work, are they getting what they are paying for... and how would they know? A legitimate TSCM service takes time... lots of time... and a ton (literally) of specialized and very expensive equipment. We have to pay meticulous attention to minute details which in turn takes a great deal of time. Adding more people to the sweep team does not appreciably decrease the "time on target" but does radically increases the chance of the sweep being compromised. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1393 From: James M. Atkinson, Comm-Eng Date: Thu Sep 7, 2000 4:34pm Subject: Mailing List Server Flakey Due to some bouncing Emails I contacted onelist/egroups to inquire why certain email were bouncing today (I had several list members complain). They assured me that the problems will be resolved in a few hours, and that it appears to have been based on a multi-giga byte denial of service attack that was directed to some other groups on the server. I would also point out that we currently have just under 600 active subscribers on the list and that it has become the largest forum in the world on the subject of TSCM. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1394 From: Steve Uhrig Date: Thu Sep 7, 2000 5:40pm Subject: Largest? Once upon a midnight dreary, James M. Atkinson, Comm-Eng pondered, weak and weary: > I would also point out that we currently have just under 600 > active subscribers on the list and that it has become the > largest forum in the world on the subject of TSCM. You're not the largest. Spyking has eleventeen thousand squared members, in 644 countries, on nine planets. If you don't believe this, just ask him. You've got a ways to go to catch up. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1395 From: Miguel Puchol Date: Thu Sep 7, 2000 6:30pm Subject: RE: Mailing List Server Flakey James, > They assured me that the problems will be resolved in a few hours, > and that it appears to have been based on a multi-giga byte denial of > service attack that was directed to some other groups on the server. Er...why I am not surprised, after the decision to add advertising at the beginning of messages, rather than at the end as they used to? I may be picky, but I find this rather annoying...and, I sometimes used to read the ads, now I'll just skip right over them. All the best, and let's keep it going, Mike 1396 From: James M. Atkinson, Comm-Eng Date: Thu Sep 7, 2000 7:49pm Subject: RE: Mailing List Server Flakey At 1:30 AM +0200 9/8/00, Miguel Puchol wrote: > >James, > > > They assured me that the problems will be resolved in a few hours, > > and that it appears to have been based on a multi-giga byte denial of > > service attack that was directed to some other groups on the server. > >Er...why I am not surprised, after the decision to add advertising at the >beginning of messages, rather than at the end as they used to? >I may be picky, but I find this rather annoying...and, I sometimes used to >read the ads, now I'll just skip right over them. > >All the best, and let's keep it going, > >Mike Hmm, Good point.,, If enough list members speak up I will make arrangements to have the advertisements removed. However, Onelist/E-groups (the list host) wants $$ to drop the ad banners. If list members order an OSCOR or ORION from us then maybe we can arrange for the ads will go away for a while ;-) -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1397 From: William Knowles Date: Thu Sep 7, 2000 8:29pm Subject: RE: Mailing List Server Flakey On Thu, 7 Sep 2000, James M. Atkinson, Comm-Eng wrote: > At 1:30 AM +0200 9/8/00, Miguel Puchol wrote: > > > >James, > > > > > They assured me that the problems will be resolved in a few hours, > > > and that it appears to have been based on a multi-giga byte denial of > > > service attack that was directed to some other groups on the server. > > > >Er...why I am not surprised, after the decision to add advertising at the > >beginning of messages, rather than at the end as they used to? > >I may be picky, but I find this rather annoying...and, I sometimes used to > >read the ads, now I'll just skip right over them. > > > >All the best, and let's keep it going, > > Hmm, Good point.,, > > If enough list members speak up I will make arrangements to have > the advertisements removed. However, Onelist/E-groups (the list > host) wants $$ to drop the ad banners. I have learned more in the last four months on this list than I have on other technical lists in a year, I would be more than willing to pitch $5-12 a year to avoid the advertisements, and with 600+ members on the list, I'm willing to bet a fair majority would volunteer to do the same to avoid the advertisements. > If list members order an OSCOR or ORION from us then maybe we can > arrange for the ads will go away for a while ;-) Heh, I'd probably buy the Oscor in a New York minute, but I'm sure that without the couple months of specialized training to go with it, It would be a really expensive & heavy Pelican case getting dusty in the corner of my office. :-) Cheers! -William *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 1398 From: James M. Atkinson, Comm-Eng Date: Thu Sep 7, 2000 9:40pm Subject: RE: Mailing List Server Flakey At 8:29 PM -0500 9/7/00, William Knowles wrote: > >On Thu, 7 Sep 2000, James M. Atkinson, Comm-Eng wrote: > > At 1:30 AM +0200 9/8/00, Miguel Puchol wrote: > > > > > >James, > > > > > > > They assured me that the problems will be resolved in a few hours, > > > > and that it appears to have been based on a multi-giga byte denial of > > > > service attack that was directed to some other groups on the server. > > > > > >Er...why I am not surprised, after the decision to add advertising at the > > >beginning of messages, rather than at the end as they used to? > > >I may be picky, but I find this rather annoying...and, I sometimes used to > > >read the ads, now I'll just skip right over them. > > > > > >All the best, and let's keep it going, > > > > Hmm, Good point.,, > > > > If enough list members speak up I will make arrangements to have > > the advertisements removed. However, Onelist/E-groups (the list > > host) wants $$ to drop the ad banners. > >I have learned more in the last four months on this list than I have >on other technical lists in a year, I would be more than willing to >pitch $5-12 a year to avoid the advertisements, and with 600+ members >on the list, I'm willing to bet a fair majority would volunteer to do >the same to avoid the advertisements. OK... I pass around a hat, take up a collection and pay off the Egroups and have them remove the advertising for the next year. > > If list members order an OSCOR or ORION from us then maybe we can > > arrange for the ads will go away for a while ;-) > >Heh, I'd probably buy the Oscor in a New York minute, but I'm sure >that without the couple months of specialized training to go with it, >It would be a really expensive & heavy Pelican case getting dusty in >the corner of my office. :-) > >Cheers! > >-William Actually the OSCOR, CPM-700, and ORION is quite easy and almost intuitive to use and they do not require weeks of training. In fact most people get the equipment, read the manual, and fiddle with it for a few days until the become comfortable with it. There is formal training available for the OSCOR, CPM-700, and ORION, but you really don't need it unless your a hard-core TSCM'er (you perform at least 5 days of actual sweeps per month). -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1399 From: James M. Atkinson, Comm-Eng Date: Fri Sep 8, 2000 8:07am Subject: A blond thinks she won a motor home A blonde goes to a restaurant, buys a coffee and sits down to drink it. She looks on the side of her cup and finds a peel-off prize. She pull off the tab and yells, "I WON! I WON! I WON a motor home; I WON a motor home!" The waitress runs over and says, "That's impossible. The biggest prize given away was a mini van!" The blonde replies, "No. I WON A motor home, I WON a motor home!" By this time the manager makes his way over to the table and says, "You couldn't possibly have won a motor home because we didn't have that as a prize!" Again the blonde says, "No, no mistake, I WON a motor home, I WON a motor home!" The blonde hands the prize ticket to the manager and he reads, "WIN A BAGEL." ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1400 From: James M. Atkinson, Comm-Eng Date: Sat Sep 9, 2000 7:37am Subject: Espionage industry: Alive and Kicking Friday, 8 September, 2000, 14:09 GMT 15:09 UK Espionage industry: Alive and Kicking http://news.bbc.co.uk/hi/english/world/asia-pacific/newsid_916000/916365.stm A friendly atmosphere during official talks By BBC Russian affairs analyst Stephen Dalziel The Russian authorities have described as provocative the arrest in Tokyo of a Japanese naval officer accused of spying for Moscow. The arrest comes in the wake of a visit to Japan by the Russian President, Vladimir Putin, which marked an improvement in Russo-Japanese relations, but did not see Japan make the gains it had wanted in their long-running territorial dispute. Anyone who thought that the end of the Cold War a decade or so ago would mean the end of espionage has received plenty of examples to show them that, Cold War or not, the world's states want to know more about each other. The latest case, that of Lieutenant Commander Shigehiro Hagisaki of the Japanese Navy, merely underlines that the spy game is played out not only by Russia and the USA. Work for spies Indeed, it comes only a week after Moscow was involved in a spy row with Estonia, until 1991 a reluctant part of the Soviet Union. As long as there are secrets which countries want to keep from each other, there will be work for spies. The nature of this work has changed a little. Economic and technology secrets are now regarded as the most important, whilst during the Cold War, much of the espionage effort of the USSR and the USA was aimed at determining the military plans of the other side. Were they planning to attack each other? And what was the true state of the two sides' respective arsenals? Ignoring the secrets The irony of the situation was that much reliable information gleaned by spies was often ignored by their leaders - especially their military leaders - because it did not fit in with plans that had already been laid. For example, it suited the Soviet General Staff to have their people believe that Nato represented a real threat of attack on their country, even though the spies on the ground suggested that Nato was not preparing an attack on Moscow. What this latest case seems to show is that the espionage agencies often try to set their own agenda. Japanese pique? Of course, the timing of the announcement of Commander Hagisaki's arrest - three days after the visit of President Putin to Tokyo - may be pure coincidence. But it is the case that, although the Russian side was pleased with the improvement in relations with Japan, which seemed to be the outcome of the visit, the Japanese had less cause for celebration. Russia and Japan have yet to sign a formal peace treaty after the Second World War. The sticking point for Japan has always been the ownership of what they call the Northern Territories, a group of islands seized by the Soviet Union in 1945, and which the Russians call the Kuril Islands. For Tokyo, a peace treaty is dependent on the islands being handed back. Mr Putin made it clear that that was not on his agenda. Nevertheless, despite this obstacle the politicians reached some agreements, and a definite improvement in relations. It is quite possible that such an outcome did not suit some in the Japanese security services, who saw it as an insult to their national pride. What better way, from their point of view, to try to spoil the happy mood than by announcing a spy story? What they fail to realise, though, is that an important change of the post-Cold War era is that such scandals are now seen as less shocking than was once the case. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1401 From: James M. Atkinson, Comm-Eng Date: Sat Sep 9, 2000 7:39am Subject: High-tech spies find Canada easy target Friday 8 September 2000 High-tech spies find Canada easy target: Expert consultant urges firms to keep tabs on competitors http://www.ottawacitizen.com/hightech/000908/4107660.html Kristin Goff The Ottawa Citizen Rod MacIvor, Ottawa Citizen / Intelligence expert http://www.ottawacitizen.com/hightech/000908/4107660-4107667.jpeg Michael Richardson says Canada may eventually adopt economic espionage laws like in those in the U.S., but that could still be five years down the road. High-tech companies in Canada are doubly at risk of being victimized by snoops and spies searching out valuable information for competitors, an Ottawa consultant says. Canadian companies have valuable research and development information that global competitors want. They also have much looser laws than Americans on what constitutes corporate espionage, says Michael Richardson, partner to Rivervine Enterprises, an Ottawa corporate intelligence consultant. As a result, Canada has become "a portal for the world into the Americans. Those who are targeting the States will often choose to go through Canada, as opposed to trying to target Americans directly," Mr. Richardson said in an interview yesterday. His comments preceded a speech at the Tomorrow's Technology Trends seminar, sponsored by the Ottawa Centre for Research and Innovation. In the United States, for example, someone could be jailed for posing as a doctoral student seeking information for a thesis, if in fact the individual was an agent gathering information for a competitor. Doing that in Canada is unethical, but not illegal, says Mr. Richardson, adding that Canada lacks criminal laws to prosecute theft of intellectual property or trade secrets that carry severe penalties elsewhere. As a result, the branch offices of American companies, as well as Canadian companies that may have U.S. strategic partners, are targets of global competitors who find Canada "a softer target" for stealing corporate information, Mr. Richardson said. Canada may eventually adopt something similar to the Americans' 1996 Economic Espionage Act, as a result of a review of Canada's Official Secrets Act, which now covers only national security offences. But most industry experts don't expect to see a change for at least five years, he said. "It is up to people to protect themselves," or seek professional help to do so, Mr. Richardson said. In many cases that means using common sense. Canadians, like Americans, tend to talk too much, err on the side of posting too much information on the Web and be too trusting of people requesting information or conducting surveys, he said. The first line of defence should be to make everyone in the company aware of the issue so valuable information isn't inadvertently given out at cocktail parties, trade shows or elsewhere. In addition, companies need to make sure their corporate databases and electronic storage systems are secure from outside intrusions and carefully protected when information is carried offsite. While Mr. Richardson talked about protection measures companies should take in much of his pre-speech interview, he emphasized the benefits of setting up a formal intelligence gathering process to keep up with competition in his comments to members of the high-tech community. "European and Asians have been doing this for centuries. They do gather intelligence on their competitors, on the environment, the marketplace," he said. "That puts Canadian corporations who do not do the same things as a real disadvantage from a competitive standpoint." Mr. Richardson learned intelligence and counter-espionage strategies while working for Foreign Affairs and began working in the private sector five years ago, after retiring from government. He said companies don't need to break laws or bend ethics to gather the information they need to make smart corporate decisions. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1402 From: Mike F Date: Sat Sep 9, 2000 3:14pm Subject: DOD Possible RE-INVESTIGATION of Personal - DOD Personnel: More Actions Needed to Address Backlog of Security Clearance Reinvestigations. NSIAD-00-215. 17 pp. plus 2 appendices (3 pp.) August 18, 2000. http://www.gao.gov/new.items/ns00215.pdf L8R4,Mike f. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 1403 From: Date: Sat Sep 9, 2000 9:20am Subject: Equipment List Hello to all, I'm trying to find out an answer to the following question: Say, we have a Company with their own Security department. Board is bit concerned about surveillance threats and understands that countermeasures will cost some money. They agree professionals should do full-scale sweeps but they also want some limited sweeps to be done by their own Security people. I'll describe the threat level in the Company as low to medium. Well, we all know the value of proper training and the physical search but how to select the equipment? Say - No.1 is the most needed, No.2 - the second one but needed the same time as No.1 and so on... The total amount of equipment could be some $50,000 - $70,000 in two or three years. Search tools (tool kits) should be included in equipment budget. Training, salaries, cars, vans, ladders and some other expenses are separate. Company has a brand new digital PBX and all the desktop sets are digital. PBX is connected to the CO by few R2 lines (European standard, 30 voice channels per line); each R2 line uses twisted pair. Few of the Security people have some electronic or computer background, so - they can be trained to use equipment bit more complex than simple field strength meter ;-) I have some suggestions and will be glad to read yours :) Thank you, Janis :) P.S. I'm just asking some advice to help one my good friend to set priorities. 1404 From: Screaming Date: Sun Sep 10, 2000 4:17am Subject: RE: Largest? Funny steve 1405 From: Steve Uhrig Date: Sun Sep 10, 2000 3:26pm Subject: Re: Equipment List Once upon a midnight dreary, Janis.Balklavs-Grinhofs@l... pondered, weak and weary: > I'm trying to find out an answer to the following question: > Say, we have a Company with their own Security department. > Board is bit concerned about surveillance threats and > understands that countermeasures will cost some money. > agree professionals should do full-scale sweeps but they > also want some limited sweeps to be done by their own > I have some suggestions and will be glad to read yours :) You're nowhere near the stage to be asking questions about equipment. Pick 2 or 4 people who are likely to be with the company for many years. Make sure those people have some sort of technical/electronics/communications background, are precise to detail, patient and willing to put in some serious time studying like they were back in undergrad school. Do not even think about equipment, much less spend anything at this point. Send those people to appropriate schools. Budget perhaps $20K per man plus their salary and perks of course. Either find someone local who does sweeps and loan your people to them as apprentices for several sweeps, or contract a competent sweep firm to sweep your place and hold your trainee's hands throughout. By now at least a year will have passed, maybe more. And now you are ready to ask questions about equipment, however you will not have to. The trainees will have learned quite a bit and will know what equipment they will need and where to buy it. Anyone inquiring about what equipment to purchase and where to purchase it is not ready to buy it. When you are equipped to use the equipment you will not be asking others for general input. In my opinion, substantially bypassing the above suggestions will result in you wasting your money and garnering a dangerous false sense of security from thinking you are being swept when you are not. Best bet in the long run, considering all factors including cost, you will be ahead contracting an outside team than trying to do anything in house. TSCM is a narrow specialty. Only the largest firms have enough genuine need to justify setting up their own in house capability. Most of us have swept for large outfits who have an in- house man or team, because the outfits know their internal capabilities are not adequate for serious threats. I buy a good bit of essentially new countersurveillance equipment, for a tiny fraction of the original price, from companies who wanted to set up their own capabilities. Their wizard let their employ and no one knew anything about the equipment, or got bored, or realized they were in over their head. The money it takes to get even a basic kit of TSCM equipment, not to mention cost of training, is a good bit more than it would cost to hire an outside team for some time. If you pick one of the rare competent and ethical TSCM practitioners, you know the job will be done properly. With inexperienced, marginally trained in house types, there always will be a question in the back of your mind. Most genuine sweepers have backgrounds which greatly benefit them in the course of their TSCM duties. By this I refer to government experience where they learned things they would not pick up in the private sector. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1406 From: James M. Atkinson, Comm-Eng Date: Sun Sep 10, 2000 6:40pm Subject: MI5 teaches industry how to fight foreign spies Sunday 10 September 2000 MI5 teaches industry how to fight foreign spies http://www.telegraph.co.uk/et?ac=003100565149417&rtmo=r2QQaarX&atmo=HH HHHH8L&pg=/et/00/9/10/nspy10.html By David Bamber and Chris Hastings MI5 is recruiting officers to work with industry to combat spies from foreign companies and governments. The security service is preparing a two-year course to train liaison officers who will advise firms on security risks from organised crime and overseas spies. Each officer will liaise with a sector of British industry, advising on areas such as keeping computer systems secure, protecting research and development work and safeguarding business plans. Since the collapse of the Iron Curtain and the decline of threats to national security, foreign governments have increasingly directed their secret services into industrial surveillance. Former Eastern bloc countries need to close the gap in technology and industrial production between them and Western economies and have resorted to infiltrating firms and other forms of espionage. There are also threats from criminal organisations including the Russian mafia and Chinese triads. Professor Barry Rider, a former senior British civil servant, compiled a report for the House of Commons home affairs committee on organised crime in private industry and outlined an increased role for the security services. Last night he warned that the US and French governments spied or eavesdropped on foreign companies that they suspected of trying to undermine their own industries. He said: "When you consider the amounts of money involved in the British financial services, you have to be open to the possibility of infiltration. The security services are very keen to protect British businesses now because they have the resources following the end of the Cold War. "The problem is, where do you draw the line? Would you use GCHQ to listen in on another business overseas that you thought was causing problems for a British company? The French do it. The Americans do it. I suspect we do it, but are more cagey about it. When you are talking about threats to national institutions or interests there is not a lot of difference whether they be subversive threats from criminals, terrorists or foreign governments." Prof Rider added that infiltration may be for personal gain based on insider information or may be part of a bid to destabilise markets. Businesses were at risk from foreign powers, organised crime and even terrorist organisations such as the IRA. "You have an interesting example in Ireland where paramilitaries have become more and more involved in business. You can imagine that criminal fraternities that have persisted for at least 80 years and which are highly sophisticated, whose kids have been educated in business schools or law firms, would be very sophisticated in their modus operandi." ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1407 From: C Ridley Date: Sun Sep 10, 2000 6:50pm Subject: Re: Digest Number 367 I recall seeing some posts several weeks ago regarding running both BlackIce and ZoneAlarm concurrently. Would the individual who wrote the posts please contact me at cridley@d..., I have some questions about the practice on NT Server & Workstation. Or - if you want I can post the questions to the group. Thanks Chris Ridley OnCall Solutions 1408 From: DMI Date: Sun Sep 10, 2000 10:02pm Subject: Re: Re: Equipment List Steve, maybe you should re-read the question. A bit of a harsh answer (in my opinion). I am probably no where near as experienced in doing commercial sweeps as you and most of the list. However, I can bet I can do as good a job as most without a $15,000 piece of equipment. "Most genuine sweepers have backgrounds which greatly benefit them in the course of their TSCM duties. By this I refer to government experience where they learned things they would not pick up in the private sector." There are two companies in the Dayton, Ohio area that have NO government training experience. Other of course, than training several of the government's people, which they do. I have seen what they can do, and I would put them against 95% of any government only trained sweepers. I don't do to much TSCM business. I have done some sweep work with another company however. I am a Police officer, and a P.I. I can say from the front line, that VERY, VERY few govt. trained investigators are capable of doing what the private sector can do. "If you pick one of the rare competent and ethical TSCM practitioners, you know the job will be done properly. With inexperienced, marginally trained in house types, there always will be a question in the back of your mind." I won't go there on the list... In fact, if I continue, I will probably get kicked off! Bill Rust - President Desperate Measures, Inc. P.O. Box 24672 Huber Heights, Ohio 45424 (888) 306-8312 ----- Original Message ----- From: Steve Uhrig To: TSCM-L@egroups.com Sent: Sunday, September 10, 2000 4:26 PM Subject: [TSCM-L] Re: Equipment List My Groups | TSCM-L Main Page | Start a new group! Once upon a midnight dreary, Janis.Balklavs-Grinhofs@l... pondered, weak and weary: > I'm trying to find out an answer to the following question: > Say, we have a Company with their own Security department. > Board is bit concerned about surveillance threats and > understands that countermeasures will cost some money. > agree professionals should do full-scale sweeps but they > also want some limited sweeps to be done by their own > I have some suggestions and will be glad to read yours :) You're nowhere near the stage to be asking questions about equipment. Pick 2 or 4 people who are likely to be with the company for many years. Make sure those people have some sort of technical/electronics/communications background, are precise to detail, patient and willing to put in some serious time studying like they were back in undergrad school. Do not even think about equipment, much less spend anything at this point. Send those people to appropriate schools. Budget perhaps $20K per man plus their salary and perks of course. Either find someone local who does sweeps and loan your people to them as apprentices for several sweeps, or contract a competent sweep firm to sweep your place and hold your trainee's hands throughout. By now at least a year will have passed, maybe more. And now you are ready to ask questions about equipment, however you will not have to. The trainees will have learned quite a bit and will know what equipment they will need and where to buy it. Anyone inquiring about what equipment to purchase and where to purchase it is not ready to buy it. When you are equipped to use the equipment you will not be asking others for general input. In my opinion, substantially bypassing the above suggestions will result in you wasting your money and garnering a dangerous false sense of security from thinking you are being swept when you are not. Best bet in the long run, considering all factors including cost, you will be ahead contracting an outside team than trying to do anything in house. TSCM is a narrow specialty. Only the largest firms have enough genuine need to justify setting up their own in house capability. Most of us have swept for large outfits who have an in- house man or team, because the outfits know their internal capabilities are not adequate for serious threats. I buy a good bit of essentially new countersurveillance equipment, for a tiny fraction of the original price, from companies who wanted to set up their own capabilities. Their wizard let their employ and no one knew anything about the equipment, or got bored, or realized they were in over their head. The money it takes to get even a basic kit of TSCM equipment, not to mention cost of training, is a good bit more than it would cost to hire an outside team for some time. If you pick one of the rare competent and ethical TSCM practitioners, you know the job will be done properly. With inexperienced, marginally trained in house types, there always will be a question in the back of your mind. Most genuine sweepers have backgrounds which greatly benefit them in the course of their TSCM duties. By this I refer to government experience where they learned things they would not pick up in the private sector. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 1409 From: James M. Atkinson, Comm-Eng Date: Sun Sep 10, 2000 11:50pm Subject: Re: Equipment List At 4:20 PM +0200 9/9/00, Janis.Balklavs-Grinhofs@l... wrote: > >Hello to all, > >I'm trying to find out an answer to the following question: > >Say, we have a Company with their own Security department. Board is bit >concerned about surveillance threats and understands that countermeasures >will cost some money. They agree professionals should do full-scale sweeps >but they also want some limited sweeps to be done by their own Security >people. I'll describe the threat level in the Company as low to medium. Ok, but don't let them make the mistake of relying to much on their in-house people. One of the biggest mistakes a company (or gvt agency) makes is to become over confident in their own in-house teams (who perform only a few sweeps a year, and have minimal training). Of course it is also dangerous to rely on a single external TSCM firm, but instead the client should have several firms that "leap frog" on every other sweep. Personally I prefer for a client to have sweeps done every 90 days, and a full audit performed once a year. Between the 90 sweeps, I encourage them to either have their own teams perform weekly sweeps, or engage an secondary TSCM firm or PI. >Well, we all know the value of proper training and the physical search but >how to select the equipment? Say - No.1 is the most needed, No.2 - the >second one but needed the same time as No.1 and so on... First perform a "Threat Assessment", and then create a Procedural Manual or Guide which formally dictates how or what a TSCM service will consist of (based on the threats). Next pick out the equipment you will need to perform the sweeps, then hire personnel with an appropriate technical background. After that arrange for your TSCM people to receive training on TSCM, your procedural guide, and the equipment specific to your application. Next assign your TSCM folks to an operational TSCM team so they can get some formal internship. >The total amount of equipment could be some $50,000 - $70,000 in two or >three years. Search tools (tool kits) should be included in equipment >budget. Budget 350-400k for test equipment, about 10-15k for hand tools, and 35-40k for a dedicated vehicle if they will be servicing multiple sites. >Training, salaries, cars, vans, ladders and some other expenses are >separate. Figure a good 135-150k per year for each TSCM team member, plus a 30% benefits package. >Company has a brand new digital PBX and all the desktop sets are digital. >PBX is connected to the CO by few R2 lines (European standard, 30 voice >channels per line); each R2 line uses twisted pair. >Few of the Security people have some electronic or computer background, so >- they can be trained to use equipment bit more complex than simple field >strength meter ;-) Give the security people a ladder and a flashlight... anything more then that and they will end up hurting someone. TSCM is a technical service, performed by technical people. >I have some suggestions and will be glad to read yours :) > > >Thank you, > >Janis :) > >P.S. I'm just asking some advice to help one my good friend to set >priorities. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1410 From: William Knowles Date: Sun Sep 10, 2000 11:58pm Subject: Army calls up mobile phones http://www.the-times.co.uk/news/pages/sti/2000/09/10/stinwenws01007.html September 10, 2000 Jonathon Carr-Brown SOLDIERS are having to use insecure mobile phones to communicate in battlefield exercises because, they say, the army's radio communications system is so unreliable. Senior commanders be-lieve that the reliability of mobile phones outweighs the increased risk of conversations being intercepted. Last week the brigadier commanding Exercise Eagle Strike ordered all his officers to communicate using mobile phones. The exercise, carried out at army bases all over the country, was aimed at displaying the speed with which the new Airborne Assault Brigade could move around a country. It was deemed so vital that commanders refused to risk a communications breakdown by using the army's 30-year-old Clansman radio system. In June, the 1st Battalion the Welsh Guards is understood to have resorted to mobile phones during exercises on Salisbury Plain, Wiltshire, after all their radios broke down. Clansman should have been replaced six years ago by Bowman, a more secure data and voice system. But Bowman is now scheduled to enter service around 2004, 20 years after the system was first mooted. Senior officers are concerned that it might be so late that it will already be obsolete. Mobiles present security risks because they do not have "over-ride" frequencies to allow commanders to cut into conversations in emergencies. They can also be listened to more easily than radios, although Clansman's antiquated technology makes it almost as vulnerable to interception. Mobiles can also be tracked easily and are far more expensive to operate. Although the Ministry of Defence claims mobile phones are never used in combat areas there have been signs that this rule is not always adhered to. In Kosovo, British Army commanders borrowed journalists' mobile phones to speak to Serbian leaders during the conflict, according to confidential reports, because up to a third of personal radios were broken. In Sierra Leone in May, three British officers were rescued from pursuit by rebels after one of them called his wife on his mobile. A senior army source confirmed these were not isolated incidents: "Our radios are knackered and the mobiles work." The MoD said: "It would be wrong to suggest we've become dependent on mobile phones." *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 1411 From: DMI Date: Sun Sep 10, 2000 11:19pm Subject: Re: Re: Equipment List To all, My last post was not meant to be a flame. After hitting "send", I calmed down. I just think that the original question was simple, and did not deserve the response it got. I probably should have sent the message privately. Steve, please forgive me if I sounded rash. Bill ----- Original Message ----- From: DMI To: TSCM-L@egroups.com Sent: Sunday, September 10, 2000 11:02 PM Subject: Re: [TSCM-L] Re: Equipment List My Groups | TSCM-L Main Page | Start a new group! Steve, maybe you should re-read the question. A bit of a harsh answer (in my opinion). I am probably no where near as experienced in doing commercial sweeps as you and most of the list. However, I can bet I can do as good a job as most without a $15,000 piece of equipment. "Most genuine sweepers have backgrounds which greatly benefit them in the course of their TSCM duties. By this I refer to government experience where they learned things they would not pick up in the private sector." There are two companies in the Dayton, Ohio area that have NO government training experience. Other of course, than training several of the government's people, which they do. I have seen what they can do, and I would put them against 95% of any government only trained sweepers. I don't do to much TSCM business. I have done some sweep work with another company however. I am a Police officer, and a P.I. I can say from the front line, that VERY, VERY few govt. trained investigators are capable of doing what the private sector can do. "If you pick one of the rare competent and ethical TSCM practitioners, you know the job will be done properly. With inexperienced, marginally trained in house types, there always will be a question in the back of your mind." I won't go there on the list... In fact, if I continue, I will probably get kicked off! Bill Rust - President Desperate Measures, Inc. P.O. Box 24672 Huber Heights, Ohio 45424 (888) 306-8312 ----- Original Message ----- From: Steve Uhrig To: TSCM-L@egroups.com Sent: Sunday, September 10, 2000 4:26 PM Subject: [TSCM-L] Re: Equipment List My Groups | TSCM-L Main Page | Start a new group! Once upon a midnight dreary, Janis.Balklavs-Grinhofs@l... pondered, weak and weary: > I'm trying to find out an answer to the following question: > Say, we have a Company with their own Security department. > Board is bit concerned about surveillance threats and > understands that countermeasures will cost some money. > agree professionals should do full-scale sweeps but they > also want some limited sweeps to be done by their own > I have some suggestions and will be glad to read yours :) You're nowhere near the stage to be asking questions about equipment. Pick 2 or 4 people who are likely to be with the company for many years. Make sure those people have some sort of technical/electronics/communications background, are precise to detail, patient and willing to put in some serious time studying like they were back in undergrad school. Do not even think about equipment, much less spend anything at this point. Send those people to appropriate schools. Budget perhaps $20K per man plus their salary and perks of course. Either find someone local who does sweeps and loan your people to them as apprentices for several sweeps, or contract a competent sweep firm to sweep your place and hold your trainee's hands throughout. By now at least a year will have passed, maybe more. And now you are ready to ask questions about equipment, however you will not have to. The trainees will have learned quite a bit and will know what equipment they will need and where to buy it. Anyone inquiring about what equipment to purchase and where to purchase it is not ready to buy it. When you are equipped to use the equipment you will not be asking others for general input. In my opinion, substantially bypassing the above suggestions will result in you wasting your money and garnering a dangerous false sense of security from thinking you are being swept when you are not. Best bet in the long run, considering all factors including cost, you will be ahead contracting an outside team than trying to do anything in house. TSCM is a narrow specialty. Only the largest firms have enough genuine need to justify setting up their own in house capability. Most of us have swept for large outfits who have an in- house man or team, because the outfits know their internal capabilities are not adequate for serious threats. I buy a good bit of essentially new countersurveillance equipment, for a tiny fraction of the original price, from companies who wanted to set up their own capabilities. Their wizard let their employ and no one knew anything about the equipment, or got bored, or realized they were in over their head. The money it takes to get even a basic kit of TSCM equipment, not to mention cost of training, is a good bit more than it would cost to hire an outside team for some time. If you pick one of the rare competent and ethical TSCM practitioners, you know the job will be done properly. With inexperienced, marginally trained in house types, there always will be a question in the back of your mind. Most genuine sweepers have backgrounds which greatly benefit them in the course of their TSCM duties. By this I refer to government experience where they learned things they would not pick up in the private sector. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] From: Gregory Horton Date: Thu Sep 5, 2002 10:45pm Subject: An interesting little device I received this information in an e-mail ad. Kind of interesting. http://www.usb007.com/?rid=1386 Greg Horton 6154 From: Ben Evans Date: Thu Sep 5, 2002 3:24pm Subject: Re: Cell phone jammer Keep in mind that even though someone may sell one, they are indeed illegal to use in the USA. -Ben At 04:23 PM 9/4/2002 -0400, you wrote: >Awhile back someone posted a link to a web site which sold " cell phone >jammers " . This was a portable device which you could use Mobile ( car, on >person) and range 50-200 feet ??? Thanks > >visit http://www.copscops.com >Washington DC Police Department http://mpdc.dc.gov/main.shtm 6155 From: Robert Stephens Date: Thu Sep 5, 2002 3:57pm Subject: Tracking device detection As tracking devices may be set for intermittent reporting of positions by the user (thus being dormant for indeterminate periods of time), I'm wondering what tactics some of the list members employ in order to overcome this obstacle (aside from the standard physical search). Also, any recommendations for an RF detector that will cover the various ranges that such devices will transmit in (I assume most now operate via digital signals)? > Robert M. Stephens > Vice President, Special Operations > E-mail: Robert@d... > > MSI Detective Services > Myers Service, Inc. > Corporate Headquarters > 2076 N. Elston Ave. Suite 200 > Chicago, IL. 60614-3940 > Phone 773-342-8300 > Facsimile 773-486-4430 > > Professional Investigators Since 1959 > Investigations Nationwide > 24 Hour Availability > www.detectiveservices.com > > Process Service Division - Downtown Chicago 205 W. Randolph St., Ste. 1210 Chicago, IL. 60606 Phone 312-782-4000 Fax 312-853-3119 For Security, Surveillance & Privacy Products U-Spy Store Chicago - Orlando - Internet Sales www.u-spystore.com Orlando Warehouse - (800) 393-4779 Chicago Sales - (773) 395-0220 > For more information on our investigative services please visit our > web site at www.detectiveservices.com > > This e-mail is strictly confidential. If you receive this e-mail in > error, please forward immediately to info@d... > > > > 6156 From: Date: Thu Sep 5, 2002 9:20pm Subject: Ear Bug It seems Mr Lambros believes he has a bug in his ear, one that doesn't need a power source. If he is correct about the 'parametric cavity' and the microwave carrier, what would the microwave be carrying to produce his physical and mental symptoms? Apparently ELF RF can produce EEG changes,(that might explain some mental effects), but what would explain the physical effects? See his site: www.brazilboycott.org ************************************** This email is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient, you must not make any use of this information, copy or show it to any person. Any use, forwarding, printing or copying of this message is strictly prohibited. 6157 From: Date: Thu Sep 5, 2002 8:26pm Subject: Re: Tracking device detection In a message dated 9/5/02 9:08:48 PM Pacific Daylight Time, Robert@d... writes: << I'm wondering what tactics some of the list members employ in order to overcome this obstacle (aside from the standard physical search). >> Subcontract the jobs to an experienced TSCM professional. Are you willing to risk missing something? MACC 6158 From: Date: Thu Sep 5, 2002 8:33pm Subject: Re: Ear Bug In a message dated 9/5/02 9:09:54 PM Pacific Daylight Time, mcresearch@w... writes: << If he is correct about the 'parametric cavity' and the microwave carrier, what would the microwave be carrying to produce his physical and mental symptoms? >> We need the x-rays See if you can get them and post them on the site for this list. 6159 From: Steve Uhrig Date: Fri Sep 6, 2002 7:32am Subject: Re: Tracking device detection On 5 Sep 2002 at 15:57, Robert Stephens wrote: > As tracking devices may be set for intermittent reporting of positions > by the user (thus being dormant for indeterminate periods of time), > I'm wondering what tactics some of the list members employ in order to > overcome this obstacle (aside from the standard physical search). Professionals have appropriate training, experience and equipment. > Also, any recommendations for an RF detector that will cover the > various ranges that such devices will transmit in (I assume most now > operate via digital signals)? See 2/3 of the above answer. With training and experience you will not need to ask others what numerous pieces of equipment to buy. Doing so is proof you're not qualified to use it. The equipment is useless without the 2/3 mentioned above. Your only ethical and effective option is to contract one of the few teams who are in a position to do work like this effectively. As several of us have said over and over (and over), sweeping is a *technical* specialty, not an investigative specialty. While some sweepers happen to be PIs, it's purely for legal reasons and as far as I know, the few who do have PI licenses do not do any investigative work. They do technical work only. Steve Department of Redundancy Department ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6160 From: Steve Uhrig Date: Fri Sep 6, 2002 7:39am Subject: Re: An interesting little device On 5 Sep 2002 at 20:45, Gregory Horton wrote: > I received this information in an e-mail ad. Kind of interesting. A spam you responded to? > http://www.usb007.com/?rid=1386 There was a nice writeup on these generic devices in the latest issue of PC Magazine. A number of companies make them, they're cheap and they work. For those not caring to look up the above URL, Greg is referring to the little keys you carry on your keyring which are memory storage devices, and plug into the USB port on your computer. It's mass storage you unplug and take with you, either for secure data or as a convenient means of transport to any computer with a USB port. 32 megs to 256 megs. $20 to $110. Decent. I can see putting your client's Powerpoint presentation on the thing, and not having to haul your entire laptop cross country. Many other applications. Not all that many years ago, I paid $800 for a 20 meg hard drive, then a year later the same price for an 80 meg MFM drive. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6161 From: James M. Atkinson Date: Fri Sep 6, 2002 8:03am Subject: Re: Tracking device detection At 3:57 PM -0500 9/5/02, Robert Stephens wrote: >As tracking devices may be set for intermittent reporting of positions >by the user (thus being dormant for indeterminate periods of time), I'm >wondering what tactics some of the list members employ in order to >overcome this obstacle (aside from the standard physical search). Also, >any recommendations for an RF detector that will cover the various >ranges that such devices will transmit in (I assume most now operate via >digital signals)? The best tactic to counter this kind of a threat involves calling one of a dozen TSCM practitioners who deals with this kind of stuff all the time. The best RF detector is a laboratory grade microwave spectrum analyzer, a wide band vector signal unit with spectra-grams and/or waterfall), and a wide-band diode detector with a 80 dB CDPD bandpass filter. Still, the best way to find these little nasties is to call in a hard-core TSCM person in your area... you will make more money, your client will be pleased with the service, and you will be able to sleep at night. Check out: http://www.tscm.com/goldlist.html -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu -------------------------------------------------------------------------------------------------- 6162 From: Matthijs van der Wel Date: Fri Sep 6, 2002 4:35am Subject: RE: Cell phone jammer http://www.sesp.co.il/newjammer2.html Israel's Leading Designer and Manufacturer of JAMMERS & PARALYZERS OF CELLULAR TELEPHONES. Specialists Since 1986 In The Design and Manufacture of Surveillance,Bugging, Eavesdropping and Countermeasures equipment. We are proud to introduce the NEW GENERATION Of our unique line of jammers & paralyzers of all types of cellular telephones. Our jammers will instantly paralyze and block all types and models of cellular telephones - within predetermined and well defined areas. All cellular telephones in the vicinity of our JAMMER will be IMMEDIATELY & totally paralyzed & will not be able to either receive incoming calls,or DIAL outgoing calls!! IN ADDITION, ALL CALLS ALREADY IN PROGRESS WILL IMMEDIATELY BE INTERRUPTED AND CUT OFF!! When immobilized, the display on the cellphones will display "no reception". TECHNICAL SPECIFICATIONS. a) CELLULAR SYSTEMS & FREQUENCIES COVERED. Our jammers will paralyze and immobilize all types of cellular telephones and cellular systems operating in all countries, such as: CDMA/TDMA, AMPS and N-AMPS digital and analogue, operating in the 869-894Mhz band. PCS, operating in the 1930-1990Mhz band. GSM, operating in the 935-960Mhz band. High GSM (DCS), operating in the 1805-1880Mhz band. For countries which employ more than one cellular system such as the USA, Canada as well as most European countries,we manufacture twin or triple jammers built into a single unit. For the American Continent, our jammers block both CDMA/TDMA as well as PCS cellular systems. For Western European countries our jammers block both GSM as well as High GSM (DCS) cellular systems. For all other countries we tailor make our jammers to suit each individual country. b) RADIUS OF JAMMING. We offer a large variety of jammers to jam areas from 9 meters up to one kilometer in radius. Please refer to our selection of models below. c) POWER REQUIREMENTS. All our jammers are equipped with an internal automatic switching power supply, thus making them suitable for operation in any country in the world with any mains voltage, from 90 volts AC 60Hz up to 245 volts AC 50Hz. IMPORTANT: THE CTN-100 OPERATING FREQUENCIES ARE STRICTLY LIMITED TO WITHIN THE CELLULAR SPECTRUM OF FREQUENCIES, AND WILL THEREFORE NOT INTERFERE WITH ADJACENT FREQUENCIES OR OTHER RF ACTIVITIES IN ANY WAY WHATSOEVER!! NO HEALTH HAZARDS. Our jammers will not expose persons in the vicinity to any health hazards. The total amount of RF energy emitted by our jammers, to which persons present are exposed, is considerably lower than the radiation to which the user of a regular cellular telephone is exposed to when holding a cellular telephone close to his head. Matthijs van der Wel Project Manager -----Oorspronkelijk bericht----- Van: zack [mailto:10-33@c...] Verzonden: woensdag 4 september 2002 22:23 Aan: TSCM-L@yahoogroups.com Onderwerp: [TSCM-L] Cell phone jammer Awhile back someone posted a link to a web site which sold " cell phone jammers " . This was a portable device which you could use Mobile ( car, on person) and range 50-200 feet ??? Thanks visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." George W Bush God Bless The USA .. NEVER forget 9-11-01 http://www.copscops.com/blessusa.htm [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6163 From: Greg H. Walker, Attorney At Law Date: Fri Sep 6, 2002 10:17am Subject: Re: Tracking device detection Dear Group: I am a major user of RF tracking devices which just sit and wait for a signal to respond and then their response is done so in a burst of about 20 microseconds. In 5 years of using these devices I have never had one found that was installed inside of the interior of the vehicle and the cars have been in for repairs of every kind and nature, including electrical repairs. We have had them on police cars (for the internal affairs people) and on former military counter-intelligence people (marital). Steve and James are so correct when they say that only a really well trained TSCMer will find them -- anybody else trying is just lucky if they find one because of the very short burst -- some of are units are queried every five minutes and others every 30 minutes and the schedule changes from time of day and the day of the week depending on what we expect the vehicle to be engaged in. We have had PI's with their toys try to find them, but never a hardcore TSCM professional. Since I never see anyone on this list within my operating area let me give you some information. We install the unit inside of the vehicle and actually take the interior apart to put them in underneath the plastic panels that make up modern vehicle interiors, on rare occasions we will put the unit in the trunk back near the wall separating the trunk and the passenger compartment, but on the side panels. A favorite place in a truck is in the passenger's side front kick panel. Some vehicles also lend themselves nicely to taking out the glove box and putting them deep inside of the dash. On SUV's we often put them to either side of the large tailgate type back door. We have been forced to put them under the back seat, our least favorite spot and usually carve out some of the foam in the seat to slip the unit into. The units will have two wires coming from it, one will be a coaxial cable which is the antenna (there is the unit and the antenna and the unit can go darn near anywhere where it can be concealed, but the placement of the antenna is absolutely key). Our preferred spot is to bring the cable up a side post of the vehicle nearest where we put the unit and then put the antenna between the headliner and the metal roof with the working end of the antenna (our antennas are either a flat square or flat round and are about the size of a 3-1/2 inch floppy disk and about 1/2 inch thick) pointing down into the passenger compartment so that the burst will have plenty of glass to exit through. In some instances we have had to put them underneath the shelf between the back seat and the rear window and on occasion in a side panel itself and once or twice high up into the dashboard (usually a van or large truck without a headliner). By the way, you usually cannot find the antenna by palpating the headliner or even visually examining the headliner because today headliners are thick and foam padded. The second wire will be a power supply wire and it will either go to a battery set (ours are specially made and shrunk wrapped in a heavy black plastic -- we have two sizes one consisting of 8 D size regular alkaline batteries, usually Duracell, and the other consisting of, as I recall (I can't find one to look at right now) 16 2/3 AA lithiums -- quite expensive and also specially built and shrunk wrapped or it will go to the vehicle's own power supply (which is what we do almost 100% of the time today) {Steve and I have a friendly difference of opinion on the legality of this, however, since under Texas law we have to the permission of an owner or lessee of the vehicle to even install the device it includes the consent to connect to the vehicle electrical system} -- we will connect either to a full time live wire near where the unit is placed or we will run a wire under the carpet, side molding, etc. to the fuse box and we have a special little hook like thing that fits into the fuse box underneath a regular fuse and is difficult to detect. On rare occasions we have went direct to the battery. Since most of our installations last a month or more we prefer the hardwire so we don't have to keep getting the vehicle back to change battery packs. We have some installations that go on for a couple of years. One of the problems with the battery packs is their life span (the D packs if queried every 15 minutes 24/7 will last anywhere from 12 to 14 days depending the how hot the area where they are placed gets (down here in Texas the Summer heat reduces their time by about one day); the 2/3 AA lithiums run about the same length of time, but we only trust them for 10 to 12 days. The lithium packs are small about 2-1/2" wide by 5" long and 1/2" thick and are light weight, but they are very expensive -- the D packs are bulky and heavy. I use a commercial radio shop that does fleet radio systems to make my installs because they understand RF technology and are good at disassembling and reassembling interiors of vehicles. I do not recommend that anyone use a car stereo shop or a mobile phone shop. I hope that this is of help to true professional TSCMer's, again, Steve and James are correct, leave this to true professional TSCMer's they know what to look for and have the correct equipment. GREG -- Greg H. Walker, ARM* Attorney At Law President RisKontroL -- Risk Management, Security Consulting & Investigations Houston, Texas (713) 850-0061 * Associate in Risk Management Designation (Insurance Institute of America's Center For Advanced Risk Management Education) WARNING NOTICE BY GHW: Greg H. Walker's comments are not intended to be and should absolutely not be taken as legal advice. Unless you have entered into a specific written agreement with him for legal services, signed by both you and him, and paid him a retainer in good funds, then he is not your Attorney, does not intend to be your Attorney and you should not act nor refrain from acting based, in whole or in part, on his comments. 6164 From: Date: Fri Sep 6, 2002 9:54am Subject: Cell Phone Records Playing Key Role in Criminal Cases Cell Phone Records Playing Key Role in Criminal Cases By ANNA GORMAN - L.A. TIMES STAFF WRITER September 6 2002 The staples of criminal investigations are well-recognized. Fingerprints. Weapons. Eyewitnesses. Now detectives are relying on a new tool: cell phones. Because more than 40% of Americans own mobile phones, law enforcement personnel see them as a powerful resource in investigations and trials. Detectives say phone records, from both suspects and victims, can provide key evidence in murder, robbery, drug and rape cases. Records of cell phone calls are more useful than those of regular phones because they not only show what numbers were called and when, but also reveal the area where the caller was when the call was made. That allows police and prosecutors to track suspects' movements--sometimes even while a kidnapping is in progress. The records also can destroy alibis or attack a suspect's credibility if his statements contradict the phone data. And murder victims' phone records can pinpoint when and where they were killed, and connect the victim to the suspect. "The sooner we get those records, the better," said Det. Mike Berchem of the Los Angeles Police Department. "They're invaluable." He said he has used cell phone records in every one of his investigations during the last few years, finding suspects, witnesses and accomplices. "It's hard evidence; it doesn't lie," he said. High-Profile Cases Cell phone records have proved important in several high-profile cases, including the following: * Prosecutors used David Westerfield's cell phone records to track his erratic movements in the days after Danielle van Dam disappeared from her San Diego home. Within 48 hours, Westerfield drove to the desert, the beach and back to the neighborhood where he and the Van Dams lived. He told police he was in the desert scouting for places to take his son camping. Last month, Westerfield was convicted of kidnapping and murdering the 7-year-old girl. * Alejandro Avila said he was at an Ontario mall when 5-year-old Samantha Runnion was kidnapped from her Orange County condo complex. But authorities said his cell phone records showed that he was near where the girl's body was found, off a mountain road near Lake Elsinore. Avila is awaiting trial on murder, kidnapping and sexual assault charges. * The day that LAPD Rampart Division Officer Rafael Perez stole cocaine from an evidence locker, prosecutors said, he made cell phone calls from near where the drugs were stolen, including one call to his drug dealer girlfriend. "It was extremely compelling and significant evidence," said former prosecutor Richard Rosenthal. Though a jury deadlocked, Perez later pleaded guilty to cocaine theft and was sentenced to five years in state prison. Targeting Accomplices Cell phones can also be used to connect suspects with their accomplices. Los Angeles County Deputy Dist. Atty. Craig Hum recalled the case of Rebecca Cleland, accused of hiring two cousins to kill her 43-year-old husband, Bruce. Cell phone records showed 11 calls between Cleland and her cousins in the hours leading up to the murder, including one last call 10 minutes before the shooting. Cleland said a carjacker had knocked her unconscious. But cell phone records placed her cousin Alvaro Quezada about a block from the murder scene, despite his claim that he was at a restaurant 20 miles away. "We could basically prove that he was lying," Hum said. "Without the cell phone records, it would have been extremely difficult to convict him." All three were convicted of first-degree murder in 2000 and sentenced to life terms without parole. At trial, phone company representatives are called to explain to jurors how the data are collected and what the records mean. Each cell phone sends a distinct signal. When a call is made, the cell phone signal immediately attaches to the closest cell tower, which transmits the call. As the caller moves into a different area, the cell tower hands off the call to a new tower. Each tower handles an average of 150 calls and reaches a half-mile to two miles in urban areas and up to 50 miles in rural areas, said Jim Righeimer, who owns an Orange County company that leases space for cell towers. Computers keep data on which tower is being used for calls. If the cell towers are closely spaced, the data can nearly pinpoint where the caller was at the time of the call. Defense attorneys sometimes challenge the evidence because cell phones can be passed around and often are used by more than one person. Some drug dealers have beat the system by buying cheap phones, using them for one transaction and discarding them. To obtain phone records in criminal cases, law enforcement must get a search warrant from a judge, who must determine that there is probable cause to believe the target has committed a crime. The requests put companies in a tough spot, said Michael Altschul, senior vice president of the Cellular Telecommunications and Internet Assn. "They have a legal obligation to be responsive to law enforcement, but on the other hand, there are privacy expectations of their customers," he said. As a result, companies will only release records if they have received a court order, Altschul said. But in kidnapping cases, when every second is valuable, companies will make exceptions. Privacy Concerns The increased use of cell phone records worries privacy advocates. "We believe that typical users of cell phones have a reasonable expectation of privacy when it comes to their location," said David Sobel, general counsel for the nonprofit Electronic Privacy Information Center. "That kind of collection of information is really uniquely invasive." Sobel, who studies the privacy implications of new technology, said he also fears that records will be sought more regularly in civil litigation and divorce cases. LAPD Det. Dennis English said that as more people buy cell phones, the records will become even more important. "They will probably play a greater role in present and future crime scene investigations because of the multitude of cell phones out there," he said. http://www.latimes.com/news/local/la-me-onthelaw6sep06.story?coll=la%2Dheadlin es%2Dcalifornia 6165 From: Fernando Martins Date: Fri Sep 6, 2002 3:22pm Subject: NFC - Near Field Communication http://www.newscenter.philips.com/InformationCenter/NewsCenter/FPressRel ease.asp?lArticleId=2476&lNodeId=13 September 05, 2002 Philips and Sony Announce Strategic Cooperation To Define Next Generation Near Field Radio-Frequency Communications Electronics Leaders to Jointly Establish Wireless Technology to Significantly Enhance Access to Data and Services via Consumer Devices Amsterdam, the Netherlands/Tokyo, Japan, September 5, 2002 - Royal Philips Electronics (AEX: PHI, NYSE:PHG) and Sony Corporation today announced that they will jointly develop a new near field radio-frequency communication technology, 'Near Field Communication' (NFC). The technology enables short-range communication networks between consumer devices incorporating an NFC interface, and is set to greatly improve the way consumers access data and services wirelessly. Wireless NFC technology will operate on 13.56 MHz and allow for the transfer of any kind of data between NFC enabled devices such as mobile phones, digital cameras and PDA's as well as to PC's, laptops, game consoles or PC Peripherals, across a distance of up to twenty centimeters and aiming at speeds fast enough to transfer high quality images. At communication speed up to 212 kbit/s the NFC technology is fully compliant to both Philips' existing MifareT and Sony's FeliCaT contactless smartcard technologies. The aim is to build a ubiquitous open infrastructure of NFC-compliant devices which effectively incorporate smart-key and smartcard reader functions, providing a convenient communication method for services such as payment (including credit card), ticketing, and accessing online entertainment content (e.g. gaming) through the devices. This can be done simply by holding devices or smartcards near each other. It is anticipated that the technology will play a key role in allowing content and service providers to offer various new ways of accessing their services. The consumer's primary NFC device (e.g. mobile phone or PDA) acts as a smart-key to gain access to chosen services from any NFC device, anywhere, anytime. "This cooperation between Philips and Sony marks a breakthrough in establishing a new solution for an easy communication network between consumer electronic devices," commented Mr. Yuki Nozoe, Corporate Executive Vice President, Sony Corporation. "Together with Philips, we will study a vast range of new applications for NFC, and we look forward to welcoming other electronics and service companies in support of the technology." Karsten Ottenberg, General Manager of Philips Semiconductors' Identification business, said: "This agreement will revolutionize the way consumers access services and see the penetration of identification chips move far beyond smart cards, with NFC becoming a standard component of new electronic devices, including those from Philips. It is another demonstration of Philips' strengths in the area of connectivity, and what our technologies can bring to the consumer, at home, in the office, or on the move. With the CD Philips and Sony demonstrated what their cooperation can bring to the electronics industry - we look forward to the success of this partnership." Philips is already the global industry leader in contactless smartcards through its Philips'MifareT technology, supplying some of the world's major transport systems, and the banking sector, with supply to customers such as Visa. Sony has a significant market position in Hong Kong and Shenzhen (China), Singapore and Japan utilizing Sony's FeliCaT contactless smartcard technology, mainly in the transportation and financial sectors. As NFC is fully operable on both platforms, all consumer devices containing NFC technology will be compatible. Philips and Sony will promote the NFC technology as an open standard in order to integrate it into consumer devices, including those of other manufacturers in the CE, PC, automotive, and other industries. The companies intend to explore new applications together with relevant content and network service providers. About Sony Sony Corporation is a leading manufacturer of audio, video, communications and information technology products for the consumer and professional markets. Its music, pictures and computer entertainment operations make Sony one of the most comprehensive entertainment companies in the world. Sony recorded consolidated annual sales of over $57 billion for the fiscal year ended March 31, 2002. Sony's Home Page URL: http://www.sony.net About Royal Philips Electronics Royal Philips Electronics of the Netherlands is one of the world's biggest electronics companies and Europe's largest, with sales of EUR 32.3 billion in 2001. It is a global leader in color television sets, lighting, electric shavers, medical diagnostic imaging and patient monitoring, and one-chip TV products. Its 184,000 employees in more than 60 countries are active in the areas of lighting, consumer electronics, domestic appliances, components, semiconductors, and medical systems. Philips is quoted on the NYSE (symbol: PHG), London, Frankfurt, Amsterdam and other stock exchanges. News from Philips is located at www.philips.com/newscenter Safe Harbor Statement This document contains certain forward-looking statements with respect to the financial condition, results of operations and business of Philips and certain of the plans and objectives of Philips with respect to these items. By their nature, forward-looking statements involve risk and uncertainty because they relate to events and depend on circumstances that will occur in the future. There are a number of factors that could cause actual results and developments to differ materially from those expressed or implied by these forward-looking statements. These factors include, but are not limited to, levels of consumer and business spending in major economies, changes in consumer tastes and preferences, the levels of marketing and promotional expenditures by Philips and its competitors, raw materials and employee costs, changes in future exchange and interest rates (in particular, changes in the euro and the US dollar can materially effect results), tax rates and future business combinations, acquisitions or dispositions and the rate of technical changes. Market share estimates contained in this report are based on outside sources such as specialized research institutes, industry and dealer panels, etc. in combination with management estimates. For further information: Jeremy Cohen Head of Media Relations Royal Philips Electronics Tel.: +31 20 59 77213 Email: jeremy.cohen@p... Gerald Cavanagh Corporate Communications Sony Corporation Tel.: +81 3 5448 2200 Email: gerald.cavanagh@j... ------------------------------------------------------------------------ -------- | C 2002 Koninklijke Philips Electronics N.V. All rights reserved. | Privacy Policy | | Philips | Access to and use of this Web Site is subject to these Terms of Use.| 6166 From: James M. Atkinson Date: Sat Sep 7, 2002 1:32am Subject: God Bless America I just wanted to take a minute and ask that the list membership stop for a moment and offer a prayer for our nation, and to reflect on the pain that we have all suffered over the last year. As both a nation and a committee we have much to be grateful for, but let us also remember the fallen heroes, and those who stand in the shadows in defense of what we hold dear. Remember our soldiers and members of the intelligence profession who walk the mountains to bring the evildoers to justice, and those who labor to rid the world of those who have created fear. As a tribute to the victims of the 9/11 tragedy I have uploaded the following video to my website (it takes a little while to load and requires the Shockwave/.swf plug-in, but it is really touching so be patient while loading): http://www.tscm.com/tribute911.html God Bless America, -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6167 From: Robert Stephens Date: Fri Sep 6, 2002 9:08am Subject: RE: Tracking device detection Thanks to all who responded to my inquiry, I sincerely appreciate the effort (and attention) given. Requests from "average" citizens (housewives, on the go husbands, you name it) who believe their significant other may be tracking their movements are becoming all the more common in our society and these individuals are usually just looking for some advice on a quick, inexpensive method for checking this out, sometimes on a continual basis (thus desirous of purchasing a detection device for future self-use). The vast majority lead everyday, normal lives and usually would not be able to afford most likely even one expert tscm sweep, let alone several over a period of weeks or months. I bring this up only to illustrate that these types of cases are not serious cloak and dagger stuff, i.e. the safety of the free world is not at risk, ultra-secret research is not in jeopardy of being compromised etc. Perhaps the situation is akin to someone who needs some simple remodeling done on a bathroom in their home. In such a case they might possibly be able to do it themselves (with a little guidance from somebody knowledgeable about such matters) or perhaps they would hire a handyman. They would not, in all likelihood, need to contract with an expert builder, architect etc. Along these lines, the suggestions given by Raymond and Niall were pretty much what I was looking for. Thanks again and I'll now crawl back into my little cubby-hole. Nothing like a good baptism by fire, tscm-list style...:-) -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Friday, September 06, 2002 8:03 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Tracking device detection At 3:57 PM -0500 9/5/02, Robert Stephens wrote: >As tracking devices may be set for intermittent reporting of positions >by the user (thus being dormant for indeterminate periods of time), I'm >wondering what tactics some of the list members employ in order to >overcome this obstacle (aside from the standard physical search). Also, >any recommendations for an RF detector that will cover the various >ranges that such devices will transmit in (I assume most now operate via >digital signals)? The best tactic to counter this kind of a threat involves calling one of a dozen TSCM practitioners who deals with this kind of stuff all the time. The best RF detector is a laboratory grade microwave spectrum analyzer, a wide band vector signal unit with spectra-grams and/or waterfall), and a wide-band diode detector with a 80 dB CDPD bandpass filter. Still, the best way to find these little nasties is to call in a hard-core TSCM person in your area... you will make more money, your client will be pleased with the service, and you will be able to sleep at night. Check out: http://www.tscm.com/goldlist.html -jma -- ------------------------------------------------------------------------ -------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------ -------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ------------------------------------------------------------------------ -------------------------- Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu ------------------------------------------------------------------------ -------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6168 From: spyworldltd Date: Fri Sep 6, 2002 0:34pm Subject: Audiotel Scanlock I have the oppertunity of purchasing the first generation Audiotel Scanlock, its coming from a corperate not A TSCMer. Assuming it works etc has anybody got any ideas of the value of this kit, also has anybody had any experience using this kit? I do know a number of people at Audiotel-International and I can obtain either the Superbroom or the Scanlock at a discounted price however it is still a little over my available budget. Any feedback would be appreciated. Cheers David Emery Spyworld Ltd Tel. 08701 206185 Fax. 08701 206186 Web. www.spyworld.co.uk 6169 From: John McCain Date: Fri Sep 6, 2002 5:26pm Subject: OT: Cell phone passive repeater results Several weeks ago I asked for assistance in solving a cell phone coverage problem. I now office in a new building that is a virtual faraday cage. Many thanks to those who helped with information on building a cellphone band (900/1800 Mhz) passive repeater, especially Steve Uhrig who provided expert insight. The original situation was that I received a received signal indication of -111 dB on a Nokia 5165 phone, or essentially no signal, everywhere in the building. The building is a 2 story metal (Morton-style) office/manufacturing office building. I installed an inexpensive 14 element yagi on the roof with a short length of high quality coax to a mag-mount mobile antenna mounted upside down on a roof truss near one end of the building. The yagi claims to be have 12 dBi of gain, and the mag-mount claims 6 (actually I don't believe either claim). The coax is about two meters long. The results were better than I expected. There are still a few cold spots in the building, but for the most part, I get an indicated receive level varying between -89 and -103 dB depending upon where I am in the building. I expected lots of reflected RF floating around, but was surprised at an area that is shielded by a metal stairway, the level is still too low to use there, but that's a very small area of the building. This is roughly 15-20 dB improvement inside the building, and I'm thrilled with the results. As a side benefit, I can now hear the 2 meter ham repeater inside although I'm too far away to break squelch on it. Again, thanks for the help. JohnM Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-897-6600 2949 CR 1000N Web: http://www.dcbnet.com Dewey, IL. 61840 Email: Jmccain@d... 6170 From: Date: Sat Sep 7, 2002 7:21am Subject: Re: Audiotel Scanlock In a message dated 9/7/02 7:31:45 AM Pacific Daylight Time, TSCM@s... writes: << first generation Audiotel >> A Mark V or Mark VB? 6171 From: MiKe F. Date: Sun Sep 8, 2002 5:20am Subject: ani & aniac that don't work Hello , I while back these were posted as working automatic number identification announce circuit aniacs. I assumed they worked someone had verified them then posted them. I sent them to a friend,she emailed me back saying that only 2 or worked. Earlier this morning I dialed them yep tested them my own self. I found that here in syracuse ,ny only one worked. one Did work ==> 800-532-7486 (press 1,)in upstate ny I do believe that 2 or do work ,if you out west,where out west & which numbers work,you have to test them yourself. later4,mike f. Thought he was looking for local loop ANI, Ive also got these 1-800's ---paste 888-324-8686 - 888-352-5443- 800-346-0152 800-532-7486 (press 1,1)WORKS 800-444-4444 < 800-444-3333 800-666-1379 (press 1) 800-314-4258 877-269-8825 (press 4) 888-294-7514 800-404-3733 800-555-1160 These next 3 will say the number you've reached isn't active, then read off 4 digits plus your ANI. 800-877-2278 DOES NOT WORK 800-235-8378 DOES NOT WORK 800-204-4653-DOES NOT WORK ---end paste At 14:00 8/4/02 -0500, you wrote: >ANAC: 1 800 877 2278 (FULL COVERAGE US) -- Best regards, MiKe mailto:mleogran@t... 6172 From: Steve Uhrig Date: Sun Sep 8, 2002 8:55am Subject: Re: An interesting little device On 8 Sep 2002 at 4:10, u12armresl wrote: > They are MUCH more trouble than they are worth unless you have > something to hide and you want to take all that data and put it on > there and lock it away. Although security is one application, seemingly more use it for convenience. Coindicentally, someone stopped in here yesterday who had one. I wouldn't have noticed it on his keyring except for having read the article. He uses it to transfer received emails between work and home, like a portable Briefcase thing. The quality looked reasonable, he had used it for a while and was quite pleased. Only complaint was the USB connector on his home machine was on the rear, but a cheap USB hub could move it anywhere convenient. > The quality is junk at best and people tend to not take care of them > like you would valuable data leaving them in high heated areas, setting > them next to magnets lol, or carrying them in rain storms. It has nothing to do with magnetics. It's solid state storage, probably just a chip and some buffer or driver circuitry. And heat high enough to mess with the thing I saw as well as the one described in the articles would be much more than a human could bear. You'd have to melt plastic. The heat would not affect the memory chip. > Have seen many people bring them into our company and ask us to do a > forensic recovery on them. I'm glad you're available and have these skills to save these ignorant slobs from themselves. Shame on them if the carry the only copy of critical data on the things. They're designed and used more to transport data conveniently, not store it securely. Any bloody fool who carries his only copy of critical data around with him in his trousers deserves to lose it. They've only been available a very short time, so you must be in an area where they were released to the unwashed masses as a beta test or something. If that is true, no wonder they have problems. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6173 From: Date: Sun Sep 8, 2002 9:59am Subject: P3 wireless camera detector I just received my very own p3 today (From Radio Shack), just wanted to play with it, my results: (With fresh batteries, not the ones that came with it) Detection of 2M handheld at 5 Watts Output, 24 inches from the antenna Detection of microwave oven, 18 inches Detection of wireless microphone, 4 inches (175 MHZ) Detection of spread spectrum transmitter, 1 watt, 900 MHz, never Detection of cordless phone, 12 inches (49 MHZ) Detection of 432MHZ amateur TV transmitter, standard video 1 watt 8 inches. Detection of cellphone 12 inches Have not taken it apart yet, looks like another thing for the junk pile. Guess our jobs are secure for a little while longer!!!!!!! 73 SteveP 6174 From: Date: Sun Sep 8, 2002 6:01am Subject: Re: P3 wireless camera detector In a message dated 9/8/02 7:55:07 AM Pacific Daylight Time, preflat@p... writes: << Detection of cellphone 12 inches >> Analog or Digital? 8-900 Mhz, 1800Mhz ? 6175 From: Monty Date: Sat Sep 7, 2002 11:41am Subject: Re:Tracking device detection - Just some thoughts. To the TSCM community at large. I have been in the community for many years now. Because there are so few of use, there normally a good exchange of information between the different groups. After all we are searching for the same thing. The biggest difference is who is paying the bills. ìOURî biggest problem is how we deal with others outside of the ìclique.î This include both the public and even our clients. The reality is that most real TSCMíers may only find (if in the right place at the right time) a couple of good devices in a lifetime. Because of this clients tend to think we are not doing our job. To deal with this WE tend to hide ourselves under the cover of ìcloak and daggerî. Unfortunately this continues when someone asks basic questions. In message 1, Robert asked a simple question. Instead of giving a real answer Macc basically told him, if your not one of us you do not have a right to know. This is perfect example of our problem. Instead of correcting and helping Steve continues this when he saidÖ ìProfessionals have appropriate training, experience and equipment.î I have a lot of respect for Steve and I know he indeed has the experience to do a good job. But this was not enough, he then tryís to justify his rights of control by saying . . . ìYour only ethical and effective option is to contract one of the few teams who are in a position to do work like this effectively.î It must be said, there is nothing wrong with encouraging someone to use a professional. It is the best way to have a ìstrong likelihoodî that the target is clean. I am glad that not every one is so set into themselves. Atkinson in message 4 did pass on some useful information. by writing ìThe best RF detector is a laboratory grade microwave spectrum analyzer, a wide band vector signal unit with spectra- grams and/or waterfall), and a wide-band diode detector with a 80 dB CDPD bandpass filter.î Times are changing very fast. New gear both offensive and defensive are coming out on an almost weekly basis. We have accept that these days anyone can buy excellent bugs for less then $2000. These units are fully digital with burst and spread spectrum outputs with remote turn on and digital recorder storage. These changes are making the job harder. The time on target for most mission is limited. With most of these devices, a may only transmit 2 or 3 time while we are there. A professional TSCM team is very expensive to keep on site. We need to have more people helping us. Our numbers are just to small to be everywhere. If we help teach some of the local security to spot some of the clues,, perhaps we will find we have more jobs but with higher chance that something will truly be there. I agree a team must be called in to conduct a complete and accurate search of the target. But there are also too many times when we are called when a boss hears clicks on the phone lines and is convinced that they are bugged. These kind of investigations waste everyoneís time. The world is becoming an RF saturated environment. We have so many new devices designed for both good and bad. If we are going to keep up with these we must change the way business is done. Along with the gold list that Atkinson keeps, we need an equipment site that we as a group have reviewed. Some of the toys coming out are very good and useful, but others are a rehash of 20 year old junk. As groups find and try equipment, there needs to be a central place where we can see others opinion of the tools. I would like to see discussed and this group others ideas and thoughts. Thanks Monty XXXX Message 1 XXXXX From: "Robert Stephens" Subject: [TSCM-L] Tracking device detection As tracking devices may be set for intermittent reporting of positions by the user (thus being dormant for indeterminate periods of time), I'm wondering what tactics some of the list members employ in order to overcome this obstacle (aside from the standard physical search). Also, any recommendations for an RF detector that will cover the various ranges that such devices will transmit in (I assume most now operate via digital signals)? XXXX Message 2 XXXXX From: MACCFound@a... Date: Fri, 6 Sep 2002 01:26:42 EDT Subject: Re: [TSCM-L] Tracking device detection In a message dated 9/5/02 9:08:48 PM Pacific Daylight Time, Robert@d... writes: << I'm wondering what tactics some of the list members employ in order to overcome this obstacle (aside from the standard physical search). >> Subcontract the jobs to an experienced TSCM professional. Are you willing to risk missing something? MACC XXXX Message 3 XXXXX From: "Steve Uhrig" Date:Fri, 06 Sep 2002 08:32:57 -0400 Subject:[TSCM-L] Re: Tracking device detection On 5 Sep 2002 at 15:57, Robert Stephens wrote: > As tracking devices may be set for intermittent reporting of positions > by the user (thus being dormant for indeterminate periods of time), > I'm wondering what tactics some of the list members employ in order to > overcome this obstacle (aside from the standard physical search). Professionals have appropriate training, experience and equipment. > Also, any recommendations for an RF detector that will cover the > various ranges that such devices will transmit in (I assume most now > operate via digital signals)? See 2/3 of the above answer. With training and experience you will not need to ask others what numerous pieces of equipment to buy. Doing so is proof you're not qualified to use it. The equipment is useless without the 2/3 mentioned above. Your only ethical and effective option is to contract one of the few teams who are in a position to do work like this effectively. As several of us have said over and over (and over), sweeping is a *technical* specialty, not an investigative specialty. While some sweepers happen to be PIs, it's purely for legal reasons and as far as I know, the few who do have PI licenses do not do any investigative work. They do technical work only. Steve Department of Redundancy Department XXXX Message 4 XXXXX From:"James M. Atkinson" Date:Fri, 6 Sep 2002 09:03:10 -0400 Subject:Re: [TSCM-L] Tracking device detection At 3:57 PM -0500 9/5/02, Robert Stephens wrote: >As tracking devices may be set for intermittent reporting of positions >by the user (thus being dormant for indeterminate periods of time), I'm >wondering what tactics some of the list members employ in order to >overcome this obstacle (aside from the standard physical search). Also, >any recommendations for an RF detector that will cover the various >ranges that such devices will transmit in (I assume most now operate via >digital signals)? The best tactic to counter this kind of a threat involves calling one of a dozen TSCM practitioners who deals with this kind of stuff all the time. The best RF detector is a laboratory grade microwave spectrum analyzer, a wide band vector signal unit with spectra- grams and/or waterfall), and a wide-band diode detector with a 80 dB CDPD bandpass filter. Still, the best way to find these little nasties is to call in a hard-core TSCM person in your area... you will make more money, your client will be pleased with the service, and you will be able to sleep at night. Check out: http://www.tscm.com/goldlist.html -jma XXXX Message 5 XXXXX From:"Robert Stephens" Date:Fri, 6 Sep 2002 09:08:39 -0500 Subject:RE: [TSCM-L] Tracking device detection Thanks to all who responded to my inquiry, I sincerely appreciate the effort (and attention) given. Requests from "average" citizens (housewives, on the go husbands, you name it) who believe their significant other may be tracking their movements are becoming all the more common in our society and these individuals are usually just looking for some advice on a quick, inexpensive method for checking this out, sometimes on a continual basis (thus desirous of purchasing a detection device for future self-use). The vast majority lead everyday, normal lives and usually would not be able to afford most likely even one expert tscm sweep, let alone several over a period of weeks or months. I bring this up only to illustrate that these types of cases are not serious cloak and dagger stuff, i.e. the safety of the free world is not at risk, ultra-secret research is not in jeopardy of being compromised etc. Perhaps the situation is akin to someone who needs some simple remodeling done on a bathroom in their home. In such a case they might possibly be able to do it themselves (with a little guidance from somebody knowledgeable about such matters) or perhaps they would hire a handyman. They would not, in all likelihood, need to contract with an expert builder, architect etc. Along these lines, the suggestions given by Raymond and Niall were pretty much what I was looking for. Thanks again and I'll now crawl back into my little cubby-hole. Nothing like a good baptism by fire, tscm- list style...:-) nnnn __________________________________________________ Do You Yahoo!? Yahoo! Finance - Get real-time stock quotes http://finance.yahoo.com 6176 From: u12armresl Date: Sat Sep 7, 2002 11:13pm Subject: Re: Cell Phone Records Playing Key Role in Criminal Cases That is scary that he uses them for EVERY case that he has had sounds like a gross abuse of power. -- In TSCM-L@y..., MACCFound@a... wrote: > > Cell Phone Records Playing Key Role in Criminal Cases > By ANNA GORMAN - L.A. TIMES STAFF WRITER > > September 6 2002 > > The staples of criminal investigations are well-recognized. Fingerprints. > Weapons. Eyewitnesses. > > Now detectives are relying on a new tool: cell phones. > > Because more than 40% of Americans own mobile phones, law enforcement > personnel see them as a powerful resource in investigations and trials. > Detectives say phone records, from both suspects and victims, can provide key > evidence in murder, robbery, drug and rape cases. > > Records of cell phone calls are more useful than those of regular phones > because they not only show what numbers were called and when, but also reveal > the area where the caller was when the call was made. That allows police and > prosecutors to track suspects' movements--sometimes even while a kidnapping > is in progress. > > The records also can destroy alibis or attack a suspect's credibility if his > statements contradict the phone data. And murder victims' phone records can > pinpoint when and where they were killed, and connect the victim to the > suspect. > > "The sooner we get those records, the better," said Det. Mike Berchem of the > Los Angeles Police Department. "They're invaluable." > > He said he has used cell phone records in every one of his investigations > during the last few years, finding suspects, witnesses and accomplices. "It's > hard evidence; it doesn't lie," he said. > > High-Profile Cases > > Cell phone records have proved important in several high-profile cases, > including the following: > > * Prosecutors used David Westerfield's cell phone records to track his > erratic movements in the days after Danielle van Dam disappeared from her San > Diego home. Within 48 hours, Westerfield drove to the desert, the beach and > back to the neighborhood where he and the Van Dams lived. He told police he > was in the desert scouting for places to take his son camping. Last month, > Westerfield was convicted of kidnapping and murdering the 7-year- old girl. > > * Alejandro Avila said he was at an Ontario mall when 5-year-old Samantha > Runnion was kidnapped from her Orange County condo complex. But authorities > said his cell phone records showed that he was near where the girl's body was > found, off a mountain road near Lake Elsinore. Avila is awaiting trial on > murder, kidnapping and sexual assault charges. > > * The day that LAPD Rampart Division Officer Rafael Perez stole cocaine from > an evidence locker, prosecutors said, he made cell phone calls from near > where the drugs were stolen, including one call to his drug dealer > girlfriend. "It was extremely compelling and significant evidence," said > former prosecutor Richard Rosenthal. Though a jury deadlocked, Perez later > pleaded guilty to cocaine theft and was sentenced to five years in state > prison. > > Targeting Accomplices > > Cell phones can also be used to connect suspects with their accomplices. Los > Angeles County Deputy Dist. Atty. Craig Hum recalled the case of Rebecca > Cleland, accused of hiring two cousins to kill her 43-year-old husband, > Bruce. Cell phone records showed 11 calls between Cleland and her cousins in > the hours leading up to the murder, including one last call 10 minutes before > the shooting. > > Cleland said a carjacker had knocked her unconscious. But cell phone records > placed her cousin Alvaro Quezada about a block from the murder scene, despite > his claim that he was at a restaurant 20 miles away. "We could basically > prove that he was lying," Hum said. "Without the cell phone records, it would > have been extremely difficult to convict him." > > All three were convicted of first-degree murder in 2000 and sentenced to life > terms without parole. > > At trial, phone company representatives are called to explain to jurors how > the data are collected and what the records mean. > > Each cell phone sends a distinct signal. When a call is made, the cell phone > signal immediately attaches to the closest cell tower, which transmits the > call. As the caller moves into a different area, the cell tower hands off the > call to a new tower. Each tower handles an average of 150 calls and reaches a > half-mile to two miles in urban areas and up to 50 miles in rural areas, said > Jim Righeimer, who owns an Orange County company that leases space for cell > towers. > > Computers keep data on which tower is being used for calls. If the cell > towers are closely spaced, the data can nearly pinpoint where the caller was > at the time of the call. > > Defense attorneys sometimes challenge the evidence because cell phones can be > passed around and often are used by more than one person. Some drug dealers > have beat the system by buying cheap phones, using them for one transaction > and discarding them. > > To obtain phone records in criminal cases, law enforcement must get a search > warrant from a judge, who must determine that there is probable cause to > believe the target has committed a crime. > > The requests put companies in a tough spot, said Michael Altschul, senior > vice president of the Cellular Telecommunications and Internet Assn. "They > have a legal obligation to be responsive to law enforcement, but on the other > hand, there are privacy expectations of their customers," he said. > > As a result, companies will only release records if they have received a > court order, Altschul said. But in kidnapping cases, when every second is > valuable, companies will make exceptions. > > Privacy Concerns > > The increased use of cell phone records worries privacy advocates. > > "We believe that typical users of cell phones have a reasonable expectation > of privacy when it comes to their location," said David Sobel, general > counsel for the nonprofit Electronic Privacy Information Center. "That kind > of collection of information is really uniquely invasive." > > Sobel, who studies the privacy implications of new technology, said he also > fears that records will be sought more regularly in civil litigation and > divorce cases. > > LAPD Det. Dennis English said that as more people buy cell phones, the > records will become even more important. "They will probably play a greater > role in present and future crime scene investigations because of the > multitude of cell phones out there," he said. > > http://www.latimes.com/news/local/la-me-onthelaw6sep06.story? coll=la%2Dheadlin > > es%2Dcalifornia 6177 From: Date: Sun Sep 8, 2002 6:44am Subject: Re: Re:Tracking device detection - Just some thoughts. In a message dated 9/8/02 8:24:25 AM Pacific Daylight Time, monty399@y... writes: << In message 1, Robert asked a simple question. Instead of giving a real answer Macc basically told him, if your not one of us you do not have a right to know. This is perfect example of our problem. >> I stand by my post. I strive to solve problems not be a part of them. I disagree with your assessment of my post. Hypothetical You have a serious medical problem that requires a specialist. Door A. You hire an ex policeman who bought a surgical kit. Door B You hire a college grad from a liberal arts college who took two weeks of medical training and a doctors bag. Door C You hire a practitioner who reads every word he can find on the subject. Takes specialized classes as needed. Aggressively researches threats and cures. Attends seminars for continuing education. Owns the finest equipment made for an accurate diagnosis. And only practices on the disease you have. Which door Monty? 6178 From: James M. Atkinson Date: Sun Sep 8, 2002 11:26am Subject: Flying the Flag Flying the Flag By Mark Steyn (Filed: 07/09/2002) Daily Telegraph I was filling up at a truck stop this week and a guy pulled in alongside. Ford pick-up, late 80s, little rusty. He had a full-size American flag sticking out the rear cab window and a sticker saying "United We Stand Against Terrorism" on the tailgate and a couple more flag decals on the sides. He glanced at the car in front. A li'l ol' gran'ma was putting five bucks' worth in her two-door sedan. She had a little flag flying from her aerial and a "Proud To Be An American" sticker in the rear window. Then he looked at me. And I realised my vehicle was bare. The missus had put a laminated "Don't Mess With The US" sign on the back, but, as the year rolled on, somewhere or other it dropped off leaving just the plastic suction pad, the last vestigial hint of my patriotic fervour. The flags went up on the cars after September 11 and they never came down, and after a year you hardly notice that half the folks on the road have mini flagpoles clipped to both side windows and are driving along fluttering like a grand unending ceremonial escort. Not everyone sports them, of course, and what bugged me was that the guy in the pick-up had me pegged as a conscious non-flag-flyer, as some pantywaist milquetoast America-disparaging type like those professors at Berkeley, where they've banned the Stars and Stripes from all September 11 commemorations lest it make anyone "uncomfortable". I felt a strange urge to go up to him and say no, look, honestly, I'll bet I'm just as angry as you. Underneath all the "coping" and "healing" and the rest of the Dianafied soft-focus blur this Wednesday, you won't hear a lot about anger. But quiet, righteous anger is what a lot of Americans still feel. I feel angry every time I'm at Boston's godawful Logan Airport, as crappy and chaotic now as it was a year ago when I dropped off my niece and nephew to fly home from vacation. Ever since, somewhere between the parking garage and the gate, I think of Mohammed Atta and his accomplices - was this his check-in line? did he use this payphone? A couple of months back there was a guy ahead of me at the cardboard-croissant counter with a thick cloying scent, and I remembered Atta instructing his crew the night before to wear cologne and remove their body hair. What was he thinking as he watched his victims board? Did he see two-year-old Christine Hanson, bound for Disneyland with her parents? It's the details that stick. I was in a skyscraper last week and looked across and caught the eye of a woman in the building across the street, and I thought of the people in the south tower, after the first plane hit, glancing out the window and seeing the jumpers from the north tower going by - men in business suits, necktie up and flapping, choosing to take one last gulp of air and plunge to their deaths rather than burn and choke in the heat. I feel sorry for the 55 per cent of Europeans who, according to a poll last week, think falling secretaries and atomised infants are something to do with "US foreign policy". Mohammed Atta and his chums were wealthy, privileged and psychotic, yet feeble British churchmen line up to say the people who did this did it because they're impoverished, downtrodden yet rational. Granted that the fetid swamp of equivalence is often mistaken for the moral high ground, it's rarely been so crowded. The stampede started almost immediately. On September 12, the Ottawa Citizen ran a column by Susan Riley headlined "At Times Like This, We Thank God That We're Canadians". Oh, God, I groaned, not the usual moral preening. But no, Ms Riley skipped that and went straight for naked self-interest: "Our best protection may be distancing ourselves a little more explicitly from US foreign policy ä pursuing a reasonable and moderate course in the world's trouble spots." I've heard it a thousand times since and I still don't get it. By "distancing yourself" from the victims of September 11 you move yourself closer to the perpetrators, closer to barbarism. It may be "reasonable and moderate", but it's also profoundly self-corroding. This isn't a "clash of civilisations" so much as a clash within civilisations - in the West, between those who believe in the values of liberal democracy and those too numbed by multiculturalist bromides to recognise even the most direct assault on them; and in the Islamic world, between what's left of the moderate Muslim temperament and the Saudi-radicalised death-cult Islamists. I don't want to be "moderate and reasonable" in the face of Mohammed Atta. A world that "distances" itself from the US to get closer to him is a world that's more misogynist, bigoted, corrupt and superstitious. On this anniversary, I'll have a new flag on my truck and Neil Young's great September 11 anthem in the CD player: No one has the answers, But one thing is true, You got to turn on evil, When it's comin' after you. You got to face it down, And when it tries to hide, You got to go in after it, And never be denied. Amen. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6179 From: iDEN-i100 Date: Sun Sep 8, 2002 11:55am Subject: Re: P3 wireless camera detector and don't forget detection of a "Flushing Toilet" from the next room........ preflat@p... wrote: > I just received my very own p3 today (From Radio Shack), just wanted to play > with it, my results: > > (With fresh batteries, not the ones that came with it) > > Detection of 2M handheld at 5 Watts Output, 24 inches from the antenna > Detection of microwave oven, 18 inches > Detection of wireless microphone, 4 inches (175 MHZ) > Detection of spread spectrum transmitter, 1 watt, 900 MHz, never > Detection of cordless phone, 12 inches (49 MHZ) > Detection of 432MHZ amateur TV transmitter, standard video 1 watt 8 inches. > Detection of cellphone 12 inches > > Have not taken it apart yet, looks like another thing for the junk pile. > > Guess our jobs are secure for a little while longer!!!!!!! > > 73 > SteveP 6180 From: Steve Uhrig Date: Sun Sep 8, 2002 1:00pm Subject: Re:Tracking device detection - Just some thoughts. On 7 Sep 2002 at 9:41, Monty wrote: > Unfortunately this continues when someone asks basic questions. In > message 1, Robert asked a simple question. He was not asking a simple question looking for useful information to be applied ethically and efficiently. If he had, he would have been given appropriate information. He was looking for someone to recommend a Ralph Thomas solution for a few hundred dollars, to assuage his conscience that he could skip the many tens of thousands of dollars and thousands of hours of combined training and experience any real sweeper has, and do a sweep for someone. He was looking to play with the big boys without paying his dues, and some of us recognized that. And didn't fall for it. > Instead of giving a real answer Macc basically told him, if your not one > of us you do not have a right to know. Mike did NOT say that. He merely said if one does not have the requisite various and sundry qualifications to do the job honestly and efficiently FOR THE CLIENT (which should be our bottom line), then the only ETHICAL thing is to sub to someone who does. I said the same thing, possibly expanded by a sentence or two, for the same reason. Mike (MACC) and I generally are on the same page, as are the very few real professionals on this list, most of whom never or virtually never post. Jim said the same thing also. > This is perfect example of our problem. You are right in a sense. Perfect example of A problem. YOUR problem? I doubt it. The problem is consumers of TSCM services, whether legitimate or lunatics, constantly are being cheated by unqualified persons doing rain dance sweeps. That makes the legitimate practitioners, which is perhaps 1/10 of 1% of the people who offer the service, look bad. And is a waste of money and gives a dangerous false sense of security to the innocent consumer. Or, as I recently have seen with several young ladies Jim Ross has cheated by telling them they definitely are bugged, can ruin their lives and their sanity and cause them to take money out of the rent and food off the table chasing demons which don't exist. Some of these people doing rain dances are honestly incompetent. This includes well meaning novices who are honest people, but have not been exposed to the real world of TSCM and fall for the spy shop line of BS. Those I do not condemn as they merely are misinformed. I will work patiently with them to expose them to the real world, and if they are serious, will work with them to enter the profession properly, get trained, etc. You have to pay your dues, and damn few people are willing to do that. We're the instant gratification generation. We're greedy. I want it all and I want it now. Many fall for the get rich quick thing, and all the spy shops play up to that. These are types who should sub out any sweep opportunities they encounter to a qualified pro, and maybe work with the professional to learn something if that is permitted and practical. Then there are those who are dishonest and incompetent, and know it, and to those I hold no quarter. They are fair game for any of us who want to expose them. They're only out to cheat people. Jim Ross is a typical example, and there are many more. Purveyors of do-it-yourself sweep gear are others who knowingly cheat people, and they will have to face God one day and answer for that. Somewhere in there are people who may want to do a good job but don't have any idea where or how to start. They don't have the background, are unable/unwilling to invest the time to learn the basics, train, apprentice and do it properly. Some people just aren't going to be able to do it, no matter how well meaning. To those, we owe it to them to explain this gently with respect, offer support and courtesy, and recommend they sub any work they trip across to someone competent. Not everyone who has the desire can become a sweeper. Most who have the desire can't, for a multitude of reasons. I keep saying, and will do so again, of all the people who call me and want to buy zillion gigacycle this and that, and are all worried about threats up in the X-Ray wavelength, and can throw around all the buzzwords and act all self righteous, hardly a one of them can do a simple Ohm's law problem or draw the schematic of a flashlight. You need to have the ability to do the job BEFORE you accept the work. That is a basic concept few seem to realize. I sell used TSCM equipment. You wouldn't believe how many calls I get from PIs who just happened to trip over a sweep job, committed to it, have no idea whatsoever what is involved, what to charge, etc. and want me to overnight them everything they'll need to do the job. That's sad, and is the kind if situation MACC and I were referring to. Jim answered the question the same basic way, but gave the inquirer the info he asked for even though it would be useless to him. I disagree with your statement, and you destroyed your credibility on all issues by making it: > We have accept that these days anyone can buy excellent bugs for less > then $2000. These units are fully digital with burst and spread > spectrum outputs with remote turn on and digital recorder storage. I am in the business manufacturing equipment vaguely similar to this, I know essentially every piece of equipment on the planet used by governments, and the genuine products are extremely difficult to get and cost far more than $2000. I personally have worked with the very latest technology the planet has to offer and have trained governments as well as a good number of members of this list in person on equipment very similar to the above, and frankly, I doubt you have ever or will ever see it. You're just parroting some crap you read somewhere else, which is making you part of the hype problem, not part of the solution. For every one of the above devices deployed, fifty thousand consumer tape recorders with Radio Shack interfaces are hanging on the phone line in someone's spare bedroom. Are we finding the fifty thousand tape recorders? Worry about them. Don't be another one throwing around terms and threats you'll never see and wouldn't recognize if you did. Don't complain. Do something. Mentor some well intentioned potential sweeper who is willing to work hard, pay his dues and take the time to become competent. I practice what I preach, to which at least thirty people I've met through this list could testify. But make sure you are in a position to speak before you do anything. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6181 From: kondrak Date: Sun Sep 8, 2002 1:54pm Subject: Re: Re: An interesting little device These things have been around for some time now. They can be used as a "dongle" (which was the first app I saw them used for) or a temporary data store for sneakernet use. Compare it to a zip-drive, a large floppy in whatever sizes they are available in. I personally don't care for them, as all my computers have the USB port in the rear making access inconvenient. For data portability vs size, I'd rather put a multi-R-W disk in my CD burner and put 700mb on it for 25c All can be secured...that's a given.. At 09:55 9/8/02 -0400, you wrote: >On 8 Sep 2002 at 4:10, u12armresl wrote: > > > They are MUCH more trouble than they are worth unless you have > > something to hide and you want to take all that data and put it on > > there and lock it away. > >Although security is one application, seemingly more use it for >convenience. > >Coindicentally, someone stopped in here yesterday who had one. I >wouldn't have noticed it on his keyring except for having read the >article. He uses it to transfer received emails between work and >home, like a portable Briefcase thing. The quality looked reasonable, >he had used it for a while and was quite pleased. Only complaint was >the USB connector on his home machine was on the rear, but a cheap >USB hub could move it anywhere convenient. 6182 From: Jay Coote Date: Sun Sep 8, 2002 3:11pm Subject: Opto Items For Sale For sale: Scout 40 v2.0 Working and good cosmetic condition. DC-440 v3.1 CTCSS/DTMF Decoder. Working and good cosmetic cond. R-10 Interceptor- may have intermittent sensitivity/antenna problem No chargers or manuals. I am basically "throwing in" the R10 with the other two working units. $300 Thanks, Jay Coote Los Angeles TSCM@j... From: Agent Geiger Date: Sun Sep 5, 2004 1:27pm Subject: Re: Analysis of discovered RF device Fibreglass ladders: http://www.skylax.com/otherem.htm http://ullrich-aluminium.co.nz/profile/ladders.htm --- DEMTEC@A... wrote: > Dear All > I am at a loss to understand what a > "terrism-related/manoey laudering case" > Any ideas anybody please. > If this is a misspelling, surely it must be good > manners to press the 'spell > check' before sending to the group. > What exactly is a 'TANGO'? > Less jargon from our very knowledgeable American > cousins, aimed at the > members outside of the USA would be very helpful > please. > Regarding the aluminium ladder issue, I have been > part of the Electrical > industry for 40 years both here in the UK and in > various parts of the world > including the USA and I have never seen one single > Fibreglass ladder. > Regards to all > Dave > TSCM Operative Liverpool UK > > > [Non-text portions of this message have been > removed] > > > __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - Send 10MB messages! http://promotions.yahoo.com/new_mail 9591 From: Steve Weinert at Excel.Net Date: Mon Sep 6, 2004 9:59am Subject: Re: Re:Ladder Issue In the USA (other than when working in Mines, on Railroads, in Federal Government buildings/reserves and the rest of the exemptions - places where other safety rules apply), OSHA has this to say concerning ladders: 1926.1053(b)(12) Ladders shall have nonconductive siderails if they are used where the employee or the ladder could contact exposed energized electrical equipment, except as provided in 1926.951(c)(1) of this part. http://www.osha.gov/pls/oshaweb/owadisp.show_document?p_table=STANDARDS&p_id=10839 The exemption from the non-conductive rule is: 1926.951(c)(1) Portable metal or conductive ladders shall not be used near energized lines or equipment except as may be necessary in specialized work such as in high voltage substations where nonconductive ladders might present a greater hazard than conductive ladders. Conductive or metal ladders shall be prominently marked as conductive and all necessary precautions shall be taken when used in specialized work. http://www.osha.gov/pls/oshaweb/owadisp.show_document?p_table=STANDARDS&p_id=10822 As a practical matter clients and insurance carriers have an impact as well. They may forbid or limit the "insured use" or possession on client's site of conductive ladders. Many of our clients have blanket prohibitions on ladders other than wood or fiberglass. Steve W 9592 From: David Alexander Date: Mon Sep 6, 2004 10:19am Subject: RE: Re:Ladder Issue Does this mean that, if you don't comply with the guidelines, steps will be taken by the OSHA ? Sorry, I just couldn't resist the temptation ! Regards Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: Steve Weinert at Excel.Net [mailto:srw@e...] Sent: 06 September 2004 16:00 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Re:Ladder Issue In the USA (other than when working in Mines, on Railroads, in Federal Government buildings/reserves and the rest of the exemptions - places where other safety rules apply), OSHA has this to say concerning ladders: 1926.1053(b)(12) Ladders shall have nonconductive siderails if they are used where the employee or the ladder could contact exposed energized electrical equipment, except as provided in 1926.951(c)(1) of this part. http://www.osha.gov/pls/oshaweb/owadisp.show_document?p_table=STANDARDS&p_id =10839 The exemption from the non-conductive rule is: 1926.951(c)(1) Portable metal or conductive ladders shall not be used near energized lines or equipment except as may be necessary in specialized work such as in high voltage substations where nonconductive ladders might present a greater hazard than conductive ladders. Conductive or metal ladders shall be prominently marked as conductive and all necessary precautions shall be taken when used in specialized work. http://www.osha.gov/pls/oshaweb/owadisp.show_document?p_table=STANDARDS&p_id =10822 As a practical matter clients and insurance carriers have an impact as well. They may forbid or limit the "insured use" or possession on client's site of conductive ladders. Many of our clients have blanket prohibitions on ladders other than wood or fiberglass. Steve W ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9593 From: Paul Curtis Date: Mon Sep 6, 2004 10:25am Subject: RE: Re:Ladder Issue ALL steps will be taken except the last one :) Paul Curtis -----Original Message----- From: David Alexander [mailto:david.alexander@d...] Sent: Monday, September 06, 2004 08:19 To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Re:Ladder Issue Does this mean that, if you don't comply with the guidelines, steps will be taken by the OSHA ? Sorry, I just couldn't resist the temptation ! Regards Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: Steve Weinert at Excel.Net [mailto:srw@e...] Sent: 06 September 2004 16:00 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Re:Ladder Issue In the USA (other than when working in Mines, on Railroads, in Federal Government buildings/reserves and the rest of the exemptions - places where other safety rules apply), OSHA has this to say concerning ladders: 1926.1053(b)(12) Ladders shall have nonconductive siderails if they are used where the employee or the ladder could contact exposed energized electrical equipment, except as provided in 1926.951(c)(1) of this part. http://www.osha.gov/pls/oshaweb/owadisp.show_document?p_table=STANDARDS&p_id =10839 The exemption from the non-conductive rule is: 1926.951(c)(1) Portable metal or conductive ladders shall not be used near energized lines or equipment except as may be necessary in specialized work such as in high voltage substations where nonconductive ladders might present a greater hazard than conductive ladders. Conductive or metal ladders shall be prominently marked as conductive and all necessary precautions shall be taken when used in specialized work. http://www.osha.gov/pls/oshaweb/owadisp.show_document?p_table=STANDARDS&p_id =10822 As a practical matter clients and insurance carriers have an impact as well. They may forbid or limit the "insured use" or possession on client's site of conductive ladders. Many of our clients have blanket prohibitions on ladders other than wood or fiberglass. Steve W ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9594 From: Andy Moore Date: Mon Sep 6, 2004 0:01pm Subject: Re: Help needed with leased line specifications George, try BT's own tech description site at http://www.sinet.bt.com/ which has loads of info. Kilostream is mentioned in a couple of docs but, essentially, Andy Cuff's link explains the local interface (DTE/DCE in datacomms parlance), which is X.21, whilst the line side is G.703/HDB3 (Hi Density Bipolar 3) which is a baseband digital signal. Trust this helps. Andy Moore ----- Original Message ----- From: "George Shaw" To: Sent: Sunday, September 05, 2004 2:41 PM Subject: [TSCM-L] Help needed with leased line specifications > > Can any one here help by providing a link to the electrical and signal > specifications for a UK leased line as provided by BT commonly known as a > kilostream? > > -- > George Shaw MI3GTO / 2I0GTO > > " Any Sufficiently Advanced Technology > is Indistinguishable from Magic" > ---Arthur C. Clarke > > Mobile: +44 (0) 7740 361 163 > Email: george.shaw@u... > Fax & Voicemail: +44 (0) 871 242 5365 > EchoLink & eQSO (101English) connected 24/7 > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 9595 From: A Grudko Date: Mon Sep 6, 2004 1:42pm Subject: RE: bunches of zeros -----Original Message----- From: Sir Nobody in Particular [mailto:ouaoua@c...] > ... But it struck me as highly illegal in that the deception couldn't be anything but nefarious in nature even if trying to coerce me into divulging the current whereabouts of this notorious blonde knockout. It didn't sit right with me at all....Is there no current binding legislation that governs these practices? (In this reply I assume that 'Sir Nobody' is in the USA) Illegal? To send a caller ID of 000 000 0000? Isn't that an obvious request for privacy? 'Highly illegal'? I would hope not, even in Ashcroft''s America. Is incoming caller ID now a right for US phone company customers that over-rights your right to privacy?? If you book into a motel tonight Nobody, are you obliged to show some form of ID? (Ve vissh to see your papers, ja) If you sign in as John Smith is this a crime in America today? (It may be, post 9/11 - I've not been in the US since 1996, but I always booked into motels from Key West to San Francisco under silly names like 'Janet Reno' just for fun. Sending another person's ID - such as your wife's - to trick you to answer the phone could be illegal. But even then it would probably only be a misdemeanour, not 'highly illegal' unless it was part of a bigger criminal fraud. Of course I'm in a different country but we're quickly catching up with the rest of the world when it comes to legislation (God only needed 10 laws in the Bible for mankind but our lawyers know better - a different discussion). Seeking privacy does not automatically seem nefarious to me. Granted, I see things mainly from an investigator's perspective (both private and government) and we frequently use deception to collect information, facts, evidence and hopefully, contrarily, ironically - arrive at the truth. If I'm going to try to buy heroin from a suspected drug dealer as part of an investigation, basic tradecraft tells me that I probably shouldn't wear a police uniform when I try to buy the stuff... Legitimate PIs need the same right of anonymity. Today I have two murder cases on my desk, one being 15 months old and a text-book hired gun killing. The police have given up on the case but I have fresh leads which I'm sharing with them. Am I supposed to 'phone the suspects and reveal my identity and expose my family to risk because the alleged killers have a right to see my caller ID? No way Sir Nobody! I argued this successfully in 2002 when our government tried to introduce legislation that would have made it illegal for a PI to use a 'cover' to conduct a lawful investigation. So today SA PIs can misrepresent their identities but if challenged under the Act must justify the deception to the regulating Authority. In May this year I argued the same points at a Commission of Enquiry looking at the security industry - the jury is still out on that one. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" . [Non-text portions of this message have been removed] 9596 From: A Grudko Date: Mon Sep 6, 2004 1:42pm Subject: RE: SDR analysis of covert transmissions -----Original Message----- From: Michael Puchol [mailto:mpuchol@s...] > SDR = Software Defined Radio. Ah, OK, thanks for the definition - I have 3 of these but had not seen the acronym before Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" . --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.749 / Virus Database: 501 - Release Date: 2004/09/01 [Non-text portions of this message have been removed] 9597 From: James M. Atkinson Date: Mon Sep 6, 2004 4:23pm Subject: You might be a lineman... You might be a lineman if, 1. the clothes line in back of your house is made with crossarms and #6 copper 2. you know that a Hickey or a Peanut is used to connect two wires. 3. you have ever had a drink called the Double Deadend in a bar called the Swinging Angle. 4. you have ever had Sardines and Mustard at four in the morning, and thought they were good. 5. you go on vacation and spend more time looking at poles and crossarms than the scenery. 6. you hear someone yell "headache" and you know it's not their head that's going to hurt. 7. the dinner napkins at your Thanksgiving dinner are a set of matching Terri Towels. 8. you know what "just dob that peckerwood hole" means. 9. someone says, that looks like "crappo", and you know he's not talking about the stuff on the bottom of your Wesco's. 10. you know "bad pot" is not a rating for a recreational herb, but just more work. 11. you have ever said "Get me a Becky", and you weren't talking about your 8th grade sweetheart. 12. you have been thrown out of all the "best" bars in town. 13. you know where every porta jon in town is or if you know what a thunder jug is. 14. you walk bowed over with a limp----while wearing your Wesco's to church on Sunday morning. 15. everyone on your block has cable reels for lawn furniture 16. you know enough to turn around when you hear some one ask for the "hammer". 17. you can't stop looking at OPP..Other Peoples Plant 18. the site of a tree makes your skin crawl. 19. you let your wife drive and make her open and close any gates you come across while you sit in the car/truck and read the newspaper funnies. 20. you can build more than 500 miles of powerlines in one sitting at the local bar. 21. You lace up your shoes/boots using a bowline 22. the porch on your trailer house is built with crossarms, braces and old hi-line arms-- and instead of concrete blocks supporting the trailer, you use old pole butts. 23. your dreams consist of miles and miles of gravy runs. 24. your tow strap is a piece of strand and 2 preforms. 25. your wife wants you to wear a bashlin belt and hard hat to bed occasionally. 26. your car or truck is held together with #6 aluminum tie wire. 27. the radio antenna on your car or truck is #6 AL tie wire. 28. you are on the dance floor with your yellow dielectics on 29. your kids are looking at a family picture and ask, "mommy, who is that man in the picture?" 30. your fence is anchored and the post are framed poles 31. your sons/daughters school science fair project consist of a light pole ,a insulator, 2 sets of climbing hooks and a hard hat. 32. every t-shirt you own has your company's logo on it. 33. you have a deer stand that has 4 poles for legs. 34. you brag about about how much bigger your bucket truck is than the other guys. 35. you have ever killed someone's flower bed by spraying hydraulic oil all over it from breaking a hose on one of your tools. 36. you get offended when someone calls one of your poles a telephone pole. 37. your landscaping is done with the pole tops from your transfers instead of railroad ties 38. you get offended when someone calls one of your poles a telephone pole. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9598 From: James M. Atkinson Date: Mon Sep 6, 2004 4:38pm Subject: Ladder Issues There is nothing wrong with having aluminum steps, but the side rails should be fiberglass, and "top" of the ladder should plastic. I should have mentioned it earlier, buy you need several step ladders, each at a different height for use while performing a sweep. Of work outside the facility you will need several types of extension ladders, including at least one pole ladder with strand hooks and straps. A typical set of ladders for TSCM work INSIDE the client office would include a short step ladder that is four feet high, then a "regular" one that is 6 feet high, another 8 feet high, and then a "tall" one either 10 or 12 feet high. The four and six foot ladders are easy to carry,easy to set -up, and easy to transport, but the eight foot ladders can be a little tricky. The longer 10 and 12 foot ladders are extremely tricky to carry and set up, and a real hassle to transport, but if you have a high ceiling (true ceiling, as opposed to false ceiling) you will need one of these taller ladders. Of the topic of ladders I would remind list members that at no time should they stand on the top of the ladder, or leave "outside the foot print" of the ladder. A good rule of thumb to follow is that you should never allow your navel/belt buckle go above the top step, and should never allow it to go beyond the side rails. The only exception to this is the short 4 foot step ladders where you are only using the lower two steps. ALWAYS buy the highest grade, heaviest duty of ladder possible, and buy one with the highest weight rating you can find. A twin style ladder has steps on both sides so that you don't have to move it as much, but at no time should you have two people on the ladder at the same time (unless you both weigh less than 85 pounds each). Here is a good example of a decent ladders suitable for TSCM work: http://www.amazon.com/exec/obidos/ASIN/B00004RKAN/graniteisland-20 http://www.amazon.com/exec/obidos/ASIN/B00005JTC5/graniteisland-20 http://www.amazon.com/exec/obidos/ASIN/B00004RKDB/graniteisland-20 http://www.amazon.com/exec/obidos/ASIN/B00004RKDC/graniteisland-20 http://www.amazon.com/exec/obidos/ASIN/B00004RKD7/graniteisland-20 http://www.amazon.com/exec/obidos/ASIN/B00005JRKA/graniteisland-20 Here is a good extension ladder for use outside of the building, but be sure to use it with removable outriggers/stabilizers and related protective pads listed. http://www.amazon.com/exec/obidos/ASIN/B00004RKB7/graniteisland-20 http://www.amazon.com/exec/obidos/ASIN/B00004RKD1/graniteisland-20 http://www.amazon.com/exec/obidos/ASIN/B00004RKCU/graniteisland-20 http://www.amazon.com/exec/obidos/ASIN/B00004RKCT/graniteisland-20 Also, one of the desirable reasons to use a two sided step ladder is that you can use two of them at once, and lay wide decking between them so you can get into the ceiling right over desks and furniture without having to move the furniture. You can usually find decking in 8 and 10 foot (easy to move, annoying to use), 12-14-16 lengths(great to use, annoying to move), and sometimes in 20+foot segments (hard to move). Plus it is difficult to find someone who stocks fiberglass decking, but easy to find aluminum. Here is an example to inexpensive aluminum decking (be sure to CLAMP or otherwise secure the decking to the ladder on both sides). http://www.amazon.com/exec/obidos/ASIN/B00004RKCG/graniteisland-20 If you want some real flexibility buy 4 ea, 6 to 8 foot ladders, and 2 ea, 16 foot pieces of heavy duty decking. Set up the ladders/decking so that you have a 12-13 foot gap between the decking. Then add decking across the decking that is on the ladders to fill in the gap (5-6 pieces of 24" decking). Be sure to secure all of the decking so that it doesn't slide around and make you do a back flip off the decking and hurt yourself. If you set of a "floating platform" like this you will save a lot of sweat from clambering up and down ladders all day, but it will take you a bit longer to get started on the sweep as you will have to haul in 4-5 ladders, plus a half dozen pieces or so of decking. Also, you can just set up the third piece of decking instead of "filling the gap" and just slide it back and forth as you need it (do not slide it while you are on it). Stay away from decking that is longer than 16 feet as they can be extremely difficult to transport to the client site, and very difficult to set up in the area being checked (unless it is a construction area). http://www.amazon.com/exec/obidos/ASIN/B0000224NH/graniteisland-20 <-- Heavy duty 24" Wide Decking, Buy eight of these http://www.amazon.com/exec/obidos/ASIN/B00004RKDJ/graniteisland-20 <-- Heavy twin sided 8 foot ladders, Buy four of these *** As always, be extremely careful working on or around ladders or decking as it is easy to slip off, and if overloaded or misused the ladder can collapse and you could get seriously hurt. Also, try to always set these up using two or more people, and secure everything before standing on it. *** Also, keep in mind that the more ladders and decking you are hauling into the building the more an eavesdropper will think that you are just there to do some painting or carpentry work (I helps to have contrsuction related tools, clothes, and vehicles). But on the other hand, the more of a disturbance you create the more likely it is that the eavesdropper will think that "something is up", even though they may not know that your are there to do a sweep they may still deactivate their bug in the fear that a carpenter may find it. It's a Catch-22 so you will have to use your best judgement so as not to tip off the eavesdropper who you are trying to catch. You can also use a rolling work platform, but they are only practical to use in open construction environments, and virtually impossible to use in a typical office environment (unless you pull out all the furniture). Here is an example to the type of rolling platform I am referring to: http://www.amazon.com/exec/obidos/ASIN/B0000224M6/graniteisland-20 -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9599 From: James M. Atkinson Date: Mon Sep 6, 2004 6:28pm Subject: Cartel-busters free to use bugging devices http://www.timesonline.co.uk/ September 01, 2004 Cartel-busters free to use bugging devices By Lea Paterson JOHN VICKERS, chairman of the Office of Fair Trading, will have carte blanche to order the bugging of hotel rooms, private homes, vehicles and office premises during urgent price-rigging inquiries, it was disclosed yesterday. The OFTís latest code of practice reveals that Mr Vickers will not have to apply for permission before ordering intrusive and covert surveillance in the most pressing cartel-busting cases. Normally, the OFT chairman would seek prior approval from a surveillance commissioner before ordering the use of bugging devices or other covert surveillance. However, in urgent cases, Mr Vickers may order the placing of bugs or the entering of private property without first seeking the views of a surveillance commissioner. He would be required to clear his actions with the commissioner at the first opportunity. The OFTís new cartel-busting powers ≠ which came into force last year ≠ put the competition watchdog on the same standing as the intelligence services as far as covert surveillance is concerned. Other government agencies such as Customs and Excise also have the power to order phone bugging in investigations. Like the OFT, these agencies also have to clear their actions with the government-appointed surveillance commissioners, currently chaired by Sir Andrew Leggatt. Although the OFTís new powers have been welcomed by many in the competition world, civil liberties groups have criticised them as a ìsnoopersí charterî. Mr Vickers defended his organisationís new powers yesterday, saying they were essential to deal effectively with price-rigging cartels. ìCartels steal from consumers and fair-dealing businesses. Our enhanced powers will allow us to uncover cartels more effectively,î he said. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9600 From: James M. Atkinson Date: Mon Sep 6, 2004 6:26pm Subject: Bugging device found at Sinn FÈin aide's home http://212.2.162.45/news/story.asp?j=95859500&p=9586xx8x&n=95860109 -------------------------------------------------------------------------------- Ireland Online Bugging device found at Sinn FÈin aide's home 06/09/2004 - 16:03:27 A bugging device has been found at the home of one of Sinn FÈin President Gerry Adams' staff, it was claimed today. Republicans immediately blamed British agents who were "out to wreck" the Northern Ireland peace process. The listening equipment was allegedly found in the loft area of the womanës house in west Belfast. Sinn FÈin Assembly member Michael Ferguson said: ìThere must be 10 different parts to this. I have never seen anything as elaborate before. It was through the whole roof-space of this womanës home and was clearly put there by one of the intelligence gathering organisations. ìSo, 10 years after the anniversary of the IRA ceasefire why are these people still doing this? They are clearly not committed to any peace process.î Workmen discovered the device after being called out by the woman, who carries out voluntary work at Mr Adams offices. The West Belfast MP, who was in Westminster ahead of a critical new bid later this month to restore the Stormont power-sharing administration, would be raising the issue with the British government, Sinn FÈin insisted. ìGerry will be asking for an explanation," Mr Ferguson added. ìThatës without even dealing with the whole privacy matter for this woman. Her home and privacy has been invaded. This just shows the extent to which these people will go. ìThey have clearly got an agenda of their own and are not accountable to anyone.î The Northern Ireland Office refused to comment in response to Sinn FÈin's allegations. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9601 From: Date: Sun Sep 5, 2004 10:34pm Subject: Re: Analysis of discovered RF device Grammar Police and Anal a bit of an over reaction I think I make spelling and typing errors all the time but not so bad that it is almost illegible. I noted your reply though was just about perfect so you can do it. OK we all know the phonetic for T is TANGO but you missed the point, so to put it another way then what is a 'T' Best Regards Dave DEMTEC David McGauley [Non-text portions of this message have been removed] 9602 From: Steve Uhrig Date: Mon Sep 6, 2004 1:05pm Subject: Re: bunches of zeros On 5 Sep 2004 at 10:04, Sir Nobody in Particular , who eschews obfuscation, wrote: > When the number came up as 000 000 0000, I knew from reading posts > that this collector was using technology talked about on this site. Unlikely they were using a third party spoofing service or anything similar. If you own the switch, which large operations do, you can program anything you want to be transmitted on caller ID. Another member of this list works at a secure facility who owns their own switch, and when he calls me from work the CID comes up as all balls. I used to answer with a suppository remark, knowing it was him. Now it's not uncommon for telemarketers or others to ID as all balls. I still answer with a suppository remark. 'When you hear hoofbeats, think horses, not zebras.' Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9603 From: Date: Mon Sep 6, 2004 3:31pm Subject: RE: bunches of zeros Andy, Thank you for the response and taking time to chime in. I did sign my name, Evan, at the bottom and yes I am in the US. I realize this subject may be of little interest to those of you in this line of work. You raise valid points concerning the need for anonymity in doing your job correctly, or that of a licensed investigator. However, how does one transfer those same necessities to a bill collector? Certainly he wishes to remain anonymous and certainly he wants to trick me into ansering the phone thinking that he has a good lead to find his money. He is not a PI or law enforcement, but someone in a cubicle on the phone all day looking for dead-beats. As with a myriad of other laws, they must stop at some point; they must not extend to the general population or they will be abused as I believe in my case. I hardly feel hurt by this bill collectors actions, but I do differentiate between powers given to law enforcement and tactics used by crafty bill collectors. He was smart enough to use some box to change his ID. He wasn't smart enough to stay on the phone long enough for me to help him though. Thank you for giving me your thoughts Andy. Evan Los Angeles [Non-text portions of this message have been removed] 9604 From: A.Lizard Date: Mon Sep 6, 2004 4:37pm Subject: PC-based software-defined radio At 03:59 PM 9/6/04 +0000, you wrote: >Message: 7 > Date: Sun, 05 Sep 2004 22:20:20 -0400 > From: "James M. Atkinson" >Subject: Re: SDR analysis of covert transmissions > >I have own some SDR-14's, and have been quite pleased with them, but I wish >the factory would build them faster (do I can buy a few more). > >I use them as a two channel spectrum display on other radio's and >instruments. For example I hang one off the back on an R-8500 connected to >the 10.7 IF output for a fairly high performance spectrum display. I then >use the secondary "raw" channel of the SDR to view the output of the >detector after passing it through a bandpass filter so I can pick apart any >sub-carrier or hidden signals riding the main carrier. > >I would like to see them add pulse and phase demodulation capability, and >maybe squeeze in a some extra bandwidth. > > >-jma > > > > >At 03:14 PM 9/5/2004, Michael Puchol wrote: > > > SDR? > > > > > >SDR = Software Defined Radio. > > > >A good example of this is the SDR-14, which samples 0-30 MHz all in one go, > >and sends it to the PC via USB port. This means that ALL activity on this > >30MHz segment can be recorded at once, thus making it a very useful > >intercept and monitoring system. Combined with the IF output of another > >receiver, it can be used over a much wider spectrum. > > > >http://www.rfspace.com/sdr14.html > > > >The beauty of an SDR is that it can be completely changed via software, i.e. > >it's not a fixed RF design. Some will say this sacrifices certain aspects of > >a receiver, and I believe this is true. The flexibility of it can pay back > >what you lose in RF perfomance in some situations. > > > >Regards, > > > >Mikes >Message: 4 > Date: Sun, 5 Sep 2004 21:14:13 +0200 > From: "Michael Puchol" >Subject: Re: SDR analysis of covert transmissions > > > SDR? > > >SDR = Software Defined Radio. > >A good example of this is the SDR-14, which samples 0-30 MHz all in one go, >and sends it to the PC via USB port. This means that ALL activity on this >30MHz segment can be recorded at once, thus making it a very useful >intercept and monitoring system. Combined with the IF output of another >receiver, it can be used over a much wider spectrum. > >http://www.rfspace.com/sdr14.html > >The beauty of an SDR is that it can be completely changed via software, i.e. >it's not a fixed RF design. Some will say this sacrifices certain aspects of >a receiver, and I believe this is true. The flexibility of it can pay back >what you lose in RF perfomance in some situations. > >Regards, > >Mike -- member The Internet Society (ISOC), The HTML Writers Guild. "They need to wake up and smell the fire, it is their pants that are burning." hombresecreto, re: the famous SCO threat letter Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@g..., alizardx@y... PGP 8.0 key available by request or keyserver. Download PGP from: http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html ***Looking for INTELLIGENT new technology public policy alternatives?*** http://www.ecis.com/~alizard/technology.html 9605 From: J. Nolan Date: Mon Sep 6, 2004 4:10pm Subject: A Final Comment (I hope) On The Endless Al Ladder Issue Perhaps the greatest danger to Al ladder users is the fact that Aluminum is a lousy material for any structure subject to live or unpredictable loads. Unlike steel or fibreglass, Aluminun does not warn of impending failure by significantly deflecting before collapsing. Sure, Aluminum works well in carefully designed airframes where loads and stresses can be predicted, modeled and analyzed. But engineers cannot predict the load that some fool may place on a ladder. In case of Al, an overloaded ladder may suddenly buckle and collapse so quickly that anyone on it will go down with it. Jim 9606 From: Date: Mon Sep 6, 2004 8:53pm Subject: Re: What is a tango [ANSWER] Alas.... A Tango = A Bad Guy At 02:34 AM 9/6/2004, you wrote: >Grammar Police and Anal a bit of an over reaction I think >I make spelling and typing errors all the time but not so bad that it is >almost illegible. >I noted your reply though was just about perfect so you can do it. >OK we all know the phonetic for T is TANGO but you missed the point, so to >put it another way then what is a 'T' >Best Regards Dave > >DEMTEC >David McGauley 9607 From: Lou Novacheck Date: Mon Sep 6, 2004 10:36pm Subject: Re: What is a tango [ANSWER] Tango is Pentagonese [DoD-speak] for Terrorist. As in "Victor Charlie" for VC, Viet Cong. jamesworld@i... wrote:Alas.... A Tango = A Bad Guy At 02:34 AM 9/6/2004, you wrote: >Grammar Police and Anal a bit of an over reaction I think >I make spelling and typing errors all the time but not so bad that it is >almost illegible. >I noted your reply though was just about perfect so you can do it. >OK we all know the phonetic for T is TANGO but you missed the point, so to >put it another way then what is a 'T' >Best Regards Dave > >DEMTEC >David McGauley ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com [Non-text portions of this message have been removed] 9608 From: Edward Hirst Date: Mon Sep 6, 2004 11:02pm Subject: Re: Bugging device found at Sinn FÈ in aide's home Some pictures here should anyone want a closer look http://www.reuters.co.uk/newsPhotoPresentation.jhtml?type=topNews&imageID=10 01404117 http://news.bbc.co.uk/1/hi/northern_ireland/3631750.stm Edward Equinox On 7/9/04 12:26 am, "James M. Atkinson" wrote: > > > http://212.2.162.45/news/story.asp?j=95859500&p=9586xx8x&n=95860109 > > ------------------------------------------------------------------------------ > -- > > Ireland Online > > Bugging device found at Sinn FÈin aide's home > 06/09/2004 - 16:03:27 > > A bugging device has been found at the home of one of Sinn FÈin President > Gerry Adams' staff, it was claimed today. > > Republicans immediately blamed British agents who were "out to wreck" the > Northern Ireland peace process. > > The listening equipment was allegedly found in the loft area of the womanås > house in west Belfast. > > Sinn FÈin Assembly member Michael Ferguson said: ≥There must be 10 > different parts to this. I have never seen anything as elaborate before. It > was through the whole roof-space of this womanås home and was clearly put > there by one of the intelligence gathering organisations. > > ≥So, 10 years after the anniversary of the IRA ceasefire why are these > people still doing this? They are clearly not committed to any peace process.≤ > > Workmen discovered the device after being called out by the woman, who > carries out voluntary work at Mr Adams offices. > > The West Belfast MP, who was in Westminster ahead of a critical new bid > later this month to restore the Stormont power-sharing administration, > would be raising the issue with the British government, Sinn FÈin insisted. > > ≥Gerry will be asking for an explanation," Mr Ferguson added. ≥Thatås > without even dealing with the whole privacy matter for this woman. Her home > and privacy has been invaded. This just shows the extent to which these > people will go. > > ≥They have clearly got an agenda of their own and are not accountable to > anyone.≤ > > The Northern Ireland Office refused to comment in response to Sinn FÈin's > allegations. > > > > > > > ------------------------------------------------------------------------------ > ----------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ------------------------------------------------------------------------------ > ----------------------- > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ------------------------------------------------------------------------------ > ----------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ------------------------------------------------------------------------------ > ----------------------- > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9609 From: James M. Atkinson Date: Tue Sep 7, 2004 2:08am Subject: London 'bugged' N.Irish party worker London 'bugged' N.Irish party worker Mon 6 September, 2004 17:25 http://www.reuters.co.uk/newsArticle.jhtml?type=topNews&storyID=6160368 London 'bugged' N.Irish party worker Mon 6 September, 2004 17:25 BELFAST (Reuters) - Sinn Fein, political ally of the IRA, has accused British security forces in Northern Ireland of bugging the home of a peripheral member of party leader Gerry Adams' staff. As Adams and his deputy Martin McGuinness were meeting British officials in London, Sinn Fein held a news conference to display a "sophisticated bugging device" which the party said was found hidden in the unnamed woman's home. "Gerry Adams and our negotiators are in London trying to move the peace process on, and here we are in Belfast where we have the intelligence services operating with impunity, 10 years after the IRA ceasefire," said Sinn Fein's Michael Ferguson on Monday. "It's fairly clear their intentions aren't about promoting the peace process, and actions like this do anything but support and move the peace process on. It's ridiculous, it's shameful." A spokesman for London's Northern Ireland Office declined to comment on the allegations. The alleged find comes at a sensitive time for the Northern Ireland political process, which has been deadlocked since October 2002 when London suspended a power-sharing provincial government, set up under the 1998 Good Friday peace agreement, following allegations of IRA spying. Intensive talks aimed at reviving home rule and securing the full disarmament of the IRA will be held in England next week. The device displayed by Sinn Fein consisted of a number of battery packs, wires, a transmitter and what appeared to be a microphone. The party said the batteries and transmitter were found by workmen on Monday morning in the roofspace of a house in Andersonstown, an IRA heartland in west Belfast, with the microphone concealed in the living room ceiling. The woman who lives there is not a senior member of staff, the party said, but carries out a few hours voluntary work each week in Adams' constituency office. It is not the first time Sinn Fein has alleged it has been bugged by London. Former Northern Ireland Secretary Mo Mowlam has since admitted she authorised the bugging of a car used by Adams and McGuinness during talks in 1999. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9610 From: Date: Mon Sep 6, 2004 10:21pm Subject: Re: What is a tango [ANSWER] Thanks James At the risk of being controversial for the sake of it why not call them Terrorists instead of Tango's then we all know what is being discussed. There was a huge movement called the 'Campaign for Plain English' here in the UK, some years ago, to stop lawyers from trying to confuse us with Jargon [yes it was far worse than in the US] Are we in the Technical world going the same way? or is it possibly laziness, my original point re the Spell Check button i.e. easier to spell Tango than Terrorist maybe? Best Regards To All DEMTEC David McGauley UK [Non-text portions of this message have been removed] 9611 From: David Alexander Date: Tue Sep 7, 2004 3:51am Subject: RE: London 'bugged' N.Irish party worker So it's alright for them to have sympathisers working in the offices of the govt passing them information, but not OK for the govt to do the same to them. If they want sympathy they should look for it in a dictionary. Regards Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: 07 September 2004 08:09 To: TSCM-L Subject: [TSCM-L] London 'bugged' N.Irish party worker London 'bugged' N.Irish party worker Mon 6 September, 2004 17:25 http://www.reuters.co.uk/newsArticle.jhtml?type=topNews&storyID=6160368 London 'bugged' N.Irish party worker Mon 6 September, 2004 17:25 BELFAST (Reuters) - Sinn Fein, political ally of the IRA, has accused British security forces in Northern Ireland of bugging the home of a peripheral member of party leader Gerry Adams' staff. As Adams and his deputy Martin McGuinness were meeting British officials in London, Sinn Fein held a news conference to display a "sophisticated bugging device" which the party said was found hidden in the unnamed woman's home. "Gerry Adams and our negotiators are in London trying to move the peace process on, and here we are in Belfast where we have the intelligence services operating with impunity, 10 years after the IRA ceasefire," said Sinn Fein's Michael Ferguson on Monday. "It's fairly clear their intentions aren't about promoting the peace process, and actions like this do anything but support and move the peace process on. It's ridiculous, it's shameful." A spokesman for London's Northern Ireland Office declined to comment on the allegations. The alleged find comes at a sensitive time for the Northern Ireland political process, which has been deadlocked since October 2002 when London suspended a power-sharing provincial government, set up under the 1998 Good Friday peace agreement, following allegations of IRA spying. Intensive talks aimed at reviving home rule and securing the full disarmament of the IRA will be held in England next week. The device displayed by Sinn Fein consisted of a number of battery packs, wires, a transmitter and what appeared to be a microphone. The party said the batteries and transmitter were found by workmen on Monday morning in the roofspace of a house in Andersonstown, an IRA heartland in west Belfast, with the microphone concealed in the living room ceiling. The woman who lives there is not a senior member of staff, the party said, but carries out a few hours voluntary work each week in Adams' constituency office. It is not the first time Sinn Fein has alleged it has been bugged by London. Former Northern Ireland Secretary Mo Mowlam has since admitted she authorised the bugging of a car used by Adams and McGuinness during talks in 1999. ---------------------------------------------------------------------------- ------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9612 From: A Grudko Date: Tue Sep 7, 2004 8:36am Subject: RE: Ladder Issues -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] > ALWAYS buy the highest grade, heaviest duty of ladder possible, and buy one with the highest weight rating you can find. Been on the McDonalds diet have we James..... I must say I've never seen a fibreglass ladder. I recall in the 80s having a long 2 section ladder fly off the roof rack of my covert ops van at high speed on a highway because my assistant had not tied it down properly... I haven't done much ladder work in the past 7 years but in the days when I did a 4 section Ali fold up in the back of my car was all I needed (plus two ali 1 mtr extn tubes 'cos some of our phone poles were just a bit to high). --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.749 / Virus Database: 501 - Release Date: 2004/09/01 [Non-text portions of this message have been removed] 9613 From: Lou Novacheck Date: Tue Sep 7, 2004 4:05am Subject: RE: London 'bugged' N.Irish party worker Ahhh, the way I heard it is: Ya looking for sympathy? It's in the dictionary between shit and syphilis. David Alexander wrote: So it's alright for them to have sympathisers working in the offices of the govt passing them information, but not OK for the govt to do the same to them. If they want sympathy they should look for it in a dictionary. Regards Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: 07 September 2004 08:09 To: TSCM-L Subject: [TSCM-L] London 'bugged' N.Irish party worker London 'bugged' N.Irish party worker Mon 6 September, 2004 17:25 http://www.reuters.co.uk/newsArticle.jhtml?type=topNews&storyID=6160368 London 'bugged' N.Irish party worker Mon 6 September, 2004 17:25 BELFAST (Reuters) - Sinn Fein, political ally of the IRA, has accused British security forces in Northern Ireland of bugging the home of a peripheral member of party leader Gerry Adams' staff. As Adams and his deputy Martin McGuinness were meeting British officials in London, Sinn Fein held a news conference to display a "sophisticated bugging device" which the party said was found hidden in the unnamed woman's home. "Gerry Adams and our negotiators are in London trying to move the peace process on, and here we are in Belfast where we have the intelligence services operating with impunity, 10 years after the IRA ceasefire," said Sinn Fein's Michael Ferguson on Monday. "It's fairly clear their intentions aren't about promoting the peace process, and actions like this do anything but support and move the peace process on. It's ridiculous, it's shameful." A spokesman for London's Northern Ireland Office declined to comment on the allegations. The alleged find comes at a sensitive time for the Northern Ireland political process, which has been deadlocked since October 2002 when London suspended a power-sharing provincial government, set up under the 1998 Good Friday peace agreement, following allegations of IRA spying. Intensive talks aimed at reviving home rule and securing the full disarmament of the IRA will be held in England next week. The device displayed by Sinn Fein consisted of a number of battery packs, wires, a transmitter and what appeared to be a microphone. The party said the batteries and transmitter were found by workmen on Monday morning in the roofspace of a house in Andersonstown, an IRA heartland in west Belfast, with the microphone concealed in the living room ceiling. The woman who lives there is not a senior member of staff, the party said, but carries out a few hours voluntary work each week in Adams' constituency office. It is not the first time Sinn Fein has alleged it has been bugged by London. Former Northern Ireland Secretary Mo Mowlam has since admitted she authorised the bugging of a car used by Adams and McGuinness during talks in 1999. ---------------------------------------------------------------------------- ------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? Win 1 of 4,000 free domain names from Yahoo! Enter now. [Non-text portions of this message have been removed] 9614 From: Tech Sec Lab Date: Tue Sep 7, 2004 1:10pm Subject: RE: RE: London 'bugged' N.Irish party worker Well, considering I'm so sure that David and Dave (I won't even dignify his witty and glib email with a response...) are so up with the NI Security scene, may I just point out that there is a distinct difference between having sympathisers working in Government buildings and finding an audio feed wired into your home. When you find out that one of Labour's competing parties has wired your house up for sound then maybe you might be in a position to comment. In the meantime your message is as about on topic as a penguin party in the desert. -Ois PS. Blah blah views don't reflect the company etc etc. ******************************* Message: 18 Date: Tue, 7 Sep 2004 09:51:49 +0100 From: "David Alexander" Subject: RE: London 'bugged' N.Irish party worker So it's alright for them to have sympathisers working in the offices of the govt passing them information, but not OK for the govt to do the same to them. If they want sympathy they should look for it in a dictionary. Regards Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 9615 From: gkeenan Date: Tue Sep 7, 2004 3:00pm Subject: Re: What is a tango [ANSWER] Just for the hell of it, I don't have problems with things like this. If an acronym or abbreviation is 'unique' to a specific specialty, then I have a problem. But in this case, jeesh, the use of "Tango" is even used in TV programs and movies!! If anyone still doesn't know what "Tango" means - they really need to get out more; or maybe just turn on the TV. It helps if you have cable or satellite 'cause you'll find it used more in the movies on these media. It started out as a purely military term in most western militaries. No one really knows whose military coined that word, but all militaries use the phonetic alphabet in which "Tango" is the letter "T" in voice communications. And "T" is, of course, the first letter of the word "Terrorist" - ergo, Tango. No brain surgery needed. Instructions not included. I deal, on a daily basis, with current and former US/UK military personnel (mostly SAS/SBS) (and some Foreign Legion, ANZAC SpecFors, and others) in my work and we consistently use terms like this. The only problem we ever have is when UK and US acronyms are so different. I'm retired USN, by the way. And I've been working with SAS types since the mid-70s when I was based in Northern Ireland. So maybe that's an unfair advantage since I know most of the UK military acronyms and abbreviations as well as the US military - though it may surprise many to know that at least 75% of US/UK military terms, acronyms and abbreviations mean exactly the same thing! And believe it or not, it's not too difficult to decipher French, Italian, Spanish or other NATO country's acronyms either. If you have even a basic knowledge of any of those languages, it isn't difficult. OTAN, for instance, is French for NATO. So I really don't see what the big deal is. More to the point, I don't see why someone should be set upon just because they used words, phrases, etc. that someone else doesn't understand. Just ask him what he meant, for God's sake! No point in castigated the guy for reverting to type. I do it all the time. And if I don't understand what someone says, in person, on the phone, or email, I ask them. Because I know (from unfortunate past experience :-)) that I could end up looking like the complete idiot. Well, just my thoughts. Cheers! Jerry Gerard P. Keenan 16 E. Beech St. Central Islip, NY 11722 ph/fax (631) 582-1262 cell (516) 762-9602 secureops@o... gkeenan@s... www.gpkeenan.com www.cash4cashflows.com/gerardkeenan ----- Original Message ----- From: DEMTEC@A... To: TSCM-L@yahoogroups.com Sent: Tuesday, September 07, 2004 3:21 AM Subject: Re: [TSCM-L] What is a tango [ANSWER] Thanks James At the risk of being controversial for the sake of it why not call them Terrorists instead of Tango's then we all know what is being discussed. There was a huge movement called the 'Campaign for Plain English' here in the UK, some years ago, to stop lawyers from trying to confuse us with Jargon [yes it was far worse than in the US] Are we in the Technical world going the same way? or is it possibly laziness, my original point re the Spell Check button i.e. easier to spell Tango than Terrorist maybe? Best Regards To All DEMTEC David McGauley UK [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 9616 From: Jason Dibley Date: Tue Sep 7, 2004 4:44pm Subject: RE: What is a tango [ANSWER] Tango is also short for: Target (in the UK covert surveillance speak) Tracker (in UK law enforcement speak) Terrorist (in worldwide CTU speak) what ever takes your fancy JMD -----Original Message----- From: Lou Novacheck [mailto:wizardtradingcompany@y...] Sent: 07 September 2004 04:36 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] What is a tango [ANSWER] Tango is Pentagonese [DoD-speak] for Terrorist. As in "Victor Charlie" for VC, Viet Cong. jamesworld@i... wrote:Alas.... A Tango = A Bad Guy At 02:34 AM 9/6/2004, you wrote: >Grammar Police and Anal a bit of an over reaction I think >I make spelling and typing errors all the time but not so bad that it is >almost illegible. >I noted your reply though was just about perfect so you can do it. >OK we all know the phonetic for T is TANGO but you missed the point, so to >put it another way then what is a 'T' >Best Regards Dave > >DEMTEC >David McGauley ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9617 From: Date: Tue Sep 7, 2004 8:57am Subject: Re: What is a tango [ANSWER] As another list member identified, tango also can mean terrorist. To be full circle; a terrorist is a bad guy. The reason is hierarchically simple. In an anology: If you are sick- you have a bug After a few tests (laboratory or comparing observations against a know list of symptoms) you could determine that it is a bacteria After further tests you may be able to determine the bacteria is Vibrio cholerae. It would be inaccurate to say that when you are first sick, you have a virus. To say a terrorist planted a bug would be a definitive statement. It might be a jealous lover, co-worker, etc. They are not terrorists. Until you know specifically who and/or what they are, a generic description is better. "Tango" fits the bill. Average Joe does not. It's also easier to convey over a poor communications link. It's part of the phonetic alphabet that most ppl recognize. Cheers, -James At 02:21 AM 9/7/2004, you wrote: >Thanks James >At the risk of being controversial for the sake of it > why not call them Terrorists instead of Tango's then we all know what is >being discussed. >There was a huge movement called the 'Campaign for Plain English' here in >the UK, some years ago, to stop lawyers from trying to confuse us with >Jargon >[yes it was far worse than in the US] >Are we in the Technical world going the same way? or is it possibly >laziness, my original point re the Spell Check button i.e. easier to spell >Tango than >Terrorist maybe? >Best Regards To All > >DEMTEC >David McGauley UK > 9618 From: Mitch D Date: Wed Sep 8, 2004 0:22am Subject: Digital Audio Corp Equipment If any members have used any of the DAC (Digital Audio Corp) acoustic gear, please post any opinions or experiences on the list or contact me off list if you prefer Thanks Mitch Davis TSCM/Special Operations Group Inc. 20 Music Square West, Suite 208 Nashville, TN. 37203 Mail:MitchD@t... Website www.tscmusa.com (615) 251 0441 Fax (615) 523 0300 "Maintaining a higher degree of excellence " ********************************* Investigator Tools : www.covertworx.com __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 9619 From: Date: Tue Sep 7, 2004 9:15pm Subject: Re: What is a tango [ANSWER] Yes, nicely put Jerry but many of us out here do not have your obviously huge experience in the world of military. You say I should get out more but then also suggest that I should watch more TV and movies? You have also missed the point which was that sometimes a posting is submitted where the spelling makes part of it almost illegible. I also make the point that often so much Jargon is used in certain postings that to many of us who lack experience in certain areas i.e. such as your massive military expertise, that the information is worthless. i.e. if you were to describe certain military hardware this way I suspect most of us out here would be totally lost I used the word TANGO only as a simple example of this. After all this group is all about the clear exchange of information. You used phrases like Set upon and Castigated in your email -- maybe just a little over the top Jerry To finish this discussion on a much lighter note Here in the UK many folk, including myself, use rhyming slang in everyday conversation this is a very light-hearted form of Jargon which originated in the east end of London and can be good fun. If I used this type of language on this site I would soon be asked to explain myself With your years of contact with British forces Jerry, can you decipher the following [without phoning a friend or the internet] 'Cor look at the boat race and Hampstead Heath on that ham shanks trouble and strife' If I have offended anybody on this site then I apologise but I think I have put my point across now I intend to drop it and get back to learning from the many of our highly experienced members. Thankyou for listening I will post no more on the subject Best Regards to All Dave DEMTEC David McGauley From: David Alexander Date: Fri Sep 7, 2001 11:27am Subject: re: MI5 offering information to business >I really have no idea of what is going on in MI5's heads' heads, to be >redundant...if the choose to go this way, they could end up with >multi-million dollar lawsuits thrown at them, like the recent P&G scandal. > >Besides, I believe it is a terrible compromise of internal security for such >an intelligence agency to interact with the private sector on this level. If you read the report closely, they are not offering Competitive Intelligence in the sense of the P&G story, but background information on organisations. For example, the last time I had any reliable information in this area, much of the business planning for Russia had to include paying 5% to the Russian mafia as protection money. Some companies may be fronts for financial scams or money laundering or drug-running, etc. I think a large organization might like to know that before they did business and then found themselves spread all over the papers. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 3663 From: Marcelrf-iDEN Mobile Date: Fri Sep 7, 2001 0:18pm Subject: [Fwd: CFX-II, Computer Forensic Tool Exposition] Subject: CFX-II, Computer Forensic Tool Exposition CFX-II, Computer Forensic Tool Exposition Sponsored by NLECTC Northeast and the Air Force Research Laboratory, Information Directorate ******************************************************* Date: November 15-16, 2001 Place: SUNY, Institute of Technology, Utica/Rome, NY Registration: Call NLECTC-Northeast at 888-338-0584 Sponsored by NLECTC-Northeast and the Air Force Research Laboratory, Information Directorate, CFX-II is an interactive computer forensic tool exposition for the defense and law enforcement communities. CFX-II will feature presentations and discussions by cybercrime experts from the government, academic, and private sectors and a number of high tech demonstrations of the latest in computer forensic technology. A live webcast is also planned for CFX-II. The web address will be announced shortly. For more information, please contact Cindy Akins of NLECTC-Northeast at 888-338-0584 or cynthia.akins@r.... Secondary contact: Bill Wolf, AFRL/IFGB, at 315-330- 2278 or wolfw@r.... Invited Organizations: * Air Force Research Lab, Information Directorate * DoD Computer Forensics Laboratory * National Institute of Justice * U.S. Secret Service * Federal Bureau of Investigation * DoD Defense Criminal Investigative Service * Defense Advanced Research Projects Agency * Offices of the United States Attorney * NY State District Attorney Association * Air Force Computer Emergency Response Team * Defense Information Systems Agency * Air Force Information Warfare Center * Air Intelligence Agency * U.S. Space Command Participant Tool Categories: * Forensic Analysis & Data Collection * Integrated Media and Analysis * Synthesizing of Forensic Information * Steganography Detection and Recovery 3664 From: James M. Atkinson Date: Fri Sep 7, 2001 1:32pm Subject: Electronic Surveillance: Is It '1984' in the Workplace? http://www.cnn.com/TRANSCRIPTS/0109/06/gal.00.html GREENFIELD AT LARGE Electronic Surveillance: Is It '1984' in the Workplace? Aired September 6, 2001 - 22:30 ET THIS IS A RUSH TRANSCRIPT. THIS COPY MAY NOT BE IN ITS FINAL FORM AND MAY BE UPDATED. JEFF GREENFIELD, HOST: Tonight, was your boss looking over your shoulder at work today? More and more Americans work under electronic surveillance: E-mail, Web browsing, the bosses can see it all. But isn't it their right to do so? Welcome to 1984 Incorporated tonight on GREENFIELD AT LARGE. You may have heard that the Justice Department today said it would not seek the breakup of Microsoft, but next week comes a judicial decision that could have a more far-reaching impact on how computers affect your life -- at least, your working life. The U.S. Judicial Conference is going to decide whether court employees, including federal judges, will be subject to monitoring of their computer use. In other words, their Web use will be tracked, their e-mail read. If you think this doesn't affect you, consider this: If federal judges vote to live under this scrutiny, are they likely to rule that average Americans don't have to as well? And that's a question that courts have been dealing with, as more and more companies use workplace computers to track what their employees are doing. Here's CNN's Garrick Utley. (BEGIN VIDEOTAPE) GARRICK UTLEY, CNN CORRESPONDENT (voice-over): It was fiction, wasn't it? That scene from "1984," with Big Brother hovering over the workplace. But at least you knew that he was always watching you. Today at work, we don't always know who or what inside the computer is watching our every move on the Internet and reading our e- mail. What we do know is that an estimated 35 percent of the online work force in the United States is being monitored by employers. That's 14 million workers watched by software that is cheap to install and easy to use. (on camera): And it's legal. How's that? Your boss, of course, doesn't have the right to open your mail that comes in envelopes or listen into your telephone conversations without letting you know. So, whatever happened to your right to privacy in there? (voice-over): The answer is back in the Reagan years, when the president signed the Electronic Communications Privacy Act of 1986, as passed by Congress, which allowed the monitoring of an employee working on the employer's computer system. Which led to something that Ronda Wieben, an insurance claims adjuster, would never have thought of back in 1986. She was considered a model employee until her bosses discovered she had uploaded travel and landscaping software onto her company-issued laptop. She was fired. RONDA WIEBEN, INSURANCE CLAIMS ADJUSTER: If it was that they needed to make an example of someone that no one ever thought could be fired to really scare people, I think that they achieved their goal. UTLEY (on camera): It is, of course, easy to beat up on bosses who act like big brothers. But are they the villains or the victims? (voice-over): In the past two years, major corporations, such as Xerox and Dow Chemical, have fired scores of employees for spending time on pornography and shopping sites. The "New York Times" fired 22 employees in its pension office for sending offensive e-mails. Smaller employers too, such as Scott Leibowitz, have to worry about company liability for what employees are doing online, as well as workers who are not working. He monitored them. SCOTT LEIBOWITZ, SMALL BUSINESS OWNER: They were spending between 50 to 70 percent of their day on sites that were not relating to our business. UTLEY: And then, there was the secret government monitoring of IRS workers. It found that 51 percent of their time online was spent in chat rooms, sending personal e-mail or checking their investments, rather than checking your tax return. (END VIDEOTAPE) GREENFIELD: CNN's Garrick Utley. Joining me now from Los Angeles, Judge Alex Kozinski of the 9th U.S. Circuit Court of Appeals. Judge Kozinski has made news by publicly and vigorously opposing the proposed rules for overseeing judges and their employees. Judge, your public comments and your writings have placed great stress on the quality of the work force that you deal with. Is this a case of special pleading? Is your argument that the government shouldn't do this, because of your -- the kind of people who work with you and around you, or is it a more general argument? JUDGE ALEX KOZINSKI, 9TH CIRCUIT COURT OF APPEALS: Well, Jeff, first of all before I speak, I should explain to you that my views are entirely my own. I don't speak for my court or for the federal judiciary. That aside, the point I made in my "Wall Street Journal" op-ed related to our work force in our capacity as employers. I do believe that the federal judiciary is blessed in having the finest work force, the finest work force in the country, loyal and dedicated employees. And in our capacity as employers, we ought to treat them with respect and dignity. I want to be careful not to speak to other employers or other issues or other agencies, because cases like that could very well come before the courts, and I certainly don't want to prejudge them. GREENFIELD: But the broader point I would think is this, that, as you know -- for instance, Garrick tells us one survey of IRS employees showed that more than half of online use was not work- related, and the capacity of federal government workers or government workers, to occasionally goof off has reached the level of an old cliche. My question is, doesn't the government have the right to say to us taxpayers, you have the right to an honest day's work for an honest day's pay and this is how we are check the employees to make sure it happens? KOZINSKI: Well, yes and no. I think we certainly have a right to demand an honest day's work from employees. We can demand that they not goof off, they spend time on their job. But you don't need access to the Web to goof off. You can read newspapers, or you can read the comics or trashy novels, or spend time chatting with your fellow employees. GREENFIELD: Right, but of course -- I'm sorry -- the point -- excuse me, but the point is if you are on a computer, it is a lot harder to tell whether you are accessing important information or chatting up a friend in England? KOZINSKI: I don't have any difficulty telling the productivity of people who work for me. I think most managers can set standards, and if those standards are met, it seems to me that is what the employer is entitled to. The question of what's permissible, so long as employer sets clear standards, and how you detect it are very separate questions. You can very well tell employees there are certain kinds of Web sites you shouldn't access, or you should never do it except at lunch time or breaks, on your own time. But that's a very different question from saying, we are going to snoop on everything that you do on your computer. Your letters, e- mails to your mother, prescriptions you might order online, or let's say on the telephone, speaking to your doctor, or anything like that. GREENFIELD: OK. Let me, if I may, bring a couple more voices into this discussion. Jeffrey Rosen joins us from Washington. He has been covering this exact issue as legal affairs editor of "The New Republic," and has written a book on privacy, "The Unwanted Gaze." Here with me in New York, Eric Greenberg, director of management studies for the American Management Association. It helps member companies develop policies on privacy and monitoring. Mr. Greenberg, your organization's studies shows that something more than three-fourth of employers monitor their workers one way or other. ERIC ROLFE GREENBERG, AMERICAN MANAGEMENT ASSOCIATION: Sixty percent of them check Internet connections, almost half check e-mail. Well, they are worried about three things, they are worried productivity, the -- how much time you are spending doing your job, how many -- how much time you're spending goofing off. Exactly. They are worried about security, opening up the system to viruses, opening it up to hackers or something like that, but by far the greatest concern has to do with liability, specifically liability against a charge of allowing a hostile workplace environment in a sexual harassment lawsuit. They are laser-like focused on that, almost to the exclusion of things that they should be more worried about, but aren't. GREENFIELD: All right. Just very quickly, though, isn't that, as the Church Lady used to say, "convenient?" I mean, if there was no sexual harassment law, wouldn't they still want to know if their employees were goofing off? GREENBERG: They would have an easier time judging the productivity. As the judge says, there are other measures that you can take, but the only way that you can tell whether or not Internet connections are going to legitimate, business-related sites is by checking those connections. GREENFIELD: Jeffrey Rosen, let me spell the case out for you. I want a job, I go to a private employer, assuming that the employer is straight with me, and says, look, these are the rules you are playing with, we are going to check your computer, we are going to check your phone use. If I don't like it, I don't have to work there. What's the problem? JEFFREY ROSEN, LEGAL AFFAIRS EDITOR, "THE NEW REPUBLIC": The question is whether you can really consent under questions -- conditions that are this coercive. Look, let's face facts. Nowadays, we live on a computer. The rules have allowed employers to check e-mail sent from home over company computers, and the idea that in an information economy -- we are not talking about making widgets here -- you can really expect someone to be surveilled 24 hours a day, and be productive, and be creative, and do the kind of job that we need to succeed today is nonsense. The idea of efficiency is really a convenient distraction from the fact that it's not human to live in such a world. And the fact that the judges are finally forced to confront the condition that some of their decisions have inadvertently created -- made -- it's a case of better late than never. GREENFIELD: I want to get back to that in the next segment, but do you, Jeffrey, take seriously the concerns that Eric talked about, that the companies say, look, you know, if somebody pops up with an offensive sexual graphic on the computer and it happens enough, we could be out a whole lot of money. ROSEN: Absolutely so, but this is a problem in sexual harassment law itself. It's unfortunate that the law has evolved in a way that forces employers to monitor stray jokes. By themselves, these couldn't be actionable, but taken together they might create a hostile environment. This is a bad thing. This is a fault of the law, and this is an opportunity for us to try to refine it, so the employers are not forced out of fear of liability to really monitor far more speech and conduct than anyone thinks the law should permit. GREENFIELD: Judge, when you hear Jeffrey Rosen, do you think that maybe your own concern that has developed over privacy invasions has made you rethink how the law should apply to private employers? KOZINSKI: Well, I was fortunate enough to review professor Rosen's book for "The New York Times," and it really opened my eyes to this problem. It's really an excellent book. I really recommend it very highly to anybody out there who is interested in the issue. I do think that there is a tendency for us to use technology to its limits. Technology is a very powerful tool, and the tendency is to say, gee, if we can do it, we must do it. And there is a very big difference between the things that we can technologically do, and things that are morally right to do. We could install cameras in bathrooms to make sure employees are not stealing paper clips. The bathrooms are owned by the employer. They pay the rent they pay for the water. But it wouldn't be right. It would not be an appropriate means of dealing with a problem. GREENFIELD: I gotcha. We are going to continue this in a moment. And later we'll talk with Salman Rushdie, whose work led to a real loss of privacy. Please stay with us. (COMMERCIAL BREAK) GREENFIELD: We're talking about workplace privacy, or what is left of it, with three people who have a lot to say on the subject. Jeffrey Rosen, legal affairs editor for the "New Republic." Eric Rolfe Greenberg is from the American Management Association, which supports the monitoring of workers' computer usage, and from Los Angeles, Judge Alex Kozinski of the ninth circuit court of appeals. Mr. Greenberg, let's pick up on a point Jeffrey made. I mean we are not talking sweatshops, perhaps, but you know, but nobody checks on me if I take some time e-mail a friend or I call and try arrange, if there is a health problem in my family. But there are a lot of people for whom that computer and that phone, even at work, working moms, a great majority of moms work, isn't there a problem with creating a workplace in which you never quite know when the guy is looking over your shoulder? GREENBERG: You should know. And one of the things that disturbed me when I read the judge's article in "The Wall Street Journal," on Tuesday was that the pilot program that they were undergoing was surreptitious. No one told the employees that they were subject to this (UNINTELLIGIBLE). This is contrary to regular practice. Ninety percent of the companies engage in any of these activities tell their employees that they are doing it, which is good management practice. It is what we urge. GREENFIELD: But it is a little cold comfort it seems to me. If you are somebody without -- without a lot of clout in the workplace and you know, you've got a crisis, your kid is sick, there is a day care problem, you are going to need, if you have any instinct, you know, paternal, maternal instinct, to say, you know, I'm just going to have to take some time and that is the day you know that at some point your employers are going to check you, and it turns out that day and they say, what you were doing with 45 minutes using our computer to arrange this? GREENBERG: But the answers are the same as they would have been if you were spending 45 minutes on the phone. There are longing policies about personal use of the phone and there is a lot of leeway given. People understand the necessity of making these kinds of contacts. Two thirds of companies allow personal use of the computer for Internet activity. They just want to make sure that you are not spending too much time on it and not doing your work. They want to make sure you are not opening the system up to hackers and viruses and most especially they want to make sure that there isn't going to come back and bite them because you are connecting with sites that are exposing people to stuff they don't want to see. GREENFIELD: Jeffrey Rosen, you made a point earlier, and I want to focus in on it. Have the courts, in effect, has the government, in effect, created this kind of weird situation? There was a point at which I think under our law now you can test drug use, you can test students applying for loans, but you can't test -- what -- judges, I guess? Have they in effect wrapped a cloak of protection around them they are not willing to give the broader public? ROSEN: It is an unfortunate irony that it is in cases where their own privacy is at stake that judges are most concerned about privacy. But, it was relatively recent that this law has evolved. And it is unfortunate that merely by warning us that we may be monitored, the courts say employers can lower our expectations of privacy in a way that gives them all the more discretion to monitor. So, as you suggested, this is a Pyrrhic victory. It wouldn't be a good thing merely to warn people, because we really don't have a choice in the age ofthe Internet not to use the Internet. It is like saying, if you don't want to be photographed in public, as people are increasingly in Britain, where I have just come back from, you can choose not to go on the sidewalk. It is not an option. We just have to make a political choice in this country about what kind of society it is civilized to live it. GREENBERG: You do you have an option as to when and where you get on the Net and when and where you use e-mail. It is easy to turn this into a big brother story, but it is not really a big brother story. You can escape big brother. You couldn't escape big brother. You can escape corporate oversight simply going across the street to a cybercafe, down the street to a public library or doing your personal stuff at home. GREENFIELD: I just want to know, I'm not asking you to prejudge, pardon the pun, but if a movement grows to say to employees, you can't monitor your employees's workplace use, isn't there a catch-22? You can't monitor the use but you can be held legally responsible for the abuse of it in case of a sexual harassment case? KOZINSKI: Actually the catch-22 goes either way. If we say you can monitor, then you must monitor because that becomes part of your responsibility. If we say you can't, then you really cannot then hold the employer responsible for failing to monitor. But I want to answer something that Eric mentioned. He said oh, it is no big deal to have somebody listening in and you can explain you were talking about your -- to your child's doctor. Well excuse me, I don't think you should be required to have to worry about somebody listening in to the conversation between -- on telephone -- between yourself and your child's doctor. It is nobody's business. And this policy that is being proposed for the federal judiciary which applies now to much of the federal government, applies to telephones as well. Itseems to me that we spend a lot of our time at work, and so long as employees are productive, so long as they spend their time at work, doing their employer's job, they should not have to worry when they use a telephone, or the computer, to perform a little bit of personal business to keep their life going while mother and father are at work. GREENFIELD: Appreciate that. I know there is much more to be said about this and I hope we are going to get a chance to do it, but we are out of time. Of course we gave Judge Alex Kozinski the last word because he is a federal judge. We also want to thank Jeffrey Rosen of "The New Republic," we've got his book plugged by that federal judge, I am envious, and Eric Greenberg of the American Management Association. ------------------------------------------------------------------------ -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3665 From: Date: Fri Sep 7, 2001 0:08pm Subject: Judge to Hear Bookmaker Case Judge to Hear Bookmaker Case By JEFFREY GOLD .c The Associated Press NEWARK, N.J. (AP) - While scoffing at claims the information is confidential, a federal judge on Friday agreed to a private hearing on the FBI's secret bugging device used against an accused bookmaker. U.S. District Judge Nicholas H. Politan said the closed session, excluding the defense, would allow him to determine if the government's ``key logger system'' is truly secret and if disclosure would threaten national security. The key logger, used to crack an encryption program on Nicodemo S. Scarfo Jr.'s computer, has brought a routine gambling case to the forefront of concerns over computer privacy and government intrusion. ``This situation has not arisen in any other case,'' said David L. Sobel, general counsel of the Washington-based Electronic Privacy Information Center. The government, to date, has only provided vague information about a technique that could become a common surveillance method, said Sobel, who attended Friday's hearing. His group has provided information to the defense team. The Scarfo defense maintains they need all the details to determine if the bugging was illegal, but prosecutors say publicizing how the device works would damage existing probes of ``foreign intelligence agents'' and endanger U.S. agents' lives. The judge was skeptical of a sworn statement by FBI Assistant Director Neil J. Gallagher asserting ``that the characteristics of the KLS technique are such that it is, and has been, appropriately classified.'' Gallagher, head of the FBI's national security division, added that ``unauthorized disclosure of the specific details of the KLS technique could reasonably be expected to cause serious damage to the national security of the United States.'' Addressing Gallagher's affidavit, Politan declared, ``It's gobbledygook.'' Scarfo, 36, and Frank Paolercio, 32, are accused of loansharking and running a gambling racket in northern New Jersey. Scarfo's father, Nicodemo Scarfo, is serving a life term for running the Philadelphia-Atlantic City mob in the 1980s. AP-NY-09-07-01 1704EDT 3666 From: James M. Atkinson Date: Sat Sep 8, 2001 2:35pm Subject: P&G's Covert Operation An intelligence-gathering campaign against Unilever went way too far. P&G's Covert Operation An intelligence-gathering campaign against Unilever went way too far. Andy Serwer 09/17/2001 Fortune Magazine Time Inc. In April 1999, Procter & Gamble Chairman John Pepper gave the key- note address at a meeting in Montreal of the Society of Competitive Intelligence Professionals, a trade association for, well, corporate spies. "I can't imagine a more appropriate time to be talking about competitive intelligence [industry jargon for spying] than right now," Pepper began. "For I can't imagine a time in history when the competencies, the skills, and the knowledge of the men and women in competitive intelligence are more needed and more relevant to a company." Little did Pepper realize how ironic his words would soon sound. Two years later, in the early spring of this year, he was informed of a major spying campaign undertaken by his own company that had spun wildly out of control. Corporate spying is something of a growth industry these days (see "The Prying Game" in this issue), and P&G has long engaged in what it calls "competitive analysis," but after hearing the details of this particular operation, Pepper was apparently shocked. P&G immediately stopped the campaign and fired three managers responsible for hiring the corporate spies. And then it did something almost unheard of in corporate America: It blew the whistle on itself. P&G fessed up to the primary target of the operation, Anglo-Dutch giant Unilever. At press time the two consumer products giants were discussing terms of a settlement. What exactly did P&G do? We don't know all the details yet (FORTUNE first revealed the spy operation on the fortune.com Website on Aug. 30), but here's what we know as of our deadline. Competitive- analysis executives at P&G hired a general contractor, who in turn hired perhaps as many as a dozen subcontractors to spy on its competitors in the hair-care business--particularly Unilever, but other companies as well. The operation was run out of a safe house, called the "Ranch," which sources say was in P&G's hometown of Cincinnati. At least one of the competitive-intelligence firms hired by P&G engaged in dumpster diving in an attempt to gain information from Unilever. A source says that in their dumpster-diving pursuits, these operatives trespassed at Unilever's hair-care headquarters, an office building at 325 North Wells in Chicago. The source also says that these corporate spies, whom P&G now describes as rogue operators, misrepresented themselves to Unilever employees, suggesting they were market analysts or maybe even journalists, God forbid, in an attempt to gather information. (P&G confirms the dumpster diving, but it denies that misrepresentation took place.) The dirty tricks were intended to glean competitive data on Unilever's hair-care products--which include Salon Selectives, Finesse, Thermasilk, and Helene Curtis--in order to bolster P&G's own brands, which include Pantene, Head & Shoulders, and Pert. Apparently the operation was a big success: P&G got its mitts on just about every iota of info there was to be had about Unilever's brands. New- product rollouts. (Top-secret lemon-scented Finesse, anyone?) Selling prices. Margins. You name it. And while P&G insists that the company broke no laws, a spokeswoman says that activities undertaken by its hired operatives "violated our strict guidelines regarding our business policies." P&G informed Unilever about the transgressions in April, and the two companies have been trying to negotiate a settlement ever since. At our deadline, a settlement was within reach. According to someone close to the negotiations, the following points were being hashed out: (1) P&G would reassign several key personnel in its hair-care business to other positions in the company (hello, Pringles!). (2) P&G would be restricted in its market activity in the hair-care business. Meaning, for instance, it could not launch certain new products until the end of 2003. (3) An independent, third-party investigator would be appointed to review P&G's entire business plan in this area and would report back to Unilever to ensure that any trade secrets stolen from Unilever would not be used. (4) P&G would pay Unilever tens of millions in cash. (If no settlement is reached, of course, Unilever could decide to take P&G to court.) Sounds pretty onerous, doesn't it? Does that mean P&G's campaign was so full of dirty tricks that it has no choice but to simply roll over? Perhaps, but it could also be that Pepper is in full "do the right thing" mode--that he's trying to take a page out of Johnson & Johnson's forthright handling of the Tylenol case, particularly since P&G has a long history of playing the hardest of competitive hardball. If P&G thought it would receive any special dispensation from Unilever by telling on itself, though, the boys from Cincinnati have been sorely mistaken. "It was like confessing to murder and hoping to get manslaughter instead of homicide," says one source close to the story. "It just doesn't always work out that way." A source says the spying against Unilever and other competitors began last fall and continued into this year. The operation was halted in March or April only after senior P&G officials, including Pepper, learned about it. Procter & Gamble confirms that it fired three P&G employees "who were directly involved in the project." Susan Steinhardt, formerly P&G's director of corporate competitive analysis, acknowledged that she recently left the company but declined to say whether she was one of the three who were fired. (At the 1999 spy conference in Montreal, Steinhardt did a Q&A with Pepper. It can be read at http://www.scip.org/news/cimagazine_article.asp?id=215 .) After Pepper and senior managers discovered the spying operation, P&G executives wrote a letter to Unilever outlining the transgressions. Pepper himself called Unilever Co-Chairman Niall FitzGerald in an effort to settle the matter. Sources say that one of the subcontractors that investigated Unilever was Phoenix Consulting Group of Huntsville, Ala. Phoenix was founded and is staffed by former government intelligence officers. Its president, John A. Nolan III, says that he and others in his company served in the Phoenix Program, a covert operation in Vietnam. When asked whether he was hired by P&G, did any work on behalf of P&G, or had any connection to this operation, Nolan declined to comment. While corporate spying is not unusual, informing the target of the spying is. Over the past five months, P&G has invited Unilever officials to interview P&G managers as well as the operatives themselves. But one source says that Unilever has been unhappy about the level of P&G's cooperation, and that is why the negotiations have dragged on so long. The source adds that P&G at first provided Unilever with two documents regarding its spying activities and then, after further prodding, came up with over 50 additional documents. Unilever has completed its review only within the past few days. On Tuesday, Aug. 28, a source says, P&G's Pepper flew to London with an offer to settle the matter. At that point a deadline was set for the close of business Friday, Aug. 31, but no settlement was reached, and the deadline was pushed back to Tuesday, Sept. 4. "None of the information that was gathered in this operation was ever used by P&G or will ever be used," a P&G spokeswoman said. "It was an unfortunate situation. We certainly regret that it occurred. We have acted responsibly and promptly to protect Unilever's interests." Of course, all this leaves unanswered one burning question: What kind of shampoo should a person use after an evening of dumpster diving? Quote: Sources say the operation was run out of a safe house in Cincinnati called the "Ranch." COLOR PHOTO: PHOTOGRAPH BY CHRIS VOLK Spies hired by P&G went dumpster diving at Unilever's hair-care headquarters at 325 North Wells in Chicago. COLOR PHOTO: FITZGERALD: DYLAN MARTINEZ--REUTERS/GETTY IMAGES Unilever's FitzGerald (left) wasn't mollified by a plea from P&G's Pepper. COLOR PHOTO: PEPPER: MARK LYONS--AP [See caption above] Copyright © 2000 Dow Jones & Company, Inc. All rights reserved. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3667 From: James M. Atkinson Date: Sat Sep 8, 2001 3:17pm Subject: DIA VACANCY ANNOUNCEMENT: 01-002445-CPB VACANCY ANNOUNCEMENT: 01-002445-CPB AVAILABLE POSITION: Security Officer GG-0080-13 (two positions) SALARY RANGE: ($63,211-$82,180) (includes 10.23% locality pay) OFFICE: Directorate for Administration, Counterintelligence and Security Activity, Security Operations Division, Force Protection and Tech Security Branch LOCATION: (DAC-2D), Clarendon, Arlington, Virginia OPENING DATE: 1 June 2001 CLOSING DATE: 22 June 2001 AREA OF CONSIDERATION: Open All Sources PERSONNEL REPRESENTATIVE: Cheryl P. Boudreau COMMERCIAL TELEPHONE: (202)231-8036/8442/4639/DSN: 428-8036/8442/4639 ------------------------------------------------------------------------ DUTIES: Serves as a Technical Surveillance Countermeasures (TSCM) Special Agent in direct support to protect DIA personnel, facilities, information and operations worldwide from harm or compromise from foreign intelligence service, terrorist or criminal organizations clandestine technical surveillance targeting and attacks. Assesses the intention of foreign intelligence and terrorist intentions specifically related to DIA facilities worldwide, making recommendations to Agency management on possible courses of action. Plans, coordinates and conducts on-site technical investigations, TSCM operations and activities and technical assessments. Provides technical security advice and assistance in construction security, counterintelligence force protection services and support. Prepares reports, analyzes and evaluates concepts and proposals and develops innovative technical security solutions. Periodically augments the Department of State technical security survey teams as the DoD representative. RELOCATION EXPENSES (PCS) NOT AUTHORIZED. FREQUENT WORLDWIDE TRAVEL, SOMETIMES FOR EXTENDED PERIODS, IS REQUIRED. OVERTIME, ON CALL, WEEKEND DUTY REQUIRED. APPLICATIONS MUST BE RECEIVED IN THE CIVILIAN PERSONNEL DIVISION BY THE CLOSING DATE STATED ON THE VACANCY ANNOUNCEMENT. CURRENT FEDERAL EMPLOYEES MUST ALSO SUBMIT A COPY OF THE SF 50, NOTIFICATION OF PERSONNEL ACTION THAT DOCUMENTS THEIR APPOINTMENT TO OR PROMOTION TO THE HIGHEST GRADE HELD. MINIMUM QUALIFICATIONS REQUIREMENTS: DIA qualifications standards require 1 year of specialized experience at a level of difficulty and responsibility comparable to that of the next lower grade in the federal service in order to meet the minimum eligibility requirements. Specialized experience is experience in administrative, supervisory, managerial, professional or technical work that has equipped the applicant with the knowledge, skills and abilities to successfully perform the duties of the position. SPECIFIC JOB-RELATED QUALIFICATIONS REQUIREMENTS (POSITION-RELATED ASSESSMENT FACTORS): Applicants will be assessed against specific position requirements which are directly related to the position being filled and are essential for successful job performance. Applicants are required to submit a brief supplementary narrative statement (SNS) outlining the experience, education, and accomplishments which have provided them with the skills and knowledge required in each of these position-related areas. The position-related areas are: (1) Demonstrated knowledge on foreign intelligence and security service (FISS), terrorist and criminal techniques, modus operandi and their use of clandestine technical surveillance devices. (2) Expert knowledge of theories, principles, practices and assessments of advanced concepts of technical/physical countermeasures. (3) Extensive knowledge of counterintelligence operations, investigations, collection, analysis and production requirements, and force protection methodology, practices and policies relating to the national and DOD TSCM, and technical security programs. (4) Excellent communication skills. ADDITIONALLY, AS PART OF THE APPLICATION PACKAGE THE APPLICANT MUST PROVIDE: Documented evidence of successful completion of a DoD or federally approved/recognized special investigations or CI investigations course, leading to the accreditation as a Special Agent, and accreditation as a TSCM agent. NOTE: Applicants who do not submit a supplementary narrative will not be given further consideration. NOTES: DIA positions are in the Excepted Service under 10 USC 1601 appointment authority. All candidates must be U.S. citizens and are subject to a thorough background inquiry and medical examination. Employees may expect to be subject to a polygraph examination. All applicants tentatively selected for this position will be required to submit to urinalysis to screen for illegal drug use prior to appointment. Employees are required to sign an agreement not to disclose, in any fashion, classified information to unauthorized persons. Participation by civilian employees in the DoD Direct Deposit/Electronic Fund Transfer of Pay Program is required. All candidates will be considered without regard to race, color, religion, sex, national origin, age, marital status, disability, or sexual orientation. Veterans who are preference eligible or who have been separated from the armed forces under honorable conditions may apply. Revised 5/22/2000 -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- [Non-text portions of this message have been removed] 3668 From: Aimee Farr Date: Sun Sep 9, 2001 11:18am Subject: S 149 passes Senate (EAA) http://www.techlawjournal.com/welcome.htm (See Export Administration Act Passes Senate....) http://thomas.loc.gov (search for S 149, see Section Analysis) [HIGHLIGHTS][More loopholes, but stiffer penalties and enforcement.] S. 149 reauthorizes the Export Administration Act of 1979. It retains the basic structure of that Act, and continues in most respects the current licensing process and requirements for exporters of dual-use items. At the same time, however, S. 149 reduces certain burdens on exporters. The bill increases the transparency and certainty of the licensing process. It also strengthens the foreign availability provisions of the current Export Administration Act and adds a mass-market provision, which may result in the elimination of controls on some items. ---------------------------------------------------------------------------- ---- Section 204. Incorporated parts and components Section 204(a) provides that controls may not be imposed on an item solely because the item incorporates parts or components that are controlled if the part or component is essential to the functioning of the item, is customarily included in sales of the item, and is valued at 25 percent or less of the total value of the item, unless the item itself would make a significant contribution to the military or proliferation potential of a country or end-user which would prove detrimental to U.S. national security, or unless failure to control the item would be contrary to controls imposed under section 201(c) or section 309. Section 204(b) provides that no authority may be required for the re-export of foreign-made items incorporating U.S.-controlled parts if the value of the U.S.-controlled parts is 25 percent or less of the total value of the item, except that controls may be imposed on reexports of items to countries designated as countries supporting international terrorism if the controlled U.S. content is greater than 10 percent of the total value of the item. Section 211. Determination of foreign availability and mass-market status Section 211(a) directs the Secretary of Commerce to review and determine the foreign availability and mass-market status of an item on a continuing basis, upon a request from the Office of Technology Evaluation, or in response to a petition. Section 211(b) requires the Secretary to establish a process for interested parties to petition for a foreign availability or mass- market determination for an item. Section 211(c) provides that in any case in which the Secretary determines that an item has foreign availability or mass-market status, no license or other authorization shall be required for the export of such item, unless the President makes a set- aside determination under section 212 or 213. Section 211(d) establishes criteria for determining foreign availability and mass-market status. Section 503. Penalties Section 503(a)(1) provides that an individual who willfully violates the Act shall, for each violation, be fined up to 10 times the value of the exports involved or $1 million, whichever is greater; imprisoned for up to 10 years; or both. Section 503(a)(2) provides that an entity that willfully violates the Act shall, for each violation, be fined up to 10 times the value of the exports involved or $5 million, whichever is greater. Section 503(b) provides that those convicted of a willful violation of the Act also shall forfeit any property that was the subject of the violation or that was derived from the violation. Section 503(c) authorizes the Secretary of Commerce to impose civil penalties of up to $500,000 per violation, and to deny the export privileges of persons who violate the Act or its regulations. Section 503(f) provides that persons convicted of violations of certain laws may, at the discretion of the Secretary, be denied export privileges for up to 10 years. Section 506. Enforcement Section 506(a) provides general enforcement authorities for enforcement of the Act. Section 506(b) authorizes forfeiture of items seized in enforcement of the Act. Section 506(c) provides that cases involving violations under this Act shall be referred to the Secretary of Commerce for civil action, or the Attorney General for criminal action, or to both. Section 506(d) authorizes the use of funds for undercover investigative operations. Section 506(e) authorizes the use of wiretaps for enforcement of the Act. Section 506(f) directs the Secretary to target post-shipment verifications to those exports involving the greatest risk to national security. Section 506(g) requires the Secretary to deny licenses to end-users who refuse to allow post-shipment verification of a controlled item.......[etc-etc] .... Kyl Amendment. One amendment, offered by Sen. Jon Kyl (R-AZ), adds language to Section 506(g) to give the Secretary of Commerce enhanced authority in responding to a country that refuses to allow post shipment verification of an exported item. It provides: "(3) REFUSAL BY COUNTRY. If the country in which the end-user is located refuses to allow post- shipment verification of a controlled item, the Secretary may deny a license for the export of that item, any substantially identical or directly competitive item or class of items, any item that the Secretary determines to be of equal or greater sensitivity than the controlled item, or any controlled item for which a determination has not been made pursuant to section 211 to all end-users in that country until such post-shipment verification is allowed." .... Thompson Amendment. The other amendment, offered by Sen. Fred Thompson (R-TN), tightens the definition of a "directly competitive item" in Section 211, regarding foreign availability and mass market status, and clarifies that an item is not directly competitive if it is "not of comparable quality" as the controlled item. Both amendments were approved by voice votes. ~Aimee Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR 5400 Bosque, Ste. 675 Waco, Texas 76710 3669 From: A Grudko Date: Sun Sep 9, 2001 2:30am Subject: Re: Used Piece Wanted - Original Message - From: A Grudko Sent: Saturday, August 25, 2001 11:49 PM Subject: Used Piece Wanted > A colleague here in South Africa is looking for a used/demo NLJD as a second > kit piece. If there is such a thing and the price is right he'll pay to ship > it over here. NLJD located - thanks to those who responded. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time "Experience is the name everyone gives to his mistakes" Oscar Wilde - A tribute to the late Roy Lawson. 3670 From: Ray Van Staden Date: Sun Sep 9, 2001 11:46am Subject: Fw: VOICE VERIFICATION Hi Group I have 2 recording. One audio cassette recording of a telephone conversation (legally recorded),the other a video cassette with both visual and audio. I need to verify if the person on the video is the same person talking on the audio cassette. I need an expert to testify by either coming to court or by sworn statement as too the voices recorded if they are the one and same person. Does anyone know of such an expert. Preferable someone in South Africa, otherwise we are prepared to get an international opinion. Raymond --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 3671 From: zack <10-33@c...> Date: Sun Sep 9, 2001 4:41pm Subject: Re: : DIA VACANCY ANNOUNCEMENT: 01-002445-CPB Is this not kinda late ???? At 03:29 PM 9/9/2001 +0000, you wrote: Date: Sat, 8 Sep 2001 16:17:31 -0400 From: "James M. Atkinson" Subject: DIA VACANCY ANNOUNCEMENT: 01-002445-CPB >OPENING DATE: 1 June 2001 >CLOSING DATE: 22 June 2001 visit http://www.copscops.com Join the Law Enforcement community http://anexa.com/lawenforcement/index.Ihtml Washington DC Police Department http://mpdc.dc.gov/main.shtm The data contained herein is confidential. Unauthorized dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 3672 From: Shawn Hughes Date: Sun Sep 9, 2001 1:25pm Subject: Re: job posting >".........accreditation as a TSCM agent." What agency is responsible for this? Is it a Feds only school? Point of contact? Thanks! Shawn 3673 From: James M. Atkinson Date: Mon Sep 10, 2001 10:58am Subject: Digital Camera's I have had several list members ask about which digital camera works well for TSCM work, and would be most appropriate for performing vulnerability analysis work, so I though it might be a good idea to mention some of the camera's I prefer. My preference is for the camera to be small enough to fit in a pants pocket or briefcase, have a built in viewing screen, and use USB or firewire to download the images to a laptop. Having a built in flash and removable media is also a big plus, not not a "need to have". I generally don't like big fancy camera's when all I am trying to do is show a problem with a door latch, some curious wiring, or a flaky access control panel. This way I can observe the problem, immediately document it, download the images to my laptop (while still one site), and type (or dictate using ViaVoice) in a narrative or comments. for use in the final report. http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00005I9PE/qid=1000136008/sr=1-20/103-5140672-9165425 http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00005ATZN/qid=1000136008/sr=1-22/103-5140672-9165425 http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00005MA9X/qid=1000136008/sr=1-15/103-5140672-9165425 If you prefer to shoot live video instead the following digital camcorders may be of use as you can pick several images, and include your own audio notes.: http://www.amazon.com/exec/obidos/ASIN/B00005LCDM/103-5140672-9165425 http://www.amazon.com/exec/obidos/ASIN/B0000507JH/103-5140672-9165425 http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00004U12J/qid=1000137029/br=1-18/ref=br_lf_p/103-5140672-9165425 http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B0000205ZZ/qid=1000137099/br=1-10/ref=br_lf_p/103-5140672-9165425 -jma -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3674 From: Dawn Star Date: Mon Sep 10, 2001 0:42pm Subject: Wiretap Ruling COURT SAYS NO PRIVACY FOR HOME PHONE CALLS >A split Pennsylvania Supreme Court has ruled that individuals have no >reasonable expectation of privacy in telephone calls made in their own >home. The judge reasoned that with speakerphones, cell phones and the >like, users have no way of knowing who might be listening in on a >conversation and thus no reasonable expectation that the call will be >private. Majority opinion at >http://www.courts.state.pa.us/OpPosting/Supreme/out/J-52-2000-mo.pdf > >Coverage at: >http://www.law.com/cgi-bin/nwlink.cgi?ACG=ZZZHW8CDOQC 3675 From: Aimee Farr Date: Mon Sep 10, 2001 1:40pm Subject: RE: Wiretap Ruling Uhm, no....see my previous post. If it's in the media and references surveillance law, don't believe it. Ever. For that matter, don't believe "legal experts" in this area either. (Exception: Stewart Baker, et. al.) Many reporters just go to the nearest law school and ask somebody that has "read the statute." ~Aimee 3676 From: Charles P Date: Mon Sep 10, 2001 4:01pm Subject: Re: Digital Camera's Speaking of cameras, I love my Sony Mavica... but for the size. It will only fit in a pocket if you like to wear cargo pants. I have a smaller size camera that will fit in a pocket if I need to pack light. I find the Mavica's ability to use standard floppy disks for photos to be a great plus. =>If you are out of town and need more storage capacity you can pick them up almost anywhere. =>You do not need to worry if the pc you need to use has an available usb port or proper drivers. =>You can make a disk copy right in the camera (of single photos or the entire disk) for backup. =>My model lets me take up to 15 seconds of video and audio on the same disk =>You can also add voice comments while your taking a photo but I've not used that feature. =>Easy to file and catalog them later. The one thing the smaller camera has is a viewfinder as well as a screen. The viewfinder helps in bright light when the LCD becomes hard to see. Oh, and don't forget the macro mode. I use that a good bit. charles charles@t... ----- Original Message ----- From: "James M. Atkinson" To: "TSCM-L Mailing List" Sent: Monday, September 10, 2001 11:58 AM Subject: [TSCM-L] Digital Camera's > > I have had several list members ask about which digital camera works > well for TSCM work, and would be most appropriate for performing > vulnerability analysis work, so I though it might be a good idea to > mention some of the camera's I prefer. > > My preference is for the camera to be small enough to fit in a pants > pocket or briefcase, have a built in viewing screen, and use USB or > firewire to download the images to a laptop. Having a built in flash > and removable media is also a big plus, not not a "need to have". > > I generally don't like big fancy camera's when all I am trying to do > is show a problem with a door latch, some curious wiring, or a flaky > access control panel. > > This way I can observe the problem, immediately document it, download > the images to my laptop (while still one site), and type (or dictate > using ViaVoice) in a narrative or comments. for use in the final > report. > > > > http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00005I9PE/qid=10 00136008/sr=1-20/103-5140672-9165425 > > > http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00005ATZN/qid=10 00136008/sr=1-22/103-5140672-9165425 > > > http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00005MA9X/qid=10 00136008/sr=1-15/103-5140672-9165425 > > > > If you prefer to shoot live video instead the following digital > camcorders may be of use as you can pick several images, and include > your own audio notes.: > > > http://www.amazon.com/exec/obidos/ASIN/B00005LCDM/103-5140672-9165425 > > > http://www.amazon.com/exec/obidos/ASIN/B0000507JH/103-5140672-9165425 > > > http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00004U12J/qid=10 00137029/br=1-18/ref=br_lf_p/103-5140672-9165425 > > > http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B0000205ZZ/qid=10 00137099/br=1-10/ref=br_lf_p/103-5140672-9165425 > > > -jma > > > > -- > > ---------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ---------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ---------------------------------------------------------------------- > Come, my friends, > 'Tis not too late to seek a newer world. > Push off, and sitting well in order smite > The sounding furrows; for my purpose holds > To sail beyond the sunset, and the baths > Of all the western stars, until I die. > - Tennyson, "Ulysses" > ---------------------------------------------------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 3677 From: Miguel Puchol Date: Mon Sep 10, 2001 4:11pm Subject: RE: Digital Camera's I personally use a combination of three cameras - a Canon Digital Ixus 300, which has USB port & CompactFlash socket, can record some 600 pictures (640x480) on a 96MB CF card, or a few minutes of video - not that jerky, highly compressed video, but rather reasonable quality, although don't expect it to be broadcast quality. This camera is VERY small, is not too heavy, has a built-in LCD display, and also records sound & panorama mode pictures, i.e. you can take several pictures and stitch them toghether. The second camera is an Epson PhotoPC 850Z, which also uses CF & USB, but records no video. It is however in SLR format, which means you get external flash socket, and a screw on the lens so you can fit macro, zoom, filters etc. to it - very handy. This camera is very good at taking pictures in low light without a flash, where reflections wouldn't be advisable. Last, a video camera, this time a Sony PC-100, which is small, can run some 4 hours with the medium-capacity battery, and has really excellent optical recording quality. It can also take pictures, to be stored on the MiniDV tape or the MemoryStick card, which can also be fitted. It features a decent optical zoom, which can be combined with a quick-release x2 optical zoom lens. The digital zoom, as with most cameras, severely decreases video quality. Well, that's my setup! Cheers all, Mike > -----Mensaje original----- > De: James M. Atkinson [mailto:jmatk@tscm.com] > Enviado el: lunes, 10 de septiembre de 2001 17:59 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] Digital Camera's > > > > I have had several list members ask about which digital camera works > well for TSCM work, and would be most appropriate for performing > vulnerability analysis work, so I though it might be a good idea to > mention some of the camera's I prefer. > > My preference is for the camera to be small enough to fit in a pants > pocket or briefcase, have a built in viewing screen, and use USB or > firewire to download the images to a laptop. Having a built in flash > and removable media is also a big plus, not not a "need to have". > > I generally don't like big fancy camera's when all I am trying to do > is show a problem with a door latch, some curious wiring, or a flaky > access control panel. > > This way I can observe the problem, immediately document it, download > the images to my laptop (while still one site), and type (or dictate > using ViaVoice) in a narrative or comments. for use in the final > report. > > > > http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00005I > 9PE/qid=1000136008/sr=1-20/103-5140672-9165425 > > > http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00005A > TZN/qid=1000136008/sr=1-22/103-5140672-9165425 > > > http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00005M > A9X/qid=1000136008/sr=1-15/103-5140672-9165425 > > > > If you prefer to shoot live video instead the following digital > camcorders may be of use as you can pick several images, and include > your own audio notes.: > > > http://www.amazon.com/exec/obidos/ASIN/B00005LCDM/103-5140672-9165425 > > > http://www.amazon.com/exec/obidos/ASIN/B0000507JH/103-5140672-9165425 > > > http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00004U 12J/qid=1000137029/br=1-18/ref=br_lf_p/103-5140672-9165425 http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B0000205ZZ/qid=10 00137099/br=1-10/ref=br_lf_p/103-5140672-9165425 -jma -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3678 From: DrPepper Date: Mon Sep 10, 2001 4:55pm Subject: Re: Digital Camera's Yeah, well, , , , , , Most people don't have 600~700 bucks for a camera. Also, The ones you mention are not exactly "shirt pocket" size. I bought an Aiptek digital camera for about $90 bucks that does a great job of taking pictures for the internet or just for the laptop. It has a USB download capability, and gives you ~680 by 460 pixels, not great for display quality, but very good for electronic display. It's about 5 1/2" by 1 1/2" and fits nicely in your shirt pocket, and is not even noticeable when you are taking pictures. See it at my site, http://www1.iwvisp.com/DrPepper/00000temp/spy%20cam.jpg And here is a compressed unretouched JPEG recently taken with it. http://www1.iwvisp.com/DrPepper/00000temp/lakediaz1.jpg It wiull do macro as well, and I say that's not bad for a C note, , , , , If this meets your needs, then why spend more? Of course if your object is to spend money on the best, then ther are lots of better cameras out there. Flame away jma, , , , - Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm Charles P wrote: > Speaking of cameras, > > I love my Sony Mavica... > but for the size. > It will only fit in a pocket if you like to wear cargo pants. I have a > smaller size camera that will fit in a pocket if I need to pack light. > I find the Mavica's ability to use standard floppy disks for photos to be a > great plus. > =>If you are out of town and need more storage capacity you can pick them up > almost anywhere. > =>You do not need to worry if the pc you need to use has an available usb > port or proper drivers. > =>You can make a disk copy right in the camera (of single photos or the > entire disk) for backup. > =>My model lets me take up to 15 seconds of video and audio on the same disk > =>You can also add voice comments while your taking a photo but I've not > used that feature. > =>Easy to file and catalog them later. > > The one thing the smaller camera has is a viewfinder as well as a screen. > The viewfinder helps in bright light when the LCD becomes hard to see. > > Oh, and don't forget the macro mode. I use that a good bit. > > charles > > charles@t... > > ----- Original Message ----- > From: "James M. Atkinson" > To: "TSCM-L Mailing List" > Sent: Monday, September 10, 2001 11:58 AM > Subject: [TSCM-L] Digital Camera's > > > > > I have had several list members ask about which digital camera works > > well for TSCM work, and would be most appropriate for performing > > vulnerability analysis work, so I though it might be a good idea to > > mention some of the camera's I prefer. > > > > My preference is for the camera to be small enough to fit in a pants > > pocket or briefcase, have a built in viewing screen, and use USB or > > firewire to download the images to a laptop. Having a built in flash > > and removable media is also a big plus, not not a "need to have". > > > > I generally don't like big fancy camera's when all I am trying to do > > is show a problem with a door latch, some curious wiring, or a flaky > > access control panel. > > > > This way I can observe the problem, immediately document it, download > > the images to my laptop (while still one site), and type (or dictate > > using ViaVoice) in a narrative or comments. for use in the final > > report. > > > > > > > > > http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00005I9PE/qid=10 > 00136008/sr=1-20/103-5140672-9165425 > > > > > > > http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00005ATZN/qid=10 > 00136008/sr=1-22/103-5140672-9165425 > > > > > > > http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00005MA9X/qid=10 > 00136008/sr=1-15/103-5140672-9165425 > > > > > > > > If you prefer to shoot live video instead the following digital > > camcorders may be of use as you can pick several images, and include > > your own audio notes.: > > > > > > http://www.amazon.com/exec/obidos/ASIN/B00005LCDM/103-5140672-9165425 > > > > > > http://www.amazon.com/exec/obidos/ASIN/B0000507JH/103-5140672-9165425 > > > > > > > http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00004U12J/qid=10 > 00137029/br=1-18/ref=br_lf_p/103-5140672-9165425 > > > > > > > http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B0000205ZZ/qid=10 > 00137099/br=1-10/ref=br_lf_p/103-5140672-9165425 > > > > > > -jma > > > > > > > > -- > > > > ---------------------------------------------------------------------- > > The First, The Largest, The Most Popular, and The Most Complete TSCM, > > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > > ---------------------------------------------------------------------- > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 http://www.tscm.com/ > > Gloucester, MA 01931-8008 jmatk@tscm.com > > ---------------------------------------------------------------------- > > Come, my friends, > > 'Tis not too late to seek a newer world. > > Push off, and sitting well in order smite > > The sounding furrows; for my purpose holds > > To sail beyond the sunset, and the baths > > Of all the western stars, until I die. > > - Tennyson, "Ulysses" > > ---------------------------------------------------------------------- > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ - 3679 From: Jack Miller Date: Mon Sep 10, 2001 1:57pm Subject: Signal DB! Any one knows of any signal databases? I am looking for a database which has all different types of modulations in different frequencies! thanks ===== ======================================= Jack Miller Researcher Paython and Co. ======================================= __________________________________________________ Do You Yahoo!? Get email alerts & NEW webcam video instant messaging with Yahoo! Messenger http://im.yahoo.com 3680 From: James M. Atkinson Date: Tue Sep 11, 2001 8:51am Subject: Terrorist Attacks in NYC Approximately one hour ago a commercial jet was high-jacked and deliberately crashed into one of the World Trade Center towers. A few minutes later a second commercial jet plunged into the second tower. Damage is extensive, causalities are very high, and the entire City of New York has been sealed off and is under lock down. There may have been a third crash (this time the Pentagon in DC), but the details are still unavailable, however; The Pentagon and White House are currently being evacuated. The FAA just initiated a total shutdown of all aircraft take-offs and landing. -jma -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3681 From: Marcelrf-iDEN Mobile Date: Tue Sep 11, 2001 9:42am Subject: Re: [BreakingTVNews] Re: [ScanAtlanta] Re: [NEXTEL1] 2 JET AIRCRAFTS JUST CRASHED INTO WORLD TRADE CENTER TOWERS 1&2 FBI- NOW REPORTING ANOTHER PLANE CRASH IN PA Marcelrf-iDEN Mobile wrote: > WHITE HOUSE & PENTAGON IN FULL EVAC > > Marcelrf-iDEN Mobile wrote: > > > A BOMB JUST EXPLODED AT THE PENTAGON HELIPORT > > > > Marcelrf-iDEN Mobile wrote: > > > > > CODE-NYC-ARK- ANGLE- > > > > > > 2 JET AIRCRAFT JUST CRASHED INTO WORLD TRADE CENTER TOWERS 1&2 > > > HEAVY DAMAGE ON UPPER FLOORS. > > > > > > FBI , NSA, CIA CALLING CODE -ARK- ANGLE AL MAJOR GOVERNMENT AGENCIES ARE > > > BEING EVACUATED. > > > > > > MARCEL > > > > > > -- > > > "NEXTEL1 IT'S NOT JUST NEXTEL" > > > Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 > > > > > > "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" > > > Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 > > > > > > > > > "NEXTEL1 IT'S NOT JUST NEXTEL" > > > www.Nextel1@onelist.com > > > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > -- > > "NEXTEL1 IT'S NOT JUST NEXTEL" > > Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 > > > > "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" > > Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 > > > > > > ScanAtlanta! > > Visit the ScanAtlanta Homepage at > > http://www.ScanAtlanta.com > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > -- > "NEXTEL1 IT'S NOT JUST NEXTEL" > Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 > > "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" > Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 > > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 3682 From: Marcelrf-iDEN Mobile Date: Tue Sep 11, 2001 9:57am Subject: Re: [scan-nyc] Re: [BreakingTVNews] Re: [ScanAtlanta] Re: [NEXTEL1] 2 JET AIRCRAFTS JUST CRASHED INTO WORLD TRADE CENTER TOWERS 1&2 THE FEDERAL BLDG IN DOWNTOWN ATLANTA NOW BEING EVACUATED! Marcelrf-iDEN Mobile wrote: > FBI- NOW REPORTING ANOTHER PLANE CRASH IN PA > > Marcelrf-iDEN Mobile wrote: > > > WHITE HOUSE & PENTAGON IN FULL EVAC > > > > Marcelrf-iDEN Mobile wrote: > > > > > A BOMB JUST EXPLODED AT THE PENTAGON HELIPORT > > > > > > Marcelrf-iDEN Mobile wrote: > > > > > > > CODE-NYC-ARK- ANGLE- > > > > > > > > 2 JET AIRCRAFT JUST CRASHED INTO WORLD TRADE CENTER TOWERS 1&2 > > > > HEAVY DAMAGE ON UPPER FLOORS. > > > > > > > > FBI , NSA, CIA CALLING CODE -ARK- ANGLE AL MAJOR GOVERNMENT AGENCIES ARE > > > > BEING EVACUATED. > > > > > > > > MARCEL > > > > > > > > -- > > > > "NEXTEL1 IT'S NOT JUST NEXTEL" > > > > Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 > > > > > > > > "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" > > > > Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 > > > > > > > > > > > > "NEXTEL1 IT'S NOT JUST NEXTEL" > > > > www.Nextel1@onelist.com > > > > > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > -- > > > "NEXTEL1 IT'S NOT JUST NEXTEL" > > > Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 > > > > > > "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" > > > Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 > > > > > > > > > ScanAtlanta! > > > Visit the ScanAtlanta Homepage at > > > http://www.ScanAtlanta.com > > > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > -- > > "NEXTEL1 IT'S NOT JUST NEXTEL" > > Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 > > > > "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" > > Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 > > > > > > > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > -- > "NEXTEL1 IT'S NOT JUST NEXTEL" > Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 > > "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" > Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 > > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 3683 From: Miguel Puchol Date: Tue Sep 11, 2001 10:00am Subject: Terrorist Attacks in NYC Both of the Twin Towers have collapsed. I'm monitoring HF to see if I can catch anything - my best thoughts & prayers to all involved. Mike > -----Mensaje original----- > De: James M. Atkinson [mailto:jmatk@tscm.com] > Enviado el: martes, 11 de septiembre de 2001 15:51 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] Terrorist Attacks in NYC > > > > Approximately one hour ago a commercial jet was high-jacked and > deliberately crashed into one of the World Trade Center towers. A few > minutes later a second commercial jet plunged into the second tower. > > Damage is extensive, causalities are very high, and the entire City > of New York has been sealed off and is under lock down. > > There may have been a third crash (this time the Pentagon in DC), but > the details are still unavailable, however; The Pentagon and White > House are currently being evacuated. > > The FAA just initiated a total shutdown of all aircraft take-offs > and landing. > > -jma > -- > > ---------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ---------------------------------------------------------------------- > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008jmatk@tscm.com > ---------------------------------------------------------------------- > Come, my friends, > 'Tis not too late to seek a newer world. > Push off, and sitting well in order smite > The sounding furrows; for my purpose holds > To sail beyond the sunset, and the baths > Of all the western stars, until I die. > - Tennyson, "Ulysses" > ---------------------------------------------------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3684 From: Marcelrf-iDEN Mobile Date: Tue Sep 11, 2001 10:13am Subject: Re: [BreakingTVNews] Re: [ScanAtlanta] Re: [NEXTEL1] 2 JET AIRCRAFTS JUST CRASHED INTO WORLD TRADE CENTER TOWERS 1&2 BOTH THE WORLD TRADE CENTER BUILDINGS HAVE COLLAPSED. FAA REPORTING SEVERAL PLANES ARE "UNACCOUNTED" AT THIS TIME. Marcelrf-iDEN Mobile wrote: > FBI- NOW REPORTING ANOTHER PLANE CRASH IN PA > > Marcelrf-iDEN Mobile wrote: > > > WHITE HOUSE & PENTAGON IN FULL EVAC > > > > Marcelrf-iDEN Mobile wrote: > > > > > A BOMB JUST EXPLODED AT THE PENTAGON HELIPORT > > > > > > Marcelrf-iDEN Mobile wrote: > > > > > > > CODE-NYC-ARK- ANGLE- > > > > > > > > 2 JET AIRCRAFT JUST CRASHED INTO WORLD TRADE CENTER TOWERS 1&2 > > > > HEAVY DAMAGE ON UPPER FLOORS. > > > > > > > > FBI , NSA, CIA CALLING CODE -ARK- ANGLE AL MAJOR GOVERNMENT AGENCIES ARE > > > > BEING EVACUATED. > > > > > > > > MARCEL > > > > > > > > -- > > > > "NEXTEL1 IT'S NOT JUST NEXTEL" > > > > Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 > > > > > > > > "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" > > > > Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 > > > > > > > > > > > > "NEXTEL1 IT'S NOT JUST NEXTEL" > > > > www.Nextel1@onelist.com > > > > > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > -- > > > "NEXTEL1 IT'S NOT JUST NEXTEL" > > > Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 > > > > > > "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" > > > Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 > > > > > > > > > ScanAtlanta! > > > Visit the ScanAtlanta Homepage at > > > http://www.ScanAtlanta.com > > > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > -- > > "NEXTEL1 IT'S NOT JUST NEXTEL" > > Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 > > > > "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" > > Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 > > > > > > > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > -- > "NEXTEL1 IT'S NOT JUST NEXTEL" > Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 > > "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" > Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 3685 From: Miguel Puchol Date: Tue Sep 11, 2001 9:38am Subject: RE: Terrorist Attacks in NYC Both of the Twin Towers have collapsed. I'm monitoring HF to see if I can catch anything - my best thoughts & prayers to all involved. Mike > -----Mensaje original----- > De: James M. Atkinson [mailto:jmatk@tscm.com] > Enviado el: martes, 11 de septiembre de 2001 15:51 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] Terrorist Attacks in NYC > > > > Approximately one hour ago a commercial jet was high-jacked and > deliberately crashed into one of the World Trade Center towers. A few > minutes later a second commercial jet plunged into the second tower. > > Damage is extensive, causalities are very high, and the entire City > of New York has been sealed off and is under lock down. > > There may have been a third crash (this time the Pentagon in DC), but > the details are still unavailable, however; The Pentagon and White > House are currently being evacuated. > > The FAA just initiated a total shutdown of all aircraft take-offs > and landing. > > -jma > -- > > ---------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ---------------------------------------------------------------------- > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008jmatk@tscm.com > ---------------------------------------------------------------------- > Come, my friends, > 'Tis not too late to seek a newer world. > Push off, and sitting well in order smite > The sounding furrows; for my purpose holds > To sail beyond the sunset, and the baths > Of all the western stars, until I die. > - Tennyson, "Ulysses" > ---------------------------------------------------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3686 From: Cypher Date: Tue Sep 11, 2001 9:09am Subject: Re: Terrorist Attacks in NYC A plane did crash into the pentagon, another explosion was reported at the Pentagon heliport. The State Department building is on fire Treasury Department has been evacuated A threat has been made on the White House "James M. Atkinson" wrote: > > Approximately one hour ago a commercial jet was high-jacked and > deliberately crashed into one of the World Trade Center towers. A few > minutes later a second commercial jet plunged into the second tower. > > Damage is extensive, causalities are very high, and the entire City > of New York has been sealed off and is under lock down. > > There may have been a third crash (this time the Pentagon in DC), but > the details are still unavailable, however; The Pentagon and White > House are currently being evacuated. > > The FAA just initiated a total shutdown of all aircraft take-offs and > landing. > > -jma > -- > > ---------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ---------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ---------------------------------------------------------------------- > Come, my friends, > 'Tis not too late to seek a newer world. > Push off, and sitting well in order smite > The sounding furrows; for my purpose holds > To sail beyond the sunset, and the baths > Of all the western stars, until I die. > - Tennyson, "Ulysses" > ---------------------------------------------------------------------- > > Yahoo! Groups Sponsor > [Image] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. -- Bryan Herbert KE6ZGP (661) 714-2611 25006 Walnut St. #2 Newhall, Ca 91321 34.23N 118.32W DM04RJ AIM: EAVE5DR0P ICQ: 92114706 YAHOO: b_herbert_91321 http://www.geocities.com/b_herbert_91321/index.html 3687 From: Date: Tue Sep 11, 2001 8:34am Subject: RE: Digital Camera's Anyone have any news on the WTC and the planes please, we are getting mixed news here in NL. Rgds, Nik.. -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Monday, September 10, 2001 5:59 PM To: TSCM-L Mailing List Subject: [TSCM-L] Digital Camera's I have had several list members ask about which digital camera works well for TSCM work, and would be most appropriate for performing vulnerability analysis work, so I though it might be a good idea to mention some of the camera's I prefer. My preference is for the camera to be small enough to fit in a pants pocket or briefcase, have a built in viewing screen, and use USB or firewire to download the images to a laptop. Having a built in flash and removable media is also a big plus, not not a "need to have". I generally don't like big fancy camera's when all I am trying to do is show a problem with a door latch, some curious wiring, or a flaky access control panel. This way I can observe the problem, immediately document it, download the images to my laptop (while still one site), and type (or dictate using ViaVoice) in a narrative or comments. for use in the final report. http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00005I9PE/qid=10 00136008/sr=1-20/103-5140672-9165425 http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00005ATZN/qid=10 00136008/sr=1-22/103-5140672-9165425 http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00005MA9X/qid=10 00136008/sr=1-15/103-5140672-9165425 If you prefer to shoot live video instead the following digital camcorders may be of use as you can pick several images, and include your own audio notes.: http://www.amazon.com/exec/obidos/ASIN/B00005LCDM/103-5140672-9165425 http://www.amazon.com/exec/obidos/ASIN/B0000507JH/103-5140672-9165425 http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B00004U12J/qid=10 00137029/br=1-18/ref=br_lf_p/103-5140672-9165425 http://www.amazon.com/exec/obidos/tg/stores/detail/-/photo/B0000205ZZ/qid=10 00137099/br=1-10/ref=br_lf_p/103-5140672-9165425 -jma -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3688 From: Aimee Farr Date: Tue Sep 11, 2001 11:19am Subject: GAO airport security reports GAO Reports critical of airport security. http://www.federaltimes.com/issues/crackdown.html http://www.janes.com/transport/news/jar/jar000616_1_n.shtml It seems like there was something more recent...if anybody has the link, it would be appreciated. I can't pull up the GAO. ~Aimee 3689 From: James M. Atkinson Date: Tue Sep 11, 2001 2:43pm Subject: Re: GAO airport security reports At 11:19 AM -0500 9/11/01, Aimee Farr wrote: >GAO Reports critical of airport security. >http://www.federaltimes.com/issues/crackdown.html >http://www.janes.com/transport/news/jar/jar000616_1_n.shtml > >It seems like there was something more recent...if anybody has the link, it >would be appreciated. I can't pull up the GAO. > >~Aimee Breaches Lead to Security Crackdown Published: 6-19-00 By Tim Kauffman FEDERAL TIMES STAFF WRITER Agencies are restricting the once-unfettered access of law enforcement officials to federal buildings after a scathing congressional report revealed major security vulnerabilities. The new security measures, instituted at most agencies immediately after the report's release, require law enforcement personnel to be treated the same as other visitors. "Over the years, we've extended professional courtesies to law enforcement personnel . . . to bypass some of our security arrangements," said retired Air Force Gen. Eugene Habiger, director of the office of security and emergency operations at the Energy Department. "We got caught." A General Accounting Office report, "Security Breaches at Federal Agencies and Airports," released May 25 revealed that bogus law enforcement credentials were enough to avoid security checks at many federal agencies and commercial airports. Undercover GAO agents used false badges and identifications ordered off of the Internet to enter 18 federal buildings in the Washington, D.C., area, a federal courthouse in Orlando, Fla., and two major commercial airports. They gained access to 18 of the 21 sites on the first attempt. The agents carried guns and bags that could have contained weapons, explosives, listening devices or chemical or biological weapons. The undercover agents' bags were not checked, and they were allowed to keep possession of their guns. In all but three of the sites, the agents were allowed to wander unescorted. In the remaining sites, the agents were permitted to enter rest rooms near offices of Cabinet secretaries or agency heads where they could have left explosives. The report also showed lapses in how vehicles are checked by security officers. In one instance, undercover agents drove a rented minivan into the courtyard entrance of a department and were permitted entry without being screened. In another instance, the agents were issued a VIP parking pass and parked an unexamined sedan a few yards from a building entrance. In both instances, only the driver of the vehicle was required to show identification. "On a single day, they succeeded in penetrating eight secure buildings," said Rep. Bill McCollum, R-Fla., who called for the GAO investigation. "The havoc that could have been wreaked by actual terrorists doing the same is chilling to consider." McCollum briefed officials at the agencies cited in the report a few days before the report was released. He also held a hearing on the report before the House Judiciary Committee subcommittee on crime, which he chairs. Federal Times attempted to contact all agencies cited in the report and received responses from all but one. Although some agencies would not discuss details of their security procedures, all but one agency of those that responded said they were tightening security measures to prevent a similar instance from happening again. New measures were developed by top agency officials in consultation with the heads of security at each agency. Most of the security enhancements were recommended by GAO to address specific vulnerabilities cited in the report. Among the new requirements adopted at the agencies: *Identification of law enforcement personnel must be verified by personal recognition or by contacting the officers' places of employment. *Law enforcement personnel must have a prior appointment with an agency employee to gain access. *Law enforcement personnel must be accompanied by an escort at all times. *Weapons must be surrendered to the agency's security officers and remain in locked boxes during a visit. *Officers must walk through a magnetometer to scan for concealed weapons. *All visitors arriving by vehicle must show identification to a security officer. "It's good to have our weakness shown to us so we can correct them," said Gretchen Michael, spokeswoman at the Justice Department. "This really was a wake-up call." The CIA fared better than all other agencies cited in the report and was the only agency contacted by Federal Times to report no change in regulations. Three undercover officers were able to enter CIA headquarters without being screened, but their access was limited to the first floor. CIA spokeswoman Anya Guilsher said the agency was taking the report into consideration. "We're always looking at our security posture here. It's something we take very, very seriously," Guilsher said. Most agencies that enhanced their security measures said the actions were procedural and would not require additional equipment or personnel. But some lamented the effort that will be required to ensure safety. "It makes conducting business more difficult," said Greg Gagne, spokesman for the Immigration and Naturalization Service. "Unfortunately, that seems to be what the world requires now in order to be absolutely positively sure you don't have any vulnerabilities. Everyone's living with it, from airline passengers to people driving by the White House to people visiting government buildings." In addition to security upgrades at its headquarters, the Federal Aviation Administration is making even bigger changes at airports. The FAA is expected to publish regulations by mid-June requiring local, state and federal law enforcement agencies to provide nonpublished telephone numbers that would allow airport personnel to confirm the identities of officers boarding airplanes on official business. Uniformed airport police officers also would be required to check the identifications of officers flying armed. Previously, federal agents usually presented credentials only to security guards and signed a form detailing that they were on official business. Local and state officers had to provide a letter from their departments stating the nature of the business and verifying their identities. The FAA also is directing a task force on weapon policy, which includes airline representatives, airport employees' groups and law enforcement representatives, to develop a supplemental identification badge that will be more reliable than current badges and picture IDs. "What we learned from the GAO investigation is that current credentials are no longer a valid means for identifying law enforcement officers," said Rebecca Trexler, a FAA spokeswoman. "What we want to do is work with all the law enforcement agencies to create a new form of identification that's relatively counterfeit proof." If no foolproof system can be developed, the FAA might propose regulations limiting the officers allowed to carry weapons onto airplanes to agents of the FBI, the Secret Service and the FAA. The FAA discussed the proposed regulation at a weapon-policy task force meeting called the week following the release of the GAO report. The proposal was met with outrage from agencies not on the list and from law enforcement officers. "While the GAO investigators raised a valid point - it appears that there is a vulnerability - the FAA response is knee-jerk and an overreaction," said Brian Moskowitz, national legislative director for the Federal Law Enforcement Officers Association. The association is a nonprofit, nonpartisan organization that represents more than 18,000 federal law enforcement officers and criminal investigators. "It would create a situation far worse than the potential threat that GAO has uncovered," Moskowitz said. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3690 From: Marcelrf Date: Tue Sep 11, 2001 4:31pm Subject: WORLD TRADE CENTER BLDG # 7 HAS JUST COLLAPSED WORLD TRADE CENTER BLDG. # 7 HAS JUST COLLAPSED - 3691 From: Marcelrf Date: Tue Sep 11, 2001 5:04pm Subject: Re: WORLD TRADE CENTER BLDG # 7 HAS JUST COLLAPSED ACTIVE BOMBING IN AFGHANISTAN!!! TRACER FIRE UP! Marcelrf wrote: > WORLD TRADE CENTER BLDG. # 7 HAS JUST COLLAPSED > > - > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 From: A.Lizard Date: Tue Sep 7, 2004 11:46pm Subject: Re: PC-based software-defined radio At 04:23 PM 9/7/04 +0000, you wrote: sorry, I'd intended to mail that back to myself for my archive files. A.Lizard >Message: 11 > Date: Mon, 06 Sep 2004 14:37:31 -0700 > From: "A.Lizard" >Subject: > >At 03:59 PM 9/6/04 +0000, you wrote: > > >Message: 7 > > Date: Sun, 05 Sep 2004 22:20:20 -0400 > > From: "James M. Atkinson" > >Subject: Re: SDR analysis of covert transmissions > > > >I have own some SDR-14's, and have been quite pleased with them, but I wish > >the factory would build them faster (do I can buy a few more). -- member The Internet Society (ISOC), The HTML Writers Guild. "They need to wake up and smell the fire, it is their pants that are burning." hombresecreto, re: the famous SCO threat letter Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@g..., alizardx@y... PGP 8.0 key available by request or keyserver. Download PGP from: http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html ***Looking for INTELLIGENT new technology public policy alternatives?*** http://www.ecis.com/~alizard/technology.html 9621 From: walshingham2000 Date: Tue Sep 7, 2004 7:18pm Subject: Call For Articles PGPBOARD Newsletter (November 2004) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 CALL FOR ARTICLES ================= PGPBOARD is currently preparing our next quarterly newsletter slated for circulation during the second week of November, and is actively soliciting articles. Currently, we circulate to approximately 400 recipients, these include individuals, and several well known NGO's. The copyright remains with the author, and drafts of the newsletter are circulated to individual contributors prior to circulation for comments concerning the overall context of the newsletter in which their articles will appear. Best Regards Alan Taylor PGPBOARD Administrator Angeles City, Philippines http://groups.yahoo.com/group/pgpboard/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (MingW32) - WinPT 0.7.92-cvs Comment: GPG HOME BASE v1.1.2-SMTP iD8DBQFBPk3PnlgTmL218Z8RAi1yAJsGWswPoq52hXjaU+6r9T3lVhK2bwCeM0F1 Ykpo15EBsuLLZi4T8shUGqM= =ECAG -----END PGP SIGNATURE----- 9622 From: George Shaw Date: Wed Sep 8, 2004 1:06am Subject: RE: Bugging device found at Sinn FÈin aide's home I have seen the photographs of the "equipment". ANY agency with ANY knowledge at all would never have installed this kit, its level of sophistication is akin to my 7 year olds experiments with a "Learn Electronics 300 in 1 kit". They had access to the whole house and the attic (roof space) and could only install this 40 ft of wire and 4 PA mics modified with a army surplus Tx. Don't think so. Nice publicity stunt though. (The "find" was not that far from where I live). -- George Shaw MI3GTO / 2I0GTO ì Any Sufficiently Advanced Technology is Indistinguishable from Magicî ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... Fax & Voicemail: +44 (0) 871 242 5365 EchoLink & eQSO (101English) connected 24/7 -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: 07 September 2004 00:26 To: TSCM-L Subject: [TSCM-L] Bugging device found at Sinn FÈin aide's home http://212.2.162.45/news/story.asp?j=95859500&p=9586xx8x&n=95860109 ---------------------------------------------------------------------------- ---- Ireland Online Bugging device found at Sinn FÈin aide's home 06/09/2004 - 16:03:27 A bugging device has been found at the home of one of Sinn FÈin President Gerry Adams' staff, it was claimed today. Republicans immediately blamed British agents who were "out to wreck" the Northern Ireland peace process. The listening equipment was allegedly found in the loft area of the womanës house in west Belfast. Sinn FÈin Assembly member Michael Ferguson said: ìThere must be 10 different parts to this. I have never seen anything as elaborate before. It was through the whole roof-space of this womanës home and was clearly put there by one of the intelligence gathering organisations. ìSo, 10 years after the anniversary of the IRA ceasefire why are these people still doing this? They are clearly not committed to any peace process.î Workmen discovered the device after being called out by the woman, who carries out voluntary work at Mr Adams offices. The West Belfast MP, who was in Westminster ahead of a critical new bid later this month to restore the Stormont power-sharing administration, would be raising the issue with the British government, Sinn FÈin insisted. ìGerry will be asking for an explanation," Mr Ferguson added. ìThatës without even dealing with the whole privacy matter for this woman. Her home and privacy has been invaded. This just shows the extent to which these people will go. ìThey have clearly got an agenda of their own and are not accountable to anyone.î The Northern Ireland Office refused to comment in response to Sinn FÈin's allegations. 9623 From: Martin Brown Date: Wed Sep 8, 2004 2:42pm Subject: It ain't all high-tech! Good example of KISS (keep it simple, stupid) http://www.dfw.com/mld/dfw/news/state/9607715.htm?1c Martin Brown Brown & Sikes, Inc. Dallas, TX [Non-text portions of this message have been removed] 9624 From: Tech Sec Lab Date: Wed Sep 8, 2004 6:22pm Subject: Laser or similar perimeter intrusion system.... Hi guys Can anyone recommend a handy laser based system to install as a perimeter cross dectection unit. I am not looking for PIR's, all I need is a small outdoor rated product that can be quickly installed and connected up to any basic pulse alert alarm system for alarm trigger that acts as a cross beam for a distance of 10-20m. Cheers -Ois 9625 From: A Grudko Date: Thu Sep 9, 2004 4:05am Subject: RE: Laser or similar perimeter intrusion system.... -----Original Message----- From: Tech Sec Lab [mailto:tscmteam@o...] > Can anyone recommend a handy laser based system to install as a perimeter cross dectection unit. Unless you have a specific reason to use laser I have had good results from and would recommend (active) Infra Red beams manufactured by Peritec (or a similar quality manufacturer). Very easy to set up, low power consumption (possibly v.important for a portable system), low false alarm rate (just avoid the RX unit facing directly into the sun and watch out for insects getting into the unit). I have installed a number of the 30 and 120 Mtr units externally - use longer range units in heavy rain areas as the beam is attenuated by rain. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.749 / Virus Database: 501 - Release Date: 2004/09/01 [Non-text portions of this message have been removed] 9626 From: Robert Dyk Date: Thu Sep 9, 2004 7:12am Subject: RE: Laser or similar perimeter intrusion system.... I have had good success with RedNet or Redwall. These units originate in the UK. The RedNet system has 4 intersecting IR beams. It is programmable and good up to 120m. We have systems installed at a major airport in the harsh canadian environment with no failures in over 3 years. http://www.optexamerica.com/indexes/gen_index.cfm?class=redwall Cheers Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. > -----Original Message----- > From: Tech Sec Lab [mailto:tscmteam@o...] > Sent: September 8, 2004 19:22 > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Laser or similar perimeter intrusion system.... > > > Hi guys > > Can anyone recommend a handy laser based system to install as a perimeter > cross dectection unit. > > I am not looking for PIR's, all I need is a small outdoor rated > product that > can be quickly installed and connected up to any basic pulse alert alarm > system for alarm trigger that acts as a cross beam for a distance > of 10-20m. > > Cheers > > -Ois > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > 9627 From: Tech Sec Lab Date: Thu Sep 9, 2004 7:25am Subject: SA for UWB Handheld spectrum analyzer tackles ultra-wideband signals Jul 1, 2004 12:00 PM Further extending its reach to conduct accurate analysis of a new wave of wireless signals, Anritsu Company has readied a fully functional, battery-operated spectrum analyzer that can tackle ultra-wideband signals up to 7 GHz anywhere, anytime. Consequently, the next-generation handheld spectrum analyzer MS2721A offers test solutions to measure 802.11a, 3G and WiMAX signals, in addition to public safety and military communications systems. Plus, it weighs 6.4 pounds, to make it comfortable on the engineering bench as well as in the field. By comparison, the previous-generation unit handled signals to 3 GHz. According to Anritsu, the new handheld spectrum analyzer will enable developers to ensure integrity of data/voice transmission, while helping them to identify interfering signals. These analysis capabilities are becoming important with the rollout of new wireless infrastructures, wherein the RF signals are more complicated and at higher frequencies. Target markets for this high-performance spectrum analyzer include field service and signal surveillance, mobile wireless networks, wireless data/Internet, wireless broadcast, and military/aerospace. In essence, the MS2721A covers signals in the range of 100 kHz to 7.1 GHz. It can make a variety of measurements with the push of a single button. Some of these include field strength, channel power, occupied bandwidth, emission bandwidth, adjacent-channel power ratio (ACPR), AM/FM demodulation, and carrier-to-interference ratio (C/I). Besides high performance, Anritsu also guarantees measurement accuracy. As a result, the spectrum analyzer offers a phase noise of -100 dBc/Hz at 10 kHz offset, dynamic amplitude noise level (DANL) of -152 dBm at 2.2 GHz (typical) and a resolution bandwidth range of 10 Hz to 3 MHz. Over and above, the instrument automatically sweeps at the fastest possible speed to get accurate data. Other features include an 8.4-inch TFT color LCD with wide viewing angle, external/internal compact flash slots, and Ethernet 10/100 and USB 2.0 ports. The instrument's LCD offers three colored display traces ≠ one live, two stored. For field use, the spectrum analyzer comes in a rugged case that can withstand harsh environments and rough terrains. The operating temperature range for the unit is -10∞C to +55∞C. Additionally, the spectrum analyzer incorporates a simple multilingual, customizable user interface in English, Spanish, French, German, Chinese and Japanese. To obtain long life and durability, it uses a Li-ion battery. The base price for the MS2721A starts at $15,950. 9628 From: Michael Puchol Date: Thu Sep 9, 2004 8:59am Subject: Re: SA for UWB Hi, I looked into getting one of the previous (3GHz) model SA made by Anritsu, but after some comments from more knowledgeable list members than I, I decided against it, mainly due to RF characteristics not being that good. How would you consider this unit based on the specs here given? I know some other gear Anritsu makes, and I have no complaint on it's performance, but I could do with a handheld SA, specially if it goes up to 7GHz and has reasonable performance. The price certainly has gone up a few notches. Regards, Mike ----- Original Message ----- From: "Tech Sec Lab" To: Sent: Thursday, September 09, 2004 2:25 PM Subject: [TSCM-L] SA for UWB Handheld spectrum analyzer tackles ultra-wideband signals Jul 1, 2004 12:00 PM Further extending its reach to conduct accurate analysis of a new wave of wireless signals, Anritsu Company has readied a fully functional, battery-operated spectrum analyzer that can tackle ultra-wideband signals up to 7 GHz anywhere, anytime. Consequently, the next-generation handheld spectrum analyzer MS2721A offers test solutions to measure 802.11a, 3G and WiMAX signals, in addition to public safety and military communications systems. Plus, it weighs 6.4 pounds, to make it comfortable on the engineering bench as well as in the field. By comparison, the previous-generation unit handled signals to 3 GHz. According to Anritsu, the new handheld spectrum analyzer will enable developers to ensure integrity of data/voice transmission, while helping them to identify interfering signals. These analysis capabilities are becoming important with the rollout of new wireless infrastructures, wherein the RF signals are more complicated and at higher frequencies. Target markets for this high-performance spectrum analyzer include field service and signal surveillance, mobile wireless networks, wireless data/Internet, wireless broadcast, and military/aerospace. In essence, the MS2721A covers signals in the range of 100 kHz to 7.1 GHz. It can make a variety of measurements with the push of a single button. Some of these include field strength, channel power, occupied bandwidth, emission bandwidth, adjacent-channel power ratio (ACPR), AM/FM demodulation, and carrier-to-interference ratio (C/I). Besides high performance, Anritsu also guarantees measurement accuracy. As a result, the spectrum analyzer offers a phase noise of -100 dBc/Hz at 10 kHz offset, dynamic amplitude noise level (DANL) of -152 dBm at 2.2 GHz (typical) and a resolution bandwidth range of 10 Hz to 3 MHz. Over and above, the instrument automatically sweeps at the fastest possible speed to get accurate data. Other features include an 8.4-inch TFT color LCD with wide viewing angle, external/internal compact flash slots, and Ethernet 10/100 and USB 2.0 ports. The instrument's LCD offers three colored display traces - one live, two stored. For field use, the spectrum analyzer comes in a rugged case that can withstand harsh environments and rough terrains. The operating temperature range for the unit is -10∞C to +55∞C. Additionally, the spectrum analyzer incorporates a simple multilingual, customizable user interface in English, Spanish, French, German, Chinese and Japanese. To obtain long life and durability, it uses a Li-ion battery. The base price for the MS2721A starts at $15,950. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9629 From: A Grudko Date: Thu Sep 9, 2004 9:07am Subject: UK documentary I wonder if anyone recalls a UK documentary (I think ITV because I recall adverts) which I think was called 'The Buggist'. I have a (Betamax!) copy of it but can't find it. Convicted 'Buggist' David ??? went public in about '86 after his services resulted in the assassination of a politician in exile in Putney (if I recall), west London. I'm looking for some details for a paper I'm writing. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.749 / Virus Database: 501 - Release Date: 2004/09/01 [Non-text portions of this message have been removed] 9630 From: Tech Sec Lab Date: Thu Sep 9, 2004 2:07pm Subject: RE: RE: Laser or similar perimeter intrusion system.... Cheers Andy and Rob, No laser is not a requirement. I have contacted both companies for more info. I had used the RedWall systems before but didn't realise Optrex made the IR beam systems as well. On another note, I have some specialised custom made PIR's that we had from an old client but the company that made them have since gone belly up. They had a special plastic (maybe carbonate) mirrored lens, circular in shape that seemed to have deteriorated and lost its coating and hence blocked reliable operation. Does anyone know what type of lenses these are and where I might be able to order replacements? I can send some samples of the old lenses as well as dimensions if anyone thinks they might be able to help. Kind regards -Ois *************** Message: 4 Date: Thu, 9 Sep 2004 08:12:08 -0400 From: "Robert Dyk" Subject: I have had good success with RedNet or Redwall. These units originate in the UK. The RedNet system has 4 intersecting IR beams. It is programmable and good up to 120m. We have systems installed at a major airport in the harsh canadian environment with no failures in over 3 years. http://www.optexamerica.com/indexes/gen_index.cfm?class=redwall Cheers Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada 9631 From: DATA_4N6_Engineering Date: Thu Sep 9, 2004 6:39am Subject: Re: It ain't all high-tech! i dont subscribe and counld not view the article --- Martin Brown wrote: > Good example of KISS (keep it simple, stupid) > > http://www.dfw.com/mld/dfw/news/state/9607715.htm?1c > > Martin Brown > Brown & Sikes, Inc. > Dallas, TX > > > [Non-text portions of this message have been > removed] > > > ===== Jon Asdourian 61 356B Red Porsche Coupe 69 Red MGC GT 63 Burgundy Austin Healey 3000 BJ7 356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC __________________________________ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail 9632 From: Leanardo Date: Thu Sep 9, 2004 9:20am Subject: Re: Laser or similar perimeter intrusion system.... Ramsey Electronics has a slick little kit that uses a laser pointer module if you dont mind spending a little time assembling it. Hard to beat at $30.00 http://www.ramseyelectronics.com/cgi-bin/commerce.exe?preadd=action&key=LTS1 Bruce --- In TSCM-L@yahoogroups.com, "Tech Sec Lab" wrote: > Hi guys > > Can anyone recommend a handy laser based system to install as a perimeter > cross dectection unit. > -Ois 9633 From: Date: Thu Sep 9, 2004 11:47am Subject: Re: It ain't all high-tech! Sorry, guys, but found that the Star Telegram wanted a membership form to display the article. So, here it is in text form. Martin Brown wrote: >Good example of KISS (keep it simple, stupid) > >http://www.dfw.com/mld/dfw/news/state/9607715.htm?1c > >Martin Brown >Brown & Sikes, Inc. >Dallas, TX > > >[Non-text portions of this message have been removed] > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > [Non-text portions of this message have been removed] 9634 From: Date: Thu Sep 9, 2004 7:38am Subject: detecting phone recorders Hi, I'm developing a product that will be deployed to end-consumers, but we need to be assured that they don't have any voice-activated or line-activated telephone recorders attached to the phone line. I've read lots about various detectors - it seems that some equipment claims to keep the line voltage from dropping when a phone is picked up, but there seems to be no prevention against voice-activated recorders besides feeding them fake noise to run the tape out. Various other sites have advocated disconnecting all phones from the line and conducting a proper impedance test. To the best of my knowledge the recorders seem to have high impedance - how does this compare to regular telephones? Some other sites say that you can detect them by monitoring voltage and current, while others say this varies so much it's worthless. I don't think it would be feasible to to TDR testing at individual sites unless the circuitry can be miniaturized and a set algorithm figured out. Is there any way we could ask users to disconnect all phones, run some sort of test, and make sure that no devices have been attached and keep monitoring this...? Any help much appreciated. Imran Akbar 9635 From: moellerthy <1ach@g...> Date: Thu Sep 9, 2004 7:04pm Subject: Re: detecting phone recorders --- In TSCM-L@yahoogroups.com, wrote: > I have detected tape recorders and the like by simply doing a paralle test, a resistence test,series test, and TDR. Most likely you have read Level one spec's on that equipment. The most deadly attack is the inductive tap which may or may not leave a anomaly on the impedance however the magnetic field which the device draws its power from is AC AND IS CALLED INDUCED VOLTAGE. Regards ANDRE Holmes Neptune Enterprise Security 1ach@G... > Hi, > I'm developing a product that will be deployed to end- consumers, but > we need to be assured that they don't have any voice-activated or > line-activated telephone recorders attached to the phone line. I've > read lots about various detectors - it seems that some equipment claims > to keep the line voltage from dropping when a phone is picked up, but > there seems to be no prevention against voice-activated recorders > besides feeding them fake noise to run the tape out. Various other > sites have advocated disconnecting all phones from the line and > conducting a proper impedance test. To the best of my knowledge the > recorders seem to have high impedance - how does this compare to > regular telephones? Some other sites say that you can detect them by > monitoring voltage and current, while others say this varies so much > it's worthless. I don't think it would be feasible to to TDR testing > at individual sites unless the circuitry can be miniaturized and a set > algorithm figured out. Is there any way we could ask users to > disconnect all phones, run some sort of test, and make sure that no > devices have been attached and keep monitoring this...? Any help much > appreciated. > > Imran Akbar 9636 From: Cornolio Date: Thu Sep 9, 2004 3:37pm Subject: Re: Re: PC-based software-defined radio I know the lead developer of GNU radio (Eric Blossom) for a long time. He used to be on a secure phone project, but switched to software radio some time ago. It think it is a very interesting project: http://www.gnu.org/software/gnuradio/ When Eric visited Amsterdam I shot some video about the project. Two video clips are still online: http://diorella.boppelans.net/gnu-radio.zip (108 Mb) (contains gnu-radio-intro.mpg and gnu-radio_q-and-a.mpg) Enjoy :) With regards, Barry Wels On Tue, Sep 07, 2004 at 09:46:45PM -0700, A.Lizard wrote: > At 04:23 PM 9/7/04 +0000, you wrote: > > sorry, I'd intended to mail that back to myself for my archive files. > > A.Lizard > > >Message: 11 > > Date: Mon, 06 Sep 2004 14:37:31 -0700 > > From: "A.Lizard" > >Subject: > > > >At 03:59 PM 9/6/04 +0000, you wrote: > > > > >Message: 7 > > > Date: Sun, 05 Sep 2004 22:20:20 -0400 > > > From: "James M. Atkinson" > > >Subject: Re: SDR analysis of covert transmissions > > > > > >I have own some SDR-14's, and have been quite pleased with them, but I wish > > >the factory would build them faster (do I can buy a few more). > > -- > member The Internet Society (ISOC), The HTML Writers Guild. > "They need to wake up and smell the fire, it is their pants that are burning." > hombresecreto, re: the famous SCO threat letter > Personal Website http://www.ecis.com/~alizard > business Website http://reptilelabs.com > backup address (if ALL else fails) alizard@g..., alizardx@y... > PGP 8.0 key available by request or keyserver. Download PGP from: > http://www.pgpi.org for e-mail privacy. > Disaster prep info: http://www.ecis.com/~alizard/y2k.html > ***Looking for INTELLIGENT new technology public policy alternatives?*** > http://www.ecis.com/~alizard/technology.html > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9637 From: Date: Thu Sep 9, 2004 3:17pm Subject: It ain't all high-tech One more try, fellas. Martin Brown Brown & Sikes, Inc. Dallas, TX [Non-text portions of this message have been removed] 9638 From: Steve Uhrig Date: Thu Sep 9, 2004 4:07pm Subject: Re: detecting phone recorders On 9 Sep 2004 at 14:38, , who eschews obfuscation, wrote: > I'm developing a product that will be deployed to end-consumers, but we > need to be assured that they don't have any voice-activated or > line-activated telephone recorders attached to the phone line. For consumers, the only real way to establish this baseline is with a competent sweep. You can't just give a set of parameters, as they are different all over the world. We all wish it was easy to do a baseline inspection somehow and know a line is clean. Even physical inspection of every millimeter of copper is not an assurance absent an experienced person who knows what to look for. > I've read lots about various detectors - it seems that some equipment > claims to keep the line voltage from dropping when a phone is picked up Some have tried this, to prevent voltage-activated devices from tripping when the phone goes off hook. However, if you feed artificial voltage into the line, you won't let the central office go off hook when the client wants to use the line. Going off hook places a load on the phone line, which draws current, which causes a voltage drop per Mr. Ohms' law. The central office needs to see the current being drawn to go off hook. So you can't camoflauge this. One intercept device we manufacture looks strictly at the delta phone line voltage. Any sudden change will trip our device. We don't look for an absolute voltage with a Zener like the toys do. As long as the voltage changes, we activate. It's not possible to fake the thing out and still trigger the CO to go off hook when needed. > but there seems to be no prevention against voice-activated recorders > besides feeding them fake noise to run the tape out. In the real world that's not really necessary, as on-hook phone lines have all kinds of noise and garbage and signaling and stuff on them. Voice activation doesn't generally work on phone lines, and faking out voice activation with your own noise source is an impotent CCS marketing claim. > Various other sites have advocated disconnecting all phones from the > line and conducting a proper impedance test. To the best of my > knowledge the recorders seem to have high impedance - how does this > compare to regular telephones? Some other sites say that you can > detect them by monitoring voltage and current, while others say this > varies so much it's worthless. The last statement is correct. > I don't think it would be feasible to to TDR testing at individual > sites unless the circuitry can be miniaturized and a set algorithm > figured out. That's why there are professional, competent sweepers. Because the canned toy bug detectors do not and can not work. > Is there any way we could ask users to disconnect all phones, run some > sort of test, and make sure that no devices have been attached and keep > monitoring this...? Any help much appreciated. Nope. What's normal here may cause someone else to mess their pants. Depends on local conditions and how far one is from the central office, quality of materials and workmanship in that country, that community and in that facility, which vary all over from barely adequate to very nice. Each will give different readings. My own office has three phone lines on three separate exchanges, from three separate central offices. Each is a different distance from the central office. Each has different on hook and off hook voltages. If I were a novice, how would I determine which, if any, of my three lines were bugged simply by reading voltages and currents? Can't. A TDR is the primary effective tool, and then only when in trained and experienced hands which have inspected many many lines and know what's normal and what warrants further inspection. Some things really can be done only by an experienced professional, no matter how hard you try to work around this. I commend your ideas, but suggest you do some more research on the matters mentioned above. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 9639 From: Richard T. Gray Date: Fri Sep 10, 2004 4:44am Subject: "The Thing" I just completed a book by the technical director of MI5, who talked about about technology he developed in the late 60's that functioned on the same principle as the "The Thing," which was a wooden seal with a resonate cavity diagram and wire that served as the antenna. The technology he referred to in the book, was an inanimate object, such as an ashtray that based on it's angles would resonate when shot with an RF beam and would act as a microphone. IF this threat was available in the 60's I could only fathom what is available today from the intelligence agencies. The police department I work for would kill for such technology to utilize with court ordered operations, yet I have never seen anything similar to this in the catalogs we get. (We must not be on the right mailing list :) I have attempted to research this technology on the Internet, but have only developed newspaper articles on "the thing." Anyone with links to technical papers on this subject would be greatly appreciated. I have a couple questions regarding Resonate threats: 1. What is the most probable freq. that would be targeted at such devices? 2. Is there any equipment that you could purchase that would project a wide range of freq. within your sweep area and listen for any object to resonate sound? If not, how could you adequate assure that no such device is within the protected area? The RF source may not be present at time of sweep. 3. If the RF source was present from the threat, would it carry the sound in a modulation that you could listen to with a normal scanner equipment or would you have to run a filter or special equipment to listen to the sound on the RF? Thanks in advance for any comments on this topic. Ricky Gray Rayne Police Department 337.207.6999 Richard T. Gray Jr. The Focus Group, Inc. A Professional Investigative Agency PO Box 62582 Lafayette, LA 70509 337-207-6999 Voice 877-762-4122 Fax 9640 From: Date: Fri Sep 10, 2004 10:44am Subject: [Fwd: It ain't all high-tech] -------- Original Message -------- Subject: It ain't all high-tech Date: Fri, 10 Sep 2004 10:04:44 -0500 From: brnsike@s... Reply-To: brnsike@s... To: brnsike@s... Posted on Tue, Sep. 07, 2004 Tape recorder bugs Weatherford friends By Gale M. Bradford Special to the Star-Telegram WEATHERFORD - For more than 20 years, the five members of the Weatherford Men's Business and Professional Club have gathered weekly for lunch at a local restaurant, mostly to talk about life. Occasionally the five friends, all with ties to Weatherford College, discuss goings-on at the school. It appears that their conversations are also of interest to someone else. On Aug. 19, the group discovered a listening device beneath their table at the Chuckwagon Restaurant. Parker County District Attorney Don Schnebly is reviewing the case. "We were shocked to find the recording device," retired Weatherford College teacher Merle Bull said. "We don't know for certain who planted it, and we believe it's probably not the first time it's happened. I hope they (the district attorney's office) do a full criminal investigation, and if they find enough evidence, I hope they will prosecute." The other club members are teachers Nancy McVean, Quinton Reeves and Kent Miller, plus retired teacher Max Ratheal. All five are possible witnesses in a wrongful-termination lawsuit filed by instructor Morri Hartgraves against Weatherford College; college President Don Huff; Vice Presidents Arleen Atkins and Duane Durrett; board members Pat Hamilton, Roger Grizzard, Clarence Culwell and Jean Bryan; former board member Raymond Curtis; and four faculty members. Hartgraves, who began teaching science at the college in 1994, contends that Huff demoted, then fired him, in February 2002 for criticizing the college's reluctance to hire women and minorities. The parties will go to mediation this month in Fort Worth, according to Truman Dean, a Cedar Park attorney who represents Hartgraves. The club members are friends of Hartgraves, who now teaches at South Plains College in Levelland. They said they are curious if the tape recorder is related to the lawsuit. Bull, Reeves and Miller said at last Thursday's lunch that they might consider legal action against whomever was involved in recording their conversations. McVean said she would not, but that she is still amazed by the actions. "Taping private conversations is unethical, illegal and I wish the whole thing would go away. ...," she said. "It's hard to work in an environment where you're worried that someone is listening to your private conversations." Miller found the device, with its red light on, stuck to the underside of the table. Bull said he detached the device. "After making a few derogatory remarks ... I punched the `off' button and the red light went out. ... It had two layers of double-sided tape, which had held it to the bottom of the table top. ... "We asked our waitress if she knew anything about it. ... She said that a man and woman had been sitting there shortly before we arrived," Bull said. "She also said that two people had been coming in either before we arrived or after we left for at least a couple of weeks. ... They would ask about the Weatherford College people who ate there." A waitress at the restaurant confirmed that someone arrived at the table after the club members left. Bull said that he intended to return to the restaurant with a college yearbook to see if she or another waitress recognized anyone. But according to Bull, the two waitresses said they had already done that for an investigator with the district attorney's office. The waitresses said that they had been told by the investigators not to discuss the case and refused to identify themselves. Bull took the recorder home with him on Aug. 19. That afternoon, he said, a Weatherford police officer came to his residence and asked for it. The officer told Bull that it belonged to a drug task force. After having the officer sign a receipt for the device, Bull gave it to him. Weatherford Police Chief Jerry Blaisdell confirmed that two of his officers were contacted by Weatherford College instructor Tim Poston on Aug. 19 and were asked if they would assist in retrieving the recorder. Blaisdell said he called the district attorney's staff and turned the recorder over to them. "Tim spoke with Ronny Villerreal. Villerreal went out to the college and met with Poston and Weatherford College Campus Police Chief Paul Stone and some others," Blaisdell said. Poston did not return phone calls seeking comment. Stone said he couldn't discuss the case. Poston was head of the Criminal Justice Department when that course of study began at the college about 20 years ago. He now teaches geology. "During this process, the officers became uncomfortable with what this actually involved," Blaisdell said. "They called me and explained their concerns." Recording without consent can range from a misdemeanor to a second-degree felony, Blaisdell said. College officials acknowledged the investigation in a statement released Friday and said their board of trustees will be briefed on the situation at today's regular meeting. Charles Davis, executive director of the Freedom of Information Center at the University of Missouri in Columbia, said the taping was highly questionable. "All legality aside, it's extraordinarily unethical to hide tape recorders to monitor conversations without the obvious consent of the parties involved," Davis said. "It's very clear in this instance that what someone was trying to do was capture a conservation without anyone knowing it." Davis called the taping intrusive. "These are not folks that are going to be covered by any public meeting law," he said. "This is just an informal social gathering. And to think that your conversations are being monitored by someone and could potentially be used against you in some way, really the violates the very heart of privacy." [Non-text portions of this message have been removed] 9641 From: Richard T. Gray Date: Fri Sep 10, 2004 5:53am Subject: Fiction book recommendation Can anyone recommend any fictional books that the author utilizes technical threats or TSCM throughout the story? Thanks in advance, Ricky [Non-text portions of this message have been removed] 9642 From: James M. Atkinson Date: Fri Sep 10, 2004 11:47am Subject: Kidnap Warning in Mexico I would like to give list members a safety heads-up. I have information from a reliable source that a terrorist group is soliciting TSCM people to come to Mexico under the guise of performing bug sweeps and security consulting for a major petroleum company. Once in Mexico these terrorists kidnap the TSCM or security person and hold them hostage, steal their equipment, and so on.. Also, they are pressuring TSCM firms near the Mexican border to just "drive down" with their equipment, and asking a lot of personal details of TSCM folks (ie: Parents contact data, if they are married, do they own a house, etc). The "customer" is offering hundreds of thousands of dollars for a small sweep, but they insist of making payment in person to you once you arrive. They have also offered to provide several people with first class airfare, etc. if the (soon to be hostage) will come down to talk about it in person. Be EXTREMELY careful of any queries you get from Mexico, as it may be a kidnap attempt in the making. More to follow. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9643 From: Mark Allen Earnest Date: Fri Sep 10, 2004 10:58am Subject: Re: Fiction book recommendation -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Cryptonomicon touches on the subject a bit Mark Earnest Lead Systems Programmer Emerging Technologies The Pennsylvania State University Public Key - http://www.personal.psu.edu/mxe20/gpgkey.txt On Sep 10, 2004, at 6:53 AM, Richard T. Gray wrote: > > > Can anyone recommend any fictional books that the author utilizes > technical > threats or TSCM throughout the story? > > Thanks in advance, > > > Ricky > > [Non-text portions of this message have been removed] > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (Darwin) iD8DBQFBQc83ooNLpLZfPIMRAgPbAJ9ILUVv9JYY9ru1GlBlHl216jxZtgCgrJM3 bf38GmLOngxHEf1FB89kHOM= =vA3E -----END PGP SIGNATURE----- 9644 From: J. Coote Date: Fri Sep 10, 2004 1:18pm Subject: RE: Fiction book recommendation Richard and List: Some of John LeCarre's novels involving tradecraft include (but do not rely on) clandestine radio or surveillance technologies from the cold war era to the eighties or nineties. If you're a commo person you might empathize with the agent in 'Looking Glass War' or think like the funkpeilwagen operator on the other side. Good novels that would shine even without the gadgets. Some hard sci-fi novels project the "bleeding edge" of technology ten or twenty years info possible futures- other SF stories are more like the imaginings of our TSCM "clients from hell" on a bad medication day. Too many stories and authors to put down here. I've been noticing more hard SF stories using nanotechnology- molecular sized machines and electronic devices. Jay -----Original Message----- From: Richard T. Gray [mailto:ricky@l...] Sent: Friday, September 10, 2004 3:54 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Fiction book recommendation Can anyone recommend any fictional books that the author utilizes technical threats or TSCM throughout the story? Thanks in advance, Ricky [Non-text portions of this message have been removed] 9645 From: James M. Atkinson Date: Sat Sep 11, 2004 11:31am Subject: Kidnaping in Mexico Here is a few articles that you can read for a better understanding of the kidnapping cottage industry in Mexico. http://washingtontimes.com/world/20040906-102131-9688r.htm Kidnappings take a toll By Niko Price ASSOCIATED PRESS Published September 7, 2004 MEXICO CITY - With a broad grin beneath his black shades, Jesus Solorzano Martinez says he was stupid -- although his language isn't quite that pretty. Solorzano is a rarity in Latin America -- a kidnapper who got caught. His first and only kidnapping netted duffel bags full of neatly rubber-banded wads of bank notes on the outside and cut-up newspaper on the inside. Within hours, police were at his door. Now 52 and a 14-year veteran of Mexico City's Northern Penitentiary, he regrets what he did -- or rather how he did it. He says he should have gone for easier targets and asked for less than the $19 million ransom as his younger counterparts do these days. "You go to a nice neighborhood and pick up practically anyone off the street," said Solorzano, who is serving a 35-year sentence for kidnapping a textile magnate. "You ask for [$17,000], and they pay without complaining. If you do five of those a week, pretty soon you're rich." Wave of crime Latin America is in the throes of a kidnapping epidemic -- an increasingly brutal and lucrative crime wave that is spreading terror throughout society and sending businesses fleeing to safer parts of the world. Latin America accounts for 75 percent of the world's abductions, according to London-based consultants Control Risks Group. The insurance industry estimates more than 7,500 kidnappings a year in Latin America, but analysts say those statistics and government counts aren't reliable because so few kidnappings are reported -- 1 in 10 by some estimates. "Latin America is the home of kidnapping, and it's where the great majority of kidnappings take place," said Rachel Briggs, head of international programs at Demos, a London think tank. As the wealthy shut themselves off behind elaborate alarm systems, armored cars and bodyguards -- or simply flee to Miami -- kidnappers are increasingly turning to Latin America's middle classes, choosing victims with less care and treating them with more brutality. Criminals see kidnappers win huge ransoms and prosecutors win few convictions, so many car thieves and drug smugglers switch to what they perceive as a less risky and more lucrative business. As the fear spreads, the public is becoming frantic. Hundreds of thousands of people are taking to the streets to demand that their governments take action against the crime wave, and the fortunes of several Latin American presidents are tied to their responses. But the bitter reality, many analysts say, is that there is little anyone can do to halt kidnappings, at least in the short term. The booming kidnap industry nets hundreds of millions of dollars in ransom each year. And like any business, they say, it will continue to thrive until it is no longer profitable. Costly peace of mind The threat of kidnapping long has led Latin America's upper classes to retreat into fortresses. High walls have risen around homes, and high-tech alarm systems are ubiquitous. Executives shuttle from office to home in armored cars and are guarded by well-dressed bodyguards wearing Secret Service-style earphones at fashionable restaurants. Such protection doesn't come cheap. Vagner D'Angelo, head of corporate security in Brazil for the risk-management group Kroll Inc., estimated that for a company vice president, the minimum security costs would run $80,000 the first year. NBA star Manuel Ginobili said he invested in tight security for his family in July. Police in his native Argentina intercepted telephone calls indicating that kidnappers were targeting his family as he negotiated a multimillion-dollar contract to continue with the San Antonio Spurs. "There's always a car outside. Security people are following them and taking care of them," Mr. Ginobili said. "It's not easy to go visit your friends and have a guy next to you, but we have to accept the consequences because this is not a joke." 'Quicknappings' One effect of the wealthy's retreat behind barriers is that kidnappers increasingly are targeting Latin America's middle classes -- and even the poor. In the past few years, the region has seen a blossoming of a new kind of abductions, variously called "quicknappings" or "express kidnappings." These are kidnappings without the research. Criminals cruise shopping malls, nightclubs or restaurants, choosing their victims on the spot based on the car they're driving, the watch they're wearing or the company they're keeping. Such kidnappings often are quite brutal. "Because they don't know how much money you have or where you have it, they figure they can beat that out of you," said Frank Holder, president of Kroll's investigations, intelligence and security group in New York. "They have a high propensity to violence because they haven't done their homework." Often such kidnappings are quick. Victims are forced to withdraw their daily limit from their ATM card, then are sometimes held for another day or two to repeat the process. If the kidnappers catch a whiff of serious money, they can begin more traditional ransom negotiations. Jorge Terrats, a 37-year-old hairdresser in Mexico City, said his two kidnappers were violent from the moment they burst into his taxi. "They hit me in the face and pushed me onto the floor with a pistol to my back," he said. "When I told them I didn't know the PIN number for my bank card, they hit me some more." His kidnappers made off with $80 in cash from his wallet and the daily limit in his bank account. They also took his jacket, his belt, his rings and even his shoes before dumping him three hours later in a scary neighborhood an hour's drive from home. "I didn't leave my apartment for a week, I was so afraid," he said. Fighting back As the list of potential victims expands to include just about anybody, fear is spreading through society. Restaurants, theaters and nightclubs are watching patrons disappear, and young people are becoming virtual prisoners in their own homes. "The decent people are living in jails, and the criminals are walking the streets," Juan Carlos Blumberg said from Buenos Aires. Mr. Blumberg, a textile businessman, has become the voice of Argentina's outrage after his son, Axel, was abducted in March in an opportunistic kidnapping. Mr. Blumberg negotiated the ransom down to $6,000, but the kidnappers killed Axel after a shootout with police. At his son's wake, Mr. Blumberg heard Axel's friends ask one another, "Who's next?" "I told them I would fight so that no other kid would go through what my son did," he said. Mr. Blumberg led two marches in April that drew hundreds of thousands of angry Argentines into the streets. In a country of 36 million people, he has collected 4.9 million signatures on a petition for tougher anti-crime measures. Mexico, too, has seen a wave of middle-class anger erupt into the streets. In late June, hundreds of thousands of people dressed in white marched through Mexico City to protest crime that has spun out of control. "People are waking up," said Fernando Schutte, one of the organizers of the march. But in July, after his nephew was kidnapped for the second time, Mr. Schutte said he was giving in. "I'm sending my family to live in another country," he said. "I've tried to make my children dedicated to their country, and it's very sad that I have to do this." What the citizens' groups are demanding is nothing less than a cultural revolution. They want an end to the corruption that pervades most Latin American societies, a remaking of their judicial systems to create U.S.-style jury trials and dramatic new investments in police, courts, education and social programs. They also want harsher penalties. Small steps Some governments have begun to respond. In Argentina, because of the overwhelming popular support for Mr. Blumberg's demands, the government lowered the minimum age for kidnapping convictions from 16 to 14 and removed the possibility of bail for many types of kidnapping charges. Colombian President Alvaro Uribe, facing similar demands, has used the military to go after the guerrillas responsible for most kidnappings, with some success. Colombia is the only country in the region where kidnappings are dropping. According to Pais Libre, a victims' support group, kidnappings fell from 3,706 in 2000 to 2,201 last year. Police in Sao Paulo, the state where most of Brazil's kidnappings occur, enlarged their antikidnapping squad and increased training. The government says the number of kidnappings is falling, although security analysts -- and many residents -- are skeptical. Two weeks after the Mexico City march, President Vicente Fox pledged an extra $87 million for law enforcement this year and said he would double the 2005 budget for fighting crime. But activists criticize the government for what they call a failure to implement their demands. Government action could help, but analysts insist that to bring kidnapping under control, it isn't enough. Societies themselves will need to change. "What people are doing is banging on pots and pans and hoping that the government will take care of the problem," Mr. Holder said. "What it would take is less-corrupt police, less-corrupt judiciary, investment in resources and preventive programs and civil society getting more involved. "For that to occur," he said, "you're talking about decades, not years." http://washingtontimes.com/upi-breaking/20040609-060436-4537r.htm Kidnappings still plague Mexico By Eliza Barclay UNITED PRESS INTERNATIONAL Washington, DC, Jun. 9 (UPI) -- Kidnapping in Mexico has long been a lucrative industry that has plagued the country's psyche with fear and filled the pockets of plotters and conspiring law enforcement officers. While federal data from the Mexican Attorney General indicates that the country's kidnappings are on the decline, experts say official conclusions are wrong. The Mexican daily El Universal Wednesday obtained a report from the Attorney General's office, which cited that only four remaining kidnapping groups in the country are large enough to be classified as organized crime rings. According to the document, the PGR has broken up over 45 groups dedicated to the crime and arrested 292 kidnapping suspects since President Vicente Fox took office in 2000. It also claims to have rescued 424 victims, and that only 5 percent of all ransoms demanded by kidnappers have been paid. But Mexican crime experts say the real figures on kidnappings and other crimes could be five times as high as the government figures. The government's numbers are inaccurate in part because many victims are unwilling to report crime out of fear of neglect from the notoriously corrupt police. RenÈ JimÈnez Ornelas, who tracks kidnappings at Mexico's National Autonomous University (UNAM), told El Universal he estimates there are around 3,000 kidnappings a year. "Mexico has a history of complicity between law enforcement an actual kidnappers," Armand Peschard-Sverdrup, director of the Mexico project at the Center for Strategic & International Studies in Washington, DC, told United Press International. "As a result, law enforcement is still seen skeptically by the Mexican people." Mexico City police are known for frequently enhancing their modest salaries with bribes for traffic offenses and other small transgressions. And authorities have reported instances of police taking part in hold-ups and kidnappings. Guillermo Velasco Arzac, the director and president of Mexico United Against Delinquency, a civil organization, announced June 2 Mexico ranks second in the world for the highest number of kidnappings registered each year. "The phenomenon of kidnapping in Mexico is derived from the lack of coordination between the country's political bodies," Velasco Arzac said. Velasco Arzac, also a member of the Civic Advisors for Public Security and Justice, said a change in Mexican penal laws is urgent. He added the number of abductions in the country "as it continues to be high, is occupying second place in the incidence of this crime" at the global scale. Nevertheless, he signaled that year after year the number of this type of crime has gone down in Mexico. But he asserted because "the bands of kidnappers have not fallen apart," the phenomenon of kidnapping continues to register high incidence in the country. Velasco Arzac said additionally the penal laws are obsolete and insufficient for attacking the problem. Meanwhile, President Vicente Fox said Wednesday his government is not evading its responsibility around kidnappings and guaranteed that it will redouble its resources and collaboration with states to combat the illicit crimes. In a recent report from the Economic and Social Council of the United Nations reported that in the last decade kidnappings have multiplied in countries like Mexico, Spain, Germany, Poland, the United Kingdom, and Trinidad and Tobago. Mexico exemplifies the gravity of the phenomenon, which has doubled its figures between 2001 and 2002 from 245 to 464 incidents of kidnapping, according to the report. Armand Peschard-Sverdrup noted that the prevalence of kidnapping in Mexico is a small part of a much broader problem that beleaguers Mexico's judicial system. "As long as Mexico has a problem of impunity and a lack of professionalism among the Mexican law enforcement, problems like kidnapping will continue," Peschard-Sverdrup said. "But the Attorney General has done an incredible job of professionalizing the federal law enforcement so far." Mexican Attorney General RafaÈl Macedo has created a Mexican version of the Federal Bureau of Investigation, called the Agencia Federal de Investigacion. Most promising, Peschard-Sverdrup said, is President Fox's comprehensive judicial reform proposal which will come up in the next Congressional session beginning in September. "Judicial reform will be an important part of the upcoming legislative debate," Peschard-Sverdrup said. http://news.independent.co.uk/world/americas/story.jsp?story=557264 Mexico City: The new kidnap capital of the world 05 September 2004 Leaning back in a chair in his Mexico City office, systems analyst Roberto Garcia winces as he remembers the phone calls. The commands were simple. "Pick up the receiver by the second ring or we will beat your nephew until he bleeds. Fail to make the ransom demand and we will send him back to you in pieces." Scooped off the streets of the Mexican capital as he went out for a hamburger near his home in the modest Iztapalapa neighbourhood, the youngster was held bound and blindfolded for five weeks. Threatened, abused and alone as his family scrabbled to pull together 1m peso (around £50,000) ransom, the middle-class Garcia family were thrown into a terrifying new world - but one that is becoming ever-more familiar to Mexicans. "We thought that we wouldn't be vulnerable to kidnapping because we don't have the kind of money they ask for," says the soft-spoken 64-year-old as he recalls the ordeal. "Now the poor, the middle-income and the rich are all being targeted. Kidnapping has become an industry." In a recent report, international risk consultants Kroll Inc estimated that some 3,000 people were victims of kidnapping in Mexico last year - around 20 times the number actually reported to the country's notoriously corrupt police force - placing the fast-modernizing nation of 100 million people second only to strife-torn Colombia in the global kidnapping league. In June, the wave of abductions triggered the largest street demonstrations seen for a decade in Mexico which in turn led to the resignation of the country's public security minister. The kidnaps also form the chilling backdrop to Man on Fire, a fast-paced thriller by British director Tony Scott that premiere's across the UK next month. While abductions are rife throughout the country, Mexico's vast capital bears the brunt. The largest city in Latin America with 20 million residents, smog-choked Mexico City is ringed by a dizzying labyrinth of cinder-block slums and has an urban sprawl that covers an area twice the size of Greater London - few taxi drivers claim to know more than half of its streets. The city is also home to 18 well-organised kidnap gangs that have an ever-broader range of carefully chosen victims. Drawing on a range of conspirators including policemen, bank clerks, domestic servants and security guards at residential blocks across the capital, these gangs work up a detailed profile of their victims that enables them to choose a window of opportunity for the kidnap and set a realistic ransom. Whereas abductions were once cyclical, analysts say the activity now forms a year-round "war without quarter". "It used to be that kidnappings would pick up just before holidays such as Mother's Day, Christmas and Holy Week because the criminals needed the money to party," says Max Morales, a Mexico City security analyst who is widely regarded as one of the country's foremost authorities on kidnapping. "But we started this year freeing two people on 4 January and there is no longer any respite." The ransom market is thought to be worth in excess of $100m (£56m) a year. This huge pot is now also luring a range of opportunistic criminals from across Mexico City and beyond. The emerging gangs are less business oriented and more emotional than their predecessors and, as a result, more violent. Since the beginning of 1996, Mexican kidnappers have shot, stabbed and strangled over 160 of their hostages, with more than half of the fatalities occurring during a surge of criminal activity in the past three years. In one recent case that sickened crime-weary Mexicans, two young brothers were shot dead and their bodies tossed in a skip even after their parents paid a $600,000 (£335,000) ransom. Another case in July involved the kidnap and murder of Mexico's 1997 Woman of the Year, Carmen Gutierrez. A highly regarded specialist in rehabilitative medicine, Gutierrez was snatched as she left her smart apartment complex. Her abductors became jittery during negotiations, strangled her and tossed her body in a sewage canal on the city's outskirts. Then, noticing that she was still alive, they held her head under the water until she stopped breathing. Most in Mexico find it difficult to conceive of anyone being capable of such brutality. Some clues as to what types of people the kidnappers might be came in a recent profile of six gang leaders that was leaked by the AFI - Mexico's equivalent of the FBI - to the newspaper Reforma. The profile showed them to be long-term offenders with a history of crimes including assault, robbery, extortion and murder, who had spent years in the brutal prison system. Rounded up in separate swoops during the first half of the year, these mafia leaders had nicknames common in the Latin American underworld, including El Alacran and El Duende - The Scorpion and The Goblin - and liked to spend the freely flowing ransom money on baubles including white-gold watches and fast motorbikes. They were also armed with weapons including Uzi submachine guns, fancy Beretta, Colt and Taurus pistols and AK-47 assault rifles - known in gangland slang as the "cuerno de chivo" or "goat horn" because of its distinctive curved ammunition clip. As in Scott's film, the Santa Muerte death cult also figured large in their stories. The scythe-wielding figurine of Our Lady of Death is revered by gangsters, thieves and prostitutes in the capital's crime-ridden Tepito neighbourhood who call on her for protection. Spurned by the Catholic Church, the cult has spilled out of the barrio and now counts policemen and politicians among its tattooed and talisman-wearing devotees, and has chapters as far away as Los Angeles. The kidnappers do not work alone. Victims' testimonies routinely include accounts of "arrests" by uniformed police officers who have used their squad cars to pull over intended targets. Among those charged for several recent abductions are current and former employees of the various branches of the federal and municipal forces. In June, a group of elite officers was detained after abducting a businessman with the aid of false arrest warrants. In a bid to cover their tracks and protect one another, corrupt, high-ranking officers band together in a secret group called La Hermandad - The Brotherhood. La Hermandad links the underworld gangs of the city's shantytowns to the upper echelons of the authorities, who profit from criminal endeavours ranging from drug trafficking to extortion. "What you have to understand," says Morales, as we talk in his offices high above the thrumming traffic of the capital's smart Colonia del Valle district, "is that police corruption is not just a matter of taking bribes to turn a blind eye but of policeman who are active kidnappers. What's worse is that people charged with cracking the corruption continue to tolerate it." So real is the fear of high-level corruption in law-enforcement circles that Mexico's attorney general, Raphael Macedo, recently had microchips implanted beneath the skin of 160 top federal prosecutors and investigators to ensure access to a highly sensitive new crime database that went live last month was secure. The devices, manufactured by the Florida-based VeriChip Corp, carry unique identification codes to foil attempts by impostors trying to gain access to the network. While Mexico's law-enforcement community struggles to combat the corruption that threatens it from within, wealthy Mexicans are going to ever-greater lengths to protect themselves, turning to the private security companies piling into a booming market now worth hundreds of millions of pounds each year. It is estimated that up to 1,000 firms are currently offering security services, ranging from those supplying baton-toting guards to shopping malls, to a dozen or so companies that offer top-of-the-range VIP protection packages. The most comprehensive deals on offer include risk-assessment services, employee screening and crisis management - shorthand for kidnap negotiation in a worst-case scenario. Also popular are armoured cars. The leading specialist in this market, O'Gara-Hess & Eisenhardt, pegs the number of companies offering top-flight vehicle armour in the Mexican capital at 50, almost double the number five years ago. Piling state-of-the-art materials - including Kevlar, aramid fibres, blast- and bulletproof steels, and 2.1mm-thick ballistic glass - into the bodies of luxury European and American cars, is a $28m-a-year (£16m) industry in Mexico. But with the simplest armour starting at $20,000 (£11,000), and the cost of providing armed guards for a family of four at $50,000 (£28,000) a year, protection is out of the reach of most Mexico City residents, four of whom are kidnapped on average each day. A further 70 or so a day, meanwhile, are snatched off the streets in what are known as "express" kidnappings, where criminals (often lurking among the city's taxi cabs) force their victims to withdraw money from their bank accounts before releasing them. In late June, up to a million demonstrators dressed in white packed the streets of the city to demand government action in the biggest protest that the country had witnessed in more than a decade. The march, which filled the city's eight-lane Reforma thoroughfare from gutter to gutter, later claimed the scalp of Public Security Minister Alejandro Gertz, who stepped down in the face of such strong criticism. "The rally's success didn't surprise me as crime is now one of Mexicans' greatest worries, although it may have taken some politicians by surprise," says march organiser Fernando Schutte from the office of his family estate agency in the city's colonial San Angel district. "Public security is the state's primary reason for being, and if it isn't providing it, then you have to go out and demand it. I don't want to hear speeches, I want to see results," he adds. While Mexico's law enforcement and justice system is choked by corruption and a lack of resources that frustrates the best of political intentions, even the most severely tested in the crime-blighted capital share Schutte's steadfast conviction that the police and criminal-justice system must be made to work. Among them is accountant Eduardo Gallo, whose 25-year-old daughter, Paola, was snatched four years ago by a kidnap gang and shot dead despite the prompt payment of a ransom. Facing indifference from prosecutors, Gallo singlehandedly tracked down Paola's killers in an 11-month manhunt that took him right up to the US border. Although there were moments when Gallo may have considered exacting his own brand of justice, in the end he simply handed the kidnappers over to the courts. "It wasn't so much that I had the faith or confidence that the system of justice would work, but the alternative was to kill them," he says. "My parents brought me up with respect for the law, for society and for people's lives, and these were the values that I had passed on to my own children. I couldn't simply throw that aside when faced with a problem." 'Man on Fire' opens on 8 October EXPRESS KIDNAPPING: Maria Jose Cuevas, graphic designer, 32 Cuevas was pulling up outside her home (where she agreed to be photographed here) in the capital's fashionable La Condesa neighbourhood on a quiet Sunday evening in late spring. As she parked her VW, she felt the presence of a man nearby. "I turned and saw that he had a pistol. He told me to get in the back of the car, then two more men got in: one up front accompanying the driver, and one in the back with me. All three were about 20 years old and had guns. "The situation was desperate. I had a pistol pressed into my ankle and another stuck into my ribs. You are in your own space, your car, but you don't have control over it or anything else. Outside, you see life going on as if nothing was happening, and you can't call for help. "My father is one of the most famous painters in Mexico - Jose Luis Cuevas - and at first I didn't know whether it was a kidnap that would last several days and end in a ransom demand, or if it was a so-called express kidnapping that would last just a couple of hours. But when they asked who my family was, I started to calm down a little as it looked like it was just random. "They asked for my bank card, and they drove to three or four ATMs to withdraw cash. By sheer luck I only had 10,000 pesos (around £500). I told them to check the balance, and they believed I didn't come from a rich family. "After they got the money, they carried on driving around and I got very anxious about where they were taking me. They hurl every kind of clichÈ at you to frighten you. They tell you you are going to sleep in a cellar - like a proper kidnap. They say they are going to take you out on to the highway, implying that they are going to kill or rape you. "Inside I was dying of fright, but I was chatting to them and outwardly very calm. I was telling them how the situation in Mexico was very difficult, and that I didn't agree with robbery or hold-ups but I understood why they did it. I was becoming their accomplice. "After about three hours, they decided to let me go. They parked up in a dark street. When everyone else had got out of the car, the driver reached out and squeezed my shoulder. He stayed looking right into my eyes for a few seconds. It was a little moment in which I felt like he was both trying to ask me to forgive him and thanking me." KIDNAPPED BY POLICE: Miguel Castillo, marketing director, 35 Castillo was leaving the bakery he worked at in the capital's Barranca del Muerto district at around 9.30pm on a spring evening when he found the path to his Volkswagen GTI blocked by a federal police squad car. "The police forced me to get out of my car, saying that it was stolen. Three or four officers then threw me face down into the back of the car and put their feet on top of me. They drove off with the radio turned on loud so that I couldn't figure out where I was going. I still don't know which route they followed. "They handed me over to some civilians who held me captive in a safe house. I was stripped naked and placed in a completely dark room with a cement floor. They tied my left hand to a concrete post with wire, and left me there for five nights and six days. "Their mistreatment was systematic. They didn't feed me. They beat me frequently, and they told me they were going to kill me. It was a psychological game. When they came for me, they always shoved a torch right in my face so that I couldn't identify them. You feel complete impotence as your life depends entirely on your kidnappers' attitude and moods. "I had to identify my family and give them their details. It wasn't until the fifth day that they finally got in touch with them. My family was going frantic with worry as they had no idea where I was. They paid a ransom [he declines to say how much] and I was put back into the boot of my car and taken for a drive. "They left me in the countryside in Morelos state - adjacent to Mexico City. After the sound of voices had receded, I began to call for help. A farmer heard me and helped me to climb out through the back seats. I went to a nearby house and used the phone to call my mother. "It has left me with a lot of anger because of the situation they put my family in. If I lost a family member or a friend in a kidnapping, I would want to take revenge." KIDNAPPED IN HIS OWN HOME: Jose Cohen, television producer, 34 Cohen was relaxing at home with his wife and three young children when he got a call from work. A colleague needed a telephone number, so he took the lift (which he returned to for the photo you see here) down from his 10th-floor apartment in the capital's swanky Polanco district to fetch his laptop from his car. "When I pushed the elevator door open, a 9mm pistol was pointing in my face. I was told to close my eyes and look down at the floor, and I just remember seeing a bunch of feet walking into the elevator, at least four of five people. They took me back up to my apartment. It was a kidnap in my own home. "They took us all into the bedroom where the shower was still on, and they tied my wife and me up. They just said to us, 'Keep cool and nothing is going to happen.' The kids were with us and the little one was crying for his bottle, so that was a little difficult. "At first it was very frightening as they were very threatening. They said things like 'You son of a bitch' and 'If you open your eyes, I'll kill you.' But we were lucky because that particular day I had gone to change a cheque as I had to make some payments at the office the following day. I had around $3,000 (£2,000) in my pocket and I gave it to them immediately. "We are not a Rolex family, so they took my wallet, my wife's jewellery, some antique watches inherited from my grandfather and my DVD player and our mobile phones. They were constantly talking on mobile phones, and only later did we realise they had taken over the whole building and were talking to accomplices in other apartments. "After a couple of hours, they left, telling us not to do anything for 45 minutes. I put a chair against the elevator door, which was silly, and turned off the shower. At the end of the day they told me that if we took it easy and played along with their game, they wouldn't hurt us, and that was the most important thing for me, obviously, as I just wanted to protect my family. "Only later when I checked the call log of my wife's mobile phone did I discover that the kidnappers had used it to call one particular number 17 times. I started to do my own investigation, but then decided to drop it. If you live in a place where there is no rule of law, then it's pretty damn scary to go ahead and do something on your own." http://news.bbc.co.uk/2/hi/programmes/crossing_continents/3626331.stm Mexico: A kidnapped society By Charlotte Davis BBC Radio 4's Crossing Continents Whilst the world watches in horror at the rash of kidnapping in Iraq, it should consider looking to Mexico for expertise in kidnap and negotiation. Every Mexican family knows they might have to negotiate the liberation of a loved one. It has become a way of life, though nobody knows how many kidnappings there are here every year. The official figures say there were only 214 kidnaps between 2001 and 2003, but security groups say it is closer to 1,200 in 2003 alone. Being native to Mexico City, Dr Pablo Carstens became a kidnap negotiator more through necessity than choice. He left university as a fully trained veterinary surgeon. But an unconventional career path led from guard dog training into Mexico's massive security business. After showing promise in the negotiation of freeing his own cousin he received formal training from security giant Control Risks and now runs his own security company. He helps liberate about 30 victims a year. Crisis management Pablo assists families through their crisis in a calm, quiet manner, chain-smoking all the way. He took me to his latest negotiation where 32-year-old Mauricio was negotiating the liberation of his father, Pasquale. The family was certainly not as rich as I was expecting. But wealthy Mexicans are increasingly nervy, difficult targets. So kidnappers are now hunting lower down the food chain. The "crisis centre" was Mauricio's sister's modest apartment. Cans of cola and packets of cigarettes were stacked in the corner to sustain them between telephone calls. Poignantly, cheerful family photos on display were a stark contrast to the family sitting tensely in the room. To help Mauricio, Pablo had written prompts on sheets of paper covering the wall, such as: 'We have not got that money', and 'that account has been closed for months'. Prompts usually work well but Pablo confided: "Mauricio is not very bright, he is a terrible negotiator. I must teach him how to speak, how to breathe, so he sounds scared, because the life of the father can depend on this son's performance." Police involvement? When the call came the air was suddenly electric. Pablo frantically wrote prompts on the wall as the tinny voice of the kidnapper rang out, shouting obscenities at the dumbstruck Mauricio. "This is your last chance," he said, "If you do not give us the money he is dead." Mauricio opened and closed his mouth a few times like a goldfish and stammered: "No, No!" It was not just that Mauricio was not a natural communicator that was causing trouble for Pablo. He had discovered that one of Pasquale's daughters, who was pushing for immediate payment of the ransom, was in love with a policeman. BBC Radio 4's Crossing Continents Mexico's kidnap crisis was broadcast on Thursday, 15 April, 2004 at 1100 BST 'It is a possibility that this guy is involved [in the kidnap], he is not a good guy,' he said. Legal representatives of victims claim at least 70% of kidnaps involve police or ex-police participation. I met with a senior anti-kidnapping agent who admitted the problem. "You know about the calls, the tactics, even how to tap phones, to check up on families, the kind of thing the police can do,' he said. I am still cautious with those I have worked with a long time Dr Pablo Carstens 'The problem is that some people just want easy money and know how to do it." When I asked if the rate of kidnap is going down, he said: "It is going up, it is getting worse, the government no longer gives out kidnapping figures to the media because they do not want people paranoid on the street. They do not want to start a national crisis about kidnapping." The relationship between the police and private negotiators is tense. Over time, Pablo has developed a trusting working relationship with a few policemen, but he told me: 'You have to be very careful, no names, addresses, money amounts are written down or given in police files, and I am still cautious with those I have worked with a long time,' he said. 'Rotten society' After four more days of complex haggling and threats, Pasquale was released. It was Mauricio who opened the door to his father at 0300. He had been beaten and had two broken ribs. Pasquale came in to see Pablo for a debrief and we heard the story. He had been abducted by eight men and taken to a house out of the city, where he had been guarded and fed by two of the kidnappers, one of which was a woman. Everyone thinks it is just because the police are corrupt, but that is because the police are part of a rotten society Dr Pablo Carstens At least one other victim was being held in another room. Pablo made efforts to get Pasquale to report the kidnap to the police but Pasquale refused. When the issue was pushed further Pasquale replied: "It is important that the police do not give me trouble. The boss of this group, he was a policeman and he is not any old policeman... If there is some way that they will overlook me, my family, that is for the best is it not?" I asked Pablo what his personal thoughts were on the kidnap problem, and he told me: "Maybe the authorities are saying that in a couple of years there will be not one single case. In reality, it is getting higher. "Everyone thinks it is just because the police are corrupt, but that is because the police are part of a rotten society. "I do not think it is just a police matter. Kidnap here is a social problem." BBC Radio 4's Crossing Continents was broadcast on Thursday, 15 April, 2004 at 1100 BST, and was repeated on Monday, 19 April, 2004 at 2030 BST. http://www.csmonitor.com/2002/0917/p06s02-woam.html Kidnapping thrives in Mexico Congress is slated to debate a law that would crack down on 'express kidnappings.' By Gretchen Peters | Special to The Christian Science Monitor MEXICO CITY AND CUERNAVACA - When HÈctor Pineda Vel·zquez was kidnapped from his ranch in Guerrero state and held by masked captors for more than a month, his family didn't notify the press or ask authorities to help secure his release. They paid an undisclosed ransom. That may seem strange, considering Mr. Pineda is a federal congressman. "Everything was arranged by my family, in particular, my son," a disheveled and distraught Pineda told reporters outside his home in Coyuca de Catal·n on Sept. 6, the day he was released. After the string of highly publicized child-abduction cases this summer, Americans might find it hard to imagine that a kidnapped high-level Mexican official barely makes the news here ñ and receives no official help. But in Mexico, a kidnapping occurs every six hours on average. Mexico is now second only to war-torn Colombia in the number of annual kidnappings. While few victims are killed, few perpetrators in this thriving multimillion-dollar industry are ever caught. "In the US, the great majority of the kidnapping cases are solved," says Walter Farrer, the Mexico operations chief at the security firm Pinkerton and Burns International. "Here, it's a business, and as awful as it sounds, it is treated as a transaction." And business is up. The Mexican business association, Coparmex, which tracks kidnapping, lists 331 reported cases so far this year, compared to 221 in all of 2001. The actual figure, however, is estimated to be three or four times higher. According to various studies, fewer than a third of families here ever report a kidnapping, apparently out of fear that Mexico's corrupt and inefficient police are either involved in the crime or will botch any rescue effort. Moreover, the common "express kidnap" ñ in which a victim is briefly abducted, forced to withdraw money from ATMs, and then released ñ is considered violent robbery under Mexican law. Government statistics indicate there are more than 10 express kidnaps a day here ñ or about 4,000 a year. Mexico's abduction problem has spawned a billion-dollar-a-year private security industry, which provides rich families and big businesses with bodyguards, armored cars, prevention training, and kidnap negotiators. Wealthy families have been known to pay as much as $30 million in ransom, though Mr. Farrer and others say the average asking price is around $280,000 and the final payment usually negotiated to about $19,000. Another new trend is the "virtual kidnap": gangs go for young professionals driving expensive cars, and usually negotiate their ransoms and releases within about 36 hours. "They go for volume and speed to reduce the risk," says Farrer. "Often, they don't even steal the car, which would be easier to trace." The growing number of kidnappings has yielded new products catering to kidnap fears. Volkswagen has introduced an armored version of its Passat sedan to the Mexican market. Advertisements show a mock abduction attempt foiled by the bullet- and flame-proof car. Victims of a wave of kidnappings in the 1990s in Cuernavaca, in central Morelos state, say the trauma shredded the fabric of their affluent community. "I would say about 80 or 90 percent of the 'kidnappable' people here were kidnapped," says student Gerardo Cortina, who was held for 15 days after armed men nabbed him as he was leaving his university one evening. "We all asked ourselves, 'Who's next?' " Many victims simply packed up with their families and left Mexico. "Anna," who didn't want her real name used, moved with her family from Cuernavaca to Dallas after armed men broke into their home in 1995 and kidnapped her for 30 hours. She recently returned to Mexico after giving birth to a son. "Now that I am a parent, I can't imagine what my parents went through," she says. Seven years later, "we still call each other every 30 minutes to check everyone is OK." Though kidnap victims in the US are more likely to be killed, Mexico's highly organized kidnap gangs usually threaten to injure their victims if families don't raise ransoms quickly. Some are known for sending body parts, often a finger or an ear, to show they're serious. "I'm still filled with fear," says Pedro Fletes, whose captors threatened to cut off his finger when he was kidnapped last year in Mexico City. Mr. Fletes recently started an organization offering counseling for victims and their families, and meeting with the government to help track kidnap gangs. "I'm adamant that someone has to do something," he says. Fletes isn't the only private citizen who has taken it upon himself to address Mexico's kidnap problem. Other more secretive groups track kidnap cases, meet privately with trusted government officials, and provide various forms of assistance to families when a loved one is taken. Alberto, a businessman and member of one such group who wouldn't be identified by his full name, says kidnapping is no longer just a problem for the rich. "We're seeing more cases in small villages where a shop owner is kidnapped for somewhere around 5,000 to 10,000 pesos [about $500 to $1,000]," he says. Mexico's government insists it is taking action. On Saturday, the justice department announced the sentencing of a jeweler-turned-kidnapper known as "the colonel" to 18 years in prison, along with five of his associates. Congress will soon consider legislation to stiffen penalties on express kidnaps. And the newly formed Federal Investigation Agency, a force similar to the FBI, has rescued 133 kidnap victims in less than two years, and nabbed more than 80 members of kidnap gangs. Last week, federal police arrested 13 members of a kidnap gang known as "the Ranchers" in an operation in central Puebla state, rescuing a 63-year-old victim. But critics say dozens of more dangerous groups are still operating, and it's usually low-level worker bees, not kidnap masterminds, who get caught. http://www.isn-inc.com/html/article_10.html Mexico: Kidnapping the new cottage industry By Guy Gravino, Sr., President, Whiskey Seven With the proliferation of crime in Mexico, due to corruption, drugs and economic disparities, a low risk high yield cottage industry has re-emerged within the borders of our neighbors to the south. Although kidnapping has been around for sometime, the resurfacing of this crime, offers as much potential for the common criminal as it does the terrorist and the drug trafficker. In recent years, Mexico has advanced its position with regards to kidnapping, becoming second only to Colombia. To the lay person, the obvious motivation for the crime of kidnapping is monetary gain as in the case of Daniel Arizmendi known as Mexico's infamous "ear cutter". This name was give to Arizmendi because of his standard operating procedure of removing an ear, or other body part to send to the hostage's family with his demands, earning him a reputation of a no nonsense criminal. Arizmendi, who was captured in August 1998, has been accused of 200 kidnappings in which he and his organization amassed $40 million in ransom. The former police officer Arizmendi allegedly achieved this wealth with the protection of the police and judges who were on the kidnapper payroll. To the more informed, kidnapping is much more complex. In Mexico, revolutionary groups, such as the Popular Revolutionary Army (EPR) are conducting guerrilla warfare against, in the EPR's words, a corrupt and repressive Mexican government. The EPR and other opposition forces employment of kidnapping has been targeted against both political and innocent civilians, demanding the release of brothers in arms, political prisoners and operational financing. The drug lords in Mexico have become the biggest drug traffickers in the world overtaking the Colombian Cartels. They provide the United States (the largest drug consumer) with 75% of its cocaine and 50% of its marijuana. When President Ernesto Zedillo, a Yale economist, took office in December 1994, he vowed to fight the powerful drug trade, however, the drug traffickers wasted no time in sending a message to the new untested President. On March 15, 1995, local police officers in Mexico City attempted to carjack President Zedillo's eldest son in broad daylight. Bodyguards in a separate car moved in before shots were fired leaving the world no doubt how powerful and far reaching the Mexican drug cartels have grown. As a former Special Forces Operator and an Anti-terrorist Instructor, my purpose for such articles is not to persuade people not to visit Mexico, or any other destination. On the contrary, it is to make people more cognizant of the situation, to help people exercise caution by learning to employ individual protective measures (IPM) for themselves and loved ones. There's a bonus to the employment of IPM's, they work just as well in a domestic situation as in a foreign situation. In my next article I will discuss Mexico's, number 2 kidnap rating and how the North American Free Trade Agreement (NAFTA) helped accelerate Mexico's climb to this dubious rating. Mr. Gaetano A. Gravino, Sr., Telephone: (302) 652-4402 E-mail: WHISKEYSEVEN@P... http://www.mexidata.info/id217.html Column 061404 Thompson Monday, June 14, 2004 Kidnappings are out of control in Mexico By Barnard R. Thompson Mexicoís crime wave continues, with violent kidnappings for ransom, extortion or worse rising to tsunami levels in greater Mexico City. And while many, in desperate hope for the safe return of kidnapped family members and loved ones meet ransom demands, time and again the victims are found dead, often with clear evidence of torture and abuse before their brutal murders. No longer a cottage industry targeting the privileged few, today nearly everyone, rich to middle class to those of lesser means, faces the threat of kidnapping by organized gangs or the unorganized. Kidnapping for ransom demands are tailored to the victims, and if family or friends lag in paying even small amounts they may be sent crudely amputated body parts as a sign of worse to come. There are ìexpress kidnappings,î with victims carjacked or otherwise driven (often in taxis they foolishly hail on the street as some cabdrivers work in concert with other criminals) from one bank or ATM machine to another until a victimís credit and cash withdrawal card funds are exhausted. In recent weeks five more heinous murders of kidnap victims in Mexico City have pushed citizens to unprecedented levels of outrage. As such, people are protesting the ìsevere national security problem,î while at the same time demanding not just protection but also for real action to be taken at all levels of government against the steady flood of crime. A social mobilization is growing, started to a degree via the Internet and electronic mail. Anticrime groups and organizations are being formed; federal, state and municipal officials are being called to task; stricter laws are supposedly being drafted; and a major march and demonstration against kidnappings and violence is planned for June 27 in Mexico City. On June 2, the Mexico City newspaper Reforma published an interview with Diego Ricardo Canto, identified as a consultant with Kroll Inc., that touts itself as ìthe worldís foremost independent risk consulting company.î One division of Krollís victim services is The Kidnap for Ransom Practice, that reportedly deploys ìcase officersî worldwide to assist clients. According to Canto, who referred to a Kroll study, in 2003 Mexico ranked number two in Latin America with 3,000 kidnappings, second only to Colombia where 4,000 such crimes were committed. He added that 50 percent of all kidnappings worldwide are in Latin America. A representative of the Citizens Council for Public Security and Criminal Justice, JosÈ Antonio Ortega S·nchez, said in the same Reforma piece that murders resulting from kidnappings have become commonplace in many areas of Mexico. On a national basis, Ortega has also said that reported deaths from kidnappings since 1996 total 162, with the annual figures getting progressively larger. It should be noted that many kidnappings go unreported in Mexico. According to studies by the National Autonomous University of Mexico, over 90 percent of kidnappings are not reported to authorities due to faithlessness in police and government officials. The Kroll interview, coupled with other media reports and the growing demands of civil groups, business and professional organizations, government employees, labor unions and the e-mail campaign, seem to have finally gotten the governmentsí attention. President Vicente Fox Quesada has acknowledged the gravity of the crime situation in many areas, saying ìwe will not wash our hands of this problem.î Also noting that kidnappings come under the jurisdiction of the states, he has vowed that federal authorities will work with state and local governments to coordinate anti-kidnapping efforts. As well, the President is calling for legislators to pass reforms to the Criminal Justice Law that are bogged down in an unproductive Congress, including amendments that will make kidnapping a federal crime. Still, there have also been negative ≠ and maybe oversensitive ≠ reactions to the recent news reports on kidnappings and kidnapping statistics. JosÈ Luis Santiago Vasconcelos, Mexicoís Deputy Attorney General for Organized Crime, denounced the Kroll statistics as ìdeceiving and far from reality.î Santiago said that 2,165 kidnappings were committed between 2000 and 2003. On June 11, Attorney General Rafael Macedo de la Concha announced that a criminal investigation of private security consulting firms, that unlawfully advise families of kidnap victims not to notify police, is underway. As to AndrÈs Manuel LÛpez Obrador, the Rasputinesque conspiracy theorist mayor of Mexico City, he has confirmed recent charges by one of his henchmen. They ludicrously claim that the mobilizations against kidnappings in Mexico City are part of yet another plot against the politically ambitious LÛpez Obrador, this time orchestrated by Foxís National Action Party. http://www.showmenews.com/2004/Jun/20040627News010.asp Kidnapping tactics in Latin America increasingly brutal Published Sunday, June 27, 2004 MEXICO CITY (AP) - Joshua Sierraís family wasnít rich. They lived in an apartment on Mexico Cityís gritty east side and hardly fit the mold of the affluent foreigners who so often have fallen prey to kidnappers. But on a summer day last year, 2-year-old Joshua disappeared. The abduction falls into a troubling trend taking hold across Latin America: Kidnappers are becoming more reckless, more brutal and more random about whom they choose to snatch off the streets. "Once they get you, they tend to be more violent because they donít really have any coherent idea of how much money you have or where you keep it," said Frank Holder, former head of Latin American operations for risk management company Kroll Inc. "They may decide to torture you to get that information." Revulsion over such abductions sparked a week of protests this month by housewives in Mexico, and a fatal kidnapping in Argentina led tens of thousands to demonstrate in the streets of Buenos Aires in April. A similar mass rally is being held today in Mexico City. Joshuaís story is a chilling illustration of the new tactics. When the kidnappers seized the boy from his apartment, they left behind the strangled corpse of the toddlerís 15-year-old cousin. The family scraped together a $10,000 ransom for Joshua, but the boy has not been returned. "We just want them to return Joshua," said the boyís aunt, Yolanda Torres. "We have hopes that he is still alive." Mexican officials say kidnappings have been declining overall, even as the abductorsí methods become more brutal. Federal and state crime statistics indicate that kidnappings peaked in 1997 - with 1,047 known abductions - but even government officials concede that the majority of kidnappings are never reported to police. Kroll estimates that Mexico has the second-highest number of kidnappings behind Colombia, where many abductions are political. The company estimates that in 2003, there were 4,000 kidnappings in Colombia, 3,000 in Mexico and 2,000 in Argentina. Abductions of the kind depicted in the recent Denzel Washington movie "Man on Fire" are sophisticated operations in which the perpetrators might study wealthy targets for months. The gangs usually have experience, a negotiating plan and an exit strategy. As police crack down on such professionals, small-time criminals have been going after people who cannot afford to travel with bodyguards and bulletproof cars. Fearing that victims might identify them once set free, kidnappers have taken to killing their prey even after ransoms are paid. "The demonic thing about opportunistic kidnapping is that anyone could be a victim," Holder said. Con artists also have been taking advantage of the kidnapping fears. In so-called virtual kidnappings, gangs gather information on a victim, then wait until the person is temporarily out of reach and call his or her family to claim that their loved one has been kidnapped. In one recent case, a man was dropped off at the Mexico City airport by his wife. As he waited for her to park the car, three men approached, described the wife perfectly and said they were holding her and would harm her unless he gave them money. He did, only to find that the woman had never been abducted. There have even been self-kidnappings, or young people who persuade acquaintances to tell their parents they have been abducted to try to wring money out of them. In the past, express kidnappings involved a victim abducted in a car or taxi, driven around for a few hours, beaten and threatened so the attackers could get a PIN number and make cash withdrawals from an automated teller machine. Many police departments still classify those cases as armed robbery, not kidnapping. But those kidnappings have evolved and now can last for days, weeks or months. "Kidnappers have become more ruthless," said Genaro Gongora Pimentel, a Mexican Supreme Court justice. http://www.securitydriver.com/aic/stories/article-36.html http://www.comebackalive.com/df/kidnapp/kdnapins.htm Kidnap, Rescue and Extortion Insurance Who do you call when someone is kidnapped? Don't call Chuck Norris, Steven Seagal or Jackie Chan. You'll probably end up dead. Don't even call the police, they will jack up the ransom demand and be in cahoots with the kidnappers. You should call your insurance company followed by the embassy, and a professional hostage negotiator. DP advises that anyone in a hostage situation contact a professional in their home country before they contact the local police. Better yet, educate yourself about kidnapping before you find out the hard way. A typical KRE policy with $1 million limit covers a family of 11 people. In Latin America, business is intertwined with extended family from grandparents down to grandchildren. An annual policy would cost between $7000 in Brazil up to a maximum of $26,000 in Colombia. When you cover a business family, you will always schedule each person. Corporations usually buy blanket policies that cover all employees. In most countries except Mexico and Colombia unless you work for a large oil company, a $10 million policy for a Fortune 100 company will cost about $350,000 a year. Insurers like Seitlin also can write one shot, one month $1 million KRE policies for travelers and businesspeople for between $2500-$3000. Is it necessary? Well Seitlin believes you'd be crazy to do business south of Miami without $5-$10 million in KRE coverage. In Colombia a ransom less than a million is considered a joke. Who you gonna call Dying to know which security groups are called by insurance companies when you get kidnapped? Here is DP's insider list. If you can correctly guess which ex-affiliations these groups hold (Army, Air Force, CIA, Mossad, SAS etc.) we'll send you a free Mr. DP shirt. Chubb uses the Ackerman Group AIG uses Kroll Associates Cassidy Davis Hiscox Consortium (Lloyds) uses Control Risks Group Genesis (Lloyds) uses The Ackerman Group). Cigna uses Pinkerton's Some tips when you are invited to stay overnight. Try to avoid countries notorious for kidnapping: Colombia, Mexico, Chechnya, Yemen are just some. Americans doing business for Fortune 100 oil and mining companies in Colombia are at highest risk; low key backpackers and travelers are usually at low risk. Strange as it sounds, the odds of extracting you are better in areas where kidnapping is done in conjunction with the police. Brazil and Mexico are just two countries where kidnapping is a business conducted in conjunction with the local police. Areas where kidnapping is intertwined with Maoist or Marxist ideology are much harder. If someone you know is kidnapped, do not contact the police and do not talk to the press. Contact your embassy, the insurance company and/or a security consultancy to take the next steps. If you have a KRE policy, someone will be dispatched to act as a counselor within hours. Tape record or write down any messages and do not commit to anything until the counselor or security help arrives. Most security counselors will be ex-CIA, Mossad or other intelligence service pensioners. The British firms pull from their own pool of ex-SAS, Scotland Yard and MI-5 folks. Your security counselor will not make any decisions but he will facilitate the process and act as a coach, a mediator and a go between. They will usually setup a committee that analyze input and demands and then make decisions. Usually the decisions are: Pay the money, stall, or negotiate the ransom downwards. Not the best of jobs for amateurs. The fatality rate on security-consultant handled kidnappings is a reassuring 2 percent compared to 9 percent for homemade efforts. Part of the skew is because some kidnap deaths can occur at the attack-the victims may die of illness, heart attack, or they can be killed during rescue attempts. Seitlin & Company 2001 N.W. 107 Avenue, Suite 200 Miami, Florida 33172 (305) 591-0090, FAX: (305) 593-6993 e-mail: kandrguy@a... Seitlin is the largest insurance broker in Florida that also does a ripping business in kidnap/ransom insurance. Luckily he only has to pay out about once or twice a year. Their clients include mostly wealthy Latin American families, corporations that do business south of the border and employees of multinational corporations. He can provide policies from all the major insurance brokers Chubb Insurance of Canada http://masc-web.com/chubb/english/epd/kidnap.htm Chubb offers Kidnap/Ransom/Extortion (KRE) coverage for busy executives with a healthy level of fear. Extortion can also cover computer hackers, contamination or even a computer virus. Lloyds of London 1 Portsoken Street London England, E1 8DF (071) 480-4000, FAX: (071) 480-4170 http://www.cyberapp.com/kidnap.html Black Fox International, Inc. P. O. Box 1187 205 Garvin Boulevard Sharon Hill, Pennsylvania 19079 (800) 877-2445, (610) 461-6690, FAX: (610) 586-5467 e-mail: jc@b... e-mail http://black-fox.com/kidnap.htm Security Resources Security is big business these days. Americans spend about 90 billion on security every year. We only spend $40 billion on public police. In California there are four times as many private police as there are government police. In countries like Russia and South Africa people don't even bother calling for the police. Areas affected by kidnapping also have a number of local firms that provide security and protection. Inquire at your local embassy or with other multinational companies. Pinkerton Risk Assessment Services 1600 Wilson Boulevard, Suite 901 Arlington, Virginia 22209 (703) 525-6111, FAX: (703) 525-2454 www.pinkertons.com fjohns@p... Once on the trail of bank robbers in the Wild West, Pinkerton has gone global and high-tech. Today, you can get risk assessments of over 200 countries on-line or in person. Pinkerton offers access to a database of more than 55,000 terrorist actions and daily updated reports on security threats. For the nonactive, you can order printed publications that range from daily risk assessment briefings to a monthly newsletter. Their services are not cheap, but how much is your life worth? Annual subscriptions to the on-line service start at about US$7000, and you can order various risk and advisory reports that run from US$200-$700 each. Pinkerton gets down and dirty with its counterterrorism programs, hostage negotiators, crisis management and travel security seminars. The service is designed for companies who send their employees overseas or need to know what is going on in the terrorist world. Some reports are mildly macabre, with their annual businesslike graphs charting maimings, killings, assaults and assassinations. Others are truly enlightening. In any case, Pinkerton does an excellent job of bringing together the world's most unpleasant information and providing it to you in concise, intelligent packages. Unlimited on-line access to their database on 230 countries will run you US$6000 a year. You will find the information spotty, with a preponderance of information on South and Central America. Many of the write-ups on everything from Kurds to the Islamic Jihad are written by young college students with little in-country experience. On the other hand, there are many holes that are filled by CIA country profiles (available at any library for free). If you want to save a few bucks, for US$4000 a year (US$5000 overseas), you can get a full subscription of daily, weekly, quarterly and annual risk assessments, as well as analysts' commentaries, a world status map and a fax service that keeps you abreast of fast breaking events. Cheapskates can opt for the US$2250 standard package, which eliminates the daily reports sent via fax, but provides you most of the other elements. If you want to order | la carte, expect services that range from a US$30 personalized trip package, to US$250 printouts of existing risk and travel advisories, to accessing the company's Country Data bank for US$1000 per country. Control Risks Group, London 8200 Greensboro Drive, Suite 1010 McLean, Virginia 22102 (703) 893-0083, FAX: (703) 893-8611 83 Victoria Street London, England SW1H-OHW [44] (171) 222-1552 This international management consulting company specializes in political, business and security risk analysis and assessments, due diligence and fraud investigations, preventative security and asset protection, crisis management planning and training, crisis response and unique problem solving. With extensive experience in kidnapping, extortion and illegal detention resolution, they have handled more than 700 cases in 79 countries. Control Risks has 14 offices around the world including Washington, D.C., London, New York, Bogota, Mexico City, Bonn, Amsterdam, Manila, Melbourne, Moscow, Paris, Singapore, Sydney and Tokyo. Their international, political and security risk analysis research department is the largest of its kind in the private sector and has provided hundreds of companies with customized analyses of the political and security risks they may face doing business around the globe. An on-line Travel Security Guide addresses security issues in more than 100 countries. Emergency Numbers for CRG: LONDON: (071) 222 1552 or (071) 481 1851 (Nightline) UNITED STATES: (703) 893 0083 AUSTRALIA: (613) 416 1533 Kroll Associates 900 Third Avenue, 7th Floor, New York, New York 10022 800) 824-7502 (212) 833-3206, FAX: (212) 750-8112 www.krollassociates.com A security/investigative firm founded in 1972 by Jules Kroll and owned by Equifax (the credit info folks). In addition to gumshoeing on an international and corporate level, Kroll also offers a very useful service for business travelers. You can use your credit card to order a Travel Watch report for $9.95 each. They also provide customer security services for business. Kroll has information over 300 cities worldwide that covers transportation to and from the city, emergency telephone numbers as well as health and safety concerns. They also have special reports on countries an regions. There are also new security tips on the Internet and computers, the airlines and in depth country reports available. Ackerman Group 166 Kennedy Causeway, Suite 700 Miami Beach, Florida 33141 (305) 865-0072 Mike Ackerman specializes in crisis resolution or hostage return through providing the financial and security resources required to resolve hostage situations safely. TroubleShooters USA: (352) 343-2406, FAX: (352) 343-3864, Canada: (403) 885-5273 Ex-US military folks who freelance for hostage situations and can provide aviation services for overseas extractions. They can provide assistance for executive protection, hostage retrieval and missing person searches. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9646 From: moellerthy <1ach@g...> Date: Sat Sep 11, 2004 10:35pm Subject: Re: Fiction book recommendation --- In TSCM-L@yahoogroups.com, Hello Nanotech Beacons Nanotech Beacons are injected into the body beneath the skin and are used in todays time. It basically is GPS / Radio tracking in a nut shell. Andre Holmes Neptune Enterprise Security 1ach@G... "Richard T. Gray" wrote: > > Can anyone recommend any fictional books that the author utilizes technical > threats or TSCM throughout the story? > > Thanks in advance, > > > Ricky > > [Non-text portions of this message have been removed] 9647 From: Mitch D Date: Sun Sep 12, 2004 0:28am Subject: Re: "The Thing" http://www.spybusters.com/Great_Seal_Bug.html good information on a resonant cavity device ===== Mitch Davis TSCM/Special Operations Group Inc. Nashville,TN.USA MitchD@t... site:www.tscmusa.com. Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 __________________________________ Do you Yahoo!? Take Yahoo! Mail with you! Get it on your mobile phone. http://mobile.yahoo.com/maildemo 9648 From: A Grudko Date: Sun Sep 12, 2004 3:09am Subject: RE: [corporatesecurity] Are TSCM people in danger in Mexico? -----Original Message----- > I received a forwarded message tonight regarding a possible targeting of TSCM people by organizations in Mexico and want you to do due diligence before you go, just to be on the safe side. I've not heard anything about specific risk to TSCMers, but in some parts of South America, with Mexico being one, and in parts of Africa there is a Kidnap For Ransom risk to professionals, which may be targeted in groups try all the doctors, and then the lawyers, etc. Professional groups are chosen because they are likely to have a family that could easily raise, say, USD20 000. The psychology applied is to choose an amount which is also low enough that the family would rather pay up than call in the authorities. The good news is that in almost all cases the kidnappers release the hostages because it'is 'good business' to do so. Just one possible source ? Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.749 / Virus Database: 501 - Release Date: 2004/09/01 [Non-text portions of this message have been removed] 9649 From: Fernando Martins Date: Sun Sep 12, 2004 4:53am Subject: Re: Laser or similar perimeter intrusion system.... You can find there microware and active IR http://www.guardall.co.uk/prod_perimeter.shtml easy to install http://www.guardall.co.uk/GetFile/F18B03D0E0437ECA80256CC4005A037B/320124_02_fenceguard350_microwave_fence_installation_manual.pdf http://www.guardall.co.uk/GetFile/99B6BEF0F5B46EF580256CC4005A0312/sbq_installation_instructions.pdf A small panel to use with it http://www.guardall.co.uk/pi8_residential_control_panelpdf.rsf easy to install http://www.guardall.co.uk/GetFile/EC5103F3E1D2EAA280256CC40056F749/320696_0a_pi8_rpanel_installation_manual.pdf http://www.guardall.co.uk/GetFile/BCFB526836C7313680256CC40057276B/320699_0b_pi8_comms_installation_manual.pdf It's a good UK company, nice people too. Portuguese listeners can contact me. FM ----- Original Message ----- From: "Tech Sec Lab" To: Sent: Thursday, September 09, 2004 12:22 AM Subject: [TSCM-L] Laser or similar perimeter intrusion system.... > Hi guys > > Can anyone recommend a handy laser based system to install as a perimeter > cross dectection unit. > > I am not looking for PIR's, all I need is a small outdoor rated product that > can be quickly installed and connected up to any basic pulse alert alarm > system for alarm trigger that acts as a cross beam for a distance of 10-20m. > > Cheers > > -Ois > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.760 / Virus Database: 509 - Release Date: 10-09-2004 From: Shawn Hughes Date: Sun Sep 8, 2002 9:54pm Subject: digital tracking Uh, guys, Concerning the thread on the digital vehicle tracker; All of you make excellent points. The thing is though, I kinda think all of you are missing the true point. Just because a person asked a question, even though the last 50 times the question was asked they wanted an easy answer, doesn't necessarily mean that the 51st has the same intent. Why not just answer the question? If the guy wanted a turnkey solution that takes no training, he will look at the response and it will make no sense to him / her. But, the rest of us that mine this listserve, digging daily through all the crap and off - topicness to find the true nuggets of wisdom that make it worth the effort, will have one more tidbit to tuck away that one of you learned the hard way. That way, we all win. The wannabees learn that you can do it right, or easy, but not both; and the rest get to benefit from the learnedness of others, which is why most of us joined this list. Don't get me wrong. I tire of answering questions repeatedly that appear to show the inexperience of the individual . But, there has to be a way for the people with the knowledge to share it with us while reinforcing the point that there aren't any easy answers. Think about it like this: one faction of you thinks that everybody wants an easy answer. But there's another faction that thinks answering every question by saying 'leave it to the professionals' *IS* an easy answer. Sincerely, Shawn ======================================================================== Shawn Hughes 'Technician in Transition' fmr Head, Technical / Electronic Surveillance Unit; Knox County (TN) Sheriff's Office 6184 From: Steve Uhrig Date: Sun Sep 8, 2002 10:36pm Subject: Re: digital tracking On 8 Sep 2002 at 22:54, Shawn Hughes wrote: > Why not just answer the question? Because new people constantly are joining this list. Newcomers to this interest are very impressionable, and generally the first task for those who care is to unwash their brains. If THEY see a simple answer to a simple question without qualification, they may get the idea it is that simple, and we would be doing them a disservice. That is why. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6185 From: Date: Sun Sep 8, 2002 7:24pm Subject: Re: digital tracking In a message dated 9/8/02 7:56:42 PM Pacific Daylight Time, srh@e... writes: << Why not just answer the question? If the guy wanted a turnkey solution that takes no training, he will look at the response and it will make no sense to him / her. But, the rest of us that mine this listserve, digging daily through all the crap and off - topicness to find the true nuggets of wisdom that make it worth the effort, will have one more tidbit to tuck away that one of you learned the hard way. >> You're up. You're a professional sweeper. Let's hear your best answer. I promise I'll give it my second best answer. I already gave him my first. 6186 From: Craig Snedden Date: Mon Sep 9, 2002 5:31am Subject: RE: digital tracking Gentlemen, you all have valid points. But, if you seek to enlighten the ignorant, why not point them to a place where, if they are so keen for an answer, with a little bit of effort on their part, they will find it? A technique employed by educators for some time. Learning by rote died quite a number of years ago. I'd rather be pointed to a source of relevant information from one of the respected members of this list than, say a website that pops up in reply to a search on Yahooooooooooo!!!!! (other search engines available in your area) I have to agree that saying "leave it to a professional" is not really a helpful answer. However, it might in the end well turn out to be the best answer that the seeker will get. Having taken the trouble to research the topic him/herself and having decided that this particular problem is way over their heads, that it is indeed best left to "a professional". But at least they will have expanded their knowledge, even if just a little, and will have taken the time and trouble to reach that conclusion for themselves. I'd say this is what marks out a "professional". Understand and know your limitations, but also constantly seek to update and expand your knowledge. To bend a previously used analogy, I wouldn't want a heart surgeon working on my brain. But I'd respect the heart surgeon who said to me "It's not your heart. I've done some research and I feel it could be your brain. Here's a referral to the best brain surgeon I know..... (although in my case a psychiatrist might be more helpful!) If the questioner is simply a "snake oil salesman", then he/she just wont bother his/her backside to follow up the leads... :-) Craig -----Original Message----- From: MACCFound@a... [mailto:MACCFound@a...] Sent: 09 September 2002 05:24 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] digital tracking In a message dated 9/8/02 7:56:42 PM Pacific Daylight Time, srh@e... writes: << Why not just answer the question? If the guy wanted a turnkey solution that takes no training, he will look at the response and it will make no sense to him / her. But, the rest of us that mine this listserve, digging daily through all the crap and off - topicness to find the true nuggets of wisdom that make it worth the effort, will have one more tidbit to tuck away that one of you learned the hard way. >> You're up. You're a professional sweeper. Let's hear your best answer. I promise I'll give it my second best answer. I already gave him my first. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6187 From: James M. Atkinson Date: Mon Sep 9, 2002 7:49am Subject: Re: digital tracking OK, Take several sheets of thick interlocking plastic and assemble a dielectric mat that is 3-4 foot wider in all directions then the vehicle to be inspected. These mats are commonly used in gyms, health clubs, etc. The goal is to electrically isolate the vehicle from the ground so you will need a mat with several megaohms of resistance. For a typical vehicle this will involve a grid 12 foot wide and 21 foot long Next, line the ton of the mat with heavy copper sheeting similar to that used by roofers, and make sure you keep it all on the mat as you do not want it to contact the ground. Solder (with a hand held propane torch) a long heavy copper ground to one side of the copper so that you have electrically connected all the sheets, and obtain a master station ground. Once the joints cool flip the copper so that the joints are facing downward. On top of the copper place 3/4 sheets of plywood so that the copper is completely covered and protected. Now place heavy duty duct tape along all the seams of the plywood to help keep it is place. Next place a thin layer of dense foam on top of this, and cover it with a really good quality tarp. You may find it helpful to tape several sheets of Kraft or masking paper in the general area of the engine and transmission so you don't get engine fluids on the tarp. I have found that heavy 36" wide inkjet paper also works well. By now you will have a thin, yet solid platform that is 3-4 foot wider then the vehicle you will be checking, and you will use the copper sheets as a ground plane when searching for RF devices. You will need a number of body cavity tools, E and H field probes, one or two microwave spectrum analyzers, oscilloscope, and so on. You will also need one or more diode band diode detectors with a CDPD bandpass filter and amplifier. Typically you well be using 500-1000 pound of instruments, and several hundred pounds of hand tools. CAREFULLY park the vehicle on the small platform, enure it is in park, and then chock the wheels. Turn the vehicle off, and let the engine cool. Find (or create) a point on the vehicle that you can use as a solid ground, and attack healthy grounding lug. The negative post on the battery works well, as does the lug that attaches the battery to the engine block. Place the first diode detector inside the vehicle on the floor just in front of the passengers seat, the second just behind the drivers seat, and the third in the rear window. The fourth goes in the trunk (with the trunk closed). The next two are placed on the ground (tarp) BEHIND the vehicle with the base of the antenna lined up with the rear fender, passing below the gas tanks, and extending to two feet in front of the rear axle. Next place another diode detector one foot away from the vehicles radio antenna, and another near the cell phone antenna if they have one. Make sure that the base of the antenna of the test instrument is lined up with the antenna under test. Ensure that none of these diode detectors have any electrical contact with the vehicle, and measure the actual ohms between the units and the vehicle metallic ground. Reposition or isolate the units so that you have at least 40 megaohms of isolation from the units and the vehicle. Now, measure the AC and DC voltage between the vehicle ground lug, and the copper plate it is sitting on, then the amperage, and finally the resistance. Pass a tuned 800 MHz MAGNETIC loop antenna that has a narrow bandpass filter, and a high gain amplifier over every inch of both the inside and outside of the vehicle. Do this both with the engine off, and then on. This measurement should be made with a spectrum analyzer. ..... I will post more if anyone is interested. -jma At 10:54 PM -0400 9/8/02, Shawn Hughes wrote: > Uh, guys, > >Concerning the thread on the digital vehicle tracker; > >All of you make excellent points. The thing is though, I kinda think all of >you are missing the true point. Just because a person asked a question, >even though the last 50 times the question was asked they wanted an easy >answer, doesn't necessarily mean that the 51st has the same intent. > >Why not just answer the question? If the guy wanted a turnkey solution >that takes no training, he will look at the response and it will make no >sense to him / her. But, the rest of us that mine this listserve, digging >daily through all the crap and off - topicness to find the true nuggets of >wisdom that make it worth the effort, will have one more tidbit to tuck >away that one of you learned the hard way. > >That way, we all win. The wannabees learn that you can do it right, or >easy, but not both; and the rest get to benefit from the learnedness of >others, which is why most of us joined this list. > >Don't get me wrong. I tire of answering questions repeatedly that appear to >show the inexperience of the individual . But, there has to be a way for >the people with the knowledge to share it with us while reinforcing the >point that there aren't any easy answers. > >Think about it like this: one faction of you thinks that everybody wants an >easy answer. But there's another faction that thinks answering every >question by saying 'leave it to the professionals' *IS* an easy answer. > > >Sincerely, > >Shawn -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6188 From: Ocean Group Date: Tue Sep 10, 2002 8:40am Subject: US Policy and 911 As regards James news posting, I find it hard to take an article like this seriously. While the US have my deepest sympathies as regards 911 but I'm a firm believer that they have no one to blame but them selves, don't get me wrong, loss of life or more formally put murder is wrong....full stop. But people obviously don't do it for no reason. Anyhow, my point is, isn't this a little out of the scope of a TSCM group? Or am I wrong? Regards Vance Deran, Ocean Group, Ireland. Date: Sun, 8 Sep 2002 12:26:03 -0400 From: "James M. Atkinson" Subject: Flying the Flag Flying the Flag By Mark Steyn (Filed: 07/09/2002) Daily Telegraph I was filling up at a truck stop this week and a guy pulled in alongside. Ford pick-up, late 80s, little rusty. He had a full-size American flag sticking out the rear cab window and a sticker saying "United We Stand Against Terrorism" on the tailgate and a couple more flag decals on the sides. He glanced at the car in front. A li'l ol' gran'ma was putting five bucks' worth in her two-door sedan. She had a little flag flying from her aerial and a "Proud To Be An American" sticker in the rear window. Then he looked at me. And I realised my vehicle was bare. The missus had put a laminated "Don't Mess With The US" sign on the back, but, as the year rolled on, somewhere or other it dropped off leaving just the plastic suction pad, the last vestigial hint of my patriotic fervour. The flags went up on the cars after September 11 and they never came down, and after a year you hardly notice that half the folks on the road have mini flagpoles clipped to both side windows and are driving along fluttering like a grand unending ceremonial escort. Not everyone sports them, of course, and what bugged me was that the guy in the pick-up had me pegged as a conscious non-flag-flyer, as some pantywaist milquetoast America-disparaging type like those professors at Berkeley, where they've banned the Stars and Stripes from all September 11 commemorations lest it make anyone "uncomfortable". I felt a strange urge to go up to him and say no, look, honestly, I'll bet I'm just as angry as you. Underneath all the "coping" and "healing" and the rest of the Dianafied soft-focus blur this Wednesday, you won't hear a lot about anger. But quiet, righteous anger is what a lot of Americans still feel. I feel angry every time I'm at Boston's godawful Logan Airport, as crappy and chaotic now as it was a year ago when I dropped off my niece and nephew to fly home from vacation. Ever since, somewhere between the parking garage and the gate, I think of Mohammed Atta and his accomplices - was this his check-in line? did he use this payphone? A couple of months back there was a guy ahead of me at the cardboard-croissant counter with a thick cloying scent, and I remembered Atta instructing his crew the night before to wear cologne and remove their body hair. What was he thinking as he watched his victims board? Did he see two-year-old Christine Hanson, bound for Disneyland with her parents? It's the details that stick. I was in a skyscraper last week and looked across and caught the eye of a woman in the building across the street, and I thought of the people in the south tower, after the first plane hit, glancing out the window and seeing the jumpers from the north tower going by - men in business suits, necktie up and flapping, choosing to take one last gulp of air and plunge to their deaths rather than burn and choke in the heat. I feel sorry for the 55 per cent of Europeans who, according to a poll last week, think falling secretaries and atomised infants are something to do with "US foreign policy". Mohammed Atta and his chums were wealthy, privileged and psychotic, yet feeble British churchmen line up to say the people who did this did it because they're impoverished, downtrodden yet rational. Granted that the fetid swamp of equivalence is often mistaken for the moral high ground, it's rarely been so crowded. The stampede started almost immediately. On September 12, the Ottawa Citizen ran a column by Susan Riley headlined "At Times Like This, We Thank God That We're Canadians". Oh, God, I groaned, not the usual moral preening. But no, Ms Riley skipped that and went straight for naked self-interest: "Our best protection may be distancing ourselves a little more explicitly from US foreign policy ä pursuing a reasonable and moderate course in the world's trouble spots." I've heard it a thousand times since and I still don't get it. By "distancing yourself" from the victims of September 11 you move yourself closer to the perpetrators, closer to barbarism. It may be "reasonable and moderate", but it's also profoundly self-corroding. This isn't a "clash of civilisations" so much as a clash within civilisations - in the West, between those who believe in the values of liberal democracy and those too numbed by multiculturalist bromides to recognise even the most direct assault on them; and in the Islamic world, between what's left of the moderate Muslim temperament and the Saudi-radicalised death-cult Islamists. I don't want to be "moderate and reasonable" in the face of Mohammed Atta. A world that "distances" itself from the US to get closer to him is a world that's more misogynist, bigoted, corrupt and superstitious. On this anniversary, I'll have a new flag on my truck and Neil Young's great September 11 anthem in the CD player: No one has the answers, But one thing is true, You got to turn on evil, When it's comin' after you. You got to face it down, And when it tries to hide, You got to go in after it, And never be denied. Amen. 6189 From: Craig Snedden Date: Mon Sep 9, 2002 10:07am Subject: RE: digital tracking James, I have to admit to a rather large smile at your reply. It brightened up a very wet afternoon here in Scotland. :-) Craig -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: 09 September 2002 13:50 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] digital tracking OK, Take several sheets of thick interlocking plastic and assemble a ------ Rest snipped-------- 6190 From: u12armresl Date: Mon Sep 9, 2002 3:21pm Subject: Re: digital tracking That idea is too drawn out for people to try to remember. I have a much easier idea that will be considerably cheaper and do the same job. Drive your car to the local Maaco dealer and have the Imperial paint job I believe this is $99 if the sanding on the car doesn't take care of the gps the heat from the drying room will and if by some chance that doesn't then the item will be covered in paint and should impede the performance. --- In TSCM-L@y..., "James M. Atkinson" wrote: > OK, > > Take several sheets of thick interlocking plastic and assemble a > dielectric mat that is 3-4 foot wider in all directions then the > vehicle to be inspected. These mats are commonly used in gyms, health > clubs, etc. The goal is to electrically isolate the vehicle from the > ground so you will need a mat with several megaohms of resistance. > For a typical vehicle this will involve a grid 12 foot wide and 21 > foot long > > Next, line the ton of the mat with heavy copper sheeting similar to > that used by roofers, and make sure you keep it all on the mat as you > do not want it to contact the ground. Solder (with a hand held > propane torch) a long heavy copper ground to one side of the copper > so that you have electrically connected all the sheets, and obtain a > master station ground. Once the joints cool flip the copper so that > the joints are facing downward. > > On top of the copper place 3/4 sheets of plywood so that the copper > is completely covered and protected. > > Now place heavy duty duct tape along all the seams of the plywood to > help keep it is place. > > Next place a thin layer of dense foam on top of this, and cover it > with a really good quality tarp. You may find it helpful to tape > several sheets of Kraft or masking paper in the general area of the > engine and transmission so you don't get engine fluids on the tarp. I > have found that heavy 36" wide inkjet paper also works well. > > By now you will have a thin, yet solid platform that is 3-4 foot > wider then the vehicle you will be checking, and you will use the > copper sheets as a ground plane when searching for RF devices. > > You will need a number of body cavity tools, E and H field probes, > one or two microwave spectrum analyzers, oscilloscope, and so on. You > will also need one or more diode band diode detectors with a CDPD > bandpass filter and amplifier. Typically you well be using 500- 1000 > pound of instruments, and several hundred pounds of hand tools. > > CAREFULLY park the vehicle on the small platform, enure it is in > park, and then chock the wheels. Turn the vehicle off, and let the > engine cool. > > Find (or create) a point on the vehicle that you can use as a solid > ground, and attack healthy grounding lug. The negative post on the > battery works well, as does the lug that attaches the battery to the > engine block. > > Place the first diode detector inside the vehicle on the floor just > in front of the passengers seat, the second just behind the drivers > seat, and the third in the rear window. > > The fourth goes in the trunk (with the trunk closed). > > The next two are placed on the ground (tarp) BEHIND the vehicle with > the base of the antenna lined up with the rear fender, passing below > the gas tanks, and extending to two feet in front of the rear axle. > > Next place another diode detector one foot away from the vehicles > radio antenna, and another near the cell phone antenna if they have > one. Make sure that the base of the antenna of the test instrument is > lined up with the antenna under test. > > Ensure that none of these diode detectors have any electrical contact > with the vehicle, and measure the actual ohms between the units and > the vehicle metallic ground. Reposition or isolate the units so that > you have at least 40 megaohms of isolation from the units and the > vehicle. > > Now, measure the AC and DC voltage between the vehicle ground lug, > and the copper plate it is sitting on, then the amperage, and finally > the resistance. > > Pass a tuned 800 MHz MAGNETIC loop antenna that has a narrow bandpass > filter, and a high gain amplifier over every inch of both the inside > and outside of the vehicle. Do this both with the engine off, and > then on. This measurement should be made with a spectrum analyzer. > > ..... > > I will post more if anyone is interested. > > -jma > > > > > > > At 10:54 PM -0400 9/8/02, Shawn Hughes wrote: > > Uh, guys, > > > >Concerning the thread on the digital vehicle tracker; > > > >All of you make excellent points. The thing is though, I kinda think all of > >you are missing the true point. Just because a person asked a question, > >even though the last 50 times the question was asked they wanted an easy > >answer, doesn't necessarily mean that the 51st has the same intent. > > > >Why not just answer the question? If the guy wanted a turnkey solution > >that takes no training, he will look at the response and it will make no > >sense to him / her. But, the rest of us that mine this listserve, digging > >daily through all the crap and off - topicness to find the true nuggets of > >wisdom that make it worth the effort, will have one more tidbit to tuck > >away that one of you learned the hard way. > > > >That way, we all win. The wannabees learn that you can do it right, or > >easy, but not both; and the rest get to benefit from the learnedness of > >others, which is why most of us joined this list. > > > >Don't get me wrong. I tire of answering questions repeatedly that appear to > >show the inexperience of the individual . But, there has to be a way for > >the people with the knowledge to share it with us while reinforcing the > >point that there aren't any easy answers. > > > >Think about it like this: one faction of you thinks that everybody wants an > >easy answer. But there's another faction that thinks answering every > >question by saying 'leave it to the professionals' *IS* an easy answer. > > > > > >Sincerely, > > > >Shawn > -- > > ------------------------------------------------------------------- ------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ------------------------------------------------------------------- ------------------------------- > James M. Atkinson Ph: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com > ------------------------------------------------------------------- ------------------------------- > Vocatus atque non vocatus deus aderit > ------------------------------------------------------------------- ------------------------------- 6191 From: gkeenan Date: Mon Sep 9, 2002 6:34pm Subject: Re: US Policy and 911 I know I'm not a regular poster to this list, but I felt compelled to respond to Vance's post. First of all, I will agree with you on one point -- the article itself is probably off-topic for this list. However, Jim Atkinson, as well as many others on this list, are Americans. The article, I believe, was posted for their benefit -- and not to stir the pot. Fact is, I know exactly where he got that article to begin with -- my own terrorism list (though the source is the UK's Daily Telegraph, I recognize the formatting, which I do myself before I send it out on my own lists; and our moderator happens to be a subscriber to my list). And, not to put too fine a point on it, my computer has what some people refer to as a "delete key". If you don't like it, delete it. I do it all the time 'cause I don't have as much time on my hands as you apparently do. I just delete it, and that's it. But before you say anything - I'm responding here because there are times when the delete key isn't enough, and certain things, in my own opinon, require a reply. I try to avoid this - but I just wouldn't feel right if I let certain things just go past me without comment. I know there are many, many international members on this list. I, for one, don't have a problem with any of you posting similar articles about major events, terrorism in particular, in your own countries; and most particularly when those articles refer to something very serious, very ingrained your own histories. I think it keeps all of us aware of what's going on outside our own worlds. I don't mean that this list should become a news list, or a place for anyone and everyone to send whatever news articles they come across that they feel reflects their own views. Not by any means. But I know that Jim Atkinson also sends out, periodically, jokes and humorous items to break up the motonony. I haven't noticed you complaining about any of those. I also know that Jim has posted other articles from my lists in the past -- as I said, I do some reformatting and can recognize when something that goes out on one of my lists appears on another. I have no problem with that at all. It's all open source anyway. But this article was written by an American and published in the UK's Daily Telegraph -- they must have thought it important enough to publish in a UK paper. Or at least 'different' enough. When Easter rolls around, if you have something to post about the Easter Rising -- I'd be happy to receive it. I've studied Irish history for many years and lived in Ulster for five years. My "Irish side" comes from Ulster, and I still have a step-son, daughter and two grand children living in Ulster. I also have another daughter buried there. So you might say I have a personal stake in Irish history (my great-grandfather left Ulster in a hurry back around 1898 with a Crown price on his head of L20; a lot of money 104 years ago - he was a member of the IRB; I'm sure you know who they were; they were founded in New York City and were the forerunners of today's IRA). As for having no one to blame but ourselves? How so? This is not a perfect world. We - Americans as a whole - are not perfect. No one is. Yet, you seem to be one of those who believe that all the world's ills are the result of America! What a dip-stick you are! Just over 100 years ago we were hearing the same thing about the British Empire! We're a country of nearly 300 million people -- and many of them are Muslims, Jews, Protestants, Catholics (I'll talk about the Protestant-Catholic thing another time! As they say, clean up your own yard before telling others to clean up theirs - by the way, I'm Irish Catholic whose family hails from Ulster and with a Catholic family still living, and suffering there). I guess the whole thing hinges on whichever country happens to be the most powerful at the time. And most countries have had their chances, and all have had to listen to the crap we have to listen to about being solely reponsible for the defects of others; there was Spain, Denmark, Britain, France, Japan, China, Egypt, Italy (Rome), Turkey (the Turkoman Empire), and ad infinitum. Now it's our turn in the barrel. And to think, we were once a non-descript, unimportant colony in the British Empire. The only perfect human being there ever was was nailed to a cross over 2,000 years ago by the Romans - and their country, Italy, is today the most Catholic country on the globe; maybe Ireland and Spain coming in a close second. Even the Muslims acknowledge that. As for these wackos committing murder for no reason -- that's a crock!! Murder is one thing - genocide another. Hitler also murdered children and women -- just like the hijackers did. But arguably to his credit - he only targeted 3 races (Poles, Jews and Russians). The 911 hijackers targeted anyone and everyone -- the first plane to hit the WTC South Tower had, as passengers, an Irish woman and her 3 year old child. Now, if you can, as an Irishman, justify that to me. People from 80 nations died that day. If I'm not mistaken, more than 20 of them from Ireland. Nearly 100 from the UK. So this article has meaning for many people on this list. And having spent most of my adult life in Europe, the Middle East and North Africa, I'm probably one of the few Yanks you'll ever meet who has more than a fleeting respect for other cultures, religions and races. I spent nearly 25 years living with and among them, was even married to one. So I hope most of you on this list will forgive me for this outburst. But I very nearly took it personally. To the moderator - sorry for the outburst. Jerry Keenan ----- Original Message ----- From: Ocean Group To: TSCM Group Sent: Tuesday, September 10, 2002 9:40 AM Subject: [TSCM-L] US Policy and 911 As regards James news posting, I find it hard to take an article like this seriously. While the US have my deepest sympathies as regards 911 but I'm a firm believer that they have no one to blame but them selves, don't get me wrong, loss of life or more formally put murder is wrong....full stop. But people obviously don't do it for no reason. Anyhow, my point is, isn't this a little out of the scope of a TSCM group? Or am I wrong? Regards Vance Deran, Ocean Group, Ireland. [Non-text portions of this message have been removed] 6192 From: James M. Atkinson Date: Mon Sep 9, 2002 7:24pm Subject: Re: digital tracking Good Evening Folks, There is actually a much simpler (but classified) method to find vehicle based bug.. The top secret method can be found on the following page, but I expect that once the government finds out the information up they will try to shut down the page, so check it out as soon as you can. Check out: http://www.tscm.com/goldlist.html ...and yes, I really am an asshole... -jma At 8:21 PM +0000 9/9/02, u12armresl wrote: >That idea is too drawn out for people to try to remember. I have a >much easier idea that will be considerably cheaper and do the same >job. Drive your car to the local Maaco dealer and have the >Imperial paint job I believe this is $99 if the sanding on the car >doesn't take care of the gps the heat from the drying room will and >if by some chance that doesn't then the item will be covered in >paint and should impede the performance. >--- In TSCM-L@y..., "James M. Atkinson" wrote: >> OK, >> >> Take several sheets of thick interlocking plastic and assemble a >> dielectric mat that is 3-4 foot wider in all directions then the >> vehicle to be inspected. These mats are commonly used in gyms, >health >> clubs, etc. The goal is to electrically isolate the vehicle from >the >> ground so you will need a mat with several megaohms of resistance. >> For a typical vehicle this will involve a grid 12 foot wide and 21 >> foot long >> >> Next, line the ton of the mat with heavy copper sheeting similar >to >> that used by roofers, and make sure you keep it all on the mat as >you >> do not want it to contact the ground. Solder (with a hand held >> propane torch) a long heavy copper ground to one side of the >copper >> so that you have electrically connected all the sheets, and obtain >a >> master station ground. Once the joints cool flip the copper so >that >> the joints are facing downward. >> >> On top of the copper place 3/4 sheets of plywood so that the >copper >> is completely covered and protected. >> >> Now place heavy duty duct tape along all the seams of the plywood >to >> help keep it is place. >> >> Next place a thin layer of dense foam on top of this, and cover it >> with a really good quality tarp. You may find it helpful to tape >> several sheets of Kraft or masking paper in the general area of >the >> engine and transmission so you don't get engine fluids on the >tarp. I >> have found that heavy 36" wide inkjet paper also works well. >> >> By now you will have a thin, yet solid platform that is 3-4 foot >> wider then the vehicle you will be checking, and you will use the >> copper sheets as a ground plane when searching for RF devices. >> >> You will need a number of body cavity tools, E and H field probes, >> one or two microwave spectrum analyzers, oscilloscope, and so on. >You >> will also need one or more diode band diode detectors with a CDPD >> bandpass filter and amplifier. Typically you well be using 500- >1000 >> pound of instruments, and several hundred pounds of hand tools. >> >> CAREFULLY park the vehicle on the small platform, enure it is in >> park, and then chock the wheels. Turn the vehicle off, and let the >> engine cool. >> >> Find (or create) a point on the vehicle that you can use as a >solid >> ground, and attack healthy grounding lug. The negative post on the >> battery works well, as does the lug that attaches the battery to >the >> engine block. >> >> Place the first diode detector inside the vehicle on the floor >just >> in front of the passengers seat, the second just behind the >drivers >> seat, and the third in the rear window. >> >> The fourth goes in the trunk (with the trunk closed). >> >> The next two are placed on the ground (tarp) BEHIND the vehicle >with >> the base of the antenna lined up with the rear fender, passing >below >> the gas tanks, and extending to two feet in front of the rear axle. >> >> Next place another diode detector one foot away from the vehicles > > radio antenna, and another near the cell phone antenna if they >have >> one. Make sure that the base of the antenna of the test instrument >is >> lined up with the antenna under test. >> >> Ensure that none of these diode detectors have any electrical >contact >> with the vehicle, and measure the actual ohms between the units >and >> the vehicle metallic ground. Reposition or isolate the units so >that >> you have at least 40 megaohms of isolation from the units and the >> vehicle. >> >> Now, measure the AC and DC voltage between the vehicle ground lug, >> and the copper plate it is sitting on, then the amperage, and >finally >> the resistance. >> >> Pass a tuned 800 MHz MAGNETIC loop antenna that has a narrow >bandpass >> filter, and a high gain amplifier over every inch of both the >inside >> and outside of the vehicle. Do this both with the engine off, and >> then on. This measurement should be made with a spectrum analyzer. >> >> ..... >> >> I will post more if anyone is interested. >> >> -jma >> >> >> >> >> >> >> At 10:54 PM -0400 9/8/02, Shawn Hughes wrote: >> > Uh, guys, >> > >> >Concerning the thread on the digital vehicle tracker; >> > >> >All of you make excellent points. The thing is though, I kinda >think all of >> >you are missing the true point. Just because a person asked a >question, >> >even though the last 50 times the question was asked they wanted >an easy >> >answer, doesn't necessarily mean that the 51st has the same >intent. >> > >> >Why not just answer the question? If the guy wanted a turnkey >solution >> >that takes no training, he will look at the response and it will >make no >> >sense to him / her. But, the rest of us that mine this listserve, >digging >> >daily through all the crap and off - topicness to find the true >nuggets of >> >wisdom that make it worth the effort, will have one more tidbit >to tuck >> >away that one of you learned the hard way. >> > >> >That way, we all win. The wannabees learn that you can do it >right, or >> >easy, but not both; and the rest get to benefit from the >learnedness of >> >others, which is why most of us joined this list. >> > >> >Don't get me wrong. I tire of answering questions repeatedly that >appear to >> >show the inexperience of the individual . But, there has to be a >way for >> >the people with the knowledge to share it with us while >reinforcing the >> >point that there aren't any easy answers. >> > >> >Think about it like this: one faction of you thinks that >everybody wants an >> >easy answer. But there's another faction that thinks answering >every >> >question by saying 'leave it to the professionals' *IS* an easy >answer. >> > >> > >> >Sincerely, >> > >> >Shawn >> -- >> >> ------------------------------------------------------------------- >------------------------------- >> The First, The Largest, The Most Popular, and The Most Complete >TSCM, >> Bug Sweep, Spy Hunting, and Counterintelligence Site on the >Internet. >> ------------------------------------------------------------------- >------------------------------- >> James M. Atkinson Ph: (978) 381-9111 >> Granite Island GroupFax: >> 127 Eastern Avenue #291http://www.tscm.com/ >> Gloucester, MA 01931-8008mailto:jmatk@tscm.com >> ------------------------------------------------------------------- >------------------------------- >> Vocatus atque non vocatus deus >aderit >> ------------------------------------------------------------------- >------------------------------- > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6193 From: Matt Paulsen Date: Mon Sep 9, 2002 7:28pm Subject: RE: US Policy and 911 > Fact is, I know exactly where he got that article to begin with -- my own terrorism list > (though the source is the UK's Daily Telegraph, I recognize the formatting, which I do > myself before I send it out on my own lists; and our moderator happens to be a subscriber to my list). Funny story, I got this as spam in my inbox... Guess I should have paid more attention to it since it's causing such a controversy. Anyone know who Edward J Michaels or Peter Amico are? Return-Path: Received: from cpimssmtpu10.email.msn.com ([207.46.181.85]) by rwcrgwc53.attbi.com (InterMail vM.4.01.03.37 201-229-121-137-20020806) with ESMTP id <20020908164728.VMHO5074.rwcrgwc53.attbi.com@c...> for ; Sun, 8 Sep 2002 16:47:28 +0000 Received: from cc1060800d ([68.46.156.65]) by cpimssmtpu10.email.msn.com with Microsoft SMTPSVC(5.0.2195.4905); Sun, 8 Sep 2002 09:46:25 -0700 Message-ID: <003f01c25757$2df99da0$419c2e44@b...> Reply-To: "Edward J. Michaels" From: "Edward J. Michaels" To: "Amico, Peter" Subject: Written by a fraternal brother from the UK working in the USA 6194 From: Matt Paulsen Date: Mon Sep 9, 2002 7:32pm Subject: Hawaii Pacific University studies Information Security. - off topic? Got this spam also. Good to see that our universities are spamming companies, but that's not the main point. Now, I wonder what crazy firm will let a university know its weaknesses regardless of some 'privacy policy'. Good old Mr. NSA would love to get the respondant data from formsite.com on this I'm sure and thanks to such fun things as the US Patriot Act, this is CRAAAAZY fun stuff to get ahold of. Hmm.. now where did that search warrant go... Thanks, Matt Paulsen President/CEO Orange Networks LLC P: 503.892.8786 F: 503.892.8794 ----------------------------------------- Dear Respondent at Orange Networks LLC, You were randomly selected to participate in the attached survey, which is part of the Master of Science in Information Systems program at the Hawaii Pacific University. Research for this professional paper is being conducted during September 2002. Your input is critical for the success of this study. The goal of this research is to provide organizations a better understanding about the factors that influence the relationships between implementation and performance of Information Security strategies. The data will be utilized to gather your perceptions of the usefulness of your organizationís Information Security plan and efficiency of your organizationís Information Security strategies. Please respond to the items in the survey based on your opinions regarding your organizationís Information Security. Your perceptions will provide invaluable information for others. There may be some items on the questionnaire that are not applicable to you or cannot be answered for some reason. If that is the case, please leave the items BLANK. All responses are kept strictly confidential and no one will have access to the instruments once they are returned to me. In addition, the information gathered from this survey will not be published or shared, only the results will be disseminated. If you have any questions concerning this survey, please feel free to contact me by phone at (808) 947-9399, fax (808) 955-4697, or email at mdefranc@c... . If you have any concerns regarding the validity of this survey or program, you may also contact Dr. Kenneth G. Rossi, Assistant Professor of Information Systems, by phone at (808) 544-1412 or by email at krossi@h... or rossik001@h... for confirmation. Would you please, at your convenience, click on this link and fill out the survey: http://fs3.formsite.com/hpu_thesis/InfoSecurityStrategies/index.html Your contribution to this research will be greatly appreciated. Sincerely, ---------------------------------------- Marcos De Franceschi Graduate Student Master of Science in Information Systems Hawaii Pacific University mdefranc@c... 6195 From: Matt Paulsen Date: Mon Sep 9, 2002 7:41pm Subject: Wiretapping call girls.. yep... for real I wonder if the FBI paid by the minute. :) http://www.msnbc.com/news/798748.asp Brothel Banter An FBI wiretap picked up this call between Jeanette Maier and a Chicago colleague: Chicago madam: I have a lady that might be interested in coming to visit you. Maier: Is she nice-looking? Chicago madam: She is beautiful, very busty. She's about 34, 36 years old. I didn't know your age limit. Maier: We go up to 40... Is she a local girl for you? Chicago madam: No, she lives in Phoenix. Maier: The most they make [here] is about five grand. Chicago madam: Is that for one week? Maier: Yes, $5,000 a week. 6196 From: The Dog's Bollix Date: Mon Sep 9, 2002 8:18pm Subject: Re: Re: digital tracking Reality check: It is not possible to hide a GPS device in a vehicle and not have it be found during a thorough physical search. You don't need a spectrum analyzer, you don't even need an RF detector. All you need to know is that a GPS transmitting, locating (active) device - the kind that they install in a vehicle for vehicle tracking purposes can be found - in less than an hour no matter how well it is hidden. - By acknowledging the reality that it must be connected to a true 12V source (I wonder how many people here can identify where true 12V can be found in vehicle wiring (other than at the battery) - I still argue with stereo techs over this.) - The antenna must point skyward and can't be covered by metal - this means that the flat antenna has one side which must point towards the sky for decent (any hope of) operation. - The antenna is connected to the control unit by coax cable. There is rarely any other coax cable in a vehicle. Except for power requirements, the same is true for a passive device, although some of the larger antennas can work reasonable well when installed under the car. An electrical auto tech, one who has access to Wiremagic, (almost all do) who knows how to pop off all interior panels on a vehicle without breaking them, can assist you in locating a device in less than an hour. I install these types of devices every week. I am keenly aware of the limitations one faces when trying to hide these on a vehicle. There are not that many places to hide a transmitter, and still get true 12V. I'm also keenly aware of their limited usefulness. Truth be told - if you told a stereo tech that there was a GPS device hidden in a vehicle and he'd get $100 for finding it, 15 minutes later he'd be holding your GPS device. Now, if you told him there was a spread spectrum transmitter hidden in the vehicle operating at GPS frequencies, and asked him to find it , then you would get the blank stare you deserved. THAT'S when you need an expert, or training., and the equipment to be sure that you can ethically perform the task at hand. I don't think you guys are of differing opinions, I think you are arguing over a case that doesn't warrant the argument. My, $0.02 ----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Sunday, September 08, 2002 2:00 PM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Re:Tracking device detection - Just some thoughts. On 7 Sep 2002 at 9:41, Monty wrote: > Unfortunately this continues when someone asks basic questions. In > message 1, Robert asked a simple question. He was not asking a simple question looking for useful information to be applied ethically and efficiently. If he had, he would have been given appropriate information. He was looking for someone to recommend a Ralph Thomas solution for a few hundred dollars, to assuage his conscience that he could skip the many tens of thousands of dollars and thousands of hours of combined training and experience any real sweeper has, and do a sweep for someone. He was looking to play with the big boys without paying his dues, and some of us recognized that. And didn't fall for it. > Instead of giving a real answer Macc basically told him, if your not one > of us you do not have a right to know. Mike did NOT say that. He merely said if one does not have the requisite various and sundry qualifications to do the job honestly and efficiently FOR THE CLIENT (which should be our bottom line), then the only ETHICAL thing is to sub to someone who does. I said the same thing, possibly expanded by a sentence or two, for the same reason. Mike (MACC) and I generally are on the same page, as are the very few real professionals on this list, most of whom never or virtually never post. Jim said the same thing also. > This is perfect example of our problem. You are right in a sense. Perfect example of A problem. YOUR problem? I doubt it. The problem is consumers of TSCM services, whether legitimate or lunatics, constantly are being cheated by unqualified persons doing rain dance sweeps. That makes the legitimate practitioners, which is perhaps 1/10 of 1% of the people who offer the service, look bad. And is a waste of money and gives a dangerous false sense of security to the innocent consumer. Or, as I recently have seen with several young ladies Jim Ross has cheated by telling them they definitely are bugged, can ruin their lives and their sanity and cause them to take money out of the rent and food off the table chasing demons which don't exist. Some of these people doing rain dances are honestly incompetent. This includes well meaning novices who are honest people, but have not been exposed to the real world of TSCM and fall for the spy shop line of BS. Those I do not condemn as they merely are misinformed. I will work patiently with them to expose them to the real world, and if they are serious, will work with them to enter the profession properly, get trained, etc. You have to pay your dues, and damn few people are willing to do that. We're the instant gratification generation. We're greedy. I want it all and I want it now. Many fall for the get rich quick thing, and all the spy shops play up to that. These are types who should sub out any sweep opportunities they encounter to a qualified pro, and maybe work with the professional to learn something if that is permitted and practical. Then there are those who are dishonest and incompetent, and know it, and to those I hold no quarter. They are fair game for any of us who want to expose them. They're only out to cheat people. Jim Ross is a typical example, and there are many more. Purveyors of do-it-yourself sweep gear are others who knowingly cheat people, and they will have to face God one day and answer for that. Somewhere in there are people who may want to do a good job but don't have any idea where or how to start. They don't have the background, are unable/unwilling to invest the time to learn the basics, train, apprentice and do it properly. Some people just aren't going to be able to do it, no matter how well meaning. To those, we owe it to them to explain this gently with respect, offer support and courtesy, and recommend they sub any work they trip across to someone competent. Not everyone who has the desire can become a sweeper. Most who have the desire can't, for a multitude of reasons. I keep saying, and will do so again, of all the people who call me and want to buy zillion gigacycle this and that, and are all worried about threats up in the X-Ray wavelength, and can throw around all the buzzwords and act all self righteous, hardly a one of them can do a simple Ohm's law problem or draw the schematic of a flashlight. You need to have the ability to do the job BEFORE you accept the work. That is a basic concept few seem to realize. I sell used TSCM equipment. You wouldn't believe how many calls I get from PIs who just happened to trip over a sweep job, committed to it, have no idea whatsoever what is involved, what to charge, etc. and want me to overnight them everything they'll need to do the job. That's sad, and is the kind if situation MACC and I were referring to. Jim answered the question the same basic way, but gave the inquirer the info he asked for even though it would be useless to him. I disagree with your statement, and you destroyed your credibility on all issues by making it: > We have accept that these days anyone can buy excellent bugs for less > then $2000. These units are fully digital with burst and spread > spectrum outputs with remote turn on and digital recorder storage. I am in the business manufacturing equipment vaguely similar to this, I know essentially every piece of equipment on the planet used by governments, and the genuine products are extremely difficult to get and cost far more than $2000. I personally have worked with the very latest technology the planet has to offer and have trained governments as well as a good number of members of this list in person on equipment very similar to the above, and frankly, I doubt you have ever or will ever see it. You're just parroting some crap you read somewhere else, which is making you part of the hype problem, not part of the solution. For every one of the above devices deployed, fifty thousand consumer tape recorders with Radio Shack interfaces are hanging on the phone line in someone's spare bedroom. Are we finding the fifty thousand tape recorders? Worry about them. Don't be another one throwing around terms and threats you'll never see and wouldn't recognize if you did. Don't complain. Do something. Mentor some well intentioned potential sweeper who is willing to work hard, pay his dues and take the time to become competent. I practice what I preach, to which at least thirty people I've met through this list could testify. But make sure you are in a position to speak before you do anything. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ------------------------ Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Sunday, September 08, 2002 2:00 PM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Re:Tracking device detection - Just some thoughts. On 7 Sep 2002 at 9:41, Monty wrote: > Unfortunately this continues when someone asks basic questions. In > message 1, Robert asked a simple question. He was not asking a simple question looking for useful information to be applied ethically and efficiently. If he had, he would have been given appropriate information. He was looking for someone to recommend a Ralph Thomas solution for a few hundred dollars, to assuage his conscience that he could skip the many tens of thousands of dollars and thousands of hours of combined training and experience any real sweeper has, and do a sweep for someone. He was looking to play with the big boys without paying his dues, and some of us recognized that. And didn't fall for it. > Instead of giving a real answer Macc basically told him, if your not one > of us you do not have a right to know. Mike did NOT say that. He merely said if one does not have the requisite various and sundry qualifications to do the job honestly and efficiently FOR THE CLIENT (which should be our bottom line), then the only ETHICAL thing is to sub to someone who does. I said the same thing, possibly expanded by a sentence or two, for the same reason. Mike (MACC) and I generally are on the same page, as are the very few real professionals on this list, most of whom never or virtually never post. Jim said the same thing also. > This is perfect example of our problem. You are right in a sense. Perfect example of A problem. YOUR problem? I doubt it. The problem is consumers of TSCM services, whether legitimate or lunatics, constantly are being cheated by unqualified persons doing rain dance sweeps. That makes the legitimate practitioners, which is perhaps 1/10 of 1% of the people who offer the service, look bad. And is a waste of money and gives a dangerous false sense of security to the innocent consumer. Or, as I recently have seen with several young ladies Jim Ross has cheated by telling them they definitely are bugged, can ruin their lives and their sanity and cause them to take money out of the rent and food off the table chasing demons which don't exist. Some of these people doing rain dances are honestly incompetent. This includes well meaning novices who are honest people, but have not been exposed to the real world of TSCM and fall for the spy shop line of BS. Those I do not condemn as they merely are misinformed. I will work patiently with them to expose them to the real world, and if they are serious, will work with them to enter the profession properly, get trained, etc. You have to pay your dues, and damn few people are willing to do that. We're the instant gratification generation. We're greedy. I want it all and I want it now. Many fall for the get rich quick thing, and all the spy shops play up to that. These are types who should sub out any sweep opportunities they encounter to a qualified pro, and maybe work with the professional to learn something if that is permitted and practical. Then there are those who are dishonest and incompetent, and know it, and to those I hold no quarter. They are fair game for any of us who want to expose them. They're only out to cheat people. Jim Ross is a typical example, and there are many more. Purveyors of do-it-yourself sweep gear are others who knowingly cheat people, and they will have to face God one day and answer for that. Somewhere in there are people who may want to do a good job but don't have any idea where or how to start. They don't have the background, are unable/unwilling to invest the time to learn the basics, train, apprentice and do it properly. Some people just aren't going to be able to do it, no matter how well meaning. To those, we owe it to them to explain this gently with respect, offer support and courtesy, and recommend they sub any work they trip across to someone competent. Not everyone who has the desire can become a sweeper. Most who have the desire can't, for a multitude of reasons. I keep saying, and will do so again, of all the people who call me and want to buy zillion gigacycle this and that, and are all worried about threats up in the X-Ray wavelength, and can throw around all the buzzwords and act all self righteous, hardly a one of them can do a simple Ohm's law problem or draw the schematic of a flashlight. You need to have the ability to do the job BEFORE you accept the work. That is a basic concept few seem to realize. I sell used TSCM equipment. You wouldn't believe how many calls I get from PIs who just happened to trip over a sweep job, committed to it, have no idea whatsoever what is involved, what to charge, etc. and want me to overnight them everything they'll need to do the job. That's sad, and is the kind if situation MACC and I were referring to. Jim answered the question the same basic way, but gave the inquirer the info he asked for even though it would be useless to him. I disagree with your statement, and you destroyed your credibility on all issues by making it: > We have accept that these days anyone can buy excellent bugs for less > then $2000. These units are fully digital with burst and spread > spectrum outputs with remote turn on and digital recorder storage. I am in the business manufacturing equipment vaguely similar to this, I know essentially every piece of equipment on the planet used by governments, and the genuine products are extremely difficult to get and cost far more than $2000. I personally have worked with the very latest technology the planet has to offer and have trained governments as well as a good number of members of this list in person on equipment very similar to the above, and frankly, I doubt you have ever or will ever see it. You're just parroting some crap you read somewhere else, which is making you part of the hype problem, not part of the solution. For every one of the above devices deployed, fifty thousand consumer tape recorders with Radio Shack interfaces are hanging on the phone line in someone's spare bedroom. Are we finding the fifty thousand tape recorders? Worry about them. Don't be another one throwing around terms and threats you'll never see and wouldn't recognize if you did. Don't complain. Do something. Mentor some well intentioned potential sweeper who is willing to work hard, pay his dues and take the time to become competent. I practice what I preach, to which at least thirty people I've met through this list could testify. But make sure you are in a position to speak before you do anything. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ------------------------ Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ --- "James M. Atkinson" wrote: > > Good Evening Folks, > > There is actually a much simpler (but classified) > method to find > vehicle based bug.. > > The top secret method can be found on the following > page, but I expect that > once the government finds out the information up > they will try to shut down > the page, so check it out as soon as you can. > > Check out: http://www.tscm.com/goldlist.html > > ...and yes, I really am an asshole... > > -jma > > > > > At 8:21 PM +0000 9/9/02, u12armresl wrote: > >That idea is too drawn out for people to try to > remember. I have a > >much easier idea that will be considerably cheaper > and do the same > >job. Drive your car to the local Maaco dealer and > have the > >Imperial paint job I believe this is $99 if the > sanding on the car > >doesn't take care of the gps the heat from the > drying room will and > >if by some chance that doesn't then the item will > be covered in > >paint and should impede the performance. > >--- In TSCM-L@y..., "James M. Atkinson" > wrote: > >> OK, > >> > >> Take several sheets of thick interlocking > plastic and assemble a > >> dielectric mat that is 3-4 foot wider in all > directions then the > >> vehicle to be inspected. These mats are commonly > used in gyms, > >health > >> clubs, etc. The goal is to electrically isolate > the vehicle from > >the > >> ground so you will need a mat with several > megaohms of resistance. > >> For a typical vehicle this will involve a grid > 12 foot wide and 21 > >> foot long > >> > >> Next, line the ton of the mat with heavy copper > sheeting similar > >to > >> that used by roofers, and make sure you keep it > all on the mat as > >you > >> do not want it to contact the ground. Solder > (with a hand held > >> propane torch) a long heavy copper ground to one > side of the > >copper > >> so that you have electrically connected all the > sheets, and obtain > >a > >> master station ground. Once the joints cool flip > the copper so > >that > >> the joints are facing downward. > >> > >> On top of the copper place 3/4 sheets of plywood > so that the > >copper > >> is completely covered and protected. > >> > >> Now place heavy duty duct tape along all the > seams of the plywood > >to > >> help keep it is place. > >> > >> Next place a thin layer of dense foam on top of > this, and cover it > >> with a really good quality tarp. You may find it > helpful to tape > >> several sheets of Kraft or masking paper in the > general area of > >the > >> engine and transmission so you don't get engine > fluids on the > >tarp. I > >> have found that heavy 36" wide inkjet paper also > works well. > >> > >> By now you will have a thin, yet solid platform > that is 3-4 foot > >> wider then the vehicle you will be checking, and > you will use the > >> copper sheets as a ground plane when searching > for RF devices. > >> > >> You will need a number of body cavity tools, E > and H field probes, > >> one or two microwave spectrum analyzers, > oscilloscope, and so on. > >You > >> will also need one or more diode band diode > detectors with a CDPD > >> bandpass filter and amplifier. Typically you > well be using 500- > >1000 > >> pound of instruments, and several hundred pounds > of hand tools. > >> > >> CAREFULLY park the vehicle on the small > platform, enure it is in > >> park, and then chock the wheels. Turn the > vehicle off, and let the > >> engine cool. > >> > >> Find (or create) a point on the vehicle that you > can use as a > >solid > >> ground, and attack healthy grounding lug. The > negative post on the > >> battery works well, as does the lug that > attaches the battery to > >the > >> engine block. > >> > >> Place the first diode detector inside the > vehicle on the floor > >just > >> in front of the passengers seat, the second just > behind the > >drivers > >> seat, and the third in the rear window. > >> > >> The fourth goes in the trunk (with the trunk > closed). > >> > >> The next two are placed on the ground (tarp) > BEHIND the vehicle > >with > >> the base of the antenna lined up with the rear > fender, passing > >below > >> the gas tanks, and extending to two feet in > front of the rear axle. > >> > >> Next place another diode detector one foot away > from the vehicles > > > radio antenna, and another near the cell phone > antenna if they > >have > >> one. Make sure that the base of the antenna of > the test instrument > >is > >> lined up with the antenna under test. > >> > >> Ensure that none of these diode detectors have > any electrical > >contact > >> with the vehicle, and measure the actual ohms > between the units > >and > >> the vehicle metallic ground. Reposition or > isolate the units so > >that > >> you have at least 40 megaohms of isolation from > the units and the > >> vehicle. > >> > >> Now, measure the AC and DC voltage between the > vehicle ground lug, > >> and the copper plate it is sitting on, then the > amperage, and > >finally > >> the resistance. > >> > >> Pass a tuned 800 MHz MAGNETIC loop antenna that > has a narrow > >bandpass > >> filter, and a high gain amplifier over every > inch of both the > >inside > >> and outside of the vehicle. Do this both with > the engine off, and > >> then on. This measurement should be made with a > spectrum analyzer. > >> > >> ..... > >> > >> I will post more if anyone is interested. > >> > >> -jma > >> > === message truncated === __________________________________________________ Yahoo! - We Remember 9-11: A tribute to the more than 3,000 lives lost http://dir.remember.yahoo.com/tribute 6197 From: Matt Paulsen Date: Mon Sep 9, 2002 10:00pm Subject: Sailor possessed military secrets (07-Sep-02) The last paragraph looks like damage control. It doesn't take a genius to think that he may have copied the floppies up and not tell the truth about it. Even if he fdisked the drives, the data's probably there. http://www.cnn.com/2002/LAW/09/07/military.secrets.ap/index.html Sailor possessed military secrets September 7, 2002 Posted: 9:49 PM EDT (0149 GMT) SAN DIEGO, California (AP) -- A Navy submariner pleaded guilty to charges he improperly possessed defense secrets and stole government-owned computer hard drives, which he later sold on the Internet. A military judge Friday sentenced Petty Officer 1st Class Bryan Moody to seven months in the brig and loss of pay and reduced his rank to seaman recruit. Moody, formerly assigned to the submarine Helena at Point Loma Naval Base, was originally charged with possession of classified information. He faced more than 18 years if convicted of all charges. Prosecutors agreed to a plea deal in exchange for Moody's cooperation in determining whether military secrets were compromised and to avoid divulging classified information during the court martial. Navy investigators found dozens of computer diskettes, a secret Navy chart and three pictures that officials said were classified "secret" at Moody's San Diego home and at his ex-wife's residence. Between 1996 and June 2001, Moody stole at least five computer hard drives from the Helena, selling three on e-Bay. Naval Criminal Investigative Service agents tracked down two of the hard drives, but one was resold to a firm in the Dominican Republic and has not been recovered. None of the hard drives seized by the Naval Criminal Investigative Service contained classified information, special agent Krista Pixley testified. 6198 From: Shawn Hughes Date: Mon Sep 9, 2002 10:51pm Subject: digital tracking See, this is what I was wanting. I think. I reread James' post about five times trying to discern what the technique was about. Is the purpose of the platform to remove the Earth ground to unbalance the antenna? If that's right, then doesn't the tires already provide some decoupling? How does that improve your odds of finding the signal? Before you start, you would want to run a RF scan of the area to see what exists before you bring the suspect vehicle around, right? What is an E and H field probe? What is a CDPD bandpass filter? Does the current measurement from vehicle ground to the copper flashing show RF? If the item is burst, would it show on a datalogging DVM as a series of spikes? See, this is what I love about this list. Technical information that makes me have to think, and at the end, I've learned something new or shored up something I don't know as well as I should ( which, admittedly is volumes.) Then, Mr. Snedden writes: >I have to admit to a rather large smile at your reply. Does that mean that James was pulling my leg? I mean, if my guessing is correct, what he said made sense. To Steve: I apologize, I think you may have misunderstood me. Your response is exactly why I decloaked and put my .01 cent in. What my concept was; was to give the technical answer instead of blowing the guy off with the stock answer. If it's over his head, he sees that he is in the wrong end of the pool. If not, now he gets the benefit of the YEARS of experience you guys have. Regardless, the rest of us who do study this stuff get one more item to tuck away. PS - come off of the dang AC question answer already! Reference the comment by MACCFound ( You're up. You're a professional sweeper. Let's hear your best answer. ) I am not a professional TSCM practitioner. In fact, I installed surveillance gear about 3:1 more than I looked for it. I didn't have the gear or training, but I still got stuck with the task because the people I was working for at the time kept telling me that if I could emplace it, I could find it. That's US Law Enforcement for you. However, since you threw down the gauntlet......... If I recall correctly, the item in question is a digital RF tracking 'bumper beeper', and I'm not allowed to do a physical search. First thing I would do is utter MY stock phrase. " Sorry, but we don't have the equipment or training to do this." Then, after they roll their eyes at me, I would formulate a plan. My idea is that the item is talking by RF to a remote receiver periodically. So, I would want to find some anomaly, periodically occurring in the RF spectrum that gets stronger as I get closer to the vehicle. I would find a RF dead spot to exclude extraneous stuff, like the lowest level of the parking garage where I worked. Nothing got in, nothing came out. Had our radio guy with the moto service monitor check it one time, very quiet for as far as the thing could see. Then, I would get our broadband diode detector, cranked all the way up. Since I'm not aware of a datalogging version of one of those (I'm sure there is ), I would have somebody stand watch with it for thirty - fourty five minutes to see if it blipped. Meanwhile, I would attach my scope to the car battery to see if any major current ( ua / ma) spikes occurred and hope the internal RF doesn't upset the detector. I understand that the ECM, PCM, car stereo, and whatever aftermarket stuff is installed could affect this reading. However, in Bomb Disposal, which is my primary specialty, we have a saying; " If you want to find something, you have to look for it." Meaning flashlight and fiberscope (direct) beats a sniffer and Xray (standoff) every time. Anyways, if I got anything with the CPM, then I would try to dial it in with whatever surveillance receiver I had that was working. That would be my plan. If nothing popped up, I would not tell them that they were clean, but that I just couldn't find the damned thing, and to increase their situational awareness. Well, considering all the anniversaries coming up tomorrow, and the fact that I have a magazine article due, I'm returning to lurking. PLEASE keep up the technical discussion! Shawn ======================================================================== Shawn Hughes 'Technician in Transition' fmr Head, Technical / Electronic Surveillance Unit; Knox County (TN) Sheriff's Office 6199 From: Kirk Adirim Date: Mon Sep 9, 2002 11:43pm Subject: re-dogs bollix, digital tracking "- The antenna must point skyward and can't be covered by metal - this means that the flat antenna has one side which must point towards the sky for decent (any hope of) operation. " And after all these years, I've been installing Amplified GPS antennas pointing at the ground to collect the reflected signals. Works quite well too, I might add. I use this technique on difficult or quick installs, just tilt the antenna slightly from under the vehicle to catch the ground scatter. Primary power for the transmitter comes from it's own internal battery pack and is charged by lifting power off the brake light. Charges only when you brake, Not the most efficient way to charge a battery but a little more difficult to find during a sweep. Here's another thought for the day, Did you know that a Peltier junction, when heated (think manifold, engine block, exhuast system) will give off enough power to charge a battery. Hmmmm. Kirk www.tactronix.com [Non-text portions of this message have been removed] 6200 From: Date: Mon Sep 9, 2002 9:00pm Subject: Re: digital tracking In a message dated 9/9/02 8:57:31 PM Pacific Daylight Time, srh@e... writes: << Reference the comment by MACCFound (You're up. You're a professional sweeper. Let's hear your best answer. ) >> I guess I'm up. My second best answer is very similar to the post by isxpro@y... (The Dog's Bollix). I'd go to a dealership for the kind of car i.e., Mercedes Toyota, etc., and pay the technician to do the search. Making the same explanations as isxpro. This would still be going to a professional but not a TSCM person. …minence grise, Being an ex in this business is like being an ex-marine, ex-biker, ex-Mafia member, or an ex-homosexual. 6201 From: kondrak Date: Tue Sep 10, 2002 3:41am Subject: Hello to Cryptome Greg, youre famous! http://cryptome.org/track-this.htm 6202 From: James M. Atkinson Date: Tue Sep 10, 2002 6:31am Subject: Steve Uhrig Emergency Situation Hello Group, this is your moderators, and one of the list members needs our prayers It has come to my attention that Steve Uhrig (Steve@s...) of SWS Security is scheduled to undergo serious surgery this Thursday. He and his family could really could use prayers and positive thoughts from his friends on this list. I will be be in touch with his wife and I will report anything notable in his status. On Thursday, part of his right foot will be amputated. We don't know how much. Definitely a toe, and they will keep cutting until they get all of the bad bone. Problem is osteomyelitis, which is an infection in the bone. It cannot be treated, only removed, similar to cancer. It started as a simple skin infection, but due to nonaggressive and improper treatment by his insurance company, it settled in the bones. Although he is a diabetic on insulin, the problem is purely coincidental and has nothing to do with his diabetes. He has been on continuous intravenous antibiotics for 7 weeks, and oral before that, and it hasn't helped. Have a large bore catheter directly into his heart for the IV and any emergency meds he needs because the antibiotics are so harsh. Home nurse at his home and office frequently. The infection is still spreading. He needs to get rid of it soonest. His one toe and the bones in his foot actually is crumbling from the bone being disintegrated by the infection. Very visible on the X-Ray. The surgeons will take off his toe, then keep cutting and sending to pathology until they get all the infected bone removed. His right foot is the kick-start foot for his Hog (motorcycle), and his Hog is kick-start only and will remain that way. He has barely been able to walk, and has not been out on the street since May. He has been working from his home office since May, doing little other than typing and talking on the phone. He should be back on email fairly quickly from his wife's computer in the bedroom which is on the network along with the satellite web connection. But in another surgery a few years ago, he didn't wake up from the anesthesia, and the medics were about to ask his family to make a decision. He did wake up, but they were out of ideas on what to do. Right now he and his family is hoping the infection doesn't burst out of the bone into his bloodstream, which would be instant systemic wide blood poisoning and probably fatal. All he has to do is bump his infected foot wrong and that could happen, and it probably couldn't be treated quickly enough to matter. He has stopped the antibiotics in preparation for the surgery, so the antibiotics do not camouflage their attempts to culture the organism and prevent them from identifying it and selecting the specifically targeted antibiotic for follow up. He will still be on the IV for a month, because they will be releasing all that infection into his soft tissue and circulatory system when they cut the bone. Our prayers and positive thoughts go to Steve and his family, and we wish him all the best. For Steve: The Psalm of David The Lord is my shepherd, I shall not want. He maketh me to lie down in green pastures. He leadeth me beside the still waters. He restoreth my soul. He leadeth me in the path of Righteousness for his Names sake. Yea, though I walk through the valley of the shadow of Death, will fear no evil, for thou art with me, Thy rod and thy staff they comfort me. Thou preparest a table before me in the presence of mine enemies. Thou anointest my head with oil. My cup runneth over. Surely, goodness and mercy shall follow me all the days of my life, and I will dwell in the house of the Lord forever. --Psalm 23 Amen, -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 6203 From: A Grudko Date: Tue Sep 10, 2002 8:33am Subject: Re: Steve Uhrig Emergency Situation - Original Message - > It has come to my attention that Steve Uhrig (Steve@s...) of > SWS Security is scheduled to undergo serious surgery this Thursday. > He and his family could really could use prayers and positive > thoughts from his friends on this list. I'm really sorry to hear Steve is unwell - I have great respect for his technical ability and his humourous and intelligent contributions to this group. > On Thursday, part of his right foot will be amputated. We don't know > how much. Definitely a toe, and they will keep cutting until they get > all of the bad bone. > Problem is osteomyelitis, which is an infection in the bone. It > cannot be treated, only removed, similar to cancer. I lost my mother to this disease last year, complicated by circulation problems caused by smoking. She had half her left foot amputated 4 months before her demise. The amputation per se was a minor handicap, hardly effecting her gait. If Steve does not have any further complications he could be back on the group, kicking ass, in days. > His right > foot is the kick-start foot for his Hog (motorcycle), and his Hog is > kick-start only and will remain that way. I had to sell my Gold Wing after I lost my left arm above the elbow in '98. It ruined my golf swing ! As our American cousins say, 'shit happens'. Please let him know that my familly REALLY know what he and his are going through. Andy Grudko (British) - D.P.M., Grad I.S, South Africa - PSIRA investigators Reg. No. 8642 Grudko Associates - www.grudko.com , andy@g... . Est. 1981. International business intelligence and investigations To contact us: (+27 12) 244 0255 - 244 0256 (Fax). ICQ : 146498943. Netmeeting : agrudko@h... IPA, SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust When you need it done right - first time 6204 From: Date: Tue Sep 10, 2002 6:06am Subject: Secret Appellate Court Meets Secret Appellate Court Meets WASHINGTON (AP) - A secret appellate court has met for the first time in its 24-year history to consider a request from the Justice Department for more power to wiretap suspected terrorists and spies, according to department officials. The appeals court, the United States Foreign Intelligence Surveillance Court of Review, convened in a high-security room at the Justice Department in Washington Monday. The appeal stems from a decision from the main court that assesses the legitimacy of Justice Department and FBI requests to spy on people suspected of foreign espionage inside U.S. borders. In August, the court struck down a government surveillance request and the government's assertion that national security concerns justify some lessening of previously recognized civil liberties or privacy rights, lawyers said. Civil liberties groups denounced the secret nature of the court. ``Hearing a one-sided argument and doing so in secret goes against the traditions of fairness and open government that have been the hallmark of our democracy,'' said Ann Beeson, a litigation director at the American Civil Liberties Union. When or if the court's ruling on the department's request will ever be made public was not clear. The Justice Department appeal, released in August, argues that the new wiretap powers are legal under the Patriot Act - the sweeping anti-terrorism law passed by Congress last year after the Sept. 11 attacks. 6205 From: zack <10-33@c...> Date: Tue Sep 10, 2002 7:19am Subject: US Policy and 911 I take this very seriously. You see, I pass the Pentagon almost every day and worked 9-11-01 and will 9-11-02. If I am correct, did not Ireland support us ??? And may I take a moment to express my deepest thanks to the overseas Countrys who have supported us and will in the future. And Mr. Deran, this is quite appropriate for this list. Your comment : " I'm a firm believer that they have no one to blame but them selves, " was uncalled for. <By Mark Steyn >(Filed: 07/09/2002) > >Daily Telegraph > >I was filling up at a truck stop this week and a guy pulled in >alongside. Ford pick-up, late 80s, little rusty. He had a full-size >American flag sticking out the rear cab window and a sticker saying >"United We Stand Against Terrorism" on the tailgate and a couple more >flag decals on the sides. > >He glanced at the car in front. A li'l ol' gran'ma was putting five >bucks' worth in her two-door sedan. She had a little flag flying from >her aerial and a "Proud To Be An American" sticker in the rear window. > >Then he looked at me. And I realised my vehicle was bare. The missus >had put a laminated "Don't Mess With The US" sign on the back, but, >as the year rolled on, somewhere or other it dropped off leaving just >the plastic suction pad, the last vestigial hint of my patriotic >fervour. > >The flags went up on the cars after September 11 and they never came >down, and after a year you hardly notice that half the folks on the >road have mini flagpoles clipped to both side windows and are driving >along fluttering like a grand unending ceremonial escort. > >Not everyone sports them, of course, and what bugged me was that the >guy in the pick-up had me pegged as a conscious non-flag-flyer, as >some pantywaist milquetoast America-disparaging type like those >professors at Berkeley, where they've banned the Stars and Stripes >from all September 11 commemorations lest it make anyone >"uncomfortable". I felt a strange urge to go up to him and say no, >look, honestly, I'll bet I'm just as angry as you. > >Underneath all the "coping" and "healing" and the rest of the >Dianafied soft-focus blur this Wednesday, you won't hear a lot about >anger. But quiet, righteous anger is what a lot of Americans still >feel. I feel angry every time I'm at Boston's godawful Logan Airport, >as crappy and chaotic now as it was a year ago when I dropped off my >niece and nephew to fly home from vacation. > >Ever since, somewhere between the parking garage and the gate, I >think of Mohammed Atta and his accomplices - was this his check-in >line? did he use this payphone? A couple of months back there was a >guy ahead of me at the cardboard-croissant counter with a thick >cloying scent, and I remembered Atta instructing his crew the night >before to wear cologne and remove their body hair. What was he >thinking as he watched his victims board? Did he see two-year-old >Christine Hanson, bound for Disneyland with her parents? > >It's the details that stick. I was in a skyscraper last week and >looked across and caught the eye of a woman in the building across >the street, and I thought of the people in the south tower, after the >first plane hit, glancing out the window and seeing the jumpers from >the north tower going by - men in business suits, necktie up and >flapping, choosing to take one last gulp of air and plunge to their >deaths rather than burn and choke in the heat. > >I feel sorry for the 55 per cent of Europeans who, according to a >poll last week, think falling secretaries and atomised infants are >something to do with "US foreign policy". Mohammed Atta and his chums >were wealthy, privileged and psychotic, yet feeble British churchmen >line up to say the people who did this did it because they're >impoverished, downtrodden yet rational. Granted that the fetid swamp >of equivalence is often mistaken for the moral high ground, it's >rarely been so crowded. > >The stampede started almost immediately. On September 12, the Ottawa >Citizen ran a column by Susan Riley headlined "At Times Like This, We >Thank God That We're Canadians". Oh, God, I groaned, not the usual >moral preening. But no, Ms Riley skipped that and went straight for >naked self-interest: "Our best protection may be distancing ourselves >a little more explicitly from US foreign policy ä pursuing a >reasonable and moderate course in the world's trouble spots." > >I've heard it a thousand times since and I still don't get it. By >"distancing yourself" from the victims of September 11 you move >yourself closer to the perpetrators, closer to barbarism. It may be >"reasonable and moderate", but it's also profoundly self-corroding. > >This isn't a "clash of civilisations" so much as a clash within >civilisations - in the West, between those who believe in the values >of liberal democracy and those too numbed by multiculturalist >bromides to recognise even the most direct assault on them; and in >the Islamic world, between what's left of the moderate Muslim >temperament and the Saudi-radicalised death-cult Islamists. > >I don't want to be "moderate and reasonable" in the face of Mohammed >Atta. A world that "distances" itself from the US to get closer to >him is a world that's more misogynist, bigoted, corrupt and >superstitious. > >On this anniversary, I'll have a new flag on my truck >and Neil Young's great September 11 anthem in the CD player: > No one has the answers, > But one thing is true, > You got to turn on evil, > When it's comin' after you. > > You got to face it down, > And when it tries to hide, > You got to go in after it, > And never be denied. > >Amen. visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." George W Bush God Bless The USA .. NEVER forget 9-11-01 http://www.copscops.com/blessusa.htm [Non-text portions of this message have been removed] 6206 From: kondrak Date: Tue Sep 10, 2002 3:40pm Subject: Re: Steve Uhrig Emergency Situation He's got mine...I'm real familiar with this malady, I lost a business partner and good friend to the exact same thing some years ago. Get well Steve. At 07:31 9/10/02 -0400, you wrote: >Hello Group, this is your moderators, and one of the list members >needs our prayers > >It has come to my attention that Steve Uhrig (Steve@s...) of >SWS Security is scheduled to undergo serious surgery this Thursday. >He and his family could really could use prayers and positive >thoughts from his friends on this list. > >I will be be in touch with his wife and I will report anything >notable in his status. > >On Thursday, part of his right foot will be amputated. We don't know >how much. Definitely a toe, and they will keep cutting until they get >all of the bad bone. > >Problem is osteomyelitis, which is an infection in the bone. It >cannot be treated, only removed, similar to cancer. It started as a >simple skin infection, but due to nonaggressive and improper >treatment by his insurance company, it settled in the bones. >Although he is a diabetic on insulin, the problem is purely >coincidental and has nothing to do with his diabetes. > >He has been on continuous intravenous antibiotics for 7 weeks, and >oral before that, and it hasn't helped. Have a large bore catheter >directly into his heart for the IV and any emergency meds he needs >because the antibiotics are so harsh. Home nurse at his home and >office frequently. The infection is still spreading. He needs to get >rid of it soonest. His one toe and the bones in his foot actually is >crumbling from the bone being disintegrated by the infection. Very >visible on the X-Ray. > >The surgeons will take off his toe, then keep cutting and sending to >pathology until they get all the infected bone removed. His right >foot is the kick-start foot for his Hog (motorcycle), and his Hog is >kick-start only and will remain that way. > >He has barely been able to walk, and has not been out on the street >since May. He has been working from his home office since May, doing >little other than typing and talking on the phone. > >He should be back on email fairly quickly from his wife's computer in >the bedroom which is on the network along with the satellite web >connection. > >But in another surgery a few years ago, he didn't wake up from the >anesthesia, and the medics were about to ask his family to make a >decision. He did wake up, but they were out of ideas on what to do. > >Right now he and his family is hoping the infection doesn't burst out >of the bone into his bloodstream, which would be instant systemic >wide blood poisoning and probably fatal. All he has to do is bump >his infected foot wrong and that could happen, and it probably >couldn't be treated quickly enough to matter. He has stopped the >antibiotics in preparation for the surgery, so the antibiotics do >not camouflage their attempts to culture the organism and prevent >them from identifying it and selecting the specifically targeted >antibiotic for follow up. He will still be on the IV for a month, >because they will be releasing all that infection into his soft >tissue and circulatory system when they cut the bone. > >Our prayers and positive thoughts go to Steve and his family, and we >wish him all the best. > > > >For Steve: > >The Psalm of David > >The Lord is my shepherd, I shall not want. > >He maketh me to lie down in green pastures. > >He leadeth me beside the still waters. > >He restoreth my soul. > >He leadeth me in the path of Righteousness for his Names sake. > >Yea, though I walk through the valley of the shadow of Death, will >fear no evil, for thou art with me, Thy rod and thy staff they >comfort me. > >Thou preparest a table before me in the presence of mine enemies. > >Thou anointest my head with oil. > >My cup runneth over. > >Surely, goodness and mercy shall follow me all the days of my life, >and I will dwell in the house of the Lord forever. > >--Psalm 23 > >Amen, > >-jma >-- > >-------------------------------------------------------------------------------------------------- >The First, The Largest, The Most Popular, and The Most Complete TSCM, >Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. >-------------------------------------------------------------------------------------------------- > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com >-------------------------------------------------------------------------------------------------- > Vocatus atque non vocatus deus aderit >-------------------------------------------------------------------------------------------------- > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6207 From: Date: Tue Sep 10, 2002 2:11pm Subject: Secret Court Pressed on Decision Secret Court Pressed on Decision By JESSE J. HOLLAND WASHINGTON (AP) - Senators on Tuesday called for a secret appellate court to make public its decision on whether to give the Justice Department more power to wiretap suspected terrorists and spies. However, those same members of the Senate Judiciary Committee squabbled over how the Justice Department has been interpreting the changes Congress made in the wiretap laws after the Sept. 11 attacks last year. For the first time in its 24-year existence, the United States Foreign Intelligence Surveillance Court of Review had to meet Monday to review a Justice Department request to use espionage wiretaps for criminal operations. Its lower court in August struck down a Justice Department surveillance request and its assertion that it can use Foreign Intelligence Surveillance Act wiretaps for criminal as well as espionage operations. Prosecutors pointed to the USA Patriot Act, which changed the surveillance law to permit its use when collecting information about foreign spies or terrorists is ``a significant purpose,'' rather than ``the purpose,'' of such an investigation. Previously, the FISA wiretaps could only be used for foreign intelligence investigations and not criminal investigations. The Foreign Intelligence Surveillance Court disagreed with the Justice Department's interpretation, and federal prosecutors appealed to the higher court. The appeals court convened Monday in a high-security room at the Justice Department in Washington and made no announcement of whether it had made a decision. Civil liberties groups denounced the secret nature of the court. ``Hearing a one-sided argument and doing so in secret goes against the traditions of fairness and open government that have been the hallmark of our democracy,'' said Ann Beeson, a litigation director at the American Civil Liberties Union. Senators asked the court to publicly release its decision and the arguments Justice Department lawyers made in front of it, so lawmakers can know how government prosecutors are using the changes they provided. ``We need to know how this law is being interpreted and applied,'' Senate Judiciary Chairman Patrick Leahy, D-Vt., said Tuesday. No answer has been received from the court one way or the other, Senate officials said Tuesday. Critics have feared that the government might use the FISA change as a loophole to employ espionage wiretaps in common criminal investigations. But a Justice Department official told senators Tuesday that the agency still could only use espionage wiretaps against people considered to be foreign spies or working for foreign countries. Associate Deputy Attorney General David Kris said that there may be times where law enforcement needs to be involved with their work to stop foreign spies and terrorists. ``When we identify a spy or a terrorist, we have to pursue a coordinated, integrated, coherent response,'' Kris said in written remarks to the Senate Judiciary Committee. ``We need all of our best people, intelligence and law enforcement alike, working together to neutralize the threat.'' Senate Republicans and Democrats disagreed on whether they intended the USA Patriot Act to loosen the wiretap laws to include criminal investigations. ``It was not the intent of the amendments to fundamentally change FISA from a foreign intelligence tool into a criminal law enforcement tool,'' Leahy said. ``We all wanted to improve coordination between the criminal prosecutors and intelligence officers, but we did not intend to obliterate the distinction between the two, and we did not do so.'' But Republicans said that was the exact intent of the law. ``It is clear that Congress intended to allow greater use of FISA for criminal purposes and to increase the sharing of intelligence information and coordination of investigations between intelligence and law enforcement officers,'' said Sen. Orrin Hatch, R-Utah. 6208 From: Scott Malcolm Date: Wed Sep 11, 2002 2:27pm Subject: RE: Steve Uhrig Emergency Situation The prayers in my household for the next few weeks will be for Steve's quick recovery. I knew he was homebound and trying to shake this latest setback. I was truly unaware of the seriousness of his illness. (he doesn't lead on) When ever I need an answer to a technical problem Steve is always there. When ever I needed to stand corrected Steve cared enough to do it. (which is often) Steve get well soon because the soft shells are in season and you have way to many free air miles Regards, Scott Malcolm Malcolm & Associates, Inc. Your Confidential Alternative Serving the State of Wisconsin http://www.execpc.com/~conf-pi Office 262 965 4426 / Fax 262 965 4629 ______________________________________________________________ >RE: >Message: 6 > Date: Tue, 10 Sep 2002 07:31:11 -0400 >From: "James M. Atkinson" >Subject: Steve Uhrig Emergency Situation >Hello Group, this is your moderators, and one of the list members >needs our prayers >It has come to my attention that Steve Uhrig (Steve@s...) of >SWS Security is scheduled to undergo serious surgery this Thursday. >He and his family could really could use prayers and positive >thoughts from his friends on this list. 6209 From: Date: Wed Sep 11, 2002 4:05pm Subject: Extremely Timely Check out http://beetlebailey.com/images/flag.swf Click here: http://beetlebailey.com/images/flag.swf 6210 From: Ocean Group Date: Wed Sep 11, 2002 0:13pm Subject: RE: US Policy and 911 Hello Sean, People have reasons for doing everything that they do.... >Sure I guess thats fair, you might do something on impulse though, and may not later have a reason for what you did. some of them are delusional, >That would be people with mental illness I guess. some are due to misunderstandings, >Like when the US promised Iraqi rebels that they would stick with them if they helped to over throw Suddam, and then left them to be slaughtered when the US agreed with Suddam for him to leave Kuwait and give the US access to Iraqi oil. misinformation and a host of other reasons..... >Like what the US DOD and officialdom do to the american people and western europe. having a reason does not always explain the actions taken by an individual or a group... >One may not agree with the reason but the fact is that rational people decided that the reason was strong enough to do what they had to do. ...nor does it justify their actions by the fact they they believe they have a reason, >Exactly, just like the way the US think that they have the right to control the goverment in Cuba and have attempted to assasinate and overthrow his position, and the reason they justify this is by saying its for the good of america. nor does it villafy or indict the victim of said action. >Couldn't agree more, the Cubans are damn fine honest people, and they make good cigars. Regards Vance Sean J. Walsh Walsh & Associates TSCM & Counter-espionage Services Investigative & Security Issues (415) 899-9660, fax (415) 898-5500 www.TSCM.net PI18345 ----- Original Message ----- From: Ocean Group To: TSCM Group Sent: Tuesday, September 10, 2002 6:40 AM Subject: [TSCM-L] US Policy and 911 As regards James news posting, I find it hard to take an article like this seriously. While the US have my deepest sympathies as regards 911 but I'm a firm believer that they have no one to blame but them selves, don't get me wrong, loss of life or more formally put murder is wrong....full stop. But people obviously don't do it for no reason. Anyhow, my point is, isn't this a little out of the scope of a TSCM group? Or am I wrong? Regards Vance Deran, Ocean Group, Ireland. Date: Sun, 8 Sep 2002 12:26:03 -0400 From: "James M. Atkinson" Subject: Flying the Flag Flying the Flag By Mark Steyn (Filed: 07/09/2002) Daily Telegraph I was filling up at a truck stop this week and a guy pulled in alongside. Ford pick-up, late 80s, little rusty. He had a full-size American flag sticking out the rear cab window and a sticker saying "United We Stand Against Terrorism" on the tailgate and a couple more flag decals on the sides. He glanced at the car in front. A li'l ol' gran'ma was putting five bucks' worth in her two-door sedan. She had a little flag flying from her aerial and a "Proud To Be An American" sticker in the rear window. Then he looked at me. And I realised my vehicle was bare. The missus had put a laminated "Don't Mess With The US" sign on the back, but, as the year rolled on, somewhere or other it dropped off leaving just the plastic suction pad, the last vestigial hint of my patriotic fervour. The flags went up on the cars after September 11 and they never came down, and after a year you hardly notice that half the folks on the road have mini flagpoles clipped to both side windows and are driving along fluttering like a grand unending ceremonial escort. Not everyone sports them, of course, and what bugged me was that the guy in the pick-up had me pegged as a conscious non-flag-flyer, as some pantywaist milquetoast America-disparaging type like those professors at Berkeley, where they've banned the Stars and Stripes from all September 11 commemorations lest it make anyone "uncomfortable". I felt a strange urge to go up to him and say no, look, honestly, I'll bet I'm just as angry as you. Underneath all the "coping" and "healing" and the rest of the Dianafied soft-focus blur this Wednesday, you won't hear a lot about anger. But quiet, righteous anger is what a lot of Americans still feel. I feel angry every time I'm at Boston's godawful Logan Airport, as crappy and chaotic now as it was a year ago when I dropped off my niece and nephew to fly home from vacation. Ever since, somewhere between the parking garage and the gate, I think of Mohammed Atta and his accomplices - was this his check-in line? did he use this payphone? A couple of months back there was a guy ahead of me at the cardboard-croissant counter with a thick cloying scent, and I remembered Atta instructing his crew the night before to wear cologne and remove their body hair. What was he thinking as he watched his victims board? Did he see two-year-old Christine Hanson, bound for Disneyland with her parents? It's the details that stick. I was in a skyscraper last week and looked across and caught the eye of a woman in the building across the street, and I thought of the people in the south tower, after the first plane hit, glancing out the window and seeing the jumpers from the north tower going by - men in business suits, necktie up and flapping, choosing to take one last gulp of air and plunge to their deaths rather than burn and choke in the heat. I feel sorry for the 55 per cent of Europeans who, according to a poll last week, think falling secretaries and atomised infants are something to do with "US foreign policy". Mohammed Atta and his chums were wealthy, privileged and psychotic, yet feeble British churchmen line up to say the people who did this did it because they're impoverished, downtrodden yet rational. Granted that the fetid swamp of equivalence is often mistaken for the moral high ground, it's rarely been so crowded. The stampede started almost immediately. On September 12, the Ottawa Citizen ran a column by Susan Riley headlined "At Times Like This, We Thank God That We're Canadians". Oh, God, I groaned, not the usual moral preening. But no, Ms Riley skipped that and went straight for naked self-interest: "Our best protection may be distancing ourselves a little more explicitly from US foreign policy S pursuing a reasonable and moderate course in the world's trouble spots." I've heard it a thousand times since and I still don't get it. By "distancing yourself" from the victims of September 11 you move yourself closer to the perpetrators, closer to barbarism. It may be "reasonable and moderate", but it's also profoundly self-corroding. This isn't a "clash of civilisations" so much as a clash within civilisations - in the West, between those who believe in the values of liberal democracy and those too numbed by multiculturalist bromides to recognise even the most direct assault on them; and in the Islamic world, between what's left of the moderate Muslim temperament and the Saudi-radicalised death-cult Islamists. I don't want to be "moderate and reasonable" in the face of Mohammed Atta. A world that "distances" itself from the US to get closer to him is a world that's more misogynist, bigoted, corrupt and superstitious. On this anniversary, I'll have a new flag on my truck and Neil Young's great September 11 anthem in the CD player: No one has the answers, But one thing is true, You got to turn on evil, When it's comin' after you. You got to face it down, And when it tries to hide, You got to go in after it, And never be denied. Amen. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6211 From: Ocean Group Date: Thu Sep 12, 2002 10:01am Subject: RE: Digest Number 1058 Sure the Irish goverment voiced there backing of the US, but that doesn't mean the country agrees with it. If you were Ireland and the most powerful country in the world turns around and says in no uncertain terms....."You're either with us or against us...." what do you do? of course your going to say, yeah sure we're right behind you all the way....all the way to the pub as we are neutral....ciao. if the goverment turned around and said no ....we stand with the taliban, I think the US would have cracked up laughing, no one would even take them seriously, I mean how could they!!! But unfortunately public perception of what the states is doing is bad......and I mean majority.....not minority, here anyway, but judging by the article very much rife in Europe. Let me clarify myself as to what I mean in "my comment". America on a whole is responsible for the attacks that were inflicted on them in this case. You can't declare war on someone and then get all shocked when they attack you. Obviously no one expected it to be so vicious, but those arab guys aim was to bring it home for the US to show them what its like to have your innocent love ones killed. This is wrong of course....I couldn't agree with people more. What I don't like is when some american reporter thinks that europeans that disagree with the US's war on terror are stupid....its very small minded, USA style. On a day like this my utter respect goes out for the firemen and police that lost their lives trying to save innocent people. Message: 9 Date: Tue, 10 Sep 2002 08:19:52 -0400 From: zack <10-33@c...> Subject: US Policy and 911 I take this very seriously. You see, I pass the Pentagon almost every day and worked 9-11-01 and will 9-11-02. If I am correct, did not Ireland support us ??? And may I take a moment to express my deepest thanks to the overseas Countrys who have supported us and will in the future. And Mr. Deran, this is quite appropriate for this list. Your comment : " I'm a firm believer that they have no one to blame but them selves, " was uncalled for. 6212 From: JACK MOGUS Date: Wed Sep 11, 2002 10:28am Subject: New Member I just recently became aware of the TSCM-L. I sincerely believe that a technical forum for TSCM practitioners is long overdue. I wholeheartedly support the stated goals and objectives of TSCM-L My name is Jack Mogus. I am the director of operations for Nova Security Services located in Vienna, VA. I have been involved in TSCM operations, almost exclusively, since the early 80's. I have "guest lectured" at several colleges and universities on this subject. Additionally, I teach courses on Basic and Intermediate levels and will be beginning an advanced program at a Virginia approved private security school. I have also presented papers and actively participated in security seminars in Russia. and other countries. I apreciate the opportunity to participate on this forum and welcome the opportunity to help in any way I can. Jack Mogus [Non-text portions of this message have been removed] From: James M. Atkinson, Comm-Eng Date: Mon Sep 11, 2000 0:27am Subject: Re: Equipment List At 4:26 PM -0400 9/10/00, Steve Uhrig wrote: > >Once upon a midnight dreary, Janis.Balklavs-Grinhofs@l... >pondered, weak and weary: > > > I'm trying to find out an answer to the following question: > > > Say, we have a Company with their own Security department. > > Board is bit concerned about surveillance threats and > > understands that countermeasures will cost some money. > > agree professionals should do full-scale sweeps but they > > also want some limited sweeps to be done by their own > > > I have some suggestions and will be glad to read yours :) > >You're nowhere near the stage to be asking questions about >equipment. > >Pick 2 or 4 people who are likely to be with the company >for many years. Make sure those people have some sort of >technical/electronics/communications background, are >precise to detail, patient and willing to put in some >serious time studying like they were back in undergrad >school. Agree'd... but make sure they are loyal to the company and VERY WELL PAID. >Do not even think about equipment, much less spend anything >at this point. > >Send those people to appropriate schools. Budget perhaps >$20K per man plus their salary and perks of course. I would budget about 60k for the initial training, and about 7500 per year for yearly/biyearly re-certification. >Either find someone local who does sweeps and loan your >people to them as apprentices for several sweeps, or >contract a competent sweep firm to sweep your place and >hold your trainee's hands throughout. Agree'd, but they should get their technical credentials PRIOR to obtaining TSCM training or apprenticeship. >By now at least a year will have passed, maybe more. > >And now you are ready to ask questions about equipment, >however you will not have to. The trainees will have >learned quite a bit and will know what equipment they will >need and where to buy it. I have mixed feelings about this... I would prefer that the TSCM practitioner only have minor input about what equipment will be purchased, and only slightly more input on HOW the sweep will be performed. I know this may put a few peoples nose out of joint, but TSCM'ers tend to be too close to the problem to be objective about this issue. Let someone else pick out the gear, develop the procedures, and specify the training... then bring in the employees and teach them how to perform a set of procedures. Of course this only applies to government or corporate sweep teams, and would not apply to small TSCM firms (who tend to freelance due to thier expertise and equipment). >Anyone inquiring about what equipment to purchase and where >to purchase it is not ready to buy it. When you are >equipped to use the equipment you will not be asking others >for general input. Good point >In my opinion, substantially bypassing the above >suggestions will result in you wasting your money and >garnering a dangerous false sense of security from thinking >you are being swept when you are not. > >Best bet in the long run, considering all factors including >cost, you will be ahead contracting an outside team than >trying to do anything in house. > >TSCM is a narrow specialty. Only the largest firms have >enough genuine need to justify setting up their own in >house capability. > >Most of us have swept for large outfits who have an in- >house man or team, because the outfits know their internal >capabilities are not adequate for serious threats. > >I buy a good bit of essentially new countersurveillance >equipment, for a tiny fraction of the original price, from >companies who wanted to set up their own capabilities. >Their wizard let their employ and no one knew anything >about the equipment, or got bored, or realized they were in >over their head. I have also seen this dozens of times... in some cases the equipment sat unused for 10 years. >The money it takes to get even a basic kit of TSCM >equipment, not to mention cost of training, is a good bit >more than it would cost to hire an outside team for some >time. If you pick one of the rare competent and ethical >TSCM practitioners, you know the job will be done properly. >With inexperienced, marginally trained in house types, >there always will be a question in the back of your mind. Indeed, which is why you should periodically bring in an outside freelancer. >Most genuine sweepers have backgrounds which greatly >benefit them in the course of their TSCM duties. By this I >refer to government experience where they learned things >they would not pick up in the private sector. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1413 From: Date: Mon Sep 11, 2000 3:15am Subject: Re: Re: Equipment List Well, may be my english was too poor ;-) As I told, there is a company here in Latvia which is concerned about surveillance threat. Company (approx 600 employees) is big one only compared with other Latvian companies. Friend of mine is a chief of security. He has done a very hard and good job convincing the Company board that spying is a real threat. Now they ask him to present a plan. There are lot of limitations. The first is money. As you understand nobody will invest in TSCM all the money he has, so - approx 50-70k$ for equipment and 10-15k$ for initial training is the maximum they can afford. All other security expenses like guards, alarms, CCTV, lights, access control and so on are on other expenses list not discussed here. On outside TSCM teams. You will find here virtually nothing. There are very few local companies offering sweep services but they are more like private investigators who have few randomly selected pieces of equipment and NO good training. On the other hand, nobody will invest in training and equipment if sweep expenses of $1000 are considered as too high by a customer. So, if you need competent and capable TSCM people you will need to invite somebody from abroad. It will cost you extra money. You will get them late sometimes. The idea was to make a quick-response TSCM team to sweep Company offices. It's much better than nothing. Nobody is trying to guarantee the Company officials that the offices will be clean. The question is how to spend the money the best way. These amounts were very hard to get and it will be very sad if the money will be vasted or cancelled. On other words - question is about poor man's TSCM ;-) Janis P.S. Do you know where Latvia is? ;-) >Pick 2 or 4 people who are likely to be with the company >for many years. Make sure those people have some sort of >technical/electronics/communications background, are >precise to detail, patient and willing to put in some >serious time studying like they were back in undergrad >school. >Do not even think about equipment, much less spend anything >at this point. > >Send those people to appropriate schools. Budget perhaps >$20K per man plus their salary and perks of course. I would budget about 60k for the initial training, and about 7500 per year for yearly/biyearly re-certification. >Either find someone local who does sweeps and loan your >people to them as apprentices for several sweeps, or >contract a competent sweep firm to sweep your place and >hold your trainee's hands throughout. Agree'd, but they should get their technical credentials PRIOR to obtaining TSCM training or apprenticeship. >By now at least a year will have passed, maybe more. > >And now you are ready to ask questions about equipment, >however you will not have to. The trainees will have >learned quite a bit and will know what equipment they will >need and where to buy it. I have mixed feelings about this... I would prefer that the TSCM practitioner only have minor input about what equipment will be purchased, and only slightly more input on HOW the sweep will be performed. I know this may put a few peoples nose out of joint, but TSCM'ers tend to be too close to the problem to be objective about this issue. Let someone else pick out the gear, develop the procedures, and specify the training... then bring in the employees and teach them how to perform a set of procedures. Of course this only applies to government or corporate sweep teams, and would not apply to small TSCM firms (who tend to freelance due to thier expertise and equipment). >Anyone inquiring about what equipment to purchase and where >to purchase it is not ready to buy it. When you are >equipped to use the equipment you will not be asking others >for general input. >In my opinion, substantially bypassing the above >suggestions will result in you wasting your money and >garnering a dangerous false sense of security from thinking >you are being swept when you are not. > >Best bet in the long run, considering all factors including >cost, you will be ahead contracting an outside team than >trying to do anything in house. > >TSCM is a narrow specialty. Only the largest firms have >enough genuine need to justify setting up their own in >house capability. > >Most of us have swept for large outfits who have an in- >house man or team, because the outfits know their internal >capabilities are not adequate for serious threats. > >I buy a good bit of essentially new countersurveillance >equipment, for a tiny fraction of the original price, from >companies who wanted to set up their own capabilities. >Their wizard let their employ and no one knew anything >about the equipment, or got bored, or realized they were in >over their head. I have also seen this dozens of times... in some cases the equipment sat unused for 10 years. >The money it takes to get even a basic kit of TSCM >equipment, not to mention cost of training, is a good bit >more than it would cost to hire an outside team for some >time. If you pick one of the rare competent and ethical >TSCM practitioners, you know the job will be done properly. >With inexperienced, marginally trained in house types, >there always will be a question in the back of your mind. 1414 From: Steve Uhrig Date: Mon Sep 11, 2000 8:36am Subject: Re: Equipment List Once upon a midnight dreary, Janis.Balklavs-Grinhofs@l... pondered, weak and weary: > Well, may be my english was too poor ;-) We understood everything you were saying, so you are doing well. Few Americans speak a second language. We are fortunate others learn to speak English. > nobody will invest in TSCM all the money he has, > so - approx 50-70k$ for equipment and 10-15k$ for initial > training is the maximum they can afford. USD $60,000 to $75,000 will buy you a lot of sweep services from a competent U.S. firm, possibly several years' worth depending on how much needs to be done. There are a number of U.S. firms who can respond within a few days, and are reliable. You still will be much better off importing trained people than trying to establish your own capability. What will you do in the year or two minimum it takes to set up and train your own people? > All other security expenses like guards, alarms, CCTV, > lights, access control and so on are on other expenses > list not discussed here. It is good you have considered this. Too many times companies spend a lot of money on sweeping when they do not even have basic physical security measures in place. > It's much better than nothing. Nobody is trying to > guarantee the Company officials that the offices will be > clean. Why is it better than nothing? I say it may be worse than nothing. If you do not sweep, you will know you may not be secure and will use caution with sensitive affairs. If people do sweeps who are not properly trained, they may well miss something. However, because they tried, you may think you are safe and would not be as careful as otherwise. A false sense of security can be dangerous. And if you will not consider the facility relatively secure after your own people sweep it, then why bother? No honest company will claim offices are 100% clean. They will do their best effort to ensure that, but it would not be honest to guarantee it. > The question is how to spend the money the best way. These > amounts were very hard to get and it will be very sad if the > money will be vasted or cancelled. I believe the best use of your money would be to hire an outside team. There are several around who travel internationally. Look for membership in BECCA as one indicator that the company is honest, but also check references on your own. The only exception I might suggest in your case is what I do in Bogota and Mexico City. To avoid expense and problems moving expensive equipment to there from the U.S., I keep a separate kit in each city, to use when I visit. However, no one else uses the equipment when I am not there. If you did want to buy your own equipment, you could work with an outside team, ask their recommendations, buy what they suggest, then hire them to inspect your facility using the equipment you own. At the same time, they could be training some of your people in using the equipment. You would not save a lot, and most sweepers will have items they have built plus a lot of little things in their kits from years of experience. But the few major pieces you could get. Remember, too, that this is not a game of equipment. It is the mind of the bugger against the mind of the sweeper. The equipment is tools used to implement thoughts of the mind. The best sweepers are those who have the mind of a bugger, usually having been a bugger for a government somewhere in their past. The people doing this should have analytical, suspicious, creative minds. That is more important than knowing how to read the indications from the equipment. > P.S. Do you know where Latvia is? ;-) Riga is a beautiful city. I have never swept there though. The wife of one of the gentlemen on this list is from Latvia. He would be the ideal person if you hire an outside team. I will email you his information separately off list. Small world. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1415 From: Steve Uhrig Date: Mon Sep 11, 2000 9:49am Subject: Death of John Reisinger The following message is reposted here by permission of Bill Bennett, the author. Perhaps some of y'all had the privilege of knowing Mr. Reisinger. Rest easy, brother. Steve ------------------------------------------------- Dear Friends and Colleagues, On Friday, September 8, 2000, Col. John "Pierre" Reisinger, age 84, founder of Walsingham Associate, passed away after a long physical illness. Up until a month ago John was still involved in the research of procedures and techniques to defeat the industrial eavesdropper. John had an illustrious carrier after graduating from the Chicago Conservatory of Music, he toured the world as a violinist with Horce Height and his Musical Knights. He enter law enforcement as a deputy sheriff in Mendocino County. In 1939 joined the Army as a cavalryman on the Mexican border; transferred to the Army Security Police; then to Counter Intelligence Corp. Served in North Africa, parachuted into Europe before D Day to blow a train tunnel and met his future wife at a French Marque safe house. She opened the door holding a machine gun on him. They later married had three daughters; she passed away in December of 1999. After the war he served two tours of duty in Europe that last tour as Commanding Officer, CIC Laboratory in Europe. Served as Provost Marshall in Denver and two tours of duty in CIC in Viet Nam. He retired in 1965. Entered State of California service in 1966 and while serving as a DOJ Special Agent detailed to guard Attorney General Tom Lynch was injured when a drunk driver hit the chase vehicle. He was retired in 1978. In 1980 he established Walsingham Associate, a professional electronic surveillance countermeasures service or as it is called in the military "Technical Surveillance Countermeasures". In his first year he performed 7 sweeps. This last year 73 sweeps were performed. We will miss him, a loyal friend and trusted associate. William "Bill" Bennett President Walsingham Associate Inc Walsingham@c... (415) 492-1594 PI 11618 ------- End of forwarded message ------- ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1416 From: James M. Atkinson, Comm-Eng Date: Mon Sep 11, 2000 1:39pm Subject: Re: Re: Equipment List (shameless plug) At 10:15 AM +0200 9/11/00, Janis.Balklavs-Grinhofs@l... wrote: >Well, may be my english was too poor ;-) > >As I told, there is a company here in Latvia which is concerned about >surveillance threat. >Company (approx 600 employees) is big one only compared with other Latvian >companies. > >Friend of mine is a chief of security. He has done a very hard and good >job convincing the Company >board that spying is a real threat. Now they ask him to present a plan. >There are lot of >limitations. The first is money. As you understand nobody will invest in >TSCM all the money >he has, so - approx 50-70k$ for equipment and 10-15k$ for initial training >is the maximum they >can afford. All other security expenses like guards, alarms, CCTV, lights, >access control and >so on are on other expenses list not discussed here. Good Afternoon, Your client could purchase a low threat, limited scope set of equipment that could be used by his inside security people just prior to, or during a sensitive meeting. I call such a kit a "bodyguard fly away kit", as it is a simple kit a bodyguard or security specialist can grab, throw into a transit case and "fly way" with his protectee/client for a business meeting somewhere. The equipment is used to perform a quick check on an area, and can then be used to provide a limited level of security... the key point here being LIMITED. Of course nothing is a substitute for have an outside TSCM specialist come in, but it would provide at least some level of security. General such a kit include all of the following, and would typically be packaged in a single 24 inch transit case along with a few hand tools, hand held O'scope, and so on. I have such a kit packed and ready to go on a moments notice as I periodically get "7/24 calls" and have to fly out of town for low threat, but emergency sweeps for a client. For such sweeps I typically travel with a single 24" cube transit case with snap on casters, a high end microwave spectrum analyzer (in a Halliburton roller/carry on briefcase), a briefcase (also carry on), and a big old Samsonite briefcase with my suits, clothes for a week, toiletries, and other odds and ends. For such a kit I would suggest the following (but keep in mind it is for low threat situations): I would STRONGLY lean towards the OSCOR and ORION as a minimum, and possibly supplement it with a CPM-700. The equipment is easy to use, and generally does not require extensive formal training as the manuals or instructions are brief, well written, and easy to understand. OSC-5000 OSCOR Omni Spectral Correlator Base System$ 14,000.00 ODP-5000 Deluxe System Package$ 2,600.00 System Includes: OVM-5000 Video Option - Multi-format Video OVP-5000 Video Patch Cord OAR-5000 Audio Recorder with Cable OTL-5000 Ultrasonic Triangulate and Locate Option MPA-5000 Modular Phone Adapter CLA-5000 Cigarette Lighter Adaptor LPE-5000 Locator Probe Extension Cable MIC-5000 Microphone (for remote monitoring) MPC-5000 Multi-Purpose Cable OIF-5000 IF Output for Panoramic Signal Monitor (10.7 MHz)$ 230.00 OPC-5000 Computer Software Interface and Database Utilities software package$ 2,950.00 NGA-5000 Noise Generator for use with PC Software Version 3.0$ 295.00 NJE-4000 ORION Non-linear Junction Detector$ 14,860.00 OTK-4000 Tool Kit for ORION NLJD$ 2,350.00 CPM-700 Counter Surveillance Probe and Monitor$ 2,195.00 IRP-700 Infrared Probe$ 159.00 MLP-700 Magnetic Leakage Probe$ 185.00 ALP-700 Acoustic Leakage Probe$ 99.00 MPA-700 Modular Phone Adapter$ 39.00 TRP-700 Tape Recorder Patch Cords$ 10.00 CLA-700 Cigarette Lighter Adapter$ 10.00 NCB-700 Rechargeable Nickel Cadmium Battery Pack$ 55.00 Fluke 89 Series IV True RMS Digital Multimeter$ 465.00 Fluke 199 Dual Channel, 200 MHz Hand Held Oscilloscope $ 2,985.00 1059 Audio Preamplifier$ 375.00 2040B Test Oscillator$ 292.00 2030 Carrier Current Probe (WBFM/AM)$ 270.00 SCD-5 Carrier Current Probe (NBFM)$ 390.00 2047/U Ultrasonic/Contact Stethoscope$ 930.00 2049M Electronic Stethoscope$ 585.00 ============ Subtotal for Kit$ 46,329.00 (and this does not include hand tools, ladders, and other more mundane items that can be obtained locally (add an extra 25-30% to the budget for such things). If any list member is interested in the above equipment give me a call... we can provided it on very short delivery time within the U.S. and Canada (export paperwork for overseas shipments takes a bit longer). As a courtesy to the list if you buy the above kit (complete) from us during the month of September we will provide you with a free transit/shipping case (white plastic with removable casters), and we will pay all shipping, handling, and insurance (including international shipping). If you really ask nice we will include a nice (new) Halliburton 13 * 18 * 5.2 leather lined executive briefcase with the Kaiser and Fluke stuff in it (indicate if you want a Silver or Black one). -jma PS: On low end sweeps of this nature I use a hand held collapsible whip antenna, compact discone, and a small hand held spiral log period (instead of my big signal sucking antennas, mixers, and waveguide I would use on regular sweeps). Also in such cases instead of using the big Microtel, WJ, MACOM, and ICOM radios I use a hand held compact scanner and the internal receiver/demod on the SA. If I travel outside the U.S. then I leave the spectrum analyzer out of the kit and only travel with three bags (including only one carry-on). ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= [Non-text portions of this message have been removed] 1417 From: Graham Bignell Date: Mon Sep 11, 2000 6:29pm Subject: Article: Government Computer Security Gets Low Grade http://dailynews.yahoo.com/h/nm/20000911/ts/tech_security_dc_2.html Monday September 11 11:57 AM ET Government Computer Security Gets Low Grade By Jim Wolf WASHINGTON (Reuters) - A House of Representatives panel gave the federal government on Monday a barely passing grade of D-minus for computer security, warning of a growing threat to a wide range of critical operations and data. Lapses at all 24 bureaucracies reviewed ``place a broad array of federal operations and assets at risk of fraud, misuse and disruption,'' said the General Accounting Office (GAO), the non-partisan investigative arm of Congress. Based on the GAO audit and on self-reported data from the agencies and their inspectors-general, the House Subcommittee on Government Management, Information and Technology handed out a failing F grade to more than one in four of the major U.S. bureaucracies. Receiving F's were the departments of Health and Human Services, Agriculture, Justice, Labor and Interior as well as the Small Business Administration and the Office of Personnel Management, the federal human resources office. [ complete article at http://dailynews.yahoo.com/h/nm/20000911/ts/tech_security_dc_2.html ] --- Graham Bignell L: 416 366 9755 C: 416 678 3263 Chief Paranoia Officer -- Agrivane Inc. 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 1418 From: Jay Coote, W6CJ Date: Tue Sep 12, 2000 11:39am Subject: Telephone and PBX seminars? I would like to know where (other than calling manufacturers) to find seminars and training in the LA or Southern California area. I am interested in training on PBX, POTS, digital in-house PBXes and so on. Thanks, Jay Coote Los Angeles 1419 From: J. Ottosson Date: Tue Sep 12, 2000 4:28am Subject: RE: Pretty Good Privacy (PGP) Vulnerability -----BEGIN PGP SIGNED MESSAGE----- On 25 Aug 2000, at 20:42, with subject: RE: [TSCM-L] Pretty Good Privacy (P, Miguel Puchol wrote: > This is the classic man-in-the-middle attack NO, it is NOT man in the middle attack means that someone uses a key that he think belongs to a certain person but it does in fact not. We got person 'a', 'b' and 'c'. Person a is communicating with person c. Person b is a bad dude, like an agent or something ;) When a want to send encrypted data to c he uses c's public key. But person b have constructed another key with almost identical identifying data on it. This means a key with the same name, address, id's, size AND key id may be constructed, in theory. The Fingerprint will not be the same but ALL of the other outer appearances will be identical and it will therefore fool a lot of people. The new key may then be uploaded to a server or more likely of course in the case of a targeted attack, be _placed_ in the victims keyring.. somehow. When person a send data to c he actually uses person b's key without knowing it. Person b intercept the traffic, decrypts it since he got the corresponding private key counterpart and recends it now encrypted with the real key belonging to c, the one a thought he used in the first place. In all of this it is quite unlikely that a or c will ever notice the attack. This is the classic man in the middle attack. This is possible and a lot of people would fall for this attack since people don't check their keys as they should. How to protect from man in the middle attacks? Check keys! And that means checking everything on them, names, ids, size, keyid, fp. Verify with the owner, exchange keys irl if possible. Do not sign keys which are not verified. Note that it is possible to see if an attack is beign performed by comparing the ciphertext resulting from a's initial encyption and the version received by c. They are NOT the same in the event of an attack (which they should be). But as I said, the adk *thing* is no man in the middle attack. It means tampering with the original exported public key (version 4 {not PGP app version though..} compatible - important!), a totally different thing. Don't forget that there are apps to check keyringfiles with now released by NAI, get them, they are freeware. Regards J. Ottosson C Kryptorama http://pgp.surfnet.nl:11371/pks/lookup?op=get&search=0x6A19E8E1 http://pgp.surfnet.nl:11371/pks/lookup?op=get&search=0x3B5860A7 -----BEGIN PGP SIGNATURE----- Version: N/A iQEVAwUBOb3jA4nuryk7WGCnAQG/Lwf/UG/wazDxdR9Z0mKPPtmMavm+Hnv6XqHO 0sAYCVVs/UmWSrRRtTRDW0TNASvd63dx+WpX6R8/ww7uyEzWqIEh5LUVIGeFUP5Q usIB6oVOY/1jVw02RSVnroSzUbslcPW9bFtYoppE/bTUxpnCEuBRDfy3YFgGDyEm Cj2FyO0MSMQqgeN0S7sJki7+Zv/sFbg8RCG057wNEKU+RuGo4Gi6xxN5LPzV3p2k 8SpD1CkYYi0oG0pelbMxfapq3bsiQBuadJ+WLsi+UmJcY/7vifg8oiXdX6M0EsSH wp9XbFqPFjEgUMeF3IqBc85CV1aNHRVFQ6QrXOnXJ7cBZBPf7C0Gyg== =DBtd -----END PGP SIGNATURE----- 1420 From: Screaming Date: Tue Sep 12, 2000 11:24am Subject: RE: Army calls up mobile phones Good article thanks William 1421 From: James M. Atkinson, Comm-Eng Date: Tue Sep 12, 2000 10:17pm Subject: A Clumsy Spy Hunt Finally Winds Down A Clumsy Spy Hunt Finally Winds Down http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2000 /09/12/ED98768.DTL Tuesday, September 12, 2000 WITH AN embarrassing fizzle, the federal government's case against nuclear weapons researcher Wen Ho Lee is about to end up as a walk-away plea bargain. The case, which drew ridicule from the start, had melted under legal and scientific scrutiny. Questions about Lee's conduct may remain for some. But for many more, there are bigger mysteries. Was this case based on hard evidence or political pressure to find a fall guy for past security lapses? How safe are American weapons from spying? Was racial profiling used to isolate Lee as a suspect? The case against Lee began amid ominous trouble signs. Federal investigators suspected missile warhead designs were obtained by Chinese spies in the 1980s and went hunting for culprits. Lee, along with others, fell under suspicion. Lee was ultimately cleared, but he was accused of a new charge: transferring classified information from Los Alamos weapons lab computers to unguarded computer files. He was hit with 59 counts of unlawful handling of secret material, but the charges stopped short of treason and spying -- a telltale sign that Lee did not exactly amount to the Benedict Arnold of the post-Cold War era. Since last December, Lee was kept in solitary confinement. While he sat in his cell, court testimony whittled down the case steadily. The material he transferred was not super-secret blueprints as first alleged. His computer downloading may have been intended to prepare his resume for a new job elsewhere, not to sell out his country. Also troubling is the racial backdrop. It's plausible to argue that China might target Asian American scientists for intelligence gathering. But when other non-Asians were passed over in the search for leaks, the suspicion grows that weapons lab security agents were engaged in racial profiling. Morale among Asian American scientists has plummeted during the Lee case. Lee has ended up paying a heavy price for the misdeeds of others. True spies, if they exist, passed on nuclear secrets years before Lee was suspected. Security lapses gave way to political pressure to find a fall guy. The end result is a humiliating retreat for federal investigators. A prize espionage case has turned into an hurtful, misleading crusade. The United States needs vigilant protection, but the nation was poorly served this time. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1422 From: William Knowles Date: Wed Sep 13, 2000 2:51am Subject: Enigma thief's code baffles detectives http://www.the-times.co.uk/news/pages/tim/2000/09/13/timnwsnws02044.html September 13, 2000 BY ANDREW NORFOLK DETECTIVES baffled by the theft of Bletchley Park's prized Enigma coding machine are using codebreakers to crack intricate riddles which they hope will lead to its recovery. The museum that housed the 100,000 Second World War cipher device has received a mysterious letter from someone offering to return it in exchange for 10,000. But the letter, typed on a wartime typewriter, is written in such an unusual style - and signed with a word that does not exist in the English dictionary - that police are convinced that it holds the clues to the machine's whereabouts. Now they want to open negotiations with the author. The Enigma machine was used by German military intelligence, the Abwehr, for ultra secret communications between the Nazi high command. It was stolen from a glass display case at the Buckinghamshire museum during an open day on April 1. At least four people were involved in the raid, which police say could not have succeeded without expert inside knowledge of both Bletchley Park and the Enigma machine. Police have taken hundreds of finger-prints from museum visitors, questioned staff in detail and conducted an extensive search of the building and grounds. Detective Chief Inspector Simon Chesterman described the letter, sent last week, as "the most significant development in the investigation". One sentence reads: "I have been asked by the current owner the above Enigma machine, who purchased it in good faith (in good faith being the operative word) to say and tell you now today, the unwitting person having no ultimate desire of depraving your august self or anyone the pleasure to see it again." Police have refused to reveal the unusual word which appears at the end of the letter. The main clue to the letter's authenticity is a photographed copy of the unique number plate, G312, which was attached to the stolen machine. Expert codebreakers are now studying the letter, which purports to come from a middle man representing someone who innocently bought the Enigma machine, not realising that it had been stolen, and who now wants to return it in exchange for compensation equal to the sum paid and immunity from prosecution. Mr Chesterman said yesterday that the police were willing to deal with the author as the letter requested. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 1423 From: William Knowles Date: Wed Sep 13, 2000 4:14am Subject: Re: Telephone and PBX seminars? On -1 xxx -1, Jay Coote, W6CJ wrote: > I would like to know where (other than calling manufacturers) to > find seminars and training in the LA or Southern California area. > I am interested in training on PBX, POTS, digital in-house PBXes > and so on. My best bet would be to contact TeleDesign Management which is located in the Bay Area, Jay, I forwarded your note to the president of TeleDesign and he should be able to fill you in on what seminars they are offering as far as seminars and training. For the rest of the gang here, TeleDesign Management's website is at: http://www.teledesignmanagement.com/ Well worth a few minutes poking around the site. Cheers! William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 1424 From: Miguel Puchol Date: Wed Sep 13, 2000 4:38am Subject: RE: Pretty Good Privacy (PGP) Vulnerability Hi, Thanks for the information and clarification. However, I think that this is what I (tried) to say - replace the attacked persons' key with your own, and the recipient will encrypt messages with this 'bad' key, giving you access to them. Cheers, Mike -----Mensaje original----- De: J. Ottosson [mailto:ottosplace@h...] Enviado el: martes, 12 de septiembre de 2000 11:29 Para: TSCM-L@egroups.com Asunto: RE: [TSCM-L] Pretty Good Privacy (PGP) Vulnerability -----BEGIN PGP SIGNED MESSAGE----- On 25 Aug 2000, at 20:42, with subject: RE: [TSCM-L] Pretty Good Privacy (P, Miguel Puchol wrote: > This is the classic man-in-the-middle attack NO, it is NOT man in the middle attack means that someone uses a key that he think belongs to a certain person but it does in fact not. 1425 From: J. Ottosson Date: Wed Sep 13, 2000 5:09am Subject: RE: Pretty Good Privacy (PGP) Vulnerability -----BEGIN PGP SIGNED MESSAGE----- Hi, On 13 Sep 2000, at 11:38, with subject: RE: [TSCM-L] Pretty Good Privacy (P, Miguel Puchol wrote: > Thanks for the information and clarification. However, I think that > this is what I (tried) to say - replace the attacked persons' key > with your own, and the recipient will encrypt messages with this > 'bad' key, giving you access to them. Well, almost then - it's more correct to say that you _add_ pieces of data to the key. (You don't exchange the key as in man i the middle attack) You use the original good key and manipulate it. The result being that every data encrypted to that manipulated key is also encrypted to some other key material that the one who performed the encryption did not have a clue about. This must shurely be a dream come true for every *spy*/agency etc! Just think of it, in theory all someone has to do is find a public key, which by definition is - public - and add the information in a certain way and voila, there it is, the spy-key! AND, the scary part of it is (and that's where the talk of flaws and bug enter into the discussion) A LOT of PGP versions does NOT notice that the key is tampered with. In this case it does not do any good to check all those key characteristics, cause they are ALL good! That's why this really is a nasty one! And it is in that sence more nasty than a man in the middle attack, since all You have to do there is to check the key. Rest asure that many people are *very* suspicious now, this all mess is to some extent too *good* to be true.. Except from the oldies (like 2.6x) You have to use versions never than 658 or a patch to be sure Your version would recognize a tampered key. AND You can check Your current keyring for tampered keys by using the app 'pgprepair.exe' newly released freeware from PGP, Inc. Reards J. Ottosson C Kryptorama http://pgp.surfnet.nl:11371/pks/lookup?op=get&search=0x6A19E8E1 http://pgp.surfnet.nl:11371/pks/lookup?op=get&search=0x3B5860A7 -----BEGIN PGP SIGNATURE----- Version: N/A iQEVAwUBOb9EC4nuryk7WGCnAQHDLgf/crxR+4aniQH2mMTkg0bznrRaEqpAuq4c DYBrMFb5h6tn9daYAw/RaRKYL5OX/XcKhk/hDYTrXuxABXBWDn4EJZzQRer0lV1r mPSw138/FJpKtxNuSacb62Hfmg+a5GBxXahAG61CKpoDaaLnOOYzAxdqgmRBkstV 3gKHqyfRxIipObfTJ9VlyllAGQ4y/+Sebc4HT1dHh7OC6qwUCnqzwGTp8nnGul0V qaxK1G0+I4TuC+7AqezsiGfn0HUow5hffxINxtq2hlRDJcSkrSIEn55rfso9E/PQ 3Fq6CgVIJnFBpiGpJAw15A6C57sMjGe7Qqnd6EXckZsiHl+//affNw== =caQv -----END PGP SIGNATURE----- 1426 From: A Grudko Date: Wed Sep 13, 2000 11:37am Subject: Blowing my own whistle Please delete if you dislike a bit of self propaganda but I think it's relevant. There are other lists I would not dare post this on 'cos I know I'd get flamed (Yea, I walk into the valley of death protected by The Moderator) Just to let you know, my official title has gone from: APA Grudko D.P.M. to APA Grudko D.P.M., Grad I.S. (SA) That is, I am now a graduate of the Institute of Security of South Africa, based on 2 papers I submitted on covert electronic surveillance and technical counter-surveillance. Maybe now someone will offer me a job!!! Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), SAIS, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1427 From: James M. Atkinson, Comm-Eng Date: Wed Sep 13, 2000 3:10pm Subject: Re: Blowing my own whistle Andy Please accept my complements on a job well done. [Feel free to post a copy of the paper if you feel so inclined] -jma At 6:37 PM +0200 9/13/00, A Grudko wrote: >Please delete if you dislike a bit of self propaganda > > >but I think it's relevant. There are other lists I would not dare post this >on 'cos I know I'd get flamed (Yea, I walk into the valley of death >protected by The Moderator) > > > >Just to let you know, my official title has gone from: > >APA Grudko D.P.M. > >to > >APA Grudko D.P.M., Grad I.S. (SA) > >That is, I am now a graduate of the Institute of Security of South Africa, >based on 2 papers I submitted on covert electronic surveillance and >technical counter-surveillance. > >Maybe now someone will offer me a job!!! ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1428 From: James M. Atkinson, Comm-Eng Date: Wed Sep 13, 2000 6:11pm Subject: Scientist Lee released as judge blasts espionage probe Scientist Lee released as judge blasts espionage probe http://www.voila.co.uk/News/afp/int/000913211051.d8wa0fj8.html Wen Ho Lee walks out of the Federal Courthouse with his daughter, Alberta Lee (L) http://www.voila.co.uk/News/afp/int/SGE.PFO62.130900211051.default-367x272.jpg [AFP/Mike Fiala] ALBUQUERQUE, New Mexico (AFP) - - Nuclear scientist Wen Ho Lee, jailed amid a probe of alleged Chinese espionage, walked free Wednesday after a judge apologized to him and blasted prosecutors for bringing the case. Under a plea bargain, Lee pleaded guilty to one count of mishandling classified information, and was sentenced to time already served -- some nine months in solitary confinement. The Taiwan-born weapons designer was released after US District Judge James Parker slammed federal prosecutors for their conduct in the case, and apologized to Lee, 60, for the 278 days he spent in prison amid allegations he spied for China. Parker -- who denied Lee bail at a December hearing -- said he was "led astray" by prosecutors at the time. "I am sad for you and your family for the way you were held in custody," Parker told Lee. "It becomes clear that the executive branch has conceded that it was not necessary to hold you in custody." Under the plea agreement, prosecutors dropped all 58 other charges against him in return for a promise that Lee would be debriefed by investigators trying to find out what happened to seven missing tapes containing classified information. Parker also criticized -- by title if not by name -- President Bill Clinton, Vice President Al Gore, Attorney General Janet Reno and Energy Secretary Bill Richardson -- for causing "embarrassment in the way this case was handled." "They have embarrassed our entire nation and each of its citizens," Parker said. "I do not know the real reasons the executive branch brought" the case, he said. A smiling Lee, who at one time faced life imprisonment, was surrounded by friends and family as he faced reporters outside the federal courthouse. "I am very happy to go home to my wife, my family, and my children today," the slight, greying scientist said. "I want to say thank you to all the people who supported me. "In the next two days, I'm going fishing!" Asian American and civil liberties groups have charged that Lee, a naturalized US citizen since 1974, was singled out because of his ethnic Chinese background. What amounts to the near total collapse of the government's case follows a series of setbacks over the past few weeks. Chief among these was the August 17 revelation by agent Robert Messemer of the Federal Bureau of Investigation (FBI) that he gave inaccurate testimony during bail hearings following the scientist's arrest last December. Unrepentant prosecutors defended their conduct despite the judge's withering criticism. "This case has been about national security," US attorney Norman Bay said. "For the first time (Lee) is to agree to tell us what he did with the tapes." "Under the agreement we minimized the potential harm" to national security, he said. "If we had proceeded to trial we would have had to declassify highly sensitive nuclear weapons secrets." Lee had expected to be freed on Monday. But last minute disagreements arose on the details of the plea bargain, and he was returned to his cell in a Santa Fe prison. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1429 From: James M. Atkinson, Comm-Eng Date: Wed Sep 13, 2000 6:14pm Subject: Former nuclear scientist freed as U.S. spy case ends Former nuclear scientist freed as U.S. spy case ends http://www.excite.co.uk/news/story/UKOnlineReportWorld/IIMFFH80233_200 0-09-13_20-18-50_B49884 http://uk.news.yahoo.com/000913/80/aj7lv.html 13/09/00 21:18 By Marcus Kabel ALBUQUERQUE (Reuters) - Former Los Alamos nuclear scientist Wen Ho Lee was freed from nine months of solitary confinement on Wednesday, with a judge apologising to him and blasting the U.S. government for "embarrassing our entire nation" with the alleged spying for China case. Government lawyers defended their actions, refusing to make any apologies and saying they had acted as they did to protect national security and stop one man from compiling his own "personal library" of U.S. nuclear secrets. A relieved Dr Lee walked out of the courtroom smiling and told reporters, "I am very happy to go home with my wife and children today and I want to say thank you to all the people who supported me. In the next few days I am going to go fishing." U.S. District Court Judge James Parker ordered the 60-year-old Taiwan-born scientist freed in a plea bargain in which Lee pleaded guilty to one felony count of downloading nuclear weapons design secrets to a non-secure computer at the Los Alamos laboratory. Judge Parker had harsh and angry words for the U.S. Department of Justice and the Department of Energy. He said that the top levels of both departments "have embarrassed our entire nation and each of us who is a citizen of it." He told Lee that as "a member of the third branch of the U.S. government, the judiciary, the courts, I sincerely apologise to you ... for the unfair manner you were held in custody." He said he was misled by the government last November to order Lee held in solitary confinement, often in shackles. The government had presented Lee as a threat to national security who had access to the "crown jewels" of U.S. nuclear secrets. As part of the deal, Lee also signed a statement under oath that he never intended to harm the United States and never passed the secrets he copied to any third party. When the case first broke, Lee was held up as a possible spy for China -- but was never charged with espionage. Many government critics saw the plea bargain as a face-saving gesture in an embarrassing situation for the government which has seen its case against Lee collapse over the last few weeks amid charges that it had targeted him as a possible spy for China because of his race. In return for the guilty plea to one felony count, the government dropped all other charges including nearly 40 counts of "acting with intents to harm the United States" that could have landed Lee in prison for life. Lee also promised to help the FBI verify his claims that he destroyed seven missing seven computer tapes of weapons data. Lee was fired by Los Alamos National Laboratory last year amid government allegations that China was spying on the lab's weapons designs. Lee was never charged with espionage but was arrested last December on 59 counts of illegally copying design secrets, to which he pleaded not guilty. Norman Bay, the Asian American who is U.S. Attorney for the district which includes Los Alamos, insisted to reporters that the case had nothing to do with race as many opponents of the prosecution have insisted. "Mr Lee was not prosecuted because of his race, he was prosecuted because of what he did. He compiled his own personal library of nuclear secrets, transferred from the secure side (of the computer) to the unsecure side. He then downloaded all information to 10 tapes, three of which have been recovered as result of our investigation and seven never recovered at all," Bay said as he and other prosecutors faced the press outside the court and defended their every action. Bay added, "I am proud to be a career federal prosecutor. I am especially proud, deeply proud to be an U.S. attorney under Janet Reno ... This is a case about a man who mishandled huge amounts of nuclear data and got caught doing it." He added that justice was being served because for the first time, Lee had agreed to "tell us what he did with the tapes ... something he refused to do for approximately the past 18 months." Bay said, "We will have opportunity to fully debrief Dr Lee under oath. We also are able to polygraph him if he lies and the government can move to set aside the plea agreement and can also prosecute him for perjury or obstruction of justice." ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1430 From: Date: Wed Sep 13, 2000 7:13pm Subject: Re: Blowing my own whistle good work Andy! HAVE A GREAT DAY !!! 1431 From: James M. Atkinson, Comm-Eng Date: Wed Sep 13, 2000 7:24pm Subject: Step Back, Take a Breath Before Reacting to Lee Case Step Back, Take a Breath Before Reacting to Lee Case http://www.latimes.com/news/comment/20000913/t000086366.html By JULIETTE KAYYEM Until last week, Wen Ho Lee was described as the man who had unlawfully taken America's "crown jewels"--its national security secrets--which the government claimed he intended to sell to a foreign power. On Sunday, the government signaled that it would drop those allegations, indeed drop almost its entire case, in return for Lee's agreement to plead guilty to a single felony charge that he had improperly downloaded classified material onto an unsecure computer. A court hearing on the plea agreement is scheduled for today. The Lee case is a good example of how government secrets may not be as important in reality as they appear to be in theory. Indeed, in Lee's recent bail hearings, U.S. District Judge James A. Parker handed Lee's prosecutors a string of blows as each of the government's allegations, when put to the light, simply did not make the case against Lee. Facing the likelihood that it would have to hand over thousands of classified documents about why it had singled out Lee, the government was prepared last weekend to simply walk away. No one will know, apparently, what kind of case the government actually has against Lee. Well before Lee faced the possibility of a trial, however, all sorts of blame and accusation occurred both within and outside the government about how someone whom they strongly believed might reveal national security secrets to a foreign power might have slipped through our fingers. Congress and the Department of Justice sought to learn lessons from the Lee case well before any lessons were worth learning. One good example of this is the controversy over the Foreign Intelligence Surveillance Act, or FISA, a statute that permits secret electronic surveillance in the United States based on a probable cause finding that the target of the surveillance is a foreign power or an agent of a foreign power. There has been, by the very nature of their roles, historic friction between the FBI and Justice Department lawyers about how much information is needed to make a probable-cause finding. Probable cause, as most lawyers know, is hardly a definitive standard and relies much on context and factual determinations. The FISA statute, passed as a way to control FBI abuses by requiring court approval of surveillance, contemplated--indeed reinforced--this tension because the FBI is required to make the case for espionage before surveillance is even allowed. In the case of Lee, Justice Department attorneys refused to approve a FISA application against the Los Alamos scientist early on in the FBI's investigation, either because the FBI information was not strong enough or the attorneys feared that the court would deny the request. When the public was being told that Lee might be the newest Benedict Arnold, the Justice Department's "cautiousness" seemed dangerous--how could the department be so soft on spying? In light of the Lee case, then, Justice Department lawyers have been the subject of extensive pressure and criticism about their apparent cautiousness. Amendments to FISA have been proposed that would loosen what are, to some, FISA's already loose standards. Congressional hearings have been held. An internal department report, based on the Lee case, criticized department lawyers for not being aggressive enough. The FBI, the agency that certainly will most need to explain its role in the Lee case, lost little time in defending its own actions (a "he would have been caught years ago but for the lawyers" excuse), though the agency failed to mention that it had, at one point, ceased to consider Lee as a prime suspect. The Lee case politicized what should not be a political decision: the appropriate constitutional standards that should apply in surveillance cases. Whether in cases of espionage, terrorism or the national defense, illegally obtained information cannot be used in criminal courts, so careful legal analysis is required before we can let the FBI loose. The near 100% success rate of the Justice attorneys in obtaining court approval of FISA surveillance requests may not simply be attributable to the fact that courts are exceptionally deferential to law enforcement in the national security realm. It may also be true that these lawyers--at least prior to the political name-calling that followed the Lee indictment--have been historically willing to abide by their constitutional obligations. To call the lawyers too cautious, or to seek legislation that weakens their authority, defies the reality that there is more FISA surveillance today than ever before in our history. The FBI may never have had a good case against Lee; it is possible that a more vigilant examination of the facts would have shown that well before Lee's incarceration. But lawyers for the department should not now be criticized for seeking information that would ensure constitutional and statutory protections. And Congress should now abandon its premature assessment that the FBI needs to be given more freedom. As a lawyer in the national security arena, specifically counter-terrorism, I hear the too-common sentiment that the law--whether it be the 4th Amendment's prohibition against unreasonable search and seizure or regulations against racial profiling--makes Americans more susceptible to danger. We could be free from terrorism, or spying, or drug trafficking--if only the lawyers would stop being so lawyerly. The failure of good and sound intelligence, however, should not be mistaken for a failure of the law. In the end, there may have been many mistakes made in the Lee case. Only time will tell what they may have been. Until then, we owe it to our liberties, and certainly to Wen Ho Lee, to ensure that we do not overreact to this case. - - - Juliette Kayyem, a Former Justice Department Attorney and a Member of the National Commission on Terrorism From 1999 to June of This Year, Teaches at John F. Kennedy School of Government's Institute of Politics at Harvard University ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1432 From: James M. Atkinson, Comm-Eng Date: Wed Sep 13, 2000 7:26pm Subject: How FBI's Flawed Case Against Lee Unraveled How FBI's Flawed Case Against Lee Unraveled http://www.latimes.com/news/front/20000913/t000086188.html Investigators pursued questionable tactics in their zeal to prosecute a Los Alamos scientist as a spy. Careers are ruined, and still no one knows how China obtained nuclear secrets. By BOB DROGIN, Times Staff Writer WASHINGTON--Early last year, Wen Ho Lee walked from his cluttered sixth-floor office at the Los Alamos National Laboratory down to a first-floor conference room. A fellow nuclear weapon scientist and two FBI agents then grilled him until nearly nightfall. In halting English, the Taiwan-born Lee repeatedly denied--as he had in 19 previous sessions with the FBI--that he ever gave design secrets about America's most sophisticated nuclear warhead to China or anyone else. "At the end, everyone was convinced he was not a spy," recalled Robert Vrooman, then head of counterintelligence at Los Alamos, who listened to the previously undisclosed meeting from another room. "We all concluded there was no evidence. We figured we'd put this puppy to bed." But the next day, an FBI agent with the unlikely name of Carol Covert was called into the bureau's Santa Fe, N.M., office and ordered to take a special FBI crash course in "hostile interviews." A day later, Covert and fellow FBI agent John Podenko sat across from Lee. They said--falsely--that Lee had failed a polygraph test. Then they angrily warned him that, unless he cooperated, he might never see his children again and could be "electrocuted." Finally, the two agents pulled out a piece of paper and demanded that Lee sign a full confession of espionage--a crime that carries the death penalty--without a lawyer present. Lee had not even retained a lawyer at the time. "Poor bastard, he didn't understand," said an official who has seen the FBI-drafted confession. "He kept crossing things out and trying to correct it. He was trying to help them. He still didn't get what was happening." Lee learned soon enough. He was fired from Los Alamos the next day, March 8, 1999, and news accounts branded him the "spy of the century." The shy scientist, an expert in the arcane physics of fluid dynamics and the elegant art of Chinese cooking, soon became ensnared in a legal and political nightmare. Lee, now 60, has spent the last 277 days in jail, under conditions usually reserved for convicted terrorists or spies. He hopes to go home today if his lawyers and federal prosecutors can agree during a scheduled court hearing in Albuquerque on a proposed plea arrangement. He would plead guilty to one felony charge under the deal, which would bring an embarrassing close to one of the most important national security cases since the Cold War. Why did the government proceed with what now appears a seriously flawed prosecution? Not all the answers are known. But investigators' zeal to catch a spy, fueled by sensational press reports, near-hysteria by some members of Congress and a U.S. attorney in New Mexico who sought to secure an indictment before he retired to run for Congress created a structure that was shaky from the start--and that quickly began to crumble. What is clear is that in the wake of the inquiry, morale at the lab is a shambles, careers and lives have been ruined and the government is no closer today than when it started in determining how China obtained secrets on U.S. nuclear weapons. Case Stems From Warhead Inquiry The case began in 1996 as "Kindred Spirit," a three-year FBI investigation into China's alleged theft of America's W-88 warhead secrets from Los Alamos. Last year, when no such evidence was found linking Lee or Los Alamos to Chinese espionage, a new inquiry--ironically code-named "Sea Change"--was launched. The result: Lee was indicted on 59 charges and arrested last Dec. 10 for allegedly transferring top-secret nuclear weapon data to unsecured computers and portable tapes at Los Alamos. Thirty-nine of the charges, all carrying life sentences, alleged that Lee acted with intent to harm the United States and to aid a foreign power. Seven of the tapes could not be located, despite what the FBI said was one of the largest searches in its history. Lee's lawyers claimed that he destroyed the tapes but offered no proof. Problems quickly arose in the FBI inquiry. The weapon data were not formally classified when Lee copied them. Even now, the material is classified "secret restricted data," which means under Energy Department regulations that it may be mailed through the U.S. Postal Service. And many senior scientists openly dispute the government's contention that the missing data represent America's "crown jewels." Nor was the FBI investigation as complete as claimed. Agents repeatedly argued after Lee's arrest that he should be held incommunicado in jail. One agent ominously warned that Lee might pass a coded message, such as "the fish are biting" or "Uncle Wen says hello," that could endanger national security. But the FBI's concern was new: It did not wiretap Lee's home telephones during the nine months between the discovery that the scientist had created the tapes and his arrest. Lee made hundreds of unmonitored calls. FBI tactics also came into question. On Feb. 10, 1999, an FBI polygrapher repeatedly asked Lee about highly classified nuclear weapon designs--and required him to draw detailed diagrams--in an unsecured hotel room in Albuquerque. In theory, Lee broke the law by answering. His drawings are still classified. Lawyers Describe Lee as Bumbling, Naive On the other hand, Lee's actions remain a mystery. Why did he devote 40 hours to downloading the equivalent of 400,000 pages of nuclear data from the lab's classified computers? Why did he repeatedly try to enter a classified area after his security clearance was revoked--once at 3:30 a.m. on Christmas Eve? Lee's lawyers depict him as bumbling and naive, a pack rat who lived in a rarefied world where complex nuclear equations lead to weapons of mass destruction. As for the plea, one lawyer said: "He doesn't know the difference between a misdemeanor and a felony." If Lee had evil intent, his defenders ask, why did he leave the files in open view on the lab's unclassified system for six years? Why did he call the lab's computer help desk for aid in moving and later deleting the files? "He's clueless," said Lee's 26-year-old daughter, Alberta. A longtime colleague said that Lee "is an absolute genius. Or a moron. Take your pick. He's a totally focused scientist." For its part, the FBI said it is satisfied with the proposed plea agreement hammered out last weekend by defense and prosecution lawyers. Barring further delays, Lee is expected to plead guilty today to one charge of unlawful retention of national defense information, a felony. All 58 other charges will be dropped, and no fine, probation or other penalty will be imposed. Lee, in turn, must agree to debrief the FBI over the next two weeks, take polygraph tests if necessary, and answer questions over the next six months, especially about why he made the tapes and what he did with them. It will be Lee's first meeting with the FBI since agents tried to persuade him to confess to a capital crime. "It's breathtaking," said Steven Aftergood, a senior analyst at the Federation of American Scientists, a nonprofit group founded by veterans of the original Manhattan Project at Los Alamos. "It's a dramatic reversal. One feels relieved for Wen Ho Lee. But it's disgraceful that a man spent nine months in solitary confinement without being convicted of a crime." In a statement issued Monday--before an unexplained snag delayed filing of the plea agreement--the FBI said that it had achieved its goal by "securing the full cooperation of Mr. Lee." The FBI also said the indictment followed "repeated requests" for Lee to explain what he did with the tapes. "None was forthcoming. The indictment followed substantial evidence that the tapes were clandestinely made and removed from Los Alamos, but no evidence or assistance [exists] that resolved the missing tape dilemma." Actually, Lee's lawyers sent letters to the Justice Department shortly before he was indicted, specifically offering to let him take a polygraph test to answer questions about the tapes. The offer was ignored. So was Vrooman. In early 1999, he and several colleagues repeatedly testified in closed-door sessions before the House and Senate Intelligence committees and several investigative review boards. Their message: No espionage had occurred and Lee had been unfairly targeted because he is Chinese American. "I was trying to do it within the system," Vrooman said. Energy Department Issues Reprimands But the Energy Department clamped down. On Aug. 12, 1999, after Vrooman had retired from Los Alamos, Energy Secretary Bill Richardson issued reprimands to Vrooman and two colleagues at the lab for allegedly failing to assist the FBI in its pursuit of Chinese espionage. Vrooman was barred from being a consultant for the department for five years. Another counterintelligence official at the lab, who also was disciplined, quit. Angry at what he viewed as a cover-up, Vrooman went public. His complaints about racial profiling and what he called a complete lack of evidence against Lee were the first indications that the case was seriously amiss. But Notra Trulock III, then director of counterintelligence at the Energy Department, continued to insist that a Chinese spy had looted Los Alamos and that Lee was the only suspect. Trulock was a self-described "knuckle-dragger," a hard-charging ideologue with little patience for those who did not agree with him. Trulock found powerful allies in Congress, where Republican leaders urged members to use the Lee case to excoriate the Clinton administration for lax security in the face of wholesale nuclear theft. Heated hearings and lurid reports dominated news reports for weeks. But many colleagues who knew Trulock best had little respect for his views. One of them, Charles E. Washington, who worked for Trulock as acting director of counterintelligence and is now a senior policy analyst at the Energy Department, said in a sworn affidavit filed on Lee's behalf that Trulock "acts vindictively and opportunistically, that he improperly uses security issues to punish and discredit others and that he has racist views toward minority groups." In a telephone interview, Washington said that he once was forced to call outside police to the Energy Department headquarters "due to Mr. Trulock's abusive behavior" during an argument. "He spat on me," he said. Washington, who is black, filed a federal discrimination lawsuit as a result. The Energy Department settled the case last year, giving Washington a pay raise, a cash award, restoration of leave and other incentives. Trulock could not be reached for comment. He quit the Energy Department last year after complaining that the Clinton administration was trying to whitewash Chinese espionage. Ironically, the FBI is now investigating Trulock for attempting to sell an article on the Lee case that allegedly contained classified information. Key Witness Turns Into Weakest Link Other careers also have been severely tarnished. Notable among them: Robert Messemer, the FBI's chief investigator in the Lee case and a specialist in Chinese counterintelligence. Known to colleagues as "Stealth" for his crafty ways, Messemer was intended to be the key government witness against Lee. Instead, he became the prosecution's weakest link. During a mid-August bail hearing for Lee, Messemer admitted from the stand that his previous testimony was wrong when he said repeatedly that Lee had lied and sought to hide his actions when he copied the weapon files and created the tapes. One of Lee's colleagues had told the FBI that Lee had asked for password access to his computer to download some files or data. Messemer interviewed the scientist, Kuok-Mee Ling, at least six times and reviewed transcripts of his other statements. Messemer nonetheless had testified falsely to two judges on three occasions that Lee had lied to Ling by saying that he wanted to download a "resume." Messemer also acknowledged that, despite his testimony last December and despite a prosecution document filed with the court in June, the FBI had no evidence to show that Lee had applied for jobs at six academic or nuclear institutes overseas. Prosecutors had argued that Lee might have created the tapes to enhance his job prospects. U.S. District Judge James A. Parker cited Messemer's claims when he denied Lee bail in December. Messemer's public humiliation was a bombshell. It not only left the government with no hard evidence of a motive for Lee's action, it now had a crucial witness with a severe credibility problem--and a federal judge openly skeptical of prosecution claims. "You should not have 'oops' in your vocabulary if you're a government witness in an important case or a brain surgeon," said John L. Martin, who prosecuted and won every government espionage case for 26 years until he retired from the Justice Department in 1997. "One of the biggest problems I had was keeping the shenanigans and skulduggery that go on in investigations from reaching the courtroom," Martin added. "That's the problem here. And the case suffered as a result." Case Is Called a 'Great Civics Lesson' Martin called the Lee case a "great civics lesson," especially for the FBI and the Energy Department. With reports of ineptitude and over-reaching, both were badly scarred in the push for prosecution. "Now they realize that, in order to take one of these cases, they've got to back up in court what they say publicly," Martin said. "They painted this as a devastating case. They alleged terrible things before they indicted him. Then they couldn't back up those sensational allegations." Among those who had pushed hardest behind the scenes for prosecution of Lee was John J. Kelly, then U.S. attorney in New Mexico, and his Democratic mentor, Energy Secretary Richardson, a former member of Congress from New Mexico. Kelly quit his post to run for Congress three weeks after Lee was indicted. Kelly defended his actions this week from the courthouse steps in Albuquerque. "I thought it was a good indictment then, and I think events have shown that Dr. Lee has taken material that he should not have," he told reporters. "The government is going to learn in the next week or so where the tapes are. I think that's good." Richardson had a cautious response. "The issue here is, are we getting the tapes back," he said Monday at a news conference at the Oak Ridge National Laboratory in Tennessee. "I think that is the key. The plea bargain enables us to get that information." Lee's lawyer Mark Holscher and the chief prosecutor, Assistant U.S. Atty. George Stamboulidis, met to discuss a settlement on Aug. 25, a day after Judge Parker had agreed to let Lee go home on $1-million bond. After hearing Messemer admit inaccurate testimony and defense experts challenge the significance of the missing tapes, Parker ruled that the evidence against Lee no longer had the "requisite clarity" to justify continued incarceration. Government Gets Hit Again and Again "What the government described in December 1999 as the 'crown jewels' of the United States nuclear weapons program no longer is so clearly deserving of that label," the judge added. It was a stunning blow to the prosecution. Parker then walloped the government again. He unexpectedly ordered federal prosecutors to give him thousands of pages of internal documents from the FBI, CIA, Energy Department, Justice Department and other government agencies by this Friday. Defense lawyers had argued that the documents would show Lee was unfairly targeted for prosecution because he is ethnic Chinese. "I think they didn't want that scrutiny," one of Lee's lawyers said. The proposed plea arrangement specifically ends that demand for documents. Some Feared Secrets Would Air in Court Senior Energy Department officials had another worry: that Parker would order the government to let Lee's lawyers reveal nuclear secrets and other classified information in court as they defended their client. Other than the FBI statement, few government officials were willing to be quoted amid the debris of the Lee case this week. An Energy Department spokesman insisted that no one, including himself, was allowed to speak on the record or even to be identified as working for the department. A Justice Department spokesman insisted on similar restrictions. At Los Alamos, the nation's premier nuclear weapon facility, the news that Lee might go home was greeted with relief by what one official called the "nuclear priesthood." Collateral damage from the Lee case, after more than a year of public criticism, has devastated the lab: Morale and production have plummeted, recruitment has dropped and attrition of senior scientists and engineers has surged. Relations with the FBI, which must work with the lab to investigate espionage and nuclear terrorism, have almost ground to a halt. "I hope that resolving this will allow better public recognition of the major contributions the laboratory makes to scientific progress and national security, instead of continued focus on the misdeeds of a single ex-employee," said John C. Brown, the lab director. He called the last 18 months "probably . . . the most difficult period in Los Alamos history." There is a final casualty in the Lee case: Carol Covert, the FBI agent who gave Lee the "hostile interview" and demanded that he confess to spying. The FBI this week refused to let a reporter talk to Covert, but Vrooman, a close friend, said she was so upset after conducting the interview that she took three months' sick leave and transferred out of the Santa Fe office. "She was distraught," Vrooman said. "She didn't believe Lee was guilty." * * * Key Players in the Lee Case Wen Ho Lee: Former computer scientist at Los Alamos National Laboratory, indicted for downloading vast library of data on U.S. nuclear weapon design. Bill Richardson: U.S. Energy secretary, pushed for Lee's prosecu-tion based on limited evidence, came under criticism in Congress for security lapses at Los Alamos. Notra Trulock III: Former head of counterintelligence at the Energy Department, one of the first government officials to identify Lee as a suspect in espionage investigation. James A. Parker: U.S. district judge in Albuquerque, called attention to weaknesses in government's case against Lee and reversed earlier decision to deny bail. Robert Messemer: The FBI's chief investigator in the Lee case, publicly recanted earlier testimony in which he had accused Lee of acting in a deceptive manner. Robert Vrooman: Former head of counterintelligence at Los Alamos, Energy Department whistle-blower who said Lee was targeted because of his ethnicity. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1433 From: James M. Atkinson, Comm-Eng Date: Wed Sep 13, 2000 7:28pm Subject: National security concerns led to Lee deal National security concerns led to Lee deal http://www.vny.com/cf/News/upidetail.cfm?QID=117338 Wednesday, 13 September 2000 1:23 (ET) By MICHAEL KIRKLAND WASHINGTON, Sept. 12 (UPI) -- Far from falling apart, the case against former Los Alamos scientist Wen Ho Lee for allegedly mishandling secret information was as solid as a rock, according to sources close to the investigation. The government appeared to have more than enough evidence, they say, to convict Lee on at least 10 counts of illegally downloading secret information "related to national defense" from the secure computer network at the Los Alamos National Laboratory in New Mexico. Lee has even conceded the basic facts alleged by the government, contending only that he was using the information in a job search. A senior U.S. official argued this week that the government could have convicted Lee on as many as 20 of the 59 counts in the indictment against him by merely relying on facts that the defense was conceding, ensuring that the 60-year-old scientist would have spent the rest of his life behind bars. So why did the Justice Department allow Lee to agree to a deal in which he would plead guilty to only one count of mishandling the information? And why is the department letting him walk away with time already served while awaiting trial? Four factors have been driving the deal. First, the Lee case is only the latest in a long string of public relations disasters for the FBI and the department, which has been plagued throughout the Clinton administration by such controversies as the 1993 siege in Waco, Texas, the White House FBI files mess and the current fight to save the unfortunately named Carnivore e-mail intercept system. A close look at the facts in each of the controversies exonerates the FBI, but the bureau typically takes a brutal public beating until the process is complete. The Lee investigation started out as an espionage probe under congressional pressure. A 1995 document passed by Chinese intelligence to U.S. officials indicated China has acquired crucial data on the nation's newest miniaturized nuclear warhead, the W-88. Lee was singled out from a short list of people who had both access to the data at Los Alamos and contact with Chinese officials during trips to scientific conferences overseas. Following months of investigation, he was finally fired from Los Alamos in April 1999 after officials discovered he had downloaded a massive amount of sensitive weapons information onto 10 cassettes. Seven of the cassettes seemed to be missing, and despite Lee's contention that he had destroyed them, the FBI and CIA launched an unsuccessful worldwide search for the tapes. Relying on news reports and briefings by the FBI, some members of Congress convicted Lee in public speeches. Sen. Bob Smith, R-N.H., for one, spent an hour last year condemning Lee during a Washington conference, though he consistently called him "Bill Lann Lee," the embattled chief of the Justice Department's civil rights division, much to the embarrassment of his audience. When it was revealed that the Justice Department initially had refused to endorse an FBI wiretap on Lee, probe critics on the right smelled blood in the water. Meanwhile, critics on the left contended that Lee had been singled out as a scapegoat because of his ethnic background. The American Civil Liberties Union filed a friend-of-the-court brief in Albuquerque, N.M., where Lee was awaiting trial, arguing that "the government admits to racial targeting of Lee, as well as evidence that specific non-ethnic-Chinese individuals committed similar acts (of downloading secret documents) but were not prosecuted under any statute by the federal government." A second dynamic pushing the government toward a deal with Lee was that the circumstances surrounding the case eventually appeared to be out of proportion to what was actually charged. After all, U.S. prosecutors believed they had evidence that Lee deceptively downloaded data from the secure Los Alamos computer network; he allegedly fooled the computer into believing that the information downloaded was not "related to national defense" but they had zero evidence that he had committed espionage. Despite the lack of evidence on espionage, the frail Lee has been kept in solitary confinement since December and was brought to court in leg irons. The government also was resisting a judge's decision to release Lee on $1million bail, even though he would have been in virtual home detention, with his telephone calls and contacts monitored by the FBI. A third major factor was that government officials had in the end come to believe that Lee was telling the truth about destroying the seven missing cassettes. The government change of heart evolved over the last month as both sides tried to construct a plea agreement behind closed doors. A senior law enforcement official told United Press International that the government had received a "reliable indication" that the tapes indeed had been destroyed. The fourth and perhaps deciding factor in the equation was pressure from the U.S. intelligence community. U.S. intelligence agencies were repeatedly demanding that the Justice Department determine whether the purportedly destroyed tapes, and the three cassettes remaining, were "compromised" -- whether they were examined by foreign intelligence agencies at some point. Lee has shown new willingness to cooperate with that goal, officials said, and that spurred the deal. "In terms of the overall national interest," U.S. court documents filed earlier in Albuquerque said, "finding the tapes was more important than a successful criminal prosecution because Lee's indictment publicly confirmed the existence of the missing tapes and the value of the information on those tapes, and thus 'whet(ted) (foreign intelligence services') appetite to unlawfully gain access to those materials." The tapes contained some of the nation's most important secrets, government witnesses told the court in pre-trial hearings in Albuquerque. The tapes "contained (information on) devices across a range of weapons, from weapons that were relatively easy to manufacture, let's say, to weapons that were very sophisticated and would be very difficult to manufacture," one scientific witness said. Government agents are poised to debrief Lee, even as the last details of the plea agreement are hammered out in New Mexico. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1434 From: Date: Wed Sep 13, 2000 4:04pm Subject: Re: Blowing my own whistle I<< 2 papers I submitted on covert electronic surveillance and technical counter-surveillance. >> If they're so good, why don't you post them here? 1435 From: Date: Wed Sep 13, 2000 8:01pm Subject: Re: How FBI's Flawed Case Against Lee Unraveled China should be forced to subsidize the United States' nuclear program by forced cash contributions to Los Alamos ,or at the very least campaign donations to the Demorcratic party. :>} It appears that much of our nuclear research ends up in their hands anyway. However Hughes Electronics Corp. and Loral Corp. appear quick to make the almighty dollar when it comes to aiding foreign contries in their nuclear development. Definitely, more discretion is called for in these areas of national security. HAVE A GREAT DAY !!! 1436 From: James M. Atkinson, Comm-Eng Date: Wed Sep 13, 2000 8:34pm Subject: Tektronix 1502 and 1503 TDR's - Gentle Reminder I have said it before and I would again like to say it again that the Tektronix 1500 TDR family CAN NOT BE USED ON LIVE CIRCUITS. Not only will you NOT get a decent reading, you will screw up the sensitivity on the sampler circuit, and you could blow out the front end of your unit. While the damage may not show up immediately, you are doing damage nonetheless. The 1500 series is a DRY LINE TDR in that is came only be used on a circuit that has less then five volts on it. Because of this they are far more sensitive then a wet line TDR (such as the Riser Bond units). If you need a dry line unit use a Fluke DSP or Tektronix unit, if you want a wet TDR for use on live lines use the Riser Bond or similar unit. The 1500 series is STRICTLY a dry line TDR unless it has the Ethernet option, and even then it is for WET ETHERNET, but DRY "everything else". DO NOT, REPEAT DO NOT use this instrument on "live" telephone lines. I would point out that VR3021 and VR3020 are 5.6 volt diodes on the front end, and that they will "go poof" if you apply loop voltage for anything more then a few milli-seconds. The A6 Ethernet Board bumps these voltages up a bit, but it is still no where near the voltages found on normal phone lines. In the event that you are lucky enough to have the TDR connected when ring voltage is applied you can expect to damage the unit (which will permanently degrade performance, but may not totally kill the unit). The unit is designed to handle PERIODIC applications up to 400 volts, but it is ill-advised to every apply more then 11.2 volts or you will get screwed up readings. If you get into a pinch and have to use a 1500 series on a wet line then add a cap in series to kill the DC, and a couple of switching diodes to kill anything over 6 volts (and of course a set of zeners). A small impedance matching circuit will also be helpful. Remember the 1500 was designed (many years ago) to test the cabling on antenna's (involving a 300 mV signal), not telephone loop circuits (with almost 50 volts). I use/own both the CRT (02) and LCD (03) versions of the 1500, several Riser Bond units, 3-4 Fluke, and several Microtest units along with several dual and quad lead boxes I built myself so I know of what I speak. I lean towards the Fluke DSP-4000 for testing "station wiring", Riser Bond 1270 dual lead for wet telephone lines I lean towards the Tektronix 1502 for short DRY telephone lines, DRY coax, HVAC wiring, intercom wiring, etc (this is perfect for things that are less then 200 foot). The Tektronix 1503 is good for long DRY telephone line, or for longer runs of DRY wire then 1502 can not develop enough voltage to ping. For general purposes I have several ping boxes I can use to convert a hand-held O'scope into a TDR. These boxes are good when I have to perfom a TDR on live power lines, alarm lines, HVAC wires, etc). Let me say again... do not connect the 1502 or 1503 into a live circuit. I would point out Tek no longer supports the A model, and then their flat repair price on the B version is 1100... so you may end up scrapping your TDR is you poof the front end. On a related note... I would consider purchasing 1502's or 1503's (any version including the older A and B model CRT based units). I am collecting them as I intend to use them to teach an intense TDR segment of the TSCM course I am putting together (starting Fall of 2002)... (I have collected 12 to date, but want to have at least 24 on hand). If your interested in cashing in your older CRT based boat-anchor... I am offering 100 bucks for any pre-C version with a CRT (in any condition, so long as it is complete, unmodified, and unmolested). If you have the printer I'll pay an extra $25, and will pay $2.50 per full roll of paper (but only if it is clean paper with sprockets). I will also pay $15.00 for shipping and handling. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1437 From: James M. Atkinson, Comm-Eng Date: Wed Sep 13, 2000 8:36pm Subject: Re: Blowing my own whistle At 9:04 PM -0400 9/13/00, MACCFound@a... wrote: > >I<< 2 papers I submitted on covert electronic surveillance and > technical counter-surveillance. >> > >If they're so good, why don't you post them here? Andy, If you feeling generous feel free to paste a copy of your paper to the list (but I will understand if you want to keep it private). -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1438 From: Steve Whitehead Date: Wed Sep 13, 2000 2:23pm Subject: Re: Blowing my own whistle Andy wrote "Just to let you know, my official title has gone from:APA Grudko D.P.M to APA Grudko D.P.M., Grad I.S. (SA) That is, I am now a graduate of the Institute of Security of South Africa" Congratulations. Steve Whitehead M.I.S. (SA) Managing Member TSCM Services cc South Africa http://www.tscm.co.za 1439 From: Rocco Rosano Date: Wed Sep 13, 2000 7:36pm Subject: Scientist Lee released as judge blasts espionage probe et al, The Senate Select Committee on Intelligence (SSCI) and the FBI have let us down. They knew ahead of time that Wen Ho Lee was not an espionage operative. They knew ahead of time that the disk drives, that were missing for so long, would be returned. They were told. The arrogance of both the SSCI and the FBI are going to get us into serious trouble some day. They can't find the espionage operative because they can't think like one. They just cops. Rocco Rosano Reynoldsburg, Ohio [Non-text portions of this message have been removed] 1440 From: the cynic Date: Thu Sep 14, 2000 11:38am Subject: Re: Tektronix 1502 and 1503 TDR's - Gentle Reminder What is a good 'wet line' TDR then ? In particular one comfortable not only with the low voltages of voice grade telephony but one that can handle ISDN (bri only) line voltage. Is it feasible to de-mux a T1 or PRI line's channels and tap certain, or all, of its channels from outside plant facilities ? An imaginary example, a customer fears that a certain line is being monitored. A through examination has ruled out any sort of monitoring devices floating around in internal extensions, on internal lines, or on the PBX itself. The customer suspects that he is being monitored from outside the customer premises equipment, outside of the T1's smart jack. The consultant thinks that this is absurd but needs to figure out if this is even feasible. There really isn't any commercially available equipment that is small, portable, and conceal able enough to de-mux a T1 and break it into voice channels, and monitor those voice channels covertly. This sounds like a rather non trivial undertaking. 1441 From: James M. Atkinson, Comm-Eng Date: Thu Sep 14, 2000 0:00pm Subject: Re: Tektronix 1502 and 1503 TDR's - Gentle Reminder At 11:38 AM -0500 9/14/00, the cynic wrote: > >What is a good 'wet line' TDR then ? In particular one comfortable not only >with the low voltages of voice grade telephony but one that can >handle ISDN (bri only) >line voltage. For WET LINES I prefer the Riser Bond family, or one of the Tektronix Wet line TDR's (not including any of the 1500 series). >Is it feasible to de-mux a T1 or PRI line's channels and tap certain, or all, >of its channels from outside plant facilities ? Yes, quite a large number of such instruments are available, and I own and use several of them myself on sweeps. The instruments range from small hand held units, to units the size of a spectrum analyzer. My favorite is the Sierra units, and the Berry BE-9000. >An imaginary example, a customer fears that a certain line is being >monitored. A through examination has ruled out any sort of monitoring devices >floating around in internal extensions, on internal lines, or on the >PBX itself. Very few TSCM'ers will touch a T-Carrier line, and due to this it makes such lines very attractive to eavesdroppers. It is a fairly simple matter to modify the backplane of a PBX so that one of the channels on the T-1 becomes dedicated to a specific station (which is made to have an open microphone). >The customer >suspects that he is being monitored from outside the customer >premises equipment, >outside of the T1's smart jack. The consultant thinks that this is >absurd but needs >to figure out if this is even feasible. There really isn't any commercially >available equipment that is small, portable, and conceal able enough >to de-mux a >T1 and break it into voice channels, and monitor those voice >channels covertly. >This sounds like a rather non trivial undertaking. It is not at all absurd ... but it is something I would consider to be above a low level threat. You do not have to demux a T-1 line to eject a signal into it, all you have to do is match the timing sequence (which is why PCM is used for Telcom highways and backplanes). Convert the signal to a DS level, match the timing, and eject your audio into the serial stream at the appropriate time, then bump it back to a T-carrier signal and send it on it's way. If the eavesdropper can access the signal inside the PBX then so much the better as they will not have to perform level conversions. You have to examine every signal present on EVERY conductor that enters or leaves an areas on anything above a low level sweep. A box to "listen-in" on a T-Carrier signal is slightly larger then a pack of cigarettes, and can be home brewed with a couple of National Semiconductor chips and used with a butt set.. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= From: Miguel Puchol Date: Tue Sep 11, 2001 5:53pm Subject: RE: Terrorist Attacks in NYC Hi, I've been copying some very excited traffic, most possibly arabic, in 5711 USB a while ago - I did understand they were talking about Kabul, but nothing else. It seems that a retailatory strike has been launched, still not known where from, against Kabul airport, using what looked (from their trajectory & speed) like cruise missiles. Secondary explosions could also be seen. Also, earlier on I picked up USN traffic, apparently they have established a permanent CAP around the Atlantic coast, with round-the-clock flights. They were talking about landing to refuel and taking off again. Also, other common freqs are really quiet, so I imagine that a maximum alert has been established, combined with a strict radio silence. Secure channels (HF digital) & sat links are probably the most used comms right now - HF voice is pretty quiet. Will keep posted, good luck to all, Mike -----Mensaje original----- De: SecurityGauntlet [mailto:securitygauntlet@s...] Enviado el: miercoles, 12 de septiembre de 2001 0:48 Para: Miguel Puchol; TSCM-L@yahoogroups.com Asunto: Re: [TSCM-L] Terrorist Attacks in NYC Miguel, Have you heard any traffic from areas outside the US that might be of interest At 05:00 PM 9/11/2001 +0200, Miguel Puchol wrote: Both of the Twin Towers have collapsed. I'm monitoring HF to see if I can catch anything - my best thoughts & prayers to all involved. Mike > -----Mensaje original----- > De: James M. Atkinson [mailto:jmatk@tscm.com] > Enviado el: martes, 11 de septiembre de 2001 15:51 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] Terrorist Attacks in NYC > > > > Approximately one hour ago a commercial jet was high-jacked and > deliberately crashed into one of the World Trade Center towers. A few > minutes later a second commercial jet plunged into the second tower. > > Damage is extensive, causalities are very high, and the entire City > of New York has been sealed off and is under lock down. > > There may have been a third crash (this time the Pentagon in DC), but > the details are still unavailable, however; The Pentagon and White > House are currently being evacuated. > > The FAA just initiated a total shutdown of all aircraft take-offs > and landing. > > -jma > -- > > ---------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ---------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ---------------------------------------------------------------------- > Come, my friends, > 'Tis not too late to seek a newer world. > Push off, and sitting well in order smite > The sounding furrows; for my purpose holds > To sail beyond the sunset, and the baths > Of all the western stars, until I die. > - Tennyson, "Ulysses" > ---------------------------------------------------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ Wayne T Work Manager of Information Systems Security Cybergnostic.net, Inc (O) 203.331.4417 (C) 203.217.5004 wwork@c... 3693 From: Kohlenberg, Toby Date: Tue Sep 11, 2001 10:50am Subject: RE: Terrorist Attacks in NYC I wonder what this will mean to intelligence agency budgets.. Are we going to see a push to modernize everything quickly or?? toby > -----Original Message----- > From: James M. Atkinson [mailto:jmatk@tscm.com] > Sent: Tuesday, September 11, 2001 6:51 AM > To: TSCM-L Mailing List > Subject: [TSCM-L] Terrorist Attacks in NYC > > > > Approximately one hour ago a commercial jet was high-jacked and > deliberately crashed into one of the World Trade Center towers. A few > minutes later a second commercial jet plunged into the second tower. > > Damage is extensive, causalities are very high, and the entire City > of New York has been sealed off and is under lock down. > > There may have been a third crash (this time the Pentagon in DC), but > the details are still unavailable, however; The Pentagon and White > House are currently being evacuated. > > The FAA just initiated a total shutdown of all aircraft > take-offs and landing. > > -jma > -- > > ---------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ---------------------------------------------------------------------- > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008jmatk@tscm.com > ---------------------------------------------------------------------- > Come, my friends, > 'Tis not too late to seek a newer world. > Push off, and sitting well in order smite > The sounding furrows; for my purpose holds > To sail beyond the sunset, and the baths > Of all the western stars, until I die. > - Tennyson, "Ulysses" > ---------------------------------------------------------------------- > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> > Secure your servers with 128-bit SSL encryption! Grab your > copy of VeriSign's FREE Guide: "Securing Your Web Site for > Business." Get it Now! > http://us.click.yahoo.com/n7RbFC/zhwCAA/yigFAA/kgFolB/TM > -------------------------------------------------------------- > -------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3694 From: SecurityGauntlet Date: Tue Sep 11, 2001 5:47pm Subject: Re: Terrorist Attacks in NYC Miguel, Have you heard any traffic from areas outside the US that might be of interest At 05:00 PM 9/11/2001 +0200, Miguel Puchol wrote: >Both of the Twin Towers have collapsed. I'm monitoring HF to see if I can >catch anything - my best thoughts & prayers to all involved. > >Mike > > > -----Mensaje original----- > > De: James M. Atkinson [mailto:jmatk@tscm.com] > > Enviado el: martes, 11 de septiembre de 2001 15:51 > > Para: TSCM-L Mailing List > > Asunto: [TSCM-L] Terrorist Attacks in NYC > > > > > > > > Approximately one hour ago a commercial jet was high-jacked and > > deliberately crashed into one of the World Trade Center towers. A few > > minutes later a second commercial jet plunged into the second tower. > > > > Damage is extensive, causalities are very high, and the entire City > > of New York has been sealed off and is under lock down. > > > > There may have been a third crash (this time the Pentagon in DC), but > > the details are still unavailable, however; The Pentagon and White > > House are currently being evacuated. > > > > The FAA just initiated a total shutdown of all aircraft take-offs > > and landing. > > > > -jma > > -- > > > > ---------------------------------------------------------------------- > > The First, The Largest, The Most Popular, and The Most Complete TSCM, > > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > > ---------------------------------------------------------------------- > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 http://www.tscm.com/ > > Gloucester, MA 01931-8008 jmatk@tscm.com > > ---------------------------------------------------------------------- > > Come, my friends, > > 'Tis not too late to seek a newer world. > > Push off, and sitting well in order smite > > The sounding furrows; for my purpose holds > > To sail beyond the sunset, and the baths > > Of all the western stars, until I die. > > - Tennyson, "Ulysses" > > ---------------------------------------------------------------------- > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ Wayne T Work Manager of Information Systems Security Cybergnostic.net, Inc (O) 203.331.4417 (C) 203.217.5004 wwork@cybergnostic.com [Non-text portions of this message have been removed] 3695 From: Miguel Puchol Date: Tue Sep 11, 2001 5:29pm Subject: RE: WORLD TRADE CENTER BLDG # 7 HAS JUST COLLAPSED Apparently 6 missiles, of unknown type or payload, have hit Kabul airport. > -----Mensaje original----- > De: Marcelrf [mailto:Marcelrf@B...] > Enviado el: miercoles, 12 de septiembre de 2001 0:05 > Para: fireradio@onelist.com; scan-dc@q...; SCAN-L@L...; > scan-nyc@yahoogroups.com; ScanAtlanta@yahoogroups.com; > ScanCom@yahoogroups.com; scanner@yahoogroups.com; TSCM-L Mailing List; > NEXTEL1@yahoogroups.com > Asunto: Re: [TSCM-L] WORLD TRADE CENTER BLDG # 7 HAS JUST COLLAPSED > Importancia: Alta > > > ACTIVE BOMBING IN AFGHANISTAN!!! TRACER FIRE UP! > > Marcelrf wrote: > > > WORLD TRADE CENTER BLDG. # 7 HAS JUST COLLAPSED > > > > - > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > -- > "NEXTEL1 IT'S NOT JUST NEXTEL" > Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 > > "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" > Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3696 From: Aimee Farr Date: Tue Sep 11, 2001 6:16pm Subject: Wanted: vid of Clancy bitchslapping CNN blonde I bet they don't play that part again. --- Blonde: (something like)...."but.. aren't you talking about SPYYYING????" Clancy: (something like)...._COLD, HARD, BACKHANDED BITCHSLAP_ --- Somebody needs to give that man a microphone and a camera guy...let HIM interview politicals pointing fingers. At least then America might have the benefit of some intelligent questions. ~Aimee 3697 From: A Grudko Date: Wed Sep 12, 2001 3:34am Subject: Terrorist Attacks Grudko Associates will be closed today (Weds) and tomorrow out of respect for our American friends and colleagues. I will not be answering eMails or taking calls except for emergencies or contact with missing friends or those effected. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time "Experience is the name everyone gives to his mistakes" Oscar Wilde - A tribute to the late Roy Lawson. 3698 From: SecurityGauntlet Date: Tue Sep 11, 2001 8:58pm Subject: RE: Terrorist Attacks in NYC I sure the hell hope they get their heads out of their butts and fund more Intelligence personnel and functions. After the "Cold War" politicians corroded our ability to do Humint to a level which is despicable. Most of the Intel people went to industry or are spying for industry. Government can't keep talented people because they can't compete for the salary base that the private sector can offer. Need to get more incentive to stay in Governement service or farm the work out appropriately to the civilian sector that has the resources and stability to handle the task. Sorry for the rumbling but this is my IMHO. Chow Wayne At 08:50 AM 9/11/2001 -0700, Kohlenberg, Toby wrote: >I wonder what this will mean to intelligence agency >budgets.. Are we going to see a push to modernize everything >quickly or?? > >toby > > > -----Original Message----- > > From: James M. Atkinson [mailto:jmatk@tscm.com] > > Sent: Tuesday, September 11, 2001 6:51 AM > > To: TSCM-L Mailing List > > Subject: [TSCM-L] Terrorist Attacks in NYC > > > > > > > > Approximately one hour ago a commercial jet was high-jacked and > > deliberately crashed into one of the World Trade Center towers. A few > > minutes later a second commercial jet plunged into the second tower. > > > > Damage is extensive, causalities are very high, and the entire City > > of New York has been sealed off and is under lock down. > > > > There may have been a third crash (this time the Pentagon in DC), but > > the details are still unavailable, however; The Pentagon and White > > House are currently being evacuated. > > > > The FAA just initiated a total shutdown of all aircraft > > take-offs and landing. > > > > -jma > > -- > > > > ---------------------------------------------------------------------- > > The First, The Largest, The Most Popular, and The Most Complete TSCM, > > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > > ---------------------------------------------------------------------- > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 http://www.tscm.com/ > > Gloucester, MA 01931-8008 jmatk@tscm.com > > ---------------------------------------------------------------------- > > Come, my friends, > > 'Tis not too late to seek a newer world. > > Push off, and sitting well in order smite > > The sounding furrows; for my purpose holds > > To sail beyond the sunset, and the baths > > Of all the western stars, until I die. > > - Tennyson, "Ulysses" > > ---------------------------------------------------------------------- > > > > ------------------------ Yahoo! Groups Sponsor > > ---------------------~--> > > Secure your servers with 128-bit SSL encryption! Grab your > > copy of VeriSign's FREE Guide: "Securing Your Web Site for > > Business." Get it Now! > > http://us.click.yahoo.com/n7RbFC/zhwCAA/yigFAA/kgFolB/TM > > -------------------------------------------------------------- > > -------~-> > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to >http://docs.yahoo.com/info/terms/ > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3699 From: Date: Tue Sep 11, 2001 7:13pm Subject: Did Encryption Empower These Terrorists? http://www.msnbc.com/news/627390_asp.htm Did Encryption Empower These Terrorists? And would restricting crypto have given the authorities a change to stop these acts? By Steven Levy NEWSWEEK WEB EXCLUSIVE Sept. 11 — “Well, I guess this is the end now. . . .” So wrote the first Netizen to address today’s tragedy on the popular discussion group, sci.crypt. The posting was referring what seems like an inevitable reaction to the horrific terrorist act: an attempt to roll back recent relaxations on encryption tools, on the theory that cryptography helped cloak preparations for the deadly events. But the despondency reflected in the comment can be applied more generally. The destruction of the World Trade Center and the attack on the Pentagon comes at a delicate time in the evolution of the technologies of surveillance and privacy. In the aftermath of September 11, 2001, our attitud e toward these tools may well take a turn that has profound implications for the way individuals are monitored and tracked, for decades to come. The first issue on the docket will be the fate of tools that enable citizens to encrypt their e-mail, documents and phone conversations as they zip through cyberspace and the ether. Over the past decades there have been heated debates over whether this technology should be restricted—as it can clearly benefit wrong-doers as well as businesspeople and just plain average people. The prime government argument in favor of restrictions invoked the specter of precisely this kind of atrocity. Quite literally, it was the fear of “another World Trade Center” that led the Clinton administration in the 1990s to propose a system whereby people could encode their e-mails and conversations, but also provide the Feds with a “back-door” means of access. Now that those fears have come to pass, it’s fair to ask those who lionized crypto as a liberating tool to face a tough question: Did encryption empower these terrorists? And would restricting crypto have given the authorities a chance to stop these acts? The answer to the first question is quite possibly yes. We do know that Osama Bin Laden, who has been invoked as a suspect, was a sophisticated consumer of crypto technology. In the recent trial over the bombing of the Libyan embassy, prosecutors introduced evidence that Bin Laden had mobile satellite phones that used strong crypto. Even if Bin Laden was not behind it, the acts show a degree of organization that indicates the terrorists were smart enough to scramble their communications to make them more difficult, if not impossible, to understand. If not for encryption, notes former USAF Col. Marc Enger (now working for security firm Digital Defense) “they could have used steganography [hiding messages between the pixels of a digital image] or Web anonymizers [which cloak the origin of messages].” But that doesn’t mean that laws or regulations could have denied these tools to the terrorists. After all, many of the protocols of strong cryptography are in the public domain. Dozens of programs were created overseas, beyond the control of the U.S. Congress. The government used to argue that allowing crypto to proliferate, particularly to the point of being built into popular systems made by Microsoft or AOL, would empower even stupid criminals. But these were sophisticated terrorists, not moronic crooks. Before September 11, commercial interests, privacy advocates and most in the government had reached a sort of common ground, balancing high-tech with threats. Cryptography was regarded as a fact of life, one with some benefit to national secruity as well as risks. (In an age of Info-Warfare, we are the most vunerable nation, and cryptography can help secure our infrastructure.) Intelligence agencies could make up for the difficulties that crypto creates for them by several means, including heightened work in codebreaking, more use of “human assets” (spies), and—most of all—taking advantage of the bounty of new information that the telecom revolution has forced out into the open. E-mail, pagers, faxes, cell phones, Blackberries, GPS systems, Web cookies—every year another device or system seems to emerge to expose information to eavesdroppers. Even if terrorists encrypt content on some of those tools, simply tracking who talks to whom, and measuring the volume of messages, can yield crucial intelligence. (Indeed, this form of “traffic analysis” did produce evidence that was used in the Embassy bombing trial.) The challenge to our spy agencies—one tragically not met this time around—is to use those means to compensate for whatever information might have been lost to encryption Beyond the crypto issue are a raft of controversies involving other technologies of surveillance. Before this attack, there was a general feeling that we would see legislation to protect privacy on the Web and perhaps limit tools that threatened civil liberties. Some feared that face-scanning devices like the one used at the last Super Bowl can track individuals as they move from one publicly mounted surveillance camera to another. There was criticism directed toward the FBI’s “Carnivore” device, capable of scooping up massive numbers of e-mails from Internet service providers. There was concern over Web bugs that tracked people’s movements on the Internet. There were objections to the Department of Justice’s scheme to insure that cell phones were also tracking devices, presumably to aid 911 services, but potentially becoming homing devices to follow our roamings. Until today, a pro-privacy consensus was building. Will those concerns be set aside in the rush to do something—anything—to assure ourselves that we can prevent another September 11, 2001? Privacy advocate Richard Smith anticipates big changes in airport security, but not necessarily a reboot on overall privacy outlook. “Those types of restrictions just don’t work against people like [these terrorists],” he says. Let’s hope that he’s right—that wisdom and courage, and not fear, dictates future policy. Otherwise, the legacy of this terrible day may become even more painful. Newsweek Senior Editor Steven Levy is the author of “Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age ************************************************ John R. Angier II M-Group P.O. Box 721388 Norman, OK 73070-8070 USA w 405.321.1015 f 405.321.1259 c 405.833.3199 "The threat is changing, It's a threat that is using a variety of sources to come at us, and it's a threat that you can't necessarily pin down in a (predictable) scenario." Lt. Col. Dane Reves, U.S. Army, Army Computer Emergency Response Team 3700 From: James M. Atkinson Date: Wed Sep 12, 2001 5:30am Subject: Five Suspects Identified in NYC Attack Wednesday September 12 2:21 AM ET Report: Five Suspects Identified in NYC Attack http://us.news2.yimg.com/f/42/31/7m/dailynews.yahoo.com/h/nm/20010912/ts/attack_suspects_dc_1.html NEW YORK (Reuters) - Authorities in Massachusetts have identified five Arab men as suspects in Tuesday's attack on New York City and have seized a rental car containing Arabic-language flight training manuals at Logan International Airport, a source told the Boston Herald newspaper. Two of the men were brothers whose passports were traced to the United Arab Emirates, the unidentified source told the Herald. One of the men was a trained pilot, the paper reported on its Web site on Wednesday. The paper said investigators suspect the two brothers were aboard hijacked United Airlines flight 175, which pilot union officials said was one of the aircraft that crashed into the World Trade Center. Flight UA 175 left from Boston en route to Los Angeles with 56 passengers on board. American Airlines flight 11 from Boston to Los Angeles crashed into the other World Trade Center tower. Another aircraft hit the Pentagon (news - web sites) and a fourth aircraft crashed in Pennsylvania. At least two other suspects flew to Logan on Tuesday from Portland, Maine, where authorities believe they had traveled after crossing over from Canada recently, the Herald reported. Authorities were informed about the rental car by a civilian who got into a fight with several Arab men as they were parking their car, the paper reported. -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3701 From: James M. Atkinson Date: Wed Sep 12, 2001 6:10am Subject: Bin Laden Denies Involvement Source: Bin Laden Denies Involvement http://www.newsday.com/news/nationworld/wire/sns-ap-attacks-bin-laden-reaction0912sep12.story?coll=sns%2Dap%2Dnationworld%2Dheadlines By Associated Press September 12, 2001, 6:44 AM EDT ISLAMABAD, Pakistan -- Saudi dissident Osama bin Laden congratulated the people who carried out the deadly terrorist strikes in the United States, but denied Wednesday that he was involved, a Palestinian journalist said. "Osama bin Laden thanked Almighty Allah and bowed before him when he heard this news," Jamal Ismail, Abu Dhabi Television's bureau chief in Islamabad, said, quoting a close aide of bin Laden's. Ismail said the aide, whom he wouldn't identify by name, called him early Wednesday on a satellite telephone from a hide-out in Afghanistan. Bin Laden praised the people who carried out the attacks in Washington and New York, Ismail said, quoting the aide. "But he had no information or knowledge about the attack" ahead of time, Ismail said. The journalist has long-standing ties with Bin Laden and has won rare interviews with him several times over the last few years. In a series of coordinated attacks Tuesday, terrorists crashed two airlines into the World Trade Center in New York, and a third plane slammed into the Pentagon in Washington. A fourth one crashed in Pennsylvania. Bin Laden is a key suspect in the bombing of two U.S. embassies in East Africa in August 1998 that killed 224 people, including 12 U.S. citizens. Washington wants bin Laden to be tried for the bombing, but Afghanistan's ruling Taliban militia rulers have refused to hand him over, despite tough U.N. sanctions against the Taliban. The Taliban government calls bin Laden their guest and a hero of Islam. The aide said that bin Laden has described the devastation in the United States as "a punishment from Allah," Ismail said. The United States had invited Allah's wrath because it is trying to control the entire world by force, Ismail said, quoting the aide. "There are thousands of Muslims who have vowed for jehad (or a holy war) and martyrdom," according to bin Laden's aide. "They have experience to fight with all sorts of weapons." The aide also denied reports of bin Laden's deteriorating health, according to Ismail, saying: "These are all false reports. He is well and strong." Copyright C 2001, The Associated Press -- ---------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ---------------------------------------------------------------------- 3702 From: Aimee Farr Date: Wed Sep 12, 2001 8:09am Subject: "Congressional failure" > I wonder what this will mean to intelligence agency > budgets.. Are we going to see a push to modernize everything > quickly or?? > > toby "...to remain in ignorance of the enemy's condition simply because one grudges the outlay of silver in honors and emoluments, is the height of inhumanity. One who acts thus is no leader of men, no present help to his sovereign, no master of victory.... Knowledge of the enemy's dispositions can only be obtained from other men." -ST Best wishes and prayers for those that grieve, work or wait. ~Aimee 3703 From: Damien O'Rourke Date: Wed Sep 12, 2001 8:40am Subject: Some words Hi, one of the more passive members of the list here. I would like to extend my deepest sympathies to everyone involved in this terrible crisis. I am still shocked myself about the incident. I sincerely hope that the perpetrators get brought to justice and get to feel the entire grief they have brought not just on the American people but on the rest of the world also. I want the American people to realise that the hearts of the Irish people go out to them and although I can't speak for the rest of the world I know that any human being with a modicum of decency and respect feels the same way. Everyone I know is deeply saddened by these terrible events. I do hope however that this "justice" does not extend any further than those involved (either directly or indirectly) and I hope that even the most deeply affected person will see the devastating implications of this. I am saying this as I received an e-mail today and although I am not a superstitious person it did send a shiver down my spine as it all seems a little to real at present. It was as follows: NOSTRADAMUS 654 "In the City of God there will be a great thunder, Two brothers torn apart by Chaos, while the fortress endures, the great leader will succumb , The third big war will begin when the big city is burning" - You may place a hundred different meanings on this but today I can see only one. I don't believe it to be true but I don't dismiss the possibility either. I hope that everyone out there will make their voice heard in order to prevent a "third big war". We have gained immense power over the last hundred years but I don't think that the maturity to control this power has been developed yet. I can only pray that this disaster will not come to pass and I'm sure the rest of you feel the same. There is still so much to discover and learn it would be a shame to end it all over a few inhumane scumbags who don't know the meaning of sanctity. Anyway, just my thoughts. Again my sympathies to everyone involved my thoughts are with you. [Non-text portions of this message have been removed] 3704 From: Andy M Date: Wed Sep 12, 2001 0:49pm Subject: 11 Sep 01 Events As another 'silent listener' to the list, may I also pass my sincerest condolences to the people of NYC and, indeed the entire US, particularly to those bereaved and injured in the Pentagon incident. Words, especially by e-mail, can never express adequately the revulsion and horror felt here by us Brits and, in particular, those of us who 'work for the Government'. I hope that Tony Blair is as forthcoming with genuine support, when it finally comes to 'the crunch', as he is with words. I interpret his "full support" as meaning just that......... Andy M UK Govt Employee 3705 From: James M. Atkinson Date: Wed Sep 12, 2001 5:01pm Subject: I have a favor to ask I have a favor to ask of the membership of this list... First, obtain a large U.S. flag and proudly fly it from your home. Secondly, repeat the above, except at your business or place of employment. Third, obtain several dozen small flags (like what you wave in a parade) and give them out to people around you, and/or duct tape the flags to telephone poles and street signs in your community. Fourth, contact the Red Cross and donate blood and plasma... and then do it again... Fifth, Say a prayer for those who died or where injured in the attacks, for the families of those who fell, and for the heroes who risk they own life to safe others. Sixth, and finally pray for the leadership of our country, for the military and intelligence personnel who will enact the retribution for this act of war against our nation. God bless the United States of America. Warmest regards, -jma -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ------------------------------------------------------------------------------------------ 3706 From: Date: Wed Sep 12, 2001 5:41pm Subject: Pacific HF I'm sitting this week at the Communications Center near SFO that does the Oceanic ATC communications - strange to hear the HF voice frequencies of the Pacific being so quiet. -- John Kennedy johnk@s... Second Source, Inc. Annapolis, MD USA 3707 From: Date: Wed Sep 12, 2001 2:10pm Subject: NIGHTLINE: The Day After Forwarded Message: Subj: NIGHTLINE: The Day After Date: 9/12/01 2:40:50 PM Pacific Daylight Time From: listeditor@a... (Nightline) Reply-to: listeditor@a... (Nightline) To: nightlinemail-l@a... (Nightline Mailing List) When I drove home from downtown Washington around 4 this morning, there was an eerie calm. It's not surprising there were few cars on the street at that hour. What was both off-putting and reassuring was the sight of military police wearing camouflage, carrying guns, standing along side their humvees at each corner along M Street. It was as if we were under martial law in a third world country. ---- Whether or not September 11, 2001 goes down in history as the day that America lost its innocence, it will be a day long remembered. What's so unsettling this day are reports that the horrific wave of terror may not be over. As I write this, correspondent Linda Douglass has reported that House members have been given an intelligence briefing indicating "this may not be over." The briefers reportedly didn't claim to have hard information. It may be just a warning not to have "a false sense of confidence." After the events of yesterday, with the domestic air system shut down for a second day, what Americans don't seem to exude today is a "false sense of confidence." We also got word from the White House spokesman today that the Executive Mansion itself was the intended target of the plane that hit the Pentagon and that, in addition, Air Force One might also have been a target. Each hour gets more chilling than the last. How to make sense of the avalanche of news is a challenge at a time like this. Our goal this evening is to put the shards of information we've been collecting since 8:45 yesterday morning into some manageable mosaic. Ted Koppel will anchor a special 3 1/2 hour NIGHTLINE beginning at 11:35 p.m. EDT from London, where he is monitoring international reaction as well as the latest developments in New York, Washington and Boston, where FBI agents stormed a hotel and, according to one report, took three people into custody. In addition to learning who might have been responsible for yesterday's terrorism, we will try to sort out what the United States can do to respond to these attacks. Even if you've been parked in front of the television for the past two days, but especially if you haven't, tune in tonight for the very latest. Richard Harris Senior Producer Nightline Offices Washington, D.C. ----------- If you have questions or comments regarding this message or a recent "Nightline" broadcast, please do not hit reply; simply click on this link to send your message directly to the "Nightline" staff: http://abcnews.go.com/sections/nightline/Nightline/Nightline_email_form.html Or log on to the new "Nightline" Message Board: http://boards.go.com/cgi/abcnews/request.dll?LIST&room=nightline Chat with "Nightline" guests and find articles, transcripts and video excerpts on our Web site at: http://abcnews.go.com/Sections/Nightline/ You can unsubscribe to the "Nightline" e-mail at: http://login.mailpref.go.com/unsubscribe Ask your friends to sign up! Send them this link: http://abcnews.go.com/sections/nightline/DailyNews/nightline_login.html 3708 From: Date: Wed Sep 12, 2001 1:45pm Subject: Re: I have a favor to ask done! [Non-text portions of this message have been removed] 3709 From: e cummings Date: Wed Sep 12, 2001 10:42am Subject: CIA tried using cats as bugging platforms so, what happens when you use a high-power NLJD on a suspect cat? http://www.latimes.com/news/nationworld/politics/wire/sns-ap-spy-research0910sep10.story?coll=sns-ap-politics-headlines 5:28 PM PDT,September 10, 2001 Documents Show CIA Spy Ideas AP Headlines By JOHN J. LUMPKIN, Associated Press Writer WASHINGTON -- Soviet-tracking psychics and cats wired as mobile eavesdropping platforms didn't work out so well. But CIA proposals for spy planes and satellites to peer on America's adversaries from above became resounding successes. Recently declassified documents, released Monday by the National Security Archive, detail some of the successful -- and silly _ research of the CIA's Directorate of Science and Technology. The CIA designed and operated spy satellites for years, until the separate National Reconnaissance Office took over many of those duties, said Jeffrey T. Richelson, a researcher with the archive and author of "The Wizards of Langley," a book detailing the directorate's efforts. The directorate also developed the U-2 and A-12 spy planes. Another of its advances turned into an integral part of the pacemaker. In the 1960s, under a program code-named Palladium, scientists trying to design stealthy aircraft figured out how to insert ghost planes on Soviet radar screens. Assisted by the National Security Agency, the CIA eavesdropped on Soviet radar operators and determined the sensitivity of particular Soviet radars. While the CIA's scientific successes have become part of the U.S. inventory of spy techniques, its follies are notable as well, Richelson said. Many of those have been previously documented in books about the CIA. The multiagency plan to use psychics -- called "remote viewers" -- to map Soviet military bases and 1950s research into interrogation drugs are well-known. Another project, known as "Acoustic Kitty," involved wiring a cat with transmitting and control devices, allowing it to serve as a mobile listening post. A heavily redacted 1967 government memo released by the archive Monday suggests that cats can be altered and trained, but concludes the program wouldn't work. "The program would not lend itself in a practical sense to our highly specialized needs," it says. "The environmental and security factors in using this technique in a real foreign situation force us to conclude that, for our ... purposes, it would not be practical." In the first test of feline surveillance, the cat was run over by a taxi, according to Richelson. 3710 From: Dora Furlong Date: Wed Sep 12, 2001 9:59am Subject: Re: Some words http://www.ed.brocku.ca/~nmarshal/nostradamus.htm Above is the url where this quote appears to have come from...it was created by the author of the web page as an example of his "infinite monkey principle". I do not beleive this is an actual Quatrain. -->Dora Furlong > > NOSTRADAMUS 654 > > "In the City of God there will be a great thunder, > Two brothers torn apart > by Chaos, while the fortress endures, the great > leader will succumb , > The third big war will begin when the big city is > burning" - > > 3711 From: craig Date: Wed Sep 12, 2001 1:35pm Subject: live video feed have a look at this.. ( you may have to cut and paste it) http://idirector.media.ibeam.com/real/farm/*/encoder/v2/onair/internet broad/ibs_300k.ram its a tv crew and they dont seem to know that they are on the web, swearing and bitchy reporters prevail. 3712 From: James M. Atkinson Date: Wed Sep 12, 2001 9:33pm Subject: But you're about to learn. Leonard Pitts, Jr. - Miami Herald Published Wednesday, September 12, 2001 We'll go forward from this moment It's my job to have something to say. They pay me to provide words that help make sense of that which troubles the American soul. But in this moment of airless shock when hot tears sting disbelieving eyes, the only thing I can find to say, the only words that seem to fit, must be addressed to the unknown author of this suffering. You monster. You beast. You unspeakable bastard. What lesson did you hope to teach us by your coward's attack on our World Trade Center, our Pentagon, us? What was it you hoped we would learn? Whatever it was, please know that you failed. Did you want us to respect your cause? You just damned your cause. Did you want to make us fear? You just steeled our resolve. Did you want to tear us apart? You just brought us together. Let me tell you about my people. We are a vast and quarrelsome family, a family rent by racial, social, political and class division, but a family nonetheless. We're frivolous, yes, capable of expending tremendous emotional energy on pop cultural minutiae -- a singer's revealing dress, a ball team's misfortune, a cartoon mouse. We're wealthy, too, spoiled by the ready availability of trinkets and material goods, and maybe because of that, we walk through life with a certain sense of blithe entitlement. We are fundamentally decent, though -- peace-loving and compassionate. We struggle to know the right thing and to do it. And we are, the overwhelming majority of us, people of faith, believers in a just and loving God. Some people -- you, perhaps -- think that any or all of this makes us weak. You're mistaken. We are not weak. Indeed, we are strong in ways that cannot be measured by arsenals. IN PAIN Yes, we're in pain now. We are in mourning and we are in shock. We're still grappling with the unreality of the awful thing you did, still working to make ourselves understand that this isn't a special effect from some Hollywood blockbuster, isn't the plot development from a Tom Clancy novel. Both in terms of the awful scope of their ambition and the probable final death toll, your attacks are likely to go down as the worst acts of terrorism in the history of the United States and, probably, the history of the world. You've bloodied us as we have never been bloodied before. But there's a gulf of difference between making us bloody and making us fall. This is the lesson Japan was taught to its bitter sorrow the last time anyone hit us this hard, the last time anyone brought us such abrupt and monumental pain. When roused, we are righteous in our outrage, terrible in our force. When provoked by this level of barbarism, we will bear any suffering, pay any cost, go to any length, in the pursuit of justice. I tell you this without fear of contradiction. I know my people, as you, I think, do not. What I know reassures me. It also causes me to tremble with dread of the future. In the days to come, there will be recrimination and accusation, fingers pointing to determine whose failure allowed this to happen and what can be done to prevent it from happening again. There will be heightened security, misguided talk of revoking basic freedoms. We'll go forward from this moment sobered, chastened, sad. But determined, too. Unimaginably determined. THE STEEL IN US You see, the steel in us is not always readily apparent. That aspect of our character is seldom understood by people who don't know us well. On this day, the family's bickering is put on hold. As Americans we will weep, as Americans we will mourn, and as Americans, we will rise in defense of all that we cherish. So I ask again: What was it you hoped to teach us? It occurs to me that maybe you just wanted us to know the depths of your hatred. If that's the case, consider the message received. And take this message in exchange: You don't know my people. You don't know what we're capable of. You don't know what you just started. But you're about to learn. -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ------------------------------------------------------------------------------------------ 3713 From: A Grudko Date: Thu Sep 13, 2001 2:18am Subject: Terrorist training There is evidence emerging that the hijackers had some flight training, but is that necessary? Once a modern aircraft is in the air, cruising, all that's required are small adjustments. Playing Microsoft's Flight Simulator, where you can choose any plane and condition, can very effectively learn to control an aircraft. Not only can you choose almost any Boeing craft but FLYING BETWEEN THE WTC TWIN TOWERS is a standard exercise on the New York version ! The second tower attack, filmed from many angles, was a smooth left hand turn with about 40 degrees yaw. This approach took some training, but not necessarily by a qualified pilot. NO commercial pilot would have flown deliberately into the WTC or Pentagon. Even at the point of death a professional pilot would have veered off and probably gone into the river or a non-populated area. I think the hijackers said, 'Head for JFK', and once over the city they took over the controls for the last few deadly minutes. It is increadible that a handfull of fanatics armed only whith edged weapons could do so much damage to the US. They probably tested internal flight security many times, going through airport security with razor blade/handle configurations in 'carry on' luggage to find an acceptable looking 'shaving kit' X-Ray profile which did not alert security. My flags have been flying at half mast since that terrible Tuesday. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time "Experience is the name everyone gives to his mistakes" Oscar Wilde - A tribute to the late Roy Lawson. 3714 From: Date: Thu Sep 13, 2001 1:10am Subject: Privacy Trade-Offs Reassessed John R. Angier II M-Group P.O. Box 721388 Norman, OK 73070-8070 USA w 405.321.1015 f 405.321.1259 Sometimes it is entirely appropriate to kill a fly with a sledge hammer. - Major Holdridge, 1994. ************************************* http://a188.g.akamaitech.net/f/188/920/4m/www.washingtonpost.com/wp-dyn/articl es/A21207-2001Sep12.html Privacy Trade-Offs Reassessed Objections to Surveillance Technology Face New Test After Attack By Ariana Eunjung Cha and Jonathan Krim Washington Post Staff Writers Thursday, September 13, 2001; Page E01 When the FBI came knocking a year ago, asking Internet companies to install an e-mail eavesdropping program so that the bureau could catch potential criminals, many executives balked. It was, they said, an invasion of personal privacy. But yesterday, when the agents came seeking information that might help them find the perpetrators of the attacks that likely killed thousands at the World Trade Center and the Pentagon, some were willing -- even eager -- to help out. "As much as I don't like the intrusive nature of online surveillance technology, I really want to find the guys who did this," said a security director at a mid-size Internet access provider who asked not to be identified because the investigation is ongoing. Just two days after the worst terrorist strike on U.S. soil, some people are reassessing the trade-offs between privacy and security. To some, inconveniences such as long lines at metal detectors and other checkpoints suddenly seem tolerable. Instead of talking about how eerie the sight of military planes and tanks in New York and Washington is, some are saying they find them comforting. Surveillance cameras monitoring public streets sound sensible. But others are wondering just how much freedom they would be willing to give up. Some worry that this week's violence will lead to an overreaction that tramples on people's rights, such as the internment of Japanese Americans after the attack on Pearl Harbor. "Yesterday changed the way we live and there's a whole new dimension in the debate over privacy versus security," said Mike Assante, a former Navy intelligence officer who works for Vigilinx Inc., a Parsippany, N.J.-based group that provides online security services for companies such as power plants and pharmaceutical makers. "More people seem to be willing to compromise but no one seems to have figured out just yet what's reasonable." Members of Congress said yesterday they want to study whether giving the government more surveillance authority might avert such attacks in the future. Both Sen. Patrick Leahy (D-Vt.), chairman of the Senate Judiciary Committee, and Arizona Republican Sen. Jon Kyl separately said lawmakers need to consider whether the capabilities should be strengthened. But that reassessment should be "consistent with constitutional freedoms at the core of our national ideals," Leahy said yesterday. "The question is whether you overreact in pursuit of a handful of terrorists and in the process change the constitutional protections of millions of American citizens," said Joseph Turow, a professor who specializes in privacy and new media at the University of Pennsylvania's Annenberg School of Communication. Some telephone companies yesterday announced they were prepared to expedite wiretapping requests from the FBI. The agency, meanwhile, has been seeking customer information and e-mail messages from Internet service providers for some of the people on the passenger lists for the four planes that were apparently hijacked, sources said. The agency declined to comment on the requests, citing its policy of not talking about the details of open investigations. But the country's largest and third-largest online services, America Online Inc. and EarthLink Inc., confirmed that they had received requests from the government. Like other Internet providers, the two have generally greeted subpoenas, court orders and the like seeking information about their customers begrudgingly. The language they used yesterday was markedly more receptive. "We have been approached [by law enforcement officials], and we've complied. And we stand ready to help some more," said AOL spokesman Nicholas Graham. EarthLink's Dan Greenfield concurred: "EarthLink is cooperating with government officials to get to the bottom of this thing." AOL, a unit of AOL Time Warner Inc., declined to comment about the number or nature of requests, but EarthLink's Greenfield, a vice president, said the company had received one request for what he called an "electronic wiretap." The two companies emphasized that the FBI had not installed Carnivore, the nickname for a controversial e-mail eavesdropping technology that has drawn the ire of lawmakers and consumer advocates. They said they were using their own technology to pull data from their systems. Several smaller providers located on the West Coast, however, said on the condition of anonymity that they had agreed to allow the FBI to use their equipment to monitor e-mail traffic. They declined to comment on when the eavesdropping equipment, formally known as DSC1000, would be operational or how long it would remain up. The system is basically a black box that sits on an Internet provider's network watching communications. Federal agents retrieve information by physically taking a removable memory core from the system. Privacy advocates have been concerned about the technology's ability to track everyone's e-mail, including innocent citizens suspected of nothing. The FBI has said the technology can home in on specific communications it needs to examine but it has not been willing to divulge how the technology works. Rep. Robert W. Goodlatte (R-Va.) said no new law-enforcement initiatives should be enacted at the expense of civilian rights against unwarranted government intrusion. "When the president talks about fighting back to protect our freedom, that includes freedom from intrusion into innocent people's lives," Goodlatte said in an interview. "We can't have our society go to one of Big Brother." But Eva Chung, a 34-year-old from Columbia, who is a mother of two young children, said that after the nightmares of the past few days, Big Brother doesn't sound all that bad. She said she has been grateful for all the additional security measures she has seen introduced in the area recently. Rather than being frightened by the soldiers with machine guns in front of the White House, she said she was glad they were there. "I am very much for what this country was founded on, freedom and the Bill of Rights and everything. But when it's a matter of people's lives and making sure we all have a nice place to live, then I would definitely give up the privacy part to ensure the other part," Chung said. 3715 From: Damien O'Rourke Date: Thu Sep 13, 2001 4:42am Subject: Re: Some words I couldn't care less - you appear to have missed my point entirely. Dora Furlong wrote: > http://www.ed.brocku.ca/~nmarshal/nostradamus.htm > > Above is the url where this quote appears to have come from...it was > created by the author of the web page as an example of his "infinite monkey > principle". > > I do not beleive this is an actual Quatrain. > > -->Dora Furlong > > > > NOSTRADAMUS 654 > > > > "In the City of God there will be a great thunder, > > Two brothers torn apart > > by Chaos, while the fortress endures, the great > > leader will succumb , > > The third big war will begin when the big city is > > burning" - > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3716 From: Charles P Date: Thu Sep 13, 2001 10:22am Subject: Constant reminder Every emergency phone call can serve as a constant reminder of this Sept. 11.... 911 charles now to try to get some sleep today before the Red Cross calls me again. 3717 From: Steve Uhrig Date: Thu Sep 13, 2001 0:44am Subject: Re: Clancy bitchslapping CNN blonde Once upon a midnight dreary, Aimee Farr pondered, weak and weary: > I bet they don't play that part again. > Blonde: (something like)...."but.. aren't you talking about > SPYYYING????" > Clancy: (something like)...._COLD, HARD, BACKHANDED BITCHSLAP_ > Somebody needs to give that man a microphone and a camera > guy...let HIM interview politicals pointing fingers. > At least then America might have the benefit of some intelligent > questions. As a point of interest, I am a personal security consultant to Tom Clancy, and have been working at his estate 2 - 3 days a week since January. I was coincidentally on my way down there Tuesday morning when all this went down. I had two of my men with me. We spent the day with my two guys out on the grounds and me in the house at the command post for the electronics I have set up for him. Tom is well armed and capable, but the house is full of women and he knew he would be gone for a good while when these sort of things happen. That 2 minutes on CNN cost him 8 hours, from the time the limo picked him up until it brought him back. My guys are armed also, and the family hired me for a reason. This was one of them. We mutually decided we should stay the night, so we did. You saw the real Tom Clancy on CNN. Note he was the *first* to comment on the need for more Humint, and immediately after that, everyone started parroting his words. It was very obvious. And he was right. We had discussed it a number of times. All these electronic gadgets we like to lie to each other about are nice, but buying someone is a lot cheaper, safer, and more effective. Tom is a master of handling interviews. The media contacts him constantly. I see him do maybe a dozen a week, and I am only there occasionally. The first thing you do is take control and keep control of the interview. You do not let the interviewer lead you by the nose in a direction you do not want to go. That is their job, they are very good at it, and most of them have agendas. I just got back from his place and am triaging well over a hundred emails, since I had not planned on being gone overnight and did not take my laptop. As a point of interest, there was zero telephone service down there Tuesday evening and until late morning Wednesday, and he is in the middle of nowhere. No dial tone, no cell service. All we had was our portable radios and the repeater for commo on the facility. He and I spent much of Wed afternoon dissecting and debating the matter. He is a very astute fellow, with incredible insight and a firm grasp of current affairs. Note how he pulled all those stats off the top his head. He knows a lot more about things than I do, and *I* am the one who came out of the intelligence community. Yes, he has a temper, but he also can exercise discretion, and on international television would not be the place to slap the interviewer. He already pissed off 90% of his international audience, which was another reason for us to be there that evening. However, you should have heard him tear up a few interviewers on the phone Wednesday afternoon. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3718 From: craig Date: Thu Sep 13, 2001 1:47pm Subject: . http://www.newgrounds.com//portal/uploads/31000/31438_bush.swf 3719 From: William Knowles Date: Thu Sep 13, 2001 6:15pm Subject: New York Red Cross Needs Tech assistance! (fwd) ---------- Forwarded message ---------- Date: Thu, 13 Sep 2001 18:02:29 -0500 (CDT) From: InfoSec News To: isn@a... Cc: William Knowles Subject: New York Red Cross Needs Tech assistance! One of the few things that came across my desk that I thought I should get the news out to a wide audience via all mediums is that the New York Red Cross is in search of information technology assistance. I am sure that with whatever extra technology and personal come that comes will be made of use with one organization or another. With my sincere thanks for reading this! William Knowles wk@c... -=- http://www.techtv.com/screensavers/showtell/story/0,23008,3347294,00.html The New York American Red Cross is in dire need of technology equipment and services. The field workers and sites have little, if any, means of communication and the central office is processing way too much on completely paper systems. Your help in acquiring these resources would be greatly appreciated. If you can help, please contact: Joe Leo, Assistant Director, Business Applications, IT American Red Cross in Greater New York phone: 212.875.2409 email: jleo@a... 150 Amsterdam Avenue New York, NY 10023 PLEASE NOTE: His email is slammed, so don't resend your messages over and over again. Following is the list of equipment that the Red Cross needs for its field workers and expanded Emergency Operations Centers. It also needs certified Citrix engineers and Microsoft-certified consultants. * 40 IBM computers and laptops (with NICs) * Monitors (with desktops) * Any storage solutions * 25 10/100 hubs (8+ Ports) * 100 Cat5 cables (All lengths) * 50 power strips * Any IBM-compatible memory * Any 3Com wireless NIC cards and LAN products * 30 desktop-size UPSs * 15 LaserJet printers (HP 1100 or faster) and printer supplies * 20 external Zip drives and disks * Any diskettes and R/W CDs * 5 external CD burners * 5 duplex document scanners * 25 extension cords * any colored tie wraps * any Velcro cable wraps * 50 Citrix client licenses * 12 PCMCIA LAN cards for IBM P20 ThinkPads, preferably 3Com (in addition to those in the new PCs) * 50 Microsoft Exchange CALs * 35 Microsoft SQL CALs * 50 Microsoft Office Professional licenses * 15 PC Anywhere licenses * DSL lines * PDAs with wireless capacity and service * Nextel cellphones and service Thanks in advance for your generous assistance. Any donation will help greatly. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 3720 From: zack <10-33@c...> Date: Thu Sep 13, 2001 9:13am Subject: The Attack on America I have this morning received two Power Point Slide Shows with numerous pictures never seen before. You may download the presentation from this page. There is no link from my page to this site, you must go there directly. As previously told, I constructed this site very quickly and will improve as I am able. Please inform me if you have a problem, or would like the files sent to you directly. God Bless the USA http://www.copscops.com/blessusa.htm visit http://www.copscops.com Join the Law Enforcement community http://anexa.com/lawenforcement/index.Ihtml Washington DC Police Department http://mpdc.dc.gov/main.shtm The data contained herein is confidential. Unauthorized dissemination of the contents of this e-mail may be in breach of Criminal and Civil law and may lead to prosecution. 3721 From: sebastien rittner Date: Thu Sep 13, 2001 6:02pm Subject: Re: Wiretap Ruling >COURT SAYS NO PRIVACY FOR HOME PHONE CALLS How about the other party? Does the "rule" applies only for recording or both (recording and listening ? Sebastien. ===== email : sebastien@t... web : www.tscm-technician.net voicemail : (510)-496-2740 x2159 __________________________________________________ Terrorist Attacks on U.S. - How can you help? Donate cash, emergency relief information http://dailynews.yahoo.com/fc/US/Emergency_Information/ From: tony soprano Date: Wed Sep 11, 2002 6:09pm Subject: Re: RE: Steve Uhrig Emergency Situation get well steve.... _________________________________________________________________ Join the worldís largest e-mail service with MSN Hotmail. http://www.hotmail.com 6214 From: Steve Uhrig Date: Wed Sep 11, 2002 9:54pm Subject: Reprinted after a year in their 9/11 anniversary issue for Business 2.0 Magazine. http://www.business2.com/articles/mag/print/0,1643,17511,00.html See if anyone you know is mentioned in there. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6215 From: gkeenan Date: Wed Sep 11, 2002 9:44pm Subject: Re: US Policy and 911 Vance, Just read your last two postings. I really feel left out! I was the first to respond to your original post last evening, but received no reply - yet you've responded to shorter, less detailed responses from others. Did I hit a chord? Maybe because I have such a deep personal involvement in Ireland, have lived there for several years, and still have family (children and grand children) living there and understand the Irish people, their character and national identity, and I even have a very good understanding of the problems in the North. Remember, I lived there and am Irish Catholic myself and spent five years in Derry where I lived on the Waterside as a Catholic. Did you ever live in the Waterside section of Derry? My daughter still lives there and has to board up her windows and my two grand children have to go in a group to school each day guarded by private security, armed I might add, to protect them from the Prod paramilitaries who have attacked them in the past. I've also seen my son (6 years old at the time) staring down the barrel of a British rifle from only 6 inches away while I stood helpless 10 feet away with another five rifles pointed at me. All because he threw a rock at this British patrol. And we were in the front garden of my father-in-law's house in the Creegan. The Brits used the standard 6-man urban patrol; 3 on each side of the street. That doesn't happen here in New York. Like I said in my post last night -- before you make comments about a country you obviously know nothing about, clean up your own mess first. Then make your suggestions. Hello Sean, People have reasons for doing everything that they do.... >Sure I guess thats fair, you might do something on impulse though, and may not later have a reason for what you did. So, what you're saying is that several years of planning and plotting and funding resulted in an impulse to fly planes into the Twin Towers and Pentagon? And it was an impulse to kill over 3,000 people between the 3 incidents? What planet are you really from? You can tell me, I won't tell anyone - promise. some of them are delusional, >That would be people with mental illness I guess. Delusional -- yeah, that's a fair description of your comments. some are due to misunderstandings, >Like when the US promised Iraqi rebels that they would stick with them if they helped to over throw Suddam, and then left them to be slaughtered when the US agreed with Suddam for him to leave Kuwait and give the US access to Iraqi oil. Yes, agreed. There are always misunderstandings in every walk of life, every day. But you're completely wrong about this promise to rebels and all that. I'll bet you get your info from the IRSP and RAWA. Now there's a bunch that needs therapy! The Kurds were being slaughtered long before the Gulf War. And we made no promises because there was, and still is, a fear in that region of a Kurdish state -- and that includes our allies in Turkey. They don't want a Kurdish state either; anymore than Iraq does. Like I said, in the words of Abe Lincoln "you can please all of the people some of the time, some of the people all of the time, but you can't please all of the people all of time". Words to live by. You ought to try it, then get into international politics and try to sort out the world yourself. I'll bet you wouldn't even be able to handle it at the local council level; let alone on a global scale. misinformation and a host of other reasons..... >Like what the US DOD and officialdom do to the american people and western europe. I spent 25 years working for the US Department of Defense (including 20 years Navy and 5 years civil service), and my wife spent nearly 30 (6 years active in the Navy, 15 in the Navy Reserve and, while in the Reserves and afterward, a total of about 15 in the Civil Service). I still work with the DoD and military departments, not just the US, but other countries as well. So what do you know about the US DoD that I don't? Please - enlighten me. Just what is it that they're doing to the American people? A lot less than other countries' governments are doing to their people -- including yours. From your posts I'm safe in saying that you're one of those bleeding heart liberals that are the root cause of all the troubles today - and I'm not defining this by country because I'm too intelligent for that. I'm defining it by the rampant liberalism and political correctness running amuck in the world today because this one gets upset by something someone else said, or some other load of crap. Amnesty International, of which I'm sure your a card-carrying member, has already identified Britain as the leading democracy that has imposed the most limitations and restrictions on freedom and privacy of all the western democracies. It ain't the US boy'o. It's your neighbors across the Irish Sea; and to the North. having a reason does not always explain the actions taken by an individual or a group... >One may not agree with the reason but the fact is that rational people decided that the reason was strong enough to do what they had to do. You're saying those sub-humans were rational? That they had a reason for the mass murder of over 3,000 innocent people? And don't give me that George Habib crap about "there are no innocents". I don't buy into that PFLP bullshit either. No rational person would, or could conceive of a plan to murder women and children, and men and women going about their daily business. There is no reason strong enough -- except lunacy. Using your logic, there was nothing wrong in Hitler exterminating 6 million Jews, either. He had a reason -- the Final Solution to the Jewish "Problem" in Europe. Pearl Harbor was a legitimate target for Japan when you're talking about war. It was a MILITARY target and was fair game by all the rules of war. What those bottom feeders did was not to go after a legitimate military target -- they deliberately went after defenseless, innocent civilians because they're cowards; they don't have the guts to stand up and fight like men. You saw how they ran in Afghanistan. They wouldn't even face smaller numbers of our guys; or the Brits, Aussies, French, New Zealand, Norwegian, German, and the other Special Forces from western countries. They had to have at least a 5-to-1 numerical superiority before they'd even think about standing and fighting; and even then it was only a few rounds before the cowards broke and ran. Those are the rational, courageous scum you're saying had a reason for slaughtering innocent women and children -- including some of your own countrymen. ...nor does it justify their actions by the fact they they believe they have a reason, >Exactly, just like the way the US think that they have the right to control the goverment in Cuba and have attempted to assasinate and overthrow his position, and the reason they justify this is by saying its for the good of america. Boy, you really need a major course in international politics. Who's trying to control the Cuban government? If we wanted to do that, don't you think we would've been in there a long, long time ago? Hell, it would a damn sight cheapter than Afghanistan. It's only 90 miles from the Florida coast. Just a few troops ships would do it. And we already have a base there with all the logistics and support we'd need to launch an invasion. But we haven't done it since Castro came to power nearly 50 years ago. We could've done it '62, instead of just setting up a blockade. But we didn't. Where are you getting this stuff? You been reading too many comic books and fiction novels me ol' mucker. I like Ian Fleming, Le Carre and Clancy too -- but I also recognize it for what it is - fiction. Jerry Keenan GPKeenan Co., Int'l Security Services West Islip, NY [Non-text portions of this message have been removed] 6216 From: gkeenan Date: Wed Sep 11, 2002 10:30pm Subject: Re: Digest Number 1058 This is really good. Sure the Irish goverment voiced there backing of the US, but that doesn't mean the country agrees with it. If you were Ireland and the most powerful country in the world turns around and says in no uncertain terms....."You're either with us or against us...." what do you do? of course your going to say, yeah sure we're right behind you all the way....all the way to the pub as we are neutral....ciao. How do you know the country doesn't agree with it? Are you now the spokesman for the Irish Republic? Was there a referendum that gave you the mandate to speak for the people? if the goverment turned around and said no ....we stand with the taliban, I think the US would have cracked up laughing, no one would even take them seriously, I mean how could they!!! You got a point. But on the other hand, Ireland is SUPPOSED to be a neutral country and shouldn't even be commenting, officially, on any of this. That's what neutrality means. During WWII the Irish government imprisoned soldiers of all the major belligerent countries -- Germany, Britain AND the US -- who happened to cross the border into the Republic. Yes, that's right, American servicemen were also imprisoned in Irish prison camps during WWII. Ireland maintained its neutrality. Switzerland did the same. Unlike some other countries I could mention, the US does respect the neutrality of other countries; and always has. Iraq, Iran, and others of that ilk most certainly do not. And they don't respect the sovereignty of other nations either. You only have to look at the US embassy in Tehran in '79/80 to see that. Embassies are supposedly sovereign ground of the nation it belongs to. But the Iranian sub-humans didn't bother with those international niceties. They technically, under international law, invaded a sovereign nation and took hostages and killed people. Did we do likewise to their embassy in Washington? You tell me, you seem to know just how bad and nasty we Yanks are. But unfortunately public perception of what the states is doing is bad......and I mean majority.....not minority, here anyway, but judging by the article very much rife in Europe. There you go again -- setting youself up as the spokesman for an entire nation. What majority? Who are they? Why haven't we heard? And, if they are getting involved to that extent, where's your country's neutrality? Out the window, I guess. Let me clarify myself as to what I mean in "my comment". America on a whole is responsible for the attacks that were inflicted on them in this case. You can't declare war on someone and then get all shocked when they attack you. And just when, and who did we declare war on? NOBODY! Man, you're either delirious, or you better get off whatever you're on. We declared war on NO ONE. We weren't at war with ANY ONE. So you tell me -- who were we at war with? Who did we declare war on? Where were our troops fighting? And against whom? And WE are RESPONSIBLE for the attacks on over 3,000 innocent people of 80 different nations? By a bunch of lunatic sub-humans who are killing in the name of GOD?? Isn't that what you Irish over there are killing each other over? Religion? Gimme a break! I suppose the victims at Enniskillen and Omagh brought it on themselves, too. Right? According to your logic, it couldn't have happened any other way, or for any other reason. And before you respond to this part, let me tell you that I do know it's more than just religion. But that's how the rest of the world sees it -- just as you're saying we Americans brought this on ourselves. You'll argue with me that there's more to the problems in the north than religion. I know that. You know that. But the rest of the world dosen't. So now you tell me -- how can you make unsubstatiated statements about the US when you obviously haven't a clue what the hell you're talking about?!?! Obviously no one expected it to be so vicious, but those arab guys aim was to bring it home for the US to show them what its like to have your innocent love ones killed. This is wrong of course....I couldn't agree with people more. Oh, so you think it's wrong because you didn't expect it to be so vicious? There are varying degrees of genocide and mass murder then? I suppose if Hitler had only killed 2 million Jews, that would've been all right. Right? I'm once more using your stated logic. We already know what it's like to have our loved ones killed. It happens to us all the time. Not since Pearl Harbor, of course. But it's happened nonetheless. And what you're saying is that it's perfectly all right to kill all those innocent people -- JUST TO MAKE A POINT?? You're as sick as those scum who perpetrated the atrocity. There is NEVER a reason to take innocent lives. I admire George Bush for his RESTRAINT in dealing with things in the last year. Believe me, we could've turned Afganistan into a parking lot in less than 24 hours if we hadn't shown restraint. You know that as well as anyone else does. What I don't like is when some american reporter thinks that europeans that disagree with the US's war on terror are stupid....its very small minded, USA style. Which American reporter would that be? You make a lot of statements but provide precious little proof or evidence to back up anything you say. I read news articles, scores of them, every day. I've never seen a single article, by an American reporter or any other reporter, that called the Europeans stupid for disagreeing with us on the Iraq question. You're the one who is small minded. You probably only read some left-wing rag and believe everything it says. I read left and right wing papers, and yes, some of them (right as well as left) also fall under the category of "rag". But it gives me insight, and an understanding of different points of view on various subjects. You ought to try it sometime. Broadens the mind, makes you see things clearer. Try it sometime. You might be surprised how much of the world there is that you know nothing about. On a day like this my utter respect goes out for the firemen and police that lost their lives trying to save innocent people. Well, under other circumstances I would have said that this is finally something I agree 100% with you on. But I can't. Reason being that you've already stated, more than once, that we Americans deserved what we got on 9/11/01; meaning, of course, that those 3,000+ innocent people were legimate targets and that they deserved to die. Therefore, your respect for the firemen and cops who died that day trying to rescue those victims somehow doesn't ring true with me. You're saying those victims deserved it, and then you say you respect those trying to save them. That is completely contradictory and totally transparent. It's also sickening and perverted. You don't give a damn about the cops and firemen. No more than you give a damn about the rest of the innocents who died that day. Jerry Keenan GPKeenan Co., Int'l Security Services West Islip, NY Message: 9 Date: Tue, 10 Sep 2002 08:19:52 -0400 From: zack <10-33@c...> Subject: US Policy and 911 I take this very seriously. You see, I pass the Pentagon almost every day and worked 9-11-01 and will 9-11-02. If I am correct, did not Ireland support us ??? And may I take a moment to express my deepest thanks to the overseas Countrys who have supported us and will in the future. And Mr. Deran, this is quite appropriate for this list. Your comment : " I'm a firm believer that they have no one to blame but them selves, " was uncalled for. Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 6217 From: gkeenan Date: Wed Sep 11, 2002 10:39pm Subject: US policy and 911 Sorry folks, here I go again. I know I've done some ranting against Vance, but I think this article says it all for me. Just a word of background, for those of you who aren't familiar with the UK's Daily Mirror. This is a notorious left-wing, anti-American daily in the UK. I had to read this article three times and I still don't believe the Mirror published it. It was published in today's Daily Mirror. Jerry Keenan SHAME ON YOU AMERICAN HATING LIBERALS Tony Parsons Daily Mirror September 11, 2002 ONE year ago, the world witnessed a unique kind of broadcasting - the mass murder of thousands, live on television. As a lesson in the pitiless cruelty of the human race, September 11 was up there with Pol Pot's mountain of skulls in Cambodia, or the skeletal bodies stacked like garbage in the Nazi concentration camps. An unspeakable act so cruel, so calculated and so utterly merciless that surely the world could agree on one thing - nobody deserves this fate. Surely there could be consensus: the victims were truly innocent, the perpetrators truly evil. But to the world's eternal shame, 9/11 is increasingly seen as America's comeuppance. Incredibly, anti-Americanism has increased over the last year. There has always been a simmering resentment to the USA in this country - too loud, too rich, too full of themselves and so much happier than Europeans - but it has become an epidemic. And it seems incredible to me. More than that, it turns my stomach. America is this country's greatest friend and our staunchest ally. We are bonded to the US by culture, language and blood. A little over half a century ago, around half a million Americans died for our freedoms, as well as their own. Have we forgotten so soon? And exactly a year ago, thousands of ordinary men, women and children - not just Americans, but from dozens of countries - were butchered by a small group of religious fanatics. Are we so quick to betray them? What touched the heart about those who died in the twin towers and on the planes was that we recognised them. Young fathers and mothers, somebody's son and somebody's daughter, husbands and wives. And children. Some unborn. And these people brought it on themselves? And their nation is to blame for their meticulously planned slaughter? These days you don't have to be some dust-encrusted nut job in Kabul or Karachi or Finsbury Park to see America as the Great Satan. The anti-American alliance is made up of self-loathing liberals who blame the Americans for every ill in the Third World, and conservatives suffering from power-envy, bitter that the world's only superpower can do what it likes without having to ask permission. The truth is that America has behaved with enormous restraint since September 11. Remember, remember. Remember the gut-wrenching tapes of weeping men phoning their wives to say, "I love you," before they were burned alive. Remember those people leaping to their deaths from the top of burning skyscrapers. Remember the hundreds of firemen buried alive. Remember the smiling face of that beautiful little girl who was on one of the planes with her mum. Remember, remember - and realise that America has never retaliated for 9/11 in anything like the way it could have. So a few al-Qaeda tourists got locked without a trial in Camp X-ray? Pass the Kleenex. So some Afghan wedding receptions were shot up after they merrily fired their semi-automatics in a sky full of American planes? A shame, but maybe next time they should stick to confetti. AMERICA could have turned a large chunk of the world into a parking lot. That it didn't is a sign of strength. American voices are already being raised against attacking Iraq - that's what a democracy is for. How many in the Islamic world will have a minute's silence for the slaughtered innocents of 9/11? How many Islamic leaders will have the guts to say that the mass murder of 9/11 was an abomination? When the news of 9/11 broke on the West Bank, those freedom-loving Palestinians were dancing in the street. America watched all of that - and didn't push the button. We should thank the stars that America is the most powerful nation in the world. I still find it incredible that 9/11 did not provoke all-out war. Not a "war on terrorism". A real war. The fundamentalist dudes are talking about "opening the gates of hell", if America attacks Iraq. Well, America could have opened the gates of hell like you wouldn't believe. The US is the most militarily powerful nation that ever strode the face of the earth. The campaign in Afghanistan may have been less than perfect and the planned war on Iraq may be misconceived. But don't blame America for not bringing peace and light to these wretched countries. How many democracies are there in the Middle East, or in the Muslim world? You can count them on the fingers of one hand - assuming you haven't had any chopped off for minor shoplifting. I love America, yet America is hated. I guess that makes me Bush's poodle. But I would rather be a dog in New York City than a Prince in Riyadh. Above all, America is hated because it is what every country wants to be - rich, free, strong, open, optimistic. Not ground down by the past, or religion, or some caste system. America is the best friend this country ever had and we should start remembering that. Or do you really think the USA is the root of all evil? Tell it to the loved ones of the men and women who leaped to their death from the burning towers. Tell it to the nursing mothers whose husbands died on one of the hijacked planes, or were ripped apart in a collapsing skyscraper. And tell it to the hundreds of young widows whose husbands worked for the New York Fire Department. To our shame, George Bush gets a worse press than Saddam Hussein. Once we were told that Saddam gassed the Kurds, tortured his own people and set up rape-camps in Kuwait. Now we are told he likes Quality Street. Save me the orange centre, oh mighty one! Remember, remember, September 11. One of the greatest atrocities in human history was committed against America. No, do more than remember. Never forget. [Non-text portions of this message have been removed] 6218 From: Fernando Martins Date: Thu Sep 12, 2002 3:44am Subject: RE: Reprinted after a year > See if anyone you know is mentioned in there. Yeah, that guy Echelon that have family in other places that the author of the article seems to ignore (i'm sure he knows). Also, I know other family, the P-3 Orion guys, they have a house about 10 miles from here. Ohh yeah ... There is some other guy that I never saw, but it's great to notice that he is in action again ;) FM 6219 From: Craig Snedden Date: Thu Sep 12, 2002 3:33am Subject: RE: US Policy and 911 Guys can we get back on topic please? I know blood was running warm yesterday but.... If I wanted to discuss world politics, the IRA, IRB, Sinn Fein, Red Hand Defenders, UFF, UVF, Real IRA, PLO, Al Quieda, PFLP, Muhammar Quadaffi, Hitler, Herman Himmler, etc. etc. I think I would join another list.... Yes I know there is a delete key, but you still have to start reading to decide if you need to delete. :-) > my two grand children have to go in a group to school each day guarded by private security, armed I might add, I'd be surprised at those last four words. Yes there are a lot of people in the North of Ireland who have legitimate access to firearms compared to mainland UK where all types of firearms bar single shot (i.e. two barrells max) shotguns, target pistols and bolt action rifles are completely outlawed. Security Forces on duty, some active and retired police officers under specific threat when off duty etc. But armed private security? Thats a new one on me. >front garden of my father-in-law's house in the Creegan. Perhaps you mean Creggan? Have a nice peaceful day. 6220 From: Ocean Group Date: Fri Sep 13, 2002 4:37am Subject: US foreign policy etc.... In response to Jerry Keenans first message....which got hopelessly lost somewhere,....I think.....or the list ate it. Cheers Wow....ok, I didn't expect this kind of reply, maybe I should have chosen my words a little better, however, at the time "I" was a little annoyed at the article. But fair is fair and I'll reply to your post as best as I can. >>"And, not to put too fine a point on it, my computer has what some people refer to as a "delete key". If you don't like it, delete it. I do it all the time 'cause I don't have as much time on my hands as you apparently do. I just delete it, and that's it. But before you say anything - I'm responding here because there are times when the delete key isn't enough, and certain things, in my own opinon, require a reply. I try to avoid this - but I just wouldn't feel right if I let certain things just go past me without comment."<< Right, about the delete key, I'll remembet that next time you CC me a copy of your mail. Yes I have ALOT of time on my hands, I like to use it to send inflammatory posts etc.....Okay Jerry, I think I get your point here....next time I see an article about the US I object to I will delete it rather than respond to it. Oh hang on a minute, now your talking about a reply because you couldn't use the del key, well in that case put it this way, I didn't want to use the delete key, I felt the article was a little too self righteous....and it hurt my feelings, so I "HAD TO" reply to it. >>"I know there are many, many international members on this list. I, for one, don't have a problem with any of you posting similar articles about major events, terrorism in particular, in your own countries; and most particularly when those articles refer to something very serious, very ingrained your own histories. I think it keeps all of us aware of what's going on outside our own worlds."<< Yes I'm sure there are alot of international people on the list, If its ok to post history articles about your own home country then thats fine, that was my original question, whether this group was the right place for such a post? asked and answered. >>"But I know that Jim Atkinson also sends out, periodically, jokes and humorous items to break up the motonony. I haven't noticed you complaining about any of those."<< Tell me Jerry, do you think the jokes are the same as that article? In my opinion the jokes and humorous items are slightly different to an article about US foreigh policy and how europeans are reacting to americas right to wage war to revenge its own, or to get a couple of barrels of oil, or to eradicate terrorism.....whatever your take maybe. The reason I haven't complained about James jokes is beacuse....well, they are quite good!.....however that article was quite.....well not so good, in my opinion. >>"But this article was written by an American and published in the UK's Daily Telegraph -- they must have thought it important enough to publish in a UK paper. Or at least 'different' enough."<< I'm not sure I see your point, do you contend that the UK would be critical of the US and so them printing it is an indication that the US must really be right? Is that why Mr.Blair is no doubt having a tough trip to Camp David to have a sit down with your esteemed leader, George. >>"When Easter rolls around, if you have something to post about the Easter Rising -- I'd be happy to receive it."<< Well, that was a little before my time, but I'm glad you brought it up....because, the US is very much like the UK in this instance, oppression for many years etc, and then they couldn't understand why all of a sudden these barbaric rebels were suddenly killing their citizens and bombing their cities. >>"I've studied Irish history for many years and lived in Ulster for five years. My "Irish side" comes from Ulster, and I still have a step-son, daughter and two grand children living in Ulster. I also have another daughter buried there. "<< I'm sorry to hear that Jerry, if it was due to the troubles then I'm sorry for your tragic loss. I don't really want to get into this issue as you said some things are best left alone. >>"So you might say I have a personal stake in Irish history (my great-grandfather left Ulster in a hurry back around 1898 with a Crown price on his head of L20; a lot of money 104 years ago - he was a member of the IRB; I'm sure you know who they were; they were founded in New York City and were the forerunners of today's IRA)."<< Yes Jerry, I know who the IRB are. I'm sure they were glad of all the money they received from a generous Irish american fundraising over in the states. >>"As for having no one to blame but ourselves? How so?"<< Because Jerry, the US is no longer run by a goverment serving the people, but by a goverment driven by the interests of corporations and the lobbies that provide the most funding to them. Let me ask you something, do you think that the US goverment has ever acted with not the best interests of the people in thought? Do you think the goverment has ever acted under pressure from Oil Corporations? Do you think the US is talking about attacking Iraq in the best interests of the world or in the best interests of the US? >>"This is not a perfect world. We - Americans as a whole - are not perfect. No one is. "<< No one is saying otherwise. >>"Yet, you seem to be one of those who believe that all the world's ills are the result of America! What a dip-stick you are! "<< Charming, anyhow, no Jerry, not the whole world's ills..... Just america's ones. America is responsible for its own ills. >>"Just over 100 years ago we were hearing the same thing about the British Empire! "<< And your point is? Well just because the british empire did something bad one day doesn't make it right, but the US didn't say anything when the irish "illegal" goverment were seeking recognition from your esteemed country. However, if Ireland was filled with oil how quickly to you think the US would have turned around and told the british to get the f**k out and leave us alone and then come into the country to provide protection, whether we liked it or not! >>"We're a country of nearly 300 million people -- and many of them are Muslims, Jews, Protestants, Catholics (I'll talk about the Protestant-Catholic thing another time! As they say, clean up your own yard before telling others to clean up theirs - by the way, I'm Irish Catholic whose family hails from Ulster and with a Catholic family still living, and suffering there). "<< So when you say clean up your own yard to you mean, we should kill all the muslims, jews in the country or do you mean we should stop bombing countries and stop taking advantage of developing countries in order to further our own wealth? >>"I guess the whole thing hinges on whichever country happens to be the most powerful at the time. And most countries have had their chances, and all have had to listen to the crap we have to listen to about being solely reponsible for the defects of others; there was Spain, Denmark, Britain, France, Japan, China, Egypt, Italy (Rome), Turkey (the Turkoman Empire), and ad infinitum. Now it's our turn in the barrel. And to think, we were once a non-descript, unimportant colony in the British Empire."<< So what your saying is that since you are the most powerful country in the world you should be allowed to ignore the critics of what your country does? Just cause its been done in the past doesn't make it right. You of all people should know that. >>"The only perfect human being there ever was was nailed to a cross over 2,000 years ago by the Romans - and their country, Italy, is today the most Catholic country on the globe; maybe Ireland and Spain coming in a close second. Even the Muslims acknowledge that."<< Thats debatable, especially if your not christian, the catholic church is by far not free from blame, it has done its fair share of murder and well,I'm not here to discuss religion, but you understand, I'm talking countries here. >>"As for these wackos committing murder for no reason -- that's a crock!! "<< Oh they had a reason....a very big one....a dn the US gave it to them. Do you think someone gives up his own life to kill thousands cause it sounded like a good idea in the pub the night before. People don't strap 6kgs of explosive to their chest and walk into an Israeli checkpoint for no reason, and low the shit out of anything in 50 metre radius, they have reasons, some you'll think are stupid, some you'll think are laughable and some you just won't listen to. >>"Murder is one thing - genocide another. "<< Please don't compare the extermination of several million people to 10,000 people. Either way both are wrong. >>"Hitler also murdered children and women -- just like the hijackers did."<< Yes your right, innocent ones at that, just like the hundreds upon thousands of women and children the US allowed to starve to death in Iraq. Thats genocide too......NO? WHY NOT? >>" But arguably to his credit - he only targeted 3 races (Poles, Jews and Russians)."<< Maybe, but several "million" of them...anyhow I don't know why your using Hitler as an example, everyone agrees what he did was wrong! >>"The 911 hijackers targeted anyone and everyone">> No Jerry, they targeted american's....and at that average hard working ones...and do you know why, beacuse they are the very people that elect and control the goverment of their "great" nation. Of course this is wrong.....wrong.....wrong......wrong.....wrong.....but that doesn't stop the US and that is "WHY" these people are attacking you.... >>"-- the first plane to hit the WTC South Tower had, as passengers, an Irish woman and her 3 year old child. Now, if you can, as an Irishman, justify that to me."<< I'm not going to, it can't be justified, its wrong, but the hijackers had a rationale for it, they feel that since the US does it to them they can do it back, whether this tit for tat is right, well, thats a question that will never be properly answered. >>"People from 80 nations died that day. If I'm not mistaken, more than 20 of them from Ireland. Nearly 100 from the UK. "<< If the papers are right about 3,000 people died that day.....I presume that is fairly about right. In Iraq 500,000 children are dead due to americas fight against terror. When reporters asked Albright if this was a price worth paying for the war against terror......DO YOU KNOW WHAT SHE SAID???? YES I BELIEVE THAT IS A PRICE WORTH PAYING. 500,000 INNOCENT CHILDREN.....EXPLAIN -THAT- TO ME JERRY. >>"So this article has meaning for many people on this list. And having spent most of my adult life in Europe, the Middle East and North Africa, I'm probably one of the few Yanks you'll ever meet who has more than a fleeting respect for other cultures, religions and races. I spent nearly 25 years living with and among them, was even married to one. "<< Good for you Jerry, unfortunately you would be a minority in your country, that is why your country is paying the price. Anyhow I hope this answers your post, if you feel I didn't fairly address something then let me know. All the best, Regards Vance PS. I leave you with the words of Miss.Albright when she was giving a talk in Ohio, and was suddenly jeered and booed about the US policy in Iraq by listeners, to which she shouted back.... "WE ARE THE GREATEST COUNTRY IN THE WORLD". 6221 From: Ocean Group Date: Fri Sep 13, 2002 6:08am Subject: RE: US Policy and 911 Hi Gerry, Sorry about you not getting my first reply, I did send it but it never got on the list, maybe it was moderated or something, anyhow I resent it and CC'd to you for good measure, if you don't get it now well then I'm going to assume God doesn't want you to have it!!! :) No I'm not a man from the North, however I'll just address your points. Basically does British patrols are british, not Irish, if you want to call it occupation you can, I know the IRA like to call it that. As for cleaning up my own country, Gerry would you cop on, thats the daftest thing to say, if I could I would, however it is a political situation now and I am not in a position to voice my ideas about N.Ireland. That is left to the people that have actually suffered first hand by the british and the paramilitaries respectively. Your attitude is interesting gerry, your saying that I should clean up my own country before making suggestions about the US. Does that mean I'm not entitled to voice my opinion about the US untill Ireland is in a perfect state? As for comments down below I shall respond to them beside the relevant comments. I'll mark ##. -----Original Message----- From: gkeenan [mailto:gkeenan@s...] Sent: 12 September 2002 03:45 To: Sean J Walsh; Ocean Group Cc: TSCM Group Subject: Re: [TSCM-L] US Policy and 911 Vance, Just read your last two postings. I really feel left out! I was the first to respond to your original post last evening, but received no reply - yet you've responded to shorter, less detailed responses from others. Did I hit a chord? Maybe because I have such a deep personal involvement in Ireland, have lived there for several years, and still have family (children and grand children) living there and understand the Irish people, their character and national identity, and I even have a very good understanding of the problems in the North. Remember, I lived there and am Irish Catholic myself and spent five years in Derry where I lived on the Waterside as a Catholic. Did you ever live in the Waterside section of Derry? My daughter still lives there and has to board up her windows and my two grand children have to go in a group to school each day guarded by private security, armed I might add, to protect them from the Prod paramilitaries who have attacked them in the past. I've also seen my son (6 years old at the time) staring down the barrel of a British rifle from only 6 inches away while I stood helpless 10 feet away with another five rifles pointed at me. All because he threw a rock at this British patrol. And we were in the front garden of my father-in-law's house in the Creegan. The Brits used the standard 6-man urban patrol; 3 on each side of the street. That doesn't happen here in New York. Like I said in my post last night -- before you make comments about a country you obviously know nothing about, clean up your own mess first. Then make your suggestions. Hello Sean, People have reasons for doing everything that they do.... >Sure I guess thats fair, you might do something on impulse though, and may not later have a reason for what you did. So, what you're saying is that several years of planning and plotting and funding resulted in an impulse to fly planes into the Twin Towers and Pentagon? And it was an impulse to kill over 3,000 people between the 3 incidents? What planet are you really from? You can tell me, I won't tell anyone - promise. ## Nope I'm not saying that, are you? I was just pointing out that as an example of what someone might do, for example the person thats an impulsive shoplifter. I'll tell you what planet I'm from, yours. Don't believe me, well then why don't we meet face to face and I'll prove it to you. some of them are delusional, >That would be people with mental illness I guess. Delusional -- yeah, that's a fair description of your comments. ## Ah Gerry, you are by sure one of the brightest americans I have ever talked to. some are due to misunderstandings, >Like when the US promised Iraqi rebels that they would stick with them if they helped to over throw Suddam, and then left them to be slaughtered when the US agreed with Suddam for him to leave Kuwait and give the US access to Iraqi oil. Yes, agreed. There are always misunderstandings in every walk of life, every day. But you're completely wrong about this promise to rebels and all that. I'll bet you get your info from the IRSP and RAWA. ## I don't even know what those letters stand for, I have though seen the propaganda cards that the US dropped into Iraq with little pictures of a good life and food being given to all that rebel against Suddam with little pictures of the US promising to protect them from evil saddam. Now there's a bunch that needs therapy! ## I'll tell you who needs therapy, bvut you wouldn't like it. The Kurds were being slaughtered long before the Gulf War. ## We're not talking Kurds here, we're talking Iraqi rebels....get with the program here gerry. And we made no promises because there was, and still is, a fear in that region of a Kurdish state -- and that includes our allies in Turkey. ## Lie. They don't want a Kurdish state either; anymore than Iraq does. Like I said, in the words of Abe Lincoln "you can please all of the people some of the time, some of the people all of the time, but you can't please all of the people all of time". Words to live by. You ought to try it, then get into international politics and try to sort out the world yourself. ## No thanks I'll leave it to the US who do such a "fine" job of shitting in everyone's back yard but their own. I'll bet you wouldn't even be able to handle it at the local council level; let alone on a global scale. ## Gerry you have the intellect only rivalled by a set of garden tools. If you want to get all mad and thick then I suggest you talk to someone else, I'm not here to take crap from you. misinformation and a host of other reasons..... >Like what the US DOD and officialdom do to the american people and western europe. I spent 25 years working for the US Department of Defense (including 20 years Navy and 5 years civil service), and my wife spent nearly 30 (6 years active in the Navy, 15 in the Navy Reserve and, while in the Reserves and afterward, a total of about 15 in the Civil Service). I still work with the DoD and military departments, not just the US, but other countries as well. So what do you know about the US DoD that I don't? Please - enlighten me. Just what is it that they're doing to the American people? ## Gerry let me ask you a question, because its seems from your email that you have just about worked everywhere and done everything. How well do you think the DOD has taken care of their own soldiers? Come on think about it. Have they ever lied about illegal testing on soldiers, nerve agaent vacine testing, have they ever lied to their own soldiers about depleted uranium poisoning? If you work for the DOD then I don't even want to talk to you. A lot less than other countries' governments are doing to their people -- including yours. From your posts I'm safe in saying that you're one of those bleeding heart liberals that are the root cause of all the troubles today - and I'm not defining this by country because I'm too intelligent for that. I'm defining it by the rampant liberalism and political correctness running amuck in the world today because this one gets upset by something someone else said, or some other load of crap. Amnesty International, of which I'm sure your a card-carrying member, has already identified Britain as the leading democracy that has imposed the most limitations and restrictions on freedom and privacy of all the western democracies. It ain't the US boy'o. It's your neighbors across the Irish Sea; and to the North. ## The irish goverment hasn't hurt any of its soliders, except for one or two that went a little deaf from not using hear muffs. Britain are no better, I consider Britain americas biggest puppy, no denial. Amnesty International....aggghhhh....the CIA's favourite organisation....tell me Gerrry did you ever work for the CIA, I'd say you did cause you seem very brainwashed. Do you like torture and assasinations gerry, do you get off on blowing shit up? having a reason does not always explain the actions taken by an individual or a group... >One may not agree with the reason but the fact is that rational people decided that the reason was strong enough to do what they had to do. You're saying those sub-humans were rational? ## They're not sub humans and they were rational. I'd rather buy a used car off Osama than George anyday. Plus it would probably be more fuel economical. That they had a reason for the mass murder of over 3,000 innocent people? ## Yes....don't you look at the news? And don't give me that George Habib crap about "there are no innocents". ## Oh I would never do that, there are millions of innocents, but no one cares anymore. I don't buy into that PFLP bullshit either. ##Whats pflp? No rational person would, or could conceive of a plan to murder women and children, and men and women going about their daily business. ## Sure the US did it when the killed 10,000 afghan civialians with their planes as they went about "their" daily business. There is no reason strong enough -- except lunacy. ## ........ Using your logic, there was nothing wrong in Hitler exterminating 6 million Jews, either. ## No not in my logic, the jews never bombed the shit out of hitler, dumbass. Will you wake up and listen to yourself! He had a reason -- the Final Solution to the Jewish "Problem" in Europe. ## Sure it was a reason, but killing is wrong, no matter who does it, US, Taliban, the elves, santa etc. Pearl Harbor was a legitimate target for Japan when you're talking about war. It was a MILITARY target and was fair game by all the rules of war. ##ok, before my time anyway. What those bottom feeders did was not to go after a legitimate military target -- they deliberately went after defenseless, innocent civilians because they're cowards; they don't have the guts to stand up and fight like men. ## ha ha aha aha aha ah aha ha, fight like men. YOU MAKE ME LAUGH. You mean like the US bombs people from 10 miles up in the sky, YEAH, that is so honourable. HA ha aha haaha. You saw how they ran in Afghanistan. They wouldn't even face smaller numbers of our guys; or the Brits, Aussies, French, New Zealand, Norwegian, German, and the other Special Forces from western countries. They had to have at least a 5-to-1 numerical superiority before they'd even think about standing and fighting; and even then it was only a few rounds before the cowards broke and ran. Those are the rational, courageous scum you're saying had a reason for slaughtering innocent women and children -- including some of your own countrymen. ...nor does it justify their actions by the fact they they believe they have a reason, >Exactly, just like the way the US think that they have the right to control the goverment in Cuba and have attempted to assasinate and overthrow his position, and the reason they justify this is by saying its for the good of america. Boy, you really need a major course in international politics. Who's trying to control the Cuban government? If we wanted to do that, don't you think we would've been in there a long, long time ago? ## Yeah like the bay of pigs, you guys really showed them who was boss. Hell, it would a damn sight cheapter than Afghanistan. It's only 90 miles from the Florida coast. Just a few troops ships would do it. And we already have a base there with all the logistics and support we'd need to launch an invasion. But we haven't done it since Castro came to power nearly 50 years ago. We could've done it '62, instead of just setting up a blockade. But we didn't. Where are you getting this stuff? You been reading too many comic books and fiction novels me ol' mucker. I like Ian Fleming, Le Carre and Clancy too -- but I also recognize it for what it is - fiction. ## Jerry, jerry , jerry, I'm more of a john grisham man myself. Jerry Keenan GPKeenan Co., Int'l Security Services West Islip, NY [Non-text portions of this message have been removed] 6222 From: Ocean Group Date: Fri Sep 13, 2002 6:09am Subject: RE: Digest Number 1058 And the discussion continues......## -----Original Message----- From: gkeenan [mailto:gkeenan@s...] Sent: 12 September 2002 04:30 To: TSCM-L@yahoogroups.com; Ocean Group Subject: Re: [TSCM-L] Digest Number 1058 This is really good. Sure the Irish goverment voiced there backing of the US, but that doesn't mean the country agrees with it. If you were Ireland and the most powerful country in the world turns around and says in no uncertain terms....."You're either with us or against us...." what do you do? of course your going to say, yeah sure we're right behind you all the way....all the way to the pub as we are neutral....ciao. How do you know the country doesn't agree with it? Are you now the spokesman for the Irish Republic? Was there a referendum that gave you the mandate to speak for the people? ## Yes I am a spokesman, yes there was a referendum, and everyone elected me to speak. HAve you got a problemo with this? if the goverment turned around and said no ....we stand with the taliban, I think the US would have cracked up laughing, no one would even take them seriously, I mean how could they!!! You got a point. ## I know, thank you, thank you, no autographs. But on the other hand, Ireland is SUPPOSED to be a neutral country and shouldn't even be commenting, officially, on any of this. ## Aggghhh....you monkey. Do you remeber what BUSH said.....your either with us or against us.....silence would not have lloked good. That's what neutrality means. ## You couldn't see neutral if it ran you over. During WWII the Irish government imprisoned soldiers of all the major belligerent countries -- Germany, Britain AND the US -- who happened to cross the border into the Republic. ## WRONG BUCKO. The irish quietly allowed british flyers to cross the border back to britain...FACT. ANd any US pilots that landed in Ireland were shot on principal for being so stupid. Yes, that's right, American servicemen were also imprisoned in Irish prison camps during WWII. Ireland maintained its neutrality. Switzerland did the same. ## Yeah they sure kept quiet about the Nazi gold.... Unlike some other countries I could mention, the US does respect the neutrality of other countries; and always has. ## Bollocks, if thats the case why did the US ask permission to land its military planes in Shannon, which I regularly see as my work often takes me to the airport. Iraq, Iran, and others of that ilk most certainly do not. ## Agreed, less so. And they don't respect the sovereignty of other nations either. ## They recognise Irealnd, I know Saddam does cause he said it, He came on tv one day and said "I recognise Ireland as a great country with really good golf courses". You only have to look at the US embassy in Tehran in '79/80 to see that. Embassies are supposedly sovereign ground of the nation it belongs to. ## Yeah well I think your missing the point there...they bombed them more on the principle that they just plain hated america. But the Iranian sub-humans didn't bother with those international niceties. They technically, under international law, invaded a sovereign nation and took hostages and killed people. Did we do likewise to their embassy in Washington? You tell me, you seem to know just how bad and nasty we Yanks are. ## The Iranians, I'm glad you raised the point, let me ask you something MR.DOD/CIA/State Dept/White house......did the CIA ever fund Iran or provide arms to them? A yes or a no will suffice, but be careful which because I have some interested documents here and if answer wrong I will post these documents and you might be proven wrong, which I know would be very embarrassing for you, by the way these are unclassified documents juct in case anyone thought I was pulling a fast one. But unfortunately public perception of what the states is doing is bad......and I mean majority.....not minority, here anyway, but judging by the article very much rife in Europe. There you go again -- setting youself up as the spokesman for an entire nation. What majority? ## European majority. Who are they? ## AVerage citizens. Why haven't we heard? ## Cause you don't listen and people are tired of trying to tell you cause your too self absorbed. And, if they are getting involved to that extent, where's your country's neutrality? Out the window, I guess. Let me clarify myself as to what I mean in "my comment". America on a whole is responsible for the attacks that were inflicted on them in this case. You can't declare war on someone and then get all shocked when they attack you. And just when, and who did we declare war on? ## Read a paper. NOBODY! Man, you're either delirious, or you better get off whatever you're on. We declared war on NO ONE. We weren't at war with ANY ONE. So you tell me -- who were we at war with? Who did we declare war on? Where were our troops fighting? And against whom? ## Well Jerry, oh my god you right......I am so sorry. How could I have made such a mistake, let me make an announcement to the group....."GROUP......You will be glad to know that I have just realised that the US has NOT declared war on anyone for the past 20 years.....the'ir troops have not attacked any nation at ALL....at all....at all......never." There you go Jerry I hope that clears up any confusion Europe has had about the US. And WE are RESPONSIBLE for the attacks on over 3,000 innocent people of 80 different nations? By a bunch of lunatic sub-humans who are killing in the name of GOD?? Isn't that what you Irish over there are killing each other over? Religion? Gimme a break! I suppose the victims at Enniskillen and Omagh brought it on themselves, too. Right? According to your logic, it couldn't have happened any other way, or for any other reason. And before you respond to this part, let me tell you that I do know it's more than just religion. But that's how the rest of the world sees it -- just as you're saying we Americans brought this on ourselves. You'll argue with me that there's more to the problems in the north than religion. I know that. You know that. But the rest of the world dosen't. So now you tell me -- how can you make unsubstatiated statements about the US when you obviously haven't a clue what the hell you're talking about?!?! ## Sice I haven't a clue what I'm talking about, my legal advise is to not repond to this question. Obviously no one expected it to be so vicious, but those arab guys aim was to bring it home for the US to show them what its like to have your innocent love ones killed. This is wrong of course....I couldn't agree with people more. Oh, so you think it's wrong because you didn't expect it to be so vicious? ## No its wrong cause killing is wrong. There are varying degrees of genocide and mass murder then? ## Yes...there is little murder and big murder. I suppose if Hitler had only killed 2 million Jews, that would've been all right. ## No likking is wrong.....r u getting thie Jerry? Right? I'm once more using your stated logic. ## Wrong again Jerry, you really are embarrasssing yourself. We already know what it's like to have our loved ones killed. It happens to us all the time. Not since Pearl Harbor, of course. But it's happened nonetheless. And what you're saying is that it's perfectly all right to kill all those innocent people -- JUST TO MAKE A POINT?? You're as sick as those scum who perpetrated the atrocity. There is NEVER a reason to take innocent lives. I admire George Bush for his RESTRAINT in dealing with things in the last year. Believe me, we could've turned Afganistan into a parking lot in less than 24 hours if we hadn't shown restraint. You know that as well as anyone else does. ## Innocent killings are wrong, military killings are wrong, but unfortuneately accepted as the rules of war. I am sicker than those scum that did it. If you admire George Bush you are the bigest and I mean Biggest, with a capital B f**kin idiot on this planet. What I don't like is when some american reporter thinks that europeans that disagree with the US's war on terror are stupid....its very small minded, USA style. Which American reporter would that be? ## The article Jerry...wake up. You make a lot of statements but provide precious little proof or evidence to back up anything you say. ## Thank you for pointing that out. I read news articles, scores of them, every day. ## You are great Jerry, like all americans. I've never seen a single article, by an American reporter or any other reporter, that called the Europeans stupid for disagreeing with us on the Iraq question. ## Stpid, belittleing, condescending...the effect is the same. You're the one who is small minded. ## Sorry Jerry, I will try and be more open mionded about how great the US is. You probably only read some left-wing rag and believe everything it says. ## I read the Irish times, you should get a copy.....might brighten up your day. I read left and right wing papers, and yes, some of them (right as well as left) also fall under the category of "rag". ## You are a very brave man. But it gives me insight, and an understanding of different points of view on various subjects. ## And so wise. You ought to try it sometime. ## I will Jerry. Broadens the mind, makes you see things clearer. ## Thank you Jerry. Try it sometime. ## I will Jerry. You might be surprised how much of the world there is that you know nothing about. ## That I do know Jerry, I have alot to learn, I accept that. On a day like this my utter respect goes out for the firemen and police that lost their lives trying to save innocent people. Well, under other circumstances I would have said that this is finally something I agree 100% with you on. But I can't. ## Do you not like police men and fire fighters Jerry? Reason being that you've already stated, more than once, that we Americans deserved what we got on 9/11/01; ## No I NEVER said that.....I said you had to look upon your own actions for why this event happened to you. meaning, of course, that those 3,000+ innocent people were legimate targets and that they deserved to die. ## I don't think they were legit targets but according to US policy innocent people are legit targets. Therefore, your respect for the firemen and cops who died that day trying to rescue those victims somehow doesn't ring true with me. ## Hmmm. You're saying those victims deserved it, and then you say you respect those trying to save them. ## I respect anyone who is risking their life to save another....... That is completely contradictory and totally transparent. It's also sickening and perverted. You don't give a damn about the cops and firemen. No more than you give a damn about the rest of the innocents who died that day. ## I never said I gave a damn about the innocents. I said my respect was with the cops and fire guys who lost their lives trying to save others. just like aid agencies risk their lives to help people in afghan and iraq etc. I have total respect for them to. It was unfortunate the the US killed some aid workers in afghan, or did you even read about that on your news or did the DOD feel the US people didn't need to know that. Regards Vance Jerry Keenan GPKeenan Co., Int'l Security Services West Islip, NY Message: 9 Date: Tue, 10 Sep 2002 08:19:52 -0400 From: zack <10-33@c...> Subject: US Policy and 911 I take this very seriously. You see, I pass the Pentagon almost every day and worked 9-11-01 and will 9-11-02. If I am correct, did not Ireland support us ??? And may I take a moment to express my deepest thanks to the overseas Countrys who have supported us and will in the future. And Mr. Deran, this is quite appropriate for this list. Your comment : " I'm a firm believer that they have no one to blame but them selves, " was uncalled for. Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 6223 From: Alexander(Andy) Aitken Date: Thu Sep 12, 2002 8:13am Subject: Re: Digest Number 1059 Sirs: The assumption that these persons who had taken flight training on a Cesana 182 could hijack and fly three Boeing 757's with pin-point accuracy into three buildings is to my point of view incredible. Again I suggest that if the principal export of Iraq and Afganistan were tomatoes and not oil and heroin we would not be having this discussion. Alexander Aitken 6224 From: Hawkspirit Date: Thu Sep 12, 2002 7:58pm Subject: Sweep Needed Sweep needed in Arkansas off hwy 40 between Memphis and Little Rock Contact me by e-mail asap or call my office 323-462-1351 Roger Tolces 6225 From: David Alexander Date: Fri Sep 13, 2002 2:43am Subject: re: assumption >Sirs: > >The assumption that these persons who had taken flight training on a Cesana 182 >could hijack and fly three Boeing 757's with pin-point accuracy into three buildings >is to my point of view incredible. Again I suggest that if the principal export of Iraq >and Afganistan were tomatoes and not oil and heroin we would not be having this >discussion. > >Alexander Aitken I did post on this last year, but I guess we have some new members on the list. I am an ex military pilot, therefore feel qualified to comment on flight training and what is, and is not, possible. The principles of flying 'straight and level' are not difficult, and apply from one plane to another. It's like riding a bicycle - you never forget once you have mastered the trick. Quite frankly if you know where the throttles, artificial horizon indicator, compass and fuel gauges are, you'll manage. I trained on Harriers (AV8Bs to the Americans) and F4s, but I could very easily fly a 757 from A to B straight and level. Landing would be a lot more tricky, but that wasn't on the agenda on 9/11. Pin point accuracy is not required. A compass bearing would get you within sight on New York from where they started, and the plane certainly had GPS, which I'm sure they learned how to use. Once you get within 40 miles of New York you would be able to see the WTC from the air and then just head for it. On a separate note I do not agree with the point about exports. What matters is if Saddam has weapons of mass destruction that he is willing to use on other nations as a means of trying to extend his power base. Plenty of countries have such weapons - America, Great Britain, France, Russia, etc but there is no need to call for regime change in those countries because they only have such weapons as a means of deterrence against attack by other nations. They would not use them offensively. Iraq does not fit this profile. You can be fairly sure that through Echelon or some other means, the UK-USA team have information that convinces them that Iraq is preparing something, or has a capability that we the public don't know about. They can't present us with the evidence because that would show Iraq and others how much they can find out, and maybe how they found out, which cuts off that source of information in the future when the hole is plugged. The national security team will have sat down with the President and told him that it's not a case of if something like 911, or a dirty bomb, or a biological attack happens on home soil, it is when. They are convinced that Hussein is helping Al Qaida and others with money, training and hardware (much as Gaddafi used to do from Libya) and he must be stopped, now, before it is too late. My 2c. _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 6226 From: kondrak Date: Fri Sep 13, 2002 3:41am Subject: Hewlett Packard Radio service monitor Model # 8920A FYI from the radio-for-sale list, in case anyone's interested. >I have a Hewlett Packard Radio service monitor Model # 8920A 0.4 to >1000MHz > > >Option 001 = High stability timebase >Option 003 = HP-IB/RS-232/dc Current Measurement >Option 004 = Tone/digital Signaling >Option 005 = 512k RAM (memory) >Option 020 = Radio interface card >Option 102 = spectrum analyzer - tracking generator > >The 8920A RF Communications Test Set is a full-feature, one box test >set designed to meet the communication test needs of both service >and manufacturing environments. It is a signal generator, audio >generator, RF analyzer, AF analyzer, oscilloscope, spectrum >analyzer, tracking generator, signaling encoder/decoder and DC >current meter - all in one! Frequency coverage is from 250kHz to >1GHz. The tracking generator operates from 400kHz to 1GHz. >Shipping Weight: 52 Pounds >Buyer pays Shipping and Handling > > >It is clean and low mileage, on a scale of 1-10 it is a 9 (there is >a small chunk gouged out of the corner of one of the rubber buttons) > >Included is the manual a nylon backpack case one RF industries >Unadapt kit (almost every adaptor and cable combination can be made >with this kit) 4 Unadapt cables, several BNC to clip lead cables, a >fist full of tuning tools, a 12 volt DC power cable and several BNC >antennas. > >It's a complete kit ready to go and it works great. > >I am asking $6,000 plus shipping > >If you have any questions please contact Bob zook 970-379-6721 or >reply off list 6227 From: Date: Fri Sep 13, 2002 8:00am Subject: Secret Court to Reveal Ruling Secret Court to Reveal Ruling By JESSE J. HOLLAND .c The Associated Press WASHINGTON (AP) - One of the nation's most secret courts has assured senators that it will reveal to them its decision on whether the Justice Department should have more power to wiretap suspected terrorists and spies. The U.S. Foreign Intelligence Surveillance Court of Review told the Senate Judiciary Committee it will send them an unclassified copy of its decision on whether the Justice Department has gone beyond the limits of the Foreign Intelligence Surveillance Act in its wiretapping requests. Senators wanted to know the secret court's ruling so they could know how prosecutors are using the additional powers Congress granted after the Sept. 11 attacks. ``As soon as we have an opinion completed, I will be sure to see that you get an unclassified copy,'' said U.S. Appeals Court Judge Ralph Guy, a member of the review court, in a Wednesday letter to the Judiciary Committee. For the first time in its 24-year existence, the United States Foreign Intelligence Surveillance Court of Review met Monday to review a Justice Department request to use espionage wiretaps for criminal operations. Its lower court in August struck down a Justice Department surveillance request and its assertion that it can use Foreign Intelligence Surveillance Act wiretaps for criminal as well as espionage operations. The Justice Department appealed the decision to the higher court. The appeals court made no announcement of whether it had made a decision or whether it would be made public. But senators on the Senate Judiciary Committee immediately asked the court to make its decision public. Lawmakers are arguing over whether the anti-terrorism law they passed after the Sept. 11 attacks gave the Justice Department permission to expand its espionage wiretapping activities. ``We need to know how this law is being interpreted and applied,'' Senate Judiciary Chairman Patrick Leahy, D-Vt., said Tuesday. The Justice Department says the USA Patriot Act changed the surveillance law to permit its use when collecting information about foreign spies or terrorists when it is ``a significant purpose,'' rather than ``the purpose,'' of such an investigation. Previously, the FISA wiretaps could only be used for foreign intelligence investigations and not criminal investigations. Democrats say they didn't intend to expand the wiretapping powers to criminal investigations, while Republicans insist that it's what the law intended. 09/13/02 11:46 EDT 6228 From: rockdriver Date: Fri Sep 13, 2002 9:33am Subject: 911 horsepuckey from IRL About the list: TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Good evening, Can we please get back on TSCM topics,and the usual jokes and satire that occasionally comes in?save the 911 speculative,fingerpointing bullshit for some conspiracy list,This is the TSCM list.No one gives a rats ass about whos at fault,most of the 1300 plus members on this list have the intelligence to figure things out,Besides,for those who dont,FOX news has all the experts (?)anyone can stomach,for the likes of those who love tabloids, and all the horsepuckey, thats fit to print. I lost a friend on one of the flights that hit one of the towers.He had just finished pulling @19 hours of hard physical work in the Boston area, before boarding the flight to LA, as his wife went into labor, and was giving birth to their baby girl in Los Angeles while he was at the boarding area.He never got to see either of them........ For some asshole to come on here,The TSCM list, and justify whose fault anything is, in reference to 9/11, really pisses me off,especially when his own "litter box" has been full for over 50 years........... Thanks,I'm done venting,and have a project to finish..... MitchD 6229 From: Michael Puchol Date: Fri Sep 13, 2002 10:22am Subject: Re: Digest Number 1059 I think I can also comment on this, being an aeronautical engineer and private pilot - I don't have the experience on high-speed jets, but I've been around :-) During my aeronautical engineering studies, part of my final-year project involved tests in a full-scale simulator (this one was a BAe-146 static simulator at BAe Woodford). With just my training in light aircraft, and a basic knowledge of the avionics and flight control systems, I could land the aircraft in pretty much all conditions, even with modified flight models (reduced stability, engine failures, etc.). Another note is that of a TV program that ran in the UK (I'm not sure if it still does) called The Krypton Factor, where one of the tests the contestants had to go through was flying a simulator (in the different series they had large commercial jets, a SeaKing helicopter, and even a Red Arrows acrobatic simulator). The contestants had to land the aircraft in a normal runway, aircraft carrier, etc. with little training, maybe two or three hour's practice - and it was surprising how well most of them did. With all this, I have to say that what the terrorists did on 9-11 could be achieved with a fair amount of training, but not the kind only found in large, expensive simulators. For example, the trajectory could have been rehearsed over and over again in commercial programs like MS Flight Simulator, which features extensive scenery for both Washington and New York. Certainly some hands-on training on a Cessna 182 or similar would be all they needed to obtain the basic skills about flying an aircraft, determining rates of turn, etc. From this to a heavier, larger aircraft just requires more anticipation, and simulator practice. Most commercial pilot courses are done mainly on simulators, with a few hours of hands-on training for type ratings - even simulator software previously classed as a 'game' was accepted by the FAA to gain hours for particular certifications. The only thing that I think was difficult in the attack was the trajectory t hey followed, striking the towers at some 30 or 40 degrees of bank - this takes some practice, and if you look closely, the second aircraft made a last-second course correction. I believe that this had to do with the fact that if the aircraft had hit while straight and level, less damage would have been done (affecting two or three floors). Hitting at the angle they did would cause more damage to more floors of the building, making easier it's collapse - I do believe that that was the terrorist's intentions, not just to cause a fire and a few casualties, but rather the complete demolition of the towers. All the best, Mike ----- Original Message ----- From: "Alexander(Andy) Aitken" To: Sent: Thursday, September 12, 2002 3:13 PM Subject: Re: [TSCM-L] Digest Number 1059 > Sirs: > > The assumption that these persons who had taken flight training on a Cesana 182 > could hijack and fly three Boeing 757's with pin-point accuracy into three buildings > is to my point of view incredible. Again I suggest that if the principal export of Iraq > and Afganistan were tomatoes and not oil and heroin we would not be having this > discussion. > > Alexander Aitken > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 6230 From: Mitch Davis Date: Fri Sep 13, 2002 5:08pm Subject: 911 fungus re:911 Good evening, Can we please get back on TSCM topics,and the usual jokes and satire that occasionally comes in?save the 911 speculative,fingerpointing bullshit for some conspiracy list,This is the TSCM list.No one gives a rats ass about whos at fault,most of the 1300 plus members on this list have the intelligence to figure things out,Besides,FOX news has all the experts (?)anyone can stomach,for the likes of those who love tabloids, and all the horsepuckey, thats fit to print. I lost a friend on one of the flights that hit one of the towers.He had just finished pulling @19 hours of hard physical work in the Boston area, before boarding the flight to LA, as his wife went into labor, and was giving birth to their baby girl in Los Angeles while he was at the boarding area.He never got to see either of them........ For some asshole from IRL to come on here,The TSCM list, and justify whose fault anything is, in reference to 9/11, really pisses me off,especially when his own "litter box" has been full for over 50 years........... Thanks,I'm done venting,and have a project to finish..... MitchD [Non-text portions of this message have been removed] 6231 From: Fernando Martins Date: Sat Sep 14, 2002 9:13am Subject: Tempest jeans http://www.thisislondon.co.uk/dynamic/news/top_story.html?in_review_id=6 93614&in_review_text_id=666298 Levi launches anti-radiation trousers by Standard Reporter Levi Strauss today unveiled the world's first clothing designed to protect against mobile phone radiation. S-Fit trousers will have pockets designed to carry a mobile phone and lined with " antiradiation" material to shield wearers from potentially harmful phone emissions. The trousers, from the firm's Dockers range, are due in stores next year. They are aimed at teenagers and 20-somethings, but will cost £100 or more. Some industry experts accused Levi of cashing in on consumer fears over mobile phone emissions. One said: "There has been no definite proof that mobiles give off harmful radiation. Experts in the field are currently divided on the issue." The S-Fit trousers will also use a new fabric technology called the Clean Fabric System, which repels all liquids. Until now, jeans have been notorious for holding on to liquid spilled on them and taking longer than lighter fabrics to dry. A spokesman for Dockers said: "The new technology can make fluids roll off in droplets. Even sauces simply fall off and hot drinks will not scald." The anti-radiation pocket is the latest idea to boost sales of clothing in the UK. Previous ideas have included clothes with built-in radio receivers, microchips for stock control, skin moisturiser and even fragrance-enhanced fashion wear. © Associated Newspapers Ltd., 11 September 2002 Terms and Conditions This Is London 6232 From: kondrak Date: Sat Sep 14, 2002 4:08pm Subject: Site R > >09/14/02 Washington Post P. A22 > >Soldier Indicted on Charges Of Trying to Sell Secrets > >HARRISBURG, Pa. -- A soldier was indicted on federal charges for >allegedly trying to sell information on the top-secret >military facility where he worked to a Philadelphia publication. > >Army Spc. Maurice D. Threats, 22, of Cascade, Md., who worked as a >security guard in the Alternate Joint Communications >Center, was charged with transmitting defense information, bribery and >seeking a gratuity as a public official. > >The heavily guarded center, better known as Site R, sits inside a >hollowed-out granite mountain near the >Pennsylvania-Maryland border and is one of several relocation sites for >government leaders during national emergencies. 6233 From: James M. Atkinson Date: Sat Sep 14, 2002 8:32pm Subject: Re: Tempest jeans The real joke is that the pants are worthless unless you ground the phone to the pants, and then ground the pants to earth ground. Levi Strauss obviously thinks their customers are idiots. -jma At 3:13 PM +0100 9/14/02, Fernando Martins wrote: >http://www.thisislondon.co.uk/dynamic/news/top_story.html?in_review_id=6 >93614&in_review_text_id=666298 > >Levi launches anti-radiation trousers > >by Standard Reporter >Levi Strauss today unveiled the world's first clothing designed to >protect against mobile phone radiation. > >S-Fit trousers will have pockets designed to carry a mobile phone and >lined with " antiradiation" material to shield wearers from potentially >harmful phone emissions. > >The trousers, from the firm's Dockers range, are due in stores next >year. > >They are aimed at teenagers and 20-somethings, but will cost £100 or >more. > >Some industry experts accused Levi of cashing in on consumer fears over >mobile phone emissions. > >One said: "There has been no definite proof that mobiles give off >harmful radiation. Experts in the field are currently divided on the >issue." The S-Fit trousers > >will also use a new fabric technology called the Clean Fabric System, >which repels all liquids. > >Until now, jeans have been notorious for holding on to liquid spilled on >them and taking longer than lighter fabrics to dry. > >A spokesman for Dockers said: "The new technology can make fluids roll >off in droplets. Even sauces simply fall off and hot drinks will not >scald." > >The anti-radiation pocket is the latest idea to boost sales of clothing >in the UK. > >Previous ideas have included clothes with built-in radio receivers, >microchips for stock control, skin moisturiser and even >fragrance-enhanced fashion wear. > > >© Associated Newspapers Ltd., 11 September 2002 >Terms and Conditions -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6234 From: Matt Paulsen Date: Sat Sep 14, 2002 10:02pm Subject: RE: Tempest jeans >>Levi Strauss obviously thinks their customers are idiots. So... you're not saying their wrong, right? 6235 From: Marcel Date: Sun Sep 15, 2002 0:08pm Subject: Big Brother: CODE READ: The eavesdroppers: UNDERCOVER TRAFFIC CODE READ: The eavesdroppers: UNDERCOVER TRAFFIC COPS: From the humble letter to the latest electronic communications - a vast array of spooks and snoopers will have a way of listening in Source: The Guardian Publication date: 2002-09-14 The Agencies Police National criminal intelligence service handles interception on behalf of the 43 police forces in England and Wales, while Metropolitan police special branch handles it for special branches of English and Welsh forces. The eight Scottish forces and the Northern Ireland police service (formerly RUC) have interception powers, as do the national crime squad and the Scottish drug enforcement agency. Customs and Excise Inland Revenue Defence Intelligence Staff Part of MoD. Responsible for monitoring arms sales and weapons procurement by foreign governments MI5 GCHQ Understood to have a fibre optic link direct into a main switching point on the BT network near Menwith Hill listening station in North Yorkshire. Able to eavesdrop on British citizens since remit broadened to include serious crime. Mass trawling of communications is only allowed for "external" traffic but loophole in Ripa provides a new form of warrant - an override certificate - allowing GCHQ to conduct mass surveillance of domestic telephone and internet traffic rather than targeting specific individuals. Domestic internet traffic almost always will fall into this loophole because even internal traffic will travel around the world en route NTAC National Technical Assessment Centre - new pounds 25m computer surveillance facility, led by Asst Chief Constable Ian Humphrey and located in Thames House, MI5's headquarters on the banks of the Thames. Provides law enforcement and intelligence agencies with expert support, decrypting intercepted internet and email material. "Black box" recorders placed on internet service providers' computer servers for real-time collection of material - both content and traffic data - will feed direct to NTAC, which will also hold decryption keys obtained under Ripa. MI6 Local authorities, etc Home Office wants to extend list of agencies with power to self- authorise access to traffic data to seven Whitehall ministries, 11 central government agencies, all 467 local authorities, all fire authorities, and NHS and social services bodies in Scotland and Northern Ireland. The executive branch Issues warrants for interception of content of communications. At the end of 2000, the most recent year for which figures are available, 555 interception warrants issued by the home secretary for England and Wales and 32 issued by the Scottish executive were in force. The vast majority related to the prevention and detection of serious crime. Privacy campaigners claim the statistics are deliberately misleading. The providers Mobile phones Almost 70% of Britons use a mobile phone, and 80% of households have at least one mobile. Digital mobile traffic encrypted only between the phone and the nearest base station. After that, data is clear and can be intercepted as it travels down the network. Internet and email About 11.5 million homes are connected to the internet. Around 400 different service providers supply web and email access. The biggest is Freeserve with 2.5 million subscribers. How it works: * web pages or email message broken into small packets of data. * routed to their destination through the internet, a network of networks of computers. Individual packets making up one message can go by any number of different routes anywhere around the world, depending on which links in the network have spare capacity. Even emails from one UK computer to another can travel via various computers around the world and so can fall under legal definition of "external" communications. * packets reassembled at the destination computer. The entire process usually takes only seconds. BT and landlines Around 95% of British homes have a phone line. About 80% use BT with the rest split between smaller providers. System X, Britain's dated telephone network, was designed with wiretapping capabilities built in. Since the late 1990s, all digital exchanges have been built with intercept capabilities under the aegis of the European Telecommunications Standards Institute. Mail The Royal Mail handles 81m items of mail every day. Mail intercepts require a warrant and is still done by hand by specialist sorting office teams. Process made much easier by automatic post code recognition software. Home computers Warrant required to seize an individual's PC for evidence - with some exceptions - while email contents and traffic data records are obtained at network level. But privacy experts increasingly worried about the development of snooping viruses which will sit unnoticed on a machine's hard disk and report back what the owner is using it for, even giving eavesdroppers the power to see what the user is looking at on screen. Communications service providers legally obliged to: * maintain a mechanism for intercepting communications within one working day of being informed that a warrant has been authorised * provide near-simultaneous transmission of content and traffic data to agency holding the warrant * implement simultaneous interception of at least 1 in 10,000 subscribers to the network - at least 22,000 of BT's 22m customers What they can get Traffic data: includes customer name and address; telephone numbers dialled and received and duration of calls; mobile phone location data; email addresses sent and received; websites visited. Draft code of practice under anti- terror law calls for communications service providers to stockpile email and phone logs for six months; web caches, including page addresses for four days; and customer contact details for two years after account closed. Data can be accessed without executive or judicial warrant on the authority of superintendent rank or above, subject only to the officer's own assessment of whether this is "proportionate to what he is seeking to achieve". Grounds: national security; crime; economic wellbeing; public health; public safety; preventing death or injury to individuals; tax collection; any other purpose defined by Home Secretary. Content: accessing telephone conversations and content of emails requires an executive warrant. Can only be done on the grounds of national security, serious crime and economic wellbeing. On 26 occasions in 2000, police and security services mistakenly bugged the wrong people. MI5 bugged innocent people on three occasions because numbers were completely wrong or transposed incorrectly. Code read The golden age for spy agencies of almost unfettered access to communications may be drawing to a close with the growth of cheap, powerful encryption software. Encryption scrambles information so that it can only be read by someone with the secret "key" (like a very long random password). When you send information to a secure website, your browser can now encrypt it so well that it cannot be cracked even with the aid of supercomputers. Encryption code is now built into web browsers, email software, mobile phones and even devices such as electricity meters. Correspondence between the British and US governments, obtained by the Guardian under American freedom of information laws, reveals the high level of concern over encryption. On May 28 1999, Janet Reno, then US attorney general, wrote to Jack Straw, then home secretary: "I believe that the difficulties that encryption will pose for law enforcement are among the greatest challenges we will face in the coming years." Mr Straw replied on 22 June: "I fully share your concern at the threat posed by criminal use of encryption." But in the UK, controversial new powers under section 3 of the Regulation of Investigatory Power Act enable law enforcement agencies to order encryption keys to be handed over. Failure to do so can lead to a prison sentence of up to two years and/or a fine. It is also an offence to tell anybody that you have handed over a key, punishable by up to five years in prison and/or a fine. Critics say the new powers reverse the fundamental principle that a person is presumed innocent until proved guilty because they require the person asked for the key to prove that they do not have it. COPS: From the humble letter to the latest electronic communications - a vast array of spooks and snoopers will have a way of listening in Source: The Guardian Publication date: 2002-09-14 The Agencies Police National criminal intelligence service handles interception on behalf of the 43 police forces in England and Wales, while Metropolitan police special branch handles it for special branches of English and Welsh forces. The eight Scottish forces and the Northern Ireland police service (formerly RUC) have interception powers, as do the national crime squad and the Scottish drug enforcement agency. Customs and Excise Inland Revenue Defence Intelligence Staff Part of MoD. Responsible for monitoring arms sales and weapons procurement by foreign governments MI5 GCHQ Understood to have a fibre optic link direct into a main switching point on the BT network near Menwith Hill listening station in North Yorkshire. Able to eavesdrop on British citizens since remit broadened to include serious crime. Mass trawling of communications is only allowed for "external" traffic but loophole in Ripa provides a new form of warrant - an override certificate - allowing GCHQ to conduct mass surveillance of domestic telephone and internet traffic rather than targeting specific individuals. Domestic internet traffic almost always will fall into this loophole because even internal traffic will travel around the world en route NTAC National Technical Assessment Centre - new pounds 25m computer surveillance facility, led by Asst Chief Constable Ian Humphrey and located in Thames House, MI5's headquarters on the banks of the Thames. Provides law enforcement and intelligence agencies with expert support, decrypting intercepted internet and email material. "Black box" recorders placed on internet service providers' computer servers for real-time collection of material - both content and traffic data - will feed direct to NTAC, which will also hold decryption keys obtained under Ripa. MI6 Local authorities, etc Home Office wants to extend list of agencies with power to self- authorise access to traffic data to seven Whitehall ministries, 11 central government agencies, all 467 local authorities, all fire authorities, and NHS and social services bodies in Scotland and Northern Ireland. The executive branch Issues warrants for interception of content of communications. At the end of 2000, the most recent year for which figures are available, 555 interception warrants issued by the home secretary for England and Wales and 32 issued by the Scottish executive were in force. The vast majority related to the prevention and detection of serious crime. Privacy campaigners claim the statistics are deliberately misleading. The providers Mobile phones Almost 70% of Britons use a mobile phone, and 80% of households have at least one mobile. Digital mobile traffic encrypted only between the phone and the nearest base station. After that, data is clear and can be intercepted as it travels down the network. Internet and email About 11.5 million homes are connected to the internet. Around 400 different service providers supply web and email access. The biggest is Freeserve with 2.5 million subscribers. How it works: * web pages or email message broken into small packets of data. * routed to their destination through the internet, a network of networks of computers. Individual packets making up one message can go by any number of different routes anywhere around the world, depending on which links in the network have spare capacity. Even emails from one UK computer to another can travel via various computers around the world and so can fall under legal definition of "external" communications. * packets reassembled at the destination computer. The entire process usually takes only seconds. BT and landlines Around 95% of British homes have a phone line. About 80% use BT with the rest split between smaller providers. System X, Britain's dated telephone network, was designed with wiretapping capabilities built in. Since the late 1990s, all digital exchanges have been built with intercept capabilities under the aegis of the European Telecommunications Standards Institute. Mail The Royal Mail handles 81m items of mail every day. Mail intercepts require a warrant and is still done by hand by specialist sorting office teams. Process made much easier by automatic post code recognition software. Home computers Warrant required to seize an individual's PC for evidence - with some exceptions - while email contents and traffic data records are obtained at network level. But privacy experts increasingly worried about the development of snooping viruses which will sit unnoticed on a machine's hard disk and report back what the owner is using it for, even giving eavesdroppers the power to see what the user is looking at on screen. Communications service providers legally obliged to: * maintain a mechanism for intercepting communications within one working day of being informed that a warrant has been authorised * provide near-simultaneous transmission of content and traffic data to agency holding the warrant * implement simultaneous interception of at least 1 in 10,000 subscribers to the network - at least 22,000 of BT's 22m customers What they can get Traffic data: includes customer name and address; telephone numbers dialled and received and duration of calls; mobile phone location data; email addresses sent and received; websites visited. Draft code of practice under anti- terror law calls for communications service providers to stockpile email and phone logs for six months; web caches, including page addresses for four days; and customer contact details for two years after account closed. Data can be accessed without executive or judicial warrant on the authority of superintendent rank or above, subject only to the officer's own assessment of whether this is "proportionate to what he is seeking to achieve". Grounds: national security; crime; economic wellbeing; public health; public safety; preventing death or injury to individuals; tax collection; any other purpose defined by Home Secretary. Content: accessing telephone conversations and content of emails requires an executive warrant. Can only be done on the grounds of national security, serious crime and economic wellbeing. On 26 occasions in 2000, police and security services mistakenly bugged the wrong people. MI5 bugged innocent people on three occasions because numbers were completely wrong or transposed incorrectly. Code read The golden age for spy agencies of almost unfettered access to communications may be drawing to a close with the growth of cheap, powerful encryption software. Encryption scrambles information so that it can only be read by someone with the secret "key" (like a very long random password). When you send information to a secure website, your browser can now encrypt it so well that it cannot be cracked even with the aid of supercomputers. Encryption code is now built into web browsers, email software, mobile phones and even devices such as electricity meters. Correspondence between the British and US governments, obtained by the Guardian under American freedom of information laws, reveals the high level of concern over encryption. On May 28 1999, Janet Reno, then US attorney general, wrote to Jack Straw, then home secretary: "I believe that the difficulties that encryption will pose for law enforcement are among the greatest challenges we will face in the coming years." Mr Straw replied on 22 June: "I fully share your concern at the threat posed by criminal use of encryption." But in the UK, controversial new powers under section 3 of the Regulation of Investigatory Power Act enable law enforcement agencies to order encryption keys to be handed over. Failure to do so can lead to a prison sentence of up to two years and/or a fine. It is also an offence to tell anybody that you have handed over a key, punishable by up to five years in prison and/or a fine. Critics say the new powers reverse the fundamental principle that a person is presumed innocent until proved guilty because they require the person asked for the key to prove that they do not have it. 6236 From: James M. Atkinson Date: Mon Sep 16, 2002 2:13pm Subject: In case you need me this week, here's my schedule... In case you need me this week, here's my schedule... http://www.chicagocircle.com/links/my_schedule.html -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6237 From: James M. Atkinson Date: Mon Sep 16, 2002 3:47pm Subject: Update on Steve Uhrig Good Afternoon Everybody, I spoke with the Uhrig family this afternoon, and got an update on how Steve is doing. He made it through the surgery just fine, and all that they amputated was the toe and none of the actual bones in the foot. This means that he will be kicking starting his hog in no time at all. He is finally back at home, but has asked not to be disturbed for a while as he is still in a lot of pain, and is on heavy pain killers right now. He is doing quite well right now, and is extremely touched at the outpouring of prayers, best wishes, and sharing of hope the list poured out to him. Right now he has requested that he be given a few days of time for quiet recovery, and to let things calm down a bit. He needs his sleep and rest right now, so please do not try to call him for a few days. Let me say again... Steve Uhrig is doing well, and will be kicking ass again in a few days. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6238 From: Steve Uhrig Date: Mon Sep 16, 2002 4:46pm Subject: Surveillance van items for sale Hi all, If anyone is thinking of building a surveillance van, I have available some necessary components you will need to put together a reliable and effective van. I had purchased them for my own use, but never actually built the van. One is an original Larry Felix periscope complete with all accessories, ready to install. The frame was installed in a van for some years, but the periscope itself was never mounted except initially to make sure it fit. It has been in storage ever since. To install the periscope, you cut a 17 inch square hole in the roof of the van and mount the frame with some nuts, bolts, lockwashers and plenty of silicone caulk. Note most van roof vents are 17 inches square, so this may directly replace an existing roof vent. If you take your time and work carefully, it will never leak. This is not true of other periscopes. Then the periscope itself mounts inside the van onto 4 bolts hanging down from the frame. I used wing nuts to let me install and remove it in two minutes if I needed more room in the back of the van. One man can install it or remove it in very short order. The roof vent is spring loaded, with the springs forcing it closed. You crank up the periscope several inches against the spring tension, and raise a screen with a lever to hide the optics. You don't need to raise it much. An inch or two is sufficient unless you are trying to follow someone up steps in front of a building for example. There are fold down handles on the periscope like on a submarine, and you can turn it around through 360 degrees and crank the angle on one of the mirrors up and down to follow a subject up steps or whatever. There is a removeable arm which clamps 90 degrees to the viewing port, with long slots in it to let you mount any optics or cameras there. Any camcorder, 35mm camera, night vision with or without video, etc. mounts to the arm. You can slide things back and forth to get proper alignment. As this was designed for serious surveillance use, there is plenty of room for long lenses on any kind of camera. As long as your optical item has a tripod mount, it will work on this periscope. With a long lens, you can be a considerable distance away from the subject while surveilling them. This periscope is long out of production, and is the original design from which most others were copied. This is the quality unit, original price was high, and the copies were cheaper. The copies don't work as well, have complicated gearing and belts, and require frequent readjustment. This one doesn't. The people who spent the bucks for the Felix equipment insisted on top performance, not low price. Put it in and leave it in, or put it in only when needed in case your surveillance van also doubles as a soccer van. When the periscope is removed, very little of the frame sticks down inside the van. The periscope can be moved from one vehicle to another if you sell your current one, so this periscope is a lifetime investment, not a one shot deal. The optics have been stored inside plastic with a dessicant and everything is in excellent condition. The frame, as I mentioned, was installed for a while in a van, but not used. I removed it and had a body shop install a plate over the hole. I doubt I will ever use it. If you have used a high end government surveillance van, you probably used one of these periscopes. I am almost certain I have the instructions, although you don't really need any. This is a rugged, high performance piece made by the acknowledged master of surveillance van hardware. Larry Felix is now retired, but his work lives on. Many hundreds of these were sold in their day, most still being in use. You practically never see these things on the used market. I'm not thrilled about getting rid of it, but I'm not doing street investigations any more. I don't recall the new price. My price is $2000 plus shipping from Maryland. It is fairly large, but not particularly heavy. I would prefer pickup in the Baltimore area, but can ship worldwide if necessary. There will be a charge for packing on top of the freight costs due to the extensive work it will take my wife to pack this thing properly for shipment. If you've wanted a REAL periscope, here it is. Periscopes in general are difficult to find, and when you do find them, they generally are the tacky homemade ones, or knockoffs of this one, and don't work nearly as well. Felix was known for his optics, clever design, and smooth operation. From the outside with the periscope retracted, you can't tell it from a standard roof vent. With the periscope up a few inches, someone would have to know exactly what they are looking at to make it, and that's not likely to happen. The screen breaks up the outline of the mirrors. Since the thing is mounted on the top of your van, you'd have to be above looking down even to see it, and then no one would recognize it for what it is. Anyone interested, mail me off list and we can make arrangements. I can take credit cards. It will probably take a week to ship if my wife has to build a crate, or you can pick it up. I also have a super rugged dual battery isolator, to let the alternator in your van charge both the original battery as well as a secondary battery to operate all your electronics. This is fully automatic, no manual switches. The isolator was designed for an ambulance where lives depend on it. It uses Schottky diodes for ultra low forward voltage drop. Generally most vans are wired so the orignal battery does nothing but start the engine, and all other loads (commo, surveillance, lighting, air conditioner, etc.) are drawn from the secondary battery. That way, you always have a fresh battery to get you home. This isolator is not a toy, and is about the size of a shoebox. Cheap ones are much smaller. This has plenty of heatsink and can handle to 200 amps which is a lot bigger alternator than you will have in any consumer van. Manufacturer is Vanner, considered the top brand in isolators. Hookup is simple. There are three terminals on the isolator, in a row. You disconnect the output of your alternator and connect it to the middle terminal. A line from each outside terminal goes to the positive side of each of the two batteries. That's all there is to it. Price is $250. You'll pay that for a toy. This is a real one. Holler if you are interested in either of the above, or if you have any questions. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6239 From: Raymond Date: Tue Sep 17, 2002 0:27am Subject: Marine Corps Interview Marine Corps General Reinwald was interviewed on the radio the other day and you have to read his reply to the lady who interviewed him concerning guns and children. It is a portion of a National Public Radio (NPR) interview between a female broadcaster and US Marine Corps General Reinwald who was about to sponsor a Boy Scout Troop visiting his military installation. FEMALE INTERVIEWER: So, General Reinwald, what things are you going to teach these young boys when they visit your base? GENERAL REINWALD: We're going to teach them climbing, canoeing, archery and shooting. FEMALE INTERVIEWER: Shooting! That's a bit irresponsible, isn't it? GENERAL REINWALD: I don't see why, they'll be properly supervised on the rifle range. FEMALE INTERVIEWER: Don't you admit that this is a terribly dangerous activity to be teaching children? GENERAL REINWALD: I don't see how. We will be teaching them proper rifle discipline before they even touch a firearm. FEMALE INTERVIEWER: But you're equipping them to become violent killers. GENERAL REINWALD: Well, you're equipped to be a prostitute, but you're not one, are you? The radio went silent and the interview ended. --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 6240 From: Fernando Martins Date: Tue Sep 17, 2002 3:27pm Subject: SP 800-46 Security for Telecommuting and Broadband Communications http://csrc.nist.gov/publications/nistpubs/800-46/sp800-46.zip 6241 From: Date: Tue Sep 17, 2002 5:05pm Subject: File - mission.txt TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6242 From: Date: Tue Sep 17, 2002 5:05pm Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County, San Francisco, Silicon Valley, San Jose, San Diego, and Las Vegas. (Also, anywhere in a thousand mile radius from Los Angeles.) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ From: Date: Thu Sep 13, 2001 7:33pm Subject: Senate OKs Expanding Wiretap Law Senate OKs Expanding Wiretap Law By JESSE J. HOLLAND .c The Associated Press WASHINGTON (AP) - People suspected of hijacking, bombing or other terrorist acts could for the first time find their telephones and computers wiretapped by the government under a measure passed by the Senate. Currently, suspicion of terrorism isn't a valid legal reason to get a wiretap, lawmakers said after passing the bill late Thursday night. ``When you go to a judge to ask for a wiretap to commence an investigation, today you have to find some other crime, like credit card fraud, or some other crime these people might be engaged in to do what you really want to do: which is to investigate their terrorism,'' said Sen. Jon Kyl, R-Ariz. ``Now what you can assert in a request for a warrant is that we think this person is guilty of U.S. Code title such-and-such, a terrorist crime.'' The measure comes in response to the destruction of the World Trade Center by terrorists, who slammed airliners into both towers on Tuesday. A third plane crashed into the Pentagon and a fourth slammed into a field in Pennsylvania. Lawmakers have complained that America's intelligence community did not have any warning that the attack was going to occur. The measure was approved as part of the Commerce-Justice-State appropriations bill, which provides about $42 billion for the Commerce, Justice and State departments. As part of that bill, the measure now goes to a House-Senate conference committee, where the final version will be hammered out. The measure was desperately needed, said Sen. Jeff Sessions, R-Ala., a former federal prosecutor. ``You can get wiretaps for gambling, for drug deals, for mail fraud, but you can't for terrorism,'' Sessions said. Not everyone thought the bill was a good idea. Senate Judiciary Chairman Patrick Leahy, D-Vt., argued that the expansion was too broad and could easily be abused. ``If we give up all our freedoms, if we turn our back on 200 years or more of Constitutional history, of the things that make us strong as a nation, some would argue that the terrorists win,'' he said. Leahy said lawmakers are rushing to do something to respond to the attacks in Washington and New York. ``We have to be careful, that in our emotion in the midst of this murderous, horrible act, that we don't start taking away the very freedoms that make us different from terrorists,'' he said. The measure also: Orders the CIA to rescind its ban on recruiting terrorist informants who have access to intelligence on terrorist plans and capabilities. Allows U.S. attorneys to approve wiretaps. Expands wiretap authority to cover computer communications. Allows officials to trace computer communications over state lines with a single warrant in their efforts to track down computer hackers. The bill number is HR 2500. On the Net: for bill text: http://thomas.loc.gov Senate: http://www.senate.gov AP-NY-09-13-01 2330EDT 3723 From: James M. Atkinson Date: Thu Sep 13, 2001 10:21pm Subject: America: The Good Neighbor. This, from a Canadian newspaper, is worth sharing. America: The Good Neighbor. Widespread but only partial news coverage was given recently to a remarkable editorial broadcast from Toronto by Gordon Sinclair, a Canadian television commentator. What follows is the full text of his trenchant remarks as printed in the Congressional Record: "This Canadian thinks it is time to speak up for the Americans as the most generous and possibly the least appreciated people on all the earth. Germany, Japan and, to a lesser extent, Britain and Italy were lifted out of the debris of war by the Americans who poured in billions of dollars and forgave other billions in debts. None of these countries is today paying even the interest on its remaining debts to the United States. When France was in danger of collapsing in 1956, it was the Americans who propped it up, and their reward was to be insulted and swindled on the streets of Paris. I was there. I saw it. When earthquakes hit distant cities, it is the United States that hurries in to help. This spring, 59 American communities were flattened by tornadoes. Nobody helped. The Marshall Plan and the Truman Policy pumped billions of dollars! into discouraged countries. Now newspapers in those countries are writing about the decadent, warmongering Americans. I'd like to see just one of those countries that is gloating over the erosion of the United States dollar build its own airplane. Does any other country in the world have a plane to equal the Boeing Jumbo Jet, the Lockheed Tri-Star, or the Douglas DC10? If so, why don't they fly them? Why do all the International lines except Russia fly American Planes? Why does no other land on earth even consider putting a man or woman on the moon? You talk about Japanese technocracy, and you get radios. You talk about German technocracy, and you get automobiles. You talk about American technology, and you find men on the moon! not once, but several times - and safely home again. You talk about scandals, and the Americans put theirs right in the store window for everybody to look at. Even their draft-dodgers are not pursued and hounded. They are here on our streets, and most of them, unless they are breaking Canadian laws, are getting American dollars from ma and pa at home to spend here. When the railways of France, Germany and India were breaking down through age, it was the Americans who rebuilt them. When the Pennsylvania Railroad and the New York Central went broke, nobody loaned them an old caboose. Both are still broke. I can name you 5000 times when the Americans raced to the help of other people in trouble. Can you name me even one time when someone else raced to the Americans in trouble? I don't think there was outside help even during the San Francisco earthquake. Our neighbors have faced it alone, and I'm one Canadian who is damned tired of hearing them get kicked around. They will come out of this thing with their flag high. And when they do, they are entitled to thumb their nose at the lands that are gloating over their present troubles. I hope Canada is not one of those." Stand proud, America! -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ------------------------------------------------------------------------------------------ 3724 From: Miguel Puchol Date: Fri Sep 14, 2001 5:24am Subject: RE: Terrorist training Andy, > There is evidence emerging that the hijackers had some flight > training, but > is that necessary? Once a modern aircraft is in the air, cruising, all > that's required are small adjustments. Playing Microsoft's Flight > Simulator, > where you can choose any plane and condition, can very > effectively learn to > control an aircraft. Not only can you choose almost any Boeing craft but > FLYING BETWEEN THE WTC TWIN TOWERS is a standard exercise on the New York > version ! As an aeronautical engineer & pilot (spare time-type) I can shed some light in this. When I did my degree, our final year project involved desingning from scratch a 70-passenger medium range aircraft. During the desing process, we used MS Flight Simulator to try different desing parameters, and we custom plugins to take simulated telemetry from the aircraft while doing test. Using these tools, we managed to get a really good flight model, and telemetry showed that it closely resembled a real aircraft. With all this in mind, I think that it's not difficult to image that, someone taking lessons towards a private pilot's license, which gives you all the basic knowledge needed to fly -almost- any plane, and with the help of MS Flight Simulator (which in it's current version provides VERY detailed scenery) could have aquired the knowledge to fly this suicide & criminal missions. They could have simulated the exact procedures in Flight Simulator many, many times, even using different scenarios, start times, coordination procedures, etc. I seem to recall that the FAA now even allows the use of MS Flight Simulator, in specific cases and under supervision, to log simulator flight time, something that was very expensive with full-scale sims. In any case, the precision with which they hit the towers implies training & practice. The second aircraft, which is the one that I've seen most footage of, hits the tower at an angle where most damage would be inflicted. If it had hit the tower head-on, then maybe only 3-4 floors could have been affected. The aircraft would have disintegrated, chopped up by the steel grid structure of the building (remember, most of the aircraft is aluminium, apart from the engines & landing gear) - and the pieces maybe would have passed through the floors and come out the opposite side. The way it crashed made sure that the aircraft & most of the fuel would remain inside the building. Also, it's far easier to set a plane in straight & level flight and then make small corrections towards the target, than to try to hit it by placing it inside an arc the plane will describe. That's why I think the terrorists rehearsed the flight, using known landmarks to calibrate their curved flight path. > The second tower attack, filmed from many angles, was a smooth left hand > turn with about 40 degrees yaw. This approach took some training, but not > necessarily by a qualified pilot. I agree. Most kids with hundreds of hours of Flight Sim work could have acomplished something like this. There are now other, more precise simulators, like Precision Simulator. I have one comment, and maybe those of you in the U.S. can comment - we see repetitive footage of an aircraft, filmed from the ground, that we are told is the one that crashed into the Pentagon - the aircraft that appears in the images is a 747, possible one of the shorter versions. But, the aircraft that crashed here was a Boeing 757... > NO commercial pilot would have flown deliberately into the WTC or > Pentagon. > Even at the point of death a professional pilot would have veered off and > probably gone into the river or a non-populated area. > I think the hijackers said, 'Head for JFK', and once over the > city they took > over the controls for the last few deadly minutes. Also agree, there have been countless accidents where the pilot, knowing the end was near, steered the plane away from populated areas. > It is increadible that a handfull of fanatics armed only whith > edged weapons > could do so much damage to the US. They probably tested internal flight > security many times, going through airport security with razor > blade/handle > configurations in 'carry on' luggage to find an acceptable > looking 'shaving > kit' X-Ray profile which did not alert security. Another possibility that's being considered is that the weapons were placed by someone else in the planes before they departed. > My flags have been flying at half mast since that terrible Tuesday. Same here. This is one of the most terrible disasters I remember. I still wake up in the morning thinking it was all a dream. All the best, Mike 3725 From: Aimee Farr Date: Thu Sep 13, 2001 8:25pm Subject: RE: Re: Clancy bitchslapping CNN blonde Uhrig replied: > You saw the real Tom Clancy on CNN. Note he was the *first* to > comment on the need for more Humint, and immediately after that, > everyone started parroting his words. I wondered about this... thanks for the insight. > Yes, he has a temper, but he also can exercise discretion, and > on international television would not be the place to slap the > interviewer. Figure of speech. In response to her question....he immediately blamed the media for their shortcomings, [realize that sort of tops the DONT'S here...] and even appeared to "chuckle" at two of the CNN anchorwoman's questions. In *media parlance*, he did not "take control of the interview," he beat her with a stick, Steve. I can't recall another CNN interview like that, ever. (If you missed the interview, trust me, it was "a moment," especially in the context of soundbytes at the time.) > However, you should have heard him tear up a few interviewers on > the phone Wednesday afternoon. I bet. (That's a serious detail.) ~Aimee 3726 From: DrPepper Date: Fri Sep 14, 2001 9:03am Subject: Re: Re: Clancy bitchslapping CNN blonde I have always been impressed with Clancy, and this interview did not surprise me at all. BTW, The below statement is an excellent reason for Ham Radio. Sometimes the ONLY way to communicate is with Ham Radio. -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm Steve Uhrig wrote: > Once upon a midnight dreary, Aimee Farr pondered, weak and weary: > > As a point of interest, there was zero telephone service down > there Tuesday evening and until late morning Wednesday, and he > is in the middle of nowhere. No dial tone, no cell service. All > we had was our portable radios and the repeater for commo on the > facility. > > Steve > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3727 From: Date: Fri Sep 14, 2001 3:16am Subject: Senate OKs Expanding Wiretap Law Senate OKs Expanding Wiretap Law By JESSE J. HOLLAND WASHINGTON (AP) - People suspected of hijacking, bombing or other terrorist acts could for the first time find their telephones and computers wiretapped by the government under a measure passed by the Senate. Currently, suspicion of terrorism isn't a valid legal reason to get a wiretap, lawmakers said after passing the bill late Thursday night. ``When you go to a judge to ask for a wiretap to commence an investigation, today you have to find some other crime, like credit card fraud, or some other crime these people might be engaged in to do what you really want to do: which is to investigate their terrorism,'' said Sen. Jon Kyl, R-Ariz. ``Now what you can assert in a request for a warrant is that we think this person is guilty of U.S. Code title such-and-such, a terrorist crime.'' The measure comes in response to the destruction of the World Trade Center by terrorists, who slammed airliners into both towers on Tuesday. A third plane crashed into the Pentagon and a fourth slammed into a field in Pennsylvania. Lawmakers have complained that America's intelligence community did not have any warning that the attack was going to occur. The measure was approved as part of the Commerce-Justice-State appropriations bill, which provides about $42 billion for the Commerce, Justice and State departments. As part of that bill, the measure now goes to a House-Senate conference committee, where the final version will be hammered out. The measure was desperately needed, said Sen. Jeff Sessions, R-Ala., a former federal prosecutor. ``You can get wiretaps for gambling, for drug deals, for mail fraud, but you can't for terrorism,'' Sessions said. Not everyone thought the bill was a good idea. Senate Judiciary Chairman Patrick Leahy, D-Vt., argued that the expansion was too broad and could easily be abused. ``If we give up all our freedoms, if we turn our back on 200 years or more of Constitutional history, of the things that make us strong as a nation, some would argue that the terrorists win,'' he said. Leahy said lawmakers are rushing to do something to respond to the attacks in Washington and New York. ``We have to be careful, that in our emotion in the midst of this murderous, horrible act, that we don't start taking away the very freedoms that make us different from terrorists,'' he said. The measure also: Orders the CIA to rescind its ban on recruiting terrorist informants who have access to intelligence on terrorist plans and capabilities. Allows U.S. attorneys to approve wiretaps. Expands wiretap authority to cover computer communications. Allows officials to trace computer communications over state lines with a single warrant in their efforts to track down computer hackers. The bill number is HR 2500. On the Net: for bill text: http://thomas.loc.gov Senate: http://www.senate.gov AP-NY-09-13-01 2330EDT **************************************************************************** John R. Angier II M-Group P.O. Box 721388 Norman, OK 73070-8070 USA w 405.321.1015 f 405.321.1259 "The human spirit is stronger than anything that can happen to it." - George C. Scott 3728 From: Aimee Farr Date: Fri Sep 14, 2001 10:41am Subject: "!" S.AMDT.1562 Amends: H.R.2500 Sponsor: Sen Hatch, Orrin G.(submitted 9/13/2001) (proposed 9/13/2001) AMENDMENT PURPOSE: To enhance the capability of the United States to deter, prevent, and thwart domestic and international act of terrorism against United States nationals and interests. TEXT OF AMENDMENT AS SUBMITTED: CR S9401-9402 STATUS: 9/13/2001: Amendment SA 1562 proposed by Senator Hatch. 9/13/2001: Amendment SA 1562 agreed to in Senate by Voice Vote. COSPONSORS(7): Sen Feinstein, Dianne - 9/13/2001 Sen Kyl, Jon - 9/13/2001 Sen DeWine, Michael - 9/13/2001 Sen Sessions, Jeff - 9/13/2001 Sen Thompson, Fred - 9/13/2001 Sen Thurmond, Strom - 9/13/2001 Sen McCain, John - 9/13/2001 SEC. 832. MODIFICATION OF AUTHORITIES RELATING TO USE OF PEN REGISTERS AND TRAP AND TRACE DEVICES. (a) GENERAL LIMITATION ON USE BY GOVERNMENTAL AGENCIES.--Section 3121(c) of title 18, United States Code, is amended-- (1) by inserting ``or trap and trace device'' after ``pen register''; (2) by inserting ``, routing, addressing,'' after ``dialing''; and (3) by striking ``call processing'' and inserting ``the processing and transmitting of wire and electronic communications''. (b) ISSUANCE OF ORDERS.-- (1) IN GENERAL.--Subsection (a) of section 3123 of that title is amended to read as follows: ``(a) IN GENERAL.--(1) Upon an application made under section 3122(a)(1) of this title, the court shall enter an ex parte order authorizing the installation and use of a pen register or trap and trace device if the court finds that the attorney for the Government has certified to the court that the information likely to be obtained by such installation and use is relevant to an ongoing criminal investigation. The order shall, upon service of the order, apply to any entity providing wire or electronic communication service in the United States whose assistance is required to effectuate the order. ``(2) Upon an application made under section 3122(a)(2) of this title, the court shall enter an ex parte order authorizing the installation and use of a pen register or trap and trace device within the jurisdiction of the court if the court finds that the State investigative or law enforcement officer has certified to the court that the information likely to be obtained by such installation and use is relevant to an ongoing criminal investigation.''. (2) CONTENTS OF ORDER.--Subsection (b)(1) of that section is amended-- (A) in subparagraph (A)-- (i) by inserting ``or other facility'' after ``telephone line''; and (ii) by inserting before the semicolon at the end ``or applied''; and (B) by striking subparagraph (C) and inserting the following new subparagraph (C): ``(C) a description of the communications to which the order applies, including the number or other identifier and, if known, the location of the telephone line or other facility to which the pen register or trap and trace device is to be attached or applied, and, in the case of an order authorizing installation and use of a trap and trace device under subsection (a)(2), the geographic limits of the order; and''. (3) NONDISCLOSURE REQUIREMENTS.--Subsection (d)(2) of that section is amended-- (A) by inserting ``or other facility'' after ``the line''; and (B) by striking ``, or who has been ordered by the court'' and inserting ``or applied, or who is obligated by the order''. (c) EMERGENCY INSTALLATION.-- (1) AUTHORITY FOR UNITED STATES ATTORNEYS.--Section 3125(a) of that title is amended in the matter preceding paragraph (1)-- (A) by striking ``or any Deputy Assistant Attorney General,'' and inserting ``any Deputy Assistant Attorney General, or any United States Attorney,''. (2) EXPANSION OF EMERGENCY CIRCUMSTANCES.--Section 3125(a)(1) of that title is amended-- (A) in subparagraph (A), by striking ``or'' at the end; (B) in subparagraph (B), by striking the comma at the end and inserting a semicolon; and (C) by inserting after subparagraph (B) the following new subparagraphs: ``(C) immediate threat to the national security interests of the United States; ``(D) immediate threat to public health or safety; or ``(E) an attack on the integrity or availability of a protected computer which attack would be an offense punishable under section 1030(c)(2)(C) of this title,''. (d) DEFINITIONS.-- (1) COURT OF COMPETENT JURISDICTION.--Paragraph (2) of section 3127 of that title is amended by striking subparagraph (A) and inserting the following new subparagraph (A): ``(A) any district court of the United States (including a magistrate judge of such a court) or any United States Court of Appeals having jurisdiction over the offense being investigated; or''. (2) PEN REGISTER.--Paragraph (3) of that section is amended-- (A) by striking ``electronic or other impulses'' and all that follows through ``is attached'' and inserting ``dialing, routing, addressing, or signalling information transmitted by an instrument or facility from which a wire or electronic communication is transmitted''; and (B) by inserting ``or process'' after ``device'' each place it appears. (3) TRAP AND TRACE DEVICE.--Paragraph (4) of that section is amended-- (A) by inserting ``or process'' after ``a device''; and (B) by striking ``of an instrument'' and all that follows through the end and inserting ``or other dialing, routing, addressing, and signalling information relevant to identifying the source of a wire or electronic communication;''. SEC. 833. AUTHORITY TO INTERCEPT WIRE, ORAL, AND ELECTRONIC COMMUNICATIONS RELATING TO TERRORISM OFFENSES. Section 2516(1) of title 18, United States Code, is amended-- (1) by redesignating paragraph (p), as so redesignated by section 434(2) of the Antiterrorism and Effective Death Penalty Act of 1996 (Public Law 104-132; 110 Stat. 1274), as paragraph (r); and (2) by inserting after paragraph (p) as so redesignated by section 201(3) of the Illegal Immigration Reform and Immigrant Responsibility Act of 1996 (division C of Public Law 104-208; 110 Stat. 3009-565), the following new paragraph: ``(q) any criminal violation of sections 2332, 2332a, 2332b, 2332d, 2339A, or 2339B of this title (relating to terrorism); or''. SEC. 834. AUTHORITY TO INTERCEPT WIRE, ORAL, AND ELECTRONIC COMMUNICATIONS RELATING TO COMPUTER FRAUD AND ABUSE. Section 2516(1)(c) of title 18, United States Code, is amended by striking `and section 1341 (relating to mail fraud),' and inserting `section 1341 (relating to mail fraud), a felony violation of section 1030 (relating to computer fraud and abuse),'. ----- SEC. 816. DISCLOSURE BY LAW ENFORCEMENT AGENCIES OF CERTAIN INTELLIGENCE OBTAINED BY INTERCEPTION OF COMMUNICATIONS. (a) REPORT ON AUTHORITIES RELATING TO SHARING OF CRIMINAL WIRETAP INFORMATION.--Not later than 60 days after the date of the enactment of this Act, the President shall submit to Congress a report on the legal authorities that govern the sharing of criminal wiretap information under applicable Federal laws, including section 104 of the National Security Act of 1947 (50 U.S.C. 403-4). (b) ELEMENTS.--The report under subsection (a) shall include-- (1) a description of the type of information that can be shared by the Department of Justice, or other law enforcement agencies, with other elements of the intelligence community; and (2) any recommendations that the President considers appropriate, including a proposal for legislation to implement such recommendations, to improve the capability of the Department of Justice, or other law enforcement agencies, to share foreign intelligence information or counterintelligence information with other elements of the intelligence community on matters such as counterterrorism. (c) DEFINITIONS.--In this section: (1) FOREIGN INTELLIGENCE, COUNTERINTELLIGENCE.--The terms ``foreign intelligence'' and ``counterintelligence'' have the meanings given those terms in section 3 of the National Security Act of 1947 (50 U.S.C. 401a). (2) ELEMENT OF THE INTELLIGENCE COMMUNITY.--The term ``element of the intelligence community'' means any element of the intelligence community specified or designated under section 3(4) of the National Security Act of 1947. -- ~Aimee Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR 5400 Bosque, Ste. 675 Waco, Texas 76710 3729 From: DrPepper Date: Fri Sep 14, 2001 0:40pm Subject: Re: Re: Clancy bitchslapping CNN blonde DrPepper wrote: > I have always been impressed with Clancy, and this interview did not surprise me at all. > > BTW, The below statement is an excellent reason for Ham Radio. > Sometimes the ONLY way to communicate is with Ham Radio. > -- > Dr Pepper aka WB6GKI > in the High Desert of California. > Check out my LIVE Hamshack Cam at: > http://www1.iwvisp.com/DrPepper/ham/ham.htm > > Steve Uhrig wrote: > Most hams I have worked with have no business near a microphone, > however. They think because they have a license and an Alinco > portable, they're ready. Very VERY few have been of much use in > emergency situations due to no training and not the slightest > concept of the real world outside their living room. More of > these guys could serve if the transmit switch was disabled in > their rigs. DXers might make the best emergency service hams. > They know how to listen. > > Steve, I agree with you absolutely. I pointed out that very thing one time to a local "Races" coordinator during a SET, and he just couldn't see what I was talking about. I told him that the people should GET OFF THE PTT SWITCH, and LISTEN!!. His comment was, , "well, practice makes perfect", (this from a professional junior high school teacher, and an 'old' ham radio operator), and I had to point out that only PERFECT practice makes perfect. He is still pissed off at me. However, there are lots of people out there who would be able to handle simple message traffic without a whole lot of training, , , , , , , and there probably was, , , , we just haven't heard about it yet. And yes, I was first licensed in 1962, and have been associated with RACES and AREC for many years, and I am the Emergency Services operator for my community with the California Emergency Services net on 7.230, also, so I think I may know of what I speak. -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 3730 From: DrPepper Date: Fri Sep 14, 2001 1:11pm Subject: UAE Passports There has been a lot of inference in the media about the terrorist that have UAE passports, , , , In case nobody here knows, , , The UAE has been notorious for years as the place where you can buy a passport. In fact, I was offered one back in 1969, for $100 bucks. Having traveled extensively in that part of the world, I am always amazed at the two sides of morality on the same hand . -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 3731 From: James M. Atkinson Date: Fri Sep 14, 2001 3:08pm Subject: Never Forget, Never Surrender Enough said, http://www.tscm.com/useagle.jpg -jma -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" ------------------------------------------------------------------------------------------ 3732 From: Aimee Farr Date: Fri Sep 14, 2001 2:58pm Subject: RE: Senate OKs Expanding Wiretap Law I find this statement to be somewhat misleading in light of the comprehensiveness of 2516. ~Aimee > -----Original Message----- > From: mustardcon@a... [mailto:mustardcon@a...] > Sent: Friday, September 14, 2001 7:17 AM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Senate OKs Expanding Wiretap Law > > > The measure was desperately needed, said Sen. Jeff Sessions, > R-Ala., a former > federal prosecutor. ``You can get wiretaps for gambling, for drug > deals, for > mail fraud, but you can't for terrorism,'' Sessions said. > > 3733 From: Bob Mazzullo Date: Fri Sep 14, 2001 0:17pm Subject: RE: Senate OKs Expanding Wiretap Law If this is part of what it means to be safe on our own streets, please let it come to pass.... 5000 deaths or 1 death on an ideology or a "principle" such as this is too much to bear. Maybe it's time to re-assess what we have to give up, and how we will have to change as a nation and as a people, to fight this enemy...until they are obliterated. Bob Mazzullo. Staten Island, New York > -----Original Message----- > From: mustardcon@a... [mailto:mustardcon@a...] > Sent: Friday, September 14, 2001 8:17 AM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Senate OKs Expanding Wiretap Law > > > Senate OKs Expanding Wiretap Law > > By JESSE J. HOLLAND > > > WASHINGTON (AP) - People suspected of hijacking, bombing or other > terrorist > acts could for the first time find their telephones and computers > wiretapped > by the government under a measure passed by the Senate. > > Currently, suspicion of terrorism isn't a valid legal reason to get a > wiretap, lawmakers said after passing the bill late Thursday night. > > ``When you go to a judge to ask for a wiretap to commence an > investigation, > today you have to find some other crime, like credit card fraud, or some > other crime these people might be engaged in to do what you > really want to > do: which is to investigate their terrorism,'' said Sen. Jon Kyl, R-Ariz. > > ``Now what you can assert in a request for a warrant is that we > think this > person is guilty of U.S. Code title such-and-such, a terrorist crime.'' > > The measure comes in response to the destruction of the World > Trade Center by > terrorists, who slammed airliners into both towers on Tuesday. A > third plane > crashed into the Pentagon and a fourth slammed into a field in > Pennsylvania. > > Lawmakers have complained that America's intelligence community > did not have > any warning that the attack was going to occur. > > The measure was approved as part of the Commerce-Justice-State > appropriations > bill, which provides about $42 billion for the Commerce, Justice > and State > departments. As part of that bill, the measure now goes to a House-Senate > conference committee, where the final version will be hammered out. > > The measure was desperately needed, said Sen. Jeff Sessions, > R-Ala., a former > federal prosecutor. ``You can get wiretaps for gambling, for drug > deals, for > mail fraud, but you can't for terrorism,'' Sessions said. > > Not everyone thought the bill was a good idea. Senate Judiciary Chairman > Patrick Leahy, D-Vt., argued that the expansion was too broad and could > easily be abused. > > ``If we give up all our freedoms, if we turn our back on 200 > years or more of > Constitutional history, of the things that make us strong as a > nation, some > would argue that the terrorists win,'' he said. > > Leahy said lawmakers are rushing to do something to respond to > the attacks in > Washington and New York. ``We have to be careful, that in our > emotion in the > midst of this murderous, horrible act, that we don't start taking > away the > very freedoms that make us different from terrorists,'' he said. > > The measure also: > > Orders the CIA to rescind its ban on recruiting terrorist > informants who have > access to intelligence on terrorist plans and capabilities. > > Allows U.S. attorneys to approve wiretaps. > > Expands wiretap authority to cover computer communications. > > Allows officials to trace computer communications over state lines with a > single warrant in their efforts to track down computer hackers. > > The bill number is HR 2500. > > On the Net: > > for bill text: http://thomas.loc.gov > > Senate: http://www.senate.gov > > AP-NY-09-13-01 2330EDT > ****************************************************************** > ********** > > John R. Angier II > M-Group > P.O. Box 721388 > Norman, OK 73070-8070 USA > w 405.321.1015 > f 405.321.1259 > > "The human spirit is stronger than anything that can > happen to it." - George C. Scott > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 3734 From: Steve Weinert Date: Sat Sep 15, 2001 2:08am Subject: Barbara Lee One person (9th Cong. District - calif.) voted against the 420 other members of congress - I've taken the time to write to her. Copy attached. http://www.house.gov/lee/ is her web page. To write her you have to enter her Zip code as if it is hers. I am sure the peoples she was entrusted to represent will deal with her. She is an Evil bitch, but I've been much kinder in my letter. ---- Dear Barbara, Please notice the lack of honorific in my hand-typed salutation. Your shameful vote against the free use of whatever force needed to protect our country is indicative of your not considering yourself a representative of the people, but rather an individual acting alone without regard to the trust of public office you were supposed to put first. Hence I address you in the private. Simply put you have voted against your country, your people and against the very moral fabric of what makes us American. You must have had your reason - one cannot begin to fathom what it possibly could be. I respect your right to your opinion, but as a representative your obligation was to vote as your people wished. Obviously you find yourself unable to discharge that solemn duty. There will be a massive call for you to resign - I implore you not to, as I would rather you have to live with the shame your vote has smeared upon you each and every time you set foot into the halls of government. The scorn and shame is self inflicted Barbara. I've provided a small quote which expressly covers what you missed in your vote: "Those who profess to favor freedom, and yet depreciate agitation, are men who want crops without plowing up the ground. They want rain without thunder and lightning. They want the ocean without the awful roar of its waters. This struggle may be a moral one; or it may be a physical one; or it may be both moral and physical; but it must be a struggle! Power concedes nothing without a demand. It never did, and it never will. Find out just what people will submit to, and you have found out the exact amount of injustice and wrong which will be imposed upon them; and these will continue until they are resisted with either words or blows, or with both. The limits of tyrants are prescribed by the endurance of those whom they oppress." -- Frederick Douglass, August 4, 1857. Then perhaps I am wrong and your retirement from government simply would be the best for our country. Good luck, Steve 3735 From: Date: Fri Sep 14, 2001 2:21pm Subject: Tom Clancy & CNN Ok, guys, please, I've heard so much about it and initially discounted what I was hearing as wishful thinking - does anyone have a copy of the video clip or a link to it? Paul Gormley Attorney / Faculty North Shore Community College Danvers, MA 3736 From: Bob Mazzullo Date: Fri Sep 14, 2001 5:32pm Subject: FW: Senate OKs Expanding Wiretap Law -----Original Message----- From: Bob Mazzullo [mailto:rmazzullo@s...] Sent: Friday, September 14, 2001 1:17 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Senate OKs Expanding Wiretap Law If this is part of what it means to be safe on our own streets, please let it come to pass.... 5000 deaths or 1 death on an ideology or a "principle" such as this is too much to bear. Maybe it's time to re-assess what we have to give up, and how we will have to change as a nation and as a people, to fight this enemy...until they are obliterated. Bob Mazzullo. Staten Island, New York > -----Original Message----- > From: mustardcon@a... [mailto:mustardcon@a...] > Sent: Friday, September 14, 2001 8:17 AM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Senate OKs Expanding Wiretap Law > > > Senate OKs Expanding Wiretap Law > > By JESSE J. HOLLAND > > > WASHINGTON (AP) - People suspected of hijacking, bombing or other > terrorist > acts could for the first time find their telephones and computers > wiretapped > by the government under a measure passed by the Senate. > > Currently, suspicion of terrorism isn't a valid legal reason to get a > wiretap, lawmakers said after passing the bill late Thursday night. > > ``When you go to a judge to ask for a wiretap to commence an > investigation, > today you have to find some other crime, like credit card fraud, or some > other crime these people might be engaged in to do what you > really want to > do: which is to investigate their terrorism,'' said Sen. Jon Kyl, R-Ariz. > > ``Now what you can assert in a request for a warrant is that we > think this > person is guilty of U.S. Code title such-and-such, a terrorist crime.'' > > The measure comes in response to the destruction of the World > Trade Center by > terrorists, who slammed airliners into both towers on Tuesday. A > third plane > crashed into the Pentagon and a fourth slammed into a field in > Pennsylvania. > > Lawmakers have complained that America's intelligence community > did not have > any warning that the attack was going to occur. > > The measure was approved as part of the Commerce-Justice-State > appropriations > bill, which provides about $42 billion for the Commerce, Justice > and State > departments. As part of that bill, the measure now goes to a House-Senate > conference committee, where the final version will be hammered out. > > The measure was desperately needed, said Sen. Jeff Sessions, > R-Ala., a former > federal prosecutor. ``You can get wiretaps for gambling, for drug > deals, for > mail fraud, but you can't for terrorism,'' Sessions said. > > Not everyone thought the bill was a good idea. Senate Judiciary Chairman > Patrick Leahy, D-Vt., argued that the expansion was too broad and could > easily be abused. > > ``If we give up all our freedoms, if we turn our back on 200 > years or more of > Constitutional history, of the things that make us strong as a > nation, some > would argue that the terrorists win,'' he said. > > Leahy said lawmakers are rushing to do something to respond to > the attacks in > Washington and New York. ``We have to be careful, that in our > emotion in the > midst of this murderous, horrible act, that we don't start taking > away the > very freedoms that make us different from terrorists,'' he said. > > The measure also: > > Orders the CIA to rescind its ban on recruiting terrorist > informants who have > access to intelligence on terrorist plans and capabilities. > > Allows U.S. attorneys to approve wiretaps. > > Expands wiretap authority to cover computer communications. > > Allows officials to trace computer communications over state lines with a > single warrant in their efforts to track down computer hackers. > > The bill number is HR 2500. > > On the Net: > > for bill text: http://thomas.loc.gov > > Senate: http://www.senate.gov > > AP-NY-09-13-01 2330EDT > ****************************************************************** > ********** > > John R. Angier II > M-Group > P.O. Box 721388 > Norman, OK 73070-8070 USA > w 405.321.1015 > f 405.321.1259 > > "The human spirit is stronger than anything that can > happen to it." - George C. Scott > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 3737 From: craig Date: Fri Sep 14, 2001 8:50pm Subject: who or what is bandsaw been listening to a lot of Milcomms via this site http://www.grove-ent.com/attack/attack.html the name Bandsaw keeps cropping up, anyone have anyidea what it is? thanks 3738 From: DrPepper Date: Sat Sep 15, 2001 2:55pm Subject: Re: Senate OKs Expanding Wiretap Law yes, but, , , , , When you give up a littler freedom for a little security, you have neither one. -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ================================== Bob Mazzullo wrote: > If this is part of what it means to be safe on our own streets, please let > it come to pass.... > 5000 deaths or 1 death on an ideology or a "principle" such as this is too > much to bear. > Maybe it's time to re-assess what we have to give up, and how we will have > to change > as a nation and as a people, to fight this enemy...until they are > obliterated. > > Bob Mazzullo. > Staten Island, New York > > > -----Original Message----- > > From: mustardcon@a... [mailto:mustardcon@a...] > > Sent: Friday, September 14, 2001 8:17 AM > > To: TSCM-L@yahoogroups.com > > Subject: [TSCM-L] Senate OKs Expanding Wiretap Law > > > > > > Senate OKs Expanding Wiretap Law > > > > By JESSE J. HOLLAND > > > > > > WASHINGTON (AP) - People suspected of hijacking, bombing or other > > terrorist > > acts could for the first time find their telephones and computers > > wiretapped > > by the government under a measure passed by the Senate. > > > > Currently, suspicion of terrorism isn't a valid legal reason to get a > > wiretap, lawmakers said after passing the bill late Thursday night. > > > > ``When you go to a judge to ask for a wiretap to commence an > > investigation, > > today you have to find some other crime, like credit card fraud, or some > > other crime these people might be engaged in to do what you > > really want to > > do: which is to investigate their terrorism,'' said Sen. Jon Kyl, R-Ariz. > > > > ``Now what you can assert in a request for a warrant is that we > > think this > > person is guilty of U.S. Code title such-and-such, a terrorist crime.'' > > > > The measure comes in response to the destruction of the World > > Trade Center by > > terrorists, who slammed airliners into both towers on Tuesday. A > > third plane > > crashed into the Pentagon and a fourth slammed into a field in > > Pennsylvania. > > > > Lawmakers have complained that America's intelligence community > > did not have > > any warning that the attack was going to occur. > > > > The measure was approved as part of the Commerce-Justice-State > > appropriations > > bill, which provides about $42 billion for the Commerce, Justice > > and State > > departments. As part of that bill, the measure now goes to a House-Senate > > conference committee, where the final version will be hammered out. > > > > The measure was desperately needed, said Sen. Jeff Sessions, > > R-Ala., a former > > federal prosecutor. ``You can get wiretaps for gambling, for drug > > deals, for > > mail fraud, but you can't for terrorism,'' Sessions said. > > > > Not everyone thought the bill was a good idea. Senate Judiciary Chairman > > Patrick Leahy, D-Vt., argued that the expansion was too broad and could > > easily be abused. > > > > ``If we give up all our freedoms, if we turn our back on 200 > > years or more of > > Constitutional history, of the things that make us strong as a > > nation, some > > would argue that the terrorists win,'' he said. > > > > Leahy said lawmakers are rushing to do something to respond to > > the attacks in > > Washington and New York. ``We have to be careful, that in our > > emotion in the > > midst of this murderous, horrible act, that we don't start taking > > away the > > very freedoms that make us different from terrorists,'' he said. > > > > The measure also: > > > > Orders the CIA to rescind its ban on recruiting terrorist > > informants who have > > access to intelligence on terrorist plans and capabilities. > > > > Allows U.S. attorneys to approve wiretaps. > > > > Expands wiretap authority to cover computer communications. > > > > Allows officials to trace computer communications over state lines with a > > single warrant in their efforts to track down computer hackers. > > > > The bill number is HR 2500. > > > > On the Net: > > > > for bill text: http://thomas.loc.gov > > > > Senate: http://www.senate.gov > > > > AP-NY-09-13-01 2330EDT > > ****************************************************************** > > ********** > > > > John R. Angier II > > M-Group > > P.O. Box 721388 > > Norman, OK 73070-8070 USA > > w 405.321.1015 > > f 405.321.1259 > > > > "The human spirit is stronger than anything that can > > happen to it." - George C. Scott > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3739 From: DrPepper Date: Sat Sep 15, 2001 3:14pm Subject: Re: Barbara Lee Yes, , , well, , , , , She is in Oakland, ca, along with Brown and the rest of the bleeding heart liberals on the Left Coast. These people have taken over the conservative Reagan California government to the extent that we can't even take a crap here with it being taxed, I expect no less from her and her running dogs, ie; Boxer and Finestien., , , , , DrPepper ========================= Steve Weinert wrote: > One person (9th Cong. District - calif.) voted against the 420 other > members of congress - I've taken the time to write to her. > > Copy attached. > > http://www.house.gov/lee/ is her web page. > > To write her you have to enter her Zip code as if it is hers. > > I am sure the peoples she was entrusted to represent will deal with > her. > > She is an Evil bitch, but I've been much kinder in my letter. > > ---- > > Dear Barbara, > > Please notice the lack of honorific in my hand-typed salutation. > Your shameful vote against the free use of whatever force needed to > protect our country is indicative of your not considering yourself a > representative of the people, but rather an individual acting alone > without regard to the trust of public office you were supposed to put > first. > > Hence I address you in the private. > > Simply put you have voted against your country, your people and > against the very moral fabric of what makes us American. > > You must have had your reason - one cannot begin to fathom what it > possibly could be. > > I respect your right to your opinion, but as a representative your > obligation was to vote as your people wished. Obviously you find > yourself unable to discharge that solemn duty. > > There will be a massive call for you to resign - I implore you not > to, as I would rather you have to live with the shame your vote has > smeared upon you each and every time you set foot into the halls of > government. > > The scorn and shame is self inflicted Barbara. > > I've provided a small quote which expressly covers what you missed in > your vote: > > "Those who profess to favor freedom, and yet depreciate agitation, > are men who want crops without plowing up the ground. They want rain > without thunder and lightning. They want the ocean without the awful > roar of its waters. This struggle may be a moral one; or it may be a > physical one; or it may be both moral and physical; but it must be a > struggle! Power concedes nothing without a demand. It never did, and > it never will. Find out just what people will submit to, and you have > found out the exact amount of injustice and wrong which will be > imposed upon them; and these will continue until they are resisted > with either words or blows, or with both. The limits of tyrants are > prescribed by the endurance of those whom they oppress." -- Frederick > Douglass, August 4, 1857. > > Then perhaps I am wrong and your retirement from government simply > would be the best for our country. > > Good luck, > > Steve > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 3740 From: Aimee Farr Date: Sat Sep 15, 2001 3:23pm Subject: RE: Tom Clancy & CNN (didn't slap anybody, of course) Just to make sure...a "bitchslap" is slang. I fear Steve's wrath. That's his principal. At the time, he was just a voice of sanity amidst political minions. He wasn't overtly impolite -- that's what made it so good. Now that the conversation has turned somewhat intelligent (in places), it probably wouldn't be as striking. I mean...that big of a deal. (I'm a media person, so I have an appreciation for anybody that can wrangle a CNN anchor, and make the points they wanted to make.) Steve said everybody just started parroting his speech after that....and I sort of agree, at least in terms of some politicians. A CNN interview can do that. ~Aimee My previous post: > Figure of speech. In response to her question....he immediately blamed the > media for their shortcomings, [realize that sort of tops the DONT'S here...] > and even appeared to "chuckle" at two of the CNN anchorwoman's questions. In > *media parlance*, he did not "take control of the interview," he beat her > with a stick, Steve. > -----Original Message----- > From: PRGormley@a... [mailto:PRGormley@a...] > Sent: Friday, September 14, 2001 6:22 PM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Tom Clancy & CNN > > > Ok, guys, please, I've heard so much about it and initially > discounted what I > was hearing as wishful thinking - does anyone have a copy of the > video clip > or a link to it? > > Paul Gormley > Attorney / Faculty > North Shore Community College > Danvers, MA > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 3741 From: Ed Naylor Date: Sat Sep 15, 2001 3:36pm Subject: BARBARA LEE - 9th CONG DISTRICT (From Steve LNU on another list) One person (9th Cong. District - calif.) voted against the 420 other members of congress - I've taken the time to write to her. Copy attached. http://www.house.gov/lee/ is her web page. To write her you have to enter her Zip code as if it is hers. I am sure the peoples she was entrusted to represent will deal with her. She is an Evil bitch, but I've been much kinder in my letter. ---- Dear Barbara, Please notice the lack of honorific in my hand-typed salutation. Your shameful vote against the free use of whatever force needed to protect our country is indicative of your not considering yourself a representative of the people, but rather an individual acting alone without regard to the trust of public office you were supposed to put first. Hence I address you in the private. Simply put you have voted against your country, your people and against the very moral fabric of what makes us American. You must have had your reason - one cannot begin to fathom what it possibly could be. I respect your right to your opinion, but as a representative your obligation was to vote as your people wished. Obviously you find yourself unable to discharge that solemn duty. There will be a massive call for you to resign - I implore you not to, as I would rather you have to live with the shame your vote has smeared upon you each and every time you set foot into the halls of government. The scorn and shame is self inflicted Barbara. I've provided a small quote which expressly covers what you missed in your vote: "Those who profess to favor freedom, and yet depreciate agitation, are men who want crops without plowing up the ground. They want rain without thunder and lightning. They want the ocean without the awful roar of its waters. This struggle may be a moral one; or it may be a physical one; or it may be both moral and physical; but it must be a struggle! Power concedes nothing without a demand. It never did, and it never will. Find out just what people will submit to, and you have found out the exact amount of injustice and wrong which will be imposed upon them; and these will continue until they are resisted with either words or blows, or with both. The limits of tyrants are prescribed by the endurance of those whom they oppress." -- Frederick Douglass, August 4, 1857. Then perhaps I am wrong and your retirement from government simply would be the best for our country. Good luck, Steve 3742 From: Marcel Date: Sat Sep 15, 2001 6:45pm Subject: Re: NTIA/ITS.P- Multiple Agency Radio Interoperability Program Marcel wrote: > > > Technical Evaluation of the TRP-1000 and ACU-1000 > -Test Procedures and Results > Document No. TE-00-0002-01 > > Prepared by > OLES / Institute for Telecommunication Sciences > 325 Broadway > NTIA/ITS.P > Boulder, Colorado 80305 > > > > > Technical Evaluation of the TRP-1000 and ACU-1000 > -Test Procedures and Results > > Executive Summary > > The National Telecommunications and Information Administrationôs > Institute for > Telecommunication Sciences (ITS) conducted a series of tests to > evaluate the > functionality of the Multiple Agency Radio Interoperability Program > (MARIP) 1 > iMTRP-1000 Transportable Intelligent Interconnect System,ln and its > integrated ACU-1000 > audio gateway switch. The TRP-1000 and ACU-1000 are manufactured by > JPS > Communications, Inc., and are part of a collection of ifcrossbandln > technology products > offered by various manufacturers. The MARIP TRP-1000 comprises an > ACU-1000 > configured in a shock-mounted rack (surrounded by a thick plastic > case) with 10 land > mobile radios (LMRs) already installed as part of the system. The > ihstandard radiosla for > the MARIP TRP-1000 allow operation in the public safety bands of > high-band very high > frequency (VHF), 150-174 MHz, and ultra high frequency (UHF), 406-470 > MHz. Other > radios, such as those operating at 800 MHz, may be substituted for the > packaged radios > by the user. The transportable TRP-1000 is promoted as allowing almost > turnkey > operation for many public safety situations. > > The ACU-1000 is designed to allow wireless communication systems to be > combined at a > common denominator, namely the audio baseband. Thus, radios that > operate within > different parts of the radio spectrum, use different modulation and > access techniques, or > use analog versus digital encoding can interoperate. This is > accomplished by using the > received audio from one radio system as the source audio for one or > more transmitters of > differing technologies. That is, through matrix capabilities the > ACU-1000 can apply the > audio to a series of radio transmitter inputs. Simultaneously, either > one path can be > created between two or more radios or several paths can be configured > between sets of > radios. > > ITS developed a series of test procedures that would determine the > functionality of the > ACU-1000 primarily and of the MARIP TRP-1000 secondarily. The series > of tests was > focused to provide: > > > http://www.agileprogram.org/documents/TE-00-0002-01.pdf > -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 [Non-text portions of this message have been removed] 3743 From: Jay Coote Date: Sat Sep 15, 2001 6:46pm Subject: WANT: TEKTRONICS 492-BP MANUAL I am looking for a service manual for the Tektronics 492-BP spectrum analyzer. Complete photocopies would also be appreciated. Thanks, Jay Coote Los Angeles 3744 From: Date: Sun Sep 16, 2001 10:54am Subject: NIGHTLINE: "We're at war." 10p.m. EDT, AMERICA FIGHTS BACK Forwarded Message: Subj: NIGHTLINE: "We're at war." Date: 9/16/01 9:35:05 AM Pacific Daylight Time From: listeditor@a... (Nightline) Reply-to: listeditor@a... (Nightline) To: nightlinemail-l@a... (Nightline Mailing List) It‚Äôs not typical for NIGHTLINE to produce a one-hour Sunday night special, but this has been anything but a typical week. This evening at 10p.m. EDT, AMERICA FIGHTS BACK, anchored by Ted Koppel, will lay out our options and challenges in retaliating against Tuesday‚Äôs terrorist attacks. ---- Yesterday, President Bush in a brief appearance at Camp David where he met with what amounted to a war council declared ‚ÄúWe‚Äôre at War.‚Äù But unlike earlier conflicts that have faced this country, we‚Äôre not quite sure who the enemy is. During his weekly radio address, Mr. Bush described ‚Äúa conflict without battlefield or beachheads, a conflict with opponents who believe they are invisible. Yet they are mistaken. They will be exposed.‚Äù But exactly where is the enemy? In addition, the President said to the American people ‚Äúyou will be asked for your patience, for the conflict will not be short.‚Äù What is unclear is how much time, money, troops and resources this will take. The President also vowed, ‚ÄúUnderneath our tears is the strong determination of the United States to win this war. And we will win it.‚Äù But what constitutes victory? These are the questions we will put to a panel of former officials who have had to face tough questions as they sat in positions of power; former Secretary of State Lawrence Eagleburger, former Director of Central Intelligence James Woolsey, former National Security Advisor Brent Scowcroft, the former director of the National Security Agency Retired Lt. Gen. William Odom and former White House Chief of Staff Kenneth Duberstein. Richard Harris Senior Producer Nightline Offices Washington, D.C. ----------- If you have questions or comments regarding this message or a recent "Nightline" broadcast, please do not hit reply; simply click on this link to send your message directly to the "Nightline" staff: http://abcnews.go.com/sections/nightline/Nightline/Nightline_email_form.html Or log on to the new "Nightline" Message Board: http://boards.go.com/cgi/abcnews/request.dll?LIST&room=nightline Chat with "Nightline" guests and find articles, transcripts and video excerpts on our Web site at: http://abcnews.go.com/Sections/Nightline/ You can unsubscribe to the "Nightline" e-mail at: http://login.mailpref.go.com/unsubscribe Ask your friends to sign up! Send them this link: http://abcnews.go.com/sections/nightline/DailyNews/nightline_login.html 3745 From: Date: Sun Sep 16, 2001 1:20pm Subject: Ashcroft Seeks Enhanced Wiretap Powers Ashcroft Seeks Enhanced Wiretap Powers By PETE YOST .c The Associated Press WASHINGTON (AP) - Authorities arrested a second man in connection with the twin terrorist attacks as the Bush administration said Sunday it will ask Congress for enhanced wiretap authority and other powers aimed at stopping terrorism. Stressing the need for swift action, Attorney General John Ashcroft and FBI Director Robert Mueller were talking to congressional leaders by phone and in person at FBI headquarters. ``We need ... to elevate the penalties for those who would harbor or assist terrorists to at least the same level as the penalties for those who would harbor, assist those who have been involved in espionage,'' Ashcroft said in a televised address from Camp David, Md. People who harbor terrorists now face five-year prison terms. People linked to terrorism may be present in the United States and quick congressional action is needed because of the potential threats, said Justice Department spokeswoman Mindy Tucker. Law enforcement officials issued a warrant and took a man into custody in New York as a possible material witness, the Justice Department said, following the arrest of a man at Kennedy airport who had a fake pilot's license. The first man also was picked up as a material witness. Citing federal grand jury secrecy rules, the department refused to provide details. Law enforcement officials are using a grand jury impaneled in the Southern District of New York for the work on the arrest warrants. Separately, a man detained at Toronto's Pearson International Airport after the attacks was handed over to the FBI at the U.S. border. The unidentified man, held by Immigration Canada officials since Tuesday, chose to be transferred to the United States and the FBI took him into custody, said Greg Peters, spokesman for the Royal Canadian Mounted Police. An RCMP officer said Friday the man was being investigated for a possible connection to the attacks. Another 25 people are still being detained for possible immigration violations, including some who are cooperating, law enforcement officials say. Ashcroft said he hopes Congress will expand the reach of wiretaps and take other steps immediately to assist the investigation. ``We need to upgrade'' U.S. law because federal law enforcement agencies have better tools against organized crime and illegal gambling ``than we do against terrorists,'' Ashcroft said. Currently, suspicion of terrorism is not a valid legal reason to get a wiretap. Ashcroft was talking about steps that would be wider-ranging than the Senate's passage last week of a measure enabling wiretaps on computers and phones of people suspected in hijacking, bombing or other terrorist acts. Wiretap authorization should be focused on the person rather than the phone he uses because with the advent of ``disposable telephones ... it simply doesn't make sense to have the surveillance authority associated with the hardware,'' the attorney general said. The legislation will go Capitol Hill this week, said Tucker. The Justice Department also said that the cockpit voice recorder from the jetliner that struck the Pentagon was ``unusable'' because it had been damaged. AP-NY-09-16-01 1815EDT 3746 From: William Knowles Date: Mon Sep 17, 2001 4:29am Subject: [corporatesecurity] Report From Twin Towers and NYC I thought you might all want to read this message posted in the last 20 minutes from Bill Peeler. Bill Peeler is with the New York State Chapter of the International Association for Counterterrorism & Security Professionals. Bill mentions below that the one piece of equipment vitally needed is a portable x-ray machine for the people and the dogs. If memory serves me correct, there are a few users on the list that either have portable x-ray units are were selling them. Cheers! William Knowles wk@c... ---------- Forwarded message ---------- Date: Sun, 16 Sep 2001 23:13:56 -0400 From: Bill Peeler Reply-To: corporatesecurity@yahoogroups.com To: director@n... Subject: [corporatesecurity] Report From Twin Towers and NYC Greetings Everyone, I just wanted to give you all a first hand report from the twin towers area. I just returned for short time from after delivering some equipment and wanted to let you know what was found before I return. I arrived there the other day and was not able to locate my point of contact and was directed to one of the many command posts. After meeting with various individuals from NYPD, FEMA and other entities I met up with the Governor's group and was given a direct private line to the governors NYC office where a point of contact was made and after some time was given proper credentials for entry to the area now commonly known as "ground zero". The reason for my visit to this area was I originally requested by a list member for some resources and manpower but then was contacted by the NY Fire Department for assistance in acquiring some critical search equipment. After some work the great (and I mean great folks) at ITI Technologies Company met with me where I signed for $150,000.00 in optical search equipment or as some may recognize as "scopes". I also obtained communication equipment from the NEXTEL Company for the needs of some others. I want to emphasize how wonderful these two companies and the international level of the IACSP were in meeting my needs in a matter of one hour. This was all accomplished by my signature for payment and a number of people traveling to meet me with equipment. ITI even offered two trainers to travel with me so they could teach the rescuers how to optimize the use of the equipment. One did travel with me because of the difficulties in getting credential for a number of people. When I first arrived at the site I must say it is as described by others, "devastation", "shocking" , "revolting", "saddening" and "intriguing" all at one time. The people who have volunteered services, equipment or supplies are everywhere. It is actually saddening that some of these very talented people were not used; a team of professional rescuers from France flew the whole team and equipment to NYC just to be turned away. The supplies at this time have been more than met; some food items were unfortunately disposed of because the people could not consume it fast enough. The people at the lead of the efforts there are first the NYC Fire Department, Mayor's Office of Emergency Management, NYPD, FEMA, NY State Police, US Engineers with all the other city, state and federal branches completing the team. The citizens lining the outer perimeter contrary to many reports are providing a great service for there own mental well being and that of the workers. They applaud every person and every vehicle that enters the secured area, even when I cam out for a break after 3 am there was about 50-100+ people at each gate. I am not going to mislead you all with stating that every person is professional and that they all act appropriately. Some individuals have tried to breach the secured area for less than honorable reasons, others have lied to the authorities on contact from individuals trapped in the rubble and as with any operation of size there are those authorities with bloated egos. The majority of the work "on the pile", as it is referred to are firemen and police officers from all over the country. Florida police departments sent their officers directly from duty in uniform and patrol vehicle to the site, as well as, the LA County, Missouri and so many other rescue teams. Security is very tight at ground zero with the NYPD, NY State Police and National Guard taking the responsibility of these duties at the various layers. Identification on top of your credentials from the OEM is vital for movement throughout. I must also add they do not take it lightly when people misrepresent themselves. I know that prior to my approval a full background was completed. Nevertheless this is important part of the infrastructure in the operation. Looting and theft is at a minimum but has increased in the past day or so. Steps have been taken and have worked to curb this. Services available at the site for workers do not just include medical, religious & physiological council but it also includes: massage therapist, chiropractors and even veterinarians for the rescue dogs. In fact one piece of equipment vitally needed is a portable x-ray machine for the people and the dogs. The people working are still showing enthusiasm in completing their mission with all the signs of exhaustion at the same time. The commander at the ground zero command post shared his personal thoughts with me in great candor, but as I stated these were private thoughts and emotions that I do not feel would be proper for me to discuss. Other officers spent some private moments with me and shared their thoughts about lost friends and fears, many having their eyes fill with tears. This was all enough to rip at your heart and stomach. As I left the site I was torn. I needed to return home for short time but I like so many other felt the need to continue with the work. Many people on the site and others elsewhere provided memories for me that will never leave. They are not marketing to the public any fiction here, they will rebuild, they will again surpass the expectations of anyone and they have defined what the United States stands for. Sincere Regards, Bill Peeler 3747 From: Date: Mon Sep 17, 2001 8:20am Subject: The Pride of America We can still hear sirens outside our windows in New York. We can still smell that horrible stench that won't go away. We can still feel the effects of Tuesday's attacks. But despite it all, we are still proud to be Americans! If you're proud: http://mailbits.com/goto/pride HAVE A GREAT DAY !!! 3748 From: Date: Mon Sep 17, 2001 3:41pm Subject: Where Nations Stand on U.S. Retaliation Where Nations Stand on U.S. Retaliation Reuters LONDON (Sept. 17) - President Bush is trying to rally a global coalition for military retaliation for attacks against the United States. U.S. officials have pointed to an Arab connection to the attacks, adding that a coalition should include Muslim states. Retaliation may focus on Afghanistan, which hosts the prime suspect, Saudi-born militant Osama bin Laden. This is a summary of key responses so far: STRONG OR SPECIFIC OFFERS OF SUPPORT BELGIUM - Foreign Minister Louis Michel has said he would send troops to help in U.S. military retaliation. BRITAIN - Closest U.S. ally. Prime Minister Tony Blair has pledged to stand ''shoulder to shoulder'' with Bush and has worked to bring less enthusiastic European states on board. INDIA - Has offered to allow U.S. military forces to use its facilities if needed. Has a big Muslim minority. ITALY - Is ready to deploy troops and aircraft if requested to do so by its allies in response to the terror attacks, Defense Minister Antonio Martino said. ISRAEL - U.S. sources say Israelis giving vital intelligence support on Islamist militants. Prime Minister Ariel Sharon has refused to make concessions to the Palestinians to help U.S. recruit Arab and Islamic nations into an anti-terror alliance. KUWAIT - Freed from Iraqi occupation by a U.S. coalition in 1991, has offered all possible help. PHILIPPINES - Has expressed all-out support for any use of force by the United States, including possibility of allowing a coalition to use airports and seaports. Top officials will discuss offering ground troops Tuesday. SPAIN - Has offered its air bases for any retaliatory strikes; has promised to act ''without any reservations.'' QUALIFIED SUPPORT BANGLADESH - One of the most populous Muslim states, has pledged support. Monday government denied newspaper report that United States had asked for use of airspace and port facilities. U.S. embassy source said request had been made. CANADA - Has pledged support but has not made clear whether that could include participation in a military response. FRANCE - President Jacques Chirac has said France would be ''totally supportive,'' but Prime Minister Lionel Jospin said it was up to Paris to decide how to help retaliate and Defense Minister Alain Richard warned against provoking instability. GERMANY - Defense Minister Rudolf Scharping suggested in vague terms Monday that Germany could participate in a military response. Foreign Minister Joschka Fischer earlier expressed caution and recalled that parliament has last word. INDONESIA - Hamzah Haz, vice-president of what is world's biggest Muslim nation and fourth most populous, has condemned the attacks but warned U.S. not to make Islam a scapegoat. ITALY - Defense Minister Antonio Marzano has said Italy would send troops to help U.S., if necessary, though ''at this moment, it is not in the cards.'' Also said U.N. should consent and that proof and more elements were needed before action. JAPAN - Struggling to reconcile its post-World War Two constitutional neutrality with loyalty to its key American ally. Criticized in 1991 for supporting U.S.-led war to oust Iraq from Kuwait without committing even a token force to the Gulf. JORDAN - Has said it would be at the forefront of countries ready to join a coalition. Largest opposition party issued edict Sunday banning any Muslim participation in such a coalition. NATO - Invoked mutual defense clause for first time in its history, opening the way for a possible collective response. But individual members have expressed reservations. PAKISTAN - Afghanistan's western neighbor, previously backed Taliban government. Offered full cooperation with U.S. and sent delegates to Afghanistan Monday to try to persuade Taliban to hand over bin Laden. Yet to make decision on specific help. Fears Taliban attack if it helps U.S. PALESTINIAN TERRITORIES - President Yasser Arafat has called on Arab states to declare readiness to join a coalition. On the defensive after some Palestinians were shown on television welcoming the attacks. RUSSIA - President Vladimir Putin has pledged support but said thorough investigation must precede any U.S. action. Defense officials have said Moscow will help with intelligence, but military participation is unlikely. Have warned NATO against using former Soviet Central Asia for military operations. SAUDI ARABIA - Has condemned the attacks, but Crown Prince Abdullah has urged Washington not to rush to conclusions about who staged them and avoid blaming Arabs and Muslims in general. Gulf source says country prepared to share intelligence. SYRIA - Has expressed strong support but earlier this year failed to follow through on commitment to United States. UNITED ARAB EMIRATES - Has said it was reviewing its ties with Afghanistan's Taliban government and would help in ''any possible way.'' Also called for immediate NATO move to fight ''terrorism'' while stressing that success of such a move would hinge on a just solution to the Israeli-Palestinian conflict. OTHER GULF ARAB STATES are likely to link support for any U.S. military action to extent of U.S. pressure on Israel. NEUTRALITY IRAN - Iranian leaders from reformists to conservatives have strongly condemned the attack in an unprecedented show of sympathy with their long-time enemy. Likely to draw on precedent and go for neutrality. SWEDEN - Foreign Minister Anna Lindh has said country did not want to join NATO but was reviewing its neutrality. UNITED NATIONS - Security Council has expressed ''readiness to take all necessary steps to respond to the terrorist attacks'' but this falls far short of formally authorizing any military response which would require another resolution. OPPOSITION CHINA - Has said it is ready to join the U.S. superpower in fighting ''terrorism'' but warned that military intervention would only ''aggravate terrorism and violence.'' IRAQ - A possible target along with Afghanistan. Accused the United States of terrorism itself and said the attacks were carried out by American dissidents. 3749 From: Date: Mon Sep 17, 2001 3:42pm Subject: Airline security The following discussion was in rec.photo.equipment.35mm. I see it can be interesting to those of us traveling with expensive and delicate equipment and specialist tools. Regards, Janis ---------------------------------------------------------- Interesting thread but Tony hit it on the head when he said wait and see. So Far: It's been announced that two response teams have been established working on the airline security problem. Approximately half the team are airline owners and CEO's, the other half Pilot organizations and security people. They will be divided ( hence two teams) between airborne and ground changes and conditions.. This is what I see will happen: One of the first steps will be the federalization of the airline inspectors. The people you see now will be replaced by those with the legal training of police officers and will have the powers of same. Long overdue. Some of the dickheads you see on line at airports who like to push people around with their importance will find out real quick about who they can walk over. People have complained about service and schedules, nothing as to what it will become. The new inspectors will be government workers, empowered, and of a higher caliber of training than the two minute drills most of the companies hired to train the current crew. The airlines have begged for it, the government has been negligent in looking at this...I hate when they refer to this as a wake-up call, it's a catastrophe that has been going on and on and those who have been vocal about it have been ignored. This weekend at Tampa I watched two bozos quietly told you aren't flying today after they raised a stink about the inspection. Real assholes, they deserved it. I watched suitcases literally burst open, no wonder luggage never survives the trip. You should see the inspectors trying to stuff the articles back in....A woman's make up case held up the line after it was discovered she had an emery board or nail file made of steel in it. They confiscated it, she complained, Seeeee Yaaaaaaaa! It was explained to her she had two options, give up the file or grab a cab to Greyhound. Our radio here carried a story of fingernail clippers and a nose-hair clipper getting yanked from one of the producers of the local radio station. ( Yuck, that's why they wear rubber gloves) Increased vigilance at the security gates, more toward the European hand checks. The curbside has been dissolved and now everybody's CHECKED luggage gets a hand job. (sic) I predict very casual wash and wear travel clothing will get popular, women will pack sensibly (first being my wife, it's vacation Honey, not a Safari) and people will be forced to think before they pack. Trains and buses will be popular again but who says you couldn't put a bomb on a fifty passenger bus set to go off under the tunnels of NYC. That's why the tunnels are always the first to shut down in NY. Could you imagine what it would be like screening Greyhound luggage...Chickens, ducks, pipe bombs, small children etc. Do anticipate a major increase in gate x-ray usage, but not the kind that you see now. You on the other hand might have to go through a body low power narrow band x-ray machine, about the same dose you get while flying that will eliminate things like cavity searches. It will be embarrassing for a few. This equipment sensitive enough is being evaluated and tested for "mules". Those who carry drugs internally in condoms. This equipment is available now. Actually it would replace the wands used. It looks like a port-o-let. > First and foremost, the machines are already tuned for precise > identification of contents. Turning up the power for everything is only > going to obscure the detail (think about over-exposing your slides and > burning out the highlights). Bad thinking, don't worry about your detail, worry about your ass. They may be tuned in your mind but in a letter from the companies hired to check the equipment many, too many weren't within specs...so much for precisely tuned... Delta United and Continental fines last year exceeded a million dollars for varying degrees of negligence in the scanning arena both with equipment and visual checks. It's a flawed system and has to be replaced. We have had it real easy here in the States and take things for granted. It will change and many will cry and argue about rights. It will be easy to offend a few than bury 5000. By the way on TV yesterday another of the idiots of the press ( Oh Oh here goes a rant again) was added to my swillfile. It's similar to a killfile and represents those with a mike in front of them who deserve to have their lips sewn together. Here are some of the members added during the media coverage on the TV which though redundant was powerful. Tears readily flowed in our office, business and home. It started with one of the rudest TV news reporters Peter Jennings, (he alone shot their ratings down below sea level) with pure rudeness to his guests and staff. What an arrogant bastard... Jerry Falwell and Pat Robertson with their declination "that God has softened on America and this was to teach us a lesson". Anywhere else in this world these two would of been labeled fanatics. All the nutcases aren't from one place. Every religion or group has those who go too far with the program. Their ill-timed comments in some places would of led to these two schmucks being shot as treasonists. Everytime I see the Show "Fleecing of America", these two could win the Academy Award. Sam Donaldson, got his gonads clipped by Hillary. He said "Most americans don't want to see American Blood shed on foreign soil, with another war referring to us deploying troops! She replied, Sam, this is war and we have 5000 casualties already. > Second, the machines are used in an open > environment, with very little clearance. There are issues with shielding and > exposure, not only of the items being scanned, but of the general public and > especailly the operators and secondary inspectors as well, who have to be > there for hours on end, day after day, week after week. In all the newer machines the operator is well shielded..., you will be in the port-o-let worry about your own butt. > This would probably be a good time to invest in Norelco, Remmington, and > Dart, as the elimination of metal blades is going to create a market for > electric shavers for travelers, and plastic utensils in the food service. > That change is probably going to last longer than some of the others. Don't think so.... All you do is buy shaving cream in a toothpaste tube as spray cans will be removed, the bad guys re-labeled pepper spray with labels saying deodorant and used them on some of the victims. Same for deodorant, use a stick and when you get to where you going, just buy a BIC shaver throwaway. With my heavy beard I still can get eight to ten shaves from one BIC. Most wives go through blades after one shave. OK I won't go there... Some are making a real federal case out of that simple act. Besides when I go On vacation , I don't even want a razor with me. > For what its worth, I've had several rolls of film, of various speeds, go > through gate scanners in several countries multiple times without obvious > adverse effects. That doesn't mean it won't happen now that things have > changed. Your best bet is to have a reliable source of film at your > destination, and have it processed prior to your return. Anything less than > that produces compromise risk, pure and simple. You just need to choose your > risks carefully. The difference between a risk and a gamble is who controls > the odds. This I agree with. You must know your resources and situational awareness. Travel and risk taking: Depends if you are an amateur or if you make a living from it. I travel with gear, if something is that important I find if I can rent it where I am going. Customer pays anyway. On vacation or holiday, I will think highly of strictly digital for size or possibly there is a Leica in my future I can wear around my neck. Own, Pack and Travel Smartly: We have Speed-o-trons but travel with Paul Buff monolights now. Pack wisely, do you really need the 300mm to do the company christmas party? and...Invest in good Hard Gear like Pelican Products. All my gear goes into bags then if needed into the Pelicans. TWO different padlocks and backed by wireties. When I check in now, a digital shot of the contents when opened, then seal and wiretie in front of the agent. Takes just a few moments. My name is stamped (done with heated steel letters you get at a metal shop or Home Depot on the kitchen stove and a pair of pliers, yea, I got hot fingers twice) plus my name and the Co. is painted on. Hand inspections of any questionable equipment will become more intense and remember many of these inspectors will not know a 1600 dollar Nikon lens from Ritz Quantaray dumpster fodder. I usually wear a photo vest while traveling because of the pockets. It will be stuffed with film in the ziplocks or wire mesh bags I have. What else can you do. many of the package shipping companies (Fedex, UPS, Airborne) will be X-ray screening probably more so than airlines as the conditions warrant, especially if we go to a real war status. So I don't think mailing will be the answer. There is a space for a large decal I print on my computer that goes on the Pelicans for final destination. Yes, another pain in the ass ,BUT, overhead luggage will revert back to HANDHELDS, not the suitcases people who abuse systems carry on. I would (and I hate to say it, agree, there's too much stuff in the cabins being brought on). Those objects are dangerous in any situation not just from the terrorist point. I've seen them fly open in rough weather. I just ordered two large Pelicans for our clothing and other travel stuff. No padding just soft goods. Our Samsonite and leather luggage is all for sale. I see it as the only way soon...In town here I can put the lighting gear in them for site use. Actually It's making more use of something that gets only used ocassionaly anyway . Rude, abnoxious, people. You have seen them, they clog the aisles with overstuffed bags, take up an entire bin, jump up before people can get out of their seats disembarking, and don't give a shit about anyone other them themselves. Same thing other rude people do. Once, at Disney a young person from another country used to pushing people around made the error of pushing my wife (while entering a tram) out of his way and knocking her down, Him and his backpack reversed direction quit abruptly because 200 lbs and six one of really pissed and trained husband responded. I have thrown duffle bags, and Alice packs and needed the practice. No one lays hands on my wife. The tourguide from his group apologized and they waited for the next tram. But these people seem to think it's all beneath them, not so anymore. I think the vigilance and fear will quiet things down now. Also people will be looking at other people more often...affecting travel with a lot of suspicion and false alerts On a note: To those who live in other parts of the world, Thank you for the Letters of Condolence and Sympathy you have written here and in other NG's to the people of the US. Now we understand fully what it's like. It reminds me of when I came home from that place in Far East Asia when it took on different meaning when someone you knew was killed or injured. 3750 From: Marcel Date: Sat Sep 8, 2001 11:50am Subject: SubCarrier Communications offers rent-free assistance to victims SubCarrier Communications offers rent-free assistance to victims Sep 14 2001 SubCarrier Communications, Inc. owns several local radio towers and manages numerous high-rise rooftop telecommunications sites in New York and New Jersey. SubCarrier is offering rent-free assistance to all governmental agencies and businesses who are trying to reestablish their communications networks. For further information, please call the president of SubCarrier: John J. Paleski at 732-607-2828 or email him at johnpaleski@s... or visit the Web site at www.subcarrier.com. -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 3751 From: James M. Atkinson Date: Tue Sep 18, 2001 1:13pm Subject: Taxi flattened CIA's spy-cat project [I wonder if the best TSCM counter-measure to this threat would have been a CAT Scan (duck) -jma] Taxi flattened CIA's spy-cat project http://www.ananova.com/news/story/sm_400975.html?menu= The CIA trained 'spy-cats' to secretly gather information on suspects, declassified secret documents have revealed. Project 'acoustic kitty' saw the pets fitted with hi-tech listening equipment and being trained to wander into secure areas. But the project never went any further than the testing stage after the first spy-cat was run over by a taxi. The information is from secret documents drawn up in 1967 by the CIA's Directorate of Science and Technology that have only just been released. At the time experts concluded the cats could be trained but decided the project just wouldn't work. It reports: "The programme would not lend itself in a practical sense to our highly specialised needs." Story filed: 16:49 Monday 17th September 2001 -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- From: audiotelint Date: Mon Sep 13, 2004 3:42am Subject: Audiotel International TSCM Sweep Seminar Audiotel International TSCM Sweep Seminar Reebok Stadium, Bolton, UK, 29 September 2004 Audiotel International would like to invite you to our first TSCM Sweep Seminar. As a driving force behind the Technical Surveillance Countermeasures market, Sweep Teams are a valued customer and ally of Audiotel International. We would like to take this opportunity to bring together UK Sweep Teams to = share with you our knowledge of TSCM technology and practices together with a showcase of our latest product developments. The seminar will also = provide a chance for you to speak to us face-to-face and keep us up to date= with your needs and requirements. Registration for the event will take place at 9.00am, with the seminar last= ing from 9.30 ñ 1.30pm. We have tried to include as wide a range of topics as = possible and are confident that there will be something of interest to everyone. Our guest speaker, Richard Broom, is an ex-Foreign Office Technical Intelligence Expert with a long track record in covert surveillance and cou= nter surveillance operations. Richard will provide an insight into high-level c= overt attack strategies and ways to best defend against them. During the seminar we will also be providing technical advice and showcasing our latest product, DetectIV. Integrating four main detection methods, DetectIV provides comprehensive preliminary sweeps for Sweep Teams and effective protection against short-deployment attacks between these sweeps for their customers. Providing a combination of educational seminars, practical demonstrations and feedback sessions we aim for this seminar to be the first in a number o= f specialist TSCM Sweep Team Events run by Audiotel International. TSCM Sweep Seminar Agenda 9.00amArrival, registration, tea and coffee 9.30amIntroduction Phil Harrison, Commercial Manager 9.45amHarmonic Receiver Benefits to TSCM Barry Stephen, Technical Director During this session Barry Stephen will be providing a brief overview of rad= io eavesdropping systems and conventional scanning receivers. Barry will look= in detail at harmonic receivers, highlighting their benefits to TSCM sweeps= . 10.45amDetectIV Showcase Grant Stewart, Product Manager DetectIV is Audiotel International's latest TSCM tool. Integrating four m= ain detection methods DetectIV is an ideal preliminary search tool, saving time= and effort during TSCM sweeps. Presentation and demonstration. 11.30amTea Break 12.00pmCovert Technical Attack and Defence Strategies Richard Broom, ex-Foreign and Commonwealth Technical Intelligence To effectively defend, you must know how to attack, and vice-versa; a conce= pt of which is vital to TSCM sweeping. During this session Richard Broom will= draw upon his experience and provide practical advice to assist the sweep process. 1.00pmFeedback Session 1.30pmFinish To take advantage of this opportunity please contact our head office on 01536 266 677. In the meantime, should you have any questions please do not hesitate to ge= t in contact. I look forward to meeting you on the 29 September. Yours sincerely Roger Cook UK Sales Manager 9651 From: Samuel Hayes Date: Mon Sep 13, 2004 3:56pm Subject: Re: Audiotel International TSCM Sweep Seminar Do they really drink tea at these things during the "tea break"??? --- audiotelint wrote: > Audiotel International TSCM Sweep Seminar > Reebok Stadium, Bolton, UK, 29 September 2004 > > Audiotel International would like to invite you to > our first TSCM Sweep > Seminar. As a driving force behind the Technical > Surveillance > Countermeasures market, Sweep Teams are a valued > customer and ally of > Audiotel International. > > We would like to take this opportunity to bring > together UK Sweep Teams to = > > share with you our knowledge of TSCM technology and > practices together > with a showcase of our latest product developments. > The seminar will also = > > provide a chance for you to speak to us face-to-face > and keep us up to date= > > with your needs and requirements. > > Registration for the event will take place at > 9.00am, with the seminar last= > ing > from 9.30 ñ 1.30pm. We have tried to include as > wide a range of topics as = > > possible and are confident that there will be > something of interest to > everyone. > > Our guest speaker, Richard Broom, is an ex-Foreign > Office Technical > Intelligence Expert with a long track record in > covert surveillance and cou= > nter > surveillance operations. Richard will provide an > insight into high-level c= > overt > attack strategies and ways to best defend against > them. > > During the seminar we will also be providing > technical advice and > showcasing our latest product, DetectIV. > Integrating four main detection > methods, DetectIV provides comprehensive preliminary > sweeps for Sweep > Teams and effective protection against > short-deployment attacks between > these sweeps for their customers. > > Providing a combination of educational seminars, > practical demonstrations > and feedback sessions we aim for this seminar to be > the first in a number o= > f > specialist TSCM Sweep Team Events run by Audiotel > International. > > TSCM Sweep Seminar Agenda > > 9.00amArrival, registration, tea and coffee > > 9.30amIntroduction > Phil Harrison, Commercial Manager > > 9.45amHarmonic Receiver Benefits to TSCM > Barry Stephen, Technical Director > > During this session Barry Stephen will be providing > a brief overview of rad= > io > eavesdropping systems and conventional scanning > receivers. Barry will look= > > in detail at harmonic receivers, highlighting their > benefits to TSCM sweeps= > . > > 10.45amDetectIV Showcase > Grant Stewart, Product Manager > > DetectIV is Audiotel International's latest TSCM > tool. Integrating four m= > ain > detection methods DetectIV is an ideal preliminary > search tool, saving time= > > and effort during TSCM sweeps. Presentation and > demonstration. > > 11.30amTea Break > > 12.00pmCovert Technical Attack and Defence > Strategies > Richard Broom, ex-Foreign and Commonwealth Technical > Intelligence > > To effectively defend, you must know how to attack, > and vice-versa; a conce= > pt > of which is vital to TSCM sweeping. During this > session Richard Broom will= > > draw upon his experience and provide practical > advice to assist the sweep > process. > > 1.00pmFeedback Session > > 1.30pmFinish > To take advantage of this opportunity please contact > our head office > on 01536 266 677. > > In the meantime, should you have any questions > please do not hesitate to ge= > t > in contact. I look forward to meeting you on the 29 > September. > > Yours sincerely > > Roger Cook > UK Sales Manager > > > > > > > > _______________________________ Do you Yahoo!? Declare Yourself - Register online to vote today! http://vote.yahoo.com 9652 From: Samuel Hayes Date: Mon Sep 13, 2004 4:22pm Subject: RE: Getting equiped... Having been a "pole monkey" for the phone company in my geographic region, I can say that I dont think the company I worked for even OWNS any aluminum ladders. Fiberglass extension ladders were standard issue on each truck in 12 & 24 ft lengths. I can also say that my ladders and "spikey shoe things" rarely left my truck. They were there for inspection purposes mainly. When the need arose to reach heights beyond 8ft, we would just break out the bucket truck (cherry picker depending on where you are from) which incidently JMak suggest on his websites EQ list (very low-cost from phone company surplus sales). --- Tech Sec Lab wrote: > Well boy do I feel stupid.... > > > But more importantly so should every contractor in > the country, I have > never, and I repeat NEVER, seen any type of > electrical contractor use > anything but alu ladders. > > Usually the high quality type however. > > And the pole monkeys don't even use ladders...just > spikey shoes....mind you > if the monkey fell off the pole and landed on a > passer by much the same > result as the fibreglass ladder would occur. > > :) LOL. > > > _______________________________ Do you Yahoo!? Declare Yourself - Register online to vote today! http://vote.yahoo.com 9653 From: toytechtscm Date: Mon Sep 13, 2004 4:43pm Subject: Any Tips On TSCM Software Available To Operate AR5000 Receiver With SDU5000 I have been looking high and low with no resolve as yet, for the best pc-controller package available (without spending over $3500us) to operate an AR5000 Receiver interconnected with an SDU5000 Spectrum Display! Everything I've found that says it's capable of controlling these units seems to be orientated towards radio scanner enthusiasts rather than purpose designed, or at very least capable off controlling the AOR units for the purpose of sweeping their entire spectrum capabilities whilst analyzing all signals and determining if there is any elusive hostile transmitters within the area being analyzed. I know winradio has some great stuff available but to best my uneducated knowledge, their software will only control winradio units?? One other factor to bear in mind also is that this fantastic SDU5000 Spectrum Display would seem to be somewhat wasted to have all your graphical analysis orientating from your laptop like a lot of programs I've looked into to date that would almost equate to this unit not being off much benefit yet that shouldn't be so! It's A Brilliant Little Marvel That Should Be Utilized To It's Fullest I Think!! One package that did seem pretty perfect was the "Monteria LLC Signum-500 Counter Surveillance System" but unfortunately at over $10000us I won't be getting that in a hurry it seems.. ANY ASSISTANCE OR GUIDANCE (Even Simply A Quick Reference To A Web Address That Is In This Field) BY ANYONE WOULD BE SO GREATLY APPPRECIATED AS AM CURRENTLY STUCK IN LIMBO WATCHING THESE AOR UNITS STARTING TO CAMOFLAGE THEMSELVES IN DUST - PAINFULL SIGHT!!! Thanks Heaps, Jeff Sadek OZTSCM. 9654 From: satcommunitfive Date: Mon Sep 13, 2004 11:02pm Subject: Re: "The Thing" RFID [passive]tags are using RF to power themselves up -short range yes but not if you turn the power up, they use a coil/tuned circuit rectify into DC then power up a micro, store it in a small cap and send it back with an ID. I think you could do this with a small mic and TX. You could even sniff 50/60Hz off the mains and use that mmmmmm I can hear the black choppers have to go 9655 From: satcommunitfive Date: Mon Sep 13, 2004 11:30pm Subject: Re: Any Tips On TSCM Software Available To Operate AR5000 Receiver With SDU5000 Please dont use the word TSCM and winradio in the same sentence! I bought a winradio 1500e it had more birdys than a aviary the "spec ann" software was good -a bit slow but the amount of intermod,harmonics,IF quirks made it totally useless. The small LOG Anttena they sell is also absolutly crap [looks sexy but]I now design my own LOGS and they work well. (I even told them they weren't interested) The AOR people are very slow to bring out the SDU software dont hold your breath [I have a mate waiting also with a SDU ] Some links for U> I use this sofware with a AOR8600 mark2 http://www.butel.nl/ and http://www.aoruk.com/software.htm Remember the AOR`s are only giving you a small amount of spectrum sell up all the toys and start with something like a Anritsu MS2721 sitemaster Spec ann etc etc . http://www.electronicstalk.com/news/anr/anr168.html http://www.eu.anritsu.com/products/default.php? p=166&model=MS2721A&newprod=1 bewell Markus 9656 From: David Alexander Date: Tue Sep 14, 2004 2:41am Subject: RE: Audiotel International TSCM Sweep Seminar -----Original Message----- From: Samuel Hayes [mailto:srhayes3@y...] Sent:13 September 2004 21:56 To:TSCM-L@yahoogroups.com Subject:Re: [TSCM-L] Audiotel International TSCM Sweep Seminar Do they really drink tea at these things during the "tea break"??? Yes we do, strong and hot with milk - the way it should be, not dishwater thin and iced --- audiotelint wrote: > Audiotel International TSCM Sweep Seminar > Reebok Stadium, Bolton, UK, 29 September 2004 > > Audiotel International would like to invite you to > our first TSCM Sweep > Seminar. As a driving force behind the Technical > Surveillance > Countermeasures market, Sweep Teams are a valued > customer and ally of > Audiotel International. > > We would like to take this opportunity to bring > together UK Sweep Teams to = > > share with you our knowledge of TSCM technology and > practices together > with a showcase of our latest product developments. > The seminar will also = > > provide a chance for you to speak to us face-to-face > and keep us up to date= > > with your needs and requirements. > > Registration for the event will take place at > 9.00am, with the seminar last= > ing > from 9.30 1.30pm. We have tried to include as > wide a range of topics as = > > possible and are confident that there will be > something of interest to > everyone. > > Our guest speaker, Richard Broom, is an ex-Foreign > Office Technical > Intelligence Expert with a long track record in > covert surveillance and cou= > nter > surveillance operations. Richard will provide an > insight into high-level c= > overt > attack strategies and ways to best defend against > them. > > During the seminar we will also be providing > technical advice and > showcasing our latest product, DetectIV. > Integrating four main detection > methods, DetectIV provides comprehensive preliminary > sweeps for Sweep > Teams and effective protection against > short-deployment attacks between > these sweeps for their customers. > > Providing a combination of educational seminars, > practical demonstrations > and feedback sessions we aim for this seminar to be > the first in a number o= > f > specialist TSCM Sweep Team Events run by Audiotel > International. > > TSCM Sweep Seminar Agenda > > 9.00amArrival, registration, tea and coffee > > 9.30amIntroduction > Phil Harrison, Commercial Manager > > 9.45amHarmonic Receiver Benefits to TSCM > Barry Stephen, Technical Director > > During this session Barry Stephen will be providing > a brief overview of rad= > io > eavesdropping systems and conventional scanning > receivers. Barry will look= > > in detail at harmonic receivers, highlighting their > benefits to TSCM sweeps= > . > > 10.45amDetectIV Showcase > Grant Stewart, Product Manager > > DetectIV is Audiotel International's latest TSCM > tool. Integrating four m= > ain > detection methods DetectIV is an ideal preliminary > search tool, saving time= > > and effort during TSCM sweeps. Presentation and > demonstration. > > 11.30amTea Break > > 12.00pmCovert Technical Attack and Defence > Strategies > Richard Broom, ex-Foreign and Commonwealth Technical > Intelligence > > To effectively defend, you must know how to attack, > and vice-versa; a conce= > pt > of which is vital to TSCM sweeping. During this > session Richard Broom will= > > draw upon his experience and provide practical > advice to assist the sweep > process. > > 1.00pmFeedback Session > > 1.30pmFinish > To take advantage of this opportunity please contact > our head office > on 01536 266 677. > > In the meantime, should you have any questions > please do not hesitate to ge= > t > in contact. I look forward to meeting you on the 29 > September. > > Yours sincerely > > Roger Cook > UK Sales Manager > > > > > > > > _______________________________ Do you Yahoo!? Declare Yourself - Register online to vote today! http://vote.yahoo.com ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9657 From: Michael Puchol Date: Tue Sep 14, 2004 2:47am Subject: Re: Re: "The Thing" If any of your conspiracy theorists are going to Naples (Napoli) anytime soon, don't take the ¥citysightseeing¥ bus, as it's tickets use an RFID tag for control (the black chopper people can track you now!). When you board the bus, the card is passed some 5cm away from the reader, and a go-no-go is given. The ticket looks and feels no different than your average cardboard buss pass in credit card format. Inspection against strong light reveals the antenna and IC inside. Regards, Mike ----- Original Message ----- From: "satcommunitfive" To: Sent: Tuesday, September 14, 2004 6:02 AM Subject: [TSCM-L] Re: "The Thing" > > RFID [passive]tags are using RF to power themselves up -short range > yes but not if you turn the power up, they use a coil/tuned circuit > rectify into DC then power up a micro, store it in a small cap and > send it back with an ID. I think you could do this with a small mic > and TX. You could even sniff 50/60Hz off the mains and use that mmmmmm > > I can hear the black choppers have to go > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 9658 From: Michael Puchol Date: Tue Sep 14, 2004 3:01am Subject: Re: Any Tips On TSCM Software Available To Operate AR5000 Receiver With SDU5000 Hi, The SDU is nothing more than an expensive toy for the AR5000 and compatible receivers. I have an SDU-5500 and it's fun to use, but just that - *fun*. It has it's uses in the scanning world, which is what it was designed for, but I wouldn't trust it for anything TSCM related (oh dear, I said the word!). There are many frequency ranges in which you'll get spikes a few kHz or MHz up and down from center frequency, due to oscillator images et al. It is VERY slow compared to even 'toy' spectrum analyzers. I only bought it because the AOR dealer in Spain at the time was closing shop and got a really good deal, otherwise I'd have saved my pennies for a portable SA (which I'm almost ready to get now, waiting on this new Anritsu that goes up to 7GHz). Besides all this, to answer your question look here: http://www.aoruk.com/hawk.htm which is a freeware application for the SDU-5000, albeit limited. The serial protocol for the SDU range is publicly available, so you could also write your own software. I had a go once, but there didn't seem to be much interest for it, so it ended in the can. VisualRadio (http://www.visualradio.de/) also make some plugin/server/whatever for the SDU-5500, but I think you need their software first to be able to use it ($$$). In the end, if you add it all up, it amounts to more than an entry-level SA with some options. Regards, Mike ----- Original Message ----- From: "toytechtscm" To: Sent: Monday, September 13, 2004 11:43 PM Subject: [TSCM-L] Any Tips On TSCM Software Available To Operate AR5000 Receiver With SDU5000 > > I have been looking high and low with no resolve as yet, for the > best pc-controller package available (without spending over $3500us) > to operate an AR5000 Receiver interconnected with an SDU5000 > Spectrum Display! Everything I've found that says it's capable of > controlling these units seems to be orientated towards radio scanner > enthusiasts rather than purpose designed, or at very least capable > off controlling the AOR units for the purpose of sweeping their > entire spectrum capabilities whilst analyzing all signals and > determining if there is any elusive hostile transmitters within the > area being analyzed. I know winradio has some great stuff available > but to best my uneducated knowledge, their software will only > control winradio units?? One other factor to bear in mind also is > that this fantastic SDU5000 Spectrum Display would seem to be > somewhat wasted to have all your graphical analysis orientating from > your laptop like a lot of programs I've looked into to date that > would almost equate to this unit not being off much benefit yet that > shouldn't be so! It's A Brilliant Little Marvel That Should Be > Utilized To It's Fullest I Think!! One package that did seem pretty > perfect was the "Monteria LLC Signum-500 Counter Surveillance > System" but unfortunately at over $10000us I won't be getting that > in a hurry it seems.. ANY ASSISTANCE OR GUIDANCE (Even Simply A > Quick Reference To A Web Address That Is In This Field) BY ANYONE > WOULD BE SO GREATLY APPPRECIATED AS AM CURRENTLY STUCK IN LIMBO > WATCHING THESE AOR UNITS STARTING TO CAMOFLAGE THEMSELVES IN DUST - > PAINFULL SIGHT!!! > > Thanks Heaps, > > Jeff Sadek OZTSCM. > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 9659 From: kondrak Date: Tue Sep 14, 2004 0:05pm Subject: [OT] but topical HEAR YE HEAR YE! Since there are a LOT of gun owners in this group..... >>U.S. Department of Justice >> >>Bureau of Alcohol, Tobacco, >>Firearms and Explosives >> >> >> >> >>-------------------------------------------------------------------------------- >> >> Washington, DC 20226 >> >> >> >>CHANGES IN FEDERAL LAW AS OF SEPTEMBER 13, 2004 >>RELATING TO >>SEMIAUTOMATIC ASSAULT WEAPONS (SAWs) >> >>AND >> >>LARGE CAPACITY AMMUNITION FEEDING DEVICES (LCAFDs) >> >> >>GENERAL >> >>As of September 13, 2004, the provisions of Public Law 103-322, the Violent >>Crime Control and Law Enforcement Act of 1994, covering semiautomatic >>assault weapons and large capacity ammunition feeding devices are no longer >>in effect. The regulations implementing these provisions also are no longer >>in effect. >> >>Specifically, there is no longer a Federal prohibition on the manufacture, >>transfer, and possession of semiautomatic assault weapons and large capacity >>ammunition feeding devices. >> >>There are no longer any marking requirements for semiautomatic assault >>weapons and large capacity ammunition feeding devices. Existing markings on >>firearms and magazines relating to law enforcement or government use may be >>disregarded. >> >>There is no longer any Federal requirement for Federal firearms licensees to >>obtain certain documentation before transferring semiautomatic assault >>weapons and large capacity ammunition feeding devices to government agencies >>or law enforcement officers. However, any records obtained prior to >>September 13, 1994, pertaining to the sale or transfer of semiautomatic >>assault weapons must still be retained for a period of 5 years. See 27 CFR ß >>478.129(f). Moreover, records of importation and manufacture must be >>maintained permanently and licensees must maintain all other acquisition and >>disposition records for 20 years. >> >>Licensees who provided letters of future intent to sell semiautomatic >>assault weapons and large capacity ammunition feeding devices to law >>enforcement agencies and other qualified customers are no longer obligated >>to comply with such letters. >> >>Anyone who illegally possessed, manufactured, or transferred semiautomatic >>assault weapons or large capacity ammunition feeding devices before the bans >>sunset still have violated the law since their possession, manufacture, or >>transfer was illegal at the time. >> >> >>IMPORTATION >> >>The prohibition on the importation of non-sporting firearms under 18 U.S.C. >>section 922(l) and 925(d)(3) still applies. >> >>Importation of large capacity ammunition feeding devices still is covered >>under the Arms Export Control Act. Therefore an approved permit still is >>required to import large capacity magazines. >> >>Temporary importation of semiautomatic assault weapons and large capacity >>magazines is now lawful under the provisions of 27 CFR ß 478.115(d) because >>temporary importations are not subject to the sporting purpose test. >> >>Any importer who has a valid approved Form 6 import permit with a >>restriction related to the assault weapon ban should comply with the >>restriction because the weapons most likely are non-sporting. >> >>Any importer who has a valid approved Form 6 import permit with a >>restriction related to large capacity ammunition feeding devices may >>disregard the restriction. Importers may apply for a new permit if they >>prefer. >> >>ASSEMBLY OF NON-SPORTING SHOTGUNS AND SEMIAUTOMATIC RIFLES FROM IMPORTED >>PARTS >> >>The prohibition on assembly of non-sporting shotguns and semiautomatic >>rifles from imported parts as provided under 18 U.S.C. ß 922(r) and 27 CFR ß >>478.39 still applies. >> >>SENTENCING ENHANCEMENTS >> >>The sentencing enhancements for using semiautomatic assault weapons in a >>crime of violence or drug trafficking crime no longer are in effect. >>Similarly, the sentencing enhancements for semiautomatic assault weapons in >>the U.S. Sentencing Guidelines no longer are in effect. >> >>LAW ENFORCEMENT OFFICERS AND POLICE DEPARTMENTS >> >>Law enforcement officers and police departments who obtained semiautomatic >>assault weapons are no longer required to use such firearms only for >>official use. >> >>Law enforcement officers and police departments may now sell or transfer >>semiautomatic assault weapons to persons who are not prohibited from >>receiving firearms. >> >>Law enforcement officers and police departments may now sell or transfer >>large capacity ammunition feeding devices to anybody. >> >>Signed statements that semiautomatic assault weapons and large capacity >>ammunition feeding devices will be used for official use are no longer >>required to be provided to Federal firearms licensees. >> >>RETIRED LAW ENFORCEMENT OFFICERS >> >>Federal law does not prohibit retiring law enforcement officers from keeping >>semiautomatic assault weapons or large capacity ammunition feeding devices. >> >>Former law enforcement officers who received semiautomatic assault weapons >>on retirement may now transfer those firearms to persons who are not >>prohibited from receiving firearms. Transfer of large capacity ammunition >>feeding devices is no longer restricted. >> >>NATIONAL FIREARMS ACT >> >>All provisions of the National Firearms Act relating to registration and >>transfer of machineguns, short barreled rifles, weapons made from rifles, >>short barreled shotguns, weapons made from shotguns, any other weapons as >>defined in Title 26 U.S.C. section 5845(e), silencers, and destructive >>devices still apply. >> >>Registered silencers can now be attached to semiautomatic rifles and pistols >>without creating a prohibited semiautomatic assault weapon. >> >>USAS-12 and Striker12/Streetsweeper shotguns are still classified as >>destructive devices under ATF Rulings 94-1 and 94-2 and must be possessed >>and transferred in accordance with the NFA. >> >>EFFECT ON STATE LAW >> >>Expiration of the Federal law will not change any provisions of State law or >>local ordinances. Questions concerning State assault weapons restrictions >>should be referred to State and local authorities. [Non-text portions of this message have been removed] 9660 From: Tech Sec Lab Date: Tue Sep 14, 2004 0:23pm Subject: Bugged Again...MI5 Business As Usual http://sinnfein.ie/news/detail/6476 9661 From: Cornolio Date: Tue Sep 14, 2004 3:22am Subject: bluesnarfing and toilet paper Hi, I know it's not real news, but the demonstration I got from 'bluesnarfing' a little while ago was rather astonishing. A lot of bluetooth phones are vulnerable. This hack will allow the phonebook to be read without you knowing it, and even short messages can be read (and in some cases sent!). To read about this type of thing is interesting, but to see it is really impressive. I saw this when visiting O'Reilly's FooCamp a few weeks ago. Two students have made a video clip about the conference, and the bluesnarfing is covered. The clip is online now: http://www.archive.org/movies/movies-details-db.php?collection=opensource_movies&collectionid=EuroFoo_2004 There you can also see me opening a Kensington laptop lock using a roll of toilet paper ;) Greetings, Barry Wels 9662 From: Date: Tue Sep 14, 2004 6:09am Subject: Re: Re: "The Thing" Gentlemen, The cavity transmitters, both passives and semipassives have absolutely nothing in common with RF transponders. Based on a transponder principle such a transmitter would yield a reasonable operating range only with a megawatt or so interrogating transmitter. Needless to say that "RF Powered Transmitters" are also a pure diletant¥s imagination. The irony behind The Thing (Leon Termen¥s Cavity Transmitter) is that no one who has written about it except for Peter Wright has ever seen such a transmitter. NSA museum excibits a non-functional replica, Keith Melton mentions it in all his books but seems having absolutely no idea how The Thing works and even US Abbassador showed The General Assembly not an original Seal but a replica. Regards, A.W. "Michael Puchol" wrote: > >If any of your conspiracy theorists are going to Naples (Napoli) anytime >soon, don't take the ¥citysightseeing¥ bus, as it's tickets use an RFID tag >for control (the black chopper people can track you now!). When you board >the bus, the card is passed some 5cm away from the reader, and a go-no-go is >given. The ticket looks and feels no different than your average cardboard >buss pass in credit card format. Inspection against strong light reveals the >antenna and IC inside. > >Regards, > >Mike > > >----- Original Message ----- >From: "satcommunitfive" >To: >Sent: Tuesday, September 14, 2004 6:02 AM >Subject: [TSCM-L] Re: "The Thing" > > >> >> RFID [passive]tags are using RF to power themselves up -short range >> yes but not if you turn the power up, they use a coil/tuned circuit >> rectify into DC then power up a micro, store it in a small cap and >> send it back with an ID. I think you could do this with a small mic >> and TX. You could even sniff 50/60Hz off the mains and use that mmmmmm >> >> I can hear the black choppers have to go >> >> >> >> >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== TSKS >> Yahoo! Groups Links >> >> >> >> >> >> >> >> > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > __________________________________________________________________ Switch to Netscape Internet Service. As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register Netscape. Just the Net You Need. New! Netscape Toolbar for Internet Explorer Search from anywhere on the Web and block those annoying pop-ups. Download now at http://channels.netscape.com/ns/search/install.jsp 9663 From: George Shaw Date: Tue Sep 14, 2004 3:24pm Subject: RE: Bugged Again...MI5 Business As Usual ROTFL This one is built into a roof truss/beam, looks like several packs of AA batteries and a home brew box of electronic bits. Now what is a large transformer with 240VAC input/ 50V output doing in a AA battery powered bugging device? Feck sake lads they will be showing a microwave oven powered by a watch cell with speakers next. The accused for planting the "device" (MI?) could come up with something just a little better than that, unless it was April Fools Day or they wanted to take the piss. I was actually at the press announcement today and seen it hands on, I am still laughing. -- George Shaw MI3GTO / 2I0GTO " Any Sufficiently Advanced Technology is Indistinguishable from Magic" ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... Fax & Voicemail: +44 (0) 871 242 5365 EchoLink & eQSO (101English) connected 24/7 -----Original Message----- From: Tech Sec Lab [mailto:tscmteam@o...] Sent: 14 September 2004 18:24 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Bugged Again...MI5 Business As Usual http://sinnfein.ie/news/detail/6476 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9664 From: J. Coote Date: Tue Sep 14, 2004 7:29pm Subject: Keyboard Capture I've searched the web and found several reputable spy software apps that will report on the subjects web surfing, email use, files shared, etc. I was also trying to get info on a dongle that attaches between the keyboard plug and jack on back of the computer and presumably records keystrokes (non wireless). Anyone have info on this? Thanks, Jay Los Angeles 9665 From: J. Coote Date: Tue Sep 14, 2004 7:24pm Subject: RE: [OT] but topical Watch your state laws, folks. ....Always wondered what the red star in the California state flag was for ;-) Jay -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: Tuesday, September 14, 2004 10:05 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] [OT] but topical HEAR YE HEAR YE! Since there are a LOT of gun owners in this group..... >>U.S. Department of Justice >> >>Bureau of Alcohol, Tobacco, >>Firearms and Explosives >> >> >> >> >>-------------------------------------------------------------------------- ------ >> >> Washington, DC 20226 >> >> >> >>CHANGES IN FEDERAL LAW AS OF SEPTEMBER 13, 2004 >>RELATING TO >>SEMIAUTOMATIC ASSAULT WEAPONS (SAWs) >> >>AND >> >>LARGE CAPACITY AMMUNITION FEEDING DEVICES (LCAFDs) >> >> >>GENERAL >> >>As of September 13, 2004, the provisions of Public Law 103-322, the Violent >>Crime Control and Law Enforcement Act of 1994, covering semiautomatic >>assault weapons and large capacity ammunition feeding devices are no longer >>in effect. The regulations implementing these provisions also are no longer >>in effect. >> >>Specifically, there is no longer a Federal prohibition on the manufacture, >>transfer, and possession of semiautomatic assault weapons and large capacity >>ammunition feeding devices. >> >>There are no longer any marking requirements for semiautomatic assault >>weapons and large capacity ammunition feeding devices. Existing markings on >>firearms and magazines relating to law enforcement or government use may be >>disregarded. >> >>There is no longer any Federal requirement for Federal firearms licensees to >>obtain certain documentation before transferring semiautomatic assault >>weapons and large capacity ammunition feeding devices to government agencies >>or law enforcement officers. However, any records obtained prior to >>September 13, 1994, pertaining to the sale or transfer of semiautomatic >>assault weapons must still be retained for a period of 5 years. See 27 CFR ß >>478.129(f). Moreover, records of importation and manufacture must be >>maintained permanently and licensees must maintain all other acquisition and >>disposition records for 20 years. >> >>Licensees who provided letters of future intent to sell semiautomatic >>assault weapons and large capacity ammunition feeding devices to law >>enforcement agencies and other qualified customers are no longer obligated >>to comply with such letters. >> >>Anyone who illegally possessed, manufactured, or transferred semiautomatic >>assault weapons or large capacity ammunition feeding devices before the bans >>sunset still have violated the law since their possession, manufacture, or >>transfer was illegal at the time. >> >> >>IMPORTATION >> >>The prohibition on the importation of non-sporting firearms under 18 U.S.C. >>section 922(l) and 925(d)(3) still applies. >> >>Importation of large capacity ammunition feeding devices still is covered >>under the Arms Export Control Act. Therefore an approved permit still is >>required to import large capacity magazines. >> >>Temporary importation of semiautomatic assault weapons and large capacity >>magazines is now lawful under the provisions of 27 CFR ß 478.115(d) because >>temporary importations are not subject to the sporting purpose test. >> >>Any importer who has a valid approved Form 6 import permit with a >>restriction related to the assault weapon ban should comply with the >>restriction because the weapons most likely are non-sporting. >> >>Any importer who has a valid approved Form 6 import permit with a >>restriction related to large capacity ammunition feeding devices may >>disregard the restriction. Importers may apply for a new permit if they >>prefer. >> >>ASSEMBLY OF NON-SPORTING SHOTGUNS AND SEMIAUTOMATIC RIFLES FROM IMPORTED >>PARTS >> >>The prohibition on assembly of non-sporting shotguns and semiautomatic >>rifles from imported parts as provided under 18 U.S.C. ß 922(r) and 27 CFR ß >>478.39 still applies. >> >>SENTENCING ENHANCEMENTS >> >>The sentencing enhancements for using semiautomatic assault weapons in a >>crime of violence or drug trafficking crime no longer are in effect. >>Similarly, the sentencing enhancements for semiautomatic assault weapons in >>the U.S. Sentencing Guidelines no longer are in effect. >> >>LAW ENFORCEMENT OFFICERS AND POLICE DEPARTMENTS >> >>Law enforcement officers and police departments who obtained semiautomatic >>assault weapons are no longer required to use such firearms only for >>official use. >> >>Law enforcement officers and police departments may now sell or transfer >>semiautomatic assault weapons to persons who are not prohibited from >>receiving firearms. >> >>Law enforcement officers and police departments may now sell or transfer >>large capacity ammunition feeding devices to anybody. >> >>Signed statements that semiautomatic assault weapons and large capacity >>ammunition feeding devices will be used for official use are no longer >>required to be provided to Federal firearms licensees. >> >>RETIRED LAW ENFORCEMENT OFFICERS >> >>Federal law does not prohibit retiring law enforcement officers from keeping >>semiautomatic assault weapons or large capacity ammunition feeding devices. >> >>Former law enforcement officers who received semiautomatic assault weapons >>on retirement may now transfer those firearms to persons who are not >>prohibited from receiving firearms. Transfer of large capacity ammunition >>feeding devices is no longer restricted. >> >>NATIONAL FIREARMS ACT >> >>All provisions of the National Firearms Act relating to registration and >>transfer of machineguns, short barreled rifles, weapons made from rifles, >>short barreled shotguns, weapons made from shotguns, any other weapons as >>defined in Title 26 U.S.C. section 5845(e), silencers, and destructive >>devices still apply. >> >>Registered silencers can now be attached to semiautomatic rifles and pistols >>without creating a prohibited semiautomatic assault weapon. >> >>USAS-12 and Striker12/Streetsweeper shotguns are still classified as >>destructive devices under ATF Rulings 94-1 and 94-2 and must be possessed >>and transferred in accordance with the NFA. >> >>EFFECT ON STATE LAW >> >>Expiration of the Federal law will not change any provisions of State law or >>local ordinances. Questions concerning State assault weapons restrictions >>should be referred to State and local authorities. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9666 From: taylortscm@y... Date: Wed Sep 15, 2004 1:44am Subject: Re: Keyboard Capture jay: key stroke are plentifull the one I have used is called keykatcher and has 8k of memory and works as advertised not many legal uses for these products today. dan taylor group "J. Coote" wrote: I've searched the web and found several reputable spy software apps that will report on the subjects web surfing, email use, files shared, etc. I was also trying to get info on a dongle that attaches between the keyboard plug and jack on back of the computer and presumably records keystrokes (non wireless). Anyone have info on this? Thanks, Jay Los Angeles ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? vote.yahoo.com - Register online to vote today! [Non-text portions of this message have been removed] 9667 From: Victor Healey Date: Tue Sep 14, 2004 11:14pm Subject: Sinn Fein 'finds second bug' Sinn Fein 'finds second bug' BBC The device Sinn Fein say they found in offices Sinn Fein has put on display another bug it claims was found in one of its headquarters in west Belfast. According to the party, the listening device was found in a floor at Connolly House in Andersonstown on Monday night. Last week, Sinn Fein put on display another bug which it said had been found at the Belfast home of a woman who works for party president Gerry Adams. It comes as Northern Ireland political parties finalise their positions for this week's intensive political talks at Leeds Castle in Kent. It is understood the latest device was found while work was being carried out at Connolly House. According to the party, the seven-section listening device had two microphones - one directed at an office, the other at a meeting room. Mr Adams said the discovery highlighted the "hypocrisy of the British system" and blamed what he called "securocrats". "The device was constructed so that it could listen to conversations upstairs and in the conference room downstairs. "While republicans always work on the presumption that these devices exist, the use of this very sophisticated bug is a very serious act of bad faith by the British government. "It highlights the continuing hypocrisy of a British system which uses its enormous resources to 'spy' on its political opponents. "It is also evidence of the 'war mentality' among the securocrats who run the NIO and whose only engagement with the peace process is to subvert and undermine it. "The question of course is who authorised this and how many more of these exist." He said the Sinn Fein delegation would bring the device to Leeds Castle to Prime Minister Tony Blair to seek an explanation from him. Political institutions The prime minister's official spokesman said: "We don't comment on such matters. "As for the coming talks, they are about the issues which the prime minister identified two years ago - decommissioning, an end to paramilitarism and a complete commitment to power-sharing." The party has been at the centre of bugging allegations a number of times before. Mr Adams said in December 1999 that one was planted in a car used to transport himself and chief negotiator Martin McGuinness during the Mitchell Review. In April 2003, the Times newspaper published what were said to be transcripts of secretly recorded telephone conversations between Mr McGuinness and senior government officials. The political institutions in Northern Ireland were suspended in October 2002 amid allegations of IRA intelligence gathering at the Northern Ireland Office. The talks at Leeds Castle are aimed at finding a way to restore devolution to Northern Ireland. 9668 From: walshingham2000 Date: Tue Sep 14, 2004 11:26pm Subject: Re: Bugged Again...MI5 Business As Usual..Maybe Not..!! -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --- In TSCM-L@yahoogroups.com, "Tech Sec Lab" wrote: > http://sinnfein.ie/news/detail/6476..>SNIP.. I don't think so...!!! This Radio Shack surveillance system was probably cobbled together by a teenager in the family garage. The CIA MI5 FBI etc...could have done an infinitely better job. Just consider this story media fodder, nice try Jerry ...!! Regards Alan Taylor -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.3.6 (MingW32) - GPGshell v3.22 Comment: PGPBOARD Angeles City Philippines Comment: http://groups.yahoo.com/group/pgpboard/ iD8DBQFBR8Ps7H26LUxZn78RAkcCAJkB530vktcVNVW4OXXanUA6kp5mKwCeNAVx 2JPGDAhFczFD4kJFRKzwGKM= =1xvi -----END PGP SIGNATURE----- 9669 From: Leanardo Date: Wed Sep 15, 2004 6:43am Subject: Re: Keyboard Capture Jay, http://www.keykatcher.com/ This company makes three "flavors" of keystroke loggers; 32, 64, and 128k. Prices run from $69.00 to $99.00 USD. Since this device connects in-line with the users keyboard it will work regardless of OS and or encryption software. Just like in TSCM, this is a huge threat because it is so simple. There are other models and manufactures of keyloggers like this one, even a complete keyboard that to the naked eye is completely normal. Bruce --- In TSCM-L@yahoogroups.com, "J. Coote" wrote: > get info on a > dongle that attaches between the keyboard plug and jack on back of the > computer and presumably records keystrokes (non wireless). Anyone have info > on this? > > Thanks, > Jay > Los Angeles 9670 From: Robin Hunter Date: Wed Sep 15, 2004 2:30am Subject: Re-Bugged Again George, I would not be at all surprised if these recent 'discoveries' of unsophisticated devices were merely a P.R. 'spin' in the run-up to the showing last night on BBC1 of the two documentaries on the Brighton Bomb and The Hunt for the Bomber. Both of which were excellent. regards, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. [Non-text portions of this message have been removed] 9671 From: DATA_4N6_Engineering Date: Wed Sep 15, 2004 6:53am Subject: Re: Re: "The Thing" It worked quite well as did alot of other devices powered by RF, and there are lots of intelligence published on the finds, you just have to have the clearance and training to have access. Thats is one of the draw backs of commericial TSCM. --- Tensor66B@n... wrote: > Gentlemen, > > The cavity transmitters, both passives and > semipassives have > absolutely nothing in common with RF transponders. > Based on > a transponder principle such a transmitter would > yield a > reasonable operating range only with a megawatt or > so > interrogating transmitter. Needless to say that "RF > Powered > Transmitters" are also a pure diletant¥s > imagination. > > The irony behind The Thing (Leon Termen¥s Cavity > Transmitter) > is that no one who has written about it except for > Peter > Wright has ever seen such a transmitter. NSA museum > excibits a non-functional replica, Keith Melton > mentions it > in all his books but seems > having absolutely no idea how The Thing works and > even > US Abbassador showed The General Assembly not an > original > Seal but a replica. > > Regards, > A.W. > > > "Michael Puchol" wrote: > > > > >If any of your conspiracy theorists are going to > Naples (Napoli) anytime > >soon, don't take the ¥citysightseeing¥ bus, as it's > tickets use an RFID tag > >for control (the black chopper people can track you > now!). When you board > >the bus, the card is passed some 5cm away from the > reader, and a go-no-go is > >given. The ticket looks and feels no different than > your average cardboard > >buss pass in credit card format. Inspection against > strong light reveals the > >antenna and IC inside. > > > >Regards, > > > >Mike > > > > > >----- Original Message ----- > >From: "satcommunitfive" > > >To: > >Sent: Tuesday, September 14, 2004 6:02 AM > >Subject: [TSCM-L] Re: "The Thing" > > > > > >> > >> RFID [passive]tags are using RF to power > themselves up -short range > >> yes but not if you turn the power up, they use a > coil/tuned circuit > >> rectify into DC then power up a micro, store it > in a small cap and > >> send it back with an ID. I think you could do > this with a small mic > >> and TX. You could even sniff 50/60Hz off the > mains and use that mmmmmm > >> > >> I can hear the black choppers have to go > >> > >> > >> > >> > >> > >> > ======================================================== > >> TSCM-L Technical Security Mailing List > >> "In a multitude of counselors there is > strength" > >> > >> To subscribe to the TSCM-L mailing list > visit: > >> http://www.yahoogroups.com/community/TSCM-L > >> > >> It is by caffeine alone I set my mind in motion. > >> It is by the juice of Star Bucks that thoughts > acquire speed, > >> the hands acquire shaking, the shaking is a > warning. > >> It is by caffeine alone I set my mind in motion. > >> > =================================================== > TSKS > >> Yahoo! Groups Links > >> > >> > >> > >> > >> > >> > >> > >> > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== > TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > __________________________________________________________________ > Switch to Netscape Internet Service. > As low as $9.95 a month -- Sign up today at > http://isp.netscape.com/register > > Netscape. Just the Net You Need. > > New! Netscape Toolbar for Internet Explorer > Search from anywhere on the Web and block those > annoying pop-ups. > Download now at > http://channels.netscape.com/ns/search/install.jsp > > ===== Jon Asdourian 61 356B Red Porsche Coupe 69 Red MGC GT 63 Burgundy Austin Healey 3000 BJ7 356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC __________________________________ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail 9672 From: satcommunitfive Date: Wed Sep 15, 2004 6:48am Subject: Re: "The Thing" chill out... they are only simular that was point. what makes you think you cant use the power from a RFID type system and use it to power a small oscillator ? If you can power a micro you can power a oscillator &FET MIC etc. funny... the tensor company makes smartcards? http://www.tensor.co.uk/english/smart-cards.htm Im sure they have a passive RF powered transmitter in their safe HA ! --- In TSCM-L@yahoogroups.com, Tensor66B@n... wrote: > Gentlemen, > > The cavity transmitters, both passives and semipassives have > absolutely nothing in common with RF transponders. Based on > a transponder principle such a transmitter would yield a > reasonable operating range only with a megawatt or so > interrogating transmitter. Needless to say that "RF Powered > Transmitters" are also a pure diletant¥s imagination. > > The irony behind The Thing (Leon Termen¥s Cavity Transmitter) > is that no one who has written about it except for Peter > Wright has ever seen such a transmitter. NSA museum > excibits a non-functional replica, Keith Melton mentions it > in all his books but seems > having absolutely no idea how The Thing works and even > US Abbassador showed The General Assembly not an original > Seal but a replica. > > Regards, > A.W. > > > "Michael Puchol" wrote: > > > > >If any of your conspiracy theorists are going to Naples (Napoli) anytime > >soon, don't take the ¥citysightseeing¥ bus, as it's tickets use an RFID tag > >for control (the black chopper people can track you now!). When you board > >the bus, the card is passed some 5cm away from the reader, and a go-no-go is > >given. The ticket looks and feels no different than your average cardboard > >buss pass in credit card format. Inspection against strong light reveals the > >antenna and IC inside. > > > >Regards, > > > >Mike > > > > > >----- Original Message ----- > >From: "satcommunitfive" > >To: > >Sent: Tuesday, September 14, 2004 6:02 AM > >Subject: [TSCM-L] Re: "The Thing" > > > > > >> > >> RFID [passive]tags are using RF to power themselves up -short range > >> yes but not if you turn the power up, they use a coil/tuned circuit > >> rectify into DC then power up a micro, store it in a small cap and > >> send it back with an ID. I think you could do this with a small mic > >> and TX. You could even sniff 50/60Hz off the mains and use that mmmmmm > >> > >> I can hear the black choppers have to go > >> > >> > >> > >> > >> > >> ======================================================== > >> TSCM-L Technical Security Mailing List > >> "In a multitude of counselors there is strength" > >> > >> To subscribe to the TSCM-L mailing list visit: > >> http://www.yahoogroups.com/community/TSCM-L > >> > >> It is by caffeine alone I set my mind in motion. > >> It is by the juice of Star Bucks that thoughts acquire speed, > >> the hands acquire shaking, the shaking is a warning. > >> It is by caffeine alone I set my mind in motion. > >> =================================================== TSKS > >> Yahoo! Groups Links > >> > >> > >> > >> > >> > >> > >> > >> > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > __________________________________________________________________ > Switch to Netscape Internet Service. > As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register > > Netscape. Just the Net You Need. > > New! Netscape Toolbar for Internet Explorer > Search from anywhere on the Web and block those annoying pop-ups. > Download now at http://channels.netscape.com/ns/search/install.jsp 9673 From: satcommunitfive Date: Wed Sep 15, 2004 6:57am Subject: Re: bluesnarfing and toilet paper there are bluetooth Keyboards and mice now ! snooping just got easier. 9674 From: John Young Date: Wed Sep 15, 2004 10:25am Subject: Re: Re-Bugged Again Aren't these clumsy devices standard diversions from the better ones? And some of the better ones server the same for the truly sneaky ones. "The Thing" appears to be a mid-range clumsy to send the anti-Soviets into a frenzy of self-congratulation (or to pretend in a crossback counter-deception). SF is not as clumsy as it appears in public, no more than the Brits. 007 was not merely a smashing pulp fiction success, it doped the addictable spy-worshipers, from heads of state to ex-spy rogues working the rubes. Not always easy to tell who's the Spy Shop and who the Spy Shops are intended to sting. TSCM is a wondrous honey pot. Not as pervasive as the gov-funded beehives issuing tasty bid dissimulatives. 9675 From: satcommunitfive Date: Wed Sep 15, 2004 7:33am Subject: Re: "The Thing" yep -you hit that one one the head ! I nearly got a job with a GOV TSCM lab DAMMM! x1000000 so now I suffer in a primitive RF world like a monkey with soldering iron. the resonant freq of a banana is..... --- In TSCM-L@yahoogroups.com, DATA_4N6_Engineering wrote: > It worked quite well as did alot of other devices > powered by RF, and there are lots of intelligence > published on the finds, you just have to have the > clearance and training to have access. > > Thats is one of the draw backs of commericial TSCM. > > > --- Tensor66B@n... wrote: > > > Gentlemen, > > > > The cavity transmitters, both passives and > > semipassives have > > absolutely nothing in common with RF transponders. > > Based on > > a transponder principle such a transmitter would > > yield a > > reasonable operating range only with a megawatt or > > so > > interrogating transmitter. Needless to say that "RF > > Powered > > Transmitters" are also a pure diletant¥s > > imagination. > > > > The irony behind The Thing (Leon Termen¥s Cavity > > Transmitter) > > is that no one who has written about it except for > > Peter > > Wright has ever seen such a transmitter. NSA museum > > excibits a non-functional replica, Keith Melton > > mentions it > > in all his books but seems > > having absolutely no idea how The Thing works and > > even > > US Abbassador showed The General Assembly not an > > original > > Seal but a replica. > > > > Regards, > > A.W. > > > > > > "Michael Puchol" wrote: > > > > > > > >If any of your conspiracy theorists are going to > > Naples (Napoli) anytime > > >soon, don't take the ¥citysightseeing¥ bus, as it's > > tickets use an RFID tag > > >for control (the black chopper people can track you > > now!). When you board > > >the bus, the card is passed some 5cm away from the > > reader, and a go-no-go is > > >given. The ticket looks and feels no different than > > your average cardboard > > >buss pass in credit card format. Inspection against > > strong light reveals the > > >antenna and IC inside. > > > > > >Regards, > > > > > >Mike > > > > > > > > >----- Original Message ----- > > >From: "satcommunitfive" > > > > >To: > > >Sent: Tuesday, September 14, 2004 6:02 AM > > >Subject: [TSCM-L] Re: "The Thing" > > > > > > > > >> > > >> RFID [passive]tags are using RF to power > > themselves up -short range > > >> yes but not if you turn the power up, they use a > > coil/tuned circuit > > >> rectify into DC then power up a micro, store it > > in a small cap and > > >> send it back with an ID. I think you could do > > this with a small mic > > >> and TX. You could even sniff 50/60Hz off the > > mains and use that mmmmmm > > >> > > >> I can hear the black choppers have to go > > >> > > >> > > >> > > >> > > >> > > >> > > > ======================================================== > > >> TSCM-L Technical Security Mailing List > > >> "In a multitude of counselors there is > > strength" > > >> > > >> To subscribe to the TSCM-L mailing list > > visit: > > >> http://www.yahoogroups.com/community/TSCM-L > > >> > > >> It is by caffeine alone I set my mind in motion. > > >> It is by the juice of Star Bucks that thoughts > > acquire speed, > > >> the hands acquire shaking, the shaking is a > > warning. > > >> It is by caffeine alone I set my mind in motion. > > >> > > =================================================== > > TSKS > > >> Yahoo! Groups Links > > >> > > >> > > >> > > >> > > >> > > >> > > >> > > >> > > > > > > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is > > strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > > the hands acquire shaking, the shaking is a > > warning. > > > It is by caffeine alone I set my mind in motion. > > >=================================================== > > TSKS > > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > > > > > > > > > > __________________________________________________________________ > > Switch to Netscape Internet Service. > > As low as $9.95 a month -- Sign up today at > > http://isp.netscape.com/register > > > > Netscape. Just the Net You Need. > > > > New! Netscape Toolbar for Internet Explorer > > Search from anywhere on the Web and block those > > annoying pop-ups. > > Download now at > > http://channels.netscape.com/ns/search/install.jsp > > > > > > > ===== > Jon Asdourian > 61 356B Red Porsche Coupe > 69 Red MGC GT > 63 Burgundy Austin Healey 3000 BJ7 > 356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC > > > > __________________________________ > Do you Yahoo!? > Yahoo! Mail - 50x more storage than other providers! > http://promotions.yahoo.com/new_mail 9676 From: satcommunitfive Date: Wed Sep 15, 2004 7:40am Subject: Re: Re-Bugged Again so true 9677 From: satcommunitfive Date: Wed Sep 15, 2004 8:07am Subject: Re: Bugged Again...MI5 Business As Usual..Maybe Not..!! ohh yer it did the job tho I would of put a flashing red light on it! 9678 From: Date: Wed Sep 15, 2004 9:44am Subject: Re: Re: "The Thing" Right, we just have to have the clearance to change Maxwell¥s equations. DATA_4N6_Engineering wrote: >It worked quite well as did alot of other devices >powered by RF, and there are lots of intelligence >published on the finds, you just have to have the >clearance and training to have access. > >Thats is one of the draw backs of commericial TSCM. > > >--- Tensor66B@n... wrote: > >> Gentlemen, >> >> The cavity transmitters, both passives and >> semipassives have >> absolutely nothing in common with RF transponders. >> Based on >> a transponder principle such a transmitter would >> yield a >> reasonable operating range only with a megawatt or >> so >> interrogating transmitter. Needless to say that "RF >> Powered >> Transmitters" are also a pure diletant¥s >> imagination. >> >> The irony behind The Thing (Leon Termen¥s Cavity >> Transmitter) >> is that no one who has written about it except for >> Peter >> Wright has ever seen such a transmitter. NSA museum >> excibits a non-functional replica, Keith Melton >> mentions it >> in all his books but seems >> having absolutely no idea how The Thing works and >> even >> US Abbassador showed The General Assembly not an >> original >> Seal but a replica. >> >> Regards, >> A.W. >> >> >> "Michael Puchol" wrote: >> >> > >> >If any of your conspiracy theorists are going to >> Naples (Napoli) anytime >> >soon, don't take the ¥citysightseeing¥ bus, as it's >> tickets use an RFID tag >> >for control (the black chopper people can track you >> now!). When you board >> >the bus, the card is passed some 5cm away from the >> reader, and a go-no-go is >> >given. The ticket looks and feels no different than >> your average cardboard >> >buss pass in credit card format. Inspection against >> strong light reveals the >> >antenna and IC inside. >> > >> >Regards, >> > >> >Mike >> > >> > >> >----- Original Message ----- >> >From: "satcommunitfive" >> >> >To: >> >Sent: Tuesday, September 14, 2004 6:02 AM >> >Subject: [TSCM-L] Re: "The Thing" >> > >> > >> >> >> >> RFID [passive]tags are using RF to power >> themselves up -short range >> >> yes but not if you turn the power up, they use a >> coil/tuned circuit >> >> rectify into DC then power up a micro, store it >> in a small cap and >> >> send it back with an ID. I think you could do >> this with a small mic >> >> and TX. You could even sniff 50/60Hz off the >> mains and use that mmmmmm >> >> >> >> I can hear the black choppers have to go >> >> >> >> >> >> >> >> >> >> >> >> >> >======================================================== >> >> TSCM-L Technical Security Mailing List >> >> "In a multitude of counselors there is >> strength" >> >> >> >> To subscribe to the TSCM-L mailing list >> visit: >> >> http://www.yahoogroups.com/community/TSCM-L >> >> >> >> It is by caffeine alone I set my mind in motion. >> >> It is by the juice of Star Bucks that thoughts >> acquire speed, >> >> the hands acquire shaking, the shaking is a >> warning. >> >> It is by caffeine alone I set my mind in motion. >> >> >> =================================================== >> TSKS >> >> Yahoo! Groups Links >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> > >> > >> > >> > >> >>======================================================== >> > TSCM-L Technical Security Mailing List >> > "In a multitude of counselors there is >> strength" >> > >> > To subscribe to the TSCM-L mailing list visit: >> > http://www.yahoogroups.com/community/TSCM-L >> > >> > It is by caffeine alone I set my mind in motion. >> > It is by the juice of Star Bucks that thoughts >> acquire speed, >> > the hands acquire shaking, the shaking is a >> warning. >> > It is by caffeine alone I set my mind in motion. >> >=================================================== >> TSKS >> >Yahoo! Groups Links >> > >> > >> > >> > >> > >> > >> > >> > >> >> >__________________________________________________________________ >> Switch to Netscape Internet Service. >> As low as $9.95 a month -- Sign up today at >> http://isp.netscape.com/register >> >> Netscape. Just the Net You Need. >> >> New! Netscape Toolbar for Internet Explorer >> Search from anywhere on the Web and block those >> annoying pop-ups. >> Download now at >> http://channels.netscape.com/ns/search/install.jsp >> >> > > >===== >Jon Asdourian >61 356B Red Porsche Coupe >69 Red MGC GT >63 Burgundy Austin Healey 3000 BJ7 >356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC > > > >__________________________________ >Do you Yahoo!? >Yahoo! Mail - 50x more storage than other providers! >http://promotions.yahoo.com/new_mail > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > __________________________________________________________________ Switch to Netscape Internet Service. As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register Netscape. Just the Net You Need. New! Netscape Toolbar for Internet Explorer Search from anywhere on the Web and block those annoying pop-ups. Download now at http://channels.netscape.com/ns/search/install.jsp 9679 From: satcommunitfive Date: Wed Sep 15, 2004 7:24am Subject: Re: "The Thing" I did see a video on the thing [I think] and the engineer did say a frequency. tho it was for TV so who knows if it just crap but the length of the probe on it would of been close to 1/4 wavelegth of what they said. mmmmm cant see why you could not use a sweep generator and a spec-ann on a wide span to check your theory but how much power I cant answer... but if they use a digital system to excite it- might not work it will be waiting for a code. [or be UWB][ultrawideband] my optoelectronics devices are sorta the opposite you can see their sweep every second till they lock -I first though I was bugged ! [their sweeping IF leaks for those not in the know] I am also shure these passive devices exist but these days it would be size of a pin head and be on 99Ghz /UWB and be digital. I`ll poke around my videos if you really want to know the freq of the thing..I was hanging out for info also.... markus From: Dawn Star Date: Thu Sep 14, 2000 0:34pm Subject: TDR the #1 tool "I have said it before and I would again like to say it again that the Tektronix 1500 TDR family CAN NOT BE USED ON LIVE CIRCUITS". jma I have to disagree with this. I've been using my Tektronix 1503 since 1981 and have used it on in excess of five thousand "live" lines ( 48 volts +) with out any down time or failure (ring in's all the time, no problem). It is hands down the number one telephone line evaluation tool. It must be directly coupled to the line. Using this unit I have discovered dozens of taps of all flavors, some in excess of miles down the wire. The skill is in the wave pattern recognition. From my 27 years experience this has been the #1 most powerful sweep tool in the kit. If you don't have one, you should not be in the business. Roger Tolces, Electronic Security. Los Angeles [Non-text portions of this message have been removed] 1443 From: James M. Atkinson, Comm-Eng Date: Thu Sep 14, 2000 1:21pm Subject: Re: TDR the #1 tool At 10:34 AM -0700 9/14/00, Dawn Star wrote: >"I have said it before and I would again like to say it again that the >Tektronix 1500 TDR family CAN NOT BE USED ON LIVE CIRCUITS". > >jma > >I have to disagree with this. I've been using my Tektronix 1503 >since 1981 and have used it on in excess of five thousand "live" >lines ( 48 volts +) with out any down time or failure (ring in's all >the time, no problem). It is hands down the number one telephone >line evaluation tool. It must be directly coupled to the line. Using >this unit I have discovered dozens of taps of all flavors, some in >excess of miles down the wire. The skill is in the wave pattern >recognition. From my 27 years experience this has been the #1 most >powerful sweep tool in the kit. If you don't have one, you should >not be in the business. > Roger Tolces, Electronic >Security. Los Angeles Ah, Tektronix OFFICIALLY says that you should not apply loop voltages to the 1502 or 1503 TDR, and that to do so will damage it (but then of course it could just be a clever ploy on their end to sell more equipment). Seriously, get out the schematic and look up the component values yourself. It is quite obvious that the Tek TDR can not withstand loop voltages. It is also quite evident that the sampler circuit will saturate on a wet line. If you use it on live lines then at least add a decoupling cap and some sacrificial diodes to limit what hits the front end of the sampler circuit. -jma PS: In my humble opinion the Spectrum Analyzer is by far the most valuable TSCM instrument. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1444 From: A Grudko Date: Thu Sep 14, 2000 2:32pm Subject: Re: Blowing my own whistle ----- Original Message ----- From: Steve Whitehead > Congratulations. > Steve Whitehead M.I.S. (SA) Thanks Steve. We are looking for speakers at our SCIP breakfasts in Centurion - are you interested? Andy Grudko Johannesburg 1445 From: A Grudko Date: Thu Sep 14, 2000 1:58pm Subject: Re: Blowing my own whistle ----- Original Message ----- > Please accept my complements on a job well done. > [Feel free to post a copy of the paper if you feel so inclined] Thank you JMA, I'd be happy to do so but the text refers to 32 .bmp illustrations of over half a meg each. I'll try and reformat it. Andy Grudko Johannesburg 1446 From: A Grudko Date: Thu Sep 14, 2000 2:27pm Subject: Re: Blowing my own whistle ----- Original Message ----- From: > 2 papers I submitted on covert electronic surveillance and technical counter-surveillance. > >>>> If they're so good, why don't you post them here? Hi, MACCFound (no other name given) Firstly, the papers are books which are proprietary material publicised under copyright by a separate company in 1996. They have been available for 4 years from local outlets or by mail order by visiting www.grudko.com and going to the References page. The 3 publications (the third is on locksmithing techniques) are listed there with ordering details. They are available at libraries throughout South Africa. They are: Counter Surveillance Techniques - ISBN 0-620-18169-9 Covert Electronic Surveillance - ISBN 0-620-18168-0 Secondly they consist of 2 x approximately 60 kb of text and of about 15 megs of .bmp illustrations, a file size which we would not presume to send to the 600 or so members of this list. Thirdly, I have not seen anyone else post such documents on this list, and I assume we have other published members. If such publication is normal practice I will be happy to conform. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), SAIS, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1447 From: Date: Thu Sep 14, 2000 1:34pm Subject: Re: Blowing my own whistle In a message dated 9/14/00 3:21:40 PM Pacific Daylight Time, agrudko@i... writes: << Thirdly, I have not seen anyone else post such documents on this list, and I assume we have other published members. If such publication is normal practice I will be happy to conform. >> Relax, you said they were papers not books. If you would be so kind as to email me with the publishers address, I'll be more than happy to purchase them. Unlike some of our brethren, I don't know everything. I'm always seeking to learn more and I'm glad to pay for the right stuff. MACCFound@a... 1448 From: James M. Atkinson, Comm-Eng Date: Thu Sep 14, 2000 2:24pm Subject: "OLD" IS WHEN "OLD" IS WHEN..... "OLD" IS WHEN.....Your friends compliment you on your new alligator shoes and you're barefoot. "OLD" IS WHEN..... A sexy babe catches your fancy and your pacemaker opens the garage door. "OLD" IS WHEN..... Going bra-less pulls all the wrinkles out of your face. "OLD" IS WHEN..... You don't care where your spouse goes, just as long as you don't have to go along. "OLD" IS WHEN..... When you are cautioned to slow down by the doctor instead of by the police. "OLD" IS WHEN..... "Getting a little action" means I don't need to take any fiber today. "OLD" IS WHEN..... "Getting lucky" means you find your car in the parking lot. "OLD" IS WHEN..... An "all nighter" means not getting up to pee. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1449 From: James M. Atkinson, Comm-Eng Date: Thu Sep 14, 2000 7:12pm Subject: A NATIONAL EMBARRASSMENT A NATIONAL EMBARRASSMENT http://www.chicagotribune.com/news/editorial/printedition/article/0,26 69,SAV-0009140220,FF.html September 14, 2000 A federal judge sentenced Wen Ho Lee to time served Wednesday, ending the scientist's incarceration after 278 days. It should have been the federal government on the docket. U.S. District Judge James Parker, who has presided over the case, lambasted the government for "the unfair manner" in which it treated Lee. The Departments of Justice and Energy, the judge declared, "have embarrassed our nation and each of us who is a citizen of it." Yes, they have. Lee's arrest last year was supposed to have bagged the villain in one of the most damaging espionage cases of the nuclear age. Lee, a physicist at Los Alamos National Laboratory, was suspected of giving the Chinese government top-secret information about nearly every weapon in the U.S. nuclear arsenal, including our most advanced warhead. He faced life in prison. No one hearing those shocking early claims would have thought that Lee would go free with a slap on the wrist. But that is exactly what happened. Lee was never charged with espionage. He was indicted last December and held in harsh conditions for nine months on 59 felony counts related to alleged mishandling of government secrets. But now the Justice Department has accepted a plea bargain in which he admitted to just one charge--improperly transferring classified data to an unsecured computer. The other 58 counts were dropped, with Lee sentenced to the time he has already served and then set free. Early on, the case against Lee failed to live up to its original billing, and in recent months it almost completely disintegrated. The government changed its theory, saying that Lee intended to use the material to find a new job. An FBI agent admitted that he testified inaccurately about Lee's conduct, falsely making him appear deceptive. A former top scientist at Los Alamos testified that 99 percent of the information Lee downloaded was already public--and that none of it would have damaged national security. After the plea bargain came to light, the government tried to put the best face on the outcome, boasting that it would get a felony conviction and the assistance it needed from Lee to verify what really happened to the computer tapes containing the downloaded data. But the deal is hardly adequate to justify the zealous pursuit and long incarceration of Lee. What started out as a major spy scandal has turned into a case of gross bureaucratic misbehavior. The government faces a storm of criticism that it unfairly targeted Lee because of his Chinese ancestry. This whole matter was a disgrace. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1450 From: James M. Atkinson, Comm-Eng Date: Thu Sep 14, 2000 7:13pm Subject: Free man Wen Ho Lee: "I survived" Free man Wen Ho Lee: "I survived" http://salon.com/news/wire/2000/09/14/free_lee/index.html By Richard Benke Sept. 14, 2000 | ALBUQUERQUE, N.M. (AP) -- Wen Ho Lee celebrated at home with family and friends hours after he was set free with an apology from a judge who said the former Los Alamos scientist had been "terribly wronged." Lee's release under a plea deal Wednesday came nine months after he was put in solitary confinement and branded a threat to national security. "The last nine months were pretty tough for me," Lee said, "but I survived." In his tongue-lashing of government officials, U.S. District Judge James Parker said he was angered over having been misled into believing the 60-year-old nuclear scientist was a danger to national security if released on bail. "I sincerely apologize to you, Dr. Lee, for the unfair manner in which you were held in custody by the executive branch," said Parker, who singled out the Energy and Justice departments. "They have embarrassed our entire nation and each of us who is a citizen of it," he said. The judge's stinging criticism came even as he signed off on the agreement that freed Lee, who pleaded guilty to one count of mishandling nuclear secrets as the government all but abandoned its crumbling case. Under terms of the plea bargain, the 58 other counts of breaching national security Lee faced were dropped and he was sentenced to 278 days -- essentially the time he's served since his arrest last December. The White House declined to comment on the judge's criticism. "It is time to close this chapter, find out what happened to the missing tapes and move on," spokesman Jake Siewert said. In Washington, the Energy Department issued a one-paragraph statement: "Dr. Lee pleaded guilty to a felony admitting that he mishandled sensitive classified information. That speaks for itself." Attorney General Janet Reno and FBI Director Louis Freeh defended the government's dogged prosecution of Lee, saying it acted in the interests of protecting national security. "Director Freeh and I shoulder the awesome responsibility of protecting the national security," Reno said. "It is a responsibility that both of us take very seriously." In court Wednesday, Lee, a Taiwanese-born naturalized U.S. citizen, read a statement in which he admitted using an unsecure computer to download a national-defense document onto a tape. He said he knew his possession of the tape outside of the top-secret area where he worked was unauthorized. Lee agreed to cooperate with the government and tell them everything he knows about seven missing tapes, a move federal officials say was the turning point in 2-month-old plea discussions. "If at any time we believe he is not being truthful, we can seek to void the agreement and prosecute the case to the full extent of the law," Reno said. Defense attorney Mark Holscher said he was confident Lee's cooperation would satisfy the government and lay those issues to rest. "We are elated that Dr. Lee is having his name cleared of the false allegations that he ever intended to injure the country for which he spent 20 years designing codes to protect," Holscher said. "We fully intend to cooperate completely with the government." The investigation began as an offshoot of a Chinese espionage case, with government attorneys making dire accusations that Lee had stolen the "crown jewels" of U.S. nuclear weaponry science with the intent of handing them over to a foreign power. At the time, the government claimed the information could alter the global balance of power. Lee has said the tapes were destroyed. The case began disintegrating last month at a renewed bail hearing, with one embarrassing turn after another for the government. Defense experts disputed the claim that the data contained vital defense secrets. The government was forced to acknowledge that the material was classified "restricted" rather than secret. And a defense expert testified that "99 percent" of the material was already available to the public. Additionally, an FBI agent whose word was key in denying Lee bail acknowledged giving incorrect testimony that made the scientist appear deceptive. "I believe you were terribly wronged by being held in custody pretrial in the Santa Fe County Detention Center under demeaning, unnecessarily punitive conditions," the judge said Wednesday. Parker said he was only sorry the plea agreement prevented disclosure of information that would have shed light on the reasons for Lee's detention. Lee's supporters have said he was unfairly singled out as a Chinese-American. "Dr. Lee, you have pled guilty to a serious crime. It's a felony offense. For that, you deserved to be punished," the judge said Wednesday. "In my opinion, you have been punished harshly, both by the severe conditions of pretrial confinement and by the fact that you have lost valuable rights as a citizen." The settlement does not affect a civil lawsuit filed by Lee and his wife, Sylvia, alleging his privacy was violated by the government, attorney Brian Sun said. The lawsuit is on hold in Washington, D.C., federal court, awaiting a decision by the Lees whether to proceed. Sen. Arlen Specter, R-Pa., said he will resume a Senate subcommittee investigation that he began and then suspended. Lee, who spent the last nine months isolated from everyone but his jailers and lawyers, was cheered on by supporters as he left the courtroom Wednesday alongside his family. "I'm very happy to go home with my wife and children today," he said. With a chuckle, the diminutive graying scientist added: "The next few days, I'm going fishing." ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1451 From: James M. Atkinson, Comm-Eng Date: Thu Sep 14, 2000 7:14pm Subject: Scientist 'terribly wronged': Judge Sep 14, 10:50 EDT Scientist 'terribly wronged': Judge http://www.thestar.com/editorial/updates/intlnews/200009150_SCIENTIST-SE.html ALBUQUERQUE, N.M. (AP) - Accused spy Wen Ho Lee relaxed at home with family and friends today after being set free with an apology by a judge who lambasted the government's handling of the case, saying Lee had been ''terribly wronged.'' Lee's release under a plea deal Wednesday came nine months after he was branded a threat to national security and put in solitary confinement. ''The last nine months were pretty tough for me, but I survived,'' Lee said after his release. In his tongue-lashing of government officials, U.S. district court Judge James Parker said he was angered over having been misled into believing the 60-year-old nuclear scientist was a danger to national security if released on bail. ''I sincerely apologize to you, Dr. Lee, for the unfair manner in which you were held in custody by the executive branch,'' said Parker, who singled out the Energy and Justice departments. ''They have embarrassed our entire nation and each of us who is a citizen of it.'' The judge's stinging criticism came even as he signed off on the agreement that freed Lee, who pleaded guilty to one count of mishandling nuclear secrets as the government all but abandoned its crumbling case. Under terms of the plea bargain, the other 58 counts of breaching national security Lee faced were dropped and he was sentenced to 278 days - essentially the time he's served since his arrest last December. In Washington, the Energy Department issued a one-paragraph statement: ''Dr. Lee pleaded guilty to a felony admitting that he mishandled sensitive classified information. That speaks for itself.'' In court Wednesday, Lee, a Taiwanese-born naturalized U.S. citizen, read a statement in which he admitted using an unsecure computer to download a national-defence document on to a tape. He said he knew his possession of the tape outside of the top-secret area where he worked was unauthorized. Lee agreed to co-operate with the government and tell them everything he knows about seven missing tapes, a move federal officials say was the turning point in two-month-old plea discussions. ''If at any time we believe he is not being truthful, we can seek to void the agreement and prosecute the case to the full extent of the law,'' Attorney General Janet Reno said. Defence lawyer Mark Holscher said he was confident Lee's co-operation would satisfy the government and lay those issues to rest. ''We are elated that Dr. Lee is having his name cleared of the false allegations that he ever intended to injure the country for which he spent 20 years designing codes to protect,'' Holscher said. ''We fully intend to co-operate completely with the government.'' The investigation began as an offshoot of a Chinese espionage case, with government lawyers making dire accusations that Lee had stolen the ''crown jewels'' of U.S. nuclear weaponry science with the intent of handing them over to a foreign power. At the time, the government claimed the information could alter the global balance of power. The case began disintegrating last month at a renewed bail hearing, with one embarrassing turn after another for the government. Defence experts disputed the claim that the data contained vital defence secrets. The government was forced to acknowledge that the material was classified ''restricted'' rather than secret. And a defence expert testified that ''99 per cent'' of the material was already available to the public. Additionally, an FBI agent whose word was key in denying Lee bail acknowledged giving incorrect testimony that made the scientist appear deceptive. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1452 From: James M. Atkinson, Comm-Eng Date: Fri Sep 15, 2000 9:00am Subject: A Case of Shame Thursday, September 14, 2000 A Case of Shame http://www.latimes.com/news/comment/20000914/t000086680.html Wen Ho Lee suffered an ordeal by slander, based almost entirely on a bigoted assumption. Washington has troubling questions to answer. The government's case against nuclear scientist Wen Ho Lee has collapsed utterly and ignominiously, leaving a legacy of deeply troubling questions about federal investigative methods and the Justice Department's callous indifference to a suspect's civil rights. An agreement between prosecutors and Lee's lawyers has led to 58 of the 59 felony counts against the former Los Alamos National Laboratory physicist being dropped. Lee pleaded guilty Wednesday to one count of unlawfully downloading national defense information--a far cry from sending nuclear secrets to China or others. Even former CIA head John M. Deutch is being investigated for similar downloading infractions. Instead of facing life in prison upon conviction of any of the 39 most serious charges against him, Lee has been sentenced to the nine months he spent behind bars. Just days ago the government ominously insisted that national security would be imperiled if Lee were granted bail. That putative threat suddenly evaporated. On Wednesday, Lee was a free man. He left court after hearing Judge James A. Parker's warranted apology for the "unfair manner" in which he had been treated and the judge's no less merited excoriation of the Justice and Energy departments for having "embarrassed this entire nation and each of us who is a citizen of it." The case against Lee grew out of revelations of extraordinarily lax security at Los Alamos and the possibility that China had acquired some major U.S. nuclear secrets. But the inquiry took an ugly twist as federal investigators focused their efforts on trying to find evidence to support the conclusion they had already reached, that Lee had to be the guilty party. Through leaks, Lee was vilified as a master spy responsible for stealing the "crown jewels" of U.S. nuclear weapons designs. It was an ordeal by slander, based not on tangible evidence but almost entirely on a bigoted assumption: If China was spying, surely it must be doing so through ethnic Chinese. But in the end Lee, a naturalized American citizen born in Taiwan, was never charged with espionage, because while espionage might be inferred it could not be proved or even discovered. The government was unable to sustain a single allegation that Lee had acted "with intent to harm the United States." Lee did break the law by mishandling classified data. As part of his agreement with the government he will cooperate with federal investigators as they seek to confirm his claim that he destroyed seven missing tapes of computer data. There's no question that Lee became a prime suspect chiefly because of racist suspicions. And there's no doubt, as the FBI's lead investigator conceded, that during bail hearings the prosecution misled the court about the solidity of its case against Lee. These things must not be forgotten. The government bungled this case miserably. And its treatment of Lee, who was kept in solitary confinement and usually shackled hand and foot whenever he was let out of his cell, was inexcusable. At one point a government source admitted that Lee could be convicted only if he confessed. The treatment he suffered was aimed at forcing that confession. When such things happen in China, as they do all the time, Beijing is rightly castigated by the West. It's a greater cause for outrage when they happen in the U.S. justice system, which holds itself to be fair to all. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1453 From: Date: Thu Sep 14, 2000 1:39pm Subject: Re: TDR the #1 tool In my humble opinion the human is the most valuable TSCM instrument ;-) Janis -jma PS: In my humble opinion the Spectrum Analyzer is by far the most valuable TSCM instrument. 1454 From: Rocco Rosano Date: Thu Sep 14, 2000 10:20pm Subject: Re: Free man Wen Ho Lee: "I survived" Jim, et al: The original investigation, as everybody knows, was to determine the source of the W-88 material compromise. The SSCI and the FBI really never addressed that question. During the course of the W-88 Compromise Investigation - and right under the nose of the FBI, a second serious compromise may have occured. The SSCI and the FBI were told by multiple athorities in the field of counterintelligence (CI) and counterespionage (CE) that certain events would occur. One of them even predicted the return of the missing hard drives at Los Alamos and the reaction of the FBI (et al, DOE CI). This was even sent directly to the SSCI prior to the discovery. I am in a position to release an portion of an e-mail that was sent to Senator Shelby (Chairman of the SSCI) on the day before the disk drives where found. In part, this e-mail said: """ a) During the Discussion of "Responsibility" and "Accountability". The Director of Counterintelligence (Mr Edward Curran) tried to stress the point that he was FBI Counterintelligence detailed to DOE and not directly responsible for the security aspect. This attitude is NOT positive at all. In my opinion, he should be dismissed from his post for two reasons. 1) The heart and soul of CI is to detect, exploit and neutralize foreign intelligence BEFORE they get the target goods. He attitude that "it is not my job" is politically and practically unsound. Security is business of every citizen. We ALL contribute to the improvement of security and the protection of National Assets. While, technically speaking, Mr Curran may be correct, his attitude demonstrates the absolute bureaucratic hair splitting that CI Agencies across the board often exhibit. No CI Activity should be allowed to use "its not my job" as a defense and be able to wash their hands of responsibility. 2) It is immediately obvious to the casual observer that the FBI and the surrogate DOE Counterintelligence Program posed no deterrent factor in the neutralizing a successful foreign intelligence operation. Without regard to whether the FBI has the right man in the Wen Ho Lee investigation (which appears to be in doubt), FIS was about to walk through several layers of CI and Security to effect a successful capture of sensitive information on a mass storage media device. b) The Committees (both Intelligence & Energy) put a enormous amount of trust and confidence in the promised word of senior agency executives (DOJ, FBI, DOE) when they (the committees) delayed mandating action that COULD have prevented this event. The committees must remember that "traditional" law enforcement and security professionals do not think in the same "asymmetrical" fashion espionage operatives. An asymmetrical operative may very well bring back the Hard Drive units soon (to be found) in an effort to confuse officials. This will accomplish three things. It will (1) lull the Intelligence & Energy Committee members into a sense of relief that the information has not been compromised; (2) it will afford the opportunity for the DOJ, FBI and DOE to mitigate the seriousness of the incident; and (3) it will relieves some of the intense pressure to search for the guilty who obviously are still operating within the facility."" The SSCI knew, for some time that the FBI and DoJ where looking for an acceptable scapgoat in order to lay the compromise to rest. They knew that the current FBI CI Staff was not up to the task of rooting out any measure of a foreign intelligence service (FIS) operation and that neither the FBI or the DOE surrogate CI Program had the ability to successfully detect, exploit or neutralize (DEN) and active FIS operation with several years - on the ground exereince operating in a US secure denied area. They (the SSCI) have been further told that the source of the compromise (in all probability) was not Los Alamos, bu the SRS facility. It has been know by US CI that the Chinese are in possession of computer software that detailed the security arrangements of the SRS facility. This would have been essential elements of information for a successful penetration operation. Yet, the FBI specifically chose to devote a vast majority of its resources toward Wen Ho Lee and the Los Alamos kaserne. Neither the SSCI or the FBI have demonstrated much aptitude for conducting CI operations against an FIS. Rocco Reynoldsburg, Ohio 1455 From: Larry Nevin Date: Thu Sep 14, 2000 4:57pm Subject: Professional organizations I'm sure there are professional organizations that TSCM sweepers belong to. Can any one give me some referrals to check into? Thanks Larry J. Nevin Fire In The Hole Inc. ljn35945@y... ===== "EXPECT MORE THAN OTHERS THINK POSSIBLE!" __________________________________________________ Do You Yahoo!? Yahoo! Mail - Free email you can access from anywhere! http://mail.yahoo.com/ 1456 From: Steve Uhrig Date: Fri Sep 15, 2000 10:03am Subject: Re: Professional organizations Once upon a midnight dreary, Larry Nevin pondered, weak and weary: > I'm sure there are professional organizations that > TSCM sweepers belong to. Can any one give me some > referrals to check into? There are two organizations. One is for real, and competent and experienced sweepers may be invited to join by a current member, subject to passing peer review and brief investigation. Brief info (deliberately vague) is available at: http://www.espionbusiness.com/aboutbecca.ivnu List: please do *not* ask for additional details on the above organization, either on the list or privately. They will not be discussed. Potentially qualified members will be contacted. The other (maybe more than one) are ego organizations open to anyone willing to pay the membership fee and get the certificate, wallet card and gold sweeper badge. They also may be offering a secret decoder ring. The next time we speak on the phone I will give you more details. The genuine group generally keeps a low profile below the noise level. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1457 From: the cynic Date: Fri Sep 15, 2000 1:14pm Subject: Re: Tektronix 1502 and 1503 TDR's - Gentle Reminder Thanks for such an informed reply. So I spoke prematurely, without a doubt. In a hypothetical situation, when OPFOR has Physical access to a PBX thats, without a doubt, a pretty bad, um evil, possibility that should be taken seriously. I was thinking more along the lines of an eavesdropper gaining access to the actual copper pairs that carry the T1 well outside of the customers premises. What you outlined is a rather frightening possibility. End lesson is that one can never be too paranoid (or informed), I guess. (shame on me for thinking otherwise) One thing, when testing the cable for physical taps on a T1 line, while its live, is there any danger of breaking Telco end line card equipment ? Thanks. 1458 From: James M. Atkinson, Comm-Eng Date: Fri Sep 15, 2000 0:44pm Subject: Re: Tektronix 1502 and 1503 TDR's - Gentle Reminder At 1:14 PM -0500 9/15/00, the cynic wrote: >One thing, when testing the cable for physical taps on a T1 line, >while its live, >is there any danger of breaking Telco end line card equipment ? > >Thanks. Not it your use high impedance isolation of over say 10 megaohms, and keep your TDR signals 40 dB down from the main signal. Damaging the line card is not so much the issue as is disturbing the data on the circuits, and thus alerting the eavesdropper prematurely. Of course eventually we will have to create an open at the CO for our megaohm tests, but we don't do that until well into the alerting stage. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1459 From: James M. Atkinson, Comm-Eng Date: Fri Sep 15, 2000 3:19pm Subject: Darwin Award - Plugged-Up Pachyderm THE WINNER: PADERBORN, GERMANY - Overzealous zookeeper Friedrich Riesfeldt fed his constipated elephant Stefan 22 doses of animal laxative and more than a bushel of berries, figs and prunes before the plugged-up pachyderm finally let fly-and suffocated the keeper under 200 pounds of poop! Investigators say ill-fated Friedrich, 46, was attempting to give the ailing elephant an olive oil enema when the relieved beast unloaded on him like a dump truck full of mud. "The sheer force of the elephant's unexpected defecation knocked Mr. Riesfeldt to the ground, where he struck his head on a rock and lay unconscious as the elephant continued to evacuate his bowels on top of him," said flabbergasted Paderborn police detective Erik Dern. "With no one there to help him, he lay under all that dung for at least an hour before a watchman came along, and during that time he suffocated. It seems to be just one of those freak accidents that happen." ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= [Non-text portions of this message have been removed] 1460 From: Date: Fri Sep 15, 2000 3:30pm Subject: Wen Ho Lee case Rocorro; Great analysis of the Wen Ho Lee case ! it is truly unfortunate that blundering of nuclear secrets ,as such, is a recurring theme lately in the DOE and State Dept. The horse is out of the barn ,now we need to increase security measures to prevent re occurences . interesting to note that your analysis suggests the culprit is still at large in the Los Alamos facility. At this point ,nothing would surprise me. Please e-mail your concerns to the appropriate Government officials. Somebody ,at the highest levels, must give a "rip". It is truly a shame that security measures have been compromised. When the forest fires raged outside of Los Alamos ,it appeared to me that covert action diversion was in place ,however i failed to notify the proper officials of my unrest. Inaction breeds contempt. Currently,we must stop pointing fingers of accountability and get down to the business of securing these facilities. You have to hand it to the Chinese,though, for temporarily hoodwinking our defense establishment. God bless America! HAVE A GREAT DAY !!! 1461 From: James M. Atkinson, Comm-Eng Date: Fri Sep 15, 2000 3:55pm Subject: Re: Wen Ho Lee case Since I deal with hundreds of TSCM'ers a month from all over the world I get to hear quite a few views on the DOE incident from agencies outside of the U.S. The general feeling (and targeting) is that DOE has the biggest holes in counter-intelligence then any other U.S. Intelligence Agency, and that NASA has the second biggest holes (which in turn creates leaks regarding the NRO projects). In more then a few cases I have been told (by people who should know) that their government intelligence agencies (FIS) specifically targets DOE and NASA due to the lack of effective security, but also because it is fairly easy to turn an academic (compared to a soldier or DOD employee). Also, an organization with a heavy bias towards academics tends not to take security seriously, and perceive it as an major annoyance instead of a critical necessity. Instead of accepting a "security control" academics try to "out think" the vulnerability, and as a result their arrogance creates an even greater vulnerability. -jma At 4:30 PM -0400 9/15/00, patedwards@w... wrote: > >Rocorro; >Great analysis of the Wen Ho Lee case ! >it is truly unfortunate that blundering of nuclear secrets ,as such, >is a recurring theme lately in the DOE and State Dept. >The horse is out of the barn ,now we need > to increase security measures to prevent re occurences . interesting >to note that your analysis suggests the culprit is still at large in >the Los Alamos facility. > > At this point ,nothing would surprise me. >Please e-mail your concerns to the appropriate Government officials. >Somebody ,at the highest levels, must give a "rip". It is truly a >shame that security measures have been compromised. When the >forest fires >raged outside of Los Alamos ,it appeared to me that covert action >diversion was in place ,however i failed to notify the proper officials >of my unrest. >Inaction breeds contempt. > >Currently,we must stop pointing fingers >of accountability and get down to the business of securing these >facilities. > >You have to hand it to the Chinese,though, for temporarily hoodwinking >our defense establishment. > >God bless America! ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1462 From: Steve Whitehead Date: Fri Sep 15, 2000 1:56pm Subject: Re: Professional organizations Steve Uhrig wrote There are two organizations. One is for real, and competent and experienced sweepers may be invited to join by a current member, subject to passing peer review and brief investigation. Brief info (deliberately vague) is available at http://www.espionbusiness.com/aboutbecca.ivnu List: please do *not* ask for additional details on the above organization, either on the list or privately. They will not be discussed. Potentially qualified members will be contacted. RESPONSE About a year ago a serving senior member of our National Intelligence Agency (Government) attempted in his spare time to peddle BECCA/TSA TSCM courses/membership in South Africa with a partner in the commercial sector who also sells TSCM equipment. We had a brief look at the correspondence courses and were not really impressed. He is still a member of the Government organisation and I will refrain from naming him as it is an offence in our country to identify or reveal the identity of serving members. My question is, why all the secrecy? You said that potential members will be contacted? What criteria is used in selecting members? The little we have seen about the courses are very basic. I stand to be corrected, but I was just wondering what selection criteria was used regarding the South African Becca/TSA representatives?, unless they were acting without the knowledge permission of BECCA/TSA. No flames intended. As a matter of fact a respected USA TSCM professional wrote to me in a private e-mail about BECCA just yesterday and promised to let me have some of the BECCA material. Steve Whitehead Managing Member TSCM Services South Africa e-mail sceptre@m... url http://www.tscm.co.za 1463 From: Virgin Main Date: Fri Sep 15, 2000 11:10am Subject: RE: Blowing my own whistle Andy I don't know about the rest of the guys, but you impress the hell out of me. jc 1464 From: Mike Dever Date: Fri Sep 15, 2000 4:19pm Subject: Re: TDR the #1 tool I agree with Janis! IMHO no amount of electronics compares to a well trained set of human senses. Regards -- Michael J. Dever CPP Senior Engineer Dever Clark & Associates GPO Box 1163 Canberra 2601 Australia Telephone: (02) 6254 5337 Telefax: (02) 6278 4020 E-mail: deverclark@b... > From: Janis.Balklavs-Grinhofs@l... > Reply-To: TSCM-L@egroups.com > Date: Thu, 14 Sep 2000 20:39:49 +0200 > To: TSCM-L@egroups.com > Subject: Re: [TSCM-L] TDR the #1 tool > > > > In my humble opinion the human is the most valuable TSCM instrument ;-) > > Janis > > > > > > > > > > > > -jma > > > PS: In my humble opinion the Spectrum Analyzer is by far the most > valuable TSCM instrument. > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1465 From: Guy Urbina Date: Fri Sep 15, 2000 5:08pm Subject: RE: Wen Ho Lee case -----Original Message----- From: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] Sent: Friday, September 15, 2000 1:56 PM To: TSCM-L@egroups.com Subject: Re: [TSCM-L] Wen Ho Lee case Since I deal with hundreds of TSCM'ers a month from all over the world I get to hear quite a few views on the DOE incident from agencies outside of the U.S. The general feeling (and targeting) is that DOE has the biggest holes in counter-intelligence then any other U.S. Intelligence Agency, and that NASA has the second biggest holes (which in turn creates leaks regarding the NRO projects). In more then a few cases I have been told (by people who should know) that their government intelligence agencies (FIS) specifically targets DOE and NASA due to the lack of effective security, but also because it is fairly easy to turn an academic (compared to a soldier or DOD employee). Also, an organization with a heavy bias towards academics tends not to take security seriously, and perceive it as an major annoyance instead of a critical necessity. Instead of accepting a "security control" academics try to "out think" the vulnerability, and as a result their arrogance creates an even greater vulnerability. -jma --James et al, As a former employee of the national labs, I concur on your opinion regarding the lab's lackadaisical attitude towards security. The scientists, hardworking, brilliant and patriotic they may be, just didn't want to have to bother with security. They held it in contempt and a with a bit of arrogance. These guys were super focused individuals and the most important thing on their minds is getting a good data point. (I'm serious!) I know brilliant minds that didn't tie their shoes, didn't take a shower, wore the same clothes all week and practically lived in their office. Their heads are in their equations. The college level atmosphere didn't help either. Everybody shares with everybody and everybody is a colleague. However, I blame the current administration for weakening the operational and physical security of the labs to a laughable, if not an outrageous level during the years of 92 to 96. They stopped random vehicle searches. They opened up areas of the lab that were previously Top Secret and downgraded them to Confidential. There were administrative controls on upgrading and downgrading rooms from TS to S. The only physical barriers were Placards. (Mind you this was when the vaults were locked and the area was secure for TS conversations.) They only had a team of three TSCM personnel for a lab with over 8000 people and square mile of buildings. (LLNL) (good bunch of guys, but need more intensive training, but that's not their fault, that's the lab budget) They changed the badge colors from green for TS, red for C and Yellow for S to all one color so everyone with a different clearance looked all the same. When we had our female DOE secretary, (her name escapes me right now) she gave the press a classified document showing a diagram of a w-87 warhead, before shocked DOE employees warned her and had to take it back. She would sometimes bring uncleared personnel with her on her "trips" to classified DOE SCIF facilities. (Pantex, Manzano range, NTS...) I could list more...but I start getting mad... Ironically, it took the Chinese stealing our technology of our W88 to finally get some security back into the facilities. Physical security is only good upto a point, and a mindset of being security conscious is what is needed at the national labs to effect a change. I personally feel sorry for Wen Ho Lee, he was singled out I think, and I know other scientists who did the same thing as he did as far as taking SRD out of a classified computer and putting in your personal office computer because it was easy and the atmosphere of security laziness created no accountability. I saw a disparity between what Deutch did and how Lee was being vilified. anyway, that's my two centavos worth...have a great weekend guys... -Guy 1466 From: James M. Atkinson, Comm-Eng Date: Fri Sep 15, 2000 8:13pm Subject: RE: Wen Ho Lee case At 3:08 PM -0700 9/15/00, Guy Urbina wrote: >As a former employee of the national labs, I concur on your opinion >regarding the lab's lackadaisical attitude towards security. > >The scientists, hardworking, brilliant and patriotic they may be, just >didn't want to have to bother with security. They held it in contempt and a >with a bit of arrogance. These guys were super focused individuals and the >most important thing on their minds is getting a good data point. (I'm >serious!) I know brilliant minds that didn't tie their shoes, didn't take a >shower, wore the same clothes all week and practically lived in their >office. Their heads are in their equations. I've seen the same problem at a number of both government and corporate research labs, and have seen some real nightmares involving the mishandling of classified (including TS) materials. Perhaps the biggest problem (in my humble opinion) is that the laws/rules about punishing those mishandling classified materials inside research labs are highly selective at best (and are virtually a joke). Personally I feel that even a moderate security violation (such as leaving a safe unlocked) should result in a few days of mandatory jail time, a misdemeanor criminal record, and a permanent suspension of the security clearance regardless of position. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1467 From: James M. Atkinson, Comm-Eng Date: Fri Sep 15, 2000 9:40pm Subject: A blonde joke for today A blonde joke for today: 80,000 blondes meet at the Wembley Stadium for a "Blondes Are Not Stupid" convention. The master of ceremonies says, "We are all here today to prove to the world that blondes are not stupid. Can I have a volunteer?" One blonde steps up, so the master of ceremonies asks her, "What is 15 plus 15?" After 15 or 20 seconds, she replies, "Eighteen." Obviously everyone is a little disappointed. Then 80,000 blondes start chanting, "Give her another chance, give her another chance." The master of ceremonies says, "Well, since we've gone to the trouble of getting 80,000 of you here and the World Wide Press, I guess we can give her another chance." So, asks her, "What is 5 plus 5?" After 15 or 20 seconds, she replies, "Ninety." The master of ceremonies sighs. Everyone is crestfallen and the blonde starts crying. Again, the 80,000 girls start chanting, "Give her another chance, give her another chance." Unsure whether or not he is doing more harm than damage, the master of ceremonies finally says, "Okay! One more chance. What is 2 plus 2?" After 15 or 20 seconds, she replies, "Four." The stadium of 80,000 blondes start chanting, "Give her another chance, give her another chance." ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1468 From: James M. Atkinson, Comm-Eng Date: Fri Sep 15, 2000 11:40pm Subject: The Cigarette Condom [Humor] The Cigarette Condom One day two old ladies were standing outside the nursing home casually having a smoke. After being outside for a while it started to rain on them. Suddenly, one of the ladies took out a condom, cut off the tip, and slipped it over her cigarette. The other lady asked, "What's that for?" The first replied, "It's to keep my cigarette dry when I'm outside smoking and it starts to rain." The second lady said, "That's a pretty crafty idea." The following day the old lady went to the drugstore to get some condoms. She walked in and told the clerk, "I'd like some condoms please." The clerk looked at the old lady, rather baffled at why she would need condoms. However, he asked, "What brand would you like, Madam?" The old lady smiled and replied, "I don't care what brand you give me, as long as it fits a Camel." ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1469 From: James M. Atkinson, Comm-Eng Date: Sat Sep 16, 2000 0:28am Subject: Some common sense sayings: Some common sense sayings: Never be afraid to try something new. Remember, amateurs built the ark; but professionals built the Titanic. Conscience is what hurts when everything else feels so good. Talk is cheap because supply exceeds demand. Stupidity got us into this mess -- why can't it get us out? Love is grand; divorce is a hundred grand. Even if you are on the right track, you'll get run over if you just sit there. An optimist thinks that this is the best possible world. A pessimist fears that this is true. There is always death and taxes; however death doesn't get worse every year. People will accept your ideas much more readily if you tell them that Benjamin Franklin said it first. It hurts to be on the cutting edge. If it ain't broke, fix it till it is. I don't get even, I get odder. In just two days, tomorrow will be yesterday. I always wanted to be a procrastinator, never got around to it. I am a nutritional overachiever. My inferiority complex is not as good as yours. I am having an out of money experience. I plan on living forever. So far, so good. I AM in shape. Round is a shape. Not afraid of heights - afraid of widths. Practice safe eating - always use condiments. A day without sunshine is like night. I have kleptomania, but when it gets bad, I take something for it. If marriage were outlawed, only outlaws would have in-laws. I am not a perfectionist. My parents were though. Life is an endless struggle full of frustrations and challenges, but eventually you find a hair stylist you like. You're getting old when you get the same sensation from a rocking chair that you once got from a roller coaster. One of life's mysteries is how a two pound box of candy can make a woman gain five pounds. It's frustrating when you know all the answers, but nobody bothers to ask you the questions. The real art of conversation is not only to say the right thing at the right time, but also to leave unsaid the wrong thing at the tempting moment. Time may be a great healer, but it's also a lousy beautician. Brain cells come and brain cells go, but fat cells live forever Age doesn't always bring wisdom, Sometimes age comes alone. Life not only begins at forty, it begins to show. You don't stop laughing because you grow old, you grow old because you stopped laughing. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1470 From: A Grudko Date: Fri Sep 15, 2000 5:08pm Subject: Re: Blowing my own whistle ----- Original Message ----- > Relax, you said they were papers not books. If you would be so kind as to > email me with the publishers address, I'll be more than happy to purchase > them. Unlike some of our brethren, I don't know everything. I'm always > seeking to learn more and I'm glad to pay for the right stuff. Yes, I should have said that the books were accepted in place of the usual requirement of a paper. A print run on all 3 titles is due in the next 6 weeks but I've been thinking of updating the content. As I acknowledge that they are basic, not advanced, I'd like to send you some sample chapters - the ones that do not rely too much on illustrations, such as the section on cable testing, to see if they are not too basic. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), SAIS, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1471 From: Date: Sat Sep 16, 2000 4:09am Subject: Re: Blowing my own whistle In a message dated 9/16/00 12:24:27 AM Pacific Daylight Time, agrudko@i... writes: << I'd like to send you some sample chapters - the ones that do not rely too much on illustrations, such as the section on cable testing, to see if they are not too basic. >> Anything you'd care to share would be appreciated. Perhaps you'd post the table of contents and take a poll from list members as to what chapter they'd like best. M. From: James M. Atkinson Date: Sun Sep 14, 2003 4:53pm Subject: Re: Spooks Bill, your missing a few zero's. The active "spies" in NYC is more like 4200, not 42... and that's just in the diplomatic sector. DC area is a much more then NYC There are 220-250 active dip. spies in Boston proper, and at least 800 more centered around the three primary universities in Cambridge and surrounding area. There actually a method for determining the actual number (+/- 5%) in any major city, by nationality, but such details are not appropriate for discussion in an open forum. -jma At 4:37 PM -0500 9/14/03, William Knowles wrote: >On Wed, 10 Sep 2003, Matthew Cole wrote: > >> Does anyone have a guess as to how many Intelligence offices are >> in MYC? > >Someone once told me, but I forgot the answer, so since you said to >guess, I would guess 42 as that is the answer to everything. > >> Has NY taken the place of DC as America's central spy-ground? > >Maybe... > >> ===== >> Matthew Cole >> Journalist >> Website: http://www.matthewAcole.com >> Tel. 917. 345. 3731 > >- WK -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7745 From: Mitch D Date: Sun Sep 14, 2003 6:56pm Subject: con men thieves and scammers Heres some good ones: Can you perform line balance testing? Can your VOM handle 40 M ohms? Do you own or use a real TDR/Cable fault locator? and if so will it show a waveform? Can you provide a printout of what my phone lines look like on a TDR? Will you bring a line amplifier,or feedback detector? What is the dominant frequency in or near my office? Can you tell me about PBX vulnerabilities? CAn someone perform a hook switch bypass on our vodavi phone system? Will you bring someone with you?,and if so how many people will be present from your firm? Do you own a spectrum analyzer? What will we do if you find a surreptitious device? Have you completed any type of training? Will you test for carrier current devices? Will you go up on the roof? Will you need to go above or below the floor where our office is located at? Will you go into my ceiling,above the tiles? How long will this take? What will be in your report? Will you check the perimiter of the carpet that laid in my office? Do you rent sweep gear? If no why not? Why do sweeps cost so much? How do you check for hidden cameras? Will you inspect behind electrical wall plates? Hope this curbs blinky box/rain dancing nightmares........ __________________________________ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com 7746 From: James M. Atkinson Date: Mon Sep 15, 2003 2:36am Subject: Grocery Store A lady was picking through the frozen turkeys at the grocery store, but couldn't find one big enough for her family. She asked a stock boy, "Do these Turkeys get any bigger?" The stock boy replied, "No ma'am, they're dead." Bada Bing! -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7747 From: Vojislav Ristivojevic Date: Sun Sep 14, 2003 5:20pm Subject: The truth is out there Hello all, Because this is my first mail to the list, here is something about myself. I'm not a TSCM expert, I'm just a student of electrical engineering very interested in the subject. I came up your site while searching for network sniffer detection techniques (never heard of TDR before :) ). Since then, I learned a lot from your great site and this very busy list. Because all of you here seem very friendly, I decided to ask you a question I think you are more than qualified to answer. As you see, I live in Yugoslavia (now called Serbia & Montenegro though), a country rich with political scandals :). The last one is rather interesting from the technical view. It concerns a government official that (allegedly) eavesdropped on political adversaries and Mafia. Complete story is rather boring and complicated, so on to technical details. It is stated in the media that he used "GSM Passive 900/1800" device to eavesdrop on 200 conversations simultaneously at the 11km distance, and that device costs 300.000$ and weighs 11kg. He listened without problems to one GSM operator because it uses only a5/2 cipher, but for the other he had to get more informations from the operator in order to break a5/1. Had your laugh? Ok :) I know this is a load of crap, but anyway I went to the sites which sell GSM Passive, and got very confused. It looks like a p1 laptop with a winradio scanner attached to it (actually, the photo IS from www.winradio.com :) ). They also talk about RECEIVERS (in plural) so there have to be two winradios, one for each channel. Specifications are rather blurry and meaningless. Also, not a word about cipher cracking module. I'm not very good with GSM technology, but I'm pretty sure that p1 CANNOT beak A5 in real time. Even if it could, WHY would it cost 300.000$ ???? I'm wondering is GSM Passive a real device or just a hoax? Can it do any of the stuff they say? How? I want to write a letter to the newspaper that published that story, but I need to be sure that I got it all right. Can you help me? P.S. Please excuse my poor English. -- Best regards, Vojislav mailto:skotty@s... 7748 From: Dragos Ruiu Date: Sun Sep 14, 2003 7:15pm Subject: Re: Technion Researchers Crack GSM Cellular Phone Network Encryption On September 13, 2003 10:36 pm, DAVID ROM wrote: > Technion Researchers Crack GSM Cellular Phone Network Encryption The actual paper is at http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/2003/CS/CS-2003-05.ps.gz Syopsis: Use the checksums as known plaintext to reduce to a cyphertext only attack. A few milliseconds of capture needed and sub second cpu time for key recovery. Impacts GPRS too... I wonder how long it will be before GSM cloning becomes a serious fraud issue... Sigh. cheers, --dr -- pgpkey http://dragos.com/ kyxpgp 7749 From: Doug Ellsworth Date: Mon Sep 15, 2003 0:22am Subject: Re: con artists, scammers, and thieves Jim & LIST, Just a quick distinction. It is possible to quiz persons offering TSCM services as to knowledge and competence. There are many who, through their own lack of technical knowledge, honestly believe that the "sweeps" they perform have legitimate value. In ignorance, many believe all the hype that accompanies the spyshop playthings and have purchased same in the faith that the claims are true. Until they learn otherwise, there exists no intent to deceive. Conversely, highly tech-savvy individuals can be con artists, scammers and thieves. In either case, the sweeps are of negligible value. I despise con artists and scammers. But there is something less reprehensible to me about the well-meaning incompetent. We can do more than simply compete against and pity the incompetent. We can demonstrate the shortcomings and offer to work with them on a split-fee basis. If they continue to operate in TSCM without training-up and investing in equipment or teaming with a competent practitioner, they've moved to the "scammer list" (and we have all become acquainted with too many). You can easily quiz for knowledge and competence...but how does one test for the presence of bad intent where knowledge exists? I guess in response to a question about "finds" they have made, a deceptively high percentage would speak for itself. Obviously then, to uncover the unknowledgeable scammer, a series of bullshit answers to simple competency questions will do to indicate bad intent. So back to the competency quiz. The questions should be such that the non-technical TSCM client could understand and distinguish the correct answers of the knowledgeable from the bilge-water proffered by the deceptive. But to publish the answers alongside the questions might serve as a crash course in further deception if memorized by the scammers. "Advanced Scamology - Deceive Convincingly" Quizes have loads and LOADS of merit. I have been working on website content for my own space and have decided, however, to provide questions and answers only to those who contact directly, and provide an organizational snail-mail address, or otherwise provide sufficient "good-guy" bona fides. I'm using questions such as: What is Ohm's Law? Describe the Law of Inverse Squares as applies to RF propagation. AM broadcast stations transmit a wave that is _________ (longer / shorter) than FM broadcast stations. Which leg of POTS circuit is referenced to earth ground? (positive / negative) Which term describes a circuit in which resistance is almost zero ohms: (Open / Broken / Closed / Short) Can you detect digital carrier current devices? With what? Stuff like this. One of the 25 things to look for while a sweep is being performed: Dirty hands / soiled coveralls. One question to ask when a sweep has been completed: "Why aren't your hands dirty?" 25 pieces of equipment? Well, 25 OSCORS, everybody knows that! (just kiddin') Seriously, on the equipment notion, everyone should be equipped in some way to assure against 2.4 video threat before unpacking anything on site that might look TSCM'y in any way. I prefer PC-based spectrum scope where everything including antenna is concealed, so's all that appears is a notebook PC. Then a cursory search for wired video, sometimes using thermal imaging if appropriate. This search fits in with my "entry cover" which is (-get this-) an interior designer, complete with carpet samples and salesman's sample case into which I can fit some gear. Once assured of no immediate video threat, the regular "during business hours" sweep sequence can begin. Sorry for the length, Jim and List, I'm procrastinating my planned evening of creating web-content of my own and 'guess I'm in a verbose mindset. And it's late. Hope this helps. Now, it's back to my rat-killin'. -Doug Douglas Ellsworth Senior Associate, Director TSCM SecurityPosture, Inc. doug.ellsworth@s... securityposture.com 7750 From: Date: Mon Sep 15, 2003 10:30pm Subject: Evidence Allowed Against Cleric's Lawyer Evidence Allowed Against Cleric's Lawyer By LARRY NEUMEISTER .c The Associated Press NEW YORK (AP) - A judge ruled Monday that the government properly gathered evidence against a lawyer accused of conspiring to defraud the United States while she represented a blind Egyptian cleric convicted in a terrorism case. Federal Judge John G. Koeltl rejected arguments that the government violated the constitutional rights of civil rights lawyer Lynne Stewart as it built a terrorism case against her and others. The decision left intact charges that Stewart conspired to defraud the United States and made false statements. Stewart had no immediate comment on the ruling, an aide said. The judge said the government properly conducted its surveillance, and that it did not need to publicly disclose the evidence it used to win approval of electronic surveillance. He cited an affidavit from Attorney General John Ashcroft saying ``it would damage the security interests of the United States to further reveal the sources and methods this nation is using to conduct such investigations.'' The ruling came just weeks after the judge dismissed the most serious charges against Stewart, saying the government had misused an anti-terrorism law when it accused her of providing support to a terrorism organization. Prosecutors had said she helped deliver messages from her client, Sheik Omar Abdel-Rahman, who is serving a life sentence for conspiring to blow up New York City landmarks and assassinate Egyptian President Hosni Mubarak. The government said Stewart and two co-defendants helped relay messages from the cleric to a terrorist group based in Egypt. All three pleaded innocent. Prosecutors charged the three after saying they violated measures restricting the sheik's access to mail, the telephone and visitors and prohibiting him from speaking with the media. The fraud charge remaining against the three accuses them of trying to circumvent those measures. 09/15/03 23:33 EDT [Non-text portions of this message have been removed] 7751 From: James M. Atkinson Date: Wed Sep 17, 2003 11:37am Subject: Hmmmm All the gold in the world cannot buy a dying man one more breath. So, what does that make today worth? -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7752 From: Charles Patterson Date: Wed Sep 17, 2003 5:16pm Subject: Signs of the times While driving with my son the other day, he referred to the pre-set buttons on the car radio as "Favorites" buttons. Charles [Non-text portions of this message have been removed] 7753 From: Charles Patterson Date: Thu Sep 18, 2003 7:42am Subject: Avcom for sale on ebay Hi list, for anyone interested, I have an Avcom PSA-65B and Frequency extender to 2.5 GHz for sale on ebay. They could be worthwhile for any newcomers to the business. http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=2558819044 http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=2558819596 Charles (free shipping if you mention this tscm list) [Non-text portions of this message have been removed] 7754 From: Steve Uhrig Date: Thu Sep 18, 2003 10:53am Subject: Things that go beep in the night Reprinted with permission ========== Things That Go Beep In the Night By Christopher Kenton September 17, 2003 My phone has more buttons and features than Luke Skywalker's cockpit console. Trouble is, I think Darth Vader led the design team It's 2 a.m., and I want to tell you why I hate Motorola. I should be circumspect, since I've had the privilege of serving Motorola as a consultant, and the company was an exceptional client. But I've been staring at the ceiling now for more than an hour, my sleep destroyed by a thoughtful feature on my cell phone called the Low Battery alarm. In the normal course of events, when I arrive home in the evening, I plug my cell phone into its charger, which sits on the kitchen counter not too far from the coffeemaker and the key rack. In the morning before I leave, I make my coffee, grab my keys and phone, and go on with my life. The phone is happy. I'm happy. The world is a happy place. SILLY DADDY Every so often something disrupts this routine, however. Sometimes I forget to take my phone out of my pocket. Sometimes my two-year-old finds the phone and, after exhausting the imaginative possibilities of make-believe conversation, abandons it under a couch or behind the desk. And there the phone sits, slowly trickling out of energy. Like many smart devices, my phone has an alarm to tell me when the battery is low. I suspect this drains a lot of the remaining energy from the battery in order to fulfill its prophecy more quickly, but normally I might consider it a useful feature. Right now, however, at 2am, I've discovered that the usability engineers at Motorola designed this feature not as an alert, but as a behavior-modification tool. Make the punishment for forgetting to plug in the phone painful enough, and I won't do it again. Everyone has had the experience of incorporating external stimulus into the story of their dreams. The sound of a baby crying might be transformed into the sound of a jazz singer at a club. The sound of the alarm clock might become a fire engine racing to a burning building. Motorola's alarm, however, cannot be wrapped into any storyline. The moment I hear it, no matter how deeply I might be sleeping, I'm immediately aggravated and awake. It has the same two tones as a doorbell, but instead of that cheerful resonance and sustain -- a sound full of promise -- it sounds sharp and impatient. The phone is annoyed. NIGHTMARE NOISES If I could just get up and turn it off I could do so half asleep and drift back into my dreams. And I wouldn't be writing this column. But the Motorola alarm only rings once every 4 minutes, and I have no idea where the phone is hiding. The first alarm, di-do, is enough to put me on notice that my blissful night of sleep is about to be wrecked by the death throes of a telephone. Four minutes later, di-do, I'm awake enough to realize I'm in hell. You see, I live in a canyon where cellular signals don't carry. Without reception, I can't call my phone to make it ring and guide me to its rescue from the hamper or the toy box. I have only the alarm as a homing device, and four minutes to wait between every sounding. Di-do. I'm sitting on the edge of the bed. Cursing the phone. Watching the clock. Trying to remember in the fog of sleep where I last saw the phone. It's no use. Four more minutes to wait for the next clue. Di-do. I'm stopped in midstride, straining to listen down the hall. It's somewhere in the other part of the house. I can't go stomping around turning on lights because I'll wake up my son, and after six glasses of water, a changed diaper and a new selection of stuffed- animals, he won't fall back asleep. ORCHESTRA IN MY POCKET I tiptoe into the dining room hating my phone with every fiber of my being. I'm imagining violence. I've never had a phone I hated so much. My last two phones were comparatively simple Star-Tacs. Just a 2-line LED screen and a key pad. They excelled at the kinds of things you expect phones to do. They didn't claim to be smart, they just obeyed simple commands. My new phone has a full-color video display so I can shop online and view bad 1.5-inch pictures from cell-phone cameras. I can play games on my phone and send text messages. I can program voice activation so that when I say "Dave" it calls "Linda" instead. I can set the ringer to play a different 10-piece orchestral leitmotif for each of my personalized callers. All of which ensures that the battery will go into its dying gasps exactly 18 hours after I take the phone off the cradle in the morning, 2 hours after I go to bed. Di-do. Oh no. The office. It could be anywhere. Under a pile of papers on the desk or behind a stack of books. The last time this happened I finally discovered the cell phone hidden in the paper tray of the printer. I suspect my son gets a lot more satisfaction from the phone than I do, which is why I'm so annoyed with Motorola. They confused market segments and put the wrong features in my phone, and now I'm paying the price. WILL TO LIVE For the past 7 years, I've consistently bought the phone for the Successful Suit. I don't really have to shop for features; I can easily recognize it by its sleek case in black or silver, and its price point at about $200. It tells me that I'm worldly, tech savvy, all business, and it never lets me down. This year, although nicely tailored in the expected sweep of modern lines, my phone came with the heart and soul of the Gaming Geek. It's all lights and sirens inside, with 15 different ways to plug into the Infosphere, but paltry features to support an actual phone call. I got what teenagers buy for $39 in a $200 case. And it doesn't respect me. Di-do. I found it! It's under the desk and open on it's side, the useless video screen casting a soft glow on the floor while draining the life from the phone. Of all the myriad features on the phone, I wonder why, if it's really so smart, it can't tell that it's been sitting open and unused for hours and turn itself off. And I wonder why, in the vast maze of menus and settings that I can navigate on the phone like a Web site, I can't find the Let It Die For All I Care option. As I'm drifting back to sleep I start composing an angry letter in my head to the engineering and marketing staffs at Motorola about bait- and-switch market segmentation and humane standards for usability. But one thought brings me back from the edge of sleep. I'm four months into a two-year contract. ============= Christopher Kenton is president of the marketing agency Cymbic and a director of Touchpoint Metrics. He can be reached at ckenton@c... Source: http://www.businessweek.com/smallbiz/content/sep2003/sb20030917_4388.h tm ============== ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7755 From: frost_bitten_ca Date: Wed Sep 17, 2003 4:22pm Subject: Motorola MC33794 Electric Field Imaging Device Motorola MC33794 Electric Field Imaging Device http://e-www.motorola.com/brdata/PDFDB/docs/MC33794.pdf 7756 From: Matthijs van der Wel Date: Thu Sep 18, 2003 7:58am Subject: Looking for a Dutch sweep firm Hi, I'm looking for a Dutch firm that can perform sweeps in The Netherlands. It's required that the firm is a Dutch firm and that the sweeping staff has a Dutch nationality. Experience in sweeping is also required. A firm that focusses and specializes on performing sweeps is a big plus. We're looking for a firm that we can establish a long-term relationship with. Please contact me off list (wel@f...) for any futher information or to offer your services. Thanks in advance for your time and effort, Matthijs van der Wel Project Manager T +31 - 70 336 9924 F +31 - 70 336 9990 M +31 - 65 35 15099 I www.fox-it.com E wel@f... 7757 From: James M. Atkinson Date: Sun Sep 21, 2003 9:53am Subject: Islamic chaplain is charged as spy [Yet Another West Point Graduate Gets Busted] Islamic chaplain is charged as spy By Rowan Scarborough Published September 20, 2003 Washington Times An Army Islamic chaplain, who counseled al Qaeda prisoners at the Guantanamo Bay, Cuba, naval base, has been charged with espionage, aiding the enemy and spying, The Washington Times has learned. Capt. James J. Yee, a 1990 graduate of the U.S. Military Academy at West Point, N.Y., was arrested earlier this month by the FBI in Jacksonville, Fla., as he arrived on a military charter flight from Guantanamo, according to a law-enforcement source. Agents confiscated several classified documents in his possession and interrogated him. He was held for two days in Jacksonville and transferred to a Navy brig in Charleston, S.C., where two Army lawyers have been assigned to his defense. The Army has charged Capt. Yee with five offenses: sedition, aiding the enemy, spying, espionage and failure to obey a general order. The Army may also charge him later with the more serious charge of treason, which under the Uniform Code of Military Justice could be punished by a maximum sentence of life. It could not be immediately learned what country or organization is suspected of receiving information from Capt. Yee. He had counseled suspected al Qaeda terrorists at Guantanamo for a lengthy period. Capt. Yee, 35, was a command chaplain for I Corps at Fort Lewis, Wash. The Army dispatched him to Cuba to attend to the spiritual needs of a growing number of captured al Qaeda and members of the Taliban, a hard-line Islamic group ousted from power in Afghanistan. Capt. Yee, of Chinese-American descent, was raised in New Jersey as a Christian. He studied Islam at West Point and converted to Islam and left the Army in the mid-1990s. He moved to Syria, where he underwent further religious training in traditional Islamic beliefs. He returned to the United States and re-entered the Army as an Islamic chaplain. He is said to be married to a Syrian woman. Capt. Yee had almost unlimited private access to detainees as part of the Defense Department's program to provide the prisoners with religious counseling, as well as clothing and Islamic-approved meals. The law-enforcement source declined to say how much damage Capt. Yee may have inflicted on the U.S. war against Osama bin Laden's global terror network. The source said the "highest levels" of government made the decision to arrest Capt. Yee, who had been kept under surveillance for some time. The military's "convening authority" ≠ the officer who would authorize criminal proceedings ≠ is the commander of U.S. Southern Command in Miami, which oversees the prison at Guantanamo. After the September 11 attacks, Capt. Yee, one of 17 Muslim chaplains, was the subject of a number of press articles on Islam. A month after the attack on the World Trade Center towers and the Pentagon, he was quoted in an account by Scripps Howard News Service as saying that "an act of terrorism, the taking of innocent lives is prohibited by Islam and whoever has done this needs to be brought to justice, whether he is Muslim or not." In another account, the Voice of America News Service paraphrased Capt. Yee as saying Islam is a religion of peace and the concept of "jihad," or holy war, simply means "to struggle." "The basics, you always begin with the basics when dealing with anything," Capt. Yee was quoted as saying. "I discuss the articles of faith, what Muslims believe. The five pillars of Islam and then of course, I relate it to the events of September 11 to include some of the concepts found in Islam and how it deals with matters of war." At the Charleston brig, he joins three other notable detainees in the war on terrorism: Yaser Esam Hamdi, an American-born Saudi who fought with the Taliban; Jose Padilla, a former Chicago gang member who is charged with plotting to detonate a radioactive bomb; and Ali Saleh Kahlah al-Marri, accused of being an al Qaeda sleeper agent. The United States classifies the detainees at Guantanamo as "enemy combatants," not prisoners of war. The Pentagon will likely hold most of them until the war on terrorism is over. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7759 From: frost_bitten_ca Date: Fri Sep 19, 2003 4:59pm Subject: Precision RF Power Detector Precision RF Power Detector LTC5532 300MHz to 7GHz Precision RF Power Detector with Gain and Offset Adjustment http://www.linear.com/prod/datasheet.html?datasheet=1037 7760 From: Steve Uhrig Date: Mon Sep 22, 2003 2:07pm Subject: Will virii affect you? I dunno. See what you think. Take a look here: http://www.swssec.com/jpegs/virii-who-me.jpg This is a screen shot from ONE connect session earlier this afternoon, of headers from infected messages on our server. Look at the number in the lower left corner of the window. Take a guess first? 50? No. 100? No. 200? No. 500? Keep trying. That's ONE connect session. I see the same thing 20 or 30 times a day. You also can get an idea of the spoofed senders, phony subjects, etc. This info may help others recognize an infected message when they see it, just from the headers. The average Joe Sixpack doesn't have a chance. They're hitting him too, he just isn't likely to know about it. Still on generator here after 123 hours without power. We lost power early Thursday evening, and power company is saying it may be this coming Thursday before they get out this way. The grid was installed out here in the 1950s. When poles come down, people steal the insulators off them for their collectible and antique value. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7761 From: Robert Dyk Date: Tue Sep 23, 2003 7:35am Subject: data encryption Good Morning Gentlemen, I would like to know if anyone on the list has experience with a reliable commercially available data encryption package. My client needs to encrypt small sets of numerical data and accompanying text files for transmission over the internet to a data processing facility. The level of encryption required does not need to meet "national security" level standards. Ease of use and reliable decryption in a commercial software environment are desired goals. The application is for the transmission of medical measurement data which could be commercially valuable in nature. Any help with this would be greatly appreciated. Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. 7762 From: Andrus Aaslaid Date: Tue Sep 23, 2003 8:33am Subject: RE: data encryption Hello! You can give a try to www.verasity.com . They are manufacturing one-chip ipsec accelerator what can be used in embedded devices and which is fully ipsec compliant, so any pc with win2k or whatever os can be at host side. It has massive set of features and bandwidth, but from integration point of view it may appear as simplest solution for what you are doing. Regards, Andrus. > I would like to know if anyone on the list has experience > with a reliable commercially available data encryption > package. My client needs to encrypt small sets of numerical > data and accompanying text files for transmission over the > internet to a data processing facility. The level of > encryption required does not need to meet "national security" > level standards. Ease of use and reliable decryption in a > commercial software environment are desired goals. The > application is for the transmission of medical measurement > data which could be commercially valuable in nature. > 7763 From: Steve Uhrig Date: Tue Sep 23, 2003 11:37am Subject: Re: The tscm community's in trouble On 23 Sep 2003 at 10:58, MACCFound@a... wrote: > http://tinyurl.com/od3y Don't be so modest. Several of us know you were the inspiration behind the product. Just bask in the glory. You've earned it. You and TSKS. 7764 From: Date: Tue Sep 23, 2003 1:47pm Subject: Wi-Fi firm outfits San Mateo PD with network www.svbizink.com 408-993-1500 Published: Friday, September 19, 2003 Wi-Fi firm outfits San Mateo PD with network BY STEVE TANNER Cops in San Mateo no longer have to drive back to headquarters each time they need to cross-reference photos or download Department of Motor Vehicles records, thanks to a wireless metro area network (MAN) deployed by Tropos Networks Inc. "We're about taking Wi-Fi out of the home and office and building large, metro-scale coverage areas that eventually will approximate what you see with cell phones," says Bert Williams, vice president of marketing for San Mateo-based Tropos. Wi-Fi is the term used to describe wireless Internet access based on 802.11 standards. The network used by the San Mateo Police Department covers an area of about two square miles, blanketing most of downtown with Wi-Fi coverage. The department still uses a standard private radio network for voice, but this antiquated network proved too slow for higher-bandwidth functions like photos. "Essentially, this allows the officer to take the office on the road," says Lieutenant Wayne Hoss, who oversaw the installation from the PD's end. "Once the officers log in, they don't have to do anything else; it's as if they were back in the office." The software-based technology allows up to eight different Wi-Fi access points to feed off of one land-line Internet connection, whereas other "hotspot" configurations allow just two or three access points per wired connection. "The solution Tropos came up with, which got us excited, is really just eliminating the plethora of [wired connections] needed for a wide access area," says Curtis Feeny, managing director of Tropos investor Voyager Capital, a venture capital firm based in Seattle with an office in Palo Alto. Other VC investors include Benchmark Capital, Boston Millennium Partners and Intel Communications Fund. Tropos has raised a total of $12 million in two rounds of funding. The selling point of Tropos' technology is the ability to deploy a wide network quickly and less expensively than previous schemes, opening the door for the cell phone-like coverage telecommunications providers have been dreaming of. "It's very exciting. We think this is the common direction that Wi-Fi networks will take in the future," says Craig Mathias, principle analyst with Farpoint Group, based in Ashland, Mass. As far as Mathias knows, Tropos is the only company to deploy such a technology. But he says others are not far behind. Competitors include RoamAD, a division of New Zealand-based Nomad Communications Ltd., and Strix Systems Inc., based in Westlake Village. Mathias believes the market potential for this type of technology is "in the billions" worldwide, but he did not offer specific numbers. Public safety, including police, fire and homeland security, is Tropos' first vertical target market, but Mathias believes their mesh technology will be deployed for public access networks as well. Steve Tanner is a Biz Ink reporter. You can reach him at stanner@s.... Enjoying Biz Ink online? Why not subscribe today and never miss an issue! For article reprints, contact RMS Reprints at (800) 494-9051 or visit www.rmsreprints.com. © 2003 Silicon Valley Business Ink. All rights reserved. This material may not be published, broadcast, rewritten for broadcast or publication or redistribution directly or indirectly in any medium. Neither these Silicon Valley Business Ink. materials nor any portion thereof may be stored in a computer except for personal and non-commercial use. Silicon Valley Business Ink. will not be held liable for any delays, inaccuracies, errors or omissions therefrom or in the transmission or delivery of all or any part thereof or for any damages arising from any of the foregoing. [Non-text portions of this message have been removed] 7765 From: James M. Atkinson Date: Tue Sep 23, 2003 10:12pm Subject: USAF airman charged with spying From the Inside American Airman Charged With Espionage ABC News Sept. 23≠ A U.S. Air Force crewman who had access to key prisoners in the war on terror has been charged with espionage. The Air Force today announced charges against Senior Airman Ahmad I. Al Halabi. He had in his possession a laptop computer containing classified information on the detainees in Guantanamo Bay, Cuba, officials said. Al Halabi was a logistics officer based out of Travis Air Force Base in Fairfield, Calif. He had been acting as an Arabic language interpreter at the U.S. Navy base at Guantanamo, where about 660 suspected al Qaeda or Taliban members are imprisoned. Details about the base and its inmates are highly guarded. Military officials have said they fear any such information could be useful to terrorists and hamper the war on terrorism. More Than 30 Charges Al Halabi, who was arrested in late July, faces more than 30 charges, including aiding the enemy, espionage, bank fraud and failing to obey orders. Air Force officials have not said who they believe Al Halabi may have been spying for, but analysts believe there are two main areas of concern. "One is the illicit flow of information within Guantanamo ≠ that is, from one inmate to another, or detainee to another. And the other is the illicit flow of information from inside Guantanamo to outside Guantanamo," said Eugene Fidell, a civilian lawyer in Washington who is president of the National Institute of Military Justice. One After Another News of Al Halabi's arrest comes days after U.S. military authorities announced the detention of Army Capt. Yousef Yee. Yee was a Muslim military chaplain and also acted an interpreter at Guantanamo Bay. Multiple military sources told ABCNEWS that Al Halabi was associated with Yee, but it would not be unusual for Al Halabi, a Muslim, to talk to a Muslim chaplain. Yee was arrested on Sept. 10 as part of a military investigation, but has not been charged. When he was searched upon arrival from Cuba at the U.S. naval air station at Jacksonville, Fla., Yee had in his possession a list of detainees, a list of Guantanamo Bay staff and a diagram of the facilities, officials. According to one U.S. official, his laptop computer also had a modem, which is prohibited at Guantanamo. Customs agents in Jacksonville had been tipped off before they detained Yee. Yee is being held at a military prison in South Carolina. Halabi is being held at Vandenberg Air Force Base in California. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7766 From: Bob Beringer Date: Tue Sep 23, 2003 10:47am Subject: RE: data encryption Robert, Direct-Connect from Sterling Commerce might be the solution that you are looking for: http://www.stercomm.com/solutions/products/ebi/connect/direct.html Many governmental and commerce based agencies are use it, while others are still using PGP: http://www.pgp.com/products/enterprise/corporate_disk.html If you contact me off-line I can give you more detailed information. Hope this helps and that you have a good day! v/r Bob Beringer -----Original Message----- From: Robert Dyk [mailto:dyk@c...] Sent: Tuesday, September 23, 2003 5:35 AM To: tSCM-L Subject: [TSCM-L] data encryption Good Morning Gentlemen, I would like to know if anyone on the list has experience with a reliable commercially available data encryption package. My client needs to encrypt small sets of numerical data and accompanying text files for transmission over the internet to a data processing facility. The level of encryption required does not need to meet "national security" level standards. Ease of use and reliable decryption in a commercial software environment are desired goals. The application is for the transmission of medical measurement data which could be commercially valuable in nature. Any help with this would be greatly appreciated. Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. Yahoo! Groups Sponsor ADVERTISEMENT click here ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 7767 From: Thomas Shaddack Date: Tue Sep 23, 2003 8:30am Subject: Re: data encryption > Good Morning Gentlemen, > I would like to know if anyone on the list has experience with a reliable > commercially available data encryption package. My client needs to encrypt > small sets of numerical data and accompanying text files for transmission > over the internet to a data processing facility. The level of encryption > required does not need to meet "national security" level standards. Ease of > use and reliable decryption in a commercial software environment are desired > goals. The application is for the transmission of medical measurement data > which could be commercially valuable in nature. Personally, I would suggest GnuPG - the successor of PGP. Source code is available, you can audit it (no proprietary snake oil), it's more or less one of the contemporary de-facto standards. There are plug-ins for several most popular email programs, and its nature of an external script makes it suitable to use as a module called from the software used by your client. GnuPG is available for de facto all common platforms, from Windows to Linux to BSD to Mac. Another possibility is to not encrypt the data themselves but secure just the transport layer (I suppose TCP/IP). The tool that offers itself is stunnel , wrapping the connection into SSL, and allowing autentication by certificates (can't help much with these though, my SSL-fu didn't get that good yet). Again, the software is open-source, free, and actively maintained. Routinely using it in my company for inter-office communication and securing client-server mail operations in the places where I don't have a VPN. Again, stunnel works for both Linux and Windows, and it should be possible to compile ti for Mac. Third possibility is a mentioned VPN. The approach that turned out useful for me is using a Linux box on both sides with kernel patched with FreeS/WAN (which doubles as a NAT and a firewall (iptables/netfilter) and an IDS (Snort) and in some offices a small server - not entirely good practice to mix server and firewall, but for non-critical environments acceptable). There are other tools out there as well, eg. OpenVPN, but I didn't play with them yet. Avoid things like CIPE or vtun, as they are popular but insecure, more toys than serious tools. Let me know if it was helpful. :) 7768 From: Thomas Shaddack Date: Tue Sep 23, 2003 8:37am Subject: RE: data encryption > You can give a try to www.verasity.com . They are manufacturing one-chip > ipsec accelerator what can be used in embedded devices and which is fully > ipsec compliant, so any pc with win2k or whatever os can be at host side. It > has massive set of features and bandwidth, but from integration point of > view it may appear as simplest solution for what you are doing. If it isn't an overkill for the needed use. Another possibility that came up to my mind now is to transport the data over HTTP, using HTTPS as cryptographic layer, and using tools like curl for sending the data by POST request, or fetching them periodically from the datacenter side. The same features like authentication by certificate apply as for the stunnel solution. (You can also use stunnel to encapsulate plain HTTP, which is de facto what HTTPS is, just in separate components.) As a slight offtopic, I recently wrote a script for testing the browser SSL setting. It's available for use at https://shaddack.mauriceward.com/cgi-bin/sslinfo.cgi - it's a simple script that shows all the relevant REMOTE_*, HTTP_*, and SSL_* variables. Useful for diagnostics and making sure that things work as expected. 7769 From: Date: Tue Sep 23, 2003 0:18pm Subject: Autoreply: Digest Number 1370 Due to recent Hurricane Isabel, our email services have been temporarily interrupted. Please use these numbers for communication: Fax 804-355-5711 or Toll-Free Phone 888-623-7283 We hope that our service will be restored by mid-week. Thank you! 7770 From: Michael Puchol Date: Tue Sep 23, 2003 5:10pm Subject: Re: data encryption You can look at PGP, which is a peer-reviewed software, IMHO pretty strong in nature, easy to use and manage. I tend to stay away from closed, obscure and secretive applications, which are more likely to have a fatal flaw which may affect the security of the data encrypted with them. Regards, Mike ----- Original Message ----- From: "Robert Dyk" To: "tSCM-L" Sent: Tuesday, September 23, 2003 2:35 PM Subject: [TSCM-L] data encryption > Good Morning Gentlemen, > > I would like to know if anyone on the list has experience with a reliable > commercially available data encryption package. My client needs to encrypt > small sets of numerical data and accompanying text files for transmission > over the internet to a data processing facility. The level of encryption > required does not need to meet "national security" level standards. Ease of > use and reliable decryption in a commercial software environment are desired > goals. The application is for the transmission of medical measurement data > which could be commercially valuable in nature. > > Any help with this would be greatly appreciated. > > > Robert Dyk > robert@w... > > Worldwide Security Ltd. > Mississauga, Ontario > Canada > > This e-mail is confidential and may contain privileged information. If you > are not the addressee it may be unlawful for you to read, copy, distribute, > disclose or otherwise use the information in this e-mail. If you are not > the intended recipient please notify us immediately. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 7771 From: A.Lizard Date: Tue Sep 23, 2003 5:21pm Subject: Re: data encryption At 05:17 PM 9/23/03 +0000, you wrote: Why not PGP? Easy to use, secure against anything short of NSA level attack, multiplatform. http://www.pgp.com A.Lizard >Message: 2 > Date: Tue, 23 Sep 2003 08:35:26 -0400 > From: "Robert Dyk" >Subject: data encryption > >Good Morning Gentlemen, > >I would like to know if anyone on the list has experience with a reliable >commercially available data encryption package. My client needs to encrypt >small sets of numerical data and accompanying text files for transmission >over the internet to a data processing facility. The level of encryption >required does not need to meet "national security" level standards. Ease of >use and reliable decryption in a commercial software environment are desired >goals. The application is for the transmission of medical measurement data >which could be commercially valuable in nature. > >Any help with this would be greatly appreciated. > > >Robert Dyk >robert@w... > >Worldwide Security Ltd. >Mississauga, Ontario >Canada > >This e-mail is confidential and may contain privileged information. If you >are not the addressee it may be unlawful for you to read, copy, distribute, >disclose or otherwise use the information in this e-mail. If you are not >the intended recipient please notify us immediately. ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "Outlook is a security hole that masqurades as an e-mail client." Steven J. Vaughan-Nichols Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... PGP 8.0 key available by request or keyserver. Download PGP from http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html For new music, try http://www.eliangedeon.com ************************************************************************ 7772 From: A.Lizard Date: Tue Sep 23, 2003 5:24pm Subject: Linux snake oil grade VPN software the important part (other than not using vtun , cipe, tinc is: - For all of these VPN apps, the authors state that they were motivated to create them as a reaction to the perceived complexity of protocols like SSL, SSH, and IPsec. The means of reducing the complexity was to strip out all those nasty security features that made the protocols complex (and secure). Now if you're Bruce Schneier or Niels Ferguson, you're allowed to reinvent SSL ("Practical Cryptography", John Wiley & Sons, 2003). Unfortunately the people who created these programs are no Bruce or Niels. The results are predictable. The rest of the Peter Gutmann article is at the URL. A.Lizard http://www.mit.edu:8008/bloom-picayune/crypto/14238 [14238] in cryptography@c... mail archive Linux's answer to MS-PPTP daemon@A... (Mon Sep 22 14:28:26 2003 ) ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "Outlook is a security hole that masqurades as an e-mail client." Steven J. Vaughan-Nichols Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... PGP 8.0 key available by request or keyserver. Download PGP from http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html For new music, try http://www.eliangedeon.com ************************************************************************ 7773 From: Jeff Moss Date: Tue Sep 23, 2003 7:13pm Subject: Black Hat Windows Call for Papers Black Hat Call for Papers Submit your proposal for the upcoming Black Hat Windows Security 2004 Briefings! Held in Seattle, hometown of Microsoft, January 27-30, 2004, the conference will focus on information and computer security. Presentations should be either practical, applications-oriented presentations or deeply technical. Quality of proposal and relevance to current industry issues are the key determining factors for acceptance. The deadline for submission is Friday, December 5, 2004! To read the complete CFP please visit http://www.blackhat.com/html/win-usa-04/bh-win-04-cfp.html. We would look forward to receiving your submission and, should the submission fit the program schedule, to working with you for Black Hat Windows Security 2004. Thank you, Jeff Moss From: satcommunitfive Date: Wed Sep 15, 2004 8:15am Subject: Re: Keyboard Capture this is why I use a USB keyboard HA ! they are a bit buggy tho 9681 From: contranl Date: Wed Sep 15, 2004 11:15am Subject: New picture in photo section ? . I see there's a new picture in the photo section of what looks like a van with jamming systems ? I couldn't find any link to it in the messages...could it be that i am overlooking it ? Maybe the sender can add a discription of what it is ? Tetrascanner 9682 From: Tech Sec Lab Date: Wed Sep 15, 2004 0:48pm Subject: RE: Sinn Fein Bugging... Robin/George There is always a probability that these things are mere PR spins to make themselves think that it will give them a bargaining tool with it comes to talks. But the truth of the matter is that SF knows it goes on, the UK Gov knowns that SF knows, and SF knowns that the UK Gov knows that they know. So all in all, regarding negiotitation it provides or gains nothing. It may however prove useful to SF in conjuring these items to raise public perception that the British Sec Services are still very active, hence, a cheap publicity stunt that rewards little and subsequently costs a lot. What happens if a few months down the line a SF activist publicly admits planting the devices under the knowledge of the leadership. It would cost them dearly. And lose them a lot of face. I would personally be surprised if SF planted them. There are many reasons that such primitive devices (I haven't seen the device - if anyone has pictures of the second device please forward) could have been used... And who knows, maybe the Irish Security Services planted them....no one considered this. ************* Message: 10 Date: Wed, 15 Sep 2004 08:30:43 +0100 From: "Robin Hunter" Subject: Re-Bugged Again George, I would not be at all surprised if these recent 'discoveries' of unsophisticated devices were merely a P.R. 'spin' in the run-up to the showing last night on BBC1 of the two documentaries on the Brighton Bomb and The Hunt for the Bomber. Both of which were excellent. regards, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com 9683 From: Tech Sec Lab Date: Wed Sep 15, 2004 1:17pm Subject: RE: Sinn Fein Bugging... LOL Ok, I did not realise the scope of DIY'ness of this device. It all looks comical to me. It looks like a secondary school kid's science project....! Enough said... I take back that it could have been the Irish Sec Services...! -----Original Message----- From: Gregory Hicks [mailto:ghicks@c...] Sent: 15 September 2004 19:02 To: TSCM-L@yahoogroups.com Cc: tscmteam@o... Subject: RE: [TSCM-L] Sinn Fein Bugging... > From: "Tech Sec Lab" > Date: Wed, 15 Sep 2004 18:48:09 +0100 > > Robin/George > > There is always a probability that these things are mere PR spins to > make [...snip...] > > I would personally be surprised if SF planted them. There are many > reasons that such primitive devices (I haven't seen the device - if > anyone has pictures of the second device please forward) could have > been used... No detail but ... One device: http://news.bbc.co.uk/1/hi/northern_ireland/3634838.stm (Half way down the page) The other device: http://news.bbc.co.uk/1/hi/northern_ireland/3657346.stm (At top of page) Another view of second device http://news.bbc.co.uk/1/hi/northern_ireland/3656104.stm (also at top) > > And who knows, maybe the Irish Security Services planted them....no > one considered this. > [...snip...] ------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 | Fax: 408.894.3400 San Jose, CA 95134 | Internet: ghicks@c... I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton 9684 From: Patrick Ryals, CEO Date: Wed Sep 15, 2004 2:44pm Subject: Choosing Door Locks(?) This is a bit off topic but still security oriented. I want to improve on our office security by replacing all of the door locks. Anyone have any good sites with a run down on types of door locks and how secure they are? Perhaps a lock review site from an independent security point of view. I'm considering keypad mechanical locks with a dead bolt and no need for electricity. There must be a definitive security article on choosing commercial door locks. Please respond privately. This is off topic and I am on digest mode. Patrick Ryals, CEO Nexus Investigations, Inc. CA PI#22920 9685 From: walshingham2000 Date: Wed Sep 15, 2004 6:56pm Subject: Re: Re-Bugged Again..John Young Wrote... -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --- In TSCM-L@yahoogroups.com, John Young wrote:....>SNIP If SF were eally smart they would have kept quiet about this "discovered" surveillance, whilst continuing to use a more secure alternative. In this manner they could have deliberately fed the security agencies in question false traffic with regards to their operating and negotiating strategy for the upcoming meetings etc.. Regards Alan Taylor -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.3.6 (MingW32) - GPGshell v3.22 Comment: PGPBOARD Angeles City Philippines Comment: http://groups.yahoo.com/group/pgpboard/ iD8DBQFBSNZO7H26LUxZn78RAmrwAJ9JMaNiqt8zpD1j6oiSgx1OFsrZ/ACcDNrM qqscYs3kZawQM3FMtdlpZ3o= =D67h -----END PGP SIGNATURE----- 9686 From: Gregory Hicks Date: Wed Sep 15, 2004 1:02pm Subject: RE: Sinn Fein Bugging... > From: "Tech Sec Lab" > Date: Wed, 15 Sep 2004 18:48:09 +0100 > > Robin/George > > There is always a probability that these things are mere PR spins to make [...snip...] > > I would personally be surprised if SF planted them. There are many > reasons that such primitive devices (I haven't seen the device - if > anyone has pictures of the second device please forward) could have > been used... No detail but ... One device: http://news.bbc.co.uk/1/hi/northern_ireland/3634838.stm (Half way down the page) The other device: http://news.bbc.co.uk/1/hi/northern_ireland/3657346.stm (At top of page) Another view of second device http://news.bbc.co.uk/1/hi/northern_ireland/3656104.stm (also at top) > > And who knows, maybe the Irish Security Services planted them....no one > considered this. > [...snip...] ------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 | Fax: 408.894.3400 San Jose, CA 95134 | Internet: ghicks@c... I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton 9687 From: kondrak Date: Wed Sep 15, 2004 11:23pm Subject: RE: [OT] but topical They drive next door to Nevada from what Im told, over there, the mob sells bazookas in vending machines. At 20:24 9/14/2004, you wrote: >Watch your state laws, folks. >....Always wondered what the red star in the California state flag was for >;-) >Jay > >-----Original Message----- >From: kondrak [mailto:kondrak@s...] >Sent: Tuesday, September 14, 2004 10:05 AM >To: TSCM-L@yahoogroups.com >Subject: [TSCM-L] [OT] but topical > > >HEAR YE HEAR YE! > >Since there are a LOT of gun owners in this group..... > > > >>U.S. Department of Justice > >> > >>Bureau of Alcohol, Tobacco, > >>Firearms and Explosives > >> > >> > >> > >> > >>-------------------------------------------------------------------------- >------ > >> > >> Washington, DC 20226 > >> > >> > >> > >>CHANGES IN FEDERAL LAW AS OF SEPTEMBER 13, 2004 > >>RELATING TO > >>SEMIAUTOMATIC ASSAULT WEAPONS (SAWs) > >> > >>AND > >> > >>LARGE CAPACITY AMMUNITION FEEDING DEVICES (LCAFDs) > >> > >> > >>GENERAL > >> > >>As of September 13, 2004, the provisions of Public Law 103-322, the >Violent > >>Crime Control and Law Enforcement Act of 1994, covering semiautomatic > >>assault weapons and large capacity ammunition feeding devices are no >longer > >>in effect. The regulations implementing these provisions also are no >longer > >>in effect. > >> > >>Specifically, there is no longer a Federal prohibition on the manufacture, > >>transfer, and possession of semiautomatic assault weapons and large >capacity > >>ammunition feeding devices. > >> > >>There are no longer any marking requirements for semiautomatic assault > >>weapons and large capacity ammunition feeding devices. Existing markings >on > >>firearms and magazines relating to law enforcement or government use may >be > >>disregarded. > >> > >>There is no longer any Federal requirement for Federal firearms licensees >to > >>obtain certain documentation before transferring semiautomatic assault > >>weapons and large capacity ammunition feeding devices to government >agencies > >>or law enforcement officers. However, any records obtained prior to > >>September 13, 1994, pertaining to the sale or transfer of semiautomatic > >>assault weapons must still be retained for a period of 5 years. See 27 CFR >ß > >>478.129(f). Moreover, records of importation and manufacture must be > >>maintained permanently and licensees must maintain all other acquisition >and > >>disposition records for 20 years. > >> > >>Licensees who provided letters of future intent to sell semiautomatic > >>assault weapons and large capacity ammunition feeding devices to law > >>enforcement agencies and other qualified customers are no longer obligated > >>to comply with such letters. > >> > >>Anyone who illegally possessed, manufactured, or transferred semiautomatic > >>assault weapons or large capacity ammunition feeding devices before the >bans > >>sunset still have violated the law since their possession, manufacture, or > >>transfer was illegal at the time. > >> > >> > >>IMPORTATION > >> > >>The prohibition on the importation of non-sporting firearms under 18 >U.S.C. > >>section 922(l) and 925(d)(3) still applies. > >> > >>Importation of large capacity ammunition feeding devices still is covered > >>under the Arms Export Control Act. Therefore an approved permit still is > >>required to import large capacity magazines. > >> > >>Temporary importation of semiautomatic assault weapons and large capacity > >>magazines is now lawful under the provisions of 27 CFR ß 478.115(d) >because > >>temporary importations are not subject to the sporting purpose test. > >> > >>Any importer who has a valid approved Form 6 import permit with a > >>restriction related to the assault weapon ban should comply with the > >>restriction because the weapons most likely are non-sporting. > >> > >>Any importer who has a valid approved Form 6 import permit with a > >>restriction related to large capacity ammunition feeding devices may > >>disregard the restriction. Importers may apply for a new permit if they > >>prefer. > >> > >>ASSEMBLY OF NON-SPORTING SHOTGUNS AND SEMIAUTOMATIC RIFLES FROM IMPORTED > >>PARTS > >> > >>The prohibition on assembly of non-sporting shotguns and semiautomatic > >>rifles from imported parts as provided under 18 U.S.C. ß 922(r) and 27 CFR >ß > >>478.39 still applies. > >> > >>SENTENCING ENHANCEMENTS > >> > >>The sentencing enhancements for using semiautomatic assault weapons in a > >>crime of violence or drug trafficking crime no longer are in effect. > >>Similarly, the sentencing enhancements for semiautomatic assault weapons >in > >>the U.S. Sentencing Guidelines no longer are in effect. > >> > >>LAW ENFORCEMENT OFFICERS AND POLICE DEPARTMENTS > >> > >>Law enforcement officers and police departments who obtained semiautomatic > >>assault weapons are no longer required to use such firearms only for > >>official use. > >> > >>Law enforcement officers and police departments may now sell or transfer > >>semiautomatic assault weapons to persons who are not prohibited from > >>receiving firearms. > >> > >>Law enforcement officers and police departments may now sell or transfer > >>large capacity ammunition feeding devices to anybody. > >> > >>Signed statements that semiautomatic assault weapons and large capacity > >>ammunition feeding devices will be used for official use are no longer > >>required to be provided to Federal firearms licensees. > >> > >>RETIRED LAW ENFORCEMENT OFFICERS > >> > >>Federal law does not prohibit retiring law enforcement officers from >keeping > >>semiautomatic assault weapons or large capacity ammunition feeding >devices. > >> > >>Former law enforcement officers who received semiautomatic assault weapons > >>on retirement may now transfer those firearms to persons who are not > >>prohibited from receiving firearms. Transfer of large capacity ammunition > >>feeding devices is no longer restricted. > >> > >>NATIONAL FIREARMS ACT > >> > >>All provisions of the National Firearms Act relating to registration and > >>transfer of machineguns, short barreled rifles, weapons made from rifles, > >>short barreled shotguns, weapons made from shotguns, any other weapons as > >>defined in Title 26 U.S.C. section 5845(e), silencers, and destructive > >>devices still apply. > >> > >>Registered silencers can now be attached to semiautomatic rifles and >pistols > >>without creating a prohibited semiautomatic assault weapon. > >> > >>USAS-12 and Striker12/Streetsweeper shotguns are still classified as > >>destructive devices under ATF Rulings 94-1 and 94-2 and must be possessed > >>and transferred in accordance with the NFA. > >> > >>EFFECT ON STATE LAW > >> > >>Expiration of the Federal law will not change any provisions of State law >or > >>local ordinances. Questions concerning State assault weapons restrictions > >>should be referred to State and local authorities. > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9688 From: netcmdd Date: Wed Sep 15, 2004 10:06pm Subject: Re: Choosing Door Locks(?) Might help put things in perspective and allow you to make a more informed decision: Steel Bolt Hacking http://www.amazon.com/exec/obidos/tg/detail/-/0974463019/102-4148762-9208919?%5Fencoding=UTF8&v=glance --- In TSCM-L@yahoogroups.com, "Patrick Ryals, CEO" wrote: > This is a bit off topic but still security oriented. I want to improve > on our office security by replacing all of the door locks. Anyone have > any good sites with a run down on types of door locks and how secure > they are? Perhaps a lock review site from an independent security point > of view. > > I'm considering keypad mechanical locks with a dead bolt and no need for > electricity. There must be a definitive security article on choosing > commercial door locks. > > Please respond privately. This is off topic and I am on digest mode. > > Patrick Ryals, CEO > Nexus Investigations, Inc. > CA PI#22920 9689 From: Date: Wed Sep 15, 2004 7:55pm Subject: Re: Choosing Door Locks(?) iButton Solutions Search - New Solutions [Non-text portions of this message have been removed] 9690 From: Cornolio Date: Thu Sep 16, 2004 6:37am Subject: Re: Choosing Door Locks(?) On Wed, Sep 15, 2004 at 12:44:47PM -0700, Patrick Ryals, CEO wrote: > This is a bit off topic but still security oriented. I want to improve > on our office security by replacing all of the door locks. Anyone have > any good sites with a run down on types of door locks and how secure > they are? Perhaps a lock review site from an independent security point > of view. > > I'm considering keypad mechanical locks with a dead bolt and no need for > electricity. There must be a definitive security article on choosing > commercial door locks. > > Please respond privately. This is off topic and I am on digest mode. Sorry to answer your question (also) on the list. But if you ask a question in public, I think the list members might be interested in the result. You asked for a non electric lock. That is a pity, since NO mechanical lock is secure! Any mechanical lock can be manipulated, at least by the real pro's. And with manipulated I mean opened without a trace. And if they can not manipulate the lock, they will destroy it, but leaving the important parts intact. Meaning they will drill (or otherwise) open the lock, and insert the pins that match your key in a new prepared lock. You will not notice you got a new lock on your door, and you key will work just fine ;) If security is real important, I would advice to get X-09 locks. These locks are also used in the military, and are the most secure. They are not mechanical locks, but power to operate them is generated by turning the dial on the lock a few times. Highly resistant to tampering and manipulation, and can also be used in safes. http://www.kaba.co.uk/Kaba/products/safelocks/x09.htm If you do not like electronics, and you desperately want mechanical security, you should get the EVVA magnetic disc lock. A very clever system, where round magnets are made to turn inside the lock. If all eight (!) magnets are aligned in the same position, the lock will open. The big difference with other magnetic locks is that it does not matter if you somehow detect the polarization of the magnets. In other magnetic locks this will tell you its combination, but in this case it does not do you any good because the magnets can rotate. http://www.evva.com/McsFrameE.htm After that, there are a few locks that will do. One of my favourite locks is the ASSA V10 (also called TWIN2) It is a sidebar lock, and can withstand manipulation well. http://www.sargentlock.com/products/cylinders/line_detail.php?line_id=137& On the same level are Abloy locks. They work with discs, and can also be considered very difficult. ABLOY DISKLOCK PRO or even better the PROTEC system. http://www.abloy.com/ If you would like to learn more about lock security, I am for hire :) A cheaper solution is to buy the book, and if you can the CD series of www.security.org. It comes with multiple level discs. If you can get up to government level, you can see video material that will make clear why no mechanical lock is secure. Kind regards, Barry Wels 9691 From: Date: Thu Sep 16, 2004 4:55am Subject: Re: Re: Re-Bugged Again..John Young Wrote... Alan Your comments are interesting, but whose side are you on? Tim Date: Thu Sep 16, 2004 2:35pm Subject: door security Hi, Patrick; I would respond off-line, but my response may benefit others. I am sure that several others have responded by the time I have written this (I, too, am on digest mode), but there's a few things that bear repeating: Locks are but one piece of the puzzle. Many think (not accusing you) that simply buying into a higher-tier of locks will improve their physical security. This isn't so. One of the things I do that I don't advertise is vulnerability assessments. My freebie advice to you and others considering locks is to first consider what the locks are being installed into. A Dom or Medeco installed into a typical interior door system is like putting a X-07 on a tent flap. The majority of threats use a brick or a crowbar to gain entry. Lockpicking represents a smaller threat. Also, since you sound like a business, broaden your search to card access systems. Knowing who came in when might be valuable if you are having a shrinkage or intellectual theft problem. So, consider upgrading your doors. They make some attractive metal doors, or if you use wood, add those brass anti-kick plates on the door and jamb. And, look at your jamb. Thin? Reinforce it, and use a quality deadbolt with a long-throw bolt. Glass doors can benefit from one of the high-performance polyacrylate film appliques; while expensive, they are a nearly invisible addition that can resist baseball bat and some firearms attacks. What about your windows? Walls? Drop ceilings? You might be surprised that in many cases, the weakest link isn't your front door. In close, your best bet is to hire somebody outside to come in and do an assessment. An unbiased, outside opinion might turn up things you might overlook by familiarity. Be sure you state up front you aren't wanting to buy up front, people who only want to sell a system, and not look for actual problems won't be as interested. Part of a good assessment will be a work up of the most likely threats; your threats will drive your security measures. If you have specific questions, I'll be happy to help further offline. -Shawn (as independant as it gets) Hughes PS - Say no to mechanical combo door locking systems. NOT secure. Do a google search on picking combination or 5 button locks. ==================================== Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response, LLC www.warriormindset.com ////////////////////////////////////////////////////////////////////////////// ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. 9693 From: Tech Sec Lab Date: Thu Sep 16, 2004 11:35am Subject: RE: Re: Re: Re-Bugged Again.. LOL The battle between GOOD and EVIL... If only life was that simple... It shouldn't matter what side you're on, the list is about security countermeasures, and that includes disinformation. Last I checked you did not have to be pro-UK Gov or pro-SF to join the list... But maybe things have changed... What do you think Steve U? You've been on the list one of the longest... -Ois ******* Message: 10 Date: Thu, 16 Sep 2004 09:55:56 EDT From: Tmercersec@a... Subject: Re: Re: Re-Bugged Again..John Young Wrote... Alan Your comments are interesting, but whose side are you on? Tim Date: Thu Sep 16, 2004 11:44am Subject: Quantum Crypto http://www.globetechnology.com/servlet/story/RTGAM.20040915.gtcryptsep15/BNS tory/Technology/ 9695 From: Date: Thu Sep 16, 2004 8:05am Subject: Re: Re: Re: Re-Bugged Again.. Ois Very commendable sentiments, but being part of the security industry should hopefully tip you onto the side of right. That's were I want to be. IRA/Sinn Fein spying/targetting in the past is about discovering information or the whereabouts of security forces to do them harm. What the 'Brits' were or were not doing on these occasions is not in the same context. I just don't think that we should be indirectly advising or recommending to what both your and my governments describe as an organisation which is inextricably wedded to its illegal army wing. Tim [Non-text portions of this message have been removed] 9696 From: Date: Thu Sep 16, 2004 8:09am Subject: Re: Re: Re: Re-Bugged Again.. Ois Very commendable sentiments, but being part of the security industry should hopefully tip you onto the side of right. That's were I want to be. IRA/Sinn Fein spying/targetting in the past is about discovering information or the whereabouts of security forces to do them harm. What the 'Brits' were or were not doing on these occasions is not in the same context. I just don't think that we should be indirectly advising or recommending to what both your and my governments describe as an organisation which is inextricably wedded to its illegal army wing. Tim [Non-text portions of this message have been removed] 9697 From: Date: Thu Sep 16, 2004 9:05am Subject: Re: Re-Bugged Again..further to my last Ois I found your mail patronising in content, plus I primarily addressed my question to the original sender. For you to answer it before he did is a bit presumptuous. Also why involve others such as Steve U, do you not feel secure enough in your own position? I think it is VERY important whose side you are on. I assume that if a major drug dealer came to you requesting a sweep because he believed the Police Drug Squad were monitoring him, you would not accept the job, just because the price is right? I don't often comment within the group as I would not profess to be an expert on TSCM or a technical wizard, however I have been involved in covert surveillance public and private sector for 27 years. This plus growing up and living in Northern Ireland should give me a little edge on matters pertaining to here, don't you think? Tim [Non-text portions of this message have been removed] 9698 From: Cornolio Date: Thu Sep 16, 2004 7:53am Subject: Re: Re: Choosing Door Locks(?) On Thu, Sep 16, 2004 at 03:06:05AM -0000, netcmdd wrote: > Might help put things in perspective and allow you to make a more > informed decision: > > Steel Bolt Hacking > http://www.amazon.com/exec/obidos/tg/detail/-/0974463019/102-4148762-9208919?%5Fencoding=UTF8&v=glance Sorry to say, but that book is a joke. Even tough I assisted the author in trying to make something nice out of it, a lot of the information in the book is stolen from other places all over the internet. Take for instance the images of high-security pins in the book. A pure copy of http://www.crypto.com/photos/misc/lockpins/ And the author does not give any credit for this, and many, many other topics covered in this book. The book from www.security.org is so much better and detailed. It can not be compared.... With regards, Barry Wels 9699 From: savanted1 Date: Thu Sep 16, 2004 8:17am Subject: NIST looks at forensics tools for handheld devices The National Institute of Standards and Technology (NIST) has released a report entitled "PDA Forensic Tools: An Overview and Analysis," evaluating a number of tools to gather electronic evidence from handheld PDAs (personal digital assistants). The report examines tools for Palm OS and Pocket PC, the two major handheld operating systems, as well as some Linux-based systems. Investigators will have to adopt such tools since handheld computers have unique forensic challenges and are becoming increasingly common in cybercrimes. The report examined PDA Seizure, EnCase, Palm dd, Palm OS Emulator, the open source Pilot Link, and Duplicate Disk Unix. The report, released under the Computer Forensics Tool Testing program, is neither a formal nor comprehensive product test. http://www.gcn.com/vol1_no1/daily-updates/27273-1.html 9700 From: George Shaw Date: Thu Sep 16, 2004 3:14pm Subject: RE: Re-Bugged Again..further to my last Folks please forget the politics on this one. Yes it is about which side you are on, not politically but on lawful or unlawful. The bad guys spend more time visibly on the unlawful side while the government and law enforcement pronominally spend their time on the lawful, there are times when the barrier breaks down and some stray over the line. It is up to each individual as to which side they choose to be on. I would like to believe that the majority are on the white hats side. As I have lived in Northern Ireland most of my life as has my family I have seen the "troubles" 1st hand. I personally know what side I am on BUT that don't matter as far as this "find" is concerned. It was a publicity stunt for sure, a badly constructed on but in the eyes of the none technical public it did look like it could have been a "bug" a bloody big one granted but full of electronic bits that they would never understand had nought to do with audio surveillance but more to do with central heating control. As to who actually placed it my money is on Bob The Builder. -- George Shaw MI3GTO / 2I0GTO " Any Sufficiently Advanced Technology is Indistinguishable from Magic" ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... Fax & Voicemail: +44 (0) 871 242 5365 EchoLink & eQSO (101English) connected 24/7 9701 From: DATA_4N6_Engineering Date: Thu Sep 16, 2004 6:13pm Subject: Re: Re: Choosing Door Locks(?) interlocking deadbolts are a must, but medeco are the only locks you should be using in a secure facility or for any customer that wants the best protection Jon Asdourian --- netcmdd wrote: > Might help put things in perspective and allow you > to make a more > informed decision: > > Steel Bolt Hacking > http://www.amazon.com/exec/obidos/tg/detail/-/0974463019/102-4148762-9208919?%5Fencoding=UTF8&v=glance > > > --- In TSCM-L@yahoogroups.com, "Patrick Ryals, CEO" > wrote: > > This is a bit off topic but still security > oriented. I want to improve > > on our office security by replacing all of the > door locks. Anyone have > > any good sites with a run down on types of door > locks and how secure > > they are? Perhaps a lock review site from an > independent security point > > of view. > > > > I'm considering keypad mechanical locks with a > dead bolt and no need > for > > electricity. There must be a definitive security > article on choosing > > commercial door locks. > > > > Please respond privately. This is off topic and I > am on digest mode. > > > > Patrick Ryals, CEO > > Nexus Investigations, Inc. > > CA PI#22920 > > > ===== Jon Asdourian 61 356B Red Porsche Coupe 69 Red MGC GT 63 Burgundy Austin Healey 3000 BJ7 356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC _______________________________ Do you Yahoo!? Declare Yourself - Register online to vote today! http://vote.yahoo.com 9702 From: Fernando Martins Date: Thu Sep 16, 2004 10:00pm Subject: Re: Choosing Door Locks(?) if even PKI or biometrics can have problems, a lock it's just a lock, but there is home security and bank security one thing to think is how many time do you want for one can open a door? (specially a bad guy) other is if one was able to get in, do we let him go? (again, specially a bad guy) in high security systems the point is that it is ALLWAYS possible to get in (if one have the will and the means enough to do it), so the job is make sure that there is no way out or that the heavy cavalry can be there faster enough for locks this 3 names are easy to find anywhere Assa Abloy Chubb Locks Fichet-Bauche FM ----- Original Message ----- From: "Patrick Ryals, CEO" To: Sent: Wednesday, September 15, 2004 8:44 PM Subject: [TSCM-L] Choosing Door Locks(?) > This is a bit off topic but still security oriented. I want to improve > on our office security by replacing all of the door locks. Anyone have > any good sites with a run down on types of door locks and how secure > they are? Perhaps a lock review site from an independent security point > of view. > > I'm considering keypad mechanical locks with a dead bolt and no need for > electricity. There must be a definitive security article on choosing > commercial door locks. > > Please respond privately. This is off topic and I am on digest mode. > > Patrick Ryals, CEO > Nexus Investigations, Inc. > CA PI#22920 > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.766 / Virus Database: 513 - Release Date: 17-09-2004 9703 From: kondrak Date: Thu Sep 16, 2004 11:12pm Subject: Re: Re: Choosing Door Locks(?) Someone mentioned card readers as well, and I have to plug the biometric alternative, like a fingerprint scanner. Theyre coming down in price and are very effective. At 19:13 9/16/2004, you wrote: >interlocking deadbolts are a must, but medeco are the >only locks you should be using in a secure facility or >for any customer that wants the best protection > >Jon Asdourian > >--- netcmdd wrote: > > > Might help put things in perspective and allow you > > to make a more > > informed decision: > > > > Steel Bolt Hacking > > >http://www.amazon.com/exec/obidos/tg/detail/-/0974463019/102-4148762-9208919?%5Fencoding=UTF8&v=glance > > > > > > --- In TSCM-L@yahoogroups.com, "Patrick Ryals, CEO" > > wrote: > > > This is a bit off topic but still security > > oriented. I want to improve > > > on our office security by replacing all of the > > door locks. Anyone have > > > any good sites with a run down on types of door > > locks and how secure > > > they are? Perhaps a lock review site from an > > independent security point > > > of view. > > > > > > I'm considering keypad mechanical locks with a > > dead bolt and no need > > for > > > electricity. There must be a definitive security > > article on choosing > > > commercial door locks. > > > > > > Please respond privately. This is off topic and I > > am on digest mode. > > > > > > Patrick Ryals, CEO > > > Nexus Investigations, Inc. > > > CA PI#22920 > > > > > > > > >===== >Jon Asdourian >61 356B Red Porsche Coupe >69 Red MGC GT >63 Burgundy Austin Healey 3000 BJ7 >356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC > > > >_______________________________ >Do you Yahoo!? >Declare Yourself - Register online to vote today! >http://vote.yahoo.com > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9704 From: Thomas Shaddack Date: Fri Sep 17, 2004 1:53am Subject: Re: Re: Choosing Door Locks(?) On Fri, 17 Sep 2004, kondrak wrote: > Someone mentioned card readers as well, and I have to plug the biometric > alternative, like a fingerprint scanner. Theyre coming down in price and > are very effective. Beware of them, they often can be fooled surprisingly easily. http://www.extremetech.com/article2/0,1558,1158002,00.asp http://www.newsfactor.com/perl/story/18029.html I thought about the "gummy finger" technique a lot too, but didn't try it yet. Given the small depth of the ridges on the fingers, I suppose an acceptable fingerprint could be made using commonly available photoresist-coated circuitboard and a fingerprint printed on a transparent foil by a good laser printer, then the board exposed by UV light and developed and etched in exactly the way the circuitboards are made. Together with scanners and email, this allows easy impersonation of a person faster than the person could fly over to the given destination. If higher depth of the ridges would be needed, a spray-on photoresist and a copper or brass sheet can be used instead. Use iron chloride or a suitable acid that won't eat the photoresist (and won't tend to eat under it too quickly); the choice depends on the material of both the substrate and the photoresist. There is already a growing proliferation of fingerprint sensors on things like storage lockers (see the ones for the tourists visiting the Statue of Freedom), and perhaps even things like music players (so no unregistered people could - oh horror - listen to music bought by somebody else, see http://www.theregister.co.uk/2004/06/04/biometric_drm/ ). Often this means a significant inconvenience: you can't send a family member for something you forgot there, but you have to walk there yourself, regardless how tired you are or how sprained your ankle is; because while you can give somebody an alphanumerical code or a key, your finger is firmly attached to you and most people prefer it to remain that way. (It's also actually *less* secure in certain situations, because while you can come up with an arbitrary number of different passwords (even if for most people the name of their dog is enough for everything), you have only 10 fingers and no chance yet to grow more or replace them when compromised. A determined adversary, eg. a well-paid skilled PI hired by a divorce lawyer from hell, can have a fake finger made from a fingerprint you left on a glass in the bar couple days (or, in case of a well-equipped adversary, maybe even minutes) before.) In the case of a multimedia player, you may want to share it between a bigger group of people than the vendor would like; think a college dorm and audio tapes. So there is a potential big demand for "false fingers", and given the potentially very low cost of their manufacture, I suppose we'll see "false fingers" being sold as keychains quite soon, and silent acceptance of their use in lower-security settings, because everybody including the guards will be doing it. It's very likely to be possible to mold a false finger on the real finger "in-situ", using the materials common in cosmetics and movie visagist industry, with moulds made by eg. the above-mentioned photochemical way. (Put a thin layer of latex (optionally enhanced with ingredients modifying its electrical conductivity to match human skin) to the circuitboard with etched fingerprints, press your finger against it, and wait until the rubbery material sets. Then carefully peel off your finger from the board, and voila - your hands have new "identity" without looking suspicious. Another advantage of this method is the automatical conversion of the 2D representation of a fingerprint to the 3D representation of a finger; the latex layer should be flexible enough.) This is a theoretical proposal; if I'd have more time to fool around, and a fingerprint scanner, I'd play with it. I would be rather cautious about putting too much trust into fingerprint scanners at this stage of their technological development. While biometrics is a good idea, it should not be allowed to creep where it only makes the situation worse. 9705 From: David Alexander Date: Fri Sep 17, 2004 3:18am Subject: RE: Choosing Door Locks(?) Almost any lock can be compromised. Most have a rating, in minutes, of how long this would take. Door locks need to be backed up with other surveillance techniques such as cameras or physical patrols at random intervals that are always less than the rating of the lock, so no-one has a chance to get though it before a patrol comes round. Regards Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: Fernando Martins [mailto:fernando.martins@e...] Sent:17 September 2004 04:00 To:TSCM-L@yahoogroups.com Subject:Re: [TSCM-L] Choosing Door Locks(?) if even PKI or biometrics can have problems, a lock it's just a lock, but there is home security and bank security one thing to think is how many time do you want for one can open a door? (specially a bad guy) other is if one was able to get in, do we let him go? (again, specially a bad guy) in high security systems the point is that it is ALLWAYS possible to get in (if one have the will and the means enough to do it), so the job is make sure that there is no way out or that the heavy cavalry can be there faster enough for locks this 3 names are easy to find anywhere Assa Abloy Chubb Locks Fichet-Bauche FM ----- Original Message ----- From: "Patrick Ryals, CEO" To: Sent: Wednesday, September 15, 2004 8:44 PM Subject: [TSCM-L] Choosing Door Locks(?) > This is a bit off topic but still security oriented. I want to improve > on our office security by replacing all of the door locks. Anyone have > any good sites with a run down on types of door locks and how secure > they are? Perhaps a lock review site from an independent security point > of view. > > I'm considering keypad mechanical locks with a dead bolt and no need for > electricity. There must be a definitive security article on choosing > commercial door locks. > > Please respond privately. This is off topic and I am on digest mode. > > Patrick Ryals, CEO > Nexus Investigations, Inc. > CA PI#22920 > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.766 / Virus Database: 513 - Release Date: 17-09-2004 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9706 From: A Grudko Date: Fri Sep 17, 2004 3:52am Subject: RE: Re: Re: Re-Bugged Again.. -----Original Message----- From: Tmercersec@a... [mailto:Tmercersec@a...] > ... but being part of the security industry should hopefully tip you onto the side of right. That's were I want to be. I believed that too when I was a teenager. Thirty plus years later as not only a part of the security industry but also a police officer since 1977 in the UK and South Africa since 1980, I know there is no clear distinction between right and wrong in politics. So when I sweep an area I'm only interested in the technology operating in the area, not the politics. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.764 / Virus Database: 511 - Release Date: 2004/09/15 [Non-text portions of this message have been removed] 9707 From: Date: Fri Sep 17, 2004 4:14am Subject: Re: Re: Re: Re-Bugged Again.. Andy I agree that sometimes in politics things can be a bit grey, however there is a clear distinction between criminals and ordinary citizens. I was aware of that as a teenager and my service in the police further reinforced this theory. I have been offered jobs by persons who were clearly from the criminal fraternity, did I take these on, absolutely not. Tim Andy wrote; I believed that too when I was a teenager. Thirty plus years later as not only a part of the security industry but also a police officer since 1977 in the UK and South Africa since 1980, I know there is no clear distinction between right and wrong in politics. So when I sweep an area I'm only interested in the technology operating in the area, not the politics. [Non-text portions of this message have been removed] 9708 From: A Grudko Date: Fri Sep 17, 2004 8:34am Subject: RE: Choosing Door Locks(?) -----Original Message----- From: David Alexander +AFs-mailto:david.alexander+AEA-dbiconsulting.co.uk+AF0- +AD4- Almost any lock can be compromised. People loose keys. They forget combinations. Kids get locked in air-tight vaults. ALL locks can be defeated, if only by the manufacturer (it is said the builders of the Egyptian pyramids were killed to keep their security measures secret - alas we cannot do that today). In 1982 my company supplied security staff for the SA Jewellery show at the old Rand Show grounds in Braamfontein, Johannesburg. An international safe company supplied the main vault but someone got locked in. It took the safe co. about 15 minutes to erect screens around the vault so we could not see what they were doing, but only 3 minutes to open the door. This is not an urban legend - I was there. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko+AEA-icon.co.za Pretoria HO ( 12) 244 0255 - 244 0256 (Fax) Branches: Sandton ( 11) 465 9673 - 465 1487 (Fax) Johannesburg ( 11) 781 7206 - 781 7207(Fax) Mid Rand ( 11) 318 1451 - 318 6846(Fax) Cellular () 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. +ACI-When you need it done right - first time+ACI- --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.764 / Virus Database: 511 - Release Date: 2004/09/15 9709 From: Tech Sec Lab Date: Fri Sep 17, 2004 0:11pm Subject: RE: Bugged Again...Final. Fooey...where do I start. Ok, I am not going to be drawn on the politics...it's not the place. Let me just say this, and leave it at that... In my opinion, in Politics there is no right or wrong. Each side is entitled to their beliefs. In an ideal filtered world there would be a clear right and wrong divided by a sharp line. In real life this is not the case, and I don't care how says otherwise. I will not debate the IRA Sinn Fein connection just like I will not raise the UK Gov FRU connection, nor talk about the UUP and their connections with the UVF. Every side has skeletons in their closet. My point centred on Tim's comments to Alan boldly asking him "Who's side he was on...", clearly indicating that if you were on the SF side that that was the wrong side. My reply, was simply to voice my annoyance that someone would dictate to someone else what side they should or should not be on. The fact remains that the comment by Alan should have been as seen in the context it was, a discussion about security trade craft. I wouldn't care if the comment was about an instance of dearest Osama feeding the CIA disinformation after he found a bug in his office! It's relevant to TSCM (when a bug is found you can always opt to leave it there) and therefore I see no reason to exclude the conversation. And whether the comment is seen as an advisement or recommendation seems a little "out there". The SF security people will not review their policy because of a post to the tscm-l list. In regards to your second message I have emailed you directly, but save to say I did not mean to patronise anyone, nor would I presume to do to anyone on the list. George's message sums up my sentiments exactly, as he clearly said, it's a case of lawful or unlawful. Whoever planted the device committed an unlawful act and they should be caught and punished by being publicly whipped for his woefully constructed device. If persons within the office that was being bugged are committing unlawful acts and the sweeper is aware of this, then the right thing to do would be to decline the work. If he is unsure, then...................... Hmm....question to the list: What do you do? In regards to Andy's post...I'm with him. To hell with the politics. If a political party asks me to sweep an office (Yes even SF) then I would. If I started the work and realised I was being party to criminal activities I would leave the place and go straight to the Police. But it is not my place to decide who is criminal and who isn't. That is the law enforcers job. But do not get me wrong, if I am aware that a possible client is under legal surveillance then I will decline the work from the start. I won't however accept responsibility if I am hired, the Police are aware that I am being hired, I sweep, I find something, I notify my client and next thing I know the balaclavas are knocking my door asking me why I tipped the bad guys off to their surveillance op. I will not feel guilty for doing my job. Either I know what's going on or I don't. In regards to definite criminal aspects the same applies in my book... If I get hired by John Doe, I turn up at his apartment and find 3k's of snow being cut on the kitchen table then I will politely excuse myself to the restroom and then go to the nearest armed branch of law enforcement. I don't think I can add much more to this...I hope I haven't forgotten anything! Feel free to shoot me down... I am but human! Regards -O ************************************ Message: 4 Date: Thu, 16 Sep 2004 13:05:36 EDT From: Tmercersec@a... Subject: Re: Re: Re: Re-Bugged Again.. Ois Very commendable sentiments, but being part of the security industry should hopefully tip you onto the side of right. That's were I want to be. IRA/Sinn Fein spying/targetting in the past is about discovering information or the whereabouts of security forces to do them harm. What the 'Brits' were or were not doing on these occasions is not in the same context. I just don't think that we should be indirectly advising or recommending to what both your and my governments describe as an organisation which is inextricably wedded to its illegal army wing. Tim [Non-text portions of this message have been removed] ****************** Message: 6 Date: Thu, 16 Sep 2004 14:05:46 EDT From: Tmercersec@a... Subject: Re: Re-Bugged Again..further to my last Ois I found your mail patronising in content, plus I primarily addressed my question to the original sender. For you to answer it before he did is a bit presumptuous. Also why involve others such as Steve U, do you not feel secure enough in your own position? I think it is VERY important whose side you are on. I assume that if a major drug dealer came to you requesting a sweep because he believed the Police Drug Squad were monitoring him, you would not accept the job, just because the price is right? I don't often comment within the group as I would not profess to be an expert on TSCM or a technical wizard, however I have been involved in covert surveillance public and private sector for 27 years. This plus growing up and living in Northern Ireland should give me a little edge on matters pertaining to here, don't you think? Tim [Non-text portions of this message have been removed] *************************** Message: 9 Date: Thu, 16 Sep 2004 21:14:21 +0100 From: "George Shaw" Subject: RE: Re-Bugged Again..further to my last Folks please forget the politics on this one. Yes it is about which side you are on, not politically but on lawful or unlawful. The bad guys spend more time visibly on the unlawful side while the government and law enforcement pronominally spend their time on the lawful, there are times when the barrier breaks down and some stray over the line. It is up to each individual as to which side they choose to be on. I would like to believe that the majority are on the white hats side. As I have lived in Northern Ireland most of my life as has my family I have seen the "troubles" 1st hand. I personally know what side I am on BUT that don't matter as far as this "find" is concerned. It was a publicity stunt for sure, a badly constructed on but in the eyes of the none technical public it did look like it could have been a "bug" a bloody big one granted but full of electronic bits that they would never understand had nought to do with audio surveillance but more to do with central heating control. As to who actually placed it my money is on Bob The Builder. -- George Shaw MI3GTO / 2I0GTO " Any Sufficiently Advanced Technology is Indistinguishable from Magic" ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... Fax & Voicemail: +44 (0) 871 242 5365 EchoLink & eQSO (101English) connected 24/7 ****************************** Message: 15 Date: Fri, 17 Sep 2004 10:52:13 +0200 From: "A Grudko" Subject: RE: Re: Re: Re-Bugged Again.. -----Original Message----- From: Tmercersec@a... [mailto:Tmercersec@a...] > ... but being part of the security industry should hopefully tip you onto the side of right. That's were I want to be. I believed that too when I was a teenager. Thirty plus years later as not only a part of the security industry but also a police officer since 1977 in the UK and South Africa since 1980, I know there is no clear distinction between right and wrong in politics. So when I sweep an area I'm only interested in the technology operating in the area, not the politics. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" ********************* Message: 16 Date: Fri, 17 Sep 2004 09:14:34 EDT From: Tmercersec@a... Subject: Re: Re: Re: Re-Bugged Again.. Andy I agree that sometimes in politics things can be a bit grey, however there is a clear distinction between criminals and ordinary citizens. I was aware of that as a teenager and my service in the police further reinforced this theory. I have been offered jobs by persons who were clearly from the criminal fraternity, did I take these on, absolutely not. Tim From: snowhill Date: Sat Sep 16, 2000 5:01am Subject: Enough humour If I wanted to receive jokes and humour I would subscibe to a joke of the day mailing list Let's stick to the topic http://www.networkintrusion.co.uk/ The IDS List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "James M. Atkinson, Comm-Eng" To: "TSCM-L Mailing List" Sent: Saturday, September 16, 2000 3:40 AM Subject: [TSCM-L] A blonde joke for today > > > A blonde joke for today: 80,000 blondes meet at the Wembley > Stadium for a "Blondes Are Not Stupid" convention. The master of > ceremonies says, "We are all here today to prove to the world > that blondes are not stupid. Can I have a volunteer?" > > One blonde steps up, so the master of ceremonies asks her, "What > is 15 plus 15?" > > After 15 or 20 seconds, she replies, "Eighteen." > > Obviously everyone is a little disappointed. Then 80,000 blondes > start chanting, "Give her another chance, give her another > chance." > > The master of ceremonies says, "Well, since we've gone to the > trouble of getting 80,000 of you here and the World Wide Press, > I guess we can give her another chance." So, asks her, "What is > 5 plus 5?" After 15 or 20 seconds, she replies, "Ninety." > > The master of ceremonies sighs. Everyone is crestfallen and the > blonde starts crying. Again, the 80,000 girls start chanting, > "Give her another chance, give her another chance." > > Unsure whether or not he is doing more harm than damage, the > master of ceremonies finally says, "Okay! One more chance. What > is 2 plus 2?" > > After 15 or 20 seconds, she replies, "Four." > > The stadium of 80,000 blondes start chanting, "Give her another > chance, give her another chance." > > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > Do not try the patience of Wizards, > for they are subtle and quick to anger. > ======================================================================= > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1473 From: Nick Robson Date: Sat Sep 16, 2000 2:41pm Subject: Virus Warning - Joke Virus Warning - Joke ------------- There is a new virus going around, called "work". If you receive any sort of "work" at all, whether via email, internet or simply handed to you by a colleague...DO NOT OPEN IT. Work has been circulating around our building for months and those who have been tempted to open "work" or even look at "work" have found that their social life is deleted and their brain ceases to function properly. If you do encounter "work" via email or are faced with any "Work" at all, then to purge the virus, send an email to your boss with the words "Sorry, I'm off to the pub". The "work" should auto- matically be deleted from your brain. If you receive "work" in paper-document form, simply lift the document and drag the "work" to your garbage can. Put on your coat and skip to the nearest bar with two friends and order three pints of beer. After repeating this action 14 times, you will find that "work" will no longer be of any relevance to you. Send this message to everyone in your address book. If you do not have anyone in your address book, then I'm afraid the "work" virus has already corrupted your life. ************************* The Security Centre Ltd.************************** *************Grand Cayman, Cayman Islands, British West Indies************** 1474 From: Paula Tortorice Date: Sat Sep 16, 2000 4:15pm Subject: Get a Life Lighten up and enjoy, sometimes the Radio geek numbers get to me also. A little humor is nice once in a while. You might want to join a joke of the day list to loosen up. Chill Steve W. Tortorice D.C. Williams & Associates, Inc 206-682-6010 Tortorice@q...- email Professional Investigation and Interpretation Services "Trying to keep things a little light hearted" [Non-text portions of this message have been removed] 1475 From: James M. Atkinson, Comm-Eng Date: Sat Sep 16, 2000 8:31pm Subject: Re: Get a Life At 2:15 PM -0700 9/16/00, Paula Tortorice wrote: > >Lighten up and enjoy, sometimes the Radio geek numbers get to me also. A >little humor is nice once in a while. You might want to join a joke of the >day list to loosen up. Chill >Steve W. Tortorice >D.C. Williams & Associates, Inc >206-682-6010 >Tortorice@q...- email >Professional Investigation and Interpretation Services >"Trying to keep things a little light hearted" A little humor is always a good thing... especially in our business were we have to deal with "really serious shit" on a regular basis. As the list moderator I whole heartedly welcome an occasional bit of humor, sociological insight, or profound observations of life as they help us keep things in perspective. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1476 From: Screaming Date: Sat Sep 16, 2000 2:41pm Subject: carnivore http://www.crypto.com/papers/carnivore-risks.html I only just came across this article and thought it would be of interest to the group. Didn't Dawn discuss this earlier this year? sorry if it is old hat but nevertheless I enjoyed reading it. Keep Cool jc 1477 From: Screaming Date: Sat Sep 16, 2000 6:33pm Subject: RE: Enough humour Hey snowhill lighten up all work and no play make for a dull techno By the way had a peek at your website - enjoyed the visit and going back stay cool jc 1478 From: A Grudko Date: Sun Sep 17, 2000 7:53am Subject: Re: Get a Life ----- Original Message ----- > Lighten up and enjoy, sometimes the Radio geek numbers get to me also. A > little humor is nice once in a while. Personally, I don't think this list is the place for jokes and I don't have the time to read them, but they don't bother me either, I just delete 'em. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), SAIS, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1479 From: snowhill Date: Sun Sep 17, 2000 6:40am Subject: Re: Get a Life Maybe I should have elaborated as to why I feel the humour should be reduced, Whilst I thoroughly enjoyed the elephant crap story, it soon escalated until the jokes occupied over 50% of the mail, I don't just look after counter eavesdropping I have a whole host of other "really serious shit" to look after consequently on a quiet day I'll see around 300 e-mails. In order to "get a life" I need to get off the computer. Keep the humour coming by all means, but keep it in proportion, please. Andy http://www.networkintrusion.co.uk/ The IDS List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "James M. Atkinson, Comm-Eng" To: Sent: Sunday, September 17, 2000 2:31 AM Subject: Re: [TSCM-L] Get a Life > > At 2:15 PM -0700 9/16/00, Paula Tortorice wrote: > > > >Lighten up and enjoy, sometimes the Radio geek numbers get to me also. A > >little humor is nice once in a while. You might want to join a joke of the > >day list to loosen up. Chill > >Steve W. Tortorice > >D.C. Williams & Associates, Inc > >206-682-6010 > >Tortorice@q...- email > >Professional Investigation and Interpretation Services > >"Trying to keep things a little light hearted" > > > > > A little humor is always a good thing... especially in our business > were we have to deal with "really serious shit" on a regular basis. > > As the list moderator I whole heartedly welcome an occasional bit of > humor, sociological insight, or profound observations of life as they > help us keep things in perspective. > > -jma > > > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > Do not try the patience of Wizards, > for they are subtle and quick to anger. > ======================================================================= > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1480 From: Dawn Star Date: Mon Sep 18, 2000 0:12am Subject: "Tap to Bug ratio" "PS: In my humble opinion the Spectrum Analyzer is by far the most valuable TSCM instrument." jma Some of you may remember my comment a few months ago where I stated that in my excess of 2500 sweeps in 27 years, the ratio of wiretaps to R.F. bugs discovered was in the order of ten to one. The reason for this I believe is that wiretaps yield more information, the identity and locations of the parties, and do not generally require covert entry for installation. If this ratio holds up in the overall world as it has during this period of time in Los Angeles, it means that this should significantly set the sweep time allocation and equipment ratio also. Now Jim has said that for a full bore sweep he will bring about two thousand pounds of equiment. I would like to know by weight, how many pounds of gear for R.F. analysis versus how many pounds dedicated for telephone line analysis. Also how much time spent on R.F. analysis versus time allocated to telephone line analysis. Not total time for the sweep but the ratio of time spent. Any comments? Roger Tolces, Electronic Security, Los Angeles [Non-text portions of this message have been removed] 1481 From: Mike F Date: Mon Sep 18, 2000 7:39am Subject: ****SECURITY HOTSITE***** COAST Hotlist: Computer Security, Law & Privacy http://www.cerias.purdue.edu/coast/hotlist/index-noframes.html COAST Hotlist: Computer Security, Law & Privacy NEW LOOK 4 THE ABOVE SITE:BEING UPDATED http://www.cerias.purdue.edu/hotlist/ Later4,mike f. Michael T. Fiorentino "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 1482 From: Robert G. Ferrell Date: Mon Sep 18, 2000 8:00am Subject: Re: Get a Life >Personally, I don't think this list is the place for jokes While I won't claim this necessarily applies to "jokes" (which are comedy, rather than humor), I firmly believe intellectual humor is an assay to see whether someone is really thinking, or just going through the motions. People who fail to laugh at something that's genuinely funny without some overt rationale (i.e., spouse just ran off with the plumber, dog got flattened by a semi, root canal starts in ten minutes) send up a red flag for me. I have to wonder what else is wrong with them... ;-) RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 1483 From: Matthijs van der Wel Date: Mon Sep 18, 2000 5:24am Subject: Do-it-yourself Carnivore -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Network ICE has released an open-source do-it-yourself Carnicore, named Altivore. See http://www.networkice.com/altivore/default.htm [...] alternative for ISPs We are giving ISPs responding to court orders free license to use Altivore. This means that if the FBI comes in with a search warrant for the e-mail or full traffic of one of their customers, the ISP may be able to satisfy the warrant by using Altivore rather than having to install one of the FBI's secretive "black-boxes". Network ICE can do nothing to stop legitimate court orders; we can at least reduce the intrusiveness of this legal process. narrow the debate Network ICE feels the privacy debate is extremely important. Carnivore itself isn't important -- the fact that we allow the government heavy-handed access to our private data is the real issue. Recently, a spokesman for a prominent privacy group made the erroneous claim that Carnivore could not selectively capture a single person's e-mail and ignore all others. With Altivore, we've clearly shown (in source-code form) exactly how this is done. Misunderstanding of the technical issues only dilutes the debate over the privacy issue. [...] Yours sincerely, Matthijs van der Wel Consultant E-Commerce - ------------------------------------ PAC Finance & Communications Raamweg 21 - 22 2596 HL THE HAGUE THE NETHERLANDS - ------------------------------------ T +31 - 70 - 31 30 209 (direct) F +31 - 70 - 31 30 221 E mailto:mwe@p... U http://www.pac.nl - ------------------------------------ "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s)or entity named/indicated above. If you are not the dentified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact me immediately for instructions." -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.8 for non-commercial use iQA/AwUBOcXfRJ+uKjzZYzkREQKRugCeJItR9GknRkOfGf3+yrPh5cTbtuoAoIYk p0wkiBOSPZaej5i2gOHxKMsy =zvm2 -----END PGP SIGNATURE----- [Non-text portions of this message have been removed] 1484 From: Matthijs van der Wel Date: Mon Sep 18, 2000 5:19am Subject: Microsoft tracks users across domains -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Microsoft can track users across different domains. The method used is accesible to everyone (!). This is an exerpt of an article from ZDNet (source below): [...] Most Microsoft sites assign you a unique identifier, called a GUID, in a cookie. Users generally like to set their browsers to accept cookies but only to report them back to the originating domain, or use IE's Trusted Zone feature because it makes them feel more secure. Microsoft uses two different kinds of redirection to make its cookies readable across domains, effectively canceling your browser security settings. Now it's time to ask "So what?", since they're all Microsoft companies. Who cares if they track me from MSN to MSNBC to bCentral? And it wouldn't be that big a deal if that's where it ended. Remember that HotMail is a Microsoft company, and yes, it uses the same GUID in its cookies as other Microsoft sites. Many people use HotMail accounts for a degree of anonymity, but they're hardly anonymous to Microsoft. But that's just the tip of the iceberg. Microsoft's cleverness at collecting user data across its domains allows anyone with a Website to use the same mechanism to get a Microsoft GUID. A bright guy who goes by the name "pchelp" maintains a Website with interesting and useful stuff on it, including a site-tracing batch file that's very handy for backtracing sites and uncovering connections among sites and site owners. Pchelp has published a page that documents the Microsoft GUID trick, but he also performed an experiment, and found that anyone with a Website can cause Microsoft's ID server to create Microsoft GUIDs, effectively pretending to be a Microsoft site. If you'd like more detailed information, see pchelp's report: http://www.pc-help.org/privacy/ms_guid.htm [...] Source: PC Magazine [pcmalert@z...], Ezine: Cookie Date, P3P Security, and More, Date: vr 15-9-2000 17:37 Yours sincerely, Matthijs van der Wel Consultant E-Commerce - ------------------------------------ PAC Finance & Communications Raamweg 21 - 22 2596 HL THE HAGUE THE NETHERLANDS - ------------------------------------ T +31 - 70 - 31 30 209 (direct) F +31 - 70 - 31 30 221 E mailto:mwe@p... U http://www.pac.nl - ------------------------------------ "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s)or entity named/indicated above. If you are not the dentified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact me immediately for instructions." -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.8 for non-commercial use iQA/AwUBOcXeHp+uKjzZYzkREQJlggCgjRMeIZd/2Ou5wowWY53PxuL5ApgAoIkt L8R5K9jA342YAeenQB5CgS+i =S8qY -----END PGP SIGNATURE----- 1485 From: Matthijs van der Wel Date: Mon Sep 18, 2000 5:27am Subject: Sorry for receipt request -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Sorry, I forgot to turn the 'receipt request' off on my posting about Microsoft. I've now got the feature turned off at all. Sorry for the inconvenience and intrusion.... Matthijs van der Wel (shame on me...) -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.8 for non-commercial use iQA/AwUBOcXgDZ+uKjzZYzkREQI34ACg+gq4InDB5mg3JhIQSA/6h9uQMDwAn1Uo yaao1tY6TniZHkVSilEsRY2s =pvCy -----END PGP SIGNATURE----- 1486 From: Matthijs van der Wel Date: Mon Sep 18, 2000 5:44am Subject: Carnivore FAQ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 See http://www.robertgraham.com/pubs/carnivore-faq.html for a Carnivore FAQ. Yours sincerely, Matthijs van der Wel -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.8 for non-commercial use iQA/AwUBOcXj/5+uKjzZYzkREQLeTACfdpOL7vhCGtnLUwn8PXiqzPJ/MIEAnjsA qtaYYeQqiAvkkBicbqvFrTc3 =IDHi -----END PGP SIGNATURE----- 1487 From: David Miller Date: Mon Sep 18, 2000 7:31am Subject: RE: Enough humour I disagree. The jokes are a nice break. -----Original Message----- From: snowhill [mailto:talisker@t...] Sent:Saturday, September 16, 2000 5:02 AM To:TSCM-L@egroups.com Subject:[TSCM-L] Enough humour If I wanted to receive jokes and humour I would subscibe to a joke of the day mailing list Let's stick to the topic http://www.networkintrusion.co.uk/ The IDS List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "James M. Atkinson, Comm-Eng" To: "TSCM-L Mailing List" Sent: Saturday, September 16, 2000 3:40 AM Subject: [TSCM-L] A blonde joke for today > > > A blonde joke for today: 80,000 blondes meet at the Wembley > Stadium for a "Blondes Are Not Stupid" convention. The master of > ceremonies says, "We are all here today to prove to the world > that blondes are not stupid. Can I have a volunteer?" > > One blonde steps up, so the master of ceremonies asks her, "What > is 15 plus 15?" > > After 15 or 20 seconds, she replies, "Eighteen." > > Obviously everyone is a little disappointed. Then 80,000 blondes > start chanting, "Give her another chance, give her another > chance." > > The master of ceremonies says, "Well, since we've gone to the > trouble of getting 80,000 of you here and the World Wide Press, > I guess we can give her another chance." So, asks her, "What is > 5 plus 5?" After 15 or 20 seconds, she replies, "Ninety." > > The master of ceremonies sighs. Everyone is crestfallen and the > blonde starts crying. Again, the 80,000 girls start chanting, > "Give her another chance, give her another chance." > > Unsure whether or not he is doing more harm than damage, the > master of ceremonies finally says, "Okay! One more chance. What > is 2 plus 2?" > > After 15 or 20 seconds, she replies, "Four." > > The stadium of 80,000 blondes start chanting, "Give her another > chance, give her another chance." > > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > Do not try the patience of Wizards, > for they are subtle and quick to anger. > ======================================================================= > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1488 From: Steve Uhrig Date: Mon Sep 18, 2000 8:53am Subject: Re: "Tap to Bug ratio" Once upon a midnight dreary, Dawn Star pondered, weak and weary: > the ratio of wiretaps to R.F. bugs discovered was > in the order of ten to one. > it means that this should significantly set the sweep > time allocation and equipment ratio also. Well said, and there is an important lesson to be learned here. A quick definition so we are all on the same piece of paper: "Tap" means surveillance of a phone system/line. Generally a wireline attack. "Bug" generally means something radiated (RF) or other than phone line attacks, like a hardwired microphone, transmitter or recorder. Read Roger's message again. It has important information not understood by the majority of either (alleged) providers or consumers of sweep services. I would not disagree with Roger's ratio. I have not found enough items of either type to indicate any pattern. His logic seems correct though, and the buying pattern of the government would bear this out (not that the government is our adversary, they're just the only customer on whom we can have sufficient data on acquisitions to draw a conclusion). I have always felt the bulk of the effort should be concentrated on conducted leaks as opposed to radiated ones, phones in particular. However, the countersurveillance manufacturing industry is market driven. Look at REI as a prime example. People think the RF sweeping is the most glamourous and therefore gets the bulk (or all) of the R&D, manufacturing and marketing dollar. The catalogs and websites also will bear this out. In the majority of calls I get from the public wanting to buy a "bug detector", they're picturing some thing with an antenna and an interesting array of colored LEDs. Artistic license by the entertainment industry probably is most responsible, but there is no accurate unbiased source of information for the layman. So we can't blame them, only educate them. The same is true of calls I get from people wanting to get into the business. RF is glamourous. RF gets all the attention. You can wear a necktie when you do an RF sweep. In my opinion, the places who peddle sweep equipment take advantage of this. Anyone who has been involved with CCS will know what I mean. Even in much of the genuine equipment, it's obvious (from an engineering standpoint) that glamour was an important or even predominant factor in the design. Don't get me started on this one. But the threats are far more likely to be on the phone system or lines. There, it's not glamourous. You don't wear a necktie. You wear old grubbies and slither through crawl spaces and rat infested basements and areas God never intended for people to go. There is a distinct advantage to having a belly smaller than mine. Were I to install something, I would seek out these same areas where many sweepers wouldn't bother to get their hands dirty. The moral of the story: Spend the money and effort in proportion to the threat. Although we should be capable and diligent in all areas, if there is ten times the possibility of hits on the phones, then we should expend the proportionally larger amount of resources inspecting phones. We should be acquiring and learning to use tools for telephone system inspection. DVM. TDR/Scope. It's not expensive and is DC for the most part. Simple algebra you can do in your head. We shouldn't be worrying about getting another spectrum analyzer or antenna because we heard there might be a threat at 6000 gigs and someone else sweeps there, and whoever quotes the highest frequencies is the most competent. And that is not generally true, from my observations. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1489 From: James M. Atkinson, Comm-Eng Date: Mon Sep 18, 2000 9:36am Subject: Re: "Tap to Bug ratio" At 9:53 AM -0400 9/18/00, Steve Uhrig wrote: >Once upon a midnight dreary, Dawn Star pondered, weak and weary: > > > > the ratio of wiretaps to R.F. bugs discovered was > > in the order of ten to one. > > > it means that this should significantly set the sweep > > time allocation and equipment ratio also. > >Well said, and there is an important lesson to be learned >here. > >A quick definition so we are all on the same piece of >paper: "Tap" means surveillance of a phone system/line. >Generally a wireline attack. "Bug" generally means >something radiated (RF) or other than phone line attacks, >like a hardwired microphone, transmitter or recorder. [snip] A device which is designed to radiate a RF signal would be considered a "bug" A device that is designed not to radiate a signal, but instead conducts a signal would be considered a "Tap". The key point here being "What is it designed to do". Of course anything that conducts a signal above pure DC will radiate a signal to some extent. For example, we all know about how baseband video signals radiate off of conductors. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1490 From: Doug Ellsworth Date: Sat Sep 9, 2000 11:02pm Subject: Re: Re: "Tap to Bug ratio" Steve and Group, I couldn't agree more with your comments regarding practicioners with respect to conducted threats. An excellent statement!!! Hidden hard-wired microphones intended to intercept room audio are bugs too, though most often they would probably use conductors of convenience, such as unused (often abandoned) telephone, computer, etc. cabling. My own working definition is that communications (whether voice, or data) that are intended to be conveyed by wire are intercepted by taps, and ordinary room audio is compromised by either wire or wireless bugs (transducers). All is well, -Doug Doug Ellsworth Secure Communications Corp., Inc. ----- Original Message ----- From: Steve Uhrig To: Sent: Monday, September 18, 2000 6:53 AM Subject: [TSCM-L] Re: "Tap to Bug ratio" > > Once upon a midnight dreary, Dawn Star pondered, weak and weary: > > > > the ratio of wiretaps to R.F. bugs discovered was > > in the order of ten to one. > > > it means that this should significantly set the sweep > > time allocation and equipment ratio also. > > Well said, and there is an important lesson to be learned > here. > > A quick definition so we are all on the same piece of > paper: "Tap" means surveillance of a phone system/line. > Generally a wireline attack. "Bug" generally means > something radiated (RF) or other than phone line attacks, > like a hardwired microphone, transmitter or recorder. > > Read Roger's message again. It has important information > not understood by the majority of either (alleged) > providers or consumers of sweep services. > > I would not disagree with Roger's ratio. I have not found > enough items of either type to indicate any pattern. His > logic seems correct though, and the buying pattern of the > government would bear this out (not that the government is > our adversary, they're just the only customer on whom we > can have sufficient data on acquisitions to draw a > conclusion). > > I have always felt the bulk of the effort should be > concentrated on conducted leaks as opposed to radiated > ones, phones in particular. > > However, the countersurveillance manufacturing industry is > market driven. Look at REI as a prime example. > > People think the RF sweeping is the most glamourous and > therefore gets the bulk (or all) of the R&D, manufacturing > and marketing dollar. The catalogs and websites also will > bear this out. > > In the majority of calls I get from the public wanting to > buy a "bug detector", they're picturing some thing with an > antenna and an interesting array of colored LEDs. Artistic > license by the entertainment industry probably is most > responsible, but there is no accurate unbiased source of > information for the layman. So we can't blame them, only > educate them. > > The same is true of calls I get from people wanting to get > into the business. RF is glamourous. RF gets all the > attention. You can wear a necktie when you do an RF sweep. > > In my opinion, the places who peddle sweep equipment take > advantage of this. Anyone who has been involved with CCS > will know what I mean. > > Even in much of the genuine equipment, it's obvious (from > an engineering standpoint) that glamour was an important or > even predominant factor in the design. Don't get me started > on this one. > > But the threats are far more likely to be on the phone > system or lines. There, it's not glamourous. You don't wear > a necktie. You wear old grubbies and slither through crawl > spaces and rat infested basements and areas God never > intended for people to go. There is a distinct advantage to > having a belly smaller than mine. Were I to install > something, I would seek out these same areas where many > sweepers wouldn't bother to get their hands dirty. > > The moral of the story: Spend the money and effort in > proportion to the threat. Although we should be capable and > diligent in all areas, if there is ten times the > possibility of hits on the phones, then we should expend > the proportionally larger amount of resources inspecting > phones. > > We should be acquiring and learning to use tools for > telephone system inspection. DVM. TDR/Scope. It's not > expensive and is DC for the most part. Simple algebra you > can do in your head. We shouldn't be worrying about getting > another spectrum analyzer or antenna because we heard there > might be a threat at 6000 gigs and someone else sweeps > there, and whoever quotes the highest frequencies is the > most competent. > > And that is not generally true, from my observations. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > 1491 From: Date: Mon Sep 18, 2000 6:31am Subject: Re: Re: "Tap to Bug ratio" In a message dated 9/18/00 8:23:40 AM Pacific Daylight Time, jmatk@tscm.com writes: << A device which is designed to radiate a RF signal would be considered a "bug" A device that is designed not to radiate a signal, but instead conducts a signal would be considered a "Tap". >> IMIO a "bug" has a microphone, the signal may be radiated out by any means, RF or by wire or phone line. A "tap" deals with phone lines and the info carried on them, conversation, fax or data. Extremely dangerous to the "enemy," using my Radio Shack 64-1950. MACCFound 1492 From: Ted Swift Date: Mon Sep 18, 2000 7:32am Subject: Re: Re: "Tap to Bug ratio" I had thought of it as a "tap" being something directed at picking off a signal transmitted over but confined to a line (e.g. telephone conversation) whereas "bugging" is targeted against coversations not originally intended to travel along a wire pair (e.g. room conversations between individuals). Thus, a telephone instrument with a hookswitch bypass or spare mic in it would be said to be "bugged" even though the eavesdropper would also have to install a "tap" somewhere to exploit the "bug" once the conversations were traveling along the telephone line. My .02 cents. Ted Swift ACM Research Service At 11:31 AM 9/18/2000 EDT, you wrote: >In a message dated 9/18/00 8:23:40 AM Pacific Daylight Time, jmatk@tscm.com >writes: > ><< A device which is designed to radiate a RF signal would be considered a >"bug" > A device that is designed not to radiate a signal, but instead > conducts a signal would be considered a "Tap". >> > >IMIO a "bug" has a microphone, the signal may be radiated out by any means, >RF or by wire or phone line. A "tap" deals with phone lines and the info >carried >on them, conversation, fax or data. > >Extremely dangerous to the "enemy," using my Radio Shack 64-1950. > >MACCFound > 1493 From: James M. Atkinson, Comm-Eng Date: Mon Sep 18, 2000 11:25am Subject: Re: "Tap to Bug ratio" At 9:53 AM -0400 9/18/00, Steve Uhrig wrote: > >Once upon a midnight dreary, Dawn Star pondered, weak and weary: [snip] >We should be acquiring and learning to use tools for >telephone system inspection. DVM. TDR/Scope. It's not >expensive and is DC for the most part. Simple algebra you >can do in your head. We shouldn't be worrying about getting >another spectrum analyzer or antenna because we heard there >might be a threat at 6000 gigs and someone else sweeps >there, and whoever quotes the highest frequencies is the >most competent. > In my humble opinion the TSCM'er should have TWO spectrum analyzers. The first with coverage from just below the voice band (below 100 Hz) up to just above 2.7 GHz. The second should be a microwave unit capable of handling various mixers up to whatever credible threat they can identify (but generally to at least 18, 22, or 26.5 GHz). The rationale behind using two units is simply that microwave units tend to run hotter, have higher noise levels across all bands, have a higher DANL, and create more false signals in the lower bands then a lower frequency unit. The microwave units also tend to be more alerting, are more of a maintenance headache, and tend not to be usable with internal pre-amplifiers (above 3 GHz). Microwave units tend to have very poor performance below 9 kHz, and are generally prone to flake-out below the main IF (usually 310.7 MHz). On the other hand the "low band" 3 GHz spectrum analyzers will be most helpful if they contain a switched DC block, or they can accurately handle voice frequency signals. My personal preference is to use a SA with both a switched DC block, and an external transient limiter as this allows for both a radiated evaluation and a very sensitive conducted evaluation as well. I also like a SA where I can drop my attenuation to 0 dB, and also insert an internal low noise preamp of at least 20 dB. I would agree with Steve that the telephone analysis is very important, and that you really don't need much more then a DVM, handheld O'Scope, and a few simple adapter boxes. I still think that a good flashlight is the most important tool you can have, and that the human eyeballs are the most valuable instrument. Of course everybody has their own way of doing TSCM, and their own equipment preferences. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1494 From: Date: Mon Sep 18, 2000 0:26pm Subject: Digital Angel This may be old news to some of you and maybe even a bit off topic, but I found this extremely iinteresting and somewhat frightening. www.digitalangel.net Applied Digital Solutions has developed a new technology that we believe will revolutionize E-Business security, emergency location and medical monitoring and commodities supply chain management (food safety). That technology has been named Digital Angel?. ADS is actively seeking joint venture partners to develop and market this technology. We expect to produce a prototype of the device by the end of 2000. We believe the potential global market for this device - in all of its applications - could exceed $100 billion. Basic Features of Digital Angel? The idea behind the initial version of Digital Angel[tm] is to build a microchip that can be worn close to the body. Subject to FDA approval, future versions of the device may be able to be implanted within the body. This microchip will include biosensors that will measure the biological parameters of the body and store this information. It will also have an antenna that will receive signals from GPS satellites. The geographical locator of the chip can be derived from these signals. The antenna also communicates with ground stations. It will receive commands from the stations and will send the biological information and location data to the ground station. This could take the form of a distress signal sent to a monitoring facility when the unit detects a medical emergency. The chip will be equipped with a micro battery. This battery will be self-rechargeable taking energy from the body or from its surroundings. All these components will be combined into a unit the size of a dime. Digital Angel[tm] will remain dormant most of the time. It will only be activated by the wearer or by commands from the ground station. The purpose is to save battery energy and to avoid interference with other devices, such as medical equipment or airplanes. The unit can be turned off by the wearer, thereby making the monitoring voluntary. It will not intrude on personal privacy except in applications applied to the tracking of criminals. Digital Angel[tm] measures bodily parameters; however, it does not interact with the body chemically or biologically. It is harmless and will not interfere with body functions in any way. Limitations of Competing Technologies While a number of other tracking and monitoring technologies have been patented and marketed in the past, they are all unsuitable for the widespread tracking, recovery and identification of people due to a variety of limitations, including unwieldy size, maintenance requirements, insufficient or inconvenient power-supply and activation difficulties. For the first time in the history of location and monitoring technology, Digital Angel? overcomes these limitations. 1495 From: Date: Mon Sep 18, 2000 3:09pm Subject: Icom R3 Anyone have any experience with the Icom R3 scanner? Given it's video capabilities it seems it may be usefull within the TSCM realm. I wanted to know if anyone had any information regarding this radio, good or bad? Thanks and I apologize if this question is way off topic. Niko 1496 From: Steve Uhrig Date: Mon Sep 18, 2000 5:48pm Subject: Re: Digital Angel Once upon a midnight dreary, niko@d... pondered, weak and weary: > This may be old news to some of you and maybe even a > bit off topic, but I found this extremely iinteresting > and somewhat frightening. > www.digitalangel.net > We expect to produce a prototype of the device by the > end of 2000. The above sentence says it all. This thing is someone's science fiction concept, and they are looking for funding to support them for a few years while they prove the job can't be done. Nowhere near practical. The industry is nowhere even remotely near what was claimed, and will not be for some time. Technology is advancing, but the laws of physics have yet to be violated. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1497 From: andre holmes <1ach@g...> Date: Mon Sep 18, 2000 6:15pm Subject: Re: Icom R3 IcomR3--------The radio will be of little benefit to the pro-sweeper since the sweeper already has the capability to intercept transmitted video other wise its just a scanner. ----- Original Message ----- From: To: Sent: Monday, September 18, 2000 4:09 PM Subject: [TSCM-L] Icom R3 > > > Anyone have any experience with the Icom R3 scanner? Given it's video > capabilities it seems it may be usefull within the TSCM realm. I > wanted to know if anyone had any information regarding this radio, good or > bad? Thanks and I apologize if this question is way off topic. > > Niko > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1498 From: Steve Uhrig Date: Mon Sep 18, 2000 6:53pm Subject: Re: Icom R3 Once upon a midnight dreary, niko@d... pondered, weak and weary: > Anyone have any experience with the Icom R3 scanner? > Given it's video capabilities it seems it may be usefull > within the TSCM realm. I wanted to know if anyone had > any information regarding this radio, good or bad? The R3 is not out yet except for a few preproduction units for marketing. Video comes in several different flavors. Broadcast video is AM. Virtually all 2.4 gig video is FM. Very different. I doubt seriously ICOM has incorporated an FM video detector into the R3. If it receives broadcast video OK, then they are using an AM detector (cheapest) which will work to a tiny extent on FM but not well. The converse is not true. An FM detector will not see AM video at all. The release of the R3 has been delayed again and again. From what I've heard on the inside, after making many claims, ICOM is realizing they have made too much of the thing's video capability and are looking at it all again. My guess is they are trying to find an elegant way to slope tune FM video at 2.4. They probably had not considered anything except broadcast video (AM) originally. But then someone asked about the 2.4 toys and they had to backpedal some. There are many ways to detect video using existing or simpler equipment. For 2.4 gig stuff which encompasses 90%+ of the wireless video threats (and audio, since the modules are so cheap) a simple Wavecom receiver makes a good detector. The Wavecom is very sensitive (cheap) but has poor selectivity (expensive). By stepping through the 4 channels, the sloppy receiver will see anything in the band. If there is any interest, I will write up how to convert a Wavecom receiver for sweep use. And, we don't really care about intercepting surveillance video and displaying it in living color. All we want to know is whether or not the video is there. For a small hobby scanner, the little receivers like the R3 are fine. I believe in the case of the R3 you would be paying a premium for a feature that is more a gimmick than a truly useful tool. And all these small receivers have miserable front end selectivity. You sacrifice a lot of performance for a small package. Filters take real estate, which the portables do not have. Steve (former ICOM dealer) ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1499 From: James M. Atkinson, Comm-Eng Date: Mon Sep 18, 2000 7:57pm Subject: Re: Icom R3 >[snip] >There are many ways to detect video using existing or >simpler equipment. For 2.4 gig stuff which encompasses 90%+ >of the wireless video threats (and audio, since the modules >are so cheap) a simple Wavecom receiver makes a good >detector. The Wavecom is very sensitive (cheap) but has >poor selectivity (expensive). By stepping through the 4 >channels, the sloppy receiver will see anything in the >band. If there is any interest, I will write up how to >convert a Wavecom receiver for sweep use. [snip] Your right about the Wavecoms being sensitive... they bandpass, and then punch up the signal almost 30 dB before it hits the first mixer. Then the IF passes though a 4 stage AGC circuit (and three more filters) which can add an additional 100 dB of punch. Lets see... that works out to around 80 dB of bandpass filters, and almost 130 dB of total amplification. Add to that the fairly wide deviations they use and you can be way off target and still snag the signal. On top of this the video gain circuit can pump the signal up another chuck. It is a 20-25 MHz signal that is tunable within a 50 MHz window, so it's pretty much a case of "fishing with dynamite". Ah, but we must also keep in mind that the Wavecoms can be easily re-tuned (tweak a pot) to operate between 1.43 to 2.53 GHz (so don't just rely on the stock units). Clover makes a fairly decent commercial unit that provides both a 4' LCD monitor and an integrated 2.4 GHz receiver that scans though the four channels automatically for just a few hundred dollars (you can special order them at Radio Shack). Please feel free to post any materials on how to modify a Wavecom, or anything else suitable for addressing the 2.4 GHz threat. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1500 From: James M. Atkinson, Comm-Eng Date: Mon Sep 18, 2000 11:30pm Subject: Estimate Worksheet After copious suggestions from list members and some reworking of the format along with adding column for various threat levels I think the estimate worksheet now works a lot better. http://www.tscm.com/estimate.html Please take a look at it and let me know what I can do to improve it, or make it easier for customers to use. My goal is to give the client a worksheet so they themselves can get a realistic idea of how many man hours it will take for several types of sweeps. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1501 From: Gregory Horton Date: Tue Sep 19, 2000 0:37pm Subject: FYI - The other side of the investigation I received this via e-mail and thought you might be interested. Greg Horton For Immediate Release September 13, 2000 Washington D.C. FBI National Press Office Statement by FBI Director Louis J. Freeh Concerning Wen Ho Lee Case In June of this year Judge Parker raised as a possibility the opportunity to engage in mediation in the Wen Ho Lee case. Ultimately the parties agreed to a protocol and four weeks ago, even prior to the most recent bail hearings, Dr. Lee's lawyers and the government began the plea bargain process in earnest. Our goal was to achieve what is being announced today. In return for a plea of guilty to one felony count, Dr. Lee and his lawyers agreed to a process we believe provides the opportunity to determine what in fact happened to the nuclear design and source codes that Dr. Lee unlawfully and criminally downloaded, copied, and removed from Los Alamos. In simple terms, the government accepted this plea in exchange for the full cooperation of Dr. Lee. FBI investigation, with great assistance from the nuclear weapons experts at Los Alamos, determined that the rough equivalent of 400,000 pages of nuclear design and testing information was transferred out of the secure computers at Los Alamos and downloaded onto ten portable tapes. As the government has previously stated, this 806 megabytes of nuclear weapons data represents the fruits of 100s of billions of dollars of investment by the United States. While three of the tapes have been recovered, the others remained missing and unaccounted for. Documents seized from Dr. Lee's possession during searches in the course of the investigation provided substantial evidence of his criminal conduct. Complex analysis of millions of computer records established with certainty that during nearly 40 hours of downloading over 70 different days Dr. Lee manipulated these enormous and often highly classified nuclear weapons data files in a way that defeated existing security and allowed them to be placed onto tapes in an unclassified setting. While some of the information was not classified, the government was prepared to prove that much of it was highly classified nuclear weapons information. The government was also prepared to prove that the tapes were unlawfully made and unlawfully removed from the possession of the United States. With today's plea agreement, there is no longer any doubt that it happened. Dr. Lee acknowledges that in his plea. The government was prepared to prove that the weapons data was taken in this fashion and that numerous efforts were made both to conceal the unlawful download of classified information and to destroy the electronic footprints left by the transfer and downloading process. The government was prepared to prove that after the existence of the investigation became known, efforts were made by Dr. Lee to delete files that had been manipulated into unclassified systems. The government was prepared to prove that there were many attempts -- some in the middle of the night -- to regain access to the classified systems even after access had been formally revoked by Los Alamos. As the government has previously represented to Dr. Lee and the court, determining what happened to the tapes has always been paramount to prosecution. On balance, from the moment it became clear that the nuclear weapons design and testing information was stolen, it is most important to the security of the nation to determine with certainty what Dr. Lee did with the tapes, if they were copied, and whether he gave them to another country. Success in the investigation and prosecution, while clearly an objective given the extraordinary sensitivity of what was removed from Los Alamos, does not in the end protect the nation to the degree that determining what happened to the tapes after he made them does. The safety of the nation demands we take this important step. In this case, as has happened often in the past, national security and criminal justice needs intersect. In some instances, prosecution must be foregone in favor of national security interests. In this case, both are served. As the government indicated previously, the indictment followed an extensive effort to locate any evidence that the missing tapes were in fact destroyed, and repeated requests to Dr. Lee for specific information and proof establishing what did or did not happen to the nuclear weapons data on the tapes. None was forthcoming. The indictment followed substantial evidence that the tapes were clandestinely made and removed from Los Alamos but no evidence or assistance that resolved the missing tape dilemma. Some will undoubtedly question whether the penalty imposed by this guilty plea arrangement is commensurate with the theft and crimes that occurred. Dr. Lee was entrusted with some of the nation's most vital and highly classified information. Were the location of the tapes not at issue, the answer in all likelihood would be no. But the location of the stolen data and who, if anybody, has had access to it, are at issue. These have been the central issues since we first asked Dr. Lee, prior to the indictment, what he did with the tapes and information. The obligation that rests on the government is first and foremost to determine where the classified nuclear weapons information went and if it was given to others or destroyed. This simple agreement, in the end, provides the opportunity of getting this information where otherwise none may exist. Dr. Lee has pleaded to his crime. Now for the first time we have the opportunity for him to explain what happened and to provide the United States with the information necessary to give assurance that the nuclear weapons data has not been and cannot further be compromised. As is customary, the agreement is based on his truthfulness -- and the government will have ample opportunity to verify what we are told, to include, if necessary, use of the polygraph. As the Attorney General said, if we believe he is not being truthful and forthcoming, then we can move to void the agreement and prosecute on all counts in the indictment. The FBI is grateful to the Attorney General and her staff for making this plea bargain possible. We are also grateful to U.S. Attorney Norman Bay, lead prosecutor George Stamboulidis, and all of the other prosecutors and FBI Agents who so meticulously constructed this case and who were prepared to go to trial. I want especially to thank the FBI's many computer experts who, along with John Browne and his staff at Los Alamos, were able to unravel this extraordinarily complex computer case. From: Date: Tue Sep 17, 2002 1:15pm Subject: Sweep San Jose, CA area I have a client who needs a sweep in the San Jose , CA area. You deal with the client on price etc. It is Needed ASAP as always HA! Regards, Ronald R. Oling, J.D. Managing Dir. Int. Inv. SECURITY MANAGEMENT INTERNATIONAL 8812 Tradeway San Antonio, Texas 78217 210-824-2653 210-829-8366 fax website: www.smi-tx.com Texas Lic. A 06570 Member of CALI, TALI, World Security Oraganization, WAD, Investigators of America, MEXICO Office GUATEMALA CITY Office SMI-Guate 30 Av. B, 17-63, Zona 7 Col. Villa, Linda 1 Guatemala, Ciudad Carolina Urcuyo 502-217-4780 Guate 210-824-2653 USA email; rolingsmi@a... XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX Providing services in Texas, Mexico, Guatemala, Honduras, El Salvador, Belize, Costa Rica, Dominican Republic, Caribbean, Colombia, Brazil, Argentina, Venezuela, UK, Europe, Israel, Indonesia, China, Russian Federation and South Africa. Executive Protection details-Mexico and Central America and South America Assistance to foreign businessmen working in Mexico, Central and South America. XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX Providing all your investigative needs since 1994. Surveillance, Compueter forensics, Corporate espionage, Due Diligence Investigations, Security Surveys, Executive Protection-Latin America, Pre-employment Screening, Witness Locates, Expert Witnesses in Security and High Profile Litigation Support. English/Spanish/German XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX [Non-text portions of this message have been removed] 6244 From: Blake Bowers Date: Tue Sep 17, 2002 7:28pm Subject: Re: Marine Corps Interview Raymond wrote: > Marine Corps General Reinwald was interviewed on the radio the Once again, does anyone EVER check out these things before posting them? www.snopes.com 6245 From: Matt Paulsen Date: Wed Sep 18, 2002 0:27am Subject: Off thread Dominican Republic exempts U.S. from new court With recent war drums, this may be of interest to some. I have two reactions to this article - A: It's just Reuters not doing or doing their job in an (ir)responsible manner[to create more media attention and fear]. or B: I can't imagine why European governments wouldn't want this signed. Hey, maybe Germany will ask Russia to sign one. Or maybe the USA should sign one for Iraq. Disturbed doesn't even begin to describe my reaction if the face value of this article presents all the relevant facts. ------------- UNITED NATIONS (Reuters) -- The Dominican Republic has agreed to give U.S. personnel exemption from prosecution in the new International Criminal Court, a U.S. State Department official said Tuesday. The Dominican Republic, the eastern half of the Caribbean island of Hispaniola, signed the "Article 98" agreement early Monday, the fifth country to do so after Romania, Israel, East Timor and Tajikistan. Another Latin American country was expected to sign a similar pact Thursday, Assistant Secretary of State Otto Reich said, without giving more details. "We know of at least three countries that intend to sign such agreements this week with the United States," Reich said on Monday evening. The United States wants all countries to sign such pacts on the grounds that U.S. personnel should be safe from politically motivated or frivolous prosecutions in the new court. Most of its European allies have resisted, saying the agreements undermine the court's authority. The court came into being on July 1 with a mandate to prosecute war crimes, genocide and crimes against humanity. 6246 From: Matt Paulsen Date: Wed Sep 18, 2002 1:04am Subject: Air Force One tscm from http://cryptome.org/af1-eyeball.htm About 238 miles of wire wind through the presidential carrier. This is more than twice the wiring found in a typical 747. Wiring is shielded to protect it from electromagnetic pulse, which is generated by a thermonuclear blast and interferes with electronic signals. The airplane's mission communications system provides worldwide transmission and reception of normal and secure communications. The equipment includes 85 telephones, as well as multi-frequency radios for air-to-air, air-to-ground and satellite communications. 6247 From: Matt Paulsen Date: Wed Sep 18, 2002 1:10am Subject: RE: Off thread Dominican Republic exempts U.S. from new court Note: Now, reread the article from bottom to top since you read it top to bottom. ------------- UNITED NATIONS (Reuters) -- The Dominican Republic has agreed to give U.S. personnel exemption from prosecution in the new International Criminal Court, a U.S. State Department official said Tuesday. The Dominican Republic, the eastern half of the Caribbean island of Hispaniola, signed the "Article 98" agreement early Monday, the fifth country to do so after Romania, Israel, East Timor and Tajikistan. Another Latin American country was expected to sign a similar pact Thursday, Assistant Secretary of State Otto Reich said, without giving more details. "We know of at least three countries that intend to sign such agreements this week with the United States," Reich said on Monday evening. The United States wants all countries to sign such pacts on the grounds that U.S. personnel should be safe from politically motivated or frivolous prosecutions in the new court. Most of its European allies have resisted, saying the agreements undermine the court's authority. The court came into being on July 1 with a mandate to prosecute war crimes, genocide and crimes against humanity. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6248 From: Raymond Date: Tue Sep 17, 2002 11:44pm Subject: NIA man backtracks on Watchdog testimony http://www.iol.co.za/index.php?set_id=1&click_id=13&art_id=ct200209171215029 97C520355 NIA man backtracks on Watchdog testimony September 17 2002 DAILY NEWS - South Africa A member of the National Intelligence Agency (NIA) backtracked on Monday on evidence he gave the Desai Commission on the controversial Watchdog electronic device. The agent, giving testimony under the alias "Mr Tshabalala", was in the witness stand again after a break of four months. He told the commission he erred when he told it, in May, that the sale of the Watchdog to anyone other than a government department employee was illegal. He said he had confused existing legislation with the Interception and Monitoring Bill soon to be passed by parliament. The device sparked a bugging scare when it was discovered in the offices of the Western Cape Provincial Administration in March this year. However, former members of the administration have told the commission it was there only to guard against electronic eavesdropping. Asked by Nic Treurnicht, advocate for former Western Cape director-general Niel Barnard, why he originally said the purchase was illegal, Tshabalala replied: "It was just a statement on the spur of the moment." Also on Monday, it emerged in cross-examination of NIA deputy director general Barry Gilder that the same Watchdog bought by the province had been earlier examined by NIA. Gilder said a government department, which he did not name, had asked NIA for an assessment of the device after being approached by the South African agents, TSCM Services. "We found it was not suitable for our purpose, that there was better equipment of a similar nature on the market," Gilder said. It registered a high number of false alarms and needed constant monitoring by an experienced person. - Sapa --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za 6249 From: Date: Wed Sep 18, 2002 11:26am Subject: Non-Jamming Cell Phone Silencer To Prevent Incoming Calls Click here: Information Security Systems: Non-Jamming Cell Phone Silencer To Prevent Incoming Calls Just an FYI 6250 From: Steve Uhrig Date: Wed Sep 18, 2002 4:22pm Subject: Re: Non-Jamming Cell Phone Silencer To Prevent Incoming Calls On 18 Sep 2002 at 16:26, MACCFound@a... wrote: > http://www.cell-block-r.com/ I didn't see anything here indicating they HAVE done anything, only a wish list of what they would hope to do if they happened to find some funding somewhere. Sounds like another wannabee hopeful. Maybe they will actually be able to pull something off. I'm suspicious of places who talk glowingly about the end product without any indication of how it will work or how they will get there. Too much of this is vaporware looking for investors/victims. But maybe these guys will be an exception. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6251 From: Charles P. Date: Wed Sep 18, 2002 6:58pm Subject: Re: Re: Non-Jamming Cell Phone Silencer To Prevent Incoming Calls Well, for a high tech communications company they just used a standard out of the box Microsoft Front Page theme for their web site, they must be desperate in need of funding. Charles ----- Original Message ----- From: "Steve Uhrig" To: Sent: Wednesday, September 18, 2002 5:22 PM Subject: [TSCM-L] Re: Non-Jamming Cell Phone Silencer To Prevent Incoming Calls > On 18 Sep 2002 at 16:26, MACCFound@a... wrote: > > > http://www.cell-block-r.com/ > > I didn't see anything here indicating they HAVE done anything, only a > wish list of what they would hope to do if they happened to find some > funding somewhere. > > Sounds like another wannabee hopeful. Maybe they will actually be > able to pull something off. > > I'm suspicious of places who talk glowingly about the end product > without any indication of how it will work or how they will get > there. Too much of this is vaporware looking for investors/victims. > > But maybe these guys will be an exception. > > Steve > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 6252 From: Mike Dever Date: Wed Sep 18, 2002 9:06pm Subject: ISM Band Devices Can anyone in the group point me to where I might find more information (apart from tscm.com) about which companies manufacture ISM band technical surveillance devices (audio and/or video) or devices that can be adapted for use as surveillance devices, especially 5.8 to 6.2 GHz. Let me stress I am NOT looking to buy surveillance devices, just researching the threat. Regards -- Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Email: deverclark@b... Voice: +612 6254 5337 Fax: +612 6278 4020 6253 From: David Alexander Date: Thu Sep 19, 2002 9:32am Subject: Iraq weapons inspectors sweep Here's a thought to kick off a discussion - It seems most probable that the weapons inspectors are going back into Iraq Who's going to sweep the weapons inspectors offices and how long will it take ? How would you go about it if you had the job ? _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 6254 From: James M. Atkinson Date: Thu Sep 19, 2002 10:14am Subject: Re: Iraq weapons inspectors sweep Simple, Assume that their fixed offices are bugged (which they will be), and bring in some temporary secure offices build into motor homes, tons shelters, and 40 foot trailers which the inspectors can keep under tight security. The portable facilities should be swept PRIOR to bringing them into Iraq, sealed up, and then flown in on cargo aircraft totally under secure conditions. -jma At 3:32 PM +0100 9/19/02, David Alexander wrote: >Here's a thought to kick off a discussion - > >It seems most probable that the weapons inspectors are going back into Iraq >Who's going to sweep the weapons inspectors offices and how long will it >take ? >How would you go about it if you had the job ? > >_______________________________ >David Alexander M.INSTIS >Global Infrastructure Director >Bookham Technology plc >Tel: +44 (0) 1327 356264 >Mobile: +44 (0) 7799 881284 >Fax: +44 (0) 1327 356775 >http://www.bookham.com > -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6255 From: Roger Pilkington Date: Thu Sep 19, 2002 10:25am Subject: Re: Iraq weapons inspectors sweep Having taken professional advice-1 no bid Kind regards Roger /Audit Com UK 6256 From: ed Date: Thu Sep 19, 2002 10:57am Subject: Re: Iraq weapons inspectors sweep At 03:32 PM 9/19/02 +0100, David Alexander wrote: >Here's a thought to kick off a discussion - > >It seems most probable that the weapons inspectors are going back into Iraq >Who's going to sweep the weapons inspectors offices and how long will it >take ? the CIA's TSD will, of course...it's their operation anyway ;-) http://www.library.cornell.edu/colldev/mideast/ciaraq.htm 6257 From: Matt Paulsen Date: Thu Sep 19, 2002 3:02pm Subject: CIA hiring for ENTRY LEVEL TSCM. Electronic Specialist Reston VA & Washington DC "You might be a CIA spy if..." Speaking of Iraq and the UN and TSCM and spying........... This was posted on September 17th at http://www.flipdog.com/js/jobdetails.html?ID=9868140&linkBack=%2Fjs%2Fjobsea rch-results.html%3Floc%3Dworld_US%26srch%3Dtscm%26job%3D1 And another at this link on the 9th.. http://www.flipdog.com/js/jobdetails.html?ID=10157785&linkBack=%2Fjs%2Fjobse arch-results.html%3Floc%3Dworld_US%26srch%3Dtscm%26job%3D1 Electronic Specialist The Central Intelligence Agency is looking for qualified Electronic Specialist at the entry level to work in a multi-disciplined, diversified, and fast-paced team with the ability to acquire the skills necessary to affect the configuration design, deployment and maintenance of unique intrusion detection systems as well as locking hardware, security containers, and document destruction devices. Additionally, we are seeking candidates with Technical Surveillance Counter Measures (TSCM) experience, specifically government sanctioned training in detection and nullification of electronic eavesdropping methods and devices. You will have a broad range of duties and work in both the Washington D.C. area as well as the foreign field. Additional responsibilities will include certain administrative duties as assigned, and work with a variety of electronic equipment. Applicants must be able to lift and move heavy equipment (up to 75lbs). Applicants are required to serve multiple overseas assignments throughout the course of their career. Educational Requirements/Work Experience/Certifications: Minimum of Associates degree in Electronic Technology; or a Certificate of Completion from equivalent military, commercial or industry recognized electronics school or training program; or comprehensive documented work experience, as well as, demonstrated proficiency in the field of electronics or an electromechanical environment. Qualifications Required: Working knowledge of electronic and mechanical locking hardware Mechanically inclined, manual dexterity, problem solver or troubleshooter Well refined communications skills (oral & written) Self starter, works well alone or as a team, works well under pressure and tight schedules Effective time management; ability to prioritize and manage multiple tasks Culturally sensitive and tolerant Qualifications Desired: Advance electronics certification and/or formal education beyond two-year AA degree Technology program certifications, including skills in network systems management, systems integration, configuration management and software integration and management Basic knowledge of alarm systems Required: U. S. Citizenship is required. All applicants must meet CIAís stringent security, medical, and personnel standards, including a polygraph examination. ALL POSITIONS REQUIRE RELOCATION TO THE WASHINGTON DC METROPOLITAN AREA. To Apply: Use our online resume tool Note: Multiple submissions are unnecessary and will slow the processing of your resume. Of course, if you made an error in your submission or need to update your resume, you may submit another resume. The second resume will overwrite the first. An equal opportunity employer and a drug-free work force. ---------------------------------------------------------------------------- ---- Return to Top Updated: 09/17/2002 05:40:48. LIFE AT CIA | ALL POSITIONS | COMMON QUESTIONS TEXT ONLY | CIA HOME 6258 From: James M. Atkinson Date: Thu Sep 19, 2002 8:50pm Subject: New Search Engine Online Howdy All, I have just finished writing a new search engine for my site, and would like to invite list members to try it out and let me know what they think. http://www.tscm.com/search.html It only searches the html files on the site, but I will add the capability to search .pdf and .doc files in the future. This way you can find the exact items you are looking for on my site without having to blindly drill though 15 other pages. Give it a whirl,and let me know if it is helpful. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6259 From: Does it matter Date: Thu Sep 19, 2002 3:50pm Subject: Re: Iraq weapons inspectors sweep Just have some tents like in mash have them brought over with the people. Hard to bug something that is so simple. And if you are thinking from a safety point the buildings and tents have the same safety level especially since it is more likely than not going to be car bombed. Heck in a tent the car bomb might not be able to go off. --- In TSCM-L@y..., "James M. Atkinson" wrote: > Simple, > > Assume that their fixed offices are bugged (which they will be), and > bring in some temporary secure offices build into motor homes, tons > shelters, and 40 foot trailers which the inspectors can keep under > tight security. > > The portable facilities should be swept PRIOR to bringing them into > Iraq, sealed up, and then flown in on cargo aircraft totally under > secure conditions. > > -jma > > > > At 3:32 PM +0100 9/19/02, David Alexander wrote: > >Here's a thought to kick off a discussion - > > > >It seems most probable that the weapons inspectors are going back into Iraq > >Who's going to sweep the weapons inspectors offices and how long will it > >take ? > >How would you go about it if you had the job ? > > > >_______________________________ > >David Alexander M.INSTIS > >Global Infrastructure Director > >Bookham Technology plc > >Tel: +44 (0) 1327 356264 > >Mobile: +44 (0) 7799 881284 > >Fax: +44 (0) 1327 356775 > >http://www.bookham.com > > > -- > > ------------------------------------------------------------------- ------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ------------------------------------------------------------------- ------------------------------- > James M. Atkinson Ph: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com > ------------------------------------------------------------------- ------------------------------- > Vocatus atque non vocatus deus aderit > ------------------------------------------------------------------- ------------------------------- 6260 From: Does it matter Date: Thu Sep 19, 2002 3:53pm Subject: Re: Air Force One tscm Where are all the special compartments that we saw in the movie. I was under the impression that the movie was researched very well. --- In TSCM-L@y..., "Matt Paulsen" wrote: > from http://cryptome.org/af1-eyeball.htm > > > About 238 miles of wire wind through the presidential carrier. This is more > than twice the wiring found in a typical 747. Wiring is shielded to protect > it from electromagnetic pulse, which is generated by a thermonuclear blast > and interferes with electronic signals. The airplane's mission > communications system provides worldwide transmission and reception of > normal and secure communications. The equipment includes 85 telephones, as > well as multi-frequency radios for air-to-air, air-to-ground and satellite > communications. 6261 From: Matt Paulsen Date: Thu Sep 19, 2002 10:31pm Subject: RE: Re: Iraq weapons inspectors sweep >> Just have some tents like in mash have them brought over with the >> people. Hard to bug something that is so simple. If this was software it wouldn't compile. >> And if you are thinking from a safety point the buildings >> and tents have the same >> safety level especially since it is more likely than not going to be >> car bombed. Heck in a tent the car bomb might not be able to go off. A bomb is a bomb is a bomb. 6262 From: David Alexander Date: Fri Sep 20, 2002 2:35am Subject: backlog - Joke A new employee is hired at the Tickle Me Elmo factory. The personnel manager explains her duties, and tells her to report to work promptly at 8:00 AM. The next day at 8:45AM, there's a knock at the personnel manager's door. The assembly line foreman comes in and starts ranting about the new employee. He says she's incredibly slow, and the whole line is backing up. The foreman takes the personnel manager down to the factory floor to show him the problem. Sure enough, Elmos are backed up all over the place. At the end of the line is the new employee. She has a roll of the material used for the Elmos and a big bag of marbles. They both watch as she cuts a little piece of fabric, wraps it around two marbles, and starts sewing the little package between Elmo's legs. The personnel manager starts laughing hysterically. After several minutes, he pulls himself together, walks over to the woman, and says, "I'm sorry, I guess you misunderstood me yesterday. Your job is to give Elmo two test tickles." _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 6263 From: Fernando Martins Date: Fri Sep 20, 2002 7:21am Subject: Motorola Expands Secure Communication Motorola Expands Secure Communication SCHAUMBURG, Illinois, September 18, 2002 - Motorola, Inc., (NYSE:MOT) has expanded its messaging products portfolio to offer a wireless solution that provides security personnel with mobile access to encrypted messages and full-color digital images sent securely over a network to wireless devices. Built on the power of the Motorola Messaging Platform, the Motorola Visual APBT solution consists of a Command Center, which is a PC desktop application, and a client application running on mobile devices, such as the Accompli 009 Personal Communicator and J2MET Motorola platform devices. http://www.motorola.com/mediacenter/news/detail/0,1958,1865_1488_23,00.h tml "We're delighted to offer this wireless solution to the law enforcement community," said Amreesh Modi, Vice President and General Manager of Motorola's Software Solutions and Products Division. "This innovative technology will allow law enforcement officers in the field to receive visual bulletins with critical information, reducing the response time and critical decision making time, and thereby reducing unnecessary risks for the officers." The benefits of the Visual APB solution include: A wireless handheld solution for mobile security operations Broadcast delivery of full-color digital images End-to-end secure file transfer using NIST-certified 3DES encryption Situation-specific data collection and reporting Compatibility with Motorola MyMailT and other wireless PIM applications The Global Software Group's, Messaging Software Platform Business Unit, has been demonstrating the Motorola Messaging Platform and Motorola Visual APB at Government Public Safety Showcases, and the product began shipping at the end of August. About Motorola Motorola, Inc. (NYSE:MOT) is a global leader in providing integrated communications and embedded electronic solutions. Sales in 2001 were $30 billion. For more information, visit http://www.motorola.com. The Messaging Software Platforms (MSP) provides robust software development tools that enable enterprises to build their own end-to-end, client-server solutions enabling secure data access over multiple network protocols. MSP is part of Motorola's Global Software Group. For more information visit http://www.motorola.com/MSP. ### 6264 From: David Alexander Date: Fri Sep 20, 2002 11:10am Subject: new GPS tracker for kids This one sounds slightly more feasible technically, though I have the usual doubts. I still think that any 'savvy' kidnapper is going to wrap them in mylar/strip naked/both pretty quickly. A quick frisk will soon find anything 'the size of a cigarette packet' or the wire that connects them I also think that any kid wearing a 'button badge' is going to end up accidentally setting it off on a regular basis, or catching the wire and breaking it, losing it, etc. Also, the older the kid, the more likely they are to not want their parents to know where they are and 'forget it, have a flat battery/whatever. My 2c. Taken from: http://www.theregister.co.uk/content/6/27214.html UK firm creates GPS tracker for kids By electricnews.net Posted: 20/09/2002 at 06:57 GMT Parents in the UK will soon be able to track the whereabouts of their children using a GPS device that can be partly disguised as a badge. The product, called Kidcontact, is due to be released before Christmas and uses both GPS and mobile technology to monitor the location of the child wearing it. Kids can also alert their parents in an emergency with the click of a button, its makers have claimed. When released, it will cost £495 plus VAT. According to John Bell, the inventor of Kidcontact, a "button" is worn on the outside of a jumper or shirt, which is attached to a GPS tracking device the size of a cigarette packet. "Because the button is disguised as a patch or badge on the child's clothing, a potential abductor would never know that the device is present," said Bell. He added that at any sign of trouble, the child can push the button and a text message detailing their latitude and longitude is then sent to the parent's mobile phone. This is then forwarded to the Kidcontact call-centre where it is translated into a street-map and either posted on an Internet site or sent back to the mobile phone. Bell told ElectricNews.Net that the process takes two to three minutes and is accurate to within 20 yards of the wearer's position. Similarly, parents can use the device to just check on their child's whereabouts. Bell said that his invention may not prevent all child abductions, but should act as a deterrent. "The threat to children will never diminish, but we don't have to feel helpless," he remarked. "A potential abductor will be less confident approaching children. After all, many children love to wear badges of one design or another. The abductor will never know if a child is wearing a Kidcontact device." He commented that he had been inspired to create Kidcontact as a result of his own concern for his grandchildren and the shock of recent events involving children. The recent murders of Holly Wells and Jessica Chapman, who were both 10, in England has left many parents concerned about how to effectively monitor their children and it is likely that Kidcontact will be just one of many products released in the coming months that promise to track children. It has recently been reported that several parents in the UK have even gone so far as to have tracking devices implanted in their children's skin so that they can keep a closer eye on their movements. Currently, the Kidcontact system is patent pending and its production is set to start in the autumn. Bell is also planning to market the system to other potentially vulnerable people such as the elderly or the infirm. The device should be capable of being used anywhere in Europe, he added, and its cost should fall to around £200 by next year. _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 6265 From: kondrak Date: Fri Sep 20, 2002 11:16am Subject: Afghan economy in the toilet: > >Al Qaeda to cut at least 5,000 jobs: > >KABUL (Voice of Sharia) -- Citing worldwide reaction to last week's >terrorist attacks, multi-national terror network Al Qaeda announced that >it would lay off 5,000 or more holy warriors. > >The "holy war" concern said the move was necessary because of an >expected 20 percent fatwah reduction and the cost and complexity of >thwarting new airport and immigration security procedures, according to >a statement broadcast on Afghanistan's Voice of Sharia radio. > >"This is, without a doubt, the most difficult thing I have had to do in >my over two decades as a mujahad," said Al Qaeda mastermind and chief >operations officer Osama bin Laden in a letter to employees. He added, >"Some of these people are my friends, who have been fighting the infidel >by my side since we were were living in caves in Afghanistan during the >Soviet occupation. We are still living in caves in Afghanistan, but I >believe the bottom is forming and we will see a turnaround soon, >provided we can meet the challenge by getting both leaner AND meaner." > >"I have declared a state of emergency at Al Qaeda," he said. "This >declaration is an official recognition that, hard as it may be to >accept, our network's very survival depends on dramatic change to our >operations, our jihad and worst of all our staffing levels." > >The cuts, bin Laden said, would include both mujahadin (holy warriors) >and ulema (clerics). They will impact Afghanistan, Pakistan and Iraq. > >Some mujahadin will be notified immediately, others won't be notified >until the end of next week as they finish attacks in progress or in late >stages of planning, according to Taliban spokesman Wakil Ahmed. > >Staff cuts for suicide pilots, car bombers, petty religious clerics and >other Al Qaeda holy warriors will be based on seniority, Ahmed said, in >a deal worked out at a meeting between bin Laden and union officials >from the IBIJ (International Brotherhood of the Islamic Jihad). >Mujahadin and others who lose their jobs will not receive any sort of >severance package, according to the Al Qaeda statement. Pakistan, which >oversees Al Quaeda and its subsidiary Taliban organization, is the >world's largest country with a pre-medieval culture and justice system. >The country's latest quarterly report said the different units of the Al >Qaeda/Taliban organization, including the madrassas (schools Pakistan >has been running for twenty years to turn ordinary children into >suicidal holy warriors) had at total of 30,000 employees, meaning the >cut represents a 16 percent reduction in staff. > >Al Qaeda is the latest in a string of Islamic terror network layoff >announcements, pushing the total of announced cuts in the last five days >to 10,000. > >Referring to massive U.S. troop movements involving three carrier groups >in the Mediterranean and Arabian Sea, worried Afghani ulemas in >testimony during the emergency sharia council in Khandahar on Thursday >told their spiritual leader Mullah Mohammed Omar that the number is >likely to cross the 20,000 threshold in the coming days, through >attrition, with none of the expected openings slated to be refilled. > >OIC (Organization of the Islamic Conference) and bin Laden are >considering spending billions on emergency aid to the industry, >distributed through a vast network of corrupt Saudi emirs, international >prostitution rings and drug smugglers. The current exchange rate is >approximately 100,000 afghanis to the dollar. > >The PLO announced Tuesday it will reduce its workforce by 200 to 300 >sleeper agents worldwide by end of 2002 at its commercial bus bombing >division and restaurant theater operations. 6266 From: The Dog's Bollix Date: Fri Sep 20, 2002 10:33pm Subject: Off Topic - Amusing Nigerian Scam "payback" http://www.haxial.com/fraud/mikeaba.html __________________________________________________ Do you Yahoo!? New DSL Internet Access from SBC & Yahoo! http://sbc.yahoo.com 6267 From: kondrak Date: Sat Sep 21, 2002 3:13pm Subject: 419 scams I've got other reports that these are to facilitate a kidnapping as well, especially in African countries where there is little law. They get you to travel to Africa, they kidnap you and hold you ransom. At 20:33 9/20/02 -0700, you wrote: >http://www.haxial.com/fraud/mikeaba.html The US Secret service is interested in these scams as well, they have an email address to forward them to: 419.fcd@u... Of course, expand all headers for best results.... 6268 From: Matt Paulsen Date: Sat Sep 21, 2002 11:19pm Subject: RE: 419 scams For detailed 419 info read and follow instructions here. http://home.rica.net/alphae/419coal/ -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: Saturday, September 21, 2002 1:13 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] 419 scams I've got other reports that these are to facilitate a kidnapping as well, especially in African countries where there is little law. They get you to travel to Africa, they kidnap you and hold you ransom. At 20:33 9/20/02 -0700, you wrote: >http://www.haxial.com/fraud/mikeaba.html The US Secret service is interested in these scams as well, they have an email address to forward them to: 419.fcd@u... Of course, expand all headers for best results.... ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6269 From: A Grudko Date: Sun Sep 22, 2002 1:21am Subject: Re: 419 scams - Original Message - From: Matt Paulsen > I've got other reports that these are to facilitate a kidnapping as well, > especially in African countries where there is little law. They get you to > travel to Africa, they kidnap you and hold you ransom. Quite correct. I have looked after a handful of the less stupid greedy fools ('greedy fools' is a nice way to describe clients but that is precisely what they are) who come here to collect their 'millions'. Fortunately we have not lost a client yet but all of them lost significant money. Some of the more stupid ones come here thinking they are more clever than the crooks and have disappeared. The good news is that this year Interpol and the SA Police Service have taken these crimes more seriously and have made significant arrests, including some of the ring leaders. Andy Grudko (British) - D.P.M., Grad I.S, South Africa - SIRA investigators Reg. No. 8642 Grudko Associates - www.grudko.com , andy@g... . Est. 1981. International business intelligence and investigations To contact us: (+27 12) 244 0255 - 244 0256 (Fax). ICQ : 146498943. Netmeeting : agrudko@h... IPA, SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust When you need it done right - first time 6270 From: Jay Coote Date: Sun Sep 22, 2002 3:25pm Subject: Optoelectronics Gadgets For Sale I'm selling the following as a group: 1eaModel 40 Scout, version 2.0 1ea DC440 version 3.1 1eaR10 Interceptor (intermittent sensitivity problem) Scout and DC440 in good condition, no chargers or manuals included. The R10 interceptor appears to have an intermittent squelch or sensitivity problem. I am "throwing in" the R-10 with the Scout and DC440. $300 plus shipping in USA Thanks Jay Coote Los Angeles Specialist in Technical Surveillance Countermeasures Lic: PI17926 TSCM@j... 6271 From: James M. Atkinson Date: Mon Sep 23, 2002 0:37am Subject: Al-Qaeda accounting scandal! Al-Qaeda accounting scandal! Rob McKenzie National Post Friday, September 20, 2002 News item: Bail hearing told that members of suspected Buffalo cell of al-Qaeda were frequent visitors to Canadian casinos and one even spent $89,000 at Casino Niagara. Date: Sept. 19, 2002 To: All Staff (Global List) From: Ali in Accounting Guys, this is getting a smidge embarrassing. It's bad enough we're losing the war, now we have an accounting scandal on our hands. This isn't Tyco. This isn't Enron. We're not WorldCom. This is al-Qaeda. I know morale is down since the cutbacks, but a little discipline please. When we said we wanted you to make a killing in North America, we didn't mean at the keno table. And it's not enough to put a note on your expenses saying you're "exposing the internal contradictions of the capitalist dialectic." That's Marxism, guys. We're fanatics. Whole different ballgame. Apples and oranges. Going over some of your expense accounts, I'm a little shocked at how far we've let things slip. Mo in Jakarta, I'm talking to you: You can't be invoicing for "72 doe-eyed virgins." That's for after you go to heaven, not before. It's not complicated. It's called afterlife for a reason, Mo. And no more playing the markets with company money. Yes, I admit that back in the day we did promote Sahim after he shorted Nortel before the crash. But now I see guys putting our hard-stolen cash on money-centre banks -- anyone remember that old rule against charging interest? -- and, it pains me to say this, armsmakers. You have any idea what Lockheed is doing with that money, guys? Two words: Ka-boom. So it's time to bring in a few rules. And it's time for everyone to reread the manual (you should find it filed under Q; not K, Q.) No more stocks, no more junk bonds, no more pet-food income trusts, no more shorting. It's "al-Qaeda cell," not "al-Qaeda: Sell! Sell! Sell!" Keep this up and we'll have the SEC on our tails. Pictures of our main guys taking the Fifth before Congress: How embarrassing would that be? Don't forget, it's the accountants that got Capone. I mean, these are Arabic numerals we're talking about. Think about it. They're on our side. So show a little respect. Now, it's true, head office does share part of the blame, we admit it. This all started back when Atta kept expensing us for his monthly Nasty Pills and we kept forking out. Lemme tell ya, we sure don't miss that guy here at HQ. Surly bugger. The whole plot almost fell apart because no one wanted to sit next to him on the plane. "Mohammed, you taking a window seat? Hey, I think I'll take one too. In cargo." But remember the focusing seminars we had at the Amman Hilton in the third quarter of '99? Anyone remember what the consultant said? Focus! Think scourge. Think holy terror. Don't think, I'm gonna play the slots for eight hours straight and pee my pants in Niagara Falls and hope nobody notices. That's not the image we're trying to project here. If our leader knew what was going on, he'd be rolling over in his cave. Sincerely, Ali rmckenzie@n... © Copyright 2002 National Post -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6272 From: frost_bitten_ca Date: Sun Sep 22, 2002 6:19am Subject: Frauds Scams Alerts Royal Canadian Mounted Police: Frauds Scams Alerts Follow the links from the directory below to see our scams files: http://www.rcmp-grc.gc.ca/scams/scams.htm From: John Young Date: Fri Sep 17, 2004 5:08pm Subject: RE: Choosing Door Locks(?) Good discussion. There's a wealth of information on a range of physical security in jail, prison and detention literature, with bountiful offerings on the Web. The 20 years of US prison growth and privatization has built a vast selection of products which are now being offered for domestic and commercial use in the era of big-boo-terrorism. System approach is recommended in most cases, with no element sufficient by itself. Architecture, multiple engineering disciplines, electronics, human resources, with a need for checks and double and triple checks, and 24x7 monitoring either on or offsite. Still checking the checkers, watching the watchers, there are failures of physical, electronic and human types. But the failures are compensated for, indeed may be too much compensated for, with built-in failures suspected to churn the accounts, following the grand and lucrative schemes of national security and justice systems. Sages say do not seek too much security or you will imprison yourself. Guards become indistinguishable from inmates. Panopticonical pathological. 9711 From: Patrick Ryals, CEO Date: Fri Sep 17, 2004 1:48pm Subject: RE: Choosing Door Locks(?) It seems my original post sparked a fair amount of interest. Based only on that I wanted to clarify my needs. But if this gets to off topic for anyone please let me know. I'm in a Class A office building with all sorts of rules and regs about appearance etc. etc. Which I appreciate but still has to be worked around. But mainly is just about appearance. All the hardware has to be gold in color etc. etc. The door locks are of course part of a larger security strategy. But in the end the reality is, all it takes is someone with the ability to unlock the bozos office next door and slice through the drywall to gain entry. I have no control over the security outside of this - basically - dry walled box that you could practically kick your way into. A hatchet would suffice. Security cameras can document the damage. Alarms can sound. But in the end a steel door on a drywall box is like a kevlar band-aid on a balloon. My main concern and situation is that building security, engineering, and management want access in the case of an emergency. I've canceled the evening cleaning services. And have no reason to mistrust the other staff members. But their use of their master keys is much to liberal for me. So I've made arrangements to change locks and provide only the fire department access by leaving a key and/or combo in a locked fire department only box. Here on the buildings premises. But I don't even trust that. As I am not sure management does not have a key to that box. And I live within moments of my offices. So if they need in that bad they can call me. And further, if there is an emergency, they can easily smash through the drywall and I'll gladly pay them for it. So taking into account the "kevlar band-aid" theory and the access to the questionable "emergency fire department key box". My solution was to replace the main door lock with a code (lock) that could be handed over for the fire department box and then just change the code. If they get pissy and find a reason to test the bad code - give them another and so on. This local company sent a used car salesman out that was trying to sell me electronic Trilogy keypad locks for $900 a piece. And trying to convince me that a simple mechanical lock would be more expensive blah blah blah... Even if he was correct his salesmanship made him completely untrustworthy. So I need locks that will excuse my not giving them a key or any other device for entry. That are "secure". But not unjustifiably secure considering the neighbors and the drywall box. So realistically it's mostly about keeping the building staff other average criminals out - everyone else will rip through drywall, be documented and/or caught. (I am, however, not detailing my entire system here.) Additionally, only three people will have access to the codes. So it's not like I need something to serve a 200 person office. I have interior doors as well. But lessor mechanical devices may suffice. Any recommendations and all of your interest in this topic has been a great help. PS - A big thank you to Steve Uhrig for his help with encapsulants last week. He never fails to answer the stupidest questions with a generosity of knowledge that amazes me. Sincerely, Patrick Ryals, CEO Nexus Investigations CA PI#22920 9712 From: Fernando Martins Date: Fri Sep 17, 2004 3:21pm Subject: Re: +AFs-TSCM-L+AF0- Choosing Door Locks(?) hmmmm ... I'll take my chances to say that ANY lock can be compromised. Even if not, while planning high security systems we must assume that that is possible, of else we are just rising the risk. high security +AD0- no trust regarding rounds, I'm starting to change them for remote video surveillance, integrated with the intrusion and access control systems here security staff, if they are not police or armed forces, (usually) they don't use any kind of weapon, so being in some incident is just to check and identify, and that cameras can do, even with less costs and faster actions at least if there is a need for human intervention, this way they know what to expect at the scene changing the subject, if anyone have good experiences with xray inspection systems for people (not mail or cargo, but people), I would like to be contacted in private, even by suppliers FM ----- Original Message ----- From: +ACI-David Alexander+ACI- +ADw-david.alexander+AEA-dbiconsulting.co.uk+AD4- To: +ADw-TSCM-L+AEA-yahoogroups.com+AD4- Sent: Friday, September 17, 2004 9:18 AM Subject: RE: +AFs-TSCM-L+AF0- Choosing Door Locks(?) +AD4- Almost any lock can be compromised. Most have a rating, in minutes, of how long this would take. Door locks need to be backed up with other surveillance techniques such as cameras or physical patrols at random intervals that are always less than the rating of the lock, so no-one has a chance to get though it before a patrol comes round. +AD4- +AD4- Regards +AD4- Dave +AD4- +AD4- David Alexander +AD4- Dbi Consulting Ltd +AD4- Stoneleigh Park Mews +AD4- Stoneleigh Abbey +AD4- Kenilworth +AD4- Warwickshire +AD4- CV8 2DB +AD4- +AD4- Office : 01926 515515 +AD4- Mobile: 07836 332576 +AD4- Email : David.Alexander+AEA-dbiconsulting.co.uk +AD4- +AD4- Have you visited our website? +AD4- http://www.dbiconsulting.co.uk +AD4- +AD4- -----Original Message----- +AD4- From: Fernando Martins +AFs-mailto:fernando.martins+AEA-esoterica.pt+AF0- +AD4- Sent: 17 September 2004 04:00 +AD4- To: TSCM-L+AEA-yahoogroups.com +AD4- Subject: Re: +AFs-TSCM-L+AF0- Choosing Door Locks(?) +AD4- +AD4- if even PKI or biometrics can have problems, a lock it's just a lock, but +AD4- there is home security and bank security +AD4- one thing to think is how many time do you want for one can open a door? +AD4- (specially a bad guy) +AD4- other is if one was able to get in, do we let him go? (again, specially a +AD4- bad guy) +AD4- in high security systems the point is that it is ALLWAYS possible to get in +AD4- (if one have the will and the means enough to do it), so the job is make +AD4- sure that there is no way out or that the heavy cavalry can be there faster +AD4- enough +AD4- +AD4- for locks this 3 names are easy to find anywhere +AD4- Assa Abloy +AD4- Chubb Locks +AD4- Fichet-Bauche +AD4- +AD4- FM +AD4- ----- Original Message ----- +AD4- From: +ACI-Patrick Ryals, CEO+ACI- +ADw-ceo+AEA-moduspi.com+AD4- +AD4- To: +ADw-undisclosed-recipients:+AD4- +AD4- Sent: Wednesday, September 15, 2004 8:44 PM +AD4- Subject: +AFs-TSCM-L+AF0- Choosing Door Locks(?) +AD4- +AD4- +AD4- +AD4- This is a bit off topic but still security oriented. I want to improve +AD4- +AD4- on our office security by replacing all of the door locks. Anyone have +AD4- +AD4- any good sites with a run down on types of door locks and how secure +AD4- +AD4- they are? Perhaps a lock review site from an independent security point +AD4- +AD4- of view. +AD4- +AD4- +AD4- +AD4- I'm considering keypad mechanical locks with a dead bolt and no need for +AD4- +AD4- electricity. There must be a definitive security article on choosing +AD4- +AD4- commercial door locks. +AD4- +AD4- +AD4- +AD4- Please respond privately. This is off topic and I am on digest mode. +AD4- +AD4- +AD4- +AD4- Patrick Ryals, CEO +AD4- +AD4- Nexus Investigations, Inc. +AD4- +AD4- CA PI+ACM-22920 +AD4- +AD4- +AD4- +AD4- +AD4- +AD4- +AD4- +AD4- +AD4- +AD4- +AD4- +AD4- +AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQ- +AD4- +AD4- TSCM-L Technical Security Mailing List +AD4- +AD4- +ACI-In a multitude of counselors there is strength+ACI- +AD4- +AD4- +AD4- +AD4- To subscribe to the TSCM-L mailing list visit: +AD4- +AD4- http://www.yahoogroups.com/community/TSCM-L +AD4- +AD4- +AD4- +AD4- It is by caffeine alone I set my mind in motion. +AD4- +AD4- It is by the juice of Star Bucks that thoughts acquire speed, +AD4- +AD4- the hands acquire shaking, the shaking is a warning. +AD4- +AD4- It is by caffeine alone I set my mind in motion. +AD4- +AD4- +AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9- TSKS +AD4- +AD4- Yahoo+ACE- Groups Links +AD4- +AD4- +AD4- +AD4- +AD4- +AD4- +AD4- +AD4- +AD4- +AD4- +AD4- +AD4- +AD4- --- +AD4- Outgoing mail is certified Virus Free. +AD4- Checked by AVG anti-virus system (http://www.grisoft.com). +AD4- Version: 6.0.766 / Virus Database: 513 - Release Date: 17-09-2004 +AD4- +AD4- +AD4- +AD4- +AD4- +AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQ- +AD4- TSCM-L Technical Security Mailing List +AD4- +ACI-In a multitude of counselors there is strength+ACI- +AD4- +AD4- To subscribe to the TSCM-L mailing list visit: +AD4- http://www.yahoogroups.com/community/TSCM-L +AD4- +AD4- It is by caffeine alone I set my mind in motion. +AD4- It is by the juice of Star Bucks that thoughts acquire speed, +AD4- the hands acquire shaking, the shaking is a warning. +AD4- It is by caffeine alone I set my mind in motion. +AD4- +AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9- TSKS +AD4- Yahoo+ACE- Groups Links +AD4- +AD4- +AD4- +AD4- +AD4- +AD4- +AD4- +AD4- ------------------------ Yahoo+ACE- Groups Sponsor --------------------+AH4---+AD4- +AD4- +ACQ-9.95 domain names from Yahoo+ACE-. Register anything. +AD4- http://us.click.yahoo.com/J8kdrA/y20IAA/yQLSAA/UBhwlB/TM +AD4- --------------------------------------------------------------------+AH4--+AD4- +AD4- +AD4- +AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQ- +AD4- TSCM-L Technical Security Mailing List +AD4- +ACI-In a multitude of counselors there is strength+ACI- +AD4- +AD4- To subscribe to the TSCM-L mailing list visit: +AD4- http://www.yahoogroups.com/community/TSCM-L +AD4- +AD4- It is by caffeine alone I set my mind in motion. +AD4- It is by the juice of Star Bucks that thoughts acquire speed, +AD4- the hands acquire shaking, the shaking is a warning. +AD4- It is by caffeine alone I set my mind in motion. +AD4- +AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9- TSKS +AD4- Yahoo+ACE- Groups Links +AD4- +AD4- +ADwAKgA+- To visit your group on the web, go to: +AD4- http://groups.yahoo.com/group/TSCM-L/ +AD4- +AD4- +ADwAKgA+- To unsubscribe from this group, send an email to: +AD4- TSCM-L-unsubscribe+AEA-yahoogroups.com +AD4- +AD4- +ADwAKgA+- Your use of Yahoo+ACE- Groups is subject to: +AD4- http://docs.yahoo.com/info/terms/ +AD4- +AD4- 9713 From: A Grudko Date: Fri Sep 17, 2004 11:26pm Subject: RE: RE: Choosing Door Locks(?) -----Original Message----- From: Patrick Ryals, CEO [mailto:ceo@m...] > I'm in a Class A office building with all sorts of rules and regs about appearance etc. What is a 'Class A office building'? Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.764 / Virus Database: 511 - Release Date: 2004/09/15 [Non-text portions of this message have been removed] 9714 From: Martin Peck Date: Fri Sep 17, 2004 9:01pm Subject: Re: hardware based keyboard loggers I meant to include this image with a view of the protected silicon mounted on the other side of the logic board: http://peertech.org/coder/log/image/intr-kb03.jpg On Fri, 17 Sep 2004 18:46:21 -0700, Martin Peck wrote: ... 9715 From: Martin Peck Date: Sat Sep 18, 2004 1:23am Subject: Re: RE: Choosing Door Locks(?) On Fri, 17 Sep 2004 11:48:10 -0700, Patrick Ryals, CEO wrote: > ... > My main concern and situation is that building security, engineering, > and management want access in the case of an emergency. I've canceled > the evening cleaning services. And have no reason to mistrust the other > staff members. But their use of their master keys is much to liberal for > me. Note that master lock systems have their own set of vulnerabilities: http://www.crypto.com/masterkey.html > But I don't even trust that. As I am not sure management does not have a > key to that box. And I live within moments of my offices. So if they > need in that bad they can call me. And further, if there is an > emergency, they can easily smash through the drywall and I'll gladly pay > them for it. Firefighters are well trained in this technique. :) > So taking into account the "kevlar band-aid" theory and the access to > the questionable "emergency fire department key box". ... > > ... I need locks that will excuse my not giving them a key or any other > device for entry. That are "secure". But not unjustifiably secure > considering the neighbors and the drywall box. So realistically it's > mostly about keeping the building staff other average criminals out - > everyone else will rip through drywall, be documented and/or caught. (I > am, however, not detailing my entire system here.) Medeco locks were mentioned earlier in this thread. I've used them in a number of installations with dozens of locks and have been suitably impressed. The keys themselves are hard to copy, the sidebar makes them hard to pick, the lock itself is well made. http://www.medeco.com/products/products_detail.php?category_ID=7&clear=7& http://dp.penix.org/locks/cl3.html Regards, 9716 From: Martin Peck Date: Fri Sep 17, 2004 8:46pm Subject: hardware based keyboard loggers The recent discussion of Magic Lantern reminded me of the Scarfo case. The government was extremely opposed to providing any significant technical details about the hardware device that was used. Some of the statements in the official court report appear to be contradictory and imply both a hardware and software component with ability to monitor comm ports (for compliance with the scope of permissible monitoring). We have all seen the dongle based fobs you can sneak into the back of a computer as well as the trojan keyboards which contain a device built in. I am curious to know if there are any reports of TLA's manufacturing logic boards for use within keyboards in a covert manner. As an example, most keyboards are incredibly simple and place all their intelligence in a small board that provides LED state information and translates keystrokes to digital input. [ http://peertech.org/coder/log/image/intr-kb02.jpg is from an IBM KB-9910 ] I suspect that it would be trivial to build identical looking logic boards for placement into target hardware. Due to lack of visual clues and fully passive operation this would be a very effective technique. Are there any published reports that cover these types of devices? There appears to be very little information available due to CIPA constraints surrounding these key loggers. How could one identify potentially malicious silicon when visual inspection shows nothing amiss? Are there inexpensive methods for detecting the logic within? (I am assuming that the memory requirements for storing logged key strokes would make the silicon appear very different in both size and structure when an authentic and rogue device are compared). Regards, 9717 From: Thomas Shaddack Date: Sat Sep 18, 2004 9:53am Subject: Re: hardware based keyboard loggers On Fri, 17 Sep 2004, Martin Peck wrote: > As an example, most keyboards are incredibly simple and place all > their intelligence in a small board that provides LED state > information and translates keystrokes to digital input. Many earlier models of keyboards were based on a 8051-like microcontroller. > [ http://peertech.org/coder/log/image/intr-kb02.jpg is from an IBM KB-9910 ] A blob-of-epoxy with a chip inside is one possibility. I saw a bit more often the keyboards where there was a 40-pin DIL chip instead. > I suspect that it would be trivial to build identical looking logic > boards for placement into target hardware. Due to lack of visual > clues and fully passive operation this would be a very effective > technique. Given how often 99.9% of the users check the internals of their keyboard, how familiar even the dedicated IT staff tends to be with the electronics inside them, and that the internals of the keyboards sometimes vary even within one manufacturer, the replacement boards don't even have to be visually identical. > Are there any published reports that cover these types of devices? > There appears to be very little information available due to CIPA > constraints surrounding these key loggers. Didn't hear anything concrete. But it's no magic, just electronics, so there are some requirements that can't be avoided. > How could one identify potentially malicious silicon when visual > inspection shows nothing amiss? Are there inexpensive methods for > detecting the logic within? (I am assuming that the memory > requirements for storing logged key strokes would make the silicon > appear very different in both size and structure when an authentic and > rogue device are compared). The microcontroller has a memory of its own, usually masked ROM, EPROM, or FlashEPROM, but it doesn't need to be more than few kilobytes. The keystroke storage memory needs to be bigger, the array will look much bigger (or much finer, or both) under a microscope. (You can also try non-invasive checks, using eg. differential power analysis and comparing the minute variations of current consumption during standby and keypress of the tested keyboard with a known-good one of the same type. Given the simplicity of a standard keyboard, adding more functions (like an EEPROM write after every keypress) should be clearly visible here.) (Or you can try a plain old wireless threat, a small transmitter keyed by the SDA signal of the keyboard interface going low; this is reportedly already being used in the wild, though I don't know any details. Or, if you want to be fancy and have a good receiver, you can try to use the keyboard matrix as an antenna and exploit the fact that most keyboards are an unshielded plastic shell, and just reprogram the microcontroller and send out the key scancodes as bursts of push-pulling the selected wires in the matrix to H and L; the limit is as fast as the microcontroller can, the optimal value depends probably on the shape of the keyboard matrix. You can enhance it by using some error-correcting code for encoding the scancodes. The advantage is no change at all of the keyboard hardware. Try to find it without knowing in advance what to look for. This is a speculation and would need to be tested.) However, to get this level of access, you need to etch off the chip casing. Which is difficult and often damages the chip. Given the nature and cost of keyboards, it is very probably both easier and cheaper to acquire a new, known-good keyboard and modify it to be tamper-resistant, so any attempt to compromise its hardware would become evident. If the threat model warrants it, it could be a good idea to have the whole workstation in a vault-like room, tamper-resistant itself and reasonably well secured, in a way making an undetected black-bag job too difficult for the highest class of the adversaries of your threat model. 9718 From: Shawn Hughes (Road) Date: Sat Sep 18, 2004 6:12pm Subject: Re:Pat and his locks ;) Patrick; The problem is that what you're asking isn't possible. You are essentially asking for a totally accountable key-based system. There just isn't one. With a physical key system, duplicates can be made. With a cypher key (coded lock) system, the password can be compromised. Even without a valid key in possession, most building supers who also do their own locks are knowledgeable in the weaknesses of most locks. In your case, you perceive your threat to be unauthorized access by building staff. As they do have limited legal rights in most places for access, especially for maintenance and emergency (busted water main, for example) situations, and you haven't said that you are government or a classified contractor setup (requiring special access circumstances), then (note: I am NOT a lawyer; this isn't legal or binding advice) you really can't flat lock out the building super and his people. Also, fire (unless key access is NFPA codified for your locale) access is a moot point; as you've deftly stated, emergency access to your property will not be an issue. So, as I see it, this isn't really about locks at all. In fact, if your intent is to restrict building personnel access, you can potentially be in violation of your rental/lease agreement. What you need is some integrity enforcement. My solution for you is to place an obvious small dome camera at your entrance(s), and have your intrusion detection system alert you directly. Send a written, certified-mail letter to the property management corporation stating you've had some issues relating to unauthorized non-forced entry, and that you would like no further unescorted entry into your rental / lease space. In an maintenance-related emergency, they are directed to contact you first. Notify them that you are recording access attempts as suggested by police in your area for future prosecution efforts, and you do intend to prosecute. Ask them to forward copies of this to the subcontractors that handle waste management, security, and maintenance. Also, send them copies yourself. Then, follow through on your plan. Seek out a criminal trespass warrant next time they come in. Keep a log of after-hours management access. Once during a storm for five minutes to ensure your windows are intact is reasonable; an hour a night every night is not. Bait them with an unsecured valuable item or good food in the fridge, put a pinhole on it and record the results. It's not a perfect answer, but attempting a lockout is an escalating battle. You may spend a few hundred on improved access control friday, come in monday and find it hanging from the door with a note saying there was a water leak and they couldn't get hold of you (been there). Also, >>A big thank you to Steve Uhrig for his help Agreed. He is one of the most knowledgeable people on this list, but still finds time to guide even the most basic among us. A valuable resource to this list. It does beg the question why more of the ERI crowd doesn't post more often? Best wishes, -Shawn At 01:48 PM 9/18/04 +0000, you wrote: >Message: 3 > Date: Fri, 17 Sep 2004 11:48:10 -0700 > From: "Patrick Ryals, CEO" >Subject: RE: Choosing Door Locks(?) > >It seems my original post sparked a fair amount of interest. Based only >on that I wanted to clarify my needs. But if this gets to off topic for >anyone please let me know. > >I'm in a Class A office building with all sorts of rules and regs about >appearance etc. etc. Which I appreciate but still has to be worked >around. But mainly is just about appearance. All the hardware has to be >gold in color etc. etc. > >The door locks are of course part of a larger security strategy. But in >the end the reality is, all it takes is someone with the ability to >unlock the bozos office next door and slice through the drywall to gain >entry. I have no control over the security outside of this - basically - >dry walled box that you could practically kick your way into. A hatchet >would suffice. Security cameras can document the damage. Alarms can >sound. But in the end a steel door on a drywall box is like a kevlar >band-aid on a balloon. > >My main concern and situation is that building security, engineering, >and management want access in the case of an emergency. I've canceled >the evening cleaning services. And have no reason to mistrust the other >staff members. But their use of their master keys is much to liberal for >me. So I've made arrangements to change locks and provide only the fire >department access by leaving a key and/or combo in a locked fire >department only box. Here on the buildings premises. > >But I don't even trust that. As I am not sure management does not have a >key to that box. And I live within moments of my offices. So if they >need in that bad they can call me. And further, if there is an >emergency, they can easily smash through the drywall and I'll gladly pay >them for it. > >So taking into account the "kevlar band-aid" theory and the access to >the questionable "emergency fire department key box". My solution was to >replace the main door lock with a code (lock) that could be handed over >for the fire department box and then just change the code. If they get >pissy and find a reason to test the bad code - give them another and so on. > >This local company sent a used car salesman out that was trying to sell >me electronic Trilogy keypad locks for $900 a piece. And trying to >convince me that a simple mechanical lock would be more expensive blah >blah blah... Even if he was correct his salesmanship made him completely >untrustworthy. > >So I need locks that will excuse my not giving them a key or any other >device for entry. That are "secure". But not unjustifiably secure >considering the neighbors and the drywall box. So realistically it's >mostly about keeping the building staff other average criminals out - >everyone else will rip through drywall, be documented and/or caught. (I >am, however, not detailing my entire system here.) > >Additionally, only three people will have access to the codes. So it's >not like I need something to serve a 200 person office. I have interior >doors as well. But lessor mechanical devices may suffice. > >Any recommendations and all of your interest in this topic has been a >great help. > >PS - A big thank you to Steve Uhrig for his help with encapsulants last >week. He never fails to answer the stupidest questions with a generosity >of knowledge that amazes me. > >Sincerely, > >Patrick Ryals, CEO >Nexus Investigations >CA PI#22920 ==================================== Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response, LLC www.warriormindset.com ////////////////////////////////////////////////////////////////////////////// ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. 9719 From: walshingham2000 Date: Sat Sep 18, 2004 11:04am Subject: NGO's- Public Key Encryption-Surveillance & Countermeasures -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 © PGPBOARD NEWSLETTER 4th Quarter 2004 Angeles City, Philippines ************************* PUBLIC KEY ENCRYPTION & NGO's ***************************** In this quarters newsletter we take a look at the vulnerability of Non Government Organizations (NGO's), and individuals who use public key encryption systems. We attempt to show just how vulnerable they can be, and what countermeasures can be employed in order to address and defeat some of these vulnerabilities. Many PGP and GnuPG users, both at the NGO and individual user level, place an inordinate amount of faith in public key encryption systems to protect their communications, whilst ignoring the fact that the most vulnerable security components of their cryptographic systems are themselves, and their operating procedures. Identifying The Adversary ========================= This depends who you are, what you are doing, and where you are located. For the purpose of this piece we will assume that you are an NGO operating in Western Europe, or the United States. Whilst we do not consider these locations to be physically threatening to NGO's, they will however represent the worst case scenario in terms of technology based attacks. In other locations such as Myanmar for example, the threats will be extremely low tech and physical in nature, with more emphasis on pain. However, in all cases the adversaries will be in country government agencies such as the MI5, MI6. GCHQ, CIA, FBI, NSA. It will only be the methods they employ that differ. Methods of Attacking PGP and GnuPG Encryption Users & NGO's =========================================================== European and United States Government agencies WILL HAVE all of the required resources available in order to successfully attack and compromise PGP and GnuPG based encryption systems. The attacks generally fall into the categories detailed below:- 1. Undetected physical intrusion into the NGO's office, or the individual's home. This may be surprising to some, however, it is the easiest and most cost effective manner in which to compromise PGP and GnuPG based encryption systems. 2. The installation of modified software and undetected electronic surveillance equipment. 3. TEMPEST and other EMT attacks. 4. Cryptanalysis is usually limited to high value targets with implications for national security, and is generally undertaken by agencies such as the NSA and GCHQ. The attack methodologies employed both US and European security agencies are described below:- THE PLAIN TEXT RETRIEVAL ATTACK =============================== This is the simplest of attacks, yet it is the most productive. This attack relies upon the UNDETECTED INTRUSION into the users premises, and exploits both insecure operating procedures, and weaknesses in the implementation of current versions of GnuPG, where there is no possibility to simultaneously encrypt and securely wipe the residual plain text messages. The secure erasure of the residual plain text message files by the current implementations of GnuPG requires additional operator steps, and by its very nature introduces unnecessary security weaknesses into the system. The security agents will simply copy the residual plain text files, or the entire hard disk. "It can't happen to me without me knowing about it...!!" Is the general reaction to such an attack. Unfortunately this is not the case, DENIAL is another reason why such simple intrusive attacks are highly productive. Strong doors and good quality locks are absolutely NO guarantee against intrusion by such agencies as the FBI CIA MI5 and MI6. These agencies will quite literally come thru the roof, the wall, and up thru the floor. Over the years the CIA has trained and developed team's expert in gaining undetected access into homes, offices, and business premises. This expertise extends to teams of expert repair personnel using specially developed materials such as quick drying odorless paints and sealing materials. Depending upon the building configuration such intrusions can be completed in less than two hours, including any repairs to the building structure. More complex intrusions are sometimes disguised as renovations to an adjacent office or apartment. These intrusion teams operate under the direction of the Central Intellegence Agency, and are managed directly from Langley. The department in question is called the "Special Collection Service" (SCS), and it was jointly formed by the NSA and CIA. The SCS was specifically formed as a result of the advances in cryptologial techiques which made interception and cryptographic attacks both extremely expensive, and sometimes impractical. The specific goal of the SCS teams is to gain undetected access into target prmises, and undetected access to the crptographic components of a given system. Modified PGP Programs.. ====================== This is another attack that relies upon poor and insecure operational procedures. Just how many times does the end user verify the signature of their software packages, and when did YOU..last do this..?? Again this is based upon the initial or repeated undetected access to the target premises. The basis of this attack is to replace an existing copy of PGP with a version that supports an NSA modified ADK, (Addition Decryption Key) protocol. This undetectable ADK support will not be apparent to the user or traffic recipient. The additional decryption key is generally provided by the NSA. The FBI et al simply monitor your traffic and decrypt at their leisure over morning coffee. KEY LOGGERS ========== Again installed during the intrusion phase of the operation. The key logger robots provided by the NSA are software based, and are generally resident in modified text editor and word processing programs such as MSWORD, NOTEPAD and WORDPAD. The key logger/robot calls home (NSA/CIA) every time the Internet is accessed, and unloads your documents and text. This type of key logging is software specific. PHYSICAL SEARCHES ================= Again, a by-product of the intrusion phase, and by now you should be able to identify a very definite pattern, and that is, "COST EFFECTIVE COMPROMISES OF PUBLIC KEY ENCRYPTION SYSTEMS DEPEND UPON UNDETECTED INTRUSION & ACCESS TO EQUIPMENT." This will also entail a search of the premises for recoded passphrases in desks, filling cabinets, and personal affects. Failing this, security agencies will use specialized software in order to test, or deduce your passphrase. The success of this endeavor will depend upon the quality of your chosen passphrase. If it aunty Mabel's birthday pity you..!! VIDEO & AUDIO SURVEILLANCE ========================== The technological advances made in the miniaturization of video components such as cameras, and fiber optic technology has made video and audio surveillance both practical, and easy to implement. And again, this will be the result of an undetected intrusion into the premises. The security agency (SCS) will install a camera, with a remote lens the size of a pinhead, and a fiber optic the diameter of a human hair above the workstation hosting the cryptographic software, and observe the operators fingers at the keyboard as the passwords are typed. The audio surveillance is based upon the configuration of the "standard" IBM 101 key keyboard. The key clicks are analyzed, and the message\password is revealed by comparing keyboard clicks with the click patterns of a known piece of text. TEMPEST & EMT ATTACKS ===================== This attack does not rely upon intrusion, it relies upon trace amounts of electromagnetic radiation emitted from cathode ray tube screens, and CPU's. It does however require close proximity by the security agency, since the electromagnetic emissions are very weak, and of limited range. The CIA etc will usually install themselves in a van outside the building, or in an adjacent apartment or office. The attack can be defeated by installing the computer equipment in screened TEMPEST PROOF rooms, and using TEMPEST resistant fonts on CRT displays. AC POWER LINE MONITORING & ANALYSIS =================================== This threat is normally addressed at the same time as the TEMPEST issues. During relocation of the equipment into a TEMPEST proof room, sophisticated power line filtering and isolation components are installed that prevent power line current signatures. Battery driven UPS's within the TEMPEST proof area also serve to eliminate this threat. In high security environments, prior to the system UPS, random loads are applied to the power lines in order to disguise and defeat any attempt at power line analysis and the detection of cryptographic current signatures. PHYSICAL THREATS & COERCION =========================== This attack is a back to basics approach. It is unusual in Europe and the USA. However, this methodology, (the infliction of pain, or the threat thereof) is widely used in the third world, where access to sophisticated monitoring and cryptanalysis is unavailable. The object is of course to obtain the passphrase information from the individual concerned. SEXUAL FAVORS ============= Methodology successfully employed by both the Stazi and KBG during the cold war era. Depends upon observing the target individual, usually male, and providing him with women in order to satisfy sexual fantasies or cravings. The activities are usually filmed, which are then later used to blackmail the target into divulging the required information. BRIBERY & FINANCIAL GAIN ======================== Again an attack that requires the identification of a vulnerable individual. The provision of information then becomes a simple business transaction completely divorced from ideological constraints. A classic example of the was Robert Hansen, an FBI employee and one of the KGB's most prolific and productive spies, who sold out his country, which led to the deaths of approximately 30 CIA, and MI6 operatives and informers. CRYPTANALYSIS ============= It is unlikely that any NGO traffic will ever warrant the attention of the NSA or CIA. If they do, then any of the previously described techniques will almost certainly do the job. The involvement of the SCS, NSA, or CIA is only apparent when direct government to government traffic is involved, or for traffic that is thought to be associated with international terrorism. The techniques that the NSA has available to compromise PK encryption systems are open to speculation. However, unless there have been some very major, and unpublished break through in the factoring techniques of VERY LARGE prime numbers, then PK cryptology with asymmetric key lengths of 3072 bits or larger should be secure; and brute forcing RSA keys will remain a very expensive, and prohibitively time consuming proposition. In closing out this first section, it should be evident that:- 1. Once the SCS has gained undetected access to your premises, and equipment, then "ALL BETS ARE OFF". Your encrypted communications HAVE BEEN compromised. 2. Cryptanalysis plays a very limited role in compromising real world cryptographic systems. Movies such as "Enemy of The State", although based upon a smorgasbord of NSA capabilities, both real and imagined, are what they are, and that is fiction with very little connection to reality. The compromising of cryptographic systems is very far from glamorous, it is an amalgam of good old fashioned police work such as observation, and undetected intrusion into the target premises in order to gain access to the system components. EFFECTIVE COUNTERMEASURES & OPERATING PROCEDURES ================================================ - From the previous description, one could be forgiven if one thought that the CIA etc. were holding all of the cards, well luckily, they very definitely are not. Firstly one must understand that CIA/FBI monitoring personnel, that is to say the guys that sit outside in the monitoring van, in most cases are not specialists in surveillance countermeasure techniques, their job is information gathering, and above all they will be used to operating against NGO's and individuals who have poor operating procedures, and no surveillance countermeasure skills. In general, the majority of the CIA/FBI monitoring teams operate against what can be referred to as "soft targets". Within the CIA/FBI, only elite units are deployed against what is referred to as "hard targets". These hard targets are known to have surveillance countermeasure skills, and will not reveal the detection of physical intrusion, surveillance, or a compromised system. Once this situation is understood, it is normally very easy for an NGO to discretely change their operating procedures in order to take advantage of this situation. The two most effective surveillance countermeasures any organization can take are:- 1. Obstruction. 2. Deception. OBSTRUCTION =========== Obstruction protocols generally revolve around the introduction of rigorous operating procedures that will obstruct the security agencies ability to gathering any useful data about the NGO's confidential communications, and vital cryptographic components. Step 1. ******* This is basically cleaning up your act. If you previously used your organizations PC for sensitive encrypted traffic, then for starters, wipe the hard disk with a utility that securely wipes and erases files. The standard US DOD specification for wiping and overwriting should be sufficient for NGO use. However, if you are unfortunate enough to live in a location where your life or liberty could be at risk, then remove the hard drive from the computer, open the hard drive and remove the disks, either dissolve them in stock sulfuric acid, or grind the surface with a sanding wheel. Which ever option you have used, (DOD file wipe, or disk destruction/replacement) you will then need to reinstall your operating system, and office software. Your encryption software need not be installed on your office PC. PGPBOARD have developed a 1.44MB diskette friendly encryption package called GPG HOME BASE intended for use by NGO's at their in country office, and (1)John Moore has available a 1.44MB diskette based package called GPG TO GO, which is configured and optimized for field operatives. Both packages provide secure on the fly public key encryption capability, which is NOT PERMANENTLY RESIDENT on a host PC. Both packages use the GnuPG 1.2.6 encryption engine with a maximum asymmetric key length of 4096 bits (RSA RSA-E RSA-S ELG-E DSA ELG), a choice of 64 bit symmetric ciphers are available as follows, IDEA 3DES CAST5 BLOWFISH TWOFISH AES, and AES-192 bit AES-256 bit. Both GPG TO GO and GPG HOME BASE can be considered a more versatile and secure replacement for the erstwhile PGP2.6.2 diskette based encryption package. In order to counter some of the security agency attack vectors, both GPG HOME BASE, and GPG TO GO include. 1. (Clean )GnuPG 1.2.6 encryption engine. 2. (Clean) Windows XP Notepad 3. (Clean) Windows XP Command Processor Files 4. (Clean) Windows 98 Notepad 5. (Clean) Windows 98 Command.Com files In addition GPG HOME BASE includes:- 6. (Clean) WinPT graphical user interface, and key manager. 7. (Clean) Command line SMTP server. All the binaries are compressed into self extracting executable files. STEP 2 ****** Your portable encryption software will function on any WIN OS machine, however the best choice would be a battery powered laptop or notebook PC which does not require a connection to an AC power outlet during your encryption sessions. During you encryption session, you should ensure that your PC is disconnected from the either the ASDL/Cable modem, or telephone line in the case of a dial up connection, and that any BLUETOOTH 809.11b option is either removed, (PCI card) or disabled. These points are extremely important if you are using GPG HOME BASE on an office PC that is both unfamiliar and cannot be considered "sterile". STEP 3 ****** Relocate to another area, this will obstruct the security agencies (FBI etc.) ability to collect data from any electronic monitoring devices (video and audio) that may have been installed in the NGO's office. Alternative secure locations may be, but will not be limited to: 1. Public library 2. Coffee Shop 3. Friends house 4. Another building or office 5. Train station cafe...etc...etc When operating with your laptop in your alternative surveillance free environment for the first time, you will need to use GPG HOME BASE to generate your new public and secret keys. Your passphrase should be easy to remember, but very difficult to guess. It is not advisable to write down your password. PGP HOME BASE will automatically save your public and private keys into its default keyring on the removable diskette, and will leave no temporary or trace keyring files on your laptop. When you have finished your key generation and encryption session, close the application and remove the GPG HOME BASE diskette. Step 4 ****** Rigorously maintain the procedures outlined in 3 above. Whenever you need to process encrypted messages for transmission, ALWAYS RELOCATE TO A SAFE LOCATION". PGP HOME BASE has a "messages" folder included on the diskette, save your processed and encrypted traffic into this folder. Ensure that no plain text residual files remain in the message folder. (Refer to GPG HOME BASE Operators Manual). Upon returning to your home base or office, use ANOTHER computer to email the encrypted traffic. The use of ANOTHER computer to transmit your traffic is a vital concept, it acts as a very effective firewall. Similarly, incoming encrypted traffic is received on ANOTHER computer, virus scanned etc, and then processed by GPG HOME BASE running on your sterile PC. NEVER leave your GPG HOME BASE encryption software installed and unattended on the "sterile" PC. When you have finished your session, close the application, and remove the GPG HOME BASE diskette; then store it in a very secure location known only to yourself. ALWAYS prepare your offline encrypted traffic on your "sterile" PC. This PC should NEVER be, or NEVER have been connected to the Internet. (See step #1 regarding sterilizing your PC.) The above methodology will be extremely effective in obstructing surveillance by security agencies, however, it requires dedication, a heightened level of awareness, and undivided attention to operating procedures. The threat level will dictate such attention. If the danger is a knock on the door at 5am in the morning, and possibly sojourning for years in the gulags, or worse, then the procedures will not be a burden, and they will become second nature. However, if you are reading this piece from the safety of your home in the United States or European suburban sprawls, then such measures may seem ludicrous, or completely over the top. DECEPTION ========= The recommendations concerning OBSTRUCTING the security agencies ability to gather information by means of implanted electronic surveillance equipment was centered upon operating procedures. However, the security agencies surveillance and monitoring teams are vulnerable to DECEPTION, this is because they are expecting an NGO target with no experience of surveillance countermeasures. The following DECEPTION techniques assume that the secure communications protocols described under the OBSTRUCTION heading have been introduced, and are functioning correctly. The DECEPTION protocols are based uniquely upon human input, and they are totally dynamic in nature; constantly evolving as the system parameters and threats change. However, whatever the variation may be in application, the DECEPTION protocols are based upon the following basic scenario:- THE BASIC DECEPTION SCENARIO ============================ The introduction of the OBSTRUCTION protocols within the NGO, is a tacit acknowledgment that the system has been compromised, probably by undetected physical intrusion and implanted electronic surveillance. However, an NGO can take advantage of this situation, where the ultimate objective is to have the security agency remove themselves from actively monitoring the NGO. This technique involves letting the compromised system continue to function, whilst the active and secure protocols (OBSTRUCTION) are running in the background. The compromised system then continues to be used for decoy traffic. The success of this strategy relies upon carefully providing the security agencies with some traffic that is mildly interesting to them, and can be associated with the purpose of the NGO or organization in question. The decoy traffic will reassure the security agency that their surveillance is effective and producing results, and will dissuade them from further investigations. Eventually the security agency.. CIA etc will downgrade from a round the clock surveillance operation, to a simple watch list status, and bi-annual checks. As long as the decoy traffic continues to flow, and it is mildly relevant, the NGO will remain on a downgraded watch list free from constant surveillance. TESTING THE WATERS ================= - From time to time it is advisable to test the integrity of the organizations secure OBSTRUCTIVE protocol. This is done by sending a false but highly relevant message concerning, a meeting, or a dead drop, that the security agency surveillance team cannot ignore. It is then a relatively easy exercise to observe the dead drop, or meeting place in order to detect any physical surveillance activity by the security agency etc. If your primary OBSTRUCTIVE protocol has been discovered, you will have time to destroy or encrypt any incriminating data, and warn other members of the organization. This additional time may be used to construct a scenario of plausible denial. Alan Taylor -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.3.6 (MingW32) - GPGshell v3.22 Comment: PGPBOARD Angeles City Philippines Comment: http://groups.yahoo.com/group/pgpboard/ iD8DBQFBTFZa7H26LUxZn78RArShAKCd63kWUT78RWhgU+7FKe1EVU2cyQCgg3gG T57mVXlQIYLBVrZtZG1Hu5I= =89O+ -----END PGP SIGNATURE----- 9720 From: Edward Hirst Date: Sat Sep 18, 2004 9:14am Subject: Re: hardware based keyboard loggers This may be getting off topic but I was curious given the calibre of people on this list their opinions on this. Has there been any discussion here about the possibilities of hijacking the online software update feature found on most software and indeed most OS's now. I cant be the only person who has thought about this. If I was a govt technical person I would have seriously thought about trying to use the Mac OS X software update mechanism, Windows Updates feature and in fact the online updaters for many pieces of software to drop monitoring and reporting code (spyware if you like) onto the targets machine. It may not be legal but how many times does that stop anyone. Remember PROMIS. I can't believe that no one out there is taking advantage of the convenience of using these online update features to drop these govt tools onto target machines.. Certainly all the Mac people I know trust Software Update 'cos it comes directly from Apple... What if today it doesn't ;o) Edward Equinox Research Ltd. On 18/9/04 2:46 am, "Martin Peck" wrote: > The recent discussion of Magic Lantern reminded me of the Scarfo case. > The government was extremely opposed to providing any significant > technical details about the hardware device that was used. > > Some of the statements in the official court report appear to be > contradictory and imply both a hardware and software component with > ability to monitor comm ports (for compliance with the scope of > permissible monitoring). > > We have all seen the dongle based fobs you can sneak into the back of > a computer as well as the trojan keyboards which contain a device > built in. I am curious to know if there are any reports of TLA's > manufacturing logic boards for use within keyboards in a covert > manner. > > As an example, most keyboards are incredibly simple and place all > their intelligence in a small board that provides LED state > information and translates keystrokes to digital input. > > [ http://peertech.org/coder/log/image/intr-kb02.jpg is from an IBM KB-9910 ] > > I suspect that it would be trivial to build identical looking logic > boards for placement into target hardware. Due to lack of visual > clues and fully passive operation this would be a very effective > technique. > > Are there any published reports that cover these types of devices? > There appears to be very little information available due to CIPA > constraints surrounding these key loggers. > > How could one identify potentially malicious silicon when visual > inspection shows nothing amiss? Are there inexpensive methods for > detecting the logic within? (I am assuming that the memory > requirements for storing logged key strokes would make the silicon > appear very different in both size and structure when an authentic and > rogue device are compared). > > Regards, > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > 9721 From: Tech Sec Lab Date: Sun Sep 19, 2004 9:19am Subject: RE: Pat and his locks ;) I imagine it is because many of the ERI crowd are very busy...but I'm sure they post when they can. BTW Steve U, how is it you're so quiet of late...? Cat got your tongue!?! ;) ******************** Message: 2 Date: Sat, 18 Sep 2004 16:12:05 -0700 From: "Shawn Hughes (Road)" Subject: Re:Pat and his locks ;) ** Clip ** >>A big thank you to Steve Uhrig for his help Agreed. He is one of the most knowledgeable people on this list, but still finds time to guide even the most basic among us. A valuable resource to this list. It does beg the question why more of the ERI crowd doesn't post more often? Best wishes, -Shawn 9722 From: Michael Puchol Date: Sun Sep 19, 2004 11:32am Subject: Re: hardware based keyboard loggers Hi Edward, This may be slightly harder than it would appear. When these programs call home to check for updates, they use DNS servers to resolve the "home" address to an IP address. So, for starters, the attacker, whoever that might be, would have to hijack the DNS servers that the target uses, in order to redirect the home call to his own attack machine. Reverse-engineering of the used protocols, in some cases this means hacking some form of encryption too, is also required. In all, it may be easier to pick a lock and plant a device... Regards, Mike ----- Original Message ----- From: "Edward Hirst" To: "TSCM List" Sent: Saturday, September 18, 2004 4:14 PM Subject: Re: [TSCM-L] hardware based keyboard loggers > This may be getting off topic but I was curious given the calibre of people > on this list their opinions on this. > > Has there been any discussion here about the possibilities of hijacking the > online software update feature found on most software and indeed most OS's > now. > > I cant be the only person who has thought about this. If I was a govt > technical person I would have seriously thought about trying to use the Mac > OS X software update mechanism, Windows Updates feature and in fact the > online updaters for many pieces of software to drop monitoring and reporting > code (spyware if you like) onto the targets machine. It may not be legal but > how many times does that stop anyone. Remember PROMIS. I can't believe that > no one out there is taking advantage of the convenience of using these > online update features to drop these govt tools onto target machines.. > > Certainly all the Mac people I know trust Software Update 'cos it comes > directly from Apple... What if today it doesn't ;o) > > Edward > > Equinox Research Ltd. > > > > > On 18/9/04 2:46 am, "Martin Peck" wrote: > > > The recent discussion of Magic Lantern reminded me of the Scarfo case. > > The government was extremely opposed to providing any significant > > technical details about the hardware device that was used. > > > > Some of the statements in the official court report appear to be > > contradictory and imply both a hardware and software component with > > ability to monitor comm ports (for compliance with the scope of > > permissible monitoring). > > > > We have all seen the dongle based fobs you can sneak into the back of > > a computer as well as the trojan keyboards which contain a device > > built in. I am curious to know if there are any reports of TLA's > > manufacturing logic boards for use within keyboards in a covert > > manner. > > > > As an example, most keyboards are incredibly simple and place all > > their intelligence in a small board that provides LED state > > information and translates keystrokes to digital input. > > > > [ http://peertech.org/coder/log/image/intr-kb02.jpg is from an IBM KB-9910 ] > > > > I suspect that it would be trivial to build identical looking logic > > boards for placement into target hardware. Due to lack of visual > > clues and fully passive operation this would be a very effective > > technique. > > > > Are there any published reports that cover these types of devices? > > There appears to be very little information available due to CIPA > > constraints surrounding these key loggers. > > > > How could one identify potentially malicious silicon when visual > > inspection shows nothing amiss? Are there inexpensive methods for > > detecting the logic within? (I am assuming that the memory > > requirements for storing logged key strokes would make the silicon > > appear very different in both size and structure when an authentic and > > rogue device are compared). > > > > Regards, > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > 9723 From: kondrak Date: Sun Sep 19, 2004 11:35am Subject: Re: hardware based keyboard loggers This should scare the behooza out of places that push out M$ updates like after dinner mints. Now that XP has been certified for military use, its even more scary. They however are not deploying the SP2 cause its breaking too much "stuff". At 10:14 9/18/2004, you wrote: >This may be getting off topic but I was curious given the calibre of people >on this list their opinions on this. > >Has there been any discussion here about the possibilities of hijacking the >online software update feature found on most software and indeed most OS's >now. 9724 From: telos888@y... Date: Sun Sep 19, 2004 2:30pm Subject: Re: hardware based keyboard loggers A simple process actually. Use an .exe binder to co-join the executable update file (from Windows Update for example) with the trojan executable. For local area networks, use ARP poisoning to redirect clients to the IP address of the bogus update server, most update systems are just simple web servers - use a tool like dsniff or Cain & Abel for the ARP poisoning (or for DNS poisoning, which C&A also supports). Create the bogus web server by mirroring the content of the ìrealî update server with a spider like wget (wget --mirror http://windowsupdate.micro$oft.com). For WANs, DNS poisoning or DNS spoofing with a hacked primary, if you're the FBI then layer-2 shennanigans with Carnivore/DCS-1000's Packeteer toy. If you're an intel agency (or the FBI), sign the executable with a well-known CA's cert so the client doesn't complain about the lack of authenticity. Bake for 20 minutes at 350 degrees, wait until the next update, viola backdoored machine. Season to taste. -----Original Message----- From: Edward Hirst Date: Sat, 18 Sep 2004 15:14:49 To:TSCM List Subject: Re: [TSCM-L] hardware based keyboard loggers This may be getting off topic but I was curious given the calibre of people on this list their opinions on this. Has there been any discussion here about the possibilities of hijacking the online software update feature found on most software and indeed most OS's now. I cant be the only person who has thought about this. If I was a govt technical person I would have seriously thought about trying to use the Mac OS X software update mechanism, Windows Updates feature and in fact the online updaters for many pieces of software to drop monitoring and reporting code (spyware if you like) onto the targets machine. It may not be legal but how many times does that stop anyone. Remember PROMIS. I can't believe that no one out there is taking advantage of the convenience of using these online update features to drop these govt tools onto target machines.. Certainly all the Mac people I know trust Software Update 'cos it comes directly from Apple... What if today it doesn't ;o) Edward Equinox Research Ltd. On 18/9/04 2:46 am, "Martin Peck" wrote: > The recent discussion of Magic Lantern reminded me of the Scarfo case. > The government was extremely opposed to providing any significant > technical details about the hardware device that was used. > > Some of the statements in the official court report appear to be > contradictory and imply both a hardware and software component with > ability to monitor comm ports (for compliance with the scope of > permissible monitoring). > > We have all seen the dongle based fobs you can sneak into the back of > a computer as well as the trojan keyboards which contain a device > built in. I am curious to know if there are any reports of TLA's > manufacturing logic boards for use within keyboards in a covert > manner. > > As an example, most keyboards are incredibly simple and place all > their intelligence in a small board that provides LED state > information and translates keystrokes to digital input. > > [ http://peertech.org/coder/log/image/intr-kb02.jpg is from an IBM KB-9910 ] > > I suspect that it would be trivial to build identical looking logic > boards for placement into target hardware. Due to lack of visual > clues and fully passive operation this would be a very effective > technique. > > Are there any published reports that cover these types of devices? > There appears to be very little information available due to CIPA > constraints surrounding these key loggers. > > How could one identify potentially malicious silicon when visual > inspection shows nothing amiss? Are there inexpensive methods for > detecting the logic within? (I am assuming that the memory > requirements for storing logged key strokes would make the silicon > appear very different in both size and structure when an authentic and > rogue device are compared). > > Regards, > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > ------------------------ Yahoo! Groups Sponsor --------------------~--> $9.95 domain names from Yahoo!. Register anything. http://us.click.yahoo.com/J8kdrA/y20IAA/yQLSAA/UBhwlB/TM --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links email: telos888@y... 9725 From: Date: Sun Sep 19, 2004 1:14pm Subject: Re: Paper on cameras and detection In a message dated 9/4/04 7:59:02 PM Eastern Daylight Time, rockdriver@y... writes: > http://www.franken.de/users/tentacle/papers/hiddencams.pdf > [Non-text portions of this message have been removed] 9726 From: J. Oquendo Date: Sun Sep 19, 2004 4:06pm Subject: Re: hardware based keyboard loggers // // For local area networks, use ARP poisoning to redirect clients to the // IP address of the bogus update server, most update systems are just // simple web servers - use a tool like dsniff or Cain & Abel for the ARP // poisoning (or for DNS poisoning, which C&A also supports). Create the // bogus web server by mirroring the content of the ^real^ update server // with a spider like wget (wget --mirror http://windowsupdate.micro$oft.com). // You wouldn't even need to go that far. Simply enter the bogus IP into c:\Windows\system32\etc\drivers\hosts to point to your own server of choice with a bogus Windows Update look. Most people don't know enough about CA's to view certs and will almost always just ok things as they pop up. On subjects of "backdooring/installing a keystroke" monitoring machines, I recently sent a response to a group called NANOG (North American Network Operators Group) about yet another variant of this one evil little worm running through my current place of employment (I work at an ISP and contract to a University) http://www.merit.edu/mail.archives/nanog/msg01289.html Annoying yet neat thing about this particular worm is that according to a portion of the code I managed to get, it creates false replicas of antivirus software and renders system monitoring pretty useless. Took me about a day or two to figure out the extent of this particular worm, and man I can say it is ugly. There is also a "sniffer" worm included in one of the variants that seeks out logins and passwords. As for creating the perfect backdoor, I thought about actually writing a *nix polymorphic specific one as a proof of concept which would never remain the same, and on the infected system itself it would take one line of code to run. I have odd luck so I've stayed away from doing so, but I can tell you that I can create in less than a worm for Unix (Linux/BSD/HPUX/AIX/QNX) based machines that would reek hell. I thought about it to shoot down the zealotry of "Well Unix is better than Windows" crybabies but figured I'd keep my ideas to myself. On Windows it would actually be a little easier to create even to hide it from taskmgr, and your typical msconfig. Registry is a different story though. Only problem with monitoring someone's keystrokes would be where would you store the logs. If someone is clever enough to monitor their system it would be difficult to keep a log and have it send out without detection. Sending something out realtime would require redoing or binding something into programs like netstat which someone may open to see incoming and outgoing connections. =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo GPG Key ID 0x51F9D78D Fingerprint 2A48 BA18 1851 4C99 CA22 0619 DB63 F2F7 51F9 D78D http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D sil @ politrix . org http://www.politrix.org sil @ infiltrated . net http://www.infiltrated.net "How can we account for our present situation unless we believe that men high in this government are concerting to deliver us to disaster?" Joseph McCarthy "America's Retreat from Victory" ---------- Forwarded message ---------- Date: Tue, 27 Jul 2004 20:19:32 -0500 (EST) From: J. Oquendo To: TSCM-L@yahoogroups.com Subject: Frequency Filtering Wallpaper Writing is on the wallpaper for noisy mobiles David Smith, technology correspondent Sunday July 25, 2004 The Observer ... British scientists have found a way to mass-produce frequency-selective 'wallpaper' screens (FSS) on a large scale for the first time. The screens are metal grids designed in an intricate pattern which filter out some radio signals and allow others through, depending on their wavelength. They can be fitted to walls and covered with real wallpaper so they disappear from view. http://observer.guardian.co.uk/uk_news/story/0,6903,1268797,00.html =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo GPG Key ID 0x51F9D78D Fingerprint 2A48 BA18 1851 4C99 CA22 0619 DB63 F2F7 51F9 D78D http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D sil @ politrix . org http://www.politrix.org sil @ infiltrated . net http://www.infiltrated.net "How can we account for our present situation unless we believe that men high in this government are concerting to deliver us to disaster?" Joseph McCarthy "America's Retreat from Victory" 9727 From: Leanardo Date: Sun Sep 19, 2004 6:17pm Subject: Re: hardware based keyboard loggers The suggestions so far are all possible, mostly dependent upon having access to the target workstation's LAN. If you only had access to the machines Internet access provider it gets much more interesting, but still do'able. I am sure I am not the only person to consider this but so far the most obvious, plant at the source. The plant options depend mostly upon the entity that wants to monitor the target. In the right circumstances I don't think it would be too difficult for one of the alphabet agencies to get a court order and then entice Microsoft, or one of the anti-virus vendors to assist in identifying, planting, and then retrieving the results on a suspects workstation. Most of what suggested is the path a "hacker" would take, but is much too involved and risky for most positive installers. Mike Puchol is correct; it's much easier to pick a lock. Gaining physical access to the system and planting a device that will allow you remote access to the data would be ideal. A carefully selected and properly installed monitoring device gives a better "effort to return" ratio. Bruce : ) --- In TSCM-L@yahoogroups.com, "telos888@y..." wrote: > A simple process actually. > > Use an .exe binder to co-join the executable update file (from Windows Update for example) with the trojan executable. > 9728 From: James M. Atkinson Date: Mon Sep 20, 2004 8:18am Subject: Iranian 'spy' caught near Israeli Embassy http://www.interestalert.com/brand/siteia.shtml?Story=st/sn/09190000aab00b8b.upi&Sys=mariopro&Type=News&Filter=World%20News&Fid=WORLDNEW Iranian 'spy' caught near Israeli Embassy JERUSALEM, Sept. 19 (UPI) -- Azerbaijani police have arrested an Iranian who allegedly was spying on the Israeli embassy in that country's capital, Baku. An Israel security team guarding the embassy Sept. 1 saw the Iranian stop his car outside the Hyatt Regency Hotel that houses the Israeli and Japanese embassies, and video-tape the site. The guards alerted local policemen who arrested the man and found pictures of Dubai's airport, all the hotel's entrances, and footage of an unoccupied police post in the area. The detainee reportedly said he filmed the buildings for their beauty. However, the Israeli prime minister's office, which speaks for the Mossad and Shabak intelligence services, said Sunday it believes the Iranian was gathering intelligence on potential targets for attacks. Argentina's government found Iranian diplomats had been involved in preparations for the bombing of the Israeli Embassy in Buenos Aires in 1992 and the Jewish community building there in 1994, the prime minister's office noted. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9729 From: James M. Atkinson Date: Mon Sep 20, 2004 8:14am Subject: October (in)Secuity Ironically, in mid September 1938, Joseph Goebbels announced an identical plan, and in the first two weeks of October of that year "the security sweeps" also called the "October Program" was initiated to round up and/or silence members of the populace who the government were concerned might embarrass the party in the ensuing months. Then, during the first two weeks of October 1938, thousands of academics, scholars, authors, religious leaders, publishers, lawyers, reporters, clergy, and others were harassed, or just disappeared overnight. The sole factor in these disappearances was that fact that each had previously been an outspoken voice against the ruling political party. Those that didn't disappear were subjected to hostile interrogations, and aggressive, overt surveillance in an attempt silence those who would, or might speak out. Several weeks later the security sweeps climaxed in the Kristallnacht "measures" which were instituted, the rest is history. Given the Governments recent behavior and attitude towards the voice of dissent prior to and during the recent national political convention Mr. Ashcroft and Mr. Ridge seem to be following the teachings of Joseph Goebbels rather closely... I wonder when they will start wearing matching clothes right down to the black leather trench coats. -jma FBI's Anti-Terror 'October Plan' WASHINGTON, Sept. 17, 2004 (CBS) Convinced that al Qaeda is still determined to disrupt the U.S. fall elections by an attack on the homeland, FBI officials here are preparing a massive counter-offensive of interrogations, surveillance and possible detentions they hope will disrupt the terrorist plans, reports CBS News Correspondent Jim Stewart. FBI field offices and Homeland Security agencies will be advised of "extraordinary measures" that will go into place "beginning the first week of October through the elections." An internal e-mail advisory to supervisory agents this week from the FBI's "'04 Threat Task Force" said the purpose of the counter-offensive is "to foster the impression that law enforcement is focused on individuals who may be a threat." Specifically, the plan calls for "aggressive - even obvious - surveillance" techniques to be used on a short list of people suspected of being terrorist sympathizers, but who have not committed a crime. Other "persons of interest," including their family members, may also be brought in for questioning, one source said. All recent truck thefts, chemical thefts and suspicious cargo truck rentals will also be reviewed as part of the plan. Mosques will be revisited and members asked whether they've observed any suspicious behavior. Throwing hundreds of agents on the street and conducting invasive surveillance has become a standard post-9/11 tactic for the bureau, which hopes at a minimum to force terrorists go back into hiding and re-think their plan. Some officials believe it was just such tactics that foiled the remainder of al Qaeda's New Year's bomb plot in January 2000 after agents arrested one operative, Ahmed Ressam, in Port Angeles, Wash., with a car trunk full of explosive material. The bureau also knows it can expect to be criticized for the strategy if it goes too far. One element of the plan calls for addressing what some officials fears could be a wave of protests from Arab-Americans and civil libertarians once the so-called "October Plan" kicks off. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9730 From: James M. Atkinson Date: Mon Sep 20, 2004 9:35am Subject: Taipei minister to visit US over spy scandal http://straitstimes.asia1.com.sg/eyeoneastasia/story/0,4395,273527,00.html Archive: Sept 20 2004 Taipei minister to visit US over spy scandal, say reports TAIPEI - Taiwan is sending its foreign minister to the United States on a damage-control visit after a US government official was accused of passing documents to Taiwanese agents, an official and media reports said yesterday. Foreign Minister Mark Chen left here on Friday night headed for the US en route to Grenada, one of Taiwan's allies in the Caribbean, Foreign Ministry spokesman Michel Lu said. This comes after Donald Keyser, who retired in July as US principal deputy assistant secretary for East Asian and Pacific Affairs, was arrested for allegedly concealing a trip to Taiwan and passing documents to the island's agents, court records showed on Thursday. Mr Lu denied the link between the trip and the alleged espionage episode, which rocked ties between Washington and Taipei. Mr Lu said the minister would make a transit stop in the US. During the stop, Mr Chen would host an annual conference on North American affairs, attended by the heads of Taiwan's representative offices in North America. He declined to say where the two-day meeting, which starts tomorrow, would be held, though Taiwan newspapers said it would be in Baltimore. 'Theoretically speaking, the event would be discussed during the meeting,' he said. He said no arrangement had been made for meetings with US officials on the matter, but Taiwan's United Daily News quoted a national security official as confirming the link between the trip and alleged spy case. Mr Chen would meet Lieutenant-General Huang Kuang-hsun, one of Taiwanese agents implicated in the case, the newspaper said. Mr Lu said 'damage control' would be exercised should the Keyser case affect Taipei-Washington ties, the China Post reported. Taiwan's representative in the US, Mr David Lee, said yesterday the island has no plans to recall two of its US-based intelligence officers who the FBI said met Keyser. But a local newspaper claimed that Taiwan's National Security Bureau had recalled all agents stationed abroad for a loyalty test. -- AFP, Reuters, AP ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9731 From: Tech Sec Lab Date: Mon Sep 20, 2004 11:45am Subject: Cable Detector Does anyone have any comments on this device? http://www.flukenetworks.com/uk/LAN/Handheld+Testers/IntelliTone/Overview.ht m Regards -Ois 9732 From: Jeremy Funk Date: Mon Sep 20, 2004 1:20pm Subject: AVCOM PSA-65B for sale Hello, I have an AVCOM PSA-65B for sale. The batteries work for at least 18 minutes (the longest I've ever used it on battery power) and it has all the various AVCOM parts and accessories. A full listing and pictures are located at: http://www.jnpfunk.com/avcompsa65b/index.html I am asking $1200.00 for it. AVCOM retail is $2800.00 or so. The unit also comes with a Microwave Frequency Convertor. This works great for checking out wireless networks, 2.4 GHZ phones, etc. Thanks for your time. Feel free to email off-list with any questions you may have. Jeremy Funk 9733 From: John <3v1l.hax0r@g...> Date: Mon Sep 20, 2004 2:37pm Subject: Re: Re: hardware based keyboard loggers Have you folks looked at the retail devices out there: http://www.keyghost.com/ " New compact design. Huge 2,000,000 Keystroke capacity! Store and retrieve approx 12 months worth of typing. " Another of several: http://www.amecisco.com/products.htm This could be wrapped in material similar to the keyboard cable to avoid casual inspection. 9734 From: Greg Horton Date: Mon Sep 20, 2004 7:08pm Subject: Re: October (in)Secuity James M. Atkinson wrote: > > Ironically, in mid September 1938, Joseph Goebbels announced an identical > plan, and in the first two weeks of October of that year "the security > sweeps" also called the "October Program" was initiated to round up > and/or > silence members of the populace who the government were concerned might > embarrass the party in the ensuing months. Then, during the first two > weeks > of October 1938, thousands of academics, scholars, authors, religious > leaders, publishers, lawyers, reporters, clergy, and others were > harassed, > or just disappeared overnight. The sole factor in these disappearances > was > that fact that each had previously been an outspoken voice against the > ruling political party. Those that didn't disappear were subjected to > hostile interrogations, and aggressive, overt surveillance in an attempt > silence those who would, or might speak out. Several weeks later the > security sweeps climaxed in the Kristallnacht "measures" which were > instituted, the rest is history. > > Given the Governments recent behavior and attitude towards the voice of > dissent prior to and during the recent national political convention Mr. > Ashcroft and Mr. Ridge seem to be following the teachings of Joseph > Goebbels rather closely... I wonder when they will start wearing matching > clothes right down to the black leather trench coats. > > -jma > > > > Did someone miss their medication time? [Non-text portions of this message have been removed] 9735 From: Date: Tue Sep 21, 2004 5:49am Subject: Folcroft cops plan rally to protest alleged spying by borough officials Folcroft cops plan rally to protest alleged spying by borough officials By CINDY SCHARR and ROSE QUINN , cscharr@d..., rquinn@d... 09/21/2004 FOLCROFT -- Buoyed by records showing taxpayers footed nearly $10,000 in bills for spy equipment, police officers are apparently gaining support in their fight against the alleged breach of privacy by embattled Borough Manager Anthony Truscello. State and local Fraternal Order of Police members are expected to be joined by several community organizations in a rally before tonight‚Äôs borough council meeting to show support for members of the borough police department. They are up in arms over the alleged spying by Truscello and Council President Joseph Zito. "We want whoever is responsible for wiretapping and surveillance prosecuted," Police Chief Ed Christie said Monday. "I don‚Äôt see how it‚Äôs legal." The 7 p.m. meeting is at borough hall, 1555 Elmwood Ave. On Monday, Christie provided copies of bills, totaling $9,815, police received through the Freedom of Information Act. They requested the bills in the wake of an independent investigation that revealed that secret video and audio surveillance had been ongoing in and around the police department. Christie said they were initially denied copies of the bills, but then received several copies after Officer Christopher Eiserman filed a formal request under the Freedom of Information Act. In May, Christie went public about the discovery of the surveillance equipment. Christie hired Gregory J. Auld, a retired FBI agent and licensed private investigator, to scour police headquarters after hearing rumors that his officers were being watched and conversations recorded. Auld determined that there were several pinhole cameras placed in smoke detectors -- one in a hallway, one in the squad room and one in the evidence room. It was later determined that one of the cameras had a microphone installed in it, making it capable of eavesdropping. Auld also found more devices, including a coil used to hook up a tape recorder to a telephone line, and a monitor room that contained a four-camera split monitor in the health room of the police department. One of the rooms that had been entered was the evidence room, Christie said. Only the police chief and two corporals have keys to the locked room. Yet, according to Christie, there is a videotape of someone removing surveillance equipment from that room, which contains all kinds of evidence, including weapons. "You tell me how they cannot be charged with criminal trespass?" Christie asked. In May, county detectives raided borough hall, looking for evidence that the police department was a target of illegal electronic surveillance. They left with video equipment and about a dozen videotapes and other items, according to authorities and an affidavit supporting the searches. Truscello and Zito subsequently stated in a prepared release that they installed three surveillance cameras to quell anonymous complaints about police officers sleeping on the job. As far as Christie knows, the county investigation is open and ongoing. The documents provided by Christie date back to January 2003. Most of the bills list an amount due with no explanation as to services or equipment provided. Payment for 10 of the bills is initialed for authorization by borough Council President Joseph Zito. Delaware County Deputy District Attorney Jackson M. Stuart Jr. did not return a call Monday concerning the status of the investigation. "Because of the FOP‚Äôs efforts, it‚Äôs still ongoing," Christie saidof the probe. "Where it‚Äôs going, I don‚Äôt know." [Non-text portions of this message have been removed] 9736 From: John and Sheryl Date: Mon Sep 20, 2004 9:15pm Subject: RE: ASIS DALLAS Good evening, Will anyone from the list be at the ASIS show this year in Dallas. If so does anyone want to get together while were down there? John [Non-text portions of this message have been removed] 9737 From: Jonathan Young Date: Tue Sep 21, 2004 1:44pm Subject: RE: Folcroft cops plan rally to protest alleged spying by borough officials -----Original Message----- From: NoPositiveWork@a... [mailto:NoPositiveWork@a...] Sent: Tuesday, September 21, 2004 7:49 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Folcroft cops plan rally to protest alleged spying by borough officials Folcroft cops plan rally to protest alleged spying by borough officials Looks like the police don't like it when the spying is on them.....they are getting a taste of their own medicine. Yahoo! Groups Sponsor ADVERTISEMENT ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 9738 From: Monty Date: Mon Sep 20, 2004 7:45pm Subject: Re: Cable Detector Whats to say? Its a digital "Fox and Hound" unit. Will agree it does work better. Just what you need in a crowded wiring closet. my 2 cents. Monty --- Tech Sec Lab wrote: > Does anyone have any comments on this device? > > http://www.flukenetworks.com/uk/LAN/Handheld+Testers/IntelliTone/Overview.ht > m > > Regards > > -Ois > > > __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - Send 10MB messages! http://promotions.yahoo.com/new_mail 9739 From: Date: Tue Sep 21, 2004 9:52am Subject: Kirk Sewell is out of the office. I will be out of the office starting 09/21/2004 and will not return until 09/24/2004. I will respond to your message when I return. If you need immediate help, call S/A Bill Bercaw at 524-6068. From: Steve Uhrig Date: Tue Sep 18, 2001 8:15pm Subject: How We Got Here HOW WE GOT HERE First we crippled the CIA. Then we blamed it. By Tom Clancy We know now that America has been the victim of a large, well- planned, and well-executed terrorist act. The parameters are yet to be fully explored, but that won't stop the usual suspects from pontificating (and, yes, that includes me) on what happened and what needs to be done as a result. A few modest observations: As I write this we only know the rough outlines of what has taken place. We do not know exactly who the perpetrators were, though we have heard from Vice President Dick Cheney that there is "no question" that Osama bin Laden had a role. But many groups may have been involved, and we do not know their motivation, or for whom or for what particular objective they worked. "Don't know" means "don't know" and nothing more. Absent hard information, talking about who it must have been and what we need to do about it is a waste of air and energy. To discern the important facts, we have the Federal Bureau of Investigation as our principal investigative agency, and the Central Intelligence Agency (along with National Security Agency and the Defense Intelligence Agency) as our principal foreign-intelligence services. Getting the most important information is their job, not the job of the news media, which will only repeat what they are told. Gathering this information will take time, because we need to get it right. Terrorism is a political act, performed for political objectives. The general aim of terrorism is to force changes in the targeted society through the shock value of the crime committed. Therefore, if we make radical changes in how our country operates, the bad guys win. We do not want that to happen. Whoever planned this operation is watching us right now, and they are probably having a pretty good laugh. We can't stop that. What we can do is to maintain that which they most hate, which is a free society. We've worked too hard to become what we are, and we can't allow a few savages to change it for us. Next, our job is to take a step back, take a deep breath and get to work finding out who it was, where they are, and what to do about it. Terrorism is a crime under the civil law when committed by domestic terrorists; it can be an act of war when committed by foreigners. For domestic criminals we have the FBI and police. For acts of war we have our intelligence community and the military. In either case we have well-trained people to do the work. If we let them do their job, and give them the support they need, the job will get done as reliably as gravity. The foreign-source option seems the most likely at this time. The first line of defense in such a case is the intelligence community. The CIA is an agency of about 18,000 employees, of whom perhaps 800 are field-intelligence officers--that is, the people who go out on the street and learn what people are thinking, not how many tanks they have parked outside (we have satellites to photograph those). I've been saying for a lot of years that this number is too small. American society doesn't love its CIA, for the same reason that it doesn't always love its cops. We too often regard them as a threat to ourselves rather than our enemies. Perhaps these incidents will make us rethink that. The best defense against terrorist incidents is to prevent them from happening. You do that by finding out what a potential enemy is thinking before he is able to act. What the field intelligence officers do is no different from what Special Agent Joe Pistone of the FBI did when he infiltrated the mafia under the cover name of Donnie Brasco. The purpose of these operations is to find out what people are thinking and talking about. However good your satellites are, they cannot see inside a human head. Only people can go and do that. But America, and especially the American news media, does not love the CIA in general and the field spooks in particular. As recently as two weeks ago, CBS's "60 Minutes" regaled us with the hoary old chestnut about how the CIA undermined the leftist government of Chile three decades ago. The effect of this media coverage, always solicitous to leftist governments, is to brand the CIA an antiprogressive agency that does Bad Things. In fact, the CIA is a government agency, subject to the political whims of whoever sits in the White House and Congress. The CIA does what the government of which it is a part tells it to do. Whatever evil the CIA may have done was the result of orders from above. The Chilean event and others (for example, attempts to remove Fidel Castro from the land of the living, undertaken during the presidency of JFK, rather more rarely reported because only good came from Camelot) caused the late Sen. Frank Church to help gut the CIA's Directorate of Operations in the 1970s. What he carelessly left undisturbed then fell afoul of the Carter administration's hit man, Stansfield Turner. That capability has never been replaced. It is a lamentably common practice in Washington and elsewhere to shoot people in the back and then complain when they fail to win the race. The loss of so many lives in New York and Washington is now called an "intelligence failure," mostly by those who crippled the CIA in the first place, and by those who celebrated the loss of its invaluable capabilities. What a pity that they cannot stand up like adults now and say: "See, we gutted our intelligence agencies because we don't much like them, and now we can bury thousands of American citizens as an indirect result." This, of course, will not happen, because those who inflict their aesthetic on the rest of us are never around to clean up the resulting mess, though they seem to enjoy further assaulting those whom they crippled to begin with. Call it the law of unintended consequences. The intelligence community was successfully assaulted for actions taken under constitutionally mandated orders, and with nothing left to replace what was smashed, warnings we might have had to prevent this horrid event never came. Of course, neither I nor anyone else can prove that the warnings would have come, and I will not invoke the rhetoric of the political left on so sad an occasion as this. But the next time America is in a fight, it is well to remember that tying one's own arm is unlikely to assist in preserving, protecting and defending what is ours. ======================================== Tom Clancy is a novelist who has repeatedly demonstrated a depth and breadth of knowledge about the intelligence "game" and the science of military logistics that must make a lot of professional planners in both fields envious. ======================================== Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3753 From: Steve Uhrig Date: Tue Sep 18, 2001 8:28pm Subject: Hiding their commo -------------------- Bin Laden, associates elude spy agency's eavesdropping -------------------- Encrypted calls may keep NSA off track By Scott Shane Sun Staff September 15, 2001, 10:52 PM EDT It was an ordinary number, just a dozen digits: 873682505331. But it gave U.S. intelligence and law enforcement the key to the prosecution of four of Osama bin Laden's followers this year for their roles in the 1998 terrorist bombings of two American embassies in East Africa. The number rang bin Laden's satellite telephone, a laptop-sized device that linked his hideout in the mountains of Afghanistan to a global network of followers -- and to the National Security Agency at Fort Meade, which intercepted the plotters' calls. While not explicit enough to allow U.S. authorities to move in time to prevent the bombings, the intercepts helped track the terrorists and send them to prison. Since the East Africa bombings, however, the NSA has had far less success in picking up bin Laden's communications, according to people knowledgeable about U.S. intelligence. Possibly put on guard by the embassy bombing investigation, the Saudi dissident and his terrorist lieutenants evidently have become far more cautious in their communications. "They've been very careful and compartmented," said one former senior intelligence official. James Bamford, author of two books on the NSA, was told by agency sources that in the late 1990s, NSA officers would sometimes play a tape of bin Laden talking with his mother to impress visitors holding high-level security clearances. But early this year, Bamford said, a source told him that the agency "had totally lost bin Laden's calls." "They lost all track of him," Bamford said. "It could be that he uses couriers for really important communications. Or it could be he's using encryption." If it is true that the NSA can no longer monitor bin Laden's communications -- and the agency certainly isn't saying -- the loss might have played a role in the failure of U.S. intelligence to pick up warning of Tuesday's terrorist attacks. Officials have called bin Laden their prime suspect. Now, the loss will hinder investigators as they try to hunt down those who conceived, planned and paid for the bloodiest terrorist assault in U.S. history. It has already triggered a new debate over government control of encryption, posing the authorities' desire to intercept terrorists' communications against Americans' freedom to communicate without fear of government snooping. Over the past decade, encryption -- software or hardware used to scramble communications so that only the intended recipients can understand them -- has become widely available and virtually unbreakable. And, as officials have long feared, encryption is becoming a deadly weapon in the terrorists' arsenal. In the wake of Tuesday's attacks, Sen. Judd Gregg, a New Hampshire Republican, called for a global prohibition on encryption products that do not have a back door built in for government surveillance. "This is something we need international cooperation on ... to get the information that allows us to anticipate and prevent what occurred in New York and Washington," Gregg told the Senate. Unworkable and unwise Cryptographer Phil Zimmermann -- the creator of PGP, for Pretty Good Privacy, a powerful and widely used e-mail encryption program -- said such a ban would be unworkable and unwise. He said PGP is used by human rights activists worldwide collecting information on government repression and even genocide. "If we make momentous political decisions under such incredible emotional pressure," he said, "we're bound to make terrible decisions." Bin Laden and his allies may be using several methods to hide from the NSA. He may simply have dropped all electronic communications, insisting that sensitive messages be hand- carried. His associates in urban areas may make calls from random public telephones using untraceable, prepaid phone cards, and using vague language. Or possibly, experts say, he may be using new, powerful encryption that even the NSA can't break. Cryptographers say the long historical race between code makers and code breakers is over, and the code makers won. "There was a time when NSA held a monopoly in this field," said Zimmermann, of Burlingame, Calif. "That's no longer the case." William P. Crowell, the NSA deputy director, told a Senate committee in 1996 that if all the personal computers that then existed were set to work to break a single message encrypted with PGP, it would require 12 million times the estimated age of the universe to break it. "It's just going to be real tough for the NSA, and it's only going to get tougher," said Stephen T. Walker, a former NSA and Defense Department employee who built a Maryland software company that he sold in 1998 for $350 million. Several terrorists have been caught using encryption in recent years. Ramzi Yousef, the convicted mastermind of the 1993 World Trade Center bombing, used encryption to protect computer files giving details of a plan to crash 11 U.S. airliners. After months of work, NSA experts broke the encryption. The plot was foiled. This year's trial of the embassy bombing plotters revealed that bin Laden associates began to use encryption before 1998. Wadih El-Hage, one of the four convicted, sent encrypted e-mails under various names, including "Norman" and "Abdus Sabbur," to associates in the bin Laden organization. But the trial transcript shows the terrorist ring talked constantly, if guardedly, on unencrypted phone lines as they coordinated the embassy bombings in Kenya and Tanzania, which killed 224 people and injured several thousand. Bin Laden's phone used the Inmarsat satellite network, originally created for maritime use but now linking 210,000 phones worldwide. An associate bought the phone Nov. 1, 1996, from a New York supplier, and a total of 2,200 minutes of prepaid time was used over the next two years, according to records presented at trial. He made calls all over the world, to England, Yemen, Sudan, Iran, Saudi Arabia, Pakistan and Azerbaijan, as well as 50 calls to Kenya, where the bombings were being plotted. Federal prosecutors spent hours laying out hundreds of intercepted calls for a Manhattan jury, using transcripts and call records to sketch the web of conspiracy. Assistant U.S. Attorney Kenneth Karas dubbed one London cellular telephone that often called the satellite phone in Afghanistan "the Jihad phone," used to coordinate bin Laden's jihad, or holy war, against the United States. "That's the phone that bin Laden and the other co-conspirators [used] to carry out their conspiracy to murder U.S. nationals. ... It is the phone that gives you a window into how it is that Al Qaeda [the Base, bin Laden's network] operates," he told the jury. That window evidently has narrowed considerably since 1998, though it might not have closed completely. Sen. Orrin G. Hatch, a Utah Republican, said after Tuesday's attacks that the United States had intercepted a call between two bin Laden associates suggesting their involvement. Such information is highly classified, and intelligence officials were furious that Hatch had disclosed it, fearing the targets would be warned not to use telephones, the Chicago Tribune reported. Despite the NSA's reputation as a "vacuum cleaner" that sucks up all communications worldwide, officials have said in recent years that the agency risks being overwhelmed by the ballooning volume of global communications. "Forty years ago, there were 5,000 stand-alone computers, no fax machines and not one cellular phone," NSA Director Michael V. Hayden, an Air Force lieutenant general, said in a speech last year. "Today, there are over 180 million computers -- most of them networked. There are roughly 14 million fax machines and 40 million cell phones, and those numbers continue to grow." Contrary to popular myth, the job of plucking crucial calls of a suspected terrorist from the flood of communications is not a simple matter of plugging keywords such as bomb into the NSA's computers, electronics experts say. While text messages such as e-mails can be searched rapidly by a computer, voice communications are a different matter. "When you type an A on your keyboard, it sends seven bits of data, and those seven bits mean A everywhere on the planet," said Steve Uhrig, president of SWS Security in Harford County, which manufactures and sells electronic surveillance systems. "But there are thousands of ways to say bomb, and the technology just doesn't exist yet to interpret it very accurately," he said. Even in hunting a terrorist's text message, the NSA's job is akin to searching for a ring that accidentally fell into the trash -- after the trash has been dumped at a landfill. "Sifting bin Laden out of the enormous volume is a huge challenge," Uhrig said. And that's if the message is not encrypted. If it is encrypted, and even if the NSA has the theoretical ability to break the code, the agency might have no way of telling that a particular message is worth trying to break. If the terrorist assault sparks a new debate over government control of encryption, it will echo a battle fought in the early 1990s. Then, cryptographers demanded that the U.S. government drop restrictions on the export of encryption products. They said strong encryption, crucial for such contemporary business purposes as using credit cards online, was already available on the Internet and from foreign companies. The NSA and FBI fought to keep the export controls, fearing strong encryption would protect terrorists and drug traffickers. They also proposed the Clipper chip, a plan for the government to keep the key to an electronic back door to all encryption. After an outcry from civil libertarians and industry officials, the Clipper plan was dropped and export restrictions on encryption were greatly relaxed. 'Both sides proven right' Walker, the former Defense employee, said Tuesday's attacks are a reminder that both sides in the old debate had a point. "Now we have an incredibly ugly situation where both sides have been proven right," Walker said. "You can't stop encryption. But it can be used for terrible purposes." PGP inventor Zimmermann -- who once was threatened with federal prosecution for allegedly making PGP available over the Internet -- said that to build a government back door into the encryption used today by countless individuals, businesses and organizations for all kinds of purposes would be a serious mistake: "If we install blanket surveillance systems, it will mean the terrorists have won. The terrorists will have cost us our freedom." Copyright (c) 2001, The Baltimore Sun Link to the article: http://www.sunspot.net/bal-intel15.story =========================== Steve (note: the comments attributed to me in the above article were extracted out of context from my original diatribe on the matter, as is typical. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3754 From: Marcelrf Date: Tue Sep 18, 2001 8:58pm Subject: NTIA Report 01-382 Vulnerability of Wireline and Cellular Telecommunications Networks to High Power Radio Frequency Fields NTIA Report 01-382 Vulnerability of Wireline and Cellular Telecommunications Networks to High Power Radio Frequency Fields 3755 From: Marcelrf Date: Tue Sep 18, 2001 9:01pm Subject: Re: [NEXTEL1] NTIA Report 01-382 Vulnerability of Wireline and Cellular Telecommunications Networks to High Power Radio Frequency Fields http://www.its.bldrdoc.gov/pub/ntia-rpt/01-382/01-382.pdf Marcelrf wrote: > NTIA Report 01-382 Vulnerability of Wireline and Cellular > Telecommunications Networks to High Power Radio Frequency Fields > > "NEXTEL1 IT'S NOT JUST NEXTEL" > www.Nextel1@onelist.com > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 3756 From: Steve Uhrig Date: Tue Sep 18, 2001 11:16pm Subject: Used Equipment List Updated Hi all, We have updated the used equipment list on our website: http://www.swssec.com/used.html Check it out, and maybe sign up at the bottom for the automatic reminder service so you get an email when the page changes. There is a good bit of new TSCM gear this month, including TDRs and other stuff. Also other electronics, some surveillance, some communications, some test equipment, some miscellaneous items. We take credit cards for payment. Holler if questions on anything. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3757 From: Aimee Farr Date: Tue Sep 18, 2001 11:55pm Subject: RE: Hiding their commo > Steve > > (note: the comments attributed to me in the above article were > extracted out of context from my original diatribe on the > matter, as is typical. > What was the "original diatribe?" I listen to the media, lawyers and politicians, because of the lack of material on these subjects. Try to imagine the FUD I have to waddle through over here. *mental image: bricks being thrown in my face* My opinions change frequently. :) PS: Curious to hear thoughts about how all this will affect you in whatever voodoo that you do -- especially in regard to secondary effects. ~Aimee 3758 From: Roger Pilkington Date: Wed Sep 19, 2001 7:07am Subject: Weather Forecast for Kabul Sent: Wednesday, September 19, 2001 12:01 PM Subject: Weather Forecast for Kabul > > > > > Sent: Tuesday, September 18, 2001 9:30 PM > > Subject: Weather Forecast for Kabul > > > > > > > NATIONAL WEATHER SERVICE - WASHINGTON > > > Forecast weather for: Kabul, Afghanistan > > > of 9/24/2001: > > > > > > Very brief period of extremely bright sunlight followed by variable > winds > > of > > > 2000 knots and temperatures in the mid-to-upper 60,000's Fahrenheit > range > > > with no measurable moisture. SPF 12000 sunblock highly recommended if > > > standing near an outside structural wall of less than one > > > meter thick. 3759 From: Steve Uhrig Date: Wed Sep 19, 2001 8:35am Subject: How to do interviews (was: Hiding their commo) Once upon a midnight dreary, Aimee Farr pondered, weak and weary: Steve originally said: > (note: the comments attributed to me in the above article > were extracted out of context from my original diatribe on the > matter, as is typical. The lovely and talented Miss Aimee then asked: > What was the "original diatribe?" An hour and a half on the phone with the reporter, discussing many different aspects of communications intercept (one of my areas of specialty, although normally applied against narcotraffickers). They extract the written equivalent of 'sound bytes', frequently out of context. Sometimes it is merely incomplete and confusing, as in the example of the article I posted. Other times it is deliberately misleading. Still other times, the reporter has an ax to grind, or has a position, or his editor does, and they twist things to make you look Anti- American, or Anti-Semetic, or homophobic or whatever evil they want to push. So I trust VERY few reporters and have mastered talking for a while, reading their position, and not saying anything they can twist. There are some honorable reporters out there, quite a few, actually, but too many schnooks. Most people contacted for an interview instantly gets a swelled head and spout off. They're the expert. They're the authority. They have a fancy catalog. They have a fancy website. They have a big ego. They have some major media outlet willing to print their soapbox. It takes a big man to tell the reporter the topic he is researching is outside your field (or level) of expertise, but you would be glad to refer them to someone more knowledgeable to answer their questions. I couldn't tell you how many times I have referred reporters to Jim, Kevin, Gordon or some of my personal gurus, for areas where I did not know enough about the subject matter to comment. Common sense must prevail when you are talking for the record, and every minute with a reporter is on the record, period. This counts the time you are walking into the restaurant together, or peeing in the men's room, or making small talk not related to the topic. And these are the times when inexperienced people let their guard down. Reporters are expert at getting people to do this. Very bad juju. Remember any decent reporter will contact several sources, trade associations, your competitors, read websites from government to spy shops and everything in between. They are obligated to try to verify your statements, and many times to present what they think are both sides of the issue, even if the other side is ludicrous. Your comments will be picked apart by others and you can be made a fool of when you thought they were accurately reporting your every word. This only happens once, then you learn your lesson. As Tom (Clancy) says, "Take control of the interview". Remember that. Qualify statements you make, provide facts, offer numerous other sources to back up your position, especially if unpopular or non- PC. If a complex technical matter, tell the reporter or interviewer which statements must be taken as a whole. Tell the absolute unbiased truth, or the reporter will discover it elsewhere and stick it up your rear end sideways for the world to see. We have seen examples of precisely that on this list, where certain frauds were qouted as technical surveillance experts and persons on this list exposed them as liars and frauds in print. The reporters don't know squat about your subject and may just pull a single sentence which looks interesting to them but completely changes the context of what you were saying. Off on a tangent for a second -- The best authorities can translate complex technical concepts into the language of the common layman. If the reporter can't understand it, he either will not use it or will mangle it. Avoid technobabble. Use analogies and everything you can to simplify things as much as possible. Define every term and buzzword you use, and minimize buzzwords. Speak English, not technobabble. If you can do that, you will be one of the few and will endear yourself to the reporter and he will make a Rolodex card on you against future need. As an example to the matter mentioned two paragraphs above, in the article from the Baltimore Sun quoting me, the reporter asked why couldn't NSA with all their (presumed) voice recognition capability searching every transmitted word spoken worldwide for keyword matches, have located bin Laden? He compared the alleged technology (Echelon) to Carnivore. I tried to make the distinction between the digital domain (Carnivore) and the analog domain (Echelon). I type a word on my keyboard (placing that word into the digital domain), and software easily and quickly can search for it amongst millions of words in tens of millions of messages. If I speak (analog) the same word, however, even if intercepted, converting that analog nasal voice of mine with a Bawlermore accent on top of my cold, into a digital representation and trying to apply an algorithm to compare bin Laden's voice, in whatever variation of whatever language or dialect, with whatever accent (even within states regional accents vary, as you well know), health conditions, on top of a heavily compressed, lightly sampled (to save bandwidth) digital Inmarsat uplink, speaking the same word, is so complex as to be impossible for all practical purposes. Those ideas expressed in the above two paragraphs were condensed down to "Steve said it would be harder to do" or whatever. I don't have the original text at my fingertips. Get the picture? Here I thought I was defending NSA and the CIA and our electronic intelligence capability by explaining the difficulties involved in intercepting bin Laden's communications, and it was twisted/edited down to imply something completely different. > I listen to the media, lawyers and politicians, because of > the lack of material on these subjects. Sure sounds like you have selected persons with proven ethics and integrity and technical ability, unbiased, as sources. My compliments. > My opinions change frequently. Dante said, "There is a special place in hell for fence sitters". See? I did it to you. > PS: Curious to hear thoughts about how all this will affect you > in whatever voodoo that you do -- especially in regard to > secondary effects. I'm doing my 14th interview today with an editor of an international business magazine many of you read, with the editor from San Francisco and a photographer from New York. Since the mag is heavily technical, the article will be online sooner or later, and I will post a link once it is. My outfit does fleet radio communications, and we have something over 400 more radios and about fifteen repeaters in the DC/VA area than we had a week before this nonsense happened. Commo is a great area to be in when disasters occur. Outfitting the U.S. Army Corps of Engineers for the Kuwait rebuild after Desert Storm was the most profitable period in my 29+ years in business. We do technical support for a number of executive protection teams, and that work has picked up considerably. I am glad I have a number of reliable people working for me, and even my ever faithful and understanding wife left the house at 6AM this morning to make rounds and drop off equipment needed for various contracts. Interest in one of the products I manufacture, the Beeper Buster pager intercept system: http://swssec.com/beepbust3.html has exploded as governments realize terrorists use pagers in the conduct of their affairs. You asked, I answered. And I spend far too much time answering email. If I were not a very rapid typist, your message never would have made it past triage. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3760 From: David Alexander Date: Wed Sep 19, 2001 10:07am Subject: reporting of operations against Bin Laden It seems to me that one of the main sources of information for Bin Laden and his cronies is the world media. All the reporting and conjecture about 'how to take him down', complete with - for example a diagram and article about "how special forces could assault his cave" (UK daily Mail, Tuesday 18th Sept) must be a fascinating read for his teams. If I were him I would be mingling with the refugees trying to get into Pakistan by now, on the move to somewhere else. He has enough connections/money to get across just about any border undetected. It reminds me of one of the reasons the Prussians won the Franco-Prussian war so quickly. Every day they bought the French papers and learned what the French Army were going to do to the 'd*mn Prussians' that day. I'm sure it has happened since. Perhaps one of the best security measures would be to lock up all the journalists. I know disinformation is an tool in the arsenal of IWAR, but I think there are too many sources, too well informed for this to be effective in this situation. I am sure that there are some journos more interested in making the news than in helping bring the man to justice. Even if you control print and traditional broadcast media you could not stop the web-based writers. Just my 2c. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Manager Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 3761 From: Steve Whitehead Date: Wed Sep 19, 2001 10:22am Subject: Re: reporting of operations against Bin Laden Is this really relevant to TSCM? Steve Whitehead E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa TSCM Services URL : http://www.tscm.co.za ----- Original Message ----- From: David Alexander To: 'iwar submissions' ; 'TSCM submissions' Sent: Wednesday, September 19, 2001 5:07 PM Subject: [TSCM-L] reporting of operations against Bin Laden > It seems to me that one of the main sources of information for Bin Laden and > his cronies is the world media. > > All the reporting and conjecture about 'how to take him down', complete with > - for example a diagram and article about "how special forces could assault > his cave" (UK daily Mail, Tuesday 18th Sept) must be a fascinating read for > his teams. If I were him I would be mingling with the refugees trying to get > into Pakistan by now, on the move to somewhere else. He has enough > connections/money to get across just about any border undetected. > > It reminds me of one of the reasons the Prussians won the Franco-Prussian > war so quickly. Every day they bought the French papers and learned what the > French Army were going to do to the 'd*mn Prussians' that day. I'm sure it > has happened since. > > Perhaps one of the best security measures would be to lock up all the > journalists. I know disinformation is an tool in the arsenal of IWAR, but I > think there are too many sources, too well informed for this to be effective > in this situation. I am sure that there are some journos more interested in > making the news than in helping bring the man to justice. Even if you > control print and traditional broadcast media you could not stop the > web-based writers. > > Just my 2c. > > David Alexander M.INSTIS > Global Client-Server, Communications & Infrastructure Manager > Bookham Technology plc > > DDI: 01235 837823 > Mobile: 0779 988 1284 > David.Alexander@B... > > > ======================================================================= > This e-mail is intended for the person it is addressed to only. The > information contained in it may be confidential and/or protected by > law. If you are not the intended recipient of this message, you must > not make any use of this information, or copy or show it to any > person. Please contact us immediately to tell us that you have > received this e-mail, and return the original to us. Any use, > forwarding, printing or copying of this message is strictly prohibited. > > No part of this message can be considered a request for goods or > services. > ======================================================================= > Any questions about Bookham's E-Mail service should be directed to postmaster@b.... > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 3762 From: DrPepper Date: Wed Sep 19, 2001 10:37am Subject: Re: reporting of operations against Bin Laden YEP,, , The same way Saddam watched CNN during the Gulf War, , , but it didn't do him much good. Having been in the Mountains in North Eastern Afganistan and crossing the border (if you can call it that) from there to Peshawar, Pakistan, I can tell you that it it is as easy as walking from Central Park to Harlem, and a hell of a lot safer. BTW, , , Alexander the great only got as far as Peshewar in his conquest of the near east. The only way to get to them up there is carpet bombing by B-52's. Then afterwards, go in with Delta, and make sure. What this guy, Bin Laden did was not terrorism, He is a serial killer, and should be treated like a dog with rabies. There is only one cure for that. Even though we may feel sorry for the dog, no one can feel sorry for this bastard. Ron C. ================================================= David Alexander wrote: > It seems to me that one of the main sources of information for Bin Laden and > his cronies is the world media. > > All the reporting and conjecture about 'how to take him down', complete with > - for example a diagram and article about "how special forces could assault > his cave" (UK daily Mail, Tuesday 18th Sept) must be a fascinating read for > his teams. If I were him I would be mingling with the refugees trying to get > into Pakistan by now, on the move to somewhere else. He has enough > connections/money to get across just about any border undetected. > [Non-text portions of this message have been removed] 3763 From: zack <10-33@c...> Date: Wed Sep 19, 2001 11:42pm Subject: Terrorist Organizations Terrorist Organizations http://www.fas.org/irp/world/para/index.html visit http://www.copscops.com Join the Law Enforcement community http://anexa.com/lawenforcement/index.Ihtml Washington DC Police Department http://mpdc.dc.gov/main.shtm " Our military is powerful, and it's prepared." The President of the United States George W Bush God Bless The USA 3764 From: Date: Thu Sep 20, 2001 5:03pm Subject: Bin Laden foils U.S. technology Bin Laden foils U.S. technology WASHINGTON, Sept. 20 ‚Äî Despite warnings from top government officials that terrorists would use exotic technology to communicate, suspected terrorist mastermind Osama bin Laden instead has used ‚Äúno-tech‚Äù methods, foiling efforts to track him, former U.S. intelligence officials said. BUT THERE ARE SOME lingering electronic trails by his suspected operatives being investigated by federal officials looking at how last week‚Äôs attackers used e-mail and the Internet. Intelligence agents once could keep tabs on bin Laden when he used a satellite phone that could be picked up by U.S. spy gear and matched to his voiceprint. That capability leaked to bin Laden, so he swore off talking on the phone, according to Marc Enger, former director of operations at the Air Intelligence Agency, the Air Force‚Äôs intelligence arm. ‚ÄúSo he switched a lot of communications technologies,‚Äù Enger said. ‚ÄúUnfortunately, now it is other people talking for him. In an innocuous conversation, you can‚Äôt pick that out.‚Äù Bin Laden relies on human messengers, safe houses and close-knit groups such as family members to send out his directives. ‚ÄúThis isn‚Äôt low-tech,‚Äù said Wayne Madsen, a former communications specialist for the National Security Agency. ‚ÄúYou‚Äôd have to really call it no-tech.‚Äù Investigators think some of the hijackers may not have been as wary of high-tech communications as bin Laden, whom the United States considers the prime suspect in the attacks. After the attacks last week, investigators began working with major Internet service providers like Earthlink and America Online to get information about the hijackers‚Äô Internet habits. In Britain, law enforcement agencies have asked Internet companies to keep traffic logs to look for clues to the attacks. In March 2000, the CIA has warned about terrorist organizations using secure Internet communications. CIA Director George Tenet told the Senate then that several terrorist groups, including bin Laden‚Äôs al-Qaida, ‚Äúare using computerized files, e-mail and encryption to support their operations.‚Äù ‚ÄúTerrorists also are embracing the opportunities offered by recent leaps in information technology,‚Äù Tenet said. Madsen said the hijackers could have communicated by means of seemingly innocuous messages on Web sites, impervious to the most vaunted surveillance tools in use by U.S. intelligence. ‚ÄúThere might some minor change to a Web site that would indicate a plan, because they knew it in advance. All the Carnivores and all the Echelons in the world would do very little to hamper that kind of operation,‚Äù referring to the FBI‚Äôs e-mail surveillance box and a widely suspected NSA surveillance network. Enger said some U.S. agents have reported bin Laden has used steganography ‚Äî the art of hiding a message in plain sight, such as a text message hidden in a picture file ‚Äî and pornography Web sites to communicate. Enger said those sites would be considered unlikely hiding places for a devout Muslim like bin Laden. The use of racy pictures loaded with hidden messages is extremely difficult to verify because the investigator first would have to know the message was there, Enger said. Decrypting it presents another problem. ‚ÄúUnless you have the original photo file, you can‚Äôt compare to see if they‚Äôve been changed,‚Äù Enger said. He said the United States has looked for new technology to overcome that hurdle. While the free, powerful encryption software available through the Internet presents somewhat of a hurdle, that a message is encrypted can tip off authorities. Sometimes, they also can figure out the sender and recipient of the message even if the message itself is coded. Former NSA technician Madsen said the United States battled another low-tech foe in recent years: Mohamed Farah Aidid, a Somalian warlord who was the target of U.S. forces in 1993. Madsen said that instead of phones, Aidid‚Äôs forces banged out messages on drums. ‚ÄúSpy satellites can‚Äôt pick that kind of stuff up,‚Äù Madsen said ***************************************************************** John R. Angier II M-Group P.O. Box 721388 Norman, OK 73070-8070 USA w 405.321.1015 f 405.321.1259 c 405.833.3199 e mustardcon@a... "What we're engaged in is very, very different from World War II, Korea, Vietnam, the Gulf War, Kosovo, Bosnia -- the kinds of things that people think of when they use the words 'war' or 'campaign' or 'conflict, It is very different (from) embarking on a campaign against a specific country within a specific timeframe for a specific purpose." - Defense Secretary Donald H. Rumsfeld 3765 From: Aimee Farr Date: Thu Sep 20, 2001 10:51pm Subject: MATA Several versions.... http://cryptome.org/mata.htm http://www.politechbot.com/docs/mata.draft.092001.html http://www.wartimeliberty.com/article.pl?sid=01/09/20/198219 http://vorlon.mit.edu/~declan/mata/bill-analysis/ Section 105 Seizure of Voice Mail Messages Pursuant to Warrants This section enables law enforcement personnel to seize suspected terrorists' voice mail messages pursuant to a search warrant. At present, 18 U.S.C. ß 2510(1) defines "wire communication" to include "any electronic storage of such communication." Hence, the government must apply for a Title III wiretap order before it can obtain consensually recorded voice mail messages. The section _______amends the definition of "wire communication" so that it no longer includes electronic records of prior communications________. It also amends 18 U.S.C. ß 2703 to specify that the government, by obtaining a search warrant, may gain access to "wire," as well as "electronic," communications. These changes will permit law enforcement personnel to use the more expedient search warrant process when they wish to seize voice mail messages being held by service providers for retrieval by a customer. ------ Basically, this provision codifies the Fifth Circuit's Steve Jackson Games as applied to voicemail, taking it out of Title I's strong remedies AND evidentiary exclusionary rules (or lack thereof, as the case may be). See United States v. Smith, 155 F.3d 1051 (9th Cir. 1998)(involving co-employee interception and forwarding) for the contention that voicemail interception triggers both Title I and Title II. There should be a visible cross-policy group to examine proposals which might have secondary effects contributing to espionage, or to make some proposals as we revisit the statute. BECCA do that stuff? ------ SEC. 202. DEFINITIONS RELATING TO TERRORISM. [GATHERING INFORMATION ON POTENTIAL TARGETS] (III) to gather information on potential targets for terrorist activity; ---- PS: Note the "expert advice" and "material support" provisions... Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR 5400 Bosque, Ste. 675 Waco, Texas 76710 3766 From: Marcelrf Date: Thu Sep 20, 2001 11:28pm Subject: Motorola responds to emergency with 86 truckloads of communications gear Motorola responds to emergency with 86 truckloads of communications gear By Don Bishop, Editorial Director Mobile Radio Technology magazine, Online Exclusive, Sep 19 2001 Motorola, Schaumburg, IL, has been responding to customer requests for emergency help since hijackers used domestic passenger jetliners to attack New York and Washington on Sept. 11. President George W. Bush had called the attacks an act of war and declared a national emergency. Motorolaís employees have worked around the clock to expedite shipments to support police, fire, ambulance and other emergency services in the affected areas, said Christopher B. Galvin, the companyís chairman. Chuck Jackson, vice president of system operations for Motorolaís Commercial, Government and Industrial Solutions Sector, said that the companyís crisis center in Schaumburg, IL, closed last night after seven days of activity. He said that with the restoration of air freight and other services, continuing responsibility had passed to Motorola crisis centers in the New York and Washington areas. Jackson is one of 30 members of the Chicago crisis management team who coordinated Motorolaís response during the past week. ìMotorola business and logistic teams and manufacturing facilities worldwide will remain on full alert and will continue to give priority to public safety emergency orders as needed,î Galvin said. Galvin said that as of yesterday, Motorola had delivered at least 86 truckloads of communications equipment to field teams and customers in the New York City area, Virginia and Maryland. In addition, seven planes carried Motorola equipment into the affected areas last week and over the weekend. Three communications systems were delivered last week, including separate trailer-mounted 900MHz and 800MHz radio systems in New York city, and another trailer-mounted 800 MHz system at the plane crash site in Pennsylvania. These systems are similar to those used to support communications at large sporting events. In addition, an 800MHz, 15-channel communications system was delivered to New York to provide back-up communications for the cityís Empire State Building site, which itself was a back-up for a communications system on the roof of the World Trade Center. With the primary site completely destroyed, the city wanted a back-up for the Empire State site immediately. With help from vendors and a Dayton, OH, dealer, P&R Communications, Motorola workers produced the system in 30 hours. Under normal conditions, such a system takes about three weeks to assemble. P&R supplied a trailer-mounted, 107-foot tower, antennas and grounding equipment. David Reeves, co-owner and vice president of P&R, also used his vendor contacts to expedite the preparation and shipment of a Kohler generator to Schaumburg for the system. Then Reeves, along with P&R Project Engineer Glenn Hochwalt and Systems Specialist Tim Eardly, drove the trailer to Motorolaís Glen Rock, NJ, staging area and explained how to deploy the tower. Reeves said of his companyís participation in the project, ìIt was kind of fulfilling for us that we could do something. You watch TV news about the attacks, and you get mad and upset.î Motorola has delivered 9,500 portable radios, 16,000 batteries and 3,000 chargers so far. About 120 base stations and nearly 5,000 pieces of miscellaneous accessories, such as cabling and antenna equipment, have been delivered. Motorola has also delivered 700 Iridium satellite telephones to emergency agencies in the New York City area. And the company provided 1,000 cellphones to an insurance company for its policyholders in the affected areas. Motorola has also donated 10,000 IDEN multifunction phones to various federal, state and local government agencies, plus about 88,000 batteries, chargers and other accessories. Nextel Communications, Reston, VA, provided the phone service. Galvin said that the Motorola Foundation is donating $1 million in support of relief efforts, dispersed to the New York Police, Fire & Rescue; the Federal Employee Education and Assistance Fund (World Trade Center / Pentagon Fund); General Relief Fund in New York; Abilities Inc.; and Employee Match to the One Motorola Responds Fund. ìWe all have the opportunity to redefine what it means to be heroic. We must not let terror paralyze us. Instead, we must focus our energies on collaboration and reconstruction. We need heroes and heroines of epic proportion working to strengthen the world one step at a time,î Galvin said. 3767 From: Date: Fri Sep 21, 2001 0:12am Subject: Urban Legends Reference Pages: (Faces in the Cloud) (OT?) rrevealing cloud formations above WTC? HAVE A GREAT DAY !!! ---------- http://www.snopes2.com/spoons/photos/wtcface.htm [Non-text portions of this message have been removed] 3768 From: Aimee Farr Date: Fri Sep 21, 2001 1:33am Subject: Foreign intelligence agencies rejoice. Fink-out US Executives to DOJ! Given "certain established propensities" to misuse (and create) information so as to assist with private competitive endeavors, this provision really should be limited to terrorism. There are just some things I don't want to _actively_ encourage. ------- SEC. 110. USE OF WIRETAP INFORMATION FROM FOREIGN GOVERNMENTS. (a) Chapter 119 of title 18, United States Code, Is amended by adding a new section 2514, as follows: "2514. Use of extraterritorial interceptions by foreign governments, "(1) Use of information lawfully received under United States law from the Interception of wire, oral or electronic communications outside the United States by a foreign government without the connivance or participation of any officer or employee of the United States or person acting at the direction thereof shall be admissible, and the information or derivative information therefrom May be disclosed, in any proceeding held under the authority of the United States or any state or political subdivision thereof, "(2) Information described in subsection (1) the government alleges could affect the national security shall have the same protection afforded by law to confidential informants." (b) The chapter analysis for chapter 119 of title 18, United States Code, is amended by inserting before the item relating to section 2515 the following: "2514, Use of extraterritorial interceptions by foreign governments.". -------- ~Aimee Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR 5400 Bosque, Ste. 675 Waco, Texas 76710 3769 From: James M. Atkinson Date: Fri Sep 21, 2001 9:42am Subject: Forbes.com - Watching You, Watching Me http://www.forbes.com/2001/09/19/0919securetech.html Technology Watching You, Watching Me Arik Hesseldahl, Forbes.com, 09.19.01, 6:00 PM ET In the wake of last week's terrorist attacks in New York and Washington, Americans are now vaguely aware of the fact that their lives are going to change as more stringent security measures are put in place to try to prevent further carnage. Daily life as we know it is probably going to change, not only at the airport but in the workplace and in mass transit. Get ready to be watched a lot more closely and in a lot more places than before. That means more cameras taking pictures of our faces, more scanners examining what we carry in briefcases and purses. And we may be carrying smart cards. "The acceptable level of scrutiny has just gone up a few notches," says Mike Cherkasky, president of Kroll Associates (nasdaq: KROL - news - people), a security-consulting firm in New York. When stock markets reopened Sept. 17, shares of companies in the security business were among the few that didn't fall. Biometrics companies--like Identix (amex: IDX - news - people), which specializes in fingerprint recognition technology, and Viisage (nasdaq: VISG - news - people), which makes facial-recognition products--experienced healthy jolts in their prices. Investors are expecting that big corporations and governments at all levels will be looking for new ways to keep the bad guys out--and make the good guys prove they are who they say they are before they can go anywhere sensitive. One company that's gotten a lot of attention in the last year is Viisage, the Littleton, Mass.-based business whose technology was used to snare some criminal suspects at Super Bowl XXXV in Tampa, Fla. Cameras using its technology can compare faces against a database of wanted suspects and try to pick them out of a crowd. When such cameras were used at the Super Bowl, the company found itself mired in a debate over personal privacy. "If you walk by the camera, all that is known about you as you walk by it is whether you are or aren't in the database," says Viisage chief executive officer Tom Colatosti. "I fail to see how that infringes on personal privacy." And while more cameras watch our faces, other technology will focus on our fingerprints and other biometric information. Identix, which makes hardware and software for fingerprint recognition, already counts eight of the top 20 airports in the country as its customers. The company says it's getting a flurry of new interest from airlines, governments and private companies. While the technology will be useful for controlling which airline and airport employees have access to certain sensitive areas, soon it may also be used to keep track of travelers. You might have to get used to presenting a fingerprint at the airport, says Identix vice president Grant Evans. Information about the fingerprints could be stored in a bar code printed on an airline ticket. Travelers will prove who they are at airport checkpoints when the bar-coded information is compared to their actual finger. Frequent fliers may also have fingerprint information stored on their membership cards. Several major U.S. airports have used a biometrics-based system for the past few years to move business travelers through customs more quickly. Dubbed INSPASS, the system combines a traveler's passport information with his or her hand geometry. INSPASS is currently operational at airports in Los Angeles, Miami, San Francisco and Newark, N.J., as well as at New York's John F. Kennedy Airport and Washington-Dulles International Airport. But as so many people have said since last week's tragedies occurred, technology will never replace human vigilance, which is imperfect. "You don't fix problems like this by throwing money at them," says Jim Atkinson, a security consultant and president of the Granite Island Group in Gloucester, Mass. "You have to look at the policies and procedures that are already in place and enforce them. The big weakness here wasn't technology. It was people who didn't do their jobs." -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- [Non-text portions of this message have been removed] 3770 From: Marcel Date: Fri Sep 21, 2001 9:55am Subject: Re: Forbes.com - Watching You, Watching Me Nice Jim .....Real Nice "James M. Atkinson" wrote: > http://www.forbes.com/2001/09/19/0919securetech.html > > Technology > Watching You, Watching Me > Arik Hesseldahl, Forbes.com, 09.19.01, 6:00 PM ET > > In the wake of last week's terrorist attacks in New York and > Washington, Americans are now vaguely aware of the fact that their > lives are going to change as more stringent security measures are put > in place to try to prevent further carnage. > > Daily life as we know it is probably going to change, not only at the > airport but in the workplace and in mass transit. Get ready to be > watched a lot more closely and in a lot more places than before. That > means more cameras taking pictures of our faces, more scanners > examining what we carry in briefcases and purses. And we may be > carrying smart cards. > > "The acceptable level of scrutiny has just gone up a few notches," > says Mike Cherkasky, president of Kroll Associates (nasdaq: KROL - > news - people), a security-consulting firm in New York. > > When stock markets reopened Sept. 17, shares of companies in the > security business were among the few that didn't fall. Biometrics > companies--like Identix (amex: IDX - news - people), which > specializes in fingerprint recognition technology, and Viisage > (nasdaq: VISG - news - people), which makes facial-recognition > products--experienced healthy jolts in their prices. Investors are > expecting that big corporations and governments at all levels will be > looking for new ways to keep the bad guys out--and make the good guys > prove they are who they say they are before they can go anywhere > sensitive. > > One company that's gotten a lot of attention in the last year is > Viisage, the Littleton, Mass.-based business whose technology was > used to snare some criminal suspects at Super Bowl XXXV in Tampa, > Fla. Cameras using its technology can compare faces against a > database of wanted suspects and try to pick them out of a crowd. When > such cameras were used at the Super Bowl, the company found itself > mired in a debate over personal privacy. > > "If you walk by the camera, all that is known about you as you walk > by it is whether you are or aren't in the database," says Viisage > chief executive officer Tom Colatosti. "I fail to see how that > infringes on personal privacy." > > And while more cameras watch our faces, other technology will focus > on our fingerprints and other biometric information. Identix, which > makes hardware and software for fingerprint recognition, already > counts eight of the top 20 airports in the country as its customers. > The company says it's getting a flurry of new interest from airlines, > governments and private companies. > > While the technology will be useful for controlling which airline and > airport employees have access to certain sensitive areas, soon it may > also be used to keep track of travelers. > > You might have to get used to presenting a fingerprint at the > airport, says Identix vice president Grant Evans. Information about > the fingerprints could be stored in a bar code printed on an airline > ticket. Travelers will prove who they are at airport checkpoints when > the bar-coded information is compared to their actual finger. > Frequent fliers may also have fingerprint information stored on their > membership cards. > > Several major U.S. airports have used a biometrics-based system for > the past few years to move business travelers through customs more > quickly. Dubbed INSPASS, the system combines a traveler's passport > information with his or her hand geometry. INSPASS is currently > operational at airports in Los Angeles, Miami, San Francisco and > Newark, N.J., as well as at New York's John F. Kennedy Airport and > Washington-Dulles International Airport. > > But as so many people have said since last week's tragedies occurred, > technology will never replace human vigilance, which is imperfect. > > "You don't fix problems like this by throwing money at them," says > Jim Atkinson, a security consultant and president of the Granite > Island Group in Gloucester, Mass. "You have to look at the policies > and procedures that are already in place and enforce them. The big > weakness here wasn't technology. It was people who didn't do their > jobs." > > -- > > --------------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > --------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > --------------------------------------------------------------------------- > Come, my friends, > 'Tis not too late to seek a newer world. > Push off, and sitting well in order smite > The sounding furrows; for my purpose holds > To sail beyond the sunset, and the baths > Of all the western stars, until I die. > - Tennyson, "Ulysses" > --------------------------------------------------------------------------- > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 3771 From: James M. Atkinson Date: Fri Sep 21, 2001 10:59am Subject: Re: Forbes.com - Watching You, Watching Me Since I fly though Logan al the time I am intimately familiar with their security (and lack thereof). The people running the security checkpoints at Logan are inattentive, inept, lack the motivation to do anything more then a token examination, and in a nutshell are ineffective. Logan is not alone in this as I have personally (and recently) observed similar problems in other airports. I have personally watched people walk though metal detectors that were not turned on, and seen people walk though unmanned security checkpoints. The small number of State Troopers at the airport are more concerned with parking enforcement, and bagging overtime on construction project details, and less concerned with presenting a visible presence or actually doing things of value relative to keeping the air passengers secure. The airlines don't do much better, and are far more concerned with profits then passenger or aircraft security. The cockpit doors are not solid, lack a sally port, and the flight crew commonly move around the passenger compartment for a variety of reasons. The knee-jerk reaction of banning plastic silverware knifes from flights is completely absurd when on the other hand they still permit aluminum soda cans to be brought on board. It is virtually impossible to keep edged weapons out of an airplane (if the person with the weapons is motivated). Oh, sure this will keep a 90 year grandmother from carrying her knitting on board, and that evil Swiss Army Knife the executive has in his briefcase will get stopped... but it will not stop a motivated skyjacker or terrorist from bringing an edged weapons on board. The incidents were caused by complacency... people made a choice not to do their job, companies companies decided not to keep their airplanes secure, and airports decided to award the security contracts to the lowest bidder. Those responsible with protecting the public consciously chose not to due their job. Bin Laden's minions may have been responsible to the bombings, but it was complacency that let them pull it off when people were asleep at the switch. The people and agencies responsible for security at Logan are more concerned with chasing the almighty buck, and really never cared about security (until now). -jma At 10:42 AM -0400 9/21/01, James M. Atkinson wrote: >http://www.forbes.com/2001/09/19/0919securetech.html > >Technology >Watching You, Watching Me >Arik Hesseldahl, Forbes.com, 09.19.01, 6:00 PM ET > >In the wake of last week's terrorist attacks in New York and >Washington, Americans are now vaguely aware of the fact that their >lives are going to change as more stringent security measures are put >in place to try to prevent further carnage. > >Daily life as we know it is probably going to change, not only at the >airport but in the workplace and in mass transit. Get ready to be >watched a lot more closely and in a lot more places than before. That >means more cameras taking pictures of our faces, more scanners >examining what we carry in briefcases and purses. And we may be >carrying smart cards. > >"The acceptable level of scrutiny has just gone up a few notches," >says Mike Cherkasky, president of Kroll Associates (nasdaq: KROL - >news - people), a security-consulting firm in New York. > >When stock markets reopened Sept. 17, shares of companies in the >security business were among the few that didn't fall. Biometrics >companies--like Identix (amex: IDX - news - people), which >specializes in fingerprint recognition technology, and Viisage >(nasdaq: VISG - news - people), which makes facial-recognition >products--experienced healthy jolts in their prices. Investors are >expecting that big corporations and governments at all levels will be >looking for new ways to keep the bad guys out--and make the good guys >prove they are who they say they are before they can go anywhere >sensitive. > >One company that's gotten a lot of attention in the last year is >Viisage, the Littleton, Mass.-based business whose technology was >used to snare some criminal suspects at Super Bowl XXXV in Tampa, >Fla. Cameras using its technology can compare faces against a >database of wanted suspects and try to pick them out of a crowd. When >such cameras were used at the Super Bowl, the company found itself >mired in a debate over personal privacy. > >"If you walk by the camera, all that is known about you as you walk >by it is whether you are or aren't in the database," says Viisage >chief executive officer Tom Colatosti. "I fail to see how that >infringes on personal privacy." > >And while more cameras watch our faces, other technology will focus >on our fingerprints and other biometric information. Identix, which >makes hardware and software for fingerprint recognition, already >counts eight of the top 20 airports in the country as its customers. >The company says it's getting a flurry of new interest from airlines, >governments and private companies. > >While the technology will be useful for controlling which airline and >airport employees have access to certain sensitive areas, soon it may >also be used to keep track of travelers. > >You might have to get used to presenting a fingerprint at the >airport, says Identix vice president Grant Evans. Information about >the fingerprints could be stored in a bar code printed on an airline >ticket. Travelers will prove who they are at airport checkpoints when >the bar-coded information is compared to their actual finger. >Frequent fliers may also have fingerprint information stored on their >membership cards. > >Several major U.S. airports have used a biometrics-based system for >the past few years to move business travelers through customs more >quickly. Dubbed INSPASS, the system combines a traveler's passport >information with his or her hand geometry. INSPASS is currently >operational at airports in Los Angeles, Miami, San Francisco and >Newark, N.J., as well as at New York's John F. Kennedy Airport and >Washington-Dulles International Airport. > >But as so many people have said since last week's tragedies occurred, >technology will never replace human vigilance, which is imperfect. > >"You don't fix problems like this by throwing money at them," says >Jim Atkinson, a security consultant and president of the Granite >Island Group in Gloucester, Mass. "You have to look at the policies >and procedures that are already in place and enforce them. The big >weakness here wasn't technology. It was people who didn't do their >jobs." -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3772 From: Marcel Date: Fri Sep 21, 2001 11:08am Subject: Re: Forbes.com - Watching You, Watching Me Delta Passenger Screening employees were told yesterday that Federal Marshals and Georgia Bureau of Investigation will be assuming the positions no later that Dec at Atlanta Hartsfield Airport. "James M. Atkinson" wrote: > Since I fly though Logan al the time I am intimately familiar with > their security (and lack thereof). > > The people running the security checkpoints at Logan are inattentive, > inept, lack the motivation to do anything more then a token > examination, and in a nutshell are ineffective. > > Logan is not alone in this as I have personally (and recently) > observed similar problems in other airports. I have personally > watched people walk though metal detectors that were not turned on, > and seen people walk though unmanned security checkpoints. > > The small number of State Troopers at the airport are more concerned > with parking enforcement, and bagging overtime on construction > project details, and less concerned with presenting a visible > presence or actually doing things of value relative to keeping the > air passengers secure. > > The airlines don't do much better, and are far more concerned with > profits then passenger or aircraft security. The cockpit doors are > not solid, lack a sally port, and the flight crew commonly move > around the passenger compartment for a variety of reasons. > > The knee-jerk reaction of banning plastic silverware knifes from > flights is completely absurd when on the other hand they still permit > aluminum soda cans to be brought on board. It is virtually impossible > to keep edged weapons out of an airplane (if the person with the > weapons is motivated). Oh, sure this will keep a 90 year grandmother > from carrying her knitting on board, and that evil Swiss Army Knife > the executive has in his briefcase will get stopped... but it will > not stop a motivated skyjacker or terrorist from bringing an edged > weapons on board. > > The incidents were caused by complacency... people made a choice not > to do their job, companies companies decided not to keep their > airplanes secure, and airports decided to award the security > contracts to the lowest bidder. Those responsible with protecting the > public consciously chose not to due their job. > > Bin Laden's minions may have been responsible to the bombings, but it > was complacency that let them pull it off when people were asleep at > the switch. > > The people and agencies responsible for security at Logan are more > concerned with chasing the almighty buck, and really never cared > about security (until now). > > -jma > > At 10:42 AM -0400 9/21/01, James M. Atkinson wrote: > >http://www.forbes.com/2001/09/19/0919securetech.html > > > >Technology > >Watching You, Watching Me > >Arik Hesseldahl, Forbes.com, 09.19.01, 6:00 PM ET > > > >In the wake of last week's terrorist attacks in New York and > >Washington, Americans are now vaguely aware of the fact that their > >lives are going to change as more stringent security measures are put > >in place to try to prevent further carnage. > > > >Daily life as we know it is probably going to change, not only at the > >airport but in the workplace and in mass transit. Get ready to be > >watched a lot more closely and in a lot more places than before. That > >means more cameras taking pictures of our faces, more scanners > >examining what we carry in briefcases and purses. And we may be > >carrying smart cards. > > > >"The acceptable level of scrutiny has just gone up a few notches," > >says Mike Cherkasky, president of Kroll Associates (nasdaq: KROL - > >news - people), a security-consulting firm in New York. > > > >When stock markets reopened Sept. 17, shares of companies in the > >security business were among the few that didn't fall. Biometrics > >companies--like Identix (amex: IDX - news - people), which > >specializes in fingerprint recognition technology, and Viisage > >(nasdaq: VISG - news - people), which makes facial-recognition > >products--experienced healthy jolts in their prices. Investors are > >expecting that big corporations and governments at all levels will be > >looking for new ways to keep the bad guys out--and make the good guys > >prove they are who they say they are before they can go anywhere > >sensitive. > > > >One company that's gotten a lot of attention in the last year is > >Viisage, the Littleton, Mass.-based business whose technology was > >used to snare some criminal suspects at Super Bowl XXXV in Tampa, > >Fla. Cameras using its technology can compare faces against a > >database of wanted suspects and try to pick them out of a crowd. When > >such cameras were used at the Super Bowl, the company found itself > >mired in a debate over personal privacy. > > > >"If you walk by the camera, all that is known about you as you walk > >by it is whether you are or aren't in the database," says Viisage > >chief executive officer Tom Colatosti. "I fail to see how that > >infringes on personal privacy." > > > >And while more cameras watch our faces, other technology will focus > >on our fingerprints and other biometric information. Identix, which > >makes hardware and software for fingerprint recognition, already > >counts eight of the top 20 airports in the country as its customers. > >The company says it's getting a flurry of new interest from airlines, > >governments and private companies. > > > >While the technology will be useful for controlling which airline and > >airport employees have access to certain sensitive areas, soon it may > >also be used to keep track of travelers. > > > >You might have to get used to presenting a fingerprint at the > >airport, says Identix vice president Grant Evans. Information about > >the fingerprints could be stored in a bar code printed on an airline > >ticket. Travelers will prove who they are at airport checkpoints when > >the bar-coded information is compared to their actual finger. > >Frequent fliers may also have fingerprint information stored on their > >membership cards. > > > >Several major U.S. airports have used a biometrics-based system for > >the past few years to move business travelers through customs more > >quickly. Dubbed INSPASS, the system combines a traveler's passport > >information with his or her hand geometry. INSPASS is currently > >operational at airports in Los Angeles, Miami, San Francisco and > >Newark, N.J., as well as at New York's John F. Kennedy Airport and > >Washington-Dulles International Airport. > > > >But as so many people have said since last week's tragedies occurred, > >technology will never replace human vigilance, which is imperfect. > > > >"You don't fix problems like this by throwing money at them," says > >Jim Atkinson, a security consultant and president of the Granite > >Island Group in Gloucester, Mass. "You have to look at the policies > >and procedures that are already in place and enforce them. The big > >weakness here wasn't technology. It was people who didn't do their > >jobs." > > -- > > --------------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > --------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > --------------------------------------------------------------------------- > Come, my friends, > 'Tis not too late to seek a newer world. > Push off, and sitting well in order smite > The sounding furrows; for my purpose holds > To sail beyond the sunset, and the baths > Of all the western stars, until I die. > - Tennyson, "Ulysses" > --------------------------------------------------------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 3773 From: Marcel Date: Fri Sep 21, 2001 11:28am Subject: Industry reacts to FCC on wiretap Industry reacts to FCC on wiretap September 20 11:04:00, 2001 WASHINGTON≠The Federal Communications Commission's rejection of the cellular industry's request to waive the Sept. 30 deadline packet-data wiretap deadline for all mobile phone carriers has drawn mixed reactions from service providers and equipment manufacturers. "The technical evidence in our submission to the FCC was clear: there is no commercially available solution that meets the FCC's packet mode surveillance requests. We understand what they want to accomplish and why, but as of now the commercially available systems simply don't exist," said Thomas Wheeler, president of the Cellular Telecommunications & Internet Association. While turning down CTIA's request for a blanket waiver of the Sept. 30 deadline, the FCC gave carriers an additional 60 days to come into compliance with the packet-mode wiretap requirement. The FCC is expected to rule on other wiretap capabilities that have caused friction between the FBI and mobile phone industry since the enactment of the Communications Assistance for Law Enforcement Act of 1994. The Telecommunications Industry Association, which speaks for telecom vendors, took a less hostile view of the FCC ruling. "Today's order provides the communications industry with much needed further guidance on how to proceed with implementing CALEA. We thank the Commission for taking this action," said Matthew Flanigan, president of the Telecommunications Industry Association. Wednesday's action by the FCC comes a week and a day after deadly terrorist attacks on the World Trade Center and the Pentagon. In the wake of the tragedy, the Bush administration and Congress are taking steps to expand electronic surveillance of phones and computers. The mobile phone industry and privacy advocates have challenged law enforcement efforts to broaden eavesdropping capabilities in the past. Attorney General John Ashcroft sent an anti-terrorism legislative proposal, which included proposed changes in the wiretap law, to Capitol Hill yesterday. Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) is crafting a separate anti-terrorism bill. The panel has scheduled a hearing next Tuesday to discuss both measures, with an eye toward passing legislation in the next few weeks. -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 3774 From: Aimee Farr Date: Fri Sep 21, 2001 3:11pm Subject: RE: Foreign intelligence agencies rejoice. Fink-out US Executives to DOJ! > SEC. 110. USE OF WIRETAP INFORMATION FROM FOREIGN GOVERNMENTS. Multiple offlist comments along the lines of.... But if they are "bad guys" why don't we want to catch them? -------------------------------------------------------------- An American executive in Russia.... firms are fronts, politicians are crooked, graft is business. Somebody decides they don't like US transnational corporation. They are going to snoop that American executive 24/7 in the hopes they will find something, someday. If they get caught in the cookie jar, they are just "helping the DOJ ferret out [invent evil here]." If they don't find anything, they will make something up, or use entrapment for [pick something]. A bugged meeting. Throw some price-fixing out on the table. Soften him up with a little drink, twist his words a little.... Instead of "helping DOJ," they are going to offer a deal. The executive is then in the position to cooperate -- with somebody. Either the foreign interests, or the DOJ against his own company. The executive is under pressure to produce, even if that means via "creative invention." The foreign interest now owns that executive, and possibly the American company facing a DOJ probe. Either way, somebody is writing their own checks. Even if the DOJ questions reliability, they might take a wild goose chase. Because with all this new good faith stuff and increased powers, whatever they get is going to be admissible with minimal judicial oversight. We are just in Stage 1 of mass hate. If history is an indication...Smith Act trials, Duquesne Nazi spy ring....I wouldn't be surprised to see corporate casualties. We never limit ourselves to one villain. ----- o Foreign intelligence agencies service their own agendas, which are increasingly PRIVATE. o We just handed them an exploit and cloaked it in legitimacy. This is a Letter of Marque & Reprisal -- with "we didn't have anything to do with it" written into it. Handy for Fourth Amendment analysis, but it's a cut-out with no oversight or control mechanisms. o They will lie, lure, and leverage. Give DOJ the scent for something that isn't really there. Some information will never get to DOJ, and will be used instead for "empowered" source recruitment. o Other channels are more skilled at screening for reliability, and determining what to pass along. Foreign intelligence could pull the wool over their eyes. They've done it before. ---- It seems like the Foreign Snoop provision could be "confined." ~Aimee > -----Original Message----- > From: Aimee Farr [mailto:aimee.farr@p...] > Sent: Friday, September 21, 2001 1:33 AM > To: TSCM-L Mailing List > Subject: [TSCM-L] Foreign intelligence agencies rejoice. Fink-out US > Executives to DOJ! > > > Given "certain established propensities" to misuse (and create) > information > so as to assist with private competitive endeavors, this provision really > should be limited to terrorism. There are just some things I don't want to > _actively_ encourage. > > ------- > > SEC. 110. USE OF WIRETAP INFORMATION FROM FOREIGN GOVERNMENTS. > > (a) Chapter 119 of title 18, United States Code, Is amended by > adding a new > section 2514, as follows: > > "2514. Use of extraterritorial interceptions by foreign governments, > "(1) Use of information lawfully received under United States law from the > Interception of wire, oral or electronic communications outside the United > States by a foreign government without the connivance or participation of > any officer or employee of the United States or person acting at the > direction thereof shall be admissible, and the information or derivative > information therefrom May be disclosed, in any proceeding held under the > authority of the United States or any state or political subdivision > thereof, > "(2) Information described in subsection (1) the government alleges could > affect the national security shall have the same protection > afforded by law > to confidential informants." > > (b) The chapter analysis for chapter 119 of title 18, United > States Code, is > amended by inserting before the item relating to section 2515 the > following: > "2514, Use of extraterritorial interceptions by foreign governments.". > -------- > > ~Aimee 3775 From: James M. Atkinson Date: Fri Sep 21, 2001 9:47pm Subject: Another Defense Intelligence Agency Spy Busted Pentagon Intelligence Analyst Accused of Spying for Cuba http://www.foxnews.com/story/0,2933,34884,00.html Friday, September 21, 2001 WASHINGTON - A Pentagon intelligence analyst who attended war games conducted by the U.S. Atlantic Command in 1996 was charged Friday with spying for Cuba. Ana Belen Montes, an employee of the Defense Intelligence Agency, transmitted a substantial amount of classified information to the Cuban intelligence service, an FBI affidavit alleged. Montes appeared before a U.S. magistrate in Washington and was charged with conspiracy to deliver U.S. national defense information to Cuba. She entered no plea and was ordered held without bond. Montes has worked for the DIA, the intelligence arm of the Defense Department, since 1985, authorities said. In a 17-page affidavit, the FBI alleged that the Cuban intelligence service passed messages to Montes via shortwave radio and that the DIA analyst began spying for Cuba nearly five years ago. The FBI secretly entered Montes' residence under a court order May 25 and uncovered information about several Defense Department issues, including a 1996 war games exercise conducted by the U.S. Atlantic Command, authorities said. According to the affidavit, the DIA said that Montes attended the war games exercise in Norfolk, Va., as part of her official duties at DIA. The FBI said it found information on the hard drive of her laptop computer. One partially recovered message deals with "a particular special access program related to the national defense of the United States," which is so sensitive that it could not be publicly revealed in the court documents, the document said. According to the FBI's affidavit, some of the messages suggested that Montes disclosed the upcoming arrival of a U.S. military intelligence officer in Cuba. "As a result," the FBI said, "the Cuban government was able to direct its counterintelligence resources against the U.S. officer." The FBI said Montes got a message back from her Cuban handlers stating, "We were waiting here for him with open arms." One message found on the hard drive was from her Cuban intelligence service handlers and said that she had provided "tremendously useful ... information," said the FBI. According to the FBI, another message from her Cuban contact said in regard to the 1996 war games exercise: "Practically everything that takes place there will be of intelligence value. Let's see if it deals with contingency plans and specific targets in Cuba." The DIA confirmed that Montes and a colleague were briefed on the highly sensitive program on May 15, 1997. The FBI said they had Montes under surveillance since May. It was unclear whether the Montes case was directly related to a ring in Florida convicted of spying for Cuba. However, the FBI affidavit notes repeatedly that methods of passing classified information that Montes allegedly used were the same as those used by the Miami defendants. Five Florida defendants were convicted in June, and two pleaded guilty in Miami Friday, bringing to seven the number of defendants in a spy ring that prosecutors have labeled "The Wasp Network." During their surveillance of Montes, the FBI trailed her around suburban Washington as she used a series of pay phones to make calls. The FBI said it believes that "the pay phone calls were in furtherance of Montes' espionage." The FBI said the Cuban intelligence service often communicates with clandestine agents outside Cuba by broadcasting encrypted messages at high frequencies which transmits a series of numbers. The clandestine agents monitoring the message on a shortwave radio keys in the numbers onto a computer, then uses a disk containing a decryption program to convert the numbers into text. The FBI said that is the method that Montes used to communicate. The affidavit said Montes also communicated with the Cuban intelligence service by making calls to a pager number during her pay telephone calls. The FBI agent said that "based on the evidence ... I believe probable cause exists" that Montes has been conspiring to pass secrets to Cuba since Oct. 5, 1996, the day she purchased her laptop computer. A DIA spokesman declined to comment beyond saying when Montes had gone to work for the agency. Rep. Lincoln Diaz-Balart, R-Fla, said Cuba shares intelligence information with terrorist states. "It was critically important that the spy be stopped now as the United States embarks upon a worldwide war against terrorism," he said. The DIA, based at Bolling Air Force Base in southeast Washington, D.C., provides analyses of foreign countries' military capabilities and troop strengths for Pentagon planners. It also has offices within the Pentagon. Along with the CIA, National Security Agency and the National Reconnaissance Office, the DIA is one of the main agencies of the U.S. intelligence community. The FBI affidavit said Montes worked at Bolling Air Force Base. In June, Mariano Faget, a U.S. immigration official convicted of disclosing classified information to aid Cuba, was sentenced to five years in prison. Faget, once the second-ranking immigration official in Miami, was convicted after an investigation that also lead to the expulsion of a Cuban spy. ====================== SATURDAY SEPTEMBER 22 2001 Official accused of spying for Cuba http://www.thetimes.co.uk/article/0,,3-2001330749,00.html FROM DAMIAN WHITWORTH IN WASHINGTON A SENIOR US intelligence official was arrested yesterday on charges of spying for Cuba. Ana Belen Montes, 44, an analyst at the Defence Intelligence Agency, was alleged to have supplied secrets to the Communist regime in Havana for the past five years. The FBI said that Ms Montes, who has worked at the intelligence branch of the Defence Department since 1985, had disclosed sensitive defence information intending it "to be used to the injury of the United States and to the advantage of Cuba". A criminal complaint filed in the US Federal Court in Washington said that she had used encrypted codes to communicate with Cuban intelligence agents via radio. That method was used by five people convicted in Miami earlier this year of spying for Cuba. The FBI also claimed that Ms Montes passed computer discs containing encrypted messages and used public pay phones to send classified information to pagers. ====================== American woman accused of spying for Cuba http://www.ananova.com/news/story/sm_405061.html?menu= An analyst with the Defence Intelligence Agency has been charged with conspiracy to spy for Cuba. Authorities said Ana Belen Montes was charged in an FBI complaint with conspiracy to deliver US national defence information to Cuba. She was held without bond and did not enter a plea when she appeared before a US magistrate in Washington. Montes has been employed since 1985 by the DIA, which is the intelligence arm of the Defence Department. She was in contact earlier this year with the Cuban intelligence service via shortwave radio, the FBI alleged in a 17-page affidavit filed in court. The affidavit stated that the FBI secretly entered Montes' residence under a court order May 25 and uncovered information about a number of Defence Department issues, including a 1996 war games exercise conducted by the US Atlantic Command. Montes transmitted a substantial amount of classified information to the Cuban intelligence service, the affidavit alleged. According to the affidavit, the DIA said that Montes attended the war games exercise in Norfolk, Virginia, as part of her official duties at DIA. The FBI said it found information on the hard drive of her laptop computer. One partially recovered message deals with "a particular special access program related to the national defence of the United States," which is so sensitive that it could not be publicly revealed in the court documents, the document said. The DIA, based at Bolling Air Force Base in southeast Washington, provides analyses of foreign countries' military capabilities and troop strengths for Pentagon planners. Story filed: 23:57 Friday 21st September 2001 ====================== Defense analyst accused of spying for Cuba http://www.suntimes.com/output/news/spy21.html September 21, 2001 BY PETE YOST ASSOCIATED PRESS WASHINGTON--An analyst with the Defense Intelligence Agency was charged with conspiracy to spy for Cuba, the Justice Department said Friday. Authorities said Ana Belen Montes was charged in an FBI complaint with conspiracy to deliver U.S. national defense information to Cuba. She was held without bond and did not enter a plea when she appeared before a U.S. magistrate in Washington. Montes has been employed since 1985 by the DIA, which is the intelligence arm of the Defense Department. Montes was in contact earlier this year with the Cuban intelligence service via shortwave radio, the FBI alleged in a 17-page affidavit filed in court. The affidavit stated that the FBI secretly entered Montes' residence under a court order May 25 and uncovered information about a number of Defense Department issues, including a 1996 war games exercise conducted by the U.S. Atlantic Command. Montes transmitted a substantial amount of classified information to the Cuban intelligence service, the affidavit alleged. According to the affidavit, the DIA said that Montes attended the war games exercise in Norfolk, Va., as part of her official duties at DIA. The FBI said it found information on the hard drive of her laptop computer. One partially recovered message deals with "a particular special access program related to the national defense of the United States," which is so sensitive that it could not be publicly revealed in the court documents, the document said. The DIA confirmed that Montes and a colleague were briefed on the highly sensitive program on May 15, 1997. The FBI said they had Montes under surveillance since May. A DIA spokesman declined to comment beyond saying when Montes had gone to work for the agency. The DIA, based at Bolling Air Force Base in southeast Washington, D.C., provides analyses of foreign countries' military capabilities and troop strengths for Pentagon planners. It also has offices within the Pentagon. Along with the CIA, National Security Agency and the National Reconnaissance Office, the DIA is one of the main agencies of the U.S. intelligence community. The spokesman declined to say whether Montes worked at the Pentagon or at Bolling Air Force Base. Last June, Mariano Faget, a U.S. immigration official convicted of disclosing classified information to aid Cuba, was sentenced to five years in prison. Faget, once the second-ranking immigration official in Miami, was convicted after an investigation that also lead to the expulsion of a Cuban spy. Copyright 2001 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed. ====================== DJ US Defense/Spy/Cuba -3: Under Surveillance Since May http://news.ino.com/intraday/?storyid=DJN616595601 (MORE) Dow Jones Newswires 21-09-01 2156GMT Long-Time Employee WASHINGTON (AP)--An analyst with the U.S. Defense Intelligence Agency was charged with conspiracy to spy for Cuba, the Justice Department said Friday. Authorities said Ana Belen Montes was charged in a complaint from the Federal Bureau of Investigation with conspiracy to deliver U.S. national defense information to Cuba. She was held without bond and didn't enter a plea when she appeared before a U.S. magistrate in Washington. Montes has been employed since 1985 by the DIA, which is the intelligence arm of the Defense Department. (END) Dow Jones Newswires 21-09-01 2206GMT Under Surveillance Since May In a 17-page affidavit, the FBI alleged that earlier this year Montes contacted the Cuban intelligence service via shortwave radio. The FBI secretly entered Montes' residence under a court order May 25 and uncovered information about a number of Defense Department issues, including a 1996 war games exercise conducted by the U.S. Atlantic Command. According to the affidavit, the DIA said that Montes attended the war games exercise in Norfolk, Va., as part of her official duties at DIA. The FBI said it found information on the hard drive of her laptop computer. One partially recovered message deals with "a particular special access program related to the national defense of the United States," which is so sensitive that it couldn't be publicly revealed in the court documents, the document said. The DIA confirmed that Montes and a colleague were briefed on the highly sensitive program on May 15, 1997. The FBI said they had Montes under surveillance since May. A DIA spokesman declined to comment beyond saying when Montes had gone to work for the agency. The DIA, based at Bolling Air Force Base in southeast Washington, D.C., provides analyses of foreign countries' military capabilities and troop strengths for Pentagon planners. It also has offices within the Pentagon. Along with the CIA, National Security Agency and the National Reconnaissance Office, the DIA is one of the main agencies of the U.S. intelligence community. The spokesman declined to say whether Montes worked at the Pentagon or at Bolling Air Force Base. (END) Dow Jones Newswires 21-09-01 2239GMT ====================== Last update: Friday, 21-Sep-01 16:16:18. Defense Analyst Arrested in Cuba Spy Case http://www.pittsburghfirst.com/rc/news/docs/10121881.htm http://www.abcnews.go.com/sections/us/DailyNews/spyarrest010921_wire.html WASHINGTON (Reuters) - A Defense Department intelligence analyst was arrested on Friday on charges of conspiring to deliver U.S. national defense information to Cuba, the FBI and Justice Department said. FBI agents arrested Ana Belen Montes, 44, an employee of the Defense Intelligence Agency, Friday morning without incident at the agency's headquarters at Bolling Air Force Base in Washington, D.C., they said. She has been employed by the Defense Intelligence Agency as an analyst since 1985, they said. The FBI said it also has obtained search warrants for her residence in Washington, D.C., for her car, her office and her safe-deposit box at a local bank. Copyright C 2001 Reuters Limited. -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3776 From: Date: Sat Sep 22, 2001 0:19pm Subject: *READ: THE SUN-tzu: "Art of War" http://www.ccs.neu.edu/home/thigpen/html/art_of_war.html This classic text on strategy was first published in 1910 (translated)- I believe it is actually 400 years older. For more sites re this "must read" entire dogpile.com or copernic.com search engines-- "THE SUN-tzu Art of War" Bill Schneid, Ph.D. Criminologist Director of Special Operations GLOBAL PROJECTS, LTD. Investigative Research Analysts "tempus omnia revelat" Marina del Rey, California 310.314.8760 Facsimile 310.392.0797 http://globalprojectsltd.com PI15860 3777 From: gkeenan Date: Sat Sep 22, 2001 8:44pm Subject: Re: *READ: THE SUN-tzu: "Art of War" Sun Tzu: "TheArt of War" Chinese scholars, as well as western scholars, believe that the 'Art of War' was written by Sun Tzu between 400-320 BC for various reasons. In the Art of War, no mention is made of cavalry because cavalry did not become an integral part of any Chinese army until around 320BC. Also, large, effectively organized, well trained armies commanded by professional generals were unheard of in China prior to 500 BC. Other studies have narrowed the period of Sun Tzu by another 100 years. This brings us about as close as anyone has been able to get to his actual birth/lifetime -- 400 to 320 BC. "The Art of War" is (in my opinion) still THE masterpiece of military thinking and organization. Sun Tzu also writes about secret covert operations, massive military maneuvers on the battlefield, and many other things that are part and parcel of all military operations to this day. He was also ahead of his time (and ours) in many respects. One of the things he writes about in his manuscript is also relevant today (as many other passages are) concerns the waging of war. 'The best policy is "to attack the enemy's plans'; the next bests to disrupt his alliances, for 'to subdue the enemy's army without fighting is the acme of skill'. It's pretty widely accepted that his preception was that war is the ultimate instrument of statecraft. I've long studied military history (I'm also retired USN and most of my family has served since WWII -- mostly Navy, but a couple of misguided souls actually were in the Army, and I have a nephew in Colorado who is enlisting in the AF -- not to mention other members of my extended family; two former brothers-in-law (from my first marriage) who served in Britain's Royal Air Force, and a couple of nephews currently serving in the RAF,. and a cousin in the USAF). My copy of Sun Tzu was published by Oxford University Press in 1963. The first western translation was an interpretation by a Jesuit missionary to Peking, Fr. J. J. M. Amiot, which was published in Paris in 1772. But Bill is quite correct in that the first English translation of any worth, by Lionel Giles, was published in 1910, but there have been several subsequent translations and publications of this work since -- I believe one of the last of these was in 1956; but I can't remember by whom off the top of my head. I'd have to dig a wee bit for that. Just thought I'd throw in my $0.02 worth -- if it's worth that much! Or, as Sean Connery said in "The Untouchables" -- "Here endeth the first lesson." (hehe). Take Care! Jerry Keenan GPKeenan Co., Int'l Security Services West Islip, NY ----- Original Message ----- From: To: Sent: Saturday, September 22, 2001 5:19 PM Subject: [TSCM-L] *READ: THE SUN-tzu: "Art of War" > http://www.ccs.neu.edu/home/thigpen/html/art_of_war.html > > This classic text on strategy was first published in 1910 (translated)- I > believe it is actually 400 years older. > > For more sites re this "must read" entire dogpile.com or copernic.com search > engines-- > "THE SUN-tzu Art of War" > > Bill Schneid, Ph.D. > Criminologist > Director of Special Operations > GLOBAL PROJECTS, LTD. > Investigative Research Analysts > "tempus omnia revelat" > Marina del Rey, California > 310.314.8760 > Facsimile 310.392.0797 > http://globalprojectsltd.com > PI15860 > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 3778 From: Aimee Farr Date: Sun Sep 23, 2001 0:05pm Subject: The Secret Art Of War The Art Of War (Sunzi Bingfa) is part of Wu Jing Qi Shu -- The Seven Books Of War. The Thirty-Six Strategems: The Secret Art Of War. [link to explanations at bottom] Stratagems when in a superior position 1. Fool The Emperor To Cross The Sea. 2. Besiege Wei To Rescue Zhao. 3. Kill With A Borrowed Sword. 4. Await The Exhausted Enemy At Your Ease. 5. Loot A Burning House. 6. Clamour In The East, Attack In The West. Stratagems for confrontation 7. Create Something From Nothing. 8. Openly Repair The Walkway, Secretly March To Chancan. 9. Observe The Fire On The Opposite Shore. 10. Hide The Dagger Behind A Smile. 11. Let The Plum Tree Wither In Place Of The Peach. 12. Seize The Opportunity To Lead The Sheep Away. Stratagems for attack 13. Beat The Grass To Startle The Snake. 14. Borrow A Corpse To Raise The Spirit. 15. Lure The Tiger Down The Mountain. 16. To Catch Something, First Let It Go. 17. Toss Out A Brick To Attract Jade. 18. To Catch The Bandit First Capture Their Leader. Stratagems for confused situations 19. Steal The Firewood From Under The Pot. 20. Trouble The Water To Catch The Fish. 21. Shed Your Skin Like The Golden Cicada. 22. Shut The Door To Catch The Thief. 23. Befriend A Distant Enemy To Attack One Nearby. 24. Borrow The Road To Conquer Guo. Stratagems for gaining ground 25. Replace The Beams With Rotten Timbers. 26. Point At The Mulberry, But Curse The Locust Tree. 27. Feign Madness, But Keep Your Balance. 28. Lure Your Enemy Onto The Roof, Then Take Away The Ladder. 29. Deck The Dead Tree With Silk Blossoms. 30. Exchange The Role Of Guest For That Of Host. Stratagems for desperate situations 31. The Strategy Of Beautiful Women. 32. The Strategy Of Open City Gates. 33. The Strategy Of Sowing Discord. 34. The Strategy Of Injuring Yourself. 35. The Strategy Of Combining Tactics. 36. If All Else Fails Retreat. After that baiting (if you haven't read the 36), surely you will check out the explanations here: http://www.chinastrategies.com/table.htm A "comical comparison" of natural strategic styles.... "EAST" Strategy by design. "WEST" Strategy by instinct. ~Aimee Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR 5400 Bosque, Ste. 675 Waco, Texas 76710 3779 From: Dawn Star Date: Sun Sep 23, 2001 1:35pm Subject: Airline Security >Airlines fought security changes >Despite warnings, companies wanted to avoid delays > >http://www.boston.com/dailyglobe2/263/nation/Airlines_fought_security_changes+.shtml 3780 From: Agent Lovato Date: Sun Sep 23, 2001 6:35pm Subject: Re: The Secret Art Of War

To considering WAR to be artful is the same as considering murder to be tasteful.  If you like eastern philosophy, why not practice one of the true forms?   They are as many as there are forms of martial arts but all have a similar theme.  Respect.  War is afterall not about any philosophies so grand as Art or Zen even.  War absolutely, positively boils down to economics.  All of you, know this.  Until growth as a function of economics is remedied or eliminated, we will continue to see WAR no matter how, "secret",  and Artful the philosophy.

  Aimee Farr <aimee.farr@p...> wrote:

The Art Of War (Sunzi Bingfa) is part of Wu Jing Qi Shu -- The Seven Books
Of War.

The Thirty-Six Strategems: The Secret Art Of War. [link to explanations at
bottom]

Stratagems when in a superior position
1. Fool The Emperor To Cross The Sea.
2. Besiege Wei To Rescue Zhao.
3. Kill With A Borrowed Sword.
4. Await The Exhausted Enemy At Your Ease.
5. Loot A Burning House.
6. Clamour In The East, Attack In The West.

Stratagems for confrontation
7. Create Something From Nothing.
8. Openly Repair The Walkway, Secretly March To Chancan.
9. Observe The Fire On The Opposite Shore.
10. Hide The Dagger Behind A Smile.
11. Let The Plum Tree Wither In Place Of The Peach.
12. Seize The Opportunity To Lead The Sheep Away.

Stratagems for attack
13. Beat The Grass To Startle The Snake.
14. Borrow A Corpse To Raise The Spirit.
15. Lure The Tiger Down The Mountain.
16. To Catch Something, First Let It Go.
17. Toss Out A Brick To Attract Jade.
18. To Catch The Bandit First Capture Their Leader.

Stratagems for confused situations
19. Steal The Firewood From Under The Pot.
20. Trouble The Water To Catch The Fish.
21. Shed Your Skin Like The Golden Cicada.
22. Shut The Door To Catch The Thief.
23. Befriend A Distant Enemy To Attack One Nearby.
24. Borrow The Road To Conquer Guo.

Stratagems for gaining ground
25. Replace The Beams With Rotten Timbers.
26. Point At The Mulberry, But Curse The Locust Tree.
27. Feign Madness, But Keep Your Balance.
28. Lure Your Enemy Onto The Roof, Then Take Away The Ladder.
29. Deck The Dead Tree With Silk Blossoms.
30. Exchange The Role Of Guest For That Of Host.

Stratagems for desperate situations
31. The Strategy Of Beautiful Women.
32. The Strategy Of Open City Gates.
33. The Strategy Of Sowing Discord.
34. The Strategy Of Injuring Yourself.
35. The Strategy Of Combining Tactics.
36. If All Else Fails Retreat.

After that baiting (if you haven't read the 36), surely you will check out
the explanations here:
http://www.chinastrategies.com/table.htm


A "comical comparison" of natural strategic styles....

"EAST" <http://www.chinabooks.com.au/PAGES/philosophy/strategy2.htm>
Strategy by design.

"WEST"
<http://www.amazon.com/exec/obidos/ASIN/0823050211/qid=1001262844/sr=2-1/ref
=sr_2_7_1/002-5308406-8508824> Strategy by instinct.


~Aimee
Aimee Farr
mailto:aimfarr@p...
LAW OFFICE OF AIMEE FARR
5400 Bosque, Ste. 675
Waco, Texas 76710


Yahoo! Groups Sponsor
ADVERTISEMENT
Start here...

Height:
ft     in

Weight:
lbs. kg.



========================================================
         TSCM-L Technical Security Mailing List
    "In a multitude of counselors there is strength"

     To subscribe to the TSCM-L mailing list visit:
         http://www.yahoogroups.com/community/TSCM-L

     or email your subscription request to:
           subTSCM-L@t...
=================================================== TSKS


Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service.
__________________________________________________ Do You Yahoo!? Get email alerts & NEW webcam video instant messaging with Yahoo! Messenger. http://im.yahoo.com 3781 From: Aimee Farr Date: Mon Sep 24, 2001 0:36am Subject: (offtopic) brief philosophical interlude....WAR AS ART. [What does this have to do with TSCM? Sun Tzu is on Atkinson's web site.] "AGENT LOVATO" wrote: > To considering WAR to be artful is the same as considering > murder to be tasteful. I hear it's acquired, like Scotch. So, in your mind, murder can't ever be "artful," then? Opinions differ: ..."That minds accomplish in one act something that we in music can't dream of, that people rehearse like mad for 10 years - totally fanatically - for a concert and then die - that's the greatest work of art there is in the entire cosmos," he said Sunday. @ http://www.nandotimes.com/entertainment/story/85114p-1143791c.html "Art" is a construct -- it is not a verifiable FACT. It is senseless to argue over such things. The two of us will never achieve identity of reference. The question "cannot be put at all, so it cannot be answered...." http://www.kfs.org/~jonathan/witt/tlph.html (Ludwig Wittgenstein, Tractatus Logico-Philosophicus.) I say, "War is Art." You say, "War is not artful." While we are speaking the same word, we are both envisioning totally different concepts. Other languages are more detailed than English. In some cultures there are many, many words for rain, all loaded with a different meaning. This is why native translation skills are so important in conflict, and why you see much discussion on the varying translations of The Art Of War. Such subtleties convey lodestars of meaning. Our language is not as precise as other languages -- demonstrated by the fact they continue to add to their language associations throughout their lives. Words presuppose thought. The more concepts you can associate, the higher levels of conceptualization you can achieve. Sadly, American language becomes increasingly imprecise....and in some connotations there is no American equivalent for a foreign concept -- not only do we lack "a" word for it, we sometimes lack THE WORD_S_ for it. > War is afterall > not about any philosophies so grand as Art or Zen even. War > absolutely, positively boils > down to economics. It's Sunzi Bingfa. The Art Of War is an Americanized term. Bing = "soldier method." (warfare) Fa = "method" or "law." A more apt name would be "The Principles and Tactics Of War." I suppose the easiest way to explain the connotation is to say that to some, what is skillful -- is artful -- i.e., "the divine manipulation of the threads." "Philosophy" --- the love of wisdom. The truth of things. It is not of a "higher or refined purpose," outside the search for truth. (In philosophical terms, ART is complete nonsense, BTW.) The Bingfa is guidance for thinking about certain truths of conflict. The Wisdom of War, then, although war is not often thought of as "wise." (Many would also sense a concept-conflict in that association.) "All warfare is based on deception," -- a reference to conduct and strategy, not economics, not ethics, nor aesthetics. I don't dispute your assertion that war is often based in economics/resource-conflicts, and that economics plays a role in strategy and policy-play. I would point out, however, that The Art Of War *is* a mainstream economic text. I don't think we have a disagreement in concepts, only words and their meanings rooted in the abstract. This is the root of much ideological conflict, and the fount of propaganda. The most extreme of language philosophers say that if our language was precise -- there would be no ideological conflict, because you can't argue over verifiable facts. Religious extremism lends itself to irreconcilable conflict because the concepts defy verification. (To some philosophers, this is seen as a problem of language, and not of religion.) ~Aimee Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR 5400 Bosque, Ste. 675 Waco, Texas 76710 From: Miguel Puchol Date: Tue Sep 19, 2000 1:48pm Subject: RE: Re: Icom R3 Steve Would be the first time Icom listens to us little people... > My guess is they are trying to find an elegant way to slope > tune FM video at 2.4. They probably had not considered > anything except broadcast video (AM) originally. But then > someone asked about the 2.4 toys and they had to backpedal > some. All the best, Mike 1503 From: Marty Kaiser Date: Tue Sep 19, 2000 5:21am Subject: Re: Digest Number 376 Hi I recently updated the instruction page on the Raster Analysis System. Check it out at http://www.martykaiser.com/ras515a.htm Marty 1504 From: Date: Tue Sep 19, 2000 9:25am Subject: Re: FYI - The other side of the investigation Greg Horton: Thank you for posting the statement by Director Freeh that seems to me to clearly describe the case basics. In spite of all the criticism of various federal agencies involved in this case - - the fact remains that illegal act/acts took place and there was a guilty plea. I know it is often popular to criticise the federal government for actions and perceived excessive actions but we would be in pretty sorry shape as a country if a lot of effort wasn't put into protecting nuclear weapons classified information. 1505 From: Steve Uhrig Date: Tue Sep 19, 2000 2:33pm Subject: Sniffing 2.4 gig video boxes In response to several requests, copied below is a message I sent to someone recently discussing my experience with sweeping for the low cost 2.4 gig video and audio transmitters: Hope this is of service to someone. For a few hundred dollars you can build the receiver and a video monitor package. Use the best 2.4 antenna you can with as short a length of feedline as you can get away with, in all cases less than a foot. I mounted a 6dBm patch antenna to a pingpong paddle, as a convenient way to paint the walls and ceiling when sweeping. A larger patch antenna is good, keeping in mind the pattern of the thing. Use audio too, into a speaker, as there are audio-only bugs built from the video transmitters. ********************************************* Regarding 2.4 gig surveillance equipment: 99% of this 2.4 gig wireless video garbage is made from converted Wavecom modules, sometimes with the pads bypassed to give 20-50 mw RF out. The Wavecom TX are on 4 distinct transmit channels. The Wavecom RX are the same 4 channels, but the front ends and I.F. filtering on the receivers is so crappy that the receivers will hear one and usually two adjacent channels fine. Due to the fact that the Wavecom units power up on channel 1, chances are excellent any surveillance or monitoring will be on channel 1. They are 4 channel devices where you can select channels 2-3-4 by a stepper switch, but on power up they revert to channel 1 unless some mods have been done to change this feature (unlikely but possible). The best and cheapest sweep goodie for 2.4 gig wireless video is a Wavecom (or same thing with another name on the label) receiver module with batt pack and small batt operated video monitor. Use original patch antenna and move around area being inspected. Take a $3 hardware store bimetal lamp flasher, turn out all lights in the target area, and plug one lamp into the flasher. You easily will see on the Wavetek receiver/monitor the pattern of the flashing light if there is an "open camera" anywhere in the vicinity. Once you see something, kill the flashing lamp and shine a penlight around till you hit the camera. Start with channel 1 on the Wavecom RX and advance through its 4 channels doing a separate sweep on each channel. You may not see a clear picture depending on many factors, but you will see the light flashing, and that is a giveaway to inspect further. Almost child's play and in testing we have been able to identify a signal at the fringe of the coverage area. This test setup is more sensitive than the stock Wavecom (because of the gain antenna you are pointing manually) so you will be able to sniff from further away than the listening post likely would be. If the above does not reveal anything, it is extremely unlikely there is any 2.4 activity in the vicinity. Remember range of FCC stuff on 2.4 is like 300 feet MAX and probably less. Even bumping up the power does not increase range that much. For indoor applications of 2.4 gigs, the listening post almost always will be no further away than through one or two interior walls. A way to test the Wavecom receiver setup is to heat a cup of water in a microwave. Depending on leakage from the microwave, you should see hash in the Wavecom image for up to several rooms away. Remember the 2.4 gig video stuff is on the precise frequency as a microwave oven. There also is some crappy audio-only packages made around the Wavecom models. The Wavecom receiver will still hear them but of course you go for audio feedback instead of watching for the flashing lamp on the video. Virtually all the Wavecom-type devices are the same manufacture and freqs regardless of packaging, so you can buy the cheapest one from a catalog anywhere and have good results. Be sure to get the crummy Wavecom receiver though, not a better receiver of another brand. You want the high sensitivity (inexpensive to create) and the poor selectivity which goes along with the crummy receiver. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1506 From: James M. Atkinson, Comm-Eng Date: Tue Sep 19, 2000 5:24pm Subject: Re: Sniffing 2.4 gig video boxes Steve, Great post, I thank you, and the list thanks you. At 3:33 PM -0400 9/19/00, Steve Uhrig wrote: > >In response to several requests, copied below is a message >I sent to someone recently discussing my experience with >sweeping for the low cost 2.4 gig video and audio >transmitters: > >Hope this is of service to someone. For a few hundred >dollars you can build the receiver and a video monitor >package. Use the best 2.4 antenna you can with as short a >length of feedline as you can get away with, in all cases >less than a foot. I mounted a 6dBm patch antenna to a >pingpong paddle, as a convenient way to paint the walls and >ceiling when sweeping. A larger patch antenna is good, >keeping in mind the pattern of the thing. Use audio too, >into a speaker, as there are audio-only bugs built from the >video transmitters. I have had good luck just using a "1 inch paperclip" (almost 0 dB) for use as an omni directional, and a small spiral log periodic (about 8-9 dB) on a pistol grip for a directional antenna. I tried various patch antenna but had trouble with the pattern. Also, I found that using a parabolic dish provided too much gain for use inside the facility, but was great for work outside. I have also tried some things with octave horns (16 + dB), but was not impressed with the results .vs. cost. > > >********************************************* > >Regarding 2.4 gig surveillance equipment: > >99% of this 2.4 gig wireless video garbage is made from >converted Wavecom modules, sometimes with the pads bypassed >to give 20-50 mw RF out. > >The Wavecom TX are on 4 distinct transmit channels. > >The Wavecom RX are the same 4 channels, but the front ends >and I.F. filtering on the receivers is so crappy that the >receivers will hear one and usually two adjacent channels >fine. It's more a problem of the channels overlapping. The Wavecom and similar units I evaluated actually had fairly righteous IF filtering. >Due to the fact that the Wavecom units power up on channel >1, chances are excellent any surveillance or monitoring >will be on channel 1. They are 4 channel devices where you >can select channels 2-3-4 by a stepper switch, but on power >up they revert to channel 1 unless some mods have been done >to change this feature (unlikely but possible). The older Wavcom units (the 1995 design) had a momentary switch that would step the voltages... with the new ones it is a 4 position slide switch. >The best and cheapest sweep goodie for 2.4 gig wireless >video is a Wavecom (or same thing with another name on the >label) receiver module with batt pack and small batt >operated video monitor. Use original patch antenna and move >around area being inspected. I strongly agree, but recently obtained one of the Clover units that integrate all of that into a small handheld box (and it scans by itself). >Take a $3 hardware store bimetal lamp flasher, turn out all >lights in the target area, and plug one lamp into the >flasher. You easily will see on the Wavetek >receiver/monitor the pattern of the flashing light if there >is an "open camera" anywhere in the vicinity. Once you see >something, kill the flashing lamp and shine a penlight >around till you hit the camera. Start with channel 1 on the >Wavecom RX and advance through its 4 channels doing a >separate sweep on each channel. > >You may not see a clear picture depending on many factors, >but you will see the light flashing, and that is a giveaway >to inspect further. > >Almost child's play and in testing we have been able to >identify a signal at the fringe of the coverage area. This >test setup is more sensitive than the stock Wavecom >(because of the gain antenna you are pointing manually) so >you will be able to sniff from further away than the >listening post likely would be. > >If the above does not reveal anything, it is extremely >unlikely there is any 2.4 activity in the vicinity. >Remember range of FCC stuff on 2.4 is like 300 feet MAX and >probably less. Even bumping up the power does not increase >range that much. For indoor applications of 2.4 gigs, the >listening post almost always will be no further away than >through one or two interior walls. My experience is that if the pad is intact the unit will have a range of 50-75 ft max (indoors), and 150-200 feet of so outdoors (line of sight). Now if someone bypasses the pad resistor and/or increases the voltages on the PA you can bump well over 100 mW and get some pretty decent range (but the transmitter becomes easy to find). >A way to test the Wavecom receiver setup is to heat a cup >of water in a microwave. Depending on leakage from the >microwave, you should see hash in the Wavecom image for up >to several rooms away. Remember the 2.4 gig video stuff is >on the precise frequency as a microwave oven. You will get a "rolling screen", and bands rising on the display as the impeller/deflector blade in the microwave turns. Microwave ovens run at 2.450 GHz... The Wavecoms run from 2.411 to 2.48 and effectively straddle the microwave oven channel. >There also is some crappy audio-only packages made around >the Wavecom models. The Wavecom receiver will still hear >them but of course you go for audio feedback instead of >watching for the flashing lamp on the video. Wavecom actually sells (outside the US) several voice only 2-2.5 GHz subcarrier modulated devices. >Virtually all the Wavecom-type devices are the same >manufacture and freqs regardless of packaging, so you can >buy the cheapest one from a catalog anywhere and have good >results. Be sure to get the crummy Wavecom receiver though, >not a better receiver of another brand. You want the high >sensitivity (inexpensive to create) and the poor >selectivity which goes along with the crummy receiver. > >Steve The Wavecom stuff is strictly consumer grade toys, but every spyshop with a hot melt glue gun have been cramming these things into concealments and calling themselves as a "manufacturer. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1507 From: Dawn Star Date: Wed Sep 20, 2000 0:08am Subject: Tap to Bug ratio "But the threats are far more likely to be on the phone system or lines. There, it's not glamourous. You don't wear a necktie. You wear old grubbies and slither through crawl spaces and rat infested basements and areas God never intended for people to go." Steve Uhrig Well said. This is the real world of front line sweeping, not an esoteric electronic theory, not a specification text book quote, it is up close, your nose down in the wires! Roger Tolces, Electronic Security, Los Angeles [Non-text portions of this message have been removed] 1508 From: A Grudko Date: Wed Sep 20, 2000 7:41am Subject: Re: Re: Icom R3 ----- Original Message ----- > > It is a 20-25 MHz signal that is tunable within a 50 MHz window, so it's pretty much a case of "fishing with dynamite". But we must also keep in mind that the Wavecoms can be easily re-tuned (tweak a pot) to operate between 1.43 to 2.53 GHz. I think I'll take up an easier profession, such as un-anaesthesiaised brain surgery carried out on a roller coaster! Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), SAIS, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1509 From: A Grudko Date: Wed Sep 20, 2000 8:38am Subject: Re: Re: "Tap to Bug ratio" ----- Original Message ----- > Extremely dangerous to the "enemy," using my Radio Shack 64-1950. as we don't have Radio Shack in this country, what is a 64-1950? Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), SAIS, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1510 From: A Grudko Date: Wed Sep 20, 2000 8:36am Subject: "Tap to Bug ratio" Common terms: I think that to the public, 'Bugged' simply means that someone is covertly intercepting a communication. To them, 'Tapped' only refers to phones. My understanding is that; 'TAP' is the physical (including inductive) attachment to an existing cable which by design carries signal/data, for the purpose of covert interception. "Bug" is the covert electronic interception of a conversation/data using some kind of introduced radiated transmission. "Intercept" (a term not yet used in this debate but of equal interest) is to gather audio/video/data which is deliberatly radiated but not meant for the interceptor (pager, cellular phone, cordless phone, 2-way radio, radio trunking, mains-modulation, baby-monitors, wireless intercoms etc) Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), SAIS, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1511 From: A Grudko Date: Wed Sep 20, 2000 8:18am Subject: Re: Re: "Tap to Bug ratio" Quote> > I still think that a good flashlight is the most important tool you can have, and that the human eyeballs are the most valuable instrument. > -jma Dear Abbey I recently had one of my staff conceal a 2.4 Ghz based spread spectrum 100Mw audio device on a Duracell pp9 in a cake which we sent into a fanatic's compound. After an hour we lost signal. Do you think my staff don't love me or do you think the Duracell bunny converted to the fanatics? J Reno A $10 dentist's mirror will find a bug with a flat battery which a $ 10 000 SA will miss. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), SAIS, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1512 From: andre holmes <1ach@g...> Date: Wed Sep 20, 2000 9:22am Subject: Re: Re: "Tap to Bug ratio" ANDY its a flat head and Phillips screwdriver not rated for electrical work. ----- Original Message ----- From: "A Grudko" To: Sent: Wednesday, September 20, 2000 9:38 AM Subject: Re: [TSCM-L] Re: "Tap to Bug ratio" > > ----- Original Message ----- > > Extremely dangerous to the "enemy," using my Radio Shack 64-1950. > > as we don't have Radio Shack in this country, what is a 64-1950? > > Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime > investigation & intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 > 11) 465 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > Chairman), SAIS, > UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done > right - first time" > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1513 From: Date: Wed Sep 20, 2000 6:17am Subject: Re: Re: "Tap to Bug ratio" In a message dated 9/20/00 7:17:18 AM Pacific Daylight Time, agrudko@i... writes: << as we don't have Radio Shack in this country, what is a 64-1950? >> Page 204 Radio Shack Catalog Reversible Driver Does the job of two screwdrivers. Has a 3/16 slot type on one end and a #1 Phillips on the other. Durable, easy grip INSULATED handle. Snap in blades. #64-1950 $2.79 US 1514 From: Date: Wed Sep 20, 2000 6:19am Subject: Re: Re: "Tap to Bug ratio" In a message dated 9/20/00 7:43:16 AM Pacific Daylight Time, 1ach@g... writes: << ANDY its a flat head and Phillips screwdriver not rated for electrical work. >> Not rated by who for electrical work? 1515 From: James M. Atkinson, Comm-Eng Date: Wed Sep 20, 2000 0:16pm Subject: Combining Earth, Fire, and Water [Tongue in Cheek] Heck, everybody knows that all you really need from Radio Shack for TSCM is: 1 ea 22-802 Digital Voltmeter (a cheap analog VOM may also work) 1 ea 20-006Antenna (a coat hanger also works) 1 ea 276-1123Bag of Diodes (to detect signals, some gallium is also good) 1 ea 61-2625Flashlight (you can hold between your teeth) If you want to make your "bug detector" more sophisticated, and more sensitive (so you can make the big bucks) add the following: 1 ea 271-312 Resistor Assortment (for biassing network) 1 ea 276-16042N3906 PNP Small Signal Transistors 1 ea 23-5539 volt 1604 type battery (use should be obvious) Strangely enough the above equipment will actually detect bugs, and will often offer better results then most spyshop bug detectors costing thousands of dollars. Seriously folks, a diode, a coat hanger, and a flashlight in the hands of a skilled TSCM'er will actually be more effective then a "Walter Mitty wanna-be" with a quarter million dollars in gear. Of course if you give a skilled TSCM'er a quarter million in equipment he can find virtually any kind of technical mischief... the symphony is in the skill of the musicians, not in the value of the instrument (owning a Stradivarius doe not make you Yo Yo Ma). -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1516 From: Steve Uhrig Date: Wed Sep 20, 2000 0:31pm Subject: Wavecoms for video sniffing > But we must also keep in mind that the Wavecoms can be > easily re-tuned (tweak a pot) to operate between 1.43 to > 2.53 GHz. Not true. Frequency is burned into a PROM. Certain people have disassembled the PROM and offer rewritten ones with user-specified frequencies. These primarily are for amateur use, to keep all 4 channels within the amateur (ham radio) allocation at S band. Even so, the things don't want to wander much away from their design frequency. You can move the transmitter a few hundred megs, but performance drops off. Reworking the thing to get decent performance outside the band it was designed for is beyond the realm of most. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1517 From: James M. Atkinson, Comm-Eng Date: Wed Sep 20, 2000 3:39pm Subject: Re: Wavecoms for video sniffing At 1:31 PM -0400 9/20/00, Steve Uhrig wrote: > > > But we must also keep in mind that the Wavecoms can be > > easily re-tuned (tweak a pot) to operate between 1.43 to > > 2.53 GHz. > >Not true. Frequency is burned into a PROM. > >Certain people have disassembled the PROM and offer >rewritten ones with user-specified frequencies. These >primarily are for amateur use, to keep all 4 channels >within the amateur (ham radio) allocation at S band. > >Even so, the things don't want to wander much away from >their design frequency. You can move the transmitter a few >hundred megs, but performance drops off. Reworking the >thing to get decent performance outside the band it was >designed for is beyond the realm of most. > >Steve Er... yes true... On the older units (Fall 95 until Fall 99)... The PROM is used to supply a DC tuning voltage via the Mitel chip to a Hyperabrupt Junction (aka: D1-BB833 variable capacitor) which in turn creates the modulation frequency. D1 is the component near the 7 mm strip line filter. and is surrounded by 4-5 SMT chip caps (2-4 pF each), and a 750? ohm resistor. On the older units you could simple unsolder one SMT resistor and wire in a Bourns 25 turn pot to provide your own tuning voltages. The board rev is A, with a PN of C1902100-004 which dates from a fall 95 design registered with the FCC. On the newer units (Post Winter 1999)... They use a four slide position switch, over a dozen SMT resistors, and two variable mini pots so the eavesdropper can simply tweak the pots... or simply replace then with a single 100k multi-turn pot. I guess I should have pointed out that on the older units you had to ADD a pot to be able to tweak it, but the newer units already had the pots (but that an eavesdropper could add their own). The newer units were introduced last Fall, and is why the prices dropped so strongly a year ago (along with the smaller form factor and DBS control circuit). In both cases the NE592 chip acts as a modulator as it creates a deviation/shift of the tuning voltages based on the incoming baseband composite signal (with about 10 MHz of bandwidth). The components attached to the 592 can also be modified or tweaked to create some really wide, or fairly narrow deviations as well. For example, the eavesdropper could drop out the audio and chroma signals, and use a really wide or narrow deviation, or could "COMB Out", drop out, invert, or otherwise modify the sync signals. Remember, that if the eavesdropper transmits only a monochrome signal (no 3.58 MHz color subcarrier) with no audio signals they could use some relatively narrow deviations and still get a decent video signal. Now if they park that signal down around the digital 1.8 GHz PCS band by "tweaking a pot" and tweak the deviations to match the PCS bandwidths the signal would not be picked up on by most sweepers. Of course the eavesdropper would have to keep his power levels low so as not to draw attention from the PCS provider, and would need to use a high gain antenna to pick his signal out from that of the PCS station. Imagine such a system installed on the outer skin of an office building with the video camera and/or microphone inserted into and though the window gasket, and the transmitter/antenna built into (or behind) a hollowed out brick near the window/radiator/floorboards/etc... James M. Atkinson "The Nefarious Nerd" ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1518 From: Andre Holmes <1ach@g...> Date: Wed Sep 20, 2000 6:26pm Subject: Re: Re: "Tap to Bug ratio" MACCF-- what must be considered is that when ever we work with electricity protective materials should always be employed by the person working the circuit. I believe United labitories are the governing agency for all products sold thats related to electricity.I did not fully research the criteria for insulation of certain screw drivers, but did find that at least 1 set of S-drivers has a resistivity of 105 ohms. ----- Original Message ----- From: To: Sent: Wednesday, September 20, 2000 11:19 AM Subject: Re: [TSCM-L] Re: "Tap to Bug ratio" > > In a message dated 9/20/00 7:43:16 AM Pacific Daylight Time, 1ach@g... > writes: > > << ANDY its a flat head and Phillips screwdriver not rated for electrical > work. >> > > Not rated by who for electrical work? > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1519 From: Date: Wed Sep 20, 2000 2:50pm Subject: Re: Re: "Tap to Bug ratio" 9/20/00 4:31:04 PM Pacific Daylight Time, 1ach@g... writes: << what must be considered is that when ever we work with electricity protective materials should always be employed by the person working the circuit. I believe United labitories are the governing agency for all products sold thats related to electricity.I did not fully research the criteria for insulation of certain screw drivers, but did find that at least 1 set of S-drivers has a resistivity of 105 ohms. >> Very Interesting. We're talking TSCM here. I've been sweeping over 20 years and this tool is excellent. Also Radio Shack - Tandy wouldn't sell anything dangerous. Don't take yourself or this list too seriously. Between the jokes, politics, ethics and the over engineered answers (equivalent of US government $400 toilet seats) you can bet that EVERY sweeper located in a country that has a Radio Shack has some of their gear in their kits. MACCFound@A... 1520 From: James M. Atkinson, Comm-Eng Date: Wed Sep 20, 2000 7:17pm Subject: Re: Re: "Tap to Bug ratio" At 7:50 PM -0400 9/20/00, MACCFound@a... wrote: > > 9/20/00 4:31:04 PM Pacific Daylight Time, 1ach@g... writes: > ><< what must be considered is that when ever we work with electricity > protective materials should always be employed by the person working the > circuit. I believe United labitories are the governing agency for all > products sold thats related to electricity.I did not fully research the > criteria for insulation of certain screw drivers, but did find that at > least 1 set of S-drivers has a resistivity of 105 ohms. >> > >Very Interesting. We're talking TSCM here. I've been sweeping over 20 >years and this tool is excellent. Also Radio Shack - Tandy wouldn't sell >anything dangerous. Don't take yourself or this list too seriously. >Between the jokes, politics, ethics and the over engineered answers >(equivalent >of US government $400 toilet seats) you can bet that EVERY sweeper located >in a country that has a Radio Shack has some of their gear in their kits. > >MACCFound@A... Personally I spend a bloody fortune at Radio Shack. Between several hundred dollars of batteries at a time, cables, wall warts, fuses, various odds and ends (It's like a 7-11 or convenience store for electronics). -jma PS: What do you mean "over engineered answers"? ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1521 From: Date: Wed Sep 20, 2000 9:41am Subject: Re: "Tap to Bug ratio" OK. And those funny micro cassette recorders vith VOX? And other voice recording stuff like digital voice pens, DAT recorders, MP3 recorders, Mini disc recorders? Is there a common name to describe them? Janis "A Grudko" .co.za> cc: Subject: [TSCM-L] "Tap to Bug ratio" 00.09.20 15:36 Please respond to TSCM-L Common terms: I think that to the public, 'Bugged' simply means that someone is covertly intercepting a communication. To them, 'Tapped' only refers to phones. My understanding is that; 'TAP' is the physical (including inductive) attachment to an existing cable which by design carries signal/data, for the purpose of covert interception. "Bug" is the covert electronic interception of a conversation/data using some kind of introduced radiated transmission. "Intercept" (a term not yet used in this debate but of equal interest) is to gather audio/video/data which is deliberatly radiated but not meant for the interceptor (pager, cellular phone, cordless phone, 2-way radio, radio trunking, mains-modulation, baby-monitors, wireless intercoms etc) Andy Grudko 1522 From: Raymond M. Date: Wed Sep 20, 2000 6:11pm Subject: Re: Re: "Tap to Bug ratio" "James M. Atkinson, Comm-Eng" wrote: > > At 7:50 PM -0400 9/20/00, MACCFound@a... wrote: > > > > 9/20/00 4:31:04 PM Pacific Daylight Time, 1ach@g... writes: > > > ><< what must be considered is that when ever we work with electricity > > protective materials should always be employed by the person working the > > circuit. I believe United labitories are the governing agency for all > > products sold thats related to electricity.I did not fully research the > > criteria for insulation of certain screw drivers, but did find that at > > least 1 set of S-drivers has a resistivity of 105 ohms. >> > > > >Very Interesting. We're talking TSCM here. I've been sweeping over 20 > >years and this tool is excellent. Also Radio Shack - Tandy wouldn't sell > >anything dangerous. Don't take yourself or this list too seriously. > >Between the jokes, politics, ethics and the over engineered answers > >(equivalent > >of US government $400 toilet seats) you can bet that EVERY sweeper located > >in a country that has a Radio Shack has some of their gear in their kits. > > > >MACCFound@A... > > Personally I spend a bloody fortune at Radio Shack. Between several > hundred dollars of batteries at a time, cables, wall warts, fuses, > various odds and ends (It's like a 7-11 or convenience store for > electronics). > > -jma > > PS: What do you mean "over engineered answers"? I'd have to agree with Jim. Unless you have another choice like a Ham Outlet or Electronic Warehouse nearby, we're often reliant on Radio Shack's to cover those "forgotten" misc. items missing from our kits. I usually avoid buying batteries at Radio Shack. Way too expensive, considering when you can get quality batteries elsewhere. But when your on a mission, you do what you got to do. And as for the idea of over-engineered answers, I like them over-engineered. Least we forget that we should be in a non-alerting stage before we move into the alerting stage? Non-conductive tools in a phone closet sounds like a good idea to me. Less chance of creating an alerting clicks on a hot audio line (or static interference as seen at the LP on a video monitor). Oh yea, Hi BTW. This is my first post to this group. But I've been monitoring you all for quite a while. ;-) -Ray M. 1523 From: Raymond M. Date: Wed Sep 20, 2000 7:07pm Subject: Re: "Tap to Bug ratio" I think you got most of it right, but I think you missed this point: "Tapping" data and analog lines is considered to be a non intrusive (usually require non entry, i.e. TEMPEST) type collection effort. "Bugging" usually requires an intrusive type of attack like physically installing a device or causing a solder glob on the right pair of connections for loss of intelligence from the targetted area. Public? What do they know? The general public thinks that Molder & Skully uses their cellular phones to talk secure. :-) I guess they forgot about O.J. and the Bronco. -Ray M. > Common terms: > > I think that to the public, 'Bugged' simply means that someone is covertly > intercepting a communication. To them, 'Tapped' only refers to phones. > > My understanding is that; > > 'TAP' is the physical (including inductive) attachment to an existing cable > which by design carries signal/data, for the purpose of covert > interception. > > "Bug" is the covert electronic interception of a conversation/data using > some kind of introduced radiated transmission. > > "Intercept" (a term not yet used in this debate but of equal interest) is > to > gather audio/video/data which is deliberatly radiated but not meant for the > interceptor (pager, cellular phone, cordless phone, 2-way radio, radio > trunking, mains-modulation, baby-monitors, wireless intercoms etc) > > Andy Grudko 1524 From: A Grudko Date: Thu Sep 21, 2000 0:39pm Subject: Re: Wavecoms for video sniffing Received... > Of course the eavesdropper would have to keep his power levels low so > as not to draw attention from the PCS provider, and would need to use > a high gain antenna to pick his signal out from that of the PCS > station. Sorry, no speaka da language.....what is PCS? Personal Cellular Service looks possible (Pet Cooking Service?). Andy Johannesburg 1525 From: A Grudko Date: Thu Sep 21, 2000 0:49pm Subject: Re: "Tap to Bug ratio" ----- Original Message ----- > OK. And those funny micro cassette recorders vith VOX? And other voice > recording stuff like digital voice pens, DAT recorders, MP3 recorders, Mini > disc recorders? Is there a common name to describe them? > Janis I'd suggest 'recorders'...... > Common terms: > I think that to the public, 'Bugged' simply means that someone is covertly > intercepting a communication. To them, 'Tapped' only refers to phones. Andy Grudko Jo'burg 1526 From: Ted Swift Date: Thu Sep 21, 2000 8:34am Subject: Re: "Tap to Bug ratio" >Common terms: > >"Intercept" (a term not yet used in this debate but of equal interest) is to >gather audio/video/data which is deliberatly radiated but not meant for the >interceptor (pager, cellular phone, cordless phone, 2-way radio, radio >trunking, mains-modulation, baby-monitors, wireless intercoms etc) > >Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime Andy: I certainly hope that "Professor" J. Ross, possibly the ultimate authority on TSCM questions, never hears your definition of "intercept." He would cringe and then quickly correct you, explaining that an "intercepted" signal is one that never reaches its intended recipient (same as an intercepted pass in football). Cordially, Ted Swift ACM Research Service 1527 From: Robert G. Ferrell Date: Thu Sep 21, 2000 3:01pm Subject: Re: Wavecoms for video sniffing >Sorry, no speaka da language.....what is PCS? Personal Cellular Service >looks possible (Pet Cooking Service?). Usually it stands for Personal Communication Service (or System). It's a generic term for duplex digital wireless communcations operating at 1.9 GHz. In this context, though, it might better be called "Public Conversation Supplier." ;-) RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 1528 From: Date: Thu Sep 21, 2000 11:25am Subject: Re: "Tap to Bug ratio" In a message dated 9/21/00 10:54:43 AM Pacific Daylight Time, tnswift@e... writes: << I certainly hope that "Professor" >> I feel that you are referring to the "Pontiff." If I'm correct, I think I've seen white smoke recently and we should be ready for the new arrival. MACCFound@a... 1529 From: Ted Swift Date: Thu Sep 21, 2000 11:53am Subject: Re: "Tap to Bug ratio" Surely, no one can ever fill THOSE shoes. At 04:25 PM 9/21/2000 EDT, you wrote: > >In a message dated 9/21/00 10:54:43 AM Pacific Daylight Time, >tnswift@e... writes: > ><< I certainly hope that "Professor" >> > >I feel that you are referring to the "Pontiff." If I'm correct, I think I've >seen >white smoke recently and we should be ready for the new arrival. > >MACCFound@a... > 1530 From: Date: Thu Sep 21, 2000 0:15pm Subject: Re: "Tap to Bug ratio" - Vatican Selection In a message dated 9/21/00 2:06:41 PM Pacific Daylight Time, tnswift@e... writes: << Surely, no one can ever fill THOSE shoes. >> Possibly, but that doesn't stop the dedicated or maniacally driven from trying. 1531 From: James M. Atkinson, Comm-Eng Date: Thu Sep 21, 2000 7:35pm Subject: Mexico's Fox Denounces Phone Tap Note: The poor guy needs really needs to hire some good TSCM'ers to make his problems go away ;-) -jma ------------------------------------------------- Mexico's Fox Denounces Phone Tap http://www.latimes.com/news/nation/20000921/t000089296.html By JAMES F. SMITH, Times Staff Writer MEXICO CITY--An angry President-elect Vicente Fox vowed Wednesday to discover who bugged his phone call with a top campaign aide, calling it a case of political espionage that underlined the need to reform Mexico's intelligence system. El Universal, a major daily here, on Wednesday printed the transcript of a conversation between Fox and his spokeswoman, Martha Sahagun, during Mexico's recent presidential campaign. The newspaper quoted its source as saying the nation's intelligence agencies had made the tapes and have continued to bug Fox's lines since his July 2 victory. The government and the defeated Institutional Revolutionary Party, or PRI, denied any responsibility, insisting that no police or intelligence agency is carrying out any such bugging. Phone intercepts are illegal in Mexico except with a judge's authorization, and then only during investigations of organized crime. Fox, the first opposition candidate to break the PRI's 71-year lock on the presidency, repeated his determination to reform the nation's Interior Ministry and intelligence service, long suspected of being used to monitor the ruling party's political foes. "We are going to make sure that the government conducts no espionage of any type that is outside the law," Fox said. The lengthy transcript published by El Universal included some disparaging remarks by Fox about a television host but otherwise was not especially compromising. The newspaper indicated that it had been given other recordings, but it did not disclose any further contents. In a hastily called news conference, Fox did not challenge the content of the lengthy transcript printed by El Universal. But he chided the newspaper for not disclosing its source. Fox had charged during the campaign that he was being spied on, and some Mexicans have long suspected that the government security services routinely use telephone taps and other intelligence methods to monitor the activity of political opponents. Critics of the government's security apparatus contend that the intelligence services have become politicized after so many years of PRI rule. Asked whether he believes that the government of President Ernesto Zedillo is spying on him, Fox noted that the tape transcript printed by El Universal was made before the election. "I don't know whether El Universal has conversations taped recently of the president-elect," Fox said. "If so, I'm sure El Universal will present them to us, and then I would have evidence that there is current espionage in this office and it would imply that it could be the government." Government officials rushed to disclaim any role in the bugging. Dionisio Perez Jacome, deputy interior minister in charge of security issues, denied that government agencies were responsible. He said the main government intelligence service, CISEN, doesn't even have the equipment to tap phones. "I deny categorically that either the Interior Ministry or CISEN" was responsible, he told a television interviewer. "CISEN doesn't bug phones, it is not an espionage agency, and even less an agency for political espionage." Sergio Garcia, the PRI's secretary-general, said that the party had nothing to do with the recordings and that an investigation should be launched to identify the culprit. At his news conference Wednesday, Fox said his transition team had access to the Interior Ministry and CISEN "and that's where I'm going to begin the investigation. But it would help me a lot if El Universal would tell us who is its source." The newspaper said a source had delivered a series of recordings of conversations between Fox and his aides, contending the tapes had been made by "government organs of intelligence and national security." The newspaper indicated that the tapes came solely from the campaign period, but it said the source reported that the bugging continues. "Everything they say is taped," the source was quoted as saying. Fox spent much of the impromptu news conference explaining and defending the salaries being paid to members of his transition team. Newspapers have been critical of Fox for failing to clarify how much his staff members are being paid from a trust fund created by the government to support the transition. Fox said he is not accepting any salary and is living off his savings. He said 185 team members are being paid an average of $3,400 a month, with 11 top advisors receiving up to about $9,000 a month. Two aides are donating their salaries to a children's fund, Fox said. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= From: James M. Atkinson, Comm-Eng Date: Thu Sep 21, 2000 7:40pm Subject: Gadget Man, it's Bond: I need fibre optic cable, not a pen pistol Gadget Man, it's Bond: I need fibre optic cable, not a pen pistol http://theage.com.au/news/20000922/A11211-2000Sep21.html Spy catcher: Edward Tapanes and his fibre optic cable. http://theage.com.au/images/20000921/techguy.jpg Picture: MICHAEL CLAYTON-JONES By GARRY BARKER TECHNOLOGY REPORTER Friday 22 September 2000 Ed Tapanes' eyes shine as he brandishes a handful of hair-fine optical fibres in his Rowville laboratory. It's a piece of cable similar to those spanning the country carrying the information generated by phone calls, Internet connections and e-commerce. They are an artery of the information age, he says, and they are also the crux of the great work taking place in offices around the country. In Mr Tapanes' case, the business is counter-espionage and remote surveillance of everything from jails to VIPs and oil pipelines. >From a remote control room up to 50 kilometres away, operators using his system can pinpoint an intruder climbing a chain-link security fence. They can detect an attack on an oil or gas pipeline and know to within a few metres where it is occurring. They can weigh a semi-trailer on the move and estimate the damage it is doing to a highway, a function developed for the Australian Road Research Bureau. They can detect the intrusion of spies on sensitive data lines, a function that has interested the Federal Government and Department of Defence. Mr Tapanes, a Canadian, and his Australian wife, Cheryl, founded their company 10 years ago with $5000. They have since sold to multinational banks, have deals under way with security firms in Korea, the US and elsewhere, and are setting up a joint venture to market their technology. Pipelines are particularly vulnerable, Mr Tapanes says. Bandits or tribesmen looking for fuel for cooking are known to drill holes in them. But using his technology, surveillance teams 50 kilometres or more away can pinpoint the position of the bandits to within 50 metres. For jobs demanding greater accuracy, he uses fibre adapted to create what he calls the world's longest microphone. The laser technology is so sensitive it can detect the vibration of sound waves along a fibre's length. Loud voices or the whistle made by high-pressure gas escaping can be picked up and their power and position identified. Mr Tapanes says his technology will soon be able to pinpoint a disturbance in a pipeline to within two metres over 100 kilometres. It's all done with lasers and microscopically precise computer technology. Optical fibres used by Telstra, Optus and other telecommunication companies carry data on a laser beam in the form of photons. Australia has more optical fibre per capita than any other country; most of Telstra's exchanges are now linked not by copper but by fibre optic cables and most modern office buildings and apartment blocks have fibre optic cable installed to serve the growing demand for data, television, telephone and Internet connections. The data is digital, a series of ones and zeros, or on and off signals, carried on what is essentially a light beam running inside the tiny glass filaments that make up cable. Mr Tapanes' technology works by sending another laser beam along the cable using an unlit fibre and monitoring any disturbances to it. These could be vibrations from sound waves or bending or cutting through an outer casing. A spy, by bending a fibre so that the data beam inside hits the fibre's wall, can tap a tiny fraction of the beam - enough to steal the data flowing on it. But because bending the fibre makes microscopic changes to its length and also disturbs Mr Tapanes' "spy-catcher" laser beam inside the fibre, the technology can detect when and where the bend is made and trigger an alarm. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1533 From: 1RCM <1RCM@M...> Date: Thu Sep 21, 2000 6:15pm Subject: Fw: TSA and BECCA ----- Original Message ----- From: 1RCM <1RCM@e...> To: TSCM List - Post Sent: Saturday, September 16, 2000 10:54 AM Subject: TSA and BECCA > Hi List, > > I just wanted to add my own personal comments regarding TSA and BECCA. As a > part of performing just a very few other specialized tasks at my 'day job' I > currently do sweep work for a Fortune 100 aerospace company. And so > obviously prior to being allowed to 'sweep on my own' I was 'strongly > encouraged' to avail myself of some significant TSCM training from both the > private and governmental sectors. Three years ago I took the TSA course > simply because it was made available to me by my employer as a continuing > education opportunity. I'll sum up my findings by stating that I found the > TSA course to be a most credible TSCM course as it offers both the beginner > and the 'working TSCMer' an opportunity to learn quite a bit despite what he > or she believes they already know. And while taking the course, and for > three years since, I came to know the founder and chief instructor of TSA to > be most competent, knowledgeable, a real gentlemen - and to put it bluntly a > very 'For Real' player in the TSCM field. > > As for BECCA, well I was offered sponsorship to the organization by a BECCA > member after I completed the TSA course. And please, no one should read > anything into this statement as I know for a fact that taking the TSA course > is in no way a pre-requirement for BECCA membership nor does taking the > course automatically qualify anyone for BECCA membership. I'll sum-up my > three years of BECCA membership by stating that BECCA counts among its > membership many of the most preeminent TSCM practitioners in the world, it > has afforded me interaction with folks in the TSCM field whom I never dreamt > that I'd ever be having technical and social discussions with, and it has > provided me with access to information, opinions, sources of equipment, > friendships, etc., etc. that to me personally and professionally have been > worth a thousand times the membership fee. And as for secrecy surrounding > BECCA, well I'd prefer to call it discretion and a desire to maintain a > quality organization instead. The founder, supported by the great majority > of the membership, does not want BECCA to become a haven for charlatans and > wanna-bes nor to become an avenue of business advertisement for any > individual member or potential member. BECCA simply exists in the TSCM world > in order to allow for its members to do a better job of "Hurting the bad > guys". There is a set process for obtaining BECCA membership and I've seen > individuals admitted and I've also seen individuals rejected. What I have > not seen in BECCA, however, is an organization which has gotten 'too big' to > properly serve its charter and its membership nor one that has lost its > integrity, honor and reputation as many a security-related organization has > done over the past many years. And no - we don't have a secret handshake or > a decoder ring. A solid background, competency in the field of TSCM or the > protection of business assets and information, and being of good moral and > ethical character is usually enough to get you in the door. > > I don't know what took place with Steve Whitehead's negative experiences in > South Africa but from someone who has 'been there - done that' with both TSA > and BECCA I personally can not say a bad word about either. > > 'Just Another Bob' > > 1534 From: A Grudko Date: Thu Sep 21, 2000 1:40pm Subject: Re: Re: "Tap to Bug ratio" ----- Original Message ----- From: > Reversible Driver > Does the job of two screwdrivers. Has a 3/16 slot type on one end and > a #1 Phillips on the other. Durable, easy grip INSULATED handle. > Snap in blades And how many times has my trusty Swiss Army knife saved my bacon (Just call me McGuyver). Actually a mini SAK saved the life of my ex-police partner. Andy G Jo'burg 1535 From: Date: Thu Sep 21, 2000 11:49pm Subject: Re: Re: "Tap to Bug ratio" In a message dated 9/21/00 10:54:11 PM Pacific Daylight Time, agrudko@i... writes: << Swiss Army knife >> I wonder who does the sweeps for the Swiss Army? 1536 From: James M. Atkinson, Comm-Eng Date: Fri Sep 22, 2000 10:05am Subject: Blondes, Blondes, Blondes... [Humor] ONE A married couple were asleep when the phone rang at 2 in the morning. The wife (undoubtedly blonde), picked up the phone, listened a moment and said, "How should I know, that's 200 miles from here!" and hung up. The husband said, "Who was that?" The wife said, "I don't know, some woman wanting to know if the coast is clear." TWO Two blondes are walking down the street. One notices a compact on the sidewalk and leans down to pick it up. She opens it, looks in the mirror and says, "Hmm, this person looks familiar." The second blonde says, "Here, let me see!" So the first blonde hands her the compact. The second one looks in the mirror and says, "You dummy, it's me!" THREE A blonde suspects her boyfriend of cheating on her, so she goes out and buys a gun. She goes to his apartment unexpectedly and when she opens the door she finds him in the arms of a redhead. Well, the blonde is really angry. She opens her purse to take out the gun, and as she does so, she is overcome with grief. She takes the gun and puts it to her head. The boyfriend yells, "No, honey, don't do it." The blonde replies, "Shut up, you're next!" FOUR A blonde was bragging about her knowledge of state capitals. She proudly says, "Go ahead, ask me, I know all of them." A friend says, "OK, what's the capital of Wisconsin?" The blonde replies, "Oh, that's easy: W." FIVE What did the blonde say to her doctor when he told her she was pregnant? "Is it mine?" SIX A blonde had just totaled her car in a horrific accident. Miraculously, she managed to pry herself from the wreckage without a scratch and was applying fresh lipstick when the state trooper arrived. "My God!" the trooper gasped. "Your car looks like an accordion that was stomped on by an elephant. Are you OK ma'am?" "Yes, officer, I'm just fine" the blonde chirped." Well, how in the world did this happen?" the officer asked as he surveyed the wrecked car. "Officer, it was the strangest thing!" the blonde began. "I was driving along this road when from out of nowhere this TREE pops up in front of me. So I swerved to the right, and there was another tree! I swerved to the left and there was ANOTHER tree! I swerved to the right and there was another tree! I swerved to the left and there was ...." "Uh, ma'am," the officer said, cutting her off, "There isn't a tree on this road for 30 miles. That was your air freshener swinging back and forth." SEVEN Returning home from work, a blonde was shocked to find her house ransacked and burglarized. She telephoned the police at once and reported the crime. The police dispatcher broadcast the call on all the channels, and a K-9 unit patrolling nearby was the first to respond. As the K-9 officer approached the house with his dog on a leash, the blonde ran out on the porch, shuddered at the sight of the cop and his dog, then sat down on the steps. Putting her face in her hands, she moaned, "I come home to find all my possessions stolen. I call the police for help, and what do they do? They send me a BLIND policeman ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1537 From: Robert G. Ferrell Date: Fri Sep 22, 2000 10:21am Subject: Chasing the Wind Hi folks, I have a new series of fictional/semi-humorous articles on computer security called "Chasing the Wind" that debuted on Monday at http://www.securityfocus.com/focus/ih/articles/chasing1.html Since computer security is relevant to TSCM, at least somewhat, I thought I'd announce it here, as my contribution to the SF publicity effort. ;-) Besides, I'm considering using some TSCM in a future episode as part of a broader industrial espionage plot device. I'll probably draw heavily on stuff I've gleaned from the list and its members to flesh out the scene, so it seems only fair that the contributors, however unintentional, be made aware beforehand. Don't worry--no names or actual incidents will be used--I've got a decent imagination, for a geek. The first episode isn't terribly riveting, plot-wise, because I'm trying to establish characters and the corporate milieu. Future installments will be edge-of-the-seat stuff, though, at least within the context of information warfare (and within the constraints of my 'infotainment' format). Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 1538 From: James M. Atkinson, Comm-Eng Date: Fri Sep 22, 2000 11:37am Subject: Vehicle Considerations Good Afternoon Folks, Here is a question for the list about vehicle considerations. Lets suppose that a TSCM'er wants to use/buy a Cube truck (such as the small Ryder or U-Haul trucks with a fiber glass box on the back). Now lets assume that the TSCM'ers wants to keep a relatively low profile with the truck, but still needs something with that much space in back. With that in mind what color would you lean toward, and would you consider a NEW truck (about 35-40 grand), or perhaps simply purchasing a used Ryder truck for a few grand. Now keep in mind that a USED truck would be a bright yellow or Orange, but that a NEW truck could be virtually any color you wish. Also, what kind of logo's or names (if any) would you put on the side (and no a big-ass "Bug Sweeps R US" sign is not an option). Would you lean towards a fiberglass "RF Transparent" cube, or a metal "Good Ground Plane". A loading ramp, walk though cab, and a roll door is a given, as is a small generator and a bank of deep cycle batteries and inverter. The primary goal is to park this puppy some distance from the target and collect "ambient RF" prior to entering said facility, and for performing various emission control measurements from various parking lots, street side, driveways, drive bys, etc. Discretion is most critical, but so is usable space in the cargo area. Feel free to respond to the list, or you can also Email to me privately. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1539 From: Mike F Date: Fri Sep 22, 2000 11:50am Subject: RE: Vehicle Considerations I would stick with the yellow color. Bright yes ,but everyone is Used to seeing the Bright orange or yellow. I think that it would attract less attention because of familiarity of those vehicles. You could always paint the used vehicle,I don't see why you would need to spend 20+ grand beccause truck is not the correct color painting a used one,seems like the way 2 go. As for Logo use one that is familiar in the area you are working. Thats what I would do. later4,mike fiorentino From: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] Sent: Friday, September 22, 2000 11:37 AM To: TSCM-L Mailing List Subject: [TSCM-L] Vehicle Considerations 1540 From: Ed Naylor Date: Fri Sep 22, 2000 0:33pm Subject: TSCM CHALLANGE? Would anyone care to comment on the article below? Ed ================================ Mysterious TV Messages 'Terrorize' Black Family FBI Probes Racial Slurs, Threats That Appear on Screens Sept. 21, 2000 By Seamus McGraw SUMPTER TOWNSHIP, Mich. (APBnews.com) -- An African-American couple who moved to this rural community several years ago to escape the grind of the city have been terrorized by threatening, racially tinged messages that have mysteriously appeared on television screens in their home, federal authorities say. "We're investigating this as a civil rights violation," said FBI Special Agent Dawn Clenney. "I've never seen anything like this before." Charlotte and Judge Smith, who share their remote eight-acre homestead with their 13-year-old grandson, returned home from vacation last month to find that someone had tampered with their alarm system, authorities said. They notified police, who found no sign of forced entry, nor was there anything obviously missing from the home. But that was just the beginning of what authorities are describing as the oddest case of racial harassment they've ever encountered. Channels change, messages appear Within a few hours, the Smiths discovered that someone had taken control of their televisions, which are hooked up to both a nationwide satellite TV service and an Internet provider. Channels would change, seemingly without cause, authorities said. In the middle of the night, a television would mysteriously turn on at high volume. Then, authorities said, messages, apparently typed on some sort of remote keypad, appeared on the television screens in the family's living room and den. The messages contained racial slurs and threats, Clenney said. Authorities said that an enraged Charlotte Smith reported that she yelled at her television on one occasion, only to have a message flash across the screen reading, "Shut up, Charlotte." "The family has been terrorized," Clenney said. Perpetrator close by? Local police, unable to get to the bottom of the case, turned it over to the FBI. Federal agents inspected the house, the family's satellite dish, and reviewed tapes the family had made of the harassing messages, some of which seemed to indicate that whoever was behind the remote harassment was watching the Smiths. Bob Mercer, a spokesman for DirecTV, the satellite company that provides service to the Smith, said it marks the first time a customer has complained about harassing messages suddenly appearing on television screens. The company is cooperating with the FBI's probe, he said. "We want to get to the bottom of it," he said. Authorities suspect that whoever is taunting the family has been doing it from close by, perhaps by using a short-range remote keypad similar to those offered by WebTV. 1541 From: Robert G. Ferrell Date: Fri Sep 22, 2000 0:45pm Subject: Re: Re: "Tap to Bug ratio" ><< Swiss Army knife >> > I wonder who does the sweeps for the Swiss Army? Um, the Mossad? ;-) RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 1542 From: Date: Fri Sep 22, 2000 9:29am Subject: Re: TSCM CHALLANGE? In a message dated 9/22/00 11:23:17 AM Pacific Daylight Time, ednaylor@p... writes: << APBnews.com >> This web site looks a little "national enquirerish." I'm sure there will be comments from this list. My policy is not to comment on a matter under investigation. 1543 From: Gregory Horton Date: Fri Sep 22, 2000 1:49pm Subject: Re: Vehicle Considerations I think if you painted the HomeGrocers logo on it, you could get away with it. I see dozens of those around my area! Greg Horton 1544 From: Robert G. Ferrell Date: Fri Sep 22, 2000 1:55pm Subject: Re: Vehicle Considerations >With that in mind what color would you lean toward, and would you >consider a NEW truck (about 35-40 grand), or perhaps simply >purchasing a used Ryder truck for a few grand. I'll guarantee you, from years of experiencing "brown car syndrome," that a neutral brown (like Chevy Astro van brown) renders any vehicle practically invisible. People just don't see it. RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 1545 From: James M. Atkinson, Comm-Eng Date: Fri Sep 22, 2000 2:36pm Subject: Re: TSCM CHALLANGE? Hmmm.... A challenge.... Typically the signal to watch is at or around 310 MHz, which will have periodic data bursts just prior to the offensive content coming up. This is the frequency used by the remote keyboard, and controllers. Use 8 each small vertically polarized log periodic (about 30 bucks) pointing to the appropriate cardinal points, then use a small SAW based receiver (10 bucks), convert the SAW signal to a shifted audio signal (3 bucks), and record on an 8 channel DAT or cassettes. When the offensive content happens again, simply stop and rewind the tapes to determine the strongest signal (which by it's nature will be a brief data burst). Then move the platform to another section of the house opposite the first and repeat... the rest simply involves drawing out a triangle (or locate it in one of the out-buildings) If the signal runs along the long axis of the house then you will need a third bearing made from a neighboring house or building. With so much real estate involved it should be easy to get a bearing on the signal (due to the typically low power levels involved). Also, the investigative agency should also check with the FCC and FAA for any MIJI reports around 310 MHz, and well as checking with the local military air bases. (Hint the SAC primary channel is 311 and 321 MHz). Piece of cake. Additionally if they are using a "Phonex" box the suspect signal would be coming into the house around 3 and 6 MHz via VLF on the power lines. If someone wants to sponsor such an expedition I would be happy to go to Michigan, provide my own equipment, and locate the offender. My fee is $5,000 per day with 3 days on site plus a day each way for travel time (for a total of 5 days). I have already successfully performed a technical project/trace of this nature for a government agency (and yes, I caught the person responsible, AND got well paid for the gig). One added note... do they have any teenage kids... who, uh, ahem, might be trying to get some attention for whatever reason? and has anybody considered the fact the whole thing could be a hoax? -jma PS: A TSCM sweep would detect the vulnerability to such mischief, and would probably also detect the perpetrator (so long as they were "on the air" during the sweep). At 10:33 AM -0700 9/22/00, Ed Naylor wrote: > >Would anyone care to comment on the article below? > >Ed >================================ > >Mysterious TV Messages 'Terrorize' Black Family >FBI Probes Racial Slurs, Threats That Appear on Screens >Sept. 21, 2000 > >By Seamus McGraw > >SUMPTER TOWNSHIP, Mich. (APBnews.com) -- An African-American couple who moved >to this rural community several years ago to escape the grind of the city >have been terrorized by threatening, racially tinged messages that have >mysteriously appeared on television screens in their home, federal >authorities say. > >"We're investigating this as a civil rights violation," said FBI Special >Agent Dawn Clenney. "I've never seen anything like this before." > >Charlotte and Judge Smith, who share their remote eight-acre homestead with >their 13-year-old grandson, returned home from vacation last month to find >that someone had tampered with their alarm system, authorities said. They >notified police, who found no sign of forced entry, nor was there anything >obviously missing from the home. > >But that was just the beginning of what authorities are describing as the >oddest case of racial harassment they've ever encountered. > >Channels change, messages appear > >Within a few hours, the Smiths discovered that someone had taken control of >their televisions, which are hooked up to both a nationwide satellite TV >service and an Internet provider. > >Channels would change, seemingly without cause, authorities said. In the >middle of the night, a television would mysteriously turn on at high volume. > >Then, authorities said, messages, apparently typed on some sort of remote >keypad, appeared on the television screens in the family's living room and >den. The messages contained racial slurs and threats, Clenney said. > >Authorities said that an enraged Charlotte Smith reported that she yelled at >her television on one occasion, only to have a message flash across the >screen reading, "Shut up, Charlotte." > >"The family has been terrorized," Clenney said. > >Perpetrator close by? > >Local police, unable to get to the bottom of the case, turned it over to the >FBI. Federal agents inspected the house, the family's satellite dish, and >reviewed tapes the family had made of the harassing messages, some of which >seemed to indicate that whoever was behind the remote harassment was watching >the Smiths. > >Bob Mercer, a spokesman for DirecTV, the satellite company that provides >service to the Smith, said it marks the first time a customer has complained >about harassing messages suddenly appearing on television screens. The >company is cooperating with the FBI's probe, he said. > >"We want to get to the bottom of it," he said. > >Authorities suspect that whoever is taunting the family has been doing it >from close by, perhaps by using a short-range remote keypad similar to those >offered by WebTV. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1546 From: John McCain Date: Fri Sep 22, 2000 0:38pm Subject: RE: Vehicle Considerations I'd think you want to look like everyone else so you can hide in plain sight while doing this non-alerting function. What truck is most commonly seen there? Start watching the streets around you. Keep a log. (Bet JMA already does :). What trucks are there that you don't normally notice? You might also consider a trailer in addition to the truck. Around here, large Wells-cargo type trailers are often left parked for a day or two in anticipation of a construction/work project, and are usually not noticed. Again, watch the streets and hide one with the same colors and amount of dirt that everyone else has. Put your automated equipment in it (along with an alarm). I remember when a local police dept started buying used taxicabs and old water department vans. It must have taken a couple of years before the bad guys figured out who was watching them... they were so used to seeing repainted caprice sedans, crown vics, or brand new mini-vans as surveillance vehicles. Cheers, JohnM At 12:50 PM 9/22/00 -0400, you wrote: > >I would stick with the yellow color. >Bright yes ,but everyone is Used to seeing the Bright orange or yellow. >I think that it would attract less attention because of familiarity of those >vehicles. >You could always paint the used vehicle,I don't see why you would need to >spend 20+ grand >beccause truck is not the correct color painting a used one,seems like the >way 2 go. >As for Logo use one that is familiar in the area you are working. >Thats what I would do. >later4,mike fiorentino > > > >From: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] >Sent: Friday, September 22, 2000 11:37 AM >To: TSCM-L Mailing List >Subject: [TSCM-L] Vehicle Considerations > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > Manager, Corporate SecurityVoice: 217-352-3207 Data Comm for Business, Inc.Fax: 217-352-0350 807 PioneerWeb: http://www.dcbnet.com Champaign, IL. 61820Email: Jmccain@d... 1547 From: David Miller Date: Fri Sep 22, 2000 0:59pm Subject: RE: Vehicle Considerations I would say buy a used one in good condition, and paint it tan. Tan delivery vehicles are common, and tend to blend in. I would put something nondescript like: "Atkinson Services" 555-555-5555. on the side, and I would just stencil it on, like I am just some guy trying to make a living with my truck . Of course you might get some calls for moving jobs. I guess it depends on where you are, but here in Oklahoma, Ryder Trucks (or any big rental trucks for that matter) parked for any length of time, tend to cause a second look and a little more scrutiny. 1548 From: St. Clair, James Date: Fri Sep 22, 2000 0:58pm Subject: RE: TSCM CHALLANGE? Ok, here it goes (ready for ridicule..) DirecTV operates on a narrowband microwave digital signal from a geo-stationary satellite. Given the number of rainstorms and snow (the cold stuff, not white noise) I have had and could still watch TV, signal strength can be amazingly low. Additionally, the card in the receiver grants permission to view DirecTV programs. This card is supposedly hackable, so you can steal premium channels. It is also removable. The system has about 32 satellite channels to use for tuning, of which 24-32 operate on a upper end of the spectrum (as I understand). Suppose someone in LOS with a narrowband antenna, mikes in the house, and a reasonably low powered transmitter. Perhaps you could augment the incoming signal with the additional feed. IF an identical DirecTV system was set up,and the feed was then retransmitted, they would watch what the "attacker" watched, with the addition of text. James St. Clair -----Original Message----- From: Ed Naylor [mailto:ednaylor@p...] Sent: Friday, September 22, 2000 1:34 PM To: TSCM-L@egroups.com Subject: [TSCM-L] TSCM CHALLANGE? Would anyone care to comment on the article below? Ed ================================ Mysterious TV Messages 'Terrorize' Black Family FBI Probes Racial Slurs, Threats That Appear on Screens Sept. 21, 2000 By Seamus McGraw SUMPTER TOWNSHIP, Mich. (APBnews.com) -- An African-American couple who moved to this rural community several years ago to escape the grind of the city have been terrorized by threatening, racially tinged messages that have mysteriously appeared on television screens in their home, federal authorities say. "We're investigating this as a civil rights violation," said FBI Special Agent Dawn Clenney. "I've never seen anything like this before." Charlotte and Judge Smith, who share their remote eight-acre homestead with their 13-year-old grandson, returned home from vacation last month to find that someone had tampered with their alarm system, authorities said. They notified police, who found no sign of forced entry, nor was there anything obviously missing from the home. But that was just the beginning of what authorities are describing as the oddest case of racial harassment they've ever encountered. Channels change, messages appear Within a few hours, the Smiths discovered that someone had taken control of their televisions, which are hooked up to both a nationwide satellite TV service and an Internet provider. Channels would change, seemingly without cause, authorities said. In the middle of the night, a television would mysteriously turn on at high volume. Then, authorities said, messages, apparently typed on some sort of remote keypad, appeared on the television screens in the family's living room and den. The messages contained racial slurs and threats, Clenney said. Authorities said that an enraged Charlotte Smith reported that she yelled at her television on one occasion, only to have a message flash across the screen reading, "Shut up, Charlotte." "The family has been terrorized," Clenney said. Perpetrator close by? Local police, unable to get to the bottom of the case, turned it over to the FBI. Federal agents inspected the house, the family's satellite dish, and reviewed tapes the family had made of the harassing messages, some of which seemed to indicate that whoever was behind the remote harassment was watching the Smiths. Bob Mercer, a spokesman for DirecTV, the satellite company that provides service to the Smith, said it marks the first time a customer has complained about harassing messages suddenly appearing on television screens. The company is cooperating with the FBI's probe, he said. "We want to get to the bottom of it," he said. Authorities suspect that whoever is taunting the family has been doing it from close by, perhaps by using a short-range remote keypad similar to those offered by WebTV. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1549 From: RAMSTA Date: Fri Sep 22, 2000 1:41pm Subject: Re: Vehicle Considerations Hello James, My ideas in this direction are to purchase a used small RV camper. You gut the inside, heavily tint the windows, cover the inside with sound board, then panel it, totally covering the windows as well, set up tables/shelves and equip racks fastened to the walls/floors. You install a nice set of quad deep cycle golf cart batteries and an ac inverter (trace units work well) and you now have a great surviellance vehicle that no one notices because everyone sees these RVs/campers everywhere now and pays no attention to them, no matter where they are parked. I would hang a couple of bicycles on the front and back and anything else that enhances the "camper" look. You can mount a couple of wide band type scanner antennas on the mirrors just as the usual CB type antennas are mounted which work well and also draw very little attention. On the roof top you add one of the plastic/fiberglass luggage carriers which you can mount smaller microwave antennas inside out of sight. I put a metal plate across the bottom of the luggage carrier first, and bonded it to the metal roof. I then mounted my various microwave antennas to the plate inside this wonderful luggage carrier and run the feedlines down through the roof under the metal plate. It all works well and looks like the neighbor's RV. It took me a while to get to this point.....I went the regular truck route before and it always looked to questionable, but the RV is a homerun. You can park it in a neighborhood, in a bussiness park or anywhere and no one pays any attention at all !!!! I do various types of electronic surviellance in various surroundings and this RV is a winner. Mike ----- Original Message ----- From: "James M. Atkinson, Comm-Eng" To: "TSCM-L Mailing List" Sent: Friday, September 22, 2000 9:37 AM Subject: [TSCM-L] Vehicle Considerations > > Good Afternoon Folks, > > Here is a question for the list about vehicle considerations. > > Lets suppose that a TSCM'er wants to use/buy a Cube truck (such as > the small Ryder or U-Haul trucks with a fiber glass box on the back). > > Now lets assume that the TSCM'ers wants to keep a relatively low > profile with the truck, but still needs something with that much > space in back. > > With that in mind what color would you lean toward, and would you > consider a NEW truck (about 35-40 grand), or perhaps simply > purchasing a used Ryder truck for a few grand. > > Now keep in mind that a USED truck would be a bright yellow or > Orange, but that a NEW truck could be virtually any color you wish. > > Also, what kind of logo's or names (if any) would you put on the side > (and no a big-ass "Bug Sweeps R US" sign is not an option). > > Would you lean towards a fiberglass "RF Transparent" cube, or a metal > "Good Ground Plane". > > A loading ramp, walk though cab, and a roll door is a given, as is a > small generator and a bank of deep cycle batteries and inverter. > > The primary goal is to park this puppy some distance from the target > and collect "ambient RF" prior to entering said facility, and for > performing various emission control measurements from various parking > lots, street side, driveways, drive bys, etc. > > Discretion is most critical, but so is usable space in the cargo area. > > Feel free to respond to the list, or you can also Email to me privately. > > > -jma > > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > Do not try the patience of Wizards, > for they are subtle and quick to anger. > ======================================================================= > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1550 From: James M. Atkinson, Comm-Eng Date: Fri Sep 22, 2000 4:33pm Subject: RE: Vehicle Considerations At 12:38 PM -0500 9/22/00, John McCain wrote: > >I'd think you want to look like everyone else so you can hide in plain >sight while doing this non-alerting function. What truck is most commonly >seen there? Start watching the streets around you. Keep a log. (Bet JMA >already does :). What trucks are there that you don't normally notice? > >You might also consider a trailer in addition to the truck. Around here, >large Wells-cargo type trailers are often left parked for a day or two in >anticipation of a construction/work project, and are usually not noticed. >Again, watch the streets and hide one with the same colors and amount of >dirt that everyone else has. Put your automated equipment in it (along >with an alarm). > >I remember when a local police dept started buying used taxicabs and old >water department vans. It must have taken a couple of years before the bad >guys figured out who was watching them... they were so used to seeing >repainted caprice sedans, crown vics, or brand new mini-vans as >surveillance vehicles. > >Cheers, >JohnM Funny you mention it, but I run four video cameras and recorders inside the vehicle to document who comes around my vehicle when I am out on a sweep. I have also been known to attach a recorder to the S/A to grab the video (see there really wasn't a bug there). I also occasionally use briefcase with a concealed video camera to ensure my equipment stays where I left it (and yes, I have actually caught people trying to rip me off). Interesting that you should mention the trailer... I am considering getting one, just so I can set up two platforms (for DF), and to haul some of the bulkier, but light weight things like ladders, pontoons, water pumps, vent fans, man hole supplies (tents, damns, etc), and so on. The big thing is to hide in plain site... but not to a level that would get folks nervous, etc. I want to vehicle to look appropriate for visits to office buildings, but also something that would look ok at the local mall, home depot, or parked downtown. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1551 From: James M. Atkinson, Comm-Eng Date: Fri Sep 22, 2000 5:00pm Subject: RE: Vehicle Considerations > >I would say buy a used one in good condition, and paint it tan. >Tan delivery vehicles are common, and tend to blend in. >I would put something nondescript like: > >"Atkinson Services" >555-555-5555. or how about... "Die, Spy, Die, Inc." I can see it now... A 12 foot parabolic dish pops out of the ceiling and starts to pan the horizon, fog starts rolling out from below the truck, laser beams skitter though the fog... suddenly a huge neon sign lights up and Charlton Heston's voice booms out from the loudspeaker... Well ok... it's Elmer Fudds voice instead... he says "Be weary, weary quiet... I am hunting wabbits... er, spies" >on the side, and I would just stencil it on, like I am just some >guy trying to make a living with my truck >. How about a "Generic Logo" on the sides of the box... and removable magnetic signs on the doors. >Of course you might get some calls for moving jobs. > >I guess it depends on where you are, but here in Oklahoma, >Ryder Trucks (or any big rental trucks for that matter) parked >for any length of time, tend to cause a second look and a little >more scrutiny. > ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1552 From: James M. Atkinson, Comm-Eng Date: Fri Sep 22, 2000 5:05pm Subject: Re: Vehicle Considerations Ok, but there are some issues: 1) A camper or RV does not look right sitting in the parking lot of an office building. 2) The vehicle is not being used for surveillance, so we do not have to disguise the presence of the vehicle, just it's purpose (ie: no external antenna's). -jma At 11:41 AM -0700 9/22/00, RAMSTA wrote: > >Hello James, >My ideas in this direction are to purchase a used small RV camper. You gut >the inside, heavily tint the windows, cover the inside with sound board, >then panel it, totally covering the windows as well, set up tables/shelves >and equip racks fastened to the walls/floors. You install a nice set of quad >deep cycle golf cart batteries and an ac inverter (trace units work well) >and you now have a great surviellance vehicle that no one notices because >everyone sees these RVs/campers everywhere now and pays no attention to >them, no matter where they are parked. I would hang a couple of bicycles on >the front and back and anything else that enhances the "camper" look. You >can mount a couple of wide band type scanner antennas on the mirrors just as >the usual CB type antennas are mounted which work well and also draw very >little attention. On the roof top you add one of the plastic/fiberglass >luggage carriers which you can mount smaller microwave antennas inside out >of sight. I put a metal plate across the bottom of the luggage carrier >first, and bonded it to the metal roof. I then mounted my various microwave >antennas to the plate inside this wonderful luggage carrier and run the >feedlines down through the roof under the metal plate. It all works well and >looks like the neighbor's RV. >It took me a while to get to this point.....I went the regular truck route >before and it always looked to questionable, but the RV is a homerun. You >can park it in a neighborhood, in a bussiness park or anywhere and no one >pays any attention at all !!!! I do various types of electronic >surviellance in various surroundings and this RV is a winner. > >Mike ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1553 From: Darnir Date: Fri Sep 22, 2000 0:26pm Subject: Re: [ Blondes, Blondes, Blondes... [Humor]] Thanks for the laughs...A redhead in Florida "James M. Atkinson, Comm-Eng" wrote: > > > ONE A married couple were asleep when the phone rang at 2 in the > morning. The wife (undoubtedly blonde), picked up the phone, > listened a moment and said, "How should I know, that's 200 miles > from here!" and hung up. The husband said, "Who was that?" The > wife said, "I don't know, some woman wanting to know if the > coast is clear." > > > TWO Two blondes are walking down the street. One notices a > compact on the sidewalk and leans down to pick it up. She opens > it, looks in the mirror and says, "Hmm, this person looks > familiar." The second blonde says, "Here, let me see!" So the > first blonde hands her the compact. The second one looks in the > mirror and says, "You dummy, it's me!" > > > THREE A blonde suspects her boyfriend of cheating on her, so she > goes out and buys a gun. She goes to his apartment unexpectedly > and when she opens the door she finds him in the arms of a > redhead. Well, the blonde is really angry. She opens her purse > to take out the gun, and as she does so, she is overcome with > grief. She takes the gun and puts it to her head. The > boyfriend yells, "No, honey, don't do it." The blonde replies, > "Shut up, you're next!" > > > FOUR A blonde was bragging about her knowledge of state > capitals. She proudly says, "Go ahead, ask me, I know all of > them." A friend says, "OK, what's the capital of Wisconsin?" The > blonde replies, "Oh, that's easy: W." > > > FIVE What did the blonde say to her doctor when he told her she > was pregnant? "Is it mine?" > > > SIX A blonde had just totaled her car in a horrific accident. > Miraculously, she managed to pry herself from the wreckage > without a scratch and was applying fresh lipstick when the state > trooper arrived. "My God!" the trooper gasped. > > "Your car looks like an accordion that was stomped on by an > elephant. Are you OK ma'am?" > > "Yes, officer, I'm just fine" the blonde chirped." Well, how in > the world did this happen?" the officer asked as he surveyed the > wrecked car. "Officer, it was the strangest thing!" the blonde > began. "I was driving along this road when from out of nowhere > this TREE pops up in front of me. So I swerved to the right, and > there was another tree! I swerved to the left and there was > ANOTHER tree! I swerved to the right and there was another > tree! I swerved to the left and there was ...." "Uh, ma'am," > the officer said, cutting her off, "There isn't a tree on this > road for 30 miles. That was your air freshener swinging back and > forth." > > > SEVEN Returning home from work, a blonde was shocked to find her > house ransacked and burglarized. > > She telephoned the police at once and reported the crime. The > police dispatcher broadcast the call on all the channels, and a > K-9 unit patrolling nearby was the first to respond. As the K-9 > officer approached the house with his dog on a leash, the blonde > ran out on the porch, shuddered at the sight of the cop and his > dog, then sat down on the steps. Putting her face in her hands, > she moaned, "I come home to find all my possessions stolen. I > call the police for help, and what do they do? They send me a > BLIND policeman > > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > Do not try the patience of Wizards, > for they are subtle and quick to anger. > ======================================================================= > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS ____________________________________________________________________ Get your own FREE, personal Netscape WebMail account today at http://home.netscape.com/webmail 1554 From: William Knowles Date: Sat Sep 23, 2000 0:27am Subject: Re: Vehicle Considerations On Fri, 22 Sep 2000, James M. Atkinson, Comm-Eng wrote: > Good Afternoon Folks, > > Here is a question for the list about vehicle considerations. > > Lets suppose that a TSCM'er wants to use/buy a Cube truck (such as > the small Ryder or U-Haul trucks with a fiber glass box on the > back). > > Now lets assume that the TSCM'ers wants to keep a relatively low > profile with the truck, but still needs something with that much > space in back. > > With that in mind what color would you lean toward, and would you > consider a NEW truck (about 35-40 grand), or perhaps simply > purchasing a used Ryder truck for a few grand. > > Discretion is most critical, but so is usable space in the cargo > area. Well I have pondered this once before (Security through Obscurity) and came to the conculsion that any van or box cube with the advertising of any plumber would work. Its not unusual to see plumbers truckes parked outside for days on end. This is something you could see at either a commerical or residential setting and not think twice about. Added points would be to have working phone numbers painted on the side and a service taking calls, and small yellow page ad. :) Worse case, You could style yourself like Zito and Switek and tool around Miami in the Bug Van. :) Cheers! William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 1555 From: A Grudko Date: Fri Sep 22, 2000 2:49pm Subject: Re: "Tap to Bug ratio" ----- Original Message ----- >Common terms: "Intercept" (a term not yet used in this debate but of equal interest) is to gather audio/video/data which is deliberatly radiated but not meant for the interceptor > I certainly hope that "Professor" J. Ross, possibly the ultimate authority on TSCM questions, never hears your definition of "intercept." Sorry, I don't know the professor's work. He is not widely discussed in Africa. Can you give us some points of references to access his TSCM work? > He would cringe and then quickly correct you, explaining that an > "intercepted" signal is one that never reaches its intended recipient (same > as an intercepted pass in football). OK, I think I see the semantics in play here. The Professor can un-cringe himself. I have no idea what a 'pass in football' is. Would 'Monitor' be better a better term in the context? Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), SAIS, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1556 From: A Grudko Date: Sat Sep 23, 2000 3:09am Subject: Fw: [sacipub] Mexico Forwarded to me by an SA PI ----- Original Message ----- From: Etienne Groenewald To: sacipub@eGroups.com My Groups | sacipub Main Page | Start a new group! MEXICO CITY--An angry President-elect Vicente Fox vowed Wednesday to discover who bugged his phone call with a top campaign aide, calling it a case of political espionage that underlined the need to reform Mexico's intelligence system. Etienne G. [Non-text portions of this message have been removed] 1557 From: A Grudko Date: Sat Sep 23, 2000 3:30am Subject: Re: Swiss Army TSCM (humour) ----- Original Message ----- From: > << Swiss Army knife >> > I wonder who does the sweeps for the Swiss Army? I understand they have use a Radio Shack '5-in-one-fold-out-tool' (I think Cat. # 66-8453), designed by Professor KFC Saunders (Col. Rtd.), consisting of: Countersurveillance receiver Telephone line analyser Non-linear junction detector TDR Fibre-optic probe The 66-8453 folds away to the size of an electric razor, which can be concealed in a dummy Philips case (66-8454). This equipment is only available to recognised Government Departments, Organised Crime Syndicates or persons who have bought a brass PI shield. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), SAIS, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1558 From: A Grudko Date: Sat Sep 23, 2000 4:39am Subject: Re: Wavecoms for video sniffing ----- Original Message ----- From: Robert G. Ferrell > >....what is PCS? Personal Cellular Service looks possible. > Usually it stands for Personal Communication Service (or System). A generic term for duplex digital wireless communcations operating at 1.9 GHz. Interesting. We don't seem to have much activity round Jo'burg in this band apart data/TV/cellular links, a few (unlicenced, i.e. illegal) cordless phones, some radar blips and low power 'wireless' LANs. Our cellphones are on 900 megs - we do not use 1.8 gigs, but it's coming. I just built a 900 meg - 2.8 gig receiver to interface with my Advanced Instruments OS for TCSM use. No demod., just a visual RF display. It also nicely detects close 400 meg TXs on second harmonic. It's based on an article/CircDiags in Radio Communication, November 1989, p44, (published in the UK) called 'Simple Spectrum Analyser', by Roger Blackwell (G4PMK) and followup unsourced reprinted articles called 'Satellite Band Scanner Unit' by Denis Mott (Nov 1990) and 'Satellite TV Video Amplifier/Filter' by CW Murray. I'm happy to fax copies (10 pages) to interested TSCM members as I guess there are no copyright implications on published articles. For bug sniffing I'm using a 1/4 wave GP and 10 db gain corner reflector for 900 megs - 1.2 gigs and 2 switchable LNBs for 1.2 - 2.8 gigs. Obviously very directional except for the GP. I've kept sensitivity down so that it is a near field detector (relative term, not measured or defined). Receiver, GP, LNBs and all cables are fitted in a standard size padded briefcase. Scope is seperate, as is the corner reflector. Results so far are good. Cellphone detection is good if the 'phone (and hence such bugs) is on power save mode (default) due to the difference in power output when speaking/listening. FM detection is good tested on a 10 mw TX @ 5 mtrs, including video (big difference between lights on/lights off. A mag light flashed round a 1200 sq mtr room quickly pinpointed the location of a concealed 1.2 gig. FM video cam/TX). I'm also tinkering with a broad band laser TSCM RX (300 GHZ+) based on a 5 page article in Practical Wireless, July 1999, p28, which I can fax on too. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), SAIS, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1559 From: Ted Swift Date: Sat Sep 23, 2000 8:13am Subject: Re: "Tap to Bug ratio" Andy: Monitor...that's it! But "intercept" works just fine for me. Sorry. I forgot that the "Professor" wasn't world renowned. Ted Swift At 09:49 PM 9/22/2000 +0200, you wrote: > >OK, I think I see the semantics in play here. The Professor can un-cringe >himself. I have no idea what a 'pass in football' is. > >Would 'Monitor' be better a better term in the context? > 1560 From: Jordan Ulery Date: Sat Sep 23, 2000 0:17pm Subject: Vehicle information In PI work the rule of thumb for vehicle color is that which blends in. Thus in the Southwest or Southeast a light color is less noticeable than is a dark color, because of the heat factor. The opposite is true north of the Mason-Dixon. While many people prefer black, Mr. Jimmie Mesis, in his lectures on surveillance, suggests that Forest Green is not as sinister as black and thus more "acceptable" in public perception. In a shady area the green vehicle disappears from sight, while the black actually stands out as a deeper shadow (Mil spec green is not a good color, too obvious, but the Forest Green is the same general idea). For the same reasons, black tinted windows are less important than windows shades and curtains on the inside of the window. The effect is the same, but less noticeable and thus more acceptable. Environment is also an issue. Doing testing outside a residential building or upscale commercial area would not be wise in a gaudy white and yellow truck. A smaller van (Astro/Safarri or even full-sized) would be less conspicuous. In a commercial/industrial area the use of a rented truck would be acceptable as many of the workers in the area are driving the same such vehicle. Environment also suggests being aware of gang activity (do you have to "rent" space), mob observation (North end of Boston, East Boston, Charlestown, etc.). ethnicity, criminal activity and personal protection elections. You must also have a story available for the curious, the inquisitive and noisy (anyone of which may be a neighbor, or "bad guy"). If budget permits and the environment suggests, a backup may be necessary. Not that this is common, but it needs to be considered. No I am not for jump suited commando type operations. Remember, you are outside, trying to be covert and someone may not want you to find what he or she did to your client. They may even have an "exceptionally sincere and deep interest" in preventing a bug from being found for whatever reason. Then again, you know your client and the reason you were asked to undertake your work. As for company names, the rule is don't use a real name. A generic name on a van like "Cable Services Systems" is ok. Just don't use Inc. or Ltd. as those titles create the impression you are a legal entity and thus places you in violation of all sorts of business laws and with which you really don't need or want to deal. With the proliferation of cable, broad band and such likes companies, along with telco services of whatever nature, a vehicle with a name suggesting such an affiliation would be virtually invisible to the public. A delivery truck (brown or white) can only stay in an area for a limited time before it becomes the object of conversation, i.e., why hasn't it moved on to the next delivery. A moving truck with empty boxes and people milling about is ok, if you have the $$ for extra persons. The problem is not, however, with the public, unless you are parked next to a school all day long and the neighbors see the van/truck moving with no one visible. This brings up the point of having the vehicle equipped with stabilizers to allow motion inside with out the shocks and springs causing the vehicle to reveal your presence. An alternative is to dismount a wheel as if having difficulty. Notice to law enforcement is a difficult question. Common courtesy suggests that you should do so. Professionalism suggests that it is none of their business (yet) as to what is going on. Occasionally the men in blue do not wear white hats, anymore that everyone in any other profession is all good or all bad. In addition, do you have the time to explain, likely in detail, exactly what you are doing and why it is legal and what is involved? The presence of cameras, video taping, etc. may take your from the realm of TSCM into that of the PI and thus subject you to additional PITA discussions with the cops, if uncovered or challenged. Supporting documentation should be available to quietly and quickly extradite oneself should the unfortunate occur. A new vehicle is noticeable and will attract attention merely because it is new. A slightly used vehicle would be better. If you elect a van and wish to escape the metal cage, try looking around the Elkhart, IN area where the vast majority of custom vehicles are manufactured. Between Goshen, Bristol, Nappanee and Elkhart you should be able to locate a van or truck with roll bars, but lightweight opaque roof and likely at a good price. Companies like CUES in Nashua, NH buy empty units from the manufacturers in that region and then make the specialty conversion there. Creature comforts for a long stay are vital. A portapotty and Jo-Mount portable air conditioner are important. Heat can be developed with portable heaters. Also take MREs and extra water. With the hydration, an empty windshield washer fluid jar and bottle of scented alcohol is essential. With all due deference to the obvious gender differences a "hat" can be secured from a pharmacy or hospital at little charge. Now, once you have created the most excellent covert surveillance vehicle. Why not lease it to others so that not everyone has to spend big bucks to do the TSCM monitoring. 1561 From: Steve Uhrig Date: Sat Sep 23, 2000 9:11pm Subject: Radiation measuring gear FS Hello list, This is not pertinent to TSCM but the type of people on this list would appreciate the value. I have some Canadian government surplus radiation measuring sets in new unused condition. These things are 60s and 70s vintage, purchased, never issued, and now excessed. Periodic calibration was performed during storage. Everything is in excellent physical condition and all equipment was built to the then-superb military standards. It probably is not possible anymore to buy equipment this well built and rugged. Each kit contains 10 dosimeters, 2 chargers and 2 handheld radiation meters. The chargers and meters are powered by a single D cell each. The dosimeters, for those who haven't seen them, are small tubes about the size of a fat pen you look through at a light. You see a round dial with a vertical needle that moves left to right across scale marked in Roentgens. No batteries used. The thing basically is an electrometer with the needle in a glass chamber pressurized with some sort of gas. There is an electrostatic charge on the needle holding it to one edge. I am speculating on the rest, but I believe beta and gamma rays somehow knock electrons loose from the gas atoms and they collect on the needle changing its charge. The needle moves across the screen in proportion to how much radiation the thing has seen. The dosimeter measures cumulative radiation over time. (minutes to months). These things always were extremely expensive, hundreds of dollars each in 1960 dollars. My father many years ago worked in areas where radiation was used, and he was required to wear one of these. I remember even back then the concern about cost. The charger is about the size of a fat cheese sandwich. You press the dosimeter down on a contact which activates a light so you can see the reading. It also activates an inverter which generates high voltage applied to the needle. A pot varies the voltage to zero the needle (called "charging"). Easy to do and takes only a few seconds. The chargers also are very rugged, with a schematic inside the cover and a spare bulb also. Simple point to point wiring, standard components, plenty of room inside. Easy to service if that ever would be necessary. The dosimeters are in various ranges but mostly in the high end. These were intended for serious up close and personal use, not reading the radiation from a radium wristwatch dial. I have mixed the values up as much as I could to give a variety of ranges with each kit. The dosimeters have a pocket clip, but the calibration assumes you will wear it at waist level although you see technoweenies wearing them in a pocket protector. The meters measure instant radiation, not cumulative like the dosimeters. They are simple and rugged also. 3 controls: a zero, a battery test and on/off. Each is in a new canvas O.D. carrying case with shoulder strap. Included is some literature for the layman on shelter construction and the like. Dated but still valid. I'm not as concerned about weapons of war as I am about Peachbottom Atomic Power Plant ten miles from my home. There is a warning siren on my street so we are considered in the danger area. If something happened, I rather doubt the government would tell the truth. With this stuff I can check radiation levels for myself, both immediately and over time. I got this gear into the country at the last instant. As of the end of August, the import of this gear into the U.S. is now prohibited as an implement of war. Even though they are totally defensive in nature, importing them now carries the same penalty as importing an illegal weapon. There are no restrictions (yet) on sales or possession in the U.S. Taking a lesson from history, next step will be a ban on sales, then possession. Why? These would be good items to put away "just in case". They are unlikely to spoil and may be more valuable in the future if sale is banned. We all could be wealthy by now if we would have known to put aside a bunch of full coverage scanners before the ones able to monitor cell freqs were banned. Each kit is in a cardboard box about half the size of a carton of photocopy paper. The individual meters and chargers are packaged in reusable styrofoam blocks which are good for storage. The kit is not heavy. The size is mostly protective packing (possibly for air drop?). Price for: 10 dosimeters 2 chargers 2 radiation meters Literature is $150 plus freight. Willing to work out special pricing for quantity orders (quantity meaning 5 or more). I would estimate the original cost to the government as maybe $5000 in 1960 dollars. These kits will not be around long as I have negotiated a deal to sell all remaining after individual sales to one of the mail order survival and law enforcement equipment operations. They plan to offer them for $250 each. I also need to recover the space upstairs in my barn. Can take credit cards for payment. Estimated post orifice shipping is $15. Buyer will pay exact cost. Can deliver to the BECCA conference in a few weeks although if you are flying in it would be easier and cheaper for me to ship them for you. There are no problems with *exporting* so international orders are welcome. Higher shipping charge, of course. Holler if questions. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: dj Date: Tue Sep 21, 2004 11:24am Subject: RE: ASIS DALLAS I will be there at the ASIS conference. Where else does one get to play with the new equipment? Shoot me an email and maybe we can all go out. IT2 garrettar@h... --------------------------------- Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! [Non-text portions of this message have been removed] 9741 From: walshingham2000 Date: Tue Sep 21, 2004 6:28pm Subject: Re: hardware based keyboard loggers -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Good Morning.. Hardware based (typically keyboards etc) key logging devices are not usually employed by government surveillance teams. The principal reason is that any target who suspects the presence of such devices, spends $10 USD at Radio Shack for a replacement keyboard. The fix is generally so easy and cheap that it would not merit intrusion etc to implant such a device. Once access to the system components has been gained, more covert options are available. Alan Taylor -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.3.6 (MingW32) - WinPT 0.7.92-cvs Comment: GPG HOME BASE v1.1.3-SMTP iD4DBQFBULiN7H26LUxZn78RAhMwAJd47ieBGpz4WMuE5nHYb0lvzzrsAJ47DMqO 6USp9HTKIxNWKkHgybsLWg== =cb/n -----END PGP SIGNATURE----- 9742 From: Dragos Ruiu Date: Tue Sep 21, 2004 7:11pm Subject: New video surveillance law... Url: http://customwire.ap.org/dynamic/stories/V/VIDEO_VOYEURS?SITE=DCTMS&SECTION=HOME&TEMPLATE=DEFAULT By JIM ABRAMS Associated Press Writer WASHINGTON (AP) -- Calling video voyeurism the new frontier of stalking, the House on Tuesday approved legislation to make it a crime to secretly photograph or videotape people, often for lascivious purposes. Under the legislation passed by voice vote, video voyeurism on federal lands would be punishable by a fine of not more than $100,000 or imprisonment for up to one year, or both. -- World Security Pros. Cutting Edge Training, Tools, and Techniques Tokyo, JapanNov 11-12 2004 http://pacsec.jp pgpkey http://dragos.com/ kyxpgp 9743 From: James M. Atkinson Date: Tue Sep 21, 2004 7:59pm Subject: Re: Re: hardware based keyboard loggers Ah, but not only do these Key Stroke Loggers have multiple built in backdoors, but they are extremely easy to detect with a VLF antenna (even if hidden inside the keyboad). Of course, if it is one cheesy plug-in units you can find then by simply examining the cabling with the naked eye. -jma At 03:37 PM 9/20/2004, John wrote: >Have you folks looked at the retail devices out there: > >http://www.keyghost.com/ > >" New compact design. Huge 2,000,000 Keystroke capacity! Store and >retrieve approx 12 months worth of typing. " > >Another of several: >http://www.amecisco.com/products.htm > >This could be wrapped in material similar to the keyboard cable to >avoid casual inspection. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9744 From: Mitch D Date: Wed Sep 22, 2004 11:47am Subject: TSCM School reference has anyone ever heard of this school? http://www.enterprisingsecurities.com/training/tec_sur_cm.html the syllabus looks halfway decent,just a lot to cover in 5 days imho,someone had asked me about it......... comments from attendees? ===== Mitch Davis TSCM/Special Operations Group Inc. Nashville,TN.USA MitchD@t... site:www.tscmusa.com. Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - 100MB free storage! http://promotions.yahoo.com/new_mail 9745 From: Date: Wed Sep 22, 2004 9:08am Subject: Fighting mad in Folcroft: Citizens want answers in police bugging incident Fighting mad in Folcroft: Citizens want answers in police bugging incident By CINDY SCHARR , cscharr@d... 09/22/2004 FOLCROFT -- In a strong show of support for borough police, more than 300 people crammed into the municipal gym Tuesday night, many demanding the prosecution of borough Manager Anthony Truscello and council President Joseph Zito for their alleged illegal surveillance of police. "I call on the District Attorney to vigorously prosecute this case," said Kenneth Rocks, national vice president of the Fraternal Order of Police. "Not only does it violate the law, but it violates the rights of the officers." At issue is what was discovered during a raid on borough hall by county detectives in May -- video equipment, about a dozen videotapes, a series of cables and other devices -- including a device used to hook up a tape recorder to a telephone line. Police also have copies of bills showing taxpayers footed nearly $10,000 in bills for the spy equipment. A crowd began gathering well before the 7 p.m. council meeting. Residents wanted to know why their tax dollars were being spent to spy on cops. "Tell me where my money is going," demanded Julia Ford. "Taxes ain‚Äôt cheap. Leave my money out of it." Police officers from across the county were on hand to support their colleagues in Folcroft. "The D.A.‚Äôs office hasn‚Äôt done anything," said FOP President Joe Fitzgerald. "We want it turned over to the state." Union members were there en masse: Teamsters Local 312, Steamfitters 420, Local 98 Electricians, Elevator Operators Local. So were members and officers of the borough‚Äôs Boys and Girls Clubs. Shortly before 7 p.m., people began filing into the small council chambers. At one point, some were told to leave because of overcrowding. This prompted the crowd outside to demand the meeting be moved to the gym. At one point, Truscello picked up his cell phone and called the emergency dispatcher to send state police because of the unruly crowd at the meeting. But the state troopers never showed. One of the many officers on hand noted that there were enough police in the building to handle the well-behaved crowd. The meeting was moved, and council took its seats on the bleachers on stage. Truscello hid behind a curtain next to the stage, prompting one person to loudly dub him the "Wizard of Oz." During the public comment portion of the meeting, speaker after speaker expressed outrage at the situation. Many demanded the resignation of Truscello, Zito and council. They also wanted to know who on council approved spending $10,000 on spy equipment. Their questions were never answered. The meeting ended about 8:30. As the large crowd began to disperse, they began to chant, "Truscello must go, Truscello must go." [Non-text portions of this message have been removed] 9748 From: syndracit Date: Wed Sep 22, 2004 2:36pm Subject: Re: Fighting mad in Folcroft: Citizens want answers in police bugging incident Well Maybe what he did was wrong with the taxes and all. But why was he spieng on the police? Maybe they were corrupt? Maybe they were trafficing drugs or abusing there power? Maybe he's to scared to come out with the truth in fear of his life. Something had to trigger him to do this, But are the motives warrented or un-warrented is the question. --- In TSCM-L@yahoogroups.com, NoPositiveWork@a... wrote: > Fighting mad in Folcroft: Citizens want answers in police bugging incident > > By CINDY SCHARR , cscharr@d... 09/22/2004 > > FOLCROFT -- In a strong show of support for borough police, more than 300 > people crammed into the municipal gym Tuesday night, many demanding the > prosecution of borough Manager Anthony Truscello and council President Joseph Zito for > their alleged illegal surveillance of police. > > "I call on the District Attorney to vigorously prosecute this case," said > Kenneth Rocks, national vice president of the Fraternal Order of Police. "Not > only does it violate the law, but it violates the rights of the officers." > > At issue is what was discovered during a raid on borough hall by county > detectives in May -- video equipment, about a dozen videotapes, a series of cables > and other devices -- including a device used to hook up a tape recorder to a > telephone line. Police also have copies of bills showing taxpayers footed > nearly $10,000 in bills for the spy equipment. > > A crowd began gathering well before the 7 p.m. council meeting. Residents > wanted to know why their tax dollars were being spent to spy on cops. > > "Tell me where my money is going," demanded Julia Ford. "Taxes ain‚Äôt cheap. > Leave my money out of it." > > Police officers from across the county were on hand to support their > colleagues in Folcroft. > > "The D.A.‚Äôs office hasn‚Äôt done anything," said FOP President Joe Fitzgerald. > "We want it turned over to the state." > > Union members were there en masse: Teamsters Local 312, Steamfitters 420, > Local 98 Electricians, Elevator Operators Local. So were members and officers of > the borough‚Äôs Boys and Girls Clubs. > > Shortly before 7 p.m., people began filing into the small council chambers. > At one point, some were told to leave because of overcrowding. This prompted > the crowd outside to demand the meeting be moved to the gym. > > At one point, Truscello picked up his cell phone and called the emergency > dispatcher to send state police because of the unruly crowd at the meeting. But > the state troopers never showed. One of the many officers on hand noted that > there were enough police in the building to handle the well-behaved crowd. > > The meeting was moved, and council took its seats on the bleachers on stage. > Truscello hid behind a curtain next to the stage, prompting one person to > loudly dub him the "Wizard of Oz." > > During the public comment portion of the meeting, speaker after speaker > expressed outrage at the situation. Many demanded the resignation of Truscello, > Zito and council. They also wanted to know who on council approved spending > $10,000 on spy equipment. Their questions were never answered. > > The meeting ended about 8:30. As the large crowd began to disperse, they > began to chant, "Truscello must go, Truscello must go." > > > > [Non-text portions of this message have been removed] 9749 From: Greg Horton Date: Wed Sep 22, 2004 11:08pm Subject: Re: Re: Fighting mad in Folcroft: Citizens want answers in police bugging incident Well, back east, there is a lot of union involvement. Did it ever occur to you that there might be an election coming (November is usually election month) The mayor may have been trying to see who the union was going to back or pick up some intel. No, it had to be drugs. Ya sure. 9750 From: James M. Atkinson Date: Thu Sep 23, 2004 10:40am Subject: Report: U.S. Airport Screeners Missed Weapons http://reuters.com/newsArticle.jhtml;jsessionid=0XILL52R2L204CRBAE0CFFA?type=domesticNews&storyID=6315468 Report: U.S. Airport Screeners Missed Weapons Thu Sep 23, 2004 08:28 AM ET WASHINGTON (Reuters) - Undercover investigators were able to slip explosives and weapons past security screeners during tests at 15 U.S. airports, according to a 2003 investigation by the U.S. Department of Homeland Security. Results of the department's tests, which were cited Thursday by USA Today, were presented in a classified report to members of Congress while a less detailed version was released by the agency's inspector general on Wednesday. Asked about the report, U.S. Undersecretary for Homeland Security Asa Hutchinson, said on Thursday changes had been made since investigators were able to get past airport security with guns, knives and box cutters in 2003. "That report was a year ago when the tests were made. Changes were made. We improved our training of the screeners and we've tested them since then and the proficiency rate has improved dramatically," Hutchinson told Fox News. USA Today quoted Florida Republican Rep. John Mica as saying the results on weapons were bad enough, but the results on explosives were "absolutely horrendous." "Unfortunately, it may take some horrific wake-up call (for security shortfalls) to get attention," said Mica, chairman of a House aviation subcommittee. The security shortcomings were blamed on poor training and management in the report which also cited the need for better equipment and technology. Airport screeners work for the Transportation Security Administration, a division of the homeland security department. An earlier report in 2003 by the Government Accountability Office had found that undercover agents were able to slip guns, knives and box cutters past screeners, the newspaper said. The TSA told Congress last November the agency would carry out more covert tests of airport baggage and passenger screening staff to see whether they detected simulated terrorist threats. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9751 From: contranl Date: Thu Sep 23, 2004 1:10pm Subject: Order a pizza ? . Order a pizza ? http://tinyurl.com/5qy2m :))))))))))))))))))))))) tetrascanner www.tetrascanner.com 9752 From: James M. Atkinson Date: Thu Sep 23, 2004 8:16pm Subject: Mintoff's government eavesdropped on Libyan phone calls http://www.timesofmalta.com/core/article.php?id=164184 Mintoff's government eavesdropped on Libyan phone calls, book claims Natalino Fenech Eavesdropping equipment the government had that was located at the headquarters of the police Special Mobile Unit at Ta' Kandja in the 1980s was used, it is being claimed, to intercept phone calls made from the Libyan embassy here when relations between the two countries had gone sour. The equipment was also later used to tap phones of prominent Nationalists, a new book says. The book, Libert‡ Mhedda, by journalist Dione Borg, is being released in a third enlarged edition with new information, photos and interviews. The book deals with the political violence in the 1980s and with the police raid on the PN headquarters, the killing of Nardu Debono, Wilfred Cardona and Raymond Caruana, the police frame-up of Pietru Pawl Busuttil, violence at mass meetings and other violent incidents that took place in the turbulent 1980s. The book has been enlarged with an additional 230 pages from the original edition of 400 pages. Among the documents shown, there is one by the Italian secret service that shows how SISMI, the Italian secret service, found out that eavesdropping equipment given by the Italian government was being used to intercept phone calls between Nationalists. The Italian secret service discovered that the Maltese government then had eavesdropping equipment given by Italian and Libyan governments. The book is based on documents and evidence released in Court in numerous cases and interviews with the protagonists of the era, including the former Labour leader, Karmenu Mifsud Bonnici, Eddie Fenech Adami, Guido de Marco, Louis Galea, former Labour minister Joe Grima, and former GWU general secretary Anglu Fenech. It also contains previously unpublished photos taken from helicopters of the Nationalist supporters trying to make their way into Zejtun for the meeting that was never held because of the violence that erupted. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9753 From: Date: Thu Sep 23, 2004 6:55pm Subject: Re: Ad Majorem Dei Gloriam Hi Jim; Thanks for the offer. I wanted to see the film in the movie but just ran out of time. I would appreciate if you could send a copy to me. The kids would like to watch it also. Please send this in VHS form. PS This TSCM group is really great and provides great information for new comers like me !!!!!!!!! Thanks Jim Ed Yagger N2VRT 17 Henderson St. Kenmore, New York 14217 [Non-text portions of this message have been removed] 9754 From: John <3v1l.hax0r@g...> Date: Fri Sep 24, 2004 0:04pm Subject: simple RF detector? Hello list, I was wondering if it would be possible to make a useful transmitter detector out of a Hand Held Wide Range Receiver like the AR8000 by building a very feeble antenna for it. My reasoning is a receiver that has been modified to only receive strong, very close signals (a few feet) could be useful as an expediant transmitter finder. I am sure there are many pitfalls to this, but might it be useful in some situations? (ie low budget). Thank you for any feedback. -- *I am not a blackhat* 9755 From: Tech Sec Lab Date: Fri Sep 24, 2004 5:20pm Subject: Acquisition FYI: LEA just bought AID. Merged. 9756 From: J. Coote Date: Fri Sep 24, 2004 9:34pm Subject: RE: simple RF detector? SHort answer is yes. Experiment around with antennas. There may be a cheap handheld scanner "shorty" antenna with poor performance, or you could put a 50-ohm or DC short on the antenna. Also, does the receiver have an attenuator button as some other AOR products? Depending on the field strength you are concerned about, a pair of of RF diodes set up as a voltage doubler RF detector, and driving a 10 to 50 uA DC meter movement will make a cheap RF detector. You also need a potentiometer and RF bypass capacitors. With a 1/4 wave antenna at 150 MHz, a 1/4 watt signal near 150 MHz eight feet away produced a full-scale deflection in my test unit. This is a detector that does not have to be tuned- the design cost me about $15 US in parts. Its use was to 1. Poke fun at $300 miracle bug detectors in a class I taught. 2. Detect only close, strong fields (You think you have detected it..now, where is it?). 3. 2-way radio service "quickie" tests and to embarass Motorola when they repeatedly could not diagnose an antenna connection problem in a $3,000 portable radio. Jay Los Angeles -----Original Message----- From: John [mailto:3v1l.hax0r@g...] Sent: Friday, September 24, 2004 10:05 AM To: tscm-l@yahoogroups.com Subject: [TSCM-L] simple RF detector? Hello list, I was wondering if it would be possible to make a useful transmitter detector out of a Hand Held Wide Range Receiver like the AR8000 by building a very feeble antenna for it. My reasoning is a receiver that has been modified to only receive strong, very close signals (a few feet) could be useful as an expediant transmitter finder. I am sure there are many pitfalls to this, but might it be useful in some situations? (ie low budget). Thank you for any feedback. -- *I am not a blackhat* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9757 From: J. Coote Date: Sat Sep 25, 2004 1:34pm Subject: Antennas for Spectrum Analyzer? I am looking for a long, telescoping whip antenna (preferably with a spring and 90-deg swivel) and N-male connector for use with a 492BP analyzer. All the telescoping antennas I have seen are never longer than 20 to 24 inches and BNC. I need the longer whip for better performance in the VHF "Low" band, when a discone is not appropriate. Anyone been there, done that? Thanks, Jay 9758 From: Steven Donnell WA1YKL Date: Sat Sep 25, 2004 2:26pm Subject: Re: simple RF detector? Hi, The problem w/ a consumer/Ham grade receiver such as the AR8000, is that it is so poorly shielded that it will receive most/many nearby/strong ambient carriers w/o ANY sort of antenna connected at all. Mind you, Im not trying trash about the AR8K, I have one and use it all the time for assorted TSCM activities,,. Although it does help to understand its weaknesses; One of which is that while you dont have to worry as much about receiving false signals due to "image reception" as you would in many VERY cheap scanners, there is a problem due to spurs on the 1st Local Oscillator that will result in reception of strong carriers that are offset from whatever you have dialed in for a freq by a value of 12.8 MHz(I think,). As to a simple "poor" antenna, in a pinch theres always the classic paper clip. It has worked for me,,. There are several varieties of "ultra stub duck" antennas out there marketed under the Comet and Diamond names. The Comet D32(I think thats the right #) is the same antenna that Optoelectronics sells w/ their Scout freq counter. I think even Radio Snack sells one thats intended for use w/ a scanenr when at a race track, etc. One that you can make yourself is simply a piece of wire or even better RG58 coax, inserted into the center pin of a male BNC connector. Strip off the jacket and sheild from the coax, and trim the center lead back to about an inch or two,,. One technique Ive found handy when using a portable receiver to sniff out a transmitter is by way of signal harmonics: Once you ID a strong ambeint carrier, dial in a freq that is x2, x3 ,x4 or even x7(depending on how high the rec goes,) from the primary(fundemental) freq that you first noticed the signal on. The harmoics(multiples) of the signal should be progressively weaker the higher you go. This should allow you to easily hone in on exactly where the signal is coming from. Enjoy Steve John wrote: > Hello list, > > I was wondering if it would be possible to make a useful transmitter > detector out of a Hand Held Wide Range Receiver like the AR8000 by > building a very feeble antenna for it. > > My reasoning is a receiver that has been modified to only receive > strong, very close signals (a few feet) could be useful as an > expediant transmitter finder. > > I am sure there are many pitfalls to this, but might it be useful in > some situations? (ie low budget). > > Thank you for any feedback. > > -- > > *I am not a blackhat* > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > 9759 From: Michael Puchol Date: Sun Sep 26, 2004 10:00am Subject: Re: Antennas for Spectrum Analyzer? Hi Jay, You could use a right-angle N adapter, and make an antenna cut for whatever frequency is needed with a male N connector. Guitar wire or a similar flexible type is also practical if you can hang it from somewhere with nylon, allows you to make longer wips without the rigidity, makes them easy to carry. Regards, Mike ----- Original Message ----- From: "J. Coote" To: Sent: Saturday, September 25, 2004 8:34 PM Subject: [TSCM-L] Antennas for Spectrum Analyzer? > I am looking for a long, telescoping whip antenna (preferably with a spring > and 90-deg swivel) and N-male connector for use with a 492BP analyzer. All > the telescoping antennas I have seen are never longer than 20 to 24 inches > and BNC. I need the longer whip for better performance in the > VHF "Low" band, when a discone is not appropriate. Anyone been there, done > that? > > Thanks, > Jay > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > 9760 From: A Grudko Date: Sun Sep 26, 2004 3:07pm Subject: RE: Antennas for Spectrum Analyzer? -----Original Message----- From: J. Coote [mailto:TSCM@j...] > I need the longer whip for better performance in the VHF "Low" band, when a discone is not appropriate. Anyone been there, done that? Audiotel Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.764 / Virus Database: 511 - Release Date: 2004/09/15 [Non-text portions of this message have been removed] 9761 From: J. Coote Date: Sun Sep 26, 2004 6:40pm Subject: Receiver Spurs In a recent thread, someone commented on RF oscillations that originate in our TSCM receivers. I find it helpful to make a spur or birdie chart for each receiver. Connect a 50-ohm pad to the receiver antenna terminal. Some leaky receivers may require a vault or screen room to test. Depending on whether your receiver is computer- driven or not, log and tag the spurs for future reference or type a hardcopy spur list you can laminate and keep in the receiver case. A Spur 101 story: I heard the office background music (local FM station) on a frequency other than the FM station, in a different band. The modulation was FM, but narrow! My first thought was a transmitter picking up room audio, but the signal turned out to be coming from an oscillator in the FM tuner used for MOH and background music in the office. Jay Los Angeles 9762 From: James M. Atkinson Date: Sun Sep 26, 2004 9:59pm Subject: Re: Antennas for Spectrum Analyzer? Have you tried an active rod/monopole antenna? They tend to have superior performance on your lower frequencies, and can be fairly small. Also, consider purchasing, and then modifying a commercial speaker stand. These are normally used by professional musicians to hold heavy speakers, and cost only a few dollars each. Simply replace the center post with a 1.5 inch copper pipe, and solder a solid copper cap to the top. Mount the antenna connector of your choice to the copper cap so that you can screw an element to the top and give your self a really excellent antenna. -jma At 02:34 PM 9/25/2004, J. Coote wrote: >I am looking for a long, telescoping whip antenna (preferably with a spring >and 90-deg swivel) and N-male connector for use with a 492BP analyzer. All >the telescoping antennas I have seen are never longer than 20 to 24 inches >and BNC. I need the longer whip for better performance in the >VHF "Low" band, when a discone is not appropriate. Anyone been there, done >that? > >Thanks, >Jay ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9763 From: satcommunitfive Date: Sun Sep 26, 2004 9:22pm Subject: Re: Receiver Spurs Yes I do this too -a very good idea. [birdy charts] The XLT9000 uniden puts out so much IF at all sorts of frequencys I have to turn it off when scanning for items I also use the spectrum analyser program on a PC with the AOR8600 MKII to plot birdys [with a PAD on the antenna] I would like to put in in a sheilded box and scan 1Mhz to 3Ghz and see what comes out using a spec-ann & probe M --- In TSCM-L@yahoogroups.com, "J. Coote" wrote: > In a recent thread, someone commented on RF oscillations that originate in > our > TSCM receivers. I find it helpful to make a spur or birdie chart for > each receiver. Connect a 50-ohm pad to the receiver antenna terminal. Some > leaky receivers > may require a vault or screen room to test. Depending on whether your > receiver is computer- > driven or not, log and tag the spurs for future reference or type a hardcopy > spur list you can laminate and keep in the receiver case. > > A Spur 101 story: > I heard the office background music (local FM station) > on a frequency other than the FM station, in a different band. The > modulation > was FM, but narrow! My first thought was a transmitter picking up room > audio, > but the signal turned out to be coming from an oscillator in the FM tuner > used for MOH and background music in the office. > > Jay > Los Angeles 9764 From: satcommunitfive Date: Sun Sep 26, 2004 9:33pm Subject: Re: Antennas for Spectrum Analyzer? Buy a loaded whip antenna for the freq you require -the kind that VHF walkie-talkies /2ways use. [very small and deaf] For UHF+ [400 to 3Ghz ]I use mini discones [I make em ! ] then switch to a LOG. or small whip I think most of the comercial equipment looks the part -looks sexy -costs heaps but does not come close to properly designed antennas I also use 3-10DB attenuators on my equip to get rid of the noise floor [sort of] this works well on optoelectronics gear etc. ps ICOM sell a wideband antenna that is quite good FA-B01RE only 16cm long and works OK at VHF M 9765 From: James M. Atkinson Date: Mon Sep 27, 2004 1:21pm Subject: RE: Antennas for Spectrum Analyzer? How low are you trying to get? I mean, the lowest frequency. -jma At 04:07 PM 9/26/2004, A Grudko wrote: > -----Original Message----- > From: J. Coote [mailto:TSCM@j...] > > > I need the longer whip for better performance in the > VHF "Low" band, when a discone is not appropriate. Anyone been there, >done > that? > > Audiotel ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9766 From: kc0uu Date: Mon Sep 27, 2004 1:04pm Subject: Re: Antennas for Spectrum Analyzer? Jay, Try this site... http://www.buddipole.com/budac.html . They hav a nice whip... description: stainless steel (not aluminum!) telescopic whips that extend to 66" and collapse to just 13". The base is standard 3/8-24 threaded brass which is reinforced for durability. Copper sleeves are used between tubes for conductivity. Price is for one whip. I've used their components in ham radio projects and they are all of high quality. While you are there, look at the " Buddipole " portable (man-transportable) HF antenna. I've used the home-made version of that from hotel rooms all over the country with a qrp station. Cheers, JohnM --- In TSCM-L@yahoogroups.com, "J. Coote" wrote: > I am looking for a long, telescoping whip antenna (preferably with a spring > and 90-deg swivel) 9768 From: CP Date: Mon Sep 27, 2004 8:08pm Subject: On Line Electronics Study Courses? Anyone know a good on-line basic electronics study course, probably a ham radio course? I know I can go to ARRL and also find some by searching but I wonder if anyone has good first hand reports? I want to get some basic electronics training as a starting point for my son (19) who has shown an interest in helping with sweeps. He's good on the computer side of things but lacks the electronics background. Thanks Charles Charles Patterson Global Communications Tarrytown, NY cp@t... www.telephonesecurity.com 9769 From: contranl Date: Mon Sep 27, 2004 11:03pm Subject: Re: Receiver Spurs, and Ants . Check out my "Birdies" list of the new Icom-R20 scanner, www.tetrascanner.com in the R20 section I have always wondered if some manufacturers use software-tricks to make it look like a receiver would'nt have any birdies (by changing something only for that specific "birdie" frequency...for example a "secret attenuation") You would have to sweep and measure the whole frequency-range to find such a "hidden" trick. Fantastic idea i get just now.....you find out what sweeping equipment is used by your "target to be bugged" then you bug him on the birdie-frequency from his sweeper...there's a good chance he won't find anything offcourse that's only usefull if the guy has only one piece of equipment :( There is a name for that last trick...hiding a bug under or close to a strong rf-carrier like for example a local broadcast transmitter, i only remember the first letter "S......" A way to avoid birdies in a receiver could be the automatic changing of the mixing-frequencies and oscillators on channels with "problems" ...i have never seen that. Tetrascanner 9770 From: A Grudko Date: Tue Sep 28, 2004 3:04am Subject: RE: Re: Receiver Spurs, and Ants -----Original Message----- From: contranl [mailto:contranl@y...] > There is a name for that last trick...hiding a bug under or close to a strong rf-carrier like for example a local broadcast transmitter, i only remember the first letter "S......" 'Snuggeling' as in "we snuggeled up together under the blanket as the snow fell outside' Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.764 / Virus Database: 511 - Release Date: 2004/09/15 [Non-text portions of this message have been removed] 9771 From: dj Date: Mon Sep 27, 2004 8:23pm Subject: Re: On Line Electronics Study Courses? try the NEETS mods with the navy IT2 Garrett __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com [Non-text portions of this message have been removed] 9772 From: J. Coote Date: Mon Sep 27, 2004 8:39pm Subject: RE: Antennas for Spectrum Analyzer? Lowband, 5 or 6 feet would help a lot... 6' = 39 Mhz Jay -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Monday, September 27, 2004 11:22 AM To: TSCM-L@yahoogroups.com; TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Antennas for Spectrum Analyzer? How low are you trying to get? I mean, the lowest frequency. -jma At 04:07 PM 9/26/2004, A Grudko wrote: > -----Original Message----- > From: J. Coote [mailto:TSCM@j...] > > > I need the longer whip for better performance in the > VHF "Low" band, when a discone is not appropriate. Anyone been there, >done > that? > > Audiotel ---------------------------------------------------------------------------- ------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS From: James M. Atkinson, Comm-Eng Date: Sat Sep 23, 2000 9:58pm Subject: Re: Vehicle information At 1:17 PM -0400 9/23/00, Jordan Ulery wrote: > >In PI work the rule of thumb for vehicle color is that which blends in. >Thus in the Southwest or Southeast a light color is less noticeable than >is a dark color, because of the heat factor. The opposite is true north >of the Mason-Dixon. > >While many people prefer black, Mr. Jimmie Mesis, in his lectures on >surveillance, suggests that Forest Green is not as sinister as black and >thus more "acceptable" in public perception. In a shady area the green >vehicle disappears from sight, while the black actually stands out as a >deeper shadow (Mil spec green is not a good color, too obvious, but the >Forest Green is the same general idea). For the same reasons, black >tinted windows are less important than windows shades and curtains on >the inside of the window. The effect is the same, but less noticeable >and thus more acceptable. I can just see a TSCM team showing up in a fleet of black trucks, armored Suburbans and Humvee's with tinted windows. Up hear in New England the tradesman/repair people tend to use GMC or Ford vans, with about 1/4th of then being cube trucks, and the balance regular service vans (panel trucks are actually rare excpet for deliver people). In New England, WHITE is the most popular color, followed by Silver, and then Yellow (typically and old Ryder truck). >Environment is also an issue. Doing testing outside a residential >building or upscale commercial area would not be wise in a gaudy white >and yellow truck. A smaller van (Astro/Safarri or even full-sized) >would be less conspicuous. In a commercial/industrial area the use of a >rented truck would be acceptable as many of the workers in the area are >driving the same such vehicle. Environment also suggests being aware of >gang activity (do you have to "rent" space), mob observation (North end >of Boston, East Boston, Charlestown, etc.). ethnicity, criminal activity >and personal protection elections. I agree that the Yellow trucks might look out of place, but up in this area the white trucks would be fine (unless of course you would be using it for surveillance). I've been using rented cube trucks for years, but they are really only practical outside of high density area (ie: Downtown Boston). They work great on sweeps in office parks, research facilities, and so on when you can get the vehicle really close to the area you will be sweeping. >You must also have a story available for the curious, the inquisitive >and noisy (anyone of which may be a neighbor, or "bad guy"). If budget >permits and the environment suggests, a backup may be necessary. Not >that this is common, but it needs to be considered. No I am not for >jump suited commando type operations. Remember, you are outside, trying >to be covert and someone may not want you to find what he or she did to >your client. They may even have an "exceptionally sincere and deep >interest" in preventing a bug from being found for whatever reason. >Then again, you know your client and the reason you were asked to >undertake your work. ..."Just working on some computer/network/phone" problems has always worked well for me. Also, I try to dress to match the people I am working around (typically slacks and a Jacket in the office, and Jeans when I start working in the ceilings). I love the guys who dress like a SWAT Entry Team when they show up for a sweep (complete with body armour and low rise drop holsters). >As for company names, the rule is don't use a real name. A generic name >on a van like "Cable Services Systems" is ok. Just don't use Inc. or >Ltd. as those titles create the impression you are a legal entity and >thus places you in violation of all sorts of business laws and with >which you really don't need or want to deal. Or you could create a register a proper business name (unrelated to your primary business) and plaster it all over your truck, tools, and so on. However, if you are performing a "high visibility" sweep (EP folks know what this is all about) then you want you names all over everything, lots of antennas visible, cable everywhere, and so on. The purpose of course being that of sending a message to an eavesdropper of "don't even think about it..." >With the proliferation of cable, broad band and such likes companies, >along with telco services of whatever nature, a vehicle with a name >suggesting such an affiliation would be virtually invisible to the >public. A delivery truck (brown or white) can only stay in an area for >a limited time before it becomes the object of conversation, i.e., why >hasn't it moved on to the next delivery. A moving truck with empty >boxes and people milling about is ok, if you have the $$ for extra >persons. Or you can use your clients name on your vehicle so long as they give you appropriate permissions (several of mine have even loaned me vehicle signs, sterile plates, and so on). >The problem is not, however, with the public, unless you are parked next >to a school all day long and the neighbors see the van/truck moving with >no one visible. This brings up the point of having the vehicle equipped >with stabilizers to allow motion inside with out the shocks and springs >causing the vehicle to reveal your presence. An alternative is to >dismount a wheel as if having difficulty. Good point, but if you practice good tradecraft you will not be moving around in the vehicle very much anyway. >Notice to law enforcement is a difficult question. Common courtesy >suggests that you should do so. Professionalism suggests that it is >none of their business (yet) as to what is going on. Occasionally the >men in blue do not wear white hats, anymore that everyone in any other >profession is all good or all bad. In addition, do you have the time to >explain, likely in detail, exactly what you are doing and why it is >legal and what is involved? I have found that it is most unwise to alert law enforcement to your activities unless you find something (assuming that your performing a sweep). As much as I hate to say it, letting local LE folks know that a TSCM activity is going to be active is a really good way to screw up the OPSEC of a sweep. It doesn't matter WHO installed the device, your job is to ferret it out, period. Now if you know it is a legal device, then of course you will (or should) back out of the engagement. >The presence of cameras, video taping, etc. may take your from the realm >of TSCM into that of the PI and thus subject you to additional PITA >discussions with the cops, if uncovered or challenged. Supporting >documentation should be available to quietly and quickly extradite >oneself should the unfortunate occur. Good point >A new vehicle is noticeable and will attract attention merely because it >is new. A slightly used vehicle would be better. If you elect a van >and wish to escape the metal cage, try looking around the Elkhart, IN >area where the vast majority of custom vehicles are manufactured. >Between Goshen, Bristol, Nappanee and Elkhart you should be able to >locate a van or truck with roll bars, but lightweight opaque roof and >likely at a good price. Companies like CUES in Nashua, NH buy empty >units from the manufacturers in that region and then make the specialty >conversion there. I like the Opaque roofs as you get decent light, and fairly good RF signal penetration. >Creature comforts for a long stay are vital. A portapotty and Jo-Mount >portable air conditioner are important. Heat can be developed with >portable heaters. Also take MREs and extra water. With the hydration, >an empty windshield washer fluid jar and bottle of scented alcohol is >essential. With all due deference to the obvious gender differences a >"hat" can be secured from a pharmacy or hospital at little charge. Minimizing the coffee you drink prior to the engagement will also help you deal with such calls of nature. >Now, once you have created the most excellent covert surveillance >vehicle. Why not lease it to others so that not everyone has to spend big bucks to do the TSCM monitoring. Ahem... we're not talking about a surveillance vehicle... but a mobile TSCM lab suitable for performing many of the functions of a TSCM sweep without (at least initially) dragging 1000 pounds of gear though the clients front door. At a minimum it would minimize the amount of gear you have to unload, as some equipment could/would be permanently mounted in the vehicle. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1563 From: A Grudko Date: Sun Sep 24, 2000 3:37am Subject: Re: Radiation measuring gear FS -- Original Message -- From: Steve Uhrig > The charger is about the size of a fat cheese sandwich. An interesting scale... > Even though they are > totally defensive in nature, importing them now carries the > same penalty as importing an illegal weapon. In the same category as Cuban cigars? There are no > restrictions (yet) on sales or possession in the U.S. > Taking a lesson from history, next step will be a ban on > sales, then possession. > Price is $150 plus freight. My Ops. Director is in Houston TX right now. Can you get one to him? > Can take credit cards for payment. Estimated post orifice > shipping is $15. Buyer will pay exact cost. > I'm not as concerned about weapons of war as I am about > Peachbottom Atomic Power Plant ten miles from my home. > There is a warning siren on my street so we are considered > in the danger area. If something happened, I rather doubt > the government would tell the truth. I live about the same distance from the Palindaba Atomic Energy Commission Plant, where SA's atomic bombs were built and stored during the apartheid era. They tell us the green glow at night is from aircraft navigation lights.......I thought they were red? About 25 sq. km of airspace which if you fly over a fighter is mobilised to chase you away, even today. In my kitchen hangs a 2000 AEC calendar with instructions on what to do if you hear sirens (place head between legs and kiss your ass goodbye). I'll take a kit, before all those survivalists in Montana and the South take 'em all... Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), SAIS, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1564 From: A Grudko Date: Sun Sep 24, 2000 3:52am Subject: Re: Vehicle information We don't use special vehicles/covers for our TSCM assignments but do for covert ops. Favourites include: Clip-on illuminated Taxi sign Magnetic signs saying 'Pete's Pool Service' or 'Pete's Plumbers' etc. Velcro mounted blank screens over van rear compartment windows 'Armed Response' signs (private security patrols - very popular in South Africa) We're not hindered by laws which stop you pretexting unless you are obviously commiting another offence where the pretext was a component of the act (i.e. you claimed to be from the cable company to gain access and then committed a murder). Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), SAIS, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1565 From: Steve Uhrig Date: Sun Sep 24, 2000 10:49am Subject: Re: Radiation measuring gear FS Once upon a midnight dreary, A Grudko pondered, weak and weary: > My Ops. Director is in Houston TX right now. Can you get one > to him? Of course. Get me his address soonest and I will get one out to him. Everything could be unpacked and easily fit in a corner of a large suitcase. Shame to lose the custom moulded styrofoam boxes though. What would you like to do for payment? Any credit card is OK, or almost any check. USD $165 including shipping or the day's equivalent in your local currency. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1566 From: Robert G. Ferrell Date: Mon Sep 25, 2000 10:33am Subject: RE: Vehicle Considerations >>I guess it depends on where you are, but here in Oklahoma, >>Ryder Trucks (or any big rental trucks for that matter) parked >>for any length of time, tend to cause a second look and a little >>more scrutiny. Make that anywhere there is a federal presence. I was trying to get from Rosslyn to Alexandria (both Washington, DC suburbs) in 1997 and had to take a long circuitous route to avoid the "police incident" on the main freeway connecting the two. Turns out some poor shlub's Ryder truck ran out of gas on an overpass near the Pentagon. He hiked off with his little can to find a station. When he got back, half the local police force, Pentagon police, MPs and bomb squads from Ft. Myer and neighboring military bases, and for all I know the head groundskeeper from Arlington National Cemetary had cordoned off the entire area and were in the process of evacuating who knows how many people from adjacent structures. I wouldn't have wanted to be either the truck driver or the official in charge of the incident scene. My point is that Ryder trucks, and to a certain extent all two or three axle rental trucks, are poor choices in many areas of the U.S. for clandestine activities. I know they make _me_ nervous. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 1567 From: Steve Uhrig Date: Mon Sep 25, 2000 11:53am Subject: Tracking equipment scam This article reiterates what I have preached over and over about dealing with places like this. If it seems too good to be true, it probably is. Some tend to overlook that because they are so desperate to believe in fairy tales. That's how spy shops stay in business. http://www.wired.com/wired/archive/7.10/spam.html When the system in the above article was first announced, with a huge saturation advertising and publicity campaign, I got a number of calls from places wanting us to develop a competitive piece. They all thought I was an incompetent clod when I said the job could not be done. Caveat emptor, more in this line of work than many others. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1568 From: 1RCM <1RCM@M...> Date: Sat Sep 23, 2000 10:12am Subject: Vehicles Jim, It is understood that the individual wants a larger 'box' vehicle to haul all of their equipment as well as to set-up some whopper antennas inside while doing an external RF survey. Being that the survey would usually run no more than 24-48 hours here's a crazy suggestion: Buy the used Ryder (or whatever rental company is most common in their area). When they sell them they usually simply leave the logos intact (continued free advertisement for them) or at most they try to 'clean them off' a bit with paint thinner. Either way the logos or the outlines still remain rather visible (they sold it to you that way = no fraud on your part if you never quite get around to getting the thing repainted). And who pays excess attention to another rental moving truck out there (unless of course you are in Oklahoma as one reader pointed out)? Then park the critter wherever it may be needed (legally, of course, not in tow-away zones, blocking traffic, etc.). Tie a good-sized piece of white cloth on the antenna as the universal signal of a disabled vehicle (pull the distributor cable if your morals will lot let you tell a small white lie while doing some slight of hand deception or simply as 'insurance' should you need to show someone that the thing doesn't run at some point). Put a short HANDWRITTEN note (surprisingly folks try to pull this whole gag off while using a nice long note generated on a PC and printed in color) on the driver's window or on the dash on the driver's side stating that you were in the process of moving to a new apartment and the damn truck broke down (just quit running) and that you will be getting a new truck and have this one removed ASAP. Include a working phone number which is NOT your business number. Then if local law enforcement calls you can explain the true presence of your truck (or your 'cover story' of the break-down of a piece of crap you just bought from Ryder if you don't trust whom you are talking to) and as long as you seem 'legitimate or respectful ', depending on which story you tell them, you will most usually get an 'official' day or two to have the thing moved. If the property owner calls just play on his sympathy and get your day or two. If a nosy neighbor or someone else calls - just play it as it 'feels'. If no one calls at all then you have your survey and your truck can be driven-off to its next adventure. And I never once yet heard of a vehicle being towed before a call was made when this little gag was used. Yes, in a way you are drawing some attention to your vehicle - but who cares as long as you can control whatever takes place from there. 'Just another Bob' 1569 From: Talisker Date: Sun Sep 24, 2000 5:56am Subject: oops Hi all A while back there was a brilliant post on how the the UK Security Service are training industry to be bug-hunters. however I deleted the mail thinking there would be an archive. Has anyone got a link to the article?? thanks in advance Andy http://www.networkintrusion.co.uk/ The IDS List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. 1570 From: Talisker Date: Sun Sep 24, 2000 6:51am Subject: Re: TEMPEST (tap to bug ratio) Ray TEMPEST isn't just about spatial emanations it can be just as easily applied to line borne emanations, I have an FAQ on my site below (heavily censored of course) As to the Tap vs Bug saga, I see a tap as a method of "tapping" into the communication medium ie a parrallel physical connection, transparent to the victim. I see a bug as the any device allow you to eavesdrop on a victim which may include a tap. However in the context of this thread I would see it as a spatially transmitted eavesdropping device how about rather than "tap vs bug" making it "line borne vs spatial" Just my 2 cents (pence) Andy http://www.networkintrusion.co.uk/ The IDS List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "Raymond M." To: Sent: Thursday, September 21, 2000 1:07 AM Subject: Re: [TSCM-L] "Tap to Bug ratio" > > I think you got most of it right, but I think you missed this point: > > "Tapping" data and analog lines is considered to be a non intrusive (usually require > non entry, i.e. TEMPEST) type collection effort. > > "Bugging" usually requires an intrusive type of attack like physically installing a > device or causing a solder glob on > the right pair of connections for loss of intelligence from the targetted area. > > > Public? What do they know? > The general public thinks that Molder & Skully uses their cellular phones to talk > secure. :-) > I guess they forgot about O.J. and the Bronco. > > -Ray M. > > > > Common terms: > > > > I think that to the public, 'Bugged' simply means that someone is covertly > > intercepting a communication. To them, 'Tapped' only refers to phones. > > > > My understanding is that; > > > > 'TAP' is the physical (including inductive) attachment to an existing cable > > which by design carries signal/data, for the purpose of covert > > interception. > > > > "Bug" is the covert electronic interception of a conversation/data using > > some kind of introduced radiated transmission. > > > > "Intercept" (a term not yet used in this debate but of equal interest) is > > to > > gather audio/video/data which is deliberatly radiated but not meant for the > > interceptor (pager, cellular phone, cordless phone, 2-way radio, radio > > trunking, mains-modulation, baby-monitors, wireless intercoms etc) > > > > Andy Grudko > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1571 From: Bob Washburne Date: Sun Sep 24, 2000 10:03am Subject: Re: Combining Earth, Fire, and Water "James M. Atkinson, Comm-Eng" wrote: > > Of course if you give a skilled TSCM'er a quarter million in > equipment he can find virtually any kind of technical mischief... the > symphony is in the skill of the musicians, not in the value of the > instrument (owning a Stradivarius doe not make you Yo Yo Ma). > > -jma > I once asked my old music teacher - a man for whom I had much respect - if it was worthwhile for me to buy a more expensive instrument. His responce was that while there was no substitute for hard work and skill, "A better instrument will always make a better musician." or While Yo Yo Ma with a Bundy will sound better than Atkinson with a Stradivarius, Yo Yo Ma with a Stradivarius will sound better than Yo Yo Ma with a Bundy. (Bundy manufactures "cheap" instruments for school kids.) We tend to sneer at those who try to "buy into" the business, but it would be foolish to ignore either side of the tools/skill equation. And I don't believe for one moment that James is suggesting that we dress up carefully in our professional suit and tie and then show up with a coat hanger and a flashlight in our teeth. I see my professional growth as advancing on three fronts: 1) refine current skills 2) acquire new skills 3) acquire/improve tools Bob Washburne 1572 From: James M. Atkinson, Comm-Eng Date: Mon Sep 25, 2000 3:58pm Subject: Re: Tracking equipment scam It is a great article, and a textbook example of how hype and bullshit can be used by people to fleece folks out of a boatload of cash. Sadly, quite a few people listen more to "pipe dreams of instant wealth" when they should be listening more to their common sense... but then again common sense is none too common. Every year the security industry sees hundreds, if not thousands of similar products being offered every year. When you cut though all the media hype, hyperbole, and outright bullshit and locate the truth being what is being offered the difference is incredible. What is really amazing is that the "spookier" the product or service, the easier it is for a con artist to operate. Of course what is even more interesting are the number of con artists who prey on the security community. Every month it's some new surveillance product (usually illegal), some new crypto or scrambler, a new database or software, some brilliant new ID badge, and so on infinitum... -jma At 12:53 PM -0400 9/25/00, Steve Uhrig wrote: >This article reiterates what I have preached over and over >about dealing with places like this. > >If it seems too good to be true, it probably is. > >Some tend to overlook that because they are so desperate to >believe in fairy tales. That's how spy shops stay in >business. > >http://www.wired.com/wired/archive/7.10/spam.html > >When the system in the above article was first announced, >with a huge saturation advertising and publicity campaign, >I got a number of calls from places wanting us to develop a >competitive piece. They all thought I was an incompetent >clod when I said the job could not be done. > >Caveat emptor, more in this line of work than many others. > >Steve >Archive | 7.10 - Oct 1999 | Feature > > >Anatomy of a Spam > >It all started with a hot email pitch for a miraculous product. >Wired turned detective to find the truth. > >By Bob Parks > >The message had all the hallmarks of a Net come-on, the text >crawling down the screen like a snake: > >ANNOUNCING: THE WORLD'S FIRST LINE OF PERSONAL SATELLITE TRACKING DEVICES!! > These are worn as a bracelet by a child or carried in pocket or >purse by an adult. > Now You can INSTANTLY LOCATE missing loved ones or personal >property such as an automobile, even your favorite pet. > THE PROBLEM OF MISSING, LOST, or ABDUCTED CHILDREN HAS BEEN SOLVED! > CRIMINALS BEWARE!!! > >Granted, it lacked the instant attraction of email with subject >lines like "Non-Surgical Liposuction," "$7 Investment Nets Thousands >$$$$," or "SEXUALLY ATTRACT WOMEN EASILY!" But this spam message >intrigued me, because it concerned a device that will >cause a sensation if it ever hits the market. Tracking devices using >Global Positioning System satellites have been developed for >luxury cars and boats, but no one has produced anything as advanced >as what this spam described, a personal "kid-tracking" >device small enough to wear as a bracelet. > >For such a gizmo to work, several technological breakthroughs would >be required. One problem is that a satellite tracker will need >both a GPS receiver and a radio transceiver, and it's difficult to >shrink both components into a neat, reliable package. The >receiver calculates the user's location from the 24 government GPS >satellites hovering 12,551 miles above the earth, while the >transceiver sends the location to someone on the ground via cellular >network. Though GPS works all over the world, cellular >networks cover only certain countries and regions. Most cell >networks in the US are equipped for voice and aren't optimized for >sending data, such as latitude and longitude readings. Sufficient >battery power is another hurdle, as is the difficulty of receiving >satellite signals while indoors - GPS requires line of sight to the sky. > >Several companies are working to overcome these obstacles, so far >with limited success. SiRF, a 4-year-old outfit based in Santa >Clara,California, has raised investment capital from Nokia, Acer, >and Yamaha to develop software that will help the GPS chips >embedded in cell phones and other devices overcome reception >problems. A SiRF rival, SnapTrack, makes software for the >embedded DSP chips in cell phones and promises greater accuracy by >homing in on the GPS satellites' exact locations. And the >Goeken Group in Chicago is working on the Guardian II, a >pocket-sized unit that offers wearers a personal panic button. Goeken >claims the unit can direct police to within 30 feet of your outdoor location. > >Furthest along in creating a compact tracker for kids is an >Anderson, South Carolina-based startup called Protect Me Toys. The >company has built a 1.5-pound tracker unit that fits in the bottom >of a child's backpack. The hardware has already been tested >by police in mock kidnappings, but it has weak spots. Its wearer can >be traced only in places where there is cell phone service, >and reception remains hampered by GPS's line-of-sight limitations. > >Given the potential value of a small GPS tracker, and the >significant obstacles to building one, the spam about a >bracelet-sized >unit was hard to ignore. There were two possible explanations, each >fascinating in its own way. Either the company behind this >email had pulled off an unheralded technological miracle, or ... it >hadn't, in which case something very curious was going on. >Whichever was true, I decided I had to know. > > >Feeling a bit like a rube clutching a lottery ticket, I begin my >quest in July of 1998, when I dial the 800 number listed in the >email. A man answers, and he's soon telling me about a host of >satellite tracking products the company, GlobalTrak, is releasing, >with names like KarTrak, ExecuTrak, SeniorTrak, PetTrak, and KidTrak. > >Sensing my interest, the man says he'll pass my name on to the >company president in California. An hour later I get a call from >an improbably deep-voiced person who identifies himself simply as >"Mr. Benson." He tells me that his company's first satellite >tracking product, SeniorTrak, will be ready to ship within 30 days. >KidTrak, a satellite-enabled bracelet that can give a child's >exact location to a parent, is slated for release in November or >December of 1998. > >"How does the device wirelessly send data to a command center?" I ask. > >"That's proprietary," Benson says. > >I say it's well known that GPS devices don't work well indoors. How >will KidTrak find a kid lost in a mall or spirited off in a van? > >"That's proprietary," repeats my basso profundo friend. > >I ask him to FedEx me a unit. "We've had to be careful," he says >cagily, rejecting my request. "A lot of people would like to know >how this technology works." He says a salesman will come to my >office in a few days. > >After a week of virtual contact with GlobalTrak, I finally see a >face behind the spam. Daniel Holmes, GlobalTrak's rep, is a stout, >bearded guy in his mid-30s, wearing a cheap-looking suit and >carrying a smooth black plastic case about the size of a child's >lunchbox, with a power switch and a single blue LED on the side. >It's supposed to illustrate how KidTrak would work, even though >it's a lot bigger than the compact bracelet promised in the email. >"KidTrak is something that Mr. Benson has worked on for >several years," says Holmes. (Apparently, everyone calls him "Mr. >Benson.") "I didn't believe it when I first heard about it, but he >gave me a full demonstration right before my eyes." > >But just as Holmes is about to give me the same demo, he declares >that the rechargeable batteries in the tracker demo unit are >out of juice. I grab a battery recharger from my desk, and he gamely >tries to plug it in, but the connectors are all wrong. Holmes >looks like a disappointed kid, and I sort of feel sorry for him. >I've seen plenty of demo disasters from even high-profile >companies: prototypes of pocket PDAs suddenly glow red and fry up; >product managers struggle to force plastic parts back onto >LCD projectors. When you look at beta product on a regular basis, >you learn to give the rep the benefit of the doubt. > >"One important factor in any tracking device is finding a way to >save battery power," Holmes explains. "But I really can't say too >much more about it." GlobalTrak, he confides, recently suffered an >intellectual-property leak supposedly caused by a former >employee, and the boss is taking no chances. > >As Holmes packs up to leave, he mentions that he'd been a systems >engineer in Silicon Valley years ago. He likes GlobalTrak >because it doesn't have a big PR force, instead using word-of-mouth >to reach people. I tell him that I first heard about KidTrak >through a junk email. > >"Me too!" he says, his face glowing with genuine enthusiasm. > > >Holmes' visit leaves me with more questions than answers. It's clear >that GlobalTrak's representatives aren't going to be very >forthcoming about their products. I decide to skirt the company's >execs and do a little digging on my own. > > Either the company had pulled off a technological marvel, or >... it hadn't, in which case something very curious > was going on. > >I crawl onto the Web, and to my surprise I find about a dozen >GlobalTrak sites, typically run by people who joined the >organization as regional licensees. The most impressive site is >www.kidtrak.com, which features snappy press releases, animated >GIFs of product prototypes, a photo of San Francisco mayor Willie >Brown (who's said to be "particularly interested" in GlobalTrak), >and an audio track featuring the voice of actor Geoffrey Holder, the >"Uncola" guy from the old 7-Up commercials. The InterNIC >database shows "Benson, E." as the administrative and billing >contact for kidtrak.com, and a sister site lists a "Benson, Mister." >No first name is given. > >I fire up the promotional video Holmes left me, the only physical >evidence I have that the company even exists. Over the next >few days, I watch it a dozen times in search of clues, like Oliver >Stone poring over the Zapruder film. The video opens in a >banquet hall at the San Francisco Airport Hyatt, and Mayor Willie >Brown is there. He walks up to the podium and says he wants to >check out GPS as a possible solution for the city's troubled >public-transportation system. He's interested in GlobalTrak, >especially >its personal-security features. > >"What we've been told about GlobalTrak obviously would be of great >assistance in giving [San Franciscans] the level of security >and confidence that they may need," Brown says. A doughy MC >announces that the mayor and a few people from the audience >will shortly witness a live demonstration. > >Cut to the demo. A few assorted characters are seen getting into a >long white limousine outside the Hyatt. Mayor Brown is >encouraged to come along, but he looks apprehensive and doesn't >follow. A wiry guy with a mustache stands on the sidewalk >outside the hotel, brandishing a KidTrak bracelet and fielding >questions from local TV crews. One reporter suggests that the >device - which is about the size of a doughnut - looks too big for a >kid to wear. > >"Let me tell you something, OK?" the man with the mustache says >pointedly. "Our objective is not to break records through >miniaturization. My purpose and my involvement in this venture is to >help save some lives! Sure, we'll get smaller. Eventually you >won't even be able to see it at all." > >Then he, too, climbs into the white limo. > >Cut to a clip of the car pulling into a parking lot near the >airport. The same man gets out and walks to a pay phone at the edge >of the lot. "Hi. How are you? Good. Benson speaking," he says. "We >need to get a fix on our location." > >So this is Mr. Benson. He listens, nods. Then he hands the phone to >a witness, who confirms that the announced location jibes >with the street signs. Benson and the witness dive back into the >limo, and it speeds away. > >Elsewhere on the video, Denise Brown, the sister of Nicole Brown >Simpson and director of a nonprofit for battered women, >endorses BodyGuard, another GlobalTrak product. "We are very happy >to give our support to the new GlobalTrak International >line of personal satellite tracking devices," Denise Brown says. >Then Geoffrey Holder appears, talking about the tragedy of lost >children and how he thinks KidTrak is going to help. (For a while, >Holder's voice was also heard on the 1-800-KID-TRAK line.) > >All told, the video is an odd mixture of unproved claims and >shameless schmaltz. I'm still no closer to finding out if GlobalTrak >is >a boon to humankind, a sham, or something in between. > >My doubts are put to the test in the weeks ahead, as the GlobalTrak >promotional machine cranks into high gear. The company >sends out announcements through Business Wire, an archive of press >releases; places ads in USA Today's "Business >Opportunities" classifieds; commissions industrial-design sketches >of the KidTrak prototype; licenses a kid-friendly cartoon >character called the Dream Dragon; and assembles a team of >salespeople to distribute the ground-breaking product as soon as >the development stage is complete. > >But what catches my attention is something GlobalTrak doesn't want >publicized - word of a dispute the company has going with >Paradigm, a small Toronto-based operation that's developing >lunchbox-sized GPS devices for law enforcement. According to a >Paradigm press release I run across, the company was in negotiations >with GlobalTrak on a joint venture but broke off talks after >discovering that "GlobalTrak and its president, Mr. Eric Benson, >were being investigated by the Orange County fraud department." > >I phone Paradigm president David Kerzner, who repeats the press >release's fraud charge and tells me a bizarre tale. "When I >met Benson, he wanted to buy a thousand units, and he sent me a >purchase order - we're talking about a million-dollar order >here," Kerzner begins. "I was all excited. So I flew with a >colleague to Washington, DC, and we met Benson. He was real secretive >when he pulled out these huge schematic drawings. Later, my >colleague said that the schematics didn't remotely relate to what he >was talking about. The picture he used for the bracelet looked like >Geordi's visor from Star Trek." > >"So I wrote him this scathing letter saying, look, you're >misrepresenting the technology, you're misrepresenting the whole >concept, it'll never fit inside a bracelet." > >After hanging up, I have to marvel at Benson's chutzpah. I'm >beginning to see him as the author of a performance-art piece that >serves as a parable for the high tech industry. After all, the >Valley is full of respectable folks who hyped an idea long and hard >before they had a product or even proof of concept. Michael Wolff >wrote in Burn Rate about how he sucked millions out of CMP to >build NetGuide, which even he suspected would never get off the >ground. (Benson, in fact, chose to launch KidTrak at the Laguna >Niguel Ritz Hotel, the same venue Wolff describes in his book as a >premier tech meeting ground.) And almost every day, press >releases float from office to office with compelling ideas but no >practical plan for making them happen. Benson, I was learning, >had mastered not simply the vocabulary of Silicon Valley but also >one of its truisms: Selling a fantastic product is fine. But so is >selling a fantastic product that doesn't quite exist yet. > > >I had peeled away enough layers of the spam to know that there was >probably something wrong here. Now it was time to go all >the way. Benson had been saying that I should come to Southern >California to see the products myself, and I decide to take him >up on his offer. > >Negotiating the endless voicemail tree through 1-800-KID-TRAK makes >the company seem vast. I'm first asked to dial 1 for the >western region, then 4 for the building number, and finally 104 for >the marketing department. After a long wait, Benson himself >comes on the line. "Heeeey, guy. What's going on?" he says. When I >tell him that I want to meet, he seems enthusiastic. >"Sounds good! I'll be in design meetings around Melrose Avenue in >Los Angeles the early part of next week. Why don't you call >me Monday when you get here, and we can nail down the specific logic." > >When I arrive in Southern California, Benson says he's too busy and >that we should get together the following day. In the >meantime, I track down the company's headquarters in Laguna Niguel, >a meticulously neat suburb an hour from LA. Its wide >boulevards stretch from the Pacific Coast Highway to lush palm >groves inland and then spill off to suburban developments dotted >with identical houses. The roads around here are named after various >types of oil lamps used by 19th-century trade ships - >Crystal Lantern, Silver Lantern, Copper Lantern, Blue Lantern. The >GlobalTrak street address has a "lantern" appellation, too, but >it leads to a Mail Boxes Etc. > > One reporter suggests that the device - which is about the >size of a doughnut - looks too big for a kid to wear. > >The next day, Benson keeps brushing me off, telling me that traffic >or other meetings are holding him up. I don't mention the >Paradigm press release's reference to a fraud investigation. >Benson's unflagging ebullience ("Good, good! Happy days!") rattles >me. At one point, I lock myself out of my car and have to sit on the >curb while a gas-station attendant fishes around with a slim >jim and lets me back in. > >Then the cell phone purrs at my hip; it's Benson, saying he'll be at >L'Angolo Ristorante on Melrose Avenue. "I'm looking forward >to finally meeting you," I say. > >"Good news!" he says. "See you soon!" > >Italian disco music is the soundtrack for our long-awaited meeting. >At a table in back, I meet two men - Benson and the doughy >man I recognize from the corporate video. Benson, wearing a tan >suit, greets me warmly and introduces his colleague as Gerald >Kostecka, a GlobalTrak vice president. Benson gets right down to >business, pulling a few prototypes out of an aluminum briefcase >and arranging them on the table. "KidTrak is slated for a November 1 >release," he says. "Just in time for Christmas. We should >have all the products available by the end of the year." > >I recognize the large black box from Holmes' visit. I pick it up, >feel its heft. It's not hollow. "Did GlobalTrak make that?" I say. > >Benson bristles. "Yes. Of course. Where do you think we got it?" A >silent moment passes. I move to safer ground, asking about >the social implications of the technology. > >"When it comes to personal protection," Benson begins, "when it >comes to our children, our families, our loved ones, our sisters, >our daughters, our wives - there is no replacement, you know, for >those sorts of things. And then once you get beyond solving >the social problems, the other applications are just unlimited." >Then, abruptly, Benson announces he's going to call the command >center. > >"Now, this demo unit does not have any of our proprietary software >algorithms in it, for security purposes," he tells me as he >punches in the number. "Yes, it's ... uhhh ... D604," he says into >the cell phone. "1C604. I need you to give me a fix on our last >location. > >"They just gave us a fix," he says, beaming. "The command center is >in a location I can't tell you about for security reasons. It's >manned 24 hours a day by trained emergency-response professionals. > >"Now, aren't you going to ask me about the demonstration I just >performed?" he scolds. "I just got on the phone, and they told >us we were off Melrose Avenue. It looked like you weren't paying attention." > >"No ... it looked like it went off very well," I reply. I ask him >how many people are in the company. > >"A few hundred," he says. "Let me tell you something. Running a >business is exhausting, a real crash-course education. But it's a >necessary evil when it comes to launching a product for John and >Jane Q. Public." > >"Do you have patents?" > >"Our patents are pending ... all over the planet," he says, taking a >sip of his drink. "We've got patents, and we've got support >from a lot of good, strong, quality people. The company's in a >perfect position." > >"Where do you see GlobalTrak in five years?" > >"By that time, we'll have taken a serious bite out of the problem of >missing children," Benson says. "Crime won't be the way it is >today. But just because a product exists doesn't mean everyone and >their Great-Uncle Joe is going to buy one. The most >important thing is to send the message that these products do exist, >that you never know who has one. The KidTrak product is >like Russian roulette for the abductors - you never know which child >is protected." > >I ask Benson about his background. "I started my first company when >I was 16," he says. "I didn't have a pot to pee in. I didn't >even have a window to throw that pee out of. What I had was a strong >idea - and I needed a little coin behind me. I was only >looking for $8,000. I asked my family. Nobody believed me. 'Get your >butt back to school and get your degree in psychology,' >they told me. > >"I said, 'I'm going to start this business and make a go of it.' An >attorney was selling furniture cheap. I turned my apartment into >an office. A few years later the company was able to do $1.2 >million. By the time I was 22, the company was flying. What that >taught me was, it doesn't matter how much coin you have starting out >- it's about drive, commitment, endurance, diligence, >perseverance, and risk. You have to be willing to put your cojones >on the table and willing to get 'em cut off. Some cases you >win, and then you win big. In other cases you lose." > >Benson pauses, then changes the subject. "So what time's your >flight?" he asks. > >"It was actually at 7," I say. "I think I might stay the night here >in Marina del Rey. I'm kind of hiding out from my wife." We >share a laugh. > >"I moved to Laguna Niguel 10 years ago - from the East Coast," says >Benson. "I got out of the car and thought I'd died and >gone to paradise. And I married this girl and everything was just >La-La Land. My first marriage was to a woman in the television >business. It wound up on a TV tabloid show. Literally." > > Selling a fantastic product is fine. But so is selling a >fantastic product that doesn't quite exist yet. > >"How did you get Geoffrey Holder involved with GlobalTrak?" I ask. > >"Celebrities come out for these types of things," he replies. "We're >planning a $1,000-per-plate dinner right now. And we've got a >lot of celebs in the local Tinseltown playground." > >While we're talking, a 40ish guy walks in and quietly sits down with >us. Benson pulls a promotional kit and video from the >aluminum case and offers them to him. "Excuse me for a minute," says >Benson. "I'm going to talk to Bill, and then I'll come >back for round two." He mimes a boxing gesture. > >When Benson returns, I broach the subject of Paradigm and the fraud >claim in Orange County. I'd been holding this question as >my trump card, but Benson is anything but rattled. The way he tells >it, Paradigm is on the run from him. "We initiated the >investigation when we suspected an employee was stealing >GlobalTrak's intellectual property," he says, not missing a beat. "We >met with Paradigm to discuss manufacturing a demo unit. But let's >leave the fighting to the attorneys. Let's you and I have a >great relationship now and into the future. Let's just keep it positive." > > >By now, I'm wondering if KidTrak will ever see the light of day, but >I also become curious about another side of the story: the >investors. How "positive" are they feeling about Benson? As it turns >out, quite a few licensees welcome the chance to talk. I speak >with 10 former investors over the next six months. Many still have >GlobalTrak Web sites or remnants of sites, but everyone I >speak to has broken ties with Benson. They feel burned by a company >that asked them to pay $695 for a regional sales license >and a demo unit and had them recruit friends and family for more >investments, and yet failed to deliver the KidTrak bracelet. >Still, they generally take the loss as a difficult but by no means >fatal lesson about the pitfalls of Net investing. The bulk of these >would-be entrepreneurs are computer newbies who saw GlobalTrak as a >way to help people while getting a chance to jump on the >high tech bandwagon. > >"Benson said we would begin to sell the product around March or >April '98, and then I flew down to the Ritz for the big press >conference," says Tammy Slater-Kendrick of St. Louis, Missouri. >After sending her money to GlobalTrak, she quickly was >designated GlobalTrak's "vice president of the central region." > >"We were pretty excited, even though the unit was much bigger than >something that can be worn by a child," she continues. >"Afterward, Benson drove us in a limo to a restaurant. He tried to >be impressive, but I noticed he didn't pick up the bill." > >By the time Slater-Kendrick received a demo unit, she was so >skeptical of GlobalTrak's operation that she didn't bother to try the >device: "Benson never actually said he had a product in hand, but he >always said he would have it in a few weeks. I think he does >have some technology; he was just dishonest about it." > >Ted Archer, a GlobalTrak licensee from Birmingham, Alabama, agrees. >"I think it's a great idea, but I don't think Benson has the >money to bring it to market," he says. "All he has is a box about >the size of my red Bible, the good one I bring to church. I never >received what was promised." > >Archer is still a bit peeved about the incident, but he's able to >chuckle. "Let me tell you a weird one. After months of not hearing >from him and wondering what's going on, I came home around >Christmas, and here's this basket on the front porch from >GlobalTrak. Well, after everything that happened, I end up with $695 >worth of fruit." > >Like me, Ann Darling first heard about GlobalTrak through spam. "I >was relatively new to the Internet," says the Fort Walton >Beach, Florida, resident. "It's a hard lesson. Benson asked me to >fax a copy of the check, and the bizarre thing was that >someone managed to electronically withdraw the money before it got >there in the mail. I received a demo unit, but it didn't work, >and I sent it back. Benson got very angry with me when I called to >ask for a refund." > >GlobalTrak's stable of celebrity spokespeople, like the investors, >turn out to be well-meaning people attracted by the promise of >an amazing product. Denise Brown heard an ad on the radio about >KidTrak and called the company to see whether she could buy >a unit. "I truly wanted to have one of those bracelets," she says. >Brown endorsed the product at Benson's request, but after >fielding numerous phone calls from investigators and disgruntled >licensees, she stopped working with him. > >When I call Geoffrey Holder, I discover he's furious. Through his >agent, Holder says he was outraged at being misled about >GlobalTrak, and he feels like he was duped into doing voice work for >the company. As for San Francisco mayor Willie Brown, his >press office tells me he doesn't endorse the company and was only at >the Hyatt conference to see the latest satellite gadgets. > >Even Daniel Holmes, the sales rep who visited my office, and Gerald >Kostecka, Benson's sidekick, are out of the game by the >time I talk to them again, months after we first met. Holmes won't >elaborate on why he left: He sends me an email saying that >he's signed a nondisclosure agreement and can't say anything about >GlobalTrak. Later, I bump into Kostecka at Comdex, where >he tells me the company was getting too commercial for his tastes >and moving away from consumer applications. I ask him >whether he believes Benson really has a personal tracking device. > >"Oh, yeah. Absolutely. I'm sure they're going to do it," he says. >"We were all ready to rock and roll, but it's going to take a bit >longer." > >None of the former licensees I talk to plans to sue Benson; some say >it would be too much effort to recover $695. But law >enforcement officials, I suspect, might hold a different view. > > "Let's leave the fighting to the attorneys," Benson says. >"Let's just keep it positive." > > >For a while, the Orange County Sheriff Department's Fraud Unit >stayed hot on Benson's trail. Investigator Janet Strong says she >began looking into Benson's company in December 1997. Eventually, >though, she passed the case along to Postal Service >investigators, because her supervisor deemed Benson's activities a >federal, rather than county, matter. "I had 25 complaints," >she says, "but most were out of state." > >Postal officials confirm an ongoing investigation into GlobalTrak >but decline to provide further details. "Our review of GlobalTrak is >in the early stages, so we can't say whether the product is >legitimate or not," says Postal Inspector Aaron Ward, the supervisor >assigned to the case. > >If Benson is in trouble with the law, it may not be the first time. >During Strong's investigation, she conducted a warrant search and >turned up a long list of past charges filed against one "Eric R. >Benson" in Philadelphia. An official in the Philadelphia District >Attorney's Office says that an Eric R. Benson with the same >birthdate as GlobalTrak's founder - January 5, 1964 - has a string of >convictions and probations stretching back to 1983. Eric R. Benson >received two years' probation for unauthorized use of an >automobile, two years for recklessly endangering another person, one >year for theft of services, two years for simple assault, and >three years for undescribed "terroristic threats." In 1990, the same >person was arrested in Philadelphia and charged with 28 >counts of fraud - including mail fraud, wire fraud, and misuse of a >federal agency's name - in a scheme in which 31 video retailers >were allegedly cheated. None of the charges stuck, though: After a >two-week trial, Benson was acquitted on all counts. > >Is GlobalTrak's Eric Benson the same person as Philadelphia's Eric >R. Benson? Benson dances around the question: "There are >probably a thousand Eric Bensons," he says. "I'm not going to answer >that because it is irrelevant to the launching of the >product." But some law enforcement sources are convinced the two are >the same. At my request, an official in Philadelphia - who >spoke on the condition of anonymity - compared Eric Benson's image >from the GlobalTrak marketing videotape with a file picture >of their Eric R. Benson. "Yep, that's the same guy," the official >said. But the official was unable to provide more concrete proof, >such as corroborating Social Security numbers or fingerprints. > >In the end, it's impossible to be sure about this, but the fact >remains that GlobalTrak's Benson has left many unhappy people in >his wake. A marketing manager for a large communications company - >who asked not to be identified - tells me that he's looking >to get paid for the GPS chip set he says he loaned to Benson. A >former credit and collection manager at the America Office Center >in Irvine, California, says Benson vacated one of its buildings >owing $7,400 in rent. > >But as far as Benson's recruiting efforts for GlobalTrak are >concerned, it's hard to say whether he's broken any laws. At its >heart, >GlobalTrak appears to be a fairly typical network marketing >operation. New recruits are asked to pony up $695 to become >GlobalTrak regional licensees. In return, they're promised a 20 >percent commission on all sales. For referring another regional >licensee to the company, they receive a 10 percent increase in their >commission. Anyone that they recruit, in turn, earns the >original licensee an additional 5 percent. > >The tantalizing carrot of any network marketing membership is the >prospect of developing many levels beneath you. If the >recruits of your recruits begin recruiting other people, and you're >getting a cut of all sales down the line, the organization starts to >look like a gigantic pyramid with you sitting like a pharaoh at the top. > >But the law makes a distinction between a legitimate network >marketing company and a pyramid scheme, according to Betsy >Broder, the Federal Trade Commission's assistant director in the >Bureau of Consumer Protection. > >"In a legitimate network marketing organization, the bulk of the >income is from the sale of a bona fide product to the public," >says Broder. "In a pyramid scheme, revenues come from recruiting new >members, who pay a fee to be part of the organization." >Her office prosecutes pyramid schemes based on unrealistic >projections of the amount of money participants could make. > >But Benson has not made any claims about potential earnings: >GlobalTrak earnings are based solely on the sales of a product, >not on the activity of recruiting itself. It's just that the product >isn't available yet. And compared with other network marketing >execs, Benson is conservative in his claims. As licensee Ted Archer >says, "I used to tape the conference calls to listen to later, >and I've got a stack of about 20 tapes. After this all fell through, >I went back to see if he said anything definite about a product. >I never was able to catch him. He's very good at splitting hairs." > >Despite my best efforts, I can't completely unravel Benson's >original spam to get to the full truth. Although it's clear Benson >isn't >everything he's claimed, I can't say that he won't one day ship >KidTrak to customers. > > >Once Benson got word that I'd called the 7-Up man's agent, he was >mad as a hornet. When I talk to Benson, he says he won't let >any of his people deal with me again. It seems like a good time for >me to broach some delicate questions. "A lot of former >licensees feel like they didn't get what they paid for," I say. > >"That's not true at all," he says, surprised. "What are they paying >for? A license to sell products in the future, and that's exactly >what they got." > > Investors pay for "a license to sell products in the >future,"says Benson, "and that's exactly what they got." > >"But if they can't sell products, they're out of a lot of money," I point out. > >"You talk like they're not getting full disclosure," Benson says. >"People choose to get involved before the product is available. If >you do not want to sell our product, do not pay a licensing fee. We >don't twist anyone's arm. We make it clear that the product is >in the development stage. That's out there." > >After that, I don't talk to Benson for a while, though I do spend a >lot of time thinking about him - with a mix of awe, disapproval, >and warped admiration. A decade ago, Eric Benson was just another >small-timer trying to eke out a living. Since then, he has >reinvented himself as an Internet entrepreneur, complete with sales >force and Web sites. Along the way, he's learned to seize on >the tantalizing promise of high tech and dangle it in front of >anyone looking for the Next Big Thing. And with almost breathtaking >nimbleness, he's managed to avoid lawsuits and the long arm of the law. > >Is this what they mean when they say the Net is a realm of limitless >opportunity? > >As it turns out, Benson and I cross paths once more. I see >discussion threads on the Web about a new product called MobilTrak, >which claims to use GPS technology to track assets in a ship's cargo >containers. I smile, recognizing Benson's calling card. If >anything, I have to admire his cojones. When I call the >1-800-KID-TRAK number, Benson himself picks up. > >"Hey, Bobby boy, how ya doing?" he asks. > >"I've got some concerns." > >"Oh, do you?" > >"Is GlobalTrak still operating?" > >"Of course. Not only are we operating, we're doing phenomenal." > >"Has KidTrak shipped yet?" > >"Yes. Why don't you come out and see it? We're glad to have you down >if you'd like to come out and take a look." > >"Can you put me in touch with someone who's used a KidTrak product?" > >"Why, so you can bother them with your trivial negativity? Forget >about anybody that you can call over the phone. Because, you >see, you're the type of guy that twists people's words around." > >"There's an Eric R. Benson with your birthday who was convicted in >Philadelphia." > >"That's interesting, because I don't know why that is. What other >questions do you have?" > >"Can you hook me up with someone on the phone?" > >He ignores that. The deep voice rumbles, and the voice through the >phone sounds like a preacher shouting from the pulpit. >"Guess what we're shipping?" he says. "This month? Huh? I'll tell >you: The world's first line of personal satellite tracking devices!" > > > >Bob Parks (bobparks@w...) is Wired's senior section editor. > > > >Copyright © 1993-2000 The CondÈ Nast Publications Inc. All rights reserved. > >Copyright © 1994-2000 Wired Digital, Inc. All rights reserved. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1573 From: Steve Uhrig Date: Mon Sep 25, 2000 4:45pm Subject: Re: Tracking equipment scam Once upon a midnight dreary, James M. Atkinson, Comm-Eng pondered, weak and weary: > It is a great article, and a textbook example of how hype > and bullshit can be used by people to fleece folks out of a > boatload of cash. I notice with great interest that Ralph Thomas (NAIS) is pushing this scam to PIs in a multi level scheme, by selling "licenses", apparently granting you the right to resell the product. License fees range from $195 to $500,000. http://pimall.com/nais/trakopps.html I suspect he will pull the page down as soon as he hears of the WIRED article. I repeat my caution against dealing with spy shops. Webpage above is case in point. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1574 From: Miguel Puchol Date: Mon Sep 25, 2000 5:12pm Subject: RE: Re: Tracking equipment scam Steve, I read about this a few issues back, and it was an interesting article on what looked like a pyramid scheme with a twist - a lot of people became 'salesmen' for this guy, and never saw a working unit. On the other hand, GSM (or other cellular system) tracking is quite feasible, I attended a demonstration a couple of weeks back where an active cellphone was located to within 5 meters. This was thanks to accurate GPS timers in each cell (what an irony!!) and signal reception delay measurement - something like a giant doppler system, although not quite. Considering that Wavecom, a large manufacturer of cellular system base electronics - the actual phone - will release next year a GSM module in the format of a DIP 24-pin IC, then small tracking devices become more of a reality. Even so, nothing to fit in a bracelet as the scam advertised, but maybe good enough to fit in a suit worn by someone important... Regarding the web page, the article has appeared a few months back, so I assume that he's still getting new 'costumers'...very sad. All the best, Mike > > It is a great article, and a textbook example of how hype > > and bullshit can be used by people to fleece folks out of a > > boatload of cash. > > I notice with great interest that Ralph Thomas (NAIS) is > pushing this scam to PIs in a multi level scheme, by > selling "licenses", apparently granting you the right to > resell the product. License fees range from $195 to > $500,000. > > http://pimall.com/nais/trakopps.html > > I suspect he will pull the page down as soon as he hears of > the WIRED article. > > I repeat my caution against dealing with spy shops. Webpage > above is case in point. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1575 From: Steve Uhrig Date: Mon Sep 25, 2000 5:21pm Subject: RE: Tracking equipment scam Once upon a midnight dreary, Miguel Puchol pondered, weak and weary: > On the other hand, GSM (or other cellular system) > tracking is quite feasible, I attended a demonstration a > couple of weeks back where an active cellphone was > located to within 5 meters. This was thanks to accurate > GPS timers in each cell (what an irony!!) and signal > reception delay measuremen Yes, tracking via the cell infrastructure does work. That needs only for more than one site to hear the signal. The accuracy they achieve is quite impressive. GPS timing is used to synchronize multiple sites in many different types of communications systems. With GPS tracking, however, it is necessary for whatever is being tracked to hear a minimum of 3 birds, and generally this requires nearly a 360 degree view of the sky. The antennas typically are the size of half melted ice cubes, and there aren't many places you can mount an antenna on most of the things people want to track. The GPS signals don't penetrate much. They rarely make it through heavy tree cover, practically never indoors, and not if buildings or whatever shade the sky. So even if someone did make a working system, it would not be able to hear enough birds to be of any value the majority of the time. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1576 From: Date: Mon Sep 25, 2000 1:29pm Subject: Re: Re: Tracking equipment scam In a message dated 9/25/00 2:47:10 PM Pacific Daylight Time, steve@s... writes: << Ralph Thomas (NAIS) >> Is he any relation to "The Professor or Pontiff#1"? 1577 From: Guy Urbina Date: Mon Sep 25, 2000 7:20pm Subject: RE: RE: Tracking equipment scam Great pointer to an excellent article Steve...... I was actually apalled how this guy "benson" fooled and tricked people into believing in "vapor"ware. or "vapor hardware. As a designer of GPS tracking systems, I know full well the limitations of the current technology and right now you can't fit a GPS receiver, CDPD modem, a battery, power conditioning circuitry in a bracelet, it would be more like a gauntlet! :) (I've built a GPS/tracking unit about the size of a cigarette pack that's the smallest I've been able to get it for a standalone system. but the range is limited or the power becomes an issue.) seriously, Qualcomm and other CDMA phone manufacturers are miniaturizing the technology whereby you have a GPS front end, downconvert the GPS signals to an IF and feed that through a DSP to get your raw timing data. You then take snapshot of that data and send that to your base station ( usually another tower) where your location is determined. This way you leave the processing to the network and it cuts down on your TTFF (time to first fix) giving you position determinations in seconds rather than minutes. This all can be miniaturized into a CDMA phone with a multi-use antenna. (still a far cry from a bracelet.) Because of multiple PDE's (position determining entities)on this sort of network, you can have limited tracking indoors. (it won't work in a tunnel) but there is success indoors with wood roofs and ofice complexes with large windows. (mind you this only works with the network-based tracking systems, not the standalone units, where you need a clear view of the sky.) With the new WAAS (wide area augmentation system) you can track with one satellite but only after you have gotten a fix from three satellites previously from a cold start. It also helps you have a more precise tracking resolution. anyway, it its true, GPS is stil somewhat limited in urban canyons but out in the open, it is very, very good. I predict in about 2-4 years we'll be able to get it more miniaturized to the point where we can put a tracking system in a very tiny package. -Guy -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Monday, September 25, 2000 3:21 PM To: TSCM-L@egroups.com Subject: [TSCM-L] RE: Tracking equipment scam -- With GPS tracking, however, it is necessary for whatever is being tracked to hear a minimum of 3 birds, and generally this requires nearly a 360 degree view of the sky. The antennas typically are the size of half melted ice cubes, and there aren't many places you can mount an antenna on most of the things people want to track. The GPS signals don't penetrate much. They rarely make it through heavy tree cover, practically never indoors, and not if buildings or whatever shade the sky. So even if someone did make a working system, it would not be able to hear enough birds to be of any value the majority of the time. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1578 From: Gerard P. Keenan Date: Mon Sep 25, 2000 4:29pm Subject: Re: oops Hi Andy, I've included the article itself. The URL is in the header. It was the Daily Telegraph. Hope this helps. Jerry Keenan GPKeenan Co., Int'l Security Services West Islip, NY 11795-2503 gkeenan@s... secureops@e... ----- Original Message ----- From: "Talisker" To: Sent: Sunday, September 24, 2000 6:56 AM Subject: [TSCM-L] oops > Hi all > A while back there was a brilliant post on how the the UK Security Service > are training industry to be bug-hunters. however I deleted the mail > thinking there would be an archive. Has anyone got a link to the article?? > > thanks in advance > > Andy > http://www.networkintrusion.co.uk/ The IDS List > ''' > (0 0) > ----oOO----(_)---------- > | The geek shall | > | Inherit the earth | > -----------------oOO---- > |__|__| > || || > ooO Ooo > > MI5 teaches industry how to fight foreign spies http://www.telegraph.co.uk/et?ac=003100565149417&rtmo=r2QQaarX&atmo=HH HHHH8L&pg=/et/00/9/10/nspy10.html Sunday, September 10, 2000 By David Bamber and Chris Hastings MI5 is recruiting officers to work with industry to combat spies from foreign companies and governments. The security service is preparing a two-year course to train liaison officers who will advise firms on security risks from organised crime and overseas spies. Each officer will liaise with a sector of British industry, advising on areas such as keeping computer systems secure, protecting research and development work and safeguarding business plans. Since the collapse of the Iron Curtain and the decline of threats to national security, foreign governments have increasingly directed their secret services into industrial surveillance. Former Eastern bloc countries need to close the gap in technology and industrial production between them and Western economies and have resorted to infiltrating firms and other forms of espionage. There are also threats from criminal organisations including the Russian mafia and Chinese triads. Professor Barry Rider, a former senior British civil servant, compiled a report for the House of Commons home affairs committee on organised crime in private industry and outlined an increased role for the security services. Last night he warned that the US and French governments spied or eavesdropped on foreign companies that they suspected of trying to undermine their own industries. He said: "When you consider the amounts of money involved in the British financial services, you have to be open to the possibility of infiltration. The security services are very keen to protect British businesses now because they have the resources following the end of the Cold War. "The problem is, where do you draw the line? Would you use GCHQ to listen in on another business overseas that you thought was causing problems for a British company? The French do it. The Americans do it. I suspect we do it, but are more cagey about it. When you are talking about threats to national institutions or interests there is not a lot of difference whether they be subversive threats from criminals, terrorists or foreign governments." Prof Rider added that infiltration may be for personal gain based on insider information or may be part of a bid to destabilise markets. Businesses were at risk from foreign powers, organised crime and even terrorist organisations such as the IRA. "You have an interesting example in Ireland where paramilitaries have become more and more involved in business. You can imagine that criminal fraternities that have persisted for at least 80 years and which are highly sophisticated, whose kids have been educated in business schools or law firms, would be very sophisticated in their modus operandi." > 1579 From: James M. Atkinson, Comm-Eng Date: Tue Sep 26, 2000 11:33am Subject: RE: RE: Tracking equipment scam At 5:20 PM -0700 9/25/00, Guy Urbina wrote: >Great pointer to an excellent article Steve...... > >I was actually apalled how this guy "benson" fooled and tricked people into >believing in "vapor"ware. or "vapor hardware. Sadly, a con artist can twist just about any technology and can anoint themselves a expert on just about anything, or offer bogus products to the public. If the public does not collectively have the expertise to ask the appropriate questions (or the media is too bashful) then they can run their cons and hoaxes for years. Unfortunately quite a few people get attracted to TSCM as a way of making big bucks fast, or as some means of living out their fantasies of being a spy, a secret squirrel, and so on. Sadly, consumers of TSCM services tend to also get sucked into this mind set, and often expect you to show up in a black van, wearing trench coats, sporting a shoulder holster, and a floppy fedora (bullet holes optional). This is why in TSCM it is important to avoid any kind of "spookiness" and "secret squirrel bullshit" in our work and to ensure that everything we do is based on science, a solid technical background, professional instruments, and professional behavior. The client should be impressed with our PROFESSIONAL behavior and our results... and not our "spooky" behavior (please leave the shoulder holsters at home). -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1580 From: A Grudko Date: Tue Sep 26, 2000 2:42pm Subject: Re: oops ----- Original Message ----- From: Talisker > A while back there was a brilliant post on how the the UK Security Service > are training industry to be bug-hunters. however I deleted the mail > thinking there would be an archive. Has anyone got a link to the article?? I'd be interested in seeing that too. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), SAIS, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1581 From: A Grudko Date: Tue Sep 26, 2000 3:19pm Subject: Re: tap/bug? ----- Original Message ----- > As to the Tap vs Bug saga, I see a tap as a method of "tapping" into the > communication medium ie a parrallel physical connection, transparent to the > victim. I see a bug as the any device allow you to eavesdrop on a victim > which may include a tap. However in the context of this thread I would see > it as a spatially transmitted eavesdropping device > > how about rather than "tap vs bug" making it "line borne vs spatial" My comments were in the context of what the public, i.e. not persons versed in TSCM requirements, the majority of my clients, understand by certain terms, after decades of TV & movie exposure. If I try to tell the CEO of a pharmaceutical company that we have swept for 'line borne and spatial monitoring' he might think we were looking for aliens ! This might go down round Roswell, but not round Johannesburg. I'm clear in my own mind as to what the different TSCM terms are, allowing for regional differences, but it's the client who is my concern; a client who might refuse to pay for a service which was not what they expected. Too many people exploit clients by hiding behind jargon. I've seen various definitions, some in textual form, some in glossary form. What I want is to produce a comprehensive TSCM report which if challenged I can be confident that a colligue will agree with, at least in interpretation of methodology, terms and readings. Interpretation of those might require different input. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), SAIS, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1582 From: Steve Uhrig Date: Tue Sep 26, 2000 5:00pm Subject: Christopher E. Brown front and center To: Christopher E. Brown" ------------------------------------------ I answered your email with the info you need. Your email is bouncing with a bad host address. Please get me your new or correct address. Tks ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1583 From: Steve Uhrig Date: Tue Sep 26, 2000 5:22pm Subject: Sweep in San Diego Anyone (qualified) to sweep in San Diego, please mail me off list. I do not know the geography of California to know who is where. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1584 From: William Knowles Date: Tue Sep 26, 2000 5:29pm Subject: Re: Sweep in San Diego On Tue, 26 Sep 2000, Steve Uhrig wrote: > Anyone (qualified) to sweep in San Diego, please mail me > off list. > > I do not know the geography of California to know who is > where. Not knowing what your schedule looks like, and spending a good amount of time in San Diego myself for another client, if I was you, I would take the job and enjoy the weather. :) Cheers! William Knowles wk@c... (Who regularly thinks about opening a San Diego office...) *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 1585 From: James M. Atkinson, Comm-Eng Date: Tue Sep 26, 2000 5:56pm Subject: Re: tap/bug? At 10:19 PM +0200 9/26/00, A Grudko wrote: >----- Original Message ----- > > As to the Tap vs Bug saga, I see a tap as a method of "tapping" into the > > communication medium ie a parrallel physical connection, transparent to >the > > victim. I see a bug as the any device allow you to eavesdrop on a victim > > which may include a tap. However in the context of this thread I would >see > > it as a spatially transmitted eavesdropping device > > > > how about rather than "tap vs bug" making it "line borne vs spatial" > >My comments were in the context of what the public, i.e. not persons versed >in TSCM requirements, the majority of my clients, understand by certain >terms, after decades of TV & movie exposure. >If I try to tell the CEO of a pharmaceutical company that we have swept for >'line borne and spatial monitoring' he might think we were looking for >aliens ! This might go down round Roswell, but not round Johannesburg. > >I'm clear in my own mind as to what the different TSCM terms are, allowing >for regional differences, but it's the client who is my concern; a client >who might refuse to pay for a service which was not what they expected. Too >many people exploit clients by hiding behind jargon. > >I've seen various definitions, some in textual form, some in glossary form. >What I want is to produce a comprehensive TSCM report which if challenged I >can be confident that a colligue will agree with, at least in interpretation >of methodology, terms and readings. Interpretation of those might require >different input. > Here are my "official" definitions: Bug - A device which converts one form or energy from one for to another for the purposes of eavesdropping. This include wireless microphones, covert video, or any method which takes an acoustic signal or image and provides a radiated or conducted path outside of a targeted area. Tap - A method, modification, or device (or any combination thereof) which creates a way of accessing a conducted signal. A "Tap" may also involve a bug as a means of converting the signal from one form (audio) to a RF signal. Tracking Device - A device which may (in the case of GPS) or may not (a classic beeper) provide some kind of signal, record, or indication of position. The emitted signal may be something simple like a IR LED flasher, a tail light mod, or something as sophisticated as a covert GPS receiver and telemetry transmitter. Intercept - This includes any mention whereby a communication signal is obtained. This can include cellular intercepts, beeper intercepts, cordless phone intercepts, and so on. This can also apply to cases where the PCM data stream at the central office in intercepted. An intercept generally involved indirect access to the transmission path, but not an actual physical detection. Due to this an intercept activity is difficult, but not impossible to detect. Bypass - Any method of manipulation or modification of a communications device to gain access to the information or communication carried on or in it. Typically this is the manipulation of some element which negates a privacy function or element and usually involves introducing a weakness. Exploit - This is similar to a "Bypass" but no direct manipulation or introduction of a bypass is involved. Radiated Emission - This is the creation of an electromagnetic field/signal of sufficient strength that the radiated field may be obtained at some distant location. Conducted Emission - In this case the field/signal is not strong enough to radiate, or it is not designed to radiate. Of course any conducted will cause a small radiated signal, however; the level of the signal may be so small that it does not overcome the noise floor. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1586 From: A Grudko Date: Wed Sep 27, 2000 7:46am Subject: tap/bug? ----- Original Message ----- From: James M. Atkinson, Comm-Eng > Here are my "official" definitions: Thanks James - can I publish it in my promo. material (with acknowledgements)? (Does this man never sleep?)......... Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), SAIS, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1587 From: A Grudko Date: Wed Sep 27, 2000 8:40am Subject: Only in Africa... Courtesy of SA Security Professional, Sept. 2000, www.securityindustry.co.za. This is a genuine piece of legislation, with a strange African flavour: http://www.polity.org.za/govdocs/notices/2000/not2432.html "The General Intelligence Law Ammendment Bill, is hereby published for public comment. To amend the Intelligence Services Act, 1994, so as to provide for a retirement age for members; to regulate labour relations and strikes; to restrict former members of the National Intelligence Agency or South African Secret Service from wing their skins to the detriment of the agency or service;......." "wing their skins "?? Is this a new intelligence community term? Even if you ignore the poor grammar, it sounds more like something off a xxx website! I assume it's a typo error that should read 'selling their skills'. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), SAIS, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1588 From: Robert G. Ferrell Date: Wed Sep 27, 2000 10:11am Subject: Re: oops >A while back there was a brilliant post on how the the UK Security Service >are training industry to be bug-hunters. however I deleted the mail >thinking there would be an archive. Has anyone got a link to the article?? > I have an archive of the list back to 11/8/99, if anyone ever needs to make use of it. I think this might be the article you're referring to. Sorry I don't have a link to it. Cheers, RGF ==================== Here is another article that appears today relative to the incident in N. Ireland. The article came from this mornings London Times. I have a technical analysis on the device if anybody is interested (GPS rvcr, digital stereo audio with foward and store capabilities... typical Britain spyshop gadget). The device was initally detected with a Scanlock, but required the vehicle to literally be "torn apart" to find the physical components. The groups claims that the device created 30 watts, and the claims of bouncing the signal to a satellite are really quite hilarious. -jma ----- Wednesday, 8 December, 1999, 16:23 GMT Who might have bugged Gerry Adams? MP Gerry Adams demands to know who is listening to him Sinn Fein President Gerry Adams is demanding to know who planted a "bugging" device in the car he and education minister Martin McGuinness used while travelling to talks with the IRA. The West Belfast MP has lodged a formal complaint with both the Irish and British governments. Security expert and former soldier Colonel Mike Dewar says the planting of such surveillance devices is not uncommon, with figures like Gerry Adams a prime target. "We shouldn't be at all surprised, I'd be staggered if he wasn't bugged." "Bugs" which can pick up conversations and transmit them to a listening device up to a mile away are available from specialist suppliers. Mr Adams claims the "sophisticated" object found within the bodywork of a party supporter's one-year-old Ford Mondeo included a tracking device. "It's not a simple device you'd stick under the dashboard," says Mr Dewar of the bug described by the Sinn Fein leader. It seems unlikely such complex equipment would be employed by an amateur spy or rival political or paramilitary group. To install a bug of this kind, which Mr Adams claims had a microphone hidden in the centre of the car's roof, would take the sort of expertise and resources usually at the disposal of government agencies. Colonel Dewar says that when national security is threatened governments resort to using an array of surveillance techniques: "That's not news, it's standard practice." "Sinn Fein and the IRA expect to be bugged and have pretty good counter-surveillance equipment and experts." With the Northern Ireland peace process promising to bear fruit at last, it is debatable whether the UK security forces would risk bugging such a wily and media-savvy target, suggests Mr Dewar. "It would seem politically inept," he says. The defence commentator thinks the notion that the device is an IRA bug, perhaps intended to embarrass the UK government, should not be discounted. If Mr Adams is expecting an admission of guilt by the intelligence services or 10 Downing Street, he may be disappointed. Both remain notoriously tight-lipped when it comes to eavesdropping allegations. ----- Gerry Adams "There are elements within the system that need to be brought to heel" real 28k David Eades reports for BBC News "One step forwards is accompanied by one step back" real 28k The BBC's Graham McLagan reports " The positioning of the device meant all conversations would be picked up" real ----- Thursday, 9 December, 1999, 09:34 GMT Bugging harmed peace process - Adams The "listening and tracking device" Sinn Fein leader Gerry Adams has said the Northern Ireland peace process has been damaged following the alleged discovery of a bugging device in a car. Mr Adams has demanded a meeting with UK Prime Minister Tony Blair to express his concerns about the device which he said was planted in a car used to transport himself and education minister Martin McGuinness during the Mitchell Review. It is also claimed the car was used to ferry the two to meetings with the IRA. Speaking on BBC Radio 4's Today programme, Mr Adams said he had already raised the matter with Taoiseach Bertie Ahern and he repeated his assertion that the incident had damaged the peace process. "It hasn't helped it - it certainly has harmed it, there's no doubt about that," he said. Mr Adams described it was a "highly sophisticated listening and tracking device". The controversy flared when the claims were made at a press conference at which Mr Adams, accompanied by Sinn Fein ministers, Martin McGuinness and Bairbre de Brun, had been scheduled to set out the party's programme for government. The Sinn Fein party president said it was discovered during a routine search of the vehicle and demanded to know who was responsible. "I think this is a hugely serious breach of faith," Mr Adams said. "I think it is the securicrat agenda once again coming to the surface." He said the people involved in these "dirty tricks" were clearly against the peace process. Mr Adams said his suspicions were that people in the military establishment in Britain were behind the placing of the device. He said it was a hugely serious breach of trust and he has made representations to 10 Downing Street and the Taoiseach's office. He pointed out the only way this could be resolved was at the very highest level of the two leaders, the prime minister and the Taoiseach. Mr Adams said the onus was now on the Prime Minister, Tony Blair, to answer the questions he had posed about the device and to find out who was responsible. "I feel shafted by the discovery of this," he told reporters. Device 'built to specifications' He claimed the device had been built to the specifications of the car and it had a digital tracking capability which could possibly have been picked up by satellite. The device was "linear amplified" and had a built-in transmission aerial, according to Mr Adams. He said a microphone had been built into the middle of the roof of the Mondeo and wiring ran along the skin of the car. "This was done in such a way as to make it impossible for anyone carrying out repairs on the vehicle to find the device," he added. Sinn Fein chief negotiator, Martin McGuinness, said he had "no idea" if the device could be obtained locally. He added: "There can be no doubt whatsoever that this was placed by members of British military intelligence who are opposed to the peace process. "This is a very serious undermining of the process that we have been involved in and I find it absolutely incredible that there are people in British Military Intelligence who would target Gerry Adams and myself in this way." Mr McGuinness said his party would not be deflected from its support for the peace process but he said that "no one should be under any illusion" that the discovery of the device was a serious development. Deputy first Minister of the Assembly, Seamus Mallon, called for a thorough investigation. He said: "If it is established that it was done by whoever, then that person or persons should be made to answer for what is an absolute intrusion on not just personal privacy, but political privacy." Speaking in the House of Commons Tony Blair refused to respond to demands for an investigation. He said: "I never comment on security allegations, I don't intend to do so now." A Northern Ireland Office spokesman said they did not comment on individual cases. He added: "We have a long standing principle that it is not appropriate to discuss intelligence matters. All intelligence agencies act under the law and there is no question of them pursuing their own agenda. "Any person aggrieved by anything which he believes the police or the security or intelligence services have done in relation to him or any property of his, has the right to complain to the appropriate authorities." ----- December 9 1999 - BRITAIN Adams demands inquiry after accusing Britain of 'breach of faith' Sinn Fein car was bugged at peace talks BY CHRISTOPHER WALKER AND PHILIP WEBSTER GERRY ADAMS yesterday accused Britain of a "hugely serious breach of faith" after claiming that military intelligence had bugged a car used by Sinn Fein during sensitive peace negotiations. Tony Blair faced demands for an inquiry after the Sinn Fein president said the special listening and tracking bug had undermined his role in the peace process. But Downing Street hinted that the bugging could have been an authorised operation to protect the public. The Prime Minister's spokesman refused repeatedly to comment on the allegations. But he praised the work of the security services and said: "It is right that the police, security and intelligence agencies take prudent steps to protect the public from the threat of terrorist violence." And he emphasised several times that the security services worked under ministerial control. The car in which the device was found had been used for driving to meetings with IRA leaders, and the clear implication was that the security services felt that, with the IRA still a terrorist organisation, bugging was justified despite the ceasefire. There is bound to be speculation that if the bugging was authorised, the information obtained from it may have informed the Government's actions in recent weeks. In a press conference at Stormont, Mr Adams angrily accused the Blair Government - or rogue elements attached to it - of planting the device which, he said, had been found in the car he shared with Sinn Fein negotiator, Martin McGuinness during recent peace talks with the former American Senator George Mitchell. Accusing Britain of "a hugely serious breach of faith", Mr Adams said that the matter could be resolved only at the level of the British and Irish Prime Ministers. There were elements within the system who had ignored the British Government's demilitarisation strategy and who now needed "to be brought to heel". Mr Adams added that the issue of the device - which was capable of being used both for tracking and eavesdropping - had already been raised with 10 Downing Street, which was given advance notice that the original mundane subject of yesterday's press conference was being changed. "I have asked first of all if it has been sanctioned," he said. "And if so, who sanctioned it and that the eejit within that element, if they did sanction it, should own up." He added that if the bugging had not been sanctioned at a political level, "then we should be reassured that this type of hidden agenda, outside political control, which is how this place has been run for 30 years, needs to be ended." Despite the public fury of Sinn Fein, local observers detected a degree of posturing in their reaction. But it was generally agreed that the timing of the scandal, just as the IRA is being asked to begin disarming, was deeply unfortunate. The historic atmosphere of last week with the launch of the power-sharing executive was quickly dissipated as old suspicions resurfaced. The Conservative MP Andrew Hunter said that if the bug had been planted by British undercover agencies, "my only regret is that it has been found". The bug was uncovered over the past three days during a routine inspection of the year-old Ford Mondeo, which is owned by an unnamed person trusted by Sinn Fein. Mr Adams said that he had not held meetings with IRA members in the car, but a Sinn Fein source said that the device - which is available on the open market - had been intended to track people and pick up "gossip and conversation in the car". Mr Adams described the owner as "a supporter of the peace process", but not politically active. "This person is gutted by what has occurred." Mr Adams said that the bug was "discovered as a matter of routine, but we do routine searches because we are suspicious." Leading figures in Sinn Fein have long believed that there is an element in the British defence establishment deeply opposed to the peace process and willing to plot against it. "There can be no doubt whatsover that this was placed by members of British Military Intelligence who are opposed to the peace process," Mr McGuinness said. He claimed that the party would not be deflected from its support for the peace process, but added that "no one should be under any illusion" that this was a serious development. Mr Adams said the discovery of the bug, was evidence of "the securicrat agenda once again coming to the surface". He gave a detailed account of the device, which some security experts believe was probably installed when the car was being serviced. Showing a remarkable fluency with the technology involved, Mr Adams said that the bug had been built to the specifications of the car and was colour-coded to the vehicle. He said that it had digital tracking ability that could "probably" be picked up by satellite. He said that the device was digitally enhanced and ran with 20 to 30 watts of output. "It is linear amplified," he added as most reporters looked on in ignorance. "The device was built into the entire infrastructure of the car. The listening device, which is about the size of a matchead or smaller, was at the centre of the roof of the car. There was also a transmission aerial." Mr Adams said another ingenious feature was an input aerial which allowed the bug to be switched off and on remotely. There were also rechargable batteries wired to the car which were activated only when it was running to allay suspicions of the driver where the power was "being sucked to". "The wiring ran along the skin of the car, from the back to the front." ----- December 9 1999 - BRITAIN Bugs used are freely available for £20,000 BY RICHARD FORD, HOME CORRESPONDENT The bug in Adams's car MUCH of the bugging equipment found in the Ford Mondeo car used by Sinn Fein during the Mitchell Review talks is easily available in London shops. The devices, selling for up to £20,000 apiece, are part of the arsenal of equipment now used by security firms to provide protection to their clients. However, the sophistication of the operation involving Gerry Adams was in the fitting of the equipment into the one-year-old vehicle. The equipment had been built into the infrastructure of the vehicle, with a tiny microphone the size of a matchstick head hidden into the roof of the car. The transmitter would be about the size of a 50p piece. An input aerial allowed the equipment to be switched on and off by remote control, with wiring along the skin of the vehicle to devices in the two front seats. A tracking device was behind the back seat of the vehicle. Lee Marks, of Spymaster in Portman Square, London, said: "It is advanced equipment, but it is all available on the open market. It is not the individual devices that are sophisticated, but the way in which they were built into the car. Fitting it would have taken a great deal of time or involved a large team of experts to install quickly." Last night it was unclear how Sinn Fein uncovered the device, but experts in London said that for £600 the organisation could have purchased a small piece of equipment that would have detected any radio frequencies in the vehicle. Simon Sherrard, a security expert, said that a professional operation would have involved less wiring than had been found in the Mondeo. If the bug was placed by the security services, it would have required a warrant from either the Home Secretary, Northern Ireland Secretary, Foreign Secretary or Scottish Secretary. =================== Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 1589 From: the cynic Date: Wed Sep 27, 2000 5:47pm Subject: Re: Only in Africa... On Wed, Sep 27, 2000 at 03:40:54PM +0200, A Grudko wrote: > Courtesy of SA Security Professional, Sept. 2000, > www.securityindustry.co.za. > > This is a genuine piece of legislation, with a strange African flavour: > > http://www.polity.org.za/govdocs/notices/2000/not2432.html > > "The General Intelligence Law Ammendment Bill, is hereby published for > public comment. To amend the Intelligence Services Act, 1994, so as to > provide for a retirement age for members; to regulate labour relations and > strikes; to restrict former members of the National Intelligence Agency or > South African Secret Service from wing their skins to the detriment of the > agency or service;......." > > "wing their skins "?? > > Is this a new intelligence community term? Even if you ignore the poor > grammar, it sounds more like something off a xxx website! I fail to see the African flavor to this, is this south african slang ? It's mildly amusing in a sort of mean spirited way IMHO... 1590 From: Date: Wed Sep 27, 2000 0:06pm Subject: Re: oops (fwd) Mr. Ferrell, What are the chances of you tar'ing up your entire archive and offering it to those of us that would like a copy? I know I personally would love to have such an archive to go back and read through. this list is a wealth of knowledge...in my opinion. Or even better, if Mr. Atkinson happens to have a complete archive of his list from inception that would be great! I have quite a bit of space on my server if either of you would like or need to the space to offer such an archive on the web. Thanks! Niko On Wed, 27 Sep 2000, Robert G. Ferrell wrote: > >A while back there was a brilliant post on how the the UK Security Service > >are training industry to be bug-hunters. however I deleted the mail > >thinking there would be an archive. Has anyone got a link to the article?? > > > > I have an archive of the list back to 11/8/99, if anyone ever needs to make use > of it. > > I think this might be the article you're referring to. Sorry I don't have a > link to it. > > Cheers, > > RGF > > ==================== > > Here is another article that appears today relative to the > incident in N. Ireland. The article came from this mornings > London Times. > > I have a technical analysis on the device if anybody is > interested (GPS rvcr, digital stereo audio with foward and > store capabilities... typical Britain spyshop gadget). > > The device was initally detected with a Scanlock, but > required the vehicle to literally be "torn apart" to > find the physical components. > > The groups claims that the device created 30 watts, and > the claims of bouncing the signal to a satellite are really > quite hilarious. > > -jma > > > > ----- > > Wednesday, 8 December, 1999, 16:23 GMT Who might have bugged > Gerry Adams? > > MP Gerry Adams demands to know who is listening to him > > Sinn Fein President Gerry Adams is demanding to know who planted > a "bugging" device in the car he and education minister Martin > McGuinness used while travelling to talks with the IRA. > > The West Belfast MP has lodged a formal complaint with both the > Irish and British governments. > > Security expert and former soldier Colonel Mike Dewar says the > planting of such surveillance devices is not uncommon, with > figures like Gerry Adams a prime target. > > "We shouldn't be at all surprised, I'd be staggered if he wasn't > bugged." > > "Bugs" which can pick up conversations and transmit them to a > listening device up to a mile away are available from specialist > suppliers. > > Mr Adams claims the "sophisticated" object found within the > bodywork of a party supporter's one-year-old Ford Mondeo > included a tracking device. > > "It's not a simple device you'd stick under the dashboard," says > Mr Dewar of the bug described by the Sinn Fein leader. > > It seems unlikely such complex equipment would be employed by an > amateur spy or rival political or paramilitary group. > > To install a bug of this kind, which Mr Adams claims had a > microphone hidden in the centre of the car's roof, would take > the sort of expertise and resources usually at the disposal of > government agencies. > > Colonel Dewar says that when national security is threatened > governments resort to using an array of surveillance techniques: > "That's not news, it's standard practice." > > "Sinn Fein and the IRA expect to be bugged and have pretty good > counter-surveillance equipment and experts." > > > With the Northern Ireland peace process promising to bear fruit > at last, it is debatable whether the UK security forces would > risk bugging such a wily and media-savvy target, suggests Mr > Dewar. > > "It would seem politically inept," he says. > > The defence commentator thinks the notion that the device is an > IRA bug, perhaps intended to embarrass the UK government, should > not be discounted. > > If Mr Adams is expecting an admission of guilt by the > intelligence services or 10 Downing Street, he may be > disappointed. Both remain notoriously tight-lipped when it comes > to eavesdropping allegations. > > ----- > > Gerry Adams "There are elements within the system that need to > be brought to heel" real 28k > > David Eades reports for BBC News "One step forwards is > accompanied by one step back" real 28k > > The BBC's Graham McLagan reports " The positioning of the device > meant all conversations would be picked up" real > > ----- > > Thursday, 9 December, 1999, 09:34 GMT Bugging harmed peace > process - Adams > > The "listening and tracking device" > > Sinn Fein leader Gerry Adams has said the Northern Ireland peace > process has been damaged following the alleged discovery of a > bugging device in a car. > > Mr Adams has demanded a meeting with UK Prime Minister Tony > Blair to express his concerns about the device which he said was > planted in a car used to transport himself and education > minister Martin McGuinness during the Mitchell Review. > > It is also claimed the car was used to ferry the two to meetings > with the IRA. Speaking on BBC Radio 4's Today programme, Mr > Adams said he had already raised the matter with Taoiseach > Bertie Ahern and he repeated his assertion that the incident had > damaged the peace process. > > "It hasn't helped it - it certainly has harmed it, there's no > doubt about that," he said. > > Mr Adams described it was a "highly sophisticated listening and > tracking device". > > The controversy flared when the claims were made at a press > conference at which Mr Adams, accompanied by Sinn Fein > ministers, Martin McGuinness and Bairbre de Brun, had been > scheduled to set out the party's programme for government. > > The Sinn Fein party president said it was discovered during a > routine search of the vehicle and demanded to know who was > responsible. > > "I think this is a hugely serious breach of faith," Mr Adams > said. "I think it is the securicrat agenda once again coming to > the surface." > > He said the people involved in these "dirty tricks" were clearly > against the peace process. > > Mr Adams said his suspicions were that people in the military > establishment in Britain were behind the placing of the device. > > He said it was a hugely serious breach of trust and he has made > representations to 10 Downing Street and the Taoiseach's office. > > He pointed out the only way this could be resolved was at the > very highest level of the two leaders, the prime minister and > the Taoiseach. > > Mr Adams said the onus was now on the Prime Minister, Tony > Blair, to answer the questions he had posed about the device and > to find out who was responsible. > > "I feel shafted by the discovery of this," he told reporters. > > Device 'built to specifications' > > He claimed the device had been built to the specifications of > the car and it had a digital tracking capability which could > possibly have been picked up by satellite. > > The device was "linear amplified" and had a built-in > transmission aerial, according to Mr Adams. > > He said a microphone had been built into the middle of the roof > of the Mondeo and wiring ran along the skin of the car. > > "This was done in such a way as to make it impossible for anyone > carrying out repairs on the vehicle to find the device," he > added. > > Sinn Fein chief negotiator, Martin McGuinness, said he had "no > idea" if the device could be obtained locally. > > He added: "There can be no doubt whatsoever that this was placed > by members of British military intelligence who are opposed to > the peace process. > > "This is a very serious undermining of the process that we have > been involved in and I find it absolutely incredible that there > are people in British Military Intelligence who would target > Gerry Adams and myself in this way." > > Mr McGuinness said his party would not be deflected from its > support for the peace process but he said that "no one should be > under any illusion" that the discovery of the device was a > serious development. > > Deputy first Minister of the Assembly, Seamus Mallon, called for > a thorough investigation. > > He said: "If it is established that it was done by whoever, then > that person or persons should be made to answer for what is an > absolute intrusion on not just personal privacy, but political > privacy." > > Speaking in the House of Commons Tony Blair refused to respond > to demands for an investigation. > > He said: "I never comment on security allegations, I don't > intend to do so now." > > A Northern Ireland Office spokesman said they did not comment on > individual cases. > > He added: "We have a long standing principle that it is not > appropriate to discuss intelligence matters. All intelligence > agencies act under the law and there is no question of them > pursuing their own agenda. > > "Any person aggrieved by anything which he believes the police > or the security or intelligence services have done in relation > to him or any property of his, has the right to complain to the > appropriate authorities." > > ----- > > December 9 1999 - BRITAIN > > Adams demands inquiry after accusing Britain of 'breach of > faith' > > Sinn Fein car was bugged at peace talks > > BY CHRISTOPHER WALKER AND PHILIP WEBSTER > > GERRY ADAMS yesterday accused Britain of a "hugely serious > breach of faith" after claiming that military intelligence had > bugged a car used by Sinn Fein during sensitive peace > negotiations. > > Tony Blair faced demands for an inquiry after the Sinn Fein > president said the special listening and tracking bug had > undermined his role in the peace process. But Downing Street > hinted that the bugging could have been an authorised operation > to protect the public. > > The Prime Minister's spokesman refused repeatedly to comment on > the allegations. But he praised the work of the security > services and said: "It is right that the police, security and > intelligence agencies take prudent steps to protect the public > from the threat of terrorist violence." And he emphasised > several times that the security services worked under > ministerial control. > > The car in which the device was found had been used for driving > to meetings with IRA leaders, and the clear implication was that > the security services felt that, with the IRA still a terrorist > organisation, bugging was justified despite the ceasefire. There > is bound to be speculation that if the bugging was authorised, > the information obtained from it may have informed the > Government's actions in recent weeks. > > In a press conference at Stormont, Mr Adams angrily accused the > Blair Government - or rogue elements attached to it - of > planting the device which, he said, had been found in the car he > shared with Sinn Fein negotiator, Martin McGuinness during > recent peace talks with the former American Senator George > Mitchell. > > Accusing Britain of "a hugely serious breach of faith", Mr Adams > said that the matter could be resolved only at the level of the > British and Irish Prime Ministers. There were elements within > the system who had ignored the British Government's > demilitarisation strategy and who now needed "to be brought to > heel". > > Mr Adams added that the issue of the device - which was capable > of being used both for tracking and eavesdropping - had already > been raised with 10 Downing Street, which was given advance > notice that the original mundane subject of yesterday's press > conference was being changed. > > "I have asked first of all if it has been sanctioned," he said. > "And if so, who sanctioned it and that the eejit within that > element, if they did sanction it, should own up." He added that > if the bugging had not been sanctioned at a political level, > "then we should be reassured that this type of hidden agenda, > outside political control, which is how this place has been run > for 30 years, needs to be ended." > > Despite the public fury of Sinn Fein, local observers detected a > degree of posturing in their reaction. But it was generally > agreed that the timing of the scandal, just as the IRA is being > asked to begin disarming, was deeply unfortunate. > > The historic atmosphere of last week with the launch of the > power-sharing executive was quickly dissipated as old suspicions > resurfaced. The Conservative MP Andrew Hunter said that if the > bug had been planted by British undercover agencies, "my only > regret is that it has been found". > > The bug was uncovered over the past three days during a routine > inspection of the year-old Ford Mondeo, which is owned by an > unnamed person trusted by Sinn Fein. Mr Adams said that he had > not held meetings with IRA members in the car, but a Sinn Fein > source said that the device - which is available on the open > market - had been intended to track people and pick up "gossip > and conversation in the car". Mr Adams described the owner as "a > supporter of the peace process", but not politically active. > "This person is gutted by what has occurred." > > Mr Adams said that the bug was "discovered as a matter of > routine, but we do routine searches because we are suspicious." > > Leading figures in Sinn Fein have long believed that there is an > element in the British defence establishment deeply opposed to > the peace process and willing to plot against it. "There can be > no doubt whatsover that this was placed by members of British > Military Intelligence who are opposed to the peace process," Mr > McGuinness said. > > He claimed that the party would not be deflected from its > support for the peace process, but added that "no one should be > under any illusion" that this was a serious development. > > Mr Adams said the discovery of the bug, was evidence of "the > securicrat agenda once again coming to the surface". He gave a > detailed account of the device, which some security experts > believe was probably installed when the car was being serviced. > > Showing a remarkable fluency with the technology involved, Mr > Adams said that the bug had been built to the specifications of > the car and was colour-coded to the vehicle. He said that it had > digital tracking ability that could "probably" be picked up by > satellite. > > He said that the device was digitally enhanced and ran with 20 > to 30 watts of output. "It is linear amplified," he added as > most reporters looked on in ignorance. > > "The device was built into the entire infrastructure of the car. > The listening device, which is about the size of a matchead or > smaller, was at the centre of the roof of the car. There was > also a transmission aerial." > > Mr Adams said another ingenious feature was an input aerial > which allowed the bug to be switched off and on remotely. There > were also rechargable batteries wired to the car which were > activated only when it was running to allay suspicions of the > driver where the power was "being sucked to". "The wiring ran > along the skin of the car, from the back to the front." > > ----- > > December 9 1999 - BRITAIN > > Bugs used are freely available for £20,000 > > BY RICHARD FORD, HOME CORRESPONDENT > > The bug in Adams's car > > MUCH of the bugging equipment found in the Ford Mondeo car used > by Sinn Fein during the Mitchell Review talks is easily > available in London shops. > > The devices, selling for up to £20,000 apiece, are part of the > arsenal of equipment now used by security firms to provide > protection to their clients. > > However, the sophistication of the operation involving Gerry > Adams was in the fitting of the equipment into the one-year-old > vehicle. The equipment had been built into the infrastructure of > the vehicle, with a tiny microphone the size of a matchstick > head hidden into the roof of the car. The transmitter would be > about the size of a 50p piece. An input aerial allowed the > equipment to be switched on and off by remote control, with > wiring along the skin of the vehicle to devices in the two front > seats. A tracking device was behind the back seat of the > vehicle. > > Lee Marks, of Spymaster in Portman Square, London, said: "It is > advanced equipment, but it is all available on the open market. > It is not the individual devices that are sophisticated, but the > way in which they were built into the car. Fitting it would have > taken a great deal of time or involved a large team of experts > to install quickly." > > Last night it was unclear how Sinn Fein uncovered the device, > but experts in London said that for £600 the organisation could > have purchased a small piece of equipment that would have > detected any radio frequencies in the vehicle. > > Simon Sherrard, a security expert, said that a professional > operation would have involved less wiring than had been found in > the Mondeo. > > If the bug was placed by the security services, it would have > required a warrant from either the Home Secretary, Northern > Ireland Secretary, Foreign Secretary or Scottish Secretary. > > =================== > > Robert G. Ferrell, CISSP > Information Systems Security Officer > National Business Center > U. S. Dept. of the Interior > Robert_G_Ferrell@n... > ======================================== > Who goeth without humor goeth unarmed. > ======================================== > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1591 From: James M. Atkinson, Comm-Eng Date: Mon Sep 25, 2000 11:48am Subject: RE: Vehicle Considerations At 10:33 AM -0500 9/25/00, Robert G. Ferrell wrote: > > >>I guess it depends on where you are, but here in Oklahoma, > >>Ryder Trucks (or any big rental trucks for that matter) parked > >>for any length of time, tend to cause a second look and a little > >>more scrutiny. > >Make that anywhere there is a federal presence. I was trying to get from >Rosslyn to Alexandria (both Washington, DC suburbs) in 1997 and had to take a >long circuitous route to avoid the "police incident" on the main freeway >connecting the two. Turns out some poor shlub's Ryder truck ran out of gas on >an overpass near the Pentagon. He hiked off with his little can to find a >station. When he got back, half the local police force, Pentagon police, MPs >and bomb squads from Ft. Myer and neighboring military bases, and >for all I know >the head groundskeeper from Arlington National Cemetary had cordoned off the >entire area and were in the process of evacuating who knows how many >people from >adjacent structures. I wouldn't have wanted to be either the truck driver or >the official in charge of the incident scene. > >My point is that Ryder trucks, and to a certain extent all two or three axle >rental trucks, are poor choices in many areas of the U.S. for clandestine >activities. I know they make _me_ nervous. > >Cheers, > > >RGF > > >Robert G. Ferrell, CISSP >Information Systems Security Officer >National Business Center >U. S. Dept. of the Interior >Robert_G_Ferrell@n... Robert, I would agree with you concerning the "Big Yellow Trucks", especially since the Oklahoma and New York incidents. The big problem then is how do we get two dozen large transit cases of equipment, at least a dozen small tool cases, several ladders, and various support items close enough to the area we are performing a TSCM sweep to be of us. Also, how can we get really close to the area being inspected with a mobile platform of RF equipment to perform at least a partial RF sweep. Ideally we need to get within 100 feet of the area that we will be inspecting later. I have (as recently as a few days ago) parked a 15 ft cube van within 100 feet of a federal building in downtown Boston (for just under six hours). I had no problems at all (other then keeping the meter fed). I should add that it was a WHITE cube truck, with a large commercial logo and such on the outside, local phone number which rang to my cell phone, a local address, no external antenna, etc. I am confident that if I had used a "Big Yellow Truck" that the bomb squad would have been all over the truck. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= From: kondrak Date: Mon Sep 23, 2002 6:18pm Subject: Iowa Republican Claims Campaign Meeting Was Bugged You can tell the political season is upon us... http://www.theiowachannel.com/politics/1681768/detail.html DES MOINES, Iowa -- Ganske campaign officials and state Republican leaders are calling for a state and federal investigation into the apparent taping of a campaign strategy session. Congressman Greg Ganske is challenging incumbent Democrat Tom Harkin in the race for U.S. Senate. In letters to the U.S. attorney and the Iowa Division of Criminal Investigation, campaign officials said someone at the Sept. 3 meeting either was wearing a wire or illegally taped the conversation. 6274 From: David Alexander Date: Tue Sep 24, 2002 4:37am Subject: read this first - joke You've just bought the latest in bug detection technology, probably from our very own Steve. It arrives, you open the box and you find this piece of paper on top of the packaging: READ THIS FIRST Congratulations. You have purchased an extremely fine device that would give you tens of years of trouble-free service, except that you will undoubtedly destroy it with some typical bonehead end-user operation. Thisi s why we respectfully ask you to PLEASE FOR GOD'S SAKE READ THIS OWNERS MANUAL CAREFULLY BEFORE YOU UNPACK THE DEVICE. YOU ALREADY UNPACKED IT, DIDN'T YOU ? YOU UNPACKED IT AND PLUGGED IT IN AND TURNED IT ON AND FIDDLEDW ITH THE CONTROLS, AND YOUR CHILD, THE SAME CHILD WHO PUT TOAST IN YOUR VIDEO RECORDER AND SET IT TO 'FAST FORWARD', THIS CHILD IS ALSO FIDDLING WITH THE CONTROLS RIGHT ? WE MIGHT AS WELL BREAK THEM AT THE FACTORY BEFOREW E SHIP THEM OUT. Sorry. We just get a little crazy sometimes because we're always getting back 'defective' goods where it turns out that the consumer inadvertentlyb athed the device in acid for a week. So, in writing these instructions, wen aturally tend to assume that your skull is filled with fluff from the backo f your chair, but we mean nothing by it OK ? Now let's talk about: UNPACKING THE DEVICE. The device is encased in foam to protect it from the shipping people, whol ike nothing more than to play football with outgoing boxes. PLEASE INSPECTT HE CONTENTS CAREFULLY FOR GASHES OR IDA MAE BARKER'S ENGAGEMENT RING, WHICH SHE LOST LAST WEEK, AND SHE THINKS IT MAY BE WHILE SHE WAS PACKING BOXES FOR SHIPMENT. Ida Mae really wants her ring back, because it is hero nly proof of engagement, and her fiancÈe Stuart is now seriously thinking about dumping her, insamuch as he had drunk most of a bottle of Jack Daniels before he popped the question. It is not without irony that her last name is 'Barker', if you get our drift. WARNING: Do not ever, as long as you live, ever throw away any of the packing or those little pieces of Styrofoam, even the little ones shaped like peanuts. We count those, you know. If you attempt to return the devicea nd you are missing so much as one, the stores staff will laugh in the chilling manner exhibited by a despot in a tragically bad movie just afterh e destroys another village. Beside the device, the box should contain: Eight little rectangular snippets of paper that say "warning" A little plastic packet containing four 5/17 inch pilfer grommets and two6 /93 inch side-adjusting hovel nuts One of those little packs of silica gel that would keep your device dry int ransit if the storeman's dog hadn't 'pre-dampened' the last lot we got in. You will need to supply a field-portable tactical matrix wrench, two longs tands, a bag of sparks for the grinder and 60 feet of tram cabling to complete the commissioning process. Warning: This assumes that your spouse's name is Margaret, otherwise you don ot need the cabling. PLUGGING IN THE DEVICE There's no point in having this section BECAUSE YOU ALREADY DID DIDN'T YOU? What you should have done is read the manual, consulted a qualified electrician I SAID QUALIFIED, NOT YOUR FRIEND WHO JURY-RIGGED A LAMP ONET IME and had the plug and fuse checked for compatibility with supplies iny our area. This product is very sensitive to fluctuating variations in them odal mean side tone-ratio of the ohmic capacitance within your supply, butd on't worry, because the electrician will know all about it. Never try toi nsert batteries yourself, always ask a child under 10, as only they can get it right. Warning: When you are laying on the floor and trying to insert the plug, don ot hold a sharp object in your other hand, trip over the power lead and poke your eye out. This could invalidate your warranty. Operation of the device For results that can be the finest, it is advising that: never hold theseb uttons together or two times }] exept the battery. Next taking the (something) earth section may cause a large occurring of the end. However.I f this is not a trouble, then such rotation is a very maintenance sectiona s a kindly virepoint from drawing B. Warning: We only make the casing. The actual working parts were made by am om and pop operation in the Phillipines or Taiwan, well, somewhere like that. The instructions were translated by Mrs Shirley Peltwater of accountsp ayable who spent two weeks on holiday there a few years ago. WARRANTY: The manufacturer guarantees that this product will break sooner or later. Be it thereby known that this device, together with, but not excluding allt hose certain parts thereunto, shall be warranted against all defects, failures and malfunctions as shall occur between now and Thursday afternoon, shortly before 2 pm during which time the Manufacturers will, atn o charge to themselves, send the device to our service people, who will emerge from their cave and engage in rituals designed to cleanse it of evils pirits. This warranty does not cover the designer case we made. Warning: It may be violation of some law that Mrs Shirley Peltwater was notv accinated before she went on holiday to wherever it was. _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 6275 From: Steve Uhrig Date: Tue Sep 24, 2002 6:21pm Subject: Latest model yellow box TDRs for sale Hi all, If you need a TDR (and if you don't have one and are thinking about sweeping telephones, you need one) I have several for sale. As you all know, I am a major big time fan of Riser Bond 'yellow box' TDRs. I've owned every model they've made, used every model, and sold every model, to the tune of probably a hundred machines. They're by far the easiest to use, most logical, most capable and most rugged TDR out there, and well suited for TSCM. A TDR will become your main tool, and once you master it (a few evening's work), you'll be very confident, and a fairly wicked telephone sweeper. The latest, fanciest model is the 1270. This actually is overkill for TSCM, but nothing wrong with having the best. And if you are buying a tax deductible business tool, might as well put your money into test equipment as into some social program funded by taxes. I have one and one only 1270 for sale, from a lot of five I purchased back in July. All have new batteries, fresh calibration, all accessories (two sets of heavy duty alligator clip lead sets, cigarette lighter charger, AC charger, coax lead set, computer interface cable, manual, accessory pouch, wallet laminated cheat sheet of velocity factors, etc.), in like new condition. These were used once on massive cable installs, for less than a week. I will send the software for Wave View, but Riser Bond is always updating it and you can download the latest version from their website www.riserbond.com, for free. You can run it and play with it right now without having a TDR connected to the computer, to get a feel for it. This reference to software means the yellow box TDRs can be computer controlled, trace dumped directly to a serial printer, trace digitized and stored on the computer, or the waveform info can be stored inside the TDR digitally, to be printed or transferred to the computer for your report at some later date. You do NOT have to carry a computer with you to take advantage of the digital storage. Nor do you need to feed and water weirdo internal chart printers in a Tek TDR. For one week, and I mean one week only, from today, I will include at no extra charge a briefcase-sized hard carrying case, which is redundant because the TDR Pelican case is actually more rugged than the hard carrying case. But the hard case will keep the 1270 looking new and give you room for extra accessory cables and your lunch and stuff. I only have two of these cases, and they're a $100 option from Riser Bond (they fit any yellow box TDR). I never know when I will get used yellow box TDRs in, in excellent shape. Could be next week, might not be for six months. But I have only ever gotten five of these 1270s in. My tech Ron and I got two, and two I sold last month went for $2500 for one and $2750 for another. They are $3500 new from the distributors, and there are no discounts. One is left. My price is $2000 with all accessories. You can see the 1270 on www.riserbond.com. Jensen and Tessco are distributors if you want to check prices, but Riser Bond prices fixes like Fluke and no one discounts them any. Anywhere you look they will be $3500 +/- ten bucks, and the cheaper ones charge more shipping. The new price for a 1270 from any distributor is $3500, so you'll be getting it for a little more than half price with maybe 8 hours of use, my guarantee, and I can put it on a credit card. As an FYI, every Riser Bond TDR you buy, regardless of model and without exception, will need a new battery, which costs $100.03 each for almost every type of battery as I just got a new batch in last week. Many will need a $20 charger, and all should be calibrated. Riser Bond will calibrate the newer 'yellow box' TDRs for $150. I can calibrate older ones, and they all need it. Nothing you buy on ebay is guaranteed, many being sold by pawn shops and guys who stole them from their employer and will not tell you anything about them. If they light up for ten seconds, they'll say they're working. And you get to calibrate it and buy a $100.03 battery pack and probably test leads. Caveats not necessary here. I guarantee everything as countless TDR and other equipment buyers on this list will testify, not that I need to do anything regarding guarantees as the stuff I sell is in the condition I claim. =========== If you'd like a yellow box TDR but can't quite afford the cost of the 1270 mentioned above, I have the following other model Riser Bond machines available. All are yellow box unless otherwise indicated. 2401B+ (little ping box with digital readout; possibly one of the most common TDRs used in TSCM). Not a yellow box. Must be used with an external oscilloscope with at least 100 Megacycle frequency response. Nicad powered. Best for beginners and/or anyone who already owns a decent oscilloscope. One of the more compact units; will fit in a briefcase where most of the others will not. Takes a $100.03 battery. 1205C -- has large LCD display built in, auto setting, very simple front panel, variable pulse widths, variable velocity factor, variable impedance. Backlit screen. Battery gauge. Automatically calculates and displays fault on the screen as well as distance to the fault and dB loss through the fault. Very nice unit, one of the Cadillacs of TDRs. Digital storage of traces can be downloaded to a computer or printer later. Very easy to use. Connect the line to test, turn it on, and it does it all automatically. Has automatic noise filters which switch in automatically to give you the cleanest trace. Waterproof Pelican case. An exception to the battery rule. This one takes a $22 battery from MCM. $1000 1205CX - later model than 1205C, no meaningful differences. Takes $22 battery. $1350. Overall probably the simplest and easiest to use full features 'yellow box' TDR. Does have digital storage, as to all other yellow box ones. Best investment for TSCM all considered. 1205CXA -- now uses nickel metal battery instead of lead acid like in the 1205 and 1205C and 1205CX series, for lighter weight, longer life per charge. Has sub nanosecond pulse for finding intermittents or very quick happenings on digital lines. The absolute Cadillac of TDRs, essentially the same as the 1270 except does not have separate outputs for both coax and twisted pair (and doesn't need them. An adapter from a BNC is what all other TDRs use including Riser Bond). Current model; see Riser Bond's website for details. Costs $3000 new, today, from the distributors. My price $1500. Model 1000 -- 'Line Judge', checks any type of cable, for length and faults only. Not a yellow box. Not especially suited for TSCM since there are no provisions for viewing a trace either internally or externally. Great for people who install cable and need to measure lengths or find faults but do not particularly care about TSCM. Digital readout to fault, no screen for a trace. Smallest TDR made by Riser Bond, and latest model. Uses a 9 volt battery. Not suited for TSCM except in rare cases. Cannot drive an oscilloscope. Use the 2401 if you are at this level. Price $150. This is a good TDR for installers who need the simplest piece to measure the length of a line but are not inspecting it for tampering. Contact me if you have an interest in picking up a top quality TDR that will last the rest of your career. Now is the best time since I am very serious about fall cleaning and making more space in my shop. Call me with your needs or to discuss where you are, and I will recommend the best one for your level of experience, your budget and your personal capabilities. A TDR is easy to use, can read rat piss on the lines, and separates the men from the boys. You'll need one eventually. Here's your chance to save a lot of money and probably buy a better unit than you will be able to afford in the future. Practice some with these things, get confident in it, and you will be a major reckoning force in the industry. Few professional sweepers have TDRs as nice as are described on this page. Most also come with leads, all come with manuals and chargers. All come with a padded carrying case OR a Pelican waterproof case (depending on model). Most also come with an outboard accessory pouch to hold extra sets of leads, jumper cables, the charger, etc. Most models have a place inside the lid to hold the instruction manual, a coax jumper and an alligator clip set of input leads. I can take credit cards and ship overnight if necessary. Will ship anywhere in the world. Call if interested in breaking through the equipment barrier from novice to journeyman. Are you going to play games all your life on telephone lines where the majority of the threats target, or are you going to equip yourself and learn to use the same silver bullet professionals use but like to keep quiet? Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6276 From: Mitch Davis Date: Tue Sep 24, 2002 9:26pm Subject: TDR's and other equipment from SWS I paid $3500.00 for a RB1270A,fantastic piece of gear. We've done business repeatedly with Steve,and everything was always in order,and in pristine condition. I give SWS the double "Thumbs Up" for any sale or service needed. The 1270A is easy to use,has some excellent features,as Steve had mentioned,and you wont find one anywhere for less.RB does not discount their gear.at all.period.I have seen tdrs in pawn shops,they're usually beat up,with weak batteries,and usually "belong to someone else". The reason for my "plug" is that I wouldn't trust too many people on an internet deal except for SteveU(SWS),and a few others,and have done good business with SWS without any worries,plus,I made a "good friend in the business"on top of everything else.I usually like to pass on good things about good people,hence my "plug" or ummm testimonial???? Have a great day! MD ----------------------------------------------------------- Mitch Davis TSCM/Special Operations Group,Inc. (615) 837 9933 cell (615) 584 9933 e mail: MitchD@t... website www.tscmusa.com Nashville,TN.USA ----------------------------------------------------------- [Non-text portions of this message have been removed] 6277 From: Mitch Davis Date: Wed Sep 25, 2002 6:13pm Subject: intermod/rf interference article in October Nuts N Volts Magazine Just wanted to pass this on: I imagine there's list members that already subscribe to Nuts and Volts,but for those who don't: Octobers Issue of Nuts and Volts Magazine has an article written by Gordon West, on Part 15 information, as well as identifying and locating what is known to scanner buffs as "birdies",or spurious rf emissions, in better terms.I read through the article and thought it may be of interest,as it may help in determining where a stray signal may be coming from. The article is not available on line,but more nuts and volts info is.There's also a list of bookstores that carry the magazine on the site as well www.nutsvolts.com Quite frequently, they do have some outstanding information, and I thought this may be of interest. Cheers! ----------------------------------------------------------- Mitch Davis TSCM/Special Operations Group,Inc. (615) 837 9933 cell (615) 584 9933 e mail: MitchD@t... website www.tscmusa.com Nashville,TN.USA ----------------------------------------------------------- [Non-text portions of this message have been removed] 6278 From: The Shield Group Date: Wed Sep 25, 2002 6:37pm Subject: SWS Security - TDR's For Sale Hi All, >>"Steve Uhrig" wrote: >> >>If you need a TDR (and if you don't have one and are thinking about >>sweeping telephones, you need one) I have several for sale. I have to agree with Steve, the Riser Bond 1270 is an excellent TDR. My 1270 is a couple of years old and has never let me down. It is both rugged and reliable. The price Steve is asking is a steal. If you don't own a TDR, this is a deal that is too good to pass up. I have done business with Steve in the past and cannot recommend him and SWS Security highly enough. He is honest and stands behind everything he sells. When you deal with Steve you also get something else money cannot buy: Sound advice and the wisdom that comes from years of practical, hands on experience. I am very careful about who I endorse and recommend. In Steve's case, that recommendation comes very easily. Buy with confidence. Roy _______________________________________ The Shield Group Technical Security Consulting Services shieldgroup@m... 6279 From: James M. Atkinson Date: Thu Sep 26, 2002 4:33am Subject: Re: Latest model yellow box TDRs for sale The equipment which Steve is offer is really great equipment for TSCM, and is being offered at one heck of a deal. Riser Bond is the-best-of-the-best when it comes to field grade Time Domain Reflectometry, and anybody involved in TSCM is going to have several on hand at any time. It pains me to say this, but... if your performing TSCM services and you don't have a TDR then your ripping off your customers and playing games with yourself. Steve is offering great equipment, at a very impressive price... you would do well to pick a few up. -jma At 7:21 PM -0400 9/24/02, Steve Uhrig wrote: >Hi all, > >If you need a TDR (and if you don't have one and are thinking about >sweeping telephones, you need one) I have several for sale. > >As you all know, I am a major big time fan of Riser Bond 'yellow box' >TDRs. I've owned every model they've made, used every model, and sold >every model, to the tune of probably a hundred machines. They're by >far the easiest to use, most logical, most capable and most rugged >TDR out there, and well suited for TSCM. A TDR will become your main >tool, and once you master it (a few evening's work), you'll be very >confident, and a fairly wicked telephone sweeper. > >The latest, fanciest model is the 1270. This actually is overkill for >TSCM, but nothing wrong with having the best. And if you are buying a >tax deductible business tool, might as well put your money into test >equipment as into some social program funded by taxes. > >I have one and one only 1270 for sale, from a lot of five I purchased >back in July. All have new batteries, fresh calibration, all >accessories (two sets of heavy duty alligator clip lead sets, >cigarette lighter charger, AC charger, coax lead set, computer >interface cable, manual, accessory pouch, wallet laminated cheat >sheet of velocity factors, etc.), in like new condition. These were >used once on massive cable installs, for less than a week. I will >send the software for Wave View, but Riser Bond is always updating it >and you can download the latest version from their website >www.riserbond.com, for free. You can run it and play with it right >now without having a TDR connected to the computer, to get a feel for >it. This reference to software means the yellow box TDRs can be >computer controlled, trace dumped directly to a serial printer, trace >digitized and stored on the computer, or the waveform info can be >stored inside the TDR digitally, to be printed or transferred to the >computer for your report at some later date. You do NOT have to carry >a computer with you to take advantage of the digital storage. Nor do >you need to feed and water weirdo internal chart printers in a Tek >TDR. > >For one week, and I mean one week only, from today, I will include at >no extra charge a briefcase-sized hard carrying case, which is >redundant because the TDR Pelican case is actually more rugged than >the hard carrying case. But the hard case will keep the 1270 looking >new and give you room for extra accessory cables and your lunch and >stuff. I only have two of these cases, and they're a $100 option from >Riser Bond (they fit any yellow box TDR). > >I never know when I will get used yellow box TDRs in, in excellent >shape. Could be next week, might not be for six months. But I have >only ever gotten five of these 1270s in. My tech Ron and I got two, >and two I sold last month went for $2500 for one and $2750 for >another. They are $3500 new from the distributors, and there are no >discounts. > >One is left. > >My price is $2000 with all accessories. > >You can see the 1270 on www.riserbond.com. Jensen and Tessco are >distributors if you want to check prices, but Riser Bond prices fixes >like Fluke and no one discounts them any. Anywhere you look they will >be $3500 +/- ten bucks, and the cheaper ones charge more shipping. > >The new price for a 1270 from any distributor is $3500, so you'll be >getting it for a little more than half price with maybe 8 hours of >use, my guarantee, and I can put it on a credit card. > >As an FYI, every Riser Bond TDR you buy, regardless of model and >without exception, will need a new battery, which costs $100.03 each >for almost every type of battery as I just got a new batch in last >week. Many will need a $20 charger, and all should be calibrated. >Riser Bond will calibrate the newer 'yellow box' TDRs for $150. I can >calibrate older ones, and they all need it. Nothing you buy on ebay >is guaranteed, many being sold by pawn shops and guys who stole them >from their employer and will not tell you anything about them. If >they light up for ten seconds, they'll say they're working. And you >get to calibrate it and buy a $100.03 battery pack and probably test >leads. > >Caveats not necessary here. I guarantee everything as countless TDR >and other equipment buyers on this list will testify, not that I need >to do anything regarding guarantees as the stuff I sell is in the >condition I claim. > >=========== > >If you'd like a yellow box TDR but can't quite afford the cost of the >1270 mentioned above, I have the following other model Riser Bond >machines available. All are yellow box unless otherwise indicated. > >2401B+ (little ping box with digital readout; possibly one of the >most common TDRs used in TSCM). Not a yellow box. Must be used with >an external oscilloscope with at least 100 Megacycle frequency >response. Nicad powered. Best for beginners and/or anyone who already >owns a decent oscilloscope. One of the more compact units; will fit >in a briefcase where most of the others will not. Takes a $100.03 >battery. > >1205C -- has large LCD display built in, auto setting, very simple >front panel, variable pulse widths, variable velocity factor, >variable impedance. Backlit screen. Battery gauge. Automatically >calculates and displays fault on the screen as well as distance to >the fault and dB loss through the fault. Very nice unit, one of the >Cadillacs of TDRs. Digital storage of traces can be downloaded to a >computer or printer later. Very easy to use. Connect the line to >test, turn it on, and it does it all automatically. Has automatic >noise filters which switch in automatically to give you the cleanest >trace. Waterproof Pelican case. An exception to the battery rule. >This one takes a $22 battery from MCM. $1000 > >1205CX - later model than 1205C, no meaningful differences. Takes $22 >battery. $1350. Overall probably the simplest and easiest to use full >features 'yellow box' TDR. Does have digital storage, as to all other >yellow box ones. Best investment for TSCM all considered. > >1205CXA -- now uses nickel metal battery instead of lead acid like in >the 1205 and 1205C and 1205CX series, for lighter weight, longer life >per charge. Has sub nanosecond pulse for finding intermittents or >very quick happenings on digital lines. The absolute Cadillac of >TDRs, essentially the same as the 1270 except does not have separate >outputs for both coax and twisted pair (and doesn't need them. An >adapter from a BNC is what all other TDRs use including Riser Bond). >Current model; see Riser Bond's website for details. Costs $3000 new, >today, from the distributors. My price $1500. > >Model 1000 -- 'Line Judge', checks any type of cable, for length and >faults only. Not a yellow box. Not especially suited for TSCM since >there are no provisions for viewing a trace either internally or >externally. Great for people who install cable and need to measure >lengths or find faults but do not particularly care about TSCM. >Digital readout to fault, no screen for a trace. Smallest TDR made by >Riser Bond, and latest model. Uses a 9 volt battery. Not suited for >TSCM except in rare cases. Cannot drive an oscilloscope. Use the 2401 >if you are at this level. Price $150. This is a good TDR for >installers who need the simplest piece to measure the length of a >line but are not inspecting it for tampering. > >Contact me if you have an interest in picking up a top quality TDR >that will last the rest of your career. Now is the best time since I >am very serious about fall cleaning and making more space in my shop. >Call me with your needs or to discuss where you are, and I will >recommend the best one for your level of experience, your budget and >your personal capabilities. > >A TDR is easy to use, can read rat piss on the lines, and separates >the men from the boys. You'll need one eventually. Here's your chance >to save a lot of money and probably buy a better unit than you will >be able to afford in the future. Practice some with these things, get >confident in it, and you will be a major reckoning force in the >industry. > >Few professional sweepers have TDRs as nice as are described on this >page. > >Most also come with leads, all come with manuals and chargers. All >come with a padded carrying case OR a Pelican waterproof case >(depending on model). Most also come with an outboard accessory >pouch to hold extra sets of leads, jumper cables, the charger, etc. >Most models have a place inside the lid to hold the instruction >manual, a coax jumper and an alligator clip set of input leads. > >I can take credit cards and ship overnight if necessary. Will ship >anywhere in the world. > >Call if interested in breaking through the equipment barrier from >novice to journeyman. Are you going to play games all your life on >telephone lines where the majority of the threats target, or are you >going to equip yourself and learn to use the same silver bullet >professionals use but like to keep quiet? > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6280 From: kondrak Date: Thu Sep 26, 2002 0:51pm Subject: Business picking up at Marriot? http://www.knoxnews.com/kns/local_news/article/0,1406,KNS_347_1438232,00.html An Ohio man filed a $1.5 million lawsuit Tuesday against the Knoxville Marriott hotel after finding a hidden camera in a bathroom light fixture in July. 6281 From: Fernando Martins Date: Fri Sep 27, 2002 5:24pm Subject: WISI catalogs If by any chance anyone has a WISI BB 62 or BB 63, BC 62 or BC 63 detailed installation manual in english, PLEASE say something. WISI is a german company and in english they have only general brochures. BTW ... This is for RF video/audio/alarm transmission for 1km distance ... Anyone using other solutions? FM 6282 From: Andre Holmes <1ach@g...> Date: Sun Jan 23, 2000 1:32pm Subject: Bugs and Telephone Taps Bugs and Telephone Taps The Bugs and Telephone Taps That Eavesdroppers Currently Use To "LISTEN-IN" on YOU! Over the years many of the devices shown below have been openly sold to the general public by a number of firms, with one firm alone boasting of the many "thousands of satisfied customers" it has served. The most common Eavesdropping Transmitters (telephone and room type) were originally designed to by operated in or near the standard FM broadcast band of 88 - 108MHz. However, in order to lessen the possibility of inadvertent discovery, current eavesdroppers now use frequencies that are either above or below the standard band. A number of commercially available transmitters will adjust their transmitting frequency just off each end of the standard band so that frequencies between 78 - 88MHz and 108 - 118MHz may also be used. On the high end, the transmitters broadcast directly on many aircraft frequencies. On the low end they may be picked up on standard television receivers. A large number were made to operate in the 150 - 475MHz area. And, the latest Eavesdropping Transmitters now utilize the higher frequencies from 3 GHz - 5 GHz. These extremely high frequencies provide considerably less probability of detection during Electronic Counter Surveillance "sweeps". To conserve battery power, some transmitters are voice activated and start transmitting automatically when sounds or conversations begin and turn off when sounds cease. Many Telephone Transmitters start when the telephone is picked up and turn off when the telephone is hung up. Of course, any conversation that can be monitored can also be recorded. The recording may be done manually or automatically through the use of "carrier switches" that start and stop the recorder whenever the eavesdropping transmitter turns on and off. The receiver-recorder may be placed in the trunk of an auto located a considerable distance from the actual site being monitored. In this manner the Eavesdropper need only return to the auto periodically to replace tapes. NOTE *** Our Counter-Surveillance Equipment will quickly detect and locate ALL of the following Devices! _________________________________________________ CONCEALED WALL PLUG TRANSMITTER This ingeniously designed device is actually a very sensitive room transmitter that will easily pick up and transmit all sounds and conversations in a 20' x 20' room. Unit is built into a standard wall plug available at any hardware or department store. The 3 sockets are working sockets and except for a small pinhole to expose the microphone, it is virtually impossible to differentiate from the standard wall plug without disassembling the device. _________________________________________________ CONCEALED 6 SOCKET PLUG TRANSMITTER Utilizes the same basic circuitry as the previous unit and has about the same operating characteristics. All 6 sockets are also "live" operational sockets and this unit also cannot be exposed by external visual examination. The extra space available in this larger configuration allows additional stages of amplification and some units deliver a slightly better range that the 3 socket unit. However, range is still rather limited, again due to the absence of an antenna and few units exceed 250' in transmission range even under ideal conditions. _________________________________________________ CONCEALED WALL OUTLET TRANSMITTER Similar excellent quality sound pick-up and operating characteristics as provided by the previous units with one very important exception. The concealed nature of this unit makes possible the addition of an antenna approximately 3' long depending upon operating frequency. Flexible wire antenna is usually extended between the building studs and taped or tacked along the inside of the wall. The antenna greatly extends the range and some units can exceed 1,500'. The circuitry is mounted on the back of the unit and is easily distinguished from the standard unit once visually examined. _________________________________________________ CONCEALED LAMP TRANSMITTER Exhibits the same basic operating characteristics as the concealed Wall Outlet Transmitter. However, unit requires no installation and can be placed in a room or removed as easily as plugging in the lamp. Antenna usually is concealed in lamp, lamp shade or third wire in extension cord. Installation has been known to be accomplished very easily via the "gift" ruse. Unit has usually been designed to transmit only when light is turned on, but is also available in a constantly on mode whenever lamp is plugged in Variations of this device can also be concealed in radios and TVs. Range can also exceed 1,500'. _________________________________________________ BUMPER-BEEPER" TRACKING DEVICE Used for following and tracking automobiles without being observed. Size varies form 1" x 2" to 3" x 5" with the larger units providing superior range. Requires an antenna for maximum range and will provide directional information up to ranges exceeding 5 miles. Frequencies vary with individual manufacturers. Standard broadcast FM frequencies are extremely uncommon, but not unheard of. When tracking a moving auto, two tracking autos are usually preferred for most precise triangulation. Bumper-beepers prove extremely effective when tracking an auto through heavy traffic or when the subject is aware of the possibility of being followed. The unit is attached to the underside of the vehicle using magnets or a strong two sided adhesive material. The inside of the bumper has proven ideal for concealment, since even auto mechanics seldom have cause to check that area. Since most legislation is directed at the interception of oral or data communications, the use of this device for surveillance purposes appears to have been completely overlooked. _________________________________________________ SPECIAL NOTE *** Computer-age technology now makes it possible to track (follow) automobiles using GPS satellite systems for reception of bumper-beeper and other types of tracking transmitters allowing for "real time" or stored information. Recently the price of these devices has been greatly reduced, and these price reductions have now put them in the hands of thousands of individuals and firms. And, the very latest devices currently in development by government and private industry now use ultra-long range Bar Code Readers to track automobiles, various objects and even individuals. This newest technology will, within the next few years, make "beeper" type transmissions completely obsolete. _________________________________________________ "BODY" TRANSMITTER This unit, also known as a "WIRE", is most frequently utilized by law enforcement agencies to obtain virtually irrefutable evidence. Also used by private individuals and firms, since the use of this unit does not violate most state and federal statutes pertaining to "surreptitious" interception. The nature of the configuration of the device, in that the wearer must be a party to the conversation, precludes the "bugging" aspects. However, when three or more parties are present with only one party being aware of the presence of the body transmitter, the surreptitious aspects are again open to question and interpretation. Price, range and quality of sound pick-up vary greatly with a large number of manufacturers now producing the unit for government agencies. Size varies from about 2" x 3" to 3" x 6". Transmitting range between 300' and 2,000' depending upon terrain and quality of unit and receiver. A variety of transmitting frequencies are available and utilized. Manufacturers are widely promoting the use of this device to law enforcement agencies. Recent publicity given to this unit by newspapers, radio and TV in major prosecutions of so-called "mob" figures has also created public awareness and a huge demand for variations of the Body Transmitter. _________________________________________________ AUTOMATIC TELEPHONE RECORDING DEVICE Available from a number of firms due to its many legitimate uses, this simple little device is popular with the less sophisticated eavesdropper. It automatically starts a recorder whenever the telephone is picked up, records both sides of the conversation and then automatically stops the recorder when the telephone is hung up. Devices vary in complexity from simple "drop-out" relays to completely transistorized circuitry and combinations of both. Approximate size varies from 1" x 1" to 2" x 3". Most units have 4 wires leaving the unit with 2 wires going to the mike (or aux) input of the recorder and 2 wires going to the red and green telephone wires. Connects in parallel across the wires and no disconnecting of the phone line is necessary. Also available with a modular plug for direct connection into the phone jack _________________________________________________ "SERIES" TELEPHONE TRANSMITTER Transmits both sides of any telephone conversation to a receiver within 100' to 500' depending on the terrain and quality of receiver. They are "parasitic" type devices in that they actually take power from the phone line and no type of battery or electric power is required. The unit is only active when the telephone is in use and usually loads the line very little when not in use, thus considerable lessening the possibility of inadvertent detection by the phone company. Approximate size 1" x 1" with 2 wires leaving the unit and one additional wire if an antenna is used. Connected in "series" anywhere along the telephone line. Red or green wire must be disconnected at some point and the device is connected across the open wires. May also be installed in the telephone itself, but this usually considerably limits the range. "PARALLEL" TELEPHONE TRANSMITTER _________________________________________________ Transmits both sides of any telephone conversation to a receiver within 200' to 1,000' depending on terrain and quality of receiver. Requires external battery power and in rare cases may be wired directly into an AC source. Unit remains constantly on and consequently is some- what easier to detect. If battery powered, unit requires regular replacement of batteries. Occasionally provided with alligator clips for ease of connection. Approximate size is 1" x 2" and usually has batteries directly attached to unit. It is connected directly across the red and green wires and does not require the disconnection of any phone wires. May also have an antenna lead. _________________________________________________ MODULAR JACK TELEPHONE TRANSMITTER This rather ingenious little device has been manufactured and sold nationally in kit form (by dealers obviously completely ignorant of the strict federal laws which bar not only the sale, but also the mere possession of audio eavesdropping "components"). It has also been offered completely assembled. Range is surprisingly good since some units are internally wired to utilize a third telephone wire as an antenna. Range can exceed 1,000' with a good receiver. Unit is simply inserted in existing telephone jack and rarely is the extra jack (splitter) noticed. Now we come to the MOST DEVASTATING and most commonly used Eavesdropping Device! _________________________________________________ THE "INFINITY" TRANSMITTER While most individuals are somewhat guarded in their telephone conversations, they still rather naively feel secure in the "privacy" of their own home or office. And, that definitely makes this "bug" the one to fear most! Not only because of its capability, but due to the large number now in the hands of government agencies, professional industrial spies, unscrupulous business competitors and private individuals. Also, referred to in various configurations as "Hookswitch" bypass, "Third Wire" tap, "Harmonica Bug", etc. They all have basically the very same function . . . to intercept all conversations in the vicinity of the telephone instrument or wherever the unit is installed. The "INFINITY" Transmitter transforms any telephone into a sensitive "Bug" that will actually pick up all sounds and conversations within a 400 square foot area . . . with the TELEPHONE REMAINING "ON THE HOOK"! The Eavesdropper simply calls the telephone number of the victim and remotely activates the device before the telephone rings. Constantly updated over the past 30 years, this device most often requires introduction of a particular frequency tone, combination of tones, or external voltage (requiring no ring) introduced into the telephone line to trigger the unit. The unit can be hidden directly inside the telephone or anywhere along the line on the premises. Size varies from 1" x 2" to 2" x 3" with either 2 or 4 wires leaving the unit depending upon function. It may use the actual telephone microphone to pick up the sounds or an external mike of greater sensitivity. It has been disguised in any number of ways and its use is only limited by the ingenuity of the Eavesdropper. Because of its devastating capability, this device has definitely become the "BUG OF CHOICE". The latest development in this devastating Listening Device doesn't require an initial telephone ring, but older devices frequently fail to trigger the unit before the first ring and when the phone inadvertently rings, the Eavesdropper usually feigns a "wrong number". After the victim hangs up, the 'INFINITY" Transmitter is then automatically activated. There is absolutely no range restriction and all room sounds and conversations can be monitored and/or recorded from literally ANY DIRECT DIALING TELEPHONE IN THE WORLD. DON'T LET IT HAPPEN TO YOU! Back [Non-text portions of this message have been removed] 6283 From: Andre Holmes <1ach@g...> Date: Sun Jan 23, 2000 1:35pm Subject: Bugs and Telephone Taps http://www.bugdetectors.com/Page_16x.html [Non-text portions of this message have been removed] 6284 From: Blake Bowers Date: Fri Sep 27, 2002 1:50pm Subject: Camera system I need a wireless camera system, black and white is ok, color is better, that has a range of 1 mile. Pretty much line of site between the two sites. Ideas? Inexpensive is good. Real time is a must 6285 From: Fernando Martins Date: Sat Sep 28, 2002 0:18pm Subject: RE: Camera system http://www.pelco.com http://www.ademcovideo.com Those are my usual camera suppliers. But in wireless systems, the camera may not be even the main issue. You must choose a RF, laser or IP transmission/reception system. If you saw my last mail, is about a RF system for 1 to 10 miles range, using a Yagi antenna. But the customer is a huge oil company ... Who cares about inexpensive stuff eheheh ;) Anyway, will be a 24/7 working system? Also for night? Close to the sea? IP66? Bullet proof? .... A lense 3-8mm or 5-50mm? Is there a need for audio or alarm channel? What about a recording system? Lets say ... A 24 hour VCR from Sony, or a DX9000 system from Pelco with RAID5? Is there any high voltage lines in between? ... I may go on with more 50 questions ... FM > -----Original Message----- > From: Blake Bowers [mailto:bbowers@t...] > Sent: sexta-feira, 27 de Setembro de 2002 19:51 > To: tscm-l@yahoogroups.com > Subject: [TSCM-L] Camera system > > > I need a wireless camera system, black and white is ok, > color is better, that has a range of 1 mile. Pretty much > line of site between the two sites. > > Ideas? Inexpensive is good. Real time is a must > > > > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> Looking for a more powerful > website? Try GeoCities for $8.95 per month. Register your > domain name (http://your-name.com). More storage! No ads! > http://geocities.yahoo.com/ps/info > http://us.click.yahoo.com/aHOo4D/KJoEAA/MVfIAA/kgFolB/TM ---------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6286 From: Andre Holmes <1ach@g...> Date: Mon Jan 24, 2000 1:51am Subject: The Adela Group Law Enforcement, Security, Military Greetings Id like to share with you results of research that is a must in this profession enjoy. ANDRE HOLMES http://www.adelagroup.com/ [Non-text portions of this message have been removed] 6287 From: MiKe F. Date: Sat Sep 28, 2002 0:38pm Subject: Cameras & other things I have found that supercircuits has a good selection, good equipment and very competative prices. Get their free 107pg catalog. http://www.supercircuits.com/STORE/home.asp I am not connected & or not receiving any renumeration from supercircuits. later4,mike f. 6288 From: Matt Paulsen Date: Sat Sep 28, 2002 2:23pm Subject: RE: Camera system I'd look for a camera that does IP transmission with an ethernet port, connect it to a lan if possible. You can bridge it using microwave at least 2mb/s at 1 mile. Additional benefits - you can store the transmissions, burn to dvd, modify frame rates for capture up to realtime, etc. Here's an example of an 11mb WIFI cam, color 30fps. I can get them at less than $400 each. Here's a link to build a microwave lan interface - you asked for cheap after all... http://www.qsl.net/ke5fx/#uwave Part#:S2191142 Mfr#:NC220W Mfr:Hawking General Device Type Digital video camera Form Factor External Compatibility PC Camera Color Support Color Interface Type Ethernet Lens Aperture F/1.8 Exposure Range 1/15000 sec - 1/60 sec Min Illumination 2.5 lux White Balance Automatic Video Digital Video Capture Speed 30 frames per second Digital Video Capture Resolution 640 x 480, 320 x 240, 160 x 120 Still Image Still Image Format JPEG Still Image Capture Resolution 640 x 480 Software / System Requirements Min Operating System Microsoft Windows 98 Second Edition / Windows ME, Microsoft Windows 98/2000/XP Peripheral / Interface Devices CD-ROM Warranty Service / Support Limited warranty Service / Support Details 2 years x limited warranty Thanks, Matt Paulsen President/CEO Orange Networks LLC http://www.orange-networks.com P: 503.892.8786 F: 503.892.8794 Remotely Hosted Terminal Services! Don't Buy Expensive Hardware or Software! Just use ours for a low monthly fee! http://www.orange-networks.com/remoteoverview.htm -----Original Message----- From: Fernando Martins [mailto:fernando.martins@e...] Sent: Saturday, September 28, 2002 10:18 AM To: tscm-l@yahoogroups.com Subject: RE: [TSCM-L] Camera system http://www.pelco.com http://www.ademcovideo.com Those are my usual camera suppliers. But in wireless systems, the camera may not be even the main issue. You must choose a RF, laser or IP transmission/reception system. If you saw my last mail, is about a RF system for 1 to 10 miles range, using a Yagi antenna. But the customer is a huge oil company ... Who cares about inexpensive stuff eheheh ;) Anyway, will be a 24/7 working system? Also for night? Close to the sea? IP66? Bullet proof? .... A lense 3-8mm or 5-50mm? Is there a need for audio or alarm channel? What about a recording system? Lets say ... A 24 hour VCR from Sony, or a DX9000 system from Pelco with RAID5? Is there any high voltage lines in between? ... I may go on with more 50 questions ... FM > -----Original Message----- > From: Blake Bowers [mailto:bbowers@t...] > Sent: sexta-feira, 27 de Setembro de 2002 19:51 > To: tscm-l@yahoogroups.com > Subject: [TSCM-L] Camera system > > > I need a wireless camera system, black and white is ok, > color is better, that has a range of 1 mile. Pretty much > line of site between the two sites. > > Ideas? Inexpensive is good. Real time is a must > > > > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> Looking for a more powerful > website? Try GeoCities for $8.95 per month. Register your > domain name (http://your-name.com). More storage! No ads! > http://geocities.yahoo.com/ps/info > http://us.click.yahoo.com/aHOo4D/KJoEAA/MVfIAA/kgFolB/TM ---------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6289 From: Andre Holmes <1ach@g...> Date: Sat Sep 28, 2002 4:25pm Subject: Fw: Bugs and Telephone Taps Hello Greg You are correct I did try to bring to lite the real world as it is. We as legal people can become prey to scams prey to easdroppers at any given time. Addwareness to me and hopfully the rest of the public should come to us without a price. Crime is on the rise from my own observations from point A to point B. The public needs to some how know when they are easdropped on, they need to whom can provide a quality service to them and they need to see what is on the open market that can be used against them. Education is key with that said Id thank James Atkinson for providing avenue for all to explore. I for one would like to see a crime free society but in reality that's not go to be so Ive become a fighter of crime in a closed world of intelligence. That was hard for me to gather open or closed world of the Spy. I use the word spy because in essence we monitor the situation that the client pays for. Its the contractors job to locate the illegal device.It just mystifies me at times as to why we are here is it thrill or the will ! ANDRE HOLMES ----- Original Message ----- From: "Greg H. Walker, Attorney At Law" To: "Andre Holmes" <1ach@g...> Sent: Saturday, September 28, 2002 10:30 AM Subject: Re: [TSCM-L] Bugs and Telephone Taps > Andre Holmes wrote: > > > Dear Andre, > > I trust that you were not saying the advertised TSCM devices were any > good, but just showing what type of scam equipment exists out there > being hawked to the public and inept investigators and security > departments. > > GREG > > -- > Greg H. Walker, ARM* > Attorney At Law > President > RisKontroL -- Risk Management, Security Consulting & Investigations > Houston, Texas > (713) 850-0061 > > * Associate in Risk Management Designation (Insurance Institute > of America's Center For Advanced Risk Management Education) > > WARNING NOTICE BY GHW: Greg H. Walker's comments are not intended to > be and should absolutely not be taken as legal advice. Unless you have > entered into a specific written agreement with him for legal services, > signed by both you and him, and paid him a retainer in good funds, then > he is not your Attorney, does not intend to be your Attorney and you > should not act nor refrain from acting based, in whole or in part, on > his comments. 6290 From: Date: Sat Sep 28, 2002 8:58am Subject: Re: The Adela Group Law Enforcement, Security, Military In a message dated 9/28/02 1:41:09 PM Eastern Daylight Time, 1ach@g... writes: << TSCM-L@yahoogroups.com Greetings Id like to share with you results of research that is a must in this profession enjoy. ANDRE HOLMES http://www.adelagroup.com/ >> I hope you are joking!! 6291 From: George Shaw Date: Sat Sep 28, 2002 5:15pm Subject: RE: Camera system Having set up several remote cameras over a Internet/phone/RF feed try looking at this site (demo is available) VitalPoint NetCCTV http://www.vitalpoint.com NetCCTV works great over a 2.4GHz wireless LAN connection 1-3 miles and you can encrypt the feed. (I am not connected to them in any way other than a happy user) George Shaw MI3GTO Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... 6292 From: Date: Sat Sep 28, 2002 8:15pm Subject: adela This is the same 'globalscam' group that markets the vaporware "mole' molecular scanner. Able to leap tall buildings in a single bound. Not much more than a storefront. SteveP ADVANCED COUNTERMEASURES 6293 From: Matt Paulsen Date: Sat Sep 28, 2002 8:53pm Subject: RE: adela re: mole http://www.globalspyshop.com/molecular_tracking_system.htm Thanks, Matt Paulsen President/CEO Orange Networks LLC http://www.orange-networks.com P: 503.892.8786 F: 503.892.8794 Remotely Hosted Terminal Services! Don't Buy Expensive Hardware or Software! Just use ours for a low monthly fee! http://www.orange-networks.com/remoteoverview.htm -----Original Message----- From: preflat@p... [mailto:preflat@p...] Sent: Saturday, September 28, 2002 6:15 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] adela This is the same 'globalscam' group that markets the vaporware "mole' molecular scanner. Able to leap tall buildings in a single bound. Not much more than a storefront. SteveP ADVANCED COUNTERMEASURES ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6294 From: Dragos Ruiu Date: Sat Sep 28, 2002 1:14pm Subject: Re: Camera system On September 27, 2002 06:50 pm, Blake Bowers wrote: > I need a wireless camera system, black and white is ok, > color is better, that has a range of 1 mile. Pretty much > line of site between the two sites. > > Ideas? Inexpensive is good. Real time is a must Slightly less expensive than the Pelco gear, I've had good experiences with a variety of models in the Axis product line. A wireless AP and a pair of +9-15db antennae and a Cisco Aironet 350 (the longest range 802.11 card with the best transmitter and receiver that I've tested) along with an Axis 2120 is the way I'd probably try to hook that up. Or a small SBC with a pcmcia slot running linux or bsd instead of the AP so you could use a 350 on both ends. Haven't range tested AP's or qualified their transmitters, but all AP's use PCMCIA cards internally for transmitters... cheers, --dr -- dr@k... pgp: http://dragos.com/kyxpgp Advance CanSecWest/03 registration available: http://cansecwest.com "The question of whether computers can think is like the question of whether submarines can swim." --Edsger Wybe Dijkstra 1930-2002 6295 From: Raymond Date: Sun Sep 29, 2002 4:38am Subject: Bugs and Telephone Taps This can not be for real !!!!!!!!! Read the page on - The TRUTH About Counter-Surveillance Equipment! http://www.bugdetectors.com/Page_17x.html Raymond --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 6296 From: Date: Sun Sep 29, 2002 1:30pm Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County, San Francisco, Silicon Valley, San Jose, San Diego, and Las Vegas. (Also, anywhere in a thousand mile radius from Los Angeles.) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 6297 From: Date: Sun Sep 29, 2002 1:30pm Subject: File - mission.txt TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6298 From: James M. Atkinson Date: Sun Sep 29, 2002 7:30pm Subject: Philosophy Professor A philosophy professor stood before his class and had some items in front of him. When class began, wordlessly he picked up a large empty mayonnaise jar and proceeded to fill it with rocks right to the top, rocks about 2" in diameter. He then asked the students if the jar was full? They agreed that it was. So the professor then picked up a box of pebbles and poured them in to the jar. He shook the jar lightly. The pebbles, of course, rolled into the open areas between the rocks. The students laughed. He asked his students again if the jar was full? They agreed that yes, it was. The professor then picked up a box of sand and poured it into the jar. Of course, the sand filled up every-thing else. "Now," said the professor, "I want you to recognize that this is your life. The rocks are the important things, your family, your partner, your health, and your children - anything that is so important to you that if it were lost, you would be nearly destroyed. The pebbles are the other things in life that matter, but on a smaller scale. The pebbles represent things like your job, house, or car. The sand is everything else, the small stuff." "If you put the sand or the pebbles into the jar first, there is no room for the rocks. The same goes for your life. If you spend all your energy and time on the small stuff, material things, you will never have room for the things that are truly most important." Pay attention to the things that are critical in your life. Play with your children. Take time to get medical checkups. Take your partner dancing. There will always be time to go to work, clean the house, give a dinner party and fix the disposal. Take care of the rocks first, the things that really matter. Set your priorities, the rest is just pebbles and sand. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6299 From: Mitch Davis Date: Sun Sep 29, 2002 11:32am Subject: Re: Bugs and Telephone Taps Raymond, I saw that page a while back.I almost had to replace my keyboard,but I did clean up my monitor.They both were covered with coffee "overspray". K-9's being replaced by "molecular sniffers",(from one site)Horrible,difficult to use, Spec A's,and useless TDR's being replaced by "MAGIC",from another."Who cares about dead bugs" What next???.A good laugh deserves another. I think Ill debut the Special High Intensity Technotronica-Houdini 1000Æ this week,it may be the best piece of vaporware ever. Have a nice day! ----------------------------------------------------------- Mitch Davis TSCM/Special Operations Group,Inc. (615) 837 9933 cell (615) 584 9933 e mail: MitchD@t... website: www.tscmusa.com Nashville,TN.USA ----------------------------------------------------------- [Non-text portions of this message have been removed] 6300 From: Does it matter Date: Sun Sep 29, 2002 6:28pm Subject: A pringles can? http://apnews.excite.com/article/20020929/D7MBJKPG0.html I never made the connection heh. 6301 From: James M. Atkinson Date: Sun Sep 29, 2002 8:38pm Subject: you Gotta Love The Gunny! A young Marine officer was in a serious car accident, but the only visible permanent injury was to both of his ears, which were amputated. Since he wasn't physically impaired he remained in the Marines and eventually rose to the rank of General. He was, however, very sensitive about his appearance. One day the General was interviewing three Marines for his personal aide. The first was an aviator, and it was a great interview. At the end of the interview the General asked him, "Do you notice anything different about me? "The young officer answered, "why yes, sir. I couldn't help but notice that you have no ears." The General got very angry at this lack of tact and threw him out. The second interview was with a female Lieutenant, and she was even better. The General asked her the same question, " Do you notice anything different about me?" She replied, "Well, sir, you have no ears."! The General threw her out also. The third interview was with a Marine Gunny. He was articulate, looked extremely sharp and seemed to know more than the two officers combined (surprise). The General wanted this guy, and went ahead with the same question, "Do you notice anything different about me?" To his surprise the Gunny said, "Yes sir; you wear contact lenses." The General was very impressed and thought, what an incredibly observant Gunny, and he didn't mention my ears. "And how do you know that I wear contacts?" The General asked. The sharp-witted Gunny replied, "Well, sir, it's pretty hard to wear glasses with no ears." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6302 From: David Alexander Date: Mon Sep 30, 2002 3:55am Subject: re: philospohy professor This is such a poor teaching example - how many students do you know that would waste a beer by pouring it into a jar full of rocks and sand ? Not even liberal arts students are that stupid . >A philosophy professor stood before his class and had some items in >front of him. When class began, wordlessly he picked up a large >empty mayonnaise jar and proceeded to fill it with rocks right to >the top, rocks about 2" in diameter. He then asked the students if >the jar was full? They agreed that it was. So the professor then >picked up a box of pebbles and poured them in to the jar. He shook >the jar lightly. > >The pebbles, of course, rolled into the open areas between the rocks. >The students laughed. He asked his students again if the jar was >full? They agreed that yes, it was. The professor then picked up a >box of sand and poured it into the jar. Of course, the sand filled up >every-thing else. > >"Now," said the professor, "I want you to recognize that this is your >life. The rocks are the important things, your family, your partner, >your health, and your children - anything that is so important to you >that if it were lost, you would be nearly destroyed. The pebbles are >the other things in life that matter, but on a smaller scale. The >pebbles represent things like your job, house, or car. The sand is >everything else, the small stuff." > >"If you put the sand or the pebbles into the jar first, there is no >room for the rocks. The same goes for your life. If you spend all >your energy and time on the small stuff, material things, you will >never have room for the things that are truly most important." > >Pay attention to the things that are critical in your life. Play with >your children. Take time to get medical checkups. Take your partner >dancing. There will always be time to go to work, clean the house, >give a dinner party and fix the disposal. Take care of the rocks >first, the things that really matter. Set your priorities, the rest >is just pebbles and sand. -- _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] From: Dragos Ruiu Date: Tue Sep 23, 2003 8:13pm Subject: Re: data encryption Re Original Query: try SSL or SSH Re Reply: 3Com, Intel, and the usual villains have NICs with crypto accel HW in them now at inexpensive price points.... Some (like 3com) even provide documentation so there are drivers for "real" operating systems too... :-) :-P cheers, ---dr On September 23, 2003 06:33 am, Andrus Aaslaid wrote: > Hello! > > You can give a try to www.verasity.com . They are manufacturing one-chip > ipsec accelerator what can be used in embedded devices and which is fully > ipsec compliant, so any pc with win2k or whatever os can be at host side. > It has massive set of features and bandwidth, but from integration point of > view it may appear as simplest solution for what you are doing. > > Regards, > > Andrus. > > > I would like to know if anyone on the list has experience > > with a reliable commercially available data encryption > > package. My client needs to encrypt small sets of numerical > > data and accompanying text files for transmission over the > > internet to a data processing facility. The level of > > encryption required does not need to meet "national security" > > level standards. Ease of use and reliable decryption in a > > commercial software environment are desired goals. The > > application is for the transmission of medical measurement > > data which could be commercially valuable in nature. > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- pgpkey http://dragos.com/ kyxpgp 7775 From: David Alexander Date: Tue Sep 23, 2003 10:47am Subject: RE: data encryption Robert I presume your client has a reputable firewall implementation on their internet connection. You could see if it supports the IPSEC standard then use something like SecuREMOTE VPN client software on the PC to establish a VPN tunnel through the firewall to connect to their mail server and send the data as an attachment to an e-mail or upload it to an FTP server in their DMZ. I'm an Infosec Consultant and I've done this for a client in the UK without problem. It uses 128 bit encryption, which is good enough for your clients' purposes. If that isn't possible, how about something like PGP ? regards David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: Robert Dyk [mailto:dyk@c...] Sent:23 September 2003 13:35 To:tSCM-L Subject:[TSCM-L] data encryption Good Morning Gentlemen, I would like to know if anyone on the list has experience with a reliable commercially available data encryption package. My client needs to encrypt small sets of numerical data and accompanying text files for transmission over the internet to a data processing facility. The level of encryption required does not need to meet "national security" level standards. Ease of use and reliable decryption in a commercial software environment are desired goals. The application is for the transmission of medical measurement data which could be commercially valuable in nature. Any help with this would be greatly appreciated. Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7776 From: Juke Katan Date: Wed Sep 24, 2003 3:37am Subject: talking dog In West Virginia, a guy sees a sign in front of a house: "Talking Dog for Sale." He rings the bell and the owner tells him the dog is in the backyard. The guy goes into the backyard and sees a black Lab just sitting there. "You talk?" he asks. "Yep," the Lab replies. "So, what's your story?" The Lab looks up and says,"Well, I discovered this gift pretty young and I wanted to help the government, so I told the CIA about my gift, and in no time they had me jetting from country to country, sitting in rooms with spies and world leaders, because no one figured a dog would be eavesdropping. I was one of their most valuable spies eight years running. The jetting around reallly tired me out, and I knew I wasn't getting any younger and I wanted to settle down. So I signed up for a job at the airport to do some undercover security work, mostly wandering near suspicious characters and listening in. I uncovered some incredible dealings there and was awarded a batch of medals. Had a wife, a mess of puppies, and now I'm just retired." The guy is amazed. He goes back in and asks the owner what he wants forthe dog. The owner says, "Ten dollars." The guy says, "This dog is amazing. Why on earth are you selling him so cheap?" The owner replies, "Because he's a liar. He didn't do any of that crap." --------------------------------- Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software [Non-text portions of this message have been removed] 7777 From: Date: Sun Sep 28, 2003 11:02am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7778 From: Date: Sun Sep 28, 2003 11:02am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7779 From: Mitch D Date: Sun Sep 28, 2003 1:49pm Subject: Spy Shop Physics hit the automotive industry for whatever its worth..... http://www.llzm.org/default.asp?axel=8577 __________________________________ Do you Yahoo!? The New Yahoo! Shopping - with improved product search http://shopping.yahoo.com 7780 From: kondrak Date: Sun Sep 28, 2003 2:50pm Subject: Re: Spy Shop Physics hit the automotive industry SPAM! Read a bit, I'd expect people with TSCM background to have a bit more electronics under your belt. A) uses inductors: IE magnets, last I checked, gasoline or any hydrocarbon fuel didn't have much residual magnetic properties. B) Works on a steel fuel line...even IF the thing did something, a steel line would shield the fuel inside from the magnetic component. C) Deduction: Fraud D) Assumption: You can get more savings and performance from changing spark plugs, air filter and gas filter regularly. Sheesh..... At 11:49 9/28/2003 -0700, you wrote: >for whatever its worth..... >http://www.llzm.org/default.asp?axel=8577 7781 From: Charles Patterson Date: Sun Sep 28, 2003 8:35pm Subject: Re: Spy Shop Physics hit the automotive industry SPAM! Read a bit, I'd expect people with TSCM background to have a bit more electronics under your belt. [Non-text portions of this message have been removed] 7782 From: Charles Patterson Date: Sun Sep 28, 2003 8:40pm Subject: Re: Spy Shop Physics hit the automotive industry Oops, sent that last one before typing... let me try again Subject: Re: [TSCM-L] Spy Shop Physics hit the automotive industry SPAM! Read a bit, I'd expect people with TSCM background to have a bit more electronics under your belt. ... C) Deduction: Fraud I think if you caught the subject line, he was referring to the whole concept as "Spy Shop Physics" - took me a moment to recognize the similarities..., got a bit of a chuckle out of it. As ol' PT Barnum said, "There's a sucker born every minute." [Non-text portions of this message have been removed] 7783 From: Mitch D Date: Mon Sep 29, 2003 0:18am Subject: Spy Shop Physics The fuel saver gizmo ad was along the same line as the Spy Shop Physics claims of a "250 mile LOS tower" , "TDR's are a useless tool in TSCM work" etc etc. I read the ad and had a good laugh myself...figured I'd pass it on for "whatever its worth"........just a laugh..... MD __________________________________ Do you Yahoo!? The New Yahoo! Shopping - with improved product search http://shopping.yahoo.com 7784 From: Steve Uhrig Date: Mon Sep 29, 2003 0:38pm Subject: New 4.9 gig allocation for surveillance & other Reprinted with permission ======== Public Safety's New Allocation: Answering Users' Questions on the 4.9 Gigahertz Band The Public Safety Wireless Network (PSWN) has released a fact sheet designed to provide all public safety users with the basic information concerning the new 4.9 GHz band. Topics include what the allocation offers public safety, eligibility to use the band, licensing and operational rules for use of the band, and the implementation schedule. The Federal Communications Commission's (FCC) allocation of 50 megahertz (MHz) of spectrum in the 4.9 gigahertz (GHz) band allocation will now permits public safety agencies to implement on- scene wireless networks for streaming video, rapid Internet and database access, and transfers of large files such as maps, building layouts, medical files, and missing person images. It also allows these agencies to establish temporary fixed links to support surveillance operations. The allocation of this 50 megahertz (MHz) by the Federal Communications Commission (FCC) gives every jurisdiction in the country access to spectrum for deployable, interoperable, broadband communications. Link to full overview: http://www.pswn.gov/admin/librarydocs12/4_9_Band_Fact_Sheet.doc ============== ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7785 From: kondrak Date: Mon Sep 29, 2003 2:09pm Subject: Re: New 4.9 gig allocation for surveillance & other 4-6 ghz is a good area of the microwave spectrum. It's robust, giving good paths with little power, and its quite immune to rain and weather effects. It's also quite easy to generate power there, the technology is well mature, semiconductors can give the necessary 5-10 watts for long haul applications. It's little coincidence the first long lines microwave bands used for telephony were initially at 4 ghz, and later at 6 ghz. I applaud the decision to set aside some of this band for public safety usage, the same way I applauded the decision to create a license free band for 802.11 at 5 ghz. At 13:38 9/29/2003 -0400, you wrote: >Reprinted with permission > >======== > >Public Safety's New Allocation: > >Answering Users' Questions on the 4.9 Gigahertz Band > >The Public Safety Wireless Network (PSWN) has released a fact sheet >designed to provide all public safety users with the basic >information concerning the new 4.9 GHz band. Topics include what the >allocation offers public safety, eligibility to use the band, >licensing and operational rules for use of the band, and the >implementation schedule. 7786 From: Hawkspirit Date: Mon Sep 29, 2003 8:02pm Subject: Howard Hughes Sweeper Does anyone know anything about Norman Placey (Scottsdale AZ.) who was Howard Hughes' sweeper? Roger 7787 From: Fernando Martins Date: Tue Sep 30, 2003 1:06am Subject: Re: Spy Shop Physics hit the automotive industry I just went to see what it was because of the subject of the mail, thinking that had something to do with Opel v. VW, again ;> FM 7788 From: rfi Date: Wed Sep 24, 2003 9:12pm Subject: Sweep in Colorado ASAP May need a sweep in keystone Colorado. Need help for a good person. Rick Finelli COLORADO PI 283 Columbine St Denver Colorado 80206-4707 MEMBERSHIP: NCISS Email: rfi@c... U.S.A. www.coloradopi.com 303-575-1031 303-200-7129 Fax "CONFIDENTIALITY WARNING: This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited." 7789 From: Date: Thu Sep 25, 2003 3:42pm Subject: Autoreply: Digest Number 1372 Due to recent Hurricane Isabel, our email services have been temporarily interrupted. Please use these numbers for communication: Fax 804-355-5711 or Toll-Free Phone 888-623-7283 We hope that our service will be restored by mid-week. Thank you! 7790 From: Jason Dibley Date: Fri Sep 26, 2003 5:10am Subject: Assistance or Advice Required Dear All, I have a client, (financial), which has a new facility in Moscow. We supply the TSCM services to their other facilities in the UK and Europe; we have recently been asked to look into arranging for an inspection of the new Moscow facility. Having had experience of sweeps in the UK, Europe and Middle East .I have no prior knowledge of the problems associated with operating within Soviet Russia. Have any other list members any helpful information, regarding the restrictions, pitfalls, general attitude to UK sweep teams arriving in Moscow with TSCM equipment. I would appreciate any input from the vast experience contained within list. I can be contacted off list should anyone wish. I am interested if anyone has had any experience of positive finds during sweeps inside the eastern block, generally no specifics of course. We have mutual acquaintances in the security business within Moscow but mostly for executive protection, and exfiltration, However the client does not wish any other parties involved that do not already supply services the company, so sub-contracting or utilising local agents is not an option. Any thoughts would be gratefully received, best wishes to all. Respectively submitted. Mr Jason M Dibley Dip Eng (hons) TSCM Director. QCC Interscan Ltd. Please visit our Web site at http:\\www.qcc.co.uk You can view our digitally signed reports and other documents using Adobe Acrobat Version 4 or greater. You can obtain this for free from the following web site: http://www.adobe.co.uk/products/acrobat/readstep.html This message is intended only for the use of the person(s) to whom it is addressed. It may contain information which is privileged and confidential or material which is protected under attorney-client privilege. In addition, this message may not necessarily represent the views of QCC. Accordingly any unauthorised use is strictly prohibited. If you are not the Intended Recipient, please contact QCC Interscan as soon as possible or send mail to jasonmd@q.... QCC Interscan Ltd. Registered in England and Wales No. 03773029 7791 From: Date: Fri Sep 26, 2003 1:57pm Subject: Lorex SG-6120 I can't seem to locate technical specs on the Lorex SG-6120 receiver. Does anyone know the following? - Is it really a Wavecom (will it pick up X-10 cameras)? - Does it run on 12VDC? - Is it color or B/W? - Does it receive audio? Thanks in advance - Cory Bys http://www.kgb.to/ ******************* N O T I C E ******************* The information contained in this e-mail, and in any accompanying documents, may constitute confidential and/or legally privileged information. The information is intended only for use by the designated recipient. If you are not the intended recipient (or responsible for the delivery of the message to the intended recipient), you are hereby notified that any dissemination, distribution, copying, or other use of, or taking of any action in reliance on this e-mail is strictly prohibited. If you have received this e-mail communication in error, please notify the sender immediately and delete the message from your system. *************************************************** 7792 From: Jason Dibley Date: Mon Sep 29, 2003 2:52am Subject: Working in Russia I have a client, (financial), which has a new facility in Moscow. We supply the TSCM services to their other facilities in the UK and Europe; we have recently been asked to look into arranging for an inspection of the new Moscow facility. Having had experience of sweeps in the UK, Europe and Middle East .I have no prior knowledge of the problems associated with operating within Soviet Russia. Have any other list members any helpful information, regarding the restrictions, pitfalls, general attitude to UK sweep teams arriving in Moscow with TSCM equipment. I would appreciate any input from the vast experience contained within list. I can be contacted off list should anyone wish. I am interested if anyone has had any experience of positive finds during sweeps inside the eastern block, generally no specifics of course. We have mutual acquaintances in the security business within Moscow but mostly for executive protection, and exfiltration, However the client does not wish any other parties involved that do not already supply services the company, so sub-contracting or utilising local agents is not an option. Any thoughts would be gratefully received, best wishes to all. Respectively submitted. Mr Jason M Dibley Dip Eng (hons) TSCM Director. QCC Interscan Ltd. Please visit our Web site at http:\\www.qcc.co.uk You can view our digitally signed reports and other documents using Adobe Acrobat Version 4 or greater. You can obtain this for free from the following web site: http://www.adobe.co.uk/products/acrobat/readstep.html This message is intended only for the use of the person(s) to whom it is addressed. It may contain information which is privileged and confidential or material which is protected under attorney-client privilege. In addition, this message may not necessarily represent the views of QCC. Accordingly any unauthorised use is strictly prohibited. If you are not the Intended Recipient, please contact QCC Interscan as soon as possible or send mail to contact@q.... QCC Interscan Ltd. Registered in England and Wales No. 03773029 7793 From: David Alexander Date: Tue Sep 30, 2003 4:47am Subject: profiling of copper cabling I think most of you know I am an Information Security consultant, not a TSCMer, who belongs to this group in order to become more aware of issues that I may have to recommend my clients consider (and thus give you some work - wouldn't attempt it myself). I hope that you will, therefore forgive me for asking what probably seems like a very basic question. What steps would the "TSCM brains trust" recommend for the 'testing and profiling' of newly-installed copper cabling so that it can be approved as fit for purpose (low classification grade encrypted data) and then re-inspected for damage/attempts at eavesdropping/data insertion/etc at a later date ? I know about using OTDRs for fibre, and presume there is something similar, but it would be irresponsible of me to guess. Thanks for your help Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 7794 From: Robert Dyk Date: Tue Sep 30, 2003 7:20am Subject: RE: profiling of copper cabling David, If the cable is newly installed and has been physically checked (this is a must) for any possible compromise, then I would be satisfied with a TDR analysis and a stored waveform for each cable drop in question. In future, TDR examination and the resulting waveform comparison should be sufficient. Best of Luck, Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. > -----Original Message----- > From: David Alexander [mailto:david.alexander@d...] > Sent: September 30, 2003 5:48 AM > To: 'TSCM-L submissions' > Subject: [TSCM-L] profiling of copper cabling > > > I think most of you know I am an Information Security consultant, not a > TSCMer, who belongs to this group in order to become more aware of issues > that I may have to recommend my clients consider (and thus give you some > work - wouldn't attempt it myself). I hope that you will, > therefore forgive > me for asking what probably seems like a very basic question. > > What steps would the "TSCM brains trust" recommend for the 'testing and > profiling' of newly-installed copper cabling so that it can be approved as > fit for purpose (low classification grade encrypted data) and then > re-inspected for damage/attempts at eavesdropping/data insertion/etc at a > later date ? > > I know about using OTDRs for fibre, and presume there is > something similar, > but it would be irresponsible of me to guess. > > Thanks for your help > > Dave > > David Alexander > Dbi Consulting Ltd > Stoneleigh Park Mews > Stoneleigh Abbey > Kenilworth > Warwickshire > CV8 2DB > > Office : 01926 515515 > Mobile: 07836 332576 > Email : David.Alexander@d... > > Have you visited our website? > http://www.dbiconsulting.co.uk > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 7795 From: Mitch D Date: Tue Sep 30, 2003 7:38am Subject: Re: profiling of copper cabling After a clean install,conduct an initial true TDR analysis of the critical "runs",store the waveforms,log any additions or changes to the run as they are implemented,resample w the tdr,and update the waveform archives for each physical change to the run respectively. __________________________________ Do you Yahoo!? The New Yahoo! Shopping - with improved product search http://shopping.yahoo.com 7796 From: Date: Tue Sep 30, 2003 5:57am Subject: Kansas Association of Licenses Investigators Annual Conference & Seminar These are two great topics of interest to all investigators and many attorneys. If you need any further information at this time, feel free to contact me. Jack Kelley at kelleypi@a... November 14 & 15 Kansas Association of Licensed Investigators Presents Bob Parke Certified Licensed Investigator and Board Certified Evidence Photographer. Nationally recognized Authority and Author on Digital Evidence Photography & Cynthia Hetherington Universally recognized expert on Internet Tracking and Online Intelligence Gathering Join us for a workshop following Cynthia’s program to search for hard to find people (maybe even yours) using the most up to date Internet Tracking tools from several national vendors onsite. Location: Holiday Inn Holidome Topeka, Kansas 785-233-5255 Registration information to be posted shortly! C. E. "Jack" Kelley, III, MBA C. E. Kelley & Associates Investigations P. O. Box 395, Baxter Springs, KS 66713 (620) 856-4460 Email: kelleypi@a... http://www.angelfire.com/ks/investigations/ Kansas Detective License: D-064 Board Member, Kansas Association of Licensed Investigators Member, American Society for Industrial Security Member, Association of Former Office of Special Investigations Special Agents Member, INTELNET (International organization of private investigators) [Non-text portions of this message have been removed] 7797 From: Steve Uhrig Date: Tue Sep 30, 2003 11:12am Subject: Article on CDPD (analog cell) demise will be published in the November issue of Police & Security News. See an advance copy here: http://www.swssec.com/white_paper.html "From The Listening Post'. If you use a realtime GPS covert vehicle tracking system in the U.S., this probably affects you. The instructions for your tracking system may not reference CDPD by name, but merely may state you need an analog cellular account to use it. Same thing. General Motors' OnStar driver assistance and emergency communications package also uses analog cell and CDPD. Anyone using OnStar will need to update their system soonest. As a typical and rather sad example (read the article first), this GPS tracking system was advertised in a mass mailing released by a spy shop YESTERDAY: http://www.pimall.com/nais/gpstrack.html Note this excerpt from the webpage: "The target location is transmitted via AMPS cellular contact..." AMPS = analog cellular. That's what's in the process of being decommissioned. So this spy shop currently is pushing a product using a service which is in the process of being dismantled. He may not even know it -- or maybe he does since the product's on sale. Guy may be trying to dump them before they're turned off completely. Some poor PI or PI- wannabee clown will spend a month's pay on it, and the spy shop racks up yet another victim while pocketing the profits. Even if you bought one, you can no longer commission an analog account. I called Verizon this morning and they said they were not opening any new or transferring any existing analog accounts. I claimed I had an analog phone I had turned off earlier this year but now wish to use again, and I don't want to buy another phone and have to reprogram all my speed dials. They were firm -- no more analog. That's one of several examples. Another reason not to deal with spy shops. The social services groups who solicit donations of old cell phones to give to poor people for free use in an emergency since any analog phone will dial 911 whether you have an account or not all will be out of luck, as digital phones will not connect without being activated, even to 911. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7798 From: Paolo Sfriso Date: Tue Sep 30, 2003 0:15pm Subject: Re: TSCM in Russia Dear Jason. When conducting TSCM services out of the EU you should obtain an "ATA Carnet". The list of countries in the ATA carnet system can be found at http://www.iccwbo.org/home/ata_carnets/ata_countries.asp . Possession of this document means passage of customs with no hinderance... I would also suggest devising proper security measures to safeguard your valuable equipment. Kind Regards. Paolo Sfriso CFE Director Gruppo S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY Phone +39 0422 828517 Fax +39 0422 823224 24hr GSM Cell +39 335 5257308 www.grupposit.com paulsfriso@t... info@g... Message: 7 Date: Fri, 26 Sep 2003 11:10:17 +0100 From: "Jason Dibley" Subject: Assistance or Advice Required Dear All, I have a client, (financial), which has a new facility in Moscow. We supply the TSCM services to their other facilities in the UK and Europe; we have recently been asked to look into arranging for an inspection of the new Moscow facility. Having had experience of sweeps in the UK, Europe and Middle East .I have no prior knowledge of the problems associated with operating within Soviet Russia. Have any other list members any helpful information, regarding the restrictions, pitfalls, general attitude to UK sweep teams arriving in Moscow with TSCM equipment. I would appreciate any input from the vast experience contained within list. I can be contacted off list should anyone wish. I am interested if anyone has had any experience of positive finds during sweeps inside the eastern block, generally no specifics of course. We have mutual acquaintances in the security business within Moscow but mostly for executive protection, and exfiltration, However the client does not wish any other parties involved that do not already supply services the company, so sub-contracting or utilising local agents is not an option. Any thoughts would be gratefully received, best wishes to all. Respectively submitted. Mr Jason M Dibley Dip Eng (hons) TSCM Director. QCC Interscan Ltd. Please visit our Web site at http:\\www.qcc.co.uk You can view our digitally signed reports and other documents using Adobe Acrobat Version 4 or greater. You can obtain this for free from the following web site: http://www.adobe.co.uk/products/acrobat/readstep.html This message is intended only for the use of the person(s) to whom it is addressed. It may contain information which is privileged and confidential or material which is protected under attorney-client privilege. In addition, this message may not necessarily represent the views of QCC. Accordingly any unauthorised use is strictly prohibited. If you are not the Intended Recipient, please contact QCC Interscan as soon as possible or send mail to jasonmd@q.... QCC Interscan Ltd. Registered in England and Wales No. 03773029Message: 9 Date: Mon, 29 Sep 2003 08:52:12 +0100 From: "Jason Dibley" Subject: Working in Russia I have a client, (financial), which has a new facility in Moscow. We supply the TSCM services to their other facilities in the UK and Europe; we have recently been asked to look into arranging for an inspection of the new Moscow facility. Having had experience of sweeps in the UK, Europe and Middle East .I have no prior knowledge of the problems associated with operating within Soviet Russia. Have any other list members any helpful information, regarding the restrictions, pitfalls, general attitude to UK sweep teams arriving in Moscow with TSCM equipment. I would appreciate any input from the vast experience contained within list. I can be contacted off list should anyone wish. I am interested if anyone has had any experience of positive finds during sweeps inside the eastern block, generally no specifics of course. We have mutual acquaintances in the security business within Moscow but mostly for executive protection, and exfiltration, However the client does not wish any other parties involved that do not already supply services the company, so sub-contracting or utilising local agents is not an option. Any thoughts would be gratefully received, best wishes to all. Respectively submitted. Mr Jason M Dibley Dip Eng (hons) TSCM Director. QCC Interscan Ltd. Please visit our Web site at http:\\www.qcc.co.uk You can view our digitally signed reports and other documents using Adobe Acrobat Version 4 or greater. You can obtain this for free from the following web site: http://www.adobe.co.uk/products/acrobat/readstep.html This message is intended only for the use of the person(s) to whom it is addressed. It may contain information which is privileged and confidential or material which is protected under attorney-client privilege. In addition, this message may not necessarily represent the views of QCC. Accordingly any unauthorised use is strictly prohibited. If you are not the Intended Recipient, please contact QCC Interscan as soon as possible or send mail to contact@q.... QCC Interscan Ltd. Registered in England and Wales No. 03773029 ________________________________________________________________________ ________________________________________________________________________ Message: 10 Date: Tue, 30 Sep 2003 10:47:32 +0100 From: "David Alexander" Subject: profiling of copper cabling I think most of you know I am an Information Security consultant, not a TSCMer, who belongs to this group in order to become more aware of issues that I may have to recommend my clients consider (and thus give you some work - wouldn't attempt it myself). I hope that you will, therefore forgive me for asking what probably seems like a very basic question. What steps would the "TSCM brains trust" recommend for the 'testing and profiling' of newly-installed copper cabling so that it can be approved as fit for purpose (low classification grade encrypted data) and then re-inspected for damage/attempts at eavesdropping/data insertion/etc at a later date ? I know about using OTDRs for fibre, and presume there is something similar, but it would be irresponsible of me to guess. Thanks for your help Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk ________________________________________________________________________ ________________________________________________________________________ Message: 11 Date: Tue, 30 Sep 2003 08:20:19 -0400 From: "Robert Dyk" Subject: RE: profiling of copper cabling David, If the cable is newly installed and has been physically checked (this is a must) for any possible compromise, then I would be satisfied with a TDR analysis and a stored waveform for each cable drop in question. In future, TDR examination and the resulting waveform comparison should be sufficient. Best of Luck, Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. > -----Original Message----- > From: David Alexander [mailto:david.alexander@d...] > Sent: September 30, 2003 5:48 AM > To: 'TSCM-L submissions' > Subject: [TSCM-L] profiling of copper cabling > > > I think most of you know I am an Information Security consultant, not a > TSCMer, who belongs to this group in order to become more aware of issues > that I may have to recommend my clients consider (and thus give you some > work - wouldn't attempt it myself). I hope that you will, > therefore forgive > me for asking what probably seems like a very basic question. > > What steps would the "TSCM brains trust" recommend for the 'testing and > profiling' of newly-installed copper cabling so that it can be approved as > fit for purpose (low classification grade encrypted data) and then > re-inspected for damage/attempts at eavesdropping/data insertion/etc at a > later date ? > > I know about using OTDRs for fibre, and presume there is > something similar, > but it would be irresponsible of me to guess. > > Thanks for your help > > Dave > > David Alexander > Dbi Consulting Ltd > Stoneleigh Park Mews > Stoneleigh Abbey > Kenilworth > Warwickshire > CV8 2DB > > Office : 01926 515515 > Mobile: 07836 332576 > Email : David.Alexander@d... > > Have you visited our website? > http://www.dbiconsulting.co.uk > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > ________________________________________________________________________ ________________________________________________________________________ Message: 12 Date: Tue, 30 Sep 2003 05:38:18 -0700 (PDT) From: Mitch D Subject: Re: profiling of copper cabling After a clean install,conduct an initial true TDR analysis of the critical "runs",store the waveforms,log any additions or changes to the run as they are implemented,resample w the tdr,and update the waveform archives for each physical change to the run respectively. __________________________________ Do you Yahoo!? The New Yahoo! Shopping - with improved product search http://shopping.yahoo.com ________________________________________________________________________ ________________________________________________________________________ Message: 13 Date: Tue, 30 Sep 2003 10:57:23 EDT From: kelleypi@a... Subject: Kansas Association of Licenses Investigators Annual Conference & Seminar These are two great topics of interest to all investigators and many attorneys. If you need any further information at this time, feel free to contact me. Jack Kelley at kelleypi@a... November 14 & 15 Kansas Association of Licensed Investigators Presents Bob Parke Certified Licensed Investigator and Board Certified Evidence Photographer. Nationally recognized Authority and Author on Digital Evidence Photography & Cynthia Hetherington Universally recognized expert on Internet Tracking and Online Intelligence Gathering Join us for a workshop following Cynthia’s program to search for hard to find people (maybe even yours) using the most up to date Internet Tracking tools from several national vendors onsite. Location: Holiday Inn Holidome Topeka, Kansas 785-233-5255 Registration information to be posted shortly! C. E. "Jack" Kelley, III, MBA C. E. Kelley & Associates Investigations P. O. Box 395, Baxter Springs, KS 66713 (620) 856-4460 Email: kelleypi@a... http://www.angelfire.com/ks/investigations/ Kansas Detective License: D-064 Board Member, Kansas Association of Licensed Investigators Member, American Society for Industrial Security Member, Association of Former Office of Special Investigations Special Agents Member, INTELNET (International organization of private investigators) [Non-text portions of this message have been removed] ________________________________________________________________________ ________________________________________________________________________ Message: 14 Date: Tue, 30 Sep 2003 12:12:31 -0400 From: "Steve Uhrig" Subject: Article on CDPD (analog cell) demise will be published in the November issue of Police & Security News. See an advance copy here: http://www.swssec.com/white_paper.html "From The Listening Post'. If you use a realtime GPS covert vehicle tracking system in the U.S., this probably affects you. The instructions for your tracking system may not reference CDPD by name, but merely may state you need an analog cellular account to use it. Same thing. General Motors' OnStar driver assistance and emergency communications package also uses analog cell and CDPD. Anyone using OnStar will need to update their system soonest. As a typical and rather sad example (read the article first), this GPS tracking system was advertised in a mass mailing released by a spy shop YESTERDAY: http://www.pimall.com/nais/gpstrack.html Note this excerpt from the webpage: "The target location is transmitted via AMPS cellular contact..." AMPS = analog cellular. That's what's in the process of being decommissioned. So this spy shop currently is pushing a product using a service which is in the process of being dismantled. He may not even know it -- or maybe he does since the product's on sale. Guy may be trying to dump them before they're turned off completely. Some poor PI or PI- wannabee clown will spend a month's pay on it, and the spy shop racks up yet another victim while pocketing the profits. Even if you bought one, you can no longer commission an analog account. I called Verizon this morning and they said they were not opening any new or transferring any existing analog accounts. I claimed I had an analog phone I had turned off earlier this year but now wish to use again, and I don't want to buy another phone and have to reprogram all my speed dials. They were firm -- no more analog. That's one of several examples. Another reason not to deal with spy shops. The social services groups who solicit donations of old cell phones to give to poor people for free use in an emergency since any analog phone will dial 911 whether you have an account or not all will be out of luck, as digital phones will not connect without being activated, even to 911. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ________________________________________________________________________ ________________________________________________________________________ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7799 From: kondrak Date: Tue Sep 30, 2003 3:43pm Subject: Re: profiling of copper cabling I'd echo what the rest of the guys here said, but I'd add two minor tests as well. A end to end capacitance test with a reasonably good capacity meter, and a strand to strand resistance check. (meg-ohm or megger check) While these are not necessarily indicators of tampering, they might reveal cable and connector deterioration in the future. I'm making the leap that youre dealing with UTP here, just pick one of the non used color codes for a reference conductor, and note it in your certification. Reference all others to that for capacity, but for the megger check (also called hi-pot) check all conductors against all others. Do not exceed the breakdown voltage of the insulation of the individual conductors, but test them to their rated V if possible. Write up the equipment used, (make, model, serial, calibration date etc) the conditions used, date, time, temp and humidity. I may be overboard here, but I like too much information vs too little. A TDR profile of the cable is usually all that's needed, just make sure it's taken after all connectors are installed, but before the cable is plugged in. You'll want to be on scene immediately as the cable is connectorized to certify it hasn't been out of sight or tampered with since installation. As I say, I tend to overkill.... >What steps would the "TSCM brains trust" recommend for the 'testing and >profiling' of newly-installed copper cabling so that it can be approved as >fit for purpose (low classification grade encrypted data) and then >re-inspected for damage/attempts at eavesdropping/data insertion/etc at a >later date ? > >I know about using OTDRs for fibre, and presume there is something similar, >but it would be irresponsible of me to guess. > >Thanks for your help > >Dave > >David Alexander >Dbi Consulting Ltd >Stoneleigh Park Mews >Stoneleigh Abbey >Kenilworth >Warwickshire >CV8 2DB > >Office : 01926 515515 >Mobile: 07836 332576 >Email : David.Alexander@d... > >Have you visited our website? >http://www.dbiconsulting.co.uk > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7800 From: Date: Tue Sep 30, 2003 11:52am Subject: Illegal e-cards to spy on your lover Illegal e-cards to spy on your lover SAN FRANCISCO, California (Reuters) --A company calling itself Lover Spy has begun offering a way for jealous lovers -- and anyone else -- to spy on the computer activity of their mates by sending an electronic greeting, the equivalent of a thinking-of-you card, that doubles as a bugging device. Computer security experts said the Lover Spy service and software appeared to violate U.S. law, but also said the surveillance program pointed to an increasingly common way for hackers to seize control of computers. Marketed as a way to "catch a cheating lover," the Lover Spy company offers to send an e-mail greeting card to lure the victim to a Web site that will download onto the victim's computer a trojan program to be used for spying. Recording keystrokes The Lover Spy software, sold for $89 for up to five computers, purports to record anything the victim does on the computer, including all keystrokes, passwords, e-mail, chats and screen shots and even turn on the victim's Web camera. The spy program discreetly sends the information to the Lover Spy server which then forwards it on to whoever paid for the software, maintaining their anonymity, according to the company Web site, which did not list contact information. "Lover Spy is being used today by private investigators worldwide, spouses and parents who want to protect their children," the site claims. "You don't need physical access to the computer," said Richard Smith, an independent privacy and security researcher in Boston. "It makes it so you can spy on anybody you want." Possible felony "That would be a felony," said Mark Rasch, former head of the U.S. Department of Justice's computer crime unit and chief security counsel for security company Solutionary. "Loading a program onto someone else's computer without their authorization is patently illegal." "Yikes! That is clearly a wiretapping violation," Chris Hoofnagle, associate director of the Electronic Privacy Information Center, said when told of Lover Spy. "It sounds a lot like a commercial version of Magic Lantern," the controversial program the FBI proposed a few years ago to remotely install a keystroke logger onto people under investigation, he said. Other spyware exists, such as eBlaster from Florida-based SpectorSoft, but it is installed manually and marketed for customers to install on their own computer, Rasch said. However, even installing a spyware program on your own computer may be illegal if it is recording the data of someone else without their consent, depending on the state in which the spying occurs, Hoofnagle said. Setting up defenses Not only could the Lover Spy company be prosecuted for selling software that enables spying, but the person who pays for the service could face up to 10 years in prison and fines for actual damages under the federal Computer Fraud and Abuse Act, he said. Web sites that surreptitiously send programs to a visitor's computer are an increasingly security menace, said Chris Wysopal, research director at security consultancy AtStake in Boston. "The risk has always been there, but when the tools are really easy to use you are going to see more spying going on," he said. The only defenses are anti-virus software, which may be able to detect the spyware, and a personal computer firewall which can alert a user when the trojan tries to connect to the Internet to send data out, according to Wysopal. People should be cautious about allowing Web sites to run unknown code on their PC, he added. Find this article at: http://www.cnn.com/2003/TECH/internet/09/30/spyware.lover.reut/index.html [Non-text portions of this message have been removed] 7801 From: Steve Uhrig Date: Tue Sep 30, 2003 8:53pm Subject: TDRs for sale The following Riser-Bond TDRS are for sale: Model 1270New $3500my price $1900 Model 2901B+New $1000my price $350 Model 1205CXNew $2700my price $1350 Model 1205CXANew $3000my price $1500 Model 1205-OSPNew $3195my price $2100 All are used, in perfect operating condition and very good physical condition with new battery, fresh calibration, all accessories including test leads, battery charger, instruction manual, wallet cheat sheet, computer interface cable (except 2901B+ which will not talk to a computer), and canvas accessory carrying pouch. Also available are a new hard case for any model, and one new empty yellow box pre-machined for any of the yellow box TDRs. This new box also includes the clear plastic carrier for the instruction manual inside the lid. Clean up your beat up TDR by dropping it into a new box, which takes 5 minutes. I stock the new boxes and can supply new batteries for your TDR if necessary. 220VAC chargers can be substituted for 110VAC chargers at no cost if so requested at time of order. All are guaranteed to be in perfect working condition. More info can be found here: http://www.swssec.com/part_one.html These TDRs are extremely rugged and all except 2901B have internal digital storage of waveforms which later can be dumped to a printer or into a computer via an RS232 port. The simple software for doing this is called Wave View, and the latest version is available as a free download from www.riserbond.com. So you can take readings on a job, store them then dump them into a laptop and into a report, or print and save against future use for baseline inspection. All TDRs will read twisted pair as well as coax or any metallic conductor pair. All have selectable pulse widths, sensitivity, and other than 2901B+ have magnification, one button setup and many other features. These things are easy to use, very rugged, and powerful. With some practice, you will own any metallic pair or coax you inspect. Nothing can hide from these when used in proper hands. You quickly will become confident in your abilities, and this confidence will be obvious to potential clients. All are subject to prior sale. I can take credit cards or checks for payment and ship to any non- embargoed country. I've probably sold 50 similar TDRs to members of this list. Feel free to ask for references, or check the References section of my website for that sort of thing. You also can check ebay under my email address and find a perfect record of 644 positives and zero negatives. If you are serious in TSCM, you need a TDR, and Riser Bond is the best choice. No delicate, expensive CRTs like in Tektronix models as all Riser Bond machines have rugged backlit large LCD readouts like a solid state oscilloscope. All yellow boxes have automatic filtering, also, which will notch out 50/60 cycle mains interference as well as stepping through different filter modes to give the best image on the screen automatically or manually. All also can be used on powered lines up to 400 volts without problems. The things practically work themselves, but all parameters can be controlled manually also. When closed, the cases are waterproof and can kick around in your van without needing any extra packing cases to protect them. Holler if questions. If you can use a TDR and are ready to stand on your hind legs and sweep like a man, you need one of these. Without a TDR, you're only playing games. There are excellent tutorials on using TDRs on both Riser Bond's website www.riserbond.com and www.tscm.com. While I don't make any claim about being a Riser Bond service center, I note Riser Bond themselves refer people to me who call them to have a machine serviced. Short of physical damage, I've seen very few problems with them. Email if interested. Save this message against future need. Other used and new TSCM, surveillance, communications, test equipment and related electronic toys can be found on our website: http://www.swssec.com/equipment_for_sale.html I buy excess or otherwise unneeded electronic equipment also. Please consider me first when you have something to sell. Regards .... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7802 From: Date: Tue Sep 30, 2003 6:21pm Subject: Guardian angel or Big Brother? INFORMATION TECHNOLOGY: Guardian angel or Big Brother? Debate over using black boxes intensifies after high-profile vehicle crashes By Harry Stoffer Automotive News / September 22, 2003 In June, Edwin Matos was sentenced by a Florida judge to 30 years in prison for double vehicular manslaughter. Evidence from a data recorder in his 2002 Pontiac Trans Am helped convict him. It showed that Matos was going more than 100 mph in a 30-mph zone before his car struck another vehicle and killed two teenagers. On the surface the case looks like a clear-cut victory for those who favor the use of "event data recorders" - similar to airliner black boxes - to advance vehicle safety. But the situation is not so simple. Some legal experts argue that the recorders violate a motorist's right to privacy and protection against self-incrimination. For the industry, there is a risk of backlash against car companies for putting the devices in their products. The government is studying the issue. Dr. Jeffrey Runge, the head of the National Highway Traffic Safety Administration (nhtsa.dot.gov), appears to be leaning in favor of wider use of the devices. Event data recorders "would make our data better," he said. Onboard witnesses But in online discussions after the Florida sentencing, some motorists said they don't want to own vehicles that could wind up being witnesses against them. Even before the high-profile conviction of Matos, General Motors (gm.com) was the target of a class-action lawsuit claiming the recorders, which are part of airbag controls, violate motorists' rights. It subsequently was dismissed. Nevertheless, "if consumers won't buy cars with them, automakers aren't going to put them in," says Clay Gabler, an associate professor of mechanical engineering at Rowan University (rowan.edu) in Glassboro, N.J. As a safety researcher, Gabler favors equipping vehicles with the devices. He says they would be "an absolute gold mine" of information for improving vehicles, safety devices and even roadways and roadsides. But he recognizes that there are technical, legal and consumer hurdles. He's leading a study for a branch of the National Academy of Sciences on those hurdles. Initial results are due late this year. Behind the scenes, safety researchers and privacy advocates have been wrestling for years over the use of data recorders in privately owned motor vehicles. There is no question that technology is available to record what a vehicle is doing in the moments before a crash. NHTSA says modules built by GM since 1999 are capable of collecting 16 major categories of information. They include vehicle speed, engine speed, throttle position and brake status. The main issues about the information are who can get it and how it can be used. Now, criminal prosecutors are forcing the debate into the open. In addition to the Florida case, South Dakota authorities say they expect to use data recorder information to make a case against Republican Rep. William Janklow, accused of speeding through a stop sign and killing a motorcyclist on Aug. 16. He was charged with manslaughter on Aug. 29. Another closely watched case relying on data from both a defendant's vehicle and the one it struck is scheduled for trial in suburban Washington in October. Brian Shefferman, a public defender in that case, has filed a motion to have the data recorder information excluded on the grounds that the government hasn't proven the technology is reliable. Montgomery County, Md., State's Attorney Doug Gansler, the prosecutor, says, "There's no case law suggesting it's not reliable." NHTSA, the agency responsible for regulating motor vehicle safety, is edging toward decisions that could help resolve some of the big issues in the long-simmering debate - in part of its own volition and in part because of outside pressure. The National Transportation Safety Board (ntsb.gov) - best known for investigating airliner crashes - recommended in 1997 that NHTSA make use of data recorders in vehicles. A NHTSA group studying the technology concluded in August 2001 that event data recorders "have the potential to greatly improve highway safety … by improving occupant protection systems and improving the accuracy of crash reconst ructions." In addition, NHTSA received a petition two years ago from its own former administrator, Dr. Ricardo Martinez, asking that the agency adopt rules to standardize the collection, storage and retrieval of data recorder information. As it is, every manufacturer's system is different. Only those systems in vehicles built by GM and Ford Motor Co. (ford.com) are readily accessible to investigators. Vetronix Corp. of Santa Barbara, Calif. (vetronix.com), makes the devices for downloading information from the black boxes. Finally, a year ago, NHTSA asked interested parties to provide comments on what the agency should do about data recorders The Alliance of Automobile Manufacturers (autoalliance.org), reflecting the wariness of its members, says that development and installation of the devices should continue to be voluntary. The alliance also says answers to legal and privacy questions should "evolve through public debate and judicial precedent." Missing the boat Martinez says automakers are missing the boat. They have a chance to take a stand for more open and accurate information. Instead, he argues, they are hiding behind vague concerns about privacy and their proprietary products. He says the companies would benefit if more and better data confirmed that driver error, not vehicle defect, is the cause of most crashes. Martinez argues that the privacy issue is simple. First, the information belongs to the vehicle owner. Second, a legal authority should be able to get the data in the same way it seeks telephone records or computer files. Instead, Martinez says, vehicles are being designed and safety regulations are being written on the basis of inaccurate information about what is happening in crashes. "It's hard for us to say we can't do better with better information," Martinez contends. Runge's view Runge, the NHTSA administrator, says data recorders are needed in all vehicles to implement a widespread automatic crash notification system properly. Such a system would use wireless signals to notify police, fire and rescue services automatically when crashes occur and provide them with information about the severity and the likelihood of injuries. Runge says he's not concerned about backlash from motorists who say they don't want their vehicles to snitch on them. He said information from the devices would do as much to defend the innocent as incriminate the guilty. "I hope that's the way the American public looks at it." At the same time, Runge says: "I don't believe that it is fair to trick people. They need to know what is in their vehicle, and there should be complete disclosure about the kinds of data that are in these recorders and who may have access." Staff Reporter Harry Stoffer can be contacted at hstoffer@c... [Non-text portions of this message have been removed] 7803 From: Date: Wed Oct 1, 2003 6:22am Subject: Escapees caught by GPS tracker in rental car 2 Escape From Irvine Jail; 1 Is Captured After Chase Inmates leave Musick by scaling a razor fence and then crawling through a storm drain. By Mai Tran LA Times Staff Writer October 1, 2003 A Newport Beach man once accused of impersonating an attorney escaped from a low-security jail in Irvine with an accomplice Tuesday in a flight that involved bloodied razor wire, a rented getaway car and a televised high-speed chase. The escapee's undoing, authorities said, was that the getaway car, rented by an unknowing accomplice, was equipped with an electronic-tracking device. Mark Thomas Georgantas, 41, of Newport Beach eventually surrendered to officials after a pursuit through Orange and Los Angeles counties. Authorities are still searching for James William Costilow, 23, of Riverside. Georgantas was serving time for grand theft and conspiracy to defraud and was awaiting trial on other charges, said Jim Amormino, spokesman for the Orange County Sheriff's Department. Costilow had been arrested on suspicion of possessing burglary tools and was also awaiting trial, Amormino said. The men were present during a midnight roll call at the James A. Musick Branch Jail, a minimum security jail in Irvine, but were missing during a 5 a.m. check, Amormino said. "Somehow, they were able to leave their barracks without setting off the alarm," he said. The men climbed over the first row of razor-wire fences into a field, then tried to climb over a second set of 15-foot fences topped with two rows of razor wire, Amormino said. After the men got scraped up, they slipped through a storm drain that they pried open with a bar found at the farm. "The storm drain cover was fastened to the cement with a dozen bolts," Amormino said. The men ran through an industrial complex at Alton Parkway and Irvine Boulevard, where they left behind blood and jail-issued jumpsuits, then fled in different directions, officials said. Costilow may have been picked up by a waiting car. Georgantas ran to a nearby pay phone, where he called his girlfriend, who picked him up in a rented car at Trabuco and Culver drives. "He tricked her into picking him up by saying that he was being released early from jail," Amormino said. When she arrived, they got into an argument and Georgantas pushed her out of the car and fled, he said. The unidentified woman will not face criminal charges, authorities said. The escapes prompted a seven-hour manhunt with helicopters, bloodhounds and a search team. The rental car company eventually activated the car's global-positioning-satellite system, which spotted Georgantas about 2:30 p.m. at Eastern and 3rd streets in an unincorporated area of East Los Angeles, authorities said. Georgantas led officials on a 30-minute pursuit that snaked through Alhambra, west on the San Bernardino Freeway, then south on the Long Beach Freeway, where he got off at Washington Boulevard, said California Highway Patrol Officer Ron Burch. When he tried to get back on the freeway, CHP officers rammed his car to try to stop him but were unsuccessful. Georgantas continued north on the Long Beach Freeway to the Santa Ana Freeway, then north on the Hollywood Freeway before the car's right front tire blew out. He got off at Alameda Street, and his car was boxed in behind a city bus near Arcadia Street. He got out of the car with his hands in the air, waving a note, and was arrested without further incident. It was unknown what the note said. Authorities said that Georgantas now faces additional charges of jail escape, carjacking, robbery, assault and reckless driving. Costilow will face escape charges when he is caught, Amormino said. Both men, he added, will be transferred to the Orange County Jail, a maximum security facility. Times staff writer Richard Winton contributed to this report. From: Aimee Farr Date: Mon Sep 24, 2001 7:19am Subject: Bill Brouhaha... (analysis links) Good to watch....not much up yet.... ~Aimee CDT: http://www.cdt.org/security/010911response.shtml EFF analysis of the Combating Terrorism Act: http://www.eff.org/sc/eff_wiretap_bill_analysis.html (handy redline versions for printing) 3783 From: Date: Mon Sep 24, 2001 11:27am Subject: Attempting to identify device 9/24/01 Can anyone identify the following for me? Picture a childs sized thimble, bright green in color, measuring 7/16" diameter across the closed end, 9/16" across the open end, and 1/2" tall. A 1/2" dia printed circuit board is inserted in the open end , with two button batteries extending up into the thimble. The "electronics" are on the open end of the thimble and are encapsulated in a drop of plastic or super glue. There is a micro-chip and the smallest LED I have ever seen. The elements of the printed antenna are about 3/16" long. There is NO microphone, but it could have been broken off or lost by the client who found the device under her kitchen table, attached by putty. The client took the device apart and broke the circuit board in the process. Client states that when she found it, the tiny LED was flashing red (which probably means that the batteries were still OK). The device bore the number "LL 21 Tiawan". Client is plaintiff in a major personal injury suit. Thanks Carl Carl A. Larsen, Jr. Larsen and Associates Private Investigations, PI-14282 Post Office Box 247 Carmichael, California, 95609 916-973-0515, fax 916-486-2735 3784 From: James M. Atkinson Date: Mon Sep 24, 2001 4:16pm Subject: Re: Attempting to identify device Pray, is the device about the same size as the "Flasher" module found in some kids sneaker? The only reason I mention this is that folks like to hoax a bug buy using one of these. -jma At 4:27 PM -0400 9/24/01, farklexfbe@a... wrote: >9/24/01 > >Can anyone identify the following for me? > >Picture a childs sized thimble, bright green in color, measuring 7/16" >diameter across the closed end, 9/16" across the open end, and 1/2" tall. > >A 1/2" dia printed circuit board is inserted in the open end , with two >button batteries extending up into the thimble. > >The "electronics" are on the open end of the thimble and are encapsulated in >a drop of plastic or super glue. There is a micro-chip and the smallest LED I >have ever seen. The elements of the printed antenna are about 3/16" long. > >There is NO microphone, but it could have been broken off or lost by the >client who found the device under her kitchen table, attached by putty. The >client took the device apart and broke the circuit board in the process. >Client states that when she found it, the tiny LED was flashing red (which >probably means that the batteries were still OK). > >The device bore the number "LL 21 Tiawan". > >Client is plaintiff in a major personal injury suit. > >Thanks > >Carl > >Carl A. Larsen, Jr. >Larsen and Associates >Private Investigations, PI-14282 >Post Office Box 247 >Carmichael, California, 95609 >916-973-0515, fax 916-486-2735 -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3785 From: sdonnell Date: Mon Sep 24, 2001 4:55pm Subject: Re: Attempting to identify device Hi, Do you have a jpg of this? It almost sounds like one of those sms/silent ring detectors that would go onto the end of a cell phone/pcs antenna, particularly when you mention there is an "open end" on it. At first it sounded like that little key-fob bug detector that Comet sells. Steve DE WA1YKL farklexfbe@a... wrote: > 9/24/01 > > Can anyone identify the following for me? > > Picture a childs sized thimble, bright green in color, measuring 7/16" > > diameter across the closed end, 9/16" across the open end, and 1/2" > tall. > > A 1/2" dia printed circuit board is inserted in the open end , with > two > button batteries extending up into the thimble. > > The "electronics" are on the open end of the thimble and are > encapsulated in > a drop of plastic or super glue. There is a micro-chip and the > smallest LED I > have ever seen. The elements of the printed antenna are about 3/16" > long. > > There is NO microphone, but it could have been broken off or lost by > the > client who found the device under her kitchen table, attached by > putty. The > client took the device apart and broke the circuit board in the > process. > Client states that when she found it, the tiny LED was flashing red > (which > probably means that the batteries were still OK). > > The device bore the number "LL 21 Tiawan". [Non-text portions of this message have been removed] 3786 From: Miguel Puchol Date: Mon Sep 24, 2001 5:52pm Subject: RE: Attempting to identify device I personally wouldn't worry about it, bugs don't usually come with flashing battery status LEDs...well, maybe some Fisher Price-grade bugs... In any case, a JPG of it would help - send it privately. Cheers! Mike > -----Mensaje original----- > De: sdonnell [mailto:sdonnell@n...] > Enviado el: lunes, 24 de septiembre de 2001 23:56 > Para: farklexfbe@a... > CC: TSCM-L@yahoogroups.com > Asunto: Re: [TSCM-L] Attempting to identify device > > > Hi, Do you have a jpg of this? It almost sounds like one of those > sms/silent ring detectors that would go onto the end of a cell phone/pcs > antenna, particularly when you mention there is an "open end" on it. At > first it sounded like that little key-fob bug detector that Comet > sells. Steve DE WA1YKL > > > farklexfbe@a... wrote: > > > 9/24/01 > > > > Can anyone identify the following for me? > > > > Picture a childs sized thimble, bright green in color, measuring 7/16" > > > > diameter across the closed end, 9/16" across the open end, and 1/2" > > tall. > > > > A 1/2" dia printed circuit board is inserted in the open end , with > > two > > button batteries extending up into the thimble. > > > > The "electronics" are on the open end of the thimble and are > > encapsulated in > > a drop of plastic or super glue. There is a micro-chip and the > > smallest LED I > > have ever seen. The elements of the printed antenna are about 3/16" > > long. > > > > There is NO microphone, but it could have been broken off or lost by > > the > > client who found the device under her kitchen table, attached by > > putty. The > > client took the device apart and broke the circuit board in the > > process. > > Client states that when she found it, the tiny LED was flashing red > > (which > > probably means that the batteries were still OK). > > > > The device bore the number "LL 21 Tiawan". > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3787 From: William Knowles Date: Tue Sep 25, 2001 3:41am Subject: Hackers face life imprisonment under 'Anti-Terrorism' Act http://www.securityfocus.com/news/257 Justice Department proposal classifies most computer crimes as acts of terrorism. By Kevin Poulsen Sep 23 2001 11:00PM PT Hackers, virus-writers and web site defacers would face life imprisonment without the possibility of parole under legislation proposed by the Bush Administration that would classify most computer crimes as acts of terrorism. The Justice Department is urging Congress to quickly approve its Anti-Terrorism Act (ATA), a twenty-five page proposal that would expand the government's legal powers to conduct electronic surveillance, access business records, and detain suspected terrorists. The proposal defines a list of "Federal terrorism offenses" that are subject to special treatment under law. The offenses include assassination of public officials, violence at international airports, some bombings and homicides, and politically-motivated manslaughter or torture. Most of the terrorism offenses are violent crimes, or crimes involving chemical, biological, or nuclear weapons. But the list also includes the provisions of the Computer Fraud and Abuse Act that make it illegal to crack a computer for the purpose of obtaining anything of value, or to deliberately cause damage. Likewise, launching a malicious program that harms a system, like a virus, or making an extortionate threat to damage a computer are included in the definition of terrorism. To date no terrorists are known to have violated the Computer Fraud and Abuse Act. But several recent hacker cases would have qualified as "Federal terrorism offenses" under the Justice Department proposal, including the conviction of Patrick Gregory, a prolific web site defacer who called himself "MostHateD"; Kevin Mitnick, who plead guilty to penetrating corporate networks and downloading proprietary software; Jonathan "Gatsby" Bosanac, who received 18-months in custody for cracking telephone company computers; and Eric Burns, the Shoreline, Washington hacker who scrawled "Crystal, I love you" on a United States Information Agency web site in 1999. The 19-year-old was reportedly trying to impress a classmate with whom he was infatuated. The Justice Department submitted the ATA to Congress late last week as a response to the September 11th terrorist attacks in New York, Washington and Pennsylvania that killed some 7,000 people. As a "Federal terrorism offense," the five year statute of limitations for hacking would be abolished retroactively -- allowing computer crimes committed decades ago to be prosecuted today -- and the maximum prison term for a single conviction would be upped to life imprisonment. There is no parole in the federal justice system Those convicted of providing "advice or assistance" to cyber crooks, or harboring or concealing a computer intruder, would face the same legal repercussions as an intruder. Computer intrusion would also become a predicate offense for the RICO statutes. DNA samples would be collected from hackers upon conviction, and retroactively from those currently in custody or under federal supervision. The samples would go into the federal database that currently catalogs murderers and kidnappers. Civil liberties groups have criticized the ATA for its dramatic expansion of surveillance authority, and other law enforcement powers. But Attorney General John Ashcroft urged swift adoption of the measure Monday. Testifying before the House Judiciary Committee, Ashcroft defended the proposal's definition of terrorism. "I don't believe that our definition of terrorism is so broad," said Ashcroft. "It is broad enough to include things like assaults on computers, and assaults designed to change the purpose of government." The Act is scheduled for mark-up by the committee Tuesday morning. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 3788 From: Date: Tue Sep 25, 2001 0:32am Subject: Re: Attempting to identify device Try and contact someone who has been an amateur radio operator, "ham", for at least ten years, with a good electronics background, and see if he can "reverse engineer" the device and draw a schematic diagram. Also, I have never heard of a surveillance device with a flashing LED. Jack 3789 From: James M. Atkinson Date: Tue Sep 25, 2001 9:05am Subject: Alleged DIA Spy - Affidavit http://www.fas.org/irp/ops/ci/Montes_092101.pdf AFFIDAVIT IN SUPPORT OF CRIMINAL COMPLAINT, ARREST WARRANT, AND SEARCH WARRANTS I, Stephen A. McCoy, being duly sworn, hereby state the following under penalty of perjury: 1. I am a Special Agent of the Federal Bureau of Investigation (FBI) and have been so employed for approximately 20 years. I am currently assigned to the Washington Field Office to a squad responsible for counter-intelligence relating to Cuba. I have worked in the counterintelligence field for approximately 15 years and have worked specifically on counter-intelligence matters involving Cuba for the last 12 years. As a result of my experience in counter-intelligence investigations and foreign counter-intelligence training, I am familiar with the strategy, tactics, methods, tradecraft and techniques of the Cuban foreign intelligence service and its agents. 2. This affidavit is submitted in support of an application for a complaint and arrest warrant charging ANA BELEN MONTES with conspiracy to commit espionage, in violation of 18 U.S.C.ß 794(c), and for applications for four (4) search warrants to search the following items and locations: (1) the residence of ANA BELEN MONTES, such premises known and described as a cooperative apartment located at 3039 Macomb Street, N.W., apartment 20, Washington, D.C. 20008, and further described in Attachment A to this affidavit; (2) a red 2000 Toyota Echo, bearing vehicle identification number JTDT1231Y0007841 and District of Columbia license plate number 993 190, which is registered to ANA BELEN MONTES and anticipated to be within the District of Columbia; (3) room C6-146A, 200 MacDill Boulevard, Washington, D.C. 20340, which is the office/work space assigned to ANA BELEN MONTES at the Defense Intelligence Analysis Center located on Bolling Air Force Base; (4) safe deposit box #526 leased by ANA BELEN MONTES at Riggs Bank, N.A., Friendship Branch, 4249 Wisconsin Avenue, N.W., Washington, D.C. 3. Information in this affidavit is based on my personal knowledge and on information provided to me by other counter-intelligence investigators and law enforcement officers during the course of this investigation. Searches and various forms of surveillance have been conducted pursuant to the Foreign Intelligence Surveillance Act of 1978, as amended (FISA) and orders of the Foreign Intelligence Surveillance Court (FISC). I. Background 4. ANA BELEN MONTES is a United States citizen born on February 28, 1957, on a U.S. military installation in Nurnberg, Germany. She graduated from the University of Virginia in 1979 and obtained a masters degree from the Johns Hopkins University School of Advanced International Studies in 1988. She is single and lives alone at 3039 Macomb Street, N.W., apartment 20, Washington, D.C. 20008, which residence is further described in Attachment A. She has registered in her name a red 2000 Toyota Echo, bearing vehicle identification number JTDT1231Y0007841 and District of Columbia license plate number 993 190, which is regularly parked in the vicinity of her residence, and which she regularly uses to commute to her place of employment. 5. MONTES is currently employed by the Defense Intelligence Agency (DIA) as a senior intelligence analyst. Her current office is at 200 MacDill Boulevard, located on Bolling Air Force Base, Washington, D.C. 20340. Her assigned office space is C6-146A. She has been employed by DIA as an analyst since September 1985. Since 1992, she has specialized in Cuba matters. She is currently the senior analyst responsible for matters pertaining to Cuba. During the course of her employment, MONTES has had direct and authorized access to classified information relating to the national defense. 6. Records obtained from Riggs Bank reveal that MONTES has continually leased safe deposit box number 526 at Riggs Bank, N.A., Friendship Branch, 4249 Wisconsin Avenue, N.W., Washington, D.C. since September 2, 1993. 7. Classified information is defined by Executive Order No. 12,958, 60 Fed. Reg.19,825 (1995), as follows: information in any form that (1) is owned by, produced by or for, or under the control of the United States government; (2) falls within one or more of the categories set forth in section 1.5 of the order (including intelligence sources and methods, cryptology, military plans, and vulnerabilities or capabilities of systems, installations, projects, or plans relating to the national security), and (3) is classified by an original classification authority who determines that its unauthorized disclosure reasonably could be expected to result in damage to the national security. Under the executive order, the designation "Confidential" shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause damage to the national security. The designation "Secret" shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security. The designation "Top Secret" shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to the national security. 8. In addition, Executive Order No. 12,958 provides that the secretaries of State, Defense and Energy are authorized to create "special access programs" upon certain specific findings including that the vulnerability of, or threat to, specific classified information is exceptional. Under such a program, the safeguarding and access requirements to information covered by the program exceed those normally required for information at the same classification level. 9. Under 32 C.F.R. ß 159a.9, Sensitive Compartmented Information (SCI) refers to information and material that requires special controls for restricted handling. 10. During her employment at DIA, MONTES has continuously held a security clearance and has had regular, authorized access to classified information. I know that a person who receives such clearances is required to be briefed on the procedures for properly handling classified information and the penalties for failing to do so, and that such a person must sign certifications of understanding and agreement in connection with those briefings. I have reviewed a "Classified Information Nondisclosure Agreement" (Standard Form 189) that MONTES signed on September 30, 1985. In that document MONTES acknowledged that she as aware that unauthorized disclosure of classified information could cause irreparable injury to the United States or could be used to advantage by a foreign nation, that she would never divulge such information to an unauthorized person, and that she understood that she was obligated to comply with laws and regulations that prohibit the unauthorized disclosure of classified information, and that she further understood such a disclosure could constitute a violation of United States criminal law including 18 U.S.C. ß 794. I have also reviewed a "Security Briefing/Debriefing Acknowledgment" form signed by MONTES on May 15, 1997, briefing her into a Special Access Program (SAP). On this date, specifically in connection with this SAP, MONTES signed a Sensitive Compartmented Information Nondisclosure Agreement,in which she acknowledged that the unauthorized disclosure of SCI may violate federal criminal law,including 18 U.S.C. ß 794, and that such disclosure could cause irreparable injury to the United States or be used to the advantage of a foreign nation. II. MONTES's Toshiba Laptop Computer and Shortwave Radio A. Communication From the Cuban Intelligence Service (CuIS) to MONTES via Shortwave Radio 11. Based on my knowledge and familiarity with the methodology of the Cuban intelligence service, I am aware that the CuIS often communicates with clandestine CuIS agents operating outside Cuba by broadcasting encrypted messages at certain high frequencies. Under this method,the CuIS broadcasts on a particular frequency a series of numbers. The clandestine agent, monitoring the message on a shortwave radio, keys in the numbers onto a computer and then uses a diskette containing a decryption program to convert the seemingly random series of numbers into Spanish-language text. This was the methodology employed by some of the defendants convicted last June in the Southern District of Florida of espionage on behalf of Cuba and acting as unregistered agents of Cuba, in the case of United States of America v. Gerardo Hernandez, et al., Cr. No. 98-721-CR- Lenard(s)(s). Although it is very difficult to decrypt a message without access to the relevant decryption program, once decrypted on the agent's computer the decrypted message resides on the computer's hard drive unless the agent takes careful steps to cleanse the hard drive of the message. Simply "deleting" the file is not sufficient. 12. Based on the evidence described below, I have concluded that MONTES was a clandestine CuIS agent who communicated with her handling CuIS officer in the manner described above. 13. A receipt obtained from a CompUSA store located in Alexandria, Virginia indicated that on October 5, 1996, one "Ana B. Montes" purchased a refurbished Toshiba laptop computer, model 405CS, serial number 10568512. 14. During a court-authorized surreptitious entry into MONTES's residence, conducted by the FBI on May 25, 2001, FBI agents observed in her residence a Toshiba laptop computer with the serial number set out above. During the search, the agents electronically copied the laptop's hard drive. During subsequent analysis of the copied hard drive, the FBI recovered substantial text that had been deleted from the laptop's hard drive. 15. The recovered text from the laptop's hard drive included significant portions of a Spanish language message, which when printed out with standard font comes to approximately 11 pages of text. The recovered portion of the message does not expressly indicate when it was composed. However, it instructs the message recipient to travel to "the Friendship Heights station" on "Saturday, November 23rd." My review of a calendar indicates that November 23 fell on a Saturday in 1996; the next time thereafter November 23 falls on a Saturday is in 2002. Accordingly, this message was composed sometime before November 23, 1996, and entered onto MONTES's laptop sometime after October 5, 1996, the date she purchased it. Based on its content, I have concluded that it is a message from a CuIS officer to MONTES. 16. Portions of the recovered message included the following: "You should go to the WIPE program and destroy that file according to the steps which we discussed during the contact. This is a basic step to take every time you receive a radio message or some disk." 17. During this same search, the agents also observed a Sony shortwave radio stored in a previously opened box on the floor of the bedroom. The agents turned on the radio to confirm that it was operable. Also found was an earpiece that could be utilized with this shortwave radio, allowing the radio to be listened to more privately. Similar earpieces were found in the residences of the defendants in the Hernandez case, as described above in paragraph 11. 18. The recovered portion of the message begins with the following passage: Nevertheless, I learned that you entered the code communicating that you were having problems with radio reception. The code alone covers a lot, meaning that we do not know specifically what types of difficulty you are having. Given that it's only been a few days since we began the use of new systems, let's not rule out that the problem might be related to them. In that case, I'm going to repeat the necessary steps to take in order to retrieve a message. The message then describes how the person reading the message should "write the information you send to us and the numbers of the radio messages which you receive." The message later refers to going "to a new line when you get to the group 10 of the numbers that you receive via radio," and still later gives as an "example" a series of groups of numbers: "22333 44444 77645 77647 90909 13425 76490 78399 7865498534." After some further instruction, the message states: "Here the program deciphers the message and it retrieves the text onto the screen, asking you if the text is okay or not." Near the conclusion of the message, there is the statement "In this shipment you will receive the following disks: . . . 2) Disk "R1" to decipher our mailings and radio." 19. Further analysis of MONTES's copied Toshiba hard drive identified text consisting of a series of 150 5-number groups. The text begins, "30107 24624," and continues until 150 such groups are listed. The FBI has determined that the precise same numbers, in the precise same order, were broadcast on February 6, 1999, at AM frequency 7887 kHz, by a woman speaking Spanish, who introduced the broadcast with the words "Attencion! Attencion!" The frequency used in that February 1999 broadcast is within the frequency range of the shortwave radio observed in MONTES's residence on May 25, 2001. B. Communication Between the CuIS and MONTES via Computer Diskette 20. Based on my knowledge of the methodology employed by the CuIS, I am aware that a clandestine CuIS agent often communicates with his or her handling CuIS officer by typing a message onto a computer, and then encrypting and saving it to a diskette. The agent thereafter physically delivers the diskette, either directly or indirectly, to the officer. In addition, as an alternative to sending an encrypted shortwave radio broadcast, a CuIS officer often will similarly place an encrypted message onto a diskette and again simply physically deliver the diskette, clandestinely, to the agent. Upon receipt of the encrypted message, either by the CuIS officer or the agent, the recipient employs a decryption program contained on a separate diskette to decrypt the message. The exchange of diskettes containing encrypted messages, and the use of decryption programs contained on separate diskettes, was one of the clandestine communication techniques utilized by the defendants in the Hernandez case described above in paragraph 11. Although it is difficult to decrypt a message without the decryption program, the very process of encrypting or decrypting a message on a computer causes a decrypted copy of the message to be placed on the computer's hard drive. Unless affirmative steps are taken to cleanse the hard drive, beyond simply "deleting" the message, the message can be retrieved from the hard drive. 21. Based on the evidence described below, I have concluded that MONTES was a CuIS agent who communicated with her CuIS handling officer by passing and receiving computer diskettes containing encrypted messages. 22. The message described above that was contained on the hard drive of MONTES's laptop computer contained the following passage: Continue writing along the same lines you have so far, but cipher the information every time you do, so that you do not leave prepared information that is not ciphered in the house. This is the most sensitive and compromising information that you hold. We realize that this entails the difficulty of not being able to revise or consult what was written previously before each shipment, but we think it is worth taking this provisional measure. It is not a problem for us if some intelligence element comes repeated or with another defect which obviously cannot help, we understand this perfectly.-- Give "E" only the ciphered disks. Do not give, for the time being, printed or photographed material. Keep the materials which you can justify keeping until we agree that you can deliver them.-- Keep up the measure of formatting the disks we send you with couriers or letters as soon as possible, leaving conventional notes as reminders only of those things to reply to or report. The message goes on to refer to a "shipment" that contains "Disk 'S1' - to cipher the information you send," and, as indicated in the previous section, to "Disk 'R1' to decipher our mailings and radio." Earlier in the message, there is a reference to "information you receive either via radio or disk." 23. During the court-authorized search of the residence on May 25, 2001, two boxes containing a total of 16 diskettes were observed. During a subsequent such search on August 8, 2001, a box containing 41 diskettes, later determined to be blank, were observed. Finally, records obtained from a Radio Shack store located near MONTES's residence indicate that MONTES purchased 160 floppy diskettes during the period May 1, 1993, to November 2, 1997. III. Communication from MONTES to the CuIS by Pager 24. Based on my knowledge of the methodology employed by the CuIS, I am aware that a clandestine CuIS agent often communicates with his or her handling CuIS officer by making calls to a pager number from a pay telephone booth and entering a pre-assigned code to convey a particular message. This methodology was utilized by the defendants in the Hernandez case described above in paragraph 11. 25. Based on the evidence described below, I believe that MONTES has been communicating with her handling CuIS officer in this fashion. 26. In the same message copied from MONTES's hard drive that has been described earlier in this affidavit, there is a passage that states: C) Beepers that you have. The only beepers in use at present are the following: 1) (917) [first seven-digit telephone number omitted from this application], use it with identification code 635. 2) (917) [second seven-digit telephone number omitted from this application]. Use it with identification code 937. 3) (917) [third seven-digit telephone number omitted from this application] Use it only with identification code 2900 . . . because this beeper is public, in other words it is known to belong to the Cuban Mission at the UN and we assume there is some control over it. You may use this beeper only in the event you cannot communicate with those mentioned in 1) and 2), which are secure. Based on my experience and knowledge, I have concluded that the reference to "control over it" in the above passage refers to the CuIS officer's suspicion that the FBI is aware that this beeper number is associated with the Cuban government and is monitoring it in some fashion. 27. In addition, as described previously, the message on the laptop's hard drive includes a portion stating that the message recipient "entered the code communicating that you were having problems with radio reception." Based on the evidence described above, I have concluded this portion of the message indicates that MONTES at some point shortly prior to receiving the message sent a page to her CuIS officer handler consisting of a pre-assigned series of numbers to indicate she was having communication problems. 28. Based on evidence obtained during the FBI's physical surveillance of MONTES conducted between May and September 2001, I have concluded that MONTES continues to send coded pages to the CuIS. This evidence is described below in paragraphs 38 to 45. III. MONTES's Transmission of Classified Information to the CuIS 29. The same message described above, as well as other messages recovered from the laptop's hard drive, contained the following information indicating that MONTES had been tasked to provide and did provide classified information to the CuIS. 30. In one portion of the message discussed above, the CuIS officer states: What *** said during the meeting . . . was very interesting. Surely you remember well his plans and expectations when he was coming here. If I remember right, on that occasion, we told you how tremendously useful the information you gave us from the meetings with him resulted, and how we were waiting here for him with open arms. 31. I have replaced in this application with "***" a word that begins with a capital letter, which was not translated, and is in fact the true last name of a U.S. intelligence officer who was present in an undercover capacity, in Cuba, during a period that began prior to October 1996. The above quoted portion of the message indicates that MONTES disclosed the U.S. officer's intelligence agency affiliation and anticipated presence in Cuba to the CuIS, which information is classified "Secret." As a result, the Cuban government was able to direct its counter-intelligence resources against the U.S. officer ("we were waiting here for him with open arms"). 32. The very next section in the message states: We think the opportunity you will have to participate in the ACOM exercise in December is very good. Practically, everything that takes place there will be of intelligence value. Let's see if it deals with contingency plans and specific targets in Cuba, which are to prioritized interests for us. 33. I have concluded that the "ACOM exercise in December" is a reference to a December 1996 war games exercise conducted by the U.S. Atlantic Command, a U.S. Department of Defense unified command, in Norfolk, Virginia. Details about the exercise's "contingency plans and specific targets" is classified "Secret" and relates to the national defense of the United States. 34. DIA has advised that MONTES attended the above exercise in Norfolk, as part of her official DIA duties. 35. In a separate message partially recovered from the hard drive of MONTES's Toshiba laptop, the message reveals details about a particular Special Access Program (SAP) related to the national defense of the United States, and states: "In addition, just today the agency made me enter into a program, `special access top secret. [First name, last name omitted from this application] and I are the only ones in my office who know about the program." The details related about this SAP in this message are classified "Top Secret" / SCI. 36. DIA has confirmed that MONTES and a colleague with the same name as that related in the portion of the message described above were briefed into this SAP, together, on May 15, 1997. Accordingly, I have concluded that the above message from MONTES to a CuIS officer. 37. In yet another message recovered from the laptop, there is a statement revealing that "we have noticed" the location, number and type of certain Cuban military weapons in Cuba. This information is precisely the type of information that is within MONTES's area of expertise, and is,in fact, an accurate statement of the U.S. intelligence community's knowledge on this particular issue. The information is classified "Secret." Accordingly, I have concluded that this message also is a message from MONTES to a CuIS officer. FBI Physical Surveillance of MONTES and Telephone Records for May to September 2001 38. FBI physical surveillance of MONTES has shown a recent pattern of pay telephone calls by her to a pager number, a communication method that, as described above in paragraph 24, is consistent with known CuIS communications plans and operations. In each paragraph below that refers to MONTES driving, she was utilizing the Toyota described above in paragraph 2. 39. The FBI maintained periodic physical surveillance of MONTES during the period May to September 2001. On May 20, 2001, MONTES left her residence and drove to the Hecht's on Wisconsin Avenue, in Chevy Chase, Maryland. She entered the store at 1:07 p.m. and exited by the rear entrance at 1:27 p.m. She then sat down on a stone wall outside the rear entrance and waited for approximately two minutes. At 1:30 p.m., the FBI observed her walk to a pay phone approximately 20 feet from where she was sitting. She placed a one minute call to a pager number using a pre-paid calling card. At 1:45 p.m. she drove out of the Hecht's lot and headed north on Wisconsin Avenue toward Bethesda, Maryland. At 1:52 p.m. she parked her car in a lot and went into Modell's Sporting Goods store. She quickly exited the store carrying a bag and crossed Wisconsin Avenue to an Exxon station. She was observed looking over her right and left shoulders as she crossed the Exxon lot. At 2:00 p.m. she placed a one minute call from a pay phone at the Exxon station to the same pager number using the same pre-paid calling card. By 2:08 p.m., MONTES had walked back to her vehicle and was driving back to her residence where she arrived at 2:30 p.m. 40. On June 3, 2001, MONTES engaged in similar communications activity. She left her residence at approximately 2:30 p.m. and drove to a bank parking lot at the corner of Harrison Street, N.W. and Wisconsin Avenue, N.W. She exited her car at approximately 2:37 pm and entered a Borders Book Store on Wisconsin Avenue. She left the store approximately 40 minutes later. She then crossed Wisconsin Avenue to the vicinity of three public pay phones near the southern exit of the Friendship Heights Metro Station. At 3:28 p.m. she placed a one-minute call using the same pre-paid calling card to the same pager number she had called on May 20, 2001. After a few minutes, she walked back to her car and drove to a grocery store. 41. Pursuant to court authorization, on August 16, 2001, the FBI searched MONTES's pocketbook. In a separate compartment of MONTES's wallet, the FBI found the pre-paid calling card used to place the calls on May 20, 2001 and June 3, 2001. In the same small compartment, the FBI located a slip of paper on which was written the pager number she had called. Written above this pager number was a set of digits that I believe comprise one or more codes for MONTES to use after calling the pager number, i.e., after contacting the pager, she keys in a code to be sent to the pager which communicates a particular pre-established message. 42. On August 26, 2001, at approximately 10:00 a.m., the FBI observed MONTES making a brief pay telephone call to the same pager number from a gas station/convenience store located at the intersection of Connecticut and Nebraska Avenues, N.W., in Washington, D.C. 43. On September 14, 2001, MONTES left work and drove directly to her residence. She then walked to Connecticut Avenue, N.W., in Washington, D.C., still wearing her business clothes, and made a stop at a dry cleaning shop. She then entered the National Zoo through the Connecticut Avenue entrance. She proceeded to the "Prairie Land" overlook where she stayed for only 30 seconds. She then walked further into the zoo compound and basically re- traced her route out of the zoo. At approximately 6:30 p.m. MONTES removed a small piece of paper or card from her wallet and walked to a public phone booth located just outside the pedestrian entrance to the zoo. MONTES then made what telephone records confirmed to be two calls to the same pager number she had called in May, June and August, as described above. The records reflect that the first call was unsuccessful, i.e., the call lasted zero seconds. According to the records, she made a second call one minute later that lasted 33 seconds. Shortly after making these calls, MONTES looked at her watch and then proceeded to walk back to her residence. 43. On September 15, 2001, telephone records pertaining to the pre- paid calling card number on the card observed in her pocketbook on August 16, 2001, show that MONTES made a call to the same pager number at 11:12 a.m. that lasted one minute. 44. On September 16, 2001, MONTES left her residence in the early afternoon and took the Metro (Red Line) to the Van Ness - UDC station in Washington, D.C. She made a brief telephone call from a payphone in the Metro station at approximately 1:50 p.m., again to the same pager number. 45. MONTES is known to possess a cell phone. A cell phone was observed during a court authorized search of her tote bag on August 16, 2001. In addition, during surveillance on September 16, 2001, MONTES was observed speaking on a cell phone. Furthermore, telephone records obtained in May 2001 confirm that she has subscribed to cell telephone service continually from October 26, 1996 to May 14, 2001. MONTES's use of public pay phones notwithstanding her access to a cell phone supports my conclusion that the pay phone calls described in this section were in furtherance of MONTES's espionage. Probable Cause to Seize Documents, Materials and Computer Media 46. My experience has shown that individuals involved in espionage very often maintain copies of correspondence, draft documents and even classified government documents which are themselves of evidentiary value, along with evidence of criminal and other associations. This evidence includes directories, lists, news articles, photographs, travel and similar material. The items and materials utilized by persons engaged in espionage is further described in Attachment B. 47. MONTES is known to have both a laptop and a desktop computer in her residence. In addition, she utilizes a desktop computer in her office in the DIAC. These computers may be attached to peripherals such as printers when the search warrants are executed. Searching these computer systems may require a range of data analysis techniques. In some cases, it is possible for the agents to conduct carefully targeted searches that can locate evidence without requiring a time consuming manual search through unrelated materials that may be commingled with criminal evidence. Similarly, agents may be able to locate the materials covered in the warrant by looking for particular directory or file names. In other cases, however, such techniques may not yield the evidence described in the warrant. Criminals can mislabel or hide files and directories; encode communications to avoid using key words; attempt to delete files to evade detection; or take other steps designed to frustrate law enforcement searches for information. These steps all are anticipated to be applicable in this case. These steps may require agents to conduct more extensive searches, which can more easily be accomplished with equipment that cannot be brought to the search sites, such as scanning areas of the disk not allocated to listed files, or opening every file and scanning its contents briefly to determine whether it falls within the scope of the warrant. In light of these difficulties, your affiant requests permission to use whatever data analysis techniques appear necessary to locate and retrieve the evidence in the computers, diskettes, and peripherals that are located within the places and items to be searched, and to remove these items from the places to be searched so that the items may be searched more thoroughly. Conclusion 48. Based on the evidence described above, I believe probable cause exists that from on or about October 5, 1996, to the date of this affidavit, in the District of Columbia and elsewhere, ANA BELEN MONTES, conspired, confederated and agreed with persons known and unknown to violate 18 U.S.C. ß 794(a), that is, to communicate, deliver and transmit to the government of Cuba and its representatives, officers and agents, information relating to the national defense of the United States, with the intent and reason to believe that the information was to be used to the injury of the United States and to the advantage of Cuba, and that MONTES committed acts to effect the object of this conspiracy in the District of Columbia and elsewhere, all in violation of 18 U.S.C. ß 794(c). 49. I further believe that probable cause exists that the items and locations described in Attachment A contain evidence, fruits, and instrumentalities relating to the above violation, which evidence fruits and instrumentalities are further described in Attachment B. STEPHEN A. McCOY, Special Agent Federal Bureau of Investigation SWORN TO AND SUBSCRIBED BEFORE ME THIS DAY OF SEPTEMBER, 2001. UNITED STATES MAGISTRATE JUDGE ATTACHMENT A The residence of ANA BELEN MONTES is located at 3039 Macomb Street, N.W., apartment 20, Washington, D.C. 20008. 3039 Macomb Street, N.W., is titled "The Cleveland Apartments," and is a three story, red brick building. Apartment 20 is on the second floor and is the first door on the left. ATTACHMENT B 1. Espionage paraphernalia, including devices designed to conceal and transmit national defense and classified intelligence information and material, and implements used by espionage agents to communicate with their handlers and with a foreign government, to wit: white tape, mailing tape, colored chalk (all used for signaling purposes), coded pads, secret writing paper, microdots, any letters, notes or other written communications (including contact instructions) between defendant ANA BELEN MONTES and any agents of the CuIS or other intelligence service of Cuba; any computers, (including laptops), computer disks, cameras, film, codes, telephone numbers, maps, photographs and other materials relating to communication procedures, correspondence; 2. Records, notes, calendars, journals, maps, instructions, and classified documents and other papers and documents relating to the transmittal of national defense and classified intelligence information (including the identities of foreign espionage agents and intelligence officers and other foreign assets or sources providing information to the United States Intelligence Community, such as the FBI and CIA; records of previous illicit espionage transactions, national defense transactions, national defense and classified intelligence information, including copies of documents copied or downloaded by ANA BELEN MONTES from the DIA); 3. Passports, visas, calendars, date books, address books, credit card, hotel receipts and airline records, reflecting travel in furtherance of espionage activities; 4. Identity documents, including but not limited to passports, licenses, visas (including those in fictitious or alias identities), U.S. and foreign currency, instructions, maps, photographs, U.S. and foreign bank account access numbers and instructions and other papers and materials relating to emergency contact procedures and escape routes; 5. Safety deposit box records, including signature cards, bills, and payment records, safety deposit box keys, whether in the name of the defendant or a family member; any records pertaining to any commercial storage sites where the defendant may be storing other classified intelligence and counter-intelligence documents or other records of her espionage activities; 6. Federal, state and local tax returns, work sheets, W-2 forms, 1099 forms, and any related schedules; 7. Telephone bills and records, including calling cards and pager records; 8. Photographs, including photographs of co-conspirators; correspondence (including envelopes) to and from ANA BELEN MONTES and handlers, contacts and intelligence agents of Cuba; 9. Computer hardware, software, and storage media, known to be used by the defendant or to which she had access, including, but not limited to: any personal computer, laptop computer, modem, and server, which have been and are being used to commit the offenses of espionage and conspiracy to commit espionage; records, information and files contained within such computer hardware containing evidence and fruits of defendant's espionage activity between October 5, 1996, and the present, including classified documents, in whatever form and by whatever means they have been created or stored, including but not limited to any electrical, electronic, or magnetic form of storage device; floppy diskettes, hard disks, zip disks, CD-ROMs, optical discs, backup tapes, printer buffers, smart cards, memory calculators, pagers, personal digital assistants such as Palm III devices, removable hard drives, memory cards, zip drives, and any photographic forms of such records including microfilm, digital prints, slides, negatives, microfiche, photocopies, and videotapes, computer terminals and printers used by the defendant in said espionage activity. -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3790 From: A Grudko Date: Tue Sep 25, 2001 3:36pm Subject: Fw: Sun Tsu > >- Original Message - > >From: Aimee > >> [What does this have to do with TSCM? Sun Tzu is on Atkinson's web site.] > > > >I understand that Sun Tsu refers mainly to strategy. In TSCM, as in any > >occupation, one must have a number of strategies (marketing, internet > >presence, financing, development, growth etc.) and then appropriate tactics. > > > >We might have the best 'bug detection' equipment and skills, but if we don't > >have a business strategy how will we put food > >on the plate? > > > >The term 'Art' (as in Aimee's 'Art of War' reference) is the skilful > >application of knowledge in any field, and should not be confused with the > >perception of art as beauty or creativity. It's companion is science, which > >deals with measuring and recording. The strategies of war aim to win. > >Winning a war can be ugly but the skilful application of strategy can turn > >winning into an 'Art'. > > > >IMHO the 'Art' of TSCM is the collection of knowledge about the most current > >surveillance technology, intelligence threats and similar risks to the > >client. If one applies a sound business strategy it's possible to make TSCM > >a valid and profitable service. > > > >Greetings from sunny South Africa > > > >Andy Grudko. D.P.M., Grad I.S.(S.A.) > >Grudko Associates - www.grudko.com > >G8RXE, ZR6UU, ZRAJ7795 > >'SWEEPING' SINCE 1981 AND STILL LEARNING 3791 From: Date: Tue Sep 25, 2001 1:18pm Subject: Mossad head: We need spies, not just electronics http://www.jpost.com/Editions/2001/09/25/News/News.35300.html Mossad head: We need spies, not just electronics By Arieh O'Sullivan JERUSALEM (September 25) - In a rare public appearance, Mossad head Ephraim Halevy last night criticized Western intelligence agencies for neglecting human intelligence in favor of sophisticated electronic methods of spying. "What needs to be done is to find out what went wrong, not who went wrong," Halevy told a conference on "Intelligence and Peace in the Middle East." Halevy said the main thing to learn is to revive the use of human elements, agents, as central intelligence sources. He said that "sigint" or signal intelligence - the collection of intelligence through eavesdropping, spy satellites, and other electronic means - had become the leading way to gather information. "Sigint had become the central role in intelligence," Halevy said. "For years, we have seen the centrality of the National Security Agency in the American intelligence community. "Sigint is not only the main supplier of significant information, but it is the scale by which the contributions of other fundamental disciplines are measured. Sigint turned into the ultimate judge of reality, and the power of the other disciplines are used to confirm, cross-reference, and supplement." Halevy said that nowhere in the world is sigint used to confirm intelligence gathered by non-sigint methods. "Sigint had become the high priest of intelligence and... blinded those deciphering the signs." He said that the enemy naturally identified this as the Achilles's heel of Western intelligence and behaved accordingly. He said the problem wasn't the fact that non-sigint disciplines suffered from less funding. "Rather it was a state of mind," Halevy said. "Many good people, let me say all of us, including the man speaking to you now, stuck to this basic intelligence concept which led to failures which we urgently need to be aware of. Time is running out and the matter is urgent, very urgent." Since the September 11 terrorist attacks in the US, many analysts have said that intelligence agencies have failed because human intelligence had been pushed aside. But Halevy's comments were the first made in public by the head of a major intelligence organization. "The events of the past weeks have impressed on me the need to change the words of failure to those of praise for the intelligence community. The lone agent, who was the sole intelligence component in biblical times, is a central component in the intelligence mosaic of the 21st century. His exclusivity has long disappeared and he is just one of the many competitors grasping for the ear of the researcher, the leaders. In the past years, he has been sidelined. "These past days have shown us that he is vital just as he had been vital in the course of human history. In other words, marketing is the name of the game. It's good that we have people with capabilities and virtues which answer the needs of the time and which can meet the challenges of the year." The conference, sponsored by Bar-Ilan University's BESA Center for Strategic Studies and the Center for Special Studies, was held in memory of Eliahu Ben-Elissar, the former MK, diplomat, and Mossad agent who died last summer in Paris where he was serving as ambassador. _________________________________________________________________ Talk Stocks with Smart Investors -- http://www.ragingbull.com Click Below for Brokerage Specials for Raging Bull Users http://www.ragingbull.com/tradingcenter 3792 From: Agent Lovato Date: Tue Sep 25, 2001 5:37pm Subject: Re: Fw: Sun Tsu Perception is an interesting concept. Elusive as it is relative. A Grudko wrote: > >- Original Message - > >From: Aimee > >> [What does this have to do with TSCM? Sun Tzu is on Atkinson's web site.] > > > >I understand that Sun Tsu refers mainly to strategy. In TSCM, as in any > >occupation, one must have a number of strategies (marketing, internet > >presence, financing, development, growth etc.) and then appropriate tactics. > > > >We might have the best 'bug detection' equipment and skills, but if we don't > >have a business strategy how will we put food > >on the plate? > > > >The term 'Art' (as in Aimee's 'Art of War' reference) is the skilful > >application of knowledge in any field, and should not be confused with the > >perception of art as beauty or creativity. It's companion is science, which > >deals with measuring and recording. The strategies of war aim to win. > >Winning a war can be ugly but the skilful application of strategy can turn > >winning into an 'Art'. > > > >IMHO the 'Art' of TSCM is the collection of knowledge about the most current > >surveillance technology, intelligence threats and similar risks to the > >client. If one applies a sound business strategy it's possible to make TSCM > >a valid and profitable service. > > > >Greetings from sunny South Africa > > > >Andy Grudko. D.P.M., Grad I.S.(S.A.) > >Grudko Associates - www.grudko.com > >G8RXE, ZR6UU, ZRAJ7795 > >'SWEEPING' SINCE 1981 AND STILL LEARNING Yahoo! Groups SponsorADVERTISEMENT finalURL = "http://rd.yahoo.com/M=168643.1620686.3168692.1261774/D=egroupweb/S=1705007140:HM/A=799560/R=0/*http://shop.store.yahoo.com/cgi-bin/clink?overstock3+shopping:dmad/M=168643.1620686.3168692.1261774/D=egroupweb/S=1705007140:HM/A=799560/R=1/1001450996+http://us.rmi.yahoo.com/rmi/http://www.overstock.com/rmi-framed-url/http://www.overstock.com/cgi-bin/d2.cgi%3Fcid=12715";var flashFileURL = "http://java.yahoo.com/a/1-/flash/misc/osyahoo_new_0919a.swf";var noFlashImg = "http://java.yahoo.com/a/1-/flash/misc/osyahooalt.gif"; on error resume next Sub banner_click_lrec_FSCommand(ByVal command, ByVal args) call banner_click_lrec_DoFSCommand(command, args)end sub function makeNewWindow(url) {var newWindow = PrivoxyWindowOpen(url); } ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. Unthinking respect for authority is the greatest enemy of truth Agent_Lovato --------------------------------- Do You Yahoo!? Get email alerts & NEW webcam video instant messaging with Yahoo! Messenger. [Non-text portions of this message have been removed] 3793 From: Date: Wed Sep 26, 2001 3:18am Subject: AVCOM 65-C for sale Hello TSCM guys, I have an Avcom 65-C for sale. Great as a backup analyzer, or for low-medium threat level jobs. With mixers to over 4 Ghz. It is in BRAND new condition (battery may need to be replaced for mobile use) It was used on two small jobs and cared for like a baby. Inside, air conditioned storage. One owner/operator (myself). Has always been inside the nylon case it came with (from Avcom). Offers around $2000 (was over $5000 new) ...Free shipping in the USA. Please contact Vince: 540-353-5309 crazy_8@s... 3794 From: Date: Wed Sep 26, 2001 7:58am Subject: Robo-roach brings Judgement Day closer An interesting glimpse into the future, for you guys to try and counter, which I came across today. http:/www.vnunet.com/News/1125614 Will insecticide and a fly swatter be tools of the trade in future. One to watch ???? Mick UK Law Enforcement 3795 From: Date: Wed Sep 26, 2001 5:52am Subject: Re: Robo-roach brings Judgement Day closer In a message dated 9/26/01 6:22:53 AM Pacific Daylight Time, michael.andrew.young@t... writes: << An interesting glimpse into the future, for you guys to try and counter, which I came across today. >> How do you know that this technology has not been out there for years? Are the Japanese always first? 3796 From: James M. Atkinson Date: Wed Sep 26, 2001 10:58am Subject: INTERNATIONAL CRYPTOGRAPHY INSTITUTE 2001 CONFERENCE For Immediate Release Contacts B.K. DeLong isse-press@n... +1.617.877.3271 INTERNATIONAL CRYPTOGRAPHY INSTITUTE 2001 CONFERENCE INCLUDES "WHO'S WHO" OF INDUSTRY EXPERTS Speakers include PGP creator Phil Zimmermann and the inventor of Public Key cryptography Whitfield "Whit" Diffie. Washington, D.C. -- 26 September 2001 -- The National Intellectual Property Law Institute (NIPLI) and its Information System Security & Education (ISSE) Center today announced the International Cryptography Institute 2001 conference, the annual event and forum to educate corporate leaders on the benefits and developments in cryptography. ICI 2001 will be held at the Four Seasons Georgetown Hotel in Washington, D.C., 29 through 30 November, 2001. The focus of this year's International Cryptography Institute conference will be global challenges, trends, and best practices in cryptography. The faculty will address cryptographic threats that confront the information protection requirements of corporations, the national security, protecting the critical information infrastructure, and law enforcement. "Information security is extremely important when it comes to intellectual property in the corporate and research world," said Bill Tafoya, Conference Chair, Dean & Director of the ISSE Center. "Our goal is to provide attendees with the most thorough information we can about cryptography and cryptographic technologies." The speakers for this year's International Cryptography Institute include: -- Dorothy E. Denning, Director, Georgetown Institute for Information Assurance, Georgetown University. -- Whitfield Diffie, Distinguished Engineer for Sun Microsystems Labs and one of the primary inventors of Public Key cryptography. -- David Kahn, Cryptography Historian and the author of several books on cryptography including "The Codebreakers". -- Mudge, Chief Scientist & Vice President, Research & Development for @stake. -- Bruce Sterling, author of "Hacker Crackdown". -- Marcus Ranum, President and CEO, NFR Security. -- Phil Zimmermann, Creator of PGP and Chief Cryptographer Consultant, Hush Communications. The format consists of plenary sessions as well as two simultaneous tracks. Track I has been designed for chief executive officers. Track II is more technically oriented. Topics to be addressed include: History of Cryptography, What Executives Need to Know About Cryptography, PKI Escrow, Disparate Data Analysis, Computer Vulnerabilities, Firewalls, PGP, the Orange Book, AES, RISKS, and more. "In 1991 I wrote the book 'Hacker Crackdown'. Cops told me then, ten years ago, that nothing really important would happen in computer security until there was some catastrophe," said author Bruce Sterling. "Now there's been one. The maturity and good sense of that little security community will be tested now as it has never been tested before. Right here, right now, this is really important, and I'm very, very interested." To register for ICI 2001, visit the Web site at http://www.nipli.org/isse/events/2001/cryptography. Direct any conference-related questions to ici2001@n.... For press registration, visit the registration section of the Web site or contact B.K. DeLong at +1.617.877.3271 or via email at isse-press@n.... ABOUT ISSE The mission of the Information System Security & Education (ISSE) Center is to advance the study of and promulgate best practices within the information security community. ISSE sponsors conferences, symposia, colloquia, and work groups in order to contribute to a broader understanding of industry practices and offers services including empirical research, statistical and trend analysis as well as long-range planning services. More information is available at http://www.nipli.org/isse/ ABOUT NIPLI The National Intellectual Property Law Institute is a not-for-profit, Washington D.C.-based think tank that serves as a research, resource and education center for advanced thinkers in business, industry, government, law, academia and the judiciary. NIPLI, (headed by James P. Chandler, Emeritus Professor of law from the National Law Center at George Washington University), researches and analyzes developments in significant areas of intellectual property including patents, trademarks, trade secrets, copyrights, and international intellectual property transactions. For more information, visit the NIPLI Web site at http://www.nipli.org/ ### -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3797 From: Andrus Aaslaid Date: Wed Sep 26, 2001 11:23am Subject: RE: Robo-roach brings Judgement Day closer I saw it first time probably three years ago in a magazine of some kind, except that it was development made somewhere in silicon valley. Exactly the same concept, exactly the same kind of roach even. It was not so sophisticated approach tho - guys simply covered the eyes of the roach and tickled the antenna of the bug with electricity - right antenna for turning left and vice versa. The application was for transporing video cameras around, so all sorts of surfaces can be explored what can not be done with ordinary small surveilance robots, as those can not crawl on a vertical surfaces. Guys main problem was the actual controlling of the movement, as the roaches were turning left and right correctly, but did run bloody fast the whole time. Noone knew how to make them go slower or stop. So the poor animal was running for it's life and operator, looking through small camera attached, attempted to guide him .. Andrus. > In a message dated 9/26/01 6:22:53 AM Pacific Daylight Time, > michael.andrew.young@t... writes: > > << An interesting glimpse into the future, for you guys to try and > counter, which I came across today. >> > > How do you know that this technology has not been out there > for years? > Are the Japanese always first? > 3798 From: Douglas Ellsworth Date: Wed Sep 26, 2001 3:02pm Subject: TEK 492 Service Manuals and other stuph Group, I have listed on Ebay a 2-volume service manual set for the TEK 492/492P. Someone on the list was inquiring about manuals a few days ago. I'm cleaning out some other stuph as well because I'm getting on to Florida where I have much more limited storage, and I'm only taking what's really needed. If anyone is interested email me directly, (I really hate the "improved" auction listers - seems they change the procedures everytime I get a little understanding of the old ones.) Microlabs/FX Non-Lin a pair of Technical Communications Corp STU's - each built into a zero case. An unused Chameleon ISDN analyzer/simulator in a HUGE transit case to fit all the software and manuals and accessories, including telephone handset. Computers (Sparc) and RDI unix notebooks. Other stuph as well. I'll privately respond to all requests. Cheers, -Doug Doug Ellsworth Secure Communications Corp., Inc email: do5ug@r... Tel: 402.578.7709 [Non-text portions of this message have been removed] 3799 From: Steve Whitehead Date: Thu Sep 27, 2001 0:44am Subject: Product Enquiry Dear List Members We received an enquiry for a "Spyfinder Camera Locator" Would appreciate any help, comments if anybody knows about the product and its usefulness. Regards Steve Whitehead E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa TSCM Services URL : http://www.tscm.co.za [Non-text portions of this message have been removed] 3800 From: Gordon Mitchell Date: Thu Sep 27, 2001 6:19am Subject: Re: Product Enquiry Try the US number (505) 884-2300 or cdcremer@s.... The unit is produced by SEA, a company in New Mexico. I snapped up one of their initial models after evaluating it. We have been using it for a year now. The device exploits an interesting characteristic of camera systems. Light from a distant source is focused on the imaging media (film, CCD,...) and a fraction (say 10%) of it is scattered. All of this scattered light that strikes the back of the camera lens is directed back toward the source. This means that the camera looks like a bright spot compared to its background that scatters light everywhere. Some years ago, thinking myself to be a clever optical designer, I tried to make a device like this and really didn't do too well. That made me appreciate the SEA device more. To use it during a sweep, stand on one side of the room and sweep it across the opposite wall. It will pick out covert cameras with apertures greater than 1 mm if you are within the camera field of view. The time to check a typical office is about 5 minutes. The disadvantage of this unit is the price. Initially it was $3K. I heard that SEA had realized enough sales that they were going to do a redesign which would drop the price but don't know for sure. Hope that this is helpful. Gordon Mitchell Future Focus, Inc Woodinville, WA, USA Electronic eavesdropping detection & finding clues in computers (425) 489-0446 Steve Whitehead wrote: > > Dear List Members > > We received an enquiry for a "Spyfinder Camera Locator" > > Would appreciate any help, comments if anybody knows about the product and its usefulness. > > Regards > > Steve Whitehead > E-mail : sceptre@m... > Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) > P O Box 16063, Lyttelton, 0140, Centurion, South Africa > TSCM Services URL : http://www.tscm.co.za > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ [Non-text portions of this message have been removed] 3801 From: Aimee Farr Date: Thu Sep 27, 2001 3:50pm Subject: Handy Daily Press IQ Indicator I'm not much on "soundbyte" public affairs reporting, or reporters who seem primarily interested in [insert-something-here]. Handy email subscription. Occasional insight. ~Aimee > ************************************************************ > See http://www.state.gov/r/pa/prs/dpb/ for all daily press briefings > ************************************************************ > To change your subscription, go to > http://www.state.gov/www/listservs_cms.html > -----Original Message----- > From: U.S.Department of State Daily Press Briefings > [mailto:DOSBRIEF@L...]On Behalf Of PA List Manager > Sent: Thursday, September 27, 2001 6:43 AM > To: DOSBRIEF@L... > Subject: September 26, 2001 Daily Press Briefing > > > Daily Press Briefing Index > Wednesday, September 26, 2001 3802 From: Date: Thu Sep 27, 2001 1:10pm Subject: NIGHTLINE: The War on Drugs vs. The War on Terrorism TODAY'S SUBJECT: In the days immediately following the Sept. 11 attacks, President Bush warned that everyone who wears a uniform must "be ready." But ready for what? Since that early statement, the president and his key advisors have cautioned that this effort will not be a traditional war. Our enemy has no army, no government. If there is any model for what will come, perhaps it is the war on drugs, where the enemy is also a mysterious, secretive organization or organizations, operating in multiple countries, including right here in the U.S. But since few would argue that we have achieved a decisive victory in the war on drugs, what lessons can be taken from this comparison? ---- In a war, armies fight for the nations they represent. In a war, armies fight on a battlefield, on the ground, in the sea, in the air. But in this war against terrorism, we have been warned by President Bush, we should not expect many similarities to those other wars. We are told to expect something else. What could that something else be? In recent years we have seen the language of war applied to several major efforts or struggles. There is the war on cancer. The war on poverty. And of course, the war on drugs. It might be worth noting that none of these wars has really been won. They are ongoing, battles with varying degrees of success and failure. But we thought the war on drugs could provide a particularly apt comparison for the kind of struggle we face with terrorism. The drug war has been a multifaceted effort, combining law enforcement, military, intelligence and diplomatic components. It will likely never be won entirely. And as last year's Academy Award winning film "Traffic" illustrated so well, it may even be counter productive and futile at times. At other times, there are significant breakthroughs. Druglords have been arrested and some even put out of business. Tonight correspondent Deborah Amos will talk to veterans of the war on drugs and seek their advice for the new war on terrorism. They will tell you that while the comparison may not be perfect, there are lessons to be learned at the very least from the drug war's failures. As we consider the enemy in this war, we are reminded how little we know about Osama bin Laden and his organization. Tonight ABC News correspondent John Miller has an exclusive interview with a former bin Laden operative. The interview provides a chilling glimpse at the motivations and mindset of the men who follow bin Laden. It also begs the question, is U.S. intelligence inside this organization? Can the battle to stop bin Laden's terror ever be won without such infiltration? Nightline will, as always, bring you up to speed on all of the latest developments. As of this writing, some of todays' developments include Defense Secretary Rumsfeld's announcement that military members killed or injured in the Sept. 11 attacks will receive Purple Heart medals and civilian defense department workers will get a new kind of medal, a civilian version of the Purple Heart. Meanwhile, President Bush today asked governors to mobilize National Guard units to protect airports. The president said "We will not surrender our freedom to travel...one of the great goals of this nation's war is to restore public confidence in the airline industry, is to tell the travelling public, 'Get on board, do your business around the country.'" We will again have our "fact check" segment to close the show. This is our nightly effort to investigate a persistant rumor - perhaps something you have read on the internet, in email or heard from friends. We hope you will join us. Thursday, September 27, 2001 Sara Just Senior Producer ABC News NIGHTLINE Washington bureau 3803 From: Aimee Farr Date: Thu Sep 27, 2001 11:58pm Subject: Lawyer terrorism from Washington. WASHINGTON -- .....Day Of The Triffids?...movie with the walking plants and the lighthouse where we got 'em with seawater? *strange screechy-screechy noises* You are advised to take a defensive position near seawater. Wartime Opportunists. Elsewhere...... http://thomas.loc.gov S 1448 "Intelligence to Prevent Terrorism Act of 2001". (FISA). HR 2915 the "Public Safety and Cyber Security Enhancement Act of 2001". "computer trespasser surveillance" provision. S 1456 the "Critical Infrastructure Information Security Act of 2001." information sharing pertaining to cyber security; Freedom of Information Act exemption (NIPC, FCC, Justice Department, Defense Department, and Commerce Department); Antitrust exemption. Cyber-Crime Convention: Council of Europe has addressed some US problems related to federal/state law conflicts. (Interested in FWD'd links of surveillance bills and related whatnot in your state legislatures, and overseas.) She says... as she sits with the August supplement for a surveillance law treatise... flip 3 onion skin pages, remove 50/insert 50, flip 2 onion skin pages, remove/insert...wondering why she is even bothering with it, since they'll have to replace and repaginate the whole damn thing, possibly several times. ~Aimee 3804 From: MIKE F Date: Fri Sep 28, 2001 8:47am Subject: Naval Intell Pro Links Naval Intelligence Professional key internet sites of interest to Intelligence Professionals: http://www.navintpro.org/IntelSites.html <== XXX-CELL-ANT mike --------------------------- lATER4,Mike Fiorentino Master Links 4 Master Investigators http://www.ml4mi.com e-mail: info@m... OR friindy@a... 3805 From: Date: Fri Sep 28, 2001 6:01am Subject: Hello I am Major Robert Vehe, USMC I work in the CI field and I'm currently deployed and supporting international real world operations. We have recently found some very interesting technology and I look fwd to sharing in the group and learning from you all as well. 3806 From: MIKE F Date: Fri Sep 28, 2001 9:24am Subject: U.S. Government Science and Technology Publications Locate Government Research Publications and Studies Search online databases for ongoing studies or completed research results http://www.scitechresources.gov/scitech-databases.htm Science and Technology Resources Listed by Agency http://www.scitechresources.gov/scitech-agency-lists.htm TECH SEARCH of Science and Technology Resources http://www.scitechresources.gov/scitech-search-websites.htm U.S. Government Science and Technology Gateway and Portal Web Sites Sites that pull together information from across government agencies http://www.scitechresources.gov/scitech-portals.htm --------------------------- lATER4,Mike Fiorentino Master Links 4 Master Investigators http://www.ml4mi.com e-mail: info@m... OR friindy@a... 3807 From: James M. Atkinson Date: Fri Sep 28, 2001 1:58pm Subject: Crouching Terrorist, Hidden Vengeance Three guys, an Englishman, an Afghan and an American are out walking along the beach together one day. They come across a lantern and a genie pops out of it. "I will give you each one wish, " says the genie. The Englishman says, "I am a farmer, my dad was a farmer, and my son will also farm. I want the land to be forever fertile in England." With a blink of the genie's eye, 'FOOM' - the land in England was forever made fertile for farming. The Afghan was amazed, so he said, "I want a wall around Afghanistan, so that no one can come into our precious country." Again, with a blink of the Genie's eye, 'POOF' - there was a huge wall around Afghanistan. The American asks, "I'm very curious. Please tell me more about this wall." The Genie explains, "Well, it's about 150' high, 50' thick, and nothing can get in or out." The American says, "Fill it up with water." -jma -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3808 From: James M. Atkinson Date: Fri Sep 28, 2001 7:14pm Subject: Complaining of a Headache One day Osama Bin Laden went to his Doctor complaining of a headache. The Doctor asked him to remove his turban whereupon he saw a frog sitting on top of Bin Laden's head. Curious, he asked, "how long have you had this?" The frog replied "well, it started out as a wart on my ass." -jma -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3809 From: MIKE F Date: Sat Sep 29, 2001 3:42pm Subject: National Research Council -STUDIES National Research Council (U.S.). Committee on the Protection of Federal Facilities Against Terrorism. _Protection of Federal Office Buildings Against Terrorism_. http://www.nap.edu/books/NI000265/html/ --------------------------- lATER4,Mike Fiorentino Master Links 4 Master Investigators http://www.ml4mi.com e-mail: info@m... OR friindy@a... 3810 From: Date: Sat Sep 29, 2001 3:16pm Subject: Re: INTERNATIONAL CRYPTOGRAPHY INSTITUTE 2001 CONFERENCE Just a view on crypto: http://news.cnet.com/news/0-1272-210-7320099-1.html Short quote: I doubt whether the Osama bin Ladens of the world are so dumb that they would use software that has already been compromised. No doubt there are any number of capable computer scientists in the Middle East and Central Asia whom these groups can turn to in a pinch for technical assistance. jb-g 3811 From: Denis Baldwin Date: Fri Sep 28, 2001 9:32am Subject: speaker wanted Hello all, I am looking for a few more speakers for a network technology conference we hold in Detroit, Michigan every year and I would like to fill one of those gaps with a surveillance technology speaker. Would anyone be interested? The conference is April 5th-7th, 2002 and we have 49 speakers currently on all sorts of topics. If you don't want to speak on this, but want to speak about something else, please let me know. Our main website is at http://www.rubi-con.org. Please send all inquiries offlist to knightphall@c... (my home account). Thanks again for all of your help! Denis Denis A. Baldwin Network Administrator, CAE, Inc. dbaldwin@c... From: James M. Atkinson, Comm-Eng Date: Tue Sep 26, 2000 6:49pm Subject: Re: Sweep in San Diego At 6:22 PM -0400 9/26/00, Steve Uhrig wrote: >Anyone (qualified) to sweep in San Diego, please mail me >off list. > >I do not know the geography of California to know who is >where. > >Steve San Diego is about 100 miles south of Los Angeles, so a legitimate TSCM'er in the LA area should be able to cover it. I have to fly down to Ft. Huachuca in a few days for an overnight stay so if you get into a pinch let me know. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1593 From: James M. Atkinson, Comm-Eng Date: Wed Sep 27, 2000 10:52am Subject: Re: tap/bug? At 2:46 PM +0200 9/27/00, A Grudko wrote: >----- Original Message ----- >From: James M. Atkinson, Comm-Eng > > Here are my "official" definitions: > >Thanks James - can I publish it in my promo. material (with >acknowledgements)? > >(Does this man never sleep?)......... Sure, just make sure that I get credit for the material, and you present a link to my website, phne #, etc.. I have my own business, so I don't have time to sleep. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1594 From: James M. Atkinson, Comm-Eng Date: Wed Sep 27, 2000 9:18pm Subject: Re: oops (fwd) At 1:06 PM -0400 9/27/00, logik@u... wrote: > Mr. Ferrell, > What are the chances of you tar'ing up your entire archive and >offering it to those of us that would like a copy? I know I personally >would love to have such an archive to go back and read through. this list >is a wealth of knowledge...in my opinion. > > Or even better, if Mr. Atkinson happens to have a complete archive of >his list from inception that would be great! I have quite a bit of space >on my server if either of you would like or need to the space to offer >such an archive on the web. Thanks! > >Niko You can find an archive of all postings on the TSCM-L main page on egroups. These archives go back to early 2000, however I have previous archives that go back over a decade (including archives from my list server at MIT). Yes, I have an archive that goes back to the inception of the list. I would add that the list is much older than many of the members may realize. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1595 From: Date: Thu Sep 28, 2000 1:10am Subject: oops delete last message if not pertaining to subject. thanks HAVE A GREAT DAY !!! 1596 From: Date: Thu Sep 28, 2000 1:19am Subject: Poetry break :>] " i know, i know, stick to the subjec!" P.S this is not a secret code. :>] by poet Robert Frost BIRCHES When I see birches bend to left and right Across the lines of straighter darker trees, I like to think some boy's been swinging them. But swinging doesn't bend them down to stay. Ice-storms do that. Often you must have seen them Loaded with ice a sunny winter morning After a rain. They click upon themselves As the breeze rises, and turn many-coloured As the stir cracks and crazes their enamel. Soon the sun's warmth makes them shed crystal shells Shattering and avalanching on the snow-crust Such heaps of broken glass to sweep away You'd think the inner dome of heaven had fallen. They are dragged to the withered bracken by the load, And they seem not to break; though once they are bowed So low for long, they never right themselves: You may see their trunks arching in the woods Years afterwards, trailing their leaves on the ground, Like girls on hands and knees that throw their hair Before them over their heads to dry in the sun. But I was going to say when Truth broke in With all her matter-of-fact about the ice-storm, I should prefer to have some boy bend them As he went out and in to fetch the cows-- Some boy too far from town to learn baseball, Whose only play was what he found himself, Summer or winter, and could play alone. One by one he subdued his father's trees By riding them down over and over again Until he took the stiffness out of them, And not one but hung limp, not one was left For him to conquer. He learned all there was To learn about not launching out too soon And so not carrying the tree away Clear to the ground. He always kept his poise To the top branches, climbing carefully With the same pains you use to fill a cup Up to the brim, and even above the brim. Then he flung outward, feet first, with a swish, Kicking his way down through the air to the ground. So was I once myself a swinger of birches. And so I dream of going back to be. It's when I'm weary of considerations, And life is too much like a pathless wood Where your face burns and tickles with the cobwebs Broken across it, and one eye is weeping From a twig's having lashed across it open. I'd like to get away from earth awhile And then come back to it and begin over. May no fate willfully misunderstand me And half grant what I wish and snatch me away Not to return. Earth's the right place for love: I don't know where it's likely to go better. I'd like to go by climbing a birch tree And climb black branches up a snow-white trunk Toward heaven, till the tree could bear no more, But dipped its top and set me down again. That would be good both going and coming back. One could do worse than be a swinger of birches. HAVE A GREAT DAY !!! 1597 From: Date: Thu Sep 28, 2000 1:40am Subject: Steganography - Electronic Spycraft Steganography - Electronic Spycraft By using apparently harmless GIF, BMP, JPEG, or WAV files, steganography creates a formidable security threat with the hiding of pornography or the disguising of corporate espionage. Published September 20, 2000 By Ronald Mendell In the physical world, Steganography (literally "covered writing") involves invisible inks or messages in hidden places. Herodotus, the ancient Greek historian, relates how a messenger had his head shaved and then had a secret message written on his scalp. With newly grown hair, he traveled to the targeted destination where his head again shaved revealed the message. In the virtual world, the digital process inserts messages into graphic, sound, and even text files. By using apparently harmless GIF, BMP, JPEG, or WAV files, steganography creates a formidable security threat with the hiding of pornography or the disguising of corporate espionage. How does steganography work? Think of a graphic image as a host (the "container") composed of pixels (picture elements). Each pixel's color depends upon a numerical value ranging from 0 to 255. An 8-bit base two number represents that value to the computer; for example, the byte 00000000 equals "0." The rightmost bit becomes the least significant bit (LSB), because the seven bits to the LSB's left contain enough information to establish the correct pixel color. Swapping out the LSB's value has no effect on the pixel's appearance to the eye. So, a steganographic program inserts the message's bits into the LSB for each byte of the graphic image. Just visualize substituting one brown egg for a white egg in a white egg carton. At a distance a group of "substituted" white egg cartons will still have an overall white appearance. The same diluting principle works for sound and text files. According to Neil F. Johnson's article, "Steganography," a 640 X 480 image that utilizes 256 colors could hold a nearly 300 KB message or image. With a 24-bit image 1024 X 768 three bytes determine each pixel's value, so each pixel contains three bits of the message resulting in a 2 MB file. Steganographic images have large capacities in which to hide contraband images or illicit data. Hiding pornography is a leading use of steganography. In a May 26, 1997 U.S. News and World Report, the U.S. Customs Service indicated that child pornographers were employing steganographic techniques to mask their illegal traffic. Legal adult erotic web sites also encourage access to steganography. The site www.stego.com distributes open source code for steganography and has links to the sponsor's adult entertainment site and to the Steganos proprietary steganographic site. Steganos Security Suite offers double protection: steganographic and cryptographic protocols. A user first encodes a message or image with strong crypto and then hides it in a container. Even if the steganographic layer gets compromised, the crypto layer of protection remains. The technology has legitimate uses; for example, proprietary graphics or images can receive a digital watermark to establish ownership and to deter "image piracy" on the web. Yet, beyond assisting pornography, steganography allows industrial spies to hide information thefts. Neil F. Johnson suggests that a spy working within a company could bring in a favorite art or music selection and "mix" in a highly sensitive file containing proprietary data. The spy would then have the options of e-mailing this "container" or taking it out on a diskette. Or, more cleverly, the spy places the graphic on the company's web site. Constituting a covert channel, the graphic serves as a "spy drop" that is downloadable at will and difficult to detect on complex web sites. For the spy, however, any of the options pose little risk given conventional security measures. Security managers have several remedies to combat the abuses of steganography: 1. If a company can ban cameras and video equipment without a permit, the same goes for steganographic programs. No employee should be allowed to use these programs on company property without a specific permit. 2. Graphic, image, or sound files posted to the company's web site or sent, as e-mail attachments (from sensitive areas), need to be filled with trusted digital watermarks first. The watermarks will overwrite any previous messages. 3. Firewalls need filters to limit the importation of pornography into the company. Employees who generate an unusual amount of non-business related e-mail with frequent graphic attachments need scrutiny. Those that send an inordinate amount of 24-bit images also require close examination. 4. Prohibit the introduction of "outside" graphic, image, or sound files onto PCs that handle highly sensitive data. Ronald L. Mendell is a Certified Internet Security Specialist. Living in Austin, Texas, he works as a writer and researcher specializing in security and investigative issues. His most recent book, Investigating Computer Crime: A Primer for Security Managers, was published by Charles C. Thomas in 1998. SecurityPortal is the world's foremost on-line resource and services provider for companies and individuals concerned about protecting their information systems and networks. http://www.SecurityPortal.com The Focal Point for Security on the Net Announcements IntelÆ architecture is the ideal server technology for running an e-business. HAVE A GREAT DAY !!! 1598 From: Mike F Date: Thu Sep 28, 2000 8:22am Subject: Unmanned Aerial Vehicles: General Accounting Office,reports on: Unmanned Aerial Vehicles: Questionable Basis for Revisions to Shadow 200 Acquisition Strategy. NSIAD-00-204. 13 pp. plus 3 appendices (5 pp.) September 26, 2000. http://www.gao.gov/new.items/ns00204.pdf L8R4,Mike f. "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 1599 From: D.M.I. Date: Thu Sep 28, 2000 2:57am Subject: Re: Steganography - Electronic Spycraft There was a shareware program similar to this on CNET.com about six months ago. I believe it was called "Camoflague". It only supported the.bmp format at the time. I recieved an e-mail from the company recently that stated they now supportd .jpeg as well. We messed around with it for a while, just because it was neat at the time. The biggest drawback, and a potential giveaway of other "information" embedded in an image is file size. A small .bmp file turned into a 2mb file. If you "zipped" the file before e-mailing, it becomes suspicious... Who would e-mail a 2mb .bmp file of a flower pot??? Bill ----- Original Message ----- From: patedwards@w... To: TSCM-L@egroups.com Sent: Thursday, September 28, 2000 2:40 AM Subject: [TSCM-L] Steganography - Electronic Spycraft Steganography - Electronic Spycraft By using apparently harmless GIF, BMP, JPEG, or WAV files, steganography creates a formidable security threat with the hiding of pornography or the disguising of corporate espionage. Published September 20, 2000 By Ronald Mendell In the physical world, Steganography (literally "covered writing") involves invisible inks or messages in hidden places. Herodotus, the ancient Greek historian, relates how a messenger had his head shaved and then had a secret message written on his scalp. With newly grown hair, he traveled to the targeted destination where his head again shaved revealed the message. In the virtual world, the digital process inserts messages into graphic, sound, and even text files. By using apparently harmless GIF, BMP, JPEG, or WAV files, steganography creates a formidable security threat with the hiding of pornography or the disguising of corporate espionage. How does steganography work? Think of a graphic image as a host (the "container") composed of pixels (picture elements). Each pixel's color depends upon a numerical value ranging from 0 to 255. An 8-bit base two number represents that value to the computer; for example, the byte 00000000 equals "0." The rightmost bit becomes the least significant bit (LSB), because the seven bits to the LSB's left contain enough information to establish the correct pixel color. Swapping out the LSB's value has no effect on the pixel's appearance to the eye. So, a steganographic program inserts the message's bits into the LSB for each byte of the graphic image. Just visualize substituting one brown egg for a white egg in a white egg carton. At a distance a group of "substituted" white egg cartons will still have an overall white appearance. The same diluting principle works for sound and text files. According to Neil F. Johnson's article, "Steganography," a 640 X 480 image that utilizes 256 colors could hold a nearly 300 KB message or image. With a 24-bit image 1024 X 768 three bytes determine each pixel's value, so each pixel contains three bits of the message resulting in a 2 MB file. Steganographic images have large capacities in which to hide contraband images or illicit data. Hiding pornography is a leading use of steganography. In a May 26, 1997 U.S. News and World Report, the U.S. Customs Service indicated that child pornographers were employing steganographic techniques to mask their illegal traffic. Legal adult erotic web sites also encourage access to steganography. The site www.stego.com distributes open source code for steganography and has links to the sponsor's adult entertainment site and to the Steganos proprietary steganographic site. Steganos Security Suite offers double protection: steganographic and cryptographic protocols. A user first encodes a message or image with strong crypto and then hides it in a container. Even if the steganographic layer gets compromised, the crypto layer of protection remains. The technology has legitimate uses; for example, proprietary graphics or images can receive a digital watermark to establish ownership and to deter "image piracy" on the web. Yet, beyond assisting pornography, steganography allows industrial spies to hide information thefts. Neil F. Johnson suggests that a spy working within a company could bring in a favorite art or music selection and "mix" in a highly sensitive file containing proprietary data. The spy would then have the options of e-mailing this "container" or taking it out on a diskette. Or, more cleverly, the spy places the graphic on the company's web site. Constituting a covert channel, the graphic serves as a "spy drop" that is downloadable at will and difficult to detect on complex web sites. For the spy, however, any of the options pose little risk given conventional security measures. Security managers have several remedies to combat the abuses of steganography: 1. If a company can ban cameras and video equipment without a permit, the same goes for steganographic programs. No employee should be allowed to use these programs on company property without a specific permit. 2. Graphic, image, or sound files posted to the company's web site or sent, as e-mail attachments (from sensitive areas), need to be filled with trusted digital watermarks first. The watermarks will overwrite any previous messages. 3. Firewalls need filters to limit the importation of pornography into the company. Employees who generate an unusual amount of non-business related e-mail with frequent graphic attachments need scrutiny. Those that send an inordinate amount of 24-bit images also require close examination. 4. Prohibit the introduction of "outside" graphic, image, or sound files onto PCs that handle highly sensitive data. Ronald L. Mendell is a Certified Internet Security Specialist. Living in Austin, Texas, he works as a writer and researcher specializing in security and investigative issues. His most recent book, Investigating Computer Crime: A Primer for Security Managers, was published by Charles C. Thomas in 1998. SecurityPortal is the world's foremost on-line resource and services provider for companies and individuals concerned about protecting their information systems and networks. http://www.SecurityPortal.com The Focal Point for Security on the Net Announcements IntelÆ architecture is the ideal server technology for running an e-business. HAVE A GREAT DAY !!! ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 1600 From: Date: Thu Sep 28, 2000 1:36pm Subject: Re: Steganography - Electronic Spycraft Actually, an app called Steganos(for Winblows) and Steghide(for Linux/Unix) does not alter the file size. What is does is use unused blocks within the file(I beleive). However, there is a method(StegAnalysis I think it's called) to discover hidden data within files. There is a company that offers such services to Law Enforcement and Gov. Officials, however, I am unable to locate that bookmark at this time(too many I guess), if I find it I will forward it along to the list. All in all, Steganography is pretty slick for hiding info from average to moderate users, however, if it is really sensitive data and the right peaple want it...it's theirs....in my opinion that is. On Thu, 28 Sep 2000, D.M.I. wrote: > There was a shareware program similar to this on CNET.com about six months ago. I believe it was called "Camoflague". It only supported the.bmp format at the time. I recieved an e-mail from the company recently that stated they now supportd .jpeg as well. We messed around with it for a while, just because it was neat at the time. The biggest drawback, and a potential giveaway of other "information" embedded in an image is file size. A small .bmp file turned into a 2mb file. If you "zipped" the file before e-mailing, it becomes suspicious... Who would e-mail a 2mb .bmp file of a flower pot??? > > Bill > ----- Original Message ----- > From: patedwards@w... > To: TSCM-L@egroups.com > Sent: Thursday, September 28, 2000 2:40 AM > Subject: [TSCM-L] Steganography - Electronic Spycraft > > > > Steganography - Electronic Spycraft > > By using apparently harmless GIF, BMP, JPEG, or WAV files, steganography > creates a formidable security threat with the hiding of pornography or > the disguising of corporate espionage. > > Published September 20, 2000 > By Ronald Mendell > > In the physical world, Steganography (literally "covered writing") > involves invisible inks or messages in hidden places. Herodotus, the > ancient Greek historian, relates how a messenger had his head shaved and > then had a secret message written on his scalp. With newly grown hair, > he traveled to the targeted destination where his head again shaved > revealed the message. In the virtual world, the digital process inserts > messages into graphic, sound, and even text files. By using apparently > harmless GIF, BMP, JPEG, or WAV files, steganography creates a > formidable security threat with the hiding of pornography or the > disguising of corporate espionage. > > How does steganography work? > > Think of a graphic image as a host (the "container") composed of pixels > (picture elements). Each pixel's color depends upon a numerical value > ranging from 0 to 255. An 8-bit base two number represents that value to > the computer; for example, the byte 00000000 equals "0." The rightmost > bit becomes the least significant bit (LSB), because the seven bits to > the LSB's left contain enough information to establish the correct pixel > color. Swapping out the LSB's value has no effect on the pixel's > appearance to the eye. So, a steganographic program inserts the > message's bits into the LSB for each byte of the graphic image. Just > visualize substituting one brown egg for a white egg in a white egg > carton. At a distance a group of "substituted" white egg cartons will > still have an overall white appearance. The same diluting principle > works for sound and text files. > According to Neil F. Johnson's article, "Steganography," a 640 X 480 > image that utilizes 256 colors could hold a nearly 300 KB message or > image. With a 24-bit image 1024 X 768 three bytes determine each pixel's > value, so each pixel contains three bits of the message resulting in a 2 > MB file. Steganographic images have large capacities in which to hide > contraband images or illicit data. > Hiding pornography is a leading use of steganography. In a May 26, 1997 > U.S. News and World Report, the U.S. Customs Service indicated that > child pornographers were employing steganographic techniques to mask > their illegal traffic. Legal adult erotic web sites also encourage > access to steganography. The site www.stego.com distributes open source > code for steganography and has links to the sponsor's adult > entertainment site and to the Steganos proprietary steganographic site. > > Steganos Security Suite offers double protection: steganographic and > cryptographic protocols. A user first encodes a message or image with > strong crypto and then hides it in a container. Even if the > steganographic layer gets compromised, the crypto layer of protection > remains. > The technology has legitimate uses; for example, proprietary graphics or > images can receive a digital watermark to establish ownership and to > deter "image piracy" on the web. Yet, beyond assisting pornography, > steganography allows industrial spies to hide information thefts. Neil > F. Johnson suggests that a spy working within a company could bring in a > favorite art or music selection and "mix" in a highly sensitive file > containing proprietary data. The spy would then have the options of > e-mailing this "container" or taking it out on a diskette. Or, more > cleverly, the spy places the graphic on the company's web site. > Constituting a covert channel, the graphic serves as a "spy drop" that > is downloadable at will and difficult to detect on complex web sites. > For the spy, however, any of the options pose little risk given > conventional security measures. > > Security managers have several remedies to combat the abuses of > steganography: > > 1. If a company can ban cameras and video equipment without a permit, > the same goes for steganographic programs. No employee should be allowed > to use these programs on company property without a specific permit. > > 2. Graphic, image, or sound files posted to the company's web site or > sent, as e-mail attachments (from sensitive areas), need to be filled > with trusted digital watermarks first. The watermarks will overwrite any > previous messages. > > 3. Firewalls need filters to limit the importation of pornography into > the company. Employees who generate an unusual amount of non-business > related e-mail with frequent graphic attachments need scrutiny. Those > that send an inordinate amount of 24-bit images also require close > examination. > > 4. Prohibit the introduction of "outside" graphic, image, or sound files > onto PCs that handle highly sensitive data. > Ronald L. Mendell is a Certified Internet Security Specialist. Living in > Austin, Texas, he works as a writer and researcher specializing in > security and investigative issues. His most recent book, Investigating > Computer Crime: A Primer for Security Managers, was published by Charles > C. Thomas in 1998. > SecurityPortal is the world's foremost on-line resource and services > provider for companies and individuals concerned about protecting their > information systems and networks. > > http://www.SecurityPortal.com > The Focal Point for Security on the Net > > Announcements > IntelÆ architecture is the ideal server technology for running an > e-business. > > > > > > > HAVE A GREAT DAY !!! > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1601 From: James M. Atkinson, Comm-Eng Date: Fri Sep 29, 2000 2:28am Subject: Shayler suspects TV repair man of bugging his home Shayler suspects TV repair man of bugging his home http://www.independent.co.uk/news/UK/Politics/2000-09/shayler290900.shtml By Marie Woolf, Chief Political Correspondent 29 September 2000 The former MI5 officer David Shayler fears he has been electronically bugged by secret service agents and is being watched by them. Mr Shayler, who is facing trial for breaching the Official Secrets Act, suspects a man who came to repair his television planted an MI5 bug at his brother's home, where he has been staying since returning to England from Paris. "I believe the phone is tapped and the flat is bugged," he said yesterday. "I expect I am being watched." Mr Shayler said the repair man came to his brother's home shortly before he returned from Paris. "It was very strange," he said. "He was a television repair man but he did not know how to fix the television." The former intelligence officer went into hiding in Paris after going public with accusations three years ago that MI6 plotted to assassinate Colonel Gaddafi, the Libyan president. He said the "human cost" of his decision and the invasion of his personal privacy had been terrible. His partner, Annie Machon, also a former M15 officer, said: "We had to leave the country. We had to leave our friends and family. "We had to go on the run, our flat in London was smashed up unnecessarily. At first I think they hoped that we would just rot in exile." Mr Shayler said that if information was being acquired clandestinely by MI5, including tapes of conversations with his lawyers, it could affect the outcome of his case. His lawyers were likely to seek clarification from the Home Secretary about whether approval was given for his home to be bugged. The former spy, speaking yesterday at an unofficial Lab-our conference fringe meeting called David Shayler and Friends ñ Uncensored, said the title was inappropriate. "It is anything but uncensored," he said. "My words may be listened to by a special branch officer or by an agent in this audience." ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1602 From: Bob Washburne Date: Thu Sep 28, 2000 8:59pm Subject: Re: Steganography - Electronic Spycraft There is an application, stegfs, which allows you to hide a complete file system on the unused blocks of your hard drive or the LSB of a WAV file. Thus you could mount a WAV file and copy multiple files into it without changing its size. http://ban.joh.cam.ac.uk/~adm36/StegFS/ Another interesting feature is that it allows multiple independant layering so that having a password only reveals part of the hidden files. This allows for plausible deniability. The government, such as UK, can demand "THE" key. You supply "A" key and they find all the embarassing letters to your gay lover. But they don't see, and you can deny the existance of, the plans for the Uraniun Pew-38 Explosive Space Modulator. Now here is where TSCM and Computer Security meet - Just how can that company mentioned below prove the existance of information in the four leaste significant bits of a WAV file? First, the data itself is encrypted so as to look random. Second, it is broken up and substituted for the four LSB's in a WAV file. Aren't these bits mostly random number generators to begin with? Granted, if you were foolish enough to use a commercial song "ripped" off of a CD as the container then it would be trivial to show that the file had been modified. But if you used home recordings and only kept the encrypted version... So I ask the theorists out there, Is it impossible to hide the presence of encrypted data? Even if it was only the one LSB of a WAV file? Or is the company below selling snake oil? Bob Washburne - Who found God out beyond two sigma. logik@u... wrote: > > Actually, an app called Steganos(for Winblows) and Steghide(for > Linux/Unix) does not alter the file size. What is does is use unused > blocks within the file(I beleive). However, there is a > method(StegAnalysis I think it's called) to discover hidden data within > files. There is a company that offers such services to Law Enforcement > and Gov. Officials, however, I am unable to locate that bookmark at this > time(too many I guess), if I find it I will forward it along to the list. > All in all, Steganography is pretty slick for hiding info from average to > moderate users, however, if it is really sensitive data and the right > peaple want it...it's theirs....in my opinion that is. > 1603 From: Talisker Date: Fri Sep 29, 2000 10:28am Subject: Re: Shayler suspects TV repair man of bugging his home <2cents> If you notice it has been a few weeks since Mr Shayler had his last media fix. Call me cynical but I feel he is angling to set up his future as the media's "spy" expert. I saw a lovely term from a former website defacer who referred to himself as a media whore. Mr Shayler should produce the bug, which for a man of his calibre shouldn't be difficult. opinions? Andy http://www.networkintrusion.co.uk/ The IDS List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "James M. Atkinson, Comm-Eng" To: "TSCM-L Mailing List" Sent: Friday, September 29, 2000 8:28 AM Subject: [TSCM-L] Shayler suspects TV repair man of bugging his home Shayler suspects TV repair man of bugging his home http://www.independent.co.uk/news/UK/Politics/2000-09/shayler290900.shtml By Marie Woolf, Chief Political Correspondent 29 September 2000 The former MI5 officer David Shayler fears he has been electronically bugged by secret service agents and is being watched by them. Mr Shayler, who is facing trial for breaching the Official Secrets Act, suspects a man who came to repair his television planted an MI5 bug at his brother's home, where he has been staying since returning to England from Paris. "I believe the phone is tapped and the flat is bugged," he said yesterday. "I expect I am being watched." Mr Shayler said the repair man came to his brother's home shortly before he returned from Paris. "It was very strange," he said. "He was a television repair man but he did not know how to fix the television." The former intelligence officer went into hiding in Paris after going public with accusations three years ago that MI6 plotted to assassinate Colonel Gaddafi, the Libyan president. He said the "human cost" of his decision and the invasion of his personal privacy had been terrible. His partner, Annie Machon, also a former M15 officer, said: "We had to leave the country. We had to leave our friends and family. "We had to go on the run, our flat in London was smashed up unnecessarily. At first I think they hoped that we would just rot in exile." Mr Shayler said that if information was being acquired clandestinely by MI5, including tapes of conversations with his lawyers, it could affect the outcome of his case. His lawyers were likely to seek clarification from the Home Secretary about whether approval was given for his home to be bugged. The former spy, speaking yesterday at an unofficial Lab-our conference fringe meeting called David Shayler and Friends - Uncensored, said the title was inappropriate. "It is anything but uncensored," he said. "My words may be listened to by a special branch officer or by an agent in this audience." ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1604 From: Date: Fri Sep 29, 2000 0:13pm Subject: Re: Vehicle Considerations Jim, Iv'e heard so much about this vehicle. It sounds great. Could you provide a picture of the inside for us on the list to see? If not, off line? Thanks, John 1605 From: James M. Atkinson, Comm-Eng Date: Fri Sep 29, 2000 9:21pm Subject: Re: Shayler suspects TV repair man of bugging his home At 4:28 PM +0100 9/29/00, Talisker wrote: ><2cents> >If you notice it has been a few weeks since Mr Shayler had his last media >fix. Call me cynical but I feel he is angling to set up his future as the >media's "spy" expert. I saw a lovely term from a former website defacer who >referred to himself as a media whore. >Mr Shayler should produce the bug, which for a man of his calibre shouldn't >be difficult. > > >opinions? > >Andy >http://www.networkintrusion.co.uk/ The IDS List Personally I found Shayler not to be "articulating a credible threat", and that he is in fact going on a paranoid rant. His behaviors and claims border on needing professional psychiatric help. If indeed someone has bugged him then a competent TSCM specialist would have no problem finding the bug though scientific means. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1606 From: James M. Atkinson, Comm-Eng Date: Fri Sep 29, 2000 9:26pm Subject: Re: Vehicle Considerations At 5:13 PM -0400 9/29/00, misog@a... wrote: >Jim, > >Iv'e heard so much about this vehicle. It sounds great. Could you provide a >picture of the inside for us on the list to see? If not, off line? > >Thanks, >John [blink] [blink] Vehicle? What Vehicle... nobody here knows anything about a vehicle ;-) -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1607 From: James M. Atkinson, Comm-Eng Date: Sat Sep 30, 2000 0:48pm Subject: The Top 40 Things You Will Never, Ever, Hear a Southerner Say [Humour] The top 40 things you will never, ever, hear a Southerner say, no matter how much they had to drink or no matter how far from the South they are: 40: Oh I just couldn't, hell, she's only sixteen. 39: I'll take Shakespeare for 1000, Alex. 38: Duct tape won't fix that. 37: Honey, I think we should sell the pickup and buy a family sedan. 36: Come to think of it, I'll have a Heineken. 35: We don't keep firearms in this house. 34: Has anybody seen the sideburns trimmer? 33: You can't feed that to the dog. 32: I thought Graceland was tacky. 31: No kids in the back of the pickup, it's just not safe. 30: Wrestling's fake. 29: Honey, did you mail that donation to Greenpeace? 28: We're Vegetarians. 27: Do you think my gut is too big? 26: I'll have grapefruit and grapes instead of biscuits and gravy. 25: Honey, we don't need another dog. 24: Who gives a crap who won the Civil War? 23: Give me the small bag of pork rinds, please. 22: Too many deer heads detract from the decor. 21: Spittin is such a nasty habit. 20: I just couldn't find a thing at Walmart today. 19: Trim the fat off the steak. 18: Cappuccino tastes better than expresso. 17: The tires on that truck are too big. 16: I'll have the arugula and radicchio salad. 15: I've got it all on the C: drive. 14: Unsweetened tea tastes better. 13: Would you like your fish poached or broiled? 12: My fiancee, Bobbie Jo, is registered at Tiffany's. 11: I've got two cases of Zima for the Super Bowl. 10: Little Debbie snack cakes have too many grams of fat. 09: Checkmate. 08: She's too young to be wearing a bikini. 07: Does the salad bar have bean sprouts. 06: Hey, here's an episode of "Hee Haw" that we haven't seen. 05: I don't have a favorite college team. 04: Be sure to bring my salad dressing on the side. 03: You All. 02: Those shorts ought to be a little longer, darlin'. AND THE #1 STATEMENT YOU WILL NEVER HEAR FROM A SOUTHERNER: 01: Nope, no more for me. I'm drivin tonight. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1608 From: James M. Atkinson, Comm-Eng Date: Sat Sep 30, 2000 0:50pm Subject: Government Bureaucracy [Humor] This little tidbit contains all you really need to know about government and bureaucracy. Pythagorean theorem: 24 words. The Lord's Prayer: 66 words. Archimedes' Principle: 67 words. The 10 Commandments: 179 words. The Gettysburg address: 286 words. The Declaration of Independence: 1,300 words. The US Government regulations on the sale of cabbage: 26,911 words. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1609 From: James M. Atkinson, Comm-Eng Date: Sat Sep 30, 2000 0:52pm Subject: Another Blonde Joke Blonde walks into a bank in New York City and asks for the loan officer. She says she's going to Europe on business for two weeks and needs to borrow $5,000. The bank officer says the bank will need some kind of security for such a loan, so the Blonde hands over the keys to a new Rolls Royce parked on the street in front of the bank. Everything checks out, and the bank agrees to accept the car as collateral for the loan. An employee drives the Rolls into the bank's underground garage and parks it there. Two weeks later, the Blonde returns, repays the $5,000 and the interest, which comes to $15.41. The loan officer says, "We are very happy to have had your business, and this transaction has worked out very nicely, but we are a little puzzled. While you were away, we checked you out and found that you are a multimillionaire. What puzzles us is why would you bother to borrow $5,000?" The Blonde replied, "Where else in New York can I park my car for two weeks for 15 bucks?" Finally a "Smart Blonde" joke! ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1610 From: James M. Atkinson, Comm-Eng Date: Sat Sep 30, 2000 0:54pm Subject: Amish Elevator [Humor] An Amish boy and his father were visiting a mall. They were amazed by almost everything they saw, but especially by two shiny, silver walls that could move apart and then slide back together again. The boy asked, "What is this, Father?" The father (never having seen an elevator) responded, "Son, I have never seen anything like this in my life, I don't know what it is." While the boy and his father were watching with amazement, a fat old lady in a wheel chair rolled up to the moving walls and pressed a button. The walls opened and the lady rolled between them into a small room. The walls closed and the boy and his father watched the small circular numbers above the walls light up sequentially. They continued to watch until it reached the last number and then the numbers began to light in the reverse order. Finally the walls opened up again and a gorgeous, voluptuous 20 year old blonde woman stepped out. The father, not taking his eyes off the young woman, said quietly to his son ... "Go get your mother." ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1611 From: Steve Uhrig Date: Sat Sep 30, 2000 5:23pm Subject: CIA on History Channel Hello list, The following was stolen from the AFIO (Association of Former Intelligence Officers) mailing list. May be of interest to people here. Credit to AFIO Weekly Intelligence News (WIN), and the persons named within. ---------------------------- NOT TO MISS - HISTORY CHANNEL PROGRAM ON CIA: Peter Earnest, AFIO's past President and now Vice-Chairman, served as consultant to this forthcoming History Channel series "Top Secret Missions of the CIA" which will begin airing the evening of October 2nd (this coming Monday). He also was interviewed on a number of the cases being featured. Brief summaries and times (given here as Eastern Standard) is as follows: All four hours will repeat in a block on Sunday 10/8 starting at 3 PM and going till 7 PM. For full details, see www.historychannel.com and look for "ontv" listings. [Submitted by Mike Absher, Peter Earnest and John Joseph] Top Secret Missions of the CIA Monday , October 02 9:00 PM-10:00 PM A Traitor Within/The Berlin Tunnel Based on new research and unparalleled access to CIA files, we present intriguing stories about little-known missions of the nation's most secretive organization. First, we see how the CIA caught a spy within its Counterintelligence Division, as one by one, Soviet agents spying for the U.S. were disappearing in 1985. How do you uncover a mole in your own ranks when anyone could be suspect? Then, we examine "Operation Gold", a bold plan to tunnel under the Berlin Wall where phone lines could be tapped. -------------------------- Top Secret Missions of the CIA Tuesday , October 03 1:00 AM-2:00 PM A Traitor Within/The Berlin Tunnel [See entry above] Top Secret Missions of the CIA Tuesday , October 03 9:00 PM- 10:00 PM Double Jeopardy/Witness to the Killing Fields Vienna 1953: Vying with Russia for control of postwar Europe, the U.S. is in dire need of intelligence--until Lt. Col. Pyotr Popov offers his services by dropping a letter into a diplomat's car. In 1959, the KGB caught Popov, forcing him to send false information. Before his 1960 execution, he bravely signaled the CIA alerting them to the situation. Then, meet CIA officer Chip Beck who refused to evacuate from Cambodia in 1975--until he rescued over 200 people from genocide at the Killing Fields. ------------------------- Top Secret Missions of the CIA Wednesday, October 04 1:00 AM-2:00 AM Double Jeopardy/Witness to the Killing Fields [Described in entry above] --------------------------- Top Secret Missions of the CIA Wednesday, October 04 9:00 PM-10:00 PM Spy Who Saved the World/Dictator's Daughter Oleg Penkovsky, a disillusioned colonel with Soviet military intelligence (GRU), volunteered his services to the CIA and photographed secret documents--information so crucial that it became the trump card in a deadly game of nuclear politics when President Kennedy revealed the existence of Soviet missiles in Cuba in 1962. Then, CIA officer Robert Rayle is instructed to sneak Stalin's only daughter, Svetlana Aliluyeva, out of Soviet-friendly India, where she had sought asylum at the U.S. Embassy. ---------------------------- Top Secret Missions of the CIA Thursday , October 05 1:00 AM-2:00 AM Spy Who Saved the World/Dictator's Daughter [Described in entry above] ---------------------------- Top Secret Missions of the CIA Thursday , October 05 9:00 PM-10:00 PM Trigon/Urgent Fury When the CIA learned that Soviet foreign diplomat Alexsandr Dmitrevich Ogorodnik's Colombian mistress was pregnant, they offered him a secure future with her if he would spy for the U.S. Code-named Trigon, Alexsandr teamed up with a female CIA officer in Moscow and became the agency's most valuable spy. Then, after the bloody military coup in Communist-controlled Grenada, the CIA sent in case officer Linda Flohr to be the Oval Office's "eyes and ears" and report on U.S. medical students trapped there. -------------------------- Top Secret Missions of the CIA Friday , October 06 1:00 AM-2:00 AM Trigon/Urgent Fury [Described in entry above] ---------------------------- Top Secret Missions of the CIA Sunday , October 08 3:00 PM-4:00 PM A Traitor Within/The Berlin Tunnel Based on new research and unparalleled access to CIA files, we present intriguing stories about little-known missions of the nation's most secretive organization. First, we see how the CIA caught a spy within its Counterintelligence Division, as one by one, Soviet agents spying for the U.S. were disappearing in 1985. How do you uncover a mole in your own ranks when anyone could be suspect? Then, we examine "Operation Gold", a bold plan to tunnel under the Berlin Wall where phone lines could be tapped. -------------------------- Top Secret Missions of the CIA Sunday , October 08 4:00 PM-5:00 PM Double Jeopardy/Witness to the Killing Fields Vienna 1953: Vying with Russia for control of postwar Europe, the U.S. is in dire need of intelligence--until Lt. Col. Pyotr Popov offers his services by dropping a letter into a diplomat's car. In 1959, the KGB caught Popov, forcing him to send false information. Before his 1960 execution, he bravely signaled the CIA alerting them to the situation. Then, meet CIA officer Chip Beck who refused to evacuate from Cambodia in 1975--until he rescued over 200 people from genocide at the Killing Fields. --------------------------- Top Secret Missions of the CIA Sunday , October 08 5:00 PM-6:00 PM Spy Who Saved the World/Dictator's Daughter Oleg Penkovsky, a disillusioned colonel with Soviet military intelligence (GRU), volunteered his services to the CIA and photographed secret documents--information so crucial that it became the trump card in a deadly game of nuclear politics when President Kennedy revealed the existence of Soviet missiles in Cuba in 1962. Then, CIA officer Robert Rayle is instructed to sneak Stalin's only daughter, Svetlana Aliluyeva, out of Soviet-friendly India, where she had sought asylum at the U.S. Embassy. ------------------------------ Top Secret Missions of the CIA Sunday , October 08 6:00 PM-7:00 PM Trigon/Urgent Fury When the CIA learned that Soviet foreign diplomat Alexsandr Dmitrevich Ogorodnik's Colombian mistress was pregnant, they offered him a secure future with her if he would spy for the U.S. Code-named Trigon, Alexsandr teamed up with a female CIA officer in Moscow and became the agency's most valuable spy. Then, after the bloody military coup in Communist-controlled Grenada, the CIA sent in case officer Linda Flohr to be the Oval Office's "eyes and ears" and report on U.S. medical students trapped there. -------------------------- Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1612 From: Steve Uhrig Date: Sat Sep 30, 2000 7:23pm Subject: Complete RF TSCM kit FS Hello list dudes and dudettes, I have for sale some decent RF sweep gear. I will give this group a week's advance notice before posting this equipment to my used equipment list. The key piece is an Avcom PSA-65B (spectrum analyzer) upgraded to 65C specs by Marty Kaiser. Unit has the following factory options: +FM demodulator +10 kc bandwidth resolution filter +AM demodulator +RFP-24 preamp (the better one) +Downconverter to extend upper range to 2.5 gigs +DC power cord +Telescoping whip antenna, 90 degrees, with BNC. +Padded carrying case with pouch +Plastic lid which protects front panel while shipping +All AVCOM manuals In addition, this unit has a number of Marty Kaiser mods to improve its effectiveness in TSCM and to allow use of certain TSCM-specific accessories: +Subcarrier detection mod +Video transmission recovery mod +Front panel aux jack for these accessories and interfacing others. Provides +12VDC for accessories so you don't have to use separate power supplies. Nice when in the field. This piece is in superb condition and probably unused when it came to me. I ran it only long enough to check all functions and verify operation against my IFR. This kit also includes some Kaiser accessories intended to work with the modified Avcom: +SCD-5 subcarrier receiver. This can be used standalone. Tunable to let you listen to any subcarriers riding on a primary signal. Not possible to listen without this, although you can see the subcarrier. Same unit is used to read subcarriers on power or telco lines. Can use with other receivers. +Kaiser matrix switch. Lets you switch between SCD-5 and headphones without having to plug and unplug jacks. Use when switching from carrier to subcarrier mode. +VLF converter to let you tune from 10kc to 500 kc. You monitor, tune and view through the Avcom. Use for RF or power line subcarrier. +Miniature TV about the size of a cigar box, used as a video monitor for the video demodulator. Very nice little unit tunes VHF and UHF broadcast channels as well as AM and FM broadcast. Can be a sound source also while sweeping. +Kaiser RAS 515 Raster Analysis Display box. Connects to any oscilloscope having a Z axis input and lets you monitor any form of video transmission. Also monitors "radiation from computers". All parameters are tunable making this an extremely versatile unit. If there is anything usable for sniffing stuff radiating from computer screens, this is it. This is a *very* rare unit. Packed in a separate small Pelican case. As a side observation, if anything would be capable of intercepting radiation from computers or video screens along the lines of what Tempest tries to prevent, this is the piece. All the above is in superb condition and will be sold as a lot. If you need a complete RF kit, here it is. Good kit for a beginner and one you would not outgrow for a long time, if ever. Also a good backup set or one to leave in a particular country where you sweep a lot so you don't have to deal with the expense and hassles of carrying equipment all over the world. Fairly priced for what this is, and it is all assembled and integrated in one place. You don't have to run all over, buy a bunch of boxes and make them all work together and find the right cables and adapters. It's all here, and all done by a professional (Marty Kaiser). And no long delivery times. Can ship this package overnight if an emergency. The current cost of all this according to the respective catalogs, is $9300. I will let this set go for $7500 plus freight. Can deliver to BECCA week after next or ship anywhere including internationally. Can take credit cards for payment. Anyone wanting to get into sweeping would be very well equipped with this package. This is a nicer kit than many professional sweepers use. See the above at the following websites: http://www.avcomofva.com http://www.martykaiser.com See my used equipment page for more TSCM, surveillance, commo and electronic gear: http://www.swssec.com/used.html Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1613 From: James M. Atkinson, Comm-Eng Date: Sat Sep 30, 2000 10:01pm Subject: At labs, tighter security poses security threat At labs, tighter security poses security threat http://www.christiansciencemonitor.com/durable/2000/09/26/fp2s2-csm.shtml A new report says threat of prosecution makes Los Alamos scientists afraid to admit even minor security breaches. By Francine Kiefer Staff writer of The Christian Science Monitor WASHINGTON For months, America's nuclear-weapons scientists have fretted that a vise-grip crackdown on security is impeding their ability to work and turning their labs and offices into a police zone. Now, in what might be a morale boost for the scientists, voices from outside the cloistered world of nuclear-weapons labs are giving credence to these complaints. Two former congressmen, sizing up the current situation at the beleaguered Los Alamos National Weapons Laboratory in New Mexico, have concluded that tightened security ñ and especially the threat of criminal prosecution for minor lapses ñ pose a greater risk to national security than does the possible loss of nuclear secrets themselves. Their report, prepared at the request of the US Department of Energy (DOE) and released yesterday, says fear of criminal prosecution is creating a climate in which scientists are afraid to admit to even minor security infractions and therefore refuse to cooperate with investigators. "Once issues of management oversight give way to criminal investigation, and lab employees fear that committing a security error may expose them not just to management discipline but to prosecution and imprisonment, any hope that individuals will volunteer information that could reflect security lapses is annihilated," says the report by former Sen. Howard Baker (R) of Tennessee and Rep. Lee Hamilton (D) of Indiana. The report may have the indirect effect of forcing the DOE to consider whether recent concerns about US nuclear security have been overwrought. The DOE dispatched the bipartisan duo to Los Alamos ñ birthplace of the atomic bomb ñ after two computer hard drives containing sensitive information were lost last spring and then, mysteriously, found 16 days later at the lab. Jim Danneskiold, a lab spokesman, says the BakerñHamilton report reflects what employees have been saying: "If you believe that by reporting a security violation you're subject to a criminal investigation, then you'll think twice about reporting." Uppermost in the minds of Los Alamos scientists is the example of former colleague Wen Ho Lee. Charged with 59 counts of mishandling nuclear secrets and held in solitary confinement for nine months, Mr. Lee this month went free after pleading guilty to just one felony count. While Lee admitted downloading nuclear data from the lab's secure computer system onto portable tapes, several of the tapes are still missing, and the FBI is trying to determine their whereabouts. Meanwhile, the Justice Department and the FBI have launched internal probes to see if officials acted improperly in a case that so suddenly imploded. Certainly that's the implication of the US district judge who handled Lee's case. He said federal authorities had "embarrassed the nation" by pushing for Lee's detention, then agreeing to a plea bargain that released him. At the lab, a security crackdown has hurt morale among scientists and is making it more difficult to recruit top nuclear physicists and computer scientists. Although the lab has not seen a dropoff in the overall quantity or quality of applicants, it has seen "two disturbing" trends, says Danneskiold. One is that the number Asians or Asian-Americans who accept "cream of the crop" positions has virtually dried up. Another is that the lab is seeing an increase in the number of overall people turning down slots. The recruiting problem coincides with "a real exodus" from the lab's main computer-science group, because of more lucrative offers in the private sector. The BakerñHamilton report says the hard-drive incident has had "a highly negative effect on the ability of [Los Alamos] and the other national laboratories to continue to do their work, while attracting and maintaining the ... personnel who are the lifeblood of the cutting-edge work...." One scientist quoted in the report urged security officials to ramp down a few notches. "Offer an amnesty, with a reasonable [administrative] punishment, if you want the truth about the hard drives." ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1614 From: James M. Atkinson, Comm-Eng Date: Sat Sep 30, 2000 10:00pm Subject: LAB SUPERVISORS FACE SANCTIONS LAB SUPERVISORS FACE SANCTIONS LOS ALAMOS AGAIN AT CENTER OF PROBE http://www.chicagotribune.com/news/printedition/article/0,2669,SAV-000 9300088,FF.html Associated Press September 30, 2000 ALBUQUERQUE -- Three review panels have recommended punishment for several Los Alamos National Laboratory employees following the disappearance and reappearance of hard drives containing nuclear secrets, officials said Friday. "The type of severity or magnitude [of the punishment] has not been determined yet," laboratory spokesman James Rickman said after the panels of lab officials and nuclear experts made the recommendation. Lab workers in May noticed that two hard drives containing information on terrorist and nuclear emergencies had disappeared. Supervisors were not told about it for weeks, and the drives reappeared behind a photocopier in June. FBI investigators have been unable to find the culprit. A spokesman for the University of California, which manages the laboratory, said several lab managers and supervisors faced punishment but declined to identify them. Los Alamos Director John Browne said federal law prevented the laboratory from revealing their identity or the nature of the possible punishment. "I am satisfied this review is thorough, fair and objective, and I support its findings," Browne said in a news release. "These actions will help us strengthen our security practices and allow us to refocus on our important work for the nation." But The New York Times, in a report on Friday citing unidentified lab officials, named three employees who could be disciplined: Browne, scientist Bradley Clark and nuclear weapons program director Stephen Younger. The officials said Clark could be fired and other scientists reprimanded for the security breach. Messages left by The Associated Press seeking comment from Younger and Clark were not immediately returned. University of California spokesman Jeff Garberson would neither confirm nor deny the Times report. The announcement was the latest in a string of troubles involving security breaches at the lab. Last year, Los Alamos fired scientist Wen Ho Lee, who was later indicted on 59 federal felonies for improperly transferring nuclear secrets to portable computer tapes. Lee pleaded guilty to one count earlier this month and was set free; the judge in the case apologized to Lee and blamed "top decision-makers in the executive branch" for his detention. The case against Lee stemmed from an investigation of possible Chinese espionage at Los Alamos, but Lee denied spying and was never charged with espionage. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1615 From: James M. Atkinson, Comm-Eng Date: Sat Sep 30, 2000 10:08pm Subject: Interesting Videotapes Available From Defense Security Service INTERESTING VIDEOTAPES AVAILABLE FROM THE DEFENSE SECURITY SERVICE by Michael Ravnitzky , mikerav@i... There are a number of videotapes available from the Defense Security Service Library through their FOIA Office. Most of these were produced by the Institute. THIS IS ONLY A VERY SMALL SAMPLING OF THE FILMS, as you can see from the accession numbers. If you want a complete list of the roughly 520 videotapes in their collection, you can write to the Defense Security Service at: Defense Security Service Les Blake Chief, Office of FOIA and Privacy, GCF 1340 Braddock Place Alexandria, VA 22314-1651 telephone number: 703-325-9450 fax number: 703-325-5341 DoDPI stands for the Department of Defense Polygraph Institute. FOIA Requests to DoDPI are processed at the Defense Security Service at the address shown above. VT 034 The American Chemical Soldier, 1987, DoDPI VT 068 Refresher Course, 1989, part 3, DoDPI VT 069 Refresher Course, 1989, part 2, DoDPI VT 070 Refresher Course, 1989, part 1, DoDPI VT 086 Satanic Rituals, DoDPI VT 099 Colloquim: Detection and Deception in Psychopathic Criminals, DoDPI VT 120 Use of the Polygraph in Courts-Martial, 1988, Maxwell AFB, AUTV VT 129 Child Sexual Abuse Seminar Number 1, DoDPI VT 150 Polygraph Oversight Committee Meeting, 1990, DoDPI VT 156 Espionage and Counterintelligence, 1991, DoDPI VT 165 The Use of the Polygraph in Criminal Investigation, 1992 DoDPI VT 225 Child Sexual Abuse Course: Inmate Panel, 1990, DoDPI VT 226 Child Sexual Abuse Course: Inmate Panel, 1991, DoDPI VT 228 GKT as a Scientific Technique, 1991, DoDPI VT 231 OPSEC & Counternarcotics: Who's Watching Who, Interagency OPSEC Support Staff VT 232 Guilty Knowledge Technique Study, 1992, DoDPI VT 285 Protecting Critical Defense Information, DoD VT 288 Aspects of Psychology of Abnormal Behavior, DoDPI, 1994 VT 291 Post Test Interrogation in Child Sex Abuse Cases, 1989, DoDPI VT 293, PDD Basic Periodic Disclosure Sex Offender Testing, DoDPI VT 294 Reported Rape Victim Testing, 1994, DoDPI VT 298 Child Sexual Abuse, 1989, DoDPI VT 307 Use of the Polygraph in Israel, 1994, DoDPI VT 321 Polygraph exam of Sexual Assault Suspect, DoDPI VT 345 Interrogation, Parts 1 and 2, 1978, DoDPI VT 346 Interrogation, Parts 3 and 4, 1978, DoDPI VT 357 P-3 Brain Wave, DoDPI VT 362 Non-verbals and Countermeasures, 1995, DoDPI VT 367 Seminar on Sex Offenders, 1991, DoDPI VT 370 America at Risk, US Army Intelligence and Security Command VT 372 Voice Stress Analyzer Demonstration, 1992, DoDPI VT 377 A Brief Interview of Seven Polygraph/Physiological Measuring Devices, DoDPI VT 378 Goals and Objectives of DoDPI, 1990, DoDPI VT 385 ...Cheating Incident at DoDPI, 1990, DoDPI VT 435 Our Time Has Come: the Polygraph Video, 1995 VT 496 Sex Offenders, DoDPI VT 498 Psycholinquistics, Part 1, 1997, DoDPI VT 499 Psycholinquistics, Part 1?, 1997, DoDPI ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1616 From: Steve Uhrig Date: Sun Oct 1, 2000 10:13am Subject: Nonlinear Junction Detector FS For sale is an ISA-1 Nonlinear Junction Detector, with all accessories and fitted hard case. Unit has been gone over completely by me, several minor repairs made, aligned for max output and the aluminum threads in antenna where pole and universal attaches have had a steel helicoil insert for maximum strength. Power levels may not necessarily be FCC legal in the U.S. as I tuned for max, not for a crippled legal level. Receiver also is very sensitive and the thing hears my signal generator at about 13 dBm into a paperclip from an adjacent room about 30 feet away, when polarization matches. Unit has a good fresh rechargeable battery, and uses a standard $22 gelcell, not some exotic battery pack available only from the U.K. for 150 pounds. Complete with instruction and theory manual. ISA is a premier manufacturer of high end countersurveillance equipment. They are still in business and will service their products, although this one should not need anything for a good long while. This unit is circa 1988. Construction is top quality, all welded heavy gauge metal, not plastic or sheet metal. The duplexers are reinforced for stability and will not detune during shipping like another well known brand of NLJ. Cables use standard TNC connectors, easy to find if you ever want to make a set of different length cables. Tessco or RF Connection can make a replacement set of cables for about 1/4 the price ISA charges, and they will be as good and probably better quality. Unit shows no measureable harmonics on the fundamental frequency. Any harmonics around are being generated in the target, not this thing. Adjustable sensitivity helps reduce false alarms and speed operation in high background alarm areas like metal studs. Antenna can be rotated 90 degrees for sweeping in both antenna polarizations. No plastic in this thing. Made to last. All cavities and internal microwave connectors are gold plated. Includes control unit, remote meter indicator, headphone output, high sensitivity headphones, antenna, universal joint, rugged metal extendable pole of adjustable length, shoulder strap for control unit, internal gelcell, charger, coax and remote meter cables, extendable metal tapper for thumping suspect joints, instruction manual, battery test function on meter, LED power and battery charge indicator, and fitted hard carrying case with combination lock. The NLJD will detect electronic surveillance items, tape recorders, most microphones (electret w/ preamp), video cameras and video transmiters, transmitters, receivers, repeaters, anything electronic containing semiconductors (diodes, transistors or integrated circuits). It will detect them whether they are working or not, whether they even have batteries in them or not. Detection distances depend on several factors, but ranges from 6 inches to maybe12 inches. This device can detect a bug buried in solid concrete, although that is unlikely to happen in real life. It will detect devices on the other side of a wall, so don't freak when you get a hit until you inspect the adjoining areas. It merely may be detecting a clock on the opposite side of the wall. This can be an extremely effective tool in capable hands. Until fairly recently, nonlinear junction detectors were restricted to government use and were classified. Now they are available for nongovernment use, at new prices starting at about $15,000 and going to nearly twice that for rugged commercial units. There are two ways to find a bug whose battery has run down: physical inspection and nonlinear junction detection. You can save a tremendous amount of time over a physical search with competent use of this unit. Plus, you don't have to disturb the area as much, which is a factor when you are in an executive office. A piece like this can separate the men from the boys. See Jim's webpage: http://tscm.com/tmdenljd.html for a good workup on nonlinear junction detectors aka NLJ. Your price only $5500 plus freight. This is about 25% of original cost. Can take credit cards for payment. Call today and you can have it tomorrow. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1617 From: Steve Whitehead Date: Sun Oct 1, 2000 2:40pm Subject: Demo & Used Equipment Demo & Used Equipment Boomerang NJD-5 Non-Linear Junction Detector with all accessories and shipping case. The unit was purchased during August 1998 from Information Security Associates (ISA) and went back to them for a full service during April 2000. The NLJD was mostly used as a demonstration unit, is in an excellent condition with all the accessories and hard shipping case. The NJD-5 is a high powered unit with a 500 mW transmitter for a greater detection range. The unit does have a multi step attenuator to allow user control to lower the transmitter output. The unit can be viewed on our web site http://www.tscm.co.za (Equipment, Non-Linear Junction Detectors). The new list price is US $ 23000. Our price including shipping costs is US $ 11500. Also available is a Winkelmann 200 Telephone Line Analyser. I do not know if the unit is known in the US but it was quite popular in Europe in the 80's and early 90's. The unit is a 1991 model and still in an excellent condition with all the original accessories and hard case. The Winkelmann 200 has an on board computer and printer to allow hard copy documentation of all the examinations conducted. The operating principle is based upon the relationship between voltage, line current, exchange and line resistance. The entire analysis is microprocessor controlled. The unit can test up to 25 lines simultaneously. A minimum of 5 lines are required for a valid test result. The unit can only test voltage drop lines, thus it is limited in modern day applications. Would probably be of more use to someone, collecting older TSCM equipment, TSCM school, etc. The unit is in working order and we will consider any serious offers. Available for sale is an Audiotel Scanlock ECM Receiver with all the accessories and hard flight case which we accepted as a trade-in. The unit was purchased in 1992 by the original owner and is in working condition. The exterior of the unit has a number of chip marks. We replaced the 10+ MHz antenna with a new 10+ MHz Antenna from Audiotel. The previous owner never had the unit calibrated. It might need calibration. We however tested it on known frequencies and it is working fine. The Scanlock is an excellent unit for low RF audio threats and popular amongst in house security groups. Any serious offers will be considered. Best Regards Steve Whitehead Managing Member TSCM Services cc P O Box 16063, Lyttelton, 0140, Centurion, South Africa Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) E-mail sceptre@m... URL http://www.tscm.co.za __________________________________________________________________________________________________________________________ Member : South African Institute of Security (SAIS), Security Association of South Africa (SASA) [Non-text portions of this message have been removed] 1618 From: Screaming Date: Sun Oct 1, 2000 4:45pm Subject: RE: Government Bureaucracy [Humor] Ha Ha Ha thanks jc 1619 From: Screaming Date: Sun Oct 1, 2000 4:50pm Subject: RE: Nonlinear Junction Detector FS WOW Steve Now that is what I call a comprehensive advertisement guys. jc 1620 From: Jay Coote, W6CJ Date: Sun Oct 1, 2000 10:17pm Subject: Magic Wands and Fairy Dust? I came across this website - www.shopseatech.com/spyfinder.html - and the gadget offered for sale appears to be a 5 milliwatt 635 nM laser which the vendor says will detect all types of hidden video cameras. It is supposed to work on optical principles, so no electronic jamming or EM shielding will prevent this device from detecting the camera. A little levity for the TSCM list. Jay 1621 From: Steve Uhrig Date: Sun Oct 1, 2000 10:20pm Subject: Re: Magic Wands and Fairy Dust? Once upon a midnight dreary, Jay Coote, W6CJ pondered, weak and weary: > I came across this website - www.shopseatech.com/spyfinder.html - > and the gadget offered for sale appears to be a 5 milliwatt 635 > nM laser which the vendor says will detect all types of hidden > video cameras. It is supposed to work on optical principles, so > no electronic jamming or EM shielding will prevent this device > from detecting the camera. It is for real. Gordon Mitchell reviewed it in another written publication last month. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: J. Coote Date: Mon Sep 27, 2004 8:49pm Subject: RE: Re: Antennas for Spectrum Analyzer? Thanks- I've used resonant commercial antennas on RF sniffers, they act as a band pass filter sometimes. Good on some receivers if you are plagued by pagers-intermods from out of band. I've used step attenuators in my receivers. Think I'll stick with resonant or unity antennas on my 492 analyzer as these need help in the sensitivity department. Use a 1-12 Ghz horn and they have good directive properties from 800 Mhz up. Jay -----Original Message----- From: satcommunitfive [mailto:satcommunitfive@y...] Sent: Sunday, September 26, 2004 7:33 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Antennas for Spectrum Analyzer? Buy a loaded whip antenna for the freq you require -the kind that VHF walkie-talkies /2ways use. [very small and deaf] For UHF+ [400 to 3Ghz ]I use mini discones [I make em ! ] then switch to a LOG. or small whip I think most of the comercial equipment looks the part -looks sexy -costs heaps but does not come close to properly designed antennas I also use 3-10DB attenuators on my equip to get rid of the noise floor [sort of] this works well on optoelectronics gear etc. ps ICOM sell a wideband antenna that is quite good FA-B01RE only 16cm long and works OK at VHF M ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9774 From: J. Coote Date: Mon Sep 27, 2004 8:39pm Subject: RE: Re: Antennas for Spectrum Analyzer? I'll take a look... QRP/P, TSCN, yah! Jay -----Original Message----- From: kc0uu [mailto:jmccain@d...] Sent: Monday, September 27, 2004 11:05 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Antennas for Spectrum Analyzer? Jay, Try this site... http://www.buddipole.com/budac.html . They hav a nice whip... description: stainless steel (not aluminum!) telescopic whips that extend to 66" and collapse to just 13". The base is standard 3/8-24 threaded brass which is reinforced for durability. Copper sleeves are used between tubes for conductivity. Price is for one whip. I've used their components in ham radio projects and they are all of high quality. While you are there, look at the " Buddipole " portable (man-transportable) HF antenna. I've used the home-made version of that from hotel rooms all over the country with a qrp station. Cheers, JohnM --- In TSCM-L@yahoogroups.com, "J. Coote" wrote: > I am looking for a long, telescoping whip antenna (preferably with a spring > and 90-deg swivel) ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9775 From: dj Date: Mon Sep 27, 2004 11:01pm Subject: ASIS conference I am here in Dallas Texas at the ASIS conference. I just got done looking at the beta stuff for the new OSCOR. Anyone have the new specs on this? IT2 --------------------------------- Do you Yahoo!? Yahoo! Mail is new and improved - Check it out! [Non-text portions of this message have been removed] 9776 From: Steven Donnell WA1YKL Date: Tue Sep 28, 2004 8:57am Subject: Re: Re: Receiver Spurs satcommunitfive wrote: > I would like to put in in a sheilded box Hi, One way of getting around the poor shielding seen in many receivers is w/ cute device that some Hams are using more and more for "foxhunting" is a thing called an "offset attenuator". What this consists of is an oscillator(.5 - 20 MHz, depending on the design) thats fed into a simple mixer(diode). This allows the rec to pickup signals on freqs that are "offset" from whatever is dialed in on the rec, by whatever is used for the LO(MHZ)value. Still with me? The actual "attenuation" function comes in by simply varring the injection level of the LO w/ a simple pot. By squeesing off the LO, you can make an S9+40 paging carrier completely disappear.. Years back we did something similar w/ an old Regency scanner; When we flicked a switch, it completely shut off the bias to the RF Preamp, and cut the 1st Mixer bias by half. The result was a receive sensitivity of about 1000 uV. > > > M > > --- In TSCM-L@yahoogroups.com, "J. Coote" wrote: > > In a recent thread, someone commented on RF oscillations that > originate in Hi, Besides false signals due to sideband spurs on the LO(s), one other falldown in many consumer/Ham receivers can also be due to LO harmonics. For the most part this usually only affects reception in higher freq ranges(>800 MHz), but can also be seen in the VHF range too. Thats not to say these types of receivers cant be used,,. Just that the watch word should be: Know your equipment, and what its weakness are.. Steve 9777 From: Doug Ellsworth Date: Mon Sep 27, 2004 10:51pm Subject: Only slightly OT Hi group, At the risk of being on topic only as a reference, we technical people should find the following link to be interesting. The feature at the following link contains some of the proficiency of one of our own! I'm most interested in how the battery pack was concealed. http://www.historychannel.com/global/listings/series_showcase.js p?EGrpType=Series&Id=10766469&NetwCode=THC Cheers, -Doug 9778 From: James M. Atkinson Date: Tue Sep 28, 2004 5:19pm Subject: Re: Re: Receiver Spurs, and Ants Funny you mention it, but for years companies that make SIGINT radio's have included a table in the radio firmware to address just this kind of problem. The phrase "anvil table" or "birdie filter" is sometimes used to describe this function, and periodically an equipment manufacture will quietly add this to their firmware to make a product more attractive. Essentially one of these tables makes the radio "go deaf" at certain pre-calculated frequencies, but this can be a major liability in the TSCM world as a spy can hide a bug on or next to these deaf spots if the spy knows what kind of search receiver the TSCM specialist is using, and in turn what frequencies are masked out in the birdie tables. Never ignore birdies or inter-modulation signals, but document them and know where they appear in your equipment so that you can speed up clearing them from the suspect signal list, but NEVER assume that a signal you have seen before is friendly until you prove that it is not hostile. Along the same lines, assume that an eavesdropper is hiding an eavesdropping device right on the birdie until you can scientifically prove they aren't. -jma At 12:03 AM 9/28/2004, contranl wrote: >. > >Check out my "Birdies" list of the new Icom-R20 scanner, > >www.tetrascanner.com > >in the R20 section > > >I have always wondered if some manufacturers use >software-tricks to make it look like a receiver >would'nt have any birdies >(by changing something only for that specific >"birdie" frequency...for example a "secret attenuation") > >You would have to sweep and measure the whole >frequency-range to find such a "hidden" trick. > >Fantastic idea i get just now.....you find out what >sweeping equipment is used by your "target to be bugged" >then you bug him on the birdie-frequency from his >sweeper...there's a good chance he won't find anything >offcourse that's only usefull if the guy has only >one piece of equipment :( > >There is a name for that last trick...hiding a bug >under or close to a strong rf-carrier >like for example a local broadcast transmitter, >i only remember the first letter "S......" > > >A way to avoid birdies in a receiver could be the automatic >changing of the mixing-frequencies and oscillators on channels >with "problems" ...i have never seen that. > > >Tetrascanner ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9779 From: John <3v1l.hax0r@g...> Date: Tue Sep 28, 2004 5:08pm Subject: Re: simple RF detector? Thank you very much for the replies. The harmonics tip is excellent! When I get a new scanner, I remove the antennae and do a complete scan. All the freqs. I get a hit on I lock out as birdies. So once I have done the birdie lockout, I could just sweep/scan with no antennae? Would an extremely weak antennae make the scanner more directional? I know this would not offer any assurance of an area being clear, but it could detect simple transmitters, correct? Also, any experts care to comment on devices that would escape detection by the above? Freq. hoppers would be hard to detect, right? On a related scanner note, does anyone do traffic annalysis using a computer controlled scanner? 9780 From: Mitch D Date: Tue Sep 28, 2004 10:28pm Subject: Re: ASIS conference just for fun: Specs Frequency Range=1MHz to 3 GHz Battery=5 x AA 600m/AH NiCd Battery Life=6HRs in use/500 stand by Ant. Impedance=50 Ohms Frequency Display=30Hr. Real/960Hr. TLapse Silent Alert Mode=No Beeper=Yes Low Battery Indicator=No Barograph=Ultra Sensitive 5 Sections Dimensions (L)(W)(H)=3.9" x 2.75" x 1.2" --- dj wrote: > I am here in Dallas Texas at the ASIS conference. I just got > done looking at the beta stuff for the new OSCOR. Anyone have > the new specs on this? > > IT2 > > > --------------------------------- > Do you Yahoo!? > Yahoo! Mail is new and improved - Check it out! > > [Non-text portions of this message have been removed] > > > __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - 100MB free storage! http://promotions.yahoo.com/new_mail 9781 From: J. Coote Date: Tue Sep 28, 2004 7:41pm Subject: RE: On Line Electronics Study Courses? Army used to have commo and elec on-line courses... not sure who its open to now Jay -----Original Message----- From: dj [mailto:navyguyinil@y...] Sent: Monday, September 27, 2004 6:23 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] On Line Electronics Study Courses? try the NEETS mods with the navy IT2 Garrett __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9782 From: James M. Atkinson Date: Tue Sep 28, 2004 11:30pm Subject: Another dumb blonde A Blonde enters a store that sells curtains. She tells the salesman, "I would like to buy a pair of pink curtains." The salesman assures her that they have a large selection of pink curtains. He shows her several patterns, but the blond seems to be having a hard time choosing. Finally she selects a lovely pink floral print. The salesman then asks what size curtains she needs. The blond promptly replies, "fifteen inches." Fifteen inches???" asked the salesman. "That sounds very small, what room are they for?" The blond tells him that they aren't for a room, they are for her computer monitor. The surprised salesman replies, "but Miss, computers do not need curtains!" The blond says, "Hellllooooooooo .. I've got Windoooooows!" ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9783 From: contranl Date: Thu Sep 30, 2004 0:12am Subject: Re: Receiver Spurs, and Ants . What would be a quick and simple method to test any kind of receiver for such "secret tricks" ? Checking all the frequencies one by one...while using an rf signal generator..would be a very lengthy task since you cant synchronise such a procedure and do that automatically. I was thinking of using a wideband rf noise generator (wich covers the receiver's whole band) You would connect the noise generator to the antenna input and then have the receiver do a sweep over the whole range there might be certain points where there is no reception You need to have the receiver scanning whith the squelch open when there is a "black spot" you will hear a short dip in the noise level (no reception) ..make shure it does'nt scan to fast to avoid you miss that. Such a rf noise generator up till 5 ghz can be made in a few hours at very lowcost...using a simple (noise)diode and 1 amplifier stage if interst exist i could draw up a few circuits. Problem is most receivers cannot scan with the squelch open this might be easy to modify...most scanners will allow you to do that...it's one wire to ground (force muting open) I won't advice to do that with high end countersurveillance receivers There is a device called a "wobbler" wich is infact a very fast and sweeping signal generator...they are not cheap and i am not shure if these can do Ghz frequencies Anyone has a better idea ? I got some private mails on the subject (rumours) and they give me the chills :) so a good and easy procedure would be handy. Tetrascanner 9784 From: satcommunitfive Date: Thu Sep 30, 2004 6:57am Subject: Re: Receiver Spurs, and Ants you could do it automatically with a AOR8600 for example it has simple computer control and can tell you the signal level then write a GPIB/VB program that controls a sig gen and the reciever to scan the whole spectrum. One problem is birdys have different levels you would have to have a calibrated input to match what the S meter reports And also the reciver has varing sensitivity etc the AOR can run spectrum analyser software that will sweep between 2 frequencys a Wideband noise source would show gaps real quick even in the noise floor for gaps you could get it to look out for a test tone on the audio mmmmm Buy a spec-ann ! [who knows they might have secret gaps in there sweep circuitry] maybe not..... M --- In TSCM-L@yahoogroups.com, "contranl" wrote: > . > > What would be a quick and simple method to test any kind of receiver > for such "secret tricks" ? > > Checking all the frequencies one by one...while using an rf signal > generator..would be a very lengthy task since you cant synchronise > such a procedure and do that automatically. > > I was thinking of using a wideband rf noise generator > (wich covers the receiver's whole band) > You would connect the noise generator to the antenna input > and then have the receiver do a sweep over the whole range > there might be certain points where there is no reception > > You need to have the receiver scanning whith the squelch open > when there is a "black spot" you will hear a short dip in the noise > level (no reception) ..make shure it does'nt scan to fast to avoid > you miss that. > > Such a rf noise generator up till 5 ghz can be made in a few hours > at very lowcost...using a simple (noise)diode and 1 amplifier stage > if interst exist i could draw up a few circuits. > > Problem is most receivers cannot scan with the squelch open > this might be easy to modify...most scanners will allow you to do > that...it's one wire to ground (force muting open) > > I won't advice to do that with high end countersurveillance receivers > > There is a device called a "wobbler" wich is infact a very fast and > sweeping signal generator...they are not cheap and i am not shure if > these can do Ghz frequencies > > Anyone has a better idea ? > > I got some private mails on the subject (rumours) > and they give me the chills :) > so a good and easy procedure would be handy. > > Tetrascanner 9785 From: Lee Bowyer Date: Thu Sep 30, 2004 4:23am Subject: UK policeman arrested over phone tap claims http://www.theregister.co.uk/2004/09/29/phone_tap_arrests/ -- Lee Bowyer Lee@n... www.networkpenetration.com 9786 From: contranl Date: Thu Sep 30, 2004 11:41am Subject: Gps "stalking " . "Gps stalking" is what they call this: http://www.cnn.com/2004/US/West/09/04/gps.stalking.ap/index.html Ofcourse they overdo it by saying that the tracker transmitted it's info to a satellite...wich is not true it just received gps info and transmits that to the nearest cellphone basestation In many of these cases that involve a common Gps receiver the media tends to say : "high tech satellite communications was used" This is not so hightech anymore and only serves the news agency's own purpose to make the story more interesting/sensational. Tetrascanner www.tetrascanner.com 9787 From: Patrick Ryals, CEO Date: Thu Sep 30, 2004 3:50pm Subject: Resin dye Getting ready to pot some boards in clear 3M Epoxy Resin. I'm wondering if I can use RIT clothing dye as a pigment to color it? I've called 3M. And I know there must be an art supply store in my county that sells pigment. But the grocery store would be much easier. :) Please reply privately if you have any information on this admittedly obscure topic - I'm on digest. Thanks, Patrick Ryals Nexus Investigations CA PI#22920 9788 From: Date: Thu Sep 30, 2004 0:17pm Subject: Re: Re: Antennas for Spectrum Analyzer? Hi ; I am thinking of purchasing a AOR 3000A scanner/reciever for TSCM low threat levels. Any suggestions about this receiver. Thanks Ed N2VRT [Non-text portions of this message have been removed] 9789 From: taylortscm@y... Date: Thu Sep 30, 2004 6:14pm Subject: Re: Resin dye 3m also has black potting compound,and don't use any water soluable dye such as rit go to your paint store and buy dry paint tints or use some gravel dust (small pieces) if your intention is to obscure veiw of components and prevent xray exam we do it all the time. dan taylor group bugsweeps.us "Patrick Ryals, CEO" wrote: Getting ready to pot some boards in clear 3M Epoxy Resin. I'm wondering if I can use RIT clothing dye as a pigment to color it? I've called 3M. And I know there must be an art supply store in my county that sells pigment. But the grocery store would be much easier. :) Please reply privately if you have any information on this admittedly obscure topic - I'm on digest. Thanks, Patrick Ryals Nexus Investigations CA PI#22920 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? Yahoo! Mail is new and improved - Check it out! [Non-text portions of this message have been removed] 9790 From: Andre Holmes <1ach@g...> Date: Thu Sep 30, 2004 11:38pm Subject: Emailing: Surveillance+Equipment DPL-Surveillance-Equipment.com @ BizBB DPL-Surveillance-Equipment.com Home About FAQ Contact Help BizBB > DPL-Surveillance-Equipment.com > For Sale > Surveillance Equipment -------------------------------------------------------------------------------- For Sale: Surveillance Equipment a.. on-going DPL-MicroWireless Covert Earpiece b.. on-going WIRELESS BOOK HIDDEN CAMERA c.. on-going PORTABLE WIRELESS FILE BINDER HIDDEN CAMERA d.. on-going MICRO WIRELESS HIDDEN CAMERA e.. on-going DPL-2130 PTZ NETWORK CAMERA f.. on-going DPL-VLTS VEHICLE LOGGING / TRACKING SYSTEM g.. on-going VCR HIDDEN CAMERA h.. on-going MICRO-DIGITAL VCR i.. on-going 8 CHANNNEL WIRELESS PORTABLE DVR BRIEFCASE j.. on-going DPL-Eagle-Plus 2.4 GHz All Weather Wireless Video System (4 Miles) k.. on-going 700 FT WIRELESS POCKET SIZE AUDIO/VIDEO TRANSMITTER/RECEIVER l.. on-going COVERT NECK TIE HIDDEN CAMERA m.. on-going TELEPHONE RECORDER n.. on-going 12 HOUR PORTABLE AUTO REVERSE TELEPHONE RECORDER o.. on-going TELEPHONE NUMBER MANAGER p.. on-going 2-WAY TELEPHONE RECORDER w/DTMF AND CALLER I.D. q.. on-going MICRO MINIATURE MICROPHONE r.. on-going PAGER WIRELESS HIDDEN CAMERA BLACK AND WHITE s.. on-going EXIT SIGN HIDDEN VIDEO CAMERA t.. on-going PICTURE FRAME HIDDEN CAMERA u.. on-going DESKTOP LAMP HIDDEN CAMERA v.. on-going PINHOLE LENS w.. on-going DPL-MT-875 SUBMERSIBLE COLOR CAMERA x.. on-going WIRELESS TISSUE BOX HIDDEN CAMERA y.. on-going SMOKE DETECTOR HIDDEN CAMERA Wireless z.. on-going 500mm COLOR ZOOM SPOT SCOPE W/BUILT-IN CAMERA aa.. on-going AM/FM RADIO ALARM CLOCK HIDDEN CAMERA ab.. on-going MICRO HEAD COLOR CAMERA ac.. on-going 8 HOUR DIGITAL VOICE PEN ad.. on-going 16 HOUR DIGITAL RECORDER ae.. on-going 45 HOUR DIGITAL VOICE RECORDER af.. on-going VOICE / TELEPHONE RECORDING SYSTEMS AND MULTI-CHANNEL DIGITAL VOICE LOGGERS ag.. on-going 12VDC VIDEO EVENT RECORDER ah.. on-going Portable Digital Video Recorder ai.. on-going Sea Going Surveillance Drones Remote controlled drones for surveillance Copyright 2000 BizBB.com Incorporated [Non-text portions of this message have been removed] 9791 From: Andre Holmes <1ach@g...> Date: Thu Sep 30, 2004 11:47pm Subject: Emailing: product6 The message is ready to be sent with the following file or link attachments: Shortcut to: http://www.dpl-surveillance-equipment.com/shopping_cart/product6.html Note: To protect against computer viruses, e-mail programs may prevent sending or receiving certain types of file attachments. Check your e-mail security settings to determine how attachments are handled. [Non-text portions of this message have been removed] 9792 From: Date: Fri Oct 1, 2004 3:24am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 9793 From: Dave Bernard Date: Thu Sep 30, 2004 9:16pm Subject: RE: Resin dye TAP Plastics has black potting compound. We use it for custom circuit boards we build. There are two type though so be careful. One gets hot enough to damage the electronics while it is curing. We found out the hard way... Dave Bernard -----Original Message----- From: Patrick Ryals, CEO [mailto:ceo@m...] Sent: Thursday, September 30, 2004 1:51 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Resin dye Getting ready to pot some boards in clear 3M Epoxy Resin. I'm wondering if I can use RIT clothing dye as a pigment to color it? I've called 3M. And I know there must be an art supply store in my county that sells pigment. But the grocery store would be much easier. :) Please reply privately if you have any information on this admittedly obscure topic - I'm on digest. Thanks, Patrick Ryals Nexus Investigations CA PI#22920 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT click here _____ Yahoo! Groups Links *To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ *To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com *Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . This message has been processed by Firetrust Benign . [Non-text portions of this message have been removed] 9794 From: Steve Weinert Date: Fri Oct 1, 2004 2:39pm Subject: Review: An Evidence Collection Device Haven't seen this one first hand, the review was in one of the many newsletters that cross my terminal... Steve W --- Review: An Evidence Collection Device The Logicube Forensic SF-5000u ($2,249 direct), which lets you create a perfect copy of a source drive without altering the original, may be the ideal device. This handheld drive-to-drive duplicator produces an exact sector-for-sector copy of the original. Read this review. http://eletters.eweek.com/zd1/cts?d=79-1166-4-6-6228-131613-1 9795 From: G P Date: Fri Oct 1, 2004 4:09pm Subject: Re: Review: An Evidence Collection Device Way too expensive for a device that only supports CRC-32, all of the federal standards require MD-5 or SHA-1 - would be sketchy in court for many forensic acquisitions. Steve Weinert wrote:Haven't seen this one first hand, the review was in one of the many newsletters that cross my terminal... Steve W --- Review: An Evidence Collection Device The Logicube Forensic SF-5000u ($2,249 direct), which lets you create a perfect copy of a source drive without altering the original, may be the ideal device. This handheld drive-to-drive duplicator produces an exact sector-for-sector copy of the original. Read this review. http://eletters.eweek.com/zd1/cts?d=79-1166-4-6-6228-131613-1 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links [Non-text portions of this message have been removed] 9796 From: Thomas Shaddack Date: Fri Oct 1, 2004 5:38pm Subject: Re: Review: An Evidence Collection Device On Fri, 1 Oct 2004, Steve Weinert wrote: > Review: An Evidence Collection Device > The Logicube Forensic SF-5000u ($2,249 direct), which lets you create a > perfect copy of a source drive without altering the original, may be the > ideal device. This handheld drive-to-drive duplicator produces an exact > sector-for-sector copy of the original. Read this review. > http://eletters.eweek.com/zd1/cts?d=79-1166-4-6-6228-131613-1 Over $2000 for a unit that can be replaced with a mini-ITX board and a small power supply in a briefcase. Call me a cheapskate, but that's too much. WAY too much. Any hardware that will run Linux (and will have the desired IDE and/or SATA and/or SCSI controllers) will do here. We don't need anything more than the kernel itself, drivers for the IDE controllers, and a handful of applications (dd, dd_rescue for damaged media (snafu warning: has different syntax than dd), md5sum, sha1sum). That all comfortably fits on even a floppy. (A distro specifically tailored to this class of problems (to system recovery, more accurately, but making exact duplication is a subset of that problematics) is RIP, Recovery Is Possible, available here: . Saved my posterior more than once. Versions available are for a CD (small enough to fit even the creditcard-sized one, suitable to carry in a wallet), for a floppy, and for PXE network booting (so it can boot from LAN). Any other distro with dd (and the required checksum programs) will do too. You can duplicate the entire drive as-is, or image the partitions to files (which can be zipped and archived on a tape or a DVD or a disk, (when small enough), and later mounted as a loop filesystem or written to a new drive). 9797 From: Intercept Investigations Date: Fri Oct 1, 2004 3:03pm Subject: Potential Colorado TSCM assignment Attorney in Colorado is seeking information and costs for a TSCM sweep of a small residence in Colorado. Nothing is set in stone yet, but he sounds serious. If you provide service in Colorado, and you're interested, please provide your contact information via PRIVATE EMAIL ONLY. I would actually prefer recommendations, but feel free to email with your own contact information for consideration. -- Steven W. Gudin, Director Intercept Investigations 700 NW Gilman Blvd. # 463 Issaquah (Seattle), WA 98027 Tel: (425) 313-1776 Fax: (425) 313-1875 Web: www.InterceptInvestigations.com Email: mail@I... Washington License # 602225499 Nevada License # 847 NATIONWIDE & INTERNATIONAL INVESTIGATION SERVICES This communication is intended for the sole use of the individual or entity to whom it is addressed and may contain information that is privileged, confidential and exempt from disclosure under applicable law. If the reader of this communication is not the intended recipient or the employee or agent for delivering the communication to the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication may be strictly prohibited. If you receive this email in error, please notify us immediately and delete this message from your computer. Nothing contained within this email message is intended, nor should it be interpreted as, legal advice or counsel. 9798 From: Does it matter Date: Fri Oct 1, 2004 7:16pm Subject: Re: Review: An Evidence Collection Device The logicube items work well and are a useful tool (providing you get the model that provides md5.) This is never a substitute for our portable systems with write blockers, but it comes in handy now and then. A large drawback to the logicube items is that everything is ala carte and some of the itmes are very helpful but run the price up beyond reason. Darren --- In TSCM-L@yahoogroups.com, Thomas Shaddack wrote: > On Fri, 1 Oct 2004, Steve Weinert wrote: > > > Review: An Evidence Collection Device > > The Logicube Forensic SF-5000u ($2,249 direct), which lets you create a > > perfect copy of a source drive without altering the original, may be the > > ideal device. This handheld drive-to-drive duplicator produces an exact > > sector-for-sector copy of the original. Read this review. > > http://eletters.eweek.com/zd1/cts?d=79-1166-4-6-6228-131613-1 > > Over $2000 for a unit that can be replaced with a mini-ITX board and a > small power supply in a briefcase. Call me a cheapskate, but that's too > much. WAY too much. > > Any hardware that will run Linux (and will have the desired IDE and/or > SATA and/or SCSI controllers) will do here. We don't need anything more > than the kernel itself, drivers for the IDE controllers, and a handful of > applications (dd, dd_rescue for damaged media (snafu warning: has > different syntax than dd), md5sum, sha1sum). That all comfortably fits on > even a floppy. (A distro specifically tailored to this class of problems > (to system recovery, more accurately, but making exact duplication is a > subset of that problematics) is RIP, Recovery Is Possible, available here: > . Saved my > posterior more than once. > > Versions available are for a CD (small enough to fit even the > creditcard-sized one, suitable to carry in a wallet), for a floppy, and > for PXE network booting (so it can boot from LAN). > > Any other distro with dd (and the required checksum programs) will do too. > > You can duplicate the entire drive as-is, or image the partitions to files > (which can be zipped and archived on a tape or a DVD or a disk, (when > small enough), and later mounted as a loop filesystem or written to a new > drive). 9799 From: J.A. Terranson Date: Sat Oct 2, 2004 4:32am Subject: Re: Re: Review: An Evidence Collection Device Might I suggest any laptop coupled to the appropriate drive blocker of your choice (firefly, etc.), at a much reduced cost? In fact, I use an older laptop (450mhz K62), a $200.00 write blocker, and a $1,400.00 package (FTK) which comes to less than the cost of the logicube, and can do *everything*, not just make an image. This device is being sold to those who simply don't know better. //Alif -- J.A. Terranson United Forensics Corp. On Sat, 2 Oct 2004, Does it matter wrote: > Date: Sat, 02 Oct 2004 00:16:25 -0000 > From: Does it matter > Reply-To: TSCM-L@yahoogroups.com > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Re: Review: An Evidence Collection Device > > > The logicube items work well and are a useful tool (providing you > get the model that provides md5.) This is never a substitute for our > portable systems with write blockers, but it comes in handy now and > then. > A large drawback to the logicube items is that everything is ala > carte and some of the itmes are very helpful but run the price up > beyond reason. > > Darren > > > --- In TSCM-L@yahoogroups.com, Thomas Shaddack wrote: > > On Fri, 1 Oct 2004, Steve Weinert wrote: > > > > > Review: An Evidence Collection Device > > > The Logicube Forensic SF-5000u ($2,249 direct), which lets you > create a > > > perfect copy of a source drive without altering the original, > may be the > > > ideal device. This handheld drive-to-drive duplicator produces > an exact > > > sector-for-sector copy of the original. Read this review. > > > http://eletters.eweek.com/zd1/cts?d=79-1166-4-6-6228-131613-1 > > > > Over $2000 for a unit that can be replaced with a mini-ITX board > and a > > small power supply in a briefcase. Call me a cheapskate, but > that's too > > much. WAY too much. > > > > Any hardware that will run Linux (and will have the desired IDE > and/or > > SATA and/or SCSI controllers) will do here. We don't need anything > more > > than the kernel itself, drivers for the IDE controllers, and a > handful of > > applications (dd, dd_rescue for damaged media (snafu warning: has > > different syntax than dd), md5sum, sha1sum). That all comfortably > fits on > > even a floppy. (A distro specifically tailored to this class of > problems > > (to system recovery, more accurately, but making exact duplication > is a > > subset of that problematics) is RIP, Recovery Is Possible, > available here: > > . Saved > my > > posterior more than once. > > > > Versions available are for a CD (small enough to fit even the > > creditcard-sized one, suitable to carry in a wallet), for a > floppy, and > > for PXE network booting (so it can boot from LAN). > > > > Any other distro with dd (and the required checksum programs) will > do too. > > > > You can duplicate the entire drive as-is, or image the partitions > to files > > (which can be zipped and archived on a tape or a DVD or a disk, > (when > > small enough), and later mounted as a loop filesystem or written > to a new > > drive). 9800 From: J. Coote Date: Fri Oct 1, 2004 9:24pm Subject: RE: Re: Antennas for Spectrum Analyzer? Make sure yours does not have the 800-Mhz gaps in it... Disconnect the antenna and make a log of the receiver "birdies". There are computer logging programs out there, but I usually prefer to use the receiver alone. The lithium battery inside may die after 3-6 years. You'll know because the display and functions begin acting up. A Pelican case and TLC will make it last for a long time. Jay -----Original Message----- From: n2vrt@a... [mailto:n2vrt@a...] Sent: Thursday, September 30, 2004 2:18 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Re: Antennas for Spectrum Analyzer? Hi ; I am thinking of purchasing a AOR 3000A scanner/reciever for TSCM low threat levels. Any suggestions about this receiver. Thanks Ed N2VRT [Non-text portions of this message have been removed] 9801 From: Andre Holmes <1ach@g...> Date: Sat Oct 2, 2004 4:08pm Subject: Yagi for SELL CUSHCRAFT ----- Original Message ----- I have 1 Yagi 4 Element 6db Antenna PC904N(895-980) good for reception of cellular and 900 and 1.2 gig wireless transmitters. Yours for $100.00 PLUS $20.00 shipping Tax will be added 7% You will receive opened box but new unused antenna sorry that's was how I bought it. Payment PAYPAL OR U.S. POSTAL M.O. FIRST COME FIRST SERVE Andre Holmes Neptune Enterprise Security 1ach@G... From: Andre Holmes To: ANDRE HOLMES Sent: Saturday, October 02, 2004 4:46 PM Subject: 800MHz_Yagi_Donor.pdf [Non-text portions of this message have been removed] 9802 From: Tech Sec Lab Date: Sat Oct 2, 2004 6:26pm Subject: RE: On Line Electronics Study Courses? Anyone know where an updated NEETS can be found? As in 2004 era... Regards -Ois -----Original Message----- From: dj [mailto:navyguyinil@y...] Sent: Monday, September 27, 2004 6:23 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] On Line Electronics Study Courses? try the NEETS mods with the navy IT2 Garrett From: Bugdetector Date: Sun Sep 29, 2002 9:36pm Subject: Hello from Brazil Hello everyone, I Am a member already os this group for a while... Greetings from Brazil Roger [Non-text portions of this message have been removed] 6304 From: Hawkspirit Date: Mon Sep 30, 2002 3:24pm Subject: Line Maintenance One of my clients had an odd occurrence on his phone line today. One of his associates called his office about 8:30 am and instead of getting through got a tape saying "The number you have called is being checked for trouble at this time, please call back later" The associate called back in a few minutes and got through. This is the first time I have heard of this happening. Most routine trunk maintenance takes place at night and as far as I know does not busy out the line. Also, he did not initiate a trouble call. Any one have any experience on this? Roger Tolces www.bugsweeps.com 6305 From: Charles P. Date: Mon Sep 30, 2002 4:03pm Subject: Re: Line Maintenance I have seen that happen, although rarely. As you mentioned, most automated testing I'm aware of gets done at night. I would call the telco to verify that maintenance was indeed being done at that time. cp charles@t... Charles Patterson Global Communications www.telephonesecurity.com ----- Original Message ----- From: "Hawkspirit" To: "TSCM" Sent: Monday, September 30, 2002 4:24 PM Subject: [TSCM-L] Line Maintenance > One of my clients had an odd occurrence on his phone line today. One of his > associates called his office about 8:30 am and instead of getting through > got a tape saying "The number you have called is being checked for trouble > at this time, please call back later" The associate called back in a few > minutes and got through. > This is the first time I have heard of this happening. Most routine trunk > maintenance takes place at night and as far as I know does not busy out > the line. Also, he did not initiate a trouble call. Any one have any > experience on this? > Roger Tolces > www.bugsweeps.com > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 6306 From: Steve Uhrig Date: Mon Sep 30, 2002 6:34pm Subject: Re: Line Maintenance On 30 Sep 2002 at 13:24, Hawkspirit wrote: > One of my clients had an odd occurrence on his phone line today. One > of his associates called his office about 8:30 am and instead of > getting through got a tape saying "The number you have called is being > checked for trouble at this time, please call back later" The > associate called back in a few minutes and got through. This is the > first time I have heard of this happening. In this area (Northeastern part of MD nearly in PA), which is rural with antiquated infrastructure, it is fairly common to get those messages. Is there a possibility your man misdialed the first time? Perhaps one call in a few hundred here gets a similar message, anytime of the day or night. The message/trouble may last seconds or hours. We're used to it. Most of us here remember the crossbar CO days and are still thankful we got upgraded to ESS. Probably innocent. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6307 From: The Dog's Bollix Date: Mon Sep 30, 2002 11:13pm Subject: Oscor 5000 - $160.00 - Get your orders in :-) No Kidding. http://www.spy-tech.com/counter.shtml It's there in maroon and white. I'm truly happy to say that I have absolutely no affiliation with this site. __________________________________________________ Do you Yahoo!? New DSL Internet Access from SBC & Yahoo! http://sbc.yahoo.com 6308 From: spyworldltd Date: Wed Oct 2, 2002 3:23am Subject: Tracking System I know in the past we have gone over the tracking systems debate, however I have a genuine requirement to have a tracking device attached / integrated into an attache case / brief case. If anybody is aware of an effective tracking system that they now works let me know. I have come across a number of companies who manufacture and supply this equipment. Having used some of the kit from Eskan I have found the quality is pretty good however I have not tested the MT2000, I have been told it has a range of between two to three miles (depending on conditions) http://www.eskan.com/MT2000.html. The other company is Carbug http://www.carbug.co.uk who have basically taken a GPS tracker and GSM Cellphone stuck them in a box and called it carbug, truckbug etc. My only fear with this company is I had a meeting with them a couple of years ago and they seem to appear then disapear if you now what I mean. In other words I don't know how credible they are. Carbug - the method in which you track the vehicle is to conect you PC to a GSM dialup modem and a map is displayed on you screen indicating the location. Finally, the last company I spoke with Datong Electronics www.datong.co.uk informed me they did do such a device however, they only sold it to MOD, law enforcements etc so no joy there. In the past we have built covert wireless CCD Camera kits (2.4Ghz) for some of our retail customers, for example, we have stuffed them into a mobile phone box and stuck it on a rack in a warehouse and with battery power of about 8 hours it works pretty well. I am aware that battery power is always an issue, however we only need to have up to 10 hours power and it dosn't matter within reason the size of the kit, as long as it fits in the case. I don't care what country I have to source it from I just want to ensure it works and is priced competitively. For the members in the UK / Eire come early 2003 you will now what this is all about in much greater detail. Thanks David Emery Spyworld Ltd Tel 08701 206 185 Fax 08701 206 186 Mob 07971 187561 E&OE 6309 From: James M. Atkinson Date: Wed Oct 2, 2002 10:14am Subject: Re: Countersurveillance Expert? The only problem is that Kelly Fromm is not, and never has been a legitimate dealer of most the TSCM equipment he is peddling: Please review: http://www.tscm.com/spytech01a.gif A bogus discount, is not actually a good deal when the equipment is a no show for weeks, or is some black/gray market item with no factory warranty and no technical support. -jma At 7:27 AM +0200 9/3/02, Steve Whitehead wrote: >ORLANDO -- Standing in a busy aisle at the International Security >Conference Expo in Orlando, Roy Winkelmann is clutching a 4-ounce >device he has just purchased called a "Zap Checker." > >It is a highly sensitive handheld counter-surveillance meter that >detects wireless video or audio bugs as far away as 40 feet. > >As a counter-surveillance pioneer, Winkelmann has seen many devices >before now that claimed to do what this one can. But none of them >were any good. > >Either their frequency range was too limited, or you had to hold >them right next to the bug for them to pick up the signal. This one, >he says, is the real McCoy. > >Perfect for the traveling businessperson worried about privacy. >Perfect merchandise for Spy Sarasota, the newest venture of an old >spook. > >Winkelmann's wizened face, framed in closely cropped white hair, >crinkles into a mischievous grin. > >For at least three decades, Winkelmann traveled the world in the >counter-intelligence game before slowing down a bit to establish a >Sarasota-based private investigator service called Winkling >Associates in the mid-1990s. > >Born in the United Kingdom and transplanted to Utah as a boy, he >became a criminal investigator in the Air Force in the 1950s. > >Now his resume, spanning both the Old and New World, looks like >something out of a creative writing class for spy novelists: > > > > >a.. Counter-intelligence adviser to the AFL/CIO on subversive >methodologies conducted by Communist sympathizers to infiltrate and >gain control of local unions, and suggested countermeasures. > > >a.. Security for the safe transport of cash and negotiable >instruments for Queen Elizabeth II. > > >a.. Adviser to the newly elected government of Zimbabwe for safe >shipment from the United Kingdom to Harare of the nation's newly >printed currency and newly minted coin. > >a.. Adviser for the safety and security of the Gutenberg Bible while >in transit in the United States. > > >a.. Technical counter-intelligence adviser and instructor to the >Iraqi military intelligence unit known as Mukhabarat (in the early >1980s). > >Those are just a few of the "Notable Security and >Counterintelligence Assignments," listed in Winkelmann's resume. > >There are others that he prefers not to talk about "because we still >do some work for them." > > >Kelly Fromm, a former U.S. military counter-intelligence operator >who now imports and sells surveillance equipment, checked Winkelmann >out earlier this year before becoming a supplier to Spy Sarasota. > >"I would love for him to be with me for the next few months >straight," Fromm said. "He has already taught me things that made me >think, 'Why didn't they teach me this in the military?'" > >Back in Sarasota, it is clear that Winkelmann believes strongly in security. > >The door to his office, off Bee Ridge Road on Belmont Boulevard, is >locked at all times. > >Before you even press the doorbell, you have been videotaped on a >couple of cameras, and your face is visible inside on a >high-resolution split screen monitor. > >In part Winkelmann and his wife, Judy, who runs the Spy Sarasota >part of the business, are just showing off the wares they make >available through www.SpySarasota.com. > > > >Starting a year ago, they began hearing from potential customers who >wanted to buy a surveillance system and install it themselves. > >Sept. 11 might have raised general awareness of the need for >security and protection. But just as importantly, the prices on >equipment have been dropping sharply, making what used to be an >elaborate system commonplace and affordable. > >You can buy a high-quality, four-camera surveillance system with >digital recorder and remote access capability for $3,500, half of >the price three years ago, Fromm said. > > > >Customers such as bar owners are lining up for the equipment, Winkelmann said. > >With it, they can go home early and still keep an eye on the help, >just by logging on to their bar-TV station on the Web. > >Fromm said Winkelmann has moved at least $100,000 worth of the >equipment just in the six months the two men have been working >together. > >Winkelmann's greatest claim to fame, though, resides in a place of >honor in his office off Bee Ridge Road in Sarasota. > > > >Resting on its own rack under a spotlight in an otherwise dimly >lighted room is the world's first "portable >microprocessor-controlled electronic surveillance countermeasures >defense system." > >Translated, that means a computerized bug detector, a device >designed to find potential bugs in a modern office building's >telephone switching room. > >Every office building has a switching room where thick bundles of >telephone cable pairs come into the building and then are >distributed to phones, faxes and computers. It is between the phone >room, which Winkelmann calls a frame room, and the device hooked up >to the line where most wired bugs are placed. > > > >During the 1970s, there was no efficient way to find these bugs. >That's because the voltage through a telephone line is not constant. > >Winkelmann, with cash in hand from the successful sale of the >armored car business he started in London, poured $750,000 into the >design of an instrument that recorded the voltage variations on each >phone line, then analyzed them mathematically to come up with >acceptable ranges. > >A bug, or listening device on a given phone line, would show up as a >spike outside of this acceptable range. > > > >After that, Winkelmann and his small London-based crew would isolate >the problem line. Sometimes they would find the bug and remove it. >If they couldn't track it down, they would simply fire a powerful >jolt of electricity through the line, frying the bug to permanently >disable it. > > > >By 1980, Winkelmann was happily frying electronic bugs all over >London, getting his jobs through an ex-Scotland Yard officer. > >"The three of us, we were earning from sweeping anywhere from >$500,000 to $700,000 a year," Winkelmann said. "I mean, you do an >embassy, $30,000." > >Then, one night in 1981, he got a call from the Iraqi Embassy, >requesting him to bring his team and his debugging gear to Baghdad. > >He checked with his Scotland Yard buddies, and with the U.S. >Embassy. There were no prohibitions. > > >When Winkelmann and his partner arrived in Baghdad, a colonel who >met them at the airport took their passports and their money and >drove them to the headquarters of the Mukharbarat, Iraq's military >intelligence service. > >At lunch, the colonel informed them that they would be tested. > >The Mukharbarat staff had planted a number of bugs within their own >phone network, and Winkelmann's job was to find them. > > > >The colonel asked how many bugs Winkelmann found. Winkelmann asked, >in turn, how many had been put in. > >The two men played the game for another round before the colonel said eight. > >Then Winkelmann said, "Well, here's two more for you." > > >They were invited to dine with Saddam Hussein at one of his palaces >that evening. > >Saddam never showed up. But the evening led to an order for the >manufacture of three more debugging devices like the one they >brought with them, at $60,000 each, plus an agreement to train >Iraqis in their use. > >The device became the basis for another of Winkelmann's businesses: >Winkelmann U.K. Ltd. > >The company sold dozens of the counter measure receivers after the >Iraqi order. > > > >Winkelmann U.K. still operates and still sells sophisticated >surveillance and counter-surveillance gear, although Winkelmann sold >out his interest years ago. > > > >But he doesn't recommend the business to anyone. > > >"I was in a gray zone all the time," Winkelmann says, his eyes >wandering through the story of his life. > >"I've been hurt bad. When people put a device in and spend >$50,000-$60,000, they don't want them taken out. So it is not a >particularly safe business to be in." > > >Link > >http://www.heraldtribune.com/apps/pbcs.dll/article?Site=SH&Date=20020901&Category=NEWS&ArtNo=209010932&Ref=AR&Profile=1007&SectionCat=FRONTPAGE > > >Steve Whitehead >e-mail : info@t... >Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) >PO Box 16063, Lyttelton, 0140, Centurion, South Africa -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6310 From: Date: Wed Oct 2, 2002 6:37am Subject: Re: Countersurveillance Expert? In a message dated 10/2/02 8:17:54 AM Pacific Daylight Time, jmatk@tscm.com writes: << A bogus discount, is not actually a good deal when the equipment is a no show for weeks, or is some black/gray market item with no factory warranty and no technical support. >> www.SpySarasota.com appears to be down 6311 From: Matt Paulsen Date: Wed Oct 2, 2002 10:48am Subject: RE: Countersurveillance Expert? - Don't buy graymarket...why? James makes a good note here about black/gray market items that I'm going to expand on. We've been asked why people should avoid them and here's what we say, which is also why we don't deal in them. I think James and others here that deal in equipment on the vendor/mfg./mfg. rep side will agree with this. When purchasing new products and/or services from a reputible dealer / vendor, the goal is to ensure that you, the customer, maximize your investment. All too often we see some unsuspecting customer (re: poor sap/sucker-o'-da-day) enticed into buying by the lower prices of used/graymarket/blackmarket equipment, only to find out later that their product has been altered, not warrantied, is end-of-lifed or no longer valid in some other respect. More importantly, the questionable integrity of used / refurbished / gray market quipment undermines the potential benefits that are received through lower costs. The end result is that your "great deal" may leave you without the support you need, and may even result in service interruptions that could impact the operations of your business. If you've ever experienced a total outage it is expensive to operations and tars your image to your customers, vendors, suppliers, employees and everyone else you deal with. To put this in a real world perspective, we just bailed out someone for a few MILLION dollars worth of equipment when their "great deal" went south and they had already committed a firm price to the customer. That's a lot of cash to put a firm commitment on and find out that your great deal isn't coming through. Don't buy from unscrupulous dealers, or people that don't define things that are needed - where the item was used, for how long, what condition it is in, features missing, mfg. warranty, technical support, etc. And absolutely DON'T COMMIT TO ANYTHING until the cash is in the bank/the product is received and you have fully ensured that it meets your needs (or more simply, don't buy it to begin with as I said earlier). Additionally, many people look to refurb equipment to save costs thinking that the equipment will be manufacturer warrantied (which it may be) and cheaper - avoid it and look for a volume dealer or a broker to make your purchase for new equipment. For example, we sell cisco routers and switches at 5% less than most refurbs since we broker sales for large companies in volume and get huge discounts through the channel because of it. And believe me, if you think you're going to bypass the channel and save a few bucks, you might be able to, but more often than not, you'll end up spinning your wheels trying to find a better deal and getting nowhere - and really, what is your time worth in comparison to that sort of hassle. Thanks, Matt Paulsen President/CEO Orange Networks LLC http://www.orange-networks.com P: 503.892.8786 F: 503.892.8794 Remotely Hosted Terminal Services! Don't Buy Expensive Hardware or Software! Just use ours for a low monthly fee! http://www.orange-networks.com/remoteoverview.htm -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Wednesday, October 02, 2002 8:14 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Countersurveillance Expert? The only problem is that Kelly Fromm is not, and never has been a legitimate dealer of most the TSCM equipment he is peddling: Please review: http://www.tscm.com/spytech01a.gif A bogus discount, is not actually a good deal when the equipment is a no show for weeks, or is some black/gray market item with no factory warranty and no technical support. -jma At 7:27 AM +0200 9/3/02, Steve Whitehead wrote: >ORLANDO -- Standing in a busy aisle at the International Security >Conference Expo in Orlando, Roy Winkelmann is clutching a 4-ounce >device he has just purchased called a "Zap Checker." > >It is a highly sensitive handheld counter-surveillance meter that >detects wireless video or audio bugs as far away as 40 feet. > >As a counter-surveillance pioneer, Winkelmann has seen many devices >before now that claimed to do what this one can. But none of them >were any good. > >Either their frequency range was too limited, or you had to hold >them right next to the bug for them to pick up the signal. This one, >he says, is the real McCoy. > >Perfect for the traveling businessperson worried about privacy. >Perfect merchandise for Spy Sarasota, the newest venture of an old >spook. > >Winkelmann's wizened face, framed in closely cropped white hair, >crinkles into a mischievous grin. > >For at least three decades, Winkelmann traveled the world in the >counter-intelligence game before slowing down a bit to establish a >Sarasota-based private investigator service called Winkling >Associates in the mid-1990s. > >Born in the United Kingdom and transplanted to Utah as a boy, he >became a criminal investigator in the Air Force in the 1950s. > >Now his resume, spanning both the Old and New World, looks like >something out of a creative writing class for spy novelists: > > > > >a.. Counter-intelligence adviser to the AFL/CIO on subversive >methodologies conducted by Communist sympathizers to infiltrate and >gain control of local unions, and suggested countermeasures. > > >a.. Security for the safe transport of cash and negotiable >instruments for Queen Elizabeth II. > > >a.. Adviser to the newly elected government of Zimbabwe for safe >shipment from the United Kingdom to Harare of the nation's newly >printed currency and newly minted coin. > >a.. Adviser for the safety and security of the Gutenberg Bible while >in transit in the United States. > > >a.. Technical counter-intelligence adviser and instructor to the >Iraqi military intelligence unit known as Mukhabarat (in the early >1980s). > >Those are just a few of the "Notable Security and >Counterintelligence Assignments," listed in Winkelmann's resume. > >There are others that he prefers not to talk about "because we still >do some work for them." > > >Kelly Fromm, a former U.S. military counter-intelligence operator >who now imports and sells surveillance equipment, checked Winkelmann >out earlier this year before becoming a supplier to Spy Sarasota. > >"I would love for him to be with me for the next few months >straight," Fromm said. "He has already taught me things that made me >think, 'Why didn't they teach me this in the military?'" > >Back in Sarasota, it is clear that Winkelmann believes strongly in security. > >The door to his office, off Bee Ridge Road on Belmont Boulevard, is >locked at all times. > >Before you even press the doorbell, you have been videotaped on a >couple of cameras, and your face is visible inside on a >high-resolution split screen monitor. > >In part Winkelmann and his wife, Judy, who runs the Spy Sarasota >part of the business, are just showing off the wares they make >available through www.SpySarasota.com. > > > >Starting a year ago, they began hearing from potential customers who >wanted to buy a surveillance system and install it themselves. > >Sept. 11 might have raised general awareness of the need for >security and protection. But just as importantly, the prices on >equipment have been dropping sharply, making what used to be an >elaborate system commonplace and affordable. > >You can buy a high-quality, four-camera surveillance system with >digital recorder and remote access capability for $3,500, half of >the price three years ago, Fromm said. > > > >Customers such as bar owners are lining up for the equipment, Winkelmann said. > >With it, they can go home early and still keep an eye on the help, >just by logging on to their bar-TV station on the Web. > >Fromm said Winkelmann has moved at least $100,000 worth of the >equipment just in the six months the two men have been working >together. > >Winkelmann's greatest claim to fame, though, resides in a place of >honor in his office off Bee Ridge Road in Sarasota. > > > >Resting on its own rack under a spotlight in an otherwise dimly >lighted room is the world's first "portable >microprocessor-controlled electronic surveillance countermeasures >defense system." > >Translated, that means a computerized bug detector, a device >designed to find potential bugs in a modern office building's >telephone switching room. > >Every office building has a switching room where thick bundles of >telephone cable pairs come into the building and then are >distributed to phones, faxes and computers. It is between the phone >room, which Winkelmann calls a frame room, and the device hooked up >to the line where most wired bugs are placed. > > > >During the 1970s, there was no efficient way to find these bugs. >That's because the voltage through a telephone line is not constant. > >Winkelmann, with cash in hand from the successful sale of the >armored car business he started in London, poured $750,000 into the >design of an instrument that recorded the voltage variations on each >phone line, then analyzed them mathematically to come up with >acceptable ranges. > >A bug, or listening device on a given phone line, would show up as a >spike outside of this acceptable range. > > > >After that, Winkelmann and his small London-based crew would isolate >the problem line. Sometimes they would find the bug and remove it. >If they couldn't track it down, they would simply fire a powerful >jolt of electricity through the line, frying the bug to permanently >disable it. > > > >By 1980, Winkelmann was happily frying electronic bugs all over >London, getting his jobs through an ex-Scotland Yard officer. > >"The three of us, we were earning from sweeping anywhere from >$500,000 to $700,000 a year," Winkelmann said. "I mean, you do an >embassy, $30,000." > >Then, one night in 1981, he got a call from the Iraqi Embassy, >requesting him to bring his team and his debugging gear to Baghdad. > >He checked with his Scotland Yard buddies, and with the U.S. >Embassy. There were no prohibitions. > > >When Winkelmann and his partner arrived in Baghdad, a colonel who >met them at the airport took their passports and their money and >drove them to the headquarters of the Mukharbarat, Iraq's military >intelligence service. > >At lunch, the colonel informed them that they would be tested. > >The Mukharbarat staff had planted a number of bugs within their own >phone network, and Winkelmann's job was to find them. > > > >The colonel asked how many bugs Winkelmann found. Winkelmann asked, >in turn, how many had been put in. > >The two men played the game for another round before the colonel said eight. > >Then Winkelmann said, "Well, here's two more for you." > > >They were invited to dine with Saddam Hussein at one of his palaces >that evening. > >Saddam never showed up. But the evening led to an order for the >manufacture of three more debugging devices like the one they >brought with them, at $60,000 each, plus an agreement to train >Iraqis in their use. > >The device became the basis for another of Winkelmann's businesses: >Winkelmann U.K. Ltd. > >The company sold dozens of the counter measure receivers after the >Iraqi order. > > > >Winkelmann U.K. still operates and still sells sophisticated >surveillance and counter-surveillance gear, although Winkelmann sold >out his interest years ago. > > > >But he doesn't recommend the business to anyone. > > >"I was in a gray zone all the time," Winkelmann says, his eyes >wandering through the story of his life. > >"I've been hurt bad. When people put a device in and spend >$50,000-$60,000, they don't want them taken out. So it is not a >particularly safe business to be in." > > >Link > >http://www.heraldtribune.com/apps/pbcs.dll/article?Site=SH&Date=20020901&Ca tegory=NEWS&ArtNo=209010932&Ref=AR&Profile=1007&SectionCat=FRONTPAGE > > >Steve Whitehead >e-mail : info@t... >Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) >PO Box 16063, Lyttelton, 0140, Centurion, South Africa -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- Vocatus atque non vocatus deus aderit ---------------------------------------------------------------------------- ---------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6312 From: James M. Atkinson Date: Wed Oct 2, 2002 1:18pm Subject: RE: Countersurveillance Expert? - Don't buy graymarket...why? The other problem with buying from a dealer that is not legitimate; is that you could be buying stolen equipment (like what one list member in California just found out the hard way when he bought an OSCOR from a fake dealer in Nevada). You could also be like another victims who sent tens of thousands of dollars to a New York company and received nothing after the check cleared, and they spent months chasing ghosts only to find out that they where one of several dozen similar victims. Or, you could be the victim of a SpyShop who sold them a "new" piece of equipment at a 30% discount only to find out that the SpyShop bought the unit as scrap on E-Bay... for a tenth of what they just paid... and that the unit was not reparable due to the damage the previous owners had inflicted Buy your equipment from a legitimate dealers or factory authorized representative, and not from your favorite SpyShop. We are legitimate, and sell more of this equipment then anybody else... please feel free to call me if you need any TSCM or related equipment. For those who are curious as to my own status, I offer the following certification: http://www.tscm.com/reicet2002.jpg I also have a stack of certificate for my training on numerous pieces of equipment, and rep authorizations for previous years. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6313 From: Matt Paulsen Date: Thu Oct 3, 2002 0:50pm Subject: "a global communications system that is completely secure." got this from infocon... I love that subject header I pulled... - m [17] Quantum cryptography takes to the skies 19:00 02 October 02 NewScientist.com news service Quantum cryptography keys encoded in photons of light have been transmitted more than 23 kilometres through air, British researchers have announced. They say the breakthrough is an important step towards a global communications system that is completely secure. Earlier in 2002 a Swiss company managed to send quantum keys over 60 kilometres. But this was through optical fibres, which limits the technology to ground-based transmission. "Our experiment paves the way for the development of a secure global key-distribution network based on optical links to low-Earth-orbit satellites," says John Rarity, at QinetiQ, the public arm of the UK's defence research agency. http://www.newscientist.com/news/news.jsp?id=ns99992875 6314 From: Matt Paulsen Date: Thu Oct 3, 2002 1:15pm Subject: FW: [INFOCON] - GAO CIP: Commercial Satellite Security more from infocon. -m -----Original Message----- From: infocon@g... [mailto:infocon@g...]On Behalf Of Wanja Eric Naef [IWS] Sent: Thursday, October 03, 2002 11:12 AM To: 'Infocon' Subject: [INFOCON] - GAO CIP: Commercial Satellite Security (Interesting report about a part of the critical infrastructure which is not mentioned very often. WEN) Key sentence for CIP planner: ...In addition, we are recommending that commercial satellites be identified as a critical infrastructure sector (or as part of an already identified critical infrastructure sector) in the national CIP strategy, to help ensure that these assets are protected from unauthorized access and disruption. ... GAO: Critical Infrastructure Protection: Commercial Satellite Security Should Be More Fully Addressed. GAO-02-781, August 30. http://www.gao.gov/cgi-bin/getrpt?GAO-02-781 Vulnerabilities: .... Satellites are vulnerable to various threats. Protecting satellite systems against these threats requires attention to (1) the satellite; (2) the satellite control ground stations, which perform tracking and control functions to ensure that satellites remain in the proper orbits and which monitor satellite performance; (3) the communications ground stations, which process the data being sent to and from satellites; and (4) communications links between satellites and ground stations-both those that transmit the tracking and control information and those that transmit the data. Security threats to any part of the system could put government and commercial functions at significant risk. Accordingly, at your request, we reviewed (1) what security techniques are available to protect satellite systems from unauthorized use, disruption, or damage; (2) how federal agencies reduce the risk associated with their use of commercial satellite systems; and (3) what federal critical infrastructure protection (CIP) efforts are being undertaken to address satellite system security through improved government and private-sector cooperation. To accomplish these objectives, we reviewed technical documents, policy, and directives and interviewed pertinent officials from federal agencies and the private sector involved in developing, operating, maintaining, and protecting satellite systems. ... Results: .... Techniques to protect satellite systems from unauthorized use and disruption include the use of robust hardware on satellites, physical security and logical access controls2 at ground stations, and encryption of the signals for tracking and controlling the satellite and of the data being sent to and from satellites. .... Recommendation: Because of the importance of the satellite industry to our nation, we recommend that steps be taken to promote appropriate revisions to existing policy and the development of new policy regarding the security of satellite systems, to ensure that federal agencies appropriately address the use of commercial satellites, including the sensitivity of information, security techniques, and enforcement mechanisms. In addition, we are recommending that commercial satellites be identified as a critical infrastructure sector (or as part of an already identified critical infrastructure sector) in the national CIP strategy, to help ensure that these assets are protected from unauthorized access and disruption. IWS INFOCON Mailing List @ IWS - The Information Warfare Site http://www.iwar.org.uk 6315 From: Steve Uhrig Date: Thu Oct 3, 2002 3:45pm Subject: RE: Don't buy graymarket...why? On 2 Oct 2002 at 8:48, Matt Paulsen wrote: > When purchasing new products and/or services from a reputible dealer / > vendor, the goal is to ensure that you, the customer, maximize your > investment. All too often we see some unsuspecting customer (re: poor > sap/sucker-o'-da-day) enticed into buying by the lower prices of > used/graymarket/blackmarket equipment, only to find out later that > their product has been altered, not warrantied, is end-of-lifed or no > longer valid in some other respect. > > More importantly, the questionable integrity of used / refurbished / > gray market quipment undermines the potential benefits that are > received through lower costs. The end result is that your "great deal" > may leave you without the support you need, and may even result in > service interruptions that could impact the operations of your > business. Make the distinction between used and new. Don't paint a blanket stripe with your whitewash brush. The majority of people who buy new TSCM equipment are those who are new to the field, have not done their homework, do not know what to buy, and are ripe pickings. Those frequently are the ones who get ripped off. If you inquired of an accurate representative of GENIUNE TSCMers (and there are few around, this list included) you will find very few of them bought new gear. There is a plethora of used equipment out there, virtually all purchased by someone with more money than brains, the guys who insist on spending a year's pay for toys without bothering to do a month's worth of research, the guys who think owning some special new expensive something automatically confers on them some sort of unearned status and they are ready to play with the big boys. Very very few of the big boys bought new. Offhand, except for low cost stuff like toners, I can't think of a single major piece of equipment I use which I bought new, and I can pretty much afford anything available. I have bought new, an Oscor once, and that turned out to be a dismal mistake which I had to prove to myself. There are honest used equipment dealers out there, some of whom specialize in used TSCM, who will work with you to get you a proper kit in perfect working order, recently calibrated, with all accessories, new batteries, manuals, etc. for half of what the thing would cost new. And the dealers will provide extensive post-sale support which is nearly unheard of with manufacturers of new equipment. Support ends when your check clears. Unless you are waving more money in their faces, don't expect most manufacturers to do anything for you other than pay lip service. You can buy new and have a warm wet feeling. Maybe you'll be the one in a hundred who actually ultimately turns a profit on TSCM. Chances are 99:1 you never will. Then you or your widow or your creditors can sell your expensive new piece of gear to a used equipment dealer, who will resell it to someone for half of what you paid. They have a lot better chance of making money, since they spent half of what you did to gear up. Their chances probably double, to odds of only 50:1 against turning a profit in sweeping. The money in sweeping is made by the manufacturers and resellers of NEW equipment. It is not made by providing the service or in selling used equipment. One popular manufacturer will sell more in new hardware this year, 90% to people who will never use it but will show it off to everyone, than all the sweep service revenue generated in the U.S. by all the legitimate sweepers. > And absolutely DON'T COMMIT TO ANYTHING until the cash is in the > bank/the product is received and you have fully ensured that it meets > your needs (or more simply, don't buy it to begin with as I said > earlier). This is unrealistic advice. Very few sellers of new or used gear will offer the equipment before receiving payment. Better would be to deal with a seller who has an outstanding reputation of representing his products honestly, providing what he says he will (or more) and gives you lifetime free support after the sale even when he knows you're not looking to buy more kit from him. Believe it or not, there are dealers who try to talk people OUT of buying gear which is not appropriate for their needs, gear which might be OK but the potential buyer has not done enough homework to make an informed buying decision, or will refer them to another source for gear which may be a better value or more suitable. > Additionally, many people look to refurb equipment to save costs > thinking that the equipment will be manufacturer warrantied (which it > may be) and cheaper - avoid it and look for a volume dealer or a > broker to make your purchase for new equipment. The above sounds a lot like someone who sells new gear is experiencing competition from refurb sellers. There is no such thing as volume dealers for TSCM equipment. The market isn't there to support what most would consider 'volume'. 20 pieces a year is not volume. 100 pieces probably isn't by most standards. I am not including the spy shops who sell manure packaged in plastic chassis as TSCM suppliers. Back when we sold ICOM receivers, volume meant several thousand receivers a year. I am not aware of the above situation in the TSCM world. No one expects manufacturer warranties on anything except equipment purchased new. And not many buy new, at least not informed people. Novices buy new. Pros, or those with potential to be pros, do their homework, take their time, research, save, network, ask questions, and buy used when they find something appropriate. Offhand, I only know one professional sweeper who purchased a new spectrum analyzer (not counting the low cost Avcoms which are so cheap that it's no crime to buy them new). I've owned and used literally several hundred pieces of TSCM-specific gear, and only one piece was purchased new to the best of my recollection. The TSCM world is very different from other technical fields. There are more pieces of Cisco in my state than there are pieces of TSCM equipment in the world. You can't make the comparison. Offhand, I don't know of anyone who sells 'refurbished' TSCM gear who even remotely implies the manufacturer's warranty is valid. There are places who sell used TSCM gear and warranty it themselves. Persons who buy from those types of dealers typically save 50% on their equipment and typically get a far higher level of tech support. You can be a lot more profitable when your equipment costs are half that of your competition. Ask around and I think you'll discover my above statements represent the true state of the onion in the TSCM industry. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6316 From: Fernando Martins Date: Fri Oct 4, 2002 3:52am Subject: RE: RE: Don't buy graymarket...why? hi2all > From: Steve Uhrig [mailto:steve@s...] > Sent: quinta-feira, 3 de Outubro de 2002 21:46 > To: tSCM-L@yahoogroups.com > Subject: [TSCM-L] RE: Don't buy graymarket...why? (...) > The majority of people who buy new TSCM equipment are those who are > new to the field, have not done their homework, do not know what to > buy, and are ripe pickings. Those frequently are the ones who get > ripped off. (...) Since I'm new in this specific field, I'm allowed to make basic questions ... I suppose one has to put in one side "what do I need the equipment can do?" and in the other side "what the equipment really can do?" ... The problem to new ones is that there are a huge list to answer the 2nd question, and just a little list to answer the 1st ... So the hint is to buy the equipment that just to the stuff of the short list, and probably one will find that the right piece is the used/old one. Along with the issue that it's well known to the experts, so advices on the use or assistance will be smooth and cheap. (...) > You can buy new and have a warm wet feeling. Maybe you'll be the one > in a hundred who actually ultimately turns a profit on TSCM. Chances > are 99:1 you never will. Then you or your widow or your creditors can > sell your expensive new piece of gear to a used equipment dealer, who > will resell it to someone for half of what you paid. They have a lot > better chance of making money, since they spent half of what you did > to gear up. Their chances probably double, to odds of only 50:1 > against turning a profit in sweeping. (...) So, saving money on gear is the 1st hint ... The 2nd? (...) > The money in sweeping is made by the manufacturers and resellers of > NEW equipment. It is not made by providing the service or in selling > used equipment. (...) Regarding profit, should be sweeping the sheery on the cake? For example, for a physical security company? Not much for a ITSec company? Other issue ... Lets say that there is a room for a meeting that we know it's 'clear'. Also we don't want to do a sweep on any person who enter the room for the meeting. Is ther such a thing as a portal for this? FM 6317 From: Steve Uhrig Date: Fri Oct 4, 2002 11:20am Subject: This sounds like a contract for one of the spy shops or technoweenies on this list: http://www.bidradar.com/d.asp?D=20021004&S=GBS-20021003STA77-349171 ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6318 From: Matt Paulsen Date: Fri Oct 4, 2002 0:18pm Subject: Recommended for Boy Scout Merit Badge!!! Only from Utah... -------------------------------- FM Bug - Educational FM Transmitter with Microphone $10.95 9945 This is a great kit with many fun and interesting ways it can be used. You can monitor or 'listen in on' conversations in the next room; or you can transmit sounds and conversaions to your FM receiver. (Note: inexpensive transmitters may drift frequency) Easy to build and maintain. Make several. Comes with complete instructions. Give them as gifts to your friends. http://www.hobbytron.net/9945.html 6319 From: Marcel Date: Fri Oct 4, 2002 1:52pm Subject: Security Agency Signs New Contract http://story.news.yahoo.com/news?tmpl=story&u=/ap/20021001/ap_on_hi_te/electronic_eavesdropping_2 -- "NEXTEL-1 IT'S NOT JUST NEXTEL" Note The New address Subscribe to Nextel-1: http://www.groups.yahoo.com/subscribe/NEXTEL-1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 6320 From: Steve Uhrig Date: Fri Oct 4, 2002 5:59pm Subject: RE: Don't buy graymarket...why? On 4 Oct 2002 at 9:52, Fernando Martins wrote: > Since I'm new in this specific field, I'm allowed to make basic > questions ... > I suppose one has to put in one side "what do I need the equipment can > do?" and in the other side "what the equipment really can do?" ... The > problem to new ones is that there are a huge list to answer the 2nd > question, and just a little list to answer the 1st ... So the hint is > to buy the equipment that just to the stuff of the short list, and > probably one will find that the right piece is the used/old one. Along > with the issue that it's well known to the experts, so advices on the > use or assistance will be smooth and cheap. This is well said. > So, saving money on gear is the 1st hint ... The 2nd? Some in general in no particular order: 1)You rarely *really* have to jump on something. Another whatever it is always will come along. 2)Don't buy ANYTHING until you know exactly what it is, why you need it and how you will learn to use it. 3)Possessing equipment does not make you a big boy. Knowing how to use it might. Better to have simple equipment you know how to use than very expensive fancy kit you don't. 4)Don't buy ANYTHING until you KNOW how it will earn you a profit. 4.5)Very little equipment will ever earn you a profit. 5)Start simple. Once you buy a basic kit, learn with it, use it, practice with it, and do some simple paying jobs. Once you have earned enough with the simple kit to pay yourself back for it AND have paid yourself a fair wage, then start saving towards new gear. 6)Don't EVER borrow to buy TSCM gear. That is stupid for practically everyone. If you put it on a credit card, be prepared to pay off the card as soon as the statement comes. If you can't do that, you can't afford the equipment and you shouldn't buy it. Earn and save the money first. You are only deluding yourself (fooling yourself) by thinking you will buy all the fancy equipment then go out and sell the work. Having the equipment doesn't sell jobs. Sales skills sells jobs. Nothing starts till you sell something. If you can't sell now, you won't sell any better after buying a lot of equipment. Much more important to be a businessman than a technician, although there are a lot more technicians than businessmen. 7)Ask any and all questions you wish regarding a specific piece of equipment, general equipment, or techniques on this list. There are a few experienced people here who will work with honest persons trying to learn. Remember to respect the teacher, especially since he is donating time to working with you which he could be using to earn more money for himself. 8)Do your homework. Know what a fair price is for anything you propose to buy, new or used. Don't take someone's word for it unless and until they have proven their word is good. Especially don't use spy shop website prices for reference. Ask on this list for honest people to deal with, or ask if you see something for sale, if the seller and the equipment is good. There are enough people on this list to where between all of us someone will know every piece of equipment and someone will know every seller. 9)Don't EVER buy ANYTHING from a spy shop. It is almost impossible to get an honest deal from a spy shop. It is impossible to get a good price. 10)Your money, if you have to spend it, is much better spend educating yourself than on toys. Technical courses, basic electronics, communications both wired and wireless, ham radio texts and magazines, business courses, sales courses. All are important. Almost every professional sweeper I can think of is a ham radio operator. That is a hobby which can teach and entertain you for life, and assist in many technical professions. 11)Don't buy anything made by CCS, Great Southern Security or the large schlock places who make garbage. Ask here if you are not sure of something. You will learn the truth. 12)Avoid antique pieces of TSCM gear. A lot of it is no longer usable. I see people paying outrageous used prices for telephone analyzers which at one time were usable on the old electromechanical phones but useless on electronic phones. Older stuff like early Audiotel/Scanlock, Mason receivers, early ISA, stuff from TSCM specialist companies out of business generally is a poor investment. When it was new it may have been the best stuff in the world. The world has changed. Service is not available on most of this equipment, although if you are buying stuff like this you darn well should be educated and experienced enough to repair it, but you probably aren't. There is little service and practically no parts, manuals or maintenance for some of the early gear. In its day it may have been very nice, but now it's a boat anchor. 13)TSCM gear does not come from ebay. There are pieces now on ebay, right now, which I believe are quality control rejects from a former manufacturer of excellent equipment. Don't buy on name and don't buy unless you know why you need the thing and how you will make money on it. And don't buy it thinking you will just get it repaired if it doesn't work. While some of us can and do repair nearly anything, you can't afford our rates, and for the cost of the repairs you could buy something better for the price and not have the hassle. Re ebay, why buy where you must pay the HIGHEST price of anyone on the PLANET to get something, especially if it is not new from the manufacturer WITH THE MANUFACTURER's GUARANTEE? The stuff on ebay now is claimed to be new, but the manufacturer is no longer operating and will not service it. That manufacturer would have sold the equipment as new when he was operating if the equipment was perfect. Since he didn't, it stuck around until he closed down shop. And you're thinking of buying it? 14)If you are thinking of buying something from someone, ask why that someone wants to sell it? They probably bought it without learning first thinking all they have to do is turn it on and watch the lights blink and start making trips to the bank. Don't make the same mistake they did. If they made a mistake and you have done your homework, you may be able to profit from their mistake by saving money. But don't do the same thing they did unless you expect the same results they got. =============== I wrote the above. I sell used TSCM equipment. Many people who call me to buy equipment should not be buying it. When someone who sells something tells you not to buy it, he probably is one of the rare people who is telling you the truth. > Regarding profit, should be sweeping the sheery on the cake? For > example, for a physical security company? Not much for a ITSec company? There are very few people who make a profit on TSCM services at all, let alone as an only service. Offhand, I know of only six companies who make a full time living off doing TSCM, and very very few of us will ever be in their league. Most people wanting to do TSCM would make more money referring the work to an experienced person who already has education, experience and equipment. They will pay you a referral fee. Maybe you can work with them as a trainee. And doing this is the most honest thing for the client, which should be your #1 interest. > Other issue ... Lets say that there is a room for a meeting that we > know it's 'clear'. Also we don't want to do a sweep on any person who > enter the room for the meeting. Is ther such a thing as a portal for > this? I think you mean could someone come into a room for a meeting after it has been inspected and declared secure, and collect information? Yes. If RF is a threat, there is a service called IPM, or In Place Monitoring. That looks for new RF signals to come on the air during a meeting in a conference room, for example. You would have equipment set up before hand, in that area, and be monitoring from a nearby room. But that is only good for RF (transmitters). RF is the least likely thing to be used. Transmitters which work are expensive, hard to get, need a nearby listening post (receiver and recorder), and are suspicious if noticed. Much cheaper and no suspicion at all are small audio recorders which many businessmen carry and use daily, and are almost impossible to detect. Short of searching everyone and every thing that comes into the room, there's not much you can do. Don't be afraid to ask questions. We all learn, and no one is born knowing all about these things. Information is passed down from older, experienced persons to younger ones just starting. You are lucky to have this list, where you can get advice from honest and experienced persons for free. You make good points. Thank you. This would be a good message for novices to print and save and reread before bidding on ebay or reaching for their credit cards. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6321 From: Kevin Murray Date: Fri Oct 4, 2002 6:32pm Subject: Re: Steve's general advice to beginners... Fernando, There is little I can add to Steve's comments. Trust what he is saying. He really is a voice of experience with no hidden agenda. Very rare. My small contributions to Steve's list are the following thoughts... - Educate yourself enough to know what you need to accomplish... then research and purchase instrumentation which will help you accomplish your needs, not vice versa. This is a subtle point. - If you don't find what you need, create it. Don't settle for less. It is not uncommon to spot the needs long before manufacturers determine it is worthwhile for them to offer appropriate solutions. Practitioners create innovative solutions far more often (and faster) than manufacturers. - Your value to a client is not in sweeping for bugs. That is not your real business. Your business is solving their problems and concerns. Keep your eye on problem solving and you will be providing a worthwhile service. TSCM is just one element of the solution. - Don't take anyone's word for anything. Experiment and test for yourself. Best wishes for success, and please consider partnering with us for your client's US needs. Kevin Kevin D. Murray - CPP, CFE, BCFE Murray Associates Eavesdropping Detection and Counterespionage Consultants to Business & Government http://www.spybusters.com On Friday, October 4, 2002, at 06:59 PM, Steve Uhrig wrote: > On 4 Oct 2002 at 9:52, Fernando Martins wrote: > >> Since I'm new in this specific field, I'm allowed to make basic >> questions ... > >> I suppose one has to put in one side "what do I need the equipment can >> do?" and in the other side "what the equipment really can do?" ... The >> problem to new ones is that there are a huge list to answer the 2nd >> question, and just a little list to answer the 1st ... So the hint is >> to buy the equipment that just to the stuff of the short list, and >> probably one will find that the right piece is the used/old one. Along >> with the issue that it's well known to the experts, so advices on the >> use or assistance will be smooth and cheap. > > This is well said. > >> So, saving money on gear is the 1st hint ... The 2nd? > > Some in general in no particular order: > > 1)You rarely *really* have to jump on something. Another whatever it > is always will come along. > > 2)Don't buy ANYTHING until you know exactly what it is, why you need > it and how you will learn to use it. > > 3)Possessing equipment does not make you a big boy. Knowing how to > use it might. Better to have simple equipment you know how to use > than very expensive fancy kit you don't. > > 4)Don't buy ANYTHING until you KNOW how it will earn you a profit. > > 4.5)Very little equipment will ever earn you a profit. > > 5)Start simple. Once you buy a basic kit, learn with it, use it, > practice with it, and do some simple paying jobs. Once you have > earned enough with the simple kit to pay yourself back for it AND > have paid yourself a fair wage, then start saving towards new gear. > > 6)Don't EVER borrow to buy TSCM gear. That is stupid for practically > everyone. If you put it on a credit card, be prepared to pay off the > card as soon as the statement comes. If you can't do that, you can't > afford the equipment and you shouldn't buy it. Earn and save the > money first. You are only deluding yourself (fooling yourself) by > thinking you will buy all the fancy equipment then go out and sell > the work. Having the equipment doesn't sell jobs. Sales skills sells > jobs. Nothing starts till you sell something. If you can't sell now, > you won't sell any better after buying a lot of equipment. Much more > important to be a businessman than a technician, although there are a > lot more technicians than businessmen. > > 7)Ask any and all questions you wish regarding a specific piece of > equipment, general equipment, or techniques on this list. There are a > few experienced people here who will work with honest persons trying > to learn. Remember to respect the teacher, especially since he is > donating time to working with you which he could be using to earn > more money for himself. > > 8)Do your homework. Know what a fair price is for anything you > propose to buy, new or used. Don't take someone's word for it unless > and until they have proven their word is good. Especially don't use > spy shop website prices for reference. Ask on this list for honest > people to deal with, or ask if you see something for sale, if the > seller and the equipment is good. There are enough people on this > list to where between all of us someone will know every piece of > equipment and someone will know every seller. > > 9)Don't EVER buy ANYTHING from a spy shop. It is almost impossible > to get an honest deal from a spy shop. It is impossible to get a good > price. > > 10)Your money, if you have to spend it, is much better spend > educating yourself than on toys. Technical courses, basic > electronics, communications both wired and wireless, ham radio texts > and magazines, business courses, sales courses. All are important. > Almost every professional sweeper I can think of is a ham radio > operator. That is a hobby which can teach and entertain you for life, > and assist in many technical professions. > > 11)Don't buy anything made by CCS, Great Southern Security or the > large schlock places who make garbage. Ask here if you are not sure > of something. You will learn the truth. > > 12)Avoid antique pieces of TSCM gear. A lot of it is no longer > usable. I see people paying outrageous used prices for telephone > analyzers which at one time were usable on the old electromechanical > phones but useless on electronic phones. Older stuff like early > Audiotel/Scanlock, Mason receivers, early ISA, stuff from TSCM > specialist companies out of business generally is a poor investment. > When it was new it may have been the best stuff in the world. The > world has changed. Service is not available on most of this > equipment, although if you are buying stuff like this you darn well > should be educated and experienced enough to repair it, but you > probably aren't. There is little service and practically no parts, > manuals or maintenance for some of the early gear. In its day it may > have been very nice, but now it's a boat anchor. > > 13)TSCM gear does not come from ebay. There are pieces now on ebay, > right now, which I believe are quality control rejects from a former > manufacturer of excellent equipment. Don't buy on name and don't buy > unless you know why you need the thing and how you will make money on > it. And don't buy it thinking you will just get it repaired if it > doesn't work. While some of us can and do repair nearly anything, you > can't afford our rates, and for the cost of the repairs you could buy > something better for the price and not have the hassle. Re ebay, why > buy where you must pay the HIGHEST price of anyone on the PLANET to > get something, especially if it is not new from the manufacturer WITH > THE MANUFACTURER's GUARANTEE? The stuff on ebay now is claimed to be > new, but the manufacturer is no longer operating and will not service > it. That manufacturer would have sold the equipment as new when he > was operating if the equipment was perfect. Since he didn't, it stuck > around until he closed down shop. And you're thinking of buying it? > > 14)If you are thinking of buying something from someone, ask why > that someone wants to sell it? They probably bought it without > learning first thinking all they have to do is turn it on and watch > the lights blink and start making trips to the bank. Don't make the > same mistake they did. If they made a mistake and you have done your > homework, you may be able to profit from their mistake by saving > money. But don't do the same thing they did unless you expect the > same results they got. > > =============== > > I wrote the above. I sell used TSCM equipment. Many people who call > me to buy equipment should not be buying it. When someone who sells > something tells you not to buy it, he probably is one of the rare > people who is telling you the truth. > >> Regarding profit, should be sweeping the sheery on the cake? For >> example, for a physical security company? Not much for a ITSec >> company? > > There are very few people who make a profit on TSCM services at all, > let alone as an only service. > > Offhand, I know of only six companies who make a full time living off > doing TSCM, and very very few of us will ever be in their league. > > Most people wanting to do TSCM would make more money referring the > work to an experienced person who already has education, experience > and equipment. They will pay you a referral fee. Maybe you can work > with them as a trainee. And doing this is the most honest thing for > the client, which should be your #1 interest. > >> Other issue ... Lets say that there is a room for a meeting that we >> know it's 'clear'. Also we don't want to do a sweep on any person who >> enter the room for the meeting. Is ther such a thing as a portal for >> this? > > I think you mean could someone come into a room for a meeting after > it has been inspected and declared secure, and collect information? > > Yes. > > If RF is a threat, there is a service called IPM, or In Place > Monitoring. That looks for new RF signals to come on the air during a > meeting in a conference room, for example. You would have equipment > set up before hand, in that area, and be monitoring from a nearby > room. > > But that is only good for RF (transmitters). RF is the least likely > thing to be used. Transmitters which work are expensive, hard to get, > need a nearby listening post (receiver and recorder), and are > suspicious if noticed. Much cheaper and no suspicion at all are small > audio recorders which many businessmen carry and use daily, and are > almost impossible to detect. Short of searching everyone and every > thing that comes into the room, there's not much you can do. > > Don't be afraid to ask questions. We all learn, and no one is born > knowing all about these things. Information is passed down from > older, experienced persons to younger ones just starting. You are > lucky to have this list, where you can get advice from honest and > experienced persons for free. > > You make good points. Thank you. > > This would be a good message for novices to print and save and reread > before bidding on ebay or reaching for their credit cards. > > Regards ... Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* 6322 From: James M. Atkinson Date: Fri Oct 4, 2002 10:37pm Subject: RE: Don't buy graymarket...why? At 4:45 PM -0400 10/3/02, Steve Uhrig wrote: >On 2 Oct 2002 at 8:48, Matt Paulsen wrote: > >> When purchasing new products and/or services from a reputible dealer / >> vendor, the goal is to ensure that you, the customer, maximize your >> investment. All too often we see some unsuspecting customer (re: poor >> sap/sucker-o'-da-day) enticed into buying by the lower prices of >> used/graymarket/blackmarket equipment, only to find out later that >> their product has been altered, not warrantied, is end-of-lifed or no >> longer valid in some other respect. >> >> More importantly, the questionable integrity of used / refurbished / >> gray market quipment undermines the potential benefits that are >> received through lower costs. The end result is that your "great deal" >> may leave you without the support you need, and may even result in >> service interruptions that could impact the operations of your >> business. > >Make the distinction between used and new. Don't paint a blanket >stripe with your whitewash brush. Good point, but new equipment is new equipment that will have a minimum of problems, and used equipment is well... used equipment that you may or may not get to work when you need it most. >The majority of people who buy new TSCM equipment are those who are >new to the field, have not done their homework, do not know what to >buy, and are ripe pickings. Those frequently are the ones who get >ripped off. I have to disagree. I buy new equipment myself, but I also buy used equipment. Each has it's own benefits and risks. If you buy used equipment you can usually squeeze some life into it, but eventually it will have to be replace with more used equipment. This is not the case with NEW equipment, but with new equipment you will have to part with more cash, but you will have it longer, and will have less problems with it. There are always problems finding parts for obsolete models, and good luck finding parts for anything more then 10 years old. >If you inquired of an accurate representative of GENIUNE TSCMers (and >there are few around, this list included) you will find very few of >them bought new gear. About half of the hard-core TSCM people bought their equipment used, and about 25% of the "not-so hard-core" bought new. Don't ever try to cut corners with the tools of your trade... but also don't pass up a good deal. A painter who buy's only used brushes is not long for his profession. >There is a plethora of used equipment out there, virtually all >purchased by someone with more money than brains, the guys who insist >on spending a year's pay for toys without bothering to do a month's >worth of research, the guys who think owning some special new >expensive something automatically confers on them some sort of >unearned status and they are ready to play with the big boys. I both agree and I disagree. Yes, there are way too many people buying equipment without first doing their homework, and more then a few people who will rush to buy whatever the new toys being offered is. But there are also quite a few people who carefully research their purchases, and who rarely buy used gear. >Very very few of the big boys bought new. I have to strongly disagree. Many of the big boys buy new, but they used buy used gear if it is in good condition and being offered at a good price. It all depends on how many hours a year they spend doing sweeps. If someone does 12 one day low threat sweeps a year, then ten to fifteen year old used gear is fine... but if you spend several days a week performing sweeps then the majority of your gear will be new state of the art. >Offhand, except for low cost stuff like toners, I can't think of a >single major piece of equipment I use which I bought new, and I can >pretty much afford anything available. I have bought new, an Oscor >once, and that turned out to be a dismal mistake which I had to prove >to myself. I used to buy used toner and inkjet cartridges, but I learned that it was a bad idea. I have also bought new equipment that turned out to be a dog, but then I have also gotten burned with used gear. If a TSCM specialist is going to be taking highly sensitive repeatable measurements with instruments that are in calibration, and traceable to a government standard then you'll be buying almost exclusively NEW equipment. There are quite a few high threat TSCM customers who insist on all measurements being certified and traceable, require that all measurements be hard-copied, and require that the person who took the measurements certify each measurement in writing. This is very common on bug sweeps done for defense contractors, government clients, or anybody else who need a high risk sweep performed. >There are honest used equipment dealers out there, some of whom >specialize in used TSCM, who will work with you to get you a proper >kit in perfect working order, recently calibrated, with all >accessories, new batteries, manuals, etc. for half of what the thing >would cost new. And the dealers will provide extensive post-sale >support which is nearly unheard of with manufacturers of new >equipment. Support ends when your check clears. Unless you are waving >more money in their faces, don't expect most manufacturers to do >anything for you other than pay lip service. There are also a few honest NEW equipment dealers out there... we are one of them. But there are also a small number of USED equipment dealers... Steve is one of them. If you need NEW equipment give me a call, if you need used equipment check with Steve. >You can buy new and have a warm wet feeling. Maybe you'll be the one >in a hundred who actually ultimately turns a profit on TSCM. Chances >are 99:1 you never will. Then you or your widow or your creditors can >sell your expensive new piece of gear to a used equipment dealer, who >will resell it to someone for half of what you paid. They have a lot >better chance of making money, since they spent half of what you did >to gear up. Their chances probably double, to odds of only 50:1 >against turning a profit in sweeping. Nah, I would say the odds are a little better then that (with all things being equal). If you buy new equipment your odds of success (over two years) are about 25%, with used equipment that odds are success are more like 10%. Of course this would assume that the user of the equipment is capable of scratching up enough work to keep their business growing. >The money in sweeping is made by the manufacturers and resellers of >NEW equipment. It is not made by providing the service or in selling >used equipment. The money is in delivering the actual sweep services as the market for new of used equipment is fairly limited compared to the market for services. >One popular manufacturer will sell more in new hardware this year, >90% to people who will never use it but will show it off to everyone, >than all the sweep service revenue generated in the U.S. by all the >legitimate sweepers. Probably an accurate assessment of the situation. > > And absolutely DON'T COMMIT TO ANYTHING until the cash is in the >> bank/the product is received and you have fully ensured that it meets >> your needs (or more simply, don't buy it to begin with as I said >> earlier). > >This is unrealistic advice. Very few sellers of new or used gear will >offer the equipment before receiving payment. The accepted practice is to cough up the money first, and THEN get the equipment... if you don't know what you buying, then don't buy the equipment. >Better would be to deal with a seller who has an outstanding >reputation of representing his products honestly, providing what he >says he will (or more) and gives you lifetime free support after the >sale even when he knows you're not looking to buy more kit from him. An honest dealer of either new or used equipment will not only tell you the benefits of the equipment, but will also tell you about any problems or weaknesses. >Believe it or not, there are dealers who try to talk people OUT of >buying gear which is not appropriate for their needs, gear which >might be OK but the potential buyer has not done enough homework to >make an informed buying decision, or will refer them to another >source for gear which may be a better value or more suitable. Yep, I talk people out of equipment all the time. > > Additionally, many people look to refurb equipment to save costs >> thinking that the equipment will be manufacturer warrantied (which it >> may be) and cheaper - avoid it and look for a volume dealer or a >> broker to make your purchase for new equipment. > >The above sounds a lot like someone who sells new gear is >experiencing competition from refurb sellers. What is a "Volume Dealer"? Instead look for a dealer who is an authorized manufacturer representative. If your buying refurb equipment make sure that it was the FACTORY that did the refurb, and not some SpyShop with a hot melt glue gun and a bottle of Windex. The only warranty you can every count on is one given from the factory or factory rep, and not the dealer. >There is no such thing as volume dealers for TSCM equipment. The >market isn't there to support what most would consider 'volume'. 20 >pieces a year is not volume. 100 pieces probably isn't by most >standards. I am not including the spy shops who sell manure packaged >in plastic chassis as TSCM suppliers. Back when we sold ICOM >receivers, volume meant several thousand receivers a year. I am still trying to figure out what a "volume dealer" is. One competent TSCM dealer can move 300-500k a year in new or used equipment with only a minimum of effort. A dealer with a really good Rolodex and a good client base can move three to eight times that amount. "High Volume" means anything over 500k is sales per employee per year, and it is virtually impossible to yet a discount, so don't even try. >I am not aware of the above situation in the TSCM world. No one >expects manufacturer warranties on anything except equipment >purchased new. And not many buy new, at least not informed people. >Novices buy new. Pros, or those with potential to be pros, do their >homework, take their time, research, save, network, ask questions, >and buy used when they find something appropriate. Offhand, I only >know one professional sweeper who purchased a new spectrum analyzer >(not counting the low cost Avcoms which are so cheap that it's no >crime to buy them new). I've owned and used literally several hundred >pieces of TSCM-specific gear, and only one piece was purchased new to >the best of my recollection. Like I said... Pro's buy new, and pro's also buy used. I personally know of a number of TSCM people (including myself) who have purchased high end spectrum analyzers new. >The TSCM world is very different from other technical fields. There >are more pieces of Cisco in my state than there are pieces of TSCM >equipment in the world. You can't make the comparison. Good point, but let me point out that someone who only performs bug sweeps will likely find themselves selling off their equipment in a few years just to buy groceries. It's critical that you find other uses for both the equipment and your skills in similar work. For example, if you have a primo-primo set of equipment you can perform EMI/EMC work, site surveys and so on. >Offhand, I don't know of anyone who sells 'refurbished' TSCM gear who >even remotely implies the manufacturer's warranty is valid. There are >places who sell used TSCM gear and warranty it themselves. Persons >who buy from those types of dealers typically save 50% on their >equipment and typically get a far higher level of tech support. You >can be a lot more profitable when your equipment costs are half that >of your competition. > >Ask around and I think you'll discover my above statements represent >the true state of the onion in the TSCM industry. Steve is mostly correct, and I agree with most of what he said. For full disclosure let me add that I provide sweep services, sell NEW equipment, design equipment, and do some low volume manufacturing. I also design and install high performance voice and data networks, offer crypto equipment, and supply a wide range of technical counterintelligence goods and services. >Steve > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6323 From: James M. Atkinson Date: Fri Oct 4, 2002 10:49pm Subject: ...and now a word from our sponsors Good Evening, You may or may not be aware of this but, i am primarily available to respond to any location in the North-Eastern quadrant of the United States, including all cities within 500 mile (or one day drive) of Boston. These cities include: Boston, New York, Providence, Philadelphia, Pittsburgh, Washington DC, Richmond, Cleveland, and so on. I also have another coverage area that includes all locations within a 1200 mile radius (or two-day drive) of Boston. This area starts at Savannah and Atlanta, Georgia then sweeps Northwest to include St. Louis, Springfield, Chicago and most of the central Mid-West area East of the Mississippi. We can bring a highly sophisticated, expensive, and portable counter-intelligence electronics lab built into a truck (which no other TSCM firm has) to any location within 1200 miles of Boston in a matter of days, and often just hours. Referral Fees and Subcontracting Private investigators and other security professionals can make a lot more money on simple referral fees, then they can by obtaining low cost sweep gear on their own or buying "blinky-boxes" and trying to perform a sweep themselves. If a security or investigative firm tries to do the job, and are lacking in equipment, training, and background they could likely loose their insurance, get sued by the client, or even lose their license. Leave the sweep work to those firms which have years of experience, tons of equipment, and deal with this stuff on a regular basis; by doing so you will actually make more money (see below). We have a referral program which we offer to security and investigative professionals. We do not pay a referral fee to people actually inside the clients firm, and strictly limit referral fee to those obviously outside the company. Referral fees are only payable on actual billable time, and does not include expenses (lodging, airfare, expendable materials, film, and so on). We pay a referral fee for projects involving more then four hours of work, and pay the referral fees generated by all contact with the client for a period of up to one year. In the case where one contact brings us in early in the year, and then later the same year some other contact has us come in, the fee is split between them. The only wrinkle is that in some really large companies we may have multiple separate channels into the same company, and referral fees only apply for those channels developed though the external contacts. For example we may have been doing sweep work directly for the CEO for ten years, but a PI may arrange a sweep for another executive (in which case the PI gets a referral fee for the sweep for the second executive, but not for the CEO's projects) We break our program into three levels, each depends on the amount of involvement of the person who sets up the project. 10% - This is for a basic referral where a contact specifically sends a client to us, makes the initial introductions, and the client confirms and understands that this is a ref feral. We bill the client directly, and the contact does not involve their own money in getting us paid. The contact may or may not be present during the sweep, and related meetings. This is a typical corporate referral. 15% - This is just like a basic referral; however, we get paid directly by the contact who brought us in (typically as a subcontractor). The contact will be involved in all future contact with the client (for at least one year). The contact will typically assist with the sweep to a limited extent, and will "show their face" so the client sees that they are involved (but this is strictly up to them). We write the report on our own letterhead and send it to the contact who can then handle it as they see fit. This is a typical PI or security firm referral where are brought in as a sub. 20% - The contact becomes much more involved in the sweep, pays us completely out of their own funds, and is present (and helping to a great extent) during every element of the sweep. They will be present from the time the truck arrives, and will shadow and help during the entire sweep until finished (and all of the equipment is back on the truck). In effect the contact becomes an assistant, helps with the physical search, furniture moving, charting, and so on (but does not actually operate any of the instruments). They will write the final report to the client on their own letterhead (with our inputs). This is a PI or security firm referral where we are brought in as a sub, but the contact wants to be heavily involved in the actual sweep. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6324 From: Matt Paulsen Date: Sat Oct 5, 2002 9:09pm Subject: joke/off topic.. in search of my daughters 1st costume.. we find this... Something is just wrong here... http://www.brandsonsale.com/chilsizpimda.html http://store4.yimg.com/I/brandsonsale-store_1708_9396320 6325 From: Kirk Adirim Date: Sat Oct 5, 2002 9:54pm Subject: RE: joke/off topic.. in search of my daughters 1st costume.. we find this... Oct. 5 Matt wrote, "Something is just wrong here... http://www.brandsonsale.com/chilsizpimda.html http://store4.yimg.com/I/brandsonsale-store_1708_9396320" Your right, after looking at the pictures I couldn't see his Powder Blue Cadillac or his "Girls" But seriously, Who would think this stuff up? Let alone buy this for their kids... It's a sick society we live in. Kirk ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6326 From: James M. Atkinson Date: Sun Oct 6, 2002 6:41pm Subject: Nanny-Cam May Leave a Home Exposed April 14, 2002, Sunday BUSINESS/FINANCIAL DESK Nanny-Cam May Leave a Home Exposed By JOHN SCHWARTZ (NYT) 1758 words Thousands of people who have installed a popular wireless video camera, intending to increase the security of their homes and offices, have instead unknowingly opened a window on their activities to anyone equipped with a cheap receiver. The wireless video camera, which is heavily advertised on the Internet, is intended to send its video signal to a nearby base station, allowing it to be viewed on a computer or a television. But its signal can be intercepted from more than a quarter-mile away by off- the-shelf electronic equipment costing less than $250. A recent drive around the New Jersey suburbs with two security experts underscored the ease with which a digital eavesdropper can peek into homes where the cameras are put to use as video baby monitors and inexpensive security cameras. The rangy young driver pulled his truck around a corner in the well-to-do suburban town of Chatham and stopped in front of an unpretentious house. A window on his laptop's screen that had been flickering suddenly showed a crisp black-and-white video image: a living room, seen from somewhere near the floor. Baby toys were strewn across the floor, and a woman sat on a couch. After showing the nanny-cam images, the man, a privacy advocate who asked that his name not be used, drove on, scanning other houses and finding a view from above a back door and of an empty crib. In the nearby town of Madison, from the parking lot of a Staples store, workers could be observed behind the cash register. The driver walked into the store and pointed up at a corner of the room. ''Take a look,'' he said. Above the folded-back steel security shutters was a nubbin of technology: a barely perceptible video camera looking down on the employees. ''I can only imagine driving around the Bay Area with one of these,'' said Aviel D. Rubin, a security researcher at AT&T Labs, which identified the problem. Around San Francisco, high-technology toys like security cameras are likely to be far more common. Mr. Rubin tries to help the business world recognize security threats and address them. Although there is no evidence that video snooping is widespread, it is so easy and the opportunity to do it is so great that it is a cause for concern, said Mr. Rubin, who was along for the ride. Such digital peeping is apparently legal, said Clifford S. Fishman, a law professor at the Catholic University of America and the author of a leading work on surveillance law, ''Wiretapping and Eavesdropping.'' When told of the novel form of high-technology prying, Professor Fishman said, ''That is astonishing and appalling.'' But he said that wiretap laws generally applied to intercepting sound, not video. Legal prohibitions on telephone eavesdropping, he said,were passed at the urging of the telecommunications industry, which wanted to make consumers feel safe using its products. ''There's no corresponding lobby out there protecting people from digital surveillance,'' he said. Some states have passed laws that prohibit placing surreptitious cameras in places like dressing rooms, but legislatures have generally not considered the legality of intercepting those signals. Nor have they considered that the signals would be intercepted from cameras that people planted themselves. ''There's no clear law that protects us,'' Professor Fishman said. ''You put it all together, the implications are pretty horrifying.'' With no federal law and no consensus among the states on the legality of tapping video signals, Professor Fishman said, ''The nanny who decided to take off her dress and clean up the house in her underwear would probably have no recourse'' against someone tapping the signal. Police officers with search warrants could use the technology for investigative purposes, as well, he suggested. Surveillance has been a growing part of American life, especially since Sept. 11. Video cameras have been installed on city streets, and some cities and airports have tried to tie cameras into facial recognition systems, with mixed results. Privacy advocates argue that the benefit to security is questionable and the intrusiveness is high. But the cameras continue to proliferate -- with many people buying them for personal use. Surveillance cameras have also sprouted at intersections to catch drivers who speed or run red lights and as a part of many voyeur-oriented pornographic Web sites. Ads for the ''Amazing X10 Camera'' have been popping up all over the World Wide Web for months. The ads for the device, the XCam2, carry a taste of cheesecake -- usually a photo of a glamorous-looking woman in a swimming pool or on the edge of a couch. But, in fact, many people have bought the cameras for far more pedestrian purposes. ''Frankly, a lot of it is kind of dull,'' and most of the women being surreptitiously observed are probably nannies, said Marc Rotenberg, the executive director of the Electronic Privacy Information Center in Washington. He calls the X10 ads ''one of the weird artifacts of the Internet age.'' The company that sells the cameras, X10 Wireless Technology Inc. of Seattle, was created in 1999 by an American subsidiary of X10 Ltd., a Hong Kong company. It is privately held and does not release sales figures. A spokesman, Jeff Denenholz, said the company had no comment for this article. Filings with the Securities and Exchange Commission for an initial public stock offering that was later withdrawn provide some figures, however. X10 lost $8.1 million on revenue of $21.3 million for the nine months ended Sept. 30, 2000, and said that 52 percent of its revenue came from wireless camera kits. At the camera's current retail price of about $80, that would translate to sales of more than 138,000 cameras in those nine months alone. Rob Enderle, an analyst at the Giga Information Group, a technology consulting business, said he was a big fan of X10 -- which sells the most popular wireless cameras on the consumer market -- and its wares. ''Theirs is the least expensive option out there, and they actually do a good job,'' he said. Mr. Enderle was surprised to hear of the cameras' lack of security, but said he did not see a cause for great concern. ''Clearly, if you are pointing that at areas like your bathroom or shower, there may be people enjoying that view with you,'' he said. ''But fundamentally, you shouldn't be pointing it that way anyway.'' The vulnerability of wireless products has been well understood for decades. The radio spectrum is crowded, and broadcast is an inherently leaky medium; baby monitors would sometimes receive signals from early cordless phones (most are scrambled today to prevent monitoring). A subculture of enthusiasts grew up around inexpensive scanning equipment that could pick up signals from cordless and cellular phones, as former Speaker Newt Gingrich discovered when recordings of a 1996 conference call strategy session were released by Democrats. More recently, with the advent of wireless computer networks based on the increasingly popular technology known as WiFi, yet another new subculture has emerged: people known as ''war drivers'' who enter poorly safeguarded wireless networks while driving or walking around with laptops. In the case of the XCam2, the cameras transmit an unscrambled analog radio signal that can be picked up by receivers sold with the cameras. Replacing the receiver's small antenna with a more powerful one and adding a signal amplifier to pick up transmissions over greater distances is a trivial task for anyone who knows his way around a RadioShack and can use a soldering iron. Products intended for the consumer market rarely include strong security, said Gary McGraw, the chief technology officer of Cigital, a software risk-management company. That is because security costs money, and even pennies of added expense eat into profits. ''When you're talking about a cheap thing that's consumer grade that you're supposed to sell lots and lots of copies of, that really matters,'' he said. Refitting an X10 camera with encryption technology would be beyond the skills of most consumers. It is best for manufacturers to design security features into products from the start, because adding them afterward is far more difficult, Mr. McGraw said. The cameras are only the latest example of systems that are too insecure in their first versions, he said, and cited other examples, including Microsoft's Windows operating system. ''It's going to take a long time for consumer goods to have any security wedged into them at all,'' he said. Another wireless camera, the DCS-1000W from D-Link Systems Inc., does offer encrypted transmission and ties into standard WiFi networks -- but it costs at least $350. As a security expert, Mr. Rubin said he was concerned about the kinds of mischief that a criminal could carry out by substituting one video image for another. In one scenario, a robber or kidnapper wanting to get past a security camera at the front door could secretly record the video image of a trusted neighbor knocking. Later, the robber could force that image into the victim's receiver with a more powerful signal. ''I have my computer retransmit these images while I come by,'' he said, explaining the view of a would-be robber. Far-fetched, perhaps. That is the way security experts think. But those who use the cameras and find out about the security hole seem to grasp the implications quickly. Back at the Staples store in Madison, employees said they did not know that they were being watched by security monitors. The manager of the store, when asked whether he knew that his cameras were broadcasting to the outside world, seemed somewhat shaken, and excused himself to go into his office, he said, to put down the small display carousel he was carrying. He did not return. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6327 From: Doreen Date: Sun Oct 6, 2002 2:59pm Subject: Listening devices Has anyone heard of an eavesdropping device that can be placed in or on a toilet? 6328 From: Doreen Date: Sun Oct 6, 2002 2:41pm Subject: police eavesdropping Does anyone know the most commonly used AVL system used by the state of California for surveillance tactics, where is would most likely be placed ? Also is it legal for law enforcement to listening in on a house from another neighbors house and allow them to listen also? thanks 6329 From: kondrak Date: Sun Oct 6, 2002 8:35pm Subject: Re: police eavesdropping When its the cops, there are no rules, they simply lie... At 19:41 10/6/02 +0000, you wrote: >Does anyone know the most commonly used AVL system used >by the state of California for surveillance tactics, where is would >most likely be placed ? Also is it legal for law enforcement to >listening in on a house from another neighbors house and >allow them to listen also? thanks 6330 From: Steve Uhrig Date: Sun Oct 6, 2002 9:06pm Subject: Re: police eavesdropping > Does anyone know the most commonly used AVL system used by the state of > California for surveillance tactics, where is would most likely be > placed ? Also is it legal for law enforcement to listening in on a > house from another neighbors house and allow them to listen also? I believe you may have incorrectly read the description of this list. We are in the business of protecting information, not giving details on how to uncover it. There are plenty of Usenet groups where people would be happy to answer questions like the above with all sorts of fantasies and misinformation. That is the place for questions like the above. A significant portion of members here are current or former law enforcement, federal agency or military employees. Our highest loyalty is upholding the law. You are asking the wrong questions of the wrong people in the wrong place. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6331 From: Doreen Date: Sun Oct 6, 2002 9:36pm Subject: steve You know, there's such a thing as police misconduct. Or is your motto In God and the police we trust. 6332 From: Microsearch, LLC Date: Sun Oct 6, 2002 10:37pm Subject: Fwd: Re: police eavesdropping > >When its the cops, there are no rules, they simply lie... As opposed to crooks who are always above board? I'm happy you showed us who you are. From: A.Lizard Date: Sun Sep 30, 2001 4:06am Subject: Re: NIGHTLINE: The War on Drugs vs. The War on Terrorism At 09:56 AM 9/29/01 +0000, you wrote: >Message: 12 > Date: Thu, 27 Sep 2001 18:10:01 EDT > From: MACCFound@a... >Subject: NIGHTLINE: The War on Drugs vs. The War on Terrorism > > >TODAY'S SUBJECT: In the days immediately following the Sept. 11 attacks, >President Bush warned that everyone who wears a uniform must "be ready." >But ready for what? Since that early statement, the president and his key >advisors have cautioned that this effort will not be a traditional war. >Our enemy has no army, no government. If there is any model for what will >come, perhaps it is the war on drugs, where the enemy is also a >mysterious, secretive organization or organizations, operating in multiple >countries, including right here in the U.S. But since few would argue >that we have achieved a decisive victory in the war on drugs, what lessons >can be taken from this comparison? > >---- Similarities, of course, but two major differences: 1) Unless you want to see so many places blown up that people are afraid to go out and go to work or to shop and losing a few thousand people at a time gets pushed to the back pages of the newspaper, losing isn't an option. I think that every group that has a grudge against a nation or even a neighborhood, rational or otherwise is already thinking about how wonderful it would be if [insert here] were to disappear in a towering inferno. I wouldn't be surprised to find quite a few groups *acting* on their grudges all over the world if some way to persuade their members that this is a REAL BAD IDEA. 2) In the case of drugs, the end users *want* them. I don't know of any consensus of end users who want to see a few thousand pounds of explosive go off in their neighborhood, shopping center, or where they work. The good news: the end users can probably be persuaded to report interesting things like people loading trucks around where they live with boxes labeled EXPLOSIVE, or even ANFO if they were told what to look for and who to call. A.Lizard ************************************************************************ Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 3813 From: James M. Atkinson Date: Sun Sep 30, 2001 1:54pm Subject: CSD-4100 Secure Telephone/Type 1 STU III devices Since I keep getting requests for the following... We can provide CSD-4100 secure telephone/Type 1 STU III devices (AKA: Phone Scramblers) for a discounted price of $5,565 each, plus $55.00 for domestic shipping and handling, and $125.00 for international shipments. If you order more then three units we will pick up the domestic shipping and handling. This is REAL Crypto, and not amateur Spy Shop toys. The units are in-stock and available for immediate shipment. -jma -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3814 From: James M. Atkinson Date: Mon Oct 1, 2001 0:24pm Subject: Now Well Over 1000 Subscribers In case anybody is interested this mailing list is now well over 1000 subscribers, all of whom receive a copy of everything posted to the list. The TSCM-L list is by far the largest forum on the subject matter that exists on Earth, is offered at absolutely no cost, no spam, no bullshit, and no games. The subscribers comments make the list what it is, so post often, and don't be bashful folks. -jma -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3815 From: Date: Mon Oct 1, 2001 10:34am Subject: Wireless Week - Wiretap Provisions On Verge Of Change Wiretap Provisions On Verge Of Change Read the full article at: http://www.wirelessweek.com/index.asp?layout=story&articleId=CA163275& >> 3816 From: Aimee Farr Date: Mon Oct 1, 2001 3:40pm Subject: Leahy bill http://www.senate.gov/~leahy/ Uniting and Strengthening America Act (Draft) Senator Leahy's Anti-Terrorism Legislation September 21, 2001 Summary Section-by-Section Bill Text (PDF) See my previous post in the archive for analysis links.... I have no idea about this..... http://www.eff.org/Privacy/Surveillance/20010927_house_compromise_summary.ht ml ~Aimee Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR 5400 Bosque, Ste. 675 Waco, Texas 76710 3817 From: sebastien rittner Date: Mon Oct 1, 2001 2:01pm Subject: PBX during sweep: subcontract or learn ? Hi all, PBXs can be very tricky as well as voicemails. I've heard many people saying they learned the system before going on a sweep. Some people don't even bother, they bring the telephone guy with them and he does the job. That way, they are sure he knows what he's talking about. Having some comments on that matter would be very useful for the list. So...how do you do it ? Sebastien. ===== email : sebastien@t... web : www.tscm-technician.net voicemail : (510)-496-2740 x2159 __________________________________________________ Do You Yahoo!? Listen to your Yahoo! Mail messages from any phone. http://phone.yahoo.com 3818 From: Date: Mon Oct 1, 2001 1:45pm Subject: Re: PBX during sweep: subcontract or learn ? In a message dated 10/1/01 2:23:02 PM Pacific Daylight Time, seb_rittner@y... writes: << Some people don't even bother, they bring the telephone guy with them and he does the job. >> Are you suggesting that you let the in-house phone guy in on the sweep? 3819 From: James M. Atkinson Date: Mon Oct 1, 2001 10:01pm Subject: Re: PBX during sweep: subcontract or learn ? At 12:01 PM -0700 10/1/01, sebastien rittner wrote: >Hi all, > >PBXs can be very tricky as well as voicemails. I've >heard many people saying they learned the system >before going on a sweep. Some people don't even >bother, they bring the telephone guy with them and he >does the job. That way, they are sure he knows what >he's talking about. > >Having some comments on that matter would be very >useful for the list. > >So...how do you do it ? > >Sebastien. > >===== >email : sebastien@t... >web : www.tscm-technician.net >voicemail : (510)-496-2740 x2159 Learn the respective PBX to a level that you can take delivery of several large boxes of PBX, phone gear, several hundred thousand feet or cable, and a few hundred connectors and design and install (by yourself) an entire phone system, LAN, and WAN from scratch for a large corporation. Include in this equation the set-up and admin for voice mail, Email, Internet connectivity, network servers, routers, fire walls, and hubs. Once you have successfully done this a few dozen times then you can consider performing TSCM services on that respective system (assuming of course that you already have good TSCM training). -jma -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3820 From: sebastien rittner Date: Mon Oct 1, 2001 6:12pm Subject: Re: PBX during sweep: subcontract or learn ? --- MACCFound@a... wrote: > << Some people don't even bother, they bring the > telephone guy with > them and he does the job. >> > > Are you suggesting that you let the in-house phone > guy in on the sweep? I'm not saying I, because I'm still in the learning process, but I know some practitioners who do that. And it's usually not the in-house but a subcontractor in charge of the telephone system. What's your experience? ===== email : sebastien@t... web : www.tscm-technician.net voicemail : (510)-496-2740 x2159 __________________________________________________ Do You Yahoo!? Listen to your Yahoo! Mail messages from any phone. http://phone.yahoo.com 3821 From: Aimee Farr Date: Mon Oct 1, 2001 11:08pm Subject: Patriot Act | 3rd Cir. S. 605 case http://www.well.com/~declan/sep11/patriot.act.100101.pdf (via Declan) This Sect. 605 case out of the 3rd Cir. Fairly decent historical discussion. S. 605 goes back to 1912. For surveillance history and radio buffs. http://laws.lp.findlaw.com/3rd/985341.html The issue on appeal is whether S 605, which prohibits the unauthorized interception of radio communications, applies to the sale of cable decoding equipment. The defendant sellers, Cable City Corporation and its officers Jay Grabert and Chris Schad (collectively "Cable City"), argue that S 553 is the sole statutory remedy for cable piracy of signals sent over terrestrial cable lines, and that S 605 applies only against offenders who directly intercept satellite or radio broadcasts as they pass through open air. We hold that a cable television descrambler does not facilitate the interception of "communications by radio" and therefore the statutory damages available underS 605 do not apply here. [...] Aimee Farr mailto:aimfarr@p... LAW OFFICE OF AIMEE FARR 5400 Bosque, Ste. 675 Waco, Texas 76710 3822 From: Aimee Farr Date: Mon Oct 1, 2001 11:32pm Subject: Y.A.Y.E. | pronounced "yay" ... ("yet another yappy executive") This gem from a mailing list in a galaxy far, far away..... [paraphrasing]..."Due to the extreme sensitivity of this project and out of consideration for our [nondisclosed] international partners, I can only say a little more in private, and even then, only on a secure channel." -MR. CEO ----------- I bet he gets a "secure channel." *ponder* ACME LABS ANNOUNCES THE "SHUT UP, STUPID." (TM) THE ORIGINAL ANTI-YAPPING EXECUTIVE CONTROL COLLAR!!!! The ''SHUT UP, STUPID.'' (TM) executive yap control collar is the most effective anti-yapping control you can buy! And, it's humane. The SHUT UP! cures even the most stubborn executive yapper with a minimum of pain. HOW IT WORKS: The SHUT UP! first uses a warning tone, followed by progressively increasing tone/shock combinations as the executive's yapping persists. If your executive is quiet for 30 seconds or more, the SHUT UP! will then reset to the mild (tone-only) correction level. Your executive needs only to experience the higher shock levels a few times before learning that the mild stimuli is a warning of stronger corrections to come unless the executive stops their yapping. Your executive will quickly learn to _SHUT UP_ at the mild correction without having to suffer the more intense stimulus. FEATURES: 1. Uses painless tone followed by shock only if executive yapping persists. 2. Increases tone and shock stimuli as yapping grows in intensity and stupidity 3. Small and Lightweight, microprocessor controlled, operates on a standard 6 volt battery. 4. Voice Recognition feature minimizes false triggering. 5. Allows for customized key-wording, and includes sample templates. 6. Interfaces with major email and network monitoring software. SPECIAL OFFER!!! ---------------- Send your request on agency letterhead for information about our soon-to-be-released product, "_THAT'S CLASSIFIED, STUPID_!" * (TM) Specially designed for congress and xer television pundits, "_THAT'S CLASSIFIED, STUPID_!" * features our tone and shock stimuli, but includes additional "media mimic" features. Our patented electronic stimuli simulate the appearance of health maladies -- ranging from a sudden scratchy throat, to a total made-for-TV stroke-out. *Remote-control keypads available with this product. ### [ A voice-rec vibrating pager along these lines would be an interesting "training aid." It could also make a record of keyword incidents and use math-magic so as to give somebody a "chili pepper" rating. A "10-chili-pepper" guy is too damn talky. Offers possibilities for Title III legal arbitrage. Well, it's better than the spy-kitty. *snicker* ] ~Aimee 3823 From: Charles P Date: Mon Oct 1, 2001 11:57pm Subject: Re: PBX during sweep: subcontract or learn ? One of the difficulties in phone systems is that there is no "standard" between various manufacturers, even in terminology (and even within the same manufacturer). There are many similarities in how systems operate, though. If you are familiar with two or three systems you may have a chance at figuring out what's going on in another of a similar size and type. If you know how to program two or three systems that in NO WAY means you can sit down and program another system though. Another problem for TSCMers is that even if you want to learn a large system, many manufacturers will never allow you to take their training courses unless a) you are able to present yourself as a dealer- or working for a dealer- with a certain amount of equipment purchased each year, or b) you are part of a large firm that has already purchased the system and has a contract with them and is sending you there for in-house maintenance. Courses are typically one to two weeks long or more (6-8 hrs/day) and pricey. That being said, you should learn enough about systems that you can determine if the clients telecom system has been or is a likely target. You will have to work with the client to decide how far you want to go with your inspection. When a system is beyond my knowledge or understanding and I suspect or know there is a problem to be checked out, we will offer to either work with their telecom personnel (with obvious caveats- depends on circumstances) or to bring in a sub of our own choosing who is capable of servicing their particular system. For clients that you have regular schedules with it would be wise to become as familiar as possible with their particular systems. There are ways to get manuals for most systems; they can be voluminous (not to mention they get revised quite often), but they could help to learn more about the particular system's features and functions. Charles Patterson charles@t... ----- Original Message ----- From: "sebastien rittner" To: Sent: Monday, October 01, 2001 3:01 PM Subject: [TSCM-L] PBX during sweep: subcontract or learn ? > Hi all, > > PBXs can be very tricky as well as voicemails. I've > heard many people saying they learned the system > before going on a sweep. Some people don't even > bother, they bring the telephone guy with them and he > does the job. That way, they are sure he knows what > he's talking about. > > Having some comments on that matter would be very > useful for the list. > > So...how do you do it ? > > Sebastien. > > ===== > email : sebastien@t... > web : www.tscm-technician.net > voicemail : (510)-496-2740 x2159 > > __________________________________________________ > Do You Yahoo!? > Listen to your Yahoo! Mail messages from any phone. > http://phone.yahoo.com > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 3824 From: Date: Mon Oct 1, 2001 8:23pm Subject: Re: PBX during sweep: subcontract or learn ? In a message dated 10/1/01 8:55:19 PM Pacific Daylight Time, seb_rittner@y... writes: << I'm not saying I, because I'm still in the learning process, but I know some practitioners who do that. And it's usually not the in-house but a subcontractor in charge of the telephone system. What's your experience? >> My experience has involved getting familiar with the various vulnerabilities of PBX's. Then checking for them myself. There was a very useful tool, which used to be available, I believe it was called the BCR manual of PBX's. It was several large three ring binders listing features and instructions, available by subscription with updates. It gave my team an idea of what we were up against. I don't think that it's still published. IMHO Documentation and programming information is crucial in a PBX sweep. Sometimes, it's laying around the phone room, sometimes you have to dig for it. My policy was / would be to get as much knowledge and do the work myself, bringing in the In House phone people as a last resort / as needed basis. Your mileage may vary. 3825 From: sebastien rittner Date: Mon Oct 1, 2001 11:18pm Subject: Re: PBX during sweep: subcontract or learn ? --- "James M. Atkinson" wrote: > Learn the respective PBX to a level that you can > take delivery of > several large boxes of PBX, phone gear, several > hundred thousand feet > or cable, and a few hundred connectors and design > and install (by > yourself) an entire phone system, LAN, and WAN from > scratch for a > large corporation. Include in this equation the > set-up and admin for > voice mail, Email, Internet connectivity, network > servers, routers, > fire walls, and hubs. > > Once you have successfully done this a few dozen > times then you can > consider performing TSCM services on that respective > system (assuming > of course that you already have good TSCM training). > > -jma So we have some feedbacks, that's good. I've install some PBX and voicemails already. Tough I'm far to be an expert, I know how difficult it is to learn a system. Each system is different. So I wonder how can somebody pretend to learn the system in a few weeks or even days. Systems are always changing and new commands are emerging. Knowing a specific system today doesn't mean knowing this system tomorow. Second concern: a software is proprietary. You also need a code to access the system through a computer. Do you call the factory? Do they give access? I don't think so. You still can access the PBX programs by the programming phone but that takes much longer. So please, let me know how you guys do that in detail. It can be helpful for a lot of reader. Sebastien. ===== email : sebastien@t... web : www.tscm-technician.net voicemail : (510)-496-2740 x2159 __________________________________________________ Do You Yahoo!? Listen to your Yahoo! Mail messages from any phone. http://phone.yahoo.com 3826 From: Dawn Star Date: Tue Oct 2, 2001 11:03am Subject: Signal While doing a sweep in Los Angeles yesterday I ran into a transmitted signal that I have not seen before. The front end of the carrier appears to be analog with tone bursts and the tail end of the signal is digital noise in appearance. The overall signal goes completely off about every three seconds, tone bursts (audible tones/ analog slope demodulation) and then the digital follows. The signal is at about 975 MHZ. What do you know out there? Roger Tolces Electronic Security 3827 From: Date: Mon Oct 1, 2001 10:36am Subject: Wireless Week - Wiretaps: Not To Worry, Yet Wiretaps: Not To Worry, Yet Read the full article at: http://www.wirelessweek.com/index.asp?layout=story&articleId=CA163281& 3828 From: James M. Atkinson Date: Tue Oct 2, 2001 11:40am Subject: Re: Signal At 9:03 AM -0700 10/2/01, Dawn Star wrote: >While doing a sweep in Los Angeles yesterday I ran into a transmitted >signal that I have not seen before. The front end of the carrier appears to >be analog with tone bursts and the tail end of the signal is digital noise >in appearance. The overall signal goes completely off about every three >seconds, tone bursts (audible tones/ analog slope demodulation) and then >the digital follows. The signal is at about 975 MHZ. What do you know out >there? > Roger Tolces > Electronic Security My initial impression is that you picked up a digital pager system, and/or intermod or harmonic signal thereof. However, always suspect that the signal is hostile until you can absolutely prove otherwise. Here are a few questions: 1) What was the exact frequency (to 3 or 4 decimal places)? 2) What was the bandwidth of the emission? 3) Do you have a time domain display of the signal? 4) Is there anything that could indicate that the signal in question is intermod? 5) Was any filter or narrow band amplifier used to isolate the signal? 6) What was the polarization of the signal? 7) When you DF'ed the signal which direction did it come from? 8) Are there any pager stations with in a miles of so of where you were located? -jma -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3829 From: Dawn Star Date: Tue Oct 2, 2001 11:58am Subject: PBX during sweep: subcontract or learn ? > << Some people don't even bother, they bring the > telephone guy with > them and he does the job. >> > > Are you suggesting that you let the in-house phone > guy in on the sweep? There have been times over the years that I have brought in the techs for the resident phone switch (with the approval of the client) to dump the switch memory/ programming so it could be analyzed for software taps. Too many switches/software to learn them all and be competent. Roger Tolces Electronic Security 3830 From: Steve Whitehead Date: Tue Oct 2, 2001 2:22pm Subject: Prism applies for interdict against former staff "[Johannesburg, 2 October 2001] - Prism has applied for an urgent interdict to stop Lanitor from selling a product based on technology Prism alleges was copied by former employees. According to the application served on Lanitor, its MD and 10 staff members, they have five days to respond before the issue goes to court. Prism CEO Alvin Els says the Prism product in question is a platform for sending and receiving SMS messages as part of the group's m-commerce offering. "It's the base for our m-commerce box," he adds. "We have no interest in stopping people from making a living but when something which has taken us two or three years to develop is suddenly being marketed by someone else within three months, we have to put a stop to it." Els says the appearance of the technology is despite Lanitor's MD, Johan Liversage, having signed a restraint of trade agreement when he worked at Prism. He says Prism became aware of the matter when Lanitor tried to sell the product to a Prism customer. "It was a smaller customer in Africa, but our argument is that if you are operating in Africa and not SA, then go there and operate. Go set up in Botswana, and don't operate out of SA." Prism was granted an order to make a raid on Lanitor's property, and files taken in the raid were analysed by Deloitte Consulting. Els says copying information happens often when people leave companies in SA. "People copy disks from servers and so on. "But what got us was the audacity. If they had waited six or seven months, it probably would not have been a major issue. But they have an identical product, although they say the functionality is different, within two or three months. And so we decided to act." Liversage could not be reached for comment this morning" Story at http://196.37.50.65/sections/business/2001/0110021206.asp Steve Whitehead E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa TSCM Services URL : http://www.tscm.co.za [Non-text portions of this message have been removed] 3831 From: Date: Tue Oct 2, 2001 0:40pm Subject: Re: PBX during sweep: subcontract or learn ? > I've been contracted to analyze the minimum point of entry cable facilities, as well as PBX port access and PBX software configurations, for TSCM'ers who > don't have the expertise to perform such analysis. Knowledge of manufacturer specific software for many PBXs is just the top of the iceberg. There can > also be security issues with the PBX connectivity to ACD servers, the LAN or WAN, or computer telephony boxes. Although there are many similarities in the > functions and features of most legacy PBXs, some switch software commands may be cryptic (AT&T G2) and other PBX equipment may offer reports which require > hexadecimal translation (Omni). Probably best to sub that telecom piece to a very qualified contractor. Brian McDaniel TeleDesign Security, Inc. > > > >There have been times over the years that I have brought in the techs for > the resident phone switch (with the approval of the client) to dump the > switch memory/ programming so it could be analyzed for software taps. Too > many switches/software to learn them all and be competent. > 3832 From: A Grudko Date: Tue Oct 2, 2001 11:18am Subject: PBX sweep On the PBX (we call it a PABX - as Charles Patterson said, even the basic terminology can differ), any opinions on the dangers or remote diagnostics being abused? I'm not sure if I've brought this up before. This facility is where the equipment supplier has the ability to dial into the PABX to detect faults and update software etc., obviously requiring passwords to get access to the system. I've been told that, but have never come across, a rogue engineer could abuse this by getting dialled number records or possibly taking over the switchboard to actually handle (implying listen in) calls. I'd be interested to know if anyone has come across this facility. If so, the easy countermeasure is probably to locate the modem and disconnect it, only reconnecting when there is a fault - permitting the engineer access. I have seen external modems connected to older PABXs but I'd guess they would be internal on the modern, small versions - not something I'd want to fiddle with. Regards from sunny SA Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time ------------------------------------------------------------ Terrorist Attacks on U.S. - How can you help? Donate cash, emergency relief information http://dailynews.yahoo.com/fc/US/Emergency_Information/ 3833 From: Lesya Dyk Date: Tue Oct 2, 2001 3:52pm Subject: RE: Signal This sounds like digital paging to me. Many smaller local paging transmitters employing various (older) paging formats sound like what you describe. Robert Dyk Worldwide Security Ltd. dyk@c... 3834 From: Information Date: Tue Oct 2, 2001 4:14pm Subject: Re: PBX sweep A couple of years back I was called in to perform a sweep of a government office. They had a phone system (computerized) which permitted users to intercom with one another. They thought the intercom feature had been taken off. However, they left the phone room open which gave anyone that wanted, access to the not only the computer terminal which programmed the phone system, but also the manual on how to do it. Someone took advantage of this and reprogrammed the system to allow the intercom system activation by pushing a different number and they also disabled the announce tone. I had another client who we had previously performed a sweep on during her divorce. The husband was a bug/intelligence freak. During the divorce he was caught once with the goods. Well after the divorce, the lady was building her new house, the husband gave her this new phone system as a gift. The property had the main house, two (2) guest houses, stables, caretakers house, etc. The phone system was estimated to have cost $15,000.00, nice guy right. Well after I pointed out to her the nice system feature which permitted remote monitoring of any phone on the system (including room) from anywhere in the world, she sent it back. It always amazes me on how many people bug themselves! Bill Elliott, CII ELLIOTT & ASSOCIATES, Ltd. (GMT -7) http://www.prvt-eye.com http://www.cybercrimeinternational.com 3835 From: Andrus Aaslaid Date: Tue Oct 2, 2001 4:16pm Subject: RE: RE: Signal > This sounds like digital paging to me. Many smaller local paging > transmitters employing various (older) paging formats sound like what you > describe. This thread reminded me a product I stepped on few weeks ago. It is a PCI card capable of decoding most commercial signalling standards out there. Sorry if this piece of equipment is widely known already. The link itself is: http://www.rys.nl/w41pc2.htm Regards, Andrus. 3836 From: David Alexander Date: Wed Oct 3, 2001 4:47am Subject: re: pbx SWEEP >I'm not sure if I've brought this up before. This facility is where the >equipment supplier has the ability to dial into the PABX to detect faults >and update software etc., obviously requiring passwords to get access to the >system. > >I've been told that, but have never come across, a rogue engineer could >abuse this by getting dialled number records or possibly taking over the >switchboard to actually handle (implying listen in) calls. > >I'd be interested to know if anyone has come across this facility. If so, >the easy countermeasure is probably to locate the modem and disconnect it, >only reconnecting when there is a fault - permitting the engineer access. As a coporate information security officer, I have experience of this. There is a practice known as 'Phreaking' in which people effectively hack into the PABX. This does not have to be through a dedicated 'support modem'. It not unknown for people to be able to use a buffer overflow attack (sorry, hacker speak) or little-known features to get control of a system through the publicly available user menus, such as the voicemail system. My apologies if some of what folows sounds a bit like Computer Security rather than TSCM, but I do both. Here are some examples of the types of telephone attacks that can take occur: I have seen examples of these myself. A friend of mine, Phil Cracknell of Orthus Security wrote the following item which sums it up very well. I have copied this from his arrticle 'cos I'm too lazy to type this stuff myself . quote: The hacker accesses the telephone network and uses it to make long-distance or lengthy expensive calls. The cost of these calls falls to the exploited organisation. The Internet has offered hackers a way of distributing information such as DISA numbers and PIN codes rapidly. This could be changing the outgoing announcement of a company or re-routing calls to a competitor. For a variety of reasons, maybe even a disgruntled employee, this simple but effective hack can cause serious embarrassment and potentially even more damage to a company. Here are some real examples of the types of telephone security exploitation that can take place. These examples are all from large well known UK companies: In November 1996, a telephone hacker accessed the voicemail system used to greet callers to a particular television company. The hacker used tones generated by a standard telephone handset to change the original greeting to the following: "Please do not call the company on this number. We are sick and tired of your complaints that only serve to keep a certain person in a job." It was more than an hour before it was spotted, by which time over 15,000 callers had heard this message. The message was promptly changed back, but then the same hacker dialed in again and changed the original message to the sound of cows mooing! The service was immediately withdrawn. The merger of two telecom operators took place in early 1997. One of the engineers who lost his job in the merger decided to take his revenge by disrupting the new company's internal telephone network. His expertise allowed him to set up a call between two offices that generated another call and so on in a series known as daisy-chaining. This had the effect of "busying" the network, then overloading the office PABX's, such that they failed to function. It took over 5 hours to rectify this fault, by which time there was no means of internal or external communication for the newly merged company. It is impossible to put an exact figure on the cost of this disgruntled employee's action. In March 1997, a UK government agency used a recruitment company to set up a telephone hotline for people wishing to be considered for a career within the agency. Using tones generated by a standard telephone an amateur hacker managed to change the original greeting, which simply asked for the caller's name and address, to, "unfortunately this service has been withdrawn because we have been taken over by the Russians". This caused obvious embarrassment to both the recruitment company and the government agency. There is a well-documented case where a professional syndicate discovered that it was possible to dial into a company's PABX in London and make free calls to any destination in the world at the company's expense. The total cost of this toll fraud was put at more than one million pounds sterling. The fraud itself was perpetrated by using the Direct Inward Subscriber Access (DISA) feature common to many modern PABXs. It is intended to allow remotely accessing users the ability to make calls to their own organisation at company expense when working from home. Such facilities are usually password protected. In this case, however, a combination of poor password control and call logging analysis led to fraud on a massive scale. The perpetrators have never been caught. A hacker discovered that by dialing a specific number on the Meridian PABX at a store's Manchester branch, it was possible to make announcements over the in-store PA system. PA systems are commonly inter-connected to PABXs to reduce the cost of wiring and to increase flexibility (i.e. shop assistants can make PA announcements from any telephone extension in the store.) By dialing in remotely, the hacker was able to make an announcement to the effect that all menswear was being reduced by 50% and that shoppers should immediately make their way to the menswear counter. The result was total confusion amongst staff, and delight was followed by anger amongst shoppers. The loss of revenue to that company is difficult to quantify, but the embarrassment felt by the UK's most prestigious chain store was immense. Unquote Phreaking is big business, it costs the phone companies and the victims millions each year. A common approach is where shady companies selling cheap overseas calls take control of your phone system on a Friday night and use your lines to dial overseas for their clients all weekend. On Monday morning you could find you owe 250,000.00 to the Telco (I have personally seen this happen - called in to investigate). Make sure all modems have airgap security and are dial-back to pre-programmed numbers at the support company. Make sure all passwords have been changed from the default. Make sure all remote logins have to use a form of token authentication, such as RSA Secure-ID. Make sure the phone system software is patched to the latest version, just like your firewall. Ask your pabx supplier for some form of written assurance that the system is as hardened as possible so you can show due diligence. Hope this helps to show what can and should be done David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 3837 From: Craig Snedden Date: Wed Oct 3, 2001 8:28am Subject: RE: re: pbx SWEEP Whilst not exactly phreaking or tscm, David's posting reminded me of the exploits of a former colleague of mine who was seriously disgruntled by our supervisor (with good reason in my opinion). The day before my colleague left the post to move on elsewhere he was put on nightshift by the supervisor. So he spent the night in the PABX randomly putting faults on the processor. His piece de resistance was the discrete placing of pieces of paper behind the contacts and fuses on the Krone blocks in the frame thereby insulating the fuse or connector from it's contact. At first test the fuse or connector appears o.k., so the engineer moves on whilst faultfinding. Only by pulling the fuse/connector does the presence of the paper "insulater" make itself known..... Since the supervisor was the only guy qualified to check the PABX that next day it had the desired effect..... (I enjoyed watching him squirm too...He was a bit of an A-hole!) :-) A telecomms network manager for a large telco here in the UK tells me that in his experience it is very very unusual for the commissioning engineers on a PABX to change any PIN codes or passwords from the default that is set in the factory.....! (2222, 6666, 8888 etc.).. Shocking! Even more that very few network managers then go in and change the PIN/Password..! Have fun out there.! Craig -----Original Message----- From: David Alexander [mailto:david.alexander@b...] Sent: Wednesday, October 03, 2001 10:48 AM To: 'TSCM submissions' Subject: [TSCM-L] re: pbx SWEEP >I'm not sure if I've brought this up before. This facility is where the >equipment supplier has the ability to dial into the PABX to detect faults >and update software etc., obviously requiring passwords to get access to the >system. > >I've been told that, but have never come across, a rogue engineer could >abuse this by getting dialled number records or possibly taking over the >switchboard to actually handle (implying listen in) calls. > >I'd be interested to know if anyone has come across this facility. If so, >the easy countermeasure is probably to locate the modem and disconnect it, >only reconnecting when there is a fault - permitting the engineer access. As a coporate information security officer, I have experience of this. There is a practice known as 'Phreaking' in which people effectively hack into the PABX. This does not have to be through a dedicated 'support modem'. It not unknown for people to be able to use a buffer overflow attack (sorry, hacker speak) or little-known features to get control of a system through the publicly available user menus, such as the voicemail system. My apologies if some of what folows sounds a bit like Computer Security rather than TSCM, but I do both. Here are some examples of the types of telephone attacks that can take occur: I have seen examples of these myself. A friend of mine, Phil Cracknell of Orthus Security wrote the following item which sums it up very well. I have copied this from his arrticle 'cos I'm too lazy to type this stuff myself . quote: The hacker accesses the telephone network and uses it to make long-distance or lengthy expensive calls. The cost of these calls falls to the exploited organisation. The Internet has offered hackers a way of distributing information such as DISA numbers and PIN codes rapidly. This could be changing the outgoing announcement of a company or re-routing calls to a competitor. For a variety of reasons, maybe even a disgruntled employee, this simple but effective hack can cause serious embarrassment and potentially even more damage to a company. Here are some real examples of the types of telephone security exploitation that can take place. These examples are all from large well known UK companies: In November 1996, a telephone hacker accessed the voicemail system used to greet callers to a particular television company. The hacker used tones generated by a standard telephone handset to change the original greeting to the following: "Please do not call the company on this number. We are sick and tired of your complaints that only serve to keep a certain person in a job." It was more than an hour before it was spotted, by which time over 15,000 callers had heard this message. The message was promptly changed back, but then the same hacker dialed in again and changed the original message to the sound of cows mooing! The service was immediately withdrawn. The merger of two telecom operators took place in early 1997. One of the engineers who lost his job in the merger decided to take his revenge by disrupting the new company's internal telephone network. His expertise allowed him to set up a call between two offices that generated another call and so on in a series known as daisy-chaining. This had the effect of "busying" the network, then overloading the office PABX's, such that they failed to function. It took over 5 hours to rectify this fault, by which time there was no means of internal or external communication for the newly merged company. It is impossible to put an exact figure on the cost of this disgruntled employee's action. In March 1997, a UK government agency used a recruitment company to set up a telephone hotline for people wishing to be considered for a career within the agency. Using tones generated by a standard telephone an amateur hacker managed to change the original greeting, which simply asked for the caller's name and address, to, "unfortunately this service has been withdrawn because we have been taken over by the Russians". This caused obvious embarrassment to both the recruitment company and the government agency. There is a well-documented case where a professional syndicate discovered that it was possible to dial into a company's PABX in London and make free calls to any destination in the world at the company's expense. The total cost of this toll fraud was put at more than one million pounds sterling. The fraud itself was perpetrated by using the Direct Inward Subscriber Access (DISA) feature common to many modern PABXs. It is intended to allow remotely accessing users the ability to make calls to their own organisation at company expense when working from home. Such facilities are usually password protected. In this case, however, a combination of poor password control and call logging analysis led to fraud on a massive scale. The perpetrators have never been caught. A hacker discovered that by dialing a specific number on the Meridian PABX at a store's Manchester branch, it was possible to make announcements over the in-store PA system. PA systems are commonly inter-connected to PABXs to reduce the cost of wiring and to increase flexibility (i.e. shop assistants can make PA announcements from any telephone extension in the store.) By dialing in remotely, the hacker was able to make an announcement to the effect that all menswear was being reduced by 50% and that shoppers should immediately make their way to the menswear counter. The result was total confusion amongst staff, and delight was followed by anger amongst shoppers. The loss of revenue to that company is difficult to quantify, but the embarrassment felt by the UK's most prestigious chain store was immense. Unquote Phreaking is big business, it costs the phone companies and the victims millions each year. A common approach is where shady companies selling cheap overseas calls take control of your phone system on a Friday night and use your lines to dial overseas for their clients all weekend. On Monday morning you could find you owe 250,000.00 to the Telco (I have personally seen this happen - called in to investigate). Make sure all modems have airgap security and are dial-back to pre-programmed numbers at the support company. Make sure all passwords have been changed from the default. Make sure all remote logins have to use a form of token authentication, such as RSA Secure-ID. Make sure the phone system software is patched to the latest version, just like your firewall. Ask your pabx supplier for some form of written assurance that the system is as hardened as possible so you can show due diligence. Hope this helps to show what can and should be done David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3838 From: Date: Wed Oct 3, 2001 2:47pm Subject: Re: re: pbx SWEEP PBX vulnerability assessments is our business. We've analyzed thousands of PBX networked environments and I've never seen one without some kind of port access to admin or maintenance features. Conversely, many CTI or key systems do not have remote maintenance port configurations. Almost twenty years ago there was a big push for AT&T to be able to perform remote maintenance on all of their customer PBXs, and every PBX was sold with that option available. Siemens (Rolm) quickly followed suit. Today, most installed legacy PBXs have this remote maintenance access. On several major manufacturer PBXs, it is possible for the end-user admin to disable this port completely. In this case the maintenance provider is completely shut out of the system, unable to respond to 'alarms' or unable to perform their maintenance functions. In fact, we are seeing one manufacturer/maintenance provider actually disabling customer access through these ports if the customer elects to omit remote maintenance from their PBX service agreements. The manufacturer/maintenance provider can still dial into the PBX in this scenario, do to the nature of the permissions assigned to their passwords. In this scenario, the port can still be hacked. These ports are not phreaked. These ports are hacked. Hackers try to get to the programming of the switch. Phreakers try to find egress from the switch, i.e. looking for dial tone through voice mail out calling, trunk access codes, DISA ports, looping through multiple PBXs, etc. Typically, the hacker war dials a Direct In Dial range of a company's phone numbers to look for the maintenance port. Once they find an unprotected port, they emulate a terminal and try to hack the login sequence. Most PBXs will send a notification to a predetermined set or pager if there are too many unsuccessful log on attempts. Hackers beat this by trying only a couple of passwords per call attempt. Once the password has been cracked, numbers are posted on hacker pages on the Net or sold to other bad guys. These numbers can bring $50,000 on the black market. Let's say one removes the maintenance port modem (as opposed to protecting it with the proper hardware). There are still many other ways into the programming of the system. Other equally important ports on the PABX (Nortel speak) that allow admin or maintenance access are TTY ports for SRE, MTC and BUG. Also, telnet can be a major issue. For Lucent or Avaya, Netcon channels provide a lan connected access to PBX programming. For maintenance port modem security hardware check out RPSD for Avaya/Lucent/AT&T, Ion Networks TraqNet for Siemens equipment, and for Nortel PABX - be careful. Nortel has suggested in writing that an A/B switch be used to switch from terminal access to modem access. We consider this to be bad form, as it relies entirely on the human component to not fail. Also suggested by many Nortel Vendors is the Teltronics SEB. This is an alarm management box that adds a layer of password authentication. Note: one large U.S. PABX maintenance company had its customer records for passwords for all installed SEB stolen. The company quietly reprogrammed new passwords for its customer base. For more information on PBX security issues please visit our web site (teledesignsecurity.com) or contact me off list. Regards, Brian McDaniel General Manager TeleDesign Security, Inc. TeleDesign Management, Inc. David Alexander wrote: > >I'd be interested to know if anyone has come across this facility. If so, > >the easy countermeasure is probably to locate the modem and disconnect it, > >only reconnecting when there is a fault - permitting the engineer access. > > As a coporate information security officer, I have experience of this. There > is a practice known as 'Phreaking' in which people effectively hack into the > PABX. This does not have to be through a dedicated 'support modem'. > Make sure all modems have airgap security and are dial-back to > pre-programmed numbers at the support company. > Make sure all passwords have been changed from the default. Make sure all remote logins have to use a > form of token authentication, such as RSA Secure-ID. Make sure the phone > system software is patched to the latest version, just like your firewall. > Ask your pabx supplier for some form of written assurance that the system is > as hardened as possible so you can show due diligence. 3839 From: James M. Atkinson Date: Wed Oct 3, 2001 9:20pm Subject: Intelligence Analysts Bookshelf Greetings, Do to the flood of inquiries I have been getting for resources and reference materials regarding the 9/11 attacks I felt it would be a good idea to compile a short list of open source reading materials which are easy to obtain. I limited the list to those books which laid the relevant information out in a straight forward manner, and also limited to those with a minimum of academic pontification and worthless rhetoric. Please take a look, and let me know what you think: http://www.tscm.com/bookshelf.html It is by no means a comprehensive list, but instead a "bookshelf" you can use for ready reference in the matter at hand. -jma -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3840 From: A Grudko Date: Thu Oct 4, 2001 4:25am Subject: PBX SWEEP Thanks for the extensive PABX info Brian - it's been added to my 'I-should-know-this-but don't' folder!! Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time ------------------------------------------------------------ Terrorist Attacks on U.S. - How can you help? Donate cash, emergency relief information http://dailynews.yahoo.com/fc/US/Emergency_Information/ 3841 From: Date: Thu Oct 4, 2001 4:01am Subject: Bulgaria uncovers illegal phone-tap operation Bulgaria uncovers illegal phone-tap operation SOFIA, Oct 4 (Reuters) - Bulgarian police have uncovered an extensive industrial espionage operation involving the illegal phone-tapping of companies and private individuals, the Interior Ministry said on Thursday. "Counter-intelligence services discovered surveillance equipment in one of Sofia's telephone exchanges. At the moment of discovery the equipment was recording," the ministry said in a statement. "Similar devices were found in almost all exchanges in Sofia," it said. Interior Ministry investigators had found those responsible for installing the phone-taps and those who ordered the illegal operation, which ran from 1994 to 2001, it said. The statement did not say whether the suspects had been interrogated or arrested. "The tapping is related mainly to economic interests," Interior Minister Georgi Petkanov told reporters. "No politicians and magistrates have been tapped." No state agencies had been involved in the surveillance operation, Petkanov stressed. A scandal erupted in Bulgaria a year ago after bugging devices were found in the chief prosecutor's flat. From: Date: Wed Oct 1, 2003 0:23pm Subject: But I slowed down... A guy runs a stop sign and gets caught by a policeman. Cop says, "License and registration, please." Guy says, "What for?" Cop says, "You didn't come to a complete stop at the stop sign." Guy says, "I slowed down, and no one was coming." Cop says, "You still didn't come to a complete stop. License and registration, please." Guy says, "What's the difference?" Cop says, "The difference is, you have to come to a complete stop. License and registration, PLEASE!" Guy says, "If you can show me the difference between slow down and stop, I'll give you my license and registration." Cop says, "Exit your vehicle, sir." At this point, the cop takes out his nightstick and starts beating the shit out of the guy and says... "Do you want me to slow down or stop?" [Non-text portions of this message have been removed] 7805 From: Hawkspirit Date: Wed Oct 1, 2003 6:25pm Subject: Latest Bug Sweep historical articles Here are the latest additions to the Bug Sweep article archives Roger Tolces The Big Oval Sound Studio (Newsweek July 30, 1973) >http://bugsweeps.com/info/oval_studio.html The Nixon Tapes (Newsweek, July 30, 1973 >http://bugsweeps.com/info/nixon_tapes.html The Walls Have Ears (Newsweek, June 1, 1964) >http://bugsweeps.com/info/walls_have_ears.html Who Planted the First Bug? (Newsweek, July 30, 1973) >http://bugsweeps.com/info/first_bug.html > 7806 From: human being Date: Tue Sep 30, 2003 7:49pm Subject: EM classes at MIT online if anyone is interested in perusing open courseware (lecture notes, materials, examples) of electronics and electro- magnetics, MIT has a lot online and movies at the link below to such info: 6.013 Electromagnetics and Applications, Fall 2002 bc microsite http://www.electronetwork.org/bc/ ~e-list http://www.electronetwork.org/list/ 7807 From: Thomas Shaddack Date: Tue Sep 30, 2003 8:14pm Subject: Re: Illegal e-cards to spy on your lover On Tue, 30 Sep 2003 MACCFound@a... wrote: > The Lover Spy software, sold for $89 for up to five computers, purports to > record anything the victim does on the computer, including all keystrokes, > passwords, e-mail, chats and screen shots and even turn on the victim's Web camera. There are free trojan programs offering the same kind of services, either on their own, or with some little coding. At the time I was aware about them, the popular ones were SubSeven, Netbus, or Back Orifice 2000. Some of them allow to attach their installer to any executable, which I suppose may include ActiveX control, which could allow their installation by visiting a webpage or viewing an email. I suppose the cards mentioned here use the same mechanism of installation. On a side note, wondering what would happen if someone would use this kind of trojan installer to infect a worm. Instant backdoor to maybe tens of thousands machines could follow. The advantage or danger (depending on what side of the chessboard you are (or think for - thinking like the adversary is not only good practice but also great fun) at the moment) is the simplicity of this approach - you don't have to write the worm, you just can wait until something new comes in the mail. (Actually, something similar already happened unintentionally - email worm Klez.H visited a computer infected with Win32/CIH file infector, got infected, and then continued infecting other machines not only with itself, but also with the carried CIH. When it comes to viruses/worms, despite everything we were witness or victims of, we didn't see a thing yet. The times are interesting.) > The spy program discreetly sends the information to the Lover Spy server > which then forwards it on to whoever paid for the software, maintaining their > anonymity, according to the company Web site, which did not list contact > information. Using their server as a kind of anonymizer is a novel touch, though. However, I have a feeling it is just incidental to the feature more important for the vendor - licence management. (Another incidental function is an audit trail for eventual prosecution of the hapless users of this kind of software. Unless they don't keep logs.) "Common" trojans are also more oriented to actively take over the computer instead of just passively watching. However, their system modification abilities can be used to install just about any kind of surveillance software. Wondering if they employ some kind of advanced process masking/hiding, or if they suppose the targets will be just common users with no sense of what task manager or browser helper objects are. (Speaking about browser helper objects, there is a spyware identifying software available. For known ones I'd suppose Ad-Aware , which traces down and kills the best known ones, but normally I prefer to use HijackThis, which isn't automatic but shows what's in autorun and the BHOs and other places where malware usually lurks in. We're lucky that the malware in the field now tends to be plain and simple - if it would be well-written, we'd have a problem.) > "You don't need physical access to the computer," said Richard Smith, an > independent privacy and security researcher in Boston. "It makes it so you can spy > on anybody you want." This is sadly true. With the proliferation of swiss-cheesy software and lax approach of majority of admins, there is no wonder security holes are common. And then there is the plethora of the still-unpatched known holes in MSIE... > "That would be a felony," said Mark Rasch, former head of the U.S. Department > of Justice's computer crime unit and chief security counsel for security > company Solutionary. "Loading a program onto someone else's computer without their > authorization is patently illegal." ...unless you're a Big Vendor and you forced your will on the users with the licence; allow unacknowledged updates, being it Media Player or Xbox, or go away... > "It sounds a lot like a commercial version of Magic Lantern," the > controversial program the FBI proposed a few years ago to remotely install a keystroke > logger onto people under investigation, he said. Magic Lantern is an overpriced overmarketed product that a half-competent programming team could design on the base of existing free tools with available source. Eg, BO2k. With polymorphic wrapper, similar to what viruses used to have when they still were designed in an elegant way instead of a 100+ kB visual-whatever executable, the program could be even immune to scanners looking for known signatures. (Though the characteristics of polymorphism can be revealing on their own, if the scanning engine uses heuristic approach.) > Web sites that surreptitiously send programs to a visitor's computer are an > increasingly security menace, said Chris Wysopal, research director at security > consultancy AtStake in Boston. The most common threat of this kind are various advertisement-related spywares, often porn-related, and premium-rate phone dialers. Targeted to just about any user who has the bad luck, number of installations being the goal (in my terminology, "horizontal threat"). "Vertical threat", targeted to one certain person or group, like the mentioned email one, appears more rarely. > "The risk has always been there, but when the tools are really easy to use > you are going to see more spying going on," he said. This applies to everything. There are pointclickistic generators of viruses and worms for years Out There too. Spying by computer isn't anything new. If I remember correctly, on some campus there was an experimental program that used microphones built in the Sun workstations to eavesdrop at them; I think the purpose wasn't to spy, but to figure out if/how it is possible. Many contemporary trojans have advanced sound and webcam capabilities too, though. > The only defenses are anti-virus software, which may be able to detect the > spyware, and a personal computer firewall which can alert a user when the trojan > tries to connect to the Internet to send data out, according to Wysopal. And security patches installed, and disabled ActiveX and eventually even javascript, and not using Microsoft email software; LookOut is one of the most prevalent worm spreading vectors, uses obscure format of the mailboxes (which makes restoring the mails in case of system crash or other mishap being something between difficult and futile, not speaking about being about twice as big than Mozilla's unix-like format), and has other problems. Pegasus Mail or Eudora are good alternatives, in my company we're recently phasing to Mozilla. There are even convertors of .dbx files to standard unix format; OE2MBX is the one we're using. Can supply for request, both Linux and Windows binaries and the source code. > People should be cautious about allowing Web sites to run unknown code on > their PC, he added. Situation is slowly improving, on both fronts. Microsoft finally got the right idea and disabled ActiveX on MSIE in their Windows 2003 product (and market it as great security improvement, which it is, but the very fact that it took them several years to uncheck one checkbox in default installation is telling), and people jump their ship and switch to alternatives. > Find this article at: > http://www.cnn.com/2003/TECH/internet/09/30/spyware.lover.reut/index.html More info about them at http://george.hotelling.net/90percent/linkage/lover_spy.php Their server is at this moment down (domain name unreachable from any of my accounts nor from www.samspade.org, timeouting, so looks their nameserver is down). According to the Net, they have two other domains - www.lover-spy.com (timeouting as well) and www.emailpi.com (resolving to 66.139.73.231, which belongs under ServerBeach.com ISP, which according to their WHOIS data are located in San Antonio, Texas - at least their offices). PS: There is a vulnerability recently discovered in OpenSSL library, used by numerous products in Linux/BSD world, and by some Windows programs as well. So I am patching like mad tonight. At least unixes don't need to be rebooted after anything else than kernel upgrade... PS2: If anyone of you here operates unix machines, I can offer a new version of netcat, a popular networking tool, with some third-party and some my personal patches. The third-party ones are eg. SSL support (VERY VERY useful thing), broadcasts, and acting as server, my ones are support for HTTPS proxies, better timeouting (so the process can die if stalled, good for production-level systems), memory locking, and giving up rights (setuid, setgid, chroot). More functions, like encryption in UDP mode and more granularity in handling SSL certificates (the best way to learn how to work with them is hands-on in the software itself) being prepared. Ask me if you have any use for it. For some additional fun and names, check WHOIS on the domains of the Lover Spy peddlers: [10.0.0.2] Query: gootle.us Registry: whois.nic.us Results: Domain Name: GOOTLE.US Domain ID: D4088328-US Sponsoring Registrar: ENOM, INC. Domain Status: ok Registrant ID: 055F54EB3D52699E Registrant Name: Jeff Romelus Registrant Organization: Romelus Hosting Registrant Address1: 250 George Street Registrant City: Sydney Registrant Postal Code: 2000 Registrant Country: Australia Registrant Country Code: AU Registrant Email: romeluss2000@y... Registrant Application Purpose: P1 Registrant Nexus Category: C32/US Administrative Contact ID: 055F54EB3D52699E Administrative Contact Name: Jeff Romelus Administrative Contact Organization: Romelus Hosting Administrative Contact Address1: 250 George Street Administrative Contact City: Sydney Administrative Contact Postal Code: 2000 Administrative Contact Country: Australia Administrative Contact Country Code: AU Administrative Contact Email: romeluss2000@y... Administrative Application Purpose: P1 Administrative Nexus Category: C32/US Billing Contact ID: 055F54EB3D52699E Billing Contact Name: Jeff Romelus Billing Contact Organization: Romelus Hosting Billing Contact Address1: 250 George Street Billing Contact City: Sydney Billing Contact Postal Code: 2000 Billing Contact Country: Australia Billing Contact Country Code: AU Billing Contact Email: romeluss2000@y... Billing Application Purpose: P1 Billing Nexus Category: C32/US Technical Contact ID: 055F54EB3D52699E Technical Contact Name: Jeff Romelus Technical Contact Organization: Romelus Hosting Technical Contact Address1: 250 George Street Technical Contact City: Sydney Technical Contact Postal Code: 2000 Technical Contact Country: Australia Technical Contact Country Code: AU Technical Contact Email: romeluss2000@y... Technical Application Purpose: P1 Technical Nexus Category: C32/US Name Server: NS.NIKNAME.BIZ Name Server: NS1.NIKNAME.BIZ Created by Registrar: ENOM, INC. Last Updated by Registrar: ENOM, INC. Domain Registration Date: Thu Apr 17 16:02:46 GMT 2003 Domain Expiration Date: Fri Apr 16 23:59:59 GMT 2004 Domain Last Updated Date: Mon Sep 29 18:47:25 GMT 2003 >>>> Whois database was last updated on: Tue Sep 30 23:58:13 GMT 2003 <<<< NeuStar, Inc., the Registry Administrator for .US, has collected this information for the WHOIS database through a .US-Accredited Registrar. This information is provided to you for informational purposes only and is designed to assist persons in determining contents of a domain name registration record in the NeuStar registry database. NeuStar makes this information available to you "as is" and does not guarantee its accuracy. lawful purposes and that, under no circumstances will you use this data: (1) to allow, enable, or otherwise support the transmission of mass unsolicited, commercial advertising or solicitations via direct mail, electronic mail, or by telephone; (2) in contravention of any applicable data and privacy protection laws; or (3) to enable high volume, automated, electronic processes that apply to the registry (or its systems). Compilation, repackaging, dissemination, or other use of the WHOIS database in its entirety, or of a substantial portion thereof, is not allowed without NeuStar's prior written permission. NeuStar reserves the right to modify or change these conditions at any time without prior or subsequent notification of any kind. By executing this query, in any manner whatsoever, you agree to abide by these terms. NOTE: FAILURE TO LOCATE A RECORD IN THE WHOIS DATABASE IS NOT INDICATIVE OF THE AVAILABILITY OF A DOMAIN NAME. All domain names are subject to certain additional domain name registration rules. For details, please visit our site at www.whois.us. Results brought to you by the GeekTools WHOIS Proxy v3.1.5 Server results may be copyrighted and are used with permission. [10.0.0.2] Query: lover-spy.com Registry: whois.namesdirect.com Results: The data contained in the WHOIS database, while believed by the company to be reliable, is provided "as is", with no guarantee or warranties regarding its accuracy. This information is provided for the sole purpose of assisting you in obtaining information about domain name registration records. Any use of this data for any other purpose, including, but not limited to, allowing or making possible dissemination or collection of this data in part or in its entirety for any purpose, such as the transmission of unsolicited advertising and solicitations, is expressly forbidden without the prior written permission of this company. By submitting an inquiry, you agree to these terms of usage and limitations of warranty. Please limit your queries to 10 per minute and one connection. Registrant: Bryan Payne 1013 3rd ave. New York, NY 10013 US Registrar: NAMESDIRECT Domain Name: LOVER-SPY.COM Created on: 11-AUG-03 Expires on: 11-AUG-04 Last Updated on: 12-AUG-03 Administrative, Technical Contact: Payne, Bryan epiteam@h... 1013 3rd ave. New York, NY 10013 US 212-555-1212 Domain servers in listed order: NS1.NIKNAME.BIZ NS.NIKNAME.BIZ End of Whois Information Results brought to you by the GeekTools WHOIS Proxy v3.1.5 Server results may be copyrighted and are used with permission. [10.0.0.2] Query: emailpi.com Registry: whois.networksolutions.com Results: NOTICE AND TERMS OF USE: You are not authorized to access or query our WHOIS database through the use of high-volume, automated, electronic processes. The Data in Network Solutions' WHOIS database is provided by Network Solutions for information purposes only, and to assist persons in obtaining information about or related to a domain name registration record. Network Solutions does not guarantee its accuracy. circumstances will you use this Data to: (1) allow, enable, or otherwise support the transmission of mass unsolicited, commercial advertising or solicitations via e-mail, telephone, or facsimile; or (2) enable high volume, automated, electronic processes that apply to Network Solutions (or its computer systems). The compilation, repackaging, dissemination or other use of this Data is expressly prohibited without the prior written consent of Network Solutions. You agree not to use high-volume, automated, electronic processes to access or query the WHOIS database. Network Solutions reserves the right to terminate your access to the WHOIS database in its sole discretion, including without limitation, for excessive querying of the WHOIS database or for failure to otherwise abide by this policy. Network Solutions reserves the right to modify these terms at any time. Registrant: Info Storm Design (YLEQSMKFYD) 222 J St #320 San Diego, CA 92101 US Domain Name: EMAILPI.COM Administrative Contact, Technical Contact: Perez Carlos (MEPTPIRJVO)carlospm2@h... 222 J St #320 San Diego, CA 92101 US 619-233-7337 fax: 999-999-9999 Record expires on 02-Feb-2004. Record created on 02-Feb-2002. Database last updated on 30-Sep-2003 20:23:47 EDT. Domain servers in listed order: NS1.GEODNS.NET 66.139.72.14 NS2.GEODNS.NET 66.139.72.20 Results brought to you by the GeekTools WHOIS Proxy v3.1.5 Server results may be copyrighted and are used with permission. 7808 From: R. Snyder Date: Wed Oct 1, 2003 4:54pm Subject: Re: profiling of copper cabling I agree with kondrak. Despite its size, I personally prefer the CTC 4910 for such capacitance measurements. As for the megger, as long as I can be sure that nothing else is connected to the cabling, that it's wired properly, and that no one else could possibly come in contact with the cabling during testing, I like Ma Bell's big, old, and very heavy KS-14103-L3 breakdown test set, which puts out 630VDC at about 3 amps short circuit current, as it not only provides resistance testing at a high voltage, but also helps neutralize any threats not capable of either withstanding 630VDC or dissipating 2KW. (What other piece of equipment powered by non-rechargeable batteries holds approximately three megajoules of stored energy?) Just be sure not to use it on cabling incapable of withstanding the voltage and be sure to observe the necessary safety precautions. __________________________________ Do you Yahoo!? The New Yahoo! Shopping - with improved product search http://shopping.yahoo.com 7809 From: szabo4381 Date: Thu Oct 2, 2003 0:55am Subject: Re:working in Russia Dear Sir, If your customer is working in the financial sector (banking, assurence, etc) you've to assume, that 99,99% in this case the FSB "is there" (inside employees+techniques), therefore you"ve a chance og less, than 5% discovering bugs, or generally, performing an effective sweep...(I mean,you will be noticed, when you entered in Russia with your equipment,and every step of yours will be monitorised-so, maybe you will find some pro-bugs (for your satisfaction) but, the real bugs will not be discovered electronically, you've to find them physically...a hard, or even impossible work without mobile X-ray machine or distructive examination ! A better idea could be making hard to impossible the eavesdropping in the area : Rf+audio jamming... for this purpose, there are many russian quality equipment manufacturer, avoiding the customs birocracies... This is my humble opinion, sorry for my primitive english.. 7810 From: mooty_7 Date: Thu Oct 2, 2003 6:05am Subject: EM classes at MIT online started to down load class lec pdf and it locked up my box 3 times in a row...somthing funky with these links or maybe just my box... 7811 From: Scott Malcolm Date: Fri Oct 3, 2003 2:18pm Subject: Re: profiling of copper cabling >I like Ma Bell's big, old, and very heavy KS-14103-L3 > breakdown test set, which puts out 630VDC at about 3 > amps short circuit current, as it not only provides > resistance testing at a high voltage, but also helps > neutralize any threats not capable of either You make a good point about making sure both ends are clear before you burn. Also that nobody is in in the section working when your burning on it. Nothing like a cable repairman waiting for you with a line hammer because you tried to make him an Arc Angel . They will find you on the lead. For troubles usually old16 ga. that just wouldn't burn in we would parallel two break down sets together and you could guarantee that open or a real big short. Once again real good point about no equipment being tied down on either end. In the wrong hands this equipment can create a lot of damage. Regards, Scott Malcolm Malcolm & Associates, Inc. Serving the State of Wisconsin http://www.execpc.com/~conf-pi Office 262 965 4426 / Fax 262 965 4629 ____________________________________________________ > Message: 5 > Date: Wed, 1 Oct 2003 14:54:04 -0700 (PDT) > From: "R. Snyder" > Subject: Re: profiling of copper cabling > > I agree with kondrak. Despite its size, I personally > prefer the CTC 4910 for such capacitance measurements. > As for the megger, as long as I can be sure that > nothing else is connected to the cabling, that it's > wired properly, and that no one else could possibly > come in contact with the cabling during testing, I > like Ma Bell's big, old, and very heavy KS-14103-L3 > breakdown test set, which puts out 630VDC at about 3 > amps short circuit current, as it not only provides > resistance testing at a high voltage, but also helps > neutralize any threats not capable of either > withstanding 630VDC or dissipating 2KW. (What other > piece of equipment powered by non-rechargeable > batteries holds approximately three megajoules of > stored energy?) Just be sure not to use it on cabling > incapable of withstanding the voltage and be sure to > observe the necessary safety precautions. 7812 From: human being Date: Thu Oct 2, 2003 10:54am Subject: Re: EM classes at MIT online it may be how the link is notated, as I use the carets ('<' and '>') to deal with the line wraps on e-mails. the following are some other links to try, in case you're interested in another try... Video Lectures -- Electricity and Magnetism Electricity and Magnetism // TEAL. Visualizations... Destroying a Magnetic Field // movie SUBJECT: Two Wires in Series // movie MIT OpenCourseWare >> Electrical Engineering and Computer Science 6.061 / 6.979 Introduction to Electric Power Systems, Spring 2003 6.635 Advanced Electromagnetism, Spring 2003 6.013 Electromagnetics and Applications, Fall 2002 // see .mov demos 8.02 Electricity and Magnetism, Spring 2002 // Prof. Walter Lewin 8.02 Electricity and Magnetism: TEAL:Studio Physics Project, Fall 2002 8.022 Physics II: Electricity and Magnetism, Fall 2002 8.04 Quantum Physics I, Spring 2003 8.07 Electromagnetism II, Fall 2002 6.101 Introductory Analog Electronics Laboratory, Fall 2002 6.111 Introductory Digital Systems Laboratory, Fall 2002 6.002 Circuits and Electronics, Fall 2000 5.73 Introductory Quantum Mechanics I, Fall 2002 5.74 Introductory Quantum Mechanics II, Spring 2003 SUBJECT: Radiation Pattern of a Quarter Wave Antenna Two Point Charges -- something else, on oscilloscopes: sought this out after checking out 'how to test everything electronic' from the library, they discussed oscilloscopes and discussed the lissajous patterns. various TSCM basics it would seem, about how to read patterns and hook up for testing. wondered if anyone read this and thought it was a good book. one I find a great introduction to the workings of things electronic is 'How to Read Schematics' published by SAMS, cannot say enough good about this, it even has helped me figure out this gutted antique vacuum tube radio nearby, whose dial turns (tunes) a visible variable capacitor. wild. Lissajous LabS // JAVA, design lissajous figures 7813 From: ymalaiya Date: Thu Oct 2, 2003 7:41pm Subject: IEEE Int Symp Software Reliability Eng (ISSRE 03) Call for Particpation ISSRE 2003 presents one of most extensive programs ever which covers industrial applications, current research, fast abstracts and winners of the student paper awards in addition to four distinguished keynote speakers. In addition there are two Tutorials and the Workshop on Software Assessment. ISSRE 2003 Organizing Committee ===== ISSRE 2003 Call for Particpation ===== 14th IEEE International Symposium on Software Reliability Engineering Extending the Reach of Software Reliability Engineering Hilton Denver Tech South Denver, Colorado Nov 17-20, 2003 ISSRE Home page: http://issre2003.cs.colostate.edu Preliminary Program Draft 10/2/2003 === Monday, 11/17/2003 Tutorials and Workshop === 8:00-12:30 Tutorial 1: J. Musa: "More Reliable Software Faster and Cheaper" 1:30-5:30 Tutorial 2: B. Cukic "Introduction to Biometrics System Assurance" 8:30-5:30 Workshop on Software Assessment 6:30-8:30 Reception === Tuesday, 11/18/2003 Industry Practice Day === 8:30-9:30 Keynote: Nicholas Bowen, IBM 10:00 - 11:30 Parallel Sessions A-1. Testing techniques Acceleration and Optimization of Defect Detection over Covered Tests, - J. Xu , C. Li and X. Wang, Cisco Systems Branch Coverage Testing and Visualization for Domain Specific Languages, - H. Zheng & I. Baxter, Semantic Designs The example of improving quality of imbedded system software applied to automated software test methods, - S.-S. Han, I.-S.g Yang, E. Kim and S. D. Park, Samsung B-1 Development Methodology Application of IEEE Standard Dictionary of Measures of the Software Aspects of Dependability, - N. Schneidewind, Naval Postgraduate School Is Software Error Estimation Compatible with Agile Development Teams?, - J. Hagar, Lockheed Martin Preparation Effort in Effective Code Inspections, - Z. Matic and R. Stoddard, Motorola C-1 Quality & Process Improvements Implementing Process and Quality Improvements During Difficult Economic Times, - R. Cheatham, IBM Printing Systems 1:00 - 2:00 Keynote: Paul England, Microsoft 2:30-4:00 Parellel sessions A-2. Testing Distributed Environments Analysis of Communication Traces to Improve Reliability of Distributed Systems, - A. Ulrich, Siemens Intelligent SAN Test framework (INSAT), - K. Dhanadevan and M. Satish Kumar, HP Experience with a Profile-based Automated Testing Environment, - R. Binder, Mobile Systems Verification B-2 Understanding Quality of Service Automatic Detection of Service Degradations in Telecom Systems, - A. M. da Silva Filho, M. K. I. Doi, A. Morales and P. Lima, State U of Maringa Quality of Service for Web services-'Demystification, Limitations & Best practices', - R. Sumra & D. Arulazi, HP QoS and Reliability in Smart Homes, - N. Dhanakoti, Satyam Computer Services C-2 Fast abstracts I: Security and Reliability: Techniques, Assurance and Modeling http://www.cs.colostate.edu/~malaiya/issre/fastabstracts.html 4:15-5:45 Parellel sessions A-3 Approaches to Reliability Improvement Software Failure Modes and Effect Analysis - Techniques & Methods, - K. Sundaram, R. Stoddard, M. Olaosebikan, T. Petersen & E. Vraney , Motorola Resilience for Autonomous Agents, - M. Mowbray and M. M. Williamson, HP Data-Driven with Data Mining for Reliability, - R. Wen, AP Technology B-3 Measuring Reliability& Availability Measuring and Improving System Availability -- Field Performance and In-Process Metrics, - S. Kan & D. Manlove, IBM System Reliability and Availability Measurement Methodology, - A. George & M. G. Becker, HP A Tool for Calculating Software Reliability Predictions Based on Latent Fault Density, - J. Peterson, Raytheon C-3 Panel: Open source software - A recipe for vulnerable software or the only way to keep bugs and bad guys out?, - Coordinator: S. Bagchi === Wednesday, 11/19/2003 Research Day 1 === 8:30-9:30 Keynote: Dr. Bhavani Thuraisingham, NSF 10:00 - 12:00 Parallel Sessions 1A. Test Effectiveness I Detection or isolation of defects? an experimental comparison of unit testing and code inspection, - P. Runeson, A. Andrews Toward a comprehensive and systematic methodology for class integration testing, - L.C. Briand, Y. Labiche, Y. Wang Optimal resource allocation for the quality control process, - P. Jalote, B. Vishal Test-driven development as a defect-reduction practice, - L. Williams, E. M. Maximilien, M. Vouk 1B. Requirements Analysis Building a requirement fault taxonomy: experiences from a NASA verification and validation research project, - J. H. Hayes A new software testing approach based on domain analysis of specifications and programs, - R. Zhao, M. R. Lyu, Y. Min Static specification analysis for termination of specification-based data structure repair, - B. Demsky, M. Rinard Requirements by contracts allow automated system testing, - C. Nebut, F. Fleurey, Y. Le Traon, J.-M. JÈzÈquel 1C. Student Papers: http://www.cs.colostate.edu/~malaiya/issre/studentpapers.html 1:30-3:00 PM Parallel Sessions 2A. Test Effectiveness II Coverage criteria for logical expressions, - P. Ammann, J. Offutt and H. Huang Anomalies as precursors of field failures, - S. Elbaum, S. Kanduri, A. Andrews An empirical study on testing and fault tolerance for software reliability engineering, - M. R. Lyu, Z. Huang, Sam K.S. Sze 2B. Secure Systems Tamper resistence for software protection, - H. Jin, J. Lotspich A framework for tamper detection marking of mobile applications, - M. Jochen, L. M. Marvel, L. L. Pollock High-assurance synthesis of security services from basic microservices, - S. Kim, F. B. Bastani, I-L. Yen, and I.-R. Chen 2C. Formal Reliability Analysis Shared semantic domains for computational reliability engineering, - D. Coppit, R. R. Painter, and K. J. Sullivan Enhanced testing of domain specific applications by automatic extraction of axioms from functional specifications, - A. Sinha, C. Smidts, A. Moran Thoroughness of specification-based testing of synchronous software, - I. Parissis and J. Vassy 3:30-5:00 Parallel Sessions 3A. Empirical Studies and Tools Automating the analysis of voting systems, - S. Yacoub, X. Lin, S. Simske, J. Burn A bayesian belief network for predicting residual faults in software products, - S. Amasaki, Y. Takagi, O. Mizuno, and T. Kikuno An explotarory study of component reliability using unit testing, - R. Torkar, S. Mankefors, K. Hansson and A. Jonsson 3B. Software Reliability Modeling Using a log-normal failure rate distribution for worst case bound reliability prediction, - P.G. Bishop and R.E. Bloomfield An iterative scheme for maximum likelihood estimation in software reliability modeling, - H. Okamura, Y. Watanabe and T. Dohi Fault correction profiles, - N. F. Schneidewind 3C. Fast Abstracts II: Network/Distributed systems reliability engineering; Validation/Verification http://www.cs.colostate.edu/~malaiya/issre/fastabstracts.html 6:30-8:00 Banquet === Thurssday, 11/20/2003 Research Day 2 === 8:30-9:30 Keynote: Prof. Barry Boehm 10-00 - 11:30 Parallel Sessions 4A. Empirical Studies Early warning of failure through alarm analysis - a case study in telcom voice mail systems, - D. Levy, R. Chillarege Reducing wasted development time via continuous testing - D. Saff, M. D. Ernst User-oriented reliability modeling for a web system, - W.-L. Wang and M.-H. Tang 4B. Architectural Approaches I Assessing uncertainty in reliability of component--based software systems, - K. Goseva-Popstojanova and S. Kamavaram When does it pay to make software more reliable?, - E. Stoker and J. B. Dugan Test adequacy assessment for UML design model testing, - S. Ghosh, R. France, C. Braganza, N. Kawane, A. Andrews, O. Pilskalns 4C. Panel 1:00-2:30 Parallel Sessions 5A. Software Testing A parametrized cost model to order classes for class-based testing of c++ applications, - B. A. Malloy, P. J. Clarke and E. L. Lloyd Exploiting symmetries to test programs, - A. Gotlieb Non-intrusive debug technique for embedded programming, - L. J. Moore, A. R. Moya 5B. Architectural Analysis II Composition analysis of qos properties for adaptive integration of embedded software components, - H. Ma, I-L. Yen, F. Bastani, K. Cooper Augmenting simulated annealing to build interaction test suites, - M. B. Cohen, C. J. Colbourn, A. C.H. Ling Darx - a framework for the fault-tolerant support of agent software, - O. Marin, M. Bertier, P. Sens 5C. Fast Abstracts III: Software Reliability: Architecture, Practice and tools http://www.cs.colostate.edu/~malaiya/issre/fastabstracts.html 3:00-4:30 Parallel Sessions 6A. Metrics Investigating java type analyses for the receiver-classes testing criterion, - P.-L. Brunelle, E.e Merlo, G. Antoniol Incremental dynamic impact analysis for evolving software systems, - J. Law, G. Rothermel A comparison of coverage-based and distribution-based techniques for filtering and prioritizing test cases, - D. Leon, A. Podgurski 6B. Probabilistic Analysis Integrating software into PRA, - B. Li, M. Li, S. Ghose, C. Smidts New quality estimations in random testing, - S. Mankefors, R. Torkar, A. Boklund Maximizing interval reliability in operational software system with rejuvenation, - H. Suzuki, T. Dohi, N. Kaio and K. S. Trivedi 6C. Fast Abstracts IV: Software Testing: Methodology, Effectiveness and Empirical Studies http://www.cs.colostate.edu/~malaiya/issre/fastabstracts.html 4:40 - 5:30: Closing remarks, ISSRE 2004 Overview === Registration === To qualify for early registration discounts, your registration form and payment must be received by 5:00pm Eastern Time, Monday, 27 October 2003. Registrations received between 27 October and 10 November will be charged at the late registration rate. To register please visit: http://issre2003.cs.colostate.edu/ ==== IEEE Computer Society, Reliability Society ===== === Support Ack: Microsoft, IBM, Sun, Cigital ===== 7814 From: Date: Fri Oct 3, 2003 3:39pm Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: Please indicate how much you think an extremely good TSCM specialist should be charging as a flat daily rate (per person). o Under $500 per day o $500 to $1500 o $1500 to $2500 o $2500 to $5000 o Over $5000 per day To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1141502 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 7815 From: Charles Patterson Date: Fri Oct 3, 2003 11:32pm Subject: Avcom PSA-65B plus freq extender on ebay Hi, I have relisted my Avcom PSA65b on ebay and have included the frequency extender, up to 2.5 GHz (that's GiggleCycles for Steve :) http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=2562771926 Great for anyone just getting into the business. Free shipping if you mention seeing it here on the TSCM-L list Charles Charles Patterson Global Communications Tarrytown, NY charles@t... [Non-text portions of this message have been removed] 7816 From: Steve Uhrig Date: Sat Oct 4, 2003 11:28am Subject: Re: Gigglecycles On 4 Oct 2003 at 0:32, Charles Patterson wrote: > up to 2.5 GHz (that's GiggleCycles for Steve :) Frequency is measured in cycles. Not bushels, cubits or yards. Hertz rents cars. And spell checkers dislike the mixed case in GHz and keeps trying to correct it, making me look like I don't know how to spell it. So I don't bother. I am a believer in higher frequencies though. Anything below 100 megacycles is useful only for audio or IF. My transistor sings with unwanted parasitics. The smoke escapes. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7817 From: Robert Motzer <1RCM@M...> Date: Sat Oct 4, 2003 0:52pm Subject: Question Hi List, Let me state right up front that I'm not posting this in order to enter into any personal debate with anyone or to invite any attack on myself or any others. I'm simply posting it to try to spur some possibly enlightening answers to one of several questions that has rolled-around within the TSCM community for rears. So here goes: Recently a survey was posted regarding rates. It essentially asked for votes on how much providers thought the efforts of a "professional" sweeper is worth for a day of service (the average sweep job I would assume). The numbers ranged from $500.00 to $5,000.00. When I first entered into the trade I was fortunate-enough to receive counsel from a number of established individuals who could be considered preeminent in the field. During those discussions it was usually inferred that a $500 sweep was either the work of a charlatan or a fool. So I think it would be interesting to take that survey a step further. Even before the numbers are 'in and wrapped' I think it would be interesting to see if any of the list members honestly feel that a $500 sweep exists (not if others are doing them but rather if you yourself are doing them or would do them). If so it would be interesting to know exactly what is done during the sweep and what equipment is utilized. I realize that rates fluctuate with both the territory and the client but I centered on the lowest number for a specific reason. Discussions within our community regarding 'professionals' vs. charlatans abound. This debate just might go a bit towards answering the first of several questions that seem to universally always delineate between 'professional' and 'charlatan' in those discussions. I realize that the above certainly does have the potential to generate some very strong feelings. So thoughts, opinions, facts and the like only please. No personal attacks, moral or personal rants, or back-and-forth arguments (do all that off-list if you must). We all claim to be professionals so let's agree to act that way before we start to tap on the keys. With that in mind, what do you think. Take Care ... Bob Motzer [Non-text portions of this message have been removed] 7818 From: Steve Uhrig Date: Sat Oct 4, 2003 1:29pm Subject: Re: Question On 4 Oct 2003 at 13:52, Robert Motzer wrote: > I think it would be interesting to see if any of the list members > honestly feel that a $500 sweep exists (not if others are doing them > but rather if you yourself are doing them or would do them). My time is too valuable to even answer the phone for a $500 sweep. And I've had to develop the reputation to where the phone doesn't ring from people who expect work for those rates. I have no problems with local PIs and charlatans who charge less than I do. They know what their service is worth. The key is 'competent sweeper'. That eliminates nearly anyone who would bother to 'work' for $500. You might consider adding 'competent businessman' to the equation. There are plenty of competent sweepers who are lousy businessmen. $500 won't maintain decent equipment. What's a CRT for a Tek 494 cost? How many sweeps do you have to do for $500 to pay your overhead, which for me is about a $10K nut per month I've got to crack before one cent goes to anything else. And you get back to basic business. Volume versus profit. I believe in lower volume and higher profit per job. In college business classes, they teach you to how to plot the parabola (open end down), with one axis being the price you charge for a product or service, and the other being the number of units sold. The point on the parabola where the two axes intersect is profit. You want to be as close to the peak of the parabola as possible. Charge a very low price and you'll sell zillions of units, but your profit will be at the low left point on the parabola, or very low. Charge a zillion dollars per unit, and your volume of sales also will be very low, on the opposite low right point of the curve. A knowledgeable businessperson will do research, learn and keep current with his market, and do some experimenting with pricing to place his profit point on the curve as close to the peak as possible. Not every algorithm will work the same for every person. For me, high prices and subsequent lower volume keeps me pretty close to the peak. I know what I have to charge to generate the corresponding volume of sales to keep profits at or close to the peak. This is a dynamic thing. You have to know the market, keep your ear to the ground and possibly readjust as conditions change. Another benefit of higher prices is you tend to attract a better class of clients. Almost without exception, the problems I have had with clients have been the ones who were price sensitive. My better clients don't even ask the price and don't know until they get the invoice, and they don't care. I've learned to turn down the ones who appear too price sensitive. Figured into the profit also is long term hassles. Some clients will pay a lot, but if they're particularly needy and you end up wasting a lot of time with them being a counselor and confessor and scratching post, they're not worth (to me) having as a client. The quickest way to get me to hang up the phone on you is to start a conversation with 'What's your price on ...?'. Anyone shopping price has proven, in my experience, to be a pain in the large of the back. The large of the back is directly below the small of the back. Not worth it. Get rid of them and go onto other stuff. Different things work for different people. We can only talk in generalities. If you have full time employment elsewhere, your standards can be different from someone who depends on self employment full time to feed his family. Same thing if you're retired from somewhere and drawing a pension, or you're playing at self employment and your wife works full time to pay the light bill. If you've been so incredibly stupid as to borrow money to buy sweep equipment, which you should NEVER do, and you have credit card or note payments to make, you're forced into being a whore and taking whatever scut work you can attract from the gutter. If you've been patient, worked long and hard and honestly over many years and built a reputation and have a large customer base of people who trust you, you can name your own price and get it. Then you'll attract decent, reliable, well heeled clients who are a pleasure to service and all are happy. That's the position to aim for, but it takes a long time. However, time is going to pass anyway, so it's just a matter of where you will be in 5 or 10 years. Older definitely. Self employed, maybe. Profitable, maybe. It's far more important to be a businessman than a technoweenie. There are fifty thousand technoweenies for every competent businessman out there. Yeah, you have to be technically capable of doing the work. But you have to be able to sell it and manage a business first. That's where most of the problems lie with people who are struggling. Good question. You'll get as many answers as people you ask. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7819 From: Steve Uhrig Date: Sat Oct 4, 2003 2:03pm Subject: Re: Question - more I should add my comments in my previous post apply to the United States only. I realize economies and standards are very different in other countries, and some of my observations would not apply. Much of them would, however. We have a competent and ethical gentleman in Romania on this list. I suspect he'll never see a $500 sweep as that's probably more than an average man earns in a year. $500 probably is an average weekly wage here in the United States for a middle class worker. And there are different types of income other than cash. If you genuinely enjoy the work and don't need the income to support your family, I could accept an argument for working cheaper. Psychic income can compensate for financial income. I suspect the majority of people who would classify themselves as sweepers actually are in it for the perceived glamour rather than to actually earn a profit. They may try to earn a profit, but very few people even recover their investment in equipment, let alone come out ahead. Equipment is not an investment unless it returns more than you spend on it. If it doesn't, it's an expense. But few are honest enough with themselves to admit that. Those types will skew the statistics. And those types will vote in the poll, probably never having been in a profit position in the profession. Remember these considerations. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7820 From: Charles Patterson Date: Sat Oct 4, 2003 10:20pm Subject: Re: Question Regarding the sweep price question, I often consider this: I found from a company that rents AV equipment, that they generally price equipment rentals at 10% of the purchase price. So if we figure that an average competant sweeper may have $100,000 to $200,000 worth of equipment at their disposal, then just to rent the equipment for one day/ event should be at least $10,000. We add the equipment operators, techniques, brains, great personality, and good looks and charge usually a good bit less than that. If a client tries argue price, I will sometimes point this out to them. Often they do not know what to expect and envision that you will walk in with one briefcase, hide in a quiet room, and be finished in an hour or so. When I explain the extent of a full sweep, I can sometimes tell that they are having their mind expanded at the same time. Charles ----- Original Message ----- From: Robert Motzer To: TSCM-L Sent: Saturday, October 04, 2003 1:52 PM Subject: [TSCM-L] Question Hi List, Let me state right up front that I'm not posting this in order to enter into any personal debate with anyone or to invite any attack on myself or any others. I'm simply posting it to try to spur some possibly enlightening answers to one of several questions that has rolled-around within the TSCM community for rears. So here goes: Recently a survey was posted regarding rates. It essentially asked for votes on how much providers thought the efforts of a "professional" sweeper is worth for a day of service (the average sweep job I would assume). The numbers ranged from $500.00 to $5,000.00. When I first entered into the trade I was fortunate-enough to receive counsel from a number of established individuals who could be considered preeminent in the field. During those discussions it was usually inferred that a $500 sweep was either the work of a charlatan or a fool. So I think it would be interesting to take that survey a step further. Even before the numbers are 'in and wrapped' I think it would be interesting to see if any of the list members honestly feel that a $500 sweep exists (not if others are doing them but rather if you yourself are doing them or would do them). If so it would be interesting to know exactly what is done during the sweep and what equipment is utilized. I realize that rates fluctuate with both the territory and the client but I centered on the lowest number for a specific reason. Discussions within our community regarding 'professionals' vs. charlatans abound. This debate just might go a bit towards answering the first of several questions that seem to universally always delineate between 'professional' and 'charlatan' in those discussions. I realize that the above certainly does have the potential to generate some very strong feelings. So thoughts, opinions, facts and the like only please. No personal attacks, moral or personal rants, or back-and-forth arguments (do all that off-list if you must). We all claim to be professionals so let's agree to act that way before we start to tap on the keys. With that in mind, what do you think. Take Care ... Bob Motzer [Non-text portions of this message have been removed] Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 7821 From: Steve Uhrig Date: Sun Oct 5, 2003 1:50pm Subject: Re: Gigglecycles On 5 Oct 2003 at 9:43, Remo.Cornali@r... wrote: > Yep. Them ain't metric units. :-) > You may want to have a look at: > Federal Standard 376B, Preferred Metric Units > for General Use by the Federal Government, Jan 27, 1993 I have no interest whatsoever in being politically correct. > Many pioneering scientists and inventors have been honoured > by asigning their name to the measure of fundamental quantities, > like volt, ohm, and so on. Thank you for the history lesson. Need a refresher after 30+ years. Did you know the value of the volt was redefined some years ago? For a short time after the transition, precision test equipment was labeled as being calibrated for either the new volt or the old volt. Maybe 15 years ago. > Heinrich Rudolf Hertz,(1857-1894) , > http://www.ideafinder.com/history/inventors/hertz.htm did experiments > with electromagnetic waves, which led to the development of the > wireless telegraph and the radio. Any satisfaction, monetary or other, > you derive from your TSCM work, owes this tribute to his work. Huh. I had thought any monetary satisfaction I derive from my work is due to my personal blood, sweat and tears over the years. I guess that is not a politically correct attitude though. If I owe tribute to anyone for the fruits of MY labour, it is my father, several electronics instructors, several people for whom I worked and taught me the trade and a current slate of 'Elmers' (a ham radio term for a big brother who helps you) several of whom are on this list. We studied metric units when I was in school. Had an instructor in solid state systems who requested an exam answer in milli-furlongs per fortnight. I never knew Herr Hertz. I was very young at the time. Don't believe I owe him anything though. However, I wish I could have accomplished as much in 37 years of my life as he did in his. He has my admiration, but not my obligation. Would you possibly have contact info for Mr. Hertz' family or estate or some organization who will subsidize some of my bills if I start to use his name in my work? In your honour, I will be glad to name a unit of measure after you. I will not specify what will be measured with the unit named after you, however it likely will be in the medical profession probably used by proctologists. Depends. Thank you for your contribution. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7822 From: Hawkspirit Date: Sun Oct 5, 2003 4:25pm Subject: Sweep Charges Charles Patterson" Subject: Re: Question Regarding the sweep price question, I often consider this: I found from a company that rents AV equipment, that they generally price equipment rentals at 10% of the purchase price. So if we figure that an average competent sweeper may have $100,000 to $200,000 worth of equipment at their disposal, then just to rent the equipment for one day/ event should be at least $10,000. Roger says: I didn't do 2500 sweeps in the past thirty years by charging $10,000 each, I like to work and the people I sweep for are always interesting, sophisticated, and fun. I like to sweep three to five times a week because it keeps me sharp. When I take a months vacation like I did recently to go watch waves on the West coast from Cal. to Canada, it took me a few weeks to come up to non thinking speed again. I do 90% of all sweeps that come in as an inquiry and I try to keep the rate at at lease $200.00 to $300.00 per hr. The trick is not to waist time on unnecessary tests and focus on real practical threats. Sweep lean and mean! Roger Tolces Electronic Security www.bugsweeps.com 7823 From: Date: Sun Oct 5, 2003 2:43am Subject: Rif: Re: Gigglecycles > Not bushels, cubits or yards. Yep. Them ain't metric units. :-) You may want to have a look at: Federal Standard 376B, Preferred Metric Units for General Use by the Federal Government, Jan 27, 1993 http://www.usaid.gov/policy/ads/300/fstd376b.pdf Many pioneering scientists and inventors have been honoured by asigning their name to the measure of fundamental quantities, like volt, ohm, and so on. Heinrich Rudolf Hertz,(1857-1894) , http://www.ideafinder.com/history/inventors/hertz.htm did experiments with electromagnetic waves, which led to the development of the wireless telegraph and the radio. Any satisfaction, monetary or other, you derive from your TSCM work, owes this tribute to his work. Ciao! Remo Cornali, Milano, Italy 7824 From: Jeremy Funk Date: Sun Oct 5, 2003 7:23am Subject: Listen to Steve's Words If there are ever truer words, I have not read them. Heed Steve's advice. If you do not know business, you will not succeed. If you are unaware, learn. If it means two years off for more education, then do it. I have ran a business into the ground once. I learned the HARD way. Now, I have learned from my mistakes. The best thing you can do is learn from the mistakes of others. Just ask. Believe me, we will be more than happy to enlighten you. The worst thing you can do is to not plan. Planning involves asking a thousand questions from those who are more fluent than you. Ask. Plan. Do. All the technical knowledge in the world cannot save you from bankruptcy if you are unable to maintain a business sense about you. My two cents. I appreciate the fact that we have a forum here intelligent enough to posess common sense. Some of us have to learn it. Jeremy Funk -- Open WebMail Project (http://openwebmail.org) ---------- Original Message ----------- From: "Steve Uhrig" To: tscm-l@yahoogroups.com Sent: Sat, 04 Oct 2003 14:29:36 -0400 Subject: [TSCM-L] Re: Question > On 4 Oct 2003 at 13:52, Robert Motzer wrote: > > > I think it would be interesting to see if any of the list members > > honestly feel that a $500 sweep exists (not if others are doing them > > but rather if you yourself are doing them or would do them). > > My time is too valuable to even answer the phone for a $500 sweep. > And I've had to develop the reputation to where the phone doesn't > ring from people who expect work for those rates. > > I have no problems with local PIs and charlatans who charge less > than I do. They know what their service is worth. > > The key is 'competent sweeper'. > > That eliminates nearly anyone who would bother to 'work' for $500. > > You might consider adding 'competent businessman' to the equation. > There are plenty of competent sweepers who are lousy businessmen. > > $500 won't maintain decent equipment. What's a CRT for a Tek 494 > cost? How many sweeps do you have to do for $500 to pay your > overhead, which for me is about a $10K nut per month I've got to > crack before one cent goes to anything else. > > And you get back to basic business. Volume versus profit. I believe > in lower volume and higher profit per job. In college business > classes, they teach you to how to plot the parabola (open end down), > with one axis being the price you charge for a product or service, > and the other being the number of units sold. The point on the > parabola where the two axes intersect is profit. You want to be as > close to the peak of the parabola as possible. > > Charge a very low price and you'll sell zillions of units, but your > profit will be at the low left point on the parabola, or very low. > > Charge a zillion dollars per unit, and your volume of sales also > will be very low, on the opposite low right point of the curve. > > A knowledgeable businessperson will do research, learn and keep > current with his market, and do some experimenting with pricing to > place his profit point on the curve as close to the peak as possible. > > Not every algorithm will work the same for every person. > > For me, high prices and subsequent lower volume keeps me pretty > close to the peak. I know what I have to charge to generate the > corresponding volume of sales to keep profits at or close to the peak. > > This is a dynamic thing. You have to know the market, keep your ear > to the ground and possibly readjust as conditions change. > > Another benefit of higher prices is you tend to attract a better > class of clients. Almost without exception, the problems I have had > with clients have been the ones who were price sensitive. My better > clients don't even ask the price and don't know until they get the > invoice, and they don't care. I've learned to turn down the ones who > appear too price sensitive. > > Figured into the profit also is long term hassles. Some clients will > pay a lot, but if they're particularly needy and you end up wasting > a lot of time with them being a counselor and confessor and > scratching post, they're not worth (to me) having as a client. > > The quickest way to get me to hang up the phone on you is to start a > conversation with 'What's your price on ...?'. Anyone shopping price > has proven, in my experience, to be a pain in the large of the back. > The large of the back is directly below the small of the back. Not > worth it. Get rid of them and go onto other stuff. > > Different things work for different people. We can only talk in > generalities. If you have full time employment elsewhere, your > standards can be different from someone who depends on self > employment full time to feed his family. Same thing if you're > retired from somewhere and drawing a pension, or you're playing at > self employment and your wife works full time to pay the light bill. > > If you've been so incredibly stupid as to borrow money to buy sweep > equipment, which you should NEVER do, and you have credit card or > note payments to make, you're forced into being a whore and taking > whatever scut work you can attract from the gutter. > > If you've been patient, worked long and hard and honestly over many > years and built a reputation and have a large customer base of > people who trust you, you can name your own price and get it. Then > you'll attract decent, reliable, well heeled clients who are a > pleasure to service and all are happy. That's the position to aim > for, but it takes a long time. However, time is going to pass anyway, > so it's just a matter of where you will be in 5 or 10 years. Older > definitely. Self employed, maybe. Profitable, maybe. > > It's far more important to be a businessman than a technoweenie. > There are fifty thousand technoweenies for every competent > businessman out there. Yeah, you have to be technically capable of > doing the work. But you have to be able to sell it and manage a > business first. That's where most of the problems lie with people > who are struggling. > > Good question. You'll get as many answers as people you ask. > > Steve > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ ------- End of Original Message ------- 7825 From: John Schmitt Date: Mon Oct 6, 2003 0:23am Subject: Re: Re: Gigglecycles You really need to get that brass antenna out of your ass. Geeze, what an over-reaction to your lack of formal education, fundamental lack of understanding of the metric systems, and general anger at the world of science that isn't "duhhhh, self-larned, from me daddy or the Elmers who larned me da trade". Congratulations on being old; lighten up, Buddy. -- John Schmitt, Ph.D ----- Original Message ----- From: "Steve Uhrig" To: Sent: Sunday, October 05, 2003 2:50 PM Subject: [TSCM-L] Re: Gigglecycles > On 5 Oct 2003 at 9:43, Remo.Cornali@r... wrote: > > > Yep. Them ain't metric units. :-) > > You may want to have a look at: > > > Federal Standard 376B, Preferred Metric Units > > for General Use by the Federal Government, Jan 27, 1993 > > I have no interest whatsoever in being politically correct. > > > Many pioneering scientists and inventors have been honoured > > by asigning their name to the measure of fundamental quantities, > > like volt, ohm, and so on. > > Thank you for the history lesson. Need a refresher after 30+ years. > > Did you know the value of the volt was redefined some years ago? For > a short time after the transition, precision test equipment was > labeled as being calibrated for either the new volt or the old volt. > Maybe 15 years ago. > > > Heinrich Rudolf Hertz,(1857-1894) , > > http://www.ideafinder.com/history/inventors/hertz.htm did experiments > > with electromagnetic waves, which led to the development of the > > wireless telegraph and the radio. Any satisfaction, monetary or other, > > you derive from your TSCM work, owes this tribute to his work. > > Huh. > > I had thought any monetary satisfaction I derive from my work is due > to my personal blood, sweat and tears over the years. > > I guess that is not a politically correct attitude though. > > If I owe tribute to anyone for the fruits of MY labour, it is my > father, several electronics instructors, several people for whom I > worked and taught me the trade and a current slate of 'Elmers' (a ham > radio term for a big brother who helps you) several of whom are on > this list. > > We studied metric units when I was in school. Had an instructor in > solid state systems who requested an exam answer in milli-furlongs > per fortnight. > > I never knew Herr Hertz. I was very young at the time. Don't believe > I owe him anything though. However, I wish I could have accomplished > as much in 37 years of my life as he did in his. He has my > admiration, but not my obligation. > > Would you possibly have contact info for Mr. Hertz' family or estate > or some organization who will subsidize some of my bills if I start > to use his name in my work? > > In your honour, I will be glad to name a unit of measure after you. I > will not specify what will be measured with the unit named after you, > however it likely will be in the medical profession probably used by > proctologists. Depends. > > Thank you for your contribution. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 7826 From: Date: Mon Oct 6, 2003 2:57am Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: How long would you say a typical bugsweep of one or two corporate offices and boardroom should take. o less then 15 minutes o 15 minutes to two hours o less than 4 hours o four to eight hours o eight to twelve hours o at least one full day (8+ hours) o one to two days (12 to 24 hours) o two to three days (24-36 hours) o more than 3 days (over 36 hours) o more than 5 days (over 60 hours) To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1142103 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 7827 From: Date: Mon Oct 6, 2003 3:07am Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: When you go out to a clients location to perform a typical corporate bugsweep, how much weight (of tools and equipment) are to hauling to the location. o under 25 pounds o 25-50 pounds o 50-100 pounds o 100-250 pounds o 250-500 pounds o 500-1000 pounds o 1000-2500 pounds o 2500-5000 pounds o 5000-10000 pounds o over 10000 pounds (5 tons) o Requires a Class A CDL, with airbrakes, doubles, triples, and such o Weight is not an issue, spy shop blinky boxesweigh almost nothing o I don't require any more than a frequency meter, it weighs less than my shoe o The voices in my head tell me when to find the bugs, so I don't need to waste time of equipment. o What, do you have a problem with my fancy briefcase system? To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1142104 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 7828 From: Hawkspirit Date: Mon Oct 6, 2003 9:55am Subject: Chart drive Belts For those of you who are trying to locate drive belts for the Tektronix TDR chart recorders, here is as far as I have gotten tracking them down, If anyone can find a source let us know on the list. Roger The original belt tek number was 214-1709-00 The original OEM supplier was Plastock Inc. 380 Chestnut St. Norwood, NJ 07648 I tried to call their number and I think I had no success although I noted two numbers 203-928-7911 201-575-0038 Then by running the name Plastock I came up with the other company with the 800 number This one: Putnam Precision Molding Inc. > 1-800-704-3304 These are the measurements off a stripped belt belt length 3 1/2 inches belt width 1/8 inches cog gear spacing tooth to tooth (height to height on center) 3/32 inches Might try this place second: The Plastic Drives Inc. line consists of plastic timing belt pulleys, urethane and neoprene timing belts, spur gears, sprockets and roller chain. Whether you require standard stock items or custom modifications, prototype to production runs, we can assist you. Our valued team of employees are dedicated to providing service, quality, innovation and technical support. This Page is under Construction. To request a catalog or more information on the Plastic Drives Line of products, Please call us at 1-877-835-9640 or email us at: sales@c... 7829 From: Hawkspirit Date: Mon Oct 6, 2003 10:09am Subject: Opportunity Knocks http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=3050716670&category=48839 GOING OUT OF BUSINESS: A lucrative electronic counter surveillance business is being offered for sale. PERFORM ELECTRONIC SWEEPS FOR BUGGING DEVICES FOR BUSINESSES AND INDIVIDUALS. includes complete training Course and instructions. The highly sofisticated equipment does all the work for you. UNLIMITED EARNING, E.G. $350 FOR VEHICLE SWEEP, ONLY 10 MINUTES WORK. You receive: The CDS-18, THE WORLDS MOST SOLD COUNTER SURVEILLANCE EQUIPMENT. COMES COMPLETE DETECTING BOTH TELEPHONE AND ROOM BUGS. TELEPHONE Series and Parallel Taps are no match. PICKS UP ANY TYPE OF ROOM BUGGING DEVICE INCLUDING "Frequency Hoppers and Burst Bugs" Also The Most feared of All Bugs "The Infinity Bug" which listens to your conversation when the phone is on the hook. Microwave Detection, Laser Bugs, Concealed Transmitters, Body Transmitters, Bumper Beepers, including Video, Computer and Fax Transmitters. SUBMINITURE BODY WIRE DETECTOR: Wear this cigarette size transmitter detector on your body and perform a discreet sweep of a premise. You will know if someone is wearing transmitter/wire to bug your conversation. THE COMSEC3:Is the first and only telephone line security device which can detect - remote extension drawn loops - the most sophisticated, threatening and common type of electronic surveillance that other security devices can't detect. The COMSEC C3I is the only security device that can detect legal as well as illegal wiretapping anywhere on the local telephone line - including at the telephone company's central exchange. Detect computer hackers, and others using the telephone company's central exchange switching equipment to intercept your private communications. Installs in seconds with standard modular connections. Protects your telephones, computer and fax telecommunications continuously. FREQUENCY COUNTER: A GREAT AID IN DETECTING THE FREQUENCY THAT IS BEING TRANSMITTED. YOU CAN LISTEN IN ON WHAT'S BEING SAID BY TUNING IN TO THE FREQUENCY WITH A SCANNER. HIGH QUALITY EAR PHONES A BABY MONITOR: PRACTISE FINDING IT'S TRANSMISSION. ALL PHONE JACKS, SPLITTERS, POWER CORDS AND MANUALS. The Entire Package Cost Over $1,700, the minimum bid is $500, no reserve after. 7830 From: Date: Mon Oct 6, 2003 6:16am Subject: Re: Opportunity Knocks out "The sum of all fears." In a message dated 10/6/2003 8:09:46 AM Pacific Standard Time, hawkspirit@e... writes: > Also The Most feared of All Bugs "The Infinity Bug" which listens to your > conversation when the phone is on the hook. [Non-text portions of this message have been removed] 7831 From: Hawkspirit Date: Mon Oct 6, 2003 10:44am Subject: Surveillance Van Surveillance Van Item number: 2435281675 http://cgi.ebay.com/ebaymotors/ws/eBayISAPI.dll?ViewItem&category=6729&item=2435281675 7832 From: Ocean Group Date: Mon Oct 6, 2003 0:11pm Subject: Sweep Charges... Well, I can't add much directly, but this is what i reckon... Take heed I'm taking from the other side of the atlantic, yet I reckon pricing shouldn't be too different. I'll also talk about realistic prices.....I know Steve explained his motives and that is fair enough. He obviously has a huge wealth of knowledge, self thought or otherwise, it doesn't matter.....if he asks 10k for a sweep and the client is happy with the value for money then it's perfect. I know people have asked about JMA's charges.....several tens of thousands...and asked if he is for real....and simply answered....I don't know. If someone has super intell agency training and equipment worth a million quid then I guess he is the guy to hire to find that 0.0001mw tx based on mars. It really depends on who is hiring, what the asset is and how much money they have on budget.... If some multi national wants to hire a pro that can fight off the french intell services(pure imaginery example) and they feel that JMA is the man for the job, because of his experience and successful references which they should be able to verify, then there should be no reason to pay the rates asked. I guess what I'm saying is that its a good idea to be able to back up your requested fee with a "....and this is why I cost so much....etc etc....." Something that the likes of Steve can obviously do. But otherwise, in Ireland, you can count on one hand the list of qualified tscm specialists. Actually probably two fingers. You can hire a PI with a scanlock for 300-400 euro (for you dollar users they're pretty much on par....)....and come to think of it, a friend informed me that a PI in the UK makes a damn good living my sweeping through lawyer referrals using an old scanlock for 500 sterling a pop. That's 800 in greenbacks. Clearly a complete sham. Anyway...there are dozens of those.... Sorry about the long story....but back to the question.... In Roger's case the operative word being "per hour". So for a days work that works out about 1500 a day. Perfectly reasonable if his skill level matches. One way to ascertain is to ask what kind of training experience is behind that price request.(*That's not an invitation to harrass Roger for his resume...!) I'd pay that to a tscm specialist. No sweat. If someone offered TSCM services for less than 1000 a day I'd worry....very much so. I'd pay 1500 for someone with the relevant degrees(minimum 1 bachelor/master) behind them and say two years experience minimum. Degrees are the usual...elect/Tele/RF/ITS engineering etc. After that I'd probably add 250 per year experience. Pure ball park. So that would be my estimation..... Look forward to hearing any other input on the subject.... What do you think about the whole thing JMA? Kind regards Oisin Roger says: I didn't do 2500 sweeps in the past thirty years by charging $10,000 each, I like to work and the people I sweep for are always interesting, sophisticated, and fun. I like to sweep three to five times a week because it keeps me sharp. When I take a months vacation like I did recently to go watch waves on the West coast from Cal. to Canada, it took me a few weeks to come up to non thinking speed again. I do 90% of all sweeps that come in as an inquiry and I try to keep the rate at at lease $200.00 to $300.00 per hr. The trick is not to waist time on unnecessary tests and focus on real practical threats. Sweep lean and mean! Roger Tolces Electronic Security www.bugsweeps.com 7833 From: Ed Michaels Date: Mon Oct 6, 2003 2:47pm Subject: A reply from one of my clients. Points to Ponder The Florida based "Security Expert" charged $6,000.00 for the sweep which he could not perform. He subcontracted the job to a "Corporate Security Director" for $ 3,000.00. He in turn subconracted to a Private Detective for $1,500.00. The PI gave the job to a TSCM Tech for $ 1,000.00 . Who was the "Professional Sweeper" and who was the Charlatan? All to often, we see those who claim to be the best, boast they won't accept any job for under $$$ ? This appears to purport they are the "cream of the crop". The fact is, you will do what you have to do, to pay the bills ! How many times did the Federal Boys mis the IBM Selectrics in Moscow. Only after a defector pointed them in the right direction, did they "discover" the bugs? Yes its nice if you have a Buck Rodgers 130 Gig Spectrum Analyzer, with Option 795 (Espresso Machine). Honestly, 99.9% of the devices are under 3 Gig. If you do domestic work, more than half the items are "Radio Shack". (One $5K telephone analyzer wont find the telephone auto-start switch) Even with 12 equipment cases ( TDR, NLJD, OSCOR, ORION, Scopemeter, Thermanl Imager, Laser Refractor, CPM-700, Scanlock M2, ETA-3, IR Scope, etc...), I can't give a 100% guarantee the area is clear. Even with your name on some "Approved Sweeper" good old boys list, the odds do not change. Lets be real, how many times have we heard of a recognized firm, pulling a stunt that's made us look a second time and say, "You've got to be kidding !". How many markateers take a shelf item, put their logo on it and sell it with a 500% mark-up? How about the firm selling broad band receivers, with a claim that anyone can make $ 500 and hour performing sweeps in some jerkwater town in the middle of nowhere. Bob, I appreciate your point, this industry has more frauds, charlatans and 007 Wanabees than Clinton had girlfriends. The price charged does not always reflect the quaity of the service provided. Ed Steinmetz -----Original Message----- From: Edward J.. Michaels [mailto:edmichaels@c...] Sent: Sunday, October 05, 2003 2:57 PM To: Ed Steinmetz Cc: Steinmetz, Ed (esteinme) Subject: Fw: [TSCM-L] Question ----- Original Message ----- From: Robert Motzer To: TSCM-L Sent: Saturday, October 04, 2003 1:52 PM Subject: [TSCM-L] Question Hi List, Let me state right up front that I'm not posting this in order to enter into any personal debate with anyone or to invite any attack on myself or any others. I'm simply posting it to try to spur some possibly enlightening answers to one of several questions that has rolled-around within the TSCM community for rears. So here goes: Recently a survey was posted regarding rates. It essentially asked for votes on how much providers thought the efforts of a "professional" sweeper is worth for a day of service (the average sweep job I would assume). The numbers ranged from $500.00 to $5,000.00. When I first entered into the trade I was fortunate-enough to receive counsel from a number of established individuals who could be considered preeminent in the field. During those discussions it was usually inferred that a $500 sweep was either the work of a charlatan or a fool. So I think it would be interesting to take that survey a step further. Even before the numbers are 'in and wrapped' I think it would be interesting to see if any of the list members honestly feel that a $500 sweep exists (not if others are doing them but rather if you yourself are doing them or would do them). If so it would be interesting to know exactly what is done during the sweep and what equipment is utilized. I realize that rates fluctuate with both the territory and the client but I centered on the lowest number for a specific reason. Discussions within our community regarding 'professionals' vs. charlatans abound. This debate just might go a bit towards answering the first of several questions that seem to universally always delineate between 'professional' and 'charlatan' in those discussions. I realize that the above certainly does have the potential to generate some very strong feelings. So thoughts, opinions, facts and the like only please. No personal attacks, moral or personal rants, or back-and-forth arguments (do all that off-list if you must). We all claim to be professionals so let's agree to act that way before we start to tap on the keys. With that in mind, what do you think. Take Care ... Bob Motzer From: Rick Date: Mon Oct 2, 2000 3:22am Subject: Scanlock Dear Steve, I am interested in the Scanlock receiver you have for sale. Please let me know exactly WHAT accessories, options, etc. The best way to get in touch with me is by telephone @ 979.244.4920 between 1-3pm (Central Time), or if you prefer, you may respond by e-mail, although my response time is 1-5 days. Look forward to hearing from you. Thanks Sincerely, Rick Udovich 1623 From: Miguel Puchol Date: Mon Oct 2, 2000 5:04am Subject: RE: Re: Magic Wands and Fairy Dust? Hi Steve, Under what principle would this device operate? I can only see that the laser beam could have an effect on the CCD, such as generation of particular RF that could be picked up, kind of a resonance effect. I doubt, however, that all CCDs have identical physical characteristics, so I am a bit lost as to how this thing would work. Can you shed some light on the mistery? All the best, Mike > -----Mensaje original----- > De: Steve Uhrig [mailto:steve@s...] > Enviado el: lunes, 02 de octubre de 2000 5:21 > Para: TSCM-L@egroups.com > Asunto: [TSCM-L] Re: Magic Wands and Fairy Dust? > > > Once upon a midnight dreary, Jay Coote, W6CJ pondered, weak and weary: > > > I came across this website - www.shopseatech.com/spyfinder.html - > > and the gadget offered for sale appears to be a 5 milliwatt 635 > > nM laser which the vendor says will detect all types of hidden > > video cameras. It is supposed to work on optical principles, so > > no electronic jamming or EM shielding will prevent this device > > from detecting the camera. > > It is for real. > > Gordon Mitchell reviewed it in another written publication last > month. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1624 From: Mike F Date: Mon Oct 2, 2000 10:34am Subject: <<<>>> Here is some info and software links to remove 'Certain Spyware tracking programs'. LOCATING SPYWARE As you probably know, several bits of software get placed on your computer for the sole purpose of tracking your browsing habits. The owners of these programs then use that information to send you ads that fit your interests. Some people like this, some don't care, and some are offended. If you're among the offended, take a look at Ad-Aware Version 3.52 from Lavasoft. Ad-Aware will locate, and remove if you wish, Web3000, Gator, Cydoor, Radiate\Aureate, Conducent\TimeSink, and CometCursor. Note that some ad-supported software will not run if you delete the tracking programs. Ad-Aware is freeware. If you want to download it and give it a try, go to http://www.lavasoft.de/ Even though it has been mentioned by Shelly D many times B 4,here is the info Again. That Steve Gibson page has info about spyware and has a software called optout, http://grc.com/default.htm <==Get OPTOUT here later4,mike fiorentino L8R4,Mike f. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 1625 From: Steve Uhrig Date: Mon Oct 2, 2000 11:05am Subject: Re: Magic Wands and Fairy Dust? Once upon a midnight dreary, Miguel Puchol pondered, weak and weary: > Under what principle would this device operate? I can only > see that the laser beam could have an effect on the CCD, such > as generation of particular RF that could be picked up, kind > of a resonance effect. I doubt, however, that all CCDs have > identical physical characteristics, so I am a bit lost as to > how this thing would work. Hi Mike, Gordon Mitchell did a fairly extensive writeup on this product for one of the organizations to which we both belong. Because it is his work, I do not want to take his information, and the journal where it was published is relatively low profile. Gordon is a member of the TSCM-L list. Maybe he will speak up and share his info with the list. He may not, however, considering all sorts of people are on the list and it is in a public domain. Basically, two lasers are involved, shining at two different angles. One is pulsed, one is continuous. Apparently there is a property with all optics where they reflect something having to do with the two beams and directions of light arriving. The angles are critical. The user illuminates a wall with the beam from the device from a small distance away, and "paints" the wall with the beam. If any optics are there, even pinhole, the user will see something fairly obvious seeming to light up and blinking. According to what I recall, to use the device properly is time consuming and tedious, so you would not want to use it as a general tool on all walls on all inspections. Sorry can't provide any further info. The device is indeed real, and effective. And quite expensive, several thousand dollars U.S., as I recall. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1626 From: Bob Panczenko Date: Sun Oct 1, 2000 8:01pm Subject: Re: Referral List has been updated Good Evening James: How does one get listed on your referral list. We do electronic sweeps, counter industrial espionage work in Canada. Regards, Bob Panczenko President/CEO Index Investigation & Security Service Inc.(Ontario, Canada) P.O. Box 214 Station D Toronto, Ontario Canada M9A 4X2 Voice: (416) 604-4690 Fax: (416) 604-8993 E-Mail: index@s... http://www.indexinvestigation.com ----- Original Message ----- From: "James M. Atkinson, Comm-Eng" To: "TSCM-L Mailing List" Sent: Wednesday, August 16, 2000 10:02 PM Subject: [TSCM-L] Referral List has been updated Good Evening, Earlier this evening I updated the "Gold List" on my website and would like to invite list members to check it out and to send your comments (privately if you wish). http://www.tscm.com/goldlist.html If you are listed on the page PLEASE make sure that your all of your information is listed correctly. I am also considering adding a website address, email address, and logo to each of the listings, but would appreciate some discussion on the matter. -jma =================================================================== Everybody's into computers... Who's into yours?Å =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Lizard, The Other White Meat =================================================================== ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1627 From: Al Arango Date: Mon Oct 2, 2000 6:55pm Subject: RE: Re: Magic Wands and Fairy Dust? At 12:04 PM 10/02/2000 +0200, you wrote: >Hi Steve, > >Under what principle would this device operate? I can only see that the >laser beam could have an effect on the CCD, such as generation of particular >RF that could be picked up, kind of a resonance effect. I doubt, however, >that all CCDs have identical physical characteristics, so I am a bit lost as >to how this thing would work. > >Can you shed some light on the mistery? > >All the best, > >Mike > > > -----Mensaje original----- > > De: Steve Uhrig [mailto:steve@s...] > > Enviado el: lunes, 02 de octubre de 2000 5:21 > > Para: TSCM-L@egroups.com > > Asunto: [TSCM-L] Re: Magic Wands and Fairy Dust? > > > > > > Once upon a midnight dreary, Jay Coote, W6CJ pondered, weak and weary: > > > > > I came across this website - www.shopseatech.com/spyfinder.html - > > > and the gadget offered for sale appears to be a 5 milliwatt 635 > > > nM laser which the vendor says will detect all types of hidden > > > video cameras. It is supposed to work on optical principles, so > > > no electronic jamming or EM shielding will prevent this device > > > from detecting the camera. > > > > It is for real. > > > > Gordon Mitchell reviewed it in another written publication last > > month. > > > > Steve I saw this device at ISC-East last month, The salesman explained that the laser reflects from the ccd inside the camera. You use the device by looking through a 2 or 3x mono scope built into the unit. The laser is aligned to be centered in the field of view, even in bright showroom-style lighting you would see a brighter 'dot' than the surrounding surface area. In my own testing, a laser with a beam splitter will give you the same effect although you must keep your angle of view extremely tight with the outbound beam. The version I saw had a viewing height of about 10" at 10' distance. Unfortunately the salesman was more interested in selling his under the sleeve "bug and recorder detector" than answering questions about the laser scope. 1628 From: Date: Mon Oct 2, 2000 0:32pm Subject: Re: Shayler suspects TV repair man of bugging his home Personally I found Shayler not to be "articulating a credible threat", and that he is in fact going on a paranoid rant. His behaviors and claims border on needing professional psychiatric help. Jim, I'm alittle taken back by your assumption. Yes a TSCMer could find the bug but why is he paranoid? People plant bugs. TSCMers find the bugs. There are also a legitimate number of people who not only suspect they are being bugged but in fact have been. How can a person ask for help without being labeled a nut? Thanks DMM If indeed someone has bugged him then a competent TSCM specialist would have no problem finding the bug though scientific means. 1629 From: Jay Coote Date: Mon Oct 2, 2000 9:26pm Subject: Re: Re: Magic Wands and Fairy Dust? From the comments posted about this product thus far, it would seem that the TSCM technician would have to paint a whole lot of area.... and very slowly. How wide is a typical laser pointer beam...? How many square feet or meters to paint? (all while maintaining a precise angle and hoping that any concealed CCDs were installed at a "laser friendly" angle). Hmmmm.. ---------- > At 12:04 PM 10/02/2000 +0200, you wrote: > >Hi Steve, > > > >Under what principle would this device operate? I can only see that the > >laser beam could have an effect on the CCD, such as generation of particular > >RF that could be picked up, kind of a resonance effect. I doubt, however, > >that all CCDs have identical physical characteristics, so I am a bit lost as > >to how this thing would work. > > > >Can you shed some light on the mistery? > > > >All the best, > > > >Mike > > > > > -----Mensaje original----- > > > De: Steve Uhrig [mailto:steve@s...] > > > Enviado el: lunes, 02 de octubre de 2000 5:21 > > > Para: TSCM-L@egroups.com > > > Asunto: [TSCM-L] Re: Magic Wands and Fairy Dust? > > > > > > > > > Once upon a midnight dreary, Jay Coote, W6CJ pondered, weak and weary: > > > > > > > I came across this website - www.shopseatech.com/spyfinder.html - > > > > and the gadget offered for sale appears to be a 5 milliwatt 635 > > > > nM laser which the vendor says will detect all types of hidden > > > > video cameras. It is supposed to work on optical principles, so > > > > no electronic jamming or EM shielding will prevent this device > > > > from detecting the camera. > > > > > > It is for real. > > > > > > Gordon Mitchell reviewed it in another written publication last > > > month. > > > > > > Steve > > I saw this device at ISC-East last month, The salesman explained that the > laser reflects from the ccd inside the camera. You use the device by > looking through a 2 or 3x mono scope built into the unit. The laser is > aligned to be centered in the field of view, even in bright showroom-style > lighting you would see a brighter 'dot' than the surrounding surface area. > In my own testing, a laser with a beam splitter will give you the same > effect although you must keep your angle of view extremely tight with the > outbound beam. > > The version I saw had a viewing height of about 10" at 10' distance. > Unfortunately the salesman was more interested in selling his under the > sleeve "bug and recorder detector" than answering questions about the laser > scope. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1630 From: Matthijs van der Wel Date: Tue Oct 3, 2000 6:48am Subject: Nuclair arms in Europe -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Although a bit off-topic, the Los Almos facility isn't the only 'nuclair' facility with security problems. A Dutch action group called 'Onkruid' (weed) has seized documents about the nuclair arms that are present on the American base 'Volkel' in the Netherlands. The full story can be found on their website on: http://www.contrast.org/onkruit/ . The site is in Dutch but I've translated it (beware: Englisgh is not my native language!). DOCUMENTS ABOUT THE NUCLAIR ARMS AT AIRBASE VOLKEL At the 27th November 1999 the Dutch Anti-Military actiongroup Onkruit seized documents about nuclair arms during an un-anounced civilian inspection, at the American Communication complex of the 752 MUNSS, at the airbase Volkel. * 752 MUNSS (Munitions Support Squadron) is an American unit, reponsible for the maintenance and security of the nuclair arms at Volkel. F-16 pilots of the Dutch 311 and 312 squadron are trained to use nuclair arms. The fact that Amercan nuclair arms are present in Volkel and the fasct that Dutch pilots are trained to use them, is little known. By the Dutch government and the Dutch DOD these facts are neighter confirmed nor denied, they mainly keep silent about it. A selection of the documents: A number of American inspection about the maintenance and security of the nuclair arms, the Nuclear Surety Inspections (NSI) and Joint Safety and Security Inspection (JSSI). http://www.contrast.org/onkruit/dnsi.html (document in English) A trainingorder, called 'Cold Igloo', target is to demonstrate that Volkel can be used for strike operations, meaning an operation involving nuclair arms. http://www.contrast.org/onkruit/coldigloo.html (document in Dutch) 'Lessons'. A manual how to handle nuclair arms. In this manual you'll find the dangers and things that can go wrong and some examples of near fatal accidents. http://www.contrast.org/onkruit/lessons.html (document in English) At the inspections the goal is to find a balance between fast deployment of the nukes and security. The documents reveal that the care for security is exellent, but the care for technical operions is unacceptable. The use of a non-inspected bomb-lift truck was unacceptable for the inspection team. Staff also turned out to be not OK (evaluation: pover). Staff is not allways qualified. One member of the staff was drugged with medication while not reported. These medications are so damaging that severe damaged could have been caused by this staff member. By not following the order about how to put a nuke underneath an F-16, the nuke fell on the runway and the capsule tore apart (sorry, English is not my native language). This 'little accident' could have had an international follow-up (Lesson 12). "We were lucky". Staff are told that by working with nuclair arms they have a higher chance of getting cancer. ifmale members of the staff are told to immidiately tell if they are pregnant to prevent damage to the unborn child. There's also a chapter about the fear of terrorism in 'Lessons'. The presence of the Americans must be kept secret because of the possible terrorist attacs. Also local demonstrations could lead to violence. In 1999 the 752 MUNSS at Volkel received the "Safety Award", according to an article in the magazine 'Airscoop' at Jan. 2000 (magazine for American forces in Europe). Do you think the MUNSS has kept the Onkruit Civilian inspection a secret? Now a days the Communications complex is guarded day-and-night. The documents: Volkel Map: Maps of the Area http://www.contrast.org/onkruit/volkelmap.html Onkruit [dutch] Why onkruit took the papers from the 752MUNSS http://www.contrast.org/onkruit/onkruit.html (document in Dutch) Lessons Nuclear Arms HOWTO http://www.contrast.org/onkruit/lessons.html (document in English) Cold Igloo AIRCENT Tactical Evaluation Vlb VOLKEL http://www.contrast.org/onkruit/coldigloo.html (document in Dutch) NSI Assistance Nuclear Surety Inspection (NSI) assistance visit http://www.contrast.org/onkruit/nsiassistance.html (document in English) DNSI Defense Nuclear Surety Inspection (DNSI) of 752 MUNSS http://www.contrast.org/onkruit/dnsi.html (document in English) Matthijs van der Wel -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.8 for non-commercial use iQA/AwUBOdm5j5+uKjzZYzkREQLXrQCg12aZ5qL89+jEXyc/t+oYbBTkaW0AoLXi vYhqa1tAxk2J7GcMmsEn3PC4 =/6rf -----END PGP SIGNATURE----- 1631 From: A Grudko Date: Tue Oct 3, 2000 10:38am Subject: CCD detection Humour (I hope)........ So let me get this right. 1. I shoot a laser beam at a point 2. I look at the illuminated area through a 3x scope 3. I hit a reflective surface and smell burning. Do you get a white cane with this system? (for cultures which may differ, I point out that blind people are frequently given white canes to assist in getting around. Looking directly into a leser beam through a 3x scope could result in a serious vision problem). Andy Jo'burg 1632 From: A Grudko Date: Tue Oct 3, 2000 0:02pm Subject: Nonlinear Junction Detector FS > For sale 1997 5 lb hammer 100% guanteed testroy any bug Andy 1633 From: James M. Atkinson, Comm-Eng Date: Tue Oct 3, 2000 0:30pm Subject: Re: Nonlinear Junction Detector FS At 7:02 PM +0200 10/3/00, A Grudko wrote: > > For sale > >1997 5 lb hammer > >100% guanteed testroy any bug > >Andy Sure, but you have to find it first. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1634 From: James M. Atkinson, Comm-Eng Date: Tue Oct 3, 2000 1:15pm Subject: Re: Shayler suspects TV repair man of bugging his home At 5:32 PM -0400 10/2/00, Clockdepot@a... wrote: >Personally I found Shayler not to be "articulating a credible >threat", and that he is in fact going on a paranoid rant. His >behaviors and claims border on needing professional psychiatric help. > >Jim, I'm alittle taken back by your assumption. Yes a TSCMer could find the >bug but why is he paranoid? People plant bugs. TSCMers find the bugs. There >are also a legitimate number of people who not only suspect they are being >bugged but in fact have been. How can a person ask for help without being >labeled a nut? >Thanks >DMM > >If indeed someone has bugged him then a competent TSCM specialist >would have no problem finding the bug though scientific means. When a person becomes the victim of some real or imagined harassment they often become delusionary and invent additional antagonists. Simply put, in their feelings of hopelessness they will convince themselves that "everybody and everything" is a threat. Eventually this becomes a psychological condition that feeds on itself thus causing the person to spiral downward into an emotional breakdown. A "healthy victim" will normally perceive a threat, admit the threat is possibly real, and focus their energy in negating the threat without letting it feed on their own fears. In such cases the client will be able to articulate (or show) specific evidence of the threat, and will remain rational when dealing with it. When presented with scientific evidence that the threat does not in fact exist the victim will accept the result with relief. On the other hand, an "unhealthy victim" of eavesdropping or harassment will often become irrational, and cannot articulate a specific RATIONAL threat (ie: "the CIA is beaming mind control beams at my cat". No matter what scientific evidence is presented to them to the contrary they will feel that it proves the bug is too sophisticated to be found. Anything the TSCM specialist finds, or doesn't find during a sweep will just reinforce their paranoia. The key to all of this is to ask the client: 1) Who is eavesdropping on or harassing you? 2) Why (specifically) would they be doing it. 3) Where are they doing it from 4) When (or for how long) has this been going on. 5) What are you going to do if something is found 6) What have you done previously to deal with this problems. You may find that that "CEO of a major Fortune 500 company" is in fact a raving lunatic who claims he is being stalked by a character from the X-files who is using mind control devices against him. Of course may also find that the real estate agent (who seems at first to be a little fruity) does in fact have a bug on their phone line. A TSCM must assume that all threats articulated by a customer are legitimate; however, a TSCM'er will develop a sixth sense after a few hundred sweeps and can pickup on little behavioral and verbal clues that the potential has psychological problems. The subject claiming that he knows he is bugged because the TV guy couldn't fix his television does not constitute a RATIONAL threat. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1635 From: Hoffman Date: Tue Oct 3, 2000 2:54pm Subject: Re: Shayler suspects TV repair man of bugging his home > The subject claiming that he knows he is bugged > because the TV guy couldn't fix his television does > not constitute a RATIONAL threat. ---------------------- I'm sure that Paul Castellano (if he were still alive), of the Gambino crime family would be real happy to learn that you've given him a free Internet amateur mental diagnosis and have deemed him psychologically unstable because he thinks the FBI bugged his house when one of the feds showed up as service repairmen and installed a microphone in the kitchen which subsequently recorded 600 of conversation.... Or maybe people really do have such legitimate concerns because such things have already been done. 1636 From: Talisker Date: Tue Oct 3, 2000 1:48pm Subject: Re: Nonlinear Junction Detector FS Andy > 1997 5 lb hammer Often a true word spoken in jest - I always take a rubber mallet with me on the job, when I get a good strong signal in one of those awkward places, like inside a wall, I give the object a reasonable whack with the mallet, if the reading fluctuates then it is probably a false positive like a few staples, more often than not the reading goes altogether Sorry if I'm teaching Grandma to suck eggs Andy http://www.networkintrusion.co.uk/ The IDS List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "A Grudko" To: Sent: Tuesday, October 03, 2000 6:02 PM Subject: [TSCM-L] Nonlinear Junction Detector FS > > For sale > > 1997 5 lb hammer > > 100% guanteed testroy any bug > > Andy > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1637 From: James M. Atkinson, Comm-Eng Date: Tue Oct 3, 2000 3:38pm Subject: Re: Shayler suspects TV repair man of bugging his home At 3:54 PM -0400 10/3/00, Hoffman wrote: > > The subject claiming that he knows he is bugged > > because the TV guy couldn't fix his television does > > not constitute a RATIONAL threat. >---------------------- >I'm sure that Paul Castellano (if he were still alive), >of the Gambino crime family would be real happy to >learn that you've given him a free Internet amateur >mental diagnosis and have deemed him psychologically >unstable because he thinks the FBI bugged his house >when one of the feds showed up as service >repairmen and installed a microphone in the >kitchen which subsequently recorded 600 >of conversation.... Or maybe people really >do have such legitimate concerns because >such things have already been done. I think you miss my point. A client who can articulate a rational, and reasonable suspicion, or who can offer tangible proof of a technical surveillance threat is different from one who has watched one to many episodes of the X-files. The guy who claims the CIA is reading his mail, MI5 has him tracked, the NSA has his phones tapped, and the FBI is videotaping him in the toilet probably needs some help (not involving TSCM gear). -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1638 From: Miguel Puchol Date: Tue Oct 3, 2000 6:33pm Subject: RE: CCD detection Andy, > 3. I hit a reflective surface and smell burning. > > Do you get a white cane with this system? Agreed. Besides, I think the comment regarding surface to cover and time to do so is valid. A laser is basically an extremely coherent beam of light, and a very narrow one unless large generator elements (solid or gas) are used, in which case wide beams can be achieved, but never a device like the one that appears on the picture. This means that only a small spot of a wall's surface can be covered at a time, so to hit a pinhole camera with it I think you'd be getting lucky. You would need a very steady hand and a very precise sweep pattern to make sure a whole wall is covered, and so I think that a visual inspection is less time consuming - and less expensive. I still believe that one's "Standard Issue Mark IV EyeBalls" are as good as many other instruments, and should be used more frequently than sometimes are. So, going around burning them up with laser beams may not be such a good idea after all... All the best, Mike 1639 From: James M. Atkinson, Comm-Eng Date: Tue Oct 3, 2000 11:31pm Subject: Airline Humor Here are some actual maintenance complaints generally known as squawks or problems submitted recently by Qantas Airline pilots to maintenance engineers. After attending to the squawks prior to the aircraft's next flight, the maintenance crews are required to log the details of action taken as a solution to the pilot's squawks. The following are some recent squawks and subsequent responses by maintenance crews. Problem: Left inside main tire almost needs replacement Response: Almost replaced left inside main tire Problem: Test flight OK, except autoland very rough Response: Autoland not installed on this aircraft Problem: #2 Propeller seeping prop fluid Response: #2 Propeller seepage normal--#1, #3 and #4 propellers lack normal seepage Problem: Something loose in cockpit Response: Something tightened in cockpit Problem: Evidence of leak on right main landing gear Response: Evidence removed Problem: DME volume unbelievably loud Response: Volume set to more believable level Problem: Dead bugs on windshield Response: Live bugs on backorder Problem: Autopilot in altitude hold mode produces a 200 fpm descent Response: Cannot reproduce problem on ground Problem: IFF inoperative Response: IFF always inoperative in OFF mode Problem: Friction locks cause throttle levers to stick Response:That's what they're there for!! Problem: Number three engine missing Response: Engine found on right wing after brief search Problem: Aircraft handles funny Response: Aircraft warned to straighten up, "fly right", and be serious!! ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1640 From: Robert G. Ferrell Date: Wed Oct 4, 2000 9:36am Subject: Re: Shayler suspects TV repair man of bugging his home >>I'm sure that Paul Castellano (if he were still alive), >>of the Gambino crime family would be real happy to >>learn that you've given him a free Internet amateur >>mental diagnosis and have deemed him psychologically >>unstable because he thinks the FBI bugged his house No, I personally would deem him "psychologically unstable" because he murdered people for a living. >The guy who claims the CIA is reading his mail, MI5 has him tracked, >the NSA has his phones tapped, and the FBI is videotaping him in the >toilet probably needs some help (not involving TSCM gear). In my experience this sort of claim is based mostly on megalomania. People who report being monitored by various agencies almost always turn out to be convinced that they possess some secret knowledge or have discovered evidence of some vast conspiracy that only they are wise enough to perceive. Why else would everyone be out to get them? Cheers, RGF 1641 From: Date: Wed Oct 4, 2000 2:09pm Subject: Check out Mitnick: ‚ÄòEverybody is suspect‚Äô This is actually good. Click here: Mitnick: ‚ÄòEverybody is suspect‚Äô 1642 From: Date: Wed Oct 4, 2000 2:19pm Subject: url Kevin Mitnick - Everybody Is Suspect http://www.msnbc.com/news/469018.asp?cp1=1 1643 From: Bob Washburne Date: Wed Oct 4, 2000 8:50am Subject: Re: Airline Humor My sister repaired C-5's and A-110's for the Air Force. Since pilots NEVER made mistakes, any rough handling during the landing had to be reported as a maintenance problem. One day she got a little fed up and wrote up a "problem" as: "Problem with the joystick actuator. Sprayed it down with PFM and now everything works." PFM is slang for Pure F'in Magic. You will have to figure out what actuates the joystick. Nothing was ever said about this report. :-) Bob Washburne "James M. Atkinson, Comm-Eng" wrote: > > Here are some actual maintenance complaints generally known as > squawks or problems submitted recently by Qantas Airline pilots to > maintenance engineers. After attending to the squawks prior to the > aircraft's next flight, the maintenance crews are required to log the > details of action taken as a solution to the pilot's squawks. The > following are some recent squawks and subsequent responses by > maintenance crews. > 1644 From: Talisker Date: Wed Oct 4, 2000 2:39pm Subject: Re: Shayler suspects TV repair man of bugging his home Correct me if I'm wrong, I thought he knew of someone who requested that having someone killed be investigated I realise appearances can be deceptive but he doesn't look like he's capable of killing Andy http://www.networkintrusion.co.uk Talisker's comprehensive IDS & Scanner List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "Robert G. Ferrell" To: Sent: Wednesday, October 04, 2000 3:36 PM Subject: Re: [TSCM-L] Shayler suspects TV repair man of bugging his home > >>I'm sure that Paul Castellano (if he were still alive), > >>of the Gambino crime family would be real happy to > >>learn that you've given him a free Internet amateur > >>mental diagnosis and have deemed him psychologically > >>unstable because he thinks the FBI bugged his house > > No, I personally would deem him "psychologically unstable" > because he murdered people for a living. > > >The guy who claims the CIA is reading his mail, MI5 has him tracked, > >the NSA has his phones tapped, and the FBI is videotaping him in the > >toilet probably needs some help (not involving TSCM gear). > > In my experience this sort of claim is based mostly on megalomania. > People who report being monitored by various agencies almost always > turn out to be convinced that they possess some secret knowledge or > have discovered evidence of some vast conspiracy that only they are > wise enough to perceive. Why else would everyone be out to get them? > > Cheers, > > RGF > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1645 From: Date: Wed Oct 4, 2000 7:36pm Subject: What to do before TSCMers arrive I have a client who believes he is being video taped. I have given him the names from the Gold list so that he might move quickly. I have a question for the entire list. What does my client do until the TSCM firm arrives. He believes it is located in one of his labs. Is there a substance that can be sprayed in the air to collect onto a glass surface thus clouding the images? I would appreciate all suggestions. Thanks Dan, Alias DMM 1646 From: Charles@t... Date: Thu Oct 5, 2000 3:42am Subject: Re: What to do before TSCMers arrive If you think someone is videotaping through a specific window or perhaps a hole in a wall, obviously you could try to do something to cover the hole, or fog the window. BUT... As a general principle, once you do something to tip off the bad guys, they will have the chance to remove their equipment before a sweep ever gets done. It's usually better to carry on normally, if you hope to catch any evidence. It's hard to make general recommendations without knowing all the circumstances. charles ----- Original Message ----- From: To: Sent: Wednesday, October 04, 2000 8:36 PM Subject: [TSCM-L] What to do before TSCMers arrive > I have a client who believes he is being video taped. I have given > him the names from the Gold list so that he might move quickly. > I have a question for the entire list. What does my client do until > the TSCM firm arrives. > He believes it is located in one of his labs. Is there a substance > that can be sprayed in the air to collect onto a glass surface thus > clouding the images? > I would appreciate all suggestions. > Thanks > Dan, Alias DMM > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1647 From: Jay Coote Date: Thu Oct 5, 2000 10:43am Subject: Re: What to do before TSCMers arrive Depending on the situation, one thing your client can do is give false information, or information which would aid in revealing the eavesdropper. I'm not sure I would suggest doing anything else which would give away that your client is aware of an eavesdropper. If the eavesdropper is aware of the client's suspicions, he'll take his toys and go home, and in some cases you might want to catch the eavesdropper, or at least give his sponsors bogus information. Jay Coote Los Angeles ---------- > I have a client who believes he is being video taped. I have given > him the names from the Gold list so that he might move quickly. > I have a question for the entire list. What does my client do until > the TSCM firm arrives. > He believes it is located in one of his labs. Is there a substance > that can be sprayed in the air to collect onto a glass surface thus > clouding the images? > I would appreciate all suggestions. > Thanks > Dan, Alias DMM > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1648 From: James M. Atkinson, Comm-Eng Date: Thu Oct 5, 2000 11:32am Subject: Re: What to do before TSCMers arrive At 12:36 AM +0000 10/5/00, Clockdepot@a... wrote: >I have a client who believes he is being video taped. I have given >him the names from the Gold list so that he might move quickly. >I have a question for the entire list. What does my client do until >the TSCM firm arrives. >He believes it is located in one of his labs. Is there a substance >that can be sprayed in the air to collect onto a glass surface thus >clouding the images? >I would appreciate all suggestions. >Thanks >Dan, Alias DMM Dan, It would be best for him to do nothing other act the way way ho did prior to detecting the camera. He should however realize that there may be more then just the one unit. He should get a TSCM'er into the facility on an emergency basis and evaluate the situation, and he should do nothing to the unit himself. Of course if the area being watch involves classified information or activities then they will need to suspend the classified activities. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1649 From: Jay Coote Date: Thu Oct 5, 2000 0:11pm Subject: Wavecom source I am looking for a low-cost source for Wavecom receivers. My intention is to remove a receiver from it's chassis, add a tuning pot and mount it in a chassis which is more suited for TSCM. Jay Coote Los Angeles 1650 From: Steve Uhrig Date: Thu Oct 5, 2000 0:29pm Subject: Re: Wavecom source Once upon a midnight dreary, Jay Coote pondered, weak and weary: > I am looking for a low-cost source for Wavecom receivers. > My intention is to remove a receiver from it's chassis, add a > tuning pot and mount it in a chassis which is more suited for > TSCM. I have done exactly this, and it works well. I added a separate board for an S meter and speaker level audio drivers. Tom O'Hara of PC Electronics offers a PC board into which you drop the Wavecom or equal receiver module, and it provides an easy way to interface it. I have not used it, but if I were doing it again I would go that route. Part # WCRI-2.4, for $35. He will sell only to licensed hams. You of course would qualify. (626) 447-4565 in LA, or www.hamtv.com. He probably knows the best current source for Wavecom or equivalent receivers. Try to team with someone who wants a transmitter only, and buy a pair. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1651 From: James M. Atkinson, Comm-Eng Date: Thu Oct 5, 2000 1:10pm Subject: Re: Wavecom source At 1:40 PM -0400 10/5/00, Jay Coote wrote: >I am looking for a low-cost source for Wavecom receivers. >My intention is to remove a receiver from it's chassis, add a tuning pot and >mount it in a chassis which is more suited for TSCM. >Jay Coote >Los Angeles You can buy an entire system at Radio Shack for under a hundred bucks, but make sure it's their new model with the slide switch. Take apart the receiver unit, remove the modulator circuit, and replace the flat antenna with an REI VBA-2400 antenna or a spiral log periodic. The following is based on my own research and engineering work (so please give credit where credit is due) Cut the trace between pin 9 of the slide switch and C22. Attach a 100K ten turn pot across 8 vdc rail and GND with the rotor feeding to C22 (adjustable voltage divider). This should permit you to tune the unit between 1.43 GHz and 2.53 GHz with some attenuation outside of 2-2.5 GHz band. You can also replace/bridge the F1 IF filter to reduce selectivity and increase the chance of catching this signal. If your feeling inspired you can bypass the SMT LC filter circuits just prior to the tuner chip, and ALSO bypass the IF filter. Toi do this you will have to cut the tank trace and physically remove it from the PCB (be sure to get a clean cut). Also remove the cap chips, and bridge the gap with the foil from the tank circuit. While you will get really bad selectivity the FM capture effect will "lock" the unit to any video signals between 1.9 and 2.5 GHz. Insert a BNC connection between C30 and R16 and squirt the IF to a diode detector with 500 MHz bandwidth (the IF after the AGC stages is 480 MHz), and then dump it to a scope (you will see the actually video waveform. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= From: dj Date: Sat Oct 2, 2004 10:31pm Subject: RE: On Line Electronics Study Courses? NEETS are available at http://www.tpub.com/neets/ The updates are minimal and aren't worth downloading. The same concepts apply. IT2 --------------------------------- Do you Yahoo!? Y! Messenger - Communicate in real time. Download now. [Non-text portions of this message have been removed] 9804 From: dj Date: Sat Oct 2, 2004 10:48pm Subject: Any members of NATIA? ? IT2 --------------------------------- Do you Yahoo!? New and Improved Yahoo! Mail - 100MB free storage! [Non-text portions of this message have been removed] 9805 From: Scott Malcolm Date: Sun Oct 3, 2004 3:56pm Subject: Technology boosts use of wiretaps Original URL: http://www.jsonline.com/news/metro/oct04/263737.asp Technology boosts use of wiretaps By DERRICK NUNNALLY dnunnally@j... Posted: Oct. 2, 2004 Madison - In an unassuming office building on a leafy street near Dane County Regional Airport, a couple rooms of computer equipment are quietly changing the nature of law enforcement in Wisconsin. When they're clicking into action, most people won't even know they're there. And that's the point. They are wiretap machines, meant to allow police to listen in on the private phone conversations of suspected criminals. For years, police here rarely resorted to wiretaps, which require a court order, and that was mostly limited to cases involving severe violence or the threat of it. On average, it happened less than twice a year. Now it happens more than once a month, due in large part to new computer technology that has streamlined much of what officials describe as a cumbersome, painstaking process. It included tracking down the phone company's switching equipment, setting up huge recorders and manually starting them with each call, and amassing half a room's worth of tapes, then methodically indexing them all. "You'd have to have three reel-to-reel recorders for every line you'd want to wiretap," said Edward Wall, a special agent for covert surveillance in the state Department of Justice. Wall held up a disk drive from the new system he said could hold 900 hours of recorded conversations, indexed at least half a dozen different ways. It was a little bigger than two CD cases held together, and, he said, held the power to make Wisconsin investigators much more willing to ask for wiretaps to investigate crime. "When they find these are not as hard as they used to be, that mind-set is changing," Wall said. Since the state acquired the new wiretap setup from the Office of National Drug Control Policy in summer 2003, the system has been used in the completed taps of 13 separate phone numbers, Wall said. That's a marked increase from recent years. Federal records indicate that from 1999-2002, while the nation averaged 1,200 wiretaps yearly, Wisconsin police had only run five. While the system has not been discussed much outside of police circles, law enforcement agencies already have used it in at least a couple of high-profile operations, including the kidnapping of Heddy Braun in Walworth County in 2003 and a Milwaukee investigation this spring that led to the arrests of more than 30 people charged with being part of a cocaine-selling ring. The role of the new wiretap machines has been kept hush-hush in part because of the state law restricting their use. Because phone surveillance intrudes so seriously on someone's right to privacy, information gleaned from wiretaps only becomes public well into the court process, which can take months. Milwaukee police announced the dozens of arrests in the big drug case in a May news release, but much of the information about them remains under wraps and only has a chance of becoming public this month, long after the defendants have been formally charged and begun working their way through the judicial system. Another reason for the new system's low profile until now was that police believed no good could come of advertising their new capability, Wall said. Both the Milwaukee Police Department and the Milwaukee County sheriff's office, through spokespeople, declined to discuss the new technology. Wall agreed to talk about it after the Department of Justice was asked specifically about its acquisition. He said he wanted to de-mystify a subject that, while not officially a secret, has inspired fears among some that the government, enabled by the USA Patriot Act of 2001, is tapping phones excessively. "Those of us who do wiretaps just sit there and roll our eyes," Wall said of those concerns. "God, if you only knew what we had to go through for a wiretap. It's the most cumbersome thing in the world." Police must get a judge's authorization for each phone number they want to monitor. To get that, investigators must put together a detailed affidavit explaining the kind of conversation they expect to hear, and why such evidence can't be obtained some other way. Few of those affidavits have become public. Wall and other officials described them as onerous, but justly so. Now that the taps themselves are simpler to run and yield better data, authorities are exploring a wider range of reasons to ask for them. "There was a time that I was much more reluctant to use wiretaps," said Milwaukee District Attorney E. Michael McCann, "but the violence attendant to various activities has persuaded me to the contrary." Now cases such as the alleged drug ring - in which no violence or threat is evident in the small part of the allegations that have been made public - are coming into courts. More are likely, and in more disparate parts of the state, as word of the new system's capabilities filters out, Wall said. Where formerly police in any part of the state had to seek out switching equipment - mostly in Madison or Milwaukee - to set up a wiretap, the new computer system can be run from Madison on "a phone from anywhere in the world" and piped out to any part of the state. "When they give it to us, they're essentially giving it to 72 county sheriffs and 700 police departments," Wall said. "When you call me and you're from the Podunk Police Department, we're there." Ray Dall'Osto, a Milwaukee defense attorney and former legal director for the American Civil Liberties Union of Wisconsin, said he is interested in examining the kinds of new wiretap cases and whether Wisconsin authorities use a wider range of justifications for listening in on citizens' conversations. The right to privacy in certain situations, he said, is very fragile, like an egg. "Once it's gone, it's very hard, if not impossible, to put back together," Dall'Osto said. He also expects the uptick in wiretap usage to continue. "They've got this stuff, and they've got to use it," Dall'Osto said. From the Oct. 2, 2004, editions of the Milwaukee Journal Sentinel Regards, Scott Malcolm Malcolm & Associates, Inc. Serving the State of Wisconsin http://www.malcolm-associates.com Office 262 965 4426 Fax 262 965 4629 [Non-text portions of this message have been removed] 9806 From: Scott Malcolm Date: Sun Oct 3, 2004 4:41pm Subject: Technology boosts use of wiretaps Original URL: http://www.jsonline.com/news/metro/oct04/263737.asp Technology boosts use of wiretaps By DERRICK NUNNALLY dnunnally@j... Posted: Oct. 2, 2004 Madison - In an unassuming office building on a leafy street near Dane County Regional Airport, a couple rooms of computer equipment are quietly changing the nature of law enforcement in Wisconsin. When they're clicking into action, most people won't even know they're there. And that's the point. They are wiretap machines, meant to allow police to listen in on the private phone conversations of suspected criminals. For years, police here rarely resorted to wiretaps, which require a court order, and that was mostly limited to cases involving severe violence or the threat of it. On average, it happened less than twice a year. Now it happens more than once a month, due in large part to new computer technology that has streamlined much of what officials describe as a cumbersome, painstaking process. It included tracking down the phone company's switching equipment, setting up huge recorders and manually starting them with each call, and amassing half a room's worth of tapes, then methodically indexing them all. "You'd have to have three reel-to-reel recorders for every line you'd want to wiretap," said Edward Wall, a special agent for covert surveillance in the state Department of Justice. Wall held up a disk drive from the new system he said could hold 900 hours of recorded conversations, indexed at least half a dozen different ways. It was a little bigger than two CD cases held together, and, he said, held the power to make Wisconsin investigators much more willing to ask for wiretaps to investigate crime. "When they find these are not as hard as they used to be, that mind-set is changing," Wall said. Since the state acquired the new wiretap setup from the Office of National Drug Control Policy in summer 2003, the system has been used in the completed taps of 13 separate phone numbers, Wall said. That's a marked increase from recent years. Federal records indicate that from 1999-2002, while the nation averaged 1,200 wiretaps yearly, Wisconsin police had only run five. While the system has not been discussed much outside of police circles, law enforcement agencies already have used it in at least a couple of high-profile operations, including the kidnapping of Heddy Braun in Walworth County in 2003 and a Milwaukee investigation this spring that led to the arrests of more than 30 people charged with being part of a cocaine-selling ring. The role of the new wiretap machines has been kept hush-hush in part because of the state law restricting their use. Because phone surveillance intrudes so seriously on someone's right to privacy, information gleaned from wiretaps only becomes public well into the court process, which can take months. Milwaukee police announced the dozens of arrests in the big drug case in a May news release, but much of the information about them remains under wraps and only has a chance of becoming public this month, long after the defendants have been formally charged and begun working their way through the judicial system. Another reason for the new system's low profile until now was that police believed no good could come of advertising their new capability, Wall said. Both the Milwaukee Police Department and the Milwaukee County sheriff's office, through spokespeople, declined to discuss the new technology. Wall agreed to talk about it after the Department of Justice was asked specifically about its acquisition. He said he wanted to de-mystify a subject that, while not officially a secret, has inspired fears among some that the government, enabled by the USA Patriot Act of 2001, is tapping phones excessively. "Those of us who do wiretaps just sit there and roll our eyes," Wall said of those concerns. "God, if you only knew what we had to go through for a wiretap. It's the most cumbersome thing in the world." Police must get a judge's authorization for each phone number they want to monitor. To get that, investigators must put together a detailed affidavit explaining the kind of conversation they expect to hear, and why such evidence can't be obtained some other way. Few of those affidavits have become public. Wall and other officials described them as onerous, but justly so. Now that the taps themselves are simpler to run and yield better data, authorities are exploring a wider range of reasons to ask for them. "There was a time that I was much more reluctant to use wiretaps," said Milwaukee District Attorney E. Michael McCann, "but the violence attendant to various activities has persuaded me to the contrary." Now cases such as the alleged drug ring - in which no violence or threat is evident in the small part of the allegations that have been made public - are coming into courts. More are likely, and in more disparate parts of the state, as word of the new system's capabilities filters out, Wall said. Where formerly police in any part of the state had to seek out switching equipment - mostly in Madison or Milwaukee - to set up a wiretap, the new computer system can be run from Madison on "a phone from anywhere in the world" and piped out to any part of the state. "When they give it to us, they're essentially giving it to 72 county sheriffs and 700 police departments," Wall said. "When you call me and you're from the Podunk Police Department, we're there." Ray Dall'Osto, a Milwaukee defense attorney and former legal director for the American Civil Liberties Union of Wisconsin, said he is interested in examining the kinds of new wiretap cases and whether Wisconsin authorities use a wider range of justifications for listening in on citizens' conversations. The right to privacy in certain situations, he said, is very fragile, like an egg. "Once it's gone, it's very hard, if not impossible, to put back together," Dall'Osto said. He also expects the uptick in wiretap usage to continue. "They've got this stuff, and they've got to use it," Dall'Osto said. From the Oct. 2, 2004, editions of the Milwaukee Journal Sentinel Regards, Scott Malcolm Malcolm & Associates, Inc. Serving the State of Wisconsin http://www.malcolm-associates.com Office 262 965 4426 Fax 262 965 4629 [Non-text portions of this message have been removed] 9807 From: Does it matter Date: Sun Oct 3, 2004 5:21pm Subject: Re: Review: An Evidence Collection Device Yes, laptops are great for that, we have 3 that we use specifically for that purpose but they are faster and with firewire and 2.0. --- In TSCM-L@yahoogroups.com, "J.A. Terranson" wrote: > > > > Might I suggest any laptop coupled to the appropriate drive blocker of > your choice (firefly, etc.), at a much reduced cost? In fact, I use an > older laptop (450mhz K62), a $200.00 write blocker, and a $1,400.00 > package (FTK) which comes to less than the cost of the logicube, and can > do *everything*, not just make an image. > > This device is being sold to those who simply don't know better. > > //Alif > > -- > J.A. Terranson > United Forensics Corp. > > > > On Sat, 2 Oct 2004, Does it matter wrote: > > > Date: Sat, 02 Oct 2004 00:16:25 -0000 > > From: Does it matter > > Reply-To: TSCM-L@yahoogroups.com > > To: TSCM-L@yahoogroups.com > > Subject: [TSCM-L] Re: Review: An Evidence Collection Device > > > > > > The logicube items work well and are a useful tool (providing you > > get the model that provides md5.) This is never a substitute for our > > portable systems with write blockers, but it comes in handy now and > > then. > > A large drawback to the logicube items is that everything is ala > > carte and some of the itmes are very helpful but run the price up > > beyond reason. > > > > Darren > > > > > > --- In TSCM-L@yahoogroups.com, Thomas Shaddack wrote: > > > On Fri, 1 Oct 2004, Steve Weinert wrote: > > > > > > > Review: An Evidence Collection Device > > > > The Logicube Forensic SF-5000u ($2,249 direct), which lets you > > create a > > > > perfect copy of a source drive without altering the original, > > may be the > > > > ideal device. This handheld drive-to-drive duplicator produces > > an exact > > > > sector-for-sector copy of the original. Read this review. > > > > http://eletters.eweek.com/zd1/cts?d=79-1166-4-6-6228-131613-1 > > > > > > Over $2000 for a unit that can be replaced with a mini-ITX board > > and a > > > small power supply in a briefcase. Call me a cheapskate, but > > that's too > > > much. WAY too much. > > > > > > Any hardware that will run Linux (and will have the desired IDE > > and/or > > > SATA and/or SCSI controllers) will do here. We don't need anything > > more > > > than the kernel itself, drivers for the IDE controllers, and a > > handful of > > > applications (dd, dd_rescue for damaged media (snafu warning: has > > > different syntax than dd), md5sum, sha1sum). That all comfortably > > fits on > > > even a floppy. (A distro specifically tailored to this class of > > problems > > > (to system recovery, more accurately, but making exact duplication > > is a > > > subset of that problematics) is RIP, Recovery Is Possible, > > available here: > > > . Saved > > my > > > posterior more than once. > > > > > > Versions available are for a CD (small enough to fit even the > > > creditcard-sized one, suitable to carry in a wallet), for a > > floppy, and > > > for PXE network booting (so it can boot from LAN). > > > > > > Any other distro with dd (and the required checksum programs) will > > do too. > > > > > > You can duplicate the entire drive as-is, or image the partitions > > to files > > > (which can be zipped and archived on a tape or a DVD or a disk, > > (when > > > small enough), and later mounted as a loop filesystem or written > > to a new > > > drive). 9808 From: J. Coote Date: Sun Oct 3, 2004 9:42pm Subject: RDF Equipment? I'd like advice, off-line, on RDF equipment. No sales pitches, please. I may need a mobile RDF with tunable FM receiver; either built-in, or I'll add a receiver. The primary use will be protecting radio frequencies. What do you think about Doppler Systems equipment? What do you think about RDF Products equipment? Cubic (used to be OAR)? Are there others and what do you think? Thanks, Jay TSCM@j... 9809 From: walshingham2000 Date: Mon Oct 4, 2004 2:07am Subject: The Current Status Of DES & 3DES -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 THE CURRENT STATUS OF DES ========================= by © PGPBOARD ANGELES CITY PHILIPPINES http://groups.yahoo.com/group/pgpboard/ pgpboard@s... PREAMBLE - -------- In 1972, the NBS (since renamed the National Institute of Standards and Technology, or NIST) initiated a program to protect computer and communications data. As part of that program, they wanted to standardize on a single encryption algorithm. After two public requests for algorithms, they received a candidate from IBM based on research being done in its Yorktown Heights and Kensington Laboratories. Among the people working on this candidate were Roy Adler, Don Coppersmith, Horst Feistel, Edna Grossman, Alan Konheim, Carl Meyer, Bill Notz, Lynn Smith, Walt Tuchman, and Bryant Tuckerman. The algorithm, although complicated, was straightforward. It used only simple logical operations on small groups of bits and could be implemented fairly efficiently in the mid-1970s hardware of the time. Its overall structure was something called a Feistel network, also used in another IBM design called Lucifer. DES is a block cipher, meaning that it encrypts and decrypts data in blocks: 64-bit blocks. DES is an iterated cipher, meaning that it contains 16 iterations (called rounds) of a simpler cipher. The algorithm's primary strength came from something called an S-box, a non-linear table-lookup operation by which groups of six bits would be replaced by groups of four bits. These table lookups were expressed as strings of constants. NBS lacked the ability to evaluate the algorithm, so they turned to the National Security Agency (NSA) for help. From that moment onwards the DES has always been regarded as "tainted" with speculation that the original cipher had been somehow emasculated by the NSA, by shortening the key length to 56 bits from the original 128 bits, and the inclusion of a "trapdoor" by which they (NSA) could easily access the encrypted data. In reality, the changes the NSA made where never made public, and no rationale was given for the S-box constants and the short key length. Originally the key length was supposed to be reduced to 64 bits, but when the standard was published, it turned out 8 of those bits were "parity bits" used to confirm the integrity of the other 56 bits, and not part of the key at all. Despite criticism, the DES was adopted as a Federal Information Processing Standard in November 1976. It was the first time an NSA-evaluated encryption algorithm was ever made public. HOW VULNERABLE IS DES (3DES) ? - ---------------------------- Advances in computer hardware and processing speed eventually made feasible key exhaustion attacks against the 56 bit key DES possible. In January 1999 the third DES challenge resulted in a 56 bit DES key being recovered by a distributed attack in just 22 hours. To put it bluntly 56 bit key DES was brute forced in 1999, in less than one day. DES with 56 bit keys was effectively dead... Using current hardware standards, a determined attacker with a one million dollar budget could brute force a 56 bit key DES in about 35 to 60 minutes. The issue concerning DES 56 bit key was addressed with the introduction of the 3DES or "triple DES" algorithm. Here the key length is effectively stretched to 112 bits. This may seem a little confusing, how come three "applications" of the 56 bit key DES algorithm only result in a key length of 112 bits, and not 168 bits? In fact 2DES can come up with an effective key length of 112 bits, which is enough to protect the message from known brute forcing techniques. In addition 2DES still retains its inherent resistance to differential and linear cryptographic attacks (* more about this later ..pgpboard admin..).. So why bother with 3DES, 2DES must be much faster in software? Well, yes it is, however 2DES is vulnerable to meet-in-the-middle attacks/birthday attacks. Such an attack yields an effective key length of only 57 bits, or one bit greater than the standard implementation of the DES. In reality, just how practical this threat/attack really is questionable when one considers that such an attack would require about 1.15 X10^6 terabytes of machine memory. How come?.. The DES algorithm would require the left and right arrays to store about [(2^56 x 64)/8] x 2 = 1.15x10^6 terabytes. The meet-in-the-middle attack, however impractical, is countered with the inclusion of the third application of DES operation, which in itself, does not contribute to increasing the effective key length beyond 112 bits....(1) (Note *) BIRTHDAY ATTACK .....Take a function f(?) that seems to map an input to a random output of some fixed size (a pseudo-random function or PRF). A birthday attack is simply selecting random inputs for f(?) and checking to see if any previous values gave the same output. Statistically, if the output size is S bits, then one can find a collision in 2^(S/2) operations, on average. (Note*) MEET IN THE MIDDLE ATTACK....The Meet in the Middle attack is similar to the Birthday Attack, except that the cryptanalyst has a little more flexibility and instead of waiting for a value to occur twice in a single set the cryptanalyst can check for an intersection between 2 sets. For instance, let's say that the cryptanalyst has a pretty good knowledge of the kind of plaintext messages of some given sender, who happens to use 64 bit keys. The cryptanalyst would build 1 of the 2 sets, namely a table, by computing 23^2 unique hash results for the same plaintext message, with the associated unique key for each hash result, using the same hash function as the sender. Then the cryptanalyst would eavesdrop for each message to check if the encrypted hash value exists in his table of pre-computed hash values. If there is a collision, then it might be possible that the corresponding key in your table is correct, which inevitably would open up the possibility for the cryptanalyst to insert his/her own messages. In 1990, in Israel, two cryptographers, Eli Biham and Adi Shamir discovered a new cryptographic tool they could use for attacking block ciphers such as DES, they called it "differential cryptanalysis". However, to their great surprise Biham and Shamir found that their new tool was unsuccessful when applied to the DES. The ability of DES to withstand this attack resides firmly in the transformation values within DES's "S Boxes". And these S Box parameters where specified by the NSA (National Security Agency) in 1974. Don Coppersmith one of the original designers of DES later confirmed that the NSA had developed differential cryptanalytic attacks back in the early 1970's, and had modified the DES S Boxes with parameters optimized to resist such attacks. Biham and Shamir caught up with the NSA 20 years later!! Differential and linear cryptanalysis techniques are useful in the design of block cipher algorithms, however, they have limited value when used for breaking operational ciphers. Differential CA techniques generally require about 2^47 I/O pairs. Linear techniques improve on this, but the still need a hefty 2^44 I/O pairs, and over 250 terabytes of machine memory. The practical implications of such attacks has little impact upon every day security issues. How is this possible you may ask? "Our whole network has been, or is about to be compromised..right...?"..... WRONG..!! Even in the most poorly managed system, it would be nigh impossible to obtain 2^44 I/O pairs. Differential CA has been responsible for busting some poorly designed ciphers, DES was not one of them. CA should not be regarded as a crypto cracking tool, but more of a crypto development and optimization tool. In real life crypto systems it is vastly easier to directly attack either a weak physical implementation of the system, or the human component, rather than try to break a well designed cipher, operating in a well managed environment. The best attack against DES is still a key exhaustion attack, and 3DES is probably the most secure 64 bit cipher available in the public domain. 3DES is currently immune from known key exhaustion attacks, and his highly resistant to both differential and linear cryptanalysis attacks. The longer term threat to 3DES will probably be associated with its cipher block length (64 bits). The threat will be associated with the development and realizations of "birthday attacks" and "man in the middle attacks". This issue will be applicable to ALL 64 bit block ciphers. DES WEAK KEY FORMATS - -------------------- The US government ensures the keys generated or chosen to protect the enciphered data are such that they are both secure and have no inherent weakness. The only known weak key combinations for 3DES are reproduced below:- The use of weak keys can reduce the effective security afforded by TDEA and should be avoided. Keys that are considered weak are (in hexadecimal format): ï 0000000 0000000 ï 0000000 FFFFFFF ï FFFFFFF 0000000 ï FFFFFFF FFFFFFF Some pairs of keys encrypt plaintext to identical ciphertext. These semi-weak keys are (in hex): ï 011F011F010E010E and 1F011F010E010E01 ï 01E001E001F101F1 and E001E001F101F101 ï 01FE01FE01FE01FE and FE01FE01FE01FE01 ï 1FE01FE00EF10EF1 and E01FE01FF10EF10E 3DES is pretty secure for the class and type of data it was intended to protect, twenty five years after its inception the current flavor of 3DES is still the most secure 64 bit cipher in the public domain, and PGPBOARD members should not hesitate to use it. Col. Ralph Peterson USAF (retired) closes out this piece concerning DES with the following observation......."3DES is like the RPG-7, its big, its ugly, but it works every time...!!" US GOVERNMENTS POSITION REGARDING THE USE OF DES (3DES) - ------------------------------------------------------ Thru to the year 2031, Triple DES (TDEA) and the FIPS 197 Advanced Encryption Standard (AES) will coexist as FIPS approved algorithms thus, allowing for a gradual transition to AES. (The AES is a new symmetric based encryption standard approved by NIST.) With regard to the prohibition against use of ANSI X9.52 TDEA Keying Option 3 (key bundle composed of three identical 64-bit keys), exhaustion of the DEA cryptographic engine (i.e., breaking a DEA encrypted ciphertext by trying all possible keys) has become increasingly feasible as available computing power has grown. Following the development of practical hardware based DEA key exhaustion attacks, NIST can no longer support the use DES implementations based on a single 64-bit key for Federal government applications. Therefore, Government agencies with legacy single DES systems and TDEA with Keying Option 3 are required to transition to FIPS-approved versions of Triple DES (TDEA) or AES. Agencies are advised to implement only FIPS-approved versions of Triple DES. NEVER UNDERESTIMATE THE ABILITIES OF THE NSA & GCHQ - --------------------------------------------------- (Admin commentary)..The NSA (National Security Agency) and the British GCHQ (Government Communications Head Quarters) have always been very coy regarding their capabilities in the field of cryptology. Nowhere is there a better demonstration of this tendency, than the perception that public key cryptology was the invention of principally, Diffe, Hellman, and Merkle, and that differential cryptanalysis was developed by Eli Biham and Adi Shamir. What actually transpired was that James Ellis a British cryptographer at the GCHQ (Government Communications Headquarters) had discovered, and laid out the basics of public key cryptology between 1965 to 1967, almost 10 years before Diffie, Hellman and Merckle. The issue then became one of implementing some form of cipher algorithm to support James Ellis's revolutionary concept. This was achieved in 1973 by Clifford Cox and Malcolm Williamson (both GCHQ employees). By 1976 Ellis, Cox, and Williamson had discovered all of the fundamental components of public key cryptology. GCHQ and the NSA did not go public with this information, and it is not until recently that the pioneering efforts of Ellis, Cox, and Williamson, all of whom were bound by "The Official Secrets Act", have been publicly acknowledged. The modification by the NSA of the original DES "S box" transforms back in the early 1970's, provided DES with a very high level of resistance to differential cryptanalysis. This was only discovered after Biham & Shamir tried to apply "their new" technique of differential cryptanalysis to DES. The NSA had discovered differential cryptanalysis twenty years prior to Biham and Shamir. If the GCHQ and the NSA will sit on such break-throughs as public key cryptology, and differential cryptanalysis, then the capabilities may they currently have with regards to code breaking is open to speculation. Current estimates place the NSA's annual budget at $4.1 billion dollars, which is expected to double by the end of the decade. The NSA is currently building a massive data storage facility in Colorado, which will be able to hold the electronic equivalent of the Library of Congress every two days. At this point we need Mr. Terry Vantreese to bring us firmly down to earth. Terry pointedly states that: - "HOWEVER, unless you're doing terrorist activity with the USA on your tail about it, you have nothing to worry about. Christian missionaries in SE Asia won't have to face an attack from the US Military; their opponents are a lot less resourceful."... Contributors:- Mr. Terry Vantrese Col. Ralph Peterson (USAF retired) Mr. Alan Taylor © PGPBOARD Angeles City, Philippines Reprinted: 10/4/2004 1:14 PM CST -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (MingW32) - GPGshell v3.02 Comment: PGPBOARD Angeles City Philippines Comment: http://groups.yahoo.com/group/pgpboard/ iD8DBQFBYPWc7H26LUxZn78RAl3lAJwKTkl3mo00Msc4x2vhXNU+GJjc+gCgjAbw BjEyN6Uk/ufILbgoTA12eBw= =KDJs -----END PGP SIGNATURE----- 9810 From: Loy Chapman Date: Mon Oct 4, 2004 9:36am Subject: Re: Re: Review: An Evidence Collection Device I can go one better - use Linux (free) forget the write blocker (Linux doesn't ned one) and use dd (which I only recently found out means "Duplicate Disk") to make the copies like Unix has been able to do since the 1960's --- "J.A. Terranson" wrote: > > > > Might I suggest any laptop coupled to the > appropriate drive blocker of > your choice (firefly, etc.), at a much reduced cost? > In fact, I use an > older laptop (450mhz K62), a $200.00 write blocker, > and a $1,400.00 > package (FTK) which comes to less than the cost of > the logicube, and can > do *everything*, not just make an image. > > This device is being sold to those who simply don't > know better. > > //Alif > > -- > J.A. Terranson > United Forensics Corp. > > > > On Sat, 2 Oct 2004, Does it matter wrote: > > > Date: Sat, 02 Oct 2004 00:16:25 -0000 > > From: Does it matter > > Reply-To: TSCM-L@yahoogroups.com > > To: TSCM-L@yahoogroups.com > > Subject: [TSCM-L] Re: Review: An Evidence > Collection Device > > > > > > The logicube items work well and are a useful tool > (providing you > > get the model that provides md5.) This is never a > substitute for our > > portable systems with write blockers, but it comes > in handy now and > > then. > > A large drawback to the logicube items is that > everything is ala > > carte and some of the itmes are very helpful but > run the price up > > beyond reason. > > > > Darren > > > > > > --- In TSCM-L@yahoogroups.com, Thomas Shaddack > wrote: > > > On Fri, 1 Oct 2004, Steve Weinert wrote: > > > > > > > Review: An Evidence Collection Device > > > > The Logicube Forensic SF-5000u ($2,249 > direct), which lets you > > create a > > > > perfect copy of a source drive without > altering the original, > > may be the > > > > ideal device. This handheld drive-to-drive > duplicator produces > > an exact > > > > sector-for-sector copy of the original. Read > this review. > > > > > http://eletters.eweek.com/zd1/cts?d=79-1166-4-6-6228-131613-1 > > > > > > Over $2000 for a unit that can be replaced with > a mini-ITX board > > and a > > > small power supply in a briefcase. Call me a > cheapskate, but > > that's too > > > much. WAY too much. > > > > > > Any hardware that will run Linux (and will have > the desired IDE > > and/or > > > SATA and/or SCSI controllers) will do here. We > don't need anything > > more > > > than the kernel itself, drivers for the IDE > controllers, and a > > handful of > > > applications (dd, dd_rescue for damaged media > (snafu warning: has > > > different syntax than dd), md5sum, sha1sum). > That all comfortably > > fits on > > > even a floppy. (A distro specifically tailored > to this class of > > problems > > > (to system recovery, more accurately, but making > exact duplication > > is a > > > subset of that problematics) is RIP, Recovery Is > Possible, > > available here: > > > > . > Saved > > my > > > posterior more than once. > > > > > > Versions available are for a CD (small enough to > fit even the > > > creditcard-sized one, suitable to carry in a > wallet), for a > > floppy, and > > > for PXE network booting (so it can boot from > LAN). > > > > > > Any other distro with dd (and the required > checksum programs) will > > do too. > > > > > > You can duplicate the entire drive as-is, or > image the partitions > > to files > > > (which can be zipped and archived on a tape or a > DVD or a disk, > > (when > > > small enough), and later mounted as a loop > filesystem or written > > to a new > > > drive). > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - 50x more storage than other providers! http://promotions.yahoo.com/new_mail 9811 From: James M. Atkinson Date: Mon Oct 4, 2004 2:09pm Subject: Update on Steve Wilson Case - Sentenced this AM This is an update on the Steve Wilson case. This morning (October 4, 2004 at 9 AM), he was sentenced to 60 months in a federal prison, plus 48 months of supervised release, mandatory attendance in a drug rehabilitation program, attendance in a mental health program, stripped of his assets, and so on.... essentially he received a 9 year sentence. He was given credit for the time he has already spent is prison (since April 30, 2004), so his release date from prison will be April 2009 at which time he will be 65 years of age and old enough to draw social security. At that time he will start his supervised release program which will extend until April 2013, or until he is almost 70 years old. The release date from prison may be delayed if he misbehaves (which you can count on), and he is considered a violent escape risk so his prison time will not be pleasant, nor will it pass quickly. As many of you may note, the sentence was about fourth of what would normally be given, but as expected Steve rolled over on many of his business associates and contacts to reduce his prison time so that he didn't die of old age at a maximum security federal prison. There are already several TSCM folks mentioned in the court documents who were helping Steve launder his drug money, and who here helping his illicit activities. It should be interesting to see how long it takes the government to move on these other TSCM folks, and to see just how far the money laundering of drug proceeds extends within the profession. I would point out that the equipment he was selling on E-Bay did not actually belong to him, and that the actual owner of the equipment has reported the goods as stolen. If you bought ANY EQUIPMENT from or though Steve Wilson AKA: Technical Intelligence Group, Wilson and Associates, etc you should consider the goods to be stolen property and work with your attorney to get the equipment returned to its rightful owner. Also, if you were involved with him in any capacity professionally, sold him goods or services, took money from him, did sweeps with him, or associated yourself with him in any way you should retain a good criminal defense attorney as he fingered a number of folks in the TSCM business in exchange for a reduced sentence. About the only time he is going to get away from his prison cell is when the government flies him back out to Tennessee, Virginia, North Carolina, Georgia, and Maryland to testify in the criminal cases of his business associates (any of whom are going to be in for a surprise in the near future). He should be in the federal inmate locator database within just a few days, and should be settled into his new prison cell in time for his Halloween party (one guess as to what kind of costume he is going to wear to the party, and what he is going to pretend to be). -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9812 From: Tech Sec Lab Date: Mon Oct 4, 2004 4:04pm Subject: Humour [OT] http://www.skippyslist.com/skippylist.html 9813 From: taylortscm@y... Date: Tue Oct 5, 2004 0:06am Subject: Re: RDF Equipment? jay: contact steve at sws you won't find anybody here that knows more about this subject. dan taylor group "J. Coote" wrote: I'd like advice, off-line, on RDF equipment. No sales pitches, please. I may need a mobile RDF with tunable FM receiver; either built-in, or I'll add a receiver. The primary use will be protecting radio frequencies. What do you think about Doppler Systems equipment? What do you think about RDF Products equipment? Cubic (used to be OAR)? Are there others and what do you think? Thanks, Jay TSCM@j... ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? vote.yahoo.com - Register online to vote today! [Non-text portions of this message have been removed] 9814 From: satcommunitfive Date: Tue Oct 5, 2004 0:24am Subject: WIFI crims busted sweet... http://www.securityfocus.com/news/7438 m 9815 From: savanted1 Date: Tue Oct 5, 2004 11:35am Subject: Judge Rules Against USA PATRIOT Act Provision US District Judge Victor Marrero, in a lawsuit brought against the government by the American Civil Liberties Union (ACLU) on behalf of an ISP, has ruled against the government. Marrero asserted the provision in the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001 allowing the Federal Bureau of Investigations (FBI) to demand detailed customer records from communications providers and carriers without a court order violates the First and Fourth Amendment of the Constitution. http://www.theregister.co.uk/2004/09/30/patriot_act_judged/ Related Article: Ashcroft 'to defend' Patriot Act http://news.bbc.co.uk/2/hi/americas/3703676.stm Related Article: ACLU President Decries Patriot Act http://www.chronicle.duke.edu/vnews/display.v/ART/2004/10/01/415d8f7b2 50b3 9816 From: John Kennedy Date: Tue Oct 5, 2004 9:04pm Subject: Re: Review: An Evidence Colleciton Device > > I can go one better - use Linux (free) forget the > write blocker (Linux doesn't ned one) and use dd > (which I only recently found out means "Duplicate > Disk") to make the copies like Unix has been able to > do since the 1960's > > > OK, kids, I get to put on my geek hat here. dd has/had the ability to convert data to/from EBCDIC and ASCII, thus, the utility was named "copy and convert". Since the name "cc" was already taken by the C compiler, the executable was named "dd". Geek hat off... -- John Kennedy johnk@s... Second Source, Inc. Annapolis, MD USA 9817 From: Date: Wed Oct 6, 2004 2:24pm Subject: Re: RDF Equipment? Both Doppler Systema and Cubic are good in their respective price class. Note that Cubic 4400 is not a doppler, it is a single RF channel Watson Watt (English love legends: their Sir Watson Watt has neither invented nor patented this DF principle). It works as claimed - we tested it for mobile DFing. The MA1316 antenna is basically cross-Loop (2x2 loops orthogonally phased), it ensures excellent frequency agility with not as excellent sensitivity due to a front-end multiplexer necessary for a single receiver DF processing. By the way Cubic never was OAR, Cubic has acquired OAR and Swan one time but retained OAR logo on their DF. Regards A.W. "taylortscm@y..." wrote: > >jay: contact steve at sws you won't find anybody here that knows more about this subject. > >dan >taylor group > >"J. Coote" wrote: > >I'd like advice, off-line, on RDF equipment. No sales pitches, please. >I may need a mobile RDF with tunable FM receiver; either built-in, or I'll >add a receiver. >The primary use will be protecting radio frequencies. > >What do you think about Doppler Systems equipment? >What do you think about RDF Products equipment? >Cubic (used to be OAR)? >Are there others and what do you think? > >Thanks, >Jay >TSCM@j... > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > >It is by caffeine alone I set my mind in motion. >It is by the juice of Star Bucks that thoughts acquire speed, >the hands acquire shaking, the shaking is a warning. >It is by caffeine alone I set my mind in motion. >=================================================== TSKS > > >Yahoo! Groups SponsorADVERTISEMENT > > >--------------------------------- >Yahoo! Groups Links > > To visit your group on the web, go to: >http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: >TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > > >--------------------------------- >Do you Yahoo!? >vote.yahoo.com - Register online to vote today! > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > __________________________________________________________________ Switch to Netscape Internet Service. As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register Netscape. Just the Net You Need. New! Netscape Toolbar for Internet Explorer Search from anywhere on the Web and block those annoying pop-ups. Download now at http://channels.netscape.com/ns/search/install.jsp 9818 From: Hawkspirit Date: Wed Oct 6, 2004 5:26pm Subject: Sweep needed Sweep needed for a Washington D.C. location. 3-4 offices and 3 cubicles. 7 phone lines. 7 computers. About 1800 sq ft Contact me by be-mail I am still on the road. Roger Tolces www.bugsweeps.com [Non-text portions of this message have been removed] 9819 From: Merl Klein Date: Wed Oct 6, 2004 6:47pm Subject: Re: Any members of NATIA? dj I guess there just arn't many serving members of Law Enforcement on our list. Some of us have a past. Merl ----- Original Message ----- From: dj To: TSCM-L@yahoogroups.com Sent: Saturday, October 02, 2004 8:48 PM Subject: [TSCM-L] Any members of NATIA? ? IT2 --------------------------------- Do you Yahoo!? New and Improved Yahoo! Mail - 100MB free storage! [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor Select Your State:AlabamaAlaskaArkansasArizonaCaliforniaColoradoConnecticutDelawareFloridaGeorgiaHawaiiIdahoIllinoisIndianaIowaKansasKentuckyLouisianaMaineMarylandMassachusettsMichiganMinnesotaMissippiMissouriMontanaNebraskaNevadaNew HampshireNew MexicoNew JerseyNew YorkNorth CarolinaNorth DakotaOklahomaOhioOregonPennsylvaniaRhode IslandSouth CarolinaSouth DakotaTennesseeTexasUtahVermontVirginiaWashingtonWashington D.C.West VirginiaWisconsinWyoming PurchaseRefinance ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 9820 From: J. Coote Date: Wed Oct 6, 2004 8:29pm Subject: RE: Any members of NATIA? Or they tend to respond off-list ? Jay -----Original Message----- From: Merl Klein [mailto:tsi@t...] Sent: Wednesday, October 06, 2004 4:47 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Any members of NATIA? dj I guess there just arn't many serving members of Law Enforcement on our list. Some of us have a past. Merl ----- Original Message ----- From: dj To: TSCM-L@yahoogroups.com Sent: Saturday, October 02, 2004 8:48 PM Subject: [TSCM-L] Any members of NATIA? ? IT2 --------------------------------- Do you Yahoo!? New and Improved Yahoo! Mail - 100MB free storage! [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor Select Your State:AlabamaAlaskaArkansasArizonaCaliforniaColoradoConnecticutDelawareFlori daGeorgiaHawaiiIdahoIllinoisIndianaIowaKansasKentuckyLouisianaMaineMarylandM assachusettsMichiganMinnesotaMissippiMissouriMontanaNebraskaNevadaNew HampshireNew MexicoNew JerseyNew YorkNorth CarolinaNorth DakotaOklahomaOhioOregonPennsylvaniaRhode IslandSouth CarolinaSouth DakotaTennesseeTexasUtahVermontVirginiaWashingtonWashington D.C.West VirginiaWisconsinWyoming PurchaseRefinance ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9821 From: dj Date: Thu Oct 7, 2004 7:56am Subject: RE: Any members of NATIA? No one has responded to the email that has been part of natia! IT2 __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com [Non-text portions of this message have been removed] 9822 From: contranl Date: Thu Oct 7, 2004 0:42pm Subject: Gsm-Scanners / Gsm-Bluetooth-Snarfing (Online video's) . Hi... have a look at these 4 video's They deal with Gsm-Scanning,Gsm-Bugging and Bluetooth-Snarfing of Gsm phones. The links to the video's are here: http://www.tetrascanner.com in the gsm-scanners section Here is a short description: .................................. Video 1 13 minutes (Windows Media Player) This video is partly in English and Dutch Introduction ...what is Bluetooth Statement that sales of Gsm's with integrated bluetooth have increased a 300% in the last year Explanation of "Blue-snarfing" Send a bluetooth command to take a picture using someone else his gsm phone Download all pictures inside the gsm phone Download the phonebook in the phone Let the phone send an sms message to anyone ..the receiver will think the message was actually send from the victims phone. Let the phone send an sms to a paid service (your own service for example) Let the phone divert any received calls to a number of your choice...so next time you call it it will divert you to your friend in a far away country...free for you and charged to the victims phone. Tell the victim phone to call a certain number (like your own number) From this number you can then hear whatever is going on around the victim's phone so infact the victim phone has become a remote controlled bugging device. Next is a demonstration of the above the Damsquare in the city of Amsterdam...the demonstrator scans all the gsm phones in the vicinity and then tells a phone on one of the tables to call his phone...he then is able to listen what is being said at that table. Next he sends an SMS message to all phones with bluetooth switched on (probably within 25 meters range) the message says "please come to the camera" he then offers to read various contents from the strangers phone. Next they go to Den Haag (The Hague)wich is the political center of The Netherlands when ministers arrive they try to see if they can get contact with any of there phones...they get contact but don't attempt anything to avoid breaking the laws. Then they visit a politician (member of parliament) he is interested so they demonstrate the whole thing to him...It works !... and the politician says that most of his collegues have the same type of gsm phone as he does (since they buy them all at once on one big contract. His collegues are other politicians,members of parliament,ministers and department officials)result of this demonstration is that they are able to download all infornation from this politicians phone they also send an SMS from his phone. Imagine what you could create to have one politician send an SMS of your choice to another politician. What scares this politician the most is that he has set a pincode for his Bluetooth device in his phone...for the "Blue-snarfer" that was not a problem at all ! The politician will ask questions about it in the next parliament meeting At the end they asked Nokia for comments and Nokia replies: "We have not had any warnings or complaints yet". Last is an advice where to go..to get an update to eliminate the problem. My comment: switch the Bluetooth off if you don't use it, next generation of Gsm-phones will not have these problems anymore. Video source: Tros Radar television The Netherlands Security advisor: Adam Laurie Software used: Gnokii .................................. Video 2 (English) Worldrecord Gsm/Bluesnarfing :) :) Shows a succesfull attempt to hack a Gsm phone over a distance of almost 2 Km's (1,1 Miles) using a 2.4 Ghz flatpanel antenna .................................. Video 3 9 minutes (realplayer) This video is in German language BSI (Bundesammt fur Sicherheit in der Informationstechnik) (Government institution for IT security) In the BSI lab they demonstrate various Gsm bugging techniques First is a Uhf-bug built into the battery pack of a gsm phone Next is a Gsm-phone with added internal microprocessor wich allows to call it and use it as a remote controlled bug the owner doesn't notice anything on the display. Next is a demonstration of how to pick up data from a computer network without making electrical contact to this network this is done simply by running a piece of wire (antenna) in parallel with the network cable ...information is then picked up (inductive.capacitive ?) and shown on a laptop (i have no idea what they use to do that, it is not the "Van Eck" technique) Next is the "Van Eck" technique wich is picking up radiation from monitors(tempest)over a certain distance and restoring the picture with newly added sync-signals. Next and main issue of this video is the so called IMSI-catcher...this is a device made by Rohde & Schwarz from Germany...they get no allowance to film this "secret" equipment so a fake scene is filmed to explain the workings. An IMSI-catcher simulates a new Gsm cell ,when close enough to a target (~300 meters)..it will force the target's Gsm phone to go trough this "fake cell" This way the IMSI number of the target's phone can be "catched" In practice that would be enough since the Gsm-network operator can now place a tap on the phonenumber that combines with the IMSI number. A immidiate tap at the IMSI-catcher is also possible but not always practiced since this has some disadvantages namely: 1) The phone is forced to clear mode in other words standard Gsm encryption is forced to off...in some phones you could notice that since a encryption-off warning will show up in the display. 2) The target phone can not receive calls while logged-in at the IMSI- catcher since it works only one way wich is outgoing traffic only Last thing they show is a "Crypto Gsm" also available from Rohde & Schwarz...the same company that does the IMSI-catcher :) :) ............................................. Video 4 (English) "The Gsm-Bluetooth-Sniper" Shows a demo of a longrifle kind of construction with a yagi-antenna and a telescope ...they use it on a bypasser with a Gsm phone. This video is not streaming..so you need to download and safe it first then unzip it and play it. The video is in DIVX format ,a player for that you may download from download.com...the direct link is at the bottom of my page it includes a stand-alone player and a codec that goes with WMP or Realplayer best quality is when played in the DIVX-stand-alone-player .............................................. The last link is to my "GSM SCANNER REPORT"" wich i am preparing (on CD) It will deal with all possible techniques and equipment for monitoring and intercepting Gsm phones. In this report i investigate Gsm-scaNNers and Gsm-scaMMers :) and anything else you could imagine related to surveillance and countersurveillance on Gsm phones. You might be interested to check this report first before spending lots of $$$$$ just for a demonstration of a Gsm-scanner! or lose it all in a scam I am still working on it and the page where i advertise this is still under construction..but you can have a look. I would like to ask the members of this group to let me know if they would be interested in such an extensive and exclusive report. I will probably charge a reasonable fee for that since it took me a lot of time and energy to compile. Thanks ! and enjoy the movies ! Tetrascanner www.tetrascanner.com . 9823 From: Date: Thu Oct 7, 2004 0:30pm Subject: Re: Any members of NATIA? I belong to NATIA - Pacific Chapter. I didn't initially respond because the inquirer didn't sign his name, company affiliation, nor say why he was interested. Carl Larsen LARSEN and ASSOCIATES PRIVATE INVESTIGATIONS 18847 N. Alameda Drive Surprise, Arizona, 85387 ph/fax: 623-594-1783 [Non-text portions of this message have been removed] 9824 From: James M. Atkinson Date: Thu Oct 7, 2004 6:25pm Subject: October Program Kicked Off on Monday Morning The first round of DHS security sweeps started on Monday with a huge number of illegal searches, seizures, arrests, and detentions. Curiously the media is already being squelched, and DHS has gone so far as to shutdown several media outlets and journalists in the past 48 hours to silence the voice of dissent. Ironically, in mid September 1938, Joseph Goebbels announced an identical plan, and in the first two weeks of October of that year "the security sweeps" also called the "October Program" was initiated to round up and/or silence members of the populace who the government were concerned might embarrass the party in the ensuing months. Then, during the first two weeks of October 1938, thousands of academics, scholars, authors, religious leaders, publishers, lawyers, reporters, clergy, and others were harassed, or just disappeared overnight. The sole factor in these disappearances was that fact that each had previously been an outspoken voice against the ruling political party or were political activists opposing the Nazi party. Those that didn't disappear were subjected to hostile interrogations, and aggressive, overt surveillance in an attempt silence those who would, or might speak out. Several weeks later the security sweeps climaxed in the Kristallnacht "measures" which were instituted, the rest is history. Given the Governments recent behavior and attitude towards the voice of dissent prior to and during the recent national political convention Mr. Ashcroft and Mr. Ridge seem to be following the teachings of Joseph Goebbels rather closely...It's just a matter of time they will start wearing matching clothes right down to the black leather trench coats. -jma ------------------------------------------ FBI's Anti-Terror 'October Plan' WASHINGTON, Sept. 17, 2004 (CBS) Convinced that al Qaeda is still determined to disrupt the U.S. fall elections by an attack on the homeland, FBI officials here are preparing a massive counter-offensive of interrogations, surveillance and possible detentions they hope will disrupt the terrorist plans, reports CBS News Correspondent Jim Stewart. FBI field offices and Homeland Security agencies will be advised of "extraordinary measures" that will go into place "beginning the first week of October through the elections." An internal e-mail advisory to supervisory agents this week from the FBI's "'04 Threat Task Force" said the purpose of the counter-offensive is "to foster the impression that law enforcement is focused on individuals who may be a threat." Specifically, the plan calls for "aggressive - even obvious - surveillance" techniques to be used on a short list of people suspected of being terrorist sympathizers, but who have not committed a crime. Other "persons of interest," including their family members, may also be brought in for questioning, one source said. All recent truck thefts, chemical thefts and suspicious cargo truck rentals will also be reviewed as part of the plan. Mosques will be revisited and members asked whether they've observed any suspicious behavior. Throwing hundreds of agents on the street and conducting invasive surveillance has become a standard post-9/11 tactic for the bureau, which hopes at a minimum to force terrorists go back into hiding and re-think their plan. Some officials believe it was just such tactics that foiled the remainder of al Qaeda's New Year's bomb plot in January 2000 after agents arrested one operative, Ahmed Ressam, in Port Angeles, Wash., with a car trunk full of explosive material. The bureau also knows it can expect to be criticized for the strategy if it goes too far. One element of the plan calls for addressing what some officials fears could be a wave of protests from Arab-Americans and civil libertarians once the so-called "October Plan" kicks off. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9825 From: Greg Horton Date: Thu Oct 7, 2004 10:25pm Subject: Re: October Program Kicked Off on Monday Morning Lilly makes Prozac in 10mg tabs and I recommend one tab in the morning and this should get you by. 9826 From: Michael Puchol Date: Fri Oct 8, 2004 8:50am Subject: [OT] Digital Video Recorders Hi all, I'm in need of a digital video recorder, and last time I looked at the market seriously it was all tape and a few really expensive digital units. Now it seems anyone and everyone is slapping a DVR card inside a bog-standard PC and calling it a DVR. Can anyone recommend a good-quality unit, it doesn't need to do everything and cook breakfast, but ideally it would have ethernet access to the live images and recordings, PTZ control and minimum 8 input channels. I have seen a $500 PC with a $300 DVR card being sold for over $4000, it's that bad (and confusing). Regards all, Mike 9827 From: Date: Fri Oct 8, 2004 0:26pm Subject: Re: Gsm-Scanners / Gsm-Bluetooth-Snarfing (Online video's) Bvsystems.com is soon to release a handheld scanner/SA that will do all ISM bands (including bluetooth 802.11b/g + 900mhz) for sub-2500USD, it's called the bumblebee. ...... Original Message ....... On Thu, 07 Oct 2004 17:42:35 -0000 "contranl" wrote: > > >.. > > >Hi... have a look at these 4 video's > >They deal with Gsm-Scanning,Gsm-Bugging >and Bluetooth-Snarfing of Gsm phones. > >The links to the video's are here: > >http://www.tetrascanner.com > >in the gsm-scanners section > > >Here is a short description: > >................................... > > >Video 1 13 minutes (Windows Media Player) > >This video is partly in English and Dutch > > >Introduction ...what is Bluetooth > >Statement that sales of Gsm's with integrated >bluetooth have increased a 300% in the last year > >Explanation of "Blue-snarfing" > >Send a bluetooth command to take a picture >using someone else his gsm phone > >Download all pictures inside the gsm phone > >Download the phonebook in the phone > >Let the phone send an sms message to anyone >..the receiver will think the message was >actually send from the victims phone. > >Let the phone send an sms to a paid service >(your own service for example) > >Let the phone divert any received calls to >a number of your choice...so next time you >call it it will divert you to your friend in >a far away country...free for you and charged >to the victims phone. > >Tell the victim phone to call a certain number >(like your own number) >From this number you can then hear whatever is >going on around the victim's phone so infact the >victim phone has become a remote controlled bugging device. > >Next is a demonstration of the above the Damsquare in the >city of Amsterdam...the demonstrator scans all the gsm phones >in the vicinity and then tells a phone on one of the tables >to call his phone...he then is able to listen what is being >said at that table. > >Next he sends an SMS message to all phones with bluetooth >switched on (probably within 25 meters range) the message >says "please come to the camera" he then offers to read >various contents from the strangers phone. > >Next they go to Den Haag (The Hague)wich is the political center of 9828 From: Kohlenberg, Toby Date: Thu Oct 7, 2004 11:15pm Subject: RE: October Program Kicked Off on Monday Morning hey! I here there's a new government program that will require children and pregnant women to get medicated for psychological problems. They're even looking at using drug delivery methods that are embedded under the skin so you can't remove them or forget. Do you think that the next version of the DSM will include a disorder called "disagreeing with your government"? >-----Original Message----- >From: Greg Horton [mailto:sgtpelon@e...] >Sent: Thursday, October 07, 2004 8:25 PM >To: TSCM-L@yahoogroups.com >Subject: Re: [TSCM-L] October Program Kicked Off on Monday Morning > > >Lilly makes Prozac in 10mg tabs and I recommend one tab in the morning >and this should get you by. > > > >------------------------ Yahoo! Groups Sponsor >--------------------~--> >Make a clean sweep of pop-up ads. Yahoo! Companion Toolbar. >Now with Pop-Up Blocker. Get it for free! >http://us.click.yahoo.com/L5YrjA/eSIIAA/yQLSAA/UBhwlB/TM >--------------------------------------------------------------- >-----~-> > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > 9829 From: mooty_7 Date: Fri Oct 8, 2004 8:20am Subject: toshiba sat laptop... a while back " 5 or 6 months " i posted a question here as to a way to access or bypass the admin bios pass word on my laptop...several people responded and i was able to reset it with success...i have the same problem again and for the life of me cant remember the remedy. the local genius at complete computing says he called toshiba and it cant be done...well i know that to be false because i did it before...ANY HELP WOULD BE GREATLY APPRECIATED. thanks in advance. 9830 From: savanted1 Date: Fri Oct 8, 2004 9:31am Subject: House Passes Second Anti-Spyware Bill The U.S. House of Representatives unanimously passed a bill October 6, 2004, increasing jail sentences for those who use secret surveillance programs, called spyware, to steal credit-card numbers or commit other crimes. The vote came two days after the House passed a separate spyware bill establishing stiff fines for spyware perpetrators, and supporters expect to combine the two bills with a third spyware bill in the Senate. Under the bill, those guilty of using spyware to commit other crimes would face up to five additional years in prison on top of sentences for their other charges, and those who use spyware to steal personal information with the intent of misusing it, including phishing attacks, or to compromise a computer's defenses face up to two years in prison. If the bill is passed by the Senate, the Justice Department will receive $10 million annually for the next three years to enforce the legislation. http://www.reuters.com/newsArticle.jhtml? type=internetNews&storyID=6443385 9831 From: Michael Puchol Date: Fri Oct 8, 2004 3:37pm Subject: Re: toshiba sat laptop... I believe the group has archives on the web site, you can do a search there for those messages. http://finance.groups.yahoo.com/group/TSCM-L/ Regards, Mike ----- Original Message ----- From: "mooty_7" To: Sent: Friday, October 08, 2004 3:20 PM Subject: [TSCM-L] toshiba sat laptop... > > > > a while back " 5 or 6 months " i posted a question here as to a way > to access or bypass the admin bios pass word on my laptop...several > people responded and i was able to reset it with success...i have the > same problem again and for the life of me cant remember the remedy. > the local genius at complete computing says he called toshiba and it > cant be done...well i know that to be false because i did it > before...ANY HELP WOULD BE GREATLY APPRECIATED. thanks in advance. > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 9832 From: Fernando Martins Date: Fri Oct 8, 2004 3:51pm Subject: Re: [OT] Digital Video Recorders hmmm ... that makes me ask something I'm allready asking to several known suppliers, but anyway here it goes ... 300 cameras, resolution 1/2 pal at 18ips, 30 day storage, high security system question, what management and storage system would 'you' use? For Michael question, my answer is one of this: - the SDVR series of GE Interlogix - the DX series of Pelco - the B2 series of Dedicated Micros - the DLS series of Dallmeier I think you would find a nice cost/benefit balance in Dallmeier DLS that is IFSEC2003 award, Linux based, from 1 to 24 video input, alarm management module as option in standart software (check also out the 'sendor' technology). FM ----- Original Message ----- From: "Michael Puchol" To: Sent: Friday, October 08, 2004 2:50 PM Subject: [TSCM-L] [OT] Digital Video Recorders > > Hi all, > > I'm in need of a digital video recorder, and last time I looked at the > market seriously it was all tape and a few really expensive digital units. > Now it seems anyone and everyone is slapping a DVR card inside a > bog-standard PC and calling it a DVR. Can anyone recommend a good-quality > unit, it doesn't need to do everything and cook breakfast, but ideally it > would have ethernet access to the live images and recordings, PTZ control > and minimum 8 input channels. I have seen a $500 PC with a $300 DVR card > being sold for over $4000, it's that bad (and confusing). > > Regards all, > > Mike > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > From: Date: Thu Oct 4, 2001 3:43am Subject: Re: PBX sweep Is there a manufacturer of a PBX system that DOES NOT have remote monitoring or other vulnerabilities? I heard of a TSCM client who was "shocked" to learn that the cordless phone in his office transmitted out into the parking lot. The client was told to put the cordless phone in the trash and use a desk phone that plugged into the wall. Perhaps that's where a PBX with self-bugging vulnerabilities belongs; in the trash can next to the cordless phone. Again, is there a PBX system without vulnerabilities? Jack 3843 From: Charles P Date: Thu Oct 4, 2001 8:54am Subject: Re: Re: PBX sweep > Is there a manufacturer of a PBX system that DOES NOT have remote > monitoring or other vulnerabilities? > The complex nature of PBX's requires that they have the ability to be programmed, usually by PC or terminal through a serial port or other port. And the nature of serial ports or other data connections includes that they can usually be remotely connected. But all this depends on whether it has been connected that way. Trouble is that most clients are not concerned enough to want to monitor the security of their connections. Another good reason for frequent TSCM inspections, though. Many of the vulnerabilities are also related to features that the client demands. > I heard of a TSCM client who was "shocked" to learn that the cordless > phone in his office transmitted out into the parking lot. The client > was told to put the cordless phone in the trash and use a desk phone > that plugged into the wall. > Don't forget to look for the secretary's wireless headset. They may have no cordless phones at all but the headset could be. > > Again, is there a PBX system without vulnerabilities? > Perhaps that's like asking if there is any type of building that can't be broken into or attacked. The level of security will depend on the countermeasures that have been employed. Charles charles@t... Global Communications Tarrytown, NY www.telephonesecurity.com 3844 From: Dawn Star Date: Thu Oct 4, 2001 11:11am Subject: pbx SWEEP One thing I like about after hours sweeps is that the phone switch is quiet. I have my assistant lift the executive desk phones in the offices to be checked. I then monitor the outgoing trunks for activity (dial tone/tone dial sequences) . What I am looking for here is a software modification that would redirect the conversation out of the building to a listening post line. Roger Tolces Electronic Security www.bugsweeps.com 3845 From: James M. Atkinson Date: Thu Oct 4, 2001 11:43am Subject: Re: pbx SWEEP At 9:11 AM -0700 10/4/01, Dawn Star wrote: >One thing I like about after hours sweeps is that the phone switch is >quiet. I have my assistant lift the executive desk phones in the offices to >be checked. I then monitor the outgoing trunks for activity (dial tone/tone >dial sequences) . What I am looking for here is a software modification >that would redirect the conversation out of the building to a listening >post line. > >Roger Tolces >Electronic Security >www.bugsweeps.com Don't forget to check the Voicemail trunks for audio. I know of at least one case where the phone instrument in a targeted area was modified, and the audio present on the phone routed directly into a voicemail bin. The audio file was then downloaded of the VM box via an Ethernet connection. Not a pretty thing. 1) Watch for live audio (ie: open microphone) on the VM system ports or trunks 2) Does the VM have a network connection?... if so why? 3) How is the admin port configured? is it on the network? Why? 4) Do we have remote diagnostics port? is it active? dial in? who installed it? why? 5) Is there an operational dead latch on the phone room, and wiring closet doors? Why not? 6) Is the latch, hinges, etc protected against manipulation at the phone room, and wiring closet doors? Why not? 7) Are all phone doors, wiring closets, and electrical closets wired into the IDS and Access Control Systems? Why Not? 8) Which doors have "Watergate tape" on them? Latch Scratching? Paint Seam Damage? Why? -jma -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3846 From: Steve Uhrig Date: Thu Oct 4, 2001 11:49am Subject: Re: What might this signal be? Once upon a midnight dreary, Dawn Star pondered, weak and weary: > While doing a sweep in Los Angeles yesterday I ran into a > transmitted signal that I have not seen before. The front end of > the carrier appears to be analog with tone bursts and the tail > end of the signal is digital noise in appearance. The overall > signal goes completely off about every three seconds, tone bursts > (audible tones/ analog slope demodulation) and then the digital > follows. The signal is at about 975 MHZ. Hi Roger, Did the signal sound like a long BEEEEP BOOOOP for about 1 second, then variable times of several seconds to maybe 15 seconds max of hissing? If so, that was a batch of paging messages. The beep boop is the preamble, which tells all the pagers on the frequency to wake up and listen and see if the message might be for them. There are various methods of breaking all the pagers up into groups, and the beginning of the batch has some data that tells the pager if the message might be for it, or definitely not. The hissing is the data part of the batch, various speeds and formats. If definitely not for a particular pager, that pager goes right back to sleep (to extend battery life) until the next batch comes in. If it might be for that pager, the pager will decode at several levels until if, at the last level, the capcode (address of that individual pager) matches, the pager will activate and display the decoded data. Paging system store up messages in the 'concentrator' until they have enough piled up to be worth firing up the paging transmitter and squirting them all out. A batch could be 3 messages or 300. Depends on how busy the system is, and a lot of other factors. On a busy system at a busy time, like a big city on a Saturday night, the batches come one right after another and you may not even hear the carrier drop between batches. If not busy at all, the transmitter may come on every one minute or whatever, so any pages entered into the system don't wait forever until they are transmitted. Different paging formats (Pocsag and various versions of Flex are about all that is left in the U.S.) can be intermixed on the same channel, although not in the same batch. You can have a fast Flex batch at 6400 baud quadraphase followed by a slow Pocsag batch at a slow 2400 baud biphase. A trained ear can tell by the sound of the beep boop and hissing, what format and speed is being transmitted. The majority of pagers now, and virtually all Flex pagers, operate in 929-930 megacycles, and 931-932 megacycles, although older Pocsag can be found anywhere in the land mobile bands from 30 megacycles up through and including VHF and UHF. 95% of the paging now, I would estimate, is in the 900 meg range. Almost all 900 megacycle stuff is simulcast. More on this below. Many tall buildings have paging systems on them, and on a night that is not busy, the transmitter may fire up only a few times an hour. Generally, the transmitters are fairly potent, like a few hundred watts into 6 - 10 dBd of antenna, so they put out a whopping signal that can swamp the front end of any receiver you are using, and if you are not specifically listening to the paging frequency, you might not know that transmitter is operating and wonder why your receiver goes dead or flaky for some short period of time. That is because the very loud paging signal is killing the front end of your receiver and pumping the AGC way up. Remember, if you are in the same building as the paging transmitter, or across the street from one, they can be within FCC specs with spurs and harmonics 60dB down and still be very loud when you are that close. The 975 megacycle signal you are hearing might well be some intermod products generated in the front end of your receiver or by any nonlinear junction in the area. In most places, you rarely are more than arm's length from a nonlinear junction. Since 975 -930 (freq you heard minus the paging freq) = 45 megacycles, and that is well within the land mobile band, you might be getting intermod from a 45 meg transmitter and a 900- something paging transmitter. I would think it would be very intermittent, though, as you would only hear the product of the two if both signals were active. Also, above I mentioned the 930-whatever paging transmitters are simulcast. That is to improve coverage and penetration into buildings, since the path loss and therefore range on 900 is fairly short. A large city like Baltimore may have five very loud transmitters to cover the city, and if you have regional or nationwide paging, you could have several thousand transmitters all firing up at the same time on the same frequency. Remember, the pager on your belt is a fairly simple system with most work done in a handful of chips, the pager leaves the factory for the equivalent of a few dollars US, for all practical purposes has no antenna, and is up against your belly where your body shields the antenna and soaks up most of the signal. Point being, to make that pager work reliably takes a loud signal, and the way to achieve that is by many transmitters transmitting the same data at the same time on the same frequency (definition of simulcast). For local simulcast, there is a 72 megacycle data link up full time between all the sites, sharing the paging data with all transmitters on the same system. To insure a perfect phase relationship (to eliminate heterodynes) and make sure simulcast transmitters do not interfere with each other and null themselves out, they all are locked to the same GPS-derived timing reference. The transmit frequencies and deviation levels also are maintained to be precisely the same between all the transmitters in the system, by proper maintenance and locking to a low propogation delay reference like a GPS satellite. Bottom line is, if you hear stuff at 929 or 931, or harmonics of those two, or what sounds like paging as described above, consider you may be hearing intermod and/or the signals may be killing the front end of your receiver. And if you are sweeping a high rise and find a steady data channel at 72 megacycles, you probably haven't found a super high tech digital Russian bug, you probably have a data link between paging sites. Anyone who does not completely understand all of the above, and all the attendant implications to RF sweeping, needs to learn a lot more basic communications theory before claiming to be in the TSCM profession at ANY level. If something is not clear, ASK. One of the reasons for this list's existence is for more experienced members to mentor those just entering the profession. I am not referring to Roger who asked the original question I answered above, as he has more sweeps under his belt than practically any of us. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3847 From: e cummings Date: Thu Oct 4, 2001 3:20pm Subject: after hours pbx sweep what do you do if the outgoing trunk is a T-1? At 09:11 AM 10/4/01 -0700, you wrote: >One thing I like about after hours sweeps is that the phone switch is >quiet. I have my assistant lift the executive desk phones in the offices to >be checked. I then monitor the outgoing trunks for activity (dial tone/tone >dial sequences) . What I am looking for here is a software modification >that would redirect the conversation out of the building to a listening >post line. > >Roger Tolces >Electronic Security >www.bugsweeps.com 3848 From: A.Lizard Date: Thu Oct 4, 2001 3:29pm Subject: with friends like these, who needs enemies? To: politech@p... From: Declan McCullagh Subject: FC: "Jihad training" website has been deleted, featured PGP key Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Sender: owner-politech@p... Precedence: bulk Reply-To: declan@w... X-URL: Politech is at http://www.politechbot.com/ X-Author: Declan McCullagh is at http://www.mccullagh.org/ X-News-Site: Cluebot is at http://www.cluebot.com/ ********** Date: Thu, 04 Oct 2001 12:30:38 -0400 To: Declan@w... From: Brian McWilliams Subject: Nixed 'Holy War' Web Site Offered PGP Encryption Key Declan, FYI ... Nixed 'Holy War' Web Site Offered PGP Encryption Key http://www.newsbytes.com/news/01/170828.html A U.K.-based Web site that offered Islamic military training apparently has been shut down by British officials. The site provided a PGP ("Pretty Good Privacy") encryption key to visitors wanting to conceal their communications with the company, Newsbytes has learned. The Web site belonging to Sakina Security Services Ltd., apparently shut down by British law enforcement officials Wednesday, advertised a firearms training course called "The Ultimate Jihad Challenge," among other services. [snip] ********** From: "Xeni Jardin" To: Subject: Jihad-training web site yanked; firm trained would-be fighters in USA. Date: Wed, 3 Oct 2001 18:49:47 -0700 Message-ID: The UK Times is reporting that the web site for a UK-based firm offering "jihad training programs" has been shut down, unclear by whom. Through the site, the company promoted its "Ultimate Jihad Challenge" workshops which included the how-to's of "bone breaking," "foreign firearm instruction," -- and gun-training sessions in the United States at a live firing range. The course outline ends on this note: "SUCESSFUL STUDENTS WILL RECEIVE THE SAKINA INSRUCTORS CERTIFICATE AND OATH OF LOYALTY TO THE UMMAH OF ALLAH DIVINE RELIGION OF SUBMISSION." I found a Google cache of Sakina's site, and have included the URL below with a text cut-and-paste from the cache. --XJ ====================================================== http://www.thetimes.co.uk October 4, 2001 "Holy Wars" website is shut down A British website which offered young Muslims the chance to train for holy wars abroad has been removed from the internet. The website of London-based firm Sakina Security Ltd is no longer available, Internet service provider Freeserve confirmed. The site had offered the "ultimate Jihad challenge" in which clients were taken to a live firing range in the United States for weapons training where they shoot up to 3,000 rounds each. It also offered training in hand-to-hand combat, including "the art of bone breaking" and how to "improvise explosive devices" in live operations. The website, which had more than 15,000 visitors, also asked people to donate money to a fund for the "liberation" of the Al-Aqsa mosque in Jerusalem. They were asked to give money to a London-based account of the Woolwich bank. It also carried a link to a "Jihad in Chechnya" site which showed the bodies of dead Russian soldiers. It was not clear who instigated the shutdown of the website, but police have been aware of Sakina's activities for at least 18 months. Hendon MP Andrew Dismore asked a question about the firm in Parliament in May last year and was told by then Home Secretary Jack Straw that police were already aware of the company and were looking into it. America : last updated, October 04, 2001 00:05 ====================================================== [Text copied from Google's cache of the now-defunct Sakina Security web site --XJ ] WOULD YOU LIKE TO MAKE MONEY FROM THE SECURITY INDUSTRY? IN THE REAL WORLD OF SECURITY THE MONEY IS MADE FROM HIGH RISKS JOBS. SAKINA SECURITY SERVICES PRIDES ITSELF ON HIGH RISKS JOBS IN THE FORMER SOVIET UNION AND IN THE CIVIL WAR ARENAS OF THE WORLD. TO BE ABLE TO SURVIVE IN THIS FIELD YOU NEED THE FOLLOWING SKILLS: INTERNATIONAL LAW/COUNTRY OF ORIGIN LAW INTERNATIONAL USE OF FORCE POLICY HIGH RISK OPERATIONS HIGH STRESS FIREARMS/CQB SKILLS INTERNATIONAL DRESS & PROTOCOL DRIVING SKILLS FOREIGN FIREARMS FAMILIARISATION BASIC LANGUAGE PHRASES LOCAL TERRORIST/CRIMINAL UPDATE THESE ARE SOME OF THE SKILLS REQUIRED BY A SAKINA OPERATIVE ON A HIGH PROFILE MISSION SAKINA ALSO OFFER COURSES IN SURVIVAL MARTIAL ARTS AND OTHER SECURITY RELATED MATTERS. Pre Instructors Course SALAM & MAY ALLAH HELP YOU IN THIS PRE INSTRUCTORS COURSE THE SAKINA PRE INSTUCTORS COURSE IS THE FIRST ISLAMIC MARTIAL ARTS COURSE IN THE U.K. THE REQUIREMENTS ARE THE FOLLOWING: - 90% MENTAL ENDURACE 600 SQUATS 100 PUSH UPS 100 SIT UPS PHASE ONE: DEMO FORWARD ROLL, BACKWARD ROLL, SIDEWAY ROLL, CARTWHEEL AND EXPLAIN HOW THERE ARE USED IN REALITY. PHASE TWO: DEMO WATER, EARTH, WIND & FIRE ATTITUDES IN REALITY SITUATIONS PHASE THREE: DEMO 5 BASIC TAKE DOWNS 5 BASIC THROWS 5 BASIC WRIST LOCKS 2 KNOCKOUT PUNCHES 2 DEADLY KICKS. PHASE FOUR: DEMO 5 CHOKES 5 LEG LOCKS 5 ARM BARS 5 ESCAPES. PHASE FIVE: 100 PUSH-UPS & 3 ROUNDS WITH THE INSTRUCTOR PHASE SIX: DEMOS THE SAKINA ART OF BONE BREAKING YOU MUST NOW MAKE THE INSTRUCTOR SUBMIT TO PASS THE COURSE SUCESSFUL STUDENTS WILL RECEIVE THE SAKINA INSRUCTORS CERTIFICATE AND OATH OF LOYALTY TO THE UMMAH OF ALLAH DIVINE RELIGION OF SUBMISSION (end) --------------------------------------------------------------------- This is the strangelove list located at http://www.strangelove.cc To unsubscribe from the list, e-mail: talk-unsubscribe@s... To get help from a warm body, e-mail: talk-owner@s... ------------------------------------------------------------------------- POLITECH -- Declan McCullagh's politics and technology mailing list You may redistribute this message freely if you include this notice. Declan McCullagh's photographs are at http://www.mccullagh.org/ To subscribe to Politech: http://www.politechbot.com/info/subscribe.html This message is archived at http://www.politechbot.com/ ------------------------------------------------------------------------- With friends like the British officials who shut down this site in the context of the "War on Terrorism", who the hell needs enemies? The biggest problem with finding terrorists and their friends and allies is finding out who the hell they are, particularly the local ones. This is one case where packet-sniffing and other methods of finding out who is contacting this organization is fully in order. Finding out *who* these people are via traffic analysis is much more important than the ability to read their mail conveniently off the Internet. While *most* of the Web traffic to such a site is going to be "good guy" traffic (I'm sure that the majority of people on this list would surf it to find out what the hell is going on), anyone using encrypted communications to/from such a site can quite reasonably be suspected to be a terrorist / friend / ally, and no reasonable judge is going to object to providing whatever warrants if requested / required, if any to place such people under *full* surveillance. My guess is that the decision to close down the site was made by some idiot who was more interested in making the public "feel good" by publically announcing that the site has been closed down. The next version of that site will probably be at a free Web host like geocities, they're going to be more discreet at getting to their intended audience, and the authorities are going to have to *find* that site. Who's side is that idiot on? Should he be fired and/or investigated by a security task force? (maybe the owners *wanted* the site to be closed externally because it was getting too hot!) This kind of stupidity endangers everyone *except* terrorists and friends. Is that what was intended? A.Lizard ************************************************************************ Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 3849 From: gkeenan Date: Thu Oct 4, 2001 4:58pm Subject: Analysts Bookshelf, and subscription offer Hello All, First of all, I want to thank Jim Atkinson, our moderator, for letting me post this. And, before Steve U. can say it -- once upon a midnight dreary, I sat here pondering, weak and weary (okay, so it isn't an exact quote (hehe)). Since our moderator has been receiving so many inquiries re the 9/11 attacks, I've decided to make an offer that, I feel, will work in pretty nicely with Jim's bookshelf mentioned below. I run 3 mailing lists out of my computer so they are not available on any listservs, nor any other public forum. One is for former students of mine who successfully complete my private investigator's course -- which none of you would be interested in. Another one is targetted to law enforcement professionals (local, state, federal), and the 3rd, which I believe most of you would find the most interesting, is directed toward LE, security, intelligence and counter terrorism professionals. I would like to use this opportunity to let the list know that I will open up subscriptions to the TN (terrorism news) list to subscribers of this list (this is the ONLY list I subscribe to to which I'm making this offer). Subscription is free. Many subs to the TN list are also suscribers to the LEO (law enforcement) list. Only I can post to these lists. They are not discussion groups, or anything like that. Information consists of open source information derived from major media worldwide -- including the London Times, Guardian, Daily Telegraph (UK and Australia), NY Times, CNN, ABC, Chicago Tribune, LA Times, Arizona Republic, Virginian-Pilot, Daily Mirror (UK), Sydney Morning Herald, The AGE (Australia), Times of India, The DAWN (Pakistani daily), BBC, US Deptartment of Defense, and many, many others. I also receive information from other sources that are not connected to the mainstream media. Volume on the TN list can be relatively heavy - particularly under the currrent circumstances. However, the info I send out is always current (unless something comes up that requires my presence out of the office, and that's when I get backlogged). If anyone is interested in subscribing to the list, please let me know privately -- include your name, company name, mailing address, at least one contact phone nr., and email address(s). I have some very high-profile subscribers which includes a number of US government agencies and military intelligence. Much of the info I send on this list is actually passed on, and used, by Air Force Intelligence and the AF Office of Special Investigations, and some is forwarded to Army intelligence offices in South Korea. Anyone interested, or wanting further details, please just email me privately and I'll reply as soon as possible. Jerry Keenan GPKeenan Co., Int'l Security Services ----- Original Message ----- From: "James M. Atkinson" To: "TSCM-L Mailing List" Sent: Wednesday, October 03, 2001 10:20 PM Subject: [TSCM-L] Intelligence Analysts Bookshelf > > > > > > Greetings, > > > > Do to the flood of inquiries I have been getting for resources and > > reference materials regarding the 9/11 attacks I felt it would be a > > good idea to compile a short list of open source reading materials > > which are easy to obtain. > > > > I limited the list to those books which laid the relevant information > > out in a straight forward manner, and also limited to those with a > > minimum of academic pontification and worthless rhetoric. > > > > Please take a look, and let me know what you think: > > > > http://www.tscm.com/bookshelf.html > > > > It is by no means a comprehensive list, but instead a "bookshelf" > > you can use for ready reference in the matter at hand. > > > > -jma > > > > > 3850 From: James M. Atkinson Date: Thu Oct 4, 2001 9:50pm Subject: METI Eyes Tougher Law To Punish Corporate Spies METI Eyes Tougher Law To Punish Corporate Spies TOKYO (Nikkei)--To enhance the protection of trade secrets, the Ministry of Economy, Trade and Industry (METI) is considering legislative revisions that would enable prosecutors to bring criminal charges against those engaged in corporate espionage activities, The Nihon Keizai Shimbun learned Thursday. METI is drawing up revisions to the Unfair Competition Prevention Law. The aim is to maintain the international competitiveness of Japanese firms by preventing the leaking of trade secrets, such as the design and production methods used for certain products. The ministry has been alarmed by a sudden increase in leakage of secret corporate data and technology, which is seen as reflecting the increased mobility of corporate employees and heightened competition at home and abroad. The ministry plans to set up a panel on Oct. 19 to finalize details, and is aiming to implement the revisions in 2003. Trade secrets include information pertaining to certain products or business activities, such as manufacturing technology, ingredients, client lists and materials procurement. Under current law, companies whose trade secrets are stolen can file a civil suit against a rival firm that it believes stole them, but cannot seek damages or penalties under the criminal code. If the rival steals a blueprint, for example, it will be punished under criminal law because that involves theft. But those who leak the corporate secrets they memorized are often not punished under criminal law. In devising a new legislative framework, METI will examine domestic and foreign laws governing industrial espionage, patents and copyrights. For example, under U.S. law, corporate spies can be slapped with 500,000 dollars in penalties. METI is still debating whether to penalize former employees for passing corporate information to their new employers because doing so may discourage workers from changing jobs. The ministry will also lessen the burden on plaintiffs -- who now have to prove their secrets were stolen -- by requiring defendants to prove their innocence instead. It will also devise a guideline so that plaintiffs can easily estimate the amount of damages. One reason many companies refrain from filing suit is because a stolen trade secret becomes public information once it is revealed in court. To encourage victims to take action, METI is considering limiting the disclosure of court documents pertaining to such secrets. (The Nihon Keizai Shimbun Friday morning edition) -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3851 From: Dawn Star Date: Thu Oct 4, 2001 11:36pm Subject: Countermeasures in Aviation My name is John Burnett. I am a DC-10 Captain for FedEx. I am also a Police Officer for the Memphis Police Department . My purpose in writing this is to share some of my thoughts regarding actions a pilot might consider when faced with a modern-day hijacker. These thoughts are "outside-the-box" when it comes to the way we've all been trained. Neither the FAA or our companies will suggest any of these techniques or implement them as a part of our normal training cycles. They couldn't for fear of lawsuits. I am distributing this via e-mail to buddies I've flown with. I'm asking them to send it to their circle of friends within the industry, and for you to send it to yours. I know most of us have e-mail, and I hope this reaches the next to face the horror of some religious fanatic onboard . We have all had "training" in what to do in case of a hijacking; try to keep the hijacker calm, make him think you're doing what he wants, take him where ever he wants to go, etc., etc., etc. Save your passengers, your crew, and your aircraft . In an emergency, you will revert to that training. When our unfortunate peers were faced with the screams of the Flight Attendants and hijacker's demands to open the cockpit door, their training probably made them open the door. When the fanatics made demands, their training told them to comply as best they could. I can only wonder what their thoughts were as they left the cockpit and were tied up in the back of the plane; what they thought as they descended over New York.... I hope the fanatics had to kill them in their seats and drag their dead bodies out of the cockpit. But, I bet they did as they were trained to do... . As you look back over recent hijackings, FedEx, Egypt Air, and now the September 11th hijackings, you see a perpetrator who, for one reason or another wants to take over the airplane and kill himself. Each of these hijackers, except for the FedEx incident, were successful. They took over the airplane and killed everyone onboard . If you're following the news programs today, you hear a lot about how we could let these hijackers learn to fly. You would think if knowing how to fly would guarantee a successful hijacking, Auburn Calloway (the FedEx hijacker) would have been a hijacker success story. He was a Navy pilot, a martial arts student, a fellow FedEx crewmember, and he took all the weapons he needed: hammers, knives and a spear gun. He didn't have to overcome any Flight Attendants or demand they open the cockpit door. He just went back to his bag, took out his hammer came back into the cockpit and started crushing skulls . The crewmembers on that flight didn't worry about Flight Attendants, they didn't worry about passengers. All three pilots left the cockpit and fought a hand-to-hand, life-or-death battle . To survive today's hijacker, you cannot worry about your passengers; you cannot worry about your Flight Attendants. You must develop a mind-set that everyone onboard - including yourself - is already dead. Because, if the hijacker is successful in taking over your airplane, not only you, your crew, your passengers and your aircraft are lost, but thousands on the ground are at risk . One of the reasons the FedEx crew survived, is the extraordinary actions of the co-pilot. Although he had brain injury, the co-pilot took the DC-10 and immediately executed a half-roll. This maneuver took the hijacker off his feet as the Captain and S/O were struggling with him. During a point in the maneuver, the hijacker, Captain and S/O were thrown back behind the cockpit door. When he righted the airplane, the F/O then left his seat and joined the fight in the galley area of the plane. It was only after the Captain determined the hijacker was subdued, he returned to the cockpit and flew the airplane to landing . Very few of us have had to confront true evil. Fewer still have seriously considered taking the life of another human being. I believe this is the reason the FedEx crew did not kill their attacker. The crew's heroism that day is beyond belief and any action that leads to a safe landing and recovery cannot be argued with. But, when the Captain left the F/O and S/O, thinking the situation was under control, he was mistaken. The F/O and S/O had sustained serious, life-threatening injuries. The hijacker had not. As the Captain flew the aircraft, the hijacker, who had surrendered, began the fight anew. As the airplane landed, the hijacker was just moments away from overcoming the two crewmembers . I mention this for your consideration. I would suggest that you make the conscious decision to kill anyone who tries to take your airplane from you. Today we are at war. The hijacker who comes through your cockpit door is going to kill you and everyone onboard . So, how do youI do that? What weapons are available to us as pilots? The intercom. Command that all men come forward and fight with the hijackers. You have many able-bodied men onboard. They are sitting in shock not knowing what to do. Command they come forward and help you kill your attackers. And, they will come . The airplane itself. Get the hijackers off their feet. Go into an immediate dive to float them to the ceiling. Then execute a 6G positive maneuver and hope they hit their head or break their back as they hit the floor, galley shelf, etc. Dump the cabin - maybe one of the hijackers has a head cold. Pull the fire handles, shut the start levers and turn the fuel valves off. If you lose the battle, at least the airplane won't be used as a guided missile on a kamikaze mission. With luck, maybe these guys didn't learn how to do an in-flight restart. Then leave the cockpit - all of you, and kill your attackers - don't believe it when they surrender - don't be nice to them - KILL THEM . Flare Gun If your airplane has one, the Captain might consider making sure it's loaded and secured next to his bag. I can think of nothing more satis fying than watching a ball of burning phosphorous embedded into a fanatic's gut, burning its way through him . The crash-axe. I would suggest you have your co-pilot take it from it's holder and secure it next to him so he has it immediately available. Makes an excellent skull crusher . Your flashlight. The FAA use to require a 2 cell. A 3 cell Mag-Light makes an excellent weapon. If your maneuvers have the hijackers on the floor writhing in pain, crush their skulls with it . Your stolen hotel bic pen. Drive it into an attacker's eye, ear, throat, or into the area just under the jaw bone. That's a particular interesting place to drive it, because when he opens his mouth to scream, you can read "Hyatt" sticking there . Your hand and fingers Drive your fingers into his eyes and try to feel your fingernails scrape the back of his eye sockets. Scoop the eyeballs out. It will confuse the hell out of him when he finds himself looking at his shoes as they dangle there on the ocular nerves . Your teeth. Remember Hannabal Lecter. Eat a nose, a cheek, or a finger. And keep eating. Attack with all viciousness. A piranha is a small fish, but it's greatly feared. A hijacker is not expecting you to eat him and it might make him forget why he got on your airplane to begin with. It will, at least, impress his buddies . Now here's my wish-list of things the FAA could do to help, especially in this time of war . Arm the Captain The battle is not going to require any long shots and a small revolver would be a good choice. It would hold off the attackers long enough for you to disable your aircraft. If the attackers claimed the red package they were holding was a bomb, I'd shoot out the door glass and hope the door would be ripped out and the hijacker and his package would be sucked out. And hey, Iif I got sucked out with him, I'd try to fly myself to the hijacker look in his face and laugh at him all the way to the ground . Invite the local Police to jumpseat Police are always looking for something free. Donut shops use to be a favorite target for robbers - until they started giving donuts to the Police. Robbers don't rob donut shops anymore. I would suggest each Police Department send the FAA a list of the best shots on the department and those guys and their guns would be welcome on my airplane. Fill every vacant seat with armed Police - give them a donut - and tell them to shoot anyone who gives your Flight Attendant any shit . Stop this silly no-knife rule. Make it public. Tell the public they're welcome to bring their pocket knives onboard. Then everyone will bring them. When you make your intercom call for help, you'll have a dozen or more knife wielding helpers trying to make sure their new Gerber tastes fanatics blood. There are even a few of them who'd want to keep ears as souvenirs . Law enforcement agencies are all aware there are copy-cat criminals and fanatics. We have a number of loony fanatical hate-groups here in the USA: ALF, PETA, KKK, Army of God, Anti-abortionists, and the list goes on. It doesn't matter the size of your airplane. Right now, as I write this, there is an anti-abortionist escapee here in the Memphis area. He's seen what happened at the World Trade Center. A small commuter plane would do a great job on an abortion clinic, or on an animal research facility, or on a local synagogue, mosque, etc., etc., etc............ . None of us is immune. Take some time and consider your actions if this event should ever happen to you . My prayer is none of you ever have to face this kind of decision . Best of luck to you, and may God Bless . John Burnett jsburne@a... --------- End forwarded message 3852 From: Date: Thu Oct 4, 2001 8:12pm Subject: Re: Countermeasures in Aviation In a message dated 10/4/01 9:36:35 PM Pacific Daylight Time, bratkid@e... writes: << My name is John Burnett. >> I want him on my team! 3853 From: A Grudko Date: Fri Oct 5, 2001 2:39am Subject: Countermeasures in Aviation This guy I would fly with..... > None of us is immune. Take some time and consider your actions if this > event should ever happen to you . > My prayer is none of you ever have to face this kind of decision . > Best of luck to you, and may God Bless . > John Burnett jsburne@a... 3854 From: Dawn Star Date: Fri Oct 5, 2001 10:57am Subject: What might this signal be? "Did the signal sound like a long BEEEEP BOOOOP for about 1 second, then variable times of several seconds to maybe 15 seconds max of hissing? If so, that was a batch of paging messages. The beep boop is the preamble, which tells all the pagers on the frequency to wake up and listen and see if the message might be for them." Thanks Steve, This is exactly what the signal was like and at the high amplitude you described. Right on! Roger 3855 From: Dawn Star Date: Fri Oct 5, 2001 11:02am Subject: after hours pbx sweep "what do you do if the outgoing trunk is a T-1?" You connect to the trunks where they meet the switch, the signal is analog at that point. Roger 3856 From: Aimee Farr Date: Fri Oct 5, 2001 11:53am Subject: Government snitch computer searches http://laws.lp.findlaw.com/2nd/009306.html LEVENTHAL v. KNAPEK, No 00-9306 (2d Cir. September 26, 2001) A public employee had privacy in the contents of his work computer, but an anonymous tip that the employee used it for non-business purposes justified a search. (The anonymous letter is pretty funny, BTW. Nice discussion. Worth a skim.) ..... As always, seek counsel in your jurisdiction. ~Aimee 3857 From: James M. Atkinson Date: Fri Oct 5, 2001 8:26pm Subject: First Annual Taliban Air Show Scheduled First Annual Taliban Air Show Scheduled Kabul, Afghanistan 17:52GMT - Sept. 24th, 2001 - Associated Press - Citizens of Afghanistan are reportedly looking forward with great anticipation to reports of an international air show to be held in the skies over their nation. The exact date and time of the upcoming Kabul International Air Show has not yet been announced. It is believed that event organizers feel that such an announcement would detract from the fun of the celebration by, "spoiling the surprise". Unlike most air shows the Kabul Air Show will feature almost no static ground displays but will have an unusually high number of aerial demonstrations and fly-bys. "We are most pleased by this feature of our air show. Instead of a lot of different kinds of airplanes just sitting around on the tarmac, the aircraft attending our show will actually be up in the air demonstrating what they do best!" we were told. Participation will probably be heaviest by aircraft of the United States Air Force and Marine Corps. Including appearances by F-15's, F-16's, A-10's, B-52's and Apache helicopters. It is rumored that opening ceremonies will feature a tomahawk-cruise fireworks display. A few B-2's, and F-117A's may also help out in some unseen capacity. Several other counties have expressed an interest in sending representatives. These include all nineteen nations in the NATO alliance as well as Australia. The excitement generated for this gala event has even prompted the Israeli Air Force to apply for participation. Of course, no one is more excited than the Afghan people themselves. Great numbers of them are in the streets of Kabul looking constantly heavenward in gratitude for the historic event, which will soon take place in their skies. It has been observed that some are so concerned about missing the show that even as they bow to the East they keep snatching worried glances towards the West. Thousands, in fact, have been seen leaving the city and fleeing to the mountains carrying food and blankets - obviously anxious to get a good vantage point for the air show, and to make a picnic of it. -jma -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3858 From: James M. Atkinson Date: Fri Oct 5, 2001 8:26pm Subject: First Annual Taliban Air Show Scheduled First Annual Taliban Air Show Scheduled Kabul, Afghanistan 17:52GMT - Sept. 24th, 2001 - Associated Press - Citizens of Afghanistan are reportedly looking forward with great anticipation to reports of an international air show to be held in the skies over their nation. The exact date and time of the upcoming Kabul International Air Show has not yet been announced. It is believed that event organizers feel that such an announcement would detract from the fun of the celebration by, "spoiling the surprise". Unlike most air shows the Kabul Air Show will feature almost no static ground displays but will have an unusually high number of aerial demonstrations and fly-bys. "We are most pleased by this feature of our air show. Instead of a lot of different kinds of airplanes just sitting around on the tarmac, the aircraft attending our show will actually be up in the air demonstrating what they do best!" we were told. Participation will probably be heaviest by aircraft of the United States Air Force and Marine Corps. Including appearances by F-15's, F-16's, A-10's, B-52's and Apache helicopters. It is rumored that opening ceremonies will feature a tomahawk-cruise fireworks display. A few B-2's, and F-117A's may also help out in some unseen capacity. Several other counties have expressed an interest in sending representatives. These include all nineteen nations in the NATO alliance as well as Australia. The excitement generated for this gala event has even prompted the Israeli Air Force to apply for participation. Of course, no one is more excited than the Afghan people themselves. Great numbers of them are in the streets of Kabul looking constantly heavenward in gratitude for the historic event, which will soon take place in their skies. It has been observed that some are so concerned about missing the show that even as they bow to the East they keep snatching worried glances towards the West. Thousands, in fact, have been seen leaving the city and fleeing to the mountains carrying food and blankets - obviously anxious to get a good vantage point for the air show, and to make a picnic of it. -jma -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3859 From: DrPepper Date: Sat Oct 6, 2001 9:25am Subject: Re: First Annual Taliban Air Show Scheduled "James M. Atkinson" wrote: > First Annual Taliban Air Show Scheduled > =============snippy de deee================== > > It has been observed that some are so concerned about missing the > show that even as they bow to the East. . . . . . . . . . . The problem with this is that Mecca is WEST of them, not East, , , , , > Thousands, in fact, have been seen leaving > the city and fleeing to the mountains carrying food and blankets - > obviously anxious to get a good vantage point for the air show, and > to make a picnic of it. > > -jma > -- 3860 From: DrPepper Date: Sat Oct 6, 2001 1:32pm Subject: Bomb 'em back to the stone age??? Talk is about, that we should bomb the Afghans back to the stone age. Well, take it from someone who has been there, They already ARE in the stone age. Many of these people actually live in caves. The borders there are meaningless, there is no barbed wire topped concrete wall between countries over there, its just an easy walk from one country to the other without anyone to stop them except maybe a Pakistani border guard who will accept any bribe that is offered to him, or he will just take what he wants from anyone trying to pass through a small gate. If they don't want to go through the gate, then they can just walk NorthWest about a mile, and cross the undefined border unseen. The only ones NOT crossing are the western foreigners. The Afghans kicked the Soviets butt, and if we get involved on the ground there, they will kick ours, as well. What part of "Vietnam", don't the US Army understand? I also think that the stationing of our troops in Uzbekistan is just a faint. The real attack will probably occur in either the mountains near the border at Peshawar, or further South, in the desert closer to the Indian Ocean. And in any case, we have servicing facilities at Diego Garcia that is within easy bombing range of Afghanistan, so why do weneed to put troops in Uzbekistan? -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 3861 From: Miguel Puchol Date: Sat Oct 6, 2001 2:25pm Subject: RE: Bomb 'em back to the stone age??? > The Afghans kicked the Soviets butt, and if we get involved on the > > ground there, they will kick ours, as > well. What part of "Vietnam", don't the US Army understand? Ah, yes, but this was with the handy help of the U.S. providing funding, training and weapons to anyone who stood up and said "I'll go kill some russians!". Osama Bin Laden was one of these people. I believe this should bring thoughts on policies that aid uncontrolled militias, rebel groups, irregular forces, or even armies, as you never know when they could turn back on you, and I don't want to criticise anyone or do finger-pointing, a lot of countries have done such things. For example, talk now is to support & arm the Northern Alliance, but I know from a few sources that they are just about as fundamentalist as the Taliban, and there is doubts as to whether they'd do any better. I just hope this doesn't get out of hand. All the best, Mike 3862 From: DrPepper Date: Sat Oct 6, 2001 2:42pm Subject: Re: Bomb 'em back to the stone age??? I absolutely agree, Mike, , , , , , But you have to remember that "The enemy of my enemy is my friend." all the way from the school ground fights to the big wars, , , , , , And we sometime lose site of the future ramifications, i.e., , , , look at Saddam,, , , , We supported him at one time also. And then compounded our mistake by not waxing his ass in the Gulf war. Ah well, , , such is life, , , , , , -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm Miguel Puchol wrote: > > The Afghans kicked the Soviets butt, and if we get involved on the > > > > ground there, they will kick ours, as > > well. What part of "Vietnam", don't the US Army understand? > > Ah, yes, but this was with the handy help of the U.S. providing funding, > training and weapons to anyone who stood up and said "I'll go kill some > russians!". Osama Bin Laden was one of these people. > > I believe this should bring thoughts on policies that aid uncontrolled > militias, rebel groups, irregular forces, or even armies, as you never know > when they could turn back on you, and I don't want to criticise anyone or do > finger-pointing, a lot of countries have done such things. > > For example, talk now is to support & arm the Northern Alliance, but I know > from a few sources that they are just about as fundamentalist as the > Taliban, and there is doubts as to whether they'd do any better. > > I just hope this doesn't get out of hand. > > All the best, > > Mike 3863 From: Douglas Ellsworth Date: Sat Oct 6, 2001 4:27pm Subject: More on Stuph for sale Hi group, In response to the suggestions of several LIST members, including JMA, I'm presenting a list of gear I'm offering to sell on EBAY in the coming week. I'd like to offer the gear to the LIST first. The accompanying descriptions are intentionally brief, and interested persons should contact me directly (off-list) for photos and other descriptive info. All items sold "as-is" except as stated. Listing on EBAY will commence Wed. or Thurs. this week unless sold sooner. The prices quoted to LIST members will be reserve auction price if listed on EBAY. 1 MicroLabs SuperScout Non-Linear Junction Detector in custom oversized ZERO case. Hardly ever used - probably needs calibration - can supply name of person available to do minor tune-ups. Transmitter works fine. Asking $1500. (Cannot export). 2 Skyline Tradeshow Booth Display. Pop-up style - complete. Asking $700. 3 Tekelec Chameleon 20 Protocol Analyzer with all cables, software and manuals, including telephone handset for BRI and PRI ISDN monitoring. Good for learning. Custom fitted into LARGE transit case, into which a TEK 492 will also fit perfectly with no mods to foam. Asking $400. 4 Benchtop Spectrum Analyzers (for the tinkerer). HP 141-T mainframe with 8555A RF and 8552B IF sections. I'm selling TWO (2) of these for the price of one - one works quite well, the other does not. I can only guarantee that the working one is not DOA - I suspect its freq limit is 3.5 Gig. I suspect that some of the sections to the non-working one are OK, but time won't permit swapping out to verify - anyway a good parts source. Also, I'm including SERVICE MANUALS for 8555A, 8552B, and the 141-T Mainframe - so tinker-on! Asking $500 for all. 5 Sun Sparc 20 with 20 inch Sun MONITOR (the monitor with remote) - Ross processor 150 MHz - 160 MB RAM - Quantum 1Gig Hard drive - loaded with Linux for Sparc. Asking $300. 6 RDI PowerLite Unix notebook computer with bootable external Hard drive. Asking 260. 7 Tekelec Frame Analyzer/Simulator. Good for experiments/learning. Asking $60. 8 Dukane Overhead projector 4000 Lumens. Asking $50. Buyers pay for actual shipping and insurance. If anyone wants a lifelong friend - buy the whole boatload and I'll ship (US only) for FREE! Thanks for the attention, and special thanks to you, Jim, for the space and the thoughts. -Doug Doug Ellsworth Secure Communications Corp. email: do5ug@r... tel: 402.578.7709 [Non-text portions of this message have been removed] 3864 From: Jack Miller Date: Sat Oct 6, 2001 0:10pm Subject: Bush Teleconferencing! hey, I keep hearing in the news about president bush having teleconferences with his national security team. How secure are these teleconferences. I mean could a spy agency listen in? are they using physically secured communication lines? ===== ======================================= Jack Miller Researcher Paython and Co. ======================================= __________________________________________________ Do You Yahoo!? NEW from Yahoo! GeoCities - quick and easy web site hosting, just $8.95/month. http://geocities.yahoo.com/ps/info1 3865 From: Date: Sun Oct 7, 2001 2:50am Subject: Introduction Dear Group My name is Tim Mercer and I run a company called First Rock based in Northern Ireland. The aim of the company is to provide research, training and risk avoidance to clients which include the Insurance Industry, Banking, Legal Profession, Corporations, the Media and private individuals. I am a former member of the Royal Ulster Constabulary (George Cross) were I served for 15 years, 12 of those as a Detective within a Special Branch surveillance unit (E4A). I worked closely with UK Special Forces and British Security Services so have an understanding of government devices. I have completed some training subsequently and am also aware of commercial equipment. Since leaving in 1993 I completed a primary degree at university then entered the private security sector. I have endeavoured to work at the same professional standard as when in the public sector, currently completing a MSc in Security and Risk Management through the Scarman Centre, Leicester University. I am a member of ASIS, the Association of British Investigators (ABI), Ex Police Officers in Industry and Commerce (EPIC) and the Irish Security Institute. Over the last number of years I have observed that a lot of persons offering TSCM services have turned up with boxes sporting lots of 'coloured lights'. Eventhough I would consider myself at the infant stage of this very specialised subject I felt that the client was not getting value for money and the person conducting the sweep was trying to baffle us all with science. This determined me to build on the knowledge I already had so I could work in this field with integrity. I look forward to being part of the group, being aware that there most likely will be little I will be able to contribute, bowing to the vast knowledge already out there. If I ask any stupid questions I apologise now in advance. Should anyone require any assistance or information relating to Ireland please do not hesitate to contact me and if visiting the 'Emerald Isle' please look me up. Kind regards. Tim First Rock Research and Risk Avoidance Tmercersec@a... [Non-text portions of this message have been removed] 3866 From: James M. Atkinson Date: Sun Oct 7, 2001 11:43am Subject: The war against Afghanistan has just started Effective 12 noon EST the war has just gone hot, and the US is now dropping bombs on Kabul, Kandahar, Jalalabad, an other targets deep inside Afghanistan. The President will address the nation in a few minutes. God Bless America -jma -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3867 From: Steve Uhrig Date: Sun Oct 7, 2001 1:19pm Subject: An interesting article on commo intercept of bin Laden, drug cartels, etc. At least two list members are quoted in the article, one of them being me. http://www.business2.com/articles/mag/print/0,1643,17511,00.html This is only an abridged version. The full length version is in their magazine which, of course, they sell. It is on nearly any newsstand if anyone cares. A few apparent technical inconsistencies are more fully explained and debunked in the complete article. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3868 From: Date: Sun Oct 7, 2001 2:59pm Subject: Re: Bush Teleconferencing! et al, It is as near as 100% secure as you can get. Cleared up thru compartmented levels. > > I keep hearing in the news about president bush having > teleconferences with his national security team. How > secure are these teleconferences. I mean could a spy > agency listen in? are they using physically secured > communication lines? > It would be very difficault and require a physical penetration of the facilities. Rocco Rosano Reynoldsburg, Ohio mailto:prosano@i... 3869 From: Miguel Puchol Date: Mon Oct 8, 2001 2:08am Subject: RE: Re: Bush Teleconferencing! > It is as near as 100% secure as you can get. Cleared up thru > compartmented levels. I thought they might have a chain of guys passing polaroids up and down in sealed envelopes :-) This could be known as poor-man's videconferencing - for a better effect, use an OHP with the photos printed on transparencies. Cheers all, Mike 3870 From: Date: Mon Oct 8, 2001 5:12pm Subject: Extremist Web sites under scrutiny Extremist Web sites under scrutiny Muslim Internet pages calling for holy war watched, closed By Stephanie Gruner and Gautam Naik THE WALL STREET JOURNAL Oct. 8 ‚Äî Like many other groups, Muslim extremists have found the Internet to be a convenient tool for spreading propaganda and helpful hints for their followers around the world. Now, however, Web sites calling for jihad, or holy war, against the West are coming under increasing scrutiny, and some have been closed. GETTING INFORMATION ABOUT how to fund a holy war, build a bomb or inspire true believers to attend training camps in guerrilla warfare has long been as easy as visiting Yahoo Inc.‚Äôs Yahoo.com or other Internet portals. Yahoo serves as a gateway to dozens of Web sites offering tips on everything from handling weapons to creating an Islamic state. One British site shows a video of soldiers shooting at a picture of Bill Clinton. Investigators into the Sept. 11 attacks on the U.S. have been taking a close look at some Web sites advocating jihad. Last week, British authorities arrested 43-year-old Sulayman Balal Zainulabidin, a kitchen worker in Greenwich, England, on suspicions of terrorist activity, Scotland Yard says. He is the founder of Sakina Security Ltd., a Web site based in London that offers training courses in weaponry and ‚ÄúIslamic Threat Management,‚Äù according to British prosecuting authorities. Efforts to obtain comment from Sakina were unsuccessful. When investigators recently looked into Said Bahaji, a suspect linked to the Sept. 11 attacks, they found he had spent time at a jihad-related Internet site popular among Islamic extremists. On Sept. 29, the German federal prosecutor‚Äôs office said authorities arrested three Muslim men on charges of belonging to a terrorist organization. According to the prosecutor‚Äôs office, one of the three, identified only as Talip T., had an Internet home page with links to Web sites including one called qoqaz.net. That site, affiliated with London-based Azzam Publications, contained statements in support of terrorism to defend Muslims in the Caucasus; other themes included ‚Äúdonating money for the Taliban‚Äù and ‚Äúmilitary training for the battle,‚Äù the prosecutor‚Äôs office said. ‚ÄúThe propaganda and the statements of intent that come out on these Web sites are fairly blatant stuff,‚Äù says Yael Shahar, an expert on Web-linked terrorism at the International Policy Institute for Counter-Terrorism in Herzliya, Israel. Authorities have long kept tabs on Web sites perceived as extremist. In February 1998, five years after the bombing of the World Trade Center, Dale Watson, chief of the international terrorism section of the Federal Bureau of Investigation, informed a U.S. Senate committee that major terrorist groups used the Internet to spread propaganda and recruit new members. Of course, for most Muslims, the Web is another means to connect, exchange cultural information or seek religious guidance. And even creators of Internet sites that some deem extremist don‚Äôt see themselves that way. ‚ÄúI did not know that being committed to liberating one‚Äôs land or fighting terrorism is viewed as extremism,‚Äù says a spokesman responding to an e-mail sent to hizballah.org, a Web site offering a bloody photo gallery of purported victims and martyrs. ‚ÄúThe American people are preparing for war to fight for their freedom and to fight terrorism ‚Äî are they extremists?‚Äù But after the U.S. hijackings, some Internet companies have stopped hosting sites that are believed to support terrorism or that applaud the Sept. 11 attacks. Other Web sites have suspended operations or access to their pages. Yahoo, recently home to a ring of 55 jihad-related Web sites, is cooperating with authorities who are investigating e-mail and other electronic traffic that may be linked to suspects in the U.S. attacks. Lycos Europe NV says a 20-person team is monitoring its Web sites for illegal activity and has been removing terrorist-related content. ‚ÄúIf there is criminal activity, we cooperate with the authorities,‚Äù Chief Executive Officer Christoph Mohn says. One of the larger jihad-related Internet sites is Azzam.com, run by Azzam Publications, whose affiliated qoqaz.net site figured in last month‚Äôs arrests in Germany. Azzam.com offers primers including ‚ÄúHow Can I Train Myself for Jihad.‚Äù Traffic at Azzam.com, which is available in more than a dozen languages, increased 10-fold following the attacks, according to a person who identified himself as a spokesman for Azzam in response to an e-mail sent to the company. He declined to give his name. Founded in late 1996, Azzam Publications is named after Dr. Sheikh Abdullah Azzam, a mentor to Osama bin Laden. In response to questions sent via e-mail, the spokesman for Azzam said its goal is to ‚Äúprovide authentic news and information about Jihad and the foreign Mujahideen everywhere, by providing stories of martyrs killed in Afghanistan, Bosnia and Chechnya.‚Äù Although the Azzam site says it doesn‚Äôt encourage readers to commit illegal acts, it notes that, according to Islamic tenets, ‚Äúmartyrdom operations are permissible.‚Äù Some of Azzam‚Äôs sites were shut down after people complained to the Internet companies that host the sites ‚Äî at least one, following a request from the FBI. The spokesman for Azzam said the company hasn‚Äôt been approached by authorities and that it follows United Kingdom publishing laws. He added that Azzam has condemned the recent U.S. attacks and disagrees with the decision by the Web hosting companies to shut its sites. ‚ÄúIs this the ‚Äòfreedom‚Äô American people scream about?‚Äù the spokesman asked. Swift Internet of Britain, which until recently was the technical and billing contact for an Azzam site, says it received numerous threatening e-mails accusing it of supporting a terrorist Web site. Swift has since distanced itself from the site by removing its name as a contact on public Internet records. While the company didn‚Äôt host Azzam‚Äôs Web site and had nothing to do with shutting it down, Swift says it also has received ‚Äúabusive‚Äù e-mails asking where the site had gone. Other e-mails contained threats against Americans and complaints that Swift was impeding free speech. ‚ÄúWe‚Äôre very glad we‚Äôre not associated with it any longer,‚Äù says Swift‚Äôs managing director, Martin Stanley. Some sites keep popping back up. While Azzam‚Äôs English and German-language Web sites have been shut, they have been replaced by a substitute site under a different address: qoqaz.co.za. Said the Azzam spokesman: ‚ÄúOne cannot shut down the Internet.‚Äù Elizabeth Williamson contributed to this article. 3871 From: Date: Mon Oct 8, 2001 11:49am Subject: Two key pieces of evidence were missing from the government's dossier You can also download a word or .pdf file of the UK dossier from the webpage. John R. Angier II M-Group P.O. Box 721388 Norman, OK 73070-8070 USA w 405.321.1015 f 405.321.1259 c 405.833.3199 e mustardcon@a... "The threat is changing, It's a threat that is using a variety of sources to come at us, and it's a threat that you can't necessarily pin down in a (predictable) scenario." Lt. Col. Dane Reves, U.S. Army, Army Computer Emergency Response Team ***************************************** http://www.sunday-times.co.uk/news/pages/sti/2001/10/07/stiusausa02012.html October 7 2001 Two key pieces of evidence were missing from the government's dossier on the US attacks, made public last week. Now full details of the case against Bin Laden can be disclosed The proof they did not reveal At 6ft 4in he is a big man, with a long black beard and furtive eyes. The price on his head in the FBI wanted poster is also imposing: $5m (£3.36m) is the bounty offered for Muhammad Atef. The FBI is offering the fortune because Atef is one of the closest allies of Osama Bin Laden. He is also, it emerged this weekend, one of the key links between the terrorist chief and the suicide attacks in America on September 11. The vast electronic eavesdropping operation of western intelligence has revealed, albeit belatedly, that Atef was the likely "mastermind" behind the meticulous planning of the operation, and conveyed the order for its execution. This is believed to form a key part of the evidence that has convinced leaders, both within Britain and overseas, that Bin Laden was responsible for the atrocities, but which has been withheld from public release for security reasons. For more than a decade Atef has been a loyal follower of Bin Laden, rising to sit on the military committee of Al-Qaeda, the terrorist network. He takes "primary responsibility", according to the CIA, for the training of new members at camps in Afghanistan. The ties extend beyond a shared ideology: in January, in the southern Afghan city of Kandahar, Bin Laden's eldest son married Atef's daughter. This was more than the union of two families. It was a fusion between two of the world's most wanted men. The FBI believes Atef, who also goes by the names Sheikh Taseer Abdullah and Abu Hafs al-Masri, is Bin Laden's military planner. Like his master, Atef is contemptuous of American leaders and military power. "They are only human beings whose power has been exaggerated because of their huge media and the control they exert over the world's media," he told an Arab journalist in 1999. It was he who guided the bombers who blew up the American embassies in Kenya and Tanzania in 1998, killing 224 people and injuring thousands more. Evidence presented during the trial of the bombers showed Atef had held meetings with the conspirators in Peshawar, northern Pakistan, and kept in touch with them by satellite phone. The ghostly trails of other electronic communications are coming back to haunt him. Last week sources at both MI6 and the CIA independently revealed to The Sunday Times that "technical intelligence" - believed to be intercepted telephone conversations and electronic bank transfers - implicated Atef in the suicide jet attacks on the World Trade Center and the Pentagon. The information comes after a 21-page dossier released by the British government last week was coy about its key points, accusing Bin Laden of being responsible for the attacks. "Since September 11," it stated, "we have learnt that one of Bin Laden's closest and most senior associates was responsible for the detailed planning of the attacks." That man, intelligence sources say, is Atef. If so, it is one of the vital "missing links" that ties Bin Laden and his network to the attacks. Osama Bin Laden, with his closest aide Ayman al-Zawahiri, right, who masterminded the US attacks The British government's dossier was oblique about another plank of the case against Bin Laden. "There is evidence of a very specific nature relating to the guilt of Bin Laden and his associates that is too sensitive to release," it stated. Nobody except those who have seen the security reports can be sure what this evidence is. But one possibility emerged last week: an informed Whitehall source revealed that, among the proof collected, were intercepted exchanges between Bin Laden and his lieutenants, made shortly before September 11. Two are of overriding significance. In one exchange, Bin Laden is said to have contacted an associate thought to be in Pakistan. The conversation referred to an incident that would take place in America on, or around, September 11 and discussed possible repercussions. In a separate instance Bin Laden contacted another associate, thought to have been in Afghanistan. They discussed the scale and effect of a forthcoming operation; Bin Laden praised his colleague for his part in the planning. Neither communication specifically mentioned the World Trade Center or the Pentagon - Bin Laden would never be so careless. Rather, it is the timing, context and nature of the exchanges, according to the intelligence source, that make it clear Bin Laden was discussing the suicide attacks. The problem for Tony Blair, as he sought to press the case against Bin Laden last week, was that the information is sensitive in more ways than one. First, releasing full details could compromise the source or method of the intercepts. Second, elements of the evidence were obtained not by British or US intelligence, but by a Middle Eastern country whose identity is not revealed for security reasons. Whatever the source, the evidence is mounting. In a further development yesterday the German magazine Der Spiegel claimed that the FBI had obtained a video of talks between two of the hijackers and a man said to be Bin Laden's chief bodyguard. The trail that leads from the wreckage of ground zero in Manhattan to Bin Laden and his bases in Afghanistan is becoming clearer by the day. At the US National Security Agency, the most secretive and powerful such service in the world, supercomputers hum around the clock, hoping to intercept or identify other communications between the hijackers or their commanders. Suspects' names, key words, phone numbers, e-mail addresses - all are noted and coded into "watch lists", then fed into the system. The massively powerful data-crunchers are part of the Echelon surveillance system that links with similar computers at Britain's GCHQ in Cheltenham. It sifts billions of bits of information, quietly siphoned off from the satellites that transmit electronic communications. When a match occurs, it is automatically logged. There are language difficulties and some material must be scrutinised by old-fashioned methods; it relies, too, on the watch lists being accurate. But at its best, officers need only to tap in a code to find out what has been intercepted relating to a specific subject or person. Up on the 11th floor of the FBI headquarters in Pennsylvania Avenue, Washington, other experts are also intent on their screens. This is the hub of the FBI's computer forensics team. As the world's biggest manhunt drives on, more than 50 specialists have been drafted in from other government agencies to help sift through the electronic trail that investigators believe may hold the firmest clues as to the planning and command structure of the terrorist attacks. From public libraries, internet companies, banks and credit-card firms, FBI agents are gathering records and e-mails. Some messages, in a mixture of English, Arabic and Urdu, have yielded "operational details" of the attack, according to one report. Other items are tantalising but obscure: a notice retrieved from a Yahoo! financial discussion board was posted at 6.59pm on the day before the attacks. It read: "to the deapest part called the center of the earth by this wekend north east region will be destroyed new providance soon to fall apart [sic]". More importantly, internet service providers can be used to track activity on individual accounts, even if they have registered anonymously. This, however, also has its flaws. Although some suspects are known to have used the net to buy airline tickets, or to study the use of crop-dusting planes for chemical attack, the most sensitive communications may have been in code, encrypted in pornography and other material, making the hunt for such information even harder. Last week, though, investigators had a breakthrough: in France, detectives unearthed in the apartment of another terror suspect, Kamel Daoudi, an Arabic notebook that some believe may be an Al-Qaeda codebook. Daoudi, a computer student, is suspected of plotting bomb attacks on Nato headquarters and the American embassy in Paris. The "codebook", still under examination, may have been used to hide messages in the welter of internet traffic, using a technique known as steganography. Electronic photographs and music files consist of thousands of "bits" of data in which secret information can be concealed. To the casual observer or listener, nothing is noticeable. Only if you know where to look is it easy to find the message. Nevertheless, through the blizzard of information and false leads, investigators are piecing together a picture of the last days of the hijackers. Somewhere in their seemingly mundane routine of takeaway meals and cheap motels may lie the link that will not only bolster the case against Bin Laden but also help prevent other atrocities that many security advisers believe are imminent. WHILE a clearer picture of all four hijacking teams is emerging, it is the background, travel plans and lifestyle of Mohammed Atta - the oldest hijacker, and believed to be the ringleader - that are still yielding the best evidence. As well as discovering instructions for the last days before the attack, a will, maps, and aircraft training manuals in Atta's luggage (which failed to make his connecting flight out of Boston airport), investigators are now believed to have found records of travel and financial transactions that show Atta was in Afghanistan in 1999, establishing another link to Bin Laden. According to reports in America yesterday, the CIA has acquired evidence that Atta met senior Al-Qaeda figures, including Ayman al-Zawahiri, leader of the Egyptian Islamic Jihad and one of Bin Laden's closest allies. After his visit to Afghanistan, Atta reported his passport stolen, perhaps to cover his tracks. So, too, did another of the hijackers, Marwan al-Shehhi. In another intriguing twist, it has been discovered that in early 2000 Atta travelled to Prague, where he met an Iraqi intelligence officer. Czech government sources yesterday named him as Ahmed al-Ani, a former consul at the Iraqi embassy. Soon afterwards Atta and al-Shehhi entered America and, in July, started pilot training in Florida. In February 2001 they rented a small plane and Atta made inquiries about crop dusters. Over the summer he and other suspects made several trips to Las Vegas, staying in cheap hotels and meeting in internet cafes and pizza restaurants. The gambling mecca was ideal cover for a group of Islamic terrorists to meet inconspicuously. They played their parts, even frequenting a strip club called the Olympic Bar, according to FBI reports. Atta and al-Shehhi, and two other suspected hijackers, then checked into the same hotel in Deerfeld Beach, Florida. They all bought tickets for American Airlines. The time was drawing near. By September 8 Atta was in Laurel, Maryland, where he went into a grocery store and wired $2,000 (£1,350) to the United Arab Emirates (UAE). Then he did the same from an outlet called Mail Box Etc. Separately, three other suspected hijackers were also wiring money - $5,000 each - to the UAE. On September 10 Atta and one of the others, Abdulaziz al-Omari, drove a rented Nissan to Portland, Maine. It was the last evening of their lives. The next day Atta, al-Omari and their two accomplices were all on AA flight 11, the first plane to crash into the World Trade Center. At almost the same time, according to Federal investigators, the man who had collected the money wired to the UAE left on a flight for Karachi, Pakistan. Who was he? Why did he leave? His name is thought be Mustafa Ahmad. Intelligence agencies have files on him with links to Bin Laden that go back a decade or more. He is believed to be the paymaster who ran the finances of the suicide attacks. Together with Atef, he is emerging as a key middleman between the doctrine of Bin Laden and the frontline activities of the hijackers. AT THE Capitol buildings in Washington last week officials from the FBI, CIA and Defence Intelligence Agency were briefing members of Congress. They had "new information" that indicated further attacks were highly likely, especially if America strikes at Afghanistan.To this end, the US has been contacting security services across the world in an effort to identify and locate any accomplices or associates of the hijackers. At the heart of this global manhunt is a new list, drawn up by the FBI, of 370 suspects and vital witnesses. Obtained by The Sunday Times, after inadvertently appearing on a Finnish government website, the list details nationalities, aliases, phone numbers and e-mail accounts, and paints a far broader picture of the extent and progress of the manhunt than has been publicly revealed. Some entries offer tantalising leads: one Saudi Arabian from Jeddah who appears on the list used the e-mail address lastday11@h.... It is not clear whether the account was registered before or after September 11. Those identified originate from 30 countries, with 53 coming from Saudi Arabia, five from Egypt, four from Syria, four from Lebanon, four from Morocco, four from Kuwait, three from France, and two from Germany. Some have British connections. Djamel Beghal was arrested earlier this year in Dubai and is said to have confessed to taking orders from Bin Laden to bomb the American embassy in France. The new list details how he once lived in a three-bedroom house in Rose Street, Leicester. Neighbours said Beghal and his family had quit in a hurry a year ago, leaving washing on the line. Another notable name on the list is that of Lotfi Raissi, an Algerian pilot, who was first tracked down and interviewed by The Sunday Times in Colnbrook, Berkshire, a fortnight ago. After being arrested by armed police, he has been accused of being a leading trainer of the hijackers and is fighting extradition. Zacarias Moussaoui, the suspected 20th hijacker and another entry on the FBI's list, currently under arrest in America, also had strong links to Britain. It now seems clear he regularly attended an Islamic prayer group in London that, until last year, met at the Four Feathers youth club near Baker Street. The group was led by an extremist cleric called Omar Mahmood Abu Omar, better known under his alias of Abu Qatada. A political refugee in Britain since 1993, Qatada, 40, has twice been convicted for his role in terrorist acts in Jordan. He was arrested in February, with nine other men, during Operation Odin, a Scotland Yard investigation into a suspected Islamic terrorist cell in London. Qatada, now free, still lives in London, to the consternation of the French security services, which are alarmed at the ease with which extremist cells have been able to develop in the capital. As America and Britain marshal their forces around Afghanistan, the hunt goes on for cells still lying low, not helped by an embarrassing admission from police in Hamburg, who said yesterday that one of their key suspects, known only as Mohammed B, was prematurely released and is now missing. Will there be more attacks? Where will they occur? Nobody can be sure but, as a senior German intelligence officer said last week: "If one looks at how Al-Qaeda has responded to other attacks, it has carefully observed the weak points of each country. The wrong people do not make certain phone calls. Britain is a better place to operate than Germany, and to lose one's identity. It's much easier to travel. "All the clues lead to London. All the roads lead to London. You find every faction of the Islamic fundamentalists in London." From: Date: Thu Oct 5, 2000 9:45am Subject: Re: Wavecom source In a message dated 10/5/00 11:18:44 AM Pacific Daylight Time, jmatk@tscm.com writes: << You can buy an entire system at Radio Shack for under a hundred bucks> < major snip > > Please provide the same type info for the transmitter. 1653 From: James M. Atkinson, Comm-Eng Date: Thu Oct 5, 2000 2:01pm Subject: Re: Wavecom source At 2:45 PM -0400 10/5/00, MACCFound@a... wrote: >In a message dated 10/5/00 11:18:44 AM Pacific Daylight Time, jmatk@tscm.com >writes: > ><< You can buy an entire system at Radio Shack for under a hundred > bucks> < major snip > actually > video waveform. >> > >Please provide the same type info for the transmitter. Similar modification except the ten turn pot is installed between the pin 9 trace on the slide switch and C34 (then cut the trace at the switch or remove the switch) Output power may be increased by bridging/removing R28/R22 and adjusting biasing of Q2. Also you would need to remove the tank coils and caps next to them that make up the LC filter (and bridge the cap gaps with foil) -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1654 From: Date: Thu Oct 5, 2000 0:20pm Subject: Re: Wavecom source In a message dated 10/5/00 12:16:40 PM Pacific Daylight Time, jmatk@tscm.com writes: << info for the transmitter. >> thank you. 1655 From: Guy Urbina Date: Thu Oct 5, 2000 0:10pm Subject: RE: CCD detection -----Original Message----- From: Miguel Puchol [mailto:mpuchol@w...] Sent: Tuesday, October 03, 2000 4:34 PM To: TSCM-L@egroups.com Subject: RE: [TSCM-L] CCD detection Andy, > 3. I hit a reflective surface and smell burning. > > Do you get a white cane with this system? >Agreed. Besides, I think the comment regarding surface to cover and time to >do so is valid. A laser is basically an extremely coherent beam of light, >and a very narrow one unless large generator elements (solid or gas) are >used, in which case wide beams can be achieved, but never a device like the >one that appears on the picture. >This means that only a small spot of a wall's surface can be covered at a >time, so to hit a pinhole camera with it I think you'd be getting lucky. You >would need a very steady hand and a very precise sweep pattern to make sure >a whole wall is covered, and so I think that a visual inspection is less >time consuming - and less expensive. If I may speculate here... I believe, (correct me if I'm wrong) it would seem to me that the beam is scanned.....perhaps using a vibrating mirror in the optics section. This would give you a line scan on the wall, which would give you a horizontal or vertical scan depending on which way you hold the device. It seems in this fashion, you could sweep quite easily over a blank wall. I presume, as you scan a wall, the reflected beam back to the detector as compared to a reflected beam from the optics of a hidden CCD, trigger some sort of "threshhold" or "signature" warranting it as a covert CCD threat. >I still believe that one's "Standard Issue Mark IV EyeBalls" are as good as >many other instruments, and should be used more frequently than sometimes >are. So, going around burning them up with laser beams may not be such a >good idea after all... true, but anything that can help the TSCM'ers job a little easier and less time intensive is good as well....but I do agree it's good to be skeptical with all the "cheese" spygear proliferating on the net. lasers, being very inefficient as they are...have a long way to go before you can start "burning" with them in a miniature handheld size. -Guy 1656 From: David Alexander Date: Thu Oct 5, 2000 3:59am Subject: RE: Shayler suspects TV repair man of bugging his home David Shayler is an ex MI5 analyst who claims that MI6 were part of a plot to assassinate Col. Gaddafi of Libya. He hasn't claimed to have been part of the conspiracy himself, far from it, it wasn't even his agency (which is responsible for counter-terrorism inside the UK) he's the one who now faces prosecution for alleged breaches of the UK Official Secrets act. For the record, HMG says his claims are a tissue of lies. David Alexander Project Manager & Information Security Consultant Qualified BS7799 Lead Auditor Triskele Ltd. Office 01491 833280 Mobile 0780 308 3130 -----Original Message----- From: Talisker [mailto:Talisker@n...] Sent: 04 October 2000 20:40 To: TSCM-L@egroups.com Subject: Re: [TSCM-L] Shayler suspects TV repair man of bugging his home Correct me if I'm wrong, I thought he knew of someone who requested that having someone killed be investigated I realise appearances can be deceptive but he doesn't look like he's capable of killing Andy http://www.networkintrusion.co.uk Talisker's comprehensive IDS & Scanner List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "Robert G. Ferrell" To: Sent: Wednesday, October 04, 2000 3:36 PM Subject: Re: [TSCM-L] Shayler suspects TV repair man of bugging his home > >>I'm sure that Paul Castellano (if he were still alive), > >>of the Gambino crime family would be real happy to > >>learn that you've given him a free Internet amateur > >>mental diagnosis and have deemed him psychologically > >>unstable because he thinks the FBI bugged his house > > No, I personally would deem him "psychologically unstable" > because he murdered people for a living. > > >The guy who claims the CIA is reading his mail, MI5 has him tracked, > >the NSA has his phones tapped, and the FBI is videotaping him in the > >toilet probably needs some help (not involving TSCM gear). > > In my experience this sort of claim is based mostly on megalomania. > People who report being monitored by various agencies almost always > turn out to be convinced that they possess some secret knowledge or > have discovered evidence of some vast conspiracy that only they are > wise enough to perceive. Why else would everyone be out to get them? > > Cheers, > > RGF > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 1657 From: A Grudko Date: Fri Oct 6, 2000 3:24am Subject: Re: Nonlinear Junction Detector FS ----- Original Message ----- > Often a true word spoken in jest - I always take a rubber mallet with me on > the job, when I get a good strong signal in one of those awkward places, > like inside a wall, I give the object a reasonable whack with the mallet, if > the reading fluctuates then it is probably a false positive like a few > staples, more often than not the reading goes altogether One of my favourite search tools is a $10 hardwear store type metal detector. With practice you can get the 'feel' of the shape of a buried metal object, like those darn studs, especially if you have one with adjustable gain. Andy Johannesburg 1658 From: James M. Atkinson, Comm-Eng Date: Fri Oct 6, 2000 0:05pm Subject: You Know Your in Texas When You Know Your in Texas When - You no longer associate bridges (or rivers) with water... You can say 110 degrees without fainting... You eat hot chilis to cool your mouth off... You can make instant sun tea... You learn that a seat belt makes a pretty good branding iron... The temperature drops below 95, you feel a bit chilly... You discover that in July, it takes only 2 fingers to drive your car... You discover that you can get a sunburn through your car window... You notice the best parking place is determined by shade instead of distance... Hot water now comes out of both taps... It's noon in July, kids are on summer vacation, and not one person is out on the streets... You actually burn your hand opening the car door... You break a sweat the instant you step outside...at 7:30 a.m. before work... No one would dream of putting vinyl upholstery in a car or not having air conditioning... Your biggest bicycle wreck fear is, "What if I get knocked out and end up lying on the pavement and cook to death"?... You realize that asphalt has a liquid state... It's so hot in Texas... The birds have to use pot holders to pull worms out of the ground. The potatoes cook underground and all you have to do to have lunch is to pull one out and add butter, salt and pepper. Farmers are feeding their chickens crushed ice to keep them from laying hard boiled eggs. It's so dry in Texas... The cows are giving evaporated milk and the trees are whistling' for the dogs. A sad Texan once prayed, "I wish it would rain--not so much for me, 'cuz I've seen it--but for my 7-year-old." ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1659 From: Robert G. Ferrell Date: Fri Oct 6, 2000 0:57pm Subject: Re: You Know Your in Texas When >You Know Your in Texas When - Truer words were never written. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 1660 From: Date: Fri Oct 6, 2000 10:16am Subject: RE Wavecom source Greetings, I have found a company that sells the wavecom units already broken down. I have not purchased anything from them but the company was recommended to me. The company is MATCO, http://www.mat-co.com/ There price on a receiver alone was about $60.00. They also sell the transmitters and other useful accessories, 1 watt power booster, ect. I also believe I saw a closeout catalog for a company called Electronic Goldmine. They had the wavecom receiver as a closeout for only about $10.00. They didn't guarantee it would work, but for that price you could buy several. I cannot find the specific catalog but here is there web site. http://wwwgoldmine-elec.com/ Hope that this helps. Steve Wisenburg Wiseguy P.I. 1661 From: Talisker Date: Fri Oct 6, 2000 4:59am Subject: Re: Cheap Top Tips was NLJD Andy > One of my favourite search tools is a $10 hardwear store type metal > detector. With practice you can get the 'feel' of the shape of a buried > metal object, like those darn studs, especially if you have one with > adjustable gain. Funny old thing I have one too and find it very usefull, I went for the £17 version that detects: Wall depth, designed for finding support batons behind skinned walls, it gives you a picture of what you can't see. Electricity, designed to detect cables so you don't drill through them, again it gives me an idea of how they are routing their electrics without demolition. Metal, as you mentioned. Also my trusty Leatherman head-light and crystal ball Andy http://www.networkintrusion.co.uk Talisker's comprehensive IDS & Scanner List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "A Grudko" To: Sent: Friday, October 06, 2000 9:24 AM Subject: Re: [TSCM-L] Nonlinear Junction Detector FS > ----- Original Message ----- > > Often a true word spoken in jest - I always take a rubber mallet with me > on > > the job, when I get a good strong signal in one of those awkward places, > > like inside a wall, I give the object a reasonable whack with the mallet, > if > > the reading fluctuates then it is probably a false positive like a few > > staples, more often than not the reading goes altogether > > One of my favourite search tools is a $10 hardwear store type metal > detector. With practice you can get the 'feel' of the shape of a buried > metal object, like those darn studs, especially if you have one with > adjustable gain. > > Andy > Johannesburg > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1662 From: A Grudko Date: Fri Oct 6, 2000 2:32pm Subject: Re: What to do before TSCMers arrive ----- Original Message ----- From: Jay Coote > Depending on the situation, one thing your client can do is give false information, or information which would aid in revealing the eavesdropper. Disinformation - a wonderful TSCM tool and fun to do if you have that kind of personality. Andy Jo'burg 1663 From: Gordon Mitchell Date: Sat Oct 7, 2000 0:39am Subject: Spy finder, et al. This list had some recent discussions about finding cameras using retroreflective techniques. For those who haven't used the Spy Finder ($3K from David Cremer, SEA, (505) 546-2833) it is really interesting. As one who has spent some time watching folks design stuff like this I can say that SEA has taken care of things that the rest of us hadn't even thought of. I find it a very useful tool. The device uses 2 630 nanometer diode lasers. One is on the line of sight and has a low duty cycle. It causes a blink to be seen from a retroreflector or properly aligned mirror. The 2nd laser is off the optical axis a bit and does not. The 2nd laser is used as a fill; it is on when the 1st one is off. This means that there is roughly uniform illumination on the target. It's a clever idea because it removes the distracting blinking of common things like doorknobs. This retroreflector stuff works because imagers (with film, CCDs, CIDs, retinas,...) cause incident light to be scattered from the image plane. All of that scattered light that strikes the lens exit aperture is directed back to the source (your eye behind the Spy Finder). It's easy to see how this works but more difficult to build an instrument that really does the work. My own attempts to make this sort of device yielded OK detection of overt TV cameras -- but didn't see the common pinhole variety. The Spy Finder works acceptably even on small lens, wide field-of-view cameras. This camera configuration typically has an entrance aperture that is less than 1 mm in diameter. An interesting aspect of our work is the difficulty of letting clients appreciate the technical work that we do. Even though they don't usually understand the physics of the Spy Finder, most clients instantly appreciate it after a demo. It helps them feel good because they can actually see what is being done. It's not quite as valuable a marketing tool as a portable x-ray machine, but close. Gordon Mitchell Future Focus, Inc Woodinville, WA (888) BUG-KILR Electronic eavesdropping detection & finding clues in computers. 1664 From: Miguel Puchol Date: Sat Oct 7, 2000 4:07am Subject: RE: Spy finder, et al. Hi Gordon, Thanks for the information, it clears things up! I have just one question: How do you cover a whole wall? Does it have a mirror that turns the beam into a barcode-reader-like pattern? It's just that some questions have been asked regarding the time it would take to scan a wall, or a medium-sized room. All the best, Mike > -----Mensaje original----- > De: Gordon Mitchell [mailto:gordonm@b...] > Enviado el: sabado, 07 de octubre de 2000 7:40 > Para: TSCM listserv > Asunto: [TSCM-L] Spy finder, et al. > > > This list had some recent discussions about finding cameras using > retroreflective techniques. > > For those who haven't used the Spy Finder ($3K from David Cremer, > SEA, (505) 546-2833) it is really interesting. As one who has > spent some time watching folks design stuff like this I can say > that SEA has taken care of things that the rest of us hadn't even > thought of. I find it a very useful tool. > > The device uses 2 630 nanometer diode lasers. One is on the line > of sight and has a low duty cycle. It causes a blink to be seen > from a retroreflector or properly aligned mirror. The 2nd laser > is off the optical axis a bit and does not. The 2nd laser is > used as a fill; it is on when the 1st one is off. This means > that there is roughly uniform illumination on the target. It's a > clever idea because it removes the distracting blinking of common > things like doorknobs. > > This retroreflector stuff works because imagers (with film, CCDs, > CIDs, retinas,...) cause incident light to be scattered from the > image plane. All of that scattered light that strikes the lens > exit aperture is directed back to the source (your eye behind the > Spy Finder). It's easy to see how this works but more difficult > to build an instrument that really does the work. > > My own attempts to make this sort of device yielded OK detection > of overt TV cameras -- but didn't see the common pinhole variety. > The Spy Finder works acceptably even on small lens, wide > field-of-view cameras. This camera configuration typically has > an entrance aperture that is less than 1 mm in diameter. > > An interesting aspect of our work is the difficulty of letting > clients appreciate the technical work that we do. Even though > they don't usually understand the physics of the Spy Finder, most > clients instantly appreciate it after a demo. It helps them feel > good because they can actually see what is being done. It's not > quite as valuable a marketing tool as a portable x-ray machine, but close. > > Gordon Mitchell > Future Focus, Inc > Woodinville, WA > (888) BUG-KILR > > Electronic eavesdropping detection & finding clues in computers. > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1665 From: A Grudko Date: Sat Oct 7, 2000 4:08am Subject: Cheap Top Tips ----- Original Message ----- From: Talisker > Funny old thing I have one too and find it very usefull, I went for the £17 > version that detects: > Electricity, designed to detect cables so you don't drill through them, > again it gives me an idea of how they are routing their electrics without > demolition. Pounds? God God, there are TSCM'ers in the UK. I thought Blair outlawed you all with handguns (I'm ex-Twickenham Rifle & Pistol Club, ex-Surrey Pistol Club). Anyway, another cheap gadget I have is a tool I have to admit I don't fully understand.....(talk about being open to a sucker punch from the opposition!). Wrap about 40 turns of copper wire round a 30mm dia ferrite ring. Tap off to a metre of 50 ohm coax and seal/secure with epoxy resin in a small box. Other end, plug into an audio amplifier through a suitable high impedance transformer - you want about 50 Megaohms impedance match to the ferrite ring. Now go hunt EMF for under 10 pounds (20 if you want a fancy box). Phones whistle So do tape recorders PCs oscilate (check out the clock pulses) Laptops sing a plethora of EMF according to position (less screening?) Data cables hum I've not really investigated the EMF pickup effect of this system but running the loop over a 100 meg FM bug or a 900 meg cellphone (txing) gives a BIG howl. It only reacts to active electronics but so what? If your couch 'hums' to this simple device you want to know why. Not a NLJD but not the same price. Andy Jo'burg 1666 From: A Grudko Date: Sat Oct 7, 2000 4:35am Subject: Re: Wavecom source ----- Original Message ----- From: James M. Atkinson > Take apart the receiver unit, remove the modulator circuit, and replace > the flat antenna with an REI VBA-2400 antenna or a spiral log periodic. Hold it...What is a spiral LP? I know what an LP is. I know what circular polarisation is. I know what a helical antenna is. Built 'em all. What is a spiral LP? Confused Johannesburg 1667 From: A Grudko Date: Sat Oct 7, 2000 10:56am Subject: Cheap SHF sniffer antenna I once experimented with a piece of double sided PC board, cut into a triangle with a 10 cm base and 20 cm long. Soldered the conductor of a length of 18 awg 75 ohm coax to one side and the shield to the other, at the sharp end as this is basically a log periodic. Epoxied on an old plastic power drill handle to reduce human impedence and plugged it into my SA. Seemed to work well as a near field, nominally directional antenna, about 900 megs up to almost 2 gigs, where my signal source test gear kicks out. Unlike an LNB, no drive voltage required. Cheap, simple and works within limitations. PS Next time you're at the dentist, ask for an old angled mirror - great for cavity (excuse the pun) inspection. They throw them away frequently. Tape on a micro, 1 cell mag light and you have a genuine search tool. Andy G Jo'burg 1668 From: Jay Coote Date: Sat Oct 7, 2000 7:58pm Subject: Re: Cheap Top Tips Andy and the List; Good idea, Andy. I've used a low cost (no snickering!) Amateur kit audio amplifier from Ten-Tec. Change the case to what you want, isolate the inputs, and the amp is pretty hot. (Runs fine on 9V batteries- you won't need a stack of AA batts for 12V) I've used mine to test conductors and equipment for audio, but I'll have to try Andy's trick with the ferrite toroid, or perhaps a loopstick or air-wound loop. I've also found that some telephone craft "inductive" tone probes will pick up similar hums and buzzes... but the high-Z audio amp will be a lot hotter. Jay Coote Los Angeles ---------- > ----- Original Message ----- > From: Talisker > > Funny old thing I have one too and find it very usefull, I went for the > £17 > > version that detects: > > Electricity, designed to detect cables so you don't drill through them, > > again it gives me an idea of how they are routing their electrics without > > demolition. > > Pounds? God God, there are TSCM'ers in the UK. I thought Blair outlawed you > all with handguns (I'm ex-Twickenham Rifle & Pistol Club, ex-Surrey Pistol > Club). > > Anyway, another cheap gadget I have is a tool I have to admit I don't fully > understand.....(talk about being open to a sucker punch from the > opposition!). > > Wrap about 40 turns of copper wire round a 30mm dia ferrite ring. Tap off to > a metre of 50 ohm coax and seal/secure with epoxy resin in a small box. > > Other end, plug into an audio amplifier through a suitable high impedance > transformer - you want about 50 Megaohms impedance match to the ferrite > ring. Now go hunt EMF for under 10 pounds (20 if you want a fancy box). > > Phones whistle > So do tape recorders > PCs oscilate (check out the clock pulses) > Laptops sing a plethora of EMF according to position (less screening?) > Data cables hum > > I've not really investigated the EMF pickup effect of this system but > running the loop over a 100 meg FM bug or a 900 meg cellphone (txing) gives > a BIG howl. It only reacts to active electronics but so what? If your couch > 'hums' to this simple device you want to know why. > > Not a NLJD but not the same price. > > Andy > Jo'burg > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1669 From: Steve Uhrig Date: Sun Oct 8, 2000 9:57am Subject: Super accurate clocks Hi all, Wanted to share a good deal I found recently on a useful item. This gentleman: jam@c... Joe Matyas, is selling large digital wall clocks/calendar/temperature, with an internal radio receiver which locks to WWVB on 60 kilocycles. The digits are big and bold and 2 inches high, so you can see them from across the room without your glasses. The month, date and day also are displayed full time also (no switching between time and date which I do not care for) so you don't have to squint at a calendar every time you write a check. The internal receiver and antenna periodically locks onto the signal transmitted from WWVB in Boulder, Colorado. This is a precision timing signal transmitter by NIST (National Institute of Standards and Technology). The clock automatically locks onto their atomic timing and is accurate to a millisecond or so. This means you always have the perfect time. The clock adjusts for 12/24 hour time, your local time zone and whether or not your area uses Daylight Savings Time (not all of the U.S. does). The WWVB signal apparently is sufficiently strong to cover the entire U.S. easily. I am on the East Coast about as far as you can be from Colorado, and this one locked up fine. It is on the wall in a one story wooden building in a valley. WWVB raises its power substantially between 0000 and 0300 (their time I imagine), so the clock automatically looks during that window as well as several other times during the day. You also can push a button and have it start searching. You get a visual indication when the receiver is hunting and another one when it locks on. It also shows room temperature in degrees F which is nice. The entire thing is aluminum about ten inches square with half that area being the LCD display. It's a nice clock independent of the atonic time. My wife teases me because I am anal about time. If we take a power hit, I used to dial up WWV on 5, 10 or 15 megacycles, set my watch to them, then set like 30 clocks, VCRs, microwave etc. in the house to my watch. Everything needs to agree. She's happy with +/- a few minutes. Not me. Now I can set everything to this clock which is independent of mains power since it runs from 2xAA cells. I also learned that telephone time is off by 30 seconds. All these years I have been running my life 30 seconds off. Amazing I pulled through. If anyone wants a decent super accurate clock for themselves or a gift, contact the fellow above. He charges $46.50 shipped Priority Mail to 50 states. I would not recommend this for use outside the U.S. because of radio coverage plus it is set for U.S. offsets from GMT only (it reads GMT from WWVB and calculates your local time according to switches you set for your U.S. time zone). Not TSCM related, but a neat tool. I am not related to the seller, just a satisfied customer. Looking forward to getting together next week with others traveling to McLean. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1670 From: Gordon Mitchell Date: Sun Oct 8, 2000 8:44pm Subject: Re: Spy finder, et al. My average for an office wall is about a minute. The scanning uses an especially well designed vertical axis hinge which is located between your shoulders and head. Miguel Puchol wrote: > > Hi Gordon, > > Thanks for the information, it clears things up! > I have just one question: How do you cover a whole wall? Does it have a > mirror that turns the beam into a barcode-reader-like pattern? It's just > that some questions have been asked regarding the time it would take to scan > a wall, or a medium-sized room. > > All the best, > > Mike > > > -----Mensaje original----- > > De: Gordon Mitchell [mailto:gordonm@b...] > > Enviado el: sabado, 07 de octubre de 2000 7:40 > > Para: TSCM listserv > > Asunto: [TSCM-L] Spy finder, et al. > > > > > > This list had some recent discussions about finding cameras using > > retroreflective techniques. > > > > For those who haven't used the Spy Finder ($3K from David Cremer, > > SEA, (505) 546-2833) it is really interesting. As one who has > > spent some time watching folks design stuff like this I can say > > that SEA has taken care of things that the rest of us hadn't even > > thought of. I find it a very useful tool. > > > > The device uses 2 630 nanometer diode lasers. One is on the line > > of sight and has a low duty cycle. It causes a blink to be seen > > from a retroreflector or properly aligned mirror. The 2nd laser > > is off the optical axis a bit and does not. The 2nd laser is > > used as a fill; it is on when the 1st one is off. This means > > that there is roughly uniform illumination on the target. It's a > > clever idea because it removes the distracting blinking of common > > things like doorknobs. > > > > This retroreflector stuff works because imagers (with film, CCDs, > > CIDs, retinas,...) cause incident light to be scattered from the > > image plane. All of that scattered light that strikes the lens > > exit aperture is directed back to the source (your eye behind the > > Spy Finder). It's easy to see how this works but more difficult > > to build an instrument that really does the work. > > > > My own attempts to make this sort of device yielded OK detection > > of overt TV cameras -- but didn't see the common pinhole variety. > > The Spy Finder works acceptably even on small lens, wide > > field-of-view cameras. This camera configuration typically has > > an entrance aperture that is less than 1 mm in diameter. > > > > An interesting aspect of our work is the difficulty of letting > > clients appreciate the technical work that we do. Even though > > they don't usually understand the physics of the Spy Finder, most > > clients instantly appreciate it after a demo. It helps them feel > > good because they can actually see what is being done. It's not > > quite as valuable a marketing tool as a portable x-ray machine, but close. > > > > Gordon Mitchell > > Future Focus, Inc > > Woodinville, WA > > (888) BUG-KILR > > > > Electronic eavesdropping detection & finding clues in computers. > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 1671 From: Date: Sun Oct 8, 2000 5:15pm Subject: Re: Spy finder, et al. Hi Gordon, Can I see a demo. Name the city and I'll make arrangements to fly out. This is very interesting to me. Thanks Dan McGraw Cell 612-386-8294 1672 From: James M. Atkinson, Comm-Eng Date: Sun Oct 8, 2000 11:06pm Subject: Re: Wavecom source At 11:35 AM +0200 10/7/00, A Grudko wrote: >----- Original Message ----- >From: James M. Atkinson > > Take apart the receiver unit, remove the modulator circuit, and replace > > the flat antenna with an REI VBA-2400 antenna or a spiral log periodic. > >Hold it...What is a spiral LP? > >I know what an LP is. >I know what circular polarisation is. >I know what a helical antenna is. > >Built 'em all. > >What is a spiral LP? > >Confused >Johannesburg It is a spiral or conical log periodic antenna, and is very common in SIGINT applications. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1673 From: Miguel Puchol Date: Mon Oct 9, 2000 2:58am Subject: RE: Spy finder, et al. Very well put :-)) > The scanning uses an especially well designed vertical axis hinge > which is located between your shoulders and head. Regards, Mike 1674 From: Steve Uhrig Date: Mon Oct 9, 2000 7:21am Subject: Further on atomic clock I just learned the seller has set up a webpage with info on the atomic clock I recommended: http://cboss.com/jam/aa-clock.htm Worth checking out. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1675 From: Date: Mon Oct 9, 2000 6:21am Subject: *TELEPHONE PROBLEM-INTERESTING* REPOSTED I recently received this (attached below) as a complaint and, while I have some basic ideas, I am interested in feedback from experts (or even thoughts from those who have more of a clue ) in advanced telephony technologies in the community.. Thanks. Officer Thor Lundberg Computer Crimes Investigator Computer Forensic Specialist Raynham Massachusetts Police Department phone: 508-824-2716 voice: 508-824-2756 x76 Cybersnitch Webmaster Technology Security Specialist email: webmaster@c... epage: page_thor@c... (urgents and greetings accepted) CYBERSNITCH Law enforcement for the Internet http://www.cybersnitch.net/ TUCOFS - The Ultimate Collection of Forensic Software A complete resource for computer forensics and cyber investigations http://www.cybersnitch.net/tucofs/ THE SCHOOL VIOLENCE WATCH NETWORK Helping to keep schools a safe place to learn http://www.cybersnitch.net/schoolviolencewatch.htm --------------- (attached message) To whom it may concern; There is someone systematicaly blocking in-comming calls. old customers, Friends, etc. are able to get through but no new busness calls. This has been going on for a year. I have had the phone co. check my lines twice & each time as the check begins my phone returns to normal than goes dead again when the check is complete. The police can't help unless the phone co. finds something and Im unable to come up with any proof. Getting someone to monitor my phone activity while my phone is and is not being checked seems to be out of the question. I have a 261 business number that I had remote call forwarded to my residence when I moved so the 261 number has no physical address I have tried having a trap placed on my residence phone and my 261 number forwarded to an answering service and to my cell phone but nothing works. it seems to narrow down to somone ( and I know who) must be Phreaking my 261 number through the phone co. computer. I've been stuck with this business number because it's conected to the yellow pages, but I'm now thinking of using direct mail and a new and secret phone number. I would like to stop her by catching her but right now I would settle for understanding how to protect myself perhaps by knowing what can and cannot be done by Phreakers, such as can cell phones be Phreaked? How much trouble is it for a Phreaker to zero in on a new phone number? Etc. Any help you can offer would be deeply appreciated. I would be happy to make a contribution to your organization if you can help me resolve this problem. Desperate. 1676 From: A Grudko Date: Mon Oct 9, 2000 1:25pm Subject: Re: Wavecom source Original Message ----- > > It is a spiral or conical log periodic antenna, and is very common in SIGINT applications. OK, I can see the shape in my mind's eye, like a circular polarisation antenna but with reducing diameters. But... As a 'coil' radiator it must have low Q, probable unity gain & roughly bidirectional. LP formula determines length? Cross (reverse?) polarisation loss up to 24 db? What is the reflector? I'd guess a grid/mesh 1/2 wave dia. of lowest frequency with an apature below 1/8wave L (sorry, don't know where the lambda symbol is on my keyboard) of highest frequency. If I'm wrong shoot me down - I'm here to learn. My SHF SA came with a plus/minus 400- 1200 mhz fundamental (flat) LP antenna, no gain and about as directional as a '56 Chevy on old shocks. The SHF & kit is really bulky/heavy. I can see where .jma gets his 2 tons of equipment/trailer/van from. Andy Grudko (CEO) - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), SAIS, UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1677 From: A Grudko Date: Mon Oct 9, 2000 4:16pm Subject: Re: Wavecom mods Jay Coote wrote: > > > >I am looking for a low-cost source for Wavecom receivers. > > > >My intention is to remove a receiver from it's chassis, add a tuning pot and > > > >mount it in a chassis which is more suited for TSCM. *** OK same here, we have a Mains/12volt video monitor chassis together with an enclosure on the side about 25 mm deep which can be used to house an assortment of tuners and sweep circuits switchable from video to SA use with in line 800- 2100 MHz 20 dB pre amp to 2 El Ant all powered from a 12 volt Lead gel pack . Picture available on request. > > > You can buy an entire system at Radio Shack for under a hundred > > > bucks, but make sure it's their new model with the slide switch. Take > > > apart the receiver unit, remove the modulator circuit, and replace > > > the flat antenna with an REI VBA-2400 antenna or a spiral log > > > periodic. > *** supplied with a flat antenna as well.... hmmmm I have available on request a pic of the 2 El yagi antenna. It has a novel wide bandwidth feed. The inner from the N connx, terminated at the top of the front element. The rear elements are fed from the slot, cut back from the top it measures 62 mm across the front element 67mm across the rear one, 24 mm spacing between them, 25mm from the bulkhead all made from brass. Brazed and dull chrome plated > > > If you are feeling inspired you can bypass the SMT L.C. filter circuits > > > just prior to the tuner chip, *** Interesting mod. Do you mean the synthesiser chip, the video FM detector or physically next to this chip? > > > and ALSO bypass the IF filter. To do this you will have to cut the tank trace. *** Which tank? The local oscillator, or its link to the main mixer, i.e. the one that is to convert to the 480 MHz first IF ? > > > and physically remove it > > > from the PCB (be sure to get a clean cut). Also remove the cap chips, > > > and bridge the gap with the foil from the tank circuit. While you > > > will get really bad selectivity the FM capture effect will "lock" the > > > unit to any video signals between 1.9 and 2.5 GHz. ***OK, a bit confused about this. My understanding is that the FM capture effect only works when there is a DC signal path from the output of the video demod, fed back via about a 100k resistor via a star network, to the output of the 10 turn tuning pot slider, thus giving a "sloppy" AFC and a moderate amount of capture effect. > > > Insert a BNC connection between C30 and R16 and squirt the IF to a > > > diode detector with 500 MHz bandwidth (the IF after the AGC stages is > > > 480 MHz), and then dump it to a scope (you will see the actually > > > video waveform. *** How? If the signal is FM, and the detector is linear, it should only show the amplitude variations! Unless ..... there is some frequency non linearity somewhere Andy G - confused again Joburg 1678 From: James M. Atkinson, Comm-Eng Date: Mon Oct 9, 2000 4:52pm Subject: Re: Wavecom source Andy, Take a fiberglass cone about 3 foot long, 18 inches in diameter at the large end, and 1/4 point on the other end. Take a piece of sting and "wind it" around the cone in a log config, and repeat so you have two elements nested within each other. Attach a small tag to the element locations were they would normally appear on the linear log (be sure to record element diameter). Now "unwind" the string and lay then on a table. Cut a length of "trace tape" with adhesive slightly longer then the strings, and about one inch wide. Next apply your log periodic formula and cut the width of the tape to match the diameter of the elements you would normally use. Wind the copper tape around the cone in the position the string previously covered, and tweak the position slightly as needed. Next terminate a low loss cable at the tip of the cone with the cable running though the center of the cone and all a small mounting plate into the base (typically an N or SMA connector). Attach a small balun to this connector for a clean match, and drop it down to 50 ohms. Apply this to a LNA built right onto the antenna (30-33 dB is good). As your frequencies drop your antenna with get larger, I have found that a 100 MHz unit is the largest practical for TSCM, but 300 MHz spiral LP's are easy to handle. I have found that you can have one unit from 300 MHz to 1.5 GHz, a second from 1.25 GHz to 2.3 GHz, a third from 2.0 GHz to 2.7 GHz, and a fourth for 2.5 GHz to 18 GHz. The later three units can be attached to the focal point of a spinning dish and used on a mobile platform. -jma At 8:25 PM +0200 10/9/00, A Grudko wrote: >Original Message ----- > > > It is a spiral or conical log periodic antenna, and is very common in >SIGINT applications. > >OK, I can see the shape in my mind's eye, like a circular polarisation >antenna but with reducing diameters. But... > >As a 'coil' radiator it must have low Q, probable unity gain & roughly >bidirectional. >LP formula determines length? >Cross (reverse?) polarisation loss up to 24 db? >What is the reflector? I'd guess a grid/mesh 1/2 wave dia. of lowest >frequency with an apature below 1/8wave L (sorry, don't know where the >lambda symbol is on my keyboard) of highest frequency. > >If I'm wrong shoot me down - I'm here to learn. > >My SHF SA came with a plus/minus 400- 1200 mhz fundamental (flat) LP >antenna, no gain and about as directional as a '56 Chevy on old shocks. The >SHF & kit is really bulky/heavy. I can see where .jma gets his 2 tons of >equipment/trailer/van from. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1679 From: James M. Atkinson, Comm-Eng Date: Mon Oct 9, 2000 5:06pm Subject: Re: Wavecom mods At 11:16 PM +0200 10/9/00, A Grudko wrote: >Jay Coote wrote: > > > > > >I am looking for a low-cost source for Wavecom receivers. > > > > >My intention is to remove a receiver from it's chassis, add a tuning >pot and > > > > >mount it in a chassis which is more suited for TSCM. > > >*** OK same here, we have a Mains/12volt video monitor chassis > together with an enclosure on the side about 25 mm deep > which can be used to house an assortment of tuners > and sweep circuits switchable from video to SA use > with in line 800- 2100 MHz 20 dB pre amp to 2 El Ant > all powered from a 12 volt Lead gel pack . > > Picture available on request. Mount the tuner assembly right to the antenna (which is a small parabolic dish or spiral log). > > > > You can buy an entire system at Radio Shack for under a hundred > > > > bucks, but make sure it's their new model with the slide switch. Take > > > > apart the receiver unit, remove the modulator circuit, and replace > > > > the flat antenna with an REI VBA-2400 antenna or a spiral log > > > > periodic. > > > *** supplied with a flat antenna as well.... hmmmm > > I have available on request a pic of the 2 El yagi antenna. > It has a novel wide bandwidth feed. The inner from the N connx, > terminated at the top of the front element. The rear elements > are fed from the slot, cut back from the top it measures > 62 mm across the front element 67mm across the rear one, > 24 mm spacing between them, 25mm from the bulkhead > all made from brass. Brazed and dull chrome plated If yor in the same room as a 50 MW transmitter you really only need a paper clip antenna to snag the signal (but of course you should use a proper antenna) > > > > If you are feeling inspired you can bypass the SMT L.C. filter >circuits > > > > just prior to the tuner chip, > > *** Interesting mod. Do you mean the synthesiser chip, the video FM >detector or physically next to this chip? No, it is the SMT caps between the HP LNA/INA-03184, and the ADC20013. Actually the mod would be just after the 2.7 nH coil on the 4th pin of the INA and the 4 pF cap on the 6th pin on the ADC. Bypass C14, C13, C12, C11, C10, C9, and remove inductors etched onto PCB that T into the caps. > > > > and ALSO bypass the IF filter. To do this you will have to cut the >tank trace. > > *** Which tank? The local oscillator, or its link > to the main mixer, i.e. the one that is to convert to the 480 MHz first >IF ? L3 and L4 > > > > and physically remove it > > > > from the PCB (be sure to get a clean cut). Also remove the cap chips, > > > > and bridge the gap with the foil from the tank circuit. While you > > > > will get really bad selectivity the FM capture effect will "lock" the > > > > unit to any video signals between 1.9 and 2.5 GHz. > > ***OK, a bit confused about this. My understanding is that the FM > capture effect only works when there is a DC signal path from the > output of the video demod, fed back via about a 100k resistor > via a star network, to the output of the 10 turn tuning pot slider, > thus giving a "sloppy" AFC and a moderate amount of capture effect. > > > > > Insert a BNC connection between C30 and R16 and squirt the IF to a > > > > diode detector with 500 MHz bandwidth (the IF after the AGC stages is > > > > 480 MHz), and then dump it to a scope (you will see the actually > > > > video waveform. > > *** How? If the signal is FM, and the detector is linear, > it should only show the amplitude variations! > Unless ..... there is some frequency non linearity somewhere > >Andy G - confused again >Joburg Slope demod. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1680 From: Andre Holmes <1ach@g...> Date: Tue Oct 10, 2000 5:27pm Subject: BURST BUGS Hi all I regularly see burst bugs using the AVCOM-65C. Whom would the bugs belong to ? I cannot demodulate the signal with the SA why ? [Non-text portions of this message have been removed] 1681 From: James M. Atkinson, Comm-Eng Date: Tue Oct 10, 2000 6:29pm Subject: Re: BURST BUGS At 6:27 PM -0400 10/10/00, Andre Holmes wrote: >Hi all I regularly see burst bugs using the AVCOM-65C. >Whom would the bugs belong to ? >I cannot demodulate the signal with the SA why ? 1) Why do you belive that this is the signal from a burst bug, or other communications device? 2) If it is indeed a "burst bug" the PSA-65C would be virtually worthless in attempting to demodulate it. 3) Use a directional antenna, bandpass filter, and amplifier to locate the source of the signal. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= From: James M. Atkinson Date: Mon Oct 6, 2003 9:08pm Subject: Re: Sweep Charges... In an ideal world you would simply charge the same daily rate that a hospital would charge for an open heart surgeon, plus all equipment costs for the day, etc, etc. I charge appropriate to the threat being addressed, the amount of space being checked, and the logistics involved, but everything boils down to time. I, and many others in the profession actually have more time in training than a surgeon, and some (cough-cough) have more equipment then some of the best equipped operating rooms. My experience is that an entry level TSCM'er addressing low level threats (ie: domestic cases) will need 50-75k in equipment. For low end corporate sweeps I suggest 250-300k minimum, and 350-500k for medium threat sweeps. Higher end corporate sweeps require well over 500k in equipment, and a legitimate government sweep will require well over a million dollars in equipment. Scanlocks are fine for use as a coaster under your coffee cup... they were "State of the Art" 25+ years ago. -jma At 6:11 PM +0100 10/6/03, Ocean Group wrote: >Well, I can't add much directly, but this is what i reckon... > >Take heed I'm taking from the other side of the atlantic, yet I >reckon pricing shouldn't be too different. > >I'll also talk about realistic prices.....I know Steve explained his >motives and that is fair enough. He obviously has a huge wealth of >knowledge, self thought or otherwise, it doesn't matter.....if he >asks 10k for a sweep and the client is happy with the value for >money then it's perfect. > >I know people have asked about JMA's charges.....several tens of >thousands...and asked if he is for real....and simply answered....I >don't know. If someone has super intell agency training and >equipment worth a million quid then I guess he is the guy to hire to >find that 0.0001mw tx based on mars. It really depends on who is >hiring, what the asset is and how much money they have on budget.... > >If some multi national wants to hire a pro that can fight off the >french intell services(pure imaginery example) and they feel that >JMA is the man for the job, because of his experience and successful >references which they should be able to verify, then there should be >no reason to pay the rates asked. I guess what I'm saying is that >its a good idea to be able to back up your requested fee with a >"....and this is why I cost so much....etc etc....." Something that >the likes of Steve can obviously do. > >But otherwise, in Ireland, you can count on one hand the list of >qualified tscm specialists. Actually probably two fingers. > >You can hire a PI with a scanlock for 300-400 euro (for you dollar >users they're pretty much on par....)....and come to think of it, a >friend informed me that a PI in the UK makes a damn good living my >sweeping through lawyer referrals using an old scanlock for 500 >sterling a pop. That's 800 in greenbacks. > >Clearly a complete sham. Anyway...there are dozens of those.... > >Sorry about the long story....but back to the question.... > >In Roger's case the operative word being "per hour". So for a days >work that works out about 1500 a day. Perfectly reasonable if his >skill level matches. One way to ascertain is to ask what kind of >training experience is behind that price request.(*That's not an >invitation to harrass Roger for his resume...!) > >I'd pay that to a tscm specialist. No sweat. If someone offered TSCM >services for less than 1000 a day I'd worry....very much so. > >I'd pay 1500 for someone with the relevant degrees(minimum 1 >bachelor/master) behind them and say two years experience minimum. >Degrees are the usual...elect/Tele/RF/ITS engineering etc. > >After that I'd probably add 250 per year experience. Pure ball park. > >So that would be my estimation..... > >Look forward to hearing any other input on the subject.... > >What do you think about the whole thing JMA? > >Kind regards > >Oisin > > > >Roger says: >I didn't do 2500 sweeps in the past thirty years by charging $10,000 each, >I like to work and the people I sweep for are always interesting, >sophisticated, and fun. >I like to sweep three to five times a week because it keeps me sharp. When >I take a months vacation like I did recently to go watch waves on the West >coast from Cal. to Canada, it took me a few weeks to come up to non >thinking speed again. I do 90% of all sweeps that come in as an inquiry and >I try to keep the rate at at lease $200.00 to $300.00 per hr. >The trick is not to waist time on unnecessary tests and focus on real >practical threats. Sweep lean and mean! >Roger Tolces >Electronic Security >www.bugsweeps.com -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7835 From: Date: Tue Oct 7, 2003 4:59pm Subject: Listening Device Found in Phila. Mayor's Office Listening Device Found in Street's Office By ERIC TUCKER .c The Associated Press PHILADELPHIA (AP) - Police conducting a routine security sweep of Mayor John F. Street's City Hall office found a hidden listening device Tuesday morning, authorities said. Street, who is seeking re-election, quickly sought to reassure city residents that his office was not the subject of an investigation. ``I have done nothing wrong,'' Street said at a news conference. FBI spokesman Linda Vizi said the device was not connected to any campaign espionage, but she refused to say whether Street was being investigated or whether the FBI planted the device. Police said officers inspect the mayor's office every three or four months. Tuesday's discovery comes near the end of a heated mayoral campaign that pits Street against Republican challenger Sam Katz for the second time. Street beat Katz four years ago by less than 10,000 votes in the city of 1.5 million, and polls show a neck-and-neck race again this year. The Katz camp had nothing to do with the device, campaign spokeswoman Maureen Garrity said. In August, someone tossed what might have been an unlit firebomb through the window of a Katz campaign office, and Katz has accused a Street supporter of brandishing a gun and telling Katz and his wife, ``You're going down.'' Supporters of Street, who is black, have accused Katz, who is white, of race baiting. Street said he was confident the device was not placed by law enforcement. ``The question that ultimately will get raised in the minds of some people is who's investigating the mayor's office?'' Street said. ``Well, in response to that question, I want to assure the people of this city that this mayor is not being investigated. I have done nothing wrong.'' 10/07/03 20:58 EDT [Non-text portions of this message have been removed] 7836 From: James M. Atkinson Date: Tue Oct 7, 2003 9:19pm Subject: Re: Listening Device Found in Phila. Mayor's Office Does anybody who found the device? Was it a radiating, wired or hard wired device? Can the FBI detect a fart in an elevator? -jma At 9:59 PM -0400 10/7/03, MACCFound@a... wrote: >Listening Device Found in Street's Office > >By ERIC TUCKER >.c The Associated Press > >PHILADELPHIA (AP) - Police conducting a routine security sweep of Mayor John >F. Street's City Hall office found a hidden listening device Tuesday morning, >authorities said. > >Street, who is seeking re-election, quickly sought to reassure city residents >that his office was not the subject of an investigation. > >``I have done nothing wrong,'' Street said at a news conference. > >FBI spokesman Linda Vizi said the device was not connected to any campaign >espionage, but she refused to say whether Street was being investigated or >whether the FBI planted the device. > >Police said officers inspect the mayor's office every three or four months. > >Tuesday's discovery comes near the end of a heated mayoral campaign that pits >Street against Republican challenger Sam Katz for the second time. Street >beat Katz four years ago by less than 10,000 votes in the city of 1.5 million, >and polls show a neck-and-neck race again this year. > >The Katz camp had nothing to do with the device, campaign spokeswoman Maureen >Garrity said. > >In August, someone tossed what might have been an unlit firebomb through the >window of a Katz campaign office, and Katz has accused a Street supporter of >brandishing a gun and telling Katz and his wife, ``You're going down.'' > >Supporters of Street, who is black, have accused Katz, who is white, of race >baiting. > >Street said he was confident the device was not placed by law enforcement. > >``The question that ultimately will get raised in the minds of some people is >who's investigating the mayor's office?'' Street said. ``Well, in response to >that question, I want to assure the people of this city that this mayor is >not being investigated. I have done nothing wrong.'' > > > >10/07/03 20:58 EDT > > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7837 From: Date: Wed Oct 8, 2003 2:52am Subject: Poll results for TSCM-L The following TSCM-L poll is now closed. Here are the final results: POLL QUESTION: Please indicate how much you think an extremely good TSCM specialist should be charging as a flat daily rate (per person). CHOICES AND RESULTS - Under $500 per day, 1 votes, 4.17% - $500 to $1500, 5 votes, 20.83% - $1500 to $2500, 8 votes, 33.33% - $2500 to $5000, 9 votes, 37.50% - Over $5000 per day, 1 votes, 4.17% For more information about this group, please visit http://groups.yahoo.com/group/TSCM-L For help with Yahoo! Groups, please visit http://help.yahoo.com/help/us/groups/ 7838 From: Raymond Date: Mon Oct 6, 2003 10:58pm Subject: Scanlock James Your comment "Scanlocks are fine for use as a coaster under your coffee cup... they were "State of the Art" 25+ years ago." You obviously not familiar with the products Audiotel have been producing, especially over the last 10 years or so they have improved leaps & bounds. I suggest you start doing your homework, by first looking at their website, http://www.audiotel-international.com/ , then asking practitioners who utilize the equipment. Raymond --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125, South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za SIRA Membership: 199789 SACI Membership: 03 ----- Original Message ----- From: James M. Atkinson To: tscm-l@yahoogroups.com Sent: Tuesday, October 07, 2003 4:08 AM Subject: Re: [TSCM-L] Sweep Charges... In an ideal world you would simply charge the same daily rate that a hospital would charge for an open heart surgeon, plus all equipment costs for the day, etc, etc. I charge appropriate to the threat being addressed, the amount of space being checked, and the logistics involved, but everything boils down to time. I, and many others in the profession actually have more time in training than a surgeon, and some (cough-cough) have more equipment then some of the best equipped operating rooms. My experience is that an entry level TSCM'er addressing low level threats (ie: domestic cases) will need 50-75k in equipment. For low end corporate sweeps I suggest 250-300k minimum, and 350-500k for medium threat sweeps. Higher end corporate sweeps require well over 500k in equipment, and a legitimate government sweep will require well over a million dollars in equipment. Scanlocks are fine for use as a coaster under your coffee cup... they were "State of the Art" 25+ years ago. -jma [Non-text portions of this message have been removed] 7839 From: Lewis Hipkins Date: Tue Oct 7, 2003 4:57pm Subject: Phila Mayor finds a bug in his office. I just saw this on the news, here in Philly. http://www.nbc10.com/news/2538086/detail.html 7840 From: Johnston, Richard Date: Wed Oct 8, 2003 7:40am Subject: RE: Listening Device Found in Phila. Mayor's Office The answer to the last question is YES. But that is a different team altogether, the FDT. They found slight traces, not more than a day old. After careful analysis costing $57,374.17, they issued a warrant for the arrest of Terrence James Weston, Esq., for conspiring to attack the Philadelphia City Government employing biologic agents. Since the conspiracy charge will only stick if there is a co-conspirator, the janitor - Shamus Hetteridge - has also been indicted. It is alleged that Hetteridge did not deploy an appropriate countermeasure as part of the plot. Hetteridge's lawyer said, "The only air freshener Shamus had stunk worse than the fart." The FBI has declined comment. -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Tuesday, October 07, 2003 8:19 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Listening Device Found in Phila. Mayor's Office Does anybody who found the device? Was it a radiating, wired or hard wired device? Can the FBI detect a fart in an elevator? -jma At 9:59 PM -0400 10/7/03, MACCFound@a... wrote: >Listening Device Found in Street's Office > >By ERIC TUCKER >.c The Associated Press > >PHILADELPHIA (AP) - Police conducting a routine security sweep of Mayor John >F. Street's City Hall office found a hidden listening device Tuesday morning, >authorities said. > >Street, who is seeking re-election, quickly sought to reassure city residents >that his office was not the subject of an investigation. > >``I have done nothing wrong,'' Street said at a news conference. > >FBI spokesman Linda Vizi said the device was not connected to any campaign >espionage, but she refused to say whether Street was being investigated or >whether the FBI planted the device. > >Police said officers inspect the mayor's office every three or four months. > >Tuesday's discovery comes near the end of a heated mayoral campaign that pits >Street against Republican challenger Sam Katz for the second time. Street >beat Katz four years ago by less than 10,000 votes in the city of 1.5 million, >and polls show a neck-and-neck race again this year. > >The Katz camp had nothing to do with the device, campaign spokeswoman Maureen >Garrity said. > >In August, someone tossed what might have been an unlit firebomb through the >window of a Katz campaign office, and Katz has accused a Street supporter of >brandishing a gun and telling Katz and his wife, ``You're going down.'' > >Supporters of Street, who is black, have accused Katz, who is white, of race >baiting. > >Street said he was confident the device was not placed by law enforcement. > >``The question that ultimately will get raised in the minds of some people is >who's investigating the mayor's office?'' Street said. ``Well, in response to >that question, I want to assure the people of this city that this mayor is >not being investigated. I have done nothing wrong.'' > > > >10/07/03 20:58 EDT > > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. ---------------------------------------------------------------------------- ---------------------- Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 7841 From: James M. Atkinson Date: Wed Oct 8, 2003 8:02am Subject: Re: Poll results for TSCM-L OK, so in other words, The majority of the respondents (70.8%) charge between $1500 and $5000 per day, with most of those charging $2500 to $5000 per day. -jma At 7:52 AM +0000 10/8/03, TSCM-L@yahoogroups.com wrote: >The following TSCM-L poll is now closed. Here are the >final results: > > >POLL QUESTION: Please indicate how much you think >an extremely good TSCM specialist >should be charging as a flat daily >rate (per person). > >CHOICES AND RESULTS >- Under $500 per day, 1 votes, 4.17% >- $500 to $1500, 5 votes, 20.83% >- $1500 to $2500, 8 votes, 33.33% >- $2500 to $5000, 9 votes, 37.50% >- Over $5000 per day, 1 votes, 4.17% > -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7842 From: James M. Atkinson Date: Wed Oct 8, 2003 8:24am Subject: Re: Scanlock Raymond, You make a good point, perhaps I need to visit Audiotel again and spend a few days with them to refresh my training on the equipment. I haven't visited them since their founder died a few years back. I'll arrange to visit Audiotel, and will advise on my opinions of the gear after my visit. I've owned Scanlocks in the past, and was not impressed with either the sensitivity, or selectivity of the unit, and observed it to be only slightly more effective that a broadband diode detector. For the amount of money that was being asked for new units I felt the funds would be more wisely spent on a decent spectrum analyzer and computer controller. Also, I have spoken to other users of the Scanlock, and at least half of them hate it, have had nothing but problems, and can't get rid of theirs fast enough. But there are others who love theirs. -jma At 5:58 AM +0200 10/7/03, Raymond wrote: >James > >Your comment "Scanlocks are fine for use as a coaster under your >coffee cup... they >were "State of the Art" 25+ years ago." > >You obviously not familiar with the products Audiotel have been >producing, especially over the last 10 years or so they have >improved leaps & bounds. > >I suggest you start doing your homework, by first looking at their >website, http://www.audiotel-international.com/ , then asking >practitioners who utilize the equipment. > >Raymond >--- >From the desk of Raymond van Staden >Van Staden and Associates cc > >P.O. Box 1150 >Amanzimtoti >4125, South Africa > >Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 > >Email: raymond@v... >Internet: http://www.vanstaden.co.za > >SIRA Membership: 199789 >SACI Membership: 03 > > > > > ----- Original Message ----- > From: James M. Atkinson > To: tscm-l@yahoogroups.com > Sent: Tuesday, October 07, 2003 4:08 AM > Subject: Re: [TSCM-L] Sweep Charges... > > > > In an ideal world you would simply charge the same daily rate that a > hospital would charge for an open heart surgeon, plus all equipment > costs for the day, etc, etc. > > I charge appropriate to the threat being addressed, the amount of > space being checked, and the logistics involved, but everything boils > down to time. I, and many others in the profession actually have more > time in training than a surgeon, and some (cough-cough) have more > equipment then some of the best equipped operating rooms. > > My experience is that an entry level TSCM'er addressing low level > threats (ie: domestic cases) will need 50-75k in equipment. For low > end corporate sweeps I suggest 250-300k minimum, and 350-500k for > medium threat sweeps. Higher end corporate sweeps require well over > 500k in equipment, and a legitimate government sweep will require > well over a million dollars in equipment. > > Scanlocks are fine for use as a coaster under your coffee cup... they > were "State of the Art" 25+ years ago. > > -jma > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7843 From: Date: Wed Oct 8, 2003 9:03am Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: Assuming that you were limited to a SINGLE piece of equipment for a bug sweep (RF segment only) which would you select. o Spectrum Analyzer o Scanlock o OSC-5000 o CPM-700 o Delta V o DAR o 2044 o 2057 o TRD-800 o MSR-900 series o PR-700 o EMC-25 o EMC-35 o RSSI-101 o ESH o R-9000 o PCR-100 o PCR-100 o R-8500 o Spy Shop Gizmo To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1142787 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 7844 From: Date: Wed Oct 8, 2003 9:06am Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: Do you think that the Granite Island Group website of tscm.com is the best piece of work ever written concerning TSCM, bug sweeps, and wiretap detection o Yes o No To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1142788 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 7845 From: Steve Uhrig Date: Wed Oct 8, 2003 9:16am Subject: Re: Poll results for TSCM-L On 8 Oct 2003 at 9:02, James M. Atkinson wrote: > OK, so in other words, > The majority of the respondents (70.8%) charge between $1500 and $5000 > per day, with most of those charging $2500 to $5000 per day. people *CLAIM* they charge $X. That one word makes the difference. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7846 From: Date: Wed Oct 8, 2003 9:18am Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: What would you like to see Jim Atkinson add to his website tscm.com, to make it more helpful. o Equipment Reviews o White Papers o Basic Tutorials o Profiles of Common Bugs o More Bug Frequencies o TSCM Proceedural Guides o Model TSCM Policy o Forensic Evaluation of Bugging Devices o More Book Suggestions o Counter Surveillance Guide o Career Guidance Section o Rant about ethics o Rant about compentency o More Government documents concerning TSCM o Search Guides o More Legal Stuff o Attorneys Guide to TSCM o Attorneys Guide to Eavesdropping o Guide to PROPERLY investigate a bug discover (for law enforcement) o Court documents from SpyShop busts o Court documents from Eavesdropping cases o Layman's guide to dealing with bugging o Rant about cordless and cell phones o Tutorials on Sub-Carriers o Please email jmatk@tscm.com with other suggestions To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1142792 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 7847 From: Steve Uhrig Date: Wed Oct 8, 2003 9:47am Subject: Re: Scanlock On 8 Oct 2003 at 9:24, James M. Atkinson wrote: > I've owned Scanlocks in the past, and was not impressed with either > the sensitivity, or selectivity of the unit, and observed it to be > only slightly more effective that a broadband diode detector. Either your Scanlock or your test methodogy was defective. Can a diode detector copy Radio Moscow during a sweep, not that doing so is a criteria for sweeping but an example of the sensitivity of the unit? The thing basically is a tuned receiver, with an L.O., mixer/IF and various demodulators including subcarrier. Granted, the L.O. concept is a bit weird at first glance, but the concept is novel and it works. Well. The Scanlock was (and maybe still is?) available with a wide range of accessories, including a signal monitor, carrier current receiver, Rangelock which indicated distance in feet from the unit to an open mike, Compuscan and others. With the exception of audio correlation which was patently unreliable in the one Oscor I owned, the Scanlock with accessories essentially does everything the Oscor does. The Scanlock even has its requisite share of colored blinking lights and readouts, which is mandatory for sweep equipment as we all know, and the major feature/selling point of the Oscor. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7848 From: Date: Wed Oct 8, 2003 10:41am Subject: Update Phila Discovery of bugging device in Philadelphia mayor's office causes a furor DAVID B. CARUSO, Associated Press Writer Wednesday, October 8, 2003 (10-08) 11:56 PDT PHILADELPHIA (AP) -- The discovery of a listening device in Mayor John F. Street's City Hall office has touched off a political furor just weeks before Election Day and raised strong suspicions that the bug was planted by the FBI as part of a criminal investigation. Pennsylvania Gov. Ed Rendell on Wednesday called on the FBI to tell the public what it knows about the eavesdropping equipment, found Tuesday. "I think given this extraordinary situation with four weeks to go in the campaign, it is incumbent upon the FBI to say why they planted the device," said Rendell, a Democrat like the mayor. The bug was found during a routine sweep of Street's office by police. Street is a locked in a bitter rematch against Republican businessman Sam Katz, and the campaign has been marked by charges of threats and race-baiting. Election Day is Nov. 4. FBI spokesman Linda Vizi said the equipment was not connected to campaign espionage, but she refused to say whether Street was being investigated or whether the FBI planted the device. She also would not comment on how the FBI was able to conclude so quickly that the device was not connected to the mayor's race. At a news conference Tuesday evening, Street said: "I want to assure the people of this city that this mayor is not being investigated. I have done nothing wrong." Street's campaign suggested the bugging was instigated by the Bush administration Justice Department for political reasons. "What the campaign does find incredibly curious is that the FBI could so quickly leap to the conclusion that this was not related to the mayoral campaign in any way, shape or form," said Street campaign spokesman Frank Keel. "The timing of the discovery of these listening devices seems incredibly strange, seeing that we are four weeks out of the election, and we have a Democratic mayor ahead in the polls, and we are on the eve of the first mayoral debate." Keel went on: "Do we believe that the Republican Party, both at the federal level and state level, is pulling out every stop to get Pennsylvania in 2004? Absolutely. Is the Republican Party capable of dirty tricks? I think that is well documented." U.S. Attorney Patrick Meehan, the top federal prosecutor in Philadelphia, declined to say what federal agents might know about the bug, but denied politics plays any role in his office's decisions. "The U.S. Attorney's office in the Eastern District of Pennsylvania has a long and proud history of doing its work without regard to partisan politics. That was the practice of my predecessors, and it is my practice as well," Meehan said in a statement. Philadelphia Police Commissioner Sylvester Johnson said he turned the matter over to the FBI. He said the security sweeps of the mayor's office have been going on for decades. An aide to Street, who spoke on condition of anonymity, said that more than one microphone was found and that all were within the mayor's office suite. Officials would not say how long the equipment was believed to have been in place. But police said a sweep done in June found nothing suspicious. Katz called the discovery "breathtakingly shocking." His campaign denied having anything to do with the bugging. Street beat Katz four years ago by fewer than 10,000 votes in this city of 1.5 million. Polls also show a neck-and-neck race in this year's campaign. In August, someone tossed what was believed to have been an unlit firebomb through the window of a Katz campaign office. An aide to Street and a former city employee were charged with making threats after getting into a confrontation the same day. Supporters of Street, who is black, have accused supporters of Katz, who is white, of race-baiting. Philadelphia city prosecutors had nothing to do with the bugging, said Cathie Abookire, a spokeswoman for District Attorney Lynne Abraham. [Non-text portions of this message have been removed] 7849 From: Date: Wed Oct 8, 2003 5:52am Subject: Introduction We cover Mexico, Centro and South America Ron Oling, JD SECURITY MANAGEMENT INTERNATIONAL Texas License A-06570 8812 Tradeway San Antonio, Texas 78217 210-824-2653 210-829-8366 fax 210-669-9810 cell Serving US, Mexico, Centro and South America www.smi-tx.com www.cancunpi.com www.costaricainvestigations.com [Non-text portions of this message have been removed] 7850 From: Hawkspirit Date: Wed Oct 8, 2003 8:18pm Subject: Historical Sweep Article Here an old one for you Ben Jamil fans. Roger Everybody's Got the Bug (Time, December 16, 1966) http://bugsweeps.com/info/time-12-16-66.html 7851 From: Date: Wed Oct 8, 2003 4:40pm Subject: Re: Historical Sweep Article In a message dated 10/8/2003 6:18:11 PM Pacific Standard Time, hawkspirit@e... writes: > Here an old one for you Ben Jamil fans. Thank you so much for remembering our hero. [Non-text portions of this message have been removed] 7852 From: kondrak Date: Thu Oct 9, 2003 3:27am Subject: Mayor Says Bug Part Of Political Attack http://www.nbc10.com/politics/2541019/detail.html Philadelphia mayor John Street says the U.S. attorney's office has informed a Street advisor that the mayor isn't the target of a federal investigation that included the bugging of his City Hall office. (Yeah, and like we could believe either of them). 7853 From: James M. Atkinson Date: Thu Oct 9, 2003 10:04am Subject: Eavesdropping Incident Discovery Notification Procedures Eavesdropping Incident TSCM Discovery Notification Procedures First, as a fact of law when you uncover an illegal eavesdropping device, or evidence of illegal eavesdropping activity, espionage, bugging, wiretapping, and so on you have a legal responsibility to notify appropriate law enforcement which has jurisdiction. Failure to report a crime or suspected crime may cause the words "Obstruction of Justice" to appear next to your name on an Indictment (which is not a good thing). Second, The issue of "jurisdiction" is a very touchy one. As a rule, your safest bet is to make your report initial in writing to at least one FEDERAL law enforcement agency, and optionally to one local law enforcement agency. Interception of Oral Communications is a Federal offence and is a violation handled by the FBI. The local police or sheriff may also have concurrent jurisdiction under applicable state statute. At a minimum the FBI should at least to offer to take the complaint, even if there is a doubt in the agents mind that the US Attorney's office would pursue the matter. Title 18 USC 2511 spells out quite clearly that wiretapping is a federal crime, and therefore, the purview of the FBI. The Complaint Clerk or Duty Agent should write the matter up, even if no action was being taken, and the complaint forwarded to the appropriate supervisor for information or action. Every federal law enforcement agency attempts to weasel out of getting "bug finds" dropped on their lap, which is why you have to document everything and make all your initial notifications in writing. (on a side note: FBI Agents really do like arresting criminals, and putting them in jail.) I generally include a paragraph at the top of my notification letters that points out the jurisdiction issue, and ask that if they opt not to assist to direct the letter to an "appropriate agency." In the event that you "get anything less then an enthusiastic response" from a federal law enforcement agency then you should make sure that you provide your local U.S Attorneys office (send it to THE U.S. Attorney, and NOT an Assistant U.S. Attorney) with a copy of the notification letter. Also send a secondary letter where you mention the agent by name to refused to handle the complaint. Generally, the "newly minted agents, still wet behind the ears" will give you the most problems, but the older agents are a bit more understanding (so long as you're a legitimate TSCM person). Sadly, No federal law enforcement agency has ever formally accepted or been given jurisdiction over bugging and wiretapping incidents unless the incident involves classified materials or industrial, military, or economic espionage. The U.S. is ripe for a major crackdown on the spy shops, eavesdroppers, and wiretappers, but nobody really cares about enforcing the law already on the books. Reference: FBI Manual of Investigative Operations and Guidelines (AKA: MIOG), Part II, Section 16, Pages 133-140 Third, You want someone in law enforcement to get out to the location and take control of the premises is quickly as possible. Fourth, It is CRITICAL that you collect as much documentation as quickly as humanly possible as the bug may disappear in all the commotion once LE gets involved. One survival hint is to take several digital photographs of the device, and immediately upload the images to an off-site FTP server (remember CYA). Also, take great care not to smear any of the fingerprints that might be on the device, battery, wires, or surrounding area. The same thing goes for tool marks, or elements of trace evidence. Fifth, Law Enforcement will (or should) ALWAYS suspect that the person who found the bug is also the person who planted the bug. You should make damn sure that you "are as pure as the freshly laid snow," and that NOTHING in your possession (or at your office) could be even remotely considered an eavesdropping device. Sixth, When you take photographs of the find be sure to get INSTANT pictures in three copies (one for you, one for LE, and one for your clients), and be sure to sign each and append a date and time (these are your insurance pictures). Next, take a series of 35mm photographs with a "Normal" 50 or 60 mm lens and use COLOR print film (as slow speed as possible, I prefer 25 or 100 speed). Be sure to use a tripod and off camera flash, and stop-down to the smallest aperture so the photographs will be tack sharp when blown up. If you have time supplement the color photographs with a set of black and white picture shot on PANCHROMATIC film (as slow as possible, I prefer 50 speed or Tech-Pan). Take great care not to disturb anything that might be considered evidence. Don't rely on digital pictures only, but burn some film (LE folks, judges, and juries love big 32*40 prints). Seventh, Record every little detail on paper, and remember that you will need to sign, date, and time stamp each page. Remember to make a photocopy as you will usually give all your originals to the LE person who comes out (be sure to get a property receipt... no property receipt, no evidence). Personally I have a 150+ page discovery checklist that goes into virtually all conceivable parameters of a discovery, and tracks all notifications, etc. (I also bring along some of my own property receipts and evidence pouches if they forget theirs... which they usually do). Eighth, This would be a good time to point out that you should make copies of everything, but that it may be wise to "forget" about these copies (and your insurance pictures) when you hand over the original documents. Funny things have been known to happen in property rooms, and it may end up being "your word against theirs," so CYA, CYA, CYA. Ninth, Always assume that there is more than the one bug or bugs you found, and assume that someone will attempt removal or at least some type of countermeasure against your discovery. Remembers that there is the bug YOU found, the diversionary bug, and the actual spies bug... always assume that there are two more bugs that have yet to be found. Tenth, It is critical that you consider that what you have found is hostile, AND illegal until proven otherwise. AND THE MOST CRITICAL!!! Eleventh, Our job is to ensure that an area that we are inspecting is free from eavesdropping devices or technical weaknesses. We are never engaged to "find the bug," but to ensure that no bug is present. It is not our job to "investigate" who did it, but to scientifically document our find and then to turn the case over to someone in law enforcement for investigation. ================================================ Assorted Ramblings: My personal preference is to "preload" a notification form letter on a laptop with all the location information, client information, and so on. I set it up so it can launch a fax off to the local FBI office in seconds (sent to the complaint duty officer). I also set up a similar form letter with contact information (via fax) for any other local LE agency that may also have interest if I find something (State Police, Local Sheriff, City Police, etc). I also indicate that this is simply an "Initial Notification Letter" and that there will be more details to follow in a second fax and phone call. I then go down my discovery check list, key-in the applicable details on the find and squirt a fax (with more details) to the applicable agencies promptly. This way the paper trail on the find is started immediately. I then follow up with a phone call about 5-10 minutes after I've confirmed that all the faxes have gone though. Once that has been completed the rest of the discovery list is filled out. Photographs of the find are taken (both 35mm and Polaroid instant "insurance pics") and as much information written down and documented in as much depth and detail as possible. Be sure to observe the behavior of your contact and their employees when you tell them about your discovery as this often proves quite interesting (it may be THEIR bug). The area is then secured, and the law enforcement agencies re-contacted (and pushed) to get someone to "take control" of the area before your departure. Usually, the LE folks will gripe and moan, but it is critically important to get someone (anyone) to come visit the location, and at least take down a written incident report or complaint (be sure that YOU get a copy). Also be sure to get the name, badge number, and contact information of the people who come out (be sure to record the plate number and/or car number). If someone in law enforcement claims that the device "is one of theirs" simply ask for the docket/case number, the court who issued the warrant, and the names/phone of the judge so you can get a protective order issued. If there is Court or Judges name given and no protective order is issued, then there is no legitimate warrant, in turn the cop is probably violating the law, and you need to immediately talk to the FBI or the local district attorney. (A protective order is a court directive that will formally command you to "keep your mouth shut" regarding the discovery or activities involving a legitimate COURT ordered bugging. You should ask for this to be issued to protect you, and most judges will be quite happy to issue one as they understand the ethical position you are in.) If you get good reason to belive that the bug you found is a legitimate COURT ORDERED activity then politely and immediately refund all of your clients money (with a little extra something for their trouble), and find some way to gracefully back out of the assignment (feigning an equipment malfunction, theft of gear, or a physical ailment are all good excuses). Just remember that when you find a bug keep your mouth shut, document everything, preserve evidence, officially notify law enforcement, and be ready to answer some awkward questions. ================================================ As a formality years ago I started writing down every little aspect of how I perform a TSCM or related service in the form of a procedural manual. My primary goal was to use computer controlled instruments, and to let it help ferret out potential threats. Of course, to do this I first had to describe in detail every aspect of what I wanted the computer to do, which was then reduced to a series of C instructions. When a client contacts me for a sweep I have a 3 ring binder that I grab so I can collect on of the information on the assignment and "complete the blanks." I then have my computer print out a copy of the "Prep Worksheets," equipment checklists, and so on. Once I arrive on-site I have a RF worksheet that runs several hundred pages, and is mostly computer generated modeling information. Each wallplate, switch, light fixture, piece of furniture, and so on each has a different type of detailed checklist, and higher threat things such as doors and door frames have a 6+ pages list. I have one type of checklist for pocket calculators, another one for AC powered calculators, another for ashtrays, and so on. The checklist for a single telephone line is 16+ pages, and the inspection list for the phone instrument is over 20 pages. Years ago I learned not to assume anything, and learned that by documenting every aspect of what you do there is less chance to miss minor anomalies or details which could point to a bug. Customers also seem to be a lot happier when you can show them that you are working off a formal plan of work or blueprints. Customers are also delighted that you have a formal scientific method and procedure that they can look at, touch, feel, and talk with you about. My "Procedural Guide" is currently a total of sixteen 1.5-inch thick binders. Each binder covers the methods used on a specific segment of the TSCM survey. I insert copies of what ever worksheets are appropriate for the job into the back of each section once I arrive and "count the wallplates." Since most of my sweeps are repeat customers I can usually just pull the blueprints and prepare the worksheets in advance. In any case, documentation is your friend, as is having a formal discovery and notification procedure already in place. I would like to mention that I was the very first private sector TSCM person to ever write a comprehensive procedural guide for finding and documenting bugs, and that to date, my manual is the most detailed of any other book written in either the public or private sector concerning TSCM... period. ================================================ I will only possess an eavesdropping device if and when doing so is in total and absolute compliance with the federal laws concerning same. When I come across a bug, wiretap, or other such thing I have the common sense to simply document my findings and confirm that it is indeed a surveillance device. I will only touch the device to the extent required to determine what it is (when finding it), to confirm that it is indeed an eavesdropping device, and to document the findings without disturbing any evidence. I have, and will also assist law enforcement people (with appropriate jurisdiction) in the actual removal of the device, and if so requested I will perform a forensic evaluation and identification of the device in the field, but only under their direct and immediate supervision. At no time will I take the bug into my own possession, or play with it in any way. I treat a found bug much the same way that I would treat a dead body if I came across one in the field, and would strongly suggest that other TSCM'ers follow my lead. If I come across a dead body I am not going to load it in my trunk, haul it back to the office, and then perform medical experiments on it claiming that it is being done in the name of education or science. Instead, I am going to stop, calm down, notify the appropriate authorities and request that they come out and take control of the situation. While I am awaiting their arrival I may take a couple of Polaroids if I can do so without disturbing the scene, and will write down as many details as possible while they are still sharp in memory. Ditto, in cases when I find a bug... Once you are positive you have found a bug IMMEDIATELY make your initial notifications. If you don't know why, then consider some other occupation. Once your initial notification you can breathe easier, but try to document as much of the details as possible and take great care not to disturb the scene (if you cannot do this, then consider some other occupation). Make lots of written notes, take many pictures, and watch how people around you behaving relative to the "thing you found." Once you make the first notes, or take the first photographs, sign them, write the date and time on them, and then make five photocopies of them ASAP. The originals and two sets of photocopies are given to the law enforcement officer who responds, one cop goes to the client (if the LEO approves it), and the remaining copies stay in your possession. Your attorney gets one copy, which is notarized, sealed into an envelope, which he places into a second envelope and send to himself via registered mail. When I go out to perform a sweep I always carry two instant Polaroid cameras, and enough film to make 100 pictures. I also include several Marks-a-lot pens/markers, sleeves for the Polaroids, and a pad of color charts/scales. I also carry a formal 100+ page "Discovery Protocol" which breaks down everything that I will do (in detail) when and if I find a surveillance device, and include all this in a single briefcase which I can grab to facilitate documentation in the event of a bug find. My position and policy on how I handle bug discoveries (or bugs generally) has been the same for over twenty years now... I will not build, touch, play, or possess unless explicitly authorized to do so by law. It simply astounds me how many folks will openly violate the laws concerning bugging devices. The law is very explicit... As a private citizen or private company you can only possess these devices AFTER you obtain a written contract from a law enforcement or intelligence agency; and federal law forbids maintaining any kind of inventory or stock in advance of the purchase order being issued. If you're an ex-cop or ex-spook all those little goodies have to be returned to the agency. In fact, if you are a cop you cannot legally possess the devices unless you are formally "taking delivery, receiving documented training, performing documented evaluation, or executing a formal court order" and at no other time. LEO's cannot by law keep a box of bugs at their office, in their cars, or loan them out to PI's. -jma =================================== Here are the FBI Offices in major 56 U.S. cities. I suggest that you copy and past them into your discovery checklist. Federal Bureau of Investigation 200 McCarty Avenue Albany, New York 12209 (518) 465-7551 Federal Bureau of Investigation Suite 300 415 Silver Avenue, Southwest Albuquerque, New Mexico 87102 (505) 224-2000 Federal Bureau of Investigation 101 East Sixth Avenue Anchorage, Alaska 99501-2524 (907) 258-5322 Federal Bureau of Investigation Suite 400 2635 Century Parkway, Northeast Atlanta, Georgia 30345-3112 (404) 679-9000 Federal Bureau of Investigation 7142 Ambassador Road Baltimore, Maryland 21244-2754 (410) 265-8080 Federal Bureau of Investigation Room 1400 2121 8th. Avenue N. Birmingham, Alabama 35203-2396 (205) 326-6166 Federal Bureau of Investigation Suite 600 One Center Plaza Boston, Massachusetts 02108 (617) 742-5533 Federal Bureau of Investigation One FBI Plaza Buffalo, New York 14202-2698 (716) 856-7800 Federal Bureau of Investigation Suite 900, Wachovia Building 400 South Tyron Street Charlotte, North Carolina 28285-0001 (704) 377-9200 Federal Bureau of Investigation Room 905 E.M. Dirksen Federal Office Building 219 South Dearborn Street Chicago, Illinois 60604-1702 (312) 431-1333 Federal Bureau of Investigation Room 9000 550 Main Street Cincinnati, Ohio 45202-8501 (513) 421-4310 Federal Bureau of Investigation Room 3005 Federal Office Building 1240 East 9th Street Cleveland, Ohio 44199-9912 (216) 522-1400 Federal Bureau of Investigation 151 Westpark Blvd Columbia, South Carolina 29210-3857 (803) 551-4200 Federal Bureau of Investigation Suite 300 1801 North Lamar Dallas, Texas 75202-1795 (214) 720-2200 Federal Bureau of Investigation Federal Office Building, Room 1823 1961 Stout Street, 18th. Floor Denver, Colorado 80294-1823 (303) 629-7171 Federal Bureau of Investigation 26th. Floor, P. V. McNamara FOB 477 Michigan Avenue Detroit, Michigan 48226 (313) 965-2323 Federal Bureau of Investigation 660 S. Mesa Hills Drive El Paso, Texas 79912-5533 (915) 832-5000 Federal Bureau of Investigation Room 4-230, Kalanianaole FOB 300 Ala Moana Boulevard Honolulu, Hawaii 96850-0053 (808) 521-1411 Federal Bureau of Investigation 2500 East TC Jester Houston, Texas 77008-1300 (713) 693-5000 Federal Bureau of Investigation Room 679, FOB 575 North Pennsylvania Street Indianapolis, Indiana 46204-1585 (317) 639-3301 Federal Bureau of Investigation Room 1553, FOB 100 West Capitol Street Jackson, Mississippi 39269-1601 (601) 948-5000 Federal Bureau of Investigation Suite 200 7820 Arlington Expressway Jacksonville, Florida 32211-7499 (904) 721-1211 Federal Bureau of Investigation 1300 Summit Kansas City, Missouri 64105-1362 (816) 512-8200 Federal Bureau of Investigation Suite 600, John J. Duncan FOB 710 Locust Street Knoxville, Tennessee 37902-2537 (423) 544-0751 Federal Bureau of Investigation John Lawrence Bailey Building 700 East Charleston Boulevard Las Vegas, Nevada 89104-1545 (702) 385-1281 Federal Bureau of Investigation Suite 200 Two Financial Centre 10825 Financial Centre Parkway Little Rock, Arkansas 72211-3552 (501) 221-9100 Federal Bureau of Investigation Suite 1700, FOB 11000 Wilshire Boulevard Los Angeles, California 90024-3672 (310) 477-6565 Federal Bureau of Investigation Room 500 600 Martin Luther King Jr. Place Louisville, Kentucky 40202-2231 (502) 583-3941 Federal Bureau of Investigation Suite 3000, Eagle Crest Bldg. 225 North Humphreys Blvd. Memphis, Tennessee 38120-2107 (901) 747-4300 Federal Bureau of Investigation 16320 Northwest Second Avenue North Miami Beach, Florida 33169-6508 (305) 944-9101 Federal Bureau of Investigation Suite 600 330 East Kilbourn Avenue Milwaukee, Wisconsin 53202-6627 (414) 276-4684 Federal Bureau of Investigation Suite 1100 111 Washington Avenue, South Minneapolis, Minnesota 55401-2176 (612) 376-3200 Federal Bureau of Investigation One St. Louis Centre 1 St. Louis Street, 3rd. Floor Mobile, Alabama 36602-3930 (334) 438-3674 Federal Bureau of Investigation 1 Gateway Center, 22nd. Floor Newark, New Jersey 07102-9889 (973) 792-3000 Federal Bureau of Investigation Room 535, FOB 150 Court Street New Haven, Connecticut 06510-2020 (203) 777-6311 Federal Bureau of Investigation 2901 Leon C. Simon Dr. New Orleans, Louisiana 70126 (504) 816-3000 Federal Bureau of Investigation 26 Federal Plaza, 23rd. Floor New York, New York 10278-0004 (212) 384-1000 Federal Bureau of Investigation 150 Corporate Boulevard Norfolk, Virginia 23502-4999 (757) 455-0100 Federal Bureau of Investigation 3301 West Memorial Drive Oklahoma City, Oklahoma 73134 (405) 290-7770 Federal Bureau of Investigation 10755 Burt Street Omaha, Nebraska 68114-2000 (402) 493-8688 Federal Bureau of Investigation 8th. Floor William J. Green Jr. FOB 600 Arch Street Philadelphia, Pennsylvania 19106 (215) 418-4000 Federal Bureau of Investigation Suite 400 201 East Indianola Avenue Phoenix, Arizona 85012-2080 (602) 279-5511 Federal Bureau of Investigation Suite 300 U.S. Post Office Building 700 Grant Street Pittsburgh, Pennsylvania 15219-1906 (412) 471-2000 Federal Bureau of Investigation Suite 400, Crown Plaza Building 1500 Southwest 1st Avenue Portland, Oregon 97201-5828 (503) 224-4181 Federal Bureau of Investigation 111 Greencourt Road Richmond, Virginia 23228-4948 (804) 261-1044 Federal Bureau of Investigation 4500 Orange Grove Avenue Sacramento, California 95841-4205 (916) 481-9110 Federal Bureau of Investigation 2222 Market Street St. Louis, Missouri 63103-2516 (314) 231-4324 Federal Bureau of Investigation Suite 1200, 257 Towers Bldg. 257 East, 200 South Salt Lake City, Utah 84111-2048 (801) 579-1400 Federal Bureau of Investigation Suite 200 U.S. Post Office Courthouse Bldg. 615 East Houston Street San Antonio, Texas 78205-9998 (210) 225-6741 Federal Bureau of Investigation Federal Office Building 9797 Aero Drive San Diego, California 92123-1800 (619) 565-1255 Federal Bureau of Investigation 450 Golden Gate Avenue, 13th. Floor San Francisco, California 94102-9523 (415) 553-7400 Federal Bureau of Investigation Room 526, U.S. Federal Bldg. 150 Carlos Chardon Avenue Hato Rey San Juan, Puerto Rico 00918-1716 (787) 754-6000 Federal Bureau of Investigation Room 710 915 Second Avenue Seattle, Washington 98174-1096 (206) 622-0460 Federal Bureau of Investigation Suite 400 400 West Monroe Street Springfield, Illinois 62704-1800 (217) 522-9675 Federal Bureau of Investigation Room 610, FOB 500 Zack Street Tampa, Florida 33602-3917 (813) 273-4566 Federal Bureau of Investigation Washington Metropolitan Field Office 601 4th Street, N.W. Washington, D.C. 20535-0002 (202) 278-2000 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7854 From: Date: Thu Oct 9, 2003 6:17am Subject: Introduction Ron Oling, JD SECURITY MANAGEMENT INTERNATIONAL Texas License A-06570 8812 Tradeway San Antonio, Texas 78217 210-824-2653 210-829-8366 fax 210-669-9810 cell Serving US, Mexico, Centro and South America www.smi-tx.com www.cancunpi.com www.costaricainvestigations.com [Non-text portions of this message have been removed] 7855 From: Date: Thu Oct 9, 2003 11:25am Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: Who Do You Suspect of Having Planted the Eavesdropping Device in the Office of the Mayor of Philadelphia? o FBI o DOJ Integrity o Pennsylanvia State Police o Philadelphia Police Department o Member of the Mayors Bodyguard Detail o The Mayors Political Opposition o The sweep team that found it o An Outside PI o An amatuer o CIA, actung under order from the aliens living at aera 51 To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1143124 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 7856 From: Date: Thu Oct 9, 2003 11:26am Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: Do your belive that the Eavesdropping Device found in the Mayor of Philadelphia's office is a legitimate court ordered device? o Yes o No To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1143125 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 7857 From: A Grudko Date: Fri Oct 10, 2003 4:39pm Subject: Re: Listening Device Found in Phila. Mayor's Office - Original Message - > PHILADELPHIA (AP) - Police conducting a routine security sweep of Mayor John > F. Street's City Hall office found a hidden listening device Tuesday morning, > authorities said. Is it normal for police to conduct sweeps in the US? Andy Grudko (British), South Africa Umkhonomunye abashokobezi baseMzansi Consulting Investigator - Est. 1981 Registered as a security service provider by the Private Security Industry Regulatory Authority, Reg. No. 8642 www.grudko.com , andy@g... . (+27 12) 244 0255 - 244 0256 (Fax) - 082 778 6355 (Cell) SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 7858 From: Steve Uhrig Date: Fri Oct 10, 2003 5:47pm Subject: Re: Does LE normally conduct sweeps? On 10 Oct 2003 at 23:39, A Grudko wrote: > Is it normal for police to conduct sweeps in the US? No. Very few law enforcement agencies have real capability for TSCM. And they know it. They don't have the training, manpower or equipment. That doesn't mean they'll say NO to the mayor though. The LE tech guys end up being assigned all sorts of miscellaneous tasks by the powers that be, from repairing televisions to installing burglar alarms to sweeping. The theory is if you are an electronic surveillance type you can do anything involving electronics. There was a decent pub written for LE only a few years ago discussing their sweep efforts. It was honest enough to state they largely would be wasting their time trying to do an electronic sweep, and gave a number of decent tips on physical search. One of the large surveillance manufacturers used to build their own RF sweep gadget and offered TSCM training for LE along with their standard training on positive aspects. They discontinued it quite a while back. The officers taking the TSCM courses were ones getting ready to retire and looking for something to do. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7859 From: Doug Rehman Date: Fri Oct 10, 2003 7:09pm Subject: RE: Re: Does LE normally conduct sweeps? Andy: For once, I don't entirely agree with Steve. Generally, Steve is correct- the vast majority of law enforcement agencies don't do sweeps. There are exceptions though; I was with both the Illinois State Police and the Florida Department of Law Enforcement. Both agencies conduct regular sweeps for various officials and in conjunction with criminal investigations. Best Regards, Doug Rehman Rehman Technology Services, Inc. Specializing in Computer Forensics and Technology Related Investigations License A-9800119 Mount Dora, Florida (Orlando Area) (352)357-0500 http://www.electronicdiscovery.com 7860 From: Elliott & Associates, Ltd. Date: Sat Oct 11, 2003 11:51am Subject: Re: Re: Does LE normally conduct sweeps? The same is true here in New Mexico where certain select agents of the State Police have routinely received training over the years primarily for conducting sweeps of the Governors office and Mansion as well as other select state officials offices. Regards, Bill Elliott, CII ELLIOTT & ASSOCIATES, Ltd. (GMT -7) www.prvt-eye.com www.cybercrimeinternational.com "tomorrow is promised to no one" > > For once, I don't entirely agree with Steve. Generally, Steve is correct- > the vast majority of law enforcement agencies don't do sweeps. There are > exceptions though; I was with both the Illinois State Police and the Florida > Department of Law Enforcement. Both agencies conduct regular sweeps for > various officials and in conjunction with criminal investigations. > 7861 From: Doug Runyon Date: Sat Oct 11, 2003 0:25pm Subject: Re: Does LE normally conduct sweeps? I think it's somewhat rare to non-fed LE doing sweeps, though there are exceptions. I remember back in the late 80's while doing some training out at Ray Jarvis' place they were working heavily with the Detroit Police Department. I believe they were training pretty extensively and even testing an "in place monitoring system". Doug Runyon 7862 From: Jay Coote Date: Sat Oct 11, 2003 8:16pm Subject: Re: LE sweeps I don't think there is a single answer as to whether law enforcement agencies have their own TSCM teams. It is being done by some LEAs. Some LEAs may appoint a single technical investigator; some, a sweep team. Other LEAs may have a cow over the idea of forming their own sworn LEO or civ TSCM teams- for various reasons: politics, liabilities, publicity or the position that if they posess a sweep team they "have knowledge" of illegal surveillance operations. For other agencies opposed to the idea it may be simple manpower or budget issues. Still others may just rubber stamp "no" to any technical proposal beyond their understanding. ("You techies may be smarter than me, but I make the decisions") Some LEAs may bring in their wireless communications personnel to perform a sweep- and their training may vary from scanner-geek to qualified sweeper with the right equipment. In my opinion, LEAs need to be threat-conscious, and TSCM-conscious. Jay Coote (LEA commo guy, PI and TSCMist) Los Angeles TSCM@j... 7863 From: Doug Ellsworth Date: Fri Oct 10, 2003 2:17pm Subject: Who monitors eBay? Hi group, ...And now 80 more people will NEVER miss a word of a professor's lecture. Oh Ya, you betcha! http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=3051786411&category=16702 Uh huh! With wireless mic and built-in FM receiver! -Doug Ellsworth Senior Associate, Director TSCM SecurityPosture, Inc. From: James M. Atkinson Date: Mon Oct 7, 2002 7:14am Subject: Re: police eavesdropping At 7:41 PM +0000 10/6/02, Doreen wrote: >Does anyone know the most commonly used AVL system used >by the state of California for surveillance tactics, where is would >most likely be placed ? Also is it legal for law enforcement to >listening in on a house from another neighbors house and >allow them to listen also? thanks Err, you should check the list description again... The majority of the people on this list are ex-military and/or ex-law enforcement who take great effort to be honest, trustworthy, and uphold the law in everything they do... so why should they interfere with the law enforcement people in California? Your query sounds just a little too fishy. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6334 From: James M. Atkinson Date: Mon Oct 7, 2002 7:25am Subject: Re: steve At 2:36 AM +0000 10/7/02, Doreen wrote: >You know, there's such a thing as police misconduct. Or is your >motto In God and the police we trust. The is also such a thing as a list member being an asshole. ... toilet eavesdropping and police conduct?? poof... your off the list -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6335 From: James M. Atkinson Date: Mon Oct 7, 2002 0:09pm Subject: Levels of Legitimacy - The Ten "P-Levels" Levels of Legitimacy - The Ten "P-Levels" Several years back I developed the following table for the analysis of "experts" for a course I was teaching, and thought the list might find it interesting. I am considering adding it to my website, and would appreciate any suggestions, additions, and comments from the list membership. Take a moment and consider... which ones appy to you? -jma ================ 1. Professional - A true blue, died in the wool security expert with years of RELEVANT experience and background in their specific area of expertise. He will "walk the walk and talk the talk", and have the scars to prove it. This guy will have all the necessary equipment, hundred of books (some of which he wrote or contributed to), a web page or two on the subject. He (or she) will seek to illuminate the subject matter, and will be able to explain very complex topics in terms the layman can understand and is comfortable with without pushing his services too much (he lets you come to him, and never gets pushy). 2. Pretender - Similar to the above professional but has irrelevant or bogus credentials. They may talk the talk, but cannot walk the walk (nor have the scars). Will talk a good game, but generally lacks legitimate equipment, materials, or training. This type will claim to be a TEMPEST or TSCM expert but has never actually attended a NSA, CIA, DIA, or State Department schools. He often has not written a book but will often plagiarize others (and claim it as his own work). If the "pretender" has an online presence or web page it is full of hype, rhetoric, and paranoia (but little science). He is quite capable of totally baffling customers, but cannot explain things in a non-technical way (or without hyping surveillance technology to death). 3. Putz - This is nothing more then a buffoon. Generally he does not know how to do the job, has virtually no equipment, training, or resources (but tries really hard). He may or may not be honest, and may actually believe that he is competent. He may have a few technical toys, and may have a week or two of training in electronics, surveillance, and security. 4. Parasite - This type leaches off of the credibility of others, generally has no expertise, knowledge, or training in what they are offering. Usually someone like this walks and talks like a used car salesman, and they love to run their mouth about all the people they know. Name-dropping is an art form to the parasite. The parasite may be detected by the way they rattle off a list of references before anybody has really asked for them. He will usually be desperate to prove to you how legitimate he is. 5. Predator - This type is pure evil and the only reason they are involved in security is to victimize the customer. The predator is only interested is back-stabbing, theft, betrayal, or harming the client in a serious way. They only reason this type of person is involved in security is to ferret out their customers secrets so they can be exploited for criminal purposes. 6. Poison - He has nothing good to say about anybody except himself and his associates. When questioned about his own credentials he will lash out at his competitors with personal attacks (instead of discussing his own credentials). This type is easily identified after five minutes of talking, and they have not said one thing regarding their own merit, equipment, or credentials. 7. Puffer Fish - Typically he has little or no credentials, but knows all of the industry lingo and jargon. He will claim to be the president of a huge corporation with dozens of employees, millions in assets when in fact this type is a penniless mooch who is still living with their parents. If not living with his parents his (or her) spouse will be the primary breadwinner in the family, Their primary income (and references) will be from friends or family. Often this type is also a pretender and bumbling putz. 8. Psychiatrist Bait - These people are really nothing more then con artists who will ramble on for hours with wild tales of how they were a Navy SEAL, covert CIA operative, undercover FBI agent, and so on. They could tell you about their credentials, but then they would have to kill you. Often they will offer credentials which at first appear real, but either can not be confirmed, or is suspect in another way. They will offer credentials that can not be verified by their own admission. "It's too secretä" 9. Phelons (or Felon) - This group is a real problem within the security business. Many con artist, felons, and dirt-bags try to capitalize on their criminal skills by claiming to be able to catch other criminals. Usually their only credential (that can be verified) is the criminal conviction. Often this type will claim to be a convicted hacker and computer expert when in fact he was convicted of arson, is a psychiatric patient, and is incapable of recovering his own hard drive. The few cases where the conviction was relevant to their field will not set your mind at ease about their now "reformed" status. 10. Paranoids - Usually has knowledge of security because of an anti-establishment, paranoid mindset which compel them to constantly look over their shoulder. Of course the government is constantly harassing them, has their phones taped, and has legions of agents employed just to harass them specifically. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6336 From: kondrak Date: Mon Oct 7, 2002 3:05pm Subject: Re: steve If you work with them, youre not supposed to notice I guess.... At 02:36 10/7/02 +0000, you wrote: >You know, there's such a thing as police misconduct. Or is your >motto In God and the police we trust. 6337 From: Charles P. Date: Mon Oct 7, 2002 5:56pm Subject: Re: steve > When its the cops, there are no rules, they simply lie... > A wise TSCMer once said, Those who think that the world's problems are caused by one group, one profession, one race, or one culture as opposed to another do not understand the true nature of evil and where it really dwells. They can do nothing to relieve the world's troubles. Those who recognize the struggle with evil in their own hearts and work daily to overcome it, are eventually able to offer real constructive help to others. cp ----- Original Message ----- From: "kondrak" To: "Doreen" Cc: Sent: Monday, October 07, 2002 4:05 PM Subject: Re: [TSCM-L] steve > If you work with them, youre not supposed to notice I guess.... > > > At 02:36 10/7/02 +0000, you wrote: > >You know, there's such a thing as police misconduct. Or is your > >motto In God and the police we trust. > > 6338 From: Matt Paulsen Date: Mon Oct 7, 2002 11:06pm Subject: Page for Mr. Francis DiAdario(sp?) Please contact me. 503.892.8786 Thanks, Matt Paulsen 6339 From: David Alexander Date: Tue Oct 8, 2002 5:31am Subject: re: which type are you ? Jim I'd say I was a type 11: 11. Conscious incompetent - someone who knows they will never have the knowledge or equipment required to do this kind of security work, but is competent in others areas of security (e.g. information security) and want to make sure that they have a good understanding of the issues in TSCM, so they know what to be aware of, and who to ask if they need work of this sort done without wasting money on types 2-10. It's an old phrase, but still true - the more I know, the more I realise I don't know. regards _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 6340 From: James M. Atkinson Date: Tue Oct 8, 2002 8:59am Subject: Levels of Legitimacy - The Twelve "P-Levels" [updated] ... was Ten Levels Based on feedback from the list membership, here is an updated version of the The Twelve "P-Levels"... it was Ten Levels Are there any other types that should be listed? I will be putting this list up on my website soon. Comments and feedback would be appreciated. -jma ================ 1. Professional - A true blue, died in the wool security expert with years of RELEVANT experience and background in their specific area of expertise. He will "walk the walk and talk the talk," and have the scars to prove it. This person will have all the necessary equipment, hundred of books (some of which he wrote or contributed to), a web page or two on the subject and articles in numerous respected magazines, journals, and web sites. He (or she) will seek to illuminate the subject matter, and will be able to explain very complex topics in terms the layman can understand and is comfortable with without pushing his goods or services too much (he lets you come to him, and never gets pushy). Would have been in the military (active duty, not reserves, or National Guard) for at least four years in a technical speciality, or would have worked as a civilian Federal government employee for at least four years in a related profession. May or may not have a background in law enforcement. 2. Proficient - One who knows the field well enough to be merely proficient. That practitioner is educated in the field, knows his fundamentals, skill levels, limitations, and where to get help when he needs it. The Proficient are also willing to ask for help from Professionals when it is appropriate, and are also willing to share their expertise with those who are less proficient. The Proficient would not exaggerate his experience, qualifications, or abilities; but would tackle projects that are appropriate with his experience level. Some day, the Proficient hope to be "expert professional," and is on his way to that career level. But, as of today, he is not there yet. This is a common level for many private investigators or members of law enforcement who by their profession are proficient in a more general skill set, but also know when to engage an outside "Professional". 3. Pretender - Sometimes called a "Pontiff". Similar to the above but has irrelevant or bogus credentials. They may talk the talk, but cannot walk the walk (nor have the scars). Will talk a good game, but generally lacks legitimate equipment, materials, or training. This type will claim to be a TEMPEST or TSCM expert but has never actually attended a NSA, CIA, DIA, or State Department school. He often has not written a book but may plagiarize others work and claim it as his own work. If the "pretender" has an online presence or web page it is full of hype, rhetoric, and paranoia (but little science). He is quite capable of totally baffling customers, but cannot explain things in a non-technical way (or without hyping surveillance technology to death). The Pretender will be vague about their background and credentials, and will use a lot of smoke and mirrors to disguise themselves. Often the pretender has some kind of technical degree or background, but none of it has any relevance to the matter at hand, TSCM, TEMPEST, or the claimed expertise. Often thrown out of the military after a failed career (never actually making it to retirement), or never actually made it though basic training/boot camp. 4. Putz - This is nothing more than a buffoon. Generally, he does not know how to do the job, has virtually no equipment, training, or resources (but tries really hard). He may or may not be honest, and may actually believe that he is competent. He may have a few technical toys, and may have a week or two of training in electronics, surveillance, and security. Sadly, many; otherwise, honest private investigators or security professionals get caught up in this level when they buy a box of SpyShop toys and try to perform security services for what they perceive to be a way to make a fast buck. 5. Parasite - This type leaches off of the credibility of others, generally has no expertise, knowledge, or training in what they are offering. Usually, someone like this walks and talks like a used car salesman, and they love to run their mouth about all the people they know. Name-dropping is an art form to the parasite. The parasite may be detected by the way they rattle off a list of references before anybody has really asked for them. He will usually be desperate and will scramble to prove to you how legitimate he is. Generally speaking, they will have little or no equipment, but will foster excuses about leasing equipment, about people stealing their gear, and so on. 6. Predator - This type is pure evil, and the only reason they are involved in security is to victimize the customer. The predator is only interested in back-stabbing, theft, betrayal, or harming the client in a serious way. They only reason this type of person is involved in security is to ferret out their customers secrets so they can be exploited for criminal purposes. Profit is their bottom line, regardless of who suffers. 7. Poison - He has nothing good to say about anybody except himself and his close associates. When questioned about his own credentials he will lash out at his competitors with personal attacks (instead of discussing his own credentials). This type is easily identified after five minutes of talking, and they have not said one thing regarding their own merit, equipment, or credentials. Often, their personality combined with a "Puffer Fish" and "Pretender": 8. Puffer Fish - Typically he has little or no credentials, but knows all the industry lingo and jargon. He will claim to be the president of a huge corporation with dozens of employees, millions in assets; when in fact, this type is a penniless mooch who is still living with their parents. If not living with his parents his (or her) spouse will be the primary breadwinner in the family, Their primary income (and references) will be from friends, family, and business partners. Often, this type is also a "Pretender" and bumbling "Putz." 9. Psychiatric Patient - These people are really nothing more than con artists who will ramble on for hours with wild tales of how they were a Navy SEAL, covert CIA operative, undercover FBI agent, and so on. They could tell you about their credentials, but then they would have to kill you. Often, they will offer credentials which first appear real, but either cannot be confirmed, sound bogus, or is suspect in another way. They will offer credentials that cannot be verified by their own admission. "It's too secretä" 10. Phelons (or Felon) - This group is a real problem within the security business. Many con artist, felons, and dirt-bags try to capitalize on their criminal skills by claiming to be able to catch other criminals. Usually, their only credential (that can be verified) is the criminal conviction. Often, this type will claim to be a convicted hacker and computer expert; when in fact, he was convicted of arson, is a psychiatric patient, and is incapable of recovering his own hard drive. The few cases where the conviction was relevant to their field will not set your mind at ease about their now "reformed" status. Often, this type is also a "Psychiatric Patient" and/or "Puffer Fish." 11. Paranoids - Usually has knowledge of security because of an anti-establishment, paranoid mind-set which compel them to constantly look over their shoulder. Of course, the government is constantly harassing them, has their phones taped, and has legions of agents employed just to harass them specifically. 12. Proclaimed Neophyte - Someone who knows they do not have the knowledge or equipment required to do this kind of security work, but is competent in others areas of security such as information security and want to make sure that they have a good understanding of the issues in TSCM, so they know what to be aware of, and who to ask if they need work of this sort done without wasting money on types 3-11. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6341 From: Shawn Hughes Date: Tue Oct 8, 2002 8:15pm Subject: police misconduct Mr. Kondrak, It's obvious you have a personal problem with Law Enforcement. As a full-time, sworn, salaried police officer, I apologize for whatever it is that you perceive has wrongly been done to you by us. While it is true that police misconduct occurs, the vast majority of our operations have occurred with the utmost respect for the individuals' right to privacy. Very few of us stoop to the things you claim. It's just much more obvious when we do it, than say, a 'spy shop' guy or PI. If this were not true, we would have been picked apart by the ACLU and related ilk many, many years ago. My question is, is this an appropriate forum for cop bashing? Could I implore you to limit your comments to those that further the dissemination of TSCM - related information? Regards, **************************************************************************** ****************************** Shawn Hughes Patrolman / Technician, Union County (TN) Sheriff's Office Uncertified Public Safety Bomb Technician Hazardous Materials Technician Subject Matter Expert; CBIRNE Operations, Technical Surveillance Operations Member, International Association of Bomb Technicians Region VI ---------------------------------------------------------------------------- ------------------------------------------------ 6342 From: Matt Paulsen Date: Wed Oct 9, 2002 2:00am Subject: Humor, true story. The Mounties got their men. What they had trouble getting was a sandwich. Found this on cnn somewhere. -m SURREY, British Columbia (AP) -- The Mounties got their men. What they had trouble getting was a sandwich. Royal Canadian Mounted Police Constable Ed Boettcher and his partner decided to take a sandwich break Monday while on surveillance duty in an unmarked car. At the restaurant, they checked the license plate on a car parked at a nearby pawn shop, found the car had been reported stolen, followed it and helped arrest the driver and passenger. Back they went to the sandwich joint, only to find a well-known car thief getting out of a pickup truck. Sure enough, a check of the license showed the truck had been stolen and they arrested the driver. On his third try, Boettcher finally got inside the sandwich shop, but his partner noticed two men carrying golf bags into the pawn shop. It turned out their car was also stolen and they were eventually arrested as well. 6343 From: kondrak Date: Wed Oct 9, 2002 2:02am Subject: Lie Detectors Can Be Fooled http://story.news.yahoo.com/news?tmpl=story&u=/nm/20021008/hl_nm/lie_dectors_dc_1 Lie Detectors Can Be Fooled, Panel Decides 6344 From: David Alexander Date: Wed Oct 9, 2002 3:13am Subject: Polygraphs NBG - but they will still use tem From the BBC news web site: Electronic lie detectors, or polygraphs, are of little use in screening applicants for jobs at sensitive locations, says a US report. An applicant with the proper training could fool a polygraph, the National Research Council (NRC) concludes after an extensive survey involving interviews with CIA and FBI experts. "Its accuracy in distinguishing security violators from innocent test-takers is insufficient to justify reliance on its use in employee security screening in federal agencies," it says. But it adds that such tests continued to have some value where the subject lacked grounding in how to cheat the machine. US Government departments conduct thousands of polygraph tests each year on job applicants and employees. The BBC's Alex van Wel reports that such tests are used to screen employees at locations such as nuclear plants and bases where dangerous chemicals like anthrax are stored. The NRC report was commissioned by the Department of Energy before last year's 11 September terror attacks. Over 19 months, a committee interviewed US security officials and visited polygraph facilities at several government facilities, as well as studying reports and publications. "Certain counter-measures apparently can, under some laboratory conditions, enable a deceptive individual to appear non-deceptive and avoid detection by an examiner," the NRC's report finds. "Overconfidence in polygraph screening can create a false sense of security that may in turn lead to inappropriate relaxation of other methods of ensuring security." Polygraph testing as a method of screening is, in fact, "intrinsically susceptible to producing erroneous results", the report says But the report accepts that polygraphs do have a role to play in certain cases: "In populations of examinees untrained in counter-measures, specific-incident polygraph tests can discriminate lying from truth-telling at rates well above chance, though well below perfection." The concept of lie-detecting machines is based on the fact that when a person lies, there are certain changes in physiology which can be measured. The modern polygraph works by measuring several basic changes, which can include breathing rate, the electrical conductivity of the skin, heart rate, and blood pressure. Our correspondent says that polygraphs are viewed as useful for tests relating to specific incidents. Critics of the report, he adds, believe that in the absence of any alternative they will continue to be used, despite any shortcomings. _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 6345 From: James M. Atkinson Date: Wed Oct 9, 2002 5:43am Subject: Study: Strip FBI of domestic intelligence http://www.upi.com/view.cfm?StoryID=20021007-044557-3582r Study: Strip FBI of domestic intelligence By Pamela Hess UPI Pentagon Correspondent From the International Desk Published 10/7/2002 5:15 PM WASHINGTON, Oct. 7 (UPI) -- A high-powered independent task force recommended to the White House on Monday that it strip the FBI of much of its domestic intelligence investigation responsibilities and create a new homeland intelligence agency. The recommendation is contained in a report, "Protecting America's Freedom in the Information Age," produced by the Markle Foundation, the Center for Strategic and International Studies and the Brookings Institution. As the White House and Congress struggle over whether someone should have "connected the dots" of intelligence that might have led to the prevention of the Sept. 11, 2001, attacks, the task force asserts that only a new agency, carefully designed to avoid trampling civil rights and to provide meaningful, collated intelligence, can accomplish the task. "We think the public discussions in recent weeks have not really grasped what's going on," Zoe Baird told United Press International in an interview. "In fact, the discussion should be about how we should set up a domestic intelligence in a systematic way for the first time in a generation." Baird, a former member of the president's Foreign Intelligence Advisory Board, and former Netscape Chief Executive Officer James Barksdale headed the panel. The failure to stop Sept. 11, despite serious indications that a major event was being planned, was not the fault of the FBI agents who never "connected the dots." "It was not about incompetence. It was about incapacity," said Philip Zelikow, executive director of the task force. Members of the task force were scheduled on Monday to brief Tom Ridge, director for homeland security. The panel is concerned by the FBI's checkered history in conducting domestic intelligence, as highlighted by the 1975 Church Committee report, a Senate inquiry into abuses of power by the FBI, CIA and other intelligence agencies. "We need a very careful balance between security needs and privacy needs," Baird said. "Every time (we) set up a domestic agency for intelligence they go overboard." "Protecting freedom also requires securing the values that define America, including the civil liberties and rights to privacy that make our country special," states the report. The task force asserts that the FBI has a role to play in counterintelligence investigations and when collecting information to use as evidence in a criminal case against suspected terrorists. But generating domestic intelligence for policy-makers should be the domain of another agency, possibly the proposed Department of Homeland Security. "The Department of Justice and the FBI should be the lead agencies for law enforcement, exercising the power to investigate crimes, charge people with crimes, perhaps take away their liberty and prepare cases for trial and appeal," the report states. "The DHS should be the lead agency for shaping domestic intelligence to inform policy-makers, especially on the analytical side, so that there is some separation between the attitude and priorities of intelligence analysis and the different, more concentrated focus of people authorized to use force on the street to make arrests and pursue or detain citizens." There are two problems with the FBI, say Philip Zelikow, executive director of the task force, and Baird. First, allowing the FBI broad power to investigate citizens not necessarily suspected of a crime invites a conflict of interest. "The FBI has the power to arrest, the most potent power," Baird told UPI. "They should not be the agency collecting a vast array of open source information privately against people who are not targets of law enforcement investigations. The division is critical." Second, the FBI is not equipped to provide an analytical intelligence report, designed to help leaders plan their next move, understand specific threats, find vulnerabilities or predict possible attacks. "The FBI has no institutional capability to analyze domestic intelligence," Zelikow said. "The role of analysts is not valued at the FBI the way it is in other intelligence agencies. There is insufficient funding and staffing to conduct the kind of intelligence analysis that is needed for domestic intelligence in the counter-terrorism area," states the report. Creating a central point of authority for domestic intelligence is only half the battle. Next comes the crafting of rules on how information can be handled and which agencies can receive what. The Department of Homeland Security, or whatever entity takes on the mission, would be the gatekeeper of classified domestic intelligence information, making sure it gets shared as widely as needed without violating the privacy of innocent citizens. To do that, the task force envisions a new, distributed and closely linked national network of all local, state and federal computer systems, including the Federal Aviation Administration and Immigration and Naturalization Service. By linking all computers, analysts in any agency would be able to search other offices' data banks for critical information without delay or interference -- all too often the case in the federal government. The concept is simple and uses existing databases -- and it might have prevented the Sept. 11 attacks, the report says. Each person buying a plane ticket could be checked against a list of possible terrorists. In August 2001, Nawaq Alhamzi and Khalis Al Midhar bought tickets to fly on American Airlines Flight 77, which later crashed into the Pentagon. Both men used their real names. Their names would have shown up as suspected terrorists on a State Department/INS watch list called TIPOFF, as they were both sought by the FBI and CIA after they attended a terrorist meeting in Malaysia. Their names could have been checked for common addresses. The search would have revealed the men shared a common address with Mohamed Atta, who flew American Airlines Flight 11 into the North Tower of the World Trade Center, and Marwan Al Shehhi, who flew United 175 into the South Tower, and who in turn shared another address with Khalid Al Midhar. A check of frequent flyer numbers would have revealed Majed Moqed (American 77) shared a number with Al Midhar. With Atta identified as a possible associate of the wanted terrorists, searching Atta's phone number would have led analysts to five other Sept. 11 hijackers. A check of an INS database of expired visas would have led to Ahmed Alghamdi. Doing the same address and phone number searches would have led to the other hijackers who were on Flight 93, which crashed into the Pennsylvania countryside. Such data searches would carry with them an "audit trail," allowing the government to identify who conducted them and why, in the event of a complaint. Baird and Zelikow said that private databases should also be connected to the network, allowing the government to search records of companies such as Federal Express or of doctors' offices as they are piecing together intelligence. Participation in such a program would be voluntary, at first, Baird said -- but predicted if a terrorist attack is carried out that might have been prevented with a simple search of private business' records, that could change. The task force drew on 44 experts, including Utah Gov. Michael O. Levitt, former Deputy Defense Secretary John Hamre, now of CSIS, and former Strategic Allied Command Europe chief Gen. Wesley Clark. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6346 From: Steve Uhrig Date: Wed Oct 9, 2002 8:40am Subject: Re: Lie Detectors Can Be Fooled On 9 Oct 2002 at 3:02, kondrak wrote: > http://story.news.yahoo.com/news?tmpl=story&u=/nm/20021008/hl_nm/lie_d > ectors_dc_1 > Lie Detectors Can Be Fooled, Panel Decides I didn't read the article, but the CIA teaches their people how to fool polygraphs, and has for decades. The value in a polygraph, in my observation, has been in the pre-test interview. The rest is just intimidation factor. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6347 From: Paolo Sfriso Date: Wed Oct 9, 2002 11:02am Subject: Infrared-Lasar intercept eliminators Dear Colleagues. A client has asked us to supply an Infrared-Lasar intercept eliminating system to apply on the windows of a conference room and/or change the glazing with a non reflective (or should I say vibrating ?) type. The suggestion of installing curtains has been rejected: client doesnt want to ruin the view. Any suggestion ? Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 6348 From: Steve Uhrig Date: Wed Oct 9, 2002 0:04pm Subject: Re:Infrared-Lasar intercept eliminators On 9 Oct 2002 at 18:02, Paolo Sfriso wrote: > A client has asked us to supply an Infrared-Lasar intercept > eliminating system to apply on the windows of a conference room and/or > change the glazing with a non reflective (or should I say vibrating ?) > type. > The suggestion of installing curtains has been rejected: client doesnt > want to ruin the view. Gee, they think they are leaking secrets worth zillions but don't want to ruin the view? Invite them to sweat off their gizzards in a SCIF and see how they feel. Cheapest and very effective solution: Buy several inexpensive broadcast radios. Digitally tuned on FM broadcast (at least here in the U.S.) would be best, so they don't drift off the dead frequency. Tune them to a frequency not in use in your area, resulting in white noise ('pink' noise actually, if in the audio spectrum). Set them on the windowsill against the potential target windows. Keep volume low to the point where it's not audible, then show them with a stethoscope (medical/acoustic or electronic) how that white noise swamps any room audio on the glass. If the esthetics of a radio in the windowsill isn't acceptable, silicone glue some small speakers in appropriate housings to the glass and hard wire them remotely to the above radio for a white noise source. You don't need purpose-built or expensive masking systems. What you need to do is educate and un-brainwash the client. The above will work as well as anything. Marty Kaiser used to have concerns with pipes resonating with the sounds of room audio leaking. He merely put timers on solenoids and made pipe bangers to swamp any acoustic leakage. The simple solutions are the best, but in this case I think it is a solution to a nonexistent problem. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6349 From: preflat Date: Wed Oct 9, 2002 0:06pm Subject: Re: Infrared-Lasar intercept eliminators Just tape a $3.00 Radio shack radio to the window and tune in an all polka station!!!!!! 6350 From: Date: Wed Oct 9, 2002 8:21am Subject: Re: Infrared-Lasar intercept eliminators In a message dated 10/9/02 9:07:59 AM Pacific Daylight Time, paulsfriso@t... writes: << The suggestion of installing curtains has been rejected: client doesn't want to ruin the view. >> REI used to make an acoustic noise generator (ANG) that was extremely effective against wall and window attacks. It was a good product and is probably still manufactured. It was available in US & Foreign voltages. 6351 From: Kirk Adirim Date: Wed Oct 9, 2002 1:25pm Subject: Re; infrared laser Modulating the window with white/pink noise and/or music is a fine idea if you assume that the enemy is bouncing a beam off the window pane. However Real world laser eavesdropping is more sophisticated than that. A reflective surface, coating or microprisms are left behind on walls, ceilings, fixtures or other objects Inside the target room (even hairspray works). A window is just a portal to pass the beam through on it's way to and from the reflective surface (the glass of a picture frame, the frame, the picture, or the wall itself can be used). The reflective surface doesn't have to be bright and shiny to our eyes, it can be optically dull and flat in the visible spectrum. As long as it's reflective at the wavelength being used by the laser, and that doesn't necessarily mean it's in the Infrared spectrum. Final analysis..... Buy the curtains and modulate them with a fan or small vibrating motor. Kirk www.tactronix.com [Non-text portions of this message have been removed] 6352 From: Date: Wed Oct 9, 2002 9:33am Subject: Re: Re; infrared laser In a message dated 10/9/02 11:28:36 AM Pacific Daylight Time, kirk@t... writes: << A reflective surface, coating or microprisms are left behind on walls, ceilings, fixtures or other objects Inside the target room (even hairspray works). >> If the sweeper was doing his job, he'd find those with application of both long wave and short wave UV. 6353 From: James M. Atkinson Date: Wed Oct 9, 2002 2:47pm Subject: Re: Infrared-Lasar intercept eliminators At 6:02 PM +0200 10/9/02, Paolo Sfriso wrote: >Dear Colleagues. > >A client has asked us to supply an Infrared-Lasar intercept >eliminating system to apply on the windows of a conference room >and/or change the glazing with a non reflective (or should I say >vibrating ?) type. > >The suggestion of installing curtains has been rejected: client >doesnt want to ruin the view. > >Any suggestion ? > >Kind Regards. > >Paul Sfriso >Director >GRUPPO S.I.T. >Security, Investigations & Technology >Quarto d'Altino, Venice >ITALY > >phone +39 0422 828517 >fax +39 0422 823224 >24hr GSM cellphone +39 335 5257308 >www.grupposit.com >paulsfriso@t... Try something like a white noise generator with window mount transducers... the ANG-2000 would work well in this application. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6354 From: James M. Atkinson Date: Wed Oct 9, 2002 2:49pm Subject: Re: Infrared-Lasar intercept eliminators At 1:21 PM -0400 10/9/02, MACCFound@a... wrote: >In a message dated 10/9/02 9:07:59 AM Pacific Daylight Time, >paulsfriso@t... writes: > ><< The suggestion of installing curtains has been rejected: client doesn't >want to ruin the view. >> > REI used to make an acoustic noise generator (ANG) that was extremely >effective against wall and window attacks. It was a good product and is >probably still manufactured. It was available in US & Foreign voltages. We have the ANG-2200 systems for $ 695.00 -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6355 From: Date: Wed Oct 9, 2002 10:54am Subject: Re: Infrared-Lasar intercept eliminators In a message dated 10/9/02 12:53:23 PM Pacific Daylight Time, jmatk@tscm.com writes: << We have the ANG-2200 systems for $ 695.00 >> They'll need extra transducers. 6356 From: Matt Paulsen Date: Wed Oct 9, 2002 2:58pm Subject: RE: Infrared-Lasar intercept eliminators I'm surprised no one has discussed the window yet. What about swapping out the existing windows for low-e (metallic coated) double or maybe triple-paned & glazed windows, depending on window thickness and thickness of space between each pane, using gasses - argon, etc. and a vacuum space with various types of panes inbetween each panel. Look for a STC of 53. And then start adding countermeasures. Why would this not be an added benefit if not? -----Original Message----- From: MACCFound@a... [mailto:MACCFound@a...] Sent: Wednesday, October 09, 2002 10:22 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Infrared-Lasar intercept eliminators In a message dated 10/9/02 9:07:59 AM Pacific Daylight Time, paulsfriso@t... writes: << The suggestion of installing curtains has been rejected: client doesn't want to ruin the view. >> REI used to make an acoustic noise generator (ANG) that was extremely effective against wall and window attacks. It was a good product and is probably still manufactured. It was available in US & Foreign voltages. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6357 From: Brian Dugan Date: Wed Oct 9, 2002 9:06am Subject: Re: police misconduct As a Police Detective who administered the technical end of intercepting communications and now as an Internal Affairs Detective who investigates other cops I find those remarks by Kondrak as an insult. Please remove me from the list. He obviously knows nothing about minimization requirements and how strictly the court enforces them. Brian Dugan, Detective Tampa Police Department Internal Affairs Bureau Office: (813) 274-5733 Fax: (813) 274-5735 Pager: (813) 339-0410 E-mail: brian.dugan@t... "Let Them Never Be Forgotten" >>> Shawn Hughes 10/08/02 09:15PM >>> Mr. Kondrak, It's obvious you have a personal problem with Law Enforcement. As a full-time, sworn, salaried police officer, I apologize for whatever it is that you perceive has wrongly been done to you by us. While it is true that police misconduct occurs, the vast majority of our operations have occurred with the utmost respect for the individuals' right to privacy. Very few of us stoop to the things you claim. It's just much more obvious when we do it, than say, a 'spy shop' guy or PI. If this were not true, we would have been picked apart by the ACLU and related ilk many, many years ago. My question is, is this an appropriate forum for cop bashing? Could I implore you to limit your comments to those that further the dissemination of TSCM - related information? Regards, **************************************************************************** ****************************** Shawn Hughes Patrolman / Technician, Union County (TN) Sheriff's Office Uncertified Public Safety Bomb Technician Hazardous Materials Technician Subject Matter Expert; CBIRNE Operations, Technical Surveillance Operations Member, International Association of Bomb Technicians Region VI ---------------------------------------------------------------------------- ------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6358 From: Mitch Davis Date: Wed Oct 9, 2002 10:36am Subject: Jane's Intel Digest Was wondering if anyone on the list, that has a subscription to Jane's Intelligence Digest,(monthly Printed Version)could tell me if it's actually worth $450.00 a year?I was interested in it, but it reminded me of a collation of news reports........ Thanks! MD ----------------------------------------------------------- Mitch Davis TSCM/Special Operations Group,Inc. (615) 837 9933 cell (615) 584 9933 e mail: MitchD@t... website www.tscmusa.com Nashville,TN.USA ----------------------------------------------------------- [Non-text portions of this message have been removed] 6359 From: ariel silverstone Date: Wed Oct 9, 2002 11:27am Subject: Re: Infrared-Lasar intercept eliminators I would imagine that any Acoustic Noise Generator will serve the purpose. Ariel --- Paolo Sfriso wrote:

Dear Colleagues.

A client has asked us to supply an Infrared-Lasar intercept eliminating system to apply on the windows of a conference room and/or change the glazing with a non reflective (or should I say vibrating ?) type.

The suggestion of installing curtains has been rejected: client doesnt want to ruin the view.

Any suggestion ?

Kind Regards.

Paul Sfriso
Director
GRUPPO S.I.T.
Security, Investigations & Technology
Quarto d'Altino, Venice
ITALY

phone +39 0422 828517
fax +39 0422 823224
24hr GSM cellphone +39 335 5257308
www.grupposit.com
paulsfriso@t...




[Non-text portions of this message have been removed]


Yahoo! Groups Sponsor
ADVERTISEMENT

========================================================
         TSCM-L Technical Security Mailing List
    "In a multitude of counselors there is strength"

     To subscribe to the TSCM-L mailing list visit:
         http://www.yahoogroups.com/community/TSCM-L

It is by caffeine alone I set my mind in motion.
It is by the juice of Star Bucks that thoughts acquire speed,
the hands acquire shaking, the shaking is a warning.
It is by caffeine alone I set my mind in motion.
=================================================== TSKS


Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service.
__________________________________________________ Do you Yahoo!? Faith Hill - Exclusive Performances, Videos & More http://faith.yahoo.com 6360 From: Ben Evans Date: Wed Oct 9, 2002 0:52pm Subject: Re: Infrared-Lasar intercept eliminators Tell them to go double pane glass. :-) Doesn't this disable any laser listening devices? -Ben At 01:21 PM 10/9/2002 -0400, you wrote: ><< The suggestion of installing curtains has been rejected: client doesn't >want to ruin the view. >> 6361 From: Steve Uhrig Date: Wed Oct 9, 2002 3:19pm Subject: Re: Jane's Intel Digest On 9 Oct 2002 at 10:36, Mitch Davis wrote: > Was wondering if anyone on the list, that has a subscription to Jane's > Intelligence Digest,(monthly Printed Version)could tell me if it's > actually worth $450.00 a year?I was interested in it, but it reminded > me of a collation of news reports. No, it's not. There are many versions of Jane's. There is a lot of overlap. Listings are paid, not researched as news items. They hit me up every year to have my products written up there. It's grossly overpriced, and unless you are a library or a researcher or spending government money or some position where you can profit from the info, it's not worth it. They are interesting reading, but not worth paying for (in my opinion), especially if you don't have plenty of savings already. I read the things at Tom Clancy's as I have time, and 15 minutes is about my limit in them anymore. Too much puff and hyperbole. Jane's has gone downhill in my opinion. They've turned into whores. Something interesting is Inventions and Technology Magazine, and Discovery Magazine. They are worth paying for. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6362 From: Rick Hofmann - MICROSEARCH Date: Wed Oct 9, 2002 3:50pm Subject: Re: Re: Lie Detectors Can Be Fooled Steve, >I didn't read the article, but the CIA teaches their people how to >fool polygraphs, and has for decades. > >The value in a polygraph, in my observation, has been in the pre-test >interview. The rest is just intimidation factor. One of my buddies is a retired PD Sergeant who now does polygraphs. He is considered one of the best in the country. The FBI even uses him to audit some of their operators. He has told me almost exactly what you said. He gets more confessions before he turns on the machine than after the exam. Very truly yours, Rick Hofmann, CCO, CPP, PI16998 MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 http://home.earthlink.net/~microsearch From: Precision Investigations Date: Mon Oct 8, 2001 2:52pm Subject: SOny EVO-250 VCR I would like to purchase a new or preferably a gently used Sony EVO-250 video recorder. I would appreciate any input about where I can purchase one. Thanks in Advance Dale Dorning *********************** "The Investigative Specialist" As Seen in 'Cincinnati Magazine' Precision Investigations & Consulting A Full Service Investigative Agency 888-246-4927 Toll Free 513-895-5400 / 513-587-1093 513-867-0650 Fax www.precisioninvestigations.com pi@p... ION, OASIS, NAPPS, IPSA, USPSA, OACDL Investigators of America Licensed & Insured [Non-text portions of this message have been removed] 3873 From: Date: Mon Oct 8, 2001 6:39pm Subject: Spring cleaning in the fall... I guess it's really bad when there's no more room for your car in the garage. This will help...a little: For sale: - Several older-style WJ radios (8969s, etc.) - e-mail for specifics if yer interested. Most of my backup kit of yesteryear: - Tektronix 492 01/02/03 Spectrum Analyzer - Tektronix TDS 210 Digital Oscilloscope (minimal bandwidth, but very portable) - REI CPM-700 broadband detector - Icom R-100 receiver (unblocked) - Kaiser 1059, SCD-5, 1050TDR --------> $ 4,500.00 plus shipping from Los Angeles. CPM was used for one assignment and shelved. Tek o-scope was purchased for a specific assignment and has not been used since. Tek 492 is in good condition (served me well) and has been replaced with a newer unit. My 230 pound dog used part of the rubber on the carrying handle as a chew toy for a few minutes, but it is otherwise in fine condition. Also - I have a few extra used Motorola XTVAs (convertacoms for XTS- 3000/3500) with new handheld control heads (HHCH), amplified speakers, and antenna nuggets (that allows the portable's antenna to mate (ooh baby) with the XTVA). It's all from the DNC last year and I've been sitting on it since then. XTVA alone lists for $1200 something (covered keypad model), HHCH $300, antenna nugget $125, speaker $50...$1200 each. Other XTS extras...batteries, headset adapters, etc. - ask if you have a need. All sorts of other Mot Astro stuff too. Whew. -Eric bugsweeper@e... 3874 From: James M. Atkinson Date: Tue Oct 9, 2001 9:55am Subject: 50 Ways to Make bin Laden upset, if you get a chance to hang with him 50 Ways to Make bin Laden upset, if you get a chance to hang with him Point out the lice in his beard to make him feel self-conscious. Pause for a moment, listen carefully, and say, "Doesn't that sound a lot like a B-52?" Ask him if he's looking forward to replacing Hitler as Satan's favorite chew toy in the lowest inferno of Hell. Tell him all about your great vacation to Saudi Arabia, where you went absolutely everywhere and did everything, just stomped all over the place. Use his satellite phone to call the time and weather line in Buenos Aires and leave it off the hook. Tell him how much less you paid for your Kalashnikov rifle. Now that you know the address of his secret cave hideout, fill out magazine subscription cards for him for the Wine Spectator and Penthouse. But do not, under any circumstances, send him Popular Mechanics. Order him ten Domino's pizzas with extra ham topping. Correct him when he ends a sentence with a preposition. Ask whether the Taliban gets cable, because you haven't seen "Sex and the City" for weeks. Yank the end of his turban really hard to make him spin around like a top. Switch all the CD's in the jewel boxes in his CD collection, so that when he reaches for Michael Bolton, he'll actually get the Oak Ridge Boys. Mine his bathroom. Use your dinner fork for your salad, and, if questioned by your host, mutter something about "spots". Leave business cards for the Israeli Mossad in his Rolodex. Take pictures of all his wives and post them on www.amihotornot.com. Ask him if he wears boxers or briefs. Check. Take pictures. Again, post these on www.amihotornot.com. Give him a Hot Chicks of Palestine calendar. Ask him if Paradise is different for each person, and whether in your own paradise you'll get to "kick his ass every day for eternity". Reset his VCR and leave it blinking 12:00. Refer to him as "Osama-osama-fee-fi-fo-fama bin Laden". Ask whether suicide bombers have to pay union dues. Tell him it's lovely what he's done with his cave, but that it'd look much nicer covered with huge, smoking craters. At dinner, imply that the Northern Alliance has much prettier place settings. Claim you once saw him at a Hooter's in Muncie wearing a yarmulke. Ask him if he wouldn't mind if you opened the door and shined your laser pointer on his forehead for a few minutes. Tell him that this is the worst pajama party you've ever attended. Ask for some pork rinds and a good brew to wash them down. Mix up his Rubik's Cube. Ask him if he provides his employees with a 401K plan. Complement him on all his poppies outside, but mention that a few day lilies would be a nice accent. Run your finger along his credenza, and say "tsk, tsk" if there's dust. Ask whether the Taliban is hoping to be bombed ahead into the Stone Age, or perhaps the Iron Age if enough shell casings survive. Explain that America is a land of freedom and opportunity, filled with people of every race, religion, and background, including millions of women strong enough to knock the crap out of him. Claim that they serve much better falafel at the public executions in Sudan. Ask him if he's pursuing the Lesser Jihad, the Greater Jihad, or the "Completely Whacked Out of his Freaking Gourd" Jihad. Swirl your drink thoughtfully and mention, "Just think , in a few weeks you might fit in this glass!" Check to see if Saddam is on his speed-dial list. They have to wait a few years to see current television shows in Afghanistan, so give away the secret of who's having a baby on Friends. Warn him that you're "in a New York state of mind." Mention that his wives look quite fetching in their burkas, and ask whether they've ever thought of modeling. Ask him, "say, where do you keep all those Stinger missiles?" just in case he'll be caught off guard and answer correctly. Give him a "noogie" or a "wedgie". If there's actually still a flush toilet left in Afghanistan, give him a "swirlie".* Ask to borrow his hedge trimmer and never give it back. Play a game of Monopoly with him. Make him play the thimble. See if he charges interest. Claim that his properties are your "holy lands" and blow up his hotels. Fish out the secret toy surprises in all his cereal boxes. Offer to take him "clubbing" in Tel Aviv with your friends Saul and Ivan. Ask him which Ninja Turtle is his favorite. Give him your cell phone as a gift and ask him to leave it on for a few days so your friends can call and say hi. When you leave, wave and say, "Shalom!" -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3875 From: James M. Atkinson Date: Tue Oct 9, 2001 0:21pm Subject: Imaginary Situation I have a moral question for you. This is an imaginary situation, but I think it is fun to decide what one would do. The situation: You are in the Middle East, and there is a huge flood in progress. Many homes have been lost, water supplies compromised and structures destroyed. Let's say that you're a photographer and getting still photos for a news service, traveling alone, looking for particularly poignant scenes. You come across Osama Bin Laden who has been swept away by the floodwaters. He is barely hanging on to a tree limb and is about to go under. You can either put down your camera and save him, or take a Pulitzer Prize winning photograph of him as he loses his grip on the limb. So, here's the question and think carefully before you answer the question below: Which lens would you use? -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3876 From: MIKE F Date: Tue Oct 9, 2001 6:59pm Subject: FBI searches internet FBI searches the Web for terrorist tracks http://news.ninemsn.com.au/sci_tech/story_19839.asp --------------------------- lATER4,Mike Fiorentino Master Links 4 Master Investigators http://www.ml4mi.com e-mail: info@m... OR friindy@a... 3877 From: Date: Tue Oct 9, 2001 4:07pm Subject: Senator Blocks Attempt to Pass Bill Senator Blocks Attempt to Pass Bill By JESSE J. HOLLAND .c The Associated Press WASHINGTON (AP) - A Senate attempt to quickly pass President Bush's anti-terrorism legislation failed Tuesday after a Democratic senator refused to let the bill go through without debate or amendment. ``I can't quite understand why we can't have just a few hours of debate,'' said Sen. Russ Feingold, D-Wis., who wants to limit some of the police powers in the Senate legislation. The House and Senate last week came up with anti-terrorism bills based on an outline offered by Attorney General John Ashcroft, who has been urging Congress to quickly pass the bill. Senate and House leadership both have said they would try to get the bill passed this week, and when Senate negotiations on an airline security bill stalled, Senate Majority Leader Thomas Daschle, D-S.D., asked senators to unanimously agree to move on to the anti-terrorism bill. Under Daschle's plan, the Senate would have voted on final passage of the bill Wednesday evening and senators would not be allowed to offer amendments. But Feingold refused to go along with it, saying he wanted to add four amendments that would limit some of its police powers. Feingold wants to eliminate a provision in the bill that would allow police to search suspects' home secretly, narrow a provision that allows federal officials to wiretap telephones, keep the FBI from being able to access Americans' personal records and clarify the federal government's ability to wiretap computers. ``It is crucial that civil liberties in this country be preserved, he said. ``Otherwise the terrorists will win the battle against American values without firing another shot.'' The anti-terrorism bill now will have to wait until senators finish the aviation bill, and that worries some senators. ``There is a danger that the aviation bill will tangle up the rest of this week, and we won't be able to get to it until next week,'' said Senate Republican leader Trent Lott, R-Miss. The House, meanwhile, is expected to move on an anti-terrorism bill before the end of the week. However, House aides say administration officials are pressuring House Speaker Dennis Hastert, R-Ill., to take the Senate bill instead of the bill approved by the House Judiciary Committee. The Bush administration prefers the Senate bill to the House bill, which eliminates most of the bill's police power in 2004. The House bill also does not have money-laundering provisions requested by the White House. Senate Judiciary Chairman Patrick Leahy, D-Vt., said regardless of what is in either bill, it will be changed in negotiations between the House and Senate. The House-Senate conference committee bill ``will be the final package,'' Leahy said. The bill numbers are HR 2975 and S. 1510. On the Net: Senate Judiciary Committee: http://judiciary.senate.gov House Judiciary Committee: http://www.house.gov/judiciary For bill text: http://thomas.loc.gov 3878 From: Date: Tue Oct 9, 2001 8:31pm Subject: Portrait of Usama I recall an artist who made a portrait of Mother Mary using animal dung. (About a year ago in NYC?) Perhaps someone can commission him to make an animal dung portrait of Usama bin Laden. tek492p 3879 From: Aimee Farr Date: Wed Oct 10, 2001 10:29am Subject: Thoughts from Russia. Interesting snippets... from Radio Free Europe, etc. ---- KREMLIN ADVISER EXPLAINS PUTIN'S DECISION TO ALLY WITH WEST. Gleb Pavlovskii, a media and political advisor to the Kremlin, said on 4 October that President Vladimir Putin had changed positions on NATO expansion and support for American antiterrorist efforts because of genuine fears of Taliban threats to Russian security, strana.ru reported. Pavlovskii said that "for Russia, it is better to have Americans in Uzbekistan than to have the Taliban in Tatarstan." In other comments, he said that Moscow is keeping track of its contributions to the antiterrorist effort and plans to demand that their cost be subtracted from Russia's foreign debts once the "postwar" settlement takes place. RUSSIA TO SUPPLY ANTI-TALIBAN FORCES (4 October) Russia is planning to supply Afghan anti-Taliban forces with tanks, armored vehicles and other arms worth up to $45 million in the coming weeks, "Nezavisimaya Gazeta" reported. Russia's envoy to Tajikistan, Maxim Peshkov, said that no Russian arms have arrived. "Up to now there has been only humanitarian aid.... There have been no guns or machine guns," he said. Planeloads of food, blankets, and medical supplies have been sent to northern Afghanistan. Defense sources say the supplies would include 40-50 tanks, 60-80 armored personnel carriers, and ammunition. Russia would also supply Grad missile systems, artillery, mortars, anti-tank weapons, and sniper rifles, as well as Mi-24 attack helicopters and Mi-8 troop-carriers. President Vladimir Putin has set increased arms supplies to the Northern Alliance as one of the main ways in which Moscow will support Washington's operations against "terrorist" bases in Afghanistan. The Russian newspaper pointed out that it has not been decided who will pay for the weapons and it suggested Russian Defense Minister Sergei Ivanov might turn to Washington to settle the bill, Reuters reported. PUTIN TALKS WITH BUSH BEFORE MILITARY OPERATIONS, ALERTS SECURITY AGENCIES... U.S. President George W. Bush called President Putin to inform him prior to the start of the military actions against terrorist networks in Afghanistan and to thank Russia for the contribution its making to the coalition, Russian news services reported on 7 October. Putin responded that the U.S. could count on Russia as a "reliable partner." Putin ordered the Foreign Intelligence Service (SVR), military intelligence (GRU), and the Federal Security Service (FSB) to be brought up to emergency operational status. SPANISH POLICE LOOKING INTO POSSIBILITY RUSSIAN MAFIA FIGURE SOLD NUCLEAR WEAPON TO TALIBAN. "Vremya novostei" reported on 28 September that Spanish security officials, with support from agencies in the U.S., Great Britain, France, and Israel, are seeking to arrest Russian national Semen Mogilevich, who is reputed to be an organized crime figure and may have some connection to the disappearance of a small nuclear device supposedly lost after the collapse of the Soviet Union. The agencies are concerned that Mogilevich might have sold this portable nuclear weapon to the Taliban. ä AND REFLECTING MOSCOW'S PLANS FOR STRATEGIC MILITARY ALLIANCE. The military campaign began by the international coalition in Afghanistan will undoubtedly increase U.S. influence not only in Uzbekistan but in all of Central Asia, something that Moscow has always feared, wrote "Nezavisimoe voennoe obozrennie." Why then did Moscow not only revoke its objections, but even make a serious step towards cooperation with the West? asked the weekly. The answer is that in so doing Moscow choose its own track of movement southwards to the Persian Gulf and Arab world, something that the U.S. strongly opposed during the Cold War. However, the new alliance of Moscow with Teheran shows those old perceptions already losing their force. LIKE PUTIN, DEFENSE MINISTER VISITS PLACE WHERE HE ONCE SPIED. .....on 28 September Defense Minister Sergei Ivanov ...was in Sweden to prepare for the visit to Moscow of Swedish King Karl Gustav and to discuss the expansion of Russian- Swedish military cooperation, RosBalt agency reported the same day. During that visit, Ivanov urged the development of a new security system in the world, one that would replace most existing institutions like NATO, ITAR-TASS reported on the same day. RUSSIAN ANALYST SAYS ONLY A GLOBAL STATE CAN STOP GLOBAL TERRORISM. Writing in "Obshchaya gazeta" on 4 October, analyst Dmitrii Furman argued that the globalization of terror can be countered by the creation of a global security service, which presupposes moves toward a global state sometime in the future. The alternatives, he suggested, are anarchy and apocalypse. 3880 From: James M. Atkinson Date: Wed Oct 10, 2001 0:30pm Subject: Peace Rally The following steps should be adhered to in the event of happening upon a peace rally, where you will undoubtedly come face-to-face with a naive, hemp-shirt-wearing, misguided idiot. 1) Approach the naive, hemp-shirt-wearing, misguided idiot while he's talking about peace and claiming that there should be no retaliation. 2) Engage in brief conversation, asking if military force is appropriate. 3) When he says, "No." ask, "Why not?" 4) Wait until he says something to the effect of, "Because that would just cause more innocent deaths which would be awful and we should not cause more violence." 5) While he's in mid-sentence, punch him in the face. Hard. 6) When he gets up to punch you back, point out that it would be contrary to his values to strike you (because that would be awful and he should not cause more violence). 7) Wait until he cools off and agrees, realizing that he has pledged not to commit additional violence. 8) Punch him in the face again, even harder this time. 9) Repeat steps 5 through 8 until he understands that sometimes it is necessary to punch back. -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3881 From: James M. Atkinson Date: Wed Oct 10, 2001 0:42pm Subject: God Angrily Clarified His Stance http://www.theonion.com/onion3734/god_clarifies_dont_kill.html NEW YORK ≠Responding to recent events on Earth, God, the omniscient creator-deity worshipped by billions of followers of various faiths for more than 6,000 years, angrily clarified His longtime stance against humans killing each other Monday. "Look, I don't know, maybe I haven't made myself completely clear, so for the record, here it is again," said the Lord, His divine face betraying visible emotion during a press conference near the site of the fallen Twin Towers. "Somehow, people keep coming up with the idea that I want them to kill their neighbor. Well, I don't. And to be honest, I'm really getting sick and tired of it. Get it straight. Not only do I not want anybody to kill anyone, but I specifically commanded you not to, in really simple terms that anybody ought to be able to understand." Worshipped by Christians, Jews, and Muslims alike, God said His name has been invoked countless times over the centuries as a reason to kill in what He called "an unending cycle of violence." "I don't care how holy somebody claims to be," God said. "If a person tells you it's My will that they kill someone, they're wrong. Got it? I don't care what religion you are, or who you think your enemy is, here it is one more time: No killing, in My name or anyone else's, ever again." The press conference came as a surprise to humankind, as God rarely intervenes in earthly affairs. As a matter of longstanding policy, He has traditionally left the task of interpreting His message and divine will to clerics, rabbis, priests, imams, and Biblical scholars. Theologians and laymen alike have been given the task of pondering His ineffable mysteries, deciding for themselves what to do as a matter of faith. His decision to manifest on the material plane was motivated by the deep sense of shock, outrage, and sorrow He felt over the Sept. 11 violence carried out in His name, and over its dire potential ramifications around the globe. "I tried to put it in the simplest possible terms for you people, so you'd get it straight, because I thought it was pretty important," said God, called Yahweh and Allah respectively in the Judaic and Muslim traditions. "I guess I figured I'd left no real room for confusion after putting it in a four-word sentence with one-syllable words, on the tablets I gave to Moses. How much more clear can I get?" "But somehow, it all gets twisted around and, next thing you know, somebody's spouting off some nonsense about, 'God says I have to kill this guy, God wants me to kill that guy, it's God's will,'" God continued. "It's not God's will, all right? News flash: 'God's will' equals 'Don't murder people.'" Worse yet, many of the worst violators claim that their actions are justified by passages in the Bible, Torah, and Qur'an. "To be honest, there's some contradictory stuff in there, okay?" God said. "So I can see how it could be pretty misleading. I admit it≠My bad. I did My best to inspire them, but a lot of imperfect human agents have misinterpreted My message over the millennia. Frankly, much of the material that got in there is dogmatic, doctrinal bullshit. I turn My head for a second and, suddenly, all this stuff about homosexuality gets into Leviticus, and everybody thinks it's God's will to kill gays. It absolutely drives Me up the wall." God praised the overwhelming majority of His Muslim followers as "wonderful, pious people," calling the perpetrators of the Sept. 11 attacks rare exceptions. "This whole medieval concept of the jihad, or holy war, had all but vanished from the Muslim world in, like, the 10th century, and with good reason," God said. "There's no such thing as a holy war, only unholy ones. The vast majority of Muslims in this world reject the murderous actions of these radical extremists, just like the vast majority of Christians in America are pissed off over those two bigots on The 700 Club." Continued God, "Read the book: 'Allah is kind, Allah is beautiful, Allah is merciful.' It goes on and on that way, page after page. But, no, some assholes have to come along and revive this stupid holy-war crap just to further their own hateful agenda. So now, everybody thinks Muslims are all murderous barbarians. Thanks, Taliban: 1,000 years of pan-Islamic cultural progress down the drain." God stressed that His remarks were not directed exclusively at Islamic extremists, but rather at anyone whose ideological zealotry overrides his or her ability to comprehend the core message of all world religions. "I don't care what faith you are, everybody's been making this same mistake since the dawn of time," God said. "The Muslims massacre the Hindus, the Hindus massacre the Muslims. The Buddhists, everybody massacres the Buddhists. The Jews, don't even get me started on the hardline, right-wing, Meir Kahane-loving Israeli nationalists, man. And the Christians? You people believe in a Messiah who says, 'Turn the other cheek,' but you've been killing everybody you can get your hands on since the Crusades." Growing increasingly wrathful, God continued: "Can't you people see? What are you, morons? There are a ton of different religious traditions out there, and different cultures worship Me in different ways. But the basic message is always the same: Christianity, Islam, Judaism, Buddhism, Shintoism... every religious belief system under the sun, they all say you're supposed to love your neighbors, folks! It's not that hard a concept to grasp." "Why would you think I'd want anything else? Humans don't need religion or God as an excuse to kill each other≠you've been doing that without any help from Me since you were freaking apes!" God said. "The whole point of believing in God is to have a higher standard of behavior. How obvious can you get?" "I'm talking to all of you, here!" continued God, His voice rising to a shout. "Do you hear Me? I don't want you to kill anybody. I'm against it, across the board. How many times do I have to say it? Don't kill each other anymore≠ever! I'm fucking serious!" Upon completing His outburst, God fell silent, standing quietly at the podium for several moments. Then, witnesses reported, God's shoulders began to shake, and He wept. © Copyright 2001 Onion, Inc., All rights reserved. http://www.theonion.com/ -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- [Non-text portions of this message have been removed] 3882 From: DrPepper Date: Wed Oct 10, 2001 1:11pm Subject: A little paranoia? Now NATO has "come to our rescue" by loaning us an AWAC aircraft (that we already paid for, BTW), to fly over the USA. WoW, there are people out there who would say that this is just one more nudge of the nose of the camel. The United Nations already "owns" property in the US, including most of our National Parks, on the road to a one world nation, and now NATO comes here?? Well, I guess that being a little paranoid is good. :-} -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 3883 From: Aimee Farr Date: Wed Oct 10, 2001 2:41pm Subject: Scarfo KLS http://www.epic.org/crypto/scarfo/murch_aff.pdf 3884 From: DrPepper Date: Thu Oct 11, 2001 11:56am Subject: Who will be the first to use nuclear weapons???? The Chinese are backing the Taliban???? Who will use Nukes? Interesting article here. Scroll down near the bottom. http://www.debka.com/ -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 3885 From: DrPepper Date: Thu Oct 11, 2001 0:34pm Subject: Re: Who will be the first to use nuclear weapons???? If you click on "home" and then on "About us" you will see: I'm sure you can figure out which way their bias leans. ABOUT US DEBKAfile is a unique venture in the form of a multilingual electronic newsletter that goes behind current events and points you forward to coming developments in the areas we cover. from July 15 to August 31, we predicted, among other events, Al Goreís choice of Joseph Lieberman as his running mate and pinpointed US preparations for a possible Iraqi October Flare-up well in advance. We were on top of the Camp David Middle East Peace Summitís failure and instituted a Lockerbie Trial Page. DEBKAfile comes out in English and Hebrew in four editions a day, seven days a week, offering a broad, international take on seminal current events for the international user in both languages, with special appeal to Israelis, Americans and the growing number of ìtransatlanticistsî. As an independent organization, we practice the press freedoms that others preach. Our content is therefore both high in quality and untainted by unrelated interests. We have moreover seized the advantages afforded by Internet to run with serial news stories. In The lockerbie trial case, we followed the unexpected twists and turns of the proceedings as they happened supported by our own analyses and background features. DEBKAfileís editorial team is led by two experienced foreign correspondents and employs topnotch contributors in the worldís hot spots. DEBKAfileís home page is also its front page carrying an encapsulated version, updated as needed, of the key news items of the past 24 hours. Its readily accessible subject pages are devoted to original analyses and insights - as well as links to quality international media - on a wide range of topics. DrPepper wrote: > The Chinese are backing the Taliban???? > Who will use Nukes? > Interesting article here. > Scroll down near the bottom. > > http://www.debka.com/ > -- > Dr Pepper aka WB6GKI > in the High Desert of California. > Check out my LIVE Hamshack Cam at: > http://www1.iwvisp.com/DrPepper/ham/ham.htm > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 3886 From: Aimee Farr Date: Thu Oct 11, 2001 2:09pm Subject: GOVNET (and Flying Monkeys) Richard Clarke, Bush's cyberspace security adviser, has asked the private sector to design a new secure telecommunications network, called GOVNET. http://news.cnet.com/news/0-1005-200-7481276.html http://www.washingtonpost.com/wp-dyn/articles/A40092-2001Oct10.html http://www.wired.com/news/conflict/0,2100,47473,00.html Many parts of the government, including the CIA and the Defense Department, operate separate classified networks. Mark Rasch, a former Justice Department computer crimes prosecutor, said those networks could be expanded and integrated to form GOVNET. *** *allegorical interlude* ----------------------------------------- SCARECROWS IN SEARCH OF THE EMERALD CITY. ----------------------------------------- "Where is the Emerald City?" he [The Scarecrow] inquired. "And who is Oz?" "Why, don't you know?" she [Dorthy] returned, in surprise. "No, indeed. I don't know anything. You see, I am stuffed, so I have no brains at all," he answered sadly. "Oh," said Dorothy, "I'm awfully sorry for you." "Do you think," he asked, "if I go to the Emerald City with you, that Oz would give me some brains?" Signed, -THE WICKED WITCH OF THE WEST Tune in tomorrow, where we will discuss the forced inter-agency busing proposals. Proponents say forced inter-agency busing would redress the evils of "intelligence discrimination." Opponents point out that they already have a "special kids" program, and cite the expense involved in child-proofing their facilities. "They are just mad because we make them ride in the special bus, wear special kids badges, and hold on to a rope when they are here," said one inside source, speaking on the condition of anonymity. "If we didn't, they would run into sharp objects and hurt themselves." 3887 From: Information Date: Fri Oct 12, 2001 4:37am Subject: vendor needed A good friend of mine has need of some items which I believe there are vendors for on this list. Please respond to Ponno direct at kalastree@p... Dear Colleagues I have an enquiry for the supply of the following equipment to a government agency in W. Africa. 1. GCOM 2060 GSM Mobile Phone Intercept System 2. CCTA - 1000 Computerized Telephone Analyses 3. VL 5000P Radio Frequency Detector 4. B4IIE Telephone Tap Alert 5. RXP100 4420 Programmable Briefcase Receiver/Recorder If you have a source to supply, please contact me privately Thanks and Regards Ponno Kalastree, CII,WAD,GIN, WIN, NALI, IPI(UK), CALI, ASIS, INTELNET Mainguard Security Services(S) Pte Ltd Tel: 65-2965881 Fax: 65-2961171 Mobile: 65-96781767 SERVING YOUR NEEDS IN ASIA Thanks Bill Elliott, CII ELLIOTT & ASSOCIATES, Ltd. (GMT -7) http://www.prvt-eye.com http://www.cybercrimeinternational.com 2002 SUPER CONFERENCE - ROYAL SONESTA HOTEL - NEW ORLEANS, LA - AUGUST 20-24, 2002 - http://www.bombet.com/webschedule.htm [Non-text portions of this message have been removed] 3888 From: Steve Uhrig Date: Fri Oct 12, 2001 6:27am Subject: Re: vendor needed Once upon a midnight dreary, Information pondered, weak and weary: > A good friend of mine has need of some items which I believe > there are vendors for on this list. > I have an enquiry for the supply of the following equipment to a > government agency in W. Africa. > 1. GCOM 2060 GSM Mobile Phone Intercept System > 2. CCTA - 1000 Computerized Telephone Analyses > 3. VL 5000P Radio Frequency Detector > 4. B4IIE Telephone Tap Alert > 5. RXP100 4420 Programmable Briefcase Receiver/Recorder These products do not exist. They are called in the industry 'vaporware'. A fraudulent company by the name of G-COM Technologies or something similar, which is the identical company to CCS (check the phone numbers), has fancy glossy catalogs and impressive websites offering products such as the above which just plain do not exist. They sell phony 'distributorships' and allegedly supply governments with all sorts of secret technology. They are liars. They do not supply the products, the products do not exist, and your friend is being suckered by them. I hope he has not advanced them USD $50,000 or something to buy the exclusive rights to distribute these nonexistent products in some or another country. If he has, he has been cheated and will never get that which was promised. And probably twenty or fifty other people have purchased the 'exclusive' right to distribute these products to the same country. He may even travel to this company's HQ in NY, where he will be shown a lot of phony boxes with blinking lights and staged phony demonstrations. Naive persons with starry eyed dreams of making large sales fall for this sort of thing. Have your friend do his homework, or you do it if you are any kind of investor, and you willl confirm every word of the above. Remember G-Com Technology or whatever their name is this week is the same company as CCS, and go from there. Please report your results to this list. The owner is Ben Jamil and his daughter Ariel. Most of the other personnel do not use their real names so they can avoid service when they are sued. Many millions of dollars have gone into a black hole, much of it from governments, and more from the company selling phony distributorships. They play up the mystique and drama of dealing with sensitive products and restricted technology, virtually none of which actually exists. The very few products they actually deliver are full of blinking lights, very well packaged in expensive cases, and will fool most people, as will their expensive glossy literature and website. They cna afford that since they do not have the expense of actually delivering products. At one time, they repackaged other company's products under their own label and added one or two zeroes to the price. Do your homework, starting in NYC, and you will learn the truth. Or ask anyone who has been around this industry a while and who *really* knows the business, and you will confirm every word of the above. Any list member reading this might drop a quick message to the list confirming the above, with or without any details you may care to share. No, they have never cheated me out of anything, but I have baited them over the years. They also claim to do sweeps, and sell 'sweep' equipment. They literally show up for sweeps in limos. Their sweep equipment borders on worthless, and far more attention is paid in the design to blinking lights than to any detection capability. The best their equipment does for RF is merely a diode detector with fifty dollars' worth of user interface, and sells for many thousands. For all practical purposes, it is nonfunctional. Their telephone analyzers are the equivalent of the $15 box with a red LED we all see, but in an elaborate case with 95% of the circuitry dedicated to impressive flashing light sequences. They know how to play the game, and legally they are untouchable. Your friend will never see his equipment, and hopefully you can stop him before he makes promises to someone he will not be able to deliver, and before he loses a year's pay on some fictitious distributorship. Not afraid to sign my name to the above. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3889 From: Miguel Puchol Date: Fri Oct 12, 2001 6:51am Subject: RE: Re: vendor needed Hi there, > These products do not exist. > > They are called in the industry 'vaporware'. > > A fraudulent company by the name of G-COM Technologies or > something similar, which is the identical company to CCS (check > the phone numbers), has fancy glossy catalogs and impressive > websites offering products such as the above which just plain do > not exist. > > They sell phony 'distributorships' and allegedly supply > governments with all sorts of secret technology. I can confirm this. I was approached once by CCS, and they were all about selling the distributorship agreement, of which I can't remember the exact figure, but it was well over the $50k that Steve mentioned. They also went on about how they could supply these super-secret, allmighty GSM intercept systems, which were nothing more than a service monitor, used for fixing GSM terminals and running some network diagnostics (but not for actual off-air call monitoring). I would stay well clear from them, I had to ignore several emails and one phone call (which I utilized to tell them that we were not interested) until they stopped trying to get me into a distributorship agreement. On another note, I guess that the video-face-recongition-a-la-"1984"-style systems debacle (security vs. privacy) has been settled by recent events, I heard on the news last night that the shares of companies selling such tecnologies have shot up in price. 'Nuff said, all the best, Mike 3890 From: Date: Fri Oct 12, 2001 4:54am Subject: Re: Re: vendor needed In a message dated 10/12/01 4:29:48 AM Pacific Daylight Time, steve@s... writes: << They are liars. They do not supply the products, the products do not exist, and your friend is being suckered by them. >> Don't mince your words, please tell us how you really feel. 3891 From: Date: Thu Oct 11, 2001 5:46pm Subject: Chinese backing. -----BEGIN PGP SIGNED MESSAGE----- Greetings. Just wondering if Dr. Peppers posted link, has confirmed information, or of any list members can confirm the statement that the Chinese are backing the Taliban? And to what extent? If this is true, it does alter things to a whole new level of possibilities. Thankyou, Good luck, Erik. -----BEGIN PGP SIGNATURE----- Version: Hush 2.0 wlwEARECABwFAjvGIXkVHGRhZW1vbjdAaHVzaG1haWwuY29tAAoJEIqGlhRaN0MT+3QA oLqmJzQqf6MKSJ7g2vGb3261jlVPAKCtdEX09bOTsthwiUDl3/dU/NR4AQ== =m5D1 -----END PGP SIGNATURE----- 3892 From: Jay Coote Date: Fri Oct 12, 2001 7:04pm Subject: AOR AR-1000XLT receiver for sale I have an AOR AR-1000 XLT handheld receiver for sale. No UHF band coverage gaps. $300 plus shipping in USA 3893 From: Jay Coote Date: Fri Oct 12, 2001 7:05pm Subject: Full-size Cargo Van For sale The van for sale is a full-sized 1986 Ford Econoline E-250-XL. It is equipped with 5 NMO antenna mounts (now weathercapped) on the roof, as well as 3 Antenna Specialists ball mounts on the sides of the vehicle. These standard NMO and 3/6-24 mounts will fit your commo and other antennas. The van is equipped with an upholstered cargo area with carpeting on the floor. It does not have side windows and the rear windows are grayed out. Vehicle features: 5.0L-EFI V8, automatic OD, limited slip rear differential, 2 captain chairs, aux fuel tank, chrome rear step bumper, trailer towing package, AC, PS, PB, AM-FM-Cass, tilt steering wheel. 110K miles. It might make a good working vehicle. $2600 Los Angeles area 3894 From: Jay Coote Date: Fri Oct 12, 2001 7:06pm Subject: AOR AR-3000 For sale I have an AOR AR-3000 general coverage receiver for sale. No-gap coverage in 100 Khz through 2000 MHz. All-mode- AM, FMN, FMW, CW, USB, LSB. Includes op manual and Gesmundo DOS/text based software for laptop control, logging and generating printout of received frequencies. Good cosmetic and operating condition. No gaps in UHF coverage. $1000 plus USA shipping. 3895 From: e cummings Date: Fri Oct 12, 2001 11:55am Subject: Senate approves biggest eavesdropping expansion in a generation http://www.wired.com/news/conflict/0,2100,47522,00.html Terror Bill Clears Senate By Declan McCullagh 7:05 a.m. Oct. 12, 2001 PDT WASHINGTON -- Attempts to inject privacy safeguards into an anti-terrorism bill have been soundly rejected. In a series of votes ending at midnight Thursday, the U.S. Senate overwhelmingly defeated the last-ditch efforts by Sen. Russ Feingold (D-Wisconsin) to limit police surveillance powers. The Senate then voted 96-1 for the unaltered USA Act (PDF), which includes the biggest eavesdropping expansion in a generation. Feingold was the lone dissenter. Sen. Orrin Hatch (R-Utah) described Feingold's three amendments as "outdated and nonsensical." Hatch said "current law perversely gives the terrorist privacy rights.... We should not tie the hands of our law enforcement and help hackers and cyber-terrorists to get away." Senate Majority Leader Tom Daschle (D-South Dakota) said the USA Act was a "delicate but successful compromise" that provided adequate protection for civil liberties. Daschle said his opposition to Feingold's amendments was "not substantiative but procedural" because the Senate needed to move quickly on the legislation. Calling this debate "one of the most important civil liberty issues of our time," Feingold reminded his colleagues that they had taken an oath to uphold the Constitution and the Bill of Rights. Feingold said: "We will lose that war (on terrorism) without a shot being fired if we sacrifice the liberty of the American people." The House is expected to vote on anti-terrorism legislation as early as Friday -- but it's unclear whether House leaders will order a vote on the USA Act or a similar bill, with a December 2003 expiration date that the House Judiciary committee approved. President Bush lauded the vote on the USA Act, saying in a statement that the Senate has handed police "essential, additional tools to combat terrorism and safeguard America against future terrorist attacks." During the three-hour debate, the Senate voted to table -- effectively killing -- Feingold's amendments, which would have: ∑Still allowed police to perform "roving wiretaps" and listen in on any telephone that a subject of an investigation might use. But cops could only eavesdrop when the suspect is the person using the phone. The amendment was rejected, 90-7. ∑Preseved the privacy of sensitive records -- such as medical or educational data -- by requiring police to convince a judge that viewing them is necessary. Without that amendment, the USA Act expands police's ability to access any type of stored or "tangible" information. The amendment was rejected, 89-8. ∑Clarified that universities, libraries and employers may only snoop on people who use their computers in narrow circumstances. Right now, the USA Act says that system administrators should be able to monitor anyone they deem a "computer trespasser." The amendment was rejected, 83-13. ∑Barred police from obtaining a court order, sneaking into a suspect's home, and not notifying that person they had been there. The "secret search" section currently is part of the USA Act -- and is something the Justice Department has wanted at least since 1999, when they unsuccessfully asked Congress for that power at the time. The amendment was not introduced. Feingold's amendments would have rewritten only a tiny portion of the vast, 243-page bill. Even if they had been added, the USA Act still allows police to conduct Internet eavesdropping without a court order in some circumstances, lets federal prosecutors imprison non-citizens for extended periods, and expands the duration of an electronic surveillance order issued by a secret court from 90 to 120 days. Aides for Leahy and Hatch say the USA Act is a welcome improvement over what President Bush originally suggested. It expands the jurisdiction of the secret Foreign Intelligence Surveillance Act court, but not as much as Bush wanted; it requires warrants before voice mail can be seized; it does not permit tax return information to be shared with other federal agencies. The handful of other senators who endorsed Feingold's amendments included Paul Wellstone (D-Minnesota), Maria Cantwell (D-Washington), and Arlen Specter (R-Pennsylvania). Wellstone said that "there's no reason why, in the rush to pass the bill, we can't make changes." Specter brought up the lack of usual process and the shortened schedule. "The Judiciary committee had one hearing, a very abbreviated one, on the 25th," he said. "I wrote the chairman of the Judiciary committee two letters urging hearings. There was ample time to have hearings." Specter said the Senate leadership was "elevating procedure over substance, which is not the way you legislate." Bush has asked Congress for the additional surveillance and detention powers as a response to the deadly Sept. 11 terrorist attacks on the World Trade Center and the Pentagon. The USA Act stands for "Uniting and Strengthening America." 3896 From: admin@t... Date: Fri Oct 12, 2001 0:34pm Subject: RE: Re: Re: vendor needed Steve is correct regarding this group. Recently I was asked to perform a TSCM inspection of a residence. I performed the sweep and found that an alarm system connected to the residence line. The usual checks were made on the lines and the proper test equipment used. The alarm system was affecting the line voltage and was causing a few other problems as well. We advised the resident to contact the alarm company to have the system serviced (It had not been checked or tested for 5+ years.) One month later the resident called an indicated that she called a company in my area to check the line again. She had found the company advertising in a local newspaper. She indicated that the woman who checker her lines attached a device to her line and after a minute or so indicated that there was definitely a "bug" on the line. I was a tad skeptical. I asked the resident to call this company and have them call me. A woman called, the one who did the test, and she indicated that she had used a CCS tap detector and it had registered a tap...I asked her if she located the tap. She indicated she had not. I asked whether she had performed a physical inspection of the lines...she had not. She did say that she took the telephone apart. After further discussion it was evident she had very little knowledge of the lines in the residence, telephone operations, and was not clear on the use of a Fluke multi-meter or why a TDR might be used for telephone cable testing. She was trained in NY and does sell the aforementioned equipment......which is per their website attached to GCOM technologies...... I don't mind competing with competent, well-trained and well equipped TSCM providers...but these people are criminal at worst and negligent at the very least..... Best regards, Sean Walsh Walsh & Associates www.tscm.net Original Message: ----------------- Wrom: WOYIYZUNNYCGPKYLEJ Date: Fri, 12 Oct 2001 09:54:31 EDT To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Re: vendor needed In a message dated 10/12/01 4:29:48 AM Pacific Daylight Time, steve@s... writes: << They are liars. They do not supply the products, the products do not exist, and your friend is being suckered by them. >> Don't mince your words, please tell us how you really feel. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -------------------------------------------------------------------- mail2web - Check your email from the web at http://mail2web.com/ . 3897 From: Bug Sweeper Date: Fri Oct 12, 2001 2:58pm Subject: CCS or whoever they really are... I couldn't agree with you more, Steve. I've needed to vent: They (or someone purporting to be affiliated with them, you can never really tell) nearly convinced an associate at a law firm in Los Angeles to put them on retainer (one of the firm's partners is a long time client and friend), to fly out here to do periodic sweeps of the phone lines and offices. I saw the estimates, pitch sheets, sales brochures, etc. (wish I coulda kept it) -- it was all BS. For your edification, this particular office is in a large, converted home. There are ten POTS lines, a Nortel system, several fax machines, a computer network, and an ADSL drop riding on a fax line. They are involved in LOTS of police misconduct litigation (hence, my involvement). It takes me a weekend to do a thorough job on this place (and that's after visiting regularly for about two years). These other folks said it would take about five hours on site, but demanded travel and four days in the city to do it!? This is THE client that I have that has the most legitimate and very real concern about the integrity of their electronic communications. The ramifications of some schmuck doing a dog and pony show for them could be catastrophic. It would put the lives of whisteblower cops and their families at a nearly unimaginable risk. I wish California had a licensing program for TSCM work. Then again, general contractors are supposed to be licensed but that hasn't stopped substandard, unskilled, and unlicensed people from remodeling someone's home... -Eric 3898 From: Date: Sat Oct 13, 2001 5:14am Subject: Re: vendor needed I agree with everything Steve Uhrig said 100 percent. Over the YEARS, everything I have ever heard about CCS was negative. For example, CCS employees demonstrated a single piece of equipment to a company in South America and sold it to them for $100,000.00 (one-hundred thousand) US dollars. The South American company could not get the equipment to work in the same way as it was demonstrated by the CCS employees. The company was asked to return the equipment to CCS in New York for repairs or calibration. The South American company never saw the equipment again. CCS had the equipment, and the company's $100,000.00. The South American company could not sue or take CCS in New York to court because the transaction happened in South America. Jack 3899 From: Jim Conrad Date: Sat Oct 13, 2001 11:48am Subject: For Sale: AT&T Hostage Phone For any Organization that might have the need to deal with a Hostage or Barricade situation I have for sale on Ebay an AT&T Hostage phone. I have checked out the basic functions and it appears to work OK. Only deficiency that I could find is the rechargeable batteries would not hold a charge. http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=1017784529 Feel free to email any questions to me privately. Thanks .. Jim <:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:> Jim Conrad - jjc@o... or jimc1790@a... (backup) 757-560-5970 Office/Voicemail/Pager - 757-587-8251 Fax CAGE 0UD60 - http://www.oceanviewcom.com/ 3900 From: Date: Sat Oct 13, 2001 9:22am Subject: Interesting THIS IS A REAL GOOD ONE After the 1993 World Trade Center bombing, which killed six and injured 1,000, President Clinton promised that those responsible would be hunted down and punished. After the 1995 bombing in Saudi Arabia, which killed five U.S. military personnel, Clinton promised that those responsible would be hunted down and punished. After the 1996 Khobar Towers bombing in Saudi Arabia, which killed 19 and injured 200 U.S. military personnel, Clinton promised that those responsible would be hunted down and punished. After the 1998 bombing of U.S. embassies in Africa, which killed 224 and injured 5,000, Clinton promised that those responsible would be hunted down and punished. After the 2000 bombing of the USS Cole, which killed 17 and injured 3 U.S. sailors, Clinton promised that those responsible would be hunted down and punished. Maybe if Clinton had kept his promise, an estimated 7,000 people would be alive today. ------------------------------------------------------ An interesting question: This question was raised on a Philly radio call-in show. Without casting stones, it is a legitimate question. There are two men, both extremely wealthy. One develops relatively cheap software and gives hundreds of millions of dollars to charity. The other sponsors terrorism. That being the case, why is it that the US government has spent more money chasing down Bill Gates over the past ten years than Osama bin Laden? --------------------------------------- It is a strange turn of events. Hillary gets $8 Million for her forthcoming memoir. Bill gets about $12 Million for his memoir. This from two people who have spent the past 8 years being unable to recall anything about past events! Incredible!! 3901 From: James M. Atkinson Date: Sat Oct 13, 2001 8:18pm Subject: "Real" Deal about Nuclear, Bio, and Chem Attacks "Real" Deal about Nuclear, Bio, and Chem Attacks Since the media has decided to scare everyone with predictions of chemical, biological, or nuclear warfare on our turf I decided to write a paper and keep things in their proper perspective. I am a retired military weapons, munitions, and training expert. Lesson number one: In the mid 1990's there were a series of nerve gas attacks on crowded Japanese subway stations. Given perfect conditions for an attack less than 10% of the people there were injured (the injured were better in a few hours) and only one percent of the injured died. 60 Minutes once had a fellow telling us that one drop of nerve gas could kill a thousand people, well he didn't tell you the thousand dead people per drop was theoretical. Drill Sergeants exaggerate how terrible this stuff was to keep the recruits awake in class (I know this because I was a Drill Sergeant too). Forget everything you've ever seen on TV, in the movies, or read in a novel about this stuff, it was all a lie (read this sentence again out loud!)! These weapons are about terror, if you remain calm, you will probably not die. This is far less scary than the media and their "Experts," make it sound. Chemical weapons are categorized as Nerve, Blood, Blister, and Incapacitating agents Contrary to the hype of reporters and politicians they are not weapons of mass destruction they are "Area denial," and terror weapons that don't destroy anything. When you leave the area you almost always leave the risk. That's the difference; you can leave the area and the risk; soldiers may have to stay put and sit through it and that's why they need all that spiffy gear. These are not gasses, they are vapors and/or air borne particles. The agent must be delivered in sufficient quantity to kill/injure, and that defines when/how it's used. Every day we have a morning and evening inversion where "stuff," suspended in the air gets pushed down. This inversion is why allergies (pollen) and air pollution are worst at these times of the day. So, a chemical attack will have it's best effect an hour of so either side of sunrise/sunset. Also, being vapors and airborne particles they are heavier than air so they will seek low places like ditches, basements and underground garages. This stuff won't work when it's freezing, it doesn't last when it's hot, and wind spreads it too thin too fast. They've got to get this stuff on you, or, get you to inhale it for it to work. They also have to get the concentration of chemicals high enough to kill or wound you. Too little and it's nothing, too much and it's wasted. What I hope you've gathered by this point is that a chemical weapons attack that kills a lot of people is incredibly hard to do with military grade agents and equipment so you can imagine how hard it will be for terrorists. The more you know about this stuff the more you realize how hard it is to use. We'll start by talking about nerve agents. You have these in your house, plain old bug killer (like Raid) is nerve agent. All nerve agents work the same way; they are cholinesterase inhibitors that mess up the signals your nervous system uses to make your body function. It can harm you if you get it on your skin but it works best if they can get you to inhale it. If you don't die in the first minute and you can leave the area you're probably gonna live. The military's antidote for all nerve agents is atropine and pralidoxime chloride. Neither one of these does anything to cure the nerve agent, they send your body into overdrive to keep you alive for five minutes, after that the agent is used up. Your best protection is fresh air and staying calm. Listed below are the symptoms for nerve agent poisoning. Sudden headache, Dimness of vision (someone you're looking at will have pinpointed pupils), Runny nose, Excessive saliva or drooling, Difficulty breathing, Tightness in chest, Nausea, Stomach cramps, Twitching of exposed skin where a liquid just got on you. If you are in public and you start experiencing these symptoms, first ask yourself, did anything out of the ordinary just happen, a loud pop, did someone spray something on the crowd? Are other people getting sick too? Is there an odor of new mown hay, green corn, something fruity, or camphor where it shouldn't be? If the answer is yes, then calmly (if you panic you breathe faster and inhale more air/poison) leave the area and head up wind, or, outside. Fresh air is the best "right now antidote". If you have a blob of liquid that looks like molasses or Kayro syrup on you; blot it or scrape it off and away from yourself with anything disposable. This stuff works based on your body weight, what a crop duster uses to kill bugs won't hurt you unless you stand there and breathe it in real deep, then lick the residue off the ground for while. Remember they have to do all the work, they have to get the concentration up and keep it up for several minutes while all you have to do is quit getting it on you/quit breathing it by putting space between you and the attack. Blood agents are cyanide or arsine which effect your blood's ability to provide oxygen to your tissue. The scenario for attack would be the same as nerve agent. Look for a pop or someone splashing/spraying something and folks around there getting woozy/falling down. The telltale smells are bitter almonds or garlic where it shouldn't be. The symptoms are blue lips, blue under the fingernails rapid breathing. The military's antidote is amyl nitride and just like nerve agent antidote it just keeps your body working for five minutes till the toxins are used up. Fresh air is the your best individual chance Blister agents (distilled mustard) are so nasty that nobody wants to even handle it let alone use it. It's almost impossible to handle safely and may have delayed effect of up to 12 hours. The attack scenario is also limited to the things you'd see from other chemicals. If you do get large, painful blisters for no apparent reason, don't pop them, if you must, don't let the liquid from the blister get on any other area, the stuff just keeps on spreading. It's just as likely to harm the user as the target. Soap, water, sunshine, and fresh air are this stuff's enemy. Bottom line on chemical weapons (it's the same if they use industrial chemical spills); they are intended to make you panic, to terrorize you, to heard you like sheep to the wolves. If there is an attack, leave the area and go upwind, or to the sides of the wind stream. They have to get the stuff to you, and on you. You're more likely to be hurt by a drunk driver on any given day than be hurt by one of these attacks. Your odds get better if you leave the area. Soap, water, time, and fresh air really deal this stuff a knock-out-punch. Don't let fear of an isolated attack rule your life. The odds are really on your side. Nuclear bombs. These are the only weapons of mass destruction on earth. The effects of a nuclear bomb are heat, blast, EMP, and radiation. If you see a bright flash of light like the sun, where the sun isn't, fall to the ground! The heat will be over a second. Then there will be two blast waves, one out going, and one on it's way back. Don't stand up to see what happened after the first wave; anything that's going to happen will have happened in two full minutes. These will be low yield devices and will not level whole cities. If you live through the heat, blast, and initial burst of radiation, you'll probably live for a very very long time. Radiation will not create fifty foot tall women, or giant ants and grass hoppers the size of tanks. These will be at the most 1 kiloton bombs; that's the equivalent of 1,000 tons of TNT. Here's the real deal, flying debris and radiation will kill a lot of exposed (not all!) people within a half mile of the blast. Under perfect conditions this is about a half mile circle of death and destruction, but, when it's done it's done. EMP stands for Electro Magnetic Pulse and it will fry every electronic device for a good distance, it's impossible to say what and how far but probably not over a couple of miles from ground zero is a good guess. Cars, cell phones, computers, ATMs, you name it, all will be out of order. There are lots of kinds of radiation, you only need to worry about three, the others you have lived with for years. You need to worry about "Ionizing radiation," these are little sub atomic particles that go whizzing along at the speed of light. They hit individual cells in your body, kill the nucleus and keep on going. That's how you get radiation poisoning, you have so many dead cells in your body that the decaying cells poison you. It's the same as people getting radiation treatments for cancer, only a bigger area gets radiated. The good news is you don't have to just sit there and take it, and there's lots you can do rather than panic. First; your skin will stop alpha particles, a page of a news paper or your clothing will stop beta particles, you just gotta try and avoid inhaling dust that's contaminated with atoms that are emitting these things and you'll be generally safe from them. Gamma rays are particles that travel like rays (quantum physics makes my brain hurt) and they create the same damage as alpha and beta particles only they keep going and kill lots of cells as they go all the way through your body. It takes a lot to stop these things, lots of dense material, on the other hand it takes a lot of this to kill you. Your defense is as always to not panic. Basic hygiene and normal preparation are your friends. All canned or frozen food is safe to eat. The radiation poisoning will not effect plants so fruits and vegetables are OK if there's no dust on em (rinse em off if there is). If you don't have running water and you need to collect rain water or use water from wherever, just let it sit for thirty minutes and skim off the water gently from the top. The dust with the bad stuff in it will settle and the remaining water can be used for the toilet which will still work if you have a bucket of water to pour in the tank. Finally there's biological warfare. There's not much to cover here. Basic personal hygiene and sanitation will take you further than a million doctors. Wash your hands often, don't share drinks, food, sloppy kisses, etc., ... with strangers. Keep your garbage can with a tight lid on it, don't have standing water (like old buckets, ditches, or kiddie pools) laying around to allow mosquitoes breeding room. This stuff is carried by vectors, that is bugs, rodents, and contaminated material. If biological warfare is so easy as the TV makes it sound, why has Saddam Hussein spent twenty years, millions, and millions of dollars trying to get it right? If you're clean of person and home you eat well and are active you're gonna live. Overall preparation for any terrorist attack is the same as you'd take for a big storm. If you want a gas mask, fine, go get one. I know this stuff and I'm not getting one and I told my Mom not to bother with one either (how's that for confidence). We have a week's worth of cash, several days worth of canned goods and plenty of soap and water. We don't leave stuff out to attract bugs or rodents so we don't have them. These people can't conceive a nation this big with this much resources. These weapons are made to cause panic, terror, and to demoralize. If we don't run around like sheep they won't use this stuff after they find out it's no fun. The government is going nuts over this stuff because they have to protect every inch of America. You've only gotta protect yourself, and by doing that, you help the country. Finally, there are millions of caveats to everything I wrote here and you can think up specific scenarios where my advice isn't the best. This letter is supposed to help the greatest number of people under the greatest number of situations. If you don't like my work, don't nit pick, just sit down and explain chemical, nuclear, and biological warfare in a document around three pages long yourself. This is how we the people of the United States can rob these people of their most desired goal, your terror. SFC Red Thomas (Ret) Armor Master Gunner Mesa, AZ Unlimited reproduction and distribution is authorized. Just give me credit for my work, and, keep in context. -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- From: James M. Atkinson Date: Fri Oct 8, 2004 5:37pm Subject: Re: October Program Kicked Off on Monday Morning Greg, As you are no doubt aware it causes severe impotence, erectile disfunction, and hair loss. You might want work with your doctor to modify your dosage to less than 10 mg. -jma At 11:25 PM 10/7/2004, Greg Horton wrote: >Lilly makes Prozac in 10mg tabs and I recommend one tab in the morning >and this should get you by. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9834 From: Mitch D Date: Fri Oct 8, 2004 11:57pm Subject: Re: [OT] Digital Video Recorders basic w no bells and whistles,go linux,8 or 9 chan units go from 900 and up,win based units are more,but have more features,better units typically have better practical compression capabilities ,without loss of quality in ref to saved images. better units will have higher quality video cards,as well as software that is feature rich. If your looking for good ptz control that supports multiple ptz's,youre going to get what you pay for..... everfocus,bosch,kalatel and I3 make decent units,i opt for win units for fast programming,and ease of setup. hope this helps,contact me off list if you desire more info __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 9835 From: Greg Horton Date: Fri Oct 8, 2004 6:09pm Subject: Re: October Program Kicked Off on Monday Morning Jim, How did you know that I shaved my head and use Levitra? We have never met! Greg 9836 From: kondrak Date: Sat Oct 9, 2004 9:05am Subject: Re: [OT] Digital Video Recorders thats right....copy their software, and you can build your own too...if you want a good computer build one, if you want the cheap crap they market overpriced, buy theirs. At 09:50 10/8/2004, you wrote: >Hi all, > >I'm in need of a digital video recorder, and last time I looked at the >market seriously it was all tape and a few really expensive digital units. >Now it seems anyone and everyone is slapping a DVR card inside a >bog-standard PC and calling it a DVR. Can anyone recommend a good-quality >unit, it doesn't need to do everything and cook breakfast, but ideally it >would have ethernet access to the live images and recordings, PTZ control >and minimum 8 input channels. I have seen a $500 PC with a $300 DVR card >being sold for over $4000, it's that bad (and confusing). > >Regards all, > >Mike > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9837 From: Andre Holmes <1ach@g...> Date: Sat Oct 9, 2004 8:38pm Subject: Emailing: cmltripodapps PORTABLE SATELLITE SYSTEMS Vislink Products - CML Tripod Flyaways Home | Products | Brands | Exhibitions | News | Downloads | Contacts You are in Products Portable Satellite CML Tripod Pages in this section Introduction Application photos Datasheets (PDF)* DST 140 DST 144 SNG 60/140DT * To open a PDF file you must use a PDF reader like Adobe Acrobat For more information: + 44 (0)1494 774400 sales@v... Iraq Afghanistan Vislink Communications [Non-text portions of this message have been removed] 9838 From: Andre Holmes <1ach@g...> Date: Sat Oct 9, 2004 9:08pm Subject: Emailing: portable satellite system The message is ready to be sent with the following file or link attachments: Shortcut to: http://www.vislink.com/products/portable.php Note: To protect against computer viruses, e-mail programs may prevent sending or receiving certain types of file attachments. Check your e-mail security settings to determine how attachments are handled. [Non-text portions of this message have been removed] 9839 From: contranl Date: Sun Oct 10, 2004 7:40am Subject: Interception capabilities 2000 (EC report on Echolon) . Good morning... I gues (not)everybody has read this: "Interception capabilities 2000" http://www.europarl.eu.int/stoa/publi/pdf/98-14-01-2_en.pdf (http://tinyurl.com/4lxds) This is an official report carried out for the European Commision in 2000. It deals with the "Echolon" network and the "alleged" use of it by the US and friends for militairy and industrial espionage... Yes i know it's old stuff but not outdated and makes very good reading... So i tried to upload it to the files section...but it was refused since it is to big. I consider this standard reading and it should be in the files section since it is not that easy to find if you don't know where to look for it (yes i know now). Maybe someone can cut it into 2 pieces (Pdf) and upload it ? Tnx 73's Tetrascanner 9840 From: kondrak Date: Sun Oct 10, 2004 1:08pm Subject: Re: Interception capabilities 2000 (EC report on Echelon) Thanks for re-posting this, I lost my copy from 1999 to a hard drive crash a few years back. Of course this is mandatory reading.... Good morning... >I gues (not)everybody has read this: > >"Interception capabilities 2000" 9841 From: Lou Novacheck Date: Sun Oct 10, 2004 0:59pm Subject: Re: Interception capabilities 2000 (EC report on Echolon) The URL is for Volume 2 only. The others are available at http://www.europarl.eu.int/stoa/publi/pdf/98-14-01-1_en.pdf http://www.europarl.eu.int/stoa/publi/pdf/98-14-01-3_en.pdf etc. contranl wrote: . Good morning... I gues (not)everybody has read this: "Interception capabilities 2000" http://www.europarl.eu.int/stoa/publi/pdf/98-14-01-2_en.pdf (http://tinyurl.com/4lxds) This is an official report carried out for the European Commision in 2000. It deals with the "Echolon" network and the "alleged" use of it by the US and friends for militairy and industrial espionage... Yes i know it's old stuff but not outdated and makes very good reading... So i tried to upload it to the files section...but it was refused since it is to big. I consider this standard reading and it should be in the files section since it is not that easy to find if you don't know where to look for it (yes i know now). Maybe someone can cut it into 2 pieces (Pdf) and upload it ? Tnx 73's Tetrascanner ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? vote.yahoo.com - Register online to vote today! [Non-text portions of this message have been removed] 9842 From: J. Coote Date: Sun Oct 10, 2004 2:04pm Subject: T-1 Logger Hello List While browsing, I came across a recording/logging device for T-1 lines. The site is: www.digital-loggers.com It might have a test application Jay 9843 From: Jonathan Young Date: Sun Oct 10, 2004 9:50pm Subject: Privacy in the age of computers Well, for what it's worth, there really is no real privacy in the age of computers. Our legislators, who don't really care about the Constitution are making it more and more easy for law enforcement to track our every move. Even in the intelligence reorganization bill, there is a provision for a massive database on us all. As if they don't already. TIA lives again! They are now moving to make drivers licenses as a national id card. It is a sad day for civil rights that are flying out the window, and which will never come back. Given the track record of our government, i don't trust them with my civil rights, much less the budget or any other matter. 9844 From: Date: Sun Oct 10, 2004 11:23am Subject: RE: Sweep needed Roger, Have not received a response from DC. My personal cell is 856 904-3607. Ed Steinmetz -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Wednesday, October 06, 2004 6:27 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Sweep needed Sweep needed for a Washington D.C. location. 3-4 offices and 3 cubicles. 7 phone lines. 7 computers. About 1800 sq ft Contact me by be-mail I am still on the road. Roger Tolces www.bugsweeps.com [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9845 From: satcommunitfive Date: Sun Oct 10, 2004 5:07am Subject: Re: [OT] Digital Video Recorders My 2c worth I used to use video but its so LOW RES even SVHS and all that... you cant pick out detail like Number plates etc. [Yes I know you can if you zoom in -alot] The compression is crap -who needs compression anyway It looses too much detail. OK for movies and basic stuff yes. After may years of testing I use a PC /capture card and motion sensing software. This gives me very hi-res images 720x576/24bit color I also use a color 620 line camera. Gives fantastic images and I can store a whole year on a 120G HDD ! And you can crank up the frame capture to .1+ of a second which almost looks like video anyway. M 9846 From: Date: Mon Oct 11, 2004 11:34am Subject: Re: Privacy in the age of computers Virginia is also doing a pilot for RFID technology embedded into VA licenses - the logic being that the Sept 11 hijackers used VA DLs. Apparently RFID can now prevent religious nuts from applying for licenses in their own name and driving airplanes into buildings. Thanks Wal Mart! ...... Original Message ....... On Mon, 11 Oct 2004 02:50:04 -0000 "Jonathan Young" wrote: > > > >Well, for what it's worth, there really is no real privacy in the age >of computers. Our legislators, who don't really care about the >Constitution are making it more and more easy for law enforcement to >track our every move. Even in the intelligence reorganization bill, >there is a provision for a massive database on us all. As if they >don't already. TIA lives again! They are now moving to make drivers >licenses as a national id card. It is a sad day for civil rights that >are flying out the window, and which will never come back. Given the >track record of our government, i don't trust them with my civil >rights, much less the budget or any other matter. > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > >. > 9847 From: contranl Date: Mon Oct 11, 2004 4:34pm Subject: North Korea has a special military squad of hacker-experts . North Korea has a special military squad of hacker-experts Date: October 11, 2004 North Korea has a special military squad of hacker-experts, it works on gathering information about South Korea. General Son Yun Kyn said in his feature about national security of NK. "Last time NK military authorities intensified computer trainings for recruits which will be appointed to hacker group, acted under "Korean Popular" he said. According to General Son Yun Kyn, the abilities of NK military can be compared with abilities of advanced countries. South Korea experts suppose that NK has 500-600 hacker-experts wich have passed a special 5-years training. The military report for SK parliament speaks: "abilities of NK military intelligence have reached level of advanced countries". NK military hackers have 5-years University education and are prepared to conduct cyber attacks against South Korea,USA and Japan. Finishing his report, General Son Yun Kyn said: "South Korea Governments have to apply hard forces to counteract cyber-threat launched by North Korea". source: http://www.crime-research.org/news/11.10.2004/699/ Tetrascanner www.tetrascanner.com 9848 From: Leanardo Date: Mon Oct 11, 2004 9:06am Subject: Telex wireless microphone system Has anyone looked at the Telex "SAFE" 1000 series wireless microphones? I have been reviewing systems like these as an option to replace the existing systems and try to "plug a few more holes." While not a perfect solution to prevent interception, I had found a 2.4GHz system that is digital and frequency hops but then read about the Telex system. The Telex system is a UHF system that operates in the 680 to 704 MHz, and 722 to 746 MHz band, carved up into 950 channels of 25 kHz each. What caught my eye on this system is the claim that it is "encrypted". When you look closer at the description you will see the vendor describes the unit to have "audio encryption." The following is copied from the vendor's specifications PDF: "The Telex S.A.F.E 1000 features audio frequency encryption technology. Each system is matched and assigned to its own security code, making it impossible for the RF signal to be intercepted by other receivers." Further under the specifications the vendor describes the encryption as: "32 bit (16 imbedded, 16 user assigned)" I have not had a chance to get one of these in to look at, but I was curious if anyone knew the technical side of the device. When I saw the term "audio encryption", plus the fact that this does not appear to be a digital system, I immediately thought "voice inversion." Supposedly this "encryption" was designed for the NFL and other professional sports where wireless communications are used. Thoughts? Thanks, Bruce : ) 9849 From: kondrak Date: Mon Oct 11, 2004 11:35pm Subject: Re: North Korea has a special military squad of hacker-experts I read this earlier on another group. Their country barely has electricity, and prob a single T3 for the entire country. Some Internet hackers, I'll put ours up against theirs any day. >North Korea has a special military squad of hacker-experts > >Date: October 11, 2004 > >North Korea has a special military squad of hacker-experts, it works >on gathering information about South Korea. >General Son Yun Kyn said in his feature about national security of >NK. "Last time NK military authorities intensified computer >trainings for recruits which will be appointed to hacker group, >acted under "Korean Popular" he said. > >According to General Son Yun Kyn, the abilities of NK military can >be compared with abilities of advanced countries. South Korea >experts suppose that NK has 500-600 hacker-experts wich have passed >a special 5-years training. > >The military report for SK parliament speaks: "abilities of NK >military intelligence have reached level of advanced countries". >NK military hackers have 5-years University education and are >prepared to conduct cyber attacks against South Korea,USA and Japan. > >Finishing his report, General Son Yun Kyn said: >"South Korea Governments have to apply hard forces to counteract >cyber-threat launched by North Korea". > >source: http://www.crime-research.org/news/11.10.2004/699/ > >Tetrascanner >www.tetrascanner.com > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9850 From: Cristian Date: Tue Oct 12, 2004 1:41am Subject: Re: North Korea has a special military squad of hacker-experts >I read this earlier on another group. >Their country barely has electricity, and prob a single T3 for the entire >country. >Some Internet hackers, I'll put ours up against theirs any day. > > >North Korea has a special military squad of hacker-experts Don't underestimate the military/police possibilities of a dictatorship. By the way, the squad can 'defect' and work as insiders from your advanced network. Cristian ---------- --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.733 / Virus Database: 487 - Release Date: 02/08/04 [Non-text portions of this message have been removed] 9851 From: Cristian Date: Tue Oct 12, 2004 1:57am Subject: Re: North Korea has a special military squad of hacker-experts Sorry, pushed Send by mistake. >I read this earlier on another group. >Their country barely has electricity, and prob a single T3 for the entire >country. >Some Internet hackers, I'll put ours up against theirs any day. Count, please, the power of a good salary and other material advantages in a starving country. It is a matter of 'live or die' for theirs families, not a matter of proud as with yours hackers. So, they are highly motivated, and a motivated enemy is an ENEMY. > > >North Korea has a special military squad of hacker-experts Don't underestimate the military/police possibilities of a dictatorship. By the way, the squad can 'defect' and work as insiders from your advanced network. Cristian ---------- --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.733 / Virus Database: 487 - Release Date: 02/08/04 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links --- Incoming mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.733 / Virus Database: 487 - Release Date: 02/08/04 ---------- --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.733 / Virus Database: 487 - Release Date: 02/08/04 [Non-text portions of this message have been removed] 9852 From: A Grudko Date: Tue Oct 12, 2004 3:45am Subject: RE: Privacy in the age of computers -----Original Message----- From: telos888@y... [mailto:telos888@y...] > Apparently RFID can now prevent religious nuts from applying for licenses in their own name and driving airplanes into buildings. I wonder if this will stop America's No. 1 religious nut from flying airplanes? Apparently the other way to stop him flying was to have him join the national guard as a pilot... Andy G Enjoying our first rain in 5 months Johannesburg, South Africa --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.764 / Virus Database: 511 - Release Date: 2004/09/15 [Non-text portions of this message have been removed] 9853 From: contranl Date: Tue Oct 12, 2004 6:38am Subject: New picture in the photos section (Bluesniper) . There's a new picture in the photo's section it's called "Bluesniper" wich shows a guy holding a antenna constructed of an old rifle +telescope and a yagi antenna for 2.4 Ghz The whole thing is used for what they call "Bluesnarfing" ...wich is "hacking" a Gsm phone with integrated Bluetooth. The hacking is done by contacting such a phone from a bluetooth enabled pc/laptop and some special software,in order to improve the range an external antenna connector is placed on the bluetooth card so a high gain antenna can be connected. Nothing special really but currently a hype in Europe since it was aired on various national tv networks (see links in my previous message about the subject) By the way i am looking for that software(Bluesnarfing) to "play" with it...if anyone knows where to download such a complete package i would be happy. Tnx Tetrascanner 9854 From: Leanardo Date: Tue Oct 12, 2004 6:43am Subject: Re: North Korea has a special military squad of hacker-experts You are somewhat correct about the NK infrastructure, but there is another country to their north and west who also maintains a very credible cyber-warfare asset. I feel pretty confidant that the two have a lot of "common ground" and willing to work together. Bruce --- In TSCM-L@yahoogroups.com, kondrak wrote: > I read this earlier on another group. > Their country barely has electricity, and prob a single T3 for the entire > country. > Some Internet hackers, I'll put ours up against theirs any day. > > > > >North Korea has a special military squad of hacker-experts > > > >Date: October 11, 2004 > > > >North Korea has a special military squad of hacker-experts, it works > >on gathering information about South Korea. > >General Son Yun Kyn said in his feature about national security of > >NK. "Last time NK military authorities intensified computer > >trainings for recruits which will be appointed to hacker group, > >acted under "Korean Popular" he said. > > > >According to General Son Yun Kyn, the abilities of NK military can > >be compared with abilities of advanced countries. South Korea > >experts suppose that NK has 500-600 hacker-experts wich have passed > >a special 5-years training. > > > >The military report for SK parliament speaks: "abilities of NK > >military intelligence have reached level of advanced countries". > >NK military hackers have 5-years University education and are > >prepared to conduct cyber attacks against South Korea,USA and Japan. > > > >Finishing his report, General Son Yun Kyn said: > >"South Korea Governments have to apply hard forces to counteract > >cyber-threat launched by North Korea". > > > >source: http://www.crime-research.org/news/11.10.2004/699/ > > > >Tetrascanner > >www.tetrascanner.com > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > 9855 From: satcommunitfive Date: Tue Oct 12, 2004 6:58am Subject: Re: New picture in the photos section (Bluesniper) what a tosser putting a beam antenna on a rifle mount. I saw this months ago.. And the media lapped it up like it was something new ? If he wore a silver jump suit maybe.... On the bluetooth subject> must be some bluetooth bugs comming out mmmm wonder if you can get two BT headsets to talk. [there down to $99 or so here in OZ] ps `bluetosser` software here> http://www.bluejackq.com/ m --- In TSCM-L@yahoogroups.com, "contranl" wrote: > > . > > There's a new picture in the photo's section > it's called "Bluesniper" wich shows a guy holding > a antenna constructed of an old rifle +telescope > and a yagi antenna for 2.4 Ghz > > The whole thing is used for what they call > "Bluesnarfing" ...wich is "hacking" a Gsm phone > with integrated Bluetooth. > > The hacking is done by contacting such a phone > from a bluetooth enabled pc/laptop and some > special software,in order to improve the range an > external antenna connector is placed on the bluetooth card > so a high gain antenna can be connected. > > Nothing special really but currently a hype > in Europe since it was aired on various national > tv networks (see links in my previous message about > the subject) > > By the way i am looking for that software(Bluesnarfing) > to "play" with it...if anyone knows where to > download such a complete package i would be happy. > > Tnx > > Tetrascanner 9856 From: Leanardo Date: Tue Oct 12, 2004 6:59am Subject: Re: New picture in the photos section (Bluesniper) Someone needs to contact the idiot who built that thing and tell them that you have "inside information" that the presidents support teams all have unsecured Bluetooth PDA's and cell phones and that he should try to "hack" into them the next time they visit near byÖ Bruce : ) --- In TSCM-L@yahoogroups.com, "contranl" wrote: > > . > > There's a new picture in the photo's section > it's called "Bluesniper" wich shows a guy holding > a antenna constructed of an old rifle +telescope > and a yagi antenna for 2.4 Ghz > > The whole thing is used for what they call > "Bluesnarfing" ...wich is "hacking" a Gsm phone > with integrated Bluetooth. > > The hacking is done by contacting such a phone > from a bluetooth enabled pc/laptop and some > special software,in order to improve the range an > external antenna connector is placed on the bluetooth card > so a high gain antenna can be connected. > > Nothing special really but currently a hype > in Europe since it was aired on various national > tv networks (see links in my previous message about > the subject) > > By the way i am looking for that software(Bluesnarfing) > to "play" with it...if anyone knows where to > download such a complete package i would be happy. > > Tnx > > Tetrascanner 9857 From: James M. Atkinson Date: Tue Oct 12, 2004 9:24am Subject: Mayonnaise and Coffee THE MAYONNAISE JAR AND COFFEE When things in your life seem almost too much to handle, when 24 hours in a day are not enough, remember the mayonnaise jar... and the coffee... A professor stood before his philosophy class and had some items in front of him. When the class began, wordlessly, he picked up a very large and empty mayonnaise jar and proceeded to fill it with golf balls. He then asked the students if the jar was full. They agreed that it was. The professor then picked up a box of pebbles and poured them into the jar. He shook the jar lightly. The pebbles rolled into the open areas between the golf balls. He then asked the students again if the jar was full. They agreed it was. The professor next picked up a box of sand and poured it into the jar. Of course, the sand filled up everything else. He asked once more if the jar was full. The students responded with a unanimous "yes." The professor then produced two cups of coffee from under the table and poured the entire contents into the jar, effectively filling the empty space between the sand. The students laughed. "Now," said the professor, as the laughter subsided, " I want you to recognize that this jar represents your life. The golf balls are the important things - your God, family, your children, your health, your friends and your favorite passions. Things that if everything else was lost and only they remained, your life would still be full. The pebbles are the other things that matter like your job, your house, and your car. The sand is everything else-the small stuff. "If you put the sand into the jar first," he continued, "there is no room for the pebbles or the golf balls. The same goes for life. If you spend all your time and energy on the small stuff, you will never have room for the things that are important to you. Pay attention to the things that are critical to your happiness. Play with your children. Take time to get medical checkups. Take your partner out to dinner. Play. Take care of your friends. There will always be time to clean the house and fix the disposal." Take care of the golf balls first, the things that really matter. Set your priorities. The rest is just sand." One of the students raised her hand and inquired what the coffee represented. The professor smiled. "I'm glad you! asked. It just to show you that no matter how full your life may seem, there's always room for a couple of cups of coffee with a friend." -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 9859 From: James M. Atkinson Date: Tue Oct 12, 2004 2:40pm Subject: Fwd: PI Ed Pankau, TX, passed away FYI >Cancer has taken a long-time friend and associate of many of us, Ed Pankau >(www.Pankau.com), aka 'Fast Eddie'. He and I had side-by-side columns >together >in PI Magazine for 10 years, and he was a popular PI instructor. > >He will be greatly missed. > > >John Grogan > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9861 From: Date: Tue Oct 12, 2004 6:15pm Subject: Re: Your product Your file is attached. [Non-text portions of this message have been removed] 9862 From: syndracit Date: Tue Oct 12, 2004 8:13pm Subject: Re: New picture in the photos section (Bluesniper) HAHAHAHAH BWAHAHAHAHAHAHAHA Dayum thats too funny man. I wonder if he'd try it. --- In TSCM-L@yahoogroups.com, "Leanardo" wrote: > > > Someone needs to contact the idiot who built that thing and tell them > that you have "inside information" that the presidents support teams > all have unsecured Bluetooth PDA's and cell phones and that he should > try to "hack" into them the next time they visit near byÖ > > Bruce : ) > > > --- In TSCM-L@yahoogroups.com, "contranl" wrote: > > > > . > > > > There's a new picture in the photo's section > > it's called "Bluesniper" wich shows a guy holding > > a antenna constructed of an old rifle +telescope > > and a yagi antenna for 2.4 Ghz > > > > The whole thing is used for what they call > > "Bluesnarfing" ...wich is "hacking" a Gsm phone > > with integrated Bluetooth. > > > > The hacking is done by contacting such a phone > > from a bluetooth enabled pc/laptop and some > > special software,in order to improve the range an > > external antenna connector is placed on the bluetooth card > > so a high gain antenna can be connected. > > > > Nothing special really but currently a hype > > in Europe since it was aired on various national > > tv networks (see links in my previous message about > > the subject) > > > > By the way i am looking for that software(Bluesnarfing) > > to "play" with it...if anyone knows where to > > download such a complete package i would be happy. > > > > Tnx > > > > Tetrascanner 9863 From: contranl Date: Wed Oct 13, 2004 10:41am Subject: State Prosecuter puts his loaded pc with the garbage ! . An important Justice department prosecutor in The Netherlands disposes of his fully loaded computer and puts it in the street together with other household waste to be picked up by the garbage collectors. According to the prosecutor his pc din't function well and he tought it had a virus. He did not remove any information stored on the harddisks. The prosecutor was working on several very high level criminal cases like the recent killings of top mafia-style criminals and fraude at the stock exchanges. the harddisks contained lots of emails to other department officials about these cases it also contained some passwords like the one to access his email. The pc was found by a taxidriver who then sold the pc to a tv station wich aired the whole story last week. The tv station showed some contens of what was stored on the pc and the nation was astonished...questions where asked in the parliament..the minister of justice responded that the prosecuter has made a very stupid mistake and proper measures where to be taken. 2 days later a website reveals that the prosecuters mailbox was hacked...they publish some current mails including those where he talks to his boss about the scandal. Yesterday the prosecuter announced his resignment from his current function ...he was not fired and the department is now looking for a position that involves less securty levels. (cleaning the toilets ?) Amazing isn't it ? Tetrascanner www.tetrascanner.com 9864 From: contranl Date: Wed Oct 13, 2004 10:51am Subject: Re: CCS Going Belly Up - Annual Report (Key Points) . A long story Jim...a little complicated for me as a foreigner to understand ...but does this mean that CCS and there assiociated businesses are going bankrupt very soon ? I was just going to buy one of there 400000 U$ Gsm-interceptors. :) Tetrascanner From: Thom Taylor Date: Wed Oct 9, 2002 3:11pm Subject: Leaving the group I am un-subscribing from the group. As a former Law Enforcement Officer (Local and Federal), I am not going to waist my time with people who obviously have some hard-on for law enforcement. These are usually people who tried to be a cop, and did not make the cut, so they have a chip on their shoulder. I will spend my time interacting with professionals in other groups 6364 From: spyworldltd Date: Wed Oct 9, 2002 3:49pm Subject: The Six P's Keep it simple guys... Prior Preparation Prevents Piss Poor Performance cheers David Emery Spyworld Ltd Tel 08701 206185 Fax 08701 206186 web www.spyworld.co.uk 6365 From: Matt Paulsen Date: Wed Oct 9, 2002 3:47pm Subject: RE: Jane's Intel Digest Not worth it. Maybe they give out free trade subscriptions like CMP does, don't know though. -----Original Message----- From: Mitch Davis [mailto:MitchD@t...] Sent: Wednesday, October 09, 2002 8:36 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Jane's Intel Digest Was wondering if anyone on the list, that has a subscription to Jane's Intelligence Digest,(monthly Printed Version)could tell me if it's actually worth $450.00 a year?I was interested in it, but it reminded me of a collation of news reports........ Thanks! MD ----------------------------------------------------------- Mitch Davis TSCM/Special Operations Group,Inc. (615) 837 9933 cell (615) 584 9933 e mail: MitchD@t... website www.tscmusa.com Nashville,TN.USA ----------------------------------------------------------- [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6366 From: kondrak Date: Wed Oct 9, 2002 8:33pm Subject: Telephone FYI >> >>Wiretapping "Back Doors" Compromise Telephone Privacy >> >> >> >>By Mark Nestmann >> >> >> >>A law designed to make it easier for police to wiretap telephone >>conversations has given foreign intelligence agencies, organized >>crime, and perhaps terrorists, secret "back doors" into U.S. >>telecommunications networks. The back doors can be used to monitor >>telephone subscriber information and billing data and even detect the >>presence of wiretaps. >> >> >> >> >>These stunning revelations come from media reports that indicate that >>since the mid-1990s, Israeli intelligence has been able to tap data >>flowing from the State Department and the White House, among other >>targets. As part of this operation, Israel supposedly monitored e- >>mails from then President Clinton.26 An even more disturbing story >>appeared in December 2001. Fox News reported that the U.S. National >>Security Agency, America's largest intelligence agency, had warned >>that records of telephone calls placed throughout the United States >>were being diverted to foreign intelligence services and perhaps >>other unauthorized parties. In some circumstances, unauthorized >>parties could detect wiretaps placed by U.S. law enforcement.27 >> >> >> >>This unprecedented compromise of the U.S. telecommunications system >>was made possible by the requirements mandated by Congress in a 1994 >>law, the "Communications Assistance for Law Enforcement Act" (CALEA). >>The law requires telephone manufacturers and companies producing >>technology for telephone networks to install "back doors" in their >>equipment to permit U.S. law enforcement and intelligence agencies to >>monitor U.S. telecommunications networks. >> >> >> >>In enacting CALEA, Congress ignored the warnings of security experts >>who warned that inserting technology mandating surveillance into >>telecommunications networks would lead to unauthorized intrusions. >>Indeed, the U.S. General Services Administration, the agency >>responsible for equipment procurement for the federal government, >>commented that the proposal could "adversely affect national >>security." 28 This warning turned out to be devastatingly accurate. >> >> >> >>How to Wiretap the White House and the FBI >> >> >> >>Insight Magazine has revealed a FBI probe into allegations that the >>government of Israel has penetrated White House telephone lines and >>can convey conversations as they occur to Israel for analysis. >>Similar intrusions were alleged to have occurred at the State >>Department, the Pentagon and, into secret lines used by the FBI in >>its counterintelligence work, including its investigation of the >>Israeli operation. >> >> >> >>The businesses installing the wiretapping equipment and software >>mandated by CALEA have continuing access to telephone company >>computers, supposedly for testing and servicing purposes. One such >>firm is an Israeli company called AMDOCs, which provides directory >>assistance and billing services for all major U.S. phone companies. >>In this capacity, AMDOCs has access to records of virtually every >>call dialed in the United States. >> >> >> >>AMDOCs billing programs are developed with the assistance of the U.S. >>Central Intelligence Agency. The FBI discovered that an AMDOCs >>subcontractor on such a project was married to an employee of the >>Israeli Embassy in Washington, D.C. In a search of the >>subcontractor's office, the agency found "a list of the FBI's most >>sensitive telephone numbers, including the Bureau's 'black' lines >>that FBI counterintelligence used to keep track of the suspected >>Israel spy operation." >> >>As many as 140 Israelis have been detained or arrested in a >>continuing FBI investigation into this operation. But because of its >>political sensitivity, the probe has occurred in almost complete >>secrecy. >> >> >> >>It gets worse. Organized crime groups can reportedly monitor U.S. >>telephone networks as well. In an investigation of drug trafficking >>in 1997, call detail information was, according to Fox News, used >>to "completely compromise the communications of the FBI, the Secret >>Service, the DEA and the LAPD...The ring was able to track all calls >>placed to and from the investigators' beepers, cell phones...even >>their home phone numbers." >> >> >> >>Concerns that the U.S. telecommunications system may be compromised >>were renewed in the wake of the attacks of September 11, 2001. In the >>9/11 investigation, some suspects have been apparently been able to >>detect FBI wiretaps. This has been inferred from the fact that they >>change their telephone usage patterns as soon as a wiretap is >>installed. >> >> >> >>Four Ways to Reclaim Telephone Privacy >> >> >> >>Due to the misguided insistence by law enforcement and Congress to >>install back doors in telephone equipment, unauthorized third parties >>have hijacked the U.S. telecommunications system. Your billing >>records and possibly your conversations are at risk. To reduce your >>vulnerability, follow these suggestions: >> >>1. Use public telephones. Make confidential calls from public >>telephones. Use a network of pay phones, not just one. Unfortunately, >>many payphones no longer accept incoming calls. The best way to deal >>with this problem is to have persons you wish to call page you when >>they are ready to receive your call. Then call back from a public >>telephone to a pre-arranged number. >> >> >> >>2. Obtain an anonymous voice mailbox. This is a great way to have >>a "local" phone number without obtaining local service. Almost no >>voice mailbox provider will need confirmation of your identity. >>Callers will usually believe that they have reached an answering >>machine. You can retrieve these messages, or change your outgoing >>message, from any touch-tone phone. Use a payphone to retrieve your >>messages. >> >>3. Obtain anonymous telephone service. For about a 50% premium over >>the local Bell provider, you can obtain local phone service without a >>credit check and in many cases without showing proof of identify. >>While such companies target persons with poor credit, the service is >>attractive to privacy-seekers. You simply provide the company >>your "name," the address at which you wish service to be connected, >>and pay the hook-up fee. One major provider of this service is >>Ameritel, which does business under the name 1-800-RECONEX: (800) 732- >>6639. You can set up service at any participating Quick-Cash store. >> >>4. Purchase anonymous cellular service. This is possible by pre- >>paying for the service. One of the most popular services is >>called "Cricket." For US$32.95 a month, you obtain unlimited local >>phone service. And you can purchase pre-paid long distance service >>for eight cents per minute. > 6367 From: kondrak Date: Thu Oct 10, 2002 4:02am Subject: More bad news.. FBI agents illegally videotaped suspects, intercepted e-mails without court permission and recorded the wrong phone conversations during sensitive terrorism and espionage investigations, according to an internal memorandum detailing serious lapses inside the FBI more than a year before the Sept. 11 attacks. http://www.sfgate.com/cgi-bin/article.cgi?f=/news/archive/2002/10/09/national1632EDT0740.DTL No bashing intended, merely the news.... 6368 From: Damien O'Rourke Date: Wed Oct 9, 2002 5:18pm Subject: Re:Infrared-Lasar intercept eliminators I really don't know anything about this but I was just wondering if it would be possible to build some sort of IR jammer. You hear about jamming radio signals in Electronic warfare, so why can't it be done at the frequencies (or should I say wavelengths) of IR light? It obviously isn't a practical solution as the cost of building one would probably be too much?? Just as a theoretical idea though... Again its only a thought I had. I had a quick look and saw this site if your interested in building one of listening devices though! At least its supposed to work... http://hot.ee/nuhk/laser.html 6369 From: Monty Date: Thu Oct 10, 2002 0:26am Subject: Re: Re; infrared laser THANK YOU KIRK !!! Everyone kept talking about the window. But as you said, the window is normally not the target of choice. We have found in practical use that normally the window is very difficult. You always had to deal with the outside noise along with the building noise. As long as the operator can see something (almost anything) inside that can vibrate to noise (soda can, post-it note, paper tacked to wall, coffee cup, etc, etc, etc, etc) you have not protected the area. Thanks Kirk Monty --- Kirk Adirim wrote: > Modulating the window with white/pink noise and/or > music is a fine idea if > you assume that the enemy is bouncing a beam off the > window pane. However > Real world laser eavesdropping is more sophisticated > than that. A reflective > surface, coating or microprisms are left behind on > walls, ceilings, fixtures > or other objects Inside the target room (even > hairspray works). A window is > just a portal to pass the beam through on it's way > to and from the > reflective surface (the glass of a picture frame, > the frame, the picture, or > the wall itself can be used). > The reflective surface doesn't have to be bright and > shiny to our eyes, it > can be optically dull and flat in the visible > spectrum. As long as it's > reflective at the wavelength being used by the > laser, and that doesn't > necessarily mean it's in the Infrared spectrum. > Final analysis..... Buy the curtains and modulate > them with a fan or small > vibrating motor. > > Kirk > www.tactronix.com > > > [Non-text portions of this message have been > removed] > > __________________________________________________ Do you Yahoo!? Faith Hill - Exclusive Performances, Videos & More http://faith.yahoo.com 6370 From: Steve Uhrig Date: Thu Oct 10, 2002 10:14am Subject: Foreign Caller ID As a point of interest, Caller ID is now coming in on my office phones from other countries. This morning I have gotten a call from Bogota, one from somewhere in Chile and one from Dubai, UAE. All showed the country codes as the area code, and the correct phone number of the caller. I had never seen (or noticed) this before. International Caller ID would be a nice feature. Next we'll have to have a field for COUNTRY since there are so many oddball country codes and they keep changing city codes. It's like fifteen digits to dial London now. Apparently the switches in the other countries now are sending CID info, and the low data rate (1200 baud?) is transmitted all the way to the destination tellyphone. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6371 From: Steve Uhrig Date: Thu Oct 10, 2002 5:37pm Subject: Anyone in the Reno area? who would be willing to give a lunatic the warm fuzzies and maybe do a cursory look at suspected electronic harrassment? I wouldn't bother, except the fellow claims to have 30 videotapes of things happening. Contact me off list if you are interested and I will give you his email address and you take it from there. Anyone responding, please be kind. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6372 From: The Protector Date: Thu Oct 10, 2002 4:21pm Subject: Re: The Six P's Without the seventh "P" the rest is still subject to being screwed up! Proper Prior Preparation Prevents Piss Poor Performance ===== Leopold T. Altman III Member IAPPA, ABA, IALEFI, ASLET, PMA, INEOA, etc... American Institute of Executive Protection http://www.americanexecprotection.com AIEP@s... Because chance favours the prepared mind! Newsletters: http://aiep1.bravepages.com __________________________________________________ Do you Yahoo!? Faith Hill - Exclusive Performances, Videos & More http://faith.yahoo.com 6373 From: Hawkspirit Date: Fri Oct 11, 2002 0:14pm Subject: Smart Dust >Subject: Smart Dust > >http://robotics.eecs.berkeley.edu/~pister/SmartDust/ > >The science/engineering goal of the Smart Dust project is to demonstrate >that a complete sensor/communication system can be integrated into a cubic >millimeter package. This involves both evolutionary and revolutionary >advances in miniaturization, integration, and energy management. We aren't >targeting any particular sensor, in fact there is no direct funding for >sensor research in the project (but we've got quite a few to choose from >based on a decade or two of outstanding MEMS work at Berkeley and elsewhere). >We're funded by DARPA, so we will demonstrate Smart Dust with one or more >applications of military relevance. In addition, we're pursuing several >different applications with commercial importance, and we've got a long >list of applications to work on if we only had the time. Here's a sampling >of some possible applications, in no particular order: 6374 From: Date: Fri Oct 11, 2002 10:01am Subject: World's greatest computer hacker raises alarm World's greatest computer hacker raises alarm Barred from writing about his own case for 10 years, Kevin Mitnick describes classic computer crimes ‚Äì and how to thwart them By Simson Garfinkel Kevin Mitnick may have been the greatest computer hacker the world has ever known. At least, the FBI treated him that way. In the 1980s, Mitnick allegedly broke into computer systems belonging to Pacific Bell, Digital Equipment, and the North American Air Defense Command. In the 1990s, Mitnick became the subject of a nationwide manhunt by the FBI. The New York Times ran a front-page story about his alleged attempts to steal cellular telephone software on July 4, 1994. He was finally apprehended by computer expert Tsutomu Shimomura on Feb. 15, 1995. Mitnick was held in jail for four years without facing trial because his attorney never had a chance to review the government's evidence against him. It was repeatedly withheld on the grounds that releasing it would compromise national security. Meanwhile, three books were published on Mitnick's capture ‚Äì including one by Shimomura and John Markoff, The New York Times reporter who many say stepped over ethical lines and participated in the investigation. Disney and Miramax produced a movie on the caper. It premi√®red in France but was shut down by a combination of protests and a lawsuit. In the meantime, Mitnick's case became a cause c√©l√®bre among many in the shadowy world of the computer underground. When The New York Times website was hacked in September 1998, the hacker's message was that Mitnick had been unfairly targeted. Dozens of websites devote themselves to the treatment that Mitnick has received. Many others debunk the government's assertion that he was personally responsible for more than $80 million in corporate losses. This backstory is critically important for understanding Kevin Mitnick's first book, "The Art of Deception," in which the reformed hacker- turned-security-consultant explains in painstaking detail how the reliance on modern communications technology has made US businesses more vulnerable to 19th-century style cons and swindles. His book contains roughly two dozen case studies of "social engineering" in which a hacker successfully identifies a piece of information, gets it, and then vanishes. One such story describes how a man named Rick Daggot showed up one day at a small startup robotics company for a meeting with the company's founder and vice president. Daggot was friendly and well-dressed and claimed to be joining the company's team. There was just one problem: The founder wasn't in town; Daggot had inadvertently come on the wrong day. Trying to make the most of a bad situation, Daggot offered to take the company's receptionist and a few engineers out for lunch. Over drinks they talked about ‚Äì what else ‚Äì the company's top-secret project. A few days later, Daggot called back, saying that he was in touch with the founder, and that copies of several key documents should be sent to the founder's new e-mail account, the only one he could get working while he was traveling. Of course, the whole thing was a ruse. The founder was traveling, but Daggot worked for the competition. Having gained the trust of a few engineers and gotten the documents he needed, Daggot disappeared. When the founder returned, he called in the police, but was told that no crime had taken place. A few months later, the competitor announced a product that was nearly identical to the one described by the stolen documents. Daggot's story is a good one, and there are a lot of them in "The Art of Deception." But alas, all of these stories have the same problem: None of them is true. Under the terms of Mitnick's plea bargain, he's prohibited from selling his story for 10 years. As a result, this book shines no light on the crimes that Mitnick allegedly perpetrated ‚Äì or on the government's alleged excesses in prosecuting him. Ironically, it's Mitnick's reputation as a deceiver that gives him the credibility and even the moral authority to write this book. In interviews, Mitnick has confirmed that many of these stories are based on exploits from his past. Although some will accuse Mitnick of creating a handbook that teaches crooks how to break into organizations, the truth is that we all need to understand these con games to protect against them. To stress this point, his last two chapters contain policies, procedures, and training that companies can implement to further protect themselves. In keeping with his premise that the most damaging security penetrations are the result of deceit ‚Äì not technical penetration ‚Äì almost none of Mitnick's suggestions is technical in nature. The most important recommendation is that when somebody contacts you claiming to be from your organization, you need to verify that they are working for your organization ‚Äì no matter whether they are asking for your help, offering to help you, or just trying to be friendly. A more controversial suggestion is that organizations should launch simulated "social engineering attacks" on their own employees. Although the training would be invaluable, Mitnick acknowledges that some companies might not want to intentionally lie to their employees. "Nine out of every 10 large corporations and government agencies have been attacked by computer intruders," states Mitnick, basing his analysis on the Computer Security Institute's annual survey. Let's hope that if they implement the strategies in this book, companies that are attacked won't be so easily penetrated. ‚Ä¢ Simson Garfinkel is a graduate student at the MIT Laboratory for Computer Science, and the author of numerous books on computers, security, and privacy. The Art of Deception: Controlling the Human Element of Secrecy By Kevin Mitnick John Wiley & Sons304 pp., $27.50 6375 From: R. Snyder Date: Fri Oct 11, 2002 9:46am Subject: RE: Foreign Caller ID Caller ID info is transmitted over the subscriber loop using 300-baud FSK Bell 103 modem tones. However, the Caller ID info is passed before an actual voice circuit is established, so Caller ID info is passed inter-office via SS7. Presumably, other countries not only have SS7 international trunks (which is to be expected), but are also upgrading their local switches to pass the necessary calling party ID on to the SS7 international trunks. To add some relevancy to TSCM, these changes are generally beneficial, as in-band communications beyond the CO are inhibited unless a phone is actually off-hook, which helps thwart hookswitch bypass, infinity transmitter, and phreaker's black box usage beyond the local CO. I am not aware of any successful attempts to co-opt SS7 or Caller ID protocols to convey non-signalling-related information. __________________________________________________ Do you Yahoo!? Faith Hill - Exclusive Performances, Videos & More http://faith.yahoo.com 6376 From: A.Lizard Date: Fri Oct 11, 2002 4:07pm Subject: Re: Re; infrared laser At 10:44 AM 10/11/02 +0000, you wrote: Wouldn't the "vibrate the window" solutions jam any attempt to use a separate reflector put inside the room, both by randomising the beam placement within the room due to the refractivity of the glass being physically moved by the glass vibrations and by putting a secondary modulation onto the IR beam in both directions which would *not* necessarily be cancelled out via bi-directional passage through the glass? A.Lizard >Message: 2 > Date: Wed, 9 Oct 2002 22:26:57 -0700 (PDT) > From: Monty >Subject: Re: Re; infrared laser > >THANK YOU KIRK !!! > >Everyone kept talking about the window. But as >you said, the window is normally not the >target of choice. We have found in practical use >that normally the window is very difficult. You >always had to deal with the outside noise along >with the building noise. As long as the operator >can see something (almost anything) inside that >can vibrate to noise (soda can, post-it note, paper >tacked to wall, coffee cup, etc, etc, etc, etc) >you have not protected the area. > > >Thanks Kirk >Monty > >--- Kirk Adirim wrote: > > Modulating the window with white/pink noise and/or > > music is a fine idea if > > you assume that the enemy is bouncing a beam off the > > window pane. However > > Real world laser eavesdropping is more sophisticated > > than that. A reflective > > surface, coating or microprisms are left behind on > > walls, ceilings, fixtures > > or other objects Inside the target room (even > > hairspray works). A window is > > just a portal to pass the beam through on it's way > > to and from the > > reflective surface (the glass of a picture frame, > > the frame, the picture, or > > the wall itself can be used). > > The reflective surface doesn't have to be bright and > > shiny to our eyes, it > > can be optically dull and flat in the visible > > spectrum. As long as it's > > reflective at the wavelength being used by the > > laser, and that doesn't > > necessarily mean it's in the Infrared spectrum. > > Final analysis..... Buy the curtains and modulate > > them with a fan or small > > vibrating motor. > > > > Kirk > > www.tactronix.com > > > > > > [Non-text portions of this message have been > > removed] > > > > > > >__________________________________________________ >Do you Yahoo!? >Faith Hill - Exclusive Performances, Videos & More >http://faith.yahoo.com > ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "Those who would trade liberty for security shall have neither." Benjamin Franklin Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... PGP 7.0.3 key available by request,keyserver,or on my Web site Download PGP from http://www.pgpi.org for e-mail privacy. PGPfone v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ Disaster prep info: http://www.ecis.com/~alizard/y2k.html ************************************************************************ 6377 From: Fernando Martins Date: Sat Oct 12, 2002 0:53pm Subject: RE: World's greatest computer hacker raises alarm "World's greatest computer hacker" should be corrected to "World's greatest known computer criminal" If I know how to pass alarm and access control systems, that makes me a thief? "The Art of Deception: Controlling the Human Element of Secrecy By Kevin Mitnick" Where is the elite art of deception and secrecy if he was in jail for lack of both? "In the 1980s, Mitnick allegedly broke into computer systems" ... Allegedly? Yeah, right ... In some site, so years ago, it was something like this, regarding Mitnick: "At the same time, in some IRC network some guys just keep a huge smile ... They got the world's greatest hacker ..." ""Nine out of every 10 large corporations and government agencies have been attacked by computer intruders," states Mitnick, basing his analysis on the Computer Security Institute's annual survey." I just wich that some day Mr. Richard Power write a book with the rest of what he knows ... Like, about all the other hackers that the world don't know ... FM 6378 From: kondrak Date: Sat Oct 12, 2002 4:15pm Subject: Re: RE: Foreign Caller ID Correct, SS7 is sent via inter-machine circuits, and is thus "out-of-band" signalling, and not available to the end user. Its relatively safe, you'd have to hack into the switch and then the SS7 circuits. > I am not aware of any successful >attempts to co-opt SS7 or Caller ID protocols to >convey non-signalling-related information. 6379 From: Steve Uhrig Date: Sat Oct 12, 2002 8:18pm Subject: Our friendly neighborhood sniper - some observations This matter refers to the sniper operating in the MD suburbs of DC and in the Northern VA area. Eight deaths as I write this. Upon doing an independent analysis over the last few days, I happened to notice the fact that EACH county or jurisdiction where a shooting took place was an area NOT covered by a digital public safety radio system. Digital radio systems cannot be monitored by scanners or anyone without extensive authorized knowledge of the communications system. In other words, monitoring is not possible realistically in those jurisdictions. Some areas in Fairfax County, for example, do have arrangements to allow the press and others approved by the police dept to purchase their own digital radio and have it programmed to monitor only certain general dispatch services (talkgroups). Analog (older) two way radio systems however, were used in EACH AND EVERY jurisdiction where a shooting occurred. Analog communications, including analog trunking, can be monitored on inexpensive scanners widely available from Radio Shack and elsewhere. This may indicate the shooter monitors public safety transmissions on a scanner and should be a valuable piece of information. If he can't monitor them (meaning in an area served by digital), he apparently stays away. Due to the proliferation of digital systems, this info might help in profiling areas where he/she/it is likely to strike again. No sense wasting resources where they are not needed. I don't have any contacts to share this observation with. If any MISA members are working the case and have a connection with someone who matters, this snippet of information probably would be quite valuable. Simply forward this email or print it and hand deliver. My contact info is in my signature. Of course, this could be pure coincidence, but I seriously doubt it. If I were the FBI, I would map each shooting, and indicate the exact type of commo system used by public safety in that jurisdiction. Then I would map all neighboring jurisdictions where analog still is in use. Those areas where analog still is being used are, in my opinion, far more likely to be target areas than where digital is implemented and where proactive resources should be deployed. Another point for the profile: the sniper almost certainly is using a scanner and probably has some technical/communications background, possibly even public safety. I could go into more detail on the type of scanner if anyone feels this info is useful. I would need the info on the commo systems in each jurisdiction described above. A federal technoweenie will be able to read between the lines on all this and would not need any input from me to understand exactly what I am saying. If this guy isn't picked up, there may be no Halloween activity in this area of Maryland which would disappoint kids and dentists. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6380 From: frost_bitten_ca Date: Sat Oct 12, 2002 8:12am Subject: Coming soon to a theatre near you - endless mischief potential We've heard hypersonic sound. It could change everything. by Suzanne Kantra Kirschner It's the most promising audio advance in years, and it's coming this fall: Hypersonic speakers, from American Technology (headed by the irrepressible Woody Norris, whose radical personal flying machine appeared on our August cover), focus sound in a tight beam, much like a laser focuses light. The technology was first demonstrated to Popular Science five years ago ("Best of What's New," Dec. '97), but high levels of distortion and low volume kept it in R&D labs. When it rolls out in Coke machines and other products over the next few months, audio quality will rival that of compact discs. The applications are many, from targeted advertising to virtual rear- channel speakers. The key is frequency: The ultrasonic speakers create sound at more than 20,000 cycles per second, a rate high enough to keep in a focused beam and beyond the range of human hearing. As the waves disperse, properties of the air cause them to break into three additional frequencies, one of which you can hear. This sonic frequency gets trapped within the other three, so it stays within the ultrasonic cone to create directional audio. Step into the beam and you hear the sound as if it were being generated inside your head. Reflect it off a surface and it sounds like it originated there. At 30,000 cycles, the sound can travel 150 yards without any distortion or loss of volume. Here's a look at a few of the first applications. 1. Virtual Home Theater How about 3.1-speaker Dolby Digital sound? With hypersonic, you can eliminate the rear speakers in a 5.1 setup. Instead, you create virtual speakers on the back wall. 2. Targeted Advertising "Get $1 off your next purchase of Wheaties," you might hear at the supermarket. Take a step to the right, and a different voice hawks Crunch Berries. 3. Sound Bullets Jack the sound level up to 145 decibels, or 50 times the human threshold of pain, and an offshoot of hypersonic sound technology becomes a nonlethal weapon. 4. Moving Movie voices For heightened realism, an array of directional speakers could follow actors as they walk across the silver screen, the sound shifting subtly as they turn their heads. 5. Pointed Messages "You're out too far," a lifeguard could yell into his hypersonic megaphone, disturbing none of the bathing beauties nearby. 6. Discreet Speakerphone With its adjustable reach, a hypersonic speakerphone wouldn't disturb your cube neighbors. http://www.popsci.com/popsci/science/article/0,12543,351353,00.html 6381 From: Gregory Perry Date: Sat Oct 12, 2002 9:45am Subject: Re: RE: Foreign Caller ID Right, SS7 is out of band signalling - there are some potential issues with Call Waiting CLID, however. SS7 is also very TCP/IP-like in nature, so a lot of the same vulnerabilities apply (on the network side); sequence number prediction, spoofing attacks etc. --------------------------------- "Seekers there are in plenty: but they are almost all seekers of personal advantage. I can find so very few Seekers after Truth." (Sa'adi) The following message was sent by "R. Snyder" on Fri, 11 Oct 2002 07:46:18 -0700 (PDT). > Caller ID info is transmitted over the subscriber loop > using 300-baud FSK Bell 103 modem tones. However, the > Caller ID info is passed before an actual voice > circuit is established, so Caller ID info is passed > inter-office via SS7. Presumably, other countries not > only have SS7 international trunks (which is to be > expected), but are also upgrading their local switches > to pass the necessary calling party ID on to the SS7 > international trunks. > > To add some relevancy to TSCM, these changes are > generally beneficial, as in-band communications beyond > the CO are inhibited unless a phone is actually > off-hook, which helps thwart hookswitch bypass, > infinity transmitter, and phreaker's black box usage > beyond the local CO. I am not aware of any successful > attempts to co-opt SS7 or Caller ID protocols to > convey non-signalling-related information. > > __________________________________________________ > Do you Yahoo!? > Faith Hill - Exclusive Performances, Videos & More > http://faith.yahoo.com > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6382 From: kondrak Date: Sun Oct 13, 2002 5:56am Subject: Under the Kremlin : > >CIA Kremlin bug 'saved Gorbachev' > >The newly revealed exploits of spies who operated in underground tunnels > >Nick Paton Walsh in Moscow >Sunday October 13, 2002 >The Observer > >The CIA dug a tunnel under the Kremlin and installed a hi-tech bugging >system to eavesdrop on the Soviet Union's most senior figures, according >to the former US intelligence officer who executed the plan. > >The device was put in by a US agent who had to wear a protective suit >and was guided by satellite and sonar images of Moscow's underground. >The bugging formed part of audacious operations to rescue a key >defector, a KGB officer with responsibility for eavesdropping, and to >alert Boris Yeltsin to the attempted coup against Mikhail Gorbachev. > >This wasn't part of the Cold War - the intrusion into the seat of Soviet >power occurred in 1989, when Washington and Moscow were trying to smooth >relations. > >'The stories about a five-level city beneath Moscow are true,' said Tony >Mendes, a former Moscow-based CIA technical officer, now retired. 'These >are tunnels from ancient times - Ivan the Terrible did a lot of digging >and torturing. But some of the tunnels were recently made.' > >An agent, whom Mendes refuses to say worked for the US government, >entered the tunnel system one night equipped with computer guidance >systems, air filters and maps. He negotiated the sewer and metro system >to reach tunnels running under the Kremlin. One of these passed directly >beneath the nerve centre of the 16th Directorate, the KGB's electronic >ears, which also dealt with state communications. > >That night Mendes was in the Kremlin theatre attending a performance of >the ballet Koppelia. The audience also included a US mole in the 16th >Directorate, 'Major Peter Leonov', and his wife. Two of the ushers were >CIA agents in disguise. > >When the Russian couple went to the toilet during the interval, they >were joined by the two agents, who donned disguises to make them look >like Leonov and his wife and returned to the couple's seats. The >Leonovs, now dressed as the ushers went to the service lifts. > >They went to a tunnel entrance to meet the subterranean agent. Leonov >then reportedly showed the agent where to plant the listening device in >the communication system. > >The Leonovs left the Soviet Union days later on a ferry from one of the >Baltic states. > >Mendes claims the eavesdropping device was instrumental in thwarting the >coup in August 1991, when Gorbachev was detained at his dacha by the >military. President George Bush Senior and Prime Minister John Major >called Yeltsin to urge him to stand up to the army. > >'How do you think they knew about all this?' said Mendes. However, >Russian moles in US intelligence betrayed Mendes's network. > >'For years we were mining high-grade gold,' he said. 'But things started >going awry in 1985. We thought we knew what the KGB was doing, but then >our group of 25 started being caught and executed. > >'This all had to do with Aldrich Ames and Robert Hanssen [Russian moles >in the CIA's Russia department and the FBI's intelligence unit], but we >did not find out until years later.' > >Guardian Unlimited © Guardian Newspapers Limited 2002 6383 From: Date: Sun Oct 13, 2002 2:56pm Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County, San Francisco, Silicon Valley, San Jose, San Diego, and Las Vegas. (Also, anywhere in a thousand mile radius from Los Angeles.) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 6384 From: Date: Sun Oct 13, 2002 2:56pm Subject: File - mission.txt TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6385 From: Dave Emery Date: Sun Oct 13, 2002 1:35am Subject: Re: Our friendly neighborhood sniper - some observations On Sat, Oct 12, 2002 at 09:18:26PM -0400, Steve Uhrig wrote: > This matter refers to the sniper operating in the MD suburbs of DC > and in the Northern VA area. Eight deaths as I write this. > > Upon doing an independent analysis over the last few days, I happened > to notice the fact that EACH county or jurisdiction where a shooting > took place was an area NOT covered by a digital public safety radio > system. > > Digital radio systems cannot be monitored by scanners or anyone > without extensive authorized knowledge of the communications system. > In other words, monitoring is not possible realistically in those > jurisdictions. Some areas in Fairfax County, for example, do have > arrangements to allow the press and others approved by the police > dept to purchase their own digital radio and have it programmed to > monitor only certain general dispatch services (talkgroups). > Your information is very interesting and matches what I myself have speculated but not known as I don't live down there... However I think you may exaggerate the difficulty of obtaining access to unencrypted APCo-25 (and even EDACS) public safety digital radio systems. Quite a few serious hobbyists and media types have programmed radios purchased on eBay or via auctions or hamfests to monitor digital systems. And apparently the correct hacks to the Motorola RSS software to do so without formal access to "system key" file encryption information are in fairly wide circulation, both among legitimate users (dealers and others who have purchased it from Motorola) and bootleg. Obtaining the relevant trunking information required such as the system ID and active talkgroups can be readily done with a PC and a scanner by monitoring the control channel with available PC based public domain data dumping software. And far more important than the fact a few dedicated hobbyists and media types have purchased and programmed commercial radios to use in receive only mode to monitor systems, is the soon to be available family of digital capable scanners. Uniden is about to start shipping two - a portable and a mobile type and AOR is about to start shipping an adapter for their high end receivers that decodes the APCO-25 data stream. Others may soon follow. And these of course will follow ALL non-encrypted talk groups on the systems... Obviously no one who lacks inside information could ever determine encryption keys for encrypted talkgroups (in less than many centuries of trying with very fast hardware), but monitoring digital traffic on non encrypted talk groups hardly requires "extensive authorized knowledge of the communication system". APCO 25 is documented and published and radios that will decode the basic modulation have been sold to and by the public for years. And it hardly is impossible for smart members of the public with no authorized connection to law enforcement at all to figure out a way of programming a radio to listen to a system whose frequencies, talk groups and other information they already know. Nor have those with software skills ignored the possibility of decoding APCO-25 on a PC connected to the discriminator of a scanner. On the other hand, of course, I will grant you that the skill and determination required to obtain access to the digital traffic prior to the public availability of digital capable scanners is perhaps an order of magnitude or two greater than what is required to monitor analog fm based public safety radio systems with a scanner purchased at Radio Shack. But certainly not something that requires extensive AUTHORIZED knowledge, or something outside the ken of smart members of the general public, perhaps including someone like terrorists or a smart but deranged sniper. I might close with the observation that to this observer (who is an engineer, not a LEA type) the sniper attacks look like an Al Qaeda distraction and deception operation intended to tie up law enforcement and the public in the DC area whilst the real bastards drive the yellow or blue truck with the nuke or 20 tons of ANFO or whatever right into DC unmolested. I hope LEAs have thought of this possiblity.... -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 6386 From: News Tracker Date: Mon Oct 14, 2002 5:36pm Subject: How Mobile Phones Let [Government] Spies See Our Every Move Dang, they mean 'see' in the literal sense, possibly even through walls in future planned refinements! Who would have thought this was even technically possible? - Vic - How Mobile Phones Let Spies See Our Every Move Celldar project uses mobile phone masts to allow security authorities to watch vehicles and individuals 'in real time' almost anywhere in Britain. Link to story in The Guardian (London, UK): http://politics.guardian.co.uk/homeaffairs/story/0,11026,811084,00.html [Non-text portions of this message have been removed] 6387 From: Marcel Date: Mon Oct 14, 2002 10:26pm Subject: Re: How Mobile Phones Let [Government] Spies See Our Every Move The People at VA Tech MPRG have been experimenting with this technology since the 1990's. They also hold a few patents. News Tracker wrote: > Dang, they mean 'see' in the literal sense, possibly even through walls in future planned refinements! > > Who would have thought this was even technically possible? > - Vic - > > How Mobile Phones Let Spies See Our Every Move > > Celldar project uses mobile phone masts to allow security authorities to watch vehicles and individuals 'in real time' almost anywhere in Britain. > > Link to story in The Guardian (London, UK): > http://politics.guardian.co.uk/homeaffairs/story/0,11026,811084,00.html > > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL-1 IT'S NOT JUST NEXTEL" Note The New address Subscribe to Nextel-1: http://www.groups.yahoo.com/subscribe/NEXTEL-1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 6388 From: kondrak Date: Mon Oct 14, 2002 9:54pm Subject: another compromised box This box is attempting to send bugbear viri.... X-Persona: Return-Path: Delivered-To: kondrak@s... Received: (qmail 1104 invoked by uid 417); 15 Oct 2002 02:15:59 -0000 Received: from user2.pro-ns.net (HELO mail.pro-ns.net) (208.200.182.45) by 192.168.0.5 with SMTP; 15 Oct 2002 02:15:59 -0000 Received: from djai2 (d232.pro-ns.net [208.200.182.179]) by mail.pro-ns.net (8.12.6/8.12.5) with SMTP id g9F251nN087276; Mon, 14 Oct 2002 21:05:17 -0500 (CDT) (envelope-from TSCM-L@j...) Date: Mon, 14 Oct 2002 21:05:01 -0500 (CDT) Message-Id: <200210150205.g9F251nN087276@m...> From: Subject: [TSCM-L] Digest Number 290 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----------QJJSREYCJT3AFBO" To: undisclosed-recipients:; Registrant: Professional Network Services, Inc. 1313 5th St SE Suite 105 Minneapolis, MN 55414 US Domain Name: PRO-NS.NET Administrative Contact: O'Hanlon, Bill wmo@p... 1313 5th St SE Suite 105 Minneapolis, MN 55414 US 612-379-3958 Fax: 612-379-1529 Technical Contact: O'Hanlon, Bill wmo@p... 1313 5th St SE Suite 105 Minneapolis, MN 55414 US 612-379-3958 Fax: 612-379-1529 Registration Service Provider: Professional Network Services, Inc., wmo@p... 612-379-3958 http://www.pro-ns.net Registrar of Record: TUCOWS, INC. Record last updated on 21-Mar-2002. Record expires on 28-Aug-2003. Record Created on 29-Aug-1996. Domain servers in listed order: NS.PRO-NS.NET 208.200.182.10 NS2.PRO-NS.NET 208.200.182.11 NOTE: THE WHOIS DATABASE IS A CONTACT DATABASE ONLY. LACK OF A DOMAIN RECORD DOES NOT SIGNIFY DOMAIN AVAILABILITY. 6389 From: zack <10-33@c...> Date: Tue Oct 15, 2002 7:02am Subject: Virus sent from TSCM-L@j... Someone is sending a virus, not on this list I belive, but please note the from line : From: Subject: [TSCM-L] Digest Number 290 You might mistake it from our list and open it. Received: from mail.pro-ns.net (user2.pro-ns.net [208.200.182.45]) by www.copscops.com (8.10.2/8.10.2) with ESMTP id g9F2Cfg18418 for <10-33@c...>; Mon, 14 Oct 2002 22:12:41 -0400 Received: from djai2 (d232.pro-ns.net [208.200.182.179]) by mail.pro-ns.net (8.12.6/8.12.5) with SMTP id g9F251nN087276; Mon, 14 Oct 2002 21:05:17 -0500 (CDT) (envelope-from TSCM-L@j...) Date: Mon, 14 Oct 2002 21:05:01 -0500 (CDT) Message-Id: <200210150205.g9F251nN087276@m...> From: Subject: {VIRUS DETECTED} [TSCM-L] Digest Number 290 MIME-Version: 1.0 content-type: multipart/mixed; boundary="----------QJJSREYCJT3AFBO" To: undisclosed-recipients:; X-MailScanner: Found to be infected X-UIDL: &)(!!kEF!!5j^!!PR2!! Status: U ------------QJJSREYCJT3AFBO Content-Type: text/html; Content-Transfer-Encoding: quoted-printable

Warning: This message ha= s had one or more attachments removed. Please read the "VirusWarning.txt" a= ttachment(s) for more information.

------------------------------------------------------------------------
Free Conference Calling with Firetalk!
Host your next egroup meeting live on Firetalk.
Click here!
http://click.egroups.com/1/5478/1/_/507420/_/962101633/
------------------------------------------------------------------------

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D
TSCM-L Technical Security Mailing List
"In a multitude of counselors there is s ------------QJJSREYCJT3AFBO Content-Type: text/plain; charset="us-ascii"; name="VirusWarning.txt" Content-Disposition: inline; filename="VirusWarning.txt" Content-Transfer-Encoding: quoted-printable This is a message from the MailScanner E-Mail Virus Protection Service ---------------------------------------------------------------------- The original e-mail attachment "The Basicsfinal.doc.scr" was believed to be infected by a virus and has been replaced by this warning message. Due to limitations placed on us by the Regulation of Investigatory Powers Act 2000, we were unable to keep a copy of the infected attachment. If you know who sent the message please notify them of this Virus Protection message and ask them to disinfect their original version and send you a cle= an copy. If this is from an unknow or bogus source please notify abuse.com so we can add them to the server ban list. At Mon Oct 14 22:12:49 2002 the virus scanner said: /home/spool/MailScanner/incoming/g9F2Cfg18418/The Basicsfinal.doc.scr I= nfection: W32/Bugbear.A@mm Windows Screensavers often hide viruses in email in The Basicsfinal.doc.= scr --=20 Postmaster ------------QJJSREYCJT3AFBO-- visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." George W Bush God Bless The USA .. NEVER forget 9-11-01 http://www.copscops.com/blessusa.htm [Non-text portions of this message have been removed] 6390 From: James M. Atkinson Date: Tue Oct 15, 2002 2:05pm Subject: Re: Virus sent from TSCM-L@j... The virus is not actually coming from the list, but coming from someone using the email address of "TSCM@j... " (note there is no "-L"). "TSCM@j... " is in fact a member of this list, and the virus came from HIS COMPUTER, but not from the list. -jma At 8:02 AM -0400 10/15/02, zack wrote: >Someone is sending a virus, not on this list I belive, but please note the >from line : From: >Subject: [TSCM-L] Digest Number 290 You might mistake it from our list >and open it. > > > >Received: from mail.pro-ns.net (user2.pro-ns.net [208.200.182.45]) > by www.copscops.com (8.10.2/8.10.2) with ESMTP id g9F2Cfg18418 > for <10-33@c...>; Mon, 14 Oct 2002 22:12:41 -0400 >Received: from djai2 (d232.pro-ns.net [208.200.182.179]) > by mail.pro-ns.net (8.12.6/8.12.5) with SMTP id g9F251nN087276; > Mon, 14 Oct 2002 21:05:17 -0500 (CDT) > (envelope-from TSCM-L@j...) >Date: Mon, 14 Oct 2002 21:05:01 -0500 (CDT) >Message-Id: <200210150205.g9F251nN087276@m...> >From: >Subject: {VIRUS DETECTED} [TSCM-L] Digest Number 290 >MIME-Version: 1.0 >content-type: multipart/mixed; boundary="----------QJJSREYCJT3AFBO" >To: undisclosed-recipients:; >X-MailScanner: Found to be infected >X-UIDL: &)(!!kEF!!5j^!!PR2!! >Status: U > >------------QJJSREYCJT3AFBO >Content-Type: text/html; >Content-Transfer-Encoding: quoted-printable > >

Warning: This message ha= >s had one or more attachments removed. Please read the "VirusWarning.txt" a= >ttachment(s) for more information.

> > > > >------------QJJSREYCJT3AFBO >Content-Type: text/plain; charset="us-ascii"; name="VirusWarning.txt" >Content-Disposition: inline; filename="VirusWarning.txt" >Content-Transfer-Encoding: quoted-printable > >This is a message from the MailScanner E-Mail Virus Protection Service >---------------------------------------------------------------------- >The original e-mail attachment "The Basicsfinal.doc.scr" >was believed to be infected by a virus and has been replaced by this warning >message. > >Due to limitations placed on us by the Regulation of Investigatory Powers >Act 2000, we were unable to keep a copy of the infected attachment. > >If you know who sent the message please notify them of this Virus Protection >message and ask them to disinfect their original version and send you a cle= >an copy. > >If this is from an unknow or bogus source please notify abuse.com >so we can add them to the server ban list. > >At Mon Oct 14 22:12:49 2002 the virus scanner said: > /home/spool/MailScanner/incoming/g9F2Cfg18418/The Basicsfinal.doc.scr I= >nfection: W32/Bugbear.A@mm > Windows Screensavers often hide viruses in email in The Basicsfinal.doc.= >scr > >--=20 >Postmaster > >------------QJJSREYCJT3AFBO-- > > >visit http://www.copscops.com >Washington DC Police Department http://mpdc.dc.gov/main.shtm > >"Unity... Resolve... Freedom. These are the hallmarks of the American spirit." > George W Bush > >God Bless The USA .. NEVER forget 9-11-01 >http://www.copscops.com/blessusa.htm > -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6391 From: Elliott & Associates, Ltd. Date: Tue Oct 15, 2002 2:38pm Subject: Re: Virus sent from TSCM-L@j... Actually I got my copy of the virus from TSCM-L@g... There is the very real possibility that the address is being spoofed. Bill Elliott, CII ELLIOTT & ASSOCIATES, Ltd. (GMT -6) http://www.prvt-eye.com http://www.cybercrimeinternational.com ----- Original Message ----- From: "James M. Atkinson" To: Sent: Tuesday, October 15, 2002 1:05 PM Subject: Re: [TSCM-L] Virus sent from TSCM-L@j... > > The virus is not actually coming from the list, but coming from > someone using the email address of "TSCM@j... " (note there is > no "-L"). > > "TSCM@j... " is in fact a member of this list, and the virus came > from HIS COMPUTER, but not from the list. > > -jma > > > > > At 8:02 AM -0400 10/15/02, zack wrote: > >Someone is sending a virus, not on this list I belive, but please note the > >from line : From: > >Subject: [TSCM-L] Digest Number 290 You might mistake it from our list > >and open it. > > 6392 From: kondrak Date: Tue Oct 15, 2002 6:26pm Subject: Re: Virus sent from TSCM-L@j... And thank YOU Bill, for responding in a quick manner. I deal with these kind of things all the time, and its refreshing to see a sysadmin who's responsive. I know no one wants to be sending this stuff out in the first place, but its amazing the amount of deaf ears/blind eyes when a lot of admins are contacted about such problems. For you and your customer, theres a disinfection tool available at symantec: http://securityresponse.symantec.com/avcenter/venc/data/w32.bugbear@mm.removal.tool.html Hope this is some assistance to you. At 14:47 10/15/02 -0500, you wrote: >Hi Matt, > >Thanks for the heads-up. We think our customer has been infected with >a virus, and we'll contact them to get them to clean up their computer. > >Sorry for the difficulty. > >-Bill > > >-- >Bill O'Hanlon wmo@p... >Professional Network Services, Inc. 612-379-3958 >http://www.pro-ns.net > >On Tue, Oct 15, 2002 at 09:37:16AM -0700, Matt Paulsen wrote: > > The originator is not tscm-l@j... it is 208.200.182.179 which is > > pro-ns.net the same as the one that kondrak displayed in the 1st email. > > Read the header - Received: from djai2 (d232.pro-ns.net [208.200.182.179]). > > Bill, please notify your user that they are sending virii to a listserve of > > government spooks. Not exactly the way I'd like my company to get > > recognized by the government if it were me... > > > > > > 1st virus header 1st, 2nd farther down. > > X-Persona: > > Return-Path: > > Delivered-To: kondrak@s... > > Received: (qmail 1104 invoked by uid 417); 15 Oct 2002 02:15:59 -0000 > > Received: from user2.pro-ns.net (HELO mail.pro-ns.net) (208.200.182.45) > > by 192.168.0.5 with SMTP; 15 Oct 2002 02:15:59 -0000 > > Received: from djai2 (d232.pro-ns.net [208.200.182.179]) > > by mail.pro-ns.net (8.12.6/8.12.5) with SMTP id g9F251nN087276; > > Mon, 14 Oct 2002 21:05:17 -0500 (CDT) > > (envelope-from TSCM-L@j...) > > Date: Mon, 14 Oct 2002 21:05:01 -0500 (CDT) > > Message-Id: <200210150205.g9F251nN087276@m...> > > From: > > Subject: [TSCM-L] Digest Number 290 > > MIME-Version: 1.0 > > Content-Type: multipart/alternative; boundary="----------QJJSREYCJT3AFBO" > > To: undisclosed-recipients:; > > > > -----Original Message----- > > From: zack [mailto:10-33@c...] > > Sent: Tuesday, October 15, 2002 5:03 AM > > To: TSCM-L@yahoogroups.com > > Subject: [TSCM-L] Virus sent from TSCM-L@j... > > > > > > Someone is sending a virus, not on this list I belive, but please note the > > from line : From: > > Subject: [TSCM-L] Digest Number 290 You might mistake it from our list > > and open it. > > > > > > > > Received: from mail.pro-ns.net (user2.pro-ns.net [208.200.182.45]) > > by www.copscops.com (8.10.2/8.10.2) with ESMTP id g9F2Cfg18418 > > for <10-33@c...>; Mon, 14 Oct 2002 22:12:41 -0400 > > Received: from djai2 (d232.pro-ns.net [208.200.182.179]) > > by mail.pro-ns.net (8.12.6/8.12.5) with SMTP id g9F251nN087276; > > Mon, 14 Oct 2002 21:05:17 -0500 (CDT) > > (envelope-from TSCM-L@j...) > > Date: Mon, 14 Oct 2002 21:05:01 -0500 (CDT) > > Message-Id: <200210150205.g9F251nN087276@m...> > > From: > > Subject: {VIRUS DETECTED} [TSCM-L] Digest Number 290 > > MIME-Version: 1.0 > > content-type: multipart/mixed; boundary="----------QJJSREYCJT3AFBO" > > To: undisclosed-recipients:; > > X-MailScanner: Found to be infected > > X-UIDL: &)(!!kEF!!5j^!!PR2!! > > Status: U > > > > ------------QJJSREYCJT3AFBO > > Content-Type: text/html; > > Content-Transfer-Encoding: quoted-printable > > > >

Warning: This > message ha= > > s had one or more attachments removed. Please read the > "VirusWarning.txt" a= > > ttachment(s) for more information.

> > > > > > > > > ------------------------------------------------------------------------
> > Free Conference Calling with Firetalk!
> > Host your next egroup meeting live on Firetalk.
> > Click here!
> > http://click.egroups.com/1/5478/1/_/507420/_/962101633/
> > > ------------------------------------------------------------------------
> >
> > > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= > > > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= > > =3D=3D=3D=3D=3D=3D
> > TSCM-L Technical Security Mailing List
> > "In a multitude of counselors there is s > > > > > > ------------QJJSREYCJT3AFBO > > Content-Type: text/plain; charset="us-ascii"; name="VirusWarning.txt" > > Content-Disposition: inline; filename="VirusWarning.txt" > > Content-Transfer-Encoding: quoted-printable > > > > This is a message from the MailScanner E-Mail Virus Protection Service > > ---------------------------------------------------------------------- > > The original e-mail attachment "The Basicsfinal.doc.scr" > > was believed to be infected by a virus and has been replaced by this > warning > > message. > > > > Due to limitations placed on us by the Regulation of Investigatory Powers > > Act 2000, we were unable to keep a copy of the infected attachment. > > > > If you know who sent the message please notify them of this Virus > Protection > > message and ask them to disinfect their original version and send you a > cle= > > an copy. > > > > If this is from an unknow or bogus source please notify abuse.com > > so we can add them to the server ban list. > > > > At Mon Oct 14 22:12:49 2002 the virus scanner said: > > /home/spool/MailScanner/incoming/g9F2Cfg18418/The Basicsfinal.doc.scr > > I= > > nfection: W32/Bugbear.A@mm > > Windows Screensavers often hide viruses in email in The > > Basicsfinal.doc.= > > scr > > > > --=20 > > Postmaster > > > > ------------QJJSREYCJT3AFBO-- > > > > > > visit http://www.copscops.com > > Washington DC Police Department http://mpdc.dc.gov/main.shtm > > > > "Unity... Resolve... Freedom. These are the hallmarks of the American > > spirit." > > George W Bush > > > > God Bless The USA .. NEVER forget 9-11-01 > > http://www.copscops.com/blessusa.htm > > > > > > > > > > [Non-text portions of this message have been removed] > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > From: Andre Holmes <1ach@g...> Date: Tue Oct 10, 2000 6:30pm Subject: Re: BURST BUGS Hi all to add to the drama if you want to see what Im seeing go to http://www.tscm.com/spectan.html burst bug turned on. When I move closer in the city limits the images become more. I plan to employ my Icom 8500 and tune to freq of the image, then tune the steps between 0.5 and 199.5 kHz. ----- Original Message ----- From: "Andre Holmes" <1ach@g...> To: Sent: Tuesday, October 10, 2000 6:27 PM Subject: [TSCM-L] BURST BUGS > Hi all I regularly see burst bugs using the AVCOM-65C. > Whom would the bugs belong to ? > I cannot demodulate the signal with the SA why ? > > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1683 From: Andre Holmes <1ach@g...> Date: Tue Oct 10, 2000 6:38pm Subject: Re: BURST BUGS JIM the antenna used is a avcom log 49incher I do pick police repeaters at about 75 miles away from dispatch using the 65c with out amp. ----- Original Message ----- From: "James M. Atkinson, Comm-Eng" To: Sent: Tuesday, October 10, 2000 7:29 PM Subject: Re: [TSCM-L] BURST BUGS > At 6:27 PM -0400 10/10/00, Andre Holmes wrote: > >Hi all I regularly see burst bugs using the AVCOM-65C. > >Whom would the bugs belong to ? > >I cannot demodulate the signal with the SA why ? > > > 1) Why do you belive that this is the signal from a burst bug, or > other communications device? > > 2) If it is indeed a "burst bug" the PSA-65C would be virtually > worthless in attempting to demodulate it. > > 3) Use a directional antenna, bandpass filter, and amplifier to > locate the source of the signal. > > -jma > > > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > Do not try the patience of Wizards, > for they are subtle and quick to anger. > ======================================================================= > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1684 From: James M. Atkinson, Comm-Eng Date: Tue Oct 10, 2000 9:40pm Subject: Re: BURST BUGS At 7:38 PM -0400 10/10/00, Andre Holmes wrote: >JIM the antenna used is a avcom log 49incher I do pick police repeaters >at about 75 miles away from dispatch using the 65c with out amp. Silly suggestion... turn off all of your scanners, radios, laptops, and any other electronic device and see the "burst signal" goes away. I only mention this as one of the more common errors is to alert on the spurious emissions from the search receiver (hand held scanners are notorious for this). -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1685 From: A.Lizard Date: Mon Oct 9, 2000 6:38pm Subject: Re: Super accurate clocks >________________________________________________________________________ > >Message: 1 > Date: Sun, 8 Oct 2000 10:57:29 -0400 > From: "Steve Uhrig" >Subject: Super accurate clocks > >Hi all, > >Wanted to share a good deal I found recently on a useful item. > >This gentleman: > >jam@c... [snip] >The internal receiver and antenna periodically locks onto the >signal transmitted from WWVB in Boulder, Colorado. This is a >precision timing signal transmitter by NIST (National Institute >of Standards and Technology). The clock automatically locks onto >their atomic timing and is accurate to a millisecond or so. Try downloading AtomTime from http://www.atomtime.com , It'll automatically set your computer's system clock to one of the atomic clock-based time servers. I run mine during startup so I can set my clock as soon as I'm online. While the accuracy of your PC's internal clock after setting should certainly be adequate over a typical working day, if you feel the need, simply run the program again and hit the Check button ************************************************************************ Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 1686 From: David Alexander Date: Tue Oct 10, 2000 6:03am Subject: new member introduction Hello all. I have just joined the TSCM list. Having Checked with James, I'm submitting a brief introduction: I have been involved in Information Security (among other things) for approximately 12 years. My background starts with physical security experience as an Officer in the (UK) Royal Air Force and basic commsec training. I moved into IT Consultancy and since then I have worked on numerous IT projects for commercial, govt. and military projects that have had a Technical Security element, for obvious reasons I can't give details, but TEMPEST, commsec, and countermeasures have featured fairly prominently in them. Most of my time these days is spent providing consultancy on BS7799, The British Standard in Information Security, which becomes the International Standard (ISO) on Info Sec next year, and includes advice on risk and threat assessment and countermeasures to be considered/used. I'm qualified as a Lead Auditor of the BS 7799 standard, and there are only about 50 people who have done so to date. Oh yes, I'm a Project Manager as well. David Alexander Project Manager & Information Security Consultant Qualified BS7799 Lead Auditor Triskele Ltd. Office 01491 833280 Mobile 0780 308 3130 [Non-text portions of this message have been removed] 1687 From: Date: Wed Oct 11, 2000 3:01am Subject: Tinker, Tailor, Software, Spy HAVE A GREAT DAY !!! ---------- http://www.msnbc.com/news/473880.asp?bt=nm&btu=http://www.msnbc.com/tools/newstools/d/news_menu.asp [Non-text portions of this message have been removed] 1688 From: Dawn Star Date: Wed Oct 11, 2000 11:26am Subject: Burst Bugs Silly suggestion... turn off all of your scanners, radios, laptops, and any other electronic device and see the "burst signal" goes away. jma Also unplug the digital telephone set on the executive's desk, and any others in the room, these radiate all kinds of waveforms all over the spectrum. Roger Tolces, Electronic Security, Los Angeles, Ca. [Non-text portions of this message have been removed] 1689 From: James M. Atkinson, Comm-Eng Date: Wed Oct 11, 2000 0:18pm Subject: Re: Burst Bugs At 9:26 AM -0700 10/11/00, Dawn Star wrote: >Silly suggestion... turn off all of your scanners, radios, laptops, >and any other electronic device and see the "burst signal" goes away. > >jma > >Also unplug the digital telephone set on the executive's desk, and >any others in the room, these radiate all kinds of waveforms all >over the spectrum. > > Roger Tolces, >Electronic Security, Los Angeles, Ca. Err, but turning off the suspect phone is not a wise idea as it could be the executives phone which is bugged and turning it off could shut the bug down. Remember, we must not do anything to disturb the suspect phones or do anything that could be even remotely alerting until well into the sweep. When I suggested turning off the equipment, I was refer which the TSCM'er had brought with him, not the equipment he was evaluating. I have seen numerous cases where someone had a fairly decent radio such as a AR-8000 or R-8500 running, and their OSCOR or PSA-65 led them to falsely belive that there was a frequency hopper in the room with them. After copious effort to "find the bug" they discovered that the "hopping signal" was actually their radio scanning. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1690 From: Jay Coote Date: Wed Oct 11, 2000 4:53pm Subject: Re: *TELEPHONE PROBLEM-INTERESTING* While possibly unrelated to "phreaking" or the complaint below, there are some electronic sleaze catalogs who sell little boxes which are clearly sold only for the purpose of dirty tricks. The boxes will divert calls, randomly cut off or hang up on calls (making it harder to report trouble), play a "this number has been disconnected" tones and message...... and so on. If phone pranks are suspected, it could be an unattended device like these. Jay Coote Los Angeles ---------- > REPOSTED > > I recently received this (attached below) as a complaint and, while I > have some basic ideas, I am interested in feedback from experts (or > even thoughts from those who have more of a clue ) in advanced > telephony technologies in the community.. > > Thanks. > > Officer Thor Lundberg > Computer Crimes Investigator > Computer Forensic Specialist > Raynham Massachusetts Police Department > phone: 508-824-2716 > voice: 508-824-2756 x76 > > Cybersnitch Webmaster > Technology Security Specialist > email: webmaster@c... > epage: page_thor@c... (urgents and greetings accepted) > > CYBERSNITCH > Law enforcement for the Internet > http://www.cybersnitch.net/ > > TUCOFS - The Ultimate Collection of Forensic Software > A complete resource for computer forensics and cyber investigations > http://www.cybersnitch.net/tucofs/ > > THE SCHOOL VIOLENCE WATCH NETWORK > Helping to keep schools a safe place to learn > http://www.cybersnitch.net/schoolviolencewatch.htm > > --------------- (attached message) > > To whom it may concern; > There is someone systematicaly blocking in-comming calls. old > customers, > Friends, etc. are able to get through but no new busness calls. This > has been > going on for a year. > I have had the phone co. check my lines twice & each time as the > check > begins > my phone returns to normal than goes dead again when the check is > complete. > The police can't help unless the phone co. finds something and Im > unable to > come up with any proof. Getting someone to monitor my phone activity > while my > phone is and is not being checked seems to be out of the question. > I have a 261 business number that I had remote call forwarded to > my > residence when I moved so the 261 number has no physical address I > have > tried > having a trap placed on my residence phone and my 261 number > forwarded > to an > answering service and to my cell phone but nothing works. it seems to > > narrow > down to somone ( and I know who) must be Phreaking my 261 number > through the > phone co. computer. I've been stuck with this business number because > > it's > conected to the yellow pages, but I'm now thinking of using direct > mail > and a > new and secret phone number. I would like to stop her by catching her > > but > right now I would settle for understanding how to protect myself > perhaps by > knowing what can and cannot be done by Phreakers, such as can cell > phones be > Phreaked? How much trouble is it for a Phreaker to zero in on a new > phone > number? Etc. > Any help you can offer would be deeply appreciated. I would be > happy to > make a contribution to your organization if you can help me resolve > this > problem. > Desperate. > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1691 From: Steve Uhrig Date: Wed Oct 11, 2000 11:00pm Subject: Nice frequency allocation chart http://www.ntia.doc.gov/osmhome/allochrt.html Can print the PDF file through your browser with a color printer, or purchase a wall sized chart. Highly recommended to keep with your sweep documentation. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1692 From: Rick Hofmann - MICROSEARCH Date: Thu Oct 12, 2000 10:17am Subject: Re: BURST BUGS I have encountered "burst" type signals in office buildings in downtown Los Angeles that were caused by the wireless alarm system. The bursts are communications between the various sensors and base units. If you are fortunate enough to have someone who knows the alarm system with you, have them shut it down for a few minutes to see if the signal goes away. You also need to be positive the signal is coming from the sensors since an eavesdropper using remote control could always shut his system down if he hears what's going on. At 06:27 PM 10/10/2000 -0400, you wrote: >Hi all I regularly see burst bugs using the AVCOM-65C. >Whom would the bugs belong to ? >I cannot demodulate the signal with the SA why ? > > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS Very truly yours, R.C.Hofmann, CCO, CPP MICROSEARCH - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 PI16998 1693 From: James M. Atkinson, Comm-Eng Date: Thu Oct 12, 2000 11:57am Subject: Dr. Seuss explains why computers crash Dr. Seuss explains why computers crash: If a packet hits a pocket on a socket on a port, and the bus is Interrupted at a very last resort, and the access of the memory makes your floppy disk abort, Then the socket packet pocket has an error to report. If your cursor finds a menu item followed by a dash, And the double-clicking icon puts your window in the trash, And your data is corrupted cause the index doesn't hash, Then your situation's hopeless and your systems gonna crash! If the label on the cable on the table at your house says the network is connected to the button on the mouse, but your packets want to tunnel to another protocol, that's repeatedly rejected by the printer down the hall, and your screen is all distorted by the side effects of gauss, till your icons in the windows are as wavy as a souse, then you may as well reboot and go out with a bang, 'cuz sure as I'm a poet the suckers gonna hang! When the copy of your floppy's getting sloppy in the disk, And the macrocode instructions cause unnecessary risk, Then you'll have to flash the memory and you'll want to RAM your ROM, Quickly turn off the computer and be sure to tell your Mom! -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1694 From: Robert G. Ferrell Date: Thu Oct 12, 2000 1:41pm Subject: Re: Dr. Seuss explains why computers crash > Dr. Seuss explains why computers crash: > In the interest of giving credit where credit is due, this was written by Gene Ziegler at Cornell in 1995. Here's the full version: Bits Bytes Chips Clocks Bits in bytes on chips in box. Bytes with bits and chips with clocks. Chips in box on ether-docks. Chips with bits come. Chips with bytes come. Chips with bits and bytes and clocks come. Look, sir. Look, sir. read the book, sir. Let's do tricks with bits and bytes, sir. Let's do tricks with chips and clocks, sir. First, I'll make a quick trick bit stack. Then I'll make a quick trick byte stack. You can make a quick trick chip stack. You can make a quick trick clock stack. And here's a new trick on the scene. Bits in bytes for your machine. Bytes in words to fill your screen. Now we come to ticks and tocks, sir. Try to say this by the clock, sir. Clocks on chips tick. Clocks on chips tock. Eight byte bits tick. Eight bit bytes tock. Clocks on chips with eight bit bytes tick. Chips with clocks and eight byte bits tock. Here's an easy game to play. Here's an easy thing to say.... If a packet hits a pocket on a socket on a port, and the bus is interrupted as a very last resort, and the address of the memory makes your floppy disk abort then the socket packet pocket has an error to report! If your cursor finds a menu item followed by a dash, and the double-clicking icon puts your window in the trash, and your data is corrupted cause the index doesn't hash, then your situation's hopeless, and your system's gunna crash. You can't say this? What a shame, sir! We'll find you another game, sir. If the label on the cable on the table at your house says the network is connected to the button on your mouse, but your packets want to tunnel on another protocol, that's repeatedly rejected by the printer down the hall, and your screen is all distorted by the side-effects of gauss, so your icons in the window are as wavy as a souse, then you may as well reboot and go out with a bang, cause as sure as I'm a poet, the sucker's gunna hang! When the copy of your floppy's getting sloppy on the disk, and the microcode instructions cause unnecessary risc, then you have to flash your memory and you'll want to RAM your ROM. quickly turn off your computer and be sure to tell your mom! (God bless you Dr. Seuss wherever you are!) Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 1695 From: Date: Thu Oct 12, 2000 10:01am Subject: assault on privacy or not An interesting read. Savannah NOW: Opinion - Editorial: An assault on privacy 10/12/00 1696 From: Agent_X Date: Thu Oct 12, 2000 7:58am Subject: Re: *TELEPHONE PROBLEM-INTERESTING* At 7:36 PM -0400 10/11/00, Jay Coote wrote: >While possibly unrelated to "phreaking" or the complaint below, >there are some electronic sleaze catalogs who sell little boxes >which are clearly sold only for the purpose of dirty tricks. The >boxes will divert calls, randomly cut off or hang up on calls >(making it harder to report trouble), play a "this number has been >disconnected" tones and message...... and so on. If phone pranks >are suspected, it could be an unattended device like these. >Jay Coote >Los Angeles Well then what is the function that allow the box to know the difference between old callers and new callers. This kind of discrimination requires some human intervention, I feel. That's what makes be think is action is pretty active. > > >---------- >> REPOSTED >> >> I recently received this (attached below) as a complaint and, while I >> have some basic ideas, I am interested in feedback from experts (or >> even thoughts from those who have more of a clue ) in advanced >> telephony technologies in the community.. >> >> Thanks. >> >> Officer Thor Lundberg >> Computer Crimes Investigator >> Computer Forensic Specialist >> Raynham Massachusetts Police Department >> phone: 508-824-2716 >> voice: 508-824-2756 x76 >> >> Cybersnitch Webmaster >> Technology Security Specialist >> email: webmaster@c... >> epage: page_thor@c... (urgents and greetings accepted) >> >> CYBERSNITCH >> Law enforcement for the Internet >> http://www.cybersnitch.net/ >> >> TUCOFS - The Ultimate Collection of Forensic Software >> A complete resource for computer forensics and cyber investigations >> http://www.cybersnitch.net/tucofs/ >> >> THE SCHOOL VIOLENCE WATCH NETWORK >> Helping to keep schools a safe place to learn >> http://www.cybersnitch.net/schoolviolencewatch.htm >> >> --------------- (attached message) >> >> To whom it may concern; >> There is someone systematicaly blocking in-comming calls. old >> customers, >> Friends, etc. are able to get through but no new busness calls. This >> has been >> going on for a year. >> I have had the phone co. check my lines twice & each time as the >> check >> begins >> my phone returns to normal than goes dead again when the check is >> complete. >> The police can't help unless the phone co. finds something and Im >> unable to >> come up with any proof. Getting someone to monitor my phone activity >> while my >> phone is and is not being checked seems to be out of the question. >> I have a 261 business number that I had remote call forwarded to >> my >> residence when I moved so the 261 number has no physical address I >> have >> tried >> having a trap placed on my residence phone and my 261 number >> forwarded >> to an >> answering service and to my cell phone but nothing works. it seems to >> >> narrow > >> down to somone ( and I know who) must be Phreaking my 261 number >> through the >> phone co. computer. I've been stuck with this business number because >> >> it's >> conected to the yellow pages, but I'm now thinking of using direct >> mail >> and a >> new and secret phone number. I would like to stop her by catching her >> >> but >> right now I would settle for understanding how to protect myself >> perhaps by >> knowing what can and cannot be done by Phreakers, such as can cell >> phones be >> Phreaked? How much trouble is it for a Phreaker to zero in on a new >> phone >> number? Etc. >> Any help you can offer would be deeply appreciated. I would be >> happy to >> make a contribution to your organization if you can help me resolve >> this >> problem. >> Desperate. >> >> >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.onelist.com/community/TSCM-L >> >> or email your subscription request to: >> subTSCM-L@t... >> =================================================== TSKS >> >> > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS -- Agent X PGP Keys available by request. PGP Fingerprint (6.5.2) : 10DA 649B 3823 A027 C646 55A7 4341 04A0 PGP Fingerprint (2.6.2): 8C 9A BE D5 41 3F 96 C8 D2 8C 1D B1 5F 59 55 FF 1697 From: Date: Thu Oct 12, 2000 4:11pm Subject: Re: *TELEPHONE PROBLEM-INTERESTING* Have you tried a simple experiment to verify the behavior? For example, be with an old customer as they dial in and verify that it works. Then dial in yourself from another number as a new customer to verify that it is broken. If the behavior can be demonstrated, then it should be demonstrable to the phone company. The problem with involking a Phreak is that they are great wizards who can do anything, no matter how fantastical. While incarcerated, Kevin Mittick was not allowed to use the telephone because it was believed that just by whistleing into the mouthpiece he could break into the DOD system and launch missiles. Do I need to explain how impossible that would be? But that doesn't stop people from believing it. Phreakes are not omnipotent and the phone company is generally not stupid. Big, yes, but very sensitive to security issues as they become apparent. There is probably a very mundane explanation, but it will not be found until the behavior can be duplicated and studied. It could well be that the business owner is simply not successfull at attacting new customers. Just my two cents worth. Bob Washburne - Who would like to get one of those "number is not in service" boxes to see if it really will keep the telemarketers away during dinner. :-) > Well then what is the function that allow the box to know the > difference between old callers and new callers. This kind of > discrimination requires some human intervention, I feel. That's what > makes be think is action is pretty active. ----- Sent using MailStart.com ( http://MailStart.Com/welcome.html ) The FREE way to access your mailbox via any web browser, anywhere! 1698 From: James M. Atkinson, Comm-Eng Date: Thu Oct 12, 2000 4:34pm Subject: WTB: SPECTRE System Components If any of the list members have any SPECTRE equipment, manuals, books, accessories, cables and so on that they are interested in converting to cash then please give me a heads up. Specifically, I am hunting for the 3822 System components, SMR-3522, DRD-3572, CP-3801, FE-3520 and SMR-3822 series. I am most interested in complete units in any condition... I would even consider buying chassis, and picked carcasses if the price is right. The equipment will be used to teach TSCM... "Things are afoot" [grin] -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1699 From: James M. Atkinson, Comm-Eng Date: Thu Oct 12, 2000 4:41pm Subject: WTB: Microtel PR-700B and MSR-900 Series Radios If any of the list members have any Micro-Tel equipment, manuals, books, accessories, cables and so on that they are interested in converting to cash then please give me a heads up. Specifically, I am hunting for the PR-700B series, and the MSR-900 series. I am most interested in complete units in any condition... I would even consider buying chassis, and picked carcasses if the price is right. The equipment will be used to teach TSCM... "Things are afoot" [grin] If it says "Micro-Tel" on it I might me interested. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1700 From: Charles Patterson Date: Thu Oct 12, 2000 4:48pm Subject: Re: *TELEPHONE PROBLEM-INTERESTING* I believe I may have spoken with this same person at length on a phone call because the problem is identical. Everything described did not make sense as being complete. There seems to be some elements missing from the puzzle. Selectively blocking old customers but not new customers is either a misunderstanding of his events, a paranoid delusion, or a rather large espionage undertaking. He seemed to think that this type of harrassment could be accomplished by a little black box or by a clever competitor on a computer somewhere. If there is really a problem, someone with some experience/knowledge would need to assist him in recreating the problem. If it is the same guy, I think he said he ran a relatively small contracting business and has not been getting new calls. When he says his line goes dead, he means no calls are coming in. The problem may just be that his remote call forwarding is intermittent, or perhaps that a certain local area may not be getting forwarded while out of area calls are... But that is not what was described. I'd love to hear a solution if there is one. Charles ----- Original Message ----- From: "Agent_X" To: Sent: Thursday, October 12, 2000 8:58 AM Subject: Re: [TSCM-L] *TELEPHONE PROBLEM-INTERESTING* > At 7:36 PM -0400 10/11/00, Jay Coote wrote: > >While possibly unrelated to "phreaking" or the complaint below, > >there are some electronic sleaze catalogs who sell little boxes > >which are clearly sold only for the purpose of dirty tricks. The > >boxes will divert calls, randomly cut off or hang up on calls > >(making it harder to report trouble), play a "this number has been > >disconnected" tones and message...... and so on. If phone pranks > >are suspected, it could be an unattended device like these. > >Jay Coote > >Los Angeles > Well then what is the function that allow the box to know the > difference between old callers and new callers. This kind of > discrimination requires some human intervention, I feel. That's what > makes be think is action is pretty active. > > > > > >---------- > >> REPOSTED > >> > >> I recently received this (attached below) as a complaint and, while I > >> have some basic ideas, I am interested in feedback from experts (or > >> even thoughts from those who have more of a clue ) in advanced > >> telephony technologies in the community.. > >> > >> Thanks. > >> > >> Officer Thor Lundberg > >> Computer Crimes Investigator > >> Computer Forensic Specialist > >> Raynham Massachusetts Police Department > >> phone: 508-824-2716 > >> voice: 508-824-2756 x76 > >> > >> Cybersnitch Webmaster > >> Technology Security Specialist > >> email: webmaster@c... > >> epage: page_thor@c... (urgents and greetings accepted) > >> > >> CYBERSNITCH > >> Law enforcement for the Internet > >> http://www.cybersnitch.net/ > >> > >> TUCOFS - The Ultimate Collection of Forensic Software > >> A complete resource for computer forensics and cyber investigations > >> http://www.cybersnitch.net/tucofs/ > >> > >> THE SCHOOL VIOLENCE WATCH NETWORK > >> Helping to keep schools a safe place to learn > >> http://www.cybersnitch.net/schoolviolencewatch.htm > >> > >> --------------- (attached message) > >> > >> To whom it may concern; > >> There is someone systematicaly blocking in-comming calls. old > >> customers, > >> Friends, etc. are able to get through but no new busness calls. This > >> has been > >> going on for a year. > >> I have had the phone co. check my lines twice & each time as the > >> check > >> begins > >> my phone returns to normal than goes dead again when the check is > >> complete. > >> The police can't help unless the phone co. finds something and Im > >> unable to > >> come up with any proof. Getting someone to monitor my phone activity > >> while my > >> phone is and is not being checked seems to be out of the question. > >> I have a 261 business number that I had remote call forwarded to > >> my > >> residence when I moved so the 261 number has no physical address I > >> have > >> tried > >> having a trap placed on my residence phone and my 261 number > >> forwarded > >> to an > >> answering service and to my cell phone but nothing works. it seems to > >> > >> narrow > > > >> down to somone ( and I know who) must be Phreaking my 261 number > >> through the > >> phone co. computer. I've been stuck with this business number because > >> > >> it's > >> conected to the yellow pages, but I'm now thinking of using direct > >> mail > >> and a > >> new and secret phone number. I would like to stop her by catching her > >> > >> but > >> right now I would settle for understanding how to protect myself > >> perhaps by > >> knowing what can and cannot be done by Phreakers, such as can cell > >> phones be > >> Phreaked? How much trouble is it for a Phreaker to zero in on a new > >> phone > >> number? Etc. > >> Any help you can offer would be deeply appreciated. I would be > >> happy to > >> make a contribution to your organization if you can help me resolve > >> this > >> problem. > >> Desperate. > >> > >> > >> > >> ======================================================== > >> TSCM-L Technical Security Mailing List > >> "In a multitude of counselors there is strength" > >> > >> To subscribe to the TSCM-L mailing list visit: > >> http://www.onelist.com/community/TSCM-L > >> > >> or email your subscription request to: > >> subTSCM-L@t... > >> =================================================== TSKS > >> > >> > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > >=================================================== TSKS > > -- > Agent X > PGP Keys available by request. > PGP Fingerprint (6.5.2) : > 10DA 649B 3823 A027 C646 55A7 4341 04A0 > PGP Fingerprint (2.6.2): > 8C 9A BE D5 41 3F 96 C8 D2 8C 1D B1 5F 59 55 FF > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1701 From: Ian Carter Date: Wed Oct 11, 2000 10:00pm Subject: Re: *TELEPHONE PROBLEM-INTERESTING* > I recently received this (attached below) as a complaint and, while I > have some basic ideas, I am interested in feedback from experts (or > even thoughts from those who have more of a clue ) in advanced > telephony technologies in the community.. In my humble opinion Ask the lady to remove the remote call forward. Basically you have here a phone company that has allowed her to build a SS7 cloud over a cloud, and over a cloud again. Too many clouds of protocol, has the system all screwed. The calls work when the phone company calls because it is their network they are calling from it in the test, the first level of the cloud and the second are fine, that is why the old customers can call in, and so can the Telco....THEY ARE USING THE FIRST 2 levels of the network hierarchy ....it is the third, the newest of the clouds, that is messed up, it is the third step in the hierarchy that is not configured correctly. It is not that the system is set wrong, it is simply that she is encountering a situation that is showing an error in a combination of services piled upon one and another, that has not been encountered before. Her specific situation is uncommon. To have a tech try to fix a cloud is a waste of time, that is why they are called clouds. It is not that it is a cloud or that it is wireless - it is called a cloud because it represents a tremendous amount of protocol, and switching, that I cannot describe. The cloud is so complex that all that can be done now is two things: 1. Start completely over, having the actual phone number terminate to a station somewhere (Like an empty apartment or boyfriends house or somewhere where the billing can be sent) and have the line call forwarded. I am assuming the line she wishes to retain is either non portable, or she wants her details non disclosed. 2. Take off the final forward she has put on and let the old customers calls arrive to her and set a new number to her new clients which can process as in number 1 by terminating in a station not where she really is and forwarding it. A brand new number can also be remote call forwarded if she likes. Nobody is taking advantage of her at all, she has simply encountered a complex protocol error. Just my 2cents for what its worth Good Luck Best Regards - Ian 1702 From: James M. Atkinson, Comm-Eng Date: Fri Oct 13, 2000 1:32pm Subject: ZENITH LCD TV COMBINES HD DISPLAY AND SLEEK INDUSTRIAL DESIGN [Note: You would need to add a Zentih IQADTV1W to pick out the ATSC signals, but it would make a fairly good video system for TSCM'ers to use... just add a FM video receiver or slope detect the FM and your all set.] -jma ZENITH LCD TV COMBINES HD DISPLAY AND SLEEK INDUSTRIAL DESIGN INDIANAPOLIS, Sept. 8, 2000 -- The industry's first TFT-LCD combining high-definition display, NTSC TV and computer monitor capability is being introduced at the CEDIA Expo by Zenith Electronics Corporation. Marrying an HD-capable display with a slim industrial design, the new 15.1-inch set features 1024 x 768 XGA resolution for television and computer display. Both NTSC signals (received with the set's built-in analog tuner) and ATSC signals (provided by a separate digital receiver) are converted to a 1024 x 768 display. Model ZLD151A1 is built around advanced TFT-LCD (thin film transistor-liquid crystal display) technology developed by Zenith's parent company, LG Electronics Inc. This display doubles the contrast ratio of other LCD TVs to 200:1 and offers viewing angles of 120 degrees horizontal and 90 degrees vertical. Designed for flexible connection of digital receivers, DVD players, VCRs and personal computers, the set provides a 15-pin RGB connector, Y/Pb/Pr Component Video, S-Video, Baseband Video/Audio and RF inputs, as well as a stereo headphone connector. The 15.1-inch set features a built-in NTSC tuner with 181-channel capability, comb filter, V-chip parental control, trilingual (English, Spanish and French) onscreen menus, stereo TV sound and an ergonomic remote control. Zenith's EZ Features include sleep timer, closed caption capability and automatic channel programming. Available now, Model ZLD151A1 is expected to sell for around $2,000. Based in Glenview, Ill., Zenith is a long-time leader in electronic entertainment products and a primary developer of digital HDTV. Since November 1999, Zenith has been a wholly-owned subsidiary of LGE, a global leader in electronics and digital technologies. Visit Zenith on the World Wide Web at http://www.zenith.com CONTACT: John I. Taylor (847) 391-8181 ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1703 From: 4phun Date: Sat Oct 14, 2000 9:11am Subject: Fw: [4phun-Radio] Alinco DJ-X2000 From: Strongsignals.net ----- Original Message ----- From: 4phun To: 4phun-scan list at Egoups.com (Email) ; 4phun-radio@egroups.com Sent: Saturday, October 14, 2000 9:53 AM Subject: [4phun-Radio] Alinco DJ-X2000 From: Strongsignals.net Looks like another neat scanning radio from Alinco. I would buy mine overseas from Jonathan at Javiation as too many gottchas in the US version. Vic -------------------------------------------------------------------------------- News & Noteworthy October 12, 2000 Mike Failing was kind enough to transcribe the contents of the DJ-X2000 advert mentioned in yesterday's posting and passes it along for us to enjoy all of suppossed "goodies:" "The Alinco DJ-X2000 is the world's most advanced multimode scanning receiver! Designed for "power users" who want the most, the DJ-X2000 has many advanced features never seen in any scanning receiver, let alone a unit this small!" a.. Uses DJ-X10 accessories a.. Help NavigationTM so powerful, you may never need the manual a.. 2000 memory channels in 50 banks, 40 channels per bank a.. 100 KHz to 2150 MHz tuning range (cellular frequencies blocked in USA version) a.. Two-mode "Bug" detector finds hidden transmitters a.. Instant search function locks onto the nearest, strongest signal (different circuit design from the existing devices) a.. Frequency counter, accurate to 1 ppm, uses digital TCXO (first ever in the industry of scanner/ham radio) a.. Field Strength meter a.. S-meter activated beep alerts you to nearby calls a.. Record up to 160 seconds of audio in digital memory a.. Inversion decoder for scrambled audio (not available in USA version) a.. FM stereo receiver (requires optional stereo headphones) a.. CTCSS decoder/tone scan a.. Transceiver Function - send low power transmissions to others (not available in USA version) a.. Two-level attenuator reduces strong or interfering signals 6 or 20 dB a.. Alphanumeric channel names and name tag search engine a.. PC programmable a.. 24 hour timer a.. Uses 10 to 16 VDC external power or internal batteries (comes with a quick charger, not a classic wall-charger) a.. Battery level indicator and battery save feature (very effective new circuit design) a.. WFM, NFM, AM, USB, LSB, CW modes in many different tuning steps a.. Fast scan speed a.. Easy to read dot matrix LCD display ** patent pending [Non-text portions of this message have been removed] 1704 From: Steve Uhrig Date: Sat Oct 14, 2000 3:01pm Subject: Monitoring violation prosecution Anyone who doesn't believe investigation and prosecution won't happen to those who monitor things they shouldn't should check this page: http://www.policescanner.net/ A number of people are biting their tongues trying not to tell him "We told you so". Because this is an open investigation, no additional details will be discussed. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1705 From: Justin T. Fanning Date: Sat Oct 14, 2000 4:02pm Subject: Re: Monitoring violation prosecution Steve and/or others, What specifically are the charges? I don't know that site, is it some type of remote control receiver <-> Real audio gateway, is that illegal now?! Justin T. Fanning Justin@f... --- Steve Uhrig wrote: > > Anyone who doesn't believe investigation and prosecution won't > happen to those who monitor things they shouldn't should check > this page: > > http://www.policescanner.net/ > > A number of people are biting their tongues trying not to tell > him "We told you so". > > Because this is an open investigation, no additional details > will be discussed. > > Steve > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 1706 From: Andre Holmes <1ach@g...> Date: Sat Oct 14, 2000 6:30pm Subject: Bugging spying - Special Electronic Security Products Ltd. http://www.u-net.com/mbp/sol/its/securityonline/link2/328.htm [Non-text portions of this message have been removed] 1707 From: A Grudko Date: Sun Oct 15, 2000 1:42pm Subject: Parliament sweep Perhaps of interest to TCSMers and the intelligence community re. the 'bugging' of politicos; perhaps nonsense.... Jo'burg Sunday Times - 15 Oct 2000, p20, Hogarth editorial column. Quote- 'It's no coincidence that Parliament was swept for bugs this week, 2 weeks after newspapers revealed the astonishing goings on in the ANC's confidential caucus, including President Thabo Mbeki's conspiracy theory on the CIA plot to discredit him. Since the reports appeared, several ANC MPs have pointed their paranoid fingers at journalists, claiming that their reports were so accurate that they must have bugged the caucus room - which can only mean that the claims by the ANC that the reports were unfounded are untrue.' - end quote. Unedited. No comment. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1708 From: Date: Sat Oct 14, 2000 7:16pm Subject: Re: VIRUS ALERT in "Monitoring violation prosecution" ATTN: STEVE...Whoever sent you this address for "www.POLICESCANNER.COM"... HAS A VIRUS IN IT.......CALLED......"LLCOOL". You need to contact everyone you sent mail to and warn them of this VIRUS. I have McAfee VirusScan thank God, I hope all others have something too, and don't lose their data. JML 1709 From: Talisker Date: Sun Oct 15, 2000 5:57am Subject: Re: Bugging spying - Special Electronic Security Products Ltd. Andre Thanks for the link, it's just what the doctor ordered, are there any other products with a similar function. My main concern is the legality of their use, I heard of someone being prosecuted for using one on a train. Any thoughts? especially for the UK Andy http://www.networkintrusion.co.uk Talisker's comprehensive IDS & Scanner List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "Andre Holmes" <1ach@g...> To: Sent: Sunday, October 15, 2000 12:30 AM Subject: [TSCM-L] Bugging spying - Special Electronic Security Products Ltd. > > > http://www.u-net.com/mbp/sol/its/securityonline/link2/328.htm > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1710 From: Talisker Date: Sun Oct 15, 2000 6:14am Subject: security tools notification Hi I have started a security tools notification service to complement my web site. http://www.egroups.com/subscribe/security-tools The website details every known commercial Intrusion Detection System and vulnerability scanner and some of the better freeware alternatives, I am currently extending it to include firewalls, I intend to extend it further to include anti virus and counter eavesdropping tools. I cannot see it extending beyond this, as I maintain it in my spare time (I don't have much) The notification service will very low volume 2-4 mails per month, detailing new and updated products and vulnerabilities in existing products. Andy http://www.networkintrusion.co.uk Talisker's comprehensive IDS & Scanner List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. 1711 From: Andre Holmes <1ach@g...> Date: Sun Oct 15, 2000 4:47pm Subject: Re: Bugging spying - Special Electronic Security Products Ltd. Hello Talisker I hope that you could use the information to help in your effects to repel the opposition. I finally found TIM JOHNSON at that site as well. He is a star in Electronic countermeasures. Best of luck to you ANDRE ----- Original Message ----- From: "Talisker" To: Sent: Sunday, October 15, 2000 6:57 AM Subject: Re: [TSCM-L] Bugging spying - Special Electronic Security Products Ltd. > Andre > > Thanks for the link, it's just what the doctor ordered, are there any other > products with a similar function. My main concern is the legality of their > use, I heard of someone being prosecuted for using one on a train. Any > thoughts? especially for the UK > > Andy > http://www.networkintrusion.co.uk Talisker's comprehensive IDS & Scanner > List > ''' > (0 0) > ----oOO----(_)---------- > | The geek shall | > | Inherit the earth | > -----------------oOO---- > |__|__| > || || > ooO Ooo > > > The opinions contained within this transmission are entirely my own, and do > not necessarily reflect those of my employer. > > > > > > ----- Original Message ----- > From: "Andre Holmes" <1ach@g...> > To: > Sent: Sunday, October 15, 2000 12:30 AM > Subject: [TSCM-L] Bugging spying - Special Electronic Security Products Ltd. > > > > > > > > http://www.u-net.com/mbp/sol/its/securityonline/link2/328.htm > > > > > > [Non-text portions of this message have been removed] > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > From: Jean Martino Date: Sat Oct 11, 2003 7:01pm Subject: Re: Re: Does LE normally conduct sweeps? I took his course in 2001 and there were some officers from the Detroit Police Department in our class. >From: "Doug Runyon" >Reply-To: "Doug Runyon" >To: >Subject: [TSCM-L] Re: Does LE normally conduct sweeps? >Date: Sat, 11 Oct 2003 12:25:42 -0500 > >I think it's somewhat rare to non-fed LE doing sweeps, though there are >exceptions. I remember back in the late 80's while doing some training out >at Ray Jarvis' place they were working heavily with the Detroit Police >Department. I believe they were training pretty extensively and even >testing an "in place monitoring system". > >Doug Runyon > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > _________________________________________________________________ Instant message in style with MSN Messenger 6.0. Download it now FREE! http://msnmessenger-download.com 7865 From: Samuel Hayes Date: Sat Oct 11, 2003 11:17am Subject: Re: New poll for TSCM-L As an electronics/computer neophyte with a keen interest in TSCM, I would like to see a REALISTIC career guidance path leading to proficiency in TSCM that DOES NOT require military or government service for those of us who are to old to enter service in these organizations. I have followed most of the advice given to me by the list members I have been in contact with offline and sought education in electronic fundamentals and electronics engineering (vocational/technical schools), Telecomunications (Bellsouth employment), various computer training and network security certification programs (private sector, some vendor specific)and I have tried to read everything I can get my hands on about TSCM. I am currently taking courses on antenea design and frequency modulation techniques at my local community college and feel like I am at a point where I want to see what a real sweep is like under the guidance and tutelage of a pro. Next year I will be starting on my pursuit of an electrical engineering degree from Georgia tech and hopefully this will lead to a position with the State Department as a Technical Security engineering officer (TSCM position). If I fail to be selected, I would hate to think the last 6 years of my life in pursuing this will be lost. That is why I would like to see an alternate career path to "TSCMship" (made that up all by myself with the help of Jessie Jackson and George W. jr, the KINGS of make believe words). Any one out there interested in taking on a 33 year old apprentice...I mow lawns and do dishes also (LoL). I have huge dreams and aspirations that revolve around TSCM and would like to enter the field with legitimate credentials. Help Me Out Guys Samuel R Hayes III TSCM Tech in the making --- TSCM-L@yahoogroups.com wrote: > > Enter your vote today! A new poll has been created > for the > TSCM-L group: > > What would you like to see Jim > Atkinson add to his website > tscm.com, to make it more helpful. > > o Equipment Reviews > o White Papers > o Basic Tutorials > o Profiles of Common Bugs > o More Bug Frequencies > o TSCM Proceedural Guides > o Model TSCM Policy > o Forensic Evaluation of Bugging Devices > o More Book Suggestions > o Counter Surveillance Guide > o Career Guidance Section > o Rant about ethics > o Rant about compentency > o More Government documents concerning TSCM > o Search Guides > o More Legal Stuff > o Attorneys Guide to TSCM > o Attorneys Guide to Eavesdropping > o Guide to PROPERLY investigate a bug discover > (for law enforcement) > o Court documents from SpyShop busts > o Court documents from Eavesdropping cases > o Layman's guide to dealing with bugging > o Rant about cordless and cell phones > o Tutorials on Sub-Carriers > o Please email jmatk@tscm.com with other > suggestions > > > To vote, please visit the following web page: > > http://groups.yahoo.com/group/TSCM-L/surveys?id=1142792 > > > Note: Please do not reply to this message. Poll > votes are > not collected via email. To vote, you must go to the > Yahoo! Groups > web site listed above. > > Thanks! > > > > > > > __________________________________ Do you Yahoo!? The New Yahoo! Shopping - with improved product search http://shopping.yahoo.com 7866 From: szabo4381 Date: Fri Oct 10, 2003 3:43am Subject: Wallscanner, type Bosch D-tect 100 Hi, to all Could be this item a "must to have" in your TSCM gear ?? info on :www.wallscanner.de 7867 From: Does it matter Date: Sat Oct 11, 2003 11:02pm Subject: Re: Does LE normally conduct sweeps? I run into this in computer forensics all the time. A company thinks that their network guy is qualified to seize, analyze, and report on the data contained on a computer because they are a network guy. Sigh why can't people stick to what they are good at? --- In TSCM-L@yahoogroups.com, "Steve Uhrig" wrote: > On 10 Oct 2003 at 23:39, A Grudko wrote: > > > Is it normal for police to conduct sweeps in the US? > > No. > > Very few law enforcement agencies have real capability for TSCM. And > they know it. They don't have the training, manpower or equipment. > That doesn't mean they'll say NO to the mayor though. > > The LE tech guys end up being assigned all sorts of miscellaneous > tasks by the powers that be, from repairing televisions to installing > burglar alarms to sweeping. The theory is if you are an electronic > surveillance type you can do anything involving electronics. > > There was a decent pub written for LE only a few years ago discussing > their sweep efforts. It was honest enough to state they largely would > be wasting their time trying to do an electronic sweep, and gave a > number of decent tips on physical search. > > One of the large surveillance manufacturers used to build their own > RF sweep gadget and offered TSCM training for LE along with their > standard training on positive aspects. They discontinued it quite a > while back. > > The officers taking the TSCM courses were ones getting ready to > retire and looking for something to do. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* 7868 From: Robert Motzer <1RCM@M...> Date: Sun Oct 12, 2003 8:48am Subject: We do it to ourselves One poster recently opined: Sigh why can't people stick to what they are good at? The reason is that within any profession one of two things must be present if it is to be considered a true profession: A very high degree of moral conduct and ethical business standards or mandatory compliance with set regulations. Take a look around the TSCM trade and you can readily see that the latter does not exist and the former is often played fast and lose. And perhaps that helps to contribute to the TSCM trade having more than the 'few bad apple' problems (and resulting reputation) that many other professions see. We do it to ourselves guys. Is it any wonder that a perspective client who receives six proposals where the providers are literally all over the map as to equipment to be used, fee requested, training and education possessed, etc., etc. makes a very bad choice in the eyes of several of those providers? I honestly see both good and bad in mandatory TSCM certification and/or licensing (although it hasn't fixed similar problems within the PI trade or in the South Carolina TSCM trade from what I understand). But it just seems like a strange world indeed when a person who sets up a shop to do nail manicures has to meet a minimum level of training standards, has to be equipped in a specified and regulated way, has to file for two different forms of licensing and is also hit with unannounced inspections by a regulatory board while something as important as TSCM is simply 'allowed to be'. Sometimes when we take an honest look around the answers are found within! Just another Bob ..... [Non-text portions of this message have been removed] 7869 From: Date: Sun Oct 12, 2003 11:16am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7870 From: Date: Sun Oct 12, 2003 11:16am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7871 From: Hawkspirit Date: Sun Oct 12, 2003 1:33pm Subject: Re: Does LE normally conduct sweeps? One poster recently opined: Sigh why can't people stick to what they are good at? Roger says: As I mentioned recently, if I don't sweep several times a week I loose the automatic sharpness and rhythm with the test gear. Also there is no substitute for hands on field experience. I have done 2500 sweeps in thirty years and when I hear the other people talk about massive check lists I find it pretty funny. I don't have even one check list. I do this work three to five times a week and I have it all in my head. I sweep lean and mean and only spend time on tests tailored to the environment to be tested and the accessed treat level. Never a preset game plan, every sweep is set by what is present and how it is connected. If you are a LEA tech and do a few reoccurring sweeps a year, you are not going to have the sharpness and field knowledge of the guy who does a different office and a different phone system several times a week. You probably have been sold the bogus tale that the test gear is so automated that it will sweep itself. I recently put my analyzer side to side with one of the top named TSCM analyzers and it flunked big time on seeing spurious signals. The guy who had paid big bucks for this thing was needless to say very unhappy. Staying up with this business is a full time job, I spend six to ten hours on days when I am not in the field in my lab, in my library, and on the net staying informed. How many of you guys can detect a wireless bug that transmits in 802.11 protocol? How many can detect a digital tap on a T-span? If not you are not putting enough hours in. There are only two answers at the end of a sweep, "yes you are" or "no you are not", "I'am not sure" is not in a sweepers vocabulary. Roger Tolces www.bugsweeps.com 7872 From: Steve Uhrig Date: Sun Oct 12, 2003 5:29pm Subject: Radar Man If you should see upon the street a Radar Man with micro feet and a lagging train of pips behind, he's a Radar Man with a micro mind. With micro seconds and micro volts and micro waves, he fills his days and thereby in the course of time, he developed a micro mind. This man obtained in passing years, infinite impedance between his ears and finally succumbed to a heavy jolt when he got what he thought was a micro volt. So if you should see upon the street a Radar Man with micro feet and a lagging train of pips behind, he's a Radar Man with a micro mind. ----------------------------- Author Unknown Circa ~ 1960 ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7873 From: Shawn Hughes Date: Sun Oct 12, 2003 5:56pm Subject: Re: Digest Number 1385 TSCM Digest 1385 From: "A Grudko" >Is it normal for police to conduct sweeps in the US? Steve makes some valid points, however, I feel like he discounts the abilities of LEO Technical people a bit. When I was with the Knox County (TN) Sheriff's Office, I was detailed to do sweeps on a regular basis. While we had the blinky toys like the OSCOR, we also had several other tools, including SpecAn and TDR, and of course what I used the most, a flashlight and screwdriver. I like this quote: >The LE tech guys end up being assigned all sorts of miscellaneous >tasks by the powers that be, from repairing televisions to installing >burglar alarms to sweeping. The theory is if you are an electronic >surveillance type you can do anything involving electronics. I believe it is true. Both in the things you are asked to do, and the fact that you can accomplish whatever they ask you to do. If you truly are an 'electronic surveillance' type, you SHOULD be able to do anything involving electronics. Shawn **************************************************************************** ****************************** Shawn Hughes Lead Instructor Tactical Response, Inc. WMD / EOD / PSBT Operations Uncertified Public Safety Bomb Technician Hazardous Materials Technician Member, International Association of Bomb Technicians Region VI www.warriormindset.com Ph. - (865)388-0305 email - srh@e... ---------------------------------------------------------------------------- ------------------------------------------------ 7874 From: Mike Dever Date: Sun Oct 12, 2003 6:49pm Subject: TSCM Accreditation Members of the list may be interested in the activities of the Association for Technical Surveillance Professionals (UK) who are currently developing standards for accreditation of TSCM operatives. www.tscm.org.uk Regards Mike Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Voice: (02) 6254 5337 Email: dca@b... This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. 7875 From: Robert Motzer <1RCM@M...> Date: Mon Oct 13, 2003 9:34am Subject: Just food for thought Hi List, I have no intent or desire to resurrect the great debate on whether or not a sweeper is legally or morally obligated to report a find to law enforcement. But since the current microscope is on Pennsylvania I'll offer the following from a good friend in the upper end of the Pennsylvania State Judicial System regarding that very question (it has been paraphrased as, being a lawyer, he tended to be wordy as lawyers always are): Some very convincing guidance can be gotten from Pennsylvania Crimes Code Section 5108 which appears below .... ß 5108. Compounding. (a) Offense defined.--A person commits a misdemeanor of the second degree if he accepts or agrees to accept any pecuniary benefit in consideration of refraining from reporting to law enforcement authorities the commission or suspected commission of any offense or information relating to an offense. Since presumably very few sweeps are done for free, and a sweeper would have great difficulty convincing a judge or jury that he/she is so incompetent that he/she is not aware that the utilization of electronic eavesdropping devices (what he/she is being contracted to find after all) is a violation of the law in every State in the US, if a device or suspected device were to be found by the sweeper this section makes it a violation of Pennsylvania law for that sweeper to let the reporting of his/her find to law enforcement up to the discretion of a client. Take from this what you may and allow it to guide your actions within the TSCM trade (since most US States have some type of similar 'catch-all' statute on the books) as you see fit." Bob Motzer _________________________________________________________________ Express yourself with MSN Messenger 6.0 -- download now! http://www.msnmessenger-download.com/tracking/reach_general 7876 From: Robert Motzer <1RCM@M...> Date: Mon Oct 13, 2003 2:30pm Subject: Additional information I recently received this from Ted Swift and am forwarding it with his OK. Those of you who know Ted know him to be a real professional (and a gentlemen as well) in the TSCM trade. The person who gave me the legal opinion regarding 'duty to report' in Pennsylvania has since told me that this is precisely the Federal 'winner' that she referenced in her dissertation response to my question (I left that part out of my previous posting as the thread at the time was only concerning Pennsylvania). Any legal-beagles on the list care to tackle the legal merits of this one pro or con???? --------------------------------------------------------- "I wonder whether the following statute would apply in the instance of NOT reporting an eavesdropping find. 18 U.S. C Sec. 4. - Misprision of felony Whoever, having knowledge of the actual commission of a felony cognizable by a court of the United States, conceals and does not as soon as possible make known the same to some judge or other person in civil or military authority under the United States, shall be fined under this title or imprisoned not more than three years, or both." Bob Motzer _________________________________________________________________ Help protect your PC. Get a FREE computer virus scan online from McAfee. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963 7877 From: Date: Mon Oct 13, 2003 4:40pm Subject: Phila. Inquirer article on bug sweeps http://www.philly.com/mld/inquirer/news/front/6999636.htm Posted on Mon, Oct. 13, 2003 Johnson: Bosses unaware of sweeps By Craig R. McCoy and Mark Fazlollah Inquirer Staff Writers Police Commissioner Sylvester M. Johnson said yesterday that he routinely used outside security experts to sweep the mayor's office for bugs, often doing it without telling his bosses. Johnson disclosed his unusual procedure when asked about recent statements by former Police Commissioner John F. Timoney and a former top police commander, who said debugging of the mayor's office was a rare occurrence. In fact, Johnson said in an interview, such debuggings of the office occurred fairly often, but that Timoney and other senior police were not told. And he said it had been a long-standing practice, though no records of the searches were ever kept. Such outside sweeps were necessary, he said, because Philadelphia police have a serious problem of maintaining secrecy. "There are times we cannot trust the police because of leaks," he said. "Once one person in the Police Department knows something, everyone knows something." Since the discovery of the FBI bug, law enforcement officials have said Street was a subject of an inquiry into alleged municipal corruption. Federal agents have taken three of the mayor's BlackBerry handheld computers and confiscated city documents. Still, the mayor has not been identified as a "target," a term used by the Justice Department to describe a person whom prosecutors are prepared to indict. Street has denied any wrongdoing and said he would cooperate with the investigation. The issue about how the bug was discovered arose last week after Johnson made his initial comments about the discovery that rocked the city Tuesday. In that explanation, Johnson and the mayor called the sweep routine. This characterization seemed at odds with later comments from Timoney and John J. Norris, the deputy police commissioner who retired in June as commander of Internal Affairs. But Johnson said neither Timoney nor Norris was aware of the full range of the sweeps he had ordered. In the interview yesterday, the commissioner also made these other points: He said that he decided, on his own initiative, to sweep the office Tuesday. He said neither Street nor Street aides requested the search. Johnson said he had heard that Republican mayoral candidate Sam Katz had recently had his GOP campaign office swept. This, plus the fact that the campaign seemed "very, very bitter," prompted him to order the Tuesday check, Johnson said. Once the bug was found, he said, he did not consider returning it while seeking to find out whether his officers had stumbled upon an ongoing governmental investigation. Doing that, he said, would have improperly put him in a position to mislead his superior, Mayor Street. As a practical matter, Johnson said, he doubted that the news about the bug could have been kept secret among police. Though only three police officers were part of the debugging team, Johnson said, he fielded his first call from a reporter about the bug 20 minutes after he left City Hall on Tuesday, having inspected the newly discovered bug. Tuesday's sweep was carried out by Philadelphia police officers assigned to the police IMPAC team, part of the Internal Affairs Bureau. The same team had conducted a sweep of the mayor's office about four months ago, finding nothing, Johnson said. Although he had been concerned about leaks, Johnson said he used Philadelphia police Tuesday because the check was "just a standard thing, there was nothing special about it." In the past, though, Johnson said he had used experts from outside the force to sweep Room 215, the spacious mayoral office in City Hall. He said he did this to forestall "leaks" to the media about those sweeps. The commissioner declined to say whom he had used for the debugging service. He did say, however, that he had drawn upon "reciprocal arrangements," suggesting he had used other investigative units or police forces. Tuesday's search, he said, was actually part of a routine debugging that he has conducted for 17 years. As he has risen in the department, Johnson has had direct command of mayoral security since about 1986, overseeing it for Street and former Mayors W. Wilson Goode and Edward G. Rendell. Johnson said that when he was a deputy under Timoney, he used outside experts several times without telling Timoney. No records were kept on which outsiders were used, he said. Timoney, who served as police commissioner from March 1998 until December 2001, said he recalled that the mayor's office had been swept "once or twice" while he was commissioner. He said he was unaware of any use of outside experts to conduct searches. Norris, as head of Internal Affairs, was directly in command of the Internal Affairs officers who handle electronic debugging. He said he knew of only one sweep of the mayor's office from 1998 until he retired early this summer. That sweep occurred two years ago, Norris said. Johnson said that ordering sweeps was just another task within his command - "just routine," not something he needed to brief the commissioner about. "I was doing my job," Johnson said. "I didn't tell Timoney every time I made a drug raid." Johnson said that while Norris supervised the debugging experts assigned to Internal Affairs, Norris was not in charge of mayoral security. For that reason, Johnson said, Norris would not have known when Johnson used outside personnel. Norris said yesterday he was angered that Johnson said he had kept him out of the loop. "I'm appalled by it," Norris said. "If he was using outside agencies and not the Philadelphia Police Department, that means he didn't trust John Timoney or John Norris or the Philadelphia Police Department." Norris said that Johnson should identify the outside experts used for the debugging. Street, in an interview last week, said there had been "nothing special" about the sweep Tuesday. He said checks were Johnson's responsibility. "He has the discretion to sweep the offices, and he decided to do it," the mayor said. Asked whether he had asked Johnson to make Tuesday's check, Street replied, "No, I did not." Kate Philips, a spokeswoman for Gov. Rendell, said that Rendell, as mayor, was aware that his office was periodically swept for bugs. But Rendell didn't know how often it was done or who did it, she said. The sweep at City Hall was done about a week after the Street mayoral campaign hired a private firm to sweep its main headquarters at 16th and Cherry Streets, according to a person familiar with that check. Although Johnson said he had heard that the Katz camp had also done a sweep, Katz campaign spokeswoman Maureen Garrity said yesterday that her campaign had not done an electronic sweep of its office. Garrity said the campaign had used a private security firm several weeks ago to visually check its headquarters at 17th and Market Streets. Nothing was spotted, she said. ------------------------------------------------------------------------------ -- Contact staff writer Craig R. McCoy at 215-854-4821 or cmccoy@p.... Staff writers Leonard N. Fleming, Chris Gray, Linda K. Harris, Robert Moran and Joseph Tanfani contributed to this article. [Non-text portions of this message have been removed] 7878 From: savanted1 Date: Sun Oct 12, 2003 0:49pm Subject: Thank You First of all I would like to extend my warm and pleasantwlecome and thanks to this List. I do a lot of work over at the Security + study group on Yahoo. I also am an active participant on the Central Discussion Hub For Leading Security Certifications at http://www.securitytalks.com. I will be actively participating as needed as my experience within the realm of TSCM grows. I have a lot of agendas as of late but none of them are hidden I aim to become a TSCM professional and I am kind of in the same category as sr3hayes, whom briefly spoke in the last message I recieved. Very Sincerely, Savanted1© 7879 From: Shawn Hughes Date: Wed Oct 15, 2003 7:59pm Subject: looking for software Looking for a copy of digicleen. Their site morphed into something else, and noone has answered my requests. They used to have a free demo for download. Thanks in advance! Shawn Hughes Lead Instructor - Tactical Response, Inc. 7880 From: James M. Atkinson Date: Wed Oct 15, 2003 8:40pm Subject: Watch Those Conducted Signal Paths Folks [Repost] Watch Those Conducted Signal Paths Folks Recently, I had a client contact me to come in for an unscheduled and after hours evaluation of a executives desktop computer. Their in-house security people came across an "anomaly" and wanted an outside consultant to check it out. Security Posture: Client has good locks, good doors, good alarm system, good lighting, good video coverage of ingress and egress points and so on. The entire building is also subject to random TSCM inspections. He and his staffs office are check weekly by their internal security people for RF devices (plus a physical inspection). Also, an outside TSCM service provider (guess who) comes in every 90 days or so for a full extended survey. Articulated Threat: Client was suspicious as his firm has been laying off people in droves, the stock is in the dumps, competitors are trying a hostile takeover, they are embroiled in multiple lawsuits, etc, etc, etc. He feels that his desk and files have been getting rummaged though several times a week, and their security people are fairly certain that it is one of their senior tech support people (can you say "covert video"). Confirmation and Rationale: "Word has leaked" just prior to several layoffs about certain very specific things that were being said in this executives specific office concerning specific people, their separation packages, and other details. Additionally, covert audio recordings from some of these meetings (in that specific office) have been played back to executives in an attempt to manipulate the negotiation of larger severance packages. General Findings: A senior tech support person appears to have modified the suspect computer to pass audio though the un-used cable pairs used on the 100 -Base-T computer network. Furthermore, software was found on the tech support persons computer to allow long term digitizing of the audio which appeared on the LAN tap which was programmed to automatically email copies of the compressed audio files to a secondary off-site computer (where it was being served up as MP3 files). Evaluation of automated backup tapes located copies of these MP3 files being downloaded by, or being anonymously e-mailed to other employees in the company. Finding Details: Modification consisted of two Kynar wires tack soldered to microphone input on [executives] computer motherboard, a small AGC microphone driver circuit board (kit type) drew power from mother board and pushed the audio signal down the LAN wires to the IDF where it was cross wired to the LAN wiring which went to the tech's desk (several floors away). LAN wiring was traced back to [techs] computer where it appeared on his LAN card. [Tech's] computer was checked and a similar patch was found from the LAN card to his microphone input on the motherboard (he was using the executives microphone as his own). There was no foreign RF emanations, and no visible external mods to either machine. Clear room audio was observed on the punch blocks in the IDF phone room on un-used pairs but the wall plates were un-modified. Excessive damage (relative) to other cable pair punch connections (scratches and plastic deformation) which provide related services the same room indicated that there have been multiple past intrusions. There were no modifications external to the computers other then the jumper wires in the phone rooms. Inspection of the techs desk and work areas by the companies security department located change and master keys for the entire complex, various recording devices, catalogs for eavesdropping devices, a handgun, ammunition, and other contraband (he claimed to be a reserve cop). Computer records [on his machine] indicate that the intercept had been in operation for only a few weeks prior to discovery. After Action: The tech was interviewed and dismissed (with a severance package) the next business day and a formal incident report filed with the appropriate law enforcement agency (but the company will not press charges). During the the extensive interview session the subject confessed and prepared a written statement where he stated it was done simply for revenge (he was upset about not getting a Xmas bonus). Client is now performing a full conductor check for the entire facility, as well as a hardware and software physical inspection. They are also replacing all lock cores and locking down the building, etc. -jma [Note: I was given permission to post this incident report to the TSCM-L list provided that the client (who's security people are list members) was not identified in anyway... They have reviewed this sanitized posting and approved its release] -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7881 From: Date: Wed Oct 15, 2003 9:47am Subject: RFID I don't know much about RFID, but its use for tracking purposes has me concerned so I am interested in countermeasures. I hear a lot of talk about privacy concerns but I have not found any solutions so I figured the members of this list could steer me in the right direction. I know TSCM professionals are typically interested in locating and removing devices but it the case of RFID it seems to be more cost-effective to just disable them. It appears that the ability to disable them has been taken out of the specification so I am looking for ways to defeat them. One way might be to jam them. They operate on relatively few frequencies ( 125 KHz, 13.56 MHz, 866 MHz through 930 MHz, and 5.8 GHz are common) so it should be relatively simple to create a box that simply transmits the ID of your choice. Another way might be to use directed HERF and simply roast the device. This wouldn't work for RFID devices that are near other electronic devices, though. Both ways have legal implications. A user of such a device would have to possess the appropriate FCC license, and the countermeasures must not be intended to perpetrate fraud. There are other legal and practical issues that arise as well, but we should save that discussion for later. So I'll leave you with the following questions: - Should I pursue either of my proposed solutions further? - Are there any other ways to defeat RFID? - Is it even legal for me to try to defeat RFID? - If I can't defeat them is there a way to locate RFID devices that is easier and/or cheaper than scanning an area with every available RFID reader? Thanks in advance - Cory Bys CISSP, TICSA, GSEC, CCSE, CCSA, TCP, CNST http://www.kgb.to/ ******************* N O T I C E ******************* The information contained in this e-mail, and in any accompanying documents, may constitute confidential and/or legally privileged information. The information is intended only for use by the designated recipient. If you are not the intended recipient (or responsible for the delivery of the message to the intended recipient), you are hereby notified that any dissemination, distribution, copying, or other use of, or taking of any action in reliance on this e-mail is strictly prohibited. If you have received this e-mail communication in error, please notify the sender immediately and delete the message from your system. *************************************************** 7882 From: Date: Wed Oct 15, 2003 9:59pm Subject: Scott Petersons GPS today the prosecution in the Scott Peterson case filed a court doc (see: http://www.pressupdate.info/pdfs/peterson/101503/PandA_101503.pdf ) to request a private "in-camera hearing regarding the location where the GPS receiver was placed on the defendant's vehicle. The people make this request because that information is official pursuant to Evid, Code, Sec. 1040." ... "It is necessary that said information remain confidential so as to not adversely affect future investigations." can someone translate this? why does it have to be outside the defendants presence? what does this have to do with the admissibility of GPS tracking info? where did they put the GPS anyway? they refer to some 1976 case involving the confidential nature of vehicle identification numbers - what does the VIN have to do with the location of the GPS receiver? thank you! Val 7883 From: Mitch D Date: Thu Oct 16, 2003 1:25pm Subject: Hidden Camera Installer in Kats Cheerleaders Locker room revealed Ran across this,old news,except the defendant comes clean: http://www.newschannel5.com/news/investigates/insidestory/archive/2002/051402.htm The Inside Story Arena managers get hidden-camera blame (May 14, 2002) A lawsuit filed by some former Nashville Kats cheerleaders put the arena's hidden camera scandal in the headlines. But few noticed a highly unusual statement recently filed by the chief suspect in that case. NewsChannel 5 investigative reporter Phil Williams has The Inside Story.Video *** The man accused of planting a hidden camera inside a dressing room at Nashville's arena now admits he did it. That admission comes in a document filed in court. But John Day is apparently determined that he's not going to be the fall guy. You'll remember, a hidden camera was discovered last fall inside this dressing room. Caught on tape were members of the Nashville Kats cheerleading squad in various states of dress and undress. The company that runs the arena downplayed the incident. In fact, Powers Management never told the victims, until after I broke the story. Then, for some reason, they refused to let the victims read a statement that investigators had taken from Mr. Day. Now, the court document suggests the suspect was probably pointing the finger back at arena managers. In their response to the lawsuit, Day's lawyers say: "Mr. Day ... admits that he was encouraged to use hidden cameras by Powers Management. Mr. Day further admits that hidden cameras were routinely used." After I first reported that the dressing room incident wasn't a first, arena managers acknowledged that a hidden camera had been planted in one of those high-priced suites on one occasion -- supposedly to catch someone who had been stealing liquor. But now, I'm told, Day is prepared to testify that cameras had been hidden in those suites on many other occasions. The question is: will some prominent Nashvillians be smiling when they learn they may have been caught on the arena's version of Candid Camera. I'm Phil Williams, and that's The Inside Story. __________________________________ Do you Yahoo!? The New Yahoo! Shopping - with improved product search http://shopping.yahoo.com 7884 From: Hawkspirit Date: Thu Oct 16, 2003 5:06pm Subject: Bug Sweep Articles Here is a new addition to my historical articles section, one for you Manny Mittleman fans. Grab your harmonica! Outwit the Electronic Eavesdroppers Popular Mechanics December 1965 http://www.bugsweeps.com/info/pop_mech-12-65.html 7885 From: Hawkspirit Date: Thu Oct 16, 2003 6:16pm Subject: Digital Sweepers From: "James M. Atkinson" Subject: Watch Those Conducted Signal Paths Folks [Repost] Watch Those Conducted Signal Paths Folks Recently, I had a client contact me to come in for an unscheduled and after hours evaluation of a executives desktop computer. Their in-house security people came across an "anomaly" and wanted an outside consultant to check it out. Roger says: I want to completely agree with Jim on finds like this, that the bugs and wiretaps coming down the line now are a whole different animal. With the prevalence of computer networks in almost every business environment, the digital bug and wiretap are here. As I said in my posting last week, "How many of you guys can detect a wireless bug that transmits in 802.11 protocol? How many can detect a digital tap on a T-span? If not you are not putting enough hours in." This is right in line with a find like Jim has described. The fact is we must become "digital sweepers" or we will be soon be obsolete! Roger Tolces www.bugsweeps.com 7886 From: Date: Sat Oct 18, 2003 4:35am Subject: spouses can no longer wiretap each other without fear of being sued [ The Atlanta Journal-Constitution: 10/18/03 ] Wiretaps by spouses actionable Court lets suit proceed By BILL RANKIN The Atlanta Journal-Constitution Sparring spouses can no longer wiretap each other without fear of being sued in federal court. In an opinion issued Thursday, the 11th U.S. Circuit Court of Appeals in Atlanta overturned a 29-year-old precedent that barred invasion-of-privacy lawsuits by spouses over wiretaps, even though the practice is a crime. "It's about time and long overdue," said Jeffrey B. Bogart, an Atlanta family law and criminal defense attorney. He said he has come across divorces with one spouse wiretapping another to catch an infidelity "more often than I'd like to see." Atlanta family law attorney John Mayoue said some studies estimate more than 75 percent of all wiretaps are done in family settings. This includes feuding spouses who try to use taped phone conversations as leverage in divorce disputes. "I think people in this country should be on notice we do not wiretap, period," Mayoue said. In Georgia, wiretapping is a felony with penalties of up to five years in prison and a $10,000 fine. But Mayoue said prosecutors, more inclined to charge more serious cases involving drugs and violence, rarely get involved in wiretaps in domestic disputes. "And most husbands and wives candidly think they just can't get DAs interested in this so they don't even bother to try," the attorney said. Clayton County District Attorney Bob Keller said he could not recall such a prosecution during his tenure. He said local prosecutors typically get involved in domestic disputes only when there is physical violence or threats of violence. The 11th Circuit issued its ruling in a case involving James and Elisabeth Glazner of Birmingham. After Glazner filed for divorce in 1999, he bought a recording device at Radio Shack and surreptitiously attached it to a phone line in their home. He then left on a trip. While he was gone, Elisabeth Glazner detected a hollow sound on the phone line, checked it out, found the recording device and called police. Before the Glazners' divorce was finalized, Elisabeth Glazner filed a federal lawsuit against her husband under a 1968 law banning wiretaps of "any person." But the case was dismissed by a federal judge, who cited a 1974 court precedent that said there was "implied consent" among married couples to wiretap each other in their own home. In Thursday's ruling, the 11th Circuit threw out that precedent entirely, noting that many other courts across the country that have considered the issue have ruled the other way. The 11th Circuit's decision applies to all three states within its jurisdiction: Georgia, Florida and Alabama. Elisabeth Glazner will now go to trial against her ex-husband, said her lawyer, Bruce Gordon. [Non-text portions of this message have been removed] 7887 From: Johnston, Richard Date: Thu Oct 16, 2003 7:38am Subject: RE: Scott Petersons GPS My reading is that the police placed GPSs on vehicles Peterson had access to. They do not want to reveal in open court where/how they placed those devices because it is "official information" or tradecraft. VIN numbers are not confidential, they are often visible from outside the vehicle. But the identity of the vehicles the police installed devices on could be confidential, so they do not want those VINs released. -----Original Message----- From: val@c... [mailto:val@c...] Sent: Wednesday, October 15, 2003 8:59 PM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Scott Petersons GPS today the prosecution in the Scott Peterson case filed a court doc (see: http://www.pressupdate.info/pdfs/peterson/101503/PandA_101503.pdf ) to request a private "in-camera hearing regarding the location where the GPS receiver was placed on the defendant's vehicle. The people make this request because that information is official pursuant to Evid, Code, Sec. 1040." ... "It is necessary that said information remain confidential so as to not adversely affect future investigations." can someone translate this? why does it have to be outside the defendants presence? what does this have to do with the admissibility of GPS tracking info? where did they put the GPS anyway? they refer to some 1976 case involving the confidential nature of vehicle identification numbers - what does the VIN have to do with the location of the GPS receiver? thank you! Val Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 7888 From: Lee Tracey Date: Thu Oct 16, 2003 8:22am Subject: ATSCP I am a mite puzzled about this ATSCP organisation that claims to be an independent body to set standards for TSCM professionals. Recently on my television set has been a set of programmes about "Magick" - everything done with smoke and mirrors. This new body appears to also be all "smoke and mirrors" and no substance. A powerful warning shot was the announcement that Mr J. Little had been appointed as a "Chairman". Mr Little is a trader seeking after and trying to acquire sweeping work in competition with the very professionals he is claiming to represent. It is also significant that I cannot find any of the top professionals in the business who are willing to be associated with this "ATSCP" group. This smells to me like a phoney operation being set up to grab business from under the noses of the hard working and professional operatives. Their website looks excellent but then so do many magic tricks - but behind it is all smoke and mirrors. Lee Tracey [Non-text portions of this message have been removed] 7889 From: larry d chapman Date: Thu Oct 16, 2003 10:31am Subject: Re: Latest Philly Info The following may be of interest to those of you following this story. The lesson seems to be that periodic sweeps and a good physical will increase your chances of a find. "http://www.philly.com/mld/inquirer/news/front/7014707.htm Posted on Wed, Oct. 15, 2003 Judge limited FBI's eavesdropping By Mark Fazlollah, Rose Ciotta and Emilie Lounsberry Inquirer Staff Writers The bugging lasted only two weeks. The device used to eavesdrop on conversations in Mayor Street's City Hall office was secretly planted about two weeks before Philadelphia police discovered it in the ceiling, people familiar with the investigation said yesterday. The bugging was limited in another important way: FBI agents were not permitted to listen in on all of the dozens of people who met with the mayor, but only to conversations involving a short list of visitors, the sources said yesterday. The judge who approved the bugging signed off on a restricted order that sought to strike a balance between the FBI's attempt to ferret out possible evidence of wrongdoing and the right to privacy of Street and any citizens who met with him, the official said. The fact that the bug - a state-of-the-art device powering two microphones - had to be turned on and off strongly suggests something else: That the FBI, either by tailing suspects or relying on an informant, knew when the selected list of people would arrive for meetings at City Hall Room 215, the spacious mayoral office. It could not be learned precisely which people the judge gave the FBI agents approval to bug. Whatever comes of the active FBI investigation under way, the fact that the plant was only active for a relatively brief time suggests that any evidence gathered from the bug may be limited in scope. The new information about when the bug was planted shows that federal authorities took the highly unusual step of bugging an American mayor's office about six weeks before what was shaping up to be a razor-close election. As the news emerged about the limited run of the bug, there were these other developments: A former aide to the mayor said she had tried to help his brother, T. Milton Street Sr., by seeking information about the bidding process for a lucrative airport contract. The former aide said her actions were proper. The FBI is investigating that contract. Street and GOP challenger Sam Katz wrangled over the issue of ethics in a live radio debate yesterday morning. A federal judge last night rejected a bid by The Inquirer and the Daily News to make public the warrant approving the use of the bug and other investigative material. It was learned that federal investigators zeroed in last week solely on contracts involving businessman and Street supporter Imam Shamsud-din Ali in issuing a subpoena to a city agency. The subpoena sought documents from the Minority Enterprise Business Council, an agency that enforces city laws requiring that a share of city business goes to minorities and women. The fact that the bugging device was not operating continually may have also made it harder to detect. The FBI, a source said, thought this would render the device less likely to be discovered by anyone checking for a hidden listening device. Ed Steinmetz, a private security expert in New Jersey, said high-tech bugs typically can be remotely turned on and off. Steinmetz, who does electronic sweeps for businesses and individuals, said this conserved battery power and helped thwart de-buggers. "If a sweep team comes in, they're less likely to find it," Steinmetz said. "If the unit's not transmitting, you're not going to find it." But a Philadelphia police team of three officers did find the bug, on Oct. 7. According to officials, the police de-buggers were alerted, in part, by the fact that they observed that an unspecified object, perhaps visible in the mayor's drop ceiling, had been moved slightly since the same team had checked a previous time for bugs - about four months ago. No bugs were found then. Police Commissioner Sylvester M. Johnson has said that he sent the team in to do a check as part of a routine policy of sweeping the mayor's office. While he used police for the sweeps this year, Johnson also surprised some of his former colleagues by saying that he had also used outside experts to conduct previous sweeps. He said he did this to forestall media "leaks" from police about the checks. The Inquirer has filed a request for any city documents reflecting the spending of taxpayer money on such outside experts. The newspaper cited the state's Right to Know Act in its request. It is unclear what records might exist. Johnson said records were not kept. While declining to say what outside experts had done the sweeps, he suggested that he had drawn upon "reciprocal arrangements" with suburban police or other investigative agencies to get the work done for free. Since the discovery of the bugging device, law enforcement officials have said that the mayor is a subject of a long-running and wide-ranging federal inquiry into possible municipal corruption involving contracts. Besides bugging Street's office, federal authorities have also taken custody of three handheld computers used by the mayor for e-mail. The mayor has not been identified as a "target" of federal prosecutors, a specific term they use to describe someone facing possible indictment. Street has denied any wrongdoing and said he would cooperate with any federal inquiries. The investigation apparently began about two years ago. Also, federal authorities this summer issued a subpoena for 25,000 pages of contract relating to a $13.6 million contract at Philadelphia International Airport, a contract with a company that had ties to Street's brother, Milton Street. Grand-jury subpoenas were issued at that time. Another subpoena in the summer sought documents from the city's Minority Business Enterprise Council. After the discovery of the bug a week ago, federal authorities stepped up their pace, fanning out to interview city officials and others as part of the probe. Among those interviewed in the last week was John Christmas, a city deputy chief of staff. Federal agents visited Christmas on Thursday night at his home in the city's Fairmount section. Christmas could not be reached for comment. Barbara Grant, the mayor's spokeswoman, said Christmas, who handles budgeting issues for the Mayor's Office, including contracts, had been asked generic questions about city business. "Beyond that, we don't really know what they were looking for," Grant said yesterday. In the burst of activity last week, FBI agents on Oct. 8, a day after the bug was found, searched the home and office of Ali, a Muslim cleric who is an executive with a small business that had a city contract to collect back taxes. Agents also seized documents from Ali's accountant. In addition, federal authorities served a subpoena on the Minority Business Enterprise Council, seeking records on companies associated with Ali. Ali could not be reached for comment yesterday. City Solicitor Nelson Diaz had told reporters that the documents dealt with the agency's "process" and had "nothing to do with criminality that I'm aware of." His staff would provide no further details. Ali and his wife, Faridah Ali, operate several small companies and nonprofit groups, many of them based in their Germantown Avenue office. The companies and organizations have received money from political campaigns, government contracts and government grants." -- --------- Original Message --------- DATE: Wed, 8 Oct 2003 15:41:09 From: MACCFound@a... To: TSCM-L@yahoogroups.com Cc: Discovery of bugging device in Philadelphia mayor's office causes a furor ............ ____________________________________________________________ Enter for a chance to win one year's supply of allergy relief! http://r.hotbot.com/r/lmt_clrtn/http://mocda3.com/1/c/563632/125699/307982/307982 [Non-text portions of this message have been removed] 7890 From: Mr. G.Hord Date: Fri Oct 17, 2003 3:27pm Subject: Registry Edits for Windows XP Dear, List group Here is some useful information that pertains to the windows XP operating system this document is in rtf format and needs to have the XML attrib utes removed and converted to Pdf. Savanted1© Mr. Garrett Hord Innovations At The Speed Of A ThoughtÆ ~~~~~~~~~~~~~~~~~==============~~~~~~~~~~~~~~~~~~~ This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. --------------------------------- Do you Yahoo!? The New Yahoo! Shopping - with improved product search [Non-text portions of this message have been removed] 7891 From: mooty_7 Date: Fri Oct 17, 2003 8:37pm Subject: the rest of the philly mayor story... In a stunning development in the federal inquiry that has enveloped Mayor Street, FBI agents searched three city agencies today, and the office of a lawyer who is an ally of the mayor and a leading fund- raiser for his reelection campaign. The extraordinary raids took place at the city Finance Department, the city treasurer's office, and the city Board of Pensions & Retirement, as well as at the law office of Ronald A. White, a major player in the city's lucrative government bond business. White, who was outside his office on Broad and Walnut Streets as the search was proceeding this afternoon, declined to comment. The execution of search warrants inside city offices today by FBI agents - which virtually halted the normal course of business - prompted a hastily called news conference by the mayor last night. Speaking to reporters at City Hall, Street expressed concern about the timing of the searches and worried about the ability of city voters to remain focused on the forthcoming election. The mayor - who has been identified as a subject of the probe - said it was "unfortunate that these events, conducted in this way, have in effect hijacked this election." But he pledged to forge ahead. "I intend to be the mayor and run the government," said a subdued Street. "I also intend to be the candidate and work hard on the campaign." U.S. Rep. Bob Brady, chairman of the Democratic City Committee, denounced today's raids. He and some Democratic colleagues were drafting a letter to the Justice Department calling on federal officials to make public details of the investigation. "We're going to call for honesty," Brady said. "We want them to come out and tell us what's going on." At the White law office, meanwhile, agents worked into the night, carrying empty boxes and what appeared to be computer equipment to the second-floor office. About a half-dozen agents finally emerged shortly before 8 p.m. and carried out about 50 boxes with markings that read: "PHA," "Tasker Homes," and "Bonds." The searches were the latest development in the federal investigation that has plagued the mayor since a sophisticated FBI listening device was discovered last week in the ceiling of his City Hall office. People familiar with the inquiry have said that the wide-ranging corruption investigation focuses on city contracts, and one city official said that the investigation appears to be focusing, in part, on the lucrative city bond business. "It is virtually impossible to know what they're looking for because, as you probably know, an awful lot of information has been requested," Street said last night. City Solicitor Nelson A. Diaz, who confirmed raids at the city Finance Department and the pension board, declined to disclose what the warrants contained, or what documents were seized by agents. But Diaz complained that the raids violated an agreement he had reached with the U.S. Attorney's Office to voluntarily provide whatever documents federal investigators wanted. "It really disturbed me because I thought we had a deal with the U.S. Attorney's Office," said Diaz. The city has turned over "thousands and thousands of documents" to federal investigators over the last year, he added. He said that federal authorities were supposed to give advance notice of any requests for documents but he said he learned of today's search after it had started, from Finance Director Janice Davis. U.S. Attorney Patrick Meehan said prosecutors in his office had met with Diaz about an unrelated matter in July and more recently with a top deputy in Diaz's office about a "recent search of a city office and interview of city officials." "In each instance we unambiguously communicated the necessity to take whatever investigative steps are appropriate to safeguard and preserve evidence," Meehan said in a statement. "To now suggest that we breached a promise is entirely unfair and inaccurate." FBI spokeswoman Linda Vizi would say only that agents conducted searches at several locations. "We executed several search warrants at various locations," said Vizi. The warrants, she added, are "sealed." While the Street campaign has portrayed the investigation as part of a Republican conspiracy aimed at ensuring the election of GOP candidate Sam Katz, a person with knowledge of the investigation said that the bugging of the mayor's office was approved by a Justice Department official - and not U.S. Attorney General John Ashcroft. Since it burst into public view last week with the discovery of the bugging device, the FBI has appeared to be working feverishly to conduct interviews and carry out court-authorized searches. 7892 From: James M. Atkinson Date: Sun Oct 19, 2003 9:45am Subject: Woman sentenced for reading e-mail of husband's ex-wife http://www.cnn.com/2003/LAW/10/19/email.detention.ap/index.html Woman sentenced for reading e-mail of husband's ex-wife DENVER, Colorado (AP) --A judge sentenced an Arizona woman to 60 days home detention for intercepting her husband's ex-wife's e-mail, saying the penalty is a warning to others who might be tempted to do the same. "Privacy is still a cherished value," U.S. District Judge Richard P. Matsch said in sentencing Angel Lee, 28, of El Mirage, Arizona. Lee pleaded guilty in March and admitted accessing at least 215 e-mails sent last year to her husband's ex-wife, Duongladde Ramsay. Officials said she fraudulently obtained the user name and password information for Ramsay's e-mail account. Matsch, best known for his role overseeing the Oklahoma City, Oklahoma, bombing trials, has said the e-mail case involved a vicious divorce dispute over children. At Lee's sentencing Friday, he said he considered sending her to jail but believed she needed to be home with her young children. "I really apologize for what I did," Lee told the judge. "She (Ramsay) has a right to feel the way she feels." Ramsay has compared Lee's actions to someone breaking into her home and reading her diary. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7893 From: Lewis Hipkins Date: Sun Oct 19, 2003 4:05pm Subject: National Geographic Article this month on Surveillance. Looks like the magazine has more in it. http://magma.nationalgeographic.com/ngm/0311/feature1/index.html Lewis Hipkins Multi-Media Communications From: Shawn Hughes Date: Sat Oct 13, 2001 10:05pm Subject: phone zapper Saw an ad on teevee for a device that emits a tone that allegedly tells a telemarketers' autodialer that the number is disconnected. Except for the reorder tone, I can't think of which MF or digital signal of ma Bells' it would be spoofing. Here's the link: http://www.telezapper.com/faq.htm#1 ideas? Thanks, Shawn Hughes 3903 From: Charles P Date: Sun Oct 14, 2001 0:27am Subject: Re: phone zapper It is often called an SIT tone (Standard Information Tone). It is the sound of the bee-boo-beep you hear when you call a number that does not exist. Many telemarketing computers are designed to mark a phone number as invalid when it hears that tone, thus deleting it from it's dialing list. I would guess even some human telemarketing operators might also hang up when they it, especially if they get paid on commission. The little box will play that tone at the beginning of a call either when you pick up the phone, at the beginning of your answering machine's message, or when you press a trigger button. You can also get them from Mike Sandman at www.sandman.com or call his number 630-980-7710 after hours to hear it on their message. Charles ----- Original Message ----- From: "Shawn Hughes" To: Sent: Saturday, October 13, 2001 11:05 PM Subject: [TSCM-L] phone zapper > Saw an ad on teevee for a device that emits a tone that allegedly tells a > telemarketers' autodialer that the number is disconnected. Except for the > reorder tone, I can't think of which MF or digital signal of ma Bells' it > would be spoofing. Here's the link: > > http://www.telezapper.com/faq.htm#1 > > ideas? > > > Thanks, > Shawn Hughes > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3904 From: Aimee Farr Date: Sun Oct 14, 2001 8:34am Subject: *sigh* I can't render "legal advice," but recent messages have me banging my head on my desk and exhibiting symptoms of autism. When I want to say something that could offer injury, I choose parody, or google passages from Milton, Homer, Christopher Marlowe... (a side-benefit is that you develop an appreciation for classical literature). I have seen some vendors and service providers which bring to mind fraud, deceptive trade practices and that "federal advertising stuff." When it comes to your services, they strike me as extremely fiduciary in nature. An aspect of a fiduciary relationship is that it's difficult for people to judge competency. I am appalled at the lack of regulation, enforcement and consumer guidance in this area (this is in addition to being generally befuddled). These problems seem to implicate weighty interests beyond mere consumer protection. ~Aimee "O Faustus, lay that damned book aside." 3905 From: Al Arango Date: Sun Oct 14, 2001 0:08am Subject: Re: phone zapper At 11:05 PM 10/13/2001 -0400, you wrote: >Saw an ad on teevee for a device that emits a tone that allegedly tells a >telemarketers' autodialer that the number is disconnected. Except for the >reorder tone, I can't think of which MF or digital signal of ma Bells' it >would be spoofing. Here's the link: > >http://www.telezapper.com/faq.htm#1 > >ideas? > > >Thanks, >Shawn Hughes Hi Shawn, The device works by sending out the tones that you would receive if you called a disconnected phone line. Some telemarketing systems pick up this signal and make a notation that the line has been disconnected and it would flag that record as unreachable and then remove it from an active/current list. Thus the claim to reduce telemarketing calls, since lists are often resold. There was an article in the MAY 2001 POPTRONICS describing how it worked and where you could download the .wav file to record it on your own answering machine. If your interested let me know and I can dig out my copy and forward the article. Best regards, Al Arango 3906 From: Bug Sweeper Date: Sat Oct 13, 2001 11:23pm Subject: World's Most Wanted Man... Worth a laugh... Help find the world's most wanted man with a giant Usama wanted poster! www.getusama.com. Woo hoo. -Eric 3907 From: James M. Atkinson Date: Sun Oct 14, 2001 10:37am Subject: Re: *sigh* At 8:34 AM -0500 10/14/01, Aimee Farr wrote: >I can't render "legal advice," but recent messages have me banging my head >on my desk and exhibiting symptoms of autism. > >When I want to say something that could offer injury, I choose parody, or >google passages from Milton, Homer, Christopher Marlowe... (a side-benefit >is that you develop an appreciation for classical literature). > >I have seen some vendors and service providers which bring to mind fraud, >deceptive trade practices and that "federal advertising stuff." When it >comes to your services, they strike me as extremely fiduciary in nature. An >aspect of a fiduciary relationship is that it's difficult for people to >judge competency. > >I am appalled at the lack of regulation, enforcement and consumer guidance >in this area (this is in addition to being generally befuddled). These >problems seem to implicate weighty interests beyond mere consumer >protection. > >~Aimee >"O Faustus, lay that damned book aside." Aimee, Indeed the TSCM business badly needs regulation, enforcement and consumer guidance; but by whom? There is not a single state agency that is competent to do so, and the few that have attempted such have created a monster that refuses to recognize government schools and yet allow well recognized con artists and/or criminals to pass their screening protocols. Indeed, the public does need to be educated and provided consumer guidance; and yes, the government needs to ferret out the charlatans and con artists. The only problem is by WHOM? and by using what standard? Personally, I would like to see a law which requires all TSCM people to have a 4 year college degree, a minimum of 1000 hours of electronics training (outside of college), ten years actually DOING hands on electronics, plus at least 6-8 weeks of TSCM specific training. On top of that require 100 hours per year of formal follow-on or refresher training to maintain the licence. On top of that require the possession and usage of a certain minimum set of laboratory grade test equipment, and follow specific government standardized testing requirement (ie: MIL-STD 461 an related standards) for various phases of the service. If the TSCM'er does not possess much of the equipment described and listed in 461 are they cheating their clients? On the other hand how many TSCM'ers even know about MIL-STD 461?. How many TSCM people have ever possessed a federal government security clearance? Why not use that as an initial litmus test? But then how many people could get a security clearance, but have never needed it for their work (it's a two sided issue) Cops generally don't need security clearances, but being involved in law enforcement does not qualify someone to actually perform electronic sweeps; however, a cop with years of street experience can often out-sweep highly equipped engineers just based on his physical search. How long are these sweeps taking? minutes? hours? days? and why? What is the customer actually paying for? are the testing procedures actually written down somewhere? are hardcopy reports being created right off the instruments, or does all the TSCM'er have is a simple checklist that takes them 2-3 hours to go though and a broadband SpyShop diode detector? I strongly support enacting a series of standards, regulations, and even support licensing by a federal agency (not state level) specifically for "Counter Intelligence Services"; including but not limited to anyone who performs bugs sweep services, security audits, computer security, or even people who perform polygraph services. The primary function of my website is to educate the public about TSCM related things, and the primarily purpose of this list to "raise the bar" in the TSCM profession; hopefully my efforts have been helpful in this regard. Just my two-cents, -jma -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3908 From: DrPepper Date: Sun Oct 14, 2001 11:48am Subject: Re: *sigh* EXACTLY, , , , , , , , What we really need is more government regulations. -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm =========================================== "James M. Atkinson" wrote: > At 8:34 AM -0500 10/14/01, Aimee Farr wrote: > >I can't render "legal advice," but recent messages have me banging my head > >on my desk and exhibiting symptoms of autism. > > > >When I want to say something that could offer injury, I choose parody, or > >google passages from Milton, Homer, Christopher Marlowe... (a side-benefit > >is that you develop an appreciation for classical literature). > > > >I have seen some vendors and service providers which bring to mind fraud, > >deceptive trade practices and that "federal advertising stuff." When it > >comes to your services, they strike me as extremely fiduciary in nature. An > >aspect of a fiduciary relationship is that it's difficult for people to > >judge competency. > > > >I am appalled at the lack of regulation, enforcement and consumer guidance > >in this area (this is in addition to being generally befuddled). These > >problems seem to implicate weighty interests beyond mere consumer > >protection. > > > >~Aimee > >"O Faustus, lay that damned book aside." > > Aimee, > > Indeed the TSCM business badly needs regulation, enforcement and > consumer guidance; but by whom? > > There is not a single state agency that is competent to do so, and > the few that have attempted such have created a monster that refuses > to recognize government schools and yet allow well recognized con > artists and/or criminals to pass their screening protocols. > > Indeed, the public does need to be educated and provided consumer > guidance; and yes, the government needs to ferret out the charlatans > and con artists. The only problem is by WHOM? and by using what > standard? > > Personally, I would like to see a law which requires all TSCM people > to have a 4 year college degree, a minimum of 1000 hours of > electronics training (outside of college), ten years actually DOING > hands on electronics, plus at least 6-8 weeks of TSCM specific > training. On top of that require 100 hours per year of formal > follow-on or refresher training to maintain the licence. > > On top of that require the possession and usage of a certain minimum > set of laboratory grade test equipment, and follow specific > government standardized testing requirement (ie: MIL-STD 461 an > related standards) for various phases of the service. If the TSCM'er > does not possess much of the equipment described and listed in 461 > are they cheating their clients? On the other hand how many TSCM'ers > even know about MIL-STD 461?. > > How many TSCM people have ever possessed a federal government > security clearance? Why not use that as an initial litmus test? But > then how many people could get a security clearance, but have never > needed it for their work (it's a two sided issue) Cops generally > don't need security clearances, but being involved in law enforcement > does not qualify someone to actually perform electronic sweeps; > however, a cop with years of street experience can often out-sweep > highly equipped engineers just based on his physical search. > > How long are these sweeps taking? minutes? hours? days? and why? What > is the customer actually paying for? are the testing procedures > actually written down somewhere? are hardcopy reports being created > right off the instruments, or does all the TSCM'er have is a simple > checklist that takes them 2-3 hours to go though and a broadband > SpyShop diode detector? > > I strongly support enacting a series of standards, regulations, and > even support licensing by a federal agency (not state level) > specifically for "Counter Intelligence Services"; including but not > limited to anyone who performs bugs sweep services, security audits, > computer security, or even people who perform polygraph services. > > The primary function of my website is to educate the public about > TSCM related things, and the primarily purpose of this list to "raise > the bar" in the TSCM profession; hopefully my efforts have been > helpful in this regard. > > Just my two-cents, > > -jma > -- > > --------------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > --------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > --------------------------------------------------------------------------- > Come, my friends, > 'Tis not too late to seek a newer world. > Push off, and sitting well in order smite > The sounding furrows; for my purpose holds > To sail beyond the sunset, and the baths > Of all the western stars, until I die. > - Tennyson, "Ulysses" > --------------------------------------------------------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 3909 From: Dawn Star Date: Sun Oct 14, 2001 1:54pm Subject: South Florida Sweep Gentlemen, I reached your site via search engine and although I'm located in South Fla. I would like to get further information on your equipment and if you could recommend anyone in this area for electronic sweeping of premesis, that would be helpful as well. I got this message today, who is fully equipped and competent to handle this referral in South Florida? Roger Tolces Electronic Security www.bugsweeps.com 3910 From: Aimee Farr Date: Sun Oct 14, 2001 2:08pm Subject: RE: *sigh* Atkinson replied: > Indeed the TSCM business badly needs regulation, enforcement and > consumer guidance; but by whom? Well, I know who I would vote for, but they don't have a congressional mandate. Professional licensure is largely in the state domain. I agree with you sentiments on the federal level. Most state licensure programs don't work due to the fact they do mere screening (although that would be a big help, I'm sure) but lack a robust disciplinary or oversight system. There's no "hammer-clause." And, the uniformity issues pose problems. I think because this is a fiduciary relationship that implicates national interests and involves highly-specialized services of expertise, rather than just consumer protection, that regulatory protection should be a consideration -- although licensure isn't the ONLY solution. The longer you wait, the less politically viable it becomes. Your profession is "maturing" quickly. "Licensure" in some security areas poses difficult issues -- it is a very broad spectrum. > Indeed, the public does need to be educated and provided consumer > guidance; and yes, the government needs to ferret out the charlatans > and con artists. The only problem is by WHOM? and by using what > standard? Industry guidance is often undertaken by professional associations, public interest associations formed specifically for that purpose, cross-interest working groups, and individuals. Even a simple, independent website could do a lot of good in educating the public, not only to TSCM/counterespionage services, but also DIY surveillance and espionage. (Look at the educational efforts of the digital music industry on copyright. We need to do that for spying.) Sue 'em. At least in regard to vendors...deceptive trade practices, fraud, "federal advertising stuff," and Net-jurisdiction, offers some possibilities. You could even lobby for a specific state DTPA provisions. The AG types, FTC, BXA ...I bet they have lawyers that could assist with legal solutions if you present them with a problem and a political target. > Personally, I would like to see a law which requires all TSCM people > to have a 4 year college degree, a minimum of 1000 hours of > electronics training (outside of college), ten years actually DOING > hands on electronics, plus at least 6-8 weeks of TSCM specific > training. On top of that require 100 hours per year of formal > follow-on or refresher training to maintain the licence. Are you SURE you're not a law professor? Something about counterespionage people....it's truly weird. > are they cheating their clients? On the other hand how many TSCM'ers > even know about MIL-STD 461?. I read that one every night before I go to bed. > How many TSCM people have ever possessed a federal government > security clearance? Why not use that as an initial litmus test? I think licensure based on specific former experience is overly discriminatory. A difficult question is with some professionals which, in the opinions of some, have an inherent conflict of interest in performing these types of services as part of a bundled service offering. You can effectively self-regulate by standard-setting via "implicit agreements." (i.e., American Society of Mechanical Engineers -- but the Supreme Court had a problem with them. There are some snarky legal issues with professional/industry associations.) > I strongly support enacting a series of standards, regulations, and > even support licensing by a federal agency (not state level) > specifically for "Counter Intelligence Services"; including but not > limited to anyone who performs bugs sweep services, security audits, > computer security, or even people who perform polygraph services. I strongly support enacting a series of firing squads, but I don't think I'm going get very far with my proposal.... but, I take your point. > The primary function of my website is to educate the public about > TSCM related things, and the primarily purpose of this list to "raise > the bar" in the TSCM profession; hopefully my efforts have been > helpful in this regard. > > Just my two-cents, Very insightful, thank you for taking the time. Opinions in here are as strong as scotch. I don't think anybody is going to solve the 'security snake oil' problem. It seems to be inherent. However, addressing specific issues might improve the situation. Corporate interests are very weighty in regard to some of these issues. I see no reason why you couldn't get the bank to do some things by bundling this with other issues. You are not just talking about your future, but the future of those in your care and counsel. ~Aimee 3911 From: A Grudko Date: Sun Oct 14, 2001 6:03pm Subject: Re: phone zapper - Original Message - > >Saw an ad on teevee for a device that emits a tone that allegedly tells a > >telemarketers' autodialer that the number is disconnected. I have a low-tech way of dealing with telemarketers: Mr Grudko, I'm with Rippedoff Insurance and... Is this about the law suite! Err, no, I was hoping to ask you about... Because you know the Judge said I can't talk to you guys and I'm not dropping the action! I'm just trying to get an appointment for Mr... No, he must phone my attorneys, Blood, Sweat and Tears of Hades. Click - and funny, they never call back. 3912 From: zack <10-33@c...> Date: Sun Oct 14, 2001 1:42pm Subject: Re: Digest Number 737 I would be interested in the wav file ............... hate those people At 06:07 PM 10/14/2001 +0000, you wrote: >Hi Shawn, > The device works by sending out the tones that you would receive >if you called a disconnected phone line. Some telemarketing systems pick up >this signal and make a notation that the line has been disconnected and it >would flag that record as unreachable and then remove it from an >active/current list. Thus the claim to reduce telemarketing calls, since >lists are often resold. There was an article in the MAY 2001 POPTRONICS >describing how it worked and where you could download the .wav file to >record it on your own answering machine. If your interested let me know and >I can dig out my copy and forward the article. > >Best regards, > >Al Arango > > visit http://www.copscops.com Join the Law Enforcement community http://anexa.com/lawenforcement/index.Ihtml Washington DC Police Department http://mpdc.dc.gov/main.shtm " Our military is powerful, and it's prepared." The President of the United States George W Bush God Bless The USA http://www.copscops.com/blessusa.htm 3913 From: Aimee Farr Date: Sun Oct 14, 2001 11:48pm Subject: RE: *sigh* I received some good commentary (dissenting angry hornet stings...supportive, but cautionary...doctoral dissertations) in regard to regulatory/legislative/licensing efforts. I tend to bait a little sometimes. Well, it catches fish. (I learn something or gain insight.) Perhaps technology might offer solutions in the future.... http://www0.mercurycenter.com/premium/nation/docs/darpa10.htm Software sought to expose terrorist cells ADAPTING FRAUD-DETECTION PROGRAMS A CONCERN TO SOME PRIVACY ADVOCATES ....According to the defense agency, the software would root out suspicious activity such as ``companies who claim contracts incommensurate with their business history or size, companies who make unverifiable claims, persons who have `missing periods in their background' '' and ``persons whose positions are inconsistent with their experience.'' I thought they already had alumni/revolving-door associations....heh-heh. ~Aimee 3914 From: Date: Mon Oct 15, 2001 2:38am Subject: Re: *sigh* Here is something to think about ... To provide TSCM services in the state of Nevada, you have to have a "license". I am located in California, so I called the Nevada State Attorney General's Office, who in turn referred me to the Private Investigator's Licensing Board. Accodring to NRS (Nevada Revised Statue) 648.012 this so-called "license" is a full-blown private investigator's license. There is no such thing as a TSCM specific license. Anyone who provides TSCM services only, would need a full-blown private investigator's license which would include passing state exams and interviews on how to locate missing persons and search state public records. Also, anyone who performs TSCM services without a private investigator's license in the state of Nevada could be fined. What this means is that a "licensed" private investigator with a Spy Shop diode detector can provide TSCM services. But, if I cross the border with my Tektronix 492P Spectrum Analyzer, I could be fined. Jack 3915 From: e cummings Date: Mon Oct 15, 2001 9:04am Subject: "phone zapper" SIT tone playback number you can hear a recorded SIT tone anytime by calling 2600 Magazine's voice BBS at (631)473-2626. it was recorded in the greeting message over ten years ago to cut down on calls from telemarketing autodialers. there are free telecom tools on the 2600 voice BBS system, including a DTMF decoder that lets you play a recorded DTMF sequence into your phone and have it spoken back to you. -ed At 01:27 AM 10/14/01 -0400, you wrote: >It is often called an SIT tone (Standard Information Tone). It is the sound >of the bee-boo-beep you hear when you call a number that does not exist. >Many telemarketing computers are designed to mark a phone number as invalid >when it hears that tone, thus deleting it from it's dialing list. I would >guess even some human telemarketing operators might also hang up when they >it, especially if they get paid on commission. > >The little box will play that tone at the beginning of a call either when >you pick up the phone, at the beginning of your answering machine's message, >or when you press a trigger button. > >You can also get them from Mike Sandman at www.sandman.com or call his >number 630-980-7710 after hours to hear it on their message. > >Charles > > >----- Original Message ----- >From: "Shawn Hughes" >To: >Sent: Saturday, October 13, 2001 11:05 PM >Subject: [TSCM-L] phone zapper > > > > Saw an ad on teevee for a device that emits a tone that allegedly tells a > > telemarketers' autodialer that the number is disconnected. Except for the > > reorder tone, I can't think of which MF or digital signal of ma Bells' it > > would be spoofing. Here's the link: > > > > http://www.telezapper.com/faq.htm#1 > > > > ideas? > > > > > > Thanks, > > Shawn Hughes 3916 From: Aimee Farr Date: Mon Oct 15, 2001 11:07am Subject: RE: Re: *sigh* I find PI licensure schemes encompassing TSCM services concerning -- especially if this is seen as an agenda issue by PI associations due to policy misguidance. I would think a better accommodation could be achieved in the interest of all stakeholders. The most important thing is that you protect the service offering. (I don't care who does it, as long as they do so competently and in non-fraudulent manner.) Certainly, PIs which offer these services should be equally interested in seeing that TSCM services aren't rendered "snake oil." This is in their best interests. Indeed, they have more at stake. I believe the PI profession is most interested in securing their profession from further tarnishment, having reaped the whirlwind in recent years. ***_I would be appreciate of links to these licensure schemes, and any state PI associations that have made similar proposals, or have undertaken these issues in committee_.*** That is extremely bad policy, it works against their interests. ~Aimee > -----Original Message----- > From: tek492p@y... [mailto:tek492p@y...] > Sent: Monday, October 15, 2001 2:39 AM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Re: *sigh* > > > Here is something to think about ... > > To provide TSCM services in the state of Nevada, you have to have > a "license". I am located in California, so I called the Nevada > State Attorney General's Office, who in turn referred me to the > Private Investigator's Licensing Board. Accodring to NRS (Nevada > Revised Statue) 648.012 this so-called "license" is a full-blown > private investigator's license. There is no such thing as a TSCM > specific license. Anyone who provides TSCM services only, would need > a full-blown private investigator's license which would include > passing state exams and interviews on how to locate missing persons > and search state public records. Also, anyone who performs TSCM > services without a private investigator's license in the state of > Nevada could be fined. > > What this means is that a "licensed" private investigator with a Spy > Shop diode detector can provide TSCM services. But, if I cross the > border with my Tektronix 492P Spectrum Analyzer, I could be fined. > > Jack> 3917 From: Al Arango Date: Mon Oct 15, 2001 4:09pm Subject: Re:phone zapper .wav file location Hi, To all that asked: The file for the sit tones is at: ftp://ftp.gernsback.com/pub/pop/sit.wav Also, Radio Shack now has a standalone model that plugs into your line. Best regards, Al At 09:46 AM 10/14/2001 -0700, you wrote: >Hi, Al, , , , , , , > >Yes, I would like to download that wav file. >If it's not too much trouble, would you please email me the URL? > >Thanx >-- >Dr Pepper aka WB6GKI >in the High Desert of California. >Check out my LIVE Hamshack Cam at: >http://www1.iwvisp.com/DrPepper/ham/ham.htm 3918 From: Charlie Zimmerman Date: Mon Oct 15, 2001 2:24pm Subject: Re: "phone zapper" SIT tone playback number There is a recent discussion on slashdot about this topic. Check it out at this URL: http://slashdot.org/article.pl?sid=01/10/15/174246&mode=thread e cummings wrote: >you can hear a recorded SIT tone anytime by calling 2600 Magazine's voice >BBS at (631)473-2626. it was recorded in the greeting message over ten >years ago to cut down on calls from telemarketing autodialers. there are >free telecom tools on the 2600 voice BBS system, including a DTMF decoder >that lets you play a recorded DTMF sequence into your phone and have it >spoken back to you. > >-ed > > >At 01:27 AM 10/14/01 -0400, you wrote: > >>It is often called an SIT tone (Standard Information Tone). It is the sound >>of the bee-boo-beep you hear when you call a number that does not exist. >>Many telemarketing computers are designed to mark a phone number as invalid >>when it hears that tone, thus deleting it from it's dialing list. I would >>guess even some human telemarketing operators might also hang up when they >>it, especially if they get paid on commission. >> >>The little box will play that tone at the beginning of a call either when >>you pick up the phone, at the beginning of your answering machine's message, >>or when you press a trigger button. >> >>You can also get them from Mike Sandman at www.sandman.com or call his >>number 630-980-7710 after hours to hear it on their message. >> >>Charles >> >> >>----- Original Message ----- >>From: "Shawn Hughes" >>To: >>Sent: Saturday, October 13, 2001 11:05 PM >>Subject: [TSCM-L] phone zapper >> >> >>>Saw an ad on teevee for a device that emits a tone that allegedly tells a >>>telemarketers' autodialer that the number is disconnected. Except for the >>>reorder tone, I can't think of which MF or digital signal of ma Bells' it >>>would be spoofing. Here's the link: >>> >>>http://www.telezapper.com/faq.htm#1 >>> >>>ideas? >>> >>> >>>Thanks, >>>Shawn Hughes >>> > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 3919 From: Date: Mon Oct 15, 2001 2:47pm Subject: A man and his son are walking through a highly built-up Manhattan A man and his son are walking through a highly built-up Manhattan when they come across an empty space and the father stops to reflect for a while. "Imagine son," the father says "exactly 31 years ago the great twin towers stood proudly in this area." Intrigued by the comment the son then asks "what were the twin towers dad?" To which the father replies "they were two of the largest buildings in the world and they housed many thousands of offices.... but in 2001 they were destroyed by Arabs" The son pauses for a while and then asks "what were Arabs dad?" 3920 From: Steve Uhrig Date: Mon Oct 15, 2001 10:53pm Subject: TSCM licensing? Once upon a midnight dreary, Aimee Farr pondered, weak and weary: > I find PI licensure schemes encompassing TSCM services concerning > -- especially if this is seen as an agenda issue by PI > associations due to policy misguidance. There is absolutely no common ground between the private investigative industry and the TSCM industry. There happen to be a *very* few individuals around the country who are competent in both, but they are extremely scarce. It is more coincidence that the sweeper is a PI than by any commonality of service. There are, however, hundreds if not thousands of frauds nationwide who are PIs and somehow think that qualifies them to skip over the years of technical background, electronics and communications theory, TSCM-specific training, and practical experience needed to make a sweeper. All they need to do is buy a box with blinking lights and a book from a spy shop. > Certainly, PIs which offer these services should be equally > interested in seeing that TSCM services aren't rendered "snake > oil." This is in their best interests. Indeed, they have more > at stake. I believe the PI profession is most interested in > securing their profession from further tarnishment, having > reaped the whirlwind in recent years. Several of us have said it over and over, and I will say it yet again: Sweeping is a *technical* specialty, not an investigative specialty. It is MUCH easier to make a competent PI out of a sweeper than the reverse. TSCMers need to worry about turd PIs playing sweeper a lot more than PIs need to worry about anything more regarding TSCM than finding a competent practitioner to refer when the need for TSCM services arise. > I would think a better accommodation could be achieved in the > interest of all stakeholders. The most important thing is that > you protect the service offering. (I don't care who does it, as > long as they do so competently and in non-fraudulent manner.) So who does it? Anyone with their eyes open would agree we do not want any government involvement in licensing for TSCM services. So that leaves the private sector, and of necessity, some sort of organization. And if there is more than one organization, you get into a gigantic pissing contest and it all would quickly become a big joke. This already has started in a small way, but I will not mention the names of the organizations involved either publicly or privately. So that leaves you with one private sector organization to do certification. Power corrupts. Absolute power corrupts absolutely. End of story. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 3921 From: INTELINK Date: Mon Oct 15, 2001 11:57pm Subject: Military Secrets Posted on Internet Military Secrets Posted on Internet, by Josh Gerstein ABCNEWS.com Military Secrets Posted on Internet, by Josh Gerstein ABCNEWS.com Security details about President Bush (news - web sites) have been available on the Internet. Key details about secure bunkers used by President Bush and Vice President Cheney are available on the Internet, ABCNEWS has learned. The locations and layout of presidential and military command centers ≠ even information about their water supply ≠ are accessible worldwide at the click of a mouse. Experts say some of the information should be classified. Former CIA (news - web sites) Director James Woolsey said he didn't know such details were available on the Internet. "I had absolutely no idea they were on the Web ≠ plans of facilities and the like," Woolse... http://dailynews.yahoo.com/h/abc/20011015/pl/wtc_011015_internetsecrets_1.html ===== The information in this e-mail and any attachments is CONFIDENTIAL and may be PRIVILEGED. If you are not the intended recipient, please destroy this message, delete any copies held on your system and notify the sender immediately. You should not retain, copy or use this e-mail for any purpose, nor disclose all or any part of its content to any other person. __________________________________________________ Do You Yahoo!? Make a great connection at Yahoo! Personals. http://personals.yahoo.com 3922 From: Steve Weinert Date: Tue Oct 16, 2001 5:53am Subject: Legal Status of Left Voice Mail Recordings? What is the legal reproducability status of (economically extra- leaglly threatening) voicemail messages left on a client's digital voicemail system. The firm would like to play the message for review by both private parties (legal) and public officals for action, but is concerned about what expectation of privacy a message-leaver might be able to expect. Direct and specific legal reference would be appreciated, if anyone knows of one. With a little bit of CYA they will feel confident to move ahead. regards & thank you, Steve 3923 From: Steve Weinert Date: Tue Oct 16, 2001 5:53am Subject: Legal Status of Left Voice Mail Recordings? What is the legal reproducability status of (economically extra- leaglly threatening) voicemail messages left on a client's digital voicemail system. The firm would like to play the message for review by both private parties (legal) and public officals for action, but is concerned about what expectation of privacy a message-leaver might be able to expect. Direct and specific legal reference would be appreciated, if anyone knows of one. With a little bit of CYA they will feel confident to move ahead. regards & thank you, Steve 3924 From: Aimee Farr Date: Tue Oct 16, 2001 8:57am Subject: RE: TSCM licensing? [Truly, I've been told this topic is a dead horse, and a wasp nest for me.] Steve Uhrig wrote: [much good stuff deleted] > There are, however, hundreds if not thousands of frauds > nationwide who are PIs and somehow think that qualifies them to > skip over the years of technical background, electronics and > communications theory, TSCM-specific training, and practical > experience needed to make a sweeper. All they need to do is buy > a box with blinking lights and a book from a spy shop. Those that do so attract the attention of Attorney General types, bait multi-agency enforcement coordination, and encourage pre-emptive exclusionary provisions within their existing licensure schemes. Really, I don't like framing this argument as PI v. TSCMers or PI v. SECURITY -- something other than knee-jerk analysis might show the interests here are complimentary in many respects, and not adverse to one another. An environment of co-opetition seems to be in the best interests of all stakeholders. > > Certainly, PIs which offer these services should be equally > > interested in seeing that TSCM services aren't rendered "snake > > oil." This is in their best interests. Indeed, they have more > > at stake. I believe the PI profession is most interested in > > securing their profession from further tarnishment, having > > reaped the whirlwind in recent years. > > Several of us have said it over and over, and I will say it yet > again: Sweeping is a *technical* specialty, not an investigative > specialty. I feel that security and investigation can compliment each other. However, some services involve very distinct skillsets and competencies. Not to mention super-natural powers and *ZAP!* *POW!* Batgear. (Note that Gotham was not overtaken by wannabee super-heroes running around in funny clothes.) > Anyone with their eyes open would agree we do not want any > government involvement in licensing for TSCM services. I have not reached a conclusion. I see the hazards, and my inclination is to resist government intrusion. However, licensure and standards -- the marks of a profession rather than a mere service. You don't want to be in the "Miscellaneous Consultants With Briefcases" bin. Nor do you want TSCM incorporated into existing licensure schemes in such as a fashion as to work _against_ competency in these areas. The alarm folk are licensed. > So that leaves the private sector, and of necessity, some sort > of organization. -- > So that leaves you with one private sector organization to do > certification. -- There are many solutions to choose to from, and they aren't exclusive. > Power corrupts. Yes. I find that irresistibly attractive. Seriously, there are always pros and cons, and you have to consider the consequences of not doing *anything* while other interests take advantage of your inaction or conflict. I don't have any conclusions -- I don't have enough information. However, my question boils down to one of public interest. ~Aimee 3925 From: Jordan Ulery Date: Tue Oct 16, 2001 9:06am Subject: PI vs TSCM I agree with Steve's general analysis of the relationship between investigators and electronic specialists. Even the names of the functions are different. That being said, there is, however, common ground. Both TSCM and PI suffer from the public perception of sleazy, night club lounging, alcoholic, gun toting bums doings "things." Therefore both professions could benefit from positive publicity. Both professions could benefit from aggressive enforcement of regulations. Both professions could do without TLC running a program on covert video surveillance identifying techniques and increasing fear/stress levels. Both professions need to get the message out that there is a difference and that the work done benefits society, it does not hurt society. Unfortunately too many state agencies do not understand the roles of the two agencies. Some state agencies still lump PIs and Security Guards together, when they are distinct in form and function. I guess it goes back to why my grandmother said, a good education will serve you well, anywhere. [Non-text portions of this message have been removed] 3926 From: Jordan Ulery Date: Tue Oct 16, 2001 9:06am Subject: PI vs TSCM I agree with Steve's general analysis of the relationship between investigators and electronic specialists. Even the names of the functions are different. That being said, there is, however, common ground. Both TSCM and PI suffer from the public perception of sleazy, night club lounging, alcoholic, gun toting bums doings "things." Therefore both professions could benefit from positive publicity. Both professions could benefit from aggressive enforcement of regulations. Both professions could do without TLC running a program on covert video surveillance identifying techniques and increasing fear/stress levels. Both professions need to get the message out that there is a difference and that the work done benefits society, it does not hurt society. Unfortunately too many state agencies do not understand the roles of the two agencies. Some state agencies still lump PIs and Security Guards together, when they are distinct in form and function. I guess it goes back to what my grandmother said, a good education will serve you well, anywhere. [Non-text portions of this message have been removed] 3927 From: Date: Tue Oct 16, 2001 6:11am Subject: Re: PI vs TSCM I am federally trained and conducted TSCM surveys for over 18 years. Now I am a PI........ Here in Kansas we formed the Kansas Association of Licensed Investigators (KALI) less than 2 years ago. However, we now have over 125 members and had our first conference complete with outstanding training and vendors this summer. Much like a mini-ASIS conference. We have various committees to include a legislative committee. This committee interacts with the Kansas Attorney General, the Kansas Bureau of Investigation and the legislative body in Kansas. We are working to strengthen the licensing requirements for PI's in Kansas and to increase the penalty for not adhering to these requirements. We are establishing a presentation to be provided to students in the LEO academy in our state explaining the PI role and responsibilities. These are only a couple of the activities currently underway in our organization to increase the awareness of our profession and promote a professional image to the public. The benefits we are experiencing by having a professional organization such as this are incredible. Not only does it help our image, but it has resulted in a group of professionals that now work together for our profession. We refer work to each other based on specialties and geographical locations and share information. We have quarterly membership meetings and conduct all the rest of our communications by email, egroup, and phone. We are currently sponsoring a seminar this weekend in the Kansas City area on Telecommunications provided by Michelle Yontif know nationally as "Ma Bell". I provide this input to show what an organization can do in a relatively short period of time to improve the environment we work in. Check out our organization at K.A.L.I. Home www.k-a-l-i.org Drop me a line with your comments and questions. We will also be looking for vendors for our convention next summer. Jack Kelley C. E. Kelley & Associates Investigations P. O. Box 395, Baxter Springs, KS 66713 (620) 856-4460 Email: kelleypi@a... http://www.angelfire.com/ks/investigations/ Kansas Detective License: D-064 Board Member, Kansas Association of Licensed Investigators Member, American Society for Industrial Security Member, Association of Former Office of Special Investigations Special Agents Member, INTELNET (International organization of private investigators) [Non-text portions of this message have been removed] 3928 From: DrPepper Date: Tue Oct 16, 2001 10:32am Subject: Re: Re:phone zapper .wav file location See it at: http://www.radioshack.com/product.asp?catalog%5Fname=CTLG&category%5Fname=&product%5Fid=43%2D2205 The only problem I see is the price.( $50.00 ) With the wav tone off the computer, (below) you could record it on your answering machine for free! -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ============================================ Al Arango wrote: > Hi, > To all that asked: > > The file for the sit tones is at: > ftp://ftp.gernsback.com/pub/pop/sit.wav > > Also, Radio Shack now has a standalone model that plugs into your line. > > Best regards, > Al > > At 09:46 AM 10/14/2001 -0700, you wrote: > >Hi, Al, , , , , , , > > > >Yes, I would like to download that wav file. > >If it's not too much trouble, would you please email me the URL? > > > >Thanx > >-- > >Dr Pepper aka WB6GKI > >in the High Desert of California. > >Check out my LIVE Hamshack Cam at: > >http://www1.iwvisp.com/DrPepper/ham/ham.htm > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3929 From: Aimee Farr Date: Tue Oct 16, 2001 11:43am Subject: FCC "a bigger job" Source: http://www.techlawjournal.com 10/15. FCC Commissioner Michael Copps gave a speech in Washington DC in which he argued that the terrorist attacks of September 11 mean that the FCC should assume expanded regulatory authority, particularly with respect to the Internet. See, prepared text of speech. [below] ---------------------------------------------------------------------------- ---- "What does September 11 mean for how the FCC does business?", Copps asked himself rhetorically. He answered his own question: "I believe the Federal Communications Commission has a larger job to do". ---------------------------------------------------------------------------- ---- The FCC, which has statutory mandates with respect to the Communications Assistance for Law Enforcement Act (CALEA) and emergency 911 legislation, will likely pursue a more vigorous and expeditious implementation of these statutes. Copps referenced these topics. But, his speech was also littered with references to the Internet, cyberspace, and information systems -- all technologies over which the FCC now has no general statutory authority. ### http://www.fcc.gov/Speeches/Copps/2001/spmjc105.html "In one area, Congress is already acting: the peopleís representatives are demanding electronic surveillance capabilities across technologies, be they telephone lines or Internet pathways. The events of September 11 will move such public policy and regulatory questions front-and-center. The Commission needs to be there." "Indeed, the very first sentence of the Communications Act states that the Act was written to make "available Ö a rapid, efficient, Nation-wide and world-wide telecommunications service Ö for the purpose of the national defense, for the purpose of promoting safety of life and property through the use of wire and radio communication." This nearly-seventy-year-old statutory provision couldnít be more timely than in these trying days since September 11th." ------ *ponder-ponder-ponder* http://www.fcc.gov/aboutus.html http://www.fcc.gov/licenses.html ~Aimee 3930 From: talisker Date: Tue Oct 16, 2001 0:23pm Subject: Re: A man and his son ..OFFENSIVE Take cover rant coming > The son pauses for a while and then asks "what were Arabs Dad?" [rant] There's no need for this kind of racism. To stereotype Arabs in this fashion merely adds weight to the argument that the West is at war with Islam and not terrorism. I wouldn't consider myself as politically correct but these are uneasy times where many Arabs and Muslims are looking for reassurance that they are not all being tarred with the same brush. All terrorist attacks are despicable and my heart goes out to all those who have been effected, let's stand united with "anyone" who wants to rid the world of these barbarous acts, regardless of their faith or race. I have many friends who are Arabs and/or Muslims they are, on the whole, honourable and peaceful and not deserving of being labelled as terrorists. sorry for the rant [/rant] -andy http://www.networkintrusion.co.uk ----- Original Message ----- From: To: Sent: Tuesday, October 16, 2001 12:47 AM Subject: [TSCM-L] A man and his son are walking through a highly built-up Manhattan > > A man and his son are walking through a highly built-up Manhattan when > they come across an empty space and the father stops to reflect for a > while. > > "Imagine son," the father says "exactly 31 years ago the great > twin towers stood proudly in this area." > > Intrigued by the comment the son then asks "what were the twin towers dad?" > > To which the father replies "they were two of the largest buildings in > the world and they housed many thousands of offices.... but in 2001 > they were destroyed by Arabs" > > The son pauses for a while and then asks "what were Arabs dad?" > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3931 From: Steve Whitehead Date: Tue Oct 16, 2001 1:00pm Subject: Industrial Spies Target French Fighter Jet Maker "Police are investigating suspected industrial espionage against the French competitor for a major fighter-jet contract in South Korea, officials said ahead of Monday's official opening of the Seoul Air Show. A wiretap device found at the Seoul offices of Dassault Aviation has added industrial skullduggery to the intense rivalry between the four military jet makers fighting for the contract to supply 40 aircraft in a deal worth at least 3.2 billion dollars. With the winner expected to be chosen in the next few weeks, stands promoting Dassault's Rafale jet, Boeing Co.'s F-15K, the Eurofighter consortium's Typhoon 2000 and the Russian Sukhoi Su-32 dominate this week's air show. Yves Robins, a Dassault vice president for international relations, told of the telephone listening equipment found in the company's office building. "I can confirm that a bugging device was found in the telephone exchange of our office building linked to our telephone lines," Robins said. "I was there when it was found and the police are investigating," he added" Read the full story at http://www.spacer.com/news/korea-01c.html Steve Whitehead E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa TSCM Services URL : http://www.tscm.co.za [Non-text portions of this message have been removed] From: kondrak Date: Wed Oct 13, 2004 10:56am Subject: Re: North Korea has a special military squad of hacker-experts Oh I dont discount any possibility. We should just nuke their sorry asses and get it over with, since thats what its going to boil down to. Theyre a dictatorship, run by a mentally ill leader, with intends to be able to blackmail the US with nukes. Incinerate them NOW, avoid loosing a city of ours on the west coast. At 02:57 10/12/2004, you wrote: >Sorry, pushed Send by mistake. > > > >I read this earlier on another group. > >Their country barely has electricity, and prob a single T3 for the entire > >country. > >Some Internet hackers, I'll put ours up against theirs any day. > >Count, please, the power of a good salary and other material advantages in >a starving country. >It is a matter of 'live or die' for theirs families, not a matter of proud >as with yours hackers. >So, they are highly motivated, and a motivated enemy is an ENEMY. > > > > > >North Korea has a special military squad of hacker-experts > >Don't underestimate the military/police possibilities of a dictatorship. >By the way, the squad can 'defect' and work as insiders from your advanced >network. >Cristian > > ---------- > > >--- >Outgoing mail is certified Virus Free. >Checked by AVG anti-virus system (http://www.grisoft.com). >Version: 6.0.733 / Virus Database: 487 - Release Date: 02/08/04 > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > > >--- >Incoming mail is certified Virus Free. >Checked by AVG anti-virus system (http://www.grisoft.com). >Version: 6.0.733 / Virus Database: 487 - Release Date: 02/08/04 > > ---------- > > >--- >Outgoing mail is certified Virus Free. >Checked by AVG anti-virus system (http://www.grisoft.com). >Version: 6.0.733 / Virus Database: 487 - Release Date: 02/08/04 > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9866 From: Spook Date: Wed Oct 13, 2004 7:36pm Subject: Re: Re: CCS Going Belly Up - Annual Report (Key Points) It means that CCS is on the path to filing bankruptcy, but that they have not yet filed the formal papers. -jma At 11:51 AM 10/13/2004, contranl wrote: >. > > >A long story Jim...a little complicated for me as a foreigner to >understand ...but does this mean that CCS and there assiociated >businesses are going bankrupt very soon ? > >I was just going to buy one of there 400000 U$ Gsm-interceptors. > >:) > >Tetrascanner 9867 From: Date: Wed Oct 13, 2004 11:31am Subject: RE: North Korea has a special military squad of hacker-experts And what? Gets South Korea not enough money from USA to establish its own a similar military squad? Every country has something like this, most of them on their own expence. Does somewhat like that exist in USA, UK, Russia? Certainly yes. I suppose that military and secret services in many countries must have that type of capabilities. It would be a natural responce to Echelon. A kind of their Homeland Security, whether US citizens like it or not. Regards, A.W. "contranl" wrote: > > >. > >North Korea has a special military squad of hacker-experts > >Date: October 11, 2004 > >North Korea has a special military squad of hacker-experts, it works >on gathering information about South Korea. >General Son Yun Kyn said in his feature about national security of >NK. "Last time NK military authorities intensified computer >trainings for recruits which will be appointed to hacker group, >acted under "Korean Popular" he said. > >According to General Son Yun Kyn, the abilities of NK military can >be compared with abilities of advanced countries. South Korea >experts suppose that NK has 500-600 hacker-experts wich have passed >a special 5-years training. > >The military report for SK parliament speaks: "abilities of NK >military intelligence have reached level of advanced countries". >NK military hackers have 5-years University education and are >prepared to conduct cyber attacks against South Korea,USA and Japan. > >Finishing his report, General Son Yun Kyn said: >"South Korea Governments have to apply hard forces to counteract >cyber-threat launched by North Korea". > >source: http://www.crime-research.org/news/11.10.2004/699/ > >Tetrascanner >www.tetrascanner.com > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > __________________________________________________________________ Switch to Netscape Internet Service. As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register Netscape. Just the Net You Need. New! Netscape Toolbar for Internet Explorer Search from anywhere on the Web and block those annoying pop-ups. Download now at http://channels.netscape.com/ns/search/install.jsp 9868 From: David Alexander Date: Thu Oct 14, 2004 8:23am Subject: RE: North Korea has a special military squad of hacker-experts So it's alright for you to nuke them, but not for them to nuke you ? That's probably how they see it too....you need to get inside the head of your 'enemy' and see the picture from his side - not necessarily to condone, but definitely to understand. IMHO it's generalizations and the 'xenophobic' mentality that got the US into this mess in the first place (I'm English, in case anyone doesn't know). You want to know how I know this ? Because we were in the same, arrogant, place up to 50 years ago when we had an empire (more than half the world). Then we grew up, gave them independence and started treating them as equals. My 2c. -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: 13 October 2004 16:56 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] North Korea has a special military squad of hacker-experts Oh I dont discount any possibility. We should just nuke their sorry asses and get it over with, since thats what its going to boil down to. Theyre a dictatorship, run by a mentally ill leader, with intends to be able to blackmail the US with nukes. Incinerate them NOW, avoid loosing a city of ours on the west coast. At 02:57 10/12/2004, you wrote: >Sorry, pushed Send by mistake. > > > >I read this earlier on another group. > >Their country barely has electricity, and prob a single T3 for the entire > >country. > >Some Internet hackers, I'll put ours up against theirs any day. > >Count, please, the power of a good salary and other material advantages in >a starving country. >It is a matter of 'live or die' for theirs families, not a matter of proud >as with yours hackers. >So, they are highly motivated, and a motivated enemy is an ENEMY. > > > > > >North Korea has a special military squad of hacker-experts > >Don't underestimate the military/police possibilities of a dictatorship. >By the way, the squad can 'defect' and work as insiders from your advanced >network. >Cristian > > ---------- > > >--- >Outgoing mail is certified Virus Free. >Checked by AVG anti-virus system (http://www.grisoft.com). >Version: 6.0.733 / Virus Database: 487 - Release Date: 02/08/04 > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > > >--- >Incoming mail is certified Virus Free. >Checked by AVG anti-virus system (http://www.grisoft.com). >Version: 6.0.733 / Virus Database: 487 - Release Date: 02/08/04 > > ---------- > > >--- >Outgoing mail is certified Virus Free. >Checked by AVG anti-virus system (http://www.grisoft.com). >Version: 6.0.733 / Virus Database: 487 - Release Date: 02/08/04 > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9869 From: James M. Atkinson Date: Thu Oct 14, 2004 4:55pm Subject: CCS International / SITG Public SEC Documents - 2001 Annual Report SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-KSB Annual Report Under Section 13 or 15(d) of the Securities Exchange Act of 1934 [X] ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For Fiscal Year Ended June 30, 2001 [ ] TRANSITION REPORT UNDER SECTION 13 OR 15{d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission File number 0-30291 HIPSTYLE.COM, INC. (Name of small business issuer in its charter) Florida 65-0928369 (State or other jurisdiction of incorporation or (IRS Employer Identification No.) organization) 1221 Brickell Ave., Suite 900, Miami, Florida 33131 --------------------------------------------- --------- (Address of principal executive offices ) (Zip Code) Issuer's telephone number (305) 539-0900 ----------------------------------------------------- Securities registered under Section 12(b) of the Exchange Act: None Securities registered under Section 12(g) of the Exchange Act: Common Stock, $0.0001 par value Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days. Yes [X] No [ ] Check if there is no disclosure of delinquent filers in response to Item 405 of Regulation S-B not contained in this form, and no disclosure will be contained, to the best of the registrant's knowledge, in definitive proxy or information statements incorporated by reference in Part III of this Form 10-KSB or any amendment to this Form 10-KSB.( ) Revenues for year ended June 30, 2001: $0 Aggregate market value of the voting common stock held by non-affiliates of the registrant as of October 1, 2001, was: $O Number of shares of the registrant's common stock outstanding as of October 1, 2001 was: 4,600,000 Transfer Agent as of October 1, 2001: Corporate Stock Transfer & Trust Co. 3200 Cherry Creek Drive Denver, Colorado 80209 1 -------------------------------------------------------------------------------- PART I Item 1. Description of Business Business Development. We were incorporated under the name Hipstyle.com, Inc. in the State of Florida on June 22, 1999. We have not been involved in any bankruptcy, receivership or similar proceeding. We have not been involved in any material reclassification, merger, consolidation, or purchase or sale of a significant amount of assets not in the ordinary course of business. Business of Issuer. We are a development stage company which is completing a website, at www.hipstyle.com, dedicated to bringing together designers and merchants of high fashion and beauty products with online clothing shoppers and fashion enthusiasts. We have launched a beta test version of the site and have retained the services of a web design and development firm to facilitate the completion of a11 planned content and functionality. We have spent a total of $54,292 for research and development. All of such expenses were used to develop our website since our inception. We did not spend any additional funds on research and development expenses. We anticipate that the fashion infomediary aspect of our model will focus on aggregating our members' personal profiles and preferences and then matching them with our merchant and advertising partners, thus providing focused services and information to both parties. This strategy will be heavily dependant on our ability to convert future visitors to our site into Hipstyle.com members. Membership will be in the Hipstyle.com online community and members will not receive an ownership interest in the company, Hipstyle.com, Inc. While most intended services will be available to all site visitors, certain higher tier services and functionality will be reserved for members only. We anticipate that membership in the online community of Hipstyle.com will be free and it will offer special access to certain restricted content and functionality as well as negotiated member discounts with merchant partners. To become a member, site visitors will be asked to fill out some personal information, including their specific fashion related preferences, and this information will be aggregated into a confidential data repository. With the members' explicit permission, the Company anticipates using these detailed customer profiles to provide businesses with a powerful online advertising, direct marketing and electronic commerce channel to more effectively reach their desired audience. In return, we anticipate that members will benefit from the targeted advertising and offers focusing on their specific interests, and will also receive group discounts and special deals negotiated by the Company on their behalf. 2 -------------------------------------------------------------------------------- Anticipated revenues will be generated primarily through charging a click through rate for each link to other sites, revenue sharing on purchases made at partner e-commerce sites, advertising sales and possible auction fees. Our corporate offices are located at 1221 Brickell Avenue, Suite 900, Miami, Florida 33131. Our corporate staff consists of two part time persons with collective experience in fashion and online marketing. Our telephone number is (305) 539-0900. Operational Details Acquiring Viewer Base The first and perhaps most important aspect of our model is to generate an audience/membership as quickly as possible. Advertising rates, merchant pricing, negotiated member discounts and access to cost-effective strategic partnerships are all positively affected by increased traffic on our website. Therefore, with a growing number of viewers on our site, we have the potential to deliver more benefits to our anticipated users, clients and partners. Our users will benefit from a larger base, as it will increase our ability to leverage group discounts and special offers for our members. In addition the quality of interactive functionality like auctions and bulletin boards will be greatly improved. Our business partners and advertisers will have access to more viewers and potential customers, and will thus benefit more from a relationship with Hipstyle.com. Finally, our anticipated revenues will be completely dependant on the amount of traffic and membership on our site. This initiative will hinge on a successful advertising campaign and public relations strategy. The effort must be as targeted and cost effective as possible, since this represents Hipstyle's largest cost allocation. Preliminary advertising and traffic-building channels have been identified, with the anticipated approach consisting of highly targeted advertising online banner buys, business development relationships with third party sites and strategic placement on search engines. Depending on the success of its online advertising initiatives, we may also pursue offline channels including billboard and magazine advertising. We anticipate that a membership can be attained utilizing the outlined channels and techniques. We will try to attract individuals who are interested in this industry by providing unique content and services, while promoting a sense of community. Content Functionality In order to attract this viewer base to our website, we will try to provide services to our members in addition to shopping links that will be useful and fun to those individuals who are interested in fashion. We hope to provide a search engine for our entire site to create an easy way to quickly find specific items or functions. We will also anticipate providing up to date news and articles, as well as research tools, which will include biographies of important figures in fashion like designers and models. Planned links will also be established for event postings such as sample sales, new store or site openings and possible job and internship listings. 3 -------------------------------------------------------------------------------- It is anticipated that members will have upgraded offerings including the opportunity to chat with each other and exchange ideas, creating a sense of community within our viewer base. They should also have the ability e-mail us directly with questions, comments and suggestions, and have access to bulletin boards on a variety of topics ranging from fashion and entertainment to current social issues. We will rely on forming partnerships with major magazines to provide archives of selected features of their current issues, and unless we can forge these relationships we will not be able to offer this feature to our members. We anticipate that seasonal runway shows and various interviews will be available to download on RealPlayer video to be viewed by our members. Finally, we will also attempt to provide our members with resources to aid in the search for designer vintage pieces, potentially in the form of an on- line auction. Finally, we plan to offer additional popular culture content to supplement our site's fashion focus. Because fashion encompasses every aspect of modern life and is directly impacted by all aspects of popular culture, we believe that providing content relating to movies, music, nightlife, etc. will be a value added feature for our anticipated members and users. We anticipate providing updated popular culture content to not only enhance the quality and scope of our bulletin board discussions, but to offer a destination for a wider audience base that may have interests beyond the fashion world. We expect that this approach may result in increased traffic to our site, with anticipated benefits for our future advertisers and member base. Membership Requirements In order for us to execute on the infomediary aspect of the business model, certain features and functionality on the site including chat, e-mail, videos, magazine archives and vintage auctions will only be offered in exchange for filling out a simple questionnaire. The questions that potential members may be asked to answer will include their name, the city in which they live, career choice, age range, hobbies and lifestyle, shopping habits and dress and shoe size. Upon completing this questionnaire, potential new members will be assigned a membership number and will be asked to choose a password that they will use to access exclusive HipStyle.com offerings. Infomediary Model We believe that a significant market opportunity exists for an Internet-based infomediary to serve as an effective communication channel between businesses and online consumers. This infomediary would collect consumers' demographic and behavioral data, with their permission, and build detailed profiles from that information. The infomediary would use these profiles to enable businesses to deliver highly-targeted, one-to-one marketing messages and other products and services to specified consumers. The infomediary, as the trusted custodian of their information, would empower consumers to realize value from their data while protecting their privacy. 4 -------------------------------------------------------------------------------- With accurate and complete member information, we anticipate that we will be able to deliver benefits to our members, advertisers, clients and strategic partners. For our business and advertising partners, we hope to provide a powerful online advertising, direct marketing and electronic commerce channel to more effectively reach their desired audience. For our members, we anticipate benefits from the targeted advertising and offers focusing on their specific interests, as well as group discounts and special deals negotiated by us on their behalf. Revenue The partnerships that we anticipate forming with on-line retailers will include a link directly from our web-site to the designer's or retailer's home page. The intended increase in traffic to these sites provided by Hipstyle.com will enable us to charge each retailer or designers who may be seeking traffic, a click-through rate, or a fee for each click called a CPC. In addition, for e-commerce sites, we will ask for a percentage of revenues obtained through purchases made by customers that come from Hipstyle.com. The anticipated growing traffic on Hipstyle.com, should in turn provide opportunities for these businesses to increase their on-line revenue percentages. Based on these benefits to our potential partners, it is anticipated that most businesses will have no objections to a link from Hipstyle.com to their own site. It will then be the objective of our team to negotiate mutually acceptable CPC and revenue sharing arrangements with each different potential business partner. The anticipated traffic on the Hipstyle.com web site will also allow for us to receive ad sales revenues from potential advertisers. Because advertisers traditionally pay higher rates for targeted ads, we anticipate that the aggregated information from member questionnaires will create a highly targeted advertising profile, which should enable us to charge higher rates for communication with those members. Revenue Sources While future possibilities for generating income include strategic partnerships and/or acquisitions of other shopping sites, developing and selling our own products and licensing agreements of various types, we have not pursued any of these arrangements to date. As mentioned before, our revenue strategy will focus around CPC rates from links, revenue sharing from sales, advertising sales. CPC The CPC rate is a fee that is charged every time a Hipstyle.com member clicks on any link to a company site. This method of generating revenue is directly contingent upon how many members we have, as the probability rate of an actual click occurring is relatively higher. The number of clicks that occur on a link is figured by multiplying the click-through rate, or average percentage of viewers who click, by the number of viewers that are actually on the site at a given time. 6 -------------------------------------------------------------------------------- The CPC rate must be specific for each client or strategic partner, based on their specific traffic needs and relative stature in the industry. In most instances, the more existing traffic that a business has on its site, the less marginal value it places on incremental clicks. In addition, larger sites with more members and well-developed brands, tend to have greater leverage in negotiating CPC rates that they are willing to pay. Because of brand recognition it is anticipated that a well known site or retailer will be willing to pay a lower CPC rate, but will attract more visitors than a less known site. Conversely, a newer site may be willing to pay a higher CPC rate to us, but may not attract as many visitors. Because the net impact on revenues will only be realized after testing the performance of each partnership, the Company will need to maintain flexibility in the its CPC rates, within the accepted industry parameters. It is anticipated that we will initially charge lower CPC rates for more established partners and retailers. Revenue Sharing Revenue sharing for purchases made at on-line retailers, sources from HipStyle.com is an excellent way for us to generate income. This option is only available to us, however, through sites that are established as e- cornmerce sites. Only a select few of the designers who are on-line are actually selling their products via the internet. Most of the sites that are currently and actively retailing are e-commerce boutiques that are designed specifically for this purpose. While we have targeted these on-line retailers as potential clients of Hipstyle.com and hope to generate revenue share in the immediate future, we do not have any existing revenue sharing contracts in place, and may not be able to secure these types of relationships. We are also planning to target major designer web sites for potential revenue sharing, but anticipate a CPC arrangement in the near future, as they develop their e-commerce capabilities. Currently, the majority are catalog sites that are designed for viewing the current collections and then ordering by contacting a customer service center through an 800 number or e-mail. However, we anticipate and are starting to see some indications that designer sites will eventually undergo a transformation to enable e- commerce. This belief is based on the fact that a growing number of related businesses have been using the Internet as a low-cost sales and distribution channel. We believe that this interest in online commerce is fueled in part by: Online Interactivity. Businesses can use the Internet to interact with customers in a real-time personalized transaction experience that provides the business with significant marketing flexibility. On the Internet, a business can frequently adjust its featured selections, pricing and visual presentation. Also, these businesses can display a larger number of products than a traditional store based or catalog retailer. 7 -------------------------------------------------------------------------------- Global Scope of the Internet. Businesses that use the Internet as a sales and marketing channel are able to reach and serve a large and geographically diverse customer base electronically from a central location. Also, businesses can easily obtain demographic and related customer data that provides additional opportunities for direct marketing and personalized services. Decreased Sales Costs. Businesses that use the Internet can access a global market without the high costs associated with additional retail channels. Online retailers and distributors do not have the burden of managing and maintaining multiple retail stores or the significant printing and mailing costs of catalogues. Reduced Inventory Costs. Many businesses that use the Internet are able to have products shipped to consumers directly by the manufacturers. This reduces inventory costs and decreases exposure to inventory obsolescence. When these businesses conclude their e-commerce transformation and begin to sell products directly form their web site, the Company plans to form strategic partnerships with these companies with the value proposition that Hipstyle.com will generate traffic to their sites and increase the demand for their products on-line. Advertising Sales Advertising sales on Hipstyle.com is a way that we can possibly generate revenue from a diverse selection of marketplaces. We intend to create a variety of different options and packages from companies that would purchase advertising space on our site. These companies are not limited to the fashion industry, but can come from a variety of related industries including: major banks and credit cards, beauty products and cosmetics, fragrances, fitness products and gyms, hotels, restaurants and nightclubs. These advertisements will be in the format of click-on banners and buttons of varying sizes that will link the viewer directly to the advertisers' home page. The pricing for these ads will be based on a CPM rate, or cost per thousand impressions, which the number of unique times the ad is viewed on Hipstyle.com site. The CPM rate is derived from the number of exclusive viewers on a site at a given time, or how many viewers will actually see the ad. Therefore, the higher Hipstyle's membership number, the more its advertising space is in demand. This further outlines our initial priority to draft a large viewer base in order to generate maximum profit from sale of our advertising space. 8 -------------------------------------------------------------------------------- The CPMs we will charge are also dependent on our site's click through rates, and on the individual advertiser. If an advertiser is paying us a CPM rate for showing an ad, but is not receiving any clicks or generating visits to their site, the advertiser will either demand a lower CPM rate or discontinue the relationship. Therefore the click through performance of our user base may heavily impact the CPM advertising rates we will be able to charge in the future. Competition There are several direct competitors in this industry, but we believe that there is enough current demand to support another entrant in this industry based on the amazing observed and projected growth of the internet, e-commerce and the fashion industry. An estimated 33% of U.S. households now use the Internet, which is projected to rise to 66% by 2003, according to a Yankee Group survey as stated in a November 1999 report titled "Free Internet Access: Gateway to the Next-Generation ISP" written by the Internet Marketing Strategies Planning Service at the Yankee Group. The U.S. retail apparel market is valued at $172 billion by the Garment Industry Development Corporation as stated in an article from the Garment Industry Development Corporation's statistical overview in the last paragraph under US Fashion Industry. Revenues from online consumer retail shopping are projected to grow to $125.6 billion by 2004, representing an increase of 240% from the $37 billion projected by year-end 2000, according to eMarketer in an article dated October 31, 2000 named "New eCommerce:B2c Report Reveals Consumer e- Commerce Sales will reach $126 Billion by 2004, An Increase of 240% From $37 Billion in 2000". In the future, we may encounter competition from other fashion designers and retailers who are still in the process of constructing their web-sites, but are showing a future commitment to e-commerce for their business. Many of our competitors, as well as a number of potential new competitors, have significantly greater financial, technical and marketing resources than we do. There can be no assurance that our competitors will not develop Internet products and services that are superior to ours or that achieve greater market acceptance than the our offerings. We may also compete with online services and other Web site operators as well as traditional off-line media such as print and television for a share of advertisers' total advertising budgets. There can be no assurance that the we will be able to compete successfully against its current or future competitors or that competition will not have a material adverse effect on our business, results of operations and financial condition. However, retailing over the internet breaks down any previously existing boundaries, creating an international marketplace for products that have already achieved world-wide status through magazine editorial and advertising campaigns. These facts create the ideal opportunity to introduce a web site like Hipstyle.com that combines all aspects of the fashion industry, combining shopping with an on-line community of individuals who share the same interests. 9 -------------------------------------------------------------------------------- EMPLOYEES At October 1, 2001, Our corporate staff consists of two part time persons with collective experience in fashion and online marketing. In addition, depending on client demand, the Company will utilize manpower agencies to contract between additional persons on a temporary, part- time basis. None of the Company's employees are represented by a labor union. The Company believes that its relations with its employees are good. Item 2. Description of Property We currently use office space in a building located at 1221 Brickell Avenue, Suite 900, Miami, Florida. The primary tenant Atlas Equity Group, Inc., an entity which is wholly owned by Michael Farkas. Mr. Farkas is an affiliated individual to the Company since he is the sole shareholder, officer and director of Atlas Equity Group, Inc. which owns 57% of the outstanding shares of Hipstyle. In July 2000, we agreed to reimburse Atlas Equity Group, Inc., a related party, of which Michael D. Farkas is the beneficial owner, $2,000 per month (on a month-to-month basis) for rent and other operating expenses. Prior to July 2000, we had been relatively inactive, did not require, and was not occupying, any office space. Therefore, instead of paying rent, the we agreed to reimburse Atlas Equity Group, Inc. for certain office expenses. Because of recent developments, including the hiring of employees and the completion of its business plan, management has agreed to occupy and rent the space located at 1221 Brickell Avenue, Suite 900, Miami, Florida on a month to month lease at $2,000 per month commencing January 1, 2001. Item 3. Legal Proceedings The Company is not presently parties to any litigation, nor to the Company's knowledge and belief is any litigation threatened or contemplated. Item 4. Submission of Matters to a Vote of Security Holders None. 10 -------------------------------------------------------------------------------- PART II Item 5. Market for Common Equity and Related Stockholder Matters On October 1, 2001, there were 45 shareholders of record of the Company's common stock. The Company's common stock is currently not available for trading on any nationally recognized exchange. Dividends The Company does not intends to retain future earnings to support the Company's growth. Any payment of cash dividends in the future will be dependent upon: the amount of funds legally available therefore; the Company's earnings; financial condition; capital requirements; and other factors which the Board of Directors deems relevant. Item 6. Management's Discussion and Analysis or Plan of Operation The following plan of operation provides information which management believes is relevant to an assessment and understanding of our results of operations and financial condition. The discussion should be read along with our financial statements and notes thereto. Hipstyle.com, Inc. and subsidiary is a development - stage company. Because Hipstyle has not generated any revenue, it intends to report its plan of operation below. The following discussion and analysis contains forward-looking statements, which involve risks and uncertainties. The Company's actual results may differ significantly from the results, expectations and plans discussed in these forward-looking statements. The Company's operations have been devoted primarily to developing a business plan and raising capital for future operations and administrative functions. The Company intends to grow through internal development, strategic alliances, and acquisitions of existing businesses. Because of uncertainties surrounding its development, the Company anticipates incurring development stage losses in the foreseeable future. The ability of the Company to achieve its business objectives is contingent upon its success in raising additional capital until adequate revenues are realized from operations. II-1 -------------------------------------------------------------------------------- PERIOD FROM JUNE 22, 1999 (DATE OF INCEPTION) THROUGH MARCH 31, 2001 Our cumulative net losses since the inception are attributable to the fact that we have not derived any revenue from operations to offset our business development expenses. Operating expenses since inception have amounted to $147,899, primarily consisting of accounting ($25,503), consulting ($10,200), office ($24,000), legal ($25,156), and web site development fees ($52,485). The accounting, consulting, and legal expenses were in connection with its Form 10 filing and in its pursuit of the Company's objectives, as well as professional fees incurred in connection with the Company's annual and quarterly regulatory filings. Office expenses were in connection with monthly fees pertaining to administrative services performed by a related party. Website expense incurred in connection with management's decision to impair their capitalized asset because undiscounted future cash flow are uncertain and the future benefit of the website was undeterminable. YEARS ENDED JUNE 30, 2001 AND JUNE 30, 2000 Development stage expenses during the years ended June 30, 2001 were $91,302 as compared to $51,397 for the period ended June 30, 2000. Expenses for the year ended June 30, 2001 were primarily consisting of accounting ($12,503), legal ($20,675), office expenses ($24,000) and website development fees ($25,328). The accounting, consulting and legal expenses were in connection with its Form 10 filing and in its pursuit of the Company's objectives, as well as professional fees incurred in connection with the Company's annual and quarterly regulatory filings. Office expenses were in connection with monthly fees pertaining to administrative services performed by a related party. Website expenses incurred in connection with management's decision to impair their capitalized asset because undiscounted future cash flow are uncertain and the future benefit of the website was undeterminable. Expenses for the year ended June 30, 2000 were $56,397 primarily consisting of accounting ($13,000), consulting ($10,000), legal ($4,481), and web site development fees ($27,158). The accounting, consulting, and legal expenses were in connection with its Form 10 filing and in its pursuit of the Company's objectives, as well as professional fees incurred in connection with the Company's annual and quarterly regulatory filings. II-3 -------------------------------------------------------------------------------- Liquidity and Capital Resources Despite capital contributions and both related party and third party loan commitments, the company from time to time experienced, and continues to experience, cash flow shortages that have slowed the Company's growth. The Company has primarily financed its activities from sales of capital stock of the Company and from loans from related and third parties. A significant portion of the funds raised from the sale of capital stock has been used to cover working capital needs such as office expenses and various consulting fees. For the year ended June 30, 2001, we incurred a net loss of $91,302. Our accumulated deficit since inception is $147,899. Such accumulated losses have resulted primarily from costs incurred in the development of our website and various professional fees. The Company continues to experience cash flow shortages, and anticipates this continuing through the foreseeable future. Management believes that additional funding will be necessary in order for it to continue as a going concern. The Company is investigating several forms of private debt and/or equity financing, although there can be no assurances that the Company will be successful in procuring such financing or that it will be available on terms acceptable to the Company. Item 7. Financial Statements The financial statements of the Company, together with the report of auditors, are included in this report after the signature pages. Item 8. Changes In and Disagreements With Accountants on Accounting and Financial Disclosure -------------------------------------------------------------------------------- The Company's accountant is Salibello & Broder, C.P.A. of New York City, New York. The Company does not presently intend to change accountants. At no time has there been any disagreements with such accountants regarding any matter of accounting principles or practices, financial statement disclosure, or auditing scope or procedure. II-4 -------------------------------------------------------------------------------- PART III Item 9. Directors, Executive Officers, Promoters and Control Persons: Compliance With Section 16(a) of the Exchange Act -------------------------------------------------------------------------------- The directors and officers of the Company and its subsidiaries, as of October 1, 2001, are set forth below. The directors hold office for their respective term and until their successors are duly elected and qualified. Vacancies in the existing Board are filled by a majority vote of the remaining directors. The officers serve at the will of the Board of Directors. With Company Name Age Since Director/Position --------------------------------------------------------------------- Rebecca J. Farkas 24 1999 President, Treasurer, Secretary and Director Michelle Brock 26 2000 Vice President and Director Rebecca J. Farkas, 24, has been President, Secretary, Treasurer and Director of the Company since inception. She has also been a fashion model with Fords Models Inc. in Miami, Florida and Spirit Model Management in New York, New York. She was been in the modeling industry for the past five years represented by various modeling agencies in New York, Miami, Paris, Los Angeles and Chicago. Ms. Farkas has been heavily in contact with many artists through her experience in the fashion industry. In addition, since 1996, Ms. Farkas has been represented by a commercial television agency in New York and has appeared in lead roles in several national television commercials. She is currently a member of the Screen Actors Guild. In addition, Ms. Farkas was President and founder of WealthHound.com, Inc. a publicly traded company listed on the National Quotation Board. She was also founder and President of Quentin Road Productions, Inc., a publicly traded company listed on the OTC Electronic Bulletin Board. She attended Penn State University from 1995-1996. III-1 -------------------------------------------------------------------------------- Michelle Brock, 26, has served as our Vice President and Director since May 30, 2000. Ms. Brock has been employed in public relations and sales for Norma Kamali, Inc. since May 1999. Her responsibilities include the generating of editorial press of United States and foreign fashion magazines as well as sales to industry insiders and Internet clients. From May 1998 to May 1999, Ms. Brock was employed as an analyst assistant with Odyssey Investments Partners, LLC where she conducted financial and market research in the Internet technology, aerospace, telecommunications and transportation industries. She was also Vice President of Quentin Road Productions, Inc., a publicly traded company listed on the OTC Electronic Bulletin Board. Ms. Brock graduated in May 1998, from Penn State University with a degree in Music Theory and Violin Performance. Rebecca Farkas and Michelle Brock are sisters. Rebecca Farkas is married to Michael D. Farkas the sole shareholder of Atlas Equity Group, Inc., the principal shareholder of the Company. All officers and directors listed above will remain in office until the next annual meeting of our stockholders, and until their successors have been duly elected and qualified. There are no agreements with respect to the election of Directors. We have not compensated our Directors for service on our Board of Directors, any committee thereof, or reimbursed for expenses incurred for attendance at meetings of our Board of Directors and/or any committee of our Board of Directors. Officers are appointed annually by our Board of Directors and each Executive Officer serves at the discretion of our Board of Directors. We do not have any standing committees. Our Board of Directors may in the future determine to pay Directors' fees and reimburse Directors for expenses related to their activities. None of our Officers and/or Directors have filed any bankruptcy petition, been convicted of or been the subject of any criminal proceedings or the subject of any order, judgment or decree involving the violation of any state or federal securities laws within the past five (5) years. Certain Legal Proceedings No director, nominee for director, or executive officer of the Company has appeared as a party in any legal proceeding material to an evaluation of his ability or integrity during the past five years. III-2 -------------------------------------------------------------------------------- Item 10. Executive Compensation The following information relates to compensation received by the Chief Executive Officer of the Company in fiscal year ending June 30, 2000, to executive officers who were serving as of fiscal year ending June 30, 2000, whose salary and bonus during fiscal year ending June 30, 2000 exceeded $100,000. In 2000, no officer received compensation in excess of $100,000. Summary Compensation Table ANNUAL COMPENSATION LONG TERM COMPENSATION RESTRICTED SECURITIES NAME AND PRINCIPAL FISCAL OTHER ANNUAL STOCK UNDERLYING OPTIONS ALL OTHER POSITION YEAR SALARY BONUS COMPENSATION AWARDS (NO. OF SHARES) COMPENSATION ---- ------ ----- ------------ ------ --------------- ------------ Rebecca Farkas 2001 $ 0 0 0 0 0 $ 0 President and Secretary Michelle Brock 2001 $ 0 0 0 0 0 0 Vice President Employment Agreements. No officer or director has been granted an employment contract or been provided a future benefit to be received upon separation from service with the Company. Item 11. Security Ownership of Certain Beneficial Owners and Management The following table sets forth as of October 1, 2001, information with respect to the beneficial ownership of the Company's Common Stock by (i) each person known by the Company to own beneficially 5% or more of such stock, (ii) each Director of the Company who owns any Common Stock, and (iii) all Directors and Officers as a group, together with their percentage of beneficial holdings of the outstanding shares. III-3 -------------------------------------------------------------------------------- NAME AND ADDRESS OF AMOUNT AND NATURE OF PERCENT OF BENEFICIAL OWNER (1) BENEFICIAL OWNERSHIP OUTSTANDING SHARES -------------------- -------------------- ------------------ 5% STOCKHOLDERS Atlas Equity Group, Inc.(2) 2,620,000 56.96% 1221 Brickell Avenue Suite 900 Miami, FL 33131 Rebecca J. Farkas 655,000 14.24% 294 South Coconut Lane Miami Beach, FL 33139 DIRECTORS AND NAMED EXECUTIVE OFFICERS Rebecca J. Farkas 655,000 14.24% 294 South Coconut Lane Miami Beach, FL 33139 Michelle Brock 50,000 1.09% 105 Lexington Avenue, #6D New York, NY 10016 All directors and executive 705,000 15.32% officers as a group (2 persons) (1) Under the rules of the SEC, a person is deemed to be the beneficial owner of a security if such person has or shares the power to vote or direct the voting of such security or the power to dispose or direct the disposition of such security. A person is also deemed to be a beneficial owner of any securities if that person has the right to acquire beneficial ownership within 60 days of the date hereof. Unless otherwise indicated by footnote, the named entities or individuals have sole voting and investment power with respect to the shares of common stock beneficially owned. III-4 -------------------------------------------------------------------------------- (2) Michael D. Farkas is the sole officer, director and shareholder of Atlas Equity Group, Inc. and Michael D. Farkas is married to Rebecca J. Farkas, the President of the Company. Mr. Farkas is the sole member and the Chairman and Chief Executive Officer of the Atlas Group of Companies, LLC, the sole shareholder of Atlas Capital Services, Inc., a registered broker dealer and member of the National Association of Broker Dealers, Inc. and SIPC. (3) This table is based upon information obtained from our stock records. Unless otherwise indicated in the footnotes to the above table and subject to community property laws where applicable, we believe that each shareholder named in the above table has sole or shared voting and investment power with respect to the shares indicated as beneficially owned. Item 12. Certain Relationships and Related Transactions. We currently use office space in a building located at 1221 Brickell Avenue, Suite 900, Miami, Florida. The primary tenant is Atlas Equity Group, Inc., an entity which is wholly owned by Michael Farkas. Mr. Farkas is an affiliated individual to us since he is the sole shareholder, officer and director of Atlas Equity Group, Inc. which owns 57% of the outstanding shares of Hipstyle. In July 2000, we agreed to reimburse Atlas Equity Group, Inc., a related party, of which Michael D. Farkas is the beneficial owner, $2,000 per month (on a month-to-month basis) for rent and other operating expenses. Prior to July 2000, we had been relatively inactive, did not require, and was not occupying, any office space. Therefore, instead of paying rent, we agreed to reimburse Atlas Equity Group, Inc. for certain office expenses. Because of recent developments, including the hiring of employees and the completion of its business plan, management has agreed to occupy and rent the space located at 1221 Brickell Avenue, Suite 900, Miami, Florida on a month to month lease at $2,000 per month commencing January 1, 2001. We have not and do not intend to enter into any additional transactions with our management or any nominees for such positions. We have not and do not intend to enter into any transactions with our beneficial owners. We are a subsidiary of Atlas Equity Group, Inc. which is the owner of 56.96% of our outstanding shares. Since inception, we have not entered into any transactions with promoters other than our officers and directors Rebecca J. Farkas and Michelle Brock, who each received 655,000 and 50,000 respectively, of our shares of common stock. Rebecca Farkas received her 655,000 shares as part of the distribution of the Hipstyle shares by Intelilabs.com, Inc. and Michelle Brock received her 50,000 shares for consulting services rendered to us including the writing and development of our business plan, the development of corporate and operating strategies and creative input into our website. Such shares were also issued as an incentive for Michelle Brock to become our officer. Rebecca Farkas, our President loaned us funds for the cost of licensing Hipstyle.com in New York and reserving our internet address as well as other operating expenses. No interest is being charged on this loan and is due on demand. In addition, upon our formation, Quentin Road Productions, Inc., our original sole shareholder, loaned us $2,000 for the costs of formation of Hipstyle.com. III-5 -------------------------------------------------------------------------------- On March 1, 2000, a majority of the shareholders and the Directors authorized a distribution of the Hipstyle shares owned by Quentin Road Productions, Inc. to the Quentin Road Productions, Inc. shareholders in an unregistered spin off at a rate of 1.31 Hipstyle shares for each share of Quentin Road Productions, Inc. owned. After such spin off, we had 4,000,000 shares outstanding to 25 shareholders. Our management is involved in other business activities and may, in the future become involved in other business opportunities. If a specific business opportunity becomes available, such persons may face a conflict in selecting between our business and their other business interests. We have not and do not intend in the future to formulate a policy for the resolution of such conflicts. Such related party transactions were on terms that were not more favorable than if agreed upon by a third party in an arms length transaction. Our management is involved in other business activities and may, in the future become involved in other business opportunities. If a specific business opportunity becomes available, such persons may face a conflict in selecting between our business and their other business interests. We have not and do not intend in the future to formulate a policy for the resolution of such conflicts. III-6 -------------------------------------------------------------------------------- PART IV Item 13. Exhibits and Reports on Form 8-K (a) The following documents are filed as part of this report: 1. Financial statements; see index to financial statement and schedules immediately following the signature pages of this report. 2. Financial statement schedules; see index to financial statements and schedules immediately following the signature pages of this report. 3. Exhibits: The following exhibits are filed with this Form 10-KSB and are identified by the numbers indicated: see index to exhibits immediately following financial statements and schedules of this report. 3(i) Certificate of Incorporation, as amended (1) 3.2 Bylaws, as amended (1) (1) Incorporated by reference to the Registrant's Form 10-SB, filed on October 17, 2000 (SEC File No. (0-31779). (b) Reports on Form 8-K We did not file any reports on Form 8-K for the quarter ended June 30, 2001. IV-1 -------------------------------------------------------------------------------- SIGNATURES Pursuant to the requirements of Section 13 or 15(d) of the Securities Exchange Act of 1934, the registrant has duly caused this report to be signed on its behalf by the undersigned, there unto duly authorized. HIPSTYLE.COM, INC. /s/Rebecca J. Farkas ---------------------------------- Rebecca J. Farkas President, Treasurer and Secretary Dated: October 11, 2001 Pursuant to the requirements of the Securities Exchange Act of 1934, this report has been signed below by the following persons on behalf of the registrant and in the capacities and on the dates indicated. Name Title Date /s/Rebecca J. Farkas President, Treasurer and October 11, 2001 -------------------- Secretary Rebecca J. Farkas /s/ Michelle Brock Vice President October 11, 2001 -------------------- Michelle Brock IV -2 -------------------------------------------------------------------------------- HIPSTYLE.COM, INC. AND SUBSIDIARY (A DEVELOPMENT STAGE COMPANY) FINANCIAL STATEMENTS AS OF AND FOR THE YEARS ENDED JUNE 30, 2001 AND 2000 AND FOR THE PERIOD FROM JUNE 22, 1999 (DATE OF INCEPTION) THROUGH JUNE 30, 2001 -------------------------------------------------------------------------------- HIPSTYLE.COM, INC. AND SUBSIDIARY (A DEVELOPMENT STAGE COMPANY) TABLE OF CONTENTS Page INDEPENDENT AUDITORS' REPORT 1 FINANCIAL STATEMENTS AS OF AND FOR THE YEARS ENDED JUNE 30, 2001 AND 2000 AND FOR THE PERIOD JUNE 22, 1999 (DATE OF INCEPTION) THROUGH JUNE 30, 2001 Balance sheets 2 Statements of operations 3 Statements of changes in stockholders' equity 4 Statements of cash flows 5 - 6 Notes to financial statements 7 - 16 -------------------------------------------------------------------------------- INDEPENDENT AUDITORS' REPORT To the Stockholders and Board of Directors Hipstyle.com, Inc. and subsidiary (A Development Stage Company) Miami, Florida We have audited the accompanying balance sheets of Hipstyle.com, Inc. (a development stage company) as of June 30, 2001 and the related statement of operations, change in stockholders' equity and cash flow for the year ended June 30, 2001. These financial statements are the responsibility of the Company's management. Our responsibility is to express an opinion on these financial statements based on our audit. The financial statements of Hipstyle.com, Inc. as of June 30, 2000 were audited by other auditors who report dated September 5, 2000, expressed an unqualified opinion on those statements. We conducted our audit in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan and perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used and significant estimates made by management, as well as evaluating the overall financial statement presentation. We believe the audit provides a reasonable basis for our opinion. In our opinion, the financial statement referred to above present fairly, in all material respects, the financial position of Hipstyle.com, Inc. as of June 30, 2001 and the result of its operation and its cash flow for the year ended June 30, 2001 in conformity with accounting principles generally accepted in the United States of America. The accompanying financial statements have been prepared assuming the Company will continue as a going concern. As discussed in Note 4 to the financial statements, the Company is a development stage company. The realization of a major portion of its assets is dependent upon its ability to meet its future financing requirements, and the success of future operations. These factors raise substantial doubt about the Company's ability to continue as a going concern. The financial statements do not include any adjustments that might result from this uncertainty. Salibello & Broder LLP New York, NY August 23, 2001 1 -------------------------------------------------------------------------------- HIPSTYLE.COM, INC. AND SUBSIDIARY (A DEVELOPMENT STAGE COMPANY) BALANCE SHEETS -------------------------------------------------------------------------------- ASSETS JUNE 30, 2001 JUNE 30, 2000 --------------- -------------- CURRENT ASSETS: Cash $ 275 $ 55 Prepaid expenses 0 0 --------------- -------------- Total current assets 275 55 WEBSITE - net of accumulated amortization $450 0 26,685 --------------- -------------- TOTAL ASSETS $ 275 $ 26,740 =============== ============== LIABILITIES AND STOCKHOLDERS' EQUITY (DEFICIT) CURRENT LIABILITIES: Accounts payable & accrued expenses $ 21,474 $ 70,649 Loans and advances payable - related party 500 2,488 Notes payable - related party 6,000 0 --------------- -------------- Total current liabilities 27,974 73,137 STOCKHOLDERS' EQUITY: Common stock, par value $.0001 per share; 100,000,000 shares authorized 4,600,000 and 4,050,000 shares issued and outstanding at June 30, 2001 and June 30, 2000, respectively 460 405 Additional paid-in capital 119,740 9,795 Deficit accumulated during the development stage (147,899) (56,597) --------------- -------------- Total Stockholders' equity (27,699) (46,397) --------------- -------------- TOTAL LIABILITIES AND STOCKHOLDERS' EQUITY (DEFICIT) $ 275 $ 26,740 =============== ============== 2 -------------------------------------------------------------------------------- HIPSTYLE.COM, INC. AND SUBSIDIARY (A DEVELOPMENT STAGE COMPANY) STATEMENTS OF OPERATIONS -------------------------------------------------------------------------------- FOR THE PERIOD YEAR ENDED JUNE 22, 1999 JUNE 30, (DATE OF INCEPTION) TO -------- 2001 2000 JUNE 20, 2001 ---- ---- ------------- DEVELOPMENT STAGE REVENUES $0 $0 $0 DEVELOPMENT STAGE EXPENSES: Amortization 1,357 450 1,807 Accounting 12,503 13,000 25,503 Bank charges 150 145 295 Consulting fees 0 10,000 10,200 Dues & subscription 55 238 293 Licenses and taxes 748 925 1,673 Office expenses 24,000 0 24,000 On-line services 495 0 495 Legal fees 20,675 4,481 25,156 Postage 267 0 267 Printing 315 0 315 Website development fees 25,328 27,158 52,485 Transfer agent fee 2,321 0 2,321 Travel 2,987 0 2,988 TOTAL DEVELOPMENT STAGE EXPENSES 91,201 56,397 147,798 LOSS FROM OPERATIONS (91,201) (56,397) (147,798) INTEREST EXPENSE (101) 0 (101) NET LOSS $ (91,302) $ (56,397) $(147,899) LOSS PER COMMON SHARE Basic & diluted $ (0.02) $ (0.01) Weighted-average common shares outstanding 4,564,836 4,004,110 3 -------------------------------------------------------------------------------- HIPSTYLE.COM, INC (A DEVELOPMENT STAGE COMPANY) STATEMENTS OF CHANGES IN STOCKHOLDERS' EQUITY (DEFICIT) -------------------------------------------------------------------------------- DEFICIT ACCUMULATED ADDITIONAL DURING THE COMMON STOCK PAID-IN- DEVELOPMENT SHARES AMOUNT CAPITAL STAGE TOTAL ------ ------ ------- ----- ----- Balance, June 22, 1999 (date of inception) 0 $ 0 $ 0 $ 0 $ 0 Restricted common stock issued to related parties 4,000,000 400 (200) 0 200 for consulting fees Deficit accumulated during the development stage for the period June 22, 1999 (date of inception) through June 30, 1999 0 0 0 (200) (200) --------- --------- --------- --------- --------- Balance, June 30, 1999 4,000,000 400 (200) (200) 0 Restricted common stock issued to related party for 50,000 5 9,995 0 10,000 consulting services Deficit accumulated during development stage for the year ended June 30, 2000 0 0 0 (56,397) (56,397) --------- --------- --------- --------- --------- Balance, June 30, 2000 4,050,000 405 9,795 (56,597) (46,397) Common stock issued to third parties in private offering 550,000 55 109,945 0 110,000 Deficit accumulated during the development stage for the year ended June 30, 2001 0 0 0 (91,302) (91,302) --------- --------- --------- --------- --------- Balance, June 30, 2001 4,600,000 $ 460 $ 119,740 $(147,899) $ (27,699) ========= ========= ========= ========= ========= 4 -------------------------------------------------------------------------------- HIPSTYLE.COM, INC. AND SUBSIDIARY (A DEVELOPMENT STAGE COMPANY) STATEMENT OF CASH FLOWS -------------------------------------------------------------------------------- YEAR ENDED FOR THE PERIOD JUNE 30, JUNE 22, 1999 (DATE OF INCEPTION) TO 2001 2000 JUNE 30, 2001 ----------------- ---------------- ---------------- CASH FLOWS FROM OPERATING ACTIVITES: Net loss (91,302) (56,397) (147,899) Adjustments to reconcile net loss to net cash used by operations: Amortization 1,357 450 1,807 Write off of website 25,328 0 25,328 Stock based expense 0 10,000 10,200 Changes in assets and liabilities: Increase (Decrease) in accounts payable and accrued expenses (51,663) 70,649 18,986 Increase (Decrease) in loans and advances - related party 500 2,488 2,988 ----------------- ---------------- ---------------- Net cash used by operating activities (115,780) 27,190 (88,590) CASH FLOWS FROM INVESTING ACTIVITES: Purchase of website 0 (27,135) (27,135) ----------------- ---------------- ---------------- Net cash used by investing activities 0 (27,135) (27,135) CASH FLOWS FROM FINANCING ACTIVITIES: Proceeds from the issuance of common stock 110,000 0 110,000 Notes payable - related party 6,000 0 6,000 ----------------- ---------------- ---------------- Net cash provided by financing activities 116,000 0 116,000 INCREASE (DECREASE) IN CASH $ 220 $ 55 $ 275 ================= ================ ================ CASH, BEGINNING OF PERIOD $ 55 $ 0 $ 0 ================= ================ ================ CASH, END OF PERIOD $ 275 $ 55 $ 275 ================= ================ ================ 5 -------------------------------------------------------------------------------- SUPPLEMENTAL DISCLOSURES OF CASH FLOW INFORMATION: During the years ended June 30, 2001 and 2000, and for the cumulative periods June 22, 1999 (date of inception) through June 30, 2001, the Company did not pay any interest or taxes. SUPPLEMENTAL SCHEDULE OF NON-CASH INVESTING AND FINANCING ACTIVIITES The Company entered into the following non-cash transactions: On June 22, 1999 (date of inception) the Company issued 4,000,000 post-split (see note 8) restricted shares of common stock in consideration for consulting services provided by Intelilabs.com, Inc. formerly known as Quentin Road Productions, Inc., the founder of the Company (see note 1). This transaction was valued at $200. On May 30, 2000 the Company issued 50,000 restricted shares of the Company's common stock in exchange for consulting services to the Vice President of the Company. This transaction was valued at $10,000 (see note 8). On September 30, 2000 the Company decided to write off the capitalized portion of the website (See note 5). The assets' net value at the time of impairment was $25,328. -6- -------------------------------------------------------------------------------- HIPSTYLE.COM, INC (A DEVELOPMENT STAGE COMPANY) NOTES TO FINANCIAL STATEMENTS -------------------------------------------------------------------------------- 1. ORGANIZATION Hipstyle.com, Inc. ("the Company") was incorporated on June 22, 1999 under the laws of the State of Florida and was licensed to do business in the state of New York. The Company is in the process of designing a website dedicated to bringing together designers of high fashion and beauty products with a targeted client base. The Company's goal is to provide links to established e-commerce and catalog retail sites featuring designer apparel and accessories, as well as fashion related services and content to its viewers. The Company was a wholly owned subsidiary of Intellilabs.com, Inc. ("Intellilabs"), formerly known as Quentin Road productions, Inc., a publicly traded company listed on the OTC Electronic Bulletin Board (OTCBB:QRPI) from inception until March 1, 2000. It was spun-off by Intellilabs on March 1, 2000. Upon such spin-off, shareholders of Intellilabs received 1.31 shares of the Company for each share of Intellilabs owned as of March 1, 2000. As a result of the spin-off, Atlas Equity Group, Inc., a related party, beneficial owner of which is Michael D. Farkas, became a majority shareholder in the company owning approximately 57% of the outstanding shares. Its principal office is located at 1221 Brickell Avenue, Suite 900, Miami, FL 33131. On May 24, 2000, the Company formed Hipstyle.com, Inc. (Hipstyle Delaware) under the laws of the state of Delaware. Hipstyle Delaware did not have any significant activity as of June 30, 2001. 2. SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES MANAGEMENT DECISION NOT TO CONSOLIDATE Statement of Financial Accounting Standards ("SFAS") No. 94, "Consolidation of All Majority Owned Subsidiaries," encourages the use of consolidated financial statements between a parent company and its subsidiaries unless: a) Control is likely to be temporary, b) Control does not rest with the majority owner(s), or c) Minority stockholders have certain approval or veto rights that allow them to exercise significant control over major management decisions in the ordinary course of business. -7- -------------------------------------------------------------------------------- HIPSTYLE.COM, INC (A DEVELOPMENT STAGE COMPANY) NOTES TO FINANCIAL STATEMENTS -------------------------------------------------------------------------------- The management of Atlas Equity Group, Inc., a related party, in which Michael D. Farkas is a beneficial owner, believes that its control is temporary. Therefore, management believes that separate financial statements are appropriate and properly reflect the Company's current operating results. USE OF ESTIMATES The preparation of financial statements in conformity with generally accepted accounting principles requires management to make estimates and assumptions that affect the reported amounts of assets and liabilities and disclosures of contingent assets and liabilities as of the date of the financial statements. Accordingly, actual results could differ from those estimates. CASH AND CASH EQUIVALENTS For purposes of reporting cash flows, the company considers all highly liquid investments purchased with an original maturity of three months or less to be cash equivalents. INTANGIBLE ASSET - WEBSITE Website costs have been capitalized pursuant to EITF 00-2. The website was being amortized on the straight-line basis over a period of 60 months. The planning and maintenance costs associated with the website were expensed as incurred. The Company reviews assets for impairment whenever events or changes in circumstances indicate the carrying value of the asset may not be recoverable. A determination of impairment, if any, is made based on estimates of undiscounted future cash flows. On September 30, 2000 the Company decided to impair their Website because undiscounted future cash flows are uncertain at this time. The assets net value was $25,328 at the time of impairment (see note 4). -8- -------------------------------------------------------------------------------- HIPSTYLE.COM, INC. AND SUBSIDIARY (A DEVELOPMENT STAGE COMPANY) NOTES TO FINANCIAL STATEMENTS -------------------------------------------------------------------------------- INCOME TAXES The Company utilizes Statement of Financial Standards ("SFAS") No. 109, "Accounting for Income Taxes", which requires the recognition of deferred tax assets and liabilities for the expected future tax consequences of events that have been included in financial statements or tax returns. Under this method, deferred income taxes are recognized for the tax consequences in future years of differences between the tax basis of assets and liabilities and their financial reporting amounts at each period end based on enacted tax laws and statutory tax rates applicable to the periods in which the differences are expected to affect taxable income. Valuation allowances are established when necessary to reduce deferred tax assets to the amount expected to be realized. The accompanying financial statements have no provisions for deferred tax assets or liabilities because the deferred tax allowance offsets deferred tax assets in their entirety. STOCK COMPENSATION Stock-based compensation is recognized using the intrinsic value method prescribed in Accounting Principles Board ("APB") Opinion No. 25, Accounting for Stock Issued to Employees, and related interpretations. Accordingly, compensation expense for stock options is measured as the excess, if any, of the fair value of the Company's stock at the date of the grant over the amount an employee must pay to acquire the stock and is amortized over the vesting period. The Company has adopted the disclosure provisions of SFAS No. 123, Accounting for Stock-Based Compensation, which requires the Company to disclose the pro forma effects on earnings and earnings per share as if SFAS No. 123 had been adopted. This adoption has no effect on the Company. NET LOSS PER SHARE The Company has adopted SFAS No. 128 "Earnings Per Share". Basic loss per share is computed by dividing the loss available to common shareholders by the weighted-average number of common shares outstanding. Diluted loss per share is computed in a manner similar to the basic loss per share, except that the weighted-average number of shares outstanding is increased to include all common shares, including those with the potential to be issued by virtue of warrants, options, convertible debt and other such convertible instruments. Diluted earnings per share contemplates a complete conversion to common shares of all convertible instruments only if they are dilutive in nature with regards to earnings per share. Since the Company has incurred losses for all periods, and since there are no convertible instruments, basic loss per share and diluted loss per share are the same. -9- -------------------------------------------------------------------------------- HIPSTYLE.COM, INC. AND SUBSIDIARY (A DEVELOPMENT STAGE COMPANY) NOTES TO FINANCIAL STATEMENTS -------------------------------------------------------------------------------- FAIR VALUE OF FINANCIAL INSTRUMENTS SFAS No. 107 "Disclosures about Fair Value of Financial Instruments" requires the disclosure of the fair value of financial instruments. The Company's management, using available market information and other valuation methods, has determined the estimated fair value amounts. However, considerable judgment is required to interpret market data in developing estimates of fair value. Accordingly, the estimates presented herein are not necessarily indicative of the amounts the Company could realize in a current market exchange. SEGMENTS The Company has adopted the provisions of SFAS No. 131, Disclosures about Segments of an Enterprise and Related Information. SFAS No. 131 establishes standards for companies to report information about operating segments in annual financial statements. It also establishes standards for related disclosures about products and services, geographic areas and major customers. Since the Company did not have any revenues and or segments during the years ended June 30, 2001 and June 30, 2000 the provisions of SFAS No. 131 does not have a material effect on these financial statements. 3. RECENTLY ISSUED ACCOUNTING PRONOUNCEMENTS In March, 2000 the FASB issued Interpretation No. 44, "Accounting for Certain Transactions Involving Stock Compensation, Interpretation of APB Opinion No. 25." Interpretation No. 44 clarifies the application of Accounting Principle Board Opinion No. 25 to certain issues including: (1) the definition of employee for purposes of applying APB No. 25, (2) the criteria for determining whether a plan qualifies as a non-compensatory plan, (3) the accounting consequences of various modifications to the terms of a previously fixed stock option or award, and (4) the accounting for an exchange of stock compensation awards in business combinations. Management adopted the application of the fair value method under FASB Statement 123 and, therefore, this Interpretation does not have a material effect on the financial statements. In June 2000, the Financial Accounting Standards Board issued SFAS No. 138, "Accounting for Derivative Instruments and Hedging Activities - An Amendment of FASB Statement No. 133." SFAS 138 amends the accounting and reporting standards for certain derivatives and hedging activities such as net settlement contracts, foreign currency transactions and inter company derivatives. The Company does not currently hold derivative instruments or engage in hedging activities. The requirements of SFAS 138 does not have a material effect on our financial statements and related disclosures. -10- -------------------------------------------------------------------------------- HIPSTYLE.COM, INC. AND SUBSIDIARY (A DEVELOPMENT STAGE COMPANY) NOTES TO FINANCIAL STATEMENTS -------------------------------------------------------------------------------- 4. DEVELOPMENT STAGE OPERATIONS AND GOING CONCERN MATTERS The Company's initial activities have been devoted to developing a business plan, negotiating contracts and raising capital for future operations and administrative functions. The accompanying financial statements have been prepared on a going concern basis, which contemplates the realization of assets and the satisfaction of liabilities in the normal course of business. As shown in the financial statements, development stage losses from June 22, 1999 (date of inception) to June 30, 2001, were $147,899. The Company's cash flow requirements have been met by contributions of capital and accounts payable. The possibility exists that these sources of financing will not continue to be available. If the company is unable to generate profits, or unable to obtain additional funds for its working capital needs, it may have to cease operations. The Company intends to meet its long-term liquidity needs through available cash as well as through additional financing from outside sources. Management believes that the existing working capital in combination with additional paid-in capital will be sufficient to fund operations at least through July 1, 2001 (see note 8). The financial statements do not include any adjustments relating to the recoverability and classification of liabilities that might be necessary should the Company be unable to continue as a going concern. The Company's continuation as a going concern is dependent upon its ability to generate sufficient cash flow to meet its obligations on a timely basis, to retain additional paid-in capital and to ultimately attain profitability. 5. INTANGIBLE ASSET - WEBSITE The website and related amortization consisted of the following as of June 30, 2001 and June 30, 2000: -11- -------------------------------------------------------------------------------- HIPSTYLE.COM, INC. AND SUBSIDIARY (A DEVELOPMENT STAGE COMPANY) NOTES TO FINANCIAL STATEMENTS -------------------------------------------------------------------------------- June 30, 2001 June 30, 2000 Website $ 27,135 $ 27,135 Less: accumulated amortization (1,807) (450) 25,328 0 Impairment (25,328) 0 Website $ - $ 26,685 Amortization expense for the years ended June 30, 2001 and June 30, 2000 was $1,357 and $450, respectively. As of June 30, 2000 Management decided to capitalize the Website based on the Company's belief that there will be a future benefit derived from the Website. Also, the Company felt that there will be an adequate future inflow of cash resulting from common stock being issued to third parties in a private offering and future revenue derived from operations of the Website. On September 30, 2000 the Company decided to impair the Website due to the uncertainty of undiscounted future cash flows and the realization that there will not be any future benefit resulting from the development of the Website. 6. INCOME TAXES No provisions for income taxes have been made because the Company has sustained cumulative losses since the commencement of operations. For the years ended June 30, 2001 and June 30, 2000, the Company had net operating loss carryforwards ("NOL's") of $147,899 and $56,597, respectively, which will be available to reduce future taxable income and expense in the year ending December 31 and June 30, 2020 respectively. In accordance with SFAS No. 109 the Company has computed the components or deferred income taxes as follows. June 30, 2001 June 30, 2000 Deferred tax assets $ 58,420 $ 22,356 Valuation allowance (58,420) (22,356) Deferred tax asset, net $ - $ - At June 30, 2001 and June 30, 2000, a valuation allowance has been provided and realization of the deferred tax benefit is not likely. -12- -------------------------------------------------------------------------------- HIPSTYLE.COM, INC. AND SUBSIDIARY (A DEVELOPMENT STAGE COMPANY) NOTES TO FINANCIAL STATEMENTS -------------------------------------------------------------------------------- The effective tax rate varies from the U.S. Federal statutory tax rate for both years ended June 30, 2001 and June 30, 2000 respectively, principally due to the following: U.S. statutory tax rate 34% State and local taxes 5.6 Valuation (39.5) Effective rate - % 7. ACCOUNTS PAYABLE & ACCRUED EXPENSES Accounts payable and accrued expenses at June 30, 2001 & June 30, 2000 respectively consisted of the following: June 30, June 30, 2001 2000 Accounts payable $ 16,798 $ 54,697 Accrued interest 101 0 Accrued expenses 4,575 15,952 $ 21,474 $ 70,649 8. STOCKHOLDERS' EQUITY The Company issued 4,000,000 post-split common shares upon incorporation to Intellilabs in exchange for consulting services pertaining to the formation of the Company valued at $200. This investor is deemed to be a founder and affiliate of the Company. These shares have been adjusted to give retroactive effect to a 2,000 to 1 stock split that occurred on January 15, 2000. On January 4, 2000, the Board of Directors amended the Articles of Incorporation. The number of authorized shares of common stock was increased to 100,000,000. The par value was changed to $0.0001 per share of common stock. The financial statements have been retroactively adjusted to reflect the effect of this change. On January 15, 2000, the Board of Directors authorized a 2,000 to 1 forward split of the Company's common stock, par value $0.0001. Subsequent to the split there were 4,000,000 issued and outstanding. This transaction has been given retroactive effect as if it occurred on June 22, 1999 (Date of inception) -13- -------------------------------------------------------------------------------- HIPSTYLE.COM, INC. AND SUBSIDIARY (A DEVELOPMENT STAGE COMPANY) NOTES TO FINANCIAL STATEMENTS -------------------------------------------------------------------------------- On March 1, 2000, the Company entered into an agreement and plan of distribution ("spin-off") with Intellilabs. Upon spin-off, the shareholders of Intellilabs received 1.31 shares of the Company's common stock for each share of Intellilabs owned as of March 1, 2000, totaling 4,000,000 common shares. As a result of this spin-off and share distribution Atlas Equity Group, Inc., a related party, in which Michael D. Farkas is a beneficial owner, received 2,620,000 shares, representing approximately 57% of the Company's outstanding common stock and Rebecca J. Farkas (f/k/a Brock) received 655,000 shares representing approximately 16% of the Company's common stock. On May 30, 2000, the Board of Directors authorized the issuance of 50,000 restricted shares of the Company's common stock in exchange for consulting services rendered by the Vice President. These shares were valued at $0.20 per share due to their restrictive nature and are subject to Rule 144 of the SEC Act of 1933 as amended. This transaction was valued at $10,000. In June 2000, the Company entered into a private offering of securities pursuant to Regulation D, Rule 504, promulgated under the Securities Act of 1933 as amended. Common shares were offered to non-accredited and unaffiliated investors for cash consideration of $0.20 per share. For the year ended June 30, 2001, 550,000 unrestricted common shares were issued to 22 non-accredited and unaffiliated investors for cash consideration totaling $110,000. The proceeds from the sale of these securities were received in July and August 2000 and have been recorded in the statement of changes in stockholders' equity (deficit). 9. RELATED PARTY TRANSACTIONS The Company issued 4,000,000 post-split common shares upon incorporation to Intellilabs, the parent company, in exchange for consulting services valued at $200. These shares were subsequently distributed to the shareholders of Intellilabs. Pursuant to an agreement and plan of distribution. On May 30, 2000 the Company issued 50,000 restricted shares of the Company's common stock in exchange for consulting services to Michelle Brock, a related party, and Vice President of the Company. This transaction was valued at $10,000. -14- -------------------------------------------------------------------------------- HIPSTYLE.COM, INC. AND SUBSIDIARY (A DEVELOPMENT STAGE COMPANY) NOTES TO FINANCIAL STATEMENTS -------------------------------------------------------------------------------- Michael D. Farkas and Rebecca J. Farkas, his wife, an officer and director, and a related party loaned the Company $2,488 which covered the cost of the license fees to the State of New York and the reservation costs associated with reserving the desired internet address and other operating expenses. No interest has been charged on these loans and were paid on August 31, 2000. In June 2000, the Company engaged WealthHound, Inc., a subsidiary of WealthHound.com, Inc. which is a related party, in which Michael Farkas is a 70% owner, to develop and design its website. The Company paid a total of $54,292 to WealthHound, Inc. in connection with these services. In July 2000, the Company agreed to reimburse Atlas Equity Group, Inc., a related party, beneficial owner of which is Michael D. Farkas, $2,000 per month (on a month-to-month basis) for operating and administrative services. At June 30, 2001, $6,000 of these reimbursable operating and administrative expenses are included in accounts payable and accrued expenses. In August 2000, the Company engaged OSRS Communications a subsidiary of WealthHound.com, Inc., a related party, beneficial owner which is Michael Farkas to provide web hosting services for $45 per month. -15- -------------------------------------------------------------------------------- End of Filing ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9870 From: James M. Atkinson Date: Thu Oct 14, 2004 4:59pm Subject: CCS International / SITG Public SEC Documents - 2002 Annual Report [repost] SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-KSB [X] ANNUAL REPORT PURSUANT TO SECTION 13 OR 15 (d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended June 30, 2002 OR [ ] TRANSITION REPORT PURSUANT TO SECTION 13 OR 15 (d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from ________ to ________ COMMISSION FILE NUMBER 000-31779 SECURITY INTELLIGENCE TECHNOLOGIES, INC. Exact name of registrant as specified in its charter) Florida 65-0928369 (State or other jurisdiction of formation) (IRS Employer Identification No.) 145 Huguenot Street, New Rochelle, New York 10801 (Address of principal executive offices) (Zip Code) Registrant's telephone number, including area code (914) 654-8700 (Former name or former address, if changes since last report) Check whether the issuer (1) filed all reports required to be filed by Section 13 or 15(d) of the Exchange Act during the past 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days. Yes X No Check if there is no disclosure of delinquent filers in response to Item 405 of Regulation S-B is not contained in this form, and no disclosure will be contained, to the best of registrant's knowledge, in definitive proxy or information statements incorporated by reference in Part III of this Form 10-KSB or any amendment to this Form 10-KSB. [ ] The Registrant's revenues for the fiscal year ended June 30, 2002 were $5,609,557. State the aggregate market value of the voting and non-voting common equity held by non-affiliates computed by reference to the price at which the common equity was sold, or the average bid and asked price of such common equity, was $877,088 at September 30, 2002. The number of shares of common stock $.0001 par value, of the Registrant issued and outstanding as of September 30, 2002 was 17,059,346. -------------------------------------------------------------------------------- DOCUMENTS INCORPORATED BY REFERENCE None TABLE OF CONTENTS Page Number PART I 1 BUSINESS 1 PROPERTIES 12 LEGAL PROCEEDINGS 12 SUBMISSION OF MATTERS TO A VOTE OF SECURITYHOLDERS 13 PART II 13 MARKET FOR RESISTRANT'S COMMON EQUITY AND RELATED STOCKHOLDER MATTERS 13 MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS 15 FINANCIAL STATEMENTS AND SUPPLEMENTARY DATA 18 CHANGES IN AND DISAGREEMENT WITH ACCOUNTANTS ON ACCOUNTING AND FINANCIAL DISCLOSURE 18 PART III DIRECTORS, EXECUTIVE OFFICERS, PROMOTERS AND CONTROL PERSONS; COMPLIANCE WITH SECTION 16 (a) OF THE EXCHANGE ACT OF THE REGRISTRANT 19 EXECUTIVE COMPENSATION 20 SECURITY OWNERSHIP OF CERTAIN BENEFICIAL OWNERS AND MANAGEMENT 22 CERTAIN RELATIONSHIPS AND RELATED TRANSACTIONS 23 -------------------------------------------------------------------------------- PART I ITEM 1. DESCRIPTION OF BUSINESS COMPANY OVERVIEW We design, assemble, market and sell security products. Our products and services are used throughout the world by military, law enforcement and security personnel in the public and private sectors, as well as governmental agencies, multinational corporations and non-governmental organizations. Our products include a broad range of professional, branded law enforcement and consumer equipment such as covert audio and video intercept, electronic countermeasures, video, photo, and optical systems, radio communication, explosive contraband detection, armored vehicles and clothing, nuclear, biological and chemical masks and protective clothing, voice stress analysis lie detection, and global positioning systems ("GPS"), used for tracking, locating and recovering vehicles and fleet management. Our products are marketed under CCS International, Ltd. ("CCS"), G-Com Technologies, Ltd. and The Counter Spy Shops of Mayfair, London(R) brand names and are sold primarily through a worldwide network of more than 300 sales agents, including four retail stores in the United States and two overseas. Our trained, multilingual and experienced security personnel work closely with clients to create and implement solutions to complex security problems. These services include security planning, advice and management, security systems integration, intellectual property asset protection, due diligence investigations and training programs in counterintelligence, counter surveillance, advanced driving techniques and ballistics. We are a Florida corporation organized under the name Hipstyle.com, Inc. in June 1999. Our principal executive offices are located at 145 Huguenot Street, New Rochelle, New York 10801, telephone (914) 654-8700. Our website is www.spyzone.com. Neither the information nor other statements contained in our website nor the information contained in any other Internet website is a part of this annual report on Form 10-KSB. On April 17, 2002, pursuant to an agreement and plan of merger among us, CCS International, Ltd., a Delaware corporation ("CCS"), and CCS Acquisition Corp., a Delaware corporation ("Acquisition Corp"), Acquisition Corp. was merged into CCS, with the result that CCS became our wholly-owned subsidiary. As a result of the merger: -- We issued an aggregate of 11,900,000 shares of common stock, 3,500,000 shares of series A preferred stock and 1,500,000 shares of series B preferred stock to the former stockholder of CCS, with each share of series A preferred stock and series B preferred stock being convertible into one share of common stock if the Company has either annual net revenue of $10,000,000 or net income of at least $1,000,000 prior to October 25, 2008, each share of series A preferred stock having 15 votes per share, and each share of series B preferred stock having no voting rights except as required by law. 1 -------------------------------------------------------------------------------- -- Outstanding options and warrants to purchase a total of 1,800,500 shares of CCS' common stock were converted into options and warrants to purchase an equal number of shares of our common stock at exercise prices of $.50 to $1.00 per share. -- Our corporate name was changed from HipStyle.com, Inc. to Security Intelligence Technologies, Inc. -- Our officers and directors resigned. -- Ben Y. Jamil, Menachem Cohen, Tom Felice and Nomi Om, who were officer of CCS prior to the merger, were elected as our directors and offices, and Sylvain Naar, who was a director of CCS, was elected as a director. -- We entered into a three-year employment agreement with Mr. Jamil and granted him a non-qualified stock option to purchase 1,000,000 shares of common stock at $2.00 per share pursuant to the employment agreement. The terms of Mr. Jamil's employment agreement are described under "Item 10. Executive Compensation." RISK FACTORS We require significant working capital in order to fund our operations. At June 30, 2002, we had cash of approximately $32,000 and a working capital deficit in excess of $2.1 million. In order to develop and market our products and pay our current liabilities, we require additional working capital. The merger did not provide us with any working capital and we have not been able to raise any capital since the completion of the merger. In the event that we are unable to raise the necessary funding we may be unable to continue operations. Our accounts payable and accrued expenses increased from $615,000 at June 30, 2001 to $2.1 million at June 30, 2002, reflecting our inability to pay creditors currently. We also had customer deposits and related deferred revenue of $1.4 million, which relate to payments on orders which had not been filled at that date. We have used our advance payments to continue our operations. If our vendors do not extend us necessary credit we may not be able to fill current or new orders, which may affect the willingness of our clients to continue to place orders with us. Our bank credit line terminated on November 1, 2002. Our only source of financing other than advances from our chief executive officer was our bank credit facility of $200,000 which was secured by all of our assets and guaranteed by our chief executive officer. This facility terminated on November 1, 2002, at which time all of the principal and interest on our obligations to the bank became due. On November 1, 2002 we reduced the outstanding balance to $100,000 and began discussions with the lender to extend the terms or to convert the balance to a term loan. To date, we do not have an agreement with respect to an extension with our existing lender or an agreement to convert the $100,000 outstanding balance to a term loan, or any agreements with any replacement lender. Our failure to obtain either an extension of our credit facility, a conversion of the outstanding balance to a term loan, or a facility with another lender could materially impair our ability to continue in operation, and we cannot assure you that we will be able to obtain the necessary financing. We have been operating at a loss, and our losses are continuing. We sustained losses of $2.4 million, or $.19 per share (basic and diluted), for the fiscal year ended June 30, 2002, $326,000, or $.03 per share (basic and diluted), for the fiscal year ended June 30, 2001, and our losses are continuing. We cannot give any assurance that we can or will ever operate profitably. Our independent auditors have included an explanatory paragraph in their report as to our ability to continue as a going concern. As a result of our continuing and significant losses and our working capital deficiency, our independent auditors have included in their report an explanatory paragraph as to our ability to continue as a going concern. 2 -------------------------------------------------------------------------------- Because of our stock price and our history of losses, we may have difficulty in raising necessary funding for our business. Since the completion of the merger we have sought, and been unsuccessful, in our efforts to obtain funding for our business. Because of our losses, we are not able to increase our borrowing, and our present bank line is guaranteed by Ben Jamil, our chief executive officer. Because of both our low stock price and our losses, we have not been able to raise funds through the sale of our equity securities. We may not be able to obtain any additional funding, and, if we are not able to raise funding, we may be unable to continue in business. Furthermore, if we are able to raise funding in the equity markets, our stockholders will suffer significant dilution and the issuance of securities may result in a change of control. If we do not have access to the most current technology, we may not be able to market our products and services. The security industry is constantly changing to meet new requirements, which result from both new threats to government and industry, both from potential threats to persons and property to industrial and governmental espionage, as well as general concern about personal and family safety. In order to meet these needs we will both have to anticipate problems and develop methods or reducing the potential risk. Our failure to anticipate our potential clients' requirements or to be able to provide them with the most current technology may impair our ability to sell our products. If we are unable to fund any significant research and development and product development effort, we may not be able to offer products based on new and developing technologies. Because of our limited resources, we may not be able to develop or implement a successful marketing program. Our ability to implement an expanded marketing program is dependent upon our ability to fund the program. If we are not able to obtain necessary financing, we may be unable to market our products. Furthermore, our financial condition may inhibit potential customers from purchasing our equipment and our competitors may use our financial condition in marketing to the same customers. We are subject to government regulations, which if violated, could prohibit us from conducting a significant portion of our export business. The United States and other governments have strict regulations concerning the exporting and importing of security devices, may restrict sales of certain products to bona fide law enforcement agencies or may restrict the sale of certain products from the United States. If we violate any of these laws, we may be subject to civil or criminal prosecutions. If we are charged with any such violations, regardless of whether we are ultimately cleared, we may be unable to sell our products. During the fiscal year ended June 30, 2002, we incurred significant expense and our reputation was impaired as a result of charges against our employees, including one of our officers, even though the charges were dismissed. Because we are dependent on our management, the loss of key executive officers could harm our business. Our business is largely dependent upon our senior executive officers, Messrs. Ben Jamil, chief executive officer, Chris R. Decker, chief financial officer, Menachem Cohen, vice president, Tom Felice, vice president and Ms. Nomi On, vice president. Although we have an employment agreement with Mr. Jamil, the employment agreement does not guarantee that he will continue with us. Since we do not have an agreement with Messrs. Decker, Cohen, Felice or Ms. Om, each of these officers has the right to terminate his or her employment. Our business may be adversely affected if any of our key management personnel or other key employees left our employ. Because we lack patent or copyright protection, we cannot assure you that others will not be able to use our proprietary information in competition with us. We have no patent or copyright protection for our proprietary software, and we rely on non-disclosure agreements with our employees. Since our business is dependent upon our proprietary products, the unauthorized use or disclosure of this information could harm our business. 3 -------------------------------------------------------------------------------- Major corporations may be able to develop and fund marketing efforts that could enable them to dominate the market. Because there are a number of major companies that can both offer security products to governments and industry and fund a product development and marketing program, these companies have the financial ability to dominate the market, to effectively set a standard which may be incompatible with our technology and to use their financial resources and government and industry contacts to successfully compete against us in all major markets, regardless of whether their technology is superior or inferior to ours. Our growth may be limited if we cannot make acquisitions. A part of our growth strategy is to acquire other businesses that are related to our current business. Such acquisitions may be made with cash or our securities or a combination of cash and securities. To the extent that we require cash, we may have to borrow the funds or issue equity. Our stock price may adversely affect our ability to make acquisitions for equity or to raise funds for acquisition through the issues of equity securities. If we fail to make any acquisitions, our future growth may be limited. Furthermore, because of our stock price, the issuance of any stock or other equity securities in connection with any acquisition may result is significant dilution to our stockholders and may result in a change of control. As of the date of this report we do not have any agreement or understanding, either formal or informal, as to any acquisition. If we make any acquisitions, they may disrupt or have a negative impact on our business. If we make acquisitions, we could have difficulty integrating the acquired companies' personnel and operations with our own. In addition, the key personnel of the acquired business may not be willing to work for us, and our officers may exercise their rights to terminate their employment with us. We cannot predict the affect expansion may have on our core business. Regardless of whether we are successful in making an acquisition, the negotiations could disrupt our ongoing business, distract our management and employees and increase our expenses. We do not anticipate paying dividends on our common stock. The rights of the holders of common stock may be impaired by the potential issuance of preferred stock. Our certificate of incorporation gives our board of directors the right to create new series of preferred stock. As a result, the board of directors may, without stockholder approval, issue preferred stock with voting, dividend, conversion, liquidation or other rights which could adversely affect the voting power and equity interest of the holders of common stock. Preferred stock, which could be issued with the right to more than one vote per share, could be utilized as a method of discouraging, delaying or preventing a change of control. The possible impact on takeover attempts could adversely affect the price of our common stock. Although we have no present intention to issue any additional shares of preferred stock or to create any new series of preferred stock, we may issue such shares in the future. Shares may be issued pursuant to our stock plans which may affect the market price of our common stock. We may issue stock upon the exercise of options or pursuant to stock grants covering an aggregate of 2,000,000 shares of common stock pursuant to our stock incentive plans, including options to purchase 1,783,000 shares subject to options which were outstanding on June 30, 2002. The exercise of these options and the sale of the underlying shares of common stock and the sale of stock issued pursuant to stock grants may have an adverse effect upon the price of our stock. Because we are subject to the "penny stock" rules, stockholders may have difficulty in selling our common stock. Our common stock is presently subject to the Securities and Exchange Commission's penny-stock regulations which impose additional sales practice requirements on broker-dealers who sell such securities to persons other than established customers and accredited investors (generally those with assets in excess of $1,000,000 or annual income exceeding $200,000, or $300,000 together with their spouse). For transactions covered by these rules, the broker-dealer must make a special suitability determination for the purchase of such securities and have received the purchaser's written consent to the transaction prior to the purchase. Additionally, for any transaction involving a penny stock, unless exempt, the rules require the delivery, prior to the transaction, of a risk disclosure document mandated by the Commission relating to the penny stock market. The broker-dealer must also disclose the commission payable to both the broker-dealer and the registered representative, current quotations for the securities and, if the broker-dealer is the sole market maker, the broker-dealer must disclose this fact and the broker-dealer's presumed control over the market. Finally, monthly statements must be sent disclosing recent price information for the penny stock held in the account and information on the limited market in penny stocks. Consequently, the "penny stock" rules may restrict the ability of broker-dealers to sell the our common stock and may negatively affect the ability of purchasers of the our common stock to sell such securities. 4 -------------------------------------------------------------------------------- There may be claims that a third party owns stock which is held by our chief executive officer. In connection with an agreement between Mr. Ben Y. Jamil and two financial consultants entered into prior to the reverse merger, the consultants or their designees were to purchase a 30% interest in five of our subsidiaries, and that 30% was to have been exchanged for 1,500,000 shares of series B preferred stock. Mr. Jamil has advised the consultants and their designees that, as a result of their failure to pay the consideration for the shares, the agreement is terminated and they have no interest in the series B preferred stock or the stock in the five subsidiaries. It is possible that the consultants or their designees may claim that they own the series B preferred stock or the stock in the five subsidiaries and we can give no assurance that their claim will not be upheld. Forward-Looking Statements Statements in this Form 10-KSB report may be "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995. Forward-looking statements include, but are not limited to, statements that express our intentions, beliefs, expectations, strategies, predictions or any other statements relating to our future activities or other future events or conditions. These statements are based on current expectations, estimates and projections about our business based, in part, on assumptions made by management. These statements are not guarantees of future performance and involve risks, uncertainties and assumptions that are difficult to predict. Therefore, actual outcomes and results may, and probably will, differ materially from what is expressed or forecasted in the forward-looking statements due to numerous factors, including those described above and those risks discussed from time to time in this Form 10-KSB report, including the risks described under "Risk Factors" and in other documents which we file with the Securities and Exchange Commission. In addition, such statements could be affected by risks and uncertainties related to our financial condition, factors which affect the security industry, market and customer acceptance, competition, government regulations and requirements and pricing, as well as general industry and market conditions and growth rates, and general economic conditions. Any forward-looking statements speak only as of the date on which they are made, and we do not undertake any obligation to update any forward-looking statement to reflect events or circumstances after the date of this Form 10-KSB. INDUSTRY OVERVIEW We design and assemble security products and market to military, law enforcement, security and corrections personnel, by providing specialized security services to multinational corporations and governmental agencies and by manufacturing and installing ballistic and blast protected armoring systems for commercial vehicles. Increasingly, governments, including the military, businesses and individuals have recognized the need for security products and services to protect them from the risks associated with terrorism, physical attacks, threats of violence, white-collar crime and fraud. 5 -------------------------------------------------------------------------------- The United States has been the target of several deadly terrorist attacks directed towards its citizens and facilities around the world. As a result, institutions, including the United States Department of Defense and other government agencies and multinational corporations are redefining strategies to protect against and combat terrorism. As a company in the security products industry, we market our products in two markets - the law enforcement security market and the specialized security services market. Law Enforcement Security Products Market. In response to an increased emphasis on safety and protection, the number of active police officers has increased significantly over the past several years. By 1999 there were more than 900,000 law enforcement personnel in the United States. We expect an increase in law enforcement personnel as a partial response to the September 11, 2001, attacks which, we believe, will lead to increased demand for security products and we are seeking to participate in this demand. Specialized Security Services Market. Corporations are increasingly contracting experienced private companies to handle all or a portion of their security services. Industry studies reflect a growth rate in the market for worldwide security services market at a rate of 8.0% annually from 1995 to 2000, and we believe that the market is continuing to grow. We believe that demand by multinational corporations and governmental agencies operating in developing nations for security services such as risk assessment, crisis management, guard force management, security force organization and executive protection is likely to increase as these entities continue to establish operations and manufacturing facilities in developed and developing countries. In addition, there are risks related to white-collar crime and fraud. Demand for corporate investigative services continues to grow as corporations react to the need to protect their assets against the growing threat of fraud, counterfeiting and piracy of intellectual property. GROWTH STRATEGY We believe that the following strengths are critical to our success as a provider of surveillance and security products, and security risk management services. Broad Portfolio of Products and Services. We believe that a broad range of products, strong branding, a consistently growing customer base, and an extensive distribution network is critical to our success as a provider of security products and services. We are able to offer across-the-board security consulting, services, equipment, and systems that enable us to provide comprehensive solutions to our customers' security needs. Many who contact us for answers to their security problems have neither the time nor the ability to research solutions. Our clients anticipate and appreciate a one-stop-source of expertise and product for a wide variety of categories that fall under the umbrella of "security." Our goal is to strengthen our capabilities as a single source provider of global security systems and services. Our international infrastructure enables us to assist government buyers and multinational corporate clients who are expanding their geographical spheres. Similarly, our visibility is being enhanced through the expansion of our product distribution network that in turn will expand our customer base. Strong and Recognized Brands. We believe that our brand names are recognized in our markets and that our market recognition, combined with what we believe is a high level of performance has contributed to our developing market positions in a number of the product categories in which we compete. Strong Client Base and Extensive Distribution Network. We have a broad, full-service network of approximately 300 sales representatives and international distributors to sell and service our equipment. Our products are currently sold to customers in 45 countries and we serve a client base representing governmental and non-governmental agencies as well as multinational corporations worldwide. We believe that the diversity of our clients' end markets, the continued globalization of our clients and the strength of our distribution relationships minimize our dependence on any particular product, market, or customer. 6 -------------------------------------------------------------------------------- We believe that the demand for both security and surveillance products, and security risk management services will continue to grow. We will address this growth by offering a comprehensive array of premium security risk management products and services. By establishing a critical mass of products and services and a broad base of customers, we believe that we have developed the capacity to perform multiple aspects of our clients' threat analyses and security provisions on a comprehensive basis. We will continue to seek to implement this growth strategy primarily through internal expansion of our existing businesses and through strategic acquisitions of businesses offering complementary services, markets, and customer bases. However, because of our financial condition and the low price of our stock, we may not be able to acquire any businesses or implement our growth strategy. The following elements define our growth strategy: Capitalize on Exposure to Military Programs. The events of September 11, 2001, are likely to result in additional spending by the Department of Defense. We expect several of our product categories may be positively affected. These include our remote track, view and hear technologies, and voice, phone, cellular and data interception. We are well positioned to participate in these programs. Expand Distribution Network and Product Offerings. We will continue to leverage our distribution network by expanding our range of branded law enforcement equipment by investing in the development of new and enhanced products, which complement our existing offerings. If we are able to develop a broader product line we believe that it will strengthen our relationships with distributors, and allow us to add additional quality distributors, enhancing our brand appeal with military, law enforcement and other end users. Capitalize on Increased Homeland Security Requirements. We believe that we are well positioned to provide products, services and specialized training essential to establishing a sustainable homeland security infrastructure. After the September 11, 2001 terrorist attacks on the United States, the U.S. government has created the Office of Homeland Security. Although this Office's mandate is still being finalized, a homeland security infrastructure will be developed. We believe that we are well equipped to provide products that additional military, law enforcement, security and corrections personnel require to combat terrorism and threats to our homeland. Increase Global Position in High Fright Areas. We expect to offer to service the heightened security concerns of governments, agencies and corporations in existing high fright areas and will seek to leverage our global expertise and reputation for providing security products and services in newly developing high fright areas. We target regions with economic and political instability as well as regions with increased regulation. We also grow the scope of our existing product and service offerings by servicing existing customers who expand geographically. Products and Services We distribute a wide range of specialized products and systems covering security, privacy, home and personal protection, confidential business communications, lie detection, cellular phone privacy, drug and bomb contraband detection, miniaturized covert audio and video surveillance and protection, digital, the Internet, global systems for mobile communications ("GSM"), personal communication systems ("PCS"), time division mobile access ("TDMA") and code division multiple access ("CDMA") satellite technologies and wireless communications. 7 -------------------------------------------------------------------------------- Products We offer the following products. - Covert audio and video logging systems to monitoremployees and household surveillance. - Scramblers, data and fax transmission systems to protect and secure communications. - Fax managers that log the activities of outgoing and incoming faxes. - Armored and bulletproof clothing and automobiles. - Counter-surveillance, wiretap detection and electronic counter-measures. - Night vision, electro-optic devices and infrared scopes and cameras. - Anti-hacking and secure remote computing to protect computer networks. - Bomb and weapons and other contraband detection for airport security, business, and home. - Personal Protection Products - Voice stress analyzers and lie detection to evaluate the honesty of employees or vendors - Tracking and recovery and fleet management systems - Cellular telephone tracking systems for 911 emergency programs. We develop and market integrated systems for the surveillance of global system for mobile communications and other communications. With the recent explosion in communication technologies, there are numerous fundamental systems underlying digital wireless communications throughout the world. Intelligence professionals require the ability to monitor, intercept and block various global systems for mobile communications, personal communication systems and other systems using a variety of communications access and monitoring systems. Our customers for our global systems for mobile communications usually request us to custom design a system to meet their communications surveillance requirements and are based on extensive engineering studies of the existing communications systems in each customer's country, along with an in-depth analysis of the various individual needs of the customer. We have an exclusive license for proprietary software we can modify for the specific purposes needed, along with the ability to install and train personnel for system management. Examples of our global systems for mobile communications intercept systems are the GSM 2060, a passive off-the-air intercept system which allows a user to target a specific cellular transmission and listen to both incoming and outgoing conversations and the GSM 4000, which was designed for an international west European security group and is a multi-channel monitoring system capable of intercepting various band transmissions simultaneously, while recording multiple conversations. In addition to our global system for mobile communications intercept systems, we have developed and we market cellular interception for operation on analog advanced mobile phone systems, digital advanced mobile phone system, and time division multiple access systems, as well as various other equipment for wireless and hard-wired communications surveillance for voice, fax and data. We are currently involved in the development of new tracking technology for fleet management. As we design new products based on our core technologies and enhance existing products with new functionalities and performance, many of the older systems, which can only be legally sold to government and law enforcement agencies, may become available to business and private purchasers. We offer a configurable emergency rescue, theft recovery, fleet management or freight management system. Our system uses the well-known global positioning system ("GPS") satellite tracking system which can combine with an optional sophisticated location prediction algorithm software package that takes over position reporting functions whenever the vehicle enters a dead satellite access zone. This unique and rugged system supplies real time position and status information from the customer's location to one of several possible call center configurations. The call center can track the location of a customer's vehicle and has features to report theft, breakdowns, and rescue requests. Optional configurations allow the end user to perform an analysis of driver's performance, manage public transportation lines routes, perform automated fleet and freight management for commercial trucking, and dispatch police, ambulance, and taxicabs. 8 -------------------------------------------------------------------------------- Services We offer comprehensive security training programs in counterintelligence and counter-surveillance in Miami, New York, Mexico, London and Hong Kong, and we intend to introduce such services in Beijing and Shanghai China as well as in Seoul, Korea. This training, offered to United States government agencies, friendly nations, and clients in the private sector in the United States and in foreign countries, includes methods of recognizing, deterring, and minimizing security risks. We have conducted seminars for intelligence personnel, crime fighting associations and their associated membership societies, from CIA to FBI to United States Customs, United States Coast Guard, military branches, police departments from New York City's strategic command to police chiefs from innumerable cities and towns across the country. We have scheduled a series of seminars to be held throughout the world during the first half of fiscal 2003. These seminars will provide opportunities for qualified and authorized buyers to learn about our basic global system for mobile communications technology and our proposed solutions to intercepting and monitoring these communications. We offer the design, integration, application analysis and technical support of sophisticated electronic and computer driven surveillance, monitoring, tracking and recovery and secure communication equipment. We offer site surveys and security solutions that include consultations and law enforcement training by experienced security personnel who act as advisors and instructors. Our consultants oversee in-country installations and train the client's personnel in the installation, use and maintenance of their security equipment. These clients are from the corporate world as well as governmental, public and private agencies. Marketing and Distribution We have a network of approximately 300 sales representatives and international distributors who sell and service our law enforcement equipment. Our distributors and we currently operate in a number of countries and serve a client base representing governmental and non-governmental agencies as well as multinational corporations worldwide. However, during the past year we have been in litigation with four of our distributors. See "Item 3. Legal Proceedings. When first entering a foreign market, we seek to promote a comprehensive range of products and services by seeking qualified sales representatives with local ties and existing relationships within the country's business and governmental communities. We try to tailor our marketing strategy to each geographic area of the world, and further to tailor our product offering by country. There are opportunities for cross marketing of military and law enforcement products, which strengthen the image of each product group and further enhance our position as an integrated provider of a wide selection of such products and services. We employ a variety of marketing programs in support of our reseller's channels to make our target markets aware of the value of our integrated systems and technology and to help create pre-sales demand for our resellers. These programs include trade shows; advertising campaigns, seminars, direct mailings, brochures and other promotional efforts designed to generate sales leads. Training programs are an integral part of our customer service. In addition to enhancing customer satisfaction, we believe that they also help breed customer loyalty and brand awareness, so that we may sell additional products to the same customer. We also use our website to generate brand awareness. Although we are focusing on clients in high growth industries where the need for investigation, brand protection and other security services are critical to success; we are also broadening our efforts to expand our end-user marketplace. We are developing an additional website designed to market an inexpensive line of security equipment that is not in competition with our recognized brand products. However, we cannot assure you that we will be successful in either developing the website or generating any significant sales through the website. 9 -------------------------------------------------------------------------------- Product Design and Installation Our engineering staff of design, mechanical and electronic engineers involved in both developing new systems made possible by the advances in technology and continually improving the production process and reducing the cost of the products. While the software being developed by engineers for our systems is based on proprietary technology, the components for such systems are often commercially available from third parties. As our customizing allows for outsourcing components, we have developed stable relationships with other manufacturers, cutting down the need for stockpiling of costly inventories, also reducing the hours and labor necessary for completing orders in a timely manner. Although our products come with operating instructions when applicable, installation tasks are performed for the more sophisticated global system for mobile communications systems. Installation phases may include site surveys, identification of central command site location, supervision of the installation of site interfaces, and training personnel to manage systems. We generally provide maintenance and support services for the first three to twelve months following installation of a system, depending on the terms of each particular contract. Thereafter, long-term service is provided on a service-contract basis. Global system for mobile communications systems currently under development will require differing levels of local, on-site installation. For example, one system is largely a mobile communications intelligence gatherer requiring only local training, while another might require construction of a central command center, intercepts towers and installation at remote sites. We do not install but we provide supervisory assistance for a field installation crew comprised of both employees and independent contractors, supplemented by local labor, for on-site construction and installation. We also provide training for use and maintenance of equipment, and subsequent hot-line assistance. We assemble our products from components that are readily available from a number of suppliers. We do not have any long-term supply contracts. Competition The security industry includes companies that offer a range of products and services, such as access control, personnel protection, surveillance, counter-surveillance, computer security, vehicular security, night vision, fiber optics and communications. In order to meet the needs of a prospective customer, we believe that it is necessary to offer integrated solutions across industry lines rather than to offer a range of devices. Although there are a large number of companies who offer products or services aimed at one or more segments of the security industry. However, we believe that as the severity of the problem or potential problem increases governments and major corporations, including financial institutions, are less concerned with the price of the products than with such factors as: - The perceived ability of the vendor to treat the identity of the client, the scope of the work and the solution in confidence. - The ability of the vendor to offer an integrated approach that seeks to address the problem by offering a wide range of products and services rather than to offer solutions based on a small range of products and services. - On the other hand, major clients are concerned about the financial condition of the vendor, and our financial condition, including our significant working capital deficiency and our history of losses, may raise questions as to our ability to perform under the purchase order and to provide the necessary support following delivery. Competitors may use our financial condition and their stronger financial condition, resources and relationships in marketing their products and services regardless of whether their products and services are better than ours. As discussed below, many of our competitors are substantially stronger than we are financially and are very well known in the industry and have significant government and industry contacts and relationships. 10 -------------------------------------------------------------------------------- We seek to address the competition in the industry by a three-tiered approach -- we offer a broad range of products and services, we offer what we believe are strong brands and we have a strong client base with an extensive distribution network. The marketplace for manufacturers and vendors for security and surveillance products and systems is highly competitive and consists of numerous organizations ranging from internet-based mail-order firms to former military armament manufacturers such as, Lockheed, Martin, Harris, and others. Other aerospace manufacturers have rushed into the arena of bomb detection and other Explosive Ordinance Disposal ("EOD") products. The security marketplace continues to favor the more established and reliable manufacturers such as Nice (Israel) and Thompson C.S.F. now a part of Thales Group (France) with proven technology, over newcomers with low cost innovations. Siemens (Germany), and Rohde & Schwartz (Germany), are manufacturers of "simulated" base stations. Currently there is growing competition in the cellular interception and monitoring systems market. Although many competitors have greater financial, technical and other resources, we believe that at present our technology gives us a competitive advantage. In all of these areas, the major corporations have the ability to develop competitive products and fund a marketing effort that enable them to compete successfully against us regardless of whether their products are superior. Research and Development Because of our financial condition our research and development effort has been limited to the development of certain new products and improvement of existing products. Because of our working capital limitations, we have not been able to expand our research and development effort. During the past two years we did not expend any significant amount on research and development activities. Intellectual Property Rights We have no patents or copyrights on our products, and we rely on non-disclosure agreements with our employees. Since our business is dependent upon our proprietary products, the unauthorized use or disclosure of this information could harm our business. We currently own a number of United States trademark registrations. Government Regulation The United States and other governments have strict regulations concerning the exporting and importing of certain security devices that may restrict sales of certain products to bona fide law enforcement agencies or may restrict the sale of products in or from the United States We are subject to federal licensing requirements with respect to the sale in foreign countries of certain of our products. In addition, we are obligated to comply with a variety of federal, state, local and foreign regulations that govern our operations and the workplace. We are also subject to certain regulations promulgated by, among others, the United States Departments of Commerce and State. 11 -------------------------------------------------------------------------------- Employees As of September 30, 2002, we had a total of approximately 51 employees, of which approximately 27 were employed at our main office and 24 were employed at our sales offices. None of our employees are represented by unions or covered by any collective bargaining agreements. We have not experienced any work stoppages or employee related slowdowns and believe our relationship with our employees is good. Item 2. PROPERTIES We lease approximately 9,840 square feet of executive offices and warehouse at 145 Hugeunot Street, New Rochelle, NY 10801 under a lease that expires on October 31, 2010. The annual rent is approximately $125,000, and is subject to annual increases. We also lease approximately 6,000 square feet for four of our sales offices and retail locations in Miami, Florida, New York City, Washington, DC and Beverly Hills, CA under leases that expire from 2003 to 2010 at a current annual rent of $456,000, subject to annual increases. We believe that our present facilities are adequate to meet our immediate requirements and that any additional space we may require will be available on reasonable terms. Item 3. LEGAL PROCEEDINGS Because of our financial position, actions have been commenced or threatened by creditors. On May 2, 2002, Menachem Cohen, vice president and a director, and two other employees of one of our subsidiaries were arrested pursuant to a criminal complaint filed in the United States District Court of the Southern District of Florida. The complaint alleges that such individuals violated federal law in that they intentionally manufactured, assembled, possessed or sold a device used for the surreptitious interception of electronic communications and that the device was sent through the mail or transmitted in intrastate or foreign commerce. On September 4, 2002, the United States District Court of the Southern District of Florida entered an order dismissing all charges against Menachem Cohen, vice president and director, and the two other employees of one of the Company's subsidiaries. We are also the defendant in four actions arising our of our distributor agreements. On or about May 11, 2000 an action was commenced against CCS in the Supreme Court, New York County, captioned Ergonomic Systems Philippines Inc. v. CCS International Ltd. The plaintiff seeks to recover $81,000, which was paid to CCS in connection with a distributorship agreement between the parties, plus costs and interest. CCS has denied the material allegations of the claim and has raised affirmative defenses thereto. We believe that we have valid defenses to the claim. On or about May 25, 2001, an action was commenced against CCS in the United States District Court for the Southern District of New York, captioned Shenzen Newtek v. CCS International Ltd. The plaintiff seeks to recover $91,500, which was paid to CCS in connection with a distributorship agreement between the parties, plus costs and interest. We have denied the material allegations of the plaintiff's claim and have raised affirmative defenses thereto. We have also asserted a counterclaim seeking damages of $500,000 based upon the plaintiff's alleged breach of the distributorship agreement. This action was settled between the parties on July 10, 2002. On or about October 12, 2001, an action was commenced against CCS in the United States District Court for the Southern District of New York, captioned China Bohai Group C. Ltd. and USA International Business Connections Corp. v. CS International, Ltd. The plaintiff seeks to recover $250,000 paid to CCS in connection with a distributorship agreement between the parties, plus $5,000,000 of punitive damages and costs and interest. CCS has denied the material allegations of the plaintiff's claim and has raised affirmative defenses thereto. CCS has asserted a counterclaim seeking damages in the approximate amount of $1,150,000 based upon the plaintiff's alleged breach of the parties' distributorship agreement. The Company believes that it has valid defenses to the claim. 12 -------------------------------------------------------------------------------- In June 2001, a former product distributor of CCS brought suit in Circuit Court, Palm Beach, Florida captioned Allan L. Dunterman, Jr. v. CCS International, Ltd. The plaintiff claims that CCS engaged in breach of contract, among other allegations. CCS has moved the complaint to the U. S. District Court for the Southern District of Florida, where it is pending. In its answer to the complaint, CCS has denied any wrongdoing and has asserted numerous affirmative defenses. The parties have exchanged initial written discovery. In June 1998, a photographer formerly retained by CCS filed suit in U. S. District Court for the Southern District of New York captioned Frank Ross and Julietta Vassilkioti v. CCS International, Ltd. The plaintiff is seeking damages for alleged copyright infringement. The judge in the case has granted the plaintiff partial summary judgment and a hearing to determine damages has not yet been scheduled. Under federal judicial rules, the Company is unable to contest the granting of partial summary judgment until a final judgment has been rendered. The Company believes that it has substantial defenses to the claim asserted in the lawsuit. Item 4. SUBMISSION OF MATTERS TO A VOTE OF SECURITYHOLDERS. Not applicable. PART II Item 5. MARKET FOR REGISTRANT'S COMMON EQUITY AND RELATED STOCKHOLDER MATTERS. Our common stock is traded on the OTC Bulletin Board under the symbol SITG. The following table sets forth the range of high and low bid quotations for our common stock from December 31, 2001, when trading in our stock commenced, until June 30, 2002, as reported by OTC Bulletin Board. On April 17, 2002, we acquired CCS, with the result that our business changed to the business of CCS, and the business conducted by us under the name Hipstyle.com, Inc. was discontinued. Accordingly, stock price information for periods prior to April 17, 2002 do not reflect our present business. The quotes represent inter-dealer prices without adjustment or mark-ups, markdowns or commissions and may not necessarily represent actual transactions. The trading volume of our securities fluctuates and may be limited during certain periods. As a result, the liquidity of an investment in the Company's securities may be adversely affected. Because of our stock price, our common stock is subject to the SEC's penny stock rules, which adversely affects the ability of persons to purchase or sell our stock. 13 -------------------------------------------------------------------------------- COMMON STOCK High Low Fiscal 2002 Quarter ended December 31, 2001 $0.35 $0.15 Quarter ended March 31, 2002 $2.55 $0.15 Quarter ended June 30, 2002 $2.05 $0.30 On September 30, 2002, the final quoted price by the OTC Bulletin Board was $.17 per share of common stock. As of September 30, 2002 there were 17,059,346 shares of Common Stock outstanding, held of record by approximately 210 record holders and beneficial owners. The following table sets forth information as to equity compensation plans pursuant to which we may issue our equity securities. Number of securities remaining available Weighted average for future issuance Number of securities to exercise price of under equity be issued upon outstanding compensation plans exercise of options, warrants (excluding outstanding options, and rights securities reflects warrants and rights (b) in columns (a)) (a) (c) ------------------------------------------------------------------------------------------------------------------------ Equity compensation plans approved by security holders -0- N.A. -0- ------------------------------------------------------------------------------------------------------------------------ Equity compensation plans not approved by security holders 3,400,000 $1.02 217,000 ------------------------------------------------------------------------------------------------------------------------ Total 3,400,000 $1.02 217,000 ------------------------------------------------------------------------------------------------------------------------ As of January 21, 2002, our board of directors adopted the 2002 Stock Plan, which provided for the grant of non-qualified stock options to purchase a maximum of 2,000,000 shares of common stock. The 2002 Plan provides for the grant of incentive stock options and nonqualified stock options to purchase shares of Common Stock, to directors, employees, officers, agents, consultants and independent contractors who perform services for the Company. Any incentive stock options which may be granted pursuant to this plan are subject to stockholder approval of the plan. As of the date of this annual report on Form 10-KSB, stockholder approval of the 2002 stock plan has not been obtained, and all options granted under the plan are non-qualified stock options. 14 -------------------------------------------------------------------------------- We granted a non-qualified stock option to Mr. Ben Jamil, chief executive officer and a director, to purchase 1,000,000 shares of common stock at $2.00 per share. Mr. Jamil's employment agreement is described under "Item 10. Executive Compensation." During the fiscal year ended June 30, 2002, we issued the following securities in transactions that were not registered pursuant to the Securities Act of 1933, as amended. (a) In April 2002, in connection with the acquisition of CCS, we issued the following securities: -- We issued an aggregate of 11,900,000 shares of common stock, 3,500,000 shares of series A preferred stock and 1,500,000 shares of series B preferred stock to the former stockholder of CCS, with each share of series A preferred stock and series B preferred stock being convertible into one share of common stock if the Company has either annual net revenue of $10,000,000 or net income of at least $1,000,000 prior to October 25, 2008, each share of series A preferred stock having 15 votes per share, and each share of series B preferred stock having no voting rights except as required by law. -- We granted options to purchase a total of 1,800,500 shares of common stock at exercise prices of $.50 to $1.00 per share. These shares were issued pursuant to the 2002 stock plan. -- We issued warrants to purchase a total 400,000 shares of common stock at an exercise price of $.50 per share to a consultant in connection with the reverse merger. -- We granted Ben Jamil a non-qualified stock option to purchase 1,000,000 shares of common stock at $2.00 per share pursuant to his employment agreement. -- We sold 75,000 shares of common stock to Michael Farkas, the beneficial owner of Atlas Equity Group Inc. ("ATLAS EQUITY"), a principal stockholder of the Company prior to the reverse merger for $75,000. These issuances were exempt from the registration requirements of the Securities Act pursuant to Section 4(2) of the Securities Act. No underwriting or other compensation was paid in connection with these transactions. (b) On April 25, 2002 we issued 17,346 shares of common stock to an accredited investor as full payment of trade payables in the amount of $25,297. This issuance was exempt from the registration requirements of the Securities Act pursuant to Section 4(2) of the Securities Act. No underwriting or other compensation was paid in connection with this transaction. (c) In May and June 2002, we issued 400,000 shares of common stock to an accredited investor for which the investor agreed to the cancellation of trade accounts payable in the amount of $322,953. In connection with the stock issuance, the investor agreed to hold the stock for one year, and if the sales proceeds were less than the amount of the trade payables that were cancelled, we would pay the investor the difference. These issuances were exempt from the registration requirements of the Securities Act pursuant to Section 4(2) of the Securities Act. No underwriting or other compensation was paid in connection with these transactions. Item 6. MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS GENERAL OVERVIEW. 15 -------------------------------------------------------------------------------- The following discussion should be read in conjunction with the financial statements and notes thereto of the Company. Such financial statements and information have been prepared to reflect the Company's financial position as of June 30, 2002. Historical results and trends should not be taken as indicative of future operations. Management's statements contained in this report that are not historical facts are forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. Actual results may differ materially from those included in the forward-looking statements. The Company intends such forward-looking statements to be covered by the safe harbor provisions for forward-looking statements contained in the Private Securities Litigation Reform Act of 1995, and is including this statement for purposes of complying with those safe harbor provisions. Forward-looking statements, which are based on certain assumptions and describe future plans, strategies and expectations of the Company, are generally identifiable by use of the words "believe," "expect," "intend," "anticipate," "estimate," "project," "prospects" or similar expressions. The Company's ability to predict results or the actual effect of future plans or strategies is inherently uncertain. RESULTS OF OPERATIONS - Year ended June 30, 2002 and year ended June 30, 2001 Revenues. Revenues for fiscal 2002 were $5,609,557 a decrease of $619,687 or 10.0%, from revenues of $6,229,244 in fiscal 2001. The decrease is primarily a consequence of a decrease in advertising and promotional expenditures and attendance at fewer international trade shows caused by limited resources. In addition, our financial condition and losses may have affected the willingness of customers to purchase products from us. Cost of Sales. Cost of sales decreased by $393,236 or 15.0%, to $2,230,969 in fiscal 2002 from $2,624,205 in fiscal 2001. Cost of sales as a percentage of product sales decreased to 44.5% in fiscal 2002 from 47.6% in fiscal 2001 reflecting an improvement in product mix. Compensation and benefits. Compensation and benefits increased by $ 238,896, or 12.0% to $2,236,191 in fiscal 2002 from $1,997,295 in fiscal 2001 reflecting increased expenditures to enhance the infrastructure of the Company by adding personnel to the marketing department and the sales department in anticipation of increased sales which did not materialize. We anticipate this trend of increased expenditures will continue in Fiscal 2003 as we add additional personnel to the sales department. Professional fees and legal settlements. Professional fees and legal settlements increased by $725,807, or 179.9% to $1,130,848 in fiscal 2002 from $405,041 in fiscal 2001 primarily due to (i) increased litigation, (ii) costs of $285,000 associated with defending criminal charges filed against our employees, including an officer and director, the related representation in a potential investigation by the United States Customs Service, and (iii) fees related to the reverse merger. The fees incurred in connection with the reverse merger and the criminal proceeding were one-time charges which we do not expect to be significant in fiscal 2003. However, because of our financial problems, it is possible that we will continue to incur significant litigation expenses arising from creditor actions. Selling, general and administrative expenses. Selling, general and administrative expenses increased by $648,178, or 43.5% to $2,139,123 in fiscal 2002 from $1,490,945 in fiscal 2001. The significant changes were (i) an increase in rent expense of $218,037, or 81.3% to $491,728 in fiscal 2002 from $268,158 in fiscal 2001 resulting from a non-recurring settlement of rent in fiscal 2001 of $203,840, (ii) an increase in insurance expense of $49,276, or 50.1% to $146,102 in fiscal 2002 from $96,826 in fiscal 2001, due to increased coverage and (iii) an increase in website and internet related costs of $41,525, or 287.6% to $55,963 in fiscal 2002 from $14,438 in fiscal 2001 expended to increase website sales and improve communications. Unrealized loss on derivatives. Unrealized loss on derivatives of $150,953 in fiscal 2002 is attributable to the decrease in market value relating to our price guarantees on common stock which we issued during fiscal 2002 in payment of trade payables. There were no similar transactions in fiscal 2001. 16 -------------------------------------------------------------------------------- Depreciation and amortization. Depreciation and amortization decreased by $2,607, or 3.0% to $84,774 in fiscal 2002 from $87,381 in fiscal 2001 primarily as a consequence of the certain assets becoming fully-depreciated in fiscal 2001. Interest expense. Interest expense increased by $13,654, or 26.4% to $65,358 in fiscal 2002 from $51,704 in fiscal 2001 as a result of a continued increase in the ordinary course of business of the Company's outstanding debt prior to the repayment of $200,000 of outstanding bank loan principal in the fourth quarter of fiscal 2002 Income tax benefit. The income tax benefits of $101,000 in fiscal 2001 and $29,000 in fiscal 2002 represent refundable taxes expected to be recovered through net operating loss carry-back claims, offset by current state income tax expense of $4,000 and $5,000 in fiscal 2002 and fiscal 2001, respectively. As a result of the forgoing, our net loss increased by $2,073,332, or 635.4% to $2,399,659, $.19 per share, in fiscal 2002 from $326,327, $.03 per share, in fiscal 2001 as a result of the factors described above. LIQUIDITY AND CAPITAL RESOURCES We require significant working capital to fund our future operations. At June 30, 2002 we had cash of $32,344 and a working capital deficit of $2,143,592. The aggregate amount of accounts payable and accrued expenses at June 30, 2002 was $2,030,866. As a result of our continuing losses, our working capital deficiency has increased. We funded our losses through loans from our chief executive officer. At June 30, 2002, we owed our chief executive officer $876,554, of which $457,554 was incurred during fiscal 2002. We also utilized vendor credit and customer deposits. Because we have not been able to pay our trade creditors in a timely manner, we have been subject to litigation and threats of litigation from our trade creditors and we have used common stock to satisfy our obligations to trade creditors. When we issue common stock, we have provided that if the stock does not reach a specified price level one year from issuance, we will pay the difference between that price level and the actual price. As a result, we have contingent obligations to our some of these creditors. With respect to 400,000 shares of common stock issued during fiscal 2002, the market value of the common stock on June 30, 2002 was approximately $150,953 less than the guaranteed price. Our accounts payable and accrued expenses increased from $615,584 at June 30, 2001 to $2,030,866 at June 30, 2002 reflecting our inability to pay creditors currently. We also had customer deposits and deferred revenue of $1,395,963 which relate to payments on orders which had not been filled at that date. We have used our advance payments to continue our operations. If our vendors do not extend us necessary credit we may not be able to fill current or new orders, which may affect the willingness of our clients to continue to place orders with us. We require substantial funds to support our operations. Since the completion of the merger we have sought, and been unsuccessful, in our efforts to obtain funding for our business. Because of our losses, we are not able to increase our borrowing. Our bank facility terminated on November 1, 2002. On November 1, 2002 we reduced the outstanding balance to $100,000 and began discussions with the lender to extend the terms or to convert the balance to a term loan. To date, we do not have an agreement with respect to an extension with our existing lender or an agreement to convert the $100,000 outstanding balance to a term loan, or any agreements with any replacement lender. Our failure to obtain either an extension of our credit facility, a conversion of the outstanding balance to a term loan, or a facility with another lender could materially impair our ability to continue in operation, and we cannot assure you that we will be able to obtain the necessary financing. Our main source of funds other than the bank facility has been from loans from our chief executive officer. Because of both our low stock price and our losses, we have not been able to raise funds through the sale of our equity securities. We may not be able to obtain any additional funding, and, if we are not able to raise funding, we may be unable to continue in business. Furthermore, if we are able to raise funding in the equity markets, our stockholders will suffer significant dilution and the issuance of securities may result in a change of control. The merger agreement relating to the reverse merger provided, as a condition to CCS' obligation to close, that we closed on a private sale from which the we realized proceeds of $1,000,000. This condition was not met at closing, and CCS completed the reverse merger without the Company having received any proceeds from a private placement. At the closing of the reverse merger, we entered into a stock pledge agreement with ATLAS EQUITY, a Florida corporation and principal stockholder of the Company, pursuant to which ATLAS EQUITY was to have pledged 1,500,000 shares of common stock. Atlas Equity never delivered the shares to be held pursuant to the pledge agreement. The pledge agreement stipulated the pledged shares were to be returned to ATLAS EQUITY if we sold shares of unregistered common stock sufficient to generate net cash proceeds of $925,000 to us prior to June 1, 2002, which date was subsequently extended to June 14, 2002. To date, ATLAS EQUITY has not delivered the shares to be pledged and we have not received any financing. These factors raise substantial doubt about the Company's ability to continue as a going concern. Management's plans with respect to these matters include its attempts to settle vendor payables wherever possible, a reduction in operating expenses, and financing from the chief executive officer in the absence of other sources of funds. Management cannot provide any assurance that its plans will be successful in alleviating its liquidity concerns and bringing the Company to the point of sustained profitability. The accompanying financial statements do not include any adjustments that might result from the outcome of these uncertainties. 17 -------------------------------------------------------------------------------- Item 7. FINANCIAL STATEMENTS The financial statements begin on Page F-1. Item 8. CHANGES IN AND DISAGREEMENT WITH ACCOUNTANTS ON ACCOUNTING AND FINANCIAL DISCLOSURE. On April 18, 2002, our board of directors dismissed Salibello & Broder LLP as our independent public accountants and selected Schneider & Associates LLP to serve as our independent public accountant for the fiscal year ending June 30, 2002. At no time since its engagement has Schneider & Associates LLP had any direct or indirect financial interest in or any connection with us or any of our subsidiaries other than as independent accountant. Our financial statements for the fiscal year ended June 30, 2001 were audited by Salibello & Broder LLP, whose report on such financial statements did not include any adverse opinion, or disclaimer of opinion, nor was the report qualified or modified as to audit scope or accounting principles. The report however was modified as to our ability to continue as a going concern. There were no disagreements with Salibello & Broder LLP on any matter of accounting principles or practices, financial statement disclosures, or auditing scope or procedures in connection with the audit for the fiscal year ended June 30, 2001 and financial statements filed on Form 10-QSB for subsequent interim periods preceding their dismissal on April 18, 2002 On December 8, 2000, Berenfeld, Spritzer, Shechter and Sheer, our independent public accountants resigned as our independent auditors and our board of directors selected Salibello & Broder LLP to serve as our independent public accountants for the fiscal year ending June 30, 2001. At no time since its engagement has Salibello & Broder LLP had any direct or indirect financial interest in us or any connection with any of our subsidiaries other than as independent accountant. Our financial statements for the fiscal year ended June 30, 2000 and for the period June 22, 1999 (inception) to June 30, 1999 were audited by Berenfeld, Spritzer, Shechter and Sheer whose report on such financial statements did not contain any adverse opinion, or disclaimer of opinion, nor was the report qualified or modified as to audit scope or accounting princilples. The report however was modified as to our ability to continue as a going concern. There were no disagreements with Berenfeld, Spritzer, Shechter and Sheer on any matter of accounting principles or practices, financial statement disclosures, or auditing scope or procedures in connection with the audit for the fiscal year ended June 30, 2000 and the period June 22, 1999 (inception) to June 30, 1999 and financial statements filed on Form 10-QSB for subsequent interim periods preceding their resignation on December 8, 2000. 18 -------------------------------------------------------------------------------- ITEM 9. DIRECTORS, EXECUTIVE OFFICERS, PROMOTERS AND CONTROL PERSONS; COMPLIANCE WITH SECTION 16(A) OF THE EXCHANGE ACT DIRECTORS, EXECUTIVE OFFICERS AND KEY PERSONNEL Set forth below is information concerning our directors and executive officers. Name Age Position ---------------------------- -------------- ---------------------------------------------- Ben Y. Jamil 69 Chairman of the board, chief executive officer and director Chris R. Decker 55 Chief financial officer and director Tom Felice 41 Vice president sales and director Manchem Cohen 50 Vice president and director Nomi Om 41 Vice president and director Sylvain Naar 61 Director Ben Y. Jamil has been chairman of the board, president, chief executive officer and a director of CCS since its organization in July 1992. He assumed such positions with us upon completion of the merger. Mr. Jamil has more than 40 years experience in government, military, law enforcement and business security, specializing in the design, and marketing of sophisticated, hi-tech systems for communication, voice and data privacy, surveillance and monitoring. Chris R. Decker, a certified public accountant, joined us in April 2002 and became chief financial officer in August 2002. Prior to that he was controller for Trumarkets LLC, a broker dealer, from June 1, 2001 until April 2002, an independent consultant from April 1999 until June 2001, was vice president corporate controller for County Seat Stores, Inc., a retailer of specialty apparel, from January 1998 until April 1999 and for three years prior thereto, was executive vice president, chief financial officer of All American Food Group, Inc. a franchising company in the specialty food sector. Tom Felice has been vice president and a director of CCS since October 2001. He assumed these positions with us upon completion of the merger, at which time he was also elected chief operating officer. He joined CCS at its inception as vice president of consumer sales. He took a leave of absence in November 2000 to consult for a family business and returned to CCS in October 2001. Menachem Cohen has been vice president for Latin American sales and a director of CCS since January 2002 and became our vice president and a director upon completion of the merger. He was a consultant to CCS from its inception in 1992 until 2002. Nomi Om has been vice president of international marketing for CCS since 1995 and a director since January 2002. She became our vice president and a director upon completion of the merger. Starting with CCS in 1992 as production manager, Ms. Om became director of special projects as a sales engineer, and in 1995 was appointed Vice President of International Marketing and Director of our Asian Market. 19 -------------------------------------------------------------------------------- Sylvain Naar has been a director of CCS since March 2002 and became one of our directors upon completion of the merger. From 1990 to February 2002, Mr. Naar was vice president for product and business development at Copytele, a developer of advanced flat panel displays and secure communication products. With over 30 years experience in telecommunications, Mr. Naar has held numerous executive positions at Hazeltine, Thomson, CSF, and Alcatel. ITEM 10. EXECUTIVE COMPENSATION Set forth below is information with respect to compensation paid or accrued by us for fiscal years ended June 30, 2002, 2001 and 2000 to our chief executive officer. No other officer received compensation of $100,000 during any of those fiscal years. SUMMARY COMPENSATION TABLE Long-Term Compensation (Adwards) Fiscal Options, SARs Name and Principal Position Year Salary Bonus (Number) ------------------------------- --------- ----------- ----------------------------------------- Ben Jamil, chief executive 2002 $143,223 $- 1,000,000 officer 2001 135,200 - 2000 135,200 - Employment Agreement In April 2002, in connection with the completion of the reverse merger, we entered into a three-year employment agreement with Ben Jamil pursuant to which Mr. Jamil agreed to serve as our president and chief executive officer. The agreement calls for an annual base compensation of $250,000 and may be increased on each anniversary date commencing May 1, 2003 by 10% if we achieve certain performance criteria. In addition to the base salary, Mr. Jamil is eligible to receive an annual discretionary bonus commencing June 30, 2003, at the sole discretion of the board of directors. Pursuant to the agreement, we granted Mr. Jamil a non-qualified stock option to purchase 1,000,000 shares of common stock at an exercise price of $2.00 per share. The option vests upon our attaining $10,000,000 of annual revenue and expires on April 17, 2007. Stock Options As of January 21, 2002, our board of directors adopted the 2002 Stock Plan, which provided for the grant of non-qualified stock options to purchase a maximum of 2,000,000 shares of common stock. The 2002 Plan provides for the grant of incentive stock options and nonqualified stock options to purchase shares of Common Stock, to directors, employees, officers, agents, consultants and independent contractors who perform services for the Company. Any incentive stock options which may be granted pursuant to this plan are subject to stockholder approval of the plan. As of the date of this annual report on Form 10-KSB, stockholder approval of the 2002 stock plan has not been obtained, and all options granted under the plan are non-qualified stock options. 20 -------------------------------------------------------------------------------- Option Exercises and Outstanding Options The following table sets forth information concerning the exercise of options during the fiscal year ended June 30, 2002 and the fiscal year-end value of options held by our chief executive officer, who is the only officer named in the summary compensation table. No stock appreciation rights have been granted. Aggregate Option Exercises in Last Fiscal Year and Fiscal Year-End Option Value Number of Securities Value of Underlying Unexercised Unexercised In-the-Money Options at Options at Fiscal Year Fiscal Year End End Shares Value Acquired Realized Exercisable/ Exercisable/ Upon Unexercisable Unexercisable Name Exercise Ben Jamil -- -- --/1,000,000 --/-- The following table sets forth information concerning options granted during the fiscal year ended June 30, 2002 to our chief executive officer. Option Grants in Fiscal Year Ended June 30, 2002 Percent of Potential Realizable Value Total an Annual Rates of Stock Number of Options Price Appreciation for Shares Granted to Option Term Underlying Employees Exercise -------------------------- Options in Fiscal Price Per Expiration Name Granted Year Share Date 5% 10% -------------------------------------------------------------------------------- Ben Jamil 1,000,000 100.0% $2.00 April 2007 $ * $ * * The potential realizable value is not included since the options are exercisable at $2.00 per share, which is in excess of the fair market value at the date of grant. These options were granted to Mr. Jamil pursuant to his employment agreement. 21 -------------------------------------------------------------------------------- ITEM 11. SECURITY OWNERSHIP OF CERTAIN BENEFICIAL OWNERS AND MANAGEMENT The following table and discussion provides information as to the shares of common stock benefically owned on September 30, 2002 by: - each director; - each officer named in the executive compensation table; - each person owning of record or known by us based on information provided to us by the persons named below, to own beneficially at least 5% of our common stock; and - all officers and directors as a group. Shares of Common Percentage of Stock Benefically Outstanding Name Owned Common Stock ---------------------------------- ------------------ -------------- Ben Jamil 11,900,000 68.7% 145 Huguenot Street New Rochelle, NY 10801 Michael Farkas 1,347,000 7.8% 1221 Brickell Avenue Miami, FL 33131 Chris R. Decker - - Menachem Cohen - - Tom Felice 250,000 1.4% Nomi Om - - Sylvain Naar - - All directors and officers as a 12,150,000 70.2% group (6 individuals) Except as otherwise indicated each person has the sole power to vote and dispose of all shares of common stock listed opposite his name. Stockholders are deemed to own shares of common stock issuable upon the exercise of options or upon conversion of convertible securities which are exercisable or convertible within 60 days of September 30, 2002. The shares beneficially owned by Michael Farkas represents 75,000 shares of common stock owned by him, 468,000 shares of common stock owned by Mr. Farkas' wife, Rebecca Farkas, as to which he disclaims beneficial ownership, and 804,000 shares of common stock owned by ATLAS EQUITY, which is beneficially owned by Mr. Farkas. ATLAS EQUITY agreed to pledge 1,500,000 shares of common stock, which shares are to be released to ATLAS EQUITY if we raise $925,000 by June 14, 2002. As of the date of this report, ATLAS EQUITY has not delivered the shares to be pledged and we have not received any financing. The shares beneficially owned by Mr. Felice represent shares of common stock issuable upon exercise of options held by him. 22 -------------------------------------------------------------------------------- In connection with an agreement between Mr. Ben Jamil and two financial consultants entered into prior to the reverse merger, the consultants or their designees were to purchase a 30% interest in five of our subsidiaries, and that 30% was to have been exchanged for 1,500,000 shares of series B preferred stock. Mr. Jamil has advised the consultants and their designees that, as a result of their failure to pay the consideration for the shares, the agreement is terminated and they have no interest in the series B preferred stock or the stock in the five subsidiaries. It is possible that the consultants or their designees may claim that they own the series B preferred stock or the stock in the five subsidiaries. Item 12. Certain Relationships and Related Transactions On April 17, 2002, pursuant to an agreement and plan of merger among us, CCS and our wholly-owned subsidiary, the subsidiary was merged into CCS, with the result that CCS became our wholly-owned subsidiary. As a result of the merger: - We issued an aggregate of 11,900,000 shares of common stock, 3,500,000 shares of series A preferred stock and 1,500,000 shares of series B preferred stock to the former stockholders of CCS, with each share of series A preferred stock and series B preferred stock being convertible into one share of common stock if the Company has either annual net revenue of $10,000,000 or net income of at least $1,000,000 prior to October 25, 2008, each share of series A preferred stock having 15 votes per share, and each share of series B preferred stock having no voting rights except as required by law. The series A and B preferred stock was issued to Mr. Ben Jamil. - Outstanding options and warrants to purchase a total of 1,800,500 shares of CCS' common stock were converted into options and warrants to purchase an equal number of shares of our common stock at exercise prices of $.50 to $1.00 per share. - Our officers and directors resigned. - Ben Y. Jamil, Menachem Cohen, Tom Felice and Nomi Om, who were officer of CCS prior to the merger, were elected as our directors and offices, and Sylvain Naar, who was a director of CCS, was elected as a director. - We entered into a three-year employment agreement with Mr. Jamil and granted him a non-qualified stock option to purchase 1,000,000 shares of common stock at $2.00 per share pursuant to the employment agreement. The terms of Mr. Jamil's employment agreement are described under "Item 10. Executive Compensation." Item 13. EXHIBITS AND REPORTS ON FORM 8-KSB (a) Reports on Form 8-KSB (1) Current Report on Form 8-K filed on April 24, 2002 with respect to Items 1 and 2. (2) Current Report on Form 8-K filed on May 6, 2002 with respect to Item 5. (3) Current Report on Form 8-K/A filed on July 1, 2002 with respect to Item 1, 2 and 7. (4) Current Report on Form 8-K filed on October 24, 2002 with respect to Item 4. (5) Current Report on Form 8-K filed on October 29, 2002 with respect to Item 4. (b) Exhibits Exhibit No. Description 2.1 Agreement and Plan of Merger dated as of February 28, 2002 among the Registrant, CCS International, Ltd., and CCS Merger Corp.(1) 3.1 Articles of incorporation (2) 3.2 Articles of Amendment to Articles of Incorporation 3.3 By-laws (2) 10.1 Employment Agreement, dated as of April 17, 2002, by and between the Registrant and Ben Jamil. (3) 10.2 Form of pledge Agreement, dated as of April 17, 2002, by and between the Registrant and ATLAS EQUITY (3) 10.3 2002 Stock Plan 10.4 Lease dated June 1, 2000 between Rotterdam Ventures, Inc. d/b/a Galesi Enterprises and the Registrant. 21.1 List of Subsidiaries (1) Filed as an exhibit to the Registrant's Form 8-K with a report date of February 28, 2002 and which was filed with the Commission on March 5, 2002, and incorporated herein by reference. (2) Filed as an exhibit to the Registrant's Form 10SB12G which was filed with the Commission on October 17, 2000, and incorporated herein by reference. (3) Filed as an exhibit to the Registrant's Form 8-K with a report date of April 17, 2002 and which was filed with the Commission on April 25, 2002, and incorporated herein by reference. 23 -------------------------------------------------------------------------------- INDEX TO FINANCIAL STATEMENTS Independent Auditors Report F - 1 Consolidated Balance Sheet June 30, 2002 F - 2 Statements of Operations for the years ended June 30, 2002 (consolidated basis) and June 30, 2001 (combined basis) F - 3 Statement of Stockholder's Deficit for the years ended June 30, 2002 (consolidated basis) and June 30, 2001 (combined basis) F - 4 Statements of Cash Flow for the years ended June 30, 2002 (consolidated basis) and June 30, 2001 (combined basis) F - 5 Notes to financial statements F - 6 - F - 23 24 -------------------------------------------------------------------------------- INDEPENDENT AUDITORS' REPORT To the Board of Directors and Stockholders Security Intelligence Technologies, Inc. We have audited the accompanying consolidated balance sheet of Security Intelligence Technologies, Inc. and subsidiaries as of June 30, 2002, and the related statements of operations, changes in stockholders' deficit and cash flows for the years ended June 30, 2002 (consolidated basis) and June 30, 2001 (combined basis). These financial statements are the responsibility of the Company's management. Our responsibility is to express an opinion on these financial statements based on our audits. We conducted our audits in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan and perform the audits to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used and significant estimates made by management, as well as evaluating the overall financial statement presentation. We believe that our audits provide a reasonable basis for our opinion. In our opinion, the financial statements referred to above present fairly, in all material respects, the consolidated financial position of Security Intelligence Technologies, Inc. and subsidiaries as of June 30, 2002, and the results of their operations and their cash flows for the years ended June 30, 2002 (consolidated basis) and June 30, 2001 (combined basis) in conformity with accounting principles generally accepted in the United States of America. The accompanying financial statements have been prepared assuming that the Company will continue as a going concern. As more fully described in Note1, the Company has incurred operating losses in fiscal 2002 and 2001, negative cash flows from operations, and has limited cash and other resources to fund future operations. In addition, the Company is involved in material litigation, the costs of which have significantly impacted liquidity. Management's plans concerning these matters are also discussed in Note 1. The financial statements do not include any adjustments that might result from the outcome of these uncertainties. Jericho, New York October 17, 2002 F-1 SECURITY INTELLIGENCE TECHNOLOGIES, INC. CONSOLIDATED BALANCE SHEET June 30, 2002 ASSETS Current Assets: Cash $32,344 Inventory 2,190,187 Other current assets 185,515 ----------- Total current assets 2,408,046 Property and Equipment, at cost less accumulated depreciation and amortization of $390,938 227,113 Other assets 47,733 ----------- Total assets $2,682,892 =========== LIABILITIES AND STOCKHOLDER'S DEFICIT Current liabilities: Note payable - bank $200,000 Accounts payable and accrued expenses 2,030,866 Note payable - CEO/stockholder 876,554 Customer deposits 1,049,772 Deferred revenue 346,191 Deferred rent payable 48,255 ----------- Total current liabilities 4,551,638 ----------- Commitments and contingencies - See Notes Stockholders' deficit: Preferred stock, $.0001 par value, 10,000,000 shares authorized: Series A Convertible-$1.00 per share liquidation preference, 3,500,000 sharesauthorized, issued and outstanding 350 Series B Convertible-$1.00 liquidation preference, 1,500,000 shares 1,500,000 shares authorized, issued and outstanding 150 Common stock, $.0001 par value, 100,000,000 shares authorized, 16,992,346 issued and outstanding 1,699 Additional paid in capital 418,417 Accumulated deficit (2,289,362) ----------- Total stockholders' deficit (1,868,746) ----------- Total liabilities and stockholders' deficit $2,682,892 =========== The accompanying notes are an integral part of these financial statements. F-2 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES STATEMENTS OF OPERATIONS Year Ended -------------------------- June 30, -------------------------- 2002 2001 -------------- ----------- (Consolidated) (Combined) Sales $5,609,557 $6,229,244 -------------- ----------- Costs and expenses: Cost of sales 2,230,969 2,624,205 Compensation and benefits 2,236,191 1,997,295 Professional fees and legal settlements 1,130,848 405,041 Selling, general and administrative expenses 2,139,123 1,490,945 Unrealized loss on derivatives 150,953 - Depreciation and amortization 84,774 87,381 -------------- ----------- 7,972,858 6,604,867 -------------- ----------- Operating loss (2,363,301) (375,623) Interest expense 65,358 51,704 -------------- ----------- Loss before income tax benefit (2,428,659) (427,327) Income tax benefit (29,000) (101,000) -------------- ----------- Net loss $(2,399,659) $(326,327) ============== =========== Loss per share, basic and diluted $(0.19) $(0.03) ============== =========== Weighted average number of shares 12,896,403 11,900,000 ============== =========== The accompanying notes are an integral part of these financial statements. F-3 -------------------------------------------------------------------------------- Security Intelligence Technologies, Inc. and Subsidiaries Statement of Changes in Stockholders' Deficit Years Ended June 30, 2002 and 2001 Retained Convertible Preferred Additional Earnings Total Series A Series B Common Stock Paid-in (Accumulated Stockholders' Shares Amount Shares Amount Shares Amount Capital Deficit) Deficit -------------------------------------------------------------------------------------------- Balances, July 1, 2000 - $- - $- 5,100 $5,100 - $436,624 $441,724 Net loss - - - - - - - (326,327) (326,327) -------------------------------------------------------------------------------------------- Balances, June 30, 2001 (combined) - - - - 5,100 5,100 - 110,297 115,397 Issuance of preferred stock to CEO/stockholder in exchange for common stock of affiliated companies 3,500,000 350 1,500,000 150 (4,100)(4,100) 3,600 - - 11,900 for 1 forward common stock split and change in par value to $.0001 per share - - - - 11,899,000 190 (190) - - Sale of common stock - - - - 75,000 7 74,993 - 75,000 Issuance of common stock to settle debt - - - - 417,346 42 348,248 348,290 Issuance of common stock and elimination of accumulated deficit of legal acquirer in reverse merger - - - - 4,600,000 460 (44,814) - (44,354) Amortization of deferred compensation - - - - - - 36,580 - 36,580 Net loss - - - - - - - (2,399,659) (2,399,659) -------------------------------------------------------------------------------------------- Balances, June 30, 2002 (consolidated) 3,500,000 $350 1,500,000 $150 16,992,346 $1,699 $418,417 $(2,289,362) $(1,868,746) ============================================================================================ The accompanying notes are an integral part of these financial statements. F-4 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES STATEMENTS OF CASH FLOWS Year Ended ------------------------- June 30, ------------------------- 2002 2001 -------------- ---------- (Consolidated) (Combined) CASH FLOWS FROM OPERATING ACTIVITIES: Net loss $(2,399,659) $(326,327) Adjustments to reconcile net loss to net cash used in operating activities: Depreciation and amortization 84,774 87,381 Unrealized loss on derivatives 150,953 - Amortization of deferred compensation 36,580 - CHANGES IN OPERATING ASSETS AND LIABILITIES: (Increase) in inventory (190,751) (109,411) (Increase) in other current assets (70,127) (95,811) Increase (decrease) in accounts payable and accrued expenses 1,568,265 (587,135) Increase in customer deposits 754,275 295,497 (Decrease) increase in deferred revenue (258,673) 505,509 Increase in deferred rent payable 18,597 29,658 -------------- ---------- Net cash used in operating activities (305,766) (200,639) -------------- ---------- CASH FLOWS FROM INVESTING ACTIVITIES: Purchase of property and equipment (2,166) (26,393) (Increase) in other assets (10,500) (22) -------------- ---------- Net cash used in investing activities (12,666) (26,415) -------------- ---------- CASH FLOWS FROM FINANCING ACTIVITIES: Proceeds from issuance of common stock 75,000 - Borrowings under note payable - bank - 300,000 Repayments of note payable - bank (200,000) - Borrowings under note payable - CEO/stockholder 607,554 - Repayments of note payable - CEO/stockholder (150,000) (90,224) -------------- ---------- Net cash provided by financing activities 332,554 209,776 -------------- ---------- Net increase (decrease) in cash 14,122 (17,278) Cash, beginning of year 18,222 35,500 -------------- ---------- Cash, end of year $32,344 $18,222 ============== ========== The accompanying notes are an integral part of these financial statements. F - 5 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2002 AND 2001 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES Organization and Nature of Business CCS International, Ltd. and its wholly-owned subsidiaries ("CCS") are engaged in the design, manufacture and sale of security and surveillance products and systems. CCS is a Delaware corporation, organized in 1992. The Company purchases finished items for resale from independent manufacturers, and also assembles off-the-shelf electronic devices and other components into proprietary products and systems at its own facilities. The Company generally sells to businesses, distributors, government agencies and consumers through four retail outlets located in Miami, Florida; Beverly Hills, California; Washington, DC; and New York City, and from its showroom in New Rochelle, New York. On April 17, 2002, CCS merged with Security Intelligence Technologies, Inc., a Florida corporation ("SIT") (collectively the "Company") and became a wholly owned subsidiary of SIT. The merger has been accounted for as a reverse acquisition, since the management and stockholder of CCS obtained control of the merged entity after the transaction was completed (See Note 6). Under reverse acquisition accounting, CCS is considered the accounting acquirer and SIT is considered the accounting acquiree. Inasmuch as SIT had no substantive assets or operations at the date of the transaction, the merger has been recorded as an issuance of CCS stock to acquire SIT, accompanied by a recapitalization, rather than as a business combination. Principles of Consolidation and Basis of Financial Statement Presentation Prior to January 31, 2002, the Company's CEO, Ben Jamil owned all of the outstanding stock of CCS International, Ltd. and five other affiliated companies comprising CCS. Accordingly, the accompanying financial statements for the year ended June 30, 2001 have been presented on a combined basis and include the accounts of CCS International, Ltd., and the following Affiliated Companies: Spy Shop, Ltd. d/b/a Counter Spy Shop of Delaware, a Delaware corporation (retail store); Security Design Group, Inc., a New York corporation (formerly a manufacturing operation, currently inactive); Counter Spy Shop of Mayfair London, Ltd., a District of Columbia corporation (retail store); CCS Counter Spy Shop of Mayfair London, Ltd., a California corporation (retail store); and Counter Spy Shop of Mayfair, Ltd., a Florida corporation (retail store). During fiscal 2002, CCS recapitalized and became a consolidated group (see Note 6). Accordingly, the financial statements for the year ended June 30, 2002 have been presented on a consolidated basis. The accounts and operations of SIT are included from the merger date (April 17, 2002) only. The financial statements of the Company have been prepared assuming the Company will continue as a going concern, which contemplates the realization of assets and the satisfaction of liabilities in the normal course of business. The Company incurred net losses of $2,399,659 and $326,327 for the years ended June 30, 2002 and F-6 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2002 AND 2001 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES - Continued Principles of Consolidation and Basis of Financial Statement Presentation - Continued June 30, 2001 respectively. In addition, at June 30, 2002, the Company had a working capital deficit of $2,143,592 and a deficiency in stockholders' equity of $1,868,746. The Company is also a defendant in material and costly litigation, which has significantly impacted liquidity. See Note 14. The Company requires additional financing which may not be readily available. These factors raise substantial doubt about the Company's ability to continue as a going concern. Management's plans with respect to these matters include its attempts to settle vendor payables wherever possible, a reduction in operating expenses, and financing from the chief executive officer in the absence of other sources of funds. Management cannot provide any assurance that its plans will be successful in alleviating its liquidity concerns and bringing the Company to the point of sustained profitability. The accompanying financial statements do not include any adjustments that might result from the outcome of these uncertainties. Use of estimates The preparation of financial statements in conformity with accounting principles generally accepted in the United States requires management to make estimates and assumptions that affect the reported amounts of assets and liabilities and disclosure of contingent assets and liabilities at the date of the combined financial statements, and the reported amounts of revenue and expenses during the reporting periods. Actual results could differ from those estimates. Inventories Inventories are valued at the lower of cost (first-in, first-out) or market. Property and equipment Assets are stated at cost. Depreciation is computed over the estimated useful life of the assets generally using the straight-line method over periods ranging from five to seven years. Additions and major renewals and betterments are capitalized and depreciated over their estimated useful lives. Repairs and maintenance are charged to operating expenses as incurred. Long-lived assets The Company records impairment losses on long-lived assets used in operations when events and circumstances indicate that the assets may be impaired and the undiscounted cash flows estimated to be generated by those assets are less than their carrying amounts. F-7 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2002 AND 2001 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES - Continued Revenue recognition The Company recognizes revenue from store sales upon the delivery of merchandise to a customer. Non-refundable advance payments received under marketing and distribution arrangements are deferred and either applied as payments towards customer purchases made pursuant to the terms of the respective agreements, recognized as income at the termination of the agreement if specified purchase quotas have not been met by the customer. Customer deposits are initially recorded as liabilities and recognized as revenue when the related goods are shipped. Stock Based Compensation The Company accounts for stock-based compensation in accordance with APB Opinion No. 25, "Accounting for Stock Issued to Employees" and FASB Interpretation 44, "Accounting for Certain Transactions Involving Stock Compensation". Pursuant to these accounting standards, the Company records deferred compensation for stock options granted to employees at the date of grant based on the difference between the exercise price of the options and the market value of the underlying shares at that date. Deferred compensation is amortized to compensation expense over the vesting period of the underlying options. No compensation expense is recorded for fixed stock options that are granted to employees and directors at an exercise price equal to the fair market value of the common stock on the date of the grant. Employee stock options exchanged in the reverse merger are subject to variable accounting pursuant to the provisions of EITF Issue 00-23, Issue No.1 because the exchange resulted in an increase in intrinsic value. For variable stock options, compensation expenses are recognized over the vesting period based on the difference, if any, between the quoted market price of the Company's stock on the last trading day of each reporting period and the exercise price of the option. Variable accounting will continue until the date of exercise, forfeiture or expiration. Stock options and warrants granted to non-employees are recorded at their fair value, as determined in accordance with SFAS No. 123 and Emerging Issues Task Force Consensus No. 96-18, and recognized over the related service period. Deferred charges for options and warrants granted to non-employees are periodically re-measured until the options vest. Income taxes The Company uses the liability method to determine its income tax expense. Under this method, deferred tax assets and liabilities are computed based on differences between financial reporting and tax basis of assets and liabilities and are measured using the enacted rates and laws that will be in effect when the differences are expected to reverse. Deferred tax assets are reduced by a valuation allowance if, based on the weight of the available evidence, it is more likely than not that all or some portion of the deferred tax assets will not be realized. The ultimate realization of the deferred tax asset depends on the Company's ability to generate sufficient taxable income in the future. F-8 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2002 AND 2001 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES - Continued Advertising Advertising costs are expensed as incurred. The Company incurred advertising expenses of approximately $341,000 and $430,000 during the years ended June 30, 2002 and 2001 respectively. Derivatives Certain shares issued by the Company to settle debt obligations contain a price guarantee that requires the Company to settle in cash any difference between the original face amount of the debt and proceeds from the creditor's subsequent sale of the shares. The Company accounts for these transactions by recording the debt at fair value with periodic mark-to-market adjustments until the guarantee is settled. Unrealized gains or losses resulting from changes in fair value are included in earnings and accrued expenses. Fair Value of Financial Instruments The fair values of financial instruments recorded on the balance sheet are not significantly different from their carrying amounts due to the short-term nature of those instruments, or because they are accounted for at fair value. New accounting pronouncements In July 2001, the Financial Accounting Standards Board issued Statements No. 141, "Business Combinations" ("FAS No. 141") and No.142 "Goodwill and Other Intangible Assets" ("FAS No. 142"). FAS No. 141 supersedes APB Opinion No. 16, "Business Combinations" and FAS Statement No. 38, "Accounting for Pre-acquisition Contingencies of Purchased Enterprises". SFAS 141 is effective for fiscal years beginning after June 30, 2001 and requires that all business combinations be accounted for by a single method, the purchase method. SFAS 142 supersedes APB Opinion No. 17, "Intangible Assets". SFAS 142, is effective for fiscal years beginning after December 15, 2001 and provides that all existing and newly acquired goodwill and intangible assets with indefinite lives will no longer be amortized but will be tested for impairment annually and written down only when impaired. The adoption of these pronouncements is not expected to have a material impact on the Company's financial position or results of operations. In August 2001, the Financial Accounting Standards Board ("FASB") issued FAS No.143, "Accounting for Asset Retirement Obligations." This statement addresses financial accounting and reporting for obligations associated with the retirement of tangible long-lived assets and the associated asset retirement costs. It applies to all entities and legal obligations associated with the retirement of long-lived assets that result from the acquisition, construction, development and/or normal operation of long-lived assets, except for certain obligations of lessees. This statement is effective for financial statements issued for fiscal years beginning after June 15, 2002. The Company does not expect the adoption of SFAS 143 to have a material impact on its financial statements. F-9 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2002 AND 2001 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES - Continued New accounting pronouncements - continued In August 2001, the FASB issued FAS No. 144, "Accounting for the Impairment or Disposal of Long-Lived Assets." FAS No.144 addresses financial accounting and reporting for the impairment or disposal of long-lived assets. FAS No. 144 supersedes FAS No. 121, "Accounting for the Impairment of Long-Lived Assets," and the accounting and reporting provisions of APB Opinion No. 30, "Reporting the Results of Operations--Reporting the Effects of Disposal of a Segment of a Business, and Extraordinary, Unusual and Infrequently Occurring Events and Transactions," for the disposal of a segment of a business (as previously defined in that Opinion). The provisions of FAS No. 144 are effective for financial statements issued for fiscal years beginning after December 15, 2001, with early application encouraged and generally are to be applied prospectively. The Company does not expect the adoption of SFAS 143 to have a material impact on its financial statements. In April 2002, the FASB issued SFAS No. 145, "Rescission of SFAS No. 4, 44 and 64, Amendment of SFAS Statement No. 13, and Technical Corrections." This statement rescinds the following statement of SFAS 4, "Reporting Gains and Losses from Extinguishment of Debt," and its amendment SFAS No. 64, "Extinguishments of Debt Made to Satisfy Sinking Fund Requirements," as well as, SFAS No. 44, "Accounting for Intangible Assets of Motor Carriers." The statement also amends SFAS No. 13, "Accounting for Leases", by eliminating an inconsistency between the required accounting for sale-leaseback transactions and the required accounting for certain lease modifications that have economic effects that are similar to sale leaseback transactions. SFAS No. 145 is effective for fiscal years beginning after May 15, 2002. The Company does not expect the adoption of SFAS 145 to have a material impact on its financial statements. In June 2002, the FASB issued SFAS 146, "Accounting for Cost Associated with Exit or Disposal Activities". SFAS 146 requires companies to recognize costs associated with exit or disposal activities when they are incurred rather than at the date of a commitment to an exit or disposal plan. This statement supercedes the guidance provided by Emerging Issues Task Force 94-3, "Liability Recognition for Certain Employee Termination Benefits and Other Costs to Exit an Activity (including Certain Costs Incurred in a Restructuring)". SFAS 146 is required to be adopted for exit or disposal activities initiated after December 31, 2002. The Company does not expect the adoption of SFAS 146 to have a material impact on its financial statements. Concentration of credit risk Financial instruments that potentially subject the Company to concentrations of credit risk consist principally of cash balances. The Company limits the amount of credit exposure to any one financial institution. The Company generally does not grant credit to domestic or foreign customers. Research and development costs Research and development costs are charged to expense as incurred. F-10 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2002 AND 2001 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES - Continued: Earnings (Loss) Per Share The Company calculates earnings per share in accordance with SFAS No. 128, Earnings Per Share, and SEC Staff Accounting Bulletin No. 98. Accordingly, basic loss per share is computed using the weighted average number of shares of common stock outstanding and diluted loss per share is computed based on the weighted average number of shares of common stock and all dilutive common stock equivalents outstanding during the period. Common stock equivalents consist of shares issuable upon the exercise of stock options and warrants using the treasury stock method. Stock options and preferred stock that are convertible into common stock based on the Company's attainment of performance goals are not includible in the calculation of earnings per share until the specified targets are met. The following securities have been excluded from the diluted computation for fiscal 2002 because they are contingently issuable and/or antidilutive: Series A Convertible Preferred Stock 3,500,000 Series B Convertible Preferred Stock 1,500,000 Stock options 1,783,000 Warrants 400,000 The calculation of earnings per share for the year ended June 30, 2001 gives retroactive effect to the recapitalization and forward stock split described in Note 6. Reclassifications Certain reclassifications have been made to the prior year financial statements in order to conform to the current year presentation. 2. INVENTORY Inventories consist of the following at June 30, 2002: Small components and supplies $424,594 Finished goods 1,800,354 ----------- $2,224,948 =========== F-11 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2002 AND 2001 3. PROPERTY AND EQUIPMENT Property and equipment consists of the following at June 30, 2002: Office furniture and equipment $206,973 Leasehold improvements 411,078 --------- 618,051 Accumulated depreciation and amortization (390,938) --------- $227,113 ========= Depreciation and amortization expense was $84,774 and $87,381 for the years ended June 30, 2002 and 2001, respectively. 4. NOTE PAYABLE - BANK Prior to June 1, 2002, the Company had a bank credit agreement pursuant to which it could borrow up to $400,000 with interest at the bank's price plus 1%. On June 1, 2002, the available credit was reduced to $200,000 and the interest rate was increased to the bank's prime rate plus 2.5%. The Note is secured by substantially all of the assets of the Company, and personal assets and a guaranty of the chief executive officer. The bank also requires the Company to maintain average monthly compensating balances of $60,000 and will assess additional interest at the prime rate plus 2.5% (7.25% at June 30, 2002) on any shortfall. The credit facility expires on November 1, 2002, when all unpaid principal and interest shall be due in full. Management cannot provide assurance that the line of credit will be renewed or that, if necessary, it will be able to replace the line with alternative financing on similar terms. 5. NOTE PAYABLE - CEO/Stockholder This amount represents an unsecured note payable to the Company's chief executive officer and bears interest at the rate of 5% per annum. The note is subject to a bank subordination agreement which requires the note to remain at a balance of at least $569,000 until all bank obligations have been paid in full. The loan balance requirement was temporarily reduced by the bank to $419,000 for the period from June 30, 2001 to December 31, 2001. 6. STOCKHOLDERS' EQUITY; REVERSE MERGER Corporate recapitalization and reorganization On February 28, 2002. CCS completed a recapitalization and entered into an agreement of merger with a publicly- F-12 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2002 AND 2001 6. STOCKHOLDERS' EQUITY; REVERSE MERGER (continued) Corporate recapitalization and reorganization (continued) traded company, as described below. Effective February 28, 2002, CCS amended and restated its certificate of incorporation, increasing the number of authorized shares of common stock from 1,500 shares, no par value to 50,000,000 shares, par value $.0001 per share, and created a class of 10,000,000 shares of preferred stock, par value $.0001 per share. CCS directors have the right to determine the rights, preferences and privileges and restrictions and limitations of the preferred shares. The board of directors has authorized two series of preferred stock, the Series A Preferred stock, consisting of 3,500,000 shares, and the Series B Preferred stock, consisting of 1,500,000 shares. Both Series A and Series B preferred shares have a liquidation preference of $1.00 per share and are each convertible into one share of common stock if CCS has either consolidated annual net revenue of at least $10,000,000 or annual consolidated net income of at least $1,000,000 prior to October 15, 2008. Each share of Series A Preferred stock has 15 votes per share; Series B Preferred stock is nonvoting except as required by law. On February 28, 2002, pursuant to an Exchange Agreement dated February 25, 2002, Mr. Jamil exchanged all of his shares in the Affiliated Companies for 3,500,000 shares of CCS Series A Preferred stock and 1,500,000 shares of CCS Series B Preferred stock. See Note 15 with respect to a potential claim relating to the shares of Series B Preferred Stock that were issued to Mr. Jamil. Also on February 28, 2002, the CCS Board of Directors approved an 11,900 for 1 forward stock split of common stock. Reverse Merger As of February 28, 2002, CCS, SIT (then known as HipStyle.Com, Inc.), a Florida corporation, and CCS Acquisition Co., a Delaware corporation ("MergerSub"), entered into an Agreement and Plan of Merger, as amended (the "Merger Agreement"), pursuant to which on April 17, 2002 (the "Effective Date"), MergerSub was merged with and into CCS, and CCS became a wholly-owned subsidiary of SIT. Pursuant to the merger, on the Effective Date, Mr. Jamil, as holder of 3,500,000 shares of Series A Preferred stock, 1,500,000 shares of Series B Preferred stock and 11,900,000 shares of CCS common stock, received an equal number of SIT shares, respectively. In addition, outstanding CCS options to purchase 1,800,500 shares of common stock and warrants to purchase 400,000 shares of common stock were exchanged for similar SIT securities. Further, the existing board of directors and officers of SIT resigned and were replaced by the board of directors and officers of CCS. Following the merger, Mr. Jamil owned approximately 72% of the 16,575,000 shares of SIT common stock then outstanding, and 100% of the outstanding shares of Series A and Series B Preferred Stock. The merger transaction has been accounted for as a reverse acquisition, since the management and stockholder of CCS obtained control of the merged entity after the transaction was completed. Inasmuch as SIT had no substantive assets or operations at the date of the transaction, the merger has been recorded as an issuance of CCS stock to acquire SIT, accompanied by a recapitalization, rather than as a business combination. F-13 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2002 AND 2001 7. STOCK OPTIONS 2002 Stock Option Plan As of January 21, 2002, the board of directors of the Company adopted the 2002 Stock Plan, which provided for the grant of incentive and non-qualified stock options to purchase a maximum of 2,000,000 shares of common stock to directors, employees, officers, agents, consultants and independent contractors who perform services for the Company. In connection with the reverse merger outstanding options to purchase a total of 1,800,500 shares of CCS' common stock were converted into options to purchase an equal number of shares of the Company's common stock at an exercise price of $.50 to $1.00 per share, which was the same exercise price as the options under the CCS plan. A summary of changes in common stock options during fiscal 2002 and 2001 follows: Number of Weighted Average Exercisable Shares Exercise Price Shares ----------- ----------------- ----------- Outstanding at June 30, 2000 - $- Granted - Cancelled - Exercised - ----------- Outstanding at June 30, 2001 - - Granted 1,850,500 $0.60 Cancelled (67,500) $1.18 Exercised - - ----------- Outstanding at June 30, 2002 1,783,000 755,000 =========== =========== FASB Statement 123, "Accounting for Stock-Based Compensation," requires the Company to provide pro forma information regarding net income (loss) and income (loss) per share as if compensation cost for the Company's stock option issuances had been determined in accordance with the fair value based method prescribed in FASB Statement 123. The Company estimates the fair value of each stock option at the grant date by using the Black-Scholes option-pricing model with the following weighted-average assumptions used for grants in fiscal 2002: dividend yield of 0%, risk-free interest rate of 3.38%, expected lives of eight years, and expected volatility of 120%. Under the accounting provisions of SFAS Statement 123, the Company's net loss and loss per share for 2002 and 2001 would have been the pro forma amounts indicated below: F-14 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2002 AND 2001 7. STOCK OPTIONS (continued) 2002 Stock Option Plan (continued) Year Ended June 30, ------------------------ 2002 2001 ------------ ----------- Net (loss): As reported $(2,399,659) $(326,327) FAS 123 effect (510,443) - ------------ ----------- Proforma net loss $(2,910,102) $(326,327) ============ =========== (Loss) per share: As reported $(0.19) $(0.03) Proforma $(0.23) $(0.03) Basis and diluted weighted average number of shares outstanding 12,896,403 11,900,000 ============ =========== The following table summarizes information about stock options outstanding at June 30, 2002 Weighted Number Average Number Exercise Outstanding Remaining Exercisable Price 6/30/2002 Life (Months) at 6/30/02 --------- ------------- ------------------ -------------------- $0.50 1,651,000 116 755,000 $1.00 72,000 118 - $1.90 10,000 118 - $2.45 50,000 118 - ------------- 1,783,000 ============= At June 30, 2002 there were 217,000 options available for future grant under the 2002 Stock Plan. F-15 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2002 AND 2001 7. STOCK OPTIONS (continued) Other Option Grant Pursuant to the chief executive officer's employment agreement, the Company granted to him a non-qualified stock option to purchase 1,000,000 shares of common stock at an exercise price of $2.00 per share. These options vest upon achievement by the Company of $10,000,000 of annual revenues. Due to the uncertainty of reaching the stipulated performance target, the Company has not established a measurement date for the option. Upon determination that the achievement of the revenue threshold is probable, the Company will value the option on the measurement date using the intrinsic value method, and will record the resulting charge, if any, over the remaining vesting period. Common Stock Purchase Warrants In connection with the reverse merger, warrants to purchase a total of 400,000 shares of CCS common stock issued to a consultant were converted into warrants to purchase an equal number of shares of the Company's common at an exercise price of $.50 per share, subject to an anti-dilution provision, as defined. The warrants vest on April 17, 2003. The Company has valued the warrants at $157,000 using the Black-Scholes option pricing model. This amount is being amortized to earnings over the vesting period. 8. PLEDGE AGREEMENT The merger agreement relating to the reverse merger provided, as a condition to CCS' obligation to close, that the Company closed on a private sale from which the Company realized proceeds of $1,000,000. This condition was not met at closing, and CCS completed the reverse merger without the Company having received any proceeds from a public offering. At the closing of the reverse merger, the Company entered into a stock pledge agreement ("Pledge Agreement") with Atlas Equity Group, Inc., a Florida corporation and stockholder of the Company ("Atlas Equity"), pursuant to which Atlas Equity was to have pledged 1,500,000 shares of common stock of the Company (the "Pledged Shares"). Atlas Equity never delivered the shares to be held pursuant to the pledge agreement. The Pledge Agreement stipulated the pledged shares were to be returned to Atlas Equity if the Company sold shares of its unregistered common stock sufficient to generate net cash proceeds of $925,000 to the Company prior to June 1, 2002, subsequently extended to June 14, 2002. To date Atlas Equity has not delivered the shares to be pledged and the Company has not received any financing. 9. RECENT SALES OF UNREGISTERED SECURITIES On April 17, 2002 the Company sold 75,000 shares of common stock to Michael Farkas, the beneficial owner of Atlas Equity Group, a principal stockholder of the Company prior to the merger for $75,000. On April 25, 2002 the Company issued 17,346 shares of restricted common stock in full payment of trade payables of $25,297. F-16 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2002 AND 2001 9. RECENT SALES OF UNREGISTERED SECURITIES (continued) On May 21, 2002 the Company entered into an agreement under which it issued 250,000 shares of restricted common stock in full payment, subject to certain terms, of trade payables of $172,953. On June 28, 2002 the Company entered into an agreement under which it issued 150,000 shares of restricted common stock in full payment, subject to certain terms, of trade payables of $150,000 to the same accredited investor. The shares were issued pursuant to Section 4(2) of the Securities Act of 1933, as amended (the "Securities Act"). The agreements provide the investor will, after a one year waiting period, commence selling the shares of common stock. Once all of the shares of common stock have been sold the investor will provide the Company with documentation of the proceeds of the sales. If the proceeds do not meet or exceed the original amount of the trade payables of $322,953 then the Company will, within 5 days, pay to the accredited investor the difference. The Company has classified the price guarantee arrangements as derivatives, which require mark-to-market accounting with changes in fair value recorded in earnings. As of June 30, 2002, the Company has reported an unrealized loss of $150,953. F-17 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2002 AND 2002 10. INCOME TAXES The income tax benefit consists of the following: June 30, -------------------------- 2002 2001 ----------- ------------- Currently payable (refundable): Federal $(33,000) $(106,000) State and local 4,000 5,000 ----------- ------------- (29,000) (101,000) ----------- ------------- Deferred: Federal - - State and local - - ----------- ------------- - - ----------- ------------- Income tax benefit $(29,000) $(101,000) =========== ============= Following is a reconciliation of the income tax benefit with income taxes on the federal statutory rate: Federal tax at statutory rate $(826,000) $(145,000) State and local taxes, net of federal effect (92,500) (21,000) Rate differential relating to net operating - loss carrybacks - 26,000 Nondeductible items 50,500 10,000 Change in valuation allowance 839,000 29,000 ----------- ------------- Income tax benefit $(29,000) $(101,000) =========== ============= F-18 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2002 AND 2002 10. INCOME TAXES Components of deferred taxes at June 30, 2002 are as follows: Deferred tax assets: Net operating losses $746,300 Deferred rent payable 19,200 Reserves and allowances 115,900 Stock based compensation 14,000 ------------ 895,400 Deferred tax liability: Property and equipment 6,400 ------------ 889,000 Less valuation allowance (889,000) ------------ Net deferred taxes $ - ============ The Company has recorded valuation allowances to offset tax benefits arising from deferred tax items because their realization is uncertain. The Company has federal net operating loss carry-forwards of approximately $1,900,000 available to offset future federal taxable income. These losses expire in 2021 and 2022. 11. 401(K) SAVINGS PLAN The Company maintains a qualified deferred compensation plan under section 401(k) of the Internal Revenue Code. Under the plan, employees may elect to defer up to 15% of their salary, subject to the Internal Revenue Service limits. The Company may make a discretionary match as well as a discretionary contribution. The Company did not make any contributions to the plan for the years ended June 30, 2002 and 2001. 12. RELATED PARTY TRANSACTIONS Employment Agreement In April 2002, in connection with the completion of the merger, the Company entered into a three-year employment agreement with Mr. Jamil pursuant to which he agreed to serve as the Company's president and chief executive officer. The agreement calls for an annual base compensation of $250,000 and may be increased on each anniversary date commencing May 1, 2003 by 10% if the Company achieves certain performance criteria. In addition to the base salary, the chief executive officer is eligible to receive an annual discretionary bonus commencing June 30, 2003, at the sole discretion of the board of directors. Pursuant to the agreement, the Company granted the chief executive officer a non-qualified stock option to purchase 1,000,000 shares of common stock at an exercise price of $2.00 per share. These options vest upon achievement by the Company of $10,000,000 of annual revenues. F-19 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2002 AND 2002 13. SUPPLEMENTAL DISCLOSURE OF CASH FLOW INFORMATION: Year Ended -------------------------------- June 30, -------------------------------- 2002 2001 --------------- ---------------- (Consolidated) (Combined) Cash paid during the period for: Interest $60,982 $59,561 =============== ================ Income taxes $23,296 $161,621 =============== ================ Non-cash financing and investing activities: Common stock issued to settle accounts payable $348,290 $- =============== ================ Accrued liabilities assumed in reverse merger $44,354 $- =============== ================ 14. COMMITMENTS AND CONTINGENCIES Litigation On or about May 11, 2000 an action was commenced against CCS in the Supreme Court, New York County, captioned Ergonomic Systems Philippines Inc. v. CCS International Ltd. The plaintiff seeks to recover $81,000, which was paid to CCS in connection with a distributorship agreement between the parties, plus costs and interest. CCS has denied the material allegations of the claim and has raised affirmative defenses thereto. CCS believes that it has valid defenses to the claim. On or about May 25, 2001, an action was commenced against CCS in the United States District Court for the Southern District of New York, captioned Shenzen Newtek v. CCS International Ltd. The plaintiff seeks to recover $91,500, which was paid to CCS in connection with a distributorship agreement between the parties, plus costs and interest. CCS has denied the material allegations of the plaintiff's claim and has raised affirmative defenses thereto. F-20 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2002 AND 2001 14. COMMITMENTS AND CONTINGENCIES - Continued Litigation - continued CCS also asserted a counterclaim seeking damages of $500,000 based upon the plaintiff's alleged breach of the distributorship agreement. This matter was settled between the parties on July 10, 2002. (See Note 15). On or about October 12, 2001, an action was commenced against CCS in the United States District Court for the Southern District of New York, captioned China Bohai Group C. Ltd. and USA International Business Connections Corp. v. CCS International, Ltd. The plaintiff seeks to recover $250,000 paid to CCS in connection with a distributorship agreement between the parties, plus $5,000,000 of punitive damages and costs and interest. CCS has denied the material allegations of the plaintiff's claim and has raised affirmative defenses thereto. CCS has asserted a counterclaim seeking damages in the approximate amount of $1,150,000 based upon the plaintiff's alleged breach of the parties' distributorship agreement. The Company believes that it has valid defenses to the claim. In June 1998, a photographer formerly retained by CCS filed suit in U. S. District Court for the Southern District of New York captioned Frank Ross and Julietta Vassilkioti v. CCS International, Ltd. The plaintiff is seeking damages for alleged copyright infringement. The judge in the case has granted the plaintiff partial summary judgment; a hearing to determine damages has not yet been scheduled. Under federal judicial rules, the Company is unable to contest the granting of partial summary judgment until a final judgment has been rendered. The Company believes that it has substantial defenses to the claim asserted in the lawsuit. In June 2001, a former product distributor of CCS brought suit in Circuit Court, Palm Beach, Florida, captioned Allan L. Dunterman, Jr. v. CCS International, Ltd. The plaintiff claims that CCS engaged in breach of contract, among other allegations. CCS has moved the complaint to the U. S. District Court for the Southern District of Florida, where it is currently pending. In its answer to the complaint, CCS has denied any wrongdoing and has asserted numerous affirmative defenses. The parties have exchanged initial written discovery and are currently in settlement discussions. On May 2, 2002, Menachem Cohen, vice president and a director, and two other employees of one of the Company's subsidiaries were arrested pursuant to a criminal complaint filed in the United States District Court of the Southern District of Florida. The complaint alleges that such individuals violated federal law in that they intentionally manufactured, assembled, possessed or sold a device used for the surreptitious interception of electronic communications and that the device was sent through the mail or transmitted in intrastate or foreign commerce. On September 4, 2002, the United States District Court of the Southern District of Florida entered an order dismissing all charges against Menachem Cohen, vice president and director, and the two other employees of one of the Company's subsidiaries. (See note 15). F-21 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2002 AND 2001 14. COMMITMENTS AND CONTINGENCIES - Continued Litigation - continued Given that litigation is subject to many uncertainties, it is possible to predict the outcome of the litigation pending against the Company. Accordingly, management has not made an estimate of the amount or range of loss that could result from an unfavorable outcome of pending cases, and the Company has not provided any amounts in the consolidated financial statements for unfavorable outcomes, if any. However, it is possible that the Company's business, results of operations, cash flows or financial position could be materially affected by an unfavorable outcome of certain pending litigation. All such cases are being, and will continue to be vigorously defended, and the Company believes that it has meritorious and valid defenses against all such litigation, as well as valid bases appeal of any adverse verdicts, should they result. Stock Purchase Agreements On January 31, 2002, Mr. Jamil entered into an understanding with two financial consulting companies to sell to them 30% of his interest in the common stock of CCS's subsidiaries, excluding Security Design, Inc., for nominal consideration. Mr. Jamil has advised the Company that neither the two financial consultants nor their designees have paid the required consideration for the shares, and that he has never formally transferred any stock ownership in the subsidiaries to the financial consultants or their designees. Further, a total of 1,500,000 shares of the Company's Series B Preferred Stock were issued to the chief executive officer in partial exchange for his shares in the subsidiaries, and not to the financial consultants or their designees as had been contemplated by agreements between the chief executive officer and the financial consultants or their designees. The Company cannot give any assurance that the financial consultants will not claim that they are entitled to the Series B shares. Operating Leases The Company leases office space and office equipment under non-cancelable operating leases that expire over various periods through 2012. Rent expense under the Company's headquarters lease is being recognized on a straight-line basis to account for rent concessions during the lease term, resulting in deferred rent payable of $29,658. Total rent expense for the years ended June 30, 2002 and 2001 was approximately $491,728 and $268,158 respectively. Approximate rent expense for fiscal 2001 is net of a reversal of fiscal 2000 rent accruals in the approximate amount of $203,840. The reversal relates to a settlement of arrears on the Company's former headquarters in New York City. Excluding this settlement, rent expense for fiscal 2001 would have been approximately $474,000. F-22 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2002 AND 2001 14. COMMITMENTS AND CONTINGENCIES - Continued Operating Leases - continued The approximate future minimum rental commitments for all long-term non-cancelable operating leases are as follows: Year ending June 30, Amount ------------ ------------ 2003 $512,676 2004 447,496 2005 404,768 2006 163,278 2007 160,701 Thereafter 602,105 ------------ $2,291,024 ============ 15. SUBSEQUENT EVENTS Litigation On July 10, 2002, the Company and Shenzhen Newtek entered into a Settlement Agreement under which SIT issued 67,000 shares of its common stock in full settlement, subject to certain terms, of the $67,000 claim. If the market price of the Company's common stock on July 10, 2003 is less than $1.00 per share, the Company is to pay the plaintiff the difference between $67,000 and the value of the stock. At September 30, 2002, the closing price of the Company's common stock was $.17 per share. On September 4, 2002, the United States District Court of the Southern District of Florida entered an order dismissing all charges against Menachem Cohen, vice president and director, and the two other employees of one of the Company's subsidiaries. See Note 14. F-23 -------------------------------------------------------------------------------- SIGNATURES Pursuant to the requirements of Section 13 or 15(d) of the Securities Exchange Act of 1934, the registrant has duly caused this report to be signed on its behalf by the undersigned, thereunto duly authorized. SECURITY INTELLIGENCE TECHNOLOGIES, INC. /s/ Ben Y. Jamil ---------------- Ben Y. Jamil Chairman of the Board of Directors, President and Chief Executive Officer Dated: November 5, 2002 Pursuant to the requirements of the Securities Exchange Act of 1934, this report has been signed below by the following persons on behalf of the registrant and in the capacities and on the dates indicated: /s/ Ben Y. Jamil /s/ Chris R. Decker ---------------- ------------------- Ben Y. Jamil Chief Financial Officer and Director Chairman of the Board of Directors, President and Chief Executive Officer Dated: November 5, 2002 Dated: November 5, 2002 /s/ Menachem Cohen /s/ Tom Felice ------------------ -------------- Menachem Cohen Tom Felice Vice President and Director Vice President and Director Dated: November 5, 2002 Dated: November 5, 2002 /s/ Nomi Om /s/ Sylvain Naar ----------- ---------------- Nomi Om Sylvain Naar Vice President and Director Director Dated: November 5, 2002 Dated: November 5, 2002 -------------------------------------------------------------------------------- CERTIFICATION OF CHIEF EXECUTIVE AND FINANCIAL OFFICERS The undersigned chief executive officer and chief financial officer of the Registrant do hereby certify that this Annual Report of Form 10-KSB fully complies with the requirements of Section 13(a) or 15(d) of the Securities Act of 1934, as amended, and that the information contained in this report fairly presents, in all material respects, the financial condition and results of operations of the issuer at the dates and for the periods shown in such report. /s/ Ben Y. Jamil ---------------- Ben Y. Jamil, Chief Executive Officer /s/ Chris R. Decker ------------------- Chris R. Decker, Chief Financial Officer Ben Y. Jamil does hereby certify that he is the duly elected and incumbent chief executive officer and Chris R. Decker does hereby certify that he is the duly elected and incumbent chief financial officer of Security Intelligence Technologies, Inc. (the "issuer") and each of them does hereby certify, with respect to the issuer's Form 10-KSB for the fiscal year ended June 30, 2002 (the "report") as follows: 1. He or she has reviewed the report; 2. Based on his or her knowledge, the report does not contain any untrue statement of a material fact or omit to state a material fact necessary in order to make the statements made, in light of the circumstances under which such statements were made, not misleading with respect to the period covered by the report; 3. Based on his or her knowledge, the financial statements, and other financial information included in the report, fairly present in all material respects the financial condition, results of operations and cash flows of the issuer as of, and for, the periods presented in the report; 4. He or she and the other certifying officers are responsible for establishing and maintaining disclosure controls and procedures, as defined in Rule 13a-14(c) of the Securities Exchange Act of 1934, as amended, for the issuer and have: i. Designed such disclosure controls and procedures to ensure that material information relating to the issuer, including its consolidated subsidiaries, is made known to them by others within those entities, particularly during the period in which the periodic reports are being prepared; ii. Evaluated the effectiveness of the issuer's disclosure controls and procedures as of a date within 90 days prior to the filing date of the report (the "Evaluation Date"); and iii. Presented in the report their conclusions about the effectiveness of the disclosure controls and procedures based on the required evaluation as of the Evaluation Date 5. He or she and the other certifying officers have disclosed to the issuer's auditors and to the audit committee of the board of directors (or persons fulfilling the equivalent function): -------------------------------------------------------------------------------- i. All significant deficiencies in the design or operation of internal controls which could adversely affect the issuer's ability to record, process, summarize and report financial data and have identified for the issuer's auditors any material weaknesses in internal controls; and ii. Any fraud, whether or not material, that involves management or other employees who have a significant role in the issuer's internal controls; and 6. He or she and the other certifying officers have indicated in the report whether or not there were significant changes in internal controls or in other factors that could significantly affect internal controls subsequent to the date of their most recent evaluation, including any corrective actions with regard to significant deficiencies and material weaknesses. /s/ Ben Y. Jamil ---------------- Ben Y. Jamil Chief Executive Officer /s/ Chris R. Decker ------------------- Chris R. Decker Chief Financial Officer -------------------------------------------------------------------------------- Exhibit 3.2 ARTICLES OF AMENDMENT TO ARTICLES OF INCORPORATION OF SECURITY INTELLIGENCE TECHNOLOGIES, INC. (present name) Pursuant to the provisions of section 607.1006, Florida Statutes, this Florida profit corporation adopts the following articles of amendment to its articles of incorporation: FIRST: Amendment(s) adopted: (indicate article number(s) being amended, added or deleted) Article V of the Articles of Incorporation of Security Intelligence Technologies, Inc. (the "Corporation") is being amended as follows: The language attached hereto as Exhibit A shall be inserted following paragraph (B) of Article V. Capitalized terms used in Exhibit A shall have the meaning ascribed to such terms in the Articles of Corporation of the Corporation. SECOND: The date of the amendment's adoption: April 17, 2002. THIRD: Adoption of Amendment(s) (CHECK ONE) ___ The amendment(s) was/were approved by the shareholders. The number of votes cast for the amendment(s) was/were sufficient for approval. ___ The amendment(s) was/were approved by the shareholders through voting groups. The following statement must be separately provided for each voting group entitled to vote separately on the amendment(s): "The number of votes cast for the amendment(s) was/were sufficient for approval by ______________." (voting group) _x_ The amendment(s) was/were adopted by the board of directors without shareholder action and shareholder action was not required. ___ The amendment was adopted by the incorporators without shareholder action and shareholder action was not required. 1 -------------------------------------------------------------------------------- Signed this 17th day of April 2002. Signature -------------------------------------------------------------------------------- (By the Chairman or Vice Chairman of the Board of Directors, President or other officer if adopted by the shareholders) OR (By a director if adopted by the directors) OR (By an incorporator if adopted by the incorporators) -------------------------------------------------------------------------------- (Typed or printed name) -------------------------------------------------------------------------------- (Title) 2 -------------------------------------------------------------------------------- Exhibit A C. Rights, Preferences and Restrictions of Series A Preferred Stock. A series of the Preferred Stock, designated the "Series A Convertible Preferred Stock" (the "Series A Preferred Stock"), is hereby established. The aggregate number of shares of the Series A Preferred Stock shall be three million five hundred thousand (3,500,000), $.0001 par value per share. The rights, preferences, privileges, and restrictions granted to and imposed on the Series A Preferred Stock are as set forth below in this Article V(C). 1. Dividend Provisions. The holders of shares of Series A Preferred Stock shall be entitled to receive dividends, out of any assets legally available therefor, when, as, and if declared by the Board of Directors. 2. Liquidation Preference. (a) In the event of any liquidation, dissolution or winding up of this Corporation, either voluntary or involuntary, the holders of Series A Preferred Stock shall be entitled to receive, prior and in preference to any distribution of any of the assets of this Corporation to the holders of Common Stock by reason of their ownership thereof, an amount per share equal to $1.00 for each outstanding share of Series A Preferred Stock plus an amount equal to any declared but unpaid dividends on such share (subject to adjustment of such fixed dollar amounts for any stock splits, stock dividends. combinations, recapitalizations or the like since the date hereof). If upon the occurrence of such event, the assets and funds thus distributed among the holders of the Series A Preferred Stock shall be insufficient to permit the payment to such holders of the full aforesaid preferential amounts, then the entire assets and funds of this Corporation legally available for distribution shall be distributed ratably among the holders of the Series A Preferred Stock in proportion to the amount of such stock owned by each such holder. (b) Upon the completion of the distribution required by subsection (a) of this Section 2, the remaining assets of this Corporation available for distribution to stockholders shall be distributed among the holders of capital stock pro rata based on the number of shares of capital stock held. 3. Conversion. The holders of the Series A Preferred Stock shall have conversion rights as follows (the "Conversion Rights"): (a) Right to Convert. Each share of Series A Preferred Stock shall be convertible, at the option of the holder thereof, at any time after the achievement by this Corporation of either of the a Performance Thresholds (as hereinafter defined), at the office of this Corporation or any transfer agent for such stock, into one (1) share of Common Stock (the "Conversion Ratio"), determined as hereafter provided, in effect on the date the certificate is surrendered for conversion. (b) Mechanics of Conversion. Before any holder of Series A Preferred Stock shall be entitled to convert the same into shares of Common Stock, he or she shall surrender the certificate or certificates therefor, duly endorsed, at the office of this Corporation or of any transfer agent for the Series A Preferred Stock, and shall give written notice to this Corporation at its principal corporate office, of the election to convert the same and shall state therein the name or names in which the certificate or certificates for shares of Common Stock are to be issued. This Corporation shall, as soon as practicable thereafter, issue and deliver at such office to such holder of Series A Preferred Stock, or to the nominee or nominees of such holder, a certificate or certificates for the number of shares of Common Stock to which such holder shall be entitled as aforesaid. Such conversion shall be deemed to have been made immediately prior to the close of business on the date of such surrender of the shares of Series A Preferred Stock to be converted, and the person or persons entitled to receive the shares of Common Stock issuable upon such conversion shall be treated for all purposes as the record holder or holders of such shares of Common Stock as of such date. If the conversion is in connection with an underwritten offering of securities registered pursuant to the Securities Act of 1933, the conversion may, at the option of a holder tendering Series A Preferred Stock for conversion, be conditioned upon the closing with the underwriters of the sale of securities pursuant to such offering, in which event the persons entitled to receive the Common Stock upon conversion of the Series A Preferred Stock shall not be deemed to have converted such Series A Preferred Stock until immediately prior to the closing of such sale of securities. 3 -------------------------------------------------------------------------------- (c) Conversion Ratio Adjustments of Preferred Stock for Certain, Splits, Combinations and Transactions. The Conversion Ratio of the Series A Preferred Stock shall be subject to adjustment from time to time as follows: (i) Stock Splits and Dividends. In the event this Corporation should at any time or from time to time after the date hereof fix a record date for the effectuation of a split or subdivision of the outstanding shares of Common Stock or the determination of holders of Common Stock entitled to receive a dividend or other distribution payable in additional shares of Common Stock or other securities or rights convertible into, or entitling the holder thereof to receive directly or indirectly, additional shares of Common Stock (hereinafter referred to as "Common Stock Equivalents") without payment of any consideration by such holder for the additional shares of Common Stock or the Common Stock Equivalents (including the additional shares of Common Stock issuable upon conversion or exercise thereof), then, as of such record date (or the date of such dividend distribution, split or subdivision if no record date is fixed), the Conversion Ratio of the Series A Preferred Stock shall be appropriately amended so that the number of shares of Common Stock issuable on conversion of each share of such series shall be increased in proportion to such increase of the aggregate of shares of Common Stock outstanding and those issuable with respect to such Common Stock Equivalents. (iii) Reverse Stock Splits. If the number of shares of Common Stock outstanding at any time after the date hereof is decreased by a combination of the outstanding shares of Common Stock, then, following the record date of such combination, the Conversion Ratio for the Series A Preferred Stock shall be appropriately amended so that the number of shares of Common Stock issuable on conversion of each share of such series shall be decreased in proportion to such decrease in outstanding shares. (d) Other Distributions. In the event this Corporation shall declare a distribution payable in securities of other persons, evidences of indebtedness issued by this Corporation or other persons, assets or options or rights not referred to in subsection 3(c), then, in each such case for the purpose of this subsection 3(d), the holders of the Series A Preferred Stock shall be entitled to a proportionate share of any such distribution as though they were the holders of the number of shares of Common Stock of this Corporation into which their shares of Series A Preferred Stock are convertible as of the record date fixed for the determination of the holders of Common Stock of this Corporation entitled to receive such distribution. (e) Recapitalizations. If at any time or from time to time there shall be a recapitalization of the Common Stock (other than a subdivision, combination or merger or sale of assets transaction provided for elsewhere in this Section 3), provision shall be made so that the holders of the Series A Preferred Stock shall thereafter be entitled to receive upon conversion of the Series A Preferred Stock the number of shares of stock or other securities or property of this Corporation or otherwise, to which a holder of Common Stock deliverable upon conversion would have been entitled on such recapitalization. In any such case, appropriate adjustment shall be made in the application of the provisions of this Section 3 with respect to the rights of the holders of the Series A Preferred Stock after the recapitalization to the end that the provisions of this Section 3 (including adjustment of the Conversion Ratio then in effect and the number of shares purchasable upon conversion of the Series A Preferred Stock) shall be applicable after that event as nearly equivalent as may be practicable. 4 -------------------------------------------------------------------------------- (f) No Impairment. This Corporation will not, by amendment of its Certificate of Incorporation or through any reorganization, recapitalization, transfer of assets, consolidation, merger, dissolution, issue or sale of securities or any other voluntary action, avoid or seek to avoid the observance or performance of any of the terms to be observed or performed hereunder by this Corporation, but will at all times in good faith assist in the carrying out of all the provisions of this Section 3 and in the taking of all such action as may be necessary or appropriate in order to protect the Conversion Rights of the holders of the Series A Preferred Stock against impairment. (g) No Fractional Shares and Certificate as to Adjustments. (i) No fractional shares shall be issued upon the conversion of any share or shares of the Series A Preferred Stock, and the number of shares of Common Stock to be issued shall be rounded to the nearest whole share. Whether or not fractional shares are issuable upon such conversion shall be determined on the basis of the total number of shares of Series A Preferred Stock the holder is at the time converting into Common Stock and the number of shares of Common Stock issuable upon such aggregate conversion. (ii) Upon the occurrence of each adjustment or readjustment of the Conversion Ratio of Series A Preferred Stock pursuant to this Section 3, this Corporation, at its expense, shall promptly compute such adjustment or readjustment in accordance with the terms hereof and prepare and furnish to each holder of Series A Preferred Stock a certificate setting forth such adjustment or readjustment and showing in detail the facts upon which such adjustment or readjustment is based. This Corporation shall, upon the written request at any time of any holder of Series A Preferred Stock, furnish or cause to be furnished to such holder a like certificate setting forth (A) such adjustment and readjustment, (B) the Conversion Ratio for the Series A Preferred Stock at the time in effect, and (C) the number of shares of Common Stock and the amount, if any, of other property that at the time would be received upon the conversion of a share of Series A Preferred Stock. (h) Notices of Record Date. In the event of any taking by this Corporation of a record of the holders of any class of securities for the purpose of determining the holders thereof who are entitled to receive any dividend or other distribution, any right to subscribe for, purchase or otherwise acquire any shares of stock of any class or any other securities or property, or to receive any other right, this Corporation shall mail to each holder of Series A Preferred Stock, at least ten (10) days prior to the date specified therein, a notice specifying the date on which any such record is to be taken for the purpose of such dividend, distribution or right, and the amount and character of such dividend, distribution or right. In addition, the holders of the Series A Preferred Stock shall receive any other notice which is sent by this Corporation to its shareholders. (i) Reservation of Stock Issuable Upon Conversion. This Corporation shall at all times reserve and keep available out of its authorized but unissued shares of Common Stock, solely for the purpose of effecting the conversion of the shares of the Series A Preferred Stock, such number of its shares of Common Stock as shall from time to time be sufficient to effect the conversion of all outstanding shares of the Series A Preferred Stock; and if at any time the number of authorized but unissued shares of Common Stock shall not be sufficient to effect the conversion of all then outstanding shares of the Series A Preferred Stock, in addition to such other remedies as shall be available to the holder of Series A Preferred Stock, this Corporation will take such corporate action as may, in the opinion of its counsel, be necessary to increase its authorized but unissued shares of Common Stock to such number of shares as shall be sufficient for such purposes, including, without limitation, engaging in best efforts to obtain the requisite shareholder approval of any necessary amendment to this Certificate of Incorporation. 5 -------------------------------------------------------------------------------- (j) Notices. Any notice required by the provisions of this Section 3 to be given to the holders of shares of Series A Preferred Stock shall be deemed given if deposited in the United States mail, postage prepaid, and addressed to each holder of record at his address appearing on the books of this Corporation. 4. Voting Rights. The holder of each share of Series A Preferred Stock shall have the right to fifteen (15) votes for each share of Common Stock into which such Series A Preferred Stock could then be converted, and with respect to such vote, such holder shall have full voting rights and powers equal to the voting rights and powers of the holders of Common Stock, and shall be entitled, notwithstanding any provision hereof, to notice of any stockholders' meeting in accordance with the bylaws of this Corporation, and shall vote, together with holders of Common Stock, with respect to all matters upon which holders of voting stock have the right to vote. Fractional votes shall not, however, be permitted and any fractional voting rights available on an as-converted basis (after aggregating all shares into which shares of Series A Preferred Stock held by each holder could be converted) shall be rounded to the nearest whole number (with one-half being rounded upward). For purposes of this Section 4, this Corporation shall have satisfied the Performance Thresholds as of the date of issuance of the Series A Preferred Stock. 5. Performance Thresholds. Each share of Series A Preferred Stock shall be convertible, at the option of the holder, upon the achievement by the Corporation of either of the performance thresholds (the "Performance Thresholds") set forth in the next sentence. If at any time prior to October 15, 2008, the Corporation reports (i) if it is a reporting company under the Securities Exchange Act of 1934, as amended (the "1934 Act") in its annual report on Form 10-K or 10-KSB (or any similar or successor form or forms) or (ii) if it is not a reporting company under the 1934 Act, in its audited financial statements, annual net revenue which equals or exceeds ten million dollars ($10,000,000) or annual net income which equal or exceeds one million dollars ($1,000,000), then each share of Series A Preferred Stock shall become convertible in accordance with Section C.3. 6. Status of Converted Stock. In the event any shares of Series A Preferred Stock shall be converted pursuant to Section 3 hereof, the shares so converted shall be cancelled and shall not be issuable by this Corporation. The Certificate of Incorporation of this Corporation shall be appropriately amended to effect the corresponding reduction in the Corporation's authorized capital stock. D. Rights, Preferences and Restrictions of Series B Preferred Stock. A series of the Preferred Stock, designated the "Series B Convertible Preferred Stock" (the "Series B Preferred Stock"), is hereby established. The aggregate number of shares of the Series B Preferred Stock shall be one million five hundred thousand (1,500,000), $.0001 par value per share. The rights, preferences, privileges, and restrictions granted to and imposed on the Series A Preferred Stock are as set forth below in this Article V(D). 1. Dividend Provisions. The holders of shares of Series B Preferred Stock shall be entitled to receive dividends, out of any assets legally available therefor, when, as, and if declared by the Board of Directors. 6 -------------------------------------------------------------------------------- 2. Liquidation Preference. (a) In the event of any liquidation, dissolution or winding up of this Corporation, either voluntary or involuntary, the holders of Series B Preferred Stock shall be entitled to receive, prior and in preference to any distribution of any of the assets of this Corporation to the holders of Common Stock by reason of their ownership thereof, an amount per share equal to $1.00 for each outstanding share of Series B Preferred Stock plus an amount equal to any declared but unpaid dividends on such share (subject to adjustment of such fixed dollar amounts for any stock splits, stock dividends. combinations, recapitalizations or the like since the date hereof). If upon the occurrence of such event, the assets and funds thus distributed among the holders of the Series B Preferred Stock shall be insufficient to permit the payment to such holders of the full aforesaid preferential amounts, then the entire assets and funds of this Corporation legally available for distribution shall be distributed ratably among the holders of the Series B Preferred Stock in proportion to the amount of such stock owned by each such holder. (b) Upon the completion of the distribution required by subsection (a) of this Section 2, the remaining assets of this Corporation available for distribution to stockholders shall be distributed among the holders of capital stock pro rata based on the number of shares of capital stock held. 3. Conversion. The holders of the Series B Preferred Stock shall have conversion rights as follows (the "Conversion Rights"): (a) Right to Convert. Each share of Series B Preferred Stock shall be convertible, at the option of the holder thereof, at any time after the achievement by this Corporation of either of the Performance Thresholds, at the office of this Corporation or any transfer agent for such stock, into one (1) share of Common Stock (the "Conversion Ratio"), determined as hereafter provided, in effect on the date the certificate is surrendered for conversion. The holder of Series B Preferred Stock may only exercise its conversion rights hereunder commencing on the date on which the Corporation filed its annual report with the Securities and Exchange Commission which sets forth achievement of either of the Performance Thresholds. (b) Mechanics of Conversion. Before any holder of Series B Preferred Stock shall be entitled to convert the same into shares of Common Stock, he or she shall surrender the certificate or certificates therefor, duly endorsed, at the office of this Corporation or of any transfer agent for the Series B Preferred Stock, and shall give written notice to this Corporation at its principal corporate office, of the election to convert the same and shall state therein the name or names in which the certificate or certificates for shares of Common Stock are to be issued. This Corporation shall, as soon as practicable thereafter, issue and deliver at such office to such holder of Series B Preferred Stock, or to the nominee or nominees of such holder, a certificate or certificates for the number of shares of Common Stock to which such holder shall be entitled as aforesaid. Such conversion shall be deemed to have been made immediately prior to the close of business on the date of such surrender of the shares of Series B Preferred Stock to be converted, and the person or persons entitled to receive the shares of Common Stock issuable upon such conversion shall be treated for all purposes as the record holder or holders of such shares of Common Stock as of such date. If the conversion is in connection with an underwritten offering of securities registered pursuant to the Securities Act of 1933, the conversion may, at the option of a holder tendering Series B Preferred Stock for conversion, be conditioned upon the closing with the underwriters of the sale of securities pursuant to such offering, in which event the persons entitled to receive the Common Stock upon conversion of the Series B Preferred Stock shall not be deemed to have converted such Series B Preferred Stock until immediately prior to the closing of such sale of securities. (c) Conversion Ratio Adjustments of Preferred Stock for Certain, Splits, Combinations and Transactions. The Conversion Ratio of the Series B Preferred Stock shall be subject to adjustment from time to time as follows: 7 -------------------------------------------------------------------------------- (i) Stock Splits and Dividends. In the event this Corporation should at any time or from time to time after the date hereof fix a record date for the effectuation of a split or subdivision of the outstanding shares of Common Stock or the determination of holders of Common Stock entitled to receive a dividend or other distribution payable in additional shares of Common Stock or other securities or rights convertible into, or entitling the holder thereof to receive directly or indirectly, additional shares of Common Stock (hereinafter referred to as "Common Stock Equivalents") without payment of any consideration by such holder for the additional shares of Common Stock or the Common Stock Equivalents (including the additional shares of Common Stock issuable upon conversion or exercise thereof), then, as of such record date (or the date of such dividend distribution, split or subdivision if no record date is fixed), the Conversion Ratio of the Series B Preferred Stock shall be appropriately amended so that the number of shares of Common Stock issuable on conversion of each share of such series shall be increased in proportion to such increase of the aggregate of shares of Common Stock outstanding and those issuable with respect to such Common Stock Equivalents. (iii) Reverse Stock Splits. If the number of shares of Common Stock outstanding at any time after the date hereof is decreased by a combination of the outstanding shares of Common Stock, then, following the record date of such combination, the Conversion Ratio for the Series B Preferred Stock shall be appropriately amended so that the number of shares of Common Stock issuable on conversion of each share of such series shall be decreased in proportion to such decrease in outstanding shares. (d) Other Distributions. In the event this Corporation shall declare a distribution payable in securities of other persons, evidences of indebtedness issued by this Corporation or other persons, assets or options or rights not referred to in subsection 3(c), then, in each such case for the purpose of this subsection 3(d), the holders of the Series B Preferred Stock shall be entitled to a proportionate share of any such distribution as though they were the holders of the number of shares of Common Stock of this Corporation into which their shares of Series B Preferred Stock are convertible as of the record date fixed for the determination of the holders of Common Stock of this Corporation entitled to receive such distribution. (e) Recapitalizations. If at any time or from time to time there shall be a recapitalization of the Common Stock (other than a subdivision, combination or merger or sale of assets transaction provided for elsewhere in this Section 3), provision shall be made so that the holders of the Series B Preferred Stock shall thereafter be entitled to receive upon conversion of the Series B Preferred Stock the number of shares of stock or other securities or property of this Corporation or otherwise, to which a holder of Common Stock deliverable upon conversion would have been entitled on such recapitalization. In any such case, appropriate adjustment shall be made in the application of the provisions of this Section 3 with respect to the rights of the holders of the Series B Preferred Stock after the recapitalization to the end that the provisions of this Section 3 (including adjustment of the Conversion Ratio then in effect and the number of shares purchasable upon conversion of the Series B Preferred Stock) shall be applicable after that event as nearly equivalent as may be practicable. (f) No Impairment. This Corporation will not, by amendment of its Certificate of Incorporation or through any reorganization, recapitalization, transfer of assets, consolidation, merger, dissolution, issue or sale of securities or any other voluntary action, avoid or seek to avoid the observance or performance of any of the terms to be observed or performed hereunder by this Corporation, but will at all times in good faith assist in the carrying out of all the provisions of this Section 3 and in the taking of all such action as may be necessary or appropriate in order to protect the Conversion Rights of the holders of the Series B Preferred Stock against impairment. 8 -------------------------------------------------------------------------------- (g) No Fractional Shares and Certificate as to Adjustments. (i) No fractional shares shall be issued upon the conversion of any share or shares of the Series B Preferred Stock, and the number of shares of Common Stock to be issued shall be rounded to the nearest whole share. Whether or not fractional shares are issuable upon such conversion shall be determined on the basis of the total number of shares of Series B Preferred Stock the holder is at the time converting into Common Stock and the number of shares of Common Stock issuable upon such aggregate conversion. (ii) Upon the occurrence of each adjustment or readjustment of the Conversion Ratio of Series B Preferred Stock pursuant to this Section 3, this Corporation, at its expense, shall promptly compute such adjustment or readjustment in accordance with the terms hereof and prepare and furnish to each holder of Series B Preferred Stock a certificate setting forth such adjustment or readjustment and showing in detail the facts upon which such adjustment or readjustment is based. This Corporation shall, upon the written request at any time of any holder of Series B Preferred Stock, furnish or cause to be furnished to such holder a like certificate setting forth (A) such adjustment and readjustment, (B) the Conversion Ratio for the Series B Preferred Stock at the time in effect, and (C) the number of shares of Common Stock and the amount, if any, of other property that at the time would be received upon the conversion of a share of Series B Preferred Stock. (h) Notices of Record Date. In the event of any taking by this Corporation of a record of the holders of any class of securities for the purpose of determining the holders thereof who are entitled to receive any dividend or other distribution, any right to subscribe for, purchase or otherwise acquire any shares of stock of any class or any other securities or property, or to receive any other right, this Corporation shall mail to each holder of Series B Preferred Stock, at least ten (10) days prior to the date specified therein, a notice specifying the date on which any such record is to be taken for the purpose of such dividend, distribution or right, and the amount and character of such dividend, distribution or right. In addition, the holders of the Series B Preferred Stock shall receive any other notice which is sent by this Corporation to its shareholders. (i) Reservation of Stock Issuable Upon Conversion. This Corporation shall at all times reserve and keep available out of its authorized but unissued shares of Common Stock, solely for the purpose of effecting the conversion of the shares of the Series B Preferred Stock, such number of its shares of Common Stock as shall from time to time be sufficient to effect the conversion of all outstanding shares of the Series B Preferred Stock; and if at any time the number of authorized but unissued shares of Common Stock shall not be sufficient to effect the conversion of all then outstanding shares of the Series B Preferred Stock, in addition to such other remedies as shall be available to the holder of Series B Preferred Stock, this Corporation will take such corporate action as may, in the opinion of its counsel, be necessary to increase its authorized but unissued shares of Common Stock to such number of shares as shall be sufficient for such purposes, including, without limitation, engaging in best efforts to obtain the requisite shareholder approval of any necessary amendment to this Certificate of Incorporation. (j) Notices. Any notice required by the provisions of this Section 3 to be given to the holders of shares of Series B Preferred Stock shall be deemed given if deposited in the United States mail, postage prepaid, and addressed to each holder of record at his address appearing on the books of this Corporation. 4. Voting Rights. The holder of each share of Series B Preferred Stock shall not have the right to vote, except as otherwise provided under the Florida Business Corporation Act. 9 -------------------------------------------------------------------------------- 5. Status of Converted Stock. In the event any shares of Series B Preferred Stock shall be converted pursuant to Section 3 hereof, the shares so converted shall be cancelled and shall not be issuable by this Corporation. The Certificate of Incorporation of this Corporation shall be appropriately amended to effect the corresponding reduction in the Corporation's authorized capital stock. E. Common Stock. The rights, preferences, privileges and restrictions granted to and imposed on the Common Stock are as set forth below in this Article V(D) and as otherwise provided by the Florida Business Corporation Act. 1. Dividend Rights. Subject to the prior rights of holders of all classes of stock at the time outstanding having prior rights as to dividends, the holders of the Common Stock shall be entitled to receive, when and as declared by the Board of Directors, out of any assets of this Corporation legally available therefor, such dividends as may be declared from time to time by the Board of Directors. 2. Liquidation Rights. Upon the liquidation, dissolution or winding up of this Corporation, the assets of this Corporation shall be distributed as provided in Section 2 of Division (B) of Article V hereof. 3. Voting Rights. The holder of each share of Common Stock shall have the right to one vote for each such share, and shall be entitled to notice of any stockholders' meeting in accordance with the bylaws of this Corporation, and shall be entitled to vote upon such matters and in such manner as may be provided by this Certificate of Incorporation or by law. -------------------------------------------------------------------------------- Exhibit 10.3 SECURITY INTELLIGENCE TECHNOLOGIES, INC. 2002 STOCK OPTION PLAN ARTICLE ONE GENERAL PROVISIONS I. Purpose of the Plan The Security Intelligence Technologies, Inc. 2002 Stock Option Plan (the "Plan") is intended to assist Security Intelligence Technologies, Inc., a Delaware corporation (the "Company"), and any entity which controls, is controlled by, or is under common control with the Company ("Related Entities") in recruiting and retaining employees, directors, officers, agents, consultants, independent contractors and advisors (collectively, "Participants"), and in compensating Participants by enabling them to participate in the future success of the Company and the Related Entities and to associate their interests with those of the Company and its stockholders. Capitalized terms used and not otherwise defined shall have the meanings assigned to such terms in the attached Appendix. II. Structure of the Plan Pursuant to the Plan, eligible persons may, at the discretion of the Administrator, be granted options ("Stock Options") to purchase shares of the Company's Common Stock, $.0001 par value per share (the "Common Stock"). The Stock Options granted under the Plan are intended to be either incentive stock options ("Incentive Stock Options") within the meaning of Section 422A of the Internal Revenue Code of 1986, as amended ("Code"), or options that do not meet the requirements of Incentive Stock Options ("Non-Statutory Stock Options"). III. Administration of the Plan A. The Plan shall be administered by the Board of Directors of the Company (the "Board") or, in the event the Board shall appoint and/or authorize a committee, such as the Compensation Committee, of two or more members of the Board to administer the Plan by such committee (the "Administrator"). The Administrator shall have authority to grant Stock Options upon such terms (not inconsistent with the provisions of the Plan) as the Administrator may consider appropriate. Such terms may include conditions (in addition to those contained in this Plan) on the exercisability, transferability or forfeitability of all or any part of a Stock Option, including, by way of example and not limitation, requirements that the Participant complete a specified period of employment with or service to the Company or a Related Entity, that the Company achieve a specified level of financial performance or that the Company achieve a specified level of financial return. Notwithstanding any such conditions, the Administrator may, in its discretion, accelerate the time at which a Stock Option may be exercised, transferred or become nonforfeitable. The Administrator shall have the absolute discretion to determine whether specific grants shall be of Incentive Stock Options or Non-Statutory Stock Options. In addition, the Administrator shall have complete authority to determine Fair Market Value, to interpret all provisions of the Plan, to prescribe the form of the documents evidencing the grant of Stock Options under the Plan ("Agreements"), to adopt, amend, and rescind rules and regulations pertaining to the administration of the Plan and to make all other determinations necessary or advisable for the administration of this Plan. The express grant in the Plan of any specific power to the Administrator shall not be construed as limiting any power or authority of the Administrator. Any decision made, or action taken, by the Administrator or in connection with the administration of the Plan shall be final and conclusive. Neither the Administrator nor any member of the Board shall be liable for any act done in good faith with respect to the Plan, any Agreements or Stock Options. All expenses of administering this Plan shall be borne by the Company. 1 -------------------------------------------------------------------------------- B. The Board, in its discretion, may appoint a committee of the Board and delegate to such committee all or part of the Board's authority and duties with respect to the Plan. The Board may revoke or amend the terms of a delegation at any time but such action shall not invalidate any prior actions of the Board's delegate or delegates that were consistent with the terms of the Plan. IV. Eligibility A. The persons eligible to participate in the Plan are as follows: (i) Employees, directors and officers of the Company or any Related Entity; (ii) non-employee members of the Board or non-employee members of the board of directors of any Related Entity; and (iii) consultants agents and other independent advisors who provide services to the Company or to any Related Entity. V. Stock Subject to the Plan A. Shares Issued. Upon the exercise of a Stock Option, the Company may issue to the Participant (or the Participant's broker if the Participant so directs), shares of Common Stock from its authorized but unissued Common Stock or reacquired Common Stock. B. Aggregate Limit. The maximum aggregate number of shares of Common Stock that may be issued under the Plan shall not exceed 2,000,000 shares. C. Reallocation of Shares. If a Stock Option is terminated, in whole or in part, for any reason other than its exercise, the number of shares of Common Stock allocated to the Stock Option or portion thereof may be reallocated to other Stock Options to be granted under the Plan. Unvested shares issued under the Plan and subsequently repurchased by the Company, at the option exercise or direct issue price paid per share, pursuant to the Company's repurchase rights under the Plan, shall be added back to the number of shares of Common Stock reserved for issuance under the Plan and shall accordingly be available for reissuance through one or more subsequent Stock Options under the Plan. D. Stock Split; Recapitalization. Should any change be made to the Common Stock by reason of any stock split, stock dividend, recapitalization, combination of shares, exchange of shares or other change affecting the outstanding Common Stock as a class, without the Company's receipt of consideration, appropriate adjustments shall be made to (i) the maximum number of shares of Common Stock issuable under the Plan and (ii) the number of shares of Common Stock and the exercise price per share in effect under each outstanding Stock Option, in order to prevent the dilution or enlargement of benefits thereunder. The adjustments determined by the Administrator shall be final, binding and conclusive. In no event shall any such adjustments be made in connection with the conversion of one or more outstanding shares of the Company's preferred stock into shares of Common Stock. 2 -------------------------------------------------------------------------------- ARTICLE TWO STOCK OPTION GRANTS I. Stock Option Terms Each Stock Option shall be evidenced by an Agreement, consisting of one or more documents in the form approved by the Administrator; provided, however, that each such document shall comply with the terms specified below. Each Agreement evidencing an Incentive Stock Option, shall, in addition, be subject to the provisions of the Plan applicable to Incentive Stock Options. A. Exercise Price. 1. The exercise price per share for Common Stock purchased upon the exercise of a Non-Statutory Stock Option shall be determined by the Administrator on the date of grant. 2. The exercise price per share of Common Stock purchased upon the exercise of an Incentive Stock Option shall be such amount as the Administrator shall, in its best judgement, determine to be not be less than the Fair Market Value on the date the Incentive Stock Option is granted, provided, however, that in the case of an Incentive Stock Option granted to a Participant who, at the time such Incentive Stock Option is granted owns stock of the Company or a Related Entity possessing more than ten percent (10%) of the aggregate voting power of all classes of stock of the Company or such Related Entity ("10% Stockholder"), the exercise price per share of Common Stock purchased upon the exercise of such Incentive Stock Option shall be such amount as the Administrator shall, in its best judgement, determine to be not less than one-hundred and ten percent (110%) of the Fair Market Value on the date such Incentive Stock Option is granted. 3. Unless otherwise provided by the Agreement, the exercise price shall become immediately due upon exercise of a Stock Option and shall, subject to the provisions of Section I of Article Three and the Agreement, be payable in cash or check made payable to the Company. 4. Cashless Exercise. Should the Common Stock be registered under Section 12 of the Securities Exchange Act of 1934, as amended (the "Exchange Act") at the time a Stock Option is exercised, then the exercise price may also be paid as follows: (i) in shares of Common Stock held for the requisite period necessary to avoid a charge to the Company's earnings for financial reporting purposes and valued at Fair Market Value on the exercise date, or (ii) to the extent the option is exercised for vested shares, through a special sale and remittance procedure pursuant to which the Participant shall concurrently provide irrevocable instructions (A) to a Company-designated brokerage firm to effect the immediate sale of the purchased shares and remit to the Company, out of the sale proceeds available on the settlement date, sufficient funds to cover the aggregate exercise price payable for the purchased shares plus all applicable Federal, state and local income and employment taxes required to be withheld by the Company by reason of such exercise and (B) to the Company to deliver the certificates for the purchased shares directly to such brokerage firm in order to complete the sale. 3 -------------------------------------------------------------------------------- Except to the extent such sale and remittance procedure is utilized, payment of the exercise price for the purchased shares must be made on the Exercise Date. B. Effect of Termination of Service. 1. The following provisions shall govern the exercise of any Stock Options held by a Participant at the time of cessation of Service or death: (i) Should the Participant cease to remain in Service for any reason other than death, Disability or Misconduct, then the Participant shall have a period of three (3) months following the date of such cessation of Service during which to exercise each outstanding Stock Option held by such Participant. (ii) Should Participant's Service terminate by reason of Disability, then the Participant shall have a period of six (6) months following the date of such cessation of Service during which to exercise each outstanding Stock Option held by such Participant. (iii) If the Participant dies while holding an outstanding Stock Option, then the personal representative of his or her estate or the person or persons to whom the Stock Option is transferred pursuant to the Participant's will or the laws of descent and distribution shall have a period of six (6) month following the date of the Participant's death during which to exercise each outstanding Stock Option previously held by such Participant. (iv) Under no circumstances, however, shall any such Stock Option be exercisable after the specified expiration of the option term. (v) During the applicable post-Service exercise period, the Stock Option may not be exercised in the aggregate for more than the number of vested shares for which the Stock Option is exercisable on the date of the Participant's cessation of Service. Upon the expiration of the applicable post-Service exercise period or (if earlier) upon the expiration of the option term, the Stock Option shall terminate and cease to be outstanding for any vested shares for which the Stock Option has not been exercised. However, the Stock Option shall, immediately upon the Participant's cessation of Service, terminate and cease to be outstanding with respect to any and all option shares for which the Stock Option is not otherwise at the time exercisable or in which the Participant is not otherwise at that time vested. (vi) Should Participant's Service be terminated for Misconduct, then all outstanding Stock Options held by the Participant shall terminate immediately and cease to remain outstanding. 2. The Administrator shall have the discretion, exercisable either at the time a Stock Option is granted or at any time while the Stock Option remains outstanding, to: (i) extend the period of time for which the Stock Option is to remain exercisable, following Participant's cessation of Service or death, from the limited period otherwise in effect for that Stock Option to such greater period of time as the Administrator shall deem appropriate, but in no event beyond the expiration of the option term; and/or 4 -------------------------------------------------------------------------------- (ii) permit the Stock Option to be exercised, during the applicable post-Service exercise period, not only with respect to the number of vested shares of Common Stock for which such Stock Option is exercisable at the time of the Participant's cessation of Service but also with respect to one or more additional installments in which the Participant would have vested under the Stock Option had the Participant continued in Service. C. Stockholder Rights. The holder of an option shall have no stockholder rights with respect to the shares subject to the option until such person shall have exercised the option, paid the exercise price and become the record holder of the purchased shares. D. Unvested Shares. The Administrator shall have the discretion to grant Stock Options which are exercisable for unvested shares of Common Stock. Should the Participant cease Service while holding such unvested shares, the Company shall have the right to repurchase, at the exercise price paid per share, any or all of those unvested shares. The terms upon which such repurchase right shall be exercisable (including the period and procedure for exercise and the appropriate vesting schedule for the purchased shares) shall be established by the Administrator and set forth in the document evidencing such repurchase right. E. Limited Transferability of Stock Options. During the lifetime of the Participant, the option shall be exercisable only by the Participant and shall not be assignable or transferable other than by will or by the laws of descent and distribution following the Participant's death. II. Incentive Stock Options The terms specified below shall be applicable to all Incentive Stock Options. Except as modified by the provisions of this Section II, all the provisions of Articles One, Two and Three shall be applicable to Incentive Stock Options. Stock Options which are specifically designated as Non-Statutory Stock Options shall not be subject to the terms of this Section II. A. Eligibility. Incentive Stock Options may only be granted to Employees. B. Exercise Price. The exercise price per share shall not be less than one hundred percent (100%) of the Fair Market Value per share of Common Stock on the option grant date, provided, however, that in the case of an Incentive Stock Option granted to a 10% Stockholder, the exercise price per share of Common Stock purchased upon the exercise of such Incentive Stock Option shall be such amount as the Administrator shall, in its best judgement, determine to be not less than one-hundred and ten percent (110%) of the Fair Market Value on the date such Incentive Stock Option is granted. C. Dollar Limitation. The aggregate Fair Market Value of the shares of Common Stock (determined as of the respective date or dates of grant) for which one or more Stock Options granted to any Employee under the Plan (or any other option plan of the Company or any Related Entity) may for the first time become exercisable as Incentive Stock Options during any one (1) calendar year shall not exceed the sum of One Hundred Thousand Dollars ($100,000). To the extent the Employee holds two (2) or more such Stock Options which become exercisable for the first time in the same calendar year, the foregoing limitation on the exercisability of such options as Incentive Stock Options shall be applied on the basis of the order in which such Stock Options are granted. 5 -------------------------------------------------------------------------------- D. Term of Incentive Stock Options. The maximum period in which an Incentive Stock Option shall be exercisable shall be ten (10) years from the date of grant, provided, however, that if any Employee to whom an Incentive Stock Option is granted is a 10% Stockholder, then the option term shall not exceed five (5) years measured from the option grant date. III. Corporate Transaction A. The shares subject to each Stock Option outstanding under the Plan at the time of a Corporate Transaction shall automatically vest in full so that each such Stock Option shall, immediately prior to the effective date of the Corporate Transaction, become fully exercisable for all of the shares of Common Stock at the time subject to that Stock Option and may be exercised for any or all of those shares as fully-vested shares of Common Stock. However, the shares subject to an outstanding Stock Option shall not vest on such an accelerated basis if and to the extent: (i) such Stock Option is assumed by the successor Company (or parent thereof) in the Corporate Transaction and any repurchase rights of the Company with respect to the unvested option shares are concurrently to be assigned to such successor Company (or parent thereof) or (ii) such Stock Option is to be replaced with a cash incentive program of the successor Company (or parent thereof) which preserves the spread existing on the unvested option shares at the time of the Corporate Transaction and provides for subsequent payout in accordance with the same vesting schedule applicable to those unvested option shares or (iii) the acceleration of such Stock Option is subject to other limitations imposed by the Administrator at the time of the option grant. B. All outstanding repurchase rights shall also terminate automatically, and the shares of Common Stock subject to those terminated rights shall immediately vest in full, in the event of any Corporate Transaction, except to the extent: (i) those repurchase rights are assigned to the successor Company (or parent thereof) in connection with such Corporate Transaction or (ii) such accelerated vesting is precluded by other limitations imposed by the Administrator at the time the repurchase right is issued. C. Immediately following the consummation of the Corporate Transaction, all outstanding Stock Options shall terminate and cease to be outstanding, except to the extent assumed by the successor Company (or parent thereof). D. Each Stock Option which is assumed in connection with a Corporate Transaction shall be appropriately adjusted, immediately after such Corporate Transaction, to apply to the number and class of securities which would have been issuable to the Participant in consummation of such Corporate Transaction had the Stock Option been exercised immediately prior to such Corporate Transaction. Appropriate adjustments shall also be made to (i) the number and class of securities available for issuance under the Plan following the consummation of such Corporate Transaction and (ii) the exercise price payable per share under each outstanding Stock Option, provided, however, that the aggregate exercise price payable for such securities shall remain the same. 6 -------------------------------------------------------------------------------- E. The Administrator shall have the discretion, exercisable either at the time a Stock Option is granted or at any time while a Stock Option remains outstanding, to structure one or more Stock Options so that those Stock Options shall automatically accelerate and vest in full (and any repurchase rights of the Company with respect to the unvested shares subject to those Stock Options shall immediately terminate) upon the occurrence of a Corporate Transaction, whether or not those Stock Options are to be assumed in the Corporate Transaction. F. The Administrator shall also have full power and authority, exercisable either at the time the Stock Option is granted or at any time while the Stock Option remains outstanding, to structure such Stock Option so that the shares subject to that Stock Option will automatically vest on an accelerated basis should the Participant's Service terminate by reason of an Involuntary Termination within a designated period (not to exceed eighteen (18) months) following the effective date of any Corporate Transaction in which the Stock Option is assumed and the repurchase rights applicable to those shares do not otherwise terminate. Any Stock Option so accelerated shall remain exercisable for the fully-vested option shares until the expiration or sooner termination of the option term. In addition, the Administrator may provide that one or more of the Company's outstanding repurchase rights with respect to shares held by the Participant at the time of such Involuntary Termination shall immediately terminate on an accelerated basis, and the shares subject to those terminated rights shall accordingly vest at that time. G. The portion of any Incentive Stock Option accelerated in connection with a Corporate Transaction shall remain exercisable as an Incentive Stock Option only to the extent the applicable One Hundred Thousand Dollar limitation is not exceeded. To the extent such dollar limitation is exceeded, the accelerated portion of such Incentive Stock Option shall be exercisable as a Non-Statutory Option under the Code. H. The grant of Stock Options under the Plan shall in no way affect the right of the Company to adjust, reclassify, reorganize or otherwise change its capital or business structure or to merge, consolidate, dissolve, liquidate or sell or transfer all or any part of its business or assets. IV. Cancellation and Regrant of Stock Options The Administrator shall have the authority to effect, at any time and from time to time, with the consent of the affected Participants, the cancellation of any or all outstanding Stock Options under the Plan and to grant in substitution therefor new Stock Options covering the same or different number of shares of Common Stock but with an exercise price per share based on the Fair Market Value per share of Common Stock on the new option grant date. 7 -------------------------------------------------------------------------------- ARTICLE THREE MISCELLANEOUS I. Financing The Administrator may permit any Participant to pay the option exercise price upon exercise of a Stock Option by delivering a full-recourse, interest bearing promissory note payable in one or more installments and secured by the purchased shares. The terms of any such promissory note (including the interest rate and the terms of repayment) shall be established by the Administrator in its sole discretion. In no event may the maximum credit available to the Participant exceed the sum of (i) the aggregate option exercise price (less the par value of those shares) plus (ii) any Federal, state and local income and employment tax liability incurred by the Participant in connection with the option exercise. II. Effective Date and Term of Plan A. The Plan shall become effective on the date on which it is adopted by the Board (the "Effective Date"), provided, however, that if the Plan is not approved by a vote of the stockholders of the Company within twelve (12) months after the Effective Date, the Plan and any Benefits granted under the Plan shall terminate. B. The Plan shall terminate upon the earliest of (i) December 31, 2011, (ii) the date on which all shares of Common Stock available for issuance under the Plan shall have been issued as vested shares or (iii) the termination of all outstanding Stock Options in connection with a Corporate Transaction. Upon such Plan termination, all Stock Options and unvested stock issuances outstanding under the Plan shall continue to have full force and effect in accordance with the provisions of the Agreements. III. Amendment of the Plan A. The Board shall have complete and exclusive power and authority to amend or modify the Plan in any or all respects. However, no such amendment or modification shall adversely affect the rights and obligations with respect to Stock Options or unvested stock issuances at the time outstanding under the Plan unless the Participant or the Participant consents to such amendment or modification. In addition, certain amendments may require stockholder approval pursuant to applicable laws and regulations. B. Stock Options may be granted under the Plan which are in excess of the number of shares of Common Stock then available for issuance under the Plan, provided any excess shares actually issued shall be held in escrow until there is obtained stockholder approval of an amendment sufficiently increasing the number of shares of Common Stock available for issuance under the Plan. If such stockholder approval is not obtained within twelve (12) months after the date the first such excess grants are made, then (i) any unexercised Stock Options granted on the basis of such excess shares shall terminate and cease to be outstanding and (ii) the Company shall promptly refund to the Participants the exercise or purchase price paid for any excess shares issued under the Plan and held in escrow, together with interest (at the applicable Short Term Federal Rate) for the period the shares of Common Stock were held in escrow, and such shares shall thereupon be automatically cancelled and cease to be outstanding. 8 -------------------------------------------------------------------------------- IV. Use of Proceeds Any cash proceeds received by the Company from the sale of shares of Common Stock under the Plan shall be used for general corporate purposes. V. Withholding The Company's obligation to deliver shares of Common Stock upon the exercise of any Stock Options under the Plan shall be subject to the satisfaction of all applicable Federal, state and local income and employment tax withholding requirements. VI. Regulatory Approvals The implementation of the Plan, the granting of any Stock Options under the Plan and the issuance of any shares of Common Stock upon the exercise of any Stock Option shall be subject to the Company's procurement of all approvals and permits required by regulatory authorities having jurisdiction over the Plan and the Stock Options granted under it. VII. No Employment or Service Rights Nothing in the Plan shall confer upon a Participant any right to continue in Service for any period of specific duration or interfere with or otherwise restrict in any way the rights of the Company (or any Related Entity employing or retaining a Participant), which rights are hereby expressly reserved, to terminate a Participant's Service at any time for any reason, with or without cause. 9 -------------------------------------------------------------------------------- APPENDIX The following definitions shall be in effect under the Plan: A. Board shall mean the Company's Board of Directors. B. Committee shall mean a committee of two (2) or more Board members appointed by the Board to exercise one or more administrative functions under the Plan. C. Corporate Transaction shall mean either of the following stockholder-approved transactions to which the Company is a party: (i) a merger or consolidation in which securities possessing more than fifty percent (50%) of the total combined voting power of the Company's outstanding securities are transferred to a person or persons different from the persons holding those securities immediately prior to such transaction, or (ii) the sale, transfer or other disposition of all or substantially all of the Company's assets in complete liquidation or dissolution of the Company. D. Disability shall mean the inability of the Participant to engage in any substantial gainful activity by reason of any medically determinable physical or mental impairment and shall be determined by the Administrator on the basis of such medical evidence as the Administrator deems warranted under the circumstances. E. Employee shall mean an individual who is in the employ of the Company (or any Related Entity), subject to the control and direction of the employer entity as to both the work to be performed and the manner and method of performance. F. Fair Market Value per share of Common Stock on any relevant date shall be determined in accordance with the following provisions: (i) If the Common Stock is at the time traded on the Nasdaq National Market, the SmallCap Market or the OTC Bulletin Board, then the Fair Market Value shall be the closing selling price per share of Common Stock on the date in question, as such price is reported on the Nasdaq National Market, the SmallCap Market or the OTC Bulletin Board, as the case may be. If there is no closing selling price for the Common Stock on the date in question, then the Fair Market Value shall be the closing selling price on the last preceding date for which such quotation exists. (ii) If the Common Stock is at the time listed on any Stock Exchange, then the Fair Market Value shall be the closing selling price per share of Common Stock on the date in question on the Stock Exchange determined by the Administrator to be the primary market for the Common Stock, as such price is officially quoted in the composite tape of transactions on such exchange. If there is no closing selling price for the Common Stock on the date in question, then the Fair Market Value shall be the closing selling price on the last preceding date for which such quotation exists. (iii) If the Common Stock is at the time neither listed on any Stock Exchange nor traded on the Nasdaq National Market or SmallCap Market or the OTC Bulletin Board, then the Fair Market Value shall be determined by the Administrator after taking into account such factors as the Administrator shall deem appropriate. 10 -------------------------------------------------------------------------------- G. Involuntary Termination shall mean the termination of the Service of any individual which occurs by reason of: (i) such individual's involuntary dismissal or discharge by the Company for reasons other than Misconduct, or (ii) such individual's voluntary resignation following (A) a change in his or her position with the Company which materially reduces his or her duties and responsibilities or the level of management to which he or she reports, or (B) a reduction in his or her level of compensation (including base salary, fringe benefits and target bonuses under any corporate-performance based bonus or incentive programs) by more than thirty percent (30%). H. Misconduct shall mean the commission of any act of fraud, embezzlement or dishonesty by a Participant, any unauthorized use or disclosure by such person of confidential information or trade secrets of the Company (or any Related Entity), or any other intentional misconduct by such person adversely affecting the business or affairs of the Company (or any Related Entity) in a material manner. The foregoing definition shall not be deemed to be inclusive of all the acts or omissions which the Company (or any Related Entity) may consider as grounds for the dismissal or discharge of any Participant, Participant or other person in the Service of the Company (or any Related Entity). I. Administrator shall mean either the Board or the Committee acting in its capacity as administrator of the Plan. J. Service shall mean the provision of services to the Company (or any Related Entity) by a person in the capacity of an Employee, a non-employee member of the board of directors or a consultant or independent advisor, except to the extent otherwise specifically provided in the documents evidencing the option grant. K. Stock Exchange shall mean either the American Stock Exchange or the New York Stock Exchange. L. 10% Stockholder shall mean the owner of stock (as determined under Code Section 424(d)) possessing more than ten percent (10%) of the total combined voting power of all classes of stock of the Company (or any Related Entity). -------------------------------------------------------------------------------- Exhibit 21.1 List of Subsidiaries State of Subsidiary Incorporation Doing Business AS Hipstyle.com, Inc. Delaware Hipstyle.com, Inc. CCS International, Ltd. Delaware CCS International, Ltd. Counter Spy Shop of Mayfair London, Ltd. DC Counter Spy Shop of Mayfair London, Ltd. Counter Spy Shop of Mayfair London, Ltd., Inc. Florida Counter Spy Shop of Mayfair London, Ltd Counter Spy Shop of Mayfair London, Ltd. CA Counter Spy Shop of Mayfair London, Ltd. Spy Shop Ltd. NY Counter Spy Shop of Delaware Security Design Group, Inc. NY Security Design Group, Inc. 12 -------------------------------------------------------------------------------- Exhibit 10.4 LEASE AGREEMENT THIS LEASE AGREEMENT, made this _____ day of June, 2000 between Rotterdam Ventures, Inc. d/b/a/ Galesi Enterprises, having its principal office at 145 Huguenot Street, New Rochelle, New York 10801 (Lessor) and CCS International Ltd., having its office at 360 Madison Avenue, New York, NY 10017 (Lessee). WITNESSETH WHEREAS, Lessor is the owner of that certain tract of land with building and improvements thereon erected commonly known as 145 Huguenot Street (hereinafter referred to as the Premises). New Rochelle, New York; and WHEREAS, Lessee desires to rent a portion of the premises for the conduct of its business; NOW THEREFORE, in consideration of the payment by Lessee of the rent hereinafter reserved and the mutual performance of the covenants and conditions hereinafter set forth, Lessor does hereby let the demise unto Lessee and Lessee does hereby take and hire from Lessor, a certain portion of the Lessor's premises (hereinafter referred to as the "leased premises"), located on the 3rd floor of 145 Huguenot Street, comprising approximately 2,665 square feet of rentable space and 6375 square feet of rentable space on the Mezzanine Level. Lessor shall perform the construction required for the leased premises as set forth in Exhibit C. 1. TERM: This lease is for a term of 10 years and three months, commencing on or about August 1, 2000 assuming the leased premises (suite 310) are outfitted and ready for occupancy by Lessee (as defined in Paragraph 10 thereof) and expiring October 31, 2010 unless renewed or shall end on such earlier date or be canceled or terminated pursuant to the provisions of this lease agreement or pursuant to law. The Mezzanine suite will be ready for occupancy on July 1, 2000. -------------------------------------------------------------------------------- 2. RENTAL SCHEDULE: Suite 310 Mezzanine Year 1: $17.25/sf $9.50/sf Year 2: $17.50/sf $10.00/sf Year 3: $17.77/sf $10.50/sf Year 4: $18.03/sf $11.00/sf Year 5: $18.30/sf $11.50/sf Year 6: $18.58/sf $12.00/sf Year 7: $18.86/sf $12.50/sf Year 8: $19.14/sf $13.00/sf Year 9: $19.43/sf $13.50/sf Year 10: $19.72/sf $14.00/sf These rates do not include electric, or air conditioning. The Lessee shall pay a "late charge" of 2% per month from the due date, which shall be the First of each month, or any installment of rental (Fixed Minimum, or other as may be construed as rent) if said rental payment is made more than ten (10) days after its due date. Lessee to receive three (3) months free rent at the start of the lease term. Lessee will be responsible for electric charges during the abatement period. B) The rentable area set forth above has been determined from the plans of the leased premises. If Lessee should expand its area of actual occupancy such that there should be variance between said plans and the actual rentable area occupied by Lessee, then promptly upon notice by Lessor to Lessee of such variance, the parties shall enter into a recordable agreement to reflect such change and the Fixed Rent shall be adjusted in accordance therewith. C) The Lessor reserves the right upon mutual consent and sixty (60) days notice, to relocate the Lessee to other space in the Building, which space shall be comparable in size and configuration to the presently Demised Premises and the decor of the "New" Premises shall be at least equal to or superior to the presently Demised Premises under this lease. This request shall be in writing and does not require Lessee's written approval. All relocation costs, remodeling, etc., shall be borne by the Lessor and all terms and covenants of this lease shall remain unchanged and in full effect except as noted below. Depending upon the term of the lease, the parties reserve the right with mutual assent to enter renegotiation discussions regarding the term of the lease. -------------------------------------------------------------------------------- D) The monthly fixed rental payments shall be paid in advance, without notice, on or before the first day of each calendar month following the Commencement Date and each month thereafter during the term of this lease or any renewal thereof (except that Lessee shall pay, upon the execution and delivery of this lease agreement by Lessee, the sum of $8,877.81 to be applied against the first installment of Fixed Rent becoming due under this Lease). Lessee covenants that the Fixed Rent shall be paid promptly to Lessor, at Lessee's option by mail or in person either at the offices of Lessor at 145 Huguenot Street, New Rochelle, New York or to such other person or at such other pace as Lessor may designate, in lawful money of the United States, without notice, demand or abatement (except an abatement expressly provided for in this lease) and without any setoff or deduction whatsoever. Lessee further covenants that any Additional Rent hereinafter provided for shall be paid to Lessor in the same manner and subject to the same conditions, covenants and requirements as provided for the payment of the Fixed Rent, on or before the first day of the first calendar month or within 10 day grace period following demand therefore (unless otherwise specifically provided in this lease). 3. USE OF PREMISES: Lessee will use and occupy the leased premises (suite 310) as executive, office, conference center and general office and on the Mezzanine, will engineer, assemble and service computer related devises for its lawful business purposes. Lessee will comply with any and all laws, ordinances rules, orders and regulations of any governmental authority which are applicable to the conduct of Lessee's business on the leased premises. The parties agree not to hinder the operational activities of either party within such common areas as the Plaza entrance and Lobby, elevators, fire access lanes, driveways, turn-around areas, parking, loading, unloading and shall mutually observe the restricted areas of either party or other tenants on the Premises. -------------------------------------------------------------------------------- 4. TAXES & ASSESSMENTS-UTILITY CHARGES & OPERATING SERVICES: A) During the term of this lease agreement Lessee shall pay as Additional Rent its pro rata share of any real estate tax ("Tax") which is in excess of the real estate tax imposed or assessed on the same for the base tax year. The base tax year shall be the period January through December 2001. 1) Lessee's share of any increased Tax shall be due and payable 30 days after presentation of appropriate Tax statements showing that such Tax is due and substantiating Tax receipts by Lessor. 2) The Lessee's proportionate share of any Tax increase shall be 3.23%. In the event that the amount of space rented by Lessee shall increase or decrease, the share of Tax paid by Lessee shall be proportionately increased or decreased. 3) The terms "Tax" or "Taxes" shall mean the total of all real estate taxes and special assessments levied or imposed against the Premises, together with any franchise, income, profit or other tax, however designated, which is, due to a future change in the method of taxation, substituted in full or in part for or in lieu of such real estate tax but not including interest or penalties, including but not limited to any new tax of a nature not presently in effect but which may be hereinafter levied, assessed or imposed on the Lessor, or the Premises, if such tax shall be based or arise out of the ownership, use or operation of the premises. Under no circumstances, however, shall "Tax" or "Taxes" include income tax or franchise tax due in respect of Lessor's business or that of its partners or ventures. 4) Notwithstanding anything herein to the contrary, if any act of the Lessee results in the increase of real estate taxes payable by the Lessor, the full amount of such increase shall be charged to the Lessee and paid as Additional Rent hereunder. -------------------------------------------------------------------------------- B) During the term of this lease agreement or any renewal or extension thereof, Lessee shall pay for the following utilities required for its operations: 1) All telephone equipment, installation and usage to be billed direct to the account of the lessee by the utility. 2) Lessor shall cause hot and cold water for ordinary lavatory, cleaning, drinking and toilet facility purposes to be furnished at no expense to Lessee. In the event that Lessee requires water to be furnished in addition to such hot and cold water, Lessor shall cause the same to be supplied and Lessee shall pay the cost thereof as measured by a meter or meters in stalled by Lessor at Lessee's expense, and if no such meter can be installed with respect to hot water, the reasonable charge for heating such water (not to exceed Lessor's cost therefore). Lessee shall also pay any sewer rent attributable to the use of such additional water and all such water charges and sewer rents shall be paid by Lessee as Additional Rent within thirty (30) days after rendition of a bill therefore accompanied by appropriate documentation and substantiating receipts by Lessor. 3) Lessor shall provide Lessee with electric energy. Lessee to pay for electric energy on a rent inclusion basis with the additional rent inclusion factor being $2.25 per square foot per annum for the 2665 rentable square feet on the 3rd floor and 4075 rentable square feet on the Mezzanine. Lessee to pay $1.25 per rentable square foot for 2,300 rentable square feet of storage area on the Mezzanine. C) Lessee agrees to pay as Additional Rent 3.23% of the cost of any increases to the "Operating Costs" that may be incurred during every calendar year or part thereof during the term of this lease which shall be in excess of the operating costs for the calendar year 2001 based on full occupancy of the Premises (hereinafter referred to as the operating base year). In the event that the amount of space rented by Lessee shall increase or decrease, the share of maintenance costs paid by Lessee shall be proportionately increased or decreased. "Operating Costs" shall include Lessor's reasonable costs or contribution to costs incurred in good faith for: -------------------------------------------------------------------------------- 1) Wages and salaries paid by or contributed to by Lessor, and contract costs paid to independent contractors utilized by Lessor for the normal operation, maintenance and repair of the Premises, including Social Security taxes, Unemployment Insurance taxes, worker's compensation payments, payments required by any union rule or regulation, and other provisions imposed by law, together with any employee "fringe benefits" incurred by Lessor; 2) Management charges provided same are not in excess of such charges customarily charged in similar buildings in Westchester County; 3) Uniforms of employees specified in subparagraph (1) above and the cleaning and pressing thereof; 4) Repairs to, replacement of and physical maintenance of the Premises and its equipment and appurtenances; and additions and improvements required by law; and the cost of supplies and equipment used in connection therewith; and the cost of painting in public and common areas; 5) Premiums and other charges by Lessor with respect to insurance of all kinds for the Premises which Lessor determines to be reasonably necessary at its sole discretion and which Lessor in good faith pays and incurs; 6) Costs incurred for fuel or other energy for heating the premises and operating the air conditioning system, for electricity, steam, or other power required in connection with the operation or the Premises; it being understood that this shall not include costs for which Lessor is reimbursed by other tenants (including electric energy paid for by rent inclusion); -------------------------------------------------------------------------------- 7) Costs incurred in connection with inspection and servicing of the Premises, its appurtenances and equipment; 8) Water and sewer charges, except as specified in Paragraph 4 (B,2) above; 9) Any other tax or expense, direct or indirect, incurred by Lessor in connection with the operation, maintenance and repair of the Premises, its appurtenances and equipment. 10) Attorney's and auditing fees necessarily incurred in connection with the maintenance and operation of the Premises, and accounting fees incurred in connection with the preparation of Expense Control Statements, as well as expenses incurred (including attorney's fees) with respect to efforts to obtain a reduction in the annual assessed valuation of the Premises, but with attorney's fees therefore not in excess of the amount of the resulting decrease in Taxes; 11) Operating costs shall be "net" only, and for that purpose shall be deemed reduced by the amounts of any insurance reimbursement, other reimbursement, recoupment payment, discount, credit, reduction, allowance, or the like, received by Lessor in connection with such operating costs. 12) Notwithstanding anything contained herein and without limiting the generality of the foregoing, the following costs shall be not be including in operating costs: a) The cost of painting, repainting, decorating or redecorating for any Lessee of the Premises or of providing for any such Lessee special cleaning services; b) Any renting commissions or collection expense; c) The cost of making any installations, changes or alterations for existing or incoming leases; d) Expenditures for improvements and replacements which under generally accepted accounting principles and practice should be classified as capital expenditures except that there shall be included: -------------------------------------------------------------------------------- i) any capital expenditure for improvements the purpose of which is to realize savings of costs in the maintenance and operation of the Premises; such expenses shall be included in the operation costs, amortized on a straight line basis over the period of time reasonably anticipated to result in a saving in operating costs, equal to the amount of such expenditure; and ii) any capital expenditure made after the operating base year in compliance with the requirement of any Federal, State or local law or governmental regulation, as, for example, the Federal Occupational, Safety and Health Act, to the extent of the reasonable amortization (with interest) for the cost of same; iii) periodic capital expenditures which under generally accepted accounting principles and practice are regarded as normal building operating expenses in major office buildings; iv) if, by reason of installation of labor saving devices or otherwise, any items which are included in Lessor's Operating Base year shall be eliminated in any later year, then for the purpose of computing Operating Costs for such later year such items shall be deemed to be eliminated during the Operating Base Year. 13) The Lessor's "Expense Control Statement" shall set forth the amount of the above items of operating costs for the operating base year and for the operating base year and for each year of increased cost and shall be in sufficient detail to substantiate the amount of the increase and the amount to be paid by Lessee. The Lessor or its Certified Public Accountants shall attest to the applicable increased costs and the increase to be paid by the Lessee. If Lessor shall not have delivered to Lessee the statement mentioned herein for any year, Lessee shall continue to pay Lessor the sums payable for the immediately preceding calendar year until the statement for the then current calendar year shall have been delivered, at which time the monthly payments by Lessee shall be adjusted retroactively. Lessor shall permit Lessee to audit and verify the same on reasonable request by Lessee, allow Lessee's representatives to examine the records and receipts pertaining to the costs referred to in the Expense Control Statement and shall confer with Lessee in an effort to in good faith resolve any disputes. Notwithstanding any other provisions in this lease, only one Expense Control Statement shall be issued in respect of any one year and it shall be issued within one year after the end of the year to which it pertains. -------------------------------------------------------------------------------- 14) All such increased payments shall be prorated for any partial calendar years during the term of this lease agreement. D) The amounts due under Section 4, Paragraphs (A), (B), and (C) hereof shall be paid by Lessee and collectible as Additional Rent without setoff or deduction and shall be paid within thirty (30) days after written demand by Lessor accompanied by the documentation required by this lease except that at lessor's option, Lessee shall pay the Lessor, on demand, in advance, a sum equal to one-twelfth (1/12) of any amounts due by reason hereof multiplied by the number of months of the calendar year then elapsed, and one-twelfth (1/12) of such in respect of the then current month, and thereafter one-twelfth (1/12) in respect of each succeeding month in the applicable year on each monthly rent day, and Lessee shall be entitled to a credit for the amount so paid in advance against the escalation shown due at the end of each such year. -------------------------------------------------------------------------------- E) Lessor's failure during the lease term to prepare and deliver any of the foregoing tax bills, statements or bills, or Lessor's failure to make a demand, shall not in any way result in or cause Lessor to forfeit or surrender its rights to collect any of the foregoing items of Additional Rent which may have become due during the term of this lease agreement. F) Lessee's liability for the amounts due under this Paragraph shall survive the expiration of the term. In no event shall any rent adjustment hereunder result in a decrease in the fixed annual rent. -------------------------------------------------------------------------------- 5. ELECTRICAL SYSTEM & SERVICE: A) The Lessor shall provide to the Lessee the installed or connected electrical system and related equipment for the leased premises. Any relocation, addition or alteration of the system beyond the building standard, done at the request of Lessee after the leased premises are outfitted as provided by the lease, shall be at the Lessee's expense. B) Lessor shall not be liable to Lessee at any time for any loss, damage, or expense resulting from any change in the quantity or character of the electrical service furnished to the premises by the electric utility; by the cessation or interruption of the supply of current by the electric; nor shall any such loss, damage or expense, or non-suitability, non-availability, cessation or interruption in the supply of electric service or current by the electric utility in any way affect the tenancy or in any way relieve Lessee of any obligation arising under the terms of the lease agreement. C) In order that the personal safety and property of the occupants and owner of the Premises may not be imperiled by the over-taxing of the capacity of the existing electrical distribution system, Lessee agrees not to make any alterations or additions to the electrical equipment, appliances, fixtures or other machinery utilizing electric power (other than lamps, lighting, typewriters, word processing equipment, document reproduction equipment, telephone facsimile and communications equipment, refrigerator, microwave, television and VCR, personal computers, IBM or similar computer equipment, and other normal or small office machines) without obtaining the prior written consent of Lessor in each instance. Lessor shall provide feeders and wiring necessary for Lessee's equipment as provided by this lease and Lessee covenants and agrees that at all times its use of electric current shall never exceed the capacity of such existing feeders or any wiring installation in the leased premises. D) Replacement lamps/starters for all lighting fixtures shall be for the Lessor's account. 6. HEATING, VENTILATING & AIR CONDITIONING SYSTEM & SERVICE: A) Lessor shall provide heating, air conditioning, and year round ventilating system into the interior areas, temperature conditions of 68 degrees F. dry bulb when the outside is 0 degrees F., and 75 degrees F. dry bulb when the outside temperature is 95 degrees F. Any change in location of diffusers or peripheral system unit, control valves, thermostats and openings in the demising wall to the slave to allow for the transfer of return air within the plenum, done at the request of Lessee after the leased premises are outfitted as provided by this lease, shall be for the account of the Lessee. -------------------------------------------------------------------------------- B) Lessor shall provide the above levels of HVAC throughout the year, in accordance with the Regular Business Hours of the premises (which shall be Monday through Friday, 7:00 a.m. to 6:00 p.m.). For any usage beyond the above time for HVAC equipment not included in Lessee's sub meter, the Lessee shall compensate the Lessor for the actual cost of Lessee's actual usage at the Lessor's then current hourly rate (currently $75.00); such charges to be billed by the Lessor and paid by Lessee monthly as Additional Rent. Lessee shall give notice prior to 4:00 p.m. in the case of service on working days and prior to 4:00 p.m. on Fridays (or the preceding working day, in the case of holidays) in the case of such service on days other than working days. C) Lessee agrees to keep and cause to be kept closed all windows in the leased premises and to close the blinds when necessary because of the sun's position, and Lessee agrees at all times to cooperate fully with the Lessor's energy conservation measures and to abide by all reasonable regulations and requirements which Lessor may prescribe for the proper functioning and protection of the HVAC system. D) Lessee agrees that in the event its occupancy level or electrical load or both shall exceed the design capacity, the cost to Lessor of providing the necessary additional HVAC capacity, including but not limited to any necessary equipment, duct work or the like together with the cost of operation thereof, shall be for the account of Lessee and shall be payable by Lessee to Lessor, based upon the capacity of such additional equipment or the cost of otherwise providing such additional capacity. Lessor shall furnish Lessee in writing with an estimate of the cost of any such additional HVAC equipment together with the additional monthly amount for operating any additional capacity, and shall receive Lessee's written approval thereof prior to providing such additional HVAC capacity. -------------------------------------------------------------------------------- E) Lessor, through the term of this lease agreement, shall have free unrestricted access to any and all HVAC equipment in the leased premises upon reasonable notice. Lessor reserves the right to interrupt, curtail, stop or suspend such HVAC equipment when necessary by reason of accident, or repairs, alterations or improvements that are in the judgment of Lessor to be desirable or necessary to be made. No diminution or abatement of rent or other compensation shall or will be claimed by Lessee, nor shall the lease agreement or any of the obligations of Lessee be affected or reduced by reason of interruption or curtailment of such HVAC, when such interruption or curtailment or stoppage or suspension shall be due to failure to electric power or accident, or to repairs, alterations or improvements that are in the reasonable judgment of Lessor desirable or necessary to be made, or to difficulty or inability in securing supplies or labor, or to strikes, or to any other cause beyond the reasonable control of Lessor, whether such other cause be similar or dissimilar to those herein before specifically mentioned. F) Lessor shall not be required to furnish, and Lessee shall not be entitled to receive, any HVAC service during any period wherein Lessee shall be in default beyond the applicable notice period in the payment of rent as specified in the lease agreement. 7. INSURANCE - INDEMNITY: A) Lessor shall procure and maintain all insurance which it deems necessary for its protection against loss or damage to the leased premises or any other property of Lessor situated thereon. B) Nothing contained in this lease agreement shall be construed to require either party to repair, replace, reconstruct, or pay for any property of the other party which may be damaged or destroyed by fire, flood, windstorm, earthquake, strikes, riots, civil commotions, acts of public enemy, act of God, or other casualty, and each party hereby waives all claims against the other for all loss or damage arising out of perils normally insured against by standard fire and extended coverage insurance. -------------------------------------------------------------------------------- C) Neither party nor any agent or employee of either party shall be liable for: 1) Loss of or damage to any property of the other party, or of any entity within the other party's control, or injury to any entity (if a person) within the other party's control, from any cause whatsoever, unless caused by or due to the party's gross negligence; 2) Any damage referred to in (a) above caused by other occupants or person in the premises or by construction of any private, public or quasi-public work; or 3) Any latent defect in the leased premises or the Premises and Lessee shall not be entitled to any compensation therefore or for abatement of Rent or to any release of any of Lessee's obligations under this lease so long as such defect remains latent; nor shall the same constitute an eviction. D) Lessee and Lessor shall indemnify each other, defend and hold the other party harmless against and from all liability referred to in (a) above arising out of any action brought by any entity within the party's control, which, for purposes of this paragraph, shall include the party's agents, employees, contractors and invitees. E) Lessee shall reimburse and compensate Lessor as Additional Rent, within five (5) days after rendition of a statement for all expenditures (except attorneys' fees) made by, or damages or fines sustained or incurred due to non-performance of or non-compliance with or breach by or failure to observe any term, covenant or condition of this Lease upon such party's part to be kept, observed, performed or complied with. F) Lessee shall save Lessor harmless and indemnify it from and against all injury, loss, claims, or damages (except attorneys' fees) to any person or property while on the Premises arising out of use or occupancy of the leased premises by the party or its employees, suppliers, contractors or agents and from and against all injury, loss, claim or damage to any person or property anywhere occasioned by any act, neglect or default of the party or its employees, suppliers, contractors or agents and from and against all injury, loss, claim or damage to any person or property anywhere occasioned by any act, neglect or default of the party or its employees, suppliers, contractors or agents. Lessee covenants and agrees that during the term of this lease agreement it will provide and keep in force general public liability insurance protecting and indemnifying persons and property in or about the leased premises and in the Premises throughout and the connecting corridors thereof to the limit of not less than one million ($1,000,000.00) dollars in respect of any one occurrence and three million ($3,000,000.00) dollars for bodily injury or death to any number of person in any one occurrence and to the limit of not less than one million ($1,000,000.00) dollars for property damage. Lessee shall provide, or cause to be provided, Worker's Compensation Insurance covering all persons employed in connection with the performance of work upon, in or about the leased premises and the Premises throughout the connecting corridors thereof (exclusive of work being done by Lessee as provided by this lease). All such insurance shall be effected in standard form under valid, enforceable policies issued by insurers of recognized responsibility and licensed to do business in the State of New York and shall, except in the case of Worker's Compensation Insurance, name Lessor and Lessee as the insured as their respective interests may appear. Certificates of such insurance shall be delivered to Lessor from time to time during the term of this lease then (10) days prior to the expiration date of the previous policy together with certificates evidencing the renewal of such policy with satisfactory evidence of payment of the premium on such policy. To the extent obtainable, all such policies shall contain agreements by the insurers that (i) such polices shall not be canceled except upon ten (10) days prior written notice to each named insured and (ii) the coverage afforded thereby shall not be affected by the performance of any work upon, in or about the leased premises. -------------------------------------------------------------------------------- G) If by reason of any improper act of Lessee there shall be an increase in the insurance premiums applicable to the Premises, or the Lessor shall incur any other expense by reason thereof, Lessee shall pay such increase or expense to the Lessor on the first day of the month immediately following the submission of a bill or statement by Lessor to the Lessee for the same. -------------------------------------------------------------------------------- 8. PREPARATION OF THE LEASED PREMISES: A) The Lessor shall provide and install in the leased premises those items as specified in Exhibit C (Work Letter) in a workman like manner. B) The Lessor's agreement to do the work in the leased premises as set forth in the "Work Letter" shall not require it to incur overtime costs and expenses and shall be subject to unavoidable delays due to acts of God, governmental restrictions, strikes, labor disturbances, shortages of materials and supplies and for any other causes or events beyond Lessor's reasonable control. Lessor has made, and makes, no representation as to the date when the leased premises will be ready for Lessee's occupancy. 9. OTHER LEASEHOLD IMPROVEMENTS BY LESSEE: A) Lessee shall have the right, with the prior written consent of Lessor (except that decorative improvements including painting, wall coverings, carpeting and non-structural work shall require only prior notice to Lessor), and at Lessee's sole expense, to make alterations or improvements in or to the leased premises as it shall consider necessary or desirable for the conduct of its business, provided that all such work shall be done in a good and workmanlike manner, that the structural integrity of the Premises shall not be impaired, and no liens shall attach to the leased premises by reason thereof and provided also that all requirements of governmental authorities be complied with. B) With respect to other improvements by the Lessee requiring Lessor's written consent, Lessee shall prepare at its expense the outline drawings and specifications indicating the alterations, modifications or any other improvements to be made to the leased premises by the Lessee. All such plans shall conform to the conditions outlined herein and as may be reasonably established by Lessor. C) The Lessee shall submit the plans and specifications to the Lessor for review and approval prior to the start of any work. The Lessor's approval or conditioned acceptance of the improvements shall be within ten (10) days after receipt. -------------------------------------------------------------------------------- D) With respect to other improvements by the Lessee requiring Lessor's written consent, the Lessee, at the expense of the Lessee, shall file the appropriate plan with the appropriate Municipal Building Department and obtain approval and occupancy or other permits for the Lessee. No work shall commence until the above approvals have been received. E) With respect to other improvements by the Lessee requiring Lessor's written consent, Lessee shall furnish a copy to Lessor of any construction contracts with contractors who will perform the Lessee's improvements to the leased premises. The Lessor shall have the right to inspect and to insure: 1) That the work will be done in accordance with the approved plans and specifications and the consents, authorizations and licenses obtained; 2) That the contractor or other persons performing the work and furnishing materials will look solely to Lessee for payment and will hold Lessor and the leased premises and the Premises containing the leased premises free from all liens and claims of all person furnishing labor or materials therefore, or both; 3) The qualified and skilled tradesmen only shall be used in performance of Lessee's leasehold improvement. 4) Any mechanic's lien filed against the leased premises or the Premises for work claim to have been done or materials furnished to Lessee shall be discharged by Lessee, at its expense, within fifteen (15) days after notice from lessor to such effect. For the purposes hereof, the bonding of such lien by a reputable casualty insurance company shall be deemed the equivalent of a discharge of such mechanic's lien. Should Lessee fail to comply with the provisions of this paragraph, Lessor will procure the discharge of such mechanic's lien and charge the expense thereof (including attorneys' fees) to Lessee as Additional Rent. -------------------------------------------------------------------------------- 5) Contractors doing Lessee's work shall employ only such labor as will not result in jurisdictional disputes or strikes or otherwise cause labor discord with respect to the Premises. F) Lessee or its employees, suppliers, contractors or agents agree to indemnify and save Lessor harmless against any and all bills for labor performed and equipment, fixtures and materials installed on the Premises containing the same and from and against all losses, damages, costs, expenses, suits and claims whatsoever in connection with the access to the Premises and to the Lessee's leasehold improvements in the leased premises. The cost of Lessee's leasehold improvements shall be paid for in cash or its equivalent, so that the leased premises and the Premises containing the same shall at all times be free of liens for labor and materials supplied or claimed to have been supplied. G) Upon the termination of this lease agreement, the improvements and any other alterations, additions or improvements (other than trade fixtures) shall, at the option of the Lessor (1) become the property of Lessor, or (2) be removed by the lessee, provided that any part of the Leased premises affected by such removal shall be restored to its original condition, reasonable wear and tear excepted. 10. OCCUPANCY/COMMENCEMENT DATE: A) In the event this lease agreement pertains to the initial occupancy by any Lessee of the leased premises, the leased premises shall be deemed ready for occupancy on the earliest date on which both of the following conditions have been met. 1) The improvements described herein to be performed by Lessor have been substantially completed, including the erection and painting or covering (as required) of the walls, the installation of the doors and hardware and locks therefore, the installation of lighting, electric outlets and switches such that they are operational, the installation of telephone outlets (but not of telephone equipment, provided reasonable notice has been given to Lessee such that the telephone equipment vendor could reasonably have installed such equipment) and the issuance of such governmental approvals as may be required for occupancy. -------------------------------------------------------------------------------- 2) Adequate means of access have been provided, and the use without material interference of the facilities necessary to Lessee's occupancy of the leased premises, including corridors, elevators, stairways, heating, ventilating, air conditioning, sanitary, water and electrical lighting and power facilities, are available to Lessee in accordance with lessor's obligations under the lease agreement. B) Lessor shall give written notice to Lessee designating the Commencement Date for the term of the lease agreement in respect of the leased premises, which shall be not fewer than then (10) business days notice. 11. PARKING: Lessor shall grant 2 onsite parking spaces and 8 offsite parking permits, in the city garage, for the said term of Lease, at the Lessor's expense. 12. MAINTENANCE AND REPAIRS: A) Lessee shall keep the leased premises in good condition, reasonable wear and tear excepted, and shall, in the use and occupancy of the leased premises, conform to all laws, orders and regulations of the Federal, State and Municipal governments, or any of their departments, and regulations of the New York Board of Fire Underwriters, applicable to the Premises. Lessee shall not be required to perform any maintenance, repairs or replacements necessitated by the negligence of Lessor, its servants, agents, or employees, or structural defects or deficiencies in any building, or by fire, or other casualty. B) Except for such maintenance, repairs, and replacements as are required by (A) above to be made by Lessee, Lessor shall perform any and all structural alterations, maintenance, repairs and equipment replacements which may be necessary to maintain the Premises in good, safe and tenantable condition. -------------------------------------------------------------------------------- C) Lessee shall permit the Lessor to erect, use and maintain pipes and conduits in and through the leased premises, provided the same are installed and concealed behind walls and ceiling of the leased premises and it does not result in any noticeable loss of lessee's space. All work necessary in connection with the foregoing shall to the extent possible, be done outside of Lessee's regular business hours. The Lessor or its agents shall have the right to enter the leased premises to make such repairs or alterations as the lessor reasonably deems desirable for the proper operation of the Premises and shall have the right to center the leased premises at any time on reasonable advance notice to Lessee to examine them or when necessary for the protection of the leased premises or the Premises. The Lessor, provided it proceeds with due diligence, shall be allowed to take all material into and upon the leased premises that may be required for such repairs or in part and without any abatement or diminution of rent. In the making of such repairs or alterations, the Lessor, to the extent practicable and consistent with efficiency and economy, shall exercise reasonable diligence so as to minimize the disturbance of or interference with the business of Lessee. Nothing herein contained, however, shall be deemed or construed to impose upon the Lessor any obligation, responsibility or liability whatsoever for the care, supervision, or repair of the Premises or any part thereof, other than as herein provided. The Lessor shall also have the right at any time, without the same constituting an actual or constructive eviction and without incurring any liability to Lessee, therefore, to change the arrangement or location of entrances or passageways, doors and doorways and corridors, stairs, toilets, or other public parts of the Premises, provided that no changes shall be made without Lessee's consent where such changes would adversely affect Lessee's ingress and egress to and from the leased premises from the street floor or from the lobby of the Premises or from the hallway or lobby of the premises. D) Lessee shall at all times during the term of this lease, and any extensions thereof, permit inspection of the leased premises during business hours, by the Lessor and its agents or representatives, or by or on behalf of prospective lessees. Except in the case of emergency, any such inspection will be done on at least twenty-four hours notice. Such inspection will be done in a manner so as not to unreasonably interfere with Lessee in the conduct of its business. -------------------------------------------------------------------------------- E) Damages resulting from any act of the Lessee or its employees, contractors, agents, licensees or invitee shall be repaired by the Lessee, if repaired by the Lessor, all costs shall be charged to the account of the Lessee. F) All repairs or replacements by Lessee or Lessor shall be of first quality and one in good and workmanlike manner. If Lessee is charged with making such repairs, restorations and replacements, the contractor chosen by Lessee to do such repairs, restorations or replacements shall be subject to Lessor's approval and further, if Lessee shall fail within 15 days' written request from lessor to commence the making of such repairs, restorations and replacements and complete the work with reasonable diligence, they may be made and completed by Lessor by at the expense of Lessee. 13. CLEAINING/JANITORIAL SERVICES: Lessor shall provide cleaning/janitorial services at its own expense, as outlined in Exhibit F. 14. DAMAGE TO OR DESTRUCTION OF LEASED PREMISES: If during the term of the lease, the leased premises are damaged by fire, flood, windstorm, strikes, riots, civil commotions, acts of God, or other casualty so that the same are rendered wholly unfit for occupancy, and if said leased premises cannot be repaired within one hundred eighty (180) days from the time of such damage, then this lease agreement, at the option of the Lessor or lessee, may be terminated as of the date of such damage. In the event that the Lessor elects to terminate this lease agreement, the lessee shall pay the rent apportioned to the time of damage and shall immediately as practicable surrender the leased premises to the Lessor who may enter upon the repossess the same and Lessee shall be relieved from any further reliability hereunder. If the parties elect not to terminate the lease agreement or if any damage by any of the above casualties, rendering the leased premises wholly unfit, can be repaired within one hundred eighty (180) days thereafter, Lessor agrees to repair such damage promptly within such period and this lease agreement shall not be affected in Any manner except that the rent shall be suspended and shall not accrue from the date of such damage until such repairs have been completed. If said leased premises shall be so slightly damaged by any of the above casualties as not to be rendered wholly unfit for occupancy, Lessor shall repair the leased premises promptly and to Lessee's satisfaction and during the period from the date of such damage until the repairs are completed the rent shall be apportioned so that the Lessee shall pay as rent an amount which bears the same ratio to the entire leased premises. If the damage by any of the above casualties is so slight that Lessee is not disturbed in its possession and enjoyment of the leased premises, then lessor shall repair the same promptly and in that case the rent accrued or accruing shall not abate. -------------------------------------------------------------------------------- NOTWITHSTANDING, anything herein contained to the contrary, if the cost of repair or restoration exceeds 30% of the replacement value, less foundation, of the Premises, then lessor shall have the option, exercisable on written notice to Lessee within 60 days of such damage, not to repair and restore the Premises. Lessee hereby expressly waives the provisions of Section 227 of the Real Property Law or any other law or statute hereafter enacted of similar import and agrees that the foregoing provisions of this paragraph shall govern and control in lieu thereof. 15. ACTION OF PUBLIC AUTHORITIES: In the event that any exercise of the power of eminent domain by any governmental authority, Federal, State, Country or Municipal, or by any other party vested by law with such power shall at any time materially affect Lessee's use and enjoyment of the leased premises by Lessee for the purposes set forth in Paragraph 3, Lessor and Lessee shall each have the right thereupon to terminate this lease agreement. In the event of the termination of this lease in accordance with the provisions of this Paragraph 14, the Fixed Rent and the Additional Rent shall be apportioned and prorated accordingly. Lessee shall not be entitled to claim or receive any part of any award in any condemnation proceeding or as result of such condemnation or taking, or to any damages against Lessor whether the same be for the value of the unexpired term of this Lease or otherwise. Nothing herein contained, however, shall be deemed to preclude Lessee from making any claim against the condemnor for the value of any of Lessee's fixtures or improvements or for Lessee's moving expenses provided the award for such claims is not in diminution of the award made to the Lessor (who shall not claim such items as his own). -------------------------------------------------------------------------------- 16. DEFAULT: If Lessee shall fail to pay any Fixed or Additional Rent to Lessor when the same is due and payable under the terms of this lease agreement and such default shall continue for a period of ten (10) days after written notice thereof has been given to Lessee By Lessor, or if the Lessee shall materially fail to perform any of the covenants or conditions hereof or any other duty or obligation imposed upon it by this lease agreement such default shall continue for a period of thirty (30) days after written notice thereof has been given to Lessee by Lessor, or if the Lessee shall be adjudged bankrupt, either voluntarily or involuntarily, or shall make a general assignment for the benefit of its creditors, or a receiver of any property of Lessee in or upon the leased premises be appointed in any action, suit, or proceeding by or against Lessee and such appointment shall not be vacated or annulled within sixty (60) days, or if Lessee enters into any type of reorganization under the United States Bankruptcy Act, as the same may from time to time be amended, or if the interest of Lessee in the leased premises shall be sold under execution of other legal process, then and in any such events Lessor, in its sole discretion, may at any time thereafter terminate this lease and the term thereof upon giving to the Lessee five (5) days notice in writing of its intention to do so and upon the giving of such notice, this lease and the term thereof shall terminate, and Lessor shall again have, repossess and enjoy the same as if this lease agreement had not been made, and thereupon this lease agreement shall terminate without prejudice, however, to the right of Lessor to recover from Lessee all rent due and unpaid up to the time of such re-entry together with all damages and expenses, including attorneys' fees, incurred by Lessor due to Lessee's default. In the event of any such default and re-entry, Lessor shall have the right, but not the obligation to relet the leased premises for the remainder of the then existing term whether such term be the initial term of this lease agreement or any renewed or extended term, for the highest rent then obtainable, and to recover from Lessee, as damages, the difference between the rent reserved by this lease agreement and the amount obtained through such reletting, less the costs and expenses reasonably incurred by Lessor in such reletting (including reasonable attorneys' fees). In the event that the amount obtained through such reletting, less the reasonable costs and expenses thereof, including reasonable attorney's fees, shall exceed the rent herein reserved, Lessee shall have no right to such excess. Any such notice shall specifically refer to this paragraph 16 and shall specify the default claimed. -------------------------------------------------------------------------------- Lessor's remedies as specified in this lease are cumulative and are not intended to preclude any other remedies or means of redress to which Lessor may lawfully be entitled at any time, and Lessor may invoke any remedy allowed at law or in equity as if specified remedies were not provided for in this lease. 17. ACCELERATION OF RENT UPON DEFAULT: It is hereby mutually agreed, that not withstanding anything to the contrary herein contained, the said premises are demised for rental of $1,240,000.00 for the entire said term of 10 years payable at the time of the making of this Lease, and that the provisions therein contained for the payment of the rent in installments are for the convenience of Lessee only, and that, upon default in payment of the rent in installments, as herein allowed, then the whole of the rent hereby reserved for the whole of the said term and then remaining unpaid shall at once become due and payable, without notice or demand. 18. SUBORDINATION: A) This lease agreement is subject and subordinate to any mortgages now or hereafter affecting or covering the leased premises and all or any part of the Premises, and to any and all renewals, modifications, consolidations, replacements and extensions of such leases and mortgages. This clause shall be self-operative and no further instrument of subordination shall be required. In confirmation of such subordination, Lessee agrees to execute any instrument which may be deemed necessary or desirable by Lessor to effectuate the subordination of this lease to any such mortgage. B) Lessee shall attorn to and recognize a successor Lessor, whether through possession or foreclosure action or sale, as Lessee's landlord under this lease agreement and shall promptly execute and deliver any instrument that such successor Lessor may reasonably request to evidence such "non-disturbance agreement" under which Lessee's use and occupancy of the leased premises and Lessee's rights under this lease will not be disturbed so long as Lessee observes and performs the terms and conditions on Lessee's part to be performed under this lease agreement. -------------------------------------------------------------------------------- 19. SUBLETTING AND ASSIGNMENT: A) Lessee shall not have the right to sublet or assign the leased premises except on the following terms and conditions, and such approval will not be unreasonably withheld or delayed: 1) Such subletting or assignment shall not relieve the Lessee from its duty to perform fully all of the agreements, covenants and conditions set forth in this lease agreement or any Guarantor from obligations of any Guaranty executed and delivered in connection with this leasing. 2) The Lessee shall first obtain the Lessor's written consent to the subletting or assignment in each instance. 3) The Lessee shall provide the name of the proposed sublessee or assignee, the terms and conditions of the proposed subletting or assignment, the nature and character of the business of the proposed sublessee or assignee, and the banking, financial and other credit information relating to the proposed sublessee reasonably sufficient to enable Lessor to determine the financial responsibility of said proposed sublessee or assignee. 4) Upon the receipt of such request from Lessee, Lessor shall have an option, to be exercised in writing within forty-five (45) days thereafter, to terminate this lease effective on a date (the termination date) set forth in Lessor's notice of termination, which shall not be less than thirty (30) days nor more than one hundred twenty (12) days following the service upon Lessee of Lessor's notice of termination. 5) In the event Lessor shall exercise such option to terminate this lease agreement, this lease shall expire on the termination date as if that date had been originally fixed as the expiration date of the term herein granted and Lessee shall surrender possession of the entire leased premises on the termination date in accordance with the provisions of this lease agreement. -------------------------------------------------------------------------------- B) If Lessor shall not exercise its option within the period aforesaid, then Lessor's consent to such request shall not be reasonably withheld but will be given only in the following condition acknowledged by Lessee to be reasonable and proper: 1) That the subletting or assignment is for part of or the entire leased premises only; 2) That the subletting or assignment shall be to a sublessee whose occupancy will be in keeping with the dignity and character of the then use and occupancy of the Premises by other lessees and whose occupancy will be more objectionable or more hazardous than that of Lessee herein. In no event shall any subletting or assignment be permitted to a school of any kind or an employment or placement agency; or governmental or quasi-governmental agency; 3) That the subletting or assignment shall not be to any lessee, sublessee or assignee of any leased space in the Premises of which the leased premises form a part; 4) That the subletting or assignment shall not be at a lower rental rate than that being charged by Lessor at the time for similar space in the Premises; 5) That the sublease or assignment will expressly prohibit assignment of the lease agreement or further subletting by the sublessee without Lessor's written consent. 6) If this lease shall be assigned, or if the leased premises or any part thereof, be sublet or occupied by any person or persons other than Lessee, Lessor may, after default by Lessee, collect rent from the assignee, subtenant or occupant, and apply the net amount collected to the rent herein reserved, but no such assignment, subletting, occupancy or collection of rent shall be deemed a waiver of the covenants contained in this lease agreement, nor shall it be deemed acceptance of the assignee, subtenant or occupant as a tenant or a release of Lessee from the full performance by Lessee of all the terms, conditions and covenants of this lease. -------------------------------------------------------------------------------- 20. RECORDATION: Lessee and Lessor agree that they will not record this lease agreement nor any Memorandum thereof. 21. SURRENDERS AND WAIVERS: When this lease agreement shall terminate in accordance with the terms thereof, Lessee shall quietly and peaceably deliver up possession to Lessor without notice from lessor other than as may be specifically required by any provision of this lease agreement. Lessee expressly waives the benefit of all laws now or hereafter in force requiring notice form Lessor with respect to termination. Lessee shall deliver up possession of the leased premises in as good order, repair, and condition as the same are in at the beginning of the term of this lease agreement except for reasonable wear and tear. The cost of repairing any damage to the leased premises arising from the removal of Lessee's property, shall be paid by Lessee. Lessee's obligation to observe or perform this provision shall survive the expiration or other termination of the term of this Lease. All property of Lessee not removed by it shall be deemed abandoned. The Lessee, for itself and on behalf of any person claiming through or under it, including creditors of all kinds, does hereby waive and surrender all rights and privileges which it might have under or by reason of any present or future law to redeem the leased premises or to have a continuance of this lease for the term thereof after being dispossessed or ejected there from by process of law or under the provisions of this lease or after any termination of this lease as herein provided. Lessee also waives the provisions of any law relating to notice or delay in levy of execution in case of an eviction or dispossession of Lessee for non-payment of rental or of any other law of like import now or hereafter in effect. -------------------------------------------------------------------------------- Lessee shall not interpose any counterclaim or claim of set-off of any nature or description whatsoever in any action or summary proceeding for the non-payment of the Fixed Rent or Additional Rent. Except for an action, proceeding or counterclaim brought by either Lessor Lessee against the other for personal injury or property damage, Lessor and Lessee hereby waive trial by jury in any action or proceeding or counterclaim brought by either against the other on any matter whatsoever arising out of or in any way connected with this lease, the relationship of Lessor and Lessee, or Lessee's use or occupancy of the leased premises, including any emergency or other statutory remedy with respect thereto. 22. NOTICE: Any notice or demand required by the provisions of this lease agreement to be given to Lessor shall be deemed to have been given adequately if sent by Certified Mail, Return Receipt Requested, or overnight delivery to Lessor at the following address: Galesi Enterprises 145 Huguenot Street New Rochelle, New York 10801. Copy to: Galesi Enterprises PO Box 98 Guilderland Center, New York 12085 -------------------------------------------------------------------------------- Any notice or demand required by the provisions of this lease agreement to be given to Lessee shall be deemed to have been given adequately if sent by Certified Mail, Return Receipt Requested, to Lessee at the following address: -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- or to such other address as Lessee may hereafter designate by notice to Lessor. Notice shall be deemed given when the same is received by the addressee. 23. BROKERAGE: Lessee hereby warrants and represents that Angelo DeRaffele is concerned with this lease agreement. Broker to be paid by Lessor per commission agreement. 24. ENTIRE AGREEMENT: The whole and entire agreement of the parties is set forth in this lease agreement and the parties are not bound by any agreements, understandings or conditions otherwise than as expressly set forth and stipulated hereunder. 25. CHANGES, MODIFICATIONS OR AMENDMENTS: This lease agreement may not be changed, modified, discharged or terminated orally or in any other manner than by an agreement signed by the parties hereto on their respective successors and assigns. 26. SEVERABILITY: If any provision of this lease or its application to any situation, shall be invalid or unenforceable to any extent, the remainder of this lease, or the application thereof to situations other than that as to which it is invalid or unenforceable, shall not be affected thereby, and every provision of this lease shall be valid and enforceable to the fullest extent permitted by law. -------------------------------------------------------------------------------- 27. COVENANTS TO BIND RESPECTIVE PARTIES: The covenants, agreements, conditions and provisions of this lease shall be binding upon and inure to the benefit of Lessor and Lessee and their respective heirs, distributors, executors, administrators, successors and permitted assigns, except that no assignment or subletting in violation of the provisions of Paragraph 18 shall operate to vest any rights in any successor assignee or subtenant. 28. BUILDING NAME: The Lessor, for itself and its successors and assigns reserves the right to change the name of the Building on the Premises, now generally known as the Galesi Building, or the address of the premises or to designate additional addresses therefore, on Notice to Lessee. Lessee shall not use such name, or any similar name, on its letterhead or any advertising material. 29. CERTIFICATE: Lessee and Lessor agree, at any time and from time to time, upon not less than then (10) days prior request by one party to the other, to execute, acknowledge and deliver a statement in writing certifying that this lease is unmodified and is in full force and effect (or if there have been modifications, that the same is in full force and effect as modified and stating the modifications), the commencement date of this lease, or any other existing status of the Lease, and the dates to which the rent and other charges have been paid in advance, if any, it being intended that any such statement delivered pursuant to this Paragraph may be relied upon by a prospective purchaser or mortgagee of the leased premises. 30. LESEE'S REPRESENTATIONS: Lessee represents to Lessor that it has made a thorough examination and inspection of the leased premises and is familiar with the condition of every party thereof. Lessee agrees that it enters into this lease without any representations or warranties by Lessor or any of its agents, representative, employees or servants or by any other person as to the condition of the leased premises, and Lessee agrees to accept the leased premises on the commencement date "as is" in its then condition, without any alterations, improvements, repairs or decorations to be made by lessor, except as hereinabove otherwise provided. -------------------------------------------------------------------------------- 31. LESSEE'S REMEDIES: Lessee shall look only to Lessor's estate and property in the Land and Building of which the leased premises are a part (or the proceeds thereof) for the satisfaction of Lessee's remedies for the collection of a Judgment (or other judicial process) requiring the payment of money by Lessor in the event of any default by Lessor hereunder, and no other property or assets of Lessor or its partners or principals, disclosed or undisclosed, shall be subject to levy, execution, or other enforcement procedure for the satisfaction of Lessee's remedies under or with respect to this lease, the relationship or Lessor and Lessee hereunder or Lessee's use and occupancy of the leased premises. 32. SECURITY: Lessee has deposited with Lessor the sum of $8,900.00 as security for the full and faithful performance and observance by Lessee of Lessee's obligations under this lease agreement upon execution of said lease. If Lessee defaults in the full and prompt payment and performance of any of Lessee's obligations under this lease including, without limitation, the payment of Fixed Rent and Additional Rent, Lessor may use or apply the whole or any part of the security so deposited to the extent required for the payment of any Fixed Rent and Additional Rent or any other sum as to which Lessee is in default or for any sum which Lessor may expend or may be required to expend by reason of Lessee's default. If Lessor shall so use or apply the whole or any part of the security, Lessee shall, upon demand, immediately deposit with Lessor a sum equal to the amount so used, or applied as security aforesaid. If Lessee shall fully an faithfully comply with all of Lessee's obligations under this lease, the security or any balance thereof shall be returned to Lessee upon the termination of the lease and after delivery to the Lessor of entire possession of the leased premises. In the event of any sale of lessor's interest in the Premises, Lessor shall have the right to transfer the security to vendee and Lessor shall thereupon be released by lessee from all liability for the return of such security. The security deposit shall be deposited by Lessor in an interest bearing account and interest earned by the security deposit is for the account of the Lessee. 33. GOVERNING LAW: The terms and conditions of this lease shall be construed and interpreted under the laws of the State of New York. -------------------------------------------------------------------------------- 34. SIGNATURE PAGE: IN WITNESS WHEREOF, Lessor and Lessee have caused these presents to be executed by their duly authorized officers, and have caused their respective corporate seals to be hereto affixed, all as of the day and year first above written. ROTTERDAM VENTURES, INC. D/b/a GALESI ENTERPRISES LESSOR BY: __________________________ NAME: Dennis Trimarchi________ DATE: _____________________________ TITLE: Vice President_________ LESSEE BY: __________________________ NAME: Ben Jamil_______________ DATE: ______6-23-00____________ TITLE: President_______________ -------------------------------------------------------------------------------- End of Filing ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9871 From: James M. Atkinson Date: Thu Oct 14, 2004 5:01pm Subject: CCS International / SITG Public SEC Documents - 2003 Annual Report [repost] SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-KSB [X] ANNUAL REPORT PURSUANT TO SECTION 13 OR 15 (d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended June 30, 2003 OR [ ] TRANSITION REPORT PURSUANT TO SECTION 13 OR 15 (d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from ________ to ________ COMMISSION FILE NUMBER 000-31779 SECURITY INTELLIGENCE TECHNOLOGIES, INC. Exact name of registrant as specified in its charter) Florida 65-0928369 (State or other jurisdiction of formation) (IRS Employer Identification No.) 145 Huguenot Street, New Rochelle, New York 10801 (Address of principal executive offices) (Zip Code) Registrant's telephone number, including area code (914) 654-8700 (Former name or former address, if changes since last report) Check whether the issuer (1) filed all reports required to be filed by Section 13 or 15(d) of the Exchange Act during the past 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days. Yes X No Check if there is no disclosure of delinquent filers in response to Item 405 of Regulation S-B is not contained in this form, and no disclosure will be contained, to the best of registrant's knowledge, in definitive proxy or information statements incorporated by reference in Part III of this Form 10-KSB or any amendment to this Form 10-KSB. [ ] The Registrant's revenues for the fiscal year ended June 30, 2003 were $3,729,165. State the aggregate market value of the voting and non-voting common equity held by non-affiliates computed by reference to the price at which the common equity was sold, or the average bid and asked price of such common equity, was $5,405,204 at September 24, 2003. The number of shares of common stock $.0001 par value, of the Registrant issued and outstanding as of September 24, 2003 was 19,309,389. -------------------------------------------------------------------------------- DOCUMENTS INCORPORATED BY REFERENCE None TABLE OF CONTENTS Page Number PART I 1 BUSINESS 1 PROPERTIES 13 LEGAL PROCEEDINGS 13 SUBMISSION OF MATTERS TO A VOTE OF SECURITYHOLDERS 15 PART II 15 MARKET FOR RESISTRANT'S COMMON EQUITY AND RELATED STOCKHOLDER MATTERS 15 MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS 17 FINANCIAL STATEMENTS AND SUPPLEMENTARY DATA 20 CHANGES IN AND DISAGREEMENT WITH ACCOUNTANTS ON ACCOUNTING AND FINANCIAL DISCLOSURE 20 PART III DIRECTORS, EXECUTIVE OFFICERS, PROMOTERS AND CONTROL PERSONS; COMPLIANCE WITH SECTION 16 (a) OF THE EXCHANGE ACT OF THE REGRISTRANT 20 EXECUTIVE COMPENSATION 23 SECURITY OWNERSHIP OF CERTAIN BENEFICIAL OWNERS AND MANAGEMENT 25 CERTAIN RELATIONSHIPS AND RELATED TRANSACTIONS 26 2 -------------------------------------------------------------------------------- Forward-Looking Statements Statements in this Form 10-KSB report may be "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995. Forward-looking statements include, but are not limited to, statements that express our intentions, beliefs, expectations, strategies, predictions or any other statements relating to our future activities or other future events or conditions. These statements are based on current expectations, estimates and projections about our business based, in part, on assumptions made by management. These statements are not guarantees of future performance and involve risks, uncertainties and assumptions that are difficult to predict. Therefore, actual outcomes and results may, and probably will, differ materially from what is expressed or forecasted in the forward-looking statements due to numerous factors, including those described above and those risks discussed from time to time in this Form 10-KSB report, including the risks described under "Risk Factors" and in other documents which we file with the Securities and Exchange Commission. In addition, such statements could be affected by risks and uncertainties related to our financial condition, factors which affect the security industry, market and customer acceptance, competition, government regulations and requirements and pricing, as well as general industry and market conditions and growth rates, and general economic conditions. Any forward-looking statements speak only as of the date on which they are made, and we do not undertake any obligation to update any forward-looking statement to reflect events or circumstances after the date of this Form 10-KSB. PART I ITEM 1. DESCRIPTION OF BUSINESS COMPANY OVERVIEW We design, assemble, market and sell security products. Our products and services are used throughout the world by military, law enforcement and security personnel in the public and private sectors, as well as governmental agencies, multinational corporations and non-governmental organizations. Our products include a broad range of professional, branded law enforcement and consumer equipment such as covert audio and video intercept, electronic countermeasures, video, photo, and optical systems, radio communication, explosive contraband detection, armored vehicles and clothing, nuclear, biological and chemical masks and protective clothing, voice stress analysis lie detection, and global positioning systems ("GPS"), used for tracking, locating and recovering vehicles and fleet management. Our products are marketed under CCS International, Ltd. ("CCS"), G-Com Technologies and The Counter Spy Shops of Mayfair, London(R) brand names and are sold primarily through a worldwide network of sales agents, including four retail stores in the United States and one in London. Our trained, multilingual and experienced security personnel work closely with clients to create and implement solutions to complex security problems. These services include security planning, advice and management, security systems integration, intellectual property asset protection, due diligence investigations and training programs in counterintelligence, counter surveillance, advanced driving techniques and ballistics. During the year we entered into three joint Venture agreements with technology companies. On July 2, 2002 we entered into a joint venture agreement with MD Information Systems, a Russian company that develops, manufactures and markets voice logging products and services. On October 30, 2002 we entered into a joint venture agreement with Power Telecom Co., Ltd. a Korean company that develops manufactures and markets GPS equipment and services. On April 12, 2003 we entered into a joint venture agreement with VTF Company a Russian company that develops, manufactures and markets products designed to monitor, intercept and jam radio frequency signals and other radio electronic devices. In connection with these agreements we and our joint venture partners have formed new entities, limited liability companies, where ownership and results of operations are shared equally. The joint venture agreements grant the new entities exclusive marketing rights to our joint venture partner's products, except in the countries in which they are domiciled. As of June 30, 2003, the joint ventures have not generated any revenues or other significant business activity. 3 -------------------------------------------------------------------------------- We are a Florida corporation organized under the name Hipstyle.com, Inc. in June 1999. Our principal executive offices are located at 145 Huguenot Street, New Rochelle, New York 10801, telephone (914) 654-8700. Our website is www.spyzone.com. Neither the information nor other statements contained in our website nor the information contained in any other Internet website is a part of this annual report on Form 10-KSB. INDUSTRY OVERVIEW We design and assemble security products and market to military, law enforcement, security and corrections agencies, by providing specialized security services and products to multinational corporations and governmental agencies. Increasingly, governments, including the military, businesses and individuals have recognized the need for security products and services to protect them from the risks associated with terrorism, physical attacks, threats of violence, white-collar crime and fraud. The United States has been the target of several deadly terrorist attacks directed towards its citizens and facilities around the world. As a result, institutions, including the United States Department of Defense and other government agencies and multinational corporations are redefining strategies to protect against and combat terrorism. As a company in the security products industry, we market our products in two markets - the law enforcement security market and the specialized security services market. Law Enforcement Security Products Market. In response to an increased emphasis on safety and protection, the number of active police officers has increased significantly over the past several years. By 1999 there were more than 900,000 law enforcement personnel in the United States. We expect an increase in law enforcement personnel as a partial response to the September 11, 2001, attacks which, we believe, will lead to increased demand for security products and we are seeking to participate in this demand. Specialized Security Services Market. Corporations are increasingly contracting experienced private companies to handle all or a portion of their security services. Industry studies reflect a growth rate in the market for worldwide security services market at a rate of 8.0% annually from 1995 to 2000, and we believe that the market is continuing to grow. We believe that demand by multinational corporations and governmental agencies operating in developing nations for security services such as risk assessment, crisis management, guard force management, security force organization and executive protection is likely to increase as these entities continue to establish operations and manufacturing facilities in developed and developing countries. In addition, there are risks related to white-collar crime and fraud. Demand for corporate investigative services continues to grow as corporations react to the need to protect their assets against the growing threat of fraud, counterfeiting and piracy of intellectual property. GROWTH STRATEGY We believe that the following strengths are critical to our success as a provider of surveillance and security products, and security risk management services. Broad Portfolio of Products and Services. We believe that a broad range of products, strong branding, a consistently growing customer base, and an extensive distribution network is critical to our success as a provider of security products and services. We are able to offer across-the-board security consulting, services, equipment, and systems that enable us to provide comprehensive solutions to our customers' security needs. Many who contact us for answers to their security problems have neither the time nor the ability to research solutions. Our clients anticipate and appreciate a one-stop-source of expertise and product for a wide variety of categories that fall under the umbrella of "security." Our goal is to strengthen our capabilities as a single source provider of global security systems and services. 4 -------------------------------------------------------------------------------- Our international infrastructure enables us to assist government buyers and multinational corporate clients who are expanding their geographical spheres. Similarly, our visibility is being enhanced through the expansion of our product distribution network that in turn will expand our customer base. Strong and Recognized Brands. We believe that our brand names are recognized in our markets and that our market recognition, combined with what we believe is a high level of performance has contributed to our developing market positions in a number of the product categories in which we compete. Strong Client Base and Extensive Distribution Network. We have a broad, full-service network of sales representatives and international distributors to sell and service our equipment. We serve a client base representing governmental and non-governmental agencies as well as multinational corporations worldwide. We believe that the diversity of our clients' end markets, the continued globalization of our clients and the strength of our distribution relationships minimize our dependence on any particular product, market, or customer. We believe that the demand for both security and surveillance products and security risk management services will continue to grow. We will address this growth by offering a comprehensive array of premium security risk management products and services. By establishing a critical mass of products and services and a broad base of customers, we believe that we have developed the capacity to perform multiple aspects of our clients' threat analyses and security provisions on a comprehensive basis. We will continue to seek to implement this growth strategy primarily through internal expansion of our existing businesses and through strategic acquisitions of businesses offering complementary services, markets, and customer bases. However, because of our financial condition and the low price of our stock, we may not be able to acquire any businesses or implement our growth strategy. The following elements define our growth strategy: Capitalize on Exposure to Military Programs. The events of September 11, 2001, have resulted in additional spending by the Department of Defense. We expect several of our product categories may be positively affected. These include our remote track, view and hear technologies, and voice, phone, cellular and data interception. We are well positioned to participate in these programs. Expand Distribution Network and Product Offerings. We will continue to leverage our distribution network by expanding our range of branded law enforcement equipment by investing in the development of new and enhanced products, which complement our existing offerings. If we are able to develop a broader product line we believe that it will strengthen our relationships with distributors, and allow us to add additional quality distributors, enhancing our brand appeal with military, law enforcement and other end users. Capitalize on Increased Homeland Security Requirements. We believe that we are well positioned to provide products, services and specialized training essential to establishing a sustainable homeland security infrastructure. After the September 11, 2001 terrorist attacks on the United States, the U.S. government has created the Office of Homeland Security. We believe that we are well equipped to provide products that additional military, law enforcement, security and corrections personnel require to combat terrorism and threats to our homeland. Increase Global Position in High Fright Areas. We expect to offer to service the heightened security concerns of governments, agencies and corporations in existing high fright areas and will seek to leverage our global expertise and reputation for providing security products and services in newly developing high fright areas. We target regions with economic and political instability as well as regions with increased regulation. We will also grow the scope of our existing product and service offerings by servicing existing customers who expand geographically. Products and Services We distribute a wide range of specialized products and systems covering security, privacy, home and personal 5 -------------------------------------------------------------------------------- protection, confidential business communications, lie detection, cellular phone privacy, drug and bomb contraband detection, miniaturized covert audio and video surveillance and protection, digital, the Internet, global systems for mobile communications ("GSM"), personal communication systems ("PCS"), time division mobile access ("TDMA") and code division multiple access ("CDMA") satellite technologies and wireless communications. Products We offer the following products. - Covert audio and video logging systems to monitor employees and household surveillance. - Scramblers, data and fax transmission systems to protect and secure communications. - Fax managers that log the activities of outgoing and incoming faxes. - Armored and bulletproof clothing and automobiles. - Counter-surveillance, wiretap detection and electronic counter-measures. - Night vision, electro-optic devices and infrared scopes and cameras. - Anti-hacking and secure remote computing to protect computer networks. - Bomb and weapons and other contraband detection for airport security, business, and home. - Personal Protection Products - Voice stress analyzers and lie detection to evaluate the honesty of employees or vendors - Tracking and recovery and fleet management systems - Cellular telephone tracking systems for 911 emergency programs. We develop and market integrated systems for the surveillance of global system for mobile communications and other communications. With the recent explosion in communication technologies, there are numerous fundamental systems underlying digital wireless communications throughout the world. Intelligence professionals require the ability to monitor, intercept and block various global systems for mobile communications, personal communication systems and other systems using a variety of communications access and monitoring systems. Our customers for our global systems for mobile communications usually request us to custom design a system to meet their communications surveillance requirements and are based on extensive engineering studies of the existing communications systems in each customer's country, along with an in-depth analysis of the various individual needs of the customer. Examples of our global systems for mobile communications intercept systems are the GSM 2060, a passive off-the-air intercept system which allows a user to target a specific cellular transmission and listen to both incoming and outgoing conversations and the GSM 4000, which was designed for an international west European security group and is a multi-channel monitoring system capable of intercepting various band transmissions simultaneously, while recording multiple conversations. In addition to our global system for mobile communications intercept systems, we have developed and we market cellular interception for operation on analog advanced mobile phone systems, digital advanced mobile phone system, and time division multiple access systems, as well as various other equipment for wireless and hard-wired communications surveillance for voice, fax and data. We are currently involved in the development of new tracking technology for fleet management. As we design new products based on our core technologies and enhance existing products with new functionalities and performance, many of the older systems, which can only be legally sold to government and law enforcement agencies, may become available to business and private purchasers. We offer a configurable emergency rescue, theft recovery, fleet management or freight management system. Our system uses the well-known global positioning system ("GPS") satellite tracking system which can combine with an optional sophisticated location prediction algorithm software package that takes over position reporting functions whenever the vehicle enters a dead satellite access zone. This unique and rugged system supplies real time position and status information from the customer's location to one of several possible call center configurations. The call center can track the location of a customer's vehicle and has features to report theft, breakdowns, and rescue requests. Optional configurations allow the end user to perform an analysis of driver's performance, manage public transportation lines routes, perform automated fleet and freight management for commercial trucking, and dispatch police, ambulance, and 6 -------------------------------------------------------------------------------- taxicabs. Services We offer comprehensive security training programs in counterintelligence and counter-surveillance in Miami, New York, Mexico, London and Hong Kong. This training, offered to United States government agencies, friendly nations, and clients in the private sector in the United States and in foreign countries, includes methods of recognizing, deterring, and minimizing security risks. We have conducted seminars for intelligence personnel, crime fighting associations and their associated membership societies, from CIA to FBI to United States Customs, United States Coast Guard, military branches, police departments from New York City's strategic command to police chiefs from innumerable cities and towns across the country. We intend to schedule a series of seminars to be held throughout the world during the first half of fiscal 2004. These seminars will provide opportunities for qualified and authorized buyers to learn about our basic global system for mobile communications technology and our proposed solutions to intercepting and monitoring these communications. We offer the design, integration, application analysis and technical support of sophisticated electronic and computer driven surveillance, monitoring, tracking and recovery and secure communication equipment. We offer site surveys and security solutions that include consultations and law enforcement training by experienced security personnel who act as advisors and instructors. Our consultants oversee in-country installations and train the client's personnel in the installation, use and maintenance of their security equipment. These clients are from the corporate world as well as governmental, public and private agencies. Marketing and Distribution We have a network of sales representatives and international distributors who sell and service our law enforcement equipment. Our distributors and we currently operate in a number of countries and serve a client base representing governmental and non-governmental agencies as well as multinational corporations worldwide. However, during the past year we have been in litigation with five of our distributors. See "Item 3. Legal Proceedings. When first entering a foreign market, we seek to promote a comprehensive range of products and services by seeking qualified sales representatives with local ties and existing relationships within the country's business and governmental communities. We try to tailor our marketing strategy to each geographic area of the world, and further to tailor our product offering by country. There are opportunities for cross marketing of military and law enforcement products, which strengthen the image of each product group and further enhance our position as an integrated provider of a wide selection of such products and services. We employ a variety of marketing programs in support of our reseller's channels to make our target markets aware of the value of our integrated systems and technology and to help create pre-sales demand for our resellers. These programs include trade shows, advertising campaigns, seminars, direct mailings, brochures and other promotional efforts designed to generate sales leads. Training programs are an integral part of our customer service. In addition to enhancing customer satisfaction, we believe that they also help breed customer loyalty and brand awareness, so that we may sell additional products to the same customer. We also use our website to generate brand awareness. However, because of our limited resources, we have reduced our advertising and promotional expense. Although we are focusing on clients in high growth industries where the need for investigation, brand protection and other security services are critical to success; we are also broadening our efforts to expand our end-user marketplace. We are developing an additional website designed to market an inexpensive line of security equipment that is not in competition with our recognized brand products. However, we cannot assure you that we will be successful in either developing the website or generating any significant sales through the website. 7 -------------------------------------------------------------------------------- Product Design and Installation Our engineering staff is involved in both developing new systems made possible by the advances in technology and continually improving the production process and reducing the cost of the products. Although our products come with operating instructions when applicable, installation tasks are performed for the more sophisticated global system for mobile communications systems. Installation phases may include site surveys, identification of central command site location, supervision of the installation of site interfaces, and training personnel to manage systems. We generally provide maintenance and support services for the first three to twelve months following installation of a system, depending on the terms of each particular contract. Thereafter, long-term service is provided on a service-contract basis. Global system for mobile communications systems currently under development will require differing levels of local, on-site installation. For example, one system is largely a mobile communications intelligence gatherer requiring only local training, while another might require construction of a central command center, intercept towers and installation at remote sites. We do not install but we provide supervisory assistance for a field installation crew comprised of both employees and independent contractors, supplemented by local labor, for on-site construction and installation. We also provide training for use and maintenance of equipment, and subsequent hot-line assistance. We assemble our products from components that are readily available from a number of suppliers. We do not have any long-term supply contracts. Competition The security industry includes companies that offer a range of products and services, such as access control, personnel protection, surveillance, counter-surveillance, computer security, vehicular security, night vision, fiber optics and communications. In order to meet the needs of a prospective customer, we believe that it is necessary to offer integrated solutions across industry lines rather than to offer a range of devices. Although there are a large number of companies who offer products or services aimed at one or more segments of the security industry. However, we believe that as the severity of the problem or potential problem increases governments and major corporations, including financial institutions, are less concerned with the price of the products than with such factors as: - The perceived ability of the vendor to treat the identity of the client, the scope of the work and the solution in confidence. - The ability of the vendor to offer an integrated approach that seeks to address the problem by offering a wide range of products and services rather than to offer solutions based on a small range of products and services. - On the other hand, major clients are concerned about the financial condition of the vendor, and our financial condition, including our significant working capital deficiency and our history of losses, may raise questions as to our ability to perform under the purchase order and to provide the necessary support following delivery. Competitors may use our financial condition and their stronger financial condition, resources and relationships in marketing their products and services regardless of whether their products and services are better than ours. As discussed below, many of our competitors are substantially stronger than we are financially and are very well known in the industry and have significant government and industry contacts and relationships. We seek to address the competition in the industry by a three-tiered approach -- we offer a broad range of products and services, we offer what we believe are strong brands and we have a strong client base with an extensive distribution network. The marketplace for manufacturers and vendors for security and surveillance products and systems is highly 8 -------------------------------------------------------------------------------- competitive and consists of numerous organizations ranging from internet-based mail-order firms to former military armament manufacturers such as, Lockheed, Martin, Harris, and others. Other aerospace manufacturers have rushed into the arena of bomb detection and other Explosive Ordinance Disposal ("EOD") products. The security marketplace continues to favor the more established and reliable manufacturers such as Nice (Israel) and Thompson C.S.F. now a part of Thales Group (France) with proven technology, over newcomers with low cost innovations. Siemens (Germany), and Rohde & Schwartz (Germany), are manufacturers of "simulated" base stations. Currently there is growing competition in the cellular interception and monitoring systems market. Although many competitors have greater financial, technical and other resources, we believe that at present our technology gives us a competitive advantage. In all of these areas, the major corporations have the ability to develop competitive products and fund a marketing effort that enable them to compete successfully against us regardless of whether their products are superior. Research and Development Because of our financial condition our research and development effort has been limited to the development of certain new products and improvement of existing products. Because of our working capital limitations, we have not been able to expand our research and development effort. During the past two years we did not expend any significant amount on research and development activities. Intellectual Property Rights We have no patents or copyrights on our products, and we rely on non-disclosure agreements with our employees. Since our business is dependent upon our proprietary products, the unauthorized use or disclosure of this information could harm our business. We currently own a number of United States trademark registrations. Government Regulation The United States and other governments have strict regulations concerning the exporting and importing of certain security devices that may restrict sales of certain products to bona fide law enforcement agencies or may restrict the sale of products in or from the United States We are subject to federal licensing requirements with respect to the sale in foreign countries of certain of our products. In addition, we are obligated to comply with a variety of federal, state, local and foreign regulations that govern our operations and the workplace. We are also subject to certain regulations promulgated by, among others, the United States Departments of Commerce and State. Business Combinations On April 17, 2002, pursuant to an agreement and plan of merger among us, CCS International, Ltd., a Delaware corporation ("CCS"), and CCS Acquisition Corp., a Delaware corporation ("Acquisition Corp"), Acquisition Corp. was merged into CCS, with the result that CCS became our wholly-owned subsidiary. As a result of the merger: o We issued an aggregate of 11,900,000 shares of common stock, 3,500,000 shares of series A preferred stock and 1,500,000 shares of series B preferred stock to the former stockholder of CCS, Ben Jamil, with each share of series A preferred stock and series B preferred stock being convertible into one share of common stock if the Company has either annual net revenue of $10,000,000 or net income of at least $1,000,000 prior to October 25, 2008, each share of series A preferred stock having 15 votes per share, and each share of series B preferred stock having no voting rights except as required by law. 9 -------------------------------------------------------------------------------- o Outstanding options and warrants to purchase a total of 1,800,500 shares of CCS' common stock were converted into options and warrants to purchase an equal number of shares of our common stock at exercise prices of $.50 to $1.00 per share. o Our corporate name was changed from HipStyle.com, Inc. to Security Intelligence Technologies, Inc. o Our officers and directors resigned. o Ben Y. Jamil, Menachem Cohen, Tom Felice and Nomi Om, who were officer of CCS prior to the merger, were elected as our directors and offices, and Sylvain Naar, who was a director of CCS, was elected as a director. o We entered into a three-year employment agreement with Mr. Jamil and granted him a non-qualified stock option to purchase 1,000,000 shares of common stock at $2.00 per share pursuant to the employment agreement. The terms of Mr. Jamil's employment agreement are described under "Item 10. Executive Compensation." Employees As of September 24, 2003, we had a total of approximately 50 employees, of which approximately 25 were employed at our main office and 25 were employed at our sales offices. None of our employees are represented by unions or covered by any collective bargaining agreements. We have not experienced any work stoppages or employee related slowdowns and believe our relationship with our employees is good. RISK FACTORS We require significant working capital in order to fund our operations. At June 30, 2003, we had cash of approximately $22,000 and a working capital deficit in excess of $5.9 million. In order to develop and market our products and pay our current liabilities, we require additional working capital. In the event that we are unable to raise the necessary funding we may be unable to continue operations. Our accounts payable and accrued expenses increased from $2.1 million at June 30, 2002 to $3.7 million at June 30, 2003, reflecting our inability to pay creditors currently. We also had customer deposits and related deferred revenue of $2.3 million, which relate to payments on orders which had not been filled at that date. We have used our advance payments to continue our operations. If our vendors do not extend us necessary credit we may not be able to fill current or new orders, which may affect the willingness of our clients to continue to place orders with us. Our bank credit line terminated on November 1, 2002. Our main source of financing other than advances from our chief executive officer was our bank credit facility of $200,000 which was secured by all of our assets and guaranteed by our chief executive officer. This facility terminated on November 1, 2002, and to date, we do not have any agreement with any replacement lender. Our failure to obtain a credit facility with another lender could materially impair our ability to continue in operation, and we cannot assure you that we will be able to obtain the necessary financing. We have been operating at a loss, and our losses are continuing. We sustained losses of $3.8 million, or $.22 per share (basic and diluted), for the fiscal year ended June 30, 2003, $2.4 million, or $.19 per share (basic and diluted), for the fiscal year ended June 30, 2002, and our losses are continuing. We cannot give any assurance that we can or will ever operate profitably. Our independent auditors have included an explanatory paragraph in their report as to our ability to continue as a going concern. As a result of our continuing and significant losses and our working capital deficiency, our independent 10 -------------------------------------------------------------------------------- auditors have included in their report an explanatory paragraph as to our ability to continue as a going concern. Because of our stock price and our history of losses, we may have difficulty in raising necessary funding for our business. Since the completion of the merger we have sought, and been unsuccessful, in our efforts to obtain adequate funding for our business. Because of our losses, we are not able to increase our borrowing. Because of both our low stock price and our losses, we have not been able to raise adequate funds through the sale of our equity securities. We may not be able to obtain any additional funding, and, if we are not able to raise funding, we may be unable to continue in business. Furthermore, if we are able to raise funding in the equity markets, our stockholders will suffer significant dilution and the issuance of securities may result in a change of control. If we do not have access to the most current technology, we may not be able to market our products and services. The security industry is constantly changing to meet new requirements, which result from both new threats to government and industry, both from potential threats to persons and property to industrial and governmental espionage, as well as general concern about personal and family safety. In order to meet these needs we will both have to anticipate problems and develop methods or reducing the potential risk. Our failure to anticipate our potential clients' requirements or to be able to provide them with the most current technology may impair our ability to sell our products. If we are unable to fund any significant research and development and product development effort, we may not be able to offer products based on new and developing technologies. Because of our limited resources, we may not be able to develop or implement a successful marketing program. Our ability to implement an expanded marketing program is dependent upon our ability to fund the program. If we are not able to obtain necessary financing, we may be unable to market our products. Furthermore, our financial condition may inhibit potential customers from purchasing our equipment and our competitors may use our financial condition in marketing to the same customers. We are subject to government regulations, which if violated, could prohibit us from conducting a significant portion of our export business. The United States and other governments have strict regulations concerning the exporting and importing of security devices, which may restrict sales of certain products to bona fide law enforcement agencies or may restrict the sale of certain products from the United States. If we violate any of these laws, we may be subject to civil or criminal prosecutions. If we are charged with any such violations, regardless of whether we are ultimately cleared, we may be unable to sell our products. During the fiscal years ended June 30, 2003 and June 30, 2002, we incurred significant expense and our reputation was impaired as a result of charges against our employees, including one of our officers, even though the charges were dismissed. Because we are dependent on our management, the loss of key executive officers could harm our business. Our business is largely dependent upon our senior executive officers, Messrs. Ben Jamil, chief executive officer, Chris R. Decker, chief financial officer, Menachem Cohen, vice president, Sylvain Naar, vice president and Ms. Nomi On, vice president. Although we have an employment agreement with Mr. Jamil, the employment agreement does not guarantee that he will continue with us. Since we do not have an agreement with Messrs. Decker, Cohen, Naar or Ms. Om, each of these officers has the right to terminate his or her employment. Our business may be adversely affected if any of our key management personnel or other key employees left our employ. Because we lack patent or copyright protection, we cannot assure you that others will not be able to use our proprietary information in competition with us. We have no patent or copyright protection for our proprietary software, and -------------------------------------------------------------------------------- we rely on non-disclosure agreements with our employees. Since our business is dependent upon our proprietary products, the unauthorized use or disclosure of this information could harm our business. Major corporations may be able to develop and fund marketing efforts that could enable them to dominate the market. Because there are a number of major companies that can both offer security products to governments and industry and fund a product development and marketing program, these companies have the financial ability to dominate the market, to effectively set a standard which may be incompatible with our technology and to use their financial 11 -------------------------------------------------------------------------------- resources and government and industry contacts to successfully compete against us in all major markets, regardless of whether their technology is superior or inferior to ours. Our growth may be limited if we cannot make acquisitions. A part of our growth strategy is to acquire other businesses that are related to our current business. Such acquisitions may be made with cash or our securities or a combination of cash and securities. To the extent that we require cash, we may have to borrow the funds or issue equity. Our stock price may adversely affect our ability to make acquisitions for equity or to raise funds for acquisition through the issues of equity securities. If we fail to make any acquisitions, our future growth may be limited. Furthermore, because of our stock price, the issuance of any stock or other equity securities in connection with any acquisition may result is significant dilution to our stockholders and may result in a change of control. As of the date of this report we do not have any agreement or understanding, either formal or informal, as to any acquisition. If we make any acquisitions, they may disrupt or have a negative impact on our business. If we make acquisitions, we could have difficulty integrating the acquired companies' personnel and operations with our own. In addition, the key personnel of the acquired business may not be willing to work for us, and our officers may exercise their rights to terminate their employment with us. We cannot predict the affect expansion may have on our core business. Regardless of whether we are successful in making an acquisition, the negotiations could disrupt our ongoing business, distract our management and employees and increase our expenses. We do not anticipate paying dividends on our common stock. The rights of the holders of common stock may be impaired by the potential issuance of preferred stock. Our certificate of incorporation gives our board of directors the right to create new series of preferred stock. As a result, the board of directors may, without stockholder approval, issue preferred stock with voting, dividend, conversion, liquidation or other rights which could adversely affect the voting power and equity interest of the holders of common stock. Preferred stock, which could be issued with the right to more than one vote per share, could be utilized as a method of discouraging, delaying or preventing a change of control. The possible impact on takeover attempts could adversely affect the price of our common stock. Although we have no present intention to issue any additional shares of preferred stock or to create any new series of preferred stock, we may issue such shares in the future. Shares may be issued pursuant to our stock plans which may affect the market price of our common stock. We may issue stock upon the exercise of options or pursuant to stock grants covering an aggregate of 2,000,000 shares of common stock pursuant to our stock incentive plans, including options to purchase 1,992,500 shares subject to options which were outstanding on June 30, 2003. The exercise of these options and the sale of the underlying shares of common stock and the sale of stock issued pursuant to stock grants may have an adverse effect upon the price of our stock. Because we are subject to the "penny stock" rules, stockholders may have difficulty in selling our common stock. Our common stock is presently subject to the Securities and Exchange Commission's penny-stock regulations which impose additional sales practice requirements on broker-dealers who sell such securities to persons other than established customers and accredited investors (generally those with assets in excess of $1,000,000 or annual income exceeding $200,000, or $300,000 together with their spouse). For transactions covered by these rules, the broker-dealer must make a special suitability determination for the purchase of such securities and have received the purchaser's written consent to the transaction prior to the purchase. Additionally, for any transaction involving a penny stock, unless exempt, the rules require the delivery, prior to the transaction, of a risk disclosure document mandated by the Commission relating to the penny stock market. The broker-dealer must also disclose the commission payable to both the broker-dealer and the registered representative, current quotations for the securities and, if the broker-dealer is the sole market maker, the broker-dealer must disclose this fact and the broker-dealer's presumed control over the market. Finally, monthly statements must be sent disclosing recent price information for the penny stock held in the account and information on the limited market in penny stocks. Consequently, the "penny stock" rules may restrict the ability of broker-dealers to sell our common stock and may negatively affect the ability of purchasers of our common stock to sell such securities. 12 -------------------------------------------------------------------------------- There may be claims that a third party owns stock which is held by our chief executive officer. In connection with an agreement between Mr. Ben Jamil and two financial consultants entered into prior to the reverse merger, the consultants or their designees were to purchase a 30% interest in five of our subsidiaries, and that 30% was to have been exchanged for 1,500,000 shares of series B preferred stock. Mr. Jamil has advised the consultants and their designees that, as a result of their failure to pay the consideration for the shares, the agreement is terminated and they have no interest in the series B preferred stock or the stock in the five subsidiaries. It is possible that the consultants or their designees may claim that they own the series B preferred stock or the stock in the five subsidiaries and we can give no assurance that their claim will not be upheld. We May Not Be Able To Comply In A Timely Manner With All Of The Recently Enacted Or Proposed Corporate Governance Provisions. Beginning with the enactment of the Sarbanes-Oxley Act of 2002 in July 2002, a significant number of new corporate governance requirements have been adopted or proposed. We believe that we currently comply with all of the requirements that have become effective thus far, and with many of the requirements that will become effective in the future. Although we currently expect to comply with all current and future requirements, we may not be successful in complying with these requirements at all times in the future. In addition, certain of these requirements will require us to make changes to our corporate governance practices. For example, one Nasdaq proposal (which may become applicable to companies listed on the OTC Bulletin Board) under review by the Securities and Exchange Commission will require that a majority of our Board of Directors be composed of independent directors by our 2004 Annual Meeting of Stockholders. Currently, only one of the members of our Board of Directors, Tom Felice, is considered to be independent. We may not be able to attract a sufficient number of directors in the future to satisfy this requirement, if enacted and if it becomes applicable to our Company. Additionally, the Commission recently passed a final rule that requires companies to disclose whether a member of their Audit Committee satisfies certain criteria as a "financial expert." We currently do not have an Audit Committee member that satisfies this requirement and, we may not be able to satisfy this, or other, corporate governance requirements at all times in the future, and our failure to do so could cause the Commission or Nasdaq to take disciplinary actions against us, including an action to delist our stock from the OTC Bulletin Board or any other exchange or electronic trading system where our shares of common stock trade. Item 2. PROPERTIES We lease approximately 9,840 square feet of executive offices and warehouse space at 145 Hugeunot Street, New Rochelle, NY 10801 under a lease that expires on October 31, 2010. The annual rent is approximately $125,000, and is subject to annual increases. We also lease approximately 6,000 square feet for four of our sales offices and retail locations in Miami, Florida, New York City, Washington, DC and Beverly Hills, CA under leases that expire from 2005 to 2010 at a current annual rent of $464,000, subject to annual increases. We believe that our present facilities are adequate to meet our immediate requirements and that any additional space we may require will be available on reasonable terms. Item 3. LEGAL PROCEEDINGS Because of our financial position, actions have been commenced or threatened by creditors. On May 2, 2002, Menachem Cohen, vice president and a director, and two other employees of one of the Company's subsidiaries were arrested pursuant to a criminal complaint filed in the United States District Court of the Southern District of Florida. The complaint alleged that such individuals violated federal law in that they intentionally manufactured, assembled, possessed or sold a device used for the surreptitious interception of electronic communications and that the device was sent through the mail or transmitted in intrastate or foreign commerce. On September 4, 2002, the United States District Court of the Southern District of Florida entered an order dismissing all charges against Menachem Cohen, vice president and director, and the two other employees of one of the Company's subsidiaries. In June 1998, a photographer and model formerly retained by CCS filed suit in U. S. District Court for the 13 -------------------------------------------------------------------------------- Southern District of New York captioned Ross & Vassilkioti v. CCS International, Ltd. seeking damages for alleged copyright infringement and other claims. The judge in the case has granted the plaintiff partial summary judgment as to the copyright infringement. On June 18, 2003, a jury awarded the plaintiffs $350,000 on the copyright infringement portion of the case. Under federal judicial rules, the Company is unable to contest the granting of partial summary judgment until a final judgment has been rendered. The Company believes that it has meritorious and valid defenses against the additional claims asserted in the lawsuit and a valid basis for appeal of the jury award of $350,000 and any additional adverse verdicts that may occur in this case. A trial date for the remaining counts of the action has been set for October 16, 2003. On November 1, 2002, a former Company supplier filed suit in the United States District Court for the District of Maryland, captioned Micronel Safety, Inc. v. CCS Internationnal Ltd. seeking damages of $242,400 for breach of contract to purchase certain products. CCS has denied the material allegations of the plaintiff's claim and has raised affirmative defenses thereto. We believe that we have valid defenses to the claim. On or about March 13, 2003, an action was commenced against CCS and its subsidiary in the Circuit Court of the 11th Judicial Circuit, Miami-Dade County, FL captioned Welcome Publishing Company, Inc. v. CCS International, Ltd. and Counter Spy Shop of Mayfair Ltd., Inc. seeking damages of $140,430 for an alleged breach of an advertising contract. CCS has denied the material allegations of the plaintiff's claim and has raised affirmative defenses thereto. We believe that we have valid defenses to the claim. A non-binding mediation took place on October 9, 2003 during which the parties discussed a settlement but were unable to reach an agreement. On or about May 25, 2001, an action was commenced against CCS in the United States District Court for the Southern District of New York, captioned Shenzen Newtek v. CCS International Ltd. The plaintiff had sought to recover $91,500, which was paid to CCS in connection with a distributorship agreement between the parties, plus costs and interest. On July 10, 2002, the Company and Shenzhen Newtek entered into a Settlement Agreement under which SIT issued 67,000 shares of its common stock in full settlement, subject to certain terms, of the $67,000 claim. The Settlement Agreement granted Shenzhen Newtek a price guarantee upon the sale of the shares and, alternatively, the option after July 10, 2003 to return the 67,000 shares to the company in lieu of a cash payment of $35,000. In August 2003 Shenzhen Newtek returned the 67,000 shares to the company however to date, no cash payment has been made. In June 2001, a former product licensee of CCS brought suit in Circuit Court, Palm Beach, Florida, captioned Dunterman v. CCS International Ltd. The suit claimed that CCS engaged in breach of contract, among other allegations. On October 21, 2002, the Company and Allan L. Dunterman Jr. entered into a Settlement Agreement under which the Company issued 110,000 shares of its common stock in full settlement, subject to certain terms, of an $88,750 claim. We are also the defendant in 3 pending actions arising out of our distributor agreements. On or about May 11, 2000 an action was commenced against CCS in the Supreme Court, New York County, captioned Ergonomic Systems Philippines Inc. v. CCS International Ltd. The plaintiff seeks to recover $81,000, which was paid to CCS in connection with a distributorship agreement between the parties, plus costs and interest. CCS has denied the material allegations of the claim and has raised affirmative defenses thereto. We believe that we have valid defenses to the claim. On or about October 12, 2001, an action was commenced against CCS in the United States District Court for the Southern District of New York, captioned China Bohai Group Co. Ltd. and USA International Business Connections Corp. v. CCS International, Ltd. The plaintiff seeks to recover $250,000 paid to CCS in connection with a distributorship agreement between the parties, plus $5,000,000 of punitive damages and costs and interest. CCS has denied the material allegations of the plaintiff's claim and has raised affirmative defenses thereto. CCS has asserted a counterclaim seeking damages in the approximate amount of $1,150,000 based upon the plaintiff's alleged breach of the parties' distributorship agreement. The Company believes that it has valid defenses to the claim. On December 3, 2002 EHS Elektronik Sistemleri ("EHS") submitted a demand for arbitration to the American Arbitration Association in NY, NY claiming CCS breached a joint venture agreement it had entered into with CCS in 1994 and seeking a refund of the $200,000 it had paid to CCS. A hearing has been set for October 23 and 24, 2003. On July 1, 2002, the Company's London subsidiary, Counter Spy Shop of Mayfair Limited ("CSS"), entered into an agreement to assume the business operations of another UK corporation ("Predecessor") for nominal consideration. The Predecessor is a defendant in ongoing litigation brought by a former customer, who has sued for breach of a contract executed in 1998 and is seeking a refund of approximately $293,000 in products and services purchased from the Predecessor. Due to the business transfer, there is a possibility that the plaintiff could name CSS as a defendant in the case. The Company, in consultation with counsel, believes that the Predecessor has valid defenses to the claim, and that CSS has valid defenses against any action that may be brought against it. 14 -------------------------------------------------------------------------------- We believe that we have valid defenses to the claim. Item 4. SUBMISSION OF MATTERS TO A VOTE OF SECURITYHOLDERS. Not applicable. PART II Item 5. MARKET FOR REGISTRANT'S COMMON EQUITY AND RELATED STOCKHOLDER MATTERS. Our common stock is traded on the OTC Bulletin Board under the symbol SITG. The following table sets forth the range of high and low bid quotations for our common stock from December 31, 2001, when trading in our stock commenced, until June 30, 2003, as reported by OTC Bulletin Board. On April 17, 2002, we acquired CCS, with the result that our business changed to the business of CCS, and the business conducted by us under the name Hipstyle.com, Inc. was discontinued. Accordingly, stock price information for periods prior to April 17, 2002 do not reflect our present business. The quotes represent inter-dealer prices without adjustment or mark-ups, markdowns or commissions and may not necessarily represent actual transactions. The trading volume of our securities fluctuates and may be limited during certain periods. As a result, the liquidity of an investment in the Company's securities may be adversely affected. Because of our stock price, our common stock is subject to the SEC's penny stock rules, which adversely affects the ability of persons to purchase or sell our stock. COMMON STOCK High Low High Low -------- ------- -------- -------- Fiscal 2003 Fiscal 2002 ------------------- --------------- Quarter ended Quarter ended September 30, 2002 $ 0.17 $ 0.15 September 30, 2001 N/A N/A Quarter ended Quarter ended December 31, 2002 $ 0.18 $ 0.16 December 31, 2001 $ 0.35 $ 0.15 Quarter ended Quarter ended March 31, 2003 $ 0.07 $ 0.04 March 31, 2002 $ 2.55 $ 0.15 Quarter ended Quarter ended June 30, 2003 $ 0.12 $ 0.10 June 30, 2002 $ 2.05 $ 0.30 On September 24, 2003, the final quoted price by the OTC Bulletin Board was $.73 per share of common stock. As of September 24, 2003 there were 19,304,389 shares of Common Stock outstanding, held of record by approximately 225 record holders and beneficial owners. 15 -------------------------------------------------------------------------------- The following table sets forth information as to equity compensation plans pursuant to which we may issue our equity securities. ------------------------------------------------------------------------------------------------------------------------------ Number of securities remaining available for Weighted average future issuance under Number of securities to exercise price of equity compensation plans be issued upon exercise outstanding plans (excluding of outstanding options, options, warrants securities reflects in columns (a)) warrants and rights and rights columns (a)) (a) (b) (c) ------------------------------------------------------------------------------------------------------------------------------ Equity compensation plans approved by by security holders -0- N.A. -0- ------------------------------------------------------------------------------------------------------------------------------ Equity compensation plans not approved by approved by security holders 3,400,000 $.97 7,500 ------------------------------------------------------------------------------------------------------------------------------ Total 3,400,000 $.97 7,500 ------------------------------------------------------------------------------------------------------------------------------ As of January 21, 2002, our board of directors adopted the 2002 Stock Plan, which provided for the grant of non-qualified stock options to purchase a maximum of 2,000,000 shares of common stock. The 2002 Plan provides for the grant of incentive stock options and nonqualified stock options to purchase shares of common stock, to directors, employees, officers, agents, consultants and independent contractors who perform services for the Company. Any incentive stock options which may be granted pursuant to this plan are subject to stockholder approval of the plan. As of the date of this annual report on Form 10-KSB, stockholder approval of the 2002 stock plan has not been obtained, and all options granted under the plan are non-qualified stock options. On April 17, 2002 we granted a non-qualified stock option to Mr. Ben Jamil, chief executive officer and a director, to purchase 1,000,000 shares of common stock at $2.00 per share. Mr. Jamil's employment agreement is described under "Item 10. Executive Compensation." During the fiscal year ended June 30, 2003, we issued the following securities in transactions that were not registered pursuant to the Securities Act of 1933, as amended: On July 10, 2002, the Company and Shenzhen Newtek, a former product distributor of the Company, entered into a Settlement Agreement under which the Company issued 67,000 restricted shares of its common stock in full settlement, subject to certain terms, of a $67,000 claim. If the market price of the Company's common stock on July 10, 2003 is less than $1.00 per share, the Company is to pay the plaintiff the difference between $67,000 and the value of the stock or in the alternative the plaintiff can return the 67,000 shares to the Company in return for a payment of $35,000. In August 2003 Shenzhen Newtek returned the 67,000 shares to the Company however to date, no cash payment has been made. On October 21, 2002, the Company and Allan L. Dunterman Jr. entered into a Settlement Agreement under which the Company issued 110,000 restricted shares of its common stock in full settlement, subject to certain terms, of an $88,750 claim. If the market price of the Company's common stock on October 21, 2003 or such later date that the plaintiff sells the shares is less than $.81 per share, the Company is to pay the plaintiff the difference between $88,750 and the value of the stock. At September 24, 2003, the closing price of the Company's common stock was $.73 per share. On October 7, 2002, the Company entered into an agreement with an investment banking firm under which the Company issued 50,000 restricted shares of common stock. During the year the Company issued 112,043 restricted shares of common stock for investor relations consulting services of $15,000. 16 -------------------------------------------------------------------------------- During the year the Company issued 80,000 restricted shares of common stock in full payment of trade payables of $18,267. These issuances were exempt from the registration requirements of the Securities Act pursuant to Section 4(2) of the Securities Act. No underwriting or other compensation was paid in connection with these transactions. Item 6. MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS GENERAL OVERVIEW. The following discussion should be read in conjunction with the financial statements and notes thereto of the Company. Such financial statements and information have been prepared to reflect the Company's financial position as of June 30, 2003. Historical results and trends should not be taken as indicative of future operations. Management's statements contained in this report that are not historical facts are forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. Actual results may differ materially from those included in the forward-looking statements. The Company intends such forward-looking statements to be covered by the safe harbor provisions for forward-looking statements contained in the Private Securities Litigation Reform Act of 1995, and is including this statement for purposes of complying with those safe harbor provisions. Forward-looking statements, which are based on certain assumptions and describe future plans, strategies and expectations of the Company, are generally identifiable by use of the words "believe," "expect," "intend," "anticipate," "estimate," "project," "prospects" or similar expressions. The Company's ability to predict results or the actual effect of future plans or strategies is inherently uncertain. Critical accounting policies The Company prepares its financial statements in accordance with accounting principles generally accepted in the United States of America. Preparing financial statements in accordance with generally accepted accounting principles requires the Company to make estimates and assumptions that affect the reported amounts of assets and liabilities and disclosure of contingent assets and liabilities as of the date of the financial statements and the reported amounts of revenues and expenses during the reporting period. The following paragraphs include a discussion of some of the significant accounting policies and methods applied to the preparation of the Company's consolidated financial statements. Review Note 1 to the financial statements for further discussion of significant accounting policies. Use of estimates The preparation of financial statements in conformity with accounting principles generally accepted in the United States requires management to make estimates and assumptions that affect the reported amounts of assets and liabilities and disclosure of contingent assets and liabilities at the date of the combined financial statements, and the reported amounts of revenue and expenses during the reporting periods. Actual results could differ from those estimates. Inventories Inventories are valued at the lower of cost (first-in, first-out) or market. Long-lived assets The Company records impairment losses on long-lived assets used in operations when events and circumstances indicate that the assets may be impaired and the undiscounted cash flows estimated to be generated by those assets are less than their carrying amounts. Revenue recognition The Company recognizes revenue from store sales upon the delivery of merchandise to a customer. Non-refundable advance payments received under marketing and distribution arrangements are deferred and either applied as payments towards customer purchases made pursuant to the terms of the respective agreements, or recognized as income at the termination of the agreement if specified purchase quotas have not been met by the customer. Customer deposits are initially recorded as liabilities and recognized as revenue when the related goods are shipped. Stock-based Compensation The Company periodically grants stock options to employees in accordance with the provisions of its stock option plans, with the exercise price of the stock options being set at the closing market price of the common stock on the date of grant. The Company accounts for stock-based compensation plans under Accounting Principles Board Opinion No. 25, "Accounting for Stock 17 -------------------------------------------------------------------------------- Issued to Employees", and accordingly accounts for employee stock-based compensation utilizing the intrinsic value method. FAS No. 123, "Accounting for Stock-Based Compensation", establishes a fair value based method of accounting for stock-based compensation plans. The Company has adopted the disclosure only alternative under FAS No. 123, which requires disclosure of the pro forma effects on earnings and earnings per share as if FAS No. 123 had been adopted as well as certain other information. Stock options granted to non-employees are recorded at their fair value, as determined in accordance with SFAS No. 123 and Emerging Issues Task Force Consensus No. 96-18, and recognized over the related service period. Deferred charges for options granted to non-employees are periodically re-measured until the options vest. In December 2002, the FASB issued SFAS No. 148, Accounting for Stock-Based Compensation - Transition and Disclosure. SFAS No. 148 amends SFAS No. 123, Accounting for Stock-Based Compensation. Although it does not require use of fair value method of accounting for stock-based employee compensation, it does provide alternative methods of transition. It also amends the disclosure provisions of SFAS No.123 and APB No. 28, Interim Financial Reporting, to require disclosure in the summary of significant accounting policies of the effects of an entity's accounting policy with respect to stock-based employee compensation on reported net income and earnings per share in annual and interim financial statements. SFAS No. 148's amendment of the transition and annual disclosure requirements is effective for fiscal years ending after December 15, 2002. The amendment of disclosure requirements of APB No. 28 is effective for interim periods beginning after December 15, 2002. We adopted SFAS No. 148 and APB No.28 on January 1, 2003. Income taxes The Company uses the liability method to determine its income tax expense. Under this method, deferred tax assets and liabilities are computed based on differences between financial reporting and tax basis of assets and liabilities and are measured using the enacted rates and laws that will be in effect when the differences are expected to reverse. Deferred tax assets are reduced by a valuation allowance if, based on the weight of the available evidence, it is more likely than not that all or some portion of the deferred tax assets will not be realized. The ultimate realization of the deferred tax asset depends on the Company's ability to generate sufficient taxable income in the future. Financial guarantees Certain shares issued by the Company to settle debt obligations contain a price guarantee that requires the Company to settle in cash any difference between the original face amount of the debt and proceeds from the creditor's subsequent sale of the shares. The Company accounts for these transactions by recording the debt at fair value with periodic mark-to-market adjustments until the guarantee is settled. Unrealized gains or losses resulting from changes in fair value are included in earnings and accrued expenses. Fair Value of Financial Instruments The fair values of financial instruments recorded on the balance sheet are not significantly different from their carrying amounts due to the short-term nature of those instruments, or because they are accounted for at fair value. New accounting pronouncements 18 -------------------------------------------------------------------------------- In June 2001, the Financial Accounting Standards Board ("FASB") issued SFAS No. 141, Business Combinations, and SFAS No. 142, Goodwill and Other Intangible Assets. SFAS No. 141 requires that all business combinations initiated after June 30, 2001 be accounted for under the purchase method and addresses the initial recognition and measurement of goodwill and other intangible assets acquired in a business combination. SFAS No. 142 addresses the initial recognition and measurement of intangible assets acquired outside of a business combination and the accounting for goodwill and other intangible assets subsequent to their acquisition. SFAS No. 142 provides that intangible assets with finite useful lives be amortized and that goodwill and intangible assets with indefinite lives not be amortized, but will instead be tested at least annually for impairment. We adopted SFAS No. 142 on July 1, 2002. We did not carry any goodwill or other intangibles on our balance sheets as of June 30, 2003 or 2002, and therefore the adoption of SFAS No. 142 did not have a material effect on our financial position or operating results. In June 2001, the FASB issued SFAS No. 143, Accounting for Asset Retirement Obligations. SFAS No. 143 addresses financial accounting and reporting for obligations associated with the retirement of tangible long-lived assets and the associated asset retirement costs. This statement is effective for fiscal years beginning after June 15, 2002, however earlier application is permitted. We adopted SFAS No. 143 on July 1, 2002. The adoption of this statement did not have a material effect on our financial position or operating results. In August 2001, the FASB issued SFAS No. 144, Accounting for the Impairment or Disposal of Long-Lived Assets, which addresses financial accounting and reporting for the impairment or disposal of long-lived assets. While SFAS No. 144 supersedes SFAS No. 121, Accounting for the Impairment of Long-Lived Assets and for Long-Lived Assets to Be Disposed Of, it retains many of the fundamental provisions of SFAS No. 121. SFAS No. 144 also supersedes the accounting and reporting provisions of APB No. 30, Reporting the Results of Operations--Reporting the Effects of Disposal of a Segment of a Business, and Extraordinary, Unusual and Infrequently Occurring Events and Transactions, for the disposal of a segment of a business. However, it retains the requirement in APB No. 30 to report separately discontinued operations and extends that reporting to a component of an entity that either has been disposed of (by sale, abandonment, or in a distribution to owners) or is classified as held for sale. We adopted SFAS No 144 on July 1, 2002. The adoption of SFAS No. 144 did not have a material effect on our financial position or results of operations. In June 2002, the FASB issued SFAS No. 146, Accounting for Costs Associated with Exit or Disposal Activities, which addresses accounting for restructuring and similar costs. SFAS No. 146 supersedes previous accounting guidance, principally Emerging Issues Task Force ("EITF") 94-3, Liability Recognition for Certain Employee Termination Benefits and Other Costs to Exit on Activity (including Certain Costs Incurred in a Restructuring). We were required to adopt SFAS No. 146 for restructuring activities initiated after December 31, 2002, and we adopted SFAS No. 146 on January 1, 2003. SFAS No. 146 requires that the liability for costs associated with an exit or disposal activity be recognized when the liability is incurred. Under EITF 94-3, a liability for an exit cost was recognized at the date of our commitment to an exit plan. SFAS No. 146 also established that the liability should initially be measured and recorded at fair value. The adoption of SFAS No. 146 did not have a material effect on our financial position or results of operations. In November 2002, the FASB issued FIN No. 45, Guarantor's Accounting and Disclosure Requirements for Guarantees, Including Indirect Guarantees of Indebtedness of Others. The interpretation elaborates on the existing disclosure requirements for most guarantees, including loan guarantees such as standby letters of credit. It also clarifies that at the time a company issues a guarantee, the company must recognize an initial liability for the fair value, 19 -------------------------------------------------------------------------------- or market value, of the obligations it assumes under the guarantee and must disclose that information in its interim and annual financial statements. The provisions related to recognizing a liability at inception of the guarantee for the fair value of the guarantor's obligations do not apply to product warranties or to guarantees accounted for as derivatives. The disclosure requirements are effective for financial statements of interim or annual periods ending after December 15, 2002, and the initial recognition and initial measurement provisions apply on a prospective basis to guarantees issued or modified after December 31, 2002. We adopted FIN No. 45 on January 1, 2003. The adoption of FIN No. 45 did not have a material effect on our financial position or results of operations. In January 2003, the FASB issued Interpretation No. 46, "Consolidation of Variable Interest Entities," an interpretation of ARB No. 51. This Interpretation addresses the consolidation by business enterprises of variable interest entities as defined in the Interpretation. The Interpretation applies immediately to variable interests in variable interest entities created after January 31, 2003, and to variable interests in variable interest entities obtained after January 31, 2003. The adoption of this Interpretation did not have a material effect on our consolidated financial statements. In May 2003, the FASB issued SFAS No. 150, Accounting for Certain Financial Instruments with Characteristics of both Liabilities and Equity, which requires mandatory redeemable financial instruments to be classified as liabilities, the result of which requires related expense to be classified as interest expense rather than minority interest on a prospective basis. SFAS No. 150 is effective in the three months ended June 30, 2003 for financial instruments entered into or modified after May 31, 2003, and is otherwise effective July 1, 2003 for previously issued instruments. SFAS No. 150 is not expected to have a material impact on our financial position or results of operations. Joint Venture Agreements During the year the Company entered into three joint Venture agreements with technology companies. On July 2, 2002 the Company entered into a joint venture agreement with MD Information Systems, a Russian company that develops, manufactures and markets voice logging products and services. On October 30, 2002 the Company entered into a joint venture agreement with Power Telecom Co., Ltd. a Korean company that develops manufactures and markets GPS equipment and services. On April 12, 2003 the Company entered into a joint venture agreement with VTF Company a Russian company that develops, manufactures and markets products designed to monitor, intercept and jam radio frequency signals and other radio electronic devices. In connection with these agreements the Company and its joint venture partner have formed new entities, limited liability companies, whose ownership and share of operating results are equally owned. The joint venture agreements grant the new entities exclusive marketing rights to the Company's joint venture partner's products, except in the countries in which they are domiciled. The Company accounts for its investments in the joint ventures using the equity method because its ownership is greater than 20% and it has the ability to exercise significant influence over the operating, investing and financing decisions of the joint venture entities. Under the equity method, the Company will record its pro-rata share of joint venture income or losses and adjust the basis of its investment accordingly. As of June 30, 2003, the joint ventures have not generated any revenues or other significant business activity. Foreign Currency Translation 20 -------------------------------------------------------------------------------- The functional currency of the Company's UK subsidiary is the local currency. Accordingly, the Company translates all assets and liabilities into U.S. dollars at current rates. Revenues, costs, and expenses are translated at average rates during each reporting period. Gains and losses resulting from the translation of the consolidated financial statements are excluded from results of operations and are reflected as a translation adjustment and a separate component of stockholders' deficit. Translation adjustments were immaterial as of June 30, 2003. Gains and losses resulting from foreign currency transactions are recognized in the consolidated statement of operations in the period they occur. RESULTS OF OPERATIONS - Year ended June 30, 2003 and year ended June 30, 2002 Revenues. Revenues for fiscal 2003 were $3,729,165 a decrease of $1,880,392 or 33.5%, from revenues of $5,609,557 in fiscal 2002. The decrease is primarily a consequence of a decrease in advertising and promotional expenditures and attendance at fewer international trade shows caused by limited resources. In addition, our financial condition and losses may have affected the willingness of customers to purchase products from us. The decrease resulting from these factors was partially offset by sales in our new retail store in London that commenced operations on July 1, 2002. Cost of Sales. Cost of sales decreased by $403,924 or 18.1%, to $1,827,045 in fiscal 2003 from $2,230,969 in fiscal 2002. Cost of sales as a percentage of product sales increased to 49.3% in fiscal 2003 from 44.5% in fiscal 2002 primarily due to writing down the cost of obsolete or slow moving items in Fiscal 2003. Compensation and benefits. Compensation and benefits increased by $ 448,715, or 20.1% to $2,547,846 in fiscal 2003 from $2,236,191 in fiscal 2002 primarily due to (i) an increase in amortization of deferred compensation relating to stock options we have granted to consultants of 5,301, (ii) expense in our new retail store in London that commenced operations on July 1, 2002 of $207,113 and increased expenditures to enhance the infrastructure of the Company by adding personnel to the marketing department and the sales department in anticipation of increased sales which did not materialize. We anticipate this trend of increased expenditures will continue in fiscal 2004 as we add additional personnel to the sales department. Professional fees and legal matters. Professional fees and legal matters decreased by $194,227, or 17.2% to $936,621 in fiscal 2003 from $1,130,848 in fiscal 2002. Based on a review of outstanding legal matters and unpaid settlements, we have established, in consultation with outside counsel, reserves for litigation costs that are probable and can be reasonably estimated. We can provide no assurance, however, that such reserves will be sufficient to absorb actual losses that may result from unfavorable outcomes. Moreover, it is possible that the resolution of litigation contingencies will have a material adverse impact on our consolidated financial condition, results of operations or cash flows. We also expect that we will continue to incur attorney's fees and the use of management resources to defend pending litigation and creditor nonpayment claims during fiscal 2004. 21 -------------------------------------------------------------------------------- Selling, general and administrative expenses. Selling, general and administrative expenses decreased by $228,577, or 10.7% to $1,910,546 in fiscal 2003 from $2,139,123 in fiscal 2002. The significant changes were primarily due to (i) a decrease in advertising expense of $114,201, or 33.5% to $226,694 in fiscal 2003 from $340,895 in fiscal 2002, (ii) a decrease in telephone expense of $74,578, or 33.5% to $148,108 in fiscal 2003 from $222,686 in fiscal 2002, due to lower rates charged by new service providers and (iii) a decrease in shipping costs of $41,626, or 45.6% to $49,924 in fiscal 2003 from $91,550 in fiscal 2002 all partially offset by expenses in our new retail store in London that commenced operations on July 1, 2002. Unrealized loss on financial guarantees. Unrealized loss on financial guarantees is attributable to the decrease in market value relating to our price guarantees on common stock which we have issued in payment of trade payables. Unrealized loss on financial guarantees decreased $4,513, or 3.0% to $146,440 in fiscal 2003 from $150,953 in fiscal 2002. Depreciation and amortization. Depreciation and amortization increased by $19,949, or 23.5% to $104,723 in fiscal 2003 from $84,774 in fiscal 2002 primarily as a consequence of expensing the net book value of leasehold improvements in our Washington, DC store from where we have relocated before the end of the depreciable life of the improvements. Interest expense. Interest expense increased by $39,023, or 59.7% to $104,381 in fiscal 2003 from $65,358 in fiscal 2002 as a result of a continued increase in the ordinary course of business of the Company's outstanding debt obligations. Income tax benefit. The income tax benefits of $29,000 in fiscal 2002 represented refundable taxes recovered through net operating loss carry-back claims in January 2003. In January 2003, we received approximately $158,000 of tax refunds from a federal loss carry-back refund claim. Since our carry-back ability has been utilized and the future realization of our losses is uncertain, no benefit resulting from our losses in fiscal 2003 has been provided. As a result of the forgoing, our net loss increased by $1,448,778, or 60.0% to $3,848,437, $.22 per share, in fiscal 2003 from $2,399,659, $.19 per share, in fiscal 2002 as a result of the factors described above. LIQUIDITY AND CAPITAL RESOURCES We require significant working capital to fund our future operations. At June 30, 2003 we had cash of $21,638 and a working capital deficit of $5,805,771. The aggregate amount of accounts payable and accrued expenses at June 30, 2003 was $3,563,776. As a result of our continuing losses, our working capital deficiency has increased. We funded our losses through loans from our chief executive. At June 30, 2003, we owed our chief executive officer $1,451,620, of which $575,066 was incurred during fiscal 2003. We also utilized vendor credit and customer deposits and deferred license fees. Because we have not been able to pay our trade creditors in a timely manner, we have been subject to litigation and threats of litigation from our trade creditors and we have used common stock to satisfy our obligations to trade creditors. In many instances when we issue common stock, we have provided that if the stock does not reach a specified price level one year from issuance, we will pay the difference between that price level and the actual price. As a result, we have contingent obligations to our some of these creditors. With respect to 577,000 shares of common stock issued during fiscal 2003 and 2002, the market value of the common stock on June 30, 2003 was approximately $297,393 less than the guaranteed prices. Our accounts payable and accrued expenses increased from $2,079,121 at June 30, 2002 to $3,563,776 at June 30, 2003 reflecting our inability to pay creditors currently. We also had customer deposits and deferred revenue of $2,312,769 which relate to payments on orders which had not been filled at that date. We have used our advance payments to continue our operations. If our vendors do not extend us necessary credit we may not be able to fill current or new orders, which may affect the willingness of our clients to continue to place orders with us. We require substantial funds to support our operations. Since the completion of the merger we have sought, and been unsuccessful, in our efforts to obtain funding for our business. Because of our losses, we are not able to increase our 22 -------------------------------------------------------------------------------- borrowing. Our bank facility terminated on November 1, 2002. and to date, we do not have any agreements with any replacement lender. Our failure to obtain a credit facility with another lender could materially impair our ability to continue in operation, and we cannot assure you that we will be able to obtain the necessary financing. Our main source of funds other than the bank facility has been from loans from our chief executive officer, customer deposits and vendor credit. Because of both our low stock price and our losses, we were not been able to raise funds through the sale of our equity securities in fiscal 2002 and 2003. During July, August and September 2003 our stock price increased and we raised $525,000 resulting from the exercise of options to buy our common stock. Management cannot provide any assurance that our stock price will increase or remain at its current level or that we will be able to raise any more money through the sale of our equity securities. We may not be able to obtain any additional funding, and, if we are not able to raise funding, we may be unable to continue in business. Furthermore, if we are able to raise funding in the equity markets, our stockholders might suffer significant dilution and the issuance of securities may result in a change of control. These factors raise substantial doubt about the Company's ability to continue as a going concern. Management's plans with respect to these matters include its attempts to settle vendor payables wherever possible, a reduction in operating expenses, and financing from the chief executive officer in the absence of other sources of funds. Management cannot provide any assurance that its plans will be successful in alleviating its liquidity concerns and bringing the Company to the point of sustained profitability. The accompanying financial statements do not include any adjustments that might result from the outcome of these uncertainties. Item 7. FINANCIAL STATEMENTS The financial statements begin on Page F-1. Item 8. CHANGES IN AND DISAGREEMENT WITH ACCOUNTANTS ON ACCOUNTING AND FINANCIAL DISCLOSURE. On April 18, 2002, our board of directors dismissed Salibello & Broder LLP as our independent public accountants and selected Schneider & Associates, LLP to serve as our independent public accountant for the fiscal year ending June 30, 2003. At no time since its engagement has Schneider & Associates LLP had any direct or indirect financial interest in or any connection with us or any of our subsidiaries other than as independent accountant. Our financial statements for the fiscal year ended June 30, 2001 were audited by Salibello & Broder LLP, whose report on such financial statements did not include any adverse opinion, or disclaimer of opinion, nor was the report qualified or modified as to audit scope or accounting principles. The report however was modified as to our ability to continue as a going concern. There were no disagreements with Salibello & Broder LLP on any matter of accounting principles or practices, financial statement disclosures, or auditing scope or procedures in connection with the audit for the fiscal year ended June 30, 2001 and financial statements filed on Form 10-QSB for subsequent interim periods preceding their dismissal on April 18, 2002 ITEM 9. DIRECTORS, EXECUTIVE OFFICERS, PROMOTERS AND CONTROL PERSONS; COMPLIANCE WITH SECTION 16(A) OF THE EXCHANGE ACT DIRECTORS, EXECUTIVE OFFICERS AND KEY PERSONNEL Set forth below is information concerning our directors and executive officers. 23 -------------------------------------------------------------------------------- Name Age Position ---- --- -------- Ben Jamil 70 Chairman of the board, chief executive officer and director Chris R. Decker 56 Chief financial officer and director Tom Felice 42 Director Manchem Cohen 51 Vice president and director Nomi Om 42 Vice president and director Sylvain Naar 62 Vice president and director Ben Jamil has been chairman of the board, president, chief executive officer and a director of CCS since its organization in July 1992. He assumed such positions with us upon completion of the merger. Mr. Jamil has more than 40 years experience in government, military, law enforcement and business security, specializing in the design, and marketing of sophisticated, hi-tech systems for communication, voice and data privacy, surveillance and monitoring. Chris R. Decker, a certified public accountant, joined us in April 2002 and became chief financial officer in August 2002. Prior to that he was controller for Trumarkets LLC, a broker dealer, from June 1, 2001 until April 2002, an independent consultant from April 1999 until June 2001, was vice president corporate controller for County Seat Stores, Inc., a retailer of specialty apparel, from January 1998 until April 1999 and for three years prior thereto, was executive vice president, chief financial officer of All American Food Group, Inc. a franchising company in the specialty food sector. Tom Felice has been a director of CCS since October 2001 and became one of our directors upon completion of the merger. He had been vice president sales until May 2003 when he resigned that position to pursue other opportunities. Menachem Cohen has been vice president for Latin American sales and a director of CCS since January 2002 and became our vice president and a director upon completion of the merger. He was a consultant to CCS from its inception in 1992 until 2002. Nomi Om has been vice president of international marketing for CCS since 1995 and a director since January 2002. She became our vice president and a director upon completion of the merger. Starting with CCS in 1992 as production manager, Ms. Om became director of special projects as a sales engineer, and in 1995 was appointed Vice President of International Marketing and Director of our Asian Market. Sylvain Naar has been a director of CCS since March 2002 and became one of our directors upon completion of the merger. He became vice president in May of 2003. From 1990 to February 2002, Mr. Naar was vice president for product and business development at Copytele, a developer of advanced flat panel displays and secure communication products. With over 30 years experience in telecommunications, Mr. Naar has held numerous executive positions at Hazeltine, Thomson, CSF, and Alcatel. Compliance with Section 16(a) of the Securities Exchange Act of 1934 Section 16(a) of the Securities Exchange Act of 1934 requires the Company's directors and executive officers, and persons who own more than ten percent (10%) of a registered class of the Company's equity securities, to file with the Securities and Exchange Commission ("SEC") initial reports of ownership and reports of changes in ownership of common stock and other equity securities of the Company. Officers, directors and greater than ten percent stockholders are required by SEC regulation to furnish the Company with copies of all Section 16(a) forms they file. To the Company's knowledge, based solely on its review of the copies of such reports furnished to the Company during the year June 30, 2003, all Section 16(a) filing requirements applicable to its officers, directors and greater than ten percent beneficial 24 -------------------------------------------------------------------------------- owners were satisfied. Director Compensation Directors who are also employees of the Company are not paid any fees or other remuneration for service on the Board or any of its Committees. Meetings and Committees of the Board of Directors. The Board of Directors met three (3) times during the fiscal year ended June 30, 2003. The Board of Directors has a standing Audit Committee. The Audit Committee Through May 1, 2003 the Audit Committee of the Board of Directors consisted of two (2) individuals Chris R. Decker an officer and director and Sylvain Naar, a director. On May 1, 2003 Tom Felice a director and previous officer replaced Sylvain Naar. The Audit Committee met once (1) time during the fiscal year ending June 30, 2003. The Audit Committee is primarily responsible for reviewing the services performed by the Company's independent public accountants, evaluating the Company's accounting policies and its system of internal controls, and reviewing significant finance transactions. The functions of the Audit Committee are focused on three areas: o the adequacy of the Company's internal controls and financial reporting process and the reliability of the Company's financial statements. o the independence and performance of the Company's independent public accountants. o the Company's compliance with legal and regulatory requirements. The Audit Committee meets with management periodically to consider the adequacy of the Company's internal controls and the objectivity of its financial reporting. The Audit Committee discusses these matters with the Company's independent public accountants and with appropriate Company financial personnel. Meetings are held with the independent public accountants who have unrestricted access to the Audit Committee. The Audit Committee also appoints and engages the independent public accountants and reviews periodically their performance and independence from management. In addition, the Audit Committee reviews the Company's financing plans and reports recommendations to the full Board of Directors for approval and to authorize action. Management has primary responsibility for the Company's financial statements and the overall reporting process, including the Company's system of internal controls. The independent public accountants audit the annual financial statements prepared by management, express an opinion as to whether those financial statements present fairly the financial position, results of operations and cash flows of the Company in conformity with generally accepted accounting principles and discusses with the Audit Committee any issues they believe should be raised with the Audit Committee. The Audit Committee reviews the Company's audited financial statements and meets with both management and Schneider & Associates, LLP, the Company's independent public accountants, to discuss such audited financial statements, and financial statements included in quarterly reports on Form 10-QSB. Management represents to the Audit Committee that the financial statements are prepared in accordance with generally accepted accounting principles. The Audit Committee receives from and discusses with Schneider & Associates, LLP the written disclosure and the letter required by Independence Standards Board Standard No. 1 (Independence Discussions with Audit Committees). These items relate to that firm's independence from the Company. 25 -------------------------------------------------------------------------------- ITEM 10. EXECUTIVE COMPENSATION Set forth below is information with respect to compensation paid or accrued by us for fiscal years ended June 30, 2003 and 2002 to our chief executive officer. No other officer received compensation of $100,000 during any of those fiscal years. SUMMARY COMPENSATION TABLE Long-Term Compensation (Adwards) Fiscal Options, SARs Name and Principal Position Year Salary Bonus (Number) ----------------------------- ------- ----------- ------------------------- Ben Jamil, chief executive 2003 $ 250,000 $ - 1,000,000 officer 2002 172,799 - - 2001 135,200 - - Employment Agreement In April 2002, in connection with the completion of the reverse merger, we entered into a three-year employment agreement with Ben Jamil pursuant to which Mr. Jamil agreed to serve as our president and chief executive officer. The agreement calls for an annual base compensation of $250,000 and may be increased on each anniversary date commencing May 1, 2003 by 10% if we achieve certain performance criteria. In addition to the base salary, Mr. Jamil is eligible to receive an annual discretionary bonus commencing June 30, 2003, at the sole discretion of the board of directors. Pursuant to the agreement, we granted Mr. Jamil a non-qualified stock option to purchase 1,000,000 shares of common stock at an exercise price of $2.00 per share. The option vests upon our attaining $10,000,000 of annual revenue and expires on April 17, 2007. Stock Options As of January 21, 2002, our board of directors adopted the 2002 Stock Plan, which provided for the grant of non-qualified stock options to purchase a maximum of 2,000,000 shares of common stock. The 2002 Plan provides for the grant of incentive stock options and nonqualified stock options to purchase shares of Common Stock, to directors, employees, officers, agents, consultants and independent contractors who perform services for the Company. Any incentive stock options which may be granted pursuant to this plan are subject to stockholder approval of the plan. As of the date of this annual report on Form 10-KSB, stockholder approval of the 2002 stock plan has not been obtained, and all options granted under the plan are non-qualified stock options. Option Exercises and Outstanding Options The following table sets forth information concerning the exercise of options during the fiscal year ended June 30, 2003 and the fiscal year-end value of options held by our chief executive officer, who is the only officer named in the summary compensation table. No stock appreciation rights have been granted. 26 -------------------------------------------------------------------------------- Aggregate Option Exercises in Last Fiscal Year and Fiscal Year-End Option Value Number of Securities Value of Underlying Unexercised In- Unexercised the-Money Options at Fiscal Options at Fiscal Year End Year End Shares Acquired Value Exercisable/ Exercisable/ Name Upon Exercise Realized Unexercisable Unexercisable ---- ------------- -------- ------------- ------------- Ben Jamil -- -- --/1,000,000 --/-- Option Grants in Fiscal Year Ended June 30, 2003 There were no option grants in the fiscal year ended June 30, 2003 to any officer named in the summary compensation table. ITEM 11. SECURITY OWNERSHIP OF CERTAIN BENEFICIAL OWNERS AND MANAGEMENT The following table and discussion provides information as to the shares of common stock benefically owned on September 24, 2003 by: - each director; - each officer named in the executive compensation table; - each person owning of record or known by us based on information provided to us by the persons named below, to own beneficially at least 5% of our common stock; and - all officers and directors as a group. 27 -------------------------------------------------------------------------------- Shares of Common Percentage of Stock Benefically Outstanding Name Owned Common Stock ----------------------------------- ----------------------- --------------- Ben Jamil 11,900,000 61.6% 145 Huguenot Street New Rochelle, NY 10801 Michael Farkas 1,695,100 8.8% 1221 Brickell Avenue Miami, FL 33131 Chris R. Decker 300,000 1.5% Menachem Cohen 300,000 1.5% Tom Felice 250,000 1.3% Nomi Om 250,000 1.3% Sylvain Naar - - All directors and officers as a 13,000,000 63.7% group (6 individuals) Except as otherwise indicated each person has the sole power to vote and dispose of all shares of common stock listed opposite his name. Stockholders are deemed to own shares of common stock issuable upon the exercise of options or upon conversion of convertible securities which are exercisable or convertible within 60 days of September 24, 2003. The shares beneficially owned by Michael Farkas represents 1,641,100 shares of common stock owned by him and 54,000 shares of common stock owned by Atlas Equity, which is beneficially owned by Mr. Farkas. Atlas Equity had agreed to pledge 1,500,000 shares of common stock, which shares were to be released to Atlas Equity if we raise $925,000 by June 14, 2002. On December 16, 2003 the Company and Atlas Equity and certain successor owners of Atlas Equity's Pledged Shares entered into and agreement that reduced the number of Pledged Shares to 750,000, restricted the number of Pledged Shares that could be sold for a period of one year and extended the date to raise the $925,000 to July 7, 2004. To date Atlas Equity has raised $525,000 of financing. The shares beneficially owned by Mr. Decker represent shares of common stock issuable upon exercise of options held by him. The shares beneficially owned by Mr. Cohen represent shares of common stock issuable upon exercise of options held by him. The shares beneficially owned by Ms. Om represent shares of common stock issuable upon exercise of options held by him. The shares beneficially owned by Mr. Felice represent shares of common stock issuable upon exercise of options held by him. In connection with an agreement between Mr. Ben Jamil and two financial consultants entered into prior to the reverse merger, the consultants or their designees were to purchase a 30% interest in five of our subsidiaries, and that 30% was to have been exchanged for 1,500,000 shares of series B preferred stock. Mr. Jamil has advised the consultants and their designees that, as a result of their failure to pay the consideration for the shares, the agreement is terminated and they 28 -------------------------------------------------------------------------------- have no interest in the series B preferred stock or the stock in the five subsidiaries. It is possible that the consultants or their designees may claim that they own the series B preferred stock or the stock in the five subsidiaries. Item 12. Certain Relationships and Related Transactions On April 17, 2002, pursuant to an agreement and plan of merger among us, CCS and our wholly-owned subsidiary, the subsidiary was merged into CCS, with the result that CCS became our wholly-owned subsidiary. As a result of the merger: o We issued an aggregate of 11,900,000 shares of common stock, 3,500,000 shares of series A preferred stock and 1,500,000 shares of series B preferred stock to the former stockholders of CCS, with each share of series A preferred stock and series B preferred stock being convertible into one share of common stock if the Company has either annual net revenue of $10,000,000 or net income of at least $1,000,000 prior to October 25, 2008, each share of series A preferred stock having 15 votes per share, and each share of series B preferred stock having no voting rights except as required by law. The series A and B preferred stock was issued to Mr. Ben Jamil. o Outstanding options and warrants to purchase a total of 1,800,500 shares of CCS' common stock were converted into options and warrants to purchase an equal number of shares of our common stock at exercise prices of $.50 to $1.00 per share. o Our officers and directors resigned. o Ben Jamil, Menachem Cohen, Tom Felice and Nomi Om, who were officer of CCS prior to the merger, were elected as our directors and offices, and Sylvain Naar, who was a director of CCS, was elected as a director. o We entered into a three-year employment agreement with Mr. Jamil and granted him a non-qualified stock option to purchase 1,000,000 shares of common stock at $2.00 per share pursuant to the employment agreement. The terms of Mr. Jamil's employment agreement are described under "Item 10. Executive Compensation." Item 13. EXHIBITS AND REPORTS ON FORM 8-KSB (a) Reports on Form 8-KSB (1) Current Report on Form 8-K/A filed on July 1, 2002 with respect to Items 1, 2 and 7. (2) Current Report on Form 8-K filed on October 24, 2002 with respect to Item 4. (3) Current Report on Form 8-K filed on October 29, 2002 with respect to Item 4. (4) Current Report on Form 8-K filed on June 27, 2003 with respect to Item 5. (b) Exhibits Exhibit No. Description 2.1 Agreement and Plan of Merger dated as of February 28, 2002 among the Registrant, CCS International, Ltd., and 29 -------------------------------------------------------------------------------- CCS Merger Corp.(1) 3.1 Articles of incorporation (2) 3.1 Articles of Amendment to Articles of Incorporation (4) 3.2 By-laws (2) 10.1 Employment Agreement, dated as of April 17, 2002, by and between the Registrant and Ben Jamil. (3) 10.2 Form of pledge Agreement, dated as of April 17, 2002, by and between the Registrant and Atlas Equity (3) 10.3 Agreement dated as of December 16, 2002, by and between the Registrant and ATLAS EQUITY and successor owners of Atlas Equity's pledged shares. 10.3 2002 Stock Plan (4) 10.4 Lease dated June 1, 2000 between Rotterdam Ventures, Inc. d/b/a Galesi Enterprises and the Registrant. (4) 10.5 2003 Stock Incentive Plan 21.1 List of Subsidiaries (1) Filed as an exhibit to the Registrant's Form 8-K with a report date of February 28, 2002 and which was filed with the Commission on March 5, 2002, and incorporated herein by reference. (2) Filed as an exhibit to the Registrant's Form 10SB12G which was filed with the Commission on October 17, 2000, and incorporated herein by reference. (3) Filed as an exhibit to the Registrant's Form 8-K with a report date of April 17, 2002 and which was filed with the Commission on April 25, 2002, and incorporated herein by reference. (4) Filed as an exhibit to the Registrant's Form 10-KSB filed with the commission on November 6, 2002, and incorporated herein by reference. ITEM 14. PRINCIPAL ACCOUNTANT FEES AND SERVICES 1. Audit Fees. The aggregate fees billed for the audit of our financial statements and review of financial statements included in our quarterly Form 10-QSB were $67,825 and $71,829 for the fiscal years ended June 30, 2003 and June 30, 2002 respectively. 2. Audit-Related Fees. There were no audit-related fees billed for the fiscal years ended June 30, 2003 and June 30, 2002. 3. Tax Fees. Tax fees billed were $725 and $3,512 for the fiscal years ended June 30, 2003 and June 30, 2002 respectively. 4. All Other Fees. Fees related to the reverse merger were $19,950 for the fiscal year ended June 30, 2002. 30 -------------------------------------------------------------------------------- INDEX TO FINANCIAL STATEMENTS Independent Auditors Report F - 1 Consolidated Balance Sheet June 30, 2003 F - 2 Consolidated Statements of Operations for the year ended June 30, 2003 and June 30, 2002 F - 3 Consolidated Statement of Stockholder's Deficit for the years ended June 30, 2003 and June 30, 2002 F - 4 Consolidated Statements of Cash Flow for the years ended June 30, 2003 and June 30, 2002 F - 5 Notes to financial statements F - 6 - F- 24 INDEPENDENT AUDITORS' REPORT To the Board of Directors and Stockholders Security Intelligence Technologies, Inc. We have audited the accompanying consolidated balance sheet of Security Intelligence Technologies, Inc. and subsidiaries as of June 30, 2003, and the related statements of operations, changes in stockholders' deficit and cash flows for the years ended June 30, 2003 and June 30, 2002. These financial statements are the responsibility of the Company's management. Our responsibility is to express an opinion on these financial statements based on our audits. We conducted our audits in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan and perform the audits to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used and significant estimates made by management, as well as evaluating the overall financial statement presentation. We believe that our audits provide a reasonable basis for our opinion. In our opinion, the financial statements referred to above present fairly, in all material respects, the consolidated financial position of Security Intelligence Technologies, Inc. and subsidiaries as of June 30, 2003, and the results of their operations and their cash flows for the years ended June 30, 2003 and June 30, 2002 in conformity with accounting principles generally accepted in the United States of America. The accompanying financial statements have been prepared assuming that the Company will continue as a going concern. As more fully described in Note 1, the Company has incurred operating losses in fiscal 2003 and 2002, negative cash flows from operations, and has limited cash and other resources to fund future operations. In addition, the Company is involved in material litigation, the costs of which have significantly impacted liquidity. Management's plans concerning these matters are also discussed in Note 1. The financial statements do not include any adjustments that might result from the outcome of these uncertainties. Jericho, New York October 10, 2003 Schneider & Associates LLP F-1 31 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES CONSOLIDATED BALANCE SHEETS June 30, 2003 ASSETS Current Assets: Cash $ 21,638 Inventory 1,448,314 Other current assets 52,442 ------------- Total current assets 1,522,394 Property and Equipment, at cost less accumulated depreciation and amortization of $431,541 122,390 Other assets 54,946 ------------- Total assets $ 1,699,730 ============= LIABILITIES AND STOCKHOLDER'S DEFICIT Current liabilities: Accounts payable and accrued expenses $ 3,563,776 Note payable - CEO/stockholder 1,451,620 Customer deposits 1,277,695 Deferred revenue 1,035,074 ------------- Total current liabilities 7,328,165 ------------- Commitments and contingencies - See Notes Stockholders' deficit: Preferred stock, $.0001 par value, 10,000,000 shares authorized: Series A Convertible-$1.00 per share liquidation preference, 3,500,000 shares authorized, issued and outstanding 350 Series B Convertible-$1.00 per share liquidation preference, 1,500,000 shares authorized, issued and outstanding 150 Common stock, $.0001 par value, 100,000,000 shares authorized, 17,411,389 shares issued and outstanding 1,741 Additional paid in capital 507,123 Accumulated deficit (6,137,799) ------------- Total stockholders' deficit (5,628,435) ------------- Total liabilities and stockholders' deficit $ 1,699,730 ============= The accompanying notes are an integral part of these financial statements. F-2 32 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES CONSOLIDATED STATEMENTS OF OPERATIONS Year Ended ----------------------------------- June 30, ----------------------------------- 2003 2002 --------------- --------------- Sales $ 3,729,165 $ 5,609,557 --------------- --------------- Costs and expenses: Cost of sales 1,827,045 2,230,969 Compensation and benefits 2,547,846 2,236,191 Professional fees and legal matters 936,621 1,130,848 Selling, general and administrative expenses 1,910,546 2,139,123 Unrealized loss on financial guarantees 146,440 150,953 Depreciation and amortization 104,723 84,774 --------------- --------------- 7,473,221 7,972,858 --------------- --------------- Operating loss (3,744,056) (2,363,301) Interest expense 104,381 65,358 --------------- --------------- Loss before income tax benefit (3,848,437) (2,428,659) Income tax benefit - (29,000) --------------- --------------- Net loss $ (3,848,437) $ (2,399,659) =============== =============== Loss per share, basic and diluted $ (0.22) $ (0.19) =============== =============== Weighted average number of shares 17,278,269 12,896,403 =============== =============== The accompanying notes are an integral part of these financial statements. F-3 33 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES CONSOLIDATED STATEMENT OF CHANGES IN STOCKHOLDERS' DEFICIT YEARS ENDED JUNE 30, 2003 AND 2002 Retained Convertible Preferred Additional Earnings Total Series A Series B Common Stock Paid-in (Accumulated Stockholders' Shares Amount Shares Amount Shares Amount Capital Deficit) Deficit ------ ------ ------ ------ ------ ------ ------- -------- ------- Balances, July 1, 2001 - $ - - $ - 5,100 $5,100 - $ 110,297 $ 115,397 Issuance of preferred stock to CEO/stockholder in exchange for common stock of affiliated companies 3,500,000 350 1,500,000 150 (4,100) 4,100 3,600 - - 11,900 for 1 forward common stock split and change in par value to $.0001 per share - - - - 11,899,000 190 (190) - - Sale of common stock - - - - 75,000 7 74,993 - 75,000 Issuance of common stock to settle debt - - - - 417,346 42 348,248 348,290 Issuance of common stock and elimination of accumulated deficit of legal acquirer in reverse merger - - - - 4,600,000 460 (44,814) - (44,354) Amortization of deferred compensation - - - - - - 36,580 - 36,580 Net loss - - - - - - - (2,399,659) (2,399,659) ------------------------------------------------------------------------------------------------ Balances, June 30, 2002 3,500,000 350 1,500,000 150 16,992,346 ,699 418,417 (2,289,362) (1,868,746) Issuance of common stock to settle debt - - - - 419,043 42 83,405 - 83,447 Amortization of deferred compensation - - - - - - 5,301 - 5,301 Net loss - - - - - - - (3,848,437) (3,848,437) ------------------------------------------------------------------------------------------------ 3,500,000 $ 350 1,500,000 $ 150 17,411,389 $1,741 $ 507,123 $ (6,137,799)$ (5,628,435) ================================================================================================ The accompanying notes are an integral part of these financial statements. F-4 34 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES CONSOLIDATED STATEMENTS OF CASH FLOWS Year Ended ------------------------------- June 30, ------------------------------- 2003 2002 -------------- ------------- CASH FLOWS FROM OPERATING ACTIVITIES: Net loss $ (3,848,437) $ (2,399,659) Adjustments to reconcile net loss to net cash used in operating activities: Depreciation and amortization 104,723 84,774 Unrealized loss on financial guarantees 146,440 150,953 Amortization of deferred compensation 5,301 36,580 Noncash compensation - CEO/stockholder 139,976 18,423 Noncash interest expense - CEO/stockholder 47,649 22,498 CHANGES IN OPERATING ASSETS AND LIABILITIES: Decrease (Increase) in inventory 741,873 (190,751) Decrease (Increase) in other current assets 133,073 (70,127) Increase in accounts payable and accrued expenses 1,421,662 1,586,862 Increase in customer deposits 227,923 754,275 Increase (Decrease) in deferred revenue 688,883 (258,673) -------------- ------------- Net cash used in operating activities (190,934) (264,845) -------------- ------------- CASH FLOWS FROM INVESTING ACTIVITIES: Purchase of property and equipment - (2,166) (Increase) in other assets (7,213) (10,500) -------------- ------------- Net cash used in investing activities (7,213) (12,666) -------------- ------------- CASH FLOWS FROM FINANCING ACTIVITIES: Proceeds from issuance of common stock - 75,000 Repayments of note payable - bank (200,000) (200,000) Borrowings under note payable - CEO/stockholder 387,441 566,633 Repayments of note payable - CEO/stockholder - (150,000) -------------- ------------- Net cash provided by financing activities 187,441 291,633 -------------- ------------- Net increase (decrease) in cash (10,706) 14,122 Cash, beginning of year 32,344 18,222 -------------- ------------- Cash, end of year $ 21,638 $ 32,344 ============== ============= The accompanying notes are an integral part of these financial statements. F - 5 35 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2003 AND 2002 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES Organization and Nature of Business Security Intelligence Technologies, Inc. (SIT"), a Florida Corporation and its wholly owned subsidiaries ("collectively the "Company") are engaged in the design, manufacture and sale of security and surveillance products and systems. The Company purchases finished items for resale from independent manufacturers, and also assembles off-the-shelf electronic devices and other components into proprietary products and systems at its own facilities. The Company generally sells to businesses, distributors, government agencies and consumers through five retail outlets located in Miami, Florida; Beverly Hills, California; Washington, DC; New York City, and London, England and from its showroom in New Rochelle, New York. On April 17, 2002, CCS International, Ltd. ("CCS"), a Delaware corporation, and its wholly-owned subsidiaries, merged with SIT and became a wholly owned subsidiary of SIT. The merger has been accounted for as a reverse acquisition, since the management and stockholder of CCS obtained control of the merged entity after the transaction was completed. Under reverse acquisition accounting, CCS is considered the accounting acquirer and SIT (then known as Hipstyle.com, Inc.) is considered the acquired company. Inasmuch as SIT had no substantive assets or operations at the date of the transaction, the merger has been recorded as an issuance of CCS stock to acquire SIT, accompanied by a recapitalization, rather than as a business combination. Principles of Consolidation The consolidated financial statements include the accounts of SIT and its wholly-owned subsidiaries, CCS, Spy Shop, Ltd. d/b/a Counter Spy Shop of Delaware, a Delaware corporation (retail store); Security Design Group, Inc., a New York corporation (formerly a manufacturing operation, currently inactive); Counter Spy Shop of Mayfair London, Ltd., a District of Columbia corporation (retail store); CCS Counter Spy Shop of Mayfair London, Ltd., a California corporation (retail store); and Counter Spy Shop of Mayfair, Ltd., a Florida corporation (retail store). The financial statements for the year ended June 30, 2003 also include the operations of Counter Spy Shop of Mayfair Limited, a wholly-owned United Kingdom corporation (retail store), that commenced operations on July 1, 2002. All significant inter-company balances and transactions have been eliminated in consolidation. Basis of Financial Statement Presentation: The financial statements of the Company have been prepared assuming the Company will continue as a going concern, which contemplates the realization of assets and the satisfaction of liabilities in the normal course of business. The Company incurred net losses of $3,848,437 and $2,399,659 for the years ended June 30, 2003 and June 30, 2002 respectively. In addition, at June 30, 2003, the Company had a working capital deficit of $5,805,771 and a deficiency in stockholders' equity of $5,628,435. The Company is also a defendant in material and costly litigation, which has significantly impacted liquidity. See Note 15. The Company requires additional financing which may not be readily available. The Company's bank facility has terminated, and the only source of funds other than operations has been loans from the Company's chief executive officer and customer deposits. See Notes 5 and 6. These factors raise substantial doubt about the Company's ability to continue as a going concern. Management's plans with respect to these matters include to settle vendor payables wherever possible, a reduction in operating expenses, and continued financing from the chief executive officer in the absence of other sources of funds. Management cannot provide any assurance that its plans will be successful in alleviating its liquidity concerns and bringing the Company to the point of profitability. The accompanying financial statements do not include any adjustments that might result from the outcome of these uncertainties. F-6 36 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2003 AND 2002 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES - Continued Use of estimates The preparation of financial statements in conformity with accounting principles generally accepted in the United States requires management to make estimates and assumptions that affect the reported amounts of assets and liabilities and disclosure of contingent assets and liabilities at the date of the combined financial statements, and the reported amounts of revenue and expenses during the reporting periods. Actual results could differ from those estimates. Inventories Inventories are valued at the lower of cost (first-in, first-out) or market. Property and equipment Assets are stated at cost. Depreciation is computed over the estimated useful life of the assets generally using the straight-line method over periods ranging from five to seven years. Additions and major renewals and betterments are capitalized and depreciated over their estimated useful lives. Repairs and maintenance are charged to operating expenses as incurred. Long-lived assets The Company records impairment losses on long-lived assets used in operations when events and circumstances indicate that the assets may be impaired and the undiscounted cash flows estimated to be generated by those assets are less than their carrying amounts. Revenue recognition The Company recognizes revenue from store sales upon the delivery of merchandise to a customer. Non-refundable advance payments received under marketing and distribution arrangements are deferred and either applied as payments towards customer purchases made pursuant to the terms of the respective agreements, or recognized as income at the termination of the agreement if specified purchase quotas have not been met by the customer. Customer deposits are initially recorded as liabilities and recognized as revenue when the related goods are shipped. Stock-based Compensation The Company periodically grants stock options to employees in accordance with the provisions of its stock option plans, with the exercise price of the stock options being set at the closing market price of the common stock on the date of grant. The Company accounts for stock-based compensation plans under Accounting Principles Board Opinion No. 25, "Accounting for Stock Issued to Employees", and accordingly accounts for employee stock-based compensation utilizing the intrinsic value method. FAS No. 123, "Accounting for Stock-Based Compensation", establishes a fair value based method of accounting for stock-based compensation plans. The Company has adopted the disclosure only alternative under FAS No. 123, which requires disclosure of the pro forma effects on earnings and earnings per share as if FAS No. 123 had been adopted as well as certain other information. F-7 37 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2003 AND 2002 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES Stock-based Compensation - continued Stock options granted to non-employees are recorded at their fair value, as determined in accordance with SFAS No. 123 and Emerging Issues Task Force Consensus No. 96-18, and recognized over the related service period. Deferred charges for options granted to non-employees are periodically re-measured until the options vest. In December 2002, the FASB issued SFAS No. 148, Accounting for Stock-Based Compensation - Transition and Disclosure. SFAS No. 148 amends SFAS No. 123, Accounting for Stock-Based Compensation. Although it does not require use of fair value method of accounting for stock-based employee compensation, it does provide alternative methods of transition. It also amends the disclosure provisions of SFAS No.123 and APB No. 28, Interim Financial Reporting, to require disclosure in the summary of significant accounting policies of the effects of an entity's accounting policy with respect to stock-based employee compensation on reported net income and earnings per share in annual and interim financial statements. SFAS No. 148's amendment of the transition and annual disclosure requirements is effective for fiscal years ending after December 15, 2002. The amendment of disclosure requirements of APB No. 28 is effective for interim periods beginning after December 15, 2002. We adopted SFAS No. 148 and APB No.28 on January 1, 2003. FASB Statement 123, "Accounting for Stock-Based Compensation," requires the Company to provide pro forma information regarding net income (loss) and income (loss) per share as if compensation cost for the Company's stock option issuances had been determined in accordance with the fair value based method prescribed in FASB Statement 123. The Company estimates the fair value of each stock option at the grant date by using the Black-Scholes option-pricing model with the following weighted-average assumptions used for grants in fiscal 2003 and 2002: dividend yield of 0%, risk-free interest rate of 3.38%, expected lives of eight years, and expected volatility of 120%. Under the accounting provisions of SFAS Statement 123, the Company's net loss and loss per share for 2003 and 2002 would have been the pro forma amounts indicated below: Year Ended June 30, ----------------------------------- 2003 2002 Net loss: As reported $ (3,848,437) $ (2,399,659) Add: Stock based employee compensation expense included in reported net loss - - Deduct: Total stock based employee compensation expense determined under the fair value based method for all awards (310,041) (510,443) ------------- ------------- $ (4,158,478) $ (2,910,102) ============= ============= Loss per share: As reported $ (0.22) $ (0.19) Proforma $ (0.24) $ (0.23) F-8 38 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2003 AND 2002 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES - continued Income taxes The Company uses the liability method to determine its income tax expense. Under this method, deferred tax assets and liabilities are computed based on differences between financial reporting and tax basis of assets and liabilities and are measured using the enacted rates and laws that will be in effect when the differences are expected to reverse. Deferred tax assets are reduced by a valuation allowance if, based on the weight of the available evidence, it is more likely than not that all or some portion of the deferred tax assets will not be realized. The ultimate realization of the deferred tax asset depends on the Company's ability to generate sufficient taxable income in the future. Advertising Advertising costs are expensed as incurred. The Company incurred advertising expenses of approximately $227,000 and $341,000 during the years ended June 30, 2003 and 2002 respectively. Financial guarantees Certain shares issued by the Company to settle debt obligations contain a price guarantee that requires the Company to settle in cash any difference between the original face amount of the debt and proceeds from the creditor's subsequent sale of the shares. The Company accounts for these transactions by recording the debt at fair value with periodic mark-to-market adjustments until the guarantee is settled. Unrealized gains or losses resulting from changes in fair value are included in earnings and accrued expenses. (See Note 4) Fair Value of Financial Instruments The fair values of financial instruments recorded on the balance sheet are not significantly different from their carrying amounts due to the short-term nature of those instruments, or because they are accounted for at fair value. New accounting pronouncements In June 2001, the Financial Accounting Standards Board ("FASB") issued SFAS No. 141, Business Combinations, and SFAS No. 142, Goodwill and Other Intangible Assets. SFAS No. 141 requires that all business combinations initiated after June 30, 2001 be accounted for under the purchase method and addresses the initial recognition and measurement of goodwill and other intangible assets acquired in a business combination. SFAS No. 142 addresses the initial recognition and measurement of intangible assets acquired outside of a business combination and the accounting for goodwill and other intangible assets subsequent to their acquisition. SFAS No. 142 provides that intangible assets with finite useful lives be amortized and that goodwill and intangible assets with indefinite lives not be amortized, but will instead be tested at least annually for impairment. We adopted SFAS No. 142 on July 1, 2002. We did not carry any goodwill or other intangibles on our balance sheets as of June 30, 2003 or 2002, and therefore the adoption of SFAS No. 142 did not have a material effect on our financial position or operating results. F-9 39 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2003 AND 2002 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES - Continued New accounting pronouncements - continued In June 2001, the FASB issued SFAS No. 143, Accounting for Asset Retirement Obligations. SFAS No. 143 addresses financial accounting and reporting for obligations associated with the retirement of tangible long-lived assets and the associated asset retirement costs. This statement is effective for fiscal years beginning after June 15, 2002, however earlier application is permitted. We adopted SFAS No. 143 on July 1, 2002. The adoption of this statement did not have a material effect on our financial position or operating results. In August 2001, the FASB issued SFAS No. 144, Accounting for the Impairment or Disposal of Long-Lived Assets, which addresses financial accounting and reporting for the impairment or disposal of long-lived assets. While SFAS No. 144 supersedes SFAS No. 121, Accounting for the Impairment of Long-Lived Assets and for Long-Lived Assets to Be Disposed Of, it retains many of the fundamental provisions of SFAS No. 121. SFAS No. 144 also supersedes the accounting and reporting provisions of APB No. 30, Reporting the Results of Operations--Reporting the Effects of Disposal of a Segment of a Business, and Extraordinary, Unusual and Infrequently Occurring Events and Transactions, for the disposal of a segment of a business. However, it retains the requirement in APB No. 30 to report separately discontinued operations and extends that reporting to a component of an entity that either has been disposed of (by sale, abandonment, or in a distribution to owners) or is classified as held for sale. We adopted SFAS No 144 on July 1, 2002. The adoption of SFAS No. 144 did not have a material effect on our financial position or results of operations. In June 2002, the FASB issued SFAS No. 146, Accounting for Costs Associated with Exit or Disposal Activities, which addresses accounting for restructuring and similar costs. SFAS No. 146 supersedes previous accounting guidance, principally Emerging Issues Task Force ("EITF") 94-3, Liability Recognition for Certain Employee Termination Benefits and Other Costs to Exit on Activity (including Certain Costs Incurred in a Restructuring). We were required to adopt SFAS No. 146 for restructuring activities initiated after December 31, 2002, and we adopted SFAS No. 146 on January 1, 2003. SFAS No. 146 requires that the liability for costs associated with an exit or disposal activity be recognized when the liability is incurred. Under EITF 94-3, a liability for an exit cost was recognized at the date of our commitment to an exit plan. SFAS No. 146 also established that the liability should initially be measured and recorded at fair value. The adoption of SFAS No. 146 did not have a material effect on our financial position or results of operations. In November 2002, the FASB issued FIN No. 45, Guarantor's Accounting and Disclosure Requirements for Guarantees, Including Indirect Guarantees of Indebtedness of Others. The interpretation elaborates on the existing disclosure requirements for most guarantees, including loan guarantees such as standby letters of credit. It also clarifies that at the time a company issues a guarantee, the company must recognize an initial liability for the fair value, or market value, of the obligations it assumes under the guarantee and must disclose that information in its interim and annual financial statements. The provisions related to recognizing a liability at inception of the guarantee for the fair value of the guarantor's obligations do not apply to product warranties or to guarantees accounted for as derivatives. The disclosure requirements are effective for financial statements of interim or annual periods ending after December 15, 2002, and the initial recognition and initial measurement provisions apply on a prospective basis to guarantees issued or modified after December 31, 2002. We adopted FIN No. 45 on January 1, 2003. The adoption of FIN No. 45 did not have a material effect on our financial position or results of operations. F-10 40 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2003 AND 2002 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES - Continued New accounting pronouncements - continued In January 2003, the FASB issued Interpretation No. 46, "Consolidation of Variable Interest Entities," an interpretation of ARB No. 51. This Interpretation addresses the consolidation by business enterprises of variable interest entities as defined in the Interpretation. The Interpretation applies immediately to variable interests in variable interest entities created after January 31, 2003, and to variable interests in variable interest entities obtained after January 31, 2003. The adoption of this Interpretation did not have a material effect on our consolidated financial statements. In May 2003, the FASB issued SFAS No. 150, Accounting for Certain Financial Instruments with Characteristics of both Liabilities and Equity, which requires mandatorily redeemable financial instruments to be classified as liabilities, the result of which requires related expense to be classified as interest expense rather than minority interest on a prospective basis. SFAS No. 150 is effective in the three months ended June 30, 2003 for financial instruments entered into or modified after May 31, 2003, and is otherwise effective July 1, 2003 for previously issued instruments. SFAS No. 150 is not expected to have a material impact on our financial position or results of operations. Joint Venture Agreements During the year the Company entered into three joint Venture agreements with technology companies. On July 2, 2002 the Company entered into a joint venture agreement with MD Information Systems, a Russian company that develops, manufactures and markets voice logging products and services. On October 30, 2002 the Company entered into a joint venture agreement with Power Telecom Co., Ltd. a Korean company that develops manufactures and markets GPS equipment and services. On April 12, 2003 the Company entered into a joint venture agreement with VTF Company a Russian company that develops, manufactures and markets products designed to monitor, intercept and jam radio frequency signals and other radio electronic devices. In connection with these agreements the Company and its joint venture partners have formed new entities, limited liability companies, whose ownership and share of operating results are equally owned. The joint venture agreements grant the new entities exclusive marketing rights to the Company's joint venture partner's products, except in the countries in which they are domiciled. The Company accounts for its investments in the joint ventures using the equity method because its ownership is greater than 20% and it has the ability to exercise significant influence over the operating, investing and financing decisions of the joint venture entities. Under the equity method, the Company will record its pro-rata share of joint venture income or losses and adjust the basis of its investment accordingly. As of June 30, 2003, the joint ventures have not generated any revenues or other significant business activity. F-11 41 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2003 AND 2002 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES - Continued Foreign Currency Translation The functional currency of the Company's UK subsidiary is the local currency. Accordingly, the Company translates all assets and liabilities into U.S. dollars at current rates. Revenues, costs, and expenses are translated at average rates during each reporting period. Gains and losses resulting from the translation of the consolidated financial statements are excluded from results of operations and are reflected as a translation adjustment and a separate component of stockholders' deficit. Translation adjustments were immaterial as of June 30, 2003. Gains and losses resulting from foreign currency transactions are recognized in the consolidated statement of operations in the period they occur. Concentration of credit risk Financial instruments that potentially subject the Company to concentrations of credit risk consist principally of cash balances. The Company limits the amount of credit exposure to any one financial institution. The Company generally does not grant credit to domestic or foreign customers. Research and development costs Research and development costs are charged to expense as incurred. Loss Per Share The Company calculates earnings per share in accordance with SFAS No. 128, Earnings Per Share, and SEC Staff Accounting Bulletin No. 98. Accordingly, basic and diluted loss per share is computed using the weighted average number of shares of common stock outstanding and excludes all common stock equivalents outstanding during the period. Common stock equivalents consist of shares issuable upon the exercise of stock options and warrants using the treasury stock method. Stock options and preferred stock that are convertible into common stock based on the Company's attainment of performance goals are not includible in the calculation of earnings per share until the specified targets are met. The following securities have been excluded from the diluted computation for fiscal 2003 and 2002 because they are contingently issuable and/or antidilutive: Year Ended June 30, -------------------------- 2003 2002 --------- --------- Series A Convertible Preferred Stock 3,500,000 3,500,000 Series B Convertible Preferred Stock 1,500,000 1,500,000 Stock options 1,992,500 1,783,000 Warrants 400,000 400,000 F-12 42 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2003 AND 2002 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES - Continued: Reclassifications Certain reclassifications have been made to the prior year financial statements in order to conform to the current year presentation. 2. INVENTORY Inventories consist of the following at June 30, 2003: Small components and supplies $ 238,180 Finished goods 1,210,134 --------------- $ 1,448,314 =============== 3. PROPERTY AND EQUIPMENT Property and equipment consists of the following at June 30, 2003: Office furniture and equipment $ 206,973 Leasehold improvements 346,958 --------------- 553,931 Accumulated depreciation and amortization (431,541) --------------- $ 122,390 =============== Depreciation and amortization expense was $104,723 and $84,774 for the years ended June 30, 2003 and 2002, respectively. F-13 43 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2003 AND 2002 4. ACCOUNTS PAYABLE AND ACCRUED EXPENSES Accounts payable and accrued expenses at June 30, 2003 consisted of the following: Accounts payable - trade $1,648,216 Professional fees and legal matters 1,373,966 Common shares subject to financial guarantees 297,393 Payroll liabilities 185,879 Deferred rent payable 58,322 ----------- $3,563,776 =========== As of June 30, 2003 Company creditors have initiated lawsuits for nonpayment of accrued liabilities totaling approximately $ 368,241. As of June 30, 2003 there were 577,000 shares of common stock subject to financial guarantees with a maximum liability of $366,633. 5. NOTE PAYABLE - BANK Prior to June 1, 2002, the Company had a bank credit agreement pursuant to which it could borrow up to $400,000 with interest at the bank's price plus 1%. On June 1, 2002, the available credit was reduced to $200,000 and the interest rate was increased to the bank's prime rate plus 2.5%. The Note is secured by substantially all of the assets of the Company, and personal assets and a guaranty of the chief executive officer. The bank also requires the Company to maintain average monthly compensating balances of $60,000 and will assess additional interest at the prime rate plus 2.5% (7.25% at June 30, 2002) on any shortfall. The credit facility expires on November 1, 2002, when all unpaid principal and interest became due in full. The unpaid principal and interest was paid in December 2002. To date, management has been unable to renew or to replace the line with alternative financing on similar terms. 6. NOTE PAYABLE - CEO/STOCKHOLDER This amount represents a note payable to the Company's chief executive officer and includes accrued interest of $47,649 based on an interest rate of 5% per annum and deferred salary of $158,399. The Note is secured by substantially all of the assets of the Company and is due on demand. 7. STOCKHOLDERS' DEFICIT- REVERSE MERGER Corporate recapitalization and reorganization On February 28, 2002. CCS completed a recapitalization and entered into an agreement of merger with a publicly- traded company, as described below. Effective February 28, 2002, CCS amended and restated its certificate of incorporation, increasing the number of authorized shares of common stock from 1,500 shares, no par value to 50,000,000 shares, par value $.0001 per share, and created a class of 10,000,000 shares of preferred stock, par value $.0001 per share. CCS directors have the right to determine the rights, preferences and privileges and restrictions and limitations of the preferred shares. F-14 44 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2003 AND 2002 7. STOCKHOLDERS' DEFICIT-; REVERSE MERGER (continued) Corporate recapitalization and reorganization (continued) The board of directors has authorized two series of preferred stock, the Series A Preferred stock, consisting of 3,500,000 shares, and the Series B Preferred stock, consisting of 1,500,000 shares. Both Series A and Series B preferred shares have a liquidation preference of $1.00 per share and are each convertible into one share of common stock if CCS has either consolidated annual net revenue of at least $10,000,000 or annual consolidated net income of at least $1,000,000 prior to October 15, 2008. Each share of Series A Preferred stock has 15 votes per share; Series B Preferred stock is nonvoting except as required by law. On February 28, 2002, pursuant to an Exchange Agreement dated February 25, 2002, Mr. Jamil exchanged all of his shares in the Affiliated Companies for 3,500,000 shares of CCS Series A Preferred stock and 1,500,000 shares of CCS Series B Preferred stock. See Note 15 with respect to a potential claim relating to the shares of Series B Preferred Stock that were issued to Mr. Jamil. Also on February 28, 2002, the CCS Board of Directors approved an 11,900 for 1 forward stock split of common stock. Reverse Merger As of February 28, 2002, CCS, SIT (then known as HipStyle.Com, Inc.), a Florida corporation, and CCS Acquisition Co., a Delaware corporation ("MergerSub"), entered into an Agreement and Plan of Merger, as amended (the "Merger Agreement"), pursuant to which on April 17, 2002 (the "Effective Date"), MergerSub was merged with and into CCS, and CCS became a wholly-owned subsidiary of SIT. Pursuant to the merger, on the Effective Date, Mr. Jamil, as holder of 3,500,000 shares of Series A Preferred stock, 1,500,000 shares of Series B Preferred stock and 11,900,000 shares of CCS common stock, received an equal number of SIT shares, respectively. In addition, outstanding CCS options to purchase 1,800,500 shares of common stock and warrants to purchase 400,000 shares of common stock were exchanged for similar SIT securities. Further, the existing board of directors and officers of SIT resigned and were replaced by the board of directors and officers of CCS. Following the merger, Mr. Jamil owned approximately 72% of the 16,575,000 shares of SIT common stock then outstanding, and 100% of the outstanding shares of Series A and Series B Preferred Stock. The merger transaction has been accounted for as a reverse acquisition, since the management and stockholder of CCS obtained control of the merged entity after the transaction was completed. Inasmuch as SIT had no substantive assets or operations at the date of the transaction, the merger has been recorded as an issuance of CCS stock to acquire SIT, accompanied by a recapitalization, rather than as a business combination. F-15 45 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2003 AND 2002 8. STOCK OPTIONS 2002 Stock Option Plan As of January 21, 2002, the board of directors of the Company adopted the 2002 Stock Plan, which provided for the grant of incentive and non-qualified stock options to purchase a maximum of 2,000,000 shares of common stock to directors, employees, officers, agents, consultants and independent contractors who perform services for the Company. In connection with the reverse merger outstanding options to purchase a total of 1,800,500 shares of CCS' common stock were converted into options to purchase an equal number of shares of the Company's common stock at exercise prices of $.50 to $1.00 per share, which were the same exercise prices as the options under the CCS plan. A summary of changes in common stock options during fiscal 2003 and 2002 follows: Number of Weighted Average Shares Exercise Price -------------- ----------------- Outstanding at June 30, 2001 - $ - Granted 1,850,500 0.60 Cancelled (67,500) 1.18 Exercised - -------------- Outstanding at June 30, 2002 1,783,000 0.58 Granted 300,000 0.08 Cancelled (90,500) 1.73 Exercised - -------------- Outstanding at June 30, 2003 1,992,500 $ 0.45 ============== ================= The following table summarizes information about stock options outstanding at June 30, 2003, Weighted Average Number Remaining Number Exercise Outstanding Contractual Exercisable Price 6/30/2003 Life (Months) 6/30/2003 ----------- -------------- ------------------ -------------- $ 0.08 300,000 110 300,000 $ 0.50 1,620,500 104 1,397,750 $ 1.00 72,000 102 45,750 -------------- ------------------ -------------- 1,992,500 104 1,743,500 ============== ================== ============== At June 30, 2003 there were 7,500 options available for future grant under the 2002 Stock Plan. F-16 46 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2003 AND 2002 8. STOCK OPTIONS (continued) Other Option Grant Pursuant to the chief executive officer's employment agreement, the Company granted him a non-qualified stock option to purchase 1,000,000 shares of common stock at an exercise price of $2.00 per share. These options vest upon achievement by the Company of $10,000,000 of annual revenues. Due to the uncertainty of reaching the stipulated performance target, the Company has not established a measurement date for the option. Upon determination that the achievement of the revenue threshold is probable, the Company will value the option on the measurement date using the intrinsic value method, and will record the resulting charge, if any, over the remaining vesting period. Common Stock Purchase Warrants In connection with the reverse merger, warrants to purchase a total of 400,000 shares of CCS common stock issued to a consultant were converted into warrants to purchase an equal number of shares of the Company's common at an exercise price of $.50 per share, subject to an anti-dilution provision, as defined. The warrants vested on April 17, 2003. The Company has valued the warrants at $22,770 using the Black-Scholes option pricing model. 9. PLEDGE AGREEMENT The merger agreement relating to the reverse merger provided, as a condition to CCS' obligation to close, that the Company closed on a private sale from which the Company realized proceeds of $1,000,000. This condition was not met at closing, and CCS completed the reverse merger without the Company having received any proceeds from a public offering. At the closing of the reverse merger, the Company entered into a stock pledge agreement ("Pledge Agreement") with Atlas Equity Group, Inc. ("Atlas Equity"), a Florida corporation beneficially owned by Michael Farkas who is a stockholder of the Company pursuant to which Atlas Equity was to have pledged 1,500,000 shares of common stock of the Company (the "Pledged Shares"). Atlas Equity never delivered the shares to be held pursuant to the pledge agreement. The Pledge Agreement stipulated the pledged shares were to be returned to Atlas Equity if the Company sold shares of its unregistered common stock sufficient to generate net cash proceeds of $925,000 to the Company prior to June 1, 2002, subsequently extended to June 14, 2002. On December 16, 2002 the Company and Atlas Equity and certain successor owners of Atlas Equity's Pledged Shares entered into an agreement that reduced the number of Pledged Shares to 750,000, restricted the number of Pledged Shares that could be sold for a period of one year, and extended the date to raise the $925,000 to July 7, 2004. 10. RECENT ISSUANCES OF UNREGISTERED SECURITIES On July 10, 2002, the Company and Shenzhen Newtek, a former product distributor of the Company, entered into a Settlement Agreement under which the Company issued 67,000 restricted shares of its common stock in full settlement, subject to certain terms, of a $67,000 claim. If the market price of the Company's common stock on July 10, 2003 is less than $1.00 per share, the Company is to pay the plaintiff the difference between $67,000 and the value of the stock or in the alternative the plaintiff can return the 67,000 shares to the Company in return for a payment of $35,000. In August 2003 Shenzhen Newtek returned the 67,000 shares to the Company; however, to date, no cash payment has been made. F-17 47 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2003 AND 2002 10. RECENT ISSUANCES OF UNREGISTERED SECURITIES - continued On October 21, 2002, the Company and Allan L. Dunterman Jr. entered into a Settlement Agreement under which the Company issued 110,000 restricted shares of its common stock in full settlement, subject to certain terms, of an $88,750 claim. If the market price of the Company's common stock on October 21, 2003 or such later date that the plaintiff sells the shares is less than $.81 per share, the Company is to pay the plaintiff the difference between $88,750 and the value of the stock. At September 24, 2003, the closing price of the Company's common stock was $.73 per share. During fiscal 2003 the Company issued 112,043 restricted shares of common stock for investor relations consulting services of $15,000 and issued 80,000 restricted shares of common stock in full payment of trade payables of $18,267. On October 7, 2002, the Company entered into an agreement with an investment banking firm under which the Company issued 50,000 restricted shares of common stock valued at $6,500. 11. INCOME TAXES Income taxes (tax benefit) consists of the following: June 30, --------------------------- 2003 2002 ------------ ------------ Currently payable (refundable): Federal $ - $ (33,000) State and local - 4,000 ------------ ------------ - (29,000) ------------ ------------ Deferred: Federal - - State and local - - ------------ ------------ - - ------------ ------------ Income taxes (tax benefit) $ - $ (29,000) ============ ============ There was no income tax expense in fiscal 2003 due to operating losses. In January 2003 the Company received approximately $158,000 of tax refunds from a federal loss carry-back refund claim. F-18 48 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2003 AND 2002 11. INCOME TAXES - continued Following is a reconciliation of the provision for income taxes (tax benefit) with income taxes on the federal statutory rate: June 30, ------------------------------- 2003 2002 -------------- ------------ Federal tax at statutory rate $ (1,355,000) $ (826,000) State and local taxes, net of federal effect (159,000) (92,500) Nondeductible items 93,000 50,500 Change in valuation allowance 1,421,000 839,000 -------------- ------------ Income taxes (tax benefit) $ - $ (29,000) ============== ============ Components of deferred taxes at June 30, 2003 are as follows: Deferred tax assets: Net operating losses $ 1,798,000 Deferred rent payable 22,000 Reserves and allowances 480,000 Stock based compensation 16,000 --------------- 2,316,000 Deferred tax liability: Property and equipment 6,000 --------------- 2,310,000 Less valuation allowance (2,310,000) --------------- Net deferred taxes $ - =============== The Company files a consolidated federal return with its U.S. subsidiaries and combined state tax returns where permitted. The Company has recorded valuation allowances to offset tax benefits arising from deferred tax items because their realization is uncertain. The Company has federal net operating loss carry-forwards of approximately $4,600,000 available to offset future federal taxable income. These losses expire in 2021, 2022 and 2023. 12. 401(K) SAVINGS PLAN The Company maintains a qualified deferred compensation plan under section 401(k) of the Internal Revenue Code. Under the plan, employees may elect to defer up to 15% of their salary, subject to the Internal Revenue Service limits. The Company may make a discretionary match as well as a discretionary contribution. The Company did not make any contributions to the plan for the years ended June 30, 2003 and 2002. F-19 49 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2003 AND 2002 13. RELATED PARTY TRANSACTIONS Employment Agreement In April 2002, in connection with the completion of the merger, the Company entered into a three-year employment agreement with Mr. Jamil pursuant to which he agreed to serve as the Company's president and chief executive officer. The agreement calls for an annual base compensation of $250,000 and may be increased on each anniversary date commencing May 1, 2003 by 10% if the Company achieves certain performance criteria. In addition to the base salary, the chief executive officer is eligible to receive an annual discretionary bonus commencing June 30, 2003, at the sole discretion of the board of directors. Pursuant to the agreement, the Company granted the chief executive officer a non-qualified stock option to purchase 1,000,000 shares of common stock at an exercise price of $2.00 per share. These options vest upon achievement by the Company of $10,000,000 of annual revenues. 14. SUPPLEMENTAL DISCLOSURE OF CASH FLOW INFORMATION: Year Ended ----------------------- June 30, ----------------------- 2003 2002 ---------- ---------- Cash paid during the period for: Interest $ 9,085 $ 38,484 ========== ========== Income taxes $(153,307) $ 23,296 ========== ========== Non-cash financing and investing activities: Common stock issued to settle accounts payable $ 83,447 $ 348,290 ========== ========== Accrued liabilities assumed in reverse merger $ - $ 44,354 ========== ========== Accrued interest and deferred salary credited to loan payable-CEO/stockholder $ 187,625 $ 40,921 ========== ========== F-20 50 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2003 AND 2002 15. COMMITMENTS AND CONTINGENCIES Litigation Settled matters On or about May 25, 2001, an action was commenced against CCS in the United States District Court for the Southern District of New York, captioned Shenzen Newtek v. CCS International Ltd. The plaintiff had sought to recover $91,500, which was paid to CCS in connection with a distributorship agreement between the parties, plus costs and interest. On July 10, 2002, the Company and Shenzhen Newtek entered into a Settlement Agreement under which SIT issued 67,000 shares of its common stock in full settlement, subject to certain terms, of the $67,000 claim. The Settlement Agreement granted Shenzhen Newtek a price guarantee upon sale of the shares and, alternatively, the option after July 10, 2003 to return the 67,000 shares to the Company in lieu of a cash payment of $35,000. In August 2003 Shenzhen Newtek returned the 67,000 shares to the Company however to date, no cash payment has been made. On May 2, 2002, Menachem Cohen, vice president and a director, and two other employees of one of the Company's subsidiaries were arrested pursuant to a criminal complaint filed in the United States District Court of the Southern District of Florida. The complaint alleged that such individuals violated federal law in that they intentionally manufactured, assembled, possessed or sold a device used for the surreptitious interception of electronic communications and that the device was sent through the mail or transmitted in intrastate or foreign commerce. On September 4, 2002, the United States District Court of the Southern District of Florida entered an order dismissing all charges against Menachem Cohen, vice president and director, and the two other employees of one of the Company's subsidiaries. In June 2001, a former product licensee of CCS brought suit in Circuit Court, Palm Beach, Florida, captioned Dunterman v. CCS International Ltd. The suit claimed that CCS engaged in breach of contract, among other allegations. On October 21, 2002, the Company and Allan L. Dunterman Jr. entered into a Settlement Agreement under which the Company issued 110,000 shares of its common stock in full settlement, subject to certain terms, of an $88,750 claim. Pending Matters In June 1998, a photographer and model formerly retained by CCS filed suit in U. S. District Court for the Southern District of New York captioned Ross & Vassilkioti v. CCS International, Ltd. seeking damages for alleged copyright infringement and other claims. The judge in the case has granted the plaintiff partial summary judgment as to the copyright infringement. On June 18, 2003, a jury awarded the plaintiffs $350,000 on the copyright infringement portion of the case. Under federal judicial rules, the Company is unable to contest the granting of partial summary judgment until a final judgment has been rendered. The Company believes that it has meritorious and substantial defenses against the additional claims asserted in the lawsuit and a valid basis for appeal of the jury award of $350,000 and any additional adverse verdicts that may occur in this case. A trial date for the remaining counts in the case has been set for October 16, 2003. On November 1, 2002, a former Company supplier filed suit in the United States District Court for the District of Maryland, captioned Micronel Safety, Inc. v. CCS International Ltd. seeking damages of $242,400 for breach of contract to purchase certain products. CCS has denied the material allegations of the plaintiff's claim and has raised affirmative defenses thereto. The Company believes that it has valid defenses to the claim. F-21 51 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2003 AND 2002 15. COMMITMENTS AND CONTINGENCIES Litigation Pending Matters - continued On or about March 13, 2003, an action was commenced against CCS and its subsidiary in the Circuit Court of the 11th Judicial Circuit, Miami-Dade County, FL captioned Welcome Publishing Company, Inc. v. CCS International, Ltd. and Counter Spy Shop of Mayfair Ltd., Inc. seeking damages of $140,430 for an alleged breach of an advertising contract. CCS has denied the material allegations of the plaintiff's claim and has raised affirmative defenses thereto. The Company believes that it has valid defenses to the claim. A non-binding mediation took place on October 9, 2003 during which the parties discussed a settlement but were unable to reach an agreement. The Company is also the defendant in 3 actions arising out of our distributor agreements. On or about May 11, 2000 an action was commenced against CCS in the Supreme Court, New York County, captioned Ergonomic Systems Philippines Inc. v. CCS International Ltd. The plaintiff seeks to recover $81,000, which was paid to CCS in connection with a distributorship agreement between the parties, plus costs and interest. CCS has denied the material allegations of the claim and has raised affirmative defenses thereto. The Company believes that it has valid defenses to the claim. On or about October 12, 2001, an action was commenced against CCS in the United States District Court for the Southern District of New York, captioned China Bohai Group Co., Ltd. and USA International Business Connections Corp. v. CCS International, Ltd. The plaintiff seeks to recover $250,000 paid to CCS in connection with a distributorship agreement between the parties, plus $5,000,000 of punitive damages and costs and interest. CCS has denied the material allegations of the plaintiff's claim and has raised affirmative defenses thereto. CCS has asserted a counterclaim seeking damages in the approximate amount of $1,150,000 based upon the plaintiff's alleged breach of the parties' distributorship agreement. The Company believes that it has valid defenses to the claim. On July 1, 2002, the Company's London subsidiary, Counter Spy Shop of Mayfair Limited ("CSS"), entered into an agreement to assume the business operations of another UK corporation ("Predecessor") for nominal consideration. The Predecessor is a defendant in ongoing litigation brought by a former customer, who has sued for breach of a contract executed in 1998 and is seeking a refund of approximately $293,000 in products and services purchased from the Predecessor. Due to the business transfer, there is a possibility that the plaintiff could name CSS as a defendant in the case. The Company, in consultation with counsel, believes that the Predecessor has valid defenses to the claim, and that CSS has valid defenses against any action that may be brought against it. Given that litigation is subject to many uncertainties, it is not possible to predict the outcome of the litigation pending against the Company. However, it is possible that the Company's business, results of operations, cash flows or financial position could be materially affected by an unfavorable outcome of certain pending litigation in amounts in excess of those that the Company has recognized. All such cases are being, and will continue to be vigorously defended, and the Company believes that it has meritorious and valid defenses against all such litigation, as well as a valid basis for appeal of any adverse verdicts, should they result. F-22 52 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2003 AND 2002 15. COMMITMENTS AND CONTINGENCIES - Continued Stock Purchase Agreements On January 31, 2002, Mr. Jamil entered into an understanding with two financial consulting companies to sell to them 30% of his interest in the common stock of CCS's subsidiaries, excluding Security Design, Inc., for nominal consideration. Mr. Jamil has advised the Company that neither the two financial consultants nor their designees have paid the required consideration for the shares, and that he has never formally transferred any stock ownership in the subsidiaries to the financial consultants or their designees. Further, a total of 1,500,000 shares of the Company's Series B Preferred Stock were issued to the chief executive officer in partial exchange for his shares in the subsidiaries, and not to the financial consultants or their designees as had been contemplated by agreements between the chief executive officer and the financial consultants or their designees. The Company cannot give any assurance that the financial consultants will not claim that they are entitled to the Series B shares. Operating Leases The Company leases office space, retail stores and sales offices and office equipment under non-cancelable operating leases that expire over various periods through 2010. Rent expense is being recognized on a straight-line basis to account for rent concessions and graduated charges during the lease term, resulting in deferred rent payable of $58,322. Total rent expense for the years ended June 30, 2003 and 2002 was approximately $632,288 and $486,195 respectively. Operating Leases - continued The approximate future minimum rental commitments for all long-term non-cancelable operating leases are as follows: Year ending June 30, Amount ----------------- --------------- 2004 $ 504,735 2005 467,898 2006 234,114 2007 233,793 2008 240,623 Thereafter 413,651 --------------- $ 2,094,814 =============== F-23 53 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2003 AND 2002 16. SUBSEQUENT EVENTS Consulting Agreements In July 2003 the Company formalized consulting contracts with Michael Farkas and two additional financial consultants relating to acquisition services, financial public relations and operational performance services. In connection therewith the Company granted a total of 2,600,000 fully vested options, including 1,700,000 options granted to Michael Farkas, to purchase shares of common stock at prices ranging from $.10 per share to $1.00 per share. The consultants subsequently have exercised 1,960,000 options for a total amount of $525,000, including 1,700,000 options exercised by Michael Farkas for $400,000. 2003 Stock Incentive Plan As of July 3, 2003 our board of directors adopted the 2003 Stock Incentive Plan (the "2003 Plan"), which provided for the grant of non-qualified stock options to purchase a maximum of 320,000 shares of common stock or the grant of shares, to directors, employees, officers, agents, consultants and independent contractors who perform services for the Company. As of the date of this annual report on Form 10-KSB, stockholder approval of the 2003 stock plan has not been obtained. F-24 54 -------------------------------------------------------------------------------- SIGNATURES Pursuant to the requirements of Section 13 or 15(d) of the Securities Exchange Act of 1934, the registrant has duly caused this report to be signed on its behalf by the undersigned, thereunto duly authorized. SECURITY INTELLIGENCE TECHNOLOGIES, INC. /s/ Ben Jamil ------------------------------------ Ben Jamil Chairman of the Board of Directors, President and Chief Executive Officer Dated: October 14, 2003 Pursuant to the requirements of the Securities Exchange Act of 1934, this report has been signed below by the following persons on behalf of the registrant and in the capacities and on the dates indicated: /s/ Ben Jamil /s/ Chris R. Decker -------------------------------------- ------------------------------------ Ben Jamil Chief Financial Officer and Director Chairman of the Board of Directors, Dated: October 14, 2003 President and Chief Executive Officer Dated: October 14, 2003 /s/ Menachem Cohen /s/ Sylvain Naar -------------------------------------- ------------------------------------ Menachem Cohen Sylvain Naar Vice President and Director Vice President and Director Dated: October 14, 2003 Dated: October 14, 2003 /s/ Nomi Om /s/ Tom Felice -------------------------------------- ------------------------------------ Nomi Om Tom Felice Vice President and Director Director Dated: October 14, 2003 Dated: October 14, 2003 55 -------------------------------------------------------------------------------- CERTIFICATION OF CHIEF EXECUTIVE AND FINANCIAL OFFICERS The undersigned chief executive officer and chief financial officer of the Registrant do hereby certify that this Annual Report of Form 10-KSB fully complies with the requirements of Section 13(a) or 15(d) of the Securities Act of 1934, as amended, and that the information contained in this report fairly presents, in all material respects, the financial condition and results of operations of the issuer at the dates and for the periods shown in such report. /s/ Ben Jamil ------------------------------------------ Ben Jamil, Chief Executive Officer /s/ Chris R. Decker ------------------------------------------ Chris R. Decker, Chief Financial Officer Ben Jamil does hereby certify that he is the duly elected and incumbent chief executive officer and Chris R. Decker does hereby certify that he is the duly elected and incumbent chief financial officer of Security Intelligence Technologies, Inc. (the "issuer") and each of them does hereby certify, with respect to the issuer's Form 10-KSB for the fiscal year ended June 30, 2003 (the "report") as follows: 1. He or she has reviewed the report; 2. Based on his or her knowledge, the report does not contain any untrue statement of a material fact or omit to state a material fact necessary in order to make the statements made, in light of the circumstances under which such statements were made, not misleading with respect to the period covered by the report; 3. Based on his or her knowledge, the financial statements, and other financial information included in the report, fairly present in all material respects the financial condition, results of operations and cash flows of the issuer as of, and for, the periods presented in the report; 4. He or she and the other certifying officers are responsible for establishing and maintaining disclosure controls and procedures, as defined in Rule 13a-14(c) of the Securities Exchange Act of 1934, as amended, for the issuer and have: i. Designed such disclosure controls and procedures to ensure that material information relating to the issuer, including its consolidated subsidiaries, is made known to them by others within those entities, particularly during the period in which the periodic reports are being prepared; ii. Evaluated the effectiveness of the issuer's disclosure controls and procedures as of a date within 90 days prior to the filing date of the report (the "Evaluation Date"); and iii. Presented in the report their conclusions about the effectiveness of the disclosure controls and procedures based on the required evaluation as of the Evaluation Date 5. He or she and the other certifying officers have disclosed to the issuer's auditors and to the audit committee of the board of directors (or persons fulfilling the equivalent function): i. All significant deficiencies in the design or operation of internal controls which could adversely affect the issuer's ability to record, process, summarize and report financial data and have identified for the issuer's auditors any material weaknesses in internal controls; and 56 -------------------------------------------------------------------------------- ii. Any fraud, whether or not material, that involves management or other employees who have a significant role in the issuer's internal controls; and 6. He or she and the other certifying officers have indicated in the report whether or not there were significant changes in internal controls or in other factors that could significantly affect internal controls subsequent to the date of their most recent evaluation, including any corrective actions with regard to significant deficiencies and material weaknesses. /s/ Ben Jamil --------------------------- Ben Jamil Chief Executive Officer /s/ Chris R. Decker --------------------------- Chris R. Decker Chief Financial Officer 57 -------------------------------------------------------------------------------- Exhibit 10.2 AGREEMENT This Agreement (this "Agreement") dated as of December 16, 2002 between the Shareholders set forth in Schedule A hereto (the "Shareholders") and Security Intelligence Technologies, Inc. ("SITG"), a Delaware corporation with offices located at 145 Huguenot Street; Suite 310, New Rochelle, New York 10801. WITNESSETH: WHEREAS, on or about April 17, 2002, (the "Closing") SITG and its wholly-owned subsidiary CCS Acquisition Corp., a Delaware corporation and wholly-owned subsidiary of SITG ("MergerSub") engaged in a reverse merger transaction with CCS International, Inc., whereby MergerSub merged with and into CCS, with CCS being the surviving entity and becoming a wholly-owned subsidiary of SITG. WHEREAS, pursuant to the merger agreement, Atlas Equity Group, Inc. ("Atlas Equity"), agreed to enter into a pledge agreement (the "Pledge Agreement") with SITG, pursuant to which, Atlas Equity agreed to pledge 1,500,000 shares of common stock of SITG (the "Pledged Shares") until the Company raised net financing of $925,000 ("Financing"). The Pledge Agreement was amended in June 2002. WHEREAS, pursuant to the merger agreement, Atlas Equity agreed to pay each of the liabilities of SITG incurred prior to April 17, 2002 as set forth in Schedule B, WHEREAS, also at the Closing, Atlas Equity purchased 75,000 shares (the "Purchased Shares") of common stock of SITG for $1.00 per share. WHEREAS, SITG has claimed that Atlas Equity should return the Pledged Shares to SITG because the Financing was not raised in the time periods provided by the Pledge Agreement, as amended, and to pay-off certain liabilities of SITG set forth in Schedule B hereto ("Liabilities"). 58 -------------------------------------------------------------------------------- WHEREAS, Atlas Equity denied that it was in violation of its obligations under the Pledge Agreement and the Merger Agreement. WHEREAS, subject to the terms set forth below, the parties desire to resolve the disputes between the parties relating to the foregoing. NOW THEREFORE, in consideration of the mutual covenants and agreements contained herein, and other good and valuable consideration, the receipt and sufficiency of which is hereby acknowledged, the parties hereto agree as follows: 1. Transfer of Shares to SITG. Subject to the terms and conditions stated herein, Atlas Equity hereby agrees to return to SITG 750,000 of the Pledged Shares (the "Transferred Shares"). The Transferred Shares shall be held in escrow by the attorney for Atlas Equity who shall release said Transferred Shares to SITG or their attorney as they may direct, on the 12 month anniversary date of this Agreement unless: (i) said attorney receives joint written notification from Atlas Equity and SITG instructing it to release the Transferred Shares to SITG prior to that time; or (ii) said attorney receives written notification from Atlas Equity that states with specificity that full compliance with this Agreement has not been complied with and instructing the attorney not to release the Transferred Shares. Atlas Equity represents and warrants that it owns the Transferred Shares and has not transferred, pledged, encumbered or otherwise made subject to any option, right or other interest of any kind. 2. Bleed-Out. Subject to the terms and conditions stated herein, the Shareholders agree that for a period commencing upon the date of this Agreement and ending on the twelve (12) month anniversary date of the date of this Agreement (the "Bleed Out Period"), the Shareholders will not, directly or indirectly, sell or otherwise dispose of ("Transfer") more than 20% of the average monthly trading volume based upon the previous month's trading activity ("Bleed-Out Amount"). Notwithstanding the foregoing and in addition to the Transfer of the Bleed-Out Amount, during the Bleed-Out Period the Shareholders shall be permitted to Transfer such Shares (i) as set forth in Section 3 below, (ii) to satisfy the Liabilities as set forth in Schedule B, (iii) for the aggregate amount of seventy-five thousand dollars ($75,000), and (iv) in the event that Ben Jamil shall sell any of the 11,900,000 shares of common stock owned by him or any of the 5,000,000 shares of preferred stock owned by him, the Shareholders may sell, such number of shares as equals the percentage of Shares owned by the Shareholders and any permitted transferees which the number of shares sold by Ben Jamil bears to 16,900,000 3. Permitted Transfers. In addition to the foregoing, the restrictions contained in Section 2 above will not apply with respect to any of the following transactions (each a "Permitted Transfer"), provided the applicable conditions set forth below in Section 3.2 are satisfied: 3.1 The Shareholder who is a natural person may Transfer the Shares to (a) his or her spouse, children of a spouse, siblings, parents or any natural or adopted children or other descendants or to any personal trust in which such family members or such Shareholder retain the entire beneficial interest or to any charitable trust in which such family members or Shareholder has some beneficial interest or (b) one or more entities that are wholly owned and controlled, legally and beneficially, by such Shareholder and/or any persons or entities referred to in clause (a). (i) The Shareholder that is a corporation, partnership or other business entity may Transfer the Shares (a) to one or more other entities that are wholly owned by a Person or Persons that directly or indirectly wholly owns and controls such Shareholder, or (b) by distributing such Shares in a liquidation, winding up or otherwise without consideration to the equity owners of such corporation, partnership or business entity or any other corporation, partnership or business entity that is wholly owned by such equity owners. 59 -------------------------------------------------------------------------------- (ii) The Shareholder who is a natural person may Transfer the Shares on his or her death to such Shareholder's estate, executor, administrator or personal representative or to such Shareholder's beneficiaries, including charitable beneficiaries, pursuant to devise or bequest or by the laws of descent and distribution. (iii) The Shareholder who is a natural person may Transfer the Shares either as a bona fide inter vivos gift or bequest to any charity, to any public or private charitable foundation, or to any trust for the benefit of charity such as a charitable remainder of charitable lead trust. (iv) The Shareholder may Transfer the Shares pursuant to a pledge, grant of security interest or other encumbrance effected in a bona fide transaction with an unrelated and unaffiliated institutional lender. (v) The Shareholder may Transfer the Shares to any current holder of the common stock of SITG who has signed a bleed-out agreement similar to this Agreement. 3.2 The Shareholder may Transfer the Shares as set forth above, which transfer will qualify as a Permitted Transfer provided the following conditions are met: (a) the Shares, as applicable, subject to such transfer remain subject to this Agreement; and (b) the transferee (and any pledgee or other Person that acquires the Shares upon foreclosure thereof) executes and delivers to SITG a counterpart of this Agreement, whereby such transferee shall be deemed to be a Shareholder for purposes of this Agreement. In such counterpart, the transferee shall specifically agree in writing that they are bound by all of the terms and conditions of this Agreement. 4. Brokerage Account. In order to facilitate the maintenance of the above Bleed-Out restrictions, the Shareholders and each transferee with respect to a Permitted Transfer shall open and maintain brokerage accounts at Wien Securities Corp., and shall deposit all of the Shares remaining after the transfer of the Transferred Shares to SITG into said brokerage accounts at Wien Securities Corp., unless sooner terminated as provided herein. During the term of the Bleed-Out period, Shareholders agree to open new brokerage accounts at a different broker and transfer all Shares to the new brokerage accounts within fifteen (15) days after receipt of a written request to make such transfer from SITG, and Shareholders agree to execute all forms necessary to allow the broker to send to SITG duplicate monthly statements of Shareholder's accounts; provided however, the new brokerage firm must be a nationally recognized broker-dealer and SITG pays the costs and expenses associated with such transfer. 5. Termination of Bleed-Out. Notwithstanding the foregoing, the Bleed Out restrictions shall terminate in their entirety (i) in the event SITG fails to timely file its Quarterly Reports on Form 10-Q or Year End Reports on Form 10K, and fails to cure same within Thirty (30) days; (ii) SITG fails to trade on either the OTC:BB or other National Exchange for a period of Thirty (30) days; (iii) upon a Sale Transaction; or (iv) any other event that would trigger a termination of this Bleed Out under this Settlement Agreement. 5.1 A "Sale Transaction" shall be deemed to have occurred upon the happening of any of the following events: (i) a merger or consolidation of SITG with or into another issuer; or (ii) the exchange or sale of all or a portion of the outstanding shares of SITG for securities of another issuer, or other consideration provided by such issuer or another party to such transaction; and in the case of either (i) or (ii), SITG's shareholders prior to the transaction, do not possess, immediately after such transaction, more than 50% of the voting power of the securities issued and outstanding of any one or more of the following: (x) SITG; (y) such other issuer; or (z) such other constituent party to the transaction; or (iii) a sale (other than in the ordinary course of business) of more than 90% of SITG's assets to a third party not an affiliate of SITG immediately prior to such transaction. 60 -------------------------------------------------------------------------------- 6. Release of Shareholders. Subject to full compliance with the terms and conditions stated herein and subject to the payment of the Liabilities in Schedule B, SITG hereby releases and forever discharges, the Shareholders appearing on Schedule A, their shareholders, affiliates, officers, directors, employees, agents, advisors representatives, heirs, executors, administrators, successors, assigns, attorneys, and representatives including without any limitation, Michael D. Farkas and Rebecca J. Farkas (collectively the "Shareholder Releasees"), from all actions, causes of action, suits, debts, dues, sums of money, accounts, reckonings, bonds, bills, specialties, covenants, contracts, controversies, agreements, promises, variances, trespasses, damages, judgments, extents, executions, claims and demands whatsoever, in law, in admiralty, or in equity, which against the Shareholder Releasees or any of them, SITG its heirs, executors, administrators, successors or assigns, ever had, now have or hereafter can, shall or may, have for, upon or by reason of any matter, cause or thing whatsoever from the beginning of the world to the date hereof, including without limitation the Pledge Agreement; provided, that this Section 6 does not release any Shareholder Releasee from any obligations of such Shareholder Releasee pursuant to this Agreement. Pursuant to the terms of this Section 6, upon the execution of this Agreement, SITG shall execute a Release or Releases which shall contain the terms provided for in this Section 6. Said Release(s) shall be held in escrow by the attorney of SITG who shall release said Release(s) and deliver said Release(s) to the Shareholders or their attorney as they may direct, on the 12 month anniversary date of this Agreement unless: (i) said attorney receives joint written notification from SITG and the Shareholders instructing it to release the Release(s) prior to that time, or (ii) said attorney receives written notification from SITG that states with specificity that full compliance with this Agreement has not been complied with and instructing the attorney not to release the Release(s) to the respective Shareholders. 7. Release of the Company. Subject to full compliance with the terms and conditions stated herein, the Shareholders hereby jointly and severally release and forever discharge, SITG, its shareholders, affiliates, officers, directors, employees, agents, advisors representatives, heirs, executors, administrators, successors, assigns, attorneys, and representatives including without any limitations Ben Jamil (collectively the "Company Releasees"), from all actions, causes of action, suits, debts, dues, sums of money, accounts, reckonings, bonds, bills, specialties, covenants, contracts, controversies, agreements, promises, variances, trespasses, damages, judgments, extents, executions, claims and demands whatsoever, in law, in admiralty, or in equity, which against the Company Releasees or any of them, the Shareholders, and their respective heirs, executors, administrators, successors or assigns, ever had, now have or hereafter can, shall or may, have for, upon or by reason of any matter, cause or thing whatsoever from the beginning of the world to the date hereof; provided, that this Section 7 does not release any Company Releasee from any obligations of such Company Releasee pursuant to this Agreement. Pursuant to the terms of this Section 7, upon the execution of this Agreement by the parties, the Shareholders shall execute a Release or Releases in favor of SITG and its principal Shareholder and chief executive officer, Ben Jamil. Said Release(s) shall contain all of the terms provided for in this Section 7. Said Release(s) shall be held in escrow by the attorney for the Shareholders. Said attorney shall immediately release said Release(s) to SITG and Ben Jamil or their attorney in accordance with their directions, on the 12 month anniversary date of this Agreement unless: (i) said attorney receives joint written notification from the Shareholders and SITG instructing it to release the Releases prior to that time, or (ii) said attorney receives written notification from the Shareholders that states with specificity that full compliance with this Agreement has not been complied with and instructing the attorney not to release the Release to SITG. . 8. Amendment and Modification. This Agreement may not be amended, modified or changed except by a writing which expressly refers to this Agreement, states that it is a modification and is signed by the parties. 61 -------------------------------------------------------------------------------- 9. Waiver of Compliance; Consents. Any failure of either of the parties to comply with any obligation, covenant, agreement or condition herein may be waived by the party entitled to the benefit thereof only by written instrument signed by the party granting such waiver, but such waiver or failure to insist upon strict compliance with such obligation, covenant, agreement or condition shall not operate as a waiver of, or estoppel with respect to, any subsequent or other failure. Whenever this Agreement requires or permits consent by or on behalf of a party, such consent shall be given in writing. 10. Notices. All notices and other communications hereunder shall be deemed given upon (a) the recipient's confirmation of receipt of a facsimile transmission to the recipient's facsimile number, (b) confirmed delivery by a standard overnight carrier to the recipient's address, (c) delivery by hand to the recipient's address or (c) upon receipt if mailed by certified or registered mail, postage prepaid, return receipt requested, addressed to the recipient's addresses (or, in each case, to or at such other facsimile number or address for a party as such party may specify by notice given in accordance with this Section 10): (a) If to Shareholders, to the address set forth under their names on Schedule A hereto: (b) If to SITG, at the address set forth at the beginning of this Agreement, attention of Mr. Ben Jamil, Chief Executive Officer, or by telecopier at (914) 654-1302. If any party refuses to accept delivery (other than by telecopier), notice shall be deemed given on the date of the refusal to accept delivery. 11. Binding Effect. This Agreement shall be binding upon and inure to the benefit of the Shareholders and SITG and their heirs, legal representatives, successors and assigns. 12. Governing Law. This Agreement shall be deemed to have been made, drafted, negotiated and the transactions contemplated hereby consummated and fully performed in the State of New York, and shall be governed by and construed in accordance with the internal laws of the State of New York without regard to the conflicts of laws rules thereof. Each of the parties hereby (a) irrevocably consents and agrees that any legal or equitable action or proceeding arising under or in connection with this Agreement may be brought in the federal or state courts located in the County of New York or Westchester in the State of New York, (b) by execution and delivery of this Agreement, irrevocably submits to and accepts the jurisdiction of said courts, (c) waives any defense that such court is not a convenient forum, and (d) consents that any service of process may be made (x) in the manner set forth in Paragraph 12 of this Agreement (other than by telecopier), or (y) by any other method of service permitted by law. 13. Assignment. Neither this Agreement nor any of the parties' rights, powers, duties or obligations hereunder may be assigned by the parties without the prior written consent of the other party. 14. Severability. If any provision of this Agreement shall be unenforceable under any applicable law, then notwithstanding such unenforceability the remainder of this Agreement shall continue in full force and effect. 15. Entire Agreement. This Agreement constitutes the entire agreement and understanding of the parties hereto with respect to the matters set forth herein and supersedes all prior agreements and understandings between the parties with respect to those matters. There are no promises, representations, warranties, covenants or undertakings other than those set forth herein. 62 -------------------------------------------------------------------------------- 16. Counterparts. This Agreement may be executed in counterparts, each of which shall be deemed an original and both of which taken together shall constitute one and the same document. 17. Survival. To the extent required to give effect to the intent of the parties to this Agreement, the provisions of this Agreement shall survive any termination hereof. IN WITNESS WHEREOF, the parties have executed this Agreement as of the date first above written. SHAREHOLDERS: THE COMPANY: ATLAS EQUITY GROUP, INC. SECURITY INTELLIGENCE TECHNOLOGIES, INC. By: /s/ Michael D. Farkas By: /s/ Ben Jamil ------------------------------- ----------------------------- Name: Michael D. Farkas Name: Ben Jamil Title: Chief Executive Officer Title: Chief Executive Officer /s/ Michael D. Farkas ---------------------- Michael D. Farkas /s/ Rebecca Farkas ---------------------- Rebecca Farkas TITAN CORPORATION LTD. By: /s/ Brendan Hayes ---------------------- Name: Brendan Hayes Title: Director OSTONIAN SECURITIES LTD. By:/s/ Barbara Anderson ---------------------- Name: Barbara Anderson Title: 63 -------------------------------------------------------------------------------- SCHEDULE A SHAREHOLDERS Number of Shares of Common Stock, Par Name and Address Value $.0001 ------------------------------ ------------ Atlas Equity Group, Inc. 750,000 1680 Michigan Ave, Suite 1000 Miami Beach, FL 33139 Michael D. Farkas 75,000 1680 Michigan Ave, Suite 1000 Miami Beach, FL 33139 Rebecca J. Farkas 468,000 1680 Michigan Ave, Suite 1000 Miami Beach, FL 33139 Titan Corporation Limited 750,000 PO Box 118 Chesterfield House 11-13 Victoria Street Douglas, Isle of Man IM1 2LR Ostonian Securities Limited 750,000 60 James Street, 1st Flr. London, England SW1 ALE --------- Total shares 2,793,000 ========= 64 -------------------------------------------------------------------------------- SCHEDULE B LIABILITIES Name and Address Amount ----------------------------- -------- ADP Investor Services $ 815 PO Box 23487 Newark, NJ 07189 Anslow & Jaclin LLP 27,106 4400 Route 9 South, 2nd Floor Freehold, NJ 07728 Business Wire 970 44 Montgomery St., 39th Floor San Francisco, CA 94104 Salibello & Broder LLP 17,288 633 Third Avenue NY, NY 10017 Atlas Equity Group, Inc. 37,199 1680 Michagan Ave., Suite 1000 Miami Beach, FL 33139 -------- Total $ 83,378 ======== 65 -------------------------------------------------------------------------------- Exhibit 10.5 SECURITY INTELLIGENCE TECHNOLOGIES, INC. 2003 Stock Incentive Plan 1. Purpose; Definitions. The purpose of the Security Intelligence Technologies, Inc. 2003 Stock Incentive Plan (the "Plan") is to enable Security Intelligence Technologies, Inc. (the "Company") to attract, retain and reward the key employees, director and consultants as hereinafter set forth. For purposes of the Plan, the following terms shall be defined as set forth below: (a) "Affiliate" means any corporation, partnership, limited liability company, joint venture or other entity, other than the Company and its Subsidiaries, that is designated by the Board as a participating employer under the Plan, provided that the Company directly or indirectly owns at least 20% of the combined voting power of all classes of stock of such entity or at least 20% of the ownership interests in such entity. (b) "Board" means the Board of Directors of the Company. (c) "Code" means the Internal Revenue Code of 1986, as amended from time to time, and any successor thereto. (d) "Commission" means the Securities and Exchange Commission or any successor thereto. (e) "Common Stock" means the Common Stock, par value $.0001 per share, of the Company or any class of common stock into which such common stock may hereafter be converted or for which such common stock may be exchanged pursuant to the Company's certificate of incorporation or as part of a recapitalization, reorganization or similar transaction. (f) "Company" means Security Intelligence Technologies, Inc., a Florida corporation, or any successor corporation. (g) "Eligible Persons" means persons who are natural persons and whose services to the Company are not in connection with the offer or sale of securities in a capital-raising transactions and do not directly or indirectly promote or maintain a market for the Company's securities. (h) "Exchange Act" means the Securities Exchange Act of 1934, as amended from time to time, and any successor thereto. (i) "Non-Qualified Stock Option" means any Stock Option that is not an incentive stock option as defined in Section 422 of the Code. (j) "Plan" means this Security Intelligence Technologies, Inc. 2003 Stock Incentive Plan, as hereinafter amended from time to time. (k) "Stock Grant" means an award of shares of Stock that is subject to restrictions under Section 6 of the Plan. (l) "Stock Option" or "Option" means any option to purchase shares of Common Stock as set forth in Section 5 of the Plan. 66 -------------------------------------------------------------------------------- (m) "Subsidiary" means any corporation or other business association, including a partnership or limited liability company (other than the Company), in an unbroken chain of corporations or other business associations beginning with the Company if each of the corporations or other business associations (other than the last corporation in the unbroken chain) owns equity interests (including stock, partnership interests or membership interests in limited liability companies) possessing 50% or more of the total combined voting power of all classes of equity in one of the other corporations or other business associations in the chain. 2. Administration. The Plan shall be administered by a Committee of not less than two directors of the Company who shall be appointed by the Board and who shall serve at the pleasure of the Board. If, and to the extent that, no Committee exists which has the authority to so administer the Plan, the functions of the Committee specified in the Plan shall be exercised by the Board. 3. Common Stock Subject to Plan. (a) The total number of shares of Common Stock reserved and available for issuance under the Plan shall be three hundred twenty thousand (320,000) shares of Common Stock. In the event that Options granted pursuant to said Section 4 shall for any reason terminate or expire unexercised or Stock Grants granted pursuant to Section 6 shall be forfeited, such number of shares of Common Stock shall be available for the registrant pursuant to Stock Options or Stock Grants pursuant to the Plan. (b) In the event of any merger, reorganization, consolidation, recapitalization, stock dividend, stock split, stock distribution, reverse split, combination of shares or other change in corporate structure affecting the Common Stock, such substitution or adjustment shall be made in the aggregate number of shares reserved for issuance under the Plan and the Options, in the number and option price of shares of Common Stock subject to outstanding Options, as may be determined to be appropriate by the Committee, in its reasonable discretion and consistent with generally accepted accounting principles consistently applied, provided that the number of shares subject to any Option shall always be a whole number. 4. Grant of Options. The Committee may grant Non-Qualified Stock Options under the Plan to Eligible Persons. Options granted under the Plan shall be at such exercise price, not less than the par value per share, and shall have such term and shall be exercisable in such installments as the Committee shall, in its sole discretion, determine. 5. Exercise of Options. (a) The Options may be exercised by payment of cash or of shares of Common Stock having a value equal to the exercise price. The value of the Common Stock shall mean the closing price of the Common Stock on the date the Option is exercised. (b) The Committee may at any time offer to buy out for a payment in cash or Common Stock, any Option in whole or in part and without regard to whether the Option is then exercisable on such terms and conditions as the Committee shall establish and communicate to the Option Holder at the time that such offer is made. Nothing in this Paragraph 5(b) shall require any Option Holder to accept such offer. 67 -------------------------------------------------------------------------------- 6. Stock Grants. (a) Administration. Shares of Stock Grant may be issued to Eligible Persons either alone, in addition to or in tandem with other awards granted under the Plan and/or cash awards made outside of the Plan. The Committee shall determine the Eligible Persons to whom, and the time or times at which, Stock Grants will be made, the number of shares to be awarded, the price (if any) to be paid by the recipient of a Stock Grant, subject to Paragraph 6(b) of the Plan, the time or times within which such awards may be subject to forfeiture, and all other terms and conditions of the awards. The Committee may condition the grant of Stock Grant upon the attainment of specified performance goals or such other factors as the Committee may, in its sole discretion, determine. The provisions of Stock Grant awards need not be the same with respect to each recipient. (b) Awards and Certificates. (i) The prospective recipient of a Stock Grant shall have such rights with respect to such award as are determined by the Committee, and, if requested by the Committee, unless and until such recipient has executed an agreement evidencing the award and has delivered a fully executed copy thereof to the Company, and has otherwise complied with the applicable terms and conditions of such award. (ii) The purchase price for shares of Stock Grant may be equal to or less than their par value and may be zero. Stock Grants may be issued to Eligible Persons in consideration for services rendered. (iii) Awards of Stock Grant must be accepted within a period of 60 days (or such shorter period as the Committee may specify at grant) after the award date, by executing a Stock Grant Award Agreement (if required by the Committee) and paying the price, if any, required under Paragraph 6(b)(ii). (iv) Each participant receiving a Stock Grant shall be issued a stock certificate in respect of such shares of Stock Grant. Such certificate shall be registered in the name of such participant, and shall bear an appropriate legend referring to the terms, conditions, and restrictions applicable to such award; provided, however, that if such Stock Grant is not subject to restrictions, the certificate shall only have such legends, if any, as may be required by applicable federal securities laws. (v) If the Stock Grant is subject to restrictions, the Committee shall require that (A) the stock certificates evidencing shares of Stock Grant be held in the custody of the Company until the restrictions thereon shall have lapsed, and (B) as a condition of any Stock Grant award, the participant shall have delivered a stock power, endorsed in blank, relating to the Stock Grant covered by such award. (c) Restrictions and Conditions. The shares of Stock Grant awarded pursuant to this Section 6 may, in the discretion of the Committee, be subject to any one or more of the following restrictions and conditions: (i) Subject to the provisions of the Plan and the award agreement, during a period set by the Committee commencing with the date of such award (the "Restriction Period"), the participant shall not be permitted to sell, transfer, pledge or assign shares of Stock Grant awarded under the Plan. Within these limits, the Committee, in its sole discretion, may provide for the lapse of such restrictions in installments and may accelerate or waive such restrictions in whole or in part, based on service, performance and/or such other factors or criteria as the Committee may determine, in its sole discretion. (ii) Except as provided in this Paragraph 6(c)(ii) and Paragraph 6(c)(i) of the Plan, the participant shall have, with respect to the shares of Stock Grant, all of the rights of a stockholder of the Company, including the right to vote the shares and the right to receive any regular cash dividends paid out of current earnings. The Committee, in its sole discretion, as determined at the time of award, may permit or require the payment of cash dividends to be deferred and, if the Committee so determines, reinvested, subject to Paragraph 6(c)(v) of the Plan, in additional Stock Grant to the extent shares are available under Section 3 of the Plan, or otherwise reinvested. Stock dividends, splits and distributions issued with respect to Stock Grant shall be treated as additional shares of Stock Grant that are subject to the same restrictions and other terms and conditions that apply to the shares with respect to which such dividends are issued, and the Committee may require the participant to deliver an additional stock power covering the shares issuable pursuant to such stock dividend, split or distribution. Any other dividends or property distributed with regard to Stock Grant, other than regular dividends payable and paid out of current earnings, shall be held by the Company subject to the same restrictions as the Stock Grant. 68 -------------------------------------------------------------------------------- (iii) Subject to the applicable provisions of the award agreement and this Section 6, upon termination of a participant's employment with the Company and any Subsidiary or Affiliate for any reason during the Restriction Period, all shares still subject to restriction will vest, or be forfeited, in accordance with the terms and conditions established by the Committee at or after grant. (iv) If and when the Restriction Period expires without a prior forfeiture of the Stock Grant subject to such Restriction Period, certificates for an appropriate number of unrestricted shares, and other property held by the Company with respect to such Restricted Shares, shall be delivered to the participant promptly. (v) The actual or deemed reinvestment of dividends or dividend equivalents in additional Stock Grant at the time of any dividend payment shall only be permissible if sufficient shares of Stock are available under the Plan for such reinvestment (taking into account then outstanding Stock Options, Stock Purchase Rights and other Plan awards). 7. Amendments. Neither this Plan nor the Options or Stock Grants granted pursuant to this Plan may be amended, altered or discontinued as to any Option Holder without the approval of the Option Holder or the holder of the Stock Grant. 8. General Provisions. (a) The Committee may require each person purchasing shares pursuant to an Option to represent to and agree with the Company in writing that the optionee or participant is acquiring the shares without a view to distribution thereof. The certificates for such shares may include any legend which the Committee deems appropriate to reflect any restrictions on transfer. All certificates or shares of Common Stock or other securities delivered under the Plan shall be subject to such stock-transfer orders and other restrictions as the Committee may deem advisable under the rules, regulations, and other requirements of the Commission, any stock exchange upon which the Common Stock is then listed, and any applicable Federal or state securities law, and the Committee may cause a legend or legends to be put on any such certificates to make appropriate reference to such restrictions. (b) Nothing contained in this Plan shall prevent the Board from adopting other or additional compensation arrangements, subject to stockholder approval if such approval is required; and such arrangements may be either generally applicable or applicable only in specific cases. (c) Neither the adoption of the Plan nor the grant of any award pursuant to the Plan shall confer upon any employee of the Company or any Subsidiary or Affiliate any right to continued employment with the Company or a Subsidiary or Affiliate, as the case may be, nor shall it interfere in any way with the right of the Company or a Subsidiary or Affiliate to terminate the employment of any of its employees at any time. (d) No later than the date as of which an amount first becomes includible in the gross income of an Option Holder for Federal income tax purposes with respect to any Option, the Option Holder shall pay to the Company, or make arrangements satisfactory to the Committee regarding the payment of, any Federal, state, or local taxes of any kind required by law to be withheld with respect to such amount. Unless otherwise determined by the Committee, 69 -------------------------------------------------------------------------------- withholding obligations may be settled with Common Stock, including Common Stock that is part of the award that gives rise to the withholding requirement. The obligations of the Company under the Plan shall be conditional on such payment or arrangements and the Company and its Subsidiaries or Affiliates shall, to the extent permitted by law, have the right to deduct any such taxes from any payment of any kind otherwise due to the participant. 9. Effective Date of Plan. The Plan shall be effective as of July 3, 2003 the date the Plan was approved by the Board. 70 -------------------------------------------------------------------------------- Exhibit 21.1 List of Subsidiaries -------------------- State of Subsidiary Incorporation Doing Business AS --------------------------- --------------- --------------------------------------- Hipstyle.com, Inc. Delaware Hipstyle.com, Inc. CCS International, Ltd. Delaware CCS International, Ltd. Counter Spy Shop of Mayfair London, Ltd. DC Counter Spy Shop of Mayfair London, Ltd. Counter Spy Shop of Mayfair London, Ltd., Inc. Florida Counter Spy Shop of Mayfair London, Ltd Counter Spy Shop of Mayfair London, Ltd. CA Counter Spy Shop of Mayfair London, Ltd. Spy Shop Ltd. NY Counter Spy Shop of Delaware Security Design Group, Inc. NY Security Design Group, Inc. Counter Spy Shop of Mayfair, Ltd. London, UK Counter Spy Shop of Mayfair, Ltd. 71 -------------------------------------------------------------------------------- End of Filing ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9872 From: James M. Atkinson Date: Thu Oct 14, 2004 5:05pm Subject: CCS International / SITG Public SEC Documents - 2004 Annual Report [repost] SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-KSB [X] ANNUAL REPORT PURSUANT TO SECTION 13 OR 15 (d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended June 30, 2004 OR [ ] TRANSITION REPORT PURSUANT TO SECTION 13 OR 15 (d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from ________ to ________ COMMISSION FILE NUMBER 000-31779 SECURITY INTELLIGENCE TECHNOLOGIES, INC. Exact name of registrant as specified in its charter) Florida 65-0928369 (State or other jurisdiction of formation) (IRS Employer Identification No.) 145 Huguenot Street, New Rochelle, New York 10801 (Address of principal executive offices) (Zip Code) Registrant's telephone number, including area code (914) 654-8700 (Former name or former address, if changes since last report) Check whether the issuer (1) filed all reports required to be filed by Section 13 or 15(d) of the Exchange Act during the past 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days. Yes X No Check if there is no disclosure of delinquent filers in response to Item 405 of Regulation S-B is not contained in this form, and no disclosure will be contained, to the best of registrant's knowledge, in definitive proxy or information statements incorporated by reference in Part III of this Form 10-KSB or any amendment to this Form 10-KSB. [ ] The Registrant's revenues for the fiscal year ended June 30, 2004 were $3,013,332. State the aggregate market value of the voting and non-voting common equity held by non-affiliates computed by reference to the price at which the common equity was sold, or the average bid and asked price of such common equity, was $2,010,401 at September 29, 2004. The number of shares of common stock $.0001 par value, of the Registrant issued and outstanding as of September 29, 2004 was 22,413,316. -------------------------------------------------------------------------------- DOCUMENTS INCORPORATED BY REFERENCE None TABLE OF CONTENTS Page Number PART I 3 BUSINESS 6 PROPERTIES 11 LEGAL PROCEEDINGS 11 SUBMISSION OF MATTERS TO A VOTE OF SECURITYHOLDERS 12 PART II 12 MARKET FOR RESISTRANT'S COMMON EQUITY AND RELATED STOCKHOLDER MATTERS 12 MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS 15 FINANCIAL STATEMENTS AND SUPPLEMENTARY DATA 20 CHANGES IN AND DISAGREEMENT WITH ACCOUNTANTS ON ACCOUNTING AND FINANCIAL DISCLOSURE 20 CONTROLS AND PRODEDURES 20 OTHER INFORMATION 20 PART III DIRECTORS, EXECUTIVE OFFICERS, PROMOTERS AND CONTROL PERSONS; COMPLIANCE WITH SECTION 16 (a) OF THE EXCHANGE ACT OF THE REGRISTRANT 20 EXECUTIVE COMPENSATION 23 SECURITY OWNERSHIP OF CERTAIN BENEFICIAL OWNERS AND MANAGEMENT 24 CERTAIN RELATIONSHIPS AND RELATED TRANSACTIONS 26 -2- -------------------------------------------------------------------------------- Forward-Looking Statements Statements in this Form 10-KSB report may be "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995. Forward-looking statements include, but are not limited to, statements that express our intentions, beliefs, expectations, strategies, predictions or any other statements relating to our future activities or other future events or conditions. These statements are based on current expectations, estimates and projections about our business based, in part, on assumptions made by management. These statements are not guarantees of future performance and involve risks, uncertainties and assumptions that are difficult to predict. Therefore, actual outcomes and results may, and probably will, differ materially from what is expressed or forecasted in the forward-looking statements due to numerous factors, including those described above and those risks discussed from time to time in this Form 10-KSB report, including the risks described under "Risk Factors" and Management's Discussion and Analysis of Financial Condition and Results of Operations" and in other documents which we file with the Securities and Exchange Commission. In addition, such statements could be affected by risks and uncertainties related to our financial condition, factors which affect the security industry, market and customer acceptance, competition, government regulations and requirements and pricing, as well as general industry and market conditions and growth rates, and general economic conditions. Any forward-looking statements speak only as of the date on which they are made, and we do not undertake any obligation to update any forward-looking statement to reflect events or circumstances after the date of this Form 10-KSB. PART I ITEM 1. DESCRIPTION OF BUSINESS COMPANY OVERVIEW We design, assemble, market and sell security products. Our products and services are used throughout the world by military, law enforcement and security personnel in the public and private sectors. Our clients include governmental agencies, multinational corporations and non-governmental organizations. Our products include a broad range of professional, branded law enforcement and consumer equipment such as covert audio and video intercept, electronic countermeasures, video, photo, and optical systems, radio communication, explosive contraband detection, armored vehicles and clothing, nuclear, biological and chemical masks and protective clothing, voice stress analysis lie detection, and global positioning systems ("GPS"), used for tracking, locating and recovering vehicles and fleet management. Our products are marketed under Security Intelligence Technologies, Inc. ("SIT"), Homeland Security Strategies, Inc. ("HSS"), CCS International, Ltd. ("CCS"), G-Com Technologies and The Counter Spy Shops of Mayfair, London(R) brand names and are sold primarily through a worldwide network of sales agents, including four sales office in the United States, one sales office in Hong Kong and one retail store/service center in London. Our trained, multilingual and experienced security personnel work closely with clients to create and implement solutions to complex security problems. These services include security planning, advice and management, security systems integration, intellectual property asset protection, due diligence investigations and training programs in counterintelligence, counter surveillance, and ballistics. During fiscal 2004, we entered into an exclusive distribution agreement with a European company that develops manufacturers and markets products designed to monitor, intercept and jam radio frequency signals and other electronic devices. The agreement grants us the exclusive worldwide marketing rights to its products except in the country it is domiciled. As of June 30, 2004 we had taken orders for $555,000 of their products. We anticipate delivery of these orders during the fourth quarter of 2004. We are a Florida corporation organized under the name Hipstyle.com, Inc. in June 1999. In April 2002, in a transaction characterized as a reverse merger, CCS International, Ltd. ("CCS") was acquired by us and our corporate name was changed to Security Intelligence Technologies, Inc. The transaction by which we acquired the stock of CCS is referred to in this Form 10-KSB as the "reverse merger". From and after April 17, 2002, our business was the business conducted by CCS prior to the reverse merger. -3- -------------------------------------------------------------------------------- Our principal executive offices are located at 145 Huguenot Street, New Rochelle, New York 10801, telephone (914) 654-8700. Our website is www.spyzone.com. Neither the information nor other statements contained in our website nor the information contained in any other Internet website is a part of this annual report on Form 10-KSB. RISK FACTORS We require significant working capital in order to fund our operations. At June 30, 2004, we had cash of $172,621 and a working capital deficit in excess of $7.4 million and for the fiscal year ended June 30, 2004, our operations generated a negative cash flow of $855,000. In order to pay our current obligations and develop and market our products, we require significant additional working capital. We have incurred losses in the past, our losses are continuing and we continue to generate negative cash flow from operations. As a result, our working capital deficiency is increasing. In the event that we are unable to raise the necessary funding we may be unable to continue operations and it may be necessary to seek protection under the Bankruptcy Code. Our increasing current liabilities reflect our inability to pay creditors currently. We have used our customer deposits to pay creditors and finance our operations. If our vendors do not extend us necessary credit we may not be able to fill current or new orders, which may affect the willingness of our clients to continue to place orders with us or to make advance payments to us. Our inability to obtain advance payments from customers will impair our ability to obtain components necessary to make products, which, in turn, may necessitate a cessation of business. Further, if one or more of our creditors or customers obtain significant judgments against us and seeks to enforce the judgments, our ability to continue in business would be impaired and it may be necessary for us to seek protection under the Bankruptcy Code. We have no commercial credit availability. Except for a $500,000 credit facility provided by a group of private investors, we do not have any credit facility. The loans under the credit facility, which are convertible into common stock, are due on June 30, 2005. Unless we can obtain either equity financing or a substitute lender prior to June 30, 2005, we do not believe that we will have the resources to pay the lenders. We do not presently have any agreements or understandings with respect to an equity financing or credit facility, and, in view of our substantial working capital deficit and continuing losses, we may be unable to raise equity or obtain a credit facility. If we are not able to pay the loans when they mature, and the lenders do not covert their loans or grant us an extension, it may be necessary for us to cease operations and seek protection under the Bankruptcy Code. We have been operating at a loss, and our losses are continuing. We sustained losses of $5.0 million, or $.25 per share (basic and diluted), for the fiscal year ended June 30, 2004, $3.8 million, or $.22 per share (basic and diluted), for the fiscal year ended June 30, 2003, and our losses are continuing. We cannot give any assurance that we can or will ever operate profitably. Our failure to operate profitably is affecting the willingness of customers to place orders with us and the willingness of our suppliers to provide us with necessary components. Our independent auditors have included an explanatory paragraph in their report as to our ability to continue as a going concern. As a result of our continuing and significant losses and our working capital deficiency, our independent auditors have included in their report an explanatory paragraph as to our ability to continue as a going concern. If we do not have access to the most current technology, we may not be able to market our products and services. The security industry is constantly changing to meet new requirements, which result from both new threats to government and industry, both from potential threats to persons and property to industrial and governmental espionage, as well as general concern about personal and family safety. In order to meet these needs we will both have to anticipate problems and develop methods or reducing the potential risk. We rely primarily on the performance and design characteristics of our products in marketing our products, which requires access to state-of-the art technology in order to be competitive. Our business could be adversely affected if we cannot obtain licenses for such updated technology or develop state-of-the-art technology ourselves. Because of our financial problems, we are not able to devote any significant effort to research and development, which could increase our difficulties in making sales of our products. -4- -------------------------------------------------------------------------------- Because of our limited resources, we may not be able to develop or implement a successful marketing program. Our ability to implement an expanded marketing program is dependent upon our ability to fund the program. If we are not able to obtain necessary financing, we may be unable to market our products. Furthermore, our financial condition may inhibit potential customers from purchasing our equipment and our competitors may use our financial condition in marketing to the same customers. We are subject to government regulations, which if violated, could prohibit us from conducting a significant portion of our export business and result in criminal liability. The United States and other governments have strict regulations concerning the exporting and importing of security devices, which may restrict sales of certain products to bona fide law enforcement agencies or may restrict the sale of certain products from the United States. If we violate any of these laws, we may be subject to civil or criminal prosecutions. If we are charged with any such violations, regardless of whether we are ultimately cleared, we may be unable to sell our products. During the fiscal year ended June 30, 2003 we incurred significant expense and our reputation was impaired as a result of criminal charges against our employees, including one of our officers, even though the charges were dismissed. Because we are dependent on our management, the loss of key executive officers could harm our business. Our business is largely dependent upon our senior executive officers, Messrs. Ben Jamil, chief executive officer, Chris R. Decker, chief financial officer, and Menahem Cohen, vice president. Although we have an employment agreement with Mr. Jamil, the employment agreement does not guarantee that he will continue with us. Since we do not have an agreement with Messrs. Decker, and Cohen, both of these officers has the right to terminate his employment. Our business may be adversely affected if any of our key management personnel or other key employees left our employ. Because we lack patent or copyright protection, we cannot assure you that others will not be able to use our proprietary information in competition with us. -------------------------------------------------------------------------------- We have no patent or copyright protection for our proprietary software, and we rely on non-disclosure agreements with our employees. Since our business is dependent upon our proprietary products, the unauthorized use or disclosure of this information could harm our business. Major corporations may be able to develop and fund marketing efforts that could enable them to dominate the market. Because there are a number of major companies that can both offer security products to governments and industry and fund a product development and marketing program, these companies have the financial ability to dominate the market, to effectively set a standard which may be incompatible with our technology and to use their financial resources and government and industry contacts to successfully compete against us in all major markets, regardless of whether their technology is superior or inferior to ours. Our growth may be limited if we cannot make acquisitions. A part of our growth strategy is to acquire other businesses that are related to our current business. Such acquisitions may be made with cash or our securities or a combination of cash and securities. To the extent that we require cash, we may have to borrow the funds or issue equity. Our stock price and financial condition may adversely affect our ability to make acquisitions for equity or to raise funds for acquisitions through the issuance of equity securities. If we fail to make any acquisitions, our future growth may be limited. Furthermore, because of our stock price, the issuance of any stock or other equity securities in connection with any acquisition may result in significant dilution to our stockholders and may result in a change of control. As of the date of this report we do not have any agreement or understanding, either formal or informal, as to any acquisition. If we make any acquisitions, they may disrupt or have a negative impact on our business. If we make acquisitions, we could have difficulty integrating the acquired companies' personnel and operations with our own. In addition, the key personnel of the acquired business may not be willing to work for us, and our officers may exercise their rights to terminate their employment with us. We cannot predict the affect expansion may have on our core business. Regardless of whether we are successful in making an acquisition, the negotiations could disrupt our ongoing business, distract our management and employees and increase our expenses. We do not anticipate paying dividends on our common stock. The rights of the holders of common stock may be impaired by the potential issuance of preferred stock. Our certificate of incorporation gives our board of directors the right to create new series of preferred stock. As a result, the board of directors may, without stockholder approval, issue preferred stock with voting, dividend, conversion, liquidation or other rights which could adversely affect the voting power and equity interest of the holders of common stock. Preferred stock, which could be issued with the right to more than one vote per share, could be utilized as a method of discouraging, delaying or preventing a change of control. The possible impact on takeover attempts could adversely affect the price of our common stock. Although we have no present intention to issue any additional shares of preferred stock or to create any new series of preferred stock, we may issue such shares in the future. -5- -------------------------------------------------------------------------------- Shares may be issued pursuant to our stock plans which may affect the market price of our common stock. We may issue stock upon the exercise of options or pursuant to stock grants covering an aggregate of 2,970,000 shares of common stock pursuant to our stock incentive plans, including options to purchase 2,609,500 shares which were outstanding on June 30, 2004. The exercise of these options and the sale of the underlying shares of common stock and the sale of stock issued pursuant to stock grants may have an adverse effect upon the price of our stock. Because we are subject to the "penny stock" rules, stockholders have difficulty in selling our common stock. Because our stock is traded on the OTC Bulletin Board and our stock price is very low, our stock is subject to the Securities and Exchange Commission's penny stock rules, which impose additional sales practice requirements on broker-dealers that sell our stock to persons other than established customers and institutional accredited investors. These rules may affect the ability of broker-dealers to sell our common stock and may affect the ability of our stockholders to sell any common stock they may own. A third party may claim ownership of stock held by our chief executive officer. In connection with an agreement between Mr. Ben Jamil and two financial consultants entered into prior to the April 2002 reverse merger of CCS into us, the consultants or their designees were to purchase a 30% interest in five of our subsidiaries, and that 30% was to have been exchanged for 1,500,000 shares of series B preferred stock. Mr. Jamil has advised the consultants and their designees that, as a result of their failure to pay the consideration for the shares, the agreement is terminated and they have no interest in the series B preferred stock or the stock in the five subsidiaries. It is possible that the consultants or their designees may claim that they own the series B preferred stock or the stock in the five subsidiaries and we can give no assurance that their claim will not be upheld. We may not be able to comply in a timely manner with recently enacted corporate governance provisions. Beginning with the enactment of the Sarbanes-Oxley Act of 2002 in July 2002, a significant number of new corporate governance requirements have been adopted or proposed. We believe that we currently comply with all of the requirements that have become effective thus far that relate to companies whose common stock is not listed in the Nasdaq Stock Market or a registered stock exchange. As a result of our financial condition and the price of our stock, we may be unable to attract independent directors or implement certain policies which are required but which are expensive to implement, including systems relating to accounting controls. Our failure to be in compliance with applicable securities laws and regulations could result in our inability to continue to be traded on the OTC Bulletin Board which in turn would result in increased difficulty for stockholders to sell their shares. INDUSTRY OVERVIEW Increasingly, governments, including the military, businesses and individuals have recognized the need for security products and services to protect them from the risks associated with terrorism, physical attacks, threats of violence, white-collar crime and fraud. The United States has been the target of several deadly terrorist attacks directed towards its citizens and facilities around the world. As a result, institutions, including the United States Department of Defense and other government agencies and multinational corporations are redefining strategies to protect against and combat terrorism. As a company in the security products industry, we market our products in two markets - the law enforcement security market and the specialized security services market. -6- -------------------------------------------------------------------------------- Law Enforcement Security Products Market. In response to an increased emphasis on safety and protection, the number of active police officers has increased significantly over the past several years. By 1999 there were more than 900,000 law enforcement personnel in the United States. We expect an increase in law enforcement personnel as a partial response to the September 11, 2001, attacks which, we believe, will lead to increased demand for security products and we are seeking to participate in this demand. Specialized Security Services Market. Corporations are increasingly contracting private companies to handle all or a portion of their security services. Industry studies reflect a growth rate in the market for worldwide security services market at 8.0% annually from 1999 to 2003, and we believe that the market is continuing to grow. We believe that demand by multinational corporations and governmental agencies for security services such as risk assessment, crisis management, guard force management, security force organization and executive protection is likely to increase as these entities continue to establish operations and manufacturing facilities in developed and developing countries. In addition, demand for corporate investigative services continues to grow as businesses react to the need to protect their assets against the growing threat of white collar crime including fraud, counterfeiting and piracy of intellectual property. GROWTH STRATEGY We believe that the following strengths are critical to our success as a provider of surveillance and security products, and security risk management services. Broad Portfolio of Products and Services. We believe that a broad range of products, strong branding, and a distribution network is critical to our success as a provider of security products and services. We are able to offer a wide range of security consulting services, equipment, and systems that enable us to provide comprehensive solutions to our customers' security needs. Our goal is to strengthen our capabilities as a single source provider of global security systems and services. Our international infrastructure enables us to assist government buyers and multinational corporate clients who are responding to security concerns as they both expand their business into new countries and seek to provide greater security for their existing facilities and personnel. Strong and Recognized Brands. We believe that our brand names are recognized in our markets and that our market recognition, combined with what we believe is a high level of performance has contributed to our developing market positions in a number of the product categories in which we compete. We believe that the demand for both security and surveillance products and security risk management services will continue to grow. We will address this growth by offering a comprehensive array of premium security risk management products and services. By establishing a critical mass of products and services and a broad base of customers, we believe that we have developed the capacity to perform multiple aspects of our clients' threat analyses and security provisions on a comprehensive basis. We will continue to seek to implement this growth strategy primarily through internal expansion of our existing businesses and through strategic acquisitions of businesses offering complementary services, markets, and customer bases. However, because of our financial condition and the low price of our stock, we may not be able to acquire any businesses or implement our growth strategy. Products and Services We distribute a wide range of specialized products and systems covering security, privacy, home and personal protection, confidential business communications, lie detection, cellular phone privacy, drug and bomb contraband detection, miniaturized covert audio and video surveillance and protection, digital, the Internet, global systems for mobile communications ("GSM"), personal communication systems ("PCS"), time division mobile access ("TDMA") and code division multiple access ("CDMA") satellite technologies and wireless communications. -7- -------------------------------------------------------------------------------- Products We offer the following products: - Covert audio and video logging systems to monitor employees and household surveillance. - Scramblers, data and fax transmission systems to protect and secure communications. - Fax managers that log the activities of outgoing and incoming faxes. - Armored and bulletproof clothing and automobiles. - Counter-surveillance, wiretap detection and electronic counter-measures. - Night vision, electro-optic devices and infrared scopes and cameras. - Anti-hacking and secure remote computing to protect computer networks. - Bomb and weapons and other contraband detection for airport security, business, and home. - Personal Protection Products. - Voice stress analyzers and lie detection to evaluate the honesty of employees or vendors - Tracking and recovery and fleet management systems. - Cellular telephone tracking systems for 911 emergency programs. - Communication jamming systems. We develop and market integrated systems for the surveillance of global system for mobile communications and other communications. With the recent developments in communication technologies, there are numerous fundamental systems underlying digital wireless communications throughout the world. Intelligence professionals require the ability to monitor, intercept and block various global systems for mobile communications, personal communication systems and other systems using a variety of communications access and monitoring systems. Our customers for our integrated systems for the surveillance of global systems for mobile communications usually request us to custom design a system to meet their communications surveillance requirements and are based on extensive engineering studies of the existing communications systems in each customer's country, along with an in-depth analysis of the various individual needs of the customer. Examples of our global systems for mobile communications intercept systems are the GSM 2060, a passive off-the-air intercept system which allows a user to target a specific cellular transmission and listen to both incoming and outgoing conversations and the GSM 4000, which was designed for an international west European security group and is a multi-channel monitoring system capable of intercepting various band transmissions simultaneously, while recording multiple conversations. In addition to our integrated systems for the surveillance of global system for mobile communications, we have developed and we market cellular interception for operation on analog advanced mobile phone systems, digital advanced mobile phone system, and time division multiple access systems, as well as various other equipment for wireless and hard-wired communications surveillance for voice, fax and data. We offer radio communication; monitoring and radio frequency jamming equipment designed to combat terrorist activation of bombs utilizing radio controlled incendiary devices ("RCIED's"). These products include a system built into a briefcase for VIP personal protection, and vehicle mounted systems for military use. These systems have multiple bands and operate by creating an intensive electromagnetic field that saturates the airwaves thereby disabling the operation of a RCIED. We offer a configurable emergency rescue, theft recovery, fleet management or freight management system. Our system uses the well-known global positioning system ("GPS") satellite tracking system which can combine with an optional sophisticated location prediction algorithm software package that takes over position reporting functions whenever the vehicle enters a dead satellite access zone. This unique and rugged system supplies real time position and status information from the customer's location to one of several possible call center configurations. The call center can track the location of a customer's vehicle and has features to report theft, breakdowns, and rescue requests. Optional configurations allow the end user to perform an analysis of driver's performance, manage public transportation line routes, perform automated fleet and freight management for commercial trucking, and dispatch police, ambulance, and taxicabs. Services We offer comprehensive security training programs in counterintelligence and counter-surveillance in Miami, New York, London and Hong Kong. This training, offered to United States government agencies, friendly nations, and clients in the private sector in the United States and in foreign countries, includes methods of recognizing, deterring, and minimizing security risks. We have conducted seminars for intelligence personnel, crime fighting associations and their associated membership societies, from CIA to FBI to United States Customs, United States Coast Guard, military branches, police departments from New York City's strategic command to police chiefs from innumerable cities and towns across the country. -8- -------------------------------------------------------------------------------- We offer the design, integration, application analysis and technical support of sophisticated electronic and computer driven surveillance, monitoring, tracking and recovery and secure communication equipment. We offer site surveys and security solutions that include consultations and law enforcement training by experienced security personnel who act as advisors and instructors. Our consultants oversee in-country installations and train the client's personnel in the installation, use and maintenance of their security equipment. These clients are from the corporate world as well as governmental, public and private agencies. Marketing and Distribution We have a network of sales representatives and international distributors who sell and service our law enforcement equipment. Our distributors and we currently operate in a number of countries and serve a client base representing governmental and non-governmental agencies as well as multinational corporations worldwide. However, during the past year we have been in litigation with three of our distributors. See "Item 3. Legal Proceedings". When first entering a foreign market, we seek to promote a comprehensive range of products and services by seeking qualified sales representatives with local ties and existing relationships within the country's business and governmental communities. We try to tailor our marketing strategy to each geographic area of the world, and further to tailor our product offering by country. There are opportunities for cross marketing of military and law enforcement products, which strengthen the image of each product group and further enhance our position as an integrated provider of a wide selection of such products and services. We employ a variety of marketing programs in support of our reseller's channels to make our target markets aware of the value of our integrated systems and technology and to help create pre-sales demand for our resellers. These programs include trade shows, advertising campaigns, seminars, direct mailings, brochures and other promotional efforts designed to generate sales leads. Training programs are an integral part of our customer service. In addition to enhancing customer satisfaction, we believe that they also help breed customer loyalty and brand awareness, so that we may sell additional products to the same customer. We also use our website to generate brand awareness. However, because of our limited resources, we have reduced our advertising and promotional expense. Joint Venture Agreements We are a party to three joint venture agreements with technology companies. In connection with these agreements we and our joint venture partner formed new entities whose ownership and share of operating results are equally owned. The joint venture agreements grant the new entities exclusive marketing rights to the joint venture partner's products, except in the countries the joint venture partners are domiciled. Product Design and Installation Our engineering staff is involved in both developing new systems made possible by the advances in technology and continually improving the production process and reducing the cost of the products. We generally provide installation services for the more sophisticated integrated systems for the surveillance of global systems for mobile communications systems. Installation phases may include site surveys, identification of central command site location, supervision of the installation of site interfaces, and training personnel to manage systems. We generally provide warranty maintenance and support services for the first three to twelve months following installation of a system, depending on the terms of each particular contract. Thereafter, long-term service is provided on a service-contract basis. -9- -------------------------------------------------------------------------------- We assemble our products from components that are readily available from a number of suppliers. We do not have any long-term supply contracts. Competition The security industry includes companies that offer a range of products and services, such as access control, personnel protection, surveillance, counter-surveillance, computer security, vehicular security, night vision, fiber optics and communications. In order to meet the needs of a prospective customer, we believe that it is necessary to offer integrated solutions across industry lines rather than to offer a range of devices. There are a large number of companies who offer products or services aimed at one or more segments of the security industry, and new technologies are being developed by both new companies and major companies. However, we believe that as the severity of the problem or potential problem increases governments and major corporations, including financial institutions, are less concerned with the price of the products than with such factors as: - The perceived ability of the vendor to treat the identity of the client, the scope of the work and the solution in confidence. - The ability of the vendor to offer an integrated approach that seeks to address the problem by offering a wide range of products and services rather than to offer solutions based on a small range of products and services. - On the other hand, major clients are concerned about the financial condition of the vendor, and our financial condition, including our significant working capital deficiency and our history of losses, raise questions as to our ability to perform under the purchase order and to provide the necessary support following delivery. Competitors have used and may continue to use our financial condition and their stronger financial condition, resources and relationships in marketing their products and services regardless of whether their products and services are better than ours. As discussed below, many of our competitors are substantially stronger than we are financially and are very well known in the industry and have significant government and industry contacts and relationships. The marketplace for manufacturers and vendors for security and surveillance products and systems is highly competitive and consists of numerous organizations ranging from internet-based mail-order firms to military armament manufacturers such as, Lockheed Martin, and Harris. Other aerospace manufacturers have rushed into the arena of bomb detection and other explosive ordinance disposal ("EOD") products. The security marketplace continues to favor the more established and reliable manufacturers such as Nice (Israel) and Thompson C.S.F. now a part of Thales Group (France) with proven technology. Siemens (Germany), and Rohde & Schwartz (Germany), are manufacturers of "simulated" base stations. Currently there is growing competition in the cellular interception and monitoring systems market. Although many competitors have greater financial, technical and other resources, we believe that at present our technology gives us a competitive advantage, although because of our financial condition and continuing losses, we are having difficulty competing in this market. In all of these areas, the major corporations have the ability to develop competitive products and fund a marketing effort that enable them to compete successfully against us regardless of whether their products are superior. Research and Development Because of our financial condition our research and development effort has been limited to the development of certain new products and improvement of existing products. Because of our working capital limitations, we have not been able to expand our research and development effort. During the past two years we did not expend any significant amount on research and development activities. -10- -------------------------------------------------------------------------------- Intellectual Property Rights We have no patents or copyrights on our products, and we rely on non-disclosure agreements with our employees. Since our business is dependent upon our proprietary products, the unauthorized use or disclosure of this information could harm our business. We currently own a number of United States trademark registrations. Government Regulation The United States and other governments have strict regulations concerning the exporting and importing of certain security devices that may restrict sales of certain products to bona fide law enforcement agencies or may restrict the sale of products in or from the United States. We are subject to federal licensing requirements with respect to the sale in foreign countries of certain of our products. In addition, we are subject to a variety of federal, state, local and foreign regulations that govern our operations and the workplace. We are also subject to certain regulations promulgated by, among others, the United States Departments of Commerce and State. Employees As of September 29, 2004, we had a total of approximately 30 employees, of whom 18 were employed at our main office and 12 were employed at our sales offices or service center. None of our employees are represented by unions or covered by any collective bargaining agreements. We have not experienced any work stoppages or employee related slowdowns and believe our relationship with our employees is good. Item 2. PROPERTIES We lease approximately 9,840 square feet of executive offices and warehouse space at 145 Hugeunot Street, New Rochelle, NY 10801 under a lease that expires on October 31, 2010. The annual rent is approximately $125,000, and is subject to annual increases. We also lease approximately 9,000 square feet for five of our sales offices and one retail/service center locations in Miami, Florida, New York City, Washington, DC Beverly Hills, CA, London, England, and Hong Kong under leases that expire from 2004 to 2010 at a current annual rent of $428,000 , subject to annual increases. We believe that our present facilities are adequate to meet our immediate requirements and that any additional space we may require will be available on reasonable terms. Item 3. LEGAL PROCEEDINGS Because of our financial position, actions have been commenced or threatened by creditors. Currently we are defending lawsuits for the collection of approximately $894,000 and have been unable to satisfy approximately $167,000 of judgments previously rendered in actions by creditors. In June 1998, a photographer and model formerly retained by CCS filed suit in U. S. District Court for the Southern District of New York captioned Ross & Vassilkioti v. CCS International, Ltd. seeking damages for alleged copyright infringement and other claims. The judge in the case has granted the plaintiff partial summary judgment as to the copyright infringement. On June 18, 2003, a jury awarded the plaintiffs $350,000 on the copyright infringement portion of the case. Under federal judicial rules, the Company is unable to contest the granting of partial summary judgment until a final judgment has been rendered. The Company reached a settlement on May 7, 2004 with the plaintiffs for $600,000 payable with 550,459 shares of the Company's common stock. The agreement stipulates the shares will be valued at their average closing price for the 30 days beginning July 7, 2005 and ending August 5, 2005. CCS has guaranteed that the value of the shares will be at least $300,000 and is responsible for the amount that $300,000 exceeds the value of the shares. Ben Jamil, our chief executive officer and principal stockholder has guaranteed that the value of the shares will be at least $150,000. On November 1, 2002, a former Company supplier filed suit in the United States District Court for the District of Maryland, captioned Micronel Safety, Inc. v. CCS International Ltd. seeking damages of $242,400 for breach of contract to purchase certain products. CCS has denied the material allegations of the plaintiff's claim and has raised affirmative defenses thereto. In August 2004, Micronel Safety, Inc. found another buyer for the products and on August 16, 2004 the case was dismissed. -11- -------------------------------------------------------------------------------- On or about March 13, 2003, an action was commenced against CCS and its subsidiary in the Circuit Court of the 11th Judicial Circuit, Miami-Dade County, Florida captioned Welcome Publishing Company, Inc. v. CCS International, Ltd. and Counter Spy Shop of Mayfair Ltd., Inc. seeking damages of $140,430 for an alleged breach of an advertising contract. CCS has denied the material allegations of the plaintiff's claim and has raised affirmative defenses thereto. The Company believes that it has valid defenses to the claim. The case appears to be going to trial however, a trial date has not been set. The Company is also the defendant in three actions arising out of distributor agreements. On or about May 11, 2000 an action was commenced against CCS in the Supreme Court, New York County, captioned Ergonomic Systems Philippines Inc. v. CCS International Ltd. The plaintiff seeks to recover $81,000, which was paid to CCS in connection with a distributorship agreement between the parties, plus costs and interest. CCS has denied the material allegations of the claim and has raised affirmative defenses thereto. On August 3, 2004, the Court granted the plaintiff's claim which, together with accrued interest, totaled $120,223. The Company believes that it has a valid basis for appeal of the court's verdict, but it can give no assurance the court verdict will not be upheld. On or about October 12, 2001, an action was commenced against CCS in the United States District Court for the Southern District of New York, captioned China Bohai Group Co., Ltd. and USA International Business Connections Corp. v. CCS International, Ltd. The plaintiff seeks to recover $250,000 paid to CCS in connection with a distributorship agreement between the parties, plus $5,000,000 of punitive damages and costs and interest. CCS has denied the material allegations of the plaintiff's claim and has raised affirmative defenses thereto. CCS has asserted a counterclaim seeking damages in the approximate amount of $1,150,000 based upon the plaintiff's alleged breach of the parties' distributorship agreement. The Company believes that it has valid defenses to the claim. On December 3, 2002 EHS Elektronik Sistemleri submitted a demand for arbitration to the American Arbitration Association in New York City claiming CCS breached a joint venture agreement it had entered into with CCS in 1994 and seeking a refund of the $200,000 it had paid to CCS. On March 4, 2004 the arbitrator awarded the plaintiff's claim which, together with accrued interest, totaled $223,620. The Company believes that it has a valid basis for appeal of the arbitrator's award but it can give no assurance the American Arbitration Association will not uphold the award. On July 1, 2002, the Company's London subsidiary, Homeland Security Strategies (UK), Ltd. (formerly Counter Spy Shop of Mayfair Limited) ("HSS of UK"), entered into an agreement to assume the business operations of another United Kingdom corporation ("Predecessor") for nominal consideration. The Predecessor is a defendant in ongoing litigation brought by a former customer, who has sued for breach of a contract executed in 1998 and is seeking a refund of approximately $293,000 in products and services purchased from the Predecessor. Due to the business transfer, there is a possibility that the plaintiff could name HSS of UK as a defendant in the case. The Company, in consultation with counsel, believes that the Predecessor has valid defenses to the claim, and that HSS of UK has valid defenses against any action that may be brought against it. Item 4. SUBMISSION OF MATTERS TO A VOTE OF SECURITYHOLDERS. Not applicable. PART II Item 5. MARKET FOR REGISTRANT'S COMMON EQUITY AND RELATED STOCKHOLDER MATTERS. Our common stock is traded on the OTC Bulletin Board under the symbol SITG. The following table sets forth the range of high and low bid quotations for our common stock from July 1, 2002 until June 30, 2004, as reported by the OTC Bulletin Board. -12- -------------------------------------------------------------------------------- The quotes represent inter-dealer prices without adjustment or mark-ups, markdowns or commissions and may not necessarily represent actual transactions. The trading volume of our securities fluctuates and may be limited during certain periods. As a result, the liquidity of an investment in the Company's securities may be adversely affected. Because of our stock price, our common stock is subject to the SEC's penny stock rules, which adversely affects the ability of persons to purchase or sell our stock. COMMON STOCK High Low High Low ------------- ------------- ---------- ---------- Fiscal 2004 Fiscal 2003 --------------------- ------------------- Quarter ended Quarter ended September 30, 2003 $ 0.70 $ 0.70 September 30, 2002 $ 0.17 $ 0.15 Quarter ended Quarter ended December 31, 2003 $ 0.40 $ 0.35 December 31, 2002 $ 0.18 $ 0.16 Quarter ended Quarter ended March 31, 2004 $ 0.80 $ 0.65 March 31, 2003 $ 0.07 $ 0.04 Quarter ended Quarter ended June 30, 2004 $ 0.80 $ 0.66 June 30, 2003 $ 0.12 $ 0.10 On September 29, 2004, the last quoted price by the OTC Bulletin Board was $.30 per share of common stock. As of September 29, 2004 there were 22,413,316 shares of Common Stock outstanding, held of record by approximately 584 record holders and beneficial owners. The following table sets forth information as to equity compensation plans pursuant to which we may issue our equity securities. Number of securities remaining available for Weighted average future issuance under Number of securities to be exercise price of equity compensation plans issued upon exercise of outstanding options, (excluding securities outstanding options, warrants and rights reflects in columns (a)) warrants and rights (b) (c) (a) ------------------------------------------- ---------------------------- ---------------------- ------------------------- Equity compensation plans approved by security holders -0- N.A. -0- ------------------------------------------- ---------------------------- ---------------------- ------------------------- Equity compensation plans not approved by security holders 3,970,000 $.84 89,500 ------------------------------------------- ---------------------------- ---------------------- ------------------------- Total 3,970,000 $.84 89,500 ------------------------------------------- ---------------------------- ---------------------- ------------------------- As of January 21, 2002, our board of directors adopted the 2002 Stock Plan, which provided for the grant of non-qualified stock options to purchase a maximum of 2,000,000 shares of common stock to directors, employees, officers, agents, consultants and independent contractors who perform services for the Company. As of June 30, 2004, 1,959,500 options to purchase shares of common stock have been issued and are outstanding under this plan. -13- -------------------------------------------------------------------------------- On April 17, 2002 we granted a non-qualified stock option to Mr. Ben Jamil, chief executive officer and a director, to purchase 1,000,000 shares of common stock at $2.00 per share. Mr. Jamil's employment agreement is described under "Item 10. Executive Compensation." As of July 3, 2003 our board of directors adopted the 2003 Stock Incentive Plan (the "2003 Plan") which provided for the grant of non-qualified stock options to purchase a maximum of 320,000 shares of common stock or the grant of shares to directors, employees, officers, agents, consultants and independent contractors who perform services for the Company. As of June 30, 2004, 236,000 shares have been issued to consultants and 35,000 shares have been issued to an officer for services rendered. As of January 23, 2004 our board of directors adopted the 2004 Stock Incentive Plan (the "2004 Plan") which provided for the grant of non-qualified stock options to purchase a maximum of 650,000 shares of common stock or the grant of shares to directors, employees, officers, agents, consultants and independent contractors who perform services for the Company. As of June 30, 2004, 650,000 options to purchase shares of common stock have been issued and are outstanding under this plan. During the fiscal year ended June 30, 2004, we issued the following securities exempt from the registration requirements of the Securities Act pursuant to Section 4(2) of the Securities Act. No underwriting or other compensation was paid in connection with these transactions: We issued 16,468 shares of common stock to an officer and an employee in payment of accrued compensation totaling $7,000. We issued 167,500 shares of common stock to consultants in payment of consulting fees of $99,625. On May 7, 2004, we issued 550,459 shares of common stock to Frank Ross and Juliett Vassilkioti, pursuant to a settlement agreement. See "Item 3. Legal Proceedings." The settlement agreement provides that the shares will be valued at their average closing price for the 30 days beginning July 7, 2005 and ending August 5, 2005. CCS has guaranteed that the value of the shares at that time will be at least $300,000 and is responsible for the amount that $300,000 exceeds that value. Ben Jamil, our chief executive officer and principal stockholder has guaranteed that the shares will have a value of at least $150,000. At September 29, 2004 the value of the shares based upon the closing price of our common stock was $165,138. We issued 100,000 shares of common stock to creditors in full settlement, subject to certain terms, of $37,000 of accounts payable. If the proceeds from the sale of the common stock when the creditors sell the shares is less than $37,000, we are to pay the creditors the difference between $37,000 and the proceeds received from the sale of the shares. At September 29, 2004 the value of the shares based upon the closing price of our common stock was $30,000. We sold 1,190,000 shares of common stock and issued warrants to purchase 500,000 shares of common stock for $154,000, including 1,000,000 shares of common stock and warrants to purchase 500,000 shares of common stock at an exercise price of $.15 per share sold to Jason S. Lyons for $135,000 and 180,000 shares of common stock sold to GSM Communications, Inc. for $18,000. The warrants vest immediately, have cashless exercise rights and a life of three years. These options and warrants were valued at $268,624 using the Black-Scholes option-pricing model and were expensed during the year ended June 30, 2004. In addition we have expensed $611,500 representing the difference between the market value and the actual price paid for the 1,190,000 shares of common stock. During the year ended June 30, 2004 we registered 2,920,000 shares of common stock and issued the following shares: In July 2003, we formalized consulting contracts with Michael D. Farkas, Jason S. Lyons and an additional financial consultant relating to acquisition services, financial public relations and operational performance services. In connection therewith we granted immediately exercisable options to purchase a total of 2,600,000 shares of common stock of which 1,700,000 options were granted to Michael Farkas, and options to purchase 400,000 shares were granted to Jason S. Lyon. The exercise price ranged from $.10 per share to $.50 per share. As of June 30, 2004 the consultants had exercised options to purchase 2,600,000 shares of common stock, for a total of $659,000. Of these options, options to purchase 1,700,000 shares were exercised by Michael D. Farkas for $400,000, and options to purchase 400,000 shares were exercised by Jason S. Lyons for $140,000. These options were valued at $405,727 using the Black-Scholes option-pricing model and were expensed during the year ended June 30, 2004. -14- -------------------------------------------------------------------------------- We issued 136,000 shares of common stock to consultants in full settlement, subject to certain terms, of $52,050 of payables. If the proceeds from the sale of the common stock when the creditors sell the shares is less than $52,050, we are to pay the creditors the difference between $52,050 and the proceeds received from the sale of the shares. At September 29, 2004 the value of the shares based of closing price of the Company's common stock was $40,800. We issued 35,000 shares of common stock to an officer in payment of accrued compensation totaling $7,000. We issued 100,000 shares of common stock to consultants in payment of consulting fees of $39,456. No underwriting or other compensation was paid in connection with these transactions. On June 10, 2004 we entered into a convertible credit agreement with private investors, including Michael D. Farkas, Ostonian Securities Limited, Kesef Equity Group, Inc., and GSM Communications, Inc. that provides for the Company to borrow up to $500,000 upon the attainment of certain performance criteria prior to September 15, 2004. At June 30, 2004 the Company had borrowed $200,000 under this agreement and borrowed an additional $300,000 during the first quarter of fiscal 2005. The notes are convertible, at the note holder's option, into the Company's common stock, at $.10 per share. Item 6. MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS GENERAL OVERVIEW. The following discussion should be read in conjunction with the financial statements and notes thereto of the Company. Such financial statements and information have been prepared to reflect the Company's financial position as of June 30, 2004. Historical results and trends should not be taken as indicative of future operations. Management's statements contained in this report that are not historical facts but are forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. Actual results may differ materially from those included in the forward-looking statements. The Company intends such forward-looking statements to be covered by the safe harbor provisions for forward-looking statements contained in the Private Securities Litigation Reform Act of 1995, and is including this statement for purposes of complying with those safe harbor provisions. Forward-looking statements, which are based on certain assumptions and describe future plans, strategies and expectations of the Company, are generally identifiable by use of the words "believe," "expect," "intend," "anticipate," "estimate," "project," "prospects" or similar expressions. The Company's ability to predict results or the actual effect of future plans or strategies is inherently uncertain. We are operating under a heavy financial burden as reflected in our substantial working capital deficiency and our continuing losses and negative cash flow from operations. We have sought to address these problems during fiscal 2004 by closing three of our retail operations and converting two of them to sales offices with lower operating costs, and entering into a credit agreement with an investor group pursuant to which we had borrowed $200,000 at June 30, 2004. We borrowed the remaining $300,000 during the first quarter of fiscal 2005. The $500,000 is due in June 2005, and we may not have the funds to repay the loans at that time. Our working capital deficiency has made it difficult for us to attract new business and maintain relations with our customers and suppliers. Other than our credit agreement and loans from our chief executive officer, our main source of funds has been our customer deposits which we use for our operations. -15- -------------------------------------------------------------------------------- If we are unable to increase our sales and pay our note holders and other creditors, it may be necessary for us to cease business and seek protection under the Bankruptcy Code. Critical accounting policies The Company prepares its financial statements in accordance with accounting principles generally accepted in the United States of America. Preparing financial statements in accordance with generally accepted accounting principles requires the Company to make estimates and assumptions that affect the reported amounts of assets and liabilities and disclosure of contingent assets and liabilities as of the date of the financial statements and the reported amounts of revenues and expenses during the reporting period. The following paragraphs include a discussion of some of the significant accounting policies and methods applied to the preparation of the Company's consolidated financial statements. See Note 1 of Notes to Consolidated Financial Statements for further discussion of significant accounting policies. Use of estimates The preparation of financial statements in conformity with accounting principles generally accepted in the United States requires management to make estimates and assumptions that affect the reported amounts of assets and liabilities and disclosure of contingent assets and liabilities at the date of the combined financial statements, and the reported amounts of revenue and expenses during the reporting periods. Actual results could differ from those estimates. Inventories Inventories are valued at the lower of cost (first-in, first-out) or market. Revenue recognition The Company recognizes revenue from sales upon the delivery of merchandise to a customer. Non-refundable advance payments received under marketing and distribution arrangements are deferred and either applied as payments towards customer purchases made pursuant to the terms of the respective agreements, or recognized as income at the termination of the agreement if specified purchase quotas have not been met by the customer. Customer deposits are initially recorded as liabilities and recognized as revenue when the related goods are shipped. Stock-based Compensation The Company periodically grants stock options to employees in accordance with the provisions of its stock option plans, with the exercise price of the stock options being set at the closing market price of the common stock on the date of grant. The Company accounts for stock-based compensation plans under Accounting Principles Board Opinion No. 25, "Accounting for Stock Issued to Employees", and accordingly accounts for employee stock-based compensation utilizing the intrinsic value method. FAS No. 123, "Accounting for Stock-Based Compensation", establishes a fair value based method of accounting for stock-based compensation plans. The Company has adopted the disclosure only alternative under FAS No. 123, which requires disclosure of the proforma effects on earnings and earnings per share as if FAS No. 123 had been adopted as well as certain other information. Stock options granted to non-employees are recorded at their fair value, as determined in accordance with SFAS No. 123 and Emerging Issues Task Force Consensus No. 96-18, and recognized over the related service period. Deferred charges for options granted to non-employees are periodically re-measured until the options vest. In December 2002, the FASB issued SFAS No. 148, Accounting for Stock-Based Compensation - Transition and Disclosure. SFAS No. 148 amends SFAS No. 123, Accounting for Stock-Based Compensation. Although it does not require use of the fair value method of accounting for stock-based employee compensation, it does provide alternative methods of transition. It also amends the disclosure provisions of SFAS No.123 and APB No. 28, Interim Financial Reporting, to require disclosure in the summary of significant accounting policies of the effects of an entity's accounting policy with respect to stock-based employee compensation on reported net income and earnings per share in annual and interim financial statements. SFAS No. 148's amendment of the transition and annual disclosure requirements is effective for fiscal years ending after December 15, 2002. The amendment of disclosure requirements of APB No. 28 is effective for interim periods beginning after December 15, 2002. We adopted SFAS No. 148 and APB No.28 on January 1, 2003. -16- -------------------------------------------------------------------------------- Income taxes The Company uses the liability method to determine its income tax expense. Under this method, deferred tax assets and liabilities are computed based on differences between financial reporting and tax basis of assets and liabilities and are measured using the enacted rates and laws that will be in effect when the differences are expected to reverse. Deferred tax assets are reduced by a valuation allowance if, based on the weight of the available evidence, it is more likely than not that all or some portion of the deferred tax assets will not be realized. The ultimate realization of the deferred tax asset depends on the Company's ability to generate sufficient taxable income in the future. Because of our losses we did not incur any income tax expense during fiscal 2004 or 2003. Financial guarantees Certain shares issued by the Company to settle debt obligations contain a price guarantee that requires the Company to settle in cash any difference between the original face amount of the debt and proceeds from the creditor's subsequent sale of the shares. The Company accounts for these transactions by recording the debt at fair value with periodic mark-to-market adjustments until the guarantee is settled. Unrealized gains or losses resulting from changes in fair value are included in earnings and accrued expenses. Fair Value of Financial Instruments The fair values of financial instruments recorded on the balance sheet are not significantly different from their carrying amounts due to the short-term nature of those instruments, or because they are accounted for at fair value. New Accounting Pronouncements In January 2003, the FASB issued Interpretation No. 46, "Consolidation of Variable Interest Entities," an interpretation of ARB No. 51. This Interpretation addresses the consolidation by business enterprises of variable interest entities as defined in the Interpretation. The Interpretation applies immediately to variable interests in variable interest entities created after January 31, 2003, and to variable interests in variable interest entities obtained after January 31, 2003. The adoption of this Interpretation did not have a material effect on our consolidated financial statements. In May 2003, the FASB issued SFAS No. 150, Accounting for Certain Financial Instruments with Characteristics of both Liabilities and Equity, which requires mandatory redeemable financial instruments to be classified as liabilities, the result of which requires related expense to be classified as interest expense rather than minority interest on a prospective basis. SFAS No. 150 is effective in the three months ended June 30, 2003 for financial instruments entered into or modified after May 31, 2003, and is otherwise effective July 1, 2003 for previously issued instruments. SFAS No. 150 is not expected to have a material impact on our financial position or results of operations. Joint Venture Agreements We are party to three joint venture agreements with technology companies. In connection with these agreements we and our joint venture partner formed new entities whose ownership and share of operating results are equally owned. The joint venture agreements grant the new entities exclusive marketing rights to the joint venture partner's products, except in the countries in which the joint venture partners are domiciled. We account for investments in the joint ventures using the equity method because our ownership is greater than 20% and we have the ability to exercise significant influence over the operating, investing and financing decisions of the joint venture entities. Under the equity method, we will record our share of joint venture income or losses and adjust the basis of its investment accordingly. As of June 30, 2004, the joint ventures have not generated any revenues or other significant business activity. -17- -------------------------------------------------------------------------------- Foreign Currency Translation The functional currency of our United Kingdom subsidiary is the local currency. Accordingly, we translate all assets and liabilities into U.S. dollars at current rates. Revenues, costs, and expenses are translated at average rates during each reporting period. Gains and losses resulting from the translation of the consolidated financial statements are excluded from results of operations and are reflected as a translation adjustment and a separate component of stockholders' deficit. Translation adjustments were $17,595 as of June 30, 2004 and were immaterial as of June 30, 2003. Gains and losses resulting from foreign currency transactions are recognized in the consolidated statement of operations in the period they occur. RESULTS OF OPERATIONS - Year Ended June 30, 2004 and Year ended June 30, 2003. Revenues. Revenues for the year ended June 30, 2004 ("fiscal 2004") were $3,013,332 a decrease of $715,833 or 19.2%, from revenues of $3,729,165 for the year ended June 30, 2003 ("fiscal 2003"). During fiscal 2004, we closed our retail stores in New York, Beverly Hills and Washington, DC and converted our operations in Beverly Hills and Washington, DC from retail stores to sales offices. These closures resulted in a decrease of approximately $1.4 million from these three locations, representing a 60.7% decline is sales from approximately $2.3 million in fiscal 2003 to approximately $900,000 in fiscal 2004. These decreases were offset by increased sales from our operations in New Rochelle, New York and London. Cost of Sales. Cost of sales decreased by $424,065 or 23.2%, to $1,402,980 in fiscal 2004 from 1,827,045 in fiscal 2003. Cost of sales as a percentage of product sales decreased to 46.6% in fiscal 2004 from 49.0% in fiscal 2003 reflecting an improvement in product mix. Compensation and benefits. Compensation and benefits decreased by $314,778, or 12.4% to $2,227,767 in fiscal 2004 from $2,542,545 in fiscal 2003 primarily due to (i) a reduction in expense in our New York retail store that we closed on January 31, 2004 of $125,186, and (ii) decreases in our Beverly Hills and Washington DC operations where we converted from retail stores to sales offices and reduced these expenses by $179,962. Professional fees and legal matters. Professional fees and legal matters decreased by $3,045, or .3% to $933,576 in fiscal 2004 from $936,621 in fiscal 2003. Based on a review of outstanding legal matters and unpaid settlements, we have established, in consultation with outside counsel, reserves for litigation costs that are probable and can be reasonable estimated. We can provide no assurance, however, that such reserves will be sufficient to absorb actual losses that may result from unfavorable outcomes. Moreover, it is possible that the resolution of litigation contingencies will have a material adverse impact on our consolidated financial condition, results of operations, and cash flows. Because of our financial position, we are subject to claims, which may result in litigation from our creditors. As a result we expect that we will continue to incur attorney's fees and the use of management resources to defend these claims and litigation. Stock based compensation. Stock based compensation is attributable to the grant of options and warrants to consultants and common stock which we sold to consultants at a discount from the market price. Options and warrants granted to consultants were valued at $990,358 using the Black-Scholes option-pricing model and were expensed during fiscal 2004. Comparable expense in fiscal 2003 was $5,301. Expense related to sales of common stock to consultants at discounts from market was $618,500 in fiscal 2004. There were no similar transactions in fiscal 2003. Selling, general and administrative expenses. Selling, general and administrative decreased by $154,803, or 8.1% to $1,743,625 in fiscal 2004 from $1,910,546 in fiscal 2003. The decrease was primarily due to (i) a decrease in rent expense of $187,488, or 29.8% to $441,288 in fiscal 2004 from $628,776 in fiscal 2003 due to lower rents in relocated sales offices and (ii) a decease in advertising expense of $123,626, or 54.5% to $103,068 in fiscal 2004 from 226,694 in fiscal 2003 all partially offset by (iii) and increase in travel and attendance at trade shows of $112,741, or 59.6% to $301,781 in fiscal 2004 from $189,040 in fiscal 2003. Unrealized (gain) loss on financial guarantees. Unrealized (gain) loss on financial guarantees is attributable to the increase or decrease in market value relating to our price guarantees on common stock which we have issued in payment of trade payables. Unrealized (gain) loss on financial guarantees changed $282,030 or 192.6%, to a gain of $135,590 in fiscal 2004 from a loss of $146,440 in fiscal 2003. -18- -------------------------------------------------------------------------------- Depreciation and amortization. Depreciation and amortization decreased by $4,581, or 4.4% to $100,142 in fiscal 2004 from $104,723 in fiscal 2003 as a consequence of certain assets becoming fully depreciated in fiscal 2003. Interest expense. Interest expense increased by $26,665 or 25.6% to $131,046 in fiscal 2004 from $104,381 in fiscal 2003 as a result of a continued increase in the Company's interest bearing outstanding debt obligations. As a result of the factors described above, our net loss increased by $1,109,423, or 28.8% to $4,999,072, $.25 per share, in fiscal 2004 from $3,848,437, $.22 per share, in fiscal 2003. LIQUIDITY AND CAPITAL RESOURCES We require significant working capital to fund our future operations. At June 30, 2004 we had cash of $172,621 and a working capital deficit of $7,400,771. During fiscal 2004, we had a negative cash flow from operations of $855,000. Our accounts payable and accrued expenses at June 30, 2004 were $3,722,228. As a result of our continuing losses, our working capital deficiency has increased. We funded our losses through the issuance of our common stock. We also utilized vendor credit and customer deposits. Because we have not been able to pay our trade creditors in a timely manner, we have been subject to litigation and threats of litigation from our trade creditors and we have used common stock to satisfy our obligations to trade creditors. In many instances when we issue common stock, we have provided that if the stock does not reach a specified price level one year from issuance, we will pay the difference between that price level and the actual price. As a result, we have contingent obligations to our some of these creditors. With respect to 1,263,459 shares of common stock issued during the fiscal 2004, 2003 and 2002, the market value of the common stock on June 30, 2004 was approximately $161,811 less than the guaranteed price. Our accounts payable and accrued expenses increased from $3,563,776 at June 30, 2003 to $3,722,228 at June 30, 2004 an increase of $158,452. After an increase in the market value of our common stock held by trade creditors of $135,590 our other accounts payable and accrued expenses increased by $294,042 reflecting our inability to pay creditors currently. We also had customer deposits and deferred revenue of $3,325,710 which relate to payments on orders which had not been filled at that date. We have used our advance payments to fund our operations. If our vendors do not extend us necessary credit we may not be able to fill current or new orders, which may affect the willingness of our clients to continue to place orders with us. During the past three years we have sought, and been unsuccessful, in our efforts to obtain adequate funding for our business. Because of our losses, we are not able to increase our borrowing. Our bank facility terminated on November 1, 2002 and to date, we do not have any agreements with any replacement bank. In 2004 we entered into a convertible credit agreement with private investors that permits us to borrow up to $500,000 upon the attainment of certain performance criteria. At June 30, 2004 we had borrowed $200,000 under this credit facility and borrowed an additional $300,000 in August and September 2004. Our obligations to these lenders become due in June 2005. We do not presently have the resources to pay the lenders. Unless we are either able to raise equity or debt capital, which is unlikely based on our financial condition and history of losses which are continuing, or the lenders extend the maturity date or convert their debt into equity, we are unlikely to be able to pay the notes. If the lenders seek to enforce their notes, it may be necessary for us to seek protection under the Bankruptcy Code. Our failure to obtain similar financing from this or another lender could materially impair our ability to continue in operation, and we cannot assure you that we will be able to obtain the necessary financing. Our main source of funds other than the private investors has been from loans from our chief executive officer, customer deposits and vendor credit. During fiscal 2004 we raised $813,000 resulting from the exercise of options to buy our common stock and the sale of our common stock. Management cannot provide any assurance that we will be able to raise any more money through the sale of our equity securities. We may not be able to obtain any additional funding, and, if we are not able to raise funding, we may be unable to continue in business. Furthermore, if we are able to raise funding in the equity markets, our stockholders might suffer significant dilution and the issuance of securities may result in a change of control. These factors raise substantial doubt about our ability to continue as a going concern. Our financial statements do not include any adjustments that might result from the outcome of these uncertainties. -19- -------------------------------------------------------------------------------- Item 7. FINANCIAL STATEMENTS The financial statements begin on Page F-1. Item 8. CHANGES IN AND DISAGREEMENT WITH ACCOUNTANTS ON ACCOUNTING AND FINANCIAL DISCLOSURE. On June 29, 2004 we accepted the resignation of Schneider & Associates LLP as the Registrant's independent public accountants and selected Demetrius & Company, L.L.C. to serve as the our independent public accountant for the fiscal year ending June 30, 2004. At no time since its engagement has Demetrius & Company, L.L.C. had any direct or indirect financial interest in or any connection with us or any of our subsidiaries other than as independent accountant. Neither we nor anyone on our behalf consulted Demetrius & Company L.L.C. prior to engagement regarding the application of accounting principles to a specific completed or contemplated transaction or the type of audit opinion that might be rendered on our financial statements. Our financial statements for the fiscal years ended June 30, 2002 and June 30, 2003 were audited by Schneider & Associates LLP, whose report on such financial statements did not include any adverse opinion, or disclaimer of opinion, nor was the report qualified or modified as to audit scope or accounting principles. The report however was modified as to our ability to continue as a going concern. There were no disagreements with Schneider & Associates LLP on any matter of accounting principles or practices, financial statement disclosures, or auditing scope or procedures in connection with the audit for the fiscal years ended June 30, 2002 and June 30, 2003 and financial statements filed on Form 10QSB for subsequent interim periods preceding their resignation on June 29, 2004. ITEM 8A CONTROLS AND PROCEDURES As of the end of the fiscal year ended June 30, 2004, our chief executive officer and chief financial officer evaluated the effectiveness of our disclosure controls and procedures. Based on their evaluation, the chief executive officer and the chief financial officer have concluded that our disclosure controls and procedures are effective in alerting them to material information that is required to be included in the reports that we file or submit under the Securities Exchange Act of 1934. There has been no change in our internal control over financial reporting that occurred during our last fiscal quarter that has materially affected, or is reasonably likely to materially affect, our internal control over financial reporting. ITEM 8b. OTHER INFORMATION Not applicable. ITEM 9. DIRECTORS, EXECUTIVE OFFICERS, PROMOTERS AND CONTROL PERSONS; COMPLIANCE WITH SECTION 16(A) OF THE EXCHANGE ACT DIRECTORS, EXECUTIVE OFFICERS AND KEY PERSONNEL Set forth below is information concerning our directors and executive officers. -20- -------------------------------------------------------------------------------- Name Age Position ------------------ ---- -------- Ben Jamil 71 Chairman of the board, chief executive officer and director Chris R. Decker 57 Chief financial officer and director Tom Felice 42 Director Menahem Cohen 51 Vice president and director Sylvain Naar 62 Director Ben Jamil has been chairman of the board, president, chief executive officer and a director of CCS since its organization in July 1992. He assumed such positions with us upon completion of the reverse merger in April 2002. Mr. Jamil has more than 40 years experience in government, military, law enforcement and business security, specializing in the design, and marketing of sophisticated, hi-tech systems for communication, voice and data privacy, surveillance and monitoring. Chris R. Decker, a certified public accountant, joined us in April 2002 and became chief financial officer and a director in August 2002. Prior to April 2002 he was controller for Trumarkets LLC, a broker dealer, from June 1, 2001 until April 2002, an independent consultant from April 1999 until June 2001, was vice president corporate controller for County Seat Stores, Inc., a retailer of specialty apparel, from January 1998 until April 1999 and for three years prior thereto, was executive vice president, chief financial officer of All American Food Group, Inc. a franchising company in the specialty food sector. Tom Felice joined CCS at its inception as vice president of consumer sales. He took a leave of absence in November 2000 to consult for a family business and returned to CCS in October 2001 when he became vice president sales and director of CCS. He assumed such positions with us upon completion of the reverse merger in April 2002. In May 2003 he resigned his position as vice president sales to pursue other opportunities but remains as a member of the board of directors. Menahem Cohen has been vice president for Latin American sales and a director of CCS since January 2002 and became our vice president and a director upon completion of the merger. He was a consultant to CCS from its inception in 1992 until 2002. Sylvain Naar has been a director of CCS since March 2002 and became a drector upon completion of the reverse merger in April 2002. He became vice president in May of 2003 and resigned from that position in August 2003. From 1990 to February 2002, Mr. Naar was vice president for product and business development at Copytele, Inc. a developer of advanced flat panel displays and secure communication products. With over 30 years experience in telecommunications, Mr. Naar has held numerous executive positions at Hazeltine, Thomson, CSF, and Alcatel. Compliance with Section 16(a) of the Securities Exchange Act of 1934 Section 16(a) of the Securities Exchange Act of 1934 requires the Company's directors and executive officers, and persons who own more than ten percent (10%) of a registered class of the Company's equity securities, to file with the Securities and Exchange Commission ("SEC") initial reports of ownership and reports of changes in ownership of common stock and other equity securities of the Company. Officers, directors and greater than ten percent stockholders are required by SEC regulation to furnish the Company with copies of all Section 16(a) forms they file. To the Company's knowledge, based solely on its review of the copies of such reports furnished to the Company during the year June 30, 2004, all Section 16(a) filing requirements applicable to its officers, directors and greater than ten percent beneficial owners were satisfied except for four reports covering four transactions of Ben Jamil which took place during the period of August 23, 2002 and January 30, 2004, and six reports covering six transactions of Chris R. Decker which took place during the period of August 23, 2002 and August 4, 2004. These reports were filed on October 1, 2004 and none of the reports covered transactions that involved a public purchase or sale of securities. -21- -------------------------------------------------------------------------------- Director Compensation Directors who are also employees of the Company are not paid any fees or other remuneration for service on the Board or any of its Committees. Meetings and Committees of the Board of Directors The Board of Directors met twelve (12) times during the fiscal year ended June 30, 2004. The Board of Directors has a standing Audit Committee. The Audit Committee Through May 1, 2003 the Audit Committee of the Board of Directors consisted of two (2) individuals Chris R. Decker our chief financial officer and Sylvain Naar, a director. On May 1, 2003 Tom Felice a director and former officer replaced Sylvain Naar. The Audit Committee met once (1) time during the fiscal year ending June 30, 2004. The Audit Committee is primarily responsible for reviewing the services performed by the Company's independent public accountants, evaluating the Company's accounting policies and its system of internal controls, and reviewing significant finance transactions. The functions of the Audit Committee are focused on three areas: o the adequacy of the Company's internal controls and financial reporting process and the reliability of the Company's financial statements. o the independence and performance of the Company's independent public accountants. o the Company's compliance with legal and regulatory requirements. The Audit Committee's policy is to pre-approve all audit and permissible non-audit services provided by the independent auditors. These services may include audit services, audit-related services, tax services and other services. The independent auditors and management are required to periodically report to the Audit Committee regarding the extent of services provided by the independent auditors in accordance with this pre-approval, and the fees for the services performed to date. The Audit Committee may also pre-approve particular services on a case-by-case basis. The Audit Committee meets with management periodically to consider the adequacy of the Company's internal controls and the objectivity of its financial reporting. The Audit Committee discusses these matters with the Company's independent public accountants and with appropriate Company financial personnel. Meetings are held with the independent public accountants who have unrestricted access to the Audit Committee. The Audit Committee also appoints and engages the independent public accountants and reviews periodically their performance and independence from management. In addition, the Audit Committee reviews the Company's financing plans and reports recommendations to the full Board of Directors for approval and to authorize action. Management has primary responsibility for the Company's financial statements and the overall reporting process, including the Company's system of internal controls. The independent public accountants audit the annual financial statements prepared by management, express an opinion as to whether those financial statements present fairly the financial position, results of operations and cash flows of the Company in conformity with generally accepted accounting principles and discusses with the Audit Committee any issues they believe should be raised with the Audit Committee. The Audit Committee reviews the Company's audited financial statements and meets with both management and, the Company's independent public accountants, to discuss such audited financial statements, and financial statements included in quarterly reports on Form 10-QSB. Management represents to the Audit Committee that the financial statements are prepared in accordance with generally accepted accounting principles. The Audit Committee receives from and discusses with the written disclosure and the letter required by Independence Standards Board Standard No. 1 (Independence Discussions with Audit Committees). These items relate to that firm's independence from the Company. -22- -------------------------------------------------------------------------------- ITEM 10. EXECUTIVE COMPENSATION Set forth below is information with respect to compensation paid or accrued by us for fiscal years ended June 30, 2004, and 2003 to our chief executive officer. No other officer received compensation of $100,000 during any of those fiscal years. Summary Compensation Table Long-Term Compensation (Adwards) Fiscal Options, SARs Name and Principal Position Year Salary Bonus (Number) -------------------------------- ------------ ------------ ------------------------------- Ben Jamil, chief executive 2004 $ 250,000 $ - 200,000 officer 2003 250,000 - - 2002 172,799 - 1,000,000 Employment Agreement In April 2002, in connection with the completion of the reverse merger, we entered into a three-year employment agreement with Ben Jamil pursuant to which Mr. Jamil agreed to serve as our president and chief executive officer. The agreement calls for an annual base compensation of $250,000 and may be increased on each anniversary date commencing May 1, 2003 by 10% if we achieve certain performance criteria. In addition to the base salary, Mr. Jamil is eligible to receive an annual discretionary bonus commencing June 30, 2003, at the sole discretion of the board of directors. Pursuant to the agreement, we granted Mr. Jamil a non-qualified stock option to purchase 1,000,000 shares of common stock at an exercise price of $2.00 per share. The option vests upon our attaining $10,000,000 of annual revenue and expires on April 17, 2007. Stock Options As of January 21, 2002, the board of directors of the Company adopted the 2002 Stock Plan (the "2002 Plan"), which provided for the grant of non-qualified stock options to purchase a maximum of 2,000,000 shares of common stock to directors, employees, officers, agents, consultants and independent contractors who perform services for the Company. In connection with the reverse merger outstanding options to purchase a total of 1,800,500 shares of CCS' common stock were converted into options to purchase an equal number of shares of the Company's common stock at exercise prices of $.50 to $1.00 per share, which were the same exercise prices as the options under the CCS plan. As of June 30, 2004 a total of 1,959,500 options to purchase shares of common stock are outstanding under the 2002 Plan. As of July 3, 2003 the board of directors of the Company adopted the 2003 Stock Incentive Plan (the "2003 Plan") which provided for the grant of non-qualified stock options to purchase a maximum of 320,000 shares of common stock or the grant of shares to directors, employees, officers, agents, consultants and independent contractors who perform services for the Company. As of June 30, 2004, 246,000 shares have been issued to consultants and 35,000 shares have been issued to an officer for services rendered. As of January 23, 2004 our board of directors adopted the 2004 Stock Incentive Plan (the "2004 Plan") which provided for the grant of non-qualified stock options to purchase a maximum of 650,000 shares of common stock or the grant of shares to directors, employees, officers, agents, consultants and independent contractors who perform services for the Company. As of June 30, 2004, 650,000 options to purchase shares of common stock have been issued and are outstanding under this plan. -23- -------------------------------------------------------------------------------- Option Exercises and Outstanding Options The following table sets forth information concerning the exercise of options during the fiscal year ended June 30, 2004 and the fiscal year-end value of options held by our chief executive officer, who is the only officer named in the summary compensation table. No stock appreciation rights have been granted. Aggregate Option Exercises in Last Fiscal Year and Fiscal Year-End Option Value Number of Securities Value of Underlying Unexercised Unexercised In-the-Money Options at Fiscal Options at Fiscal Year End Year End ----------------- ------------------- Shares Acquired Upon Value Exercisable/ Exercisable/ Name Exercise Realized Unexercisable Unexercisable -------------------- --------------------- -------------- ----------------- ------------------- Ben Jamil -- -- 1,200,000 --/-- Option Grants in Fiscal Year Ended June 30, 2004 Percent of Potential Realizable Value an Total Options Annual Rates of Stock Price Number of Shares Granted to Exercise Appreciation for Option Term Underlying Employees in Price Per Expiration ------------------------------- Name Options Granted Fiscal Year Share Date 5% 10% ----------------------- ----------------- --------------- --------- ----------- ------- ---------- Ben Jamil 200,000 100.0% $ .25 Jan 2014 $31,445 $79,687 ITEM 11. SECURITY OWNERSHIP OF CERTAIN BENEFICIAL OWNERS AND MANAGEMENT The following table and discussion provides information as to the shares of common stock beneficially owned on September 10, 2004 by: - each director; - each officer named in the executive compensation table; - each person owning of record or known by us based on information provided to us by the persons named below, to own beneficially at least 5% of our common stock; and - all officers and directors as a group. -24- -------------------------------------------------------------------------------- Shares of Common Percentage of Stock Benefically Outstanding Name Owned Common Stock -------------------------------------------- ----------------------- ------------------ Ben Jamil 11,338,000 50.1% 145 Huguenot Street New Rochelle, NY 10801 Michael D. Farkas 2,150,100 9.4% 1691 Michigan Avenue, Suite 425 Miami, FL 33139 Ostonian Securities Limited 2,203,496 9.3% 60 St. James Street London, England SW1 ALE Jason S. Lyons 1,915,000 8.4% 7239 San Salvador Dr Boca Raton, FL 33433 Kesef Equity Group, Inc. 1,750,000 7.2% 14 Lyle Farm Lane Englishtown, NJ 07726 GSM Communications, Inc. 1,289,500 5.6% 1221 Brickell Avenue, Suite 900 Miami, FL 33131 Chris R. Decker 785,000 3.4% Menahem Cohen 450,000 2.0% Tom Felice 253,000 1.1% Sylvain Naar - - All directors and officers as a 12,826,000 54.4% group (6 individuals) Except as otherwise indicated each person has the sole power to vote and dispose of all shares of common stock listed opposite his name. Stockholders are deemed to own shares of common stock issuable upon the exercise of options or upon conversion of convertible securities which are exercisable or convertible within 60 days of September 10, 2004. The shares beneficially owned by Mr. Jamil represent 11,138,000 shares of common stock and 200,000 shares of common stock issuable upon exercise of options held by him. The shares beneficially owned by Michael D. Farkas represents 1,036,000 shares of common stock owned by him, 471,600 shares of common stock owned by his wife, Rebecca Farkas, 37,500 shares of common stock owned by their children, and the holdings of Atlas Equity Group, Inc., which is beneficially owned by him consisting of 55,000 shares of common stock owned by them and 550,000 shares of common stock issuable upon the conversion of notes payable held by them. The shares beneficially owned by Mr. Lyons represents 1,400,000 shares of common stock owned by him and 500,000 shares of common stock issuable upon the exercise of warrants owned by Lyons Capital Group LLC which is beneficially owned by Jason S. Lyons. The shares beneficially owned by Ostonian Securities Limited represent 953,496 shares of common stock and 1,250,000 shares of common stock issuable upon the conversion of notes payable held by them. The shares beneficially owned by Kesef Equity Group, Inc. represent 1,750,000 shares of common stock issuable upon the conversion of notes payable held by them. -25- -------------------------------------------------------------------------------- The shares beneficially owned by GSM Communications, Inc. represent 639,500 shares of common stock and 650,000 shares of common stock issuable upon the conversion of notes payable held by them. The shares beneficially owned by Mr. Decker represent 335,000 shares of common stock and 450,000 shares of common stock issuable upon exercise of options held by him. The shares beneficially owned by Mr. Cohen represent shares of common stock issuable upon exercise of options held by him. The shares beneficially owned by Mr. Felice represent 3,000 shares of common stock and 250,000 shares of common stock issuable upon exercise of options held by him. In connection with an agreement between Mr. Ben Jamil and two financial consultants entered into prior to the reverse merger, the consultants or their designees were to purchase a 30% interest in five of our subsidiaries, and that 30% was to have been exchanged for 1,500,000 shares of series B preferred stock. Mr. Jamil has advised the consultants and their designees that, as a result of their failure to pay the consideration for the shares, the agreement is terminated and they have no interest in the series B preferred stock or the stock in the five subsidiaries. It is possible that the consultants or their designees may claim that they own the series B preferred stock or the stock in the five subsidiaries. Item 12. Certain Relationships and Related Transactions In March 2004 we sold 1,000,000 shares of common stock to Jason S. Lyons for $135,000, and issued warrants to purchase 500,000 shares of common stock at an exercise price of $.15 per share. The warrants vest immediately, have cashless exercise rights and a life of three years. In July 2003, we formalized consulting contracts with Michael D. Farkas and Jason S. Lyons relating to acquisition services, financial public relations and operational performance services. In connection therewith we granted immediately exercisable options to purchase a total of 1,700,000 options to Michael D. Farkas, and options to purchase 400,000 shares were granted to Jason S. Lyons. The exercise price ranged from $.10 per share to $.50 per share. As of June 30, 2004 options to purchase 1,700,000 shares were exercised by Michael Farkas for $400,000, and options to purchase 400,000 shares were exercised by Jason S. Lyons for $140,000. During fiscal 2004 we sold 180,000 shares of common stock to GSM Communications, Inc. for $18,000. On June 10, 2004 we entered into a convertible credit agreement with private investors, including Michael D. Farkas, Ostonian Securities Limited, Kesef Equity Group, Inc., and GSM Communications, Inc. that provides for the Company to borrow up to $500,000 upon the attainment of certain performance criteria prior to September 15, 2004. At June 30, 2004 the Company had borrowed $200,000 under this agreement and borrowed an additional $300,000 during the first quarter of fiscal 2005. The notes are convertible, at the note holder's option, into the Company's common stock, at $.10 per share. During fiscal year 2004 we paid commissions of $35,000 related to financing activities to Atlas Capital Services, LLC which is beneficially owned by Michael D. Farkas. On January 23, 2004 we issued options to purchase 200,000 shares of common stock to Ben Jamil. On January 23, 2004 we issued options to purchase 150,000 shares of common stock to Menahem Cohen. On January 23, 2004 we issued options to purchase 150,000 shares of common stock to Chris R. Decker, and on January 12, 2004 we issued 35,000 shares of common stock to Mr. Decker in payment of accrued wages. -26- -------------------------------------------------------------------------------- The agreement relating to the April 2002 reverse merger provided, as a condition to CCS' obligation to close, that we receive proceeds of $1,000,000 from a private sale of the our securities. This condition was not met at closing, and CCS completed the reverse merger with us having received only $75,000. At the closing of the reverse merger, we entered into a stock pledge agreement with Atlas Equity Group, Inc. a Florida corporation beneficially owned by Michael D. Farkas who is a stockholder of the Company, and who beneficially owns more than 5% of our common stock, pursuant to which Atlas Equity was to have pledged 1,500,000 shares of our common stock. Atlas Equity never delivered the shares to be held pursuant to the pledge agreement. The pledge agreement stipulated the pledged shares were to be returned to Atlas Equity if we sold shares of common stock sufficient to generate net cash proceeds of $925,000 to us prior to June 1, 2002, which date was subsequently extended to June 14, 2002. On December 16, 2002, we and Atlas Equity and certain successor owners of Atlas Equity's pledged shares entered into an agreement that reduced the number of pledged shares to 750,000, restricted the number of pledged shares that could be sold for a period of one year, expanded the money raising activity to include the issuance of debt and extended the date to raise the $925,000 to July 7, 2004. As of June 30, 2004 we had sold shares of common stock and issued debt generating net cash proceeds of $993,000 and all pledged shares have been released. Item 13. EXHIBITS AND REPORTS ON FORM 8-KSB (a) Reports on Form 8-KSB (1) Current Report on Form 8-K filed on June 30, 2004 with respect to Item 4. (2) Current Report on Form 8-K/A filed on July 30, 2004 with respect to Item 4. (b) Exhibits Exhibit No. Description 2.1 Agreement and Plan of Merger dated as of February 28, 2002 among the Registrant, CCS International, Ltd., and CCS Merger Corp.(1) 3.1 Articles of incorporation (2) 3.1 Articles of Amendment to Articles of Incorporation (4) 3.2 By-laws (2) 10.1 Employment Agreement, dated as of April 17, 2002, by and between the Registrant and Ben Jamil. (3) 10.2 Form of pledge Agreement, dated as of April 17, 2002, by and between the Registrant and Atlas Equity (3) 10.3 Agreement dated as of December 16, 2002, by and between the Registrant and ATLAS EQUITY and successor owners of Atlas Equity's pledged shares. (5) 10.3 2002 Stock Plan. (4) 10.4 2003 Stock Incentive Plan (5) 10.5 Consulting Agreement, dated as of July 2, 2003, by and between the Registrant and Michael D. Farkas. (6) -27- -------------------------------------------------------------------------------- 10.6 Consulting Agreement, dated as of July 2, 2003, by and between the Registrant and Shimon Fishman. (6) 10.7 Consulting Agreement, dated as of July 18, 2004, by and between the Registrant and Jason S. Lyons (7) 10.8 2004 Stock Plan. 10.9 Revolving Convertible Credit Agreement, dated June 10, 2004, by and between the Registrant and private investors, including Michael D. Farkas 14.1 Code of Ethics. 21.1 List of Subsidiaries. 23.1 Consent of Independent Auditors. 31.1 Certification of chief executive officer. 31.2 Certification of chief financial officer. 32.1 Certification pursuant to Section 906 of the Sarbanes-Oxley Act of 2002 (1) Filed as an exhibit to the Registrant's Form 8-K with a report date of February 28, 2002 and which was filed with the Commission on March 5, 2002, and incorporated herein by reference. (2) Filed as an exhibit to the Registrant's Form 10SB12G which was filed with the Commission on October 17, 2000, and incorporated herein by reference. (3) Filed as an exhibit to the Registrant's Form 8-K with a report date of April 17, 2002 and which was filed with the Commission on April 25, 2002, and incorporated herein by reference. (4) Filed as an exhibit to the Registrant's Form 10-KSB filed with the commission on November 6, 2002, and incorporated herein by reference. (5) Filed as an exhibit to the Registrant's Form 10-KSB filed with the commission on October 14, 2003, and incorporated herein by reference. (6) Filed as an exhibit to the Registrant's Form S-8 filed with the commission on July 22, 2004, and incorporated herein by reference. (7) Filed as an exhibit to the Registrant's Form S-8 filed with the commission on September 29, 2003, and incorporated herein by reference. ITEM 14. PRINCIPAL ACCOUNTANT FEES AND SERVICES 1. Audit Fees. The aggregate fees billed for the audit of our financial statements and review of financial statements included in our quarterly Form 10-QSB were $60,073 and $67,825 for the fiscal years ended June 30, 2004 and June 30, 2003 respectively. 2. Audit-Related Fees. There were no audit-related fees billed for the fiscal years ended June 30, 2004 and June 30, 2003. 3. Tax Fees. Tax fees billed were $8,890 and $725 for the fiscal years ended June 30, 2004 and June 30, 2003 respectively. -28- -------------------------------------------------------------------------------- 4. All Other Fees. There were no other fees billed for the fiscal years ended June 30, 2004 and June 30, 2003. -29- -------------------------------------------------------------------------------- INDEX TO FINANCIAL STATEMENTS Report of Independent Registered Public Accounting Firm F - 1 Independent Auditors' Report F - 2 Consolidated Balance Sheet June 30, 2004 F - 3 Consolidated Statements of Operations for the years ended June 30, 2004 and June 30, 2003 F - 4 Consolidated Statement of Changes in Stockholders' Deficit for the years ended June 30, 2004 and June 30, 2003 F - 5 Consolidated Statements of Cash Flows for the years ended June 30, 2004 and June 30, 2003 F - 6 Notes to Consolidated Financial Statements F - 7 - F -22 -30- -------------------------------------------------------------------------------- REPORT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM To the Board of Directors and Stockholders of Security Intelligence Technologies, Inc. and Subsidiaries We have audited the accompanying consolidated balance sheet of Security Intelligence Technologies, Inc. and Subsidiaries as of June 30, 2004, and the related consolidated statements of operations, changes in stockholders' deficit, and cash flows for the year then ended. These consolidated financial statements are the responsibility of the Company's management. Our responsibility is to express an opinion on these consolidated financial statements based on our audits. We conducted our audit in accordance with the standards of the Public Company Accounting Oversight Board (United States). Those standards require that we plan and perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used and significant estimates made by management, as well as evaluating the overall financial statement presentation. We believe that our audit provide a reasonable basis for our opinion. In our opinion the consolidated financial statements referred to above present fairly, in all material respects, the consolidated financial position of Security Intelligence Technologies, Inc. and its subsidiaries as of June 30, 2004, and the consolidated results of their operations and cash flows for the year then ended in conformity with accounting principles generally accepted in the United States of America. The accompanying consolidated financial statements have been prepared assuming that the Company will continue as a going concern. As more fully described in Note 1, the Company has incurred operating losses in fiscal 2004 and 2003, negative cash flows from operations, and has limited cash and other resources to fund future operations. In addition, the Company is involved in material litigation, the costs of which have significantly impacted liquidity. Management's plans concerning these matters are also discussed in Note 1. The consolidated financial statements do not include any adjustments that might result from the outcome of these uncertainties. DEMETRIUS & COMPANY, L.L.C. Wayne, New Jersey October 4, 2004 F-1 -31- -------------------------------------------------------------------------------- INDEPENDENT AUDITORS' REPORT To the Board of Directors and Stockholders Security Intelligence Technologies, Inc. We have audited the accompanying consolidated balance sheet of Security Intelligence Technologies, Inc. and subsidiaries as of June 30, 2003, and the related statements of operations, changes in stockholders' deficit and cash flows for the year then ended. These financial statements are the responsibility of the Company's management. Our responsibility is to express an opinion on these financial statements based on our audits. We conducted our audits in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan and perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used and significant estimates made by management, as well as evaluating the overall financial statement presentation. We believe that our audit provide a reasonable basis for our opinion. In our opinion, the financial statements referred to above present fairly, in all material respects, the consolidated financial position of Security Intelligence Technologies, Inc. and subsidiaries as of June 30, 2003, and the results of their operations and their cash flows for the year then ended in conformity with accounting principles generally accepted in the United States of America. The accompanying financial statements have been prepared assuming that the Company will continue as a going concern. As more fully described in Note 1, the Company has incurred operating losses in fiscal 2003 and 2002, negative cash flows from operations, and has limited cash and other resources to fund future operations. In addition, the Company is involved in material litigation, the costs of which have significantly impacted liquidity. Management's plans concerning these matters are also discussed in Note 1. The financial statements do not include any adjustments that might result from the outcome of these uncertainties. Schneider & Associates LLP Jericho, New York October 10, 2003 F-2 -32- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES CONSOLIDATED BALANCE SHEET June 30, 2004 ASSETS Current Assets: Cash $ 172,621 Inventory 959,825 Other current assets 223,872 ------------ Total current assets 1,356,318 Property and Equipment, at cost less accumulated depreciation and amortization of $170,969 22,248 Other assets 35,071 ------------ Total assets $ 1,413,637 ============ LIABILITIES AND STOCKHOLDERS' DEFICIT Current liabilities: Accounts payable and accrued expenses $ 3,722,228 Note payable - CEO/stockholder 1,509,151 Convertible notes payable 200,000 Customer deposits 1,917,031 Deferred revenue 1,408,679 ------------ Total current liabilities 8,757,089 ------------ Commitments and contingencies - See Notes Stockholders' deficit: Preferred stock, $.0001 par value, 10,000,000 shares authorized: Series A Convertible-$1.00 per share liquidation preference, 3,500,000 shares authorized, issued and outstanding 350 Series B Convertible-$1.00 per share liquidation preference, 1,500,000 shares authorized, issued and outstanding 150 Common stock, $.0001 par value, 100,000,000 shares authorized, 22,306,816 shares issued and outstanding 2,231 Additional paid in capital 3,808,283 Accumulated deficit (11,136,871) Accumulated other comprehensive loss (17,595) ------------ Total stockholders' deficit (7,343,452) ------------ Total liabilities and stockholders' deficit $ 1,413,637 ============ The accompanying notes are an integral part of these financial statements. F-3 -33- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES CONSOLIDATED STATEMENTS OF OPERATIONS Years Ended --------------------------- June 30, --------------------------- 2004 2003 ------------ ------------ Sales $ 3,013,332 $ 3,729,165 ------------ ------------ Costs and expenses: Cost of sales 1,402,980 1,827,045 Compensation and benefits 2,227,767 2,542,545 Professional fees and legal matters 933,576 936,621 Stock based compensation 1,608,858 5,301 Selling, general and administrative expenses 1,743,625 1,910,546 Unrealized (gain) loss on financial guarantees (135,590) 146,440 Depreciation and amortization 100,142 104,723 ------------ ------------ 7,881,358 7,473,221 ------------ ------------ Operating loss (4,868,026) (3,744,056) Interest expense 131,046 104,381 ------------ ------------ Net loss $ (4,999,072) $ (3,848,437) ============ ============ Net loss per above $ (4,999,072) $ (3,848,437) Other comprehensive loss - translation adjustment (17,595) -- ------------ ------------ Total comprehensive loss $ (5,016,667) $ (3,848,437) ============ ============ Loss per share, basic and diluted $ (0.25) $ (0.22) ============ ============ Weighted average number of shares 20,036,902 17,278,269 ============ ============ The accompanying notes are an integral part of these financial statements. F-4 -34- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES CONSOLIDATED STATEMENT OF CHANGES IN STOCKHOLDERS' DEFICIT YEARS ENDED JUNE 30, 2004 AND 2003 Convertible Preferred Retained Accumulated -------------------------------------- Additional Earnings Other Total Series A Series B Common Stock Paid-in (Accumulated Comprehensive Stockholders' Shares Amount Shares Amount Shares Amount Capital Deficit) Loss Deficit ------------------------------------------------------------------------------------------------------------- Balances, July 1, 2002 3,500,000 $350 1,500,000 $150 16,992,346 $1,699 $418,417 $(2,289,362) $- $(1,868,746) Issuance of common stock to settle debt - - - - 419,043 42 83,405 - - 83,447 Amortization of deferred compensation - - - - - - 5,301 - - 5,301 Net loss - - - - - - - (3,848,437) - (3,848,437) ----------------------------------------------------------------------------------------------------------- Balances, June 30, 2003 3,500,000 350 1,500,000 150 17,411,389 1,741 507,123 (6,137,799) - (5,628,435) Sale of common stock - - - - 1,190,000 119 168,881 - - 169,000 Adjustment to record discount given on stock sales - - - - - - 596,500 - - 596,500 Issuance of common stock to settle debt - - - - 836,459 84 756,083 - 756,167 Stock issued to consultants - - - - 2,868,968 287 789,338 - 789,625 Amortization of deferred compensation - - - - - - 990,358 - 990,358 Net loss - - - - - - - (4,999,072) - (4,999,072) Other comphrehensive loss - - - - - - - - (17,595) (17,595) ----------------------------------------------------------------------------------------------------------- Balances, June 30, 2004 3,500,000 $350 1,500,000 $150 22,306,816 $2,231 $3,808,283 $(11,136,871) $(17,595) $(7,343,452) =========================================================================================================== The accompanying notes are an integral part of these financial statements. F-5 -35- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES CONSOLIDATED STATEMENTS OF CASH FLOWS Years Ended -------------------------- June 30, -------------------------- 2003 2003 ------------- ------------ CASH FLOWS FROM OPERATING ACTIVITIES: Net loss $(4,999,072) $(3,848,437) Adjustments to reconcile net loss to net cash used in operating activities: Depreciation and amortization 100,142 104,723 Unrealized (gain) loss on financial guarantees (135,590) 146,440 Stock issued to consultants and officers for services 123,625 -- Amortization of deferred compensation 990,358 5,301 Discount on common stock sold and issued for services 618,500 -- Other comprehensive loss (17,595) -- Noncash compensation - CEO/stockholder 28,872 139,976 Noncash interest expense - CEO/stockholder 55,887 47,649 CHANGES IN OPERATING ASSETS AND LIABILITIES: Decrease in inventory 488,489 741,873 (Increase) decrease in other current assets (171,430) 133,073 Increase in accounts payable and accrued expenses 1,050,209 1,421,662 Increase in customer deposits 639,336 227,923 Increase in deferred revenue 373,605 688,883 ----------- ----------- Net cash used in operating activities (854,664) (190,934) ----------- ----------- CASH FLOWS FROM INVESTING ACTIVITIES: Decrease (Increase) in other assets 19,875 (7,213) ----------- ----------- Net cash used in investing activities 19,875 (7,213) ----------- ----------- CASH FLOWS FROM FINANCING ACTIVITIES: Proceeds from issuance of common stock 813,000 -- Repayments of note payable - bank -- (200,000) Borrowings under note payable - CEO/stockholder -- 387,441 Repayments of note payable - CEO/stockholder (27,228) -- Borrowings under convertible credit facility 200,000 -- ----------- ----------- Net cash provided by financing activities 985,772 187,441 ----------- ----------- Net increase (decrease) in cash 150,983 (10,706) Cash, beginning of year 21,638 32,344 ----------- ----------- Cash, end of year $ 172,621 $ 21,638 =========== =========== The accompanying notes are an integral part of these financial statements. F-6 -36- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2004 AND 2003 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES Organization and Nature of Business Security Intelligence Technologies, Inc. ("SIT"), a Florida corporation and its wholly owned subsidiaries (collectively the "Company") are engaged in the design, assembly and sale of security and surveillance products and systems. The Company purchases finished items for resale from independent manufacturers, and also assembles off-the-shelf electronic devices and other components into proprietary products and systems at its own facilities. The Company generally sells to businesses, distributors, government agencies and consumers through five sales offices located in Miami, Florida; Beverly Hills, California; Washington, DC; Hong Kong, and its executive offices located in New Rochelle, New York and through its retail store/service center in London, England. On April 17, 2002, SIT, then known as Hipstyle.com, Inc. acquired all of the stock of CCS International, Ltd. ("CCS"), a Delaware corporation, and its wholly-owned subsidiaries. As a result of, and in connection with this transaction, the name of the corporation was changed from Hipstyle.com, Inc. to Security Intelligence Technologies, Inc. and CCS and its subsidiaries became SIT's wholly-owned subsidiaries, the stockholders of CCS obtained control of the merged entity after the transaction was completed. This transaction is referred to in the notes to the Consolidated Financial Statements as the "reverse merger". Under reverse acquisition accounting, CCS is considered the accounting acquirer and SIT (then known as Hipstyle.com, Inc.) is considered the acquired company. Inasmuch as SIT had no substantive assets or operations at the date of the transaction, the merger has been recorded as an issuance of CCS stock to acquire SIT, accompanied by a recapitalization, rather than as a business combination. Principles of Consolidation The consolidated financial statements include the accounts of SIT and its wholly-owned subsidiaries, CCS, Spy Shop, Ltd. d/b/a Counter Spy Shop of Delaware, a Delaware corporation (formerly a retail store closed on January 31, 2004); Security Design Group, Inc., a New York corporation (formerly a manufacturing operation, currently inactive); Counter Spy Shop of Mayfair London, Ltd., a District of Columbia corporation (formerly a retail store closed on July 1, 2003); CCS Counter Spy Shop of Mayfair London, Ltd., a California corporation (formerly a retail store closed on January 1, 2004); Counter Spy Shop of Mayfair, Ltd., a Florida corporation (formerly a sales office/retail store that ceased operations on March 31, 2004, currently inactive); and Homeland Security Strategies (UK), Ltd. (formerly Counter Spy Shop of Mayfair Limited, a retail store/service center. The financial statements for the year ended June 30, 2004 include the operations of Homeland Security Strategies, Inc., a New York corporation, that commenced operations on August 20, 2003; Homeland Security Strategies of California, Inc., a California corporation, that operates a sales office that commenced operations on December 26, 2003; and Homeland Security Strategies Inc of Florida, Inc., a Florida corporation, that operates a sales office that commenced operations on January 30, 2004. All significant intercompany balances and transactions have been eliminated in consolidation. Basis of Financial Statement Presentation - Going Concern Explanatory Paragraph The financial statements of the Company have been prepared assuming the Company will continue as a going concern, which contemplates the realization of assets and the satisfaction of liabilities in the normal course of business. The Company incurred net losses of $4,999,072 and $3,848,437 for the years ended June 30, 2004 and June 30, 2003 respectively. In addition, at June 30, 2004, the Company had a working capital deficit of $7,400,771 and a deficiency in stockholders' equity of $7,343,452 and, for the year ended June 30, 2004, the Company had negative cash flow from operations of $855,000. The Company is also a defendant in material and costly litigation, which has significantly F-7 -37- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2004 AND 2003 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES - Continued Basis of Financial Statement Presentation - Continued: impacted liquidity. (See Note 16). The Company requires significant additional financing which may not be available. The Company's bank facility terminated on November 1, 2002 and the only source of funds other than operations has been the exercise of options to purchase shares of the Company's common stock, the sale of the Company's common stock, a credit facility with a group of private investors, loans from the Company's chief executive officer and customer deposits. (See Notes 5, 6, 9 and 11). These factors raise substantial doubt about the Company's ability to continue as a going concern. Management's plans with respect to these matters include to settle vendor payables wherever possible, a reduction in operating expenses, and continued financing from the chief executive officer in the absence of other sources of funds. Management cannot provide any assurance that its plans will be successful in alleviating its liquidity concerns and bringing the Company to the point of profitability. The accompanying financial statements do not include any adjustments that might result from the outcome of these uncertainties. Use of estimates The preparation of financial statements in conformity with accounting principles generally accepted in the United States requires management to make estimates and assumptions that affect the reported amounts of assets and liabilities and disclosure of contingent assets and liabilities at the date of the combined financial statements, and the reported amounts of revenue and expenses during the reporting periods. Actual results could differ from those estimates. Inventories Inventories are valued at the lower of cost (first-in, first-out) or market. Property and equipment Assets are stated at cost. Depreciation is computed over the estimated useful life of the assets generally using the straight-line method over periods ranging from five to seven years. Additions and major renewals and betterments are capitalized and depreciated over their estimated useful lives. Repairs and maintenance are charged to operating expenses as incurred. Revenue recognition The Company recognizes revenue from sales upon the delivery of merchandise to a customer. Non-refundable advance payments received under marketing and distribution arrangements are deferred and either applied as payments towards customer purchases made pursuant to the terms of the respective agreements, or recognized as income at the termination of the agreement if specified purchase quotas have not been met by the customer. Customer deposits are initially recorded as liabilities and recognized as revenue when the related goods are shipped. F-8 -38- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2004 AND 2003 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES - Continued Stock-based Compensation The Company periodically grants stock options to employees in accordance with the provisions of its stock option plans, with the exercise price of the stock options being set at the closing market price of the common stock on the date of grant. The Company accounts for stock-based compensation plans under Accounting Principles Board Opinion No. 25, "Accounting for Stock Issued to Employees", and accordingly accounts for employee stock-based compensation utilizing the intrinsic value method. FAS No. 123, "Accounting for Stock-Based Compensation", establishes a fair value based method of accounting for stock-based compensation plans. The Company has adopted the disclosure only alternative under FAS No. 123, which requires disclosure of the pro forma effects on earnings and earnings per share as if FAS No. 123 had been adopted as well as certain other information. Stock options granted to non-employees are recorded at their fair value, as determined in accordance with SFAS No. 123 and Emerging Issues Task Force Consensus No. 96-18, and recognized over the related service period. Deferred charges for options granted to non-employees are periodically re-measured until the options vest. In December 2002, the FASB issued SFAS No. 148, Accounting for Stock-Based Compensation - Transition and Disclosure. SFAS No. 148 amends SFAS No. 123, Accounting for Stock-Based Compensation. Although it does not require use of the fair value method of accounting for stock-based employee compensation, it does provide alternative methods of transition. It also amends the disclosure provisions of SFAS No.123 and APB No. 28, Interim Financial Reporting, to require disclosure in the summary of significant accounting policies of the effects of an entity's accounting policy with respect to stock-based employee compensation on reported net income and earnings per share in annual and interim financial statements. SFAS No. 148's amendment of the transition and annual disclosure requirements is effective for fiscal years ending after December 15, 2002. The amendment of disclosure requirements of APB No. 28 is effective for interim periods beginning after December 15, 2002. We adopted SFAS No. 148 and APB No.28 on January 1, 2003. FASB Statement 123, "Accounting for Stock-Based Compensation," requires the Company to provide pro forma information regarding net income (loss) and income (loss) per share as if compensation cost for the Company's stock option issuances had been determined in accordance with the fair value based method prescribed in FASB Statement 123. The Company estimates the fair value of each stock option at the grant date by using the Black-Scholes option-pricing model with the following weighted-average assumptions used for grants in fiscal 2004 and 2003: dividend yield of 0%, risk-free interest rate of 3.38%, expected lives of eight years, and expected volatility of 120%. Under the accounting provisions of SFAS Statement 123, the Company's net loss and loss per share for 2004 and 2003 would have been the pro forma amounts indicated below: Year Ended June 30, -------------------------------------- 2004 2003 ---------------- ------------------ Net loss: As reported $ (4,999,072) $ (3,848,437) Deduct: Total stock based employee compensation expense determined under the fair value based method for all awards (249,859) (310,041) ----------------- ----------------- $ (5,248,931) $ (4,158,478) ================= ================= Loss per share: As reported $ (0.25) $ (0.22) Proforma $ (0.26) $ (0.24) F-9 -39- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2004 AND 2003 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES - continued Income taxes The Company uses the liability method to determine its income tax expense. Under this method, deferred tax assets and liabilities are computed based on differences between financial reporting and tax basis of assets and liabilities and are measured using the enacted rates and laws that will be in effect when the differences are expected to reverse. Deferred tax assets are reduced by a valuation allowance if, based on the weight of the available evidence, it is more likely than not that all or some portion of the deferred tax assets will not be realized. The ultimate realization of the deferred tax asset depends on the Company's ability to generate sufficient taxable income in the future. Advertising Advertising costs are expensed as incurred. The Company incurred advertising expenses of approximately $103,000 and $227,000 during the years ended June 30, 2004 and 2003 respectively. Financial Guarantees Certain shares issued by the Company to settle debt obligations contain a price guarantee that requires the Company to settle in cash any difference between the original face amount of the debt and proceeds from the creditor's subsequent sale of the shares. The Company accounts for these transactions by recording the debt at fair value with periodic mark-to-market adjustments until the guarantee is settled. Unrealized gains or losses resulting from changes in fair value are included in earnings and accrued expenses. (See Note 4) Fair Value of Financial Instruments The fair values of financial instruments recorded on the balance sheet are not significantly different from their carrying amounts due to the short-term nature of those instruments, or because they are accounted for at fair value. New accounting pronouncements In January 2003, the FASB issued Interpretation No. 46, "Consolidation of Variable Interest Entities," an interpretation of ARB No. 51. This Interpretation addresses the consolidation by business enterprises of variable interest entities as defined in the Interpretation. The Interpretation applies immediately to variable interests in variable interest entities created after January 31, 2003, and to variable interests in variable interest entities obtained after January 31, 2003. The adoption of this Interpretation did not have a material effect on our consolidated financial statements. In May 2003, the FASB issued SFAS No. 150, Accounting for Certain Financial Instruments with Characteristics of both Liabilities and Equity, which requires mandatorily redeemable financial instruments to be classified as liabilities, the result of which requires related expense to be classified as interest expense rather than minority interest on a prospective basis. SFAS No. 150 is effective in the three months ended June 30, 2003 for financial instruments entered into or modified after May 31, 2003, and is otherwise effective July 1, 2003 for previously issued instruments. SFAS No. 150 is not expected to have a material impact on our financial position or results of operations. F-10 -40- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO ONSOLIDATED FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2004 AND 2003 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES - Continued Joint Venture Agreements The Company is a party to three joint venture agreements with technology companies. In connection with these agreements the Company and its joint venture partner formed new entities whose ownership and share of operating results are equally owned. The joint venture agreements grant the new entities exclusive marketing rights to the joint venture partner's products, except in the countries in which the joint venture partners are domiciled. The Company accounts for its investments in the joint ventures using the equity method because the Company's ownership is greater than 20% and the Company has the ability to exercise significant influence over the operating, investing and financing decisions of the joint venture entities. Under the equity method, the Company will record its share of joint venture income or losses and adjust the basis of its investment accordingly. As of June 30, 2004, the joint ventures have not generated any revenues or other significant business activity. Foreign Currency Translation The functional currency of the Company's UK subsidiary is the local currency. Accordingly, the Company translates all assets and liabilities into U.S. dollars at current rates. Revenues, costs, and expenses are translated at average rates during each reporting period. Gains and losses resulting from the translation of the consolidated financial statements are excluded from results of operations and are reflected as a translation adjustment and a separate component of stockholders' deficit. Translation adjustments were $17,595 as of June 30, 2004 and were immaterial as of June 30, 2003. Gains and losses resulting from foreign currency transactions are recognized in the consolidated statement of operations in the period they occur. Concentration of credit risk Financial instruments that potentially subject the Company to concentrations of credit risk consist principally of cash balances. The Company limits the amount of credit exposure to any one financial institution. The Company generally does not grant credit to domestic or foreign customers. Research and development costs Research and development costs are charged to expense as incurred. Loss Per Share The Company calculates earnings per share in accordance with SFAS No. 128, Earnings Per Share, and SEC Staff Accounting Bulletin No. 98. Accordingly, basic and diluted loss per share is computed using the weighted average number of shares of common stock outstanding and excludes all common stock equivalents outstanding during the period. Common stock equivalents consist of shares issuable upon the exercise of stock options and warrants using the treasury stock method. Stock options and preferred stock that are convertible into common stock based on the Company's attainment of performance goals are not includible in the calculation of earnings per share until the specified targets are met. The following securities have been excluded from the diluted computation for fiscal 2004 and 2003 because they are contingently issuable and/or antidilutive: F-11 -41- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2004 AND 2003 1. NATURE OF BUSINESS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES - Continued Loss Per Share - Continued -------------------------- Year Ended June 30, --------------------------- 2004 2003 ---------- --------- Series A Convertible Preferred Stock 3,500,000 3,500,000 Series B Convertible Preferred Stock 1,500,000 1,500,000 Stock options 2,609,500 1,959,500 Warrants 900,000 400,000 Reclassifications Certain reclassifications have been made to the prior year financial statements in order to conform to the current year presentation. 2. INVENTORY Inventories consist of the following at June 30, 2004: Small components and supplies $ 214,565 Finished goods 745,260 --------------- $ 959,825 =============== 3. PROPERTY AND EQUIPMENT Property and equipment consists of the following at June 30, 2004: Office furniture and equipment $ 188,567 Leasehold improvements 4,650 --------------- 193,217 Accumulated depreciation and amortization (170,969) --------------- $ 22,248 =============== Depreciation and amortization expense was $100,142 and $104,723 for the years ended June 30, 2004 and 2003, respectively. F-12 -42- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2004 AND 2003 4. ACCOUNTS PAYABLE AND ACCRUED EXPENSES Accounts payable and accrued expenses at June 30, 2004 consisted of the following: Accounts payable - trade $1,941,295 Professional fees and legal matters 1,181,864 Potential liability for guarantees of common stock issued in settlement of claims 161,803 Payroll liabilities 389,988 Deferred rent payable 47,278 ---------- $3,722,228 ========== Outstanding lawsuits initiated by the Company's Creditors for nonpayment of accrued liabilities were approximately $894,167 as of June 30, 2004. In addition, as of June 30, 2004, the Company was subject to outstanding judgments of approximately $167,000 relating to claims against the Company for non-payment of obligations. As of June 30, 2004 the Company had issued 1,263,459 shares of common stock subject to financial guarantees with a maximum liability of $824,584. 5. NOTES PAYABLE - CEO/STOCKHOLDER This amount represents (i) notes payable to the Company's chief executive officer, and including accrued interest of $138,742 based on an interest rate of 5% per annum and (ii) deferred salary of $196,271. The Notes are secured by substantially all of the assets of the Company and are due on demand. 6. NOTES PAYABLE CONVERTIBLE CREDIT FACILITY On June 10, 2004 the Company entered into a convertible credit agreement with private investors, including Michael D. Farkas, Ostonian Securities Limited, Kesef Equity Group, Inc., and GSM Communications, Inc. that provides for the Company to borrow up to $500,000 upon the attainment of certain performance criteria prior to September 15, 2004. At June 30, 2004 the Company had borrowed $200,000 under this agreement and borrowed an additional $300,000 during the first quarter of fiscal 2005. The notes bear interest at the rate of 10% per annum, are convertible into the Company's common stock, $.0001 at $.10 per share and mature on June 30, 2005. The conversion feature was valued at $315,333 using the Black-Scholes option-pricing model and was expensed during the year ended June 30, 2004 as stock based compensation. 7. PREFERRED STOCK The board of directors has authorized two series of preferred stock, the Series A preferred stock, consisting of 3,500,000 shares, and the Series B preferred stock, consisting of 1,500,000 shares. Both Series A and Series B preferred shares have a liquidation preference of $1.00 per share and are each convertible into one share of common stock if CCS has either consolidated annual net revenue of at least $10,000,000 or annual consolidated net income of at least $1,000,000 prior to October 15, 2008. Each share of Series A preferred stock has 15 votes per share. Series B preferred stock is nonvoting except as required by law. All of the shares of Series A preferred stock and Series B preferred stock are held by the Company's chief executive officer. F-13 -43- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2004 AND 2003 8. STOCK OPTIONS Stock Option Plans As of January 21, 2002, the board of directors of the Company adopted the 2002 Stock Plan (the "2002 Plan"), which provided for the grant of incentive and non-qualified stock options to purchase a maximum of 2,000,000 shares of common stock to directors, employees, officers, agents, consultants and independent contractors who perform services for the Company. As of June 30, 2004, a total of 1,959,500 options to purchase shares of common stock are outstanding under the 2002 Plan. As of July 3, 2003 the board of directors of the Company adopted the 2003 Stock Incentive Plan (the "2003 Plan") which provided for the grant of non-qualified stock options to purchase a maximum of 320,000 shares of common stock or the grant of shares to directors, employees, officers, agents, consultants and independent contractors who perform services for the Company. As of June 30, 2004, 236,000 shares have been issued to consultants and 35,000 shares have been issued to an officer for services rendered. As of January 23, 2004 our board of directors adopted the 2004 Stock Incentive Plan (the "2004 Plan") which provided for the grant of non-qualified stock options to purchase a maximum of 650,000 shares of common stock or the grant of shares to directors, employees, officers, agents, consultants and independent contractors who perform services for the Company. As of June 30, 2004, 650,000 options to purchase shares of common stock have been issued under this plan. A summary of changes in common stock options during fiscal 2004 and 2003 follows: Number of Weighted Average Shares Exercise Price ---------- ------------------ Outstanding at June 30, 2002 1,783,000 $ 0.61 Granted 300,000 0.08 Cancelled (90,500) 1.34 Exercised -- -- ---------- ---------- Outstanding at June 30, 2003 1,992,500 0.50 Granted 650,000 0.25 Cancelled (33,000) 1.34 Exercised -- -- ---------- ---------- Outstanding at June 30, 2004 2,609,500 $ 0.42 ========== ========== F-14 -44- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2004 AND 2003 8. STOCK OPTIONS - Continued: Stock Option Plans - Continued" The following table summarizes information about stock options outstanding at June 30, 2004: Weighted Average Number Remaining Number Exercise Outstanding Contractual Exercisable Price 6/30/2004 Life (Months) 6/30/2004 ----------- ----------- -------------- ------------ $ 0.08 300,000 98 300,000 $ 0.25 650,000 115 650,000 $ 0.50 1,605,500 91 1,593,500 $ 1.00 49,000 91 49,000 $ 1.90 5,000 93 5,000 ----------- -------------- ----------- 2,609,500 98 2,597,500 ============ ============== =========== At June 30, 2004 there were 79,500 options available for future grant under the 2002, 2003, and 2004 Stock Plans. Other Option Grant Pursuant to the chief executive officer's employment agreement, the Company granted him a non-qualified stock option to purchase 1,000,000 shares of common stock at an exercise price of $2.00 per share. These options vest upon achievement by the Company of $10,000,000 of annual revenues. Due to the uncertainty of reaching the stipulated performance target, the Company has not established a measurement date for the option. Upon determination that the achievement of the revenue threshold is probable, the Company will value the option on the measurement date using the intrinsic value method, and will record the resulting charge, if any, over the remaining vesting period. Common Stock Purchase Warrants In April 2002, in connection with the reverse merger, (see Note 1) warrants to purchase a total of 400,000 shares of CCS common stock issued to a consultant were converted into warrants to purchase an equal number of shares of the Company's common at an exercise price of $.50 per share, subject to an anti-dilution provision, as defined. The warrants vested on April 17, 2003. The Company has valued the warrants at $22,770 using the Black-Scholes option pricing model. F-15 -45- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS JUNE 30, 2004 AND 2003 9. CONSULTING AGREEMENTS AND RELATED TRANSACTIONS In July 2003 the Company formalized consulting contracts with Michael D. Farkas, Jason S. Lyons and an additional financial consultant relating to acquisition services, financial public relations and operational performance services. In connection therewith the Company granted immediately exercisable options to purchase a total of 2,600,000 shares of common stock, of which options to purchase 1,700,000 shares were granted to Michael D. Farkas, and options to purchase 400,000 shares were granted to Jason S. Lyons. The exercise price ranged from $.10 per share to $.50 per share. As of June 30, 2004 the consultants had exercised options to purchase 2,600,000 shares of common stock for a total of $659,000. Of these options, options to purchase 1,700,000 shares were exercised by Michael D. Farkas for $400,000, and 400,000 options exercised by Jason S. Lyons for $140,000. These options were valued at $405,727 using the Black-Scholes option-pricing model and were expensed as stock based compensation during the year ended June 30, 2004. During the year ended June 30, 2004 the Company sold 1,190,000 shares of common stock and issued warrants to purchase 500,000 shares of common stock at an exercise price of $.15 per share for $154,000, including 1,000,000 shares of common stock and warrants to purchase 500,000 shares of common stock with an exercise price of $.15 per share sold to Jason S. Lyons for $135,000, and 180,000 shares of common stock sold to GSM Communications, Inc. for $18,000. The warrants vest immediately, have cashless exercise rights and a life of three years. These options and warrants were valued at $268,624 using the Black-Scholes option-pricing model and were expensed during the year ended June 30, 2004. In addition the Company has expensed as stock based compensation $611,500 representing the difference between the market value and the actual price paid for the 1,190,000 shares of common stock. 10. PLEDGE AGREEMENT The agreement relating to the April 2002 reverse merger provided, as a condition to CCS' obligation to close, that the Company receive proceeds of $1,000,000 from a private sale of the Company's securities. This condition was not met at closing, and CCS completed the reverse merger with the Company having received only $75,000. At the closing of the reverse merger, the Company entered into a stock pledge agreement with Atlas Equity Group, Inc. a Florida corporation beneficially owned by Michael D. Farkas who is a stockholder of the Company, and who beneficially owns more than 5% of the Company's common stock, pursuant to which Atlas Equity was to have pledged 1,500,000 shares of common stock of the Company. Atlas Equity never delivered the shares to be held pursuant to the pledge agreement. The pledge agreement stipulated the pledged shares were to be returned to Atlas Equity if the Company sold shares of its common stock sufficient to generate net cash proceeds of $925,000 to the Company prior to June 1, 2002, which date was subsequently extended to June 14, 2002. On December 16, 2002 the Company and Atlas Equity and certain successor owners of Atlas Equity's pledged shares entered into an agreement that reduced the number of pledged shares to 750,000, restricted the number of pledged shares that could be sold for a period of one year, expanded the money raising activity to include the issuance of debt and extended the date to raise the $925,000 to July 7, 2004. As of June 30, 2004 the Company had sold shares of its common stock and issued debt generating net cash proceeds of $993,000 and all pledged shares have been released. F-16 -46- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2004 AND 2003 11. ISSUANCES OF SECURITIES During the fiscal year ended June 30, 2004, the Company issued the following securities: The Company issued 51,468 shares of its common stock to an officer and an employee in payment of accrued compensation totaling $14,000. The Company issued 267,500 shares of its common stock to consultants in payment of consulting fees of $139,081. On May 7, 2004, the Company issued 550,459 shares of its common stock to Frank Ross and Juliett Vassilkioti, pursuant to a settlement agreement. See "Item 3. Legal Proceedings." The settlement agreement provides that the shares will be valued at their average closing price for the 30 days beginning July 7, 2005 and ending August 5, 2005. CCS has guaranteed that the value of the shares at that time will be at least $300,000 and is responsible for the amount that $300,000 exceeds that value. Ben Jamil, the Company's chief executive officer and principal stockholder has guaranteed that the shares will have a value of at least $150,000. (See Note 16). At September 29, 2004 the value of the shares based upon the closing price of our common stock was $165,138. The Company issued 236,000 shares of its common stock to creditors in full settlement, subject to certain terms, of $89,050 of payables. If the proceeds from the sale of the common stock when the creditors sell the shares is less than $89,050, the Company is to pay the creditors the difference between $89,050 and the proceeds received from the sale of the shares. At September 29, 2004 the value of the shares based upon the closing price of the Company's common stock was $70,800. During the fiscal year ended June 30, 2003, we issued the following securities: On July 10, 2002, the Company and Shenzhen Newtek, a former product distributor of the Company, entered into a Settlement Agreement under which the Company issued 67,000 restricted shares of its common stock in full settlement, subject to certain terms, of a $67,000 claim. If the market price of the Company's common stock on July 10, 2003 is less than $1.00 per share, the Company is to pay the plaintiff the difference between $67,000 and the value of the stock or in the alternative the plaintiff can return the 67,000 shares to the Company in return for a payment of $35,000. On October 21, 2002, the Company and Allan L. Dunterman Jr. entered into a Settlement Agreement under which the Company issued 110,000 restricted shares of its common stock in full settlement, subject to certain terms, of an $88,750 claim. If the market price of the Company's common stock on October 21, 2003 or such later date that the plaintiff sells the shares is less than $.81 per share, the Company is to pay the plaintiff the difference between $88,750 and the value of the stock. The Company issued 112,043 restricted shares of common stock for investor relations consulting services of $15,000 and issued 80,000 restricted shares of common stock in full payment of trade payables of $18,267. On October 7, 2002, the Company entered into an agreement with an investment banking firm under which the Company issued 50,000 restricted shares of common stock. F-17 -47- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2004 AND 2003 12. INCOME TAXES There was no income tax expense or benefit in fiscal 2004 and 2003 due to operating losses. In January 2003 the Company received approximately $158,000 of tax refunds from a federal loss carry-back claim. Following is a reconciliation of the provision for incometaxes (tax benefit) with income taxes on the federal statutory rate: June 30, ---------------------------------- 2004 2003 --------------- ---------------- Federal tax at statutory rate $ (1,700,000) $ (1,355,000) State and local taxes, net of federal effect (297,000) (159,000) Nondeductible items 237,000 93,000 Change in valuation allowance 1,760,000 1,421,000 --------------- ---------------- Income taxes (tax benefit) $ - $ - =============== ================ Components of deferred taxes are as follows: June 30, -------------------------------- Deferred tax assets: 2004 2003 --------------- --------------- Net operating losses $ 2,912,000 $ 1,798,000 Deferred rent payable 18,000 22,000 Reserves and allowances 762,000 480,000 Stock based compensation 413,000 16,000 Deferred revenue 563,000 413,000 --------------- --------------- 4,668,000 2,729,000 Deferred tax liability: Property and equipment (6,000) 6,000 --------------- --------------- 4,662,000 2,723,000 Less valuation allowance (4,662,000) (2,723,000) --------------- --------------- Net deferred taxes $ - $ - =============== =============== The Company files a consolidated federal return with its U.S. subsidiaries and combined state tax returns where permitted. The Company has recorded valuation allowances to offset tax benefits arising from deferred tax items because their realization is uncertain. The Company has federal net operating loss carry-forwards of approximately $7,300,000 available to offset future federal taxable income. These losses expire in 2021, 2022, 2023 and 2024. 13. 401(K) SAVINGS PLAN The Company maintains a qualified deferred compensation plan under section 401(k) of the Internal Revenue Code. Under the plan, employees may elect to defer up to 15% of their salary, subject to the Internal Revenue Service limits. The Company may make a discretionary match as well as a discretionary contribution. The Company did not make any contributions to the plan for the years ended June 30, 2004 and 2003. F-18 -48- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2004 AND 2003 14. RELATED PARTY TRANSACTIONS Employment Agreement In April 2002, in connection with the completion of the reverse merger, the Company entered into a three-year employment agreement with Mr. Jamil pursuant to which he agreed to serve as the Company's president and chief executive officer. The agreement calls for an annual base compensation of $250,000 and may be increased on each anniversary date commencing May 1, 2003 by 10% if the Company achieves certain performance criteria. In addition to the base salary, the chief executive officer is eligible to receive an annual discretionary bonus commencing June 30, 2003, at the sole discretion of the board of directors. Pursuant to the agreement, the Company granted the chief executive officer a non-qualified stock option to purchase 1,000,000 shares of common stock at an exercise price of $2.00 per share. These options vest upon achievement by the Company of $10,000,000 of annual revenues. 15. SUPPLEMENTAL DISCLOSURE OF CASH FLOW INFORMATION: Year Ended ----------------------------- June 30, ----------------------------- 2004 2003 -------------- ------------- Cash paid during the period for: Interest $ 74,063 $ 56,732 ============== ============= Income taxes (refunded - net) $ 2,929 $ (153,707) ============== ============= Non-cash financing and investing activities: Common stock issued to settle accounts payable $ 756,166 $ 83,447 ============== ============= Accrued interest and deferred salary credited to loan payable - CEO/stockholder $ 84,759 $ 187,625 ============== ============= 16. COMMITMENTS AND CONTINGENCIES Litigation Settled matters In June 1998, a photographer and model formerly retained by CCS filed suit in U. S. District Court for the Southern District of New York captioned Ross & Vassilkioti v. CCS International, Ltd. seeking damages for alleged copyright infringement and other claims. The judge in the case has granted the plaintiff partial summary judgment as to the copyright infringement. On June 18, 2003, a jury awarded the plaintiffs $350,000 on the copyright infringement portion of the case. Under federal judicial rules, the Company is unable to contest the granting of partial summary judgment until a final judgment has been rendered. The Company reached a settlement on May 7, 2004 with the plaintiffs for $600,000 F-19 -49- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2004 AND 2003 16. COMMITMENTS AND CONTINGENCIES - Continued Litigation - Continued Settled matters - Continued payable with 550,459 shares of the Company's common stock. The agreement stipulates the shares will be valued at their average closing price for the 30 days beginning July 7, 2005 and ending August 5, 2005. CCS has guaranteed that the value of the shares will be at least $300,000 and is responsible for the amount that $300,000 exceeds the value of the shares. Ben Jamil, the Company's chief executive officer and principal stockholder has guaranteed that the value of the shares will be at least $150,000 and has guaranteed that the shares will have a value of at least $150,000. On November 1, 2002, a former Company supplier filed suit in the United States District Court for the District of Maryland, captioned Micronel Safety, Inc. v. CCS International Ltd. seeking damages of $242,400 for breach of contract to purchase certain products. In August 2004, Micronel Safety, Inc. found another buyer for the products and on August 16, 2004 the case was dismissed. Pending Matters On or about March 13, 2003, an action was commenced against CCS and its subsidiary in the Circuit Court of the 11th Judicial Circuit, Miami-Dade County, Florida captioned Welcome Publishing Company, Inc. v. CCS International, Ltd. and Counter Spy Shop of Mayfair Ltd., Inc. seeking damages of $140,430 for an alleged breach of an advertising contract. CCS has denied the material allegations of the plaintiff's claim and has raised affirmative defenses thereto. The Company believes that it has valid defenses to the claim. The case appears to be going to trial, however, a trial date has not been set. The Company is also the defendant in three actions arising out of distributor agreements. On or about May 11, 2000 an action was commenced against CCS in the Supreme Court, New York County, captioned Ergonomic Systems Philippines Inc. v. CCS International Ltd. The plaintiff seeks to recover $81,000, which was paid to CCS in connection with a distributorship agreement between the parties, plus costs and interest. CCS has denied the material allegations of the claim and has raised affirmative defenses thereto. On August 3, 2004, the Court granted the plaintiff's claim which, together with accrued interest, totaled $120,223. The Company believes that it has a valid basis for appeal of the court's verdict, but it can give no assurance the court verdict will not be upheld. On or about October 12, 2001, an action was commenced against CCS in the United States District Court for the Southern District of New York, captioned China Bohai Group Co., Ltd. and USA International Business Connections Corp. v. CCS International, Ltd. The plaintiff seeks to recover $250,000 paid to CCS in connection with a distributorship agreement between the parties, plus $5,000,000 of punitive damages and costs and interest. CCS has denied the material allegations of the plaintiff's claim and has raised affirmative defenses thereto. CCS has asserted a counterclaim seeking damages in the approximate amount of $1,150,000 based upon the plaintiff's alleged breach of the parties' distributorship agreement. The Company believes that it has valid defenses to the claim. On December 3, 2002 EHS Elektronik Sistemleri submitted a demand for arbitration to the American Arbitration Association in New York City claiming CCS breached a joint venture agreement it had entered into with CCS in 1994 and seeking a refund of the $200,000 it had paid to CCS. On March 4, 2004 the arbitrator awarded the plaintiff's claim which, together with accrued interest, totaled $223,620. The Company believes that it has a valid basis for appeal of the arbitrator's award, but it can give no assurance the American Arbitration Association will not uphold the award. F-20 -50- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2004 AND 2003 16. COMMITMENTS AND CONTINGENCIES Litigation - Continued: Pending Matters On July 1, 2002, the Company's London subsidiary, Homeland Security Strategies (UK), Ltd. (formerly Counter Spy Shop of Mayfair Limited) ("HSS of UK"), entered into an agreement to assume the business operations of another United Kingdom corporation ("Predecessor") for nominal consideration. The Predecessor is a defendant in ongoing litigation brought by a former customer, who has sued for breach of a contract executed in 1998 and is seeking a refund of approximately $293,000 in products and services purchased from the Predecessor. Due to the business transfer, there is a possibility that the plaintiff could name HSS of UK as a defendant in the case. The Company, in consultation with counsel, believes that the Predecessor has valid defenses to the claim, and that HSS of UK has valid defenses against any action that may be brought against it. Because of our financial position, actions have been commenced or threatened by creditors. As of June 30, 2004 we are defending lawsuits for the collection of approximately $894,167 and have been unable to satisfy approximately $167,000 of judgments previously rendered in actions by creditors. Given that litigation is subject to many uncertainties, it is not possible to predict the outcome of the litigation pending against the Company. However, it is possible that the Company's business, results of operations, cash flows or financial position could be materially affected by an unfavorable outcome of certain pending litigation in amounts in excess of those that the Company has recognized. All such cases are being, and will continue to be vigorously defended, and the Company believes that it has meritorious and valid defenses against all such litigation, as well as a valid basis for appeal of any adverse verdicts, should they result. Stock Purchase Agreements On January 31, 2002, Mr. Jamil entered into an understanding with two financial consulting companies to sell to them 30% of his interest in the common stock of CCS's subsidiaries, excluding Security Design, Inc., for nominal consideration. Mr. Jamil has advised the Company that neither the two financial consultants nor their designees have paid the required consideration for the shares, and that he has never formally transferred any stock ownership in the subsidiaries to the financial consultants or their designees. Further, a total of 1,500,000 shares of the Company's Series B Preferred Stock were issued to the chief executive officer in partial exchange for his shares in the subsidiaries, and not to the financial consultants or their designees as had been contemplated by agreements between the chief executive officer and the financial consultants or their designees. The Company cannot give any assurance that the financial consultants will not claim that they are entitled to the Series B shares. F-21 -51- -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS FOR THE YEARS ENDED JUNE 30, 2004 AND 2003 Operating Leases The Company leases office space, retail stores and sales offices and office equipment under non-cancelable operating leases that expire over various periods through 2010. Rent expense is being recognized on a straight-line basis to account for rent concessions and graduated charges during the lease term, resulting in deferred rent payable of $47,278. Total rent expense for the years ended June 30, 2004 and 2003 was approximately $481,456 and $632,288 respectively. The approximate future minimum rental commitments for all long-term non-cancelable operating leases are as follows: Year ending June 30, Amount ----------------- --------------- 2005 $ 514,894 2006 300,999 2007 266,697 2008 242,100 2009 162,954 Thereafter 250,697 --------------- $ 1,738,341 =============== 17. SUBSEQUENT EVENTS NOTES PAYABLE CONVERTIBLE CREDIT FACILITY During August and September 2004, the Company borrowed an additional $300,000 under their convertible credit facility. (See Note 6). F-22 -52- -------------------------------------------------------------------------------- SIGNATURES Pursuant to the requirements of Section 13 or 15(d) of the Securities Exchange Act of 1934, the registrant has duly caused this report to be signed on its behalf by the undersigned, thereunto duly authorized. SECURITY INTELLIGENCE TECHNOLOGIES, INC. /s/ Ben Jamil ------------------------------------- Ben Jamil Chairman of the Board of Directors, President and Chief Executive Officer Dated: October 12, 2004 Pursuant to the requirements of the Securities Exchange Act of 1934, this report has been signed below by the following persons on behalf of the registrant and in the capacities and on the dates indicated: /s/ Ben Jamil /s/ Chris R. Decker -------------------------------------- ------------------------------------ Ben Jamil Chief Financial Officer and Director Chairman of the Board of Directors, Dated: October 12, 2004 President and Chief Executive Officer Dated: October 12, 2004 /s/ Menachem Cohen /s/ Sylvain Naar ------------------------------------- ------------------------------------- Menachem Cohen Sylvain Naar Vice President and Director Director Dated: October 12, 2004 Dated: October 12, 2004 /s/ Tom Felice ------------------------------------- Tom Felice Director Dated: October 12, 2004 -53- -------------------------------------------------------------------------------- Exhibit 10.8 SECURITY INTELLIGENCE TECHNOLOGIES, INC. 2004 Stock Incentive Plan 1. Purpose; Definitions. The purpose of the Security Intelligence Technologies, Inc. 2004 Stock Incentive Plan (the "Plan") is to enable Security Intelligence Technologies, Inc. (the "Company") to attract, retain and reward the key employees, director and consultants as hereinafter set forth. For purposes of the Plan, the following terms shall be defined as set forth below: (a) "Affiliate" means any corporation, partnership, limited liability company, joint venture or other entity, other than the Company and its Subsidiaries, that is designated by the Board as a participating employer under the Plan, provided that the Company directly or indirectly owns at least 20% of the combined voting power of all classes of stock of such entity or at least 20% of the ownership interests in such entity. (b) "Board" means the Board of Directors of the Company. (c) "Code" means the Internal Revenue Code of 1986, as amended from time to time, and any successor thereto. (d) "Commission" means the Securities and Exchange Commission or any successor thereto. (e) "Common Stock" means the Common Stock, par value $.0001 per share, of the Company or any class of common stock into which such common stock may hereafter be converted or for which such common stock may be exchanged pursuant to the Company's certificate of incorporation or as part of a recapitalization, reorganization or similar transaction. (f) "Company" means Security Intelligence Technologies, Inc., a Florida corporation, or any successor corporation. (g) "Eligible Persons" means persons who are natural persons and whose services to the Company are not in connection with the offer or sale of securities in a capital-raising transactions and do not directly or indirectly promote or maintain a market for the Company's securities. (h) "Exchange Act" means the Securities Exchange Act of 1934, as amended from time to time, and any successor thereto. (i) "Non-Qualified Stock Option" means any Stock Option that is not an incentive stock option as defined in Section 422 of the Code. (j) "Plan" means this Security Intelligence Technologies, Inc. 2003 Stock Incentive Plan, as hereinafter amended from time to time. (k) "Stock Grant" means an award of shares of Stock that is subject to restrictions under Section 6 of the Plan. (l) "Stock Option" or "Option" means any option to purchase shares of Common Stock as set forth in Section 5 of the Plan. (m) "Subsidiary" means any corporation or other business association, including a partnership or limited liability company (other than the Company), in an unbroken chain of corporations or other business associations beginning with the Company if each of the corporations or other business associations (other than the last corporation in the unbroken chain) owns equity interests (including stock, partnership interests or membership interests in limited liability companies) possessing 50% or more of the total combined voting power of all classes of equity in one of the other corporations or other business associations in the chain. -54- -------------------------------------------------------------------------------- 2. Administration. The Plan shall be administered by a Committee of not less than two directors of the Company who shall be appointed by the Board and who shall serve at the pleasure of the Board. If, and to the extent that, no Committee exists which has the authority to so administer the Plan, the functions of the Committee specified in the Plan shall be exercised by the Board. 3. Common Stock Subject to Plan. (a) The total number of shares of Common Stock reserved and available for issuance under the Plan shall be six hundred twenty-five thousand (625,000) shares of Common Stock. In the event that Options granted pursuant to said Section 4 shall for any reason terminate or expire unexercised or Stock Grants granted pursuant to Section 6 shall be forfeited, such number of shares of Common Stock shall be available for the registrant pursuant to Stock Options or Stock Grants pursuant to the Plan. (b) In the event of any merger, reorganization, consolidation, recapitalization, stock dividend, stock split, stock distribution, reverse split, combination of shares or other change in corporate structure affecting the Common Stock, such substitution or adjustment shall be made in the aggregate number of shares reserved for issuance under the Plan and the Options, in the number and option price of shares of Common Stock subject to outstanding Options, as may be determined to be appropriate by the Committee, in its reasonable discretion and consistent with generally accepted accounting principles consistently applied, provided that the number of shares subject to any Option shall always be a whole number. 4. Grant of Options. The Committee may grant Non-Qualified Stock Options under the Plan to Eligible Persons. Options granted under the Plan shall be at such exercise price, not less than the par value per share, and shall have such term and shall be exercisable in such installments as the Committee shall, in its sole discretion, determine. 5. Exercise of Options. (a) The Options may be exercised by payment of cash or of shares of Common Stock having a value equal to the exercise price or by the surrender of options to buy shares of Common Stock having a value equal to the exercise price. The exercise price may also be paid as follows: (b) The Committee may at any time offer to buy out for a payment in cash or Common Stock, any Option in whole or in part and without regard to whether the Option is then exercisable on such terms and conditions as the Committee shall establish and communicate to the Option Holder at the time that such offer is made. Nothing in this Paragraph 5(b) shall require any Option Holder to accept such offer. 6. Stock Grants. (a) Administration. Shares of Stock Grant may be issued to Eligible Persons either alone, in addition to or in tandem with other awards granted under the Plan and/or cash awards made outside of the Plan. The Committee shall determine the Eligible Persons to whom, and the time or times at which, Stock Grants will be made, the number of shares to be awarded, the price (if any) to be paid by the recipient of a Stock Grant, subject to Paragraph 6(b) of the Plan, the time or times within which such awards may be subject to forfeiture, and all other terms and conditions of the awards. The Committee may condition the grant of Stock Grant upon the attainment of specified performance goals or such other factors as the Committee may, in its sole discretion, determine. The provisions of Stock Grant awards need not be the same with respect to each recipient. (b) Awards and Certificates. -55- -------------------------------------------------------------------------------- (i) The prospective recipient of a Stock Grant shall have such rights with respect to such award as are determined by the Committee, and, if requested by the Committee, unless and until such recipient has executed an agreement evidencing the award and has delivered a fully executed copy thereof to the Company, and has otherwise complied with the applicable terms and conditions of such award. (ii) The purchase price for shares of Stock Grant may be equal to or less than their par value and may be zero. Stock Grants may be issued to Eligible Persons in consideration for services rendered. (iii) Awards of Stock Grant must be accepted within a period of 60 days (or such shorter period as the Committee may specify at grant) after the award date, by executing a Stock Grant Award Agreement (if required by the Committee) and paying the price, if any, required under Paragraph 6(b)(ii). (iv) Each participant receiving a Stock Grant shall be issued a stock certificate in respect of such shares of Stock Grant. Such certificate shall be registered in the name of such participant, and shall bear an appropriate legend referring to the terms, conditions, and restrictions applicable to such award; provided, however, that if such Stock Grant is not subject to restrictions, the certificate shall only have such legends, if any, as may be required by applicable federal securities laws. (v) If the Stock Grant is subject to restrictions, the Committee shall require that (A) the stock certificates evidencing shares of Stock Grant be held in the custody of the Company until the restrictions thereon shall have lapsed, and (B) as a condition of any Stock Grant award, the participant shall have delivered a stock power, endorsed in blank, relating to the Stock Grant covered by such award. (c) Restrictions and Conditions. The shares of Stock Grant awarded pursuant to this Section 6 may, in the discretion of the Committee, be subject to any one or more of the following restrictions and conditions: (i) Subject to the provisions of the Plan and the award agreement, during a period set by the Committee commencing with the date of such award (the "Restriction Period"), the participant shall not be permitted to sell, transfer, pledge or assign shares of Stock Grant awarded under the Plan. Within these limits, the Committee, in its sole discretion, may provide for the lapse of such restrictions in installments and may accelerate or waive such restrictions in whole or in part, based on service, performance and/or such other factors or criteria as the Committee may determine, in its sole discretion. (ii) Except as provided in this Paragraph 6(c)(ii) and Paragraph 6(c)(i) of the Plan, the participant shall have, with respect to the shares of Stock Grant, all of the rights of a stockholder of the Company, including the right to vote the shares and the right to receive any regular cash dividends paid out of current earnings. The Committee, in its sole discretion, as determined at the time of award, may permit or require the payment of cash dividends to be deferred and, if the Committee so determines, reinvested, subject to Paragraph 6(c)(v) of the Plan, in additional Stock Grant to the extent shares are available under Section 3 of the Plan, or otherwise reinvested. Stock dividends, splits and distributions issued with respect to Stock Grant shall be treated as additional shares of Stock Grant that are subject to the same restrictions and other terms and conditions that apply to the shares with respect to which such dividends are issued, and the Committee may require the participant to deliver an additional stock power covering the shares issuable pursuant to such stock dividend, split or distribution. Any other dividends or property distributed with regard to Stock Grant, other than regular dividends payable and paid out of current earnings, shall be held by the Company subject to the same restrictions as the Stock Grant. (iii) Subject to the applicable provisions of the award agreement and this Section 6, upon termination of a participant's employment with the Company and any Subsidiary or Affiliate for any reason during the Restriction Period, all shares still subject to restriction will vest, or be forfeited, in accordance with the terms and conditions established by the Committee at or after grant. (iv) If and when the Restriction Period expires without a prior forfeiture of the Stock Grant subject to such Restriction Period, certificates for an appropriate number of unrestricted shares, and other property held by the Company with respect to such Restricted Shares, shall be delivered to the participant promptly. (v) The actual or deemed reinvestment of dividends or dividend equivalents in additional Stock Grant at the time of any dividend payment shall only be permissible if sufficient shares of Stock are available under the Plan for such reinvestment (taking into account then outstanding Stock Options, Stock Purchase Rights and other Plan awards). -56- -------------------------------------------------------------------------------- 7. Amendments. Neither this Plan nor the Options or Stock Grants granted pursuant to this Plan may be amended, altered or discontinued as to any Option Holder without the approval of the Option Holder or the holder of the Stock Grant. 8. General Provisions. (a) The Committee may require each person purchasing shares pursuant to an Option to represent to and agree with the Company in writing that the optionee or participant is acquiring the shares without a view to distribution thereof. The certificates for such shares may include any legend which the Committee deems appropriate to reflect any restrictions on transfer. All certificates or shares of Common Stock or other securities delivered under the Plan shall be subject to such stock-transfer orders and other restrictions as the Committee may deem advisable under the rules, regulations, and other requirements of the Commission, any stock exchange upon which the Common Stock is then listed, and any applicable Federal or state securities law, and the Committee may cause a legend or legends to be put on any such certificates to make appropriate reference to such restrictions. (b) Nothing contained in this Plan shall prevent the Board from adopting other or additional compensation arrangements, subject to stockholder approval if such approval is required; and such arrangements may be either generally applicable or applicable only in specific cases. (c) Neither the adoption of the Plan nor the grant of any award pursuant to the Plan shall confer upon any employee of the Company or any Subsidiary or Affiliate any right to continued employment with the Company or a Subsidiary or Affiliate, as the case may be, nor shall it interfere in any way with the right of the Company or a Subsidiary or Affiliate to terminate the employment of any of its employees at any time. (d) No later than the date as of which an amount first becomes includible in the gross income of an Option Holder for Federal income tax purposes with respect to any Option, the Option Holder shall pay to the Company, or make arrangements satisfactory to the Committee regarding the payment of, any Federal, state, or local taxes of any kind required by law to be withheld with respect to such amount. Unless otherwise determined by the Committee, withholding obligations may be settled with Common Stock, including Common Stock that is part of the award that gives rise to the withholding requirement. The obligations of the Company under the Plan shall be conditional on such payment or arrangements and the Company and its Subsidiaries or Affiliates shall, to the extent permitted by law, have the right to deduct any such taxes from any payment of any kind otherwise due to the participant. 9. Effective Date of Plan. The Plan shall be effective as of January 23, 2004 the date the Plan was approved by the Board. -57- -------------------------------------------------------------------------------- Exhibit 10.9 REVOLVING CONVERTIBLE CREDIT AGREEMENT This Revolving Convertible Credit Agreement (this "Agreement") is made and entered into effective as of June 10, 2004 (the "Effective Date") by and between the Lenders set forth in the signature pages hereto each a "Lender" and collectively the "Lenders"), and Security Intelligence Technologies, Inc., a Florida corporation ("Borrower"). RECITALS WHEREAS, the Lenders desire to loan certain sums to Borrower from time to time, and Borrower wishes to borrow certain sums from the Lenders, on and subject to the terms and conditions contained in this Agreement. NOW, THEREFORE, in consideration of the mutual promises, representations, warranties, covenants and conditions set forth in this Agreement and for other good and valuable consideration, the receipt and adequacy of which are hereby acknowledged, the Lenders and Borrower hereby, intending to be legally bound by the terms hereof, agree as follows: 1. Certain Definitions. As used herein: 1.1 The term "Business Day" means any day other than a Saturday, Sunday, or other day on which commercial banks in New York, New York are authorized or required by law to close. 1.2 The term "Credit Period" means that period of time beginning on the Effective Date and ending on September 15, 2004. 1.3 The term "Loan Documents" means, collectively, this Agreement, the Note (as defined below) executed and delivered pursuant hereto, and any other documents executed or delivered by Borrower pursuant to this Agreement or in connection with any Loan. 1.4 The term "Maturity Date" means that date which is the earlier to occur of: (a) June 30, 2005; or (b) the date on which the Lenders or each Lender declares the entire unpaid principal amount and all accrued interest on each outstanding Note immediately due and payable in full under Section 10. 2. Amount and Terms of Credit. 2.1 Commitment to Lend. (a) Subject to the terms and conditions of this Agreement, and in reliance on the representations, warranties and covenants of Borrower set forth in this Agreement, each Lender agrees to make loans of funds to Borrower during the Credit Period on a revolving basis (such loans being collectively hereinafter referred to as "Loans" and each individually as a "Loan"), in an aggregate cumulative total principal amount not to exceed five hundred thousand (US $500,000.00) dollars (the "Commitment") according to such Lender's pro rata part as set forth in the signature pages hereto; provided however; the initial loan shall be in the amount of $200,000 (the "Initial Loan") and unless otherwise agreed to by the Lender each such additional Loan shall be in an amount not less than $150,000.00 (the "Base Rate Borrowing"). In the event the difference between the Commitment and the outstanding Loans is less than the Base Rate Borrowing, then the amount to be borrowed shall be the difference between the Commitment and Base Rate Borrowing. Notwithstanding the foregoing, on any date of determination, the aggregate amount of the Loans shall never exceed the Commitment and Borrower may not draw down more than once in any thirty (30) day period. (b) Notwithstanding the foregoing, no Lender will be obligated to make a Loan to Borrower: (i) unless and until Borrower executes and delivers to such Lender a Note (as defined in Section 2.2) for the principal amount of such Loan; -58- -------------------------------------------------------------------------------- (ii) after the Credit Period; (iii) unless and until all relevant terms and conditions of this Agreement, including but not limited to the conditions precedent and other provisions of Sections 6 (with respect to All Loans), 7 (with respect to the Second Tranche of the Loan), and 8 (with respect to the Third and Fourth Tranche of the Loan) have been satisfied in full; and (iv) unless and until Borrower first gives the Lender written notice of Borrower's request for a Loan hereunder that sets forth (x) the principal amount to be borrowed by Borrower under such requested Loan, and (y) that the Borrower has met the condition precedent to such Loan together with evidence of such condition being met (a "Loan Notice"), and (z) the date on which such Loan is requested to be advanced, which date shall not be sooner than five (5) Business Days following Lenders' receipt of such Loan Notice. 2.2 Note. Borrower's indebtedness to Lender under each Loan advanced by Lender under this Agreement will be evidenced by a separate Promissory Note of Borrower in the form attached hereto as Exhibit "A" (the "Note"). The Note will provide that interest on unpaid principal will accrue at a rate equal to 10% per annum (calculated on the basis of a 365/66-day year) compounded annually (but in no event higher than the highest lawful rates). 2.3 Maturity. Unless payment thereof is accelerated or otherwise becomes due earlier under the terms of this Agreement (including but not limited to the provisions of Section 10) or the terms of a Note the unpaid principal amount of all Loans and all unpaid interest accrued thereon, together with any other fees, expenses or costs incurred in connection therewith, will be immediately due and payable to Lender in full on the Maturity Date. 2.4 Prepayment. Subject to the Conversion rights set forth in Section 4 hereto, Borrower may at any time and from time to time on any Business Day prepay any Loan in whole or in part in increments of U.S. $10,000.00 on at least five (5) Business Day's prior written notice, or telephonic notice promptly confirmed in writing, received by Lender no later than 10:00 a.m., Eastern Standard Time. Each prepayment will be applied as follows: (a) first, to the payment of interest accrued on all Loans outstanding, and (b) second, to the extent that the amount of such prepayment exceeds the amount of all such accrued interest, to the payment of principal on such Loan or Loans as Borrower may designate. 3. Closing Date; Delivery. 3.1 Closing Date. The closing of the initial Loan (the "Closing") will be held by mail and/or telecopy on the Effective Date (the "Closing Date"), or at such other time and place as Borrower and Lender may mutually agree. 3.2 Delivery. At the Closing, Borrower will execute and deliver to Lender the Note, duly executed by Borrower. 4. Representations and Warranties of Borrower. Borrower hereby represents and warrants to Lender that: 4.1 Organization and Standing; Charter Documents. Borrower is a corporation duly organized, validly existing and in good standing under the laws of the State of Florida, and has all requisite corporate power and authority to own, lease and operate its properties and to conduct its business as such is presently conducted and as proposed to be conducted. Borrower is duly qualified to do business as a foreign corporation in good standing in any state or jurisdiction in the United States in which it is required to be qualified to do intrastate business as the Company's business is currently conducted, except for jurisdictions in which failure to so qualify could not reasonably be expected to have a material adverse effect on the business and operations of the Company taken as a whole. True and accurate copies of the Certificate of Incorporation (the "Charter") and Bylaws of Borrower, each as amended and currently in effect, have been delivered to Lender and Lender's counsel. -59- -------------------------------------------------------------------------------- 4.2 Authorization. All corporate action on the part of Borrower and its officers, directors and stockholders that is necessary for the authorization, execution, delivery and performance of each of the Loan Documents by Borrower has been taken; and each of the Loan Documents, when executed and delivered by Borrower, will constitute valid and legally binding obligations of Borrower, enforceable in accordance with their terms. 5. Conversion. 5.1 Conversion Procedure. (a) Lender may elect at anytime by prior written notice to the Company (a "Conversion Notice"), including after receipt of notice of prepayment by the Borrower as set forth in Section 2.4 above, to have all or a portion of the unpaid principal amount of the Loan, together with all accrued and unpaid interest thereon converted into a number of shares of the Conversion Stock (as hereinafter defined) determined by dividing the outstanding principal amount of the Loan plus all accrued and unpaid interest, by the Conversion Price (as hereinafter defined) then in effect (the date of any such conversion, a "Conversion Date"). (b) Except as otherwise expressly provided herein, the conversion of the Loan shall be deemed to have been effected as of the close of business on the Conversion Date. At such time as such conversion has been effected, the rights of the Lender shall cease to the extent of the conversion hereof, and the "Person" or "Persons" (which shall include any natural person, firm, partnership, association, corporation, limited liability company or trust) in whose name or names any certificate or certificates for shares of Conversion Stock are to be issued upon such conversion shall be deemed to have become the holder or holders of record of the shares of Conversion Stock represented thereby. (c) As soon as possible after a conversion has been effected (but in any event within five (5) Business Days), the Company shall deliver to the Lender or the converting holder ("Holder") a certificate or certificates representing the number of shares of Conversion Stock issuable by reason of such conversion in such name or names and such denomination or denominations as the converting Holder has specified. (d) The issuance of certificates for shares of Conversion Stock upon conversion of the Loan shall be made without charge to the Holder hereof for any issuance tax in respect thereof or other cost incurred by the Company in connection with such conversion and the related issuance of shares of Conversion Stock. Upon conversion of the Loan, the Company shall take all such actions as are necessary in order to insure that the Conversion Stock issuable with respect to such conversion shall be validly issued, fully paid and non assessable. (e) The Company shall not close its books against the transfer of Conversion Stock issued or issuable upon conversion of the Loan in any manner which interferes with the timely conversion of the Loan. The Company shall assist and cooperate with any Holder required to make any governmental filings or obtain any governmental approval prior to or in connection with the conversion of the Loan (including, without limitation, making any filings required to be made by the Company). (f) Except as otherwise expressly agreed in writing between the Holder and the Company, upon a conversion of the Loan, the Loan shall be converted into Conversion Stock. (g) When issued, the Conversion Stock are, or will be (i) duly and validly authorized, (ii) fully issued, paid and nonassessable, and (iii) free and clear of any security interests, liens, claims, or other encumbrances, subject to restrictions upon transfer under the Securities Act of 1993, as amended. 5.2 Conversion Price. Subject to Reclassification, Merger, Sale of Assets and Stock Splits, Combinations and Dividends set forth in Section 5.4 below, the Conversion Price shall be $.10 per share; provided however, upon an Event of Default, the Conversion Price shall be reduced to $.05 per share. 5.3 Conversion Stock. For purposes hereof, "Conversion Stock" means the common stock of the Company. 5.4 The Conversion Price above and number and kind of shares or other securities to be issued upon conversion determined pursuant to Section 5, shall be subject to the adjustment from time to time upon the happening of certain events while this conversion right remains outstanding, as follows: -60- -------------------------------------------------------------------------------- (a) Merger, Sale of Assets, etc. If the borrower at any time shall consolidate with or merge into or sell or convey all or substantially all its assets to any other corporation, this Note, as to the unpaid principle portion thereof and accrued interest thereon, shall thereafter be deemed to evidence the right to purchase such number and kind of shares or other securities or property that would have been issuable or distribute on account of such consolidation, merger, sale or conveyance, upon or with respect to the securities subject to the conversion or purchase right immediately prior to such consolidation, merger, sale or conveyance. The foregoing provision shall similarly apply to successive transactions of a similar nature by any such successor or purchaser. (b) Reclassification, etc. If the borrower at any time shall, by reclassification or otherwise, change the common stock into the same or a different number of securities of any class or classes, this Note, as to the unpaid principal portion thereof and accrued interest thereon, shall thereafter be deemed to evidence the right to purchase such number and kind of securities as would have been issuable as the result of such change with the respect to the common stock immediately prior to such reclassification or other change. (c) Stock Splits Combinations and Dividends. If the shares of common stock are subdivided or combined into a greater or smaller number of shares of common stock, or if a dividend is paid on the common stock in shares of common stock, the Conversion Price, as amended shall be proportionately reduced in case of subdivision of shares or stock dividend or proportionately increased in case of combination of shares, in each such case by the ratio which the total number of shares of common stock outstanding immediately prior to such event. 5.5 Maximum Conversion Amount. The Lender shall not be entitled to convert on a Conversion Date that amount of the Note in connection with that number of shares of Common Stock which would be in excess of the some of (i) the number of shares of Common Stock beneficially owned by the Lender and its affiliates on a Conversion Date, and (ii) the number of shares of Common Stock issuable upon the conversion of the Note with respect to which the determination of this proviso is being made on a Conversion Date, which would result in beneficial ownership by the Lender and is affiliates of more than 9.99% of the outstanding shares of Common Stock of the Company on such Conversion Date. For the purposes of the proviso for the immediately proceeding sentence, beneficial ownership shall be determined in accordance with Section 13 (d) of the Securities Exchange Act of 1934, as amended, and Regulation 13d-3 thereunder. Subject to the foregoing, the Lender shall not be limited to aggregate conversions of only 9.99%. The Lender may void the conversion limitation described in this section 5.5 upon 75 days prior notice to the Company. The Lender may allocate which of the equity of the Company deemed beneficially owned by the subscriber shall be included in the 9.99% amount described above and which shall be allocated to the excess above 9.99%. 6. Conditions Precedent to Initial and All Loans. The obligation of Lender to make each Loan will be subject to the satisfaction of all the following additional conditions precedent: 6.1 No Event of Default. No event will have occurred and be continuing, and no event would result from the making of such Loan, that would constitute an Event of Default as defined herein. 6.2 Note. Lender will have received the Note representing such Loan, executed by a duly authorized officer of Borrower. 6.3 Representations True. All representations and warranties of Borrower contained in this Agreement or in any other Loan Documents will be true, correct and complete in all respects with the same effect as though such representations and warranties had been made on and as of the date such Loan is actually advanced (except to the extent such representations and warranties specifically relate to an earlier date, in which case they will be true, accurate and complete in all material respects as of such earlier date). 6.4 All Agreements Performed. All agreements, obligations, conditions and covenants set forth in this Agreement and all other Loan Documents to be performed by Borrower through the date such Loan is advanced will have been duly performed and complied with in all respects. -61- -------------------------------------------------------------------------------- 6.5 No Sale Transaction. No Sale Transaction shall have occurred. A "Sale Transaction" shall be deemed to have occurred upon the happening of any of the following events: (i) a merger or consolidation of the Borrower with or into another issuer; or (ii) the exchange or sale of all or a portion of the outstanding shares of the Borrower for securities of another issuer, or other consideration provided by such issuer or another party to such transaction; and in the case of either (i) or (ii), the Borrower's shareholders prior to the transaction, do not possess, immediately after such transaction, more than 50% of the voting power of the securities issued and outstanding of any one or more of the following: (x) the Borrower; (y) such other issuer; or (z) such other constituent party to the transaction; or a sale (other than in the ordinary course of business) of more than 90% of the Borrower's assets to a third party not an affiliate of the Borrower immediately prior to such transaction. 6.6 As of the Closing Date, the Borrower is a fully reporting company with the class of securities registered pursuant to Section 12 (g) of the Securities and Exchange Act of 1934. 6.7 No material adverse change in the Borrower's business or business prospects shall have occurred after the date of the most recent financial statements. 6.8 The Borrower's Common Stock is listed on, and the Borrower's compliance with the listing requirements of the OTC Bulletin Board, Nasdaq SmallCap Market, American Stock Exchange, new York Stock Exchange or NASDAQ National Market System (any of the foregoing the "Principal Market"). 6.9 The Borrower has not received notice from Principal Market that the Borrower is not in compliance with the requirements for continued listing, which notice has not been resolved in a manner affirming the Borrower's compliance with such requirements. 7. Conditions Precedent to Additional Loans. In addition to the conditions precedent set forth in Section 6 above, Lender shall only be obligated to lend Borrower more than one tranche under this Agreement (in addition to the initial Loan), if Borrower meets one of the following benchmarks: (i) Bona fide purchase order by the Saudi Arabian Licensee, as set forth in the License Agreement dated ___, 2004 with respect to the Saudi Arabian Territory to buy a minimum of 5 armored cars with VIP jamming equipment; or (ii) Bona Fide purchase order by a United States federal, state or local court, administrative agency or commission or other governmental authority or instrumentality (a "US Governmental Entity") for the purchase of a minimum of 3 VIP Bomb jammers; or (iii) Bona Fide purchase order by a US Governmental Entity in excess of $250,000; or (iv) Bona Fide purchase order by a foreign federal, state or local court, administrative agency or commission or other governmental authority or instrumentality (a "Foreign Governmental Entity") or a middleman representing a Foreign Government Entity in excess of $300,000; or (v) Bona Fide purchase order by a third-party non-affiliated Licensee or distributor in excess of $500,000; or (vi) Reduction in debt of in the minimum amount of $500,000 (the "Debt Reduction Amount"); provided however, in the event any issuance of common stock at greater than a 50% discount to market shall not be counted towards the Debt Reduction Amount. Notwithstanding the foregoing, in the event the Borrower wishes to borrow more than two tranches under this Credit Agreement, the Borrower must meet more than one of the foregoing benchmarks during the Credit Period. -62- -------------------------------------------------------------------------------- 8. Representations and Warranties of the Lenders. Each Lender, severally and not jointly, represents and warrants to Company as of the Closing Date (or additional Closing Date, as applicable) as follows: (a) Investment Intent: Authority. This Agreement is made with Lender in reliance upon Lender's representation to Company, evidenced by Lender's execution of this Agreement, that Lender is entering into this Agreement for investment for Lender's own account, not as nominee or agent, for investment and not with a view to, or for resale in connection with, any distribution or public offering thereof within the meaning of the 1933 Act; provided, however, that by making the representations herein, Lender does not agree to hold any of the Conversion Stock for any minimum or other specific term and reserves the right to dispose of the Conversion Stock, at any time in accordance with or pursuant to a registration statement or an exemption under the 1933 Act. Lender has the requisite right, power, authority and capacity to enter into and perform this Agreement and the Agreement will constitute a valid and binding obligation upon Lender, except as the same may be limited by bankruptcy, insolvency, moratorium, and other laws of general application affecting the enforcement of creditors' rights. (b) Knowledge and Experience. Lender (i) has such knowledge and experience in financial and business matters as to be capable of evaluating the merits and risks of Lender's entire prospective investment in the Company; (ii) has the ability to bear the economic risks of Lender's prospective investment; (iii) has had all questions which have been asked by Lender satisfactorily answered by Company; and (iv) has not been offered the investment opportunity by any form of advertisement, article, notice or other communication published in any newspaper, magazine, or similar media or broadcast over television or radio, or any seminar or meeting whose attendees have been invited by any such media. Lender represents and warrants that it is an "accredited investor" within the meaning of Rule 501 of Regulation D of the Securities Act. 9. Other Covenants of Borrower. Borrower hereby covenants and agrees with Lender as follows. 9.1 Financial and Other Information and Inspection. During the Credit Period, Borrower will provide to Lender all the reports and rights described below in this Section 9.1: (a) Annual Financial Information. As soon as practicable after the end of each fiscal year of Borrower, but no later than one hundred twenty (120) days thereafter, an audited consolidated balance sheet of Borrower and its subsidiaries as at the end of such fiscal year, and consolidated statements of income and cash flows of Borrower and its subsidiaries for such year, prepared in accordance with generally accepted accounting principles and setting forth in each case in comparative form the financial statements for the previous fiscal year, all in reasonable detail and audited and certified by independent public accountants acceptable to Lender. (b) Quarterly Financial Information. As soon as practicable after the end of each fiscal quarter of Borrower, and in any event within forty-five (45) days thereafter, an unaudited consolidated balance sheet of Borrower and its subsidiaries as at the end of such quarter and consolidated statements of income and cash flows of Borrower and its subsidiaries for each such quarter and for the fiscal year to date, prepared in accordance with generally accepted accounting principles, all in reasonable detail. (c) Inspection Rights. The right to visit and inspect any of the properties of Borrower or any of its subsidiaries, and to discuss its and their affairs and finances with its and their officers, all at such reasonable times and as often as may reasonably be requested by Lender. (d) Other Information. With reasonable promptness, such other information and data, including, without limitation, lists of property and accounts, budgets, agreements with insurers, forecasts, tax returns and reports, with respect to Borrower and its subsidiaries as may from time to time may be reasonably requested by Lender, and all such other information and communications (including, without limitation, notices of meetings of Borrower's shareholders) as Borrower will have supplied to its holders of any shares of its capital stock. 9.2 Further Assurances. In addition to the obligations and documents which this Agreement expressly requires Borrower to execute, deliver and perform, Borrower will execute, deliver and perform, and will cause its subsidiaries to execute, deliver and perform, any and all further acts or documents which Lender may reasonably require in order to carry out the purposes of this Agreement or any of the other Loan Documents. -63- -------------------------------------------------------------------------------- 10. Events of Default of Borrower. 10.1 The occurrence of any of the following events will constitute an "Event of Default ": (a) Borrower fails to pay any principal or any accrued interest under any Note or any Loan when the same is due and payable, or fails to pay any amount of principal or accrued interest due under any Note or any Loan on the Maturity Date therefor, and such failure to pay is not cured by Borrower within five (5) calendar days after Lender gives written notice of such failure to pay to Borrower; (b) any material representation or warranty made by or on behalf of Borrower in this Agreement or in any other Loan Document, or any statement or certificate that Borrower may at any time give in writing pursuant thereto or in connection therewith is false, misleading or incomplete in any material respect when made (or deemed to have been made); (c) Borrower fails or neglects to perform, keep or observe any covenant set forth in this Agreement or in any of the other Loan Documents, and the same has not been cured within ten (10) calendar days after Borrower becomes aware thereof; (d) Borrower or any of its subsidiaries becomes insolvent, or makes an assignment for the benefit of creditors, or applies for or consents to the appointment of a receiver, liquidator, custodian or trustee for it or for a substantial part of its property or business, or such a receiver, liquidator, custodian or trustee otherwise is appointed and is not discharged within thirty (30) calendar days after such appointment; or (e) bankruptcy, insolvency, reorganization or liquidation proceedings or other proceedings for relief under any bankruptcy law or any law for the relief of debtors are instituted by or against Borrower or any of its subsidiaries, or any order, judgment or decree is entered against Borrower or any such subsidiary decreeing its dissolution or liquidation; provided, however, with respect to an involuntary petition in bankruptcy, such petition is not have been dismissed within thirty (30) days after the filing of such petition. 10.2 Remedies of Lender. Upon and after the occurrence of any Event of Default or Sale Transaction, Lender will have no further obligation to make any Loan or Loans to Borrower, and in addition, at Lender's sole option by written notice to Borrower, Lender take any one or more of the following actions: (a) Lender may immediately terminate the Commitment and all liabilities and obligations of Lender under this Agreement, without affecting Lender's rights under this Agreement and the Note(s); (b) Lender may declare the entire principal amount of and all accrued interest on the Note(s) and all Loans to immediately be due and payable in full, whereupon such amounts will immediately become due and payable in full, provided that in the case of an Event of Default listed in paragraph (d) or (e) of Section 10.1, the principal and interest will immediately become due and payable without the requirement of any notice or other action by Lender; and (c) Exercise all rights and remedies granted under the Loan Documents or otherwise available to Lender at law or in equity. 11. Registration Rights. The Company has agreed to provide the Lenders with certain registration rights as set forth in the attached Registration Rights Agreement executed concurrent herewith and made a part hereof. 12. Miscellaneous. 12.1 Survival. The representations and warranties of Borrower contained in or made pursuant to this Agreement and all the other Loan Documents will survive the execution and delivery of the Loan Documents. -64- -------------------------------------------------------------------------------- 12.2 Entire Agreement. This Agreement, the Note, and the exhibits and schedules attached hereto constitute the entire agreement and understanding among the parties with respect to the subject matter thereof and supersede any prior understandings or agreements of the parties with respect to such subject matter. 12.3 Successors and Assigns. The terms and conditions of this Agreement will inure to the benefit of and be binding upon the respective successors and assigns of the parties; provided, however, that neither party may assign or delegate any of its rights or obligations hereunder or under any other Loan Document or any interest herein or therein without the other party's prior written consent. 12.4 No Third Party Beneficiaries; Construction. Nothing in this Agreement, express or implied, is intended to confer upon any third party any rights, remedies, obligations, or liabilities under or by reason of this Agreement, except as expressly provided in this Agreement. This Agreement and its exhibits are the result of negotiations between the parties and has been reviewed by each party hereto; accordingly, this Agreement will be deemed to be the product of the parties hereto, and no ambiguity will be construed in favor of or against any party. 12.5 Governing Law. This Agreement will be governed by and construed in accordance with the internal laws of the State of New York as applied to agreements entered into solely between residents of, and to be performed entirely in, such State, without reference to that body of law relating to conflicts of law or choice of law. 12.6 Counterparts. This Agreement may be executed in two or more counterparts, each of which will be deemed in original, but all of which together will constitute one and the same instrument. 12.7 Notices. Any notice required or permitted under this Agreement will be given in writing and will be deemed effectively given upon personal delivery; upon confirmed transmission by telecopy or telex; or three (3) days following deposit with the United States Post Office, by certified or registered mail, postage prepaid, addressed: To Borrower: Security Intelligence Technologies, Inc. 145 Hugenot Street New Rochelle, New York 10801 Fax: 914-654-1302 Attention: Chief Executive Officer To Lender: To The Address Set Forth In The Signature Pages Hereto or at such other address as such party may specify by written notice given in accordance with this Section. 12.8 Modification; Waiver. This Agreement may be modified or amended only by a writing signed by both parties hereto. No waiver or consent with respect to this Agreement will be binding unless it is set forth in writing and signed by the party against whom such waiver is asserted. No course of dealing between Borrower and Lender will operate as a waiver or modification of any party's rights under this Agreement or any other Loan Document. No delay or failure on the part of either party in exercising any right or remedy under this Agreement or any other Loan Document will operate as a waiver of such right or any other right. A waiver given on one occasion will not be construed as a bar to, or as a waiver of, any right or remedy on any future occasion. 12.9 Rights and Remedies Cumulative. The rights and remedies of Lender herein provided will be cumulative and not exclusive of any other rights or remedies provided by law or otherwise. 12.10 Severability. Any invalidity, illegality or unenforceability of any provision of this Agreement in any jurisdiction will not invalidate or render illegal or unenforceable the remaining provisions hereof in such jurisdiction and will not invalidate or render illegal or unenforceable such provision in any other jurisdiction. -65- -------------------------------------------------------------------------------- 12.11 Attorneys' Fees. If any party hereto commences or maintains any action at law or in equity (including counterclaims or cross-complaints) against the other party hereto by reason of the breach or claimed breach of any term or provision of this Agreement or any other Loan Document, then the prevailing party in said action will be entitled to recover its reasonable attorney's fees and court costs incurred therein. 12.12 Investment Banking Fees. It is hereby agreed that Atlas Capital Services, LLC has acted as an Investment Banker with respect to the Credit Agreement and shall receive a commission equal to: (i) 10% in cash of whatever funds are loaned to the Company under this Credit Agreement, and (ii) 10% of whatever funds are loaned to the Company under this Credit Agreement in the form of warrants to purchase common stock of the Company at the exercise price of $.10 per share. The warrants shall contain terms and conditions customary in a warrant of this kind and shall have piggy-back registration rights with the registration of the Conversion Stock. The cash portion of the fee shall be paid directly from the Lenders to Atlas. -66- -------------------------------------------------------------------------------- IN WITNESS WHEREOF, the parties have duly executed and delivered this Agreement as of the Effective Date. ================================================================================ BORROWER LENDERS By: /s/ Ben Jamil GSM Communications, Inc. ------------------------------ Name: Ben Jamil Title: Chief Executive Officer By: /s/ Leovigildo Lopez ----------------------------------------- Name: Leovigildo Lopez Title: President Address: 1221 Brickell Avenue, Suite 900 Miami, Florida 33131 Fax No. (305) -------------- Amount: $65,000 Kesef Equity Group, Inc By: /s/ Victor Salimeo ----------------------------------------- Name: Victor Salimeo Title: President Address: 14 Lyle Farm Lane Englishtown, NJ 07726 Fax No. Amount: $175,000 Ostonian Securities Limited By: /s/ Jose Masis ----------------------------------------- Name: Jose Masis Title: President Address: 60 St. James Street, 1st Floor London, England SW1 ALE Fax No. Amount: $125,000 -------------------------------------------------------------------------------- -67- -------------------------------------------------------------------------------- IN WITNESS WHEREOF, the parties have duly executed and delivered this Agreement as of the Effective Date. =========================================================================================== BORROWER LENDERS By: /s/ Ben Jamil Robert A. Schechter ------------------------------ Name: Ben Jamil Title: Chief Executive Officer By: /s/ Robert A Schechter --------------------------------------------------- Name: Robert A. Schechter Address: c/o The Atlas Group of Companies, LLC 135 East 57th Street, 26th Floor New York , New York 10022 Fax No. (212) 716-1501 Amount: $30,000 Shimon S. Fishman By: /s/ Shimon Fishman ---------------------------------------------------- Name: Shimon S. Fishman Address: c/o The Atlas Group of Companies, LLC 135 East 57th Street, 26th Floor New York , New York 10022 Fax No. (212) 716-1501 Amount: $30,000 Steven Pollan By: /s/ Steven Pollan ---------------------------------------------------- Name: Steven Pollan Address: c/o Atlas Capital Services, LLC 135 East 57th Street, 26th Floor New York , New York 10022 Fax No. (212) 267-3501 Amount: $20,000 Atlas Equity Group, Inc. By /s/ Michael D. Farkas ---------------------------------------------------- Name: Michael D. Farkas Title: President Address: 1691 Michigan Avenue, Suite 425 Miami, Florida 33139 Fax No. (305) 539-0901 Amount: $55,000 =========================================================================================== THE SECURITIES REPRESENTED HEREBY HAVE NOT BEEN REGISTERED UNDER THE SECURITIES ACT OF 1933, AS AMENDED (THE "ACT"), OR UNDER THE SECURITIES LAWS OF CERTAIN STATES. THESE SECURITIES ARE SUBJECT TO RESTRICTIONS ON TRANSFERABILITY AND RESALE AND MAY NOT BE TRANSFERRED OR RESOLD EXCEPT AS PERMITTED UNDER THE ACT AND APPLICABLE STATE SECURITIES LAWS, PURSUANT TO REGISTRATION OR EXEMPTION THEREFROM. INVESTORS SHOULD BE AWARE THAT THEY MAY BE REQUIRED TO BEAR THE FINANCIAL RISKS OF THIS INVESTMENT FOR AN INDEFINITE PERIOD OF TIME. THE ISSUER OF THESE SECURITIES MAY REQUIRE AN OPINION OF COUNSEL IN FORM AND SUBSTANCE SATISFACTORY TO THE ISSUER TO THE EFFECT THAT ANY PROPOSED TRANSFER OR RESALE IS IN COMPLIANCE WITH THE ACT AND ANY APPLICABLE STATE SECURITIES LAWS. -68- -------------------------------------------------------------------------------- REVOLVING CONVERTIBLE PROMISSORY NOTE This Revolving Convertible Promissory Note (this "Note") is made and delivered pursuant to that certain Revolving Convertible Credit Agreement dated as of June 10, 2004 between Borrower and Lender (as such terms are defined below), as such may be amended from time to time (the "Credit Agreement"). Unless otherwise defined herein, all capitalized terms used in this Note shall have the same meanings that are given to such terms in the Credit Agreement, the terms of which are incorporated into this Note by reference. 1. Obligation. FOR VALUE RECEIVED, the undersigned, Security Intelligence Technologies, Inc., a Florida corporation ("Borrower") hereby promises to pay to the order of Robert A. Schechter, a resident of the State of New York, ("Lender" or "Holder") on or before June 30, 2005 (the "Maturity Date"), at Lender's principal place of business at c/o The Atlas Group of Companies, LLC 135 East 57th Street, 26th Floor, New York, New York 10022, or at such other place as Holder may direct, the principal sum of Thirty Thousand ($30,000.00) Dollars or so much thereof as may be advanced and outstanding, together with all interest accrued on unpaid principal, to be computed on each advance of a Loan from the date of its disbursement to Borrower, at a rate equal to 10% per annum (calculated on the basis of a 365/66-day year), compounded annually . As used herein, the term "Holder" shall initially mean Lender, and shall subsequently mean each person or entity to whom this Note is duly assigned. The outstanding unpaid principal balance of this Note at any time shall be the total principal amounts advanced hereunder by Holder less the amounts of payments of principal made hereon by Borrower, which balance may be endorsed hereon from time to time by Holder in accordance with Section 2. Payments of interest on this Note shall be payable on a quarterly basis, on the last business day of each calendar quarter. 2. Recording of Loans and Payments. Holder is authorized to record on Schedule A hereto, and on any continuation(s) of such Schedule that may be attached to this Note: (a) the date and principal amount of each Loan advanced by Lender under the Credit Agreement; and (b) the date and amount of each payment or prepayment of principal and/or accrued interest of any Loan; which recordation will constitute prima facie evidence of the accuracy of the information so endorsed on Schedule A; provided however, that any failure to record such information on such Schedule or continuation thereof will not in any manner affect the obligations of Borrower to make payments of principal and interest in accordance with the terms of this Note. Holder will promptly provide Borrower with a copy of each recordation made by Holder on Schedule A attached hereto. 3. Prepayment. Subject to the Conversion Rights set forth in Section 5 of the Credit Agreement, prepayment of unpaid principal and/or interest due under this Note may be made at any time without penalty as specified in the Credit Agreement. Unless otherwise agreed in writing by Holder, all payments will be made in lawful tender of the United States and will be applied (a) first, to the payment of accrued interest, and (b) second, (to the extent that the amount of such prepayment exceeds the amount of all such accrued interest), to the payment of principal. 4. Conversion of Debt. Holder has the right to convert this Note in accordance with the Conversion Procedures set forth in the Credit Agreement. 5. Default; Acceleration of Obligation. Borrower will be deemed to be in default under this Note and the outstanding unpaid principal balance of this Note, together with all interest accrued thereon, will immediately become due and payable in full, without the need for any further action on the part of Holder, upon the occurrence of any Event of Default (as defined in the Credit Agreement). -69- -------------------------------------------------------------------------------- 6. Remedies on Default; Acceleration. Upon any Event of Default, Holder will have, in addition to its rights and remedies under this Note and the Credit Agreement, full recourse against any real, personal, tangible or intangible assets of Borrower, and may pursue any legal or equitable remedies that are available to Holder, and may declare the entire unpaid principal amount of this Note and all unpaid accrued interest under this Note to be immediately due and payable in full. 7. Waiver and Amendment. Any provision of this Note may be amended or modified only by a writing signed by both Borrower and Holder. Except as provided below with respect to waivers by Borrower, no waiver or consent with respect to this Note will be binding or effective unless it is set forth in writing and signed by the party against whom such waiver is asserted. No course of dealing between Borrower and Holder will operate as a waiver or modification of any party's rights or obligations under this Note. No delay or failure on the part of either party in exercising any right or remedy under this Note will operate as a waiver of such right or any other right. A waiver given on one occasion will not be construed as a bar to, or as a waiver of, any right or remedy on any future occasion. 8. Waivers of Borrower. Borrower hereby waives presentment, notice of non-payment, notice of dishonor, protest, demand and diligence. This Note may be amended only by a writing executed by Borrower and Holder. 9. Governing Law. This Note will be governed by and construed in accordance with the internal laws of the State of New York as applied to agreements between residents thereof to be performed entirely within such State, without reference to that body of law relating to conflict of laws or choice of law. 10. Severability; Headings. The invalidity or unenforceability of any term or provision of this Note will not affect the validity or enforceability of any other term or provision hereof. The headings in this Note are for convenience of reference only and will not alter or otherwise affect the meaning of this Note. 11. Jurisdiction; Venue. Borrower, by its execution of this Note, hereby irrevocably submits to the in personam jurisdiction of the state courts of the State of New York and of the United States District Court for the Southern District of New York that are located in New York, New York, for the purpose of any suit, action or other proceeding arising out of or based upon this Note. 12. Attorneys' Fees. If suit is brought for collection of this Note, Borrower agrees to pay all reasonable expenses, including attorneys' fees, incurred by Holder in connection therewith whether or not such suit is prosecuted to judgment. 13. Assignment. This Note is not assignable by Holder without the written consent of Borrower. This Note may not be assigned or delegated by Borrower, whether by voluntary assignment or transfer, operation of law, merger or otherwise. -70- -------------------------------------------------------------------------------- 14. Credit Agreement. This Note incorporates by reference all the provisions of the Credit Agreement, including but not limited to all provisions contained therein with respect to Events of Default, waivers, remedies and covenants, Conversion Rights, and the description of the benefits, rights and obligations of each of Borrower and Holder under the Credit Agreement. IN WITNESS WHEREOF, Borrower has executed this Note as of the date and year first above written. BORROWER SECURITY INTELLIGENCE TECHNOLOGIES, INC. By: /s/ Ben Jamil ---------------------------------------- Name: Ben Jamil Title: Chief Executive Officer -71- -------------------------------------------------------------------------------- SCHEDULE A TO REVOLVING PROMISSORY NOTE RECORD OF LOANS AND REPAYMENT OF LOANS 1. -72- -------------------------------------------------------------------------------- THE SECURITIES REPRESENTED HEREBY HAVE NOT BEEN REGISTERED UNDER THE SECURITIES ACT OF 1933, AS AMENDED (THE "ACT"), OR UNDER THE SECURITIES LAWS OF CERTAIN STATES. THESE SECURITIES ARE SUBJECT TO RESTRICTIONS ON TRANSFERABILITY AND RESALE AND MAY NOT BE TRANSFERRED OR RESOLD EXCEPT AS PERMITTED UNDER THE ACT AND APPLICABLE STATE SECURITIES LAWS, PURSUANT TO REGISTRATION OR EXEMPTION THEREFROM. INVESTORS SHOULD BE AWARE THAT THEY MAY BE REQUIRED TO BEAR THE FINANCIAL RISKS OF THIS INVESTMENT FOR AN INDEFINITE PERIOD OF TIME. THE ISSUER OF THESE SECURITIES MAY REQUIRE AN OPINION OF COUNSEL IN FORM AND SUBSTANCE SATISFACTORY TO THE ISSUER TO THE EFFECT THAT ANY PROPOSED TRANSFER OR RESALE IS IN COMPLIANCE WITH THE ACT AND ANY APPLICABLE STATE SECURITIES LAWS. REVOLVING CONVERTIBLE PROMISSORY NOTE This Revolving Convertible Promissory Note (this "Note") is made and delivered pursuant to that certain Revolving Convertible Credit Agreement dated as of June 10, 2004 between Borrower and Lender (as such terms are defined below), as such may be amended from time to time (the "Credit Agreement"). Unless otherwise defined herein, all capitalized terms used in this Note shall have the same meanings that are given to such terms in the Credit Agreement, the terms of which are incorporated into this Note by reference. 1. Obligation. FOR VALUE RECEIVED, the undersigned, Security Intelligence Technologies, Inc., a Florida corporation ("Borrower") hereby promises to pay to the order of Shimon S. Fishman, a resident of the State of New York, ("Lender" or "Holder") on or before June 30, 2005 (the "Maturity Date"), at Lender's principal place of business at c/o The Atlas Group of Companies, LLC 135 East 57th Street, 26th Floor, New York, New York 10022, or at such other place as Holder may direct, the principal sum of Thirty Thousand ($30,000.00) Dollars or so much thereof as may be advanced and outstanding, together with all interest accrued on unpaid principal, to be computed on each advance of a Loan from the date of its disbursement to Borrower, at a rate equal to 10% per annum (calculated on the basis of a 365/66-day year), compounded annually . As used herein, the term "Holder" shall initially mean Lender, and shall subsequently mean each person or entity to whom this Note is duly assigned. The outstanding unpaid principal balance of this Note at any time shall be the total principal amounts advanced hereunder by Holder less the amounts of payments of principal made hereon by Borrower, which balance may be endorsed hereon from time to time by Holder in accordance with Section 2. Payments of interest on this Note shall be payable on a quarterly basis, on the last business day of each calendar quarter. 2. Recording of Loans and Payments. Holder is authorized to record on Schedule A hereto, and on any continuation(s) of such Schedule that may be attached to this Note: (a) the date and principal amount of each Loan advanced by Lender under the Credit Agreement; and (b) the date and amount of each payment or prepayment of principal and/or accrued interest of any Loan; which recordation will constitute prima facie evidence of the accuracy of the information so endorsed on Schedule A; provided however, that any failure to record such information on such Schedule or continuation thereof will not in any manner affect the obligations of Borrower to make payments of principal and interest in accordance with the terms of this Note. Holder will promptly provide Borrower with a copy of each recordation made by Holder on Schedule A attached hereto. 3. Prepayment. Subject to the Conversion Rights set forth in Section 5 of the Credit Agreement, prepayment of unpaid principal and/or interest due under this Note may be made at any time without penalty as specified in the Credit Agreement. Unless otherwise agreed in writing by Holder, all payments will be made in lawful tender of the United States and will be applied (a) first, to the payment of accrued interest, and (b) second, (to the extent that the amount of such prepayment exceeds the amount of all such accrued interest), to the payment of principal. 4. Conversion of Debt. Holder has the right to convert this Note in accordance with the Conversion Procedures set forth in the Credit Agreement. -74- -------------------------------------------------------------------------------- 5. Default; Acceleration of Obligation. Borrower will be deemed to be in default under this Note and the outstanding unpaid principal balance of this Note, together with all interest accrued thereon, will immediately become due and payable in full, without the need for any further action on the part of Holder, upon the occurrence of any Event of Default (as defined in the Credit Agreement). 6. Remedies on Default; Acceleration. Upon any Event of Default, Holder will have, in addition to its rights and remedies under this Note and the Credit Agreement, full recourse against any real, personal, tangible or intangible assets of Borrower, and may pursue any legal or equitable remedies that are available to Holder, and may declare the entire unpaid principal amount of this Note and all unpaid accrued interest under this Note to be immediately due and payable in full. 7. Waiver and Amendment. Any provision of this Note may be amended or modified only by a writing signed by both Borrower and Holder. Except as provided below with respect to waivers by Borrower, no waiver or consent with respect to this Note will be binding or effective unless it is set forth in writing and signed by the party against whom such waiver is asserted. No course of dealing between Borrower and Holder will operate as a waiver or modification of any party's rights or obligations under this Note. No delay or failure on the part of either party in exercising any right or remedy under this Note will operate as a waiver of such right or any other right. A waiver given on one occasion will not be construed as a bar to, or as a waiver of, any right or remedy on any future occasion. 8. Waivers of Borrower. Borrower hereby waives presentment, notice of non-payment, notice of dishonor, protest, demand and diligence. This Note may be amended only by a writing executed by Borrower and Holder. 9. Governing Law. This Note will be governed by and construed in accordance with the internal laws of the State of New York as applied to agreements between residents thereof to be performed entirely within such State, without reference to that body of law relating to conflict of laws or choice of law. 10. Severability; Headings. The invalidity or unenforceability of any term or provision of this Note will not affect the validity or enforceability of any other term or provision hereof. The headings in this Note are for convenience of reference only and will not alter or otherwise affect the meaning of this Note. 11. Jurisdiction; Venue. Borrower, by its execution of this Note, hereby irrevocably submits to the in personam jurisdiction of the state courts of the State of New York and of the United States District Court for the Southern District of New York that are located in New York, New York, for the purpose of any suit, action or other proceeding arising out of or based upon this Note. 12. Attorneys' Fees. If suit is brought for collection of this Note, Borrower agrees to pay all reasonable expenses, including attorneys' fees, incurred by Holder in connection therewith whether or not such suit is prosecuted to judgment. 13. Assignment. This Note is not assignable by Holder without the written consent of Borrower. This Note may not be assigned or delegated by Borrower, whether by voluntary assignment or transfer, operation of law, merger or otherwise. 14. Credit Agreement. This Note incorporates by reference all the provisions of the Credit Agreement, including but not limited to all provisions contained therein with respect to Events of Default, waivers, remedies and covenants, Conversion Rights, and the description of the benefits, rights and obligations of each of Borrower and Holder under the Credit Agreement. IN WITNESS WHEREOF, Borrower has executed this Note as of the date and year first above written. BORROWER SECURITY INTELLIGENCE TECHNOLOGIES, INC. By: /s/ Ben Jamil ----------------------------------------- Name: Ben Jamil Title: Chief Executive Officer -75- -------------------------------------------------------------------------------- SCHEDULE A TO REVOLVING PROMISSORY NOTE RECORD OF LOANS AND REPAYMENT OF LOANS -76- -------------------------------------------------------------------------------- THE SECURITIES REPRESENTED HEREBY HAVE NOT BEEN REGISTERED UNDER THE SECURITIES ACT OF 1933, AS AMENDED (THE "ACT"), OR UNDER THE SECURITIES LAWS OF CERTAIN STATES. THESE SECURITIES ARE SUBJECT TO RESTRICTIONS ON TRANSFERABILITY AND RESALE AND MAY NOT BE TRANSFERRED OR RESOLD EXCEPT AS PERMITTED UNDER THE ACT AND APPLICABLE STATE SECURITIES LAWS, PURSUANT TO REGISTRATION OR EXEMPTION THEREFROM. INVESTORS SHOULD BE AWARE THAT THEY MAY BE REQUIRED TO BEAR THE FINANCIAL RISKS OF THIS INVESTMENT FOR AN INDEFINITE PERIOD OF TIME. THE ISSUER OF THESE SECURITIES MAY REQUIRE AN OPINION OF COUNSEL IN FORM AND SUBSTANCE SATISFACTORY TO THE ISSUER TO THE EFFECT THAT ANY PROPOSED TRANSFER OR RESALE IS IN COMPLIANCE WITH THE ACT AND ANY APPLICABLE STATE SECURITIES LAWS. REVOLVING CONVERTIBLE PROMISSORY NOTE This Revolving Convertible Promissory Note (this "Note") is made and delivered pursuant to that certain Revolving Convertible Credit Agreement dated as of June 10, 2004 between Borrower and Lender (as such terms are defined below), as such may be amended from time to time (the "Credit Agreement"). Unless otherwise defined herein, all capitalized terms used in this Note shall have the same meanings that are given to such terms in the Credit Agreement, the terms of which are incorporated into this Note by reference. 1. Obligation. FOR VALUE RECEIVED, the undersigned, Security Intelligence Technologies, Inc., a Florida corporation ("Borrower") hereby promises to pay to the order of Steven Pollan, a resident of the State of New York, ("Lender" or "Holder") on or before June 30, 2005 (the "Maturity Date"), at Lender's principal place of business at c/o Atlas Capital Services, LLC 135 East 57th Street, 26th Floor, New York, New York 10022, or at such other place as Holder may direct, the principal sum of Twenty Thousand ($20,000.00) Dollars or so much thereof as may be advanced and outstanding, together with all interest accrued on unpaid principal, to be computed on each advance of a Loan from the date of its disbursement to Borrower, at a rate equal to 10% per annum (calculated on the basis of a 365/66-day year), compounded annually . As used herein, the term "Holder" shall initially mean Lender, and shall subsequently mean each person or entity to whom this Note is duly assigned. The outstanding unpaid principal balance of this Note at any time shall be the total principal amounts advanced hereunder by Holder less the amounts of payments of principal made hereon by Borrower, which balance may be endorsed hereon from time to time by Holder in accordance with Section 2. Payments of interest on this Note shall be payable on a quarterly basis, on the last business day of each calendar quarter. 2. Recording of Loans and Payments. Holder is authorized to record on Schedule A hereto, and on any continuation(s) of such Schedule that may be attached to this Note: (a) the date and principal amount of each Loan advanced by Lender under the Credit Agreement; and (b) the date and amount of each payment or prepayment of principal and/or accrued interest of any Loan; which recordation will constitute prima facie evidence of the accuracy of the information so endorsed on Schedule A; provided however, that any failure to record such information on such Schedule or continuation thereof will not in any manner affect the obligations of Borrower to make payments of principal and interest in accordance with the terms of this Note. Holder will promptly provide Borrower with a copy of each recordation made by Holder on Schedule A attached hereto. 3. Prepayment. Subject to the Conversion Rights set forth in Section 5 of the Credit Agreement, prepayment of unpaid principal and/or interest due under this Note may be made at any time without penalty as specified in the Credit Agreement. Unless otherwise agreed in writing by Holder, all payments will be made in lawful tender of the United States and will be applied (a) first, to the payment of accrued interest, and (b) second, (to the extent that the amount of such prepayment exceeds the amount of all such accrued interest), to the payment of principal. 4. Conversion of Debt. Holder has the right to convert this Note in accordance with the Conversion Procedures set forth in the Credit Agreement. -77- -------------------------------------------------------------------------------- 5. Default; Acceleration of Obligation. Borrower will be deemed to be in default under this Note and the outstanding unpaid principal balance of this Note, together with all interest accrued thereon, will immediately become due and payable in full, without the need for any further action on the part of Holder, upon the occurrence of any Event of Default (as defined in the Credit Agreement). 6. Remedies on Default; Acceleration. Upon any Event of Default, Holder will have, in addition to its rights and remedies under this Note and the Credit Agreement, full recourse against any real, personal, tangible or intangible assets of Borrower, and may pursue any legal or equitable remedies that are available to Holder, and may declare the entire unpaid principal amount of this Note and all unpaid accrued interest under this Note to be immediately due and payable in full. 7. Waiver and Amendment. Any provision of this Note may be amended or modified only by a writing signed by both Borrower and Holder. Except as provided below with respect to waivers by Borrower, no waiver or consent with respect to this Note will be binding or effective unless it is set forth in writing and signed by the party against whom such waiver is asserted. No course of dealing between Borrower and Holder will operate as a waiver or modification of any party's rights or obligations under this Note. No delay or failure on the part of either party in exercising any right or remedy under this Note will operate as a waiver of such right or any other right. A waiver given on one occasion will not be construed as a bar to, or as a waiver of, any right or remedy on any future occasion. 8. Waivers of Borrower. Borrower hereby waives presentment, notice of non-payment, notice of dishonor, protest, demand and diligence. This Note may be amended only by a writing executed by Borrower and Holder. 9. Governing Law. This Note will be governed by and construed in accordance with the internal laws of the State of New York as applied to agreements between residents thereof to be performed entirely within such State, without reference to that body of law relating to conflict of laws or choice of law. 10. Severability; Headings. The invalidity or unenforceability of any term or provision of this Note will not affect the validity or enforceability of any other term or provision hereof. The headings in this Note are for convenience of reference only and will not alter or otherwise affect the meaning of this Note. 11. Jurisdiction; Venue. Borrower, by its execution of this Note, hereby irrevocably submits to the in personam jurisdiction of the state courts of the State of New York and of the United States District Court for the Southern District of New York that are located in New York, New York, for the purpose of any suit, action or other proceeding arising out of or based upon this Note. 12. Attorneys' Fees. If suit is brought for collection of this Note, Borrower agrees to pay all reasonable expenses, including attorneys' fees, incurred by Holder in connection therewith whether or not such suit is prosecuted to judgment. 13. Assignment. This Note is not assignable by Holder without the written consent of Borrower. This Note may not be assigned or delegated by Borrower, whether by voluntary assignment or transfer, operation of law, merger or otherwise. -78- -------------------------------------------------------------------------------- 14. Credit Agreement. This Note incorporates by reference all the provisions of the Credit Agreement, including but not limited to all provisions contained therein with respect to Events of Default, waivers, remedies and covenants, Conversion Rights, and the description of the benefits, rights and obligations of each of Borrower and Holder under the Credit Agreement. IN WITNESS WHEREOF, Borrower has executed this Note as of the date and year first above written. BORROWER SECURITY INTELLIGENCE TECHNOLOGIES, INC. By: /s/ Ben Jamil ---------------------------------------- Name: Ben Jamil Title: Chief Executive Officer -79- -------------------------------------------------------------------------------- SCHEDULE A TO REVOLVING PROMISSORY NOTE RECORD OF LOANS AND REPAYMENT OF LOANS -80- -------------------------------------------------------------------------------- THE SECURITIES REPRESENTED HEREBY HAVE NOT BEEN REGISTERED UNDER THE SECURITIES ACT OF 1933, AS AMENDED (THE "ACT"), OR UNDER THE SECURITIES LAWS OF CERTAIN STATES. THESE SECURITIES ARE SUBJECT TO RESTRICTIONS ON TRANSFERABILITY AND RESALE AND MAY NOT BE TRANSFERRED OR RESOLD EXCEPT AS PERMITTED UNDER THE ACT AND APPLICABLE STATE SECURITIES LAWS, PURSUANT TO REGISTRATION OR EXEMPTION THEREFROM. INVESTORS SHOULD BE AWARE THAT THEY MAY BE REQUIRED TO BEAR THE FINANCIAL RISKS OF THIS INVESTMENT FOR AN INDEFINITE PERIOD OF TIME. THE ISSUER OF THESE SECURITIES MAY REQUIRE AN OPINION OF COUNSEL IN FORM AND SUBSTANCE SATISFACTORY TO THE ISSUER TO THE EFFECT THAT ANY PROPOSED TRANSFER OR RESALE IS IN COMPLIANCE WITH THE ACT AND ANY APPLICABLE STATE SECURITIES LAWS. REVOLVING CONVERTIBLE PROMISSORY NOTE This Revolving Convertible Promissory Note (this "Note") is made and delivered pursuant to that certain Revolving Convertible Credit Agreement dated as of June 10, 2004 between Borrower and Lender (as such terms are defined below), as such may be amended from time to time (the "Credit Agreement"). Unless otherwise defined herein, all capitalized terms used in this Note shall have the same meanings that are given to such terms in the Credit Agreement, the terms of which are incorporated into this Note by reference. 1. Obligation. FOR VALUE RECEIVED, the undersigned, Security Intelligence Technologies, Inc., a Florida corporation ("Borrower") hereby promises to pay to the order of Kesef Equity Group, Inc., a ___________ Corporation ("Lender" or "Holder") on or before June 30, 2005 (the "Maturity Date"), at Lender's principal place of business at 14 Lyle Farm Lane, Englishtown, NJ 07726, or at such other place as Holder may direct, the principal sum of One Hundred Seventy Five Thousand ($175,000.00) Dollars or so much thereof as may be advanced and outstanding, together with all interest accrued on unpaid principal, to be computed on each advance of a Loan from the date of its disbursement to Borrower, at a rate equal to 10% per annum (calculated on the basis of a 365/66-day year), compounded annually . As used herein, the term "Holder" shall initially mean Lender, and shall subsequently mean each person or entity to whom this Note is duly assigned. The outstanding unpaid principal balance of this Note at any time shall be the total principal amounts advanced hereunder by Holder less the amounts of payments of principal made hereon by Borrower, which balance may be endorsed hereon from time to time by Holder in accordance with Section 2. Payments of interest on this Note shall be payable on a quarterly basis, on the last business day of each calendar quarter. 2. Recording of Loans and Payments. Holder is authorized to record on Schedule A hereto, and on any continuation(s) of such Schedule that may be attached to this Note: (a) the date and principal amount of each Loan advanced by Lender under the Credit Agreement; and (b) the date and amount of each payment or prepayment of principal and/or accrued interest of any Loan; which recordation will constitute prima facie evidence of the accuracy of the information so endorsed on Schedule A; provided however, that any failure to record such information on such Schedule or continuation thereof will not in any manner affect the obligations of Borrower to make payments of principal and interest in accordance with the terms of this Note. Holder will promptly provide Borrower with a copy of each recordation made by Holder on Schedule A attached hereto. 3. Prepayment. Subject to the Conversion Rights set forth in Section 5 of the Credit Agreement, prepayment of unpaid principal and/or interest due under this Note may be made at any time without penalty as specified in the Credit Agreement. Unless otherwise agreed in writing by Holder, all payments will be made in lawful tender of the United States and will be applied (a) first, to the payment of accrued interest, and (b) second, (to the extent that the amount of such prepayment exceeds the amount of all such accrued interest), to the payment of principal. 4. Conversion of Debt. Holder has the right to convert this Note in accordance with the Conversion Procedures set forth in the Credit Agreement. -81- -------------------------------------------------------------------------------- 5. Default; Acceleration of Obligation. Borrower will be deemed to be in default under this Note and the outstanding unpaid principal balance of this Note, together with all interest accrued thereon, will immediately become due and payable in full, without the need for any further action on the part of Holder, upon the occurrence of any Event of Default (as defined in the Credit Agreement). 6. Remedies on Default; Acceleration. Upon any Event of Default, Holder will have, in addition to its rights and remedies under this Note and the Credit Agreement, full recourse against any real, personal, tangible or intangible assets of Borrower, and may pursue any legal or equitable remedies that are available to Holder, and may declare the entire unpaid principal amount of this Note and all unpaid accrued interest under this Note to be immediately due and payable in full. 7. Waiver and Amendment. Any provision of this Note may be amended or modified only by a writing signed by both Borrower and Holder. Except as provided below with respect to waivers by Borrower, no waiver or consent with respect to this Note will be binding or effective unless it is set forth in writing and signed by the party against whom such waiver is asserted. No course of dealing between Borrower and Holder will operate as a waiver or modification of any party's rights or obligations under this Note. No delay or failure on the part of either party in exercising any right or remedy under this Note will operate as a waiver of such right or any other right. A waiver given on one occasion will not be construed as a bar to, or as a waiver of, any right or remedy on any future occasion. 8. Waivers of Borrower. Borrower hereby waives presentment, notice of non-payment, notice of dishonor, protest, demand and diligence. This Note may be amended only by a writing executed by Borrower and Holder. 9. Governing Law. This Note will be governed by and construed in accordance with the internal laws of the State of New York as applied to agreements between residents thereof to be performed entirely within such State, without reference to that body of law relating to conflict of laws or choice of law. 10. Severability; Headings. The invalidity or unenforceability of any term or provision of this Note will not affect the validity or enforceability of any other term or provision hereof. The headings in this Note are for convenience of reference only and will not alter or otherwise affect the meaning of this Note. 11. Jurisdiction; Venue. Borrower, by its execution of this Note, hereby irrevocably submits to the in personam jurisdiction of the state courts of the State of New York and of the United States District Court for the Southern District of New York that are located in New York, New York, for the purpose of any suit, action or other proceeding arising out of or based upon this Note. 12. Attorneys' Fees. If suit is brought for collection of this Note, Borrower agrees to pay all reasonable expenses, including attorneys' fees, incurred by Holder in connection therewith whether or not such suit is prosecuted to judgment. 13. Assignment. This Note is not assignable by Holder without the written consent of Borrower. This Note may not be assigned or delegated by Borrower, whether by voluntary assignment or transfer, operation of law, merger or otherwise. -82- -------------------------------------------------------------------------------- 14. Credit Agreement. This Note incorporates by reference all the provisions of the Credit Agreement, including but not limited to all provisions contained therein with respect to Events of Default, waivers, remedies and covenants, Conversion Rights, and the description of the benefits, rights and obligations of each of Borrower and Holder under the Credit Agreement. IN WITNESS WHEREOF, Borrower has executed this Note as of the date and year first above written. BORROWER SECURITY INTELLIGENCE TECHNOLOGIES, INC. By: /s/ Ben Jamil ---------------------------------------- Name: Ben Jamil Title: Chief Executive Officer -83- -------------------------------------------------------------------------------- SCHEDULE A TO REVOLVING PROMISSORY NOTE RECORD OF LOANS AND REPAYMENT OF LOANS -84- -------------------------------------------------------------------------------- THE SECURITIES REPRESENTED HEREBY HAVE NOT BEEN REGISTERED UNDER THE SECURITIES ACT OF 1933, AS AMENDED (THE "ACT"), OR UNDER THE SECURITIES LAWS OF CERTAIN STATES. THESE SECURITIES ARE SUBJECT TO RESTRICTIONS ON TRANSFERABILITY AND RESALE AND MAY NOT BE TRANSFERRED OR RESOLD EXCEPT AS PERMITTED UNDER THE ACT AND APPLICABLE STATE SECURITIES LAWS, PURSUANT TO REGISTRATION OR EXEMPTION THEREFROM. INVESTORS SHOULD BE AWARE THAT THEY MAY BE REQUIRED TO BEAR THE FINANCIAL RISKS OF THIS INVESTMENT FOR AN INDEFINITE PERIOD OF TIME. THE ISSUER OF THESE SECURITIES MAY REQUIRE AN OPINION OF COUNSEL IN FORM AND SUBSTANCE SATISFACTORY TO THE ISSUER TO THE EFFECT THAT ANY PROPOSED TRANSFER OR RESALE IS IN COMPLIANCE WITH THE ACT AND ANY APPLICABLE STATE SECURITIES LAWS. REVOLVING CONVERTIBLE PROMISSORY NOTE This Revolving Convertible Promissory Note (this "Note") is made and delivered pursuant to that certain Revolving Convertible Credit Agreement dated as of June 10, 2004 between Borrower and Lender (as such terms are defined below), as such may be amended from time to time (the "Credit Agreement"). Unless otherwise defined herein, all capitalized terms used in this Note shall have the same meanings that are given to such terms in the Credit Agreement, the terms of which are incorporated into this Note by reference. 1. Obligation. FOR VALUE RECEIVED, the undersigned, Security Intelligence Technologies, Inc., a Florida corporation ("Borrower") hereby promises to pay to the order of Ostonian Securities Limited, a ___________ Corporation ("Lender" or "Holder") on or before June 30, 2005 (the "Maturity Date"), at Lender's principal place of business at 60 St. James Street, 1st Floor, London England SW1 ALE, or at such other place as Holder may direct, the principal sum of One Hundred Twenty Five Thousand ($125,000.00) Dollars or so much thereof as may be advanced and outstanding, together with all interest accrued on unpaid principal, to be computed on each advance of a Loan from the date of its disbursement to Borrower, at a rate equal to 10% per annum (calculated on the basis of a 365/66-day year), compounded annually . As used herein, the term "Holder" shall initially mean Lender, and shall subsequently mean each person or entity to whom this Note is duly assigned. The outstanding unpaid principal balance of this Note at any time shall be the total principal amounts advanced hereunder by Holder less the amounts of payments of principal made hereon by Borrower, which balance may be endorsed hereon from time to time by Holder in accordance with Section 2. Payments of interest on this Note shall be payable on a quarterly basis, on the last business day of each calendar quarter. 2. Recording of Loans and Payments. Holder is authorized to record on Schedule A hereto, and on any continuation(s) of such Schedule that may be attached to this Note: (a) the date and principal amount of each Loan advanced by Lender under the Credit Agreement; and (b) the date and amount of each payment or prepayment of principal and/or accrued interest of any Loan; which recordation will constitute prima facie evidence of the accuracy of the information so endorsed on Schedule A; provided however, that any failure to record such information on such Schedule or continuation thereof will not in any manner affect the obligations of Borrower to make payments of principal and interest in accordance with the terms of this Note. Holder will promptly provide Borrower with a copy of each recordation made by Holder on Schedule A attached hereto. 3. Prepayment. Subject to the Conversion Rights set forth in Section 5 of the Credit Agreement, prepayment of unpaid principal and/or interest due under this Note may be made at any time without penalty as specified in the Credit Agreement. Unless otherwise agreed in writing by Holder, all payments will be made in lawful tender of the United States and will be applied (a) first, to the payment of accrued interest, and (b) second, (to the extent that the amount of such prepayment exceeds the amount of all such accrued interest), to the payment of principal. 4. Conversion of Debt. Holder has the right to convert this Note in accordance with the Conversion Procedures set forth in the Credit Agreement. -85- -------------------------------------------------------------------------------- 5. Default; Acceleration of Obligation. Borrower will be deemed to be in default under this Note and the outstanding unpaid principal balance of this Note, together with all interest accrued thereon, will immediately become due and payable in full, without the need for any further action on the part of Holder, upon the occurrence of any Event of Default (as defined in the Credit Agreement). 6. Remedies on Default; Acceleration. Upon any Event of Default, Holder will have, in addition to its rights and remedies under this Note and the Credit Agreement, full recourse against any real, personal, tangible or intangible assets of Borrower, and may pursue any legal or equitable remedies that are available to Holder, and may declare the entire unpaid principal amount of this Note and all unpaid accrued interest under this Note to be immediately due and payable in full. 7. Waiver and Amendment. Any provision of this Note may be amended or modified only by a writing signed by both Borrower and Holder. Except as provided below with respect to waivers by Borrower, no waiver or consent with respect to this Note will be binding or effective unless it is set forth in writing and signed by the party against whom such waiver is asserted. No course of dealing between Borrower and Holder will operate as a waiver or modification of any party's rights or obligations under this Note. No delay or failure on the part of either party in exercising any right or remedy under this Note will operate as a waiver of such right or any other right. A waiver given on one occasion will not be construed as a bar to, or as a waiver of, any right or remedy on any future occasion. 8. Waivers of Borrower. Borrower hereby waives presentment, notice of non-payment, notice of dishonor, protest, demand and diligence. This Note may be amended only by a writing executed by Borrower and Holder. 9. Governing Law. This Note will be governed by and construed in accordance with the internal laws of the State of New York as applied to agreements between residents thereof to be performed entirely within such State, without reference to that body of law relating to conflict of laws or choice of law. 10. Severability; Headings. The invalidity or unenforceability of any term or provision of this Note will not affect the validity or enforceability of any other term or provision hereof. The headings in this Note are for convenience of reference only and will not alter or otherwise affect the meaning of this Note. 11. Jurisdiction; Venue. Borrower, by its execution of this Note, hereby irrevocably submits to the in personam jurisdiction of the state courts of the State of New York and of the United States District Court for the Southern District of New York that are located in New York, New York, for the purpose of any suit, action or other proceeding arising out of or based upon this Note. 12. Attorneys' Fees. If suit is brought for collection of this Note, Borrower agrees to pay all reasonable expenses, including attorneys' fees, incurred by Holder in connection therewith whether or not such suit is prosecuted to judgment. 13. Assignment. This Note is not assignable by Holder without the written consent of Borrower. This Note may not be assigned or delegated by Borrower, whether by voluntary assignment or transfer, operation of law, merger or otherwise. -86- -------------------------------------------------------------------------------- 14. Credit Agreement. This Note incorporates by reference all the provisions of the Credit Agreement, including but not limited to all provisions contained therein with respect to Events of Default, waivers, remedies and covenants, Conversion Rights, and the description of the benefits, rights and obligations of each of Borrower and Holder under the Credit Agreement. IN WITNESS WHEREOF, Borrower has executed this Note as of the date and year first above written. BORROWER SECURITY INTELLIGENCE TECHNOLOGIES, INC. By: /s/ Ben Jamil ---------------------------------------- Name: Ben Jamil Title: Chief Executive Officer -87- -------------------------------------------------------------------------------- SCHEDULE A TO REVOLVING PROMISSORY NOTE RECORD OF LOANS AND REPAYMENT OF LOANS -88- -------------------------------------------------------------------------------- THE SECURITIES REPRESENTED HEREBY HAVE NOT BEEN REGISTERED UNDER THE SECURITIES ACT OF 1933, AS AMENDED (THE "ACT"), OR UNDER THE SECURITIES LAWS OF CERTAIN STATES. THESE SECURITIES ARE SUBJECT TO RESTRICTIONS ON TRANSFERABILITY AND RESALE AND MAY NOT BE TRANSFERRED OR RESOLD EXCEPT AS PERMITTED UNDER THE ACT AND APPLICABLE STATE SECURITIES LAWS, PURSUANT TO REGISTRATION OR EXEMPTION THEREFROM. INVESTORS SHOULD BE AWARE THAT THEY MAY BE REQUIRED TO BEAR THE FINANCIAL RISKS OF THIS INVESTMENT FOR AN INDEFINITE PERIOD OF TIME. THE ISSUER OF THESE SECURITIES MAY REQUIRE AN OPINION OF COUNSEL IN FORM AND SUBSTANCE SATISFACTORY TO THE ISSUER TO THE EFFECT THAT ANY PROPOSED TRANSFER OR RESALE IS IN COMPLIANCE WITH THE ACT AND ANY APPLICABLE STATE SECURITIES LAWS. REVOLVING CONVERTIBLE PROMISSORY NOTE This Revolving Convertible Promissory Note (this "Note") is made and delivered pursuant to that certain Revolving Convertible Credit Agreement dated as of June 10, 2004 between Borrower and Lender (as such terms are defined below), as such may be amended from time to time (the "Credit Agreement"). Unless otherwise defined herein, all capitalized terms used in this Note shall have the same meanings that are given to such terms in the Credit Agreement, the terms of which are incorporated into this Note by reference. 1. Obligation. FOR VALUE RECEIVED, the undersigned, Security Intelligence Technologies, Inc., a Florida corporation ("Borrower") hereby promises to pay to the order of Atlas Equity Group, Inc., a Florida Corporation ("Lender" or "Holder") on or before June 30, 2005 (the "Maturity Date"), at Lender's principal place of business at 1691 Michigan Avenue, Suite 425 Miami, Florida 33139, or at such other place as Holder may direct, the principal sum of Fifty Five Thousand ($55,000.00) Dollars or so much thereof as may be advanced and outstanding, together with all interest accrued on unpaid principal, to be computed on each advance of a Loan from the date of its disbursement to Borrower, at a rate equal to 10% per annum (calculated on the basis of a 365/66-day year), compounded annually . As used herein, the term "Holder" shall initially mean Lender, and shall subsequently mean each person or entity to whom this Note is duly assigned. The outstanding unpaid principal balance of this Note at any time shall be the total principal amounts advanced hereunder by Holder less the amounts of payments of principal made hereon by Borrower, which balance may be endorsed hereon from time to time by Holder in accordance with Section 2. Payments of interest on this Note shall be payable on a quarterly basis, on the last business day of each calendar quarter. 2. Recording of Loans and Payments. Holder is authorized to record on Schedule A hereto, and on any continuation(s) of such Schedule that may be attached to this Note: (a) the date and principal amount of each Loan advanced by Lender under the Credit Agreement; and (b) the date and amount of each payment or prepayment of principal and/or accrued interest of any Loan; which recordation will constitute prima facie evidence of the accuracy of the information so endorsed on Schedule A; provided however, that any failure to record such information on such Schedule or continuation thereof will not in any manner affect the obligations of Borrower to make payments of principal and interest in accordance with the terms of this Note. Holder will promptly provide Borrower with a copy of each recordation made by Holder on Schedule A attached hereto. 3. Prepayment. Subject to the Conversion Rights set forth in Section 5 of the Credit Agreement, prepayment of unpaid principal and/or interest due under this Note may be made at any time without penalty as specified in the Credit Agreement. Unless otherwise agreed in writing by Holder, all payments will be made in lawful tender of the United States and will be applied (a) first, to the payment of accrued interest, and (b) second, (to the extent that the amount of such prepayment exceeds the amount of all such accrued interest), to the payment of principal. 4. Conversion of Debt. Holder has the right to convert this Note in accordance with the Conversion Procedures set forth in the Credit Agreement. -89- -------------------------------------------------------------------------------- 5. Default; Acceleration of Obligation. Borrower will be deemed to be in default under this Note and the outstanding unpaid principal balance of this Note, together with all interest accrued thereon, will immediately become due and payable in full, without the need for any further action on the part of Holder, upon the occurrence of any Event of Default (as defined in the Credit Agreement). 6. Remedies on Default; Acceleration. Upon any Event of Default, Holder will have, in addition to its rights and remedies under this Note and the Credit Agreement, full recourse against any real, personal, tangible or intangible assets of Borrower, and may pursue any legal or equitable remedies that are available to Holder, and may declare the entire unpaid principal amount of this Note and all unpaid accrued interest under this Note to be immediately due and payable in full. 7. Waiver and Amendment. Any provision of this Note may be amended or modified only by a writing signed by both Borrower and Holder. Except as provided below with respect to waivers by Borrower, no waiver or consent with respect to this Note will be binding or effective unless it is set forth in writing and signed by the party against whom such waiver is asserted. No course of dealing between Borrower and Holder will operate as a waiver or modification of any party's rights or obligations under this Note. No delay or failure on the part of either party in exercising any right or remedy under this Note will operate as a waiver of such right or any other right. A waiver given on one occasion will not be construed as a bar to, or as a waiver of, any right or remedy on any future occasion. 8. Waivers of Borrower. Borrower hereby waives presentment, notice of non-payment, notice of dishonor, protest, demand and diligence. This Note may be amended only by a writing executed by Borrower and Holder. 9. Governing Law. This Note will be governed by and construed in accordance with the internal laws of the State of New York as applied to agreements between residents thereof to be performed entirely within such State, without reference to that body of law relating to conflict of laws or choice of law. 10. Severability; Headings. The invalidity or unenforceability of any term or provision of this Note will not affect the validity or enforceability of any other term or provision hereof. The headings in this Note are for convenience of reference only and will not alter or otherwise affect the meaning of this Note. 11. Jurisdiction; Venue. Borrower, by its execution of this Note, hereby irrevocably submits to the in personam jurisdiction of the state courts of the State of New York and of the United States District Court for the Southern District of New York that are located in New York, New York, for the purpose of any suit, action or other proceeding arising out of or based upon this Note. 12. Attorneys' Fees. If suit is brought for collection of this Note, Borrower agrees to pay all reasonable expenses, including attorneys' fees, incurred by Holder in connection therewith whether or not such suit is prosecuted to judgment. 13. Assignment. This Note is not assignable by Holder without the written consent of Borrower. This Note may not be assigned or delegated by Borrower, whether by voluntary assignment or transfer, operation of law, merger or otherwise. -90- -------------------------------------------------------------------------------- 14. Credit Agreement. This Note incorporates by reference all the provisions of the Credit Agreement, including but not limited to all provisions contained therein with respect to Events of Default, waivers, remedies and covenants, Conversion Rights, and the description of the benefits, rights and obligations of each of Borrower and Holder under the Credit Agreement. IN WITNESS WHEREOF, Borrower has executed this Note as of the date and year first above written. BORROWER SECURITY INTELLIGENCE TECHNOLOGIES, INC. By: /s/ Ben Jamil ----------------------------------------- Name: Ben Jamil Title: Chief Executive Officer -91- -------------------------------------------------------------------------------- SCHEDULE A TO REVOLVING PROMISSORY NOTE RECORD OF LOANS AND REPAYMENT OF LOANS -92- -------------------------------------------------------------------------------- THE SECURITIES REPRESENTED HEREBY HAVE NOT BEEN REGISTERED UNDER THE SECURITIES ACT OF 1933, AS AMENDED (THE "ACT"), OR UNDER THE SECURITIES LAWS OF CERTAIN STATES. THESE SECURITIES ARE SUBJECT TO RESTRICTIONS ON TRANSFERABILITY AND RESALE AND MAY NOT BE TRANSFERRED OR RESOLD EXCEPT AS PERMITTED UNDER THE ACT AND APPLICABLE STATE SECURITIES LAWS, PURSUANT TO REGISTRATION OR EXEMPTION THEREFROM. INVESTORS SHOULD BE AWARE THAT THEY MAY BE REQUIRED TO BEAR THE FINANCIAL RISKS OF THIS INVESTMENT FOR AN INDEFINITE PERIOD OF TIME. THE ISSUER OF THESE SECURITIES MAY REQUIRE AN OPINION OF COUNSEL IN FORM AND SUBSTANCE SATISFACTORY TO THE ISSUER TO THE EFFECT THAT ANY PROPOSED TRANSFER OR RESALE IS IN COMPLIANCE WITH THE ACT AND ANY APPLICABLE STATE SECURITIES LAWS. REVOLVING CONVERTIBLE PROMISSORY NOTE This Revolving Convertible Promissory Note (this "Note") is made and delivered pursuant to that certain Revolving Convertible Credit Agreement dated as of June 10, 2004 between Borrower and Lender (as such terms are defined below), as such may be amended from time to time (the "Credit Agreement"). Unless otherwise defined herein, all capitalized terms used in this Note shall have the same meanings that are given to such terms in the Credit Agreement, the terms of which are incorporated into this Note by reference. 1. Obligation. FOR VALUE RECEIVED, the undersigned, Security Intelligence Technologies, Inc., a Florida corporation ("Borrower") hereby promises to pay to the order of GSM Communications, Inc., a Florida Corporation ("Lender" or "Holder") on or before June 30, 2005 (the "Maturity Date"), at Lender's principal place of business at 1221 Brickell Avenue, Suite 900, Miami, Florida 33131, or at such other place as Holder may direct, the principal sum of Sixty Five Thousand ($65,000.00) Dollars or so much thereof as may be advanced and outstanding, together with all interest accrued on unpaid principal, to be computed on each advance of a Loan from the date of its disbursement to Borrower, at a rate equal to 10% per annum (calculated on the basis of a 365/66-day year), compounded annually . As used herein, the term "Holder" shall initially mean Lender, and shall subsequently mean each person or entity to whom this Note is duly assigned. The outstanding unpaid principal balance of this Note at any time shall be the total principal amounts advanced hereunder by Holder less the amounts of payments of principal made hereon by Borrower, which balance may be endorsed hereon from time to time by Holder in accordance with Section 2. Payments of interest on this Note shall be payable on a quarterly basis, on the last business day of each calendar quarter. 2. Recording of Loans and Payments. Holder is authorized to record on Schedule A hereto, and on any continuation(s) of such Schedule that may be attached to this Note: (a) the date and principal amount of each Loan advanced by Lender under the Credit Agreement; and (b) the date and amount of each payment or prepayment of principal and/or accrued interest of any Loan; which recordation will constitute prima facie evidence of the accuracy of the information so endorsed on Schedule A; provided however, that any failure to record such information on such Schedule or continuation thereof will not in any manner affect the obligations of Borrower to make payments of principal and interest in accordance with the terms of this Note. Holder will promptly provide Borrower with a copy of each recordation made by Holder on Schedule A attached hereto. 3. Prepayment. Subject to the Conversion Rights set forth in Section 5 of the Credit Agreement, prepayment of unpaid principal and/or interest due under this Note may be made at any time without penalty as specified in the Credit Agreement. Unless otherwise agreed in writing by Holder, all payments will be made in lawful tender of the United States and will be applied (a) first, to the payment of accrued interest, and (b) second, (to the extent that the amount of such prepayment exceeds the amount of all such accrued interest), to the payment of principal. 4. Conversion of Debt. Holder has the right to convert this Note in accordance with the Conversion Procedures set forth in the Credit Agreement. -93- -------------------------------------------------------------------------------- 5. Default; Acceleration of Obligation. Borrower will be deemed to be in default under this Note and the outstanding unpaid principal balance of this Note, together with all interest accrued thereon, will immediately become due and payable in full, without the need for any further action on the part of Holder, upon the occurrence of any Event of Default (as defined in the Credit Agreement). 6. Remedies on Default; Acceleration. Upon any Event of Default, Holder will have, in addition to its rights and remedies under this Note and the Credit Agreement, full recourse against any real, personal, tangible or intangible assets of Borrower, and may pursue any legal or equitable remedies that are available to Holder, and may declare the entire unpaid principal amount of this Note and all unpaid accrued interest under this Note to be immediately due and payable in full. 7. Waiver and Amendment. Any provision of this Note may be amended or modified only by a writing signed by both Borrower and Holder. Except as provided below with respect to waivers by Borrower, no waiver or consent with respect to this Note will be binding or effective unless it is set forth in writing and signed by the party against whom such waiver is asserted. No course of dealing between Borrower and Holder will operate as a waiver or modification of any party's rights or obligations under this Note. No delay or failure on the part of either party in exercising any right or remedy under this Note will operate as a waiver of such right or any other right. A waiver given on one occasion will not be construed as a bar to, or as a waiver of, any right or remedy on any future occasion. 8. Waivers of Borrower. Borrower hereby waives presentment, notice of non-payment, notice of dishonor, protest, demand and diligence. This Note may be amended only by a writing executed by Borrower and Holder. 9. Governing Law. This Note will be governed by and construed in accordance with the internal laws of the State of New York as applied to agreements between residents thereof to be performed entirely within such State, without reference to that body of law relating to conflict of laws or choice of law. 10. Severability; Headings. The invalidity or unenforceability of any term or provision of this Note will not affect the validity or enforceability of any other term or provision hereof. The headings in this Note are for convenience of reference only and will not alter or otherwise affect the meaning of this Note. 11. Jurisdiction; Venue. Borrower, by its execution of this Note, hereby irrevocably submits to the in personam jurisdiction of the state courts of the State of New York and of the United States District Court for the Southern District of New York that are located in New York, New York, for the purpose of any suit, action or other proceeding arising out of or based upon this Note. 12. Attorneys' Fees. If suit is brought for collection of this Note, Borrower agrees to pay all reasonable expenses, including attorneys' fees, incurred by Holder in connection therewith whether or not such suit is prosecuted to judgment. 13. Assignment. This Note is not assignable by Holder without the written consent of Borrower. This Note may not be assigned or delegated by Borrower, whether by voluntary assignment or transfer, operation of law, merger or otherwise. -94- -------------------------------------------------------------------------------- 14. Credit Agreement. This Note incorporates by reference all the provisions of the Credit Agreement, including but not limited to all provisions contained therein with respect to Events of Default, waivers, remedies and covenants, Conversion Rights, and the description of the benefits, rights and obligations of each of Borrower and Holder under the Credit Agreement. IN WITNESS WHEREOF, Borrower has executed this Note as of the date and year first above written. BORROWER SECURITY INTELLIGENCE TECHNOLOGIES, INC. By: /s/ Ben Jamil ---------------------------------------- Name: Ben Jamil Title: Chief Executive Officer -95- -------------------------------------------------------------------------------- SCHEDULE A TO REVOLVING PROMISSORY NOTE RECORD OF LOANS AND REPAYMENT OF LOANS -96- -------------------------------------------------------------------------------- REGISTRATION RIGHTS AGREEMENT REGISTRATION RIGHTS AGREEMENT (this "Agreement"), dated as of June 10, 2004, by and among Security Intelligence Technologies, Inc., a Florida corporation (the "Company"), and the undersigned Lenders (each, a "Lender" and collectively, the "Lenders"). WHEREAS: A. In connection with the Revolving Convertible Credit Agreement by and among the parties hereto of even date herewith (the "Credit Agreement"), the Company has agreed, upon the terms and subject to the conditions of the Credit Agreement, to issue to the Lenders shares of the Company's common stock, par value $0.0001 per share (the "Common Stock") upon the conversion of the Loans into Common Stock; B. To induce the Lenders to execute and deliver the Credit Agreement, the Company has agreed to provide certain registration rights under the Securities Act of 1933, as amended, and the rules and regulations thereunder, or any similar successor statute (collectively, the "1933 Act"), and applicable state securities laws. NOW, THEREFORE, in consideration of the premises and the mutual covenants contained herein and other good and valuable consideration, the receipt and sufficiency of which are hereby acknowledged, the Company and each of the Lenders hereby agree as follows: DEFINITIONS. As used in this Agreement, the following terms shall have the following meanings: "Lender" means a Lender, any transferee or assignee thereof to whom a Lender assigns its rights under this Agreement and who agrees to become bound by the provisions of this Agreement in accordance with Section 9 and any transferee or assignee thereof to whom a transferee or assignee assigns its rights under this Agreement and who agrees to become bound by the provisions of this Agreement in accordance with Section 9. "Person" means an individual, a limited liability company, a partnership, a joint venture, a corporation, a trust, an unincorporated organization and a governmental or any department or agency thereof. "Register," "registered," and "registration" refer to a registration effected by preparing and filing one or more Registration Statements (as defined below) in compliance with the 1933 Act and pursuant to Rule 415 under the 1933 Act or any successor rule providing for offering securities on a continuous or delayed basis ("Rule 415"), and the declaration or ordering of effectiveness of such Registration Statement(s) by the United States Securities and Exchange Commission (the "SEC"). "Registrable Securities" means the Common Stock issued or issuable to the Lender pursuant to the Credit Agreement (and any shares of capital stock issued or issuable with respect to the Common Stock as a result of any stock split, stock dividend, recapitalization, exchange or similar event or otherwise.) "Registration Statement" means a registration statement or registration statements of the Company filed under the 1933 Act covering the Registrable Securities. Capitalized terms used herein and not otherwise defined herein shall have the respective meanings set forth in the Credit Agreement. REGISTRATION. Mandatory Registration. The Company shall prepare, and, as soon as practicable but in no event later than 30 days after the expiration of the Credit Period (the "Filing Deadline"), file with the SEC a Registration Statement on Form SB-2 covering the resale of all of the Registrable Securities. In the event that Form SB-2 is unavailable for such a registration, the Company shall use such other form as is available for such a registration, subject to the provisions of Section 2(b) and shall contain the "Plan of Distribution" attached hereto as Annex A. The Company shall use its best efforts to have the Registration Statement declared effective by the SEC as soon as practicable prior to the 120th day following the Filing Deadline (the "Effectiveness Date"); provided, however, the Effectiveness Date shall be the 120th day following the Filing Deadline if the SEC reviews and provides comments on the Registration Statement. -97- -------------------------------------------------------------------------------- RELATED OBLIGATIONS. At such time as the Company is obligated to file a Registration Statement with the SEC pursuant to Section 2(a), the Company will use its best efforts to effect the registration of the Registrable Securities in accordance with the intended method of disposition thereof and, pursuant thereto, the Company shall have the following obligations: The Company shall promptly prepare and file with the SEC a Registration Statement with respect to the applicable Registrable Securities (but in no event later than the applicable Filing Deadline) and use its best efforts to cause such Registration Statement relating to the Registrable Securities to become effective as soon as practicable after such filing prior to the Effectiveness Date. The Company shall keep each Registration Statement effective pursuant to Rule 415 at all times until the earlier of (i) the date as of which the Lenders may sell all of the Registrable Securities covered by such Registration Statement without restriction pursuant to Rule 144(k) (or successor thereto) promulgated under the 1933 Act or (ii) the date on which the Lenders shall have sold all the Registrable Securities covered by such Registration Statement (the "Registration Period"), which Registration Statement (including any amendments or supplements thereto and prospectuses contained therein) shall not contain any untrue statement of a material fact or omit to state a material fact required to be stated therein, or necessary to make the statements therein, in light of the circumstances in which they were made, not misleading. The term "best efforts" shall mean, among other things, that the Company shall submit to the SEC, within two (2) business days after the Company learns that no review of a particular Registration Statement will be made by the staff of the SEC or that the staff has no further comments on the Registration Statement, as the case may be, a request for acceleration of effectiveness of such Registration Statement to a time and date not later than 48 hours after the submission of such request. The Company shall prepare and file with the SEC such amendments (including post-effective amendments) and supplements to a Registration Statement and the prospectus used in connection with such Registration Statement, which prospectus is to be filed pursuant to Rule 424 promulgated under the 1933 Act, as may be necessary to keep such Registration Statement effective at all times during the Registration Period, and, during such period, comply with the provisions of the 1933 Act with respect to the disposition of all Registrable Securities of the Company covered by such Registration Statement until such time as all of such Registrable Securities shall have been disposed of in accordance with the intended methods of disposition by the seller or sellers thereof as set forth in such Registration Statement. In the case of amendments and supplements to a Registration Statement which are required to be filed pursuant to this Agreement (including pursuant to this Section 3(b)) by reason of the Company filing a report on Form 10-K, Form 10-Q or Form 8-K or any analogous report under the Securities Exchange Act of 1934, as amended (the "1934 Act"), the Company shall have incorporated such report by reference into the Registration Statement, if applicable, or shall file such amendments or supplements with the SEC on the same day on which the 1934 Act report is filed which created the requirement for the Company to amend or supplement the Registration Statement. The Company shall furnish to each Lender whose Registrable Securities are included in any Registration Statement, without charge, (i) promptly after the same is prepared and filed with the SEC, at least one copy of such Registration Statement and any amendment(s) thereto, including financial statements and schedules, all documents incorporated therein by reference, all exhibits and each preliminary prospectus, (ii) upon the effectiveness of any Registration Statement, ten (10) copies of the prospectus included in such Registration Statement and all amendments and supplements thereto (or such other number of copies as such Lender may reasonably request) and (iii) such other documents, including copies of any preliminary or final prospectus, as such Lender may reasonably request from time to time in order to facilitate the disposition of the Registrable Securities owned by such Lender. -98- -------------------------------------------------------------------------------- The Company shall use its best efforts to (i) register and qualify, unless an exemption from registration and qualification applies, the resale by the Lenders of the Registrable Securities covered by a Registration Statement under such other securities or "blue sky" laws of all the states of the United States, (ii) prepare and file in those jurisdictions, such amendments (including post-effective amendments) and supplements to such registrations and qualifications as may be necessary to maintain the effectiveness thereof during the Registration Period, (iii) take such other actions as may be necessary to maintain such registrations and qualifications in effect at all times during the Registration Period, and (iv) take all other actions reasonably necessary or advisable to qualify the Registrable Securities for sale in such jurisdictions; provided, however, that the Company shall not be required in connection therewith or as a condition thereto to (x) qualify to do business in any jurisdiction where it would not otherwise be required to qualify but for this Section 3(d), (y) subject itself to general taxation in any such jurisdiction, or (z) file a general consent to service of process in any such jurisdiction. The Company shall promptly notify each Lender who holds Registrable Securities of the receipt by the Company of any notification with respect to the suspension of the registration or qualification of any of the Registrable Securities for sale under the securities or "blue sky" laws of any jurisdiction in the United States or its receipt of actual notice of the initiation or threatening of any proceeding for such purpose. The Company shall notify each Lender in writing of the happening of any event, as promptly as practicable after becoming aware of such event, as a result of which the prospectus included in a Registration Statement, as then in effect, includes an untrue statement of a material fact or omission to state a material fact required to be stated therein or necessary to make the statements therein, in light of the circumstances under which they were made, not misleading (provided that in no event shall such notice contain any material, nonpublic information), and promptly prepare a supplement or amendment to such Registration Statement to correct such untrue statement or omission, and deliver ten (10) copies of such supplement or amendment to each Lender(or such other number of copies as such Lender may reasonably request). The Company shall also promptly notify each Lender in writing (i) when a prospectus or any prospectus supplement or post-effective amendment has been filed, and when a Registration Statement or any post-effective amendment has become effective (notification of such effectiveness shall be delivered to each Lenderby facsimile on the same day of such effectiveness and by overnight mail), (ii) of any request by the SEC for amendments or supplements to a Registration Statement or related prospectus or related information, and (iii) of the Company's reasonable determination that a post-effective amendment to a Registration Statement would be appropriate. The Company shall use its best efforts to prevent the issuance of any stop order or other suspension of effectiveness of a Registration Statement, or the suspension of the qualification of any of the Registrable Securities for sale in any jurisdiction and, if such an order or suspension is issued, to obtain the withdrawal of such order or suspension at the earliest possible moment and to notify each Lender who holds Registrable Securities being sold of the issuance of such order and the resolution thereof or its receipt of actual notice of the initiation or threat of any proceeding for such purpose. The Company shall use its best efforts either to (i) cause all the Registrable Securities covered by a Registration Statement to be listed on each securities exchange on which securities of the same class or series issued by the Company are then listed, if any, if the listing of such Registrable Securities is then permitted under the rules of such exchange, or (ii) secure designation and quotation of all the Registrable Securities covered by the Registration Statement on the Nasdaq National Market, or (iii) if, despite the Company's best efforts to satisfy the preceding clause (i) or (ii), the Company is unsuccessful in satisfying the preceding clause (i) or (ii), to secure the inclusion for quotation on The Nasdaq SmallCap Market for such Registrable Securities. The Company shall pay all fees and expenses in connection with satisfying its obligation under this Section 3(g). The Company shall cooperate with the Lenders who hold Registrable Securities being offered and, to the extent applicable, facilitate the timely preparation and delivery of certificates (not bearing any restrictive legend) representing the Registrable Securities to be offered pursuant to a Registration Statement and enable such certificates to be in such denominations or amounts, as the case may be, as the Lenders may reasonably request and registered in such names as the Lenders may request. The Company shall provide a transfer agent and registrar of all such Registrable Securities not later than the effective date of the applicable Registration Statement. If requested by an Lender, the Company shall (i) as soon as practicable incorporate in a prospectus supplement or post-effective amendment such information as an Lender requests to be included therein relating to the sale and distribution of Registrable Securities, including, without limitation, information with respect to the number of Registrable Securities being offered or sold, the purchase price being paid therefor and any other terms of the offering of the Registrable Securities to be sold in such offering; (ii) as soon as practicable make all required filings of such prospectus supplement or post-effective amendment after being notified of the matters to be incorporated in such prospectus supplement or post-effective amendment; and (iii) as soon as practicable, supplement or make amendments to any Registration Statement if reasonably requested by an Lender of such Registrable Securities. -99- -------------------------------------------------------------------------------- Within two (2) business days after a Registration Statement which covers applicable Registrable Securities is ordered effective by the SEC, the Company shall deliver to Lenders confirmation that such Registration Statement has been declared effective by the SEC. OBLIGATIONS OF THE LENDORS. Not less than two days prior to the filing of the Registration Statement or any related Prospectus or any amendment or supplement thereto, the Company shall furnish to the Lenders copies of the Registration Statement to be filed. The Company shall not file the Registration Statement or any such Prospectus or any amendments or supplements thereto to which the Lenders of a majority of the Registrable Securities shall reasonably object in good faith or for which a Lender shall have notified the Company or its counsel that the information for such Lender is not correct. Each Lender, by such Lender's acceptance of the Registrable Securities, agrees to cooperate with the Company as reasonably requested by the Company in connection with the preparation and filing of any Registration Statement hereunder, unless such Lender has notified the Company in writing of such Lender's election to exclude all of such Lender's Registrable Securities from such Registration Statement. Each Lender agrees that, upon receipt of any notice from the Company of the happening of any event of the kind described in Section 3(f) or the first sentence of 3(e), such Lender will immediately discontinue disposition of Registrable Securities pursuant to any Registration Statement(s) covering such Registrable Securities until such Lender's receipt of the copies of the supplemented or amended prospectus contemplated by Section 3(f) or the first sentence of 3(e) or receipt of notice that no supplement or amendment is required. EXPENSES OF REGISTRATION. All reasonable expenses, other than underwriting discounts and commissions, incurred in connection with registrations, filings or qualifications pursuant to Sections 2 and 3, including, without limitation, all registration, listing and qualifications fees, printers and accounting fees, and fees and disbursements of counsel for the Company ("Registration Expense") shall be paid directly by the Lenders in accordance with their Pro Rata amount; provided however, that such Registration Expense shall be deemed a Loan to the Company on the same terms and conditions set forth in the Credit Agreement; provided further however, that the Lender's obligation for such Registration Expense shall not exceed $50,000. Notwithstanding the foregoing, any additional Registration Expense in excess of $50,000 shall be the obligation of and be paid by the Company. INDEMNIFICATION. In the event any Registrable Securities are included in a Registration Statement under this Agreement: To the fullest extent permitted by law, the Company will, and hereby does, indemnify, hold harmless and defend each Lender, the directors, officers, partners, employees, agents, representatives of, and each Person, if any, who controls any Lender within the meaning of the 1933 Act and of the 1934 Act (each, an "Indemnified Person"), against any losses, claims, damages, liabilities, judgments, fines, penalties, charges, costs, reasonable attorneys' fees, amounts paid in settlement or expenses, joint or several, (collectively, "Claims") incurred in investigating, preparing or defending any action, claim, suit, inquiry, proceeding, investigation or appeal taken from the foregoing by or before any court or governmental, administrative or other regulatory agency, body or the SEC, whether pending or threatened, whether or not an indemnified party is or may be a party thereto ("Indemnified Damages"), to which any of them may become subject insofar as such Claims (or actions or proceedings, whether commenced or threatened, in respect thereof) arise out of or are based upon: (i) any untrue statement or alleged untrue statement of a material fact in a Registration Statement or any post-effective amendment thereto or in any filing made in connection with the qualification of the offering under the securities or other "blue sky" laws of any jurisdiction in which Registrable Securities are offered ("Blue Sky Filing"), or the omission or alleged omission to state a material fact required to be stated therein or necessary to make the statements therein not misleading, (ii) any untrue statement or alleged untrue statement of a material fact contained in any preliminary prospectus if used prior to the effective date of such Registration Statement, or contained in the final prospectus (as amended or supplemented, if the Company files any amendment thereof or supplement thereto with the SEC) or the omission or alleged omission to state therein any material fact necessary to make the statements made therein, in light of the circumstances under which the statements therein were made, not misleading, (iii) any violation or alleged violation by the Company of -100- -------------------------------------------------------------------------------- the 1933 Act, the 1934 Act, any other law, including, without limitation, any state securities law, or any rule or regulation thereunder relating to the offer or sale of the Registrable Securities pursuant to a Registration Statement or (iv) any material violation of this Agreement (the matters in the foregoing clauses (i) through (iv) being, collectively, "Violations"). Subject to Section 6(c), the Company shall reimburse the Indemnified Persons, promptly as such expenses are incurred and are due and payable, for any legal fees or other reasonable expenses incurred by them in connection with investigating or defending any such Claim. Notwithstanding anything to the contrary contained herein, the indemnification agreement contained in this Section 6(a): (i) shall not apply to a Claim by an Indemnified Person arising out of or based upon a Violation which occurs in reliance upon and in conformity with information furnished in writing to the Company by such Indemnified Person for such Indemnified Person expressly for use in connection with the preparation of the Registration Statement or any such amendment thereof or supplement thereto, if such prospectus was timely made available by the Company pursuant to Section 3(c), and if such new prospectus will have cured the defect giving rise to such Claims; (ii) with respect to any preliminary prospectus, shall not inure to the benefit of any such person from whom the person asserting any such Claim purchased the Registrable Securities that are the subject thereof (or to the benefit of any person controlling such person) if the untrue statement or omission of material fact contained in the preliminary prospectus was corrected in the prospectus, as then amended or supplemented, if such prospectus was timely made available by the Company pursuant to Section 3(c), and the Indemnified Person was promptly advised in writing not to use the incorrect prospectus prior to the use giving rise to a violation and such Indemnified Person, notwithstanding such advice, used it; and (iii) shall not be available to the extent such Claim is based on a failure of the Lender to deliver or to cause to be delivered the prospectus made available by the Company, if such prospectus was timely made available by the Company pursuant to Section 3(d) and if such new prospectus will have cured the defect giving rise to such Claims; (iv) shall not apply to amounts paid in settlement of any Claim if such settlement is effected without the prior written consent of the Company, which consent shall not be unreasonably withheld. Such indemnity shall remain in full force and effect regardless of any investigation made by or on behalf of the Indemnified Person and shall survive the transfer of the Registrable Securities by the Lenders pursuant to Section 9. In connection with any Registration Statement in which an Lender is participating, each such Lender agrees to severally and not jointly indemnify, hold harmless and defend, to the same extent and in the same manner as is set forth in Section 6(a), the Company, each of its directors, each of its officers who signs the Registration Statement each Person, if any, who controls the Company within the meaning of the 1933 Act or the 1934 Act (each an "Indemnified Party"), against any Claim or Indemnified Damages to which any of them may become subject, under the 1933 Act, the 1934 Act or otherwise, insofar as such Claim or Indemnified Damages arise out of or are based upon any Violation, in each case to the extent, and only to the extent, that such Violation occurs in reliance upon and in conformity with written information furnished to the Company by such Lender expressly for use in connection with such Registration Statement; and, subject to Section 6(c), such Lender will reimburse any legal or other expenses reasonably incurred by an Indemnified Party in connection with investigating or defending any such Claim; provided, however, that the indemnity agreement contained in this Section 6(b) and the agreement with respect to contribution contained in Section 7 shall not apply to amounts paid in settlement of any Claim if such settlement is effected without the prior written consent of such Lender; provided, further, however, that the Lender shall be liable under this Section 6(b) for only that amount of a Claim or Indemnified Damages as does not exceed the net proceeds to such Lender as a result of the sale of Registrable Securities pursuant to such Registration Statement. Such indemnity shall remain in full force and effect regardless of any investigation made by or on behalf of such Indemnified Party and shall survive the transfer of the Registrable Securities by the Lenders pursuant to Section 9. Notwithstanding anything to the contrary contained herein, the indemnification agreement contained in this Section 6(b) with respect to any preliminary prospectus shall not inure to the benefit of any Indemnified Party if the untrue statement or omission of material fact contained in the preliminary prospectus was corrected on a timely basis in the prospectus, as then amended or supplemented. Promptly after receipt by an Indemnified Person or Indemnified Party under this Section 6 of notice of the commencement of any action or proceeding (including any governmental action or proceeding) involving a Claim, such Indemnified Person or Indemnified Party shall, if a Claim in respect thereof is to be made against any indemnifying party under this Section 6, deliver to the indemnifying party a written notice of the commencement thereof, and the indemnifying party shall have the right to participate in, and, to the extent the indemnifying party so desires, jointly with any other indemnifying party similarly noticed, to assume control of the defense thereof with counsel mutually satisfactory to the indemnifying party and the Indemnified Person or the Indemnified Party, as the case may be; provided, however, that an -101- -------------------------------------------------------------------------------- Indemnified Person or Indemnified Party shall have the right to retain its own counsel with the fees and expenses of not more than one counsel for such Indemnified Person or Indemnified Party to be paid by the indemnifying party, if, in the reasonable opinion of counsel retained by the indemnifying party or the indemnified party, the representation by such counsel of the Indemnified Person or Indemnified Party and the indemnifying party would be inappropriate due to actual or potential differing interests between such Indemnified Person or Indemnified Party and any other party represented by such counsel in such proceeding. In the case of an Indemnified Person, legal counsel referred to in the immediately preceding sentence shall be selected by the Lenders holding a majority in interest of the Registrable Securities included in the Registration Statement to which the Claim relates. The Indemnified Party or Indemnified Person shall cooperate with the indemnifying party in connection with any negotiation or defense of any such action or Claim by the indemnifying party and shall furnish to the indemnifying party all information reasonably available to the Indemnified Party or Indemnified Person which relates to such action or Claim. The indemnifying party shall keep the Indemnified Party or Indemnified Person apprized as to the status of the defense or any settlement negotiations with respect thereto. No indemnifying party shall be liable for any settlement of any action, claim or proceeding effected without its prior written consent, provided, however, that the indemnifying party shall not unreasonably withhold, delay or condition its consent. No indemnifying party shall, without the prior written consent of the Indemnified Party or Indemnified Person, consent to entry of any judgment or enter into any settlement or other compromise which does not include as an unconditional term thereof the giving by the claimant or plaintiff to such Indemnified Party or Indemnified Person of a release from all liability in respect to such Claim or litigation. Following indemnification as provided for hereunder, the indemnifying party shall be subrogated to all rights of the Indemnified Party or Indemnified Person with respect to all third parties, firms or corporations relating to the matter for which indemnification has been made. The failure to deliver written notice to the indemnifying party within a reasonable time of the commencement of any such action shall not relieve such indemnifying party of any liability to the Indemnified Person or Indemnified Party under this Section 6, except to the extent that the indemnifying party is prejudiced in its ability to defend such action. The indemnification required by this Section 6 shall be made by periodic payments of the amount thereof during the course of the investigation or defense, as and when bills are received or Indemnified Damages are incurred. The indemnity agreements contained herein shall be in addition to (i) any cause of action or similar right of the Indemnified Party or Indemnified Person against the indemnifying party or others, and (ii) any liabilities the indemnifying party may be subject to pursuant to the law. CONTRIBUTION. To the extent any indemnification by an indemnifying party is prohibited or limited by law, the indemnifying party agrees to make the maximum contribution with respect to any amounts for which it would otherwise be liable under Section 6 to the fullest extent permitted by law; provided, however, that: (i) no person involved in the sale of Registrable Securities, which person is guilty of fraudulent misrepresentation (within the meaning of Section 11(f) of the 1933 Act) in connection with such sale, shall be entitled to contribution from any person involved in such sale of Registrable Securities who was not guilty of fraudulent misrepresentation; and (ii) contribution by any seller of Registrable Securities shall be limited in amount to the net amount of proceeds received by such seller from the sale of such Registrable Securities pursuant to such Registration Statement. REPORTS UNDER THE 1934 ACT. With a view to making available to the Lenders the benefits of Rule 144 promulgated under the 1933 Act or any other similar rule or regulation of the SEC that may at any time permit the Lenders to sell securities of the Company to the public without registration ("Rule 144"), the Company agrees to: make and keep public information available, as those terms are understood and defined in Rule 144; file with the SEC in a timely manner all reports and other documents required of the Company under the 1933 Act and the 1934 Act so long as the Company remains subject to such requirements (it being understood that nothing herein shall limit the Company's obligations under Section 4(c) of the Credit Agreement) and the filing of such reports and other documents is required for the applicable provisions of Rule 144; and -102- -------------------------------------------------------------------------------- furnish to each Lender so long as such Lender owns Registrable Securities, promptly upon request, (i) a written statement by the Company that it has complied with the reporting requirements of Rule 144, the 1933 Act and the 1934 Act, (ii) a copy of the most recent annual or quarterly report of the Company and such other reports and documents so filed by the Company, and (iii) such other information as may be reasonably requested to permit the investors to sell such securities pursuant to Rule 144 without registration. ASSIGNMENT OF REGISTRATION RIGHTS. The rights under this Agreement shall be automatically assignable by the Lenders to any transferee of all or any portion of Registrable Securities if: (i) the Lender agrees in writing with the transferee or assignee to assign such rights, and a copy of such agreement is furnished to the Company within a reasonable time after such transfer or assignment; (ii) the Company is, within a reasonable time after such transfer or assignment, furnished with written notice of (a) the name and address of such transferee or assignee, and (b) the securities with respect to which such registration rights are being transferred or assigned; (iii) if applicable, immediately following such transfer or assignment the further disposition of such securities by the transferee or assignee is restricted under the 1933 Act and applicable state securities laws; (iv) at or before the time the Company receives the written notice contemplated by clause (ii) of this sentence the transferee or assignee agrees in writing with the Company to be bound by all of the provisions contained herein; and (v) such transfer shall have been made in accordance with the applicable requirements of the Credit Agreement. At the transferees request, the Company shall promptly prepare and file any required prospectus supplement under Rule 424(b)(3) of the Securities Act or other applicable provision of the Securities Act to appropriately amend the list of Selling Stockholders thereunder to include such transferee. AMENDMENT OF REGISTRATION RIGHTS. Provisions of this Agreement may be amended and the observance thereof may be waived (either generally or in a particular instance and either retroactively or prospectively), only with the written consent of the Company and Lenders who then hold two-thirds of the Registrable Securities, other than any amendments to the timing and length of filing and effectiveness of a Registration Statement or the consequences for failure of the Company to timely perform such obligations, which require the consent of each affected Lender. Any amendment or waiver effected in accordance with this Section 10 shall be binding upon each Lender and the Company. No such amendment shall be effective to the extent that it applies to less than all of the holders of the Registrable Securities. No consideration shall be offered or paid to any Person to amend or consent to a waiver or modification of any provision of any of this Agreement unless the same consideration also is offered to all of the parties to this Agreement. Notwithstanding the foregoing, the Company and the Lenders agree that this Agreement shall be automatically amended without further action by the Company and the Lenders to add additional investors to this Agreement who purchase Common Stock in Additional Closings as defined in Section 2 of the Credit Agreement. OTHER REGISTRATION STATEMENTS; PIGGY-BACK REGISTRATIONS. Prior to the eleventh (11th) day after the Company files the Registration Statement, the Company shall not file a registration statement (including any shelf registration statements) (other than on Form S-8) with the Commission with respect to any securities of the Company. If at any time during the Registration Period there is not an effective Registration Statement covering all of the Registrable Securities and the Company shall determine to prepare and file with the Commission a registration statement relating to an offering for its own account or the account of others under the Securities Act of any of its equity securities, other than on Form S-4 or Form S-8 (each as promulgated under the 1933 Act) or their then equivalents relating to equity securities to be issued solely in connection with any acquisition of any entity or business or equity securities issuable in connection with stock option or other employee benefit plans, then the Company shall send to each Lender written notice of such determination and, if within fifteen days after receipt of such notice, any such Lender shall so request in writing, the Company shall include in such registration statement all or any part of such Registrable Securities such holder requests to be registered, subject to customary underwriter cutbacks applicable to all holders of registration rights. -103- -------------------------------------------------------------------------------- MISCELLANEOUS. A Person is deemed to be a holder of Registrable Securities whenever such Person owns or is deemed to own of record such Registrable Securities. If the Company receives conflicting instructions, notices or elections from two or more Persons with respect to the same Registrable Securities, the Company shall act upon the basis of instructions, notice or election received from the registered owner of such Registrable Securities. Any notices, consents, waivers or other communications required or permitted to be given under the terms of this Agreement must be in writing and will be deemed to have been delivered: (i) upon receipt, when delivered personally; (ii) upon receipt, when sent by facsimile (provided confirmation of transmission is mechanically or electronically generated and kept on file by the sending party); or (iii) one business day after deposit with a nationally recognized overnight delivery service, in each case properly addressed to the party to receive the same. The addresses and facsimile numbers for such communications shall be: If to the Company: Security Intelligence Technologies, Inc. 145 Huguenot Street New Rochelle, NY 10801 Telephone: 914-654-8700 Facsimile: 914-654-1302 Attention: Chief Executive Officer If to the Lender, to its address and facsimile number set forth on the Schedule of Lenders attached hereto, with copies to such Lender's representatives as set forth on the Schedule of Lenders, or to such other address and/or facsimile number and/or to the attention of such other person as the recipient party has specified by written notice given to each other party five (5) days prior to the effectiveness of such change. Written confirmation of receipt (A) given by the recipient of such notice, consent, waiver or other communication, (B) mechanically or electronically generated by the sender's facsimile machine containing the time, date, recipient facsimile number and an image of the first page of such transmission or (C) provided by a courier or overnight courier service shall be rebuttable evidence of personal service, receipt by facsimile or receipt from a nationally recognized overnight delivery service in accordance with clause (i), (ii) or (iii) above, respectively. Failure of any party to exercise any right or remedy under this Agreement or otherwise, or delay by a party in exercising such right or remedy, shall not operate as a waiver thereof. All questions concerning the construction, validity, enforcement and interpretation of this Agreement shall be governed by the internal laws of the State of New York, without giving effect to any choice of law or conflict of law provision or rule. Each party hereby irrevocably waives personal service of process and consents to process being served in any such suit, action or proceeding by mailing a copy thereof to such party at the address for such notices to it under this Agreement and agrees that such service shall constitute good and sufficient service of process and notice thereof. Nothing contained herein shall be deemed to limit in any way any right to serve process in any manner permitted by law. If any provision of this Agreement shall be invalid or unenforceable in any jurisdiction, such invalidity or unenforceability shall not affect the validity or enforceability of the remainder of this Agreement in that jurisdiction or the validity or enforceability of any provision of this Agreement in any other jurisdiction. EACH PARTY HEREBY IRREVOCABLY WAIVES ANY RIGHT IT MAY HAVE, AND AGREES NOT TO REQUEST, A JURY TRIAL FOR THE ADJUDICATION OF ANY DISPUTE HEREUNDER OR IN CONNECTION HEREWITH OR ARISING OUT OF THIS AGREEMENT OR ANY TRANSACTION CONTEMPLATED HEREBY. This Agreement, the Credit Agreement, and the Loan Documents constitute the entire agreement among the parties hereto with respect to the subject matter hereof and thereof. There are no restrictions, promises, warranties or undertakings, other than those set forth or referred to herein and therein. This Agreement, the Credit Agreement and the Loan Documents supersede all prior agreements and understandings among the parties hereto with respect to the subject matter hereof and thereof. Subject to the requirements of Section 9, this Agreement shall inure to the benefit of and be binding upon the permitted successors and assigns of each of the parties hereto. -104- -------------------------------------------------------------------------------- The headings in this Agreement are for convenience of reference only and shall not limit or otherwise affect the meaning hereof. This Agreement may be executed in identical counterparts, each of which shall be deemed an original but all of which shall constitute one and the same agreement. This Agreement, once executed by a party, may be delivered to the other party hereto by facsimile transmission of a copy of this Agreement bearing the signature of the party so delivering this Agreement. Each party shall do and perform, or cause to be done and performed, all such further acts and things, and shall execute and deliver all such other agreements, certificates, instruments and documents, as the other party may reasonably request in order to carry out the intent and accomplish the purposes of this Agreement and the consummation of the transactions contemplated hereby. All consents and other determinations required to be made by the Lenders pursuant to this Agreement shall be made, unless otherwise specified in this Agreement, by Lenders holding at least a majority of the Registrable Securities. The language used in this Agreement will be deemed to be the language chosen by the parties to express their mutual intent and no rules of strict construction will be applied against any party. The obligations of each Lender hereunder are several and not joint with the obligations of any other Lender hereunder, and no Lender shall be responsible in any way for the performance of the obligations of any other Lender hereunder. Nothing contained herein or in any other agreement or document delivered at any closing, and no action taken by any Lender pursuant hereto or thereto, shall be deemed to constitute the Lenders as a partnership, an association, a joint venture or any other kind of entity, or create a presumption that the Lenders are in any way acting in concert with respect to such obligations or the transactions contemplated by this Agreement. Each Lender shall be entitled to protect and enforce its rights, including without limitation the rights arising out of this Agreement, and it shall not be necessary for any other Lender to be joined as an additional party in any proceeding for such purpose. This Agreement is intended for the benefit of the parties hereto and their respective permitted successors and assigns, and is not for the benefit of, nor may any provision hereof be enforced by, any other Person. * * * * * * -105- -------------------------------------------------------------------------------- IN WITNESS WHEREOF, the parties have duly executed and delivered this Agreement as of the Effective Date. ================================================================================ BORROWER LENDERS By: /s/ Ben Jamil GSM Communications, Inc. -------------------------------------- Name: Title: By: /s/ Leovigildo Lopez ------------------------------------- Name: Leovigildo Lopez Title: President Address: 1221 Brickell Avenue, Suite 900 Miami, Florida 33131 Fax No. (305) ------------- Kesef Equity Group, Inc By: /s/ Victor Salimeo ------------------------------------- Name: Victor Salimeo Title: President Address: 14 Lyle Farm Lane Englishtown, NJ 07726 Fax No. ------------------ Ostonian Securities Limited By: /s/ Jose Masis -------------------------------------- Name: Jose Masis Title: President Address: 60 St.James Street, 1st Floor London, England SW1 ALE Fax No. ------------------------- ================================================================================ -106- -------------------------------------------------------------------------------- IN WITNESS WHEREOF, the parties have duly executed and delivered this Agreement as of the Effective Date. =========================================================================================== BORROWER LENDERS By: Robert A. Schechter --------------------------------------- Name: Title: By: /s/ Robert A. Schechter ----------------------------------------------- Name: Robert A. Schechter Address: c/o The Atlas Group of Companies, LLC 135 East 57th Street, 26th Floor New York , New York 10022 Fax No. (212) 716-1501 Shimon S. Fishman ---------------------------------------------- By: /s/ Shimon Fishman Name: Shimon S. Fishman Address: c/o The Atlas Group of Companies, LLC 135 East 57th Street, 26th Floor New York , New York 10022 Fax No. (212) 716-1501 Steven Pollan By: /s/ Steven Pollan ----------------------------------------------- Name: Steven Pollan Address: c/o Atlas Capital Services, LLC 135 East 57th Street, 26th Floor New York , New York 10022 Fax No. (212) 267-3501 Atlas Equity Group, Inc. By: /s/ Michael D. Farkas ----------------------------------------------- Name: Michael D. Farkas Title: President Address: 1691 Michigan Avenue, Suite 425 Miami, Florida 33139 Fax No. (305) 539-0901 ================================================================================ -107- -------------------------------------------------------------------------------- Annex A Plan of Distribution The Selling Stockholders and any of their pledgees, assignees and successors-in-interest may, from time to time, sell any or all of their shares of Common Stock on any stock exchange, market or trading facility on which the shares are traded or in private transactions. These sales may be at fixed or negotiated prices. The Selling Stockholders may use any one or more of the following methods when selling shares: ordinary brokerage transactions and transactions in which the broker dealer solicits purchasers; block trades in which the broker dealer will attempt to sell the shares as agent but may position and resell a portion of the block as principal to facilitate the transaction; purchases by a broker dealer as principal and resale by the broker dealer for its account; an exchange distribution in accordance with the rules of the applicable exchange; privately negotiated transactions; short sales broker dealers may agree with the Selling Stockholders to sell a specified number of such shares at a stipulated price per share; a combination of any such methods of sale; and any other method permitted pursuant to applicable law. The Selling Stockholders may also sell shares under Rule 144 under the Securities Act, if available, rather than under this prospectus. Broker dealers engaged by the Selling Stockholders may arrange for other brokers dealers to participate in sales. Broker dealers may receive commissions or discounts from the Selling Stockholders (or, if any broker dealer acts as agent for the purchaser of shares, from the purchaser) in amounts to be negotiated. The Selling Stockholders do not expect these commissions and discounts to exceed what is customary in the types of transactions involved. The Selling Stockholder may from time to time pledge or grant a security interest in some or all of the Shares or common stock or Warrant owned by them and, if they default in the performance of their secured obligations, the pledgees or secured parties may offer and sell the shares of common stock from time to time under this prospectus, or under an amendment to this prospectus under Rule 424(b)(3) or other applicable provision of the Securities Act of 1933 amending the list of Selling Stockholders to include the pledgee, transferee or other successors in interest as selling stockholders under this prospectus. The Selling Stockholders also may transfer the shares of common stock in other circumstances, in which case the transferees, pledgees or other successors in interest will be the selling beneficial owners for purposes of this prospectus. The Selling Stockholders and any broker dealers or agents that are involved in selling the shares may be deemed to be "underwriters" within the meaning of the Securities Act in connection with such sales. In such event, any commissions received by such broker dealers or agents and any profit on the resale of the shares purchased by them may be deemed to be underwriting commissions or discounts under the Securities Act. The Selling Stockholders have informed the Company that it does not have any agreement or understanding, directly or indirectly, with any person to distribute the Common Stock. -108- -------------------------------------------------------------------------------- The Company is required to pay all fees and expenses incident to the registration of the shares. The Company has agreed to indemnify the Selling Stockholders against certain losses, claims, damages and liabilities, including liabilities under the Securities Act. -109- -------------------------------------------------------------------------------- Exhibit 14.1 Security Intelligence Technologies, Inc. Code of Ethics We maintain a code of ethics that applies to our principal executive officer, principal financial officer, controller, or persons performing similar functions. Any waiver of the code must be approved by the Audit Committee and must be disclosed in accordance with SEC rules. -------------------------------------------------------------------------------- Policy: A goal of Security Intelligence Technologies, Inc. and its subsidiaries is to promoting professional and ethical conduct with respect to its business practices worldwide. This policy provides ethical standards to which all of our executive officers, including our principal executive, financial and accounting officers, our directors, our financial managers and all employees are expected to adhere and promote. regarding individual and peer responsibilities, and responsibilities to other employees, to us, to the public and to the other stockholders. Our Policy is to: (1) comply with laws and regulations of applicable national, state, and local governments and regulatory agencies; (2) prepare and develop all information and data in a manner that facilitates full, fair, accurate, complete, timely and understandable and relevant disclosure in reports and documents that we file with, or submits to, the Securities and Exchange Commission and any other government agencies or use in other public communications; (3) act with honesty and integrity, avoid actual or apparent conflicts of interest between our personal and professional relationships. (4) act in good faith, responsibly, with due care, competence and thoroughness, without misrepresenting material facts or allowing independent, professional judgment to be subordinated; (5) maintain the confidentiality of information acquired, except when authorized or otherwise legally obligated to disclose such information and refrain from using confidential information acquired for personal advantage; (6) share knowledge and maintain skills important and relevant to the needs of us and our employees; (7) proactively promote ethical behavior as a responsible professional among peers and business community; and (8) exercise responsible use of and control over all our assets and resources. We are committed to complying with both the letter and the spirit of all applicable laws, rules and regulations. Any information you may have concerning any violation of this Code of Ethics should be brought to the attention of the Audit Committee. The Board of Directors may determine, or designate appropriate persons to determine, appropriate additional disciplinary or other actions to be taken in the event of violations of this Code of Ethics. -110- -------------------------------------------------------------------------------- If you provide information to the Audit Committee, it will be treated in confidence. Communications to the Audit Committee should be sent to the attention of Director Tom Felice. -111- -------------------------------------------------------------------------------- Exhibit 21.1 List of Subsidiaries State of Subsidiary Incorporation Doing Business AS ------------------------------------------ -------------- -------------------------------------------------- Homeland Security Strategies, Inc. Delaware Homeland Security Strategies, Inc. Homeland Security Strategies of California, Inc. California Homeland Security Strategies of California, Inc. Homeland Security Strategies of Florida, Inc Florida Homeland Security Strategies of Florida, Inc CCS International, Ltd. Delaware CCS International, Ltd. Counter Spy Shop of Mayfair London, Ltd. DC Counter Spy Shop of Mayfair London, Ltd. Counter Spy Shop of Mayfair London, Ltd., Inc. Florida Counter Spy Shop of Mayfair London, Ltd Counter Spy Shop of Mayfair London, Ltd. CA Counter Spy Shop of Mayfair London, Ltd. Spy Shop Ltd. NY Counter Spy Shop of Delaware Security Design Group, Inc. NY Security Design Group, Inc. Homeland Security Strategies (UK), Ltd. London, UK Homeland Security Strategies (UK), Ltd. -112- -------------------------------------------------------------------------------- Exhibit 23.1 CONSENT OF INDEPENDENT AUDITORS To the Board of Directors and Stockholders of Security Intelligence Technologies, Inc. We hereby consent to the inclusion of our report dated October 10, 2003 relating to the consolidated financial statements of Security Intelligence Technologies, Inc. and subsidiaries for the year ended June 30, 2003 appearing in the Annual Report on Form 10-KSB of Security Intelligence Technologies, Inc. for the year ended June 30, 2004. /s/ Schneider & Associates LLP ------------------------------ Schneider & Associates LLP Certified Public Accountants October 12, 2004 Jericho, New York -113- -------------------------------------------------------------------------------- EXHIBIT 31.1 CERTIFICATION I, Ben Jamil, certify that: 1. I have reviewed this Annual Report on Form 10-KSB of Security Intelligence Technologies, Inc.; 2. Based on my knowledge, this report does not contain any untrue statement of a material fact or omit to state a material fact necessary to make the statements made, in light of the circumstances under which such statements were made, not misleading with respect to the period covered by this report; 3. Based on my knowledge, the financial statements, and other financial information included in this report, fairly present in all material respects the financial condition, results of operations and cash flows of the registrant as of, and for, the periods presented in this report; 4. The registrant's other certifying officer and I are responsible for establishing and maintaining disclosure controls and procedures (as defined in Exchange Act Rules 13a-15(e) and 15d-15(e)) for the registrant and we have: a) designed such disclosure controls and procedures, or caused such disclosure controls and procedures to be designed under our supervision, to ensure that material information relating to the registrant, including its consolidated subsidiaries, is made known to us by others within those entities, particularly during the period in which this report is being prepared; b) designed such internal control over financial reporting, or caused such internal control over financial reporting to be designed under our supervision, to provide reasonable assurance regarding the reliability of financial reporting and the preparation of financial statements for external purposes in accordance with generally accepted accounting principles; c) evaluated the effectiveness of the registrant's disclosure controls and procedures and presented in this report our conclusions about the effectiveness of the disclosure controls and procedures, as of the end of the period covered by this report based on such evaluation; and d) disclosed in this report any change in the registrant's internal control over financial reporting that occurred during the registrant's fourth fiscal quarter that has materially affected, or is reasonably likely to materially affect, the registrant's internal control over financial reporting; and 5. The registrant's other certifying officer and I have disclosed, based on our most recent evaluation of internal control over financial reporting, to the registrant's auditors and the audit committee of the registrant's board of directors: a) all significant deficiencies and material weaknesses in the design or operation of internal control over financial reporting which are reasonably likely to adversely affect the registrant's ability to record, process, summarize and report financial information; and -114- -------------------------------------------------------------------------------- b) any fraud, whether or not material, that involves management or other employees who have a significant role in the registrant's internal control over financial reporting. Dated: October 12, 2004 /s/ Ben Jamil ---------------------------------- Ben Jamil, Chief Executive Officer -115- -------------------------------------------------------------------------------- EXHIBIT 31.2 CERTIFICATION I, Chris R. Decker, certify that: 1. I have reviewed this Annual Report on Form 10-KSB of Security Intelligence Technologies, Inc.; 2. Based on my knowledge, this report does not contain any untrue statement of a material fact or omit to state a material fact necessary to make the statements made, in light of the circumstances under which such statements were made, not misleading with respect to the period covered by this report; 3. Based on my knowledge, the financial statements, and other financial information included in this report, fairly present in all material respects the financial condition, results of operations and cash flows of the registrant as of, and for, the periods presented in this report; 4. The registrant's other certifying officer and I are responsible for establishing and maintaining disclosure controls and procedures (as defined in Exchange Act Rules 13a-15(e) and 15d-15(e)) for the registrant and we have: a) designed such disclosure controls and procedures, or caused such disclosure controls and procedures to be designed under our supervision, to ensure that material information relating to the registrant, including its consolidated subsidiaries, is made known to us by others within those entities, particularly during the period in which this report is being prepared; b) designed such internal control over financial reporting, or caused such internal control over financial reporting to be designed under our supervision, to provide reasonable assurance regarding the reliability of financial reporting and the preparation of financial statements for external purposes in accordance with generally accepted accounting principles; c) evaluated the effectiveness of the registrant's disclosure controls and procedures and presented in this report our conclusions about the effectiveness of the disclosure controls and procedures, as of the end of the period covered by this report based on such evaluation; and d) disclosed in this report any change in the registrant's internal control over financial reporting that occurred during the registrant's fourth fiscal quarter that has materially affected, or is reasonably likely to materially affect, the registrant's internal control over financial reporting; and 5. The registrant's other certifying officer and I have disclosed, based on our most recent evaluation of internal control over financial reporting, to the registrant's auditors and the audit committee of the registrant's board of directors: a) all significant deficiencies and material weaknesses in the design or operation of internal control over financial reporting which are reasonably likely to adversely affect the registrant's ability to record, process, summarize and report financial information; and b) any fraud, whether or not material, that involves management or other employees who have a significant role in the registrant's internal control over financial reporting. Dated: October 12, 2004 /s/ Chris R. Decker ---------------------------------------- Chris R. Decker, Chief Financial Officer -116- -------------------------------------------------------------------------------- EXHIBIT 32.1 CERTIFICATION PURSUANT TO SECTION 906 OF THE SARBANES-OXLEY ACT OF 2002 In connection with the annual report on Form 10-KSB of Security Intelligence Technologies, Inc. (the "Company") for the period ended June 30, 2004, as filed with the Securities and Exchange Commission on the date hereof (the "Report"), I, Ben Jamil, the Chief Executive Officer of the Company, and I, Chris R. Decker, Chief Financial Officer of the Company, do hereby certify pursuant to 18 U.S.C. ss.1350, as adopted pursuant to ss.906 of the Sarbanes-Oxley Act of 2002, to the best of my knowledge and belief that: (1) the Report fully complies with the requirements of Section 13(a) or 15(d) of the Securities Exchange Act of 1934, as amended; and (2) the information contained in the Report fairly presents, in all material respects, the financial condition and results of operations of the Company. Dated: October 12, 2004 /s/ Ben Jamil ---------------------------------- Ben Jamil, Chief Executive Officer /s/ Chris R. Decker ---------------------------------------- Chris R. Decker, Chief Financial Officer This certification shall not, except to the extent required by the Sarbanes-Oxley Act of 2002, be deemed filed by the Company for purposes of ss.18 of the Securities Exchange Act of 1934, as amended. -117- -------------------------------------------------------------------------------- End of Filing ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9873 From: kondrak Date: Thu Oct 14, 2004 8:25pm Subject: Re: State Prosecuter puts his loaded pc with the garbage ! I say this..this guy should be mandated to take an OPSEC course before I'd let him dump trash let alone touch anything sensitive. At 11:41 10/13/2004, you wrote: >. > >An important Justice department prosecutor in The Netherlands >disposes of his fully loaded computer and puts it in the street >together with other household waste to be picked up by the garbage >collectors. > >According to the prosecutor his pc din't function well and he tought >it had a virus. > >He did not remove any information stored on the harddisks. > >The prosecutor was working on several very high level criminal >cases like the recent killings of top mafia-style criminals >and fraude at the stock exchanges. the harddisks contained >lots of emails to other department officials about these cases >it also contained some passwords like the one to access his email. > >The pc was found by a taxidriver who then sold the pc to a >tv station wich aired the whole story last week. > >The tv station showed some contens of what was stored on the pc >and the nation was astonished...questions where asked in the >parliament..the minister of justice responded that the prosecuter >has made a very stupid mistake and proper measures where to be taken. > >2 days later a website reveals that the prosecuters mailbox was >hacked...they publish some current mails including those >where he talks to his boss about the scandal. > >Yesterday the prosecuter announced his resignment from his current >function ...he was not fired and the department is now looking >for a position that involves less securty levels. >(cleaning the toilets ?) > >Amazing isn't it ? > >Tetrascanner >www.tetrascanner.com > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9874 From: kondrak Date: Thu Oct 14, 2004 8:26pm Subject: RE: North Korea has a special military squad of hacker-experts BUT, we're not going to nuke anyone who doesn't threaten us...being English, I wouldn't expect you to understand. At 09:23 10/14/2004, you wrote: >So it's alright for you to nuke them, but not for them to nuke you ? > >That's probably how they see it too....you need to get inside the head of >your 'enemy' and see the picture from his side - not necessarily to condone, >but definitely to understand. > >IMHO it's generalizations and the 'xenophobic' mentality that got the US >into this mess in the first place (I'm English, in case anyone doesn't >know). You want to know how I know this ? Because we were in the same, >arrogant, place up to 50 years ago when we had an empire (more than half the >world). Then we grew up, gave them independence and started treating them as >equals. > >My 2c. > >-----Original Message----- >From: kondrak [mailto:kondrak@s...] >Sent: 13 October 2004 16:56 >To: TSCM-L@yahoogroups.com >Subject: Re: [TSCM-L] North Korea has a special military squad of >hacker-experts > > >Oh I dont discount any possibility. > >We should just nuke their sorry asses and get it over with, since thats >what its going to boil down to. >Theyre a dictatorship, run by a mentally ill leader, with intends to be >able to blackmail the US with nukes. >Incinerate them NOW, avoid loosing a city of ours on the west coast. > > >At 02:57 10/12/2004, you wrote: > > >Sorry, pushed Send by mistake. > > > > > > >I read this earlier on another group. > > >Their country barely has electricity, and prob a single T3 for the >entire > > >country. > > >Some Internet hackers, I'll put ours up against theirs any day. > > > >Count, please, the power of a good salary and other material advantages in > >a starving country. > >It is a matter of 'live or die' for theirs families, not a matter of proud > >as with yours hackers. > >So, they are highly motivated, and a motivated enemy is an ENEMY. > > > > > > > > >North Korea has a special military squad of hacker-experts > > > >Don't underestimate the military/police possibilities of a dictatorship. > >By the way, the squad can 'defect' and work as insiders from your advanced > >network. > >Cristian > > > > ---------- > > > > > >--- > >Outgoing mail is certified Virus Free. > >Checked by AVG anti-virus system (http://www.grisoft.com). > >Version: 6.0.733 / Virus Database: 487 - Release Date: 02/08/04 > > > > > >[Non-text portions of this message have been removed] > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > >--- > >Incoming mail is certified Virus Free. > >Checked by AVG anti-virus system (http://www.grisoft.com). > >Version: 6.0.733 / Virus Database: 487 - Release Date: 02/08/04 > > > > ---------- > > > > > >--- > >Outgoing mail is certified Virus Free. > >Checked by AVG anti-virus system (http://www.grisoft.com). > >Version: 6.0.733 / Virus Database: 487 - Release Date: 02/08/04 > > > > > >[Non-text portions of this message have been removed] > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9875 From: James M. Atkinson Date: Thu Oct 14, 2004 10:38pm Subject: CCS is trying to Censoring this List and Shut Me Up [update] http://cryptome.org/yahoo-tscml.htm Here is a copy of the email message that I received from Yahoo yesterday concerning the CCS documents on my TSCM-L mailing list http://finance.groups.yahoo.com/group/TSCM-L/ . Just moments prior to Yahoo sending this email a CCS representative was repeatedly calling me on the phone trying to get me to shut and stop posting public SEC documents concerning the company. The phrase "Reference: Yahoo! Groups:Threats" at the bottom of the message indicates that someone from CCS contacted Yahoo via their automated on-line form and filed a complaint against the group claiming that threats were being made against them. Curiously, as of this morning Yahoo has manually removed virtually all references from the message archives about CCS, SITG, and their related operations (except for two postings made late on 10/14/04). The 115 deletions were quietly made by Yahoo sometime between 10/12/04 @ 5 PM and 10/13/04 @ 8 PM. The moderators logs indicated that the messages "just disappeared", and that no member, nor moderator issued a deletion command. Furthermore, by examining the table or list of messages there are gaps in the sequence numbers where the messages were at one time. For example, on 10/12/04 I posted two messages containing the public documents that CCS filed with the SEC earlier that day. These were messages 9858 and 9860 which went out to the list membership, but have since been quietly deleted by Yahoo at the request of CCS. By examining the following message list you can easily see the two gaps in the numbers. 9854 Re: North Korea has a special military squad of hacker-experts Leanardo skeez100 Tue 10/12/2004 9855 Re: New picture in the photos section (Bluesniper) satcommunitfive satcommunitfive Tue 10/12/2004 9856 Re: New picture in the photos section (Bluesniper) Leanardo skeez100 Tue 10/12/2004 9857 Mayonnaise and Coffee James M. Atkinson graniteislandgroup Tue 10/12/2004 9859 Fwd: PI Ed Pankau, TX, passed away James M. Atkinson graniteislandgroup Tue 10/12/2004 9861 Re: Your product pi@p... precisionpi Wed 10/13/2004 9862 Re: New picture in the photos section (Bluesniper) syndracit syndracit Wed 10/13/2004 9863 State Prosecuter puts his loaded pc with the garbage ! contranl contranl Wed 10/13/2004 9864 Re: CCS Going Belly Up - Annual Report (Key Points) contranl contranl Wed 10/13/2004 Here is another example of gaps in the message, where CCS had Yahoo delete more messages concerning them. As you will note, message number 9746 and 9747 have been deleted, both of these message mentioned SITG and CCS. One mesage was concerning an alias that CCS/SITG was using on E-Bay to quietly dump thier stale inventory and to raise emergency funds. The second message was copy of part of an SEC document pointing out that several of their senior executives had been arrested by federal agents and that the company had been involved in a felony criminal case. 9743 Re: hardware based keyboard loggers James M. Atkinson graniteislandgroup Tue 9/21/2004 9744 TSCM School reference Mitch D rockdriver Wed 9/22/2004 9745 Fighting mad in Folcroft: Citizens want answers in police bugging in NoPositiveWork@a... MichaelMACC Wed 9/22/2004 9748 Re: Fighting mad in Folcroft: Citizens want answers in police buggin syndracit syndracit Wed 9/22/2004 9749 Re: Fighting mad in Folcroft: Citizens want answers in police buggin Greg Horton Thu 9/23/2004 9750 Report: U.S. Airport Screeners Missed Weapons James M. Atkinson graniteislandgroup Thu 9/23/2004 For another example we have message number 9515 which was concerning a help wanted posting that CCS posted to the list (under and alias) trying to find sales representatives, but the message has since been removed from the archive by Yahoo. 9509 Re: TSCM Referals Merl Klein justmerle2003 Mon 8/30/2004 9510 Re: ICOM pecularities Tech Sec Lab secureoffice Mon 8/30/2004 9511 Re: ICOM pecularities Steve Weinert steve_weinert Mon 8/30/2004 9512 FW: Returned mail: User unknown Steve Weinert steve_weinert Mon 8/30/2004 9513 Re: FW: Returned mail: User unknown James M. Atkinson graniteislandgroup Mon 8/30/2004 9514 Systemware Inc. Hawkspirit dawn_star_7 Mon 8/30/2004 9516 Getting Equipped Andy Cuff taliskeruk Mon 8/30/2004 9517 Rolls Surrette 8D and Tripp-Lite Inverted/Charger Systems For Sale James M. Atkinson graniteislandgroup Tue 8/31/2004 9518 Re: From Cryptome.org James M. Atkinson graniteislandgroup Tue 8/31/2004 9519 The Basics of RFID savanted1 savanted1 Tue 8/31/2004 9520 Ad Majorem Dei Gloriam James M. Atkinson graniteislandgroup Tue 8/31/2004 9521 Mr. siaaag Shawn Hughes (Road) high_order1 Tue 8/31/2004 9522 Re: Bluetooth A Grudko damstuff2000 Wed 9/1/2004 Further, a careful search of the archives reveals that Yahoo has very recently, and very quietly deleted any message that referred to or referenced either CCS or SITG even though there were over a hundred of these messages in the archives, many of which were simply postings of public SEC documents, copies of court dockets, discussions about their products and so on. Yahoo also removed numerous historical postings made by various list members concerning CCS insolvency, criminal cases, fraud cases, employees being arrested and charged with felonies by the government, search warrants being served, and references to cases were their employees and senior management were convicted of fraud. ______________________ Date: Wed, 13 Oct 2004 13:30:27 -0700 (PDT) Illegal-Object: Syntax error in From: address found on ams.ftl.affinity.com: From: Yahoo! ^-expected word, missing end of mailbox From: To: jmatk@tscm.com Subject: Yahoo! Groups:Threats Dear Yahoo! account holder: By creating and using your Yahoo! account, you agree to abide by Yahoo!'s Terms of Service (TOS). Pursuant to the TOS, Yahoo! reserves the right to terminate your account or otherwise prohibit use of your account in the event that, among other things, Yahoo! believes that you have violated or acted inconsistently with the letter or spirit of the TOS. It has come to our attention that you may have violated the TOS. Please reread the TOS and cease any use of your account that may violate the TOS. If your use of your Yahoo! account is brought to our attention again, and we believe that such use violates the TOS, then we may terminate your account without further notice. Please do not reply to this email. Any questions concerning Yahoo!'s Services should be submitted through the on-line form in the help area ( http://help.yahoo.com ). -Yahoo! Reference: Yahoo! Groups:Threats ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 9876 From: David Alexander Date: Fri Oct 15, 2004 4:10am Subject: RE: North Korea has a special military squad of hacker-experts But I do understand. I'm not stupid or arrogant. We've been 'threatened' and bombed in England by the IRA for over 25 years, but we haven't bombed them back. Arrested and imprisoned - yes, done out best to keep law and order - yes, bombed - no. When it comes to threats and adverse impacts to the homeland I'm afraid you are relative newcomers to the game. Don't get me wrong, I'm very sorry about what happened to the WTC, Pentagon and the flight that crashed and my sympathies go out to all the people who have been affected. I installed a computer system in the WTC myself a few years back so it's somewhere I have been and knew, so I feel it too. Feeling threatened (and I would be interested to know what the NSA/CIA analysts say the threat actually is - and are they more accurate than they were about Iraq) does not give one the right to go using nuclear or conventional weapons without due cause 'just in case'. Having such weapons is called a deterrent - a clear message that if you use them on us we will retaliate in kind, which is acceptable (we have them too). If you use them first the whole world will condone you out of hand for arrogant, bully boy tactics of the kind you are accusing the NKs of using on you. It works both ways. Another 2c. -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: 15 October 2004 02:27 To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] North Korea has a special military squad of hacker-experts BUT, we're not going to nuke anyone who doesn't threaten us...being English, I wouldn't expect you to understand. At 09:23 10/14/2004, you wrote: >So it's alright for you to nuke them, but not for them to nuke you ? > >That's probably how they see it too....you need to get inside the head of >your 'enemy' and see the picture from his side - not necessarily to condone, >but definitely to understand. > >IMHO it's generalizations and the 'xenophobic' mentality that got the US >into this mess in the first place (I'm English, in case anyone doesn't >know). You want to know how I know this ? Because we were in the same, >arrogant, place up to 50 years ago when we had an empire (more than half the >world). Then we grew up, gave them independence and started treating them as >equals. > >My 2c. > >-----Original Message----- >From: kondrak [mailto:kondrak@s...] >Sent: 13 October 2004 16:56 >To: TSCM-L@yahoogroups.com >Subject: Re: [TSCM-L] North Korea has a special military squad of >hacker-experts > > >Oh I dont discount any possibility. > >We should just nuke their sorry asses and get it over with, since thats >what its going to boil down to. >Theyre a dictatorship, run by a mentally ill leader, with intends to be >able to blackmail the US with nukes. >Incinerate them NOW, avoid loosing a city of ours on the west coast. > > >At 02:57 10/12/2004, you wrote: > > >Sorry, pushed Send by mistake. > > > > > > >I read this earlier on another group. > > >Their country barely has electricity, and prob a single T3 for the >entire > > >country. > > >Some Internet hackers, I'll put ours up against theirs any day. > > > >Count, please, the power of a good salary and other material advantages in > >a starving country. > >It is a matter of 'live or die' for theirs families, not a matter of proud > >as with yours hackers. > >So, they are highly motivated, and a motivated enemy is an ENEMY. > > > > > > > > >North Korea has a special military squad of hacker-experts > > > >Don't underestimate the military/police possibilities of a dictatorship. > >By the way, the squad can 'defect' and work as insiders from your advanced > >network. > >Cristian > > > > ---------- > > > > > >--- > >Outgoing mail is certified Virus Free. > >Checked by AVG anti-virus system (http://www.grisoft.com). > >Version: 6.0.733 / Virus Database: 487 - Release Date: 02/08/04 > > > > > >[Non-text portions of this message have been removed] > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > >--- > >Incoming mail is certified Virus Free. > >Checked by AVG anti-virus system (http://www.grisoft.com). > >Version: 6.0.733 / Virus Database: 487 - Release Date: 02/08/04 > > > > ---------- > > > > > >--- > >Outgoing mail is certified Virus Free. > >Checked by AVG anti-virus system (http://www.grisoft.com). > >Version: 6.0.733 / Virus Database: 487 - Release Date: 02/08/04 > > > > > >[Non-text portions of this message have been removed] > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 9877 From: contranl Date: Fri Oct 15, 2004 8:05am Subject: France alows Gsm-jammers !! . 12 Oct 2004 The French government's industry minister has approved a decision to let cinemas, concert halls and theaters install cell phone jammers on condition that emergency calls can still get through, officials said Monday. Jean Labbe, president of the National Federation of French Cinemas, said the measure was a response to "a long-standing request" from cinemas of all sizes. Cinemas have invested heavily to improve comfort, and "the authorization of jammers is the cherry on the cake," he told France Info radio. Industry Minister Patrick Devedjian gave the go-ahead Friday, backing a decision by the Telecommunications Regulation Authority to allow jammers, his ministry said in a statement. ........... My question: How in the world are they going to do that ? 1) Jammer is on a policeman wants to make a call jammer switches off ? 2) Jammer is off a non policeman wants to make a call jammer switches on ? Automatically discriminating between the general public and safety and security forces ? I would be very interested to know how they do that, seems to me impossible unless you have a unit with intelligence capable of receiving gsm phones and decoding their phonenumbers and hooked up to a very large (online)database with all alowed numbers...any not listed phone would be jammed. Anyone ? Tetrascanner www.tetrascanner.com 9878 From: contranl Date: Fri Oct 15, 2004 8:27am Subject: Security (Fun) . Fun :) http://www.fun.from.hell.pl/2004-10-11/security.mpeg Tetrascanner 9879 From: Date: Fri Oct 15, 2004 7:28am Subject: Comcast Senior Manager Arrested For Bugging Wife's Telephone This was not your average amateur wiretap: recorded audio was digitized and uploaded to a computer network for later retrieval. Apparently this guy couldn't keep his mouth shut. URL for this article http://www.comcastwatch.com/Consumer/OtherIssues/ManagerArrested.asp URL for another local more detailed article http://bargain-it.us/heimstead.html Comcast Senior Manager Arrested For Bugging Wife's Telephone The Pennsylvania State Police have arrested a suburban Pittsburgh man for illegally recording more than 1000 telephone calls to and from his estranged wife's home. State police have accused Gary Heimstead, a Senior Comcast Manager in Engineering, of illegally affixing a $2,000 recording device to a telephone, computer and electrical outlet in the family home. The device reportedly recorded calls, then made them available for access through computers on the same network. According to court records, Heimstead and his wife Penny Heimstead had already begun divorce proceedings when the wife began to wonder how Heimstead kept confronting her with details of conversations she'd held when he was not around. Laws on recording devices differ from state to state. In Pennsylvania it is not legal to possess such a device except under very specific and limited business and law enforcement circumstances, said state police Sgt. Theodore Swartzlander. Heimstead did not meet any of these legal requirements. Heimstead is employed by Comcast Cable Corporation, which offers telephone services. Comcast claims that the recording device is not a service offered through Comcast. Over the years Comcast has had their own problems with respecting people's privacy. Comcast tracked subscribers use of the Internet until legal action forced them to suspend the practice. More recently several communities have raised objections to Comcast's privacy policy which allows Comcast to share the personal information of their customers with anyone Comcast chooses. [Non-text portions of this message have been removed] 9880 From: Date: Fri Oct 15, 2004 1:55pm Subject: Re: CCS is trying to Censoring this List and Shut Me Up [update] Jim, You should consider moving the mailing list to a dedicated server running mailman or majordomo - things are only going to get worse with Yahoo. ...... Original Message ....... On Thu, 14 Oct 2004 23:38:41 -0400 "James M. Atkinson" wrote: > > >http://cryptome.org/yahoo-tscml.htm > >Here is a copy of the email message that I received from Yahoo yesterday >concerning the CCS documents on my TSCM-L mailing list >http://finance.groups.yahoo.com/group/TSCM-L/ . >Just moments prior to Yahoo sending this email a CCS representative was >repeatedly calling me on the phone trying to get me to shut and stop >posting public SEC documents concerning the company. The phrase "Reference: >Yahoo! Groups:Threats" at the bottom of the message indicates that someone >from CCS contacted Yahoo via their automated on-line form and filed a >complaint against the group claiming that threats were being made against >them. > >Curiously, as of this morning Yahoo has manually removed virtually all >references from the message archives about CCS, SITG, and their related >operations (except for two postings made late on 10/14/04). The 115 >deletions were quietly made by Yahoo sometime between 10/12/04 @ 5 PM and >10/13/04 @ 8 PM. The moderators logs indicated that the messages "just >disappeared", and that no member, nor moderator issued a deletion command. >Furthermore, by examining the table or list of messages there are gaps in >the sequence numbers where the messages were at one time. > >For example, on 10/12/04 I posted two messages containing the public >documents that CCS filed with the SEC earlier that day. These were messages >9858 and 9860 which went out to the list membership, but have since been >quietly deleted by Yahoo at the request of CCS. By examining the following >message list you can easily see the two gaps in the numbers. > >9854 Re: North Korea has a special military squad of hacker-experts >Leanardo skeez100 Tue 10/12/2004 >9855 Re: New picture in the photos section (Bluesniper) satcommunitfive >satcommunitfive Tue 10/12/2004 >9856 Re: New picture in the photos section (Bluesniper) Leanardo skeez100 >Tue 10/12/2004 >9857 Mayonnaise and Coffee James M. Atkinson graniteislandgroup Tue 10/12/2004 >9859 Fwd: PI Ed Pankau, TX, passed away James M. Atkinson >graniteislandgroup Tue 10/12/2004 >9861 Re: Your product pi@p... precisionpi Wed >10/13/2004 >9862 Re: New picture in the photos section (Bluesniper) syndracit syndracit >Wed 10/13/2004 >9863 State Prosecuter puts his loaded pc with the garbage ! contranl >contranl Wed 10/13/2004 >9864 Re: CCS Going Belly Up - Annual Report (Key Points) contranl contranl >Wed 10/13/2004 > >Here is another example of gaps in the message, where CCS had Yahoo delete >more messages concerning them. As you will note, message number 9746 and >9747 have been deleted, both of these message mentioned SITG and CCS. One >mesage was concerning an alias that CCS/SITG was using on E-Bay to quietly >dump thier stale inventory and to raise emergency funds. The second message >was copy of part of an SEC document pointing out that several of their >senior executives had been arrested by federal agents and that the company >had been involved in a felony criminal case. > >9743 Re: hardware based keyboard loggers James M. Atkinson >graniteislandgroup Tue 9/21/2004 >9744 TSCM School reference Mitch D rockdriver Wed 9/22/2004 >9745 Fighting mad in Folcroft: Citizens want answers in police bugging in >NoPositiveWork@a... MichaelMACC Wed 9/22/2004 >9748 Re: Fighting mad in Folcroft: Citizens want answers in police buggin >syndracit syndracit Wed 9/22/2004 >9749 Re: Fighting mad in Folcroft: Citizens want answers in police buggin >Greg Horton Thu 9/23/2004 >9750 Report: U.S. Airport Screeners Missed Weapons James M. Atkinson >graniteislandgroup Thu 9/23/2004 > >For another example we have message number 9515 which was concerning a help >wanted posting that CCS posted to the list (under and alias) trying to find >sales representatives, but the message has since been removed from the >archive by Yahoo. > >9509 Re: TSCM Referals Merl Klein justmerle2003 Mon 8/30/2004 >9510 Re: ICOM pecularities Tech Sec Lab secureoffice Mon 8/30/2004 >9511 Re: ICOM pecularities Steve Weinert steve_weinert Mon 8/30/2004 >9512 FW: Returned mail: User unknown Steve Weinert steve_weinert Mon 8/30/2004 >9513 Re: FW: Returned mail: User unknown James M. Atkinson >graniteislandgroup Mon 8/30/2004 >9514 Systemware Inc. Hawkspirit dawn_star_7 Mon 8/30/2004 >9516 Getting Equipped Andy Cuff taliskeruk Mon 8/30/2004 >9517 Rolls Surrette 8D and Tripp-Lite Inverted/Charger Systems For Sale >James M. Atkinson graniteislandgroup Tue 8/31/2004 >9518 Re: From Cryptome.org James M. Atkinson graniteislandgroup Tue 8/31/2004 >9519 The Basics of RFID savanted1 savanted1 Tue 8/31/2004 >9520 Ad Majorem Dei Gloriam James M. Atkinson graniteislandgroup Tue 8/31/2004 >9521 Mr. siaaag Shawn Hughes (Road) high_order1 Tue 8/31/2004 >9522 Re: Bluetooth A Grudko damstuff2000 Wed 9/1/2004 > >Further, a careful search of the archives reveals that Yahoo has very >recently, and very quietly deleted any message that referred to or >referenced either CCS or SITG even though there were over a hundred of >these messages in the archives, many of which were simply postings of >public SEC documents, copies of court dockets, discussions about their >products and so on. Yahoo also removed numerous historical postings made >by various list members concerning CCS insolvency, criminal cases, fraud >cases, employees being arrested and charged with felonies by the >government, search warrants being served, and references to cases were >their employees and senior management were convicted of fraud. > >______________________ > >Date: Wed, 13 Oct 2004 13:30:27 -0700 (PDT) >Illegal-Object: Syntax error in From: address found on ams.ftl.affinity.com: >From: Yahoo! > ^-expected word, missing end of mailbox >From: >To: jmatk@tscm.com >Subject: Yahoo! Groups:Threats >Dear Yahoo! account holder: >By creating and using your Yahoo! account, you agree to abide by >Yahoo!'s Terms of Service (TOS). Pursuant to the TOS, Yahoo! reserves >the right to terminate your account or otherwise prohibit use of your >account in the event that, among other things, Yahoo! believes that you >have violated or acted inconsistently with the letter or spirit of the >TOS. >It has come to our attention that you may have violated the TOS. >Please reread the TOS and cease any use of your account that may >violate the TOS. >If your use of your Yahoo! account is brought to our attention again, >and we believe that such use violates the TOS, then we may terminate >your account without further notice. >Please do not reply to this email. Any questions concerning Yahoo!'s >Services should be submitted through the on-line form in the help area >( http://help.yahoo.com ). >-Yahoo! >Reference: Yahoo! Groups:Threats > > > > > > >----------------------------------------------------------------------------------------------------- > >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >----------------------------------------------------------------------------------------------------- > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >----------------------------------------------------------------------------------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >----------------------------------------------------------------------------------------------------- > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > >. > 9881 From: Shawn Hughes (Road) Date: Fri Oct 15, 2004 6:19pm Subject: Re: Digest Number 1708 This is kind of what I was thinking, too. I'm certain Yahoo is cheaper, but a few more complaints from the people you are exposing, and they will yank your list. -Shawn At 07:23 PM 10/15/04 +0000, you wrote: >Jim, > >You should consider moving the mailing list to a dedicated server running >mailman or majordomo - things are only going to get worse with Yahoo. 9882 From: Date: Fri Oct 15, 2004 7:41pm Subject: Re: Re: Review: An Evidence Collection Device Any suggestions on a portable USB or Firewire write-blocker in that $200 range? ...... Original Message ....... On Sun, 03 Oct 2004 22:21:13 -0000 "Does it matter" wrote: > > > >Yes, laptops are great for that, we have 3 that we use specifically >for that purpose but they are faster and with firewire and 2.0. > > >--- In TSCM-L@yahoogroups.com, "J.A. Terranson" wrote: >> >> >> >> Might I suggest any laptop coupled to the appropriate drive >blocker of >> your choice (firefly, etc.), at a much reduced cost? In fact, I >use an >> older laptop (450mhz K62), a $200.00 write blocker, and a $1,400.00 >> package (FTK) which comes to less than the cost of the logicube, >and can >> do *everything*, not just make an image. >> >> This device is being sold to those who simply don't know better. >> >> //Alif >> >> -- >> J.A. Terranson >> United Forensics Corp. >> >> >> >> On Sat, 2 Oct 2004, Does it matter wrote: >> >> > Date: Sat, 02 Oct 2004 00:16:25 -0000 >> > From: Does it matter >> > Reply-To: TSCM-L@yahoogroups.com >> > To: TSCM-L@yahoogroups.com >> > Subject: [TSCM-L] Re: Review: An Evidence Collection Device >> > >> > >> > The logicube items work well and are a useful tool (providing you >> > get the model that provides md5.) This is never a substitute for >our >> > portable systems with write blockers, but it comes in handy now >and >> > then. >> > A large drawback to the logicube items is that everything is ala >> > carte and some of the itmes are very helpful but run the price up >> > beyond reason. >> > >> > Darren >> > >> > >> > --- In TSCM-L@yahoogroups.com, Thomas Shaddack >wrote: >> > > On Fri, 1 Oct 2004, Steve Weinert wrote: >> > > >> > > > Review: An Evidence Collection Device >> > > > The Logicube Forensic SF-5000u ($2,249 direct), which lets >you >> > create a >> > > > perfect copy of a source drive without altering the original, >> > may be the >> > > > ideal device. This handheld drive-to-drive duplicator >produces >> > an exact >> > > > sector-for-sector copy of the original. Read this review. >> > > > http://eletters.eweek.com/zd1/cts?d=79-1166-4-6-6228-131613-1 >> > > >> > > Over $2000 for a unit that can be replaced with a mini-ITX >board >> > and a >> > > small power supply in a briefcase. Call me a cheapskate, but >> > that's too >> > > much. WAY too much. >> > > >> > > Any hardware that will run Linux (and will have the desired IDE >> > and/or >> > > SATA and/or SCSI controllers) will do here. We don't need >anything >> > more >> > > than the kernel itself, drivers for the IDE controllers, and a >> > handful of >> > > applications (dd, dd_rescue for damaged media (snafu warning: >has >> > > different syntax than dd), md5sum, sha1sum). That all >comfortably >> > fits on >> > > even a floppy. (A distro specifically tailored to this class of >> > problems >> > > (to system recovery, more accurately, but making exact >duplication >> > is a >> > > subset of that problematics) is RIP, Recovery Is Possible, >> > available here: >> > > . >Saved >> > my >> > > posterior more than once. >> > > >> > > Versions available are for a CD (small enough to fit even the >> > > creditcard-sized one, suitable to carry in a wallet), for a >> > floppy, and >> > > for PXE network booting (so it can boot from LAN). >> > > >> > > Any other distro with dd (and the required checksum programs) >will >> > do too. >> > > >> > > You can duplicate the entire drive as-is, or image the >partitions >> > to files >> > > (which can be zipped and archived on a tape or a DVD or a disk, >> > (when >> > > small enough), and later mounted as a loop filesystem or >written >> > to a new >> > > drive). > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > >. > 9883 From: Michael Dever Date: Thu Oct 14, 2004 11:11pm Subject: Contracts for TSCM Services Does anyone have a form of standard contract that could be used as the basis for competitive tendering for TSCM services? Regards Mike Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 9884 From: Leanardo Date: Fri Oct 15, 2004 10:55am Subject: Re: France alows Gsm-jammers !! I would expect that the statement "...on condition that emergency calls can still get through..." is focusing on outbound calls from inside the facility. If this is the case first the facility would need to install enough RF shielding to dramatically decrease GSM network signals from outside the bulding. Next install their own smaller GSM network that would associate all phones inside the facility. This network could then be patched into the facility phone system or dedicated public lines. Finally, when a call is made from inside the facility, the call would be blocked by the dedicated network unless the call detination was 911 or a similar or known emergency number. If they want to allow inbound calls to phones inside the facility it will be much more complicated and require something like you described below... Bruce --- In TSCM-L@yahoogroups.com, "contranl" wrote: > > . > > 12 Oct 2004 > > The French government's industry minister has approved a decision to > let cinemas, concert halls and theaters install cell phone jammers > on condition that emergency calls can still get through, officials > said Monday. > > Jean Labbe, president of the National Federation of French Cinemas, > said the measure was a response to "a long-standing request" from > cinemas of all sizes. > > Cinemas have invested heavily to improve comfort, and "the > authorization of jammers is the cherry on the cake," he told France > Info radio. > > Industry Minister Patrick Devedjian gave the go-ahead Friday, > backing a decision by the Telecommunications Regulation Authority to > allow jammers, his ministry said in a statement. > > ........... > > My question: > > How in the world are they going to do that ? > > > 1) > > Jammer is on > a policeman wants to make a call > jammer switches off ? > > 2) > > Jammer is off > a non policeman wants to make a call > jammer switches on ? > > Automatically discriminating between the general public > and safety and security forces ? > > I would be very interested to know how they do that, > seems to me impossible unless you have a unit with intelligence > capable of receiving gsm phones and decoding their phonenumbers > and hooked up to a very large (online)database with all alowed > numbers...any not listed phone would be jammed. > > Anyone ? > > > Tetrascanner > www.tetrascanner.com 9885 From: Noel E. Hanrahan Date: Fri Oct 15, 2004 1:46pm Subject: Re: France alows Gsm-jammers !! IMHO, "on condition that emergency calls can still get through just means that if someone wants to dial 112 (European Emergency Services number) then it will go through, and nothing else. Noel 9886 From: kondrak Date: Sat Oct 16, 2004 6:06pm Subject: RE: North Korea has a special military squad of hacker-experts At 05:10 10/15/2004, you wrote: >But I do understand. I'm not stupid or arrogant. We've been 'threatened' and >bombed in England by the IRA for over 25 years, but we haven't bombed them >back. Arrested and imprisoned - yes, done out best to keep law and order - >yes, bombed - no. When it comes to threats and adverse impacts to the >homeland I'm afraid you are relative newcomers to the game. Well, I think were getting afar of the original posting Dave, but in no way does the IRA and their firecrackers compare to a nation-state with nuclear and ICBM capabilities. >Don't get me wrong, I'm very sorry about what happened to the WTC, Pentagon >and the flight that crashed and my sympathies go out to all the people who >have been affected. I installed a computer system in the WTC myself a few >years back so it's somewhere I have been and knew, so I feel it too. > >Feeling threatened (and I would be interested to know what the NSA/CIA >analysts say the threat actually is - and are they more accurate than they >were about Iraq) does not give one the right to go using nuclear or >conventional weapons without due cause 'just in case'. Having such weapons >is called a deterrent - a clear message that if you use them on us we will >retaliate in kind, which is acceptable (we have them too). If you use them >first the whole world will condone you out of hand for arrogant, bully boy >tactics of the kind you are accusing the NKs of using on you. It works both >ways. Our policies have been to never use them first, but that's changed, seeing as we are the worlds only remaining superpower. A pre-emptive strike against a terror state like NK might piss off some, but do you want to wait till that madman has the capabilities to take out Seattle? The same showdown's coming with Iran as well. The first Arab state to have a deliverable nuke will undoubtedly use it on Israel, and when they do, there will be atomic war, period. So the point is, do we/they take measures to lessen the possibilities, or wait till someone does it to us/them? No one need use nukes to take out a potential threat, but should one of those things go off, all bets are off, and the recipient of the first strike WILL use them in retaliation. But again, we are getting afar of the TSCM theme Dave. 9887 From: Date: Sat Oct 16, 2004 6:45pm Subject: Re: suggestions on a portable USB .... Wonder why everything out there is Firewire instead of USB 2.0. USB 2.0 has a higher throughput than 1394a doesn't it (480 Mbp/s vs 400 Mbp/s)? ...... Original Message ....... On Sat, 16 Oct 2004 12:37:24 -0700 (PDT) Steve Sanchez wrote: >Message: 2 > Date: Fri, 15 Oct 2004 20:41 -0400 > From: telos888@y... >Subject: Re: Re: Review: An Evidence Collection Device > >Any suggestions on a portable USB or Firewire >write-blocker in that >$200 >range? > > >Hi, > >Try Firefly from http://www.digitalintel.com > >Excellent product and cheap too! > >Steve > >__________________________________________________ >Do You Yahoo!? >Tired of spam? Yahoo! Mail has the best spam protection around >http://mail.yahoo.com >. > 9888 From: Date: Sat Oct 16, 2004 6:49am Subject: Re: Re: Antennas for Spectrum Analyzer? Thanks Jay; appreciate the info. Ed n2vrt [Non-text portions of this message have been removed] 9889 From: Date: Sat Oct 16, 2004 7:11am Subject: Re: Sweep needed Ron Check this out Ed [Non-text portions of this message have been removed] 9890 From: Date: Sat Oct 16, 2004 6:56pm Subject: Yahoo fascists Coming soon to a country near you... http://www.rfa.org/english/news/business/2004/08/01/142626/ and http://news.com.com/2100-1023-949643.html "Fascism should more properly be called corporatism since it is the merger of state and corporate power." -- Benito Mussolini 9891 From: David Alexander Date: Sun Oct 17, 2004 5:53am Subject: RE: North Korea has a special military squad of hacker-experts > -----Original Message----- > From: kondrak [mailto:kondrak@s...] > Sent: 17 October 2004 00:06 > To: TSCM-L@yahoogroups.com > Subject: RE: [TSCM-L] North Korea has a special military squad of hacker- > experts > > At 05:10 10/15/2004, you wrote: > > >But I do understand. I'm not stupid or arrogant. We've been 'threatened' > >and bombed in England by the IRA for over 25 years, but we haven't bombed > >them back. Arrested and imprisoned - yes, done out best to keep law and > >order - yes, bombed - no. When it comes to threats and adverse impacts to > >the homeland I'm afraid you are relative newcomers to the game. > > Well, I think were getting afar of the original posting Dave, but in no > way does the IRA and their firecrackers compare to a nation-state with > nuclear and ICBM capabilities. 9/11 wasn't nuclear, but I don't see people calling that firecrackers. However you look at it, loss of innocent life has happened and anytime that count rises above zero then people are rightly going to be concerned. Dead is dead, be it by a bullet, conventional bomb or nuke. > >Don't get me wrong, I'm very sorry about what happened to the WTC, > >Pentagon and the flight that crashed and my sympathies go out to all the > >people who have been affected. I installed a computer system in the WTC > >myself a few years back so it's somewhere I have been and knew, so I feel > >it too. > > > >Feeling threatened (and I would be interested to know what the NSA/CIA > >analysts say the threat actually is - and are they more accurate than > >they were about Iraq) does not give one the right to go using nuclear or > >conventional weapons without due cause 'just in case'. Having such > >weapons is called a deterrent - a clear message that if you use them on > >us we will retaliate in kind, which is acceptable (we have them too). If > >you use them first the whole world will condone you out of hand for > >arrogant, bully boy tactics of the kind you are accusing the NKs of using > >on you. It works both ways. > > Our policies have been to never use them first, but that's changed, seeing > as we are the worlds only remaining superpower. A pre-emptive strike > against a terror state like NK might piss off some, Would most definitely piss off most of the world and irrevocably damage your standing. It would be economic suicide for your nation to do it. Fortunately your leaders know that. > but do you want to > wait till that madman has the capabilities to take out Seattle? Yes is the simple answer. Your logic would mean that the first person in the world to own a gun should have shot everyone else in case they bought and used one. Not very forward thinking or friendly. There are quite a few nations openly declared to have 'buckets of instant sunshine' - such as UK, France, India, Pakistan, Russia and others who are suspected to be there or close to it. Are you going to say that all those should be attacked too ? It's true that some are obviously a lot more responsible and better lead than others and can be trusted not to attack, while others may be developing the capability as a bargaining/crude blackmail tool. Nuking a large number of innocent, oppressed people because they are lead by an alleged madman/despot is not going to win you any friends - quite the opposite. Don't get me wrong. I'm not anti-nuclear. I believe they work as a deterrent and keep the peace. I'm anti putting irresponsible, arrogant, trigger-happy idiots in charge of nuclear weapons. I don't believe the current US regime falls into that category, but I am worried that one day you lot might elect one... > The same showdown's coming with Iran as well. The first Arab state to have > a deliverable nuke will undoubtedly use it on Israel, and when they do, > there will be atomic war, period. That's possible, but I wouldn't say certain. Would you care to explain your reasoning and evidence ? I have to say that the behaviour of the Israelis is very heavy-handed, such as the bombing of an Iranian reactor complex many years ago. Were you also aware that they deliberately attacked an NSA elint vessel, killing US citizens, during one of their wars with Egypt ? Does that mean the USA should retaliate against Israel ? (your government obviously thought not). > So the point is, do we/they take measures to lessen the possibilities, or > wait till someone does it to us/them? Take measures to reduce the threat, but ones that are acceptable to the rest of the civilized world. Nuking someone 'just in case' does not count as acceptable by any sane definition of the word. > No one need use nukes to take out a potential threat, but should one of > those things go off, all bets are off, and the recipient of the first > strike WILL use them in retaliation. Noted, and certainly acceptable behaviour, if it's retaliation at a similar level - a tripwire policy of total retaliation was long-since abandoned and quite rightly. Such weapons are not a credible deterrent if your enemy does not believe that you will ever use them. Limited nuclear war is possible and acceptable under certain conditions - that someone else started it or the unique situation at the end of WW2 when they had just been developed and their use brought to an early end a war that was already in progress by a nation that had shamelessly attacked you first in 1941. Consider the world opinion of Japan after Pearl Harbor. That's how most would see the US if you nuked someone first. The secret is to behave in such a manner that people don't want to attack you in the first place. Have you wondered why the north of Iraq is a hotbed of trouble with a lot of dead US troops while the South is quiet and very few British troops have died ? Think about it, we go for 'hearts and minds and a softly-softly approach to win over the local populace, not the gung-ho, heavy handed approach that seems to have been taken by the majority of US troops. I readily admit that you have the worlds biggest and best equipped armed forces. That does not mean they are the best trained or the most effective at winning the war or the peace. > But again, we are getting afar of the TSCM theme Dave. We are, but I didn't start this discussion and I couldn't in all conscience allow your comments to go unanswered. You made them in public and I replied in public. If you want to take this offline I'm happy to do that - mail me privately if you want. I think I'm now up to 6c. 9892 From: A Grudko Date: Sun Oct 17, 2004 0:53pm Subject: RE: North Korea has a special military squad of hacker-experts Wrong place for this discussion, please. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.764 / Virus Database: 511 - Release Date: 2004/09/15 [Non-text portions of this message have been removed] 9893 From: kondrak Date: Sun Oct 17, 2004 2:12pm Subject: RE: North Korea has a special military squad of hacker-experts >cont.. How'd that (9/11) get into this equation? I said a few Irishmen throwing some firecrackers about blowing up "oppressing Englishmen" in no way equates to a crazy national leader bent on having a nuclear arsenal to threaten the US with. Ive never seen the IRA nuke a city. >9/11 wasn't nuclear, but I don't see people calling that firecrackers. >However you look at it, loss of innocent life has happened and anytime that >count rises above zero then people are rightly going to be concerned. Dead >is dead, be it by a bullet, conventional bomb or nuke. We blew two countries off the map over 9.11 and one it doesn't look too certain they were really involved, but they were bad guys anyway. Remember Dave, your dealing with a country that in times of no war, we shoot each other for sport. To get into certain elite military units, you have to kill a family member. Who cares? Were the superpower, The worlds economy revolves around us being happy and in charge. That's not about to change soon either. If we perceive a problem, we can simply turn off the foreign welfare spigot. >Would most definitely piss off most of the world and irrevocably damage your >standing. It would be economic suicide for your nation to do it. Fortunately >your leaders know that. Thats the world's smallest fiddle you hear playing... Not in the slightest. You see we care little what the socialists in Europe think. We can survive without them, they want OUR markets, if Iran or North Korea appear to be poised to strike us or an Allied state, I doubt we'd hesitate to bomb them into the stone age. Stand around and watch, its coming to Iran and NK real soon if negotiations fail. In the case of Iran, it's almost a given. It'll either be us, or Israel, who has the most to loose. Its apparent however, we will have a cleanup after the reactor gets taken out. With NK, weve got to jump thru some hoops, and if China wants to continue the benefits of US economic investment, they'd better get this little rogue idiot under control, even if THEY have to invade him. > > but do you want to > > wait till that madman has the capabilities to take out Seattle? > >Yes is the simple answer. Your logic would mean that the first person in the >world to own a gun should have shot everyone else in case they bought and >used one. Not very forward thinking or friendly. There are quite a few >nations openly declared to have 'buckets of instant sunshine' - such as UK, >France, India, Pakistan, Russia and others who are suspected to be there or >close to it. Are you going to say that all those should be attacked too ? My retort is, what would you think had Hitler been weeks away from delivering a nuke via a buzz bomb? >It's true that some are obviously a lot more responsible and better lead >than others and can be trusted not to attack, while others may be developing >the capability as a bargaining/crude blackmail tool. Nuking a large number >of innocent, oppressed people because they are lead by an alleged >madman/despot is not going to win you any friends - quite the opposite. Welp, that's to be seen, but I'll bet if he makes threats to take a city out, we will unhesitatingly blow him off the map. We dont have to nuke him, a few days of B-52 carpet bombing with conventional and some precision strikes will suffice. Im sure we will minimize the collateral damage to the population, but Im sure he will be starting his industrial program with stones and sticks after were done. My guess the only reason they haven't moved on him yet, is the too close proximity of the SK capitol to his long range guns. I'm sure there IS a plan however, as we've never been actually at peace with them. Were intercepting and searching cargo vessels from there now, and they've moved a lot of firepower in his direction, so something's up. Are we to wait till he takes out Tokyo? Seattle? Honolulu? Perhaps San Fran or LA? >Don't get me wrong. I'm not anti-nuclear. I believe they work as a deterrent >and keep the peace. I'm anti putting irresponsible, arrogant, trigger-happy >idiots in charge of nuclear weapons. I don't believe the current US regime >falls into that category, but I am worried that one day you lot might elect >one... Bottom line is like you say they're for deterrent value, and as such they cant be used until someone is VERY close to using one on us. We've given up the no first strike policy some time ago I believe, so buy your potassium iodide. > > The same showdown's coming with Iran as well. The first Arab state to have > > a deliverable nuke will undoubtedly use it on Israel, and when they do, > > there will be atomic war, period. I couldn't agree more, the Jews act like Nazis and the Arabs act like animals. Its no secret that the Arab world wants nukes to use on the Jews. The moment they have them, I'd expect someone to martyr themselves by doing it. Israel will view it as an excuse to blow up everything Arab that walks or breathes for a few hundred miles. Remember, THEY pull OUR strings, not the other way around. Sharon for example is quite boisterous about his level of control of the US government.. Their a fair-weather ally, always have been. And oh yeah, Im all too familiar with their attack on the USS Liberty during the 6 day war. >That's possible, but I wouldn't say certain. Would you care to explain your >reasoning and evidence ? I have to say that the behaviour of the Israelis is >very heavy-handed, such as the bombing of an Iranian reactor complex many >years ago. Were you also aware that they deliberately attacked an NSA elint >vessel, killing US citizens, during one of their wars with Egypt ? Does that >mean the USA should retaliate against Israel ? (your government obviously >thought not). > > > So the point is, do we/they take measures to lessen the possibilities, or > > wait till someone does it to us/them? > >Take measures to reduce the threat, but ones that are acceptable to the rest >of the civilized world. Nuking someone 'just in case' does not count as >acceptable by any sane definition of the word. > > > No one need use nukes to take out a potential threat, but should one of > > those things go off, all bets are off, and the recipient of the first > > strike WILL use them in retaliation. > >Noted, and certainly acceptable behaviour, if it's retaliation at a similar >level - a tripwire policy of total retaliation was long-since abandoned and >quite rightly. Such weapons are not a credible deterrent if your enemy does >not believe that you will ever use them. Limited nuclear war is possible and >acceptable under certain conditions - that someone else started it or the >unique situation at the end of WW2 when they had just been developed and >their use brought to an early end a war that was already in progress by a >nation that had shamelessly attacked you first in 1941. Consider the world >opinion of Japan after Pearl Harbor. That's how most would see the US if you >nuked someone first. Which is why we will use conventional methods. However, if that madman manages to get one into the US and say takes out a major west coast city, I believe we WILL make an example out of them and the world be dammed. OOps, here it is, knew it was coming...the socialist slap the hand Euro-centric garbage that flows every time we marginalize them. This should never even need to be said, we've rebuilt Europe twice, and Japan once. Whenever theres a problem in the world, who's there first? USA. I'm getting a little tired of all this self pontification of the Euro-trash every time we step on some toes. We are not imperialists, we set the "oppressed" back on their feet more times than I can count, and only to have them take a dump on us. We dispensed with Communism, for you as much as us, you don't have Soviet tanks lined up on the other side of the wall anymore, we propped up your shattered economies, and disposed with Nazisim for you as well If I remember right. What thanks do we get, NONE, always some sort of criticism. You wonder why we dont give a rat's rectum about what Europe thinks? Lets see how you guys feel when Iran starts lobbing Shabib II's into Rome, or Paris with small nukes on them, you'll be criticizing us for not having taken them out earlier, so were dammed if we do and dammed if we don't. Sheesh! Until your chestnuts are in the fire you can complain all you want. We simply dont care anymore. >The secret is to behave in such a manner that people don't want to attack >you in the first place. Have you wondered why the north of Iraq is a hotbed >of trouble with a lot of dead US troops while the South is quiet and very >few British troops have died ? Think about it, we go for 'hearts and minds >and a softly-softly approach to win over the local populace, not the >gung-ho, heavy handed approach that seems to have been taken by the majority >of US troops. I readily admit that you have the worlds biggest and best >equipped armed forces. That does not mean they are the best trained or the >most effective at winning the war or the peace. Yeah, we're all too familiar with your foreign policies, I seem to remember how VERY well they worked with HITLER... > > But again, we are getting afar of the TSCM theme Dave. > >We are, but I didn't start this discussion and I couldn't in all conscience >allow your comments to go unanswered. You made them in public and I replied >in public. If you want to take this offline I'm happy to do that - mail me >privately if you want. > >I think I'm now up to 6c. Still good to chat Dave, it's been enjoyable...Im waiting for the bossman to say take it somewhere else...always pleasant to chat with a knowledgeable person such as your self. We may not see eye to eye but we can discuss things like rational people. Cheers 9894 From: Agent Geiger Date: Sat Oct 16, 2004 7:16pm Subject: Has anyone heard anything about this? Has anyone heard anything about this? http://www.newswithviews.com/iserbyt/iserbyt19.htm From: James M. Atkinson, Comm-Eng Date: Sun Oct 15, 2000 4:45pm Subject: Re: VIRUS ALERT in "Monitoring violation prosecution" At 12:16 AM -0400 10/15/00, lafonj@a... wrote: >ATTN: > >STEVE...Whoever sent you this address for "www.POLICESCANNER.COM"... >HAS A VIRUS IN IT.......CALLED......"LLCOOL". > >You need to contact everyone you sent mail to and warn them of this VIRUS. >I have McAfee VirusScan thank God, I hope all others have something too, and >don't lose their data. > >JML Er... the VIRUS DID NOT come though the mailing list as I have gone to great effort to ensure that any executable is deleted by the mailing list server. You can not get a virus from the TSCM-L mailing list (at least not yet). -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1713 From: Andre Holmes <1ach@g...> Date: Sun Oct 15, 2000 4:57pm Subject: Spy cameras and night vision goggles from Spy World COMPUTER SNOOP http://www.spyworld.com/Surveil1.htm [Non-text portions of this message have been removed] 1714 From: James M. Atkinson, Comm-Eng Date: Sun Oct 15, 2000 5:11pm Subject: Re: Spy cameras and night vision goggles from Spy World COMPUTER SNOOP At 5:57 PM -0400 10/15/00, Andre Holmes wrote: > http://www.spyworld.com/Surveil1.htm In a nutshell.... don't be ridiculous. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1715 From: James M. Atkinson, Comm-Eng Date: Sun Oct 15, 2000 5:17pm Subject: Re: Monitoring violation prosecution At 10:02 PM +0100 10/14/00, Justin T. Fanning wrote: >Steve and/or others, > >What specifically are the charges? > >I don't know that site, is it some type of remote control >receiver <-> Real audio gateway, is that illegal now?! > > >Justin T. Fanning >Justin@f... > >--- > >Steve Uhrig wrote: > > > > Anyone who doesn't believe investigation and prosecution won't > > happen to those who monitor things they shouldn't should check > > this page: > > > > http://www.policescanner.net/ > > > > A number of people are biting their tongues trying not to tell > > him "We told you so". > > > > Because this is an open investigation, no additional details > > will be discussed. > > > > Steve My understanding is that if you monitor a radio transmission and then undertake any effort to disclose it to other, or to distribute it in any way that you are committing a criminal act under federal law. For example, if during a TSCM sweep you encounter a very high power transmission and while evaluating it you overhear a discussion you can not legally disclose that conversation to anyone else. Not only would it be a violation of federal law, it would also be highly unethical. If you have a scanner, then keep you mouth shut about what you hear. Remember, unless it is a "public broadcast station", or that specific signal in a "public broadcast" then you must keep mum over it. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1716 From: James M. Atkinson, Comm-Eng Date: Sun Oct 15, 2000 5:27pm Subject: Re: VIRUS ALERT in "Monitoring violation prosecution" At 12:16 AM -0400 10/15/00, lafonj@a... wrote: >ATTN: > >STEVE...Whoever sent you this address for "www.POLICESCANNER.COM"... >HAS A VIRUS IN IT.......CALLED......"LLCOOL". > >You need to contact everyone you sent mail to and warn them of this VIRUS. >I have McAfee VirusScan thank God, I hope all others have something too, and >don't lose their data. > >JML I double checked... Steve's posting did not contain any kind of executable code, and as such any virus you received DID NOT come from this list or from Steve. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1717 From: James M. Atkinson, Comm-Eng Date: Sun Oct 15, 2000 5:30pm Subject: Re: Parliament sweep At 8:42 PM +0200 10/15/00, A Grudko wrote: >Perhaps of interest to TCSMers and the intelligence community re. the >'bugging' of politicos; perhaps nonsense.... > >Jo'burg Sunday Times - 15 Oct 2000, p20, Hogarth editorial column. > >Quote- > >'It's no coincidence that Parliament was swept for bugs this week, 2 weeks >after newspapers revealed the astonishing goings on in the ANC's >confidential caucus, including President Thabo Mbeki's conspiracy theory on >the CIA plot to discredit him. Since the reports appeared, several ANC MPs >have pointed their paranoid fingers at journalists, claiming that their >reports were so accurate that they must have bugged the caucus room - which >can only mean that the claims by the ANC that the reports were unfounded are >untrue.' >- end quote. > >Unedited. No comment. Andy, It's not at all nonsense, politicians are someone who are perceived as having power and influence, and as such someone in such a situation who believes that an eavesdropper is targeting them would be quite rational. While they may be basing their articulated suspicions on something that may not be rational (such as a buzzing in their ears), but the probability of them being targeted with technical eavesdropping is. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1718 From: Steve Uhrig Date: Sun Oct 15, 2000 5:00pm Subject: Re: VIRUS ALERT in "Monitoring violation prosecution" Once upon a midnight dreary, lafonj@a... pondered, weak and weary: > STEVE...Whoever sent you this address for > "www.POLICESCANNER.COM"... HAS A VIRUS IN > IT.......CALLED......"LLCOOL". > You need to contact everyone you sent mail to and warn them of > this VIRUS. I have McAfee VirusScan thank God, I hope all others > have something too, and don't lose their data. You have problem locally, or from some other source. I sent one original message generated by me, and one message only, to the list server which distributes the message. You get the message from the list server (egroups in this case), not me. I am certain they would not echo a virus even if one was riding on a message posted to them. I did not forward the message from anyone else. Unless the message you reference was the only one you downloaded during that particular online session (unlikely), how can you point to one specific message as the culprit? In any event, my system is clean beyond any question. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1719 From: James M. Atkinson, Comm-Eng Date: Sun Oct 15, 2000 7:55pm Subject: Re: Further on atomic clock At 8:21 AM -0400 10/9/00, Steve Uhrig wrote: >I just learned the seller has set up a webpage with info on the >atomic clock I recommended: > >http://cboss.com/jam/aa-clock.htm > >Worth checking out. > >Steve http://www.bldrdoc.gov/timefreq/service/acts.htm If you would like to keep the time updated on your computer, you can download the NIST TIME ACTS for your computer. With this program running in the background, it will automatically update and keep your time and date current on your computer as long as you are connected to the Internet. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1720 From: Steve Uhrig Date: Mon Oct 16, 2000 0:31am Subject: New U.S. Gov't Encryption Standard Rijndael, pronounced "Rhine Dahl," was unveiled by the National Institute of Standards and Technology (NIST) Oct. 2 as the new algorithm to be used as the government's encryption standard for the 21st century. It will most likely become standard by early spring 2001, and it will be available for commercial use as the suggested standard for encryption, not as the required. Named for its Belgian creators, Joan Daemen and Vincent Rijmen, it will replace the Data Encryption Standard (DES) that had been in place since 1977. Rijndael, aka. the Advanced Encryption Standard (AES) utilizes three key bit sizes: 128, 192 and 256 bits -- a vast improvement over DES's 56-bit encryption. How much better is AES than the aging DES? Current DES cracking machines take hours to crack DES keys. If they could crack DES in one second, it would still take 149 trillion years to crack Rijndael. That's nearly 7,000 times the estimated age of the universe. NIST says, "barring any attacks against AES that are faster than key exhaustion ... AES has the potential to remain secure well beyond twenty years." ------------------------------------------ Steve's suppository remarks: I dispute the government's claim that it takes hours to crack DES keys. I believe that is a red herring used to make people think DES-encrypted data is secure. 149 trillion years may be true by brute force cracking. However, that generally is not the method used by the Real People. Social engineering and keystroke logging are two that are infinitely more effective, and the complexity of the algorithm, or ten to the 40th bit keys, don't make much difference against these efforts. Look at the last sentence in the above article. NIST leaves themselves an out on this one. Think beyond the envelope on things like this. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1721 From: Miguel Puchol Date: Mon Oct 16, 2000 5:42am Subject: RE: Bugging spying - Special Electronic Security Products Ltd. All, This shows how stories get changed as they go around...from an exchange regarding the legality of using a phone-disturbing device to being prosecuted for it - a rather big difference me thinks. Answering your question, I suppose that just like any other country with a developed telecomms law, it would be illegal to use these devices in the UK. Wether law-enforcement agencies could use them is another question, some countries allow these agencies full use of most technologies, while others severely restrict them too. In my case I can tell you that the test we conducted was OK in this aspect, only I cannot tell more details. And I certainly have not been prosecuted for this. Cheers all, Mike > -----Mensaje original----- > De: Talisker [mailto:Talisker@n...] > Enviado el: domingo, 15 de octubre de 2000 12:57 > Para: TSCM-L@egroups.com > Asunto: Re: [TSCM-L] Bugging spying - Special Electronic Security > Products Ltd. > > > Andre > > Thanks for the link, it's just what the doctor ordered, are there > any other > products with a similar function. My main concern is the > legality of their > use, I heard of someone being prosecuted for using one on a train. Any > thoughts? especially for the UK 1722 From: Date: Sun Oct 15, 2000 4:09pm Subject: Re: Re: VIRUS ALERT in "Monitoring violation prosecution" Glad to hear it is OK on your end,......Virus scares are happening too often lately, and however I got it, I didn't think it could have come from the "Egroups" site, knowing our industry, etc. Take care, Joe 1723 From: Date: Sun Oct 15, 2000 4:03pm Subject: Re: VIRUS ALERT.......reply... Hello James: When I went to the "www.policescan" web-site mentioned in Steve's mail and got the download, I got an immediate Warning that, that site had the "LLCOOL" Virus warning. I just wanted to pass the info on that someone might have hacked in on that site and played with it. IF NOT,......excuse my concern, but none of us need to get that surprise. If you did not get a warning, then I don't know what happened that made me get it. Sorry for the scare, but thought it was happening to anyone who went to that site. If not, I'll have my PC ck'd for anything new & unwanted, on this end. Take care. Joe LaFon Corporate Security Systems Inc. Winter Springs, FL. 32708 (407) 327-2774 E-mail........< lafonj@a... > 1724 From: James M. Atkinson, Comm-Eng Date: Mon Oct 16, 2000 7:48am Subject: Re: VIRUS ALERT.......reply... At 9:03 PM -0400 10/15/00, lafonj@a... wrote: >Hello James: > >When I went to the "www.policescan" web-site mentioned in Steve's mail and >got the download, I got an immediate Warning that, that site had the >"LLCOOL" Virus warning. I just wanted to pass the info on that someone >might have hacked in on that site and played with it. IF NOT,......excuse >my concern, but none of us need to get that surprise. If you did not get a >warning, then I don't know what happened that made me get it. > >Sorry for the scare, but thought it was happening to anyone who went to that >site. >If not, I'll have my PC ck'd for anything new & unwanted, on this end. > >Take care. > >Joe LaFon >Corporate Security Systems Inc. >Winter Springs, FL. 32708 >(407) 327-2774 >E-mail........< lafonj@a... > > Ah... So there could in fact be a problem with the downloadable files on the website that was mentioned, but there NOT any kind of problem with the mailing list. All kinds of mischief can happen when you visit someone's website, but on the other hand anti-vius software often sounds off simply because it doesn't like a chuck of Java code. There are some things that websites can and can not do, and things that mailing lists can and can not do... so please be careful when you post virus alerts. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1725 From: the cynic Date: Mon Oct 16, 2000 0:11pm Subject: Re: Re: VIRUS ALERT in "Monitoring violation prosecution" test 1726 From: James M. Atkinson, Comm-Eng Date: Mon Oct 16, 2000 11:19am Subject: Re: Re: VIRUS ALERT in "Monitoring violation prosecution" At 12:11 PM -0500 10/16/00, the cynic wrote: >test Beep... you mission should you choose to except it.. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1727 From: Rick Hofmann - MICROSEARCH Date: Mon Oct 16, 2000 10:37pm Subject: Third generation wireless telephones Following is a link to a transcript of a White House briefing about third generation wireless telephones which will have built in Internet capability. http://www.pub.whitehouse.gov/uri-res/I2R?urn:pdi://oma.eop.gov.us/2000/10/1 6/11.text.1 Very truly yours, R.C.Hofmann, CCO, CPP MICROSEARCH - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 PI16998 [Non-text portions of this message have been removed] 1728 From: Miguel Puchol Date: Tue Oct 17, 2000 2:53am Subject: Bluetooth dead... Hi all, The rumors are still unconfirmed, but it appears that the whole BlueTooth affair has been thrown into the circular filing cabinet (the bin). Apparently, security has been the main issue. It has been shown in various tests that the security of devices using this technology to transfer information is very low and can be defeated with very simple means - rendering them useless. A lot of money wasted, back to the drawing board. This reminds me of the thread regardig IrDA enabled laptops and information leaks. All the best, Mike 1729 From: William Knowles Date: Tue Oct 17, 2000 4:00am Subject: Music not to TSCM by... Just out of wild curiosity I wondering what kind of music the TSCM community would annoy any party bugging a client? Its a semi-serious question being that I love JMA's addition of humor here and there to the list, But I'm wondering what to play when I have unaccounted white van(s) with lots of antennas (Used Icom's) and a periscope on top parked down the street from the office. :) So I have heard this much.... Def Leppard's cover of Release Me Techno-Bagpipe music The soundtrack to Jesus Christ Superstar East German Rave noise Any other suggestions? Thanks! :) William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 1730 From: Miguel Puchol Date: Tue Oct 17, 2000 4:22am Subject: RE: Music not to TSCM by... William, Add to the list arab rap music - I think it even melts standard magnetic tapes, so it can only be played from vinyl or CD :-) I was exposed to it once and I can say my inner-ear changed forever... Cheers, Mike > -----Mensaje original----- > De: William Knowles [mailto:wk@c...] > Enviado el: martes, 17 de octubre de 2000 11:01 > Para: TSCM-L@egroups.com > Asunto: [TSCM-L] Music not to TSCM by... > > > Just out of wild curiosity I wondering what kind of music the TSCM > community would annoy any party bugging a client? > > Its a semi-serious question being that I love JMA's addition of humor > here and there to the list, But I'm wondering what to play when I have > unaccounted white van(s) with lots of antennas (Used Icom's) and a > periscope on top parked down the street from the office. :) > > So I have heard this much.... > > Def Leppard's cover of Release Me > Techno-Bagpipe music > The soundtrack to Jesus Christ Superstar > East German Rave noise > > Any other suggestions? > > Thanks! :) > > William Knowles > wk@c... > > > *==============================================================* > "Communications without intelligence is noise; Intelligence > without communications is irrelevant." Gen Alfred. M. Gray, USMC > ================================================================ > C4I.org - Computer Security, & Intelligence - http://www.c4i.org > *==============================================================* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > 1731 From: Date: Tue Oct 17, 2000 5:50am Subject: Re: Music not to TSCM by... I personally use Pink Floyd's THE WALL Steve Preflatish ACM ----- Original Message ----- From: William Knowles To: Sent: Tuesday, October 17, 2000 4:00 AM Subject: [TSCM-L] Music not to TSCM by... > Just out of wild curiosity I wondering what kind of music the TSCM > community would annoy any party bugging a client? > > Its a semi-serious question being that I love JMA's addition of humor > here and there to the list, But I'm wondering what to play when I have > unaccounted white van(s) with lots of antennas (Used Icom's) and a > periscope on top parked down the street from the office. :) > > So I have heard this much.... > > Def Leppard's cover of Release Me > Techno-Bagpipe music > The soundtrack to Jesus Christ Superstar > East German Rave noise > > Any other suggestions? > > Thanks! :) > > William Knowles > wk@c... > > > *==============================================================* > "Communications without intelligence is noise; Intelligence > without communications is irrelevant." Gen Alfred. M. Gray, USMC > ================================================================ > C4I.org - Computer Security, & Intelligence - http://www.c4i.org > *==============================================================* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1732 From: Steve Uhrig Date: Tue Oct 17, 2000 5:44am Subject: Do it yourself sweeps for USD $42.95 https://gw.moonlink.net/kk6yo/scripts/shoppingcart/plusguard.htm I guess we all need to find another way to earn a living. At least the manufacturer is honest and admits many false alarms from normal environmental signals. How many lunatics will panic when their digital can opener trips this thing? Maybe we all should buy some and hand them out free so we can chase down subsequent work. One PI in MD gives her corporate clients their own bug detectors so she can take them for a ride with a full blown CCS sweep when the detectors light up all over. The manufacturer of the product referenced above has listed ham radio suppliers as dealers. While many professional sweepers are hams (I am WA3SWS first licensed in 1971), hobby radio experience is merely one of many useful qualifications one can use to develop a background in basic electronics and communications theory before even beginning to study TSCM. One of the concerns discussed at the BECCA conference last week was the introduction of relatively inexpensive IPM (In Place Monitoring) systems being marketed through electronic security channels. Several members evaluated one such piece and found it to be essentially worthless. But alarm companies and other like outfits with no understanding of the matter can peddle these to corporate clients who may think they are protected. Pretty soon, we might see everybody claiming to be in "security" offering these things, and the market will be whored out. I believe the best defense the professional TSCM community can present is to educate the consumer. Teach them how useless the DIY (Do It Yourself) boxes are, and the need to engage a qualified and competent professional. Educate them, but don't insult them. Persons buying useless products or services many times do not know any better, so you can't blame them. You can offer them accurate information and alternative sources for the real thing. We need to educate the security types also, so the honest ones at least will realize TSCM is not a job alarm types, PIs or guard services automatically qualify for merely by virtue of having some sort of license. Or spy catalog. Or business card. Jim's site www.tscm.com is a big help. So will be articles, white papers, case histories and the like individual members can post on their websites, contribute to industry publications, speak at attorney, PI and other related associations. If you've written something, post a link to it so we can keep a list of resources to offer to people who inquire. I will start, by mentioning some articles I wrote years ago, posted on our website in the Articles section. Look for the article "This Bug's For You". It will take years for these efforts to effect any results, but the time is going to pass anyway whether we do or not. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1733 From: James M. Atkinson, Comm-Eng Date: Tue Oct 17, 2000 6:46am Subject: Re: Music not to TSCM by... At 4:00 AM -0500 10/17/00, William Knowles wrote: >Just out of wild curiosity I wondering what kind of music the TSCM >community would annoy any party bugging a client? > >Its a semi-serious question being that I love JMA's addition of humor >here and there to the list, But I'm wondering what to play when I have >unaccounted white van(s) with lots of antennas (Used Icom's) and a >periscope on top parked down the street from the office. :) > >So I have heard this much.... > >Def Leppard's cover of Release Me >Techno-Bagpipe music >The soundtrack to Jesus Christ Superstar >East German Rave noise > >Any other suggestions? > >Thanks! :) > >William Knowles >wk@c... Copy Machine Noise Vacuum Cleaner Sounds Political Debates Late Night Infomercials or, if your really feeling mean... Klingon Opera ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1734 From: A Grudko Date: Tue Oct 17, 2000 7:53am Subject: Re: Music not to TSCM by... ----- Original Message ----- > Add to the list arab rap music - I think it even melts standard magnetic > tapes, so it can only be played from vinyl or CD. But seriously, we have various sound source tapes. Recorded in real situations on DAT and copied to a standard tape so that any tape player can be used, including: Office party Busy office Factory machinery Cleaner vaccuming Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1735 From: Bob Washburne Date: Tue Oct 17, 2000 9:04am Subject: Re: Music not to TSCM by... Anything by the group Jus De. (Swedish rap). Just the threat of this is usually enough to get people out of bed in the morning. Conlon Nancarrow can be extremely annoying to people who expect music to have a melody, but there are too many soft or open spots to properly mask a conversation. Dr. Demento collections/novelty recordings. Not only will the humor distract the listener, but it is liable to rub off and annoy everyone else back in the office. While driveing south to Atlanta I found a radio station which was 100% "Buzz" guitar. Tammy Fay Bakker. (Note: The use of Tammy Fay Bakker may be conciddered cruel and unusual punishment and may be illeagal in some countries.) The only problem with all of this is: how do you protect the client from brain damage? Bob Washburne - Who actually owns all of the above. William Knowles wrote: > > Just out of wild curiosity I wondering what kind of music the TSCM > community would annoy any party bugging a client? > 1736 From: Date: Tue Oct 17, 2000 8:46am Subject: Using a Bit of 007 to Keep Spies in Check - not trading in my screwdriver This From: The New York Times, October 16, 2000 http://www.nytimes.com Using a Bit of 007 to Keep Spies in Check http://www.nytimes.com/2000/10/16/technology/16SCAN.html By MATT RICHTEL For those who have ever had the sneaking suspicion that someone is spying on them, Mick W. Stwertnik is selling a device to help them figure out whether they have valid concerns or need to consider counseling. The Plus Guard, a hand-held gadget the size of a makeup compact, lets use rs scan their surroundings for hidden audio bugs or wireless miniature cameras that may be capturing sounds or pictures. When such a surveillance device is in the area, a red light goes on and an alarm on the Plus Guard sounds. "For example, if somebody hides a hidden camera transmitter in your bedroom or bathroom, this device will pick up the transmission and tell you there's a camera," said Mr. Stwertnik, vice president for sales at the NCG Company in Anaheim, Calif., which sells the surveillance snooper for $42 (www.theplusguard .com). But the question is, just how prevalent are hidden cameras? Is each home, hotel room or public restroom a potential set for Big Brother? Mr. Stwertnik insists that the use of hidden devices will become more prevalent as the cost of surveillance equipment drops. Not long ago, he said, miniature wireless cameras were $2,000 to $3,000 but now can be bought for $300 or less. Potential customers for the Plus Guard, he said, might include people concerned that their former spouses seem to know too much about their private lives or parents worried about their children at college who must share a dormitory suite and bathroom. But Mr. Stwertnik's own anecdotal evidence has not uncovered rampant surveillance of friends, neighbors and strangers. In the two months since Mr. Stwertnik began United States distribution of the Plus Guard, which is made by a Tokyo company, Ram Electronics, he has sold 100 of the gadgets. So far, he has received no reports of customers' uncovering hidden cameras or bugs. But it is only a matter of time, he insisted. Don't say you haven't been warned. Copyright 2000 The New York Times Company 1737 From: James M. Atkinson, Comm-Eng Date: Tue Oct 17, 2000 0:59pm Subject: Re: Using a Bit of 007 to Keep Spies in Check - not trading in my screwdriver At 1:46 PM -0400 10/17/00, MACCFound@a... wrote: >This From: The New York Times, October 16, 2000 >http://www.nytimes.com > >Using a Bit of 007 to Keep Spies in Check >http://www.nytimes.com/2000/10/16/technology/16SCAN.html > >By MATT RICHTEL > >For those who have ever had the sneaking suspicion that someone is spying > on them, Mick W. Stwertnik is selling a device to help them figure out >whether >they have valid concerns or need to consider counseling. > >The Plus Guard, a hand-held gadget the size of a makeup compact, lets use >rs scan their surroundings for hidden audio bugs or wireless miniature cameras >that may be capturing sounds or pictures. When such a surveillance device >is in the area, a red light goes on and an alarm on the Plus Guard sounds. > >"For example, if somebody hides a hidden camera transmitter in your bedroom >or bathroom, this device will pick up the transmission and tell you there's >a camera," said Mr. Stwertnik, vice president for sales at the NCG Company >in Anaheim, Calif., which sells the surveillance snooper for $42 >(www.theplusguard .com). [snip] I obtained one of these units over a year ago and performed a formal evaluation on it. It is (in my professional opinion) a piece of utterly worthless excrement, with virtually no value as a "bug detection" device. Of course the spy shops are going to sell the dickens out of then (at a hefty markup), but they are nothing then a toy suitable for free giveaway key fobs and little else. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1738 From: James M. Atkinson, Comm-Eng Date: Tue Oct 17, 2000 6:33pm Subject: Business spy threat is real, former CIA chief says Business spy threat is real, former CIA chief says http://www.infoworld.com/articles/hn/xml/00/10/17/001017hnspy.xml By Margret Johnston THREATS TO THE security of business information are numerous and they come from all directions, including organized crime syndicates, terrorists and government-sponsored espionage, and most global high-technology companies have little idea of the array of hostile forces targeted against them, a former U.S. director of intelligence said Monday. U.S. businesses that are increasingly expanding their operations into foreign lands are finding the situation challenging because the nature of such threats and how to protect against them is not taught in business school, said Robert Gates, director of the Central Intelligence Agency (CIA) from 1991 to 1993. Some of the threats might be obvious, as well as the strategies that companies can mount against them, but others might not be so cut and dried, said Gates, who delivered the keynote address to an international gathering of information security specialists at a two-day conference in Washington sponsored by the Arlington, Virginia-based Information Technology Association of America. In a world in which countries measure themselves in terms of economic might, many intelligence services around the world are shifting their emphasis and their targets to business, Gates said. Government-sponsored intelligence operations against companies seek information about bids on contracts, information that affects the price of commodities, financial data and banking information. "They want technological production and marketing information, and they usually share what they get with their country's companies. To get this sensitive information, government intelligence services use many of the techniques developed during the Cold War," said Gates, who is now dean of the George Bush School of Government and Public Service at Texas A&M University. That includes bugging telephones and rifling through papers left in hotel rooms by visiting businessmen and businesswomen. In addition government intelligence services are known to plant moles in companies and steal or surreptitiously download files from unsecured computers. Several also have "highly sophisticated signal intelligence capabilities" to intercept even encrypted company communications. Messages that are not encrypted with the latest technology are especially vulnerable. These include both telecommunications and computer communications, including e-mail, the former CIA director said. Though the French intelligence service is "probably the most egregious offender," it is far from alone, Gates said. Russia, China, South Korea, India, Pakistan, Germany, Israel and Argentina all have some type of intelligence-gathering operation for the benefit of companies in their countries, and Gates said many more countries are doing the same. The U.S., however, is not among them. "I can assure you that no American intelligence agency conducts industrial espionage against foreign companies to advantage U.S. companies," he said. "What we do is support the efforts of our own government, and that information is not shared with American companies." Reports originating in Europe, especially France, that the U.S. is using signal intelligence capabilities as part of a program called Echelon to attack European companies to the economic advantage of U.S. companies are "simply not true," he said. Another threat comes from the dozens of intelligence services in developing countries that have profited from the training they received from the Soviet Union, Eastern European countries and the CIA during the Cold War. The result of this history is that "the reservoir of professionally trained intelligence mercenaries is growing." Other threats include terrorism, organized crime and inside operations carried out by disgruntled employees and hackers. Some of these groups are looking for the greatest amount of destruction, and an attack on the critical information infrastructure of the U.S. would satisfy that goal. "Business needs to understand that the criminal and terrorist threat worldwide is changing and is now both more sophisticated and more dangerous than anyone would have thought," Gates said. Vulnerabilities that all the different types of attackers exploit include open systems, plug-and-play systems, centralized remote maintenance of systems, remote dial-in and weak encryption. But he said companies can provide substantial information security protection for relatively low cost. He suggested companies review security measures in sensitives areas of their operations such as research and development, talk to traveling executives who carry company laptops about using precautions to prevent theft and examine communications with overseas facilities with an eye toward installing commercially available encryption that is all but impossible to crack. The new algorithm recently approved by the U.S. Commerce Department, for example, is so strong that it would take an estimated 149 trillion years to unscramble, he said. Gates also said company executives should limit physical access to sensitive data and programs and regularly change computer passwords. "It's all obvious, but every one of you knows how many companies are lax in their actual implementation," Gates said. A basic rule is to take time to identify company critical information, whether it is technology, a production technique, basic research and development, financial information or marketing strategy, and take steps to protect it. "What is required first is simply awareness by CEOs and boards of directors that there is a threat and then respond using a common-sense way to protect themselves," Gates said. "These are measures that make good business sense even if you are not a target of a government intelligence service, a competitor, a criminal organization, a terrorist or a hacker." Margret Johnston is a Washington correspondent for the IDG News Service, an InfoWorld affiliate. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1739 From: Bryan Herbert Date: Tue Oct 17, 2000 1:09pm Subject: Re: Music not to TSCM by... There is a track on Daft Punk's Homework album (Techno/House) that contains continuous scratch and break beats along with a variable 80-220bpm symthesized bass drum in the background, its sure to annoy the hell out of any non-raver. William Knowles wrote: > Just out of wild curiosity I wondering what kind of music the TSCM > community would annoy any party bugging a client? > > Its a semi-serious question being that I love JMA's addition of humor > here and there to the list, But I'm wondering what to play when I have > > unaccounted white van(s) with lots of antennas (Used Icom's) and a > periscope on top parked down the street from the office. :) > > So I have heard this much.... > > Def Leppard's cover of Release Me > Techno-Bagpipe music > The soundtrack to Jesus Christ Superstar > East German Rave noise > > Any other suggestions? > > Thanks! :) > > William Knowles > wk@c... > > > *==============================================================* > "Communications without intelligence is noise; Intelligence > without communications is irrelevant." Gen Alfred. M. Gray, USMC > ================================================================ > C4I.org - Computer Security, & Intelligence - http://www.c4i.org > *==============================================================* > > > eGroups Sponsor > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 1740 From: Al Arango Date: Tue Oct 17, 2000 6:02pm Subject: Re: Music not to TSCM by... At 04:00 AM 10/17/2000 -0500, you wrote: >Just out of wild curiosity I wondering what kind of music the TSCM >community would annoy any party bugging a client? Disney's "It's a small world after all" and other great hits from that collection. or pickup some of those self-hypnosis tapes 1741 From: A Grudko Date: Wed Oct 18, 2000 2:05am Subject: Re: Parliament sweep ----- Original Message ----- > While they may be basing their articulated suspicions on something > that may not be rational (such as a buzzing in their ears), but the > probability of them being targeted with technical eavesdropping is. > -jma Indeed. There is a local spin in that our politicians are not voted into parliament, but are appointees, frequently with no experience in their portfolio topics. In the last few years the press have shown many of these public employees are incompetant and that some even have forged qualifications. Therefore some in parliament would love to shout out that the press had placed those hallowed chambers under illegal technical surveillance, even if they had no evidence. The result of the sweep was not made public. In all probability the press received their intelligence from a conventional human leak. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" From: Matt Paulsen Date: Tue Oct 15, 2002 8:57pm Subject: RE: Virus sent from TSCM-L@j... Hi all, To detect the originator, please ignore the email address, and check the IP address. If it is masked, it is forged and cannot be traced. Most systems will ID a forged email and make a note about it not being a verifiable address in the header. I've already contacted and heard back from Bill, the owner of the ISP and he's notified the customer of a virus infection. If anyone needs antivirus consulting, I have a background in enterprise antivirus services. We're McAfee Security authorized. Thanks, Matt Paulsen President/CEO Orange Networks LLC http://www.orange-networks.com P: 503.892.8786 F: 503.892.8794 Remotely Hosted Terminal Services! Don't Buy Expensive Hardware or Software! Just use ours for a low monthly fee! http://www.orange-networks.com/remoteoverview.htm -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Tuesday, October 15, 2002 12:05 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Virus sent from TSCM-L@j... The virus is not actually coming from the list, but coming from someone using the email address of "TSCM@j... " (note there is no "-L"). "TSCM@j... " is in fact a member of this list, and the virus came from HIS COMPUTER, but not from the list. -jma At 8:02 AM -0400 10/15/02, zack wrote: >Someone is sending a virus, not on this list I belive, but please note the >from line : From: >Subject: [TSCM-L] Digest Number 290 You might mistake it from our list >and open it. > > > >Received: from mail.pro-ns.net (user2.pro-ns.net [208.200.182.45]) > by www.copscops.com (8.10.2/8.10.2) with ESMTP id g9F2Cfg18418 > for <10-33@c...>; Mon, 14 Oct 2002 22:12:41 -0400 >Received: from djai2 (d232.pro-ns.net [208.200.182.179]) > by mail.pro-ns.net (8.12.6/8.12.5) with SMTP id g9F251nN087276; > Mon, 14 Oct 2002 21:05:17 -0500 (CDT) > (envelope-from TSCM-L@j...) >Date: Mon, 14 Oct 2002 21:05:01 -0500 (CDT) >Message-Id: <200210150205.g9F251nN087276@m...> >From: >Subject: {VIRUS DETECTED} [TSCM-L] Digest Number 290 >MIME-Version: 1.0 >content-type: multipart/mixed; boundary="----------QJJSREYCJT3AFBO" >To: undisclosed-recipients:; >X-MailScanner: Found to be infected >X-UIDL: &)(!!kEF!!5j^!!PR2!! >Status: U > >------------QJJSREYCJT3AFBO >Content-Type: text/html; >Content-Transfer-Encoding: quoted-printable > >

Warning: This message ha= >s had one or more attachments removed. Please read the "VirusWarning.txt" a= >ttachment(s) for more information.

> > > > >------------QJJSREYCJT3AFBO >Content-Type: text/plain; charset="us-ascii"; name="VirusWarning.txt" >Content-Disposition: inline; filename="VirusWarning.txt" >Content-Transfer-Encoding: quoted-printable > >This is a message from the MailScanner E-Mail Virus Protection Service >---------------------------------------------------------------------- >The original e-mail attachment "The Basicsfinal.doc.scr" >was believed to be infected by a virus and has been replaced by this warning >message. > >Due to limitations placed on us by the Regulation of Investigatory Powers >Act 2000, we were unable to keep a copy of the infected attachment. > >If you know who sent the message please notify them of this Virus Protection >message and ask them to disinfect their original version and send you a cle= >an copy. > >If this is from an unknow or bogus source please notify abuse.com >so we can add them to the server ban list. > >At Mon Oct 14 22:12:49 2002 the virus scanner said: > /home/spool/MailScanner/incoming/g9F2Cfg18418/The Basicsfinal.doc.scr I= >nfection: W32/Bugbear.A@mm > Windows Screensavers often hide viruses in email in The Basicsfinal.doc.= >scr > >--=20 >Postmaster > >------------QJJSREYCJT3AFBO-- > > >visit http://www.copscops.com >Washington DC Police Department http://mpdc.dc.gov/main.shtm > >"Unity... Resolve... Freedom. These are the hallmarks of the American spirit." > George W Bush > >God Bless The USA .. NEVER forget 9-11-01 >http://www.copscops.com/blessusa.htm > -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- Vocatus atque non vocatus deus aderit ---------------------------------------------------------------------------- ---------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6394 From: James M. Atkinson Date: Tue Oct 15, 2002 11:56pm Subject: Listening Device Found on Candidate's Phone http://www.sltrib.com/10142002/utah/6911.htm Listening Device Found on Candidate's Phone The Salt Lake Tribune | Associated Press Monday, 14 October, 2002 Campaign officials for Democratic congressional candidate Dave Thomas told state investigators that a listening device was discovered on one of Thomas' phone lines. Ryan Hawkins, campaign manager for the 1st Congressional District candidate, said a Qwest repairman found "some kind of listening device" on a phone line at the Cache County Democratic Office during routine service Wednesday. The phone line is paid for by Thomas' campaign. The discovery was reported to the state's Criminal Investigations Bureau the following day, Hawkins said. A message left at the bureau was not immediately returned on Sunday. Pending an official investigation, the phone line will continue to be used to promote Thomas in northern Utah, Hawkins said. Thomas is running against Republican Rob Bishop for the seat being vacated by Rep. Jim Hansen, R-Utah. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6395 From: kondrak Date: Wed Oct 16, 2002 4:10am Subject: Bugbear side effect hits printers Bugbear update: >http://www.vnunet.com/News/1135719 > >By Iain Thomson [07-10-2002] > >Networked devices spewing out pages of binary code Bugbear infections >look to be levelling off slowly, but the worm's faulty code is having >an unexpected side effect. > >Antivirus companies Sophos and Network Associates have both reported a >slow down in infection detection, but overall the worm will top the >threat charts for this month. > >However, a bug in the worm has meant that networked printers are being >affected. In some cases the first a company has known about the >infection is when the machines start spewing out pages of gibberish. > >"Most virus writers aren't geniuses and this one is no exception," >said Graham Cluley of Sophos. > >"A fault in the code means that the virus identifies network printers >as potential hosts and sends code to them. > >"The printer then tries to print the code in binary format, which >comes out as gibberish. It doesn't harm the printers but the >stationary costs are an added annoyance." > >Bugbear disables antivirus and firewall software and installs a Trojan >keystroke logger as a DLL, detected as PWS-Hooker.dll. > >Anything the PC user types via the keyboard, such as passwords or >sensitive information, is sent to the originator of the worm via the >TCP port 36794. > >The worm also seeks to infect all other PCs on the network via the >address book and network shares. > >It also takes advantage of a longstanding Microsoft exploit, >MS-01/020, as did Klez. A patch for this has been available since >March 2001 and can be found here [1]. > >Sophos has made a free Bugbear removal tool available here [2] that >will work with any PC. > >[1] >http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS01-020.asp >[2] http://www.sophos.com/support/bugbear.html 6396 From: kondrak Date: Wed Oct 16, 2002 5:20am Subject: Celebrity 'phone hacking' on the increase From the UK: >http://media.guardian.co.uk/newmedia/story/0,7496,810374,00.html > >Julia Day >Monday October 14, 2002 > >PR advisers to the rich and famous are warning their clients to be on >their guard amid claims that journalists are resorting to increasingly >underhand methods to hack into celebrities' mobile phones. > >As competition for celebrity stories increases, unscrupulous >journalists are using hacking techniques to beat their rivals to >scoops. > >According to one well known PR man, some journalists are even tapping >into phones to sabotage their rivals' chances in story bidding wars by >deleting messages. > >Hacking into strangers' mobile phone voicemail boxes is a relatively >simple process but can only be used if the mobile phone user has not >personalised his or her voicemail access code. > >"There is a certain element in Fleet Street that sees this as a new >form of investigative journalism and it's getting worse," said James >Herring of Taylor Herring Communications, whose clients include >Richard Madeley and Judy Finnigan, Neil Morrissey and Caroline >Feraday. > >"We always advise our clients to change the default pin number on >their mobile phones straight away as this bars strangers from >accessing their voicemail. > >"But now not only are celebrities being targeted, as journalists trawl >for stories, but so are the people negotiating bids for stories. > >"Newspapers are accessing people's voicemails and deleting the >messages left by their rivals. > >"This started as a dirty tricks ploy by the red-top Sunday papers but >voicemail espionage has become epidemic." > >Oliver Wheeler of Freud Communications, whose clients include Natalie >and Nicole Appleton and Geri Halliwell, said the tabloids were not the >only ones indulging in the practice. > >"I advised all our clients to make sure they changed their pin numbers >after I saw a journalist accessing someone else's voicemail. I was >stunned - he was a senior business journalist," said Mr Wheeler. > >James Hipwell, the former Daily Mirror City Slicker, who now works for >celebrity PR guru Max Clifford, said this tactic was now common >practice in Fleet Street. > >"There are many stories every week - mainly showbusiness - that >couldn't have been got by any other means," he said. > >"It's underhand and it's not encouraged but it is common practice and >everyone does it." 6397 From: Bugdetector Date: Tue Oct 15, 2002 3:11pm Subject: Re: Virus sent from TSCM-L@j... I got an E-mail with virus from: TSCM-L@j... ----- Original Message ----- From: Elliott & Associates, Ltd. To: ; James M. Atkinson Sent: Tuesday, October 15, 2002 4:38 PM Subject: Re: [TSCM-L] Virus sent from TSCM-L@j... > Actually I got my copy of the virus from > > TSCM-L@g... > > > > There is the very real possibility that the address is being spoofed. > > > Bill Elliott, CII > ELLIOTT & ASSOCIATES, Ltd. (GMT -6) > http://www.prvt-eye.com > http://www.cybercrimeinternational.com > > > > > ----- Original Message ----- > From: "James M. Atkinson" > To: > Sent: Tuesday, October 15, 2002 1:05 PM > Subject: Re: [TSCM-L] Virus sent from TSCM-L@j... > > > > > > The virus is not actually coming from the list, but coming from > > someone using the email address of "TSCM@j... " (note there is > > no "-L"). > > > > "TSCM@j... " is in fact a member of this list, and the virus came > > from HIS COMPUTER, but not from the list. > > > > -jma > > > > > > > > > > At 8:02 AM -0400 10/15/02, zack wrote: > > >Someone is sending a virus, not on this list I belive, but please note > the > > >from line : From: > > >Subject: [TSCM-L] Digest Number 290 You might mistake it from our list > > >and open it. > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 6398 From: Steve Uhrig Date: Wed Oct 16, 2002 9:00am Subject: Gov't TSCM needed at various locations in Las Vegas and Andrews AFB (MD). Interestingly, they provide all equipment (Mason A3; a favorite of these guys?). All they want to buy is trained bodies. They even provide office space, office equipment, software, etc. Just show up in your underwear and they take it from there. http://www.eps.gov/spg/DOE/PAM/HQ/DE-RP08-02NV14328/SynopsisR.html They appear to think it will be a long term and full time project, as the initial contract will be for one year, with up to four 1 year options. Minimum team of two people, one of whom must be DOE certified. This and other details rather indicate they already have decided who will do the work, and they are just advertising it for legal reasons. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6399 From: Matt Paulsen Date: Wed Oct 16, 2002 10:07am Subject: RE: Gov't TSCM needed Aaah the fine print.... "This is a market survey whereby the Government is seeking written information only from small business sources capable of providing these services. This is NOT a solicitation announcement for proposals." Thanks, Matt Paulsen President/CEO Orange Networks LLC http://www.orange-networks.com P: 503.892.8786 F: 503.892.8794 Remotely Hosted Terminal Services! Don't Buy Expensive Hardware or Software! Just use ours for a low monthly fee! http://www.orange-networks.com/remoteoverview.htm -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Wednesday, October 16, 2002 7:00 AM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Gov't TSCM needed at various locations in Las Vegas and Andrews AFB (MD). Interestingly, they provide all equipment (Mason A3; a favorite of these guys?). All they want to buy is trained bodies. They even provide office space, office equipment, software, etc. Just show up in your underwear and they take it from there. http://www.eps.gov/spg/DOE/PAM/HQ/DE-RP08-02NV14328/SynopsisR.html They appear to think it will be a long term and full time project, as the initial contract will be for one year, with up to four 1 year options. Minimum team of two people, one of whom must be DOE certified. This and other details rather indicate they already have decided who will do the work, and they are just advertising it for legal reasons. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6400 From: Paolo Sfriso Date: Wed Oct 16, 2002 10:28am Subject: Data Recovery from Structurally damaged HDDs Dear Colleagues. As a side line to our business, we also provide Data Recovery services. We have an approx 35% success rate with recovery from structurally damaged HDDs and, logically, would like to improve our rate. I would like to know from others engaged in this activity what their success rate is and exchange suggestions, tricks, techniques, etc. Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 6401 From: Matt Paulsen Date: Wed Oct 16, 2002 11:06am Subject: RE: Gov't TSCM needed A sidebar that is interesting since NNSA was mentioned on infocon. Looks like "just looking" is maybe all they'll be doing. [5] Where's the money? Editorial Oct. 14, 2002 It's a story federal information technology managers are all too familiar with: Congress mandates that they must secure their networks from cyberattacks, but fails to appropriate the money needed to properly safeguard systems. The latest story of shortfalls in IT security spending - and this one is especially troubling - comes from the National Nuclear Security Administration (NNSA). This Energy Department agency was formed in 2000 to manage programs in nuclear weapons, nuclear nonproliferation and naval reactors. Its mission represents "the most significant information and physical security challenge in the nation, if not the world," according to a former information assurance expert at the National Security Agency. http://www.fcw.com/fcw/articles/2002/1014/fcw-edit-10-14-02.asp -- Thanks, Matt Paulsen President/CEO Orange Networks LLC http://www.orange-networks.com P: 503.892.8786 F: 503.892.8794 Remotely Hosted Terminal Services! Don't Buy Expensive Hardware or Software! Just use ours for a low monthly fee! http://www.orange-networks.com/remoteoverview.htm -----Original Message----- From: Matt Paulsen [mailto:mpaulsen6@a...] Sent: Wednesday, October 16, 2002 8:08 AM To: tscm-l@yahoogroups.com Subject: RE: [TSCM-L] Gov't TSCM needed Aaah the fine print.... "This is a market survey whereby the Government is seeking written information only from small business sources capable of providing these services. This is NOT a solicitation announcement for proposals." Thanks, Matt Paulsen President/CEO Orange Networks LLC http://www.orange-networks.com P: 503.892.8786 F: 503.892.8794 Remotely Hosted Terminal Services! Don't Buy Expensive Hardware or Software! Just use ours for a low monthly fee! http://www.orange-networks.com/remoteoverview.htm -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Wednesday, October 16, 2002 7:00 AM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Gov't TSCM needed at various locations in Las Vegas and Andrews AFB (MD). Interestingly, they provide all equipment (Mason A3; a favorite of these guys?). All they want to buy is trained bodies. They even provide office space, office equipment, software, etc. Just show up in your underwear and they take it from there. http://www.eps.gov/spg/DOE/PAM/HQ/DE-RP08-02NV14328/SynopsisR.html They appear to think it will be a long term and full time project, as the initial contract will be for one year, with up to four 1 year options. Minimum team of two people, one of whom must be DOE certified. This and other details rather indicate they already have decided who will do the work, and they are just advertising it for legal reasons. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6402 From: Date: Wed Oct 16, 2002 0:44pm Subject: DOE TSCM Work Interesting. I was DOE TSCM certified in the past and would not mind if they could bring the mountain to Mohammed (excuse the term), but I just don't like being away from home much anymore. Two weeks is about all I can take before I start crying for Mama. I hope this generates some work for others in the field. Jack C. E. "Jack" Kelley, III, MBA C. E. Kelley & Associates Investigations P. O. Box 395, Baxter Springs, KS 66713 (620) 856-4460 Email: kelleypi@a... http://www.angelfire.com/ks/investigations/ Kansas Detective License: D-064 Board Member, Kansas Association of Licensed Investigators Member, American Society for Industrial Security Member, Association of Former Office of Special Investigations Special Agents Member, INTELNET (International organization of private investigators) [Non-text portions of this message have been removed] 6403 From: Does it matter Date: Wed Oct 16, 2002 10:26pm Subject: Re: another compromised box So is my box and many others that got it on a less than stable box or one with old definitions. Why post this guys info?? --- In TSCM-L@y..., kondrak wrote: > This box is attempting to send bugbear viri.... > > X-Persona: > Return-Path: > Delivered-To: kondrak@s... > Received: (qmail 1104 invoked by uid 417); 15 Oct 2002 02:15:59 - 0000 > Received: from user2.pro-ns.net (HELO mail.pro-ns.net) (208.200.182.45) > by 192.168.0.5 with SMTP; 15 Oct 2002 02:15:59 -0000 > Received: from djai2 (d232.pro-ns.net [208.200.182.179]) > by mail.pro-ns.net (8.12.6/8.12.5) with SMTP id g9F251nN087276; > Mon, 14 Oct 2002 21:05:17 -0500 (CDT) > (envelope-from TSCM-L@j...) > Date: Mon, 14 Oct 2002 21:05:01 -0500 (CDT) > Message-Id: <200210150205.g9F251nN087276@m...> > From: > Subject: [TSCM-L] Digest Number 290 > MIME-Version: 1.0 > Content-Type: multipart/alternative; boundary="---------- QJJSREYCJT3AFBO" > To: undisclosed-recipients:; > > > Registrant: > Professional Network Services, Inc. > 1313 5th St SE > Suite 105 > Minneapolis, MN 55414 > US > > Domain Name: PRO-NS.NET > > Administrative Contact: > O'Hanlon, Bill wmo@p... > 1313 5th St SE > Suite 105 > Minneapolis, MN 55414 > US > 612-379-3958 > Fax: 612-379-1529 > > Technical Contact: > O'Hanlon, Bill wmo@p... > 1313 5th St SE > Suite 105 > Minneapolis, MN 55414 > US > 612-379-3958 > Fax: 612-379-1529 > > > > Registration Service Provider: > Professional Network Services, Inc., wmo@p... > 612-379-3958 > http://www.pro-ns.net > > > Registrar of Record: TUCOWS, INC. > Record last updated on 21-Mar-2002. > Record expires on 28-Aug-2003. > Record Created on 29-Aug-1996. > > Domain servers in listed order: > NS.PRO-NS.NET 208.200.182.10 > NS2.PRO-NS.NET 208.200.182.11 > > > > NOTE: THE WHOIS DATABASE IS A CONTACT DATABASE ONLY. LACK OF A DOMAIN > RECORD DOES NOT SIGNIFY DOMAIN AVAILABILITY. 6404 From: geodex Date: Mon Oct 7, 2002 0:17pm Subject: Introdution Hello, My name is Bob Bustamante, I am mostly in this list for learning. I plan to get my state lic. for counterintelligence work. Don't worry, i will not inundate this list with questions. I am 41 years old , Served in the USN for 12 years as a electronic warfare technician. Conducted a three year study of Internet security. Worked loss prevention for 4 years where i did surveillance and investigations. I am also a component level tech. having worked on Rytheon, JRC and Furuno radar equipment. GPS, DGPS and Loran Systems. 2M "Micro-Mini" certified three years. VHF, UHF and SHF equip. Hope this is not too long of introduction. Bob 6405 From: Marcel Date: Thu Oct 17, 2002 5:10pm Subject: Mercury News | 10/16/2002 | Tracking device finds your kids for a fee http://www.bayarea.com/mld/bayarea/business/4298948.htm -- "NEXTEL-1 IT'S NOT JUST NEXTEL" Note The New address Subscribe to Nextel-1: http://www.groups.yahoo.com/subscribe/NEXTEL-1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 6406 From: Kirk Adirim Date: Thu Oct 17, 2002 6:05pm Subject: Police question and release man in suspicious white Police question and release man in suspicious white van Oct 17, 2002 DUBLIN, GA -- Police questioned a man in middle Georgia who was driving a white van with a Virginia license plate today. The Laurens County Sheriff's Department had received a tip around 7:20 a-m from a Dudley resident about a suspicious van parked on the shoulder of U-S 80. It turned out to be a surveillance van -- complete with monitors in the rear and a small camera on the roof -- operated by a private detective investigating a worker's compensation claim. Captain Grady Toney said a criminal background check on the man found nothing suspicious. Police contacted the man's company, a Virginia private investigator, which verified the man's identity and employment. The man was not arrested. Police would not disclose his name or his company's name. Authorities in the Washington area this week released sketches of a white van driven by an unknown sniper who has killed nine people and wounded two in the last two weeks. Toney said the man who was questioned had been in Georgia and Alabama when the shootings began. Sheriff's deputies weren't alarmed that it was a white van with a Virginia tag. Toney said -- quote -- "Any time we get a call on a suspicious vehicle, we check it out. That's just our normal procedure." Dudley is a rural community about 40 miles southeast of Macon. http://www.wjbf.com/news/2state/MGB22ML1F7D.html [Non-text portions of this message have been removed] 6407 From: Steve Uhrig Date: Thu Oct 17, 2002 6:59pm Subject: Re: Tracking device finds your kids for a fee On 17 Oct 2002 at 18:10, Marcel wrote: > http://www.bayarea.com/mld/bayarea/business/4298948.htm It doesn't exist and the demo was staged. Photo resolution described there and on the website exceeds what is available to the military from satellite imagery. Plane overflights could generate something like that, though, and with that much money at stake from suckers, I wouldn't be at all surprised if that's what they did. This product will not exist. It cannot exist. 1+1 does not equal 3. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6408 From: Matt Paulsen Date: Thu Oct 17, 2002 11:45pm Subject: RE: Re: Tracking device finds your kids for a fee The device is assisted GPS using SiRF Technologies. Sprint is the assisted network. Globexplorer is the viewer http://www.globexplorer.com/library_p.html "Aerial views at this level allow you to detect objects on the ground that are as small as 1 foot in size. The property level offers the greatest detail and sharpest resolution available. At this level, individual properties can be located and viewed, and yards, parking, and other surrounding features can be detected. This level is most useful for residential and commercial brokers, and for individual home buyers. Additionally, insurance agents and local and state government agencies benefit from this level of detailed view." And supposedly you can buy one of the devices now. Use a credit card so you can dispute the charges... https://www.wherifywireless.com/eStore/ -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Thursday, October 17, 2002 5:00 PM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Re: Tracking device finds your kids for a fee On 17 Oct 2002 at 18:10, Marcel wrote: > http://www.bayarea.com/mld/bayarea/business/4298948.htm It doesn't exist and the demo was staged. Photo resolution described there and on the website exceeds what is available to the military from satellite imagery. Plane overflights could generate something like that, though, and with that much money at stake from suckers, I wouldn't be at all surprised if that's what they did. This product will not exist. It cannot exist. 1+1 does not equal 3. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6409 From: James M. Atkinson Date: Fri Oct 18, 2002 8:20am Subject: Learn Chinese in 10 minutes These are actually very easy to learn; simply read them out loud for the fullest effect and you will have learned some fundamental expressions in Chinese in less than 10 minutes. 1) That's not right ......................... Sum Ting Wong 2) Are you harboring a fugitive?............. Hu Yu Hai Ding 3) See me ASAP................................ Kum Hia Nao 4) Stupid Man ................................ Dum Fuk 5) Small Horse ............................... Tai Ni Po Ni 6) Did you go to the beach? .................. Wai Yu So Tan 7) I bumped into a coffee table .............. Ai Bang Mai Fa Kin Ni 8) I think you need a face lift .............. Chin Tu Fat 9) It's very dark in here .................... Wao So Dim 10) I thought you were on a diet ............. Wai Yu Mun Ching? 11) This is a tow away zone .................. No Pah King 12) Our meeting is scheduled for next week ... Wai Yu Kum Nao? 13) Staying out of sight ..................... Lei Ying Lo 14) He's cleaning his automobile ............. Wa Shing Ka 15) Your body odor is offensive .............. Yu Stin Ki Pu -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6410 From: James M. Atkinson Date: Fri Oct 18, 2002 8:38am Subject: RE: Re: Tracking device finds your kids for a fee I use the 300 cm "property level" maps from http://www.globexplorer.com/l all the time when I am planning a sweep, but the coverage is spotty, and the images are often so dark or badly shadowed that you see nothing of value. Personally, I would prefer to use 3 mm multi-spectral imagery; but the http://www.nro.gov/ website does not have the 3 mm real-time imagery available on their site yet ;-) -jma At 9:45 PM -0700 10/17/02, Matt Paulsen wrote: >The device is assisted GPS using SiRF Technologies. Sprint is the assisted >network. Globexplorer is the viewer >http://www.globexplorer.com/library_p.html >"Aerial views at this level allow you to detect objects on the ground that >are as small as 1 foot in size. > >The property level offers the greatest detail and sharpest resolution >available. At this level, individual properties can be located and viewed, >and yards, parking, and other surrounding features can be detected. This >level is most useful for residential and commercial brokers, and for >individual home buyers. Additionally, insurance agents and local and state >government agencies benefit from this level of detailed view." > >And supposedly you can buy one of the devices now. Use a credit card so you >can dispute the charges... https://www.wherifywireless.com/eStore/ > > > >-----Original Message----- >From: Steve Uhrig [mailto:steve@s...] >Sent: Thursday, October 17, 2002 5:00 PM >To: tscm-l@yahoogroups.com >Subject: [TSCM-L] Re: Tracking device finds your kids for a fee > > >On 17 Oct 2002 at 18:10, Marcel wrote: > >> http://www.bayarea.com/mld/bayarea/business/4298948.htm > >It doesn't exist and the demo was staged. Photo resolution described >there and on the website exceeds what is available to the military >from satellite imagery. Plane overflights could generate something >like that, though, and with that much money at stake from suckers, I >wouldn't be at all surprised if that's what they did. > >This product will not exist. It cannot exist. > >1+1 does not equal 3. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6411 From: frost_bitten_ca Date: Thu Oct 17, 2002 9:10am Subject: Technology that solves firearm-related crime, IBIS Technology that solves firearm-related crime, IBIS is the advanced tool that Law Enforcement needs to help with the problems of increased workloads, shortages of firearm examiners, and shrinking budgets. Using the power of leading-edge technology, IBIS assists the firearm examiner in comparing the mounting volume of firearm evidence. IBIS digitally captures the images of bullets and cartridge cases, stores them in a database, performs automatic computer-based comparisons of the images, and ranks them according to the likelihood of a match. Firearm examiners are then able to employ their specialized skills in performing microscopic comparisons of high- confidence candidates. http://www.fti-ibis.com/en/ibis/intro.asp 6412 From: Ocean Group Date: Fri Oct 18, 2002 5:29pm Subject: Books Hi folks, Anyone have any idea where I can pick up some copies of Glenn Whidden's books,the ear,sweeper etc? Or does anyone have some copies they want to flog? It seems all the big onliners are no use. I'd appreciate any ideas, Cheers Vance Deran, Ocean Group, Ireland. -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 7.0.3 for non-commercial use mQINBD2ItiQBEADUGR+tkegYQJtSmiGVwUZW0xXtj9DeYXIFcVKywTNETPmqs1xf s6L/QP2DgoaJsxpy/Knr06QqDq8NbJdSH63cBtUcOM6TSmvei9KzaXvKTYdKyLrd kPOvXAZq+4YrwHXY5oH9tL0HdtouBnLxQjIy5OVUlohRcYBZQKusoIyeH8SQVqqZ yXTT9X7hYINYwfbEQG7rZG39QS3o7DrtKQ8zGOUlPIuSjyKVY0YU/IRm/shUOmzm FsKrtIx0+NuYZHiML+UN0XM+xX3n55i4lEiIAnCi7uCleeETJSEusQJ1FnEWFjN2 atYG6OQVWofWhzW4O3pcPfmH2vOICpG07lMe88rF2Q+JK0cTUwJbRV/LWSi5QCmU DSdL/v5/3wVnAzoZAzknsmmN09gJPT7kOpqnMdHqhwgyh4txL1MTPcOm36ncRTTv 9Wx4KanMLsyFCaLXfezwUr/sbG5qycsd1cxj/+QbaCCHcYuMg8CXh5tCUagKNwUj kQETM3qPI6hsw7fY1k9BrD3JAx0FDNektPAkoxUbl4s/bZ9+mJEit2PIIPNNnwOS infadjbkkt/7Z5ltMmgOxMFwyLjbjZJNalGUFGMD8i7HU9Anh/330H/Vd2ROiwIj DwBbclzlc3jyvUFdXsN0l2Kj4l9fXB6KQ6Qkdr2hWAMbLRvxr5/coUFQFQARAQAB tBtPY2VhbiBHcm91cCA8aW5lcnRpYUAwMi5pZT6JAi4EEAECABgFAj2ItiQICwMJ CAcCAQoCGQEFGwMAAAAACgkQDmqiVDJj1Od7Cw//YcIHVBei7u4imWX0/YpcaNlw brzNKe6Y2qXIKb4BH5HJjTNraZY47X3sWAYXXjUygztnkX9LPiRtTgGzZ5T/Hn1Q GS74SNp+0Qeuy/aMvAKZuZqiYvLIWbXLKZq3+dihoBUSQQDc19ap+H77xnfhv2DW kbfRn37MSz9Lw608NfGD3ZZmtlclI/v1hVphlaH057Imj4mh5Ycnig9kHwml6zwQ ZtAh1T6gddMuQGhvdfZVZwOTE3Xo2P3IlM2Ct2mj1FNY9No21NknaLBZs6zsAAbs VyXIdaMnfoq1zXGd1uPQjMsftX1YajPoAVPo8uBF6EASL+RkpJejzRzCVV2yh6Ro LD6jBVMeqXxzTt+ZV/f05UhyhjtECk7roYld2/S9vAecVDjHb2WLfAX8iLGXQhCo v2fwQ7QUqtc7pWqkOd3iP1mpRw41kQ/8imA9vUqLqQZQ+40QzCxDCFZ2tXGT2jHN bXqzEU2BAtulPcX0IbTLwv4GgUC7Kn++9aUBg/++lKTWkyLFP0jfaSONYKWb2mLy TZnhp4B1mEx9SDh4zBfOuagY6gpZ9DQ4vSUkRRF38YsNpqA5KibRC2But3kNssyW VTw8l6ShTg7XWvD3FNEawl2Ngo7BJOQ0D5YZPx06eje+JX5F6R2XVx+BiJ1trOuJ Y7UaLj6AtDBaSx6hXM25Ag0EPYi2qQEQAPIHSV9nSUsXnNWUFGKiSJ2+Yfbv5ibG m2DC9nXotMgRyZc/Pto0Xwr/77rgeASlMRKXlVbpCO6nwrLV5aVLib8tCg4qVQMK 3J+aX79nU1KXiFgCqos3M6eQolEjykDhtFNj3Wc2KqFy00JGgeXwj9R+OdT4mUNG aQF1w9hnzys+a9ix4eY9m4AtlUtmRG7+gCW3vWVnhJ/ABQOVOcUL2JyZZBTgpA+Q /hQiGMH24WbilwWE+XhwOkGQUE5KgKHthmCMa3tWOk+f06PEiCjVjwkv6Fc60RHW pa+5PMHdq5zKozfDQR6hQRlZ3k/7Adfsyiw/5fCLbVl2TPaFyuE/n+pJmekd4xH1 /hw2N4EMgzau7t8gIRUUVTICXLdlMeboVrxQ1kuNlK/ZOiC9pdZeO18e/jhSQemC cd+awTOUATw9qV95TD4n5l3JlzbdrZQ7Fb3oIld2cqh1jMPypM8diWPnpyGiampm bfqQbU1dloN3Ng4U+X21jPrqeafvpQT8cnURDALTNdWynDAR7ta4pivb5UjKNDk2 C9Oy7KqKYPgB5hWKSEZs7iQDfWsO9opy8bRXZlau9JQnEY9cZd9Ty0XzYQGYvc65 K1Bd6h7NB9/5URYNmQuM/13OHukVCjTbgnT5GJLvIou4qba2UczuUrSPknQPheoy j208HYitdwwpABEBAAGJAiIEGAECAAwFAj2ItqkFGwwAAAAACgkQDmqiVDJj1OfU 0RAAtdEvkcJVHH3s08uYiatNBAhJML32UIx7nQXDalqiPdM1zJ7AmQjFjWvlqke0 4Y0PS1HFVAsvy1XRWdRAChRqfRXZ2dk+eJxMzHC/KtgrQHahUtPqYozQcVwgjWRC obWh9LwgOrFcXrzvv93D0D4VrDgKLvNmiPOoxe3GW1hUWwaf412zZ3wsAI/EiTDP wol4WvB5Mxe4397HsAKzbLAXuMa1D1RQNlWaK93EgTjn/F5SUWgMVyz3L4HcNF6a qWRft48BgCy8Oj8v9zY0BopWUU7vezFtKmXpfhmxcorKjO0qnkoijFlEph/zTvJz XiKelN6japucGc1EMz5WXI1q9C6Y9Y7KQciA8ZfvXlfZo48vAnfFC8tCgEkYzDJv wO/IebYhIcb9pyFdoZzkAi6yBDZHWRx5rj83X1eAF8Xf9lTtSBWkt49spyn7Ix1q WWnx3aBCC410bQwqWTjrohDi26YltcPOf3qt8QnvL8vy1j5OQRNS3y82opoKqbbf UHyiXUxF4+WiRFJk53D9JCxvgTzQFEQU+QKnqpIXuqppxh3CjfCYtvID8LIsHc2k f0fWZiDYQ3Y86bW421LGGaHt1i4W6K3czwyZVI+I8lJtb5FiDkKnGtKEM2lUwBvU 1oq9e5ySDyaXjg1la2m0gXGVGny0kdPrTasTzJ/Jd0CH8Vw= =OyUh -----END PGP PUBLIC KEY BLOCK----- 6413 From: kondrak Date: Mon Oct 21, 2002 6:33am Subject: Report: Hundreds of Navy PCs missing > > >Forwarded from: William Knowles > >http://news.com.com/2100-1001-962664.html?tag=fd_top_5 > >By Reuters >October 18, 2002, 5:21 PM PT > >The U.S. Pacific Fleet's warships and submarines were missing nearly >600 computers as of late July, including at least 14 known to have >handled classified data, according to an internal Navy report obtained >on Friday. > >The fleet, based in Pearl Harbor, Hawaii, sought to prevent release of >the Naval Audit Service report, even though it was not classified. > >"A release of this information could negatively impact national >security," wrote Rear Adm. Jonathan Greenert, the fleet deputy >commander in chief. His comments, dated Sept. 6, were contained in an >appendix of the report. > >The audit service found "a serious risk that PCs containing sensitive >and classified information have been lost or compromised, which >presents a threat to national security and a potential embarrassment >to the Department of the Navy." > >All 595 of the missing laptop and desktop computers featured removable >hard drives, had been leased to the Navy, and were capable of >processing classified information, the investigators said. > >The report, published in its final form this month, was obtained first >by Defense Week, a trade paper that will publish its story on Monday. >Defense Week made excerpts available to Reuters. > >The Navy declined comment on the current status of the missing >computers or any other aspects of the matter. > >The audit dealt with only a small fraction of the Navy's computers. >The Atlantic Fleet was not examined. And in the Pacific Fleet, shore >facilities--where most computers are located--were not surveyed. > >"At least 595 personal computers, including at least 14 reported to be >used for classified purposes, and possibly more, remained missing as >of July 23 from afloat units" of the Pacific Command, the report said. > >"Data was not available as to how many of the remaining PCs were used >for classified processing," added a footnote, leaving open the >possibility that many more or all of those missing might have handled >secret information. > >The auditors cited a breakdown in management of the leased computers >and the lack of any system to track them. 6414 From: Marcel Date: Mon Oct 21, 2002 0:19pm Subject: Re: Tracking device finds your kids for afee] Thanks Mike......... Mike Langberg wrote: > Marcel: > > I don't know the person who is making statements that Wherify technology > "can't exist." I can only tell you that I've seen the product in person, > and it does work at least some of the time. > > -- Mike Langberg, Personal Technology Editor > San Jose Mercury News -- "NEXTEL-1 IT'S NOT JUST NEXTEL" Note The New address Subscribe to Nextel-1: http://www.groups.yahoo.com/subscribe/NEXTEL-1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 6415 From: Marcel Date: Tue Oct 22, 2002 3:25am Subject: Spy technology firm inks storage management deal - Computerworld http://computerworld.com/hardwaretopics/storage/story/0,10801,75299,00.html [Non-text portions of this message have been removed] 6416 From: James M. Atkinson Date: Tue Oct 22, 2002 9:50am Subject: Al-Qaeda steers clear of NSA's ears http://www.usatoday.com/news/washington/2002-10-17-nsa-al-qaeda_x.htm 10/17/2002 - Updated 08:39 PM ET Al-Qaeda steers clear of NSA's ears By John Diamond, USA TODAY WASHINGTON ≠ The National Security Agency, the nation's eavesdropper, is having a hard time hearing al-Qaeda. "Sadly, NSA had no (indications) that al-Qaeda was specifically targeting New York and Washington, D.C., (on Sept. 11, 2001), or even that it was planning an attack on U.S. soil," NSA Director Michael Hayden told a congressional hearing Thursday. Hayden, an Air Force lieutenant general, noted that before Sept. 11, "NSA had no knowledge ... that any of the attackers were in the United States." An intelligence organization so secretive that Hayden and his predecessors have testified publicly only three times in half a century, the NSA intercepts electronic signals, breaks enemy codes and translates and interprets communications among terror groups and military forces. Little understood by the public, it produces the vast bulk of information used by the U.S. intelligence community. The NSA faces new obstacles in penetrating al-Qaeda because the terror group has learned how to evade U.S. interception technology ≠ chiefly by using disposable cell phones or by avoiding phones altogether and substituting human messengers and face-to-face meetings to convey orders. Al-Qaeda operatives are also suspected of feeding disinformation to the NSA, in part to learn how successful the agency has been in penetrating the terror network. If U.S. forces act on the bad information, al-Qaeda operatives know where the leak is, U.S. intelligence officials say. Though there have been charges on Capitol Hill that U.S. intelligence had clues to the al-Qaeda plot but failed to put them together and act on them, the conclusion among intelligence professionals is potentially more disturbing: Despite spending billions of dollars to pursue terror groups, U.S. intelligence agencies gathered virtually no clues that attacks were coming. It's a problem that persists to this day, as dramatized by the recent assaults in Kuwait, off the coast of Yemen and in Indonesia. "The good news is we didn't miss it," a senior intelligence official familiar with NSA operations said. "The bad news is it wasn't there to be missed." In describing how NSA tries to penetrate terror cells, intelligence officials tell of a laborious multistep process that all too often yields little more than a cryptic exchange of words shouted over cell phones by Middle Eastern men in colloquial Arabic dialects. Another intelligence official who has heard selected intercepts of al-Qaeda operatives described them as barely intelligible, even by language specialists with a quarter-century of experience. "I have been privileged to listen to this stuff," the official said, "and a lot of it is crap." The agency operates like a vacuum cleaner. At the front end, it takes in huge volumes of information. Each of its 15 to 20 ground-based listening stations pulls in about 2 million communications per hour, according to James Bamford, author of Body of Secrets, a book about the NSA. Add to that the intercepts from seven satellites and 40 to 50 listening posts atop U.S. embassies around the world. Of that immense intake, only about 1% ever gets decoded, translated and processed into finished intelligence reports. "The volume is enormous," said Jeffrey Richelson, who has written several books on the U.S. intelligence community. "So much of what they wind up collecting doesn't get processed, especially voice communications." Much of it is discarded by computer programs designed to filter out inconsequential conversations. But some useful intelligence is inevitably lost, intelligence officials say. There are times when the system works well ≠ and quickly. NSA Director Hayden has, at times, been briefed by analysts about phone calls intercepted within the past hour, intelligence officials say. But despite the agency's prodigious collection capability, a post-Sept. 11 review found no intercepts of calls involving any of the 19 hijackers. That is, in part, the legacy of reforms dating to the mid-1970s that restrict the agency from targeting people once they are in the USA. Exceptions can be made for known terrorists, but the NSA had been given no information from other agencies that the 19 were in the country. The agency took a public whipping when congressional investigators found that key NSA intercepts dated Sept. 10, 2001, were not passed on to decision-makers until Sept. 12, the day after the devastating attacks. In the intercepts, translated from Arabic, the suspects say, "The match begins tomorrow," and "Tomorrow is zero hour." NSA officials complained in the days after Sept. 11 when members of Congress talked publicly about how intercepted conversations caught al-Qaeda leaders congratulating their chief, Osama bin Laden, on the attacks. After news reports of those remarks, the senior intelligence official said, bin Laden "went dark for us." The problem with the typical al-Qaeda intercept is that it lacks specific information, and what information is conveyed can be misinterpreted. A translator who picks up a message from a known al-Qaeda phone in Afghanistan that "the wedding party is tomorrow" may be onto a major terrorist operation ≠ or to an actual marriage. Telling the difference requires an understanding of idiom and inflection. "You've got to know the culture," the senior intelligence official said, "or else you're putting JDAMs (guided bombs) in a lot of wedding parties." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6417 From: Hawkspirit Date: Tue Oct 22, 2002 0:37pm Subject: Historical Sweep Article I have added another historical bug sweep article to my web site. This one "Spy Tech" appeared in Discover Magazine in 1988. The link to that article is: http://www.bugsweeps.com/info/spytech.html The index to some of the other articles is: http://www.bugsweeps.com/info/index.html My thanks to Rob Muessel for providing a great copy of this article. Once again, if anyone has historical articles like this that we can preserve and share on my web site let me know. Roger Tolces Electronic Security 6418 From: Marcel Date: Wed Oct 23, 2002 0:44am Subject: Attack On Internet Called Largest Ever http://www.washingtonpost.com/wp-dyn/articles/A828-2002Oct22.html [Non-text portions of this message have been removed] 6419 From: Hawkspirit Date: Wed Oct 23, 2002 10:00am Subject: Internet Attack Attack On Internet Called Largest Ever By David McGuire and Brian Krebs washingtonpost.com Staff Writers Tuesday, October 22, 2002; 5:40 PM The heart of the Internet sustained its largest and most sophisticated attack ever, starting late Monday, according to officials at key online backbone organizations. Around 5:00 p.m. EDT on Monday, a "distributed denial of service" (DDOS) attack struck the 13 "root servers" that provide the primary roadmap for almost all Internet communications. Despite the scale of the attack, which lasted about an hour, Internet users worldwide were largely unaffected, experts said. FBI officials would not speculate on who might have planned or carried out the attack. David Wray, a spokesman for the FBI's National Infrastructure Protection Center (NIPC), said the bureau is "aware of the reports and looking into it." DDOS attacks overwhelm networks with an onslaught of data until they cannot be used. According to security experts, the incident probably was the result of multiple attacks, in which attackers concentrate the power of many computers against a single network to prevent it from operating. "This was the largest and most complex DDOS attack ever against the root server system," said a source at one of the organizations responsible for operating the root servers. Ordinary Internet users experienced no slowdowns or outages because of safeguards built into the Internet's architecture. A longer, more extensive attack could have seriously damaged worldwide electronic communications, the source said. Internet Software Consortium Inc. Chairman Paul Vixie said that if more servers went down, and if the hackers sustained their hour-long strike a bit longer, Internet users around the world would have begun to see delays and failed connections. Chris Morrow, network security engineer for UUNET, said "This is probably the most concerted attack against the Internet infrastructure that we've seen." UUNET is the service provider for two of the world's 13 root servers. A unit of WorldCom Inc., it also handles approximately half of the world's Internet traffic. DDOS attacks are some of the most common and easiest to perpetrate, but the size and scope of Monday's strike set it apart. Vixie said only four or five of the 13 servers were able to withstand the attack and remain available to legitimate Internet traffic throughout the strike. "It was an attack against all 13 servers, which is a little more rare than an attack against any one of us," he said. The server Vixie operates was available throughout the attack, he said. Internet addressing giant VeriSign Inc., which operates the most important server from an undisclosed Northern Virginia location, reported no outages. "VeriSign expects that these sort of attacks will happen and VeriSign was prepared," company spokesman Brian O'Shaughnessy said. Vixie said he was unwilling to compare the attack to others he has witnessed in more than two decades of involvement with Internet architecture, but said it was "the largest in recent memory." The root servers, about 10 of which are located in the United States, serve as a sort of master directory for the Internet. The Domain Name System (DNS), which converts complex Internet protocol addressing codes into the words and names that form e-mail and Web addresses, relies on the servers to tell computers around the world how to reach key Internet domains. At the top of the root server hierarchy is the "A" root server, which every 12 hours generates a critical file that tells the other 12 servers what Internet domains exist and where they can be found. VeriSign manages its servers under contracts with the Commerce Department and the Internet Corporation for Assigned Numbers (ICANN), which manages the DNS. One rung below the root servers in the Internet hierarchy are the servers that house Internet domains such as dot-com, dot-biz and dot-info. The DNS is built so that eight or more of the world's 13 root servers must fail before ordinary Internet users start to see slowdowns. "There are various kinds of attacks all the time on all sorts of infrastructure, and the basic design of the Internet is such that it is designed to withstand those attacks," said ICANN Vice President Louis Touton. "We're not aware of any users that were in any way affected. "Obviously the prevalence of attacks does make it important to have increased focus on the need for security and stability of the Internet," he added. Most often, the computers used in the DDOS assaults have been commandeered by hackers either manually or remotely with the help of automated software tools that scan millions of computers for known security holes. These computers often belong to unsuspecting home users. Little can be done to insulate targets from such attacks, and some of the world's most powerful companies have been targeted in the past. In February 2000, Amazon.com, eBay, Yahoo, and a host of other big-name e-commerce sites came to a grinding halt for several hours due to DDOS attacks. "Only the richest can defend themselves against this type of attack, and most of them can't withstand a concerted attack," said Alan Paller, research director at the SANS Institute, a nonprofit security research and training group that often works with federal investigators to track computer virus writers. Paller also was the lead expert witness at the trial of "Mafiaboy," the Canadian teenager who was ultimately convicted of the February 2000 attacks. "The only way to stop such attacks is to fix the vulnerabilities on the machines that ultimately get taken over and used to launch them," Paller said. "There's no defense once the machines are under the attacker's control." Vixie said he kept the server at Internet Software Consortium operating by "pushing" the flood of data far enough away from his servers that legitimate traffic could flow around the obstruction. Such clogs still affect some Internet users by gumming up Internet communications somewhere else in the network. UUNET's Morrow said it is too early to tell what the attack bodes for the Internet in coming months. "This could be someone just messing around, but it could also be something much more serious. It's too soon to say," Morrow said. washingtonpost.com Staff Writer Robert MacMillan contributed to this article. 6420 From: ed Date: Tue Oct 22, 2002 7:41pm Subject: accused terrorist ordered to wear GPS tracking device anyone care to speculate exactly what this guy is supposed to wear? is it an affirmative defense to say that such a device "does not and cannot exist"? ;-) http://www.upi.com/view.cfm?StoryID=20021022-055837-4856r "Under the bail conditions, Alwan would be freed, but he must be at home 24 hours a day except for appearances at court, at his job or to seek medical attention. He must not have access to faxes, computers or the Internet. He must pay $20 a day for a global positioning system to monitor his movements by satellite." -ed 6421 From: Mitch Davis Date: Tue Oct 22, 2002 8:56pm Subject: audio enhancement gear for sale Hello list members, I am helping a friend sell a piece of gear he purchased new over 10 years ago.Its a older piece of equipment, but works well none the less. Its for enhancing and "cleaning" up audio recordings that may contain unwanted noise,humms,music,garble,etc. This gear was designed by "Dr Jim",who was and may still be the leading authority on audio enhancement,and has a zillion hours in this field.This unit was one of a small amount put together by DAC in North Carolina, originally for NASA,and several agencies,as well as a few that could afford it. The audio enhancement combo is housed in a Tektroniks TM500 module and contains a : DLY4T time signal processing unit by Digital Audio Corp it has 7 capabilities: 1 signal capture and playback 2 signal delay 3 noise cancelling comb filter 4 16 bit analog conversion for range greater than 85db 5 7khz bandwith 6differential or single ended high impedance input 7 Direct digital interface enabling this device to be interfaced with other t series instruments Another part of this unit,is a : DAC 1024T Adaptive filter system for enhancing voice intelligibility. It features 16 bit analog conversion 3,5,7 khz bandwiths max filter size of 1024 taps w 2048 optional Direct digital interface for dig signal cascading of other DAC products. The last part of this combo is a RCW320T by DAC its a dig signal processor for lab and field applications. Its has 15 instruments all in one.Operational modes include: 256th order adaptive digital filter tracking and adjustable comb filter with notch depth and upper notch freq control 2 auto dig gain controls Linear phase digital lowpass,highpass,bandpass,and bandstop filters Dual digital notch and slot filters Sinewave,white noise,and pink noise generators Digital delay line and looper. All these components make up the unit as a whole and all work. This unit was purchased for over 20K US over 10 years ago. It is not the "flavor of the week" but it was state of the art in its time. It comes with everything as it did new,manuals etc..... RAy A is looking for a reasonable offer for this.Call or E- mail me off the list.PayPAl, major credit cards accepted. I figured I'd put this up here before sending it off to EBAy,as it may do someone some good,or make for a novel item to have in the shop or lab......it may even work several times to pay for itself in the right hands...... Thanks! MD ----------------------------------------------------------- Mitch Davis TSCM/Special Operations Group,Inc. (615) 837 9933 e mail: MitchD@t... website www.tscmusa.com Nashville,TN.USA ----------------------------------------------------------- 6422 From: Date: Tue Oct 22, 2002 11:37pm Subject: D.A.C. Audio Enhancement Gear for sale Hello list members, I am helping a friend sell a piece of gear he purchased new over 10 years ago.Its an older piece of equipment, but works well none the less. Its for enhancing and "cleaning" up audio recordings that may contain unwanted noise,humms,music,garble,etc. This gear was designed by "Dr Jim",who was and may still be the leading authority on audio enhancement,and has a zillion hours in this field. This unit was one of a small amount put together by DAC in North Carolina, originally for NASA,and several agencies,as well as a few that could afford it. The audio enhancement combo is housed in a Tektroniks TM500 module and contains a : DLY4T time signal processing unit by Digital Audio Corp it has 7 capabilities: 1 signal capture and playback 2 signal delay 3 noise cancelling comb filter 4 16 bit analog conversion for range greater than 85db 5 7khz bandwith 6differential or single ended high impedance input 7 Direct digital interface enabling this device to be interfaced with other t series instruments Another part of this unit,is a : DAC 1024T Adaptive filter system for enhancing voice intelligibility. It features 16 bit analog conversion 3,5,7 khz bandwiths max filter size of 1024 taps w 2048 optional Direct digital interface for dig signal cascading of other DAC products. The last part of this combo is a RCW320T by DAC its a dig signal processor for lab and field applications. Its has 15 instruments all in one.Operational modes include: 256th order adaptive digital filter tracking and adjustable comb filter with notch depth and upper notch freq control 2 auto dig gain controls Linear phase digital lowpass,highpass,bandpass,and bandstop filters Dual digital notch and slot filters Sinewave,white noise,and pink noise generators Digital delay line and looper. All these components make up the unit as a whole and all work. This unit was purchased for over 20K US over 10 years ago. It is not the "flavor of the week" but it was state of the art in its time. It comes with everything as it did new,manuals etc..... Ray A is looking for a reasonable offer for this. Call or E- mail me off the list. PayPalÆ, major credit cards accepted. I figured I'd put this up here before sending it off to EBay, as it may do someone on the list some good, or make for a novel item to have in the shop or lab......it may even work several times to pay for itself in the right hands...... Thanks! MD Mitch Davis TSCM/Special Operations Group,Inc. Nashville,TN. USA e-mail: mitchd@t... website: www.tscmusa.com (615)837-9933 [Non-text portions of this message have been removed] From: James M. Atkinson Date: Tue Oct 16, 2001 4:45pm Subject: Logan Airport Security Breach Logan Airport Security Breach Latest news reports on WBZ advise that a cell of 4 terrorists have been for security contractors at the Logan Airport in Boston, MA. An anonymous source close to the investigation advised earlier today that 3 of the 4 have been detained. The Boston office of the FBI stated that the terrorists Bin Sleepin, Bin Drinkin and Bin Fightin have been arrested on immigration issues. They advise further that they can find no one fitting the description of the fourth cell member, Bin Workin, in the area. The FBI is confident that anyone who looks like Bin Workin will be very easy to spot in the facility. -jma. -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3933 From: James M. Atkinson Date: Tue Oct 16, 2001 5:29pm Subject: In memory of September 11 This is truly awesome. http://www.powforum.org/wtc/ -jma -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3934 From: Gil Young Date: Tue Oct 16, 2001 4:23pm Subject: RE: Re: A man and his son ..OFFENSIVE FWIW, I just saw it as a joke. Of course not all Arabs are terrorists! But, to be frank, right now, it does seem that the top terrorists against the USA are Arabic/Muslim. One look here tells the story: http://www.fbi.gov/mostwant/terrorists/fugitives.htm That may change in time, but it seems to be the common trend now and for awhile back as well. The only thing that will puzzle me to my dying days is how they think they accomplish any good in their actions. Gil Gil Young W1GJY ----- "You can easily judge the character of a man by how he treats those who can do nothing for him.î ≠ Goethe, 18th/19th-century German poet, novelist, playwright and philosopher >--- Original Message --- >From: "talisker" >To: , >Date: 10/16/01 1:23:32 PM > >Take cover rant coming > >> The son pauses for a while and then asks "what were Arabs Dad?" > >[rant] > >There's no need for this kind of racism. To stereotype Arabs in this >fashion merely adds weight to the argument that the West is at war with >Islam and not terrorism. > >I wouldn't consider myself as politically correct but these are uneasy times >where many Arabs and Muslims are looking for reassurance that they are not >all being tarred with the same brush. > >All terrorist attacks are despicable and my heart goes out to all those who >have been effected, let's stand united with "anyone" who wants to rid the >world of these barbarous acts, regardless of their faith or race. I have >many friends who are Arabs and/or Muslims they are, on the whole, honourable >and peaceful and not deserving of being labelled as terrorists. > >sorry for the rant >[/rant] > >-andy >http://www.networkintrusion.co.uk >----- Original Message ----- >From: >To: >Sent: Tuesday, October 16, 2001 12:47 AM >Subject: [TSCM-L] A man and his son are walking through a highly built-up >Manhattan > > >> >> A man and his son are walking through a highly built-up Manhattan when >> they come across an empty space and the father stops to reflect for a >> while. >> >> "Imagine son," the father says "exactly 31 years ago the great >> twin towers stood proudly in this area." >> >> Intrigued by the comment the son then asks "what were the twin towers >dad?" >> >> To which the father replies "they were two of the largest buildings in >> the world and they housed many thousands of offices.... but in 2001 >> they were destroyed by Arabs" >> >> The son pauses for a while and then asks "what were Arabs dad?" >> 3935 From: Date: Tue Oct 16, 2001 0:26pm Subject: PI vs TSCM This issue isn't quite as black & White as some are making it out to be. I agree completely that the skills do not overlap. But rarely would a competent, trained TSCM tech suddenly burst upon the scene fully equipped. Skill and equipment are both critical and I imagine that most good TSCM techs started their career with less than ideal equipment and continually improved their lot over time. I ask you real pros out there to recall your start-up circumstances and give those of us that are not there yet some slack. You are all debating this issue from the top of the pack. Allow me to comment from a lower level. First of all Michigan licenses PI's but not TSCM and A security guard license is automatically included with a PI license. Maybe some of you were blessed with an immediate influx of clients when you first started but I suspect most, like myself, had to slowly build up that client base. What did you do in the mean time? Where did the money come from to upgrade your equipment? For me as a police officer, the obvious answer was to use a PI/Security Guard license as a means, not as an end. From these unrelated licenses came the income to upgrade, modify and increase my equipment suite. Without first becoming a PI I could never have come as far as I have (and I admittedly have a long way to go yet). I just can't afford quality equipment on a policeman's salary. Money isn't the only issue either. In Michigan where anybody at all can buy a spy shop transmitter detector and enter this field, it is somewhat reassuring to clients that at least, as a licensed PI, I am not a convicted felon, have passed state police scrutiny and have no background of being a fraud. The PI license gives no assurance of competency but it's a whole lot better than nothing. While I'm venting, I have a bone to pick with many of you. You all joined the chorus of knowledge and competence as your primary concern. Yet it at least seems that most of you at the top are more interested in protecting and preserving your experience and knowledge rather than sharing it. Those of us at a lower level than yourselves look up to you with great admiration and respect. I want to be like you someday. I'm trying as hard as I can. And it's disppointing to be shut out and shunned. Recently I read a post by Steve Uhrig having just obtained a Tek 494, for tips on using it. Did anyone respond? If you did, it was directly, so the guys like me would be excluded from the info. I have a Tek 494 also. My knowledge base on utilizing it is undoubtedly far less than Steve's and I waited in eager anticipation to learn something. The silence was deafening. If you are really so concerned about the quality of TSCM services, wouldn't this group be a good place to share information? That was why I originally signed up. I was hoping to learn from you. I was hoping you would share. I was hoping you would care. There is no mentor program so quit complaing and do something about it. Try helping out a little more instead of constantly slapping us lesser beings down. I'm not your competitor. I will probably never be able to service the kinds of clients you have. I don't take high threat level jobs because I know I can't handle them. I am inferior to you and I understand that. But please, not all of us down here are charlatans and frauds. Sorry for the diatribe. I'll sit back now and wait for the hits I know are comming. Chad 3936 From: Craig Snedden Date: Tue Oct 16, 2001 0:45pm Subject: RE: A man and his son ..OFFENSIVE I concur... -----Original Message----- From: talisker [mailto:Talisker@n...] Sent: 16 October 2001 18:24 To: TSCM-L@yahoogroups.com; MACCFound@a... Subject: Re: [TSCM-L] A man and his son ..OFFENSIVE Take cover rant coming > The son pauses for a while and then asks "what were Arabs Dad?" [rant] There's no need for this kind of racism. To stereotype Arabs in this fashion merely adds weight to the argument that the West is at war with Islam and not terrorism. I wouldn't consider myself as politically correct but these are uneasy times where many Arabs and Muslims are looking for reassurance that they are not all being tarred with the same brush. All terrorist attacks are despicable and my heart goes out to all those who have been effected, let's stand united with "anyone" who wants to rid the world of these barbarous acts, regardless of their faith or race. I have many friends who are Arabs and/or Muslims they are, on the whole, honourable and peaceful and not deserving of being labelled as terrorists. sorry for the rant [/rant] -andy http://www.networkintrusion.co.uk ----- Original Message ----- From: To: Sent: Tuesday, October 16, 2001 12:47 AM Subject: [TSCM-L] A man and his son are walking through a highly built-up Manhattan > > A man and his son are walking through a highly built-up Manhattan when > they come across an empty space and the father stops to reflect for a > while. > > "Imagine son," the father says "exactly 31 years ago the great > twin towers stood proudly in this area." > > Intrigued by the comment the son then asks "what were the twin towers dad?" > > To which the father replies "they were two of the largest buildings in > the world and they housed many thousands of offices.... but in 2001 > they were destroyed by Arabs" > > The son pauses for a while and then asks "what were Arabs dad?" > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3937 From: Date: Tue Oct 16, 2001 4:48pm Subject: Re: A man and his son ..OFFENSIVE In a message dated 10/16/01 4:10:20 PM Pacific Daylight Time, craig@d... writes: << I concur... >> How would you feel if it were Liverpool? 3938 From: Date: Tue Oct 16, 2001 4:49pm Subject: Re: A man and his son ..OFFENSIVE In a message dated 10/16/01 10:21:29 AM Pacific Daylight Time, talisker@n... writes:<< sorry for the rant [/rant] -andy http://www.networkintrusion.co.uk >> Would you feel the same if they took out London? 3939 From: talisker Date: Wed Oct 17, 2001 2:13am Subject: Re: A man and his son ..OFFENSIVE > Would you feel the same if they took out London? We have been subjected to terrorist attacks by the IRA and now the Real IRA for some time now. They would take great delight in killing my family and I, also any other innocent victims close by. However, I do not blame the entire Irish Nation for the actions of just a few. In fact quite the reverse I love the people of Ireland who are undoubtedly one of the friendliest groups of people on the planet. take care -andy http://www.networkintrusion.co.uk ----- Original Message ----- From: To: Sent: Wednesday, October 17, 2001 2:49 AM Subject: Re: [TSCM-L] A man and his son ..OFFENSIVE > In a message dated 10/16/01 10:21:29 AM Pacific Daylight Time, > talisker@n... writes:<< sorry for the rant [/rant] > -andy http://www.networkintrusion.co.uk >> > > Would you feel the same if they took out London? > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3940 From: Salvador Aguirre Date: Tue Oct 16, 2001 10:22pm Subject: RE: Re: A man and his son ..OFFENSIVE WAY OFF TOPIC Here here. I agree with Gil Young. But he may not agree with me. ;) No apologies for politically incorrect statements or actions. If you don't like the speech, then change the channel. "The West" should make no apologies for the failure of the Arab World to become democratic and prosperous(and I don't mean prosperity through oil). If the 911 terrorist actions had come from Latin America,(I'm a US citizen of Latin American origin), I'd say, "Get the nukes ready and let them fly!" You think I'm kidding. You're either with us or with them. Neutrality = them. It's funny, but any time there is an earthquake, hurricane, monsoon, flood, fire, civil war or ethic cleansing, these same "non-alligned/neutral" countries dial the World police - the US and allies. Hum, when all is well, the US is "THE MAN that is keeping them down," "the Great Satan" and "the cause of all evil on Earth." But when disaster strikes, the US should help them because it's our duty as a superpower and because they say so. If we are good then we should help them as they spit in our face or shoot at us. Screw...them! And we should be sensitive to their sensitivities? Are you kidding me? They come to our countries (the West) and receive the protection of our laws and then complain when we reassess our view of them after 911. Hum, what protection do we get when we go to their countries - their laws? Nice. yup. Nice freedoms they have...ay? Any female military service members that have served in Saudi Arabia on this list? Oh, and about stereotypes, there are no coincidences. They're there for a reason. Those of you that live in the US will understand this...ever been in East LA? Ever been the wrong color when you meet up with some of "my cousins" ("vato", "ese" dudes) if you got lost in some hopelessly screwed up neighborhood? Racism cuts both ways. Every which way. But what do I know, I'm just an infidel that has no right to step in the holy land of Saudi Arabia - the land of Mecca. Hum, right. As you can tell, I don't have Liberal White Boy Disease - ie "It's my fault there was slavery 150 years ago and WE should pay reparations; it's my fault that Palestinians don't have their homeland; maybe this Osama guy is right and it's my fault that cats and dogs don't get along." Don't like it, change the channel. Hurt your feelings? Awww. Welcome to the real world. You've just left Disney Land. Sal Aguirre As Cicero(Roman dude) said of Carthage, "Dude, I'm just saying...Kill them all, let the Gods sort them out!" >From: "Gil Young" >To: TSCM-L@yahoogroups.com >Subject: RE: Re: [TSCM-L] A man and his son ..OFFENSIVE >Date: Tue, 16 Oct 2001 14:23:27 -0700 > > >FWIW, I just saw it as a joke. Of course not all Arabs are terrorists! >But, to be frank, right now, it does seem that the top terrorists >against the USA are Arabic/Muslim. One look here tells the story: > >http://www.fbi.gov/mostwant/terrorists/fugitives.htm > >That may change in time, but it seems to be the common trend >now and for awhile back as well. > >The only thing that will puzzle me to my dying days is how they >think they accomplish any good in their actions. > >Gil > >Gil Young W1GJY >----- >"You can easily judge the character of a man by how he treats >those who can do nothing for him.î ≠ Goethe, 18th/19th-century >German poet, novelist, playwright and philosopher > > > >--- Original Message --- > >From: "talisker" > >To: , > >Date: 10/16/01 1:23:32 PM > > > > >Take cover rant coming > > > >> The son pauses for a while and then asks "what were Arabs >Dad?" > > > >[rant] > > > >There's no need for this kind of racism. To stereotype Arabs >in this > >fashion merely adds weight to the argument that the West is >at war with > >Islam and not terrorism. > > > >I wouldn't consider myself as politically correct but these >are uneasy times > >where many Arabs and Muslims are looking for reassurance that >they are not > >all being tarred with the same brush. > > > >All terrorist attacks are despicable and my heart goes out to >all those who > >have been effected, let's stand united with "anyone" who wants >to rid the > >world of these barbarous acts, regardless of their faith or >race. I have > >many friends who are Arabs and/or Muslims they are, on the whole, >honourable > >and peaceful and not deserving of being labelled as terrorists. > > > >sorry for the rant > >[/rant] > > > >-andy > >http://www.networkintrusion.co.uk > >----- Original Message ----- > >From: > >To: > >Sent: Tuesday, October 16, 2001 12:47 AM > >Subject: [TSCM-L] A man and his son are walking through a highly >built-up > >Manhattan > > > > > >> > >> A man and his son are walking through a highly built-up Manhattan >when > >> they come across an empty space and the father stops to reflect >for a > >> while. > >> > >> "Imagine son," the father says "exactly 31 years ago the great > >> twin towers stood proudly in this area." > >> > >> Intrigued by the comment the son then asks "what were the >twin towers > >dad?" > >> > >> To which the father replies "they were two of the largest >buildings in > >> the world and they housed many thousands of offices.... but >in 2001 > >> they were destroyed by Arabs" > >> > >> The son pauses for a while and then asks "what were Arabs >dad?" > >> > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > _________________________________________________________________ Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp 3941 From: Kohlenberg, Toby Date: Wed Oct 17, 2001 0:59am Subject: RE: A man and his son ..OFFENSIVE Enough already! I live in the US and I completely agree with Talisker. Be upset about the attack! Be scared by the fact that our politicians are passing laws and enacting regulations that will cut back on our freedoms and make travel more painful but probably won't do more than annoy any dedicated attacker! Be committed to stopping future attacks and getting justice for the attacks that have occurred! But don't use these events as an excuse for blind racism, or for blind unquestioning support of a government that is made up of humans who are just as fallible as anyone else, or for any of the other stupid shit that we are seeing done. Part of being civilized adults is learning to deal with shades of grey and delayed gratification. As adults we don't get to have the easy answers or the fast fixes, we make the decisions that are right for the long term. If we can't handle that, then we shouldn't be making decisions. I am an American, I am proud to be one and want justice just as much as anyone else. I found the joke to be inappropriate and was disappointed to see it on a list that I would have expected more from. All opinions are my own and in no way represent the views of my employer. Toby > -----Original Message----- > From: MACCFound@a... [mailto:MACCFound@a...] > Sent: Tuesday, October 16, 2001 6:50 PM > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] A man and his son ..OFFENSIVE > > > In a message dated 10/16/01 10:21:29 AM Pacific Daylight Time, > talisker@n... writes:<< sorry for the rant [/rant] > -andy http://www.networkintrusion.co.uk >> > > Would you feel the same if they took out London? > > > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> > Pinpoint the right security solution for your company- Learn > how to add 128- bit encryption and to authenticate your web > site with VeriSign's FREE guide! > http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM > -------------------------------------------------------------- > -------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > 3942 From: Craig Snedden Date: Wed Oct 17, 2001 3:14am Subject: RE: A man and his son ..OFFENSIVE I'd still concur with Andy. Lets hope your country's leaders are not as narrow minded as you or God help us all..... By the way, I'm not English and there is a really sick joke in there about Liverpool but I wont make it....... Take care -----Original Message----- From: MACCFound@a... [mailto:MACCFound@a...] Sent: 17 October 2001 02:48 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] A man and his son ..OFFENSIVE In a message dated 10/16/01 4:10:20 PM Pacific Daylight Time, craig@d... writes: << I concur... >> How would you feel if it were Liverpool? ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3943 From: Ray Van Staden Date: Wed Oct 17, 2001 3:17am Subject: Re: A man and his son ..OFFENSIVE I echo that this is offensive. Terrorism does not only occur in the USA, but in a number of countries throughout the world. In the past in South Africa we had numerous terrorist attacks car-bombs, limpet mines, land mines, my home city at one stage was known as "bomb city" & at that stage was the second most bomb city in the world after Beruit. All done in the name of black liberalisation - does that mean racist jokes against the black people need to be made? In the very recent past in South Africa we have had right wing elements setting off bombs - does that mean racist jokes against the white people need to be made? Now that USA has gone & bombed a United Nations compound and killed innocent UN workers or that they have gone & bombed a marked RED CROSS facility in direct contravention to the Geneva Convention, must jokes be made against the USA? I will give you an example, one of many, of what I do not agree with that has been circulating around the world: Guns $500 Planes $6 Million W.T.C. $7 Billion Look on the American's faces after the attack!!!!!! PRICELESS Some things money can't buy for everything else there's MASTERCARD. Raymond 3944 From: Date: Wed Oct 17, 2001 0:08am Subject: Re: PI vs TSCM Dear Group Eventhough I am probably the newest member of the group I would like to post a message wholeheartedly agreeing with Chad. In way of introduction I come from an extremely strong surveillance background being police and government trained in conventional and rural skills. I had the opportunity to undertake technical training whilst still serving with the Force however foolishly did not grasp this opportunity, it would have been very useful now. I currently work as a security consultant providing surveillance and CP services to the insurance industry, legal profession, corporations and media. I consider myself to be a professional providing the same high standard of service as would have been expected in my previous occupation. I have a reasonable understanding of listening devices having escorted technical personnel on jobs whilst a surveillance operator in the police. I have read everything I can get my hands on and am attempting to increase my knowledge of this subject. I own a CPM 700 and some other equipment and feel that TSCM naturally compliments surveillance and CP. I admit to being bottom of the pile as regards TSCM however my objective is not to offer something which I cannot provide, rather to be an apprentice with the goal one day of becoming a competent tech. The only way I will do this is by learning from others. As Chad states we all have to start somewhere and there is a world of difference between those who are content to buy a box with flashing lights to baffle clients and those who can only afford a small amount of kit but whose goal is to improve. I joined the group for this very reason and am no threat to anyone being based in Ireland, like Chad I am not pitching for high threat jobs where I would normally enlist the help of a competent friend. I don't like persons masquerading as surveillance experts either, falsely claiming SF backgrounds. These people are the equivalent to the 'techs' with flashing light boxes. They all should receive the same response however I have met guys who were not trained in surveillance by the police or army and yet show an extremely high degree of competence and a desire to learn. I applaud people like this. This is how I see myself in regard to TSCM. Neither do I like elitism and it should definitely not be directed at those seeking to gain experience, unfortunately some of the messages I have read were exactly that. I am not trying to be offensive and would like to commend Steve Uhrig who over the last few weeks has offered FOC much needed advice and help. This is what I imagined the group to be. Tim [Non-text portions of this message have been removed] 3945 From: Date: Wed Oct 17, 2001 6:14am Subject: Russia quits Cuba spy centre, ends Cold War chapter Russia quits Cuba spy centre, ends Cold War chapter By Richard Balmforth MOSCOW, Oct 17 (Reuters) - President Vladimir Putin said on Wednesday that Russia was closing its Lourdes spy centre in Cuba, heralding the end of four decades of Russian military presence on the Caribbean island. Putin told military top brass that the decision to close the electronic intelligence centre outside Havana had been reached after "deep analysis and long talks with our Cuban partners." His wording suggested that the decision to shut the huge intelligence "listening post" 90 miles (150 km) off the Florida coast had met resistance from veteran Cuban leader Fidel Castro. Putin also confirmed an earlier decision that Russia would leave its military base at Vietnam's Cam Ranh Bay, once used by Americans and Japanese and which Moscow had used rent-free from its former Communist ally since 1979. The Cuban move dramatically propelled forward Russia's relations with the United States, already on a high since Putin threw his country's support behind President George W. Bush's "anti-terrorist coalition." "It is the first real step towards a real partnership with the U.S....If you wanted a symbol of the Cold War, it was Lourdes," said independent military expert Alexander Golts. END OF COLD WAR CHAPTER Putin, quoted by Interfax news agency, said Russia remained in favour of "a full lifting" of U.S. sanctions against Cuba, indicating Moscow would still offer Castro political support. A final Russian military pullout from Cuba will mark the end of a 40-year chapter in the Cold War in which Moscow sent thousands of troops and equipment across the world to America's doorstep to shore up Castro, its new young communist ally. Their presence there down through the decades was a constant irritant to the United States, provoking crisis after crisis. In 1962, the world held its breath when U.S. President John F. Kennedy confronted Kremlin chief Nikita Khrushchev over the installation of Soviet missile bases on Cuba. Chief of the General Staff, Anatoly Kvashnin, indicated the sharp improvement in Russia-U.S. relations had encouraged Moscow in its move, saying the closure of the bases had been linked to "changes in the military-political atmosphere in the world." Kvashnin, speaking on television, said money saved from the closures could fund new areas of research and development. "The annual rental of the electronic surveillance centre is 200 million dollars without counting the upkeep of personnel. For this sum we can buy and put up into space 20 spy satellites and also acquire for the army up to 100 radar stations," he said. The Lourdes base, built in 1964, has latterly been home to about 1,500 Russian military and their families. Kept by Russia on land leased from its former Cold War ally in exchange for crude oil and other supplies to Cuba, Lourdes has long been the source of controversy between Moscow and some political quarters in Washington. The House of Representatives passed a bill last year to try to prevent the United States from rescheduling hundreds of millions of dollars in Russian debt unless Moscow shut it down. Festooned with antennae, cables and electronic equipment, the Lourdes base alone provided Havana with 75 per cent of its intelligence material, a senior Castro aide once said. Putin's oblique suggestion that its closure had been the subject of difficult negotiations was in line with Russian press reports following his visit to Cuba last December which said he he had not seen eye-to-eye with Castro on several issues. 3946 From: Date: Wed Oct 17, 2001 6:17am Subject: Re: A man and his son ..OFFENSIVE - to a few I defend you right to be offended. As for me, No apologies, no regrets, no blame, no alibi's, no recriminations. 3947 From: Aimee Farr Date: Wed Oct 17, 2001 10:22am Subject: The Art Of Antbed Stickin' ------------------------------------------ RE: [TSCM-L] A man and his son ..OFFENSIVE ------------------------------------------ Ever given a naughty little boy a stick and sat him next to an antbed? He sticks the antbed, to watch the ants come out, and swarm around the stick. When you incite them, you make the ants come out where you can see them. You can use a magnifying glass to closely examine them, and burn them if'n you wanna. If you're a master at "antbed stickin'," you can even get the ants to fight one another. This provides hours of enjoyment, and the opportunity to learn a lot about the ants, which usually stay deep and safe in the mound, well away from naughty little boys. The smart old ants will stay in the mound, realizing it's just silly for them to run out, and risk life and limb to bite a dumb 'ole stick. ~Aimee 3948 From: DrPepper Date: Wed Oct 17, 2001 10:40am Subject: Re: A man and his son ..OFFENSIVE (NO SARCASM INTENDED HERE) I understand the problems with the IRA in the UK, I was there when it was particularly bad, but I do not understand why the brits don't just get out of Ireland.? Would that solve the problem? -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ============================================== talisker wrote: > > Would you feel the same if they took out London? > > We have been subjected to terrorist attacks by the IRA and now the Real IRA > for some time now. They would take great delight in killing my family and > I, also any other innocent victims close by. However, I do not blame the > entire Irish Nation for the actions of just a few. In fact quite the > reverse I love the people of Ireland who are undoubtedly one of the > friendliest groups of people on the planet. 3949 From: Aimee Farr Date: Wed Oct 17, 2001 1:00pm Subject: Jackasses. [I banged this out last night...] THE NATURE OF A CRAFT v. A SERVICE: JACKASSES AS A DISTINGUISHING FACTOR By Aimee E. Farr This is long-winded, but if you're a self-perceived "serfs" in here, it might give you some insight. I am still a young lawyer, so in many respects, I am a serf, too. I face the same obstacles to my development that many of you do. ---- I have to establish mentoring relationships with lawyers (and others) that I want to glean something from. The burden is on me. I have to prove I am "worthy." Even to talk to them. Is that bad? No, entry-level resistance contributes to competency, it does not detract from it. If you are successful in a some professions, people will pester you for your expertise, and you will make selections. The selections you make contribute or detract from the profession, and your professional reputation. You will not find a mailing list in law like this. If I were to post a "how to" question to a legal mailing list, "How do I write a clause for...." I would be laughed out of the room. For me to get the mentorship of a senior partner, even for a simple question, is nothing short of a conversation with GOD. This "selectivity" is the mark of a craft and The Cravath System -- the Darwinian process by which skill development in a craft is encouraged and mentored by senior professionals. It takes place outside of formal employment contexts, too. So, how do they do that? BY BEING A JACKASS. Being a jackass is the traditional, time-tested fashion in which senior members of a craft-profession contribute to the competency of the craft-profession, and the development of junior members. JACKASSES TO ENTRY: The nature of a craft, from pottery to the practice of law, involves _selective_ apprenticeship. When my father went to law school, 3/4 flunked out. Factors indicate a cooperative decision was made not just as to your ability, but whether or not THEY wanted YOU to be a lawyer. Was that fair? No. It was criminal. The TRUE craftsman's guild for law began in that process with origins in letters of family. In an attempt to be "fair" (and avoid lawsuits, and make law schools money, and allow women lawyers, etc.) we lost that "discriminatory" entry peer-vetting protection. Only bare vestiges of this practice still remain in the law firm. I'll let you judge the results for yourself. Some good, some bad. Many view counterespionage/TSCM as a "service," with a bunch of high-and-mighty professionals at the very top that are egocentric, condescending, and overly protective of their turf and skillsets. That is not what is really going on here. This is a craft. There are too many indications of a natural craft system. JACKASSES TO MENTORSHIP: Once you get in at an apprenticeship level to a craft, by passing their resistance barriers, you will likely be afforded the opportunity to acquire the resources and mentorship that you need. This is where the real work begins. Thus, in a law firm, it is "What can I do for you, _SIR_?" Rather than, "What can you teach ME today?" Associates fight for senior partner files. In all crafts, mentorship is a private, and intensely personal matter. It's THE PRIZE. Senior members determine whether or not you are allowed to develop, and they can stop your development at any time.... You are extremely fortunate that there are private training programs available or private job opportunities that allow you to simply "pay" for the opportunity to glean the expertise of some senior professionals. Ditto for any professional associations. Unlike in a law firm, senior professionals here have little or no stake in your development. I listen to these guys talk. Things like, "I studied with...." "I trained with...." We lost that in practice of law a very long time ago. JUNIOR JACKASSES: As junior professionals, you are in _competition with one another_ for development and the mentoring of a very limited number of senior professionals. BTW, not only are your cohorts sometimes not helpful, they will hide the bacon from you, and allow you to make gross mistakes. It ensures they have a better opportunity to advance in their development. JACKASS GUILD: Another mark of a craft is a jackass guild. They usually get together and do jackass things intent on restricting their knowledge and profession and ousting those they deem "unworthy." A key distinction from other animal packs is that they also encourage restrictive jackass breeding programs and formal jackass designation. By doing this, they control the jackass population. ----- For many of you, this is your first exposure to a craft, and you fail to see it for what it really is, because you come from a service profession or have a service mentality. (There are very few crafts. A craft isn't "better" -- it's just different. And, it's not always apparent. This one is subtle.) Some react with hostility and frustration perceiving an ass-kissing climate full of monstrous personalities and sense unfairness in the divisions between the "washed" and the "clean." The crybaby associate that actually has the nerve to complain in a law firm will not only never make partner, they won't make second year. Quiet decisions are made. Another mark of a craft. Again, it's not democratic, understanding, or fair. A craft is cruel, restrictive and endlessly Darwinian. Nothing is given or offered. Everything must be taken on personal initiative and a constant demonstrations of skill and worthiness to BE ALLOWED to try your skills at "the next level," and associate in a meaningful manner with senior professionals. These guys have a craft system. It is quite amazing it its subtlety. They didn't set it up "on purpose," it is the natural and logical result of skill-intensity. Deal with it. ~Aimee 3950 From: MIKE F Date: Wed Oct 17, 2001 1:33pm Subject: Nokia Ringtone Software ConvertYourTone.com - Nokia Ringtone Software http://www.convertyourtone.com/ --------------------------- lATER4,Mike Fiorentino Master Links 4 Master Investigators http://www.ml4mi.com e-mail: info@m... OR friindy@a... 3951 From: DrPepper Date: Wed Oct 17, 2001 2:28pm Subject: Re: Jackasses. Nicely put, Aimee,, , , , , , There is another aspect of this that you did not touch upon. Usually, in a large company that hires engineers and other skilled people (including some government agencies) there is dark discrimination against those who do not have a degree from some college. It doesn't matter that the individual is smarter, more skilled, and does the job better than any degreed person, if he does not have a degree, he does not get the promotions, no matter HOW good he is. Yet the real putzes who get this person to do his work for him, will get all the recognition and promotions. THAT is the real discrimination. BTW, in case you are wondering, I am a degreed Registered Professional Engineer in the state of California (retired) -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ================================================= Aimee Farr wrote: > [I banged this out last night...] > > THE NATURE OF A CRAFT v. A SERVICE: > > JACKASSES AS A DISTINGUISHING FACTOR > By Aimee E. Farr > > This is long-winded, but if you're a self-perceived "serfs" in here, it > might give you some insight. I am still a young lawyer, so in many respects, > I am a serf, too. I face the same obstacles to my development that many of > you do. > ---- 3952 From: A Grudko Date: Wed Oct 17, 2001 10:23am Subject: London - Original Message - > -andy http://www.networkintrusion.co.uk >> > Would you feel the same if they took out London? Advice I have from a client there, self proclaimed ex- Metropolitan police Anti-Terrorism Branch (the Yard's bell, book and candle boys), is that London is to be targeted by the Al Qaedar network on November 8th. Why that date in not specified. Hopefully the UK authorites will turn this into a non-event, or even better, a make arrests, but I might stay home that day if I lived in London. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 3953 From: talisker Date: Wed Oct 17, 2001 3:13pm Subject: Re: A man and his son ..OFFENSIVE -apology Hi I've said my piece, the replies have been "interesting" but I suggest we get back on topic. For the others please accept my apology for lowering the list signal to noise ratio. I'm happy to carry on the conversation off list with anyone who wishes to. As to Liverpool was it the "Bin Workin" joke? -andy http://www.networkintrusion.co.uk ----- Original Message ----- From: To: Sent: Wednesday, October 17, 2001 4:17 PM Subject: Re: [TSCM-L] A man and his son ..OFFENSIVE - to a few > > I defend you right to be offended. As for me, > No apologies, no regrets, no blame, no alibi's, no recriminations. > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 3954 From: factfind Date: Wed Oct 17, 2001 6:07pm Subject: On Readiness Old Sun Tzu had it just right. "The art of war teaches us not to rely on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable" Sun Tzu The Art Of War Fraternally Dave Linsky SSC Security and Investigations [Non-text portions of this message have been removed] 3955 From: Date: Wed Oct 17, 2001 11:12am Subject: Re: Jackasses. Dear Aimee More hot air than long winded. I am going to have to use a decoder with your messages. Strange parallels, couldn't see the connection. You must be popular in your place of employment! I'm glad I don't work there. Apologies for thinking a E group was about 'helping each other.' Still, if you ever need any advice on surveillance from a fellow professional who now runs the largest Investigation company in Ireland grown from nothing three years ago and was trained and worked closely with British security Services and UK Special Forces don't hesitate to ask. 'Dog eat dog' don't apply here. Tim [Non-text portions of this message have been removed] 3956 From: gkeenan Date: Wed Oct 17, 2001 3:02pm Subject: London 8 November for an attack seems a bit "off" to me too. Now, if it was to take place on 05 November - Guy Fawkes Day - with all the kids out and about doing the "penny for the Guy" thing, and if they allowed the usual fireworks on that night (I would think, however, that they'd ban the fireworks this year), then that date would be more understandable. The Guy Fawkes effigies would also offer good "cover" for HE being transported from A to B. Just another father with his kids out for Guy Fawkes and the fireworks? Jerry Keenan West Islip, NY [Non-text portions of this message have been removed] 3957 From: Craig Snedden Date: Wed Oct 17, 2001 11:04am Subject: RE: A man and his son ..OFFENSIVE Oh please, please, please (pleading!) don't open a discussion on that topic. It's just not that simple.......... I'm not prepared to and this is not the forum for a lesson in Irish history. Can we please get back on topic before we all fall out with each others geopolitical views. :-) Smile at someone today please...! -----Original Message----- From: DrPepper [mailto:DrPepper@i...] Sent: 17 October 2001 16:41 To: talisker Cc: TSCM-L@yahoogroups.com; MACCFound@a... Subject: Re: [TSCM-L] A man and his son ..OFFENSIVE (NO SARCASM INTENDED HERE) I understand the problems with the IRA in the UK, I was there when it was particularly bad, but I do not understand why the brits don't just get out of Ireland.? Would that solve the problem? -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ============================================== talisker wrote: > > Would you feel the same if they took out London? > > We have been subjected to terrorist attacks by the IRA and now the Real IRA > for some time now. They would take great delight in killing my family and > I, also any other innocent victims close by. However, I do not blame the > entire Irish Nation for the actions of just a few. In fact quite the > reverse I love the people of Ireland who are undoubtedly one of the > friendliest groups of people on the planet. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3958 From: Date: Wed Oct 17, 2001 8:38am Subject: RE: TSCM vs. PI (is it really a competition?) Chad, et al, I think this thread has morphed from it's original intent, but if uyou read the title, and believe that it is truly a misnomner, because in most areas, the PIs are taking the money that the TSCM guys should be getting. And it's not their fault, or the lack of any regulatory body. I know that the majority of my (small) TSCM income comes from PI referrals. They take out the full page ad and farm the work to me. I condiser that a good deal. I must say that you (chad) have voiced my unspoken opinions for some time on this group. I came to this business (TSCM) with a degree in electronic engineering and a degree in advanced mathematics. I will agree with the almighty's here that these awards in themselves, do not constitute an ability to conduct TSCM services. I have always agreed, and so I alilgned myslef with a local TSCM practitioner, who also happened to be a PI, but he came from Navy Counter-Intelligence and so his first love was TSCM. The PI license for him was more of an income-earner, however, because he had no marketing/promotion agenda/abilities. Between him, this group, and my own quest to learn everything I can, I have been able to amass what I believe is a solid level of equipment and knowledge. But I am like you, I want more. I also have a TEK 494AP, and Steve Uhrig was an immense help to me in figuring some stuff out before he even got his. In fact, Steve was willing to read my un-clear emails, and listen to naive questions. Steve knows his stuff, and is willing to share, and is a super nice fella to boot. Another super nice guy is Kevin Murray. He is a man who has built a thriving TSCM business and has oodles of information to share. Glen Whidden is also a great help. Other almighty's on here talk the talk but don't walk the walk. Some time ago, a (software) client of mine wanted to hire me to do a sweep, and I referred him to one of the Gods on this group (becuase I felt I didn;t have quite enough experience). I was there for the sweep. They didn't do what they said they would do. They didn't sweep from DC-Pluto like they professed to do on this group. Maybe it was a bad day. My point is simply to take what you read up here with a grain of salt until you confirm/verify/understand it for yourslef and how it applies to the sweeps you are actually doing in your area. I've had the distinct feeling for some times that some people on this group are afraid to "let the secret out". They don't want a rush of TSCMers out there scarfing up all the business. They think that by withholding information that they are somehow protecting their interests. They forget that there is no way that a client in Colombia South Carolina is going to pay to have someone travel from Boston/New York or wherever, when they can open up the yellow pages and see PI ads for bug detection. I don't want to open up another can of worms regarding ethical PIs, but in my area, most PIs admit they don't know the first thing about sweeps, and are happy to refer the buisiness and split the revenue. That way, I do the sweep, and simply receive a check. I know there are PIs here that are as dumb as a donkey, waving a JCM something-or- other around performing sweeps. In a sense I don't blame them - they will get their come-uppings someday, but I see it as my opportunity to market not only my skills but also what sets me apart from a regular PI in terms of what I do for the client. I also obtained my PI license, more as an effort to have equal standing in order to get an audience with clients, and from there explain the differences. To an uneducated client (the majority) a 494 might as well be a Playstation 2. They don't care what it does, they just care whether or not they are bugged. Waving it around makes them feel better, but at the end many are not confident. A local law office uses a PI to conduct sweeps regularily. I am very close to convincing this local law office to allow me to install a "wireless microphone" and test the PI service. I happen to know that this particular PI is a ju-ju man, and has no idea what he is doing, but he has some nice looking briefcases, and his equiment has some green and red lights. I think this approach would serve us all better than spending time forming regulatory association after association while the PIs earn the money we should be earning. (I am NOT against an association or licensing or regulation). I call it the Michael Jordan approach. There is only one way that MJ can prove he is a better player - he takes the ball from the other guy and scores the points. It's that simple. Talent doesn;t hurt either, but the end result is what everyone is after. And that is what we must do. It's what Steve Uhrig, Kevin Murray and Glenn Whidden have been doing. They have been getting out there and raising the bar in the marketplace where ultimately it matters. Other than my beefs above, i think this group is a very positive thing and I think Mr. Atkinson deserves a hearty slap on the back for keeping it going, as he too has a business to run. It is the only place that I know of that we can all get together and read opinions from other people working in this area. Ms. Farr provides excellent info and some nice prose to boot. Mike F (4) provides interesting stuff too. So the group is a very positive thing. Chad, I would be happy to discuss the 494 privately/publicly, as I have much to learn about it. I have copies of all of the manuals if you need them. Just my $0.02 - sorry I don;t have anything to add to the group in this message, I just didn't want chad to sit in the corner by himself. NC 3959 From: Charles P Date: Wed Oct 17, 2001 10:26pm Subject: Re: They were destroyed by Terrorists. "What were terrorists, Daddy?" I think that is how the lines should read. That can be reproduced. charles 3960 From: Craig Snedden Date: Wed Oct 17, 2001 10:20pm Subject: RE: A man and his son ..OFFENSIVE -apology Andy, it was worse than the bin workin one.... No I'm definitely not going to say it. I've a few good ones from a friend in Saudi (don't know how he has managed to sneak them past the censors thus far), but I fear our "cousins" across the pond would not understand some of them and some of the best ones are jpg or gif files, which the Yahoo Group wont allow. So no can share unless you want them offlist. Craig -----Original Message----- From: talisker [mailto:Talisker@n...] Sent: 17 October 2001 21:13 To: TSCM-L@yahoogroups.com; MACCFound@a... Subject: Re: [TSCM-L] A man and his son ..OFFENSIVE -apology Hi I've said my piece, the replies have been "interesting" but I suggest we get back on topic. For the others please accept my apology for lowering the list signal to noise ratio. I'm happy to carry on the conversation off list with anyone who wishes to. As to Liverpool was it the "Bin Workin" joke? -andy http://www.networkintrusion.co.uk ----- Original Message ----- From: To: Sent: Wednesday, October 17, 2001 4:17 PM Subject: Re: [TSCM-L] A man and his son ..OFFENSIVE - to a few > > I defend you right to be offended. As for me, > No apologies, no regrets, no blame, no alibi's, no recriminations. > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 3961 From: Marty Kaiser Date: Thu Oct 18, 2001 5:27am Subject: Thanksgiving Now that Halloween is almost out of the way it is time to turn our thoughts to Thanksgiving. Here is a dressing recipe I found several years ago for a 15lb turkey. 2 cups breadcrumbs 1/2 cup butter 1 teaspoon salt 1 teaspoon pepper 2 cups of uncooked popcorn celery to taste onion to taste Cook for 5 hours until the popcorn blows the ass off the bird! Marty [Non-text portions of this message have been removed] From: A.Lizard Date: Sun Oct 17, 2004 1:23pm Subject: Linux video security app with motion detection Looks interesting, securing it shouldn't be all that big a problem, and of course, it's Open Source / free. I agree with respect to the suggestions of moving the mailing list. If it isn't moved, we're all going to wake up one day and find Yahoo has pulled the plug. A.Lizard http://software.newsforge.com/print.pl?sid=04/10/11/1758211 detailed product review http://www.zoneminder.com/ Feature List Runs on any Linux distribution! Supports video, USB and network cameras. Built on standard tools, C++, perl and php. Uses high performance MySQL database. High performance independent video capture and analysis daemons allowing high failure redundancy. Multiple Zones (Regions Of Interest) can be defined per camera. Each can have a different sensitivity or be ignored altogether. Large number of configuration options allowing maximum performance on any hardware. User friendly web interface allowing full control of system or cameras as well as live views and event replays. Supports live video in mpeg video, multi-part jpeg and stills formats. Support event replay in mpeg video, multi-part jpeg, stills and statisticss formats User defined filters allowing selection of any number of events by combination of characteristics in any order. Event notification by email or SMS including attached still images or video of specific events by filter. Automatic uploading of matching events to external FTP storage for archiving and data security. Includes bi-directional X10 (home automation protocol) integration allowing X10 signals to control when video is captured and for motion detection to trigger X10 devices. Highly partitioned design allow other hardware interfacing protocols to be added easily for support of alarm panels etc. Multiple users and user access levels Multi-language support with many languages already included Full control script support allowing most tasks to be automated or added to other applications. Prototype mobile/cellular phone access, enhanced interface coming soon Documents The first place to start for information on the latest release of ZoneMinder is in the included README in either HTML or PDF format. This will answer most of your questions and includes a TroubleShooting section to help address the most common problems. If you are a Spanish speaker, then Mauricio Henriquez has put together a useful document describing the process of installing Zoneminder and containing useful tips. You can download it from here, and an English translation will be up soon. Another user, Dave Dumolo, has also put together a document relating to installing ZoneMinder on SlackWare systems. SlackWare is organised slightly differently than most other distributions and has several pitfalls that can cause problems. Dave's document, which you can get from here, talks you through these. Although it is aimed at SlackWare users, there's helpful information in there for users of other distributions also. ©2003 Triornis LtdNews ï Downloads ï Documentation ï Screenshots ï Support ï Forums ï FAQ ï Shop ï Donate ï Home -- member The Internet Society (ISOC), The HTML Writers Guild. "Feudal societies go broke. These top-heavy crony capitalists of the Enron ilk are nowhere near so good at business as they think they are." Bruce Sterling Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@g... PGP 8.0 key available by request or keyserver. Download PGP from: http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html ***Looking for INTELLIGENT new technology public policy alternatives?*** http://www.ecis.com/~alizard/technology.html 9896 From: Gregory Hicks Date: Sun Oct 17, 2004 7:10pm Subject: Re: Has anyone heard anything about this? > To: TSCM-L@yahoogroups.com > From: Agent Geiger > Date: Sat, 16 Oct 2004 17:16:05 -0700 (PDT) > Subject: [TSCM-L] Has anyone heard anything about this? > > Has anyone heard anything about this? > > http://www.newswithviews.com/iserbyt/iserbyt19.htm Some selected articles from Dave Farber's "Interesting-People" list [IP]. Archives at: http://www.interesting-people.org/archives/interesting-people/ Los Angeles Times: GOP Aims to Add Police Powers to Intelligence Reform http://www.interesting-people.org/archives/interesting-people/200409/msg00239.html New US Passport ID Technology Has High Error Rate http://www.interesting-people.org/archives/interesting-people/200408/msg00061.html Your papers please, says the 9/11 commission http://www.interesting-people.org/archives/interesting-people/200407/msg00281.html U.S. and Canada look into common ID card -- full article http://www.interesting-people.org/archives/interesting-people/200407/msg00090.html washingtonpost.com: Bahamas Firm Screens Personal Data To Assess Risk http://www.interesting-people.org/archives/interesting-people/200410/msg00084.html --------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 | Fax: 408.894.3479 San Jose, CA 95134 | Internet: ghicks@c... I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton 9897 From: Monty Date: Sun Oct 17, 2004 4:42pm Subject: Re: Sweep needed ?? what is (was) it ?? --- n2vrt@a... wrote: > > Ron Check this out > > Ed > > > [Non-text portions of this message have been removed] > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail Address AutoComplete - You start. We finish. http://promotions.yahoo.com/new_mail 9898 From: DATA_4N6_Engineering Date: Mon Oct 18, 2004 7:39am Subject: Re: Re: suggestions on a portable USB .... USB is microprocessor intensive, firewire is not. I have tested most of the write blocker units and have found the throughput for USB to be unsatisfactory. I only use write blockers designed and based on NIST standards for SCSI and IDE drives including Raid. I have a firewire write blocker and it's throughput is much faster than my USB unit. I try to image all drives in their native interface. I really don't like firewire or USB write blockers. If I have to go to DOS on some occasions, my write blockers are easy to implement, and I don't have to worry about special drivers for USB and Firewire. I have found many incompatibilities with USB and firewire units, and if you have to preview a drive, you will never be able to view the HPA with USB or Firewire write blocks. With my write blocks and portable machine I can be assured of compatibility for any drive, except possible for RLL and MFM and I haven't seen any of those for a while, although I do keep a controller card around just in case. Jon Asdourian Data Forensics Engineering telos888@y... wrote: Wonder why everything out there is Firewire instead of USB 2.0. USB 2.0 has a higher throughput than 1394a doesn't it (480 Mbp/s vs 400 Mbp/s)? ...... Original Message ....... On Sat, 16 Oct 2004 12:37:24 -0700 (PDT) Steve Sanchez wrote: >Message: 2 > Date: Fri, 15 Oct 2004 20:41 -0400 > From: telos888@y... >Subject: Re: Re: Review: An Evidence Collection Device > >Any suggestions on a portable USB or Firewire >write-blocker in that >$200 >range? > > >Hi, > >Try Firefly from http://www.digitalintel.com > >Excellent product and cheap too! > >Steve > >__________________________________________________ >Do You Yahoo!? >Tired of spam? Yahoo! Mail has the best spam protection around >http://mail.yahoo.com >. > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. Jon Asdourian 61 356B Red Porsche Coupe 69 Red MGC GT 63 Burgundy Austin Healey 3000 BJ7 356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC --------------------------------- Do you Yahoo!? vote.yahoo.com - Register online to vote today! [Non-text portions of this message have been removed] 9899 From: Date: Mon Oct 18, 2004 10:37am Subject: RE: Has anyone heard anything about this? I do not think introducing a national ID card would require Evgeni Primakov as a consultant. Such documents exist in many countries through the world. Remember? - Ausweiss bitte?... The Soviet ID system (internal passports and Work Record Books) was a mere copy of German one which exist practically unchanged till today. Evgeni Primakov is a professional anyway and his expertize would benefit any country. Just one detail, gentlemen Americans: Mr Primakov was just on the other side (Chief of the Arab Division) while Bin Laden was a CIA trainee and got paid via BCCI International. Agent Geiger wrote: > >Has anyone heard anything about this? > >http://www.newswithviews.com/iserbyt/iserbyt19.htm > > > > > >__________________________________ >Do you Yahoo!? >Yahoo! Mail - Helps protect you from nasty viruses. >http://promotions.yahoo.com/new_mail > > > > __________________________________________________________________ Switch to Netscape Internet Service. As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register Netscape. Just the Net You Need. New! Netscape Toolbar for Internet Explorer Search from anywhere on the Web and block those annoying pop-ups. Download now at http://channels.netscape.com/ns/search/install.jsp 9900 From: kondrak Date: Mon Oct 18, 2004 4:37pm Subject: Re: Has anyone heard anything about this? Yup, its been all over the place.... At 20:16 10/16/2004, you wrote: >Has anyone heard anything about this? > >http://www.newswithviews.com/iserbyt/iserbyt19.htm > > > > > >__________________________________ >Do you Yahoo!? >Yahoo! Mail - Helps protect you from nasty viruses. >http://promotions.yahoo.com/new_mail > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9901 From: Kohlenberg, Toby Date: Mon Oct 18, 2004 0:52pm Subject: FW: [VulnWatch] pacsec.jp advisory: Firewire/IEEE 1394 Considered Harmful to Physical Security given the conversation about forensics recently, I thought this might be interesting to y'all. t -----Original Message----- From: Dragos Ruiu [mailto:dr@k...] Sent: Monday, October 18, 2004 1:53 AM To: vulnwatch@v... Subject: [VulnWatch] pacsec.jp advisory: Firewire/IEEE 1394 Considered Harmful to Physical Security Firewire/IEEE 1394 Considered Harmful to Physical Security Advisory URL: http://pacsec.jp/advisories.html Summary: -------- IEEE1394 Specification allows client devices to directly access host memory, bypassing operating system limitations. A malicious client device can read and modify sensitive memory, causing privilege escalation, information leakage and system compromise. Any system with sensitive information or in an unsecured physical location, esp. public access systems, should re-evaluate their system security and consider additional physical security measures if they are equipped with "firewire" ports. These ports are sometimes also called "iLink" on some Sony models. Details: -------- In the presentation, "Owned by an iPod" which Maximilian Dornseif, from Laboratory for Dependable Distributed Systems at RWTH Aachen University, will be giving at the PacSec.jp/core04 conference in Tokyo on Nov 11/12, several new techniques involving the IEEE 1394 interface commonly found on laptops, desktops, and some servers will be demonstrated. These techniques could be used in both malicious and beneficial applications. The beneficial applications are in the areas of system forensics and external debugging. The malicious applications are that anyone with physical access to the firewire port could tamper with system operation and compromise security without measures such as power cycling or rebooting. Systems that counted on physical access limitation such as blocking access to reset and power switches and other measures to limit compromise though such procedures as rebooting, need to re-examine their security. As usual, physical access to a computer usually implies the ability for compromise - however, with this new technique, merely plugging in a malicious Firewire/1394 client device with special software could be enough to tamper with a target. It becomes easier to violate security if the combination of physical access and 1394 interfaces is available. Security policies and procedures should be re-evaluated and consider this new information where needed. Fix: ---- On some systems that require untrusted/unauthenticated physical access by strangers and still require restricted operations, removal of wire headers connecting external case firewire jacks may provide some limited remediation. On laptops epoxy may be used to permanently disable the external jack if such loss of functionality can be tolerated. The primary precaution is that employees should be warned that they should not plug unknown/untrusted firewire devices into computers containing sensitive information. As this capability is built into the specification and chipsets at the hardware level, software fixes are still under investigation and will be discussed at the presentation. Systems Affected: ----------------- - Any operating system and any processor platform with IEEE 1394 interfaces. In some cases even if the operating system in question does not support the interface, compromise may still be possible if the hardware is powered. -- World Security Pros. Cutting Edge Training, Tools, and Techniques Tokyo, JapanNov 11-12 2004 http://pacsec.jp pgpkey http://dragos.com/ kyxpgp 9902 From: wizardtradingcompany Date: Mon Oct 18, 2004 1:53pm Subject: 'Stupid' prosecutor quits after loss of credibility 'Stupid' prosecutor quits after loss of credibility 13 October 2004 AMSTERDAM ≠ Public prosecutor Joost Tonino resigned on Tuesday night after startling revelations emerged last week that he dumped his home computer filled with sensitive crime fighting information in the garbage. The computer ≠ which Tonino believed was defective due to a virus ≠ ended up in the hands of crime journalist Peter R. de Vries, who ran a televised report about its contents last Thursday. The hard drive contained information on high profile cases. Adding insult to injury, it was revealed on Monday that hackers raided Tonino's digital email box and placed important correspondence on the internet. The email was addressed to prosecution chief, Leo de Wit, asserting that existing investigations had not been damaged by De Vries' report. In reaction, Tonino asked the College van Procureurs-Generaal (Attorneys-General Council, the public prosecutor's governing body) to discharge him from his responsibilities. Tonino said he could no longer function in the job due to public doubts about his credibility. The public prosecutor's office (OM) said the attorneys-general council accepted the resignation and is now considering a new position within the organisation for Tonino. Speaking on current affairs television programme Nova on Tuesday night, Justice Minister Piet Hein Donner was unfazed by the developments. The Christian Democrat CDA minister said it was a "wise step" that Toninio "does not appear in court for a while". Donner also agreed that prosecutors must have credibility and that this was not the case if someone did something with "unbelievable stupidity". But despite claims in Parliament and within the prosecutor's office that what Tonino did was stupid, Minister Donner said this did not mean that Tonino was a bad prosecutor. Tonino had previously worked on high profile white collar crimes, such as the prosecution last year of former Philips boss, Cor Boonstra, who had been accused of insider trading. He transferred from the Amsterdam public prosecutor's office on 1 July to work for the prosecution on cases on behalf of the tax office investigation service FIOD-ECD, the Social Affairs Ministry's fraud investigation service SIOD and the Agriculture Ministry's investigation service AID. [Copyright Expatica News 2004] 9903 From: Date: Mon Oct 18, 2004 5:26pm Subject: Re: FW: [VulnWatch] pacsec.jp advisory: Firewire/IEEE 1394 Considered Harmful to Physical Security Woah, that's pretty significant especially for trusted operating systems (SELinux, Trusted Solaris etc). Seems like Firewire is almost like JTAG in some respects. ...... Original Message ....... On Mon, 18 Oct 2004 10:52:02 -0700 "Kohlenberg, Toby" wrote: > > >given the conversation about forensics recently, I thought this >might be interesting to y'all. > >t > >-----Original Message----- >From: Dragos Ruiu [mailto:dr@k...] >Sent: Monday, October 18, 2004 1:53 AM >To: vulnwatch@v... >Subject: [VulnWatch] pacsec.jp advisory: Firewire/IEEE 1394 Considered >Harmful to Physical Security > > >Firewire/IEEE 1394 Considered Harmful to Physical Security > >Advisory URL: http://pacsec.jp/advisories.html > >Summary: >-------- > >IEEE1394 Specification allows client devices to directly access host >memory, bypassing operating system limitations. A malicious client >device >can read and modify sensitive memory, causing privilege escalation, >information leakage and system compromise. Any system with sensitive >information or in an unsecured physical location, esp. public access >systems, should re-evaluate their system security and consider >additional >physical security measures if they are equipped with "firewire" ports. >These ports are sometimes also called "iLink" on some Sony models. > >Details: >-------- > >In the presentation, "Owned by an iPod" which Maximilian Dornseif, from >Laboratory for Dependable Distributed Systems at RWTH Aachen University, >will be giving at the PacSec.jp/core04 conference in Tokyo on Nov 11/12, >several new techniques involving the IEEE 1394 interface commonly >found on laptops, desktops, and some servers will be demonstrated. > >These techniques could be used in both malicious and beneficial >applications. >The beneficial applications are in the areas of system forensics and >external debugging. The malicious applications are that anyone with >physical access to the firewire port could tamper with system operation >and compromise security without measures such as power cycling or >rebooting. > >Systems that counted on physical access limitation such as blocking >access >to reset and power switches and other measures to limit compromise >though >such procedures as rebooting, need to re-examine their security. > >As usual, physical access to a computer usually implies the ability >for compromise - however, with this new technique, merely plugging >in a malicious Firewire/1394 client device with special software >could be enough to tamper with a target. It becomes easier to >violate security if the combination of physical access and 1394 >interfaces is available. > >Security policies and procedures should be re-evaluated >and consider this new information where needed. > >Fix: >---- > >On some systems that require untrusted/unauthenticated physical >access by strangers and still require restricted operations, removal >of wire headers connecting external case firewire jacks may provide >some limited remediation. > >On laptops epoxy may be used to permanently disable the external jack >if such loss of functionality can be tolerated. > >The primary precaution is that employees should be warned that they >should not plug unknown/untrusted firewire devices into computers >containing sensitive information. > >As this capability is built into the specification and chipsets at >the hardware level, software fixes are still under investigation and >will be discussed at the presentation. > > >Systems Affected: >----------------- > >- Any operating system and any processor platform with IEEE 1394 >interfaces. > In some cases even if the operating system in question does not >support > the interface, compromise may still be possible if the hardware is >powered. > > >-- >World Security Pros. Cutting Edge Training, Tools, and Techniques >Tokyo, JapanNov 11-12 2004 http://pacsec.jp >pgpkey http://dragos.com/ kyxpgp > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > >. > 9904 From: contranl Date: Mon Oct 18, 2004 7:57pm Subject: Airplanes with Gsm base-stations ! / Gsm jammers in France . Very soon you may use your Gsm onboard airplanes according to this story: --------------------------------- AIRBUS SUCCESSFULLY COMPLETES FIRST MOBILE-TELEPHONE FLIGHT TRIAL AND MULTIPLE WIRELESS-CABIN TECHNOLOGY DEMONSTRATION Airbus has successfully completed the first in-flight trial of GSM personal mobile- telephones aboard an airliner, paving the way for their future widespread use. The trial, which took place aboard an Airbus A320 flight-test aircraft flying from, and back to, Toulouse, is part of an ongoing technical development project to provide an in- flight mobile telephony service to airline passengers. In addition to tests for measurement purposes, functional tests were performed in which several different GSM telephones were used simultaneously for both voice communications and text messaging. The trials demonstrated successful communications to and from personal mobile telephones onboard to mobile and fixed telephones on the ground, and to another mobile telephone aboard. The prototype equipment and software used in the trials were developed by Airbus supported by the telecommunication specialist Icarelink. The signals from the mobile telephone went first to a "picocell" inside the aircraft, next to a computer server that routed them through the Globalstar satellite communications network to the ground, and finally to ground-based telephone networks. The tests are a major milestone in the offering by Airbus of personal mobile telephones aboard commercial aircraft from 2006. A key objective of Airbus is to provide passenger connectivity at affordable prices. This will mean implementation of affordable technologies, as well as cost-effective, flexible and personalised services for passengers in line with current international mobile- telephone charges. source: http://www.icarelink.com/ ------------------------------------ My personal comments: 1) When there is money to make safety is not important anymore ! 2) According to some other sources the interference problem is not an issue anymore since the on-board "picocell" will be so close to the Gsm's that they will automatically reduce there tranmitted power levels to minimal wich is in the order of milliwatts instead of the maximum 2 watts...i have to look into that but i don't trust it ! Gsm phones are not made to comply with aircraft interference problems they could easely malfunction and keep on transmitting at high power they are just crazy to give away my life for a stupid phone call http://www.caa.co.uk/docs/33/CAPAP2003_03.PDF 3) What happens with the billing ? will the airline have insight in the dialed numbers ? or do they just get a total bill from the provider? Or would you just have to pay the fixed satlink part of the call ? the rest would be on your monthly Gsm phonebill at home. 4) Infact this is a private Gsm basestation...that's new too ! So there is a real basestation onboard ...and it does decode the Gsm calls encrypted or not ? it then forwards the audio + signalling on a satellite link wich in turn forwards them to a terrestrial Gsm network ...?? Is that directly to the network or as a new Gsm signal trough the air? Another way would be to send the whole Gsm signal in it's original state...not demodulated and decrypted but as a non-modified RF-signal over the wideband satlink wich is then directly connected to the terrestrial Gsm network. Another way to look at it: The cell onboard the plane is nothing more then a new remote cell ....connected to the network over a satlink ...just as some militairy do. (when they fight somewhere they bring a small but complete Gsm basetation wich is connected to their homecountry trough a satlink) I also see some relation with my previous post about "France allows Gsm-jammers" wich i now doubt not to be jammers but in fact small basestations that all Gsm-phones would lock on to but would not be alowed to make or receive calls (except police ...etc) So when you go to a cinema in France your Gsm will lock to the local in-house Gsm-picocell ..but you will never be able to receive or make a call. How does that work ? ... the picocell is known to the network database as a restricted area cell...it will only allow calls from or to numbers belonging to security services...these security services ofcourse have to registrate first to a database wich holds all non-restricted numbers. So the screaming articles that call this jammers have it all wrong ! they are just new small cells with restrictions. What say ...did i solve the mysterious jammer problem ? Tetrascanner www.tetrascanner.com 9905 From: contranl Date: Mon Oct 18, 2004 8:40pm Subject: Gsm jamming / Gsm interception ( New equipment ! ) . Here it is... the "Secret" stuff everybody is looking for !!! A portable briefcase size Gsm-cell capable of intercepting all Gsm traffic around ! http://www.rivanetworks.com/nano/nano.htm There is no mention of how they solve the encryption problem probably the cell does not have any encryption/decryption capabilities and therefore a nearby Gsm-phone will go to non encrypted mode. wich is exactly why the also advertise the Motorola Sectera (encrypted) phones to go with it in other applications. Read all the pdf's in the "sample applications section ! Pay special attention to the "protection bubble pdf" Pay attention to where they talk about "sniffing numbers of the air" This must also be the "jammer wich is not a jammer" that they wanna use in France. Check the whole website ...they have some other interesting products. My first impression ...by looking at there "style" is that this is a "real" company with "real" products. It is published on the net ..open to anybody so i don't consider this secret stuff that can't published...if they don't want anyone to know then they shouldn't publish it. Tetrascanner www.tetrascanner.com 9906 From: Thomas Shaddack Date: Mon Oct 18, 2004 8:52pm Subject: Re: Airplanes with Gsm base-stations ! / Gsm jammers in France On Tue, 19 Oct 2004, contranl wrote: > My personal comments: > > 1) > When there is money to make safety is not important anymore ! From the fragments I heard, I'd guess that safety was never an issue (in addition, some FAA tests shown there is no problem with interference). If I understand it correctly (please correct me if I'm wrong), the problem was in the interface between the cellphone and the base stations on the ground. The phone was moving too rapidly, and was visible from too many stations at once, causing confusion. The safety issue was pandered to the people because it was more respectable than difficult-to-understand technical details of cellular networks (and because of the potential liability issues). > 2) > According to some other sources the interference problem is not an > issue anymore since the on-board "picocell" will be so close to > the Gsm's that they will automatically reduce there tranmitted power > levels to minimal wich is in the order of milliwatts instead of the > maximum 2 watts...i have to look into that but i don't trust it ! If the phone can be convinced to lock to the onboard BTS only, and not talk with the rest, it's doable. > Gsm phones are not made to comply with aircraft interference problems > they could easely malfunction and keep on transmitting at high power > they are just crazy to give away my life for a stupid phone call > http://www.caa.co.uk/docs/33/CAPAP2003_03.PDF I'd more worry about flying in an airplane with fly-by-wire electronics so fragile that it can be thrown into problems with only a cellphone. The airplanes should withstand a direct lightning hit to the fuselage; a cellphone, while inside the plane, has much lower energy output, and given the wavelengths vs the size of the airplane windows (surely bigger than 16 cm - the wavelength of 1800 MHz), a lightning in the plane's vicinity will shine a quite strong microwave pulse, including the GSM band, right into the fuselage, as the windows spoil the Faraday Cage effect for higher frequencies (though the majority of energy of lightning EMP tends to AFAIK be in lower frequencies). The phones will be also forced to transmit on only fraction of the maximum power. Unless they are configured to not switch to a different provider than their own. Such offending phones won't be able to lock to the airborne BTS, but will attempt to talk with the ground networks, presumably on full output power. If this is a risk, the airline may mitigate it by a sparse mesh of field strength meters, and dispatch a flight attendant to tell a passenger that his phone is not compliant and should be switched off, if a too strong signal is detected and triangulated to a defined seat number. > 3) > What happens with the billing ? will the airline have insight in the > dialed numbers ? or do they just get a total bill from the provider? > Or would you just have to pay the fixed satlink part of the call ? > the rest would be on your monthly Gsm phonebill at home. The airplane will behave exactly like a separate country with a single BTS. Billing issues will be identical to standard international roaming, with the peculiarity of being especially expensive. (Eek.) I suppose the airline will have access to the content of the call and the signalling information, like every other cellular provider. > 4) > Infact this is a private Gsm basestation...that's new too ! It looks like a "normal" GSM telephone provider with a single BTS in an airplane instead of a whole network of fixed ground-located masts. > So there is a real basestation onboard ...and it does decode the Gsm > calls encrypted or not ? it then forwards the audio + signalling on > a satellite link wich in turn forwards them to a terrestrial Gsm > network ...?? > Is that directly to the network or as a new Gsm signal trough the > air? My guess is that the base station (BTS) decodes the call (the GSM "encryption" is happening only between the BTS and the phone, the rest goes in plaintext within the operator's network - it's why you can reportedly sometimes intercept the calls between some BTSs with a scanner, when you manage to listen to their microwave link. > Another way would be to send the whole Gsm signal in it's original > state...not demodulated and decrypted but as a non-modified > RF-signal over the wideband satlink wich is then directly connected > to the terrestrial Gsm network. I'd guess that they will let the BTS talk with the phones, then relay the decrypted signal through their own satellite uplink up to the bird on the sky, then relay it from there to a fixed ground station, then connect it to the other cellular telcos' networks. > Another way to look at it: > The cell onboard the plane is nothing more then a new remote > cell ....connected to the network over a > satlink ...just as some militairy do. (when they fight somewhere > they bring a small but complete Gsm basetation wich is connected to > their homecountry trough a satlink) My guess is yes. > I also see some relation with my previous post about > "France allows Gsm-jammers" wich i now doubt not to be jammers but > in fact small basestations that all Gsm-phones would lock on to > but would not be alowed to make or receive calls > (except police ...etc) My guess is yes again. > So when you go to a cinema in France your Gsm will lock to the local > in-house Gsm-picocell ..but you will never be able to receive or > make a call. > How does that work ? ... the picocell is known to the > network database as a restricted area cell...it will only allow > calls from or to numbers belonging to security services...these > security services ofcourse have to registrate first to a database > wich holds all non-restricted numbers. Some phones reportedly allow manually locking them to a defined base station. If there is no additional shielding of the areas the picocell operates in, this should be an effective workaround. This scheme is unusable for the airplanes, as they move too fast to > So the screaming articles that call this jammers have it all wrong ! > they are just new small cells with restrictions. Potentially worrying trend leading to fragmentation of the relatively uniform ground coverage. Not even mentioning the endless possibilities for SMS spam. However, if it becomes a problem, I suppose graymarket firmwares for some phones will appear, with the function of blacklisting certain BTS cells. The next step then will be installation of EM shielding at the affected premises, once it becomes widespread enough to be a problem, to disallow such rogue phones talking with "disallowed" stations. Meanwhile, the technology will move to UWB, which is more difficult to be shielded against (higher frequencies - smaller holes allowed) nor jammed (the ones and zeroes are sent as tiny differences between the accurate moments when a needle pulse is supposed to be received) (if I remember correctly, this area is beyond my current level of comm tech understanding.) > What say ...did i solve the mysterious jammer problem ? This was said on Slashdot too, but one had to dig through all the usual crap to find it. Thanks for nice info, though. :) GSM is not my native area of experience, I am mostly guessing here. Please correct me wherever I am wrong. 9907 From: contranl Date: Mon Oct 18, 2004 9:50pm Subject: Re: Airplanes with Gsm base-stations ! / Gsm jammers in France . Thanks Thomas, It's a little late now so i prefer to reply later also i need to look into this difficult matter more deeply. In the meanwhile have a look at my posting before this one ("Gsm jamming / Gsm interception") wich deals mainly with interception. I just ran in to this: http://www.ipaccess.com/index.html Wich is exactly what we are talking about: A small Gsm "picocell" that can be used in cinema's / theaters /aitplanes ...etc it mentions all the things that i had thought of before it can even connect over the internet (IP) or WLAN The "ipacess" unit seems to be fairly lowcost compared to high-end imsi-catchers or professional Gsm monitoring equipment I am not 100% shure yet ..but i have a feeling that this unit would be suitable as a fake cell to catch Gsm-calls in your surroundings...specially if it can be programmed to not do encryption. Maybe it does not care about encryption at all and sends whatever it receives (encrypted or not) to a central point where the en/decreption is handled...so in this unique case the encryption also covers part of the network instead of only the air part as is the case with normal Gsm basestations. Is this the next scanner-hobby ? every body will have fake Gsm-cells in there house ..allowing them to intercept calls from nearby Gsm's...offcourse the owner of the fake-cell will have to pay for the call since it will go trough his outgoing (land)line but they won't care ..since they will have some "hot" amusement I think it is time for a small device or piece of software that you can add to your Gsm-phone ..it will warn you if encryption is switched off. (most phones don't show that) There are some test-phones around like those made by Sagem wich show and do all kind of things "normal" Gsm's can't do : http://www.sagem.com/mobiles/ot/index_ot.php A quick look does not reveal if they indicate crypto on or off but i assume you can find that out somewhere. Drawback is that they are probably a lot more expensive then normal Gsm's...and you have to know a lot about Gsm to understand them. Best solution against being "sniffed""would be a phone with a good crypto on/off indicator...if anyone has one let me know ! Tetrascanner www.tetrascanner.com 9908 From: contranl Date: Mon Oct 18, 2004 10:26pm Subject: Re: Airplanes with Gsm base-stations ! / Gsm jammers in France . Ok one more before i have to sleep: http://www.securesynergy.com/securitynews/newsitems/2004/sep- 04/230904-02.htm Wich reveals a little more about how they do it in airplanes pay attention to how they solve the problem of a Gsm-phone wanting to lock on to a Gsm-cell outside of the airplane.... !! By selective jamming of all frequencies not originating from the onboard cell !! I don't agree with this official jamming stuff Fine if you are the President and have to avoid whatever But jamming inside airplanes for economical/convenience reasons ? it's REDICULOUS ! Tetrascanner www.tetrascanner.com 9909 From: contranl Date: Mon Oct 18, 2004 10:57pm Subject: Remote controlled spectrum analyzer via Gsm / Cellphone . Remote controlled spectrum analyzer via a standard Gsm / Cellphone : http://www.integrasys- sa.com/SatmotionPocket_LookAndFeel/satmotionpocket.html [ Demo needs Java ] Shown software is for satellite stuff but i assume you could use that also for very fancy tscm purposes :) More details here: http://www.integrasys-sa.com/ProductsMonitoringSat.html Tetrascanner 9910 From: A Grudko Date: Tue Oct 19, 2004 1:04am Subject: RE: Airplanes with Gsm base-stations -----Original Message----- From: Thomas Shaddack [mailto:tscm-l@s...] > It looks like a "normal" GSM telephone provider with a single BTS in an airplane instead of a whole network of fixed ground-located masts. Darn it, there goes one of the few places where you can be free from rude cellphone fools endlessly bellowing and beeping in your ears. Where was that URL for a portable GSM jammer...... ;-) Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.764 / Virus Database: 511 - Release Date: 2004/09/15 [Non-text portions of this message have been removed] 9911 From: Tech Sec Lab Date: Tue Oct 19, 2004 8:54am Subject: Printers betray document secrets BBC 181004 That staple of crime novels - solving a case by identifying the typewriter used to write a ransom note - is being updated for the modern day. US scientists have discovered that every desktop printer has a signature style that it invisibly leaves on all the documents it produces. They have now found a way to use this to identify individual laser printers. The work will help track down printers used to make bogus bank notes, fake passports and other important papers. Spot colour Before now it was thought that the differences between cheap, mass-produced desktop printers were not significant enough to make individual identification possible. But a team from Purdue University in Indiana led by Professor Edward Delp has developed techniques that make it possible to trace which printer was used to produce which document. In 11 out of 12 tests, the team's methods identified which model of desktop laser printer was used to print particular documents. "We also believe that we will be able to identify not only which model of printer was used but specifically which printer was used," Professor Delp said. The image processing software developed by Professor Delp's team looks for the "intrinsic signatures" that each printer produces. Professor Jan Allebach, who helped develop the ID techniques, said the production methods demanded by competition in the desktop printer market meant there was quite a lot of variation in the way different machines printed pages. "For a company to make printers all behave exactly the same way would require tightening the manufacturing tolerances to the point where each printer would be too expensive for consumers," he said. The differences emerge in the way that a laser printer lays down ink on the paper and which can be spotted with the Purdue system. Inkjet is next Typically, different printers lay down ink in distinct bands that can be spotted by image processing software. "We extract mathematical features, or measurements, from printed letters, then we use image analysis and pattern-recognition techniques to identify the printer," said Professor Delp. Desktop printers coupled with scanners have become favourites with forgers as they produce high-quality copies of banknotes and personal documents that can fool a casual glance. The team is now working to extend its techiques to cover inkjet printers. The team is also working on ways to manipulate printers so they lay down ink with more easily identifiable signatures. The researchers will present their detailed findings at the International Conference on Digital Printing Technologies in early November. 9912 From: A.Lizard Date: Mon Oct 18, 2004 6:02pm Subject: secret agent man!!! >Sad state of spying >Intelligence vets are still musing over Michael Kostiw, whose reported >shoplifting forced his withdrawal this month as the CIA's prospective >executive director. But what dismays the spooks most isn't the ethics or >the propriety of the case--it's that Kostiw had served as a case officer >for 10 years and still couldn't manage to shoplift a package of bacon >without getting caught in a Northern Virginia market. Says one old spy: >"It's a perfect metaphor for the sorry state of the CIA" http://www.usnews.com/usnews/issue/041025/whispers/25whisplead.htm While I don't think this the place for political debate, I think the state of US intelligence services is something of interest to everyone on the list. I only hope this guy hasn't been training people. A.Lizard -- member The Internet Society (ISOC), The HTML Writers Guild. "Feudal societies go broke. These top-heavy crony capitalists of the Enron ilk are nowhere near so good at business as they think they are." Bruce Sterling Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@g... PGP 8.0 key available by request or keyserver. Download PGP from: http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html ***Looking for INTELLIGENT new technology public policy alternatives?*** http://www.ecis.com/~alizard/technology.html 9913 From: DATA_4N6_Engineering Date: Tue Oct 19, 2004 8:06am Subject: Re: FW: [VulnWatch] pacsec.jp advisory: Firewire/IEEE 1394 Considered Harmful to Physical Security Linux and Unix systems will be less vunerable to this type of attack, since they typically rely on these devices being complied into the kernal, not to say if someone has access to a floppy or cdrom they could add the driver, it is more difficult than in microsoft products. Dumb terminials is the answer to better security and what a step back in time that is.!!!!!! With laptops this would alse require you to disable the PCMCIA port. Where there is a will there is a way. Jon Asdourian telos888@y... wrote: Woah, that's pretty significant especially for trusted operating systems (SELinux, Trusted Solaris etc). Seems like Firewire is almost like JTAG in some respects. ...... Original Message ....... On Mon, 18 Oct 2004 10:52:02 -0700 "Kohlenberg, Toby" wrote: > > >given the conversation about forensics recently, I thought this >might be interesting to y'all. > >t > >-----Original Message----- >From: Dragos Ruiu [mailto:dr@k...] >Sent: Monday, October 18, 2004 1:53 AM >To: vulnwatch@v... >Subject: [VulnWatch] pacsec.jp advisory: Firewire/IEEE 1394 Considered >Harmful to Physical Security > > >Firewire/IEEE 1394 Considered Harmful to Physical Security > >Advisory URL: http://pacsec.jp/advisories.html > >Summary: >-------- > >IEEE1394 Specification allows client devices to directly access host >memory, bypassing operating system limitations. A malicious client >device >can read and modify sensitive memory, causing privilege escalation, >information leakage and system compromise. Any system with sensitive >information or in an unsecured physical location, esp. public access >systems, should re-evaluate their system security and consider >additional >physical security measures if they are equipped with "firewire" ports. >These ports are sometimes also called "iLink" on some Sony models. > >Details: >-------- > >In the presentation, "Owned by an iPod" which Maximilian Dornseif, from >Laboratory for Dependable Distributed Systems at RWTH Aachen University, >will be giving at the PacSec.jp/core04 conference in Tokyo on Nov 11/12, >several new techniques involving the IEEE 1394 interface commonly >found on laptops, desktops, and some servers will be demonstrated. > >These techniques could be used in both malicious and beneficial >applications. >The beneficial applications are in the areas of system forensics and >external debugging. The malicious applications are that anyone with >physical access to the firewire port could tamper with system operation >and compromise security without measures such as power cycling or >rebooting. > >Systems that counted on physical access limitation such as blocking >access >to reset and power switches and other measures to limit compromise >though >such procedures as rebooting, need to re-examine their security. > >As usual, physical access to a computer usually implies the ability >for compromise - however, with this new technique, merely plugging >in a malicious Firewire/1394 client device with special software >could be enough to tamper with a target. It becomes easier to >violate security if the combination of physical access and 1394 >interfaces is available. > >Security policies and procedures should be re-evaluated >and consider this new information where needed. > >Fix: >---- > >On some systems that require untrusted/unauthenticated physical >access by strangers and still require restricted operations, removal >of wire headers connecting external case firewire jacks may provide >some limited remediation. > >On laptops epoxy may be used to permanently disable the external jack >if such loss of functionality can be tolerated. > >The primary precaution is that employees should be warned that they >should not plug unknown/untrusted firewire devices into computers >containing sensitive information. > >As this capability is built into the specification and chipsets at >the hardware level, software fixes are still under investigation and >will be discussed at the presentation. > > >Systems Affected: >----------------- > >- Any operating system and any processor platform with IEEE 1394 >interfaces. > In some cases even if the operating system in question does not >support > the interface, compromise may still be possible if the hardware is >powered. > > >-- >World Security Pros. Cutting Edge Training, Tools, and Techniques >Tokyo, Japan Nov 11-12 2004 http://pacsec.jp >pgpkey http://dragos.com/ kyxpgp > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > >. > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. Jon Asdourian 61 356B Red Porsche Coupe 69 Red MGC GT 63 Burgundy Austin Healey 3000 BJ7 356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC --------------------------------- Do you Yahoo!? vote.yahoo.com - Register online to vote today! [Non-text portions of this message have been removed] 9914 From: kondrak Date: Tue Oct 19, 2004 4:10pm Subject: OT: But- It's only TV Must of been watching Gilligan's island... >Ore. Man's TV Emits Int'l Distress Signal > > By Associated Press >October 19, 2004, 1:38 PM EDT > >CORVALLIS, Ore. -- Chris van Rossman's television came with a VCR, DVD >player and CD player -- plus a hidden feature that had a rescue team >beating a path to his door. > >On the night of Oct. 2, the TV began emitting the international distress >signal -- the 121.5 megahertz beep emitted by crashed airplanes and >sinking boats. > >The signal was picked up by a satellite, relayed to an Air Force base in >Virginia, then to the Civil Air Patrol, then to officials in Oregon. >Most signals are false alarms, but they're all checked out, and soon, >men in Air Force uniforms, a police officer and Mike Bamberger, a Benton >County Search and Rescue deputy, were at van Rossman's apartment door. > >"I have a pretty spotless record, so I wasn't overly concerned -- just a >little confused," van Rossman said. "The police officer asked if I was a >pilot or had a boat or anything." > >They left when he said "no," but came back when they narrowed the >location of the signal to a wall in van Rossman's hallway, Bamberger >said. > >The solution to the mystery was nailed when van Rossman turned off the >TV before answering the door the second time. The signal stopped, too. >An inspection of the television confirmed it was the source. > >"Their equipment was just bouncing everywhere as they turned it on and >off," van Rossman said. > >Neither investigators nor officials at Toshiba Corp. know exactly what >caused the problem, Bamberger said Tuesday. Toshiba plans to replace the >television and examine the offending one. > >"We have never experienced anything like this before at Toshiba," said >spokeswoman Maria Repole. > >In the meantime, van Rossman is keeping the set unplugged -- to avoid a >fine of up to $10,000 per day if his TV cries wolf again. > >Copyright © 2004, The Associated Press 9915 From: kondrak Date: Tue Oct 19, 2004 4:15pm Subject: Re: Printers betray document secrets What theyre NOT telling you is that top notch quality color printers, the type used to forge bank notes, have had a signature built into them for years now...its a small matter to trace this back.... At 09:54 10/19/2004, you wrote: >BBC 181004 >That staple of crime novels - solving a case by identifying the typewriter >used to write a ransom note - is being updated for the modern day. >US scientists have discovered that every desktop printer has a signature >style that it invisibly leaves on all the documents it produces. >They have now found a way to use this to identify individual laser printers. > >The work will help track down printers used to make bogus bank notes, fake >passports and other important papers. >Spot colour >Before now it was thought that the differences between cheap, mass-produced >desktop printers were not significant enough to make individual >identification possible. >But a team from Purdue University in Indiana led by Professor Edward Delp >has developed techniques that make it possible to trace which printer was >used to produce which document. >In 11 out of 12 tests, the team's methods identified which model of desktop >laser printer was used to print particular documents. >"We also believe that we will be able to identify not only which model of >printer was used but specifically which printer was used," Professor Delp >said. >The image processing software developed by Professor Delp's team looks for >the "intrinsic signatures" that each printer produces. >Professor Jan Allebach, who helped develop the ID techniques, said the >production methods demanded by competition in the desktop printer market >meant there was quite a lot of variation in the way different machines >printed pages. >"For a company to make printers all behave exactly the same way would >require tightening the manufacturing tolerances to the point where each >printer would be too expensive for consumers," he said. >The differences emerge in the way that a laser printer lays down ink on the >paper and which can be spotted with the Purdue system. >Inkjet is next >Typically, different printers lay down ink in distinct bands that can be >spotted by image processing software. >"We extract mathematical features, or measurements, from printed letters, >then we use image analysis and pattern-recognition techniques to identify >the printer," said Professor Delp. >Desktop printers coupled with scanners have become favourites with forgers >as they produce high-quality copies of banknotes and personal documents that >can fool a casual glance. >The team is now working to extend its techiques to cover inkjet printers. >The team is also working on ways to manipulate printers so they lay down ink >with more easily identifiable signatures. >The researchers will present their detailed findings at the International >Conference on Digital Printing Technologies in early November. > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9916 From: Date: Tue Oct 19, 2004 4:30pm Subject: Re: secret agent man!!! Not surprising at all. The CIA is a bunch of keystone cops, abusing intelligence information for personal gain and profit. Most of the case officers in Northern Virginia are spoiled fraternity brats moonlighting for investment bankers and DC law firms. If the United States ever gets attacked by a renegade cell of foreign venture capitalist attorneys, we're in good hands. ...... Original Message ....... On Mon, 18 Oct 2004 16:02:53 -0700 "A.Lizard" wrote: > > > >>Sad state of spying >>Intelligence vets are still musing over Michael Kostiw, whose reported >>shoplifting forced his withdrawal this month as the CIA's prospective >>executive director. But what dismays the spooks most isn't the ethics or >>the propriety of the case--it's that Kostiw had served as a case officer >>for 10 years and still couldn't manage to shoplift a package of bacon >>without getting caught in a Northern Virginia market. Says one old spy: >>"It's a perfect metaphor for the sorry state of the CIA" > >http://www.usnews.com/usnews/issue/041025/whispers/25whisplead.htm > >While I don't think this the place for political debate, I think the state >of US intelligence services is something of interest to everyone on the list. > >I only hope this guy hasn't been training people. > >A.Lizard >-- >member The Internet Society (ISOC), The HTML Writers Guild. >"Feudal societies go broke. These top-heavy crony capitalists of the Enron >ilk are nowhere near so good at business as they think they are." Bruce >Sterling >Personal Website http://www.ecis.com/~alizard >business Website http://reptilelabs.com >backup address (if ALL else fails) alizard@g... >PGP 8.0 key available by request or keyserver. Download PGP from: >http://www.pgpi.org for e-mail privacy. >Disaster prep info: http://www.ecis.com/~alizard/y2k.html >***Looking for INTELLIGENT new technology public policy alternatives?*** > http://www.ecis.com/~alizard/technology.html > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > >. > 9917 From: satcommunitfive Date: Tue Oct 19, 2004 7:56pm Subject: Re: Remote controlled spectrum analyzer via Gsm / Cellphone there is another way... for years i have used a win-radio on a laptop a wireless card/modem for comms. -using win-VNC to remote control the PC and VOIP software [speak freely -its all free] on the MIC input of the sound card [from the winradio] then I can do sweeps and listen in ! M 9918 From: Hawkspirit Date: Tue Oct 19, 2004 9:47pm Subject: Cell Phone Ping This is a copy of my post to another list after a private investigator paid $200.00 for a "cell phone ping" to locate a subscriber. He got no results from the company. Anyone want to make a comment on my post? Roger Tolces Electronic Security Co. I wanted to chime in on the subject of cell phone pinging, I have a pretty good knowledge of cell phone switching operations. The only one that can technically do a cell phone ping is the service provider as long as no one knows where the target is at that time. If the feds have surveillance on an individual and are in the same location they do have a hand held unit that will take over the local cell site control channel and interrogate all the local cell phones on that channel for their esn/id. They can then find the targets cell number and monitor it or even block it if they want to. Now if they know the targets number but not the location they can go to the service provider and ask the digital switch where the subscriber is currently located. If the subscriber has their phone on, the provider can give the cell site location. They can also send out an interrogation signal that can allow them to measure the delay time from the cell site to the phone and back and by noting which antenna on the three direction arrays receives the signal make a determination of direction and distance. If the subscriber is moving, the cell system will be handing the caller location off from cell site to cell site as the target moves. If the subscriber is in a roaming cell site not belonging to the primary service provider this process becomes much more complicated. If the subscriber has their cell phone shut off the service provider can identify the last cell site that they had their phone on and in operation but not prior direction and distance. This kind of activity generally requires a judicial warrant unless it comes down as a Patriot Act Request. Roger Tolces Electronic Security Co. www.bugsweeps.com [Non-text portions of this message have been removed] 9919 From: Andre Holmes <1ach@g...> Date: Tue Oct 19, 2004 10:09pm Subject: Emailing: photodiode Training Material The message is ready to be sent with the following file or link attachments: Shortcut to: http://www.national.com/onlineseminar/2004/photodiode/photodiode.html Note: To protect against computer viruses, e-mail programs may prevent sending or receiving certain types of file attachments. Check your e-mail security settings to determine how attachments are handled. [Non-text portions of this message have been removed] 9920 From: Mitch D Date: Wed Oct 20, 2004 1:02am Subject: Re: Cell Phone Ping The cellphone ping for 200 is horsepuckey.It parallels "spyshop physics" and is as credible as a gypsy asphalt job. you actually end up with subscriber info or the best location they can obtain by pretexting the subscriber. most list members know that true locates,or triangulation is reserved for 911 systems or law enforcement at different levels,along with the providers engineering/security dept,using the technique listed below. md --- Hawkspirit wrote: > > > This is a copy of my post to another list after a private > investigator paid > $200.00 for a "cell phone ping" to locate a subscriber. He got > no results > from the company. Anyone want to make a comment on my post? > > Roger Tolces > > Electronic Security Co. > > > > I wanted to chime in on the subject of cell phone pinging, I > have a pretty > good knowledge of cell phone switching operations. > > > > The only one that can technically do a cell phone ping is the > service > provider as long as no one knows where the target is at that > time. > > > > If the feds have surveillance on an individual and are in the > same location > they do have a hand held unit that will take over the local > cell site > control channel and interrogate all the local cell phones on > that channel > for their esn/id. They can then find the targets cell number > and monitor it > or even block it if they want to. > > > > Now if they know the targets number but not the location they > can go to the > service provider and ask the digital switch where the > subscriber is > currently located. If the subscriber has their phone on, the > provider can > give the cell site location. They can also send out an > interrogation signal > that can allow them to measure the delay time from the cell > site to the > phone and back and by noting which antenna on the three > direction arrays > receives the signal make a determination of direction and > distance. If the > subscriber is moving, the cell system will be handing the > caller location > off from cell site to cell site as the target moves. If the > subscriber is in > a roaming cell site not belonging to the primary service > provider this > process becomes much more complicated. > > > > If the subscriber has their cell phone shut off the service > provider can > identify the last cell site that they had their phone on and > in operation > but not prior direction and distance. > > > > This kind of activity generally requires a judicial warrant > unless it comes > down as a Patriot Act Request. > > > > Roger Tolces > > Electronic Security Co. > > www.bugsweeps.com > > > > > > [Non-text portions of this message have been removed] > > ===== Mitch Davis TSCM/Special Operations Group Inc. Nashville,TN.USA MitchD@t... site:www.tscmusa.com. Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 __________________________________ Do you Yahoo!? Take Yahoo! Mail with you! Get it on your mobile phone. http://mobile.yahoo.com/maildemo 9921 From: Michael Puchol Date: Wed Oct 20, 2004 1:45am Subject: Re: Cell Phone Ping There are some GSM operators which offer this service to end users directly, marketed as LBS (Location Based Services). Usually they will give the nearest service such as petrol, restaurant, etc. but some will also offer a latitude / longitude, or even an address. The quality of the service relies on the size of the cell where the phone is registered, as rural cells can give really bad results. In our networks no triangulation is made at all, which I believe is done in the U.S. by the 911 service. Here only the location of the cell, and at best, the sector of the cell where one is registered, are given. As an example, from my location, the two GSM operators that offer lat/lon coordinates put me some 27km away, which is basically the location of the cell where my phone registers. In cities where picocells exist, accuracy can be as good as 200 meters. Of course, there is an authorisation process involved, you cannot simply interrogate any phone, you have to submit an authorisation request for the number, which is then forwarded to the target phone via SMS by the network, and so the target phone's user must respond with an affirmative authorisation. Finally, this doesn't cost $200, but some 50 to 90 euro cents per location request. Best regards, Mike ----- Original Message ----- From: "Mitch D" To: Sent: Wednesday, October 20, 2004 8:02 AM Subject: Re: [TSCM-L] Cell Phone Ping > > The cellphone ping for 200 is horsepuckey.It parallels "spyshop > physics" and is as credible as a gypsy asphalt job. > you actually end up with subscriber info or the best location > they can obtain by pretexting the subscriber. > most list members know that true locates,or triangulation is > reserved for 911 systems or law enforcement at different > levels,along with the providers engineering/security dept,using > the technique listed below. > md > > > --- Hawkspirit wrote: > > > > > > > This is a copy of my post to another list after a private > > investigator paid > > $200.00 for a "cell phone ping" to locate a subscriber. He got > > no results > > from the company. Anyone want to make a comment on my post? > > > > Roger Tolces > > > > Electronic Security Co. > > > > > > > > I wanted to chime in on the subject of cell phone pinging, I > > have a pretty > > good knowledge of cell phone switching operations. > > > > > > > > The only one that can technically do a cell phone ping is the > > service > > provider as long as no one knows where the target is at that > > time. > > > > > > > > If the feds have surveillance on an individual and are in the > > same location > > they do have a hand held unit that will take over the local > > cell site > > control channel and interrogate all the local cell phones on > > that channel > > for their esn/id. They can then find the targets cell number > > and monitor it > > or even block it if they want to. > > > > > > > > Now if they know the targets number but not the location they > > can go to the > > service provider and ask the digital switch where the > > subscriber is > > currently located. If the subscriber has their phone on, the > > provider can > > give the cell site location. They can also send out an > > interrogation signal > > that can allow them to measure the delay time from the cell > > site to the > > phone and back and by noting which antenna on the three > > direction arrays > > receives the signal make a determination of direction and > > distance. If the > > subscriber is moving, the cell system will be handing the > > caller location > > off from cell site to cell site as the target moves. If the > > subscriber is in > > a roaming cell site not belonging to the primary service > > provider this > > process becomes much more complicated. > > > > > > > > If the subscriber has their cell phone shut off the service > > provider can > > identify the last cell site that they had their phone on and > > in operation > > but not prior direction and distance. > > > > > > > > This kind of activity generally requires a judicial warrant > > unless it comes > > down as a Patriot Act Request. > > > > > > > > Roger Tolces > > > > Electronic Security Co. > > > > www.bugsweeps.com > > > > > > > > > > > > [Non-text portions of this message have been removed] > > > > > > > ===== > > Mitch Davis > TSCM/Special Operations Group Inc. > Nashville,TN.USA > MitchD@t... site:www.tscmusa.com. > Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 > > > > > > > > > __________________________________ > Do you Yahoo!? > Take Yahoo! Mail with you! Get it on your mobile phone. > http://mobile.yahoo.com/maildemo > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 9922 From: A Grudko Date: Wed Oct 20, 2004 3:20am Subject: RE: Cell Phone Ping -----Original Message----- From: Mitch D [mailto:rockdriver@y...] > The cellphone ping for 200 is horsepuckey.It parallels "spyshop physics" and is as credible as a gypsy asphalt job. Unless of course the person offering the locate service was John Ashcroft moonlighting from his day job... (he may need a new career path after 2 Nov) > This kind of activity generally requires a judicial warrant > unless it comes down as a Patriot Act Request. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.764 / Virus Database: 511 - Release Date: 2004/09/15 [Non-text portions of this message have been removed] 9923 From: Mitch D Date: Wed Oct 20, 2004 8:09am Subject: Re: [OT] Digital Video Recorders --- Fernando Martins wrote: > hmmm ... that makes me ask something I'm allready asking to > several known > suppliers, but anyway here it goes ... > > 300 cameras, resolution 1/2 pal at 18ips, 30 day storage, high > security > system > question, what management and storage system would 'you' use? I'd probably use (10) 32 channel,1 TB storage,480 fps,rackmount units,with removable HDD's,Win based OS, extra channels might bail you out in the event of a capture card failure or will be useful for adding extra vid feeds __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 9924 From: savanted1 Date: Wed Oct 20, 2004 9:31am Subject: Mayor Calls For Telephone Code to Prevent Wiretapping Once again, Mexican politics are rocked with the release of a clandestine recording of telephone calls between leftist political figures on Mexican television stations. This phenomenon is not new in Mexico; politicians right up to Mexican President Vicente Fox have had private conversations broadcast on radio and television recently. The problem is so prevalent that Mexico City Mayor Andres Manuel Lopez Obrador, speaking at a news conference, maintained, "It's a call for all who speak on the telephone to use a code, a key, to speak in ciphers because the government's apparatus of espionage is at work." http://www.newsday.com/news/nationworld/world/wire/sns-ap-mexico- phone-spies,0,4820319.story?coll=sns-ap-world-headlines From: Robert G. Ferrell Date: Wed Oct 18, 2000 10:27am Subject: Re: Music not to TSCM by... >Just out of wild curiosity I wondering what kind of music the TSCM >community would annoy any party bugging a client? Some seriously weird synth stuff I wrote and recorded about 12 years ago. Guaranteed to induce psychosis, or at the very least a strange desire to track down and strangle Robert Moog... ;-) RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 1743 From: Date: Wed Oct 18, 2000 6:46am Subject: Re: Music not to TSCM by... In a message dated 10/17/00 2:03:13 AM Pacific Daylight Time, wk@c... writes: << Just out of wild curiosity I wondering what kind of music the TSCM community would annoy any party bugging a client? >> You guys need clients. 1744 From: James M. Atkinson, Comm-Eng Date: Wed Oct 18, 2000 11:06am Subject: Re: Music not to TSCM by... At 11:46 AM -0400 10/18/00, MACCFound@a... wrote: >In a message dated 10/17/00 2:03:13 AM Pacific Daylight Time, wk@c... >writes: > ><< Just out of wild curiosity I wondering what kind of music the TSCM > community would annoy any party bugging a client? >> > > You guys need clients. Personally, I have found that clients tend to distract you from the important things in life like fishing, music, and writing. -jma PS... I am just kidding. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1745 From: James M. Atkinson, Comm-Eng Date: Wed Oct 18, 2000 11:19am Subject: Re: Parliament sweep At 9:05 AM +0200 10/18/00, A Grudko wrote: >----- Original Message ----- > > While they may be basing their articulated suspicions on something > > that may not be rational (such as a buzzing in their ears), but the > > probability of them being targeted with technical eavesdropping is. > > -jma > >Indeed. There is a local spin in that our politicians are not voted into >parliament, but are appointees, frequently with no experience in their >portfolio topics. In the last few years the press have shown many of these >public employees are incompetant and that some even have forged >qualifications. > >Therefore some in parliament would love to shout out that the press had >placed those hallowed chambers under illegal technical surveillance, even if >they had no evidence. The result of the sweep was not made public. > >In all probability the press received their intelligence from a conventional >human leak. See if you can convince them to budget a few million dollars a year for program of recurring sweeps on a random basis, and get then to set up an in-house 7/24 monitoring program run by two dozen full time TSCM people. [grin] -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1746 From: James M. Atkinson, Comm-Eng Date: Wed Oct 18, 2000 11:47am Subject: Re: Music not to TSCM by... In my experience I have found that music with a lot of high pitched vocal of instrument sounds make it easier to detect eavesdropping devices. Typically a CD with really good speakers (such as the Bose Acoustic Wave) can fill a room with enough acoustic energy to get a good signal into transducers in the or nearby the room. However, watch the low frequency "rumbles" as they tend to carry quite far outside of the room being checked. The goal is to get just enough audio evenly distributed and phased/delayed in the room to get a fairly uniform acoustic field. If you are feeling particularly nerdly you can add some extra sounds to your CD to make it easier to detect the signature (such as a really, really short 50-150 mS blip that randomly occurs every 3-10 seconds). Once you find a suspect signal feeding it white noise (such as a vacuum cleaner sound) will help you track it down. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1747 From: Bob Washburne Date: Wed Oct 18, 2000 11:59am Subject: Re: Music not to TSCM by... "Robert G. Ferrell" wrote: > > >Just out of wild curiosity I wondering what kind of music the TSCM > >community would annoy any party bugging a client? > > Some seriously weird synth stuff I wrote and recorded about 12 years ago. > Guaranteed to induce psychosis, or at the very least a strange desire to > track down and strangle Robert Moog... > > ;-) > How could you think anything bad about Robert Moog once you've switched on Bach? But seriously, the Moog Synthesizer was a rather rare beast. Most synths are made on a totally different (simpler, limitied) technology. If you had the ability and tenacity to handle a Moog, then it is easy to see how you could handle TSCM-L. Bob Washburne - Who may have just dated himself. 1748 From: James M. Atkinson, Comm-Eng Date: Wed Oct 18, 2000 0:30pm Subject: Woori WatchDog IPM Box Good Afternoon, About a month ago I was loaned a Woori Watchdog (who didn't get one in this business...) I have completed a formal review and analysis of the Watchdog, and will be posting it to thins list and to my website in a few days. Any comments about your experience with the unit or observations concerning it would be appreciated. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1749 From: Robert G. Ferrell Date: Wed Oct 18, 2000 1:23pm Subject: Re: Music not to TSCM by... >How could you think anything bad about Robert Moog once you've switched >on Bach? Because Walter (oops, Wendy) Carlos was much, much better at using Mr. Moog's marvelous invention than I. >But seriously, the Moog Synthesizer was a rather rare beast. Most >synths are made on a totally different (simpler, limitied) technology. >If you had the ability and tenacity to handle a Moog, then it is easy to >see how you could handle TSCM-L. I've still got my Moog Opus 3 out in the storage unit somewhere. More patchcords than a 1930s switchboard. Individual oscillators, envelope generators, and waveform circuits for each key. Sounds like something off the set of "Dr. Who." ;-) RGF 1750 From: James M. Atkinson, Comm-Eng Date: Wed Oct 18, 2000 2:22pm Subject: Re: Music not to TSCM by... At 1:23 PM -0500 10/18/00, Robert G. Ferrell wrote: > >I've still got my Moog Opus 3 out in the storage unit somewhere. More >patchcords than a 1930s switchboard. Individual oscillators, envelope >generators, and waveform circuits for each key. Sounds like something off the >set of "Dr. Who." > [snip] Individual oscillators, envelope generators, and waveform circuits for each key... Are you sure we aren't talking about some TSCM equipment? 8-> -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1751 From: Bryan Herbert Date: Wed Oct 18, 2000 2:14pm Subject: Re: Music not to TSCM by... Car Sound Magazine sells high frequency and white noise test cd's through their website http://www.carsound.com/cds.shtml These discs can been used not only for car audio but also home theater systems and TSCM sweeps. "James M. Atkinson, Comm-Eng" wrote: > > In my experience I have found that music with a lot of high pitched > vocal of instrument sounds make it easier to detect eavesdropping > devices. > > Once you find a suspect signal feeding it white noise (such as a > vacuum cleaner sound) will help you track it down. > > -jma > > > ======================================================================= > > The First, The Largest, The Most Popular, and The Most Complete > TSCM, > Technical Security, and Counterintelligence Site on the Internet. > > > ======================================================================= > > James M. Atkinson Phone: (978) > 381-9111 > Granite Island Group Fax: (978) > 546-9467 > 127 Eastern Avenue #291 > http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > > > ======================================================================= > > Do not try the patience of Wizards, > for they are subtle and quick to anger. > > ======================================================================= > > eGroups Sponsor > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 1752 From: Robert G. Ferrell Date: Wed Oct 18, 2000 2:29pm Subject: Re: Music not to TSCM by... >Individual oscillators, envelope generators, and waveform circuits >for each key... Are you sure we aren't talking about some TSCM >equipment? 8-> Like how that one came full circle? Just when you think a post is seriously off-topic, boom! Just goes to show you how relevant TSCM really is to darn near everything. ;-) RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 1753 From: Chris Claypole Date: Wed Oct 18, 2000 3:31pm Subject: Re: Music not to TSCM by... Being serious for half a second; I used to just turn on a radio to get some background noise until I found myself listening to my own background noise in coincidence with the signal picked up by my Scanlock. I favour Maori music now for this reason. My partner Eddie advocates a 'Max Bygraves' album to drive people crazy. ----- Original Message ----- From: William Knowles To: Sent: Tuesday, October 17, 2000 10:00 AM Subject: [TSCM-L] Music not to TSCM by... > Just out of wild curiosity I wondering what kind of music the TSCM > community would annoy any party bugging a client? > > Its a semi-serious question being that I love JMA's addition of humor > here and there to the list, But I'm wondering what to play when I have > unaccounted white van(s) with lots of antennas (Used Icom's) and a > periscope on top parked down the street from the office. :) > > So I have heard this much.... > > Def Leppard's cover of Release Me > Techno-Bagpipe music > The soundtrack to Jesus Christ Superstar > East German Rave noise > > Any other suggestions? > > Thanks! :) > > William Knowles > wk@c... > > > *==============================================================* > "Communications without intelligence is noise; Intelligence > without communications is irrelevant." Gen Alfred. M. Gray, USMC > ================================================================ > C4I.org - Computer Security, & Intelligence - http://www.c4i.org > *==============================================================* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1754 From: A Grudko Date: Wed Oct 18, 2000 5:03pm Subject: Re: Using a Bit of 007 to Keep Spies in Check - not trading in my screwdriver ----- Original Message ----- > I obtained one of these units over a year ago and performed a formal > evaluation on it. It is (in my professional opinion) a piece of > utterly worthless excrement, with virtually no value as a "bug > detection" device. Filed under D - Duhhhhh? Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1755 From: Jay Coote Date: Wed Oct 18, 2000 7:41pm Subject: Re: Music not to TSCM by... The "Barney" themesong.... arghhhhh! ---------- > At 04:00 AM 10/17/2000 -0500, you wrote: > >Just out of wild curiosity I wondering what kind of music the TSCM > >community would annoy any party bugging a client? > > Disney's "It's a small world after all" > and other great hits from that collection. > or > pickup some of those self-hypnosis tapes > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1756 From: Gordon Mitchell Date: Wed Oct 18, 2000 9:39pm Subject: Re: Spy finder, et al. Sorry for the delay but your message got dumped into a folder that only gets read once in a while. I will be around tomorrow call and I can tell you more. Gordon (888) BUG-KILR Clockdepot@a... wrote: > > Hi Gordon, > Can I see a demo. Name the city and I'll make arrangements to fly out. This > is very interesting to me. > Thanks > Dan McGraw > Cell 612-386-8294 > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 1757 From: Steve Uhrig Date: Wed Oct 18, 2000 9:46pm Subject: Re: Music not to TSCM by... Once upon a midnight dreary, Robert G. Ferrell pondered, weak and weary: > Just out of wild curiosity I wondering what kind of music the > TSCM community would annoy any party bugging a client? Why don't we just run this list traffic through a speech synthesizer? Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1758 From: CDS INC. Date: Thu Oct 19, 2000 8:18am Subject: Re: Using a Bit of 007 to Keep Spies in Check - not trading in my screwdriver Good Morning! Found a new product to "detect" hidden cameras, video surveillance, etc. It is called the "Spyfinder" and sells for $2,895.00. You can view their web page at www.shopseatech.com. Has anyone used this type of visual detection device? Regards, Jeff Prusan Corporate Defense Strategies Inc. "Innovative Solutions, Effective Security" 1759 From: Steve Uhrig Date: Thu Oct 19, 2000 9:18am Subject: Re: Using a Bit of 007 to Keep Spies in Check Once upon a midnight dreary, CDS INC. pondered, weak and weary: > Found a new product to "detect" hidden cameras, video > surveillance, etc. It is called the "Spyfinder" and sells for > $2,895.00. Read the archives for this list for the last several weeks. This product discussed and put to bed already. It is real, and it works. Have seen it myself at BECCA last week. The name stinks. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1760 From: Steve Uhrig Date: Thu Oct 19, 2000 1:03pm Subject: Used TSCM gear Hi all, We have updated our used equipment list which has a number of used TSCM pieces including an NLJ, an Avcom spectrum analyzer, an H-P spectrum analyzer and much more. List members ordering get something extra. http://www.swssec.com/used.html Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1761 From: Paolo Sfriso Date: Thu Oct 19, 2000 11:44am Subject: Fouling of NLJ Detectors. Dear Collegues. I have recently been involved in a debate with a friend related to the pros and the cons of NLJ Detectors. He states that if a bug is wrapped in aluminium foil it will go undetected. The same if it is hidden in an electronic appliance (Pc, phone, etc) as there is too much "static". I would appreciate your comments on this subject. Best regards. Your Italian Connection Paul Sfriso Director GRUPPO SIT Investigations & Security Venice ITALY phone/fax +39 0422 823224 24hr email +39 (0)335 5257308 paulsfriso@t... 1762 From: Ryan Huggins Date: Thu Oct 19, 2000 10:10am Subject: Re: Music not to TSCM by... Music not to TSCM by... one word... COUNTRY! Not that upbeat Shania Twain stuff, but the traditional my dog ran away, my truck died and my wife left me stuff. Ryan Huggins 1763 From: Talisker Date: Thu Oct 19, 2000 1:28pm Subject: More Cheap Top Tips Hi all Another cheap tip (trust an Englishman) Really high ceilings, no problem tywrap an antennae to a 15 metre (45') carp rod it even has ferrules to hold the coax. Because it's made of carbon it's incredibly light, well at least for the first hour, The downside - explaining to my wife that I'm working, not going on a fishing trip with the lads. It's certainly handy for a covert entry, I just need to get the rest of the gear into tackle boxes :o) A good fisherman is also an entomologist (the study of bugs) Take Care Andy http://www.networkintrusion.co.uk Talisker's comprehensive IDS & Scanner List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. 1764 From: James M. Atkinson, Comm-Eng Date: Thu Oct 19, 2000 3:50pm Subject: Re: Music not to TSCM by... At 8:10 AM -0700 10/19/00, Ryan Huggins wrote: >Music not to TSCM by... one word... COUNTRY! Not that upbeat Shania Twain >stuff, but the traditional my dog ran away, my truck died and my wife left >me stuff. > > > Ryan Huggins Oh No... I can see it now... TSCM Country Music, or better yet.. the TSCM BLUES. We could lament about blowing out a Scanlock, frying a OSCOR preamp, dropping a PR700, and the spectrum analyzer going deaf all at the same time. Of course there would have to be mention of the NLJD giving you the runs because the power level is too high, and you threw your back out dragging the 8566B up the stairwell, and lamentations about how your dosimeter is now glowing in the dark. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1765 From: James M. Atkinson, Comm-Eng Date: Thu Oct 19, 2000 3:59pm Subject: Re: Fouling of NLJ Detectors. At 6:44 PM +0200 10/19/00, Paolo Sfriso wrote: >Dear Collegues. > >I have recently been involved in a debate with a friend related to the pros >and the cons of NLJ Detectors. He states that if a bug is wrapped in >aluminium foil it will go undetected. The same if it is hidden in an >electronic appliance (Pc, phone, etc) as there is too much "static". > >I would appreciate your comments on this subject. > >Best regards. > >Your Italian Connection > >Paul Sfriso Paul, It depends on the competency of the TSCM person, but generally the aluminum foil would actually enhance the detection. Concealing the device in an appliance or similar concealment is why we hunt for both radiated and conducted signals and well as hunt for anomalies in the magnetic field as well as the electrical field. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1766 From: Steve Uhrig Date: Thu Oct 19, 2000 6:10pm Subject: Re: Fouling of NLJ Detectors. Once upon a midnight dreary, Paolo Sfriso pondered, weak and weary: > I have recently been involved in a debate with a friend related > to the pros and the cons of NLJ Detectors. He states that if a > bug is wrapped in aluminium foil it will go undetected. The same > if it is hidden in an electronic appliance (Pc, phone, etc) as > there is too much "static". It's real simple. An incompetent operator will not find stuff. A competent operator would not be bothered by anything you mentioned. Yes, other electronic devices will trip the nonlin. An experienced operator will not waste his time using that instrument on them. That's why God gave us eyes, and some of us X-ray machines. If a bug was * completely* wrapped in aluminum foil, it probably would be useless. An antenna or other conductors would have to leave the wrapped package, and those conductors would provide a path for the RF from the nonlin to travel into and back out of the device. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1767 From: James M. Atkinson, Comm-Eng Date: Thu Oct 19, 2000 6:58pm Subject: 12 things you shouldn't say to a police officer. 1.I can't reach my license unless you hold my beer. (OK in Texas) 2.Sorry, Officer, I didn't realize my radar detector wasn't plugged in. 3.Aren't you the guy from the Village People? 4.Hey, you must've been doin' about 125 mph to keep up with me. Good job! 5.Are You Andy or Barney? 6.I thought you had to be in relatively good physical condition to be a police officer. 7.You're not gonna check the trunk, are you? 8.I pay your salary! 9.Gee, Officer! That's terrific. The last officer only gave me a warning, too! 10.Do you know why you pulled me over? Okay, just so one of us does. 11.I was trying to keep up with traffic. Yes, I know there are no other cars around. That's how far ahead of me they are. 12.When the Officer says "Say Fella....Your eyes look red, have you been drinking?" You probably shouldn't respond with, "Gee Officer your eyes look glazed, have you been eating doughnuts?" ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1768 From: Talisker Date: Thu Oct 19, 2000 3:57pm Subject: Re: Fouling of NLJ Detectors. Paul The NLJD will pick up the other NLJ's in the PCs etc, it's up to you to take a look inside and look for anomalies, if you are still in doubt swap the appliance, or seal the appliance when it first arrives, after an initial check of course. Only buy the appliances from known sources, and where possible rotate them on a random basis As to surrounding them with foil, if it is a spatial device it will still have to be able to transmit, if the NLJD signal can't get in, then the bug signal can't get out Andy http://www.networkintrusion.co.uk Talisker's comprehensive IDS & Scanner List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "Paolo Sfriso" To: Sent: Thursday, October 19, 2000 5:44 PM Subject: [TSCM-L] Fouling of NLJ Detectors. > > Dear Collegues. > > I have recently been involved in a debate with a friend related to the pros > and the cons of NLJ Detectors. He states that if a bug is wrapped in > aluminium foil it will go undetected. The same if it is hidden in an > electronic appliance (Pc, phone, etc) as there is too much "static". > > I would appreciate your comments on this subject. > > Best regards. > > Your Italian Connection > > Paul Sfriso > Director > GRUPPO SIT > Investigations & Security > Venice > ITALY > phone/fax +39 0422 823224 > 24hr email +39 (0)335 5257308 > paulsfriso@t... > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1769 From: Date: Fri Oct 20, 2000 0:34am Subject: Re: Music to annoy eavesdroppers. try the "Monkey's "music ."Hey,hey we're the monkeys and we don't like to mess around .... etc" ; guaranteed to drive anyone stark raving nuts! :>) HAVE A GREAT DAY !!! 1770 From: A Grudko Date: Fri Oct 20, 2000 4:00am Subject: Re: Fouling of NLJ Detectors. ----- Original Message ----- > > >I have recently been involved in a debate with a friend related to the pros > >and the cons of NLJ Detectors. He states that if a bug is wrapped in > >aluminium foil it will go undetected. Must be why they missed the 'big one' at Roswell (US gov. say it was an al balloon). Andy JHB 1771 From: Craig Snedden Date: Fri Oct 20, 2000 3:25am Subject: Re: Re: Fouling of NLJ Detectors. To add my pennies worth..... The good old "Mark 1 Eyeball, TSCM Operator for the use of" works every time.... Forget the NLJD, if you don't know what your doing with it, you'll end up pulling the walls down exposing nails contacting other metallic product, producing the minutest of electrical contacts in the belief that there is a bug in the wall..... Have Fun! Craig -----Original Message----- From: Steve Uhrig To: TSCM-L@egroups.com Date: 20 October 2000 00:31 Subject: [TSCM-L] Re: Fouling of NLJ Detectors. >Once upon a midnight dreary, Paolo Sfriso pondered, weak and weary: > >> I have recently been involved in a debate with a friend related >> to the pros and the cons of NLJ Detectors. He states that if a >> bug is wrapped in aluminium foil it will go undetected. The same >> if it is hidden in an electronic appliance (Pc, phone, etc) as >> there is too much "static". > >It's real simple. > >An incompetent operator will not find stuff. > >A competent operator would not be bothered by anything you >mentioned. > >Yes, other electronic devices will trip the nonlin. An >experienced operator will not waste his time using that >instrument on them. That's why God gave us eyes, and some of us >X-ray machines. > >If a bug was * completely* wrapped in aluminum foil, it probably >would be useless. An antenna or other conductors would have to >leave the wrapped package, and those conductors would provide a >path for the RF from the nonlin to travel into and back out of >the device. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > From: David Alexander Date: Thu Oct 18, 2001 10:53am Subject: re: Ireland >(NO SARCASM INTENDED HERE) I understand the problems with the IRA in the UK, I was there when it was particularly bad, >but I do not understand why the brits don't just get out of Ireland.? Would that solve the problem? I am British, and live in Britain. I think that qualifies me to reply: We don't pull out of Northern Ireland for the same reason that you did not pull your troops out of the middle east when Bin Laden trashed the WTC, or why you would ignore the Michigan Militia if they asked the US govt. to get the h*ck out of Michigan and declared it an independent state. The idea is laughable. The group are a tiny, tiny minority with no morals, scruples, etc and no mass support. The IRA have no majority (proven in democratic elections). The overwhelming majority of Northern Ireland's Citizens wish to remain part of the United Kingdom. Think of the IRA as gangsters, much like the mob, but with a political agenda. The fact that no-one would listen to them otherwise is why they have to use bombs and violence to get themselves any attention. Hope this clears that issue up. regards David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 3963 From: Aimee Farr Date: Thu Oct 18, 2001 0:59pm Subject: *sigh* Jackasses...no, they aren't. I am misunderstood. 1. WANT TSCM TO BE MORE FAIR?: CRAFT. My analogy to law was an attempt to encourage you to develop through scholarship, training and mentorship. The benefit of a craft is that you are afforded the opportunity to achieve greatness. In truth, it is an *environment of opportunity,* -- not one of closed access. It contributes to the competency of the profession as a whole. It does so by contributing to the competency of its individual members. It encourages their development and offering that opportunity to all its members in a most non-discriminatory fashion: it's competency based training. CBT doesn't care who you are, or where you come from. The only question is one of ability. Those of you that resist craftsman concepts, shoot yourselves in the foot. To me, the real conflicts here seem to be knowledge transfer. A craft encourages knowledge transfer -- that is what it does. 2. MY ENTIRE POINT ---- THEY AREN'T JACKASSES AT ALL. The very nature of "jackasses" is that they are master-mentors. That's what they do. As such, they are naturally nice people -- but tough profs. The "wise men on the hill" would like to help EVERYBODY attain "wisdom," but they are simply limited by _the laws of physics_ as to knowledge transfer. This *forces* them to discriminate, so you have selective knowledge transfer. For those that are not able to secure development, they are jackasses. This environment breeds competition and conflict, but it also contributes to competency. When you have these types of conflicts .... it's a sign of a craft. Short history lesson on crafts: http://www.chebucto.ns.ca/~ac200/DACUMcomps.html Can you really take holistic counterespionage out of master-apprentice? It's not "theory." I could read a thousand books, and I could never attain competency in this. Not just the technical aspects, either. IMO, COUNTERESPIONAGE IS MORE OF A CRAFT THAN THE PRACTICE OF LAW IS TODAY. (You cannot imagine how much it hurt me to say that.) Off to see judge....bad day.... ~Aimee 3964 From: James M. Atkinson Date: Thu Oct 18, 2001 2:34pm Subject: helpful Hints - 494A/P Here are a few helpful hints for the 494 and/or 492 line. Pelican transit case (lockable)... one with wheels, and dense foam. Dedicated standby power supply (with batteries) and/or power strip Dedicated laptop with GPIB card and macro's Small GPIB plotter (HC100) Several extra GPIB cables Chart recorder (for real time Y axis output) Polaroid screen camera (You do have one of these don't you?) Dedicated tunable receiver for IF demod. (with SCD-5 on discrim output) Amplified speaker and/or headphone for Z axis monitoring an slope demod Extra hardware and wrenches for mixers Dedicate preamp for each mixer. Standard gain horns hard mounted on each mixer Power line input adapter (to monitor AC mains or phone line) Foam lined Cordura nylon case with panels to help absorb shock Small dedicated TV monitor (modified for RAID) General purpose 25 MHz to 1.5 GHz Discone with preamp (an tripod) I have also found it helpful to install several small LCD thermometers to keep an eye on the instrument, and to let me know when it was stable enough to take a decent measurement. Below 3 GHz, I prefer to use the 1 KHz RBW filter more then any other setting, but once the spectrum becomes less occupied I increase my RBW. For a good practical exercise for the 492 or 494 is to set up a nice discone, and then hard-copy every FM station allocation across the FM band (every 200 kHz), keep your RBW at 1 kHz or less, and optimize each screen for a clean display. Then connect the SA to the discriminator output of a receiver, and hard copy the subcarriers present on each channel (tune the radio to the FM band, and view DC to 200 kHz on the SA). When your finished you will have two sheets of paper for every FM channel.. Next, lookup the call-signs and location of the studio/transmitter site, and compute it's location relative to the site where you took the readings... plot each of these out on a map, and draw a tangent from your site to the transmitter site. -jma -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3965 From: Dawn Star Date: Thu Oct 18, 2001 6:26pm Subject: Test em' bugsweepers NC Says, "A local law office uses a PI to conduct sweeps regularily. I am very close to convincing this local law office to allow me to install a "wireless microphone" and test the PI service. I happen to know that this particular PI is a ju-ju man, and has no idea what he is doing, but he has some nice looking briefcases, and his equiment has some green and red lights. I think this approach would serve us all better than spending time forming regulatory association" Sometimes this is a cool thing to do, I would use a Wavecom video/audio 2.4GHZ transmitter, you can pick that up anywhere and it will not be a "sinister covert bug" but most of the dog and pony show guys will miss it. Roger Tolces www.bugsweeps.com 3966 From: The Dog's Bollix Date: Thu Oct 18, 2001 11:39am Subject: Re: re: Ireland (off group topic) No it doesn't clear the issue up, at all. I am an Irish citizen (northern) and was involved in military operations on both sides of the fence over there. This is not the forum to discuss this particular topic, but a quick glance at the history books post Bloody Sunday 1969 will show that the US foreign policy, while arguably misguided, bears no conparison whatsoever to the N. Ireland situation. Regards, --- David Alexander wrote: > >(NO SARCASM INTENDED HERE) I understand the > problems with the IRA in the > UK, I was there when it was particularly bad, > > >but I do not understand why the brits don't just > get out of Ireland.? Would > that solve the problem? > > I am British, and live in Britain. I think that > qualifies me to reply: > > We don't pull out of Northern Ireland for the same > reason that you did not > pull your troops out of the middle east when Bin > Laden trashed the WTC, or > why you would ignore the Michigan Militia if they > asked the US govt. to get > the h*ck out of Michigan and declared it an > independent state. The idea is > laughable. > > The group are a tiny, tiny minority with no morals, > scruples, etc and no > mass support. The IRA have no majority (proven in > democratic elections). The > overwhelming majority of Northern Ireland's Citizens > wish to remain part of > the United Kingdom. Think of the IRA as gangsters, > much like the mob, but > with a political agenda. The fact that no-one would > listen to them otherwise > is why they have to use bombs and violence to get > themselves any attention. > > Hope this clears that issue up. > > regards > > David Alexander M.INSTIS > Global Client-Server, Communications & > Infrastructure Director > Bookham Technology plc > > DDI: 01235 837823 > Mobile: 0779 988 1284 > David.Alexander@B... > > > > > > ======================================================================= > This e-mail is intended for the person it is > addressed to only. The > information contained in it may be confidential > and/or protected by > law. If you are not the intended recipient of this > message, you must > not make any use of this information, or copy or > show it to any > person. Please contact us immediately to tell us > that you have > received this e-mail, and return the original to us. > Any use, > forwarding, printing or copying of this message is > strictly prohibited. > > No part of this message can be considered a request > for goods or > services. > ======================================================================= > Any questions about Bookham's E-Mail service should > be directed to postmaster@b.... > > > > [Non-text portions of this message have been > removed] > > __________________________________________________ Do You Yahoo!? Make a great connection at Yahoo! Personals. http://personals.yahoo.com 3967 From: Gil Zimmerman Date: Thu Oct 18, 2001 6:41pm Subject: Anthrax - Limitations This is one organization's perspective on the anthrax issue. Regards, Gil Zimmerman Erhart Sawyer International New York, NY gilzimm@a... S T R A T F O R THE GLOBAL INTELLIGENCE COMPANY http://www.stratfor.com 18 October 2001 Mail Delivery Shows Limitations of Anthrax Attack Summary The anthrax attacks in Florida, New York and Washington have raised concerns of a broader biological attack against the United States. The delivery method of the anthrax spores -- via the postal system -- offers some insight into the capabilities and motives of the perpetrators. At the same time, it reveals technical and perhaps even political limitations constraining broader, more indiscriminate attacks. Analysis An employee of CBS News in New York tested positive for cutaneous anthrax infection, the company announced Oct. 18. Anthrax infections linked to two other major networks -- NBC and ABC -- and at the Florida offices of American Media Inc. have already surfaced; workers at the Hart Senate Office building in Washington, D.C., and at the New York City office of Governor George Pataki also have been exposed. The attacks, which have caused one death thus far, have all been linked to mail containing anthrax spores. This delivery method offers some insight into the capabilities and motives of the attackers. At the same time, it reveals technical and perhaps even political limitations constraining a broader, more indiscriminate biological attack. Fear of biowarfare has deepened in the United States and around the world since Sept. 11. The appearance in Florida of a case of inhalation anthrax, the first in the United States in more than two decades, quickly changed these fears into a reality. As with the attacks on the World Trade Center and the Pentagon, the anthrax strikes have been conducted using simple, unconventional methods -- converting America's communications infrastructure into a delivery method for bio-agents. But the idea of sending anthrax spores through the mail is not new. From late October through late December 1998, several letters apparently containing anthrax were sent to clinics and businesses in four states. Although all proved to be hoaxes, anthrax has long been studied as a prime organism for biowarfare. Anthrax is an attractive agent of death for several reasons. First, the bacterium -- Bacillus anthracis -- is relatively easy to procure. It has long been available to the research community and is also endemic throughout most of the world, affecting livestock and other grazing animals. Second, it is easy to culture and isolate. Finally, it can be highly lethal in certain forms. Despite its potential deadliness, there is a vaccine available, particularly to high-risk groups such as researchers and veterinarians. This means scientists and potential terrorists working with anthrax could do so with relatively little risk of infection. Further, anthrax can survive in spore form for long periods with few special storage requirements. Anthrax can be contracted in three ways: by touch, through ingestion or through inhalation. In the first case, the bacteria or spores enter the skin through cuts or abrasions. This is the most common form of anthrax and the easiest to treat. Without treatment, mortality rates are near 20 percent, but with common antibiotics, the chances of death are extremely small, according to the Journal of the American Medical Association. Gastrointestinal anthrax, contracted by eating undercooked meat from an infected animal, is rare. The deadliest form of the infection, inhalation anthrax, has a mortality rate of nearly 100 percent. The fact that the attackers used mail as a vector reveals some of the limitations of anthrax as a weapon, however. Despite the ease with which anthrax bacteria can be obtained and grown, "weaponizing" the spores is much harder. Anthrax spores must be isolated, dried and milled into a fine powder -- with particles measuring between one and five microns in diameter -- for maximum effectiveness. The final stage of making anthrax into an aerosol form requires special equipment and facilities to ensure uniformly sized particles with high concentrations of active spores. Some reports, however, suggest that a crude but effective facility for drying anthrax as a powder could be constructed from the same machinery used to make powdered milk. Keeping this final product from clumping together into particles larger than five microns requires additional processing. The complexity of these final steps has kept many nations from producing weapons-quality anthrax for aerial distribution. Even Iraq, which conducted substantial biological research, prepared anthrax as a liquid, seriously reducing the potential efficacy of any attack. The Japanese cult Aum Shinrikyo tried several times to release anthrax and other biological agents in Tokyo between 1990 and 1995, all unsuccessfully. The relatively refined sample sent to the office of Senate Majority Leader Tom Daschle did not necessarily meet the milling specifications for weapons-grade anthrax, according to Army researchers. Delivering anthrax by mail suggests that the group or groups responsible have not yet produced sufficient quantities of anthrax or acquired the appropriate delivery method for a larger strike. Instead, by targeting the media and government officials, they have gained maximum effect with minimum effort. A few mailed letters have resulted in several thousand false alarms and hoaxes -- tying up police, fire, medical and hazmat teams, stirring panic among the populace, interfering with mail delivery and worrying politicians and the military. There may be another reason for sending anthrax through the mail rather than releasing large quantities of spores over a major city. If the attacks were the work of a group related to Osama bin Laden's al Qaeda, hitting discrete targets may be the result of political constraints. Bin Laden, the target of a weeks-long bombing campaign on Afghanistan, sees his main chance for salvation in undermining the U.S. coalition. To do so, however, he must engender the sympathies of Arab and Muslim nations. The attack on the World Trade Center, which killed more than 5,000 people, was seen by much of the Islamic community as being over the top, resulting in too many civilian casualties to be justified even by Washington's international policy or Israel's killings of Palestinians. In fact, Tahirul Qadri of Pakistan, a prominent Muslim cleric, publicly denounced bin Laden and his Taliban protectors, saying the destruction of the World Trade Center was "no jihad" and that those responsible for the Sept. 11 attacks "put the lives of millions of Muslims across the world at risk," UPI reported Oct. 17. Large-scale anthrax attacks on the United States would only serve to further weaken bin Laden's position among Muslim nations. Even Libyan leader Moammar Gadhafi has condemned anthrax attacks, calling anthrax a "weapon of mass destruction," according to Reuters. Political leaders and their mouthpieces in the media, however, could be considered more legitimate military targets. This would allow a continuation of the terror war in America without driving Islamic nations closer to the United States. Given these political restraints and the technical difficulties of deploying anthrax, a widespread anthrax attack on a major metropolitan area remains unlikely. For the average American, the chances of getting anthrax remain extremely low. For the government and the media, targeted use of biological and chemical agents remains a threat. Considering the increased attention and security being paid to mail and anthrax at this time, however, the next terrorist strike in the United States will likely come from another quarter, keeping Washington off- balance and disrupting the ability of the United States to get back to normal soon. ___________________________________________________________________ <<<<<<<<<<<<<<<<< SEND THIS TO A FRIEND! >>>>>>>>>>>>>>>>>> Did you like this analysis? Then forward it to a friend! Got this from a friend? Get your own by becoming a member! http://www.stratfor.com/COMPANY/info.htm <<<<<<<<<<<<<<<<<<<<<<<<<<<< >>>>>>>>>>>>>>>>>>>>>>>>>>>>>> --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.282 / Virus Database: 150 - Release Date: 9/25/01 3968 From: Bug Sweeper Date: Thu Oct 18, 2001 9:35pm Subject: Re: Test 'em bugsweepers I've done this once. After giving a brief talk on commsec at a bar assoc. meeting about a year ago, I challenged the two lawyers in the room who use alleged TSCM services to let me check their checkers. I used a Lectrosonics UHF wireless bodypack transmitter (a mere 150mw) stuck below the fuzz in the pot of a ficus tree. The bozo didn't even get close, though he looked confused at the display on his ancient Radio Shack frequency counter (which would have grabbed it at least 20 feet away). -EL 3969 From: James M. Atkinson Date: Fri Oct 19, 2001 7:59am Subject: Sky Harbor guardsman discovered to be a felon Sky Harbor guardsman discovered to be a felon Tom Zoellner The Arizona Republic Oct. 19, 2001 An armed National Guard soldier assigned to patrol Sky Harbor International Airport was unmasked as a felon and arrested on weapons charges Thursday evening. Second Lt. Lyndon Ramlogan, 34, violated his probation by carrying a military-issue 9mm handgun while guarding the metal detectors in the airport, Maricopa County Sheriff Joe Arpaio said. Ramlogan was jailed on suspicion of illegal possession of a firearm. Ramlogan has also falsely identified himself at various times as a Marine Corps investigator, a California city police officer and an FBI agent, according to a sheriff's memorandum. Public records show Ramlogan pleaded guilty in June 2001 in Maricopa County Superior Court to three counts of fraudulently trying to sell concealed-weapons permits. A judge allowed him to plead to forgery and sentenced him to 18 months of probation. But he somehow became part of a special unit of 250 uniformed soldiers dispatched to the state's airports by Gov. Jane Hull on Oct. 8 to boost public confidence in aviation safety. The question of how a felon was able to secure a front-line security position at the airport is especially pertinent in light of recent disclosures about shoddy background checking inside one of Sky Harbor's private guard contractors. Argenbright Security Inc. was ordered to leave the airport by Oct. 26 after federal prosecutors in Philadelphia said the company was not improving its standards, even after being fined $1.6 million for falsifying the background checks of up to 1,300 employees, including 14 felons. The Arizona National Guard began an inquiry into Ramlogan's background after sheriff's detectives passed along their six-page memorandum at 3:30 p.m. Thursday, Maj. Eileen Bienz said. "He will not be performing duties at the airport pending the outcome of the inquiry," Bienz said. She was unable to provide immediate details about how he joined the National Guard or his length of service, and was unavailable for comment after Ramlogan was arrested at 5:50 p.m. National Guard officers are usually cleared for prior criminal histories, officials said. It was not known late Thursday whether this was done for Ramlogan. Attempts by The Arizona Republic to contact him were not successful. Ramlogan and other National Guard soldiers were assigned by Hull to enhance safety and help the private security companies at 10 Arizona airports in the wake of the Sept. 11 terrorist attacks. They received two days worth of training from the Federal Aviation Administration. Arpaio said Ramlogan's posting at the airport highlights more potential loopholes in aviation security that go beyond the troubles with Argenbright. "What is wrong with the system?" he said. "He has a history of impersonating officers that goes back 10 years. The problem is, we don't have good intelligence coordination between agencies. I am angry the system broke down." Ramlogan nearly became a law enforcement officer this year, records show. He was dismissed from the Maricopa County Sheriff's Academy on Jan. 6, one week before graduation, after his history came to light, officials said. Sheriff's detectives began to conduct further investigations of Ramlogan after he gave a brief interview to Fox 10 News that aired Oct. 16. Dressed in camouflage fatigues at the airport, Ramlogan told the interviewer that he was there to "represent the state and the president." One of his former classmates at the police academy was watching the news broadcast and recognized Ramlogan as the same person who had been kicked out a week before graduation, according to a sheriff's report. In the past two days, sheriff's investigator Jesse Locksa reported that he had uncovered the following incidents in Ramlogan's past. Apparently, none of them led to criminal convictions: * During a traffic stop on Dec. 23, 1989, he falsely identified himself as an off-duty San Jacinto, Calif., police officer. * In a Sept. 1994 traffic stop in San Jacinto, he showed a badge identifying himself as a military policeman. The Marine Corps Criminal Investigation Division later told police they were investigating him for fraudulently identifying himself as a military police officer. * Police in Hemet, Calif., arrested him in 1997 and accused him of trying to fraudulently reproduce a set of Marine Corps credentials at a photocopy center. The status of the case is unknown. * Ramlogan attended about 18 restricted courses in fire investigation and anti-terrorism techniques at the San Bernardino County Sheriff's Office Regional Training Center. He gained access by falsely identifying himself as a peace officer. * He told a carwash manager in Hemet in 1997 that he was an FBI agent and had guarded the U.S. vice president's airplane. Hull is awaiting the findings of the National Guard investigation before taking any action, spokeswoman Francine Noyes said. "We are waiting for the results of what the Guard is able to find out," she said. Sky Harbor officials declined to comment. Reach the reporter at tom.zoellner@a... or 602-444-2474 -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- [Non-text portions of this message have been removed] 3970 From: Dawn Star Date: Fri Oct 19, 2001 9:27am Subject: Here's another inquiry from south Florida. I still don't have a reliable contact to pass this on to. Roger Tolces www.bugsweeps.com Help!!!! I am in Miami, FL and I have been victimized by people who had a videocam mounted outside my window in a gutter area and still have a sound device in my house. They filmed me with sex partners and made DVDs that are currently being sold on Porn mags. Can you recommend anybody in S. FLA that can do a sweep of my house and can you recommend any attorney or any advise. 3971 From: Shawn Hughes Date: Fri Oct 19, 2001 0:54pm Subject: Re: Anthrax >Second, it is easy to culture and isolate. Uh, nope. Too many people with too little knowledge are commenting on this situation. These are the same media and personalities that were 'survival' experts during Y2K. If 6 governors, 12 teevee personalities, and 3 special guest experts read from the same misinformed paper, does that make it any more right? I could go into this at length, but I fear a topic reminder from jma looming on the horizon. We all stand a MUCH greater chance of buying it from an energized 'locked out' line, than from Anthrax. First duck and cover, now this...... Shawn 3972 From: Shawn Hughes Date: Fri Oct 19, 2001 0:46pm Subject: Re: Digest Number 742 At 10:42 10/19/01 , you wrote: >Subject: helpful Hints - 494A/P > > >Here are a few helpful hints for the 494 and/or 492 line. This kind of post is why I tune in every day. Great info! Now, if we could just get them to cough this kinda stuff up on a more - frequent basis................ 3973 From: Mark Barrueta Date: Fri Oct 19, 2001 1:27pm Subject: Line Sweeper LD 32 FYI, Snake oil., Blinky lights Don't think so.,. The Real McCoy., Gotcha., http://detnews.com/2001/technews/0110/18/c01-321461.htm ===== Mark Barrueta,VP The 911 Professionals, Inc U.S.A 626-258-0585(Corporate Office) Cell U.S.A 805-218-1929 Mexico(011-52-)3-615-2000 __________________________________________________ Do You Yahoo!? Make a great connection at Yahoo! Personals. http://personals.yahoo.com 3974 From: Perry Myers Date: Fri Oct 19, 2001 1:57pm Subject: Voice Analysis Does anyone have a person in the Midwest preferably, that offers a voice analysis comparison service? Please email me privately. Thanks Perry D. Myers, CFE President & CEO E-mail: perry@d... MSI Detective Services Myers Service, Inc. Corporate Headquarters 2076 N. Elston Ave. Suite 200 Chicago, IL. 60614-3940 Phone 773-342-8300 Facsimile 773-486-4430 Professional Investigators Since 1959 Investigations Nationwide 24 Hour Availability www.detectiveservices.com Process Service Division - Downtown Chicago 205 W. Randolph St., Ste. 1210 Chicago, IL. 60606 Phone 312-782-4000 Fax 312-853-3119 For more information on our investigative services please visit our web site at www.detectiveservices.com This e-mail is strictly confidential. If you receive this e-mail in error, please forward immediately to info@d... 3975 From: James M. Atkinson Date: Fri Oct 19, 2001 5:13pm Subject: Re: Line Sweeper LD 32 At 11:27 AM -0700 10/19/01, Mark Barrueta wrote: >FYI, > >Snake oil., Blinky lights > >Don't think so.,. > >The Real McCoy., Gotcha., > >http://detnews.com/2001/technews/0110/18/c01-321461.htm > >===== >Mark Barrueta,VP >The 911 Professionals, Inc >U.S.A 626-258-0585(Corporate Office) >Cell U.S.A 805-218-1929 >Mexico(011-52-)3-615-2000 >> >>Device detects phone hackers >>Ex-phone repairman says no line is safe; Line Detective helps >>By Mike Hudson / The Detroit News >> >> LIVONIA -- Warning: Your phone calls can be hazardous to your privacy. >> So says Hector Vasquez, a former telephone repair technician and >>current president of National Phone Check, who has seen phone lines >>compromised in every fashion imaginable. He's found tape recorders >>plugged into lines, radio transmitters tucked into line splitters >>and clients' phone lines mysteriously accessible within >>competitors' workplaces. Anybody who has been in the TSCM business for more then a few years has found more then a fe of them as well. >> "I'm telling you, anyone could be listening," he said. "Anyone >>could be recording your conversations or your data or faxes. I'm >>saying no phone line is safe." Yep, so far I agree. >> The problem, he said, is that the maintenance of Michigan's >>phone network is simply too sloppy. He blames local carriers >>Ameritech Corp. and Verizon Communications for not properly culling >>outdated equipment or investing in more secure technologies. True, true >>As a result, he said, your dial tone may be redirected through >>other buildings, shoddy wires may be used to connect your line and >>flimsy outdoor equipment boxes give easy access to would-be hackers. OK, no he is starting to drift... actually your LINE would appear at other locations... not your fricking dial tone >> In response, Vasquez invented the Line Detective, a tiny box >>that he said instantly detects phone tampering by measuring the >>slightest of fluctuations in the intensity of the dial tone pulsing >>through your wire. Ah, bullshit.... let me repeat that... BULLSHIT... "slight fluctuations" of dial tone would only detect a parasitic device, and maybe a small number of extensions. The other problem is that if you put it on a "bugged line" the device would most likely NOT detect the device present (at the time of installation). Now, if the line was swept, determined to be clean, and THEN the device this guy is hawking, then maybe you would detect it. >> Telecommunications experts said that while privacy is an issue, >>the real value of Vasquez's gadget is its ability to untangle the >>overgrown phone infrastructure in many offices and other businesses. Also Bullshit, it will untangle nothing, except a fools purse-strings. >>That way redundant wiring, lines that cross through other >>companies' networks and other potential security glitches can be >>deinstalled, leaving a clean and organized phone system. Pray, HOW is this thing going to detect "redundant wiring", split /resplits, or any kind of capacitively isolated devices? >> "This can do in a few seconds what more expensive equipment >>could do in an hour," said Ron Chura, supervisor in the service >>quality section at the Michigan Public Service Commission. Yes, and I can stand on my head and shoot gold coins out my nose. >> But beyond private security matters, Chura said, the device >>could help Michigan's competing telecommunications companies more >>quickly settle problems with larger phone providers Ameritech and >>Verizon. Ah, also false... Remember it detects Dial Tone Amplitude Changes... just how would it work as a tool to resolve any dispute other that sloppy loop workmanship? >> "There's no question it can help phone companies tell where >>problems are," Chura said. Not bloody likely, they should spend their money on TDR's instead >> Imagine, for example, a situation where a phone line isn't >>working properly after an outside company installs high-speed >>wiring to a business. Which is why telephone people cripple more phone systems then any group of hackers. >>Many telecommunications companies complain that in this situation, >>because of the complexity of the phone network, months would need >>to be spent investigating to determine if the problem was with the >>local phone company or the small competitor. It's usually the last man in a vault who is at fault. >> Line Detective makes short work of those problems, said Ed >>Swanboro, president of Line One Communications Inc., a >>telecommunications interconnecting service in Sterling Heights. Oh please, this is hilarious. >> "You'll have cases where the equipment we're hooking up is new >>and we're finding older equipment still hooked up, which causes >>problems. But it's hard to prove where the problems are," Swanboro >>said. "We've cleaned up some lines pretty quickly with this." Ah, folks... a TDR works a whole lot better. >> Ameritech officials couldn't comment specifically on the device, >>but said they have been committed to helping other phone companies >>sort out difficulties. >> "Our (technicians) have the equipment they need to find problems >>quickly already," said Blair Klein, spokeswoman for Ameritech. >> But Chura said the new device could uncover many line problems >>Ameritech and Verizon don't want to deal with in their phone >>networks. Yep, the phone company hates dealing with an cleaning up sloppy workmanship on the outside plat loop (I find sloppy workmanship all the time). >> "Ameritech and Verizon are the companies that don't want this >>device in the hands of others," Chura said. "They don't want to >>have to make those lines work right." Pray is it FCC approved? >> Klein disagreed, saying Ameritech actively works with >>competitors to determine problems. >> "We feel the more information competitors have about problems, >>the better," she said. "We want our customers to be happy." Bah... they have to work with whoever cross connects into their network. >> Either way, Vasquez will continue to market his product by >>offering training seminars to telecommunications security firms and >>other technicians. No doubt, but then people can be really gullable. >> Sessions will begin locally before year's end, Vasquez said. >>Training centers are also being set up in other states with >>operations stretching into Mexico. Gee, will the word "TSCM" appear on any of the certificates they issue? I mean really, everybody knows all you need to find bugs is a fancy box with a coule of flashing lights >> "This will be a big issue for people," he said. "They'll want >>someone who can tell them if their phones are safe." Sure, and I have a poodle that quotes Shakespeare, and does a mean King Lear. >>You can reach Mike Hudson at (313) 222-2293 or mhudson@d.... [slap] -jma -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3976 From: Jay Coote Date: Sat Oct 20, 2001 10:08am Subject: Want 492-BP Manual I need the tech manual for a 492-BP spectrum analyzer. The BP is not the same as a 492- so a 492 manual won't help. Thanks, Jay 3977 From: Date: Sat Oct 20, 2001 2:33am Subject: Re: Line Sweeper LD 32 Sorry Mark, this is NOT the "real McCoy". I suggest you go to Jim's web site at www.tscm.com and read all about Time Domain Reflectometers (TDR). A New Riser-Bond TDR will cost about $3,500.00 US dollars. I'm sure the LD32 cost a lot less than that. I agree with Jim. Also, a teeny-tiny little box cannot do what a TDR can do. Sorry, but the LD 32 is a box with blinkly lights. Jack 3978 From: zack <10-33@c...> Date: Sat Oct 20, 2001 8:43am Subject: Message from Boeing Message from Boeing to Benny Lard ass http://www.copscops.com/Message%20From%20Boeing.pps visit http://www.copscops.com Join the Law Enforcement community http://anexa.com/lawenforcement/index.Ihtml Washington DC Police Department http://mpdc.dc.gov/main.shtm " Our military is powerful, and it's prepared." The President of the United States George W Bush God Bless The USA http://www.copscops.com/blessusa.htm 3979 From: Dawn Star Date: Sun Oct 21, 2001 8:08pm Subject: Line sweeper LD 32 From: Mark Barrueta Subject: Line Sweeper LD 32 FYI, Snake oil., Blinky lights Don't think so.,. The Real McCoy., Gotcha., http://detnews.com/2001/technews/0110/18/c01-321461.htm ===== Mark Barrueta,VP Heck, If I had had one of these great gizmo's back when, I would not have had to spend two solid days tone tracking cross connects in an aerospace manufacturers buildings. Roger Tolces www.bugsweeps.com 3980 From: Ray Van Staden Date: Mon Oct 22, 2001 4:49am Subject: TAKE THE LAW INTO YOUR OWN HANDS Our government can not protect us. Our Police Force is useless and corrupt to protect us. Where ever possible take the law in your hands in South Africa, that is the only way justice will be done. A family member of mine has just been murdered not even 1 hour ago, near Chelmsford Dam in the Newcastle area. A defenceless woman slaughtered because our authorities can not protect us. Rise up & kill these bastards whenever you can. Raymond --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 3981 From: James M. Atkinson Date: Tue Oct 23, 2001 10:09am Subject: Re: helpful Hints - 494A/P Ask, and ye shall receive... Further ramblings on TSCM related stuff by a Nerd and Geek At 3:34 PM -0400 10/18/01, James M. Atkinson wrote: >Here are a few helpful hints for the 494 and/or 492 line. > >Pelican transit case (lockable)... one with wheels, and dense foam. I lean towards the wheeled version as the 494 is a bit heavy, and add a decent quality padlock. This works fine and allows me to stack the cases along with several other cases. I use a heavy duty handcart that breaks down into a four wheeled cart (Home Depot) which saves my back and makes equipment transport easy. The cart (when properly packed) can navigate easily in elavators and the hallways of most businesses. I can typically get 6-8 pelican cases on the cart, plus a half dozen Hallibutons on each run (hint buy a half dozen L-O-N-G bungee cords to strap down the cases. I also use Hardigg transit cases which provide decent protection, but tend to by quite large relative to the equipment they contain. >Dedicated standby power supply (with batteries) and/or power strip I lean towards several 25 foot power cords (Blue, NOT orange or yellow) on spools for easy handling, and then a dedicated six outlet power strip (with no filters or "surge protection"). This gets the power from the nearest open power outlet to the location where I am setting up for my initial RF sweep (but away from the area I am actually performing the sweep). I then grab power from the power strip and go into a small battery based UPS, and would point out that THIS is to protect your instruments, and cases where you lose power. The "UPS Power Strip" goes into a filter/LISN to ensure that no spurious RF gets into the instruments (a simple five pole low pass filter). > >Dedicated laptop with GPIB card and macro's I lean towards the National Instrument PCMIA card, Panasonic Toughbook laptop, and keep the macro's on the computer. I have also written several programs which can control the 494 directly from the computer. >Small GPIB plotter (HC100) Perhaps one of the cleanest ways to get hard copy output from the 494A/P. It's small enough for field transport, and fairly rugged. Plus, you can plot directly from the computer, and it does a good job with Tek digital O'scopes. Real time "Direct From Instrument" hard copy is important, and will allow you to pickup on small details which you may otherwise miss. Also, when a customer asked "how do you know there are no bugs" you can pull out your 2 inch high sheaves of paper, and show them how you documented every single electromagnetic signal on the RF spectrum, and scientifically proved that the signals in question were not hostile. Additionally, you will have hundreds of pages of your checklist for phones, AC mains, and so on where you performed numerous detailed measurements and worked though a formal protocol. Ahem, not to be rude; but I was the first private sector TSCM person to actually work off of a pre-written protocol for every sweep. In reality, the gvt boys are supposed to, but usually don't (heck, most of them haven't seen a procedural guide outside of a training environment). >Several extra GPIB cables After a few years you will understand why you need extra cables. You will also want an extra screwdriver and/or nut driver that fits the cable hardware on your cables. >Chart recorder (for real time Y axis output) I lean towards a small, lab grade, unit which plots on 11 inch wide paper on 100 foot rolls. I consume 2-3 rolls of chart paper, and 5-6 pens per sweep day. Typically using a slow sweep rates, super narrow IFBW settings, and use the chart recorder to hard copy minute signals over large chunks of the spectrum (in a purely analog mode). This is most useful when you want a hard copy of common spy bands (ie: 380-420 MHz). Take the video output of the SA and apply it to the first chart recorder, and the sweep output to the second channel (as a reference signal). I prefer coated green grid paper, 1mm scale. and disposable ink pens (as opposed to ink bottles or thermal stylus). I usually manually advance the paper and write the instrument settings, date, time, etc with a fine tipped Marks-a-lot before I start the sweep. Hint: start the paper advance BEFORE you start the instrument sweep. In case your interested I lean towards the faster chart speeds, typically 4 seconds per inch which allows the documentation of the entire FM BCB (plus 2 MHz on each side) in just under 45 minutes. >Polaroid screen camera (You do have one of these don't you?) Unless you have a printer, or some other kind of "direct instrument" hard copy device this is going to be the only way to prove what actually appeared on your screen. They are really a hassle to use, but with the 491/492/494 type instruments they were really handy. If you can't find one of the special "scope cameras" then use a simple Polaroid spectra with a macro-adapter or video camera. Make a fold-up "hood" out of non-reflective black foam board you can buy at any art and craft store. >Dedicated tunable receiver for IF demod. (with SCD-5 on discrim output) When the SA is in Zero Span mode it can be used as a primitive tuned receiver for isolating a suspect signals. However, once the signal has been isolated using the SA a dedicated receiver should be set up to monitor and further evaluate the signal independent of the SA. In cases when the radio being used does not have the coverage of the SA, the SA can be used as a "down convertor" A premium dedicated radio such as the R-8500 works well, and you will want to hookup a SCD-5 or similar Subcarrier system to the discriminator output. >Amplified speaker and/or headphone for Z axis monitoring an slope demod What you want to do it be able to hear the "Z-Axis" or video output coming off the SA. If I get enough interest I will post my tutorial on slope demod on my website. >Extra hardware and wrenches for mixers and a small torgue wrench... >Dedicate preamp for each mixer. Remember, we always have to overcome both the noise figure of the instruments we are using, AND any kind of cable loses, etc. >Standard gain horns hard mounted on each mixer Standard gain horns have a more predictable response, and are more helpful (IMHO) then broadband horns. Remember, our goal is to ferret out very small covert signals within the relatively narrow sliver of spectrum we are evaluating.... not sucking up huge chunks of the spectrum during an EMI evaluations. >Power line input adapter (to monitor AC mains or phone line) I like to inspect all conductors by wiring the AC mains of phone lines into the front end of the SA. I use several variations of filters, and impedance matching devices along with switches that let me select the conductor combinations of interest. The only problem, is that if this is not done properly you will blow out your SA, and could in fact inflict a lethal shock... Do not attempt this unless you damn well know what your doing, and why. >Foam lined Cordura nylon case with panels to help absorb shock I like to put the instrument in a Cordura case with foam panels to protect the instrument when it is outside of the Pelican cases. No matter what you o equipment will get knocked around in the field, so this case will help protect the paint, an chassis from occasional dings and bumps. Ensure that all of the ventilation holes are exposed so that you don't cook out your equipment. >Small dedicated TV monitor (modified for RAID) I use a simple 4 or 6" hand held LCD monitor, and added an external AGC amp with selectable output polarity (some signals are inverted, some are not), and adjustable black level. Slope detect the video signal, and suck it out from the SA's Z-Axis output. Since the monitor has a chip which automatically detect sync signals I don't need to fart around with diddling a RAID (Raster Analysis and Identification) box as it locks on to whatever I feed into it (provided of course that the signal otherwise looks harmless). This works quite well for all kinds of AM or FM video, and tears up all of the little Wavecom and related toys. >General purpose 25 MHz to 1.5 GHz Discone with preamp (an tripod) Radio Shack has a nice unit (stock number 20-043), and you might want to pickup a pre-amp as well (stock number 940-0859 or 940-0858). Just watch out for overloading the SA, and mind the amplifiers frequency response. The Icom Discone antenna is also a nice unit. Center the antenna on a tripod in the middle of the "sound stage" or the room you are checking, drop the cable down to the floor, and right into the preamp. take care not to get the preamp too close to the antenna, and use double shielded cables between the preamp and your monitoring position. I have also found that a "bat bag" from the local sporting good store provides a good way to organize your discone system. If you plan of sharing the signal between multiple instruments or scanner you will need to add an active multi-coupler so that the spurious in one instrument will not interfere with measurements on a second instrument. >I have also found it helpful to install several small LCD >thermometers to keep an eye on the instrument, and to let me know >when it was stable enough to take a decent measurement. It also let's me know when the filter paper needs to be changes as things start to run a little warm. >Below 3 GHz, I prefer to use the 1 KHz RBW filter more then any other >setting, but once the spectrum becomes less occupied I increase my >RBW. Yes, it does take a long time to sweep the spectrum.... assuming that there are zero interruptions the initial sweep of the 0-1 GHz spectrum takes at least 4 hours, but usually 6-7 hours is more common. While the SA is busy chugging at the spectrum the TSCM'er can be going down the initial inspection sheets for doors, furniture, windows and so on in preparing for the physical inspection. >For a good practical exercise for the 492 or 494 is to set up a nice >discone, and then hard-copy every FM station allocation across the FM >band (every 200 kHz), keep your RBW at 1 kHz or less, and optimize >each screen for a clean display. Yes, this is all 100 stations, resulting in 100 sheets of paper... and it will take at least one hour. If you are feeling especially cute you can set up the SA with a Span of 190 KHz to make it easier to see the sub-carriers on quiet stations, but this is dangerous at the graticule lines may mask the peaks. I like to use a span of 200 KHz, (or just a little more) as I want to see the station in question, all of the guard band, and just a little of each channel above and below the one I am checking. >Then connect the SA to the discriminator output of a receiver, and >hard copy the subcarriers present on each channel (tune the radio to >the FM band, and view DC to 200 kHz on the SA). Tune the receiver to a specific FM channel, and THEN grab the discriminator output of the receiver, and feed THAT into the SA... You may need to add simple 10 KHz high pass filter (or at least a de-coupling capacitor) to knock down the audio present on the line. Since my primary SA's go down to 30 Hz I can see both the live audio, AND the subcarrier signals, but I have to filter out the audio or risk saturating my preamp and not getting a clean measurement of the subcarrier Use a simple coaxial switch box so you don't have to connect, disconnect, and then reconnect the cable 400 times. >When your finished you will have two sheets of paper for every FM channel.. Yes, that is 200 plus sheets of paper >Next, lookup the call-signs and location of the studio/transmitter >site, and compute it's location relative to the site where you took >the readings... plot each of these out on a map, and draw a tangent >from your site to the transmitter site. ... and once you have done this you can that your notebook with you on sweeps an will know exactly what stations are where, why, and what they are supposed to look like. Repeat for all AM stations, and all TV stations, and then get back to me... and hard copy, hard copy, hard copy >-jma >-- -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3982 From: Aimee Farr Date: Tue Oct 23, 2001 2:38pm Subject: If you can't say anything nice.... http://ebird.dtic.mil/Oct2001/e20011023wolfowitz.htm "Do not conduct any work-related conversations in common areas, public places, while commuting, or over unsecured electronic circuits. Classified information may be discussed only in authorized spaces and with persons having a specific need to know and the proper security clearance," states the memo. ~Aimee (I still like my shock collar idea.) 3983 From: zack <10-33@c...> Date: Tue Oct 23, 2001 10:14am Subject: Re: Digest Number 746 I beg your pardon as to your statement , " our police force is useless" ............ I live in Washington DC and take great pride in serving our citizens. I also WORKED at the Pentagon at the time of the tragedy. <> I am sorry .......... do not include all Police agencies. At 12:09 PM 10/23/2001 +0000, you wrote: >Date: Mon, 22 Oct 2001 11:49:10 +0200 > From: "Ray Van Staden" >Subject: TAKE THE LAW INTO YOUR OWN HANDS > >Our government can not protect us. > >Our Police Force is useless and corrupt to protect us.>>> visit http://www.copscops.com Join the Law Enforcement community http://anexa.com/lawenforcement/index.Ihtml Washington DC Police Department http://mpdc.dc.gov/main.shtm " Our military is powerful, and it's prepared." The President of the United States George W Bush God Bless The USA http://www.copscops.com/blessusa.htm 3984 From: James M. Atkinson Date: Tue Oct 23, 2001 11:19pm Subject: Words for Next Year's Dictionary Words for Next Year's Dictionary Af∑ghan∑i∑stan af-GYAN-is-tan noun. A landlocked country of southwest-central Asia. Since ancient times the region has been crisscrossed by invaders, including Persians, Macedonians, Arabs, Turks, and Mongols. Afghan tribes united in the 18th century under a single leadership, but a fully independent state did not emerge until 1919. Kabul is the capital and the largest city. Population: 0. Major Feature; Only country on Earth, without electricity, whose glow can be seen from the moon. {see; bin laden} Ar∑a∑bic A-rah-bic adj. Of or relating to Arabia, the Arabs, their language, or their culture. n. (Dead Language) A Semitic language consisting of numerous dialects that was the principal language of Arabia, Jordan, Syria, Iraq, Lebanon, Egypt, and parts of northern Africa. Fell out of usage after September 2001. Being replaced by Hebrew and English. (See bin laden, U.S. Marine Corps, Shiite) bin' lad∑en bin LAW-din A past tense of lade { v. intr.To ladle a liquid. } Introduced into US Southern slang, as in "bin' fish'in", and "bin' hunt'in"; To squash something so completely that only an oily stain remains. Usage: "That poor critter sure got bin laden by those trucks as it tried to cross the interstate." Brought into common usage by the returning elements of the US Marine Corps. {see; Shiite, Trident Mark 47 Thermonuclear Warhead, IRATE, AFGHANISTAN) ji∑had also je∑had GEE-hawd noun A Muslim holy war or spiritual struggle against infidels. Origin: Most likely came into language, through repetition of usage, as a corruption of the English slang term Yea-Ha. Yea-Ha YEE-ha { yea (y) n. { ha1 also hah (h‰) interj. Used to express surprise, wonder, triumph, puzzlement, or pique. An affirmative statement or vote} and as overheard used by numerous American Fighter Bomber Pilots and Tank Crews, or as a crossover term when real-life mimics art and the movies, sic. As uttered by Slim Pickens, in the final scenes of Doctor Strangelove. hi∑jab hi-JAB noun. The headscarf worn by Muslim women, sometimes including a veil that covers the face except for the eyes. Mainly used today to mask the morning of the loss of fathers, brothers, husbands and children, and to hide flash and radiation burns, or to act a a filter for low levels of fallout. IR∑ATE eye-RATE noun. The new country formed out of 95% of the land mass of Iran and Iraq. The remaining 5% can be found settling as a fine white ash downwind over the Himalayan Mountain Range. (See; U.S. Marine Corps, Trident Mark 47 Thermonuclear Warhead, Shiite, bin laden, Yea-Ha) Shi∑ite also Shi∑ëite SHEE-ite noun. A member of the extinct branch of Islam that regarded Ali and his descendants as the legitimate successors to Mohammed and rejects the first three caliphs. adj. Associative name; A mispronouncing of a Southern version of an American expletive { shit (shit) Vulgar Slang interj. Used to express surprise, anger, or extreme displeasure}, often spoken as the last word of members of this extinct sect as they saw the Trident Mark 47 Warhead re-entry contrails overhead. Origin: Lost in the past. {See; bin laden, Yea-Ha} -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3985 From: Gil Zimmerman Date: Wed Oct 24, 2001 4:12am Subject: RE: Digest Number 746 I think he meant to say that the police forces in his area, town, region, or country were useless. As he is from South Africa, I think he has a different perspective, unique perhaps for his part of the world. I've heard bad things about police from South Africa, also from France where corruption is almost institutionalized, and had first hand experience with dishonest cops in a major northwest agency. There are bad cops in every department just as there are bad priests in every diocese and bad teachers in every school. If in the passions of the moment, he vented some steam, maybe he deserves a bit of a break. Just my 2-cents, though. Gil Gil Zimmerman Erhart Sawyer International gilzimm@a... (646) 261-7378 voice & messaging 24/7 (646) 349-1485 fax --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.282 / Virus Database: 150 - Release Date: 9/25/01 3986 From: A Grudko Date: Wed Oct 24, 2001 3:59pm Subject: Re: Digest Number 746 - Original Message - > I beg your pardon as to your statement , " our police force is useless" >> A defenceless woman slaughtered because our authorities can not protect us. > > I am sorry .......... do not include all Police agencies. Zack - Raymond did say 'our' police force (meaning here in South Africa), not all police forces. We have a 3 % conviction rate for all reported crime here in South Africa. As a volunteer police officer (reserve) since 1981, in numerous branches and locations I can tell you that his frustration is shared by many police officers. The atrition rate for the few remaining good cops is frightening. Raymond's elderly aunt was shot in the back of the head by one of an estimated 4 robbers - after she had opened the safe for them. I think his anger can be understood. Raymond also served this government for many years. Regards Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 3987 From: James M. Atkinson Date: Wed Oct 24, 2001 4:11pm Subject: Spy Suspect Had Missile Site Coordinates Spy Suspect Had Missile Site Coordinates http://www.washingtonpost.com/wp-dyn/articles/A42721-2001Oct23.html Military Contractor Also Had Embassy Addresses When Arrested, Indictment Says By Brooke A. Masters Washington Post Staff Writer Wednesday, October 24, 2001; Page A18 When accused spy Brian P. Regan was intercepted by federal agents at Dulles International Airport in late August, he was carrying the coordinates of two foreign countries' missile sites and the addresses of Chinese and Iraqi embassies in Europe, according to an indictment handed up yesterday by a federal grand jury in Alexandria. The grand jury charged Regan, 39, of Bowie, with attempted espionage, which carries a maximum of life in prison. The single-count indictment reinforces the belief of counterintelligence experts that Regan, who worked at the National Reconnaissance Office in Chantilly, first as an Air Force master sergeant and then as a contractor with TRW Inc., was apprehended early in his alleged spying career. The indictment charges that beginning in 1999, Regan, an expert on signals intelligence, began surfing on the classified U.S. intelligence intranet known as Intelink for information about the military preparedness of China, Iran, Iraq and Libya. Law enforcement sources said they believed that he might have been assembling documents to sell. He did similar surfing in the three weeks before his arrest, viewing classified satellite images of missile facilities and launch preparations of two unnamed countries, while taking notes, the indictment said. Regan's attorney, Nina Ginsberg, declined to comment on the indictment. Regan spent 20 years in the Air Force, becoming a "recognized expert" on the air defense systems in the Middle East and former Soviet Union, the indictment said. His last job at the NRO, which builds and maintains spy satellites, was in the office that concentrates intelligence support for military forces in the field. Regan lost his top-secret security clearance in August 2000, when he retired from the Air Force, but he regained it a year later as a TRW contractor, when he was already under suspicion of spying. The investigation leading to Regan's arrest began last fall, when U.S. officials learned that Libya had classified documents that it was not supposed to have, according to court documents and law enforcement sources. The documents were mostly classified secret -- not the more critical "top secret" -- and included nonclassified pages of otherwise classified documents. The United States also learned that Libyan officials had received encrypted messages, telling them to contact a free e-mail account assigned to "Steve Jacobs," of Alexandria, an FBI affidavit said. FBI agents determined that the Jacobs account was being accessed from public libraries in Crofton, Falls Church and Prince George's County. The two Maryland libraries are within five miles of Regan's Bowie home, and the Falls Church library is on his commuting route. In June, FBI agents watched Regan use public access computer terminals in the Crofton library to look up the addresses of the Iraqi and Libyan embassies in France, Germany and Switzerland, the 16-page indictment said. On June 26, Regan flew to Germany for a week-long private trip. In August, Regan bought another plane ticket to Germany and began collecting the information on the missile facilities, the indictment said. Regan told co-workers he was taking his four children to Walt Disney World, but on Aug. 23, he was intercepted at Dulles International Airport as he was taking an airport mobile lounge to board a Lufthansa flight to Frankfurt and then Zurich. At the time, he had the addresses of the Chinese and Iraqi embassies concealed in a compartment in his shoe, a Global Positioning System and a notebook with a personal code representing the coordinates of a missile launch preparation site, the indictment said. He also had a sheet of paper in his wallet with a similar code for two foreign missile facilities. In addition, he was carrying a list of NRO technical training courses that showed the level of classified information that he had access to, the indictment said. Regan's checked bag had tape, glue and garbage bags inside, and his carry-on contained latex gloves, the indictment said. A computer disk seized during a search of Regan's home contained a letter to the Canary Islands, Spain, asking for information about off-shore bank accounts, the indictment said. Regan had amassed $53,000 in consumer debt at the time of his arrest, according to court documents. Regan enlisted in the Air Force when he was 17 and won several awards during his 20 years of service, including a medal for his analysis of the Iraqi military during the Persian Gulf War. C 2001 The Washington Post Company -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3988 From: James M. Atkinson Date: Wed Oct 24, 2001 9:36pm Subject: I have found the following to be touching I have found the following to be touching, and suggest that you have the Kleenex nearby (it's a real tear jerker), you may want to hit replay a few time to experience the full effect. "Guide To Diplomacy" (be sure to hit the play button): http://www.sweepgear.com/rock-the-casba/diplomacy.swf In case you haven't seen it yet, this is the Bush and Powell Ultimatum http://www.sweepgear.com/rock-the-casba/binlaDa2.swf Here is some previously unreleased aerial combat footage: http://www.sweepgear.com/rock-the-casba/chase.jpg Boeing also has had some input in all of this: http://www.sweepgear.com/rock-the-casba/MessageFromBoeing.pps ...and of course a required reading list: http://www.sweepgear.com/bookshelf.html -jma -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3989 From: MIKE F Date: Thu Oct 25, 2001 1:56pm Subject: CDC-Center Disease Controll :Facts about: Anthrax, Botulism, Pneumonic Plague, Smallpox .... Facts about: Anthrax, Botulism, Pneumonic Plague, Smallpox .... http://www.bt.cdc.gov/DocumentsApp/FactsAbout/FactsAbout.asp CDC'S Public Preparedness & Response http://www.bt.cdc.gov/ Main Site CDC-Center Disease Controll http://www.cdc.gov/ --------------------------- lATER4,Mike Fiorentino Master Links 4 Master Investigators http://www.ml4mi.com e-mail: friindy@a... 3990 From: James M. Atkinson Date: Thu Oct 25, 2001 2:01pm Subject: American women go to war Sent in for posting by a female list member who prefers to remain anonymous. -jma > Take all American women who are within five years of menopause - >train us for a > few weeks, outfit us with automatic weapons, grenades, gas masks, moisturizer > with SPF15, Prozac, hormones, chocolate, and canned tuna - drop us >(parachuted, > preferably) across the landscape of Afghanistan, and let us do what comes > naturally. > Think about it. Our anger quotient alone, even when doing standard stuff like > grocery shopping and paying bills, is formidable enough to make >even armed men > in turbans tremble. > > We've had our children, we would gladly suffer or die to protect >them and their > future. We'd like to get away from our husbands, if they haven't >left already. > And for those of us who are single, the prospect of finding a good man with > whom to share life is about as likely as being struck by lightning. We have > nothing to lose. > > We've survived the water diet, the protein diet, the carbohydrate >diet, and the > grapefruit diet in gyms and saunas across America and never lost a pound. We > can easily survive months in the hostile terrain of Afghanistan >with no food at > all! > > We've spent years tracking down our husbands or lovers in bars, hardware > stores, or sporting events...finding bin Laden in some cave will be >no problem. > > Uniting all the warring tribes of Afghanistan in a new government? Oh, please > ... we've planned the seating arrangements for in-laws and extended >families at > Thanksgiving dinners for years ... we understand tribal warfare. > > Between us, we've divorced enough husbands to know every trick >there is for how > they hide, launder, or cover up bank accounts and money sources. We >know how to > find that money and we know how to seize it ... with or without the > government's help! > > Let us go and fight. The Taliban hates women. Imagine their terror >as we crawl > like ants with hot-flashes over their godforsaken terrain. I'm going to write > my Congresswoman. You should, too! -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3991 From: James M. Atkinson Date: Fri Oct 26, 2001 7:45am Subject: Infamous Hacker Becomes CIA Agent? Infamous Hacker Becomes CIA Agent? http://www.informationweek.com/story/IWK20011017S0018 Oct. 17, 2001 Kevin Mitnick will portray a CIA computer expert on an upcoming episode of ABC's spy thriller "Alias." By David M. Ewalt Notorious computer hacker Kevin Mitnick has found himself a new gig, and the irony is so thick you could cut it with a knife: He'll be playing a CIA computer expert on an upcoming episode of ABC's spy thriller "Alias." "It's just hilarious, the idea of playing a CIA agent with my history," says Mitnick. "I lived under aliases for years when I was a fugitive." Mitnick went underground for three years in the 1990s after being accused of breaking into the computer systems of several corporations, including Sun Microsystems Inc. and Motorola Inc. The law caught up with him in 1995, and he spent almost five years in prison. While in jail, his case became a cause celebre, as supporters complained that he was unfairly demonized and the government insisted he was a dangerous criminal. Mitnick will appear in one scene of the Oct. 28 episode of "Alias," playing a CIA agent who has hacked into the network of evil organization SD-6. While filming the scene, Mitnick had to act with prop computers, since the terms of his supervised release prohibit him from possessing or using any kind of computer hardware. "I hadn't acted before, and I thought it was a blast," says Mitnick. He's even considering pursuing more acting jobs in the future, particularly if they're in the same sort of "Mission Impossible" genre. His only complaint with the experience: The show's producers made him cut his long hair to a more conservative Fed-agent buzz cut. -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- From: Hoffman Date: Thu Oct 19, 2000 8:25pm Subject: Re: Fouling of NLJ Detectors. > I have recently been involved in a debate with > a friend related to the pros and the cons of > NLJ Detectors. He states that if a bug is wrapped > in aluminium foil it will go undetected. The same if > it is hidden in an electronic appliance (Pc, phone, etc) > as there is too much "static". > I would appreciate your comments on this subject. ------------------------- From my humble understanding on that topic; others can debate if they feel otherwise, but a transmitter can be made reasonably transparent to a NLJD by doing two things. (1) Shielding the transmitter circuitry; and (2) Installing a bandstop (or perhaps better yet; a narrow bandpass) RF filter with the most appropriate rolloff characteristics on the antenna lead to attenuate any GHz signal which may be conducted into the transmitter from the NLJD. 1773 From: Bob Washburne Date: Fri Oct 20, 2000 8:36am Subject: Re: 12 things you shouldn't say to a police officer. 13. What's the matter, officer? Dunkin Donuts closed? Bob Washburne "James M. Atkinson, Comm-Eng" wrote: > > 1.I can't reach my license unless you hold my beer. > (OK in Texas) > > 2.Sorry, Officer, I didn't realize my radar detector > wasn't plugged in. > > 3.Aren't you the guy from the Village People? > > 4.Hey, you must've been doin' about 125 mph to keep > up with me. Good job! > > 5.Are You Andy or Barney? > > 6.I thought you had to be in relatively good physical > condition to be a police officer. > > 7.You're not gonna check the trunk, are you? > > 8.I pay your salary! > > 9.Gee, Officer! That's terrific. The last officer only gave > me a warning, too! > > 10.Do you know why you pulled me over? Okay, just so > one of us does. > > 11.I was trying to keep up with traffic. Yes, I know there > are no other cars around. That's how far ahead of me > they are. > > 12.When the Officer says "Say Fella....Your eyes look > red, have you been drinking?" You probably > shouldn't respond with, "Gee Officer your eyes look > glazed, have you been eating doughnuts?" > 1774 From: James M. Atkinson, Comm-Eng Date: Fri Oct 20, 2000 10:48am Subject: Re: Used TSCM gear At 2:03 PM -0400 10/19/00, Steve Uhrig wrote: >Hi all, > >We have updated our used equipment list which has a number of >used TSCM pieces including an NLJ, an Avcom spectrum analyzer, >an H-P spectrum analyzer and much more. > >List members ordering get something extra. > >http://www.swssec.com/used.html Looks like some great TSCM gear, and some really attractive prices. I would strongly encourage list members to check out the equipment he is offering and grab up the gear before someone else gets it. The HP gear and the AVCOM package that is being offered is worth a great deal more then the asking price. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1775 From: James M. Atkinson, Comm-Eng Date: Fri Oct 20, 2000 10:57am Subject: Re: Re: Fouling of NLJ Detectors. At 9:25 AM +0100 10/20/00, Craig Snedden wrote: >To add my pennies worth..... > >The good old "Mark 1 Eyeball, TSCM Operator for the use of" works every >time.... > >Forget the NLJD, if you don't know what your doing with it, you'll end up >pulling the walls down exposing nails contacting other metallic product, >producing the minutest of electrical contacts in the belief that there is a >bug in the wall..... > >Have Fun! > > >Craig Not quite... The process is something like this... Run the NLJD to locate a Non-linear junction. Flood said junction with acoustic/ultrasonic or mechanical sounds to see if it "crackles" (thus indicating a possible false junction). Explore area with a Near Field probe for magnetic fields (there usually are) Perform a Thermal imaging scan of the immediate area Perform a forensic light examination of the surface area's If we can get a bore scope into the area without making a visible hole then we do that as well. A X-Ray of the area is taken and examined ... then and only then would we commence and kind of destructive examination. Remember TSCM 101: First we do the NON-ALERTING examination Then the Alerting examination Then the Non Destructive examination, ...and when all else fails to resolve the anomaly do we turn to destructive testing or evaluation (or "bust a whole in the wall"). -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1776 From: Steve Uhrig Date: Fri Oct 20, 2000 7:22pm Subject: On TV right now -- 2000 hours EST Right now on TLC (The Learning Channel) is a show about undercover stings. See how many felonies you can count. Some of these people could be locked up. Phone tapping and the like. Illegal anywhere in the U.S. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1777 From: Andre Holmes <1ach@g...> Date: Fri Oct 20, 2000 8:16pm Subject: Re: On TV right now -- 2000 hours EST Hello Steve is there a possibility to get a copy form the network. ----- Original Message ----- From: "Steve Uhrig" To: Sent: Friday, October 20, 2000 8:22 PM Subject: [TSCM-L] On TV right now -- 2000 hours EST > Right now on TLC (The Learning Channel) is a show about > undercover stings. > > See how many felonies you can count. > > Some of these people could be locked up. Phone tapping and the > like. Illegal anywhere in the U.S. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1778 From: Steve Uhrig Date: Fri Oct 20, 2000 8:26pm Subject: Re: On TV right now -- 2000 hours EST Once upon a midnight dreary, Andre Holmes pondered, weak and weary: > Hello Steve is there a possibility to get a copy form the I don't know. Ask them. It wasn't that impressive. Just full of people bugging phones and recording audio and the TV people saying what a great thing it is to have technology like that. For people not involved in surveillance, it probably was a gee- whiz thing. The guy from the spy shop was lying like they all do about the equipment he sells. Anything like this will be rerun many times. Keep an eye on things. I am sure there is a website with scheduling info for the Learning Channel. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1779 From: Andre Holmes <1ach@g...> Date: Fri Oct 20, 2000 8:28pm Subject: TECHNIQUES Greetings listies I have something that Ive been thinking alot about lately. During a sweep one might encounter a heavy file cabinet,bookcase that may have a mic run installed in the baseboard or back of the case. How can the sweeper say that they completed a sweep and found nothing hostile. What is the solution to this seniero. [Non-text portions of this message have been removed] 1780 From: Rob Muessel Date: Fri Oct 20, 2000 7:57pm Subject: Re: Fouling of NLJ Detectors. Let me throw in a thought or two, though somewhat late. As a long time user of NJDs and also having spent nearly 20 years with ISA, one of the major suppliers of TSCM equipment, let me suggest that the most important concept in using of any type of equipment is to know what it won't detect. NJDs detect semiconductor PN junctions. That's all they do. If you point the NJD's antenna at an item containing semiconductors, you'll receive an indication of their presence. If the target contains semiconductors because it is an electronic device, you really have no way of knowing if anything else has been secreted within the target. The NJD can't discriminate between good electronics and bad. Also, important to note is the fact that the leads on the components and the traces on the printed circuit card in the bug will act as antennae. The PN junction is what causes the affect, but the short lengths of copper are equally as important. To detect PN junctions, NJDs use RF. For an NJD to work, there must be a way for its signal to reach the junction. If the bug question is an RF device, it must have an antenna. The signal from the NJD will radiate up the bugs antenna, regardless of whether or not the package is wrapped in foil. Harmonics will radiate out from the device the same way. I have seen experiments where a transmitter and its antenna are wrapped in foil or steel wool and the NJD can't locate it. But then the bugs signal is severely attenuated. As soon as enough antenna is pulled from the package so the signal is received at a reasonable distance, the device becomes detectable. There have been discussions about using filters to keep the NJDs fundamental signal from propagating up an antenna. I think it would be tough to build a transmitter where size considerations and battery life can provide adequate filtering of a signal of somewhere between 100 milliwatts a 3 watts emanating from a distance of only inches away. -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 1781 From: James M. Atkinson, Comm-Eng Date: Fri Oct 20, 2000 8:36pm Subject: Re: TECHNIQUES At 9:28 PM -0400 10/20/00, Andre Holmes wrote: >Greetings listies >I have something that Ive been thinking alot about lately. >During a sweep one might encounter a heavy file cabinet,bookcase that may have >a mic run installed in the baseboard or back of the case. >How can the sweeper say that they completed a sweep and found nothing hostile. >What is the solution to this seniero. Move the file cabinet or bookcase away from the wall. If it is too heavy then have someone help you. If you don't have help unload the file cabinet/bookcase and check it carefully. Then carefully check the area behind and below the thing. If you are unable to do the above give the customer their money back and apologize for wasting their time. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1782 From: James M. Atkinson, Comm-Eng Date: Fri Oct 20, 2000 8:41pm Subject: U.S. State Department Employees Pressed to Protect Secrets State Department Employees Pressed to Protect Secrets http://www.foxnews.com/national/102000/secrets.sml The State Department has issued guidelines on how to shred classified documents. (photo) http://www.foxnews.com/national/102000/images/secrets1.jpg Friday, October 20, 2000 By George Gedda WASHINGTON ≠ Paper shredders, State Department employees are told, must trim classified documents down to slices no larger than 1/32 inch by 1/2 inch. Disposal can also be achieved, they are advised, with machines that can "pulverize" secrets into powder. Safes storing sensitive materials must weigh at least 500 pounds ≠ too heavy to be carted off. James D. Tromatter makes these points tirelessly in briefing after briefing as part of the State Department's intensified efforts to keep employees security conscious ≠ and secret materials away from unauthorized eyes. Since May, about 9,000 employees have heard the message from the amiable yet no-nonsense Tromatter, who gave up his Army career four years ago to become a security expert at State. Attendance is mandatory. The goal of Secretary of State Madeleine Albright is to end a string of security lapses plaguing the department, the result, many in Congress believe, of a culture that is inattentive to security requirements. There was the case of the Russian spy operation a year ago that involved use of a sophisticated eavesdropping device planted in a seventh-floor conference room. The Russian who got caught listening to the device outside the State Department was sent packing last December. Who planted the device remains a mystery. More significant is the case of the laptop computer with highly classified information that disappeared around Feb. 1 from a conference room in the department's Bureau of Intelligence and Research. It was alleged to have contained highly classified information about arms proliferation issues and about sources and methods of U.S. intelligence collection. The lapses left Albright feeling "humiliated." At a meeting of State Department employees, she dispensed with the ambiguities so common to her trade. "I don't care how skilled you are as a diplomat, how brilliant you may be at meetings, or how creative you are as an administrator, if you are not a professional about security, you are a failure," she said. Less than three weeks later, Tromatter began his briefings, which consist largely of reminders: Top secret material is always covered by a special sheet that identifies it as such. Use red "secret" labels on computer disks that have been used on classified computers. To hand-carry top secret information requires a top-secret clearance. Copying of top secret materials must be carried out by a "top-secret control officer." Secret and confidential materials can only be copied on designated machines. Since the briefings began, Tromatter says, reports of infractions are down by about 20 percent.. Tromatter, a native of Williamsburg, Va., says the most common security infraction involves leaving a classified document uncovered on a desk. He says that of the various threats the State Department faces, none is greater than what he calls "sigint," or signals intelligence. It involves the intercept by unauthorized persons of classified materials sent by facsimile or telephone. The security lapses did not go unnoticed on Capitol Hill. "It is obvious that the department lacks a professional environment that is sensitive to security concerns," said House International Relations Committee Chairman Benjamin Gilman, R-N.Y. Said Porter Goss, R-Fla., chairman of the House Intelligence Committee, "There is not sufficient awareness, or sufficient attention, to security" at the department. It hasn't been easy for Albright to overcome these perceptions. Not long after her speech to department employees, Sen. Rod Grams, R-Minn., a member of the Senate Foreign Relations Committee, complained that six foreign service officers nominated for ambassadorships had committed a total of 62 security infractions, including one with 22 on his record. To Grams, it seemed hard to reconcile Albright's warnings about the need for vigilance with coveted promotions for people not always attentive to security issues. Grams held up the nominations for months but then allowed them to clear the Senate after extracting further concessions from the State Department on employee accountability for infractions. In September, the quest for increased security consciousness suffered another setback. The U.S. ambassador to Israel, Martin Indyk, was stripped of his security clearance after he was alleged to have removed classified briefing books from his office, among other infractions. Three weeks later, the security clearance was reinstated because Albright felt Indyk was needed to deal with the ongoing violence between Israelis and Palestinians. But there was no halt to an investigation into his supposed wrongdoing. Congress kept up the heat on the administration this week by approving a bill that subjects government employees to up to three years in prison for willfully disclosing nearly any classified information. The bill was passed despite warnings that it gives the government a blank check to criminalize any leaking it does not like. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1783 From: Charles@t... Date: Fri Oct 20, 2000 9:26pm Subject: Re: TECHNIQUES You can get some nylon or actually teflon slippery pads, I know a set is sold by www.sandman.com , you can slip them under a couple of corners of heavy furniture and they help with sliding. The set from Mike Sandman comes with a prybar type of lever that helps to do the lifting and sliding. File cabinets, you can usually remove the drawers to make them easier to move, but not always if it's locked! (Watch out if there are any wires coming out of a locked cabinet) charles ----- Original Message ----- From: "Andre Holmes" <1ach@g...> To: Sent: Friday, October 20, 2000 9:28 PM Subject: [TSCM-L] TECHNIQUES > Greetings listies > I have something that Ive been thinking alot about lately. > During a sweep one might encounter a heavy file cabinet,bookcase that may have > a mic run installed in the baseboard or back of the case. > How can the sweeper say that they completed a sweep and found nothing hostile. > What is the solution to this seniero. > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > 1784 From: Talisker Date: Sat Oct 21, 2000 5:23am Subject: Re: TECHNIQUES Andre > During a sweep one might encounter a heavy file cabinet, bookcase that may have > a mic run installed in the baseboard or back of the case. > How can the sweeper say that they completed a sweep and found nothing hostile. > What is the solution to this seniero. You do everything you can to move it, if it is impossible and sometimes it is, strip out the contents, check it thoroughly with RF and NLJD, (if you've got it dig out the X-Ray gear) above all check for exiting leads as in your extended mic scenario. Even if you have an extended mic the signal has to exit the your controlled space whether by cable or RF, extend your search to include these possible exit points. At the end of the day you may have to pass the risk back to the customer ie If the possible compromise is high they may wish to: Strip out the offending item, regardless of cost, Accept the risk and carry on just my 2c Andy http://www.networkintrusion.co.uk Talisker's comprehensive IDS & Scanner List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "Andre Holmes" <1ach@g...> To: Sent: Saturday, October 21, 2000 2:28 AM Subject: [TSCM-L] TECHNIQUES > Greetings listies > I have something that Ive been thinking alot about lately. > During a sweep one might encounter a heavy file cabinet,bookcase that may have > a mic run installed in the baseboard or back of the case. > How can the sweeper say that they completed a sweep and found nothing hostile. > What is the solution to this seniero. > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1785 From: G. Hoxie Date: Sat Oct 21, 2000 10:12am Subject: Stabilock Test Set for sale I am getting rid of another test set on ebay. The Item is #471787978. Let me know if you have any questions about it. Best Wishes Everyone. George 1786 From: Steve Uhrig Date: Sat Oct 21, 2000 2:53pm Subject: Suppository remarks http://www.solinas.com/reports/thisweek.html Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1787 From: Date: Sat Oct 21, 2000 0:18pm Subject: fake mustaches, electronic eavesdropping equipment and a high level Fmr. Detective Tied to Jewel Thefts By MIKE ROBINSON .c The Associated Press CHICAGO (AP) - Using fake mustaches, electronic eavesdropping equipment and a high level of computer sophistication, the ring of jewel thieves roamed the country for years, pulling off crimes so clever they might have been planned by a master detective. Federal prosecutors say they were. William Hanhardt, former Chicago chief of detectives, was known as a tough ``cop's cop'' as he shot his way onto the city's front pages and rose through the ranks of the police force in the 1950s despite whispers that he had connections to organized crime. Hanhardt became a high-profile police official who, among other things, was a consultant to producer Michael Mann's 1980s TV show ``Crime Story.'' Now prosecutors have accused Hanhardt, 71, of being the mastermind behind the jewel-theft ring that made off with $4.5 million worth of loot. He and five others were indicted Thursday on charges of racketeering conspiracy in connection with thefts of high-quality gems and luxury watches in Arizona, California, Michigan, Minnesota, Texas and Wisconsin. The men have pleaded innocent and have been released on bond. FBI agents are hunting the sixth defendant, William ``Cherry Nose'' Brown, last known to be living in Gilbert, Ariz. Hanhardt made headlines 38 years ago when and other police officers shot and killed two home invaders in a police shootout. ``He was a legend in the Police Department. Everybody knew who he was,'' Bob Podgorny, a 30-year veteran of the force and first vice president of the Fraternal Order of Police, said in Friday's Chicago Tribune. ``All the years that I have known him, he has been a policeman's policeman.'' Federal officials say it was Hanhardt's police know-how that made the shadowy ring so elusive for so long. ``A significant jewel-theft ring was able to operate without detection because of one defendant's extensive knowledge of police techniques and procedures,'' says Kathleen McChesney, special agent in charge of the FBI's Chicago field division. Smoke bombs, aliases, secret codes, bullet-proof vests, electronic eavesdropping equipment, fake beards and mustaches, and a vast array of burglary tools were standard issue with the thieves, officials say. In some cases, the thieves bought luggage matching the cases used by jewelry salesmen to carry their wares, prosecutors say. They were apparently able to get into a fully locked car in a matter of seconds, switch cases and make off with the jewels undetected. But what may have been the most sophisticated part of the operation was the use of computers. Hanhardt's clout at police headquarters enabled him to use the very computers that lawmen use to hunt criminals to stalk the unsuspecting jewelry salesmen, getting license numbers and other key information, authorities claim. The thefts began even before Hanhardt retired, according to federal officials. After that, he was able to contact officers he still knew in the department, who allegedly dipped into computerized files to get the information for him. Federal prosecutors say little on how he did that. ``If we could prove that they were guilty of a crime they would be charged,'' Lassar said. It may have simply been a matter of the police doing a favor for a friend who had once been their boss. Lassar indicated more indictments were not expected. Some Chicago mob watchers say Hanhardt may have been able to climb to the highest ranks of the department due to influence with politicians in Chicago's scandal-drenched 1st Ward Democratic Organization. ``The First Ward people were very influential in politics, very capable of delivering the vote and totally tied to the mob,'' says Wayne Johnson, chief investigator for the Chicago Crime Commission. Exactly how the FBI cracked the case is a closely guarded secret, although there reportedly was a wiretap on Hanhardt's phone for a year. But it's clear that agents spent years gathering evidence that linked the crimes across the nation into a single indictment. One of those indicted along with Hanhardt is Sam DeStefano, 55, of Chesterton, Ind. He confirmed in an interview Thursday that he is the nephew of another Sam DeStefano, an old-time Chicago mobster who was fatally shot in a West Side alley after a storied career in crime. Named as a co-conspirator in the case is Jimmy D'Antonio, described by crime commission experts as a deceased member of the Chicago mob. 1788 From: Date: Sat Oct 21, 2000 4:17pm Subject: Medeco....Is it worth the investment for the client? One of my clients is concerned with security when it comes to locks for entry doors. I suggested Medeco as a good manufacturer of deadbolts etc. Do we have any lock specialists in the group that might respond to this or maybe an individual who's just damn good at "picking" My client wants to prevent bugging of a particular space. Thanks Dan 1789 From: Andre Holmes <1ach@g...> Date: Sat Oct 21, 2000 10:50pm Subject: Re: Medeco....Is it worth the investment for the client? Hello Clockdepot I have experienced all kinds of break ins in the past through the door by means of lock picking. I tried ABOLY locks which are high security and keys are supposed controlled through the manufacture by the use of ID CARDS that come with the lock. The goal was to keep blanks under control through locksmiths. As for MEDECO that lock offers no real protection from lock picking from what I gather from a security video from http://www.paladin-press.com .I beefed up my Alarm system and backed it up with cameras thats the best the average can do. ----- Original Message ----- From: To: Sent: Saturday, October 21, 2000 5:17 PM Subject: [TSCM-L] Medeco....Is it worth the investment for the client? > One of my clients is concerned with security when it comes to locks > for entry doors. > I suggested Medeco as a good manufacturer of deadbolts etc. > Do we have any lock specialists in the group that might respond to > this or maybe an individual who's just damn good at "picking" > My client wants to prevent bugging of a particular space. > Thanks > Dan > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 1790 From: William Knowles Date: Sun Oct 22, 2000 5:52am Subject: Missing wheels keep the Enigma riddle spinning http://www.sunday-times.co.uk/news/pages/sti/2000/10/22/stinwenws02015.html October 22, 2000 Jack Grimston and Nick Fielding THE enigma of the Enigma grows ever more mysterious. Only days after the stolen wartime coding machine was posted to Jeremy Paxman, the television presenter, its custodians are still preparing to pay a ransom of 25,000. The rare second world war machine was returned minus three vital rotor wheels, which, it emerged this weekend, are still the subject of a financial demand. It has fuelled police suspicions that the theft was committed by someone with intimate knowledge of Enigma, even possibly by an insider from Bletchley Park, Buckinghamshire, the wartime codebreaking centre where it was kept. In a tale that involves a former MI5 spy, a man known only as "the master" and an anonymous public benefactor, nothing can be ruled out. Christine Large, the director of Bletchley Park Trust, is this weekend awaiting a telephone call at her London flat from a mysterious intermediary who claims to be acting on behalf of "the master". The intermediary says the master innocently bought the captured German machine from a third party, unaware that it had been stolen. Large has heard nothing since Paxman found the machine in his post last Tuesday. "The master appears to be on holiday at the moment," she said. "But we are prepared to put the new owner in touch with our benefactor to secure the return of the rotors." The anonymous benefactor, whom Large says is a well-known public figure, has agreed to pay for the return of the missing wheels. The theory that insiders are responsible for the theft is backed up by the fact that the machine was stolen in broad daylight, while about 100 visitors were milling around the room in which it was exhibited. Infrared security equipment was due to be installed two days later. "Nothing would surprise me when nutters are at work," said Sir Philip Duncombe, the chairman of the trust. "Of course we take this possibility seriously." Another clue is the use of the phrase "that woman" in one of the ransom demands, which is taken as a disparaging reference to Large, who has been at the centre of a bitter controversy over the future of Bletchley. The complex of huts around the Victorian mansion has a glorious history. At its peak Bletchley employed 12,000 people to break German and Japanese military codes, deciphering up to 50,000 messages a week. Its importance was kept secret for decades and the buildings fell into neglect. In 1991 a small band of volunteers stepped in to stop the site being sold for housing. They formed a charitable trust to lobby to preserve the site as a museum of cryptography. However, initial attempts at raising funds failed. "I resigned as a trustee shortly after this," said Rupert Allason, the spy writer and former MP. "It should be one of the great gems of British heritage, but it just hasn't worked that way." Large, a former businesswoman, was hired last year to put the trust's plans on a professional footing. Almost immediately there was a dispute among the trustees and volunteers. One group, led by Tony Sale, a former MI5 officer, was opposed to a plan to sell off much of the site and increase corporate sponsorship by turning the mansion into a conference centre. Last October Large was sacked by the trustees, only to be reinstated after an inquiry by the Charity Commission. The seven trustees who voted for her dismissal were themselves forced to resign. A police inquiry into death threats left on her answering machine was inconclusive. Large subsequently took boxing lessons at a London gym. "I believe I have quite a good right hook now," she said. "It helps keep me on the ball." Sale, responsible for reconstructing Colossus, the Bletchley computer which cracked Germany's sophisticated Lorenz code, later formed a rival organisation, the Bletchley Park Heritage Society, which continues to oppose Large's plans for the site. A Bletchley insider said: "It's sad, but Tony is not a team player. He is now persona non grata here." Others, however, support Sale and point to the threatened demolition of parts of the complex. "We are very worried about the future of the archive which we have gathered at Bletchley," said Hamish Carmichael, secretary of the Computer Conservation Society. "It's very unclear what will happen." The police have suspicions over the identity of the Enigma thief, but are not thought to be close to an arrest. Apart from showing signs of being a well-informed cryptologist, the intermediary has displayed media savvy at every stage of the inquiry. Early on he contacted Central Television claiming to have the device and requested that negotiations for its return should be carried out through the media. He may well have targeted Paxman because he knew him to be a close friend of Robert Harris, who immortalised Bletchley's wartime activities in his bestselling thriller Enigma. It was also a clever move. If "the master" had left any fingerprints on the machine, Paxman may have inadvertently helped to erase them. Thames Valley police officers are understood to have been "astounded" when they saw him pawing the machine, potentially wiping off valuable evidence. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 1791 From: A Grudko Date: Sun Oct 22, 2000 7:36am Subject: Re: More Cheap Top Tips ----- Original Message ----- > Another cheap tip (trust an Englishman) > > Really high ceilings, no problem tywrap an antennae to a 15 metre (45') carp > rod it even has ferrules to hold the coax. Because it's made of carbon it's > incredibly light, well at least for the first hour As one of the London CB pirates (Echo Lima) of 1976 I had a 2 Mtr high 27 mhz helical fishing rod on the boot of my Vauxhal Cavaleer. Worked well. On my arrival in South Africa I found that a local company, ZS Electronoiques, had built a 2 Mtr (6'6") 3 - 60 Meg resonant unity gain broad band antenna based on traps, tanks and coils on a 2 Mtr high fibreglass fishing rod! Terminated with a 50 ohm lead/SO239 socket it was really popular with our military. ZS went out of business this year 'cos our military have no one shooting at them! We have a simple system for high reach searches. 2 joined fishing rod sections reaching just over 4 Mtrs; add operator reach and we get 6 metres; epoxied velcro straps hold probes and RG59u on BNCs links the probe to the RX. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1792 From: James M. Atkinson, Comm-Eng Date: Sun Oct 22, 2000 9:05am Subject: Re: Medeco....Is it worth the investment for the client? At 11:50 PM -0400 10/21/00, Andre Holmes wrote: > Hello Clockdepot I have experienced all kinds of break ins in the past >through the door by means > of lock picking. I tried ABOLY locks >which are high security and keys are supposed > controlled through the manufacture by >the use of ID CARDS that come with the lock. > The goal was to keep blanks under >control through locksmiths. > As for MEDECO that lock offers no >real protection from lock picking from what I > gather from a security video from >http://www.paladin-press.com .I beefed up my > Alarm system and backed it up with >cameras thats the best the average can do. Medeco, ASSA, and ABLOY are the dominate high security locks which are of good quality, AND are easy to get from a locksmith in your area. Just remember that a good lock does not actually secure anything... it simply creates a delay to someone attempting a covert entry via the lock. Also the lock must be combined with the door, the a-strip, the hinges, the door jamb, the door frame, and so on. The lock in and of itself is part of a system. Unless you have the "complete system" then your wasting your money my installing a high security lock. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1793 From: Al Arango Date: Sat Oct 21, 2000 11:06pm Subject: Re: Medeco....Is it worth the investment for the client? At 11:50 PM 10/21/2000 -0400, you wrote: > Hello Clockdepot I have experienced all kinds of break ins in the past >through the door by means > of lock picking. I tried ABOLY locks >which are high security and keys are supposed > controlled through the manufacture by >the use of ID CARDS that come with the lock. > The goal was to keep blanks under >control through locksmiths. > As for MEDECO that lock offers no >real protection from lock picking from what I > gather from a security video from >http://www.paladin-press.com .I beefed up my > Alarm system and backed it up with >cameras thats the best the average can do. MEDECO's patriot system works with a coded card. To duplicate the key the locksmith must contact the service desk at Medeco who then transmits the proper sequence from the card to the key cutter. The pins are cross cut on angles in which the key rotates the pins into proper position and at their proper height. This helps to prevent picking/ The real question to ask is: what is adjacent, above and below the room, and how are services delivered to and from the room. Don't forget a momentary switch inside the receiver to a non-resetable counter for the room and an alarm circuit if the door is unlocked for more that X amount of time. Another way is to use two locks and setup a circuit if both locks are not opened within 15-30 seconds of each other an alarm is triggered. 1794 From: Date: Sun Oct 22, 2000 5:57am Subject: Re: Medeco....Is it worth the investment for the client? I appreciate the input I'm getting from everyone. I'm glad I at least steered him to one of the top three manufacturers. Jim, You said the lock is part of a system. Can you elaborate on the other parts of the system. If a Medico lock is properly installed into a metal exterior door how can anyone get through that door. By the way, what is it about those locks that make them more impenatrable? Thanks Dan 1795 From: A Grudko Date: Sun Oct 22, 2000 5:10pm Subject: Re: Medeco....Is it worth the investment for the client? ----- Original Message (snipped by AG)----- > >I have experienced all kinds of break ins in the past through the door by means of lock picking. I tried ABOLY locks > >which are high security ...As for MEDECO that lock offers no real protection from lock picking from what I gather from a security video from http://www.paladin-press.com . Paladin sell books and videos, not services. Any person that can 'pick' (non destructive manipulation) an Abloy or Medico lock already lives on a private Carribean island, probably with Diplomatic Immunity. >>I beefed up my Alarm system and backed it up with cameras thats the best the average can do. 2 types of entry. Covert. Quiet. You don't know they've been there. Can take hours. Overt. Loud. 12gg to lock & hinges. Drill/plastique for safe. In/out 2 minutes for domestic situations How'd that topic get on this list? Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1796 From: Date: Sun Oct 22, 2000 2:34pm Subject: Re: Medeco....Is it worth the investment for the client? The responses you received about the Medico were interesting. I haven't work with locks for a while, but in the past I taught the lock and alarm school for a federal agency for 3 years and have picked all types of locks. I was never able to pick the Medicos. Perhaps I could have if I had spent days on it. I saw a video about a guy who did nothing but study about and pick Medicos and it took him 8 hours to pick a Medico. Once he had picked it he could pick the same lock again in less than half the time, but a new Medico would take him at least 8 hours again. This guy was suppose to be a one of a kind guy and I never spoke to another agent or locksmith who had successfully picked one. It is still my choice, but its of little value on a poorly constructed and designed facility. The reason it is so difficult to pick is that the bins have to be rotated at the right angle as well as being aligned vertically. Jack Kelley C. E. Kelley & Associates Investigations P.O. Box 395, Baxter Springs, KS 66713 (316) 856-4460 kelleypi@a... www.angelfire.com/ks/investigations/ 1797 From: Jordan Ulery Date: Mon Oct 23, 2000 0:24am Subject: locks Back in my college days I did some security work that included physical security installations, as well as some old Sonaguard alarm systems. Some of the systems are still in operation at a DOD certified buildings in my home area. As with any product there are degrees. A regular pin and tumbler lock can be picked by a clumsy person in time. I know, I can do it, given enough time and patience and no caffeine. Medeco makes several levels of threat protection. Their standard stuff is difficult and their top of the line is very difficult. Please tell your client that regardless of the make or model of the lock the physical security needs to consider the door and jamb and surrounding area as well as the lock itself. Also, nothing, as you know, is perfect. The flat indented key pioneered by Medeco with the pins protruding at multiple off-set angles is supposedly top notch. Also consider the depth of bolt protrusion, type of bolt material and manner in which the lock set is installed in the door itself. Check to make sure that the gap around the door is covered in the area of the bolt to prevent introduction of a cable saw to merely saw off the bolt. A deep bolt prevents a wedge being introduced to merely spread open the door and pop the bolt out of the receiver. Of course electronic keys, retina scans etc., etc., but it seems your client is price conscious. An electronic key with manual entry in XX seconds may help defeat pick attempts by the less than dedicated burglar. If the area needs to be very secure, a secondary system supporting the lock should be considered so that an alarm is triggered each time to door is opened. Also consider video monitoring of the interior and exterior of the door area. I guess the short answer to your question is you get what you pay for and Medeco has a good name. MHO [Non-text portions of this message have been removed] 1798 From: Craig Snedden Date: Mon Oct 23, 2000 3:30am Subject: Re: Re: Fouling of NLJ Detectors. :-) I did say leave it alone if you don't know what your doing....... My point entirely. How many people just wave these things at the wall and expect every "blip" to be a "bug"? Have all these posts been copied to the NLJD list? I'm sure they'd have a ball. :-) Craig -----Original Message----- From: James M. Atkinson, Comm-Eng To: TSCM-L@egroups.com Date: 20 October 2000 16:58 Subject: Re: [TSCM-L] Re: Fouling of NLJ Detectors. >At 9:25 AM +0100 10/20/00, Craig Snedden wrote: >>To add my pennies worth..... >> >>The good old "Mark 1 Eyeball, TSCM Operator for the use of" works every >>time.... >> >>Forget the NLJD, if you don't know what your doing with it, you'll end up >>pulling the walls down exposing nails contacting other metallic product, >>producing the minutest of electrical contacts in the belief that there is a >>bug in the wall..... >> >>Have Fun! >> >> >>Craig > > > >Not quite... > >The process is something like this... > >Run the NLJD to locate a Non-linear junction. > >Flood said junction with acoustic/ultrasonic or mechanical sounds to >see if it "crackles" (thus indicating a possible false junction). > >Explore area with a Near Field probe for magnetic fields (there usually are) > >Perform a Thermal imaging scan of the immediate area > >Perform a forensic light examination of the surface area's > >If we can get a bore scope into the area without making a visible >hole then we do that as well. > >A X-Ray of the area is taken and examined > >... then and only then would we commence and kind of destructive examination. > > >Remember TSCM 101: > >First we do the NON-ALERTING examination > >Then the Alerting examination > >Then the Non Destructive examination, > >...and when all else fails to resolve the anomaly do we turn to >destructive testing or evaluation (or "bust a whole in the wall"). > > >-jma > > > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > Do not try the patience of Wizards, > for they are subtle and quick to anger. > ======================================================================= > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > 1799 From: Mike Dever Date: Sun Oct 22, 2000 5:14pm Subject: Locks and Entry Techniques Jim's comments about locks only 'delaying' someone are correct. What you need to effectively secure an area is a security plan based on the 'defence in depth' principle of "Deter then Delay then Detect then Respond". A good quality alarm system (with redundant sensors and signalling links) will provide the "detection" component of the security plan for the target area. Covert entry can be: 1. Disguised entry (e.g. picking a lock or reading a code or combination) where evidence of entry is not readily discernible or 2. Surreptitious entry which leaves no evidence of entry. Regards Mike Dever CPP Principal Engineer Dever Clark & Associates GPO Box 1163 CANBERRA 2601 Australia Telephone: +612 6254 5337 Telefax: +612 6278 4020 e-mail: deverclark@b... 1800 From: pyrok Date: Sun Oct 22, 2000 8:51pm Subject: Fw: On TV right now -- 2000 hours EST ----- Original Message ----- From: "Shannyn" To: Sent: Saturday, October 21, 2000 12:24 PM Subject: Re: [TSCM-L] On TV right now -- 2000 hours EST > Actually, there are several Supreme Court decisions which allow phone > tapping and the like as long as certain conditions are met. They mostly came > about in the "gangster" days. > > Shannyn Barr > pyrok@e... > > > ----- Original Message ----- > From: "Steve Uhrig" > To: > Sent: Friday, October 20, 2000 7:22 PM > Subject: [TSCM-L] On TV right now -- 2000 hours EST > > > > Right now on TLC (The Learning Channel) is a show about > > undercover stings. > > > > See how many felonies you can count. > > > > Some of these people could be locked up. Phone tapping and the > > like. Illegal anywhere in the U.S. > > > > Steve > > > > > > ******************************************************************* > > Steve Uhrig, SWS Security, Maryland (USA) > > Mfrs of electronic surveillance equip > > mailto:Steve@s... website http://www.swssec.com > > tel +1+410-879-4035, fax +1+410-836-1190 > > "In God we trust, all others we monitor" > > ******************************************************************* > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > 1801 From: David Alexander Date: Mon Oct 23, 2000 5:54am Subject: RE: Medeco....Is it worth the investment for the client? Jack has raised an important point about locks, just about anything can be picked given time. Many organisations classify locks with a time rating, i.e. how long it would take to pick them. The trick is to ensure that important doors are visually checked at a time interval shorter than their rating to stop them from being picked. To really slow people down, fit several different locks close together so that they can't all be worked on at once. David Alexander Project Manager & Information Security Consultant Qualified BS7799 Lead Auditor Triskele Ltd. Office 01491 833280 Mobile 0780 308 3130 -----Original Message----- From: kelleypi@a... [mailto:kelleypi@a...] Sent: 23 October 2000 00:34 To: TSCM-L@egroups.com Subject: Re: [TSCM-L] Medeco....Is it worth the investment for the client? The responses you received about the Medico were interesting. I haven't work with locks for a while, but in the past I taught the lock and alarm school for a federal agency for 3 years and have picked all types of locks. I was never able to pick the Medicos. Perhaps I could have if I had spent days on it. I saw a video about a guy who did nothing but study about and pick Medicos and it took him 8 hours to pick a Medico. Once he had picked it he could pick the same lock again in less than half the time, but a new Medico would take him at least 8 hours again. This guy was suppose to be a one of a kind guy and I never spoke to another agent or locksmith who had successfully picked one. It is still my choice, but its of little value on a poorly constructed and designed facility. The reason it is so difficult to pick is that the bins have to be rotated at the right angle as well as being aligned vertically. Jack Kelley C. E. Kelley & Associates Investigations P.O. Box 395, Baxter Springs, KS 66713 (316) 856-4460 kelleypi@a... www.angelfire.com/ks/investigations/ eGroups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] From: Date: Mon Oct 20, 2003 8:58am Subject: tapping is being done by an amateur eavesdropper attaching a wiretap Leaders Worry Government is Spying On Them The East African Standard (Nairobi) NEWS October 19, 2003 Posted to the web October 20, 2003 By Standard Team Nairobi Fear is spreading among Members of Parliament and some cabinet ministers that government agents are trailing vocal critics and illegally tapping private telephone conversations. And intelligence and telecommunications sources warn that circumstances are ripe for eavesdropping on private communications. "Last Wednesday, one of my clients walked in to my office and asked me to be careful," says Kanu nominated MP Mutula Kilonzo. "The client said there was a problem because some of things we discussed on phone emerged again from people who could only have known them by tapping the conversations." The MP says some of his clients have shared their problems with him, only for them to receive calls from anonymous callers telling them not to talk to him again. Mutula Kilonzo Apart from MPs, other targets of mysterious snooping are vocal critics, constitutional review officials who have not taken sides particularly on the issue of the Prime Minister and whether the draft constitution should be adopted through a referendum. Claims that telephones are being tapped run alongside recent allegations that plainclothes police have been trailing some MPs even within Parliament buildings, a habit largely associated with the Nyayo regime in the 1980s. Two cabinet ministers said their phones are tapped and mysterious characters claiming to be from the National Security Intelligence Service had made calls to their offices, and left threatening messages. "There are MPs who will talk freely about what you said in a private conversation. Such intercepted and taped telephone conversations form the basis of some of the claims such MPs have made in public. It is part of what is fuelling controversy in Narc," an aide to one cabinet minister said. "You can overhear a conversation, then quote it out of context. You may recognise a minister's voice, but you don't recognise that of the person the minister is talking to. You can't report accurately on that conversation," the aide protested. "It is a serious infringement on privacy. It will only make society inefficient and slow down progress. Prominent people are beginning to fear talking on phone. It is bad even for business," he added. A business associate of another Cabinet minister said he has received telephone calls from people claiming to be from the NSIS who have warned him to tell the minister that his movements are being monitored. "I can't believe that somebody could be trying to push me back to where we were in the 1980s. I am used to political pressure. But I did not expect this under Narc. It is beginning to appear to me that if Narc is not restrained, it can go very far," he added. But an officer with the NSIS denied that the organisation is tapping people's phones, adding that they have not heard such complaints. "Intelligence gathering has become a very civilised affair. We are no longer the shady organisation we were before," said. "In any case, our focus is no longer politics. We now focus on gathering intelligence on terrorism, money laundering and organised crime. If we have a list of the complainants, then we can start investigating those calls," the official added. He said tapping phones is "completely illegal" in Kenya and that "some crooks" could be responsible for the mischief. "Technology has come up with gadgets. It could just be the work of some crooks. You get my number and hire crooks to call it or tap it using illegal equipment." Some of those complaining also doubt that the tapping is being done by the NSIS. They fear there could be a private attempt by influential individuals to intimidate those perceived to be critics or opponents of the government. "I experienced this thing in the 1980s and I know NSIS officers will never tell you they are calling from there," a close associate of a Cabinet minister who has received the calls said. While complaining ministers do not want to come out openly, backbenchers from across the political divide are complaining loudly that their phones have been tapped and their associates and clients threatened. They believe it is being done by the government. Outspoken KANU nominated MP, Mutula Kilonzo, said his business is threatened by telephone taps. "My clients tell me they have to call from a booth when they want to talk to me. They fear that somebody is listening into their conversation. People want to telephone their lawyer and their conversation is being recorded. The government is listening into private conversations," Kilonzo complained. He added: "If you have anything to discuss with me, don't call me, just come we talk about it. They are keeping tabs on all phones we make. I wonder why somebody would want to tap my calls. When there is an issue, I make noise about it in the press, on TV and Radio. I have nothing to hide." Another Narc MP who did not wish to be named said she was aware that phones are being tapped by some mysterious people. "I no longer talk sensitive matters on phone. I only talk to people whom I trust will not give me away, the MP said. Gem MP, Jakoyo Midiwo, said his phones are tapped and wondered what the problem is. "The tapping is permanent. For weeks after you say anything critical of the government, they will be on your phone. That is rubbish because there is no lie or conspiracy we hatch on phone. We just say the same things we say in public, he said. "We keep asking ourselves what could be wrong. What is Narc scared of after winning by such a huge mandate? Why are we behaving like we stole votes?" he asked. Some MPs trace the surveillance to the time differences emerged over whether the country needs a Prime Minister. The tapping has since escalated or dropped with the rising and cooling of Narc squabbles. It got worse with the murder of constitutional review commissioner, Dr Odhiambo Mbai. An official at the National Assembly estimated that there were about 110 plain clothes policemen in Parliament last week following the storm that rocked Narc over Dr Mbai's murder. MP Billow Kerow said MPs are being trailed, especially when they have raised sensitive issues in the House. "We know the guys. Some of them are our constituents. The whole idea is to find out who is doing what," he said. "It is intimidating. You feel insecure." But Kerow believes Mbai's death is not the cause. "The underlying cause is the distrust in Narc," he says. Mr Kilonzo however traces interferences with his phones to last February, "around the time the president left the hospital for the second time." All the complaining MPs say the problem is likely to worsen as disagreements in Narc intensify in the run up to Bomas III amid more revelations on the murder of Dr Mbai. Mr Kilonzo argues that while the Kanu regime also tapped phones, it is too soon for Narc to start doing the same because it was elected by a solid majority. "It should have been the most secure of governments," he says. "This tapping shows that the government is feeling insecure. There seems to be something serious going on in government which we are yet to be told. Be ready for more surveillance." Kanu MP, Nick Salat, says his phones are tapped "after every news bulletin" particularly from around seven in the evening. He thinks it could be somebody wants to listen to his comments about what has been broadcast. "There is a pattern and practice of eavesdropping on those thought to be critical of the government and even employees. We are also seeing a pattern where the government could be conducting surveillance on its own ministers. It is getting so bad we even fear talking to our wives," Salat said. "We don't make any strong commitments on phone now. We only give hints and discuss superficial matters. We are resorting to SMS now." Professional According to the MP, those who tap phones don't do a professional job of it. "They will cut into your conversation and say things that you would think they should not have said to you. Somebody cuts into your call and tells you "I am your colleague in Parliament, how is your family's" That from somebody you have never talked to or who has no business knowing about your family, he says, is intimidating. Narc MPs claim that some of the hostility between the coalition's leaders is based on information gathered from tapped telephone conversations. Their opposition colleagues, lawyers aligned to prominent politicians and some activists say they are receiving calls from people claiming to be from the Directorate of Security Intelligence. The callers warn that they know the activities of those they call, then promise to come and take statements but they never do. "The power to intercept private telecommunications between citizens is an extraordinary one. I have been through this before in the 1980s and I can see a pattern. It is a sign that the government is beginning to feel insecure," a member of the Constitutional Review Commission said. Subukia MP, Koigi Wamwere, says he has heard claims of people's phones being tapped and others who say they are being followed. But in the stream of claims and counter claims prevalent in Narc, he does not know what to believe. "The last thing I expect is to see this country relapse to the old days. We have come a long way and there can never be a good enough reason for the Government to start trailing MPs or ordinary citizens." Wamwere says he hopes that people are not making the claims to give the Government a bad name. National security minister Dr Chris Murungaru could not be reached by the Sunday Standard but an official in his ministry who declined to be named defended the government. "It is not the government's mission, nor is it part of the operations of this ministry, to monitor in government officials, or other citizens." The only exception, he said, would be in national security cases and only after serious consultations. Official The OP official declined to say whether there has been any security concerns lately that would warrant tapping of phones. But Mr Kilonzo, a lawyer, maintained that the law does not allow the government to listen into people's conversations under any circumstances. Doing so, he said, is a response to a desperate situation the public does not know about. He says tapping of phones began in the 1960s when President Kenyatta differed with Oginga Odinga. From then, people began to accept it as one of those things a government could do at will. But there is no law that allows the government to listen into people's telephone conversations. The right to privacy is absolute and the government is required to get an order from a judge to tap anyone's phone. The warrant must name either a specific person who is the target or a single set of premises which is the focus of the investigation. "If the government wants to tap phones legally, he said, it would have to ask Parliament to approve the need to do that. But I can assure you that this parliament cannot allow such a demand," Kilonzo says. A former minister in the Kanu government claims that even under Moi, it was never a government policy to have spies follow people around and it was done by people close to him. The surveillance mostly targeted vocal people or those suspected to be taking out information." Telecommunications experts says the things the leaders are complaining about, including clicking or tapping noises or whispering voices, could be signs that the line is tapped. They could also be signs that the tapping is being done by nonprofessionals. Clues "If your phone is being tapped by a professional, there will be no clues at all," a technician with a phone company said. But if those tapping are amateurish, or if they are using obsolete equipment, you may hear clicking or tapping noises on the line. Some people may also hear previous conversations being played back down the line, or voices whispering." Signs of tapping, she added, could also include strange sounds or volume changes on phone lines, and indication that the tapping is being done by an amateur eavesdropper attaching a wiretap, or activating some other phone tapping device. Another technician explained that the noise in itself does not indicate tapping. It could be caused by technical hitches. "When the Transmit and Receive lines are cross-connected, it could create the impression that the line is tapped. But it could also indicate tapping. It could mean that the buggers have put equipment that is not compatible with the network." Tapping of phones requires fixing a filter that is programmed to pick certain words or numbers. The filter is a conduit through which anything coming in has to pass. The device may attract no attention and even employees may not notice that it is not part of the equipment. But the operator will know. According to one technician, the two phone companies have no capacity to store what people say or receive. "Even if the authorities wanted to check what certain individuals have been saying, they cannot find it in the databases of phone companies." What can be traced is the location when you made the call and the destination of the call. An SMS text can be captured as it is being sent, not after. There is a device to make a copy of the text. The original will still go to the intended recipient but a copy can be retained. Intelligence According to a former intelligence officer there are signals that can show if the government is monitoring the communication of an individual. "You may notice phone company trucks and workers spending a lot of time near your home or office doing repair work. It could be the same many times. Telephone, cable, plumbing, or air conditioning repair people may start showing up to do work no one called them for. Eavesdroppers can fake a problem and then show up to fix it. While they are fixing the problem they are also installing eavesdropping devices." In other cases, service or delivery trucks are often parked nearby with nobody in them. These vehicles are commonly used as listening posts. "Be very cautious of any vehicle which has a ladder or pipe rack on the roof," he advises. " Or any vehicle which has tinted windows or an area you cannot see through." Copyright © 2003 The East African Standard. All rights reserved. Distributed by AllAfrica Global Media (allAfrica.com). [Non-text portions of this message have been removed] 7895 From: Date: Sat Oct 18, 2003 5:35pm Subject: spouses can no longer wiretap each other without fear of being sued [ The Atlanta Journal-Constitution: 10/18/03 ] Wiretaps by spouses actionable Court lets suit proceed By BILL RANKIN The Atlanta Journal-Constitution Sparring spouses can no longer wiretap each other without fear of being sued in federal court. In an opinion issued Thursday, the 11th U.S. Circuit Court of Appeals in Atlanta overturned a 29-year-old precedent that barred invasion-of-privacy lawsuits by spouses over wiretaps, even though the practice is a crime. "It's about time and long overdue," said Jeffrey B. Bogart, an Atlanta family law and criminal defense attorney. He said he has come across divorces with one spouse wiretapping another to catch an infidelity "more often than I'd like to see." Atlanta family law attorney John Mayoue said some studies estimate more than 75 percent of all wiretaps are done in family settings. This includes feuding spouses who try to use taped phone conversations as leverage in divorce disputes. "I think people in this country should be on notice we do not wiretap, period," Mayoue said. In Georgia, wiretapping is a felony with penalties of up to five years in prison and a $10,000 fine. But Mayoue said prosecutors, more inclined to charge more serious cases involving drugs and violence, rarely get involved in wiretaps in domestic disputes. "And most husbands and wives candidly think they just can't get DAs interested in this so they don't even bother to try," the attorney said. Clayton County District Attorney Bob Keller said he could not recall such a prosecution during his tenure. He said local prosecutors typically get involved in domestic disputes only when there is physical violence or threats of violence. The 11th Circuit issued its ruling in a case involving James and Elisabeth Glazner of Birmingham. After Glazner filed for divorce in 1999, he bought a recording device at Radio Shack and surreptitiously attached it to a phone line in their home. He then left on a trip. While he was gone, Elisabeth Glazner detected a hollow sound on the phone line, checked it out, found the recording device and called police. Before the Glazners' divorce was finalized, Elisabeth Glazner filed a federal lawsuit against her husband under a 1968 law banning wiretaps of "any person." But the case was dismissed by a federal judge, who cited a 1974 court precedent that said there was "implied consent" among married couples to wiretap each other in their own home. In Thursday's ruling, the 11th Circuit threw out that precedent entirely, noting that many other courts across the country that have considered the issue have ruled the other way. The 11th Circuit's decision applies to all three states within its jurisdiction: Georgia, Florida and Alabama. Elisabeth Glazner will now go to trial against her ex-husband, said her lawyer, Bruce Gordon. [Non-text portions of this message have been removed] 7896 From: George Shaw Date: Tue Oct 21, 2003 3:42pm Subject: Underground locator I have a need to locate the line/presence of underground cable approx 7ft deep in a mixed stone environment that contains lots of metal objects/bolts etc. I can induce a radio frequency along the cable but need to BE 100% (yes 100%) sure that what is induced will not interfere with the telecoms and signalling down the cable cores. What is the best approach/method and equipment out there? Suppliers? There may be fibre cores (with metal tracer) and 30/120 core telecoms cable involved. I need to be able to "trace" if there is a Tee off the main cable. What other method is there other than radio tagging? -- George Shaw MI3GTO " Any Sufficiently Advanced Technology is Indistinguishable from Magic" ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... Fax & Voicemail: +44 (0) 871 242 4946 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7897 From: szabo4381 Date: Wed Oct 22, 2003 5:31am Subject: Re:underground locator Dear Sir, go to :www.accuratelocators.com or www.futuregpr.com for underground 3D imaging devices Regards 7898 From: Lawrence Dillard Date: Wed Oct 22, 2003 7:00am Subject: Engineering Honor The bridge connecting Boston and Cambridge (Massachusetts) via Massachusetts Avenue is commonly know as the Harvard Bridge. When it was built, the state offered to name the bridge for the Cambridge school that could present the best claim for the honor. Harvard submitted an essay detailing its contributions to education in America, concluding that it deserved the honor of having a bridge leading into Cambridge named for the institution. MIT did a structural analysis of the bridge and found it so full of defects that they agreed that it should be named for Harvard. 7899 From: ATSCP Secretary Date: Wed Oct 22, 2003 5:56am Subject: Re: ATSCP To Whom It May Concern: I am very sorry to hear that there is some confusion by the aims or purpose of the ATSCP. Firstly, I would like to state, anyone is more than welcome to contact me with any questions or concerns you have about the operations of the ATSCP, hence please find attached my contact details below. Even though I am unfortunately described as a ìpowerful warningî, I still strongly believe I am reasonably approachable, and I have not ìshotî anyone, yet! I can give you my personal assurance there is no smoke and mirrors involved in the association or in any of the members of its voluntary steering committee. Televisions sensationalising programs and the ATSCP mission could not be further apart. I will address the points that have been stated as concerns in a message posted by a Mr. Tracey, if there are any other concerns or issues anyone feels the need to raise then please forward them to the secretary or any other member of the committee. To show that there is no smoke or mirrors involved I am more than happy to continue to address anyoneís concerns through the TSCM-L list. However, I feel that one should always get facts straight in their mind before placing their mouth or keyboard in gear. Firstly, I think the objectives of the ATSCP are very clear, easily understood and unassailable. Secondly, my activities as a professional going about earning my living are primarily ëDesign and Manufactureí, secondly ëTrainingí and lastly, sweep operations. I do not actively promote the sweep service; it comes to me by request, which I am happy to do, as it provides continues real time input for further development of equipment and training procedures. Thirdly, the members of an association of those in the same profession have an element of competition, by definition. I fail to see that this is negative, and my experience is a spirit of friendly competition and co-operation. I am sure that the board members of organisations such as ASIS have their own businesses or day jobs and it would be frivolous to declare that they operate to their own agenda to the detriment of the reputation of the organisation. Fourthly, a number of ìtop professionalsî have heard about the ATSCP and have telephoned me direct for any clarification, in particular progress in our formation. This was all well received. Many however have taken the wait and see approach, while this is perfectly acceptable, it is not so when an individual takes a critical, unconstructive and inflammatory response to the voluntary work whose intention is to better and develop the industry. Please note however that the existing steering committee is interim until such time that its members ratify a constitution and an executive committee is duly voted in. May I add that I have taken on the role of chairman on a voluntary basis, just as the rest of my committee have, but my responsibility is such that I do not decide association policy, but simple carry out my duties as a representative and chair of the committee. The association constantly strives to better itself, and if anyone feels they would be able to represent the association in a more appropriate manner than currently present then I'm sure the committee would welcome them. And, even if an individualís years of experience don't match those of some of the committee members their contribution and input is still welcome in the association. The whole aim is to gather all the various experienced professionals and increase their skill and competence. Surely no one is beyond bettering him or herself? The aims of the ATSCP are very much in line with the recent debate the list had regarding what gives someone the right to charge $2000+ per day (Robert Motzer, Subject: We Do It To Ourselves, 12th October). This highlighted that only a high degree of self-imposed ethics or external regulation will stop charlatans and false claims. The ATSCP is attempting to pre-empt UK government regulations from imposing unworkable rules on the UK ECM industry which may permit anyone and everyone that passes a criminal record check to conduct TSCM sweeps. The aims of the association are not to make the operations of qualified professionals harder, it is to make the operations of unqualified ìprofessionalsî harder. In the message posted by Mr. Tracey he claims that he was not able to find any "top professionals" that wanted to be associated with the ATSCP. I would really like to know what Mr. Tracey defines as a ìtop professionalî. I wonder if he considers himself a ìtop professionalî? I do think it is very unfair that Mr. Tracey is questioning the professionalism of the members of the committee, this leads me to believe that he does not know them, as rest assured, I can vouch that they are some of the most professional, courteous, honest and honourable people I have had the pleasure of working with. I also know that I am not alone in holding this opinion. Rest assured, this is no "phoney operation" as some have assumed to call it. There is no intention, hidden or otherwise to "grab" business from hard working professionals, completely the opposite! The mission of the association is to try and establish a system of standards and possibly certification to represent the industry with the forthcoming new private security legislation, nowhere on the site is a product or service advertised. It also aims to increase the awareness of this security industry in the corporate world, which could only have positive benefits as we all know it is an often over looked area of security within an organisation. I have added the principles and objectives of the association at the end of my email so that anyone interested can read the objectives of the association. I'm glad Mr. Tracey likes the site, but once again, I feel he is sadly misguided by imagining that the site is all ìsmoke and mirrorsî. If Mr. Tracey would be good enough to pass on his full contact details I would be more than happy to have one of the committee contact him so as to explain and clear any "smoke" obstructing his vision. Finally to all, if you have any questions or doubts, speak to us, false assumptions are not required or necessary. Yours sincerely, Mr. J. Little ATSCP Chairman chairman@t... Tel: +44-(0)1908-677062 7900 From: Hawkspirit Date: Fri Oct 24, 2003 9:35am Subject: Historical Sweep article Here is a historical sweep article that I could only reproduce from a xerox, if anyone has an original copy I would like to get the pictures scanned. Roger When Walls have Ears, Call a Debugging Man (Business Week, October 31, 1964, Industries) http://bugsweeps.com/info/debug_man.html 7901 From: Date: Fri Oct 24, 2003 10:08pm Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: If Granite Island Group sponsors a periodic TSCM "get together" to help focus and improve the industry would you be interested in attending? o Yes o No To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1148865 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 7902 From: Date: Fri Oct 24, 2003 10:15pm Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: Do you have any interest in one of my inexpensive two line TDR (pulse/ping boxes) for use on telephone lines? o Yes o No To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1148867 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 7903 From: secure1939 Date: Wed Oct 22, 2003 10:28pm Subject: Re: ATSCP --- In TSCM-L@yahoogroups.com, "Lee Tracey" wrote: > I am a mite puzzled about this ATSCP organisation that claims to be an independent body to set standards for TSCM professionals. > This new body appears to also be all "smoke and mirrors" and no substance. A powerful warning shot was the announcement that Mr J. Little had been appointed as a "Chairman". > > Mr Little is a trader seeking after and trying to acquire sweeping work in competition with the very professionals he is claiming to represent. It is also significant that I cannot find any of the top professionals in the business who are willing to be associated with this "ATSCP" group. > > This smells to me like a phoney operation being set up to grab business from under the noses of the hard working and professional operatives. > > > Lee Tracey > I think Lee Tracy is right in his assumption. The real problem being this so called association has been set up by people with lots of knowledge of designing websites but absolutely no knowledge of TSCM. Tracy is correct in that none of the major sweep teams have ever heard of the people behind this scheme nor will they even consider membership. They failed to take into account the professional UK TSCM teams are a small, tight knit community who have all know and worked with each other for years and speak frequently. John Little is a manufacturer who also carries out sweeps, Alan Cook I gather came into the business only this year and is now an 'expert' having had one day's training with John Little before setting himself up to carry out TSCM investigations. So what happens when a corporate client is taken in by the site and an enquiry comes in for a major sweep worth say $20,000/$30,000 ? Messrs Little and Cook will allocate the enquiry to their most qualified member ? As the saying goes...'If it looks too good to be true.....' The thought of a prospective 'James Bond' buying his hand held scanner from a spy shop for a couple of hundred dollars then telling clients he is an accredited member of the 'Association for Technical Surveillance Professionals' doesn't bare thinking about. I wouldn't be at all surprised if John Little very quickly came to the conclusion that being closely associated with the ATSCP was, perhaps, not such a good idea after all and quietly withdraws. HK 7904 From: Lee Tracey Date: Thu Oct 23, 2003 4:47am Subject: Mr Little In response to "Mr. J.Little " - to use the title "Mr" as a self description is so bad a gaffe that it makes me cringe with embarrassment on his behalf. Jack Little; Jimmy Little; Johnny Little or His Royal Highness Little, but never "Mr". Who am I? I am just a poor old country boy of 77. Retired and with nothing better to do than cast the odd opinion when I see something that interests me. "Mr" Little states that if I provide my contact details he will admonish me direct. Some clued up member of the security fraternity is "Mr" Little. My contact details were published along with my comments. Some seven other subscribers to the forum emailed me direct and all agreed with me. I have not received any messages in support of the "Mr" Little organisation or his great magnificence The Chairman. Lee Tracey [Non-text portions of this message have been removed] 7905 From: Date: Sun Oct 26, 2003 10:22am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7906 From: Date: Sun Oct 26, 2003 10:22am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7907 From: James M. Atkinson Date: Sun Oct 26, 2003 5:50am Subject: German Arrested for Spying for Bulgaria German Arrested for Spying for Bulgaria Fri Oct 17,11:20 AM ETAdd World - Reuters to My Yahoo! By Mark Trevelyan BERLIN (Reuters) - German authorities have arrested a veteran intelligence agent on suspicion of betraying secrets to a female Bulgarian spy, sources close to the case said on Friday. http://story.news.yahoo.com/news?tmpl=story&u=/nm/20031017/wl_nm/crime_germany_spy_dc_4 They said the 64-year-old agent, a Balkan specialist with Germany's BND foreign intelligence agency, was arrested at his home in Munich on October 9. The federal prosecutors' office in Karlsruhe said in a statement that the unnamed man was suspected of passing secret documents to the woman spy between late 1999 and last month. It did not name the foreign country, but a source with knowledge of the case told Reuters it was Bulgaria. In Sofia, the head of Bulgarian military counter-intelligence said such reports were an attempt to smear the ex-communist country before it joins NATO (news - web sites) next year. "There are thousands of ways to blacken a person... similar schemes could be used to blacken a country as well," Orlin Ivanov told state radio. DIVORCE AND DRINK Justice and security sources said the German agent had long worked in the Balkans in human intelligence gathering and had contact with other foreign intelligence agencies. They said his motives were not known, but he was coping with a number of personal problems, including divorce and alcohol. He was not believed to have had an affair with the Bulgarian agent. "This wasn't a love affair," one source said. "We don't know yet what the motives were or whether he received money." The agent has been interrogated by federal prosecutors and held in investigative custody since October 9 -- an indication that the security breach was serious, sources said. Der Spiegel magazine said in a report in its online edition the German government was outraged over the alleged spying by a friendly nation. As well as joining NATO next year, Bulgaria aims to win entry to the European Union (news - web sites) in 2007. NATO countries protested recently at plans by Bulgaria's prime minister to appoint a former communist spy as his security adviser. The issue was resolved this week when the official, Brigo Asparuhov, turned down the appointment. The German government refused to comment on the alleged German-Bulgarian spy affair. Petio Petev, minister plenipotentiary at the Bulgarian embassy in Berlin, said he was perplexed by reports of the case. "We have excellent relations with Germany, so it's a very strange publication (in) my personal opinion," he told Reuters. Petev said the embassy had not been contacted by German officials, but had been in touch with its own foreign ministry in Sofia to brief it on the reports. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7908 From: mark de boer Date: Sun Oct 26, 2003 7:18am Subject: usefull tool? Hi list, Does any of you know the field strenght detector made by Scanlock, called delta V ECM, is this a usefull tool for locating GSM Cell phone based devices. The specs seem to be oke. http://www.audiotel-international.com/deltav.html M.de Boer RRB security Archimedesstraat 12 3316 AB Dordrecht Netherlands --------------------------------- Do you Yahoo!? Exclusive Video Premiere - Britney Spears [Non-text portions of this message have been removed] 7909 From: Chris Childs Date: Sun Oct 26, 2003 10:49am Subject: New Jersey con artists' anti-terrorist device was filing cabinet: FBI http://www.canada.com/news/story.asp?id=1D0BDFCC-D7A9-4C1E-AFEC-3CBDAB5EEDE6 New Jersey con artists' anti-terrorist device was filing cabinet: FBI Friday, October 24, 2003 NEWARK, N.J. (AP) - A husband and wife have been charged in a scheme to promote a device after Sept. 11, 2001 that was supposed to protect people against terrorist attacks but was actually a yellow filing cabinet with flashing lights and a siren on top, officials said. The device led to a fourfold increase in the stock price of the couple's small company - and allowed defendant Stewart Kaiser to sell shares that were in his mother's name at a substantial profit, said the FBI complaint. Kaiser is charged with stock fraud and misleading investors in the company he founded, R-Tec Technologies. Both he and his wife, Nancy Vitolo, are charged with making false statements to investigators. A message left at a listing for Kaiser was not immediately returned Friday. It was unclear if the couple have lawyers. The complaints were filed Wednesday and delivered to the defendants Thursday, the U.S. attorney's office said. They were not arrested but have a Nov. 12 bail hearing. The complaints outline alleged stock fraud that began when Kaiser solicited investors in January 1998 and ended soon after his news release of Sept. 24, 2001, promoting a device called the C-BAND, for Chemical & Biological Alarm and Neutralization Defense System. A 1998 letter from Kaiser to potential investors said "there is no risk to you or your funds." Investors sending cheques, including one for $100,000, were told to make them payable to Vitolo, who eventually received more than $400,000, the complaints said. Kaiser was listed as the contact on the C-BAND news release, which touted the device as a self-contained unit that would alert people when it detects a "harmful bio or chem-agent" and that could be installed in airports, malls and sports arenas. It would also "isolate and neutralize the harmful agents" by "using a series of high electromagnetic frequency signals." In November 2001, the U.S. Securities and Exchange Commission ordered R-Tec to stop publicizing the device. The stock regulators determined the company had no plans to produce the device and lied about having patents on it. Kaiser was expected to plead last month to two stock-fraud charges and Vitolo to making false statements but the deal fell apart. That day, Kaiser said the filing cabinet was merely a "visual display" to show the SEC. If they had pleaded to the charges, Kaiser, 37, could have faced up to 10 years in prison and a $1-million fine. Vitolo, 40, could have faced up to five years and a $250,000 fine. © Copyright 2003 The Canadian Press [Non-text portions of this message have been removed] 7910 From: mark de boer Date: Sun Oct 26, 2003 1:10pm Subject: useful tool? Hi list, Does any of you know the field strength detector made by Scan lock, called delta V ECM, is this a useful tool for locating GSM Cell phone based devices. The specs seem to be OK. http://www.audiotel-international.com/deltav.html M.de Boer RRB security Archimedesstraat 12 3316 AB Dordrecht Netherlands --------------------------------- Do you Yahoo!? Exclusive Video Premiere - Britney Spears [Non-text portions of this message have been removed] 7911 From: szabo4381 Date: Mon Oct 27, 2003 5:22am Subject: The Magnetron=bug-desinfector ?! Hi to everyone, I was in doubt posting or not this question, but finally here is : did anyone anytime using a magnetrone ( provided from an ordinary microwave owen, about 500W at 2400 MHz) for "painting" the walls, furnitures etc.? This unusual "sweep" have to KO all electronic circuit behind... What is your procedure if you suspect a bug behind (or inside ) the walls ? Do you consider too brutal this metode ?? 7912 From: Shawn Hughes Date: Tue Oct 28, 2003 10:45pm Subject: audio intercept question Hi! Have a question I can't answer, so I thought I'd pose it to the group. A person related me that they were told there was a device one could put 'on their phone line' to prevent a person on the other end from recording them. This person is an investigative journalist, and she was attempting to record an individual (one party state). All she obtained was 'white noise and click-clack' (her description). Her setup worked normally prior to and subsequently, just not this time. Is this a freak incident, or does this sound like something one of you has heard about? How could you pass something past the switch, that doesn't garble heard audio, but defeats a wired recorder? (Holding the recorder to the earpiece, she was subsequently able to obtain her information.) Thanks in advance, Shawn Hughes Lead Instructor Tactical Response, Inc. 7913 From: Hawkspirit Date: Wed Oct 29, 2003 10:31am Subject: Bug sweep Historical articles Here is a new addition the bug sweep historical articles collection. CAN YOU FIND OUT IF YOUR TELEPHONE IS TAPPED? by Fred P. Graham - Esquire, May 1973 http://bugsweeps.com/info/esquire_5-73.html 7914 From: Steve Uhrig Date: Wed Oct 29, 2003 5:04pm Subject: Re:audio intercept question On 28 Oct 2003 at 23:45, Shawn Hughes wrote: > A person related me that they were told there was a device one could > put 'on their phone line' to prevent a person on the other end from > recording them. While there are all sorts of wondrous things being done by people much more capable than me, this sure sounds like snake oil. What is the credibility and technical savvy of the person making this claim? Did they have direct knowledge, or were they simply repeating something they heard from someone who heard it from someone else who heard it from his barber's nephew's vet who has a neighbor who worked for the FBI in 1947 cleaning toilets? Offhand I can't think of any way the above could be accomplished. > This person is an investigative journalist, and she was attempting to > record an individual (one party state). All she obtained was 'white > noise and click-clack' (her description). > Her setup worked normally prior to and subsequently, just not this > time. > Is this a freak incident Probably. Non-technical types tend to be the ones most gullible. The noise could be an open ground or no input path, motor noise, whatever. Click clack could be a worn capstan and pinch roller or worn or cheap tape cassette. > How could you pass something past the switch, that doesn't garble heard > audio, but defeats a wired recorder? I doubt it is possible. If it is possible, I'm quite sure it's not practical especially at a consumer level. Dektor some years ago had phones which were tap resistant (I hate to say tap PROOF). They injected noise from one end onto the telco line which was filtered out by the telco equipment between the originating phone and the other end. The concept sounded weird, but I had several and they worked which really impressed me. You set it up, did a bunch of analog adjustments to match local circumstances, and nothing locally could recover audio close to the instrument equipped with the masker. A butt set was completely dead. Recorder interfaces heard nothing. Amazed me. I got maybe 300 feet of copper past the masked phone while a conversation was in process, and I couldn't recover anything from the copper pair. However, the masking noise appeared in the local handset of the masked phone. It was loud enough to be annoying although the party at the other end still could be heard. The several clients for whom I installed the units on a provisional basis had a serious need for security, but could not deal with the masking noise they heard in their local handset. At the other end, the other side of town, the masked call sounded perfectly normal. Dektor knew how the telco filters would work and what would pass their bandwidth and what wouldn't, and the system worked for its intended purpose -- protecting the originating side from intercept. But from a user point of view, the masking noise was more than they would tolerate even for the security it offered. I'm talking maybe 20-25 years ago for this product from Dektor, long out of business. The masked phones never were popular and may not have been a production item. And I'm not real sure about Dektor's ethics as they sold products which I don't believe were real but sounded good. This last is personal opinion. This is not what you were asking as it worked on the originating end only, but was the closest example I could think of. Remember the telco has a pretty narrow freq response, something like 300-3000 cycles. And essentially everything gets digitized at some point, even if just a local call. You're not on copper for long anymore. Even in the very rural area where I live, fiber comes within a mile of the buildings. In more populated areas, you hit fiber a lot sooner than that. Once you're muxed onto fiber, digital filters will remove a whole lot of noise and garbage. > (Holding the recorder to the earpiece, she was subsequently able to > obtain her information.) I suspect a fluke, or more likely operator error. I wouldn't expect someone deliberately protecting the content of their telephone conversations, especially at a consumer level. 'When you hear hoofbeats, think horses, not zebras.' Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7915 From: Jay Coote Date: Wed Oct 29, 2003 8:28pm Subject: Re: The Magnetron=bug-desinfector ?! My opinion- Many surveillance devices could be immune to being zapped by RF, while other harmless electronic devices may be damaged. If you zap your clients pacemaker, he may not pay. I would be concerned for the safety of the operator or other people in the area- even if away from the main lobe of the antenna.... 500 watts and how much ERP aimed where? Even NLJDs (nonlinear junction detectors) that run at 500 milliwatts require very cautious use. Also, consider the legality of operating a "dirty" 500-watt transmitter and the radio interference issues. Better to use good search techniques, combined with the appropriate TSCM equipment. Jay Los Angeles ---------- Hi to everyone, I was in doubt posting or not this question, but finally here is : did anyone anytime using a magnetrone ( provided from an ordinary microwave owen, about 500W at 2400 MHz) for "painting" the walls, furnitures etc.? This unusual "sweep" have to KO all electronic circuit behind... What is your procedure if you suspect a bug behind (or inside ) the walls ? Do you consider too brutal this metode ?? ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7916 From: Hawkspirit Date: Wed Oct 29, 2003 9:38pm Subject: Historical Bug Sweep Articles Another new addition the Historical Bug Sweep articles. Roger The Ways and Means of Bugging Time, May 28, 1973 http://bugsweeps.com/info/time_5-28-73.html 7917 From: Michael Puchol Date: Tue Oct 28, 2003 3:12pm Subject: Re: The Magnetron=bug-desinfector ?! Well, it may not kill the bug, but it will most likely render you instantly impotent....I remember a case about a HAM radio operator who tried such method and got severe burns and tissue damage from it (I can't remember if he died or not). This nutcase stuck 800 watts off a microwave magnetron into a waveguide, and had no better thought than look into it to make sure it was straight - ouch! Cheers, Mike ----- Original Message ----- From: "szabo4381" To: Sent: Monday, October 27, 2003 12:22 PM Subject: [TSCM-L] The Magnetron=bug-desinfector ?! > Hi to everyone, > I was in doubt posting or not this question, but finally here is : > did anyone anytime using a magnetrone ( provided from an ordinary > microwave owen, about 500W at 2400 MHz) for "painting" the walls, > furnitures etc.? > This unusual "sweep" have to KO all electronic circuit behind... > What is your procedure if you suspect a bug behind (or inside ) the > walls ? > Do you consider too brutal this metode ?? 7918 From: Juke Katan Date: Tue Oct 28, 2003 3:16am Subject: Re; Magnetron Bug Disinfector WOW! That is so dangerously wrong at so many levels, where do I begin. Do you understand how a microwave oven works? Do you know that 500 watts at 2.4 Ghz causes the Hydrogen molecule in H2O (water) to resonate, thereby causing friction which causes heat. How is that supposed to neutralize an eavesdropping device? Are you going to use this magnetron as a peak pulse or cw emitter? How do you propose to shield yourself from the output of the magnetron? Are you going to try to focus the output of the magnetron into an antenna thereby increasing the E.R.P.? How are you going to prevent that 500 watts from being reflected back at you by any metal pipes, screws, nails, electrical outlets, etc. that's buried in the walls? How are you going to prevent the penetration through walls/floors into persons on the other side? And lastly... are you going to seek type approval or certification of your new "intentional radiator" from your Governments Communications Ministry? Whatever you're thinking of doing along those lines, DON'T DO IT!!! Aside from maybe causing a few diodes or transistors to conduct momentarily (which probably won't destroy or burn up anything), you'll just wind up causing a lot of tissue damage in living organisms. --------------------------------- Do you Yahoo!? Exclusive Video Premiere - Britney Spears [Non-text portions of this message have been removed] 7919 From: Gordon Mitchell Date: Tue Oct 28, 2003 11:00pm Subject: Re: audio intercept question Long ago people made some ultrasonic signal generators that had 2 tones. In normal situations they would not be heard; a filter blocked the signal from the phone being used. The theory was that any nonlinear circuitry, e.g., a recorder with an overloaded front end, would be hit with the difference of the 2 tones which was arranged to be in the audio range. Of course the coverage was best near the signal generator and marginal farther away. A friend in a company that used to make these things said that they worked OK but the phone company didn't like the extra stuff on their lines. Gordon (425) 489-0446 Shawn Hughes wrote: > Hi! > > Have a question I can't answer, so I thought I'd pose it to the group. A > person related me that they were told there was a device one could put 'on > their phone line' to prevent a person on the other end from recording them. > > This person is an investigative journalist, and she was attempting to > record an individual (one party state). All she obtained was 'white noise > and click-clack' (her description). > > Her setup worked normally prior to and subsequently, just not this time. > > > Is this a freak incident, or does this sound like something one of you has > heard about? How could you pass something past the switch, that doesn't > garble heard audio, but defeats a wired recorder? (Holding the recorder to > the earpiece, she was subsequently able to obtain her information.) > > > Thanks in advance, > > > Shawn Hughes > Lead Instructor > Tactical Response, Inc. > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 7920 From: Steve Uhrig Date: Thu Oct 30, 2003 7:37am Subject: Happy Birthday to Mike Adler Not sure if he's 66 or 67 this year. Maybe neither. Happy birthday Mikie! 7921 From: James Goldston Date: Thu Oct 30, 2003 9:57am Subject: Personnel Security Needs in Kuwait Greetings Everyone, We're doing a proposal on some work in Kuwait. Can anyone tell me anything about security concerns on doing consulting work there? I'm looking into State Department recommendations (links are below). I've not found that anyone is recommending the use of armed guards, but sometimes that info is held a little more privately. If armed escorts are recommended, does the list have any recommendations or ballpark numbers on what an escort would cost? Consular Information Sheet: http://travel.state.gov/kuwait.html Background Profile: http://www.state.gov/r/pa/ei/bgn/5409.htm US Embassy in Kuwait: http://kuwait.usembassy.gov/ - On April 30, 2003, the U.S. Department of State cancelled the Travel Warning for Kuwait issued on March 16, 2003 and allowed dependents of U.S. Embassy employees and non-emergency Embassy personnel to return to Kuwait. - On March 16, 2003, the U.S. State Department issued a Travel Warning strongly urging Americans in Kuwait to depart the country immediately due to the possibility of war with Iraq. The Department also ordered all dependents of U.S. Embassy employees and all non-emergency personnel at the Embassy to leave Kuwait. Thanks, James =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= James K. Goldston, President, CISSP http://www.sses.net Sword & Shield Enterprise Security, Inc. jgoldston@s... 10301-A Technology Drive http://www.SecureHQ.com Knoxville, TN 37932-3342 865-777-5500, x-501 865-777-5599(fax) PGP fingerprint: 8F28 D6AA 1438 A0D1 807D 38CF DB0C 0847 DE92 17B9 PGP Public Key, see --> http://www.keyserver.net =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 7922 From: Gregory Horton Date: Thu Oct 30, 2003 6:29pm Subject: Re: Bug sweep Historical articles Ouch, that really hurts when 1973 is considered historical. I feel old. Hawkspirit wrote: > Here is a new addition the bug sweep historical articles collection. > > CAN YOU FIND OUT IF YOUR TELEPHONE IS TAPPED? > by Fred P. Graham - Esquire, May 1973 > > http://bugsweeps.com/info/esquire_5-73.html > > > Yahoo! Groups Sponsor > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service > . [Non-text portions of this message have been removed] 7923 From: Chris C Date: Thu Oct 30, 2003 3:52am Subject: RE: Digest Number 1401 Dear M.de Boer Audiotel have a purpose built GSM detector - Signet -which you may be int= erested in but yes the Delta V alarms when a GSM handset is working. email Harry Bell on harry@a... Regards Chris Cauwood >-- Original Message -- >Date: 29 Oct 2003 23:12:53 -0000 >From: TSCM-L@yahoogroups.com >To: TSCM-L@yahoogroups.com >Subject: [TSCM-L] Digest Number 1401 >Reply-To: TSCM-L@yahoogroups.com > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailin > list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffein > alone I set my mind in motion. =================================================== TSKS ------------------------------------------------------------------------ There are 7 messages in this issue. Topics in this digest: 1. usefull too >? From: mark de boer 2. New Jersey con artists' anti-terrorist device was filing cabinet: FBI From: "Chris Childs" 3. useful tool? From: mark de >oer 4. The Magnetron=bug-desinfector ?! From: "szabo4381" 5. audio intercept question From: Shawn Hughes 6. Bug sweep Historical articles > From: Hawkspirit 7. Re:audio intercept question From: "Steve Uhrig" ________________________________________________________________________ ________________________________ >_______________________________________ Message: 1 Date: Sun, 26 Oct 2003 04:18:15 -0800 (PST) From: mark de boer Subject: usefull tool? Hi list, Does any of you know the field strenght detector made by Scan >ock, called delta V ECM, is this a usefull tool for locating GSM Cell phone based devices. The specs seem to be oke. http://www.audiotel-international.com/deltav.html M.de Boer RRB security Archimedesstraat 12 3316 AB Dordrecht Netherlands > --------------------------------- Do you Yahoo!? Exclusive Video Premiere - Britney Spears [Non-text portions of this message have been removed] ________________________________________________________________________ _____________ >__________________________________________________________ Message: 2 Date: Sun, 26 Oct 2003 08:49:45 -0800 From: "Chris Childs" Subject: New Jersey con artists' anti-terrorist device was filing cabinet: FBI > http://www.canada.com/news/story.asp?id=1D0BDFCC-D7A9-4C1E-AFEC-3CBDAB5EEDE6 New Jersey con artists' anti-terrorist device was filing cabinet: FBI Friday, October 24, 2003 NEWARK, N.J. (AP) - A husband and wife have been charged in a scheme to >romote a device after Sept. 11, 2001 that was supposed to protect people against terrorist attacks but was actually a yellow filing cabinet with flashing lights and a siren on top, officials said. The device led to a fourfold increase in the stock >rice of the couple's small company - and allowed defendant Stewart Kaiser to sell shares that were in his mother's name at a substantial profit, said the FBI complaint. Kaiser is charged with stock fraud and misleading investors in the company he f >unded, R-Tec Technologies. Both he and his wife, Nancy Vitolo, are charged with making false statements to investigators. A message left at a listing for Kaiser was not immediately returned Friday. It was unclear if the couple have lawyers. The >complaints were filed Wednesday and delivered to the defendants Thursday, the U.S. attorney's office said. They were not arrested but have a Nov. 12 bail hearing. The complaints outline alleged stock fraud that began when Kaiser solicited investors >in January 1998 and ended soon after his news release of Sept. 24, 2001, promoting a device called the C-BAND, for Chemical & Biological Alarm and Neutralization Defense System. A 1998 letter from Kaiser to potential investors said "there is no ris > to you or your funds." Investors sending cheques, including one for $100,000, were told to make them payable to Vitolo, who eventually received more than $400,000, the complaints said. Kaiser was listed as the contact on the C-BAND news releas >, which touted the device as a self-contained unit that would alert people when it detects a "harmful bio or chem-agent" and that could be installed in airports, malls and sports arenas. It would also "isolate and neutralize the harmful agents" by "usi >g a series of high electromagnetic frequency signals." In November 2001, the U.S. Securities and Exchange Commission ordered R-Tec to stop publicizing the device. The stock regulators determined the company had no plans to produce the device and li >d about having patents on it. Kaiser was expected to plead last month to two stock-fraud charges and Vitolo to making false statements but the deal fell apart. That day, Kaiser said the filing cabinet was merely a "visual display" to show the S >C. If they had pleaded to the charges, Kaiser, 37, could have faced up to 10 years in prison and a $1-million fine. Vitolo, 40, could have faced up to five years and a $250,000 fine. © Copyright 2003 The Canadian Press [Non-text portions of >this message have been removed] ________________________________________________________________________ ________________________________________________________________________ Message: 3 Date: Sun, 26 Oct 2003 11:10:57 -0800 (PST) > From: mark de boer Subject: useful tool? Hi list, Does any of you know the field strength detector made by Scan lock, called delta V ECM, is this a useful tool for locating GSM Cell phone based devices. The specs see > to be OK. http://www.audiotel-international.com/deltav.html M.de Boer RRB security Archimedesstraat 12 3316 AB Dordrecht Netherlands --------------------------------- Do you Yahoo!? Exclusive Video Premiere - Britney Spears [ >on-text portions of this message have been removed] ________________________________________________________________________ ________________________________________________________________________ Message: 4 Date: Mon, 27 Oct 2003 11: >2:58 -0000 From: "szabo4381" Subject: The Magnetron=bug-desinfector ?! Hi to everyone, I was in doubt posting or not this question, but finally here is : did anyone anytime using a magnetrone ( provided from an ordinar > microwave owen, about 500W at 2400 MHz) for "painting" the walls, furnitures etc.? This unusual "sweep" have to KO all electronic circuit behind... What is your procedure if you suspect a bug behind (or inside ) the walls ? Do you consider t >o brutal this metode ?? ________________________________________________________________________ ________________________________________________________________________ Message: 5 Date: Tue, 28 Oct 2003 23:45:05 -0500 From: Shaw > Hughes Subject: audio intercept question Hi! Have a question I can't answer, so I thought I'd pose it to the group. A person related me that they were told there was a device one could put 'on their phone line' to prevent a >erson on the other end from recording them. This person is an investigative journalist, and she was attempting to record an individual (one party state). All she obtained was 'white noise and click-clack' (her description). Her setup worked n >rmally prior to and subsequently, just not this time. Is this a freak incident, or does this sound like something one of you has heard about? How could you pass something past the switch, that doesn't garble heard audio, but defeats a wired re >order? (Holding the recorder to the earpiece, she was subsequently able to obtain her information.) Thanks in advance, Shawn Hughes Lead Instructor Tactical Response, Inc. _____________________________________________________________ >__________ ________________________________________________________________________ Message: 6 Date: Wed, 29 Oct 2003 08:31:42 -0800 From: Hawkspirit Subject: Bug sweep Historical articles Here is a new additi >n the bug sweep historical articles collection. CAN YOU FIND OUT IF YOUR TELEPHONE IS TAPPED? by Fred P. Graham - Esquire, May 1973 http://bugsweeps.com/info/esquire_5-73.html ______________________________________________________________ >_________ ________________________________________________________________________ Message: 7 Date: Wed, 29 Oct 2003 18:04:08 -0500 From: "Steve Uhrig" Subject: Re:audio intercept question On 28 Oct 2003 at 23:45, Sha >n Hughes wrote: > A person related me that they were told there was a device one could > put 'on their phone line' to prevent a person on the other end from > recording them. While there are all sorts of wondrous things being done by people m >ch more capable than me, this sure sounds like snake oil. What is the credibility and technical savvy of the person making this claim? Did they have direct knowledge, or were they simply repeating something they heard from someone who heard it fr >m someone else who heard it from his barber's nephew's vet who has a neighbor who worked for the FBI in 1947 cleaning toilets? Offhand I can't think of any way the above could be accomplished. > This person is an investigative journalist, and >she was attempting to > record an individual (one party state). All she obtained was 'white > noise and click-clack' (her description). > Her setup worked normally prior to and subsequently, just not this > time. > Is this a freak incident >robably. Non-technical types tend to be the ones most gullible. The noise could be an open ground or no input path, motor noise, whatever. Click clack could be a worn capstan and pinch roller or worn or cheap tape cassette. > How could you pa >s something past the switch, that doesn't garble heard > audio, but defeats a wired recorder? I doubt it is possible. If it is possible, I'm quite sure it's not practical especially at a consumer level. Dektor some years ago had phones which >ere tap resistant (I hate to say tap PROOF). They injected noise from one end onto the telco line which was filtered out by the telco equipment between the originating phone and the other end. The concept sounded weird, but I had several and t >ey worked which really impressed me. You set it up, did a bunch of analog adjustments to match local circumstances, and nothing locally could recover audio close to the instrument equipped with the masker. A butt set was completely dead. Record >r interfaces heard nothing. Amazed me. I got maybe 300 feet of copper past the masked phone while a conversation was in process, and I couldn't recover anything from the copper pair. However, the masking noise appeared in the local handset of th > masked phone. It was loud enough to be annoying although the party at the other end still could be heard. The several clients for whom I installed the units on a provisional basis had a serious need for security, but could not deal with the ma >king noise they heard in their local handset. At the other end, the other side of town, the masked call sounded perfectly normal. Dektor knew how the telco filters would work and what would pass their bandwidth and what wouldn't, and the syste > worked for its intended purpose -- protecting the originating side from intercept. But from a user point of view, the masking noise was more than they would tolerate even for the security it offered. I'm talking maybe 20-25 years ago for this >product from Dektor, long out of business. The masked phones never were popular and may not have been a production item. And I'm not real sure about Dektor's ethics as they sold products which I don't believe were real but sounded good. This la >t is personal opinion. This is not what you were asking as it worked on the originating end only, but was the closest example I could think of. Remember the telco has a pretty narrow freq response, something like 300-3000 cycles. And essentia >ly everything gets digitized at some point, even if just a local call. You're not on copper for long anymore. Even in the very rural area where I live, fiber comes within a mile of the buildings. In more populated areas, you hit fiber a lot soo >er than that. Once you're muxed onto fiber, digital filters will remove a whole lot of noise and garbage. > (Holding the recorder to the earpiece, she was subsequently able to > obtain her information.) I suspect a fluke, or more likely opera >or error. I wouldn't expect someone deliberately protecting the content of their telephone conversations, especially at a consumer level. 'When you hear hoofbeats, think horses, not zebras.' Steve *************************************** >*************************** Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" * >***************************************************************** ________________________________________________________________________ ________________________________________________________________________ Your use of Yahoo! Groups >is subject to http://docs.yahoo.com/info/terms/ Chris Cauwood Tel +44 (0) 1780 767364 Fax +44 1780 763164 Mob +44 771 421 5490 From: savanted1 Date: Wed Oct 20, 2004 9:36am Subject: DOJ Creates Organized Crime Drug Enforcement Task Force Fusion Center System, Requests Exemption the Criminal Division (CRM) of the Department of Justice (DOJ) has proposed to amend its Privacy Act regulations to add exemptions for its newly-created Organized Crime Drug Enforcement Task Force Fusion Center System, which covers the records maintained by the Organized Crime Drug Enforcement Task Force Fusion Center, Executive Office for the Organized Crime Drug Enforcement Task Force, Criminal Division. Comments due: 17 November 2004. http://edocket.access.gpo.gov/2004/04-23243.htm 9926 From: Tech Sec Lab Date: Wed Oct 20, 2004 6:07pm Subject: RE: Printers betray document secrets Any ideas how this works exactly, how do they extract the "watermark" etc. Regards ************* Message: 2 Date: Tue, 19 Oct 2004 17:15:37 -0400 From: kondrak Subject: Re: Printers betray document secrets What theyre NOT telling you is that top notch quality color printers, the type used to forge bank notes, have had a signature built into them for years now...its a small matter to trace this back.... At 09:54 10/19/2004, you wrote: 9927 From: James M. Atkinson Date: Wed Oct 20, 2004 8:40pm Subject: RE: Printers betray document secrets In every modern printer there is a PAL or EPROM (usually a PAL) that has a serial number that is specific to a particular printer. Modern laser printers and inkjet printers imbed this serial number into each inch of the printed document, and when the image is less than a square inch the image appears only once. This imbedding can be as simple as the serial number being printed at 1/600th of an inch where the digits at 6-8 pixels high and can be read with the eye by using a microscope. Other methods of imbedding the images includes slightly modulating the laser of a laser printer so that the serial number appears thousands, tens of thousands, or hundreds of thousands of times on every page printed. Modern digital copy machines, both color and black and white, also do this so that a document can be traced back to a specific printer, but many copiers also imbed a date and time code as well along with a copy number, account codes, and other relevant data to help track down misuse. With a few minor modifications the printer or copier can be made to output essentially any message of data, or made out output nothing at all. This is also a method that spies have use on copy machines and laserprinters to record, and then covertly extract the stored material by imbedding it into a "release and collection" document where the captured data appears as a small amount of noise, or as a virtually invisible copy. -jma . At 07:07 PM 10/20/2004, Tech Sec Lab wrote: >Any ideas how this works exactly, how do they extract the "watermark" etc. > >Regards > > >************* > >Message: 2 > Date: Tue, 19 Oct 2004 17:15:37 -0400 > From: kondrak >Subject: Re: Printers betray document secrets > >What theyre NOT telling you is that top notch quality color printers, the >type used to forge bank notes, have had a signature built into them for >years now...its a small matter to trace this back.... > >At 09:54 10/19/2004, you wrote: ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9928 From: Does it matter Date: Wed Oct 20, 2004 6:32pm Subject: Re: Printers betray document secrets I went up against Prof. Delp about a year or so ago in court and thought that I would email him and ask about this. His response was basically that it isn't software and isn't available. From what I gather right now it is just in their lab and there are no commercial intentions. Best wishes, Darren --- In TSCM-L@yahoogroups.com, "Tech Sec Lab" wrote: > Any ideas how this works exactly, how do they extract the "watermark" etc. > > Regards > > > ************* > > Message: 2 > Date: Tue, 19 Oct 2004 17:15:37 -0400 > From: kondrak > Subject: Re: Printers betray document secrets > > What theyre NOT telling you is that top notch quality color printers, the > type used to forge bank notes, have had a signature built into them for > years now...its a small matter to trace this back.... > > At 09:54 10/19/2004, you wrote: 9929 From: Gregory Hicks Date: Wed Oct 20, 2004 9:18pm Subject: RE: Printers betray document secrets > To: TSCM-L@yahoogroups.com > From: "James M. Atkinson" > Date: Wed, 20 Oct 2004 21:40:40 -0400 > Subject: RE: [TSCM-L] Printers betray document secrets > > > > In every modern printer there is a PAL or EPROM (usually a PAL) that has a > serial number that is specific to a particular printer. Modern laser > printers and inkjet printers imbed this serial number into each inch of the > printed document, and when the image is less than a square inch the image > appears only once. Do you have a reference for this? I've never heard of this before... Thanks for the info though! > > This imbedding can be as simple as the serial number being printed at > 1/600th of an inch where the digits at 6-8 pixels high and can be read with > the eye by using a microscope. Other methods of imbedding the images > includes slightly modulating the laser of a laser printer so that the > serial number appears thousands, tens of thousands, or hundreds of > thousands of times on every page printed. Modern digital copy machines, > both color and black and white, also do this so that a document can be > traced back to a specific printer, but many copiers also imbed a date and > time code as well along with a copy number, account codes, and other > relevant data to help track down misuse. > > With a few minor modifications the printer or copier can be made to output > essentially any message of data, or made out output nothing at all. > > This is also a method that spies have use on copy machines and > laserprinters to record, and then covertly extract the stored material by > imbedding it into a "release and collection" document where the captured > data appears as a small amount of noise, or as a virtually invisible copy. > > -jma > > > > . > > > > > > > > At 07:07 PM 10/20/2004, Tech Sec Lab wrote: > > >Any ideas how this works exactly, how do they extract the "watermark" etc. > > > >Regards > > > > > >************* > > > >Message: 2 > > Date: Tue, 19 Oct 2004 17:15:37 -0400 > > From: kondrak > >Subject: Re: Printers betray document secrets > > > >What theyre NOT telling you is that top notch quality color printers, the > >type used to forge bank notes, have had a signature built into them for > >years now...its a small matter to trace this back.... > > > >At 09:54 10/19/2004, you wrote: > > > ------------------------------------------------------------------------------- ---------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ------------------------------------------------------------------------------- ---------------------- > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ------------------------------------------------------------------------------- ---------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ------------------------------------------------------------------------------- ---------------------- > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > --------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 | Fax: 408.894.3479 San Jose, CA 95134 | Internet: ghicks@c... I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton 9930 From: satcommunitfive Date: Wed Oct 20, 2004 7:26pm Subject: Re: Cell Phone Ping I heard you can use SMS and a small java-type program to read what cell the persons phone is displaying at the time -this only gives Kms resolution tho [GSM system in OZ] M 9931 From: fjansgmxnet Date: Thu Oct 21, 2004 9:24am Subject: Re: Cell Phone Ping Hello, have anybody experience in sending GSM phones stealth pings (SMS messages which will not being displayed to the GSM phone user) and to perfrom radio direction findings on the used underband frequencies in a certain area to !confirm! an expected position of a GSM phone? (Is the target is really in that house? ;-) For GSM networks which are not using frequency hopping this should be possible with a fast (bandwidth modificated) scanner. Encryption would not be a problem, because we could send some very short or very long stealth SMS which will distinguish from normal traffic. Would it be possible to confirm an expected position of a GSM phone in a greater area (local area or radio cell) by monitoring the transmitter messages of a radio base station? If we send two stealth SMS to the GSM phone with a distance of 30 seconds (within the same GSM network to remain timing), we would see two paging requests to the same temporary subscriber identifier with a distance of 30 seconds, if the target GSM phone is in our local area, correct? If we see two paging request with answers, we would know that the target GSM phone is in the our cell (on the same frequency), correct? Of cause, if the cell is using more than one broadcast channel, we could mis the answers of the GSM phone. Regards, Frank 9932 From: kondrak Date: Thu Oct 21, 2004 4:55pm Subject: RE: Printers betray document secrets No "I" dont, but they did a program on it on TLC I believe a year or more ago, and showed them (The SS) recovering the serial number of the photocopier from the bill. Apparently theres a matrix they overlay and the number can be extracted somehow. Not my field of expertise...sri Apparently the real problem is getting the proper quality paper, and in this regard, only governments can or are supposed to be able to obtain. I guess they can tell by the composition of the paper as well. AI know they mentioned a LOT of the counterfeit was originating in the mideast, pointing to state-sponsored counterfeiting. Perhaps one of the reasons they're now using the Euro so much. At 19:07 10/20/2004, you wrote: >Any ideas how this works exactly, how do they extract the "watermark" etc. > >Regards > > >************* > >Message: 2 > Date: Tue, 19 Oct 2004 17:15:37 -0400 > From: kondrak >Subject: Re: Printers betray document secrets > >What theyre NOT telling you is that top notch quality color printers, the >type used to forge bank notes, have had a signature built into them for >years now...its a small matter to trace this back.... > >At 09:54 10/19/2004, you wrote: > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9933 From: James M. Atkinson Date: Thu Oct 21, 2004 7:36pm Subject: RE: Printers betray document secrets The currency paper is actually quite easy to obtain, the color rag chit easy to fake, and the ink is no big deal, but there is a finish to the bills that requires special chemicals to seal the paper and ink and applying this sealant and burnishing it is a bit tricky. Also, the process to actually print the bills results in a "bruise" on the paper that is extremely difficult to reproduce without multiple engraved plates and printing press used to engraved printing. Poor quality copies are possible using off-set lithography using quality cotton bond paper of the appropriate weight and finish, but anything of any quality requires an engraving press. Any first year forensic student can trace a paper sample to a specific brand and type of paper, same with the inks and finishing chemicals and procedures. It is also easy to match a counterfeit to a specific offset plate, but only if the plate is captured before being destroyed (a clever counterfeiter destroys all plates before passing bills). It's not as easy to trace a counterfeit to a specific printing press provided that the counterfeiter keeps their rollers clean. Essentially, if the press operator keeps his equipment clean, and destroys the plates after each batch it is virtually impossible to prove the counterfeit was made by either plate or press. Counterfeiters who have eluded authorities for extended periods go to great effort to cut up and burn their scrap paper and anything that they don't actually intend to pass such as bad copies. They also go to great effort to keep their inks and paper away from the press area until just before they intend to make a press run. A skilled counterfeiter can, and has duplicated a dollar bill that was of such good quality that over an entire team of SS forensic examiners could not detect that it was a fake, even after being shown by the counterfeiter how he did it for so long without being caught. -jma At 05:55 PM 10/21/2004, kondrak wrote: >No "I" dont, but they did a program on it on TLC I believe a year or more >ago, and showed them (The SS) recovering the serial number of the >photocopier from the bill. Apparently theres a matrix they overlay and the >number can be extracted somehow. >Not my field of expertise...sri >Apparently the real problem is getting the proper quality paper, and in >this regard, only governments can or are supposed to be able to obtain. I >guess they can tell by the composition of the paper as well. AI know they >mentioned a LOT of the counterfeit was originating in the mideast, pointing >to state-sponsored counterfeiting. Perhaps one of the reasons they're now >using the Euro so much. > >At 19:07 10/20/2004, you wrote: > > >Any ideas how this works exactly, how do they extract the "watermark" etc. > > > >Regards ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9934 From: kondrak Date: Thu Oct 21, 2004 11:08pm Subject: RE: Printers betray document secrets No wonder its such a big problem... At 20:36 10/21/2004, you wrote: >The currency paper is actually quite easy to obtain, the color rag chit >easy to fake, and the ink is no big deal, but there is a finish to the >bills that requires special chemicals to seal the paper and ink and >applying this sealant and burnishing it is a bit tricky. Also, the process >to actually print the bills results in a "bruise" on the paper that is >extremely difficult to reproduce without multiple engraved plates and >printing press used to engraved printing. Poor quality copies are possible >using off-set lithography using quality cotton bond paper of the >appropriate weight and finish, but anything of any quality requires an >engraving press. > >Any first year forensic student can trace a paper sample to a specific >brand and type of paper, same with the inks and finishing chemicals and >procedures. It is also easy to match a counterfeit to a specific offset >plate, but only if the plate is captured before being destroyed (a clever >counterfeiter destroys all plates before passing bills). It's not as easy >to trace a counterfeit to a specific printing press provided that the >counterfeiter keeps their rollers clean. Essentially, if the press operator >keeps his equipment clean, and destroys the plates after each batch it is >virtually impossible to prove the counterfeit was made by either plate or >press. > >Counterfeiters who have eluded authorities for extended periods go to great >effort to cut up and burn their scrap paper and anything that they don't >actually intend to pass such as bad copies. They also go to great effort to >keep their inks and paper away from the press area until just before they >intend to make a press run. > >A skilled counterfeiter can, and has duplicated a dollar bill that was of >such good quality that over an entire team of SS forensic examiners could >not detect that it was a fake, even after being shown by the counterfeiter >how he did it for so long without being caught. > >-jma > > > >At 05:55 PM 10/21/2004, kondrak wrote: > > >No "I" dont, but they did a program on it on TLC I believe a year or more > >ago, and showed them (The SS) recovering the serial number of the > >photocopier from the bill. Apparently theres a matrix they overlay and the > >number can be extracted somehow. > >Not my field of expertise...sri > >Apparently the real problem is getting the proper quality paper, and in > >this regard, only governments can or are supposed to be able to obtain. I > >guess they can tell by the composition of the paper as well. AI know they > >mentioned a LOT of the counterfeit was originating in the mideast, pointing > >to state-sponsored counterfeiting. Perhaps one of the reasons they're now > >using the Euro so much. > > > >At 19:07 10/20/2004, you wrote: > > > > >Any ideas how this works exactly, how do they extract the "watermark" etc. > > > > > >Regards > > >----------------------------------------------------------------------------------------------------- > > >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >----------------------------------------------------------------------------------------------------- > > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >----------------------------------------------------------------------------------------------------- > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9935 From: Hawkspirit Date: Thu Oct 21, 2004 11:15pm Subject: Cell Phone Ping The target cell phone when on will always be monitoring the control channel at the cell site in which it is located for an incoming call or text message. When that incoming page goes out, the cell phone handshakes with the site and is assigned a send and receive channel frequency. One of several hundred possible. All this coded in TDMA, CDMA, or GSM. So you gonna find it with a scanner? Roger Date: Thu, 21 Oct 2004 14:24:45 -0000 From: "fjansgmxnet" Subject: Re: Cell Phone Ping Hello, have anybody experience in sending GSM phones stealth pings (SMS messages which will not being displayed to the GSM phone user) and to perfrom radio direction findings on the used underband frequencies in a certain area to !confirm! an expected position of a GSM phone? (Is the target is really in that house? ;-) For GSM networks which are not using frequency hopping this should be possible with a fast (bandwidth modificated) scanner. Encryption would not be a problem, because we could send some very short or very long stealth SMS which will distinguish from normal traffic. Would it be possible to confirm an expected position of a GSM phone in a greater area (local area or radio cell) by monitoring the transmitter messages of a radio base station? If we send two stealth SMS to the GSM phone with a distance of 30 seconds (within the same GSM network to remain timing), we would see two paging requests to the same temporary subscriber identifier with a distance of 30 seconds, if the target GSM phone is in our local area, correct? If we see two paging request with answers, we would know that the target GSM phone is in the our cell (on the same frequency), correct? Of cause, if the cell is using more than one broadcast channel, we could mis the answers of the GSM phone. Regards, Frank [Non-text portions of this message have been removed] 9936 From: Does it matter Date: Thu Oct 21, 2004 5:41pm Subject: Re: Printers betray document secrets Here is the response from Delp. "This statement is not correct." -- "> In every modern printer there is a PAL or EPROM (usually a PAL) that > has a serial number that is specific to a particular printer. Modern > laser printers and inkjet printers imbed this serial number into each > inch of the printed document, and when the image is less than a square > inch the image appears only once." --- In TSCM-L@yahoogroups.com, Gregory Hicks wrote: > > > > To: TSCM-L@yahoogroups.com > > From: "James M. Atkinson" > > Date: Wed, 20 Oct 2004 21:40:40 -0400 > > Subject: RE: [TSCM-L] Printers betray document secrets > > > > > > > > In every modern printer there is a PAL or EPROM (usually a PAL) that has a > > serial number that is specific to a particular printer. Modern laser > > printers and inkjet printers imbed this serial number into each inch of the > > printed document, and when the image is less than a square inch the image > > appears only once. > > Do you have a reference for this? I've never heard of this before... > > Thanks for the info though! > > > > > This imbedding can be as simple as the serial number being printed at > > 1/600th of an inch where the digits at 6-8 pixels high and can be read with > > the eye by using a microscope. Other methods of imbedding the images > > includes slightly modulating the laser of a laser printer so that the > > serial number appears thousands, tens of thousands, or hundreds of > > thousands of times on every page printed. Modern digital copy machines, > > both color and black and white, also do this so that a document can be > > traced back to a specific printer, but many copiers also imbed a date and > > time code as well along with a copy number, account codes, and other > > relevant data to help track down misuse. > > > > With a few minor modifications the printer or copier can be made to output > > essentially any message of data, or made out output nothing at all. > > > > This is also a method that spies have use on copy machines and > > laserprinters to record, and then covertly extract the stored material by > > imbedding it into a "release and collection" document where the captured > > data appears as a small amount of noise, or as a virtually invisible copy. > > > > -jma > > > > > > > > . > > > > > > > > > > > > > > > > At 07:07 PM 10/20/2004, Tech Sec Lab wrote: > > > > >Any ideas how this works exactly, how do they extract the "watermark" etc. > > > > > >Regards > > > > > > > > >************* > > > > > >Message: 2 > > > Date: Tue, 19 Oct 2004 17:15:37 -0400 > > > From: kondrak > > >Subject: Re: Printers betray document secrets > > > > > >What theyre NOT telling you is that top notch quality color printers, the > > >type used to forge bank notes, have had a signature built into them for > > >years now...its a small matter to trace this back.... > > > > > >At 09:54 10/19/2004, you wrote: > > > > > > > ------------------------------------------------------------------- ------------ > ---------------------- > > > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > > > ------------------------------------------------------------------- ------------ > ---------------------- > > > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > > > ------------------------------------------------------------------- ------------ > ---------------------- > > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > > > ------------------------------------------------------------------- ------------ > ---------------------- > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > ------------------------------------------------------------------- -- > Gregory Hicks | Principal Systems Engineer > Cadence Design Systems | Direct: 408.576.3609 > 555 River Oaks Pkwy M/S 6B1 | Fax: 408.894.3479 > San Jose, CA 95134 | Internet: ghicks@c... > > I am perfectly capable of learning from my mistakes. I will surely > learn a great deal today. > > "A democracy is a sheep and two wolves deciding on what to have for > lunch. Freedom is a well armed sheep contesting the results of the > decision." - Benjamin Franklin > > "The best we can hope for concerning the people at large is that they > be properly armed." --Alexander Hamilton 9937 From: Dave Emery Date: Thu Oct 21, 2004 9:52pm Subject: Re: Printers betray document secrets On Wed, Oct 20, 2004 at 07:18:12PM -0700, Gregory Hicks wrote: > > > > > To: TSCM-L@yahoogroups.com > > From: "James M. Atkinson" > > Date: Wed, 20 Oct 2004 21:40:40 -0400 > > Subject: RE: [TSCM-L] Printers betray document secrets > > > > > > > > In every modern printer there is a PAL or EPROM (usually a PAL) that has a > > serial number that is specific to a particular printer. Modern laser > > printers and inkjet printers imbed this serial number into each inch of the > > printed document, and when the image is less than a square inch the image > > appears only once. > > Do you have a reference for this? I've never heard of this before... > > Thanks for the info though! This sounds a bit like an urban legend to me. For one thing, one would not normally encode serial numbers in a PAL (a programmable logic device) but rather some form of PROM (programmable read only memory). There is a big difference - though in fact one could encode some bits (many in modern parts) into a PAL, which would normally be used to implement some part of the digital logic of the printer hardware rather than for storage of serial numbers or other information. PALs usually cost more than PROMs, however, and therefore most ESN type applications involve some sort of PROM (sometimes a serial I2C type...). In general the manufacturing costs of incorporating custom serial numbers (or any other custom information per printer which is different for each unit produced) into a HIGHLY cost sensitive product like a computer printer is truly a killer. I am sure that if such is included, it is only done reluctantly under duress because of the added steps of a customizing and serial number tracking step in production. But all of the heavy lifting for encoding serial numbers into the printer output is invariably actually contained in the printer firmware. That is if there is such a feature there at all. I should imagine that someone with talent and time, and almost infinite patience could extract the algorithms used from the firmware by disassembling and reverse engineering it. This might be easier for the generation of printers that used Windows drivers to actually generate the patterns of bits for the characters printed rather than doing in firmware inside the printer as disassembly of the drivers might be quicker than firmware for a microprocessor with special hardware hooks for printing. Of course I know that CDROM and DVDROM drives have been forced to include serial numbers in all the DVDs and CDROMs they burn, so such traceability HAS been implemented. It is easier on a DVD or CDROM as there are header fields provided for this exact purpose, watermarking laser or inject output and successfully recovering a serial number is a much harder problem in detection theory... as random physical defects in the paper and printing process would tend to eat information encoded in individual pixels. And of course it is rather well known that high resolution color copiers and printers have been forced to refuse to print images that contain certain magic patterns that mark them as currency (money) or other specialized documents. Someone determined the magic pattern used, in fact, for at least one of these systems. -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass 02493 9938 From: Michael Puchol Date: Fri Oct 22, 2004 1:53am Subject: Re: Cell Phone Ping Very rightly so - and, I have never seen anything such as "hidden" or "secret" SMS messages, the only such things are configuration messages, which may ONLY be sent by the operator to a subscriber, or an authorised third party, or registration requests used for LBS, which again, can only be sent by the network. The only chance of doing this would be to use special unicode characters in the message, but I believe the user would still be alerted to an incoming SMS. Regards, Mike ----- Original Message ----- From: "Hawkspirit" To: Sent: Friday, October 22, 2004 6:15 AM Subject: [TSCM-L] Cell Phone Ping > > > > The target cell phone when on will always be monitoring the control channel > at the cell site in which it is located for an incoming call or text > message. When that incoming page goes out, the cell phone handshakes with > the site and is assigned a send and receive channel frequency. One of > several hundred possible. All this coded in TDMA, CDMA, or GSM. So you gonna > find it with a scanner? > > Roger > > > > Date: Thu, 21 Oct 2004 14:24:45 -0000 > > From: "fjansgmxnet" > > Subject: Re: Cell Phone Ping > > > > > > > > Hello, > > > > have anybody experience in sending GSM phones stealth pings (SMS > > messages which will not being displayed to the GSM phone user) and to > > perfrom radio direction findings on the used underband frequencies in > > a certain area to !confirm! an expected position of a GSM phone? (Is > > the target is really in that house? ;-) > > > > For GSM networks which are not using frequency hopping this should be > > possible with a fast (bandwidth modificated) scanner. Encryption > > would not be a problem, because we could send some very short or very > > long stealth SMS which will distinguish from normal traffic. > > > > Would it be possible to confirm an expected position of a GSM phone > > in a greater area (local area or radio cell) by monitoring the > > transmitter messages of a radio base station? If we send two stealth > > SMS to the GSM phone with a distance of 30 seconds (within the same > > GSM network to remain timing), we would see two paging requests to > > the same temporary subscriber identifier with a distance of 30 > > seconds, if the target GSM phone is in our local area, correct? If we > > see two paging request with answers, we would know that the target > > GSM phone is in the our cell (on the same frequency), correct? Of > > cause, if the cell is using more than one broadcast channel, we could > > mis the answers of the GSM phone. > > > > Regards, > > Frank > > > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 9939 From: J. Molay Date: Fri Oct 22, 2004 3:03am Subject: Re[2]: Cell Phone Ping On Fri, 22 Oct 2004 08:53:34 +0200 "Michael Puchol" wrote: > > Very rightly so - and, I have never seen anything such as "hidden" or > "secret" SMS messages, the only such things are configuration messages, > which may ONLY be sent by the operator to a subscriber, or an authorised > third party, or registration requests used for LBS, which again, can only be > sent by the network. The only chance of doing this would be to use special > unicode characters in the message, but I believe the user would still be > alerted to an incoming SMS. > > Regards, > > Mike Hi, Mike (Al final dandole a google encontre mas datos despues de mandarte el mail) -------- PING SMS Protocol Identifier (PID) is set to Type 0 (64) -> SMS is not displayed Sender receives (if requested) a status report -> so the sender will know, when the recipient switches on the device Exceptions: newer Ericsson phones display even this kind of SMS by sending the SMS to Port 49999 (WAP Settings) even ericsson phones do not display the message (except you run a network monitor) ----------- Saludos. 9940 From: Lars Nielsen Date: Fri Oct 22, 2004 4:34am Subject: US company allowed to implant chips with medical information in humans http://news.bbc.co.uk/1/hi/magazine/3742684.stm 9941 From: Howie Goodell Date: Fri Oct 22, 2004 8:48am Subject: DDOS attacks on Election Day? Hi -- The then-chairman of the Republican Party in my state pled guilty in July to hiring a telemarketing company to disrupt the New Hampshire Democratic Party and Manchester Firefighter's Union phone banks on Election Day in 2002: http://www.boston.com/news/local/new_hampshire/articles/2004/07/27/former_gop_director_to_plead_guilty_in_phone_jamming_case/ http://www.politicsnj.com/kornacki021003_Raymond.htm http://www.findarticles.com/p/articles/mi_m3815/is_4_15/ai_98442090 I would not be surprised if someone in Karl Rove's dirty-tricks operation has organized similar phone bank disruption, but even more likely DDOS assaults on the Democratic Party, MoveOn, etc. servers for Election Day. (Or possibly vice-versa, but I'd put that in the "Man Bites Dog!" category.) I'm a longtime programmer but no specific security experience. Any suggestions I could pass on to the folks in charge of these operations? Howie Goodell Salem, NH -- Howie Goodell hgoodell@c... http://goodL.org Hardware control Info Visualization User interface UMass Lowell Computer Science Doctoral Candidate 9942 From: contranl Date: Fri Oct 22, 2004 1:11pm Subject: Re: Cell Phone Ping . What receiver will you be using to RDF a GSM ? My experience is that a standard receiver(AM/NFM/WFM/SSB)with non- specific Gsm qualities will not receive such a phone over distances more then let's say 350 meters max Partly this is caused by the fact that normal receivers are not optimised for Gsm signal-signatures so the effective sensitivity is very low Also 800 mhz frequencies suffer a lot from blocking by buildings etc...they also reflect on those buildings wich makes a real RDF that shows a direction (doppler etc) unworkable ..unless you are in a wide open area. I guess just a simple signal-strength reading will work just as good. I have tested the receive-able range on a standard analog receiver and a Sagem Gsm-phone that can be put into a mode where it will transmitt a constant carrier on a single channel. and the range was disappointing...i assume that range will improve when you use a dedicated receiver that can somehow synchronise to the GSM signal Ofcourse it could be that you want to use your system for very close encounters only ? If you have a good way of being able to track Gsm's over a long distance then that way might also be usefull for a tracking system where the use of silent sms would not be necessary since the tracker would be your own and you would have the ringer disabled ofcourse. To obtain a rough position you could call such a tracker trough a LBS provider at 10 $cent per call the position obtained from such a provider will not be accurate enough to actually find the object with the tracker on it...the last few meters you could track using sms-pinging and a good Gsm receiver ...you could even modify the Gsm- phone (tracker)to transmit continiously on a fixed channel(test-mode) the addition of a small pic processor could take care of that. I have a link to a little piece of software called "SMS-spoof" it's a few years old now...so i have no idea if it still works it allows you to send an SMS and have the receiver think it was send by someone else than you ..infact you can put in any sender number you want...i am not shure if this still works but i could imagine that you could use it for your trick ,i guess you have to modify it a little ,i would be very interested to know if this software is of any use for that. It is very well possible to send a so called "silent SMS" wich will not show up or alert the receiver... as far as i know such a message contains a "modified header" This trick is for example used by the police in Germany in order to force a location update to get a current Cell-ID wich they may not have if the phone was not active recently... i don't know if they can do that themselves without the assistance from the network operator...but i have a feeling they can..ofcourse they then have to obtain the location update from the network owner. The link to "SMS spoof" is on my page here it's for Palm OS http://www.tetrascanner.com/gsm-scanners.html -------------- A German article on the German police using "Silent SMS" http://www.heise.de/mobil/artikel/50922 -------------- Smart SMS 1.01 software wich includes "stealth ping"...i have not tried this one and would like to know if it works. (page not available at the moment) http://www.freeware-download.com/downloaddetails/2484.html http://www.cracks4u.com/?download/us/pc_ss101.zip.html I have not downloaded these yet ...funny websites ! -------------- SMS Blaster can send 15 SMS p/sec ..sourcecode available. http://www.aspsms.com/download/smsblaster/ -------------- SMS it ... said to be usable for "silent sms" ? http://www.freeware-download.com/cgi-bin/detail.cgi?ID=368 -------------- Tetrascanner 9943 From: contranl Date: Fri Oct 22, 2004 1:37pm Subject: Re: Cell Phone Ping . I can understand what he is trying to acomplish he wants to sent SMS messages in a specific pattern and then look at the frequencyband that the phone uses By looking for the specific replies from that phone he wants to recognize it and pin it down In practice i think that is very complicated and undo-able unless you have a designated Gsm RDF device like they are probably made by Rohde&Schwarz at considerable $$$$ I could imagine that in such a device you can input the subscriber number that you want to track down...and just follow directions I could also imagine that such a machine would have a link to the network too. Back to the homebrew Gsm RDF-er Even if you narrow it down to just GSM, you dont know in wich band they are ...900/1800 ? ›ou cant predict the channel so you have to scan all frequencies wich is a total of 50 mhz at least That will take a long time specially if you have to halt at every signal you receive in order to determine if this is the one you are looking for. Things get a little easier if you know the network it uses and if you have a good knowledge of the locations and frequencies that are in use at the phones current position If you can solve all that ... hats off !! If the phone has built-in Bluetooth then you could use a Bluesniffer wich is available..such a device could scan and detect specific Bluetooth adresses in no time, ofcourse you will need to know the specific bluetooth adress of your target phone first...just sit close to the target with your bluetooth-sniffer and scan all bluetooth phones around use a low gain antenna ... you will have the Bluetooth adress in 10 seconds. including anything else stored in the phone. Tetrascanner 9944 From: Date: Fri Oct 22, 2004 1:51pm Subject: Re: Re: Cell Phone Ping Would be easier just to get close to the user, then use something like Redfang to grab a bonded Bluetooth association - and use SMS to subscribe the phone to a LBS tracking service. This month's Popular Science has a mod for a USB Bluetooth card that gives you a mile range on Bluetooth. ...... Original Message ....... On Fri, 22 Oct 2004 18:11:28 -0000 "contranl" wrote: > > >.. > >What receiver will you be using to RDF a GSM ? > >My experience is that a standard receiver(AM/NFM/WFM/SSB)with non- >specific Gsm qualities will not receive such a phone over distances >more then let's say 350 meters max > >Partly this is caused by the fact that normal receivers are not >optimised for Gsm signal-signatures so the effective sensitivity >is very low > >Also 800 mhz frequencies suffer a lot from blocking by buildings >etc...they also reflect on those buildings wich makes a real >RDF that shows a direction (doppler etc) unworkable ..unless you are >in a wide open area. >I guess just a simple signal-strength reading will work just as good. > >I have tested the receive-able range on a standard analog receiver >and a Sagem Gsm-phone that can be put into a mode where it will >transmitt a constant carrier on a single channel. and the range was >disappointing...i assume that range will improve when you use a >dedicated receiver that can somehow synchronise to the GSM signal > >Ofcourse it could be that you want to use your system for very close >encounters only ? > >If you have a good way of being able to track Gsm's over a long >distance then that way might also be usefull for a tracking system >where the use of silent sms would not be necessary since the tracker >would be your own and you would have the ringer disabled ofcourse. > >To obtain a rough position you could call such a tracker trough a >LBS provider at 10 $cent per call the position obtained from such a >provider will not be accurate enough to actually find the object >with the tracker on it...the last few meters you could track using >sms-pinging and a good Gsm receiver ...you could even modify the Gsm- >phone (tracker)to transmit continiously on a fixed channel(test-mode) >the addition of a small pic processor could take care of that. > >I have a link to a little piece of software called "SMS-spoof" >it's a few years old now...so i have no idea if it still works >it allows you to send an SMS and have the receiver think it was send >by someone else than you ..infact you can put in any sender number >you want...i am not shure if this still works but i could imagine >that you could use it for your trick ,i guess you have to modify it >a little ,i would be very interested to know if this software is of >any use for that. > >It is very well possible to send a so called "silent SMS" wich >will not show up or alert the receiver... as far as i know such a >message contains a "modified header" >This trick is for example used by the police in Germany in order to >force a location update to get a current Cell-ID wich they may not >have if the phone was not active recently... i don't know if they >can do that themselves without the assistance from the network >operator...but i have a feeling they can..ofcourse they then have to >obtain the location update from the network owner. > >The link to "SMS spoof" is on my page here it's for Palm OS > >http://www.tetrascanner.com/gsm-scanners.html > >-------------- >A German article on the German police using "Silent SMS" > >http://www.heise.de/mobil/artikel/50922 > >-------------- >Smart SMS 1.01 software wich includes "stealth ping"...i have not >tried this one and would like to know if it works. (page not >available at the moment) > >http://www.freeware-download.com/downloaddetails/2484.html > >http://www.cracks4u.com/?download/us/pc_ss101.zip.html > >I have not downloaded these yet ...funny websites ! > >-------------- > >SMS Blaster can send 15 SMS p/sec ..sourcecode available. > >http://www.aspsms.com/download/smsblaster/ >-------------- > >SMS it ... said to be usable for "silent sms" ? > >http://www.freeware-download.com/cgi-bin/detail.cgi?ID=368 > >-------------- > > >Tetrascanner > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > >. > 9945 From: contranl Date: Fri Oct 22, 2004 3:56pm Subject: Re: Cell Phone Ping . telos888 said: > Would be easier just to get close to the user, then use something > like Redfang to grab a bonded Bluetooth association - and use SMS > to subscribe the phone to a LBS tracking service.... Shure easy that is...but you are forgetting that as soon as the first tracking occurs the tracked phone will receive a SMS message that he is being tracked (every time)...this is part of the way it's done and prevents unauthorised tracking. Can you disable that too ? ... :) ... :( Tetrascanner 9946 From: Date: Fri Oct 22, 2004 6:09pm Subject: Re: Re: Cell Phone Ping So all LBS packages notify the user via SMS each time they triangulate? Wouldn't that be up to each LBS company? Also, access to location info only requires an SS7 link, or do you have to be partnered with the carrier as well? ...... Original Message ....... On Fri, 22 Oct 2004 20:56:21 -0000 "contranl" wrote: > > >.. > > >telos888 said: > > >> Would be easier just to get close to the user, then use something >> like Redfang to grab a bonded Bluetooth association - and use SMS >> to subscribe the phone to a LBS tracking service.... > > >Shure easy that is...but you are forgetting that as soon as the >first tracking occurs the tracked phone will receive a SMS message >that he is being tracked (every time)...this is part of the way it's >done and prevents unauthorised tracking. > > >Can you disable that too ? ... :) ... :( > > > >Tetrascanner > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > >. > 9947 From: Izaac Date: Fri Oct 22, 2004 6:38pm Subject: Re: Re: Cell Phone Ping On Fri, Oct 22, 2004 at 02:51:00PM -0400, telos888@y... wrote: > the phone to a LBS tracking service. This month's Popular Science has a > mod for a USB Bluetooth card that gives you a mile range on Bluetooth. Because that will be a wonderful world, populated with long range Bluetooth devices. -- ___ ___ . . ___ \ / |\ |\ \ _\_ /__ |-\ |-\ \__ 9948 From: Andre Holmes <1ach@g...> Date: Sat Oct 23, 2004 0:16am Subject: Emailing: caa_product CELLPHONE BUGGING POSSIBLE FIX ! The message is ready to be sent with the following file or link attachments: Shortcut to: http://www.netline.co.il/caa_product.htm Note: To protect against computer viruses, e-mail programs may prevent sending or receiving certain types of file attachments. Check your e-mail security settings to determine how attachments are handled. [Non-text portions of this message have been removed] 9949 From: Michael Puchol Date: Sat Oct 23, 2004 2:12am Subject: Re: Re: Cell Phone Ping ----- Original Message ----- From: To: Sent: Saturday, October 23, 2004 1:09 AM Subject: Re: [TSCM-L] Re: Cell Phone Ping > > So all LBS packages notify the user via SMS each time they triangulate? > Wouldn't that be up to each LBS company? Also, access to location info > only requires an SS7 link, or do you have to be partnered with the carrier > as well? They CAN notify the user who requested the location via SMS. They can notify the same user that is being located (i.e. I can find out where I am), or they can notify another authorised phone. The locations can also be delivered by any other means the operator feels suitable, such as direct links with partners that setup location portals on the internet, private firms, etc. The only one who has real control over the process is the carrier, and it decides what policies apply, how the locations can be delivered, and how much they cost. Also, as Molay pointed out, it IS possible to send an SMS to someone that is not displayed on the UI, these are configuration SMS (SIM toolkit, etc.) and other formatted messages. One learns something new every day ;-) Regards, Mike. 9950 From: Date: Sun Oct 24, 2004 3:56pm Subject: Re: Re: Cell Phone Ping Congress needs to do something about LBS, I don't trust my carrier (or any carrier) to do the right thing when it comes to privacy. ...... Original Message ....... On Sat, 23 Oct 2004 09:12:48 +0200 "Michael Puchol" wrote: > > >----- Original Message ----- >From: >To: >Sent: Saturday, October 23, 2004 1:09 AM >Subject: Re: [TSCM-L] Re: Cell Phone Ping > > >> >> So all LBS packages notify the user via SMS each time they triangulate? >> Wouldn't that be up to each LBS company? Also, access to location info >> only requires an SS7 link, or do you have to be partnered with the carrier >> as well? > >They CAN notify the user who requested the location via SMS. They can notify >the same user that is being located (i.e. I can find out where I am), or >they can notify another authorised phone. The locations can also be >delivered by any other means the operator feels suitable, such as direct >links with partners that setup location portals on the internet, private >firms, etc. The only one who has real control over the process is the >carrier, and it decides what policies apply, how the locations can be >delivered, and how much they cost. > >Also, as Molay pointed out, it IS possible to send an SMS to someone that is >not displayed on the UI, these are configuration SMS (SIM toolkit, etc.) and >other formatted messages. One learns something new every day ;-) > >Regards, > >Mike. > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > >. > 9951 From: Tech Sec Lab Date: Sun Oct 24, 2004 6:09pm Subject: RE: Printers betray document secrets I do know that the big ass colour copiers have algo's that look for specific colours of banknotes and then over/under saturates them on printing to highlight counterfeit documents. I also know of one instance where the cops caught a guy counterfeiting within a week because they managed to extract the printer serial number from one of the bad notes.... I would be really interested in finding out how they did this, especially the decoding of such information. Here is a good link that clears up the JMA and Delp issue: http://news.uns.purdue.edu/UNS/html4ever/2004/041011.Delp.forensics.html Happy printing! ;) PS. Does anyone have any more references/info on the serial number on CD's/DVD's burning? *************** Message: 6 Date: Thu, 21 Oct 2004 22:52:39 -0400 From: Dave Emery Subject: Re: Printers betray document secrets This sounds a bit like an urban legend to me. For one thing, one would not normally encode serial numbers in a PAL (a programmable logic device) but rather some form of PROM (programmable read only memory). There is a big difference - though in fact one could encode some bits (many in modern parts) into a PAL, which would normally be used to implement some part of the digital logic of the printer hardware rather than for storage of serial numbers or other information. PALs usually cost more than PROMs, however, and therefore most ESN type applications involve some sort of PROM (sometimes a serial I2C type...). In general the manufacturing costs of incorporating custom serial numbers (or any other custom information per printer which is different for each unit produced) into a HIGHLY cost sensitive product like a computer printer is truly a killer. I am sure that if such is included, it is only done reluctantly under duress because of the added steps of a customizing and serial number tracking step in production. But all of the heavy lifting for encoding serial numbers into the printer output is invariably actually contained in the printer firmware. That is if there is such a feature there at all. I should imagine that someone with talent and time, and almost infinite patience could extract the algorithms used from the firmware by disassembling and reverse engineering it. This might be easier for the generation of printers that used Windows drivers to actually generate the patterns of bits for the characters printed rather than doing in firmware inside the printer as disassembly of the drivers might be quicker than firmware for a microprocessor with special hardware hooks for printing. Of course I know that CDROM and DVDROM drives have been forced to include serial numbers in all the DVDs and CDROMs they burn, so such traceability HAS been implemented. It is easier on a DVD or CDROM as there are header fields provided for this exact purpose, watermarking laser or inject output and successfully recovering a serial number is a much harder problem in detection theory... as random physical defects in the paper and printing process would tend to eat information encoded in individual pixels. And of course it is rather well known that high resolution color copiers and printers have been forced to refuse to print images that contain certain magic patterns that mark them as currency (money) or other specialized documents. Someone determined the magic pattern used, in fact, for at least one of these systems. -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass 02493 9952 From: contranl Date: Mon Oct 25, 2004 11:31pm Subject: UltraScope (ultra sonic sound to af converter) . Does anyone have any experience with or ideas on what to do with this portable device wich converts ultrasonic sounds up to 200 khz into audible sounds....specially in relation to(counter)surveillance ? http://www.dacaudio.com/products/ultrascope.html Greetings Tetrascanner 9953 From: moellerthy <1ach@g...> Date: Tue Oct 26, 2004 1:40am Subject: Re: UltraScope (ultra sonic sound to af converter) --- In TSCM-L@yahoogroups.com, "contranl" wrote: > > .Ultrasonic's used in the AIRCRAFT Inspection arena measures thickness of a material. In this case they used the same principle instead of using a prode with cupulant they use a mic that can only see and hear what's in the open and not detect beneath the surface of objects. This is Snake Oil as to the other products they would be ok to buy if you do not have simular equipment. Notice that you do not see head phones plugged into the unit and you are supposed to be able to hear A.M. side band question which one USB / LSB. EXPERIENCED ANDRE HOLMES NEPTUNE ENTERPRISE SECURITY 1ach@G... > > > Does anyone have any experience with or ideas on what to do with > this portable device wich converts ultrasonic sounds up to 200 khz > into audible sounds....specially in relation > to(counter)surveillance ? > > http://www.dacaudio.com/products/ultrascope.html > > Greetings > > Tetrascanner 9954 From: fjansgmxnet Date: Mon Oct 25, 2004 7:03am Subject: Re: Cell Phone Ping --- In TSCM-L@yahoogroups.com, "Hawkspirit" wrote: > > > The target cell phone when on will always be monitoring the control channel > at the cell site in which it is located for an incoming call or text > message. When that incoming page goes out, the cell phone handshakes with > the site and is assigned a send and receive channel frequency. One of > several hundred possible. All this coded in TDMA, CDMA, or GSM. So you gonna > find it with a scanner? > > Roger > I was only taking about GSM. I think that SMSs transmission are only on the control channel and that there is no allocation of a traffic channel for SMS. Therefore the modified scanner has only to scan the available (underband) control channels. I am wrong? Of cause, maybe there is a similar SMS transmission exactly at the expected time in the range of the scanner. But sending two or three SMSs will decrease the probabiliy of false hits. Regards, Frank From: Nick Robson Date: Mon Oct 23, 2000 6:30pm Subject: Re: TECHNIQUES There is a real good device for moving heavy furniture called the ≥Global Glider≤ which consists of a lever and four Gliders which are a 1/2≤ X 4≤ disk with a Teflon bottom and a sticky rubber top. Place one under each corner of the piece of furniture and you can then move it around. I use them and find them great. These are available from Mike Sandman Enterprises at 630-980-7710 Nick Robson > > Move the file cabinet or bookcase away from the wall. > > If it is too heavy then have someone help you. > > If you don't have help unload the file cabinet/bookcase and check it > carefully. > > Then carefully check the area behind and below the thing. > > If you are unable to do the above give the customer their money back > and apologize for wasting their time. ************************* The Security Centre Ltd. ************************* *************Grand Cayman, Cayman Islands, British West Indies************** 1803 From: A Grudko Date: Thu Oct 26, 2000 0:25pm Subject: Info on Bug Detector I got this from another PI list. I think I need one of these! According to my calculations he's charging $ 125.00 a sweep. No disrespect to the sender intended. I have snipped some of the other items he was offering and his identity. If anyone wants to see a photo there is one offered. ----- Original Message ----- Micro Bug Detector - I recently purchased two of these, one for my use and one to offer to my fellow PI's (but I can get as many as needed.) This items paid for it's self two-fold on the first bug sweep. I have been having calls for bug sweeps for years and been turning them down, but not now. I setup a 900 mhz and 2.4 gig wireless cam in my office and this detector had no problem detecting and finding them. It detects RF and Microwave signals from 200 MHz to 3.0 GHz. Only $249.95 (plus $9.95 shipping and handling in 48 states) Comes in a hard plastic case with padded linning. ----------------------------- Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1804 From: Jay Coote Date: Thu Oct 26, 2000 8:32pm Subject: Re: Info on Bug Detector Does this mean I can junk my TDR, SA and receiver...? Jay Coote Los Angeles ---------- > I got this from another PI list. I think I need one of these! According to > my calculations he's charging $ 125.00 a sweep. > No disrespect to the sender intended. I have snipped some of the other items > he was offering and his identity. If anyone wants to see a photo there is > one offered. > > ----- Original Message ----- > Micro Bug Detector - I recently purchased two of these, one for my use and > one to offer to my fellow PI's (but I can get as many as needed.) This > items paid for it's self two-fold on the first bug sweep. I have been > having calls for bug sweeps for years and been turning them down, but not > now. I setup a 900 mhz and 2.4 gig wireless cam in my office and this > detector had no problem detecting and finding them. It detects RF and > Microwave signals from 200 MHz to 3.0 GHz. Only $249.95 (plus $9.95 > shipping and handling in 48 states) Comes in a hard plastic case with > padded linning. > > ----------------------------- > > Andy Grudko. D.P.M., Grad I.S, (S.A.) > CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & > intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 > 11) 465 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom > "When you need it done right - first time" > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1805 From: Date: Thu Oct 26, 2000 6:04pm Subject: Re: Info on Bug Detector Andy: I made several inquiries about this unit. I asked the gentleman who posted the information if it could demodulate signals. He was unfamiliar with the term "demodulate" but said the unit has a sensitivity switch. I asked him what he does to check for bugs operating below 200 MHz. His answer: "you won't find many bugs below 200 MHz." I asked him what he does to check telephone lines. His answer: He checks each one for "unusual voltage or voltage losses." I then suggested that he get some rudimentary countermeasures training and suggested he contact Jarvis Intelligence. I thought he might thank me, but so far I have received no answer. Cordially, Ted Swift ACM Research Service At 07:25 PM 10/26/2000 +0200, you wrote: >I got this from another PI list. I think I need one of these! According to >my calculations he's charging $ 125.00 a sweep. >No disrespect to the sender intended. I have snipped some of the other items >he was offering and his identity. If anyone wants to see a photo there is >one offered. > >----- Original Message ----- >Micro Bug Detector - I recently purchased two of these, one for my use and >one to offer to my fellow PI's (but I can get as many as needed.) This >items paid for it's self two-fold on the first bug sweep. I have been >having calls for bug sweeps for years and been turning them down, but not >now. I setup a 900 mhz and 2.4 gig wireless cam in my office and this >detector had no problem detecting and finding them. It detects RF and >Microwave signals from 200 MHz to 3.0 GHz. Only $249.95 (plus $9.95 >shipping and handling in 48 states) Comes in a hard plastic case with >padded linning. > >----------------------------- > >Andy Grudko. D.P.M., Grad I.S, (S.A.) >CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & >intelligence >Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - >Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 >11) 465 9673 - 465 1487 (Fax) - Est. 1981 >GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA >Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom >"When you need it done right - first time" > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > 1806 From: James M. Atkinson, Comm-Eng Date: Thu Oct 26, 2000 10:12pm Subject: Re: Info on Bug Detector At 11:04 PM -0400 10/26/00, tnswift@e... wrote: >Andy: > >I made several inquiries about this unit. I asked the gentleman who posted >the information if it could demodulate signals. He was unfamiliar with the >term "demodulate" but said the unit has a sensitivity switch. I asked him >what he does to check for bugs operating below 200 MHz. His answer: "you >won't find many bugs below 200 MHz." I asked him what he does to check >telephone lines. His answer: He checks each one for "unusual voltage or >voltage losses." I then suggested that he get some rudimentary >countermeasures training and suggested he contact Jarvis Intelligence. I >thought he might thank me, but so far I have received no answer. > >Cordially, > >Ted Swift >ACM Research Service > > > >At 07:25 PM 10/26/2000 +0200, you wrote: > >I got this from another PI list. I think I need one of these! According to > >my calculations he's charging $ 125.00 a sweep. > >No disrespect to the sender intended. I have snipped some of the other items > >he was offering and his identity. If anyone wants to see a photo there is > >one offered. > > Let me see if I got this right... The guy is selling TSCM gear, claims to be a "Bug Sweeper", is "Making Big Bugs" but doesn't understand anything about demodulating a signal? Is this some kind of a joke? -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1807 From: Date: Thu Oct 26, 2000 6:36pm Subject: Re: Info on Bug Detector << Let me see if I got this right... The guy is selling TSCM gear, claims to be a "Bug Sweeper", is "Making Big Bugs" but doesn't understand anything about demodulating a signal? Is this some kind of a joke? >> Sounds like he's a Ralph Thomas graduate. 1808 From: Screaming Date: Wed Oct 25, 2000 5:24pm Subject: RE: Suppository remarks Thanks steve went to the solinas site and had a very informative and interesting visit. thanks again jc 1809 From: Donald Ralston Date: Thu Oct 26, 2000 1:29pm Subject: Question/possible problem I have not received any thing form the group in the last 3 days. Is there a problem with the egroup message board? Or has one of the Computer people in the Company I work for blocked mail coming from this group? I only ask because I have never gone this long without seeing something form the group. Thanks Don 1810 From: Date: Thu Oct 26, 2000 5:30pm Subject: The Spy King Greetings, I am new to many things, and I want to thank Steve Uhrig for bringing to my attention the criminal status of Frank Jones, AKA the Spy King. I was originally given the information by another law enforcement officer and went to his site and joined his list serve. I have decided to try and notify some of my fellow officers of the criminal status of Mr. Frank Jones. I am asking if any of you can help in identifying some more of the facts behind his arrest & conviction. The law enforcement folks with the HTCC list serve are interested. They even list the Spy King as a source. Many of my law enforcement friends will want a little more evidence than just one person's post. I will need details about when and where he was arrested. What he was prosecuted for and by whom? The more details know the better. Thank you in advance for your help. Also one more thanks to Steve Uhrig. He doesn't have to sell you something to be helpful. Steven Wisenburg Wiseguy PI & Atlanta Police Youth Unit 1811 From: James M. Atkinson, Comm-Eng Date: Thu Oct 26, 2000 11:08pm Subject: Re: Question/possible problem At 6:29 PM +0000 10/26/00, Donald Ralston wrote: >I have not received any thing form the group in the last 3 days. Is >there a problem with the egroup message board? Or has one of the >Computer people in the Company I work for blocked mail coming from >this group? I only ask because I have never gone this long without >seeing something form the group. > >Thanks > >Don Nah, It's just a slow week. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1812 From: William Knowles Date: Thu Oct 26, 2000 8:29pm Subject: Re: The Spy King On Thu, 26 Oct 2000 Wiseguypi@a... wrote: Hello Steve! > I am new to many things, and I want to thank Steve Uhrig for > bringing to my attention the criminal status of Frank Jones, AKA > the Spy King. I was originally given the information by another > law enforcement officer and went to his site and joined his list > serve. > > I have decided to try and notify some of my fellow officers of the > criminal status of Mr. Frank Jones. I am asking if any of you can > help in identifying some more of the facts behind his arrest & > conviction. > > The law enforcement folks with the HTCC list serve are interested. > They even list the Spy King as a source. Many of my law > enforcement friends will want a little more evidence than just one > person's post. > > I will need details about when and where he was arrested. What he > was prosecuted for and by whom? The more details know the better. My information is a little lacking, However many people say I sometime underestimate what I have to offer. Would Frank Jones' Court Documents help you? :) http://www.attrition.org/errata/jones/ Enjoy! William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 1813 From: James M. Atkinson, Comm-Eng Date: Fri Oct 27, 2000 0:11am Subject: Re: The Spy King At 10:30 PM +0000 10/26/00, Wiseguypi@a... wrote: >Greetings, > >I am new to many things, and I want to thank Steve Uhrig for bringing >to my attention the criminal status of Frank Jones, AKA the Spy >King. I was originally given the information by another law >enforcement officer and went to his site and joined his list serve. > >I have decided to try and notify some of my fellow officers of the >criminal status of Mr. Frank Jones. I am asking if any of you can >help in identifying some more of the facts behind his arrest & >conviction. > >The law enforcement folks with the HTCC list serve are interested. >They even list the Spy King as a source. Many of my law enforcement >friends will want a little more evidence than just one person's >post. > >I will need details about when and where he was arrested. What he >was prosecuted for and by whom? The more details know the better. > >Thank you in advance for your help. Also one more thanks to Steve >Uhrig. He doesn't have to sell you something to be helpful. > >Steven Wisenburg >Wiseguy PI & >Atlanta Police Youth Unit Steven, SpyKing is in fact a convicted felon, and has been for some time, and the court has ordered him to take part in a mental health program (this should tell you something). He claimed (in court) not to be responsible for his criminal actions, claimed to be penniless, claimed to have virtually no income, claimed to have no assets, claimed his wife was supporting him, etc, etc, etc. His real name is actually Francis Edward Jones (not Frank Jones), and you can contact both the Federal Clerk of Courts (Southern District of New York), and the Probation Department to confirm the details. He is currently on Criminal Probation. The main probation office number is (212) 805-0040, and his records are indexed with the following data (taken from the court records): Subject:Frank Jones (AKA: Francis Edward Jones) SSN/DOB: 056-42-6158 / 09/26/1949 USM No.: 40649-054 As a member of law enforcement I seriously doubt you will want to continue your association with him... but then of course it's your choice. Regards, -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1814 From: James M. Atkinson, Comm-Eng Date: Fri Oct 27, 2000 9:44am Subject: Ex-Detective Linked to Jewel Thefts [Note: Some eavesdroppers may not just be stealing secrets, they may be going after more tangible things, or may be targeting someone in the company for violence, etc.] -jma Ex-Detective Linked to Jewel Thefts Updated 11:17 PM ET October 21, 2000 By MIKE ROBINSON, Associated Press Writer CHICAGO (AP) - Using fake mustaches, electronic eavesdropping equipment and a high level of computer sophistication, the ring of jewel thieves roamed the country for years, pulling off crimes so clever they might have been planned by a master detective. Federal prosecutors say they were. William Hanhardt, former Chicago chief of detectives, was known as a tough "cop's cop" as he shot his way onto the city's front pages and rose through the ranks of the police force in the 1950s despite whispers that he had connections to organized crime. Hanhardt became a high-profile police official who, among other things, was a consultant to producer Michael Mann's 1980s TV show "Crime Story." Now prosecutors have accused Hanhardt, 71, of being the mastermind behind the jewel-theft ring that made off with $4.5 million worth of loot. He and five others were indicted Thursday on charges of racketeering conspiracy in connection with thefts of high-quality gems and luxury watches in Arizona, California, Michigan, Minnesota, Texas and Wisconsin. The men have pleaded innocent and have been released on bond. FBI agents are hunting the sixth defendant, William "Cherry Nose" Brown, last known to be living in Gilbert, Ariz. Hanhardt made headlines 38 years ago when and other police officers shot and killed two home invaders in a police shootout. "He was a legend in the Police Department. Everybody knew who he was," Bob Podgorny, a 30-year veteran of the force and first vice president of the Fraternal Order of Police, said in Friday's Chicago Tribune. "All the years that I have known him, he has been a policeman's policeman." Federal officials say it was Hanhardt's police know-how that made the shadowy ring so elusive for so long. "A significant jewel-theft ring was able to operate without detection because of one defendant's extensive knowledge of police techniques and procedures," says Kathleen McChesney, special agent in charge of the FBI's Chicago field division. Smoke bombs, aliases, secret codes, bullet-proof vests, electronic eavesdropping equipment, fake beards and mustaches, and a vast array of burglary tools were standard issue with the thieves, officials say. In some cases, the thieves bought luggage matching the cases used by jewelry salesmen to carry their wares, prosecutors say. They were apparently able to get into a fully locked car in a matter of seconds, switch cases and make off with the jewels undetected. But what may have been the most sophisticated part of the operation was the use of computers. Hanhardt's clout at police headquarters enabled him to use the very computers that lawmen use to hunt criminals to stalk the unsuspecting jewelry salesmen, getting license numbers and other key information, authorities claim. The thefts began even before Hanhardt retired, according to federal officials. After that, he was able to contact officers he still knew in the department, who allegedly dipped into computerized files to get the information for him. Federal prosecutors say little on how he did that. "If we could prove that they were guilty of a crime they would be charged," U.S. Attorney Scott Lassar said. It may have simply been a matter of the police doing a favor for a friend who had once been their boss. Lassar indicated more indictments were not expected. Some Chicago mob watchers say Hanhardt may have been able to climb to the highest ranks of the department due to influence with politicians in Chicago's scandal-drenched 1st Ward Democratic Organization. "The First Ward people were very influential in politics, very capable of delivering the vote and totally tied to the mob," says Wayne Johnson, chief investigator for the Chicago Crime Commission. Exactly how the FBI cracked the case is a closely guarded secret, although there reportedly was a wiretap on Hanhardt's phone for a year. But it's clear that agents spent years gathering evidence that linked the crimes across the nation into a single indictment. One of those indicted along with Hanhardt is Sam DeStefano, 55, of Chesterton, Ind. He confirmed in an interview Thursday that he is the nephew of another Sam DeStefano, an old-time Chicago mobster who was fatally shot in a West Side alley after a storied career in crime. Named as a co-conspirator in the case is Jimmy D'Antonio, described by crime commission experts as a deceased member of the Chicago mob. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1815 From: mike f Date: Fri Oct 27, 2000 10:01am Subject: <<<<<>>>> SORRY 4 MULTIPLE POSTS!!!! I HAVE A NEW EMAIL ADDRESS! THE DREAMSCAPE ADDRESS IS DEAD,KAPUT! MY NEW EMAIL ADDRESS IS ======> friindy@a... Mike F ===> friindy@a... Please change your address books,if you want to email me. THANK YOU for your attention and Patience. Later4,Mike F. L8R4,Mike f. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 1816 From: Jordan Ulery Date: Fri Oct 27, 2000 10:11am Subject: Felons, etc One of the biggest problems facing the PI profession today is the lack of credibility and poor perception of what a PI does. The Spy King is not, unfortunately, uncommon in our profession. The clumsy guys who invaded the wrong house in AZ seeking a bail jumper are another example. In NE there is even a man who, unable to get a PI license because of felony arrests and convictions, persuaded the legislature that a felon should be a bail enforcement agent. TSCMers get thrown into the mix, even though you are a specialized branch of the community. $249.00 bug detectors and lack of knowledge and the resultant public perception of PIs and associated professionals being bumbling idiots hurt all professionals. They need to be exposed and the public needs to be made aware of the effect of using less than qualified people to do a serious job. Its just my opinion, but methinks it is time TSCMers establish a professional standards committee and create a uniform criterion for becoming a certified/registered/board member/classified/rectified or deep southern fried member of the TSCM community so that, as with ISO standards, across the world you can say "I have this minimum standard of skill, ability, experience, etc." Just MHO $0.02 1817 From: James M. Atkinson, Comm-Eng Date: Fri Oct 27, 2000 11:10am Subject: Re: Felons, etc Jordan, You have a good point, but it's just not the security business where people hawk these kinds of frauds. Any business that has "professional secrets or skills" will attract con artists who will try to exploit the publics lack of knowledge of the subject matter. Take for example a professional psychic, a faith healer, a witch doctor, a carney operator, a used car salemen, and so on. All of them exist because the public does not understand "a secret thing" and it is this which they capitalize on. Even tradesman have been known to do this, consider a plumber who charges $2,500 to fix a leaky pipe, or a transmission mechanic who tells the victim they need an overhaul when in fact all they need is a simple filter change. Years before the medical sciences were regulated by the government every quack with a bottle of snake oil called themselves a doctor, any person with a razor could be a surgeon, and anybody with a pair of rusty pliers could call themselves a dentist. In our profession it is important not to play games with the client, or to create a feeling of mystery and intrigue. It is more important (IMHO) to explain things to people so that they can understand it better, to illuminate, to educate, and to enlighten. The concept of having a certification method or program is a great idea, but since most TSCM'ers will all want to be grand-fathered into such a program it sort of defeats the purpose. Personally, I would LOVE to see a program instituted at the federal level where anybody (government, state, or private) who engages in anything even remotely involving TSCM, counterintelligence, or "Bug Sweeping" can be formally re-certified each year, has to own all of their own equipment, have a minimum of academic/technical (non-TSCM) training, 13+ weeks of TSCM training, and has to operate on a formally documented procedure. Sadly, the states who have tried to regulate TSCM have actually had their programs backfire and they were forced to reduce their training requirement, or require TSCM'er to become private investigators (when in fact PI's and TSCM'er are not related skills) -jma At 11:11 AM -0400 10/27/00, Jordan Ulery wrote: >One of the biggest problems facing the PI profession today is the lack >of credibility and poor perception of what a PI does. The Spy King is >not, unfortunately, uncommon in our profession. The clumsy guys who >invaded the wrong house in AZ seeking a bail jumper are another >example. In NE there is even a man who, unable to get a PI license >because of felony arrests and convictions, persuaded the legislature >that a felon should be a bail enforcement agent. TSCMers get thrown >into the mix, even though you are a specialized branch of the community. > >$249.00 bug detectors and lack of knowledge and the resultant public >perception of PIs and associated professionals being bumbling idiots >hurt all professionals. They need to be exposed and the public needs to >be made aware of the effect of using less than qualified people to do a >serious job. > >Its just my opinion, but methinks it is time TSCMers establish a >professional standards committee and create a uniform criterion for >becoming a certified/registered/board member/classified/rectified or >deep southern fried member of the TSCM community so that, as with ISO >standards, across the world you can say "I have this minimum standard of >skill, ability, experience, etc." > >Just MHO $0.02 ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1818 From: David Miller Date: Fri Oct 27, 2000 7:49am Subject: Humor After a weekend trip home to Arkansas, Bill Clinton stepped from the helicopter and onto the White House lawn. He was carrying two Arkansas-bred hogs, one under each arm. At the bottom of the steps, a young Marine snapped to attention, saluted sharply and said, "Fine looking pigs, sir!" Clinton turned and glared at the boy. "Son, don't you know I'm from Arkansas? These ain't pigs. They're hogs." The Marine shot back, "Marine begs the COMMANDER IN CHIEF'S pardon, sir! Fine looking hogs, sir!" Clinton smiled with pride and the young man relaxed. The President went on, "Thank you, son. You see this one here?" He lifted up the pig under his right arm. "I got this one for Chelsea." Then he nodded to the hog on his left. "And this one here, I got for Hillary." At that the Marine snapped back to attention and said, "Outstanding trade, sir!" 1819 From: klaxon Date: Fri Oct 27, 2000 2:09am Subject: Racial Threats Flash on TV Screens How could this be accomplished? Racial Threats Flash on TV Screens An outsider seized control; FBI puzzles over case Dateline Detroit: In a case that has authorities puzzled, a Sumpter Township couple has received racially charged hate messages and death threats on their television. Retired autoworkers Charlotte and Judge Smith say someone has typed more than 10 threatening messages this month on the 36-inch televisions in their den and bedroom. The messages were typed on a keyboard used to select movies from the couple's TV satellite system, which has more than 200 channels. The FBI and the provider of the satellite service are investigating. The couple told police they returned home in late August after a monthlong vacation to find their alarm system dismantled. There were no signs of entry into their house, but within hours the couple learned someone had mysteriously seized control of their televisions. Stations would change without warning. In the middle of the night, the sets would turn on at high volume, Charlotte Smith said Tuesday. "We thought there was a ghost in the house," Smith said. The situation worsened dramatically when someone typed racial slurs and messages on the screens threatening to kill the couple, their 13-year-old grandson who lives with them, the neighbors across the street and even the Smiths' German shepherd, Pepper. The threats included the name of each potential victim. When Charlotte Smith yelled "Shut up" at the television, an immediate reply on its screen read "Shut up Charlotte." After Sumpter Township police investigated and left the house, the screen message read "Police was here." The local police turned the case over to the FBI. The family taped more than 10 messages during the Labor Day weekend. The FBI considers making threats on a television unusual and is investigating it as a civil rights violation, spokeswoman Dawn Clenney said Tuesday. The Smiths are black; one of the neighbors threatened is a Mexican American. The provider of the satellite service, California-based DirecTv, has told the FBI that its signal has not been compromised, spokesman Robert Mercer said. The company is owned in part by Hughes Electronics, a subsidiary of General Motors Corp. Mercer said company officials suspect someone is using a radio-frequency remote control to type the messages. The remote control is not supplied by the satellite provider. A remote control could be used outside the house, much like a garage door opener, to enter words and change channels and volume levels on the Smith's televisions, Mercer said. "Somebody is playing an ugly prank," Mercer said. Mercer said the complaint from the Smiths is the first of its kind the world's biggest direct broadcast satellite provider has investigated. Charlotte and Judge Smith say they were seeking peace and quiet eight years ago when they moved from Detroit to a secluded 8-acre site in Sumpter Township, a racially mixed community of 12,000 people. They built a home in a neighborhood where deer are more common than intruders. "It's like being up north almost," said Judge, 61, looking out his screened porch toward his backyard, acres of empty land lined with shrubs and trees. "It's away from the rat race." But last year, the Smiths found racial slurs painted on the side of their house along with two bullet holes. No arrests have been made. They say attacks on the television have left them confused and frightened. Neighbors say the Smiths keep to themselves and are not seen much. "I'm walking around scared to death," said Charlotte Smith, 51. "We just want to know why" this is happening. So does Benjamin Moore and his family, who live across the street. A retired GM supervisor, Moore said he sleeps with a loaded shotgun by his bed after threats against him, his wife and their three children appeared on the Smiths' television. The Smiths, meanwhile, have reactivated the alarm system and replaced the 18-inch satellite receiver on the roof. There have been no threats since Labor Day but the televisions still turn off mysteriously every night, Judge Smith said. http://www.plantnet.com/klaxon/gregs1st.htp 1820 From: James M. Atkinson, Comm-Eng Date: Fri Oct 27, 2000 1:15pm Subject: Re: Racial Threats Flash on TV Screens Infrared Link on keyboard/remote 300 MHz Datalink (for above) 17/20 MHz Carrier Current Link or it could be a hoax. Only a TSCM or similar inspection could tell for sure -jma At 12:09 AM -0700 10/27/00, klaxon wrote: >How could this be accomplished? > > > > > > > > > >Racial Threats Flash on TV Screens > > >An outsider seized control; FBI puzzles over case > > >Dateline Detroit: In a case that has authorities puzzled, a Sumpter >Township couple has received racially charged hate messages and death >threats >on their television. > > >Retired autoworkers Charlotte and Judge Smith say someone has typed more >than >10 threatening messages this month on the 36-inch televisions in their den >and bedroom. The messages were typed on a keyboard used to select movies >from >the couple's TV satellite system, which has more than 200 channels. > > >The FBI and the provider of the satellite service are investigating. > > >The couple told police they returned home in late August after a monthlong >vacation to find their alarm system dismantled. There were no signs of entry >into their house, but within hours the couple learned someone had >mysteriously seized control of their televisions. > > >Stations would change without warning. In the middle of the night, the sets >would turn on at high volume, Charlotte Smith said Tuesday. > > >"We thought there was a ghost in the house," Smith said. > > >The situation worsened dramatically when someone typed racial slurs and >messages on the screens threatening to kill the couple, their 13-year-old >grandson who lives with them, the neighbors across the street and even the >Smiths' German shepherd, Pepper. The threats included the name of each >potential victim. > > >When Charlotte Smith yelled "Shut up" at the television, an immediate reply >on its screen read "Shut up Charlotte." After Sumpter Township police >investigated and left the house, the screen message read "Police was here." > > >The local police turned the case over to the FBI. The family taped more than >10 messages during the Labor Day weekend. > > >The FBI considers making threats on a television unusual and is >investigating >it as a civil rights violation, spokeswoman Dawn Clenney said Tuesday. The >Smiths are black; one of the neighbors threatened is a Mexican American. > > >The provider of the satellite service, California-based DirecTv, has told >the >FBI that its signal has not been compromised, spokesman Robert Mercer said. >The company is owned in part by Hughes Electronics, a subsidiary of General >Motors Corp. > > >Mercer said company officials suspect someone is using a radio-frequency >remote control to type the messages. The remote control is not supplied by >the satellite provider. > > >A remote control could be used outside the house, much like a garage door >opener, to enter words and change channels and volume levels on the Smith's >televisions, Mercer said. > > >"Somebody is playing an ugly prank," Mercer said. > > >Mercer said the complaint from the Smiths is the first of its kind the >world's biggest direct broadcast satellite provider has investigated. > > >Charlotte and Judge Smith say they were seeking peace and quiet eight years >ago when they moved from Detroit to a secluded 8-acre site in Sumpter >Township, a racially mixed community of 12,000 people. They built a home in >a >neighborhood where deer are more common than intruders. > > >"It's like being up north almost," said Judge, 61, looking out his screened >porch toward his backyard, acres of empty land lined with shrubs and trees. >"It's away from the rat race." > > >But last year, the Smiths found racial slurs painted on the side of their >house along with two bullet holes. No arrests have been made. > > >They say attacks on the television have left them confused and frightened. > > >Neighbors say the Smiths keep to themselves and are not seen much. > > >"I'm walking around scared to death," said Charlotte Smith, 51. "We just >want >to know why" this is happening. > > >So does Benjamin Moore and his family, who live across the street. A retired >GM supervisor, Moore said he sleeps with a loaded shotgun by his bed after >threats against him, his wife and their three children appeared on the >Smiths' television. > > >The Smiths, meanwhile, have reactivated the alarm system and replaced the >18-inch satellite receiver on the roof. There have been no threats since >Labor Day but the televisions still turn off mysteriously every night, Judge >Smith said. > >http://www.plantnet.com/klaxon/gregs1st.htp > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1821 From: 1RCM <1RCM@M...> Date: Fri Oct 27, 2000 4:50pm Subject: The magic answer vs. the magic box Hey Ted, I'll put my shrink hat on and answer that one for ya'. You made the guy have to reflect upon the fact that he is a crook. Those few folks who are genuinely ignorant of what is involved in TSCM work and who believe the BS that the black-box seller peddled to them would have thanked you for educating them. The rest fall into the category above. So don't lose any sleep over it by waiting-up tonight for the phone to ring. Bob Motzer 1822 From: Date: Fri Oct 27, 2000 1:54pm Subject: Re: The magic answer vs. the magic box Hi Bob: I certainly gave him every opportunity to recognize his ignorance :-) And I was even nice in the way I went about it. Nice seeing you at Tysons Corner. Ted Swift At 05:50 PM 10/27/2000 -0400, you wrote: >Hey Ted, > >I'll put my shrink hat on and answer that one for ya'. You made the guy have >to reflect upon the fact that he is a crook. Those few folks who are >genuinely ignorant of what is involved in TSCM work and who believe the BS >that the black-box seller peddled to them would have thanked you for >educating them. The rest fall into the category above. So don't lose any >sleep over it by waiting-up tonight for the phone to ring. > >Bob Motzer > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > 1823 From: Date: Fri Oct 27, 2000 10:11pm Subject: Re: The Spy King Greetings, Thank you for your responses. It's hard to top the copies of the original documents. I have been advised that the HTCC List Serve is pulling their links to the Spy King web site. I am supplying the information to the people who gave me his address. By the way Mr. Atkins, was the notation about making the wizards mad pointed at anyone? :) :) Thanks again Steven Wisenburg Atlanta Police Youth Unit --- In TSCM-L@egroups.com, William Knowles wrote: > On Thu, 26 Oct 2000 Wiseguypi@a... wrote: > > Hello Steve! > > > I am new to many things, and I want to thank Steve Uhrig for > > bringing to my attention the criminal status of Frank Jones, AKA > > the Spy King. I was originally given the information by another > > law enforcement officer and went to his site and joined his list > > serve. > > > > I have decided to try and notify some of my fellow officers of the > > criminal status of Mr. Frank Jones. I am asking if any of you can > > help in identifying some more of the facts behind his arrest & > > conviction. > > > > The law enforcement folks with the HTCC list serve are interested. > > They even list the Spy King as a source. Many of my law > > enforcement friends will want a little more evidence than just one > > person's post. > > > > I will need details about when and where he was arrested. What he > > was prosecuted for and by whom? The more details know the better. > > My information is a little lacking, However many people say I > sometime underestimate what I have to offer. > > Would Frank Jones' Court Documents help you? :) > > http://www.attrition.org/errata/jones/ > > Enjoy! > > William Knowles > wk@c... > > > *==============================================================* > "Communications without intelligence is noise; Intelligence > without communications is irrelevant." Gen Alfred. M. Gray, USMC > ================================================================ > C4I.org - Computer Security, & Intelligence - http://www.c4i.org > *==============================================================* 1824 From: A Grudko Date: Fri Oct 27, 2000 6:36pm Subject: Re: Racial Threats Flash on TV Screens ----- Original Message ----- > >Retired autoworkers Charlotte and Judge Smith say someone has typed more > >than 10 threatening messages this month on the 36-inch TVs Didn't we discuss this case a few months ago? Stories that go round the net quickly become urban legends. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1825 From: A Grudko Date: Fri Oct 27, 2000 7:48pm Subject: Re: Info on Bug Detector ----- Original Message ----- Subject: Re: [TSCM-L] Info on Bug Detector > Is this some kind of a joke? > -jma Nope, and I have no reason to think the author was anyting other than 100% sincere. I posted it 'cos it was blatantly uninformed, as follow-up messages reflected. James, I will privately post the PI's message to you for action/comment. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1826 From: Dawn Star Date: Sat Oct 28, 2000 9:13am Subject: Censorship From: Wiseguypi@a... Subject: Re: The Spy King Greetings, Thank you for your responses. It's hard to top the copies of the original documents. I have been advised that the HTCC List Serve is pulling their links to the Spy King web site. I am supplying the information to the people who gave me his address. By the way Mr. Atkins, was the notation about making the wizards mad pointed at anyone? :) :) Thanks again Steven Wisenburg I'm a bit disturbed by this vigilantly stuff, this man has a first amendment right to be heard and publish his materials uncensored. A conviction in this country does not remove these rights, If you don't like his material don't log on, tell your friends don't log on. But contacting his ISP with legal documents and trying to get his voice silenced is a little too big brother for me. Roger Tolces, Electronic Security Co. Los Angeles [Non-text portions of this message have been removed] 1827 From: Date: Sat Oct 28, 2000 5:21am Subject: Re: Censorship In a message dated 10/28/00 7:10:49 AM Pacific Daylight Time, bratkid@e... writes: << I'm a bit disturbed by this vigilantly stuff, this man has a first amendment right to be heard and publish his materials uncensored. >> Ouch! It's not vigilante, It's Karmic. It's also "reap as you have sown." But remember, "Today's news you wrap tomorrow's fish in." 1828 From: 1RCM <1RCM@M...> Date: Sat Oct 28, 2000 10:01am Subject: TSCM Certifications I would like to offer my two-cents regarding TSCM certifications for the consideration of the list members: To try to establish certifications or not seems to be one of the hottest topics to hit the TSCM community in a long time. In most all of the arguments that I have heard which support certification there is always that underlying current of using certification as a way to drive the charlatans from the business. Well, as was pointed out by someone in the last list, most all professions have their charlatans - and sadly my prediction is that most all will probably continue to do so for ever. My personal belief is that TSCM certification will never even make a dent in that respect. For in my humble opinion one-on-one education of clients by the individual professional TSCM practitioner is the only answer. Yes it is hard work, and yes it will take 'forever', but one has to just take a look at so many things in past history to note that truth and honesty in the fee marketplace in time almost always overcame (or was at least miles ahead of) attempts at forced regulation when issues were finally decided. But that's for another rant, so now back to certification. For many years I was a long-time member of two nationally-recognized Search and Rescue associations. A few years ago each began to drift away from the purpose of fulfilling the mission for which they were chartered. In each case both began to support and to implement certification processes. A feeding frenzy resulted. When I dropped my memberships as 'a silent protest' there were easily some forty-five individual splinter groups who had initiated their own 'professional;' certification processes. The 'mine is better than yours' syndrome resulted. We saw folks who were so busy attempting to get all of the certifications that they could who thus had no time left to go serve their community by plying their trade. We saw individuals who had certification patches up one sleeve and down the other who when placed in command of a SAR incident were totally unable to function in that position. And sadly, we saw some very 'long-time' individuals who were preeminent in the SAR field 'drop out' simply because they couldn't stand the BS or were not at all interested in, as they called the various certification processes, 'going back to kindergarten to give an apple to the teacher'. But you know what else we saw? We saw the totally unqualified, unequipped - and yes, UNCERTIFIED - individuals still getting to manage SAR incidents simply because they walked up to the family (and at times even the police or fire chief (( = client?)) who knew nothing about SAR) and said, "I can find your lost child, please let me help you"! This was my experience in the SAR community. And I have had many others tell me about their same exact experiences in other communities; professional, volunteer, civic, etc. So be very careful when you believe that certification might be the panacea here - for history oft-times simply repeats itself. Finally, in reality certification without enforcement is a moot point. Certifications created and administrated by associations, groups, individuals and the like may make one 'feel good', as if they have finally joined some exclusive boys club, but in the end they are basically meaningless for the purpose for which most supporters apparently want to see them adopted. Try going up to a known charlatan in the TSCM field and telling him that he can't continue making his $250 per sweep because he has no certification. When he starts to laugh in you face, and you then follow-up by telling him that the XYZ Association of Amalgamated Sweepers says so, just be ready to duck when you finally annoy him to the point where the laugh turns into a swing. As the moderator stated in the last list, having a certification process but not having any 'teeth for enforcement by the government' simply isn't the answer. And as he also pointed out, all governmental attempts at regulating TSCM - as with most everything else for that matter that government has tinkered with as well - have thus far failed miserably. Remembering that history oft-times repeats itself just take a look at how the PI community believed that their reputation would soon get cleaned-up because 'they were next on the list' when governmental agencies declared that security guards needed to be certified. And we all know that there are no charlatans left in the security guard arena - right? TSCM certification may be all well and good as a consideration for membership qualification by an individual group, or as an internal way to boost pride in one's own membership in a group, or as a means of providing an individual group of practitioners with a credible base from which to launch their own individual client education thrust from, and on and on. But if anyone can seriously argue the fact that certification (excluding that which would be professionally developed and properly administrated by a governmental entity - a pipe dream which we probably will never see) will definitely drive the charlatans from the field I'd certainly like to hear their views either privately or on the list. It could well spawn some of the most interesting debates on the list thus far. Thanks for reading my thoughts on the matter - 'Just another Bob' 1829 From: Date: Sat Oct 28, 2000 10:56am Subject: Re: Racial Threats on TV Screen There is software available which allows you to remotely control (from off premises) home appliances ,including TV sets, utilizing the internet. Sounds to me ,that there are also hidden cameras or microphones installed on premises, or interacting through internet connection.(with data ,ie.voice,video being retrieved and sent online) A thorough sweep and evaluation would be in order. On another note, it would be a great idea ,to have a uniform set of standards for TSCM'ers. However not everyone would necessarily follow them.As in every profession,there are quacks ,charlatans and outright crooks etc. As "Obewaan" :>) James Atkinson said " to illuminate,educate and enlighten". I like that. Everyone have a great weekend! HAVE A GREAT DAY !!! 1830 From: Steve Uhrig Date: Sat Oct 28, 2000 0:20pm Subject: Re: TSCM Certifications Once upon a midnight dreary, 1RCM pondered, weak and weary: > I would like to offer my two-cents regarding TSCM certifications > for the consideration of the list members: Well said. Intelligent argument well presented, by someone who can spell and knows grammar. Almost unheard of anymore. Sounds like you did not go to a public school. Your post should be printed on acid-free paper and posted on the church doors for all posterity. Good job. Harold. 1831 From: A Grudko Date: Sat Oct 28, 2000 1:09pm Subject: Re: Info on Bug Detector ----- Original Message ----- > I asked him what he does to check for bugs operating below 200 MHz. His answer: "you > won't find many bugs below 200 MHz Hi Ted Frightening! But by his tone I would judge this guy as being sincere - after all, he does give his correct contact details. His lack of technical knowledge simply reflects the danger of 'black box' technology, where you buy the box, read the manual and are now an expert. It applies to many fields, not just TSCM...a sort of electronic snake oil. Now if this kind of misinformed service can be offered in the sophisticated US, can you think what kind of rubbish is sold as an 'expert service' here in the third world. I have clients who balk at my US$ 250 minimum callout fee plus $36 an hour for a sweep, because they can get a cheaper service (quoted in writing......oooh!). Somehow 19 years in the business, $ 150 000 worth of equipment, formal qualifications, published books and articles and patents held are not important if they can find someone else at $20 per hour with a field strength meter who has read a book from Paladin Press. I can understand Mrs Smith making that kind of call, but multinational companies? Sorry, I know I'm preaching to the converted but it is so frustrating! It's great to talk to others in this field through this group, if only to constantly learn. Regards from sunny South Africa Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" From: Hawkspirit Date: Wed Oct 23, 2002 10:17am Subject: VerSign's Network Getting to the Root of All E-Mail Cameras monitor all activities at VerSign's Network Operations Center near Washington. (Andrea Bruce Woodall - The Washington Post) By David McGuire Newsbytes Friday, March 29, 2002; Page E05 Squatting unobtrusively on the banks of a man-made pond in an unremarkable corporate subdivision a few miles outside the Beltway, the home of the Internet's authoritative root server and master registry of dot-com addresses is virtually indistinguishable from the other red-brick office buildings that surround it. Despite its humdrum facade, VeriSign's Network Operations Center (NOC) is one of the most important physical locations in the virtual world, and since Sept. 11 it has proven irresistible to dozens of government officials who have sought to assure themselves that the Internet is safe from physical and electronic attacks. "Security and stability are like Siamese twins. You cannot have stability without security," said Mark Rippe, vice president of technical operations for VeriSign Global Registry Services. "If people can come and mess with your system, one way or another, you have no control over your systems. . . . Our primary function is the stability of the global Internet." Obscurity is the first line of defense. The building is unmarked, its address unspecified in company literature and its managers tight-lipped about disclosing driving directions or identifying markings to strangers. While the location of the building is not a true secret -- dozens if not hundreds of Internet addressing insiders know where it is -- it would be difficult for a casual vandal or criminal to stumble across it, Rippe said. Visitors start with a stroll through a metal detector and past a guard desk, much as they would in any moderately secure office building. They take an elevator to the top floor, where security is tightest and inconspicuous cameras monitor the hallways. The few entrances to the operations center and server rooms can only be reached through antechambers called "mantraps" which are outfitted with scanners that read the unique contours of visitors' palms. If an unauthorized visitor places his hand in the scanner it triggers a lockdown, sealing the intruder in one of the narrow, wood-paneled closets until security forces arrive to remove them. Beyond the first mantrap, inside the operations center, a handful of employees keep tabs on rows of computer monitors and a wall of flat screens that continuously scroll diagnostics across maps of the world that show locations of key Internet servers. The constantly updated figures map the number of requests the servers are receiving each moment, and how well they are handling the load. From here, technicians watch for unusual activity that could signal some sort of electronic attack. "We see a lot of spikes or peaks or things that might indicate [denial of service] attacks," Rippe said. Those blips represent a much more substantial security concern for the addressing officials than do the threat of physical attacks, Rippe said. From the operations center, technicians can take steps to counter threatening electronic activity, Rippe added. Adjoining the operations center, behind another mantrap, are twin rooms that house the essential computers that serve as the heart of the Net. Here, hundreds of whirring computer fans and an industrial-strength air conditioner drown out anything quieter than a close-range shout. Black, seven-foot-tall computer server towers are aligned in rows that stretch nearly the length of the room. The white floor is slotted to allow airflow and a steady, conditioned breeze streams up from below, making all metal surfaces in the room cool to the touch. Small dome-like security cameras, similar to those used in casinos, pock the white ceiling, evenly spaced between chemical fire suppression devices. There isn't a cranny of the server area where a person could hide from surveillance. Between the server hedgerows are several equally tall storage units, where the continually updated master lists of the addresses registered in dot-com, dot-net and dot-org are stored. And tucked away in a less-traveled back corner of one of the server rooms, behind the door of a black tower that looks no different than any of the others, is the principal reason for all the precautions: the A root server. Most people envision the Internet as a global network that resides on no single physical system or network of systems. While that picture is roughly correct, key pieces of the Internet's technological backbone are concentrated in a handful of physical locations around the world. The Domain Name System (DNS) makes the Web easy to navigate by translating long Internet protocol (IP) numbers into memorable Web and e-mail addresses. It relies on a hierarchy of physical root servers to inform computers connected to the Internet where they need to look to find specific locations online. At the top of that hierarchy is the A root server, which every 12 hours generates a "zone" file, which in turn tells a dozen other root servers spread around the world what Internet domains exist and where they can be found. One rung below the root servers in the Internet hierarchy are the servers that house Internet domains such as dot-com, dot-biz and dot-info. Three of the largest and most widely used of those domains -- dot-com, dot-org and dot-net -- are run alongside the A root server at the Network Operations Center. VeriSign manages the A root server and dot-com registry under contracts with the Commerce Department and global Internet addressing authorities. But despite the precautions that go into protecting the assets in the facility, Rippe said the Internet would not be irreparably harmed if the building were to vaporize tomorrow. "The last thing I'd want someone to think is that they could put a bomb around their waist and hug the A root and think they're going to significantly impact the Internet," Rippe said. Rippe said that while such an attack could kill many employees, the Internet's addressing system is designed to withstand the destruction of much of the physical infrastructure that houses it. The DNS is built so that eight or more of the world's 13 master root servers would have to fail before ordinary Internet users started to see slowdowns, according to John Crain, manager of technical operations for the Internet Corporation for Assigned Names and Numbers (ICANN). ICANN manages the DNS and sets policies for registry operators and domain name retailers. "Theoretically, if 'A' were to disappear, we could pick it up from one of the other servers," Crain said. "Moving the place where the zone is picked up is very simple." Although the functions of the A root server could be moved elsewhere, Rippe said that VeriSign is well aware that it makes a much more visible target than the other root servers, which perform their functions in comparative anonymity around the world. Rippe said that he is always cognizant of the potential threat facing the building. High-ranking U.S. officials have also started taking a greater interest in the security of the complex. After Sept. 11, as agencies and departments throughout the federal government began reexamining the security of the critical infrastructure under their jurisdictions, VeriSign hosted a slew of high-ranking visitors. While the Web may be worldwide, American scientists relying on U.S. government funding created the technology at the core of the Internet and its global addressing system. The Internet may be a global resource, but much of its infrastructure is still ultimately controlled by the U.S. government. In recent years, the government has ceded day-to-day management of the addressing system to the more internationally representative ICANN, but the Commerce Department still has final say in any changes made to the DNS. Deputy Commerce Secretary Sam Bodman and White House electronic security adviser Richard Clarke took a guided tour of the center in November. "The Internet is a critical component of our economy," said Commerce Department spokesman Trevor Francis. "The reason why you're seeing such a focus on VeriSign is that the safety and the integrity of these systems needs to be analyzed and needs to be improved upon regardless of how safe they currently are." Francis said that Bodman and Clarke walked away from their visit satisfied with the security measures protecting the VeriSign facility. Still, despite clean report cards from high-level observers, the center is likely to remain a focus of scrutiny for some time, as the most visible physical element of a global communications network that has become indispensable in government, commerce and day-to-day life. 6424 From: Marcel Date: Wed Oct 23, 2002 11:39am Subject: PGP poised for major comeback http://wireless.ittoolbox.com/news/dispnews.asp?i=83203&t=99 [Non-text portions of this message have been removed] 6425 From: Charles P. Date: Wed Oct 23, 2002 3:10pm Subject: TDR repair- Biddle 435F Any recommendations for a decent repair facility (preferable NE US) for a Biddle TDR? I have an older Biddle 435F that has a slanted crt trace. (When I tilt my head it works great). It's probably an easy repair but if I wait until I have time to look at it myself I'll be a lot grayer, if I have any hair at all. I would also like to find a copy of a manual for that unit as well... thanks Charles charles@t... Charles Patterson Global Communications www.telephonesecurity.com 6426 From: Hawkspirit Date: Wed Oct 23, 2002 7:33pm Subject: Surveillance vs Sniper It will be interesting to see if all this surveillance power will have the ability to find one sniper http://www.globalsecurity.org/intell/systems/arl.htm RC-7 Airborne Reconnaissance - Low (ARL) The Airborne Reconnaissance Low (ARL) is a multifunction, day/night, all weather reconnaissance intelligence asset developed and fielded by the Army in support of an urgent requirement for a low profile intelligence aircraft. It consists of a modified DeHavilland DHC-7 fixed-wing aircraft equipped with communications intelligence (COMINT), imagery intelligence (IMINT), and Moving Target Indicator/Synthetic Aperture Radar (MTI/SAR) mission payloads. The payloads are controlled and operated via onboard open-architecture, multi-func-tion workstations. Intelligence collected on the ARL can be analyzed and recorded on the aircraft workstations in real-time or stored on-board for post-mission processing. During multi-aircraft missions, data can be shared between cooperating aircraft via ultra high frequency (UHF) air-to-air datalink to allow multi-platform COMINT geolocation operations. The ARL system includes a variety of communications subsystems to support near-real-time dissemination of intelligence and dynamic retasking of the aircraft. The ARL system was developed to accommodate diverse mission requirements through the implementation of an open architecture, modular, reconfigurable mission sensors. These systems can be operated separately or can be used to cue each other for examining targets using different sectors of the electromagnetic spectrum. The systems are controlled from four workstations within the aircraft by the mission analysts. There are currently two configurations of the ARL system: the ARL-COMINT (ARL-C) configuration with a conventional communications intercept and direction finding (location) payload; and the ARL-Multifunction (ARL-M) configuration equipped with a combination of IMINT, COMINT, and MTI/SAR payload. Seven ARL systems had been fielded as of early 2002 [ARL-I crashed in 4QFY99]. Two ARL-Cs and one ARL-M are stationed at Ft. Bliss, TX and primarily support SOUTHCOM requirements; three ARL-Ms provide support to PACOM (Korea). One ARL-M (#5) was pending final system acceptance in early 2002, and one ARL-M (#6) is currently in production to be fielded in 3QFY03, with 1QFY02 final system acceptance of ARL-M #5 (Ft. Bliss). Projected activities in FY02 include efforts to evaluate and select imagery sensors for ARL-M#6, and fleet-wide upgrades for aircraft survivability equipment, over-the- horizon communications, SIGINT sensors, and IMINT sensors. This includes integration of measurement and signatures intelligence sensor onto ARL-Ms, and demonstration of hyperspectral imagery applications and multi-INT data fusion capabilities. Tragically, an ARL-I (Airborne Reconnaissance Low-IMINT) aircraft and all five U.S. crewmembers were lost in an accident in Colombia in July 1999. The fielding of ARL-M4 (ARL-Multifunction) aircraft in September 1999 partially offset the loss of the airframe. This aircraft contains upgraded electro-optic and infrared (EO/IR) imaging systems and a combination synthetic-aperture radar (SAR) with a moving target indicator (MTI). New equipment training on this latest aircraft culminated in a Limited User Test in the December 1999-January 2000 time frame. In May 2001 California Microwave Systems was awarded a $10 million increment as part of an estimated $27.4 million contract by the U.S. Army to begin work on a sixth RC-7B Airborne Reconnaissance Low-Multifunction aircraft. The contract included aircraft purchase and modification, prime mission equipment, nonrecurring engineering and integration and test. Work was performed in Belcamp and Hagerstown, Md., and was expected to be completed in 24 months. The system developed from a Commander in Chief U.S. Southern Command (SOUTHCOM) requirement for a manned aviation platform that could provide an IMINT and SIGINT collection capability in SOUTHCOM. The design requirements submitted stated that Airborne Reconnaissance Low should support nation-building, counternarcotics, and promote-democracy missions (now classified as stability and support operations or operations other than war) in SOUTHCOM's area of responsibility. The RC-7s were initially deployed with US Southern Command (SOUTHCOM) in 1993 to assist in counterdrug surveillance operations and later deployed to Haiti in support of US peacekeeping operations. In 1996 an RC-7 was deployed to Bosnia-Herzegovina to support NATO's IFOR peacekeeping force. Army RC-7Bs equipped with moving target indicators (MTI), synthetic aperture radar (SAR), and infrared and video sensors (IR/EO) patrol the demilitarized zone in Korea. Tasked to monitor military and civilian movement along possible North Korean invasion routes, the RC-7Bs provide both theater and tactical commanders with a vital intelligence source. When combined with intelligence data from other national and theater assets, including GR/CS, the RC-7B provides an indispensable contribution to the overall picture of the battle space. The DeHavilland of Canada Dash-7, a four-engine, turboprop, commuter airplane was chosen as the platform for SIGINT and IMINT collection. The Dash-7 aircraft's ability to operate out of austere runways, its ability to carry the mission payload and its endurance led to the Dash-7's selection. It is an extensively modified aircraft that has a higher maximum gross weight and extended range capability added in the ARL conversions. The Dash-7 is a medium sized, four engine, passenger and cargo transport. It is pressurized and can operate at up to 20,400 feet with a full mission crew. Mission duration can be up to eight hours with a range of 1,400 nautical miles at a cruising speed of 230 knots. Proposed future engines and "wet wing" fuel tanks may extend the range to 2,800 nautical miles. The cockpit has been upgraded to Airspace 2000 standards. A full complement of aircraft survivability equipment (ASE), including missile and radar warning systems, and flare dispensers (no chaff) are also installed. Kevlar armor plating protects the pilots and mission crew. ARL aircraft survivability equipment includes the AN/APR-39A(V1) radar warning receiver, the AN/AAR-47 infrared missile warning receiver, and the M-130 flare and chaff dispenser. The RC-7 is self-deployable and self-sustaining for seven to 10 days. The system is designed for forward deployment to host countries and can provide an immediate down link. It also provides direct support for wartime contingency operations and operations other than war. The SIGINT subsystem has a HF/VHF/UHF intercept and direction finding (DF) capable Electronic Support Measures (ESM) system. The IMINT subsystem is equipped with infrared line scanner (IRLS), forward looking infrared (FLIR), and daylight imaging system (DIS). The core complement of sensors may be augmented with low-light level TV (LLTV), MTI cueing radar, Synthetic Aperture Radar (SAR), multi-spectral camera, acoustic range extension system, precision targeting subsystem, and remote configuration using a direct air-to-satellite datalink. Two separate systems, the ARL-IMINT (ARL-I) and the ARL-COMINT (ARL-C), designated the O-5A and EO-5B respectively, were initially developed to meet SOUTHCOM's requirements. The ARL-C has a high-frequency, very-high frequency (VHF), and ultrahigh frequency (UHF) direction-finding (DF) capability controlled by four onboard operator stations. Dissemination is through secure UHF (line-of-sight and SATCOM) or VHF-frequency modulation communications, or in the post-mission downloads of COMINT data. ARL-I has three separate imagery systems onboard: first-generation forward-looking infrared camera turret, a day-imaging system camera turret, and an infrared line scanner. The system can send RS-170 video imagery via downlink to commercial off-the-shelf systems, such as TACLINK II, which is a portable video receiver. Two onboard operators can record information on 8-millimeter videotape or transmit "live" to the ground forces commander. In 1993, three ARL systems were deployed to SOUTHCOM, only two years after California Microwave Incorporated (CMI) received the contract, these were designated as RC-7. There were two different ARL configurations deployed to SOUTHCOM. Two ARL-COMINT (ARL-C) configured with a conventional communication intercept and direction finding (location) payload. The other system ARL-IMINT (ARL-I) configured with imagery payload consisting of a forward looking infrared (FLIR) sensor, an infrared line scanner (IRLS), and Daylight Imagery System (DIS). The RC-7 met SOUTHCOM's requirements very well, and the Army went onto request a more advanced version, designated RC-7B ARL-M (ARL Multifunction) that merged the functions of the 2 types of RC-7's. Three interim capable ARL systems were fielded to the 470th MIBN(LI), Howard AFB, Panama to support SOUTHCOM requirements. These fielded systems are in two different configurations; two for performing signals intelligence (SIGINT) missions (ARL-C) and one for performing imagery intelligence (IMINT) missions (ARL-I). Two ARL-M, multiple mission (IMINT and SIGINT) capable systems, with the addition of an MJI/SAR have been fielded to Korea to perform the I and W mission of the retiring Mohawk (OV-ID). A third ARL-M was completed in FY97. In March 1998 Raytheon Systems Company announced the sale of two additional radar systems for the ARL-M program, bringing to five the total of Raytheon HISAR radars supporting the effort. All interim capable systems will be converted to the multiple mission capable ARL-M configuration. In April 2000 California Microwave Systems (CMS), a unit of Northrop Grumman Corporation's Electronic Sensors and Systems Sector, was awarded a $3 million contract by the US Army to modify three RC-7B Airborne Reconnaissance Low-Multifunction (ARL-M) aircraft with upgraded airborne sensors. Work was performed at the CMS aircraft modification and system integration facility located in Hagerstown. The aircraft were modified over a six-month period beginning in April 2000. The Army rotated the aircraft through modification for installation and integration of the Wescam M-20 forward looking infrared sensor and the wideband Tactical Common Data Link (TCDL). This data link is the Army's newest and enables real time transmission of synthetic aperture radar images from the ARL-M. The M-20 system is a state-of-the-art electro optic sensor with a laser range finder which greatly enhances the imagery collection and real-time dissemination capability of the unit. It provides operators in the air and at the ground terminals with imagery of targets five-to-10 miles away. The addition of a real-time wideband data link creates a unique multifunction capability. The M-20 sensor upgrade standardized the Army's aircraft with other ARL-M systems available for worldwide deployment. The TCDL installation was a first for the ARL multifunction system. It provided a wideband data link for timely dissemination of intelligence products to ground stations. The RC-7B, the ARL-M (Multifunction) includes upgrades to systems already installed on ARL-I and -C, and added MTI SAR capabilities. Planned SIGINT collection improvements include the Superhawk radio intercept and DF system. Four onboard operators manipulate IMINT, SIGINT, and MTI SAR data. ARL-M has growth potential to include systems like the Communications High-Accuracy Location System Exploitation (CHALS-X), a second-generation FLIR, the Radar Ground Display System, and improvements to the airframe. Unlike similar existing systems, ARL-M does not require a dedicated ground processing facility. Most communications are via SATCOM, which can pass data to any ground station within line of sight or via satellite communications. The system processes data on board and can then pass the data, including imagery, to most of the Army's existing intelligence systems. The ARL-M system is designed to be deployable to any theater within four hours of notification. The individual aircraft can depart with the mission crew and expect to be self-sustaining for seven to ten days given minimal local logistics. A deployment of thirty days can be supported by two C-130 sorties. The Airborne Reconnaissance Low-Multifunction (ARL-M) radar provides high-resolution Synthetic Aperture Radar (SAR) images in all weather, day or night. The ARL-M is a multi-mode X-band SAR reconnaissance and surveillance system that has two modes of operation. Its Wide Area Moving Target Indicator (WAMTI) mode scans a 10,000-square-kilometer area in less than a minute, detecting ground movers, which are depicted on a cartographic map of the area. The depicted symbols provide target direction and location information. The SAR spot mode provides 1.8 meter resolution imagery of a 10-square-kilometer area. The WAMTI mode detects movers and provides a cue to invoke the spot mode for a SAR image of the same area. With its high-quality imagery and moving target indication capabilities, the ARL-M can be used for border surveillance, ground force movement, littoral region activities, land mapping, and resource management. The ARL-M program represents US domestic sales of the program known internationally as the Highly Integrated Surveillance and Reconnaissance System (HISAR). HISAR leverages military technology pioneered by Raytheon' Sensors and Electronic Systems Segment to provide all-weather, day or night synthetic aperture radar coverage from the same family of radars used on U-2 spy plane and the B-2 Bomber. The system is capable of both air-to-air and air-to-ground standoff imaging with six-meter resolution and a moving target indicator facility, making it a versatile and affordable multi-role surveillance platform. At the core of this multimission system are the SAR and the DB-110 long-range optical sensors derived from the same family of sensors used on the U-2 spy plane, as well as forward looking infrared, signals intelligence sensors, and a variety of radios, datalinks, and ground stations. Another variant of the HISAR package is in flight test for the US Department of Defense Advanced Research Projects Agency's Global Hawk High Altitude Endurance Unmanned Aerial Vehicle. In July 2002 General Atomics (GA) sold to the Army [through Science Applications International Corporation (SAIC)] three LYNX systems for installation on a US Army DH-7 Airborne Reconnaissance Low aircraft. In addition, one LYNX, previously leased, but recently purchased, had been in use with the US Army since July 2000. Newly designated the AN/APY-8 by the U.S. Military. Based on leading-edge technology developed for GA by Sandia National Laboratories, the 115-pound LYNX offers unequaled day/night, all-weather reconnaissance, surveillance and target tracking for military, civil, and commercial customers. Operating in SAR (Synthetic Aperture Radar) mode, LYNX provides photographic-like images of up to 4-inch resolution. Depending on weather conditions and imaging resolution, the sensor can operate at a range of up to 85 kilometers. LYNX can produce 1-foot resolution imagery at standoff distances of up to 55 kilometers. At 4-inch resolution, the radar can image scenes 40 kilometers away in fair weather and 25 kilometers away (about 16 miles) even through clouds and rain. The radar can detect very small changes in a scene (including footprints) by using a technique called coherent change detection. In GMTI (Ground Moving Target Indicator) mode, it can detect moving targets with up to 4-inch resolution. LYNX's CLAW system has a user-friendly interface similar to that of optical systems and is capable of cross-cueing multiple sensors with the same analysis tools as an electric light table-type program. 6427 From: James M. Atkinson Date: Thu Oct 24, 2002 2:00am Subject: Re: TDR repair- Biddle 435F At 4:10 PM -0400 10/23/02, Charles P. wrote: >Any recommendations for a decent repair facility (preferable NE US) for a >Biddle TDR? > >I have an older Biddle 435F that has a slanted crt trace. (When I tilt my >head it works great). >It's probably an easy repair but if I wait until I have time to look at it >myself I'll be a lot grayer, if I have any hair at all. > >I would also like to find a copy of a manual for that unit as well... > >thanks >Charles > > >charles@t... >Charles Patterson >Global Communications >www.telephonesecurity.com Just open the case, realign and rotate the yoke, and remelt the wax to hold it back in place. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6428 From: john schmitt Date: Wed Oct 23, 2002 0:32pm Subject: Re: accused terrorist ordered to wear GPS tracking device I'd tend to be somewhat charitable to the reporter, who's missing a little information and being a little imprecise. A GPS receiver along with an RF transmitter to relay the location would work just fine. This is probably what has been ordered, and it is in fact "monitoring his movements by satellite", it's just not communicating the results nor being sensed by the satellite. -- John ----- Original Message ----- From: "ed" To: Sent: Tuesday, October 22, 2002 8:41 PM Subject: [TSCM-L] accused terrorist ordered to wear GPS tracking device > anyone care to speculate exactly what this guy is supposed to wear? is it > an affirmative defense to say that such a device "does not and cannot > exist"? ;-) > http://www.upi.com/view.cfm?StoryID=20021022-055837-4856r > > "Under the bail conditions, Alwan would be freed, but he must be at home 24 > hours a day except for appearances at court, at his job or to seek medical > attention. He must not have access to faxes, computers or the Internet. He > must pay $20 a day for a global positioning system to monitor his movements > by satellite." > > -ed > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 6429 From: Matt Paulsen Date: Thu Oct 24, 2002 1:35pm Subject: RE: VerSign's Network This folks, is a lesson in why you don't talk about your security efforts and how you build your network or what it takes to bring it down. The original article was an open invitation to the hacker community. There's nothing gained by it. David also provided quite a lot of useful information to bypass the details of VeriSign's NOC physical security. VeriSign should seriously reconsider its access policies to facilities for newspeople. IE: None. Ironic isn't it that VeriSigns TM is 'The Value of Trust'. http://www.cnn.com/2002/TECH/internet/10/23/net.attack/index.html "The 13 servers hit this week -- key to the Internet's naming system -- are responsible for matching Internet addresses with users' requests." -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Wednesday, October 23, 2002 8:17 AM To: TSCM Subject: [TSCM-L] VerSign's Network Getting to the Root of All E-Mail Cameras monitor all activities at VerSign's Network Operations Center near Washington. (Andrea Bruce Woodall - The Washington Post) By David McGuire Newsbytes Friday, March 29, 2002; Page E05 Squatting unobtrusively on the banks of a man-made pond in an unremarkable corporate subdivision a few miles outside the Beltway, the home of the Internet's authoritative root server and master registry of dot-com addresses is virtually indistinguishable from the other red-brick office buildings that surround it. Despite its humdrum facade, VeriSign's Network Operations Center (NOC) is one of the most important physical locations in the virtual world, and since Sept. 11 it has proven irresistible to dozens of government officials who have sought to assure themselves that the Internet is safe from physical and electronic attacks. "Security and stability are like Siamese twins. You cannot have stability without security," said Mark Rippe, vice president of technical operations for VeriSign Global Registry Services. "If people can come and mess with your system, one way or another, you have no control over your systems. . . . Our primary function is the stability of the global Internet." Obscurity is the first line of defense. The building is unmarked, its address unspecified in company literature and its managers tight-lipped about disclosing driving directions or identifying markings to strangers. While the location of the building is not a true secret -- dozens if not hundreds of Internet addressing insiders know where it is -- it would be difficult for a casual vandal or criminal to stumble across it, Rippe said. Visitors start with a stroll through a metal detector and past a guard desk, much as they would in any moderately secure office building. They take an elevator to the top floor, where security is tightest and inconspicuous cameras monitor the hallways. The few entrances to the operations center and server rooms can only be reached through antechambers called "mantraps" which are outfitted with scanners that read the unique contours of visitors' palms. If an unauthorized visitor places his hand in the scanner it triggers a lockdown, sealing the intruder in one of the narrow, wood-paneled closets until security forces arrive to remove them. Beyond the first mantrap, inside the operations center, a handful of employees keep tabs on rows of computer monitors and a wall of flat screens that continuously scroll diagnostics across maps of the world that show locations of key Internet servers. The constantly updated figures map the number of requests the servers are receiving each moment, and how well they are handling the load. From here, technicians watch for unusual activity that could signal some sort of electronic attack. "We see a lot of spikes or peaks or things that might indicate [denial of service] attacks," Rippe said. Those blips represent a much more substantial security concern for the addressing officials than do the threat of physical attacks, Rippe said. From the operations center, technicians can take steps to counter threatening electronic activity, Rippe added. Adjoining the operations center, behind another mantrap, are twin rooms that house the essential computers that serve as the heart of the Net. Here, hundreds of whirring computer fans and an industrial-strength air conditioner drown out anything quieter than a close-range shout. Black, seven-foot-tall computer server towers are aligned in rows that stretch nearly the length of the room. The white floor is slotted to allow airflow and a steady, conditioned breeze streams up from below, making all metal surfaces in the room cool to the touch. Small dome-like security cameras, similar to those used in casinos, pock the white ceiling, evenly spaced between chemical fire suppression devices. There isn't a cranny of the server area where a person could hide from surveillance. Between the server hedgerows are several equally tall storage units, where the continually updated master lists of the addresses registered in dot-com, dot-net and dot-org are stored. And tucked away in a less-traveled back corner of one of the server rooms, behind the door of a black tower that looks no different than any of the others, is the principal reason for all the precautions: the A root server. Most people envision the Internet as a global network that resides on no single physical system or network of systems. While that picture is roughly correct, key pieces of the Internet's technological backbone are concentrated in a handful of physical locations around the world. The Domain Name System (DNS) makes the Web easy to navigate by translating long Internet protocol (IP) numbers into memorable Web and e-mail addresses. It relies on a hierarchy of physical root servers to inform computers connected to the Internet where they need to look to find specific locations online. At the top of that hierarchy is the A root server, which every 12 hours generates a "zone" file, which in turn tells a dozen other root servers spread around the world what Internet domains exist and where they can be found. One rung below the root servers in the Internet hierarchy are the servers that house Internet domains such as dot-com, dot-biz and dot-info. Three of the largest and most widely used of those domains -- dot-com, dot-org and dot-net -- are run alongside the A root server at the Network Operations Center. VeriSign manages the A root server and dot-com registry under contracts with the Commerce Department and global Internet addressing authorities. But despite the precautions that go into protecting the assets in the facility, Rippe said the Internet would not be irreparably harmed if the building were to vaporize tomorrow. "The last thing I'd want someone to think is that they could put a bomb around their waist and hug the A root and think they're going to significantly impact the Internet," Rippe said. Rippe said that while such an attack could kill many employees, the Internet's addressing system is designed to withstand the destruction of much of the physical infrastructure that houses it. The DNS is built so that eight or more of the world's 13 master root servers would have to fail before ordinary Internet users started to see slowdowns, according to John Crain, manager of technical operations for the Internet Corporation for Assigned Names and Numbers (ICANN). ICANN manages the DNS and sets policies for registry operators and domain name retailers. "Theoretically, if 'A' were to disappear, we could pick it up from one of the other servers," Crain said. "Moving the place where the zone is picked up is very simple." Although the functions of the A root server could be moved elsewhere, Rippe said that VeriSign is well aware that it makes a much more visible target than the other root servers, which perform their functions in comparative anonymity around the world. Rippe said that he is always cognizant of the potential threat facing the building. High-ranking U.S. officials have also started taking a greater interest in the security of the complex. After Sept. 11, as agencies and departments throughout the federal government began reexamining the security of the critical infrastructure under their jurisdictions, VeriSign hosted a slew of high-ranking visitors. While the Web may be worldwide, American scientists relying on U.S. government funding created the technology at the core of the Internet and its global addressing system. The Internet may be a global resource, but much of its infrastructure is still ultimately controlled by the U.S. government. In recent years, the government has ceded day-to-day management of the addressing system to the more internationally representative ICANN, but the Commerce Department still has final say in any changes made to the DNS. Deputy Commerce Secretary Sam Bodman and White House electronic security adviser Richard Clarke took a guided tour of the center in November. "The Internet is a critical component of our economy," said Commerce Department spokesman Trevor Francis. "The reason why you're seeing such a focus on VeriSign is that the safety and the integrity of these systems needs to be analyzed and needs to be improved upon regardless of how safe they currently are." Francis said that Bodman and Clarke walked away from their visit satisfied with the security measures protecting the VeriSign facility. Still, despite clean report cards from high-level observers, the center is likely to remain a focus of scrutiny for some time, as the most visible physical element of a global communications network that has become indispensable in government, commerce and day-to-day life. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6430 From: Matt Paulsen Date: Thu Oct 24, 2002 2:18pm Subject: crypto legal quandary Question. To my knowledge, under current law, developers of cryptographic systems need to pass their systems to the NSA before being exported for analysis, or before being shown to a foreigner. What if the developer of the cryptographic system is a foreigner working under visa in the US and has been working with high security cryptographic systems with the NSA and US Army and others via things such as DARPA already and wants to setup their own cryptographic system separate from their current works. 6431 From: Matt Paulsen Date: Thu Oct 24, 2002 8:20pm Subject: RE: VerSign's Network The DoS attack described in CNN's article probably uses tcp 445 for Microsoft-ds on compromised Win2K boxes. We've seen a large spike from this attack coming from Comcast, UUNet and other broadband providers in the last few days. To fix http://support.microsoft.com/default.aspx?scid=kb;en-us;Q320751 -----Original Message----- From: Matt Paulsen [mailto:mpaulsen6@a...] Sent: Thursday, October 24, 2002 11:35 AM To: TSCM Subject: RE: [TSCM-L] VerSign's Network This folks, is a lesson in why you don't talk about your security efforts and how you build your network or what it takes to bring it down. The original article was an open invitation to the hacker community. There's nothing gained by it. David also provided quite a lot of useful information to bypass the details of VeriSign's NOC physical security. VeriSign should seriously reconsider its access policies to facilities for newspeople. IE: None. Ironic isn't it that VeriSigns TM is 'The Value of Trust'. http://www.cnn.com/2002/TECH/internet/10/23/net.attack/index.html "The 13 servers hit this week -- key to the Internet's naming system -- are responsible for matching Internet addresses with users' requests." -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Wednesday, October 23, 2002 8:17 AM To: TSCM Subject: [TSCM-L] VerSign's Network Getting to the Root of All E-Mail Cameras monitor all activities at VerSign's Network Operations Center near Washington. (Andrea Bruce Woodall - The Washington Post) By David McGuire Newsbytes Friday, March 29, 2002; Page E05 Squatting unobtrusively on the banks of a man-made pond in an unremarkable corporate subdivision a few miles outside the Beltway, the home of the Internet's authoritative root server and master registry of dot-com addresses is virtually indistinguishable from the other red-brick office buildings that surround it. Despite its humdrum facade, VeriSign's Network Operations Center (NOC) is one of the most important physical locations in the virtual world, and since Sept. 11 it has proven irresistible to dozens of government officials who have sought to assure themselves that the Internet is safe from physical and electronic attacks. "Security and stability are like Siamese twins. You cannot have stability without security," said Mark Rippe, vice president of technical operations for VeriSign Global Registry Services. "If people can come and mess with your system, one way or another, you have no control over your systems. . . . Our primary function is the stability of the global Internet." Obscurity is the first line of defense. The building is unmarked, its address unspecified in company literature and its managers tight-lipped about disclosing driving directions or identifying markings to strangers. While the location of the building is not a true secret -- dozens if not hundreds of Internet addressing insiders know where it is -- it would be difficult for a casual vandal or criminal to stumble across it, Rippe said. Visitors start with a stroll through a metal detector and past a guard desk, much as they would in any moderately secure office building. They take an elevator to the top floor, where security is tightest and inconspicuous cameras monitor the hallways. The few entrances to the operations center and server rooms can only be reached through antechambers called "mantraps" which are outfitted with scanners that read the unique contours of visitors' palms. If an unauthorized visitor places his hand in the scanner it triggers a lockdown, sealing the intruder in one of the narrow, wood-paneled closets until security forces arrive to remove them. Beyond the first mantrap, inside the operations center, a handful of employees keep tabs on rows of computer monitors and a wall of flat screens that continuously scroll diagnostics across maps of the world that show locations of key Internet servers. The constantly updated figures map the number of requests the servers are receiving each moment, and how well they are handling the load. From here, technicians watch for unusual activity that could signal some sort of electronic attack. "We see a lot of spikes or peaks or things that might indicate [denial of service] attacks," Rippe said. Those blips represent a much more substantial security concern for the addressing officials than do the threat of physical attacks, Rippe said. From the operations center, technicians can take steps to counter threatening electronic activity, Rippe added. Adjoining the operations center, behind another mantrap, are twin rooms that house the essential computers that serve as the heart of the Net. Here, hundreds of whirring computer fans and an industrial-strength air conditioner drown out anything quieter than a close-range shout. Black, seven-foot-tall computer server towers are aligned in rows that stretch nearly the length of the room. The white floor is slotted to allow airflow and a steady, conditioned breeze streams up from below, making all metal surfaces in the room cool to the touch. Small dome-like security cameras, similar to those used in casinos, pock the white ceiling, evenly spaced between chemical fire suppression devices. There isn't a cranny of the server area where a person could hide from surveillance. Between the server hedgerows are several equally tall storage units, where the continually updated master lists of the addresses registered in dot-com, dot-net and dot-org are stored. And tucked away in a less-traveled back corner of one of the server rooms, behind the door of a black tower that looks no different than any of the others, is the principal reason for all the precautions: the A root server. Most people envision the Internet as a global network that resides on no single physical system or network of systems. While that picture is roughly correct, key pieces of the Internet's technological backbone are concentrated in a handful of physical locations around the world. The Domain Name System (DNS) makes the Web easy to navigate by translating long Internet protocol (IP) numbers into memorable Web and e-mail addresses. It relies on a hierarchy of physical root servers to inform computers connected to the Internet where they need to look to find specific locations online. At the top of that hierarchy is the A root server, which every 12 hours generates a "zone" file, which in turn tells a dozen other root servers spread around the world what Internet domains exist and where they can be found. One rung below the root servers in the Internet hierarchy are the servers that house Internet domains such as dot-com, dot-biz and dot-info. Three of the largest and most widely used of those domains -- dot-com, dot-org and dot-net -- are run alongside the A root server at the Network Operations Center. VeriSign manages the A root server and dot-com registry under contracts with the Commerce Department and global Internet addressing authorities. But despite the precautions that go into protecting the assets in the facility, Rippe said the Internet would not be irreparably harmed if the building were to vaporize tomorrow. "The last thing I'd want someone to think is that they could put a bomb around their waist and hug the A root and think they're going to significantly impact the Internet," Rippe said. Rippe said that while such an attack could kill many employees, the Internet's addressing system is designed to withstand the destruction of much of the physical infrastructure that houses it. The DNS is built so that eight or more of the world's 13 master root servers would have to fail before ordinary Internet users started to see slowdowns, according to John Crain, manager of technical operations for the Internet Corporation for Assigned Names and Numbers (ICANN). ICANN manages the DNS and sets policies for registry operators and domain name retailers. "Theoretically, if 'A' were to disappear, we could pick it up from one of the other servers," Crain said. "Moving the place where the zone is picked up is very simple." Although the functions of the A root server could be moved elsewhere, Rippe said that VeriSign is well aware that it makes a much more visible target than the other root servers, which perform their functions in comparative anonymity around the world. Rippe said that he is always cognizant of the potential threat facing the building. High-ranking U.S. officials have also started taking a greater interest in the security of the complex. After Sept. 11, as agencies and departments throughout the federal government began reexamining the security of the critical infrastructure under their jurisdictions, VeriSign hosted a slew of high-ranking visitors. While the Web may be worldwide, American scientists relying on U.S. government funding created the technology at the core of the Internet and its global addressing system. The Internet may be a global resource, but much of its infrastructure is still ultimately controlled by the U.S. government. In recent years, the government has ceded day-to-day management of the addressing system to the more internationally representative ICANN, but the Commerce Department still has final say in any changes made to the DNS. Deputy Commerce Secretary Sam Bodman and White House electronic security adviser Richard Clarke took a guided tour of the center in November. "The Internet is a critical component of our economy," said Commerce Department spokesman Trevor Francis. "The reason why you're seeing such a focus on VeriSign is that the safety and the integrity of these systems needs to be analyzed and needs to be improved upon regardless of how safe they currently are." Francis said that Bodman and Clarke walked away from their visit satisfied with the security measures protecting the VeriSign facility. Still, despite clean report cards from high-level observers, the center is likely to remain a focus of scrutiny for some time, as the most visible physical element of a global communications network that has become indispensable in government, commerce and day-to-day life. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6432 From: Robert Dyk Date: Fri Oct 25, 2002 7:41am Subject: Oregon CCTV A client of mine is seeking a respectable CCTV dealer capable of multi camera covert installation with TCP/IP broadband remote transmission devices, (no pc's on xmit side allowed) for quotation on an installation in Brookings, Oregon. If anyone on the list can help, please reply off list. Thanks in advance, Robert Dyk dyk@c... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. 6433 From: ed Date: Thu Oct 24, 2002 8:31pm Subject: Prostitutes Steal U.S. Laptop w/classified data Wow...$100K for a laptop, digital camera, and speakers. I wonder if that figure included their professional fees? IN THE MILITARY Prostitutes steal U.S. laptop Soldiers invite women to room, wake up to find classified software gone Posted: October 24, 2002 1:00 a.m. Eastern Editor's note: WorldNetDaily.com has entered into an historic content-sharing agreement with Pravda online, the largest Russian cyber-news source on the Internet. Pravda.ru provides English versions of its stories to WND on an exclusive basis, while posting WorldNetDaily stories and columns on its newssite in both English and Russian. © 2002 WorldNetDaily.com A laptop computer owned by the U.S. Army is missing, and its disappearance is being blamed on prostitutes who apparently stole the device from American soldiers, reports Pravda online. The soldiers are computer programmers stationed in Germany. They, along with other members of the Army's Fifth Corps, are conducting military exercises in Poland. That's where the three programmers apparently met up with the prostitutes. The soldiers reportedly invited the women to their rooms for a drink, and discovered the computer missing when they awoke the next morning. The prostitutes also stole a digital camera and a pair of speakers, with the total loss estimated at more than $100,000. The hardware can be replaced, but it's the intelligence-laden software which concerns Pentagon officials. 6434 From: Ben Evans Date: Thu Oct 24, 2002 8:42pm Subject: RE: VerSign's Network Root servers use Unix, so the old port 445 trick wouldn't have any effect. -Ben At 06:20 PM 10/24/2002 -0700, you wrote: >The DoS attack described in CNN's article probably uses tcp 445 for >Microsoft-ds on compromised Win2K boxes. We've seen a large spike from this >attack coming from Comcast, UUNet and other broadband providers in the last >few days. > >To fix http://support.microsoft.com/default.aspx?scid=kb;en-us;Q320751 > >-----Original Message----- >From: Matt Paulsen [mailto:mpaulsen6@a...] >Sent: Thursday, October 24, 2002 11:35 AM >To: TSCM >Subject: RE: [TSCM-L] VerSign's Network > > >This folks, is a lesson in why you don't talk about your security efforts >and how you build your network or what it takes to bring it down. The >original article was an open invitation to the hacker community. There's >nothing gained by it. David also provided quite a lot of useful information >to bypass the details of VeriSign's NOC physical security. VeriSign should >seriously reconsider its access policies to facilities for newspeople. IE: >None. Ironic isn't it that VeriSigns TM is 'The Value of Trust'. > >http://www.cnn.com/2002/TECH/internet/10/23/net.attack/index.html >"The 13 servers hit this week -- key to the Internet's naming system -- are >responsible for matching Internet addresses with users' requests." > > >-----Original Message----- >From: Hawkspirit [mailto:hawkspirit@e...] >Sent: Wednesday, October 23, 2002 8:17 AM >To: TSCM >Subject: [TSCM-L] VerSign's Network > > > > >Getting to the Root of All E-Mail > > Cameras monitor all activities at VerSign's Network Operations Center >near Washington. (Andrea Bruce Woodall - The Washington Post) > >By David McGuire >Newsbytes >Friday, March 29, 2002; Page E05 > > >Squatting unobtrusively on the banks of a man-made pond in an unremarkable >corporate subdivision a few miles outside the Beltway, the home of the >Internet's authoritative root server and master registry of dot-com >addresses is virtually indistinguishable from the other red-brick office >buildings that surround it. > >Despite its humdrum facade, VeriSign's Network Operations Center (NOC) is >one of the most important physical locations in the virtual world, and >since Sept. 11 it has proven irresistible to dozens of government officials >who have sought to assure themselves that the Internet is safe from >physical and electronic attacks. > >"Security and stability are like Siamese twins. You cannot have stability >without security," said Mark Rippe, vice president of technical operations >for VeriSign Global Registry Services. "If people can come and mess with >your system, one way or another, you have no control over your systems. . . >. Our primary function is the stability of the global Internet." > >Obscurity is the first line of defense. The building is unmarked, its >address unspecified in company literature and its managers tight-lipped >about disclosing driving directions or identifying markings to strangers. > >While the location of the building is not a true secret -- dozens if not >hundreds of Internet addressing insiders know where it is -- it would be >difficult for a casual vandal or criminal to stumble across it, Rippe said. > >Visitors start with a stroll through a metal detector and past a guard >desk, much as they would in any moderately secure office building. They >take an elevator to the top floor, where security is tightest and >inconspicuous cameras monitor the hallways. The few entrances to the >operations center and server rooms can only be reached through antechambers >called "mantraps" which are outfitted with scanners that read the unique >contours of visitors' palms. > >If an unauthorized visitor places his hand in the scanner it triggers a >lockdown, sealing the intruder in one of the narrow, wood-paneled closets >until security forces arrive to remove them. > >Beyond the first mantrap, inside the operations center, a handful of >employees keep tabs on rows of computer monitors and a wall of flat screens >that continuously scroll diagnostics across maps of the world that show >locations of key Internet servers. The constantly updated figures map the >number of requests the servers are receiving each moment, and how well they >are handling the load. > > From here, technicians watch for unusual activity that could signal some >sort of electronic attack. > >"We see a lot of spikes or peaks or things that might indicate [denial of >service] attacks," Rippe said. Those blips represent a much more >substantial security concern for the addressing officials than do the >threat of physical attacks, Rippe said. From the operations center, >technicians can take steps to counter threatening electronic activity, >Rippe added. > >Adjoining the operations center, behind another mantrap, are twin rooms >that house the essential computers that serve as the heart of the Net. >Here, hundreds of whirring computer fans and an industrial-strength air >conditioner drown out anything quieter than a close-range shout. Black, >seven-foot-tall computer server towers are aligned in rows that stretch >nearly the length of the room. The white floor is slotted to allow airflow >and a steady, conditioned breeze streams up from below, making all metal >surfaces in the room cool to the touch. Small dome-like security cameras, >similar to those used in casinos, pock the white ceiling, evenly spaced >between chemical fire suppression devices. There isn't a cranny of the >server area where a person could hide from surveillance. > >Between the server hedgerows are several equally tall storage units, where >the continually updated master lists of the addresses registered in >dot-com, dot-net and dot-org are stored. > >And tucked away in a less-traveled back corner of one of the server rooms, >behind the door of a black tower that looks no different than any of the >others, is the principal reason for all the precautions: the A root server. > >Most people envision the Internet as a global network that resides on no >single physical system or network of systems. While that picture is roughly >correct, key pieces of the Internet's technological backbone are >concentrated in a handful of physical locations around the world. > >The Domain Name System (DNS) makes the Web easy to navigate by translating >long Internet protocol (IP) numbers into memorable Web and e-mail >addresses. It relies on a hierarchy of physical root servers to inform >computers connected to the Internet where they need to look to find >specific locations online. > >At the top of that hierarchy is the A root server, which every 12 hours >generates a "zone" file, which in turn tells a dozen other root servers >spread around the world what Internet domains exist and where they can be >found. > >One rung below the root servers in the Internet hierarchy are the servers >that house Internet domains such as dot-com, dot-biz and dot-info. Three of >the largest and most widely used of those domains -- dot-com, dot-org and >dot-net -- are run alongside the A root server at the Network Operations >Center. > >VeriSign manages the A root server and dot-com registry under contracts >with the Commerce Department and global Internet addressing authorities. > >But despite the precautions that go into protecting the assets in the >facility, Rippe said the Internet would not be irreparably harmed if the >building were to vaporize tomorrow. > >"The last thing I'd want someone to think is that they could put a bomb >around their waist and hug the A root and think they're going to >significantly impact the Internet," Rippe said. > >Rippe said that while such an attack could kill many employees, the >Internet's addressing system is designed to withstand the destruction of >much of the physical infrastructure that houses it. > >The DNS is built so that eight or more of the world's 13 master root >servers would have to fail before ordinary Internet users started to see >slowdowns, according to John Crain, manager of technical operations for the >Internet Corporation for Assigned Names and Numbers (ICANN). > >ICANN manages the DNS and sets policies for registry operators and domain >name retailers. > >"Theoretically, if 'A' were to disappear, we could pick it up from one of >the other servers," Crain said. "Moving the place where the zone is picked >up is very simple." >Although the functions of the A root server could be moved elsewhere, Rippe >said that VeriSign is well aware that it makes a much more visible target >than the other root servers, which perform their functions in comparative >anonymity around the world. >Rippe said that he is always cognizant of the potential threat facing the >building. >High-ranking U.S. officials have also started taking a greater interest in >the security of the complex. After Sept. 11, as agencies and departments >throughout the federal government began reexamining the security of the >critical infrastructure under their jurisdictions, VeriSign hosted a slew >of high-ranking visitors. >While the Web may be worldwide, American scientists relying on U.S. >government funding created the technology at the core of the Internet and >its global addressing system. The Internet may be a global resource, but >much of its infrastructure is still ultimately controlled by the U.S. >government. >In recent years, the government has ceded day-to-day management of the >addressing system to the more internationally representative ICANN, but the >Commerce Department still has final say in any changes made to the DNS. >Deputy Commerce Secretary Sam Bodman and White House electronic security >adviser Richard Clarke took a guided tour of the center in November. >"The Internet is a critical component of our economy," said Commerce >Department spokesman Trevor Francis. "The reason why you're seeing such a >focus on VeriSign is that the safety and the integrity of these systems >needs to be analyzed and needs to be improved upon regardless of how safe >they currently are." >Francis said that Bodman and Clarke walked away from their visit satisfied >with the security measures protecting the VeriSign facility. >Still, despite clean report cards from high-level observers, the center is >likely to remain a focus of scrutiny for some time, as the most visible >physical element of a global communications network that has become >indispensable in government, commerce and day-to-day life. > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ----------------------------------------------- Counter Intelligence Solutions Group, Inc. http://www.cisginc.com/ Corporate Website http://www.spywholesalers.com/ Covert Cameras http://www.slantback.com Just for fun 585.889.2321(v) 585.889.0823(f) ----------------------------------------------- 6435 From: Dmitri Date: Thu Oct 24, 2002 7:39pm Subject: $27.5 million Don't know if this went out already...thought y'all might be interested... 10 October 2002. Thanks to T. FBI Awards SAIC Secure Business Solutions $27.5 Million! DATE: Thursday, 10/10/2002 CATEGORY: Announcements & Events SAIC CONTACT: Shannon M. Seybold On October 1, 2002, the Secure Business Solutions group of SAIC was awarded a three (3) year contract in the amount of $27,452,892.00 dollars by the SPAWAR Systems Center, Charleston, SC. This contract provides engineering and technical services in support of the FBI Communications Assistance Law Enforcement Act (CALEA). SAIC's Secure Business Solutions protects today's government and commercial enterprises by building networks and business systems from a security point of view. Our 300+ engineers can assess, test, design, certify, deploy, and manage solutions for information and physical security. -- Dmitri D'Alessandro Law Enforcement Against Prohibition mailto://dmitri@leap.cc http://www.leap.cc 860-301-0944 Mobile 860-344-9021 Office "You can get over an addiction but you will never get over a conviction." [Non-text portions of this message have been removed] 6436 From: Date: Thu Oct 24, 2002 9:54pm Subject: Babies R Us beats the spy shops......( Just happened to notice after a trip to the local "BabiesRusÆ,the hefty amount of gadgets available for the "technically oriented mommy's.I counted 7 different Fisher Price Baby Monitors,3 operated on 900mhz,and the other 4 were assumed to be on 49 mhz.In addition,there was one off the wall brand,and 3 sony models available,all working 900, All the 900 mhz models of all brands were claiming ranges of 500 ft with the others claiming to be good for up to 400 ft. Part 15 compliance was evident on all. In addition there were small single wireless cam setups, w/ ir leds, and audio with monitors for under 150 bucks. The Fisher price baby monitor models operated on a 6vdc 100ma wall wart. The others only mentioned power adapters included. Never having time to open one up I picked up a FP "super sensitive" model. Price? $16.99 Popped it open on the bench......This thing had smt components on a board the size of a 100 cigarette pack,was 3/4 of an inch thick(due to tall parts, mostly capacitors, and 2 crystals)had 2 external wires feeding an fet mike. There were 2 channels for tx,and pots for freq adjustment as well as a single resistor in line to the antenna feed......very easy to modify.... Of course I was interrogated at home in reference to the Babies R Us bag I had left in my vehicle, but alas RnD has its downfalls, and arguments Figured I'd pass the results on....... M Mitch Davis TSCM/Special Operations Group,Inc. Nashville,TN. USA e-mail: mitchd@t... website: www.tscmusa.com (615)837-9933 6437 From: William Knowles Date: Fri Oct 25, 2002 7:33pm Subject: [Boing Boing Blog] A Faraday cage in a bag (fwd) ---------- Forwarded message ---------- Date: Fri, 25 Oct 2002 16:16:18 -0400 From: R. A. Hettinga To: Digital Bearer Settlement List Subject: [Boing Boing Blog] A Faraday cage in a bag --- begin forwarded text Status: RO To: boingboing-mailblog@yahoogroups.com From: "Cory Doctorow" Mailing-List: list boingboing-mailblog@yahoogroups.com; contact boingboing-mailblog-owner@yahoogroups.com Delivered-To: mailing list boingboing-mailblog@yahoogroups.com Date: Fri, 25 Oct 2002 13:06:04 -0700 Subject: [Boing Boing Blog] A Faraday cage in a bag Reply-To: boingboing-mailblog-owner@yahoogroups.com [...] Always-on radio devices -- RFID tags, two-way pagers, EZ-passes -- are really cool, except when they end up compromising your privacy, beeping at an importune moment, or disrupting your electronics. Enter the Mobile Cloak, a Faraday-cage-bag. Drop your wireless devices into the bag and biff-bam, they're off the grid. Link Discuss (Thanks, Stephen!) -- Posted by Cory Doctorow to Boing Boing Blog at 10/25/2002 12:58:49 PM [...] --- end forwarded text ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' 6438 From: Matt Paulsen Date: Fri Oct 25, 2002 10:01pm Subject: RE: VerSign's Network I'm saying their attacking the servers with compromised systems and sending 10K packets at it. Not attempting to compromise it. Different ballgame, os doesn't matter. -----Original Message----- From: Ben Evans [mailto:ben@c...] Sent: Thursday, October 24, 2002 6:43 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] VerSign's Network Root servers use Unix, so the old port 445 trick wouldn't have any effect. -Ben At 06:20 PM 10/24/2002 -0700, you wrote: >The DoS attack described in CNN's article probably uses tcp 445 for >Microsoft-ds on compromised Win2K boxes. We've seen a large spike from this >attack coming from Comcast, UUNet and other broadband providers in the last >few days. > >To fix http://support.microsoft.com/default.aspx?scid=kb;en-us;Q320751 > >-----Original Message----- >From: Matt Paulsen [mailto:mpaulsen6@a...] >Sent: Thursday, October 24, 2002 11:35 AM >To: TSCM >Subject: RE: [TSCM-L] VerSign's Network > > >This folks, is a lesson in why you don't talk about your security efforts >and how you build your network or what it takes to bring it down. The >original article was an open invitation to the hacker community. There's >nothing gained by it. David also provided quite a lot of useful information >to bypass the details of VeriSign's NOC physical security. VeriSign should >seriously reconsider its access policies to facilities for newspeople. IE: >None. Ironic isn't it that VeriSigns TM is 'The Value of Trust'. > >http://www.cnn.com/2002/TECH/internet/10/23/net.attack/index.html >"The 13 servers hit this week -- key to the Internet's naming system -- are >responsible for matching Internet addresses with users' requests." > > >-----Original Message----- >From: Hawkspirit [mailto:hawkspirit@e...] >Sent: Wednesday, October 23, 2002 8:17 AM >To: TSCM >Subject: [TSCM-L] VerSign's Network > > > > >Getting to the Root of All E-Mail > > Cameras monitor all activities at VerSign's Network Operations Center >near Washington. (Andrea Bruce Woodall - The Washington Post) > >By David McGuire >Newsbytes >Friday, March 29, 2002; Page E05 > > >Squatting unobtrusively on the banks of a man-made pond in an unremarkable >corporate subdivision a few miles outside the Beltway, the home of the >Internet's authoritative root server and master registry of dot-com >addresses is virtually indistinguishable from the other red-brick office >buildings that surround it. > >Despite its humdrum facade, VeriSign's Network Operations Center (NOC) is >one of the most important physical locations in the virtual world, and >since Sept. 11 it has proven irresistible to dozens of government officials >who have sought to assure themselves that the Internet is safe from >physical and electronic attacks. > >"Security and stability are like Siamese twins. You cannot have stability >without security," said Mark Rippe, vice president of technical operations >for VeriSign Global Registry Services. "If people can come and mess with >your system, one way or another, you have no control over your systems. . . >. Our primary function is the stability of the global Internet." > >Obscurity is the first line of defense. The building is unmarked, its >address unspecified in company literature and its managers tight-lipped >about disclosing driving directions or identifying markings to strangers. > >While the location of the building is not a true secret -- dozens if not >hundreds of Internet addressing insiders know where it is -- it would be >difficult for a casual vandal or criminal to stumble across it, Rippe said. > >Visitors start with a stroll through a metal detector and past a guard >desk, much as they would in any moderately secure office building. They >take an elevator to the top floor, where security is tightest and >inconspicuous cameras monitor the hallways. The few entrances to the >operations center and server rooms can only be reached through antechambers >called "mantraps" which are outfitted with scanners that read the unique >contours of visitors' palms. > >If an unauthorized visitor places his hand in the scanner it triggers a >lockdown, sealing the intruder in one of the narrow, wood-paneled closets >until security forces arrive to remove them. > >Beyond the first mantrap, inside the operations center, a handful of >employees keep tabs on rows of computer monitors and a wall of flat screens >that continuously scroll diagnostics across maps of the world that show >locations of key Internet servers. The constantly updated figures map the >number of requests the servers are receiving each moment, and how well they >are handling the load. > > From here, technicians watch for unusual activity that could signal some >sort of electronic attack. > >"We see a lot of spikes or peaks or things that might indicate [denial of >service] attacks," Rippe said. Those blips represent a much more >substantial security concern for the addressing officials than do the >threat of physical attacks, Rippe said. From the operations center, >technicians can take steps to counter threatening electronic activity, >Rippe added. > >Adjoining the operations center, behind another mantrap, are twin rooms >that house the essential computers that serve as the heart of the Net. >Here, hundreds of whirring computer fans and an industrial-strength air >conditioner drown out anything quieter than a close-range shout. Black, >seven-foot-tall computer server towers are aligned in rows that stretch >nearly the length of the room. The white floor is slotted to allow airflow >and a steady, conditioned breeze streams up from below, making all metal >surfaces in the room cool to the touch. Small dome-like security cameras, >similar to those used in casinos, pock the white ceiling, evenly spaced >between chemical fire suppression devices. There isn't a cranny of the >server area where a person could hide from surveillance. > >Between the server hedgerows are several equally tall storage units, where >the continually updated master lists of the addresses registered in >dot-com, dot-net and dot-org are stored. > >And tucked away in a less-traveled back corner of one of the server rooms, >behind the door of a black tower that looks no different than any of the >others, is the principal reason for all the precautions: the A root server. > >Most people envision the Internet as a global network that resides on no >single physical system or network of systems. While that picture is roughly >correct, key pieces of the Internet's technological backbone are >concentrated in a handful of physical locations around the world. > >The Domain Name System (DNS) makes the Web easy to navigate by translating >long Internet protocol (IP) numbers into memorable Web and e-mail >addresses. It relies on a hierarchy of physical root servers to inform >computers connected to the Internet where they need to look to find >specific locations online. > >At the top of that hierarchy is the A root server, which every 12 hours >generates a "zone" file, which in turn tells a dozen other root servers >spread around the world what Internet domains exist and where they can be >found. > >One rung below the root servers in the Internet hierarchy are the servers >that house Internet domains such as dot-com, dot-biz and dot-info. Three of >the largest and most widely used of those domains -- dot-com, dot-org and >dot-net -- are run alongside the A root server at the Network Operations >Center. > >VeriSign manages the A root server and dot-com registry under contracts >with the Commerce Department and global Internet addressing authorities. > >But despite the precautions that go into protecting the assets in the >facility, Rippe said the Internet would not be irreparably harmed if the >building were to vaporize tomorrow. > >"The last thing I'd want someone to think is that they could put a bomb >around their waist and hug the A root and think they're going to >significantly impact the Internet," Rippe said. > >Rippe said that while such an attack could kill many employees, the >Internet's addressing system is designed to withstand the destruction of >much of the physical infrastructure that houses it. > >The DNS is built so that eight or more of the world's 13 master root >servers would have to fail before ordinary Internet users started to see >slowdowns, according to John Crain, manager of technical operations for the >Internet Corporation for Assigned Names and Numbers (ICANN). > >ICANN manages the DNS and sets policies for registry operators and domain >name retailers. > >"Theoretically, if 'A' were to disappear, we could pick it up from one of >the other servers," Crain said. "Moving the place where the zone is picked >up is very simple." >Although the functions of the A root server could be moved elsewhere, Rippe >said that VeriSign is well aware that it makes a much more visible target >than the other root servers, which perform their functions in comparative >anonymity around the world. >Rippe said that he is always cognizant of the potential threat facing the >building. >High-ranking U.S. officials have also started taking a greater interest in >the security of the complex. After Sept. 11, as agencies and departments >throughout the federal government began reexamining the security of the >critical infrastructure under their jurisdictions, VeriSign hosted a slew >of high-ranking visitors. >While the Web may be worldwide, American scientists relying on U.S. >government funding created the technology at the core of the Internet and >its global addressing system. The Internet may be a global resource, but >much of its infrastructure is still ultimately controlled by the U.S. >government. >In recent years, the government has ceded day-to-day management of the >addressing system to the more internationally representative ICANN, but the >Commerce Department still has final say in any changes made to the DNS. >Deputy Commerce Secretary Sam Bodman and White House electronic security >adviser Richard Clarke took a guided tour of the center in November. >"The Internet is a critical component of our economy," said Commerce >Department spokesman Trevor Francis. "The reason why you're seeing such a >focus on VeriSign is that the safety and the integrity of these systems >needs to be analyzed and needs to be improved upon regardless of how safe >they currently are." >Francis said that Bodman and Clarke walked away from their visit satisfied >with the security measures protecting the VeriSign facility. >Still, despite clean report cards from high-level observers, the center is >likely to remain a focus of scrutiny for some time, as the most visible >physical element of a global communications network that has become >indispensable in government, commerce and day-to-day life. > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ----------------------------------------------- Counter Intelligence Solutions Group, Inc. http://www.cisginc.com/ Corporate Website http://www.spywholesalers.com/ Covert Cameras http://www.slantback.com Just for fun 585.889.2321(v) 585.889.0823(f) ----------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6439 From: Date: Sun Oct 27, 2002 4:09am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County, San Francisco, Silicon Valley, San Jose, San Diego, and Las Vegas. (Also, anywhere in a thousand mile radius from Los Angeles.) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 6440 From: Date: Sun Oct 27, 2002 4:09am Subject: File - mission.txt TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6441 From: Date: Fri Oct 25, 2002 7:53pm Subject: RE: Babies R Us beats the spy shops......( To increase its tx performance,and make it more "concealable"primarily...... Baby monitors seem to appear in many places besides the little ones crib and "Elmo" for many reasons.......sometimes..... Although we like to keep abreast of the many frequencies utilized in our wonderful rf spectrum,the FCC does a good job of maintaining a full scale rodeo in bandplan allocation.I figured I'd pitch in and see how the simpler items were managing through all the changes... Simple products are getting better Note: The FP Super Sensitive model was tx'ing "full and quieting"(LC for the mil spec types) at 49.845 and 49.890 mhz with a dipole soldered on the ant lug and exceeded its specs (400ft) w no other mods.... Have a great weekend! MD Mitch Davis TSCM/Special Operations Group,Inc. Nashville,TN. USA e-mail: mitchd@t... website: www.tscmusa.com (615)837-9933 -----Original Message----- From: mcerralvo@a... [mailto:mcerralvo@a...] Sent: Friday, October 25, 2002 3:55 PM To: MitchD1@c... Subject: Re: [TSCM-L] Babies R Us beats the spy shops......( Hi, I read your review of the guts of the baby monitors. Why would anyone want to modify them? I'm not too knowledgeable in this. Regards, Matthew 6442 From: Date: Fri Oct 25, 2002 8:07pm Subject: RE: Prostitutes Steal U.S. Laptop w/classified data Army laptop with warez $99,000.00 dollars Digital Camera $925.00 dollars Cheap PC Speakers 70.00 dollars 2 Polish Hookers that love to steal 5.00 dollars The look on 2 soldiers faces after they woke up and discovered their stuff gone,along with the women,and the fight over who was going to tell the CO first???????? PRICELESSÖÖÖÖ..;-) Mitch Davis -----Original Message----- From: ed [mailto:bernies@n...] Sent: Thursday, October 24, 2002 8:31 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Prostitutes Steal U.S. Laptop w/classified data Wow...$100K for a laptop, digital camera, and speakers. I wonder if that figure included their professional fees? [Non-text portions of this message have been removed] 6443 From: Peter Psarouthakis Date: Sun Oct 27, 2002 0:24pm Subject: Good Reading Material I thought this might be of interest to this group. I just finished reading Asian Eclipse: Exposing the Dark Side of Business in Asia, by Michael Backman. This was an excellent book regarding Asian business practices and philosophies. While it does not have anything to do with TSCM directly, it does give the reader some very good information regarding how business is handled in Asia. The TSCM practitioner that finds themselves working in Asia, or for Asian entities in our country, may find this book very enlightening. Peter Psarouthakis -- This message is intended only for the individual or entity to which it is addressed. It may contain privileged, confidential information, which is exempt from disclosure under applicable laws. If you are not the intended recipient, please note that you are strictly prohibited from disseminating or distributing this information (other than to the intended recipient) or copying this information. If you have received this communication in error, please notify us immediately by e-mail or by telephone at 888-737-3636. Thank you. [Non-text portions of this message have been removed] 6444 From: James M. Atkinson Date: Mon Oct 28, 2002 8:31am Subject: Cancer cell study revives cellphone safety fears http://www.newscientist.com/news/news.jsp?id=ns99992959 Cancer cell study revives cellphone safety fears 10:57 24 October 02 Exclusive from New Scientist Print Edition The safety of cellphones has been brought into question once again by research that suggests radio waves from the devices could promote the growth of tumours. Paradoxically, the study suggests that the radiation makes tumours grow more aggressively by initially killing off cancer cells. Cell biologist Fiorenzo Marinelli and his team at the National Research Council in Bologna, Italy, decided to investigate whether radio waves had any effect on leukaemia cells after previous studies indicated that the disease might be more common among mobile phone users. The life cycle of leukaemia cells is well understood, making it relatively easy to spot changes in behavior. The team exposed leukaemia cells in the lab to 900 MHz radio waves at a power level of 1 milliwatt, and then looked at the activity of a gene that triggers cell suicide. Many European mobile networks operate at 900 megahertz, and maximum power outputs are typically 2 watts, although they regularly use only one-tenth of this power. After 24 hours of continuous exposure to the radio waves, the suicide genes were turned on in far more leukaemia cells than in a control population that had not been exposed. What is more, 20 per cent more exposed cells had died than in the controls. But after 48 hours exposure, the apparently lethal effect of the radiation went into reverse. Rather than more cells dying, Marinelli found that a survival mechanism kicked in. Three genes that trigger cells to multiply were turned on in a high proportion of the surviving cells, making them replicate ferociously. The cancer, although briefly beaten back, had become more aggressive. DNA damage? Marinelli presented his results this month at the International Workshop on Biological Effects of Electromagnetic Fields on the Greek island of Rhodes. While the results do not show a direct health threat from mobile phones, they provide fresh evidence that radiation from such devices could play an important role in activating genes that might help cancer cells thrive. "We don't know what the effects would be on healthy human cells," says Marinelli. "But in leukaemia cells the response is always the same." Marinelli suspects the radiation may initially damage DNA, and that this interferes with the cells' biochemical signals in a way that ultimately triggers a defensive mechanism. Many scientists believe that because radiation from cellphones does not have enough energy to break chemical bonds, it cannot damage cells. The only way damage could occur, they say, is if the radio waves heated tissues up. But British research earlier in 2002, by molecular toxicologist David de Pomerai at the University of Nottingham, showed that radio waves can cause biological effects that are not due to heating. He found that nematode worms exposed to radio waves showed an increase in fertility - the opposite effect from what would be expected from heating (New Scientist print edition, 9 February). "Confused field" Marinelli's study is intriguing, says de Pomerai. "But I'm far from convinced that these authors are looking at any reproducible and real phenomena," he says. Other studies have shown mobile phone radiation to have no effect on cell death, de Pomerai adds. An inquiry in April 2000 by the British government found no evidence of any health risks from mobile phones. But it still recommended that people take a precautionary approach until further evidence emerged. In particular, it suggested children, whose brains are still developing, should not use mobile phones excessively. "It's a very confused field," admits Colin Blakemore, a physiologist at the University of Oxford and a member of the British National Radiological Protection Board's advisory group on non-ionizing radiation. People should place more reliance on animal studies than lab-based experiments on cells, he says. But de Pomerai insists that a consensus is emerging that non-ionizing radiation can indirectly damage DNA by affecting its repair system. If the DNA repair mechanism does not work as well as it should, mutations in cells could accumulate, with disastrous consequences. "Cells with unrepaired DNA damage are likely to be far more aggressively cancerous," he says. Duncan Graham-Rowe New Scientist -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6445 From: James M. Atkinson Date: Mon Oct 28, 2002 9:25am Subject: New Somona Ultra-Low Noise Amplifiers The folks at Sonoma Instrument have just added a new high gain amplifier to their product line: http://www.sonoma-instrument.com/pdf/1059ds.pdf At the same time, they are removing the model 305-1055 from the standard products line and from their web site. The old link is: http://www.sonoma-instrument.com/pdf/1055ds.pdf They will supply the 305-1055 for customers who specifically ask for this model, but otherwise they will direct new inquiries to the 305-1059. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6446 From: Hawkspirit Date: Mon Oct 28, 2002 2:02pm Subject: Video Tape >Any one out there have a copy of this video tape? Roger > > >On Sat, 26 Oct 2002, Hawkspirit wrote: > > > Is this tape available? Thanks, Roger > > > > > > ∑ ∑ PRIVATE, PRIVATE EYE, A (HAL LIPSET) > > ∑ 1991 ----- color ----- 27 min ----- $16.00 ----- vhs > > ∑ (∑ Upon Reflection series) Host Marcia Alvar speaks with Hal > > Lipset, private investigator and author of The Bug in the Martini Olive. > > Mr. Lipset discusses his pioneering work in the field of electronic > > surveillance. He explains that he sees his work as a lawyer's tool. He > > places the facts in some order so that the lawyer can use them within the > > stricture of the court room. > > > Hello. My name is Marisa Blenman, and I work for the Educational > Media Collection [EMC] at the University of Washington. The EMC is > a non-profit educational rental agency -- we do not sell the video > "Private, Private Eye, A (Hal Lipset)." I couldn't tell if you > were interested in rental or purchase of the tape. If you are > interested in renting the video, we do rent for educational > purposes. We rent for a three [3] day use period (working days), > and you would need to set up an account with the EMC. I can either > mail or fax you more information on this process. > > If you are interested in purchasing a copy of this tape, > you should contact the Library Video Network: > > Library Video Network > 320 York Road > Baltimore, MD 21204-5121 > Phone: 410-887-2082 > > The videos are produced by UWTV here at the University of Washington. > If you are interested in transcripts for individual programs, > please contact UWTV: > > UWTV > 39B Kane Hall, Box 353090 > University of Washington > Seattle, WA 98195-3090 > Phone: 206-616-UWTV > > I hope this has helped :-) > > > Marisa M. Blenman, > EMC-Media Scheduling > Kane Hall, BOX 353090 > University of Washington > Seattle, WA 98195-3090 > Phone: [206] 543-9909 > Fax: [206] 616-6501 6447 From: Hawkspirit Date: Tue Oct 29, 2002 7:22am Subject: the First Bug Sweeper This past week some of us have been having the discussion of who was the first bug sweeper. What I am looking for is, who was the first bug sweeper in the private sector that offered a service where he took detection equipment out to clients locations. Not the early bug makers and bug planters. This person should be historically verifiable in that his story is told in a magazine, a book, or the original literature he offered for his services. So far I have an 1964 article about a sweeper named Robert Jefferies out of California doing sweeps and showing his finds (covert equipment). In the same article Hal Lipset's sweep rates are listed. We are typing this article up for my web site and it should be up in a week or two. I also have Hal Lipset's book "The Olive in the Martini Glass", I have not read it but it appears that he had an electronics Technician named Ralph Berche who did his creative electronic work. Any other opinions? How about you old timers, we need your input on this. Roger Tolces Electronic Security www.bugweeps.com 6448 From: D.A.Linsky Date: Tue Oct 29, 2002 1:01pm Subject: Chief Moose..the rest of the story A bit off topic but probably of interest to the membership. Regards, Dave Linsky www.securesvc.com Subject: Chief Moose--Security Forces Seems like everyone in the media knew more than this guy. Of course, if all went wrong, he was the only one responsible. Everybody else was just a "stone thrower." The rest of the story. Charles Moose, who seemed to breathe a little easier Oct. 24 after two suspects had been arrested, has become the new poster person for members of the Air National Guard and other military reservists who also maintain demanding civilian careers. Most Americans know him as Montgomery County Police Chief Charles Moose, the leader and national spokesman for the task force that devoted three weeks to tracking down those responsible for killing 10 people and wounding three others. His military colleagues also know him as Maj. Charles Moose, commander of the District of Columbia Air National Guard's 60-member security forces squadron in the 113th Wing based at Andrews Air Force Base, Md. Major Moose has commanded the 113th SFS since May 2000, a D.C. ANG spokesperson said. He has spent much of the past 13 months dealing with the Sept. 11 terrorist attack on the Pentagon and October's hunt for the accused snipers. [Non-text portions of this message have been removed] 6449 From: Ben Evans Date: Tue Oct 29, 2002 4:46pm Subject: Cellular Intercept One of our International clients is looking for a cellular intercept system that can handle multiple calls at once (25 or 50 at a single time). Are there any products out there that may fit the bill, or something that may be "close enough" for the client? Thanks in advance, -Ben Evans ----------------------------------------------- Counter Intelligence Solutions Group, Inc. http://www.cisginc.com/ Corporate Website http://www.spywholesalers.com/ Covert Cameras http://www.slantback.com Just for fun 585.889.2321(v) 585.889.0823(f) ----------------------------------------------- 6450 From: Marcel Date: Wed Oct 30, 2002 10:45pm Subject: Because while the boss catís away, itís possible some computer mice might want to play Internet & Technology Thursday, October 31, 2002 Spyware Used To Track Computersí Web Journeys Because while the boss catís away, itís possible some computer mice might want to play By Nancy Gondo Investor's Business Daily Worried that the mice will play when the catís away? Thatís the fear of many parents, educators and employers, who wonder how their personal computers are used when theyíre not around to supervise. There are plenty of services that let you block out certain Web sites. But if you want even more control, there are other options. Software makers now offer "spyware" programs that let you track what a user is doing on a PC. For instance, these products can record every keystroke on a PCís keyboard and send you a report. The programs are easy to install and are password-protected, so only you can access them. And you can test most of them before you buy. Spytech Software and Designís SpyAgent Professional 3.1 and Personal 3.0 do much more than log keystrokes. Once installed, they can log Internet connections and Web site visits ñ whether via America Online, Internet Explorer or Netscape Navigator. They also make a record of the windows users open, the programs they start and the passwords they use. Keeping track of all that information could be a pain. But SpyAgent puts it in easily viewable and printable text. If you prefer to get the data by e-mail, select the "EMail Delivery" tab from the main SpyAgent screen. Check the logs you want sent to you, type in your e-mail address and the intervals (in minutes) at which you prefer to get them. You can even get screen-shot captures at set intervals so you can see what a user is viewing on the PC. To make it easy for you to look at the screen shots, there is a built-in slide show. Click on the slide projector icon to view the images. Can Alert Those Watched If you plan to use SpyAgent at the workplace, you may want to let your employees know theyíre being watched. To alert users that theyíre being monitored, click on "General" from the SpyAgent options menu and select "Display Splash Warning on SpyAgent Startup." The software can be activated when you request it, or you can have it load automatically when Windows is started up. You can select the start-up option you prefer under the "General" tab. And if you donít want anyone to know youíre monitoring their activities, you can also choose to run SpyAgent in "stealth" mode. SpyAgent Personal gives you the same basic tracking services as the Professional version, with an extra feature to help protect ñ or torment ñ your kids. Since you never know with whom your child might be chatting online, the home version can record all conversations on most popular instant message programs, such as ICQ, MSN and Yahoo Messenger. SpyAgent Professional, aimed at a small business, is available from Spytech-Web.com for $100. The Personal version costs $35. Can Record Keystrokes, Time WinWhatWhere Corp.ís Investigator offers tracking features that are similar to SpyAgent. It records the date, time started, time elapsed and keystrokes made on your PC. You can have it monitor all activity, select the programs you want tracked or have the program run only on certain days and times. When you get the report of Web sites visited, youíll see the Web site address next to each site. Spot a shady-sounding site? Just click on the address and itíll take you to it. Want to track more than one employeeís PC on the office network? No sweat. As long as youíve bought enough licenses and install the program on each PC, you can get reports from each machine. Like SpyAgent, you can set up Investigator to show a screen to alert users that theyíre being watched, or run it in stealth mode. To choose when you want the program to run, go to the Investigator Startup screen and select the "Start" tab. To try out Investigator for 14 days, click on "Try It Now" on the left-hand column of the home page (winwhatwhere.com) and download an evaluation copy. Like what you try? You can buy a single-user license from the companyís Web site for $100. If youíre buying 10 or more licenses, youíll get a volume discount. Iopus Softwareís Stealth Activity Recorder & Reporter, or STARR, is another logging and monitoring option. You can download a 30-day evaluation copy from Iopus.com. If you decide to buy, a single-user copy costs $50. There are volume discounts too. Another choice for the more budget-conscious is Bitlogic Softwareís Desktop Detective, which offers similar tracking functions for $29 each. To order or to get more information, go to Bitlogic.co.uk, click the "software" tab, then select "Desktop Detective." Tropical Software Corp.ís Keyboard Monitor is also a budget-friendly option at $30 per user license. There are volume discounts for six units or more. Go to Tropsoft.com and select "Keyboard Monitor" to download a free demo copy or to order. http://www.investors.com/editorial/tech07.asp?view=1 6451 From: Times Enemy Date: Thu Oct 31, 2002 8:27am Subject: Re: Because while the boss catís away, itís possible some computer mice might want to play Greetings. I guess i fail to see why this advertisement was accepted as worthy of meeting the requirements for this list. And the unsettling thing is, i am seeing more and more of such wasted bandwidth hit my inbox. It's no big deal though, i'm just one person, and i'm sure this is a healthy sized list with plenty of subscribers so losing me won't be that big of a deal, but it will be a sad day for me, having been at least lurking here for so long. Has it been years? Wow, it has been. Just to make sure i didn't miss "the reason" this garbage of an e-mail was accepted, i read it very carefully, twice. All i got was, "SPAM SPAM SPAM" on my radar. No disrespect to Nancy Gondo, but any self respecting security professional, especially in a technology based field, will know that such applications as mentioned in this ad exist. It is nice i guess to get news of "new" software packages and the likes, but i am still rather baffled that this message landed in my mailbox, with the TSCM-L name behind it ... er, before it actually. Perhaps this type of news would be neat to the general public, which i guess this list is, but well ... here, you read this and tell me how this boss-cat junk fits the bill: Quoth i [ http://groups.yahoo.com/group/TSCM-L/ ], TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is and increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. ------- Thus endeth my quotething ... hehe-th. *sigh* I also mean no disrespect to J.M.A.. Never met the man, yet i respect him. The world is a'changin' place i guess ... and quality will eventually be compromised by the best of us .... ciao .times enemy > Internet & Technology > > Thursday, October 31, 2002 > > Spyware Used To Track > Computersí Web Journeys > > Because while the boss catís away, itís possible some computer mice > might want to play > > By Nancy Gondo > Investor's Business Daily > > Worried that the mice will play when the catís away? > > Thatís the fear of many parents, educators and employers, who wonder how > their personal computers are used when theyíre > not around to supervise. > > There are plenty of services that let you block out certain Web sites. > But if you want even more control, there are other > options. > > Software makers now offer "spyware" programs that let you track what a > user is doing on a PC. For instance, these products > can record every keystroke on a PCís keyboard and send you a report. > > The programs are easy to install and are password-protected, so only you > can access them. And you can test most of them > before you buy. > > Spytech Software and Designís SpyAgent Professional 3.1 and Personal 3.0 > do much more than log keystrokes. Once > installed, they can log Internet connections and Web site visits ñ > whether via America Online, Internet Explorer or Netscape > Navigator. They also make a record of the windows users open, the > programs they start and the passwords they use. > > Keeping track of all that information could be a pain. But SpyAgent puts > it in easily viewable and printable text. If you prefer to > get the data by e-mail, select the "EMail Delivery" tab from the main > SpyAgent screen. Check the logs you want sent to you, > type in your e-mail address and the intervals (in minutes) at which you > prefer to get them. > > You can even get screen-shot captures at set intervals so you can see > what a user is viewing on the PC. To make it easy for > you to look at the screen shots, there is a built-in slide show. Click > on the slide projector icon to view the images. > > Can Alert Those Watched > > If you plan to use SpyAgent at the workplace, you may want to let your > employees know theyíre being watched. To alert > users that theyíre being monitored, click on "General" from the SpyAgent > options menu and select "Display Splash Warning on > SpyAgent Startup." > > The software can be activated when you request it, or you can have it > load automatically when Windows is started up. You > can select the start-up option you prefer under the "General" tab. > > And if you donít want anyone to know youíre monitoring their activities, > you can also choose to run SpyAgent in "stealth" > mode. > > SpyAgent Personal gives you the same basic tracking services as the > Professional version, with an extra feature to help protect > ñ or torment ñ your kids. > > Since you never know with whom your child might be chatting online, the > home version can record all conversations on most > popular instant message programs, such as ICQ, MSN and Yahoo Messenger. > > SpyAgent Professional, aimed at a small business, is available from > Spytech-Web.com for $100. The Personal version costs > $35. > > Can Record Keystrokes, Time > > WinWhatWhere Corp.ís Investigator offers tracking features that are > similar to SpyAgent. It records the date, time started, > time elapsed and keystrokes made on your PC. You can have it monitor all > activity, select the programs you want tracked or > have the program run only on certain days and times. > > When you get the report of Web sites visited, youíll see the Web site > address next to each site. Spot a shady-sounding site? > Just click on the address and itíll take you to it. > > Want to track more than one employeeís PC on the office network? No > sweat. As long as youíve bought enough licenses and > install the program on each PC, you can get reports from each machine. > > Like SpyAgent, you can set up Investigator to show a screen to alert > users that theyíre being watched, or run it in stealth > mode. To choose when you want the program to run, go to the Investigator > Startup screen and select the "Start" tab. > > To try out Investigator for 14 days, click on "Try It Now" on the > left-hand column of the home page (winwhatwhere.com) and > download an evaluation copy. > > Like what you try? You can buy a single-user license from the companyís > Web site for $100. If youíre buying 10 or more > licenses, youíll get a volume discount. > > Iopus Softwareís Stealth Activity Recorder & Reporter, or STARR, is > another logging and monitoring option. You can > download a 30-day evaluation copy from Iopus.com. If you decide to buy, > a single-user copy costs $50. There are volume > discounts too. > > Another choice for the more budget-conscious is Bitlogic Softwareís > Desktop Detective, which offers similar tracking > functions for $29 each. To order or to get more information, go to > Bitlogic.co.uk, click the "software" tab, then select > "Desktop Detective." > > Tropical Software Corp.ís Keyboard Monitor is also a budget-friendly > option at $30 per user license. There are volume > discounts for six units or more. > > Go to Tropsoft.com and select "Keyboard Monitor" to download a free demo > copy or to order. > > http://www.investors.com/editorial/tech07.asp?view=1 > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ 6452 From: Times Enemy Date: Thu Oct 31, 2002 8:34am Subject: Re: Because while the boss catís away, itís possible some computer mice might want to play Greets again. I must apologize, i errored. The list is not "moderated," in the sence that every post is carefully scrutinized to ensure list integrity before being propagated. Just saw this: Group Info Members: 1309 Founded: Nov 16, 1998 Language: English Group Settings ∑ Listed in directory ∑ Restricted membership ∑ Unmoderated ∑ All members may post ∑ Archives for members only ∑ Email attachments are not permitted My bad. I guess the advertising e-mails which waste resources in mail server processes, storage, bandwidth, and in my time will only be more frequent. Pity. ciao .times enemy ------- snipped advertising, er message. From: Does it matter Date: Mon Oct 25, 2004 10:02am Subject: Re: Printers betray document secrets Are you meaning to tying a CD to a certain computer or looking for metadata in a CD that tells the burning program and such. --- In TSCM-L@yahoogroups.com, "Tech Sec Lab" wrote: > I do know that the big ass colour copiers have algo's that look for specific > colours of banknotes and then over/under saturates them on printing to > highlight counterfeit documents. > > I also know of one instance where the cops caught a guy counterfeiting > within a week because they managed to extract the printer serial number from > one of the bad notes.... > > I would be really interested in finding out how they did this, especially > the decoding of such information. > > Here is a good link that clears up the JMA and Delp issue: > > http://news.uns.purdue.edu/UNS/html4ever/2004/041011.Delp.forensics.h tml > > Happy printing! > > ;) > > > PS. Does anyone have any more references/info on the serial number on > CD's/DVD's burning? > > *************** > > Message: 6 > Date: Thu, 21 Oct 2004 22:52:39 -0400 > From: Dave Emery > Subject: Re: Printers betray document secrets > > > This sounds a bit like an urban legend to me. For one thing, > one would not normally encode serial numbers in a PAL (a programmable logic > device) but rather some form of PROM (programmable read only > memory). There is a big difference - though in fact one could encode > some bits (many in modern parts) into a PAL, which would normally be used to > implement some part of the digital logic of the printer hardware > rather than for storage of serial numbers or other information. PALs > usually cost more than PROMs, however, and therefore most ESN type > applications involve some sort of PROM (sometimes a serial I2C type...). > > In general the manufacturing costs of incorporating custom serial > numbers (or any other custom information per printer which is different for > each unit produced) into a HIGHLY cost sensitive product like a computer > printer is truly a killer. I am sure that if such is included, it is only > done reluctantly under duress because of the added steps of a customizing > and serial number tracking step in production. > > But all of the heavy lifting for encoding serial numbers into the > printer output is invariably actually contained in the printer > firmware. That is if there is such a feature there at all. > > I should imagine that someone with talent and time, and almost > infinite patience could extract the algorithms used from the firmware by > disassembling and reverse engineering it. This might be easier for the > generation of printers that used Windows drivers to actually generate the > patterns of bits for the characters printed rather than doing in firmware > inside the printer as disassembly of the drivers might be quicker than > firmware for a microprocessor with special hardware hooks for printing. > > Of course I know that CDROM and DVDROM drives have been forced to > include serial numbers in all the DVDs and CDROMs they burn, so such > traceability HAS been implemented. It is easier on a DVD or CDROM as > there are header fields provided for this exact purpose, watermarking laser > or inject output and successfully recovering a serial number is a much > harder problem in detection theory... as random physical defects in the > paper and printing process would tend to eat information encoded in > individual pixels. > > And of course it is rather well known that high resolution color > copiers and printers have been forced to refuse to print images that contain > certain magic patterns that mark them as currency (money) or > other specialized documents. Someone determined the magic pattern > used, in fact, for at least one of these systems. > > -- > Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass > 02493 9956 From: Dragos Ruiu Date: Tue Oct 26, 2004 3:08am Subject: CanSecWest/core05 Call for Papers - May 4-6 2005 - Deadline December 6 2004 CALL FOR PAPERS CanSecWest/core05 Network Security Training Conference http://cansecwest.com May 4-6 2005 Vancouver, B.C. Canada CanSecWest would like to announce the call for papers of the spring, sixth annual, CanSecWest/core05 network security training conference and the announcement of the final set of presentations for the PacSec.jp/core04 conference. The CanSecWest/core05 conference will be held on May 4-6 at the Mariott Renaissance in downtown Vancouver, British Columbia, Canada. The conference focuses on emerging information security tutorials and technology. Please submit all proposals for presentations by December 6. This year we will continue to also have two kinds of presentations, the normal one hour tutorials, and there will again be a session of the popular "lightning talks": 5 minutes max (BigHook/Gong enforced) and 1-3 slides. Selected "lightning talk" presenters will receive registration discounts (or rebates) - travel and accomodations are their responsibility. "Lightning talk" submissions should follow the same submission guidelines below. Deadline for "lightning talk" submissions is January 17th, 2005. The conference is responsible for travel and accomodations for the tutorial speakers. If you have a proposal for a tutorial session then please email a synopsis of the material and your biography, papers, and speaking background to core05@c.... Tutorials are one hour in length. Only slides will be needed for the April paper deadline, full text does not have to be submitted. The CanSecWest/core05 conference consists of tutorials on technical details about current issues, innovative techniques and best practices in the information security realm. The audiences are a multi-national mix of professionals involved on a daily basis with security work: security product vendors, programmers, security officers, and network administrators. We give preference to technical details and education for a technical audience. The conference itself is a single track series of presentations in a lecture theater environment. The presentations offer speakers the opportunity to showcase on-going research and collaborate with peers while educating and highlighting advancements in security products and techniques. The focus is on innovation, tutorials, and education instead of overt product pitches. Some commercial content is tolerated, but it needs to be backed up by a technical presenter - either giving a valuable tutorial and best practices instruction or detailing significant new technology in the products. Paper proposals should consist of the following information: 1) Presenter, and geographical location (country of origin/passport) and contact info (e-mail, postal address, phone, fax). 2) Employer and/or affiliations. 3) Brief biography, list of publications and papers. 4) Any significant presentation and educational experience/background. 5) Topic synopsis, Proposed paper title, and a one paragraph description. 6) Reason why this material is innovative or significant or an important tutorial. 7) Optionally, any samples of prepared material or outlines ready. Please forward the above information to core05@c.... to be considered for placement on the speaker roster. The selected papers for PacSec.jp/core04 are: George Kurtz - Google Hacking: Searching for ways to stop hackers. Shane "K2" Macaulay & Dino Dai Zovi - Wireless vulnerabilities from rogue access points. Nico Fischbach - Voice Over IP Security Maximillian Dornseif - 0wn3d by an iPod: Firewire/1394 Issues Nico Fischbach & Toby Kohlenberg - Best methods for detecting anomalies in global networks David Meltzer - Hybrid approaches for optimized network discovery Nicolas Brulez - Windows virus executable file infections and heuristic detection. Ivan Arce - Analyzing exploit code quality. Hiroaki Etoh - Stack Protection Systems (ProPolice, XP SP2...). Laurent Oudot - Countering Attack Deception Techniques. Greg Smith - Security Tutorial for Administrators. Ejovi Nuwhere - Inside Jyukinet: The Audit. More information on the PacSec.jp/core04 conference in Tokyo on November 11-12 can be found at http://pacsec.jp Advance discount registration is now open for CanSecWest/core05 at http://cansecwest.com thanks, --dr -- World Security Pros. Cutting Edge Training, Tools, and Techniques Tokyo, JapanNov 11-12 2004 http://pacsec.jp pgpkey http://dragos.com/ kyxpgp 9957 From: fjansgmxnet Date: Mon Oct 25, 2004 8:03am Subject: Re: Cell Phone Ping > Back to the homebrew Gsm RDF-er > > Even if you narrow it down to just GSM, > you dont know in wich band they are ...900/1800 ? That is correct. You could scan the 900 and 1800 MHz upperband for the strongest base station signals. You will get a list of maybe 10 very strong channels. But of cause you are not 100% sure to have the strongest channel of every provider in your list. So better we should use some !dual band! gsm phone with a good monitor mode like Nokia or Sagem phones. If we use these phones without a SIM card (in the emergency call only mode) the monitor menu will show us the control channels of all providers. So we could write down the four strongest channels for every provider including minimum one channel from every band. Ok, if we have a list of maybe 16 channels to scan. If I am listening to my gsm phone "receiving" a SMS and recording the WFM-discriminator output with my soundcard, I see that there is minimum one sequences of transmitting bursts of 0.5 seconds. Ok, the scanner have to scan the 16 channels in both bands in less than 0.5 seconds. As I wrote: It works only with a !fast! bandwidth modificated scanner. From your range find- ings I would say maybe it could work also with an unmodified fast scanning receiver. If one or more of the GSM providers are using frequency hopping the scanner have to be much faster, because the channels we have programed are only a part of the hopping sequence. If a hopping sequence consists of 8 channels it has to be 8 times faster, correct? > If the phone has built-in Bluetooth then you could use > a Bluesniffer wich is available..such a device could > scan and detect specific Bluetooth adresses in no time, > ofcourse you will need to know the specific bluetooth adress > of your target phone first...just sit close to the target > with your bluetooth-sniffer and scan all bluetooth phones around > use a low gain antenna ... you will have the Bluetooth adress in 10 > seconds. > including anything else stored in the phone. Really nice idea! But I could not find any bluesnarfing software in the whole internet. Gnokii will not be sufficent for that task. Regards, Frank 9958 From: fjansgmxnet Date: Mon Oct 25, 2004 7:17am Subject: Re: Cell Phone Ping --- In TSCM-L@yahoogroups.com, "Michael Puchol" wrote: > Very rightly so - and, I have never seen anything such as "hidden" or > "secret" SMS messages, the only such things are configuration messages, > which may ONLY be sent by the operator to a subscriber, or an authorised > third party, or registration requests used for LBS, which again, can only be > sent by the network. The only chance of doing this would be to use special > unicode characters in the message, but I believe the user would still be > alerted to an incoming SMS. > > Regards, > > Mike > If you have some GSM phone that is able to send SMS messages in the PDU mode, you could specify in the header of the SMS that the SMS should not be displayed and should not be stored. Of cause it is not really fun to write / code a SMS in the PDU mode. Never heard that GSM providers filter such SMS messages. But of cause you have to test it for your provider to be 100% sure. Or you could use the stealth ping option of programs like "SMS Blaster" or "Smart SMS". Regards, Frank 9959 From: fjansgmxnet Date: Mon Oct 25, 2004 7:31am Subject: Re: Cell Phone Ping > What receiver will you be using to RDF a GSM ? I think that it has to be a bandwidth modificated scanner. Maybe about 300 kHz bandwidth would be the best. Of cause an I/Q demodulator and a digital correlator for GMSK training sequences would be fine. Maybe it could be possible to tune a GSM phone receiver 45 MHz lower? > My experience is that a standard receiver(AM/NFM/WFM/SSB)with non- > specific Gsm qualities will not receive such a phone over distances > more then let's say 350 meters max But that would be sufficient to check if the target is in the house, correct? For that purpose a higher range of the receiver would only produce false hits. Regards, Frank 9960 From: Tech Sec Lab Date: Tue Oct 26, 2004 0:13pm Subject: Mobile Java hit with security scare http://news.zdnet.co.uk/communications/0,39020336,39171336,00.htm 9961 From: Tech Sec Lab Date: Tue Oct 26, 2004 0:15pm Subject: VOIP Security http://www.theregister.co.uk/2004/10/25/cisco_ip_phone_crypto/ I wonder if the system has an LEA access monitoring system... 9962 From: Date: Wed Oct 27, 2004 2:42pm Subject: Fwd: [ISN] Scan design called portal for hackers Fascinating read for you hardware guys, I bet similar vulnerabilities could be exploited via hardware debug mechanisms like JTAG. ...... Forwarded Message ....... From: InfoSec News To: isn@a... Date: Tue, 26 Oct 2004 01:41:53 -0500 (CDT) Subj: [ISN] Scan design called portal for hackers http://www.eedesign.com/story/showArticle.jhtml?articleID=51200154 Richard Goering EE Times Oct 25, 2004 Santa Cruz, Calif. -- Think your "smart" credit cards are safe from hackers, that your company firewall is secure and that no one can steal the intellectual property in your latest chip design? Think again. Any chip that uses scan design - and any system built around it - may be vulnerable to hackers or to other interested third parties, according to research that will be presented at this week's International Test Conference in Charlotte, N.C. (www.itctestweek.org). There's a growing recognition in the industry that the very scan chains that make ICs testable can potentially be used to break their encryption algorithms and steal their intellectual property. Opinions differ on how solvable the problem is and on what approach provides the best possible trade-off between test and security concerns. An ITC panel scheduled for tomorrow will air different views on a growing dilemma: that while design-for-test methodologies aim at making internal IC logic states visible to testers, those very same features make chips much more vulnerable to hackers. "Good test quality requires full access to all elements that determine the internal state of an IC," said Erik Jan Marinessen, principal scientist at Philips Research Labs in Eindhoven, Netherlands, and moderator of the Tuesday panel. "Full access means full controllability and full observability. These test requirements are in complete contradiction to security requirements, where neither full controllability nor observability should be given to the world external to the IC." Marinessen is optimistic about resolving the dilemma, however. "A proper control of the IC's life cycle prevents the use of such test features during application mode when secrets are in use," he said. But one of the panelists is far more pessimistic. Ramesh Karri, associate professor of electrical and computing engineering at the Polytechnic University in Brooklyn, N.Y., is co-author of an ITC paper titled "Scan-based side channel attack on dedicated hardware implementations of data encryption standard." The paper shows how scan chains can be used as a "side channel" to recover secret keys from a hardware implementation of any cryptographic algorithm. It details a two-phased attack that can nab a secret DES encryption key even when the architecture of the scan chain is unknown and the key is stored in secure memory. A similar paper on Karri's Web site describes a two-phased attack that can recover AES encryption keys (see http://cad.poly.edu/encryption). Karri is a man with a mission. "We want to get to the design and test communities and tell them that scan is a terrible thing to do," he said. "Scan is a very bad design-for-test methodology. It is a very good design-for-hacking methodology." "It's a real problem," concurred Rohit Kapur, scientist at EDA vendor Synopsys Inc. Kapur believes, however, that there's a solution, and at the ITC panel he will propose a scheme that uses decoding and encoding logic to protect the data in scan chains. "Scan chains provide a window into the chip," said Yervant Zorian, CTO of Virage Logic. "But that window can be used off- or online to extract information from the chip." Like Kapur, Zorian believes one possible solution is to add encryption and decryption logic to scan chains. "It's well known that scan chains are a major source of vulnerability in embedded systems," said Srinivas Ravi, research staff member at NEC Laboratories America and a security architect for NEC's mobile-terminal applications chips. Karri hasn't uncovered a new problem, Ravi said, but his work is important because it provides a detailed independent analysis of the issue. Most ASICs use scan design because it's a relatively easy way to give testers access to internal states. According to a recent Gartner Dataquest study, 82 percent of ASIC designers reported that their most recent designs used scan chain insertion. The primary alternative is built-in self-test (BIST), which is more secure because it doesn't require visible scan chains. But BIST is more complicated to implement and has yet to be widely adopted for logic. Opinions differ on whether BIST could be an effective alternative to scan for security-conscious designs. Trouble with scan Scan design is based on a relatively simple concept. One or more scan chains are constructed within a chip by tying together some internal registers and flip-flops and then connecting them to the serial JTAG boundary scan interface. During testing, test vectors are scanned in through the scan input pin, and the contents of internal registers are scanned out through the scan output pin. The good news is that automatic test equipment can thus find stuck-at-1 or stuck-at-0 faults that would otherwise lie hidden within the device, just waiting to make it fail in the field. The bad news is that hackers can see the internals of the device too, Karri says. "By providing a scan chain, you are providing access to the internal state of a chip," he said. "If you know the algorithm that's being implemented, any proprietary data that's part of that algorithm can be easily compromised and discovered." Thus, said Synopsys' Kapur, "if you have a chip that goes into a credit card and you are able to scan out information, you might be able to replicate that card." Although Karri's paper focuses on a methodology for breaking encryption algorithms, the problem is far broader, he said: Any kind of intellectual property can be compromised with scan design. "Think of a filter with a fancy coefficient that you worked hard to design," he said. "If you put it into an IC and use scan for testing, the coefficient can be scanned out. Somebody else can easily come up with an equally fancy filter based on your IP." Karri said he wasn't aware of any actual hacker attacks using scan chains, but he said the security community knows about the problem and that some of the high-end smart-card vendors are now avoiding scan chains. He also noted that the Federal Information Processing Standard (FIPS) for cryptographic modules states that access to the "contents" of the module must be restricted. Karri maintains that this essentially prohibits scan design, even though FIPS does not explicitly mention it. Kapur said that a few Synopsys customers who are concerned about security have said they didn't want to insert scan but that it's not a "mainstream" concern yet. Thus far the concern is mainly for financial applications, such as smart credit cards. NEC's Ravi observed that many smart-card providers disable JTAG circuitry once the chips are in production. This may not be acceptable for other kinds of systems, he noted, because debug circuitry is needed to examine failures in the field. Countermeasures Marinessen said providers of security-conscious applications, including Philips, take "countermeasures" to prevent hacking. But he declined to comment on the exact nature of those countermeasures. "I think that in his ITC '04 paper, Professor Karri assumes that it is relatively easy to find out which IC pins serve as scan chain inputs/outputs and how the scan operation of the scan chains should be controlled," Marinessen said. "This is not possible for state-of-the-art security devices, and hence provides no attack path." Karri's ITC paper outlines two phases to breaking a DES encryption algorithm. In the first phase, the paper describes a five-step plan for applying selected user inputs, or "plaintexts," to determine the scan chain structure. The paper assumes the hacker has access to high-level timing diagrams from an ASIC vendor but does not know the structure of the scan chain. The second phase shows how a hacker could break the DES algorithm by applying three known plaintexts. It's an iterative process that involves four basic steps. Using Mentor Graphics Corp.'s ModelSim simulator, Karri and his co-authors determined that close to 42,000 clock cycles are required to discover the secret user key. A hacker would obviously need some knowledge of encryption algorithms and chip design, but it would not take a lot of sophistication, Karri said. "It doesn't take a chip designer," he said. "It's quite straightforward." Far from being concerned that his paper will encourage hackers, Karri said that what's important is getting word to the design and test community, which is largely unaware of the problem. Karri said he's not optimistic that scan chains can be made more secure. His paper notes that even when scan chains are unbound after testing, they can still be accessed by breaking the IC package open. Kapur of Synopsys, however, believes there is a solution. His idea involves putting some decoding logic at the scan chain input and encoding logic at the scan chain output. "As long as the encoding logic is different from the decoding logic," he said, "what you scan in, you can't scan out." This scheme, however, would require support from both scan insertion tools and from ATE providers, Kapur noted. "The requirement has to get mainstream for it to take off, but it's all doable," he said. Karri is skeptical. He said that compression and decompression circuitry doesn't have security features and can be easily broken. And he expressed doubt that scan with added encryption and decryption circuitry would maintain its cost or area advantage over BIST. Karri believes that BIST offers much more security than scan, but Kapur termed BIST "low quality" because it requires random patterns and more test application time. "If you want high quality, you need deterministic ATPG-based testing, which requires scan," he said. The real issue, Karri believes, is that design-for-test needs some fresh thinking. "We need to think outside the box about what might be a good test methodology," he said. "We have all these great conferences on DFT and scan. I don't think any of this is correct." _________________________________________ Open Source Vulnerability Database (OSVDB) Everything is Vulnerable - http://www.osvdb.org/ . 9963 From: contranl Date: Tue Oct 26, 2004 4:36pm Subject: Smallest Gps enabled Cellphone (for tracking purposes) . A new pocketsize tracking device(commercial)is announced: http://www.wherifywireless.com/univLoc.asp It's a combination of a cellphone and gps the phone has only 2 buttons to dial preprogrammed numbers (like 911)and speaker-phone function. I am not shure but it works on the PCS networks they have a coverage mnapon their website PCS is that CDMA ? (not GSM) i guess so ... being a European i don't like the fact that the biggest consuming country in this world (USA) has to have his own standards so interesting products at good prices don't work in the rest of the world...same goes for scanners (other frequency bands and other digital radio-standards like Apco/Tetra)..same for video/tv stuff. Yes i know its also the other way around...but since the USA market for electronics and telecommunications is so much bigger..many novelty products are first available over there ...some never make it to over here at all. Tetrascanner 9964 From: Date: Tue Oct 26, 2004 11:04am Subject: RE: Re: Cell Phone Ping Gentlemen, Physical Channel in GSM terms is a time slot and not the frequency. All information including control, SMS etc is being transmitted on the assigned physical channel (timeslot) e.g. when scanning for a cell station the handset is actually looking for a signal 000000... on the timeslot 0, which is never frequency hopped. Do you want to separate timeslots with a teenager¥s toy? Good luck. A German company Rohde & Schwarz (whos owner Mr Rohde actually lives in USA) makes GSM- capable DF equipment, but it is somewhat bulky. They also make System G900,along with one newer system for law enforcement. Basically it is a fake cell station which can deactivate frequency hopping so that a hanheld signal is DFable with a simple Foxhunt-like DF. It¥s not that trivial however... Regards, A.W. "fjansgmxnet" wrote: > > > >--- In TSCM-L@yahoogroups.com, "Hawkspirit" wrote: >> >> >> The target cell phone when on will always be monitoring the control >channel >> at the cell site in which it is located for an incoming call or text >> message. When that incoming page goes out, the cell phone >handshakes with >> the site and is assigned a send and receive channel frequency. One >of >> several hundred possible. All this coded in TDMA, CDMA, or GSM. So >you gonna >> find it with a scanner? >> >> Roger >> > >I was only taking about GSM. I think that SMSs transmission are only >on the control channel and that there is no allocation of a traffic >channel for SMS. Therefore the modified scanner has only to scan the >available (underband) control channels. I am wrong? > >Of cause, maybe there is a similar SMS transmission exactly at the >expected time in the range of the scanner. But sending two or three >SMSs will decrease the probabiliy of false hits. > >Regards, > Frank > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > __________________________________________________________________ Switch to Netscape Internet Service. As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register Netscape. Just the Net You Need. New! Netscape Toolbar for Internet Explorer Search from anywhere on the Web and block those annoying pop-ups. Download now at http://channels.netscape.com/ns/search/install.jsp 9965 From: contranl Date: Tue Oct 26, 2004 5:56pm Subject: Re: Cell Phone Ping . Fjans...it all depends ...why don't you tell me first what you are trying to achieve...or what technique you are trying to develope for what purpose ? ...there might be simpler way's Some remarks: If range on a standard scanner is 350 meters and a wideband-detector with Gsm filters can do 50 meters why not use a such a wideband (AM)detector to see if your Gsm-target is "in da house" Such a wideband-detector could exist of: 5 db antenna (dualband) Dualband rf filters (dielectric) RF-detector (rectifier) 40 dB amplifier (3~4 stages of MAR-6/8) A little AF filtering A PIC-processor that would look for the typical GSM-cadence of 217 Hz...possibly SMS-cadences differ from voice ? 50 meters seems not to bad for a average "house" The advantage would be that it would be much cheaper and way much easier to build...and no complicated channel plans/scanning are needed. I know you gonna say now ...i want more range then 50 meters :) Now that i think of it...such a detector will also pick up 10's of other phones around...so maybe you can figure out a way to have the target phone send out exact timed sms replies..so your PIC could filter them out. You could also send such SMS or voice-call message your self ? Send one good message and try to copy it from the air..then (re)transmit it yourself (on the right channel)...(ILLEGAl !) Another way might be to make a portable kind of IMSI-catcher you could use a new "PICOCELL" (like i mentioned in a previous posting) you go to the area ...you have the target-IMSI preprogrammed (from a previous snoop when you where close to him) As soon as the target is close enough it will lock to your fake-cell and all bells will ring ! (similar to bluesnarfing) you could extract TA or signal-strength to get a distance or decrease sensitivity all the time. (this method would be ILLEGAL also) Another experiment could be to copy/fake the sms message as it is send by LBS position trackers (over the internet)..and modify it in such a way that it will not show up on the target's phone...in order to obtain a position it will still have to reply back to the service provider...ofcourse that will involve a little hacking...i know from experience that this might not be so difficult at all... me as a RF-freak and not a computer-hacker was able to "hack" such a LBS position provider in less then 1 hour..it was so easy: I went to the page where the tracking was done Then looked at the HTML of that page (source) I then discovered that the whole thing existed of: 1) A position is asked from a dedicated GSM-network server. 2) A map is asked from a map-provider. 3) The position is plotted on the map. 4) The resulting jpg is send to the page. Both URL's (map-server and position-server) where clearly visible in the HTML-source ! I was able to do tracking without paying for it and without my trackings being registrated at the LBS-provider ofcourse that was just playing. 2 days later the service went off-air...to never comeback ! (probably for other reasons) I did not spend to much time on it then ... but who knows what else i would have discovered. This was a very big national GSM network and the programming must have been very bad :) Ofcourse a method that involves some kind of internet-hacking would not be acceptable since it is illegal and unreliable. Why not start the other way around and say what you need exactly...and for what kind of situation you need this ? A general Gsm tracker (close range) ? A complete method to find any GSM in the country ? Tetrascanner www.tetrascanner.com 9966 From: contranl Date: Tue Oct 26, 2004 7:13pm Subject: GSM / CELLPHONE Orchestra ! ( : off - topic - fun - video : ) . A man from Lithuania has created a Gsm /Cell phone Orchestra using ringtones from dozens of mobilephones Video: http://tinyurl.com/4xhlx Tetrascanner . 9967 From: satcommunitfive Date: Wed Oct 27, 2004 3:27am Subject: anritsu sitemasters etc does anyone use the sitemasters ? for TSCM etc http://www.us.anritsu.com/products/ARO/North/Eng/showProd.aspx? ID=654&cat=1&cat2=2&cat3=3&cat4=0 stops at 7.1Ghz there are others that go to 20+ thanks 9968 From: Dragos Ruiu Date: Tue Oct 26, 2004 6:18pm Subject: Re: Smallest Gps enabled Cellphone (for tracking purposes) On October 26, 2004 02:36 pm, contranl wrote: > PCS is that CDMA ? (not GSM) i guess so ... > being a European i don't like the fact that the biggest consuming > country in this world (USA) has to have his own standards > so interesting products at good prices don't work in the rest of the > world...same goes for scanners (other frequency bands and other > digital radio-standards like Apco/Tetra)..same for video/tv stuff. Well I believe the finger of blame ought to be pointed in the reverse direction. It was European standards bodies that first put GSM overlapped with AMPS, (arguably as a protectionist move on the part of the then dominant PTT aligned national manufacturers, but that's academic now) which led to the current multiband GSM debacle. There are no innocents in this game imho, and UMTS-3000 or whatever brand name is being bandied today, _might_ be deployed and solve this hopefully before 3000 :-) - and then one might be able to get a terrestrial cell phone that works everywhere on this planet. But, likely, by that point we'll have different orbital standards :-). The GSM folks did hold their TDMA line against the technically superior CDMA (from every analysis I've ever read) for long time though... I wonder if the Qualcomm patents have expired yet :-). cheers, --dr -- World Security Pros. Cutting Edge Training, Tools, and Techniques Tokyo, JapanNov 11-12 2004 http://pacsec.jp pgpkey http://dragos.com/ kyxpgp 9969 From: David Alexander Date: Wed Oct 27, 2004 10:52am Subject: RE: Smallest Gps enabled Cellphone (for tracking purposes) I think part of the problem was the nature of the fragmented RF spectrum in European countries, and the ongoing work to try and harmonise them within the EU (a work I believe is now largely completed). Regards Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... > -----Original Message----- > From: Dragos Ruiu [mailto:dr@k...] > Sent: 27 October 2004 00:19 > To: TSCM-L@yahoogroups.com; contranl > Subject: Re: [TSCM-L] Smallest Gps enabled Cellphone (for tracking > purposes) > > > > On October 26, 2004 02:36 pm, contranl wrote: > > PCS is that CDMA ? (not GSM) i guess so ... > > being a European i don't like the fact that the biggest consuming > > country in this world (USA) has to have his own standards > > so interesting products at good prices don't work in the rest of the > > world...same goes for scanners (other frequency bands and other > > digital radio-standards like Apco/Tetra)..same for video/tv stuff. > > Well I believe the finger of blame ought to be pointed in the reverse > direction. It was European standards bodies that first put GSM > overlapped with AMPS, (arguably as a protectionist move > on the part of the then dominant PTT aligned national manufacturers, > but that's academic now) which led to the current multiband > GSM debacle. > > There are no innocents in this game imho, and UMTS-3000 or > whatever brand name is being bandied today, _might_ be deployed > and solve this hopefully before 3000 :-) - and then one might > be able to get a terrestrial cell phone that works everywhere > on this planet. But, likely, by that point we'll have different > orbital standards :-). > > The GSM folks did hold their TDMA line against the technically > superior CDMA (from every analysis I've ever read) for long > time though... I wonder if the Qualcomm patents have expired yet :-). > > cheers, > --dr > -- > World Security Pros. Cutting Edge Training, Tools, and Techniques > Tokyo, JapanNov 11-12 2004 http://pacsec.jp > pgpkey http://dragos.com/ kyxpgp > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > 9970 From: James M. Atkinson Date: Wed Oct 27, 2004 11:32am Subject: Go Red Sox 'nuff said, -jma 9971 From: James M. Atkinson Date: Wed Oct 27, 2004 11:31am Subject: Delphi, XM Unveil Handheld Satellite Radio Receiver TSCM folks should keep an eye out for these new XM receivers as their local oscillators will give you fits when performing a sweep as there is considerable LO radiation. These will likely be "The Gift" with executives this year, so expect to start seeing them on sweeps after Thanksgiving. -jma World Media Digest Delphi, XM Unveil Handheld Satellite Radio Receiver Annys Shin, 10.27.04, 12:07 PM ET washingtonpost.com XM Satellite Radio and radio manufacturer Delphi yesterday introduced the Delphi XM MyFi, a portable, handheld satellite radio receiver the companies hope will lure more consumers to a medium currently limited to car and home units. Along with giving its subscribers the convenience of a traditional transistor radio, the MyFi also offers a five-hour recording capacity to let listeners download favorite programs and songs. The MyFi is the latest entry in the highly competitive battle over digital music, a fight that pits XM against its immediate competitor, Sirius Satellite Radio, but more broadly against on-line music sources like Napster, and the makers of small, highly portable MP3 and other devices. It was unveiled at a New York nightclub on the same day that Apple Computer used rock superstars U2 to promote the release of a higher capacity iPod, and less than a month after Sirius announced it had signed popular radio personality Howard Stern to a five-year contract. Since it launched its service three years ago, XM has reached its 2.5 million subscribers through factory-installed receivers in automobiles, detachable units for other cars, and Delphi boomboxes. Over the past several weeks, it also announced a deal to pipe music into Starbucks stores, and to offer programming online for paid subscribers. But XM's service, along with that of Sirius, has lacked the portability of devices such as the iPod and MP3 players. Now, with the MyFi, subscribers can receive XM's more than 130 channels of talk, news, sports, and commercial-free music, on a device about the same size as a handheld organizer. Unlike Delphi's plug-and-play satellite radio receivers, the MyFi doesn't require an antenna and can be used with headphones. The device also comes with a docking station for recharging and accessories to hook it up to car stereos and home audio equipment. MyFi will be available in stores and through on-line retailers in December -- too late for the post-Thanksgiving shopping rush, but still in time for the holiday gift-buying season. The suggested retail price of $349.99 makes it a high-end item, said analysts. And consumers still have to pay $9.99 per month for programming. But XM officials and analysts said the product is likely to appeal to those who prefer to have disc jockeys serve up music instead of having to burn their own CDs or download music to MP3 players. Such "user-intensive" devices require consumers "to work too hard to get the freshest entertainment product," said Francisco Ordonez, president of Delphi Product and Service Solutions. Ordonez and XM Satellite Radio chief executive Hugh Panero unveiled the MyFi at the Chelsea nightclub in Manhattan before an audience of about 50 reporters and Delphi and XM staff, as they nibbled on potato-goat-cheese-and-wasabe dumplings and shrimp on skewers. In his remarks, Panero called the MyFi "the next big step" in the evolution of XM Satellite Radio. Ordonez called the MyFi "a change not just in the satellite radio category, but in consumer electronics," and likened its debut to the introduction of the transistor radio and the portable CD player. At the end of his remarks, Panero quipped, "We've gone Hollywood," and on cue, several "lifestyle" models -- a young male in a red hooded sweatshirt, a young woman in a pink track suit and a man in a business suit, among others -- descended a set of stairs, listening to the new radios. XM officials would not disclose how much they spent to develop MyFi or how much they intend to spend on marketing it. They did, however, preview a new television spot featuring singer Elton John hawking the MyFi and his new song, "Answer in the Sky." The roll out of MyFi caps a busy month for XM, which earlier this month debuted the "Bob Edwards Show," and shock jocks Opie and Anthony. On Oct. 20, the company also announced it had signed an 11-year, $650 million broadcasting and marketing deal with Major League Baseball. Shares of XM closed yesterday at $32.54, down slightly from $32.74. Even before the MyFi debut, XM Satellite Radio was on target to reach its goal of 3.1 million subscribers by year's end, said Janco Partners analyst April Horace. "Will [the new device] continue to drive subscription growth? Yes," Horace said. "Has XM expanded the marketplace once again? Yes." In a research note released yesterday, Legg Mason's Sean Butson wrote, "Although we are disappointed that the device will not be available until after Thanksgiving, we do believe it will be a game-changer and provide XM with a differentiated weapon in its retail arsenal." ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9972 From: Hawkspirit Date: Wed Oct 27, 2004 5:49pm Subject: Cell Phone Ping I am pretty sure that the SMS messages use traffic channels especially when the mobile subscriber sends an originating message into the system. Roger Date: Mon, 25 Oct 2004 12:03:38 -0000 From: "fjansgmxnet" Subject: Re: Cell Phone Ping --- In TSCM-L@yahoogroups.com, "Hawkspirit" wrote: > > > The target cell phone when on will always be monitoring the control channel > at the cell site in which it is located for an incoming call or text > message. When that incoming page goes out, the cell phone handshakes with > the site and is assigned a send and receive channel frequency. One of > several hundred possible. All this coded in TDMA, CDMA, or GSM. So you gonna > find it with a scanner? > > Roger > I was only taking about GSM. I think that SMSs transmission are only on the control channel and that there is no allocation of a traffic channel for SMS. Therefore the modified scanner has only to scan the available (underband) control channels. I am wrong? Of cause, maybe there is a similar SMS transmission exactly at the expected time in the range of the scanner. But sending two or three SMSs will decrease the probabiliy of false hits. Regards, Frank [Non-text portions of this message have been removed] 9973 From: fjansgmxnet Date: Fri Oct 29, 2004 6:48am Subject: Re: Cell Phone Ping > Fjans...it all depends ...why don't you tell me first what you are > trying to achieve...or what technique you are trying to develope > for what purpose ? ...there might be simpler way's Oh, sorry, if I was imprecise. First goal: check if the target is in a certain house, for example to save time at a beginning observation. Your detector idea could work for it. But as you correctly wrote in one of your posting, rf propagation at 850/1750 MHz is not easy to estimate. So maybe a maximum range of 50 meters is a little bit short. But of cause the handling of your device would be much easyer than to find and program the correct channels in a scanner first. Additionally your detector would work if the gsm network uses frequency hopping. It is a good idea. Second goal: check if the target is in your cell or in your local area. This would be useful if your obervation target gets out of control and you want to know where you have to look for it. I think for this goal it is necessary to demodulate the upperband control channel of the network in this cell. > You could also send such SMS or voice-call message your self ? > Send one good message and try to copy it from the air..then > (re)transmit it yourself (on the right channel)...(ILLEGAl !) Retransmiting would be difficult. You have to know the current TMSI of your target and your signal have to be stronger than the base station signal. > Another way might be to make a portable kind of IMSI-catcher > you could use a new "PICOCELL" (like i mentioned in a previous I think I can build your detector or a demodulator for a strong gsm carrier, but to build a IMSI-catcher is far to difficult for me. To buy one would be an alternative. > posting) you go to the area ...you have the target-IMSI > preprogrammed Normally I don't have the target-IMSI. I only have the phone number of the target and no access to the providers database. To catch the target-IMSI would be another working step. > I was able to do tracking without paying for it > and without my trackings being registrated at the LBS-provider > ofcourse that was just playing. But the tracking SMSs were displayed on the display of the gsm phone, correct? > 2 days later the service went off-air...to never comeback ! > (probably for other reasons) Please don't do it again ;-) Maybe I want to use such services for other purposes ;-)) Regards, Frank 9974 From: savanted1 Date: Fri Oct 29, 2004 2:30pm Subject: Secret Service Nabs 28 in Online Fraud Sting Elizabeth Millard, www.enterprise-security-today.com An undercover investigation led by the U.S. Secret Service has led to the arrests of 28 individuals suspected of being part of a global organized cybercrime network. Charges against the suspects include identity theft, computer fraud, credit-card fraud and conspiracy. 9975 From: satcommunitfive Date: Sat Oct 30, 2004 6:59am Subject: Re: Cell Phone Ping would be easier to find the 2meg [E1/T1]microwave link that the persons carrier is using -the `cell master MT8212B` has a decoder for this I belive [option 50] -but here in OZ they use anywhere from 20 to 40 Ghz links! but you can buy old links from auctions etc.. http://www.us.anritsu.com/products/ARO/North/Eng/showProd.aspx? ID=673&cat=1&cat2=2&cat3=36&cat4=0 bring back the old AMPS ! here [GSM and CDMA] you would have to crack the A5 encryption even if you managed to get a baseband output - maybe a new "battery" for the person would be good ... my 2c --- In TSCM-L@yahoogroups.com, "fjansgmxnet" wrote: > > > > > Fjans...it all depends ...why don't you tell me first what you are > > trying to achieve...or what technique you are trying to develope > > for what purpose ? ...there might be simpler way's > > Oh, sorry, if I was imprecise. > > First goal: check if the target is in a certain house, for example to > save time at a beginning observation. Your detector idea could work > for it. But as you correctly wrote in one of your posting, rf > propagation at 850/1750 MHz is not easy to estimate. So maybe a > maximum range of 50 meters is a little bit short. But of cause the > handling of your device would be much easyer than to find and program > the correct channels in a scanner first. Additionally your detector > would work if the gsm network uses frequency hopping. It is a good > idea. > > Second goal: check if the target is in your cell or in your local > area. This would be useful if your obervation target gets out of > control and you want to know where you have to look for it. I think > for this goal it is necessary to demodulate the upperband control > channel of the network in this cell. > > > You could also send such SMS or voice-call message your self ? > > Send one good message and try to copy it from the air..then > > (re)transmit it yourself (on the right channel)...(ILLEGAl !) > > Retransmiting would be difficult. You have to know the current TMSI > of your target and your signal have to be stronger than the base > station signal. > > > Another way might be to make a portable kind of IMSI-catcher > > you could use a new "PICOCELL" (like i mentioned in a previous > > I think I can build your detector or a demodulator for a strong gsm > carrier, but to build a IMSI-catcher is far to difficult for me. To > buy one would be an alternative. > > > posting) you go to the area ...you have the target-IMSI > > preprogrammed > > Normally I don't have the target-IMSI. I only have the phone number > of the target and no access to the providers database. To catch the > target-IMSI would be another working step. > > > I was able to do tracking without paying for it > > and without my trackings being registrated at the LBS-provider > > ofcourse that was just playing. > > But the tracking SMSs were displayed on the display of the gsm phone, > correct? > > > 2 days later the service went off-air...to never comeback ! > > (probably for other reasons) > > Please don't do it again ;-) Maybe I want to use such services for > other purposes ;-)) > > Regards, > Frank 9976 From: Hawkspirit Date: Sun Oct 31, 2004 2:00pm Subject: Unknown Device. Does anyone know what device this is? It was found at the d-mark of a residence. Roger The device is lid box 1&3/4" long x1/2" wide one side has printed on it 03-96-06 341416-01 the other side has molded in to it hr KEPTEL listed 4885 mgn-t UL communcation erd-r ntwk circuit access xi co there are two wires 7" long one is red and one is green and they have the flat horseshoe shaped connectors that you slide on to the connection and tighten down the nut or screw to secure it. [Non-text portions of this message have been removed] 9977 From: Preflatish Date: Sun Oct 31, 2004 2:38pm Subject: Re: Unknown Device. Hawkspirit wrote: > > >Does anyone know what device this is? It was found at the d-mark of a >residence. Roger > > > >The device is lid box 1&3/4" long x1/2" wide > >one side has printed on it > > 03-96-06 > > 341416-01 > > > >the other side has molded in to it > > hr KEPTEL listed 4885 mgn-t UL > > communcation erd-r ntwk circuit access xi co > > >there are two wires 7" long one is red and one is green and they have the >flat horseshoe shaped connectors that you slide on to the connection and >tighten down the nut or screw to secure it. > > > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > > > Are you sure it's not just a DSL/POTS splitter? 9978 From: Michael Puchol Date: Sun Oct 31, 2004 3:39pm Subject: Re: Unknown Device. Hi, Agreeing with previous post, could it be something along these lines? http://www.alcoa.com/afl_tele/en/product.asp?cat_id=74&prod_id=227 Regards, Mike ----- Original Message ----- From: "Hawkspirit" To: Sent: Sunday, October 31, 2004 9:00 PM Subject: [TSCM-L] Unknown Device. > > > > Does anyone know what device this is? It was found at the d-mark of a > residence. Roger > 9979 From: javier_vc1 Date: Sun Oct 31, 2004 1:03am Subject: PBX tapping (legal) Good Morning gentlemen, One of my clients is a large corporation with a Central office and several Branch Offices, all connected by high-speed WAN links. PBXs based on Nortel/Avaya. There¥s been some cases involving compromised information. Prime suspects are disgruntled employees. The manager wants to acquire a system to remotely listen/tape any phone conversation going in or out their facilities. (By remote meaning my client¥s network, so no standard RF tapping equipment is useful.) As far as I know, this would be completely legal in my country, as my client owns and has full control over the corporate¥s phone system. So, I¥ll be more than grateful if any of you could point me to the right equipment/company. Or, if you provide such service, please let me know off-list. Thank you. 9980 From: dj Date: Sun Oct 31, 2004 3:16pm Subject: Re: Unknown Device. Sounds like you are describing a TA for a Communications line to the Internet. Probably a T-1 or simliar conenction. Call the Phone company and ask them if they still service units such as that one. Tell them a customer from that street brought it in for repair and one of your techs that left your company knew what it was for and you don't. Ask them if they have schematics. Doesn't hurt to fib a little. --------------------------------- Do you Yahoo!? Yahoo! Mail Address AutoComplete - You start. We finish. [Non-text portions of this message have been removed] 9981 From: James M. Atkinson Date: Sun Oct 31, 2004 3:41pm Subject: Re: Unknown Device. What size demarcation box was it found in? Was it hooked up to an operational pair? What effect did it have on the line? Was the plastic box gray, black, or brown in color? Was the KEPTEL logo formed into the plastic as a raised logo, or was it below the surface? Was the enclosure a molded thermoplastic, shrink boot, or epoxy? Are you sure the wires were only 7 inches long, and not 7.9 inches? Please double check the numbers and markings on the item as at least one of the numbers is off. What kind of an RF field (if any) was emanating from the thing? What was the gauge of the wire coming out of the thing? With only two wires it sounds like a ALCOA half REN circuit or RFI filter. -jma At 03:00 PM 10/31/2004, Hawkspirit wrote: > > >Does anyone know what device this is? It was found at the d-mark of a >residence. Roger > > > >The device is lid box 1&3/4" long x1/2" wide > >one side has printed on it > > 03-96-06 > > 341416-01 > > > >the other side has molded in to it > > hr KEPTEL listed 4885 mgn-t UL > > communcation erd-r ntwk circuit access xi co > > >there are two wires 7" long one is red and one is green and they have the >flat horseshoe shaped connectors that you slide on to the connection and >tighten down the nut or screw to secure it. > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9982 From: kondrak Date: Sun Oct 31, 2004 3:56pm Subject: Re: Unknown Device. Sounds like a RFI suppression device. Pull it and check it with a VOM to see if it draws any current when the leads are connected either way to a battery, (that should tell you if its got active components, or is merely a filtering device). Do you have a pix? At 15:38 10/31/2004, you wrote: >Hawkspirit wrote: > > > > > > >Does anyone know what device this is? It was found at the d-mark of a > >residence. Roger > > > > > > > >The device is lid box 1&3/4" long x1/2" wide > > > >one side has printed on it > > > > 03-96-06 > > > > 341416-01 > > > > > > > >the other side has molded in to it > > > > hr KEPTEL listed 4885 mgn-t UL > > > > communcation erd-r ntwk circuit access xi co > > > > > >there are two wires 7" long one is red and one is green and they have the > >flat horseshoe shaped connectors that you slide on to the connection and > >tighten down the nut or screw to secure it. > > > > > > > > > > > >[Non-text portions of this message have been removed] > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > >Are you sure it's not just a DSL/POTS splitter? > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 9983 From: A Grudko Date: Mon Nov 1, 2004 2:44am Subject: RE: Unknown Device. -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] > Does anyone know what device this is? It was found at the d-mark of a residence. It could be a simple static/mains spike bleed off device (these should be earthed independently of the copper pair but are often not). But it could be a 'bug' disguised as one. Your post begs some questions: The first is not a tech question. What is a 'd-mark' ? (This is an international list. Technical terms vary from country to country - to me a d-mark is a unit of German currency). I am assuming this refers to an access point to a customer's 'phone line. Q1. Was the box connected to an active phone line wire pair? (you don't say if it was connected at all) Q2. If the pair was not a phone/data line, did you test it for audio? Q3. If it was connected to an active phone line wire pair, was it connected in series or parallel? Q4. If so #2, was the pair used for analogue or digital communications? Q5. If so #3, did it draw current either on or off hook? Q6. If so #4, did you test it for RF output on and off hook? Numbers printed on a label may mean nothing - any kid can put a CIA logo on a sticker. So the label can also be disinformation; " Don't worry Roger, the KEPTEL 4885 is a harmless bipolar network integrator" when in fact it's beaming directly into Osama bin Laden's hideaway in the hills of Wales. Contrary to folk law, government covert surveillance devices don't have anything written on them that tip off TSCMers that this is a government 'bug'. So the most important question is... what was in the box? Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.764 / Virus Database: 511 - Release Date: 2004/09/15 [Non-text portions of this message have been removed] 9984 From: Date: Mon Nov 1, 2004 4:10am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. From: Ray Van Staden Date: Fri Oct 26, 2001 5:41am Subject: Digest Number 746 To the Group My anger on Monday was vented against the South African Authorities, not any other country. I am still very bitter & angry at was has happened, it could so easily have been my mother. My mother lives on the neighbouring farm in house on her own, next door lives my cousin & his wife & children On Monday my uncle had gone out 09h00 to count the cattle on his one farm. At 10h45 when he returned home & found my aunt dead next to the safe. It was determined she had put a fight at first, but stood no chance against 4 assailants, they forced her to open the safe, she was apparently on her knees when they shot her through the back of the head execution style. They got what they had come for, then they just murdered her. Between my uncle's farm & town of Memel which is less than 80 Km's, there have been 4 farm murders in one week. Nothing was done to protect or warn farmers. In 1997 there were 443 farm attacks, in 2000 there was 905 farm attacks, more than 100% increase. In the same period farm murders have increased from 84 to 144, a 50% increase. It works out to a farm murder every 2,5 days. Are these people being protected ? What must they do? Must they just allow this murders & attacks to continue? Do you know we have a 3 % conviction rate for all reported crime here in South Africa, meaning 97% of all crimes are successfully committed. Must we continue to accept this? Our fellow man is robbed & slaughtered & nothing is being done about it. Daily I deal with criminal cases which might clients ask me to investigate, I give complete cases which in theory are "water-tight" but due to corruption & back handers, I see these cases collapse due to dockets going missing or vital evidence going missing. Even our so-called "elite" scorpions" are corrupt I am currently busy with case where the Scorpions have colluded with criminals in an attempt to frame an innocent person. In the light what has just happened, I can not just sit back, & let my family & friends become statistics. I now have to reassess how I now do things. Regards Raymond --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 3993 From: A Grudko Date: Fri Oct 26, 2001 0:24pm Subject: Re: American women go to war - Original Message - > > Let us go and fight. The Taliban hates women. Imagine their terror as we crawl like ants with hot-flashes over their godforsaken terrain. James has come up with the ultimate biological weapon - the pre-menopausal Bett Middler or even more dangerous, Saigon-Jane Fonda - let's hope she never has access to the media (yes I know...). (No disrespect intended to the ladies - I have 3 great ones in my household) Chilling out Friday night after a loooong week in SA Andy Grudko South Africa 3994 From: James M. Atkinson Date: Fri Oct 26, 2001 6:21pm Subject: 2-year lag hampers CSIS spycatchers 2-year lag hampers CSIS spycatchers http://www.thestar.com//NASApp/cs/ContentServer?GXHC_gx_session_id_=448d6dab57f87af6&pagename=thestar/Layout/Article_Type1&c=Article&cid=1004047483747&call_page=TS_News&call_pageid=968332188492&call_pagepath=News/News&col=968793972154 Security agency overworked, underfunded Tonda MacCharles OTTAWA BUREAU OTTAWA - Canada's spy agency is so strapped it takes nearly two years to do a security screening on people who are suspected risks and seeking permanent resident status in Canada, the spies' watchdog body said yesterday. "Of course it should be shorter," said Quebec lawyer Paule Gauthier, who chairs the five-person Security Intelligence Review Committee, the civilian agency that oversees the Canadian Security Intelligence Service. CSIS, Gauthier said, obviously needs more resources - "I think they are stretched to the maximum'' - but she refused to speculate how much more money would be appropriate. She further warned CSIS is facing a shortage of professionals who can translate and analyze intelligence collected and that heavier responsibilities heaped on the agency since Sept. 11 are unrealistic. The new duties include up-front screening of all refugee claimants. Federal cutbacks in the 1990s saw CSIS staff cut by almost a quarter, from 2,700 to 2,061. And while the agency is expected to see a significant increase in its $200 million annual budget, experts warn money alone won't provide any quick fix since it takes roughly five years to fully train an agent. Gauthier's committee reported yesterday that in the year 1999-2000, CSIS conducted 81,650 security assessments on immigrants and refugees applying for landed status. The vast majority of these background checks turned up nothing and were processed quickly. But the 166 cases that required more thorough briefs - identifying security risks that were submitted to the immigration minister - took CSIS an average of between 644 and 661 days to process. Those numbers don't include the screenings CSIS is asked to do on federal government employees seeking security clearances to do their job (32-113 days to process depending on the level of clearance sought), or those on airport workers seeking access to restricted areas (32 days to process), or assessments for accreditation to parliamentary areas or certain events (no processing time identified), according to the annual report on CSIS activities presented yesterday by Gauthier's committee. After last month's terror attacks in New York and Washington, Immigration Minister Elinor Caplan asked CSIS to conduct in-depth screening on all refugee claimants at the "front-end" of the process, or as soon as they enter Canada and apply for refugee status. "We all know now, and we knew before Sept. 11, the importance of this part of their work," said Gauthier. But she suggested Ottawa's expectations are not practical "given the resources they (CSIS) have today. They need more, that's for sure. They need resources and the right persons with the skills. It's very important they have trained and qualified staff.'' The extra $10 million for CSIS announced last Friday by Solicitor-General Lawrence MacAulay is largely targeted for new equipment, she observed. Yesterday, MacAulay said he would evaluate the committee's findings and if more staff and resources are needed for certain tasks, then consideration will be given to them. Meanwhile, Caplan stressed to reporters yesterday there is no expectation that the new up-front security screening of refugee claimants means a full clearance will be done in 72 hours. Under the old system, refugee claimants were not screened until they had refugee status and were applying to become permanent residents. But now, up-front screening means the process will begin as soon as people apply for refugee status. Obvious cases - like those would-be refugees whose names pop up in the CSIS or RCMP database - can be excluded from the process right away. New rules would also give officials the power to pull someone from the refugee hearing system if the full security screening shows links to terrorists or other risks. The committee found overseas agents worked in substandard conditions The SIRC report for 2000-2001 also concluded: Overseas, CSIS liaison officers often work in sub-standard conditions, with poor physical facilities and an "onerous workload" arising from the large numbers of immigration and visa applications requiring security screening. CSIS did not abuse its intrusive wiretap and mail interception powers. SIRC determined by an audit of selected cases that CSIS wiretap activities were usually carried out according to the conditions contained in federal warrants. The Federal Court did not deny any of the 206 warrant renewals or applications by CSIS last year. The SIRC report noted CSIS retained some information collected in one case longer than CSIS operational policy allows to help an allied agency's investigation of a terrorist network. In another case, it collected information on persons not specifically named in a warrant, but legally captured under a "basket clause" in the warrant. (The Supreme Court of Canada has upheld such clauses, SIRC says.) Gauthier agreed with CSIS director Ward Elcock, who told a Commons committee last week the service already has the power to do covert operations abroad. "They are fit to do the job," she said. "I'm not saying they can't improve, but you don't need new powers to have the analysis of all the information you have, to maybe improve on some part of the work you do. But the basic powers that they have are sufficient to do the work.'' -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3995 From: James M. Atkinson Date: Fri Oct 26, 2001 6:22pm Subject: Phone call key to cup spy scandal Sean Reeves says the accusations are a stunt. Herald Picture / David White Phone call key to cup spy scandal http://www.nzherald.co.nz/storydisplay.cfm?storyID=224827&thesection=news&thesubsection=general 27.10.2001 By EUGENE BINGHAM and TONY WALL A 30-minute phone call between yachting legend Chris Dickson and fellow New Zealander Sean Reeves is the crucial focus of an America's Cup espionage scandal. The Herald can reveal the man accused of trying to sell secret design and technical plans worth $6 million is Reeves, a 40-year-old former lawyer who left Team New Zealand last year and lured others with him to the Seattle-based One World syndicate. He also is accused of trying to pass information about Team NZ. The case hinges on a phone call Reeves made to Dickson, who leads the California-based Oracle Racing team backed by computer billionaire Larry Ellison. Dickson alleges that during the July 17 conversation, Reeves offered to sell him design and technical secrets about One World and Team NZ. But Reeves said yesterday that he and Dickson chatted about old yachting stories and their babies. Reeves denied offering information to Oracle or any other syndicate and said he would sue One World over the allegations. The affair is now before the King County Superior Court in Seattle where One World is seeking an order gagging Reeves and forcing him to return any syndicate information. Documents originally filed in the court referred to the defendant only as "John Doe". Reeves' identity was uncovered in documents obtained by the Herald. He sailed at the Olympics for New Zealand and was involved in the winning America's Cup campaign in 1995. After acting as a legal rules adviser for Team NZ last year, he helped American billionaire Craig McCaw establish a new syndicate. Reeves was involved in signing other team members, including veteran sailor Craig Monk and designer Laurie Davidson. He said yesterday that he created One World and it was "my baby". His departure this year was "mutually negotiated". "I did not resign and I was not sacked," he said. "I did not agree with a certain restructuring proposal and the direction the syndicate was taking." Reeves said the departure agreement included a 12-month restraint of trade and a confidentiality clause. In a declaration to the court filed in California, Dickson said he phoned Reeves back after receiving a message from him. "He said that he held knowledge from the design and technical perspective of the One World programme and the previous Team New Zealand programme. "Reeves also said that he had come to a financial settlement with One World that was less than he had been expecting and that he was looking to recover some of his losses. "Reeves told me that he held line plans, rig plans, keel plans and deck layouts but did not specify for which boats or which teams." After a 30-minute conversation, Dickson said Oracle was not interested in receiving any information. A week later, Dickson rang Reeves and said Oracle had told One World about his offer, but had not named him. Reeves said he phoned Dickson because he had read a magazine article about him and found it amusing. "We spoke on the phone and had a bit of a giggle," he said. "Then we talked about our babies." Reeves said no offer was made to sell or exchange information. "I've had a long association with Chris," he said. "We had some difficulties. We had a bit of a falling out in 1984 - it was a personality clash. Our relationship now is reasonably good." He suggested the allegations - which had "no foundation in law or fact" - were a "stunt" and part of gamesmanship between Oracle and One World. "There is a bigger game between One World and Oracle which will backfire on them." Reeves said the thought of fighting legal action in America was daunting. "I'm training to be a pro-tennis coach, I have a new baby, I'm not on a huge income," he said. "All of a sudden here's the spectre of ... having to defend myself against not one but two billionaires. What are they trying to do? Are they bitter that I'm out there in the big wide world and I hold all this information in my head?" Reeves said information and trade secrets had been swapped between syndicates since last year. He hoped to be involved in the next America's Cup. "But the cup has got to be the best breeding ground of paranoia I've ever witnessed," he said. "No one trusts each other." In a court declaration lodged in Seattle, One World chief executive Gary Wright said the information allegedly offered was worth more than $US2.5 million ($5.9 million). One World lawyer Robert Maguire said in another declaration: "Reeves came as close to disclosing One World's information to Oracle without actually doing so - prevented only by Oracle's refusal to accept any such information." On August 16, Judge Steve Scott granted a One World request for a court deposition to be taken from Dickson revealing the identity of "John Doe". The case is next set down for hearing in Seattle next month. -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3996 From: James M. Atkinson Date: Fri Oct 26, 2001 11:11pm Subject: Advanced Chemical Weapons Training Manual Online as PDF file Good evening, I just wanted to let the group know that I have uploaded a PDF copy of the Advanced Chemical Weapons training manual I wrote a few years ago to my website. http://www.ostgate.com/advchemw2.pdf As many of you know I have been certified to teach as an Instructor and Master Instructor not only with chemical weapons, but also flash bangs, distraction devices, bean bag rounds and impact munitions, and related tactical things of a technical nature. I have also designed and developed a number of "special tactical goodies that go bang, poof, and light up the night", and have experience actually assembling, manufacturing, and testing various chemical weapons. I have completed formal instructor and master Instructor training from Mace, Federal labs, DEFTEC, National Tactical Officer Associations, numerous other schools, and can literally teach SWAT/ERT teams and make other Instructors. I am literally one of the "Instructor who teaches the other instructors" (there are less then 50 of us in the entire world). In the event that you like the manual I would appreciate at least some kind of small token of your thanks for each copy (beer money, agency patch, thank you note, coffee mug, agency photo, team pic, first born, etc). Please feel free to pass along the link to the PDF file, an let me know what you think. Please feel free to offer back some suggestions as to how it can be improved. Read it in good heath, and be safe out there. -jma -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 3997 From: Aimee Farr Date: Fri Oct 26, 2001 11:42pm Subject: Urban Combat: Lessons from Russia Review: not as good as Mortal Kombat. @ http://www.rand.org/publications/MR/MR1289/MR1289.ch4.pdf "Furthermore, if the Russians improved on some aspects, they ignored others......They continue to have trouble with secure voice communications." ---(full article)--- http://www.rand.org/publications/MR/MR1289/ Russia's Chechen Wars 1994-2000 : Lessons from Urban Combat. ~Aimee "It's always Russia, Russia, Russia..." [parody Brady Bunch] 3998 From: Date: Sat Oct 27, 2001 8:45am Subject: Check out Who did it? Foreign Report presents an alternative view Click here: Who did it? Foreign Report presents an alternative view 3999 From: Date: Sat Oct 27, 2001 2:08pm Subject: presents an alternative view - corrected url http://www.janes.com/security/international_security/news/fr/fr010919_1_n.shtm l 4000 From: Matthew Paulsen Date: Sat Oct 27, 2001 1:33pm Subject: RE: Check out Who did it? Foreign Report presents an alternative view The link you gave went to an ad. I believe this is the document you were referring to. http://www.janes.com/security/international_security/news/fr/fr010919_1_n.sh tml Matt -----Original Message----- From: MACCFound@a... [mailto:MACCFound@a...] Sent: Saturday, October 27, 2001 10:45 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Check out Who did it? Foreign Report presents an alternative view Click here: Who did it? Foreign Report presents an alternative view ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L "War is an ugly thing, but not the ugliest of things: the decayed and degraded state of moral and patriotic feelings which thinks that nothing is worth war is much worse. A man who has nothing for which he is willing to fight; nothing he cares about more than his own personal safety; is a miserable creature who has no chance of being free, unless made and kept so by the exertions and blood of better men than himself." - John Stuart Mill =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4001 From: Paolo Sfriso Date: Mon Oct 29, 2001 2:22am Subject: U.S. Government Compendium of Weapons of Mass Destruction Dear Colleagues. Following is a link to a downloadable 137 page "Adobe" document related to training facilities for WMD response personnel. http://www.usfa.fema.gov/pdf/cwmdc.pdf Kind Regards. Your Italian Connection. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 4002 From: Dawn Star Date: Mon Oct 29, 2001 10:57am Subject: For What? Now that we have all been convinced to surrender a chunk of our privacy rights in the name of anti-terrorism, here are the disposable cell phones that make all of this rights crushing meaningless. For $30.00 a terrorist can change cell phones twice a day and never be heard, He just has to drop down to his local 7-11 and in 2 minutes pick up a fresh phone number. Now we damn near have warrantless invasion of all our communications and our homes for what? Roger http://www.hop-onwireless.com/ http://www.telespree.com/products/main_rtg.html 4003 From: Paolo Sfriso Date: Mon Oct 29, 2001 0:22pm Subject: Suggestions and photos for TSCM service webpages Dear Colleagues. I am trying to finally get our website running which will contain a few pages (in Italian) dedicated to our TSCM services. Does anybody have any suggestions on the dos and donts for a functional TSCM service webpage ? Spare photos of bugs and sweep equipment would also be greatly appreciated. Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 4004 From: Date: Mon Oct 29, 2001 7:17am Subject: Re: TSCM books by member of Group Dear All Could Mr G Whidden who I believe is a member of this group please contact me reference some of his books which I wish to purchase. Regards Tim [Non-text portions of this message have been removed] 4005 From: James M. Atkinson Date: Mon Oct 29, 2001 2:59pm Subject: Re: For What? Don't tell me that you JUST NOW discovered this? [tongue is cheek] Your best bet is to go down to your local radio Shack or 7-11 and buy 2-3 disposable phones under an alias, and then every time you go out of town buy 2 or 3 more (all under different aliases). After a year or so you will have several dozen phones, but I would caution you to only use said phone when you are in the area in which you actually purchased them, or somewhere away from your primary area. After so many much usage simply let the phone go dead, remove the battery, and toss the old unit into a box. The key to all of this is to have then set up under an alias, but otherwise an completely legitimate account, and keep the accounts current and paid. If you go the prepaid route you will need to refresh your cards every 60 days or so unless you can find some balloon cards (good for 12 months or 1000 hours) Perfectly legal, but it will drive the eavesdroppers totally nutz (which as TSCM professionals is the goal). You can also mix and match the carriers such as Nextel, Omnipoint, Verizon, and Cellular One, but dedicate one phone to each carrier. When properly set up the eavesdroppers start going nutz after about the sixth phone. For example I have several phones that I only use in DC, another set for Chicago, another Montreal, and still another in NYC, LA, etc. This is addition to my primary phone (which is useful for passing false information to any spy that is eavesdropping, which is why AMPS is sometimes good to use). I also have a dedicated phones which I only use when I am in the UK or Europe (under an alias). Personally, I have one phone that I use for my day to day communications, and a suitcase of "special phones" for use during sweeps, or travels where I want commo, but don't want to give up my ID or location... But when at all possible, I try to avoid using any kind of wireless communications. I also make use or INMARSAT, IRIDIUM, and several similar services (some under my real name, and some under an alias; but totally above board and paid up). -jma At 8:57 AM -0800 10/29/01, Dawn Star wrote: >Now that we have all been convinced to surrender a chunk of our privacy >rights in the name of anti-terrorism, here are the disposable cell phones >that make all of this rights crushing meaningless. For $30.00 a terrorist >can change cell phones twice a day and never be heard, He just has to drop >down to his local 7-11 and in 2 minutes pick up a fresh phone number. Now >we damn near have warrantless invasion of all our communications and our >homes for what? >Roger > > >http://www.hop-onwireless.com/ > >http://www.telespree.com/products/main_rtg.html -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 4006 From: sdonnell Date: Mon Oct 29, 2001 7:25pm Subject: Re: For What? Hi, One problem w/ these "pay as you go" phones, is that they wont accept incoming calls(yet). But I supose you could cure this in part by getting a pager at the same 7-11... Steve "James M. Atkinson" wrote: > > Don't tell me that you JUST NOW discovered this? [tongue is cheek] > > Your best bet is to go down to your local radio Shack or 7-11 and buy > 2-3 disposable phones under an alias, and then every time you go out > of town buy 2 or 3 more (all under different aliases). [Non-text portions of this message have been removed] 4007 From: A Grudko Date: Tue Oct 30, 2001 4:38am Subject: Re: For What? - Original Message - From: Dawn Star > Now we damn near have warrantless invasion of all our communications and our > homes for what? To give Papa Bush and Baby Bush another step towards their New Word Order. Here in South Africa we have a mindless 24 hour TV show which calls itself 'Big Brother'. It's a voyueristic European concept of self-imposed surveillance and (self-degradation) which I have not heard of in a US context other than the movies 'The Truman show' and 'Mr Ed'. I see irony here in that the 'contestants' on this show no nothing of the events of 9/11 and the resultant loss of liberty in the US. Incidentally, I have no objection to surveillance being used for crime prevention and detection. I just doubt the intentions of politicians of any party or country to leave it in the hands of straight law enforcement and intelligence offices. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4008 From: A Grudko Date: Tue Oct 30, 2001 0:37am Subject: Disposable phones - Original Message - > Hi, One problem w/ these "pay as you go" phones, is that they wont > accept incoming calls(yet). But I supose you could cure this in part by > getting a pager at the same 7-11... Steve Now my interest is peaked. We have 'free' (GSM) cell phones in South Africa but only if you sign up for a contract. We also have prepaid accounts but they operate in normal full feature 'phones - one would not usually think of the 'phone as 'disposable' although the card is if you don't mind loosing the number. This obviously is not a problem if you can't receive calls. Do they even have an IMEI number (all our 'phones have a unique 15 digit ID code which assists in tracking use)? Are these GSM 'phones? At $30 they must be very basic - as jma implied, probably the battery is worth more than the electronics. Just curious. 4009 From: A Grudko Date: Tue Oct 30, 2001 0:46am Subject: Cell phone range Talking about cell phones Is a GSM 'phone's range limited by the time it takes for data to be exchanged? I don't know much about cellular technology, but as a silly example, if I was 250 000 000 metres away on the moon, assuming there was enough RF to get a signal, would the one second delay each way stop the GSM data stream? If so, does anyone know what the range constraint is that this implies? Just a thought I had in trying to assist a client in getting better cellular coverage in more remote parts of Africa. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4010 From: Steve Uhrig Date: Tue Oct 30, 2001 8:14am Subject: Re: Cell phone range Once upon a midnight dreary, A Grudko pondered, weak and weary: > Talking about cell phones > Is a GSM 'phone's range limited by the time it takes for data to > be exchanged? No. I don't know much about cellular technology, but as > a silly example, if I was 250 000 000 metres away on the moon, > assuming there was enough RF to get a signal, would the one > second delay each way stop the GSM data stream? You have a lot of givens. > If so, does anyone know what the range constraint is that this > implies? Just a thought I had in trying to assist a client in > getting better cellular coverage in more remote parts of Africa. Range is real simple. You have to radiate a loud enough signal from the source to overcome path loss to generate a loud enough signal at the receiver's antenna input to provide a usable signal. Many factors enter into things. Path loss increases with frequency. Directional antennas concentrate whatever signal you do generate in the direction where it will do you the most good. Presuming the higher frequencies where GSM lives, you might even run into the curvature of the Earth as being a factor, where you would not be able to use skipping off the ionosphere as a factor. There are formulas for all this stuff, where you start with ERP, subtract path loss, loss from penetrating other objects between the transmit and the receive antenna, calculate antenna gains, feedline losses, connector losses (not insignificant at higher frequencies), etc. and you ultimately arrive at a signal strenth of X dBm at various distances and countours of the land, from the signal source. If your signal is loud enough according to the math, you will have coverage. If not, you won't. You also have to factor in interference from the reuse of frequencies which is very common in cellular systems. There are only a certain number of channels, and a certain bandwidth available for each service. To accommodate the number of users wishing to use the system, frequencies must be reused which means of necessity, cells must be small. Have your client put up a high gain resonant directional antenna as high above the ground as he can arrange, fed with low loss feedline, and rotate the whole assembly in the general direction of the closest cell site for the strongest receive signal. That should improve his range significantly, as long as he is on the extreme fringe of the system and would not be tickling more than one cell at a time. There are cellular repeaters (translators, actually) commercially available, which regenerate cell signals into difficult high path attenutation areas like hospitals, but they may not be practical as you still need a loud enough signal into them for them to reradiate it. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4011 From: J‚nis Balklavs - GrÓnhofs Date: Tue Oct 30, 2001 5:53am Subject: Re: Cell phone range For GSM system the range is about 17km (17,000 metres) if my memory serves me well, limited by system technical specification. Technicaly it is limited by signal delay time system can compensate. GSM is a time-sharing system and reply from mobile subscriber must get into designated time slot. For less populated rural areas it is possible to double this range at the expense of voice channels per frequency - say 4 instead of 8. If you wish to know exactly, I'll check it later. Hope this helps. Janis Balklavs-Grinhofs "A Grudko" co.za> cc: Subject: [TSCM-L] Cell phone range 30.10.2001 08:46 Talking about cell phones Is a GSM 'phone's range limited by the time it takes for data to be exchanged? I don't know much about cellular technology, but as a silly example, if I was 250 000 000 metres away on the moon, assuming there was enough RF to get a signal, would the one second delay each way stop the GSM data stream? If so, does anyone know what the range constraint is that this implies? Just a thought I had in trying to assist a client in getting better cellular coverage in more remote parts of Africa. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , 4012 From: J‚nis Balklavs - GrÓnhofs Date: Tue Oct 30, 2001 11:48am Subject: Re: Cell phone range Sorry, I was wrong in my previous mail. As written in Nokia GSM System Training Document: The maximum theoretical distance from base station to the edge of the cell is 35 kilometres. The timing advance is adapted for these distances (that is the ability of mobile station (phone) to send bursts in advance so they arrive in the base station in the right timeslot). These larger cells mentioned are then 70 km in radius. Regards, jbg 4013 From: Matthew Paulsen Date: Tue Oct 30, 2001 11:39am Subject: RE: Cell phone range Motorola has some very nice directional panels and base stations for nearly all ranges to extend communications. I've been using them since the early 90's late 80's with high success. We coined them "bricks" in our little group of folks around here.. They weigh as much and tend to look like them. I don't know much about GSM.. Haven't really had the need to deal with it... Here's a few links. http://www.gd-decisionsystems.com/radiosystems/pdf/antenna.pdf http://www.motorola.com/GSS/SSTG/RSO/PDF/Antenna_sprd.pdf http://e-www.motorola.com/webapp/sps/site/prod_summary.jsp?code=MRF18030BS&n odeId=01M939843525973 -----Original Message----- From: J‚nis Balklavs - GrÓnhofs [mailto:Janis.Balklavs-Grinhofs@l...] Sent: Tuesday, October 30, 2001 3:53 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Cell phone range For GSM system the range is about 17km (17,000 metres) if my memory serves me well, limited by system technical specification. Technicaly it is limited by signal delay time system can compensate. GSM is a time-sharing system and reply from mobile subscriber must get into designated time slot. For less populated rural areas it is possible to double this range at the expense of voice channels per frequency - say 4 instead of 8. If you wish to know exactly, I'll check it later. Hope this helps. Janis Balklavs-Grinhofs "A Grudko" co.za> cc: Subject: [TSCM-L] Cell phone range 30.10.2001 08:46 Talking about cell phones Is a GSM 'phone's range limited by the time it takes for data to be exchanged? I don't know much about cellular technology, but as a silly example, if I was 250 000 000 metres away on the moon, assuming there was enough RF to get a signal, would the one second delay each way stop the GSM data stream? If so, does anyone know what the range constraint is that this implies? Just a thought I had in trying to assist a client in getting better cellular coverage in more remote parts of Africa. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L "War is an ugly thing, but not the ugliest of things: the decayed and degraded state of moral and patriotic feelings which thinks that nothing is worth war is much worse. A man who has nothing for which he is willing to fight; nothing he cares about more than his own personal safety; is a miserable creature who has no chance of being free, unless made and kept so by the exertions and blood of better men than himself." - John Stuart Mill =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4014 From: James M. Atkinson Date: Tue Oct 30, 2001 0:55pm Subject: Mark Barrueta Banned from the Group Good Afternoon, I just wanted to let the list membership know that "Mark Barrueta" has now been officially banned from the group until he matures sufficiently to understand how to behave as an adult in a civil manner and learns that the respected members or this TSCM community will not be a part of any unlawful activity, nor will they supply him with goods which he can not legally possess. He is also banned until he can learn to be more discrete in his affairs, learns to maintain professional courtesies and confidentiality, and learns that doing business with (and/or endorsing) people, products, businesses, and organizations commonly recognized within the industry as "crackpots, con artists, mental patients, and felons" is seriously frowned upon. -jma -- --------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. --------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com --------------------------------------------------------------------------- Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" --------------------------------------------------------------------------- 4015 From: Date: Tue Oct 30, 2001 7:53am Subject: Guidelines Instruct on Terror Laws Guidelines Instruct on Terror Laws By TED BRIDIS WASHINGTON (AP) - New guidelines from the Justice Department tell federal prosecutors how to make the most of the government's expanded surveillance powers under anti-terrorism laws, but the rules are vague on what will be permitted under some of the most contentious provisions. The guidelines, which run more than 30 printed pages, describe when authorities may search a person's home secretly, trace Internet e-mail or seize telephone voice messages. They also outline legal changes that crack down on computer hackers, who in some cases are deemed ``terrorists'' under the new laws. One official, speaking on condition of anonymity, said new warrants and subpoenas seeking newly available information may be served on targets ``within a couple days.'' In one concession to privacy concerns, FBI and Justice officials said they will not typically change the government's ``Carnivore'' Internet surveillance technology to collect more personal data than was gathered previously, except in limited cases. Legal experts generally agree that the new laws allow the FBI to use Carnivore, renamed the ``DCS-1000,'' to more broadly monitor a person's Web surfing with only perfunctory approval by a judge. ``Individual circumstances may justify a broader filter setting (for Carnivore) ... but even those would be authorized by the Department of Justice,'' said Thomas Gregory Motta, the FBI assistant general counsel. ``We're not waiting for the statute to pass so we can suddenly change all the filter settings,'' said a Justice official who asked not to be identified. Another Justice official, also speaking on condition of anonymity, said government lawyers ``take it upon ourselves to interpret the statutes in ways we think are wise and will stand the test of time, and we'll have to see how this plays itself out.'' Still, an expert hired by Justice to review the technology expressed disappointment that investigators are being given more latitude to use Carnivore even though problems identified in an oversight study last year remain unresolved. ``Some of these problems need to be fixed,'' said Henry Perritt Jr., head of Justice's own review panel and dean of the Chicago-Kent College of Law. The Justice Department e-mailed the new legal rules to the country's most cyber-savvy federal prosecutors. It also released new secret guidelines for tracking spies and foreign terrorists under a powerful 1978 anti-espionage law but those new rules were classified. Critics said that perhaps most surprising was what the Justice Department didn't tell prosecutors, that lawmakers who wrote the new anti-terrorism statutes do not believe the government should be allowed to record some types of Web searches without a wiretap order from a judge. ``They're doing that on purpose so that prosecutors interpret it as broadly as they can,'' charged Rep. Bob Barr, R-Ga., a member of the House Judiciary Committee, which helped write the law. ``They want to get as much information as they can, and I suspect they want to get a lot more information than they were intended.'' Perritt said allowing Carnivore to record Web addresses without wiretap orders is problematic because they disclose such sensitive information as where a person spends time on the Internet. ``The (Justice) guidelines don't go far enough'' in specifying what can not be collected, he said. Privacy experts have cautioned that some Web addresses can identify books a person reads or topics someone researches online, such as medical problems. The new Justice guidelines, which don't mention Web addresses, identify a few types of data that police can collect but tell prosecutors to call them about what else might be permitted. ``They don't even try to resolve that question here,'' said James Dempsey, a lawyer with the Center for Democracy and Technology, a Washington civil-liberties group. A lawyer with another civil-liberties group, David Sobel of the Electronic Privacy Information Center, agreed. ``They don't seem to want to go on record,'' he said. ``There should have been specific lang uage that took into account the technical issues.'' The government also suggested in its new rules that under some conditions authorities can secretly search a house without telling the homeowner for up to three months. Government lawyers acknowledged that these secret searches should be ``an infrequent exception'' to traditional searches, where homeowners are notified immediately. They also told prosecutors to expect additional guidance in coming weeks, and they noted that some courts have required notice of a search after as little as seven days, not 90 days. AP-NY-10-30-01 0357EST 4016 From: Aimee Farr Date: Tue Oct 30, 2001 1:12pm Subject: RE: Guidelines Instruct on Terror Laws Download (redacted): http://www.epic.org/privacy/terrorism/DOJ_guidance.pdf ~Aimee 4017 From: Date: Tue Oct 30, 2001 2:31pm Subject: Something interesting Thought everyone would enjoy this, been going to schools most of my life, and all I had to do was go to: http://pimall.com/nais/bk.tscmc.html Enjoy Steve P Advanced Countermeasures [Non-text portions of this message have been removed] 4018 From: A Grudko Date: Tue Oct 30, 2001 1:05pm Subject: Re: Suggestions and photos for TSCM service webpages - Original Message - > Spare photos of bugs and sweep equipment would also be greatly appreciated. My site is being re-engineered but under 'Technical' if you are quick you can copy some of our original photos of a sweep and an FM TX we found about 4 years ago, but my webmaster might take them off the site literally tomorrow in our revamp. All TSCM-list members are welcome to use the pics as long as we get accreditation to the effect of "Courtesy of Grudko Associates, South Africa - www.grudko.com"). I also have a stack of other similar original TSCM 'photos that used to be on our 'photo gallery' page which we discontinued about a year ago. Regards Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigation Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4019 From: James M. Atkinson Date: Tue Oct 30, 2001 4:08pm Subject: Anthrax attacks' 'work of neo-Nazis' Anthrax attacks' 'work of neo-Nazis' http://www.observer.co.uk/international/story/0,6903,582222,00.html War on Terrorism: Observer special Ed Vulliamy in New York Sunday October 28, 2001 The Observer Neo-Nazi extremists within the US are behind the deadly wave of anthrax attacks against America, according to latest briefings from the security services and Justice Department. Experts on 'survivalist' groups and extreme-right 'Aryan' militants have been drafted into the investigation as the focus shifts away from possible links with the 11 September terrorists or even possible state backers such as Iraq. 'We've been zeroing in on a number of hate groups, especially one on the West Coast,' a source at the Justice Department told The Observer yesterday. 'We've certainly not discounted the possibility that they may be involved.' The anthrax crisis, which grew last week, had by Friday night spread to mailrooms at CIA headquarters, the Supreme Court and a hospital, and yesterday three traces were found in an office building serving the US Capitol. 'There are a number of strong leads, and some people we know well that we are looking at,' the Justice Department said. 'These are groups organised into militia and "survivalist" movements - which pull out of society and take to the hills to make war on the government, and who will support anyone else making war on the government.' Investigators are examining threatening letters sent to media organisations - some dated before the 11 September attacks - which did not contain anthrax but contained similar messages and handwriting style as those which later did. The theory is that the anthrax attacks were planned - and the killer germ was obtained and treated - long before the carnage of 11 September. Speaking to The Observer yesterday, the Justice Department official said: 'We have to see the right wing as much better coordinated than its apparent disorganisation suggests. And we have to presume that their opposition to government is just as virulent as that of the Islamic terrorists, if not as accomplished. 'But that is, in its way, one of the most compelling possible leads in the anthrax trail - that it is not really al-Qaeda's style, but rather that of others who sympathise with its war against the American government and media.' The official said the investigation had, in the past week, drafted in special teams from the Civil Rights division of the department to reinforce the international terrorism teams. The American neo-Nazi Right is motivated above all by its loathing of the federal government, which it believes is selling out the homeland to a 'New World Order' run by masons and Jews. Its insane politics have propelled numerous attacks and armed stand-offs over the past eight years, culminating in the carnage at Oklahoma. Now the anthrax investigation is zooming in on possible connections between these neo-Nazis and Arab extremists, united by their mutual anti-Semitism and hatred of Israel. Such alliances have been common among neo-Nazis in Europe, but have played a lesser role in the US. However, monitoring of the hate groups shows they are now embracing al-Qaeda's terrorism as commendable attacks on the federal government. Rabbi Abraham Cooper of the Simon Wiesenthal centre in Los Angeles said that at a meeting in Lebanon this year, US neo-Nazis were represented alongside Islamic militants. 'There's a great solidarity with the point of view of the bin Ladens of the world,' said Mark Potok of the Southern Poverty Law Centre, which monitors the far right. 'These people wouldn't let their daughters near an Arab, but they are certainly making common cause on an ideological level. They see the same enemy: American culture and multiculturalism.' Neo-Nazi websites, including the largest umbrella organisation, the National Alliance, show support for al-Qaeda. Billy Roper, the alliance's membership coordinator posted a message within hours of the 11 September attacks, reading: 'Anyone who is willing to drive a plane into a building to kill Jews is all right by me. I wish our members had half as much testicular fortitude.' Another group, Aryan Action, praised the attacks of 11 September, saying: 'Either you're fighting with the Jews against al-Qaeda or you support al-Qaeda fighting against the Jews.' Others outwardly support the anthrax mailing. One message, entitled 'No Sympathy for the Devil', was posted in several chat rooms by right-winger Grant Bruer, whose racist writings are circulated among supremacist groups. It reads: 'Is there not a single person who has received these anthrax letters that isn't an avowed enemy of the white race? Tom Brokaw, Tom Daschle and the gossip rag offices have all been 100 per cent legitimate targets. Who among us has the slightest bit of sympathy for these pukes?' Right-wing groups have had an interest in anthrax and other biological agents. A member of the Aryan Nation group once bragged he had a stash of anthrax from digging up a field where cows had died of the disease in the 1950s. Larry Wayne Harris was arrested after trying to obtain three vials of bubonic plague from a mail-order science company. The trail leading investigators to groups from the domestic ultra-right - rather than the al-Qaeda terror network - comes as a dramatic twist in the confused crisis. Last week, parallel evidence appeared to be linking the now rampant anthrax attacks to another trail: leading from Iraq and through the Czech Republic, with al-Qaeda militants as the likely couriers. The shift in the investigation echoes that which followed America's other infamous terrorist attack: the destruction of the federal government building in Oklahoma City in 1995. The bombing was initially thought to be the work of Arab extremists, but turned out to be the work of the Aryan supremacists. -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4020 From: Miguel Puchol Date: Tue Oct 30, 2001 5:01pm Subject: RE: Cell phone range Hi Andy, In GSM networks, there is a parameter called Timing Advance (TA), which is calculated and used by the mobile terminal to determine how much in advance it has to send it's data to the cell, so that it reaches it within the allocated timeslot (hence the name). This parameter can have a maximum value set for the individual cells, so that a terminal that exceeds a certain TA value cannot register with a particular cell, even if it is within RF range. The cell power is also adjusted, so that you can configure very accurately the 'size' of the cells. In large cities we have begun to see lots of picocells, that use very little RF power, and have tiny antennas, dotted around all over the place, rather than large masts on top of buildings. These cells have a maximum 'range' of about 500 meters. So, the answer to your question is that yes, if the allowable TA is the approx. 1 second it takes to get to the moon, the phone should be able to communicate with a cell placed there. It all depends on the owner of the cellular system setting the TA to the maximum allowed value, for rural or remote cells. Here in Spain this maximum value allows a terminal to register with a cell up to some 30km away (past this it's a problem of power rather than timing). Network infrastructure manufacturers also have maximum values 'built-in' to the control systems. These distance constraints are also implemented to avoid inter-cell or inter-terminal interference, as cell frequencies are reused frequently. This would imply that if you stood on top of a mountain, your terminal could be transmitting on the frequency used by a few cells in it's range, not just one, causing obvious problems. If you need more detailed info I can look into a very good GSM book I have, and/or point you to the relevant ETSI documents - although I don't recommend them unless you have a good supply of aspirin (for the headache they give you). Hope this helps, all the best, Mike > -----Mensaje original----- > De: A Grudko [mailto:agrudko@i...] > Enviado el: martes, 30 de octubre de 2001 7:47 > Para: TSCM-L@yahoogroups.com > Asunto: [TSCM-L] Cell phone range > > > Talking about cell phones > > Is a GSM 'phone's range limited by the time it takes for data to be > exchanged? I don't know much about cellular technology, but as a silly > example, if I was 250 000 000 metres away on the moon, assuming there was > enough RF to get a signal, would the one second delay each way > stop the GSM > data stream? > > If so, does anyone know what the range constraint is that this > implies? Just > a thought I had in trying to assist a client in getting better cellular > coverage in more remote parts of Africa. > > > Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 National and international crime investigation, intelligence and protection Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L "War is an ugly thing, but not the ugliest of things: the decayed and degraded state of moral and patriotic feelings which thinks that nothing is worth war is much worse. A man who has nothing for which he is willing to fight; nothing he cares about more than his own personal safety; is a miserable creature who has no chance of being free, unless made and kept so by the exertions and blood of better men than himself." - John Stuart Mill =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4021 From: A Grudko Date: Wed Oct 31, 2001 3:02am Subject: Re: Re: Cell phone range - Original Message - From: Steve Uhrig > > Is a GSM 'phone's range limited by the time it takes for data to > > be exchanged? > Range is real simple. You have to radiate a loud enough signal > from the source to overcome path loss... I'm familiar with propogation. It's the digital side of GSM that I don't understand. I'm old enough to remember transatlantic 'phone calls where the delay was such that you consiously spoke in single paragraphs with an obvious 'stop' at the end to avoid talking over each other. Today I get on the 'phone to a buddy 12 time zones away and the call is full duplex with no noticable delay. Maybe the speed of light increased in the past 20 years... We have a local radio station that broadcasts on 702 kcs AM and on 12 gig satellite. Guess what - the 1930's style AM signal gets to my house about half a second before 2001's technology does... I still think there's a finite range to GSM because of the need to exchange data but perhaps at 300 000 km/sec you run out of RF long before your bits start tripping over your bytes - I'm only trying to give them about 200 km range, there's a high site and I have a 15 db corner reflector and a bit of Belden 9114 coax to play with. Anyway, this starts to look like hams chewing the fat. I don't think I should clog up this list with that topic. I'm off this afternoon with my cable tracer to find out where a suspicious 'double jumper' leads. I found it on a PABX frame last week. Heck, it's probably just an answering machine or a cordless 'phone but at whatever an hour it puts food on the table. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigation Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time From: Date: Sat Oct 28, 2000 8:29am Subject: Re: Censorship Roger. Thank you for your post re SpyKing. I have an acquaintance whom SpyKing tried to manipulate and threaten into business with him. The coercion wasn't received well and soon my friend's entire family was intimidated and harassed. Eventually the problem was dealt with. Nevertheless, I completely agree with you regarding Jones' First Amendment Rights. We need to wait for the due process to take effect ... not turn to the media's "somebody should do something" pressurized concept if we want to maintain our free society. You're right ... don't log on if you don't like his material. If things are completely out of hand, remember the other rule: If you don't vote, you can't bitch! AL > I'm a bit disturbed by this vigilantly stuff, this man has a first amendment > right to be heard and publish his materials uncensored. A conviction in this > country does not remove these rights, If you don't like his material don't > log on, tell your friends don't log on. But contacting his ISP with legal > documents and trying to get his voice silenced is a little too big brother > for me. > > Roger Tolces, Electronic Security Co. Los > Angeles >> From: Wiseguypi@a... >> Subject: Re: The Spy King >> >> Greetings, >> >> Thank you for your responses. It's hard to top the copies of the >> original documents. I have been advised that the HTCC List Serve is >> pulling their links to the Spy King web site. I am supplying the >> information to the people who gave me his address. >> >> By the way Mr. Atkins, was the notation about making the wizards mad >> pointed at anyone? :) :) >> >> Thanks again >> >> Steven Wisenburg 1833 From: Steve Uhrig Date: Sat Oct 28, 2000 0:24pm Subject: Re: Racial Threats Flash on TV Screens > Retired autoworkers Charlotte and Judge Smith say someone has > typed more than 10 threatening messages this month on the > 36-inch TVs When you hear hoofbeats, think horses not zebras. If the above is true and reported accurately, which is unlikely, the ultimate cause most likely will not be all the technological smoke and mirrors. It will be some clown who has found a simple way to play games. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1834 From: Date: Sat Oct 28, 2000 10:13am Subject: Re: Info on Bug Detector Andy: I agree with you about his apparent sincerity. Wonder what his next move will be...sell more "sweeps" or do some homework? Ted Swift ACM Research Service At 08:09 PM 10/28/2000 +0200, you wrote: >----- Original Message ----- >> I asked him what he does to check for bugs operating below 200 MHz. His >answer: "you >> won't find many bugs below 200 MHz > >Hi Ted > >Frightening! But by his tone I would judge this guy as being sincere - after >all, he does give his correct contact details. > >His lack of technical knowledge simply reflects the danger of 'black box' >technology, where you buy the box, read the manual and are now an expert. It >applies to many fields, not just TSCM...a sort of electronic snake oil. > >Now if this kind of misinformed service can be offered in the sophisticated >US, can you think what kind of rubbish is sold as an 'expert service' here >in the third world. > >I have clients who balk at my US$ 250 minimum callout fee plus $36 an hour >for a sweep, because they can get a cheaper service (quoted in >writing......oooh!). > >Somehow 19 years in the business, $ 150 000 worth of equipment, formal >qualifications, published books and articles and patents held are not >important if they can find someone else at $20 per hour with a field >strength meter who has read a book from Paladin Press. > >I can understand Mrs Smith making that kind of call, but multinational >companies? Sorry, I know I'm preaching to the converted but it is so >frustrating! > >It's great to talk to others in this field through this group, if only to >constantly learn. > >Regards from sunny South Africa > >Andy Grudko. D.P.M., Grad I.S, (S.A.) >CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & >intelligence >Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - >Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 >11) 465 9673 - 465 1487 (Fax) - Est. 1981 >GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA >Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom >"When you need it done right - first time" > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > 1835 From: Miguel Puchol Date: Sat Oct 28, 2000 3:15pm Subject: RE: TSCM Certifications 1RCM, I was in a SAR team in the UK for some time, and experienced very similar circumstances as those you describe. However, I believe that in a field so specialised and not dependant on volunteers, a certification body headed by the most recognised members of the community could be created. As you point out, the raindancers would make a certification body of their own (probably). In the end, it comes down to professionalism and reputation. You have to demonstrate to your clients why your services are totally different from magic black boxes being waved around a room. In Europe, the ISO certification scheme has become a reference, but only after a lot of pushing and pulling from many other certification agencies. Cheers, Mike > -----Mensaje original----- > De: 1RCM [mailto:1RCM@M...] > Enviado el: sabado, 28 de octubre de 2000 17:01 > Para: TSCM List - Post > Asunto: [TSCM-L] TSCM Certifications > > > I would like to offer my two-cents regarding TSCM certifications for the > consideration of the list members: 1836 From: Charles@t... Date: Sat Oct 28, 2000 4:49pm Subject: Re: Racial Threats Flash on TV Screens > > The situation worsened dramatically when someone typed racial slurs and > messages on the screens threatening to kill the couple, their 13-year-old > grandson who lives with them, the neighbors across the street and even the > Smiths' German shepherd, Pepper. The threats included the name of each > potential victim. If true, you can bet the local PD would be paying close attention to the 13 yr old grandson and his associates. Reminds me of a kidnapping case I was superficially involved in about 10 years ago. The VP of a corporation had been kidnapped for ransom, he escaped, kidnappers were caught and locked up. Fast forward two weeks, the 13 year old son of the CFO of the same corp. staged a fake kidnapping with a few of his friends (it was about one week before Halloween). The kid had no knowledge of the real kidnapping that had recently taken place. In spite of the all the corporate concern since the real kidnapping, the FBI involvment, the heightened security and ep-team activity, the local police detective immediately recognized it for what it was, a kid's halloween prank. Charles 1837 From: Talisker Date: Sat Oct 28, 2000 5:15pm Subject: Re: TSCM Certifications Miguel SAR - I take it that's not Search And Rescue ? I feel the world has gone certification crazy, in principal this is a good thing, the right man/woman for the job. Unfortunately people want them quickly this leads to boot camps such as MCSE, CCIA etc where you do 1 weeks intensive training then take the exam, sadly the training isn't aimed at learning the technology but instead passing the exam, certification devalued. Moreover, it's commonplace for people when taking a carrer change to start off with a bootcamp, the unsuspecting employer takes him/her on because of the certification, and discovers the persons useless as they hadn't touched a computer 4 weeks earlier, certification devalued further. My primary role is IT security specifically IDS, certifications are endless they have them for everything. However, I have been to quite a few employers for work of late and without exception not a single one enquired about certifications. If certifications are brought in they have to be achieved over time, evidence of sufficient experience produced, and damn hard to get otherwise they will be worthless in a very short time Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo talisker@n... The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "Miguel Puchol" To: Sent: Saturday, October 28, 2000 9:15 PM Subject: RE: [TSCM-L] TSCM Certifications > 1RCM, > > I was in a SAR team in the UK for some time, and experienced very similar > circumstances as those you describe. > > However, I believe that in a field so specialised and not dependant on > volunteers, a certification body headed by the most recognised members of > the community could be created. > As you point out, the raindancers would make a certification body of their > own (probably). In the end, it comes down to professionalism and reputation. > You have to demonstrate to your clients why your services are totally > different from magic black boxes being waved around a room. > In Europe, the ISO certification scheme has become a reference, but only > after a lot of pushing and pulling from many other certification agencies. > > Cheers, > > Mike > > > -----Mensaje original----- > > De: 1RCM [mailto:1RCM@M...] > > Enviado el: sabado, 28 de octubre de 2000 17:01 > > Para: TSCM List - Post > > Asunto: [TSCM-L] TSCM Certifications > > > > > > I would like to offer my two-cents regarding TSCM certifications for the > > consideration of the list members: > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1838 From: Miguel Puchol Date: Sun Oct 29, 2000 8:31am Subject: RE: TSCM Certifications Andy, It is Search and Rescue - amazing the stages of life that we go through :-) It was in the PDMRO, Peak District. I agree that a lot of certification schemes are aimed at passing the exam, the best example where I live being the driving certificate - they don't teach people how to drive, just the tricks to pass the exam. Anyway, a company where a friend of mine works has just achieved ISO 9002 certification, this is basically a quality system certification. For this they have gone through one year of radical changes in company internal attitude, they have had to write numerous policy papers, quality manuals, forms, internal audits, etc. After all this an independant auditor went to the company for three days and followed every aspect of the quality system. This shows that certification systems are what the creators AND the applicants want it to be. I could just create my own certification body and give myself awards for many achievements, but I doubt this would have a lot of credibility... All the best, Mike > -----Mensaje original----- > De: Talisker [mailto:Talisker@n...] > Enviado el: domingo, 29 de octubre de 2000 0:15 > Para: TSCM-L@egroups.com > Asunto: Re: [TSCM-L] TSCM Certifications > > > Miguel > > SAR - I take it that's not Search And Rescue ? > > I feel the world has gone certification crazy, in principal this is a good > thing, the right man/woman for the job. Unfortunately people want them > quickly this leads to boot camps such as MCSE, CCIA etc where you > do 1 weeks > intensive training then take the exam, sadly the training isn't aimed at > learning the technology but instead passing the exam, certification > devalued. Moreover, it's commonplace for people when taking a > carrer change > to start off with a bootcamp, the unsuspecting employer takes him/her on > because of the certification, and discovers the persons useless as they > hadn't touched a computer 4 weeks earlier, certification devalued further. > > My primary role is IT security specifically IDS, certifications > are endless > they have them for everything. However, I have been to quite a few > employers for work of late and without exception not a single one enquired > about certifications. > > If certifications are brought in they have to be achieved over time, > evidence of sufficient experience produced, and damn hard to get otherwise > they will be worthless in a very short time > > Andy > http://www.networkintrusion.co.uk > Talisker's Network Security Tools List > ''' > (0 0) > ----oOO----(_)---------- > | The geek shall | > | Inherit the earth | > -----------------oOO---- > |__|__| > || || > ooO Ooo > talisker@n... > > The opinions contained within this transmission are entirely my > own, and do > not necessarily reflect those of my employer. > > > > > > ----- Original Message ----- > From: "Miguel Puchol" > To: > Sent: Saturday, October 28, 2000 9:15 PM > Subject: RE: [TSCM-L] TSCM Certifications > > > > 1RCM, > > > > I was in a SAR team in the UK for some time, and experienced > very similar > > circumstances as those you describe. > > > > However, I believe that in a field so specialised and not dependant on > > volunteers, a certification body headed by the most recognised > members of > > the community could be created. > > As you point out, the raindancers would make a certification > body of their > > own (probably). In the end, it comes down to professionalism and > reputation. > > You have to demonstrate to your clients why your services are totally > > different from magic black boxes being waved around a room. > > In Europe, the ISO certification scheme has become a reference, but only > > after a lot of pushing and pulling from many other > certification agencies. > > > > Cheers, > > > > Mike > > > > > -----Mensaje original----- > > > De: 1RCM [mailto:1RCM@M...] > > > Enviado el: sabado, 28 de octubre de 2000 17:01 > > > Para: TSCM List - Post > > > Asunto: [TSCM-L] TSCM Certifications > > > > > > > > > I would like to offer my two-cents regarding TSCM > certifications for the > > > consideration of the list members: > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > 1839 From: Talisker Date: Sun Oct 29, 2000 9:42am Subject: Re: TSCM Certifications I don't see 9001 accreditation as comparable to an individuals certfication to fulfill a function 9001 is achievable by an organisation, and on paper it's a worthwhile cause though once again it is being devalued Let me qualify this statement, I'm a 9001 quality audit coordinator, (yet another of my too many hats) Many organisations now insist on other companies holding 9001 prior to them doing business, therefore these other organisations will get 9001 to do business, the work to gain this is expensive, as you said, but once gained, quality can slide until the next external audit. Having said that after my training I believed in 9001 and quality as THE way forward, it's basically upper management that make or break it. These companies that let it slide devalue the accreditation In the UK at the moment the buzzword is Investors In People (IIP) we'll see if this goes the same way as 9001 Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo talisker@n... The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "Miguel Puchol" To: Sent: Sunday, October 29, 2000 2:31 PM Subject: RE: [TSCM-L] TSCM Certifications > Andy, > > It is Search and Rescue - amazing the stages of life that we go through :-) > It was in the PDMRO, Peak District. > > I agree that a lot of certification schemes are aimed at passing the exam, > the best example where I live being the driving certificate - they don't > teach people how to drive, just the tricks to pass the exam. > > Anyway, a company where a friend of mine works has just achieved ISO 9002 > certification, this is basically a quality system certification. For this > they have gone through one year of radical changes in company internal > attitude, they have had to write numerous policy papers, quality manuals, > forms, internal audits, etc. After all this an independant auditor went to > the company for three days and followed every aspect of the quality system. > > This shows that certification systems are what the creators AND the > applicants want it to be. I could just create my own certification body and > give myself awards for many achievements, but I doubt this would have a lot > of credibility... > > All the best, > > Mike > > > -----Mensaje original----- > > De: Talisker [mailto:Talisker@n...] > > Enviado el: domingo, 29 de octubre de 2000 0:15 > > Para: TSCM-L@egroups.com > > Asunto: Re: [TSCM-L] TSCM Certifications > > > > > > Miguel > > > > SAR - I take it that's not Search And Rescue ? > > > > I feel the world has gone certification crazy, in principal this is a good > > thing, the right man/woman for the job. Unfortunately people want them > > quickly this leads to boot camps such as MCSE, CCIA etc where you > > do 1 weeks > > intensive training then take the exam, sadly the training isn't aimed at > > learning the technology but instead passing the exam, certification > > devalued. Moreover, it's commonplace for people when taking a > > carrer change > > to start off with a bootcamp, the unsuspecting employer takes him/her on > > because of the certification, and discovers the persons useless as they > > hadn't touched a computer 4 weeks earlier, certification devalued further. > > > > My primary role is IT security specifically IDS, certifications > > are endless > > they have them for everything. However, I have been to quite a few > > employers for work of late and without exception not a single one enquired > > about certifications. > > > > If certifications are brought in they have to be achieved over time, > > evidence of sufficient experience produced, and damn hard to get otherwise > > they will be worthless in a very short time > > > > Andy > > http://www.networkintrusion.co.uk > > Talisker's Network Security Tools List > > ''' > > (0 0) > > ----oOO----(_)---------- > > | The geek shall | > > | Inherit the earth | > > -----------------oOO---- > > |__|__| > > || || > > ooO Ooo > > talisker@n... > > > > The opinions contained within this transmission are entirely my > > own, and do > > not necessarily reflect those of my employer. > > > > > > > > > > > > ----- Original Message ----- > > From: "Miguel Puchol" > > To: > > Sent: Saturday, October 28, 2000 9:15 PM > > Subject: RE: [TSCM-L] TSCM Certifications > > > > > > > 1RCM, > > > > > > I was in a SAR team in the UK for some time, and experienced > > very similar > > > circumstances as those you describe. > > > > > > However, I believe that in a field so specialised and not dependant on > > > volunteers, a certification body headed by the most recognised > > members of > > > the community could be created. > > > As you point out, the raindancers would make a certification > > body of their > > > own (probably). In the end, it comes down to professionalism and > > reputation. > > > You have to demonstrate to your clients why your services are totally > > > different from magic black boxes being waved around a room. > > > In Europe, the ISO certification scheme has become a reference, but only > > > after a lot of pushing and pulling from many other > > certification agencies. > > > > > > Cheers, > > > > > > Mike > > > > > > > -----Mensaje original----- > > > > De: 1RCM [mailto:1RCM@M...] > > > > Enviado el: sabado, 28 de octubre de 2000 17:01 > > > > Para: TSCM List - Post > > > > Asunto: [TSCM-L] TSCM Certifications > > > > > > > > > > > > I would like to offer my two-cents regarding TSCM > > certifications for the > > > > consideration of the list members: > > > > > > > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1840 From: Date: Sun Oct 29, 2000 7:56am Subject: Certifications - opinions are like noses The government licenses professions to protect consumers. TSCM professionals who favor certification and or licensing want to protect themselves from competition. The industry is to small and disorganized to ever get anything done and nobody really cares. Those with concerns should get a life, improve their skills and knowledge of sweeping, business, networking and marketing. Let the free market decides who gets the business and let those that get it set good examples for all. Make it performance, not showmanship. I'm done pontificating. 1841 From: Steve Uhrig Date: Sun Oct 29, 2000 1:08pm Subject: Re: Certifications - opinions are like noses Once upon a midnight dreary, MACCFound@a... pondered, weak and weary: > The government licenses professions to protect consumers. The government licenses professions as another way to extract even more $$$ from the subjects. And as another way to exert more and more control over the populace. Consumer protection is the guise they use to usurp more and more power and fees. I sure rest easier knowing my barber is properly licensed. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1842 From: Andre Holmes <1ach@g...> Date: Sun Oct 29, 2000 1:48pm Subject: Fw: Certification ----- Original Message ----- From: Andre Holmes To: TSCM-L@egroups.com Sent: Sunday, October 29, 2000 2:42 PM Subject: Certification Certification would prove what ? 1 That a Individual can turn on a Spectrum analyzer. 2 That the person or group are X government employees so there for they can be trusted. example Wen Ho Lee, past mil.spies that were caught trading classified material for money. 3 That the individual in question can find a Inductive device http://www.eyetek.com/tel.htm Order Code COTR In closing a con cannot fool another con so to speak. Like you and the next guy or gal I want to make a difference in helping people live there lives as intended without their privacy being violated electronically.I can reach my personal goal by offering help with a smile and hand shake.I have found that bugs operate less than 1 gig that is sold over the open market and have heard of nobody on this list who have found a bug that transmitted over 1 gig and that they reported it to the list. My personal pledge is to help all people that I can whether if its finding a bug or giving Blood to a Blood Bank. Justice for all ANDRE [Non-text portions of this message have been removed] 1843 From: James M. Atkinson, Comm-Eng Date: Sun Oct 29, 2000 1:49pm Subject: Re: Certifications - opinions are like noses At 1:56 PM -0500 10/29/00, MACCFound@a... wrote: >The government licenses professions to protect consumers. >TSCM professionals who favor certification and or licensing want to protect >themselves from competition. The industry is to small and disorganized to >ever get anything done and nobody really cares. Those with concerns should >get a life, improve their skills and knowledge of sweeping, business, >networking >and marketing. Let the free market decides who gets the business and let >those that get it set good examples for all. > >Make it performance, not showmanship. I'm done pontificating. I would disagree, and would point out that quite a few of us (including myself) want to raise the bar for the entire business, hone our skill to a razor sharpness, network our asses off, and become so proficient in the art so as to present a serious threat to professional eavesdroppers. While the free markets do decide to some level, the consumers of TSCM services need to be educated about what "real TSCM" is and how it differs from "rain dancing". Just my humble opinion, -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1844 From: Date: Sun Oct 29, 2000 10:02am Subject: Re: Certifications - opinions are like noses At 01:56 PM 10/29/2000 EST, you wrote: I'm done pontificating. Perhaps. But you will never be able to pontificate like THE Pontiff :-) Ted Swift ACM Research Service 1845 From: Date: Sun Oct 29, 2000 9:25am Subject: Re: Re: Certifications - opinions are like noses In a message dated 10/29/00 12:16:59 p US Mountain Standard Time, steve@s... writes: > The government licenses professions as another way to extract > even more $$$ from the subjects. And as another way to exert > more and more control over the populace. Consumer protection is > the guise they use to usurp more and more power and fees Strongly agree, Steve. "Protection" is now, and always has been, BIGGIE business. I've observed other professions who have undergone the "become an official professional" phase which have resulted in licensure, some training, and categorization, sure, but those agencies have also grown and steadily increased the license fees to cover consumer complaints regarding the unlicensed (after all, the 'agency' is now responsible). In this instance, the objective of the licensure simply gave political purpose to the governing agency, who certainly doesn't want to be phased out a job now. It's very unfair for the licensed to indirectly cover damages caused by the unlicensed. Why should I as a licensed person pay to cover damages by others? AL 1846 From: Date: Sun Oct 29, 2000 10:03am Subject: Re: Certifications - opinions are like noses In a message dated 10/29/00 11:51:43 AM Pacific Standard Time, jmatk@tscm.com writes: << I would disagree, and would point out that quite a few of us (including myself) want to raise the bar for the entire business, >> Such altruism, I'm impressed. Licensing and certification efforts are a waste of time and energy. We won't see it in our lifetime. Opinions are like noses. 1847 From: Dawn Star Date: Sun Oct 29, 2000 8:46pm Subject: Bug's Bug "However, the next generation of covert audio bugs are remotely operated, for example the multi-room monitoring system of Lorraine Electronics called DIAL (Direct Intelligent Access Listening) allows an operator to monitor several rooms from anywhere in the world without effecting an illegal entry. Up to four concealed microphones are connected to the subscribers line and these can be remotely activated by simply making a coded telephone call to the target building. Neural network bugs go one step further. Built like a small cockroach, as soon as the lights go out they can crawl to the best location for surveillance.22 In fact Japanese researchers have taken this idea one step further, controlling and manipulating real cockroaches by implanting microprocessors and electrodes in their bodies. The insects can be fitted with micro cameras and sensors to reach the places other bugs can't reach." Anyone know if this is for real? Roger Tolces, Electronic Security, Los Angeles [Non-text portions of this message have been removed] 1848 From: James M. Atkinson, Comm-Eng Date: Sun Oct 29, 2000 8:51pm Subject: Re: Bug's Bug At 6:46 PM -0800 10/29/00, Dawn Star wrote: >"However, the next generation of covert audio bugs are remotely >operated, for example the multi-room monitoring system of Lorraine >Electronics called DIAL (Direct Intelligent Access Listening) allows >an operator to monitor several rooms from anywhere in the world >without effecting an illegal entry. Up to four concealed microphones >are connected to the subscribers line and these can be remotely >activated by simply making a coded telephone call to the target >building. Neural network bugs go one step further. Built like a >small cockroach, as soon as the lights go out they can crawl to the >best location for surveillance.22 In fact Japanese researchers have >taken this idea one step further, controlling and manipulating real >cockroaches by implanting microprocessors and electrodes in their >bodies. The insects can be fitted with micro cameras and sensors to >reach the places other bugs can't reach." > >Anyone know if this is for real? >Roger Tolces, Electronic Security, Los Angeles Could be, there are already quite a few cockroaches and sewer rats performing TSCM services ;-) Next we'll hear about the dogs the Canadian Security Establishment is using that detect bugs by sniffing for the battery gases and similar fumes created by electronic components. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1849 From: Date: Sun Oct 29, 2000 2:30pm Subject: Re: Censorship Greetings, I didn't want to start a problem with my request for information so please understand that as a Law Enforcement Officer we are sometimes held to the fire about whom or what we associate with. I deal with law enforcement surveillance equipment; thus I am already looked at when ever something leaks from the department. (Did you bug the Office) (Who has control of the equipment and can it all be accounted for) We have rules that prevent us from being associated with people of "Questionable Character". Now I agree that the information that the Spy King provided on his list serve was, to a new guy like my self, informative. It also was a liability. Just being on the list, run by a convicted felon could cost me my job and reputation, and I didn't even know who he was. Anyone who questions weather a police department could do such a thing should look into the scandal around Atlanta's "Gold Club". In brief an officer, who grew up with the owners of the club, was placed on suspension and still might lose his job because the club loaned him a limo for a party. The club is a strip club, "Questionable Character ", and the FBI is looking into the club for money laundering, and "mob" ties. This officer did nothing more than borrow a vehicle. Would this be any different than some one loaning another person the use of a receiver or spectrum analyzer for a sweep? I am sorry you were concerned about my intentions. The only persons alerted so far have been the law enforcement officer that gave me the original link and the High Tech Crime Cops listserve that listed the Spy King as a source of information. They were very happy to be informed, and only the administrator has been notified and the links removed from their list. It has not been posted to the 900 + members. Thank you for allowing me to express my self. I will go back to being quite for a while. I will take my 50 lashings on the First amendment. It is only an issue to me because my Fourth amendment rights are diminished as a law enforcement officer. Steven Wisenburg Atlanta Police Youth Unit. --- In TSCM-L@egroups.com, ALBrubaker@a... wrote: > Roger. Thank you for your post re SpyKing. I have an acquaintance whom > SpyKing tried to manipulate and threaten into business with him. The > coercion wasn't received well and soon my friend's entire family was > intimidated and harassed. Eventually the problem was dealt with. > Nevertheless, I completely agree with you regarding Jones' First Amendment > Rights. We need to wait for the due process to take effect ... not turn to > the media's "somebody should do something" pressurized concept if we want to > maintain our free society. You're right ... don't log on if you don't like > his material. If things are completely out of hand, remember the other > rule: If you don't vote, you can't bitch! AL > > > I'm a bit disturbed by this vigilantly stuff, this man has a first > amendment > > right to be heard and publish his materials uncensored. A conviction in > this > > country does not remove these rights, If you don't like his material don't > > log on, tell your friends don't log on. But contacting his ISP with legal > > documents and trying to get his voice silenced is a little too big brother > > for me. > > > > Roger Tolces, Electronic Security Co. Los > > Angeles > > > >> From: Wiseguypi@a... > >> Subject: Re: The Spy King > >> > >> Greetings, > >> > >> Thank you for your responses. It's hard to top the copies of the > >> original documents. I have been advised that the HTCC List Serve is > >> pulling their links to the Spy King web site. I am supplying the > >> information to the people who gave me his address. > >> > >> By the way Mr. Atkins, was the notation about making the wizards mad > >> pointed at anyone? :) :) > >> > >> Thanks again > >> > >> Steven Wisenburg 1850 From: jinques Date: Sun Oct 29, 2000 10:37pm Subject: Re: Racial Threats Flash on TV Screens So, raise the bar for the entire business, hone your skills to a razor sharpness, network your asses off, and become so proficient as to present a serious threat to professional eavesdroppers. And educate the public with funds from a network of professionals by way of dues and contributions and other good marketing skills. But, the government needs not to be present for you to win. Another opinion J. 1851 From: James M. Atkinson, Comm-Eng Date: Sun Oct 29, 2000 9:44pm Subject: A Network of Professionals At 8:37 PM -0800 10/29/00, jinques wrote: >So, raise the bar for the entire business, hone your skills to a razor >sharpness, network your asses off, and become so proficient as to >present a serious threat to professional eavesdroppers. And educate the >public with funds from a network of professionals by way of dues and >contributions and other good marketing skills. But, the government needs >not to be present for you to win. > >Another opinion > J. As I see it the problem is that (outside of 13 specific government agencies) there are no standards by which the industry operates. If you work CI for one of the government agencies then you already have a "Procedural Guide" in place, but the bloody things are so far out of date as to be virtually worthless (assuming you actually have a copy on hand, which most teams do not). I really don't see that the public would be enlightened by the existence of any "due paying organization" unless such an organization operated a formal school, and published a formal standard which customers could obtain and understand. How about a published set of unclassified formal procedures by which a TSCM team operates, measurements they make, and activities they perform. The guides could then be formally taught in a classroom environment, and the student evaluated though both practical and written examinations. Of course just graduating from a series of formal TSCM courses would only complete perhaps half of the "certification requirements". Additional issues that could be used for the rest of the certification could be based of formal TECHNICAL experience, field experience, apprenticeship time, and a formal board evaluation (sans politics). -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1852 From: Mike Date: Sun Oct 29, 2000 10:03pm Subject: Re: Bug's Bug Item #1 is commonly referred to as an infinity transmitter. These are usually inserted inside a phone and can be turned on from an outside call which uses the phones mic to listen. Your DIAL device would neccesitate another cable pair being used to monitor and control any remote mics. These remote mics would only then be able to monitor phone calls-not room monitoring. Simple devices could be installed at remote junction boxes capable of the same thing at far less cost. Regarding the cockroach. In solitary confinement situations in high security prisons, inmates have used cockroaches & string to convey messages to neighbors for decades. Attaching a small remote mic to a cockroach and having it travel down an air duct/etc. should be easy to induce via light or smoke/smell irritants. Should work with a mouse & string tied with a bow-tie. At a determined distance, the bow-tie comes undone and the device is placed. This could even be a hard-wired pan/tilt ccd/mic using the cable as the string & bow-tie attached to the mouse. (attach to back leg of cockroaches-not the body! :)) Nuff Said- Bootleg ----- Original Message ----- From: Dawn Star To: Sent: Sunday, October 29, 2000 6:46 PM Subject: [TSCM-L] Bug's Bug > "However, the next generation of covert audio bugs are remotely operated, for example the multi-room monitoring system of Lorraine Electronics called DIAL (Direct Intelligent Access Listening) allows an operator to monitor several rooms from anywhere in the world without effecting an illegal entry. Up to four concealed microphones are connected to the subscribers line and these can be remotely activated by simply making a coded telephone call to the target building. Neural network bugs go one step further. Built like a small cockroach, as soon as the lights go out they can crawl to the best location for surveillance.22 In fact Japanese researchers have taken this idea one step further, controlling and manipulating real cockroaches by implanting microprocessors and electrodes in their bodies. The insects can be fitted with micro cameras and sensors to reach the places other bugs can't reach." > > Anyone know if this is for real? > Roger Tolces, Electronic Security, Los Angeles > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > 1853 From: James M. Atkinson, Comm-Eng Date: Sun Oct 29, 2000 10:54pm Subject: Re: Censorship Steven, It's not just law enforcement personnel that get held to the fire regarding who they associate with, who they employ, and so on. Someone with a security clearance could easily get it revoked if they are not careful about the company they keep and who they associate with. In this business is a liability to associate with people who are, have been, or will be engaging in criminal or unsavory activities. Such is true for not dealing with someone of "Questionable Character" in this business as doing so could taint your own reputation. Additionally, it is actually irresponsible and even perhaps unethical to endorse the products or services of someone with a proven record of fraud, or with even the slightest hint of unethical conduct. If a police officer loaned a PI a spectrum analyzer, and the PI went on to use the equipment to install a bug would it be a breach of ethics? Now, if the cop loaned some T3 gear, a cellular intercept system would they be any more of less guilty of being part of the crime? Remember, there is no such thing as being "slightly pregnant", nor is there anything "slightly illegal"... it either completely legal, or it is illegal. If someone has a retail store and catches some neighborhood kid shoplifting it would be appropriate to warn some of the other local shopkeepers about the kid so as to limit the loses suffered. The same is true with the TSCM business... there are people to leach off of our industry, who steal from us, who cheat us, misrepresent their products/services, and who do other destructive things to our business. For example, the industry needs to know about someone who takes 20 grand for a "magic TSCM box", but instead delivers a nonfunctional movie prop. If someone is selling illegal bugging devices, and gets convicted of it them it benefits the industry to know about it. Keep in mind that our business is catching eavesdroppers, stopping spies, and so on... If someone is playing with illegal bugs, distributing illicit surveillance equipment, using gear outside of a court order, or engaging in espionage then they present themselves as our opposition. If a product out there is bad news then let other list members know about it (to keep them from making a similar mistake). If a character out there is leaching off of our industry or cheating people then it is appropriate to warn others away to keep them from getting cheated as well (but be discrete about it). You are free to speak you mind here, and will not be sanctioned for asking questions or issuing warnings relevant issues in our business (your First Amendment rights can be freely exercised here... so long as it is relevant to TSCM). -jma At 8:30 PM +0000 10/29/00, Wiseguypi@a... wrote: >Greetings, > >I didn't want to start a problem with my request for information so >please understand that as a Law Enforcement Officer we are sometimes >held to the fire about whom or what we associate with. I deal with >law enforcement surveillance equipment; thus I am already looked at >when ever something leaks from the department. (Did you bug the >Office) (Who has control of the equipment and can it all be accounted >for) We have rules that prevent us from being associated with people >of "Questionable Character". Now I agree that the information that >the Spy King provided on his list serve was, to a new guy like my >self, informative. It also was a liability. Just being on the list, >run by a convicted felon could cost me my job and reputation, and I >didn't even know who he was. > >Anyone who questions weather a police department could do such a >thing should look into the scandal around Atlanta's "Gold Club". In >brief an officer, who grew up with the owners of the club, was placed >on suspension and still might lose his job because the club loaned >him a limo for a party. The club is a strip club, "Questionable >Character ", and the FBI is looking into the club for money >laundering, and "mob" ties. This officer did nothing more than >borrow a vehicle. Would this be any different than some one loaning >another person the use of a receiver or spectrum analyzer for a >sweep? > >I am sorry you were concerned about my intentions. The only persons >alerted so far have been the law enforcement officer that gave me the >original link and the High Tech Crime Cops listserve that listed the >Spy King as a source of information. They were very happy to be >informed, and only the administrator has been notified and the links >removed from their list. It has not been posted to the 900 + >members. > >Thank you for allowing me to express my self. I will go back to >being quite for a while. I will take my 50 lashings on the First >amendment. It is only an issue to me because my Fourth amendment >rights are diminished as a law enforcement officer. > >Steven Wisenburg >Atlanta Police Youth Unit. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1854 From: Date: Sun Oct 29, 2000 7:02pm Subject: Re: Racial Threats Flash on TV Screens In a message dated 10/29/00 7:14:28 PM Pacific Standard Time, jadoku@b... writes: << And educate the public with funds from a network of professionals by way of dues and contributions and other good marketing skills. >> Not one of my fantasies. My big one is peace in the middle east. 1855 From: Miguel Puchol Date: Mon Oct 30, 2000 2:25am Subject: RE: Bug's Bug Dawn, I did see a small news flash on TV regarding Japanese scientists implanting a device on a cockroach, but it only had the effect of increasing or decreasing it's activity - not remote control. Besides, I think that to load a 'roach with microphone, battery, antenna, etc. would just squash the thing, or at least pin it to the ground - NSPA are you listening? ;-) The so-called remote control bugs, operated from anywhere in the world have been around for quite some time...at least on paper. Seriously, the stories you mention have been grossly overinflated, and are far from reality, just my humble opinion. All the best, Mike > -----Mensaje original----- > De: Dawn Star [mailto:bratkid@e...] > Enviado el: lunes, 30 de octubre de 2000 3:47 > Para: TSCM-L@egroups.com > Asunto: [TSCM-L] Bug's Bug > > > "However, the next generation of covert audio bugs are remotely > operated, for example the multi-room monitoring system of > Lorraine Electronics called DIAL (Direct Intelligent Access > Listening) allows an operator to monitor several rooms from > anywhere in the world without effecting an illegal entry. Up to > four concealed microphones are connected to the subscribers line > and these can be remotely activated by simply making a coded > telephone call to the target building. Neural network bugs go one > step further. Built like a small cockroach, as soon as the lights > go out they can crawl to the best location for surveillance.22 In > fact Japanese researchers have taken this idea one step further, > controlling and manipulating real cockroaches by implanting > microprocessors and electrodes in their bodies. The insects can > be fitted with micro cameras and sensors to reach the places > other bugs can't reach." > > Anyone know if this is for real? > Roger Tolces, Electronic Security, Los Angeles > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > 1856 From: James M. Atkinson, Comm-Eng Date: Mon Oct 30, 2000 9:07am Subject: Pentagon to Add 450 Experts to Protect Defense Secrets [Moderators Note: Hopefully the government brining in 450 people will help the hemorrhage of classified information, but the bulk of them really need to be assigned to DOE and NASA to get things cleaned up. Stopping a spy pro-actively is better then catching him reactively.] -jma ------------ Pentagon to Add 450 Experts to Protect Defense Secrets By Walter Pincus and Vernon Loeb Washington Post Staff Writers Friday , October 27, 2000 ; Page A02 The Pentagon is hiring 450 counterintelligence specialists to protect defense secrets after learning that China has obtained classified U.S. missile technology, including critical information about the heat shield that keeps America's most advanced missiles from burning up as they reenter the atmosphere, senior defense officials said. While applauding the attempt to boost security, members of Congress said it was long overdue, coming more than five years after the Defense Department was told of the suspected Chinese espionage. A trove of Chinese military documents, given to the CIA in 1995 by a former Chinese missile specialist, showed that Beijing had gathered some classified data about U.S. nuclear weapons and a great deal of secret information about America's ballistic missiles, according to officials familiar with the material. The Energy Department reacted quickly to the apparent loss of nuclear secrets, launching a probe that focused on Los Alamos National Laboratory and scientist Wen Ho Lee. But the Defense Department has been slower to respond to what officials now say was the far more substantial evidence that China had obtained significant missile technology. Over the past two years, Congress has pressed the Energy Department to take drastic measures to tighten security at the national laboratories, such as requiring polygraph or "lie detector" exams for thousands of employees. But little congressional pressure has been applied to the Pentagon, which now is moving to tighten its control over missile technology at military installations and private defense contractors. Pentagon spokesman Kenneth Bacon said this week in response to inquiries from The Washington Post that it will take until 2002 to bring on board all 450 counterintelligence specialists, roughly the same number eliminated since the end of the Cold War for budgetary reasons. "All the new specialists will work to protect technical secrets at the Defense Department laboratories and defense contractors," Bacon said, adding that "other procedural techniques and monitoring tools" will be used to improve security. The counterintelligence officers are being hired through the Pentagon's civil service procedures and are expected to come primarily from the military, local police forces and the ranks of former government employees, according to a Pentagon official. Some will work in Washington and others at defense facilities around the country. Sen. Richard C. Shelby (R-Ala.), chairman of the Senate Select Committee on Intelligence, said in an interview that his committee staff has been urging the Pentagon to add counterintelligence positions since 1997. Shelby called the Pentagon's failure to investigate the loss of missile technology "a big concern." China's apparent theft of missile secrets from the Defense Department or its contractors is at least as troubling as the Energy Department's alleged loss of secrets related to nuclear warheads, he said. Rep. Porter J. Goss (R-Fla.), chairman of the House Permanent Select Committee on Intelligence, said the slow response reflects broader security problems at the Pentagon, including a backlog of about 1 million people awaiting routine re-investigations of their security clearances. "It is such a huge problem," Goss said. "They are whittling away at the pile there." Most of the approximately 60 espionage cases in the Defense Department over the past 20 years have involved people who had been cleared to handle classified documents. Top-secret clearances are required to be re-investigated every five years, secret clearances every 10 years and confidential clearances every 15 years. Rep. Christopher Cox (R-Calif.), chairman of a House select committee that investigated Chinese espionage at the national laboratories, said he believes the CIA and the entire U.S. intelligence community share responsibility for the Defense Department's failure to conduct a prompt investigation of the loss of missile technology. "The problem could have been alleviated if any member of the intelligence community had shown special initiative," Cox said. In 1995, according to senior intelligence officials, a Chinese missile specialist approached the CIA with an unsolicited offer to provide secret Chinese military documents. Over a period of months, this "walk-in" agent handed over about 13,000 pages, The Post reported last week. One of the first sections to be translated contained physical data about the W-88, a nuclear warhead on U.S. submarine-launched missiles. This triggered a 1996 probe by the Energy Department and the FBI, which the Justice Department later concluded had focused too narrowly on Lee. The government never charged him with espionage, and he was freed last month after nine months in jail when he pleaded guilty to a single felony count of downloading classified data to computer tapes. While the Energy Department and the FBI may have moved precipitously, at least in singling out Lee, the Defense Department hardly reacted at all. Government officials have suggested two reasons: The intelligence community was slow to translate all 13,000 pages from Mandarin to English, completing that work only last year, and the CIA suspected on the basis of a failed polygraph exam that the walk-in defector was a Chinese double agent. But after the FBI brought the defector to the United States for further questioning, it concluded that he was legitimate, and senior intelligence officials said the information he provided has proved accurate. Cox said this week that the CIA assured his committee in late 1998 that the untranslated portions were "mundane." Senior intelligence officials conceded that there were delays in translating the documents, but they said the Pentagon, the FBI and the Energy Department were informed in 1995 that China apparently had obtained classified information about the Trident II reentry vehicle on U.S. nuclear missile submarines. "The Pentagon knew that in 1995, the FBI knew that in '95, DOE knew it," the official said. The intelligence officials also said that since the fall of 1996, the CIA's Counterintelligence Center sent about five separate "crimes reports" to the FBI as the gradual translation of the documents yielded evidence that missile and warhead secrets had been compromised by the U.S. military or its contractors. One former senior Pentagon official who was briefed on the walk-in documents in 1997 said the Trident II information obtained by China was "extremely accurate." It included a description of the sophisticated mating, or attachment mechanism, of the nuclear warhead inside the Mark-5 reentry vehicle, as well as of the materials that make up the heat shield. Whether China was able to improve its own missiles because of the U.S. data remains unclear. "China's technical advances have been made on the basis of classified and unclassified information derived from espionage, contact with U.S. and other countries' scientists, conferences and publications, unauthorized media disclosures, declassified U.S. weapons information, and Chinese indigenous development," a CIA damage assessment said last year. "The relative contribution of each cannot be determined," it concluded. But whatever its practical value, such information "should not be in Chinese hands" and most likely got there through espionage, a U.S. intelligence official said. © 2000 The Washington Post ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1857 From: Nick Robson Date: Mon Oct 30, 2000 4:09pm Subject: KeyGhost II From GeekPress Thursday, October 26, 2000, 14:41:37 PDT The evil new KeyGhost II keystroke logging device is now available. It has a few new features not present in the original version (including strong encryption of its memory contents), but its function is still the same -- it records keystrokes as the user types and stores them on a nonvolatile FLASH memory chip. As before, it can be installed on computers that are locked up, password protected, or turned off, with the user being none the wiser, and the data can be transferred to another computer for easy downloading. The sneakiest version is the one hidden in the otherwise innocuous-looking keyboard. It's too bad that the manufacturer forbade Dan's Data from taking pictures of the disassembled unit! ************************* The Security Centre Ltd. ********************** *************Grand Cayman, Cayman Islands, British West Indies************** [Non-text portions of this message have been removed] 1858 From: Gregory Horton Date: Mon Oct 30, 2000 2:53pm Subject: Re: TSCM Certifications Really good points were made. The part about the security industry really hit the nail on the head. Here in California, To be a security guard you must not only have a guard card but you must have a firearms card. Now here is the rub. About three years ago, the bureaucrats were being pressured by the major security companies to include off duty police officers in the registration process. This, in spite of the fact that police officers are all P.O.S.T certified, was readily agreed to. The fact that police officers are ten times more qualified than the security guards didn't matter. Now, we have to pay approximately 150 dollars to register. There is no rhyme nor reason to the regulations and I have called Sacramento 4 times to get answers to different questions and have received different answers and conflicting information. I have been told that if you have a P.I. license from the state, you don't need a guard card or firearms card. Then I had one of my guys tell me that they told him that you needed the cards. Sound confusing? It is. Oh I also forgot. Remember the fingerprint cards that you needed to get your license that almost all of us could get for a very small fee? Now they have decreed that everyone must submit their prints via a live scan terminal. This costs between 70 to 100 dollars. You must qualify twice a year, and oh yes, you must go to a certified instructor (40 to 70 dollars per trip) to do so. There are literally dozens of these people who have become "qualified instructors" and I'm sure that some of them are qualified, but the others......... I can't even imagine what the cost and testing process would be for TSCM! The thought of dozens of new bureaucrats with a new empire gives me the creeps. Just a few of my random thoughts. Greg Horton 1859 From: James M. Atkinson, Comm-Eng Date: Mon Oct 30, 2000 3:39pm Subject: Re: TSCM Certifications At 12:53 PM -0800 10/30/00, Gregory Horton wrote: >Really good points were made. The part about the security industry >really hit the nail on the head. Here in California, To be a security >guard you must not only have a guard card but you must have a firearms >card. Now here is the rub. About three years ago, the bureaucrats were >being pressured by the major security companies to include off duty >police officers in the registration process. This, in spite of the fact >that police officers are all P.O.S.T certified, was readily agreed to. >The fact that police officers are ten times more qualified than the >security guards didn't matter. Now, we have to pay approximately 150 >dollars to register. There is no rhyme nor reason to the regulations >and I have called Sacramento 4 times to get answers to different >questions and have received different answers and conflicting >information. I have been told that if you have a P.I. license from the >state, you don't need a guard card or firearms card. Then I had one of >my guys tell me that they told him that you needed the cards. Sound >confusing? It is. Oh I also forgot. Remember the fingerprint cards >that you needed to get your license that almost all of us could get for >a very small fee? Now they have decreed that everyone must submit their >prints via a live scan terminal. This costs between 70 to 100 dollars. >You must qualify twice a year, and oh yes, you must go to a certified >instructor (40 to 70 dollars per trip) to do so. There are literally >dozens of these people who have become "qualified instructors" and I'm >sure that some of them are qualified, but the others......... >I can't even imagine what the cost and testing process would be for >TSCM! The thought of dozens of new bureaucrats with a new empire gives >me the creeps. >Just a few of my random thoughts. >Greg Horton What is really sad is to be in an advanced firearms instructors course and have people there with no concept what a sear, medula, or trigger shoe is, and who can only shoot bulls-eye or IPSC style. I love it when the guy teaching such a class hands the students pistols with no sights, lowers the lights, pops open an OC, and has then engage reactive targets. Invariably the class is a lot smaller the next day when the "state certified instructors" decide to go home early. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1860 From: Miguel Puchol Date: Mon Oct 30, 2000 4:31pm Subject: RE: KeyGhost II Nick, I have taken a look at the device on their webpage (www.keyghost.com) and if a user doesn't notice that a big cylindrical dongle has spontaneously grown in their keyboard cable, then they shouldn't really be using a computer at all. This may be useful in internal audits for access control systems, logging web site visits, etc. although software that does this is also available. Not much of a worry, but something to look for. Thanks for sharing the info, all the best, Mike > -----Mensaje original----- > De: Nick Robson [mailto:sci.ltd@c...] > Enviado el: lunes, 30 de octubre de 2000 23:10 > Para: Reply to TSCM List > Asunto: [TSCM-L] KeyGhost II > > > From GeekPress > > Thursday, October 26, 2000, 14:41:37 PDT > The evil new KeyGhost II keystroke logging device is now > available. It has a > few new features not present in the original version (including strong > encryption of its memory contents), but its function is still the > same -- it > records keystrokes as the user types and stores them on a > nonvolatile FLASH > memory chip. As before, it can be installed on computers that are > locked up, > password protected, or turned off, with the user being none the wiser, and > the data can be transferred to another computer for easy downloading. > The sneakiest version is the one hidden in the otherwise innocuous-looking > keyboard. It's too bad that the manufacturer forbade Dan's Data > from taking > pictures of the disassembled unit! > > ************************* The Security Centre Ltd. ********************** > *************Grand Cayman, Cayman Islands, British West > Indies************** > > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > 1861 From: James M. Atkinson, Comm-Eng Date: Mon Oct 30, 2000 7:50pm Subject: Spy case hurts U.S.-Russia goodwill Monday, 30 October 2000 13:18 (ET) Spy case hurts U.S.-Russia goodwill http://www.vny.com/cf/News/upidetail.cfm?QID=132298 BY ARIEL COHEN WASHINGTON, Oct. 26 (UPI) -- The secret Moscow trial of alleged American agent Edmond Pope is a triple blow to Russia's development as a democracy. It threatens to poison the atmosphere between Russia and the United States at a time when the relationship is already strained. It is a setback to the rule of law in Russia. And it sends all the wrong signals to Westerners and Russians doing business together. In the first espionage trial of an American in Russia since Gary Powers was shot down in a U-2 reconnaissance plane in 1960, Pope is accused of attempting to purchase technology used in the Russian high-speed torpedo Shkval (Squall). This is a revolutionary weapon that glides in a bubble of air and develops staggering velocity of over 100 knots an hour. It was designed to destroy U.S. aircraft carrier battle groups. Ed Pope, a retired naval intelligence officer, is a 54-year old American businessman who was arrested April 3 in Moscow and charged with espionage. He had worked for the University of Pennsylvania before starting his own business, which took him to Russia a number of times. The case against Pope is dubious at best. He does not fit the profile of a real spy. Suffering from a rare type of bone cancer and lacking diplomatic immunity, he was exposing himself to a risk a professional intelligence officer rarely would take. Pope certainly knew enough to be aware that if caught spying, the harsh Russian justice system could send him to a GULAG camp for up to 15 years. Any U.S. intelligence agency could have easily used an officer with diplomatic cover instead of endangering a civilian. And the Shkval has been offered by Russia to foreign clients, and could have been studied or even reverse-engineered easily. Pope's lawyers are hampered by the lack of due process in the trial. He is being charged on the basis of secret presidential decrees on handling state secrets, which are withheld from the accused and his attorneys. The alleged seller of the secret materials, a professor in the prestigious Bauman Technical University (Russia's MIT), should have been prosecuted for selling state secrets. But he is not on trial because of ill health, while Pope is held in the courtroom's metal cage with no access to Western doctors or modern medical tests. Pope does not speak Russian, while the Russian professor he supposedly bought the technology from does not speak English. A Russian interpreter would have had to be an accessory to the crime. But no such person has been even mentioned by prosecution. The Federal Security Service, the FSB, did not allege that Pope owned any espionage equipment, such as the high-speed radio transmitters or miniature cameras spies normally use, nor did they demonstrate a pattern of agent recruitment or secret meetings typical of espionage "tradecraft." The judge rejected his demand for an impartial interpreter, as well as 15 other demands from Pope's attorney. As a result, some commentators in Moscow have alleged that the legal proceedings look increasingly like a Soviet-era kangaroo court. Pope was arrested just a week after President Vladimir Putin was elected. The FSB is Putin's power base and appears to have been anxious to send a message that they are now in charge. In February, the FSB arrested and later staged the disappearance of Andrei Babitsky, a correspondent of the Russian-language, Prague-based Radio Liberty, which is funded by the U.S. Congress. His coverage of Chechnya, sympathetic to Muslim guerrilla rebels, angered the Russian government. He was fined $300 and amnestied. By trying Ed Pope, the FSB appears to be sending a message that it does not care about the state of U.S.-Russian relations; that it -- and not the judges and laws -- control the Russian court system; and that Western businessmen are not immune from harassment. President Putin told CNN's Larry King that, after justice takes its course, he did not see why the case could not be resolved in view of "good relations" between Russia and the United States, hinting at a pardon or a spy exchange. Nikolay Kovalev, the former FSB head and now a Duma deputy, said in a recent TV interview that Russia may be interested in trading Pope for Aldrich Ames, the Russian super-spy who worked for the CIA. But U.S. intelligence sources told UPI that Ames would not be released. But even if Putin pardons the ailing Pope, it is debatable whether he will still be alive to benefit from such clemency. Ariel Cohen, Ph.D., is a Research Fellow at the Heritage Foundation. -- Copyright 2000 by United Press International. All rights reserved. -- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= From: James M. Atkinson, Comm-Eng Date: Mon Oct 30, 2000 7:54pm Subject: THEFT OF STEALTH SECRETS FEARED THEFT OF STEALTH SECRETS FEARED http://www.chicagotribune.com/news/printedition/article/0,2669,SAV-001 0300132,FF.html From Tribune News Services October 30, 2000 SEATTLE, WASHINGTON -- A Russian mathematician who was given access to an American supercomputer loaded with stealth warplane design software is under investigation for espionage. After a 3 1/2-year investigation, federal agents suspect that Aleksey Yeremin, who logged on to the supercomputer from Moscow, took advantage of Lockheed Martin and military security lapses to steal stealth technology secrets. Yeremin, vice president of a software company based in Bothell that did work for Lockheed, was e-mailed part of Lockheed's modeling program for designing stealth planes. Sources say it would have been easy for him to steal the rest of it. The potential loss is staggering: America's global monopoly on radar invisibility. In spring 1997, the FBI and the Air Force launched the investigation. A short time later, Lockheed pulled the plug on its project with Yeremin: an ultra-high-speed, number-crunching computer program that was supposed to greatly accelerate stealth aircraft design work. Federal criminal-justice sources say Yeremin, 46, has connections to the Russian military and now-defunct KGB. It is unknown whether Yeremin got his hands on any classified information. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1863 From: Jordan Ulery Date: Mon Oct 30, 2000 10:18pm Subject: Certification my last $0.02 on this topic In the US today way too much emphasis is placed upon initials behinds one's name, not on the ability one possesses. That creates, immediately, a problem, who issues the initials. In the field of EMS, from whence I hail, despite skill, ability and lives being lost, it was not until there was a "certification" process that stated to the doctors that the individual had passed a standardized, regimented, organized, approved, accepted and whatever else test that EMTs were allowed to put on splints, attach traction splints, do CPR, and eventually start IVs put on MAST units and administer cardiac and life support drugs. In that arena certification was essential, even to save lives, and it was difficult to get a hospital to accept that some "uneducated doctor want-a-be" had any right to suggest that medical intervention in the filed was useful. (Yes it still rankles after all these years). The reliance on initials, even ones purchased with a book, by the public a large is disheartening. The SAR issue is a good example of what now exists in the PI field. Everybody, it seems, has initials. Some you get by going to a 'boot camp,' some you take a test, some are state issued, some are meaningful and some are not. The chaff can be willowed out, and will be with time. The good grain will stay. The point is to establish a criteria, publish it and start moving legislation to accept the criteria as the minimum for licensing. That course of action could, in a short span of time, eliminate the blatant charlatans and give a level playing field to those who really want to do the job well. MHO 1864 From: William Knowles Date: Tue Oct 31, 2000 1:42am Subject: Top Secrets Revealed: Massive Document Leak Shows 'China Threat'; New Book Said Dangerous To Security. http://www.drudgereport.com/china.htm XXXXX DRUDGE REPORT XXXXX MON OCT 30, 2000 22:01:39 ET XXXXX TOP SECRETS REVEALED: MASSIVE DOCUMENT LEAK SHOWS 'CHINA THREAT'; NEW BOOK SAID DANGEROUS TO SECURITY **World Exclusive** The nation's intelligence community is bracing for the release of a new bombshell book that discloses and documents specific Chinese threats against America, the DRUDGE REPORT has learned. WASHINGTON TIMES reporter and BestSelling author Bill Gertz is preparing to unleash top classified reports that detail Communist China's vast efforts to undermine and destroy the United States. Secret FBI, CIA and NSA reports are presented publicly for the first time in CHINA THREAT -- a development that could land Gertz in legal hotwater, according to sources. Gertz's publisher REGNERY legally vetted the book, and several super-secret CIA reports were withheld at the request of the agency, but the leak is so large in scope, sources close to Gertz fear he could ignite the first investigation after new legislation criminalizing leaks of all "properly classified" government information is signed into law. ["President Clinton may be inclined to sign the law after he see the documents published in THREAT.] "This puts Gertz in a new league," says a government source. "He's about to become Target Number One of the Spy World." In CHINA THREAT, Gertz warns fellow Americans: * How the FBI pursued six Chinese intelligence agents and never found a senior Chinese mole inside the U.S. government code-named "Ma" who had access to top secret intelligence. * "The Hug": How spy suspect Wen Ho Lee was embraced by China's top nuclear weapons scientist during a visit to the United States. The nuclear scientist, Hu Side, was overheard by an FBI informant at the time as saying Wen Ho Lee provided great assistance to China's nuclear weapons program. * How a classified Chinese government document, known as Document 65, reveals that China is willing to attack the United States with nuclear weapons if U.S. forces intervene to defend Taiwan in a regional conflict. Gertz unleashes a Chinese spying manual, translated into English, revealing a massive weapons technology collection effort involving the gathering of data and covert espionage. The timing of the book's release -- just days before the election -- has raised eyebrows in official Washington. Gertz reported in recent days: If Texas Gov. George W. Bush is elected president, Republican national security officials are planning a major house-cleaning for the CIA's China analysis division. The Clinton-Gore administration has favored a dangerous "benign view of China," claims Gertz. In his new book, Gertz publishes a secret White House report by NSC staff aide Gary Samore offering missile technology to China if it agrees to join the Missile Technology Control Regime limiting missile exports. [The book CHINA THREAT was ranked #11,705 on AMAZON.COM's sales list late Monday. Gertz's first book BETRAYAL was AMAZON's top-seller for the month of May 1999.] Impacting. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 1865 From: A Grudko Date: Mon Oct 30, 2000 3:03pm Subject: Re: Info on Bug Detector ----- Original Message ----- > I agree with you about his apparent sincerity. Wonder what his next move > will be...sell more "sweeps" or do some homework? Ted I think selling sweeps to the public is a lot easyer than actually learning the subject to any depth. One day there might be an internationally recognised TSCM qualification, but it's not in the interest of any government to establish it. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1866 From: Dawn Star Date: Tue Oct 31, 2000 10:35am Subject: Over 1 GHZ I have found that bugs operate less than 1 gig that is sold over the open market and have heard of nobody on this list who have found a bug that transmitted over 1 gig and that they reported it to the list. My personal pledge is to help all people that I can whether if its finding a bug or giving Blood to a Blood Bank. Justice for all ANDRE I have found six 2.4GHZ bugs in the past few years, especially video, and I'm expecting them to be more and more what we are going to find out there as far as R.F. attacks. Let me tell you frequency hopping and spread spectrum at this frequency range is making me very uneasy! Roger Tolces, Electronic Security Co., Los Angeles [Non-text portions of this message have been removed] 1867 From: Dawn Star Date: Tue Oct 31, 2000 10:41am Subject: Rain Dance While the free markets do decide to some level, the consumers of TSCM services need to be educated about what "real TSCM" is and how it differs from "rain dancing". Just my humble opinion, -jma Just an aside, I am part Native American and I personally know people here in the South West that can dance and make it rain. I have seen it with my own eyes. Roger Tolces [Non-text portions of this message have been removed] 1868 From: Dawn Star Date: Tue Oct 31, 2000 11:07am Subject: Fourth Amendment Rights . It is only an issue to me because my Fourth amendment rights are diminished as a law enforcement officer. Steven Wisenburg Atlanta Police Youth Unit. I hope you did not sign a document to wave your Fourth Amendment rights as a requirement of your employment. Being that you probably took an oath to up hold and protect at least the Constitution of your State, which will have a 4th Amendment equivalent. It is expected that you will also uphold the 4th Amendment Rights of the Citizens you provide law enforcement services to. Roger Tolces [Non-text portions of this message have been removed] 1869 From: James M. Atkinson, Comm-Eng Date: Tue Oct 31, 2000 5:59pm Subject: Re: Over 1 GHZ (Piece of Cake) (groan, here we go again) Yes, there is a tons of legitimate and illicit eavesdropping equipment sold that operates above 1 GHz. Five years ago eavesdropper started flocking to the Wavecom toys operating in the 2.45 GHz area, but prior to that they were all over the place at 1.2-1.5 GHz, and 1.7-1.9 GHz. Right now an eavesdropper can obtain a throw away eavesdropping camera and transmitter for under a hundred bucks, or can obtain professional video gear for not much more. Of course you should be concerned about bugs above 1 GHz, but you should also be concerned about above 3 GHz as well... Hell, you should be sweating eavesdropping devices to well over 22 GHz (both cheap, and available). Spread Spectrum and frequency hopping devices are a piece of cake to deal with, it's all a matter of having the right equipment, and using the right methods. -jma At 8:35 AM -0800 10/31/00, Dawn Star wrote: >I have found that bugs operate less than > 1 gig that is sold over the open >market and have heard of nobody on this list who > have found a bug that transmitted over >1 gig and that they reported it to the list. > My personal pledge is >to help all people that I can whether if its finding > a bug or giving Blood to a Blood Bank. > >Justice for all ANDRE > >I have found six 2.4GHZ bugs in the past few years, especially >video, and I'm expecting them to be >more and more what we are going to find out there as far as R.F. >attacks. Let me tell you frequency hopping and spread spectrum at >this frequency range is making me very uneasy! > > Roger Tolces, >Electronic Security Co., Los Angeles ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1870 From: Miguel Puchol Date: Tue Oct 31, 2000 6:33pm Subject: RE: Over 1 GHZ (Piece of Cake) I agree. Bugs above 3 GHz have been spotted around here a few times...there's a reason in having SA gear that goes up to (and sometimes further than) 20 GHz. Also true, the Wavecom units combined with cheap (or not) video cameras are becoming more and more popular. We found one hidden in an artificial plant's pot, with the antenna hidden in the 'foliage'. Here you can pick up a decent Sony color camera and Wavecom unit for around $175 - maybe this is considered expensive in the U.S., but not so over the pond. Cheers, Mike > -----Mensaje original----- > De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] > Enviado el: miercoles, 01 de noviembre de 2000 1:00 > Para: TSCM-L@egroups.com > Asunto: Re: [TSCM-L] Over 1 GHZ (Piece of Cake) > > > (groan, here we go again) > > Yes, there is a tons of legitimate and illicit eavesdropping > equipment sold that operates above 1 GHz. > > Five years ago eavesdropper started flocking to the Wavecom toys > operating in the 2.45 GHz area, but prior to that they were all over > the place at 1.2-1.5 GHz, and 1.7-1.9 GHz. > > Right now an eavesdropper can obtain a throw away eavesdropping > camera and transmitter for under a hundred bucks, or can obtain > professional video gear for not much more. > > Of course you should be concerned about bugs above 1 GHz, but you > should also be concerned about above 3 GHz as well... Hell, you > should be sweating eavesdropping devices to well over 22 GHz (both > cheap, and available). > > Spread Spectrum and frequency hopping devices are a piece of cake to > deal with, it's all a matter of having the right equipment, and using > the right methods. > > -jma > > > > > At 8:35 AM -0800 10/31/00, Dawn Star wrote: > >I have found that bugs operate less than > > 1 gig that is sold over the open > >market and have heard of nobody on this list who > > have found a bug that transmitted over > >1 gig and that they reported it to the list. > > My personal pledge is > >to help all people that I can whether if its finding > > a bug or giving Blood to a Blood Bank. > > > >Justice for all ANDRE > > > >I have found six 2.4GHZ bugs in the past few years, especially > >video, and I'm expecting them to be > >more and more what we are going to find out there as far as R.F. > >attacks. Let me tell you frequency hopping and spread spectrum at > >this frequency range is making me very uneasy! > > > > Roger Tolces, > >Electronic Security Co., Los Angeles > > > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > Do not try the patience of Wizards, > for they are subtle and quick to anger. > ======================================================================= > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > 1871 From: James M. Atkinson, Comm-Eng Date: Tue Oct 31, 2000 6:48pm Subject: RE: Over 1 GHZ (Piece of Cake) At 1:33 AM +0100 11/1/00, Miguel Puchol wrote: >I agree. Bugs above 3 GHz have been spotted around here a few >times...there's a reason in having SA gear that goes up to (and sometimes >further than) 20 GHz. >Also true, the Wavecom units combined with cheap (or not) video cameras are >becoming more and more popular. We found one hidden in an artificial plant's >pot, with the antenna hidden in the 'foliage'. Here you can pick up a decent >Sony color camera and Wavecom unit for around $175 - maybe this is >considered expensive in the U.S., but not so over the pond. > >Cheers, > >Mike I personally feel that checking for radiated signals up to 3 GHz is a absolute MUST on any TSCM project, but that when possible the TSCM'er should check to 22 or 26/5 GHz. In my professional opinion I feel strongly that the TSCM'er should check to at least to the 10th harmonic of the highest probably and confirmed threat (that you can actually document the existence of as a threat to the level your addressing). Of course if your running on a time budget, or you are unable to transport a microwave SA, mixers, waveguides, and related support equipment then check to at least 3 GHz. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1872 From: James M. Atkinson, Comm-Eng Date: Tue Oct 31, 2000 6:51pm Subject: Intense cross-border spying in 1945-1960 Home - Wednesday 25.10.2000 Fresh dissertation on espionage: Intense cross-border spying in 1945-1960 http://www.helsinki-hs.net/news.asp?id=20001025IE4&pvm=20001025 Soviets recruited spies with vodka and small sums of money Finland, and particularly its eastern border, was the focus of intense espionage activities between 1945 and 1960. The Soviet intelligence service, the KGB was the most active in recruiting spies, but Germany, Sweden, and NATO also had secret interests in Finland, and recruited Finnish agents. In many cases espionage activities went on for years without being detected. On the official level, Finland was silent about the whole issue. In the years 1945-1972 Finnish courts handed down 125 convictions for treason. Most of the convicted spies were Finnish citizens, and one person was actually convicted twice. In a doctoral dissertation defended at the University of Joensuu on Tuesday, historian Juha Pohjonen, 40, examines the convictions for treason which occurred from 1945 to 1972. The dissertation is to be published as a book, detailing the names, backgrounds, and motives of the convicted spies, who range from workers and small farmers to military officers, clergymen, and one industrialist. Sentences ranged from suspended sentences to seven years imprisonment. Pohjonen, who had previously studied the history of Finlandís Security Police, and the Frontier Guard, was allowed to examine the archives of the Security Police, SUPO and its predecessor, the State Police, or VALPO, which was largely communist controlled after the war. He also examined documents of the Frontier Guard and the National Archives, as well as archive material concerning presidents J.K. Paasikivi and Urho Kekkonen, and former Foreign Minister Ahti Karjalainen. Pohjonenís study took three and a half years to complete. He said that he was very cautious about the use of the Security Police archives as a source of information. The scope of the study ends in 1972 because the Security Police keeps all more recent papers concerning treason issues sealed. According to Pohjonen, a change occurred in Soviet espionage targeted at Finland in 1960. At that time, the so-called "superficial espionage" at the border came to an end. The cases that were uncovered focused on the interior of the country and the Helsinki region. About ten cases of espionage were revealed after 1975, only two of which occured in the 1990s. The most notable case was that of Finnish diplomat Olli Mattila who was convicted of giving Russian diplomats confidential papers of the European Union. The Finnish Supreme Court recently lowered his sentence to one year and two months suspended. Pohjonen divides treason cases into three different groups. In 1945-1948 all except for one involved the co-belligerent status of Finland and Germany during the war. The so-called great Fabritius conspiracy of 1946 kept the State Police busy, and was the source of considerable aggravation for President Paasikivi. The main defendant in the case, lieutenant general Johan Fabritius died during the trial. In that case, one major industrialist was sentenced to three years in prison. Another group involved the so-called surface spies used by the Soviet Union along the eastern border in the 1950s. A total of 46 people were convicted of activities involving giving information to Soviet agents across the border. The KGB was often able to recruit Finns with gifts of vodka, and on some occasions, tinned meat. Pohjonen sees the convicts mainly as victims, rather than as men who deliberately sold out their country. However, there are exception. The highest-ranking traitor was Uule Pet‰j‰, the head of the Parikkala company of the Frontier Guard. The KGB was reportedly interested in everything that happened in the border region. The third group comprised the 53 people convicted of treason inside the country. Both the backgrounds and the motivations of these people varied considerably. One of those convicted was an Orthodox priest, Vladimir Tsvetkov, who delivered information to the Soviet embassy in Helsinki for more than nine years. The head of the photographic reconnaissance of the Finnish Air Force, Capt. Martti Salo spied on behalf of the Soviet Union and Sweden in 1947-1953. A number of higher officers also were linked with the case. Salo was sentenced to seven years in prison. As for present day spying, Pohjola says that people who collect and relay secret information are probably not needed any more: "Intelligence gathering of the early 21st century mainly involves the analysis of the huge flood of public information". ------------- Helsingin Sanomat ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1873 From: James M. Atkinson, Comm-Eng Date: Tue Oct 31, 2000 7:10pm Subject: Beware a Rash of Exorcisms [Moderators Note: So how many list members find the following article somewhat applicable to some of the more "colorful" characters who ask about sweeps (who most of us turn away)?] -jma http://www.wired.com/news/culture/0,1284,39772,00.html?tw=wn20001031 Beware a Rash of Exorcisms by Leander Kahney 2:00 a.m. Oct. 31, 2000 PST If you think you know your own mind, think again. Demonstrating the plasticity of memory, psychologists at the University of Washington in Seattle convinced students they witnessed demonic possession as children. In a series of recent experiments, psychologists simply showed subjects newspaper articles about possession and then suggested symptoms of depression or anxiety were caused by witnessing a demonic possession during childhood. Subjects who initially thought demonic possession was highly implausible became convinced they had witnessed it themselves when they were very young. "It's relatively easy to make people believe they had an experience when they were children that they didn't have," said University of Washington psychologist Elizabeth Loftus, an expert in memory research. "Even people coming into the study saying this is very implausible could be led to believe they had the experience themselves when they were very young." Loftus predicted the current run of two movies dealing realistically with demonic possession -- the re-release of The Exorcist and Showtime's Possessed -- will have a similar effect and lead to a rash of exorcisms. She said a "mini-epidemic" of exorcisms were reported after the initial release of The Exorcist in 1973. "We saw thousands of people out there thinking they were possessed and asking for exorcism," she said. "I see no reason it wouldn't happen again." In a series of experiments, 200 students from Italy were asked to rate their feelings about the plausibility of demonic possession and whether it had occurred to them as children. Initially, all the subjects said possession was highly implausible and they had not witnessed one as a child. To disguise the nature of the study, questions about possession were buried in a "life events inventory" that included dozens of questions about ordinary childhood experiences like accidents or getting lost at the mall. Subjects then were presented with articles, stories or testimonials about possession that made it seem a plausible, not uncommon occurrence. A week later, they filled out a "fear profile" concerning feelings of anxiety or depression as an adult. Again, the questionnaire contained a lot of red herrings. After completing the fear profile, some of the subjects were given "false feedback" and were told their fears were caused by witnessing demonic possession as a child. The researchers found that about 18 percent -- or one-fifth of these subjects -- later changed their minds about the plausibility of demonic possession and were convinced they had witnessed it as children. "It's a minority," Loftus said, "but a very significant minority." Three-quarters of the rest of the subjects also changed their opinions, but not quite as radically, Loftus said. As a control, another group of subjects was told their fears were caused by a choking incident in early childhood. There was no change in the control group's attitudes about possession. The research was led by Giuliana Mazzoni, a psychology professor at Seton Hall University, and included Irving Kirsch of the University of Connecticut. It will be published next year in The Journal of Experimental Psychology: Applied. Loftus said the experiments are consistent with a large body of research into the creation of false memories. However, she said they are the first to create highly implausible memories. "Previous experiments created memories that were plausible," Loftus said. "But even something that's implausible can be infused with plausibility." Even if highly implausible false memories haven't been created before in the laboratory, it is relatively common occurrence in real life, Loftus said. For one thing, the experiments closely resemble therapy and the creation of false memories, a topic that has been the subject of a series of high-profile court cases in recent years. In 1990, George Franklin was convicted of murder based on the testimony of his daughter, whose repressed memory of the crime was "recovered" as an adult 20 years later. The case was overturned on appeal. A couple of years later, Gary Ramona, a Napa Valley wine executive, was acquitted of abusing his daughter based on her "recovered" memories and successfully sued her therapist for implanting the false memories. Loftus was an expert witness in both cases. "It's a two-stage process," Loftus said. "First you increase the plausibility of an event and then suggest it happened to the subject. "It mimics the kind of thing that happens in a physician's office. It's like getting an X-ray and having the doctor tell you that you have pneumonia," she said. "But in this case, low self-esteem and depression means you were abused as a child. It's an analog for that kind of situation." Loftus is famous for pioneering work in the '80s into the accuracy of eyewitness testimony. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1874 From: Talisker Date: Mon Oct 30, 2000 4:51pm Subject: Re: KeyGhost II Mike Sadly many wouldn't I have heard of a few complaining that their automatic cup holder (CDROM) kept closing for no reason Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo talisker@n... The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "Miguel Puchol" To: Sent: Monday, October 30, 2000 10:31 PM Subject: RE: [TSCM-L] KeyGhost II > Nick, > > I have taken a look at the device on their webpage (www.keyghost.com) and if > a user doesn't notice that a big cylindrical dongle has spontaneously grown > in their keyboard cable, then they shouldn't really be using a computer at > all. > This may be useful in internal audits for access control systems, logging > web site visits, etc. although software that does this is also available. > Not much of a worry, but something to look for. > > Thanks for sharing the info, all the best, > > Mike > > > -----Mensaje original----- > > De: Nick Robson [mailto:sci.ltd@c...] > > Enviado el: lunes, 30 de octubre de 2000 23:10 > > Para: Reply to TSCM List > > Asunto: [TSCM-L] KeyGhost II > > > > > > From GeekPress > > > > Thursday, October 26, 2000, 14:41:37 PDT > > The evil new KeyGhost II keystroke logging device is now > > available. It has a > > few new features not present in the original version (including strong > > encryption of its memory contents), but its function is still the > > same -- it > > records keystrokes as the user types and stores them on a > > nonvolatile FLASH > > memory chip. As before, it can be installed on computers that are > > locked up, > > password protected, or turned off, with the user being none the wiser, and > > the data can be transferred to another computer for easy downloading. > > The sneakiest version is the one hidden in the otherwise innocuous-looking > > keyboard. It's too bad that the manufacturer forbade Dan's Data > > from taking > > pictures of the disassembled unit! > > > > ************************* The Security Centre Ltd. ********************** > > *************Grand Cayman, Cayman Islands, British West > > Indies************** > > > > > > > > [Non-text portions of this message have been removed] > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1875 From: D.M.I. Date: Mon Oct 30, 2000 6:03pm Subject: Re: TSCM Certifications Greg, We had the same problem here in Ohio with the ODO registration. Finally, (several lawsuits and misdemeanor citations later) the State of Ohio has changed the way ODOs are handled. Even now though, getting the same answer from two different people in Columbus is impossible. Apparently, the 640 hours I spent in the academy were not as informative or practical as the 16 hours required for the FAB certification required to carry a gun as a security guard. Only after several companies got together and filed an $8,000,ODO lawsuit did the State finally change (or agree to anyway) their policies. Bill Rust Desperate Measures, Inc. ----- Original Message ----- From: Gregory Horton To: TSCM-L@egroups.com Sent: Monday, October 30, 2000 3:53 PM Subject: Re: [TSCM-L] TSCM Certifications Really good points were made. The part about the security industry really hit the nail on the head. Here in California, To be a security guard you must not only have a guard card but you must have a firearms card. Now here is the rub. About three years ago, the bureaucrats were being pressured by the major security companies to include off duty police officers in the registration process. This, in spite of the fact that police officers are all P.O.S.T certified, was readily agreed to. The fact that police officers are ten times more qualified than the security guards didn't matter. Now, we have to pay approximately 150 dollars to register. There is no rhyme nor reason to the regulations and I have called Sacramento 4 times to get answers to different questions and have received different answers and conflicting information. I have been told that if you have a P.I. license from the state, you don't need a guard card or firearms card. Then I had one of my guys tell me that they told him that you needed the cards. Sound confusing? It is. Oh I also forgot. Remember the fingerprint cards that you needed to get your license that almost all of us could get for a very small fee? Now they have decreed that everyone must submit their prints via a live scan terminal. This costs between 70 to 100 dollars. You must qualify twice a year, and oh yes, you must go to a certified instructor (40 to 70 dollars per trip) to do so. There are literally dozens of these people who have become "qualified instructors" and I'm sure that some of them are qualified, but the others......... I can't even imagine what the cost and testing process would be for TSCM! The thought of dozens of new bureaucrats with a new empire gives me the creeps. Just a few of my random thoughts. Greg Horton eGroups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 1876 From: Mike Date: Tue Oct 31, 2000 5:45pm Subject: Re: Over 1 GHZ (Piece of Cake) Cheap remote color cameras with mic can be bought new at www.x10.com for under $80. They even have battery packs available. These work at 2.4 ghz. (You can even use a remote control with several of them to switch back and forth. Modifying these to accept better cameras or mics should be a piece of cake. A remote controlled Sony Sunpak pan/tilt unit could also be incorporated.) I use a battery of 12 units around the outside of my house for cheap thrills in conjunction with some x10 sensors. Movement anywhere causes a series of events to trigger. Great for quick & dirty home security installations. X10 has a dealer program that refers customers and sets you up with 3 complete home security systems for under $500 if you use their $100 rebate/voucher. This also includes the dealer fee of $100. (You can charge whatever you want for labor, etc. regarding referrals.) They also have computer controled software which may be adapted for use with more sophisticated equipment. (I set up a house in a remote Oregon area with Mil surplus AN/PPS-6 Portable Battlefield radars and a network of PSID devices and cameras/mics that enabled some unusual detection in rough, forested and mountainous terrain at distances over 1 mile.) The radars are in a Mil freq and can't be used anywhere near population centers. (They may even fry ICs in electronic devices. This makes me wonder about their potential to disable vehicles, computers, etc.? smiles..) Nuff Said- Bootleg ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: Sent: Tuesday, October 31, 2000 3:59 PM Subject: Re: [TSCM-L] Over 1 GHZ (Piece of Cake) > (groan, here we go again) > > Yes, there is a tons of legitimate and illicit eavesdropping > equipment sold that operates above 1 GHz. > > Five years ago eavesdropper started flocking to the Wavecom toys > operating in the 2.45 GHz area, but prior to that they were all over > the place at 1.2-1.5 GHz, and 1.7-1.9 GHz. > > Right now an eavesdropper can obtain a throw away eavesdropping > camera and transmitter for under a hundred bucks, or can obtain > professional video gear for not much more. > > Of course you should be concerned about bugs above 1 GHz, but you > should also be concerned about above 3 GHz as well... Hell, you > should be sweating eavesdropping devices to well over 22 GHz (both > cheap, and available). > > Spread Spectrum and frequency hopping devices are a piece of cake to > deal with, it's all a matter of having the right equipment, and using > the right methods. > > -jma > > > > > At 8:35 AM -0800 10/31/00, Dawn Star wrote: > >I have found that bugs operate less than > > 1 gig that is sold over the open > >market and have heard of nobody on this list who > > have found a bug that transmitted over > >1 gig and that they reported it to the list. > > My personal pledge is > >to help all people that I can whether if its finding > > a bug or giving Blood to a Blood Bank. > > > >Justice for all ANDRE > > > >I have found six 2.4GHZ bugs in the past few years, especially > >video, and I'm expecting them to be > >more and more what we are going to find out there as far as R.F. > >attacks. Let me tell you frequency hopping and spread spectrum at > >this frequency range is making me very uneasy! > > > > Roger Tolces, > >Electronic Security Co., Los Angeles > > > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > Do not try the patience of Wizards, > for they are subtle and quick to anger. > ======================================================================= > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > 1877 From: Mike Date: Tue Oct 31, 2000 6:03pm Subject: Re: Over 1 GHZ (Piece of Cake) A lot of surplus repeaters, etc. is available in the 24 ghz area. I'd watch for it being used more often as homebrew setups. Nuff Said- Bootleg ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: Sent: Tuesday, October 31, 2000 4:48 PM Subject: RE: [TSCM-L] Over 1 GHZ (Piece of Cake) > At 1:33 AM +0100 11/1/00, Miguel Puchol wrote: > >I agree. Bugs above 3 GHz have been spotted around here a few > >times...there's a reason in having SA gear that goes up to (and sometimes > >further than) 20 GHz. > >Also true, the Wavecom units combined with cheap (or not) video cameras are > >becoming more and more popular. We found one hidden in an artificial plant's > >pot, with the antenna hidden in the 'foliage'. Here you can pick up a decent > >Sony color camera and Wavecom unit for around $175 - maybe this is > >considered expensive in the U.S., but not so over the pond. > > > >Cheers, > > > >Mike > > > I personally feel that checking for radiated signals up to 3 GHz is a > absolute MUST on any TSCM project, but that when possible the > TSCM'er should check to 22 or 26/5 GHz. > > In my professional opinion I feel strongly that the TSCM'er should > check to at least to the 10th harmonic of the highest probably and > confirmed threat (that you can actually document the existence of as > a threat to the level your addressing). > > Of course if your running on a time budget, or you are unable to > transport a microwave SA, mixers, waveguides, and related support > equipment then check to at least 3 GHz. > > -jma > > > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > Do not try the patience of Wizards, > for they are subtle and quick to anger. > ======================================================================= > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > 1878 From: Charles Patterson Date: Wed Nov 1, 2000 0:43am Subject: Re: KeyGhost II Mike et al, don't forget, most keyboards plug into the back of the computer. And most computers I've come across in offices are often on the floor under the desk. Thus in these situations, a little dongle on the keyboard cable would be out of site and difficult for all but the office geeks to notice. Searching for it is also one of those jobs you could give to the pi or security contact who insists they have to be present for the whole sweep and want to "help" (as long as you can trust them not to hurt anything). charles > I have taken a look at the device on their webpage (www.keyghost.com) and if > a user doesn't notice that a big cylindrical dongle has spontaneously grown > in their keyboard cable, then they shouldn't really be using a computer at > all. 1879 From: Mike Date: Wed Nov 1, 2000 3:04am Subject: Re: KeyGhost II Back 20 years ago, I used to replace the keyboard chip with a larger double capacity eprom that I programmed to do "extra" things on an Apple II plus. I also did the same "double capacity" eprom switch on the bios for various mods. By doing this and knowing what kind of keyboard is used, a "QUICK" change of keyboards is a much better option and almost undectable even by experts. Re-programming bios, pics and embedded ICs are the best way to go if you have the time and opportunity to switch parts. Some basic programming skillls, an eprom and pic burner, are naturally necessary to optimise your results. Nuff Said- Bootleg ----- Original Message ----- From: Charles Patterson To: Sent: Tuesday, October 31, 2000 10:43 PM Subject: Re: [TSCM-L] KeyGhost II > Mike et al, > > don't forget, most keyboards plug into the back of the computer. And most > computers I've come across in offices are often on the floor under the desk. > Thus in these situations, a little dongle on the keyboard cable would be > out of site and difficult for all but the office geeks to notice. > > Searching for it is also one of those jobs you could give to the pi or > security contact who insists they have to be present for the whole sweep and > want to "help" (as long as you can trust them not to hurt anything). > > charles > > > > I have taken a look at the device on their webpage (www.keyghost.com) and > if > > a user doesn't notice that a big cylindrical dongle has spontaneously > grown > > in their keyboard cable, then they shouldn't really be using a computer at > > all. > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1880 From: Mike Date: Tue Oct 31, 2000 6:22pm Subject: Re: Intense cross-border spying in 1945-1960 Two years ago after my 5th divorce, I started writing ladies in Russia, and The Ukraine. To make a long story short, a few came to visit me. One was a Nuclear engineer that does international consulting regarding nuclear power plants. Her father was the Director of a large nuclear power plant in the Ukraine. (With a LOT of power and clout.) She stayed several weeks and we became close friends until this day. She referred me to several co-workers that were top programmers that wanted US work. (Yes-I tried headhunting them off to US companies. One is now living/working in Seattle.) She has access to top Ukrainian engineers, scientists, programmers and i'd also guess KGB/Security people.) Point being is this, if any of you have projects that can use these type of people or you need a TOP contact for work in Eastern Block countries, this may be a great way to make contact for your needs. Other big US companies sent engineers to work at her nuclear power plant so there should be no problem with US laws by contacting her. They like and need US dollars. This is an excellent contact for ??? (She's also single, sexy and smart! : )) This would also be great to outsource any programming projects. They can put together teams of as many top programmers as needed for any project cheaply as I was told. Nuff Said- Bootleg ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Sent: Tuesday, October 31, 2000 4:51 PM Subject: [TSCM-L] Intense cross-border spying in 1945-1960 > Home - Wednesday 25.10.2000 > > Fresh dissertation on espionage: Intense cross-border spying in 1945-1960 > > http://www.helsinki-hs.net/news.asp?id=20001025IE4&pvm=20001025 > > Soviets recruited spies with vodka and small sums of money > > Finland, and particularly its eastern border, was the focus of intense > espionage activities between 1945 and 1960. The Soviet intelligence service, > the KGB was the most active in recruiting spies, but Germany, Sweden, and > NATO also had secret interests in Finland, and recruited Finnish agents. > In many cases espionage activities went on for years without being > detected. On the official level, Finland was silent about the whole issue. > In the years 1945-1972 Finnish courts handed down 125 convictions for > treason. Most of the convicted spies were Finnish citizens, and one person > was actually convicted twice. > In a doctoral dissertation defended at the University of Joensuu on > Tuesday, historian Juha Pohjonen, 40, examines the convictions for treason > which occurred from 1945 to 1972. > The dissertation is to be published as a book, detailing the names, > backgrounds, and motives of the convicted spies, who range from workers and > small farmers to military officers, clergymen, and one industrialist. > Sentences ranged from suspended sentences to seven years imprisonment. > Pohjonen, who had previously studied the history of Finland's Security > Police, and the Frontier Guard, was allowed to examine the archives of the > Security Police, SUPO and its predecessor, the State Police, or VALPO, which > was largely communist controlled after the war. He also examined documents > of the Frontier Guard and the National Archives, as well as archive material > concerning presidents J.K. Paasikivi and Urho Kekkonen, and former Foreign > Minister Ahti Karjalainen. > Pohjonen's study took three and a half years to complete. He said that > he was very cautious about the use of the Security Police archives as a > source of information. The scope of the study ends in 1972 because the > Security Police keeps all more recent papers concerning treason issues > sealed. > According to Pohjonen, a change occurred in Soviet espionage targeted at > Finland in 1960. At that time, the so-called "superficial espionage" at the > border came to an end. The cases that were uncovered focused on the interior > of the country and the Helsinki region. > About ten cases of espionage were revealed after 1975, only two of which > occured in the 1990s. The most notable case was that of Finnish diplomat > Olli Mattila who was convicted of giving Russian diplomats confidential > papers of the European Union. The Finnish Supreme Court recently lowered his > sentence to one year and two months suspended. > > Pohjonen divides treason cases into three different groups. In 1945-1948 all > except for one involved the co-belligerent status of Finland and Germany > during the war. > The so-called great Fabritius conspiracy of 1946 kept the State Police > busy, and was the source of considerable aggravation for President > Paasikivi. The main defendant in the case, lieutenant general Johan > Fabritius died during the trial. In that case, one major industrialist was > sentenced to three years in prison. > Another group involved the so-called surface spies used by the Soviet > Union along the eastern border in the 1950s. A total of 46 people were > convicted of activities involving giving information to Soviet agents across > the border. > The KGB was often able to recruit Finns with gifts of vodka, and on some > occasions, tinned meat. Pohjonen sees the convicts mainly as victims, rather > than as men who deliberately sold out their country. However, there are > exception. > The highest-ranking traitor was Uule Pet‰j‰, the head of the Parikkala > company of the Frontier Guard. The KGB was reportedly interested in > everything that happened in the border region. > The third group comprised the 53 people convicted of treason inside the > country. Both the backgrounds and the motivations of these people varied > considerably. One of those convicted was an Orthodox priest, Vladimir > Tsvetkov, who delivered information to the Soviet embassy in Helsinki for > more than nine years. > The head of the photographic reconnaissance of the Finnish Air Force, > Capt. Martti Salo spied on behalf of the Soviet Union and Sweden in > 1947-1953. A number of higher officers also were linked with the case. Salo > was sentenced to seven years in prison. > As for present day spying, Pohjola says that people who collect and > relay secret information are probably not needed any more: "Intelligence > gathering of the early 21st century mainly involves the analysis of the huge > flood of public information". > > ------------- > > Helsingin Sanomat > > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > Do not try the patience of Wizards, > for they are subtle and quick to anger. > ======================================================================= > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1881 From: Bob Washburne Date: Wed Nov 1, 2000 10:47am Subject: Re: Certification I think this sums up the problem nicely and shows that there isn't any elegant solution. Jordan Ulery wrote: > > my last $0.02 on this topic > > In the US today way too much emphasis is placed upon initials behinds > one's name, not on the ability one possesses. That creates, > immediately, a problem, who issues the initials. > Or, as Jim says in latin, who watches the watchers? The whole argument of which governmental model is best boils down to who do you trust the most; the people (democracy), representatives (repuplic), the government (socialism) or the Glorious Leader (monarchy/dictatorship). The problem is that they all come from the same pool of humanity. > > The reliance on initials, even ones purchased with a book, by the public > a large is disheartening. The reliance on initials boils down to this; it's easier than thinking. It is amazing how many jobs require a college degree when there is nothing learned in college which would help for that job. But it is an easy thing to check for when making your candidate selection. Without initials the Human Resources folks would actually have to think and form judgements. So they will always be required by the uncertain and insecure. The degree may be a waste, but you can't get the job without it. There is hope. I know of several companies who, when interviewing a candidate for a technical position, asked no technical questions. The philosophy was that if the person was right, they could always learn the technology. > The SAR issue is a good example of what now > exists in the PI field. Everybody, it seems, has initials. Some you > get by going to a 'boot camp,' some you take a test, some are state > issued, some are meaningful and some are not. The chaff can be willowed > out, and will be with time. The good grain will stay. Maybe. Doesn't always work. In America, at least, the concept of neighborhood has broken down and people don't "network" as much. So it is harder for word to get around that a certain "professional" is unworthy of your business. The scum can keep going solely with new business and many individuals only need a service once. Do you buy so many cars or houses that deciding never to buy from that crook again will put a dent in their business? Probably not. > The point is to > establish a criteria, publish it and start moving legislation to accept > the criteria as the minimum for licensing. That course of action could, > in a short span of time, eliminate the blatant charlatans and give a > level playing field to those who really want to do the job well. Certification only establishes a minimal skill base (the skill to get the certificate.) But it is a base and does offer a level of litigation protection for the client. The model offered by the CISP certification for computer security professionals has some good points: -) The candidate must demonstrate three years of experiance in the industry before they are allowed to take the test. -) The exam is base on the "Common Body of Knowlege" and not on any single book. -) The questions are such that experianced professionals tend to do well and students tend not to. -) 40 hours of continuing education per year must be demonstrated to retain certification. -) Any violation of the code of ethics results in loss of certification. This doesn't prevent professional certification getters from getting in, but it thins the crowd conciderably. > > MHO Humbly conciddered. Bob Washburne, B.S., D.O.A., P.F.M., T.T.F.N., R.S.V.P. 1882 From: Dawn Star Date: Wed Nov 1, 2000 8:36pm Subject: Piece of Cake Spread Spectrum and frequency hopping devices are a piece of cake jma The day I take the "piece of cake attitude" is the day I'm finally going to get beat! Roger Tolces, Electronic Security Co., Los Angeles [Non-text portions of this message have been removed] 1883 From: Date: Wed Nov 1, 2000 3:37pm Subject: Re: Piece of Cake In a message dated 11/1/00 6:34:26 PM Pacific Standard Time, bratkid@e... writes: << The day I take the "piece of cake attitude" is the day I'm finally going to get beat! >> I concur 1884 From: James M. Atkinson, Comm-Eng Date: Wed Nov 1, 2000 9:08pm Subject: U.S. Intelligence Report Sees Chinese Spy Threat U.S. Intelligence Report Sees Chinese Spy Threat http://www.insidechina.com/news.php3?id=215735§ion=default WASHINGTON, Nov 1, 2000 -- (Reuters) China had at least 37 spies concentrating on ferreting out U.S. nuclear arms secrets in the mid-1990s and the effort has been "very successful", according to a secret U.S. intelligence report. The report was published in a newly released book, "The China Threat" by Washington Times reporter Bill Gertz, and also details espionage against the United States by Russia, Japan, France, Israel, India and other countries. The book says that in the early 1990s the FBI came across evidence China had spies inside the U.S. government, including one "burrowed" in the intelligence community. Intercepted communication between the Chinese embassy in Washington and Beijing suggested the agent, code-named "Ma" - horse in Chinese - was supplying classified defense information, the book said. But the FBI never found the mole. The book includes extensive excerpts from a U.S. intelligence report titled "Foreign Collection Against the Department of Energy: The Threat to U.S. Weapons and Technology," which describes how various countries targeted U.S. nuclear secrets. It includes information up to November 6, 1998, just months before the China spying scandal erupted publicly in early 1999, and said China had obtained highly classified nuclear weapon design information. More than 250 known or suspected intelligence officers from 27 countries visited or were assigned to various Energy Department facilities in the five years up to 1998, it said. "Russia and China had the largest intelligence presence with 141 and 37 officers, respectively," the report said. China's nuclear stockpile was deteriorating and so it targeted U.S. information related to nuclear weapons design, the report said. "This effort has been very successful, and Beijing's exploitation of U.S. national laboratories has substantially aided its nuclear weapons program," it said. CHINA JAPAN "ADEPT" China and Japan were "very adept" at collecting scientific and technological information using people such as scientists, academics and businessmen, the report said. Japan targeted U.S. nuclear labs for information on sensitive technologies through the Japan External Trade Organization, it said. China, France, India, Israel, Pakistan, Russia and Taiwan "are known to intercept U.S. satellite communications, and, in many cases, have extensive capabilities to intercept other communications," the report said. Russia mainly sought U.S. nuclear weapons secrets that involved state-of-the-art technologies, the report said. France had a record of exploiting legitimate access to U.S. businesses and government institutions to collect information and commonly sought information beyond the parameters of joint agreements, it said. "India has emerged as a dangerous intelligence threat" and has a well-developed and aggressive intelligence collection capability for U.S. secrets on advanced military and civilian technology, the report said. Taiwan has "a substantial intelligence presence in the United States" and focuses its spying efforts on the United States and China, the report said. South Korea has a "major intelligence presence" in the United States and expanded collection of nuclear technology secrets during the 1990s, while Iraq pursued information on U.S. technologies from other countries, the report said. Some documents were not published at the request of the CIA and National Security Agency (NSA), and instead blank pages were left in the book. Those included NSA reports on China's sale of a chemical weapons factory to Iran and how China helped Iran develop its missile program, the book said. Fears of Chinese espionage fuelled an investigation into Taiwanese-born Los Alamos scientist Wen Ho Lee, who was eventually charged with 59 counts of mishandling classified information. He was never charged with spying and was freed from jail in September after pleading guilty to one count of downloading nuclear weapons design secrets to a non-secure computer. (C)2000 Copyright Reuters Limited. All rights reserved. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1885 From: Mike Date: Wed Nov 1, 2000 11:32am Subject: Re: Certification Whatever you do, don't give Winn Schwartau at www.infowar.com any ideas about TSCM registrations. Next thing ya know he will be proclaiming himself the head of the "Only" recognized TSCM certification organization. JEEZ- Talk about someone that never actually "did" any of the things he profuses to be an expert on. Nuff Said- Bootleg ----- Original Message ----- From: Bob Washburne To: Sent: Wednesday, November 01, 2000 8:47 AM Subject: Re: [TSCM-L] Certification > I think this sums up the problem nicely and shows that there isn't any > elegant solution. > > Jordan Ulery wrote: > > > > my last $0.02 on this topic > > > > In the US today way too much emphasis is placed upon initials behinds > > one's name, not on the ability one possesses. That creates, > > immediately, a problem, who issues the initials. > > > > Or, as Jim says in latin, who watches the watchers? The whole argument > of which governmental model is best boils down to who do you trust the > most; the people (democracy), representatives (repuplic), the government > (socialism) or the Glorious Leader (monarchy/dictatorship). The problem > is that they all come from the same pool of humanity. > > > > > > > The reliance on initials, even ones purchased with a book, by the public > > a large is disheartening. > > The reliance on initials boils down to this; it's easier than thinking. > > It is amazing how many jobs require a college degree when there is > nothing learned in college which would help for that job. But it is an > easy thing to check for when making your candidate selection. > > Without initials the Human Resources folks would actually have to think > and form judgements. So they will always be required by the uncertain > and insecure. The degree may be a waste, but you can't get the job > without it. > > There is hope. I know of several companies who, when interviewing a > candidate for a technical position, asked no technical questions. The > philosophy was that if the person was right, they could always learn the > technology. > > > The SAR issue is a good example of what now > > exists in the PI field. Everybody, it seems, has initials. Some you > > get by going to a 'boot camp,' some you take a test, some are state > > issued, some are meaningful and some are not. The chaff can be willowed > > out, and will be with time. The good grain will stay. > > Maybe. Doesn't always work. In America, at least, the concept of > neighborhood has broken down and people don't "network" as much. So it > is harder for word to get around that a certain "professional" is > unworthy of your business. The scum can keep going solely with new > business and many individuals only need a service once. Do you buy so > many cars or houses that deciding never to buy from that crook again > will put a dent in their business? Probably not. > > > The point is to > > establish a criteria, publish it and start moving legislation to accept > > the criteria as the minimum for licensing. That course of action could, > > in a short span of time, eliminate the blatant charlatans and give a > > level playing field to those who really want to do the job well. > > Certification only establishes a minimal skill base (the skill to get > the certificate.) But it is a base and does offer a level of litigation > protection for the client. > > The model offered by the CISP certification for computer security > professionals has some good points: > -) The candidate must demonstrate three years of experiance in the > industry before they are allowed to take the test. > -) The exam is base on the "Common Body of Knowlege" and not on any > single book. > -) The questions are such that experianced professionals tend to do well > and students tend not to. > -) 40 hours of continuing education per year must be demonstrated to > retain certification. > -) Any violation of the code of ethics results in loss of certification. > > > This doesn't prevent professional certification getters from getting in, > but it thins the crowd conciderably. > > > > > MHO > > Humbly conciddered. > > Bob Washburne, B.S., D.O.A., P.F.M., T.T.F.N., R.S.V.P. > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > 1886 From: James M. Atkinson, Comm-Eng Date: Wed Nov 1, 2000 9:33pm Subject: Re: Piece of Cake At 6:36 PM -0800 11/1/00, Dawn Star wrote: >Spread Spectrum and frequency hopping devices are a piece of cake > >jma > >The day I take the "piece of cake attitude" is the day I'm finally >going to get beat! > >Roger Tolces, Electronic Security Co., Los Angeles > OK, but spread spectrum and frequency hopping signals has been around for 20+ years and every TSCM'er should know how to find it with very little effort. Nothing in this business is easy, but finding digitally modulated signals is one of the simpler tasks that we do on a regular basis. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1887 From: Christopher E. Brown Date: Thu Nov 2, 2000 5:18pm Subject: Re: Bug's Bug On Sun, 29 Oct 2000, Dawn Star wrote: > "However, the next generation of covert audio bugs are remotely > operated, for example the multi-room monitoring system of Lorraine > Electronics called DIAL (Direct Intelligent Access Listening) > allows an operator to monitor several rooms from anywhere in the > world without effecting an illegal entry. Up to four concealed > microphones are connected to the subscribers line and these can be > remotely activated by simply making a coded telephone call to the > target building. Neural network bugs go one step further. Built > like a small cockroach, as soon as the lights go out they can > crawl to the best location for surveillance.22 In fact Japanese > researchers have taken this idea one step further, controlling and > manipulating real cockroaches by implanting microprocessors and > electrodes in their bodies. The insects can be fitted with micro > cameras and sensors to reach the places other bugs can't reach." > > Anyone know if this is for real? > Roger Tolces, Electronic Security, Los Angeles Well, they show an AV cabable roach in 5th Element, so it must be. After all hollywood never break from reality, even on flics set 300 years from now. On a real note, reasearchers have been playing with certain bugs to drive small carts by tapping the signals to various muscle groups (wing control), but I am not aware of any working control of said bug projects. --- The roaches seem to have survived, but they are not routing packets correctly. --About the Internet and nuclear war. 1888 From: Talisker Date: Fri Nov 3, 2000 2:03am Subject: Re: Bug's Bug ----- Original Message ----- From: "Christopher E. Brown" To: Sent: Thursday, November 02, 2000 11:18 PM Subject: Re: [TSCM-L] Bug's Bug > On Sun, 29 Oct 2000, Dawn Star wrote: > > > "However, the next generation of covert audio bugs are remotely > > operated, for example the multi-room monitoring system of Lorraine > > Electronics called DIAL (Direct Intelligent Access Listening) > > allows an operator to monitor several rooms from anywhere in the > > world without effecting an illegal entry. Up to four concealed > > microphones are connected to the subscribers line and these can be > > remotely activated by simply making a coded telephone call to the > > target building. Neural network bugs go one step further. Built > > like a small cockroach, as soon as the lights go out they can > > crawl to the best location for surveillance.22 In fact Japanese > > researchers have taken this idea one step further, controlling and > > manipulating real cockroaches by implanting microprocessors and > > electrodes in their bodies. The insects can be fitted with micro > > cameras and sensors to reach the places other bugs can't reach." I saw it on TV last week on Thunderbirds, except the evil Hood used a mouse, obviously in these days of miniaturisation a cockroah is more feasible ;o) > > > > Anyone know if this is for real? > > Roger Tolces, Electronic Security, Los Angeles > > > Well, they show an AV cabable roach in 5th Element, so it must > be. After all hollywood never break from reality, even on flics set > 300 years from now. > > > On a real note, reasearchers have been playing with certain > bugs to drive small carts by tapping the signals to various muscle > groups (wing control), but I am not aware of any working control of > said bug projects. > > --- > The roaches seem to have survived, but they are not routing packets > correctly. > --About the Internet and nuclear war. > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1889 From: James M. Atkinson, Comm-Eng Date: Fri Nov 3, 2000 3:29pm Subject: Are polygraph tests lying to us? (you betcha) [Moderators Note: Steve Aftergood is right, the polygraph is nothing more then a prop which gives the interrogator a slight edge, but it is still nothing more then a prop whose primary purpose is to intimidate the subject into truthful admissions.] -jma Are polygraph tests lying to us? http://www.sunspot.net/content/archive/story?section=archive&pagename= story&storyid=1150510203754 Tests: Mixed reading of Lee's nuclear secret data, federal employee opposition to taking lie detectors 'reignite' 80-year-old controversy. By Michael Stroh Sun Staff Originally published Nov 3 2000 When physicist Wen Ho Lee first denied leaking U.S. nuclear secrets to the Chinese, authorities from the Department of Energy in 1998 wired him to a polygraph to see if he was lying. The Los Alamos National Laboratory scientist passed. But when a polygraph expert from the FBI looked at the same test results later, he concluded that Lee had not told the truth. How could the same lie detector test lead investigators to exactly opposite conclusions? The case of Lee, who eventually pleaded guilty to one felony count of mishandling classified information, has left law enforcement experts trying to answer the same fundamental questions that have existed since the invention of the lie detector 80 years ago: Does the polygraph actually work? And is it fair? "It's reignited this smoldering controversy," says Steven Aftergood, a senior research analyst with the Federation of American Scientists in Washington. In an essay being published today in the journal Science, Aftergood argues that a new federal policy requiring nearly 20,000 employees of the national nuclear weapons laboratories to take lie detector tests is having undesirable effects. The policy has lowered morale, Aftergood writes, and caused some of the nation's most gifted scientists to leave, and made it harder for the labs to recruit talented young researchers for the weapons programs. The use of the polygraph, he writes, "symbolizes the defeat of reason by the national security state." Despite such criticisms, the use of the polygraph test is on the rise. Congress banned private industry's use of lie detectors as a condition of employment in 1988, but they are routinely used for employee screening at the FBI, Central Intelligence Agency, National Security Agency and local police departments around the country. The percentage of law enforcement agencies using polygraphs for this purpose rose from 16 percent in 1962 to 62 percent in 1999, according to a survey by Michigan State University's School of Criminal Justice. There's also a growing market for polygraphs outside law enforcement. The American Polygraph Association, the largest polygraph accrediting and licensing organization in the country, reports that its membership has risen past 2,000 and is continuing to grow. Private polygraph examiners handle everything from fishing tournaments to divorce cases. Winners of the annual Big Rock Blue Marlin Tournament in Morehead City, N.C., for example, must submit to a polygraph before collecting any prize money (to make sure they haven't stuffed rocks in the gut of their prize catch). Lie detectors aren't designed to detect lies as much as the subtle physical changes that may occur when a person tells a lie. The word "polygraph" means "many writings," and that is what the polygraph machine produces: lots of squiggly lines on a scrolling piece of paper. The test works like this: A subject is seated in a chair. Two rubber belts are wrapped around his chest and stomach to measure breathing patterns. A blood pressure cuff is wrapped around an arm. A metal plate attached to the fingers measures sweat gland activity. The polygraph examiner then asks the person a series of questions. Some of the queries are "control" questions unrelated to the matter under investigation but establish a base line of the person's blood pressure, respiration and perspiration. Other questions directly address the actions under scrutiny. The examiner interprets the person's physiological response to each of the questions, as recorded on scrolling paper, to judge whether the person is lying. And thus the uncertainty about polygraph results: they are a matter of judgment. "There's no red light or siren that comes on when the person lies," says Milton O. "Skip" Webb Jr., president of the American Polygraph Association. The roots of the modern lie detector stretch back to antiquity. Like modern methods, early techniques to ferret out lies often relied on the behavior exhibited by liars - sweaty palms, dry mouth, shifting gaze, racing pulse. In China, for example, suspected liars were fed a handful of dry rice. If they could spit it out, the thinking went, they were telling the truth. If the rice stuck to their tongue, they must have something to hide. The modern quest to detect liars using technology began with Cesare Lombroso, an Italian criminologist who in 1895 published a book called "The Criminal Man" in which he described his efforts using an early instrument to measure changes in blood pressure to determine whether several criminal suspects had lied. In 1915, Harvard psychologist William Moulton Marston picked up on these early studies and devised a primitive lie detector based on blood pressure. According to psychologist and polygraph historian David Lykken, it was Marston, a colorful P.T. Barnum-like character, who was among the first to realize the lie detector's commercial possibilities. In 1938, Look magazine described how Marston sometimes used his lie detection techniques in marital counseling. He also showed up in full-page ads testfying to the close shave offered by Gillette razors: "New Facts about Shaving Revealed by Lie Detector!" (Using the pen name "Charles Moulton," Marston would also invent the comic strip character Wonder Woman, whose magic lasso could force those held to tell the truth. ) But John A. Larson, a Berkeley, Calif., police officer, is the person generally credited with inventing the modern polygraph machine. In 1921, Larson, who eventually became a doctor, devised an instrument that could simultaneously record blood pressure, pulse and respiration. Later tinkerers improved upon Larson's design by adding sensors to measure perspiration. Over the years scientists have tried to determine whether the polygraph actually works. But accurate studies are hard to do. "The science is not solid," says Aftergood, in part because investigators can rarely learn independently whether a subject who passed a polygraph test was indeed telling the truth. In some studies, volunteers are recruited to be pretend criminals and then subjected to a lie detector test. But the results of such work, critics argue, don't mimic reality. "It's impossible to make the stakes as high in an experiment as they are in real life," says Aftergood. Still, proponents of the polygraph argue the device is accurate in better than 90 percent of cases, and note that it's not uncommon for other types of test results to be open to interpretation. "Your doctor can have you take a chest X-ray and say, 'I don't see anything.' Then he sends it over to a radiologist and the radiologist finds something the first doctor doesn't see," says Webb. "Happens all the time." But enough guilty people have slipped past the polygraph to have given law enforcement officials pause. Most federal and state courts do not allow polygraph results to be entered as evidence. CIA employee Aldrich Ames, for example, passed lie detector tests despite selling U.S. secrets to the Russians for more than eight years. There's also a mini-industry of Internet sites and books such as "Deception Detection: Winning the Polygraph Game" that purport to teach people how to beat the test. "College students with 15 minutes of explanation can beat the lie detector," says David Lykken, a retired psychologist from the University of Minnesota. "Anybody who is working as a spy has been taught how to beat the polygraph." The advertised techniques range from curling one's toes to biting one's tongue during control questions to mislead the examiner. Still, even critics of the polygraph acknowledge that it has led to admissions of guilt that they might not otherwise have gotten. "The polygraph itself functions as a prop more than anything else," says Aftergood. "Yet, there are cases every year in which the prop works." ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1890 From: Mike Dever Date: Fri Nov 3, 2000 11:28pm Subject: Re: Bug's Bug Am I missing something here?? "However, the next generation of covert audio bugs are remotely > > operated, for example the multi-room monitoring system of Lorraine > > Electronics called DIAL (Direct Intelligent Access Listening) > > allows an operator to monitor several rooms from anywhere in the > > world without effecting an illegal entry. Without effecting an illegal entry??? How do the four "concealed microphones" get into the target premises? Up to four concealed > > microphones are connected to the subscribers line and these can be > > remotely activated by simply making a coded telephone call to the > > target building. Regards -- Michael J. Dever CPP Principal Engineer Dever Clark & Associates GPO Box 1163 Canberra 2601 Australia Telephone: (02) 6254 5337 Telefax: (02) 6278 4020 E-mail: deverclark@b... > From: "Talisker" > Reply-To: TSCM-L@egroups.com > Date: Fri, 3 Nov 2000 08:03:44 -0000 > To: > Subject: Re: [TSCM-L] Bug's Bug > > "However, the next generation of covert audio bugs are remotely >>> operated, for example the multi-room monitoring system of Lorraine >>> Electronics called DIAL (Direct Intelligent Access Listening) >>> allows an operator to monitor several rooms from anywhere in the >>> world without effecting an illegal entry. Up to four concealed >>> microphones are connected to the subscribers line and these can be >>> remotely activated by simply making a coded telephone call to the >>> target building. 1891 From: Gordon Mitchell Date: Sat Nov 4, 2000 9:05pm Subject: Re: KeyGhost II The cylindrical feature is molded in the same form as a ferrite bead, strain reliefs and all. This makes it not too noticeable. In using this device in our computer forensics work... my guess is that most users would not notice it -- certainly it is less obvious than the software trojans and logging programs that are picked up by virus scans. A tip for sweeps: Look for the extra length of keyboard cable but don't depend on that. OEM versions can be installed in 'most any keyboard. One quick check that is likely to find 50% of these devices is to type the word vghostlog (not followed by an enter) while in a word processor. This is the default device password which may not have been changed. You will be amazed at what comes back if one is installed! This is another example of a modern threat that we need to be aware of. It is much more serious than one might imagine since it captures passwords which are likely encrypted in the local machine or on the net. Gordon Mitchell Future Focus, Inc Woodinville, WA (888) BUG-KILR Electronic eavesdropping detection & finding clues in computers Miguel Puchol wrote: > > Nick, > > I have taken a look at the device on their webpage (www.keyghost.com) and if > a user doesn't notice that a big cylindrical dongle has spontaneously grown > in their keyboard cable, then they shouldn't really be using a computer at > all. > This may be useful in internal audits for access control systems, logging > web site visits, etc. although software that does this is also available. > Not much of a worry, but something to look for. > > Thanks for sharing the info, all the best, > > Mike > > > -----Mensaje original----- > > De: Nick Robson [mailto:sci.ltd@c...] > > Enviado el: lunes, 30 de octubre de 2000 23:10 > > Para: Reply to TSCM List > > Asunto: [TSCM-L] KeyGhost II > > > > > > From GeekPress > > > > Thursday, October 26, 2000, 14:41:37 PDT > > The evil new KeyGhost II keystroke logging device is now > > available. It has a > > few new features not present in the original version (including strong > > encryption of its memory contents), but its function is still the > > same -- it > > records keystrokes as the user types and stores them on a > > nonvolatile FLASH > > memory chip. As before, it can be installed on computers that are > > locked up, > > password protected, or turned off, with the user being none the wiser, and > > the data can be transferred to another computer for easy downloading. > > The sneakiest version is the one hidden in the otherwise innocuous-looking > > keyboard. It's too bad that the manufacturer forbade Dan's Data > > from taking > > pictures of the disassembled unit! > > > > ************************* The Security Centre Ltd. ********************** > > *************Grand Cayman, Cayman Islands, British West > > Indies************** > > > > > > > > [Non-text portions of this message have been removed] > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS From: larry d chapman Date: Thu Oct 30, 2003 9:26am Subject: Re: audio intercept question The ultrasonic solution may work near-field. In a room for example. However, telephone lines limit bandwidth to about 300Hz to 4 kHz; so, ultrasonic signals most likely do not pass through the PSTN. Anyone have support or contridiction? LDC -- --------- Original Message --------- DATE: Tue, 28 Oct 2003 21:00:14 From: Gordon Mitchell To: Shawn Hughes Cc: TSCM-L@yahoogroups.com Long ago people made some ultrasonic signal generators that had 2 tones. In normal situations they would not be heard; a filter blocked the signal from the phone being used. The theory was that any nonlinear circuitry, e.g., a recorder with an overloaded front end, would be hit with the difference of the 2 tones which was arranged to be in the audio range. Of course the coverage was best near the signal generator and marginal farther away. A friend in a company that used to make these things said that they worked OK but the phone company didn't like the extra stuff on their lines. Gordon (425) 489-0446 Shawn Hughes wrote: > Hi! > > Have a question I can't answer, so I thought I'd pose it to the group. A > person related me that they were told there was a device one could put 'on > their phone line' to prevent a person on the other end from recording them. > > This person is an investigative journalist, and she was attempting to > record an individual (one party state). All she obtained was 'white noise > and click-clack' (her description). > > Her setup worked normally prior to and subsequently, just not this time. > > > Is this a freak incident, or does this sound like something one of you has > heard about? How could you pass something past the switch, that doesn't > garble heard audio, but defeats a wired recorder? (Holding the recorder to > the earpiece, she was subsequently able to obtain her information.) > > > Thanks in advance, > > > Shawn Hughes > Lead Instructor > Tactical Response, Inc. > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. ____________________________________________________________ FREE ADHD DVD or CD-Rom (your choice) - click here! http://ad.doubleclick.net/clk;6413623;3807821;f?http://mocda2.com/1/c/563632/131726/311392/311392 AOL users go here: http://ad.doubleclick.net/clk;6413623;3807821;f?http://mocda2.com/1/c/563632/131726/311392/311392 This offer applies to U.S. Residents Only [Non-text portions of this message have been removed] 7925 From: kevintscm Date: Thu Oct 30, 2003 9:46am Subject: Tektronix WCA200/300 Spectrum Analyers Has any one used a Tektronix WCA 230A/280A or WCA330/380 Spectrum Analyers. . [Non-text portions of this message have been removed] 7926 From: Dragos Ruiu Date: Thu Oct 30, 2003 1:05pm Subject: CanSecWest/core04 Call For Papers CALL FOR PAPERS CanSecWest/core04 Network Security Training Conference http://cansecwest.com April 21,22,23 - 2004 Vancouver, B.C. Canada CanSecWest would like to announce the final selection of papers for the first, fall, PacSec.jp/core03 conference (below), and the beginning of the call to submit papers for the spring, fifth annual, CanSecWest/core04 network security training conference. The conference will be held on April 21,22,23 at the Mariott Renaissance in downtown Vancouver, British Columbia, Canada. The conference focuses on emerging information security tutorials and technology. Please make your paper proposal submissions before December 10, 2003. The conference is responsible for travel and accomodations for the speakers. If you have a proposal for a tutorial session then please email a synopsis of the material and your biography, papers, and speaking background to core04@c.... Tutorials are one hour in length, Only slides will be needed for the March paper deadline, full text does not have to be submitted. The CanSecWest/core04 conference consists of tutorials on technical details about current issues, innovative techniques and best practices in the information security realm. The audiences are a multi-national mix of professionals involved on a daily basis with security work: security product vendors, programmers, security officers, and network administrators. We give preference to technical details and education for a technical audience. The conference itself is a single track series of presentations in a lecture theater environment. The presentations offer speakers the opportunity to showcase on-going research and collaborate with peers while educating and highlighting advancements in security products and techniques. The focus is on innovation, tutorials, and education instead of overt product pitches. Some commercial content is tolerated, but it needs to be backed up by a technical presenter - either giving a valuable tutorial and best practices instruction or detailing significant new technology in the products. Paper proposals should consist of the following information: 1) Presenter, and geographical location (country of origin/passport) and contact info (e-mail, postal address, phone, fax). 2) Employer and/or affiliations. 3) Brief biography, list of publications and papers. 4) Any significant presentation and educational experience/background. 5) Topic synopsis, Proposed paper title, and a one paragraph description. 6) Reason why this material is innovative or significant or an important tutorial. 7) Optionally, any samples of prepared material or outlines ready. Please forward the above information to core04@c... to be considered for placement on the speaker roster. The selected PacSec.jp/core03 papers are: Lance Spitzner - Honeypot Technologiers Inc. Honeypot Technology Richard Forno - Former InterNIC CSO Incident Response Nicolas Fischbach - COLT Telecom Secure Network Infrastructure Deployment Jose Nazario - Arbor Networks Is the future so bleak? An analysis of proposed worm futures FX - Phenoelit Cisco Vulnerabilities: The Past, The Present, and The Future Jun-ichiro itojun Hagino - Internet Initiative Japan Inc. - IP Version 6 Security Considerations Marty Roesch - Sourcefire Passive network reconnaissance and intrusion data analysis Ivan Arce & Gerardo Richarte - Core SDI State of the Art Security from an Attacker's Viewpoint. Dave Aitel - Immunity Inc. Modern Exploit Shellcode Generation and Attack Techniques (MOSDEF) Theo DeRaadt - OpenBSD Advances in OpenBSD Tom Vogt - SELinux Secsecurity Enhanced Linux Architecture and Applications PacSec.jp/core03 details, late announcements can be found at http://pacsec.jp CanSecWest/core04 details and early discount registration can be found at http://cansecwest.com thanks, --dr -- Top security experts. Cutting edge tools, techniques and information. Tokyo, Japan November 6,7 2003 http://pacsec.jp Vancouver, Canada April 21,22,23 2004 http://cansecwest.com pgpkey http://dragos.com/ kyxpgp 7927 From: Does it matter Date: Thu Oct 30, 2003 1:39pm Subject: Wow look how many they have found I ran across this and thought that ppl would have a good time with it. All I can say is they have found more bugs than everyone on this list total, including Steve and James. LOL Too bad the show That's Incredible is off the air. http://www.consultgreen.com/bugsweeps.htm 7928 From: Shawn Hughes Date: Fri Oct 31, 2003 11:57am Subject: Re: Digest Number 1403 At 12:04 PM 10/31/03 , you wrote: >The ultrasonic solution may work near-field. In a room for example. >However, telephone lines limit bandwidth to about 300Hz to 4 kHz; so, >ultrasonic signals most likely do not pass through the PSTN. >Anyone have support or contridiction? I agree. Many people have contacted me offline with solutions that mask audio at the near end. What the issue was concerned a technology that prevented pair recording by direct connection at the far end of a call. I can't see what you could do that would pass the switch and associated fiber, to be regenerated in copper at the far end that would allow you to hear a conversation, but not allow you to 'clip in' and record it. One person did email me saying this technology existed, but wouldn't discuss it further in an email, and I haven't had time to pursue it further by phone. All I know, is if this does exist, I want a franchise!!!!!!! ;) Thanks again for all the help, Shawn Hughes Lead Instructor, Tactical Response, Inc. 7929 From: Date: Fri Oct 31, 2003 5:04pm Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: Do you feel that a TDR is a useful piece of TSCM equipment, or simply put... do you use a TDR? o Yes, and I feel that people who speak poorly of them are morons. o Yes, they are great instruments. o Yes, but I only use them is a client asked for it, and then only if they are watching o Yes o Sometimes o What's a TDR? o No, I do not use a TDR o No, but I would if I owned one o No, but I would use one if I knew what one was. o No, I do not use them, they don't work, the earth is flat, I am a clueless moron. o No, because my mommy/wife will not let me use her money to buy one, o The bells, the bells, the bells,the bells, the bells, the bells, the bells, the bells, the bells, the bells, the bells, the bells, the bells, the bells, the bells, the bells, the bells, the pentenabulations of the bells To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1150776 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 7930 From: Steve Uhrig Date: Sat Nov 1, 2003 6:53pm Subject: TDRs for sale The following Riser-Bond TDRS are for sale: Model 1270New $3500my price $1900 Model 2901B+New $1000my price $350 Model 1205CXNew $2700my price $1350 Model 1205CXANew $3000my price $1500 Model 1205-OSPNew $3195my price $2100 All are used, in perfect operating condition and very good physical condition with new battery, fresh calibration, all accessories including test leads, battery charger, instruction manual, wallet cheat sheet, computer interface cable (except 2901B+ which will not talk to a computer), and canvas accessory carrying pouch. Also available are a new hard case for any model, and one new empty yellow box pre-machined for any of the yellow box TDRs. This new box also includes the clear plastic carrier for the instruction manual inside the lid. Clean up your beat up TDR by dropping it into a new box, which takes 5 minutes. I stock the new boxes and can supply new batteries for your TDR if necessary. 220VAC chargers can be substituted for 110VAC chargers at no cost if so requested at time of order. All are guaranteed to be in perfect working condition. More info can be found here: http://www.swssec.com/part_one.html These TDRs are extremely rugged and all except 2901B have internal digital storage of waveforms which later can be dumped to a printer or into a computer via an RS232 port. The simple software for doing this is called Wave View, and the latest version is available as a free download from www.riserbond.com. So you can take readings on a job, store them then dump them into a laptop and into a report, or print and save against future use for baseline inspection. All TDRs will read twisted pair as well as coax or any metallic conductor pair. All have selectable pulse widths, sensitivity, and other than 2901B+ have magnification, one button setup and many other features. These things are easy to use, very rugged, and powerful. With some practice, you will own any metallic pair or coax you inspect. Nothing can hide from these when used in proper hands. You quickly will become confident in your abilities, and this confidence will be obvious to potential clients. All are subject to prior sale. I can take credit cards or checks for payment and ship to any non- embargoed country. I've probably sold 50 similar TDRs to members of this list. Feel free to ask for references, or check the References section of my website for that sort of thing. You also can check ebay under my email address and find a perfect record of 644 positives and zero negatives. If you are serious in TSCM, you need a TDR, and Riser Bond is the best choice. No delicate, expensive CRTs like in Tektronix models as all Riser Bond machines have rugged backlit large LCD readouts like a solid state oscilloscope. All yellow boxes have automatic filtering, also, which will notch out 50/60 cycle mains interference as well as stepping through different filter modes to give the best image on the screen automatically or manually. All also can be used on powered lines up to 400 volts without problems. The things practically work themselves, but all parameters can be controlled manually also. When closed, the cases are waterproof and can kick around in your van without needing any extra packing cases to protect them. Holler if questions. If you can use a TDR and are ready to stand on your hind legs and sweep like a man, you need one of these. Without a TDR, you're only playing games. There are excellent tutorials on using TDRs on both Riser Bond's website www.riserbond.com and www.tscm.com. While I don't make any claim about being a Riser Bond service center, I note Riser Bond themselves refer people to me who call them to have a machine serviced. Short of physical damage, I've seen very few problems with them. Email if interested. Save this message against future need. Other used and new TSCM, surveillance, communications, test equipment and related electronic toys can be found on our website: http://www.swssec.com/equipment_for_sale.html I buy excess or otherwise unneeded electronic equipment also. Please consider me first when you have something to sell or need to buy something. Regards .... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7931 From: Steve Uhrig Date: Sun Nov 2, 2003 3:23pm Subject: Networked digital video recorder FS High End Networked Digital Video Recorder Everfocus EDR1600. The premium digital video recorder (DVR) on the market today. Designed in Germany. The EDR1600 is a 16 channel, super rugged, high performance video recorder with every feature and capability offered in a modern machine. It includes a built in multiplexer and can record up to 16 cameras, color or black & white, NTSC or PAL to 60 frames per second. Each channel has selectable video motion detection, a log, watermark, variable frame rate, variable compression and much more. The system includes 4 drives: two hard drives totaling 320 gigs, a floppy drive for storing configuration files and a CD R/W drive for software updates and for exporting video in MPEG or MOV format. Additionally the unit can plug directly into an Ethernet network and be remotely controlled in all aspects over your LAN via a web browser and appropriate passwords. And this unit has a built in web server. Plug it into your high speed web connection and you can operate it remotely from anywhere in the world with web access. Excellent for monitoring remote sites, your office while traveling, customer's sites, etc. The EDR1600 can record and play back any combination of channels simultaneously. You don't have to take the entire machine down to play back one channel. Frame rate can vary depending on how you program for motion activity in the camera's field of view. For example, on the one I have protecting my office, frame rate is one frame every 5 seconds when no motion is present. However, when motion is present, rate increases to 5 frames per second. A log entry is made of the motion activity, and later you can review by camera, time/date window, only when motion occurred, and more. Software updates are available on the web from the manufacturer's website as they are released. A time/date generator and camera titler for each channel is built in. A Linux operating system is transparent to the user, except it never crashes and never needs rebooting. The hard drives do not use File Allocation Tables (FAT) so a drive crash does NOT mean you lose all data. And two hot swappable hard drives provides some measure of redundancy. System comes with a mouse for control, and accepts an optional standard keyboard (not included) for system control. Printer drivers built in will allow hard copies to a printer plugged directly into the unit, or you can pull hard copies from a web browser across a network. For network operation, simply plug in an Ethernet cable to the switch like any other networked device and assign an IP address. The unit will control pan/tilt/zoom of most popular brands of cameras. I use it with Pelco Spectra. Unit can transmit alarms to you via email. It has 8 relay outputs for alarms which can be configured for various conditions. System also has prealarm memory for use with the motion detector. When camera motion is detected, up to 10 seconds *before* the alarm is recorded to disk. Therefore, you see the person walking up to the door, opening it and passing through, not just the tail end of the door closing behind him as with most video motion detection. The most recent 10 seconds of activity for all cameras is recorded in solid state memory regardless of the frame rate programmed for that channel. This is a very nice feature and greatly simplifies setting trap zones. And since the motion detection is taken from the camera image, you don't need to install separate motion sensors. The motion detection sensitivity is adjustable on a camera by camera basis, as well as the size and shape of the zone within the camera's field of view. All these features and much more make this machine the premium digital video recorder available today. See here for a PDF spec sheet: http://www.everfocus.com.tw/pdf/edr1600.pdf We use these a lot and largely have replaced analog video with this series of digital machine. I evaluated quite a number of digital machines, and continue to do so on an ongoing basis. This is the machine I chose to protect my facility. Record up to 16 channels, control remotely via LAN within your facility or from anywhere in the world via the web. Maximum security, reliability and flexibility. System autoconfigures for NTSC or PAL format, and is usable anywhere in the world. Input is analog video in color or black and white. Output is composite video, S-video or VGA video, in increasing levels of quality. Unit operates best with a VGA or better computer monitor as opposed to an analog monitor, although it will work with either. System is a drop in replacement for most video recorders, and eliminates the need for an expensive and difficult to program multiplexer. Go first class, learn digital video, and have fun with the latest technology. Everfocus EDR1600 with all options and 320 gigs of storage. *Dealer* cost $2530. End user price $4477. Your price $1950 + ship from Maryland . One only available at this price, subject to prior sale. Credit cards accepted and will ship worldwide Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7932 From: James M. Atkinson Date: Sun Nov 2, 2003 10:31pm Subject: 100 Questions to ask your friendly sweep guy Here are a few more proposed questions that I will be encouraging consumers of TSCM service to ask of the persons offering to provide, or providing sweep services. Can the sweeper explain (briefly, in plain language) the function of their equipment? (or are they evasive, smug, dismissive- etc) The sweeper's background? LAW enforcement? Gov't? communications? PI? (no PI bashing!) Do they have a technical background (other than a ham or amateur radio background)? Will the sweeper also "put in" bugs or taps if asked? Will the sweeper tell me if the "cops" or "feds" have tapped/bugged me? Will the sweeper provide a written report? Does the sweeper use absolutes like "Clean", or does he/she stick to accurate reporting of the facts- frequencies and areas checked, equipment used, whether anything was found at the time, vulnerabilities discovered, etc. Does the sweeper use spy shop toys to check for bugs, or will they be using laboratory grade test equipment? Does the sweeper have a wide array of professional test equipment, or few hobby-toys? Does the sweeper look for wireless devices and in what frequency range? Does the sweeper look for "dormant" devices? Does the sweeper look for carrier current devices (understand the term) and in what frequency range? Does the sweeper perform a physical inspection? Does the sweeper have, and understand the use of a spectrum analyzer; communications receiver; carrier current detector; TDR; multimeter; High-Z audio amplifier......? Does the sweep team show up on time? Are they willing to work at unusual hours in order not to blow the operation to others working in the site? Is the sweeper willing to come to the site during business hours for RF or other time-critical parts of the sweep? Does the sweeper use gimmick names (007, Bond, CIA) or props such as phony badges or ID cards as part of a sales routine? Does the sweep team try to fit the environment, (IT or telephone techs, etc) or do they instead show up in SWAT fatigues or other inappropriate attire? Will the sweeper spend some time with the client (off site and off the phone) answering questions? Will the sweeper allow the client to observe the operation? (I heard a horror story of a rip-off telling a client to leave her house because she was "interfering with their waves") -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7933 From: kondrak Date: Mon Nov 3, 2003 3:39am Subject: Re: 100 Questions to get your ass in shit Interesting concepts here... At 23:31 11/2/2003, you wrote: >Here are a few more proposed questions that I will be encouraging >consumers of TSCM service to ask of the persons offering to provide, >or providing sweep services. > > >Can the sweeper explain (briefly, in plain language) the function of >their equipment? (or are they evasive, smug, dismissive- etc) Show them the goods, let them be baffled...explain, sure, methodology, sure, most times, they're in a fog...sorry if that's a bad attitude, but they may NOT be the good guy when they call. We need to remain above that. >The sweeper's background? LAW enforcement? Gov't? communications? >PI? (no PI bashing!) A non starter here....I'm a telephony kind-of guy, credentials don't mean crap, performance does...egos don't mean squat, results do. I get results. Certificate hunters deserve to pay outrageous prices, cause most certs are bogus anyway. I'll take my team of wackos, who include a 60 year old telco tech, a 17 year old hacker, a 35 year old computer guru, and a few others any day. Results may vary! >Do they have a technical background (other than a ham or amateur >radio background)? Neither mean crap, I'm both a ham and a FCC licensed (ex-1st phone w/radar) tech, neither have relevance to competency. I know an ex-1st phone who doesn't know which and of a soldering iron to grab. "Speculative competency". >Will the sweeper also "put in" bugs or taps if asked? Blatt! WARNING Will Robinson! THIS IS NOT OUR JOB!!!! WARNING! A sure sign of a bad job, pack it up, go home. >Will the sweeper tell me if the "cops" or "feds" have tapped/bugged me? Not a call for a professional...Are you tapped? YES? a field call, WHO? cant tell? (though most of us can) no answer. Not my determination, consult your lawyer. Here's what i found....(facts)..case closed...Mileage varies by state....apply proper extractation techniques...notify, CYA... >Will the sweeper provide a written report? Always! Covers your ass and theirs! Private functionaries who do this must report to their superiors, this is a template of what we should be providing. You KNOW what I mean. >Does the sweeper use absolutes like "Clean", or does he/she stick to >accurate reporting of >the facts- frequencies and areas checked, equipment used, whether >anything was found at the time, vulnerabilities discovered, etc. Always provide accurate information...to do more or less is unprofessional. Anything, even remotely concerned with the sweep, is ALWAYS documented, and mentioned, no matter how insignificant. It's called CYA! We ARE professionals, I believe? >Does the sweeper use spy shop toys to check for bugs, or will they be >using laboratory grade test equipment? You're among friendlies here, don't make me laugh...NIST calibration is a foregone...PLEASE don't insult us... >Does the sweeper have a wide array of professional test equipment, or >few hobby-toys? You mean my Pro-43 doesn't count? I'm aghast!...(sound of vomit hitting the floor)... >Does the sweeper look for wireless devices and in what frequency range? DC to light was always the norm, has it changed? >Does the sweeper look for "dormant" devices? I sure hope so, but 100kw pulses to the walls tend to start fires, so be careful.... >Does the sweeper look for carrier current devices (understand the term) and >in what frequency range? Cable introscopy is job #1...even before scanning...don't want the enemy knowing we're on scene if that's their MO. RF scans should give you an idea of the threat, 5khz to broadcast band should be a starting point...check every pair of hard wire, at high impedance of course. >Does the sweeper perform a physical inspection? DUH! If you've taught us anything James, it's the absolute necessity, of a thorough, demanding, uncompromising, smash and search everything physical search. Some of us take it to dust inspection, and have positive results. Dude, You're preaching to the choir here. >Does the sweeper have, and understand the use of a spectrum analyzer; >communications receiver; >carrier current detector; TDR; multimeter; High-Z audio amplifier......? If you don't you're NOT in this business.... >Does the sweep team show up on time? Not necessarily, they show up at an arcane time, if necessity demands it, sometimes, the corporation IS the enemy, we're there to discover, NOT support corporate espionage. We are benign, not favorite to anyone, just technicians doing a job. >Are they willing to work at >unusual hours in order not to blow the operation to others working in >the site? Is the sweeper willing to come to the site during business >hours for RF or other time-critical parts of the sweep? Dunno anyone I have here who doesn't...most of my staff work between 12am and 6am when they're on site..We're night owls... >Does the sweeper use gimmick names (007, Bond, CIA) or props such as >phony badges or ID cards as part of a sales routine? Cof...this NOT be a factor..heh...WE are technicals, NOT sales cretins... >Does the sweep team try to fit the environment, (IT or telephone >techs, etc) or do they instead show up in SWAT fatigues or other >inappropriate attire? Telephone company ID's, Jeans, hard hats, and pissy attitudes usually work for us...they think we're the usual telco clones...Sometimes, we have to look like the Blues Bros...mileage my vary...The Verizon truck works well....heh.. >Will the sweeper spend some time with the client (off site and off >the phone) answering questions? Always off-site, ALWAYS! Security demands that...if you've got to ask that, you don't belong in this business. >Will the sweeper allow the client to observe the operation? Live? NO, tape, YES! >(I heard a horror story of a rip-off telling a client to leave her >house because she was "interfering with their waves") SCAM! Ok, Just MHO.... I don't trust corporate clones who call in a sweep, they're as likely to be part of the problem as the solution, so I distance myself from them to provide as much of a non-contaminated, "I'll stand behind in court" atmosphere as possible. The situations you touch on here James, are all situations we need to be aware of, if we are to provide our services in a legal, and un-biased manner. GOOD questions! Bravo! 7934 From: Bruce Date: Sat Nov 1, 2003 10:54am Subject: Use of thermal imaging TCM I read some information from a web site on the Internet posted by a company where they were discussing the use of thermal imaging video and photography as a means of detecting hidden surveillance devices. In short, they recommend the use of thermal photography, in addition to standard RF detection, and other methods. I understand the principal of this, but I was wondering if any of you have insight or opinions on this? Thanks, Bruce 7935 From: Doug Ellsworth Date: Mon Nov 3, 2003 4:19pm Subject: RE: Use of thermal imaging TCM Bruce and all, Thermal is particularly useful for detecting hidden video. All kinds of electronic stuff emanate heat, but active video cameras usually present a heat source very near a surface (wall, bookcase, wall hanging, turned-off electrical items, and the like). This is because the lens of the video camera has to be able to gather light from within the targeted area. We like to use thermal to first scan the room where we are planning to set up equipment for the initial RF stage, along with a computer-based spectrum scope (at video transmitter freqs). We do this before we expose anything that might look TSCM-y. We set a notebook computer on a conference table and everything else is still on the truck until we can be assured that there's little likelihood of video surveillance. My usual "disguise" is as an interior designer, complete with carpet samples and other props, (but sans the limp-wrist and wiggle-walk). A "camera-looking-thingy" would not be unusual for a designer to wield around a conference room, in case we are being "watched". We do all this to give us the added assurance that we don't alert bad guys that a TSCM effort is about to commence. It's no longer enough to just refrain from creating audio that might alert eavesdroppers. Thermal imagers of sufficient resolution to be worth anything to TSCM will be one of your most expensive pieces of equipment, if not theeeeeee most expensive. For no more often than it might be used, you might enquire of some electrical contractors in your area; the larger contractors may have a FLIR and may be willing to contract for its use and its operator. -Doug Doug Ellsworth SecurityPosture.com www.securityposture.com -----Original Message----- From: Bruce [mailto:bgabbard@s...] Sent: Saturday, November 01, 2003 11:54 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Use of thermal imaging TCM I read some information from a web site on the Internet posted by a company where they were discussing the use of thermal imaging video and photography as a means of detecting hidden surveillance devices. In short, they recommend the use of thermal photography, in addition to standard RF detection, and other methods. I understand the principal of this, but I was wondering if any of you have insight or opinions on this? Thanks, Bruce Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 7936 From: Date: Mon Nov 3, 2003 3:46pm Subject: Famous Lewinsky Taper Complained Her Privacy Was Violated Linda Tripp Wins $595,000 in Lawsuit Famous Lewinsky Taper Complained Her Privacy Was Violated By SIOBHAN McDONOUGH, AP WASHINGTON (Nov. 3) - Linda Tripp will get more than $595,000 from the Defense Department to settle a lawsuit over the release of confidential personal information about her to a magazine, her lawyers said Monday. Based on information supplied by Pentagon officials in 1998, The New Yorker reported Tripp did not admit an arrest on her security application for her job at the Defense Department. She had been arrested for grand larceny when she was a teenager. Tripp, whose secret tapes of conversations with Monica Lewinsky helped lead to President Clinton's impeachment trial, sued the Defense Department two years ago, alleging violations of the Privacy Act. She had worked for the department as a public affairs specialist. The 1974 Privacy Act prohibits the government from releasing unauthorized personal information about individual Americans to nonfederal organizations. Tripp claimed administration officials retaliated for her role in triggering the impeachment proceedings. Tripp provided Independent Counsel Ken Starr with tape-recorded conversations in which Lewinsky confided an intimate relationship with the president. "This government should never be permitted to use Privacy Act-protected information to discredit a political opponent," Tripp said in a statement. As part of the settlement, Tripp gets a one-time payment of $595,000, a retroactive promotion and retroactive pay at a higher salary level for 1998, 1999 and 2000. The Justice and Defense departments declined to comment, and her lawyers did not disclose the total value of the agreement. Stephen Kohn, one of Tripp's lawyers, declined to say whether Tripp is currently working, but said that under the settlement, she can reapply to any government branch. Tripp lost her job at the Pentagon in January 2001 after she refused to resign like other political appointees on the last day of Clinton's term. She earned nearly $100,000 a year when she was a public affairs specialist for the Defense Department. She held a civil service job in the White House under former President Bush before getting a political appointment and new job at the Pentagon in 1994. U.S. District Judge Emmet Sullivan has yet to approve the agreement. [Non-text portions of this message have been removed] 7937 From: James M. Atkinson Date: Tue Nov 4, 2003 0:53am Subject: RE: Use of thermal imaging TCM You can buy a USED thermal camera for a few grand or less (ie: an older non-digital Magnavox unit ), but the computer controlled units are by far the best to use, but cost twenty to thirty times more. Thermal goggles, monocals, and scopes can also be used but be careful as a lot of the stuff out there is IR, with very little thermal response. On an added note... *** I *** was the first private sector sweep person/company to actually use or do any research on the use of thermal camera's for TSCM. I wrote some of the very first white papers on the subject, and worked with some of the very first prototypes of modern computer based thermal cameras... which where then used to pitch the camera's to the government for TSCM use. It tickles me that several firms a year claim that THEY were the first to invent it's use when my white paper , programming, and field use predates there initial camera purchase by a good ten to twelve years Thermal camera imaging can also be enhanced by warming up an area for a few seconds with a 500 watt quartz light, then wafting a small amount of chilled nitrogen across the area. Any anomaly with show up like no other method. Another method is to steam clean the carpet, and upholstery, and no I am not kidding. A steam cleaner blasts out really hot water, then suctions it back up, but (good for us) heats the rub up rather nicely. This is further enhanced by the small of moisture left in the carpet, etc. The evaporation/drying of the moisture creates a cool spot where hidden wires or microphones are located. This method can also used to hunt down small cracks, voids, or pin-holes in the floor that could be used for eavesdropping. On a related note... how many of you bring a motorized vacuum pump when you do sweeps? and are you aware you can moisten a carpet (steam cleaner), apply a vacuum to the dome, and then watch the digital vacuum gauge to see hidden cracks, pin holes, etc with may be under the carpet. Case in point... this method will turn up 90+% of the covert hardwired microphones being used by the French and Romanian government (shuttle snake method of microphone planting). -jma . At 5:19 PM -0500 11/3/03, Doug Ellsworth wrote: >Bruce and all, > >Thermal is particularly useful for detecting hidden video. All kinds of >electronic stuff emanate heat, but active video cameras usually present a >heat source very near a surface (wall, bookcase, wall hanging, turned-off >electrical items, and the like). This is because the lens of the video >camera has to be able to gather light from within the targeted area. > >We like to use thermal to first scan the room where we are planning to set >up equipment for the initial RF stage, along with a computer-based spectrum >scope (at video transmitter freqs). We do this before we expose anything >that might look TSCM-y. We set a notebook computer on a conference table >and everything else is still on the truck until we can be assured that >there's little likelihood of video surveillance. My usual "disguise" is as >an interior designer, complete with carpet samples and other props, (but >sans the limp-wrist and wiggle-walk). A "camera-looking-thingy" would not >be unusual for a designer to wield around a conference room, in case we are >being "watched". We do all this to give us the added assurance that we >don't alert bad guys that a TSCM effort is about to commence. > >It's no longer enough to just refrain from creating audio that might alert >eavesdroppers. > >Thermal imagers of sufficient resolution to be worth anything to TSCM will >be one of your most expensive pieces of equipment, if not theeeeeee most >expensive. For no more often than it might be used, you might enquire of >some electrical contractors in your area; the larger contractors may have a >FLIR and may be willing to contract for its use and its operator. > >-Doug > >Doug Ellsworth >SecurityPosture.com >www.securityposture.com > -----Original Message----- > From: Bruce [mailto:bgabbard@s...] > Sent: Saturday, November 01, 2003 11:54 AM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Use of thermal imaging TCM > > > I read some information from a web site on the Internet posted by a > company where they were discussing the use of thermal imaging video > and photography as a means of detecting hidden surveillance devices. > In short, they recommend the use of thermal photography, in addition > to standard RF detection, and other methods. I understand the > principal of this, but I was wondering if any of you have insight or > opinions on this? > > Thanks, Bruce > > > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7938 From: larry d chapman Date: Tue Nov 4, 2003 7:38am Subject: RE: Use of thermal imaging TCM Doug, Bruce and All, Thermal imagers are a great tool, well worth the cost. We used them to great effect at my old government agency. Becasue detect any heat source, thermal imagers can be useful in detecting IEDs. An added benefit. LDC -- --------- Original Message --------- DATE: Mon, 3 Nov 2003 17:19:26 From: "Doug Ellsworth" To: Cc: Bruce and all, Thermal is particularly useful for detecting hidden video. All kinds of electronic stuff emanate heat, but active video cameras usually present a heat source very near a surface (wall, bookcase, wall hanging, turned-off electrical items, and the like). This is because the lens of the video camera has to be able to gather light from within the targeted area. We like to use thermal to first scan the room where we are planning to set up equipment for the initial RF stage, along with a computer-based spectrum scope (at video transmitter freqs). We do this before we expose anything that might look TSCM-y. We set a notebook computer on a conference table and everything else is still on the truck until we can be assured that there's little likelihood of video surveillance. My usual "disguise" is as an interior designer, complete with carpet samples and other props, (but sans the limp-wrist and wiggle-walk). A "camera-looking-thingy" would not be unusual for a designer to wield around a conference room, in case we are being "watched". We do all this to give us the added assurance that we don't alert bad guys that a TSCM effort is about to commence. It's no longer enough to just refrain from creating audio that might alert eavesdroppers. Thermal imagers of sufficient resolution to be worth anything to TSCM will be one of your most expensive pieces of equipment, if not theeeeeee most expensive. For no more often than it might be used, you might enquire of some electrical contractors in your area; the larger contractors may have a FLIR and may be willing to contract for its use and its operator. -Doug Doug Ellsworth SecurityPosture.com www.securityposture.com -----Original Message----- From: Bruce [mailto:bgabbard@s...] Sent: Saturday, November 01, 2003 11:54 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Use of thermal imaging TCM I read some information from a web site on the Internet posted by a company where they were discussing the use of thermal imaging video and photography as a means of detecting hidden surveillance devices. In short, they recommend the use of thermal photography, in addition to standard RF detection, and other methods. I understand the principal of this, but I was wondering if any of you have insight or opinions on this? Thanks, Bruce Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. ____________________________________________________________ FREE ADHD DVD or CD-Rom (your choice) - click here! http://ad.doubleclick.net/clk;6413623;3807821;f?http://mocda2.com/1/c/563632/131726/311392/311392 AOL users go here: http://ad.doubleclick.net/clk;6413623;3807821;f?http://mocda2.com/1/c/563632/131726/311392/311392 This offer applies to U.S. Residents Only [Non-text portions of this message have been removed] 7939 From: Juke Katan Date: Tue Nov 4, 2003 10:49am Subject: Amorous ram jams spy signals Amorous ram jams spy signals Tuesday, November 4, 2003 Posted: 1258 GMT ');} else if ( host.indexOf("asia.cnn.com") != -1 ) {document.write('Tuesday, November 4, 2003 Posted: 8:58 PM HKT (1258 GMT) ');} else if ( host.indexOf("edition.") != -1 ) {document.write('Tuesday, November 4, 2003 Posted: 1258 GMT ( 8:58 PM HKT) ');}else {document.write('Tuesday, November 4, 2003 Posted: 7:58 AM EST (1258 GMT) ');}//-->Tuesday, November 4, 2003 Posted: 1258 GMT ( 8:58 PM HKT) LONDON, England (AP) -- A mysterious transmission that baffled British intelligence analysts for days was caused by a ram rubbing up against an aerial mast, a government agency said Tuesday. Scientists at Government Communications Headquarters in Cheltenham, western England, an intelligence-gathering station, were baffled by strange high-frequency noises coming from Scarborough signal station in Yorkshire, northeastern England. GCHQ's in-house paper, the Daily Observer, said the noises were unlike anything staff had encountered before and an investigating team initially thought they were coming from spies or aliens. Their investigation found the signal only happened in the day time, went across all the high-frequency bands and only Scarborough aerials could pick it up. Eventually, investigators discovered that a ram was rubbing its horns against the aerial masts "in between servicing some local ewes," the paper said. "It's possible the ram was attracted to the mast which may have given off some kind of tingling sensation, but it was probably just a post to rub against," said GCHQ spokesman Bob McNally. http://edition.cnn.com/2003/WORLD/europe/11/04/offbeat.ram.ap/index.html --------------------------------- Do you Yahoo!? Protect your identity with Yahoo! Mail AddressGuard [Non-text portions of this message have been removed] 7940 From: James M. Atkinson Date: Wed Nov 5, 2003 8:48am Subject: Baby monitor traps would-be robber Baby monitor traps would-be robber BERLIN, Germany (Reuters) --A woman in Germany was surprised when the intercom system she was using to monitor her sleeping baby picked up a radio conversation in which a luckless would-be thief described his bungled robbery of a nearby bar. "Instead of hearing her baby's wails, the mother got the 46-year-old's confession. She then informed police," authorities in the western city of Bochum said in a statement. The man had been talking about the attempted robbery to friends over a CB radio set, when the transmission was intercepted up by the baby's intercom system. Police arrested the man, who confessed to the abortive raid. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7941 From: xxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxx Date: Wed Nov 5, 2003 5:01pm Subject: has anybody attended the world institue in miami florida or the jarvis institute for tcsm courses and training. we are thinking of that but every time we go to register the class gets cancelled. are there any other schools besides south africa for training? __________________________________ Do you Yahoo!? Protect your identity with Yahoo! Mail AddressGuard http://antispam.yahoo.com/whatsnewfree 7942 From: Monty Date: Wed Nov 5, 2003 8:56pm Subject: Re: Use of thermal imaging TCM Bruce If a thrmal camera is not in your kit, then you are missing an important tool. Every device including the $20,000 ones put out heat that can be detected. Monty --- Bruce wrote: > I read some information from a web site on the > Internet posted by a > company where they were discussing the use of > thermal imaging video > and photography as a means of detecting hidden > surveillance devices. > In short, they recommend the use of thermal > photography, in addition > to standard RF detection, and other methods. I > understand the > principal of this, but I was wondering if any of you > have insight or > opinions on this? > > Thanks, Bruce > > > > __________________________________ Do you Yahoo!? Protect your identity with Yahoo! Mail AddressGuard http://antispam.yahoo.com/whatsnewfree 7943 From: Richard Esmond Freeman Date: Wed Nov 5, 2003 9:44pm Subject: Low cost - breakthrough OTC-OEM components Sorry to jump in with such a breathless musing, but... I have been following the developments in RF receiver components from companies such as TI, Analog Devices, Microsemi, Dallas Semi... My specific interest has been finding components that would adapt to new types of low cost detection options. By driving cost down all sorts of anti-snoop momentum could be achieved. Also low cost components make highly parallel detection arrays practical, with each element's descrete elements (antenna, lna, filters...) 'pegged' to the band of interest and built from low-cost/high precision/higher noise and distortion passives with valued parts instead of high- cost/variable precision/lower noise and distortion tuned. In short if a 4mhz band of the spectrum was monitored by a specific/dedicated reciever made of a few low-cost/high integration components on board with hard wired passives, then many tradeoffs between sensitivity and range etc. could be avoided. Instead of one highly adaptive system that is constantly tuning numerous near-linear components in a nested-recursion sweep across the entire horizon, many highly focused eye-lets would each watch their own well understood portion of the landscape. By using automated etching processes many of the detectors signal input could be provided directly onboard and further tuned physically to the band of interest as well. Once an interesting signal is detected by these ant-searchers higher order anaylyis could be applied by DSP or human inspection. Over the next few days I would be interested in posting the URL's of some of the OEM components(near modules on a chip) that I have found interesting. One very interesting aspect of these devices is the reduction of 'black art' in interconnection and tuning to achieve quality of performance. Not quite plug-n-play, but far from mind numbing simulation/guess/check the entrails effort either. The part that I found most interesting in the last few weeks is a device seemingly breakthough internally matched pair of signal measurment engines that together produce mangatitude/phase delta's as a linear voltage. http://www.analog.com/library/analogDialogue/archives/35- 05/AD8302/index.html Maybe I am missing something, but wouldn't a part such as this take signals from two antenna's spaced a few feet apart and isolate any singnal within its bandwidth which was closer to one antenna than another in ratio to the overall distance to them both. And further locate the direction or even relative position of the singal source through doppler phase shift combined with the relative signal strength factor... And this chip is not only highly integrated and refined, its commodity volume priced for the cell phone market. Let me know what you think, and I will post a few more front end, IF processing and DSP related components that are similarly interesting. Bye for now, Richard Esmond Ps. forgive my spelling, I don't spell check on the first date 7944 From: mooty_7 Date: Wed Nov 5, 2003 10:49pm Subject: ( RPC ) remote procedure call I know this is off topic...but you guys were the only ones with the correct answer to my problem last time , so here goes. one of the computers in " my " office as soon as it boots, just after pass word is entered 3 to 5 seconds pops up with a warning that says warning save data system is shuting down because " the remote procedure call" has been terminated...and then it begains a 50 second count down...all this before the desk top even has a chance to load.nothing has changed with this box in months.I have tried everything short of blowing away the operating system and starting over...I would be thankful for any help... 7945 From: A Grudko Date: Thu Nov 6, 2003 0:18am Subject: Re: Remote procedure call - Original Message - From: mooty_7 > one of the computers in " my " office as soon as it boots, just after > pass word is entered 3 to 5 seconds pops up with a warning that says > warning save data system is shuting down because " the remote > procedure call" has been terminated...and then it begains a 50 second > count down... The Remote Procedure Call is built into all operating systems so that as you switch on your computer a copy of every file you have created or opened is sent to the Department of Justice for investigation and possible prosecution. If you try to remove this software you will be collected in the middle of the night and sent to GTMO to join the other pinko liberals there who have tried that one. (Joke) Andy Grudko (British), South Africa Umkhonomunye abashokobezi baseMzansi Consulting Investigator - Est. 1981 Registered as a security service provider by the Private Security Industry Regulatory Authority, Reg. No. 8642 www.grudko.com , andy@g... . (+27 12) 244 0255 - 244 0256 (Fax) - 082 778 6355 (Cell) SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 7946 From: A Grudko Date: Thu Nov 6, 2003 0:39am Subject: Re: Low cost - breakthrough OTC-OEM components - Original Message -- From: Richard Esmond Freeman > My specific interest has been finding components that would adapt to > new types of low cost detection options. Oh-oh! Low cost sweeps....after last month's discussion on who can charge the most! I can see the Bunker Bombs being loaded into a Stealth bomber as we read, and the GPS co-ords for Richard's address being punched into the Main Weapons System. > In short if a 4mhz band of the spectrum was monitored by a > specific/dedicated reciever made of a few low-cost/high integration > components on board... I'd like to place an order for the first set if 1500 units to give me coverage from 0 - 6 GHz. ;-) Andy Grudko (British), South Africa Umkhonomunye abashokobezi baseMzansi Consulting Investigator - Est. 1981 Registered as a security service provider by the Private Security Industry Regulatory Authority, Reg. No. 8642 www.grudko.com , andy@g... . (+27 12) 244 0255 - 244 0256 (Fax) - 082 778 6355 (Cell) SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 7947 From: Mitch D Date: Thu Nov 6, 2003 8:22am Subject: net access to cell w/gps feature Cell phones w/ gps feature allow users to subscribe to a online site and monitor the activity of the target phone. Just add auto answer,and silent ring and you can listen and verify the location of the unit.It's either a interesting idea or another case of "spy shop physics".... from u locates site: The uLocate service provides a secure web site that enables you to: See the location of all family members displayed on a map on a 24x7 basis Review all the locations visited during a specified time frame Reveal your location to individuals who have permission to request it Set up an alert system that will notify you via email or a message on your cell phone when someone leaves or arrives from locations you have defined (e.g. school, home, office) Achieve peace of mind a Nextel Total Connect service plan a Motorola i730, i88 or i58sr mobile phone a uLocate account How it works uLocate's platform takes advantage of cell phones that can establish and transmit latitude and longitude using the government's Global Positioning System (GPS). Currently, we support the Motorola i88s and i58sr on the Nextel network and all models of the Benefon on the T-Mobile, AT&T, and Cingular networks. Additional phones and carriers will be supported as they become GPS compatible. uLocate combines satellite and GSM/GPRS technology with the convenience of the internet to provide global, real-time tracking and telemetry services for both commercial applications and personal use. Our application service works with a number of devices. The specific device depends upon the needs and requirements of the client. We work with the Benefon Track Pro, a "best of breed" mobile phone. Regardless the scope or scale of your needs, our approach offers simplicity and security. Key service features are: Operates from any PC connected to the internet - no special modems or software required User name and password protected Can view positions of vehicles on a map, zoom in and out and immediately locate a vehicle using the poll command Can send messages to and from vehicles Master password can send messages and poll a vehicle, slave password can only view locations on the map Data consists of date, time, and position Multiple users can see the position of a vehicle or individuals Ability to view past message log and historical positions for reporting purposes Various custom reports can be developed to meet unique requirements __________________________________ Do you Yahoo!? Protect your identity with Yahoo! Mail AddressGuard http://antispam.yahoo.com/whatsnewfree 7948 From: Shawn Hughes Date: Thu Nov 6, 2003 3:34pm Subject: rpc failure Sounds like it got one of the recent viruses (virii?). This sound familiar? http://www.faqs.org/rfcs/rfc1831.html sniip"....Attention: Are you looking for info about the cause of "Remote Procedure Call (RPC)", initiated by NT Authority\System error message that shuts down Windows (you might also see svchost.exe error occasionally)? It is a virus that started spreading very quickly on August 11, 2003. It works by exploiting unpatched Windows 2000/XP computers. It's been named Lovesan (LovSan, LuvSan) or Blaster. ...." sniiip HTH, -Shawn **************************************************************************** ****************************** Shawn Hughes Lead Instructor Tactical Response, Inc. WMD / EOD / PSBT Operations Uncertified Public Safety Bomb Technician Hazardous Materials Technician Member, International Association of Bomb Technicians Region VI www.warriormindset.com Ph. - (865)388-0305 email - srh@e... ---------------------------------------------------------------------------- ------------------------------------------------ 7949 From: John Kennedy Date: Thu Nov 6, 2003 4:42pm Subject: Re: ( RPC ) remote procedure call > > I know this is off topic...but you guys were the only ones with the > correct answer to my problem last time , so here goes. > one of the computers in " my " office as soon as it boots, just after > pass word is entered 3 to 5 seconds pops up with a warning that says > warning save data system is shuting down because " the remote > procedure call" has been terminated...and then it begains a 50 second > count down...all this before the desk top even has a chance to > load.nothing has changed with this box in months.I have tried > everything short of blowing away the operating system and starting > over...I would be thankful for any help... Without knowing the details of your computer, what the password prompt after booting is for, or how the system is networked to other computers, I can say this about Remote Procedure Calls in general. This is a standard used to invoke a routine on a computer that may or may not be the invoker. In a standalone computer, one routine, 'A', may call another, 'B', with the concept of: A -> B If B lives on another, networked computer, you may see something like: A -> ..... network ..... -> B with the result of the call being passed back in the opposite direction. RPC's are the heart of the Network File System, or NFS. What all of this means, is that without knowing your computer, it is a safe bet that it is networked to one or more others, and that it is using an NFS-like mechanism to access files on another computer. Something may be wrong with the server it's looking for, or there may be a network problem. It would seem that the file(s) it's looking for are pretty critical to its operation, thus the shutdown. If you computer is networked, focus there. RPCs are sometimes used locally, as well, in order to present a consistent interface to the user. It may also be true that it's just hosed and these errors are unrelated.... -- John Kennedy johnk@s... Second Source, Inc. Annapolis, MD USA 7950 From: cismic Date: Thu Nov 6, 2003 0:20am Subject: RE: ( RPC ) remote procedure call Sounds like your computer has either the SoBig or Nimda variety virus. I would download a fix and during that 60 seconds try and run the fix It is real fast. Once you have your machine back up and running Do a complete virus scan. Joseph -----Original Message----- From: mooty_7 [mailto:mooty_7@y...] Sent: Wednesday, November 05, 2003 8:50 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] ( RPC ) remote procedure call I know this is off topic...but you guys were the only ones with the correct answer to my problem last time , so here goes. one of the computers in " my " office as soon as it boots, just after pass word is entered 3 to 5 seconds pops up with a warning that says warning save data system is shuting down because " the remote procedure call" has been terminated...and then it begains a 50 second count down...all this before the desk top even has a chance to load.nothing has changed with this box in months.I have tried everything short of blowing away the operating system and starting over...I would be thankful for any help... ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7951 From: Juke Katan Date: Thu Nov 6, 2003 1:33am Subject: cableshark tdr Found this interesting cable TDR on the web. Looks very useful for TSCM work. http://www.consultronics.com/cshark.htm --------------------------------- Do you Yahoo!? Protect your identity with Yahoo! Mail AddressGuard [Non-text portions of this message have been removed] 7952 From: Thomas Shaddack Date: Thu Nov 6, 2003 4:59am Subject: Re: ( RPC ) remote procedure call > ...pops up with a warning that says warning save data system is shuting > down because " the remote procedure call" has been terminated...and then > it begains a 50 second count down... This is a telltale sign of an unpatched Windows 2000/XP box with no firewall, port 135 exposed to the world, and infected with a version of Blaster (or LovSan) worm. The critter is, at least according to my IDS, still alive and well; probes to port 135/TCP are reported every couple minutes. You may like to check my worm page and get the fix there, or follow one of the links from there for more information. This worm is a nice example of Microsoft's criminal negligence and total disregard for security; any service exposed to the world is potentially vulnerable, especially if the product's code quality is as abysmal as we're used to with Certain Vendor. A *VERY simple* default configuration tweak would prevent all the RPC and file sharing related problems (and many resulting worms), while keeping it possible to make networking easy - accept connection only from IP ranges 10.0.0.0/24, 192.168.0.0/16, 169.254.0.0/16, and 172.16.0.0/12, which are reserved for LANs. So simple, so effective, so not done. I don't even talk about the sanity of deciding to run scripts, executables, and ActiveX objects in incoming email. PS: An unrelated note: A very good (and free) packet sniffer for Windows is Ethereal. Can be downloaded from . Has advanced packet analysis features. For "sniffing the glue that holds the Internet together". 7953 From: Date: Thu Nov 6, 2003 7:56am Subject: Re: ( RPC ) remote procedure call It sounds like you have been hit with a variant of Blaster. For details see http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MSBLAST.A . Cory Bys http://www.kgb.to/ ******************* N O T I C E ******************* The information contained in this e-mail, and in any accompanying documents, may constitute confidential and/or legally privileged information. The information is intended only for use by the designated recipient. If you are not the intended recipient (or responsible for the delivery of the message to the intended recipient), you are hereby notified that any dissemination, distribution, copying, or other use of, or taking of any action in reliance on this e-mail is strictly prohibited. If you have received this e-mail communication in error, please notify the sender immediately and delete the message from your system. *************************************************** From: A Grudko Date: Wed Oct 31, 2001 6:34am Subject: Cell phones & sweeps - Original Message - From: Matthew Paulsen > Motorola has some very nice directional panels and base stations for nearly > all ranges to extend communications. I've been using them since the early > 90's late 80's with high success. We coined them "bricks" in our little > group of folks around here.. They weigh as much and tend to look like them. > I don't know much about GSM.. Haven't really had the need to deal with it... I guess that was with analogue phones. Thanks for the links - I'm not familiar with the 'bricks'. Andy 4023 From: A Grudko Date: Wed Oct 31, 2001 5:57am Subject: Re: Cell phone range - Original Message - From: J‚nis Balklavs > The maximum theoretical distance from base station to the edge of the cell is 35 kilometres. > The timing advance is adapted for these distances (that is the ability of mobile station (phone) to send bursts in advance so they arrive in the base station in the right timeslot). > These larger cells mentioned are then 70 km in radius. Thanks J‚nis This confirms to the Km. what I was told today by our main network here, Vodacom.(Also thanks to Mike Puchol for his private reply). What they suggested was a dedicated link, which operates without the Timing Advance, but it is costly and static and my client needs some portability. Looks like he's going to have to stick to satellite phones. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigation Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4024 From: Aimee Farr Date: Wed Oct 31, 2001 9:45am Subject: All warfare is based on... Staged media scenes. http://www.defenselink.mil/news/Oct2001/t10242001_t1024dd.html ---- Given the nature of today's propaganda-conflicts, and collaborative new media, some skillsets here should be taking on new dimensions of strategic importance. We are already seeing the advent of independent, ideological "surveillance press" and "surveillactivism." Given the right encouragement, cumulatively, these sites could deliver critical mass, allowing an adversary to shape public opinion overnight. Publishers have the protections of First Amendment, now bolstered by the Supreme Court's recent Bartnicki opinion regarding kited surveillance material. "Transparent warfare" seems right around the corner. [FN1] Imagine what we would have thought of indymedia.org in 1940. ~Aimee 1. Spin on the book Transparent Society. 4025 From: A Grudko Date: Wed Oct 31, 2001 2:59pm Subject: Re: Re: Cell phone range - Original Message - From: A Grudko > I'm off this afternoon with my cable tracer to find out where a suspicious > 'double jumper' leads. I found it on a PABX frame last week. Heck, it's > probably just an answering machine or a cordless 'phone but at whatever an > hour it puts food on the table. ...and when I got there this evening the parallel connection was gone! Coincidence or security leak?.... Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigation Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4026 From: James M. Atkinson Date: Wed Oct 31, 2001 4:15pm Subject: Re: Re: Cell phone range Suspect it is hostile until you can prove otherwise. -jma At 10:59 PM +0200 10/31/01, A Grudko wrote: >- Original Message - >From: A Grudko >> I'm off this afternoon with my cable tracer to find out where a suspicious >> 'double jumper' leads. I found it on a PABX frame last week. Heck, it's >> probably just an answering machine or a cordless 'phone but at whatever an > > hour it puts food on the table. > >...and when I got there this evening the parallel connection was gone! >Coincidence or security leak?.... > >Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , >Est. 1981 >International business intelligence and investigation >Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 >0255 - 244 0256 (Fax) >SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom >When you need it done right - first time -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4027 From: James M. Atkinson Date: Wed Oct 31, 2001 5:35pm Subject: Magic Horns Later this year I will be offering some more sets of my "magic horns" (a few list members now what these are, and have been using them for some time) . These units are strictly for the reception of low power and extremely low signals for TSCM and EMI testing, and can not be used to transmit a signal (technically you could reverse the amplifier). The system will consist of a series of medium gain/standard gain (16-17 dBi) feed horns with a nearly constant antenna factor (almost flat response curve as opposed to the ragged response present in a dual ridged broadband antenna). E-Plane and H-Plane angle will be between 24 and 28 degree. Each horn will contain a small LED based aiming laser mounted to each corner going off on an appropriate tangent (four lasers total). This helps define the coverage area, and helps facilitating documentation and reporting or the sweep (you will see four red dots on the wall or range. Married to each horn via a precision N-Type connector will be an Ultra-Low Noise amplifier, and each amp will have an internal band pass filter tuned for the respective band of interest. The amplifier will actually be mated directly on the horn to maximize signal collection. Power to amplifier is supplied via a dedicated and filtered AC power supply actually built into the case, with external power coming in via a standard 12 foot IEC cord (the system can be supplied with built in batteries on request). The amplifier will of course be in a sealed thermally stable milled aluminum chassis, an will have an ample heat sink (a Peltier cooler and/or fan can be mounted on special request). The entire assembly (horn, amp, and power supply) is built into a nonmetallic Nylon block protective housing with a dual tripod mount (offset by 90 degrees). Other nonmetallic can be used on request. Assembly terminates with a precision (and replaceable) panel mounted N-Type connector, and includes a high performance 12 foot RG-214/U double shielded cable. Each system come in a custom foam fitted Hardigg transit case for field transport, but does not include a tripod or stand. All amplifiers, horns, and cables are strictly new laboratory and avionics grade items, and will be supplied with a calibration certificate, response curves, correction charts, etc.. Total system gains will range between 45-60 dB, with a total noise figure not over 3 dB. The system will not contain any kind of transient limiter of other protective components that reduce the signal (keep this in mind when considering use and make sure your spectrum analyzer can handle at least +10 dBm without attenuation). The horns (16-17 dBi) and amps (30-45 dB) will be supplied in the following breaks. 1.00 - 1.70 GHz [40 dB min. LNA, 0.80 dB nF max, +10 dBm Compression Point] 1.50 - 2.10 GHz [40 dB min. LNA, 0.80 dB nF max, +10 dBm Compression Point] 1.95 - 2.70 GHz [40 dB min. LNA, 0.80 dB nF max, +10 dBm Compression Point] 2.60 - 3.95 GHz [45 dB min. LNA, 2.00 dB nF max, +10 dBm Compression Point] 3.95 - 5.85 GHz [40 dB min. LNA, 2.50 dB nF max, +10 dBm Compression Point] 5.85 - 8.20 GHz [40 dB min. LNA, 1.80 dB nF max, +10 dBm Compression Point] 8.20 - 12.4 GHz [30 dB min. LNA, 2.50 dB nF max, +10 dBm Compression Point] Systems above 12 GHz are also available, but really are not practical. (for signals above 12 GHz the use of a spinning reflector and crossed logs are for more effective). Prices start around six grand per band, so serious buyers only... you can expect to pay about 55k for all seven bands Also, since the amplifier being used is an avionics grade mil-spec item the assembly can not be exported without prior written approval, and we reserve the right to decline any sale. This kind of system may be a little bit bulky, but it outperforms the old broadband dual ridged horn and HP 8449 by about 35-40 dB. -jma -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4028 From: Date: Thu Nov 1, 2001 3:12am Subject: Re: Something interesting Steve & the group -- I have one of the above books mentioned on the site, "A Guide to Checking Telephone Lines", by Theodore N. Swift. This book is also available through Paladin Press, (www.paladin-press.com). As stated in the book, "This text has as its main focus the detection of wiretapping attacks in private residences". It has some good basic electronic theory for central office telephone lines, resistance & capacitance measurements, and a section on the famous "Line Balance Test". If you want to know more about residential telephones, this is an excellent book. It does not have any information on business telephones. The author of the book, Ted Swift, owned a company called ACM, which manufactured equipment for detecting line taps and audio on various other wire pairs such as AC power, thermostat, alarm wiring, etc. I would recommend this book as a good reference for central office telephone line attacks & detection. (Yes, there are a few pages on Time Domain Reflectometers, TDR). Jack 4029 From: Date: Thu Nov 1, 2001 7:16am Subject: Re: Re: Something interesting I meant this as a joke about the book....it is a mighty poor substitute for 14 weeks of Rolm CBX training! SteveP ----- Original Message ----- From: tek492p@y... To: TSCM-L@yahoogroups.com Sent: Thursday, November 01, 2001 4:12 AM Subject: [TSCM-L] Re: Something interesting Steve & the group -- I have one of the above books mentioned on the site, "A Guide to Checking Telephone Lines", by Theodore N. Swift. This book is also available through Paladin Press, (www.paladin-press.com). As stated in the book, "This text has as its main focus the detection of wiretapping attacks in private residences". It has some good basic electronic theory for central office telephone lines, resistance & capacitance measurements, and a section on the famous "Line Balance Test". If you want to know more about residential telephones, this is an excellent book. It does not have any information on business telephones. The author of the book, Ted Swift, owned a company called ACM, which manufactured equipment for detecting line taps and audio on various other wire pairs such as AC power, thermostat, alarm wiring, etc. I would recommend this book as a good reference for central office telephone line attacks & detection. (Yes, there are a few pages on Time Domain Reflectometers, TDR). Jack Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L "War is an ugly thing, but not the ugliest of things: the decayed and degraded state of moral and patriotic feelings which thinks that nothing is worth war is much worse. A man who has nothing for which he is willing to fight; nothing he cares about more than his own personal safety; is a miserable creature who has no chance of being free, unless made and kept so by the exertions and blood of better men than himself." - John Stuart Mill =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4030 From: Charles P Date: Thu Nov 1, 2001 9:32am Subject: Re: Re: Something interesting Ralph Thomas... has no clue. He produces great examples of what is bad out there. Good for a laugh and a cry. Ted Swift, on the other hand, is a member of this list (I think) and a good tscm-er as far as I know. Saw him just a couple of weeks ago. > > I have one of the above books mentioned on the site, "A Guide to > Checking Telephone Lines", by Theodore N. Swift. This book is also > available through Paladin Press, (www.paladin-press.com). > > As stated in the book, "This text has as its main focus the detection > of wiretapping attacks in private residences". > > It has some good basic electronic theory for central office telephone > lines, resistance & capacitance measurements, and a section on the > famous "Line Balance Test". > > If you want to know more about residential telephones, this is an > excellent book. It does not have any information on business > telephones. > > The author of the book, Ted Swift, owned a company called ACM, which > manufactured equipment for detecting line taps and audio on various > other wire pairs such as AC power, thermostat, alarm wiring, etc. > > I would recommend this book as a good reference for central office > telephone line attacks & detection. (Yes, there are a few pages on > Time Domain Reflectometers, TDR). > > Jack > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > "War is an ugly thing, but not the ugliest of things: the decayed and degraded state of moral and patriotic feelings which thinks that nothing is worth war is much worse. A man who has nothing for which he is willing to fight; nothing he cares about more than his own personal safety; is a miserable creature who has no chance of being free, unless made and kept so by the exertions and blood of better men than himself." - John Stuart Mill > > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4031 From: Aimee Farr Date: Thu Nov 1, 2001 10:57am Subject: RE: For What? > Now that we have all been convinced to surrender a chunk of our privacy > rights in the name of anti-terrorism, here are the disposable cell phones > that make all of this rights crushing meaningless. For $30.00 a terrorist > can change cell phones twice a day and never be heard, He just > has to drop > down to his local 7-11 and in 2 minutes pick up a fresh phone number. Now > we damn near have warrantless invasion of all our communications and our > homes for what? > Roger ''The history of American liberty has been a continuing struggle between the desire for security and the human striving for personal freedom. Too often it appears that the choice is easy -- for example, that the issue of law and order is one of balancing the rights of society against the rights of criminals. But the choice is never as easy as that deceptive formulation suggests. The great challenge of our constitutional system is the continuing reconciliation of these two strong competing interests. Without law there can be no true liberty, but a constant and exclusive preoccupation with security is the death of human liberty. This was recognized by American patriots as long ago as 1775: "Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety." The citizen who truly honors liberty knows that there are no easy choices. The public leader who is true to his obligation to inform and educate the citizenry recognizes that he must shun emotional appeals. It is a great disservice to the public to succumb to the temptation to make issues of crime and liberty a political football. Unfortunately, politicians forever fall victim to the temptation, especially in recent years.'' - Forward by Senator Sam J. Ervin, Jr. Chairman, Subcommittee on Constitutional Rights Senate Committee on the Judiciary _Eavesdropping on Trial_ (1974) By Edith J. Lapidus 4032 From: A Grudko Date: Thu Nov 1, 2001 6:41am Subject: NTIA Report 01-382 Vulnerability Telecommunications ----- Original Message ----- Subject: [TSCM-L] NTIA Report 01-382 Vulnerability of Wireline and Cellular Telecommunications Networks to High Power Radio Frequency Fields > NTIA Report 01-382 Vulnerability of Wireline and Cellular > Telecommunications Networks to High Power Radio Frequency Fields Could the poster tell me where I can find this report Thanks Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigation Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4033 From: Aimee Farr Date: Thu Nov 1, 2001 5:14pm Subject: DeCSS = pure speech. http://www.courtinfo.ca.gov/opinions/documents/H021153.PDF THE COURT: DeCSS does not fall into any of these established exceptions: it is not lewd, profane, obscene, or libelous, nor did it involve any fighting words. DVDCCA does not ask this court to create a new judicial exception for software containing a misappropriated trade secret, and we decline to do so here. Although the social value of DeCSS may be questionable, it is nonetheless pure speech. DVDCCA maintains, however, that courts ìroutinely enjoin trade secret misappropriation,î even over a First Amendment defense. The cases on which it relies, however, are not comparable to the situation presented here, as they involved the actual use of a secret or the breach of a contractual obligation. ... We express no opinion as to whether permanent injunctive relief may be obtained after a full trial on the complaint, as that issue is not before us. [...] ~Aimee 4034 From: James M. Atkinson Date: Thu Nov 1, 2001 6:13pm Subject: Updated Advanced Chemical Weapons Syllabus Here is the student handout for my course entitled "Advanced Chemical Weapons". I re-coded it into HTML format to supplement the PDF version previously posted to my website. Several people liked the PDF version, but suggested a html version as well. It's almost 500k has good number of pictures and images, so be patient while downloading. The HTML version can be found at: http://www.tscm.com/mace.html The PDF version can be found at: http://www.tscm.com/advchemw2.pdf Please feel free to share the link to to those you think would benefit. If you think this is interesting.... you should see some of my TSCM related materials. -jma -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4035 From: James M. Atkinson Date: Thu Nov 1, 2001 7:23pm Subject: Heads Up - Fluke 89-IV Bargain List members should find this interesting.... Radio Shack is clearing out Fluke 89-IV Digital Multimeter (part number #910-5242) for one hell of a discount. Normally they are $399.99, but they are currently on sale for only $249.99 (save $150.00). You might want to buy 2-3 extra units. These units are really great for TSCM work. -jma -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4036 From: Matthew Paulsen Date: Thu Nov 1, 2001 8:28pm Subject: RE: Heads Up - Fluke 89-IV Bargain Thanks for the tip. Just a side note - The Radio Shack website says that you can't buy these in the stores. You can order from 1-800-the-shack or via website: http://www.radioshack.com/product.asp?catalog%5Fname=FLUKE&category%5Fname=F LUKE%5F001%5F003%5F000%5F000&product%5Fid=910%2D5758 PS - the 187 and 189 replaced the 87-iv line. Average street price is around $340 usd and $370usd for the newer models. The 189 has logging & pc attachment capability. -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Thursday, November 01, 2001 5:23 PM To: TSCM-L Mailing List Subject: [TSCM-L] Heads Up - Fluke 89-IV Bargain List members should find this interesting.... Radio Shack is clearing out Fluke 89-IV Digital Multimeter (part number #910-5242) for one hell of a discount. Normally they are $399.99, but they are currently on sale for only $249.99 (save $150.00). You might want to buy 2-3 extra units. These units are really great for TSCM work. -jma -- ---------------------------------------------------------------------------- -------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- -------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------------- -------------- "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ---------------------------------------------------------------------------- -------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L "War is an ugly thing, but not the ugliest of things: the decayed and degraded state of moral and patriotic feelings which thinks that nothing is worth war is much worse. A man who has nothing for which he is willing to fight; nothing he cares about more than his own personal safety; is a miserable creature who has no chance of being free, unless made and kept so by the exertions and blood of better men than himself." - John Stuart Mill =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4037 From: James M. Atkinson Date: Thu Nov 1, 2001 8:59pm Subject: RE: Heads Up - Fluke 89-IV Bargain You can order it on their website, or special order it via the retail stores. However, they are not actually stocked in the stores (they ship it to you). -jma At 6:28 PM -0800 11/1/01, Matthew Paulsen wrote: >Thanks for the tip. > > >Just a side note - The Radio Shack website says that you can't buy these in >the stores. You can order from 1-800-the-shack or via website: > >http://www.radioshack.com/product.asp?catalog%5Fname=FLUKE&category%5Fname=F >LUKE%5F001%5F003%5F000%5F000&product%5Fid=910%2D5758 > > >PS - the 187 and 189 replaced the 87-iv line. Average street price is >around $340 usd and $370usd for the newer models. The 189 has logging & pc >attachment capability. > > > >-----Original Message----- >From: James M. Atkinson [mailto:jmatk@tscm.com] >Sent: Thursday, November 01, 2001 5:23 PM >To: TSCM-L Mailing List >Subject: [TSCM-L] Heads Up - Fluke 89-IV Bargain > > >List members should find this interesting.... > >Radio Shack is clearing out Fluke 89-IV Digital Multimeter (part >number #910-5242) for one hell of a discount. > >Normally they are $399.99, but they are currently on sale for only >$249.99 (save $150.00). > >You might want to buy 2-3 extra units. > >These units are really great for TSCM work. > >-jma -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4038 From: Marcel Date: Thu Nov 1, 2001 10:51pm Subject: Re: Heads Up - Fluke 89-IV Bargain They are discounting this unit because is has been discontinued. Look for deeper price cuts in Dec. "James M. Atkinson" wrote: > List members should find this interesting.... > > Radio Shack is clearing out Fluke 89-IV Digital Multimeter (part > number #910-5242) for one hell of a discount. > > Normally they are $399.99, but they are currently on sale for only > $249.99 (save $150.00). > > You might want to buy 2-3 extra units. > > These units are really great for TSCM work. > > -jma > -- > > ------------------------------------------------------------------------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ------------------------------------------------------------------------------------------ > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ------------------------------------------------------------------------------------------ > "Success without honor is an unseasoned dish; > it will satisfy your hunger, but it won't taste good." > ------------------------------------------------------------------------------------------ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > "War is an ugly thing, but not the ugliest of things: the decayed and degraded state of moral and patriotic feelings which thinks that nothing is worth war is much worse. A man who has nothing for which he is willing to fight; nothing he cares about more than his own personal safety; is a miserable creature who has no chance of being free, unless made and kept so by the exertions and blood of better men than himself." - John Stuart Mill > > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 4039 From: Marcel Date: Thu Nov 1, 2001 11:27pm Subject: Re: Heads Up - Fluke 89-IV Bargain Worth a read......... http://www.tmworld.com/articles/TME/08_1999_RMS.htm "James M. Atkinson" wrote: > List members should find this interesting.... > > Radio Shack is clearing out Fluke 89-IV Digital Multimeter (part > number #910-5242) for one hell of a discount. > > Normally they are $399.99, but they are currently on sale for only > $249.99 (save $150.00). > > You might want to buy 2-3 extra units. > > These units are really great for TSCM work. > > -jma > -- > > ------------------------------------------------------------------------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ------------------------------------------------------------------------------------------ > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ------------------------------------------------------------------------------------------ > "Success without honor is an unseasoned dish; > it will satisfy your hunger, but it won't taste good." > ------------------------------------------------------------------------------------------ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > "War is an ugly thing, but not the ugliest of things: the decayed and degraded state of moral and patriotic feelings which thinks that nothing is worth war is much worse. A man who has nothing for which he is willing to fight; nothing he cares about more than his own personal safety; is a miserable creature who has no chance of being free, unless made and kept so by the exertions and blood of better men than himself." - John Stuart Mill > > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 4040 From: Date: Thu Nov 1, 2001 11:18pm Subject: Re: Heads Up - Fluke 89-IV Bargain ATTENTION! There are TWO versions (models) of this meter! Up until 1999, the maximum measurement of resistance was 30 meg-ohms. In 2000, the 89-IV came-out with a maximum measurement of resistance of 500 meg-ohms. Check to see which version Radio Shack is selling as the "bargain". To contact Fluke Corporation: The toll free number (U.S.A.) is 800-443-5853 Europe/M-East/Africa, (31 40) 2 678 200 Canada, 800-363-5853 Other countries, (425) 356-5500 Web site, www.fluke.com Jack 4041 From: Aimee Farr Date: Fri Nov 2, 2001 6:12pm Subject: US DC Cir: Weingarten Right & non-union. [Concerning the "Weingarten rule" and workplace investigatory interviews. See your counsel in regard to these issues. ~Aimee] From the opinion @: http://laws.lp.findlaw.com/dc/001332a.html --- In the years since the Court's decision in Weingarten, the Board has changed its position several times in considering whether employees in nonunion workplaces may invoke the Weingarten right. In 1982, in Materials Research, 262 N.L.R.B. 1010, the Board relied on ß 7 of the NLRA and explicitly extended the Weingarten rule to a nonunion work- place. The Board held that "the rationale enunciated in Weingarten compels the conclusion that unrepresented em- ployees are entitled to the presence of a coworker at an investigatory interview." Id. at 1014. Three years later, in Sears, Roebuck, 274 N.L.R.B. at 230 n.5, 232, the NLRB reversed course completely, holding that the Act "compels" the conclusion that Weingarten "applies only to unionized employees." In 1988, in E.I. DuPont, 289 N.L.R.B. at 628, the Board once again modified its position, holding that the decision in Materials Research extending Weingarten to nonunion workers "represented a permissible construction of the Act, but not the only permissible construc- tion." However, the Board decision in DuPont declined to adopt the broad but permissible interpretation, instead hold- ing that Weingarten does not extend to "an employee in a nonunionized workplace." Id. at 628. Finally, in the case at hand, the NLRB "overrule[d]" DuPont, because it is "incon- sistent with the rationale articulated in the Supreme Court's Weingarten decision, and with the purposes of the Act." Board Decision, at 2. "On appeal, the Foundation argues that the Board's decision regarding Weingarten rests on an impermissible interpreta- tion of the Act. The Foundation's claim is based on three arguments. First, the presence of a coworker in an investi- gatory interview is neither "concerted" nor "for mutual aid and protection" and, therefore, it is not within the ambit of ß 7. Second, the application of Weingarten in the nonunion workplace is at odds with ß 9(a) of the Act, which provides that "[r]epresentatives designated or selected for the pur- poses of collective bargaining by a majority of the employees in [an appropriate bargaining unit] shall be the exclusive representatives of all the employees in such unit." 29 U.S.C. ß 159(a). Third, the Weingarten rule violates the First Amendment rights of nonunion employers to speak individu- ally with their employees. The Foundation advances two additional claims: first, that the interviews at issue in this case were not "investigatory interviews" as defined by Wein- garten; and, second, that the Board's departure from prece- dent has not been adequately explained. All of these chal- lenges fail." [...] 4042 From: kirk Date: Fri Nov 2, 2001 1:36pm Subject: http://www.bvsystems.com/Products/WLAN/WLAN.htm Thought some of you might be interested in equipment for sniffing out spread spectrum DHSS, FHSS, Bluetooth, IEEE 802.11 transmitters etc. Check out this website. http://www.bvsystems.com/Products/WLAN/WLAN.htm Cheers: Kirk Adirim, Tactronix email- kirk@t... -- Kirk Adirim President TACTRONIX LLC Tactical Electronics for Critical Missions 8497 Sunset Boulevard #28 West Hollywood, CA 90069 USA E: kirk@t... T: 310-388-5886 F: 310-388-5886 W: www.tactronix.com -- 4043 From: Aleksander Lavrih Date: Sun Nov 4, 2001 8:13am Subject: optical Hello! http://www.phone-or.com/html/products/som.htm Which is the best equipment to detect such as microphone? Does anyone have experience? Regards, Aleksander Lavrih 4044 From: James M. Atkinson Date: Mon Nov 5, 2001 7:07am Subject: CIA recruited cat to bug Russians http://news.telegraph.co.uk/news/main.jhtml?xml=/news/2001/11/04/wcia04.xml&sSheet=/news/2001/11/04/ixhome.html CIA recruited cat to bug Russians By Charlotte Edwardes (Filed: 04/11/2001) THE CIA tried to uncover the Kremlin's deepest secrets during the 1960s by turning cats into walking bugging devices, recently declassified documents show. In one experiment during the Cold War a cat, dubbed Acoustic Kitty, was wired up for use as an eavesdropping platform. It was hoped that the animal - which was surgically altered to accommodate transmitting and control devices - could listen to secret conversations from window sills, park benches or dustbins. Victor Marchetti, a former CIA officer, told The Telegraph that Project Acoustic Kitty was a gruesome creation. He said: "They slit the cat open, put batteries in him, wired him up. The tail was used as an antenna. They made a monstrosity. They tested him and tested him. They found he would walk off the job when he got hungry, so they put another wire in to override that." Mr Marchetti said that the first live trial was an expensive disaster. The technology is thought to have cost more than £10 million. He said: "They took it out to a park and put him out of the van, and a taxi comes and runs him over. There they were, sitting in the van with all those dials, and the cat was dead." The document, which was one of 40 to be declassified from the CIA's closely guarded Science and Technology Directorate - where spying techniques are refined - is still partly censored. This implies that the CIA was embarrassed about disclosing all the details of Acoustic Kitty, which took five years to design. Dr Richelson, who is the a senior fellow at the National Security Archive in Washington, said of the document: "I'm not sure for how long after the operation the cat would have survived even if it hadn't been run over." The memo ends by congratulating the team who worked on the Acoustic Kitty project for its hard work. It says: "The work done on this problem over the years reflects great credit on the personnel who guided it . . . whose energy and imagination could be models for scientific pioneers." By coincidence, in 1966, a British film called Spy With a Cold Nose featured a dog wired up to eavesdrop on the Russians. It was the same year as the Acoustic Kitty was tested. -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4045 From: James M. Atkinson Date: Mon Nov 5, 2001 7:06am Subject: MI5's secret plan to recruit gerbils as spycatchers [No doubt this will be the next thing the fools at the airport try to use for airport security. -jma] http://news.telegraph.co.uk/news/main.jhtml;$sessionid$AINPDDIAADWPDQFIQMFCFFOAVCBQYIV0?xml=/news/2001/06/30/ngerb30.xml MI5's secret plan to recruit gerbils as spycatchers By Michael Smith, Defence Correspondent (Filed: 30/06/2001) MI5 considered using a team of highly-trained gerbils to detect spies and terrorists flying into Britain during the 1970s, Sir Stephen Lander, the service's director-general, revealed yesterday. The plan was based on the ability of gerbils to detect a rise in adrenalin from changes in the scent of human sweat. Sir Stephen said the Israelis had put the idea into practice, placing gerbil cages to the side of security checks for travellers at Tel Aviv airport. A suitably placed fan wafted the scent of the suspect's sweat into the cage. The gerbils were trained by Pavlovian response to press a lever if they detected increased adrenalin, receiving food as a reward. The system was never put into practice by MI5 because the Israelis were forced to abandon it after they found that the gerbil could not tell the difference between terrorists and passengers who were scared of flying. Speaking at a conference at the Public Record Office in Kew, Sir Stephen said MI5 archives contained a complete volume on the idea - which was based on Canadian research for the Royal Canadian Mounted Police - written in the 1970s. Although Dame Stella Rimington made a practice of speaking publicly in an attempt to change MI5, yesterday's Missing Dimension conference was only the second occasion that Sir Stephen has done so. The conference marks a new PRO exhibition on espionage, Shaken Not Stirred, starting today, which includes exhibits on a number of spies including Mata Hari and a spy paid the equivalent of £6.5 million by King George I to spy on the Stuarts. The Missing Dimension refers to the fact that most histories are written before intelligence files have been released and so omit a crucial element of what occurred and why. Sir Stephen admitted that it would be a long time before MI5 would be able to release details of its Cold War activities. -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4046 From: James M. Atkinson Date: Mon Nov 5, 2001 7:36am Subject: CIA's pet project for a purrfect spy fails MONDAY NOVEMBER 05 2001 CIA's pet project for a purrfect spy fails http://www.thetimes.co.uk/article/0,,3-2001383125,00.html FROM ROLAND WATSON IN WASHINGTON THE CIA ignored the actors' watchword never to work with animals when it tried to turn cats into Cold War spies in the 1960s - with pitiful results. In one experiment, a cat was fitted with listening devices and a control system, requiring extensive and repeated surgery. The idea of Project "Acoustic Kitty" was for the hapless animal to sidle up to Soviet bloc spies, perch on nearby park benches or window sills, and allow its CIA masters to listen in. The five-year project involved repeated operations on the cat to refine the technology to ensure that it went where its spymasters required. But while the idea may have looked flawless on paper, if extremely painful for the cat, it proved a hopeless failure in practice. The cat was run over by a taxi as it made its way towards its first assignment and the project was abandoned. The details are contained in recently declassified documents from the CIA's Science and Technology Directorate relating to American operations at the height of the Cold War. They confirm what had sounded like far-fetched claims made by Victor Marchetti, a former CIA agent who is now a vehement critic of the agency. Mr Marchetti said that the treatment of the cat in the name of espionage was merciless. "They slit the cat open, put batteries in him, wired him up. The tail was used as an antenna. They made him a monstrosity." The official conclusions provide more sober reading. A memorandum attached to the released records stated: "The programme would not lend itself in a practical sense to our highly specialised needs. The environmental and security factors in using this technique in a real foreign situation force us to conclude that, for our purposes, it would not be practical." +++++ CIA's cat scan scam ended in catastrophe http://www.smh.com.au/news/0111/05/world/world16.html By Charlotte Edwardes in London The CIA tried to uncover the Kremlin's deepest secrets during the 1960s by turning cats into walking bugging devices, recently declassified documents show. In one experiment during the Cold War a cat, dubbed Acoustic Kitty, was wired up for use as an eavesdropping platform. It was hoped that the animal, surgically altered to accommodate transmitting and control devices, could listen to secret conversations from window sills, park benches or dustbins. Victor Marchetti, a former CIA officer said Project Acoustic Kitty was a gruesome creation. "They slit the cat open, put batteries in him, wired him up. The tail was used as an antenna. They made a monstrosity. They tested him and tested him. They found he would walk off the job when he got hungry, so they put another wire in to override that." Mr Marchetti said that the first live trial was an expensive disaster. The technology is thought to have cost tens of millions of dollars. "They took it out to a park and put him out of the van, and a taxi comes and runs him over. There they were, sitting in the van with all those dials, and the cat was dead." The document that mentions the project, which was one of 40 to be declassified from the CIA's closely guarded Science and Technology Directorate, where spying techniques are refined, is still partly censored. This implies that the CIA was embarrassed about disclosing all the details of Acoustic Kitty, which took five years to design. Dr Richelson, a senior fellow at the National Security Archive in Washington, said of the document: "I'm not sure for how long after the operation the cat would have survived even if it hadn't been run over." The memo ends by congratulating the team who worked on the Acoustic Kitty project for its hard work. It says: "The work done on this problem over the years reflects great credit on the personnel who guided it ... whose energy and imagination could be models for scientific pioneers.'' By coincidence, in 1966, a British film called Spy With a Cold Nose featured a dog wired up to eavesdrop on the Russians. It was the same year as the Acoustic Kitty was tested. The Telegraph, London -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4047 From: James M. Atkinson Date: Mon Nov 5, 2001 7:37am Subject: CIA's bionic 'spy' cat crushed by taxi CIA's bionic 'spy' cat crushed by taxi http://www.unison.ie/irish_independent/stories.php3?ca=30&si=627228&issue_id=6260 THE CIA tried to uncover the Kremlin's deepest secrets during the 1960s by turning cats into walking bugging devices, recently declassified documents show. But in a expensive disaster, the prototype cat, containing technology which it had cost millions of dollars to develop, was run over by a taxi cab. In one experiment during the Cold War a cat, dubbed Acoustic Kitty, was wired up for use as an eavesdropping platform. It was hoped that the animal, surgically altered to accommodate transmitting and control devices, could listen to secret conversations from window sills, park benches or bins. Victor Marchetti, a former CIA officer, said that Project Acoustic Kitty was a gruesome creation. He said: "They slit the cat open, put batteries in him, wired him up. The tail was used as an antenna. They made a monstrosity. They tested him and tested him. They found he would walk off the job when he got hungry, so they put another wire in to override that." Mr Marchetti said that the first live trial was an expensive disaster. The technology is thought to have cost more than IRL12m. He said: "They took it out to a park and put him out of the van, and a taxi comes and runs him over. There they were, sitting in the van with all those dials, and the cat was dead." The document, one of 40 declassified from the CIA's closely guarded Science and Technology Directorate where spying techniques are refined, is still partly censored. This implies that the CIA was embarrassed about disclosing all the details of Acoustic Kitty, which took five years to design. ( Daily Telegraph, London) Charlotte Edwardes in London -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4048 From: James M. Atkinson Date: Mon Nov 5, 2001 8:54am Subject: 7 Security Workers Fired at O'Hare - knives and a stun gun not detected 7 Security Workers Fired at O'Hare Arizona Republic November 05, 2001 CHICAGO (AP) - Seven private security workers at O'Hare International Airport were fired for allegedly allowing a man to pass through a security checkpoint with several knives and a stun gun in his carry-on luggage. Subash Gurung, 27, of Chicago, was charged with unlawful use of a weapon and attempting to board an aircraft with weapons after he was arrested trying to board a United Airlines flight to Omaha, Neb., on Saturday night, said police spokesman Thomas Donegan. Both charges are misdemeanors. The seven security workers, including one supervisor, were fired Sunday for failing to detain Gurung after two folding knives were discovered in his pocket when he passed through a metal detector. Five other knives, a stun gun and a can of mace were not noticed by the workers when Gurung's bag went through an X-ray machine, according to Chicago Department of Aviation spokeswoman Monique Bond. Gurung had made it past the security checkpoint at O'Hare, but airline employees in the gate area searched his carry-on bag and found the knives and the Taser gun, Donegan said. ``Something obviously went seriously wrong here, and we're trying to find out if it's the employees' fault,'' Bond said. ``If weapons were confiscated, he should never have been let through security.'' Gurung was released early Sunday. Chicago police and FBI officials decided he couldn't be charged with a federal crime because he didn't board an airplane, said police spokesman David Bayless. United spokesman Joe Hopkins said Gurung was searched at the terminal gate as part of the airline's regular security procedures. The fired workers worked for Atlanta-based Argenbright Security Inc., which operates the screening operations at United's terminal. The Federal Aviation Administration is investigating the incident. Last month, the FAA and the Transportation Department announced an audit of the screeners employed by Argenbright, which operates at 14 airports. Officials alleged Argenbright has failed to adequately check employees' backgrounds. Gurung is to appear in court Dec. 19. -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ [Non-text portions of this message have been removed] 4049 From: Aimee Farr Date: Mon Nov 5, 2001 9:10am Subject: H.R. 2970 Tax deduction for security devices 107th CONGRESS 1st Session H. R. 2970 To amend the Internal Revenue Code of 1986 to allow businesses to expense qualified security devices. IN THE HOUSE OF REPRESENTATIVES September 25, 2001 Mr. WELLER (for himself and Mr. CROWLEY) introduced the following bill; which was referred to the Committee on Ways and Means ---------------------------------------------------------------------------- ---- A BILL To amend the Internal Revenue Code of 1986 to allow businesses to expense qualified security devices. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the `Securing America Investment Act of 2001 '. SEC. 2. BUSINESS DEDUCTION FOR PURCHASE AND INSTALLATION OF SECURITY DEVICES. (a) IN GENERAL- Part VI of subchapter B of chapter 1 of the Internal Revenue Code of 1986 (relating to itemized deductions for individuals and corporations) is amended by inserting after section 179A the following new section: `SEC. 179B. SECURITY DEVICE PURCHASES. `(a) ALLOWANCE OF DEDUCTION- A taxpayer may elect to treat the cost of any qualifying security device as an expense which is not chargeable to capital account. Any cost so treated shall be allowed as a deduction for the taxable year in which such device is placed in service. `(b) DEFINITIONS- For purposes of this section-- `(1) QUALIFYING SECURITY DEVICE- The term `qualifying security device' means a security device (to which section 168 applies) which is acquired by purchase (as defined in section 179(d)(2)) and which is installed or placed in service in a building which is owned or occupied by the taxpayer and which is located in the United States. `(2) SECURITY DEVICE- The term `security device' means any of the following: `(A) An electronic access control device or system. `(B) Biometric identification or verification device or system. `(C) Closed-circuit television or other surveillance and security cameras and equipment. `(D) Locks for doors and windows, including tumbler, key, and numerical or other coded devices. `(E) Computers and software used to combat cyberterrorism. `(F) Electronic alarm systems to provide detection notification and off-premises transmission of an unauthorized entry, attack, or fire. `(G) Components, wiring, system displays, terminals, auxiliary power supplies, and other equipment necessary or incidental to the operation of any item described in subparagraph (A), (B), (C), (D) (E), or (F). `(3) BUILDING- The term `building' includes any structure or part of a structure used for commercial, retail, or business purposes. `(c) SPECIAL RULES- `(1) BASIS REDUCTION- For purposes of this subtitle, if a deduction is allowed under this section with respect to the purchase of a qualifying security device, the basis of such device shall be reduced by the amount of the deduction so allowed. `(2) CERTAIN RULES TO APPLY- Rules similar to the rules of paragraphs (3) and (4) of section 179(b), section 179(c), and paragraphs (3), (4), (8), and (10) of section 179(d), shall apply for purposes of this section.'. (b) CONFORMING AND CLERICAL AMENDMENTS- (1) Section 263(a)(1) is amended by striking `or' at the end of subparagraph (G), by striking the period at the end of subparagraph (H) and inserting `, or', and by inserting after subparagraph (H) the following new subparagraph: `(I) expenditures for which a deduction is allowed under section 179B.'. (2) Section 312(k)(3)(B) is amended by striking `or 179A' each place it appears in the heading and text and inserting `, 179A, or 179B'. (3) Section 1016(a) is amended by striking `and' at the end of paragraph (27), by striking the period at the end of paragraph (28) and inserting `, and', and by inserting after paragraph (28) the following new paragraph: `(29) to the extent provided in section 179B(d)(1),'. (4) Section 1245(a) is amended by inserting `179B,' after `179A,' both places it appears in paragraphs (2)(C) and (3)(C). (5) The table of sections for part VI of subchapter B of chapter 1 of such Code is amended by inserting after the item relating to section 179A the following new item: `Sec. 179B. Security device purchases.'. (c) EFFECTIVE DATE- The amendments made by this Act shall apply to taxable years ending after September 10, 2001 . Aimee E. Farr mailto:aimfarr@p... Attorney & Counselor At Law 5400 Bosque, Suite 675 Waco, Texas 76710-4418 254.751.0030 office 877.832.8711 direct/fax/voicemail --- Do not send me unsolicited confidential information. All prospective Attorney-client relationships are reviewed and indicated by a formal letter of engagement. 4050 From: Aimee Farr Date: Mon Nov 5, 2001 10:27am Subject: Digital blockades. ["Transparent warfare seems right around the corner," I said. I'm behind. ~Aimee] http://australianit.news.com.au/articles/0,7204,3156258^15306^^nbv^,00.html AUSTRALIA: ...The email crackdown is revealed in a restricted signal from the task group commander to ships taking part in the blockade, which directs ships' commanders to block all email from the time a suspected illegal vessel is intercepted until advised to lift the ban. When the email system is reactivated, network administrators are ordered to conduct random searches of outgoing email, "looking for operational/sensitive information". During the email ban, sailors are also banned from sending digital photographs by email. The signal, marked "restricted, priority", is dated October 28 and formalises a policy in place for six weeks. It says ships' companies are to be reminded they should not send operational information in personal emails. "Email remains a privilege and while censorship of personal email is unsavoury, I consider it necessary to ensure the integrity of current operations and essential to mission accomplishment," the signal says. Defence Minister Peter Reith three weeks ago released two photographs of sailors helping asylum-seekers, including children, swimming in the sea, but has refused to release a film or video he says shows the children were pushed into the sea. [...] 4051 From: DrPepper Date: Mon Nov 5, 2001 11:05am Subject: Deatyh threats by e-mail OK, folks, , , , , , , What to do about threatening emails?? I have received several death threats from some jerk near Boston. He won't stop the threatening emails. I don't know him, never heard of him and I don't have any idea of why he is doing this His isp is Juno, and I've contacted them and they seem to be dragging their feet. Local copshop would not be interested in helping, I'm sure, since I live in California. The frustrating part of this, is that I don't have a clew as to why he is hassling me, and he won't answer, other than to send more death threats. He has called me "dr.pepper", and not by name, so I am guessing he has the wrong "DrPepper", but I'm clewless and more curious than anything else. his email is: strayredhen@j... and the extended header says it's from the Boston area. Anybody care to comment?? Thanx -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm From: Marcel Date: Thu Oct 31, 2002 5:00pm Subject: Re: Because while the boss catís away, itís possible some computer mice might want to play Easy, Easy- Advertisement? ???? It was an article on "Keyboard Monitoring". There has been extensive discussion on the topic at the federal level here. The article just highlights the commercial availability (one of many) of a similar product. I was hoping someone would review the "Demo" and comment on it. Times Enemy wrote: > Greetings. > > I guess i fail to see why this advertisement was accepted as worthy of > meeting the requirements for this list. 6454 From: Hawkspirit Date: Thu Oct 31, 2002 9:06pm Subject: First Sweeper "For all such eye-catching applications, Lipset did much of his best work fully dressed, using a holstered recorder to pick up damaging statements made by a rival witness. When the witness would lie in court about the conversation, and lawyers would challenge veracity, the recording would establish the truth. Aware of widespread invasions of privacy by law enforcement and others, he campaigned for reasonable restrictions and worked closely with Sam Dash, a former Philadelphia prosecutor, on his 1959 book, "The Eavesdroppers." The book laid the groundwork for reform, but Dash said that it was Lipset's riveting demonstration of a bugged martini glass before a Senate subcommittee in 1968 that focused public opinion on the issue." http://www.samsloan.com/lipset.htm 6455 From: Date: Thu Oct 31, 2002 4:16pm Subject: Re: First Sweeper In a message dated 10/31/02 7:04:27 PM Pacific Standard Time, hawkspirit@e... writes: << 1959 book, "The Eavesdroppers." >> I think the date's wrong. Someone please ck the copyright on their copy. 6456 From: Nicholas Maurice Date: Thu Oct 31, 2002 5:53pm Subject: TSCM Education Hello all! I am fairly new to TSCM (4 months working) and I am amazed at how much I still have yet to learn. I am enthralled with the operations involved with TSCM and have been soaking up as much knowledge as I can, however I would like to receive some "classroom" instruction. I am a starving college student studying telecommunications management at DeVry University in Fremont Ca. I will be graduating next semester and would greatly appreciate the help of the group to locate a respectable institute dealing with TSCM. I realize that Granite Group is the ultimate learning environment but I am lacking the funds needed for tuition. I have also found a place called "World Institute for Security Enhancement" for a much lower price but I fear throwing my money away that I could have just learned in books. Have anyone heard good comments about this place? If not, does anyone know of a reputable place to direct me to? I am glad to be part of a list with such respected and knowledgeable members. Thank you in advance. Nicholas Maurice Tcom_Guy@h... ===== Nicholas Maurice Electricianguy@y... __________________________________________________ Yahoo! - We Remember 9-11: A tribute to the more than 3,000 lives lost http://dir.remember.yahoo.com/tribute 6457 From: Matt Paulsen Date: Thu Oct 31, 2002 10:53pm Subject: RE: First Sweeper Per Amazon.com "The Eavesdroppers" is by Jack Bleakley. Sam Dash wrote Eavesdroppers in 1971 and Chief Counsel: Inside the Ervin Committee--The Untold Story of Watergate in 1976. 6458 From: Rob Muessel Date: Fri Nov 1, 2002 9:21am Subject: Re: TSCM Education Nicholas raises a perennial question. I'd like to offer a new option. There are training venues in the US, primarily supported by equipment manufacturers such as REI in Tennessee and ISA in Connecticut. Questions arose on the list not too long ago about the primary intent of these manufacturer sponsored sessions- whether they were aimed primarily at training or at marketing. Having taught at the ISA classes for nearly 2 decades, I can state that their classes were aimed specifically at providing the best possible education in a short period of time. Equipment from most manufacturers was used, and presented fairly. I would hope that REI shares the same philosophy. There are several private ventures in the US also: Bob Bryant's World Institute for Security Enhancement, Seminars offered by Tim Johnson, Ross Engineering, and others. All of these courses are only 4-5 days in length, which really isn't enough time. One of the advantages of attending a manufacturer's offering is the assurance that there will be adequate quantities of equipment for the attendees to work with. The private ventures in my experience sometimes are a little light in the the inventory department, which obviously takes a sizable investment. I'd like to make another training opportunity known to the list: TSCM Services in Centurion, South Africa. The principals, and list members, Steve Whitehead and Lorenzo Lombard have built a business that has become a major supplier of TSCM equipment, services and training in the Southern African market and in other areas. I've known Lorenzo for more than ten years and have worked with Steve for the past five. I teach at their advanced courses. They have what is probably the best training deal on the planet, at least if you're paying in dollars, pounds, or euros. They offer a basic course and an advanced course. Each is two weeks in length and is held at a conference center away from the urban centers. They have a remarkable inventory of equipment from all of the major sources. They also have a wealth of expertise in the field. The cost for each course is $2400 and includes everything except airfare, which is under $1300 round trip from NYC. For more info, go to their web site http://www.tscm.co.za/ or contact me directly. -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 6459 From: Ben Evans Date: Fri Nov 1, 2002 8:32am Subject: Re: Cellular Intercept Hi Dan, This isn't for a USA application, this is for an International client who is also a Government Agency. They are allowed to use this type of equipment. We seem to be their "in" for the USA market..... I probably wouldn't be interested in the icr7000, but I'd suggest eBay as a place to move it. You can sell body bags there too if you like, anything goes. Regards, -Ben At 10:54 PM 10/31/2002 -0800, you wrote: >ben: are you aware of law's regarding cell intercept in usa? I have a icom >icr7000 w/cellscope/page tracker 2000 that was taken out of gov.service. >7000 need's alinement to work.if you're interested contact me offline. > >dan > > Ben Evans wrote: >One of our International clients is looking for a cellular intercept system >that can handle multiple calls at once (25 or 50 at a single time). Are >there any products out there that may fit the bill, or something that may >be "close enough" for the client? > >Thanks in advance, > >-Ben Evans > >----------------------------------------------- >Counter Intelligence Solutions Group, Inc. >http://www.cisginc.com/ Corporate Website >http://www.spywholesalers.com/ Covert Cameras >http://www.slantback.com Just for fun >585.889.2321(v) 585.889.0823(f) >----------------------------------------------- > > > >Yahoo! Groups Sponsor >ADVERTISEMENT >28223e9b.jpg > >28223f13.jpg > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > >http://www.yahoogroups.com/community/TSCM-L > >It is by caffeine alone I set my mind in motion. >It is by the juice of Star Bucks that thoughts acquire speed, >the hands acquire shaking, the shaking is a warning. >It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to the >Yahoo! Terms of Service. > > > >Do you Yahoo!? >HotJobs - >Search new jobs daily now ----------------------------------------------- Counter Intelligence Solutions Group, Inc. http://www.cisginc.com/ Corporate Website http://www.spywholesalers.com/ Covert Cameras http://www.slantback.com Just for fun 585.889.2321(v) 585.889.0823(f) ----------------------------------------------- [Non-text portions of this message have been removed] 6460 From: Hawkspirit Date: Fri Nov 1, 2002 6:32pm Subject: TSCM Education If you want to prepare for the future of TSCM, start reading books on digital networks. Soon all communications will be digital (wire and R.F.) Go into E-bay and get to the section on computer networking books. In that section will be books on digital telephony ( I just bought six last month ). They will be ten to fifteen dollars each. Soon all sweeps will be digital diagnostic sweeps. Roger Tolces www.bugsweeps.com At 05:00 PM 11/1/02 +0000, you wrote: >Granite Group is the ultimate learning >environment but I am lacking the funds needed for >tuition. I have also found a place called "World >Institute for Security Enhancement" for a much lower >price but I fear throwing my money away that I could >have just learned in books. Have anyone heard good >comments about this place? If not, does anyone know >of a reputable place to direct me to? >I am glad to be part of a list with such respected and >knowledgeable members. Thank you in advance. > >Nicholas Maurice >Tcom_Guy@h... 6461 From: Fernando Martins Date: Sat Nov 2, 2002 8:32am Subject: RE: TSCM Education Nothing of this is TSCM specific, but ... http://rr.sans.org/wireless/wireless_list.php (lots of 802.11x stuff) http://www.rfcomm.harris.com/support/publications/ (hfradio.pdf + vhf-uhf-2000.pdf = radio comms in the Digital age) http://www.cl.cam.ac.uk/~rja14/ (Ross Anderson home page - everything about the book Security Engineering, and more) http://www.sss-mag.com/rftopics.html (probably my first contact with RF at the internet ... the Spread Spectrum Scene magazine) http://www.sss-mag.com/swindex.html (shareware regarding RF, antennas, CAD/CAE, ...) http://www.sss-mag.com/tools.html (like a RF Impedance Calculator ...) http://www.elektor-electronics.co.uk (some issues have some RF 'toys', I read this mag since 1980, or close ... ) http://www.fbento.pt/elektor/ (the portuguese version of the elektor mag, only for pt/br readers =:) ... it's free so who cares? =;o) FM 6462 From: Ben Evans Date: Fri Nov 1, 2002 11:58pm Subject: Wireless Computer Keyboard http://www.aftenposten.no/english/local/article.jhtml?articleID=427668 Interesting article, tell us what we already know to be a security concern, but expect this one to grow more in the next year or two. -Ben ----------------------------------------------- Counter Intelligence Solutions Group, Inc. http://www.cisginc.com/ Corporate Website http://www.spywholesalers.com/ Covert Cameras http://www.slantback.com Just for fun 585.889.2321(v) 585.889.0823(f) ----------------------------------------------- 6463 From: INTELINK Date: Sat Nov 2, 2002 1:17pm Subject: EUROPOL- Europe is losing fight against cyber crime November 1, 2002 LONDON ñ Europe is losing out in its fight against cyber crime, a top law enforcement official said on Friday. "With cyber crime, it's become so obvious that we've lost the battle even before we've begun to fight. We can't keep up," Rolf Hegel, head of Europol's serious crime department, told the Compsec 2002 computer security conference here. The broad threat of cyber crime has puzzled police forces around the world for years. And now there is mounting evidence that organised criminal groups are using new technologies to commit everyday crimes and some new ones. The Internet and mobile phones have become a reliable tool for criminals, experts say, used in child pornography rings and in a hush-hush crime that is hitting the corporate world with more regularity: threatening to unleash denial of service attacks on targeted computer networks to extort money from businesses. Police can't keep up. "We are far behind," Hegel said. Last month, Europol formed the High Tech Crime Centre, a task force with a mission to co-ordinate cross-border cyber crime investigations in Europe. Hegel said the force is under-manned and under-resourced now, but he hopes it will begin to make a difference in future investigations. There is a sense of urgency amid the law enforcement community to beef up its digital sleuthing capabilities. A co-ordinated attack on a clutch of central Internet root servers across the globe earlier this month has puzzled law enforcement officials, stoking fears it could be the work of an organised criminal group aiming to disrupt vital communications networks. Hegel admitted that if such an attack targeted a European communications network today, police would have a very difficult time tracking down the culprits. The High Tech Crime Centre was formed to beef up investigations into such occurrences, he added. "We will focus our efforts on organised criminal groups," he said, but added assistance was needed from the victims who are often reluctant to share information with police for fear it will harm their business. "I hope this type of incident leads to more in-depth discussions with the victims, the companies," he said. http://www.signonsandiego.com/news/computing/20021101-0444-tech-cybercrime.html ===== The information in this e-mail and any attachments is CONFIDENTIAL and may be PRIVILEGED. If you are not the intended recipient, please destroy this message, delete any copies held on your system and notify the sender immediately. You should not retain, copy or use this e-mail for any purpose, nor disclose all or any part of its content to any other person. __________________________________________________ Do you Yahoo!? HotJobs - Search new jobs daily now http://hotjobs.yahoo.com/ 6464 From: A.Lizard Date: Sun Nov 3, 2002 2:58am Subject: cordless RF keyboard security hazard Fair usage quotes from a Norwegian newspaper. What the article has to say is obvious, once one thinks about it. A.Lizard Cordless keyboard wrote on neighbor's computer http://www.aftenposten.no/english/local/article.jhtml?articleID=427668 While a Stavanger man typed away at his desktop computer his text was also streaming in on his neighbor's machine in a building 150 meters away. Hewlett-Packard have never received a complaint like it. [snip] Stavanger Aftenblad reported that another company using the equipment claimed that a user managed to type on two computers on different floors. [rest at the URL] Experts warn against cordless keyboards http://www.aftenposten.no/english/local/article.jhtml?articleID=427797 [snip] There is absolutely no guarantee that the radio signals used by the keyboard to communicate with your computer will be picked up by your computer only. "Local conditions can powerfully amplify the effect of a quite weak radio sender. It is not at all impossible for the signal to be picked up 100 meters away, even if the sender's initial radius is 20 meters," said Jarl Fjerdingby of Norway's Post and Telecommunications Authority (PTS). The basic message is that your keystrokes, whether they be text or bank codes and passwords, are potentially public broadcast material. Even if a password turns up as a row of stars on the screen, decoding the radio signal does not demand advanced electronics expertise. [rest at the URL] ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "Those who would trade liberty for security shall have neither." Benjamin Franklin Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... PGP 7.0.3 key available by request,keyserver,or on my Web site Download PGP from http://www.pgpi.org for e-mail privacy. PGPfone v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ Disaster prep info: http://www.ecis.com/~alizard/y2k.html ************************************************************************ 6465 From: kondrak Date: Sun Nov 3, 2002 7:53pm Subject: Re: cordless RF keyboard security hazard If you want to use wireless access devices, you've got to expect things like this. Bluetooth only promises to make things worse. I'm always amazed when I bring test equipment close to a computer and see all the radiated garbage from just the internal sources. It's possible to read what's on a monitor screen from a distance. Check "Van Eck phreaking" in google for more info. We know it more commonly these days as "Tempest". http://whatis.techtarget.com/definition/0,289893,sid9_gci550525,00.html At 00:58 11/3/02 -0800, you wrote: >Fair usage quotes from a Norwegian newspaper. What the article has to say >is obvious, once one thinks about it. > >A.Lizard > >Cordless keyboard wrote on neighbor's computer >http://www.aftenposten.no/english/local/article.jhtml?articleID=427668 >While a Stavanger man typed away at his desktop computer his text was also >streaming in on his neighbor's machine in a building 150 meters away. >Hewlett-Packard have never received a complaint like it. > >[snip] >Stavanger Aftenblad reported that another company using the equipment >claimed that a user managed to type on two computers on different floors. > >[rest at the URL] > >Experts warn against cordless keyboards >http://www.aftenposten.no/english/local/article.jhtml?articleID=427797 >[snip] >There is absolutely no guarantee that the radio signals used by the >keyboard to communicate with your computer will be picked up by your >computer only. > >"Local conditions can powerfully amplify the effect of a quite weak radio >sender. It is not at all impossible for the signal to be picked up 100 >meters away, even if the sender's initial radius is 20 meters," said Jarl >Fjerdingby of Norway's Post and Telecommunications Authority (PTS). > >The basic message is that your keystrokes, whether they be text or bank >codes and passwords, are potentially public broadcast material. Even if a >password turns up as a row of stars on the screen, decoding the radio >signal does not demand advanced electronics expertise. >[rest at the URL] >************************************************************************ >member The Internet Society (ISOC), The HTML Writers Guild. >"Those who would trade liberty for security shall have neither." > Benjamin Franklin >Personal Website http://www.ecis.com/~alizard >business Website http://reptilelabs.com >backup address (if ALL else fails) alizard@C... >PGP 7.0.3 key available by request,keyserver,or on my Web site >Download PGP from http://www.pgpi.org for e-mail privacy. >PGPfone v2.1 available for secure voice conferencing, get >your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ >Disaster prep info: http://www.ecis.com/~alizard/y2k.html >************************************************************************ > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6466 From: kondrak Date: Mon Nov 4, 2002 1:01am Subject: Re: cordless RF keyboard security hazard >>Indeed I have, http://www.eff.org//Privacy/Security/tempest_monitoring.article http://www.vortex.com/privacy/prevent-eme Its no cakewalk, the specs are supposedly secret, and theres a lot of correlation of signals to get a picture. Ive used my share of ferrites on cables, some with little success. Bottom line is if you want a secure computer, (from EMI) you'll need to put it inside a grounded Farady cage. >You've seen Grady Ward's tutorials on the subject, right? Though debunking >posts have showed up on TSCM-L from JMA and I think, Steve Uhrig that >essentially say that the trick is much harder to pull off in real life >than one would expect and that people who are selling black boxes for high >prices allegedly intended to tap into these emissions are generally using >staged demos to sell snake oil. > >A.Lizard > > >>At 00:58 11/3/02 -0800, you wrote: >>>Fair usage quotes from a Norwegian newspaper. What the article has to say >>>is obvious, once one thinks about it. >>> >>>A.Lizard >>> >>>Cordless keyboard wrote on neighbor's computer >>>http://www.aftenposten.no/english/local/article.jhtml?articleID=427668 >>>While a Stavanger man typed away at his desktop computer his text was also >>>streaming in on his neighbor's machine in a building 150 meters away. >>>Hewlett-Packard have never received a complaint like it. >>> >>>[snip] >>>Stavanger Aftenblad reported that another company using the equipment >>>claimed that a user managed to type on two computers on different floors. >>> >>>[rest at the URL] >>> >>>Experts warn against cordless keyboards >>>http://www.aftenposten.no/english/local/article.jhtml?articleID=427797 >>>[snip] >>>There is absolutely no guarantee that the radio signals used by the >>>keyboard to communicate with your computer will be picked up by your >>>computer only. >>> >>>"Local conditions can powerfully amplify the effect of a quite weak radio >>>sender. It is not at all impossible for the signal to be picked up 100 >>>meters away, even if the sender's initial radius is 20 meters," said Jarl >>>Fjerdingby of Norway's Post and Telecommunications Authority (PTS). >>> >>>The basic message is that your keystrokes, whether they be text or bank >>>codes and passwords, are potentially public broadcast material. Even if a >>>password turns up as a row of stars on the screen, decoding the radio >>>signal does not demand advanced electronics expertise. >>>[rest at the URL] >>>************************************************************************ >>>member The Internet Society (ISOC), The HTML Writers Guild. >>>"Those who would trade liberty for security shall have neither." >>> Benjamin Franklin >>>Personal Website http://www.ecis.com/~alizard >>>business Website http://reptilelabs.com >>>backup address (if ALL else fails) alizard@C... >>>PGP 7.0.3 key available by request,keyserver,or on my Web site >>>Download PGP from http://www.pgpi.org for e-mail privacy. >>>PGPfone v2.1 available for secure voice conferencing, get >>>your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ >>>Disaster prep info: http://www.ecis.com/~alizard/y2k.html >>>************************************************************************ >>> >>> >>> >>> >>>======================================================== >>> TSCM-L Technical Security Mailing List >>> "In a multitude of counselors there is strength" >>> >>> To subscribe to the TSCM-L mailing list visit: >>> http://www.yahoogroups.com/community/TSCM-L >>> >>> It is by caffeine alone I set my mind in motion. >>> It is by the juice of Star Bucks that thoughts acquire speed, >>> the hands acquire shaking, the shaking is a warning. >>> It is by caffeine alone I set my mind in motion. >>>=================================================== TSKS >>> >>>Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > >************************************************************************ >member The Internet Society (ISOC), The HTML Writers Guild. >"Those who would trade liberty for security shall have neither." > Benjamin Franklin >Personal Website http://www.ecis.com/~alizard >business Website http://reptilelabs.com >backup address (if ALL else fails) alizard@C... >PGP 7.0.3 key available by request,keyserver,or on my Web site >Download PGP from http://www.pgpi.org for e-mail privacy. >PGPfone v2.1 available for secure voice conferencing, get >your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ >Disaster prep info: http://www.ecis.com/~alizard/y2k.html >************************************************************************ 6467 From: Does it matter Date: Sun Nov 3, 2002 9:22pm Subject: Re: TSCM Education I have mentioned Ray Jarvis before Jarvis Internationan in Tulsa Oklahoma. I enjoyed his basic and advanced courses both very informatative and also bought Glenn Whidden's books. Just my opinion. --- In TSCM-L@y..., Rob Muessel wrote: > Nicholas raises a perennial question. I'd like to offer a new option. > > There are training venues in the US, primarily supported by equipment > manufacturers such as REI in Tennessee and ISA in Connecticut. > Questions arose on the list not too long ago about the primary intent of > these manufacturer sponsored sessions- whether they were aimed > primarily at training or at marketing. Having taught at the ISA classes > for nearly 2 decades, I can state that their classes were aimed > specifically at providing the best possible education in a short period > of time. Equipment from most manufacturers was used, and presented > fairly. I would hope that REI shares the same philosophy. > > There are several private ventures in the US also: Bob Bryant's World > Institute for Security Enhancement, Seminars offered by Tim Johnson, > Ross Engineering, and others. > > All of these courses are only 4-5 days in length, which really isn't > enough time. > > One of the advantages of attending a manufacturer's offering is the > assurance that there will be adequate quantities of equipment for the > attendees to work with. The private ventures in my experience sometimes > are a little light in the the inventory department, which obviously > takes a sizable investment. > > I'd like to make another training opportunity known to the list: TSCM > Services in Centurion, South Africa. > > The principals, and list members, Steve Whitehead and Lorenzo Lombard > have built a business that has become a major supplier of TSCM > equipment, services and training in the Southern African market and in > other areas. I've known Lorenzo for more than ten years and have worked > with Steve for the past five. I teach at their advanced courses. > > They have what is probably the best training deal on the planet, at > least if you're paying in dollars, pounds, or euros. They offer a basic > course and an advanced course. Each is two weeks in length and is held > at a conference center away from the urban centers. They have a > remarkable inventory of equipment from all of the major sources. They > also have a wealth of expertise in the field. > > The cost for each course is $2400 and includes everything except > airfare, which is under $1300 round trip from NYC. > > For more info, go to their web site http://www.tscm.co.za/ or contact > me directly. > > > -- > Rob Muessel, Director email: rmuessel@t... > TSCM Technical Services Phone: 203-354-9040 > 11 Bayberry Lane Fax: 203-354-9041 > Norwalk, CT 06851 > USA 6468 From: D. Douglas Rehman Date: Mon Nov 4, 2002 6:43am Subject: Telephone Encryption Anyone have suggestions for the following need: End to End Telephone Encryption Interfacable to a Polycom Conference Telephone Exportable Best Regards, Doug Rehman Rehman Technology Services, Inc. Specializing in Computer Forensics and Technology Related Investigations License A-9800119 Mount Dora, Florida (Orlando Area) (352)357-0500 http://www.surveil.com 6469 From: James M. Atkinson Date: Mon Nov 4, 2002 6:48am Subject: Re: Telephone Encryption Yes, your best bet is a CSD-4100F, or MDL-4100 if your on a tight budget. We have details at: http://www.tscm.com/stu.html The unit is extremely popular with executives, and is real, serious, heavy duty encryption. -jma At 7:43 AM -0500 11/4/02, D. Douglas Rehman wrote: >Anyone have suggestions for the following need: > >End to End Telephone Encryption >Interfacable to a Polycom Conference Telephone >Exportable > >Best Regards, > >Doug Rehman >Rehman Technology Services, Inc. >Specializing in Computer Forensics and Technology Related Investigations >License A-9800119 >Mount Dora, Florida (Orlando Area) >(352)357-0500 >http://www.surveil.com -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6470 From: ed Date: Mon Nov 4, 2002 0:40pm Subject: Re: Telephone Encryption Doug, One of the least expensive (about $600 per unit) commercial-grade POTS encryption units with robust encryption is L-3 Communications' "Privatel" device. I've tested these and the speech quality is reasonable. Besides costing much less than the MDL-4100, it supports faster data rates and uses a different CODEC for better speech reproduction. The Privatel is FIPS-140 certified and employs triple-DES encryption. L-3 Communications is a NSA/DOD contractor and makes quality products, but if your client is looking to secure their communications from the US Government then forget it: http://www.l-3com.com/cs-east/programs/infosec/privatel.htm You might also contact Eric Blossom, former president of Starium, to ask if he has any remaining HS1 units (around $1000.) Last summer at a Dutch communications conference he told me there were still a few production units left. I alpha tested the HS1 and it's a better design with more robust triple-DES encryption. One L-3 employee even admitted to me the HS1 had "better encryption" (longer key lengths) but unfortunately Starium's business plan failed (surprisingly, there's not much of a market for such devices.) http://www.eetimes.com/story/OEG19990423S0015 Both units are exportable. Note that most POTS encryption devices connect between the telephone set and the handset, so be sure your client's speakerphone supports that interface. Also bear in mind that most speakerphone mics pick up room background audio and echoes, which will confuse many CODECs and lead to less intelligible speech reproduction (much like a digital cellphone does in a noisy environment.) -ed At 07:43 AM 11/4/02 -0500, you wrote: >Anyone have suggestions for the following need: > >End to End Telephone Encryption >Interfacable to a Polycom Conference Telephone >Exportable > >Best Regards, > >Doug Rehman >Rehman Technology Services, Inc. >Specializing in Computer Forensics and Technology Related Investigations >License A-9800119 >Mount Dora, Florida (Orlando Area) >(352)357-0500 >http://www.surveil.com 6471 From: James M. Atkinson Date: Tue Nov 5, 2002 3:58pm Subject: German secret service taps phones, bills buggees http://www.theregister.co.uk/content/5/27917.html German secret service taps phones, bills buggees By Tim Richardson Posted: 04/11/2002 at 14:30 GMT A software error is being blamed for an incident in which mobile phone users discovered they were being bugged by German secret squirrels. According to reports last week, some customers of mobile phone operator O2 noticed an unusual phone number on their bills they didn't recognise and a call charge associated with the number. When they tried to call the number they heard a recorded message telling them they couldn't use the number. After further investigation, though, it was revealed that the number belonged to the German secret service. The number was showing up on people's bills because they were being bugged - and paying for it. Understandably, German police and the secret service were not too chuffed with this. A spokesman for mmO2 blamed the incident on a "software error" and said it had now been fixed. Only a "very small number of individual users" were affected, he said. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6472 From: kondrak Date: Wed Nov 6, 2002 9:13am Subject: ?? Interesting catch? Anyone familiar with this piece of equipment? [Non-text portions of this message have been removed] 6473 From: Hawkspirit Date: Wed Nov 6, 2002 10:13am Subject: First Sweeper From the book "Cheesebox", the life of Mickey Cheesebox Callahan, page 118 Circa 1947-1953 New York City "I had very good relations with Uncle Frank (Frank Costello, gangster) over the years. I charged him exorbitant fees for the smallest wirework and he always paid without a grumble. I got fistfuls of cash for checking Frank's phones and the phones of his partners and friends. "I would go over the lines to his apartment on Central Park West several times a month, checking for taps. Sometimes I found them, sometimes not. When I did, he never got excited." Comment: It appears that most wire tap inspections in those days were physical inspections for bridge taps, Callahan describes in another part of the book that he calls into the phone company posing as a technician and gets cable and pair routing information. He does not mention any r.f. sweep tests and that's probably because with only tube amplifiers transmission bugs at that time were too large to hide. From the book " The Bug in the Martini Olive" Hal Lipset private eye, page 59 Circa 1964 "Perhaps as a result of so much publicity, clients arrived at Lipset Service asking Hal to do the reverse of what was making him locally famous -- to remove the bugs other investigators had planted in businesses, homes, and political meetings. Hal immediately dubbed this kind of work "industrial counterespionage," because the term sounded so professional, although the press would soon say that San Francisco's "super snooper" had now become a "super sweeper." " Comment: In the next paragraph Hal discusses using a radio receiver with a frequency capability out to 30 MHZ, so by 1964 r.f. bugs had become a concern. 6474 From: John M Date: Wed Nov 6, 2002 1:54pm Subject: Garmin Rino GPS/FRS transmitter Has anyone looked at these? Allows real-time mapping of another Rino equipped party (within FRS range). Could be used as a relatively cheap tracking device. The location info is sent via FRS channels during every voice call and since the 120 has an external VOX function, the unit could also be used as a low-tech body mic. Also includes a simple voice-inversion scrambler function. http://www.garmin.com/products/rino/ __________________________________________________ Do you Yahoo!? HotJobs - Search new jobs daily now http://hotjobs.yahoo.com/ 6475 From: Kirk Adirim Date: Wed Nov 6, 2002 4:50pm Subject: RE: Garmin Rino GPS/FRS transmitter Cut off the internal uhf antenna and add a 6 inch piece of stiff copper wire in it's place (6.5 inches if your using the euro version) and you will easily get an honest 2+ miles from these radios (in a built up area). Add a connector and a ground plane antenna and you will really get out, or add a Mitsubishi 5-20 watt power amp and now were getting serious. Now open up the case and find the Deviation pot, crank it up from it's +/- 2.5 khz position to +/- 5 khz and you've got a decent "room bug" as the recieved audio is much hotter. Of course all of this is illegal in North America, but perfectly acceptable in a foreign registered vessel at least 200 miles off shore, if you feel compelled to try it out. Kirk, www.tactronix.com -----Original Message----- From: John M [mailto:johnem101@y...] Sent: Wednesday, November 06, 2002 11:55 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Garmin Rino GPS/FRS transmitter Has anyone looked at these? Allows real-time mapping of another Rino equipped party (within FRS range). Could be used as a relatively cheap tracking device. The location info is sent via FRS channels during every voice call and since the 120 has an external VOX function, the unit could also be used as a low-tech body mic. Also includes a simple voice-inversion scrambler function. http://www.garmin.com/products/rino/ __________________________________________________ Do you Yahoo!? HotJobs - Search new jobs daily now http://hotjobs.yahoo.com/ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6476 From: John Todd Date: Wed Nov 6, 2002 3:36pm Subject: Re: Garmin Rino GPS/FRS transmitter >Has anyone looked at these? Allows real-time mapping >of another Rino equipped party (within FRS range). > >Could be used as a relatively cheap tracking device. >The location info is sent via FRS channels during >every voice call and since the 120 has an external VOX >function, the unit could also be used as a low-tech >body mic. Also includes a simple voice-inversion >scrambler function. > >http://www.garmin.com/products/rino/ > Another provider in this space is Benefon. http://www.benefon.com/products/track/index.htm Two models of handheld units that do GPS and cell-tower based triangulation and can relay that information via SMS to any email address on the Internet. They're introducing into the US market now, but they're not very aggressive. They have some interesting technology, but it requires a fairly sophisticated back end to use it as a tracking system. Anyone interested in my thoughts on this, drop me a line - I've already put some extensive research into it but the budget just didn't appear. JT 6477 From: Jacob Date: Wed Nov 6, 2002 8:24pm Subject: Audio Enhancement A client provided me a video tape of a logging accident that recently occured. The camera picked up some wind and a slight drone of the camera motor causing the conversations of the people at the job site to be somewhat difficult to understand at times. Any ideas for clearing this up, preferrably with off the shelf software? Thanks in advance, Jake Ryan Engineer/Consultant 6478 From: Marcel Date: Thu Nov 7, 2002 5:49pm Subject: Sweden May Expel Russian in Ericsson Spy Probe Sweden May Expel Russian in Ericsson Spy Probe Thu Nov 7, 3:03 PM ET STOCKHOLM (Reuters) - A Russian diplomat is likely to be expelled from Sweden in connection with a possible case of industrial espionage against telecoms equipment giant Ericsson (news - web sites), an intelligence source said on Thursday. Police said on Wednesday they had detained three Swedes on suspicion of passing secret documents to a foreign intelligence service, which they did not identify. An Ericsson company source alleged a Russian was involved. Loss-making Telefon AB LM Ericsson is the world's biggest producer of mobile phone networks, but is also involved in developing radar and missile guiding systems for the high-tech JAS 39 Gripen fighter plane. The Gripen is Sweden's main strike warplane. The Ericsson source would not say what documents had been leaked, but said they did not appear to have been linked to any military projects. "It was a specific technology which the Russians don't have themselves that they tried to get, and as far as I know it was not from the defense unit," the source said. Sweden's Foreign Ministry and Justice Ministry declined to comment on reports that a Russian diplomat might be expelled. No one was available for comment at the Russian embassy or in Moscow because of a public holiday in Russia. Asked if a Russian diplomat was likely to be expelled, the intelligence source said: "That would be a reasonable conclusion." The intelligence source declined to be identified. Ericsson has said the three people detained were either employees or former employees. The three have not been named. The company has recently laid off staff as part of a cost-cutting package designed to put it back in the black some time in 2003. The Ericsson source, who also declined to be named, said the leaking of the documents had caused limited damage, but was believed to have been going on for some time. Swedish officials said a prosecutor would ask a court on Friday for the three Swedes to be detained until police had completed investigations because they might escape. The hearing would take place in a high security room at Stockholm's district court, the officials said. The prosecutor, Tomas Lindstrand, said in a court application -- a copy of which was obtained by Reuters -- that the three were suspected of serious espionage or industrial espionage. Swedish security sources said police working on the case had mounted a month-long surveillance operation. http://story.news.yahoo.com/news?tmpl=story&u=/nm/20021107/tc_nm/tech_ericsson_espionage_dc_2 6479 From: Gregory Perry Date: Thu Nov 7, 2002 4:12pm Subject: Re: Audio Enhancement Jake, Check out the Cool Edit suite - has tons of filtering that can be used to clean up audio, do FFT visualization, etc. I've had great success using it to to clean up older analog recordings that suffered from poor signal fidelity and artifacting. http://www.syntrillium.com/ --------------------------------- "Any sufficiently advanced technology is indistinguishable from magic" -- Arthur C. Clarke The following message was sent by Jacob on Wed, 06 Nov 2002 18:24:42 -0800. > > A client provided me a video tape of a logging accident that recently occured. > The camera picked up some wind and a slight drone of the camera motor causing > the conversations of the people at the job site to be somewhat difficult > to > understand at times. > > Any ideas for clearing this up, preferrably with off the shelf software? > > > Thanks in advance, > > Jake Ryan > Engineer/Consultant > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6480 From: John McCain Date: Thu Nov 7, 2002 6:06pm Subject: Re: Audio Enhancement The amateur radio community (and other hobbyists) have quite a collection of free and shareware software tools using mid-range PCs to analyze and clean up audio. Some of these work quite well in real-time too. A fair list is at http://www.muenster.de/~welp/sb.htm#analyzer or at http://www.westmountainradio.com/links/analdsp.htm . A Google search for "PC audio sound card processing" turns up 166K results (and that probably includes a couple that are really good with downloadable demo software). We've actually used freeware PC audio card spectrum analysis software to help design DSP based modems (in addition to top end analysis equipment) when "real" equipment wasn't accessible. For less demanding applications, one of these might be enough for your needs. Even if you want a "real" audio professional to do the work (and if it was for court, I sure would), this stuff is good for educational uses. Cheers, JohnM At 06:24 PM 11/6/02 -0800, you wrote: >Any ideas for clearing this up, preferrably with off the shelf software? Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-897-6600 2949 CR 1000N Web: http://www.dcbnet.com Dewey, IL. 61840 Email: Jmccain@d... 6481 From: James M. Atkinson Date: Thu Nov 7, 2002 9:32pm Subject: Video camera found in BHS locker room http://www.townonline.com/brookline/news/local_regional/bt_covbrshower11062002.htm Video camera found in BHS locker room By Emelie Rutherford / Staff Writer Wednesday, November 6, 2002 Boys taking showers in a Brookline High School locker room may have been secretly being observed by a hidden video camera until the apparatus was discovered 12 days ago by a BHS football player. Police are searching for the person or persons who installed the camera which was found on Oct. 26 taped to exposed piping above the shower room and was wired into the school's electrical system. "I don't consider it an innocent prank," said Capt. Thomas Keaveney of the Brookline Police Department's Detective Division, who said he believes the camera was in place for "at least a couple of days." "It's a very disturbing development," said Superintendent of Schools Richard Silverman. "The police were called immediately and they have it under investigation at this point." Police detectives are looking "internally" in the high school for the culprit, although they are not ruling out individuals outside of the schools, according to Police Lieut. Bob Simmons. Keaveney said the police have no suspects, though a source within the school said fingerprints have been obtained and that police do have suspects. Simmons said police have viewed footage from the camera of a person's hand adjusting the lens. Teachers, custodians and students all have access to the locker room in the main building of the Greenough Street school. Phil Katz, president of the Brookline Educators Association, said he has not heard of any teachers being questioned. Head football coach Malcom Cawthorne said one of his players spotted the camera on Oct. 26 before the team's 1 p.m. game against Milton High School at Parson's Field. "The police just asked me where we found it and I showed them and that was it," Cawthorne said. "I don't know a heck of a lot other than it's being investigated and it potentially could be a federal offense." Katz, who works in the school, said the incident was not announced and some teachers learned about it faster than others. "They're keeping it pretty quiet," he said. "I found out about it Thursday, but people I heard from heard about it on Monday." Yet Katz said it is clear to him that "this is a very inappropriate use of video technology." "This is something that isn't supposed to be there," he said about the placement of the camera. This week, school officials hesitated to say much about the investigation. On Wednesday morning, BHS headmaster Robert Weintraub distributed an e-mail to faculty alerting them of the camera's existence. Weintraub reportedly wrote that while the camera was working and some video was made, "none of it however revealed anyone." The e-mail also stated that the camera was pointed at the ceiling but this detail was not confirmed by Brookline Police. Weintraub could not be reached for comment about the letter on Wednesday. He also declined to provide details about the incident earlier in the week. The TAB received an anonymous telephone message from a parent who said she was upset that her calls to Weintraub inquiring about the matter were not returned last week. "I'm waiting to talk to the police so I can talk to the parents about something authoritative," Weintraub said. "At this point it is a police matter," said Silverman. "I've been careful to make sure we don't do anything to jeopardize the investigation," said School Committee Chairman Marcia Heist. "Nothing's happened yet, but the kids are talking about it," said Joe Campagna, assistant to the athletic director. After school last Monday, students relayed disparate and conflicting stories, often with a snicker. "I heard a member of the football team who I won't name was in the shower and looked up and saw a reflection," said Daniel Locke, 15, a BHS sophomore. "He looked up and saw a red light. It was in the ventilation system. The police came and looked all through the ventilation system." Other students reported hearing the camera was in the shower head, in the lights and inside a locker. Students said the incident wasn't being talked about openly and was being kept under wraps by school officials. "Other than being startled and being curious teenagers, they've put it out of their minds for a little while," Cawthorne said. Heist said the matter will inevitably become part of the school committee's security discussions, though she does not think security policies will have to be changed. "I think our polices are pretty clear about keeping kids safe and about security," she said. "So I think it's not a matter of policy changes so much as it is a matter for the school to add yet another concern to a list of concerns." After strangers were spotted wandering around some of Brookline's schools last spring, the superintendent's office created safety guidelines for the schools to follow, which lead many of them to institute a visitor check-in system and lock more of their doors. "To me, it is so disappointing to discover that along with checking for other kinds of safety issues, like if a fire extinguisher is working, if a smoke alarm is working, we now have to see if any sexual predator is spying on our kids with video cameras," Heist said. Brock Parker contributed to this report. Emelie Rutherford can be reached at erutherford@c.... -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6482 From: Matt Paulsen Date: Thu Nov 7, 2002 9:59pm Subject: RE: Video camera found in BHS locker room In other vidcam news, a man in Vancouver, WA was arrested recently with over 100 tapes of his neighbors being shot from outside through blinds - women, men, children. They think he was doing it for about 10 years. ----------- Video camera found in BHS locker room By Emelie Rutherford / Staff Writer Wednesday, November 6, 2002 Boys taking showers in a Brookline High School locker room may have been secretly being observed by a hidden video camera until the apparatus was discovered 12 days ago by a BHS football player. Police are searching for the person or persons who installed the camera which was found on Oct. 26 taped to exposed piping above the shower room and was wired into the school's electrical system. "I don't consider it an innocent prank," said Capt. Thomas Keaveney of the Brookline Police Department's Detective Division, who said he believes the camera was in place for "at least a couple of days." "It's a very disturbing development," said Superintendent of Schools Richard Silverman. "The police were called immediately and they have it under investigation at this point." Police detectives are looking "internally" in the high school for the culprit, although they are not ruling out individuals outside of the schools, according to Police Lieut. Bob Simmons. Keaveney said the police have no suspects, though a source within the school said fingerprints have been obtained and that police do have suspects. Simmons said police have viewed footage from the camera of a person's hand adjusting the lens. Teachers, custodians and students all have access to the locker room in the main building of the Greenough Street school. Phil Katz, president of the Brookline Educators Association, said he has not heard of any teachers being questioned. Head football coach Malcom Cawthorne said one of his players spotted the camera on Oct. 26 before the team's 1 p.m. game against Milton High School at Parson's Field. "The police just asked me where we found it and I showed them and that was it," Cawthorne said. "I don't know a heck of a lot other than it's being investigated and it potentially could be a federal offense." Katz, who works in the school, said the incident was not announced and some teachers learned about it faster than others. "They're keeping it pretty quiet," he said. "I found out about it Thursday, but people I heard from heard about it on Monday." Yet Katz said it is clear to him that "this is a very inappropriate use of video technology." "This is something that isn't supposed to be there," he said about the placement of the camera. This week, school officials hesitated to say much about the investigation. On Wednesday morning, BHS headmaster Robert Weintraub distributed an e-mail to faculty alerting them of the camera's existence. Weintraub reportedly wrote that while the camera was working and some video was made, "none of it however revealed anyone." The e-mail also stated that the camera was pointed at the ceiling but this detail was not confirmed by Brookline Police. Weintraub could not be reached for comment about the letter on Wednesday. He also declined to provide details about the incident earlier in the week. The TAB received an anonymous telephone message from a parent who said she was upset that her calls to Weintraub inquiring about the matter were not returned last week. "I'm waiting to talk to the police so I can talk to the parents about something authoritative," Weintraub said. "At this point it is a police matter," said Silverman. "I've been careful to make sure we don't do anything to jeopardize the investigation," said School Committee Chairman Marcia Heist. "Nothing's happened yet, but the kids are talking about it," said Joe Campagna, assistant to the athletic director. After school last Monday, students relayed disparate and conflicting stories, often with a snicker. "I heard a member of the football team who I won't name was in the shower and looked up and saw a reflection," said Daniel Locke, 15, a BHS sophomore. "He looked up and saw a red light. It was in the ventilation system. The police came and looked all through the ventilation system." Other students reported hearing the camera was in the shower head, in the lights and inside a locker. Students said the incident wasn't being talked about openly and was being kept under wraps by school officials. "Other than being startled and being curious teenagers, they've put it out of their minds for a little while," Cawthorne said. Heist said the matter will inevitably become part of the school committee's security discussions, though she does not think security policies will have to be changed. "I think our polices are pretty clear about keeping kids safe and about security," she said. "So I think it's not a matter of policy changes so much as it is a matter for the school to add yet another concern to a list of concerns." After strangers were spotted wandering around some of Brookline's schools last spring, the superintendent's office created safety guidelines for the schools to follow, which lead many of them to institute a visitor check-in system and lock more of their doors. "To me, it is so disappointing to discover that along with checking for other kinds of safety issues, like if a fire extinguisher is working, if a smoke alarm is working, we now have to see if any sexual predator is spying on our kids with video cameras," Heist said. Brock Parker contributed to this report. Emelie Rutherford can be reached at erutherford@c.... -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- Vocatus atque non vocatus deus aderit ---------------------------------------------------------------------------- ---------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS From: dj Date: Sun Oct 31, 2004 10:40pm Subject: Re: PBX tapping (legal) What country? --------------------------------- Do you Yahoo!? Yahoo! Mail Address AutoComplete - You start. We finish. [Non-text portions of this message have been removed] 9986 From: Cornolio Date: Mon Nov 1, 2004 7:44am Subject: for those who read german From my German friends :) - The german ministry of justice has commisioned a study of the bugging practice of german police ("Grosser Lauschangriff"). It is a very interesting read, especially the details, like that there was a fairly high number of detected bugs, but none of them by technical means etc. Study can be found at: http://www.bmj.bund.de/media/archive/786.pdf If you just want the juice, start reading around page 136 (pdf-count) Greetings, Barry 9987 From: James M. Atkinson Date: Mon Nov 1, 2004 9:20am Subject: RE: Unknown Device. A "d-mark" is slang for "Point of Demarcation" at a customers location where the local phone companies wiring stops and the customers wire begins. In the United States the "d-mark" usually has an accessible location where you can disconnect the phone wiring to perform tests, perform bug sweeps, or check for technical problems. The "d-mark" is also a common place for an eavesdropper to plant eavesdropping devices. You can see a number of demarcation boxes at: http://www.tscm.com/outsideplant.html -jma At 03:44 AM 11/1/2004, A Grudko wrote: >-----Original Message----- >From: Hawkspirit [mailto:hawkspirit@e...] > > Does anyone know what device this is? It was found at the d-mark of a >residence. > > >It could be a simple static/mains spike bleed off device (these should be >earthed independently of the copper pair but are often not). But it could be >a 'bug' disguised as one. Your post begs some questions: > >The first is not a tech question. What is a 'd-mark' ? (This is an >international list. Technical terms vary from country to country - to me a >d-mark is a unit of German currency). I am assuming this refers to an access >point to a customer's 'phone line. > >Q1. Was the box connected to an active phone line wire pair? (you don't say >if it was connected at all) > >Q2. If the pair was not a phone/data line, did you test it for audio? > >Q3. If it was connected to an active phone line wire pair, was it connected >in series or parallel? > >Q4. If so #2, was the pair used for analogue or digital communications? > >Q5. If so #3, did it draw current either on or off hook? > >Q6. If so #4, did you test it for RF output on and off hook? > > >Numbers printed on a label may mean nothing - any kid can put a CIA logo on >a sticker. So the label can also be disinformation; " Don't worry Roger, the >KEPTEL 4885 is a harmless bipolar network integrator" when in fact it's >beaming directly into Osama bin Laden's hideaway in the hills of Wales. > >Contrary to folk law, government covert surveillance devices don't have >anything written on them that tip off TSCMers that this is a government >'bug'. > >So the most important question is... what was in the box? > >Andy Grudko (British), DPM, Grad IS (South Africa) >MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 >www.grudko.com , agrudko@i... >Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > Mid Rand (+27 11) 318 1451 - 318 6846(Fax) >Cellular (+27) 82 778 6355 - ICQ 146498943 >SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. >"When you need it done right - first time" ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9988 From: James M. Atkinson Date: Mon Nov 1, 2004 9:56am Subject: Get Out and Vote I would like to encourage our list membership in the United States to get up, get out and vote tomorrow. It only take a few minutes, but makes an incredible difference in the world. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 9989 From: A Grudko Date: Mon Nov 1, 2004 0:02pm Subject: RE: Unknown Device. -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] > The "d-mark" is also a common place for an eavesdropper to plant eavesdropping devices. Thanks for the definition, James. > "In the United States the "d-mark" usually has an accessible location..." In that regard the next question must be, is the "accessible location" on public property or would the 'bugger' also become a trespasser or perhaps worse (a burglar, as in the Watergate incident), to compound the primary offence? (I've attended a small number of 'bugging' complaints where no actual bugs were present but a third party had TRESPASSED or 'broken in' to plant fake bugs to intimidate the victim. One was a controversial apartheid era police officer) ---------------------------------------------------------------------------- -- [Non-text portions of this message have been removed] 9990 From: David Alexander Date: Mon Nov 1, 2004 0:07pm Subject: RE: Unknown Device. In the UK the d-mark is know as the NTTP (Network Test & Termination Point) Regards Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... > -----Original Message----- > From: A Grudko [mailto:agrudko@i...] > Sent: 01 November 2004 18:02 > To: TSCM-L@yahoogroups.com > Subject: RE: [TSCM-L] Unknown Device. > > > > -----Original Message----- > From: James M. Atkinson [mailto:jmatk@tscm.com] > > The "d-mark" is also a common place for an eavesdropper to plant > eavesdropping devices. > > Thanks for the definition, James. > > > "In the United States the "d-mark" usually has an accessible > location..." > > In that regard the next question must be, is the "accessible location" > on > public property or would the 'bugger' also become a trespasser or perhaps > worse (a burglar, as in the Watergate incident), to compound the primary > offence? > > (I've attended a small number of 'bugging' complaints where no actual > bugs > were present but a third party had TRESPASSED or 'broken in' term > is HOUSEBREAKING> to plant fake bugs to intimidate the victim. One was a > controversial apartheid era police officer) > > > > > > > > > > -------------------------------------------------------------------------- > -- > -- > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > 9991 From: A Grudko Date: Mon Nov 1, 2004 0:20pm Subject: RE: Unknown Device. -----Original Message----- From: David Alexander [mailto:david.alexander@d...] > In the UK the d-mark is know as the NTTP (Network Test & Termination Point) And is this on public property? --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.764 / Virus Database: 511 - Release Date: 2004/09/15 [Non-text portions of this message have been removed] 9992 From: j dibley Date: Mon Nov 1, 2004 0:23pm Subject: RE: PBX tapping (legal) Try these systems www.businesssystemsuk.co.uk/thales.asp www.businesssystemsuk.co.uk/phone_monitoring_mirra_2.asp Jason Miles Dibley QCC Interscan. Please visit our Web site at http:\\www.qcc.co.uk You can view our digitally signed reports and other documents using Adobe Acrobat Version 4 or greater. You can obtain this for free from the following web site: http://www.adobe.co.uk/products/acrobat/readstep.html This message is intended only for the use of the person(s) to whom it is addressed. It may contain information which is privileged and confidential or material which is protected under attorney-client privilege. In addition, this message may not necessarily represent the views of QCC. Accordingly any unauthorised use is strictly prohibited. If you are not the Intended Recipient, please contact QCC Interscan as soon as possible or send mail to contact@q.... QCC Interscan Ltd. Registered in England and Wales No. 03773029 -----Original Message----- From: javier_vc1 [mailto:javier_vc1@y...] Sent: 31 October 2004 06:03 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] PBX tapping (legal) Good Morning gentlemen, One of my clients is a large corporation with a Central office and several Branch Offices, all connected by high-speed WAN links. PBXs based on Nortel/Avaya. There¥s been some cases involving compromised information. Prime suspects are disgruntled employees. The manager wants to acquire a system to remotely listen/tape any phone conversation going in or out their facilities. (By remote meaning my client¥s network, so no standard RF tapping equipment is useful.) As far as I know, this would be completely legal in my country, as my client owns and has full control over the corporate¥s phone system. So, I¥ll be more than grateful if any of you could point me to the right equipment/company. Or, if you provide such service, please let me know off-list. Thank you. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links [Non-text portions of this message have been removed] 9993 From: Michael Dever Date: Mon Nov 1, 2004 3:21pm Subject: Digital Telephones I am carrying out some research into the vulnerabilities of digital telephones (fixed wired, not mobile or cordless). Apart from the obvious 'base band' audio vulnerabilities of digital telephones has anyone in the group any knowledge of the potential threats to audio security from modifications to the hardware/software of digital handsets that would allow audio to be carried over the standard data stream between the handset and the P(A)BX. I am not talking here about modifications to the configuration settings of the software in the PBX but rather the handset electronics. And, of course what testing protocols and/or instrumentation would folk recommend to detect such intrusions? Any information or references (on or off list) would be greatly appreciated. Regards Mike Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 9994 From: David Alexander Date: Tue Nov 2, 2004 1:15am Subject: RE: Unknown Device. No. It's normally inside the premises. For home users it's the primary socket that contains the ringer hardware. All supplementary sockets are spurred of from it. For businesses it's also inside the property - normally a grey box with a mini distribution board inside for the multiple lines. An eavesdropper would have to break in to get to them if they wanted to attach additional hardware. Regards Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... > -----Original Message----- > From: A Grudko [mailto:agrudko@i...] > Sent: 01 November 2004 18:20 > To: TSCM-L@yahoogroups.com > Subject: RE: [TSCM-L] Unknown Device. > > > > -----Original Message----- > From: David Alexander [mailto:david.alexander@d...] > > In the UK the d-mark is know as the NTTP (Network Test & Termination > Point) > > And is this on public property? > > > --- > Outgoing mail is certified Virus Free. > Checked by AVG anti-virus system (http://www.grisoft.com). > Version: 6.0.764 / Virus Database: 511 - Release Date: 2004/09/15 > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > 9995 From: Javier Villanueva Date: Tue Nov 2, 2004 1:34am Subject: RE: PBX tapping (legal) Thanks jd, thats exactly what i was looking for... Anytime you come to Guadalajara, Mexico, let me know and ill invite you a couple of beers,,, maybe more :-) Thank you very much. --- j dibley wrote: > > > Try these systems > > www.businesssystemsuk.co.uk/thales.asp > www.businesssystemsuk.co.uk/phone_monitoring_mirra_2.asp > > Jason Miles Dibley > QCC Interscan. > > Please visit our Web site at http:\\www.qcc.co.uk > > You can view our digitally signed reports and other > documents using Adobe > Acrobat Version 4 or greater. You can obtain this > for free from the > following web site: > > http://www.adobe.co.uk/products/acrobat/readstep.html > > > This message is intended only for the use of the > person(s) to whom it is > addressed. It may contain information which is > privileged and confidential > or material which is protected under attorney-client > privilege. In > addition, this message may not necessarily represent > the views of QCC. > > Accordingly any unauthorised use is strictly > prohibited. If you are not the > Intended Recipient, please contact QCC Interscan as > soon as possible or send > mail to contact@q.... > > QCC Interscan Ltd. Registered in England and Wales > No. 03773029 > > > -----Original Message----- > From: javier_vc1 [mailto:javier_vc1@y...] > Sent: 31 October 2004 06:03 > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] PBX tapping (legal) > > > > > Good Morning gentlemen, > > One of my clients is a large corporation with a > Central office and > several Branch Offices, all connected by high-speed > WAN links. PBXs > based on Nortel/Avaya. > > There¥s been some cases involving compromised > information. Prime > suspects are disgruntled employees. The manager > wants to acquire a > system to remotely listen/tape any phone > conversation going in or out > their facilities. (By remote meaning my client¥s > network, so no > standard RF tapping equipment is useful.) > > As far as I know, this would be completely legal in > my country, as my > client owns and has full control over the > corporate¥s phone system. > > So, I¥ll be more than grateful if any of you could > point me to the > right equipment/company. Or, if you provide such > service, please let > me know off-list. > > Thank you. > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > > > > > > > [Non-text portions of this message have been > removed] > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > Make a clean sweep of pop-up ads. Yahoo! Companion > Toolbar. > Now with Pop-Up Blocker. Get it for free! > http://us.click.yahoo.com/L5YrjA/eSIIAA/yQLSAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > ===== Javier Villanueva C. Vcorp & Asociados Tel. (01 33) 36 19 47 09 cel. 044 33 33 92 64 50 msm. javier_vc@h... http://vcorpgdl.netfirms.com/news.pdf __________________________________ Do you Yahoo!? Check out the new Yahoo! Front Page. www.yahoo.com 9996 From: savanted1 Date: Tue Nov 2, 2004 11:18am Subject: Spy Agency Engaged in Unauthorized Telephone Taps Australia's Inspector-General of Intelligence and Security (IGIS) Ian Carnell, in his annual report noted that the nation's top spy agency, the Australian Security Intelligence Organization (ASIO), had engaged in unauthorized telephone taps. In one incident, a "large number of calls" were tapped before anyone noticed the tap was not authorized. In another, an incorrect expiration date entered into the ASIO's telecommunications interception system allowed the tap to run several days longer than authorized. In still another case, the wrong service was connected to the ASIO's recording system. According to Carnell, work is underway to ensure these types of incidents do not occur in the future. http://www.seven.com.au/news/topstories/131934 9997 From: Spook Date: Tue Nov 2, 2004 11:48pm Subject: Fwd: Re: Receiver Spurs, and Ants >X-Yahoo-Newman-Property: groups-email >X-Sender: monty399@y... >X-Apparently-To: TSCM-L@yahoogroups.com >Date: Mon, 27 Sep 2004 17:23:48 -0700 (PDT) >Subject: Re: [TSCM-L] Receiver Spurs, and Ants >Reply-To: TSCM-L@yahoogroups.com > > > >I find that using a good spectrum analyzer works wonders. >Found very few spurs on my RHODE AND SCHWARZ FSU26 (20 Hz to >26.5 GHz). A GREAT unit to have. > >Hook it to a Electro-Metrics EM-6865 Omni-directional Antenna >(2 GHz - 18 GHz) Found this ant does a good job down to 50 Mhz >(for TSCM work) > >Also check out the R&S FSH6 Handheld Spectrum Analyzer (100 kHz >to 6 GHz). This is a great handheld used to track down that >elusive signal. Attach one of the Electro-Metrics' Yagi >Antennas to it like the EM-6150, EM-6160 or EM-6161 to it. >Even it outside of its freq range they do a good enough job at >pointing to the signal. > > >Monty > 9998 From: Ramon Date: Wed Nov 3, 2004 0:49am Subject: Space Jam from Uncle Sam WASHINGTON (Reuters) - The U.S. Air Force quietly has put into service a new weapon designed to jam enemy satellite communications, a significant step toward U.S. control of space. The so-called Counter Communications System was declared operational late last month at Peterson Air Force Base in Colorado Springs, the Air Force Space Command said on Friday in e-mailed replies to questions from Reuters. The ground-based jammer uses electromagnetic radio frequency energy to knock out transmissions on a temporary and reversible basis, without frying components, the command said. "A reversible effect ensures that during the time of need, the adversary's space-based capability to threaten our forces is diminished," said Capt. Angie Blair, a spokeswoman. "Following the time of need, the space-based capabilities used by the adversary can return to its original state." The device appears to have been put into service considerably earlier than had been projected by the Air Force as recently as February. At that time, a long-range planning document, dubbed the Transformation Flight Plan, said such a system would let the United States by 2010 "deny and disrupt an adversary's space-based communications and early warning" of attack. U.S. military control of space is one of four missions spelled out under a national space policy adopted by former president Bill Clinton in 1996. The goal is to make sure U.S. forces have unhindered access to space and space-based services and to deny an enemy any similar benefits. The U.S. military has experimented with a range of "antisatellite" (ASAT) weapons, including lasers, to knock out enemy craft by destroying them or damaging their sensors. Theresa Hitchens, vice president of the private Center for Defense Information in Washington, welcomed the new system on the ground it would not create debris that could threaten global use of space and would not destroy satellites, only jam them temporarily. "Unfortunately, it seems we are not going to limit our quest for 'space control' to benign systems," she said, citing the danger of a space arms race. The deployment was disclosed without fanfare late last month at a technical conference of the American Institute of Aeronautics and Astronautics in San Diego, California. The system is operated by the 76th Space Control Squadron, a unit created in 2001 to explore technologies for controlling space, Brig. Gen. Larry James, vice commander of the Space and Missile Systems Command told the conference. The Air Force Space Command, in its e-mailed replies, said the system was built from off-the-shelf commercial equipment, and made up an antenna, transmitters and receivers that can be loaded into a trailer and moved from place to place. Three such systems had been delivered since late last year, the command said. The program's budget for fiscal 2005 totaled $6.2 million, according to the Congressional Research Service. The primary integrator was Northrop Grumman Corp.'s . Mission Systems business unit in Redondo Beach, California, said Joe Davidson, a Space and Missile Center spokesman. Citing "operational security" concerns, military officials declined to discuss how the jammer worked but equated it with traditional Air Force electronic warfare weapons that have been used since World War 2 to deceive, disrupt, deny, degrade or destroy targets. http://reuters.com/newsArticle.jhtml?type=topNews&storyID=6665322 9999 From: geodex Date: Wed Nov 3, 2004 1:13am Subject: Introduction Greetings everyone, My Name is Bob , I just joined the group and wanted to introduce myself. I am 43 years old and served in the US Navy for 12 year's as a Electronic Warfare Tech. I attended many schools including 2M (Micro Miniature Repair) I was in the last class to go thought full component level repair. I also have taken College courses in Computer Programming. (Theres more schools but I won't bore you) I have Worked as a Electronic Service Manager for a Marine Electronics company and also as a Manager for a Security company and Loss Prevention. I am presently gearing myself to be a TSCM Independent contractor. TSCM will be my only focus. I will be doing more reading than posting, But feel free to ask me any questions anytime. Thanks for allowing me to be apart of this group. Regards, Bob 10000 From: kondrak Date: Wed Nov 3, 2004 10:51am Subject: Re: Introduction Welcome Bob, You'll find a lot of soldering-iron wielders on here. Plenty hams, builders, and a bunch who design and mod their own stuff. Your ideas and techniques most welcome... At 02:13 11/3/2004, you wrote: >Greetings everyone, > > My Name is Bob , I just joined the group and wanted to >introduce myself. I am 43 years old and served in the >US Navy for 12 year's as a Electronic Warfare Tech. >I attended many schools including 2M (Micro Miniature >Repair) I was in the last class to go thought full component >level repair. I also have taken College courses in Computer >Programming. (Theres more schools but I won't bore you) >I have Worked as a Electronic Service Manager for a >Marine Electronics company and also as a Manager for >a Security company and Loss Prevention. > I am presently gearing myself to be a TSCM Independent >contractor. TSCM will be my only focus. > I will be doing more reading than posting, But feel free to >ask me any questions anytime. > Thanks for allowing me to be apart of this group. > >Regards, > >Bob > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10001 From: Tech Sec Lab Date: Wed Nov 3, 2004 0:45pm Subject: RE: Elections Lucky lucky USA...another 4 years of President Bush! :D 10002 From: Giantwrath Date: Wed Nov 3, 2004 5:45pm Subject: Help needed with manual for fax encryptor Hello list, Just wondering if anyone out there has any experience with the TRW Fax Encryptor 710-300? Especially I need either a shop/tech manual or a general end user manual. Any help would be appreciated. -JW 10003 From: Hawkspirit Date: Thu Nov 4, 2004 5:39am Subject: TSCM Services _____ Can anyone help on this contact? Roger www.bugsweeps.com _____ From: JosÈ Ruiz @ 3RPS Consultores [mailto:jose.ruiz@3...] Sent: Monday, November 01, 2004 6:35 PM To: bugsweeps@e... Subject: TSCM Services Dear Sirs, We are a consulting firm based in South America. The scope of a project that we are currently executing for one of our clients, includes the evaluation and recommendation of potential providers of TSCM Electronic Sweep services. The areas involved include offices and corporate vehicles in a number of cities, all with good communications via air transport (regular commercial airlines) and, of course, by road. The areas are to be swept for any type of electronic intrusion, be it in the form of cameras, recording equipment, microphones, other receiving/transmitting devices including those that may be implanted via software on computer equipment. At this point, we are interested in ascertaining the following information about your company: * Services Offer (e.g., scope indicated above) and limitations * Capability to undertake international work * Type of Markets served and profile of your typical clients (Corporate, Industry area, Government, etc.) * Local representatives and/or associates in the region We would appreciate your response as soon as possible. Sincerely, JosÈ M. Ruiz V. Project Director 3RPS Consulting [Non-text portions of this message have been removed] 10004 From: Hawkspirit Date: Thu Nov 4, 2004 7:58am Subject: Unknown Device. The inquiry on this device came in as an e-mail, I have not seen the device. I figured I would post the numbers to see if anyone knew what it was. D- mark, is the point of demarcation, the interface point between the phone company and the subscriber. Roger Date: Mon, 1 Nov 2004 10:44:27 +0200 From: "A Grudko" Subject: RE: Unknown Device. -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] > Does anyone know what device this is? It was found at the d-mark of a residence. It could be a simple static/mains spike bleed off device (these should be earthed independently of the copper pair but are often not). But it could be a 'bug' disguised as one. Your post begs some questions: The first is not a tech question. What is a 'd-mark' ? (This is an international list. Technical terms vary from country to country - to me a d-mark is a unit of German currency). I am assuming this refers to an access point to a customer's 'phone line. Q1. Was the box connected to an active phone line wire pair? (you don't say if it was connected at all) Q2. If the pair was not a phone/data line, did you test it for audio? Q3. If it was connected to an active phone line wire pair, was it connected in series or parallel? Q4. If so #2, was the pair used for analogue or digital communications? Q5. If so #3, did it draw current either on or off hook? Q6. If so #4, did you test it for RF output on and off hook? Numbers printed on a label may mean nothing - any kid can put a CIA logo on a sticker. So the label can also be disinformation; " Don't worry Roger, the KEPTEL 4885 is a harmless bipolar network integrator" when in fact it's beaming directly into Osama bin Laden's hideaway in the hills of Wales. Contrary to folk law, government covert surveillance devices don't have anything written on them that tip off TSCMers that this is a government 'bug'. So the most important question is... what was in the box? Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" [Non-text portions of this message have been removed] 10005 From: Hawkspirit Date: Thu Nov 4, 2004 1:09pm Subject: Residential sweep needed Residential sweep needed in northern Virginia. Roger Tolces www.bugsweeps.com [Non-text portions of this message have been removed] 10006 From: kondrak Date: Thu Nov 4, 2004 5:03pm Subject: RE: Elections Absolutely, and SO much better than a 8 year nightmare like the Clinton regime, and her husband. We offed the socialists, now it's time for revenge. At 13:45 11/3/2004, you wrote: >Lucky lucky USA...another 4 years of President Bush! :D 10007 From: Michael Puchol Date: Thu Nov 4, 2004 7:39pm Subject: [OT] Re: Elections My little bit of political oppinion, I just hope Bush relaxes a little, and does a better job at looking after the economy and internal matters, there is no point making a fortress if you cannot afford to live in it because everyone is poor. As a sidenote, and since I live in Spain, I would like to clear up some propaganda that has circulated U.S. media about our recent government change. The people booted the conservative government because it LIED to them. Even when it was totally clear the March 11th attacks had been carried out by islamic terrorists, the government insisted on saying it was ETA (our own little terrorist group), because somehow it thought it would be better for them if it had infact been ETA. They even sent cables to all the embassies saying the ETA theory was to be defended at all costs. Before M-11, they were winning all the polls, their economic policies have been the best for years, the social security system is in the black with rising reserves, employment rates are way higher than with the previous socialist government....bottom line: they got booted for LYING. About the attacks, and about the Iraq war - we knew the real reason for going to Iraq was not WMDs, it's stupid to think that the U.S. had been bombing the place day in, day out since the first Gulf war, and Saddam *still* managed to run a WMD program? Time has proven the sceptics correct. I did not vote socialist, God forbid, but I also didn't vote conservative. I am sick and tired of Spain being called a coward just because we don't want to go into Iraq. As a way of proof, there were ZERO demonstrations, protests or otherwise relating the invasion of Afghanistan. Zero. We even sent troops there too, and the public supported the action. They are still there, they have not been pulled out, because there was a real reason, the Taliban were giving cover to Al Qaeda, no doubt about it. And it was a brutal regime too. But there are a few other brutal regimes around the world, and I don't see the coalition invading them too. So, no questions asked when it comes to terrorism, we have been fighting it on our own turf for over 40 years now, we know what it's like, and we will fight all forms of terrorism, but we will not be brainwashed into someone's own political or world strategic agenda. Sorry for going off-topic, but I had to get it out. If you want to get into a heated (or cool) debate over this, please reply off-list. Best regards, Mike ----- Original Message ----- From: "kondrak" To: Sent: Friday, November 05, 2004 12:03 AM Subject: RE: [TSCM-L] Elections > > Absolutely, and SO much better than a 8 year nightmare like the Clinton > regime, and her husband. > > We offed the socialists, now it's time for revenge. > > > At 13:45 11/3/2004, you wrote: > > >Lucky lucky USA...another 4 years of President Bush! :D > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 10008 From: J. Coote Date: Thu Nov 4, 2004 8:03pm Subject: US Elections The US elections are over. The good news is the media cretins and "political analysts" have wandered off, the nutters are looking elsewhere for conspiracies and alien invasions....and the political ads have shut up. (That one political ad with the childrens song was causing me to throw things). The best news though, is our list appears to be returning from politics back to 'normalcy'- TSCM discussion :-) Jay Los Angeles 10009 From: J.A. Terranson Date: Thu Nov 4, 2004 7:47pm Subject: Re: [OT] Re: Elections On Fri, 5 Nov 2004, Michael Puchol wrote: > I am sick and tired of Spain being called a coward just because we don't > want to go into Iraq. Relax. Nobody but the Bushies believe any of that rhetoric anyway, and they only believe it because they have no idea which way is up or down unless Shrub tells them. The *thinking* part of the US both understands what happened in Spain, and wishes it had happened here as well. Unfortunately, if you lie to the people in the US, even if it results in needless wars, hundreds of thousands of dead civilians, years of debt, etc., the worst that will happen is you will be re-elected :-( -- Yours, J.A. Terranson sysadmin@m... 0xBD4A95BF "An ill wind is stalking while evil stars whir and all the gold apples go bad to the core" S. Plath, Temper of Time 10010 From: Jonathan Young Date: Thu Nov 4, 2004 9:53pm Subject: RE: Elections My hope for a second bush administration is the nazi wannabes, john ashcroft and tom ridge, both take retirement early. But, I don't think that that means that we will have anyone in this adminstration that believes in civil rights, much less anyone that is concerned about this country going in the direction of a police state. But. this country is better off without those two people in power. [Non-text portions of this message have been removed] 10011 From: Blake Bowers Date: Fri Nov 5, 2004 8:48am Subject: Re: Elections > My hope for a second bush administration is the nazi wannabes, john > ashcroft > and tom ridge, both take retirement early. But, I don't think that that You know, I have no problem if someone takes fair shots at a person. But to stoop to the level of calling them "nazi wannabes" is the same as if I called you a "stupid ignorant asshole who has relations with his mother". Pretty much unwarranted. Now, to say that perhaps John Ashcroft is too far to the right with his policies, thats would be the mark of someone who is trying to make an intelligent point. 10012 From: Hawkspirit Date: Fri Nov 5, 2004 10:28am Subject: Elections Two hundred billion dollars of military power projected to the Middle East and our fuel prices doubled, I just can't wait to see George's next great success!!! Roger Date: Thu, 04 Nov 2004 18:03:07 -0500 From: kondrak Subject: RE: Elections Absolutely, and SO much better than a 8 year nightmare like the Clinton regime, and her husband. We offed the socialists, now it's time for revenge. At 13:45 11/3/2004, you wrote: >Lucky lucky USA...another 4 years of President Bush! :D [Non-text portions of this message have been removed] 10013 From: Jonathan Young Date: Fri Nov 5, 2004 9:31am Subject: RE: Elections I am entitled to my opinion. John Ashcroft does not follow the law or the constitution, that is plain to see. If the shoe fits, wear it. I said what i said, don't like what i said, then don't read my posts. Too bad people can't have an opinion in this country anymore. [Non-text portions of this message have been removed] 10014 From: Nalesnik, Matthew Date: Fri Nov 5, 2004 9:30am Subject: RE: Elections > (((anything political on this list...))) OKAY, SO HOW ABOUT THAT SPECTRUM ANALYZER! I'm just as passionate as the next person, definitely more so, about politics, and how I think a free-enterprise based Republic should be run - and I've often looked for the fight about this ideal or that policy rather than stayed away from it... but C'MON, how many lists have I unsubscribed from now because they talk about anything other than what they're intended for!!?? Of course, you may not care about me, and that's your right, but enough about this already - there's enough division around this greatest country these days (it makes GREAT news!), let's try some addition. Furthermore, let's try some talking about things that are related to the list's topics?? My two cents, Matt -----Original Message----- From: Blake Bowers [mailto:bbowers@t...] Sent: Friday, November 05, 2004 9:49 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Elections > My hope for a second bush administration is the nazi wannabes, john > ashcroft > and tom ridge, both take retirement early. But, I don't think that that You know, I have no problem if someone takes fair shots at a person. But to stoop to the level of calling them "nazi wannabes" is the same as if I called you a "stupid ignorant asshole who has relations with his mother". Pretty much unwarranted. Now, to say that perhaps John Ashcroft is too far to the right with his policies, thats would be the mark of someone who is trying to make an intelligent point. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT click here _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . From: Andre Holmes <1ach@g...> Date: Sun Nov 5, 2000 0:50am Subject: CNN - U.S. Navy analyst charged with spying for South Korea - Sept. 25, 1996 CNN - U.S. Navy analyst charged with spying for South Korea - Sept. 25, 1996 U.S. Navy analyst charged with spying for South Korea September 25, 1996 Web posted at: 4:30 p.m. EDT WASHINGTON (CNN) -- A civilian computer expert working for U.S. Naval intelligence was charged Wednesday with passing at least 50 classified documents to his native South Korea. Robert Chaegon Kim, 56, was arrested Tuesday night at Fort Myer, Virginia, while attending an Armed Forces Day reception sponsored by the South Korean Embassy, officials said. According to an affidavit released in U.S. District Court, Kim supplied classified documents, many with "secret" or "top secret" designations, to Baek Dong-Il, a naval attachÈ for the South Korean government. Kim also is accused of giving South Korea "above top-secret" documents containing political and military intelligence about North Korea and other Asian-Pacific nations. He faces a 10-year prison sentence if convicted. Prosecutors are considering filing additional espionage charges, which carry life imprisonment penalties. Agents foil scheme The FBI said it came across the scheme while agents were tracking Baek, whom agents suspected of being an intelligence agent. Clandestine meetings between Baek and Kim were soon discovered, and authorities began an intense surveillance of Kim, the FBI said. Federal agents videotaped Kim at his work space, listened to his phone conversations, searched his home and monitored his mail. Authorities said a search of Kim's workplace revealed a letter from Kim to Baek in which he stated he hoped Baek had digested "the materials I have sent you." He cautioned, "Please be careful with those materials." The affidavit said that, in another letter to Baek, Kim offered to spy for South Korea, a U.S. ally. A native of South Korea, Kim became a U.S. citizen in 1974, and began working for the Office of Naval Intelligence in 1978, court papers said. Kim worked on a computer system that gave him access to top-secret documents generated by other U.S. intelligence-gathering agencies. The affidavit contends Kim regularly searched the computer system to find classified documents relating to military, political and intelligence matters in the Asia- Pacific region. Kim then stored the documents on his computer, removed the "classified" markings, printed them and mailed or delivered them in person to Baek between May and September this year, the affidavit alleges. The affidavit did not say whether Kim was paid or what Baek intended to do with the documents. It is also unclear what year the alleged espionage scheme began. Kim was employed by the same Navy intelligence center in Suitland, Maryland, that employed Jonathan Pollard, a former civilian Navy intelligence analyst who is serving a life prison term for spying for Israel. Christopher 'disturbed' by scheme Secretary of State Warren Christopher said the news of the arrest and its implications "disturbed" him. "I've been very disturbed by the reports that I have received of that arrest and the incident itself. We've been in touch with the South Korean officials about it because this is a matter that's an on-going criminal investigation," he said. The secretary of state met with the South Korean foreign minister earlier Wednesday, but Christopher said the espionage case was not discussed. Correspondent Kathleen Koch and The Associated Press contributed to this report. Tell us what you think! You said it... © 1996 Cable News Network, Inc. All Rights Reserved. Terms under which this service is provided to you. [Non-text portions of this message have been removed] 1893 From: Date: Sun Nov 5, 2000 0:07pm Subject: Interesting & True This is a true story about a recent wedding that took place at the Grand Ballroom at Mendenhall Inn. It was a huge wedding with about 300 guests. After the wedding, at the reception, the groom got up on stage at the microphone to talk to the crowd. He said that he wanted to thank everyone for coming, many from long distances, to support them at their wedding. He especially wanted to thank the bride's and groom's families for coming and to thank his new father-in-law for providing such a fabulous reception. To thank everyone for coming and bringing gifts and everything, he said he wanted to give everyone special gift from just him. So taped to the bottom of everyone's chair was a manila envelope, including the wedding party; He said that this was his gift to everyone, and told everyone to open the envelopes. Inside each manila envelope was an 8x10 Glossy picture of his best man having sex with the bride. Printed by Joe C. @ Mid-City Camera. He had gotten suspicious of the two of them and hired Ray Richardson to trail them weeks prior to the wedding. Ray really enjoys this type of undercover work late at night. After he stood there and watched the people's reactions for a couple of minutes, he turned to the best man and said, "F--- you!".He turned to his bride and said, "F--- you!", and then he turned to the dumbfounded crowd and said, "I'm out of here." He had the marriage annulled first thing that Monday morning. While most of us would have broken off the engagement immediately after finding out about the affair, this guy goes through with it anyway, as if nothing was wrong. His revenge: Making the bride's parents pay over $32,000 for 300 guests for a wedding and reception. Letting everyone know exactly what did happen. And best of all, trashing the bride's and best man's reputations in front of all of their friends and their entire families. This guy has balls the size of church bells. Do you think we might see one of those MasterCard "Priceless commercials out of this? Elegant wedding for 300 family and guest $32,000 Ray's Price for photographing the wedding $3,000 Deluxe Honeymoon accommodations in Maui for 2 weeks $8,500 The look on everyone's faces after seeing a photo of the Bride and Best Man having sex ...... Priceless. 1894 From: James M. Atkinson, Comm-Eng Date: Sun Nov 5, 2000 8:15pm Subject: Veterinary Clinic A man carried his unconscious dog into the veterinary clinic. As he lay the dog on the table, the doctor pulled out his stethoscope, placing the receptor on the dog's chest. After a moment or two,the vet shook his head sadly and said, "I'm sorry, but your dog has passed away." "What?" screamed the man. "How can you tell? You haven't done any testing on him or anything. I want another opinion!" With that, the vet turned and left the room. In a few moments, he returned with a Labrador Retriever. The Retriever when right to work, checking the poor dead dog out thoroughly. After a considerable amount of sniffing, the Retriever sadly shook his head and said. "Bark" The veterinarian then took the Labrador out and returned in a few moments with a cat, who also checked out the poor dog on the table. As had his predecessors, the cat sadly shook his head and said, "Meow." He then jumped off the table and ran out of the room. The veterinarian handed the man a bill for $600. The dog's owner went postal. "$600! Just to tell me my dog is dead? Why, this is outrageous!" The vet shook his head sadly and explained. "If you had taken my word for it, it would have been $50, but with the Lab work and the cat scan ...." ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1895 From: Dragos Ruiu Date: Sat Nov 4, 2000 7:34pm Subject: Introductions > We suggest you introduce yourself on the list by listing > (at least) your name, company, background and interests. Hello, Following the above suggestion. I'm Dragos Ruiu, and my company, dursec.com ltd. is a western Canadian computer and network security consultancy based out of Edmonton and Vancouver. My background is that I've been building high-speed network monitoring equipment for the last 10 years (most of that time, 7y, being spent at HP) and I've been working in computer security for the last 20 years for a number of companies. A few years back I started a company called NetSentry, which is now a publicly traded company called NetMeasure(NTMT) that I no longer have any involvement with. I also organize the yearly, CanSecWest network security training conference. My interests/hobbies include computer security :-), cryptography, RF, and digital video analysis (a field I wrote a book about). cheers, --dr -- Dragos Ruiu dursec.com ltd. / kyx.net - we're from the future gpg/pgp key on file at wwwkeys.pgp.net 1896 From: James M. Atkinson, Comm-Eng Date: Mon Nov 6, 2000 6:45am Subject: Companies increasingly use high-tech snoops to monitor employees Companies increasingly use high-tech snoops to monitor employees http://www.thestate.com/technology/docs/corporatemonitor30.htm By GREG MILLER Los Angeles Times Moving beyond merely monitoring employees' Internet use, many of the nation's largest companies quietly are assembling teams of computer investigators who specialize in covertly copying employees' hard drives and combing them for evidence of workplace wrongdoing. These high-tech investigators employ tools and techniques that originally were devised for law enforcement to catch criminals, but are spreading in the private sector at Microsoft, Disney, Boeing, Motorola, Fluor, Caterpillar and dozens of other major companies. The development, little known outside the narrow community of corporate security experts, is sure to raise tensions over workplace privacy in an age when the lives of millions of workers are inextricably tied to their office computers. Employers say their rush into the field known as "computer forensics" is a matter of self-defense; that being able to retrieve computer evidence is essential to their ability to catch employees engaged in everything from spending too much time surfing the Internet to stealing company secrets. "People don't always tell the truth about things," said Howard Schmidt, head of corporate security for Microsoft. Their computers, he said, usually do. But others question the need of corporations to target unsuspecting employees with the same forensic technology that police agencies use to investigate criminals. Employees subject to such searches face a level of scrutiny they might never have imagined. Investigators acknowledge that searches of computer hard drives routinely turn up embarrassing details about workers' health problems, marital woes and financial difficulties. "Pardon me for being a cynic," said Lewis Maltby, president of the National Work Rights Institute in New Jersey. "But I don't have total confidence in internal security teams to protect my privacy." Forensic work is a mix of daring and digital excavation. Investigators often sneak out late at night, or use various ruses, to obtain "mirror" copies of employees' hard drives. Then they pore over the computers' contents in excruciating detail, searching caches that few users even know about, and resurrecting deleted files. The rush into computer forensics is part of a broader surveillance trend in the American work place. According to the American Management Association, 45 percent of the nation's large companies electronically monitor their workers, up from 35 percent two years ago. And under federal law, companies have an almost unfettered right to do so. Because workplace computers are considered company property, employers are free to examine their contents without restriction. In fact, only in Connecticut are companies even required to inform employees if their computer use is monitored. For years, many companies have kept logs of employees' Internet use and peeked into their e-mail. Now, corporate demand is rising for new types of surveillance software, from programs that record every keystroke to a new product from Raytheon called SilentRunner that spots suspicious clusters of activity on a company network. Compared to other surveillance tools, forensics is more like a digital archeological dig. It involves sifting through a drive's contents for evidence, and handling it so carefully that not a single byte is altered. The Los Angeles Times interviewed more than a dozen corporate security specialists about the growing use of computer forensics by leading U.S. companies. Citing concerns about the secrecy of their work, the investigators would describe specific cases only on the condition that their names and companies not be identified. The investigators said their searches often turn up troves of digital evidence that lead to employee discipline or dismissal for violations such as stealing business plans, submitting phony expense reports and stockpiling pornographic pictures. Often they stumble into the unexpected. One investigator said he solved an embezzlement case at a publishing company after finding copies of e-mail confessions that a worker had sent to a Web site operated by the Catholic church. The number of employees fired or disciplined for Internet-related crimes or company violations appears to be rising. In July, Dow Chemical Corp. fired 50 employees and suspended about 150 others for swapping dirty jokes and photos via e-mail. That same month, Merck fired two workers and disciplined several dozen others for what the company called "inappropriate use of the Internet." Last year, Xerox fired 40 workers and The New York Times terminated 23 employees at a data processing center for similar offenses. Forensics isn't magic. Once a piece of data is overwritten on a computer, it's gone. But most computer users are unaware that merely deleting a file doesn't erase it. So investigators depend in large part on the carelessness of users as well as the complexity of their machines. Computers tuck lots of information into crevices that most users can't see or don't understand how to clean out. Over the past decade, the FBI has gone from one computer forensic specialist to 30 in Washington, and 140 others in field offices, handling 3,000 cases a year. Privacy advocates find computer forensics less than comforting, and predict that companies will abuse the technology. David Sobel, general counsel for the Electronic Privacy Information Center in Washington, said computer forensics is a perfect tool for inappropriate snooping on employees' personal lives or smearing corporate whistle-blowers. Officials for Boeing, Microsoft and other companies said they don't launch forensics investigations unless there is evidence of wrongdoing from other sources. But others said that more mundane matters, such as the fear that a key employee might be considering leaving, could trigger an investigation. And a growing army of forensic consultants is urging corporate clients to take such spying even farther. Mike Anderson, chief executive of New Technologies Inc., a Portland, Ore., company that provides forensics software and training, encourages his clients to copy the hard drive of any employee who leaves. "We jokingly refer to (forensics) as truth serum," he said. There are new tools to thwart forensic searches. A program recently released on the Web called Evidence Eliminator claims to defeat Encase by wiping the areas where that program often finds evidence. But usually, employees only learn of forensic searches after they've been cornered. And experts said forensic technology is improving so rapidly that there is only one reliable way to cover your tracks. "You want to know the best way to erase a hard drive?" said Nick Barone, former head of the Price-Waterhouse Coopers forensic lab. "Go to your local hardware store and get a hammer." ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1897 From: Date: Tue Nov 7, 2000 3:50am Subject: Check out Spy Museum Tour Click here: Spy School - Spy Museum Tour, Discovery.com or http://www.discovery.com/stories/history/spyschool/museum.html 1898 From: mike f Date: Tue Nov 7, 2000 7:18pm Subject: Great OLDOE but Goodie Check Out AMC (american movie channel)on your TV. The Movie ""THE CONVERSATION"" starring Gene Hackman ,John Cazale Stated about 20 minutes ago EST. L8R4,Mike f. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 1899 From: John Titterton Date: Mon Nov 6, 2000 0:05am Subject: RE: Interesting & True This "Urban Legend" has been doing its rounds on the Net for about 4 years now. John >-----Original Message----- >From: MACCFound@a... [mailto:MACCFound@a...] >Sent: Monday, 06 November, 2000 01:07 >To: TSCM-L@egroups.com >Subject: [TSCM-L] Interesting & True > > > >This is a true story about a recent wedding that took place at the Grand >Ballroom at Mendenhall Inn. > >It was a huge wedding with about 300 guests. After the wedding, at the >reception, the groom got up on stage at the microphone to talk to >the crowd. >He said that he wanted to thank everyone for coming, many from long >distances, to >support them at their wedding. He especially wanted to thank the bride's >and groom's families for coming and to thank his new father-in-law for >providing >such a fabulous reception. To thank everyone for coming and bringing gifts >and everything, he said he wanted to give everyone special gift from just >him. So taped to the bottom of everyone's chair was a manila envelope, >including the wedding party; He said that this was his gift to >everyone, and >told everyone to open the envelopes. Inside each manila envelope was an >8x10 Glossy picture of his best man having sex with the bride. >Printed by Joe >C. @ >Mid-City Camera. He had gotten suspicious of the two of them and >hired Ray >Richardson to trail them weeks prior to the wedding. Ray really >enjoys this >type of >undercover work late at night. > >After he stood there and watched the people's reactions for a couple of >minutes, he turned to the best man and said, "F--- you!".He turned to his >bride and said, "F--- you!", and then he turned to the dumbfounded crowd >and said, "I'm out of here." > >He had the marriage annulled first thing that Monday morning. While most >of us would have broken off the engagement immediately after >finding out about the affair, this guy goes through with it anyway, as if >nothing was wrong. His revenge: Making the bride's parents pay over >$32,000 for 300 guests for a wedding and reception. Letting everyone know >exactly >what did happen. And best of all, trashing the bride's and best man's >reputations in front of all of their friends and their entire families. > >This guy has balls the size of church bells. Do you think we might see one >of those MasterCard "Priceless commercials out of this? > Elegant wedding for 300 family and guest $32,000 > Ray's Price for photographing the wedding $3,000 > Deluxe Honeymoon accommodations in Maui for 2 weeks $8,500 > The look on everyone's faces after seeing a photo of the Bride and Best > Man having sex ...... Priceless. > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS 1900 From: Screaming Date: Mon Nov 6, 2000 4:59pm Subject: RE: Veterinary Clinic Ho Ho Ho One of your better ones Jim I'm sure there is a story about certain TSCM practitioners hidden in the moral of that story Don't any of you guys send me hate mail please - take it as read that I didn't mean any of you naturally jc 1901 From: Ed Naylor Date: Thu Nov 9, 2000 9:37am Subject: WIRELESS NETWORK PIRATING /5/ Newsbytes http://www.newsbytes.com/news/00/157874.html Gartner: Watch Out For Pirate Wireless Networks By Dick Kelsey, Newsbytes STAMFORD, CONNECTICUT 08 Nov 2000, 5:17 PM CST Call them a 21st century version of peeping Toms. Using components found in information technology (IT) departments, wireless pirates put together networks that allow them to secretly peer at data and passwords that cross Internet system backbones, the Gartner Group Inc. [NYSE:IT] warned today. All they need to do is dial into the wireless network and intercept backbone activity on a traditional Internet network of servers and desktops, researchers said. To pull it off, pirates can't be more than a few hundred yards from the network they're targeting. "The wireless technologies we will be using are revolutionizing the way we do business," Gartner vice president and research fellow Martin Reynolds said in a news release. "Security efforts need to be thorough in all dimensions of the workplace." To guard against this activity, Gartner recommends changing network security codes, as a default code is open to anyone who has it; set up wireless access points to reduce the amount of visible backbone activity and thin out overall traffic; build wireless networks for each department; use media access control address tracking to keep track of who is on the network; and monitor access logs. Reported by Newsbytes.com, http://www.newsbytes.com -- - 1902 From: James M. Atkinson, Comm-Eng Date: Thu Nov 9, 2000 11:46am Subject: Wiretap legal hotline established Wiretap legal hotline established http://www.infoworld.com/articles/hn/xml/00/11/09/001109hnwiretap.xml By Martyn Williams TRADE ORGANIZATIONS REPRESENTING most of the world's largest Internet backbone operators and service providers have established a hotline where operators can get legal advice when they receive U.S. federal government wiretap requests. Callers to the hotline will be referred to independent lawyers experienced in the field of electronic surveillance and law enforcement issues, the organizations said in a joint statement Wednesday. The hotline will be established by the Commercial Internet eXchange (CIX) and Internet Service Providers' Consortium (ISP/C), which have announced plans to combine their operations, and the ISP Business Forum. While recognizing the rights of law enforcement in situations concerning surveillance, the organizations sponsoring the hotline said it is also important that Internet service providers (ISPs) understand their own rights and those of their members. Together the three organizations bring together hundreds of companies operating in the Internet industry including some of the largest names in telecommunications such as AboveNet Communications, AT&T, British Telecommunications, Cable & Wireless, Fujitsu, Hitachi, PSINet, Qwest Communications International, Sprint, UUNet Technologies, Verio and WorldCom. The hotline will supplement a planned Web site that will provide ISPs with information on the subject and is being formed as federal wiretap and surveillance issues hit the headlines in the light of revelations over the U.S. Federal Bureau of Investigations' (FBI) Carnivore program. Carnivore, an Internet surveillance tool, has been used in at least 25 criminal investigations by the FBI and has caused outrage among privacy advocates and citizen groups. Documents recently obtained under the U.S. Freedom of Information Act by such groups indicate the program is still active with an enhanced version of the software under development that can intercept telephone calls routed over the Internet (voice over IP calls), according to the groups. The surveillance issue was also at the heart of a recent investigation into the acquisition of Web backbone operator and hosting provider Verio by Japan's NTT Communications. The FBI called for a probe into the deal because it had concerns over whether information on its surveillance activities at Verio would be fed back through NTT Communications to the Japanese government, which owns a majority stake in NTT. The hotline number is +1-202-216-1999. Martyn Williams is Tokyo correspondent for the IDG News Service, an InfoWorld affiliate. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1903 From: James M. Atkinson, Comm-Eng Date: Thu Nov 9, 2000 11:48am Subject: Shop manager filmed women changing with spy camera Shop manager filmed women changing with spy camera http://www.ananova.com/news/story/sm_110774.html?nav_src=newsIndexHeadline A Japanese travel agency manager has been sacked for spying on women in the changing rooms of his shop. The Meitetsu Kanko Service travel agency has revealed that the 45-year-old man, who ran a branch in Nagoya, had placed a camcorder in the staff locker room. One woman spotted the camera hidden on top of a locker. The film inside showed her getting changed, reports the Mainichi Daily News. The travel agency manager, who has not been named, was sacked after admitting secretly videotaping the woman. He claimed he "did it on impulse". Last updated: 10:11 Thursday 9th November 2000. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1904 From: Miguel Puchol Date: Thu Nov 9, 2000 4:02pm Subject: RE: WIRELESS NETWORK PIRATING So far algorithms used in encryption of wireless protocols (2.4GHz LAN, Bluetooth, DECT, etc.) are know not for their strength, precisely - AFAIK. DECT documents on it's security and possible threats and attacks can be downloaded from www.etsi.org. Impersonating nodes or base stations (ala man-in-the-middle) are the most feared attacks. Cheers all, Mike -----Mensaje original----- De: Ed Naylor [mailto:ednaylor@p...] Enviado el: jueves, 09 de noviembre de 2000 16:37 Para: TSCM-L@egroups.com Asunto: [TSCM-L] WIRELESS NETWORK PIRATING /5/ Newsbytes http://www.newsbytes.com/news/00/157874.html Gartner: Watch Out For Pirate Wireless Networks By Dick Kelsey, Newsbytes STAMFORD, CONNECTICUT 08 Nov 2000, 5:17 PM CST Call them a 21st century version of peeping Toms. Using components found in information technology (IT) departments, wireless pirates put together networks that allow them to secretly peer at data and passwords that cross Internet system backbones, the Gartner Group Inc. [NYSE:IT] warned today. 1905 From: Steve Uhrig Date: Thu Nov 9, 2000 4:56pm Subject: Full coverage receivers available again Hello list, We got in several more full coverage ICOM R100 receivers and can pass them along again. I had thought the supply line had died, but a few more surfaced. Finding any decent quality general coverage receiver which still receives in the cellular range is nearly impossible. Anything you buy anymore has the cellular frequencies blocked. This is a severe impediment to TSCM types. We don't care about listening to cellular conversations (and there is very little analog anymore) but we need to examine these frequencies for hostile transmitters. A savvy adversary might choose to crystal something in this area since there is a lack of receivers which cover it. The ICOM R100s are professional communications receivers with full frequency coverage. They are not cellular blocked and are now illegal to import or to sell new. Government agencies are exempt, of course. This may be one of the last opportunities to get something like this. These are government trade ins in various conditions but all working and most in excellent shape. ICOM has discontinued the R100 and there is no replacement. Frequency coverage is 100 kc to 1856 megacycles. Specs guaranteed from 500 kc to 1800 megs, but it does cover 100 kc to 1856 megs. Dimensions: 6 x 2 x 7 inches without knobs. Weight 3.1 pounds. Large backlit LCD display. Price $550-$750 depending on condition and accessories. Most are near new. Accessories are mobile mounting bracket and AC power supply primarily. Antennas of various sorts are available. This works well with a wide coverage discone which we have for an additional $125 with purchase of receiver, $150 without. For those not familiar, the R100 is a professional compact receiver with all standard features like memories, various scan modes, different demodulators, different bandwidths and tuning steps, etc. It is approx the size of a cigar box and is powered by 12 VDC. I don't see many more coming in anytime soon. This may be an opportunity not available in the future. If you want a full coverage very decent receiver, contact me off list and we can discuss it. We take credit cards and are very willing to export. Price depends on condition and accessories. I will consider accepting trades of other quality equipment. Any TSCMer should have something like this for manually tuning into suspect signals. Or general monitoring. While the receiver does scan, it is considered more a professional communications receiver than a consumer scanner. This is the same receiver we formerly used on our Beeper Buster pager intercept system. The last time I advertised these receivers on this list, every one I had sold almost immediately and I had to turn down 3 people. A very few R8500s also are available. Inquire. Other used surveillance, countersurveillance and communications equipment is available on the used equipment page on our website. List members either will get a discount if I can afford to discount that particular piece, or will get something extra with their order. I also buy electronic equipment similar to the above, if anyone has anything excess to their needs. http://www.swssec.com/used.html Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1906 From: Andre Holmes <1ach@g...> Date: Fri Nov 10, 2000 6:40am Subject: Re: Full coverage receivers available again HELLO STEVE IF YOU STILL HAVE ONE I COULD USE A BACKUP IN GOOD CONDITION IF YOU HAVE ONE AVAIL-PLEASE SEND TO MY HOME 7052 GEORGE FAUL RD SARDINIA OHIO 45171 UPS GROUND IS FINE NO REAL RUSH PAYMENT BY CREDIT CARD INFO IS THE SAME YOU HAVE TO NUMBERS. Steve Im looking for a 24hr RF monitor that can log freqs is there a unit on the market at a reasonable price ? Thanks for your time. ----- Original Message ----- From: "Steve Uhrig" To: Sent: Thursday, November 09, 2000 5:56 PM Subject: [TSCM-L] Full coverage receivers available again > Hello list, > > We got in several more full coverage ICOM R100 receivers > and can pass them along again. I had thought the supply line had > died, but a few more surfaced. > > Finding any decent quality general coverage receiver which > still receives in the cellular range is nearly impossible. > Anything you buy anymore has the cellular frequencies > blocked. This is a severe impediment to TSCM types. We don't > care about listening to cellular conversations (and there is > very little analog anymore) but we need to examine these > frequencies for hostile transmitters. A savvy adversary might > choose to crystal something in this area since there is a lack > of receivers which cover it. > > The ICOM R100s are professional communications receivers with > full frequency coverage. They are not cellular blocked and are > now illegal to import or to sell new. Government agencies are > exempt, of course. This may be one of the last opportunities to > get something like this. > > These are government trade ins in various conditions but all > working and most in excellent shape. ICOM has discontinued the > R100 and there is no replacement. > > Frequency coverage is 100 kc to 1856 megacycles. Specs > guaranteed from 500 kc to 1800 megs, but it does cover 100 kc to > 1856 megs. > > Dimensions: 6 x 2 x 7 inches without knobs. > > Weight 3.1 pounds. > > Large backlit LCD display. > > Price $550-$750 depending on condition and accessories. > Most are near new. Accessories are mobile mounting bracket > and AC power supply primarily. Antennas of various sorts > are available. This works well with a wide coverage discone > which we have for an additional $125 with purchase of > receiver, $150 without. > > For those not familiar, the R100 is a professional compact > receiver with all standard features like memories, various > scan modes, different demodulators, different bandwidths > and tuning steps, etc. It is approx the size of a cigar box and > is powered by 12 VDC. > > I don't see many more coming in anytime soon. This may be > an opportunity not available in the future. > > If you want a full coverage very decent receiver, contact me off > list and we can discuss it. We take credit cards and are very > willing to export. Price depends on condition and accessories. I > will consider accepting trades of other quality equipment. > > Any TSCMer should have something like this for manually tuning > into suspect signals. Or general monitoring. While the receiver > does scan, it is considered more a professional communications > receiver than a consumer scanner. > > This is the same receiver we formerly used on our Beeper Buster > pager intercept system. > > The last time I advertised these receivers on this list, every > one I had sold almost immediately and I had to turn down 3 > people. > > A very few R8500s also are available. Inquire. > > Other used surveillance, countersurveillance and communications > equipment is available on the used equipment page on our > website. List members either will get a discount if I can afford > to discount that particular piece, or will get something extra > with their order. > > I also buy electronic equipment similar to the above, if anyone > has anything excess to their needs. > > http://www.swssec.com/used.html > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1907 From: mike f Date: Fri Nov 10, 2000 7:23am Subject: VETERANS of USA MILITARY I WANT TO SAY SOMETHING 2 ALL OF YOU!!!! THANK YOU!!! Thank you for Every Thing You Sacrificed, While Keeping Everyone at Home Safe!!! So Thanks to All of you, Those Who Served in Peace Time Or in Times on Conflict, THANK YOU!! WHY? Because..... When Someone Shoots a Gun at Me....I get DAMN SCARED. I can't begin to Imagine....How I would React,besides being scared,I don't know what I would do! I like to think & tell myself you could handle & I would be able to function as a soldier, Not having Expierenced Combat,I'm not sure...what I would do.......... Being shot at in Combat,....I don't want too Imagine... So all I'm trying to say IS a sincere thank you! Later4,mike fiorentino Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 1908 From: Mike Date: Thu Nov 9, 2000 7:20pm Subject: Re: Full coverage receivers available again Hi List, I thought I'd also mention that I have a few scanners for sale also. All of them are cell capable or may be easily modded for cell freqs. Below is a partial list at reasonable prices. These are among the top scanners sought by everyone. None are produced anymore. 1. AOR 2500 (with computer control) $600 2. AOR 2515 (with computer control) $800 3. Realistic Pro 34 Handheld $250 4. Realistic Pro 51 Handheld $300 5. Realistic Pro 2006 $500 6. Realistic Pro 2004 (with extra mods) $500 I have 5 of the excellent AOR 2500 units available. Below is some other items. A. AN/PPS-6 Portable Battlefield Radar $1000 ea. B. Tron Tech 800-1000 mhz (cellular) amps. $50 ea. email me bootleg@p... Thanks- ----- Original Message ----- From: Steve Uhrig To: Sent: Thursday, November 09, 2000 2:56 PM Subject: [TSCM-L] Full coverage receivers available again > Hello list, > > We got in several more full coverage ICOM R100 receivers > and can pass them along again. I had thought the supply line had > died, but a few more surfaced. > > Finding any decent quality general coverage receiver which > still receives in the cellular range is nearly impossible. > Anything you buy anymore has the cellular frequencies > blocked. This is a severe impediment to TSCM types. We don't > care about listening to cellular conversations (and there is > very little analog anymore) but we need to examine these > frequencies for hostile transmitters. A savvy adversary might > choose to crystal something in this area since there is a lack > of receivers which cover it. > > The ICOM R100s are professional communications receivers with > full frequency coverage. They are not cellular blocked and are > now illegal to import or to sell new. Government agencies are > exempt, of course. This may be one of the last opportunities to > get something like this. > > These are government trade ins in various conditions but all > working and most in excellent shape. ICOM has discontinued the > R100 and there is no replacement. > > Frequency coverage is 100 kc to 1856 megacycles. Specs > guaranteed from 500 kc to 1800 megs, but it does cover 100 kc to > 1856 megs. > > Dimensions: 6 x 2 x 7 inches without knobs. > > Weight 3.1 pounds. > > Large backlit LCD display. > > Price $550-$750 depending on condition and accessories. > Most are near new. Accessories are mobile mounting bracket > and AC power supply primarily. Antennas of various sorts > are available. This works well with a wide coverage discone > which we have for an additional $125 with purchase of > receiver, $150 without. > > For those not familiar, the R100 is a professional compact > receiver with all standard features like memories, various > scan modes, different demodulators, different bandwidths > and tuning steps, etc. It is approx the size of a cigar box and > is powered by 12 VDC. > > I don't see many more coming in anytime soon. This may be > an opportunity not available in the future. > > If you want a full coverage very decent receiver, contact me off > list and we can discuss it. We take credit cards and are very > willing to export. Price depends on condition and accessories. I > will consider accepting trades of other quality equipment. > > Any TSCMer should have something like this for manually tuning > into suspect signals. Or general monitoring. While the receiver > does scan, it is considered more a professional communications > receiver than a consumer scanner. > > This is the same receiver we formerly used on our Beeper Buster > pager intercept system. > > The last time I advertised these receivers on this list, every > one I had sold almost immediately and I had to turn down 3 > people. > > A very few R8500s also are available. Inquire. > > Other used surveillance, countersurveillance and communications > equipment is available on the used equipment page on our > website. List members either will get a discount if I can afford > to discount that particular piece, or will get something extra > with their order. > > I also buy electronic equipment similar to the above, if anyone > has anything excess to their needs. > > http://www.swssec.com/used.html > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1909 From: 1RCM <1RCM@M...> Date: Fri Nov 10, 2000 8:02pm Subject: IC-R100 Endorsement Hi List, I'd like to offer a personal comment regarding the Icom units that Steve Uhrig has recently offered for sale via this list. These units will undoubtedly sell themselves very quickly so I'm certainly not trying to make any kind of a sales pitch to help Steve's business. But recently on one of the radio/scanner lists that many of this list's readers may also receive the IC-R100 has for some undisclosed reason gotten a very bad (and in my opinion an unjust and unsubstantiated) rap. The claim is essentially that the radio is basically the step-son of the several Icom 'big boys' and as such functions only on the same level as any of the basic low-level Bearcat or Radio Shack scanners. Having personally found that slam to be not at all true I just don't want to see anyone who may have an interest or a need for a radio exactly like the R100 walk away from a good deal simply because they got some bum information. I bought my IC-R100 some eight years ago. At the time I chose it over some of its big brothers for a whole host of reasons (i.e. size, ability to run off of both 110 and 12v, specific need at the time, cost, etc.). Since that time I have had many an opportunity to sit it next to its father and some of its uncles. And each time I found that it certainly did the family name proud. I have found the unit quite handy to have around to use as a tunable receiver capable of offering the user a broad-band tuning range and several forms of demod, to use for any number of purposes as a either a base or mobile scanner, to use to receive some real press propaganda via SW, and to use for various purposes while performing a sweep. And no matter what I have done with it I've never been let down at all as far as the versatility, capability and quality of the unit is concerned. So if anyone is thinking about an IC-R100 to fill a particular need that they might have please keep in mind that this little ditty is no longer in production and was manufactured before the cell ban caught up with it. That makes it desirable and getting rarer all the time. So whether you buy from Steve or from someone else don't wait too long or you will regret missing the boat. But as far as owning and using the R100 - I personally believe that you'll have no regrets. Just Another "Bob" 1910 From: Andre Holmes <1ach@g...> Date: Fri Nov 10, 2000 8:20pm Subject: Re: IC-R100 Endorsement To add to what Bob is saying the IC-R100 has tuning steps in the khz 1k,5k,8k,9k, 10k,12.5k,20k,25k ICOM at one time had on the market a unit called Icom 781 I dont see many on the market for sell used.Its for VLF reception which may be nice to pick off Carrier current radiance. ----- Original Message ----- From: "1RCM" <1RCM@M...> To: "TSCM List - Post" Sent: Friday, November 10, 2000 9:02 PM Subject: [TSCM-L] IC-R100 Endorsement > Hi List, > > I'd like to offer a personal comment regarding the Icom units that Steve > Uhrig has recently offered for sale via this list. These units will > undoubtedly sell themselves very quickly so I'm certainly not trying to make > any kind of a sales pitch to help Steve's business. But recently on one of > the radio/scanner lists that many of this list's readers may also receive > the IC-R100 has for some undisclosed reason gotten a very bad (and in my > opinion an unjust and unsubstantiated) rap. The claim is essentially that > the radio is basically the step-son of the several Icom 'big boys' and as > such functions only on the same level as any of the basic low-level Bearcat > or Radio Shack scanners. Having personally found that slam to be not at all > true I just don't want to see anyone who may have an interest or a need for > a radio exactly like the R100 walk away from a good deal simply because they > got some bum information. > > I bought my IC-R100 some eight years ago. At the time I chose it over some > of its big brothers for a whole host of reasons (i.e. size, ability to run > off of both 110 and 12v, specific need at the time, cost, etc.). Since that > time I have had many an opportunity to sit it next to its father and some of > its uncles. And each time I found that it certainly did the family name > proud. I have found the unit quite handy to have around to use as a tunable > receiver capable of offering the user a broad-band tuning range and several > forms of demod, to use for any number of purposes as a either a base or > mobile scanner, to use to receive some real press propaganda via SW, and to > use for various purposes while performing a sweep. And no matter what I have > done with it I've never been let down at all as far as the versatility, > capability and quality of the unit is concerned. > > So if anyone is thinking about an IC-R100 to fill a particular need that > they might have please keep in mind that this little ditty is no longer in > production and was manufactured before the cell ban caught up with it. That > makes it desirable and getting rarer all the time. So whether you buy from > Steve or from someone else don't wait too long or you will regret missing > the boat. But as far as owning and using the R100 - I personally believe > that you'll have no regrets. > > Just Another "Bob" > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1911 From: Steve Uhrig Date: Fri Nov 10, 2000 8:35pm Subject: IC-R100 Endorsement Once upon a midnight dreary, Andre Holmes pondered, weak and weary: > ICOM at one time had on the market a unit called Icom 781 I > dont see many on the market for sell used.Its for VLF > reception which may be nice to pick off Carrier current > radiance. The 781 was an amateur (ham radio) transceiver. It covered the standard HF bands and had a general coverage receiver section. Big and heavy. Most of the amateur transceivers from ICOM, Kenwood or Yaesu have general coverage receivers, but I doubt if they go much below AM broadcast band if even that low. The bottom of the lowest amateur HF band (160 meters) is 1800 kc I believe. These things include transmitters which is a lot of bulk and expense you don't need. No advantage using amateur stuff over a dedicated receiver. The dedicated receiver will work much better for what we do. The receivers in amateur transceivers usually are general coverage merely to let the operator listen to shortwave broadcasts, WWV or occasionally some military/amateur affiliate MARS stations which are just outside the normal amateur bands. The R100 goes down to 100 kilocycles which is about as low as anything covers without being a special purpose piece of equipment probably not useful for anything else. I don't know if any of the amateur transceivers go that low. It's tricky to use an RF receiver to read power line subcarriers. Much better to use a dedicated piece like a Marty Kaiser box, an old Capri if you can find one, or a Marty Kaiser- converted Palomar VLF converter front end for an Avcom or similar spectrum analyzer. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1912 From: James M. Atkinson, Comm-Eng Date: Sat Nov 11, 2000 0:29pm Subject: Re: IC-R100 Endorsement At 9:20 PM -0500 11/10/00, Andre Holmes wrote: >To add to what Bob is saying the IC-R100 has tuning steps in the khz >1k,5k,8k,9k, >10k,12.5k,20k,25k > ICOM at one time had on the market a unit called Icom 781 I dont see >many on the market >for sell used.Its for VLF reception which may be nice to pick off Carrier >current radiance. The R-9000 can actually go down to 30 kHz, and can demod FM inside all of the popular VLF/Carrier Current frequencies (ie: 120 - 400 kHz) without using an external mixer. The only things about the R-9000 that annoys me about using it is the lack of a wide bandwidth detector, poor sensitivity above 1 GHz, and lack of frequency coverage to 2.5 GHz (a FM video demodulator with dual independent Sub-C would have also be nice). -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1913 From: James M. Atkinson, Comm-Eng Date: Sun Nov 12, 2000 9:51am Subject: The Funeral [Humour] The Funeral A woman was leaving a 7-11 with her morning coffee when she noticed a most unusual funeral procession approaching the nearby cemetery. A long black hearse was followed by a second long black hearse about 50 feet behind the first one. Behind the second hearse was a solitary woman walking a pit bull on a leash. Behind her, a short distance back, were 200 women walking single file. The woman couldn't stand her curiosity. She respectfully approached the woman walking the dog and said "I am so sorry for your loss, and I know now is a bad time to disturb you, but I've never seen a funeral like this. Whose funeral is it?" The woman replied, "Well, that first hearse is for my husband." "What happened to him?" The woman replied,"My dog attacked and killed him." She inquired further, "Well, who is in the second hearse?" The woman answered, "My mother-in-law. She was trying to help my husband when the dog turned on her." A poignant and thoughtful moment of silence passed between the two women. "Can I borrow the dog?" "Get in line." ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1914 From: Steve Uhrig Date: Mon Nov 13, 2000 2:24pm Subject: Balto TV news spot on cell intercept Hello list, Tonight (Monday the 13th) on Baltimore TV Channel 11 at 6PM should be a short news item on how cellular intercept technology assisted in locating and locking up the suspect in the October 30th killing of Maryland State Police Cpl Toatley in a drug raid. Through traditional investigation, the suspect was anticipated to be in the New York State area. Pinging his cell phone for location and monitoring the content of his calls placed him in NYC, where he was arrested early this morning. There was a lot more to it than just mentioned, but that was the bottom line. TV 11 is expected to have a (very) short interview of me briefly discussing how this was done. As normally happens, a 30 minute interview likely will be condensed to 30 seconds on the air. Cell intercept is available to law enforcement only, but y'all may be interested in the capability. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1915 From: Date: Mon Nov 13, 2000 10:13am Subject: Chat Room Penetrates CIA Net http://washingtonpost.com/wp-dyn/articles/A64444-2000Nov11.html By Vernon Loeb Washington Post Staff Writer Sunday, November 12, 2000; Page A10 The CIA is investigating 160 employees and contractors for exchanging "inappropriate" e-mail and off-color jokes in a secret chat room created within the agency's classified computer network and hidden from management. CIA spokesman Bill Harlow said the willful "misuse of computers" did not "involve the compromise of any classified information." But the probe, nearing completion, involves employees at all levels of the agency, including some senior managers, and most likely will result in at least a few firings, agency officials said. "The serious thing for us is people willfully misusing the computer system and trying to hide what they were trying to do," said one intelligence official. "If they were doing this with the KGB's computer system, we'd be giving them medals. Sadly, it was ours." The House and Senate intelligence committees have been briefed about the secret chat room, which CIA investigators discovered while performing routine security checks, according to Harlow. "Investigators uncovered evidence of long-term misuse involving multiple violations of CIA computer regulations," Harlow said. An internal notice sent to all employees in May said, "This activity has apparently been taking place for some time and involves the use of unauthorized chat rooms and data bases in an apparent willful misuse of the agency's computer networks. Indeed, it appears that this group went to great lengths to conceal these actions. . . . Any attempts to alter or delete information on agency computer networks related to this investigation . . . could amount to a violation of federal criminal law." Since then, all 160 employees and contractors who participated in what officials describe as an "invitation only" communications channel have been interviewed and given five days to explain their conduct in writing. Several officials, including members of the Senior Intelligence Service, a cadre of career officers at the upper reaches of the civil service system, have been suspended with pay for the past six months while senior CIA officials try to determine what punishment is appropriate. Robert D. Steele, a former CIA case officer with extensive ties to the agency, declined to name any of those involved but described two of the most senior officials under investigation as "innovative, out-of-the-box, unconventional thinkers--these are essentially the hackers of the CIA, in the most positive sense of the word." One Capitol Hill source who has been briefed on the probe said it involves "some pretty clever people who know how to use computers creatively." The source said he thought the employees involved showed "bad judgment" and added that CIA officials have responded appropriately. But one recent CIA retiree with knowledge of the probe said employees who face disciplinary action and even dismissal have been investigated far more aggressively than former CIA director John M. Deutch, who admitted drafting top-secret cables on unsecure home computers and was stripped of his CIA security clearances last year. "Most of the employees involved are likely to have a letter of reprimand placed in their personnel file, which will quash their chances for promotion for at least a year and may adversely affect future assignment prospects," the CIA veteran said. The former officer said that by giving those under investigation only five days to respond to the charges against them, the CIA has "effectively denied them the opportunity to seek legal counsel," because lawyers typically must wait for months to obtain security clearances necessary to represent agency personnal. The former officer also said he doubts whether employees under investigation really were exchanging "secret" communications, because all senior CIA managers have a software program called "Shadow" that enables them to "remotely monitor every keystroke that their employees make." "It seems highly suspicious that all of those supervisors, not to mention the numerous component network administrators and security personnel, were unaware over a period of years of illicit computer usage by a group of 160 personnel," the former officer said. A CIA official responded that employees under investigation were operating beyond the normal reach of computer systems administrators. "These people were technically adept, and they went to great lengths to ensure that their efforts were not known to systems administrators. There are ways of monitoring things--if you know there is something to be monitored." In some of the e-mails reviewed by investigators from the CIA's Center for Security, the official said, those involved even wrote messages to the effect that, "If they ever catch us doing this, we'll be fired." The investigation is only the latest in a series of incidents involving misuse of computers at the CIA. Deutch's home computer security violations, discovered by CIA security officials when Deutch stepped down as director in December 1996, triggered a firestorm on Capitol Hill this year after a classified report by the CIA's inspector general was leaked to the media. The report concluded that CIA Director George J. Tenet and other senior officials did not adequately investigate and punish Deutch's security violations. The report also concluded that Deutch exposed highly classified intelligence to hacker attacks by drafting memos on three unsecure home computers linked to the Internet. In November 1996, one month before Deutch's violations were discovered, a CIA senior intelligence analyst was found to have written a document with the highest level of classification on his home computer, which was connected to the Internet. As in Deutch's case, members of the analyst's family had access to the computer. The analyst was demoted in rank and salary, given a letter of reprimand barring raises for two years, and suspended without pay for a month. After the suspension, the analyst's clearances were restored, and he retired from the agency a year later. Another CIA employee alleged in a lawsuit filed last year by Roy Krieger, an Alexandria lawyer, that she was disciplined for a "major lapse of CIA security" after the CIA sold 25 laptop computers at public auction "while still containing Top Secret information on their respective hard drives." The employee's complaint alleged that the security lapse was not detected until months later, when a private purchaser reported finding classified files in one of the computers. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 1916 From: Date: Tue Nov 14, 2000 0:15am Subject: Chat Room Penetrates CIA Net (fwd) http://washingtonpost.com/wp-dyn/articles/A64444-2000Nov11.html By Vernon Loeb Washington Post Staff Writer Sunday, November 12, 2000; Page A10 The CIA is investigating 160 employees and contractors for exchanging "inappropriate" e-mail and off-color jokes in a secret chat room created within the agency's classified computer network and hidden from management. CIA spokesman Bill Harlow said the willful "misuse of computers" did not "involve the compromise of any classified information." But the probe, nearing completion, involves employees at all levels of the agency, including some senior managers, and most likely will result in at least a few firings, agency officials said. "The serious thing for us is people willfully misusing the computer system and trying to hide what they were trying to do," said one intelligence official. "If they were doing this with the KGB's computer system, we'd be giving them medals. Sadly, it was ours." The House and Senate intelligence committees have been briefed about the secret chat room, which CIA investigators discovered while performing routine security checks, according to Harlow. "Investigators uncovered evidence of long-term misuse involving multiple violations of CIA computer regulations," Harlow said. An internal notice sent to all employees in May said, "This activity has apparently been taking place for some time and involves the use of unauthorized chat rooms and data bases in an apparent willful misuse of the agency's computer networks. Indeed, it appears that this group went to great lengths to conceal these actions. . . . Any attempts to alter or delete information on agency computer networks related to this investigation . . . could amount to a violation of federal criminal law." Since then, all 160 employees and contractors who participated in what officials describe as an "invitation only" communications channel have been interviewed and given five days to explain their conduct in writing. Several officials, including members of the Senior Intelligence Service, a cadre of career officers at the upper reaches of the civil service system, have been suspended with pay for the past six months while senior CIA officials try to determine what punishment is appropriate. Robert D. Steele, a former CIA case officer with extensive ties to the agency, declined to name any of those involved but described two of the most senior officials under investigation as "innovative, out-of-the-box, unconventional thinkers--these are essentially the hackers of the CIA, in the most positive sense of the word." One Capitol Hill source who has been briefed on the probe said it involves "some pretty clever people who know how to use computers creatively." The source said he thought the employees involved showed "bad judgment" and added that CIA officials have responded appropriately. But one recent CIA retiree with knowledge of the probe said employees who face disciplinary action and even dismissal have been investigated far more aggressively than former CIA director John M. Deutch, who admitted drafting top-secret cables on unsecure home computers and was stripped of his CIA security clearances last year. "Most of the employees involved are likely to have a letter of reprimand placed in their personnel file, which will quash their chances for promotion for at least a year and may adversely affect future assignment prospects," the CIA veteran said. The former officer said that by giving those under investigation only five days to respond to the charges against them, the CIA has "effectively denied them the opportunity to seek legal counsel," because lawyers typically must wait for months to obtain security clearances necessary to represent agency personnal. The former officer also said he doubts whether employees under investigation really were exchanging "secret" communications, because all senior CIA managers have a software program called "Shadow" that enables them to "remotely monitor every keystroke that their employees make." "It seems highly suspicious that all of those supervisors, not to mention the numerous component network administrators and security personnel, were unaware over a period of years of illicit computer usage by a group of 160 personnel," the former officer said. A CIA official responded that employees under investigation were operating beyond the normal reach of computer systems administrators. "These people were technically adept, and they went to great lengths to ensure that their efforts were not known to systems administrators. There are ways of monitoring things--if you know there is something to be monitored." In some of the e-mails reviewed by investigators from the CIA's Center for Security, the official said, those involved even wrote messages to the effect that, "If they ever catch us doing this, we'll be fired." The investigation is only the latest in a series of incidents involving misuse of computers at the CIA. Deutch's home computer security violations, discovered by CIA security officials when Deutch stepped down as director in December 1996, triggered a firestorm on Capitol Hill this year after a classified report by the CIA's inspector general was leaked to the media. The report concluded that CIA Director George J. Tenet and other senior officials did not adequately investigate and punish Deutch's security violations. The report also concluded that Deutch exposed highly classified intelligence to hacker attacks by drafting memos on three unsecure home computers linked to the Internet. In November 1996, one month before Deutch's violations were discovered, a CIA senior intelligence analyst was found to have written a document with the highest level of classification on his home computer, which was connected to the Internet. As in Deutch's case, members of the analyst's family had access to the computer. The analyst was demoted in rank and salary, given a letter of reprimand barring raises for two years, and suspended without pay for a month. After the suspension, the analyst's clearances were restored, and he retired from the agency a year later. Another CIA employee alleged in a lawsuit filed last year by Roy Krieger, an Alexandria lawyer, that she was disciplined for a "major lapse of CIA security" after the CIA sold 25 laptop computers at public auction "while still containing Top Secret information on their respective hard drives." The employee's complaint alleged that the security lapse was not detected until months later, when a private purchaser reported finding classified files in one of the computers. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 1917 From: Date: Tue Nov 14, 2000 4:28am Subject: this is good - humor Al Gore and the Clinton's are flying on Air Force One. Bill looks at Al, and chuckles and says, "You know I could throw a $10,000 dollar bill out the window right now and make one person very happy." Al shrugs his stiff shoulders and says, "Well I could throw ten $1,000 bills out the window and make 10 people very happy." Hillary tosses her perfectly sprayed hair and says, "Of course, then, I could throw one hundred $100 bills out the window and make one hundred people very happy." Chelsea rolls her eyes, looks at all of them and says, "I could throw all of you out the window and make the WHOLE COUNTRY HAPPY!" 1918 From: Dawn Star Date: Tue Nov 14, 2000 10:35am Subject: Cell Site Locating Steve: any idea if this was accomplished with CALEA technology or just asking his personal service provider to map sites Roger Subject: Balto TV news spot on cell intercept Hello list, Tonight (Monday the 13th) on Baltimore TV Channel 11 at 6PM should be a short news item on how cellular intercept technology assisted in locating and locking up the suspect in the October 30th killing of Maryland State Police Cpl Toatley in a drug raid. Through traditional investigation, the suspect was anticipated to be in the New York State area. Pinging his cell phone for location and monitoring the content of his calls placed him in NYC, where he was arrested early this morning. There was a lot more to it than just mentioned, but that was the bottom line. TV 11 is expected to have a (very) short interview of me briefly discussing how this was done. As normally happens, a 30 minute interview likely will be condensed to 30 seconds on the air. Cell intercept is available to law enforcement only, but y'all may be interested in the capability. Regards ... Steve [Non-text portions of this message have been removed] 1919 From: Gregory Horton Date: Tue Nov 14, 2000 2:02pm Subject: Spy Bird Interesting article http://www.abcnews.go.com/sections/world/DailyNews/india_falcon001114.html Spy Bird Has Wings Clipped The Capture in India of a Bird Rigged with Spy Equipment Has Ruffled Feathers J A I P U R, India, Nov. 14 ≠ India has captured a falcon fitted with a tiny antenna and a powerful radio transmitter which officials suspect was used by Pakistan for cross-border spying, a senior officer said today. The bird was picked up by Border Security Force (BSF) personnel near the border outpost of Kharia in Jaisalmer in the western desert state of Rajasthan on Monday. ìWe seized a falcon near the border outpost about one or two km inside our territory,î BSF Deputy Inspector General B.D. Sharma told Reuters. ìThe seized falcon is a highly trained bird, fitted with a high-frequency transmitter and a metal ring.î Bye-Bye Birdie He said the BSF suspected that the falcon, which was caught after being lured by meat and bread, had been trained by Pakistani Rangers to spy on Indian activities in border areas. ìWe have a strong suspicion that the falcon was being used by the Pakistani Rangers to spy on us. We are setting up a detailed technical inquiry with the help of other agencies to look into the matter,î he said. Flighty Falcons It was the third time this year that falcons fitted with electronic gadgets had been seized near the border between India and Pakistan, which have fought three wars since they won independence from Britain in 1947. ìWhat is interesting is that within 15 minutes of our seizing the falcon we received a request from the Pakistani Rangersî for a meeting which was refused, Sharma said. He said the Rangers also spoke of ìone of their birds crossing the border.î ìWhy should they be so interested in a falcon?î he said. ìThere must be something fishy in it.î 1920 From: Mike Date: Tue Nov 14, 2000 9:24am Subject: Re: Chat Room Penetrates CIA Net (fwd) hmm-m- Just fire all 160 of em and replace them with out of work KGB people. We'd likely end up better off! (:~)) Nuff Said- Bootleg ----- Original Message ----- From: To: Sent: Monday, November 13, 2000 10:15 PM Subject: [TSCM-L] Chat Room Penetrates CIA Net (fwd) > > http://washingtonpost.com/wp-dyn/articles/A64444-2000Nov11.html > > By Vernon Loeb > Washington Post Staff Writer > Sunday, November 12, 2000; Page A10 > > The CIA is investigating 160 employees and contractors for exchanging > "inappropriate" e-mail and off-color jokes in a secret chat room > created within the agency's classified computer network and hidden > from management. > > CIA spokesman Bill Harlow said the willful "misuse of computers" did > not "involve the compromise of any classified information." > > But the probe, nearing completion, involves employees at all levels of > the agency, including some senior managers, and most likely will > result in at least a few firings, agency officials said. > > "The serious thing for us is people willfully misusing the computer > system and trying to hide what they were trying to do," said one > intelligence official. "If they were doing this with the KGB's > computer system, we'd be giving them medals. Sadly, it was ours." > > The House and Senate intelligence committees have been briefed about > the secret chat room, which CIA investigators discovered while > performing routine security checks, according to Harlow. > > "Investigators uncovered evidence of long-term misuse involving > multiple violations of CIA computer regulations," Harlow said. > > An internal notice sent to all employees in May said, "This activity > has apparently been taking place for some time and involves the use of > unauthorized chat rooms and data bases in an apparent willful misuse > of the agency's computer networks. Indeed, it appears that this group > went to great lengths to conceal these actions. . . . Any attempts to > alter or delete information on agency computer networks related to > this investigation . . . could amount to a violation of federal > criminal law." > > Since then, all 160 employees and contractors who participated in what > officials describe as an "invitation only" communications channel have > been interviewed and given five days to explain their conduct in > writing. > > Several officials, including members of the Senior Intelligence > Service, a cadre of career officers at the upper reaches of the civil > service system, have been suspended with pay for the past six months > while senior CIA officials try to determine what punishment is > appropriate. > > Robert D. Steele, a former CIA case officer with extensive ties to the > agency, declined to name any of those involved but described two of > the most senior officials under investigation as "innovative, > out-of-the-box, unconventional thinkers--these are essentially the > hackers of the CIA, in the most positive sense of the word." > > One Capitol Hill source who has been briefed on the probe said it > involves "some pretty clever people who know how to use computers > creatively." The source said he thought the employees involved showed > "bad judgment" and added that CIA officials have responded > appropriately. > > But one recent CIA retiree with knowledge of the probe said employees > who face disciplinary action and even dismissal have been investigated > far more aggressively than former CIA director John M. Deutch, who > admitted drafting top-secret cables on unsecure home computers and was > stripped of his CIA security clearances last year. > > "Most of the employees involved are likely to have a letter of > reprimand placed in their personnel file, which will quash their > chances for promotion for at least a year and may adversely affect > future assignment prospects," the CIA veteran said. > > The former officer said that by giving those under investigation only > five days to respond to the charges against them, the CIA has > "effectively denied them the opportunity to seek legal counsel," > because lawyers typically must wait for months to obtain security > clearances necessary to represent agency personnal. > > The former officer also said he doubts whether employees under > investigation really were exchanging "secret" communications, because > all senior CIA managers have a software program called "Shadow" that > enables them to "remotely monitor every keystroke that their employees > make." > > "It seems highly suspicious that all of those supervisors, not to > mention the numerous component network administrators and security > personnel, were unaware over a period of years of illicit computer > usage by a group of 160 personnel," the former officer said. > > A CIA official responded that employees under investigation were > operating beyond the normal reach of computer systems administrators. > "These people were technically adept, and they went to great lengths > to ensure that their efforts were not known to systems administrators. > There are ways of monitoring things--if you know there is something to > be monitored." > > In some of the e-mails reviewed by investigators from the CIA's Center > for Security, the official said, those involved even wrote messages to > the effect that, "If they ever catch us doing this, we'll be fired." > > The investigation is only the latest in a series of incidents > involving misuse of computers at the CIA. Deutch's home computer > security violations, discovered by CIA security officials when Deutch > stepped down as director in December 1996, triggered a firestorm on > Capitol Hill this year after a classified report by the CIA's > inspector general was leaked to the media. > > The report concluded that CIA Director George J. Tenet and other > senior officials did not adequately investigate and punish Deutch's > security violations. The report also concluded that Deutch exposed > highly classified intelligence to hacker attacks by drafting memos on > three unsecure home computers linked to the Internet. > > In November 1996, one month before Deutch's violations were > discovered, a CIA senior intelligence analyst was found to have > written a document with the highest level of classification on his > home computer, which was connected to the Internet. As in Deutch's > case, members of the analyst's family had access to the computer. > > The analyst was demoted in rank and salary, given a letter of > reprimand barring raises for two years, and suspended without pay for > a month. After the suspension, the analyst's clearances were restored, > and he retired from the agency a year later. > > Another CIA employee alleged in a lawsuit filed last year by Roy > Krieger, an Alexandria lawyer, that she was disciplined for a "major > lapse of CIA security" after the CIA sold 25 laptop computers at > public auction "while still containing Top Secret information on their > respective hard drives." > > The employee's complaint alleged that the security lapse was not > detected until months later, when a private purchaser reported finding > classified files in one of the computers. > > > *==============================================================* > "Communications without intelligence is noise; Intelligence > without communications is irrelevant." Gen Alfred. M. Gray, USMC > ================================================================ > C4I.org - Computer Security, & Intelligence - http://www.c4i.org > *==============================================================* > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1921 From: Mike Date: Tue Nov 14, 2000 4:20pm Subject: Re: Cell Site Locating Pagers such as Motorolas FLEX/REFLEX models that allow 2 way messaging can also be tracked the same way. They contain FSK circuitry that allow mods to be done to a pager allowing a variety of interesting capabilities with computer interfaceing. These include POSAG demodulation, Tracking, logging, taping and surveillance. Much like the old DDI/D, but compact. It can be a simply modified FLEX pager hooked up to a CE device, palm computer or laptop. Using it in your vehicle, you can track and triangulate on your targets pager along with intercepting all phone numbers and messages. This and other interesting devices can be found at this page. www.aztechresearch.com The above device was nearly ready for production the last time I talked with them. They also sell a device for cellular thats similiar but expensive. You'll see that item on their page with a few other models. Their cellular analyzer is being discontinued-but they partially disable its reading of the full ESN anyway. (Likely hacking the EEPROM and re-writing a small part would give it full capabilities.) As for the FLEX/REFLEX stuff, see Motorolas excellent tech docs and especially their Developer support programs/docs and user groups. That should tell you what you need to know to homebrew a few mods yourself easily. Motorola really gives you EVERYTHING in the way of info, docs, programs, etc. that you need. LOTS of REAL interesting things and possibilities there. Follow ALL the links! (:~)) Nuff Said- Bootleg PS - Much of the cell tracking stuff was done as far back as the mid-late 80's. They started installing the cell sites and repeaters in 1985 and the cell phones came out right afterwards. I KNOW as I social engineered a VP from ITT for a personal referral to a "Camps" bigshot that then sent me a big cardboard box filled with all the technicians repair/installation manuals for the Camps Cellular sites being newly installed in 1985. (smiles...) Told him I was a consultant for a BIG South American Country that was real interested in their system. It WORKED! Sales Reps often will give you tons of tech manuals on their newest stuff without ever checking you out. Been doing it for decades. The best Company security in the world is often compromised by Greedy Sales Reps. Make your sale sound REAL big, and deal with the sales VP. He's even easier than the lower level reps and managers. I bought a DDI/D 6 months after they first came out. Now look at http://null.ru/zzz/krencel/ for stuff dirt cheap out of Russia. (If it's a real ad?) This is a nice example of equipment at far lower prices than similiar items. Most of the mods are eprom rewrites. ----- Original Message ----- From: Dawn Star To: Sent: Tuesday, November 14, 2000 8:35 AM Subject: [TSCM-L] Cell Site Locating > Steve: any idea if this was accomplished with CALEA technology or just asking his personal service provider to map sites Roger > > Subject: Balto TV news spot on cell intercept > > Hello list, > > Tonight (Monday the 13th) on Baltimore TV Channel 11 at 6PM > should be a short news item on how cellular intercept technology > assisted in locating and locking up the suspect in the October > 30th killing of Maryland State Police Cpl Toatley in a drug > raid. > > Through traditional investigation, the suspect was anticipated > to be in the New York State area. Pinging his cell phone for > location and monitoring the content of his calls placed him in > NYC, where he was arrested early this morning. > > There was a lot more to it than just mentioned, but that was the > bottom line. > > TV 11 is expected to have a (very) short interview of me briefly > discussing how this was done. As normally happens, a 30 minute > interview likely will be condensed to 30 seconds on the air. > > Cell intercept is available to law enforcement only, but y'all > may be interested in the capability. > > Regards ... Steve > > > > > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > From: Matthew Paulsen Date: Mon Nov 5, 2001 11:11am Subject: RE: Deatyh threats by e-mail If the threats are credible, contact your local FBI office or Secret Service office. Email threats are criminal offenses which the FBI handles. Here's a conviction in an online threat case: http://news.cnet.com/news/0,10000,0-1005-200-326457,00.html "The traditional legal principles that apply to any communication medium are going to apply to the Internet," Gabriel Jack Chan, a professor at Western New England College School of Law Last thought - If it is originating outside the state you live it, it's crossing state borders which should? place it under federal jurisdiction. -----Original Message----- From: DrPepper [mailto:DrPepper@i...] Sent: Monday, November 05, 2001 9:06 AM To: TSCM-L Subject: [TSCM-L] Deatyh threats by e-mail OK, folks, , , , , , , What to do about threatening emails?? I have received several death threats from some jerk near Boston. He won't stop the threatening emails. I don't know him, never heard of him and I don't have any idea of why he is doing this His isp is Juno, and I've contacted them and they seem to be dragging their feet. Local copshop would not be interested in helping, I'm sure, since I live in California. The frustrating part of this, is that I don't have a clew as to why he is hassling me, and he won't answer, other than to send more death threats. He has called me "dr.pepper", and not by name, so I am guessing he has the wrong "DrPepper", but I'm clewless and more curious than anything else. his email is: strayredhen@j... and the extended header says it's from the Boston area. Anybody care to comment?? Thanx -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L "War is an ugly thing, but not the ugliest of things: the decayed and degraded state of moral and patriotic feelings which thinks that nothing is worth war is much worse. A man who has nothing for which he is willing to fight; nothing he cares about more than his own personal safety; is a miserable creature who has no chance of being free, unless made and kept so by the exertions and blood of better men than himself." - John Stuart Mill =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4053 From: James M. Atkinson Date: Mon Nov 5, 2001 2:39pm Subject: List Membership Stats Good Afternoon, I have recently gotten quite a few questions about the number of subscribers on this list an figure it would be wise to post the following information. List membership is currently 1072 subscribers, which breaks down to 1051 active subscribers, 18 bouncing subscribers, plus 3 subscribers just approved. At any given time 15-20 subscribers are temporarily bouncing, but the bounce clears typically in 2-3 days. We typically pick up an average of 8-9 subscribers per week, and loose 3-4 (most of whom had just joined). The end result is that the list shows permanent growth of 5-6 people per week. A little over 1/3 of the list is government TSCM, TEMPEST, EMINT, and SIGINT from the US, UK, Canada, or Australia (which creates the SPOKE subset). The list is for "hardcore TSCM people" and goes out to a worldwide audience. It is quite frankly the largest, and most popular forum on the subject matter. In a nutshell the list is dedicated to subjects relative to "hunting spies by seeking out their electronics". -jma -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4054 From: factfind Date: Mon Nov 5, 2001 8:30pm Subject: Interesting site I believe that the membership will find this site and the links it contains quite interesting and even useful. Good hunting. Fraternally Dave Linsky SSC Security and Investigations http://www.c4i.org/ [Non-text portions of this message have been removed] 4055 From: Dawn Star Date: Tue Nov 6, 2001 7:34am Subject: Cyber Sweeper Over the weekend I was sweeping some executive offices at a major Hollywood film studio. When I got to the telephone switch room it looked like launch control in Houston. This studio does a lot of digital special effects so there was tons of computers and miles of patch bay spaghetti. Anyway, the phone switch is a NEC NEAX 2400 IMS (Integrated multi media exchange). Now this thing is a mind blower for an old sweeper of 28 years. All the phone calls live and are stored (voice mail) in cyber space. Even though the executives have 7 digit trunk numbers, all incomings come in on the DID trunks at random and all dial 9 outgoing go out on random available outgoing trunks. All communications to the stations are digital. Literally a trunk side phone call lives outside the switch in no predictable place. These switches have to be attacked though software manipulation. The service/ repair/ programming manuals for the switch were in the switch room. When you put them one atop another they were 10 inches high. So I am bringing in an outside NEC specialist to dump and audit the relevant software. I guess soon I'll be remembering the good old days of punch blocks, wires, and analog, something you used to be able physically relate to. Oh well! Roger Tolces Electronic Security www.bugsweeps.com 4056 From: DrPepper Date: Tue Nov 6, 2001 9:02am Subject: Re: Deatyh threats by e-mail Thanx, since I keep getting these once per day, I think I'll do just that. The one this morning makes me tend to believe that he might be on this list. His "name is 'Red' Killlian, and he lives around the Boston area. Ron C. ====================================== Matthew Paulsen wrote: > If the threats are credible, contact your local FBI office or Secret Service > office. Email threats are criminal offenses which the FBI handles. > > Here's a conviction in an online threat case: > http://news.cnet.com/news/0,10000,0-1005-200-326457,00.html "The > traditional legal principles that apply to any communication medium are > going to apply to the Internet," Gabriel Jack Chan, a professor at Western > New England College School of Law > > Last thought - If it is originating outside the state you live it, it's > crossing state borders which should? place it under federal jurisdiction. > -----Original Message----- > From: DrPepper [mailto:DrPepper@i...] > Sent: Monday, November 05, 2001 9:06 AM > To: TSCM-L > Subject: [TSCM-L] Deatyh threats by e-mail > > OK, folks, , , , , , , > > What to do about threatening emails?? > > I have received several death threats from some jerk > near Boston. > He won't stop the threatening emails. > I don't know him, never heard of him and I don't have any > idea of why he is doing this > > His isp is Juno, and I've contacted them and they seem to > be dragging their feet. > > Local copshop would not be interested in helping, I'm sure, > since I live in California. > > The frustrating part of this, is that I don't have a clew as to > why he is hassling me, and he won't answer, other than > to send more death threats. > > He has called me "dr.pepper", and not by name, so I am > guessing he has the wrong "DrPepper", but I'm clewless > and more curious than anything else. > > his email is: > strayredhen@j... > and the extended header says it's from the Boston area. > Anybody care to comment?? > > Thanx > -- > Dr Pepper aka WB6GKI > in the High Desert of California. > Check out my LIVE Hamshack Cam at: > http://www1.iwvisp.com/DrPepper/ham/ham.htm > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > "War is an ugly thing, but not the ugliest of things: the decayed and > degraded state of moral and patriotic feelings which thinks that nothing is > worth war is much worse. A man who has nothing for which he is willing to > fight; nothing he cares about more than his own personal safety; is a > miserable creature who has no chance of being free, unless made and kept so > by the exertions and blood of better men than himself." - John Stuart Mill > > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > "War is an ugly thing, but not the ugliest of things: the decayed and degraded state of moral and patriotic feelings which thinks that nothing is worth war is much worse. A man who has nothing for which he is willing to fight; nothing he cares about mor > > e than his own personal safety; is a miserable creature who has no chance of being free, unless made and kept so by the exertions and blood of better men than himself." - John Stuart Mill > > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ - 4057 From: Aimee Farr Date: Tue Nov 6, 2001 10:27am Subject: *BOOM!* All the civil lib talk regarding sneak and peek is radicalizing fringe groups and sensitizing them to countermeasures. Conversations of checks...vid -- and I strongly suspect booby trap talk. (I have a research interest in groups under surveillance/impression of surveillance.) The only booby trap I recognize is a "water bra." I hope guys doing surreptitious entry under increased surveillance powers are afforded better recognition training. No doubt some of you are important resources as to these matters, and I hope that your expertise is being sought. Below is a good case clip on vid. I disagree with the court's opinion in this instance, but I can't disagree with the risks in covert entry: @ http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=ma&vol=sjcslip/8429&i nvol=1 "...Followed to its logical conclusion, the dissent would encourage drug manufacturers to mount hidden video cameras in their facilities so they can capture the moment of truth when the police execute a search warrant and would authorize drug dealers secretly to tape record conversations with suspected undercover officers or with informants in order to protect the dealers' rights against hypothetical police abuse. Numerous other examples exist. The point is an obvious one. Every police encounter would be available for secret recording..." ----- This judge is seriously behind the times. (Pardon the civie-female-hand-wringing. Just worries me.) ~Aimee 4058 From: A Grudko Date: Tue Nov 6, 2001 7:16am Subject: Cat to bug Russians - Original Message - From: James M. Atkinson > CIA recruited cat to bug Russians James, I won't post this to the list but I know you have a G17 Secret Squirrel clearance. ------ To: Chief of Staff From : Deputy Director Borger 04/11/2001 - FTCBL664 Re: Biotech implant program Sir After the failure of Projects Acoustic Kitty and Video Feline and the embarassing incident where President Clinton missunderstood the aims of Project AV Pussy, I am pleased to report that Project Super Hump is ready to roll out. The electroneural optical and auditory nerve connections of the test camels were fully functional within minutes of installation for forward AV observation. The mini dish antenna, batteries, transmitter and solar panels were installed in the hump and all scar tissue was fully healed in 4 days. Tests in our deserts showed that 5 hours of sunlight provided 2 days' battery power. Unfortunatly the Rear Observation Camera has had to be abandoned as a study of the recreational activities of Al-Qudar showed that the lense would be located within 48 hours (detection rates appeared similar between male and female camels). 4059 From: A Grudko Date: Tue Nov 6, 2001 0:34pm Subject: Suspect it is hostile until... - Original Message - From: James M. Atkinson > Suspect it is hostile until you can prove otherwise. > >- Original Message - > >From: A Grudko > >> I'm off this afternoon with my cable tracer to find out where a suspicious > >> 'double jumper' leads. I found it on a PABX frame last week Talking to a potential investor today (from within the investigation industry) about the cost of updating my TSCM equipment he asked me, "Will your equipment find any bug?"...Hmmm Just to give some undramatic but curious feedback on that suspicious cable - perhaps a reminder of the needs to: Search Plan* Take nothing for granted: 1) Sweep performed evening of 19 Oct - located suspicious but perfectly installed 'Double Jumper' - extension tag not identified. 2) After management fiddled about to get the budget we returned evening of 31 Oct, just me, technician, security & cleaners. The DJ has gone! The original wires were there but one showed a tight 'kink' which was not there before; possibly it came off when removing the DJ and was reinstalled using needle-nosed pliers, not a Krone tool. 3) Put my handset on and got a message (Padlock on - dial 77 to unlock). Check the switchboards - both on night service, no extension display. 4) The operator's extension list is on a PC - no hard copy around. Password protected. I'm starting to mutter seaman's curses under my breath. Techie and I start searching offices for extension lists. Find numerous versions - I take the latest one. This is a 12 storey building, 140 incoming lines plus (digital, analogue, ISDN, data & tie lines) and about 800 extensions. 5) Toned the cable through the rack jumpers , to the floor cupboards on every floor - no diversions, straight up the unopened riser cable to the 7th floor - and off to a maze of locked rooms, some of which the grandmaster wouldn't open - one being the Director. The purloined phone list does not show floors but it shows departments. 6) Phone client - now he's getting excited. Get important names and department name. Hook up TLA to suspect tag (didn't have a loose 20cent neon on me!). Connect handset and start power dialling - give up exasperated after 30 minutes. 7) Morning of Nov. 1st - client bubbling, my report and other papers in his hand. In the bowels of the building I explain the procedures I used to the client, show him the kinked wire. We clip on the handset, dial 9 for the operator and discover the extension is No. 1234, an admin. person unlikely to be tapped. Perhaps a temporary repair - a temporary extension or accessory? 8) Client produces copy of security log - two people have entered the PABX (officially) since the 19th. 9) Up the stairs to the telephone system manager - no, no faults reported for extn. 1234. Both technicians in for known upgrades. 10) Q&A session to try and work out what it all means - well, maybe one of the technicians was paid to tap the admin. person. He could have entered on an upgrade pretext, or maybe he had made a copy of the key. Or a former technician might have kept a copy. Or a pro might have picked his way through the 2 7 pin locks (PABX is not alarmed). But the point is, if the admin. person was tapped it could be the Chairman next time. So for my next report I put on my security & surveillance hat to make recommendations. I think I made 3 mistakes a) I think I could have planned* it better :-) b) I should have traced the cable when found - but I would have been way over budget c) I've never found an anomaly in this building before in 7 years - so I left my camera behind! Regards from a sweltery South African evening. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigation Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4060 From: Aimee Farr Date: Tue Nov 6, 2001 1:01pm Subject: Hm. Several members of TSCM-L emailed me offlist to inquire as to the nature of the "water bra" booby trap I referenced. A few expressed extreme concern as to the nature of this heretofore unknown threat. I would like to reply to them en banc: Victoria's Secret appears to be the underground headquarters for obtaining "water bra" booby traps. I believe they sell a wide range of feminine deception devices aimed at trapping men and blowing them up. It was a play on words, meaning that I don't know the first thing about booby traps, aside from that one. It's okay, you're not supposed to know about them. (Classified.) My sincere apologies for giving rise to confusion. ~Aimee 4061 From: DrPepper Date: Tue Nov 6, 2001 1:26pm Subject: re Hm. Well, actually, Aimee, , , , , I think that this subject has been grossly over-inflated. The concern for these "bobby traps" is way out of proportion to it's actual size. As a mater of fact., I happen to personally know the woman who started this rumor, and you can see a picture of her at: http://www1.iwvisp.com/DrPepper/jokes/jugs.jpg I hope that this will put this discussion back into proportion to it's actual size. Ron C. ================================================= Several members of TSCM-L emailed me offlist to inquire as to the nature of the "water bra" booby trap I referenced. A few expressed extreme concern as to the nature of this heretofore unknown threat. I would like to reply to them en banc: Victoria's Secret appears to be the underground headquarters for obtaining "water bra" booby traps. I believe they sell a wide range of feminine deception devices aimed at trapping men and blowing them up. It was a play on words, meaning that I don't know the first thing about booby traps, aside from that one. It's okay, you're not supposed to know about them. (Classified.) My sincere apologies for giving rise to confusion. ~Aimee - 4062 From: James M. Atkinson Date: Tue Nov 6, 2001 1:31pm Subject: Re: Suspect it is hostile until... My rule of thumb on such matter is to go ahead and spend the extra time; but don't charge the customer or exceed their budgeted amount you initially gave them. When you run over a little bit on time, simply eat the difference. Now in cases where the client misrepresented something to you, or you find an anomaly there need to be consideration for such things in your initial quote. -jma At 8:34 PM +0200 11/6/01, A Grudko wrote: >- Original Message - >From: James M. Atkinson >> Suspect it is hostile until you can prove otherwise. > >> >- Original Message - >> >From: A Grudko >> >> I'm off this afternoon with my cable tracer to find out where a >suspicious >> >> 'double jumper' leads. I found it on a PABX frame last week > >Talking to a potential investor today (from within the investigation >industry) about the cost of updating my TSCM equipment he asked me, "Will >your equipment find any bug?"...Hmmm > > >Just to give some undramatic but curious feedback on that suspicious cable - >perhaps a reminder of the needs to: > >Search >Plan* >Take nothing for granted: > >1) Sweep performed evening of 19 Oct - located suspicious but perfectly >installed 'Double Jumper' - extension tag not identified. >2) After management fiddled about to get the budget we returned evening of >31 Oct, just me, technician, security & cleaners. The DJ has gone! The >original wires were there but one showed a tight 'kink' which was not there >before; possibly it came off when removing the DJ and was reinstalled using >needle-nosed pliers, not a Krone tool. >3) Put my handset on and got a message (Padlock on - dial 77 to unlock). >Check the switchboards - both on night service, no extension display. >4) The operator's extension list is on a PC - no hard copy around. Password >protected. I'm starting to mutter seaman's curses under my breath. Techie >and I start searching offices for extension lists. Find numerous versions - >I take the latest one. This is a 12 storey building, 140 incoming lines >plus (digital, analogue, ISDN, data & tie lines) and about 800 extensions. >5) Toned the cable through the rack jumpers , to the floor cupboards on >every floor - no diversions, straight up the unopened riser cable to the 7th >floor - and off to a maze of locked rooms, some of which the grandmaster >wouldn't open - one being the Director. >The purloined phone list does not show floors but it shows departments. >6) Phone client - now he's getting excited. Get important names and >department name. Hook up TLA to suspect tag (didn't have a loose 20cent neon >on me!). Connect handset and start power dialling - give up exasperated >after 30 minutes. >7) Morning of Nov. 1st - client bubbling, my report and other papers in his >hand. In the bowels of the building I explain the procedures I used to the >client, show him the kinked wire. We clip on the handset, dial 9 for the >operator and discover the extension is No. 1234, an admin. person unlikely >to be tapped. Perhaps a temporary repair - a temporary extension or >accessory? >8) Client produces copy of security log - two people have entered the PABX >(officially) since the 19th. >9) Up the stairs to the telephone system manager - no, no faults reported >for extn. 1234. Both technicians in for known upgrades. >10) Q&A session to try and work out what it all means - well, maybe one of >the technicians was paid to tap the admin. person. >He could have entered on an upgrade pretext, or maybe he had made a copy of >the key. Or a former technician might have kept a copy. >Or a pro might have picked his way through the 2 7 pin locks (PABX is not >alarmed). >But the point is, if the admin. person was tapped it could be the Chairman >next time. > >So for my next report I put on my security & surveillance hat to make >recommendations. > >I think I made 3 mistakes >a) I think I could have planned* it better :-) >b) I should have traced the cable when found - but I would have been way >over budget >c) I've never found an anomaly in this building before in 7 years - so I >left my camera behind! > > >Regards from a sweltery South African evening. > >Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , >Est. 1981 >International business intelligence and investigation >Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 >0255 - 244 0256 (Fax) >SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom >When you need it done right - first time -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4063 From: James M. Atkinson Date: Tue Nov 6, 2001 2:32pm Subject: Not Guilty Plea in NRO Espionage Case - Retired Air Force Sergeant Accused of Trying to Sell Secrets Not Guilty Plea in NRO Espionage Case http://www.washingtonpost.com/wp-dyn/articles/A45114-2001Nov5.html Retired Air Force Sergeant Accused of Trying to Sell Secrets By Brooke A. Masters Washington Post Staff Writer Tuesday, November 6, 2001; Page B05 A retired Air Force master sergeant who worked at the super-secret National Reconnaissance Office pleaded not guilty yesterday to charges of attempted espionage. Brian P. Regan, 39, of Bowie, did not speak at his brief arraignment in federal court in Alexandria. But his attorney, Nina Ginsberg, requested a jury trial, and U.S. District Judge Gerald Bruce Lee set a March 4 trial date and a pretrial hearing date of Dec. 14. Regan was intercepted by the FBI at Dulles International Airport on Aug. 23 as he was taking a mobile lounge to board a Lufthansa flight to Frankfurt and Zurich, according to authorities. At the time, he was allegedly carrying the coordinates of two foreign countries' missile sites and the addresses of Chinese and Iraqi embassies in Europe, according to a grand jury indictment. Law enforcement sources said the FBI believes that Regan, who developed expertise in signals intelligence and air defense systems in the Middle East during a 20-year military career, was caught before he did much damage. But he allegedly amassed a cache of documents with the hope of selling them to countries such as Libya, China and Iraq, according to court papers. Prosecutors allege that Regan, who had top-secret security clearance before his retirement from the Air Force in August 2000, began surfing the classified U.S. intelligence network known as Intelink in 1999, looking for information about the military preparedness of China, Iran, Iraq and Libya. A year after he retired, he regained his security clearance while working in the same office as a contract employee for TRW Inc., and he surfed the classified network in the three weeks before his arrest, viewing classified satellite images of missile facilities and launch preparations of two unnamed countries and taking notes, the indictment said. Assistant U.S. Attorney Patricia Haynes declined to comment on the case, and Ginsberg did not return calls. Regan drew the attention of investigators after the United States learned that Libya had classified U.S. documents and that Libyan officials had received encrypted messages telling them to contact a free e-mail account under the name "Steve Jacobs," court documents say. FBI agents determined that the Jacobs account was accessed from public libraries in Crofton, Falls Church and Prince George's County. The two Maryland libraries are within five miles of Regan's Bowie home; the Falls Church library is on his commuting route. In June, FBI agents watched Regan use public-access computer terminals in the Crofton library to look up the addresses of the Iraqi and Libyan embassies in France, Germany and Switzerland, the 16-page indictment said. On June 26, Regan flew to Germany for a week-long private trip. Regan was arrested at Dulles after he bought another plane ticket to Germany. He had told co-workers he was taking time off to take his four children to Disney World. C 2001 The Washington Post Company -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4064 From: James M. Atkinson Date: Tue Nov 6, 2001 2:33pm Subject: Wiretap authorized in U.S. 'illegal,': Clark's lawyer Wiretap authorized in U.S. 'illegal,': Clark's lawyer http://www.canada.com/vancouver/vancouversun/story.asp?id={555C63A0-1D7D-43F0-952A-187C235EA2DF} Police went to Palm Springs, where judge was on vacation Neal Hall Vancouver Sun Tuesday, November 06, 2001 The wiretap authorization involving former B.C. premier Glen Clark was illegal because it was approved by a vacationing judge in California who had no jurisdiction to convene court outside of Canada, Clark's lawyer told a pre-trial hearing Monday. "It's unthinkable, almost, that this court can sit wherever it wants to," David Gibbons argued before B.C. Supreme Court Justice Elizabeth Bennett. The defence lawyer pointed out that three police investigators, a special prosecutor and an agent acting for the attorney-general of B.C. flew on an RCMP jet to visit B.C. Supreme Court Associate Chief Justice Patrick Dohm while he was vacationing in Palm Springs. Dohm authorized police on Feb. 14, 1999, to secretly listen to the phone calls of Dimitrios Pilarinos and others. Gibbons argued Monday that the investigators, special prosecutor and attorney- general's representative were illegally working in Palm Springs without "green cards." "None of them had any special authorization to work there," he told the court. Outside court, Gibbons told reporters the wiretap evidence ought to be excluded because it was illegally obtained. The issue, he said, is that when police invade a person's privacy, it must be done lawfully and properly. He said he has never heard of a Canadian court proceeding being held outside Canada without the permission of foreign authorities. "I mean, I wouldn't mind having my trials right now in southern California either. It would be great. I'd love it. Fiji would be even nicer," Gibbons said. If the wiretap evidence was excluded, the trial would still proceed, he said. "My client was only heard once on the wiretap and it was an inconsequential conversation." Gibbons was also critical of the police investigators not keeping any notes or recordings of private conversations with the judge vacationing in Palm Springs. "It is my own view that all discussions in regard to this matter should be kept as part of the record so they can be reviewed by citizens later on. And this case is a good case of an example of why that's necessary." Pilarinos and Clark are expected to begin their trial later this month on an 11-count indictment that contains charges of fraud and breach of trust. The Crown alleges Pilarinos offered a benefit to Clark in the form of home renovations to Clark's East Vancouver home and Penticton summer cottage, as well as a 15-per-cent share in the casino profits. At the time, Clark was premier and Pilarinos was part of a Burnaby casino licence application being considered by government. For almost a month, the lawyers for Clark and Pilarinos have been challenging the validity of the wiretap authorization. RCMP Corporal John Taylor, the officer who swore an affidavit used to obtain the wiretap authorization, was cross-examined for more than two weeks. As well as challenging Dohm's jurisdiction to conduct hearings outside Canada, the defence lawyers claim police did not provide the judge with full disclosure of the investigation before he approved the wiretap. He also pointed out that the special prosecutor, Martin Taylor, was a former B.C. Court of Appeal judge who selected Dohm as the judge to authorize the wiretap. Police continued using Dohm to authorize warrants after he went on vacation, said Gibbons, who suggested police could have requested any of the 60-plus other judges of the B.C. Supreme Court to hear further applications after Dohm went on vacation. Gibbons noted that Vancouver RCMP commercial crime Staff Sergeant Peter Montague had private phone conversations with Dohm. Montague even sent the judge a cellular phone so police could reach him while he was driving back from Palm Springs. The court was earlier told by special prosecutor Bill Smart that Dohm had ap proved, in early February 1999, the first warrant in the investigation involving Clark and Pilarinos. The judge, before going on vacation, had said that he wanted to be "seized" of the file -- meaning he wanted to handle any future court applications --because of the politically sensitive nature of the probe involving the premier. Police executed a search warrant on Clark's home on March 2, 1999. He resigned as premier five months later. Clark maintains he has done nothing wrong and expects to be exonerated at trial. The two-month criminal trial is expected to start later this month. The pre-trial defence motions have taken longer than expected, "We're a month behind schedule already," the trial judge observed Monday. One of Pilarinos' lawyers, Ian Donaldson, was absent from court most of the day in order to attend the pre-trial proceedings of the Air India aircraft bombing case, in which Donaldson is co-counsel for one of the accused. Clark and Pilarinos were also absent Monday for the defence legal arguments, which are expected to continue most of this week at the Vancouver Law Courts. C Copyright 2001 Vancouver Sun -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4065 From: Charles P Date: Tue Nov 6, 2001 5:06pm Subject: Re: Suspect it is hostile until... > c) I've never found an anomaly in this building before in 7 years - so I > left my camera behind! > Don't forget, you can usually run to a 24 hr mini-mart to pick up a disposable camera. In fact, pick up a real small one as a spare an stuff it in the corner of one of your bags. cp 4066 From: James M. Atkinson Date: Tue Nov 6, 2001 7:00pm Subject: Polaroid Cameras [was: Re: Suspect it is hostile until... ] Polaroid pictures are a lot more convenient as they are immediate, and you don't have to run down to the local one hour photo to see if the pictures came out.. I typically carry a Spectra Instant Camera with a half dozen film packets, and a One-Step /600 close-up (in case I can't find or run out of Spectra film of I have a malfunction). I typically like to shoot 35 mm for my records, but when you find something "of interest" I have found it wise to IMMEDIATELY document it (in the event it's not there later). I also use digital camera's but only for some of the more mundane images and use it in cases where I may want to add things into a report. Also, for confidentiality reasons I only take my film to a professional lab where they let me escort the work though or let me develop it myself. If you find something funky (such as a bug) always and immediately document it with an instant camera, and record all of the details of your findings. THEN go get your other equipment, and start making your notifications. Here are the instant camera's I prefer... they are really inexpensive, and can easily fit into a briefcase of tool case.... I carry one of each camera, and at least six of each film pack. I also carry a binder filled with large format sheet film holders (4*5) so that I can neatly organized the pictures as they are taken (four up on a sheet). I also add in my check lists as they are completed which makes it really easy to put the report together when the sweep is finished. Several times I have been out on a sweep and have completely run out of Spectra film... the only problems is that at 3 AM in the morning the local 7-11 may not have the Spectra... but will almost always have "One-Step" film (which is an inferior consumer grade film compared to the Spectra film). Polaroid Spectra 1200SI Camera Kit (buy two... and keep one in your vehicle, and one with your tools) http://www.amazon.com/exec/obidos/ASIN/B00004RF6K/graniteisland-20 Polaroid Spectra Twin Pack Film (buy a dozen of these twin packs, and always keep al least six with you at all times when your on a sweep) http://www.amazon.com/exec/obidos/ASIN/B00004RES4/graniteisland-20 Polaroid One-Step Close Up Camera (buy one, this is a good secondary) http://www.amazon.com/exec/obidos/ASIN/B00004RFC5/graniteisland-20 Polaroid 600 3-Pack Instant Color Film (keep 2-3 three packs on hand) http://www.amazon.com/exec/obidos/ASIN/B00005M0VR/graniteisland-20 -jma At 6:06 PM -0500 11/6/01, Charles P wrote: > > c) I've never found an anomaly in this building before in 7 years - so I >> left my camera behind! >> > >Don't forget, you can usually run to a 24 hr mini-mart to pick up a >disposable camera. In fact, pick up a real small one as a spare an stuff it >in the corner of one of your bags. > >cp -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4067 From: zack <10-33@c...> Date: Tue Nov 6, 2001 6:59pm Subject: Re: Digest Number 759 Send me the e-mail with complete headers. I will trace this person for you. At 06:13 PM 11/6/2001 +0000, you wrote: > From: DrPepper >Subject: Deatyh threats by e-mail > >OK, folks, , , , , , , > >What to do about threatening emails?? > >I have received several death threats from some jerk >near Boston. >He won't stop the threatening emails. >I don't know him, never heard of him and I don't have any >idea of why he is doing this > >His isp is Juno, and I've contacted them and they seem to >be dragging their feet. > >Local copshop would not be interested in helping, I'm sure, >since I live in California. > >The frustrating part of this, is that I don't have a clew as to >why he is hassling me, and he won't answer, other than >to send more death threats. > >He has called me "dr.pepper", and not by name, so I am >guessing he has the wrong "DrPepper", but I'm clewless >and more curious than anything else. > >his email is: >strayredhen@j... >and the extended header says it's from the Boston area. >Anybody care to comment?? visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "The battle is now joined on many fronts. We will not waver; we will not tire; we will not falter; and we will not fail. Peace and freedom will prevail." George W Bush President of the United States America God Bless The USA http://www.copscops.com/blessusa.htm 4068 From: Aimee Farr Date: Tue Nov 6, 2001 11:20pm Subject: Who would you try to catch using Keykatcher? http://news.bbc.co.uk/hi/english/sci/tech/newsid_1638000/1638795.stm Tuesday, 6 November, 2001, 08:08 GMT Bugging your keyboard BBC Go Digital's Jon Wurtzel casts a wry eye over developments in the world of technology You don't need to be a brilliant spy to access the secret information people type into their computers. Who would you try to catch out using Keykatcher? [Followed by individual postings, you need to go look....] ~Aimee 4069 From: Steve Uhrig Date: Tue Nov 6, 2001 11:50pm Subject: NSA, bin Laden, and me National Security Agency Shifts Into High Gear, Low Profile By Laura Sullivan (c) 2001, The Baltimore Sun The National Security Agency has spent the past eight years inching out of the shadows, courting public opinion and opening its doors in limited ways to win back wavering congressional support.But since Sept. 11, the agency has reverted to a place of secrets and seclusion, as shut down to outsiders as it was at the height of the Cold War. Its focus has narrowed to one mission: finding Osama bin Laden and his terrorist followers. The agency has called back more than 100 NSA veterans, and at least that many employees have been sent abroad, according to one source, who said entire departments have been packed up and shipped to the Middle East. A driver from a Baltimore-area transportation company that contracts with NSA, who did not want to be identified, said it has driven numerous passengers to Baltimore-Washington International Airport. The passengers, loaded with equipment, asked to be picked up in parking lots in the suburbs rather than at their homes or at agency headquarters in Fort Meade, Md. NSA spokeswoman Judith Emmel said she could not comment on how many people might be abroad, but she said employees at headquarters have been working around the clock. When people say they are going to meet at 8, she said, you have to ask if they mean 8 in the morning or 8 at night. The agency has been searching for bin Laden for more than two years, since the U.S. Embassy bombings in Africa in 1998. Steve Uhrig, president of SWS Security in Harford County, Md., which provides intelligence and eavesdropping equipment to the NSA, said that before the attacks, he had sold the NSA a stash of suitcase kits, portable listening devices. The kits, which are disposable and last about six weeks, travel well over rugged terrain and can track low-powered radio transmissions especially those produced by people hiding with generators and ham radios, he said. They can also help locate signals hidden next to larger signals, Uhrig said. This new equipment could be key to tracking down bin Laden in a place that doesn't use the kind of sophisticated telecommunications and satellite technology the agency is so adept at cracking. Afghanistan, after decades of war and poverty, has few phone lines to tap or satellite links to eavesdrop on. But the communications methods bin Laden and his followers use could be elusive. Anyone with a little computer understanding could get something up and running for him, Uhrig said. If he kept his transmissions short, moved frequently, he could even put the transmitter 10 miles away from where he is, run a ground microwave relay to a hilltop and bounce it off a satellite, put it under an oil company's name. ... It could provide the perfect cover. Defense Department officials say finding bin Laden is the agency's No. 1 priority. (The NSA) has anything and everything looking for signals of any kind, Uhrig said. If you put enough people out there, someone is going to hear something. Some of the employees sent abroad are likely to set up a temporary listening facility in Pakistan and put into use the Emergency Reaction Team, a small group with sophisticated eavesdropping skills that can move quickly into any region, said James Bamford, author of two books on the agency. NSA cryptologists and members of other military intelligence agencies are likely to be already eavesdropping on signals from Afghanistan, from planes and ships in the area, he said. There are a lot of communications to intercept, Bamford said, The problem is most signals are probably going to be dealing with things that aren't related to finding bin Laden. Since the Cold War, the NSA had largely refocused its efforts from spying on the Soviet Union to helping the U.S. government in drug interdiction and monitoring worldwide financial transactions for bribes and extortion.In recent years, the Department of Defense closed many of the listening stations in and around the Middle East that were once used to target Russian communications. Technology overcame them, said Tom A. Brooks, former director of naval intelligence. High technology means more bounce, and satellites can collect that sort of thing for you. There was no longer a need to have a couple lonely guys sitting on a mountaintop in Iran. Now, those mountaintops are looking rather inviting, Brooks said. There are things you can only get by being close, he said, adding that the NSA also is likely to court the neighboring Uzbekistan and Tajikistan governments, which have years of experience tracking the Taliban. As intelligence efforts abroad accelerate, the agency at home has hundreds of employees working overtime searching for clues to locate bin Laden and help ground and air troops locate targets. Just as life inside the agency has changed, so has its public image. For more than eight years, that image had been carefully crafted to present a more open agency. At numerous events over the past several years, the agency has showcased the heroic efforts of some of its alumni and attended hundreds of job fairs to promote itself. But now concrete barricades block all but one entrance at the Fort Meade headquarters, and unmarked police cars pull up behind vehicles that linger on the streets near the compound. The letters on the sign directing drivers to Fort Meade from Interstate 95 have been removed, although the NSA employees only exit sign on the Baltimore-Washington Parkway is still in place. The agency has canceled more than a dozen public events, including lectures on site for former cryptologists. It has also locked down its long-standing symbol of openness and goodwill: the National Cryptologic Museum. Citing a lack of security, an agency spokeswoman said last week that the museum won't reopen any time soon. The facility, which opened in 1993 and has held events nearly every month for agency alumni and visitors for the past two years, sits outside the agency's perimeter security fence. An NSA official explained the agency is attempting to keep a low profile, adding that it doesn't seem appropriate to comment on the war effort or its involvement. Distributed by the Los Angeles Times-Washington Post News Service AP-NY-11-06-01 1302EST $INSV; From Job 841. ===================================== ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4070 From: Steve Whitehead Date: Wed Nov 7, 2001 2:54am Subject: Peeping Tom fined "Strand - It does not make up for what he had done to them, but there is some reward in his conviction. That was the reaction of two women to the conviction on Tuesday of peeping Tom, Fanie Terblanche (29), who took video captures of them with a hidden camera in their bathroom. Terblanche was found guilty on three charges of crimen injuria. Terblanche, a computer expert who also installed security cameras at casinos, was taken into custody in January and video material with hours of short scenes in the bath of his previous flat mate Chatal Hendricksen (20) and her friend Zinzia Rader (21) were confiscated. Terblanche has meanwhile moved to East London, where he works as a computer programmer, and Rader to Port Alfred. Some of the material was taken in a flat in the Strand, where Terblanche and Hendricksen resided before they moved to Gordon's Bay last year. There Hendricksen's brother, Quinten Wilson (17), found camera equipment in the ceiling while Terblanche was on business in Gauteng. The equipment was linked to Terblanche's computer in another room. Hendricksen said the incident left her scared. "We still look for supicious holes in the ceiling of every room we're in." They say the conviction of Terblanche, who they had regarded as "a brother", will not immediately take away the emotional trauma. "Something special was taken away from us without our consent. There will always be something reminding us of it, like people talking about it behind our backs. But we are trying to carry on with our lives." Hendricksen's mother, Gerda Wilson, testified on Tuesday that when she confronted Terblanche, he said, "I am sorry - I have a problem." Terblanche's attorney, Milton de la Harpe, however, dismissed the tetimony and said it was made up to strengthen the state's case. De la Harpe also said the state did not prove that Terblanche made the recordings. He questioned the originality of the tapes and asked that it not be allowed as evidence. The application was turned down. Magistrate Arno Faber said there was no direct testimony against Terblanche, but that the recordings were made in two flats which he and Hendricksen had shared, the camera equipment was linked to his computer, the tapes were found in his flat and Terblanche did not testify to tell his side of the story. The only deduction was that Terblanche had been responsible for the recordings. Faber sentenced Terblanche to a fine of R3 000 { Approximately US $ 315} or a prison sentence of 15 months and a prison sentence of 12 months, suspended for four years. He ordered that the tapes be destroyed. Terblanche has indicated that he would appeal. His bail of R10 000 was extended" Story at http://www.news24.co.za/News24/South_Africa/WesternCape/0,1113,2-7-830_1104943,00.html Steve Whitehead Managing Member TSCM Services cc South Africa e-mail : sceptre@m... URL http://www.tscm.co.za [Non-text portions of this message have been removed] 4071 From: A Grudko Date: Wed Nov 7, 2001 3:09am Subject: Deatyh threats by e-mail My best buddy and new business partner, Roy Lawson, received an eMail death threat on 10 April. The next day I replied: ---------- ----- Original Message ----- > Now my life is threatened! By who? Anyway you can't die. You're to bad to get into heaven and too ugly to get in to hell - so where would they put you? AG --------- He was shot in an unwitnessed drive-by on 16 June, dying 18 days later. Although I gave this info to the police they didn't take any investigative action. We had a private 'expert' look at Roy's computer but could not find the eMail. A threat might only be a prank, but it might be real. I would pull out all the stops on this one Dr P. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigation Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4072 From: MIKE F Date: Wed Nov 7, 2001 7:24am Subject: Human Intelligence & Covert Action on the Web Human Intelligence & Covert Action on the Web http://www.fas.org/irp/wwwspy.html --------------------------- lATER4,Mike Fiorentino Master Links 4 Master Investigators http://www.ml4mi.com e-mail: info@m... OR friindy@a... 4073 From: Aimee Farr Date: Wed Nov 7, 2001 1:38pm Subject: FW: Significant Terrorist Incidents, 1961-2001: A Chronology Looked interesting enough to FWD. Apologies if inappropriate. ~Aimee > -----Original Message----- > From: U.S.Department of State Fact Sheets > [mailto:DOSFACTS@L...]On Behalf Of PA List Manager > Sent: Wednesday, November 07, 2001 9:39 AM > To: DOSFACTS@L... > Subject: Significant Terrorist Incidents, 1961-2001: A Chronology > > > Office of the Historian > Bureau of Public Affairs > October 31, 2001 > > Significant Terrorist Incidents, 1961-2001: A Chronology > > 1961-1982 First U.S. Aircraft Hijacked, May 1, 1961: Puerto Rican born > Antuilo Ramierez Ortiz forced at gunpoint a National Airlines plane to fly > to Havana, Cuba, where he was given asylum. > Ambassador to Guatemala Assassinated, August 28, 1968: U.S. Ambassador to > Guatemala John Gordon Mein was murdered by a rebel faction when gunmen > forced his official car off the road in Guatemala City and raked > the vehicle > with gunfire. > Ambassador to Japan Attacked, July 30, 1969: U.S. Ambassador to Japan A.H. > Meyer was attacked by a knife-wielding Japanese citizen. > Ambassador to Brazil Kidnapped, September 3, 1969: U.S. > Ambassador to Brazil > Charles Burke Elbrick was kidnapped by the Marxist revolutionary > group MR-8. > > U.S. Agency for International Development Adviser Kidnapped, July > 31, 1970: > In Montevideo, Uruguay, the Tupamaros terrorist group kidnapped > USAID Police > adviser Dan Mitrione; his body was found on August 10. > "Bloody Friday," July 21, 1972: An Irish Republican Army (IRA) > bomb attacks > killed 11 people and injured 130 in Belfast, Northern Ireland. Ten days > later, three IRA car bomb attacks in the village of Claudy left six dead. > Munich Olympic Massacre, September 5, 1972: Eight Palestinian "Black > September" terrorists seized 11 Israeli athletes in the Olympic Village in > Munich, West Germany. In a bungled rescue attempt by West German > authorities, nine of the hostages and five terrorists were killed. > Ambassador to Sudan Assassinated, March 2, 1973: U.S. Ambassador to Sudan > Cleo A. Noel and other diplomats were assassinated at the Saudi Arabian > Embassy in Khartoum by members of the Black September organization. > Consul General in Mexico Kidnapped, May 4, 1973: U.S. Consul General in > Guadalajara Terrence Leonhardy was kidnapped by members of the People's > Revolutionary Armed Forces. > Domestic Terrorism, January 27-29, 1975: Puerto Rican > nationalists bombed a > Wall Street bar, killing four and injuring 60; 2 days later, the Weather > Underground claims responsibility for an explosion in a bathroom > at the U.S. > Department of State in Washington. > Entebbe Hostage Crisis, June 27, 1976: Members of the Baader-Meinhof Group > and the Popular Front for the Liberation of Palestine (PFLP) seized an Air > France airliner and its 258 passengers. They forced the plane to land in > Uganda, where on July 3 Israeli commandos successfully rescued the > passengers. > Assassination of Former Chilean Diplomat, September 21, 1976: In > Washington, > exiled Chilean Foreign Minister Orlando Letelier was killed by a car bomb. > Kidnapping of Italian Prime Minister, March 16, 1978: Premier > Aldo Moro was > seized by the Red Brigade and assassinated 55 days later. > Iran Hostage Crisis, November 4, 1979: After President Carter agreed to > admit the Shah of Iran into the U.S., Iranian radicals seized the U.S. > Embassy in Tehran and took 66 American diplomats hostage. > Thirteen hostages > were soon released, but the remaining 53 were held until their release on > January 20, 1981. > Grand Mosque Seizure, November 20, 1979: 200 Islamic terrorists seized the > Grand Mosque in Mecca, Saudi Arabia, taking hundreds of pilgrims hostage. > Saudi and French security forces retook the shrine after an intense battle > in which some 250 people were killed and 600 wounded. > U.S. Installation Bombing, August 31, 1981: The Red Army exploded > a bomb at > the U.S. Air Force Base at Ramstein, West Germany. > Assassination of Egyptian President, October 6, 1981: Soldiers who were > secretly members of the Takfir Wal-Hajira sect attacked and > killed Egyptian > President Anwar Sadat during a troop review. > Murder of Missionaries, December 4, 1981: Three American nuns and one lay > missionary were found murdered outside San Salvador, El Salvador. > They were > believed to have been assassinated by a right-wing death squad. > Assassination of Lebanese Prime Minister, September 14, 1982: > Premier Bashir > Gemayel was assassinated by a car bomb parked outside his party's Beirut > headquarters. > 1983 > Colombian Hostage-taking, April 8, 1983: A U.S. citizen was seized by the > Revolutionary Armed Forces of Colombia (FARC) and held for ransom. > Bombing of U.S. Embassy in Beirut, April 18, 1983: Sixty-three people, > including the CIA's Middle East director, were killed, and 120 > were injured > in a 400-pound suicide truck-bomb attack on the U.S. Embassy in Beirut, > Lebanon. The Islamic Jihad claimed responsibility. > Naval Officer Assassinated in El Salvador, May 25, 1983: A U.S. > Navy officer > was assassinated by the Farabundo Marti National Liberation Front. > North Korean Hit Squad, October 9, 1983: North Korean agents blew up a > delegation from South Korea in Rangoon, Burma, killing 21 persons and > injuring 48. > Bombing of Marine Barracks, Beirut, October 23, 1983: Simultaneous suicide > truck-bomb attacks were made on American and French compounds in Beirut, > Lebanon. A 12,000-pound bomb destroyed the U.S. compound, killing 242 > Americans, while 58 French troops were killed when a 400-pound device > destroyed a French base. Islamic Jihad claimed responsibility. > Naval Officer Assassinated in Greece, November 15, 1983: A U.S. > Navy officer > was shot by the November 17 terrorist group in Athens, Greece, > while his car > was stopped at a traffic light. > 1984 > Kidnapping of Embassy Official, March 16, 1984: The Islamic Jihad > kidnapped > and later murdered Political Officer William Buckley in Beirut, Lebanon. > Other U.S. citizens not connected to the U.S. Government were > seized over a > succeeding 2-year period. > Hizballah Restaurant Bombing, April 12, 1984: Eighteen U.S. > servicemen were > killed, and 83 people were injured in a bomb attack on a restaurant near a > U.S. Air Force Base in Torrejon, Spain. Responsibility was claimed by > Hizballah. > Golden Temple Seizure, June 5, 1984: Sikh terrorists seized the Golden > Temple in Amritsar, India. One hundred people died when Indian security > forces retook the Sikh holy shrine. > Assassination of Prime Minister Gandhi, October 31, 1984: The > Indian premier > was shot to death by members of her security force. > 1985 > Kidnapping of U.S. Officials in Mexico, February 7, 1985: Under the orders > of narcotrafficker Rafael Cero Quintero, Drug Enforcement Administration > agent Enrique Camarena Salazar and his pilot were kidnapped, tortured, and > executed. > TWA Hijacking, June 14, 1985: A Trans-World Airlines flight was > hijacked en > route to Rome from Athens by two Lebanese Hizballah terrorists > and forced to > fly to Beirut. The eight crew members and 145 passengers were held for 17 > days, during which one American hostage, a U.S. Navy sailor, was murdered. > After being flown twice to Algiers, the aircraft was returned to Beirut > after Israel released 435 Lebanese and Palestinian prisoners. > Air India Bombing, June 23, 1985: A bomb destroyed an Air India Boeing 747 > over the Atlantic, killing all 329 people aboard. Both Sikh and Kashmiri > terrorists were blamed for the attack. Two cargo handlers were killed at > Tokyo airport, Japan, when another Sikh bomb exploded in an Air Canada > aircraft enroute to India. > Soviet Diplomats Kidnapped, September 30, 1985: In Beirut, Lebanon, Sunni > terrorists kidnapped four Soviet diplomats. One was killed, but three were > later released. > Achille Lauro Hijacking, October 7, 1985: Four Palestinian > Liberation Front > terrorists seized the Italian cruise liner in the eastern > Mediterranean Sea, > taking more than 700 hostages. One U.S. passenger was murdered before the > Egyptian Government offered the terrorists safe haven in return for the > hostages' freedom. > Egyptian Airliner Hijacking, November 23, 1985: An EgyptAir airplane bound > from Athens to Malta and carrying several U.S. citizens was > hijacked by the > Abu Nidal Group. > 1986 > Aircraft Bombing in Greece, March 30, 1986: A Palestinian splinter group > detonated a bomb as TWA Flight 840 approached Athens Airport, killing four > U.S. citizens. > Berlin Discoteque Bombing, April 5, 1986: Two U.S. soldiers were > killed, and > 79 American servicemen were injured in a Libyan bomb attack on a nightclub > in West Berlin, West Germany. In retaliation, U.S. military jets bombed > targets in and around Tripoli and Benghazi. > Kimpo Airport Bombing, September 14, 1986: North Korean agents > detonated an > explosive device at Seoul's Kimpo Airport, killing five persons > and injuring > 29 others. > 1987 > Bus Attack, April 24, 1987: Sixteen U.S. servicemen riding in a Greek Air > Force bus near Athens were injured in an apparent bombing attack, carried > out by the revolutionary organization known as 17 November. > Downing of Airliner, November 29, 1987: North Korean agents planted a bomb > aboard Korean Air Lines Flight 858, which subsequently crashed into the > Indian Ocean. > Servicemen's Bar Attack, December 26, 1987: Catalan separatists bombed a > Barcelona bar frequented by U.S. servicemen, resulting in the death of one > U.S. citizen. > 1988 > Kidnapping of William Higgins, February 17, 1988: U.S. Marine > Corps Lt. Col. > W. Higgins was kidnapped and murdered by the Iranian-backed > Hizballah group > while serving with the United Nations Truce Supervisory > Organization (UNTSO) > in southern Lebanon. > Naples USO Attack, April 14, 1988: The Organization of Jihad Brigades > exploded a car bomb outside a USO Club in Naples, Italy, killing one U.S. > sailor. > Attack on U.S. Diplomat in Greece, June 28, 1988: The Defense > Attache of the > U.S. Embassy in Greece was killed when a car bomb was detonated > outside his > home in Athens. > Pan Am 103 Bombing, December 21, 1988: Pan American Airlines > Flight 103 was > blown up over Lockerbie, Scotland, by a bomb believed to have > been placed on > the aircraft in Frankfurt, West Germany, by Libyan terrorists. All 259 > people on board were killed. > 1989 > Assassination of U.S. Army Officer, April 21, 1989: The New People's Army > (NPA) assassinated Col. James Rowe in Manila. The NPA also > assassinated two > U.S. government defense contractors in September. > Assassination of German Bank Chairman, November 30, 1989: The Red Army > assassinated Deutsche Bank Chairman Alfred Herrhausen in Frankfurt. > 1990 > U.S. Embassy Bombed in Peru, January 15, 1990: The Tupac Amaru > Revolutionary > Movement bombed the U.S. Embassy in Lima, Peru. > U.S. Soldiers Assassinated in the Philippines, May 13, 1990: The New > People's Army (NPA) killed two U.S. Air Force personnel near > Clark Air Force > Base in the Philippines. > 1991 > Attempted Iraqi Attacks on U.S. Posts, January 18-19, 1991: Iraqi agents > planted bombs at the U.S. Ambassador to Indonesia's home residence and at > the USIS library in Manila. > 1992 > Kidnapping of U.S. Businessmen in the Philippines, January 17-21, 1992: A > senior official of the corporation Philippine Geothermal was kidnapped in > Manila by the Red Scorpion Group, and two U.S. businessmen were seized > independently by the National Liberation Army and by Revolutionary Armed > Forces of Colombia (FARC). > Bombing of the Israeli Embassy in Argentina, March 17, 1992: Hizballah > claimed responsibility for a blast that leveled the Israeli Embassy in > Buenos Aires, Argentina, causing the deaths of 29 and wounding 242. > 1993 > Kidnappings of U.S. Citizens in Colombia, January 31, 1993: Revolutionary > Armed Forces of Colombia (FARC) terrorists kidnapped three U.S. > missionaries. > World Trade Center Bombing, February 26, 1993: The World Trade > Center in New > York City was badly damaged when a car bomb planted by Islamic terrorists > explodes in an underground garage. The bomb left six people dead and 1,000 > injured. The men carrying out the attack were followers of Umar Abd > al-Rahman, an Egyptian cleric who preached in the New York City area. > Attempted Assassination of President Bush by Iraqi Agents, April 14, 1993: > The Iraqi intelligence service attempted to assassinate former U.S. > President George Bush during a visit to Kuwait. In retaliation, the U.S. > launched a cruise missile attack 2 months later on the Iraqi capital > Baghdad. > 1994 > Hebron Massacre, February 25, 1994: Jewish right-wing extremist and U.S. > citizen Baruch Goldstein machine-gunned Moslem worshippers at a mosque in > West Bank town of Hebron, killing 29 and wounding about 150. > FARC Hostage-taking, September 23, 1994: FARC rebels kidnapped > U.S. citizen > Thomas Hargrove in Colombia. > Air France Hijacking, December 24, 1994: Members of the Armed > Islamic Group > seized an Air France Flight to Algeria. The four terrorists were killed > during a rescue effort. > 1995 > Attack on U.S. Diplomats in Pakistan, March 8, 1995: Two > unidentified gunmen > killed two U.S. diplomats and wounded a third in Karachi, Pakistan. > Tokyo Subway Station Attack, March 20, 1995: Twelve persons were > killed, and > 5,700 were injured in a Sarin nerve gas attack on a crowded subway station > in the center of Tokyo, Japan. A similar attack occurred nearly > simultaneously in the Yokohama subway system. The Aum Shinri-kyu cult was > blamed for the attacks. > Bombing of the Federal Building in Oklahoma City, April 19, 1995: > Right-wing > extremists Timothy McVeigh and Terry Nichols destroyed the > Federal Building > in Oklahoma City with a massive truck bomb that killed 166 and injured > hundreds more in what was up to then the largest terrorist attack on > American soil. > Kashmiri Hostage-taking, July 4, 1995: In India, six foreigners, including > two U.S. citizens, were taken hostage by Al-Faran, a Kashmiri separatist > group. One non-U.S. hostage was later found beheaded. > Jerusalem Bus Attack, August 21, 1995: Hamas claimed > responsibility for the > detonation of a bomb that killed six and injured over 100 > persons, including > several U.S. citizens. > Attack on U.S. Embassy in Moscow, September 13, 1995: A rocket-propelled > grenade was fired through the window of the U.S. Embassy in Moscow, > ostensibly in retaliation for U.S. strikes on Serb positions in Bosnia. > Saudi Military Installation Attack, November 13, 1995: The > Islamic Movement > of Change planted a bomb in a Riyadh military compound that > killed one U.S. > citizen, several foreign national employees of the U.S. > Government, and more > than 40 others. > Egyptian Embassy Attack, November 19, 1995: A suicide bomber > drove a vehicle > into the Egyptian Embassy compound in Islamabad, Pakistan, > killing at least > 16 and injuring 60 persons. Three militant Islamic groups claimed > responsibility. > 1996 > Papuan Hostage Abduction, January 8, 1996: In Indonesia, 200 Free Papua > Movement (OPM) guerrillas abducted 26 individuals in the Lorenta nature > preserve, Irian Jaya Province. Indonesian Special Forces members > rescued the > remaining nine hostages on May 15. > Kidnapping in Colombia, January 19, 1996: Revolutionary Armed Forces of > Colombia (FARC) guerrillas kidnapped a U.S. citizen and demanded a $1 > million ransom. The hostage was released on May 22. > Tamil Tigers Attack, January 31, 1996: Members of the Liberation Tigers of > Tamil Eelam (LTTE) rammed an explosives-laden truck into the > Central Bank in > the heart of downtown Colombo, Sri Lanka, killing 90 civilians > and injuring > more than 1,400 others, including two U.S. citizens. > IRA Bombing, February 9, 1996: An Irish Republican Army (IRA) > bomb detonated > in London, killing two persons and wounding more than 100 others, > including > two U.S. citizens. > Athens Embassy Attack, February 15, 1996: Unidentified assailants fired a > rocket at the U.S. embassy compound in Athens, causing minor > damage to three > diplomatic vehicles and some surrounding buildings. Circumstances of the > attack suggested it was an operation carried out by the 17 November group. > ELN Kidnapping, February 16, 1996: Six alleged National Liberation Army > (ELN) guerrillas kidnapped a U.S. citizen in Colombia. After 9 months, the > hostage was released. > Hamas Bus Attack, February 26, 1996: In Jerusalem, a suicide > bomber blew up > a bus, killing 26 persons, including three U.S. citizens, and > injuring some > 80 persons, including three other US citizens. > Dizengoff Center Bombing, March 4, 1996: Hamas and the Palestine Islamic > Jihad (PIJ) both claimed responsibility for a bombing outside of > Tel Aviv's > largest shopping mall that killed 20 persons and injured 75 others, > including two U.S. citizens. > West Bank Attack, May 13, 1996: Arab gunmen opened fire on a bus > and a group > of Yeshiva students near the Bet El settlement, killing a dual > U.S.-Israeli > citizen and wounding three Israelis. No one claimed responsibility for the > attack, but Hamas was suspected. > USAID Worker Abduction, May 31, 1996: A gang of former Contra guerrillas > kidnapped a U.S. employee of the Agency for International Development > (USAID) who was assisting with election preparations in rural northern > Nicaragua. She was released unharmed the next day after members of the > international commission overseeing the preparations intervened. > Zekharya Attack, June 9, 1996: Unidentified gunmen opened fire on > a car near > Zekharya, killing a dual U.S./Israeli citizen and an Israeli. The Popular > Front for the Liberation of Palestine (PFLP) is suspected. > Manchester Truck Bombing, June 15, 1996: An IRA truck bomb detonated at a > Manchester shopping center, wounding 206 persons, including two German > tourists, and caused extensive property damage. > Khobar Towers Bombing, June 25, 1996: A fuel truck carrying a > bomb exploded > outside the U.S. military's Khobar Towers housing facility in Dhahran, > killing 19 U.S. military personnel and wounding 515 persons, including 240 > U.S. personnel. Several groups claimed responsibility for the attack. > ETA Bombing, July 20, 1996: A bomb exploded at Tarragona International > Airport in Reus, Spain, wounding 35 persons, including British and Irish > tourists. The Basque Fatherland and Liberty (ETA) organization was > suspected. > Bombing of Archbishop of Oran, August 1, 1996: A bomb exploded at the home > of the French Archbishop of Oran, killing him and his chauffeur. > The attack > occurred after the Archbishop's meeting with the French Foreign Minister. > The Algerian Armed Islamic Group (GIA) is suspected. > Sudanese Rebel Kidnapping, August 17, 1996: Sudan People's Liberation Army > (SPLA) rebels kidnapped six missionaries in Mapourdit, including a U.S. > citizen, an Italian, three Australians, and a Sudanese. The SPLA released > the hostages 11 days later. > PUK Kidnapping, September 13, 1996: In Iraq, Patriotic Union of Kurdistan > (PUK) militants kidnapped four French workers for Pharmaciens Sans > Frontieres, a Canadian United Nations High Commissioner for > Refugees (UNHCR) > official, and two Iraqis. > Assassination of South Korean Consul, October 1, 1996: In Vladivostok, > Russia, assailants attacked and killed a South Korean consul near > his home. > No one claimed responsibility, but South Korean authorities believed that > the attack was carried out by professionals and that the assailants were > North Koreans. North Korean officials denied the country's involvement in > the attack. > Red Cross Worker Kidnappings, November 1, 1996: In Sudan, a > breakaway group > from the Sudanese People's Liberation Army (SPLA) kidnapped three > International Committee of the Red Cross (ICRC) workers, including a U.S. > citizen, an Australian, and a Kenyan. On December 9, the rebels > released the > hostages in exchange for ICRC supplies and a health survey for their camp. > Paris Subway Explosion, December 3, 1996: A bomb exploded aboard a Paris > subway train as it arrived at the Port Royal station, killing two French > nationals, a Moroccan, and a Canadian, and injuring 86 persons. > Among those > injured were one U.S. citizen and a Canadian. No one claimed > responsibility > for the attack, but Algerian extremists are suspected. > Abduction of US. Citizen by FARC, December 11, 1996: Five armed > men claiming > to be members of the Revolutionary Armed Forces of Colombia > (FARC) kidnapped > and later killed a U.S. geologist at a methane gas exploration site in La > Guajira Department. > Tupac Amaru Seizure of Diplomats, December 17, 1996: Twenty-three > members of > the Tupac Amaru Revolutionary Movement (MRTA) took several hundred people > hostage at a party given at the Japanese Ambassador's residence in Lima, > Peru. Among the hostages were several U.S. officials, foreign ambassadors > and other diplomats, Peruvian Government officials, and Japanese > businessmen. The group demanded the release of all MRTA members in prison > and safe passage for them and the hostage takers. The terrorists released > most of the hostages in December but held 81 Peruvians and > Japanese citizens > for several months. > 1997 > Egyptian Letter Bombs, January 2-13, 1997: A series of letter bombs with > Alexandria, Egypt, postmarks were discovered at Al-Hayat newspaper bureaus > in Washington, New York City, London, and Riyadh, Saudi Arabia. Three > similar devices, also postmarked in Egypt, were found at a prison facility > in Leavenworth, Kansas. Bomb disposal experts defused all the devices, but > one detonated at the Al-Hayat office in London, injuring two > security guards > and causing minor damage. > Tajik Hostage Abductions, February 4-17, 1997: Near Komsomolabad, > Tajikistan, a paramilitary group led by Bakhrom Sodirov abducted > four United > Nations military observers. The victims included two Swiss, one Austrian, > one Ukrainian, and their Tajik interpreter. The kidnappers demanded safe > passage for their supporters from Afghanistan to Tajikistan. In four > separate incidents occurring between Dushanbe and Garm, Bakhrom > Sodirov and > his group kidnapped two International Committee for the Red Cross members, > four Russian journalists and their Tajik driver, four UNHCR > members, and the > Tajik Security Minister, Saidamir Zukhurov. > Venezuelan Abduction, February 14, 1997: Six armed Colombian guerrillas > kidnapped a U.S. oil engineer and his Venezuelan pilot in Apure, > Venezuela. > The kidnappers released the Venezuelan pilot on February 22. According to > authorities, the FARC is responsible for the kidnapping. > Empire State Building Sniper Attack, February 23, 1997: A > Palestinian gunman > opened fire on tourists at an observation deck atop the Empire State > Building in New York City, killing a Danish national and wounding visitors > from the United States, Argentina, Switzerland, and France before turning > the gun on himself. A handwritten note carried by the gunman claimed this > was a punishment attack against the "enemies of Palestine." > ELN Kidnapping, February 24, 1997: National Liberation Army (ELN) > guerrillas > kidnapped a U.S. citizen employed by a Las Vegas gold corporation who was > scouting a gold mining operation in Colombia. The ELN demanded a ransom of > $2.5 million. > FARC Kidnapping, March 7, 1997: FARC guerrillas kidnapped a U.S. mining > employee and his Colombian colleague who were searching for gold in > Colombia. On November 16, the rebels released the two hostages after > receiving a $50,000 ransom. > Hotel Nacional Bombing, July 12, 1997: A bomb exploded at the > Hotel Nacional > in Havana, injuring three persons and causing minor damage. A previously > unknown group calling itself the Military Liberation Union claimed > responsibility. > Israeli Shopping Mall Bombing, September 4, 1997: Three suicide bombers of > Hamas detonated bombs in the Ben Yehuda shopping mall in > Jerusalem, killing > eight persons, including the bombers, and wounding nearly 200 > others. A dual > U.S./Israeli citizen was among the dead, and seven U.S. citizens were > wounded. > OAS Abductions, October 23, 1997: In Colombia, ELN rebels kidnapped two > foreign members of the Organization of American States (OAS) and > a Colombian > human rights official at a roadblock. The ELN claimed that the kidnapping > was intended "to show the international community that the elections in > Colombia are a farce." > Yemeni Kidnappings, October 30, 1997: Al-Sha'if tribesmen kidnapped a U.S. > businessman near Sanaa. The tribesmen sought the release of two fellow > tribesmen who were arrested on smuggling charges and several public works > projects they claim the government promised them. They released > the hostage > on November 27. > Murder of U.S. Businessmen in Pakistan, November 12, 1997: Two > unidentified > gunmen shot to death four U.S. auditors from Union Texas Petroleum > Corporation and their Pakistani driver after they drove away from the > Sheraton Hotel in Karachi. The Islami Inqilabi Council, or Islamic > Revolutionary Council, claimed responsibility in a call to the U.S. > Consulate in Karachi. In a letter to Pakistani newspapers, the > Aimal Khufia > Action Committee also claimed responsibility. > Tourist Killings in Egypt, November 17, 1997: Al-Gama'at al-Islamiyya (IG) > gunmen shot and killed 58 tourists and four Egyptians and wounded > 26 others > at the Hatshepsut Temple in the Valley of the Kings near Luxor. > Thirty-four > Swiss, eight Japanese, five Germans, four Britons, one French, one > Colombian, a dual Bulgarian/British citizen, and four unidentified persons > were among the dead. Twelve Swiss, two Japanese, two Germans, one French, > and nine Egyptians were among the wounded. > 1998 > UN Observer Abductions, February 19, 1998: Armed supporters of > late Georgian > President Zviad Gamsakhurdia abducted four UN military observers from > Sweden, Uruguay, and the Czech Republic. > FARC Abduction, March 21-23, 1998: FARC rebels kidnapped a U.S. citizen in > Sabaneta, Colombia. FARC members also killed three persons, > wounded 14, and > kidnapped at least 27 others at a roadblock near Bogota. Four > U.S. citizens > and one Italian were among those kidnapped, as well as the acting > president > of the National Electoral Council (CNE) and his wife. > Somali Hostage-takings, April 15, 1998: Somali militiamen > abducted nine Red > Cross and Red Crescent workers at an airstrip north of Mogadishu. The > hostages included a U.S. citizen, a German, a Belgian, a French, a > Norwegian, two Swiss, and one Somali. The gunmen were members of a subclan > loyal to Ali Mahdi Mohammed, who controlled the northern section of the > capital. > IRA Bombing, Banbridge, August 1, 1998: A 500-pound car bomb > planted by the > Real IRA exploded outside a shoe store in Banbridge, North > Ireland, injuring > 35 persons and damaging at least 200 homes. > U.S. Embassy Bombings in East Africa, August 7, 1998: A bomb > exploded at the > rear entrance of the U.S. embassy in Nairobi, Kenya, killing 12 U.S. > citizens, 32 Foreign Service Nationals (FSNs), and 247 Kenyan citizens. > About 5,000 Kenyans, six U.S. citizens, and 13 FSNs were injured. The U.S. > embassy building sustained extensive structural damage. Almost > simultaneously, a bomb detonated outside the U.S. embassy in Dar > es Salaam, > Tanzania, killing seven FSNs and three Tanzanian citizens, and > injuring one > U.S. citizen and 76 Tanzanians. The explosion caused major > structural damage > to the U.S. embassy facility. The U.S. Government held Usama Bin Ladin > responsible. > IRA Bombing, Omagh, August 15, 1998: A 500-pound car bomb planted by the > Real IRA exploded outside a local courthouse in the central shopping > district of Omagh, Northern Ireland, killing 29 persons and injuring over > 330. > Colombian Pipeline Bombing, October 18, 1998: A National Liberation Army > (ELN) planted bomb exploded on the Ocensa pipeline in Antioquia > Department, > killing approximately 71 persons and injuring at least 100 others. The > pipeline is jointly owned by the Colombia State Oil Company > Ecopetrol and a > consortium, including U.S., French, British, and Canadian companies. > Armed Kidnapping in Colombia, November 15, 1998: Armed assailants > followed a > U.S. businessman and his family home in Cundinamarca Department and > kidnapped his 11-year-old son after stealing money, jewelry, one > automobile, > and two cell phones. The kidnappers demanded $1 million in ransom. On > January 21, 1999, the kidnappers released the boy. > 1999 > Angolan Aircraft Downing, January 2, 1999: A UN plane carrying one U.S. > citizen, four Angolans, two Philippine nationals, and one > Namibian was shot > down, according to a UN official. No deaths or injuries were reported. > Angolan authorities blamed the attack on National Union for the Total > Independence of Angola (UNITA) rebels. UNITA officials denied > shooting down > the plane. > Ugandan Rebel Attack, February 14, 1999: A pipe bomb exploded > inside a bar, > killing five persons and injuring 35 others. One Ethiopian and > four Ugandan > nationals died in the blast, and one U.S. citizen working for USAID, two > Swiss nationals, one Pakistani, one Ethiopian, and 27 Ugandans > were injured. > Ugandan authorities blamed the attack on the Allied Democratic > Forces (ADF). > > Greek Embassy Seizure, February 16, 1999: Kurdish protesters stormed and > occupied the Greek Embassy in Vienna, taking the Greek Ambassador and six > other persons hostage. Several hours later the protesters released the > hostages and left the embassy. The attack followed the Turkish > Government's > announcement of the successful capture of the Kurdistan Workers' > Party (PKK) > leader Abdullah Ocalan. Kurds also occupied Kenyan, Israeli, and > other Greek > diplomatic facilities in France, Holland, Switzerland, Britain, > and Germany > over the following days. > FARC Kidnappings, February 25, 1999: FARC kidnapped three U.S. citizens > working for the Hawaii-based Pacific Cultural Conservancy > International. On > March 4, the bodies of the three victims were found in Venezuela. > Hutu Abductions, March 1, 1999: 150 armed Hutu rebels attacked > three tourist > camps in Uganda, killed four Ugandans, and abducted three U.S. > citizens, six > Britons, three New Zealanders, two Danish citizens, one > Australian, and one > Canadian national. Two of the U.S. citizens and six of the other hostages > were subsequently killed by their abductors. > ELN Hostage-taking, March 23, 1999: Armed guerrillas kidnapped a U.S. > citizen in Boyaca, Colombia. The National Liberation Army (ELN) claimed > responsibility and demanded $400,000 ransom. On July 20, ELN > rebels released > the hostage unharmed following a ransom payment of $48,000. > ELN Hostage-taking, May 30, 1999: In Cali, Colombia, armed ELN militants > attacked a church in the neighborhood of Ciudad Jardin, kidnapping 160 > persons, including six U.S. citizens and one French national. The rebels > released approximately 80 persons, including three U.S. citizens, > later that > day. > Shell Platform Bombing, June 27, 1999: In Port Harcourt, Nigeria, armed > youths stormed a Shell oil platform, kidnapping one U.S. citizen, one > Nigerian national, and one Australian citizen, and causing undetermined > damage. A group calling itself "Enough is Enough in the Niger > River" claimed > responsibility. Further seizures of oil facilities followed. > AFRC Kidnappings, August 4, 1999: An Armed Forces Revolutionary Council > (AFRC) faction kidnapped 33 UN representatives near Occra Hills, Sierra > Leone. The hostages included one U.S. citizen, five British soldiers, one > Canadian citizen, one representative from Ghana, one military officer from > Russia, one officer from Kyrgyzstan, one officer from Zambia, one officer > from Malaysia, a local Bishop, two UN officials, two local > journalists, and > 16 Sierra Leonean nationals. > Burmese Embassy Seizure, October 1, 1999: Burmese dissidents seized the > Burmese Embassy in Bangkok, Thailand, taking 89 persons hostage, including > one U.S. citizen. > PLA Kidnapping, December 23, 1999: Colombian People's Liberation > Army (PLA) > forces kidnapped a U.S. citizen in an unsuccessful ransoming effort. > Indian Airlines Airbus Hijacking, December 24, 1999: Five > militants hijacked > a flight bound from Kathmandu to New Delhi carrying 189 people. The plane > and its passengers were released unharmed on December 31. > 2000 > Car bombing in Spain, January 27, 2000: Police officials reported > unidentified individuals set fire to a Citroen car dealership in Iturreta, > causing extensive damage to the building and destroying 12 vehicles. The > attack bore the hallmark of the Basque Fatherland and Liberty (ETA). > RUF Attacks on UN Mission Personnel, May 1, 2000: On May 1 in > Makeni, Sierra > Leone, Revolutionary United Front (RUF) militants kidnapped at least 20 > members of the United Nations Assistance Mission in Sierra Leone (UNAMSIL) > and surrounded and opened fire on a UNAMSIL facility, according to press > reports. The militants killed five UN soldiers in the attack. RUF > militants > kidnapped 300 UNAMSIL peacekeepers throughout the country, according to > press reports. On May 15 in Foya, Liberia, the kidnappers released 139 > hostages. On May 28, on the Liberia and Sierra Leone border, > armed militants > released unharmed the last of the UN peacekeepers. In Freetown, > according to > press reports, armed militants ambushed two military vehicles > carrying four > journalists. A Spaniard and one U.S. citizen were killed in a May 25 car > bombing in Freetown for which the RUF was probably responsible. Suspected > RUF rebels also kidnapped 21 Indian UN peacekeepers in Freetown on June 6. > Additional attacks by RUF on foreign personnel followed. > Diplomatic Assassination in Greece, June 8, 2000: In Athens, Greece, two > unidentified gunmen killed British Defense Attache Stephen Saunders in an > ambush. The Revolutionary Organization 17 November claimed responsibility. > ELN Kidnpapping, June 27, 2000: In Bogota, Colombia, ELN > militants kidnapped > a 5-year-old U.S. citizen and his Colombian mother, demanding an > undisclosed > ransom. > Kidnappings in Kyrgyzstan, August 12, 2000: In the Kara-Su Valley, the > Islamic Movement of Uzbekistan took four U.S. citizens hostage. The > Americans escaped on August 12. > Church Bombing in Tajikistan, October 1, 2000: Unidentified militants > detonated two bombs in a Christian church in Dushanbe, killing > seven persons > and injuring 70 others. The church was founded by a Korean-born U.S. > citizen, and most of those killed and wounded were Korean. No one claimed > responsibility. > Helicopter Hijacking, October 12, 2000: In Sucumbios Province, Ecuador, a > group of armed kidnappers led by former members of defunct Colombian > terrorist organization the Popular Liberation Army (EPL), took hostage 10 > employees of Spanish energy consortium REPSOL. Those kidnapped > included five > U.S. citizens, one Argentine, one Chilean, one New Zealander, and > two French > pilots who escaped 4 days later. On January 30, 2001, the kidnappers > murdered American hostage Ronald Sander. The remaining hostages were > released on February 23 following the payment of $13 million in ransom by > the oil companies. > Attack on U.S.S. Cole, October 12, 2000: In Aden, Yemen, a small dingy > carrying explosives rammed the destroyer U.S.S. Cole, killing 17 > sailors and > injuring 39 others. Supporters of Usama Bin Ladin were suspected. > Manila Bombing, December 30, 2000: A bomb exploded in a plaza across the > street from the U.S. embassy in Manila, injuring nine persons. The Moro > Islamic Liberation Front was likely responsible. > 2001 > Srinagar Airport Attack, January 17, 2001: In India, six members of the > Lashkar-e-Tayyba militant group were killed when they attempted to seize a > local airport. > BBC Studios Bombing, March 4, 2001: A car bomb exploded at > midnight outside > of the British Broadcasting Corporation's main production studios > in London. > > ETA Bombing, March 9, 2001: Two policemen were killed by the > explosion of a > car bomb in Hernani, Spain. > Bus Stop Bombing, April 22, 2001: A member of Hamas detonated a > bomb he was > carrying near a bus stop in Kfar Siva, Israel, killing one person and > injuring 60. > Tel-Aviv Nightclub Bombing, June 1, 2001: Hamas claimed responsibility for > the bombing of a popular Israeli nightclub that caused over 140 > casualties. > Hamas Restaurant Bombing, August 9, 2001: A Hamas-planted bomb > detonated in > a Jeruselum pizza restaurant, killing 15 people and wounding more than 90. > Terrorist Attacks on U.S. Homeland, September 11, 2001: Two hijacked > airliners crashed into the twin towers of the World Trade Center. Soon > thereafter, the Pentagon was struck by a third hijacked plane. A fourth > hijacked plane, suspected to be bound for a high-profile target in > Washington, crashed into a field in southern Pennsylvania. More than 5,000 > U.S. citizens and other nationals were killed as a result of these acts. > President Bush and Cabinet officials indicated that Usama Bin > Laden was the > prime suspect and that they considered the United States in a state of war > with international terrorism. In the aftermath of the attacks, the United > States formed the Global Coalition Against Terrorism. > This document, based entirely on public sources, was prepared for > background > information and reference purposes. It is not intended to be a complete or > comprehensive account of all terrorist incidents during these > years, and it > is not an official expression of U.S. policy. Please email questions or > comments to PAHistory@S... . > Office of the Historian > Bureau of Public Affairs > U.S. Department of State > September 28, 2001 > > [End] > > *********************************************************** > See http://www.state.gov/g/inl/rls/fs/index.cfm for all Fact Sheets > ************************************************************ > To change your subscription, go to http://www.state.gov/www/listservs_cms.html 4074 From: DrPepper Date: Wed Nov 7, 2001 2:31pm Subject: Re:: Significant Terrorist Incidents, 1961-2001: A Chronology ---------------snippy de deee-------------------------- This item brought me up, , , , , > Attack on U.S. Diplomat in Greece, June 28, 1988: The Defense > Attache of the > U.S. Embassy in Greece was killed when a car bomb was detonated > outside his home in Athens. I was in Athens about this time, I was visiting the JUSMAG there. We had to go to Hellekon [sic] Air Base, and I walked in the office of the CO and as I sat down ,the Major started taking his shirt off! He then put on a flak jacket , Bullet proof vest. and then we walked down stairs to the US owned black 1956 chevy 4 door. with no markings. We got in and it was immediately apparent that it was an armored car! This thing had to weigh 20 tons! The glass was two inches thick, and there was no air conditioning in it. (It was August) The major took off his insignia while we in the car, and put it on only after we got to the Air Base. When I asked him about all this, he just said that it was required by USAF regulations. I found out that the Hellenic Government hated us, but the Greek people loved us. While I was there, there were shots being fired around the Hilton all night, and there were two armored cars parked at the front door. I wondered where MY flak jacket was, but the Major didnít seem too concerned. I will say, that Athens was the ONLY place I went around the world, where the taxi drivers cheat the American tourists, but the sea food is really great enough to be shot for, , , , , , , go figger, , , , , , , , 4075 From: Date: Wed Nov 7, 2001 10:36am Subject: Post-Sept. 11 Privacy at Issue Post-Sept. 11 Privacy at Issue By LARRY MARGASAK .c The Associated Press WASHINGTON (AP) - A request to make highly personal Social Security files more easily available to law enforcement is testing how much privacy may be sacrificed in the aftermath of the Sept. 11 attacks. The debate has divided officials within the agency that oversees the nation's retirement income program. Currently, the Social Security Administration can share confidential information with law enforcement only in life-threatening circumstances. In those cases, wage and earnings data can go to federal police agencies; Social Security numbers and other information can go to all law enforcement organizations. The agency's internal investigator, the inspector general, is pressing to lessen that threshold. He argued the FBI was improperly delayed from getting Social Security numbers, tax information and other data about the hijackers on Sept. 11 because of the prohibitions. Inspector General James G. Huse said the standards for getting the information released ``required an expenditure of effort and hours that delayed investigative efforts.'' ``We believe some permanent authority to assist law enforcement should be enacted,'' he wrote in a letter to Congress, arguing the non-tax information should be turned over upon the request of police agencies in all felony investigations. In terrorism investigations, he urged that taxpayer data, including wage and earnings information, be included. His boss, acting Social Security Commissioner Larry Massanari, doesn't want the long-established privacy safeguards to be changed - at least until the matter is thoroughly studied. He said legal requirements to safeguard privacy were quickly met for the Sept. 11 inquiry. ``The success of the (Social Security) program is inherently dependent upon the American public trusting us with their most sensitive and private information, including medical records and tax returns,'' Massanari wrote Sen. Charles Grassley, R-Iowa. Grassley, the top Republican on the Senate Finance Committee, which oversees Social Security, has intervened in the dispute. He is asking officials to find middle ground. ``This isn't the time for bureaucratic turf battles,'' Grassley said in a statement to The Associated Press. ``This is the time for agencies to come together to fight terrorism.'' Grassley said he's concerned that ``The Social Security Administration never saw as its mission the responsibility to track criminal misuse of Social Security numbers.'' Similar arguments have raged as Congress has passed the most widespread changes to wiretap and electronic surveillance laws in a generation to aid the terrorism investigation. Frustrated defense lawyers are battling the secrecy covering court proceedings of more than 1,000 people who have been detained since Sept. 11. Once the Social Security inspector general's office was permitted to help the FBI, it cross-checked numbers used by the hijackers with federal records, searched the numbers of possible associates, retrieved addresses and provided wage and earnings figures. Inspector general agents also confirmed that one of the suspects was using an assumed name. Computer experts searched more than 1 billion Social Security records to identify additional investigative subjects and locations of possible terrorist cells. The IRS considered the tax information so sensitive that it authorized disclosures for only 30 days, a period extended for a second month because an ``imminent danger'' persisted. Massanari wants to keep the current safeguards, which allow only the head of the IRS or the treasury secretary - who oversees the IRS - to authorize release of confidential information. Rick Rohde, spokesman for the inspector general, said five of the 19 hijackers received their identification numbers from the Social Security Administration. It was unclear whether others assumed identities of other people or made up numbers. 4076 From: Aimee Farr Date: Thu Nov 8, 2001 0:17am Subject: Uncool. Forwarding my comments to a publicly-googled mailing list strikes me as uncool. Especially to THAT one, where I am the subject of misattribution, defamation, debate, and "agent theory." Tim May is going to chew my ass into the next decade now. I'm a strong supporter of dissent and privacy. That is why I research it. I have a SPECIAL research interest in people that take advantage of online forums, like "cypherpunks." (I do not use "nyms" out of respect for my ethical rules -- I am a lawyer.) I'm sorry that I did not get the opportunity to know some of you better, so you could attest to my character and confidentiality. Finally, if I have abused the hospitality of this list, it was out of well-intentioned ignorance. ~Aimee > -----Original Message----- > From: owner-cypherpunks@l... [mailto:owner-cypherpunks@l...]On > Behalf Of Tim May > Sent: Wednesday, November 07, 2001 1:39 AM > To: cypherpunks@l... > Subject: Re: Item from another list qouted without comment > > > On Tuesday, November 6, 2001, at 10:27 PM, Dave Emery wrote: > > > ----- Forwarded message from Aimee Farr ----- > > > > Date: Tue, 6 Nov 2001 10:27:11 -0600 > > From: "Aimee Farr" > > Subject: [TSCM-L] *BOOM!* > > To: "TSCM-L Mailing List" > > > > All the civil lib talk regarding sneak and peek is radicalizing fringe > > groups and sensitizing them to countermeasures. Conversations of > > checks...vid -- and I strongly suspect booby trap talk. (I have a > > research > > interest in groups under surveillance/impression of surveillance.) > > Yep, it looks like Agent Farr all right--I recognize her fractured, > incomprehensible style. > > What is one to make of: "Conversations of > checks...vid -- and I strongly suspect booby trap talk."? > > I wonder if Agent Farr chose one of the groups Bill Cooper was on as > part of her "research"? > > > The only booby trap I recognize is a "water bra." I hope guys doing > > surreptitious entry under increased surveillance powers are afforded > > better > > recognition training. No doubt some of you are important resources as to > > these matters, and I hope that your expertise is being sought. > > Agent Farr wants "guys doing surreptitious entry" to have "better > recognition training." > > Not surprising, but it ought to convince even the charitable amongst us > who wanted to give "Aimee Farr" the benefit of the doubt that she/he is > clearly advising LEOs. > > --Tim May > "He who fights with monsters might take care lest he thereby become a > monster. And if you gaze for long into an abyss, the abyss gazes also > into you." -- Nietzsche > > 4077 From: James M. Atkinson Date: Thu Nov 8, 2001 10:41am Subject: Engineers Good Ones -- Finally Something Different . . . Understanding Engineers - Take One Two engineering students were walking across campus when one said, "Where did you get such a great bike?" The second engineer replied, "Well, I was walking along yesterday minding my own business when a beautiful woman rode up on this bike. She threw the bike to the ground, took off all her clothes and said, "Take what you want." The second engineer nodded approvingly, "Good choice; the clothes probably wouldn't have fit." ----------------------------------------------------- Understanding Engineers - Take Two To the optimist, the glass is half full. To the pessimist, the glass is half empty. To the engineer, the glass is twice as big as it needs to be. ----------------------------------------------------- Understanding Engineers - Take Three A pastor, a doctor and an engineer were waiting one morning for a particularly slow group of golfers. The engineer fumed, "What's with these guys? We must have been waiting for 15 minutes!" The doctor chimed in, "I don't know, but I've never seen such ineptitude!" The pastor said, "Hey, here comes the greens keeper. Let's have a word with him." [dramatic pause] "Hi George, say, what's with that group ahead of us? They're rather slow, aren't they?" The greens keeper replied, "Oh, yes, that's a group of blind firefighters who lost their sight saving our clubhouse from a fire last year, so we always let them play for free anytime." The group was silent for a moment. The pastor said, "That's so sad. I think I will say a special prayer for them tonight." The doctor said, "Good idea. And I'm going to contact my ophthalmologist buddy and see if there's anything he can do for them." The engineer said, "Why can't these guys play at night?" --------------------------------------------------- Understanding Engineers - Take Four There was an engineer who had an exceptional gift for fixing all things mechanical. After serving his company loyally for over 30 years, he happily retired. Several years later the company contacted him regarding a seemingly impossible problem they were having with one of their multimillion dollar machines. They had tried everything and everyone else to get the machine to work but to no avail. In desperation, they called on the retired engineer who had solved so many of their problems in the past. The engineer reluctantly took the challenge. He spent a day studying the huge machine. Finally, at the end of the day, he marked a small "x" in chalk on a particular component of the machine and said, "This is where your problem is." The part was replaced and the machine worked perfectly again. The company received a bill for $50,000 from the engineer for his service. They demanded an itemized accounting of his charges. The engineer responded briefly: One chalk mark $1 Knowing where to put it $49,999 It was paid in full and the engineer retired again in peace. ------------------------------------------------------ Understanding Engineers - Take Five What is the difference between Mechanical Engineers and Civil Engineers? Mechanical Engineers build weapons. Civil Engineers build targets. ------------------------------------------------------ Understanding Engineers - Take Six Three engineering students were gathered together discussing the possible designers of the human body. One said, "It was a mechanical engineer. Just look at all the joints." Another said, "No, it was an electrical engineer. The nervous system has many thousands of electrical connections." The last said, "Actually it was a civil engineer. Who else would run a toxic waste pipeline through a recreational area?" --------------------------------------------------- Understanding Engineers - Take Seven "Normal people ... believe that if it ain't broke, don't fix it. Engineers believe that if it ain't broke, it doesn't have enough features yet." --Scott Adams, The Dilbert Principle ---------------------------------------------------- Understanding Engineers - Take Eight An architect, an artist and an engineer were discussing whether it was better to spend time with the wife or a mistress. The architect said he enjoyed time with his wife, building a solid foundation for an enduring relationship. The artist said he enjoyed time with his mistress, because of the passion and mystery he found there. The engineer said, "I like both." "Both?" they asked. Engineer: "Yeah. If you have a wife and a mistress, they will each assume you are spending time with the other woman, and you can go to the lab and get some work done." --------------------------------------------------- Understanding Engineers - Take Nine An engineer was crossing a road one day when a frog called out to him and said, "If you kiss me, I'll turn into a beautiful princess." He bent over, picked up the frog and put it in his pocket. The frog spoke up again and said, "If you kiss me and turn me back into a beautiful princess, I will stay with you for one week." The engineer took the frog out of his pocket, smiled at it and returned it to the pocket. The frog then cried out, "If you kiss me and turn me back into a princess, I'll stay with you and do ANYTHING you want." Again the engineer took the frog out, smiled at it and put it back into his pocket. Finally, the frog asked, "What is the matter? I've told you I'm a beautiful princess, that I'll stay with you for a week and do anything you want. Why won't you kiss me?" The engineer said, "Look I'm an engineer. I don't have time for a girlfriend, but a talking frog, now that's cool." -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4078 From: David Alexander Date: Fri Nov 9, 2001 7:48am Subject: another engineer joke Another engineer joke for you Q - What's the fastest way to get an engineer to solve a really tricky problem ? A - Tell him it can't be done sicks munfs aggo I kuldnt spell enjinear and now I are wun ! David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 4079 From: A.Lizard Date: Fri Nov 9, 2001 0:56am Subject: MessageRX - info request MessageRX ( http://www.messagerx.com ) is a "secure" Web-based mailing service that is *a lot* faster than hushmail, I'm thinking of switching from hushmail to MessageRX for people I don't want to walk through the PGP learning curve. I've been looking for reviews of the service written by people who know something about crypto, all I can find is press releases and paragraphs in various places summarizing the releases. Anybody know anything useful about the company? thanks A.Lizard ************************************************************************ Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 4080 From: Aimee Farr Date: Fri Nov 9, 2001 4:00pm Subject: Unauthorized entry into virtual space. (Sorry for getting huffy.) RFE/RL Security Watch Vol. 2, No. 43, 6 November 2001. --- U.S. CASE AGAINST RUSSIAN HACKERS SAID ILLEGAL. The Chelyabinsk regional office of the Federal Security Service (FSB) has concluded that the American indictments of Russian hackers Vasilii Gorshkov and Aleksei Ivanov for breaking into computer systems and stealing credit-card numbers are illegal, "Chelyabinskii rabochii" reported on 1 November. The FSB offices said that the methods employed by the U.S. law enforcement agencies were "illegal and criminal," including what the FSB called "the unauthorized entry into the virtual space of Chelyabinsk Oblast" in Russia. --- ~Aimee 4081 From: James M. Atkinson Date: Fri Nov 9, 2001 8:54pm Subject: Bin Ladin gets Afghan nationality [This is a very important development] -jma http://frontierpost.com.pk/main.asp?id=31&date1=11/9/2001 Bin Ladin gets Afghan nationality KANDAHAR (Online): Taliban have granted Afghan nationality to Saudi dissident Osama Bin Laden and his companions, impeccable Taliban sources told Online here on Thursday.Others who have been granted the nationality include, The Chief of defunct Islamic Jihad, Aimen Al-Zahawri, Islamic Jihad's Leader, Sheikh Asim Abdul Rehman, Operational Commander of Al-Qaeda, Saif-ul-Adil Abu Hafz, and Deputy Operational Commander Muhammad Atef. These four belong to Egypt, however, the Egyptian government has already terminated their nationality, sources said. Al-Zahawri and others have also been declared " Most Wanted" by the USA in line with Osama Bin laden in connection with September 11 terrorist attacks on World Trade Center and Pentagon. It offers huge rewards to the information, which lead to the arrest of respective " fugitives". "The proposal of granting nationality to Osama had been under consideration after US unleashed bombing and missile attacks on Afghanistan", a Taliban official said. This, he said, was not the first time that Arabs had been awarded Afghan nationality. The former Afghan President, Burhanuddin Rabbani had also granted nationality to some 604 Arab Mujahiddin during his stint, he maintained. Taliban have decided to grant Afghan nationality to Osama and his colleagues because they think that after the US bombing and killing of innocent civilians, there was no possibility of Bin Laden's handing over to America, the official said. " Now he is not our guest. He is the citizen of Afghanistan and we will not hand over him to USA in any case", he maintained. -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ From: Hawkspirit Date: Fri Nov 5, 2004 0:54pm Subject: Line identification Anyone know what kind of line answers with an automated voice that says "ready"? Roger [Non-text portions of this message have been removed] 10016 From: Blake Bowers Date: Fri Nov 5, 2004 1:07pm Subject: Re: Elections >> (((anything political on this list...))) > > OKAY, SO HOW ABOUT THAT SPECTRUM ANALYZER! > You are correct. I screwed up and sent it to the list, and not privately like intended. My reply to him again was sent offlist. (I hope) 10017 From: James M. Atkinson Date: Fri Nov 5, 2004 1:36pm Subject: Re: Line identification At 01:54 PM 11/5/2004, Hawkspirit wrote: > Anyone know what kind of line answers with an automated voice that says >"ready"? > >Roger Is it a male or female voice? -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10018 From: James M. Atkinson Date: Fri Nov 5, 2004 1:42pm Subject: Blackjack System Does anybody have a copy of the service manual for the Blackjack systems? It's a French made multi-channel briefcase sized SIGINT system that the Government of France uses for bug sweeps. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10019 From: kondrak Date: Fri Nov 5, 2004 11:18pm Subject: RE: Elections From what Im told that very well may transpire... At 22:53 11/4/2004, you wrote: > > >My hope for a second bush administration is the nazi wannabes, john ashcroft >and tom ridge, both take retirement early. But, I don't think that that >means that we will have anyone in this adminstration that believes in civil >rights, much less anyone that is concerned about this country going in the >direction of a police state. But. this country is better off without those >two people in power. > > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10020 From: kondrak Date: Fri Nov 5, 2004 11:23pm Subject: RE: Elections I believe your assessment of Ashcroft is correct. We hoped for a more moral helmsman at Justice after the 8 year nightmare of "Dyke Reno" under Clinton. Ashcroft gives Christians a bad name. He's nothing but a jackbooted thug, with no respect for our Constitution. The damage he's done will take years, and billions to rectify, and all the time law-vultures will get rich. He cant leave soon enough for me. At 10:31 11/5/2004, you wrote: >I am entitled to my opinion. John Ashcroft does not follow the law or the >constitution, that is plain to see. If the shoe fits, wear it. I said what >i said, don't like what i said, then don't read my posts. Too bad people >can't have an opinion in this country anymore. > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10021 From: kondrak Date: Fri Nov 5, 2004 11:25pm Subject: Re: Line identification one looking for a touchtone passcode to access a voice mailbox.. At 13:54 11/5/2004, you wrote: > > > Anyone know what kind of line answers with an automated voice that says >"ready"? > > > >Roger > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10022 From: J. Coote Date: Fri Nov 5, 2004 9:39pm Subject: 25 Position Switches Hello list- a nonpolitical question: I'm looking for US sources of 25-position, single pole rotary switches. Thanks, Jay 10023 From: gkeenan Date: Sat Nov 6, 2004 0:00am Subject: Re: Elections well, can't really comment to any great degree, but I hope Bush gets his acti together and gets rid of Ashcroft and co. While 'nazi' is a pretty strong word, I really can't find fault with it when applied to Ashcroft. He pushed the Patriot Act - and I'm totally opposed to that dictatorial, "1984" law. This is the land of Freedom? Since the Patriot Act, where is that freedom? Where is that privacy? You remember, those things guaranteed by the constitution and what we used to enjoy? Guess what? I didn't vote this time around. Why? well, I was military from 1963 until I retired in 1983 and came back to this country in 1988. I was even the base voting officer at one of my stations in 1975 and advised military, civilians and dependents on how to file absentee ballots. But I never registered to vote. And I'm still not registered and have never cast a ballot. Sure, I'm going to get it on here for that. But I have/had my reasons. When I enlisted in 1963 you had to be 21 to vote - but you only had to be 18 to fight and die for your country, with no say in who your commander-in-chief was. When I enlisted, my CinC was JFK. He was assassinated less than 3 weeks after I enlisted. I enlisted in Oct. 1963. Being only 18 I wasn't allowed to vote. When I finally did turn 21, I was already on my 2nd enlistment, but even so, I was still overseas. I left the US in 1964 and my first 'visit' back here wasn't until 1968. By which time I was already married (to a Brit), had a house in Europe with all my own furniture, two kids and a car. And after I had all that, I was only eligible to vote just 6 months earlier. After I brought my family to the States (the first time for me in about 5 years), I had to return to a new duty station - also in Europe. It was another five years before I came home; and again for only 3 weeks. I had no interest in American politics because I was sent out to defend my country when I was still 3 years too young to even vote for who sent me! My military and civil service career included 25 years - 23 of them spent in Europe. How was I supposed to know who to vote for? More importantly - why should I vote them? So I just refused to vote or even register. Besides, with the exception of Slick Willy, everyone I would've voted for got elected anyway. Including this past Tuesday. So I don't feel I've lost out in that respect. My wife was on my case for years to register to vote because we're both retired military and both die-hard Republicans - in many ways, but not all (we both feel the Dems have something to offer, but they try to do it with taxes instead of intelligence; i.e., trying to use their grey matter). Well, I finally tried to register about 6 or 8 months ago, but I didn't like what they wanted. I've been driving on my British DL since I came back here in 1988 (my UK license doesn't expire until 2015 - not a typo - 2015). So I saw no reason to apply for DL in NY 'cause I still had a valid DL - albeit from another country. But I wasn't a New Yorker anyway, having been born and raised in NJ and spending 18 years in the UK, 3 1/2 years in Italy, and many other years elsewhere outside the country. And since I never had more than 3 parking tickets since I've been back (1988), I saw no reason for change. But I decided, for the hell of it, to apply for a NY license. The form asked if I wanted to register to vote. I ticked it. I figured why not? My wife's been on my case about it for years, so I figured it would give her one less thing to bitch about :-). The came the giant killer. I got a letter/registration form back from voter registration - and that's when I realized that it's the apex of stupidity to vote for anyone around here. The letter said that since 2003 NY law requires all new voter registrants to provide certain information for ID purposes. No problem - yet. But the info they asked me for include place and date of birth, SSN, military service (if any), and a few other things. Simple, right? Not on your life! The info they asked me for was ALREADY IN THE LETTER THEY SENT ME!!! If they already had the correct info, why did they want me to fill in forms to give them that info? As far as I'm concerned, these people are right on the edge of idiocy and stupidity. If they already have the info, there is no reason they should have to ask me for it again. All they would've needed was my signature to verify the info was correct. I had no intention of writing all that down again for the thing to 'get lost in the mail' and someone steal my identity with my DoB, SSN, mother's maiden name, and so on. They asked for all that - when they already had it. I'm not going to vote for anyone, regardless of party, when their party workers, or the allegedly unbiased and non-partisan registration workers are so stupid that they'd really expect anyone with a brain to fall for something like this. Remember, I was looking at ID theft because they already had this info, but wanted me to write it all down yet again. That's not gonna happen - ever. I don't vote for stupidity, and I won't trust any organization that relies on stupidity to get its information. Anyway, just another rant. Jerry K. Gerard P. Keenan 16 E. Beech St. Central Islip, NY 11722 ph/fax (631) 582-1262 cell (516) 768-9602 secureops@o... gkeenan@s... www.gpkeenan.com www.cash4cashflows.com/gerardkeenan ----- Original Message ----- From: kondrak To: TSCM-L@yahoogroups.com Sent: Saturday, November 06, 2004 12:18 AM Subject: RE: [TSCM-L] Elections From what Im told that very well may transpire... At 22:53 11/4/2004, you wrote: > > >My hope for a second bush administration is the nazi wannabes, john ashcroft >and tom ridge, both take retirement early. But, I don't think that that >means that we will have anyone in this adminstration that believes in civil >rights, much less anyone that is concerned about this country going in the >direction of a police state. But. this country is better off without those >two people in power. > > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10024 From: Steve Weinert at Excel.Net Date: Sat Nov 6, 2004 5:33am Subject: Whoa to the Boring Post Election Whine-Fest, where is the TSCM list?? Anyone else unhappy to have our technical list diverted for this "insult-exchange hijinx"? The majority of the posts are naught to do with TSCM... It would really be nice if the post election whine-fest that the media seems to be fanning didn't make it here..... My 2-cents. Steve W PS (or should I say NB ?!) Techically it isn't legal to drive in the USA as a resident on a foreign license in most states. ----- Original Message ----- From: To: Sent: Saturday, November 06, 2004 12:56 AM Subject: [TSCM-L] Digest Number 1727 > > > There are 14 messages in this issue. > > Topics in this digest: > > 1. RE: Elections > From: "Jonathan Young" > 2. Re: Elections > From: Blake Bowers > 3. Elections > From: "Hawkspirit" > 4. RE: Elections > From: "Jonathan Young" > 5. RE: Elections > From: "Nalesnik, Matthew" > 6. Line identification > From: "Hawkspirit" > 7. Re: Elections > From: Blake Bowers > 10. RE: Elections > From: kondrak > 11. RE: Elections > From: kondrak > 14. Re: Elections > From: gkeenan > 10025 From: Hawkspirit Date: Sat Nov 6, 2004 11:02am Subject: Line identification Female, I think I know where you are going with this. I will send you the number off list and you can check it out for yourself. Roger Date: Fri, 05 Nov 2004 14:36:37 -0500 From: "James M. Atkinson" Subject: Re: Line identification At 01:54 PM 11/5/2004, Hawkspirit wrote: > Anyone know what kind of line answers with an automated voice that says >"ready"? > >Roger Is it a male or female voice? -jma [Non-text portions of this message have been removed] 10026 From: Date: Sat Nov 6, 2004 1:28am Subject: Re: Digest Number 1727 Seems to me that the point was not that you were not entitled to your opinion, simply that it would behoove you to express yourself in a more disciplined and intelligent fashion in light of the readership of this list being presumed to be more erudite than the average passerby on the street. A bit off topic, this element. I trust that your thoughts are a reflection of an assumption that the recent U.S. election results will affect the TSCM line in one way or another - I anticipate that you'll express this in future postings on the subject. In a message dated 11/6/2004 12:57:37 AM Central Standard Time, TSCM-L@yahoogroups.com writes: > Date: Fri, 5 Nov 2004 10:31:01 -0500 > From: "Jonathan Young" > Subject: RE: Elections > > > I am entitled to my opinion. John Ashcroft does not follow the law or the > constitution, that is plain to see. If the shoe fits, wear it. I said what > i said, don't like what i said, then don't read my posts. Too bad people > can't have an opinion in this country anymore. [Non-text portions of this message have been removed] 10027 From: A.Lizard Date: Sat Nov 6, 2004 1:12am Subject: Re: 25 Position Switches At 06:56 AM 11/6/04 +0000, you wrote: >Message: 13 > Date: Fri, 5 Nov 2004 19:39:36 -0800 > From: "J. Coote" >Subject: 25 Position Switches > > >Hello list- a nonpolitical question: Where's the fun in that? >I'm looking for US sources of 25-position, single pole rotary switches. >Thanks, >Jay > http://www.digikey.com/ probably has what you want. I'm pointing you at a distributor because I doubt you'll be ordering them at a volume level where going straight to CTS or whoever is worth the trouble. If I'm wrong, http://www.ctscorp.com/components/selector_switches.htm probably can fix you up. A non-political question for the list: Who do you like in mail-order electronics distributors in either the US or the EU? A.Lizard -- member The Internet Society (ISOC), The HTML Writers Guild. "Feudal societies go broke. These top-heavy crony capitalists of the Enron ilk are nowhere near so good at business as they think they are." Bruce Sterling Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@g... PGP 8.0 key available by request or keyserver. Download PGP from: http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html ***Looking for INTELLIGENT new technology public policy alternatives?*** http://www.ecis.com/~alizard/technology.html 10028 From: savanted1 Date: Sat Nov 6, 2004 9:36am Subject: Online fraud tutorials... from the Secret Service On Thursday, October 28, 2004, the US Secret Service arrested members of the Shadowcrew hacking group in Operation Firewall and took over their website, replacing the front page with a Secret Service banner and an announcement of the arrest. However, Shadowcrew's message board of fraud techniques--detailing how to use a stolen credit card number, forge a driver's license, defeat burglar alarms, and silence firearms--was left open to the public for six days. Another group, called Stealth Division, backed up the data before the Secret Service finally removed access on November 3. An archive of older information was still available on November 5. Shadowcrew is suspected of having over 4,000 members providing such illicit goods and services as fake credit cards, fake dentification, and stolen credit and bank data. New members had to have their products inspected by trusted members for quality before they were allowed to sell, while "rippers" selling low quality goods were quickly banned. Members even traded in such items as prescription drugs, cocaine, malwares, and hacking-for-hire services. http://www.securityfocus.com/news/9866 10029 From: savanted1 Date: Sat Nov 6, 2004 9:40am Subject: Army fields net-centric system now The US Army's Third Infantry Division will begin using the Joint Network Transport Capability (JNTC) when it redeploys to Iraq in November 2004. The system uses IP (internet protocol), satellites, and commercial products to improve mobile communications, logistics, and access to intelligence. Army chief information officer Lieutenant General Steve Boutelle says that operations in Iraq and Afghanistan demonstrated a need to deploy a network-centric system to improve communication between soldiers sooner than the planned 2008 release of the War-fighter Information Network-Tactical (WIN-T) system. JNTC includes the Joint Network Node with VoIP (Voice over IP), dynamic IP, video teleconferencing, and access to classified and unclassified networks. The Army plans to deploy JNTC to four service units in 2005 and an early version of WIN-T in 2006. http://www.fcw.com/fcw/articles/2004/1101/web-jntc-11-03-04.asp 10030 From: J. Coote Date: Sat Nov 6, 2004 2:42pm Subject: RE: Whoa to the Boring Post Election Whine-Fest, where is the TSCM list?? You have my vote (sorry - couldn't help it) for staying with TSCM-related subjects. Some of the OT rantings seen here resemble those of the "Client From Hell"... one of those clients you don't want and most sweepers know what I mean. If I were reading the list, and looking for a sweep, an assistant, or someone to handle a referral, I would probably avoid ranters and flamers. I'd be too concerned that this person would hang out by my water cooler and haranguing anyone unlucky enough to walk by, rather than conduct the sweep I hired them to do; concerned that someone so publicly pro- or anti-whatever might not conduct their TSCM sweep in my best interests. Thanks, Jay Los Angeles -----Original Message----- From: Steve Weinert at Excel.Net [mailto:srw@e...] Sent: Saturday, November 06, 2004 3:34 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Whoa to the Boring Post Election Whine-Fest, where is the TSCM list?? Anyone else unhappy to have our technical list diverted for this "insult-exchange hijinx"? The majority of the posts are naught to do with TSCM... It would really be nice if the post election whine-fest that the media seems to be fanning didn't make it here..... My 2-cents. Steve W PS (or should I say NB ?!) Techically it isn't legal to drive in the USA as a resident on a foreign license in most states. 10031 From: Greg Horton Date: Sat Nov 6, 2004 10:57am Subject: Re: Whoa to the Boring Post Election Whine-Fest, where is the TSCM list?? Thanks Steve, You hit the nail right on the head Greg 10032 From: kondrak Date: Sat Nov 6, 2004 3:46pm Subject: Re: Elections Reminds me of the line: "I don't vote, I don't want to encourage ANY of them". >I don't vote for stupidity, and I won't trust any organization that relies >on stupidity to get its information. > >Anyway, just another rant. > >Jerry K. >Gerard P. Keenan >16 E. Beech St. >Central Islip, NY 11722 >ph/fax (631) 582-1262 >cell (516) 768-9602 >secureops@o... >gkeenan@s... >www.gpkeenan.com >www.cash4cashflows.com/gerardkeenan > 10033 From: Date: Sat Nov 6, 2004 9:58pm Subject: Re: Digest Number 1727 all just had the pleasure of being added to this group. my back ground being 24+ years of a large federal LE agency. I can't help myself here: how does political discussion benefit the TSCM digest? suggestion: if you are going to have political thoughts, why not put that in your subject line so those who are not interested don't even need to open the message. works in other listserves that i participate in. wojo On Sat, 6 Nov 2004 07:28:09 EST, wrote: > > > Seems to me that the point was not that you were not entitled to your > opinion, simply that it would behoove you to express yourself in a more > disciplined > and intelligent fashion in light of the readership of this list being > presumed > to be more erudite than the average passerby on the street. > > A bit off topic, this element. I trust that your thoughts are a > reflection > of an assumption that the recent U.S. election results will affect the > TSCM > line in one way or another - I anticipate that you'll express this in > future > postings on the subject. > > In a message dated 11/6/2004 12:57:37 AM Central Standard Time, > TSCM-L@yahoogroups.com writes: >> Date: Fri, 5 Nov 2004 10:31:01 -0500 >> From: "Jonathan Young" >> Subject: RE: Elections >> >> >> I am entitled to my opinion. John Ashcroft does not follow the law or >> the >> constitution, that is plain to see. If the shoe fits, wear it. I said >> what >> i said, don't like what i said, then don't read my posts. Too bad >> people >> can't have an opinion in this country anymore. > > > [Non-text portions of this message have been removed] > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > -- Ronald J. Wilczynski National Program Office Regional Computer Forensic Lab Program 916-977-2250 916-549-1311 cell RJWilczynski@F... 10034 From: kondrak Date: Sun Nov 7, 2004 5:25am Subject: Re: Digest Number 1727 Oh, because a good portion of the TSCM business is politically driven, and the list owner jma is as politically astute as a lot of us are. At 22:58 11/6/2004, you wrote: >all >just had the pleasure of being added to this group. my back ground being >24+ years of a large federal LE agency. I can't help myself here: how >does political discussion benefit the TSCM digest? suggestion: if you >are going to have political thoughts, why not put that in your subject >line so those who are not interested don't even need to open the message. >works in other listserves that i participate in. >wojo > >On Sat, 6 Nov 2004 07:28:09 EST, wrote: > > > > > > > Seems to me that the point was not that you were not entitled to your > > opinion, simply that it would behoove you to express yourself in a more > > disciplined > > and intelligent fashion in light of the readership of this list being > > presumed > > to be more erudite than the average passerby on the street. > > > > A bit off topic, this element. I trust that your thoughts are a > > reflection > > of an assumption that the recent U.S. election results will affect the > > TSCM > > line in one way or another - I anticipate that you'll express this in > > future > > postings on the subject. > > > > In a message dated 11/6/2004 12:57:37 AM Central Standard Time, > > TSCM-L@yahoogroups.com writes: > >> Date: Fri, 5 Nov 2004 10:31:01 -0500 > >> From: "Jonathan Young" > >> Subject: RE: Elections > >> > >> > >> I am entitled to my opinion. John Ashcroft does not follow the law or > >> the > >> constitution, that is plain to see. If the shoe fits, wear it. I said > >> what > >> i said, don't like what i said, then don't read my posts. Too bad > >> people > >> can't have an opinion in this country anymore. > > > > > > [Non-text portions of this message have been removed] > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > >-- >Ronald J. Wilczynski >National Program Office >Regional Computer Forensic Lab Program >916-977-2250 >916-549-1311 cell >RJWilczynski@F... > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10035 From: Date: Sun Nov 7, 2004 3:18am Subject: Re: Elections Gentlemen, Many on the list would be most grateful if you could switch over to some other topic, say, GPS tracking without seeing the satellites, GSM direction finding using espresso coffee machine, using a carbon plate as a phased array microphone, NLJD-based mind control system, RF-powered razor ... ... Thanks in advance A.W. kondrak wrote: >Reminds me of the line: > >"I don't vote, I don't want to encourage ANY of them". > > > >>I don't vote for stupidity, and I won't trust any organization that relies >>on stupidity to get its information. >> >>Anyway, just another rant. >> >>Jerry K. >>Gerard P. Keenan >>16 E. Beech St. >>Central Islip, NY 11722 >>ph/fax (631) 582-1262 >>cell (516) 768-9602 >>secureops@o... >>gkeenan@s... >>www.gpkeenan.com >>www.cash4cashflows.com/gerardkeenan >> > > __________________________________________________________________ Switch to Netscape Internet Service. As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register Netscape. Just the Net You Need. New! Netscape Toolbar for Internet Explorer Search from anywhere on the Web and block those annoying pop-ups. Download now at http://channels.netscape.com/ns/search/install.jsp 10036 From: satcommunitfive Date: Sun Nov 7, 2004 5:59am Subject: new WIFI gadget dont think it will do 5Ghz tho http://www.canarywireless.com/default.asp?action=article&ID=3 bewell 10037 From: Agent Geiger Date: Sat Nov 6, 2004 10:39pm Subject: Re: Digest Number 1727 Welcome aboard. What agency? --- ronaldjw@i... wrote: > > > > all > just had the pleasure of being added to this group. > my back ground being > 24+ years of a large federal LE agency. I can't > help myself here: how > does political discussion benefit the TSCM digest? > suggestion: if you > are going to have political thoughts, why not put > that in your subject > line so those who are not interested don't even need > to open the message. > works in other listserves that i participate in. > wojo > > On Sat, 6 Nov 2004 07:28:09 EST, > wrote: > > > > > > > Seems to me that the point was not that you were > not entitled to your > > opinion, simply that it would behoove you to > express yourself in a more > > disciplined > > and intelligent fashion in light of the readership > of this list being > > presumed > > to be more erudite than the average passerby on > the street. > > > > A bit off topic, this element. I trust that your > thoughts are a > > reflection > > of an assumption that the recent U.S. election > results will affect the > > TSCM > > line in one way or another - I anticipate that > you'll express this in > > future > > postings on the subject. > > > > In a message dated 11/6/2004 12:57:37 AM Central > Standard Time, > > TSCM-L@yahoogroups.com writes: > >> Date: Fri, 5 Nov 2004 10:31:01 -0500 > >> From: "Jonathan Young" > >> Subject: RE: Elections > >> > >> > >> I am entitled to my opinion. John Ashcroft does > not follow the law or > >> the > >> constitution, that is plain to see. If the shoe > fits, wear it. I said > >> what > >> i said, don't like what i said, then don't read > my posts. Too bad > >> people > >> can't have an opinion in this country anymore. > > > > > > [Non-text portions of this message have been > removed] > > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > > > =================================================== > TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > > -- > Ronald J. Wilczynski > National Program Office > Regional Computer Forensic Lab Program > 916-977-2250 > 916-549-1311 cell > RJWilczynski@F... > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > $9.95 domain names from Yahoo!. Register anything. > http://us.click.yahoo.com/J8kdrA/y20IAA/yQLSAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > __________________________________ Do you Yahoo!? Check out the new Yahoo! Front Page. www.yahoo.com 10038 From: satcommunitfive Date: Sun Nov 7, 2004 5:37am Subject: Re: Digest Number 1727 Not if your in Australia ! 10039 From: James M. Atkinson Date: Sun Nov 7, 2004 7:17pm Subject: Re: Digest Number 1727 Yes, A few posts about politics is good, so long it it rounded out with some philosophies, humor or comedy. It help to keep the air in here light, and makes in friendlier. All I ask is that we drift back to the TSCM world before going off on non-TSCM tangents too far. -jma At 10:58 PM 11/6/2004, ronaldjw@i... wrote: >all >just had the pleasure of being added to this group. my back ground being >24+ years of a large federal LE agency. I can't help myself here: how >does political discussion benefit the TSCM digest? suggestion: if you >are going to have political thoughts, why not put that in your subject >line so those who are not interested don't even need to open the message. >works in other listserves that i participate in. >wojo > >On Sat, 6 Nov 2004 07:28:09 EST, wrote: > > > > > > > Seems to me that the point was not that you were not entitled to your > > opinion, simply that it would behoove you to express yourself in a more > > disciplined > > and intelligent fashion in light of the readership of this list being > > presumed > > to be more erudite than the average passerby on the street. > > > > A bit off topic, this element. I trust that your thoughts are a > > reflection > > of an assumption that the recent U.S. election results will affect the > > TSCM > > line in one way or another - I anticipate that you'll express this in > > future > > postings on the subject. > > > > In a message dated 11/6/2004 12:57:37 AM Central Standard Time, > > TSCM-L@yahoogroups.com writes: > >> Date: Fri, 5 Nov 2004 10:31:01 -0500 > >> From: "Jonathan Young" > >> Subject: RE: Elections > >> > >> > >> I am entitled to my opinion. John Ashcroft does not follow the law or > >> the > >> constitution, that is plain to see. If the shoe fits, wear it. I said > >> what > >> i said, don't like what i said, then don't read my posts. Too bad > >> people > >> can't have an opinion in this country anymore. > > > > > > [> > > > >-- >Ronald J. Wilczynski >National Program Office >Regional Computer Forensic Lab Program >916-977-2250 >916-549-1311 cell >RJWilczynski@F... > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10040 From: taurii13 Date: Sun Nov 7, 2004 6:49pm Subject: Quick note of thanks - Mr. Atkinson Thank you very much for posting the information about Security Intelligence Technologies. I am a sales executive with relational experience, recently unemployed (position eliminated) due to a merger/acquisiton situation, and they called me to interview. The phone interviews went well so I agreed to fly to NYC for an interview, at my expense. I began in depth research on this company in preparation for my interview, and your posts and this community were captured in my research. Imagine my surprise. I had absolutely no idea, because everyone sounded so "legitimate" on the phone, although the positioning of different companies did sound strange to me. The press releases on their website concerned me too, because of the low revenues in the sales announcements, but, when one is in a job search there is a tendency to view things through the lens of "possibilities". Thankfully, because I found the information you posted, I was able to cancel and get a refund for my non-refundable airfare. I am a single mother with a child in college and cannot afford to waste my resources, so thank you very much for posting that information. Not only did you save me time and money, but also potentially my business reputation - imagine if I'd agreed to start work for them, and ruined my portfolio of clients who trust me...yikes! Thanks again. 10041 From: Michael Puchol Date: Mon Nov 8, 2004 2:39am Subject: Re: Elections > GPS tracking without seeing the satellites We tried a Labrador, but it wasn't able to keep up with the vehicles. > GSM direction finding using espresso coffee machine For some reason they make them with plastic cases nowadays, which don't make a good ground plane for the doppler antenna array. You also must refrain from making coffee during tracking, as the motor noise tends to kill the receiver. > using a carbon plate as a phased array microphone It's on back order. > NLJD-based mind control system Russians had those, didn't they? Tin foil hat optional. > RF-powered razor Works better as a lawnmower, little home accident during testing. Cheers! Mike P.S. to add a serious note to all this, I believe SiRF are about to release their new chipset, with (they claim) 200.000 correlators, which would make GPS work under serious impaired conditions, such as inside buildings, etc. (they claim). I still cannot see how the laws of physics (SNR particularly) can be beaten. It's not that extremely weak signals cannot be received, after all we are still getting data from Voyager which is past Pluto, but how you can do that in a consumer-sized device escapes me. Best regards, Mike 10042 From: Date: Sun Nov 7, 2004 10:16pm Subject: Re: Re: 25 Position Switches We have some of the best in the world here in the UK #Radio Spares #Farnell you can buy from them online and also obtain the entire catalogue on CD Beware of the paper version though you will need a heavy lift aircraft for delivery both are very professional and highly recommended also #CPC [more of a general electronics distributor though] Regards Dave McGauley DEMTEC UK [Non-text portions of this message have been removed] 10043 From: Agent Geiger Date: Sun Nov 7, 2004 7:44pm Subject: Re: Digest Number 1727 Well, the bright side is, that in a police state, the use by government of taps and bugs will increase. That means, more business for us! :) --- "James M. Atkinson" wrote: > Yes, > > A few posts about politics is good, so long it it > rounded out with some > philosophies, humor or comedy. > > It help to keep the air in here light, and makes in > friendlier. > > All I ask is that we drift back to the TSCM world > before going off on > non-TSCM tangents too far. > > -jma > > > > At 10:58 PM 11/6/2004, ronaldjw@i... wrote: > > > > >all > >just had the pleasure of being added to this group. > my back ground being > >24+ years of a large federal LE agency. I can't > help myself here: how > >does political discussion benefit the TSCM digest? > suggestion: if you > >are going to have political thoughts, why not put > that in your subject > >line so those who are not interested don't even > need to open the message. > >works in other listserves that i participate in. > >wojo > > > >On Sat, 6 Nov 2004 07:28:09 EST, > wrote: > > > > > > > > > > > Seems to me that the point was not that you were > not entitled to your > > > opinion, simply that it would behoove you to > express yourself in a more > > > disciplined > > > and intelligent fashion in light of the > readership of this list being > > > presumed > > > to be more erudite than the average passerby on > the street. > > > > > > A bit off topic, this element. I trust that > your thoughts are a > > > reflection > > > of an assumption that the recent U.S. election > results will affect the > > > TSCM > > > line in one way or another - I anticipate that > you'll express this in > > > future > > > postings on the subject. > > > > > > In a message dated 11/6/2004 12:57:37 AM Central > Standard Time, > > > TSCM-L@yahoogroups.com writes: > > >> Date: Fri, 5 Nov 2004 10:31:01 -0500 > > >> From: "Jonathan Young" > > > >> Subject: RE: Elections > > >> > > >> > > >> I am entitled to my opinion. John Ashcroft > does not follow the law or > > >> the > > >> constitution, that is plain to see. If the > shoe fits, wear it. I said > > >> what > > >> i said, don't like what i said, then don't read > my posts. Too bad > > >> people > > >> can't have an opinion in this country anymore. > > > > > > > > > [> > > > > > > > >-- > >Ronald J. Wilczynski > >National Program Office > >Regional Computer Forensic Lab Program > >916-977-2250 > >916-549-1311 cell > >RJWilczynski@F... > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== > TSKS > >Yahoo! Groups Links > > > > > > > > > > > ----------------------------------------------------------------------------------------------------- > > > We Expertly Hunt Real Spies, Real Eavesdroppers, and > Real Wiretappers. > ----------------------------------------------------------------------------------------------------- > > > James M. Atkinson > Phone: (978) 381-9111 > Granite Island Group Fax: > > 127 Eastern Avenue #291 > Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > ----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent > Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > ----------------------------------------------------------------------------------------------------- > > > > > __________________________________ Do you Yahoo!? Check out the new Yahoo! Front Page. www.yahoo.com 10044 From: John Papaleo Date: Sun Nov 7, 2004 9:24pm Subject: Re: Digest Number 1727 Test Post 1.00.1 ----- Original Message ----- From: "James M. Atkinson" To: Sent: Sunday, November 07, 2004 8:17 PM Subject: Re: [TSCM-L] Digest Number 1727 > > Yes, > > A few posts about politics is good, so long it it rounded out with some > philosophies, humor or comedy. > > It help to keep the air in here light, and makes in friendlier. > > All I ask is that we drift back to the TSCM world before going off on > non-TSCM tangents too far. > > -jma > > > > At 10:58 PM 11/6/2004, ronaldjw@i... wrote: > > > > >all > >just had the pleasure of being added to this group. my back ground being > >24+ years of a large federal LE agency. I can't help myself here: how > >does political discussion benefit the TSCM digest? suggestion: if you > >are going to have political thoughts, why not put that in your subject > >line so those who are not interested don't even need to open the message. > >works in other listserves that i participate in. > >wojo > > > >On Sat, 6 Nov 2004 07:28:09 EST, wrote: > > > > > > > > > > > Seems to me that the point was not that you were not entitled to your > > > opinion, simply that it would behoove you to express yourself in a more > > > disciplined > > > and intelligent fashion in light of the readership of this list being > > > presumed > > > to be more erudite than the average passerby on the street. > > > > > > A bit off topic, this element. I trust that your thoughts are a > > > reflection > > > of an assumption that the recent U.S. election results will affect the > > > TSCM > > > line in one way or another - I anticipate that you'll express this in > > > future > > > postings on the subject. > > > > > > In a message dated 11/6/2004 12:57:37 AM Central Standard Time, > > > TSCM-L@yahoogroups.com writes: > > >> Date: Fri, 5 Nov 2004 10:31:01 -0500 > > >> From: "Jonathan Young" > > >> Subject: RE: Elections > > >> > > >> > > >> I am entitled to my opinion. John Ashcroft does not follow the law or > > >> the > > >> constitution, that is plain to see. If the shoe fits, wear it. I said > > >> what > > >> i said, don't like what i said, then don't read my posts. Too bad > > >> people > > >> can't have an opinion in this country anymore. > > > > > > > > > [> > > > > > > > >-- > >Ronald J. Wilczynski > >National Program Office > >Regional Computer Forensic Lab Program > >916-977-2250 > >916-549-1311 cell > >RJWilczynski@F... > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > -------------------------------------------------------------------------- --------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > -------------------------------------------------------------------------- --------------------------- > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------------- --------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------------- --------------------------- > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > From: ATSCP Secretary Date: Thu Nov 6, 2003 8:18am Subject: Paris 2003 If anyone is travelling to Milipol in Paris and works in TSCM please contact me if you would be interested in meeting and discussing issues related to the ATSCP. Kind regards Mr. O. Fouere ATSCP Secretary secretary@t... Tel: +353-86-8520598 7955 From: JOE MORRIS Date: Thu Nov 6, 2003 0:34pm Subject: RE: ( RPC ) remote procedure call Sounds like you have one of a bunch of different RPC worms/viruses, probably one of the blaster variants. Go here for more info http://www.microsoft.com/security/incident/blast.asp Joe W. Morris, CISSP Network Systems Security Manager CA$HLINK II Information Security Manager Riggs Bank N.A. 5700 Rivertech Court RS-205 Riverdale, MD 20737-1250 mailto:Joe@R... (301) 887-8449 -----Original Message----- From: mooty_7 [mailto:mooty_7@y...] Sent: Wednesday, November 05, 2003 11:50 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] ( RPC ) remote procedure call I know this is off topic...but you guys were the only ones with the correct answer to my problem last time , so here goes. one of the computers in " my " office as soon as it boots, just after pass word is entered 3 to 5 seconds pops up with a warning that says warning save data system is shuting down because " the remote procedure call" has been terminated...and then it begains a 50 second count down...all this before the desk top even has a chance to load.nothing has changed with this box in months.I have tried everything short of blowing away the operating system and starting over...I would be thankful for any help... ------------------------ Yahoo! Groups Sponsor ---------------------~--> Rent DVDs from home. Over 14,500 titles. Free Shipping & No Late Fees. Try Netflix for FREE! http://us.click.yahoo.com/I3w.vC/hP.FAA/3jkFAA/kgFolB/TM ---------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7956 From: atsi999 Date: Thu Nov 6, 2003 4:05pm Subject: Re: Training Ray Jarvis puts on an excellent class and is one of the best in the business. His courses are definately worth taking. REI also puts on a good course, but I would only recommend the classes if you are using their equipment. I have not taken the course in Florida, but it appears to be legitimate from some brief research I have done. Jeff Evert Arizona Technical Security --- In TSCM-L@yahoogroups.com, xxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxx wrote: > has anybody attended the world institue in miami > florida or the jarvis institute for tcsm courses and > training. > we are thinking of that but every time we go to > register the class gets cancelled. > > are there any other schools besides south africa for training? > > __________________________________ > Do you Yahoo!? > Protect your identity with Yahoo! Mail AddressGuard > http://antispam.yahoo.com/whatsnewfree 7957 From: Date: Thu Nov 6, 2003 4:57pm Subject: Re: Re: Remote procedure call A most interesting response.... This can obviously be countered by wrapping your head in aluminum foil and attaching a 4AWG drain wire. :-) Now...on to your question See: http://www.pandasoftware.com/virus_info/encyclopedia/overview.aspx?idvirus=40369 http://vil.nai.com/vil/content/v_100547.htm Symptoms Presence of unusual TFTP* files - Presence of the file msblast.exe in the WINDOWS SYSTEM32 directory - Error messages about the RPC service failing (causes system to reboot) - The worm randomly opens 20 sequential TCP ports for listening. This is a constantly revolving range (ie. 2500-2520, 2501-2521, 2502-2522). The purpose of this action is unknown At 00:18 11/06/2003, A Grudko wrote: >- Original Message - >From: mooty_7 > > one of the computers in " my " office as soon as it boots, just after > > pass word is entered 3 to 5 seconds pops up with a warning that says > > warning save data system is shuting down because " the remote > > procedure call" has been terminated...and then it begains a 50 second > > count down... > >The Remote Procedure Call is built into all operating systems so that as you >switch on your computer a copy of every file you have created or opened is >sent to the Department of Justice for investigation and possible >prosecution. If you try to remove this software you will be collected in the >middle of the night and sent to GTMO to join the other pinko liberals there >who have tried that one. > >(Joke) > >Andy Grudko (British), South Africa >Umkhonomunye abashokobezi baseMzansi >Consulting Investigator - Est. 1981 >Registered as a security service provider by the Private Security Industry >Regulatory Authority, Reg. No. 8642 >www.grudko.com , andy@g... . (+27 12) 244 0255 - 244 0256 (Fax) - 082 >778 6355 (Cell) >SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. >When you need it done right - first time > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7958 From: Date: Thu Nov 6, 2003 7:18pm Subject: Deputies sue for spots in wiretapping class Deputies sue for spots in wiretapping class By MARK SCOLFORO The Associated Press 11/6/2003, 7:38 p.m. ET HARRISBURG, Pa. (AP) ‚Äî Five deputy sheriffs who were denied a spot in a state police training program in wiretapping and electronic surveillance have sued, seeking a court order that would let them participate in the five-day session that starts Monday. The suit, filed by the deputies along with the sheriffs of Warren, Mercer, Bradford and Cumberland counties and three district attorneys, argues that such training is needed for drug investigations and for homeland security. "At stake in this case is the protection of the public," the suit said. State police Commissioner Jeffrey B. Miller said in a statement that it was unclear whether deputies are legally permitted to use wiretaps and other forms of electronic surveillance, and that his agency could "place itself in jeopardy of civil action by providing wiretap training to sheriffs and deputies." Miller said state police had proposed a compromise under which deputies would receive the training if they were also designated as county detectives, who are permitted to operate wiretaps. A hearing on the request for a preliminary injunction was scheduled for Friday morning in Commonwealth Court in Harrisburg. Attached to the lawsuit was an affidavit from Warren County Sheriff Larry E. Kopko, one of the plaintiffs, saying that without a deputy in the training class, "we continue to allow the illegal drug business to flourish in Warren County because of our inability to be effective in the suppression of drug dealing." "Body wires could provide invaluable (aid) in developing the information that we need to secure search warrants," Kopko said. "Without it, we must instead use and rely on witnesses who are often known drug dealers and who face credibility issues or witnesses whose memories fade over time." The affidavit of Cumberland County District Attorney M.L. "Skip" Ebert Jr. said that his county has only a small pool of certified electronic eavesdropping investigators, a shortage that has caused "staggering overtime costs to our office, as well as the neglect of other pressing business." The lawsuit accuses Miller of "erroneously, arbitrarily and in abuse of his discretion" having prohibited the deputies from attending the course, titled "Legal and Technical Aspects of Wiretapping and Electronic Surveillance." [Non-text portions of this message have been removed] 7959 From: A Grudko Date: Fri Nov 7, 2003 2:07am Subject: Tinfoil and the remote procedure call - Original Message - From: > A most interesting response.... This can obviously be countered by > wrapping your head in aluminum foil and attaching a 4AWG drain wire. :-) Ah, James (?) must have been reading my mail on another group on Monday because I mentioned that this weekend I could be found with a tinfoil pyramid hat on my bald head... I'm off camping with a group of my more flakey friends this weekend to celebrate 'The Harmonic Concordance' ; * 8:13 PM (New York Time) a geometrically perfect six sided (Star of David) configuration will appear in the sky, linking and 'balancing the energies' of six astrological bodies; the Sun, Jupiter, Mars, Saturn, Chiron and the Moon * a partial eclipse of the moon over NY * a full moon * the predicted solar flare maxima (HF is dead at the moment down here) * and the release of The Matrix Revolution (I would tell you the ending but then I'd have to kill you - but just imagine Kanau Reeves in a white robe and beard) It's basically just a good excuse to sit around a fire with a bunch of buddies and eat and drink waaaay too much without having to worry about driving anywhere afterwards or even think about TDRs, SAs or if my Scanlock is charged up... I shall report back after the weekend providing mankind survives 'The Harmonic Concordance'...(fade out with dramatic music) :-) Andy Grudko (British), South Africa Umkhonomunye abashokobezi baseMzansi Consulting Investigator - Est. 1981 Registered as a security service provider by the Private Security Industry Regulatory Authority, Reg. No. 8642 www.grudko.com , andy@g... . (+27 12) 244 0255 - 244 0256 (Fax) - 082 778 6355 (Cell) SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 7960 From: mooty_7 Date: Thu Nov 6, 2003 10:14pm Subject: Re: Re: Remote procedure call Thanks guys...as always i am impressed with the talent pool that is always lurking in the back ground of this group. what a great resource , maybe i can return the favor in the future... 7961 From: guardiantek Date: Fri Nov 7, 2003 4:36am Subject: Prospective TSCM Hello, I'm not shure if I signed up for the correct list. But I'm currently trying to study to be a tscm. I have no idea were to start. I'm 26 years old, I would like to know the best route for some one like me. Maybe 2 years of tech college with computer science and electronics minors/majors? Then sign up for a training center? Security of this sorts is my life. I love to do computer security and such, I also like to play with things like tapping my own phones and such for fun to try and learn. It's always been fun for me to find ways to bypass stuff and make them better more secure. Things like HERF EMP, VAN ECK all these things are my hobbies to research. I know this is my next step in life. Can some one please be so kind as to tell me how this young grass hoper how he can achieve his goals? I'm willing to do WHAT ever it takes to reach this goal. I just know you all are the experts, And this is the only place I can get a true reply. thank you. 7962 From: Hawkspirit Date: Fri Nov 7, 2003 9:52am Subject: Historical Bug Sweep Article Looks like being a wireman in the past was a dangerous occupation. Roger Death of a Wireman Time, February 21, 1977 http://www.bugsweeps.com/info/time_2-21-77.html 7963 From: Date: Fri Nov 7, 2003 1:28pm Subject: Deputies allowed to take state police eavesdropping class Deputies allowed to take state police eavesdropping class The Associated Press 11/7/2003, 5:11 p.m. ET HARRISBURG, Pa. (AP) ‚Äî Five deputies who sued to join a state police class on electronic surveillance will be allowed to participate under terms of a court order issued Friday afternoon, said James B. Hazen, executive director of the Pennsylvania Sheriffs' Association. The decision by senior Commonwealth Court Judge Warren G. Morgan did not resolve the question of whether the state police will certify the deputies to conduct wiretaps, Hazen said. "That means we're going back to court," he said. The deputies, along with the sheriffs of Warren, Mercer, Bradford and Cumberland counties and three district attorneys, sued on Wednesday, saying they met legal qualifications for such training and needed it for drug investigations and for homeland security. The deputies' lawsuit said state police Commissioner Jeffrey B. Miller abused his discretion by barring them from taking the weeklong class, "Legal and Technical Aspects of Wiretapping and Electronic Surveillance," which begins Monday. Miller said the law was unclear about whether deputies are permitted to conduct wiretaps, and that providing the training to sheriffs and their deputies would make his agency vulnerable to civil suits. [Non-text portions of this message have been removed] 7964 From: Steve Uhrig Date: Fri Nov 7, 2003 8:00pm Subject: Thoughts on advertising TSCM Below is clipped some edited comments on advertising TSCM services from a message to another sweeper earlier. Thought they might be of interest to the group. Comments invited. ============ A one shot ad is a complete waste of money. Advertising, to be effective, needs to be run on a long term basis. One gentleman in the TSCM industry is a good example. He runs a small ad and has forever in the one of the larger security trade magazines. I've advertised there, and it's expensive. However, in the case of this other gentleman after many years of exposure people come to recognize his name. There's a lot of stats on advertising. I've studied them extensively and formally. You're infinitely better off with a tiny ad forever than a full page color spread once a year. You HAVE to follow up, and do so quickly. And repeatedly. Don't forget the average sale is made after the 5th contact. If you give up on a live prospect before then, you've wasted the money you've invested in them. And screen respondees. No toll free number. Discourage lunatics. Make people work to find you. Sounds contrary, but if you have a bingo card number in your magazine ad and send info to everyone who circles the number, you're just wasting money filling file cabinets and trash cans of spy wannabees. If I were doing an ad, like yellow pages or a magazine, I'd have the smallest ad I could buy, and I'd say nothing other than 'Don't hire any debugging team until you've read our free report'. And list a phone number only. Or maybe a website. Capture the person's address on an answering machine if necessary and send them a decent brochure or preferably a long letter. You can't sell in an ad. You can only get someone to raise their hand to where you can get them one on one and educate them and position yourself as the expert they can't live without and the solution to their problems. You're not selling consumer crap which is sold on emotion or impulse in a few minutes. TSCM is two or three or N-stepped. Since you can't afford to make your case in a large frequent ad (and believe me, you can't), you need to make your case when and where you're not competing with other advertisers, in a one on one presentation when you have someone's attention. Do that with a brochure or something. Selling TSCM is like selling a wedding dress. No matter how good your wedding dress or how great your service or prices, you're only going to interest the very tiny segment of female readers who are getting married soon. You're not going to generate interest in buying a wedding dress. Only if someone already is in the market for a wedding dress will they have any interest in your ad. That's why advertising this sort of service is ineffective. Too narrow an audience. And, no one saves publications. No one will remember, a year from now, where or if they saw an ad for TSCM. When they develop a need for the service, you have to be right in front of them at that moment. That's why you need to advertise long term. The most you can hope is people know you're in X magazine every month, and if they have a need they need to find a copy of X magazine to get your contact info. That's how this other gentleman I mentioned operates. No one saves his ad. They just know he'll be in the next issue of the magazine. Individuals and small time players buy in a panic. Mature players take longer. Sometimes scheduling a desperately needed sweep takes weeks or even months. Impulse calls usually are a waste of time. When the cold hard light of day dawns, all of a sudden it's no longer an emergency. So don't take panic calls too seriously. I sure don't. I learned a lot, in person, from Gary Halbert www.garyhalbert.com. I've studied under him for decades, back when I sold ICOM land mobile and more stuff to consumers and less highly specialized stuff to government. Read his info on the website for good ideas, but remember he works with mass marketers selling to consumers, not highly specialized niche marketers. Most of the principles are the same, though, and can be translated to our field. Just my thoughts. If I knew advertising would work, I'd keep pouring money into it. But it's been a waste of time and money for me. Giving talks to groups, word of mouth and networking is what's worked for me long term. And publishing articles, newsletters, participating in forums and anything else to get visibility and credibility in the targeted market. ================== Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7965 From: Date: Sat Nov 8, 2003 11:26am Subject: Hollywood Investigation Received this from another net to which I belong. Carl Larsen Larsen and Associates Surprise, AZ November 8, 2003 FBI Probe Shakes Up Hollywood's Top Lawyers Federal inquiry into alleged illegal wiretaps by celebrity private investigator Pellicano sends tremors through entertainment industry. By Henry Weinstein, Greg Krikorian and James Bates, LA Times Staff Writers What began with a crude attempt to intimidate a reporter has grown into a federal wiretapping investigation that has rattled Hollywood's legal elite. In recent months, a grand jury in Los Angeles has summoned witnesses whose conversations with at least one top entertainment lawyer were allegedly taped by famed private investigator Anthony Pellicano. Federal agents, meanwhile, have approached several actors and producers who had been engaged in litigation in which Pellicano was involved. Sources said the agents read them snippets of their telephone conversations that had been secretly recorded. Pellicano was hired by entertainment lawyers to unearth information about legal opponents, and investigators believe he obtained some of it through illegal wiretaps. Investigators want to know what, if anything, attorneys who hired Pellicano knew about his alleged activities. One is Bert Fields, among Hollywood's most recognizable lawyers. He has employed Pellicano while representing such A-list clientele as Tom Cruise, Michael Jackson and Kevin Costner. Fields has acknowledged that the FBI interviewed him several months ago at his Century City office. "It was a surprise," he said Friday of the hourlong interview. "But life is full of surprises." Fields denied knowledge of any improper actions by Pellicano. The breadth of the investigation remains unclear. Fields is the only lawyer whose name has surfaced publicly in the probe. Federal sources, however, said a raid on Pellicano's office last November yielded a bounty of documents, including transcripts of taped conversations, that have led them to individuals with no connection to Fields' cases. "There are many, many nervous people in town," said one white-collar defense lawyer familiar with parties involved in the investigation. "A lot of entertainment lawyers hired Pellicano." Pellicano, who begins a federal prison sentence this month for possessing illegal explosives, could not be reached for comment Friday. But attorney Martin Singer, whose clients have included Bruce Willis and Sylvester Stallone, said: "I can't believe Anthony would do the kinds of things they are accusing him of." Singer, who has used Pellicano on cases, said he has not been contacted by the FBI or any other law enforcement agency. The probe has its unlikely roots in an incident involving Los Angeles Times reporter Anita Busch, who was investigating the connection between action star Steven Seagal and alleged mafia associate Julius Nasso. On the morning of June 20, 2002, when Busch walked out of her apartment, she found an overturned cooking pan on her windshield, along with a taped cardboard sign reading, "Stop." There was a small shatter in the windshield. Under the pan was a rose and a dead fish. Los Angeles police were called to the scene and initiated an investigation. The next day, a man telephoned Busch, telling her that someone was going to blow up her car and that he knew his name. In all, he called about six times. Authorities later tracked down the caller, who agreed to wear a hidden microphone in a meeting with the alleged vandal, an ex-convict and onetime drug dealer named Alexander Proctor. In an Aug. 13, 2002, conversation, according to documents submitted in court by the FBI, Proctor said the man who had hired him "was the private investigator Anthony Pellicano." Pellicano denied he had anything to do with the threatening gesture against Busch. But with Proctor's statement in hand, federal agents obtained a search warrant. Last Nov. 21, a dozen investigators descended on Pellicano's offices in a Sunset Boulevard office building. There they found in a safe two modified hand grenades and a quantity of C-4 military-type plastic explosives, as well as $200,000 in cash, jewelry and gold bullion. Pellicano was allowed to keep the $200,000 but was charged with two counts of felony possession of explosives. In the FBI raid, agents also found computer files with massive amounts of information chronicling Pellicano's work history. It is those files, sources said, that have led FBI agents to Fields and others in their months-long investigation. "They [FBI agents] believe they have evidence Anthony Pellicano illegally wiretapped people," said one person close to the investigation. "And they are certainly implying to people that they only found out about who to talk to because of wiretaps." Along the way, investigators also uncovered evidence suggesting that an Los Angeles Police Department sergeant tapped into confidential police computer databases in search of personal information on Pellicano's behalf. Sgt. Mark Arneson, a veteran of nearly 30 years on the LAPD, was suspended as a result. In checking the computer logs in Arneson's department, investigators said they found a pattern of connections with people whom Pellicano was investigating, including reporter Busch. After being charged with the explosives violations, and having his name placed at the center of the wiretapping investigation, Pellicano's business evaporated. He closed shop but vowed to fight the charges against him. Midway through his trial last month, he abruptly reversed himself and pleaded guilty to both charges. He faces 27 to 33 months in federal prison. He is to be sentenced Jan. 20, but has volunteered to begin serving his prison term Nov. 17. Meanwhile, the investigation that took on a life of its own continues with agents in the field and witnesses testifying before a grand jury. The investigation is being led by Assistant U.S. Atty. Dan Saunders. One entertainment figure involved in a legal dispute in which Fields represented his opponent said in an interview that FBI agents visited his house last spring "and told me my [phone] lines and my attorney's lines were tapped by Fields ‚Ķ and Pellicano." He said he later testified before a federal grand jury looking into the matter. "I could tell from their questions that they had listened to tapes of conversations [that had occurred] during my case‚Ķ. They were asking me questions that encapsulated conversations my attorney and I had with witnesses in our case." The 59-year-old Pellicano has cultivated a tough-guy image since moving to Los Angeles in 1983 from Chicago, where he began his career chasing down deadbeats who failed to pay their Spiegel catalog bills. Along the way, he became a self-taught expert in analyzing audiotape. His big break came in the case of automaker John Z. DeLorean. Pellicano's analysis of a government audiotape helped acquit DeLorean of cocaine-trafficking charges. "I only use intimidation and fear when I absolutely have to," he was fond of saying. [Non-text portions of this message have been removed] 7966 From: Date: Sun Nov 9, 2003 11:31am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7967 From: Date: Sun Nov 9, 2003 11:31am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7968 From: Date: Fri Nov 7, 2003 8:25am Subject: Re: Digest Number 1408 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Message: 4 Date: Thu, 06 Nov 2003 04:49:55 -0000 From: "mooty_7" Subject: ( RPC ) remote procedure call I know this is off topic...but you guys were the only ones with the correct answer to my problem last time , so here goes. one of the computers in " my " office as soon as it boots, just after pass word is entered 3 to 5 seconds pops up with a warning that says warning save data system is shuting down because " the remote procedure call" has been terminated...and then it begains a 50 second count down...all this before the desk top even has a chance to load.nothing has changed with this box in months.I have tried everything short of blowing away the operating system and starting over...I would be thankful for any help... - --------------------------------------------------------------------- - -- that is most likely the blaster worm. symantec has tools/tutorials to rid your systems of it. -----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 2.3 wkYEARECAAYFAj+rq0sACgkQioaWFFo3QxNGBgCghKVKoVz1ors/N6udv6wdO8sngKkA oJXAMe1Ku+2n3BplcEGe1bECElaJ =vHT1 -----END PGP SIGNATURE----- Concerned about your privacy? Follow this link to get FREE encrypted email: https://www.hushmail.com/?l=2 Free, ultra-private instant messaging with Hush Messenger https://www.hushmail.com/services.php?subloc=messenger&l=434 Promote security and make money with the Hushmail Affiliate Program: https://www.hushmail.com/about.php?subloc=affiliate&l=427 7969 From: Lawrence Dillard Date: Sun Nov 9, 2003 2:12pm Subject: safe Subject: Air Security >Date: Fri, 7 Nov 2003 11:12:24 -0500 > >Well ain't this about right! Have a great weekend, everybody! > > >Almost 150 years ago, President Lincoln found it necessary to hire a private >investigator, Alan Pinkerton, for protection. That was the beginning of the >Secret >Service. Since that time, federal police authority has grown to a large number >of >multi-letter agencies - FBI, CIA, INS, IRS, DEA, ATF, etc. >Now comes the Federal Air Transportation Airport Security Service. Can't you >see them now, these highly trained men and women in their black outfits with >initials in large white letters across their backs? > > F. A. T. A. S. S. - - - - - I feel safer already. > 7970 From: Ocean Group Date: Fri Nov 7, 2003 7:50am Subject: Q Crpto So what do you think folks....is it the end of the line for comms eavesdroppers.....? Why are the NSA not bricking it? Because I suspect its not that impenetrable.... Comments??? Cheers Oisin *********** Start-up makes quantum leap into cryptography By Declan McCullagh Staff Writer, CNET News.com http://news.com.com/2100-1029-5103373.html Story last modified November 6, 2003, 8:36 AM PST A 4-year-old start-up has begun shipments of what it says are the world's first commercial data-scrambling devices that use the radically new technology of quantum encryption. Magiq Technologies, a privately held firm based in New York City, said this week it is selling Navajo Secure Gateway for between $50,000 and $100,000 a unit. It uses a combination of quantum cryptography and traditional cryptography to provide a virtual private network (VPN) running over fiber-optic cable that's designed to be completely secure against all eavesdroppers. "We're getting very strong interest from service providers, the companies who own the fiber in the ground," Magiq CEO Bob Gelfond said in an interview Thursday. "The reason this is very attractive for them is that they're looking for ways to distinguish themselves. Security seems to be a way to do this. They feel they can add 30 or 40 percent to their top line by creating ultrasecure lines." Quantum cryptography addresses the most worrisome aspect of current public key cryptography, which powers Web browsers, applications like Pretty Good Privacy (PGP), and workhorse protocols like SSH and SSL. For security, those applications rely on the amount of time it takes to factor large numbers used in encryption keys, a task that mathematicians strongly believe is quite difficult but have never managed to prove. If an eavesdropper such as the National Security Agency, the FBI, or a criminal enterprise ever managed to find a much faster way to factor large numbers, the Internet's current security model would be vulnerable. Magiq's device is designed to solve that theoretical problem by tapping into the weird and counterintuitive laws of quantum physics, which say that it is impossible to eavesdrop on a transmission without disturbing it. There are limits to quantum cryptography: It's slow and, because it's based on the physical properties of photons, works only over relatively short distances. Magiq's boxes can be separated by a distance of up to about 75 miles and use the secure quantum link only to exchange a cryptographic key, which a different type of conventional encryption--one that does not suffer from the theoretical factoring vulnerability--uses to set up the VPN. Magiq's Gelfond said he's offering "two flavors" of quantum encryption products. "Navajo is the commercial device, really meant for enterprise customers, which depending on the features, is $50,000 to $100,000 a box," Gelfond said. "Qbox is just a research device, a lab device, an open system that's completely configurable and does not do any encryption." Selling for $40,000 to $50,000, a Qbox uses a quantum link only for key distribution, and customers may add their own encryption. Quantum theory began at the turn of the last century with scientists who were puzzling over some strange inconsistencies in the real world that classical physics could not explain. Their work in establishing quantum mechanics led to the development of nuclear power, semiconductors, lasers and magnetic resonance imaging. A Scientific American article published in 2000 estimates that almost one-third of the U.S. GDP is "based on inventions made possible by quantum mechanics." Charles Bennett of IBM Research and Gilles Brassard of the University of Montreal demonstrated a laboratory "entanglement" of electrons about a decade ago, and since then there's been a concerted effort to take quantum cryptography out of the lab and build it into products. Geneva-based id Quantique is shipping a quantum key distribution system, but Magiq claims to have the first turnkey VPN box. Investors in Magiq, which has 22 employees, include Amazon.com CEO Jeff Bezos. Oisin Fouere Engineering Unit Raidtec Corporation Castle Road, Little Island, Co. Cork, Ireland. Phone : + 353 - (0)21 - 4353440 Extn: 255 Fax : + 353 - (0)21 - 4353799 Email : oisin.fouere@r... Web: www.raidtec.ie 7971 From: kondrak Date: Mon Nov 10, 2003 1:36pm Subject: Re: Digest Number 1408 You are infected with the DCOM exploit....Prob W2k or XP..... At 09:25 11/7/2003, you wrote: >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > > > >Message: 4 >Date: Thu, 06 Nov 2003 04:49:55 -0000 >From: "mooty_7" >Subject: ( RPC ) remote procedure call > >I know this is off topic...but you guys were the only ones with the >correct answer to my problem last time , so here goes. >one of the computers in " my " office as soon as it boots, just after > >pass word is entered 3 to 5 seconds pops up with a warning that says > >warning save data system is shuting down because " the remote >procedure call" has been terminated...and then it begains a 50 second > >count down...all this before the desk top even has a chance to >load.nothing has changed with this box in months.I have tried >everything short of blowing away the operating system and starting >over...I would be thankful for any help... > > >- --------------------------------------------------------------------- >- -- > > > >that is most likely the blaster worm. symantec has tools/tutorials to >rid your systems of it. >-----BEGIN PGP SIGNATURE----- >Note: This signature can be verified at https://www.hushtools.com/verify >Version: Hush 2.3 > >wkYEARECAAYFAj+rq0sACgkQioaWFFo3QxNGBgCghKVKoVz1ors/N6udv6wdO8sngKkA >oJXAMe1Ku+2n3BplcEGe1bECElaJ >=vHT1 >-----END PGP SIGNATURE----- > > > > >Concerned about your privacy? Follow this link to get >FREE encrypted email: https://www.hushmail.com/?l=2 > >Free, ultra-private instant messaging with Hush Messenger >https://www.hushmail.com/services.php?subloc=messenger&l=434 > >Promote security and make money with the Hushmail Affiliate Program: >https://www.hushmail.com/about.php?subloc=affiliate&l=427 > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7972 From: kondrak Date: Mon Nov 10, 2003 2:29pm Subject: More on the Dcom RPC exploit, Aka: Blaster worm Read this ALL first...before you do anything... (The short of it is Mooty, You ARE infected...) This should fix you up... I caution, if you were messing around in the windows directories, you may still wind up having to re-install the OS if you took out something that you shouldn't...(put all the parts back) Since I pasted this together for you, sequence of events: Get patch - Prob from an uninfected computer, put on a floppy it should fit. Get cleaner tool -URL below. Install patch. Run cleaner tool. When done, and system is working ok, Update your anti-virus, do a disk scan and install a firewall...if you've not done so, or enable the one provided in XP if thats your OS. Both patches I've listed below will prob have to be downloaded from a non-infected computer, unless youre on DSL or cable. Heres how I did it the first time I had to clean one: (copy the appropriate url, to your browser.. bookmark, save, let the machine reboot...disconnect the cablemodem, or dsl, reboot, get browser open, get bookmark loaded, re attach network, download as fast as possible, pray it makes it in time) ;( (The RPC fault doesn't seem to function, until you connect to the Internet on the XP box I was cleaning) The patch fits on a single floppy. Theyre a little bigger than 1mb. ANYONE who runs W2k or XP, should of already have these patches done, if you haven't, you're a sitting duck, and it's not a matter of IF, but WHEN you get hit. Most anti-viri programs already have this in their definitions, BUT PATCH ANYWAY! You DON'T want to be having to find these files while under a brainfarting computer condition. This bug DOES infest win9x computers as well, but is benign on those OS, this doesn't mean it cant be transferred to another W2k or Xp machine from one of these, in fact some variants do just that nicely. It wont cause the crash observed on the w2k or Xp boxes (NT kernal OS's) on the W9x boxes, they merely are vectors of the worm, not affected. For some strange reason, Win ME is neither susceptible nor infectable, but it's an orphan anyway. --pasted Important Notes: W32.Blaster.Worm exploits the DCOM RPC vulnerability. This is described in Microsoft Security Bulletin MS03-026, and a patch is available there. http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-026.asp You must download and install the patch. In many cases, you will need to do this before continuing with the removal instructions. If you are not able to remove the infection or prevent re-infection using the following instructions, first download and install the patch. Additional information, and an alternate site from which to download the Microsoft patch is available in the Microsoft article What You Should Know About the Blaster Worm and Its Variants. Because of the way the worm works, it may be difficult to connect to the Internet to obtain the patch, definitions, or removal tool before the worm shuts down the computer. It has been reported that, for users of Windows XP, activating the Windows XP firewall may allow you to download and install the patch, obtain virus definitions, and run the removal tool. This may also work with other firewalls, although this has not been confirmed. How do I know if I am already infected? Because of recent attacks exploiting the Windows vulnerability, your computer may already be infected. There are number of ways to check your system to verify if the RPC attack has affected your system. A few are listed below: Received a message saying the "RPC Server" is unavailable. Received a message saying "Windows must now restart because the Remote Procedure Call (RPC) service terminated unexpectedly". The computer then reboots. The C:\WINDOWS or C:\WINNT folder appears completely blank. Existence of a file called "msblast.exe" -> located within the Windows directory (i.e. C:\WINDOWS\system32\msblast.exe). NOTE: There have been variants to the msblast.exe file recently discovered. Check the Event Viewer (system log) and a DCOM or RPC error is present. Trouble cutting and pasting files. Internet links do not work (nothing happens). The Add/Remove Programs list is blank but includes "weird" characters. Error message saying "svhost.exe developed an error, an error log will be created". Scan your subnet for vulnerable systems using a RPC DCOM scanner - only recommend for department/college technicians (such as the Microsoft, eEye, or ISS scanners) --end paste Brief Descriptions: http://www.microsoft.com/security/security_bulletins/ms03-039.asp http://www.counterpane.com/alert-v20030916-001.html http://www.csupomona.edu/~helpdesk/news/exploit.htm The tool to remove: http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.removal.tool.html Patch for Windoze XP: http://www.microsoft.com/downloads/details.aspx?FamilyID=2354406c-c5b6-44ac-9532-3de40f69c074&displaylang=en Patch for Windoze 2k: http://www.microsoft.com/downloads/details.aspx?FamilyID=c8b8a846-f541-4c15-8c9f-220354449117&displaylang=en Let me know if these don't do the job, I've still got tools in the arsenal if these don't work. Marc 7973 From: mpaulsen6 Date: Mon Nov 10, 2003 5:36pm Subject: fluke ii for otdr I'm thinking of purchasing the DSP-FTK add on for the fluke onetouch series ii Fiber Optic Test Kit includes: Optical Power Meter (DSP-FOM) Combination of 850/1300 nm LED power source (FOS 850/1300) 2 multimode ST-ST patch cables 1 multimode ST-ST adapter Instruction sheet Instrument case Does anyone already use this? If so how's it working out. I recently also picked up a corning VFL-350, visual fault locator. Cost 1/2 as much as Corning's last VFL, p < 1Mw, Î = 635nm Works great, would highly recommend for those needing a VFL. (it's also fun to play with your cat with it) 7974 From: mpaulsen6 Date: Mon Nov 10, 2003 5:37pm Subject: JFK's car up for auction on ebay. http://cgi.ebay.com/ebaymotors/ws/eBayISAPI.dll? ViewItem&item=2441885223&category=6304 7975 From: Steve Uhrig Date: Mon Nov 10, 2003 7:51pm Subject: Nonlinear junction detector FS by another gentleman in the profession: http://tinyurl.com/uh50 I have known the owner for some years and he is honest and competent. You can have confidence in this unit, and his asking price is very fair. This piece was made by the original manufacturer of nonlins for TSCM. If you've been looking for a nonlin at a fair price, check out the above. Do not contact me for info. I am not the seller. You can contact the owner if you have any questions via the above webpage. He's described it accurately and in good detail. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7976 From: Steve Uhrig Date: Mon Nov 10, 2003 8:27pm Subject: Re: Q Crypto On 7 Nov 2003 at 13:50, Ocean Group wrote: > So what do you think folks....is it the end of the line for comms > eavesdroppers.....? When it comes to security, most people, including government agencies, are far more talk than action. People don't take the most basic steps towards physical security to protect their facilities. What would encourage them to invest heavily in this highly specialized, extremely expensive niche when they won't bother with the basics? Do the threats justify something like this, even if it actually is as wonderful as described? > Why are the NSA not bricking it? Because I suspect its not that > impenetrable.... I believe people underestimate NSA. They may enjoy challenges over their coffee break. Crossword puzzle today, break the latest crypto effort tomorrow. > It uses a combination of quantum cryptography and traditional > cryptography to provide a virtual private network (VPN) running over > fiber-optic cable that's designed to be completely secure against all > eavesdroppers. The last is an awful dangerous statement. Completely secure against all eavesdroppers? There are a lot of really competent eavesdroppers out there, many using techniques most will never hear of. And I tend to discount hyperbole claims of magic when sprinkled with a lot of impressive sounding buzzwords. But crypto is not my field, so I do not speak with any level of authority. > If an eavesdropper such as the National Security Agency, the FBI, or a > criminal enterprise ever managed to find a much faster way to factor > large numbers, the Internet's current security model would be > vulnerable. See statement above about underestimating NSA. I doubt there's much now which is not 'vulnerable'. And I believe anyone who relies on pablum like PGP probably is not fooling many other than themselves. > Magiq's device is designed to solve that theoretical problem by tapping > into the weird and counterintuitive laws of quantum physics, which say > that it is impossible to eavesdrop on a transmission without disturbing > it. The above statement, absent further qualifications, is untrue and any professional would consider it absurd. > Magiq's Gelfond said he's offering "two flavors" of quantum encryption > products. "Navajo is the commercial device, really meant for > enterprise customers, which depending on the features, is $50,000 to > $100,000 a box," Gelfond said. "Qbox is just a research device, a lab > device, an open system that's completely configurable and does not do > any encryption." Selling for $40,000 to $50,000, a Qbox uses a quantum > link only for key distribution, and customers may add their own > encryption. STEs are cheaper than this. Sure sounds more like a corporate press release to me, seeking investors, than a news item. But I could be wrong. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7977 From: David Alexander Date: Tue Nov 11, 2003 5:04am Subject: RE: Q Crpto As an Information Security consultant this is more my field. So I will attempt to explain. The theory of Quantum Crypto is very complex, and I would be lying like a cheap watch if I said I understood the maths, but I do understand the concept very well. First you must understand that no crypto is truly secure. As computing power increases any cipher becomes easy to break. A home PC and some C code will easily break the Enigma codes used by the Germans in WW2 (though the valve-driven machines built in 1942 were as fast as a basic Pentium processor !). The objective is for the crypto to protect the information until it no longer has any value - normally 50 years for the most sensitive data. That means devising a crypto algorithm and key length that it will be, to all intents and purposes, impossible to break using the technology available in the next 50 years - and remember that Moore's law says that computing power doubles approximately every 20 months - you do the maths. Quantum Computing (QC) has the potential to make code breaking much easier. It is ideal for attacking public/private key (aka Diffie-Helman) and Elliptical Curve crypto. The technology still has some way to go before it is ready, and there are doubts about being able to build a big and powerful QC system due to the limitations of the laws of physics. It will drastically reduce the time for a 'massive attack on the keyspace' which means simply trying every possible combination unless you have a 'crib' to help point you towards a limited range of settings. Big encryption keylengths means a lot of combinations to try, making a lucky hit very unlikely by conventional means. QC offers a lot of shortcuts that reduce the time taken to factor the primes or solves the curve equations very quickly. A lot of people believe that, if perfected, the QC means the end of the war between code maker and code breaker - and the code makers are not the winners. Quantum cryptography does not make a message impossible to intercept and read. It simply means that you cannot intercept and monitor the message without the target knowing you are eavesdropping. The actual state of the photons used to send the message is the message content, and it is impossible to detect that state without altering it (Heisenberg uncertainty principle). The target recipient will receive junk instead of the message because the eavesdropper changes it in the process of eavesdropping. This means the target will know that you are listening and that you have an encrypted transmission of theirs, which you still have to break (see above). As ever there is the potential to attack the message before and after it passes through the quantum relay....but that's your field, not mine . Hope this helps Regards Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: Ocean Group [mailto:inertia@o...] Sent:07 November 2003 13:51 To:TSCM Yahoogroup Subject:[TSCM-L] Q Crpto So what do you think folks....is it the end of the line for comms eavesdroppers.....? Why are the NSA not bricking it? Because I suspect its not that impenetrable.... Comments??? Cheers Oisin *********** Start-up makes quantum leap into cryptography By Declan McCullagh Staff Writer, CNET News.com http://news.com.com/2100-1029-5103373.html Story last modified November 6, 2003, 8:36 AM PST A 4-year-old start-up has begun shipments of what it says are the world's first commercial data-scrambling devices that use the radically new technology of quantum encryption. Magiq Technologies, a privately held firm based in New York City, said this week it is selling Navajo Secure Gateway for between $50,000 and $100,000 a unit. It uses a combination of quantum cryptography and traditional cryptography to provide a virtual private network (VPN) running over fiber-optic cable that's designed to be completely secure against all eavesdroppers. "We're getting very strong interest from service providers, the companies who own the fiber in the ground," Magiq CEO Bob Gelfond said in an interview Thursday. "The reason this is very attractive for them is that they're looking for ways to distinguish themselves. Security seems to be a way to do this. They feel they can add 30 or 40 percent to their top line by creating ultrasecure lines." Quantum cryptography addresses the most worrisome aspect of current public key cryptography, which powers Web browsers, applications like Pretty Good Privacy (PGP), and workhorse protocols like SSH and SSL. For security, those applications rely on the amount of time it takes to factor large numbers used in encryption keys, a task that mathematicians strongly believe is quite difficult but have never managed to prove. If an eavesdropper such as the National Security Agency, the FBI, or a criminal enterprise ever managed to find a much faster way to factor large numbers, the Internet's current security model would be vulnerable. Magiq's device is designed to solve that theoretical problem by tapping into the weird and counterintuitive laws of quantum physics, which say that it is impossible to eavesdrop on a transmission without disturbing it. There are limits to quantum cryptography: It's slow and, because it's based on the physical properties of photons, works only over relatively short distances. Magiq's boxes can be separated by a distance of up to about 75 miles and use the secure quantum link only to exchange a cryptographic key, which a different type of conventional encryption--one that does not suffer from the theoretical factoring vulnerability--uses to set up the VPN. Magiq's Gelfond said he's offering "two flavors" of quantum encryption products. "Navajo is the commercial device, really meant for enterprise customers, which depending on the features, is $50,000 to $100,000 a box," Gelfond said. "Qbox is just a research device, a lab device, an open system that's completely configurable and does not do any encryption." Selling for $40,000 to $50,000, a Qbox uses a quantum link only for key distribution, and customers may add their own encryption. Quantum theory began at the turn of the last century with scientists who were puzzling over some strange inconsistencies in the real world that classical physics could not explain. Their work in establishing quantum mechanics led to the development of nuclear power, semiconductors, lasers and magnetic resonance imaging. A Scientific American article published in 2000 estimates that almost one-third of the U.S. GDP is "based on inventions made possible by quantum mechanics." Charles Bennett of IBM Research and Gilles Brassard of the University of Montreal demonstrated a laboratory "entanglement" of electrons about a decade ago, and since then there's been a concerted effort to take quantum cryptography out of the lab and build it into products. Geneva-based id Quantique is shipping a quantum key distribution system, but Magiq claims to have the first turnkey VPN box. Investors in Magiq, which has 22 employees, include Amazon.com CEO Jeff Bezos. Oisin Fouere Engineering Unit Raidtec Corporation Castle Road, Little Island, Co. Cork, Ireland. Phone : + 353 - (0)21 - 4353440 Extn: 255 Fax : + 353 - (0)21 - 4353799 Email : oisin.fouere@r... Web: www.raidtec.ie ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7978 From: Steve Uhrig Date: Tue Nov 11, 2003 7:56am Subject: Sweep and find in Oct 1963 Fiction, but the concepts are valid 40 years later: http://home.gwi.net/~jdebell/pe/cj/v19-4.htm This will bring back fond memories for old timers. After you read the above, you may want to bookmark the index for when you have some time to enjoy electronics fiction. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7979 From: Steve Uhrig Date: Tue Nov 11, 2003 8:30am Subject: New Nigerian Scam Earlier I got a call from the AT&T relay center, which takes TTY (typed input) from deaf people, and an operator reads the teletype verbally to you and keys in your response to the hearing impaired caller. It is a means to allow hearing-impaired persons to communicate with others via telephone, and involves a live middleman operator to translate the TTY to voice in each direction. A caller from Nigeria wanted to place a large order for items I sell which are legal to consumers (Minox cameras) and wanted to pay for them with a credit card. At that point I asked the operator to terminate the conversation. I am on the receiving end of attempted scams from Nigerians on a weekly basis. It looks as if they now are using/abusing the free relay services to break any traceable link of emails or telephone calls. Watch for this and maybe inform others who may be in a vulnerable position. My credit card processor sent a Merchant Alert the other day advising merchants to use caution with any credit card sales to Indonesia, Nigeria and Ghana due to a high prevalence of fraud from those countries. FYI. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7980 From: Date: Wed Nov 12, 2003 8:44am Subject: Can your razor blade spy on you? Subj: Can your razor blade spy on you? Date: 11/12/2003 11:35:25 AM Pacific Standard Time From: EBBHHSS To: MACCFound from the November 06, 2003 edition - http://www.csmonitor.com/2003/1106/p14s01-stct.html Can your razor blade spy on you? By Chris Richard | Contributor to The Christian Science Monitor LOS ANGELES - Each year, businesses lose billions of dollars in inventory that simply disappears. While thieves account for some of the loss, a second category has troubled company executives more - merchandise that vanishes into a faulty record-keeping system. A technology called RFID, "Radio Frequency Identification," could put an end to such confusion. Proponents of the technology have described it as a next-generation bar code, sure to ease inventory control and lower costs. Eventually, RFID tags could end up on everything from razor blades and books to clothes that send cleaning instructions to your washing machine. But privacy advocates and civil libertarians say the technology designed for tracking widgets at a very short range can easily be adapted to tracking and spying on people, just as software "cookies" now track computer users' movements online. And as some of the world's largest companies prepare to shift their record keeping to the new model, there's a growing debate as to how - or whether - it should be regulated. "We're at the very beginning stages of the uses of this technology, so it's not entirely clear how it will be used," says Deborah Bowen, a California state senator who may propose RFID legislation. "My general inclination is that it's better to design in safeguards before there's widespread deployment." RFID depends on two components: a tiny transponder, or "tag," that includes a computer chip and radio antenna, and a reader. While a bar code must be scanned with a laser, the RFID tag only needs to pass near a reader, as far as several feet away. Already in use in toll routes and electronic door locks in the US and abroad, the reading device fires a burst of radio waves that turn the tag on. In turn, it transmits its data back to the reader. The data is then passed to a computer. In a store or warehouse, the tag can transmit information such as product type, cost, and age. The information might prompt the computer to order new inventory. But privacy advocates worry it might be only a small step from tracking merchandise with RFID devices to tracking the people who buy the merchandise. "The radio signature of an RFID tag could be identified with a person," says Beth Givens, executive director of Privacy Rights Clearinghouse, an advocacy group based in San Diego. "The potential for surveillance is very real." The technology is well suited to a cultural shift now taking place in developed nations, says Jerry Kang, a visiting professor at Harvard Law School. He calls it "pervasive computing." Professor Kang envisions a world in which computers and information technology are woven even more seamlessly into daily life. For instance, mobile telephones might soon include global positioning capabilities and RFID, he says, so one could track friends and family or get help fast in an emergency. But as the technology advances, there could well be a tradeoff in privacy in exchange for such convenience, he adds. "The real reason stores don't track us now is that they can't," Kang says. "If they could invisibly place an Internet-style cookie on us and keep track of where in the store we browse and for how long, they would. Amazon.com does a lot of database marketing right now. Even if you're not buying anything, they know who you are and they're collecting data on what you look at. [With RFID] it's quite possible for other stores to do that too." However, many of those involved in developing the technology are skeptical. "Is it possible? Yeah. Could my students build something like that? Yeah. Is there a business value to it? I don't think so," says Sanjay Sarma, research chair of the Auto-ID Center, the consortium based at MIT in Cambridge, Mass., that developed RFID. "Is it going to be economically feasible? I don't think so." One issue, Mr. Sarma says, is the carrying distance of today's RFID signals. The cheapest tags have no power source of their own and typically can only communicate with a reader over a few inches or, at most, a yard. Some tags do have batteries, but they're much more expensive and, although they might be able to communicate 15 feet or more in ideal conditions, they're much less reliable. Batteries are also expensive, and when they die, the card stops working. For their part, store executives say they're much more likely to confine themselves to passive tags for tracking inventory. Wal-Mart, for example, has asked its 100 top suppliers to make deliveries with RFID tags on pallets and cases starting in 2005, says Tom Williams, a spokesman for the retail giant based in Bentonville, Ark. The chain will set the same standard for all 20,000 of its suppliers in 2006, in order to save money and increase sales through more efficient inventory practices. But some companies are experimenting with more sophisticated applications. This year at the Tokyo International Book Fair, Sun Microsystems and the Japanese communications company NTT demonstrated a system that can track which books a shopper looks at and for how long. It also can monitor how many times a particular book is removed from its shelf. In Britain, the Tesco discount chain and Gillette have tested an antishoplifting system that has store security cameras photograph people who take an abnormal number of blades off the shelf. "Typically, purchasing patterns don't have you purchasing five- or 10-blade packages," says Gillette spokesman Eric Kraus. Gillette's "Mach3" blades are among the most frequently pilfered items at the store, he adds. The privacy-rights group Consumers Against Supermarket Privacy Invasion and Numbering has denounced the test on its website and called for a boycott. "We support free and open discussion of all (privacy) aspects but in the end consumers, and not advocacy groups, will decide on what technology innovations consumers support," Mr. Kraus counters. "We're working with other companies involved to develop guidelines." Earlier this year, Gillette announced it had placed an order for up to 500 million RFID tags to be used in its supply chain, from manufacturing to inventory to sales. But don't expect widespread use of the tags right away, says Dan Mullen, CEO of Automated Information Manufacturers, or AIM, Inc., an international trade group for the RFID industry based in Pittsburgh, Pa. Companies have discussed putting RFID tags on garments so that a similarly-equipped washing machine would know how to clean them. But researchers haven't figured out a way for the clothing to send clear signals from the metal-lined interior of a machine, where radio signals bounce around. It may take years for researchers to work out basic standards. "At the end of the whole discussion, companies are only going to adopt things that make them more competitive and provide better customer service," Mullen says. One key issue is the location of the tag, says Ms. Givens of the privacy clearinghouse. She argues all RFID tags should be readily identifiable and easy to remove, destroy, or turn off. Several policymakers, from California Senator Bowen to Mr. Sharma of the Auto-ID Center, agree. Still, as new as the technology is, consumers object to what they perceive as surreptitious surveillance, says Paul Lee, a research analyst with Deloitte Consulting in London. If manufacturers can find ways to make RFID useful to their customers, he thinks they'll find a market within the next 20 years. Mr. Sharma thinks it will take longer, if it ever happens. At this early stage in RFID, Harvard's Professor Kang says, it's crucial that the tags give an audible or tactile alarm every time they're signaled by a reader. "If you got one of those notifications, it would be interesting to you. It could start a policy and political conversation.... It might even get us mad. But 10 years from now it could be like [online] cookies. People might say, 'Just live through it.' " [Non-text portions of this message have been removed] 7981 From: Date: Wed Nov 12, 2003 8:45am Subject: Cellphone cameras ring warning bells November 07, 2003 edition - http://www.csmonitor.com/2003/1107/p13s02-stct.html By Jennifer Wolcott Staff writer of The Christian Science Monitor It starts out innocently enough: a forgotten camera, a precious moment, and then aha! - out from one's pocket or purse comes that slick new cellphone with a camera lens. A baby's first smile, a Little Leaguer's home run, or a friend's walk down the aisle is captured. What a relief. But as these phones become more and more popular around the world - 80 million have been sold since they were introduced early in 2002 - people have discovered that, like many forms of technology, this hip electronic gadget isn't always so cool. In Australia, pictures taken with a camera cellphone of an imprisoned stockbroker were published in a Sydney newspaper. In England, onlookers with video mobile phones filmed a rape in the restroom of a pub. And a handful of websites now post photos taken surreptitiously with camera cellphones. Each of these examples is different, but together they raise some of the same questions: What are the rights of the person being photographed, and should controls be put into place to limit where and how camera cellphones may be used? For starters, say experts on technology and privacy issues, one has to consider the location of the activity and if an individual can reasonably expect to be unobserved there. "Out in public, you are fair game," says David Bentkowski, a city councilman and lawyer in Seven Hills, Ohio. But when someone is in a private location, he adds, that's another story. Ever since he first encountered a camera cellphone, Mr. Bentkowski has spent much time pondering and discussing its potential for infringing on privacy rights. He has been in contact with state and federal politicians and hopes to influence legislation banning these phones in public restrooms, locker rooms, and showers. Taking pictures in places such as these, where one expects to be unobserved, is an obvious invasion of privacy, he says. Possible limits on photo cellphones Michael Oxley, a congressman from Ohio and a former FBI agent, is also interested in this issue. He is the author of a bill already passed by the US Senate and currently being considered in the House of Representatives regarding "video voyeurism." It includes bans against taking and disseminating pictures of people in "sensitive or compromising states" in federal areas - national parks, forests, buildings, etc. The bill would also apply to those taking pictures with camera cellphones, says Tim Johnson, press secretary for Representative Oxley. If the bill is passed, he adds, people who take pictures of others with these phones on federal land could be fined (an amount still undecided) or sent to jail for a year. "The bill would serve as a template for the states," says Mr. Johnson. "It's likely to pass easily since we are not trying to infringe on First Amendment rights or enforce Internet censorship. We are just trying to define the problem and take a rifle-shot approach." Meanwhile, though, early next year isn't soon enough for some people. And bans on camera cellphone use only on federal lands don't always cut it. To avoid the problem altogether, last July the Sports Club/LA opted to ban the use of all cellphones everywhere in its nine US gyms, except for the lobbies. "A single incident didn't trigger this decision," explains publicist Rebecca Harris. "Our security director recommended this as a protection to our members, many of whom are celebrities." The YMCA of the USA has followed suit, says Erin Streeter, Washington spokesperson for the organization's national resource office. She is urging the 240 independent YMCA gyms nationwide to ban camera cellphones - a step already taken by the YMCA of Australia. Are laws and rules necessary? Some say that such bans might not be needed. "Social norms will develop, and people will not take [unsolicited] pictures because it's rude," says Douglas Thomas, associate professor of communication at the University of Southern California in Los Angeles. Professor Thomas adds that the only revolutionary thing about these phones is their ability to distribute pictures on the Internet. "There's really nothing new about taking photographs surreptitiously," he says. "For about 10 years now, any creep wanting to take 'up-skirt' kind of photography has had access to the technology. A camera that fits in the button of a shirt costs a mere $35." High-tech phones are not all bad, adds Thomas. "If you have your phone, you've got your camera. One might ... be witness to a crime and take a picture that would be useful." But, he adds, someone who intends to take quality pictures isn't likely to use a camera cellphone. With only one-third of a megapixel in most of these phones, the quality simply isn't there. Next year the photos should be better That's changing, however, says NOKIA's Keith Nowak. "Right now," he adds, "anything bigger than a 3-inch-by-5-inch photo loses its resolution and looks grainy. But next year, you're going to see these phones with triple the [number] of megapixels." He and Marty Nee, his peer at competitor ATT, both view these phones as similar to other recording devices whose pictures could be be widely distributed if one were so inclined. "There's always the [possibility] that people will misuse the phones," Mr. Nowak says, "but most people are buying them to document their lives, just as they would with any other camera." "We don't see any need for additional controls placed on wireless camera phones," says Mr. Nee, adding that people must use common sense with all cameras. But David Sobel, general counsel at the Electronic Privacy Information Center in Washington, disagrees. "Congress hasn't squarely addressed this issue yet, and it needs to," he says. "This is a classic example of technology outpacing the development of the law." Full HTML version of this story which may include photos, graphics, and related links www.csmonitor.com | Copyright © 2003 The Christian Science Monitor. All rights reserved. For permission to reprint/republish this article, please email copyright@c... [Non-text portions of this message have been removed] 7982 From: Steve Uhrig Date: Sat Nov 15, 2003 7:05pm Subject: Avcom spectrum analyzer kit FS Avcom Spectrum Analyzer & Freq Extender & More Avcom PSA-65C spectrum analyzer, 1-1250 megacycle coverage. For full specs, go here: http://www.avcomofva.com/cover.asp and click on Spectrum Analyzers and Analyzer Accessories. This package has an interesting history. It is a -65C analyzer with V2.1 firmware, optional accessory plastic cover, carrying handle aka bail, padded carrying case, AC and DC power cords, RFP-24 low noise 22dB gain preamp, BNC antenna, BNC>F coaxial adapter, *and* a MFC- 2000/5000 frequency extender which covers 2.0 - 3.0 gigs and 5.0 - 6.0 gigs. Also included is a military-grade BNC jumper cable to connect the extender to the spectrum analyzer. Note the two extended bands are the popular ISM (Industrial, Scientific & Medical) bands where inexpensive consumer grade wireless video is prevalent. Oh, an instruction manual is included. The package was purchased by a small cable TV operation in Virginia who was experiencing terrestrial interference on one of their satellite downlinks and needed this to find the problem. They purchased everything in a panic, but by the time the extender was specially made and the equipment shipped, the problem had gone away. They never used the system, and after a short while resold it to me to recover some of their investment. They never even attached the optional bail. They paid USD $5099 for the package. Avcom threw in the hard cover for nothing. You would pay that plus shipping anywhere you purchased the equipment. Look it up yourself on the web and see. The -65C has the AM and FM demodulators but does not have the 10 KC bandwidth filter or the video demodulator. If you need these, you can purchase them yourself from an Avcom distributor. Any TSCMer will recognize the friendly, easy to operate yet potent PSA-65C as the most popular spectrum analyzer ever in TSCM. Thousands of them are in use by professional sweepers. The unit is instinctive to use and capable, in the hands of a competent user, of identifying nearly any RF threat within its coverage range of 1-6 gigs (except 4 - 5 gigs where the extenders do not overlap and I have never heard of a surveillance device being found in that region). If you are just starting and need something you can grow with, an experienced professional needing a spare unit, a peripatetic sweeper (look it up) needing a spare kit to leave at a regular customer's location or anyone who needs a complete, inexpensive, capable RF kit, here it is. Unit is in perfect operating condition and correlates properly with my $50,000 Tek unit which was calibrated this year and cost more when it was new than my house did. It's getting to year end. Businesses making a capital investment in equipment may be able to take a tax deduction on something like this. Pay the money in taxes, or buy gear. Your choice. I've had a number of these Avcom pieces before, and they generally sell quickly. If you're interested, don't hesitate. Almost every time I advertise a decent piece, it sells quickly and I have to disappoint a number of friends, which makes me sad. New price is $5099. Your price for the complete package as described above is $3500. Save $1600. Not bad. Price includes domestic insured shipping so $3500 is the total you pay. I will credit international buyers with the equivalent of domestic shipping. Comes with my guarantee -- check the references section of my website or ask anyone in the TSCM business if you have any concerns. I take credit cards and can ship internationally. If you are outside the U.S., please let me know if you will need a 220V to 110V converter as this unit is set up for 110VAC. This is a rare opportunity. Someone will get a real nice piece in perfect condition and save a large chunk of change. Holler if questions. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7983 From: mpaulsen6 Date: Sun Nov 16, 2003 11:03am Subject: Re: Q Crpto To paraphrase: http://www.infoworld.com/article/03/10/29/HNquantambreakthrough_1.htm l a system with just 10 qubits could carry out 1,024 operations simultaneously as though it were a massively parallel processing system. A 40-qubit system could carry out one trillion simultaneous operations. A 100-qubit system could carry out one trillion trillion simultaneous operations. From: dj Date: Sun Nov 7, 2004 7:31pm Subject: WiFi Gadget That gadget is a waste of money. You can simply download netstumbler (laptop/ws) or ministumbler (pda) and see everything about a wireless network you want. Suggestion: spend the money and buy the netstumbler kit because the new orinco cards don't have the same chipset. With the high gain antenna i have I can log onto networks about 2 miles away (depending on location). Also take a look at kismet and wepcrack if you are interested in vulnerabilities. IT2 --------------------------------- Do you Yahoo!? Check out the new Yahoo! Front Page. www.yahoo.com [Non-text portions of this message have been removed] 10046 From: Mitch D Date: Mon Nov 8, 2004 9:51am Subject: electronic vendors digikey is one of my favorites,db.johnston occasionally has interesting items __________________________________ Do you Yahoo!? Check out the new Yahoo! Front Page. www.yahoo.com 10047 From: Hawkspirit Date: Mon Nov 8, 2004 5:32pm Subject: More Business This is true as long as you are skilled enough to detect a CALEA tap and a highly integrated cellular bug. Roger Date: Sun, 7 Nov 2004 17:44:08 -0800 (PST) From: Agent Geiger Subject: Re: Digest Number 1727 Well, the bright side is, that in a police state, the use by government of taps and bugs will increase. That means, more business for us! :) [Non-text portions of this message have been removed] 10048 From: Hawkspirit Date: Mon Nov 8, 2004 5:48pm Subject: Voting Machine Sweep Needed ." Quoting from the December 1996 issue of Cincinnatus News Service, a vote fraud newsletter, Devvy went on to note, "The missing link in the vote fraud investigation has been found. The November 1996 issue of Relevance Magazine reveals that two-way hidden modems are being built into the ever growing number of computerized optical scanner/direct recording voting machines in use all across the country from New England to California...these hidden modems are accessible by remote cell phone technology...these voting machines can be accessed and manipulated from a central super computer without a phone line connected to the wall, and without the local precinct workers knowing that anything is happening at all." I wonder why Dan Rather didn't tell us about this? [Non-text portions of this message have been removed] 10049 From: James M. Atkinson Date: Mon Nov 8, 2004 7:18pm Subject: Re: Elections At 03:39 AM 11/8/2004, Michael Puchol wrote: > > GPS tracking without seeing the satellites > >We tried a Labrador, but it wasn't able to keep up with the vehicles. Must have been a Newfoundland, a Black Lab can see GPS satellites with no problem. > > GSM direction finding using espresso coffee machine > >For some reason they make them with plastic cases nowadays, which don't make >a good ground plane for the doppler antenna array. You also must refrain >from making coffee during tracking, as the motor noise tends to kill the >receiver. Har... you should put a [noise] filter in the coffee maker, it might help (sorry I couldn't resist). > > using a carbon plate as a phased array microphone > >It's on back order. Let me know when they start to ship, but I understand a company in New Rochelle may have priority on shipments. > > NLJD-based mind control system > >Russians had those, didn't they? Tin foil hat optional. You have to hold the NLJD pretty close to the skull for it to work right (don't laugh... I know of a "TSCM person" who uses an old 3 watt SuperScout to prove to his clients that they do indeed have thought reading devices in their skull). > > RF-powered razor > >Works better as a lawnmower, little home accident during testing. Yep, and it makes coffee too. >Cheers! > >Mike > >P.S. to add a serious note to all this, I believe SiRF are about to release >their new chipset, with (they claim) 200.000 correlators, which would make >GPS work under serious impaired conditions, such as inside buildings, etc. >(they claim). I still cannot see how the laws of physics (SNR particularly) >can be beaten. It's not that extremely weak signals cannot be received, >after all we are still getting data from Voyager which is past Pluto, but >how you can do that in a consumer-sized device escapes me. > >Best regards, > >Mike If you consider the process gain that you can get in GPS systems, plus the new chips, filters, and amplifiers it is quite easy to lock on to a GPS signal inside a building. The only problem is that once you move away from the outside skin of the building and towards the building core things get a little touchy. Also, there is the issue of being able to pickup the signal from enough satellites to compute a position without being way off target. Outside, in to open it is easy to pickup 8-10 satellites with no problem, and often you can see 10-12. However, once you move indoors you may only see 4 to 6, and sometimes less. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10050 From: Date: Mon Nov 8, 2004 5:25am Subject: Rif: Re: Digest Number 1727 > Well, the bright side is, that in a police state, the > use by government of taps and bugs will increase. > That means, more business for us! :) Are you sure? It depends. Sweeping could become a state monopoly, and an unlawful activity in private hands. If your previous activities make you suspect enough, you might just end up in Guantanamo, just to make sure. Joking, of course, but less than 100%. Ciao! Remo 10051 From: jtowler2004 Date: Mon Nov 8, 2004 5:44am Subject: Re: Frequency Filtering Wallpaper Just reading some of the past archive before posting or mouthing off myself ... Anyway, a message or two here about Frequency Filtering Wallpaper from July. Here in New Zealand there have been at times on the TV, adverts for a paint that you can stick magnets to. I.E. Paint the kids room with it, and then fridge-magnetic toys like words, letters and things can be put on the wall. Anyway, for that to work, I assume there must be a significant amount of iron dust in the mix, or some such thing. My question: Assuming the above, would the paint provide any useful amount of RF shielding? I would not even begin to expect it would provide anything useful against bugs and the likes, but maybe it might lower the RF noise floor a little. Comments please. If there is interest, I'll attempt to location the product and maybe if I can buy a small can, do some basic testing. What interest if any? Regards from New Zealand. - Jim Towler. 10052 From: John McCain Date: Mon Nov 8, 2004 10:41am Subject: Re: 25 Position Switches Jay, I always look at Digi-key first. Either on the web or by calling their 800 number. My employer manufacture many products in the 100 to 10,000 quantity batch range. Our purchasing agent found that digi-key often offers lower pricing than manufacturers and "traditional" full-line distribution channels for most electronic components. We now buy much of our production quantity components and essentially all of our prototype quantity stuff from them unless it's only available from the manufacturer (as in pre-production samples). Everything from open frame power supplys down to surface mount parts. Digi-key supplies it in a couple of days from stock, and quantity doesn't scare them as long as it's between 0 and 100,000 (or you can wait for them to get the larger quantities on some stuff). Their phone engineering assistance is also great... their guys know components and what's obsolete/new/replacement/ compatible/etc. They also know about stuff that is not in their online or print catalogs. We've also discovered that their look-up screens on the web site are such an industry resource that their competitors use the digi-key site to quickly access manufactur's data sheets and specs. In short, they are one distributor that I've really been happy with. That seldom happens much anymore. Cheers, JohnM J. Coote wrote: > > Hello list- a nonpolitical question: > I'm looking for US sources of 25-position, single pole rotary switches. > Thanks, > Jay 10053 From: Agent Geiger Date: Mon Nov 8, 2004 1:28pm Subject: RFID OK, I am new to this, but is there a way to jam the new RFID's? I think there will be a large market for a device such as this. __________________________________ Do you Yahoo!? Check out the new Yahoo! Front Page. www.yahoo.com 10054 From: savanted1 Date: Mon Nov 8, 2004 0:43pm Subject: Computer Forensics Dear, Esteemed Group Members I have just recieved this bit of informative news and thought it could be useful to members of this group. Plese feel free to check out this forum on computational forensics. See the link below for more information pertaining to this subject matter. http://www.computerforensicsworld.com/index.php Best Wishes and Regards, 10055 From: Agent Geiger Date: Mon Nov 8, 2004 6:41pm Subject: Re: Voting Machine Sweep Needed www.BlackBoxVoting.com --- Hawkspirit wrote: > > > ." Quoting from the December 1996 issue of > Cincinnatus News Service, a > vote fraud newsletter, Devvy went on to note, "The > missing link in the vote > fraud investigation has been found. The November > 1996 issue of Relevance > Magazine reveals that two-way hidden modems are > being built into the ever > growing number of computerized optical > scanner/direct recording voting > machines in use all across the country from New > England to > California...these hidden modems are accessible by > remote cell phone > technology...these voting machines can be accessed > and manipulated from a > central super computer without a phone line > connected to the wall, and > without the local precinct workers knowing that > anything is happening at > all." I wonder why Dan Rather didn't tell us about > this? > > > > [Non-text portions of this message have been > removed] > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10056 From: kondrak Date: Mon Nov 8, 2004 9:06pm Subject: Re: WiFi Gadget I use netstumbler here, and Im most happy with it. At 20:31 11/7/2004, you wrote: >That gadget is a waste of money. You can simply download netstumbler >(laptop/ws) or ministumbler (pda) and see everything about a wireless >network you want. Suggestion: spend the money and buy the netstumbler kit >because the new orinco cards don't have the same chipset. With the high >gain antenna i have I can log onto networks about 2 miles away (depending >on location). Also take a look at kismet and wepcrack if you are >interested in vulnerabilities. > >IT2 > > >--------------------------------- >Do you Yahoo!? > Check out the new Yahoo! Front Page. www.yahoo.com > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10057 From: kondrak Date: Mon Nov 8, 2004 9:08pm Subject: Re: More Business That usually requires access to the switch, ...difficult, ...not impossible mind you, but usually difficult. ESS, DMS and Ericsson are all compromiseable, if you know how they're put together. At 18:32 11/8/2004, you wrote: > > >This is true as long as you are skilled enough to detect a CALEA tap and a >highly integrated cellular bug. > > > >Roger > > > >Date: Sun, 7 Nov 2004 17:44:08 -0800 (PST) > > From: Agent Geiger > >Subject: Re: Digest Number 1727 > > > > > >Well, the bright side is, that in a police state, the > >use by government of taps and bugs will increase. > >That means, more business for us! :) > > > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10058 From: kondrak Date: Mon Nov 8, 2004 9:09pm Subject: Re: Voting Machine Sweep Needed I read that...here in NY the just lie... At 18:48 11/8/2004, you wrote: > > > ." Quoting from the December 1996 issue of Cincinnatus News Service, a >vote fraud newsletter, Devvy went on to note, "The missing link in the vote >fraud investigation has been found. The November 1996 issue of Relevance >Magazine reveals that two-way hidden modems are being built into the ever >growing number of computerized optical scanner/direct recording voting >machines in use all across the country from New England to >California...these hidden modems are accessible by remote cell phone >technology...these voting machines can be accessed and manipulated from a >central super computer without a phone line connected to the wall, and >without the local precinct workers knowing that anything is happening at >all." I wonder why Dan Rather didn't tell us about this? > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10059 From: kondrak Date: Mon Nov 8, 2004 9:12pm Subject: Re: RFID Theres a gadget out there that confuses them and forces them to do a sequential count. Detectors, and devices to destroy them (thinking microwaves) are going to be in big demand. Also discussed, was saving and salting Wallymart with millions of the little bastards...Michelin is reportedly putting them in tires, that opens up a whole BAD world of surveillance IMHO. At 14:28 11/8/2004, you wrote: >OK, I am new to this, but is there a way to jam the >new RFID's? I think there will be a large market for >a device such as this. > > > > > >__________________________________ >Do you Yahoo!? >Check out the new Yahoo! Front Page. >www.yahoo.com > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10060 From: Mitch D Date: Mon Nov 8, 2004 9:55pm Subject: Velva Klaessy,cryptanalyst, dead at 86 http://www.startribune.com/stories/462/5072390.html Trudi Hahn Star Tribune November 7, 2004 Velva Klaessy, a government cryptanalyst who accomplished some firsts for female code breakers -- with accompanying problems in the male-dominated field -- died Sept. 16 in Golden Valley. She was 88. "She could never talk about it," said her brother Dale Klaessy of Minnetonka. "It was a lonely, lonely job." Born to a farm couple in 1915 in Renwick, Iowa, Klaessy got a scholarship during the Depression to attend what is now Northern Iowa University. With no money to buy clothes, her father bought her 500 baby chicks to raise. When she sold them, she bought fabric and made her wardrobe. She received her degree in math in 1937 and took her first job in a small town dominated by a Protestant congregation. It decreed that the public-school teachers weren't allowed to play cards or go to the movies. After the town protested that she was insulting its sons by dating a young man from a different town, she left at the end of the year. In 1944, she was teaching high school math and science in Cherokee, Iowa, when a government recruiter came to ask if she had any students good in math who might want to join the war effort as a cryptologist in the Army Signal Corps. Her best students were all headed for college, so she didn't want to recommend them, but she took the job herself. After World War II she stayed in the field as the Armed Forces Security Agency and the National Security Agency (NSA) were formed. Although much of her work remains classified, information from the National Cryptologic Museum of the NSA, based at Fort Meade, Md., states that she was a member for many years of the highly respected Technical Consultants group, which assisted other analytic offices with their most difficult problems. In the summer of 1953, she and a male officer were posted temporarily to the Far East to train military personnel. According to oral tradition, the museum said, female NSA employees had never gotten temporary posts in that part of the world. Before she left the consultants group, she was posted temporarily to the United Kingdom. Her British counterpart threw a welcoming party -- in a men's club from which women were barred, her brother said. Female NSA employees battled for recognition at home, too. At one point a supervisor told her that she had earned a promotion but he was giving it to a male co-worker "because he had a family," her brother said. From 1958 to 1967, Klaessy finally received positions of high responsibility in sectors dealing with cutting-edge technology, the museum said, including being named chief in 1964 of the New and Unidentified Signals Division. She returned in 1967 to what is now called the extended enterprise when she was named deputy senior U.S. liaison officer in Ottawa, Canada. In 1970 she was named senior liaison officer in Ottawa, becoming the first woman to hold the senior post anywhere in the world. As senior officer, she represented the U.S. Intelligence Board and the NSA with appropriate organizations in Canada in all matters about signal intelligence and communications security. She returned to Fort Meade in 1975 but retired shortly afterward to care for ill relatives, her brother said. She was found to have Parkinson's disease about 1987 and moved to the Twin Cities to be close to relatives. In addition to her brother Dale, survivors include another brother, Earl of Spencer, Iowa. Services have been held in Iowa. __________________________________ Do you Yahoo!? Check out the new Yahoo! Front Page. www.yahoo.com 10061 From: Michael Puchol Date: Tue Nov 9, 2004 1:43am Subject: "Agumented" GPS (Was: Elections) ----- Original Message ----- From: "James M. Atkinson" To: Sent: Tuesday, November 09, 2004 2:18 AM Subject: Re: [TSCM-L] Elections > If you consider the process gain that you can get in GPS systems, plus the > new chips, filters, and amplifiers it is quite easy to lock on to a GPS > signal inside a building. The only problem is that once you move away from > the outside skin of the building and towards the building core things get a > little touchy. Also, there is the issue of being able to pickup the signal > from enough satellites to compute a position without being way off > target. Outside, in to open it is easy to pickup 8-10 satellites with no > problem, and often you can see 10-12. However, once you move indoors you > may only see 4 to 6, and sometimes less. Agreed - yesterday I got to try a new GPS made by Falcom (cheapo manufacturer, based in DE AFAIK), which managed to get much better locks that it's previous models and other receivers under the same conditions. In this case, it seems they have improved the clock, and added a few more correlators. However, as you mention, it will only get a lock on the outer side of a building, and that with a good constellation. More to follow as I get my hands on these things, best regards, Mike 10062 From: J. Coote Date: Mon Nov 8, 2004 8:02pm Subject: RE: Re: Frequency Filtering Wallpaper Back in another incarnation, some paper-pusher bought this new, wazoo, fiberglass dish satcom dish antenna. The mfgr neglected the metallic coating so we expended some time and expletives in trying to aim the dish at the bird. With no metallic coating all we had was an a$$-backwards feed horn. So.... that in mind the metallic coat could "lessen" RF penetration. I say lessen because you would still need to make a screen room, and deal with all ingress/egress pipes, wires, etc- windows and seals, doors and seals. Seals need to be smaller-tighter as frequency increases. Jay Los Angeles -----Original Message----- From: jtowler2004 [mailto:jtowler@x...] Sent: Monday, November 08, 2004 3:45 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Frequency Filtering Wallpaper Just reading some of the past archive before posting or mouthing off myself ... Anyway, a message or two here about Frequency Filtering Wallpaper from July. Here in New Zealand there have been at times on the TV, adverts for a paint that you can stick magnets to. I.E. Paint the kids room with it, and then fridge-magnetic toys like words, letters and things can be put on the wall. Anyway, for that to work, I assume there must be a significant amount of iron dust in the mix, or some such thing. My question: Assuming the above, would the paint provide any useful amount of RF shielding? I would not even begin to expect it would provide anything useful against bugs and the likes, but maybe it might lower the RF noise floor a little. Comments please. If there is interest, I'll attempt to location the product and maybe if I can buy a small can, do some basic testing. What interest if any? Regards from New Zealand. - Jim Towler. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10063 From: satcommunitfive Date: Mon Nov 8, 2004 11:15pm Subject: Re: WiFi Gadget for $50 its not that bad... I have been using an IPAQ and a AVAYA Wlan card for about 3 years with mini-stumbler and yes it works well. Not to metiom a PDA with WIFI in Australia is like $700 My use is more for having it stuck to the dash of the car to sus out hot-spots etc. And to check what a signal is on 2.4Ghz etc. now all it needs is a DECT fone dectector most of the crud on 2.4Ghz video links is WIFI/DECT etc no one commented on the Anritsu site-masters/spectrum-masters I geuss no one uses these spec anns ??? bewell 10064 From: satcommunitfive Date: Mon Nov 8, 2004 11:27pm Subject: Re: RFID of course you can -but the jammer will set of the reader unless its a smart coded type ... my analysis is the signals are quite wideband wrap the item in tin foil ! [then the aliens cant steal em too] must drink more coffee..... --- In TSCM-L@yahoogroups.com, kondrak wrote: > Theres a gadget out there that confuses them and forces them to do a > sequential count. > Detectors, and devices to destroy them (thinking microwaves) are going to > be in big demand. > Also discussed, was saving and salting Wallymart with millions of the > little bastards...Michelin is reportedly putting them in tires, that opens > up a whole BAD world of surveillance IMHO. > > At 14:28 11/8/2004, you wrote: > > > >OK, I am new to this, but is there a way to jam the > >new RFID's? I think there will be a large market for > >a device such as this. > > > > > > > > > > > >__________________________________ > >Do you Yahoo!? > >Check out the new Yahoo! Front Page. > >www.yahoo.com > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > 10065 From: Agent Geiger Date: Mon Nov 8, 2004 10:03pm Subject: Re: RFID I agree. Do you think that it is possible to make a jammer that someone could carry on their person, that blocks them? How, about for around the house, etc.? Is there anything on the market now that can do this already? Where can I find a reader? --- kondrak wrote: > Theres a gadget out there that confuses them and > forces them to do a > sequential count. > Detectors, and devices to destroy them (thinking > microwaves) are going to > be in big demand. > Also discussed, was saving and salting Wallymart > with millions of the > little bastards...Michelin is reportedly putting > them in tires, that opens > up a whole BAD world of surveillance IMHO. > > At 14:28 11/8/2004, you wrote: > > > >OK, I am new to this, but is there a way to jam the > >new RFID's? I think there will be a large market > for > >a device such as this. > > > > > > > > > > > >__________________________________ > >Do you Yahoo!? > >Check out the new Yahoo! Front Page. > >www.yahoo.com > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== > TSKS > >Yahoo! Groups Links > > > > > > > > > > __________________________________ Do you Yahoo!? Check out the new Yahoo! Front Page. www.yahoo.com 10066 From: Nalesnik, Matthew Date: Tue Nov 9, 2004 8:12am Subject: RE: Elections > If you consider the process gain that you can get in GPS systems, plus the new chips, filters, and amplifiers it is quite easy to lock on to a GPS signal inside a building. The only problem is that once you move away from the outside skin of the building and towards the building core things get a little touchy. Also, there is the issue of being able to pickup the signal from enough satellites to compute a position without being way off target. Outside, in to open it is easy to pickup 8-10 satellites with no problem, and often you can see 10-12. However, once you move indoors you may only see 4 to 6, and sometimes less. It's been a while for me in the GPS world - I used to use GPS positioning devices in the Army, and we only needed 3 satellites for a good position read (within 10 meters I believe it was). Pardon any obvious answers, I've just been trying to get my "feet wet" in this whole TSCM thing - it fascinates me. Thanks, Matt -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Monday, November 08, 2004 8:18 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Elections At 03:39 AM 11/8/2004, Michael Puchol wrote: > > GPS tracking without seeing the satellites > >We tried a Labrador, but it wasn't able to keep up with the vehicles. Must have been a Newfoundland, a Black Lab can see GPS satellites with no problem. > > GSM direction finding using espresso coffee machine > >For some reason they make them with plastic cases nowadays, which don't make >a good ground plane for the doppler antenna array. You also must refrain >from making coffee during tracking, as the motor noise tends to kill the >receiver. Har... you should put a [noise] filter in the coffee maker, it might help (sorry I couldn't resist). > > using a carbon plate as a phased array microphone > >It's on back order. Let me know when they start to ship, but I understand a company in New Rochelle may have priority on shipments. > > NLJD-based mind control system > >Russians had those, didn't they? Tin foil hat optional. You have to hold the NLJD pretty close to the skull for it to work right (don't laugh... I know of a "TSCM person" who uses an old 3 watt SuperScout to prove to his clients that they do indeed have thought reading devices in their skull). > > RF-powered razor > >Works better as a lawnmower, little home accident during testing. Yep, and it makes coffee too. >Cheers! > >Mike > >P.S. to add a serious note to all this, I believe SiRF are about to release >their new chipset, with (they claim) 200.000 correlators, which would make >GPS work under serious impaired conditions, such as inside buildings, etc. >(they claim). I still cannot see how the laws of physics (SNR particularly) >can be beaten. It's not that extremely weak signals cannot be received, >after all we are still getting data from Voyager which is past Pluto, but >how you can do that in a consumer-sized device escapes me. > >Best regards, > >Mike If you consider the process gain that you can get in GPS systems, plus the new chips, filters, and amplifiers it is quite easy to lock on to a GPS signal inside a building. The only problem is that once you move away from the outside skin of the building and towards the building core things get a little touchy. Also, there is the issue of being able to pickup the signal from enough satellites to compute a position without being way off target. Outside, in to open it is easy to pickup 8-10 satellites with no problem, and often you can see 10-12. However, once you move indoors you may only see 4 to 6, and sometimes less. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT click here _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10067 From: James M. Atkinson Date: Tue Nov 9, 2004 7:09pm Subject: Surveillance equipment found in anarchist's car http://www.infoshop.org/inews/stories.php?story=04/11/08/3242822 Italy: Surveillance equipment found in anarchist's car November 7, 2004 In the roof of a car investigated as part of the "Cervantes operation" a General Packet Radio Service (GPRS) device with a microphone and antenna was found. The equipment was powered by sunlight. Photos of the equipment can be found at the Anarcotico website: http://www.anarcotico.net/modules.php?op=modload&name=News&file=article&sid=1960&mode=thread&order=0&thold=0 The Cervantes operation resulted in the arrests and imprisonment of four Italian anarchists (Sergio, Simone, David and Marco) on June 27, 2004, after 34 raids were carried out against anarchists in numerous cities across the country. On November 5, 2004, a Global Positioning System (GPS) device and another unidentified piece of surveillance equipment were found in a comrade's van in Rovereto, Italy. Spanish anarchists showed solidarity with their comrades repressed in the Cervantes operation by attacking the Italian consulate in Burgos on September 2, 2004, spray-painting slogans on its walls and hurling eggs filled with paint at the building. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10068 From: James M. Atkinson Date: Tue Nov 9, 2004 7:13pm Subject: Attorney General Ashcroft Resigns http://www.cbsnews.com/stories/2004/11/09/politics/main654651.shtml Attorney General Ashcroft Resigns WASHINGTON, Nov. 9, 2004 U.S. Attorney General John Ashcroft and Commerce Secretary Don Evans (Photo: AP) (AP) Attorney General John Ashcroft and Commerce Secretary Don Evans resigned Tuesday, the first members of President Bush's Cabinet to leave as he headed from re-election into his second term. The resignations were announced by White House press secretary Scott McClellan, who said Bush had accepted the decisions of both secretaries. "The objective of securing the safety of Americans from crime and terror has been achieved," Ashcroft wrote in a five-page, handwritten letter to Bush. "Yet I believe that the Department of Justice would be well served by new leadership and fresh inspiration," said Ashcroft, whose health problems earlier this year resulted in removal of his gall bladder. "I believe that my energies and talents should be directed toward other challenging horizons," he said. Both Ashcroft and Evans have served in Bush's Cabinet from the start of the administration. Evans, a close friend of Bush's from Texas, wrote, "While the promise of your second term shines bright, I have concluded with deep regret that it is time for me to return home." Mr. Bush started his plans for a second term by deciding to keep Andy Card as White House chief of staff, retaining an unflappable veteran of the Reagan and first Bush presidencies. Card's first assignment: help the president reshape the administration for the term that begins in January, sorting through possible personnel changes in the Cabinet and elsewhere. President Bush and Card moved deliberately and privately Monday, both staying out of public view after a weekend of brainstorming at the Camp David presidential retreat in Maryland. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10069 From: kondrak Date: Tue Nov 9, 2004 10:32pm Subject: RE: Re: Frequency Filtering Wallpaper Sounds easy enough to cure once you found this out. A can of metallic spray paint comes to mind. At 21:02 11/8/2004, you wrote: >Back in another incarnation, some paper-pusher bought this new, wazoo, >fiberglass dish satcom dish antenna. The mfgr neglected the metallic >coating >so we expended some time and expletives in trying to aim the dish at the >bird. With no metallic coating all we had was an a$$-backwards feed horn. >So.... that in mind the metallic coat could "lessen" RF penetration. >I say lessen because you would still need to make a screen room, and >deal with all ingress/egress pipes, wires, etc- windows and seals, doors >and seals. Seals need to be smaller-tighter as frequency increases. >Jay >Los Angeles > > >-----Original Message----- >From: jtowler2004 [mailto:jtowler@x...] >Sent: Monday, November 08, 2004 3:45 AM >To: TSCM-L@yahoogroups.com >Subject: [TSCM-L] Re: Frequency Filtering Wallpaper > > > > > >Just reading some of the past archive before posting or mouthing off >myself ... > >Anyway, a message or two here about Frequency Filtering Wallpaper >from July. > >Here in New Zealand there have been at times on the TV, adverts for a >paint that you can stick magnets to. > >I.E. Paint the kids room with it, and then fridge-magnetic toys like >words, letters and things can be put on the wall. > >Anyway, for that to work, I assume there must be a significant amount >of iron dust in the mix, or some such thing. > >My question: Assuming the above, would the paint provide any useful >amount of RF shielding? > >I would not even begin to expect it would provide anything useful >against bugs and the likes, but maybe it might lower the RF noise >floor a little. > >Comments please. > >If there is interest, I'll attempt to location the product and maybe >if I can buy a small can, do some basic testing. > >What interest if any? > >Regards from New Zealand. > >- Jim Towler. > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10070 From: kondrak Date: Tue Nov 9, 2004 10:33pm Subject: Re: RFID Thats what this thing was, a key fob. At 23:03 11/8/2004, you wrote: >I agree. > >Do you think that it is possible to make a jammer that >someone could carry on their person, that blocks them? > How, about for around the house, etc.? > >Is there anything on the market now that can do this >already? > >Where can I find a reader? > > >--- kondrak wrote: > > > Theres a gadget out there that confuses them and > > forces them to do a > > sequential count. > > Detectors, and devices to destroy them (thinking > > microwaves) are going to > > be in big demand. > > Also discussed, was saving and salting Wallymart > > with millions of the > > little bastards...Michelin is reportedly putting > > them in tires, that opens > > up a whole BAD world of surveillance IMHO. > > > > At 14:28 11/8/2004, you wrote: > > > > > > >OK, I am new to this, but is there a way to jam the > > >new RFID's? I think there will be a large market > > for > > >a device such as this. > > > > > > > > > > > > > > > > > >__________________________________ > > >Do you Yahoo!? > > >Check out the new Yahoo! Front Page. > > >www.yahoo.com > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is > > strength" > > > > > > To subscribe to the TSCM-L mailing list > > visit: > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > > the hands acquire shaking, the shaking is a > > warning. > > > It is by caffeine alone I set my mind in motion. > > >=================================================== > > TSKS > > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > >__________________________________ >Do you Yahoo!? >Check out the new Yahoo! Front Page. >www.yahoo.com > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10071 From: satcommunitfive Date: Tue Nov 9, 2004 5:36pm Subject: Re: RFID they are all on different freqs depending on the brand etc 13/433/915/2400mhz etc -the ones I have seen you could do the 13mhz with a xtal ! some links to sus 4u http://www.rfidtalk.com/ -good tech talk here http://www.spychips.com/ http://www.rfidjournal.com/ http://www.aimglobal.org/technologies/rfid/ secrets here > http://www.aimglobal.org/standards/rfidstds/sc31.asp they seem to on LIPD bands easy to get transmitters there but you would need a backpack full of em bewell 10072 From: A Grudko Date: Wed Nov 10, 2004 2:28am Subject: RE: Attorney General Ashcroft Resigns -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] > Attorney General John Ashcroft and Commerce Secretary Don Evans resigned Tuesday, the first members of President Bush's Cabinet to leave as he headed from re-election into his second term. I heard a rumour that dubbya is thinking of resigning next. Could the world be so lucky ? Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.764 / Virus Database: 511 - Release Date: 2004/09/15 [Non-text portions of this message have been removed] 10073 From: Agent Geiger Date: Wed Nov 10, 2004 0:19am Subject: Re: Re: RFID Thanks, I will check these out! --- satcommunitfive wrote: > > > they are all on different freqs depending on the > brand etc > 13/433/915/2400mhz etc -the ones I have seen > > you could do the 13mhz with a xtal ! > > some links to sus 4u > http://www.rfidtalk.com/ -good tech talk here > http://www.spychips.com/ > http://www.rfidjournal.com/ > http://www.aimglobal.org/technologies/rfid/ > > secrets here > > http://www.aimglobal.org/standards/rfidstds/sc31.asp > > they seem to on LIPD bands easy to get transmitters > there > but you would need a backpack full of em > > bewell > > > > > > > > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10074 From: James M. Atkinson Date: Wed Nov 10, 2004 5:25am Subject: Connecticut Man Accused of Selling Microsoft Code http://www.nytimes.com/2004/11/10/technology/10soft.html?oref=login Connecticut Man Accused of Selling Microsoft Code By ERIC DASH Published: November 10, 2004 A Connecticut computer hacker was arrested yesterday and charged with selling copies of Microsoft Windows proprietary source code. The United States attorney's office said the hacker, William O. Genovese Jr., 27, of Meriden, Conn., used a Web site to unlawfully distribute the programming blueprints behind the Microsoft NT 4.0 and Windows 2000 operating systems. "This is someone who stole and attempted to sell for profit some valuable asset of Microsoft," said Tom Rubin, the associate general counsel for Microsoft. "It is our secret recipe, our secret formula like the Coke formula." The arrest is the most significant legal action to emerge from an F.B.I. investigation into the theft of Microsoft's source code; the inquiry began earlier this year and is continuing. Though sometimes Microsoft has provided its source code to business partners and government agencies, access is tightly guarded because it can allow software developers to replicate the program and hackers to exploit vulnerabilities in the operating system, which is used on hundreds of millions of computers. In mid-February, the complaint said, Mr. Genovese obtained a stolen copy of the Windows source code and posted a message on his Web site that he was willing to sell it. At about the same time, an investigator from an online security firm hired by Microsoft sent an e-mail message to Mr. Genovese, who was using an alias, and asked for a copy, the complaint said. Mr. Genovese requested that $20 be sent to a PayPal account and when the payment cleared, the investigator was given access to an Internet address where he could download a file with the source code. Mr. Rubin said that Microsoft then contacted federal authorities, who conducted a similar investigation with the company's help. This is not the first time Mr. Genovese has been at the center of a computer crimes case. In March 2003, he was convicted of eavesdropping and sentenced to two years of probation after gaining unauthorized access to computers in Connecticut. There has been another case this year involving a large technology company's having its proprietary software code published on the Internet. In September, Cisco Systems, the networking equipment manufacturer, said British authorities made an arrest after a four- month investigation. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- From: Michael Puchol Date: Fri Nov 8, 2002 1:53am Subject: Re: Audio Enhancement Jacob There is a program called SoundForge, available at http://www.sonicfoundry.com which has an optional noise reduction plugin. This really helps, as it allows you to select a portion of the audio track where there is only the unwanted noise present, it generates a 'footprint' of the noise, and substracts it from the whole track. I've cleaned up some audio recordings with this, and it works quite well. It's not like a professional studio by any measure, but for quick non-complex jobs it's adequate. Just remeber one thing, if the SNR is poor, cleaning won't do any good, as the information is just not there. Cheers, Mike Jacob wrote: > A client provided me a video tape of a logging accident that recently occured. > The camera picked up some wind and a slight drone of the camera motor causing > the conversations of the people at the job site to be somewhat difficult to > understand at times. > > Any ideas for clearing this up, preferrably with off the shelf software? > > > Thanks in advance, > > Jake Ryan > Engineer/Consultant > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6484 From: James M. Atkinson Date: Fri Nov 8, 2002 10:23am Subject: So Why did the chicken cross the road? WHY DID THE CHICKEN CROSS THE ROAD? GEORGE W. BUSH I don't think I should have to answer that question. AL GORE I invented the chicken. I invented the road. Therefore, the chicken crossing the road represented the application of these two different functions of government in a new, reinvented way designed to bring greater services to the American people. RALPH NADER The chicken's habitat on the original side of the road had been polluted by unchecked industrialist greed. The chicken did not reach the unspoiled habitat on the other side of the road because it was crushed by the wheels of a gas-guzzling SUV. PAT BUCHANAN To steal a job from a decent, hard-working American. RUSH LIMBAUGH I don't know why the chicken crossed the road, but I'll bet it was getting a government grant to cross the road, and I'll bet someone out there is already forming a support group to help chickens with crossing-the-road syndrome. Can you believe this? How much more of this can real Americans take? Chickens crossing the road paid for by their tax dollars, and when I say tax dollars, I'm talking about your money, money the government took from you to build roads for chickens to cross. MARTHA STEWART No one called to warn me which way that chicken was going. I had a standing order at the farmer's market to sell my eggs when the price dropped to a certain level. No little bird gave me any insider information. JERRY FALWELL Because the chicken was gay! Isn't it obvious? Can't you people see the plain truth in front of your face? The chicken was going to the "other side." That's what they call it - the other side. Yes, my friends, that chicken is gay. And, if you eat that chicken, you will become gay too. I say we boycott all chickens until we sort out this abomination that the liberal media whitewashes with seemingly harmless phrases like "the other side." DR. SEUSS Did the chicken cross the road? Did he cross it with a toad? Yes! The chicken crossed the road, But why it crossed, I've not been told! ERNEST HEMINGWAY To die. In the rain. Alone. MARTIN LUTHER KING, JR. I envision a world where all chickens will be free to cross roads without having their motives called into question. GRANDPA In my day, we didn't ask why the chicken crossed the road. Someone told us that the chicken crossed the road, and that was good enough for us. BARBARA WALTERS Isn't that interesting? In a few moments we will be listening to the chicken tell, for the first time, the heart-warming story of how it a serious case of molting and went on to accomplish its life-long dream of crossing the road. JOHN LENNON Imagine all the chickens crossing roads in peace. ARISTOTLE It is the nature of chickens to cross the road. KARL MARX It was a historical inevitability. SADDAM HUSSEIN This was an unprovoked act of rebellion and we were quite justified in dropping 50 tons of nerve gas on it. VOLTAIRE I may not agree with what the chicken did, but I will defend to the death its right to do it. RONALD REAGAN What chicken? CAPTAIN KIRK To boldly go where no chicken has gone before. FOX MULDER You saw it cross the road with your own eyes! How many more chickens have to cross before you believe it? SIGMUND FREUD The fact that you are at all concerned that the chicken crossed the road reveals your underlying sexual insecurity. BILL GATES I have just released eChicken 2003, which will not only cross roads, but will lay eggs, file your important documents, and balance your checkbook - and Internet Explorer is an inextricable part of eChicken. ALBERT EINSTEIN Did the chicken really cross the road or did the road move beneath the chicken? BILL CLINTON I did not cross the road with THAT chicken. What do you mean by chicken? Could you define chicken please? THE BIBLE And God came down from the heavens, and He said unto the chicken, Thou shalt cross the road." And the chicken crossed the road, and there was much rejoicing. COLONEL SANDERS I missed one! -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6485 From: Date: Sat Nov 9, 2002 1:02pm Subject: Re: Digest Number 1115 So why did the chicken cross the road? Pee-Wee Herman Whether it crosses or not, just don't get caught chocking it public. There are three sides to every story; mine, your's and the truth. __________________________________________________________ Get your FREE personalized e-mail at http://www.canada.com 6486 From: Eric M. Hutchinson - N8XHP Date: Sat Nov 9, 2002 7:26pm Subject: FS: Dynatech Tactical Communications TRAK/R-2100 Doppler Unit I have a TRAK/R-2100 Doppler unit that is surplus to my needs. It appears complete with everything except the battery for the magnetic "bumper beeper". This unit is on VHF and has a magnetic 2 watt transmitter. It appears in excellent shape. I can provide pictures to those that would like them. I am not sure on the going rate of this equipment, so if anyone has any suggestions, I would appreciate it. Thanks Eric Grand Rapids, MI --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.417 / Virus Database: 233 - Release Date: 11/8/02 [Non-text portions of this message have been removed] 6487 From: frost_bitten_ca Date: Sat Nov 9, 2002 7:44pm Subject: Time's flying, but you can still bid on MiG-21 Nov. 9, 2002. 11:33 AM Time's flying, but you can still bid on MiG-21 Forget commuter woes, eBay's got answer to SUV By Oakland Ross FEATURE WRITER Details of the Russian MiG-21 jet fighter, located in Santa Maria, Ca., can be found on eBay's Web site. Fed up with the slow pace of traffic? No problem. Buy a Russian-built supersonic fighter aircraft ≠ and leave your commuter woes behind. Far, far behind. Yes, it's true. For about the cost of a fairly average house in Toronto, you can put your hands on "a classic Mach-2 Russian jet fighter." But you've only got till Monday, and you're going to have to compete against more than 150 other interested parties who have so far set their sights and placed their bids, via eBay on the Internet, on a 1965 MiG-21 Russian jet fighter, complete with a spare engine, rocket pods, missile rails, and tow bar. (Ammunition, extra.) The bidding began on Nov. 1 and will close at about 6:30 p.m. PST on Monday. At press time last night, the high bid stood at $190,500 (U.S.) Granted, that's more than a luxury SUV might cost, but does an SUV come equipped with a 420-litre drop fuel tank, a hot eject seat, a top speed of Mach 2.1 (or more than twice the speed of sound), not to mention an illustrious if sadly blood-stained legacy of airborne combat? More to the point, can a luxury SUV convey you from downtown Toronto to downtown Montreal in just under 14 minutes at an altitude of 69,000 feet? Probably not. Make no mistake, this is no run-of-the-mill Mach 2 combat aircraft. First built in the former Soviet Union in 1959, the Mikoyan-Gurevich MiG-21 was a lethal fixture of Cold War battles waged all over the globe, from southern Africa to Central America. It was also produced, under licence, in the country formerly known as Czechoslovakia and, without licence, in India and China. What the MiG-21 lacked in sophisticated electronic controls, it made up for ≠ sometimes ≠ in sheer speed. It was certainly popular. In all, somewhere between 10,000 and 13,000 of the planes have been built, and some 3,000 of them remain in service, operated by the air forces of nearly 50 different countries, from Albania to Zimbabwe. In fact, more MiG-21s have been built than any other supersonic fighter aircraft in the world, and they have fought in more wars than any other airplane. How much is this baby worth? That is difficult to say. If you were to purchase a one new ≠ which you can't, because they stopped building them in 1987 ≠ you would have had to pay anywhere from $2 million to $5 million, depending on configuration and instrumentation. Second-hand, they are worth a lot less, although their exact value depends on their age and type and on whether they have been modernized. Three years ago, the Uganda Air Force is thought to have purchased eight second-hand MiG-21s through an Israeli broker for about $1.5 million each. At about the same time, the central Asian republic of Kazakhstan incensed the United States government by selling between 30 and 40 of the planes to North Korea ≠ supposedly, by mistake ≠ for a fire sale price of about $8 million. An outfit called the Moscow Aircraft Group not long ago put three of the planes up for sale at $65,000 each, less if you bought the lot. But the company did not guarantee that the planes in question were ≠ not to put too fine a point on it ≠ airworthy. Ivan Rasmussen, vice-president of Worldwide Warbirds Inc., a company based in Phoenix, Ariz., which specializes in the import and sale of foreign military aircraft, says that a price of about $200,000 (U.S.) is not out of the question at all. "That's not too bad," he says. "If it's a flyable airplane, that's not a bad price." Who would pay that amount of money for a second-hand Soviet-bloc killing machine? Well, some people do. Tom Blaine, general manager of Bruce's Custom Covers of Sunnyvale, Ca., says his company receives "a trickle" of orders each year for such protective devices as canopy covers, intake plugs, and exhaust plugs designed for use with MiG-21s. "We just started seeing this in the past few years," he says. "It's really wealthy guys who have an expensive toy." Rasmussen at Worldwide Warbirds Inc. hasn't sold an MiG-21, but he has disposed of an MiG-17 and is currently in possession of about 15 L-39s ≠ a Czech-built training jet ≠ that he purchased from air forces in Romania and Ukraine. Depending on their configuration, he says, these command prices in the United States of anywhere from $290,000 to $370,000, unpainted. Rasmussen says that there's a ready market for such aircraft. "We have airline pilots, company CEOs." A Russian jet fighter of more recent vintage ≠ a MiG-29 ≠ is also being offered for sale on the eBay Web site. By last night, after the first full day of bidding, the high offer stood at $30,300 (U.S.). The aircraft is located in Urupinsk, Russia. Granted, a high-performance supersonic military aircraft does pose certain challenges. For example, once having bought it, how do you get it home? The MiG-21 currently listed on eBay, for example, is located in Santa Maria, Ca. The owner estimates that it would cost about $10,000 to deliver it within the mainland U.S.A., a complex logistical operation that would require a substantial ground crew, equipped with a supply of nitrogen, oxygen, jet fuel, as well as ladders and a start cart (to get the engine running each time you wish to take off). There are less expensive options. For example, at least one import firm in the United States, SARCO, Inc., of Stirling, N.J., sells just the cockpits of MiG-21s, salvaged from the air force of what used to be East Germany ≠ $5,000 for a single-seat to $15,000 for a double. Or, for $4,900, an outfit called the Moscow Aircraft Group will fly you to Russia and take you aloft as a passenger in a vintage MiG-21. The cost is all-inclusive and covers "everything ... including the vodka for numerous toastings." Finally, for true bargain hunters with limited storage space, Hobbies- Plus offers a miniature plastic model (scale 1:72) of the MiG-21 type that fought in Vietnam and the Middle East priced to sell at just under $10 Canadian. As always, you get what you pay for http://www.thestar.com/NASApp/cs/ContentServer? pagename=thestar/Layout/Article_Type1&c=Article&cid=1035774168095&call _page=TS_News&call_pageid=968332188492&call_pagepath=News/News&col=968 793972154 6488 From: Date: Sun Nov 10, 2002 4:49am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County, San Francisco, Silicon Valley, San Jose, San Diego, and Las Vegas. (Also, anywhere in a thousand mile radius from Los Angeles.) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 6489 From: Date: Sun Nov 10, 2002 4:49am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6490 From: Does it matter Date: Sat Nov 9, 2002 11:24pm Subject: Re: Audio Enhancement I responded privately to the person who started this thread but will say this on the subject. You CANNOT take a program and plug in a pc and clean up a tape without any experience. Pops, clicks, hiss, yeah, amplification, and other simple items yes. You would have to have very good knowledge of sound floors, snr ratios, thresholds, gain, etc Telling someone to just download soundforge or some other program would be the = of saying download the software to a TDR and use the tdr, it isn't happening. Peace --- In TSCM-L@y..., Michael Puchol wrote: > Jacob > > There is a program called SoundForge, available at > http://www.sonicfoundry.com which has an optional noise reduction > plugin. This really helps, as it allows you to select a portion of the > audio track where there is only the unwanted noise present, it generates > a 'footprint' of the noise, and substracts it from the whole track. I've > cleaned up some audio recordings with this, and it works quite well. > It's not like a professional studio by any measure, but for quick > non-complex jobs it's adequate. Just remeber one thing, if the SNR is > poor, cleaning won't do any good, as the information is just not there. > > Cheers, > > Mike > > Jacob wrote: > > A client provided me a video tape of a logging accident that recently occured. > > The camera picked up some wind and a slight drone of the camera motor causing > > the conversations of the people at the job site to be somewhat difficult to > > understand at times. > > > > Any ideas for clearing this up, preferrably with off the shelf software? > > > > > > Thanks in advance, > > > > Jake Ryan > > Engineer/Consultant > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > 6491 From: Kirk Adirim Date: Sun Nov 10, 2002 9:37am Subject: RE: Re: Audio Enhancement Does it matter wrote, "You CANNOT take a program and plug in a pc and clean up a tape without any experience. Pops, clicks, hiss, yeah, amplification, and other simple items yes. You would have to have very good knowledge of sound floors, snr ratios, thresholds, gain, etc Telling someone to just download soundforge or some other program would be the = of saying download the software to a TDR and use the tdr, it isn't happening. Peace" Well it isn't quantum mechanics either. I say download Soundforge and practise/learn , ask questions, GAIN experience with it, and in the end you will have a better recording than you started with. It's ok to color outside of the lines and to think outside of the box. Imagine whirled peas Kirk -----Original Message----- From: Does it matter [mailto:u12armresl@y...] Sent: Saturday, November 09, 2002 9:25 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Audio Enhancement I responded privately to the person who started this thread but will say this on the subject. You CANNOT take a program and plug in a pc and clean up a tape without any experience. Pops, clicks, hiss, yeah, amplification, and other simple items yes. You would have to have very good knowledge of sound floors, snr ratios, thresholds, gain, etc Telling someone to just download soundforge or some other program would be the = of saying download the software to a TDR and use the tdr, it isn't happening. Peace --- In TSCM-L@y..., Michael Puchol wrote: > Jacob > > There is a program called SoundForge, available at > http://www.sonicfoundry.com which has an optional noise reduction > plugin. This really helps, as it allows you to select a portion of the > audio track where there is only the unwanted noise present, it generates > a 'footprint' of the noise, and substracts it from the whole track. I've > cleaned up some audio recordings with this, and it works quite well. > It's not like a professional studio by any measure, but for quick > non-complex jobs it's adequate. Just remeber one thing, if the SNR is > poor, cleaning won't do any good, as the information is just not there. > > Cheers, > > Mike > > Jacob wrote: > > A client provided me a video tape of a logging accident that recently occured. > > The camera picked up some wind and a slight drone of the camera motor causing > > the conversations of the people at the job site to be somewhat difficult to > > understand at times. > > > > Any ideas for clearing this up, preferrably with off the shelf software? > > > > > > Thanks in advance, > > > > Jake Ryan > > Engineer/Consultant > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6492 From: Michael Puchol Date: Sun Nov 10, 2002 11:11am Subject: Re: Re: Audio Enhancement Does it matter wrote: > I responded privately to the person who started this thread but will > say this on the subject. You CANNOT take a program and plug in a pc > and clean up a tape without any experience. Pops, clicks, hiss, > yeah, amplification, and other simple items yes. You would have to > have very good knowledge of sound floors, snr ratios, thresholds, > gain, etc Well, experience is gained by practice, you start with 0% experience, and by practice and guidance (the amount of guidance needed depending on the subject's self-teaching capabilities) you increase that percentage. Thanks to the internet, a lot of knowledge on this subject is available. My message implied, at least I didn't think it necessary to explicitly explain it, that if you need a professional job (like a recording as evidence in a trial) you're obviously not going to use Soundforge or similar to clean up the recording, you're going to take it to a professional sound lab to have it professionally processed. > Telling someone to just download soundforge or some other program > would be the = of saying download the software to a TDR and use the > tdr, it isn't happening. I don't think the comparison applies, whoever invents a software-only TDR will become quite rich I guess. My point only applied to audio recordings, it cannot be extrapolated to any subject in our field. I'm obviously NOT going to tell anyone to sweep for bugs with a spy-shop blinking-lights box, that has to be done by professionals with professional tools, so the analogy doesn't apply. All the best, Mike 6493 From: Fernando Martins Date: Sun Nov 10, 2002 1:55pm Subject: Honeypots in physical/electronic security Hi2all Anyone with experience about honeypots for physical/electronic security systems? Comments? Case studies? Papers? Any hints are wellcome. FM 6494 From: Fernando Martins Date: Sun Nov 10, 2002 2:12pm Subject: RFID Comments on RFID? http://www.securitymagazine.com/CDA/ArticleInformation/coverstory/BNPCov erStoryItem/0,5409,86576,00.html Shopping for RFID By John Mesenbrink Radio frequency identification is becoming the technology of the future. Take an in-depth look at why radio waves are in demand. Would you like fries with that? One swipe of a Mobil SpeedPass tag, for instance, and you can pay for gas and your next meal at McDonalds. You see its use more and more. RFID technology has been taken to the next level; with applications and advancements ever increasing, the future looks bright for radio frequency identification (RFID). Retail giant Wal-Mart is piloting RFID tags at its stores and plans to introduce the asset tracking technology into the UK shortly. Radio frequency identification (RFID) is an advanced automatic identification technology used to identify, track, sort and detect an infinite variety of objects, including people, vehicles and objects, thus making it multi-functional. "The performance of RFID has grown so that you can grow beyond your core applications," says Doug Karp, senior director for operations and business development, RFID products group, Checkpoint Systems, Thorofare, N.J. "You'll see RFID in new applications beyond basic access control." Why RFID? "RFID is certainly a technology that can help solve some of the issues that homeland security is facing. RFID offers the ability to passively read and get data that you couldn't get before. For example, with today's technologies, if you have a package coming in through customs and you want to know what is in it quickly, you would have to open the package, count items, read barcodes and scan. With RFID, in theory, you can keep that package closed. Because everything would be tagged inside it, you could pass it through a tunnel or a reader of some sort and read what is inside that package. Also, you can read multiple items at the same time," offers Karp. RFID benefits the end user, especially in access control situations, similarly to other automatic identification technologies in that it reduces the need to manually collect data. The system consists of two major components-the reader and the card/tag. RFID relies on radio frequency waves between a card or tag and a reader in order to make an identification. While RFID has its advantages, the technology will continue to flex its muscles in areas of memory capacity, read area reach and processing speed. The read/write capability of an active RFID system is also a significant advantage in interactive applications. Although currently it is a more expensive technology than, say, bar code, RFID has become a mainstay for facilitating data collection and ID applications. Also, "Integration of RFID systems is relatively painless. And there is a huge expense for changing mag stripe readers when they wear out. With contactless, there is never a fee because there are no moving parts. If an end user wanted to buy RFID system, they could have it up and running as soon as the systems integrator could physically integrate the system," says Jeremy Wyant, RFID product manager, NTRU, Burlington Mass. Another important benefit of RFID is the read/write capability of the tag in asset tracking, meaning new information can be added to asset tags. The whole history of a product will be available at your fingertips, allowing the benefits of RFID asset tracking to extend into areas like service and warranty tracking and automatic product returns. It is unlikely that the technology will ultimately replace barcode-the integrated circuit in an RF tag will never be as cost-effective as a barcode label. It Makes Sense Because RFID is a contactless technology, it requires neither contact with a reader-magnetic stripe technology-or a direct line of sight to a reader-bar code technology. RFID, therefore, reduces the problems associated with contact or line-of-sight technologies. The reader emits a low-level radio frequency magnetic field that energizes the tag. The tag then sends back identification data stored in its integrated circuit (IC). This data is decoded by the reader, which either grants or refuses accessibility depending on whether the identification data being sent matches user information stored in the host database. "We tend to think it is better to keep less information on the card and more information in your software database because that gives you more protection," says Karp. However, since RFID is an ever-emerging technology, it does not enjoy the depth in product offering found with the other older technologies like bar coding or electronic article surveillance (EAS). According to AIM and its Association for Automatic Identification and Data Capture Technologies, Pittsburgh, Penn., "RFID will continue to grow in its established niches where barcode or other optical technologies are not effective. If some standards commonality is achieved-whereby RFID equipment from different manufacturers can be used interchangeably-the market will very likely grow exponentially. It is uncertain whether RFID will cost cut and ultimately replace other methods of technology, such as bar coding. But it is quickly making strides, as evidenced by some of the major players creating better RFID systems." RFID tags are distinguished either as passive or active. Active tags have a battery in the tag and it acts as a transmitter. If you need long ranges, you put a battery in the tag. An active tag gets its energy from a battery and then can transmit a signal over longer ranges. Also, AIM reports, "Passive tags don't have a battery, whereby getting its energy from the reader. RFID systems are also distinguished by their frequency ranges. Low-frequency (30 KHz to 500 KHz) systems have short reading ranges and relatively cheaper in price. They are most commonly used in security access, asset tracking, and animal identification applications. High-frequency (850 MHz to 950 MHz and 2.4 GHz to 2.5 GHz) systems, offering long read ranges (greater than 90 feet) and high reading speeds, are used for such applications as railroad car tracking and automated toll collection. However, the higher performance of high-frequency RFID systems are more expensive." And, "Interest in higher levels of security and stronger meth-ods of authentication increased due to the events of the last year, particularly in government agencies and corporations. These entities often have multiple sites, use systems of different types or ages and have implemented a photo ID policy," says Debra Spitler, vice president of marketing, ASSA ABLOY Identification Technology Group (ITG). HID Corporation's iCLASS, a 13.56 MHz, read/write, contactless smart card technology, enables employees to use a single card for multiple applications including access control, IT secure authentication, cashless vending and health record storage. By incorporating multiple technologies into one card, users have the ability to leverage their existing investment in various systems. In addition, the ability to store a biometric template on a contactless smart card is a significant technological advancement that has seen increasing interest since 9/11/01. HID has teamed up with Bioscrypt, Sherman Oaks, Calif., in the development of the V-Smart iCLASS to ensure that traditional access control customers can use a biometric product that offers one-to-one biometric template authentication and user convenience. These two features support the markets' requirement for fast throughput and individual privacy. The dual template enhancement solves the occasional inconvenience caused by a dirty or injured finger, or even a bandage, because each participant can use either of the two fingers enrolled in the system. V-Smart iCLASS, a two-in-one reader solution, supports dual fingerprint templates and multiple application contactless smart cards. At the current time, Bioscrypt has integrated iCLASS technology into a biometric fingerprint reader, and Recognition Systems, Camarillo, Calif., has integrated iCLASS into a hand geometry reader. The system can be easily integrated with other technologies. The iCLASS enables customers to upgrade existing proximity or mag stripe systems over time. In some cases, customers may use proximity/mag stripe technology in an existing building and use iCLASS technology in a new building. It's in the Cards RFID ubiquity will create a forum for counterfeiters and criminals. If there is no mechanism to ensure that transmitted information has not been tampered with, hackers could easily change it. Manufacturers need to ensure that their RFID application is part of a trusted environment by guaranteeing confidentiality, authentication, integrity and non-repudiation. Such a guarantee is possible with the integration of a PKI (public key infrastructure). NTRU, Burlington, Mass., is a cryptography provider of technology that can provide this level of security for RFID. As RFID applications proliferate, and more high-value transactions are performed using these applications, the need for powerful security increases. NTRU provides security services tailored to meet the robust requirements of RFID and contactless applications, including a cost effective token and reader technology.With NTRUSign, RFID applications benefit from authentication capabilities, which ensure that the tag, reader and/or system component is who or what they claim to be and that the transmitted data have not been altered. NTRU technology also provides for confidential transaction and new audit capabilities that create digitally signed records of each and every transaction. NTRU develops powerful, fast security that, due to its small footprint, is uniquely suited to secure space-constrained environments such as contactless smart cards, radio frequency identification tags and wireless devices. NTRU shares in the vision of enabling an interoperable platform for the delivery of next-generation products and services based on smart card technology, offers Michael Yaffe, senior communications manager, NTRU. All RF data transmission between the card and reader is encrypted using a secure algorithm. By using industry standard encryption techniques, HID's iCLASS, for example, reduces the risk of compromised data or duplicated cards. Access to data stored on the cards is protected by 64-bit keys, which can be further customized by the end-user with an iCLASS programmer. Even if the unauthorized person obtains an iCLASS reader, without the keys, the reader will not authenticate with the card and data will not be transmitted. For even higher security, card data may also be protected with DES or triple DES encryption. With iCLASS, the transaction between the card and reader can not be sniffed. On the Market End users in various vertical markets are looking for every advantage they can get as a result of last year's terrorist attacks. At the recently held Airport Security Expo in Las Vegas, Applied Digital Solutions and its VeriChip Corporation featured its VeriPass and VeriTag. These new applications will allow airport and port security personnel to link a VeriChip subscriber to his or her luggage-both during check-in and on the airplane-flight manifest logs and airline or law enforcement software databases. Commenting on VeriChip's participation in the Airport Security Expo, Scott R. Silverman, president of Applied Digital Solutions, says, "VeriChip can assist in assuring the public that only authorized personnel gain access to certain sensitive areas of airports and even the cockpits of airplanes. Since VeriChip's personal verification technology can't be lost, stolen, tampered with, misplaced or counterfeited, its secure personal verification system should be incorporated into our national airport security initiatives." VeriChip is a miniaturized radio frequency identification device that can be used in a variety of security applications. About the size of a grain of rice, each VeriChip product contains a unique verification number and will be available in several formats, some of which will be insertable under the skin, which, by the way, is in the works to track a patient's medical status. In the security field, the company is actively developing applications for VeriChip in a variety of security, defense, homeland security and secure-access applications. These opportunities include using VeriChip to control authorized access to government installations and private-sector buildings, nuclear power plants, national research laboratories, correctional facilities and sensitive transportation resources. VeriChip can enhance airport security, airline security, cruise ship security, intelligent transportation and port congestion management. In these markets, VeriChip could function as a stand-alone, tamper-proof personal verification technology or it could operate in conjunction with other security technologies such as standard ID badges and advanced biometric devices. Frost & Sullivan reports that by 2006, 80 percent of the access control market will be RFID-based. With over 180 million RFID tags deployed worldwide and approximately six million Exxon/Mobil Speedpass users, Texas Instruments Radio Frequency Identification Systems (TI-RFid), Dallas, Tex., is making a huge splash in the industry with its line of 13.56 MHz reader and card security systems for access control. TI's vicinity cards and S6400 reader series bring a new level of security to the market with 2000-bit programmable memory, unique and secure identification, at a cost comparable to traditional proximity cards. TI-RFid 13.56 MHz access control cards and readers are compliant with the ISO 15693 vicinity card standard offering security and access control providers increased security and authentication, at-the-door read-write programmability, interoperability across all suppliers and applications and multiple card reading capability. "As a pioneer in 13.56 MHz technology, TI has deployed more than 180 million tags worldwide in a range of RFID applications," said Bill Allen, eMarketing manager, Texas Instruments RFid Systems. "We're now bringing our wealth of experience to the security and access control industry." TI-RFid's line of cards and badges provide factory-programmed ID, which cannot be duplicated, ensuring that no two cards or people are misidentified. With more than 2000 bits of data, the cards hold 50 times more data than traditional 125 kHz solutions. The data is written and stored directly on the card, independent from a host system, allowing employees to carry vital information such as authorization codes, certification or emergency medical histories. TI's cards also provide the capacity for stronger encrypted security and the data capacity to use the ID cards beyond just facility access for other solutions, such as biometrics and wireless financial transactions. Secura Key, Chatsworth, Calif., has a new generation of high frequency 13.56 MHz readers for use with access control systems. These new e*TagT proximity readers work with a variety of contactless smart cards and key fobs that meet ISO 15693 and ISO 14443 A/B standards. Communicating 100 times faster than traditional 125 KHz proximity readers, e*TagT offers multiple card reads, read/write applications, custom card encoding and many other benefits. Designed to work with Tag-It transponders from Texas Instruments, e*Tag units can read multiple transponders in a field. In full deployment, AXCESS RFID technology provides security features ranging from facial verification, badge-controlled access to facilities or areas within facilities, asset monitoring, and video surveillance with analytical capabilities. AXCESS manufactures RFID tags that will signal an alarm if tagged assets are removed from designated areas and will track their movements throughout a facility. Checkpoint Systems, Thorofare, N.J., offers an entire family of RFID products, including low-cost 13.56 MHz tags with read-only or read-write capability, which offer significant capacity in a variety of tag configurations, readers designed to maximize read range for both fixed and portable applications and open architecture application programming interface (API) software for integration with existing systems. Zebra Technologies offers the Zebra R402 RFID smart label printer/encoder, a tool for both printing and programming 13.56 MHz smart labels, tickets and tags. This printer/encoder delivers the enhanced tracking, inventory management and authenticating benefits of radio frequency identification (RFID) technology. "The RF402 can print bar codes, human-readable text, and graphics on the label surface. It also can read, encode and verify information programmed to the ultra-thin RFID transponder embedded inside the label," says Matt Ream, Zebra's senior product manager for RFID systems. John Mesenbrink is managing editor for SECURITY Magazine. He can be reached at 630-694-4026 Copyright C 2001-2002 by Business News Publishing Co 6495 From: Does it matter Date: Sun Nov 10, 2002 0:14pm Subject: Re: Audio Enhancement I wont get into a flame war on the subject but I have found in audio that just messing around and practice takes more time then a person is willing to devote to the subject especially since it is a single occurance. --- In TSCM-L@y..., "Kirk Adirim" wrote: > Does it matter wrote, > > "You CANNOT take a program and plug in a pc > and clean up a tape without any experience. Pops, clicks, hiss, > yeah, amplification, and other simple items yes. You would have to > have very good knowledge of sound floors, snr ratios, thresholds, > gain, etc > Telling someone to just download soundforge or some other program > would be the = of saying download the software to a TDR and use the > tdr, it isn't happening. Peace" > > Well it isn't quantum mechanics either. I say download Soundforge and > practise/learn , ask questions, GAIN experience with it, and in the end you > will have a better recording than you started with. It's ok to color > outside of the lines and to think outside of the box. > > Imagine whirled peas > Kirk > > > > > -----Original Message----- > From: Does it matter [mailto:u12armresl@y...] > Sent: Saturday, November 09, 2002 9:25 PM > To: TSCM-L@y... > Subject: [TSCM-L] Re: Audio Enhancement > > > I responded privately to the person who started this thread but will > say this on the subject. You CANNOT take a program and plug in a pc > and clean up a tape without any experience. Pops, clicks, hiss, > yeah, amplification, and other simple items yes. You would have to > have very good knowledge of sound floors, snr ratios, thresholds, > gain, etc > Telling someone to just download soundforge or some other program > would be the = of saying download the software to a TDR and use the > tdr, it isn't happening. > > Peace > --- In TSCM-L@y..., Michael Puchol wrote: > > Jacob > > > > There is a program called SoundForge, available at > > http://www.sonicfoundry.com which has an optional noise reduction > > plugin. This really helps, as it allows you to select a portion of > the > > audio track where there is only the unwanted noise present, it > generates > > a 'footprint' of the noise, and substracts it from the whole > track. I've > > cleaned up some audio recordings with this, and it works quite > well. > > It's not like a professional studio by any measure, but for quick > > non-complex jobs it's adequate. Just remeber one thing, if the SNR > is > > poor, cleaning won't do any good, as the information is just not > there. > > > > Cheers, > > > > Mike > > > > Jacob wrote: > > > A client provided me a video tape of a logging accident that > recently occured. > > > The camera picked up some wind and a slight drone of the camera > motor causing > > > the conversations of the people at the job site to be somewhat > difficult to > > > understand at times. > > > > > > Any ideas for clearing this up, preferrably with off the shelf > software? > > > > > > > > > Thanks in advance, > > > > > > Jake Ryan > > > Engineer/Consultant > > > > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > the hands acquire shaking, the shaking is a warning. > > > It is by caffeine alone I set my mind in motion. > > > =================================================== TSKS > > > > > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6496 From: Gregory Perry Date: Sun Nov 10, 2002 4:08pm Subject: Re: RFID RFID implant = quickest Big Mac yet --------------------------------- "Any sufficiently advanced technology is indistinguishable from magic" -- Arthur C. Clarke > Comments on RFID? > > http://www.securitymagazine.com/CDA/ArticleInformation/coverstory/BNPCov > erStoryItem/0,5409,86576,00.html > > Shopping for RFID > By John Mesenbrink > > > Radio frequency identification is becoming the technology of the future. > Take an in-depth look at why radio waves are in demand. > > > > Would you like fries with that? One swipe of a Mobil SpeedPass tag, for > instance, and you can pay for gas and your next meal at McDonalds. You > see its use more and more. RFID technology has been taken to the next > level; with applications and advancements ever increasing, the future > looks bright for radio frequency identification (RFID). Retail giant > Wal-Mart is piloting RFID tags at its stores and plans to introduce the > asset tracking technology into the UK shortly. Radio frequency > identification (RFID) is an advanced automatic identification technology > used to identify, track, sort and detect an infinite variety of objects, > including people, vehicles and objects, thus making it multi-functional. > "The performance of RFID has grown so that you can grow beyond your core > applications," says Doug Karp, senior director for operations and > business development, RFID products group, Checkpoint Systems, > Thorofare, N.J. "You'll see RFID in new applications beyond basic access > control." > > > > Why RFID? > "RFID is certainly a technology that can help solve some of the issues > that homeland security is facing. RFID offers the ability to passively > read and get data that you couldn't get before. For example, with > today's technologies, if you have a package coming in through customs > and you want to know what is in it quickly, you would have to open the > package, count items, read barcodes and scan. With RFID, in theory, you > can keep that package closed. Because everything would be tagged inside > it, you could pass it through a tunnel or a reader of some sort and read > what is inside that package. Also, you can read multiple items at the > same time," offers Karp. RFID benefits the end user, especially in > access control situations, similarly to other automatic identification > technologies in that it reduces the need to manually collect data. The > system consists of two major components-the reader and the card/tag. > RFID relies on radio frequency waves between a card or tag and a reader > in order to make an identification. While RFID has its advantages, the > technology will continue to flex its muscles in areas of memory > capacity, read area reach and processing speed. The read/write > capability of an active RFID system is also a significant advantage in > interactive applications. Although currently it is a more expensive > technology than, say, bar code, RFID has become a mainstay for > facilitating data collection and ID applications. Also, "Integration of > RFID systems is relatively painless. And there is a huge expense for > changing mag stripe readers when they wear out. With contactless, there > is never a fee because there are no moving parts. If an end user wanted > to buy RFID system, they could have it up and running as soon as the > systems integrator could physically integrate the system," says Jeremy > Wyant, RFID product manager, NTRU, Burlington Mass. > > Another important benefit of RFID is the read/write capability of the > tag in asset tracking, meaning new information can be added to asset > tags. The whole history of a product will be available at your > fingertips, allowing the benefits of RFID asset tracking to extend into > areas like service and warranty tracking and automatic product returns. > It is unlikely that the technology will ultimately replace barcode-the > integrated circuit in an RF tag will never be as cost-effective as a > barcode label. > > > > It Makes Sense > Because RFID is a contactless technology, it requires neither contact > with a reader-magnetic stripe technology-or a direct line of sight to a > reader-bar code technology. RFID, therefore, reduces the problems > associated with contact or line-of-sight technologies. The reader emits > a low-level radio frequency magnetic field that energizes the tag. The > tag then sends back identification data stored in its integrated circuit > (IC). This data is decoded by the reader, which either grants or refuses > accessibility depending on whether the identification data being sent > matches user information stored in the host database. "We tend to think > it is better to keep less information on the card and more information > in your software database because that gives you more protection," says > Karp. > > However, since RFID is an ever-emerging technology, it does not enjoy > the depth in product offering found with the other older technologies > like bar coding or electronic article surveillance (EAS). According to > AIM and its Association for Automatic Identification and Data Capture > Technologies, Pittsburgh, Penn., "RFID will continue to grow in its > established niches where barcode or other optical technologies are not > effective. If some standards commonality is achieved-whereby RFID > equipment from different manufacturers can be used interchangeably-the > market will very likely grow exponentially. It is uncertain whether RFID > will cost cut and ultimately replace other methods of technology, such > as bar coding. But it is quickly making strides, as evidenced by some of > the major players creating better RFID systems." > > RFID tags are distinguished either as passive or active. Active tags > have a battery in the tag and it acts as a transmitter. If you need long > ranges, you put a battery in the tag. An active tag gets its energy from > a battery and then can transmit a signal over longer ranges. Also, AIM > reports, "Passive tags don't have a battery, whereby getting its energy > from the reader. RFID systems are also distinguished by their frequency > ranges. Low-frequency (30 KHz to 500 KHz) systems have short reading > ranges and relatively cheaper in price. They are most commonly used in > security access, asset tracking, and animal identification applications. > High-frequency (850 MHz to 950 MHz and 2.4 GHz to 2.5 GHz) systems, > offering long read ranges (greater than 90 feet) and high reading > speeds, are used for such applications as railroad car tracking and > automated toll collection. However, the higher performance of > high-frequency RFID systems are more expensive." > > And, "Interest in higher levels of security and stronger meth-ods of > authentication increased due to the events of the last year, > particularly in government agencies and corporations. These entities > often have multiple sites, use systems of different types or ages and > have implemented a photo ID policy," says Debra Spitler, vice president > of marketing, ASSA ABLOY Identification Technology Group (ITG). HID > Corporation's iCLASS, a 13.56 MHz, read/write, contactless smart card > technology, enables employees to use a single card for multiple > applications including access control, IT secure authentication, > cashless vending and health record storage. By incorporating multiple > technologies into one card, users have the ability to leverage their > existing investment in various systems. In addition, the ability to > store a biometric template on a contactless smart card is a significant > technological advancement that has seen increasing interest since > 9/11/01. HID has teamed up with Bioscrypt, Sherman Oaks, Calif., in the > development of the V-Smart iCLASS to ensure that traditional access > control customers can use a biometric product that offers one-to-one > biometric template authentication and user convenience. These two > features support the markets' requirement for fast throughput and > individual privacy. The dual template enhancement solves the occasional > inconvenience caused by a dirty or injured finger, or even a bandage, > because each participant can use either of the two fingers enrolled in > the system. V-Smart iCLASS, a two-in-one reader solution, supports dual > fingerprint templates and multiple application contactless smart cards. > At the current time, Bioscrypt has integrated iCLASS technology into a > biometric fingerprint reader, and Recognition Systems, Camarillo, > Calif., has integrated iCLASS into a hand geometry reader. The system > can be easily integrated with other technologies. The iCLASS enables > customers to upgrade existing proximity or mag stripe systems over time. > In some cases, customers may use proximity/mag stripe technology in an > existing building and use iCLASS technology in a new building. > > > > It's in the Cards > RFID ubiquity will create a forum for counterfeiters and criminals. If > there is no mechanism to ensure that transmitted information has not > been tampered with, hackers could easily change it. Manufacturers need > to ensure that their RFID application is part of a trusted environment > by guaranteeing confidentiality, authentication, integrity and > non-repudiation. Such a guarantee is possible with the integration of a > PKI (public key infrastructure). NTRU, Burlington, Mass., is a > cryptography provider of technology that can provide this level of > security for RFID. As RFID applications proliferate, and more high-value > transactions are performed using these applications, the need for > powerful security increases. NTRU provides security services tailored to > meet the robust requirements of RFID and contactless applications, > including a cost effective token and reader technology.With NTRUSign, > RFID applications benefit from authentication capabilities, which ensure > that the tag, reader and/or system component is who or what they claim > to be and that the transmitted data have not been altered. NTRU > technology also provides for confidential transaction and new audit > capabilities that create digitally signed records of each and every > transaction. NTRU develops powerful, fast security that, due to its > small footprint, is uniquely suited to secure space-constrained > environments such as contactless smart cards, radio frequency > identification tags and wireless devices. NTRU shares in the vision of > enabling an interoperable platform for the delivery of next-generation > products and services based on smart card technology, offers Michael > Yaffe, senior communications manager, NTRU. > > All RF data transmission between the card and reader is encrypted using > a secure algorithm. By using industry standard encryption techniques, > HID's iCLASS, for example, reduces the risk of compromised data or > duplicated cards. Access to data stored on the cards is protected by > 64-bit keys, which can be further customized by the end-user with an > iCLASS programmer. Even if the unauthorized person obtains an iCLASS > reader, without the keys, the reader will not authenticate with the card > and data will not be transmitted. For even higher security, card data > may also be protected with DES or triple DES encryption. With iCLASS, > the transaction between the card and reader can not be sniffed. > > > > On the Market > End users in various vertical markets are looking for every advantage > they can get as a result of last year's terrorist attacks. At the > recently held Airport Security Expo in Las Vegas, Applied Digital > Solutions and its VeriChip Corporation featured its VeriPass and > VeriTag. These new applications will allow airport and port security > personnel to link a VeriChip subscriber to his or her luggage-both > during check-in and on the airplane-flight manifest logs and airline or > law enforcement software databases. > > Commenting on VeriChip's participation in the Airport Security Expo, > Scott R. Silverman, president of Applied Digital Solutions, says, > "VeriChip can assist in assuring the public that only authorized > personnel gain access to certain sensitive areas of airports and even > the cockpits of airplanes. Since VeriChip's personal verification > technology can't be lost, stolen, tampered with, misplaced or > counterfeited, its secure personal verification system should be > incorporated into our national airport security initiatives." VeriChip > is a miniaturized radio frequency identification device that can be used > in a variety of security applications. About the size of a grain of > rice, each VeriChip product contains a unique verification number and > will be available in several formats, some of which will be insertable > under the skin, which, by the way, is in the works to track a patient's > medical status. > > In the security field, the company is actively developing applications > for VeriChip in a variety of security, defense, homeland security and > secure-access applications. > > These opportunities include using VeriChip to control authorized access > to government installations and private-sector buildings, nuclear power > plants, national research laboratories, correctional facilities and > sensitive transportation resources. VeriChip can enhance airport > security, airline security, cruise ship security, intelligent > transportation and port congestion management. In these markets, > VeriChip could function as a stand-alone, tamper-proof personal > verification technology or it could operate in conjunction with other > security technologies such as standard ID badges and advanced biometric > devices. > > Frost & Sullivan reports that by 2006, 80 percent of the access control > market will be RFID-based. With over > > 180 million RFID tags deployed worldwide and approximately six million > Exxon/Mobil Speedpass users, Texas Instruments Radio Frequency > Identification Systems (TI-RFid), Dallas, Tex., is making a huge splash > in the industry with its line of 13.56 MHz reader and card security > systems for access control. TI's vicinity cards and S6400 reader series > bring a new level of security to the market with 2000-bit programmable > memory, unique and secure identification, at a cost comparable to > traditional proximity cards. TI-RFid 13.56 MHz access control cards and > readers are compliant with the ISO 15693 vicinity card standard offering > security and access control providers increased security and > authentication, at-the-door read-write programmability, interoperability > across all suppliers and applications and multiple card reading > capability. "As a pioneer in 13.56 MHz technology, TI has deployed more > than 180 million tags worldwide in a range of RFID applications," said > Bill Allen, eMarketing manager, Texas Instruments RFid Systems. "We're > now bringing our wealth of experience to the security and access control > industry." > > TI-RFid's line of cards and badges provide factory-programmed ID, which > cannot be duplicated, ensuring that no two cards or people are > misidentified. With more than 2000 bits of data, the cards hold 50 times > more data than traditional 125 kHz solutions. The data is written and > stored directly on the card, independent from a host system, allowing > employees to carry vital information such as authorization codes, > certification or emergency medical histories. TI's cards also provide > the capacity for stronger encrypted security and the data capacity to > use the ID cards beyond just facility access for other solutions, such > as biometrics and wireless financial transactions. > > Secura Key, Chatsworth, Calif., has a new generation of high frequency > 13.56 MHz readers for use with access control systems. These new e*TagT > proximity readers work with a variety of contactless smart cards and key > fobs that meet ISO 15693 and ISO 14443 A/B standards. > > Communicating 100 times faster than traditional 125 KHz proximity > readers, e*TagT offers multiple card reads, read/write applications, > custom card encoding and many other benefits. Designed to work with > Tag-It transponders from Texas Instruments, e*Tag units can read > multiple transponders in a field. > > In full deployment, AXCESS RFID technology provides security features > ranging from facial verification, badge-controlled access to facilities > or areas within facilities, asset monitoring, and video surveillance > with analytical capabilities. AXCESS manufactures RFID tags that will > signal an alarm if tagged assets are removed from designated areas and > will track their movements throughout a facility. > > Checkpoint Systems, Thorofare, N.J., offers an entire family of RFID > products, including low-cost 13.56 MHz tags with read-only or read-write > capability, which offer significant capacity in a variety of tag > configurations, readers designed to maximize read range for both fixed > and portable applications and open architecture application programming > interface (API) software for integration with existing systems. > > Zebra Technologies offers the Zebra R402 RFID smart label > printer/encoder, a tool for both printing and programming 13.56 MHz > smart labels, tickets and tags. This printer/encoder delivers the > enhanced tracking, inventory management and authenticating benefits of > radio frequency identification (RFID) technology. > > "The RF402 can print bar codes, human-readable text, and graphics on the > label surface. It also can read, encode and verify information > programmed to the ultra-thin RFID transponder embedded inside the > label," says Matt Ream, Zebra's senior product manager for RFID systems. > > > > > > > John Mesenbrink is managing editor for SECURITY Magazine. He can be > reached at 630-694-4026 > > > > > Copyright C 2001-2002 by Business News Publishing Co > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6497 From: MitchD Date: Thu Oct 10, 2002 10:52pm Subject: FW: RFID RFID or radio "fingerprinting" has been around for a long time.Every transmitter does have its own signature,and Radio fingerprinting has been used very effectively for many reasons,All good. It appears that the RF ID system mentioned is nothing more than a transponder setup,and should be addressed as such. RFID has it own very valuable applications besides inventory control at Wal Mart US Customs uses Barcodes for tracking,and items still get inspected.Therefore I don't think anything will be enhanced by theyre use in general,`especially for expediting shipments..Transponders are not as inexpensive or easy to use or implement as barcodes.Transponders have to be programmed. Also, what will be the standard in regards to protocol ,as well as integration, with transponders ? Go to transponders.com and see the many types,and mfgs of. A Lexus transponder system retails for more than 3000 bucks,if 1/5 is cost that's 600 bucks for 2 transponders and a reader,and includes a single shot of programming,as well as code scrolling. A transponder may also be looked at as a rolling code garage door opener that's powered through inductance.New technology???? I believe they're great for security systems,and antitheft systems in the automotive industry,other than that its just another pet rock or rubiks cube for the labeling industry...UPC's and barcodes are simple. Why fix something till its broke....Ask anyone who uses "Easy Pass" on a toll road if they like it, and then ask them how many times they got mailed a citation for "blowing" a toll booth even after the user honestly got the green light indicating their transponder and account information was recognized.. Just my 2 cents MD _________________________________________ TSCM/Special Operations Group Inc. e-mail MitchD@t... website: www.tscmusa.com (615) 837 9933 ______________________________________ [Non-text portions of this message have been removed] 6498 From: Kirk Adirim Date: Mon Nov 11, 2002 9:11am Subject: RE: Re: Audio Enhancement U1 2 arm wrestle wrote, "I wont get into a flame war on the subject but I have found in audio that just messing around and practice takes more time then a person is willing to devote to the subject especially since it is a single occurance." A difference of opinion is not a call for a flame war. The majority of the people on this list have the fundamental knowledge of noise floors, S/NR's, thresholds, gain etc. This list is of a technical nature for technical people to ask questions. This furthers the science and art of tscm. DSP is now quite common, and is readily found on off the shelf shortwave radios and Ham gear. These guy's are using it to eliminate heterodynes, noise, and carriers both in band and out. It just isn't that difficult of a concept. My experience is that the people on this list, and in this business are sophisticated and savvy. It is usually a single occurance that sparks the interest of a person to delve deeper into the subject. Shalom, Kirk I wont get into a flame war on the subject but I have found in audio that just messing around and practice takes more time then a person is willing to devote to the subject especially since it is a single occurance. --- In TSCM-L@y..., "Kirk Adirim" wrote: > Does it matter wrote, > > "You CANNOT take a program and plug in a pc > and clean up a tape without any experience. Pops, clicks, hiss, > yeah, amplification, and other simple items yes. You would have to > have very good knowledge of sound floors, snr ratios, thresholds, > gain, etc > Telling someone to just download soundforge or some other program > would be the = of saying download the software to a TDR and use the > tdr, it isn't happening. Peace" > > Well it isn't quantum mechanics either. I say download Soundforge and > practise/learn , ask questions, GAIN experience with it, and in the end you > will have a better recording than you started with. It's ok to color > outside of the lines and to think outside of the box. > > Imagine whirled peas > Kirk 6499 From: Date: Mon Nov 11, 2002 11:11am Subject: Swedes charged with spying on Ericsson Swedes charged with spying on Ericsson VNUNet.com Three Swedes have been charged with industrial espionage after allegedly leaking information from telecoms equipment giant Ericsson. The company said in a statement that the three people were either employees or former employees, although it would not say what information had been handed over. They have allegedly been passing secret documents to a foreign intelligence service for some time. Police said that the arrest of the main suspect took place as he was meeting a foreign intelligence officer. The other two are charged with helping the ringleader obtain the information. An Ericsson spokesman said that the damage was limited as the delivery of the information was discovered and stopped. ---------- http://www.intelligentx.com/newsletters/technology/articles/story_tech1_111102.cfm [Non-text portions of this message have been removed] 6500 From: George Shaw Date: Mon Nov 11, 2002 8:21am Subject: CCTV Installation tool kit? Would anyone like to draw up a suggested tool kit for B&W/Colour CCTV surveillance and monitoring systems installation and maintained/testing. Top of the range and the most versatile and useful kit/brands/sources. -- George Shaw MI3GTO " Any Sufficiently Advanced Technology is Indistinguishable from Magic" ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... 6501 From: David Alexander Date: Tue Nov 12, 2002 4:08am Subject: re: Time's flying, but you can still bid on MiG-21 There is a cheaper way to get hold of a Mig 21. India has lost an average of 2 a month for the last 10 years (that's worse than the record for old F104 Starfighters designed by Kelly Johnson and the boys at Lockheed). All you need to do is buy a field in India - one is bound to drop into it eventually, admittedly in kit form - but hey it's a project for those long winter nights... BTW before anyone says that is sick 1. I am an ex Harrier/AV8B and F4 driver 2. All of us have a real sick sense of humour - get over it 3. I crashed, which is why I'm an ex F4 driver. Coffee break over _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 6502 From: David Alexander Date: Tue Nov 12, 2002 4:12am Subject: re: RFID > RFID implant = quickest Big Mac yet IMHO you are missing the point - who wants to eat that stuff ? The ability to subject my tastebuds to extreme cruelty faster ? - no thanks (so I had a second cup) _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 6503 From: Fernando Martins Date: Tue Nov 12, 2002 7:58am Subject: RE: re: RFID > -----Original Message----- > From: David Alexander [mailto:david.alexander@b...] > Sent: Tuesday, November 12, 2002 10:13 AM > To: 'TSCM submissions' > Subject: [TSCM-L] re: RFID > > > > RFID implant = quickest Big Mac yet > > IMHO you are missing the point - who wants to eat that stuff > ? The ability to subject my tastebuds to extreme cruelty > faster ? - no thanks Well ... Sometimes is amazing what people like to eat, like in Asia they eat bugs. But you can relax, since as any good portuguese, I do know what's good to eat, and more, I'm a great cook :> FM 6504 From: Fernando Martins Date: Tue Nov 12, 2002 8:03am Subject: RE: CCTV Installation tool kit? After working some time with CCTV, I got the conclusion that no tool kit fits my needs ;) At www.pelco.com you can find out a nice article about designing cctv systems, it's a start ... It's something like "how to design a digital video system for any application"(.pdf) FM > -----Original Message----- > From: George Shaw [mailto:george.shaw@u...] > Sent: Monday, November 11, 2002 2:22 PM > To: tscm-l@yahoogroups.com > Subject: [TSCM-L] CCTV Installation tool kit? > > > Would anyone like to draw up a suggested tool kit for > B&W/Colour CCTV surveillance and monitoring systems > installation and maintained/testing. > > Top of the range and the most versatile and useful kit/brands/sources. > > -- > George Shaw MI3GTO > > " Any Sufficiently Advanced Technology > is Indistinguishable from Magic" > ---Arthur C. Clarke > > Mobile: +44 (0) 7740 361 163 > Email: george.shaw@u... > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire > speed, the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > 6505 From: Kirk Adirim Date: Tue Nov 12, 2002 9:31am Subject: FW: don't shoot 'till you see the whites of their eyes FW:don't shoot 'till you see the whites of their eyes [Non-text portions of this message have been removed] 6506 From: Steve Uhrig Date: Tue Nov 12, 2002 9:51am Subject: CCTV Installation tool kit? On 11 Nov 2002 at 14:21, George Shaw wrote: > Would anyone like to draw up a suggested tool kit for B&W/Colour CCTV > surveillance and monitoring systems installation and > maintained/testing. This is something you do through experience. It's rarely a good idea to *start* with buying equipment, especially in CCTV. CCTV gear goes obsolete quicker than computer stuff, and gets better and cheaper. Coax is nearly extinct. Analog tape is nearly extinct. We use it only for short term leases where we need a compatible medium. The digital machines we use will write to a CD which any computer will play, but that still hasn't 100% replaced analog tape. You need to know the job you propose to do, then work through it in your head from start to finish and list every major component you will need. Write it down. Some things, like power supplies, you want several of in your kit. Cameras vary with the installation. If you can afford to start with USD $2000 in cameras that is a beginning and will give you enough versatility for most jobs. Black and white is nearly extinct and I would not invest in it. You do need coax for jumpers between devices like the recorder and the camera. I buy premade ones from MCM cheaper than I can make them up. You, of course, want RG59 for jumpers as well as an assortment of 75 ohm 3 piece male crimp on BNC connectors for RG59 *and* the proper Amphenol tool to crimp them (and nothing else. Never twist on connectors, ever, only 3 piece crimp). You want a good number of *75* ohm BNC barrels and *75* ohm BNC elbows. Most people don't know there is a difference in impedance between radio adapters at 50 ohms and video at 75 ohms. It's a small point, but the mark of a professional to use the proper connectors. The power supplies I have used literally in hundred lot quantities from MCM were just recalled on a safety issue so I can't recommend them. Forget wireless. It is unlikely you will run into a covert job where wireless video is mandated, it works poorly and specs are greatly exaggerated by the sellers. All wireless video does is remove the cable between the camera and the monitoring post, but it adds an expensive, finicky transmitter which needs power along with the camera, antennas at the transmit end, antenna at the receive end, a receiver which needs power, etc. You end up with a much more complicated, poorly performing installation merely to save one cable. Most of our covert quick plant systems we use Cat5E which is 4 pair twisted, twisted pair modems at each end to put the video on and off the Cat 5 pair, and we send power to the camera back up the Cat 5 from the listening post. You can run two or three cameras that way, since all can share a common power pair and three cameras can use one data pair each. You need a handheld test monitor to help you line up the camera at that end. Something battery powered, with a long coax jumper to reach from the ladder to the floor. You can involve the client by letting him hold the test monitor and guiding you through aiming the camera. Since it is him making the decision, he can't argue with the coverage later. A lot of video comes on on RCA, so you need some male RCA to female BNC adapters. A few places make premade cords of 25, 50 and 100 foot lengths which are two pieces like siamese cable, one for power and one for video. These have connectors on already for power (usually 2.1/5.5mm coaxial, center pin positive) and RCA or BNC for video. It's cheaper to use Cat 5E and abandon it after a temporary installation, but these extension cables are small, flexible and convenient. Also fairly expensive, so you don't want to abandon them, neither would you want to use them for permanent installations. This is only the tip of the iceberg. Every time you're on a job and you need something you don't have, write it on a list. Eventually you may want to buy it. We carry everything prepacked in large tough gray plastic transport cases which are strong enough to sit on and fairly lightweight, and innnocuous when carrying into or out of a building. I get them a dozen in each of the 3 sizes from MCM maybe twice a year when they go on sale. That way everything is prepacked, and when we get a call we just grab it and go. Some on this list have seen our grab and go kits, and some have seen us use them. You don't need a lot. You do need to be clever, and be experienced. Some guidelines: avoid tiny cameras. They fail from heat as they can't dissipate heat quickly enough. Avoid pinhole lenses where possible. You pay a heavy penalty in light loss with pinhole lenses. Avoid buying on price. This market (CCTV) is price driven. Most installers don't get the work unless they are the cheapest bidder, so most have learned to cut every corner and save every penny on equipment, and the manufacturers have responded to that. It is nearly impossible to get a quality analog video tape machine anymore. The ones we use are Panasonic AG-6740p, and they're very hard to find and expensive, but they will work. Most of the AC powered devices use a standard IEC power cord, so have several spares of them. Have a box with extension cords and power strips so you can make power wherever you need it. Learn to steal power from Exit signs or emergency light circuits in seconds above the ceilings. Carry appropriate wire nuts and some premade pigtailed AC outlets. Avoid wide angle lenses as they frequently give a fishbowl effect. What constitutes wide angle depends on the size of the image sensor. You need to learn this. Go to some manufacturer's or distributor's CCTV seminars. They're free and they feed you lunch. Read the articles on video on the Articles section of our website for some practical tips. Get a hot melt glue gun, extension cord, carry some blocks of styrofoam which something you bought came sandwiched in, carry a roll of duct tape and wide masking tape. You will use all this to mount cameras in weirdo places. DON'T worry about the cameras being made. It's only happened to us once, and we are sure it is because management ran their mouths about the covert video. The camera which was made was looking out a 3 story high window in a large warehouse at a parking lot through a filthy piece of glass with one inch cleaned off to let the camera see through. Don't fell through ceiling tiles and make friends with a good electrician or alarm installer who can bury a mile of cable in a place in 20 minutes and you never see an inch of it. You want one of these little squirrely guys who can slither across a ceiling carrying a cable in their teeth and drop it down a wall to you somewhere. Some sources: Pelco www.pelco.com. Sells through dealers only. We are a dealer but can't afford to process small orders. My favorite products from them is the CM6800 matrix switch and Spectra III cameras. www.therfc.com. Ask for Joel. Anything to do with cable or connectors, adapters, tools to install them. Mention me. www.atvresearch.com. Ask for Dan Potts. Mention me. Once you know what you need and only need a place to buy it, go to ATV Research. They sell to dealers only because their low prices do not allow time for them to hold your hand. They'll make recommendations, but they won't design jobs for you and assume you are experienced. Cameras, monitors, recorders, everything component related comes from them. Do not buy ANYTHING from spy shops. You can buy better quality from the same places they do. Actually, since each spy shop claims to have the world's smallest CCTV camera, you don't want to buy from them anyway because the small cameras have miserable reliability. You need to have the experience before you get into buying anything. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6507 From: Robert Dyk Date: Tue Nov 12, 2002 0:18pm Subject: RE: CCTV Installation tool kit? After many years of designing, selling and installing covert and overt CCTV systems from the very small to very large gaming surveillance systems, I can attest to the truth and wisdom of Steve's reply. Especially heed the wireless statement. Here are some things to consider... Buy what you think you will need for your first installation. Travel with at least 4 camera/lens configurations for every one you intend to install. Treat PC mini cameras as disposable. If a pinhole camera is required, you need both conical and flat face lenses in multiple focal lengths. Use only regulated DC power supplies (for dc cameras) and measure them with your VOM BEFORE connecting. What many manufacturers call regulated means 19.5 vdc at no load with a label that says 12.0 vdc regulated at 300 mA. Your little cameras will last a lot longer this way. Don't skimp on a test monitor and make it a 5" CRT not one of those LCD in a case jobs. Always set up your cameras to function in the minimum expected light environment. Too many installers ignore this and constantly deal with depth of field induced focus problems when the lights go down or out. With Digital Recorders always ask for the storage capacity expressed in terms of 1 frame per second per camera 24 hours per day 7 days per week at maximum resolution. This will give you some ability to compare DVR storage capacity. You have to factor image file size in there at some point, as well as whether or not the unit is PC based or stand alone. Everybody looks for the hidden camera in the wall clock, the motion detector, the thermostat etc. What separates the men from the boys in this field is the ability to covertly deploy a system into an environment without adding extra visible hardware. While not always possible, this should be your goal. Practice at the office before you leave. Never assume anything works because it is new. Rediscover a quality hot glue gun with the High Strength yellow glue sticks (not the white stuff for crafts). When you are setting covert cameras, almost never does a conventional bracket work or fit for exactly the shot you want. Hot glue sets in seconds and with enough applied in the right places will definitely last for the required duration of a temporary covert installation. (don't forget that the cameras will warm up in operation and the glue might soften if applied to a spot that is too warm) Listen to people who have covert CCTV experience. Very few regular CCTV installers or alarm installers can honestly claim this. Good Luck, Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada > -----Original Message----- > From: > sentto-49964-6980-1037116320-dyk=canada.com@r... > [mailto:sentto-49964-6980-1037116320-dyk=canada.com@r... > .com]On Behalf Of Steve Uhrig > Sent: November 12, 2002 10:52 AM > To: tscm-l@yahoogroups.com > Subject: [TSCM-L] CCTV Installation tool kit? > > > > On 11 Nov 2002 at 14:21, George Shaw wrote: > > > Would anyone like to draw up a suggested tool kit for B&W/Colour CCTV > > surveillance and monitoring systems installation and > > maintained/testing. > > This is something you do through experience. > > It's rarely a good idea to *start* with buying equipment, especially > in CCTV. > > CCTV gear goes obsolete quicker than computer stuff, and gets better > and cheaper. > > Coax is nearly extinct. > > Analog tape is nearly extinct. We use it only for short term leases > where we need a compatible medium. The digital machines we use will > write to a CD which any computer will play, but that still hasn't > 100% replaced analog tape. > > You need to know the job you propose to do, then work through it in > your head from start to finish and list every major component you > will need. Write it down. Some things, like power supplies, you want > several of in your kit. Cameras vary with the installation. If you > can afford to start with USD $2000 in cameras that is a beginning and > will give you enough versatility for most jobs. > > Black and white is nearly extinct and I would not invest in it. > > You do need coax for jumpers between devices like the recorder and > the camera. I buy premade ones from MCM cheaper than I can make them > up. You, of course, want RG59 for jumpers as well as an assortment of > 75 ohm 3 piece male crimp on BNC connectors for RG59 *and* the proper > Amphenol tool to crimp them (and nothing else. Never twist on > connectors, ever, only 3 piece crimp). You want a good number of *75* > ohm BNC barrels and *75* ohm BNC elbows. Most people don't know there > is a difference in impedance between radio adapters at 50 ohms and > video at 75 ohms. It's a small point, but the mark of a professional > to use the proper connectors. > > The power supplies I have used literally in hundred lot quantities > from MCM were just recalled on a safety issue so I can't recommend > them. > > Forget wireless. It is unlikely you will run into a covert job where > wireless video is mandated, it works poorly and specs are greatly > exaggerated by the sellers. All wireless video does is remove the > cable between the camera and the monitoring post, but it adds an > expensive, finicky transmitter which needs power along with the > camera, antennas at the transmit end, antenna at the receive end, a > receiver which needs power, etc. You end up with a much more > complicated, poorly performing installation merely to save one cable. > > Most of our covert quick plant systems we use Cat5E which is 4 pair > twisted, twisted pair modems at each end to put the video on and off > the Cat 5 pair, and we send power to the camera back up the Cat 5 > from the listening post. You can run two or three cameras that way, > since all can share a common power pair and three cameras can use one > data pair each. > > You need a handheld test monitor to help you line up the camera at > that end. Something battery powered, with a long coax jumper to reach > from the ladder to the floor. You can involve the client by letting > him hold the test monitor and guiding you through aiming the camera. > Since it is him making the decision, he can't argue with the coverage > later. > > A lot of video comes on on RCA, so you need some male RCA to female > BNC adapters. > > A few places make premade cords of 25, 50 and 100 foot lengths which > are two pieces like siamese cable, one for power and one for video. > These have connectors on already for power (usually 2.1/5.5mm > coaxial, center pin positive) and RCA or BNC for video. It's cheaper > to use Cat 5E and abandon it after a temporary installation, but > these extension cables are small, flexible and convenient. Also > fairly expensive, so you don't want to abandon them, neither would > you want to use them for permanent installations. > > This is only the tip of the iceberg. Every time you're on a job and > you need something you don't have, write it on a list. Eventually you > may want to buy it. > > We carry everything prepacked in large tough gray plastic transport > cases which are strong enough to sit on and fairly lightweight, and > innnocuous when carrying into or out of a building. I get them a > dozen in each of the 3 sizes from MCM maybe twice a year when they go > on sale. That way everything is prepacked, and when we get a call we > just grab it and go. Some on this list have seen our grab and go > kits, and some have seen us use them. > > You don't need a lot. > > You do need to be clever, and be experienced. > > Some guidelines: avoid tiny cameras. They fail from heat as they > can't dissipate heat quickly enough. > > Avoid pinhole lenses where possible. You pay a heavy penalty in light > loss with pinhole lenses. > > Avoid buying on price. This market (CCTV) is price driven. Most > installers don't get the work unless they are the cheapest bidder, so > most have learned to cut every corner and save every penny on > equipment, and the manufacturers have responded to that. It is nearly > impossible to get a quality analog video tape machine anymore. The > ones we use are Panasonic AG-6740p, and they're very hard to find and > expensive, but they will work. > > Most of the AC powered devices use a standard IEC power cord, so have > several spares of them. Have a box with extension cords and power > strips so you can make power wherever you need it. Learn to steal > power from Exit signs or emergency light circuits in seconds above > the ceilings. Carry appropriate wire nuts and some premade pigtailed > AC outlets. > > Avoid wide angle lenses as they frequently give a fishbowl effect. > What constitutes wide angle depends on the size of the image sensor. > You need to learn this. Go to some manufacturer's or distributor's > CCTV seminars. They're free and they feed you lunch. > > Read the articles on video on the Articles section of our website for > some practical tips. > > Get a hot melt glue gun, extension cord, carry some blocks of > styrofoam which something you bought came sandwiched in, carry a roll > of duct tape and wide masking tape. You will use all this to mount > cameras in weirdo places. > > DON'T worry about the cameras being made. It's only happened to us > once, and we are sure it is because management ran their mouths about > the covert video. The camera which was made was looking out a 3 story > high window in a large warehouse at a parking lot through a filthy > piece of glass with one inch cleaned off to let the camera see > through. > > Don't fell through ceiling tiles and make friends with a good > electrician or alarm installer who can bury a mile of cable in a > place in 20 minutes and you never see an inch of it. You want one of > these little squirrely guys who can slither across a ceiling carrying > a cable in their teeth and drop it down a wall to you somewhere. > > Some sources: > > Pelco www.pelco.com. Sells through dealers only. We are a dealer but > can't afford to process small orders. My favorite products from them > is the CM6800 matrix switch and Spectra III cameras. > > www.therfc.com. Ask for Joel. Anything to do with cable or > connectors, adapters, tools to install them. Mention me. > > www.atvresearch.com. Ask for Dan Potts. Mention me. Once you know > what you need and only need a place to buy it, go to ATV Research. > They sell to dealers only because their low prices do not allow time > for them to hold your hand. They'll make recommendations, but they > won't design jobs for you and assume you are experienced. Cameras, > monitors, recorders, everything component related comes from them. > > Do not buy ANYTHING from spy shops. You can buy better quality from > the same places they do. Actually, since each spy shop claims to have > the world's smallest CCTV camera, you don't want to buy from them > anyway because the small cameras have miserable reliability. > > You need to have the experience before you get into buying anything. > > Regards ... Steve > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6508 From: George Shaw Date: Tue Nov 12, 2002 1:17pm Subject: RE: CCTV Installation tool kit? Steve as always comes up super trumps. Hey dude why you don't write a book, I would buy it ;-) BTW hope your feeling better. I should explain, what I am after is a pointer on the suppliers and manufactures of the TEST tools for CCTV/Covert hand held monitors, scopes, pattern generators etc. Steve has pointed me to several good sources, thanks. -- George Shaw MI3GTO " Any Sufficiently Advanced Technology is Indistinguishable from Magic" ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... 6509 From: Shawn Hughes Date: Tue Nov 12, 2002 7:48pm Subject: Re:video installs George, That's a tall order. I don't get to comment often, as I take student status to much of the things that pass through here. But, one thing I *have* done a lot of is video installs. I have run the gamut from room -to-room single cam, single monitor setups to multicam digital sent 14 miles on microwave. Without trying to come off as pretentious, a good video install kit would just about fit in a minivan. Without boring you with all of the lessons I have learned the hard way, here are a few things: 1) buy the biggest portable handheld monitor you can afford. Trust me, you'll thank me later. I have been known to use industrial 15" underscan monitors on some critical installs. 2) There is a doodad called a 'glow rod'. It's physically just a long, fiberglass rod that's yellow in color. But, to me, it is a lifesaver and necessary piece of kit. 3) Buy a handful of video amps (Winegard makes some good ones) and keep them with you. Solves a LOT of problems before they start. 4) Push on F connectors suck. I broke down and bought the professional ($100+) Augat Snap-n-Seal crimp frame; I'll never go back. Sure, the connectors are a little more expensive, but the time I save in not having to go back and replace those sorry pushons truly adds up. 5) Cheap wire will work on short runs. Otherwise, spec plenum - rated with low loss. 6) A fox and hound kit works decent on coax, and will save you from ripping your hair out in a video distribution frame room. 7) Forget those linesmans' gaffes. Good fiberglass ladders in several sizes are more versatile. 8) Jensen sells a thingy that is the size of two c cells roughly that puts out NTSC test signals. I don't have one, but my buddy does, and the time he's saved in troubleshooting where the bad cable / wrong connection is has made me decide I will have one for the next complicated install I do. 9) Those teeny cameras that are all the rage right now generally run thermally hot, and therefore have a short ( 1-2 years or often less in my experience) mean time between failures. Use the full - sized CCD cameras, and just be a little more creative in your blocking and hides. and, finally, 10) Don't believe the specs. even cheap microwave will shoot through stuff you wouldn't expect it to, and further than you'd think. Try it before you offhandedly dismiss it. I hope this helps. Shawn PS - Leatherman, Leatherman, Leatherman!! At 10:40 AM 11/12/02 , you wrote: >From: George Shaw [mailto:george.shaw@u...] > > Sent: Monday, November 11, 2002 2:22 PM > > To: tscm-l@yahoogroups.com > > Subject: [TSCM-L] CCTV Installation tool kit? > > > > > > Would anyone like to draw up a suggested tool kit for > > B&W/Colour CCTV surveillance and monitoring systems > > installation and maintained/testing. > > > > Top of the range and the most versatile and useful kit/brands/sources. > > > > -- > > George Shaw MI3GTO > > **************************************************************************** ****************************** Shawn Hughes Patrolman / Technician, Union County (TN) Sheriff's Office Uncertified Public Safety Bomb Technician Hazardous Materials Technician Subject Matter Expert; CBIRNE Operations, Technical Surveillance Operations Member, International Association of Bomb Technicians Region VI ORI - TN0870000 Ph. - (865)992-5212 email - srh@e... ---------------------------------------------------------------------------- ------------------------------------------------ 6510 From: Kevin Murray Date: Tue Nov 12, 2002 9:04pm Subject: Gerard "Cheesebox" Callahan I was advised by a family member this evening that Gerard "Cheesebox" Callahan, Sr. passed away today. He is a legend in our field. He had been in a nursing home in New York. For newcomers and colleagues from outside the US who may not be familiar with him... http://www.spybusters.com/History_1958_Cheesebox.html Kevin Kevin D. Murray - CPP, CFE, BCFE Murray Associates Eavesdropping Detection and Counterespionage Consultants to Business & Government http://www.spybusters.com 6511 From: Steve Uhrig Date: Tue Nov 12, 2002 9:16pm Subject: They're at it again Yahoo is now using something called 'Web Beacons' to track Yahoo Group users around the net and see what you're doing - similar to cookies. Take a look at their updated privacy statement: http://privacy.yahoo.com/privacy/us/pixels/details.html About half-way down the page, in the section 'Outside the Yahoo! Network', you'll see a little 'click here' link that will let you opt- out of their new method of snooping. I recommend doing this. Once you have clicked that link, you are opted out. Notice the 'Success' message at the top of the next page. Be careful because on that page there is a 'Cancel Opt-out' button that, if clicked, will *undo* the opt-out. This is a pure act of deception on their part. Read between the lines very carefully on their page above. Merely by opening HTML-encoded emails you communicate back to them the fact that you opened the mail. I use Norton System Works 2002 Clean Sweep | Internet |Cookies function once a day or so to clean out the 20 or 30 unwanted cookies I've collected during the day's work. Many cookies are beneficial. Not all are harmless, so don't go deleting your entire cookie file or changing its attributes to read only. Get a utility that lets you examine each cookie and decide if you want to keep it. Thanks to cookies, I don't have to enter my Fedex account number and all that crap every day when I go to ship. Ebay knows who I am, which I don't mind as it saves me having to log in. The weather.com site knows my zip code and gives me local weather automatically. There are proper uses for cookies. But not the way Yahoo uses them. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6512 From: Matt Paulsen Date: Wed Nov 13, 2002 8:49am Subject: Espionage Against the United States by American Citizens 1947-2001 From WEN @ infocon -- m (NCIX is the Office of the National Counterintelligence Executive. WEN) -----Original Message----- From: @ncix.gov] Sent: 13 November 2002 12:34 Subject: NCIX WEB SITE UPDATE ADVISORY #20-2002 Dear Friends and Colleagues: A Defense Personnel Security Research Center (PERSEREC) report entitled Espionage Against the United States by American Citizens 1947-2001 may be viewed by linking to http://www.ncix.gov/news/index.html . The report is based on an unclassified database of 150 individuals involved in espionage that is maintained at PERSEREC. Any questions regarding this 135 page report should be directed to PERSEREC at perserec@o.... IWS INFOCON Mailing List @ IWS - The Information Warfare Site http://www.iwar.org.uk From: Date: Fri Nov 9, 2001 10:17pm Subject: Center Works to Protect Communications Infrastructure Center Works to Protect Communications Infrastructure By Jim Garamone American Forces Press Service WASHINGTON, Nov. 7, 2001 -- America is a cyber nation. In this post-industrial world, moving information is as important as moving people or things. If you wanted to cripple America, one of the things you might strike is the telecommunications network. Fortunately, Americans are thinking of this possibility and are working together to protect this crucial national resource. Bernie Farrell is the manager of the National Coordinating Center for Telecommunications, a part of the National Communications System. It's his job to think of the unthinkable and craft responses. Farrell and his people are the bridge between industry and government. Located with the Defense Information Systems Agency, the coordinating center works with telecommunications companies and appropriate government agencies, including the Defense Department. Farrell is himself a bridge between the two worlds. He has more than 32 years of telecommunications experience with the Bell System and the United States Navy. He assumed his current job in 1995. The coordinating center is primarily concerned with the national security and emergency preparedness functions of the telecommunications infrastructure. "We focus on that narrow piece," Farrell said. "But in focusing on that piece, we work with the companies to foster planning and training and exercises that allow us to ensure that we can respond and recover." This ensures the government and the financial sector can keep working through a disaster, he said. "Those things came to play for sure in the World Trade Center event and the Pentagon event," Farrell said. Efforts at the center are cooperative. The government provides office space and communications capabilities, and industry provides expertise and familiarity with the various systems. The center works closely with the DISA Global Network Operation and Security Center and the Joint Task Forces ‚Äì Computer Network Operations. "The center has people standing watch with these organizations," he said. "The military and industry share information through the center." The center's primary vehicle is training. "We go out on training events to each region of the country," Farrell said. "We bring in local government folks, local federal people and we'll bring together local telecommunications people. We sit down and talk about the various programs and how we line up in the federal response plan so that when an event happens we're on the same sheet of music." The center runs three to four regional training events each year, plus internal "tabletop" exercises. "It's a big effort," he said. "Everything we do is a value-added proposition. If there's no value-added, (the telecommunications) people won't come. We get 60 to 100 people depending on the size of the region." The center also works closely with the Federal Emergency Management Agency and other federal offices. One side benefit of the training, he said, is, "if you put the right people together at the conference then they can deal with those things at the lowest possible level." The national center shouldn't be involved with every little problem. "We only need to be involved if a problem can't be resolved at the local or regional level," Farrell said. "We don't fix anything from here, we coordinate. We get the right person in touch with the right person or the right piece of equipment to the right person -- whatever it takes to fix a problem." 4083 From: James M. Atkinson Date: Sat Nov 10, 2001 8:25am Subject: OSAMA CLAIMS HE HAS NUKES DAWN - Karachi, Pakistan - Saturday, November 10, 2001 OSAMA CLAIMS HE HAS NUKES: IF U.S. USES N-ARMS IT WILL GET SAME RESPONSE http://www.dawn.com/2001/11/10/top1.htm By HAMID MIR KABUL, Afghanistan, 9 November 2001 (DAWN): Osama bin Laden has said that "we have chemical and nuclear weapons as a deterrent and if America used them against us we reserve the right to use them" [against America]. He said this in a special interview with Hamid Mir, the Editor of Ausaf, for Dawn and Ausaf, at an undisclosed location near Kabul. This was the first interview given by Osama [bin Laden] to any journalist after the September 11 attacks in New York and Washington. The correspondent [Hamid Mir] was taken blindfolded in a jeep from Kabul on the night of Nov. 7 [2001] to a place where it was extremely cold and one could hear the sound of anti-aircraft guns firing away. After a wait of some time, Osama arrived with about a dozen bodyguards and Dr. Ayman Al-Zuwahiri and answered questions. Hamid Mir [HM]: After American bombing on Afghanistan on Oct. 7, you told the Al-Jazeera TV that the Sept. 11 attacks had been carried out by some Muslims. How did you know they were Muslims? Osama bin Laden [OBL]: The Americans [FBI] themselves released a list of the suspects of the Sept. 11 attacks, saying that the persons named were involved in the attacks. They were all Muslims, of whom 15 belonged to Saudi Arabia, two were from the UAE and one from Egypt. According to the information I have, they were all passengers. Fateha [prayer] was held for them in their homes. But America said they were hijackers. HM: In your statement of Oct. 7, you expressed satisfaction over the Sept. 11 attacks, although a large number of innocent people perished in them, hundreds among them were Muslims. Can you justify the killing of innocent men in the light of Islamic teachings? OBL: This is a major point in jurisprudence. In my view, if an enemy occupies a Muslim territory and uses common people as human shield, then it is permitted to attack that enemy. For instance, if bandits barge into a home and hold a child hostage, then the child's father can attack the bandits and in that attack even the child may get hurt. America and its allies are massacring us in Palestine, Chechenya, Kashmir and Iraq. The Muslims have the right to attack America in reprisal. The Islamic Shariat says Muslims should not live in the land of the infidels for long. The Sept. 11 attacks were not targeted at women and children. The real targets were America's icons of military and economic power. The Holy Prophet [Muhammad] (peace be upon him) was against killing women and children. When he saw a dead woman during a war, he asked why was she killed? If a child is above 13 and wields a weapon against Muslims, then it is permitted to kill him. The American people should remember that they pay taxes to their government, they elect their President, their government manufactures arms and gives them to Israel and Israel uses them to massacre Palestinians. The American Congress endorses all government measures and this proves that the entire America is responsible for the atrocities perpetrated against Muslims. The entire America, because they elect the Congress. I ask the American people to force their government to give up anti-Muslim policies. The American people had risen against their government's war in Vietnam. They must do the same today. The American people should stop the massacre of Muslims by their government. HM: Can it be said that you are against the American government, not the American people? OBL: Yes! We are carrying on the mission of our Prophet, Muhammad (peace be upon him). The mission is to spread the word of God, not to indulge in massacring people. We ourselves are the target of killings, destruction and atrocities. We are only defending ourselves. This is defensive Jehad. [Jehad is a war against terrorism and all other evils.] We want to defend our people and our land. That is why I say that if we don't get security, the Americans, too would not get security. This is a simple formula that even an American child can understand. This is the formula of live and let live. HM: The head of Egypt's Jamia Al-Azhar has issued a fatwa (edict) against you, saying that the views and beliefs of Osama bin Laden have nothing to do with Islam. What do you have to say about that? OBL: The fatwa of any official Aalim [government-controlled scholar] has no value for me. History is full of such Ulema [clerics] who justify Riba [interest], who justify the occupation of Palestine by the Jews, who justify the presence of American troops around Harmain Sharifain. These people support the infidels for their personal gain.The true Ulema support the Jehad against America. Tell me if Indian forces invaded Pakistan what would you do? The Israeli forces occupy our land and the American troops are on our territory. We have no other option but to launch Jehad. HM: Some Western media claim that you are trying to acquire chemical and nuclear weapons. How much truth is there in such reports? OBL: I heard the speech of American President [George W.] Bush yesterday (Nov. 7). He was scaring the European countries that Osama wanted to attack with weapons of mass destruction. I wish to declare that if America used chemical or nuclear weapons against us, then we may retort with chemical and nuclear weapons. We have the weapons as deterrent. HM: Where did you get these [nuclear and chemical] weapons from? OBL: Go to the next question. HM: Demonstrations are being held in many European countries against American attacks on Afghanistan. Thousands of the protesters were non-Muslims. What is your opinion about those non-Muslim protesters? OBL: There are many innocent and good-hearted people in the West. American media instigates them against Muslims. However, some good-hearted people are protesting against American attacks because human nature abhors injustice. The Muslims were massacred under the UN patronage in Bosnia. I am ware that some officers of the State Department had resigned in protest. Many years ago the U.S. Ambassador in Egypt had resigned in protest against the policies of President Jimmy Carter. Nice and civilized [people] are everywhere. The Jewish lobby has taken America and the West hostage. HM: Some people say that war is no solution to any issue. Do you think that some political formula could be found to stop the present war? OBL: You should put this question to those [anti-Muslim crusaders] who have started this war. We are only defending ourselves. HM: If America got out of Saudi Arabia and the Al-Aqsa mosque was liberated, would you then present yourself for trial in some Muslim country? OBL: Only Afghanistan is an Islamic country. Pakistan follows the English Law. I don't consider Saudi Arabia an Islamic country. If the Americans have charges against me, we too have a charge sheet against them. HM: Pakistan government decided to cooperate with America after Sept. 11, which you don't consider right. What do you think Pakistan should have done but to cooperate with America? OBL: The government of Pakistan should have the wishes of the people in view. It should not have surrendered to the unjustified demands of America. America does not have solid proof against us. It just has some surmises. It is unjust to start bombing on the basis of those surmises. HM: Had America decided to attack Pakistan with the help of India and Israel, what would have we done? OBL: What has America achieved by attacking Afghanistan? We will not leave the Pakistani people and the Pakistani territory at anybody's mercy. We will defend Pakistan. But we have been disappointed by Gen. Pervez Musharraf. He says that the majority is with him. I say the majority is against him. Bush has used the word crusade. This is a crusade declared by Bush. It is no wisdom to barter off blood of Afghan brethren to improve Pakistan's economy. He [General Pervez Musharraf, the corrupt dictator, tyrant, terrorist, murderer, rapist, crook, criminal and human rights abuser] will be punished by the Pakistani people and Allah [God]. Right now a great war of Islamic history is being fought in Afghanistan. All the big powers are united against Muslims. It is sawab [spiritual reward from God] to participate in this war. HM: A French newspaper has claimed that you had kidney problem and had secretly gone to Dubai for treatment last year. Is that correct? OBL: My kidneys are all right. I did not go to Dubai last year. One British newspaper has published an imaginary interview with Islamabad dateline with one of my sons who lives in Saudi Arabia. All this is false. HM: Is it correct that a daughter of Mulla [Muhammad] Omar is your wife or your daughter is Mulla Omar's wife? OBL: (Laughs). All my wives are Arabs and all my daughters are married to Arab Mujahideen. I have spiritual relationship with Mulla Omar. He is a great and brave Muslim of this age. He does not fear anyone but Allah [God]. He is not under any personal relationship or obligation to me. He is only discharging his religious duty. I, too, have not chosen this life out of any personal consideration. [© 2001 The DAWN Group of Newspapers] -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4084 From: none Date: Fri Nov 9, 2001 8:36pm Subject: Re: Unauthorized entry into virtual space. You know you're in trouble when the FSB has higher ethical standards than your own law enforcement agensies. Stu Aimee Farr wrote: > > (Sorry for getting huffy.) > > RFE/RL Security Watch Vol. 2, No. 43, 6 November 2001. > --- > U.S. CASE AGAINST RUSSIAN HACKERS SAID ILLEGAL. The Chelyabinsk > regional office of the Federal Security Service (FSB) has concluded that > the American indictments of Russian hackers Vasilii Gorshkov and Aleksei > Ivanov for breaking into computer systems and stealing credit-card numbers > are illegal, "Chelyabinskii rabochii" reported on 1 November. The FSB > offices said that the methods employed by the U.S. law enforcement agencies > were "illegal and criminal," including what the FSB called "the > unauthorized entry into the virtual space of Chelyabinsk Oblast" in Russia. > --- > > ~Aimee > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4085 From: James M. Atkinson Date: Sat Nov 10, 2001 9:00am Subject: Shake Up at Largest Provider of Security for US Airports Shake Up at Largest Provider of Security for US Airports By DAVID FIRESTONE New York Times November 10, 2001 ATLANTA, Nov. 9 - Under fire for a lengthy series of lapses at airport checkpoints, Argenbright Security, the nation's largest airport security company, appointed a new chief executive today to replace its founder and overhaul its management and policies. It plans to improve training and weed out employees with criminal records. David Beaton, an executive at Securicor, Argenbright's British owner, was named to replace Frank A. Argenbright Jr., who built the company from a small polygraph operation in Atlanta in 1979 to one that has 40 percent of the nation's airport security business. Mr. Beaton said Mr. Argenbright was retiring as planned and declined to say whether the departure was related to the company's problems. Today's moves were clearly an effort to salvage the company's reputation - and stave off a federal takeover of the industry. They come at a time when Argenbright is being attacked almost daily by officials in Washington as a prominent example of the country's porous aviation security system, a concern reflected today in the Bush administration's calling up of yet more members of the National Guard to patrol airports. [Page B7.] The company also plans to increase the wages of its 7,000 checkpoint screeners - in some cases, to more than twice the minimum wage that many of them are now paid - and will hire a second screener to work at every X-ray machine that examines carry-on luggage. All screeners will have their backgrounds rechecked for criminal convictions, Mr. Beaton said, and new employees will receive 40 hours of classroom training instead of the 12 required by the Federal Aviation Administration. Company officials have acknowledged that supervisors in Philadelphia forged documents to allow people with criminal records to work as screeners, and frequently allowed workers to skip the federally required training and tests. Two Argenbright employees were fired in Chicago this week, accused of stealing knives carried by a passenger who was almost able to take them onto a plane. The Sept. 11 hijackers smuggled their box cutters past two company checkpoints. Attorney General John Ashcroft has accused the company of committing "an astonishing pattern of crimes," and this week Gov. Parris N. Glendening of Maryland criticized Southwest Airlines for hiring Argenbright to check passengers at Baltimore Washington International Airport. While not commenting on past problems, Mr. Beaton said it was time to bring Argenbright up to the higher standards of European airports. He said he intended to substantially reshape the company, hiring a new management team and imposing stricter standards, to meet the increased expectations of the public and the government. "Securicor purchased Argenbright last year as a company with a good reputation," Mr. Beaton said in an interview today. "One of the reasons we did so was to bring some of our expertise from elsewhere to the U.S. to improve the system here, to bring it up to the standards we've achieved in Europe." Some of the proposed changes could involve significant costs to the airlines, which pay companies like Argenbright for their security, as well as significant inconvenience to passengers. For example, the company plans to hand-search any bag that contains an item opaque to X- rays, and will automatically hand- search the luggage of any passenger carrying a suspicious item caught by a metal detector. Mr. Beaton said he knew the policies could increase waiting time at checkpoints but considered them important to achieve the government's zero-tolerance policy for airport threats. The move to increase wages to $9 to $13 an hour from the current average of about $6 may attract better workers and reduce turnover but it will almost certainly require a renegotiation of the company's contracts with the airlines, as will the hiring of a second screener at every X-ray machine. Mr. Beaton acknowledged that he would need the support of the airlines and said he hoped other security companies would follow Argenbright's lead. "We were slow in responding initially," he said, "but now we have put the accelerator down on this process, and we are pressing for this to be industrywide. We feel we should be judged by the quality of our service, not just the price." He said the company planned to search for a prominent law enforcement official to be in charge of its security policies and would also hire independent auditors and aviation security experts to monitor performance. A spokesman for the Air Transport Association, which represents the airline industry, said the group would not comment on the company's plans, and several airlines said it was too soon to have a response to today's moves. "We are studying the proposals now to see if they will be effective," said Christine T. Connelly, a spokeswoman for Southwest Airlines. But experts on the industry, as well as consumer groups, were skeptical that the proposals could be implemented by a single company, unless they are ordered by the federal government. "This is going to run up the price of their contracts with the airlines, and I doubt they'll go along with it," said Douglas R. Laird, former director of security for Northwest Airlines and now vice president of BGI International, an aviation consulting firm in Washington. "The security contracts are handled by the airlines' corporate procurement people, and their whole job is to push the price as low as possible," Mr. Laird said. He added that even in the current tense environment, he did not believe the airlines would break out of their financial competition to enhance security. Adam Goldberg, a policy analyst for Consumers Union, said Argenbright's history - which includes a broken promise that it would improve its standards after the incident in Philadelphia, in which the company was convicted of conspiring to avoid performing background checks - did not inspire confidence in its plans. And Governor Glendening, who said this week that Argenbright's presence in Baltimore could hurt the airport's reputation, said today he remained concerned about the company's abilities. "These proposals sound like improvements, but I think the fundamental issue of corporate profits is still there," Mr. Glendening said in an interview. "They're making these changes because of the high level of publicity they've received. But once that publicity is gone and they're no longer in the spotlight, there will still be a strong tendency for the airlines and security companies to reduce their costs, and make security a secondary priority." -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ [Non-text portions of this message have been removed] 4086 From: James M. Atkinson Date: Sat Nov 10, 2001 9:15am Subject: Bin Laden may have shipped nuclear bomb to US Ananova : Bin Laden may have shipped nuclear bomb to US Osama bin Laden may have already shipped weapons of mass destruction to the US. Pakistan's Frontier Post says the Al-Qaida network has transported nuclear, biological, and chemical weapons there. It claims at least two briefcases containing nuclear weapons may have reached US shores. The report says Pakistani and US investigators have been able to identify that at least one such weapon has been acquired by Al Qaida from Central Asian groups. The device of Russian origin, can be activated through a timer or cell phone command. It is an 8kg device that contains around 2kg of fissionable plutonium and uranium. Besides nuclear devices, a chemical and a biological weapon have also been identified to be in the hands of Al Qaida activists. They are said to be in possession of at least 70 capsules, also of Russian origin, containing a very lethal biological agent. Story filed: 11:22 Saturday 10th November 2001 -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4087 From: Date: Sat Nov 10, 2001 5:54am Subject: Cyber-security czar snubs ID plan, defends Govnet Cyber-security czar snubs ID plan, defends Govnet By Elinor Mills Abreu PALO ALTO, Calif., Nov 8 (Reuters) - As technology companies promote the idea of a national identification card, the president's special adviser on cyber-security said on Wednesday the idea has little support within the Bush administration. Richard Clarke said he couldn't name one official who supports the idea as proposed, although conceding that the administration doesn't yet have a formal position on the concept. "Everyone I've talked to doesn't think it's a good idea," Clarke said during a dinner speech hosted by Microsoft Corp. as part of its three-day Trusted Computing conference. The idea, raised in the wake of the Sept. 11 attacks, has drawn criticism from civil libertarians who say it would violate individual privacy. Despite those concerns, Larry Ellison of Oracle Corp. was the first to push ID cards, suggesting his company's database software should be used. Sun Microsystems Inc's Scott McNealy was next, and earlier on Wednesday Siebel Systems Inc. announced "Homeland Security" software. Clarke said it is not clear that the country needs to have a mandatory identity card, but suggested there might be a use for credit card-sized smart cards that contain data and microchips. Such cards could be used for specific actions such as boarding airplanes and crossing U.S. borders, he said. "Not one national ID card that we force everybody to have," but multiple, voluntary cards that could improve the efficiency of activities, Clarke added. GOVNET DEFENDED Clarke also defended the idea he proposed in mid-October for the government to consider creating a computer network, dubbed "Govnet," that is separate from the Internet and which would, as a result, be less vulnerable to malicious attacks. He described it as a set of departmental and agency "intranets," which use Internet technologies, that would run on leased fibre optic cable instead of passing through routers and switches connected to the Internet. "It would be impervious to even the most dangerous denial-of-service attack," he said. Denial-of-service attacks are designed to temporarily shut down Web servers or other equipment by bombarding them with so much junk traffic that they can't handle the load. Government employees would still use the Internet, but also have computers linked to Govnet on their desks for internal communications and critical operations, Clarke said. This might be particularly useful for work such as manned space flight and air traffic control, he added. In response to criticisms that a separate network would not be immune from viruses, he said it would at least get viruses "hours or days" after they hit computers on the Internet. Critics also have noted that Govnet couldn't prevent so-called "insider threats," employees who intentionally or inadvertently create security breaches, which make up about 40 percent of network break-ins, Clarke said. To minimise that risk the government could closely monitor employees and require them to use technologies to prove their identity and permission to access the system, he said. "If it turns out to be vastly expensive then we won't do it," Clarke said. "It's is not designed to be a silver bullet" that will solve all the government's cyber-security problems, he added. COST OF DOING BUSINESS Legislation to boost the powers of law enforcement in combating terrorism and the money being spent to provide more security for buildings and digital assets is the cost of doing business going forward, Clarke concluded. "We're paying more for security than we were six weeks ago," he said. "We now understand it is a cost of doing business." The economic costs so far have been trivial, "a few billion dollars," which is minor compared to what the cost could be without the security measures, Clarke noted. In addition to money spent, Americans are having to give up some of their freedoms to privacy. The USA Patriot Act signed into law two weeks ago gives authorities broader rights to tap phones and track Internet, e-mail and cell phone usage, among other things. Under a "sunset provision," certain provisions will expire in five years. "If the administration abuses the law in any way," Clarke said, "Then the law can be re-enacted. We haven't given up civil liberties and privacy." The new law will allow the government to find perpetrators more quickly than they have in the past, he said. In 1998 after the U.S. Air Force computer system was attacked right before the Gulf War, it took officials four days to get nine search warrants to investigate the case, he said. 03:18 11-08-01 4088 From: DrPepper Date: Sat Nov 10, 2001 0:19pm Subject: Re: Cyber-security czar snubs ID plan, Interesting, , , , , , , I thught we already HAD a national identification card , , It's called a Social Security card. How many of you have an actual SS _CARD_?? Or even remember when they were issued. Or remember when they were desireable and required just to get a job? I got mine when I was nine or ten years old. These days, they use them for a whole lot more than just SSC matters, , , , , , In any case, , , The USG will ALWAYS seek out and attempt to fill any area not currently filled. Much like filling a vacuum in nature. -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ================================== . mustardcon@a... wrote: > Cyber-security czar snubs ID plan, defends Govnet > > By Elinor Mills Abreu > > > PALO ALTO, Calif., Nov 8 (Reuters) - As technology companies promote the idea > of a national identification card, the president's special adviser on > cyber-security said on Wednesday the idea has little support within the Bush > administration. > > Richard Clarke said he couldn't name one official who supports the idea as > proposed, although conceding that the administration doesn't yet have a > formal position on the concept. > > "Everyone I've talked to doesn't think it's a good idea," Clarke said during > a dinner speech hosted by Microsoft Corp. as part of its three-day Trusted > Computing conference. > > The idea, raised in the wake of the Sept. 11 attacks, has drawn criticism > from civil libertarians who say it would violate individual privacy. > > Despite those concerns, Larry Ellison of Oracle Corp. was the first to push > ID cards, suggesting his company's database software should be used. Sun > Microsystems Inc's Scott McNealy was next, and earlier on Wednesday Siebel > Systems Inc. announced "Homeland Security" software. > > Clarke said it is not clear that the country needs to have a mandatory > identity card, but suggested there might be a use for credit card-sized smart > cards that contain data and microchips. Such cards could be used for specific > actions such as boarding airplanes and crossing U.S. borders, he said. > > "Not one national ID card that we force everybody to have," but multiple, > voluntary cards that could improve the efficiency of activities, Clarke > added. > [Non-text portions of this message have been removed] 4089 From: MIKE F Date: Sat Nov 10, 2001 1:16pm Subject: RE: Cyber-security czar snubs ID plan, I got mine sometime in my teens. I do know that some people did not get them. I mean to say they Purposely didn't get SS ID number. Even I,think thats too paranoid.,Not getting an SS number. mf --------------------------- lATER4,Mike Fiorentino Master Links 4 Master Investigators http://www.ml4mi.com e-mail: info@m... OR friindy@a... Cyber-security czar snubs ID plan, Interesting, , , , , , , I thught we already HAD a national identification card , , It's called a Social Security card. How many of you have an actual SS _CARD_?? Or even remember when they were issued. Or remember when they were desireable and required just to get a job? I got mine when I was nine or ten years old. These days, they use them for a whole lot more than just SSC matters, , , , , , In any case, , , The USG will ALWAYS seek out and attempt to fill any area not currently filled. Much like filling a vacuum in nature. -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 4090 From: DrPepper Date: Sat Nov 10, 2001 2:24pm Subject: Re: Cyber-security czar snubs ID plan, WELL, YOU ARE CORRECT, , , I KNOW OF ONLY ONE PERSON THAT PURPOSELY REFUSED TO GET A SSN. But I was refering to the ACTUAL card, itself, , , , , Sorry, I didn't mean to shout, , , , , , Ron C. =============================== MIKE F wrote: > I got mine sometime in my teens. > I do know that some people did not get them. > I mean to say they Purposely didn't get SS ID number. > Even I,think thats too paranoid.,Not getting an SS number. > mf > --------------------------- > lATER4,Mike Fiorentino > Master Links 4 Master Investigators > http://www.ml4mi.com > e-mail: info@m... > OR > friindy@a... > > Cyber-security czar snubs ID plan, > Interesting, , , , , , , > > I thught we already HAD a national identification card , , > It's called a Social Security card. > > How many of you have an actual SS _CARD_?? > Or even remember when they were issued. > Or remember when they were desireable and > required just to get a job? I got mine when I was nine > or ten years old. > > These days, they use them for a whole > lot more than just SSC matters, , , , , , > In any case, , , > > The USG will ALWAYS seek out and > attempt to fill any area not currently filled. > Much like filling a vacuum in nature. > > -- > Dr Pepper aka WB6GKI > in the High Desert of California. > Check out my LIVE Hamshack Cam at: > http://www1.iwvisp.com/DrPepper/ham/ham.htm -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 4091 From: MIKE F Date: Sat Nov 10, 2001 2:29pm Subject: FW: visualzone I would like to Report that I think Visualzone Works Very well with Zone alarm!! The Programs has XXX-CEEL-ANT Features,many of which I don't know how to use yet. If you have ZONE ALARM as one of your firewall or if it is your only firewall. I think you will like the Free visualzone The Above is MY not so humble Opinion;I could be Wrong.......Nah! __________The WebAttack.com FREE download-of-the-week______________ This weekís FREE download from http://www.webattack.com is called ìVisual Zoneî. Itís a plug-in for the very popular Zone Alarm program that does an intrusion analysis. It can help you know more about the information that Zone Alarm gathers when someone comes knocking on your cyber door. Get it at: http://www.webattack.com/get/visualzone.shtml --------------------------- lATER4,Mike F. --------------------------- lATER4,Mike Fiorentino Master Links 4 Master Investigators http://www.ml4mi.com 4092 From: MIKE F Date: Sat Nov 10, 2001 3:19pm Subject: Mac Security Mac Security http://www.macsecurity.org/ --------------------------- lATER4,Mike Fiorentino Master Links 4 Master Investigators http://www.ml4mi.com e-mail: friindy@a... 4093 From: Matthew Paulsen Date: Sat Nov 10, 2001 2:58pm Subject: RE: Unauthorized entry into virtual space. Just my $.02, but I guess it just depends on your point of view. Sometimes I have a hard time believing that foreign government agencies haven't ever bothered to try to enter any US based operations or associated systems in the last 40 years. This is more about marketing and less about ethics. The "I'm holier than thou" mantra doesn't hold too up to well under a candle when I see this sort of stuff. Sincerely, Matt Paulsen Out of work security systems engineer and enterprise systems architecture expert. Know any good jobs? Let me know. Will relocate. Can also spotlight. mpaulsen6@h... or 503-439-1397. -----Original Message----- From: none [mailto:skrone@h...] Sent: Friday, November 09, 2001 6:37 PM To: TSCM-L Mailing List Subject: Re: [TSCM-L] Unauthorized entry into virtual space. You know you're in trouble when the FSB has higher ethical standards than your own law enforcement agensies. Stu Aimee Farr wrote: > > (Sorry for getting huffy.) > > RFE/RL Security Watch Vol. 2, No. 43, 6 November 2001. > --- > U.S. CASE AGAINST RUSSIAN HACKERS SAID ILLEGAL. The Chelyabinsk > regional office of the Federal Security Service (FSB) has concluded that > the American indictments of Russian hackers Vasilii Gorshkov and Aleksei > Ivanov for breaking into computer systems and stealing credit-card numbers > are illegal, "Chelyabinskii rabochii" reported on 1 November. The FSB > offices said that the methods employed by the U.S. law enforcement agencies > were "illegal and criminal," including what the FSB called "the > unauthorized entry into the virtual space of Chelyabinsk Oblast" in Russia. > --- > > ~Aimee > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4094 From: Miguel Puchol Date: Sun Nov 11, 2001 6:08am Subject: RE: Cyber-security czar snubs ID plan, defends Govnet Well, I guess one byproduct of coming from a dictatorship is that every person in Spain gets a compulsory ID card, with photo, name, address and an individual number. You need this ID to pay with credit card, perform your normal banking activities, identify yourself before all official agencies, enter legal contracts, or even get a job. When you have it done, at your local police station (National Police, not local, the equivalent to the FBI), your fingerprints are taken, toghether with your photograph. If you do not carry this card with you, and you are asked by a law enforcement agency to identify yourself, you can get arrested and taken into custody until you can be positively identified - although this happens in extreme cases, when there are other suspicious circumstances. I really don't mind having this card, it proves who I am before anyone, and doesn't contain any private information about me, apart from my name, address and birth date. The old-style card had your fingerprints, blood group, and marital status, this has been taken out. If anyone wants details of the security features of this card, to avoid forgery, and how they have evolved, please let me know. All the best, Mike > PALO ALTO, Calif., Nov 8 (Reuters) - As technology companies > promote the idea > of a national identification card, the president's special adviser on > cyber-security said on Wednesday the idea has little support > within the Bush > administration. > > Richard Clarke said he couldn't name one official who supports > the idea as > proposed, although conceding that the administration doesn't yet have a > formal position on the concept. > > "Everyone I've talked to doesn't think it's a good idea," Clarke > said during > a dinner speech hosted by Microsoft Corp. as part of its > three-day Trusted > Computing conference. > > The idea, raised in the wake of the Sept. 11 attacks, has drawn criticism > from civil libertarians who say it would violate individual privacy. > > Despite those concerns, Larry Ellison of Oracle Corp. was the > first to push > ID cards, suggesting his company's database software should be used. Sun > Microsystems Inc's Scott McNealy was next, and earlier on > Wednesday Siebel > Systems Inc. announced "Homeland Security" software. > > Clarke said it is not clear that the country needs to have a mandatory > identity card, but suggested there might be a use for credit > card-sized smart > cards that contain data and microchips. Such cards could be used > for specific > actions such as boarding airplanes and crossing U.S. borders, he said. > > "Not one national ID card that we force everybody to have," but multiple, > voluntary cards that could improve the efficiency of activities, Clarke > added. > > GOVNET DEFENDED > > Clarke also defended the idea he proposed in mid-October for the > government > to consider creating a computer network, dubbed "Govnet," that is > separate > from the Internet and which would, as a result, be less vulnerable to > malicious attacks. > > He described it as a set of departmental and agency "intranets," > which use > Internet technologies, that would run on leased fibre optic cable > instead of > passing through routers and switches connected to the Internet. > > "It would be impervious to even the most dangerous > denial-of-service attack," > he said. Denial-of-service attacks are designed to temporarily > shut down Web > servers or other equipment by bombarding them with so much junk > traffic that > they can't handle the load. > > Government employees would still use the Internet, but also have > computers > linked to Govnet on their desks for internal communications and critical > operations, Clarke said. This might be particularly useful for > work such as > manned space flight and air traffic control, he added. > > In response to criticisms that a separate network would not be > immune from > viruses, he said it would at least get viruses "hours or days" > after they hit > computers on the Internet. > > Critics also have noted that Govnet couldn't prevent so-called "insider > threats," employees who intentionally or inadvertently create security > breaches, which make up about 40 percent of network break-ins, > Clarke said. > > To minimise that risk the government could closely monitor employees and > require them to use technologies to prove their identity and > permission to > access the system, he said. > > "If it turns out to be vastly expensive then we won't do it," > Clarke said. > "It's is not designed to be a silver bullet" that will solve all the > government's cyber-security problems, he added. > > COST OF DOING BUSINESS > > Legislation to boost the powers of law enforcement in combating > terrorism and > the money being spent to provide more security for buildings and digital > assets is the cost of doing business going forward, Clarke concluded. > > "We're paying more for security than we were six weeks ago," he > said. "We now > understand it is a cost of doing business." > > The economic costs so far have been trivial, "a few billion > dollars," which > is minor compared to what the cost could be without the security > measures, > Clarke noted. > > In addition to money spent, Americans are having to give up some of their > freedoms to privacy. > > The USA Patriot Act signed into law two weeks ago gives > authorities broader > rights to tap phones and track Internet, e-mail and cell phone > usage, among > other things. Under a "sunset provision," certain provisions will > expire in > five years. > > "If the administration abuses the law in any way," Clarke said, > "Then the law > can be re-enacted. We haven't given up civil liberties and privacy." > > The new law will allow the government to find perpetrators more > quickly than > they have in the past, he said. > > In 1998 after the U.S. Air Force computer system was attacked > right before > the Gulf War, it took officials four days to get nine search warrants to > investigate the case, he said. > > 03:18 11-08-01 > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4095 From: Mike Dever Date: Sun Nov 11, 2001 2:28am Subject: Routine TSCM Inspections I have a client (major defence contractor) who has asked me "what events should 'trigger' a TSCM inspection?" and "how frequently should inspections be carried out?" Normally, we do not recommend routine or regular inspections, however I would agree that inspections should be carried out before (and during) important meetings (where the risk warrants it) and after any suspicious events, such as an intrusion into the facility. I would appreciate any comments/ suggestions from the group. Regards Mike Dever CPP MIEEE Dever Clark & Associates Canberra Australia email: deverclark@b... 4096 From: Shawn Hughes Date: Sun Nov 11, 2001 0:07pm Subject: Re: Osama brand Nukes commenting on the Taliban press release: Here's the important part to remember..... >... says the Al-Qaida network has transported nuclear, biological, and >chemical weapons there. If I had nothing, this is what I would say, too. Look how people are reacting to the Anthrax situation. >It claims at least two briefcases containing nuclear weapons may have >reached US shores. > >It is an 8kg device that contains around 2kg of fissionable plutonium and >uranium. Without crossing lines, no one makes a mixed SNM mini-nuke. People in the proliferation arena have whispered about the much - hyped Russkie suitcase nuke for years. In the last 12+ years that I have kept up with it, no one has been able to come up with a picture. All the article is designed to do is to further terrorize people. If nuclear weapons could simply be bought from Russia, why did Iraq dump all that money into it's NWEP program, and still have zero to show for it? Why do Chinese weapons systems resemble ours, instead of the Russians (which, in earlier generations, resembled ours, but that's a different story.)? Bottom line, even though my career field is in weapons of mass destruction disposal, I am more worried about flu season than a backpack nuke. Regards from the exclusion area of Oak Ridge ( to bastardize a buddies' phrase , sorry Andy) Shawn 4097 From: Aimee Farr Date: Sun Nov 11, 2001 2:08pm Subject: RE: Unauthorized entry into virtual space. "The Force is what gives a Jedi his power. It's an energy field created by all living things. It surrounds us and penetrates us. It binds the galaxy together." --Ben to Luke, STAR WARS. ..."The Force" is offered to explain the legal concept of _*JURISDICTION*_. Yes, I found it tit-for-tat as far as the FBI's actions go, but... "I felt a great disturbance in the Force." --Ben I wonder if the FBI would have jurisdiction to operate _The Death Star_, presuming the advent of "transgalatic criminal networks." [FN1] When these "transgalatic criminals" run around *beeeeezt-beeeezt* vaporizing us, and infiltrating using the body snatcher-pod-people turning method, it would be an act of "domestic vaporizing," and "alien espionage," and a very long list of criminal acts, giving the FBI jurisdiction. The fact that our bodies are controlled by alien life forms wouldn't matter in terms of giving another agency jurisdiction. However, it would allow the FBI to secure a FISA order and congress would probably give them the NSA, NRO, etc. to carry it out. Since "transgalactic criminal networks" are immune to traditional weaponry, congress would probably give them the Pentagon and Star Wars, too. In response to the threat posed by "transgalatic crime," the FBI is likely to establish liaison offices on other planets. To do this, they will need space power and all manner of things. Congress would probably give them NASA and the Space Shuttles. These events, I believe, would usurp the jurisdiction of, well, EVERYBODY. As you can see by now, the multi-agency jurisdictional train wreck that will follow on the heels of the invasion by "transgalatic criminal networks" is likely to bring about the total destruction of Planet Earth, the rise of The Empire, and "The Dark Side." This is why we should all believe in the Force we call "jurisdiction," and seek a balance. Anything even remotely resembling a penetration into Russian airspace and a foreign surreptitious entry without liaison should be carefully evaluated in light of its possible effects on the Force. *Yoda voice imitation*.... "If once you start down the dark path, forever it will dominate your destiny." -- Yoda. [FN2] ~Aimee "She may not look like much, but she's got it where it counts, kid." --Han --- 1. That would be _ALIENS_ to most of us, but it would called "transgalatic criminal networks" in congressional hearings. 2. The Dark Path: It was... "totally biased and a disservice to our nation." 4098 From: David Watson Date: Sun Nov 11, 2001 4:30pm Subject: RE: Re: Osama brand Nukes 'The purpose of terrorism is to terrorise' Best wishes David David Lilburn Watson, Business Continuity and Risk Management Ltd. Please note new contact details below w.e.f 1/12/00 Boswarick House, 43, Farren Road, Forest Hill, London SE23 2DZ Tel: 020 8 265 0888 [International + 44 208 265 0888] Fax: 020 8 291 6010 [International + 44 208 291 6010] Registered in England No. 3403559 Registered Office: 21 St. Thomas Street, Bristol, BS16 6JS Internet communications are not secure and Business Continuity and Risk Management Ltd. does not accept legal liability for the integrity of the contents of this message. Notwithstanding the above, this email is confidential. The contents may not be disclosed or used by anyone other than the intended recipient. If you are not the intended recipient and receive this email, please immediately contact the sender at the above location. -----Original Message----- From: Shawn Hughes [mailto:srh@e...] Sent: 11 November 2001 18:07 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Osama brand Nukes commenting on the Taliban press release: Here's the important part to remember..... >... says the Al-Qaida network has transported nuclear, biological, and >chemical weapons there. If I had nothing, this is what I would say, too. Look how people are reacting to the Anthrax situation. >It claims at least two briefcases containing nuclear weapons may have >reached US shores. > >It is an 8kg device that contains around 2kg of fissionable plutonium and >uranium. Without crossing lines, no one makes a mixed SNM mini-nuke. People in the proliferation arena have whispered about the much - hyped Russkie suitcase nuke for years. In the last 12+ years that I have kept up with it, no one has been able to come up with a picture. All the article is designed to do is to further terrorize people. If nuclear weapons could simply be bought from Russia, why did Iraq dump all that money into it's NWEP program, and still have zero to show for it? Why do Chinese weapons systems resemble ours, instead of the Russians (which, in earlier generations, resembled ours, but that's a different story.)? Bottom line, even though my career field is in weapons of mass destruction disposal, I am more worried about flu season than a backpack nuke. Regards from the exclusion area of Oak Ridge ( to bastardize a buddies' phrase , sorry Andy) Shawn ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4099 From: Aimee Farr Date: Sun Nov 11, 2001 6:29pm Subject: Idea Wars: WTO climate [When you over-police innovation and achieve lock-in, competitors and countries are left with no choice. ~Aimee] http://www.nytimes.com/2001/11/11/business/11PROP.html?todaysheadlines=&page wanted=print November 11, 2001 Suddenly, 'Idea Wars' Take On a New Global Urgency By AMY HARMON As officials from around the world gather to discuss global trade in Doha, Qatar, this weekend, many are challenging one of the towering achievements of American industry during its economic boom years: an unprecedented expansion of intellectual property rights. ...... Due to extreme length, but worth a read. ------ 4100 From: Date: Mon Nov 12, 2001 1:12am Subject: Re: Routine TSCM Inspections 1. The fact that the client is a "major defense contractor", and therefore could be a target of a foreign government, should be enough to "trigger" a TSCM inspection. 2. Most businesses and corporations have a mind-set of "quarterly", as in the stock market. I would recommend "quarterly" inspections. Jack 4101 From: James M. Atkinson Date: Mon Nov 12, 2001 6:57am Subject: Re: Uncool. As list moderator I would gently point out that it is against the rules of this list to forward postings from this list to other groups and/or lists. I apologize for the member who breached list confidentiality. Please do not cross post. -jma At 12:17 AM -0600 11/8/01, Aimee Farr wrote: >Forwarding my comments to a publicly-googled mailing list strikes me as >uncool. Especially to THAT one, where I am the subject of misattribution, >defamation, debate, and "agent theory." Tim May is going to chew my ass into >the next decade now. > >I'm a strong supporter of dissent and privacy. That is why I research it. I >have a SPECIAL research interest in people that take advantage of online >forums, like "cypherpunks." (I do not use "nyms" out of respect for my >ethical rules -- I am a lawyer.) > >I'm sorry that I did not get the opportunity to know some of you better, so >you could attest to my character and confidentiality. Finally, if I have >abused the hospitality of this list, it was out of well-intentioned >ignorance. > >~Aimee > >> -----Original Message----- >> From: owner-cypherpunks@l... [mailto:owner-cypherpunks@l...]On >> Behalf Of Tim May >> Sent: Wednesday, November 07, 2001 1:39 AM >> To: cypherpunks@l... >> Subject: Re: Item from another list qouted without comment >> >> >> On Tuesday, November 6, 2001, at 10:27 PM, Dave Emery wrote: >> >> > ----- Forwarded message from Aimee Farr ----- >> > >> > Date: Tue, 6 Nov 2001 10:27:11 -0600 >> > From: "Aimee Farr" >> > Subject: [TSCM-L] *BOOM!* >> > To: "TSCM-L Mailing List" >> > >> > All the civil lib talk regarding sneak and peek is radicalizing fringe >> > groups and sensitizing them to countermeasures. Conversations of >> > checks...vid -- and I strongly suspect booby trap talk. (I have a >> > research >> > interest in groups under surveillance/impression of surveillance.) >> >> Yep, it looks like Agent Farr all right--I recognize her fractured, >> incomprehensible style. >> >> What is one to make of: "Conversations of >> checks...vid -- and I strongly suspect booby trap talk."? >> >> I wonder if Agent Farr chose one of the groups Bill Cooper was on as >> part of her "research"? >> >> > The only booby trap I recognize is a "water bra." I hope guys doing >> > surreptitious entry under increased surveillance powers are afforded >> > better >> > recognition training. No doubt some of you are important resources as to >> > these matters, and I hope that your expertise is being sought. >> >> Agent Farr wants "guys doing surreptitious entry" to have "better >> recognition training." >> >> Not surprising, but it ought to convince even the charitable amongst us >> who wanted to give "Aimee Farr" the benefit of the doubt that she/he is >> clearly advising LEOs. >> >> --Tim May >> "He who fights with monsters might take care lest he thereby become a > > monster. And if you gaze for long into an abyss, the abyss gazes also >> into you." -- Nietzsche > > >> -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4102 From: James M. Atkinson Date: Mon Nov 12, 2001 7:06am Subject: Re: MessageRX - info request I hate to have to tell you this, but "Secure Mail Services" are for the most part a hoax, and that using one is likely to create some unwarranted suspicions about someone using such account. There have been a number of cases where "naughty people" were using such services, and the entire customer list came under suspicion (ie: lost their security clearance, had to answer some awkward questions, etc). In the security business we have to be careful not to associate with know criminals, avoid contact with people engaging in questionable activities, and stay away from resources or products being used by same. -jma At 10:56 PM -0800 11/8/01, A.Lizard wrote: >MessageRX ( http://www.messagerx.com ) is a "secure" Web-based mailing >service that is *a lot* faster than hushmail, I'm thinking of switching >from hushmail to MessageRX for people I don't want to walk through the PGP >learning curve. > >I've been looking for reviews of the service written by people who know >something about crypto, all I can find is press releases and paragraphs in >various places summarizing the releases. > >Anybody know anything useful about the company? >thanks >A.Lizard -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4103 From: James M. Atkinson Date: Mon Nov 12, 2001 7:29am Subject: Re: Cyber-security czar snubs ID plan, defends Govnet The "ID Plan" is complete garbage, and would do little more then inflict a police state on the public. Personally, I would like to see law passed that requires a U.S. Passport for any kind of travel by commercial airline, trains, or bus. In cases where a U.S. Passport was not presented (such as in the case of a foreign national with a Foreign passport) the person would be subjected to a comprehensive security examination. I also feel that it is shear stupidity for airline screen to be done by private companies, and belive that screening for access to the "secure corridor" should strictly be done by federal law enforcement people or the military. Now, if the airlines want to have a secondary screening procedure right at the gate, just prior to boarding, then they could use private companies. Such a screening would ensure that carry-on bags were kept to a minimum, and would allow the plane to be boarded in an orderly fashion. Of course, I also feel that (properly trained and screened) U.S. Citizens should be able to carry conceal firearms on board the airplane, or pretty much take one anywhere in the counrty (as guaranteed by law). I would also prefer to have less flight attendants, and more security people on board. I mean if I want a snack on a flight I am probably just going to pack one in my carry-on baggage.... and when I want coffee I usually just walk to the galley and help myself anyway (and other passengers should do the same). Of course if I am flying first class I like the food, the wine, and the hot towel being brought to my seat by a perky flight attendant.. -jma At 11:54 AM -0500 11/10/01, mustardcon@a... wrote: >Cyber-security czar snubs ID plan, defends Govnet > >By Elinor Mills Abreu > > >PALO ALTO, Calif., Nov 8 (Reuters) - As technology companies promote the idea >of a national identification card, the president's special adviser on >cyber-security said on Wednesday the idea has little support within the Bush >administration. > >Richard Clarke said he couldn't name one official who supports the idea as >proposed, although conceding that the administration doesn't yet have a >formal position on the concept. > >"Everyone I've talked to doesn't think it's a good idea," Clarke said during >a dinner speech hosted by Microsoft Corp. as part of its three-day Trusted >Computing conference. > >The idea, raised in the wake of the Sept. 11 attacks, has drawn criticism >from civil libertarians who say it would violate individual privacy. > >Despite those concerns, Larry Ellison of Oracle Corp. was the first to push >ID cards, suggesting his company's database software should be used. Sun >Microsystems Inc's Scott McNealy was next, and earlier on Wednesday Siebel >Systems Inc. announced "Homeland Security" software. > >Clarke said it is not clear that the country needs to have a mandatory >identity card, but suggested there might be a use for credit card-sized smart >cards that contain data and microchips. Such cards could be used for specific >actions such as boarding airplanes and crossing U.S. borders, he said. > >"Not one national ID card that we force everybody to have," but multiple, >voluntary cards that could improve the efficiency of activities, Clarke >added. > >GOVNET DEFENDED > >Clarke also defended the idea he proposed in mid-October for the government >to consider creating a computer network, dubbed "Govnet," that is separate >from the Internet and which would, as a result, be less vulnerable to >malicious attacks. > >He described it as a set of departmental and agency "intranets," which use >Internet technologies, that would run on leased fibre optic cable instead of >passing through routers and switches connected to the Internet. > >"It would be impervious to even the most dangerous denial-of-service attack," >he said. Denial-of-service attacks are designed to temporarily shut down Web >servers or other equipment by bombarding them with so much junk traffic that >they can't handle the load. > >Government employees would still use the Internet, but also have computers >linked to Govnet on their desks for internal communications and critical >operations, Clarke said. This might be particularly useful for work such as >manned space flight and air traffic control, he added. > >In response to criticisms that a separate network would not be immune from >viruses, he said it would at least get viruses "hours or days" after they hit >computers on the Internet. > >Critics also have noted that Govnet couldn't prevent so-called "insider >threats," employees who intentionally or inadvertently create security >breaches, which make up about 40 percent of network break-ins, Clarke said. > >To minimise that risk the government could closely monitor employees and >require them to use technologies to prove their identity and permission to >access the system, he said. > >"If it turns out to be vastly expensive then we won't do it," Clarke said. >"It's is not designed to be a silver bullet" that will solve all the >government's cyber-security problems, he added. > >COST OF DOING BUSINESS > >Legislation to boost the powers of law enforcement in combating terrorism and >the money being spent to provide more security for buildings and digital >assets is the cost of doing business going forward, Clarke concluded. > >"We're paying more for security than we were six weeks ago," he said. "We now >understand it is a cost of doing business." > >The economic costs so far have been trivial, "a few billion dollars," which >is minor compared to what the cost could be without the security measures, >Clarke noted. > >In addition to money spent, Americans are having to give up some of their >freedoms to privacy. > >The USA Patriot Act signed into law two weeks ago gives authorities broader >rights to tap phones and track Internet, e-mail and cell phone usage, among >other things. Under a "sunset provision," certain provisions will expire in >five years. > >"If the administration abuses the law in any way," Clarke said, "Then the law >can be re-enacted. We haven't given up civil liberties and privacy." > >The new law will allow the government to find perpetrators more quickly than >they have in the past, he said. > >In 1998 after the U.S. Air Force computer system was attacked right before >the Gulf War, it took officials four days to get nine search warrants to >investigate the case, he said. > >03:18 11-08-01 -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4104 From: James M. Atkinson Date: Mon Nov 12, 2001 7:58am Subject: Re: Routine TSCM Inspections At 7:28 PM +1100 11/11/01, Mike Dever wrote: >I have a client (major defence contractor) who has asked me "what events >should 'trigger' a TSCM inspection?" and "how frequently should >inspections be carried out?" > >Normally, we do not recommend routine or regular inspections, however I >would agree that inspections should be carried out before (and during) >important meetings (where the risk warrants it) and after any suspicious >events, such as an intrusion into the facility. > >I would appreciate any comments/ suggestions from the group. > >Regards > >Mike Dever CPP MIEEE >Dever Clark & Associates >Canberra Australia >email: deverclark@b... A TSCM inspection is of greatest value when the spy may actually be listening. With this in mind the best time for a TSCM service is just prior to and during meetings where information will be discussed which could be on value to the eavesdropper. The only problem is that TSCM inspections have to be part of a comprehensive security plan, and should be performed on a periodic basis as "waiting for to the last moment" and then scrambling to have a sweep done is dangerous. The TSCM specialist needs to get into the facility on a regular basis WELL IN ADVANCE of there being a specific need for their services for a "live sweep" at least to create some kind of benchmarks for future sweeps (it's called creating a "Sweep Record"). This way when a sweep is needed at some future date the TSCM tech knows where all the phone rooms are, knows the kinds of phones, and knows what to expect on the RF environment. This "Sweep Record" can be update on a quarterly basis, and while it is not in and of itself a full and comprehensive sweep it does include many of the measurements and observations required during a sweep. For example, during a recurring sweep for a "Sweep Record" I prefer not to "toss-a-room", and perform only a cursory physical inspection, don't use a NLJD, and do absolutely nothing that could even remotely be considered alerting. I check out the IDF and MDF visually for any kind of extra jumpers, check the door hardware, etc. I also profile the RF environment (from outside the building), and generally do everything I can to keep a low profile and keep out of site (but be able to detect most RF based threats). Basically it is me, a briefcase, a Polaroid camera, and a flashlight. That said I do have customers who insist on a full bore TSCM sweep every 60-90 days, and while I don't encourage such a frequency their specific situations make it wise. Try to get in to at least SEE your client every 90 days and perform a recurring vulnerability analysis or update their "sweep record" (if not at least a partial sweep), and during "special times" where they actually order such drag in all your equipment for a full sweep. -jma -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4105 From: MIKE F Date: Mon Nov 12, 2001 8:34am Subject: A plane went down near queens New York. A plane went down near queens New York. Not sure if its an accident or worse! later4,mike f --------------------------- lATER4,Mike Fiorentino Master Links 4 Master Investigators http://www.ml4mi.com e-mail:friindy@a... OR info@m... "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or Confidential. The information is intended for use only by the individual(s)or entity named/indicated above.If you are the identified/intended recipient, be aware that (Unless you seek Permission.) any disclosure, COPYING, DISTRIBUTION,& or use of the contents of this Message/Information is Prohibited! 4106 From: Marcel Date: Mon Nov 12, 2001 9:06am Subject: Re: A plane went down near queens New York. 767 CRASHES IN QUEENS, NY- AMERICAN AIRLINES FLIGHT-587 JFK WCBS-NY HAS COVERAGE PLANE CRASHED APPROX BEACH 129ST & NEWPORT AVE. BUILDINGS ON FIRE MIKE F wrote: > A plane went down near queens New York. > Not sure if its an accident or worse! > later4,mike f > > --------------------------- > lATER4,Mike Fiorentino > Master Links 4 Master Investigators > http://www.ml4mi.com > e-mail:friindy@a... > OR > info@m... > > "CONFIDENTIALITY WARNING" > This electronic message contains information which may be privileged and/or > Confidential. The information is intended for use only by the > individual(s)or entity named/indicated above.If you are the > identified/intended > recipient, be aware that > (Unless you seek Permission.) > any disclosure, COPYING, DISTRIBUTION,& or use of the contents of this > Message/Information is Prohibited! > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 4107 From: MIKE F Date: Mon Nov 12, 2001 9:26am Subject: Air Space Closed around NEw York,bridges ,tunnels Closed!!!!! Airports Closed as are the All Tunnels & Bridges closed that go into New York City. A plane an airbus went down in Queens. --------------------------- lATER4,Mike Fiorentino Master Links 4 Master Investigators http://www.ml4mi.com e-mail:friindy@a... OR info@m... "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or Confidential. The information is intended for use only by the individual(s)or entity named/indicated above.If you are the identified/intended recipient, be aware that (Unless you seek Permission.) any disclosure, COPYING, DISTRIBUTION,& or use of the contents of this Message/Information is Prohibited! 4108 From: MIKE F Date: Mon Nov 12, 2001 9:37am Subject: Concerning COMPUTER FORENSICS question HASH SETS Even though more people have Lost their Lives & Other Lives are Ruined. After a Moment of Reflection,I felt that I must Keep Going. I can't Just Worry & Imagine the Worst <===BAD JU JU We Must Keep Going......... ON THE ABoVE NOTE ..here I go............................... ---------------------------------------------------------------------------- --------------------------------------- A few People have asked me certain question Concerning COMPUTER FORENSICS. One Question that I am Always asked is HASH SETS. Well thanks to folks at Guidance Software,Here is the explanation,Much ,much Better than me trying to explain them! http://www.encase.com/html/hashsets_wp.pdf Super XXX-CELL-ANT RESOURCES http://www.encase.com/html/cf_resources.htm later4,mike f. --------------------------- lATER4,Mike Fiorentino Master Links 4 Master Investigators http://www.ml4mi.com e-mail:friindy@a... OR info@m... "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or Confidential. The information is intended for use only by the individual(s)or entity named/indicated above.If you are the identified/intended recipient, be aware that (Unless you seek Permission.) any disclosure, COPYING, DISTRIBUTION,& or use of the contents of this Message/Information is Prohibited! 4109 From: MIKE F Date: Mon Nov 12, 2001 10:19am Subject: New hashing tool released This JUST Posted on Computer Forensics list. later4,mike f. ============================================================================ ============================================ I've posted a CLI version of my Hasher file hashing tool at my site: http://patriot.net/~carvdawg/perl.html D/L the hash.zip archive and unzip all files into the same directory. Pass the tool either a file or directory as an argument. If you pass a dir, it returns MD5 and SHA1 hashes for all of the files in the directory. Comments are welcome and appreciated. Carv --------------------------- lATER4,Mike Fiorentino Master Links 4 Master Investigators http://www.ml4mi.com e-mail:friindy@a... OR info@m... "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or Confidential. The information is intended for use only by the individual(s)or entity named/indicated above.If you are the identified/intended recipient, be aware that (Unless you seek Permission.) any disclosure, COPYING, DISTRIBUTION,& or use of the contents of this Message/Information is Prohibited! 4110 From: A Grudko Date: Mon Nov 12, 2001 2:55am Subject: Re: Routine TSCM Inspections - Original Message - > Normally, we do not recommend routine or regular inspections, however I > would agree that inspections should be carried out before (and during) > important meetings (where the risk warrants it) and after any suspicious > events, such as an intrusion into the facility. 95% of our clients want ad hoc sweeps but a few with a perceived higher risk want regular (but random dates) sweeps. We are happy to do so and try to group them together to reduce travel and overheads, and offer a discount (about 30%) of our usual fees. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigation Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4111 From: A Grudko Date: Mon Nov 12, 2001 4:04am Subject: Re: Re: Osama brand Nukes - Original Message - > 'The purpose of terrorism is to terrorise' I agree with David and Shawn, but isn't this a business oportunity? Whatever happened to all those bomb shelters that were built for the Cuban Misile Chrisis? How about a Multi Purpose Underground Shelter? Built underground it would double as a surveillance free zone and Faraday Cage in times of peace, perfect for all those meetings that you need to keep secret from the NWO. You could also market the MPUS around Roslyn (sp?) to reduce the rate of alien abduction. Farmers could keep their cows in them to protect them from alien mutilation. Right wingers could keep their weapons cashes well hidden (and if they self-detonate their IODs the neighbours are protected). Witches and Warlocks could conduct their rituals away from the cameras of 60 minutes. And I know that Elvis lives in a pyramid MPUS, the energy of which has preserved his boyish good looks... I think too many reporters watched that movie - was it 'Peacemaker'? - with the backpack TND and give such claims little credability. I would be more concerned by Binladen's statement 11/11 that 'we know nothing about Anthrax'. If you want to know the truth, ask a politician a question and reverse his answer. Always remember Grudko's Law: 'The only time a politician is not lying is when he is telling you a half truth' Andy 'Read my lips - no new taxes' Grudko (Who did coin that phrase? :-) ) From: James M. Atkinson Date: Wed Nov 10, 2004 7:11am Subject: AR 381-14 U.S. Army Technical Surveillance Countermeasures Program I have had a number of folks ask about getting a copy of AR 381-14, so I have uploaded a redacted copy to my site. The amazing thing about the document is that 80%+ of the redacted/censored paragraphs are not marked as classified in other TSCM documents from other agencies (ie: The Marine Corp. Policy where the classified content of THIS document are laid out word for word in an unclassified version). It's appears as though the authors of AR 381-14 flagged only the items that could embarrass command grade officer and classified those elements of the documents for political purposes more than anything else.. You can find it at, or link to it at: http://www.tscm.com/pdf/AR381-14c.pdf The document is a good starting point for any company that is drawing up a corporate TSCM policy, and just needs some general guidance. Of course any corporate TSCM policy guide must also contain explicit technical parameters, and several "strong" statements or affirmations of managements dedication to the subject matter. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10076 From: dj Date: Wed Nov 10, 2004 9:02am Subject: Government publications Out of everything I have read in the DOD on tscm there aren't a lot of good material. Nothing that someone with a little knowledge could write themselves. I feel like the policies and directives are bland. Sort of like the analogy to go from one side of the yard to the other you have to travel. But none of them tell you how to travel. That is what is learned at the school part of TSCM work. All the directives classified and not class haven't impressed me by any means. Also the fact that the gov. seriously cut the military tscm program many years ago causes me to believe that the military seriously thinks that there is not that big of a threat anymore... ha... wait till someone gets caught with their pants down. --------------------------------- Do you Yahoo!? Check out the new Yahoo! Front Page. www.yahoo.com [Non-text portions of this message have been removed] 10077 From: savanted1 Date: Wed Nov 10, 2004 9:12am Subject: Network-centric Military Communications The November issue of IEEE Communications Magazine devotes a special feature to network-centric military communications. According to the issue's editors, the dynamics of military information flow, which lay atop an infrastructure that is relatively unreliable and time- varying in both location and topology, demand the development of new areas in network theory. The editors have selected a collection of papers that illustrate the unique operational requirements and technological needs of the military challenge. The guest editorial on the topic is now accessible to all readers at: http://www.comsoc.org/livepubs/ci1/public/2004/nov/index.html> 10078 From: Date: Wed Nov 10, 2004 9:14am Subject: Re: Microphones and internet A local police department suspects someone of putting a hidden microphone in a room and accesses the audio via the internet (the room has a computer connected to the internet). If this was the case, how would the bad guy do it? Software covertly installed on the computer? What would you look for physically (other than a microphone, of course)? Sgt. Kirk Sewell Illinois State Police, Technical Investigations 500 Iles Park Place, Suite 300 Springfield, IL 62718 (217) 524-6079 office (217) 467-4211 pager (217) 836-0919 mobile 10079 From: Thomas Shaddack Date: Wed Nov 10, 2004 0:07pm Subject: Re: Re: Microphones and internet That depends on the skillset of the adversary. There must be the software component; the object that takes data from the soundcard input, sends them through the codec, then streams them over the Net. Here I presume it is a Windows PC, though the principle is the same for unixes too. A low-threat beginner-grade system can be revealed in the same way spyware is being checked for; examine the process table, identify running processes, eliminate the friendly ones, see the hostile one. Beware, it is possible to hide a process from the process list (often used by more advanced rootkits), so a negative result here doesn't necessarily mean the machine is clean. You may also like to check what processes are run at the machine's startup. A clever adversary may attach the program to an existing legitimate file, for which you need to check the checksums of the system files (few people usually bother, except in high-security scenarios). Check what processes listen on what sockets (netstat or other utilities), check what connections are open. Again, eliminate the friendly ones and examine the rest. If the computer shouldn't have any activity on its own, its communication line should be quiet (except occassional software auto-update, common for Windows and antivirus engines). There are two methods such software can be accessed: network-originated, where the program listens on a port and awaits connection, and target-originated, where the program itself opens a connection to an adversary-controlled system, either directly streaming the audio there, or just waiting for commands (in the second case it is common to use the network of IRC servers to hide the adversary's own address; this is common for commanding "botnets" for DDoS attacks or spamming). Firewalls protect from the unwanted connections from the outside, but protection against connections initiated from the target itself depends on the fw configuration (in most cases, connections from LAN to the Net are permitted - only higher security settings usually have access to the Outside forced through a proxy - and even that can be pierced, either by tunneling through HTTPS CONNECT, which can be detected from the proxy logs, or by using more advanced techniques like eg. DNS tunneling (if DNS resolving of the outside addresses is allowed). Basically, if something can go through, anything can - just take the anything you want, split it to pieces of suitable size, wrap it into the something that is permitted to go, and send it out. A compromise between security and comfort can be setting up the firewall to allow the machines to directly connect outside, but log such attempts. From the position of a server/firewall-based monitoring, audio bugs have one advantage - they produce more or less continual stream of data, in quite high volumes, and should be relatively easy to see if you know what to look for. Again, a clever adversary can mask the traffic like something else, but the raw volume can't be easily disguised, and while large volumes of inbound data are common for autoupdates, large volumes of outbound data can be suspicious. (Beware, the software can record the conversation to files and then send the entire day worth of eavesdropping in one transaction.) So, in sum, check for processes that shouldn't be there, check for open and listening network sockets that shouldn't be there, and check for TCP/IP communication that shouldn't be there. Does it help? On Wed, 10 Nov 2004 sewellr@i... wrote: > A local police department suspects someone of putting a hidden microphone > in a room and accesses the audio via the internet (the room has a computer > connected to the internet). If this was the case, how would the bad guy do > it? Software covertly installed on the computer? What would you look for > physically (other than a microphone, of course)? > > Sgt. Kirk Sewell > Illinois State Police, Technical Investigations > 500 Iles Park Place, Suite 300 > Springfield, IL 62718 > (217) 524-6079 office > (217) 467-4211 pager > (217) 836-0919 mobile > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10080 From: Blake Bowers Date: Wed Nov 10, 2004 1:25pm Subject: Re: Re: Microphones and internet The biggest clue is the connection between the microphone and the computer. The microphone could be hidden inside the computer, monitor, or printer, so that the wiring to the microphone would be easy to hide from the outside, or it could be hidden elsewhere, and connected back either via hard wire, or via wireless. Either way, there has to be something connecting them. ----- Original Message ----- From: To: Cc: "TSCM-L" Sent: Wednesday, November 10, 2004 9:14 AM Subject: [TSCM-L] Re: Microphones and internet > > > > > > > A local police department suspects someone of putting a hidden microphone > in a room and accesses the audio via the internet (the room has a computer > connected to the internet). If this was the case, how would the bad guy > do > it? Software covertly installed on the computer? What would you look for > physically (other than a microphone, of course)? > > Sgt. Kirk Sewell > Illinois State Police, Technical Investigations > 500 Iles Park Place, Suite 300 > Springfield, IL 62718 > (217) 524-6079 office > (217) 467-4211 pager > (217) 836-0919 mobile > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 10081 From: Jan Vandenbos Date: Wed Nov 10, 2004 4:07pm Subject: Re: Re: Microphones and internet Lots of comments out there on the web and discussion in the past on this topic... Ie: http://www.landfield.com/isn/mail-archive/1999/Apr/0036.html First things I'd check (Basic I know, but important) - also this is all assuming this is windows... (If its on a unix/Linux variant machine I can send instructions for that too) 1) Start->Run->Control Panel->Add/Remove Programs - and look for programs that you don't recognize. 2) Bring up the Task manager (differs depending on your version of windows), and look under the Processes tab for unusual program. If you search for each program name on the Internet there are many sites that identify these programs for you and you can check which should be there or not. 3) Check the startup group (Start->Programs->Startup), and also the Windows Registry sections 'Run', 'Run Once', 'Run Service', etc... for strange programs. An easy way to do this is to grab 'Startup Mechanic' off http://www.download.com or similar site. Startup mechanic will list all the programs set to start when the computer boots, and will give you a starting place to look for malicious software. 4) Go to the command prompt (Start->Run->CMD) and type in 'netstat -a'. Unless malicious software has done a good job in hiding itself - you should see some trace at least in the netstat -a. FWIW, the Netstat -a shows a list of all the network connections on the host. If someone were listening full time with some kind of remote mic activiation software, you'd probably see a live connection to their IP address in that list (you might have to go through each one and find out which ones are suspicious). If you want, send me the output of that 'netstat -a' command direct via email and I can share thoughts on what looks suspicious. Assuming on the other hand that any purported malicious software was installed and was capable of hiding itself, another good way would be to plug a 'network sniffer' in between the machine in question and the Internet (use a hub, not a switch if you're doing this - I can explain why offline if you need). Look at the traffic going back and forth between that machine and other hosts on the Internet and see if any of the traffic looks suspicious. Start with the machine idle. You'll probably see a fair bit of traffic anyways (instant messaging and other network keep alive traffic), but it'll make it easier to single out suspicious traffic. Hope that helps... If you need more detail, feel free to drop me a note offline. Jan --- sewellr@i... wrote: > > > > > > A local police department suspects someone of > putting a hidden microphone > in a room and accesses the audio via the internet > (the room has a computer > connected to the internet). If this was the case, > how would the bad guy do > it? Software covertly installed on the computer? > What would you look for > physically (other than a microphone, of course)? > > Sgt. Kirk Sewell > Illinois State Police, Technical Investigations > 500 Iles Park Place, Suite 300 > Springfield, IL 62718 > (217) 524-6079 office > (217) 467-4211 pager > (217) 836-0919 mobile > > > > > 10082 From: James M. Atkinson Date: Wed Nov 10, 2004 5:20pm Subject: Steve Wilson Update I understand that the Federal government has Steve Wilson on the move again, and that they may be moving him from his cell at the Sheriffs department (where he has been kept on ice since this Spring) to a more long term prison now that the "harvest season" is coming to an end... and all just in time for Thanksgiving. http://inmateloc.bop.gov/locatorservlet/gov.bop.inmatelocator.FindInmateHttpServlet?Indiv=1&Index=3&Indiv=-1&MiddleName=&Results=ALL&SearchType=NAME&LastName=Wilson&FirstName=Stephen&Gender=U&Race=U&Age=&DateOfBirth= Wilson was one of the TSCM folks who got busted this Spring for trafficking in narcotics, and turned government informant in exchange for not spending 30+ years in prison (he got 5 years instead). -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10083 From: Hawkspirit Date: Wed Nov 10, 2004 6:35pm Subject: Sweep Needed Office sweep needed in Fairfield Connecticut. Roger Tolces Electronic Security www.bugsweeps.com [Non-text portions of this message have been removed] 10084 From: Jan Vandenbos Date: Wed Nov 10, 2004 5:21pm Subject: Re: Re: Microphones and internet (Part 2) Btw, this is all assuming the recorded conversations are leaving the machine over the net in some fashion or another. I'd also do a search (using a forensic tool, or something like Agent Ransack (again, http://www.download.com) and look for files with the following extensions .au, .wav, .mp3, .aa, .ra, .ram., ... I'd also search inside archive files (like .zip, .rar). This is still not guaranteed, since recording software might be using its own internal mechanisms for encoding/storing the audio streams. If the 'recording' software is storing the recorded audio on the local hard drive (rather than a live connection over the net), then there will need to be some way for the perp to pull the data off the system either: 1) The perp has physical access to the machine - probably on a somewhat regular basis 2) The system/malicious monitoring software transmits the audio files on a regular basis (ie. via email or other batch network job) 3) The perp has remote access to the machine to get access to the files. As a side note - Microphones on PC's concern me (especially considering the prevalence of microphones in laptops and PDA's these days), but I'm also concerned about cameras/webcams plugged into computers. One would imagine it wouldn't be a difficult effort to distribute software that turned on web cameras as well as Microphones on machines one wanted to monitor. Jan --- Jan Vandenbos wrote: > > Lots of comments out there on the web and discussion > in the past on this topic... > > Ie: > > http://www.landfield.com/isn/mail-archive/1999/Apr/0036.html > > First things I'd check (Basic I know, but important) > - > also this is all assuming this is windows... (If its > on a unix/Linux variant machine I can send > instructions for that too) > > 1) Start->Run->Control Panel->Add/Remove Programs - > and look for programs that you don't recognize. > > 2) Bring up the Task manager (differs depending on > your version of windows), and look under the > Processes > tab for unusual program. If you search for each > program name on the Internet there are many sites > that > identify these programs for you and you can check > which should be there or not. > > 3) Check the startup group > (Start->Programs->Startup), > and also the Windows Registry sections 'Run', 'Run > Once', 'Run Service', etc... for strange programs. > An > easy way to do this is to grab 'Startup Mechanic' > off > http://www.download.com or similar site. Startup > mechanic will list all the programs set to start > when > the computer boots, and will give you a starting > place > to look for malicious software. > > 4) Go to the command prompt (Start->Run->CMD) > and type in 'netstat -a'. > > Unless malicious software has done a good job in > hiding itself - you should see some trace at least > in > the netstat -a. > > FWIW, the Netstat -a shows a list of all the network > connections on the host. If someone were listening > full time with some kind of remote mic activiation > software, you'd probably see a live connection to > their IP address in that list (you might have to go > through each one and find out which ones are > suspicious). > > If you want, send me the output of that 'netstat -a' > command direct via email and I can share thoughts on > what looks suspicious. > > Assuming on the other hand that any purported > malicious software was installed and was capable of > hiding itself, another good way would be to plug a > 'network sniffer' in between the machine in question > and the Internet (use a hub, not a switch if you're > doing this - I can explain why offline if you need). > > > Look at the traffic going back and forth between > that > machine and other hosts on the Internet and see if > any > of the traffic looks suspicious. > > Start with the machine idle. You'll probably see a > fair bit of traffic anyways (instant messaging and > other network keep alive traffic), but it'll make it > easier to single out suspicious traffic. > > Hope that helps... If you need more detail, feel > free > to drop me a note offline. > > Jan > > --- sewellr@i... wrote: > > > > > > > > > > > > > A local police department suspects someone of > > putting a hidden microphone > > in a room and accesses the audio via the internet > > (the room has a computer > > connected to the internet). If this was the case, > > how would the bad guy do > > it? Software covertly installed on the computer? > > What would you look for > > physically (other than a microphone, of course)? > > > > Sgt. Kirk Sewell > > Illinois State Police, Technical Investigations > > 500 Iles Park Place, Suite 300 > > Springfield, IL 62718 > > (217) 524-6079 office > > (217) 467-4211 pager > > (217) 836-0919 mobile > > > > > > > > > > > > > > > 10085 From: satcommunitfive Date: Wed Nov 10, 2004 7:08pm Subject: Re: Microphones and internet All you need is a free voip software[voice of IP] and run the server like speakfreely -its all done 4u you could even have netmeeting on `auto answer` ! http://www.speakfreely.org/ bewell 10086 From: Date: Thu Nov 11, 2004 9:14pm Subject: Re: Re: suggestions on a portable USB .... Have you ever found anything in the HPA in a real-world situation? Do you know of anyone who has? There are lots of shenannigans that can happen there, but I haven't talked to anyone yet that found a modified HPA "in the wild" so to speak (e.g. modified geometry). ...... Original Message ....... On Mon, 18 Oct 2004 05:39:05 -0700 (PDT) DATA_4N6_Engineering wrote: > > >USB is microprocessor intensive, firewire is not. I have tested most of the write blocker units and have found the throughput for USB to be unsatisfactory. I only use write blockers designed and based on NIST standards for SCSI and IDE drives including Raid. I have a firewire write blocker and it's throughput is much faster than my USB unit. I try to image all drives in their native interface. I really don't like firewire or USB write blockers. If I have to go to DOS on some occasions, my write blockers are easy to implement, and I don't have to worry about special drivers for USB and Firewire. I have found many incompatibilities with USB and firewire units, and if you have to preview a drive, you will never be able to view the HPA with USB or Firewire write blocks. With my write blocks and portable machine I can be assured of compatibility for any drive, except possible for RLL and MFM and I haven't seen any of those for a while, although I do keep a controller card around > just in case. > > >Jon Asdourian >Data Forensics Engineering > > > >telos888@y... wrote: >Wonder why everything out there is Firewire instead of USB 2.0. USB 2.0 >has a higher throughput than 1394a doesn't it (480 Mbp/s vs 400 Mbp/s)? > > >...... Original Message ....... >On Sat, 16 Oct 2004 12:37:24 -0700 (PDT) Steve Sanchez >wrote: >>Message: 2 >> Date: Fri, 15 Oct 2004 20:41 -0400 >> From: telos888@y... >>Subject: Re: Re: Review: An Evidence Collection Device >> >>Any suggestions on a portable USB or Firewire >>write-blocker in that >>$200 >>range? >> >> >>Hi, >> >>Try Firefly from http://www.digitalintel.com >> >>Excellent product and cheap too! >> >>Steve >> >>__________________________________________________ >>Do You Yahoo!? >>Tired of spam? Yahoo! Mail has the best spam protection around >>http://mail.yahoo.com >>. >> > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > >It is by caffeine alone I set my mind in motion. >It is by the juice of Star Bucks that thoughts acquire speed, >the hands acquire shaking, the shaking is a warning. >It is by caffeine alone I set my mind in motion. >=================================================== TSKS > > >Yahoo! Groups SponsorADVERTISEMENT > > >--------------------------------- >Yahoo! Groups Links > > To visit your group on the web, go to: >http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: >TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > > > > > >Jon Asdourian >61 356B Red Porsche Coupe >69 Red MGC GT >63 Burgundy Austin Healey 3000 BJ7 >356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC > >--------------------------------- >Do you Yahoo!? >vote.yahoo.com - Register online to vote today! > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > >. > 10087 From: Mitch D Date: Thu Nov 11, 2004 2:32am Subject: Cisco Phone System Info Looking for exploit info on Cisco VOIP phones systems Thanks md __________________________________ Do you Yahoo!? Check out the new Yahoo! Front Page. www.yahoo.com 10088 From: DATA_4N6_Engineering Date: Thu Nov 11, 2004 7:11am Subject: Re: Re: suggestions on a portable USB .... I have seen drives that use HPA, and all of the systems I sell have the operating system plus the ability to have a static restore in HPA. One of the main reasons it hasn't been found is, firewire and usb write blockers do not allow the identification of HPA. Encase will see it in DOS only and only after you tell it to look at the ATA drive. I worked with XWays forensics to modify their Replica software for imaging, initially it did not see the HPA I created. Also Prodiscover will identify HPA if you use the correct write blocker. Many drives have been modified, its technique that allows the discovery, many manufacturers will sell a larger capacity drive with HPA enabled to meet a specific sales need or shortage. Many manufacturers use HPA for their factory restores, so its out there, its using the right tools and knowing how to identify HPA. Mark Menz has a utility called driverid that will identify HPA and disable for use with other write block devices, and he offers the only write block with published specifications that allows for access to the firmware to see HPA. I have done extensive testing to confirm That ability of Write blockers, and found firewire and USB to be lacking. You have to document, check and recheck to make sure you have all the sectors of a drive, and use the right software. As a added note, Linux will not see HPA unless you use a utility to change the firmware setting of the drive. And you have to make sure the change is temporary and when powered off does not change the drive, other wise you will have problems with modifying the data, and destroying evidence. And if its password protected your out of luck. Viewing of the restore in HPA is tradecraft and invlolves many other steps. But if I wanted to hide something, I would use HPA(password protected), chances are it would not be found. Jon Asdourian Data Forensics Engineering telos888@y... wrote: Have you ever found anything in the HPA in a real-world situation? Do you know of anyone who has? There are lots of shenannigans that can happen there, but I haven't talked to anyone yet that found a modified HPA "in the wild" so to speak (e.g. modified geometry). ...... Original Message ....... On Mon, 18 Oct 2004 05:39:05 -0700 (PDT) DATA_4N6_Engineering wrote: > > >USB is microprocessor intensive, firewire is not. I have tested most of the write blocker units and have found the throughput for USB to be unsatisfactory. I only use write blockers designed and based on NIST standards for SCSI and IDE drives including Raid. I have a firewire write blocker and it's throughput is much faster than my USB unit. I try to image all drives in their native interface. I really don't like firewire or USB write blockers. If I have to go to DOS on some occasions, my write blockers are easy to implement, and I don't have to worry about special drivers for USB and Firewire. I have found many incompatibilities with USB and firewire units, and if you have to preview a drive, you will never be able to view the HPA with USB or Firewire write blocks. With my write blocks and portable machine I can be assured of compatibility for any drive, except possible for RLL and MFM and I haven't seen any of those for a while, although I do keep a controller card around > just in case. > > >Jon Asdourian >Data Forensics Engineering > > > >telos888@y... wrote: >Wonder why everything out there is Firewire instead of USB 2.0. USB 2.0 >has a higher throughput than 1394a doesn't it (480 Mbp/s vs 400 Mbp/s)? > > >...... Original Message ....... >On Sat, 16 Oct 2004 12:37:24 -0700 (PDT) Steve Sanchez >wrote: >>Message: 2 >> Date: Fri, 15 Oct 2004 20:41 -0400 >> From: telos888@y... >>Subject: Re: Re: Review: An Evidence Collection Device >> >>Any suggestions on a portable USB or Firewire >>write-blocker in that >>$200 >>range? >> >> >>Hi, >> >>Try Firefly from http://www.digitalintel.com >> >>Excellent product and cheap too! >> >>Steve >> >>__________________________________________________ >>Do You Yahoo!? >>Tired of spam? Yahoo! Mail has the best spam protection around >>http://mail.yahoo.com >>. >> > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > >It is by caffeine alone I set my mind in motion. >It is by the juice of Star Bucks that thoughts acquire speed, >the hands acquire shaking, the shaking is a warning. >It is by caffeine alone I set my mind in motion. >=================================================== TSKS > > >Yahoo! Groups SponsorADVERTISEMENT > > >--------------------------------- >Yahoo! Groups Links > > To visit your group on the web, go to: >http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: >TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > > > > > >Jon Asdourian >61 356B Red Porsche Coupe >69 Red MGC GT >63 Burgundy Austin Healey 3000 BJ7 >356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC > >--------------------------------- >Do you Yahoo!? >vote.yahoo.com - Register online to vote today! > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > >. > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. Jon Asdourian 61 356B Red Porsche Coupe 69 Red MGC GT 63 Burgundy Austin Healey 3000 BJ7 356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC --------------------------------- Do you Yahoo!? Check out the new Yahoo! Front Page. www.yahoo.com [Non-text portions of this message have been removed] 10089 From: Does it matter Date: Thu Nov 11, 2004 7:18am Subject: OT Hard drives I have noticed lately that lots of people on this board are into computer forensics like I am, which is great. On a side note, I was wondering if anyone out there knows of a place or a person who teaches clean room type data recovery applications i.e. taking apart the drive in a class 100 type enviroment and then diagnosing problems. It appears that there aren't any classes that I can find for this and you have to get someone who worked for a hard drive company like Maxtor, Seagate, WD, etc to show you the tricks of the trade? Can anyone shed some light on this? Thanks Darren 10090 From: Date: Fri Nov 12, 2004 5:34am Subject: Re: Cisco Phone System Info The absolute lack of any security on SIP is exploit enough. ...... Original Message ....... On Thu, 11 Nov 2004 00:32:43 -0800 (PST) Mitch D wrote: > >Looking for exploit info on Cisco VOIP phones systems >Thanks >md > > > >__________________________________ >Do you Yahoo!? >Check out the new Yahoo! Front Page. >www.yahoo.com > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > >. > 10091 From: Mitch D Date: Thu Nov 11, 2004 10:34am Subject: Wardriver Confessions, courtesy ISN list http://www.computerworld.com/mobiletopics/mobile/story/0,10801,97352,00.html Opinion by Demetrios Lazarikos NOVEMBER 10, 2004 COMPUTERWORLD For most people, summer is about taking a vacation with family or heading to a secluded place to get away. Earlier this year, I read an article about the number of wireless hacks that were increasing globally. What I found interesting was that the hacks were pretty basic and that most of the information on how to break into default systems, how to look for Wired Equivalent Privacy (WEP) being enabled and other wireless steps could be found in a Google search. I had decided at the beginning of the summer that I wasn't going to take any downtime or a vacation per se. Instead, I would validate through "war driving" in five cities that wireless networking isn't ready for prime time. My itinerary involved Omaha; Chicago; Ann Arbor, Mich.; Denver and Atlanta. War driving is driving around an area with a laptop computer and an 802.11 network card to identify the presence of wireless networks. One common thread through this mission was that the cities involved had some aspect of high-tech or higher education with an emphasis on IT security. Another common thread was that I had friends and family in these cities, so I had a place to stay. Let me preface my experience with wireless networks. I embrace new technologies and try to understand how to make the workplace safe with security controls. It's not uncommon for individuals or organizations to speed up the process of implementation and not put security controls in place. I've been involved with many aspects of security and try to be proactive by educating. In my opinion, wireless security can be implemented safely, effectively and efficiently. While on this mission, it was critical for me to identify if the following could be picked up from the war drive: 1. If WEP was enabled. The WEP encryption method was designed to provide wireless networks with the same security available in wired networks; however, there are some challenges with this standard. 2. The presence of the service set identifier (SSID), the name assigned to a wireless network. Usually, the SSID comes by default using the vendor's name and should be changed to something nondescript. With these two pieces of information, an unauthorized user could be able to acquire access to a wireless network. Think about it. You're surfing the Net at home or in the office, and someone just hops onto your network connection. With information about whether or not WEP is disabled and SSID default settings, an unauthorized user could access your documents, financials or other sensitive information. Packing my car with the necessary gear -- my Dell Inspiron laptop, a newly purchased Orinoco wireless network card, lots of CDs and my wireless 2-GHz antenna (code-named Jasmine) -- I started a cross-country trip from my home in Denver. Omaha The initial drive on my way to the Midwest was pretty mellow, with lots of time to think about what I was going to pick up on my first destination. As soon as I started to exit from I-80, Jasmine and NetStumbler started to pick up multiple wireless access points. I pulled over and started to collect data in downtown Omaha. The results were incredible for the short period of time that I spent there: * 59 media access control (MAC) addresses identified in a 30-minute period * 57 SSIDs were able to be identified * 25 had WEP enabled * 24 didn't have WEP enabled Inventory of the manufacturers discovered: * (2) Agere Systems Inc./Lucent Technologies Inc. * (2) Apple Computer Inc. * (3) Cisco Systems Inc. * (2) D-Link Corp. * (26) Linksys (which was acquired by Cisco last year) * (7) NetGear Inc. * (5) Symbol Technologies Inc. I figured this would be a good baseline. If I could drive in a city for 30 minutes and gather this information, I felt my summer experience would prove that wireless security still needs a great deal of attention. I pulled into my friends' driveway and started to haul the gear into their house. Mr. Mom's (my friend is a stay-at-home dad) eyes popped out of his head. "What the heck is that?" he asked. Jasmine is always a nice conversation piece to have with me at the airport, at the house or on a vulnerability assessment. I demonstrated how it worked, and while doing so, I picked up another five wireless networks within five minutes. I left early the next morning. I wanted to get to Chicago at a reasonable time so I could do some quality war driving before people went home for the day. Chicago I arrived in Chicago by early afternoon and checked in with some friends who live downtown. The Captain and his wife have been friends for some time. Actually, the Captain is responsible for my being on a computer. He gave me my first Commodore VIC-20 and taught me how to make those early computers sing with 64KB of memory. We got into the car and loaded the gear. I was driving slowly downtown, and with my car's Colorado marker plates, it was only a matter of time before we were gathering stares from local cops on horses. Our patience paid off. We spent about a little over half an hour downtown and were able to gather the following information: * 165 MAC addresses identified in a 30-minute period * 164 SSIDs were able to be identified * 28 had WEP-enabled * 137 didn't have WEP enabled Inventory of the manufacturers discovered: * (2) Agere/Lucent * (18) Apple * (10) Cisco * (29) D-Link * (52) Linksys * (16) NetGear Inc. * (1) Senao International Co. Ann Arbor After a brief visit in Chicago, the Captain told me that they were going up north to see his in-laws and I was welcome to tag along. I accepted, and several hours later we picked up another friend, Old Timer. I also bought a battery charger for the car from RadioShack. I was quickly burning through laptop batteries, but I needed to keep the laptop charged for more driving efforts. We arrived at the University of Michigan around midday. As we approached Greek Row, Jasmine lit up, and we were capturing more data. Old Timer commented on how many "thunk" sounds NetStumbler was making as we gathered more statistics: * 222 MAC addresses identified in a 30-minute period * 221 SSIDs were able to be identified * 75 had WEP enabled * 147 didn't have WEP enabled Inventory of the manufacturers discovered: * (1) Acer Inc. * (13) Agere/Lucent * (6) Apple * (11) Cisco * (20) D-Link * (56) Linksys * (22) NetGear * (3) Senao International Denver I was feeling pretty good about my drive, and I headed back to Colorado after spending time with my family back in the Midwest. When I arrived in Denver, I drove through downtown like I did the other cities. Operating on autopilot, I fired up Jasmine and started to gather my data. It wasn't that hard driving and managing the computer by now. With three cities under my belt, it was easy to manage this by myself. Setting up Jasmine in the back window, I drove for 40 minutes while gathering information. Here's what I found: * 175 MAC addresses identified in a 40-minute period * 168 SSIDs were able to be identified * 29 had WEP enabled * 146 didn't have WEP enabled Inventory of the manufacturers discovered: * (4) Acer * (9) Agere/Lucent * (12) Apple * (18) Cisco * (24) D-Link * (37) Linksys * (15) NetGear I was satisfied. Or so I thought. Atlanta Toward the middle of August, I received a phone call from some friends in Atlanta, which got me thinking about Atlanta as another city where I could gather war-driving data. Two weeks after the call, I arrived in my final war drive city. After lunch and catching up with my friends, I walked through the business district and let Jasmine do her thing. This time, I was on foot so I could take my time and gather data at a relaxed pace. Atlanta was alive with wireless networks: * 392 MAC addresses identified in a 2-day period on foot * 343 SSIDs were able to be identified * 119 had WEP enabled * 273 didn't have WEP enabled Inventory of the manufacturers discovered: * (12) Acer * (7) Agere/Lucent * (26) Apple * (37) Cisco * (48) D-Link * (63) Linksys * (24) NetGear Overall, I was pleased with the time I took off this summer. I was able to demonstrate some basic data gathering from vulnerable wireless networks. I was reminded of several issues while writing this article: 1. People who use wireless networks should implement secure controls before going live with a wireless network. 2. Wireless networks are ready for prime time if security controls are implemented properly. 3. The cyberworld never sleeps. This summer project really has me thinking of what research I could accomplish if I take some time off during the winter holidays. Demetrios "Laz" Lazarikos, CISM, is an IT security consultant and auditor who has worked with small to midsize businesses, Fortune 500 companies and government agencies for more than 18 years. He is the co-author of Cover Your Assets: A Guide to Building and Deploying Secure Internet Applications, which has been used to help define the security awareness training for companies including Galileo International Inc. He can be reached at security (at) laz.net _________________________________________ Open Source Vulnerability Database (OSVDB) Everything is Vulnerable - http://www.osvdb.org/ Mitch Davis TSCM/Special Operations Group Inc. 20 Music Square West, Suite 208 Nashville, TN. 37203 Mail:MitchD@t... Website www.tscmusa.com (615) 251 0441 Fax (615) 523 0300 "Maintaining a higher degree of excellence " ******************************************* Investigator Tools : www.covertworx.com CONFIDENTIALITY WARNING!!! This electronic message contains information which may be privileged and/or confidential. This information is intended for the exclusive use of the individual(s), entity, or persons named or indicated above. Any unauthorized access, disclosure, copying, distribution, or use of any parts of the contents of this message/information is strictly prohibited by federal law. Any attempts to intercept this message are in violation of Title 18 U.S.C. 2511(1) of the Electronic Communications Privacy Act (ECPA). All violators are subject to fines, imprisonment, civil damages, or both. __________________________________ Do you Yahoo!? Check out the new Yahoo! Front Page. www.yahoo.com 10092 From: Date: Fri Nov 12, 2004 9:38am Subject: Re: Re: suggestions on a portable USB .... Why would the write blocker matter, isn't it just a bridge device that performs direct calls to the drive? Which blocker will do HPA? Sorry about the off-topic thread. ...... Original Message ....... On Thu, 11 Nov 2004 05:11:58 -0800 (PST) DATA_4N6_Engineering wrote: > > >I have seen drives that use HPA, and all of the systems I sell have the operating system plus the ability to have a static restore in HPA. One of the main reasons it hasn't been found is, firewire and usb write blockers do not allow the identification of HPA. Encase will see it in DOS only and only after you tell it to look at the ATA drive. I worked with XWays forensics to modify their Replica software for imaging, initially it did not see the HPA I created. Also Prodiscover will identify HPA if you use the correct write blocker. Many drives have been modified, its technique that allows the discovery, many manufacturers will sell a larger capacity drive with HPA enabled to meet a specific sales need or shortage. Many manufacturers use HPA for their factory restores, so its out there, its using the right tools and knowing how to identify HPA. Mark Menz has a utility called driverid that will identify HPA and disable for use with other write block devices, and he offers the > only write block with published specifications that allows for access to the firmware to see HPA. I have done extensive testing to confirm That ability of Write blockers, and found firewire and USB to be lacking. You have to document, check and recheck to make sure you have all the sectors of a drive, and use the right software. As a added note, Linux will not see HPA unless you use a utility to change the firmware setting of the drive. And you have to make sure the change is temporary and when powered off does not change the drive, other wise you will have problems with modifying the data, and destroying evidence. And if its password protected your out of luck. Viewing of the restore in HPA is tradecraft and invlolves many other steps. >But if I wanted to hide something, I would use HPA(password protected), chances are it would not be found. > >Jon Asdourian >Data Forensics Engineering > >telos888@y... wrote: >Have you ever found anything in the HPA in a real-world situation? Do you >know of anyone who has? > >There are lots of shenannigans that can happen there, but I haven't talked >to anyone yet that found a modified HPA "in the wild" so to speak (e.g. >modified geometry). > > >...... Original Message ....... >On Mon, 18 Oct 2004 05:39:05 -0700 (PDT) DATA_4N6_Engineering > wrote: >> >> >>USB is microprocessor intensive, firewire is not. I have tested most of >the write blocker units and have found the throughput for USB to be >unsatisfactory. I only use write blockers designed and based on NIST >standards for SCSI and IDE drives including Raid. I have a firewire write >blocker and it's throughput is much faster than my USB unit. I try to >image all drives in their native interface. I really don't like firewire >or USB write blockers. If I have to go to DOS on some occasions, my write >blockers are easy to implement, and I don't have to worry about special >drivers for USB and Firewire. I have found many incompatibilities with USB >and firewire units, and if you have to preview a drive, you will never be >able to view the HPA with USB or Firewire write blocks. With my write >blocks and portable machine I can be assured of compatibility for any >drive, except possible for RLL and MFM and I haven't seen any of those for >a while, although I do keep a controller card around >> just in case. >> >> >>Jon Asdourian >>Data Forensics Engineering >> >> >> >>telos888@y... wrote: >>Wonder why everything out there is Firewire instead of USB 2.0. USB 2.0 >>has a higher throughput than 1394a doesn't it (480 Mbp/s vs 400 Mbp/s)? >> >> >>...... Original Message ....... >>On Sat, 16 Oct 2004 12:37:24 -0700 (PDT) Steve Sanchez > >>wrote: >>>Message: 2 >>> Date: Fri, 15 Oct 2004 20:41 -0400 >>> From: telos888@y... >>>Subject: Re: Re: Review: An Evidence Collection Device >>> >>>Any suggestions on a portable USB or Firewire >>>write-blocker in that >>>$200 >>>range? >>> >>> >>>Hi, >>> >>>Try Firefly from http://www.digitalintel.com >>> >>>Excellent product and cheap too! >>> >>>Steve >>> >>>__________________________________________________ >>>Do You Yahoo!? >>>Tired of spam? Yahoo! Mail has the best spam protection around >>>http://mail.yahoo.com >>>. >>> >> >> >> >>======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >>It is by caffeine alone I set my mind in motion. >>It is by the juice of Star Bucks that thoughts acquire speed, >>the hands acquire shaking, the shaking is a warning. >>It is by caffeine alone I set my mind in motion. >>=================================================== TSKS >> >> >>Yahoo! Groups SponsorADVERTISEMENT >> >> >>--------------------------------- >>Yahoo! Groups Links >> >> To visit your group on the web, go to: >>http://groups.yahoo.com/group/TSCM-L/ >> >> To unsubscribe from this group, send an email to: >>TSCM-L-unsubscribe@yahoogroups.com >> >> Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. >> >> >> >> >> >> >>Jon Asdourian >>61 356B Red Porsche Coupe >>69 Red MGC GT >>63 Burgundy Austin Healey 3000 BJ7 >>356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC >> >>--------------------------------- >>Do you Yahoo!? >>vote.yahoo.com - Register online to vote today! >> >>[Non-text portions of this message have been removed] >> >> >> >> >> >> >> >>======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >>=================================================== TSKS >>Yahoo! Groups Links >> >> >> >> >> >> >> >>. >> > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > >It is by caffeine alone I set my mind in motion. >It is by the juice of Star Bucks that thoughts acquire speed, >the hands acquire shaking, the shaking is a warning. >It is by caffeine alone I set my mind in motion. >=================================================== TSKS > > >Yahoo! Groups SponsorADVERTISEMENT > > >--------------------------------- >Yahoo! Groups Links > > To visit your group on the web, go to: >http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: >TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > > > > >Jon Asdourian >61 356B Red Porsche Coupe >69 Red MGC GT >63 Burgundy Austin Healey 3000 BJ7 >356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC > >--------------------------------- >Do you Yahoo!? > Check out the new Yahoo! Front Page. www.yahoo.com > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > >. > 10093 From: Date: Fri Nov 12, 2004 8:40am Subject: Re: OT Hard drives Back in the old days of MFM and RLL drives, a friend of mine recovered a drive with a broken actuator by removing the platters in a "clean room" Ziploc, then Windexing the platters and putting them into a new enclosure - drive worked perfectly. Most (if not all) of the data recovery houses out there don't even use clean rooms, just open air analysis stations - I think clean rooms may be more required for manufacturing than post-mortem stuff. ...... Original Message ....... On Thu, 11 Nov 2004 13:18:27 -0000 "Does it matter" wrote: > > > >I have noticed lately that lots of people on this board are into >computer forensics like I am, which is great. On a side note, I was >wondering if anyone out there knows of a place or a person who >teaches clean room type data recovery applications i.e. taking apart >the drive in a class 100 type enviroment and then diagnosing >problems. > >It appears that there aren't any classes that I can find for this >and you have to get someone who worked for a hard drive company like >Maxtor, Seagate, WD, etc to show you the tricks of the trade? > >Can anyone shed some light on this? > >Thanks > >Darren > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > >. > 10094 From: Mitch D Date: Thu Nov 11, 2004 10:43am Subject: Re: Cisco Phone System Info Understood,but I'm looking for unauthorized user exploit info on the system features,ie intercom,auto answer,scheduled forwarding,voice mail hacks etc,the network itself is not a major concern on my part,it has been addressed,its the hacks or simple exploits known to this system i'm looking for --- telos888@y... wrote: > The absolute lack of any security on SIP is exploit enough. > > > ...... Original Message ....... > On Thu, 11 Nov 2004 00:32:43 -0800 (PST) Mitch D > > wrote: > > > >Looking for exploit info on Cisco VOIP phones systems > >Thanks > >md ===== Mitch Davis TSCM/Special Operations Group Inc. Nashville,TN.USA MitchD@t... site:www.tscmusa.com. Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 __________________________________ Do you Yahoo!? Check out the new Yahoo! Front Page. www.yahoo.com 10095 From: Date: Fri Nov 12, 2004 10:57am Subject: Re: Cisco Phone System Info Any layer-2 attack will work, for example ARP cache poisoning to redirect/intercept network traffic or to modify fields within the SIP transport via layer-2 bridging (ettercap NG). There are several programs out there, both commercial and open source that can extract voice from SIP and dump to .WAV for digital wiretapping. For device-specific problems, best bet would be to use a protocol fuzzer (SPIKE or Peach Fuzz) to find problems, although the debug environment on the receiving end is the biggest obstacle. Most of those VOIP clients (hardware phones etc) are based on an ARM or Xscale core, if you can find an unpopulated JTAG header on the mainboard you could attach a gdb stub for single step and crash analysis (the Abatron BDI2000 is a nice little box for that). ...... Original Message ....... On Thu, 11 Nov 2004 08:43:05 -0800 (PST) Mitch D wrote: > >Understood,but I'm looking for unauthorized user exploit info on >the system features,ie intercom,auto answer,scheduled >forwarding,voice mail hacks etc,the network itself is not a >major concern on my part,it has been addressed,its the hacks or >simple exploits known to this system i'm looking for >--- telos888@y... wrote: > >> The absolute lack of any security on SIP is exploit enough. >> >> >> ...... Original Message ....... >> On Thu, 11 Nov 2004 00:32:43 -0800 (PST) Mitch D >> >> wrote: >> > >> >Looking for exploit info on Cisco VOIP phones systems >> >Thanks >> >md > > >===== > >Mitch Davis >TSCM/Special Operations Group Inc. >Nashville,TN.USA >MitchD@t... site:www.tscmusa.com. >Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 > > > > > > > > >__________________________________ >Do you Yahoo!? >Check out the new Yahoo! Front Page. >www.yahoo.com > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > >. > 10096 From: Date: Thu Nov 11, 2004 8:34am Subject: Re: Digest Number 1727 oh On Sun, 07 Nov 2004 06:25:14 -0500, kondrak wrote: > > Oh, because a good portion of the TSCM business is politically driven, > and > the list owner jma is as politically astute as a lot of us are. > > > At 22:58 11/6/2004, you wrote: > > > >> all >> just had the pleasure of being added to this group. my back ground >> being >> 24+ years of a large federal LE agency. I can't help myself here: how >> does political discussion benefit the TSCM digest? suggestion: if you >> are going to have political thoughts, why not put that in your subject >> line so those who are not interested don't even need to open the >> message. >> works in other listserves that i participate in. >> wojo >> >> On Sat, 6 Nov 2004 07:28:09 EST, wrote: >> >> > >> > >> > Seems to me that the point was not that you were not entitled to your >> > opinion, simply that it would behoove you to express yourself in a >> more >> > disciplined >> > and intelligent fashion in light of the readership of this list being >> > presumed >> > to be more erudite than the average passerby on the street. >> > >> > A bit off topic, this element. I trust that your thoughts are a >> > reflection >> > of an assumption that the recent U.S. election results will affect the >> > TSCM >> > line in one way or another - I anticipate that you'll express this in >> > future >> > postings on the subject. >> > >> > In a message dated 11/6/2004 12:57:37 AM Central Standard Time, >> > TSCM-L@yahoogroups.com writes: >> >> Date: Fri, 5 Nov 2004 10:31:01 -0500 >> >> From: "Jonathan Young" >> >> Subject: RE: Elections >> >> >> >> >> >> I am entitled to my opinion. John Ashcroft does not follow the law >> or >> >> the >> >> constitution, that is plain to see. If the shoe fits, wear it. I >> said >> >> what >> >> i said, don't like what i said, then don't read my posts. Too bad >> >> people >> >> can't have an opinion in this country anymore. >> > >> > >> > [Non-text portions of this message have been removed] >> > >> > >> > >> > >> > >> > >> > >> > ======================================================== >> > TSCM-L Technical Security Mailing List >> > "In a multitude of counselors there is strength" >> > >> > To subscribe to the TSCM-L mailing list visit: >> > http://www.yahoogroups.com/community/TSCM-L >> > >> > It is by caffeine alone I set my mind in motion. >> > It is by the juice of Star Bucks that thoughts acquire speed, >> > the hands acquire shaking, the shaking is a warning. >> > It is by caffeine alone I set my mind in motion. >> > =================================================== TSKS >> > Yahoo! Groups Links >> > >> > >> > >> > >> > >> > >> > >> >> >> >> -- >> Ronald J. Wilczynski >> National Program Office >> Regional Computer Forensic Lab Program >> 916-977-2250 >> 916-549-1311 cell >> RJWilczynski@F... >> >> >> >> >> >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== TSKS >> Yahoo! Groups Links >> >> >> >> > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > -- Ronald J. Wilczynski National Program Office Regional Computer Forensic Lab Program 916-977-2250 916-549-1311 cell RJWilczynski@F... 10097 From: E. Charles Sterling Date: Thu Nov 11, 2004 11:44am Subject: RE: [security] Re: OT Hard drives FYI, Being dust-free is a key issue when doing a "field" clean of a disk platter. Finger prints, cigarettes are not allowable items to be in the immediate area. A simple thing to do is us a small room with some type of vacuum applied (i.e. vacuum cleaner hose through small orifice into the room) to draw away items floating in the air. Surgical gloves are a must to best ensure operation at the end. However - no one will guarantee this path. cheers, charles sterling cellular 832-607-9019 cellular 281-773-7621 ecs@h... www.astronet.net bcdrservices@h... Association of Contingency Planners South Texas Chapter, 2003 Active member and BC/DR Consultant From the Mouth's of Babes, comes the Brutal Honest Truth! From the ever-changing Internet, emerges a Question - Are you Chameleon or Dinosaur? -----Original Message----- From: telos888@y... [mailto:telos888@y...] Sent: Friday, November 12, 2004 8:40 AM To: TSCM-L@yahoogroups.com Subject: [security] Re: [TSCM-L] OT Hard drives Back in the old days of MFM and RLL drives, a friend of mine recovered a drive with a broken actuator by removing the platters in a "clean room" Ziploc, then Windexing the platters and putting them into a new enclosure - drive worked perfectly. Most (if not all) of the data recovery houses out there don't even use clean rooms, just open air analysis stations - I think clean rooms may be more required for manufacturing than post-mortem stuff. ...... Original Message ....... On Thu, 11 Nov 2004 13:18:27 -0000 "Does it matter" wrote: > > > >I have noticed lately that lots of people on this board are into >computer forensics like I am, which is great. On a side note, I was >wondering if anyone out there knows of a place or a person who >teaches clean room type data recovery applications i.e. taking apart >the drive in a class 100 type enviroment and then diagnosing >problems. > >It appears that there aren't any classes that I can find for this >and you have to get someone who worked for a hard drive company like >Maxtor, Seagate, WD, etc to show you the tricks of the trade? > >Can anyone shed some light on this? > >Thanks > >Darren > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > >. > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10098 From: Rui Shantilal Date: Thu Nov 11, 2004 0:07pm Subject: Re: Re: Microphones and internet (Part 2) Check the processes that the machine is running and look for something suspicious. On the other hand, monitor your network connections to understand if there is any weird traffic in your perspective, use for example, ethereal for this ! regards rs On Wed, 10 Nov 2004 15:21:34 -0800 (PST), Jan Vandenbos wrote: > > Btw, this is all assuming the recorded conversations > are leaving the machine over the net in some fashion > or another. > > I'd also do a search (using a forensic tool, or > something like Agent Ransack (again, > http://www.download.com) and look for files with the > following extensions > > .au, .wav, .mp3, .aa, .ra, .ram., ... > > I'd also search inside archive files (like .zip, > .rar). > > This is still not guaranteed, since recording software > might be using its own internal mechanisms for > encoding/storing the audio streams. > > If the 'recording' software is storing the recorded > audio on the local hard drive (rather than a live > connection over the net), then there will need to be > some way for the perp to pull the data off the system > either: > > 1) The perp has physical access to the machine - > probably on a somewhat regular basis > > 2) The system/malicious monitoring software transmits > the audio files on a regular basis (ie. via email or > other batch network job) > > 3) The perp has remote access to the machine to get > access to the files. > > As a side note - Microphones on PC's concern me > (especially considering the prevalence of microphones > in laptops and PDA's these days), but I'm also > concerned about cameras/webcams plugged into > computers. One would imagine it wouldn't be a > difficult effort to distribute software that turned on > web cameras as well as Microphones on machines one > wanted to monitor. > > Jan > > > --- Jan Vandenbos wrote: > > > > > Lots of comments out there on the web and discussion > > in the past on this topic... > > > > Ie: > > > > > http://www.landfield.com/isn/mail-archive/1999/Apr/0036.html > > > > First things I'd check (Basic I know, but important) > > - > > also this is all assuming this is windows... (If its > > on a unix/Linux variant machine I can send > > instructions for that too) > > > > 1) Start->Run->Control Panel->Add/Remove Programs - > > and look for programs that you don't recognize. > > > > 2) Bring up the Task manager (differs depending on > > your version of windows), and look under the > > Processes > > tab for unusual program. If you search for each > > program name on the Internet there are many sites > > that > > identify these programs for you and you can check > > which should be there or not. > > > > 3) Check the startup group > > (Start->Programs->Startup), > > and also the Windows Registry sections 'Run', 'Run > > Once', 'Run Service', etc... for strange programs. > > An > > easy way to do this is to grab 'Startup Mechanic' > > off > > http://www.download.com or similar site. Startup > > mechanic will list all the programs set to start > > when > > the computer boots, and will give you a starting > > place > > to look for malicious software. > > > > 4) Go to the command prompt (Start->Run->CMD) > > and type in 'netstat -a'. > > > > Unless malicious software has done a good job in > > hiding itself - you should see some trace at least > > in > > the netstat -a. > > > > FWIW, the Netstat -a shows a list of all the network > > connections on the host. If someone were listening > > full time with some kind of remote mic activiation > > software, you'd probably see a live connection to > > their IP address in that list (you might have to go > > through each one and find out which ones are > > suspicious). > > > > If you want, send me the output of that 'netstat -a' > > command direct via email and I can share thoughts on > > what looks suspicious. > > > > Assuming on the other hand that any purported > > malicious software was installed and was capable of > > hiding itself, another good way would be to plug a > > 'network sniffer' in between the machine in question > > and the Internet (use a hub, not a switch if you're > > doing this - I can explain why offline if you need). > > > > > > Look at the traffic going back and forth between > > that > > machine and other hosts on the Internet and see if > > any > > of the traffic looks suspicious. > > > > Start with the machine idle. You'll probably see a > > fair bit of traffic anyways (instant messaging and > > other network keep alive traffic), but it'll make it > > easier to single out suspicious traffic. > > > > Hope that helps... If you need more detail, feel > > free > > to drop me a note offline. > > > > Jan > > > > --- sewellr@i... wrote: > > > > > > > > > > > > > > > > > > > > A local police department suspects someone of > > > putting a hidden microphone > > > in a room and accesses the audio via the internet > > > (the room has a computer > > > connected to the internet). If this was the case, > > > how would the bad guy do > > > it? Software covertly installed on the computer? > > > What would you look for > > > physically (other than a microphone, of course)? > > > > > > Sgt. Kirk Sewell > > > Illinois State Police, Technical Investigations > > > 500 Iles Park Place, Suite 300 > > > Springfield, IL 62718 > > > (217) 524-6079 office > > > (217) 467-4211 pager > > > (217) 836-0919 mobile > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > > Yahoo! Groups Sponsor > > > Get unlimited calls to > > U.S./Canada > > ________________________________ > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 10099 From: James M. Atkinson Date: Thu Nov 11, 2004 8:48pm Subject: Senior CIA anti-terrorism officer resigns http://www.cnn.com/2004/US/11/09/cia.critic/index.html Senior CIA anti-terrorism officer resigns Agency considered disciplinary action Thursday, November 11, 2004 Posted: 9:04 PM EST (0204 GMT) WASHINGTON (CNN) -- Senior CIA anti-terrorism officer Michael Scheuer, who publicly criticized the agency's handling of the war on terrorism, resigned Thursday but said he wasn't forced out despite the fact the CIA was considering disciplinary action against him. The 22-year CIA veteran who once headed the Osama bin Laden unit, resigned effective Friday, according to Christina Davidson, the editor of his book, "Imperial Hubris." Earlier this year, the CIA gave Scheuer permission to publish the book under the name "Anonymous" and to conduct interviews for it without revealing his identity. The book is critical of how the United States is fighting the war on terrorism. Davidson said Scheuer's decision to resign followed a "cordial" meeting with senior CIA officials on Tuesday. "My decision is entirely my own," Scheuer said in a statement. "I have been in no way forced to this decision by the CIA. ... I have concluded that there has not been adequate national debate over the nature of the threat posed by Osama bin Laden and the forces he leads and inspires, and the nature and dimensions of intelligence reform needed to address that threat. It is my intention to articulate a series of views in the hope of producing a more substantive debate than what has heretofore occurred." CNN was one of the news organizations that interviewed the author in shadow. Eventually his name became public. When Scheuer began publicly criticizing the Iraq war this past summer, the agency told him he would have to provide a detailed outline of the issues he would address during each interview and each request would have to be submitted at least five business days beforehand. CIA insider slams Bush anti-terror policies) Mark Mansfield, the CIA spokesman at the time, said the agency was merely "enforcing a policy that applies to all" CIA employees. The CIA was considering disciplinary action against Scheuer because it said he violated the agency's regulations on contacts with the media, a U.S. intelligence official said earlier this week. "...There has not been adequate national debate over the nature of the threat posed by Osama bin Laden and the forces he leads and inspires, and the nature and dimensions of intelligence reform needed to address that threat." -- Michael Scheuer "Mike is not authorized to speak for the CIA," the intelligence official said. "He knows the procedures governing relations between the agency and contacts with the press," and he "decided not to follow them." The official said the agency has several options it could take against Scheuer, including dismissal. Davidson said the CIA had denied every interview request Scheuer had submitted since the agency began enforcing its rules. "He's followed every rule to the 'T,' " Davidson told CNN. She said Scheuer was asked to revise interview requests a number of times -- "a time-consuming effort," she said -- but still ended up having the request turned down. Davidson maintained that the constraints put on Scheuer went beyond what is expected of other CIA employees. CNN producer Henry Schuster contributed to this report. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10100 From: Gregory Hicks Date: Thu Nov 11, 2004 0:37pm Subject: RE: [security] Re: OT Hard drives > To: > From: "E. Charles Sterling" > Date: Thu, 11 Nov 2004 11:44:53 -0600 > Subject: RE: [security] Re: [TSCM-L] OT Hard drives > > FYI, > Being dust-free is a key issue when doing a "field" clean of a disk platter. > Finger prints, cigarettes are not allowable items to be in the immediate > area. > A simple thing to do is us a small room with some type of vacuum applied > (i.e. vacuum cleaner hose through small orifice into the room) to draw away > items floating in the air. > Surgical gloves are a must to best ensure operation at the end. > > However - no one will guarantee this path. The question that really has to be asked here is "How long do you want the drive to continue functioning?". If you open a drive in a non-clean room environment, you risk getting sub-microscopic particles of dust on the platters. One of these will cause a head crash such that any data that MAY have been on the drive is un-recoverable. Besides the vacuum cleaner sucking the air out, you would also need filters on the air inlets to keep out the dust. However, most clean rooms have "positive" air pressure internally so that no dust and such inadvertantly comes in. (This would mean that you need filters on the inlet side of the air pumps.) Regards, Gregory Hicks > -----Original Message----- > From: telos888@y... [mailto:telos888@y...] > Sent: Friday, November 12, 2004 8:40 AM > To: TSCM-L@yahoogroups.com > Subject: [security] Re: [TSCM-L] OT Hard drives > > > Back in the old days of MFM and RLL drives, a friend of mine recovered a > drive with a broken actuator by removing the platters in a "clean room" > Ziploc, then Windexing the platters and putting them into a new > enclosure - > drive worked perfectly. > > Most (if not all) of the data recovery houses out there don't even use > clean rooms, just open air analysis stations - I think clean rooms may be > more required for manufacturing than post-mortem stuff. > > > ...... Original Message ....... > On Thu, 11 Nov 2004 13:18:27 -0000 "Does it matter" > wrote: > > > > > > > >I have noticed lately that lots of people on this board are into > >computer forensics like I am, which is great. On a side note, I was > >wondering if anyone out there knows of a place or a person who > >teaches clean room type data recovery applications i.e. taking apart > >the drive in a class 100 type enviroment and then diagnosing > >problems. > > > >It appears that there aren't any classes that I can find for this > >and you have to get someone who worked for a hard drive company like > >Maxtor, Seagate, WD, etc to show you the tricks of the trade? > > > >Can anyone shed some light on this? > > ------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 San Jose, CA 95134 I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton 10101 From: DATA_4N6_Engineering Date: Thu Nov 11, 2004 1:18pm Subject: Re: Re: suggestions on a portable USB .... No, write blockers are not created equal and only one has published specifications. Access to HPA is through firmware calls to the drive, there are only two devices I know of that do this without any problems, Mark Menz IDE write block and Paraben SCSI write block(HPA does not apple to SCSI) both allow firmware calls to the drive. You can connect an IDE drive with an adapter to the scsi write block. (both are included with my systems I sell) Mark Menz the preferred write blocker with published specificationa will allow access to HPA in dos and Windows Guidance Software's write block will allow Prodiscover access to HPA in the gui but Encase in the GUI will not see the HPA. Encase will see HPA in DOS with the ATA mode selected. ICS Solo Write block will allow dos to access HPA I have not found a firewire or usb device that will allow access to HPA in the gui or dos. Although many vendors know of this limitation. Jon Asdourian Data Forensics Engineering telos888@y... wrote: Why would the write blocker matter, isn't it just a bridge device that performs direct calls to the drive? Which blocker will do HPA? Sorry about the off-topic thread. ...... Original Message ....... On Thu, 11 Nov 2004 05:11:58 -0800 (PST) DATA_4N6_Engineering wrote: > > >I have seen drives that use HPA, and all of the systems I sell have the operating system plus the ability to have a static restore in HPA. One of the main reasons it hasn't been found is, firewire and usb write blockers do not allow the identification of HPA. Encase will see it in DOS only and only after you tell it to look at the ATA drive. I worked with XWays forensics to modify their Replica software for imaging, initially it did not see the HPA I created. Also Prodiscover will identify HPA if you use the correct write blocker. Many drives have been modified, its technique that allows the discovery, many manufacturers will sell a larger capacity drive with HPA enabled to meet a specific sales need or shortage. Many manufacturers use HPA for their factory restores, so its out there, its using the right tools and knowing how to identify HPA. Mark Menz has a utility called driverid that will identify HPA and disable for use with other write block devices, and he offers the > only write block with published specifications that allows for access to the firmware to see HPA. I have done extensive testing to confirm That ability of Write blockers, and found firewire and USB to be lacking. You have to document, check and recheck to make sure you have all the sectors of a drive, and use the right software. As a added note, Linux will not see HPA unless you use a utility to change the firmware setting of the drive. And you have to make sure the change is temporary and when powered off does not change the drive, other wise you will have problems with modifying the data, and destroying evidence. And if its password protected your out of luck. Viewing of the restore in HPA is tradecraft and invlolves many other steps. >But if I wanted to hide something, I would use HPA(password protected), chances are it would not be found. > >Jon Asdourian >Data Forensics Engineering > >telos888@y... wrote: >Have you ever found anything in the HPA in a real-world situation? Do you >know of anyone who has? > >There are lots of shenannigans that can happen there, but I haven't talked >to anyone yet that found a modified HPA "in the wild" so to speak (e.g. >modified geometry). > > >...... Original Message ....... >On Mon, 18 Oct 2004 05:39:05 -0700 (PDT) DATA_4N6_Engineering > wrote: >> >> >>USB is microprocessor intensive, firewire is not. I have tested most of >the write blocker units and have found the throughput for USB to be >unsatisfactory. I only use write blockers designed and based on NIST >standards for SCSI and IDE drives including Raid. I have a firewire write >blocker and it's throughput is much faster than my USB unit. I try to >image all drives in their native interface. I really don't like firewire >or USB write blockers. If I have to go to DOS on some occasions, my write >blockers are easy to implement, and I don't have to worry about special >drivers for USB and Firewire. I have found many incompatibilities with USB >and firewire units, and if you have to preview a drive, you will never be >able to view the HPA with USB or Firewire write blocks. With my write >blocks and portable machine I can be assured of compatibility for any >drive, except possible for RLL and MFM and I haven't seen any of those for >a while, although I do keep a controller card around >> just in case. >> >> >>Jon Asdourian >>Data Forensics Engineering >> >> >> >>telos888@y... wrote: >>Wonder why everything out there is Firewire instead of USB 2.0. USB 2.0 >>has a higher throughput than 1394a doesn't it (480 Mbp/s vs 400 Mbp/s)? >> >> >>...... Original Message ....... >>On Sat, 16 Oct 2004 12:37:24 -0700 (PDT) Steve Sanchez > >>wrote: >>>Message: 2 >>> Date: Fri, 15 Oct 2004 20:41 -0400 >>> From: telos888@y... >>>Subject: Re: Re: Review: An Evidence Collection Device >>> >>>Any suggestions on a portable USB or Firewire >>>write-blocker in that >>>$200 >>>range? >>> >>> >>>Hi, >>> >>>Try Firefly from http://www.digitalintel.com >>> >>>Excellent product and cheap too! >>> >>>Steve >>> >>>__________________________________________________ >>>Do You Yahoo!? >>>Tired of spam? Yahoo! Mail has the best spam protection around >>>http://mail.yahoo.com >>>. >>> >> >> >> >>======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >>It is by caffeine alone I set my mind in motion. >>It is by the juice of Star Bucks that thoughts acquire speed, >>the hands acquire shaking, the shaking is a warning. >>It is by caffeine alone I set my mind in motion. >>=================================================== TSKS >> >> >>Yahoo! Groups SponsorADVERTISEMENT >> >> >>--------------------------------- >>Yahoo! Groups Links >> >> To visit your group on the web, go to: >>http://groups.yahoo.com/group/TSCM-L/ >> >> To unsubscribe from this group, send an email to: >>TSCM-L-unsubscribe@yahoogroups.com >> >> Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. >> >> >> >> >> >> >>Jon Asdourian >>61 356B Red Porsche Coupe >>69 Red MGC GT >>63 Burgundy Austin Healey 3000 BJ7 >>356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC >> >>--------------------------------- >>Do you Yahoo!? >>vote.yahoo.com - Register online to vote today! >> >>[Non-text portions of this message have been removed] >> >> >> >> >> >> >> >>======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >>=================================================== TSKS >>Yahoo! Groups Links >> >> >> >> >> >> >> >>. >> > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > >It is by caffeine alone I set my mind in motion. >It is by the juice of Star Bucks that thoughts acquire speed, >the hands acquire shaking, the shaking is a warning. >It is by caffeine alone I set my mind in motion. >=================================================== TSKS > > >Yahoo! Groups SponsorADVERTISEMENT > > >--------------------------------- >Yahoo! Groups Links > > To visit your group on the web, go to: >http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: >TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > > > > >Jon Asdourian >61 356B Red Porsche Coupe >69 Red MGC GT >63 Burgundy Austin Healey 3000 BJ7 >356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC > >--------------------------------- >Do you Yahoo!? > Check out the new Yahoo! Front Page. www.yahoo.com > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > >. > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. Jon Asdourian 61 356B Red Porsche Coupe 69 Red MGC GT 63 Burgundy Austin Healey 3000 BJ7 356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC --------------------------------- Do you Yahoo!? Check out the new Yahoo! Front Page. www.yahoo.com [Non-text portions of this message have been removed] 10102 From: Brian Noble Date: Thu Nov 11, 2004 6:12pm Subject: Re: Microphones and internet (Part 2) I would also search for files that have been created or modified in the last few days to see if there could be audio files. Each file will need to be examined. A program could be saving small bits of audio to a file and sending them out periodically much like a keylogger does. If the computer in question is on a local network be sure to check the drives that the suspect computer can access. One question for the hardware people here if the mic is not external to the computer but internal to the case how would you get around the fans and harddrive noise? Brian Noble --- In TSCM-L@yahoogroups.com, Rui Shantilal wrote: > > Check the processes that the machine is running and look for something > suspicious. > > On the other hand, monitor your network connections to understand if > there is any weird traffic in your perspective, use for example, > ethereal for this ! > > regards > > rs > > > On Wed, 10 Nov 2004 15:21:34 -0800 (PST), Jan Vandenbos > wrote: > > > > Btw, this is all assuming the recorded conversations > > are leaving the machine over the net in some fashion > > or another. > > > > I'd also do a search (using a forensic tool, or > > something like Agent Ransack (again, > > http://www.download.com) and look for files with the > > following extensions > > > > .au, .wav, .mp3, .aa, .ra, .ram., ... > > > > I'd also search inside archive files (like .zip, > > .rar). > > > > This is still not guaranteed, since recording software > > might be using its own internal mechanisms for > > encoding/storing the audio streams. > > > > If the 'recording' software is storing the recorded > > audio on the local hard drive (rather than a live > > connection over the net), then there will need to be > > some way for the perp to pull the data off the system > > either: > > > > 1) The perp has physical access to the machine - > > probably on a somewhat regular basis > > > > 2) The system/malicious monitoring software transmits > > the audio files on a regular basis (ie. via email or > > other batch network job) > > > > 3) The perp has remote access to the machine to get > > access to the files. > > > > As a side note - Microphones on PC's concern me > > (especially considering the prevalence of microphones > > in laptops and PDA's these days), but I'm also > > concerned about cameras/webcams plugged into > > computers. One would imagine it wouldn't be a > > difficult effort to distribute software that turned on > > web cameras as well as Microphones on machines one > > wanted to monitor. > > > > Jan > > > > > > --- Jan Vandenbos wrote: > > > > > > > > Lots of comments out there on the web and discussion > > > in the past on this topic... > > > > > > Ie: > > > > > > > > http://www.landfield.com/isn/mail-archive/1999/Apr/0036.html > > > > > > First things I'd check (Basic I know, but important) > > > - > > > also this is all assuming this is windows... (If its > > > on a unix/Linux variant machine I can send > > > instructions for that too) > > > > > > 1) Start->Run->Control Panel->Add/Remove Programs - > > > and look for programs that you don't recognize. > > > > > > 2) Bring up the Task manager (differs depending on > > > your version of windows), and look under the > > > Processes > > > tab for unusual program. If you search for each > > > program name on the Internet there are many sites > > > that > > > identify these programs for you and you can check > > > which should be there or not. > > > > > > 3) Check the startup group > > > (Start->Programs->Startup), > > > and also the Windows Registry sections 'Run', 'Run > > > Once', 'Run Service', etc... for strange programs. > > > An > > > easy way to do this is to grab 'Startup Mechanic' > > > off > > > http://www.download.com or similar site. Startup > > > mechanic will list all the programs set to start > > > when > > > the computer boots, and will give you a starting > > > place > > > to look for malicious software. > > > > > > 4) Go to the command prompt (Start->Run->CMD) > > > and type in 'netstat -a'. > > > > > > Unless malicious software has done a good job in > > > hiding itself - you should see some trace at least > > > in > > > the netstat -a. > > > > > > FWIW, the Netstat -a shows a list of all the network > > > connections on the host. If someone were listening > > > full time with some kind of remote mic activiation > > > software, you'd probably see a live connection to > > > their IP address in that list (you might have to go > > > through each one and find out which ones are > > > suspicious). > > > > > > If you want, send me the output of that 'netstat -a' > > > command direct via email and I can share thoughts on > > > what looks suspicious. > > > > > > Assuming on the other hand that any purported > > > malicious software was installed and was capable of > > > hiding itself, another good way would be to plug a > > > 'network sniffer' in between the machine in question > > > and the Internet (use a hub, not a switch if you're > > > doing this - I can explain why offline if you need). > > > > > > > > > Look at the traffic going back and forth between > > > that > > > machine and other hosts on the Internet and see if > > > any > > > of the traffic looks suspicious. > > > > > > Start with the machine idle. You'll probably see a > > > fair bit of traffic anyways (instant messaging and > > > other network keep alive traffic), but it'll make it > > > easier to single out suspicious traffic. > > > > > > Hope that helps... If you need more detail, feel > > > free > > > to drop me a note offline. > > > > > > Jan > > > > > > --- sewellr@i... wrote: > > > > > > > > > > > > > > > > > > > > > > > > > > > A local police department suspects someone of > > > > putting a hidden microphone > > > > in a room and accesses the audio via the internet > > > > (the room has a computer > > > > connected to the internet). If this was the case, > > > > how would the bad guy do > > > > it? Software covertly installed on the computer? > > > > What would you look for > > > > physically (other than a microphone, of course)? > > > > > > > > Sgt. Kirk Sewell > > > > Illinois State Police, Technical Investigations > > > > 500 Iles Park Place, Suite 300 > > > > Springfield, IL 62718 > > > > (217) 524-6079 office > > > > (217) 467-4211 pager > > > > (217) 836-0919 mobile > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > > > > > Yahoo! Groups Sponsor > > > > > > Get unlimited calls to > > > > U.S./Canada > > > > ________________________________ > > Yahoo! Groups Links > > > > To visit your group on the web, go to: > > http://groups.yahoo.com/group/TSCM-L/ > > > > To unsubscribe from this group, send an email to: > > TSCM-L-unsubscribe@yahoogroups.com > > > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 10103 From: James M. Atkinson Date: Thu Nov 11, 2004 10:02pm Subject: Corporate Lingo http://www.spies.com/~gus/ran/corporate.htm action item Something which needs to be either done or at least placed in a list of things in need of doing. For example, an action item in the de-hiring of a resource would be the revocation of the resource's network privileges. add value Increase the worth of something. There is no term for "decrease the worth of something." bottleneck An essential resource who impedes the rapid completion of a project. Resource bottlenecks are generally those which are overworked and understaffed. In my erstwhile employer's case, bottlenecks occurred most often in graphic design, database approval, and quality assurance. challenge A problem. Simply using the word "problem" generates excessive negativity and implies there's nothing that can be done, which is often the case. coach A boss; someone who orders others around. The term "coach" has fewer negative connotations in our society than the term "boss." "Coach" indicates that the game of business is much like football or baseball, an idea that appeals to many who would have preferred to get rich that way. compensation package The expense of having a resource. Unfortunately, resources must rent homes, drive cars and eat food, so to keep them alive (so that they can work), they must be compensated. Sometimes the cost of hiring a specific resource is such that his or her compensation package is out of all proportion to the compensation packages of other resources doing similar work. Thus compensation specifics are regarded as "highly-sensitive" information, and resources are warned that they can be de-hired if they discuss their compensation packages with other resources. de-hire To forcibly terminate a resource's employment, usually using the Change of Relationship Form. The resource is then supervised as he or she packs his stuff and is then escorted to the door. deliverables Features of a product that can be achieved by a specific date. Always spoken of in the future tense. drill down For someone to examine something in detail, feature by feature, regardless of level of management. Since this almost never happens in the course of real business (since such action might be interpreted as "taking ownership"), this term is used almost exclusively in the future tense, often as a threat. embrace and extend To copy another company's product and then add a few features. That's how it works in theory. In reality, most attempts at embrace and extend result in a buggy, overly-hyped knock-off which, through multiple versions, never quite attains the functionality of the original product being copied. focus Concentration on a single task. This rarely lasts more than a few hours even when jealously guarded. incentivize To create a reason for a resource to do something that a manager or a project leader needs done. Often this involves the payment of a bonus, but it can also be the threat of de-hiring. knowledge transfer For a resource to teach someone how to do something that only he or she knows how to do. Generally a corporation encourages knowledge transfer as much as possible since it makes it much easier to de-hire a resource whose knowledge has been completely transferred. Paradoxically, the project management system actually discourages knowledge transfer, since, with its strict capitalist model, there is no incentive for one resource to give another resource competitive skills. leverage A longer word meaning "use." Since much of what a corporation actually has is wasted, managers like to put added emphasis on occasions when they actually use something they already have. metric An objective measurement of success or value. In the web world, metrics can be things like "retention," "revenue per unit time," or, in the negative sense of the word, "man-years." While corporations would like to have their employees and the public at large believe that their actions are all entirely based on a careful reading of measurable parameters, in reality many corporate actions are the result of a complex mix of bad science, wishful-thinking and the personal selfishness of managers. milestone A date related to the level of completion for a project, always spoken of in the future tense. Since milestones are rarely predicted to fall anywhere near where they end up falling, the judgment of whether or not a milestone has been reached is more of an art than a science. offline A term meaning "at another, unspecified meeting." Suggesting that an uncomfortable or technically-complex topic be taken "offline" is an excellent way to put off its further discussion indefinitely. open communication A policy allowing one person in the firm to speak to another candidly, even emotionally, about some concern, regardless of the position within the firm of either employee. The existance of such a policy is often paraded around with much fanfare in the hopes that employees will feel that they have a voice within the firm. In actuality, of course, the moment an employee starts making real use of open communication, he or she is placed on the short list of rabble-rousers earmarked for de-hiring. The only people truly free to openly communicate are coaches and other bosses, as long as they don't give their bosses any lip. out of the loop A phrase meaning "not connected with a decision." It is used to deny responsibility or to complain about not having been consulted. own To take responsibility for something. Someone who "owns" something can never claim that they are "out of the loop." point of contact Someone who is the voice for an entire team or subgroup. Effective points of contact often maintain that they are "out of the loop" when challenges occur. proactive Doing something without being told. This is such a rare assertion of individual initiative that the very word has a mystical aura about it, much like "holy grail." project management system A management system that divides a company into small working groups which are left to operate fairly independently and are held independently accountable for their successes and failures. This is how PMS works in theory. In the case of my erstwhile employer, PMS (renamed, for Êsthetic reasons, to RAM) was continually corrupted and influenced by such forces as CEO whim, resource manager decree, co-founder bullying (especially in the case of e-commerce projects), shoddy quantification, the special needs of acquired company integration, and the incentivizable demands of overall corporate health (especially with regard to recruitment and knowledge transfer). resource A living, breathing human being having a skill set and a compensation package. Resources are managed by a cloistered group which calls itself "Human Resources." Like hardware, resources have fixed lifespans, can become obsolete and can even malfunction. resource bonus An entirely fictional payment that resources are supposed to receive monthly for work done outside the project management system. responsibility assignment To pass the buck. Not just anyone can participate in an act of responsibility assignment. Generally speaking, a resource can assign responsibility only when he or she receives a larger paycheck than the resource being assigned the responsibility. A manager adept in the art of responsibility assignment can advance his or her position indefinitely beneath the level of CEO. results-driven A project or a resource which/who displays a machiavellian indifference for procedure so long as a key metric is met. scope creep The gradual inflation of the goals of a project as its leaders imagine more things for it to do. For a developer, this situation can quickly spiral out of control, especially since scope creep always seems to advance faster and faster as a deadline is approached. skill set Things a resource has the ability to do. Often the skill set is defined arbitrarily narrow so as to focus a resource on a limited aspect of company business. The fewer seeing the big picture for themselves, the better. subject matter expert The person who knows the most about a particular product. If that person has been de-hired, the subject matter expert is whoever wants to be de-hired next. sync up To have a meeting, especially but not necessarily between two people. Evidently borrowed from the Palm Pilot lexicon. take ownership Assume responsibility. This is the opposite of the more normal practice of "responsibility assignment." take ___ to the next level To improve, extend or advance. This is usually stated as a goal; few actual advancements are ever regarded in retrospect as having quite been "to the next level." (This phrase faded from popularity in the summer of 1999.) team A group of people working together. Taken directly from the obnoxious language of sports. touch base Sync up or otherwise have a brief meeting. Another term taken directly from the obnoxious language of sports. WIIFM "What's in it for me?" Under the harsh capitalist rules of the Project Management System, supposedly no one had to do anything unless they were personally incentivized. Implicitly or explicitly, this led many resources to ask when approached for a project, "What's in it for me?" The CEO occasionally joked that WIIFM was everybody's favorite radio station. WTAWTAW "Where there's a will, there's a way." This is less of a corporate slogan than it is a start-up company mantra. Basically this means that anything is possible if a resource is willing to focus hard enough on the task at hand. In my experience, though, the end result of WTAWTAW is buggy software, shattered expectations and mass de-hirings. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10104 From: Rui Shantilal Date: Fri Nov 12, 2004 6:53am Subject: Re: Cisco Phone System Info I am aware that each IP phone has it¥s own web server, try to go for it, using known exploits against Web Server, for example, manipulating http headers. rs On Thu, 11 Nov 2004 00:32:43 -0800 (PST), Mitch D wrote: > Looking for exploit info on Cisco VOIP phones systems > Thanks > md > > > > __________________________________ > Do you Yahoo!? > Check out the new Yahoo! Front Page. > www.yahoo.com > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > > Yahoo! Groups Sponsor > > ADVERTISEMENT > > > ________________________________ > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. From: James M. Atkinson Date: Mon Nov 12, 2001 1:57pm Subject: Re: Routine TSCM Inspections The way I handle my recurring sweep is to go out to the customers facility in a portable lab (built into a 15 foot box truck) on an unannounced (and randomly picked) day midway between sweep days. I then direct several high gain antenna's towards the facility and document the RF spectrum originating from the facility, then move to a secondary location (at least 90 degrees off) and repeat. When I then show up a few weeks later for the actual sweep I can perform a cursory check of the RF environment from the parking lot, and zip into the building with minimal equipment. I also try to cluster customers with recurring sweep work together in a similar geographic area or business park so I can extend all of them a mutual discount. I actually have one cluster of client all in the same building so I can hit all six of them at once (in the parking lot). I perform my quarterly sweeps with them all back to back... taking only three-four hours per business, plus one billable hour for the external work. Do the partial sweeps every 13 weeks, with a RF check half way though... and a full dress sweep at least once a year, or as needed. -jma At 10:55 AM +0200 11/12/01, A Grudko wrote: >- Original Message - >> Normally, we do not recommend routine or regular inspections, however I >> would agree that inspections should be carried out before (and during) >> important meetings (where the risk warrants it) and after any suspicious >> events, such as an intrusion into the facility. > >95% of our clients want ad hoc sweeps but a few with a perceived higher risk >want regular (but random dates) sweeps. We are happy to do so and try to >group them together to reduce travel and overheads, and offer a discount >(about 30%) of our usual fees. -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4113 From: James M. Atkinson Date: Mon Nov 12, 2001 3:34pm Subject: Blind Man's Bluff: Here is another one of my book recommendations (available at Amazon): Blind Man's Bluff: The Untold Story of American Submarine Espionage http://www.amazon.com/exec/obidos/ASIN/1891620088/graniteisland-20 -jma -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4114 From: Miguel Puchol Date: Mon Nov 12, 2001 3:52pm Subject: RE: Blind Man's Bluff: I would second that. It's an excellent book, with many surprises - amazing feats acomplished. Definitely worth a read, which reminds me, I lent it to someone and I can't remember who now... Cheers, Mike > -----Mensaje original----- > De: James M. Atkinson [mailto:jmatk@tscm.com] > Enviado el: lunes, 12 de noviembre de 2001 22:35 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] Blind Man's Bluff: > > > Here is another one of my book recommendations (available at Amazon): > > Blind Man's Bluff: The Untold Story of American Submarine Espionage > > http://www.amazon.com/exec/obidos/ASIN/1891620088/graniteisland-20 > > -jma > -- 4115 From: A Grudko Date: Tue Nov 13, 2001 0:30am Subject: Conference room sweep I performed a sweep for one of my Government clients on Friday - the new incumbant worried that his predicessor might have laft an unknown 'gift' for him (shock - horror; to think a politician might play dirty - !?#@!). 1 office and 3 hours later my techie and I were happy that there were no 'nasties' there. But right next door is THE conference room or 'chambers' where the big wigs in suits decide important confidential policy such as which model of Mercedes they will spend the tax payers money on next month and which 5 star hotel they will get drunk at at next week's seminar on whatever. The room is about 40 metres in diameter, 3 stories high. A 3/4 circle of about 20 wide seats (to takethe fat-cats' bums) face the ornate raised podium of the Lord/Minister/Senator and 2 flanking flunkies. In the centre is a round desk which contains a dual tape recorder and console. Around the perimiter up to 120 taxpayers are occasionally herded in to watch these leaders spend their money from the 'Pubic Gallery' (sp?). Each of the Inner Circle leaders has a desk microphone with a 'PTT' type button (system made in Italy by 'Zalmara'). Once activated a red ring glows around the head of the mike to tell the potentate that his words of wisdom are being recorded for the benifit of mankind. Not only are there 20+ mikes openly installed here, and a recording system, but plugged into it is a wireless mike receiver!!! And the room is not locked, alarmed or guarded by man, camera or beast... I'm currently writing my report on the sweep of the office. In my recommedations there will be a wholesection on the dangers posed by this big room where the high and mighty conduct their business. Anyone got any thoughts on TSCMing this room - apart from 'go meet in the car park, it's safer.?' Sarcasm mode off... Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigation Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4116 From: Miguel Puchol Date: Tue Nov 13, 2001 3:26am Subject: RE: Cyber-security czar snubs ID plan, defends Govnet > The "ID Plan" is complete garbage, and would do little more then > inflict a police state on the public. Why? The U.S. and other countries are willing to give away civil liberties MUCH more important than having or not an ID card (such as privacy in your communications). I still don't understand why a personal ID card - I would stress this - with NO other information (on smart chips, magnetic stripes, etc.) other than name, address, photo and age is equivalent to inflicting a police state. > Personally, I would like to see law passed that requires a U.S. > Passport for any kind of travel by commercial airline, trains, or > bus. In cases where a U.S. Passport was not presented (such as in > the case of a foreign national with a Foreign passport) the person > would be subjected to a comprehensive security examination. Then, you are agreeing to an ID card, only that it's a Passport, more clumsy and more delicate to carry around all day. On another matter, considering that only foreign nationals are likely to be terrorists is a mistake. In the years since the Gulf war (when Osama got really miffed), many people could have infiltrated western countries and aquired their nationality, and remain dormant. You just need to take a look at the UK, where hundreds of young muslims with UK passports are travelling to Afghanistan to fight with the Taliban and Osama - these are people born in the UK, with UK-national parents and in some cases grandparents. Some have already died in the bombings. > I also feel that it is shear stupidity for airline screen to be done > by private companies, and belive that screening for access to the > "secure corridor" should strictly be done by federal law enforcement > people or the military. With this I totally agree. A couple of years ago security in airports around Spain was transfered to private security companies - this has now been reversed, and police forces are now taking charge again. > Now, if the airlines want to have a secondary screening procedure > right at the gate, just prior to boarding, then they could use > private companies. Such a screening would ensure that carry-on bags > were kept to a minimum, and would allow the plane to be boarded in an > orderly fashion. Again agreed - sometimes it's caos, specially when 90% of the passengers only carry one of those small wheeled weekend suitcases, which just about make the maximum size for carry-on luggage. > Of course, I also feel that (properly trained and screened) U.S. > Citizens should be able to carry conceal firearms on board the > airplane, or pretty much take one anywhere in the counrty (as > guaranteed by law). Could you please explain what screening procedures take place in the U.S. before a gun is sold to someone? Here, the person needs a mental & physical examination, and an interview with police, to get an arms permit. Then, with this permit, he can buy whatever weapons he wants. However, these weapons must be registered with police, must be stored in special lockers, and can only be used in firing ranges or delimited hunting grounds. You can, however, under special circumstances, get a permit to carry a handgun with you - this is mainly because of terrorist threat we have in Spain by ETA. In any case, even with all these checks & controls, there are a few cases every year where a mentally-ill or disturbed person with a weapons permit goes out and kills a few people before commiting suicide - imagine this taking place in an aircraft. You could have someone with a valid permit, who's just had an argument with his wife, she has left him, so why not go out to commit suice...but taking part of the society with him - he could be boarding your flight with a gun. I personally don't want to be on an aircraft where passengers could engage in a firefight for whatever reason. Also, they are not likely to be loading special aircraft-friendly ammo, so unless you check each gun AND it's ammo, you are putting at risk the whole aircraft. We're now talking hours for boarding a flight. > I would also prefer to have less flight attendants, and more security > people on board. I mean if I want a snack on a flight I am probably > just going to pack one in my carry-on baggage.... and when I want > coffee I usually just walk to the galley and help myself anyway (and > other passengers should do the same). Of course if I am flying first > class I like the food, the wine, and the hot towel being brought to > my seat by a perky flight attendant.. With this I do agree completely. If you want armed people on board, let it be security officers, who will be specifically trained to deal with aircraft-related problems, and will know what not to shoot at. Best regards, Mike 4117 From: James M. Atkinson Date: Tue Nov 13, 2001 6:43am Subject: Re: Conference room sweep Yep, 1) Disconnect the wireless microphone, permanently. 2) Trace all of the audio system wiring in the room and lock-down and alarm the location where all of the wiring comes together. 3) Sweep the entire room and pay special attention to any kind of HIDDEN hardwired system, and check the entire RF spectrum in detail from 9 kHz to 40 GHz, using a RBW and VBW of 1 kHz -jma At 8:30 AM +0200 11/13/01, A Grudko wrote: >I performed a sweep for one of my Government clients on Friday - the new >incumbant worried that his predicessor might have laft an unknown 'gift' for >him (shock - horror; to think a politician might play dirty - !?#@!). > >1 office and 3 hours later my techie and I were happy that there were no >'nasties' there. But right next door is THE conference room or 'chambers' >where the big wigs in suits decide important confidential policy such as >which model of Mercedes they will spend the tax payers money on next month >and which 5 star hotel they will get drunk at at next week's seminar on >whatever. > >The room is about 40 metres in diameter, 3 stories high. A 3/4 circle of >about 20 wide seats (to takethe fat-cats' bums) face the ornate raised >podium of the Lord/Minister/Senator and 2 flanking flunkies. In the centre >is a round desk which contains a dual tape recorder and console. Around the >perimiter up to 120 taxpayers are occasionally herded in to watch these >leaders spend their money from the 'Pubic Gallery' (sp?). > >Each of the Inner Circle leaders has a desk microphone with a 'PTT' type >button (system made in Italy by 'Zalmara'). Once activated a red ring glows >around the head of the mike to tell the potentate that his words of wisdom >are being recorded for the benifit of mankind. > >Not only are there 20+ mikes openly installed here, and a recording system, >but plugged into it is a wireless mike receiver!!! > >And the room is not locked, alarmed or guarded by man, camera or beast... > >I'm currently writing my report on the sweep of the office. In my >recommedations there will be a wholesection on the dangers posed by this big >room where the high and mighty conduct their business. Anyone got any >thoughts on TSCMing this room - apart from 'go meet in the car park, it's >safer.?' > >Sarcasm mode off... > > >Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , >Est. 1981 >International business intelligence and investigation >Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 >0255 - 244 0256 (Fax) >SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom >When you need it done right - first time > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4118 From: Aimee Farr Date: Tue Nov 13, 2001 0:09pm Subject: China. Joins World Trade Organization. http://www.wto.org/english/news_e/pres01_e/pr243_e.htm White House Release. http://www.whitehouse.gov/news/releases/2001/11/20011109-20.html TRIPS Agreement (intellectual property) http://www.wto.org/english/thewto_e/whatis_e/tif_e/agrm6_e.htm 4119 From: James M. Atkinson Date: Tue Nov 13, 2001 0:44pm Subject: Headlines in the Year 2035 Headlines in the Year 2035 1. Castro finally dies at age 112; Cuban cigars can now be imported legally but President Chelsea Clinton has banned all smoking. 2. Spotted Owl plague threatens Western North America crops & livestock. 3. Last remaining Fundamentalist Muslim dies in the American Territory of the Middle East (formerly known as Iran, Iraq, Syria, and Lebanon) 4. Afghanistan still closed off; physicists estimate it will take at least ten more years before radioactivity decreases to safe levels. 5. George Z. Bush says he will run for President in 2036. 6. 35 year study: diet and exercise is the key to weight loss. 7. Nursing home event... Bill Clinton denies allegations of affair with candy striper. 8. Texas executes last remaining citizen. 9. Upcoming NFL draft likely to focus on use of mutants. 10. Baby conceived naturally.....scientists stumped. 11. Authentic year 2000 "chad" sells at Sotheby's for $4.6 million. 12. Ozone created by electric cars now killing thousands in Los Angeles. 13. Average height of NBA players now nine foot seven inches. 14. Microsoft announces it has perfected its newest version of Windows so it crashes BEFORE installation is completed. 15. New California law requires that all nail clippers, screwdrivers, and baseball bats be registered by January 2036. -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4120 From: Aimee Farr Date: Tue Nov 13, 2001 2:04pm Subject: US political espionage: Boehner hearings The DC Cir. appellate court panel heard arguments in the Boehner case (see archive), after the U.S. Supreme Court sent it back to be considered in light of the Supreme Court's Bartnicki opinion. Awaiting the outcome over the next few months, are thousands of DC-area politicians hoarding tapes of intercepted communications, and desperately trying to remember from whence they got them. In light of Bartnicki/Boehner a new DC for-profit "cut-out" service has sprung up over night, promising delivery of illegally-garnered surveillance tapes to area media outlets in 30 minutes or less. ;) The case arose when a Florida couple intercepted the discussion of one politician and gave a copy to another politician, who gave it to the New York Times, Atlanta Journal-Constitution and Roll Call, and therefore to all politicians. Boehner sued in '88 based on the disclosure prohibition. The Supreme Court "took" Barnicki ahead of Boehner, which told everybody how they felt about this case. Boehner's counsel is trying to distinguish Bartnicki, reportedly based on the fact that Bartnicki was a true kite/cut-out, whereas the receiver in Boehner knew the identities of the interceptors. (I imagine he's trying to offer a policy argument for weak-link accountability.) A judge asked one of the lawyers if it would be a crime to pay for information that somebody had obtained illegally. I have little faith in the courts as they interpret Bartnicki. Look for this in a national security context. ~Aimee 4121 From: James M. Atkinson Date: Tue Nov 13, 2001 3:18pm Subject: Best Headlines of the Year Here are the best headlines of the year (yes, they are real)... 1. Include Your Children When Baking Cookies 2. Something Went Wrong In Jet Crash, Expert Says 3. Police Begin Campaign To Run Down Jaywalkers 4. Safety Experts Say School Bus Passengers Should Be Belted 5. Drunk Gets Nine Months In Violin Case 6. Survivor Of Siamese Twins Joins Parents 7. Iraqi Head Seeks Arms 8. Prostitutes Appeal To Pope 9. Panda Mating Fails; Veterinarian Takes Over 10. British Left Waffles On Falkland Islands 11. Lung Cancer In Women Mushrooms 12. Eye Drops Off Shelf 13. Teachers Strike Idle Kids 14. Clinton Wins On Budget, But More Lies Ahead 15. Enraged Cow Injures Farmer With Ax 16. Plane Too Close To Ground, Crash Probe Told 17. Miners Refuse To Work After Death 18. Juvenile Court To Try Shooting Defendant 19. Stolen Painting Found By Tree 20. Two Sisters Reunited After 18 Years In Checkout Counter 21. Killer Sentenced To Die For Second Time In 10 Years 22. Never Withhold Herpes Infection From Loved One 23. War Dims Hope For Peace 24. If Strike Isn't Settled Quickly, It May Last A While 25. Cold Wave Linked To Temperatures 26. Deer Kill 17,000 27. Enfields Couple Slain, Police Suspect Homicide 28. Red Tape Holds Up New Bridge 29. Typhoon Rips Through Cemetery; Hundreds Dead 30. Man Struck By Lightening Faces Battery Charge 31. New Study Of Obesity Looks For Larger Test Group 32. Astronaut Takes Blame For Gas In Spacecraft 33. Kids Make Nutritious Snacks 34. Chef Throws His Heart In Helping Feed Needy 35. Arson Suspect Held In Massachusetts Fire 36. Ban On Soliciting Dead In Trotwood 37. Local High School Dropout Cuts In Half 38. New Vaccine May Contain Rabies 39. Hospitals Are Sued By 7 Foot Doctors -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4122 From: Date: Tue Nov 13, 2001 0:49pm Subject: Bush Order: Terror Trials by Military Bush Order: Terror Trials by Military By RON FOURNIER .c The Associated Press WASHINGTON (AP) - President Bush signed an order Tuesday that would allow the government to try people accused of terrorism in front of a special military commission instead of in civilian court. The order, signed by Bush before he left for Crawford, Texas, gives the administration another avenue to bring the Sept. 11 terrorists to justice, White House counsel Albert Gonzales told The Associated Press. ``This is a new tool to use against terrorism,'' Gonzales said in a telephone interview. He said there were precedents in World War II and the Civil War. The White House was to release the order late Tuesday. Gonzales, a former Texas Supreme Court judge who is the president's top lawyer, said a military commission could have several advantages over a civilian court. It is easier to protect the sources and methods of investigators in military proceedings, for example, and a military trial can be held overseas. Gonzales said there may be times when prosecutors feel a trial in America would be unsafe. ``There may not be a need for this and the president may make a determination that he does not want to use this tool, but he felt it appropriate that he have this tool available to him,'' the lawyer said. The order is the latest effort by the administration to toughen the nation's laws against terrorists. After the Sept. 11 attacks, the administration pushed through Congress an anti-terrorism bill that Bush said was vital but civil liberties groups said went to far, violating Americans' constitutional rights. It expands the FBI's wiretapping and electronic surveillance authority and imposes stronger penalties for harboring or financing terrorists. The measure also increases the number of crimes considered terrorist acts and toughens the punishments for committing them. Under the new order, Bush could establish a military commission in the future by asking the secretary of defense to establish the rules for one. ``This does not identify by name who should be exposed to military justice,'' Gonzales said. ``It just provides the framework that, should the president have findings in the future, he could'' order Secretary of Defense Donald H. Rumsfeld to establish such a commission. Gonzales said there is precedent for such panels. President Franklin Roosevelt had World War II saboteurs tried by military commission, as did President Lincoln during the Civil War, the lawyer said. Indeed, Lincoln assassination plotters were tried and convicted by military court, he said. ``This is a global war. To have successful prosecutions, we might have to give up sources and methods'' in a civilian court. ``We don't want to have to do that.'' Gonzalez said: ``Any individual subject to the order would be given a full and fair trial, pursuant to the secretary of defense.'' The administration has been considering both military and civilian trial options. In either scenario, any suspect would retain rights to a lawyer and to a trial by jury. The military proceedings would give the government greater latitude, according to one military law expert. New York attorney Victor St. John said last month, ``A military court would probably have more control over things like media coverage and location. There is certainly a greater sense of security and formality that might keep things from dissolving into a circus.'' AP-NY-11-13-01 1829EST 4123 From: James M. Atkinson Date: Tue Nov 13, 2001 6:30pm Subject: Ex NALI NW Regional Director Being Tried for Murder What, the chipper shredder was out for maintenance that day? Not the brightest bulb in the chandelier. -jma >Monday November 12 03:57 PM EST >Trial Begins For Man Accused Of Murdering Wife >Robert Wendell Walker accidentally shot his wife in a fight over a >gun, the defense will contend when his trial opens Tuesday, while >prosecutors will try to show he murdered her in cold blood. > >Terrie Lee Walker, 45, died Oct. 16 or 17, 2000, in the kitchen of >the couple's Aloha home. > >Walker admitted buying a freezer to store his wife's body, >dismembering it with hand and chain saws and burning the pieces in a >55-gallon drum he fashioned into a burn barrel on their back patio. > >Terrie Walker's remains weren't found until Nov. 4, after neighbors >reported seeing flames and smelling a "pungent, awful odor" for days. > >Deputies checking reports that Terrie Walker was missing saw Robert >Walker poking the fire. > >"This was not necessarily a crime of murder," said Charles Fryer, who >is defending Walker. Washington County District Attorney Robert >Hermann will contend Walker executed his wife with a bullet behind >her left ear. > >Preserved in the ashes was enough to determine she had been shot in >the back of the head at point-blank range. > >Hermann said that even if that doesn't prove murder, Walker's actions >show it wasn't accidental. > >If Walker "felt like this was truly self-defense, particularly with >his expertise, he would be a believer in leaving everything like it >is and explaining to police how it happened," Hermann said. > >Walker told authorities he wiped blood from the kitchen and repaired >bullet holes in the walls and even cut social engagements short to go >home and tend the fire, Washington County Sheriff's Detective Larry >McKinney said. > >Last week, Fryer acknowledged that "as for what happened afterward, >there is no explanation for that." > >Walker told The Oregonian in March that he went into a stress-induced >fog and doesn't remember anything between the shooting and his arrest. > >Doctors are expected to testify for the defense that Walker was on >medication that affected his judgment. > >The day before she died, Terrie Walker learned her husband had lost >his job as a private investigator for a Portland law firm. > >The couple decided to split up, and Terrie Walker was to leave their >home, Walker told detectives. As she did, she came at him with a >knife while he was carrying his .357-caliber Magnum revolver to their >garage to unload it, Walker said. > >He told detectives that he fired a warning shot, possibly hitting her >in the arm. Then she grabbed the gun, Walker said, and it went off >two more times as they struggled. > >Walker has held without bail since his arrest Nov. 3, 2000. > -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4124 From: Aimee Farr Date: Tue Nov 13, 2001 11:31pm Subject: "Lookout Legislation" [I was under the impression that we already have a foreign terrorist "lookout committee" at embassies, and that it has enough problems without being subject to paper, meetings, reporting to a "comprehensive database," and this certification business. I'm sure this is a "good thing," but it smells backdoorish. ~Aimee] ----- Full text at http://thomas.loc.gov S. 1627 To enhance the security of the international borders of the United States. .... This Act may be cited as the `Visa Entry Reform Act of 2001'. *FEINSTEIN* w/ *KYL*, Ms. SNOWE, *Mr. HATCH*, Mr. THURMOND, Mr. BOND, and Mr. KOHL SEC. 2. ESTABLISHMENT OF COMPREHENSIVE LOOKOUT DATABASE. ..... (6) AVAILABILITY OF INFORMATION- Information contained in the lookout database shall be accessible in real time, within guidelines established by the Attorney General, to-- (A) inspectors of the Immigration and Nationality Service or the United States Customs Service at United States ports of entry and consular officers; (B) Federal law enforcement officers and investigators; (C) the intelligence community; and (D) other agencies considered appropriate by the Attorney General. ..... (2) PENALTIES FOR UNAUTHORIZED ACCESS AND DISCLOSURE- Section 1030(a)(1) of title 18, United States Code, is amended by inserting after `Atomic Energy Act of 1954' the following: `or any restricted information that is included in the database required by section 2 of the Visa Entry Reform Act of 2001'. (d) TERRORIST LOOKOUT COMMITTEES- (1) ESTABLISHMENT- (A) REQUIREMENT- Not later than 30 days after the date of enactment of this Act, the Secretary of State shall establish within each United States Embassy a Terrorist Lookout Committee, which shall include the head of the political section and senior representatives of all United States law enforcement agencies, and the intelligence community, under the authority of the chief of mission. (B) COMMITTEE LEADERSHIP- Each Committee shall be chaired by the respective deputy chief of mission, with the head of the consular section as vice chair. (2) MEETINGS- Each Terrorist Lookout Committee established under subsection (a) shall meet at least monthly and shall maintain records of its meetings. Upon the completion of each meeting, each Committee shall report to the Department of State all names submitted for inclusion in the visa lookout system. (3) CERTIFICATION- If no names are submitted upon completion of a meeting under paragraph (2), the deputy chief of mission shall certify to the Secretary of State, subject to potential application the Accountability Review Board provisions of title III of the Omnibus Diplomatic Security and Antiterrorism Act of 1986, that none of the relevant sections of the United States Embassy had knowledge of the identity of any individual eligible for inclusion in the visa lookout system for possible terrorist activity. ..... SEC. 3. IMPLEMENTATION OF A NEW BIOMETRIC `SMARTVISA'. (d) DEVELOPMENT OF STANDARD BIOMETRIC IDENTIFIERS- (1) IN GENERAL- The Attorney General and the Secretary of State, acting jointly, shall develop standard biometric identifiers for the purpose described in section 4(a). (3) READERS AND SCANNERS AT PORTS OF ENTRY- The Attorney General shall install biometric data readers and scanners at each port of entry of the United States no later than 1 year from the date of enactment of this Act. (4) AUTHORIZATION OF APPROPRIATIONS- There are authorized to be appropriated to the Department of Justice and the Department of State such sums as may be necessary to carry out this subsection. SEC. 5. PRESCREENING OF ALIENS PRIOR TO ARRIVAL IN THE UNITED STATES. .... SEC. 6. PASSENGER MANIFEST INFORMATION. ..... SEC. 7. REQUIREMENTS FOR FEDERAL DOCUMENTS. (a) RESISTANCE TO FRAUD AND TAMPERING- ..... ..... (c) FEDERALLY REGULATED DOCUMENTS ISSUED BY STATE AND LOCAL GOVERNMENTS- .... SEC. 8. DENIAL OF FOREIGN STUDENT VISAS TO NATIONALS OF STATE SPONSORS OF INTERNATIONAL TERRORISM. .... SEC. 9. FOREIGN STUDENT MONITORING PROGRAM. SEC. 10. REQUIREMENTS RELATING TO THE ADMISSION OF NONIMMIGRANT ALIENS. ..... 4125 From: Matthew Paulsen Date: Tue Nov 13, 2001 11:14pm Subject: RE: Ex NALI NW Regional Director Being Tried for Murder Hehe.. That's not the best part of the story. He may have pulled a reverse-Fargo action on his wife, but he used not just one or two, but a total of *THREE* get out of jail free cards too soon. Unfortunately, I live in the Beaverton/Aloha/Hillsboro area. AH OREGON! The rain, the homicide. The ambiance is to die for. This was from a feb 21st article: http://seattlep-i.nwsource.com/local/brfs2618.shtml Suspect in wife's killing got a Reagan pardon HILLSBORO, Ore. -- An Oregon man accused of killing his wife and dismembering and burning her body once received a presidential pardon from Ronald Reagan. Robert Wendell Walker Jr., 53, was given a pardon by Reagan in 1981 for an attempted bank robbery and by Oregon Gov. Bob Straub in 1977 for two shoplifting convictions. To be considered for a pardon, an official forgiveness of crimes, petitioners typically apply to the U.S. Justice Department. A recommendation concerning the pardon is made by a pardon attorney who reviews requests and oversees a background investigation. Walker told Washington County, Oregon, detectives that he applied for the pardons without help from a lawyer or any politically connected friends. A Justice Department lawyer confirmed that Walker's application did not include letters to the president from elected officials. It is unknown why Reagan granted the pardon, one of 393 he granted during his eight years in office. Roger Adams, a pardon attorney who works for the U.S. attorney general, cited privacy issues when he refused to release Walker's application. However, state records obtained by The Oregonian reveal Straub's reasoning behind his pardon of Walker, one of 80 the governor issued in four years. Straub wrote that he pardoned Walker because he had turned his life around and was pursuing a law degree. Walker never received the degree, but for three decades he hadn't had a serious brush with the law. That was until Nov. 3, when he was arrested at the home he shared with his wife and their two school-age sons. He was accused of shooting his wife, Terrie Lee Walker, 45, and burning her body in a barrel behind their 3,200-square-foot home. Walker, who is in jail awaiting trial in May, told detectives he shot his wife in self-defense Oct. 17 when she charged him with a knife. More than 30 years ago, Walker tried to rob First National Bank of Oregon in downtown Portland, a federal felony offense. Walker surrendered to the FBI in 1970 for the attempted bank robbery and received five years' probation but no jail time. In his letter to Straub, Walker wrote that at the time of the crimes he was a 21-year-old Portland State University student whose first wife, RoseAnn Marie Reasoner, had just left home with the couple's infant son, Eric. Walker also had been fired from his job loading tractor-trailer rigs, and a bank was threatening to foreclose on a loan for his Portland home, Walker wrote. -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Tuesday, November 13, 2001 4:30 PM To: TSCM-L Mailing List Subject: [TSCM-L] Ex NALI NW Regional Director Being Tried for Murder What, the chipper shredder was out for maintenance that day? Not the brightest bulb in the chandelier. -jma >Monday November 12 03:57 PM EST >Trial Begins For Man Accused Of Murdering Wife >Robert Wendell Walker accidentally shot his wife in a fight over a >gun, the defense will contend when his trial opens Tuesday, while >prosecutors will try to show he murdered her in cold blood. > >Terrie Lee Walker, 45, died Oct. 16 or 17, 2000, in the kitchen of >the couple's Aloha home. > >Walker admitted buying a freezer to store his wife's body, >dismembering it with hand and chain saws and burning the pieces in a >55-gallon drum he fashioned into a burn barrel on their back patio. > >Terrie Walker's remains weren't found until Nov. 4, after neighbors >reported seeing flames and smelling a "pungent, awful odor" for days. > >Deputies checking reports that Terrie Walker was missing saw Robert >Walker poking the fire. > >"This was not necessarily a crime of murder," said Charles Fryer, who >is defending Walker. Washington County District Attorney Robert >Hermann will contend Walker executed his wife with a bullet behind >her left ear. > >Preserved in the ashes was enough to determine she had been shot in >the back of the head at point-blank range. > >Hermann said that even if that doesn't prove murder, Walker's actions >show it wasn't accidental. > >If Walker "felt like this was truly self-defense, particularly with >his expertise, he would be a believer in leaving everything like it >is and explaining to police how it happened," Hermann said. > >Walker told authorities he wiped blood from the kitchen and repaired >bullet holes in the walls and even cut social engagements short to go >home and tend the fire, Washington County Sheriff's Detective Larry >McKinney said. > >Last week, Fryer acknowledged that "as for what happened afterward, >there is no explanation for that." > >Walker told The Oregonian in March that he went into a stress-induced >fog and doesn't remember anything between the shooting and his arrest. > >Doctors are expected to testify for the defense that Walker was on >medication that affected his judgment. > >The day before she died, Terrie Walker learned her husband had lost >his job as a private investigator for a Portland law firm. > >The couple decided to split up, and Terrie Walker was to leave their >home, Walker told detectives. As she did, she came at him with a >knife while he was carrying his .357-caliber Magnum revolver to their >garage to unload it, Walker said. > >He told detectives that he fired a warning shot, possibly hitting her >in the arm. Then she grabbed the gun, Walker said, and it went off >two more times as they struggled. > >Walker has held without bail since his arrest Nov. 3, 2000. > -- ---------------------------------------------------------------------------- -------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- -------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------------- -------------- "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ---------------------------------------------------------------------------- -------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4126 From: Date: Wed Nov 14, 2001 4:51am Subject: Airport security From: David-john Robinson [mailto:david_johnrobinson@h...] Sent: Tuesday, November 13, 2001 6:52 AM To: aimee.farr@p... Subject: Re: [TSCM-L] FW: Significant Terrorist Incidents, 1961-2001: A Chronology Hi I'm new to the group having joined about a month ago , but I would like to tell the group about a project I am working on for an overseas government. We were approached to provide security for the Government and Airlines in this "now friendly" country. Firstly they are having "sky marshals" in Overt jackets (level IIIA) armed with Air Tasers (c/w Laser sights) and carrying the usual masks etc. 2 men per aircraft. Secondly they are "considering" human bar code readers within the airport. The way this works is when you collect your boarding card your finger print is electronically scanned and from this a Human bar code is produced This bar code is on all paper work, it can be used and swiped at Duty free etc. The finger print is examined by immigration etc at an early stage. (you have 2 hours before they board the aircraft) Stop and detain can either happen at the airport or a message sent to stop them at the other end if needed, in case of problems with extradition etc. Prior to boarding the aircraft an electronic finger print reading is taken to confirm the right person boards the aircraft. On arrival at the new airport a final reading is taken to verify arrival - this gives the new airport a finger print record as well. These people do not have a problem with civil liberty ( 'cos they don't have any) but there is a chance that it could be used in Western airports if this was sorted - of course it will only work if ALL airports opt in. Total time for scan = 6 seconds As Heathrow are installing retinal scanning at the international departure and arrival terminals this month is it so far off that we won't all be checked. As a regular flier I know which option I would rather be subjected to. I would appreciate the groups thoughts David J Robinson CEO Department Q (UK) +44 (0)1903 787943 4127 From: Date: Wed Nov 14, 2001 4:56am Subject: James Atkinson's headlines You might like to add the headline from The Guardian here in UK last month: "Whole of Europe behind Bush" David J Robinson CEO Department Q +44 (0)1903 787943 4128 From: Rob Muessel Date: Wed Nov 14, 2001 7:36am Subject: Headlines My all time favorite is: Architect Edward Durrell Stone Dead at 66. -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 4129 From: James M. Atkinson Date: Wed Nov 14, 2001 7:33am Subject: Guard's lapse delays 400 at Logan [The only way that they are going to stop this kind of behavior is to totally clear out the private firms from the primary screening point, and move the entire security perimeter into the hands of the federal government (preferably the military). If the individual airlines wants to implement a secondary security perimeter that screens passengers just as they board the plane using the private firms, then OK... but never as the primary screeners. I have personally witnessed unmanned metal detectors and check points (both at Logan and other cities), and it is getting damn ridiculous. In the last year alone (pre 9/11) I have witnessed two separate incidents in the U.S. where 140 people (between the two locations) walked though completely unmanned, and completely unsecured checkpoints. -jma +++++ http://www.boston.com/dailyglobe2/318/metro/Guard_s_lapse_delays_400_at_Logan+.shtml Guard's lapse delays 400 at Logan By Douglas Belkin, Globe Staff, 11/14/2001 The departures of at least 400 Delta Air Lines passengers were delayed by 90 minutes yesterday morning at Logan International Airport after a guard from the beleaguered Argenbright Security firm left a door unguarded, prompting officials to conduct a complete sweep of the area before anyone could board, officials said. Argenbright suspended a security guard and a checkpoint screening supervisor after the security lapse, the company said in a statement. It was the second time an Argenbright guard has left a post unattended at Logan since the Sept. 11 terrorist attacks. A deputy US marshal noticed that the post was unattended at 9:30 a.m. and alerted Massport, prompting an evacuation of the terminal and the re-screening of passengers waiting in Terminal C. Passengers in one gate area had to wait until State Police with bomb-sniffing dogs checked the Delta pier before they could disembark, said Massport spokesman Phil Orlandella. A spokesman for Argenbright said the post was left unguarded for only 3 or 4 minutes, but Orlandella said the time didn't matter. ''If it was 10 seconds or 4 minutes we would have to close them down,'' Orlandella said. ''Someone could have walked through that exit unchecked.'' Timothy Bane, chief deputy US marshal, said the guard got permission to leave his post and a supervisor failed to replace him. On Sept. 29 a security guard at the US Airways terminal in Logan walked away from his post, which resulted in the evacuation of the entire B terminal and the re-screening of all passengers. Thomas Kinton, interim executive director of the Massachusetts Port Authority, which operates Logan, said the delay and the re-screening of all the passengers in the terminal is standard protocol since the terrorist attacks in Washington and New York. ''That's going to be the norm in this industry when there's any question relative to security, as to whether or not it was done correctly,'' Kinton said. Argenbright, which is based in Atlanta, has recently come under fire for security problems. Last week, its guards let a man pass through a metal detector at Chicago's O'Hare Airport with seven knives and a stun gun before a flight crew stopped him. Seven Argenbright checkpoint security workers and their supervisor were suspended. Last year, the company was placed on probation and fined $1.2 million by a federal judge in Philadelphia for hiring workers with felony records and lying to the government about background checks. And last month, Argenbright was back in court, again accused of hiring felons, this time at 14 airports nationwide. A federal judge extended Argenbright's probation by two years. The company's recent problems have occurred as Congress is debating whether to make all baggage screeners in the nation's airports federal employees. Senate majority leader Tom Daschle has said that Argenbright ''should be fired across the board.'' The company promised to retrain its workforce and last Friday fired its chief executive and founder, Frank Argenbright Jr., and hired David Beaton, an executive from Securicor, Argenbright's London-based parent firm. Raphael Lewis of the Globe Staff contributed to this report This story ran on page B5 of the Boston Globe on 11/14/2001. © Copyright 2001 Globe Newspaper Company. -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4130 From: David Alexander Date: Wed Nov 14, 2001 7:38am Subject: Cross-posting I noticed the post from Mike: >This JUST Posted on Computer Forensics list. >later4,mike f. ============================================================================ ============================================ > In light of JMAs stipulation that there should no cross-posting (which I completely agree with), this ought to work both ways and we should respect other groups and lists by not posting in. Treat others as you want them to treat you is a good rule of thumb. My 2c. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4131 From: Matthew Paulsen Date: Wed Nov 14, 2001 7:50am Subject: RE: Guard's lapse delays 400 at Logan Speaking of physical security points - I was at the US DOE's Bonneville Power Administration last night for a meeting. I was last there in after the first WTC bombing. Difference? WTC Bombing 1 | WTC Bombing 2 1 entrance / exit | 2 entrances /exits LOTS of Barricades | Some barricades No parking within "x" meters | Park in front or back, just pull on up. No stair or elevator use | No stair or elevator use No use of restrooms | escorted restroom use only 1 armed guard | 2 armed guards until 6, then 1. Seems to me that even Federal locations have some issues on their hands with implementing security properly. -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Wednesday, November 14, 2001 5:33 AM To: TSCM-L Mailing List Subject: [TSCM-L] Guard's lapse delays 400 at Logan [The only way that they are going to stop this kind of behavior is to totally clear out the private firms from the primary screening point, and move the entire security perimeter into the hands of the federal government (preferably the military). If the individual airlines wants to implement a secondary security perimeter that screens passengers just as they board the plane using the private firms, then OK... but never as the primary screeners. I have personally witnessed unmanned metal detectors and check points (both at Logan and other cities), and it is getting damn ridiculous. In the last year alone (pre 9/11) I have witnessed two separate incidents in the U.S. where 140 people (between the two locations) walked though completely unmanned, and completely unsecured checkpoints. -jma +++++ http://www.boston.com/dailyglobe2/318/metro/Guard_s_lapse_delays_400_at_Loga n+.shtml Guard's lapse delays 400 at Logan By Douglas Belkin, Globe Staff, 11/14/2001 The departures of at least 400 Delta Air Lines passengers were delayed by 90 minutes yesterday morning at Logan International Airport after a guard from the beleaguered Argenbright Security firm left a door unguarded, prompting officials to conduct a complete sweep of the area before anyone could board, officials said. Argenbright suspended a security guard and a checkpoint screening supervisor after the security lapse, the company said in a statement. It was the second time an Argenbright guard has left a post unattended at Logan since the Sept. 11 terrorist attacks. A deputy US marshal noticed that the post was unattended at 9:30 a.m. and alerted Massport, prompting an evacuation of the terminal and the re-screening of passengers waiting in Terminal C. Passengers in one gate area had to wait until State Police with bomb-sniffing dogs checked the Delta pier before they could disembark, said Massport spokesman Phil Orlandella. A spokesman for Argenbright said the post was left unguarded for only 3 or 4 minutes, but Orlandella said the time didn't matter. ''If it was 10 seconds or 4 minutes we would have to close them down,'' Orlandella said. ''Someone could have walked through that exit unchecked.'' Timothy Bane, chief deputy US marshal, said the guard got permission to leave his post and a supervisor failed to replace him. On Sept. 29 a security guard at the US Airways terminal in Logan walked away from his post, which resulted in the evacuation of the entire B terminal and the re-screening of all passengers. Thomas Kinton, interim executive director of the Massachusetts Port Authority, which operates Logan, said the delay and the re-screening of all the passengers in the terminal is standard protocol since the terrorist attacks in Washington and New York. ''That's going to be the norm in this industry when there's any question relative to security, as to whether or not it was done correctly,'' Kinton said. Argenbright, which is based in Atlanta, has recently come under fire for security problems. Last week, its guards let a man pass through a metal detector at Chicago's O'Hare Airport with seven knives and a stun gun before a flight crew stopped him. Seven Argenbright checkpoint security workers and their supervisor were suspended. Last year, the company was placed on probation and fined $1.2 million by a federal judge in Philadelphia for hiring workers with felony records and lying to the government about background checks. And last month, Argenbright was back in court, again accused of hiring felons, this time at 14 airports nationwide. A federal judge extended Argenbright's probation by two years. The company's recent problems have occurred as Congress is debating whether to make all baggage screeners in the nation's airports federal employees. Senate majority leader Tom Daschle has said that Argenbright ''should be fired across the board.'' The company promised to retrain its workforce and last Friday fired its chief executive and founder, Frank Argenbright Jr., and hired David Beaton, an executive from Securicor, Argenbright's London-based parent firm. Raphael Lewis of the Globe Staff contributed to this report This story ran on page B5 of the Boston Globe on 11/14/2001. © Copyright 2001 Globe Newspaper Company. -- ---------------------------------------------------------------------------- -------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- -------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------------- -------------- "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ---------------------------------------------------------------------------- -------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4132 From: David Alexander Date: Wed Nov 14, 2001 7:43am Subject: Politicians and the truth With regard to 'The only time a politician is not lying is when he is telling you a half truth' I thinks it's easy to tell when a politician is lying - his lips move. My 2c David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4133 From: Aimee Farr Date: Wed Nov 14, 2001 8:54am Subject: Quote-of-the-day http://www.whitehouse.gov/news/releases/2001/11/20011113-4.html Joint Statement on New U.S.-Russian Relationship "The United States and Russia will cooperate, including through the support of direct contacts between the business communities of our countries, to advance U.S. Russian economic, trade, and investment relations...." [...] ~Aimee 4134 From: Aimee Farr Date: Wed Nov 14, 2001 10:31am Subject: FSB Radiation Bust. Wednesday, Nov. 14, 2001. Page 4 http://www.themoscowtimes.com/stories/2001/11/14/031.html Radiation Bust MOSCOW (MT) -- Two residents of the Sverdlovsk region were detained by local the Federal Security Service for trying to sell three containers of radioactive materials, Interfax reported Tuesday. The containers of cobalt-60, a radioactive form of the common metal cobalt, were stolen from a regional industrial plant. The containers were emitting radiation 2000 times above the accepted safety levels of about 30 micro roentgen per hour. The regional FSB launched a criminal case against the detainees based on an article of the Criminal Code that prohibits unsanctioned use and transactions of nuclear and radioactive materials. ----- 4135 From: D. Douglas Rehman Date: Wed Nov 14, 2001 3:19pm Subject: FW: Verizon Consultant?? The below message is forwarded from another list with permission of the author. Please contact Mr. Paroff directly. Best Regards, Doug Rehman Rehman Technology Services, Inc. Specializing in Computer Forensics and Technology Related Investigations License A-9800119 Mount Dora, Florida (Orlando Area) (352)357-0500 http://www.surveil.com ******************************************************************* From: Paroff, Jason [mailto:jparoff@K...] Sent: Wednesday, November 14, 2001 3:59 PM To: Subject: Verizon Consultant?? Looking for someone who is intimately familiar with Verizon and its service of the New York City Telecom market - i.e. its capacity, infrastructure, servicing of customers, etc. This person cannot be currently working for Verizon. New York City market only, please. Anyone on the list know of such a person? Jason Paroff Managing Director - Computer Forensic Services Kroll Information Security Group 212-833-3260 jparoff@k... * * * * * * * * * * * * * * * * * * * * * * * * * 4136 From: Date: Wed Nov 14, 2001 4:25pm Subject: re:Article in Information Security MAg. Nice article about JMA in November issue of INFORMATION SECURITY. Lookin'good SteveP [Non-text portions of this message have been removed] 4137 From: DrPepper Date: Thu Nov 15, 2001 9:05am Subject: Yet another "Best headlines of the year" POLICE STATION TOILET STOLEN Cops have nothing to go on. -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 4138 From: DrPepper Date: Thu Nov 15, 2001 9:30am Subject: Cameras to be installed in cockpits of all CML aircraft In an effort to cope with new safety and security requirements, the cockpits of all commercial aircraft will be fitted with video cameras in the near future, as soon as initial testing is completed. http://www1.iwvisp.com/DrPepper/geezer/pilots.jpg -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 4139 From: Richard Thieme Date: Wed Nov 14, 2001 9:00pm Subject: Re: re:Article in Information Security MAg. I thought it was pretty good. At 05:25 PM 11/14/2001 -0500, preflat@p... wrote: > Nice article about JMA in November issue of INFORMATION SECURITY. > >Lookin'good > > > >SteveP > > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4140 From: James M. Atkinson Date: Thu Nov 15, 2001 6:15pm Subject: Espionage thriller 24 keeps viewers on edge Espionage thriller 24 keeps viewers on edge http://www.thestar.com//NASApp/cs/ContentServer?GXHC_gx_session_id_=10d3c063ae8f7e2a&pagename=thestar/Layout/Article_Type1&c=Article&cid=1005649386365&call_page=TS_News&call_pageid=968332188492&call_pagepath=News/News A lot of attention being paid to timing details: Fox series co-star From Canadian Press It takes a little bit of ingenuity to act in a 24-part series that captures every minute of a 24-hour day in the life of a counter-terrorist organization. Every time you step in front of the camera you have to remember that, even after months of filming, only hours have gone by, says actor Leslie Hope, co-star of the Fox TV thriller series 24 which airs Tuesdays. "There's a lot of attention being paid to make the timing details credible," says Hope, who was born in Halifax but now lives in Los Angeles. Even details as nit-picky as her wilting wardrobe - it's up to the studio's crew to make sure her hair and outfit gets just a little more rumpled as the series progresses. "There's strict continuity on dirt and fabric breakdown and stuff like that," Hope said in an interview during a recent trip to Toronto. "I've got to tell you, I've been working for 20 years and I couldn't be happier that I don't have to change my clothes. I love it that I know exactly what I'm wearing every day, I don't have to deal with hair, I just go to work." Hope co-stars with fellow Canadians Kiefer Sutherland, Elisha Cuthbert and Mia Kirshner in the series, a harried day-in-the-life drama surrounding a counter-terrorist agent and his family. Sutherland, as special agent Jack Bauer, must track down a rogue assassin intending to kill a presidential candidate, while Hope, as Bauer's wife Teri, searches the streets of Los Angeles for their missing teenage daughter (Cuthbert). The narrative follows a strict minute-by-minute chronology of events, sometimes necessitating split-screen shots as events happen simultaneously. The minutes tick away even during commercials. Coming so soon on the heels of the terrorist attacks on the United States makes 24's subject matter extremely sensitive: its producers have already cut four seconds of video depicting an airliner exploding. But the show likely won't fuel public paranoia about terrorist attacks or make viewers uncomfortable, says Hope. "It's not really what the show's about," says Hope. "I don't think we're doing a show about terrorists or about what makes a terrorist tick. I think what makes the show work is how this regular guy navigates an incredibly difficult night and how he's trying to save a presidential candidate, his daughter, his relationship and his moral centre in the middle of a completely trying and difficult time." When the Sept. 11 attacks came, the cast and crew of 24 were filming their 11th episode. Concerns for friends and family came first, says Hope. Worrying about the theme of the show was secondary. If the events of that day had any impact on the filming, it wouldn't be noticeable in any case, says Hope. "On show 11 we have every reason in the world to be tense, overwhelmed, strung out, exhausted, emotionally drained. As in real life, that's where we were in the show." Having four Canadian co-stars in an American production was a novel experience, says Hope. But it came as little surprise, considering producers Joel Surnow and Robert Cochran worked last on the Canadian-based series La Femme Nikita. "I actually was reluctant to tell them I was Canadian because there's a little bit of an anti-Canada backlash happening in the States now with all the work coming up here," Hope says. "It slipped out one day and I thought, `Oh damn, now I'm going to hear it.' But it turned out to be such a bonus because they were completely enamoured with Canadians." Though she has spent her entire working career in Los Angeles, Hope returns often to visit with her parents in Nova Scotia. "I never think of Canada as anything but my home - I've lived a long time in L.A. and I'm an American citizen now too, so I'm both - but I always think of myself as Canadian." -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4141 From: James M. Atkinson Date: Thu Nov 15, 2001 6:18pm Subject: Apple Beefs Up Encryption in AirPort [Oh heck, now it will take an extra 75 milli-seconds for a decrypt ;-) -jma] November 14, 2001 Apple Beefs Up Encryption in AirPort http://www.eweek.com/article/0,3658,s%253D701%2526a%253D18459,00.asp Special to eWEEK With less fanfare than one might expect, Apple Computer Inc. announced on Tuesday the release of AirPort 2 software and hardware updates, which add features the company hopes will make the 11M-bps, 802.11a-based wireless networking package more attractive to enterprise, consumer and educational customers. Though many of the technologies have been available in recently distributed versions of AirPort cards (such as those purchased with recent iBooks or PowerBooks), this is the first time existing users could update their products to the new features. For the enterprise-level customer, AirPort 2 will offer 128-bit (up from 40-bit) encryption, raising AirPort security to a level compatible with some of the most stringent standards. In the past, AirPort 2 has been criticized for use of the relatively easily broken 40-bit encryption. As such, it made AirPort-based wireless networks a less-than-ideal solution for environments in which confidential information was being passed. AirPort 2 will also support up to 50 users, compared the previously recommended limit of ten users. AirPort 2 is primarily a software upgrade, said Apple spokesperson Nathalie Welch, and the new version should be compatible with all existing AirPort Base Stations. But buyers of new Base Stations will find a new 10/100 BASE-T Ethernet port on the back of the unit. This, said Welch, will enable owners to take advantage of a new built-in firewall feature, which uses NAT (Network Address Translation). Owners of older models, even though they may upgrade the software, will need to use some other firewall solution. This is in addition to the existing RJ-45 10 BASE-T port for area network or DSL connections and the RJ-11 connector for modems. Also new to AirPort 2 will be support for the open RADIUS (Remote Authorization Dial-In User Service) standard, which, Welch said, will allow administrators of roaming networks (i.e., networks using two or more AirPort Base Stations) to update access control lists and store them on a remote server. Welch said that the AirPort 2 software will be compatible with Mac OS 9.0.4 and later as well as with Mac OS X; there will be no backwards compatibility with earlier versions of Apple's operating systems. The services available for those using AirPort-equipped Power Mac desktops as software-based Base Stations is slightly limited, Welch said, but it will include support for computer-to-computer transfer of files and for use in multiplayer gaming. In addition, Welch said that the entire software-based base station capability may not be available at all for users running Mac OS X. When asked if Apple was planning to add support for any of the new variants of the 802.11 wireless networking standard, such as the 54M bps 802.11, Welch said that Apple is "always evaluating" new technologies but could not comment at this time. The software updater is available for free download at Apple's Web site. -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ From: Rui Shantilal Date: Fri Nov 12, 2004 6:51am Subject: Re: Re: Microphones and internet (Part 2) Check the processes that the machine is running and look for something suspicious. (www.sysinternals.com tools will help u on this) On the other hand, monitor your network connections to understand if there is any weird traffic in your perspective, use for example, ethereal for this ! regards rs On Fri, 12 Nov 2004 00:12:13 -0000, Brian Noble wrote: > > > > I would also search for files that have been created or modified in > the last few days to see if there could be audio files. Each file > will need to be examined. A program could be saving small bits of > audio to a file and sending them out periodically much like a > keylogger does. If the computer in question is on a local network be > sure to check the drives that the suspect computer can access. > One question for the hardware people here if the mic is not external > to the computer but internal to the case how would you get around > the fans and harddrive noise? > > Brian Noble > > > > > > --- In TSCM-L@yahoogroups.com, Rui Shantilal wrote: > > > > Check the processes that the machine is running and look for > something > > suspicious. > > > > On the other hand, monitor your network connections to understand > if > > there is any weird traffic in your perspective, use for example, > > ethereal for this ! > > > > regards > > > > rs > > > > > > On Wed, 10 Nov 2004 15:21:34 -0800 (PST), Jan Vandenbos > > wrote: > > > > > > Btw, this is all assuming the recorded conversations > > > are leaving the machine over the net in some fashion > > > or another. > > > > > > I'd also do a search (using a forensic tool, or > > > something like Agent Ransack (again, > > > http://www.download.com) and look for files with the > > > following extensions > > > > > > .au, .wav, .mp3, .aa, .ra, .ram., ... > > > > > > I'd also search inside archive files (like .zip, > > > .rar). > > > > > > This is still not guaranteed, since recording software > > > might be using its own internal mechanisms for > > > encoding/storing the audio streams. > > > > > > If the 'recording' software is storing the recorded > > > audio on the local hard drive (rather than a live > > > connection over the net), then there will need to be > > > some way for the perp to pull the data off the system > > > either: > > > > > > 1) The perp has physical access to the machine - > > > probably on a somewhat regular basis > > > > > > 2) The system/malicious monitoring software transmits > > > the audio files on a regular basis (ie. via email or > > > other batch network job) > > > > > > 3) The perp has remote access to the machine to get > > > access to the files. > > > > > > As a side note - Microphones on PC's concern me > > > (especially considering the prevalence of microphones > > > in laptops and PDA's these days), but I'm also > > > concerned about cameras/webcams plugged into > > > computers. One would imagine it wouldn't be a > > > difficult effort to distribute software that turned on > > > web cameras as well as Microphones on machines one > > > wanted to monitor. > > > > > > Jan > > > > > > > > > --- Jan Vandenbos wrote: > > > > > > > > > > > Lots of comments out there on the web and discussion > > > > in the past on this topic... > > > > > > > > Ie: > > > > > > > > > > > http://www.landfield.com/isn/mail-archive/1999/Apr/0036.html > > > > > > > > First things I'd check (Basic I know, but important) > > > > - > > > > also this is all assuming this is windows... (If its > > > > on a unix/Linux variant machine I can send > > > > instructions for that too) > > > > > > > > 1) Start->Run->Control Panel->Add/Remove Programs - > > > > and look for programs that you don't recognize. > > > > > > > > 2) Bring up the Task manager (differs depending on > > > > your version of windows), and look under the > > > > Processes > > > > tab for unusual program. If you search for each > > > > program name on the Internet there are many sites > > > > that > > > > identify these programs for you and you can check > > > > which should be there or not. > > > > > > > > 3) Check the startup group > > > > (Start->Programs->Startup), > > > > and also the Windows Registry sections 'Run', 'Run > > > > Once', 'Run Service', etc... for strange programs. > > > > An > > > > easy way to do this is to grab 'Startup Mechanic' > > > > off > > > > http://www.download.com or similar site. Startup > > > > mechanic will list all the programs set to start > > > > when > > > > the computer boots, and will give you a starting > > > > place > > > > to look for malicious software. > > > > > > > > 4) Go to the command prompt (Start->Run->CMD) > > > > and type in 'netstat -a'. > > > > > > > > Unless malicious software has done a good job in > > > > hiding itself - you should see some trace at least > > > > in > > > > the netstat -a. > > > > > > > > FWIW, the Netstat -a shows a list of all the network > > > > connections on the host. If someone were listening > > > > full time with some kind of remote mic activiation > > > > software, you'd probably see a live connection to > > > > their IP address in that list (you might have to go > > > > through each one and find out which ones are > > > > suspicious). > > > > > > > > If you want, send me the output of that 'netstat -a' > > > > command direct via email and I can share thoughts on > > > > what looks suspicious. > > > > > > > > Assuming on the other hand that any purported > > > > malicious software was installed and was capable of > > > > hiding itself, another good way would be to plug a > > > > 'network sniffer' in between the machine in question > > > > and the Internet (use a hub, not a switch if you're > > > > doing this - I can explain why offline if you need). > > > > > > > > > > > > Look at the traffic going back and forth between > > > > that > > > > machine and other hosts on the Internet and see if > > > > any > > > > of the traffic looks suspicious. > > > > > > > > Start with the machine idle. You'll probably see a > > > > fair bit of traffic anyways (instant messaging and > > > > other network keep alive traffic), but it'll make it > > > > easier to single out suspicious traffic. > > > > > > > > Hope that helps... If you need more detail, feel > > > > free > > > > to drop me a note offline. > > > > > > > > Jan > > > > > > > > --- sewellr@i... wrote: > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > A local police department suspects someone of > > > > > putting a hidden microphone > > > > > in a room and accesses the audio via the internet > > > > > (the room has a computer > > > > > connected to the internet). If this was the case, > > > > > how would the bad guy do > > > > > it? Software covertly installed on the computer? > > > > > What would you look for > > > > > physically (other than a microphone, of course)? > > > > > > > > > > Sgt. Kirk Sewell > > > > > Illinois State Police, Technical Investigations > > > > > 500 Iles Park Place, Suite 300 > > > > > Springfield, IL 62718 > > > > > (217) 524-6079 office > > > > > (217) 467-4211 pager > > > > > (217) 836-0919 mobile > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > the hands acquire shaking, the shaking is a warning. > > > It is by caffeine alone I set my mind in motion. > > > =================================================== TSKS > > > > > > > > > > > > Yahoo! Groups Sponsor > > > > > > > > > Get unlimited calls to > > > > > > U.S./Canada > > > > > > ________________________________ > > > Yahoo! Groups Links > > > > > > To visit your group on the web, go to: > > > http://groups.yahoo.com/group/TSCM-L/ > > > > > > To unsubscribe from this group, send an email to: > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of > Service. > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > > Yahoo! Groups Sponsor > > ADVERTISEMENT > > > > > ________________________________ > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 10106 From: James M. Atkinson Date: Fri Nov 12, 2004 9:15am Subject: Defendant: Microsoft source code sale was a setup Good article, interesting case, well done. -jma http://www.securityfocus.com/news/9912 Defendant: Microsoft source code sale was a setup By Kevin Poulsen, SecurityFocus Nov 11 2004 5:38PM A 27-year-old Connecticut man facing felony economic espionage charges for allegedly selling a copy of Microsoft's leaked source code for $20 says he's being singled out only because the software giant and law enforcement officials can't find the people who stole the code in the first place. "They're using me as an example, to show if you do something like this, they're going to [work] you over," said William Genovese, in a telephone interview Thursday. "Why go after me? Why not go after the guy who took the code? Why not go after the guy who released it on the net?" In February, two 200 megabyte files containing incomplete portions of the source code for the Windows 2000 and Windows NT operating systems appeared on websites and peer-to-peer networks around the world. Evidence in the files pointed to Microsoft partner Mainsoft, a developer of Unix tools for Windows, as the original source, but how the files were leaked, and by whom, remains a mystery. What distinguishes Genovese from perhaps thousands of other curious computer geeks who shared the proprietary source code at the time is a short message he posted to his website, illmob.org -- a hacker destination from which he distributes open source intrusion tools written under his handle, "illwill." "Everyone was throwing up Bit Torrent links and downloading it on IRC," says Genovese. "I wrote on my website, joking, I have it, and if anybody wants it they can donate to my site." Genovese claims he meant it as a joke, and he was surprised when someone actually responded a few days later and asked how much he should donate. "I was laughing, because I thought it was somebody stupid who wanted it and didn't know how to download it," he says. The stranger gave Genovese $20 through the PayPal donation button on his website, and Genovese let him download a copy of the source code from his server. In July, the same man contacted Genovese again. "He e-mailed me again and said he had formatted his computer and basically he wanted to download the source again," says Genovese. "I didn't have it any more, and he said if you can find it I'll send you more money just for the hassle." Genovese says he found the files easily on a peer-to-peer network, and again provided them to the donor. He isn't laughing anymore. According to court records, the mysterious donor was actually an investigator with an unnamed online security firm that Microsoft had hired to track people sharing the source code online. After the first "sale" was complete, Microsoft reported Genovese to the FBI. The Bureau took the case seriously, and the Microsoft investigator arranged the second transaction at the FBI's request. 'Economic Espionage' Armed with a federal criminal complaint out of Manhattan, FBI agents converged on Genovese's Connecticut home early Tuesday morning, searched his condo and arrested him. Now free on a $50,000 signature bond, Genovese stands accused of violating the 1996 Economic Espionage Act. Passed to meet the perceived threat of foreign espionage against American companies, the Economic Espionage Act carries up to ten years in prison for stealing trade secrets for personal financial gain, or for a third party's economic benefit. For the first five years of its existence the law could only be used with approval from the Justice Department in Washington -- a limitation that was lifted in March, 2002. The $20 payment is what opened to door for prosecutors to invoke the rarely-used law, says attorney Jennifer Granick, executive director of the Stanford Center for Internet and Society. "The statute requires you to act for the economic benefit of someone other than the trade secret owner," she says. "The real question is whether this information remains a trade secret after it is globally available to anyone with an Internet connection," says Granick. "This is something that the courts have been grappling with, so it's pretty shocking that the government would pursue criminal charges for something that the civil courts can't even agree on." Government offices were closed Thursday for Veteran's Day. Microsoft declined to comment for this story. Although the complaint describes him as a "vendor" of stolen source code, Genovese says the only person who took his website post seriously was Microsoft's undercover agent. He claims that the same person later purchased another widely-traded underground file, the Paris Hilton video, for a $15 payment, though the transaction escaped mention in the complaint. If convicted, under federal sentencing guidelines Genovese's sentence would be based on the value of the source code, if any, and his criminal history: Genovese has a conviction for intruding into private user's computers in 2000 and spying on their keystrokes, for which he was sentenced to two years of probation. "It happened right after I got my computer," he says. "I started using Trojan horses and stuff like that, and I ended up getting in trouble." ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 10107 From: Date: Fri Nov 12, 2004 8:28am Subject: Re: Re: suggestions on a portable USB .... ...and the linux utility would be ? On Fri, 12 Nov 2004 11:38 -0400, wrote: > > Why would the write blocker matter, isn't it just a bridge device that > performs direct calls to the drive? Which blocker will do HPA? > > Sorry about the off-topic thread. > > > ...... Original Message ....... > On Thu, 11 Nov 2004 05:11:58 -0800 (PST) DATA_4N6_Engineering > wrote: >> >> >> I have seen drives that use HPA, and all of the systems I sell have the > operating system plus the ability to have a static restore in HPA. One > of > the main reasons it hasn't been found is, firewire and usb write blockers > do not allow the identification of HPA. Encase will see it in DOS only > and > only after you tell it to look at the ATA drive. I worked with XWays > forensics to modify their Replica software for imaging, initially it did > not see the HPA I created. Also Prodiscover will identify HPA if you > use > the correct write blocker. Many drives have been modified, its technique > that allows the discovery, many manufacturers will sell a larger capacity > drive with HPA enabled to meet a specific sales need or shortage. Many > manufacturers use HPA for their factory restores, so its out there, its > using the right tools and knowing how to identify HPA. Mark Menz has a > utility called driverid that will identify HPA and disable for use with > other write block devices, and he offers the >> only write block with published specifications that allows for access to > the firmware to see HPA. I have done extensive testing to confirm That > ability of Write blockers, and found firewire and USB to be lacking. > You > have to document, check and recheck to make sure you have all the sectors > of a drive, and use the right software. As a added note, Linux will not > see HPA unless you use a utility to change the firmware setting of the > drive. And you have to make sure the change is temporary and when > powered > off does not change the drive, other wise you will have problems with > modifying the data, and destroying evidence. And if its password > protected > your out of luck. Viewing of the restore in HPA is tradecraft and > invlolves many other steps. >> But if I wanted to hide something, I would use HPA(password protected), > chances are it would not be found. >> >> Jon Asdourian >> Data Forensics Engineering >> >> telos888@y... wrote: >> Have you ever found anything in the HPA in a real-world situation? Do >> you >> know of anyone who has? >> >> There are lots of shenannigans that can happen there, but I haven't >> talked >> to anyone yet that found a modified HPA "in the wild" so to speak (e.g. >> modified geometry). >> >> >> ...... Original Message ....... >> On Mon, 18 Oct 2004 05:39:05 -0700 (PDT) DATA_4N6_Engineering >> wrote: >>> >>> >>> USB is microprocessor intensive, firewire is not. I have tested most >>> of >> the write blocker units and have found the throughput for USB to be >> unsatisfactory. I only use write blockers designed and based on NIST >> standards for SCSI and IDE drives including Raid. I have a firewire >> write >> blocker and it's throughput is much faster than my USB unit. I try to >> image all drives in their native interface. I really don't like >> firewire >> or USB write blockers. If I have to go to DOS on some occasions, my >> write >> blockers are easy to implement, and I don't have to worry about special >> drivers for USB and Firewire. I have found many incompatibilities with > USB >> and firewire units, and if you have to preview a drive, you will never >> be >> able to view the HPA with USB or Firewire write blocks. With my write >> blocks and portable machine I can be assured of compatibility for any >> drive, except possible for RLL and MFM and I haven't seen any of those >> for >> a while, although I do keep a controller card around >>> just in case. >>> >>> >>> Jon Asdourian >>> Data Forensics Engineering >>> >>> >>> >>> telos888@y... wrote: >>> Wonder why everything out there is Firewire instead of USB 2.0. USB >>> 2.0 >>> has a higher throughput than 1394a doesn't it (480 Mbp/s vs 400 Mbp/s)? >>> >>> >>> ...... Original Message ....... >>> On Sat, 16 Oct 2004 12:37:24 -0700 (PDT) Steve Sanchez >> >>> wrote: >>>> Message: 2 >>>> Date: Fri, 15 Oct 2004 20:41 -0400 >>>> From: telos888@y... >>>> Subject: Re: Re: Review: An Evidence Collection Device >>>> >>>> Any suggestions on a portable USB or Firewire >>>> write-blocker in that >>>> $200 >>>> range? >>>> >>>> >>>> Hi, >>>> >>>> Try Firefly from http://www.digitalintel.com >>>> >>>> Excellent product and cheap too! >>>> >>>> Steve >>>> >>>> __________________________________________________ >>>> Do You Yahoo!? >>>> Tired of spam? Yahoo! Mail has the best spam protection around >>>> http://mail.yahoo.com >>>> . >>>> >>> >>> >>> >>> ======================================================== >>> TSCM-L Technical Security Mailing List >>> "In a multitude of counselors there is strength" >>> >>> To subscribe to the TSCM-L mailing list visit: >>> http://www.yahoogroups.com/community/TSCM-L >>> >>> It is by caffeine alone I set my mind in motion. >>> It is by the juice of Star Bucks that thoughts acquire speed, >>> the hands acquire shaking, the shaking is a warning. >>> It is by caffeine alone I set my mind in motion. >>> =================================================== TSKS >>> >>> >>> Yahoo! Groups SponsorADVERTISEMENT >>> >>> >>> --------------------------------- >>> Yahoo! Groups Links >>> >>> To visit your group on the web, go to: >>> http://groups.yahoo.com/group/TSCM-L/ >>> >>> To unsubscribe from this group, send an email to: >>> TSCM-L-unsubscribe@yahoogroups.com >>> >>> Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. >>> >>> >>> >>> >>> >>> >>> Jon Asdourian >>> 61 356B Red Porsche Coupe >>> 69 Red MGC GT >>> 63 Burgundy Austin Healey 3000 BJ7 >>> 356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC >>> >>> --------------------------------- >>> Do you Yahoo!? >>> vote.yahoo.com - Register online to vote today! >>> >>> [Non-text portions of this message have been removed] >>> >>> >>> >>> >>> >>> >>> >>> ======================================================== >>> TSCM-L Technical Security Mailing List >>> "In a multitude of counselors there is strength" >>> >>> To subscribe to the TSCM-L mailing list visit: >>> http://www.yahoogroups.com/community/TSCM-L >>> >>> It is by caffeine alone I set my mind in motion. >>> It is by the juice of Star Bucks that thoughts acquire speed, >>> the hands acquire shaking, the shaking is a warning. >>> It is by caffeine alone I set my mind in motion. >>> =================================================== TSKS >>> Yahoo! Groups Links >>> >>> >>> >>> >>> >>> >>> >>> . >>> >> >> >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== TSKS >> >> >> Yahoo! Groups SponsorADVERTISEMENT >> >> >> --------------------------------- >> Yahoo! Groups Links >> >> To visit your group on the web, go to: >> http://groups.yahoo.com/group/TSCM-L/ >> >> To unsubscribe from this group, send an email to: >> TSCM-L-unsubscribe@yahoogroups.com >> >> Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. >> >> >> >> >> >> Jon Asdourian >> 61 356B Red Porsche Coupe >> 69 Red MGC GT >> 63 Burgundy Austin Healey 3000 BJ7 >> 356 Registry 16017, PCA 2002112915, MGCC 99577 AHCC >> >> --------------------------------- >> Do you Yahoo!? >> Check out the new Yahoo! Front Page. www.yahoo.com >> >> [Non-text portions of this message have been removed] >> >> >> >> >> >> >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== TSKS >> Yahoo! Groups Links >> >> >> >> >> >> >> >> . >> > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > -- Ronald J. Wilczynski National Program Office Regional Computer Forensic Lab Program 916-977-2250 916-549-1311 cell RJWilczynski@F... 10108 From: Daryl Date: Fri Nov 12, 2004 9:07am Subject: Re: Cisco Phone System Info Concentrate on the backend call manager app. There are a few there; bugs, managed via telnet, etc. Rgds. --- In TSCM-L@yahoogroups.com, Rui Shantilal wrote: > > I am aware that each IP phone has it¥s own web server, try to go for > it, using known exploits against Web Server, for example, manipulating > http headers. > > rs > > > On Thu, 11 Nov 2004 00:32:43 -0800 (PST), Mitch D wrote: > > Looking for exploit info on Cisco VOIP phones systems > > Thanks > > md > > > > > > > > __________________________________ > > Do you Yahoo!? > > Check out the new Yahoo! Front Page. > > www.yahoo.com > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > > > > > Yahoo! Groups Sponsor > > > > ADVERTISEMENT > > > > > > ________________________________ > > Yahoo! Groups Links > > > > To visit your group on the web, go to: > > http://groups.yahoo.com/group/TSCM-L/ > > > > To unsubscribe from this group, send an email to: > > TSCM-L-unsubscribe@yahoogroups.com > > > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 10109 From: Leanardo Date: Fri Nov 12, 2004 9:44am Subject: Re: Cisco Phone System Info Google "VOMIT" and "VoIP" you should find some links to this application (Linux based) Bruce : ) --- In TSCM-L@yahoogroups.com, Mitch D wrote: > Looking for exploit info on Cisco VOIP phones systems > Thanks > md 10110 From: Daryl Date: Fri Nov 12, 2004 10:32am Subject: Re: Microphones and internet (Part 2) Noise and vibration can be a problem, but can be filtered, probably depends on the machine in question. Most VOIP tools in skype, MSNIM, YIM, etc, seem to use the internal mic just fine. If this is a WinXP machine, I'd run netstat -o from the command line to see what processes are listening, the PID can then be mapped back to the running process via task manager, or it's more adult sibling Process Explorer (even if it's a child process or .dll calling svchost), available free via sysinternals.com, probabaly better to install before trying this in case task manager or another process has been trojaned to hide it. Best test would be a sniffer on the local circuit. Sniff for traffic as you create noise in the target area. Good Luk. --- In TSCM-L@yahoogroups.com, "Brian Noble" wrote: > > > > I would also search for files that have been created or modified in > the last few days to see if there could be audio files. Each file > will need to be examined. A program could be saving small bits of > audio to a file and sending them out periodically much like a > keylogger does. If the computer in question is on a local network be > sure to check the drives that the suspect computer can access. > One question for the hardware people here if the mic is not external > to the computer but internal to the case how would you get around > the fans and harddrive noise? > > Brian Noble > > > > --- In TSCM-L@yahoogroups.com, Rui Shantilal wrote: > > > > Check the processes that the machine is running and look for > something > > suspicious. > > > > On the other hand, monitor your network connections to understand > if > > there is any weird traffic in your perspective, use for example, > > ethereal for this ! > > > > regards > > > > rs > > > > > > On Wed, 10 Nov 2004 15:21:34 -0800 (PST), Jan Vandenbos > > wrote: > > > > > > Btw, this is all assuming the recorded conversations > > > are leaving the machine over the net in some fashion > > > or another. > > > > > > I'd also do a search (using a forensic tool, or > > > something like Agent Ransack (again, > > > http://www.download.com) and look for files with the > > > following extensions > > > > > > .au, .wav, .mp3, .aa, .ra, .ram., ... > > > > > > I'd also search inside archive files (like .zip, > > > .rar). > > > > > > This is still not guaranteed, since recording software > > > might be using its own internal mechanisms for > > > encoding/storing the audio streams. > > > > > > If the 'recording' software is storing the recorded > > > audio on the local hard drive (rather than a live > > > connection over the net), then there will need to be > > > some way for the perp to pull the data off the system > > > either: > > > > > > 1) The perp has physical access to the machine - > > > probably on a somewhat regular basis > > > > > > 2) The system/malicious monitoring software transmits > > > the audio files on a regular basis (ie. via email or > > > other batch network job) > > > > > > 3) The perp has remote access to the machine to get > > > access to the files. > > > > > > As a side note - Microphones on PC's concern me > > > (especially considering the prevalence of microphones > > > in laptops and PDA's these days), but I'm also > > > concerned about cameras/webcams plugged into > > > computers. One would imagine it wouldn't be a > > > difficult effort to distribute software that turned on > > > web cameras as well as Microphones on machines one > > > wanted to monitor. > > > > > > Jan > > > > > > > > > --- Jan Vandenbos wrote: > > > > > > > > > > > Lots of comments out there on the web and discussion > > > > in the past on this topic... > > > > > > > > Ie: > > > > > > > > > > > http://www.landfield.com/isn/mail-archive/1999/Apr/0036.html > > > > > > > > First things I'd check (Basic I know, but important) > > > > - > > > > also this is all assuming this is windows... (If its > > > > on a unix/Linux variant machine I can send > > > > instructions for that too) > > > > > > > > 1) Start->Run->Control Panel->Add/Remove Programs - > > > > and look for programs that you don't recognize. > > > > > > > > 2) Bring up the Task manager (differs depending on > > > > your version of windows), and look under the > > > > Processes > > > > tab for unusual program. If you search for each > > > > program name on the Internet there are many sites > > > > that > > > > identify these programs for you and you can check > > > > which should be there or not. > > > > > > > > 3) Check the startup group > > > > (Start->Programs->Startup), > > > > and also the Windows Registry sections 'Run', 'Run > > > > Once', 'Run Service', etc... for strange programs. > > > > An > > > > easy way to do this is to grab 'Startup Mechanic' > > > > off > > > > http://www.download.com or similar site. Startup > > > > mechanic will list all the programs set to start > > > > when > > > > the computer boots, and will give you a starting > > > > place > > > > to look for malicious software. > > > > > > > > 4) Go to the command prompt (Start->Run->CMD) > > > > and type in 'netstat -a'. > > > > > > > > Unless malicious software has done a good job in > > > > hiding itself - you should see some trace at least > > > > in > > > > the netstat -a. > > > > > > > > FWIW, the Netstat -a shows a list of all the network > > > > connections on the host. If someone were listening > > > > full time with some kind of remote mic activiation > > > > software, you'd probably see a live connection to > > > > their IP address in that list (you might have to go > > > > through each one and find out which ones are > > > > suspicious). > > > > > > > > If you want, send me the output of that 'netstat -a' > > > > command direct via email and I can share thoughts on > > > > what looks suspicious. > > > > > > > > Assuming on the other hand that any purported > > > > malicious software was installed and was capable of > > > > hiding itself, another good way would be to plug a > > > > 'network sniffer' in between the machine in question > > > > and the Internet (use a hub, not a switch if you're > > > > doing this - I can explain why offline if you need). > > > > > > > > > > > > Look at the traffic going back and forth between > > > > that > > > > machine and other hosts on the Internet and see if > > > > any > > > > of the traffic looks suspicious. > > > > > > > > Start with the machine idle. You'll probably see a > > > > fair bit of traffic anyways (instant messaging and > > > > other network keep alive traffic), but it'll make it > > > > easier to single out suspicious traffic. > > > > > > > > Hope that helps... If you need more detail, feel > > > > free > > > > to drop me a note offline. > > > > > > > > Jan > > > > > > > > --- sewellr@i... wrote: > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > A local police department suspects someone of > > > > > putting a hidden microphone > > > > > in a room and accesses the audio via the internet > > > > > (the room has a computer > > > > > connected to the internet). If this was the case, > > > > > how would the bad guy do > > > > > it? Software covertly installed on the computer? > > > > > What would you look for > > > > > physically (other than a microphone, of course)? > > > > > > > > > > Sgt. Kirk Sewell > > > > > Illinois State Police, Technical Investigations > > > > > 500 Iles Park Place, Suite 300 > > > > > Springfield, IL 62718 > > > > > (217) 524-6079 office > > > > > (217) 467-4211 pager > > > > > (217) 836-0919 mobile > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > the hands acquire shaking, the shaking is a warning. > > > It is by caffeine alone I set my mind in motion. > > > =================================================== TSKS > > > > > > > > > > > > Yahoo! Groups Sponsor > > > > > > > > > Get unlimited calls to > > > > > > U.S./Canada > > > > > > ________________________________ > > > Yahoo! Groups Links > > > > > > To visit your group on the web, go to: > > > http://groups.yahoo.com/group/TSCM-L/ > > > > > > To unsubscribe from this group, send an email to: > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of > Service. 10111 From: Hawkspirit Date: Fri Nov 12, 2004 8:36pm Subject: paper embedable chips Subject: Fwd: mass-producible paper embedable chips Subject: mass-producible paper embedable chips http://www.physorg.com/news1917.html Chip-Embedded Paper for Wireless Transmission November 10, 2004 Japanese company Oji Paper announced November 8 that it has jointly developed technology to embed semiconductor chips in paper during papermaking processes. This invention was co-developed with two other companies FEC Group and Toppan Forms. According to the JCN network, the embedded chip is 0.5x0.5mm and comes with a built-in antenna for wireless transmission at frequencies of between 13.56MHz to 2.45GHz. This breakthrough technology enables mass production of chip-embedded paper. The new chip-embedded paper gets a bit thicker than regular paper, but its printable property is comparable to regular paper. The new technology is expected to be applied in lots of paper products: personal checks, paper bills, gift certificates, etc. The paper is available in sheets and rolls. Oji demonstrates the technology at Smart Labels Asia 2004 held in Tokyo from November 9 to 11. About Oji Paper: Major Business Lines of Oji Paper Co.,Ltd: Production, conversion/processing and sales of printing, writing and related papers; packaging and wrapping papers; carbonless papers; household products; containerboard and boxboard. Production and sales of such end-use products such as corrugated board and boxboard containers; paper-board containers; plastics; thermal paper; self-adhesive paper and disposable paper diapers. Production and sales of chemicals for paper making and packaging equipment. [Non-text portions of this message have been removed] 10112 From: James M. Atkinson Date: Sat Nov 13, 2004 11:37am Subject: CIA's No. 2 official retires amid reports of infighting http://www.cnn.com/2004/US/11/13/cia.retirement.ap/index.html CIA's No. 2 official retires amid reports of infighting WASHINGTON (AP) -- John McLaughlin, who took temporary command of the CIA for three months this year during a wave of criticism of the spy agency, is retiring amid internal conflicts. In a statement Friday, McLaughlin, the CIA's deputy director and 32-year agency veteran, called his departure a "purely personal decision" and said it was time to move on to other endeavors. But former intelligence officials in touch with current agency personnel say there has been turmoil in recent weeks as new CIA Director Porter Goss tried to make changes and get settled in. Goss, a Florida Republican who formerly chaired the House Intelligence Committee, brought four of his congressional aides with him to the CIA's 7th floor executive offices shortly after he took over in September. But tension began before he arrived. Officials as senior as former CIA Director George Tenet fumed at legislation approved by Goss' committee and the full House that said the CIA's Directorate of Operations "needs fixing." The bill warned that without changes, the clandestine unit -- the agency's most famous division -- could become a "stilted bureaucracy incapable of even the slightest bit of success." Now, moves made by Goss and his aides are believed to be riling current personnel. The Washington Post reported in Saturday editions that Deputy Director of Operations Stephen Kappes turned in his resignation Friday following a tense meeting at CIA headquarters in suburban Virginia. Goss and White House officials asked Kappes to reconsider his decision over the weekend, the newspaper said. Other officials are also considering leaving. An intelligence official reached late Friday declined to comment. McLaughlin temporarily took over the CIA in July when Tenet retired, also citing personal reasons. McLaughlin's ascension put him in line to field criticism from two reports highly critical of U.S. intelligence operations, the September 11 Commission report and the Senate's investigation into the flawed prewar intelligence on Iraq. President Bush decided in August to nominate a permanent replacement for Tenet and tapped Goss, who was a CIA operative during the 1960s. Officials painted McLaughlin's decision to retire from government as a natural one: A CIA official said McLaughlin thought the period of government transition after the election was a "logical time to move on." McLaughlin plans to take time off while considering opportunities in the private sector, said the official, who spoke on condition of anonymity. Since 1972, McLaughlin has advanced within the agency to become a part of its senior leadership. He was an analyst for European and Russian issues before rising to deputy director for intelligence in 1997. By 2000, he had become Tenet's right hand, as deputy director of central intelligence. When Tenet announced resigned in July, McLaughlin temporarily headed the agency for nearly three months. McLaughlin, 62, called "Merlin" by some of his colleagues, was known for pulling off impromptu magic tricks, like turning a dollar bill into other denominations. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10113 From: delta Date: Sat Nov 13, 2004 8:42am Subject: voice on internet very cheap to listen via internet .... david from paris http://www.micro-espion.com/boutique/achat/produit_details.php?id=13 10114 From: Does it matter Date: Sat Nov 13, 2004 7:07am Subject: Re: OT Hard drives Interesting, I thought the same thing when I saw on the net a guy who made a makeshift clean room with a fish tank, a walmart hepa air cleaner, dishwashing gloves, and some epoxy. --- In TSCM-L@yahoogroups.com, telos888@y... wrote: > Back in the old days of MFM and RLL drives, a friend of mine recovered a > drive with a broken actuator by removing the platters in a "clean room" > Ziploc, then Windexing the platters and putting them into a new enclosure - > drive worked perfectly. > > Most (if not all) of the data recovery houses out there don't even use > clean rooms, just open air analysis stations - I think clean rooms may be > more required for manufacturing than post-mortem stuff. > > > ...... Original Message ....... > On Thu, 11 Nov 2004 13:18:27 -0000 "Does it matter" > wrote: > > > > > > > >I have noticed lately that lots of people on this board are into > >computer forensics like I am, which is great. On a side note, I was > >wondering if anyone out there knows of a place or a person who > >teaches clean room type data recovery applications i.e. taking apart > >the drive in a class 100 type enviroment and then diagnosing > >problems. > > > >It appears that there aren't any classes that I can find for this > >and you have to get someone who worked for a hard drive company like > >Maxtor, Seagate, WD, etc to show you the tricks of the trade? > > > >Can anyone shed some light on this? > > > >Thanks > > > >Darren > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > >http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > > > >. > > 10115 From: Mitch D Date: Sat Nov 13, 2004 2:09pm Subject: Cisco Hack Info ( excellent info) Figured I'd share this w the list: In the SIP images of Cisco 7960/7940 (and perhaps 7970/7980) phones, there is a "telnet" option which can be enabled. In the highest access mode of this interface, it is possible to activate a "test keys" mode, which would allow an external party to make calls to remote (external) destinations without the local user hearing any indication that the phone had been placed into "remote intercom" mode. The test key mode allows a telnet user to simulate the exact keystrokes of a local user, Additionally, there is a feature called "auto-answer" which can be activated on a single line, meaning that whatever SIP username is associated with that line will also achieve an auto-answer (on speakerphone, if available) for that line. This also can be used as a remote area surveillance system. (example: in our office, I have a special extension which calls all phones across the entire office and muxes them back into a single conference bridge, so that I can listen to the entire office at night to see if there is anything amiss (fan noises, UPS signalling, fire alarms, voices.)) Both variations create a bright green LED to light up on the deskset, and also the LCD screen shows the status of the "call" in progress, so there is some external indication that something is happening. Cisco has made some progress in ensuring that "pirate" versions of code for the phones is not easily developed and uploaded; updated versions need to be cryptographically signed before the phone will upload them (exact methods unknown) which to some degree mitigates threat from versions which have no physical indications, though anything is possible with enough budget and brainpower. Both of these "features" are available currently on the SIP images and present different threat situations for voice surveillance. I don't know if they're also available in the SCCP or H.323 versions of the code. Both are exceedingly dangerous, and telnet mode should never be enabled in an insecure (or even secure) environment. The intercom feature is also an issue, since there is no reverse authentication from the Cisco phones (another major failing in my opinion of Cisco's SIP practical implementation strategy.) ===== Mitch Davis TSCM/Special Operations Group Inc. Nashville,TN.USA MitchD@t... site:www.tscmusa.com. Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 __________________________________ Do you Yahoo!? Check out the new Yahoo! Front Page. www.yahoo.com 10116 From: E. Charles Sterling Date: Sat Nov 13, 2004 6:04pm Subject: RE: [security] Re: OT Hard drives You can get to a reasonable position, thought not perfect by any means, by altering an existing room or chamber like that of an environmental testing chamber or walk-in freezer by cleaning and sealing the inside. The key is, are you trying to occasionally try to save a disk drive or are you after a production clean room environment. Pending the level of experimenting or production will define the level of expense and micron level filtration that is needed. You can visit companies not unlike Reliability, Inc. to see their clean room and normally find those of which ever company that uses a clean room ready to discuss the entire process with you. http://www.howstuffworks.com/ http://www.clean-rooms.org/ http://www.clean-rooms.com/ http://www.bcacontract.com/cr.html http://clean-rooms.com/?google_Cleanrooms http://www.modular-office.com/Clean_Room.htm http://www.sbmcorp.com/Managed_Services_CLS.htm These few links will give you additional reference to the building of and cleaning of Clean Rooms of all levels from one-time use problem solves, used modular clean rooms and the technology wherein to do it yourself. cheers, cs -----Original Message----- From: Does it matter [mailto:u12armresl@y...] Sent: Saturday, November 13, 2004 7:08 AM To: TSCM-L@yahoogroups.com Subject: [security] [TSCM-L] Re: OT Hard drives Interesting, I thought the same thing when I saw on the net a guy who made a makeshift clean room with a fish tank, a walmart hepa air cleaner, dishwashing gloves, and some epoxy. --- In TSCM-L@yahoogroups.com, telos888@y... wrote: > Back in the old days of MFM and RLL drives, a friend of mine recovered a > drive with a broken actuator by removing the platters in a "clean room" > Ziploc, then Windexing the platters and putting them into a new enclosure - > drive worked perfectly. > > Most (if not all) of the data recovery houses out there don't even use > clean rooms, just open air analysis stations - I think clean rooms may be > more required for manufacturing than post-mortem stuff. > > > ...... Original Message ....... > On Thu, 11 Nov 2004 13:18:27 -0000 "Does it matter" > wrote: > > > > > > > >I have noticed lately that lots of people on this board are into > >computer forensics like I am, which is great. On a side note, I was > >wondering if anyone out there knows of a place or a person who > >teaches clean room type data recovery applications i.e. taking apart > >the drive in a class 100 type enviroment and then diagnosing > >problems. > > > >It appears that there aren't any classes that I can find for this > >and you have to get someone who worked for a hard drive company like > >Maxtor, Seagate, WD, etc to show you the tricks of the trade? > > > >Can anyone shed some light on this? > > > >Thanks > > > >Darren > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > > > >. > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10117 From: jtowler Date: Sat Nov 13, 2004 7:13pm Subject: RE: Elections See Below ... -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Tuesday, 9 November 2004 2:18 p.m. To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Elections At 03:39 AM 11/8/2004, Michael Puchol wrote: > > GPS tracking without seeing the satellites > >We tried a Labrador, but it wasn't able to keep up with the vehicles. Must have been a Newfoundland, a Black Lab can see GPS satellites with no problem. Now, as silly as all the above is, I just have to ask: Do you mean a breed of dog (Black Lab), or the desk with all the gear in the back of the Black Helicopter (Black Lab), or did you really intend both as a joke? Can you confirm your answer to the above is true? - Jim [Non-text portions of this message have been removed] 10118 From: jtowler Date: Sat Nov 13, 2004 7:52pm Subject: RE: Re: Microphones and internet (Part 2) and SONY PLAYSTATION 2 See Below -----Original Message----- From: Jan Vandenbos [mailto:jvandenbos@y...] Sent: Thursday, 11 November 2004 12:22 p.m. To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Re: Microphones and internet (Part 2) Content deleted. As a side note - Microphones on PC's concern me (especially considering the prevalence of microphones in laptops and PDA's these days), but I'm also concerned about cameras/webcams plugged into computers. One would imagine it wouldn't be a difficult effort to distribute software that turned on web cameras as well as Microphones on machines one wanted to monitor. Jan --- Jan Vandenbos wrote: I see that Sony is due to release a new "game" called "EyeToy: Chat" based on the same USB Camera as in 'EyeToy: Play" for the Sony PlayStation 2. Anyway, from memory, the idea is that you plug the EyeToy (read USB camera/mic) into your PS2, and go online to chat with folk. Fun, of course. Anyway, it seems there is an additional software module in the "game" that lets you set the system up so if it detects movement in the room (younger sister sneeking into your room to steal your collection), then it will play a pre-recorder noise (alarm). All the above set me thinking that there is a camera/mic and online and left running ... So, watch for the PS2 in the staff break room, where the staff discuss the new R&D work over coffee. Note that the "Welcome to NSA" document prohibits such talk in hallways, break rooms etc. To say nothing about the PS2 being there ... - Jim [Non-text portions of this message have been removed] 10119 From: walshingham2000 Date: Sat Nov 13, 2004 7:59pm Subject: Have Crypto Will Travel......?? PGPBOARD COMMENTARY ------------------- PGPBOARD Angeles City, Philippines http://groups.yahoo.com/group/pgpboard/ pgpboard@s... ************************ © HAVE CRYPTO...WILL TRAVEL ========================= by Alan Taylor There are some places in this world where either the use, or possession of cryptographic software can result in very real exposure to state coercion, or worse. In Europe and the United States we tend to get worked up about our governments "snooping" into our private communications. People like Phil Zimmerman and his PGP put our private electronic communications into an invulnerable(?) cryptographic envelope. Our (USA) Government countered with the "Clipper Chip", and third party key escrow schemes, which are currently floundering on the reef of free speech, but they should not be considered as dead in the water. The British Government introduced their RIP legislation, crudely threatening their citizenry with five years of imprisonment if they refused to cough-up their private keys, and passphrases. However, in general, the reality is that strong public key encryption technology is freely available, without any physical threat to both the American & European citizenry. However, this is certainly NOT the case in other countries. (Contact PGPBOARD at pgpboard@s... concerning travelling with cryptographic software.) IN CHINA, it is potentially dangerous to posses any flavor of PGP or Gnupg, all Internet traffic is channeled through two major gateways in Beijing and Shanghai to facilitate filtering of transmissions. In addition, all Internet users must register with the police. Some PGP traffic out of Mainland China is hand carried by NGO's or others into Hong Kong, on PC's, diskettes, or USB flash drives. IN BURMA (MYANMAR), to be caught with cryptographic software either in your possesion, or installed on a PC can result in arrest and detention without trial, years of imprisonment, or execution if you are Burmese citizen. These are the potential extreme threats, and they should not be treated lightly. However, if you and your laptop need to travel, then there are certain precautions you should observe, otherwise you can find yourself in a world of hurt...literally. The first piece of advice for the traveling crypto aficionado would be:- "IF YOU DON'T NEED IT THEN LEAVE IT AT HOME." However, if you are a real crypto junkie, or an NGO with an attitude, then it would be advisable to take some sort of precautions. The only viable precaution is to treat all destinations as the "worst case scenario" irrespective of their perceived safety. SOFTWARE & CRYPTO STANDARDS =========================== Many crypto aficionados get severely hung up on crypto standards, and the perceived security of this or that algorithm...etc..etc.. Such discussions can be stimulating, and very informative. However, before their departure, our NGO with an attitude, or traveling crypto junkie needs to be aware of only a few vital parameters. 1. 1024 bit asymmetric keys have not yet been busted...but better to use 2048 bits. 2 MD5 is depreciated owing to security concerns, best use SHA1. 3. None of the following block ciphers have been busted, 3DES, CAST, IDEA, BLOWFISH (AES not considered due to insufficient track record). We recommend 3DES. (PGPBOARDS bulletin concerning the current status of DES and 3DES is available upon request from pgpboard@s...) 4. There have been no known break thru's in the factoring of very large prime numbers that render PK cryptology both obsolete and insecure. 5. That your chosen secret key passphrase, is both rememberable, and cryptographically strong; with nothing so trivial such as aunty Flo's birthday...!! 6. Carry with you on diskette PGPBOARDS "GPG HOME BASE". This package in configured around GnuPG, with WINPT graphical user interface compete with keyring manager, XP WIN 98 notepad, together with all of the command com files required for either WIN 98 or XP. No software footprint is left on the PC hosting the cryptographic software. GPG HOME BASE includes a command line SMTP server that can directly address the recipients mail server, and effectively bypass any in country local ISP's mail server. (GPG HOME BASE IS AVAILABLE FREE OF CHARGE) 7. Before departure, and/or upon arrival at your destination, generate and sign your mission critical public keys in the presence of the intended recipients(s) of your encrypted traffic. The signature format of these mission critical public keys should have "non exportable signatures". Do not upload these keys to a public key server, 8. Assume the destination country/territory falls into the "worst case crypto" scenario. Best Regards Alan Taylor PGPBOARD Administrator Angeles City Philippines.. 11/13/2004 10:49 AM CST (Note © This article may be freely reproduced with due credit) 10120 From: jtowler Date: Sat Nov 13, 2004 8:03pm Subject: RE: Re: Microphones and internet and SONY PLAYSTATION 2 and EyeToy Camera/mic Correction to below: The "EyeToy: Chat" game is mostly as described, however the "SpyToy" feature is a part of a different PS2 "game" titled "EyeToy: Play2". Links for those interested: EyeToy camera and general article: http://www.ps2home.co.uk/ps2__eyetoy.htm EyeToy: Chat: http://www.ps2home.co.uk/eyetoychat.htm EyeToy: Play2 with "SpyToy" feature: http://www.ps2home.co.uk/eyetoy%20play%202.htm Security risks apply ... -----Original Message----- From: jtowler [mailto:jtowler@x...] Sent: Sunday, 14 November 2004 2:53 p.m. To: 'TSCM-L@yahoogroups.com' Subject: RE: [TSCM-L] Re: Microphones and internet (Part 2) and SONY PLAYSTATION 2 See Below -----Original Message----- From: Jan Vandenbos [mailto:jvandenbos@y...] Sent: Thursday, 11 November 2004 12:22 p.m. To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Re: Microphones and internet (Part 2) Content deleted. As a side note - Microphones on PC's concern me (especially considering the prevalence of microphones in laptops and PDA's these days), but I'm also concerned about cameras/webcams plugged into computers. One would imagine it wouldn't be a difficult effort to distribute software that turned on web cameras as well as Microphones on machines one wanted to monitor. Jan --- Jan Vandenbos wrote: I see that Sony is due to release a new "game" called "EyeToy: Chat" based on the same USB Camera as in 'EyeToy: Play" for the Sony PlayStation 2. Anyway, from memory, the idea is that you plug the EyeToy (read USB camera/mic) into your PS2, and go online to chat with folk. Fun, of course. Anyway, it seems there is an additional software module in the "game" that lets you set the system up so if it detects movement in the room (younger sister sneeking into your room to steal your collection), then it will play a pre-recorder noise (alarm). All the above set me thinking that there is a camera/mic and online and left running ... So, watch for the PS2 in the staff break room, where the staff discuss the new R&D work over coffee. Note that the "Welcome to NSA" document prohibits such talk in hallways, break rooms etc. To say nothing about the PS2 being there ... - Jim [Non-text portions of this message have been removed] 10121 From: James M. Atkinson Date: Sat Nov 13, 2004 9:54pm Subject: Impedance of a Typical Alarm PIR Cable Run For TSCM purposes, what is the impedance of the wiring that services a typical PIR sensor hooked up to an Alarm Panel. The biggest concern is audio signals present on the power lines that go to the sensor, and a method to couple sweep gear into the active wires without presenting enough of an impedance mismatch to trip the alarm or reset the circuit. Also, important to shoot a TDR pulse into all of the lines to trace out the presence of an eavesdropping device. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10122 From: kondrak Date: Sat Nov 13, 2004 11:00pm Subject: Re: Impedance of a Typical Alarm PIR Cable Run We always considered it twisted pair -600 ohms. At 22:54 11/13/2004, you wrote: >For TSCM purposes, what is the impedance of the wiring that services a >typical PIR sensor hooked up to an Alarm Panel. > >The biggest concern is audio signals present on the power lines that go to >the sensor, and a method to couple sweep gear into the active wires without >presenting enough of an impedance mismatch to trip the alarm or reset the >circuit. Also, important to shoot a TDR pulse into all of the lines to >trace out the presence of an eavesdropping device. > >-jma > > > > > > >----------------------------------------------------------------------------------------------------- > > >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >----------------------------------------------------------------------------------------------------- > > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >----------------------------------------------------------------------------------------------------- > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10123 From: A Grudko Date: Sat Nov 13, 2004 11:36pm Subject: RE: Digest Number 1727 -----Original Message----- (Poster not identified by the time it got to me) > Oh, because a good portion of the TSCM business is politically driven, That would be a pity - TSCM should only be technically driven. (I acknowledge that in some countries there may be laws made by politicians that seek to control or inhibit TSCM, but as a discipline TSCM practitioners should be above politics). Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.794 / Virus Database: 538 - Release Date: 2004/11/10 10124 From: Shawn Hughes (Road) Date: Sun Nov 14, 2004 4:13am Subject: Re:PIR Impedance James, I don't have any problems thinking you could inject audio into a PIR power feed, although you would need some hefty filtering at the LP, because clock and crappy power supply noise is sometimes significant. Far as impedance, for all the systems I have ever installed or repaired, the majority use resistance values as a safety. .5K under or over, it sets a trouble flag on the zone. Limits the length of cable used, but precludes attaching anything. Noise is an issue with longer runs, as well. I have scoped cable pairs on zones that became flaky, and found that 60 cycle noise and EMI can piss off the sensor, so I am guessing a *live* PIR wouldn't like having an audio or video signal piggybacked onto it. Of course, making sure that the number of sensors match the number of zones is important, too.... I haven't ever measured impedance on an alarm cable pair, and don't recall reading any specs on it, but if you want to know, I can get that data for you if it is in any of the manuals for the systems I deal with in a day or so. -Shawn At 05:36 AM 11/14/04 +0000, you wrote: >The biggest concern is audio signals present on the power lines that go to >the sensor, and a method to couple sweep gear into the active wires without >presenting enough of an impedance mismatch to trip the alarm or reset the >circuit ==================================== Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response www.warriormindset.com Training at the Cutting Edge! (731) 676-2041 Main Office ////////////////////////////////////////////////////////////////////////////// ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. 10125 From: Michael Dever Date: Sat Nov 13, 2004 11:30pm Subject: Re: Impedance of a Typical Alarm PIR Cable Run Jim Are you talking about the power wiring or the alarm signaling circuit? A typical PIR will operate on 12 VDC and draw approximately 10-20mA. Whereas, the alarm circuit 'normal' resistance varies depending on the manufacture. For example, ADEMCO (Honeywell) alarm panels typically use an 'end of line resistor' of 2.2k ohm or sometimes 10k (typical in Australia). Normally, the alarm circuit will be tripped if the resistance changes by more than +/- 10% variation. Simple DC based alarm circuits can easily be 'spoofed' by applying a voltage equal to the steady state value (typically 6V on a 12V system). However, a lot of alarm panels these days (including ADEMCO) use a proprietary serial data stream instead of the DC loop. This allows individual sensors to be addressed and for multiple sensors to multiplexed onto the same loop. There are even higher security methods of signaling using 'end of line' modules which are unique to each sensor. These type of systems can use encryption to further thwart substitution. For example, The Australian Government extensively uses a type of signaling system between sensors and the alarm panel that is encrypted. I think TDRing one of these circuits would trigger an alarm. Also, I would be concerned about the effects of TDR pulses on the electronics at both ends. Hope this helps! Regards Mike On 14 Nov 2004, at 14:54, James M. Atkinson wrote: > > > For TSCM purposes, what is the impedance of the wiring that services a > typical PIR sensor hooked up to an Alarm Panel. > > The biggest concern is audio signals present on the power lines that > go to > the sensor, and a method to couple sweep gear into the active wires > without > presenting enough of an impedance mismatch to trip the alarm or reset > the > circuit. Also, important to shoot a TDR pulse into all of the lines to > trace out the presence of an eavesdropping device. > > -jma > > > > > > > ----------------------------------------------------------------------- > ------------------------------ > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ----------------------------------------------------------------------- > ------------------------------ > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: > http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ----------------------------------------------------------------------- > ------------------------------ > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ----------------------------------------------------------------------- > ------------------------------ > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Voice: (02) 6254 5337 Email: dca@b... This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 10126 From: James M. Atkinson Date: Sun Nov 14, 2004 8:37am Subject: Cisco Phone Vulneability http://cryptome.org/cisco-holes.htm In the SIP images of Cisco 7960/7940 (and perhaps 7970/7980) phones, there is a "telnet" option which can be enabled. In the highest access mode of this interface, it is possible to activate a "test keys" mode, which would allow an external party to make calls to remote (external) destinations without the local user hearing any indication that the phone had been placed into "remote intercom" mode. The test key mode allows a telnet user to simulate the exact keystrokes of a local user. Additionally, there is a feature called "auto-answer" which can be activated on a single line, meaning that whatever SIP username is associated with that line will also achieve an auto-answer (on speakerphone, if available) for that line. This also can be used as a remote area surveillance system. (Example: in our office, I have a special extension which calls all phones across the entire office and muxes them back into a single conference bridge, so that I can listen to the entire office at night to see if there is anything amiss (fan noises, UPS signalling, fire alarms, voices.)) Both variations create a bright green LED to light up on the deskset, and also the LCD screen shows the status of the "call" in progress, so there is some external indication that something is happening. Cisco has made some progress in ensuring that "pirate" versions of code for the phones is not easily developed and uploaded; updated versions need to be cryptographically signed before the phone will upload them (exact methods unknown) which to some degree mitigates threat from versions which have no physical indications, though anything is possible with enough budget and brainpower. Both of these "features" are available currently on the SIP images and present different threat situations for voice surveillance. I don't know if they're also available in the SCCP or H.323 versions of the code. Both are exceedingly dangerous, and telnet mode should never be enabled in an insecure (or even secure) environment. The intercom feature is also an issue, since there is no reverse authentication from the Cisco phones (another major failing in my opinion of Cisco's SIP practical implementation strategy.) ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10127 From: James M. Atkinson Date: Sun Nov 14, 2004 9:51am Subject: Spyware charge levelled at Lexmark http://software.silicon.com/malware/0,3800003100,39125876,00.htm Spyware charge levelled at Lexmark November 12 2004 Allegations have been swirling around an online newsgroup this week that printer manufacturer Lexmark has been installing spyware on its customers' computers. Reports on the comp.periphs.printers Usenet newsgroup claim that Lexmark has been planting spyware on its customers' PCs in the form of undocumented software that monitors the use of its printers and silently reports back to a Lexmark-owned company website. One user said that after initially denying the allegations, Lexmark acknowledged installing tracking software that reported printer and cartridge use back to the company for survey purposes. He claimed that Lexmark said no personal data was taken by the program, and that it was impossible to identify anyone by it. However, users installing the software are prompted to fill in a registration form including their name and the serial number of the product. The newsgroup posting claims that the program, found on the X5250 installation software, embeds itself in the registry and monitors the use of the printer through DLL files in the c:\program_files\lexmark500 folder. The program sends the information, which includes print and scanning data, to the URL www.lxkcc1.com. According to the internet Whois database, this domain name belongs to Lexmark International in Kentucky. Lexmark's UK office has not responded to repeated requests for comment. # # # # / also note that....a similar form of "spying" was done by Creative Labs back in 2001, according to this NEWS.COM article: http://news.com.com/2100-1040-268361.html?legacy=cnet ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10128 From: mark de Boer Date: Sun Nov 14, 2004 10:44am Subject: Re: Impedance of a Typical Alarm PIR Cable Run James, Here in the Nether lands Alarm systems are sold that have audio circuits in them for the Alarm central to"listen in" for alarm verification by a company called CIPE. this type of system almost asks for a wire tap routed via PSTN. this System is not used by quality installers but its out there. Do you have simular systems in the states? Also Ive heard of dual detector /radar PIR's transformed into radar transmitters that transmit the audio from the room, It was a reliable source (i personally never seen it myself). Perhaps the best way to check for audio is put the scope on the data bus lines and also check the power use in Milli amp for every detector(when having access to the specs from the alarm system . Best regard Marc RRBsecurity Netherlands "James M. Atkinson" wrote: For TSCM purposes, what is the impedance of the wiring that services a typical PIR sensor hooked up to an Alarm Panel. The biggest concern is audio signals present on the power lines that go to the sensor, and a method to couple sweep gear into the active wires without presenting enough of an impedance mismatch to trip the alarm or reset the circuit. Also, important to shoot a TDR pulse into all of the lines to trace out the presence of an eavesdropping device. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Win a castle for NYE with your mates and Yahoo! Messenger [Non-text portions of this message have been removed] 10129 From: Date: Sun Nov 14, 2004 0:45pm Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: What style of X-Ray or penetrative imaging system (if any) do you use. If you can not access the Polls section of Yahoo then please privately email your thoughts on the subject to me. o Emitter - Golden XR Series (stand alone tube) o Emitter - Pass Through/Box Type o Plate - Digital System (ie: RTR) o Plate - Film Based (ie: Golden) o Do Not Use X-Ray Imaging o 3-D Tomography o 3-D Micro Tomography o Phase Array 3-D Tomography o Millimeter Wave Tomography To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1500738 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 10130 From: James M. Atkinson Date: Sun Nov 14, 2004 1:44pm Subject: Re: Impedance of a Typical Alarm PIR Cable Run Marc, I am trying to determine a range of impedances present on a variety of live alarm sensor lines so that when I am running a TDR across the lines I can set up a faster impedance match instead of "tuning up" the line each time I switch into a different cable. With Time Domain Reflectometry it is extremely important to have a smooth transition or impedance match between the final driver in the TDR, the line under test, and the circuit that is sampling the line. It is undesirable to connect to a line alarm line without first having a close match as you will introduce a slight spike in the line that may trip an alarm of that sensor. This is quite important if you are in the non-alerting stage of the sweep and haven't yet approached the sound stage. Quite a few alarm sensors in the U.S. integrate a microphone into the system, but in some states it is illegal to have, use, or possess such a system due to the eavesdropping laws. A few years back there where a number of lawsuits over the issue, and the companies that were using, and the companies that installed the systems lost a huge suit. The audio transmitters you mention can be done by introducing a microphone into the sensor housing, or by taping or suspending a small piece of foil or metalized mylar onto the microwave beam of the sensor. A good example of this would be a PIR/Microwave sensor that is mounted on the wall of the office of an executive and is directed towards the window with drapes. The eavesdropper places a very lightweight piece of foil inside of behind the drapes. The air in the room slightly moves the foil which causes a very slight doppler shift in the 10 GHz signal that can be picked up some distance away from the targeted area. The critical parts of the equation is that the metallic foil has to be as thin and light as possible (minimal mass), should be in the main beam (easy enough), and should have sharp, almost saw tooth edges around the outside. The same type of threat exists on the infrared side of the sensor as well, where a beam of infrared light can be used to carry the intelligence off of the sound stage and into a repeater location. One of the more dangerous situations (from a TSCM perspective) is PIR sensors inside a conference room, or mounted on the walls just outside a conference room. In both cases a spy can access the sensor for less than 5 minutes and introduce a hostile device that will be missed by most TSCM equipment. The PIR's can then be used to bounce the audio signal down the hall or out a window where the eavesdropper can pick it up. In such cases a microphone is introduced into a PIR sensor in the targeted area (in this case an executive conference room), since all cable runs for the PIR's in the area are often shared; the audio signal is present at all other PIR's in the immediate area. The spy simply picks an office or other area on the same cable run and uses the audio signal to modulate the IR at some distance away from the targeted area. This threat can be blended with the microwave motion sensor where the IR receiver directly modulates the microwave transmitter. Remember that most microwave motion sensors are looking for a doppler shift, not a slight shift caused by audio modulating the RF. The spy then picks the last chain on the PIR wiring and introduces a filter to keep the audio from reaching the alarm panel where it could cause a false alarm or cause the bugging to be discovered by a TSCM person. But to get back to the issue of the impedance of alarm line... the biggest annoyance is that you have not only the power supply wire to content with but also the signalling lines which has to be handled carefully as the alarm monitor will detect that mischief is afoot if your note careful. Checking alarms line is also a hassle as there are invariably extra wires in the cable that are not used for anything, and the sensors are commonly installed in a shared bus configuration that was very time consuming to examine. It doesn't help that each of the wires in the cable is at a difference impedance, and has a different termination on the each end. -jma At 11:44 AM 11/14/2004, mark de Boer wrote: >James, > >Here in the Nether lands Alarm systems are sold that have audio circuits >in them for the Alarm central to"listen in" for alarm verification by a >company called CIPE. this type of system almost asks for a wire tap routed >via PSTN. >this System is not used by quality installers but its out there. >Do you have simular systems in the states? > >Also Ive heard of dual detector /radar PIR's transformed into radar >transmitters that transmit the audio from the room, It was a reliable >source (i personally never seen it myself). > >Perhaps the best way to check for audio is put the scope on the data bus >lines and also check the power use in Milli amp for every detector(when >having access to the specs from the alarm system . > >Best regard > >Marc >RRBsecurity >Netherlands > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10131 From: James M. Atkinson Date: Sun Nov 14, 2004 3:24pm Subject: White House has ordered new chief to eliminate officers who were disloyal to Bush http://www.newsday.com/news/nationworld/nation/ny-uscia1114,0,707331.story?coll=ny-top-headlines CIA plans to purge its agency Sources say White House has ordered new chief to eliminate officers who were disloyal to Bush BY KNUT ROYCE WASHINGTON BUREAU November 14, 2004 WASHINGTON -- The White House has ordered the new CIA director, Porter Goss, to purge the agency of officers believed to have been disloyal to President George W. Bush or of leaking damaging information to the media about the conduct of the Iraq war and the hunt for Osama bin Laden, according to knowledgeable sources. "The agency is being purged on instructions from the White House," said a former senior CIA official who maintains close ties to both the agency and to the White House. "Goss was given instructions ... to get rid of those soft leakers and liberal Democrats. The CIA is looked on by the White House as a hotbed of liberals and people who have been obstructing the president's agenda." One of the first casualties appears to be Stephen R. Kappes, deputy director of clandestine services, the CIA's most powerful division. The Washington Post reported yesterday that Kappes had tendered his resignation after a confrontation with Goss' chief of staff, Patrick Murray, but at the behest of the White House had agreed to delay his decision till tomorrow. But the former senior CIA official said that the White House "doesn't want Steve Kappes to reconsider his resignation. That might be the spin they put on it, but they want him out." He said the job had already been offered to the former chief of the European Division who retired after a spat with then-CIA Director George Tenet. Another recently retired top CIA official said he was unsure Kappes had "officially resigned, but I do know he was unhappy." Without confirming or denying that the job offer had been made, a CIA spokesman asked Newsday to withhold naming the former officer because of his undercover role over the years. He said he had no comment about Goss' personnel plans, but he added that changes at the top are not unusual when new directors come in. On Friday John E. McLaughlin, a 32-year veteran of the intelligence division who served as acting CIA director before Goss took over, announced that he was retiring. The spokesman said that the retirement had been planned and was unrelated to the Kappes resignation or to other morale problems inside the CIA. It could not be learned yesterday if the White House had identified Kappes, a respected operations officer, as one of the officials "disloyal" to Bush. "The president understands and appreciates the sacrifices made by the members of the intelligence community in the war against terrorism," said a White House official of the report that he was purging the CIA of "disloyal" officials. " . . . The suggestion [that he ordered a purge] is inaccurate." But another former CIA official who retains good contacts within the agency said that Goss and his top aides, who served on his staff when Goss was chairman of the House intelligence committee, believe the agency had relied too much over the years on liaison work with foreign intelligence agencies and had not done enough to develop its own intelligence collection system. "Goss is not a believer in liaison work," said this retired official. But, he said, the CIA's "best intelligence really comes from liaison work. The CIA is simply not going to develop the assets [agents and case officers] that would meet the intelligence requirements." Tensions between the White House and the CIA have been the talk of the town for at least a year, especially as leaks about the mishandling of the Iraq war have dominated front pages. Some of the most damaging leaks came from Michael Scheuer, former head of the CIA's Bin Laden unit, who wrote a book anonymously called "Imperial Hubris" that criticized what he said was the administration's lack of resolve in tracking down the al-Qaida chieftain and the reallocation of intelligence and military manpower from the war on terrorism to the war in Iraq. Scheuer announced Thursday that he was resigning from the agency. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10132 From: James M. Atkinson Date: Mon Nov 15, 2004 6:44am Subject: CIA veterans clash with new chief - Senior officers fear Goss too isolated; resignations mount [If you do sweeps for the agency, or work at the schoolhouse you should dust off your resume, start chatting with recruiters, and begin looking at the help wanted ads on Sundays. -jma] CIA veterans clash with new chief Senior officers fear Goss too isolated; resignations mount By Walter Pincus and Dana Priest The Washington Post Updated: 12:00 a.m. ET Nov. 14, 2004 WASHINGTON - Within the past month, four former deputy directors of operations have tried to offer CIA Director Porter J. Goss advice about changing the clandestine service without setting off a rebellion, but Goss has declined to speak to any of them, said former CIA officials aware of the communications. The four senior officials represent nearly two decades of experience leading the Directorate of Operations under both Republican and Democratic presidents. The officials were dismayed by the reaction and were concerned that Goss has isolated himself from the agency's senior staff, said former clandestine service officers aware of the offers. The senior operations officials "wanted to talk as old colleagues and tell him to stop what he was doing the way he was doing it," said a former senior official familiar with the effort. More defections coming? Last week, Deputy Director John E. McLaughlin retired after a series of confrontations between senior operations officials and Goss's top aide, Patrick Murray. Days before, the chief of the clandestine service, Stephen R. Kappes, said he would resign rather than carry out Murray's demand to fire Kappes's deputy, Michael Sulick, for challenging Murray's authority. Goss and the White House asked Kappes to delay his decision until Monday, but they are actively considering his replacement, several current and former CIA officials said. Kappes, whose accomplishments include persuading Libyan leader Moammar Gaddafi to renounce weapons of mass destruction this year, began removing personal photos from his office walls yesterday, associates said. A handful of other senior undercover operations officers have talked seriously about resigning, as soon as Monday. "Each side doesn't understand the other's culture very well," one former senior operations officer said. "There is a way to do this elegantly. You don't have to humiliate people. You bring in people with really weak credentials, and everyone is going to rally around the flag." Culture clash Agency officials have criticized as inexperienced the four former Hill staff members Goss brought with him. Goss's first choice for executive director ≠ the agency's third-ranking official ≠ withdrew his name after The Washington Post reported that he left the agency 20 years ago after having been arrested for shoplifting. Through his CIA spokesman, Goss, a former CIA case officer and chairman of the House intelligence committee, declined to comment about these matters. At his Senate confirmation hearing Sept. 14, Goss said, "There is too much management at headquarters," which he said was "too bureaucratic" and had "stifled some of the innovation, some of the creativity and, frankly some of the risk-taking in the field." He described one "stroke-of-a-pen fix" that he was considering: "Reassurance that people will be supported in the field, building the morale, those are more leadership issues." He also offered a glimpse of his management style. "I believe it takes, sometimes, very blunt, strong language" to get changes made. "I don't like doing it ≠ I call it tough love ≠ but I think occasionally you have to do that." Goss has adopted a management style that relies heavily on former committee staff aides, several of whom are former mid-level CIA employees not well regarded within the CIA's Directorate of Operations. Murray, the new chief of staff, has been perceived by operations officers as particularly disrespectful and mistrustful of career employees. One former senior DO official agreed yesterday that some changes were needed, saying: "Clean the place out if it's needed, but you've got to be clever about it." The disruption comes as the CIA is trying to stay abreast of a worldwide terrorist threat from al Qaeda, a growing insurgency in Iraq, the return of the Taliban in Afghanistan and congressional proposals to reorganize the intelligence agencies. The agency also has been criticized for not preventing the Sept. 11, 2001, attacks and not accurately assessing Saddam Hussein's ability to produce weapons of mass destruction. Advice reportedly rebuffed The four former deputy directors of operations who have tried to offer Goss advice are Thomas Twetten, Jack Downing, Richard F. Stoltz and the recently retired James L. Pavitt. They "wanted to save him from going through" what two other directors, Stansfield Turner and John M. Deutch, had experienced when they tried to make personnel changes quickly, one former senior official aware of their efforts said. Turner and Deutch served under Democratic presidents. Turner wanted to clean house after the Watergate scandal and CIA "dirty tricks" exposed during the Church Commission hearings. Deutch sought to change the inbred culture of the operations staff after the Iran-contra scandal. The Directorate of Operations numbers about 5,000 people, including about 1,000 covert operators overseas, and runs foreign spying, including counterterrorism operations. Because its operators engage in undercover activities, often on their own, they are a difficult group to manage and control. To win their support, Goss's immediate predecessor, George J. Tenet, met with the former directors regularly. He sought advice from them individually and started to rebuild the clandestine service, which was cut by Deutch after its main adversary, the Soviet Union, dissolved, and before terrorism became a central focus. Although Kappes has not left his job, several people have been approached or screened as his replacement. One is the director of the counterterrorism center; the other is the station chief in London. Both are undercover and may not be identified by name. Another candidate, according to current and former CIA officials, is Richard P. Lawless Jr., a former CIA operations officer who is deputy assistant secretary of defense for Asian and Pacific affairs, according to a CIA official who asked not to be identified. Lawless served in the agency from 1972 to 1987, when he left after running afoul of senior DO officers while carrying out secret missions for then-CIA Director William J. Casey. Lawless then opened a private consulting firm that did business in Asia, particularly with Taiwan and South Korea. In a 2002 profile in the Taipei Times, Lawless was described as having "long-term ties to President Bush's brother, Florida Governor Jeb Bush." The two met shortly after Lawless set up his consulting firm and Jeb Bush was Florida's secretary of commerce seeking business in Asia. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10133 From: Hawkspirit Date: Mon Nov 15, 2004 8:54am Subject: Alarm Sweep Using a standard "O"scope on these four alarm lines should tell you all you need to know without interfering with the circuit. The DC power feed to the sensors should have no AC present. The signaling pair will be quiet or have alarm system data flow. I would not inject TDR pulses into alarm electronics without having the assistance of the alarm company. The last thing you want to do on a weekend sweep is bring down an alarm system. In most cases the sensor feed lines terminate in an inaccessible locked control central panel. Roger Tolces Electronic Security Co. www.bugsweeps.com Date: Sat, 13 Nov 2004 22:54:14 -0500 From: "James M. Atkinson" Subject: Impedance of a Typical Alarm PIR Cable Run For TSCM purposes, what is the impedance of the wiring that services a typical PIR sensor hooked up to an Alarm Panel. The biggest concern is audio signals present on the power lines that go to the sensor, and a method to couple sweep gear into the active wires without presenting enough of an impedance mismatch to trip the alarm or reset the circuit. Also, important to shoot a TDR pulse into all of the lines to trace out the presence of an eavesdropping device. -jma [Non-text portions of this message have been removed] 10134 From: Date: Tue Nov 16, 2004 9:25am Subject: Re: CIA veterans clash with new chief - Senior officers fear Goss too isolated; resignations mount Looks like Colin Powell just resigned this morning. ..... Original Message ....... On Mon, 15 Nov 2004 07:44:54 -0500 "James M. Atkinson" wrote: > >[If you do sweeps for the agency, or work at the schoolhouse you should >dust off your resume, start chatting with recruiters, and begin looking at >the help wanted ads on Sundays. -jma] > > >CIA veterans clash with new chief >Senior officers fear Goss too isolated; resignations mount > >By Walter Pincus and Dana Priest >The Washington Post >Updated: 12:00 a.m. ET Nov. 14, 2004 > > >WASHINGTON - Within the past month, four former deputy directors of >operations have tried to offer CIA Director Porter J. Goss advice about >changing the clandestine service without setting off a rebellion, but Goss >has declined to speak to any of them, said former CIA officials aware of >the communications. > >The four senior officials represent nearly two decades of experience >leading the Directorate of Operations under both Republican and Democratic >presidents. The officials were dismayed by the reaction and were concerned >that Goss has isolated himself from the agency's senior staff, said former >clandestine service officers aware of the offers. > >The senior operations officials "wanted to talk as old colleagues and tell >him to stop what he was doing the way he was doing it," said a former >senior official familiar with the effort. > >More defections coming? >Last week, Deputy Director John E. McLaughlin retired after a series of >confrontations between senior operations officials and Goss's top aide, >Patrick Murray. Days before, the chief of the clandestine service, Stephen >R. Kappes, said he would resign rather than carry out Murray's demand to >fire Kappes's deputy, Michael Sulick, for challenging Murray's authority. > >Goss and the White House asked Kappes to delay his decision until Monday, >but they are actively considering his replacement, several current and >former CIA officials said. > >Kappes, whose accomplishments include persuading Libyan leader Moammar >Gaddafi to renounce weapons of mass destruction this year, began removing >personal photos from his office walls yesterday, associates said. > >A handful of other senior undercover operations officers have talked >seriously about resigning, as soon as Monday. > >"Each side doesn't understand the other's culture very well," one former >senior operations officer said. "There is a way to do this elegantly. You >don't have to humiliate people. You bring in people with really weak >credentials, and everyone is going to rally around the flag." > >Culture clash >Agency officials have criticized as inexperienced the four former Hill >staff members Goss brought with him. Goss's first choice for executive >director ≠ the agency's third-ranking official ≠ withdrew his name after >The Washington Post reported that he left the agency 20 years ago after >having been arrested for shoplifting. > >Through his CIA spokesman, Goss, a former CIA case officer and chairman of >the House intelligence committee, declined to comment about these matters. > >At his Senate confirmation hearing Sept. 14, Goss said, "There is too much >management at headquarters," which he said was "too bureaucratic" and had >"stifled some of the innovation, some of the creativity and, frankly some >of the risk-taking in the field." > >He described one "stroke-of-a-pen fix" that he was considering: >"Reassurance that people will be supported in the field, building the >morale, those are more leadership issues." > >He also offered a glimpse of his management style. "I believe it takes, >sometimes, very blunt, strong language" to get changes made. "I don't like >doing it ≠ I call it tough love ≠ but I think occasionally you have to do >that." > >Goss has adopted a management style that relies heavily on former committee >staff aides, several of whom are former mid-level CIA employees not well >regarded within the CIA's Directorate of Operations. Murray, the new chief >of staff, has been perceived by operations officers as particularly >disrespectful and mistrustful of career employees. > >One former senior DO official agreed yesterday that some changes were >needed, saying: "Clean the place out if it's needed, but you've got to be >clever about it." > >The disruption comes as the CIA is trying to stay abreast of a worldwide >terrorist threat from al Qaeda, a growing insurgency in Iraq, the return of >the Taliban in Afghanistan and congressional proposals to reorganize the >intelligence agencies. The agency also has been criticized for not >preventing the Sept. 11, 2001, attacks and not accurately assessing Saddam >Hussein's ability to produce weapons of mass destruction. > >Advice reportedly rebuffed >The four former deputy directors of operations who have tried to offer Goss >advice are Thomas Twetten, Jack Downing, Richard F. Stoltz and the recently >retired James L. Pavitt. > >They "wanted to save him from going through" what two other directors, >Stansfield Turner and John M. Deutch, had experienced when they tried to >make personnel changes quickly, one former senior official aware of their >efforts said. > >Turner and Deutch served under Democratic presidents. Turner wanted to >clean house after the Watergate scandal and CIA "dirty tricks" exposed >during the Church Commission hearings. Deutch sought to change the inbred >culture of the operations staff after the Iran-contra scandal. > >The Directorate of Operations numbers about 5,000 people, including about >1,000 covert operators overseas, and runs foreign spying, including >counterterrorism operations. Because its operators engage in undercover >activities, often on their own, they are a difficult group to manage and >control. > >To win their support, Goss's immediate predecessor, George J. Tenet, met >with the former directors regularly. He sought advice from them >individually and started to rebuild the clandestine service, which was cut >by Deutch after its main adversary, the Soviet Union, dissolved, and before >terrorism became a central focus. > >Although Kappes has not left his job, several people have been approached >or screened as his replacement. One is the director of the counterterrorism >center; the other is the station chief in London. Both are undercover and >may not be identified by name. > >Another candidate, according to current and former CIA officials, is >Richard P. Lawless Jr., a former CIA operations officer who is deputy >assistant secretary of defense for Asian and Pacific affairs, according to >a CIA official who asked not to be identified. Lawless served in the agency >from 1972 to 1987, when he left after running afoul of senior DO officers >while carrying out secret missions for then-CIA Director William J. Casey. > >Lawless then opened a private consulting firm that did business in Asia, >particularly with Taiwan and South Korea. In a 2002 profile in the Taipei >Times, Lawless was described as having "long-term ties to President Bush's >brother, Florida Governor Jeb Bush." The two met shortly after Lawless set >up his consulting firm and Jeb Bush was Florida's secretary of commerce >seeking business in Asia. > > > >----------------------------------------------------------------------------------------------------- > >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >----------------------------------------------------------------------------------------------------- > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >----------------------------------------------------------------------------------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >----------------------------------------------------------------------------------------------------- > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > >. > From: kondrak Date: Wed Nov 13, 2002 9:25am Subject: Attack of the cookie snatchers With the recent cookie snatching/directory traversal exploits I tend not to agree Steve. All cookies should be treated as hostile. Your Fedex account could be snatched right off your machine and someone else be using it before you get your next bill. You are much better off buying a keyboard that will fire off macros to fill in passwords and names than to allow it in software. I've yet to see a hostile appalet physically push a button. (and Yes, I know about sniffers/keystroke loggers, I'm making the assumption that this esteemed group knows how to practice good opsec) Both cookies and javascript should always be held in highest contempt. Cookies should be relegated to the realm of spyware and treated as such. Yes, there are good uses for them, No, the advantages are not worth it. I run evidence eliminator 5 here on an automatic basis on the winboxen, all business transactions go over the linux box only and via vpn. I've had cleansweep get just a little too aggressive in the past. Plus, I like my security tools to stand alone, and not be linked to every other product the company makes, via registry entries. Symantec creates cobwebs for programs not even installed. This makes complete removal of one of their products un necessarily time consuming. It also makes registry processing slower when it doesn't have to be. Just my opinion on cookies...your mileage may vary.. >I use Norton System Works 2002 Clean Sweep | Internet |Cookies >function once a day or so to clean out the 20 or 30 unwanted cookies >I've collected during the day's work. Many cookies are beneficial. >Not all are harmless, so don't go deleting your entire cookie file or >changing its attributes to read only. Get a utility that lets you >examine each cookie and decide if you want to keep it. Thanks to >cookies, I don't have to enter my Fedex account number and all that >crap every day when I go to ship. Ebay knows who I am, which I don't >mind as it saves me having to log in. The weather.com site knows my >zip code and gives me local weather automatically. There are proper >uses for cookies. 6514 From: James M. Atkinson Date: Wed Nov 13, 2002 9:09am Subject: Doctor versus Guns statistics Statistics: Guns vs Physicians Posted February, 2002 Number of physicians in the US: 700,000. Accidental deaths caused by physicians per year: 120,000. Accidental deaths per physician: 0.171 (U.S. Dept. of Health & Human Services) Number of gun owners in the US: 80,000,000. Number of accidental gun deaths per year (all age groups): 1,500. Accidental deaths per gun owner: 0.0000188 Statistically, doctors are approximately 9,000 times more dangerous than gun owners. "FACT: Not everyone has a gun, but everyone has at least one Doctor." Please alert your friends to this alarming threat. We must ban doctors before this gets out of hand. As a Public Health Measure, I have withheld the statistics on Lawyers for fear that the shock could cause people to seek medical aid -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 6515 From: Mike Dever Date: Wed Nov 13, 2002 4:17pm Subject: New quote at the bottom of messages "Vocatus atque non vocatus deus aderit" Anyone care to translate? My schoolboy Latin has faded into the past. Regards Michael J. Dever CPP Dever Clark & Associates Canberra, Australia Voice: (02) 6254 5337 Email: deverclark@b... 6516 From: kondrak Date: Wed Nov 13, 2002 4:24pm Subject: Re: Attack of the cookie snatchers Agreed...I've got Mozilla on my Linux boxes, (Mandrake 9.0 is shipping with it, and sans Netscape) and it's finally ready for prime time IMHO...a great effort from the people behind it. My hat's off to them. I played with Mozilla/Seamonkey while it was being built, and never was quite satisfied with it enough to relinquish my old Netscrape 4.08, I trust NO Netscape since AOL got its tentacles around it. I can say the time has come for Mozilla to be a major player....love it. At 14:16 11/13/02 -0500, you wrote: >Or on the less extreme end, you could always install Mozilla as your >browser, go under preferences, Under Advanced, click "Scripts and >Windows", and uncheck things you're uncomfortable with, such as "Open >Unrequested Windows" (This kills off almost 100% of popups/unders) "Move >or resize existing windows" and "Raise and lower windows" (preventing >the javascript from stealing window focus inappropriately), and "Create >or change cookies" and "Read Cookies" (If you're paranoid, uncheck Read >Cookies. Create or change can be useful). >Now you've got a good balance of functionality and security. No need to >go off the deep end. >The other cool thing about mozilla is being able to ban domains from >setting cookies. I can prevent companies I don't trust, such as >DoubleClick, from setting cookies. Muhaha. >My $0.02. >-Paul > > >On Wed, 2002-11-13 at 10:25, kondrak wrote: > > With the recent cookie snatching/directory traversal exploits I tend > not to > > agree Steve. All cookies should be treated as hostile. Your Fedex account > > could be snatched right off your machine and someone else be using it > > before you get your next bill. You are much better off buying a keyboard > > that will fire off macros to fill in passwords and names than to allow it > > in software. I've yet to see a hostile appalet physically push a button. > > (and Yes, I know about sniffers/keystroke loggers, I'm making the > > assumption that this esteemed group knows how to practice good opsec) > > Both cookies and javascript should always be held in highest contempt. > > Cookies should be relegated to the realm of spyware and treated as such. > > Yes, there are good uses for them, No, the advantages are not worth it. > > > > I run evidence eliminator 5 here on an automatic basis on the winboxen, > all > > business transactions go over the linux box only and via vpn. I've had > > cleansweep get just a little too aggressive in the past. Plus, I like my > > security tools to stand alone, and not be linked to every other product > the > > company makes, via registry entries. Symantec creates cobwebs for programs > > not even installed. This makes complete removal of one of their > products un > > necessarily time consuming. It also makes registry processing slower when > > it doesn't have to be. > > > > Just my opinion on cookies...your mileage may vary.. > > > > > > > > > > >I use Norton System Works 2002 Clean Sweep | Internet |Cookies > > >function once a day or so to clean out the 20 or 30 unwanted cookies > > >I've collected during the day's work. Many cookies are beneficial. > > >Not all are harmless, so don't go deleting your entire cookie file or > > >changing its attributes to read only. Get a utility that lets you > > >examine each cookie and decide if you want to keep it. Thanks to > > >cookies, I don't have to enter my Fedex account number and all that > > >crap every day when I go to ship. Ebay knows who I am, which I don't > > >mind as it saves me having to log in. The weather.com site knows my > > >zip code and gives me local weather automatically. There are proper > > >uses for cookies. > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 6517 From: Shawn Hughes Date: Wed Nov 13, 2002 6:34pm Subject: report this came in from another listserv I am a member of: (U)A Defense Personnel Security Research Center (PERSEREC) report entitled Espionage Against the United States by American Citizens 1947-2001 may be viewed by linking to http://www.ncix.gov/news/index.html . The report is based on an unclassified database of 150 individuals involved in espionage that is maintained at PERSEREC. Any questions regarding this 135 page report should be directed to PERSEREC at perserec@o.... Shawn **************************************************************************** ****************************** Shawn Hughes Patrolman / Technician, Union County (TN) Sheriff's Office Uncertified Public Safety Bomb Technician Hazardous Materials Technician Subject Matter Expert; CBIRNE Operations, Technical Surveillance Operations Member, International Association of Bomb Technicians Region VI ORI - TN0870000 Ph. - (865)992-5212 email - srh@e... ---------------------------------------------------------------------------- ------------------------------------------------ 6518 From: Jason Dibley Date: Wed Nov 13, 2002 9:56am Subject: Video Test Kit With regard to video test kit, Tektronics make a couple of expensive but good items of test gear. The TSG95 is a PAL/NTSC signal generator, battery operated or DC12V power adaptor. It is broadcast spec and has many switchable patterns from 100% bars through to Pluge and multiburst. It also has a dual channel audio tone generator with sweep. The other piece of kit is the WFM 91 Waveform/Vector/Picture Monitor. This only has a 4"TFT screen but comes supplied with a viewing hood. The waveform monitor is swithable to pic in pic as is the vector. Audio waveform monitoring is also very good. This equipment is very expensive Almost £3000 with case & accessories, and I think it is more suited to broadcast point to point link work rather than CCTV install, but I use it for both and find it invaluable. Both items fit into a combined case with room for all accesories extra baterries,leads, adaptors etc. The one draw back apart from cost is that battery life is quite limited, however I make up lithium D cell packs, and keep them in my kit should the internal batteries run low at the usual inappropriate moment. Best Wishes Jason Miles Dibley jason.tsu@f... 6519 From: ed Date: Wed Nov 13, 2002 1:13pm Subject: Cordless keyboard writes on neighbor's computer another thing to tell your clients to avoid (if you haven't already) Cordless keyboard writes on neighbor's computer http://www.aftenposten.no/english/local/article.jhtml?articleID=427668 6520 From: Dragos Ruiu Date: Wed Nov 13, 2002 3:51am Subject: Re: They're at it again On Tue, 12 Nov 2002 22:16:28 -0500 "Steve Uhrig" wrote: > > Read between the lines very carefully on their page above. Merely by > opening HTML-encoded emails you communicate back to them the fact > that you opened the mail. This "web-beacon" will not apply if you use a client that doesn't parse the html references but merely displays the formatting (or not at all :-). I haven't investigated but they probably just have a special url encoded that they then use to log. If your client (outlook need not apply) doesn't go out to get the url or you have other measures in place their tracking will be moot. This doesn't even give them the joy of knowing who "opted out". cheers, --dr -- --dr pgpkey: http://dragos.com/dr-dursec.asc 0 = 1 , for large values of zero and small values of one. 6521 From: Paul Timmins Date: Wed Nov 13, 2002 1:16pm Subject: Re: Attack of the cookie snatchers Or on the less extreme end, you could always install Mozilla as your browser, go under preferences, Under Advanced, click "Scripts and Windows", and uncheck things you're uncomfortable with, such as "Open Unrequested Windows" (This kills off almost 100% of popups/unders) "Move or resize existing windows" and "Raise and lower windows" (preventing the javascript from stealing window focus inappropriately), and "Create or change cookies" and "Read Cookies" (If you're paranoid, uncheck Read Cookies. Create or change can be useful). Now you've got a good balance of functionality and security. No need to go off the deep end. The other cool thing about mozilla is being able to ban domains from setting cookies. I can prevent companies I don't trust, such as DoubleClick, from setting cookies. Muhaha. My $0.02. -Paul On Wed, 2002-11-13 at 10:25, kondrak wrote: > With the recent cookie snatching/directory traversal exploits I tend not to > agree Steve. All cookies should be treated as hostile. Your Fedex account > could be snatched right off your machine and someone else be using it > before you get your next bill. You are much better off buying a keyboard > that will fire off macros to fill in passwords and names than to allow it > in software. I've yet to see a hostile appalet physically push a button. > (and Yes, I know about sniffers/keystroke loggers, I'm making the > assumption that this esteemed group knows how to practice good opsec) > Both cookies and javascript should always be held in highest contempt. > Cookies should be relegated to the realm of spyware and treated as such. > Yes, there are good uses for them, No, the advantages are not worth it. > > I run evidence eliminator 5 here on an automatic basis on the winboxen, all > business transactions go over the linux box only and via vpn. I've had > cleansweep get just a little too aggressive in the past. Plus, I like my > security tools to stand alone, and not be linked to every other product the > company makes, via registry entries. Symantec creates cobwebs for programs > not even installed. This makes complete removal of one of their products un > necessarily time consuming. It also makes registry processing slower when > it doesn't have to be. > > Just my opinion on cookies...your mileage may vary.. > > > > > >I use Norton System Works 2002 Clean Sweep | Internet |Cookies > >function once a day or so to clean out the 20 or 30 unwanted cookies > >I've collected during the day's work. Many cookies are beneficial. > >Not all are harmless, so don't go deleting your entire cookie file or > >changing its attributes to read only. Get a utility that lets you > >examine each cookie and decide if you want to keep it. Thanks to > >cookies, I don't have to enter my Fedex account number and all that > >crap every day when I go to ship. Ebay knows who I am, which I don't > >mind as it saves me having to log in. The weather.com site knows my > >zip code and gives me local weather automatically. There are proper > >uses for cookies. > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > 6522 From: Kutlin, Josh Date: Wed Nov 13, 2002 3:43pm Subject: RE: Doctor versus Guns statistics and in a related story.... 95% of all statistics are made up :) Josh -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Wednesday, November 13, 2002 10:10 AM To: TSCM-L Mailing List Subject: [TSCM-L] Doctor versus Guns statistics Statistics: Guns vs Physicians Posted February, 2002 Number of physicians in the US: 700,000. Accidental deaths caused by physicians per year: 120,000. Accidental deaths per physician: 0.171 (U.S. Dept. of Health & Human Services) Number of gun owners in the US: 80,000,000. Number of accidental gun deaths per year (all age groups): 1,500. Accidental deaths per gun owner: 0.0000188 Statistically, doctors are approximately 9,000 times more dangerous than gun owners. "FACT: Not everyone has a gun, but everyone has at least one Doctor." Please alert your friends to this alarming threat. We must ban doctors before this gets out of hand. As a Public Health Measure, I have withheld the statistics on Lawyers for fear that the shock could cause people to seek medical aid -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- Vocatus atque non vocatus deus aderit ---------------------------------------------------------------------------- ---------------------- [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6523 From: JOE MORRIS Date: Wed Nov 13, 2002 3:53pm Subject: RE: New quote at the bottom of messages Bidden or not Bidden God is Present Joe *************************** "Vocatus atque non vocatus deus aderit" Anyone care to translate? My schoolboy Latin has faded into the past. Regards Michael J. Dever CPP Dever Clark & Associates Canberra, Australia Voice: (02) 6254 5337 Email: deverclark@b... 6524 From: Wayne T Work Date: Wed Nov 13, 2002 6:33pm Subject: RE: New quote at the bottom of messages I love a challenge. Well, here is a stab at it. Looks like someone who either speaks very slang Latin or just not written well??? "Call and not call god to be present" Wayne -----Original Message----- From: Mike Dever [mailto:deverclark@b...] Sent: Wednesday, November 13, 2002 5:18 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] New quote at the bottom of messages "Vocatus atque non vocatus deus aderit" Anyone care to translate? My schoolboy Latin has faded into the past. Regards Michael J. Dever CPP Dever Clark & Associates Canberra, Australia Voice: (02) 6254 5337 Email: deverclark@b... ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6525 From: INTELINK Date: Wed Nov 13, 2002 8:56pm Subject: Drive-By Spies Grab Personal Info Out Of Air Drive-By Spies Grab Personal Info Out Of Air Computer Users Often Fail To Use Security Systems FORT LAUDERDALE, Fla. -- What would you say if someone could pick up confidential information about you right out of the air, just by driving down the street? The fact is, things like credit card numbers and any private information that passes through computers, whether in stores or your home, is vulnerable to theft. Behind most computers is a spaghetti-like tangle of wires -- too messy for most people. So more computers now communicate without being connected by wires at all, making them more convenient, but also prime targets for "drive-by spies." Wireless computers are the hottest trend since the Internet, with more than $2 billion in sales this year and growing. There's a wireless revolution. Wireless computers are everywhere: in stores, banks, hospitals and universities, allowing information to fly through the air with little fuss ... and little security. Paul Henry, a security expert from the computer security firm CyberGuard, took NBC 6 senior correspondent Ike Seamans on a drive-by hacking demonstration in downtown Fort Lauderdale. Seamans and Henry drove around the city with a wireless laptop computer, while Henry demonstrated how easy it is to penetrate a wireless network that's not protected by encryption, just by passing near it. It's called drive-by hacking -- locating unprotected wireless computers from a car. "It takes hacking to a whole new level. It is anonymous hacking," Henry said. He used the same tools as cyberthieves: an inexpensive antenna, standard laptop, and free software from the Internet. Henry showed NBC 6 showed to enter wireless computers that have no security. In minutes, the laptop's screen was filled with wireless networks. Less than 20 percent had any security at all. "We could enter one of these networks right now from here in this car?" Seamans asked. "Yeah, we could enter the network," Henry said. "You could get confidential records if they are not properly secure," Henry said. To demonstrate, he picked up another network as the car passed in front of a downtown Fort Lauderdale office building. The NBC 6 investigation found unsecured wireless cash registers transmitting credit card transactions from a popular clothing shop and a major department store, plus wireless computers with no security in doctor's offices, government facilities and an aviation company at the airport. Armed with a tiny handheld computer, another cyberhacker tool, Henry inconspicuously entered an office building, where he quickly found companies using wireless computers with no security. "If I had this (handheld computer) connected to a wireless cash register, we could then grab the transaction data as we walk through the building," Henry said. That's what happened to Best Buy stores last May. Wireless cash registers were shut down in 500 stores until security was installed, following reports that drive-by hackers were stealing customer credit card data. After his drive-by hacking demonstrations, Henry created a map showing unsecured wireless networks in Fort Lauderdale. The map was complete with all the details needed to enter the networks. "If you don't secure your network, you deserve to be hacked," Henry said. Stealing from wireless networks is easy because they're just radio broadcasts sending signals through the air from one computer to another, Henry added. Without security, signals are easily intercepted, networks can be breached, and vital information can be stolen. According to computer security experts Damon Cortesi and Greg Moody, the easiest targets for hackers are home wireless computers which come with built-in security systems that many owners don't even turn on, believing they'll never be a victim. "If you did your taxes on your computer, store confidential data on your computer and haven't secured it, someone driving around could access that," Cortesi said. And Moody added: "What has been most surprising is the number of businesses as well as residences that have not taken the basic levels of security that are available." Cortesi and Moody's consulting firm, Crowe Chizek, finds just 20 percent of the nation's 25,000 wireless networks have adequate security. That, experts say, is a hacker's gold mine. Signals from hand-held computers and cell phones that access wireless networks are easily intercepted, too. For that reason, employees at the Pentagon are prevented from using them to connect to classified computers. The United States Secret Service and the FBI probe for poor wireless security in government agencies and private companies. Kelly Darden of the FBI's Miami bureau says taking basic precautions is important, even at the cost of convenience. "Security comes at a price," Darden said. "It is an inconvenience, but I think it is a necessary precaution that in the long run is going to pale in comparison when you consider the potential damage that can be done if your system is attacked." If a business computer doesn't have adequate security, it could cost thousands of dollars to make it more secure. But for home computers, experts say it's not only inexpensive but also common sense. Home wireless computer users can improve security by taking three simple steps. First, remember to turn on the computer's security system. Second, get a firewall for your computer. They are as cheap as $40 and can prevent unauthorized users from tapping into your computer. And third, learn more about hackers, and the tactics they may use to get into your computer or network. http://www.nbc6.net/ikeseamans/1784744/detail.html __________________________________________________ Do you Yahoo!? Yahoo! Web Hosting - Let the expert host your site http://webhosting.yahoo.com 6526 From: John Kennedy Date: Thu Nov 14, 2002 11:56am Subject: Re: Cat 5e video twisted pair modems Where could you recommend looking for these twisted pair modems? > > Most of our covert quick plant systems we use Cat5E which is 4 pair > twisted, twisted pair modems at each end to put the video on and off > the Cat 5 pair, and we send power to the camera back up the Cat 5 > from the listening post. You can run two or three cameras that way, > since all can share a common power pair and three cameras can use one > data pair each. > -- John Kennedy johnk@s... Second Source, Inc. Annapolis, MD USA 6527 From: MitchD Date: Wed Nov 13, 2002 10:18pm Subject: FW: RFID RFID or radio "fingerprinting" has been around for a long time. Every transmitter does have its own signature, and Radio fingerprinting has been used very effectively for many reasons, All good. It appears that the RF ID system mentioned is nothing more than a transponder setup, and should be addressed as such. RFID has it own very valuable applications besides inventory control at Wal Mart US Customs uses Barcodes for tracking, and items still get inspected. Therefore I don't think anything will be enhanced by they're use in general, especially for expediting shipments. Transponders are not as inexpensive or easy to use or implement as barcodes. Transponders have to be programmed. Also, what will be the standard in regards to protocol ,as well as integration, with transponders ? Go to transponders.com and see the many types, and mfgs of. A Lexus transponder system retails for more than 3000 bucks,if 1/5 is cost that's 600 bucks for 2 transponders and a reader, and includes a single shot of programming, as well as code scrolling. A transponder may also be looked at as a rolling code garage door opener that's powered through inductance. New technology???? I believe they're great for security systems, and antitheft systems in the automotive industry, other than that its just another pet rock or rubiks cube for the labeling industry...UPC's and barcodes are simple. Why fix something till its broke....Ask anyone who uses "Easy Pass" on a toll road if they like it, and then ask them how many times they got mailed a citation for "blowing" a toll booth even after the user honestly got the green light indicating their transponder and account information was recognized.. Just my 2 cents MD _________________________________________ TSCM/Special Operations Group Inc. e-mail MitchD@t... website: www.tscmusa.com (615) 837 9933 ______________________________________ 6528 From: rockdriver Date: Thu Nov 14, 2002 4:28pm Subject: RFID RFID or radio "fingerprinting" has been around for a long time. Every transmitter does have its own signature, and Radio fingerprinting has been used very effectively for many reasons, All good. It appears that the RF ID system mentioned is nothing more than a transponder setup, and should be addressed as such. RFID has it own very valuable applications besides inventory control at Wal Mart US Customs uses Barcodes for tracking, and items still get inspected. Therefore I don't think anything will be enhanced by they're use in general, especially for expediting shipments. Transponders are not as inexpensive or easy to use or implement as barcodes. Transponders have to be programmed. Also, what will be the standard in regards to protocol ,as well as integration, with transponders ? Go to transponders.com and see the many types, and mfgs of. A Lexus transponder system retails for more than 3000 bucks,if 1/5 is cost that's 600 bucks for 2 transponders and a reader, and includes a single shot of programming, as well as code scrolling. A transponder may also be looked at as a rolling code garage door opener that's powered through inductance. New technology???? I believe they're great for security systems, and antitheft systems in the automotive industry, other than that its just another pet rock or rubiks cube for the labeling industryÖ..UPC's and barcodes are simple. Why fix something till its brokeÖÖ..Ask anyone who uses "Easy Pass" on a toll road if they like it, and then ask them how many times they got mailed a citation for "blowing" a toll booth even after the user honestly got the green light indicating their transponder and account information was recognizedÖÖ Just my 2 cents MD 6529 From: alcook309 Date: Thu Nov 14, 2002 5:30pm Subject: Tektronix 492P SA Laptop Control As the proud owner of a new-second hand 492p Spectrum Analyser, I'm now looking for laptop control. Searching the net reveals very little in the way of this type of support. This surprises me as the GP-IB (RS488) interface is a long standing protocol of some repute. There appears some for industry / medical equipment support but nothing for genereal (read TSCM) use. I cannot (with a capital CANNOT) program, and do not wish to spend the next several years learning to get a rudimentary trace upon my aged (by then of course) 2.4 GHz Pentium. So my question (finally) is.. Is there anyone out there with freeware (preferably) shareware or software available to fully control, in real time, a 492P? Regards, Alan Cook Technical Security Services, UK. 6530 From: Thomas Conlon Date: Wed Nov 13, 2002 9:11pm Subject: RE: O/T Doctor versus Guns statistics Hmmm.. About in '95 I "asked my family doctor" about "what that poster" on the wall meant, which cited some type of category related to general psych profiling incorporating firearm ownership. I was also informed later on, subsequently (recently) having had a child, at one ped that we did not select, that after age 12 the child would be expected to undergo a non-parental supervised interview (after physical)... -tc syseng@m... "It's not like when you were in 7th grade any more" 6531 From: James M. Atkinson Date: Thu Nov 14, 2002 8:04pm Subject: Important History Lesson This is a very important history lesson about someone who was active in TSCM in the Washington area for a number of years. http://home.pacbell.net/diana_do/knowjack.htm -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6532 From: kondrak Date: Thu Nov 14, 2002 8:57pm Subject: The boom-boom is here...from Asia Times >Worth a read, even IF it's a hoax. Asia times is pretty reputable. Scary >stuff... > > >http://www.atimes.com/atimes/Front_Page/DK15Aa01.html > >Apocalypse Now, or Alottanukes Soon >By Pepe Escobar > >At a time when a tape handed over to the Qatar-based Al-Jazeera television >station has received widespread expose for its purported comments by Osama >bin Laden in praise of recent terror events around the world, another >al-Qaeda message released to the same station has received little coverage. > >Al-Jazeera was granted an interview with one Mohammed al-Usuquf, allegedly >al-Qaeda's number three. Al-Usuquf is said to be a doctor in physics and >to hold a masters degree in international economics. A copy of the >interview was sent to the prestigious Arab-language daily Al Quds Al >Arabi, edited in London, but it was not printed. > >Asia Times Online has obtained a copy of the interview, and reproduces >excerpts here, with the caveat that the identity of the man has not yet >been confirmed, nor has his membership within al-Qaeda. > >Al-Usuquf says that al-Qaeda's Kuwaiti spokesman, Sulaiman Abu Ghaith, and >bin Laden himself, suggested that he grant the interview. Bin Laden, he >says, is "alive and healthy, along with his commanders Mohammed Atef, >Khalid Shaik Mohammed and Mullah Omar". > >Al-Usuquf starts by criticizing Washington's disrespect of the Kyoto >Protocol on climatic change, the International Criminal Court and the >Palestinian cause, as well as the "financial greed" engendering >speculative gains over Third World countries. He also criticizes the >manner in which America wastes wealth, like US$80 billion a year on >gambling. "They [have] lost the notion of spirituality and only live in sin." > >For this reason, America must be destroyed, and al-Usuquf insists that >"aircraft carriers, nuclear submarines and spy satellites will be >worthless in the next war". > >Al-Qaeda, according to him, has 5,000 first rank operatives and around >20,000 all over the world. Of all the prisoners in the US, only "20 or 30" >are al-Qaeda, and all of them "second-rank". Confirming Asia Times Online >information, he swears that there are no first-rank prisoners in >Guantanamo in Cuba. Al-Usuquf says, "We have more than 500 first-rank and >800 second-rank [operatives] inside the US." "First rank" are considered >ones that have lived in the US for more than 10 years, most of them >married with children. "They have an idea about the plans, and they are >just waiting for a call." "Second-rank" operatives arrived in the past >five years and "have no idea about the plans". They are all willing to die. > >Al-Usuquf insists that September 11 "was just the beginning. It was a way >to call the world's attention to what's going to happen." He then details >a plan to destroy the US by "attacking the heart of what they consider the >most important thing in the world: money". > >"The American economy is an economy of false appearances," says al-Usuquf. >"There's no real economic weight. American GNP is something around $10 >trillion, but only 1 percent comes from agriculture, and only 24 percent >from industry. So 75 percent of its GNP comes from services, and most of >it is financial speculation. For someone who understands economics, and >apparently America's Treasury Secretary Paul O'Neill does not, or cannot, >the US as a whole behaves like an immense dot.com, and dollars are its >stocks. The value of stocks from a given company is directly proportional >to its profitability. When a company only provides services, but does not >produce goods, the value of its stocks depends on its credibility. What >I'm saying is if US credibility is affected, its stocks - the US dollar - >will fall at tremendous speed, and the whole American economy will collapse." > >Al-Usuquf is absolutely positive, "because, in a smaller scale, this is >exactly what big financial conglomerates do with Third World countries to >collect profits in one month that no Swiss bank would guarantee in four to >five years". Al-Usuquf says that al-Qaeda could do the same by "provoking >a deficit of $50 to 70 trillion, the equivalent to five to seven years of >the GNP of the US". How? By "destroying America's seven largest cities and >some other measures". The means? "Atomic bombs." Al-Usuquf's most >startling revelation is that the bombs "won't be launched, they are >already there". "Seven nuclear heads have already been positioned on >American soil, before September 11, and they are ready to be detonated. >Before September 11, American security was a fiasco, and even later, if we >needed, we could position the bombs there. They arrived through seaports, >as normal cargo. A nuclear head is not bigger than a fridge, so it can >easily be camouflaged as one. Thousands of containers arrive at a seaport >every day, and even with very efficient security, it's impossible to check >and examine each one of them." > >Al-Usuquf says that the bombs were bought on the black market: five from >the former USSR and two from Pakistan. The five Russian heads "are from >T-3 missiles, also known as RD-107, and their power is around 100 kilotons >each, that is five times the Hiroshima bomb. The Pakistani ones are less >powerful, something around 10 kilotons each." > >Each of the Russian bombs would have cost around $200 million. Al-Qaeda >was able to raise the money "because we have many sponsors. Many countries >sponsor us, and also some very rich people." And not all of these are Arab >countries. "Some European countries as well are also interested in the >fall of the US." As to the "rich people", they are "people who are also >tired of seeing the US bleeding the rest of the world." > >And Iraq's Saddam Hussein, says Al-Usuquf, is not one of these people, >"but just a collaborator, represented by Abdul Tawab Hawaish, his vice >prime minister and responsible for Iraq's arms program". > >Al-Usuquf says that the bombs cannot be detected by US authorities. "Even >if they are old, they were modernized and are very well hidden. Even if >they were located, they have autodetonation mechanisms in case something >or someone gets close. Even an electromagnetic pulse is not capable of >deactivating them." The bombs allegedly cannot be detected because "they >are enveloped in thick layers of lead". They could be detonated "by >various methods - cellphone call, radio frequency, seismic shock or by >their regressive clock". > >Al-Usuquf details the whole plan. "First, one head would be detonated, >which would cause the deaths of 800,000 to 1 million people and a chaos >never seen before. During this chaos, two or three planes, which are now >disassembled inside barns near empty roads in the US countryside, would >take off in suicide missions to pulverize another two or three big >American cities with chemicals. Once the disease was identified, all >seaports and airports would be quarantined. Land borders would also be >closed. No plane, boat or car would enter or leave the US. This would be >total chaos." The first target would be the city "that would offer the >best conditions, for example bright sky and winds of eight or more miles >an hour blowing towards the center of the country, so radioactive dust can >contaminate the largest possible area". > >This attack would not knock out the US, recognizes al-Usuquf, "But the >process would be initiated. As with the World Trade Center, it would be >just a question of time for the whole economic structure to be turned to >dust. If the objectives are reached with one bomb and diseases, probably >we will save the lives of other people, but it's risky, and probably six >more bombs will be detonated, one a week, and more attacks with chemical >weapons will be launched." According to estimates made by al-Usuquf "and >Ayman al-Zawahiri", al-Qaeda's number 2, about 15 million people would >die, victims of the bombs and the radiation. Among those contaminated by >diseases, "25 percent will die, a figure around more than 5 million, plus >many others due to the chaos and disorder". > >Al-Usuquf does not fear an American military response. "Even if five or 10 >cities are chosen at random to be destroyed, it will still be a small >price to pay. The problem is that the economic despair will be so great >that even if it saves [money] by not using weapons, American liquidity >will be near zero, and the US will make more money selling a Nimitz-class >aircraft carrier to Turkey or Italy for $5 billion, because they will >urgently need to recapitalize. But it will be too late. Moreover, what >will remain of an American soldier's morale to fight knowing that his >whole family died and his country ceased to exist? To fight for what?" > >The world economy would not collapse, says al-Usuquf, although "in the >beginning, it will be very difficult. But without the US the world will >soon rise in a more just and fraternal manner. Nothing can stop the plan." > >And whatever America does, "it's too late". When will the attack begin? "I >can't tell." [Non-text portions of this message have been removed] 6533 From: Dragos Ruiu Date: Thu Nov 14, 2002 11:46am Subject: Fwd: [ISN] Proposed bill could jail hackers for life The last point in this article will be of interest to TSCM readers... (Gratuitous editorial: In general I have to say that life imprisonment for maybe mistakenly typing the wrong things sounds, err... inappropriate - especially if no physical harm or injury to people actually results. But I suppose it will come down in the interpretation and application, because ridiculous examples could be used in both pro and con arguments. Some recent examples do not necessarily fill me with great confidence about this measure though. I do get concerned, however, when endangering bit patterns starts to carry heavier penalties than manslaughter. ) cheers, --dr ---------- Forwarded Message ---------- Subject: [ISN] Proposed bill could jail hackers for life Date: Thu, 14 Nov 2002 01:39:52 -0600 (CST) From: InfoSec News To: isn@a... http://news.com.com/2100-1001-965750.html?tag=fd_top By Declan McCullagh Staff Writer, CNET News.com November 13, 2002, 5:57 PM PT WASHINGTON -- A last-minute addition to a proposal for a Department of Homeland Security bill would punish malicious computer hackers with life in prison. The U.S. House of Representatives on Wednesday evening voted 299 to 121 to approve the bill, which would reshape large portions of the federal bureaucracy into new a department combining parts of 22 existing federal agencies, including the Secret Service, the Coast Guard, and the FBI's National Infrastructure Protection Center. During closed-door negotiations before the debate began, the House Republican leadership inserted the 16-page Cyber Security Enhancement Act (CSEA) into the Homeland Security bill. CSEA expands the ability of police to conduct Internet or telephone eavesdropping without first obtaining a court order, and offers Internet providers more latitude to disclose information to police. In July, the full House approved CSEA by a 385-to-3 vote, but it died in the Senate. By inserting CSEA into the Homeland Security bill, the measure's backers are hoping for a second chance before Congress adjourns for the holidays. "Defending against terrorists who can strike any time with any method requires a change in our approach to the problem," CSEA sponsor Rep. Lamar Smith said in a statement. "We need a new government structure with a clear focus and clear mission to protect Americans and increase public safety. The new Department of Homeland Security will fulfill that vital role." Earlier this year, Smith said: "Until we secure our cyberinfrastructure, a few keystrokes and an Internet connection is all one needs to disable the economy and endanger lives. A mouse can be just as dangerous as a bullet or a bomb." Smith heads a subcommittee on crime, which held hearings that drew endorsements of CSEA from a top Justice Department official and executives from Microsoft and WorldCom. Citing privacy concerns, civil liberties groups have objected to portions of CSEA. "There are a lot of different things to be concerned about, but preserving Fourth Amendment and wiretap standards continues to be a critical test of Congress' commitment of civil liberties," Marc Rotenberg, director of the Electronic Privacy Information Center, said Wednesday. Rotenberg said that CSEA makes "ISPs more closely aligned with law enforcement interests than customer confidentiality interests. It may not be surprising, but it's not good news." Democratic members of Congress said during Wednesday evening's floor debate that the Department of Homeland Security bill had been rushed to the floor without everyone having a chance to read it. They did not complain specifically about CSEA, which has already been approved near-unanimously by the House. "We were given a massive new bill this morning that is being rushed through the House with no opportunity for debate," said Rep. Henry Waxman, D-Calif. "I doubt more than 10 people in Congress know (what's) in the bill." House Majority Leader Dick Armey, R-Texas, replied by saying: "There seems to be a concern that the bill is being rushed to the floor...This was not rushed to the floor. We worked hard on it. We worked together on it." What CSEA does If approved by the Senate and signed by the president, who has called for a Department of Homeland Security, the law would: * Promise life terms for computer intrusions that "recklessly" put others' lives at risk. A committee report accompanying the legislation predicts: "A terrorist or criminal cyberattack could further harm our economy and critical infrastructure. It is imperative that the penalties and law enforcement capabilities are adequate to prevent and deter such attacks." * Permit limited surveillance without a court order when there is an "ongoing attack" on an Internet-connected computer or "an immediate threat to a national security interest." That kind of surveillance would, however, be limited to obtaining a suspect's telephone number, IP address, URLs or e-mail header information--not the contents of online communications or telephone calls. Under federal law, such taps can take place when there's a threat of "serious bodily injury to any person" or activity involving organized crime. * Change current law, which says it's illegal for an Internet provider to "knowingly divulge" what users do except in some specific circumstances, such as when it's troubleshooting glitches, receiving a court order or tipping off police that a crime is in progress. CSEA expands that list to include when "an emergency involving danger of death or serious physical injury to any person requires disclosure of the information without delay." * Specify that an existing ban on the "advertisement" of any device that is used primarily for surreptitious electronic surveillance applies to online ads. The prohibition now covers only a "newspaper, magazine, handbill or other publication." - ISN is currently hosted by Attrition.org To unsubscribe email majordomo@a... with 'unsubscribe isn' in the BODY of the mail. ------------------------------------------------------- -- dr@k... pgp: http://dragos.com/kyxpgp Advance CanSecWest/03 registration available: http://cansecwest.com "The question of whether computers can think is like the question of whether submarines can swim." --Edsger Wybe Dijkstra 1930-2002 6534 From: Thomas Conlon Date: Thu Nov 14, 2002 10:03pm Subject: RE: Fwd: [ISN] Proposed bill could jail hackers for life Yeah, we all did our thing back in the day... But how does this interface with the RIAA "right to hack" law? I am getting seriously confused here, and it's not like Microsoft has addressed the null GUID "loophole"... (call it Mplayer tuner workspace or whatever you like, it's a bug) -tc syseng@m... "There be no shelter here" 6535 From: frost_bitten_ca Date: Thu Nov 14, 2002 11:13pm Subject: No bail - illegally possessed nearly 2,400 missile warheads POSTED AT 7:14 PM EST Thursday, November 14 Canadian seeks bail Associated Press and Canadian Press Albuquerque, N.M. ≠ The Canadian president of a counterterrorism training centre has asked again to be released on bail pending trial on charges he illegally possessed nearly 2,400 missile warheads. David Hudak, who has been in custody since his Roswell, N.M., company was raided Aug. 15, got a fresh chance in U.S. district court in Albuquerque on Thursday to argue that he deserves bail. During the bail hearing, Mr. Hudak's lawyer, Tim Padilla, questioned a sergeant with the joint task force on organized crime involving the RCMP and city police forces in B.C. about his work with Mr. Hudak. Dan Holzer said he first met Mr. Hudak in Mojave, Calif., where the defendant was developing a system in 1996 for quick, explosive entry into a building. The "breaching system" was being developed for the armed forces for use in situations such as hostage rescues, Sgt. Holzer testified. The system was "superior to anything we had at the time," he said. "It's terribly, terribly exacting," Sgt. Holzer told U.S. district Judge John Conway. The system involves picking locks and using very small explosive charges to get as close to hostages as possible without being detected, Sgt. Holzer said. "What was significant about this system was that it reduced the amount of explosives [used], which was really critical," Sgt. Holzer said. Mr. Padilla cited the Wen Ho Lee case in arguing that prosecutors failed to meet the stringent test for keeping a defendant in jail before conviction. Mr. Lee, a former Los Alamos National Laboratory scientist, was freed in July 2000 by a federal judge who criticized the government for abusing Mr. Lee's right to bail. Mr. Padilla said Mr. Hudak, if released on bail, would stay with a third-party custodian, would have no firearms, would submit to searches any time, wear an electronic monitoring device and post a $785,000 property bond, among other conditions. In Las Cruces, N.M., on Aug. 27, U.S. Magistrate Karen Molzen denied Mr. Hudak bail, saying he was a flight risk and a threat to the community. Mr. Hudak, who's from North Vancouver, is charged with illegally possessing 22 semi-automatic rifles, 22 semi-automatic pistols, seven shotguns, 22 large-calibre rifles and nearly 2,400 warheads for shoulder-launched missiles. He has pleaded not guilty to the charges. If convicted, he faces up to 10 years in prison and a $392,500 fine. Investigators have said Mr. Hudak, president of High Energy Access Tools Corp., lacked proper permits for the warheads. His company trains police emergency response teams and anti-terrorism units. During the August hearing in Las Cruces, Judge Molzen said she was concerned that Mr. Hudak is a Canadian national in the United States on an expired non-immigrant visa. But Mr. Hudak, in a motion for reconsideration of bail, said he would waive his right to fight extradition to the United States. Judge Molzen said she was also concerned that Mr. Hudak "was involved in the training of foreign nationals in explosives as well as some small arms." Mr. Padilla's motion argues that the warheads were inoperable without their launchers, and no launchers were present at the HEAT facility where the warheads were stored. Judge Molzen said the fact that Mr. Hudak's wife and two children live in North Vancouver and that his business has lost value since his arrest also influenced her decision. Prosecutors said they learned from their investigation that Mr. Hudak had received as much as $9.5-million for training some military officials of the United Arab Emirates and that some of the money may have been deposited in an offshore bank. The defence has denied that Mr. Hudak maintains offshore accounts and said the warheads were purchased to demolish unwanted buildings and for other similar activities on HEAT property. "The explosives have been here since 2000 and there have been no incidents," Mr. Padilla told Judge Molzen during the August hearing. http://www.globeandmail.com/servlet/ArticleNews/front/RTGAM/20021114/w miss1114a/Front/homeBN/breakingnews 6536 From: Dave Emery Date: Thu Nov 14, 2002 11:29pm Subject: Current Homeland Security bill makes some hobby radio listening a felony I have confirmed that the version of the Homeland Security Act passed in the House does in fact contain the language eliminating the hobby safe harbor for interception of radio communications not "readily accessible to the general public" under the ECPA. Such an interception, once a minor offense for the first offender if not for commercial advantage or private financial gain or in furtherance of a crime will now be a major felony with 5 years in jail as penalties. No mercy for a first offense, or for signals extremely readily intercepted on common scanners. This now means that tuning in the audio from the flying traffic reporter's feed to the local radio stations to see about a tie up ahead on the freeway is a felony that could land you in jail for five years. And woa under him who even thinks about tuning the 46 and 49 mhz band to see what is there... or ever listening to the beeps and buzzes of powerful pager transmitters that still transmit the odd voice page intermixed with the POCSAG and FLEX. --- http://news.com.com/2100-1001-965750.html House considers jailing hackers for life By Declan McCullagh November 13, 2002, 5:57 PM PT WASHINGTON--A last-minute addition to a proposal for a Department of Homeland Security would punish malicious computer hackers with life in prison. The U.S. House of Representatives on Wednesday evening voted 299 to 121 to approve the bill, which would reshape large portions of the federal bureaucracy into a new department combining parts of 22 existing federal agencies, including the Secret Service, the Coast Guard, and the FBI's National Infrastructure Protection Center. During closed-door negotiations before the debate began, the House Republican leadership inserted the 16-page Cyber Security Enhancement Act (CSEA) into the Homeland Security bill. CSEA expands the ability of police to conduct Internet or telephone eavesdropping without first obtaining a court order, and offers Internet providers more latitude to disclose information to police. In July, the full House approved CSEA by a 385-to-3 vote, but it died in the Senate. By inserting CSEA into the Homeland Security bill, the measure's backers are hoping for a second chance before Congress adjourns for the holidays. [...] ------------------------------------------------------------------------- POLITECH -- Declan McCullagh's politics and technology mailing list You may redistribute this message freely if you include this notice. To subscribe to Politech: http://www.politechbot.com/info/subscribe.html This message is archived at http://www.politechbot.com/ Declan McCullagh's photographs are at http://www.mccullagh.org/ ----- End forwarded message ----- -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 6537 From: Date: Sat Nov 16, 2002 5:46pm Subject: U.S. Spectrum Allocations 300 - 3000 MHz U.S. Spectrum Allocations 300 - 3000 MHz A Vertical Bar Chart With Frequency Bands Shown Approximately To Scale November 2002 http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-228542A1.pdf [Non-text portions of this message have been removed] 6538 From: Kirk Adirim Date: Sat Nov 16, 2002 10:17pm Subject: RE: Re: Cat 5e video twisted pair modems Nov. 14 John Kennedy wrote: "Where could you recommend looking for these twisted pair modems?" Well, I would recommend looking at the ENDS of the twisted pair, thats where the modems would most likely be found. But seriously, try this website http://www.nvt.com/. They will have the transformer/modems your looking for. Cheers, Kirk www.tactronix.com -----Original Message----- From: John Kennedy [mailto:johnk@s...] Sent: Thursday, November 14, 2002 9:57 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Cat 5e video twisted pair modems Where could you recommend looking for these twisted pair modems? > > Most of our covert quick plant systems we use Cat5E which is 4 pair > twisted, twisted pair modems at each end to put the video on and off > the Cat 5 pair, and we send power to the camera back up the Cat 5 > from the listening post. You can run two or three cameras that way, > since all can share a common power pair and three cameras can use one > data pair each. > -- John Kennedy johnk@s... Second Source, Inc. Annapolis, MD USA ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6539 From: A.Lizard Date: Sat Nov 16, 2002 3:38pm Subject: Re: Tektronix 492P SA Laptop Control At 03:10 PM 11/16/02 +0000, you wrote: While this might be overkill for your intended application, looked into Lab-Windows? It's handled GPIB for quite a few years. http://www.ni.com Other than that, check out http://sourceforge.net/ , maybe someone in the Open Source community is doing something that applies. good luck A.Lizard >Message: 4 > Date: Thu, 14 Nov 2002 23:30:28 -0000 > From: "alcook309" >Subject: Tektronix 492P SA Laptop Control > >As the proud owner of a new-second hand 492p Spectrum Analyser, I'm >now looking for laptop control. > >Searching the net reveals very little in the way of this type of >support. This surprises me as the GP-IB (RS488) interface is a long >standing protocol of some repute. > >There appears some for industry / medical equipment support but >nothing for genereal (read TSCM) use. > >I cannot (with a capital CANNOT) program, and do not wish to spend >the next several years learning to get a rudimentary trace upon my >aged (by then of course) 2.4 GHz Pentium. > >So my question (finally) is.. > >Is there anyone out there with freeware (preferably) shareware or >software available to fully control, in real time, a 492P? > >Regards, > >Alan Cook >Technical Security Services, UK. ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "They who would give up an essential liberty for temporary security, deserve neither liberty or security." Benjamin Franklin Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... PGP 7.0.3 key available by request,keyserver,or on my Web site Download PGP from http://www.pgpi.org for e-mail privacy. PGPfone v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ Disaster prep info: http://www.ecis.com/~alizard/y2k.html ************************************************************************ 6540 From: Raymond Date: Sat Nov 16, 2002 11:55pm Subject: E-Mail Suggesting Phone Taps-South Africa It's a setup, says Wellesley-Wood of e-mail suggesting phone taps Nicky Smith, November 17 2002 http://www.businessreport.co.za Johannesburg - Missing documents and evidence of phone tampering had forced Durban Roodepoort Deep (DRD) to hire Associated Intelligence Network (AIN), a private security company, said DRD chairman Mark Wellesley-Wood. He made these claims when faxed a copy of an e-mail that appears to have been sent to his e-mail address on August 7. Its subject line says: "phone watch", and it reads: "Dear Mark, * We are in place and listening to 5177 and 8326 * Difficulty with 6101 * No success with number 6322 * Online next week 5030 Regards, Andre" Wellesley-Wood confirmed that the e-mail address was his, but said he had not seen the document before and questioned its authenticity. "I haven't a clue what phone watch is, I don't know who Andre is, the numbers don't make any sense, it's a complete phony. I have nothing in my e-mail box for that date [and] I wouldn't know how to delete an e-mail," he said. He was not aware whether AIN tapped phones or not. "They have never been asked to; we never instructed them to. We don't tap phones," he said. Warren Goldblatt, the director of AIN, said he was aware of the allegations. "The allegations are absolute rubbish. We will not stoop to doing anything illegal. It's purely a tactic to discredit individuals in light of what happened this week." AIN Group offers risk management services, consults on security and does surveillance work. Wellesley-Wood said that after DRD human resources manager Vic Hoops left the company, it tendered for new security contractors. "There were numerous security breaches, documents were disappearing and we had a suspicion the phones were being interfered with." When pressed, he said: "One set of documents went missing, the files on Skilled Labour Brokers (SLB), and we've had a problem ever since." On Tuesday Roger Kebble, the chairman of a number of gold companies, was arrested for fraud involving his interest in SLB, a close corporation that was paid R6.3 million over the past seven years. Wellesley-Wood said there was "no personal animosity" between himself and Kebble. Clearly not comfortable in saying the two of them were friends, he concluded: "We had a business relationship." --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za 6541 From: Fernando Martins Date: Sun Nov 17, 2002 7:22am Subject: RE: CCTV Installation tool kit? Regarding this issue, there is still a missing point in this discussion ... Forensic. And what about when we need to analise something and got the conclusion that we got nothing? FM ******************* http://www.infosecnews.com/opinion/2002/11/13_03.htm Wednesday, November 13, 2002 The Truth about Digital CCTV by Teresa Lang Not too long ago, I was speaking at an International Security Conference on the subject of forensic video analysis. Coincidentally, the vast majority of the more than 500 vendors with booths at the conference were also interested in video security systems, but from the perspective of selling them. Digital CCTV in particular seemed to be the hot new item to offer customers. I spoke to representatives of many of the vendors, and requested written information from all of them. The big selling point they were making to prospective customers was the compression ratio. Although the idea of compressing the image from a security or surveillance system may sound good when you are only interested in bandwidth and storage, it may prove to be the element that makes your system useless to you should you ever need it as evidence. This may prove to be a serious problem for those users of digital video surveillance or security systems that intended the systems to be more than an expensive alternative to deterrent devices such as mock cameras or camera use signage. If this sounds as if it is a condemnation of the technology, it is not. It is a condemnation of the fact that many buyers are not fully aware of the capabilities and limitations of the technology, due to either their own lack of research or the well meaning, but commission-oriented facts set forth by some vendor representatives. Let me start at the beginning to explain this. Digital video is a definite boon to the entertainment industry, and that success has pushed it into other areas, such as security. For entertainment, the compression of an image file will reduce the amount of fine detail in the picture, but that makes little or no difference to the audience, who are there for the entertainment value. Compression is the key element in this argument. Compression is the conversion of a digital format so that it takes less bandwidth for transmission and less storage space. When dealing with image files, compression is considered to be "lossy." Meaning the image that is compressed, transmitted and/or stored is only an approximation of the original image. The higher the compression ratio, the more loss of data there will be within the image. In this process, details of an image may be lost. A single frame of analog video using the North American standard format (National Television Standards Committee, or NTSC) contains 349,920 pixels, or small picture elements. It also contains two separate images called fields. In this format, there are 29.97 frames per second, resulting in 10,487,102.4 pixels, and 59.94 images per second. This is an incredible amount of information. In fact in order to convert a single color video signal into a digital format requires an encoding of 8 bits of brightness, and 24 bits of color for each individual pixel, or in other words, 335,587,276.8 bits per second. It is easy to see why digital video requires compression. However, the very best known "lossless" compression methods can save most of the important details at a compression ratio of 2:1. Many of the digital CCTV surveillance systems are using compression of 500:1 or greater. One of the big selling points I noticed was that each vendor had a monitor where they were showing the live images captured by the camera. In most cases the images were very good, and very detailed. However, I also noticed that customers were not told that this was live feed from the cameras, and had not been through the compression process. Some systems are using one of the MPEG standards to capture the image and then compress it further for transmission and storage. The MPEG compression uses four different techniques. Pre-processing is the first and is used to filter out "non-essential" visual information. The second is motion compensation, which identifies motion in the image and predicts it for the next frame, so that it does not have to transmit the actual frame information. The third is temporal prediction, which like motion compensation, sends only updates to approximate the actual information. Finally there is quantization coding, which rounds off all coefficient values of the algorithms that fall within a certain range and set them to the same value. As you can see, even the initial encoding will lose information, and then there will be the loss that must come from further compression for transmission. One of the promising digital technologies is the wavelet, which operates as a Fourier transform. Most simply put, it captures both large and small information values and fills in between them. The most promising technology I encountered didn't use wavelets, but increased the number of pixels while decreasing their size and encoding. This method retains more of the information that would be available with an analog format. However the beta for this technology will not be released for several months. Obviously digital video is headed in the right direction, but it isn't there yet. Most digital surveillance images are so compressed, they have the same pixilated appearance that is used on television to protect an individual's identity. When you have to rely upon the images from a surveillance camera as evidence for you when you go to court, then the most minute details are vital. The basis for forensic video analysis or the process that is used to identify and isolate evidence on video tape or CCTV is in the details. Forensic video analysis is both the science and the process of examining videotape or images on digital media. In this process, the examiner compares images of people, property and clothing that have been captured by the camera, with those that are known. This comparison requires the use of all available details, such as buttons or patches on a jacket, the unique small pattern variations that you see along the seams in a pair of jeans, the drape of material across an individual's shoulders and back, full or partial tattoos or skin imperfections, or even unique habits of movement. In many cases, there will also be audio material to examine. In most cases, the details will determine whether the person in court is the one whose image was captured by the camera, or just one of several people fitting a general description that may or may not be the one in the image. As you see, the entire case could fail if the video image does not have sufficient detail for a unique identification to be made. For those that are considering trading in your old analog system and making the purchase of a digital CCTV, take time to determine your expectations of the system. If you expect the images captured, transmitted and stored by the system to be a vital element in your case against an intruder or individual who failed to uphold the law, you might want to keep the old analog system until digital video meets the requirements of security and business professionals, not just the needs of the entertainment industry. The money may be better spent on new videotapes. Thresa Lang, CISSP, CCNA is a security and training consultant, who also teaches information systems protection at the George Washington University. She may be contacted on tblang@l.... Copyright C West Coast Publishing. All rights reserved. 6542 From: Date: Sun Nov 17, 2002 4:30am Subject: Re: Re: Cat 5e video twisted pair modems > Nov. 14 John Kennedy wrote: > "Where could you recommend looking for these twisted pair modems?" > > I've successfully done covert installs using regular JK, four conductor > cable > DC running power up one pair and video back down the other on more than > one occasion. I've had some runs over 300 FT. > > The cameras we used were Watec 902A & Wat 201. We used Watec power > supplies which were well filtered and put out a solid 12 Volts. My suggestion is try it without the modems first. YMMV [Non-text portions of this message have been removed] From: Mike Dever Date: Tue Nov 14, 2000 7:23pm Subject: Re: this is good - humor I am not an American, but I find this kind of "humor" offensive! Keep it up and I'll unsubscribe to the list. Mike Dever Canberra, Australia MACCFound@a... wrote: > Al Gore and the Clinton's are flying on Air Force One. Bill looks at > Al, and chuckles and says, "You know I could throw a $10,000 dollar > bill out the window right now and make one person very happy." Al > shrugs his stiff shoulders and says, "Well I could throw ten $1,000 > bills out the window and make 10 people very happy." Hillary tosses > her perfectly sprayed hair and says, "Of course, then, I could throw > one hundred $100 bills out the window and make one hundred people > very happy." Chelsea rolls her eyes, looks at all of them and > says, "I could throw all of you out the window and make the WHOLE > COUNTRY HAPPY!" > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 1923 From: Date: Wed Nov 15, 2000 3:21am Subject: Re: this is good - humor In a message dated 11/15/00 5:50:31 AM Pacific Standard Time, deverclark@b... writes: << Keep it up and I'll unsubscribe to the list. >> Unsubscribe: TSCM-L-unsubscribe@egroups.com 1924 From: James M. Atkinson, Comm-Eng Date: Wed Nov 15, 2000 11:33am Subject: Re: this is good - humor You right Mike, Chelsea should go as well. Seriously, there is no intention to offend anybody on the list, but Bill Clinton (our current president) has a reputation for his less then ethical behavior, and as a result his entire administration has become a bit of a joke in the US. Sad, but true. -jma At 12:23 PM +1100 11/15/00, Mike Dever wrote: >I am not an American, but I find this kind of "humor" offensive! > >Keep it up and I'll unsubscribe to the list. > >Mike Dever >Canberra, Australia > >MACCFound@a... wrote: > > > Al Gore and the Clinton's are flying on Air Force One. Bill looks at > > Al, and chuckles and says, "You know I could throw a $10,000 dollar > > bill out the window right now and make one person very happy." Al > > shrugs his stiff shoulders and says, "Well I could throw ten $1,000 > > bills out the window and make 10 people very happy." Hillary tosses > > her perfectly sprayed hair and says, "Of course, then, I could throw > > one hundred $100 bills out the window and make one hundred people > > very happy." Chelsea rolls her eyes, looks at all of them and > > says, "I could throw all of you out the window and make the WHOLE > > COUNTRY HAPPY!" > > ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1925 From: James M. Atkinson, Comm-Eng Date: Wed Nov 15, 2000 9:46pm Subject: Microsoft breach is a warning to firms Microsoft breach is a warning to firms http://www.bday.co.za/bday/content/direct/1,3523,737000-6129-0,00.html SECURITY breaches such as the recent espionage attack on Microsoft are likely to be repeated in SA because firms are lax about protecting their data. Corporate complacency will lead to some major catastrophes for big organizations, with the loss of confidential data compounded by severe damage to their public image, warns Arthur Goldstuck, MD of research company Media Africa. A survey of the technology spending of SA's top companies found that the majority spent less than R1m a year on data and system security. "People are downplaying its importance even as it becomes obvious what the dangers are of not protecting yourself from hackers," said Goldstuck. The 40 companies surveyed had an average annual turnover topping R500m. Goldstuck said: "SA companies have not yet grasped that IT security is fundamental to their strategy. Spending R1m to protect a turnover of R500m is not a lot." The attack on Microsoft an intruder apparently accessed the blueprints of upcoming products highlighted the dangers of industrial espionage or malicious attacks. The SA Certification Agency said the fact that someone could get so far inside the networks of Microsoft, which is highly aware of security and recognizes the value of its data, shows how easily a less technical, less wealthy company could be breached. Small and medium-sized enterprises face the most severe risk of an information security attack, warns Ian Melamed, chief technical officer of Satellitesafe. The most common forms include the hacking of websites and spreading of viruses. Small companies are most susceptible because they lack the resources to tackle security properly. "Large organizations with plenty of money to throw at the issue leave gaping security holes, so how much more vulnerable are small and medium sized enterprises," he says. Statistics from the Gartner Group suggest that more than half of small and medium-sized companies will suffer an internet attack in the next two years. And most will not even realise someone is snooping in their systems. Most at risk are companies that manage their own network security and use the Internet for e-business. Gartner recommends four steps to enhance network security. First, an external security firm should conduct an annual network audit and attempt a break in. The second step is to ensure that a firewall to protect the corporate network from external attack is properly configured. Third, companies should scan incoming e-mail for viruses. Finally, they should ensure that remote access points into their network are as secure as possible. "These are all relatively easy to implement, but they rely on management being aware of the risk, and the will to ensure all agreed procedures are implemented," said Melamed. Philip Green, strategic consultant at e-business specialist Logical, said that as companies adopted e-business they should simultaneously strengthen network security. However, few organizations are changing their approach to security as quickly as they are changing their approach to business. Most have the misconception that a firewall to restrict external access to their corporate network is adequate, he says. Companies though, need to secure the business, not the network. Besides, successful e-commerce demands that networks are opened up to let transactions flow through the firewall. That needs an infrastructure where security is integrated into all e-business applications, and not just left on the boundary of the network. Green says a corporate network could be compared with a hotel, where anyone can enter the lobby unrestricted. However, to access a particular resource, such as a hotel room, they need a key. The essential ingredients were: authentication, to determine who the user was; authorization, to define what they may do; auditing, to check what the user did; and administration, to control the process. The firewall is still the heart of any security architecture, but additional security should be seen as a business enabler rather than a begrudged additional expense, Green says. Nov 09 2000 12:00:00:000AM Lesley Stones Business Day 1st Edition ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1926 From: James M. Atkinson, Comm-Eng Date: Wed Nov 15, 2000 10:00pm Subject: U.S. Election Results (Humour) Ok... so as we are still fiddling around trying to figure out who did or did not win the election the rest of the world is snickering. Another list member forwarded this to the list, and I hope that most do not find it offensive -jma ----------------- House of Lords - 11/16/00 @ 10:15 Z To the citizens of the United States of America, In the light of your failure to elect a President of the USA and thus to govern yourselves, we hereby give notice of the revocation of your independence, effective today. Her Sovereign Majesty Queen Elizabeth II will resume monarchial duties over all states, commonwealths and other territories. (Except Utah, which she does not fancy). Your new prime minister (The Rt. Hon. Tony Blair, MP for the 97.85% of you who have until now been unaware that there is a world outside your borders) will appoint a minister for America without the need for further elections. Congress and the Senate will be disbanded. A questionnaire will be circulated next year to determine whether any of you noticed. To aid in the transition to a British Crown Dependency, the following rules are introduced with immediate effect: 1. You should look up "revocation" in the Oxford English Dictionary. Then look up "aluminium". Check the pronunciation guide. You will be amazed at just how wrongly you have been pronouncing it. Generally, you should raise your vocabulary to acceptable levels. Look up "vocabulary". Using the same twenty seven words interspersed with filler noises such as "like" and "you know" is an unacceptable and inefficient form of communication. Look up "interspersed". Replace the phrase "winningest" with "most successful". Look up "successful". 2. There is no such thing as "US English". We will let Microsoft know on your behalf. 3. You should learn to distinguish the English and Australian accents. It really isn't that hard. Look up "distinguish". 4. Hollywood will be required occasionally to cast English actors as the good guys. 5. You should relearn your original national anthem, "God Save The Queen", but only after fully carrying out task 1. We would not want you to get confused and give up half way through. 6. You should stop playing American "football". There is only one kind of football. What you refer to as American "football" is not a very good game. The 2.15% of you who are aware that there is a world outside your borders may have noticed that no one else plays "American" football. You will no longer be allowed to play it, and should instead play proper football. Initially, it would be best if you played with the girls. It is a difficult game. Those of you brave enough will, in time, be allowed to play rugby (which is similar to American "football", but does not involve stopping for a rest every twenty seconds, changing teams mid-game or wearing full kevlar body armour like nancies). We are hoping to get together at least a US rugby sevens side by 2005. You should cease referring to baseball games as World Series. 7. You should declare war on Quebec and France, using nuclear weapons if they give you any merde. The 98.85% of you who were not aware that there is a world outside your borders should count yourselves lucky. The Russians have never been the bad guys. "Merde" is French for "shit". 8. July 4th is no longer a public holiday. November 8th will be a new national holiday, but only in England. It will be called "Indecisive Day". 9. All American cars are hereby banned. They are crap and it is for your own good. When we show you German cars, you will understand what we mean. 10. Please tell us who killed JFK. It's been driving us crazy. Thank you for your cooperation, God save the Queen... ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1927 From: Date: Wed Nov 15, 2000 4:44am Subject: Re: this is good - humor Every joke ever written offended someone. I put together a bunch of jokes for some friends, coworkers, and folks I only know via the web. I've been doing it for about 3 years. From time to time I offend someone. Once, someone told me about it. I apologized and told her the next time I sent a joke about blondes I'd leave her off the list. She asked me not to do that because she liked everything else, that she would just use the delete key. I don't like hate and smut jokes (simplest way I can put it) but I don't unsubscribe because of one joke I don't like. When I find that I don't like the majority of the material presented, I scroll to the end of the page and click on "UNSUBSCRIBE" 'nuff said Life without humor is boring. Unless we can laugh at our self's we needn't laugh at anything. Hope I can include you on my Friday post Have a Grand Day Paul "Guppy" Gibson [Non-text portions of this message have been removed] 1928 From: Talisker Date: Wed Nov 15, 2000 0:13pm Subject: Re: this is good - humor > I am not an American, but I find this kind of "humor" offensive! I'm not an American and I dislike humour on serious mailing lists. However, I couldn't help but laugh I thought the joke was funny and wondered how it could be considered offensive. In this politically correct World, I think people look for ways to be offended rather than accept that there was no intended malice and enjoy the humour just my 2 cents Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo talisker@n... The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "Mike Dever" To: Sent: Wednesday, November 15, 2000 1:23 AM Subject: Re: [TSCM-L] this is good - humor > I am not an American, but I find this kind of "humor" offensive! > > Keep it up and I'll unsubscribe to the list. > > Mike Dever > Canberra, Australia > > MACCFound@a... wrote: > > > Al Gore and the Clinton's are flying on Air Force One. Bill looks at > > Al, and chuckles and says, "You know I could throw a $10,000 dollar > > bill out the window right now and make one person very happy." Al > > shrugs his stiff shoulders and says, "Well I could throw ten $1,000 > > bills out the window and make 10 people very happy." Hillary tosses > > her perfectly sprayed hair and says, "Of course, then, I could throw > > one hundred $100 bills out the window and make one hundred people > > very happy." Chelsea rolls her eyes, looks at all of them and > > says, "I could throw all of you out the window and make the WHOLE > > COUNTRY HAPPY!" > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1929 From: A Grudko Date: Thu Nov 16, 2000 1:13am Subject: Lost messages Just to let you know, I lost my last 30(of 198) messages in this a.m.'s download, so anything you may have sent me yesterday of direct importance, please send again. Andy Grudko 1930 From: A Grudko Date: Thu Nov 16, 2000 2:53am Subject: Steve Whitehead Those of you who know Steve Whitehead, sceptre@m... , might like to know that he was involved in a major car accident on Tuesday. We only discovered yesterday when my office called his on business. He's in hospital but I understand his condition is not serious. We will try to find out more today. Andy Grudko Johannesburg 1931 From: Bob Washburne Date: Thu Nov 16, 2000 10:11am Subject: Re: Microsoft breach is a warning to firms "James M. Atkinson, Comm-Eng" wrote: > > Microsoft breach is a warning to firms > > Most have the misconception that a firewall to restrict external access to > their corporate network is adequate, he says. Companies though, need to > secure the business, not the network. Besides, successful e-commerce demands > that networks are opened up to let transactions flow through the firewall. > Computer security is like lasagna - the more layers the better. You don't sweep an office with one tool and certify it clean of bugs. You don't install a single security measure and certify the computer as Trusted. The Black Hats don't have to be smarter or more clever than us. The odds are just in their favor. We have to successfully repell *EVERY* attempted breach. They only have to get lucky once. Bob Washburne - Paranoia; it's not just a good idea. It's a way of life. 1932 From: Bob Washburne Date: Thu Nov 16, 2000 10:19am Subject: Re: U.S. Election Results (Humour) > > 4. Hollywood will be required occasionally to cast English > actors as the good guys. > 4.1 Hollywood will be required occationally to cast actors who look like real people and not some model cut out of some Highstreet catalogue. Bob Washburne - Who could not imagine Brittney Spears in All Creatures Great and Small. 1933 From: Dawn Star Date: Thu Nov 16, 2000 11:07am Subject: Voting for Dummies [Non-text portions of this message have been removed] 1934 From: Dawn Star Date: Thu Nov 16, 2000 0:41pm Subject: Play your hand Bush and Gore to Play Poker? This is true. As in factual. As in this really is part of New Mexico's election laws. If the presidential contest between George W. Bush and Al Gore yields a tie vote, then New Mexico law dictates: "The determination as to which of the candidates shall be declared to have been nominated or elected shall be decided by lot." And the "lot" is typically one hand of five-card poker. There's even precedent! This unusual election-deciding method was most recently employed in New Mexico in December 1999 when Republican Jim Blanq and Democrat Lena Milligan tied at 798 votes each in a local race for magistrate judge. They played one hand of poker in a courthouse with dozens of people watching, and Blanq won. "That's what's been done in the past. Not even a whole game of poker, but just one hand, and that takes dumb luck," said state Republican Party chairman John Dendahl. New Mexico must certify its results on November 28, and right now the lead is seesawing between the two candidates. The law lets the candidates choose which "lot" they want. "Whether they want to draw straws, play a hand of five-card stud (poker), or draw a high card, that is totally up to the participants," said Denise Lamb, state elections director. --Cathryn Conroy [Non-text portions of this message have been removed] 1935 From: Tom Mann Date: Thu Nov 16, 2000 8:38pm Subject: Re: this is good - humor Dear List: A good sense of humor should be a mandatory requirement for inclusion on the list. Lighten up, everyone! Tom Mann Guardian International 1936 From: Andre Holmes <1ach@g...> Date: Thu Nov 16, 2000 10:39pm Subject: Telco Equipment A while back I noticed a phone company tech monitoring a SAC OR SLICK66 BOX while he was inside his truck, the doors to the SAC or SLICK66 were closed. In the country we have pedestals that the subscribers phone lines from the NID go to.And leads from the pedestal to a silver can looks like a big coffee can mounted to a telephone pole. From the silver can the leads go to the Sac or SLICK66 from there to C.O. I flagged the tech over and asked him what was he doing. He said that a new customer had moved in down the street and needed phone service. I saw the tech at the Silver can and asked what is the purpose does the Silver can. The tech replied the Silver can takes 4 pair and turns it to 96 pair. Farther down the street theres a box mounted to a telephone pole thats not secure and I believe it to look like a small wire interface board that is similar to what is located in apartments where all phone wires interface to the C.O. other wise called 66 or 110 block. Out at the farm the phone and power wires are suppositly run side by side into and through a telephone jacket to save money as opposed to separate runs. [ The previous was for information only ] [Non-text portions of this message have been removed] 1937 From: James M. Atkinson, Comm-Eng Date: Thu Nov 16, 2000 11:30pm Subject: Re: Telco Equipment Andre, Not to split hairs, but what you are talking about is called a "pair gain facility", and it is properly called a SLC-96 or SLIC-96. The function is to take a number of "loop lines" and multiplex them into a shared T-Carrier line. Now "SLC's" come in a number of shapes, sizes, capability, and bandwidth. Various manufactures call them different things, and even dress then up in various ways, the the function is generally the same. -jma At 11:39 PM -0500 11/16/00, Andre Holmes wrote: >A while back I noticed a phone company tech monitoring a SAC OR SLICK66 BOX >while he was inside his truck, the doors to the SAC or SLICK66 were closed. > >In the country we have pedestals that the subscribers phone lines >from the NID go to.And leads from the pedestal to a silver can >looks like a big coffee >can mounted to a telephone pole. From the silver can the leads go to >the Sac or SLICK66 >from there to C.O. > >I flagged the tech over and asked him what was he doing. > >He said that a new customer had moved in down the street and needed >phone service. > >I saw the tech at the Silver can and asked what is the purpose >does the Silver can. > >The tech replied the Silver can takes 4 pair and turns it to 96 >pair. Farther down the street >theres a box mounted to a telephone pole thats not secure and I >believe it to look like a >small wire interface board that is similar to what is located in >apartments where all phone wires >interface to the C.O. other wise called 66 or 110 block. Out at the >farm the phone and power wires >are suppositly run side by side into and through a telephone jacket >to save money as opposed to >separate runs. [ The previous was >for information only ] ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1938 From: Dragos Ruiu Date: Thu Nov 16, 2000 11:37pm Subject: Re: Telco Equipment It may be hearsay but I recall being told by some Bellcore dude that SLC stood for Serial Line Carrier. I figured he would know. :-) 96 pairs being 24 (the number of data channels on a 1.544 Mbps T-1 line or the equivalent and mostly identical Primary rate ISDN line, PRI PRA) x 4 (strands per line) In Europe and other parts of the world 2.048 E1 lines similarly carry 32 channels. Pairgain is also a famous telco equipment manufacturer, whom I believe got bought out a while ago (AT&T/Lucent?). There are many names for such termination equipment (and brands). cheers. --dr On Thu, 16 Nov 2000, James M. Atkinson, Comm-Eng wrote: > Andre, > > Not to split hairs, but what you are talking about is called a "pair > gain facility", and it is properly called a SLC-96 or SLIC-96. > > The function is to take a number of "loop lines" and multiplex them > into a shared T-Carrier line. > > Now "SLC's" come in a number of shapes, sizes, capability, and > bandwidth. Various manufactures call them different things, and even > dress then up in various ways, the the function is generally the same. > > -jma > At 11:39 PM -0500 11/16/00, Andre Holmes wrote: > >A while back I noticed a phone company tech monitoring a SAC OR SLICK66 BOX > >while he was inside his truck, the doors to the SAC or SLICK66 were closed. > > > >In the country we have pedestals that the subscribers phone lines > >from the NID go to.And leads from the pedestal to a silver can > >looks like a big coffee > >can mounted to a telephone pole. From the silver can the leads go to > >the Sac or SLICK66 > >from there to C.O. > > > >I flagged the tech over and asked him what was he doing. > > > >He said that a new customer had moved in down the street and needed > >phone service. > > > >I saw the tech at the Silver can and asked what is the purpose > >does the Silver can. > > > >The tech replied the Silver can takes 4 pair and turns it to 96 > >pair. Farther down the street > >theres a box mounted to a telephone pole thats not secure and I > >believe it to look like a > >small wire interface board that is similar to what is located in > >apartments where all phone wires > >interface to the C.O. other wise called 66 or 110 block. Out at the > >farm the phone and power wires > >are suppositly run side by side into and through a telephone jacket > >to save money as opposed to > >separate runs. [ The previous was > >for information only ] 1939 From: GaryK Date: Fri Nov 17, 2000 5:58am Subject: RE: this is good - humor One guy's negative outlook on life to me is not worth all the comment, it won't change him. Gary Korkala -----Original Message----- From: Tom Mann [mailto:guardian@n...] Sent: Thursday, November 16, 2000 9:39 PM To: TSCM-L@egroups.com Subject: Re: [TSCM-L] this is good - humor Dear List: A good sense of humor should be a mandatory requirement for inclusion on the list. Lighten up, everyone! Tom Mann Guardian International ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1940 From: Larry Hountz - -(©ø©)- Date: Thu Nov 16, 2000 5:09pm Subject: Overview Hello: I would just like to say I have been on this list now about 10 days. And have seen more good information then I have seen on most lists in weeks. And the humor was nice... I would like to know what you all thing of products like Webtrends Security Anayzer as you can see I work for this company. Thanks, Larry J. Hountz Senior Technical Advisor Security SWAT Team Webtrends Corp larryh@w... Don't Fear The Penguin .~. /V\ / / \ \ / ( ) \ ^~^ LINUX [Non-text portions of this message have been removed] 1941 From: Date: Fri Nov 17, 2000 4:56am Subject: Super hacker says new ID book goes too far (Los Angeles) Super hacker says new ID book goes too far Recently paroled computer hacker, Kevin Mitnick, now a consultant to industry on matters of security and personal identification, says a new book which details how people can uncover ID fraud or conceal their own identity, is "dangerous to the general public and should never have been published." Managing editor Dan Stevens of intelligencehere.com, publisher of the controversial book says it is not all that bad and that "both sides of the story need to be available in order to illustrate the scope of the problem." Who Are You? The Encyclopedia of Personal Identification ($44.95 available in bookstores or directly from the publisher at 866-885-8855) is written by long-time investigative/security writer Scott French, author of a score of similar books, and contains over three hundred pages of step-by-step instructions on how to steal anyone's identity, change personas, or simply disappear from public record all together. Mr. Mitnick pointed out that the first page of the disputed work graphically displays just what the reader can expect from this "how-to" book by showing three drivers licenses, each with the author's photograph, each from a different state, issued in a different name. Mitnick, who has created a substantial legend of his own, insists the publication "crosses the line and should never have been published." Mitnick warned potential readers, "I'd be very careful about putting this material to use." Author French, presents a disclaimer for the information presented in Who Are You? insisting he "accepts no liability incurred from the use of materials in this book," and that, "some concepts and techniques presented would be illegal if performed." French insists that although some readers may be appalled at his easy-to-follow instructions for creating false identities, bank accounts and so on, what he is offering is simply information that will "protect one from the pitfalls in the system. "This book is not designed to create material for the TV show COPS. If you have ever been diagnosed with criminal tendencies, please don't buy my works." Specific details about Who Are You? The Encyclopedia of Personal Identification are posted on the publisher's web site www.intelligencehere.com. 1942 From: Date: Fri Nov 17, 2000 5:45am Subject: news from up north http://www.ottawacitizen.com:80/business/001114/4865368.html The actual article, link above shows a picture of the tech and his gear. Text here. Companies enlist experts to safeguard secrets With the rise in corporate espionage, many firms are hiring security specialists to keep data from prying eyes and ears. Jim Bronskill reports. Jim Bronskill The Ottawa Citizen TORONTO - The hot pursuit of corporate secrets is creating work for a new breed of counter-intelligence operative. As growing numbers of spies chase project blueprints, marketing strategies and details of high-stakes negotiations, skilled security experts are helping companies keep a tight lid on their precious plans. HVI Corporate Services of Toronto, one of the specialists at safeguarding sensitive information, is increasingly being called upon to sweep offices for hidden listening devices and to advise clients on keeping proprietary data under wraps. "The counter-measures business is definitely growing," said HVI's William Horvath. "As more businesses become aware that these threats are real, we're getting more and more phone calls." Once the only kind of bugs a company needed to worry about were cockroaches and termites. Now there's a whole range of devices -- from microphones disguised as pens to tiny pin-hole cameras -- that may be surreptitiously planted in board rooms and corner offices, ready to relay private words and images to unscrupulous competitors. Industry analysts and intelligence officials warn that billions of dollars in trade secrets are stolen annually from North American companies by rival corporations or foreign governments. Mr. Horvath recalls the case of an Ontario construction company that was alarmed to see the details of a sensitive board meeting seep out within days, despite the fact only a few top people attended. Armed with a suitcase-sized machine that monitors the radio frequency spectrum for suspicious audio and video signals, Mr. Horvath electronically swept the room. Sure enough, he found a battery-operated listening device, capable of transmitting sound hundreds of metres, tucked in the boardroom ceiling. Such bugs, once seen only in spy circles, are becoming widely available. Decent devices cost between $500 and $1,000. Some broadcast video as well as audio. Often operating on batteries, they can easily be hooked up to a telephone, hidden in a wall socket or slipped behind a painting. In a demonstration of one trick of his trade, Mr. Horvath uses an ultraviolet pen to draw a line across the face-plate of a light switch. The mark, precisely aligned with the slot in one of the plate's screws, cannot be seen without the aid of a special flashlight. In a month, Mr. Horvath could return, flick on the special light and quickly see if the screw had been turned, a sign the plate had been removed, possibly so someone could slip a bug inside the wall. Intercon Security, which has offices in Toronto, Vancouver and Calgary, has also experienced growing demand for help foiling eavesdroppers, said Mike Fenton, the firm's director of consulting and support services. "There's no doubt that the number of devices that we are finding has increased considerably from what it was years and years ago." Lately Intercon has heard from companies hit by break-ins during which nothing was stolen. Mr. Fenton said that likely means burglars downloaded information from an electronic file or planted a bug. In other recent cases, thieves have pilfered laptop computers containing confidential financial or marketing data. "They're not being stolen for the value of the laptop," said Mr. Fenton. An HVI affiliate, Codex Data Systems Canada, sells software that allows people to track stolen computers and digital documents. HVI has also begun offering protective services to hotels whose guests might be meeting in a suite to close an important deal. Mr. Horvath frequently does security audits to help firms uncover their weaknesses. The first sign of lax security is often the fact HVI personnel can freely stroll into a corporate office, making it all the way to the president's door. Still, Mr. Horvath believes Canadian companies are starting to see a need for protection. "A lot of people don't think about it yet. But I think they're waking up to it." 1943 From: Date: Fri Nov 17, 2000 7:07am Subject: Re: this is good - humor OK, but how we will test the sense of humor? ;-) Janis Dear List: A good sense of humor should be a mandatory requirement for inclusion on the list. Lighten up, everyone! Tom Mann Guardian International 1944 From: Talisker Date: Fri Nov 17, 2000 11:51am Subject: Wardialers As telco's have been mentioned I thought I'd trawl for wardialers So far on the site I've got ModemScan THC-PBX TBA Xiscan PhoneSweep THC-Scan Toneloc TeleSweep PocketDial Telephony Scanner There's info on them on my site under vulnerability scanners Do you know of any that I may be missing? Any information would be greatly appreciated Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo talisker@n... The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. 1945 From: Steve Uhrig Date: Fri Nov 17, 2000 3:37pm Subject: Re: news from up north Once upon a midnight dreary, MACCFound@a... pondered, weak and weary: > http://www.ottawacitizen.com:80/business/001114/4865368.html The > actual article, link above shows a picture of the tech and his > gear. Text here. Any credibility this clown may have had (precious little anyway, after an intelligent reading of the article) is destroyed by the mention of his affiliate with Codex aka Spyking. Such affiliation amost certainly indicates blatant criminal intent. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1946 From: Miguel Puchol Date: Fri Nov 17, 2000 5:12pm Subject: RE: Re: news from up north In Spain we have a couple of companies selling similar tri-fold suitcases (black of course) with as many cables, probes and other 'thingies' to call them something for a lot of money... When you turn up with a 'tired old' SA and other similar gear, the usual question is "Ah, so you don't bring one of those super-duper cases with all the high-tech spy-busting gear...well..." as if you just crawled out of some quick-fix shop - dishartening to say the least. All the best, Mike -----Mensaje original----- De: Steve Uhrig [mailto:steve@s...] Enviado el: viernes, 17 de noviembre de 2000 22:37 Para: TSCM-L@egroups.com Asunto: [TSCM-L] Re: news from up north Once upon a midnight dreary, MACCFound@a... pondered, weak and weary: > http://www.ottawacitizen.com:80/business/001114/4865368.html The > actual article, link above shows a picture of the tech and his > gear. Text here. Any credibility this clown may have had (precious little anyway, after an intelligent reading of the article) is destroyed by the mention of his affiliate with Codex aka Spyking. Such affiliation amost certainly indicates blatant criminal intent. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1947 From: James M. Atkinson, Comm-Eng Date: Fri Nov 17, 2000 5:54pm Subject: RE: Re: news from up north At 12:12 AM +0100 11/18/00, Miguel Puchol wrote: >In Spain we have a couple of companies selling similar tri-fold suitcases >(black of course) with as many cables, probes and other 'thingies' to call >them something for a lot of money... > >When you turn up with a 'tired old' SA and other similar gear, the usual >question is "Ah, so you don't bring one of those super-duper cases with all >the high-tech spy-busting gear...well..." as if you just crawled out of some >quick-fix shop - dishartening to say the least. > >All the best, > >Mike > The piece of equipment in question is/was an OSCOR or OSC-5000. The OSC-5000 a decent piece of gear, and while it does have various "bell-and whistles" it is a excellent piece of equipment, but it is by no means a replacement for a microwave spectrum analyzer. When I show up with 25+ transit cases containing a full ton of gear I will often bring an OSCOR into the clients building prior to unloading "the big iron" to perform a very low profile "quick check". I can then leave the OSCOR running while performing other segments of the sweep to see what (if anything) lights up the spectrum. The OSC-5000 does not replace a microwave spectrum analyzer, but it supplements it. However, I also have customers where I leave the OSCOR in the truck and would never dream of dragging it out (it would look to "James Bondish" and they do not consider TSCM to be something that a "non-instrument" would be used for. Of course when you unfold and OSCOR the customers eyes tend to light up, and that in and of itself tends to have some value. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1948 From: Kohlenberg, Toby Date: Fri Nov 17, 2000 7:14pm Subject: RE: Overview I have found most vulnerability scanners to be nothing more than checklists that are generally out of date, however there are a couple where that is not completely accurate. This last summer, I spent some time doing a pretty detailed review of many of the products in the market and would recommend that if you are looking for one, you look at Nessus, Retina(Eeye) and ISS. If anyone would like to talk more about my findings, please contact me off the list. This is not an official endorsement of any product and all opinions expressed are my own. I do not speak for Intel in any way. Toby Toby Kohlenberg, CISSP Intel Corporate Information Security STAT Team Information Security Specialist 503-264-9783 Office & Voicemail 877-497-1696 Pager "Just because you're paranoid, doesn't mean they're not after you." PGP Fingerprint: 92E2 E2FC BB8B 98CD 88FA 01A1 6E09 B5BA 9E84 9E70 > -----Original Message----- > From: Larry Hountz - -(©ø©)- [mailto:larryh@w...] > Sent: Thursday, November 16, 2000 3:10 PM > To: TSCM-L@egroups.com > Subject: [TSCM-L] Overview > > > Hello: > > I would just like to say I have been on this list now > about 10 days. And have seen more good information > then I have seen on most lists in weeks. And the humor was nice... > > I would like to know what you all thing of products like > Webtrends Security Anayzer as you can see I work for this > company. > > Thanks, > > Larry J. Hountz > Senior Technical Advisor > Security SWAT Team > Webtrends Corp > larryh@w... > > Don't Fear The Penguin > > .~. > /V\ > / / \ \ > / ( ) \ > ^~^ > LINUX > > > [Non-text portions of this message have been removed] > > > > -------------------------- eGroups Sponsor > -------------------------~-~> > Create your business web site your way now at Bigstep.com. > It's the fast, easy way to get online, to promote your business, > and to sell your products and services. Try Bigstep.com now. > http://click.egroups.com/1/9183/0/_/507420/_/974466052/ > -------------------------------------------------------------- > -------_-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1949 From: Christopher E. Brown Date: Fri Nov 17, 2000 5:44pm Subject: Re: Telco Equipment On Thu, 16 Nov 2000, Dragos Ruiu wrote: > It may be hearsay but I recall being told by some Bellcore > dude that SLC stood for Serial Line Carrier. I figured he would know. :-) > 96 pairs being 24 (the number of data channels on a 1.544 Mbps > T-1 line or the equivalent and mostly identical Primary rate ISDN line, > PRI PRA) x 4 (strands per line) SLCs are bit robbing compressors. DS1 (24 x 64Kbit), over T1 (copper 4wire spec for DS1 transit) or fiber on one side, and 96 pair of analog on the far side. The device runs paired with another unit the other side of the DS1 (may be another 96 pair output unit, or may be head end unit direct to switch). Most of the less than total trash units do more than simple bit ribbing (silence detection, audio bw limiting/etc) to fit 4x the number of lines on the DS1 as should be there, but they make modem use very iffy. --- The roaches seem to have survived, but they are not routing packets correctly. --About the Internet and nuclear war. 1950 From: Miguel Puchol Date: Sat Nov 18, 2000 4:00am Subject: RE: Re: news from up north James, Here, the cases contain nothing more than a low-end spec analyzer (if that) going up to no more that 2.6GHz, put toghether to fit in the case, and some other bits and pieces. If they had to sell an OSCOR with the case then a) they wouldn't sell any due to cost or b) their margin would drop below the usual 200%... We're still in the bronze age of threat and technology knowledge in Spain - regarding TSCM - and the raindancers are having a field day. If you understand a bit of spanish, look at www.latiendadelespia.es to see what I mean. They even have a telephone for taking orders which is a 906-prefix, meaning you get charged about $1/minute just to ask a question. Cheers, Mike -----Mensaje original----- De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] Enviado el: sabado, 18 de noviembre de 2000 0:54 Para: TSCM-L@egroups.com Asunto: RE: [TSCM-L] Re: news from up north At 12:12 AM +0100 11/18/00, Miguel Puchol wrote: >In Spain we have a couple of companies selling similar tri-fold suitcases >(black of course) with as many cables, probes and other 'thingies' to call >them something for a lot of money... > >When you turn up with a 'tired old' SA and other similar gear, the usual >question is "Ah, so you don't bring one of those super-duper cases with all >the high-tech spy-busting gear...well..." as if you just crawled out of some >quick-fix shop - dishartening to say the least. > >All the best, > >Mike > The piece of equipment in question is/was an OSCOR or OSC-5000. The OSC-5000 a decent piece of gear, and while it does have various "bell-and whistles" it is a excellent piece of equipment, but it is by no means a replacement for a microwave spectrum analyzer. When I show up with 25+ transit cases containing a full ton of gear I will often bring an OSCOR into the clients building prior to unloading "the big iron" to perform a very low profile "quick check". I can then leave the OSCOR running while performing other segments of the sweep to see what (if anything) lights up the spectrum. The OSC-5000 does not replace a microwave spectrum analyzer, but it supplements it. However, I also have customers where I leave the OSCOR in the truck and would never dream of dragging it out (it would look to "James Bondish" and they do not consider TSCM to be something that a "non-instrument" would be used for. Of course when you unfold and OSCOR the customers eyes tend to light up, and that in and of itself tends to have some value. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1951 From: Dawn Star Date: Sat Nov 18, 2000 1:28pm Subject: Palm Beach Pokey THE PALM BEACH POKEY You put your stylus in, You put your stylus out, You put your stylus in, And you punch Buchanan out. You do the Palm Beach Pokey And you turn the count around, That's what it's all about! You put the Gore votes in, You put the Bush votes out, You put the Gore votes in, And you do another count. You do the Palm Beach Pokey And you turn the count around, That's what it's all about! You bring your lawyers in, You drag the whole thing out, You bring your lawyers in, And you put it all in doubt. You do the Palm Beach Pokey And you turn the count around, That's what it's all about! You let your doctors spin, You let the pundits spout, You let your retirees sue, And your people whine and pout. You do the Palm Beach Pokey And you turn the count around, That's what it's all about! You do the Palm Beach Pokey, You do the Palm Beach Pokey, You do the Palm Beach Pokey, That's what it's all about! [Non-text portions of this message have been removed] From: James M. Atkinson Date: Thu Nov 15, 2001 6:19pm Subject: DES Final Death Knell? [Horseshit... DES has been useless, and insecure for years -jma] DES Final Death Knell? http://www.informationweek.com/story/IWK20011114S0006 Nov. 14, 2001 It's already on its way out, but last week's CCA hack might be the last straw for the encryption standard. By George V. Hulme Any company still securing its systems with single Data Encryption Standard (DES) encryption may want to rethink its security posture. Last week, Cambridge computing students Michael Bond and Richard Clayton devised a hack that revealed weaknesses in the Common Cryptographic Architecture API, used by an IBM 4758. "Straight DES has been dead for a year," Gartner security analyst John Pescatore says. "Triple DES is the minimum you should be using currently, and now is the time to be moving to" Advanced Encryption Standard. Single DES is a NIST-standard secret cryptography key method that uses a 56-bit key, and is based on an algorithm designed by IBM and the U.S. National Security Agency. Triple DES uses three keys to encrypt data. Advanced Encryption Standard was selected by the U.S. Department of Commerce in October 2000 and is expected to eventually replace triple DES. Unlike DES, which is limited to key lengths of 56 bits, AES can support 128-, 192-, and 256-bit keys. -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4143 From: James M. Atkinson Date: Fri Nov 16, 2001 8:41am Subject: It was the first day of school [PG-13] It was the first day of school and a new student named Suzuki, the son of a Japanese businessman, entered the fourth grade. The teacher said, "Let's begin by reviewing some American history. Who said, "Give me Liberty, or give me Death?" She saw a sea of blank faces, except for Suzuki, who had his hand up." Patrick Henry, 1775." he said." Very good! Who said 'Government of the people, by the people, for the people, shall not perish from the earth'"? Again, no response except from Suzuki:"Abraham Lincoln, 1863." said Suzuki. The teacher snapped at the class," Class, you should be ashamed. Suzuki, who is new to our country, knows more about its history than you do." She heard a loud whisper: "F--k the Japanese." "Who said that?" she demanded. Suzuki put his hand up. "Lee Iacocca, 1982." At that point, a student in the back said, "I'm gonna puke." The teacher glares and asks "All right! Now, who said that?" Again, Suzuki says, "George Bush to the Japanese Prime Minister, 1991." Now furious, another student yells, "Oh yeah? Suck this!" Suzuki jumps out of his chair waving his hand and shouts to the teacher, "Bill Clinton, to Monica Lewinsky, 1997!" In the midst of almost a mob hysteria someone said, "You little shit, if you ever say anything else I'll have you killed." Suzuki frantically yells at the top of his voice, "Gary Condit to Chandra Levy 2001." The teacher fainted... -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4144 From: Marty Kaiser Date: Fri Nov 16, 2001 4:08am Subject: Nostalgia Hi Gang I have just added more material to my NOSTALGIA page. There is a lot more to put on it but what is there now might interest you. Check it out. http://www.martykaiser.com/nostal~1.htm Marty [Non-text portions of this message have been removed] 4145 From: Aimee Farr Date: Fri Nov 16, 2001 10:26am Subject: Digital document control = interception? [There are a number of solutions like this. Interesting. ~Aimee.] http://news.zdnet.co.uk/story/0,,t269-s2099331,00.html Email retraction tool may run into interception hurdle 17:57 Thursday 15th November 2001 Wendy McAuliffe A Lotus Notes email retraction tool could be breaking interception laws, according to the Office of the Information Commissioner A new email tool that allows Lotus Notes and Domino users to retract unread emails from a person's inbox could be breaking surveillance and data protection laws within the UK. The Office of the Information Commissioner has warned that the Demailer tool, announced by IBM/Lotus on Wednesday, could conflict with email interception principles set out in the Regulation of Investigatory Powers Act 2000 (RIPA). The email retraction utility is also in danger of infringing data processing guidelines contained within the Data Protection Act 1998, as the intended recipient will be unaware that an email has been retrieved from their inbox. "If the tool allows an individual to retrieve an email from the server, that is not unreasonable," said David Clancy, assistant commissioner to the information commissioner. "But if it allows someone to retrieve an email from beyond the server, when the email is waiting in the inbox, we would see this as interception, which also has potential data protection issues." The IBM/Lotus Demailer, developed by IT Simple, allows users of Lotus Domino Notes to retract emails within any organisation, across any organisation's domains, within private Domino intranets, and from Domino customers and suppliers through the Internet. The tool is designed for the retrieval of emails sent in error, without the receiver being informed. Email retraction has been a feature of some systems for years, but recent legislation may mean that such a tool is no longer legitimate for business purposes. "The person retrieving the email doesn't need any rights at all," said Samantha Barnes, marketing manager at IT Simple. The creator of Demailer claims that all data protection implications were considered before the launch of the product, and insists that email retraction tools are only illegal in Germany. "There are no legal implications at all -- IBM would not be going for it if that was the case," said Barnes. RIPA grants law enforcement officers the power to intercept emails in cases of national security, or for the purposes of detecting crime and disorder, protecting public health and safety, and collecting tax. It is agreed among the legal and policy-making profession that there is currently a lack of clarity surrounding the circumstances in which emails can be intercepted, but Lord Bassam's "doormat" rule concludes that if an email is sitting in an inbox and has not been read, any interference with that correspondence would be considered interception. The Office of the Information Commissioner is concerned that Demailer capabilities may be encroaching into illegal interception territory, as the utility can be used by any Notes user on a day-to-day basis. "We would need to look at whether this was a lawful interception under RIPA -- if not it would be a RIPA offence, and would classify as unfair processing under the Data Protection," said Clancy 4146 From: Date: Fri Nov 16, 2001 1:58pm Subject: Information Security Magazine interesting article! November 2001 JAMES ATKINSON In the world of corporate espionage, this counter-surveillance specialist is the man to call. BY RICHARD THIEME When you hear the words "bug hunter," you probably think Rain Forest Puppy, Blue Boar, Juan Cuartango, Marc Maiffret or some other Bugtraq regular. That is, you envision someone who discovers and publicizes software vulnerabilities (a.k.a. bugs). James Atkinson also hunts bugs, but not in software. He stalks corporate spies, whose weapons of choice are highly sophisticated electronic surveillance devices. It's not the kind of activity usually associated with information security, but the bad guys are still after your company's most important asset--highly confidential information. While executives readily accept the need for firewalls, IDSes and antivirus software, it doesn't occur to them they might need to hire a bug hunter of Atkinson's breed. Many companies are in denial, Atkinson says. They don't believe their competitors would spy on them. Smaller competitors in industries as diverse as fashion photography and software can steal work that took years to develop, then turn that stolen information into lucrative imitations. "You can make more money doing illicit eavesdropping than selling cocaine," Atkinson says. "It's more profitable, and it's a lot safer." Be Careful Out There Corporate espionage is big business. The cost of spying has increased, and so has the cost of detecting it. The stakes have to be high to justify the expense. That's why Atkinson's Granite Island Group (www.tscm.com) in Gloucester, Mass., a provider of technical surveillance countermeasures (TSCM), works mostly with companies with annual sales in excess of $200 million. Connect to Granite Island's Web site and take a tour of the "dark side." Pulsating signal displays and flashing numerical readouts jump out of blackness. Echoing every spy movie you've seen, the FAQs promise "everything you ever wanted know about TSCM and bug detection." Consider, for example, the rules of engagement for the first meeting with Atkinson: "Contact is made away from suspect facility (at airport pay phone etc.)" and "initial meeting at sterile location away from any suspect facility." Atkinson is often hired when a CEO suspects a problem and asks him to do a sweep. "From almost any street corner in the business section of any major city, I can pick up covert audio or video eavesdropping devices," Atkinson says. " It's astounding how much is out there." Solve the Crime - But Say Nothing Atkinson's clientele hire him for his special skills--and his absolute discretion. One publicly traded company, for example, was receiving daily bomb threats by telephone. Traces led to a pay phone--which wasn't the source of the calls. When the company started to get faxed bomb threats, they evacuated the building. Even though they were only false alarms, the threats had a devastating impact on business. The trail led to a man 4,000 miles away working for a porn Web site. He'd been fired several years before and swore that when he got back on his feet, he would destroy the company. He hadn't hacked into the company's PBX system but slipped in a backdoor into it and rearranged the PBX extensions. He then called the 800 number to leave a bomb threat and went back into the PBX system to erase his tracks. He also e-mailed bomb threats and executed DoS attacks, crippling the company's LAN and WAN. Atkinson tracked him to his office, then his home, then woke up his boss, who happened to be an organized crime figure. The boss didn't want public attention and persuaded his employee to sign a confession. With the confession held as a sword over his head, the culprit ceased his threats and attacks. Another case involved a school attended by members of prominent families. Videotapes of students in the showers were finding their way to a video store. The school found holes in the shower room walls but no cameras. It hired Granite Island. Cameras generate an electric field with a particular signature, and Atkinson knew what he was looking for. Using sophisticated analysis equipment, he tuned the antenna to the appropriate frequency, looked for the signal and found the cameras. Campus police learned that a janitor had been paid to let the culprits in to install the cameras. He also changed the tapes. In neither case did Atkinson's clients press charges. He says that's typical. "I have found bugs in boardrooms that would boggle your mind," he says. "None of them want it known." Confidentiality works both ways. In return for his discretion, Atkinson expects his clients not to reveal that he has worked for them. That makes it tough to get references, but helps him maintain the public anonymity he needs. He even forbade Information Security from showing his face. The Prodigy Atkinson's unorthodox route to the high-tech business of debugging began when he was a child. He would stand in awe at computer room windows of companies he toured with classes. He collected carcasses of old TVs when he was 10 and stripped their components. He built or haggled component testers and tested every part. Later, he joined the Air Force and learned on "two of the most classified, sophisticated computer systems the Air Force had at that time. You needed a top secret clearance just to operate the buffer." Atkinson is solicited frequently by people who think they are being bugged but are wrong--or delusional. "I'll accept maybe one in 25 queries," he says. "It's not uncommon for people who need psychiatric help to call us, thinking the government has an implant in their head for sending microwave messages." While business owners should be legitimately concerned about electronic surveillance, Atkinson warns that there are charlatans in his field. "I know of one guy who carries 40 different kinds of bugs so he can plant one quickly if the client feels he's paying the bill for nothing," he explains. "They're like exterminators bringing in their own roaches." If you do more than $4 million to $5 million annually in sales, be slightly paranoid, says Atkinson. If you do $200 million to $300 million, be very paranoid. Read Machiavelli and Sun Tzu, he suggests. "Business is warfare, and in warfare, you have spies." And, luckily, you also have spy hunters. RICHARD THIEME (rthieme@t...), president of Thiemeworks, is a contributing writer for Information Security. He writes, speaks and consults on the human dimensions of technology and the workplace. HAVE A GREAT DAY !!! ---------- http://navigation.helper.realnames.com/framer/1/113/default.asp?realname=Information+Security+Magazine&url=http%3A%2F%2Fwww%2Einfosecuritymag%2Ecom&frameid=1&providerid=113&uid=17520601 [Non-text portions of this message have been removed] 4147 From: Matthew Paulsen Date: Fri Nov 16, 2001 11:43am Subject: RE: Digital document control = interception? It's unfortunate that IBM decided to create a product that can be viewed as a hack, and endorsed its use to bypass other organizations security controls without their knowledge or ability to block this circumvention. The first part that stands out is "and from Domino customers and suppliers through the Internet." The other part that is more reveiling is " allows users of Lotus Domino Notes to retract emails within any organisation, across any organisation's domains, within private Domino intranets, and from Domino customers and suppliers through the Internet." While most programs have retrieval built in, they normally don't allow a remote system to automatically remove an email from your mailbox if you're remote. If this can do it through the internet, say via SMTP or IMAP that's not a good thing. If it's restricted to Lotus's product, fine. Tough for Lotus users. Should have bought GroupWise or Exchange or Sendmail. IBM has yet to learn that creating closed systems that do funny things to peoples computers is not a good thing. This is not 1960. IBM is not in charge of the world computing environment any longer. True, it's sometimes nice to have a retrieval option, say a new virus comes out, recall all the virus born emails back, or you sent that hot steamy letter to your boss instead of his secretary, but this will only anger privacy groups and create intrusion fears for end users of mail systems. I can just see McAfee now - DAT Version 4999 - Strips out IT Simple requests on Notes Servers and gateway scanners. Sincerely, Matt Paulsen Out of work security systems engineer and enterprise systems architecture expert. Know any good jobs? Let me know. Will relocate. Can also spotlight. mpaulsen6@h... or 503-439-1397. The information in this email is confidential and may be legally privileged. It is intended solely for the addressee. Access to this email by anyone else is unauthorized. If you believe this method of communication to be compromised or at risk, do not contact me through this medium, instead establish a secondary method of communication with me through secure courier, personal contact, multiple encryption systems, or if not possible please do not respond to the message. -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 7.0.3 for non-commercial use mQGiBDuoDQgRBADcOOT+8bdrRTorYkI3/uFhxSCaQkSFXE0tj7oLLr+BMIc409vD n2woHrlPnhGZyYUX8JfNBe2TvFfW8EwD4L/Exd3M7ywff2sRIAoZeuQMZbNI69N5 lYMvsb/Knux7EpCY/lSSOqfT1Lo0mSEq/KmFDA+akUrBq6tXQHo+ak2h3QCg/5Cl Xyyr3zhOCP9oKc4sk2RUQvED/2HpoQt1FIXOLEUDjLVXd/IdwIZbGfxTkeJhq5vW exrjnKhDgDAFMl3kVvhsDvM0JA1AODGOa821oReca2dK+blSBpXS652k4FMzQuGc Q91H174bFjLmsL75PSRYjGo2qZC2JbLMFnAtR6k8Dhdz3EgE3ttrU5G/A05xQ9ux gUZLBADEhVxr7kXYNwYedp+Hv+xWJpBnYwrLOy9dGr1hoM0AhPtT+/L6uyv0yJmd HWYZUbhyeUy5dwWdquilLOBaF+l0BtgRdrmtl5T+20rsI+sc/aVNbtfp7GjwWriy Ygep3BCf24PPvzh8JgY3PlTmVYOE8StDBQm+Z7pBZ80ouIA4brQkTWF0dGhldyBQ YXVsc2VuIDxtcGF1bHNlbjZAaG9tZS5jb20+iQBYBBARAgAYBQI7qA0ICAsDCQgH AgEKAhkBBRsDAAAAAAoJELjYcPfEakW9IRsAoOgv510tXgAot4LI3zdV7iaVr0Io AJ4w9CSCx/t0C4lDBlZM5PgZJ0qABLkCDQQ7qA0IEAgA9kJXtwh/CBdyorrWqULz Bej5UxE5T7bxbrlLOCDaAadWoxTpj0BV89AHxstDqZSt90xkhkn4DIO9ZekX1KHT UPj1WV/cdlJPPT2N286Z4VeSWc39uK50T8X8dryDxUcwYc58yWb/Ffm7/ZFexwGq 01uejaClcjrUGvC/RgBYK+X0iP1YTknbzSC0neSRBzZrM2w4DUUdD3yIsxx8Wy2O 9vPJI8BD8KVbGI2Ou1WMuF040zT9fBdXQ6MdGGzeMyEstSr/POGxKUAYEY18hKcK ctaGxAMZyAcpesqVDNmWn6vQClCbAkbTCD1mpF1Bn5x8vYlLIhkmuquiXsNV6TIL OwACAggAvP1XSJNhkYvPiTVrM41MBBuAAPR21PxJbrMkB5z89+3KaJ7h+gEHeCDy GE8QmVYfSMpz7/sq8W2B9vNDUn2dLnKCI3VPeszMW9oN/JR3QnL2T+sThXvLY8TF 966NIIGrHIVDeb9hFoVOPrzghuWOv8Q0K0V0LquBF4IndgNy3S7s4ZjTExcMi3hn Pu/PgUXzb1gGsmFoyZFy6YYGKqQ5+27UtghHbEeOIL90+bep4xuDAZ0v3Hjh+tnI a+vIFdjVLxsTTwwB4GW3o1P1+F9wj+KfkPqWroDAYBtwV2a3YQ4MfXgTSGYysm2+ mvnyHwrE0ZnO+0KLK7pPJ/tCMagFEYkATAQYEQIADAUCO6gNCAUbDAAAAAAKCRC4 2HD3xGpFvVKWAJ9Uz57//yNxW1pmdfjcJc3rCI/FiwCeKZV8pnywou/rqlRy0Jfy 6oPOPrk= =97B9 -----END PGP PUBLIC KEY BLOCK----- -----Original Message----- From: Aimee Farr [mailto:aimee.farr@p...] Sent: Friday, November 16, 2001 8:27 AM To: TSCM-L Mailing List Subject: [TSCM-L] Digital document control = interception? [There are a number of solutions like this. Interesting. ~Aimee.] http://news.zdnet.co.uk/story/0,,t269-s2099331,00.html Email retraction tool may run into interception hurdle 17:57 Thursday 15th November 2001 Wendy McAuliffe A Lotus Notes email retraction tool could be breaking interception laws, according to the Office of the Information Commissioner A new email tool that allows Lotus Notes and Domino users to retract unread emails from a person's inbox could be breaking surveillance and data protection laws within the UK. The Office of the Information Commissioner has warned that the Demailer tool, announced by IBM/Lotus on Wednesday, could conflict with email interception principles set out in the Regulation of Investigatory Powers Act 2000 (RIPA). The email retraction utility is also in danger of infringing data processing guidelines contained within the Data Protection Act 1998, as the intended recipient will be unaware that an email has been retrieved from their inbox. "If the tool allows an individual to retrieve an email from the server, that is not unreasonable," said David Clancy, assistant commissioner to the information commissioner. "But if it allows someone to retrieve an email from beyond the server, when the email is waiting in the inbox, we would see this as interception, which also has potential data protection issues." The IBM/Lotus Demailer, developed by IT Simple, allows users of Lotus Domino Notes to retract emails within any organisation, across any organisation's domains, within private Domino intranets, and from Domino customers and suppliers through the Internet. The tool is designed for the retrieval of emails sent in error, without the receiver being informed. Email retraction has been a feature of some systems for years, but recent legislation may mean that such a tool is no longer legitimate for business purposes. "The person retrieving the email doesn't need any rights at all," said Samantha Barnes, marketing manager at IT Simple. The creator of Demailer claims that all data protection implications were considered before the launch of the product, and insists that email retraction tools are only illegal in Germany. "There are no legal implications at all -- IBM would not be going for it if that was the case," said Barnes. RIPA grants law enforcement officers the power to intercept emails in cases of national security, or for the purposes of detecting crime and disorder, protecting public health and safety, and collecting tax. It is agreed among the legal and policy-making profession that there is currently a lack of clarity surrounding the circumstances in which emails can be intercepted, but Lord Bassam's "doormat" rule concludes that if an email is sitting in an inbox and has not been read, any interference with that correspondence would be considered interception. The Office of the Information Commissioner is concerned that Demailer capabilities may be encroaching into illegal interception territory, as the utility can be used by any Notes user on a day-to-day basis. "We would need to look at whether this was a lawful interception under RIPA -- if not it would be a RIPA offence, and would classify as unfair processing under the Data Protection," said Clancy ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4148 From: James M. Atkinson Date: Sat Nov 17, 2001 8:10pm Subject: EMC embroiled in spy case with ex-employee Tuesday 13th November 2001 5:20pm EMC embroiled in spy case with ex-employee http://www.silicon.com/public/door?6004REQEVENT=&REQINT1=49111&REQSTR1=silicon.com EMC says he stole information and lied on his CV. He says his house was broken into and his phone bugged... Storage giant EMC is involved in a full-blown courtroom battle with one of its former executives over allegations of spying and forgery. EMC's lawyers are accusing former employee Kenneth Todd Gresham of taking strategic company secrets with him when he joined small storage start-up Eurologic Systems earlier this year. According to US wires, EMC also claims that Gresham lied in his job application, saying his claims of a college education are false. Gresham's lawyers are denying the accusations. Gresham claimed in his defence that suspicious events took place at Gresham's home this summer, such as break-ins and hoax telephone calls warning his house was bugged. The case continues. -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4149 From: Steve Uhrig Date: Sat Nov 17, 2001 10:31pm Subject: ISA DAR-3 available Hi all, An ISA DAR-3 'Extended Range Wireless Transmitter Detector' has just become available from a retiring TSCMer. This was his primary RF piece, as it is for a number of professional sweepers. Check here for specs: http://www.isa-tscm.com/Products/dar-3&4.htm The DAR-3 is the enhanced version, with full RF coverage of 50 kc through 12 gigs. The unit includes an alarm where you can set the trigger level to just above background and use it for In-Place Monitoring (IPM). You can remote the alarm if necessary. It also has a built in sound source. For nearly a year I had a DAR-1 (the less sophisticated version) sitting on a shelf in my office with a collapsed BNC whip and elbow on it. I set the trigger level fairly high, and a few times a day I would hear airplanes overhead talking to somewhere, and various other assorted transmissions. One time the local power company was working in the area, and I clearly heard them talking to their dispatcher on their 800 meg trunking system. Another time we had a plumber out, and after he did his work, he called into the office from the cell phone in his truck to find out how much to charge us. The DAR picked up his cell transmissions fine, and I heard the amount he was going to charge us. I had a check filled out with that amount when he came back in, and I handed it to him. He nearly choked. I just said I had written the check for what I considered was a fair price and hoped it was OK with him. He handed me a handwritten service ticket with the exact amount of the check on it. Nothing gets by you with one of these. The DAR-3 also will read signals from power lines, too, with the included adapter. So you can check for RF/Carrier Current devices on the power lines as well as signals radiated. This unit is in excellent condition, with a recent battery. The kit includes the handheld antenna and cable, shoulder strap, headphones, battery charger, instruction manual and custom foam fitted hard carrying case with combination lock, made by Platt. When your check clears I will give you the combination to the lock! The case is slightly bigger than a briefcase but not as big as a suitcase. In the past, every DAR I have had has sold within a few days of becoming available. They are rare, expensive, versatile units. Here is a chance to get a -3 version at an excellent price. Price for the unit with accessories as described above is $2250. ========================= As an accessory for the above is a microwave Log Periodic Antenna (LPA), covering 1 to 12 gigs. It is very directional and high gain. The antenna looks like the standard Christmas tree, mounted with vertical polarization on a pistol grip. The pointed edge of the antenna sticking up acts as a handgun sight. A short piece of coax connects the antenna to the DAR via a front panel BNC connector. This antenna is a precision made device, necessary for proper sweeping at extremely high frequencies. I am offering it separately in case someone who already has an antenna needs the DAR and does not want to spend the money on another one. The antenna is not shown on ISA's page, but it looks similar to the MDC-5 in the link below except the antenna is vertical instead of horizontal. http://www.isa-tscm.com/Products/Products.htm The antenna comes in a nice hard plastic case which I believe is an ordinary heavy plastic toolbox which has been fitted with foam. Antenna is $400 and will not be sold separately unless someone else buys only the DAR. I take checks, credit cards, cash, precious metals or anything else equivalent for payment and will ship anywhere in the world. Email if interested. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4150 From: A Grudko Date: Sun Nov 18, 2001 10:57am Subject: Guard's lapse at Logan Non-TSCM thread - Original Message - From: James M. Atkinson > [The only way that they are going to stop this kind of behavior is to > totally clear out the private firms from the primary screening point, > and move the entire security perimeter into the hands of the federal > government (preferably the military).] I owned a high risk courier company for a year (it was bought out by Brinks in '96). We operated from the aircraft to the customer's premises & vice versa, moving gold bullion, diamonds, jewelery, cellphones and laptops. Our track record was 100% - zero loss in over a year's operation. Our secrets were: * The guys were all screened ex-police or military * Military disciplin was maintained * High morale and teamwork was a priority * They were paid up to double the industry rate * Regular training * Good technical communications * We knew thier families and home circumstances (it was a small company - max. 12 guys) ** And they knew that in SA the danger of facing 20 guys with auto weapons was real, so it really did not pay to slacken off and your team-mates would remind you of that! I think the key is a military attitude but it can be achieved by suitably motivated civilians. We also have a history of military mindedness and used to have a strong undercurrent of disciplin and respect for authority. I have a feeling some of that type of mindset will be on the increase in the US for the forseeable future. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigation Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4151 From: James M. Atkinson Date: Sun Nov 18, 2001 0:46pm Subject: Re: Another interesting signal It sounds like a Micro device phone bug, as the freq. you mention is one of their VHF "house frequencies" (which is actually 139.900 or 139.995), and represents about 5% of their sales. You may actually have some inter-modulation distortion from a local FM or TV station mixing with a local ILS signal (the ILS signals can sound like gurgling water, as can some kind of satellite based fax signals.) Use a tunable shielded loop antenna and preamplifier, and NOT A YAGI to DF the signals. Yagi's tend not to be high enough gain, and the null are not deep enough to be of much help. Also, consider buying or building several dozen bandpass filters (on popular bug channels) to put between the loop and the amplifier. Personally, I use a two threat specific tunable loops (ARA), one for the 139 MHz band, and a second for the 398 MHz spy-bands. Each loop contains a hand built 5 pole 40+ dB band pass filter in the hand held base, and a ten turn tuning slug at the air-gap in the tip of the antenna. I then squirt the signal back to a SHIELDED 32-40 dB preamplifier (with a very high compression point), and then into my SA or search receiver. I can get 40+ dB of isolation in the space domain, 40-60 dB in the filters, then a good 30-40 dB on the amps (for an isolation of well over 120 dB). Just remember that you need TWO bearings with a loop antenna unless you want to fool around with a sense element. -jma At 4:20 PM +0200 11/18/01, A Grudko wrote: >On a sweep yesterday (for a client who was the victim of an xtal controlled >UHF room TX at a different location 3 years ago) my Fairmate HP 100E (whist >scanning known VHF and UHF surveillance transmitter freqs) a signal was >detected on 139.990 Mhz NBFM. The signal was also confirmed on my Yaesu FT90 >car transceiver. It was not detected on the Scanlock or CPM 700. > >Unfortunately there are about 20 VHF/UHF antennas transmitting occasionally >less than 50 metres away. It is also within 4 km of our main airport and >there is a 800 meg cellphone tower about 100 Mtrs away. > > On Narrow Band FM mode the signal sounded just like softly running water, >such as a small fountain or fish tank - and no the is no such water feature >in the immediate area. This audio did not appear to change in response to >sound or light changes in the rooms. No audio was heard when we changed to >Wide Band FM, AM or Sub-carrier. All PCs in the area were switched off and >we powered down the burglar alarm. > > The signal was strongest close (I used a fold up 2 ele.Yagi and 10 db >attenuator) to a small (300x300x600 mm) glass fronted, locked metal network >box that we could not safely switch off. I suspect this to be the source of >the signal. The signal was very weak, being detectable no more than 15 Mtrs >from the building even to the sensitive FT90 with a db gain antenna - I >drove all round sniffing for it (I mentioned in my report that it is >probably a spurious from the network box but that it could be from a >transmitter with a nearly exhausted battery). > > I've recommend we return during the week when the network techie. can >safely power-down for us and we can put time aside for a proper physical >search, and I will record it. > > My question to the group is if anyone has heard a similar sound? Although >it was just like running water say a metre from a mike, there were no other >sounds (traffic/people/aircraft/aircons or anything, and we kept it on for 2 >hours). > > >Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , > Est. 1981 >International business intelligence and investigation >Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 >0255 - 244 0256 (Fax) >SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom >When you need it done right - first time -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4152 From: James M. Atkinson Date: Sun Nov 18, 2001 1:24pm Subject: Confirmed Finds Stats below 500 MHz First column is the actual frequency in MHz, the second column is the number of "confirmed finds" in the field; active as a hostile eavesdropping device. Time frame is over the past five years, geographic location of the finds were all on the East Coast of the United States. In each case the find was carefully documented, witnessed by a second party, and reported to the appropriate authorities. List does not include free running oscillator devices, video devices, microwave devices, SS, or devices used for anything other then simple analog voice that could be picked up with a simple scanner. Basically the following list consists of the signals from "statistically significant" eavesdropping devices readily available to the public via either mail order or spyshops. 49.8301 76.6001 77.0001 134.0001 139.9001 139.9403 139.9706 140.0008 144.0001 149.0001 298.9802 299.3201 367.4001 368.0751 398.4601 398.60526 399.0301 399.45528 442.9001 In each case I either personally found the device, or directly knew (and/or trained) the person(s) who found it and can vouch for them (such as someone on a protective detail). Most devices where found in a corporate environment, homes of an executive, or hotel room being used by an executive. The list involves 35 people reporting stats, involving over 45,000 documented man-hours of sweep work over a sixty month period (each person performing an average of just under 21.5 sweep hours per month). To break the number down even further one bug was found for every 518 hours of active sweep time. -jma -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ [Non-text portions of this message have been removed] 4153 From: Date: Sun Nov 18, 2001 0:01pm Subject: Workplace: E-mail raises new hazards at work http://www.newsok.com/cgi-bin/show_article?ID=785438&pic=none&TP=getbusiness The Sunday Oklahoma, 18 November 2001, p. 2-C Workplace: E-mail raises new hazards at work 2001-11-18 By Anick Jesdanun AP Internet Writer NEW YORK -- Borrow a pen from work to write a love letter, and all you might get is a frigid rejection. Borrow the company's e-mail system to compose that same letter, and you could get fired. Getting in trouble is becoming much easier as the workplace stretches beyond the walls of the office. "Everywhere is a workplace today," said Lewis Maltby, president of the National Workrights Institute in Princeton, N.J. "We've always allowed employers to do virtually anything they want, and the harm was limited (to) the office from 9 to 5. Today, employers could monitor you 24 hours a day." Courts will be asked to draw boundaries over the next year or two as telecommuting continues to grow, predicts Washington employment lawyer Frank Morris. About 28 million Americans, or one in five employees, work outside the office for all or part of the workweek, according to the International Telework Association and Council. Countless others check work-related e-mail or Web sites after dinner or on vacation. If past court cases on office conduct offer any guidance, what employees do or say outside the office could come back to haunt them. The Privacy Foundation at the University of Denver estimates that more than a third of the U.S. work force with access to the Internet have their e-mail messages and Web surfing regularly monitored by their employers. "I think employees, anytime they are interfacing with the office or office equipment, should have the operating assumption they do not have privacy rights," said Michael R. Littenberg, a New York attorney. Employees may be interacting without realizing it. They may mistakenly believe that personal e-mail accounts, like Hotmail, stay private when checked from work. But software sniffers can pick up messages as they travel unencrypted through company networks. In a case involving Texas' open-records law, Arlington Councilwoman Julia Burgen was forced to disclose city- related messages on her personal e-mail account because she had listed it on a business card. The city is appealing the ruling by the Texas attorney general's office. 4154 From: Date: Sun Nov 18, 2001 2:22pm Subject: *CIA QUALIFICATIONS-WHAT ARE THEY WILLING TO PAY?? NOTE: The qualifications--then note what the company is willing to pay for that extraordinary person??? And we wonder why there is a problem? For the extraordinary individual who wants more than a job, this is a way of life that will challenge the deepest resources of your intelligence, self-reliance, and responsibility. It demands an adventurous spirit... a forceful personality... superior intellectual ability... toughness of mind... and the highest degree of integrity. It takes special skills and professional discipline to produce results. You will need to deal with fast-moving, ambiguous, and unstructured situations that will test your resourcefulness to the utmost. This is the Clandestine Service, the vital human element of intelligence collection. These people are the cutting edge of American intelligence, an elite corps gathering the vital information needed by our policy makers to make critical foreign policy decisions. Qualifications: Central Intelligence Agency's Clandestine Service Trainee Program is the gateway to a unique overseas experience. To qualify you must have first-rate qualifications: a bachelor's degree with an excellent academic record, strong interpersonal skills, the ability to write clearly and accurately, and a burning interest in international affairs. A graduate degree, foreign travel, foreign language proficiency, previous residency abroad, and military experience are pluses. We are particularly interested in candidates with backgrounds in Central Eurasian, East Asian, and Middle Eastern languages, and those with degrees and experience in international economics and international business as well as in the physical sciences. Entrance salaries range from $37,000 to $57,000, depending on credentials. All applicants must successfully complete a thorough medical and psychological exam, a polygraph interview, and an extensive background investigation. Maximum age for entrance into this program is 35. U.S. citizenship is required for both applicant and spouse. 4155 From: iDEN-Test Mobile-Marcel Date: Sun Nov 18, 2001 8:16pm Subject: Re: *CIA QUALIFICATIONS-WHAT ARE THEY WILLING TO PAY?? The FBI is not much better, why do you think so many Op's go Pvt? sleuthone@a... wrote: > NOTE: The qualifications--then note what the company is willing to pay for > > that extraordinary person??? And we wonder why there is a problem?-- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 4156 From: Aimee Farr Date: Sun Nov 18, 2001 11:49pm Subject: New ideas [Old, but I didn't see it.~Aimee] http://www.washingtonpost.com/ac2/wp-dyn/A53844-2001Oct25?language=printer Pentagon Makes Rush Order For Anti-Terror Technology By Greg Schneider and Robert O'Harrow Jr. Washington Post Staff Writers Friday, October 26, 2001; Page A10 The Pentagon yesterday issued a rush appeal for ideas for fighting terrorism, asking contractors for exotic new surveillance technologies that could be used against faraway enemies, as well as at American airports and shopping malls. In releasing an unusual "broad agency announcement," the Pentagon bypassed its cumbersome bureaucracy and posted a list of 38 sought-after systems or technologies on an Internet site used by contractors. It wants one-page proposals by Dec. 23 for products that could be in place in 12 to 18 months. The requested items include a computer system for tracking anyone who buys material that could be used in making bombs, a portable polygraph machine for questioning airline passengers, and voiceprint software for automatically recognizing people speaking Middle Eastern languages. Experts said the initiative reflects how a military heavy on jets and ships is shifting its investments to fight this new, unexpected type of war. Officials put no price on the effort and said it was an attempt to find a new way of doing business in a time of urgent need. Many of the surveillance technologies are already highly developed in the commercial world. In the wake of the Sept. 11 terrorist attacks, they are being rapidly embraced for law enforcement, intelligence and security purposes. The Pentagon's announcement came on the day the Senate approved a landmark bill that would greatly expand the ability of law enforcement and intelligence agencies to tap phones, monitor Internet traffic and conduct other forms of surveillance in pursuit of terrorists. "This is just the tip of the iceberg," said Joseph Atick, president of Visionics Corp. of Jersey City, which makes facial recognition systems for identifying and tracking people. "We're going from concepts and ideas to programs and appropriations," Atick said. "I'm very impressed how fast they've turned around. It just shows the urgency with which they are operating." A Pentagon spokesman said the unusually broad request is an attempt to get innovative ideas from sources that might not otherwise have direct access to the Pentagon -- small companies, even individuals with imaginative solutions -- and quickly put them in place. "This is an area that needs a little bit of thinking outside the box," said the spokesman, Air Force Maj. Mike Halbig. Among other technologies, defense officials want proposals for facial recognition systems, computer programs that can predict terrorist behavior, and sophisticated scanners for spotting people who have handled weapons of mass destruction. "This is exactly where [the U.S. military] is going to try to spend more money," said John Pike, a military analyst with GlobalSecurity.org, a nonpartisan think tank. "For the most part, these are small gadgets that you don't have to have a Boeing or Lockheed Martin to build or develop." Electronics expert David Rockwell of the Teal Group, an aerospace consulting firm, said many of the systems the Pentagon wants have been in development for years but until now have suffered from a lack of funding and attention. Some of the areas "have potentially ominous overtones," Rockwell added. One item, for instance, calls for a tracking device that allows "monitoring of civilian as well as military targets." "Some of this technology could be used in ways that have not been legal in the past and may become legal in the future," he said. "But I think that's happened during every time of war in the U.S." Many of the technologies the Pentagon proposes are similar to devices that companies are already putting on the market. "It sounds like they've done their homework. Most of these technologies are pretty ripe for these uses," said Richard Norton, executive director of the International Biometric Industry Association, which represents companies that make systems keyed to immutable characteristics such as fingerprints and certain facial characteristics. Member companies expect their revenue to come in at $200 million this year, double last year's. The use of digital fingerprints by law enforcement agencies has become common, and banks, casinos and other businesses now routinely use facial recognition or handprint systems to identify fraud artists or improve building security. Earlier this year, Tampa became the first U.S. city to use facial recognition in a public area to fight crime. Officials at airports in Boston and Oakland, Calif., are planning to install a facial recognition system, and officials at least a dozen other U.S. airports are considering such measures to increase security. Civil liberties specialists said the military's effort would accelerate the development and adoption of biometric systems throughout society. Improved facial and voice recognition systems could dramatically strengthen the ability of authorities to identify and track people, including those who might be innocent of any wrongdoing, said James Dempsey, deputy director at the Center for Democracy and Technology, a civil liberties advocacy group based in the District. While there's little doubt such systems could help the military fight terror, the improved technology will almost surely migrate into civilian law enforcement agencies, Dempsey said. The system used by Tampa police, for instance, was developed by Visionics Corp. with millions of dollars in backing from the Defense and Justice departments. And it is being used by a variety of police agencies for targeted surveillance. "The government is increasingly going to be conducting scans -- facial scans, voice scans, data scans," Dempsey said. "They're going to be tapping into this digital ocean . . . of daily behavior." © 2001 The Washington Post Company 4157 From: Matthew Paulsen Date: Sun Nov 18, 2001 8:17pm Subject: RE: *CIA QUALIFICATIONS-WHAT ARE THEY WILLING TO PAY?? Think that's rediculous? Check out starting wages for fbi agents... It's around 18K if I remember right. -----Original Message----- From: sleuthone@a... [mailto:sleuthone@a...] Sent: Sunday, November 18, 2001 5:22 PM To: undisclosed-recipients: Subject: [TSCM-L] *CIA QUALIFICATIONS-WHAT ARE THEY WILLING TO PAY?? NOTE: The qualifications--then note what the company is willing to pay for that extraordinary person??? And we wonder why there is a problem? For the extraordinary individual who wants more than a job, this is a way of life that will challenge the deepest resources of your intelligence, self-reliance, and responsibility. It demands an adventurous spirit... a forceful personality... superior intellectual ability... toughness of mind... and the highest degree of integrity. It takes special skills and professional discipline to produce results. You will need to deal with fast-moving, ambiguous, and unstructured situations that will test your resourcefulness to the utmost. This is the Clandestine Service, the vital human element of intelligence collection. These people are the cutting edge of American intelligence, an elite corps gathering the vital information needed by our policy makers to make critical foreign policy decisions. Qualifications: Central Intelligence Agency's Clandestine Service Trainee Program is the gateway to a unique overseas experience. To qualify you must have first-rate qualifications: a bachelor's degree with an excellent academic record, strong interpersonal skills, the ability to write clearly and accurately, and a burning interest in international affairs. A graduate degree, foreign travel, foreign language proficiency, previous residency abroad, and military experience are pluses. We are particularly interested in candidates with backgrounds in Central Eurasian, East Asian, and Middle Eastern languages, and those with degrees and experience in international economics and international business as well as in the physical sciences. Entrance salaries range from $37,000 to $57,000, depending on credentials. All applicants must successfully complete a thorough medical and psychological exam, a polygraph interview, and an extensive background investigation. Maximum age for entrance into this program is 35. U.S. citizenship is required for both applicant and spouse. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4158 From: Matthew Paulsen Date: Sun Nov 18, 2001 8:18pm Subject: RE: *CIA QUALIFICATIONS-WHAT ARE THEY WILLING TO PAY?? hehe.. You beat me to the punchline by 30 seconds. -----Original Message----- From: iDEN-Test Mobile-Marcel [mailto:Marcelrf@B...] Sent: Sunday, November 18, 2001 6:17 PM To: sleuthone@a...; TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] *CIA QUALIFICATIONS-WHAT ARE THEY WILLING TO PAY?? The FBI is not much better, why do you think so many Op's go Pvt? sleuthone@a... wrote: > NOTE: The qualifications--then note what the company is willing to pay for > > that extraordinary person??? And we wonder why there is a problem?-- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4159 From: James M. Atkinson Date: Tue Nov 20, 2001 8:03am Subject: Referral Information Anybody on the list who needs sweep work done should take a look at the referral listing I have posted at the following link... I can personally vouch for everybody listed: http://www.tscm.com/goldlist.html The following will also be of interest, and will give you some realistic idea as to how much a legitimate sweep will cost: http://www.tscm.com/howcost.html (note the coverage maps) If you need some kind of worksheet to estimate how long a PROPER sweep will take; you can find an estimate worksheet here: http://www.tscm.com/estimate.html (Hint: Stay in the center column) Also, You can make a hell of a lot more money on referral fees, then trying to do the job yourself. Plus if you try to do the job yourself, and are lacking in equipment, training, and background you could likely loose your A&O insurance, get sued by the client, or even lose your licence. Do not show up to do a sweep with a fancy blinky-box you bought at some sleazy spy shop... you know, the one that has been hustling you for video gear and surveillance products. +++++ I have a referral program which I personally practice as a professional courtesy. I consider such referral fees to strictly be a professional courtesy, but not any kind of legal obligation. I only pay a referral for projects involving more then 4 hours of sweep work, and pay the referral fees generated by all contact with the client for a period of up to one year. In the case where one contact brings me in early in the year, and then later the same year some other contact has me come in I split the fee between them.The only wrinkle is that in really large companies I may have 3-4 separate channels into the company, and referral fees only apply for those channels developed though external contacts. For example I may have been doing sweep work directly for the CEO for ten years, but a PI may bring me in for a sweep for a lower level executive (in which case the PI gets a referral fee for the sweep for the low level executive, but not for the CEO's work) I do not pay a referral fee to people actually inside the clients firm, and strictly limit referral fee to those obviously outside the company. Since security people often move inside and outside the company (ie: a PI becomes head of security) we have a rather awkward situation. If so requested by a contact inside the company I will reduce the amount of my fee by the amount I would normally pay as a referral. Referral fees are only payable on billable time, and does not include expenses (lodging, airfare, expendable materials, film, and so on). I break my program into three sections, each depends on the amount of involvement of the person who brings me the project. 10% - This is for a basic referral where a contact specifically sends a client to me, and the client confirms the contact as being responsible for the connection. I bill the client directly, and the contact does not involve their own money in getting me paid. The contact may or may not be present during the sweep, and related meetings. This is a typical corporate referral. 15% - This is just like a basic referral; however, I get paid directly by my contact (typically as a subcontractor). I may or may not be operating under my own name, and the contact will be involved in all future contact with the client (for at least one year). The contact will typically assist with the sweep to a limited extent, and will "show their face" so the client sees that they are involved. I write the report to the client. This is a typical PI or security firm referral where I am brought in as a sub. 20% - The contact becomes much more involved in the sweep, pays me out of their own funds, and is present (and helping to a great extent) during every element of the sweep. They will be present from the time the truck arrives, and will shadow and help me during the entire sweep until finished (and all of the equipment is back on the truck). In effect the contact becomes my assistant, helps with the physical search, furniture moving, charting, and so on ... but does not actually operate any of my instruments. They will write the final report to the client on their own letterhead (with my inputs). This is a PI or security firm referral where I am brought in as a sub, but the contact wants to be heavily involved in the actual sweep. For large corporate clients half the estimated fee (plus expenses) is payable in advance, and the balance is due when the final report is presented. All other clients pay the full estimated amount in advance. Once engaged and the sweep is scheduled there is a charge of 25% for cancellation (which is extremely rare). I have special equipment, training, and proprietary resources for detecting RF devices from some rather amazing distances (many times further then you might think); and as such I am periodically asked to supplement other TSCM teams. When I operate as part of such a team I charge a flat hourly rate of $250 to the team organizer (with a six to eight hour minimum) plus expenses. I also charge an additional fee for equipment which varies on what I am actually bringing (ie: $250k in TSCM equipment costs an additional $250 per hour). In such cases a referral fee would not apply, and I often never get to interface with the client. The fee is paid to me half in advance, and the balance when I out-brief, or turn in my report. -jma -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4160 From: James M. Atkinson Date: Tue Nov 20, 2001 11:09am Subject: Why Athletes Shouldn't Be Role Models Why Athletes Shouldn't Be Role Models Chicago Cubs outfielder Andre Dawson on being a role model: "I want all the kids to do what I do, to look up to me. I want all the kids to copulate me." ---------- New Orleans Saint RB George Rogers when asked about the upcoming season: "I want to rush for 1,000 or 1,500 yards, whichever comes first." ---------- And, upon hearing Joe Jacobi of the 'Skins say: "I'd run over my own mother to win the Super Bowl," Matt Millen of the Raiders said: "To win, I'd run over Joe's Mom, too." ---------- Football commentator and former player Joe Theismann 1996: "Nobody in football should be called a genius. A genius is a guy like Norman Einstein." ---------- Senior basketball player at the University of Pittsburgh: "I'm going to graduate on time, no matter how long it takes." ---------- Bill Peterson, a Florida State football coach: "You guys line up alphabetically by height." And "You guys pair up in groups of three, then line up in a circle." ---------- Boxing promoter Dan Duva on Mike Tyson hooking up again with promoter Don King: "Why would anyone expect him to come out smarter? He went to prison for three years, not Princeton." ---------- Stu Grimson, Chicago Blackhawks left wing, explaining why he keeps a color photo of himself above his locker: "That's so when I forget how to spell my name, I can still find my clothes." ---------- Shaquille O'Neal on whether he had visited the Parthenon during his visit to Greece: "I can't really remember the names of the clubs that we went to." ---------- Shaquille O'Neal, on his lack of championships: "I've won at every level, except college and pro." ---------- Lou Duva, veteran boxing trainer, on the Spartan training regime of heavyweight Andrew Golota: "He's a guy who gets up at six o'clock in the morning regardless of what time it is." ---------- Pat Williams, Orlando Magic general manager, on his team's 7-27 record in 1992: "We can't win at home. We can't win on the road. As general manager, I just can't figure out where else to play." ---------- Chuck Nevitt, North Carolina State basketball player, explaining to Coach Jim Valvano why he appeared nervous at practice: "My sister's expecting a baby, and I don't know if I'm going to be an uncle or an aunt." ---------- Jim Finks, New Orleans Saints General Manager, when asked after a loss what he thought of the refs: "I'm not allowed to comment on lousy, no good officiating." ---------- Alan Kulwicki, stock car racer, on racing Saturday nights as opposed to Sunday afternoons: "It's basically the same, just darker." ---------- Lincoln Kennedy, Oakland Raiders tackle, on his decision not to vote: "I was going to write myself in, but I was afraid I'd get shot." ---------- Frank Layden, Utah Jazz president, on a former player: "I told him, 'Son, what is it with you? Is it ignorance or apathy?' He said, 'Coach, I don't know and I don't care." ---------- Torrin Polk, University of Houston receiver, on his coach, John Jenkins: "He treats us like men. He lets us wear earrings." ---------- Shelby Metcalf, basketball coach at Texas A&M, recounting what he told a player who received four F's and one D: "Son, looks to me like you're spending too much time on one subject." ---------- And the Gem: Oiler coach Bum Phillips when asked by Bob Costas why he takes his wife on all road trips, Phillips Responded: "Because she is too damn ugly to kiss good-bye." >> -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4161 From: Date: Tue Nov 20, 2001 1:00pm Subject: This looks spiffy and would be useful for TSCM & Covert Video Click here: Ramsey Electronics Price is tinsel. 4162 From: James M. Atkinson Date: Tue Nov 20, 2001 8:55pm Subject: Re: This looks spiffy and would be useful for TSCM & Covert Video At 7:00 PM -0500 11/20/01, MACCFound@a... wrote: > HREF="http://www.ramseyelectronics.com/cgi-bin/commerce.exe?preadd=action&key= > >LPY2">Click here: Ramsey Electronics > >Price is tinsel. Now if Ramsey could just get their story straight on the product we woul have a real winner. 1) They claim 6 dB of gain... but over what? a dipole, a isotropic, or perhaps a pull top of a beer can? 2) The catalog claims coverage range from 900 MHz to 2 GHz, but at a second spot they say it is 2.5 GHz on the high side. If you call them they claim coverage to 2.6 GHz... why all the inconsistencies? 3) Where is the bloody preamp? 4) Why are they calling it a "Log Periodic Yagi"... Uda-Yagi's are not this broadband. As a favor to the list I will buy several next week, and post a full commentary on it. -jma -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4163 From: Date: Tue Nov 20, 2001 8:13pm Subject: Re: This looks spiffy and would be useful for TSCM & Covert Video In a message dated 11/20/01 7:09:34 PM Pacific Standard Time, jmatk@tscm.com writes: << I will buy several next week, and post a full commentary on it. >> That's why you get the big bucks! 4164 From: James M. Atkinson Date: Wed Nov 21, 2001 8:09am Subject: Happy Thanksgiving I would like to wish all list members a very Happy Thanksgiving. -jma -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4165 From: James M. Atkinson Date: Wed Nov 21, 2001 10:59am Subject: A moment to remember on Thanksgiving Day this year As a nation we have much to be grateful for on Thanksgiving Day this year, and I would personally appreciate it if each list member could take just a moment to visit the following link (it take a little while to load, so be patient): http://www.sweepgear.com/tribute911.html During this holiday season remember those who will not be with us, the fallen heroes, and those who stand in the shadows in defense of what we hold dear. Remember our soldiers who walk the mountains of Afghanistan bringing the evildoers to justice, and those who labor to rid the world of those who have created fear. God Bless America, and Happy Thanksgiving. -jma -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4166 From: Cristian C. Date: Wed Nov 21, 2001 10:24am Subject: Fwd: [EE]: proud announcement >X-Warning: mitvma.mit.edu: Host *unknown claimed to be L30.itim-cj.ro >Date: Wed, 21 Nov 2001 13:18:11 +0200 >Reply-To: pic microcontroller discussion list >Sender: pic microcontroller discussion list >From: Vasile Surducan >Subject: [EE]: proud announcement >Comments: To: jallist@yahoogroups.com >To: PICLIST@M... > >Dear piclisters and jalliens, > >I'm proud to announce you that romanian researchers have won >ALL PRIZES at "The 50th Anniversary World Exhibition of Innovation >Research and New Technology" EUREKA Brussels 2001. > >From 129 romanian participating patents, ALL won gold, silver and bronze >medals, Romania was first on top from about 40 participating countries. > >Do you know where Romania is on the map ? >Is the same country which was rejected to become a member on the European >Union country and NATO because of his small economical performances. >BUT as you see, the inteligence and creativity has nothing to do with >economic performances or with standard of living from a country or >another. >More than that, when you haven't tools and you start your work by building >them your creativity is growing. > >Best wishes from Romania, >Surducan Vasile, design engineer >http://www.geocities.com/vsurducan > >-- >http://www.piclist.com#nomail Going offline? Don't AutoReply us! >email listserv@m... with SET PICList DIGEST in the body 4167 From: Dawn Star Date: Wed Nov 21, 2001 6:40pm Subject: Thanksgiving 'TWAS THE NIGHT OF THANKSGIVING 'TWAS THE NIGHT OF THANKSGIVING, BUT I JUST COULDN'T SLEEP I TRIED COUNTING BACKWARDS, I TRIED COUNTING SHEEP. THE LEFTOVERS BECKONED - THE DARK MEAT AND WHITE BUT I FOUGHT THE TEMPTATION WITH ALL OF MY MIGHT TOSSING AND TURNING WITH ANTICIPATION THE THOUGHT OF A SNACK BECAME INFATUATION. SO, I RACED TO THE KITCHEN, FLUNG OPEN THE DOOR AND GAZED AT THE FRIDGE, FULL OF GOODIES GALORE. GOBBLED UP TURKEY AND BUTTERED POTATOES, PICKLES AND CARROTS, BEANS AND TOMATOES. I FELT MYSELF SWELLING SO PLUMP AND SO ROUND, 'TIL ALL OF A SUDDEN, I ROSE OFF THE GROUND. I CRASHED THROUGH THE CEILING, FLOATING INTO THE SKY WITH A MOUTHFUL OF PUDDING AND A HANDFUL OF PIE. BUT, I MANAGED TO YELL AS I SOARED PAST THE TREES.... HAPPY EATING TO ALL - PASS THE CRANBERRIES, PLEASE. MAY YOUR STUFFING BE TASTY, MAY YOUR TURKEY BE PLUMP. MAY YOUR POTATOES 'N GRAVY HAVE NARY A LUMP, MAY YOUR YAMS BE DELICIOUS MAY YOUR PIES TAKE THE PRIZE, MAY YOUR THANKSGIVING DINNER STAY OFF OF YOUR THIGHS. MAY YOUR THANKSGIVING BE BLESSED!! Happy Turkey day to all, and to all, a good BITE! 4168 From: Aimee Farr Date: Wed Nov 21, 2001 5:46pm Subject: Not-so-proud announcement from Russia. RUSSIA ACCOUNTS FOR 0.3 PERCENT OF WORLD SCIENTIFIC DEVELOPMENT (12 November) Russia accounts for only 0.3 percent of scientific developments on the world market, ITAR-TASS quoted Russian Deputy Prime Minister Ilya Klebanov as saying. Addressing a meeting of the Russian Academy of Sciences, Klebanov said this proportion was "humiliatingly small" and inconsistent with the potential of Russian scientists. This figure is a result of a "strategic mistake" of officials who underestimated the role of science in the recent decade. Nevertheless, according to Klebanov, the situation has been gradually improving. "Eight [to] 10 priorities should be determined in which Russia should invest money in the first place," Klebanov stated. He cited an increase in budget and extra budgetary allocations to research as priority. Extra budgetary funding of science has increased from 5 percent to 50 percent in recent years, and the government expects a more serious investment by businesses. Klebanov described the drain of young cadre from science as one of the country's most acute problems. "If the situation does not change fundamentally in the next five to 10 years, Russia could lose [its] scientific potential," Klebanov said. He added that a presidential decree concerning grants for young scientists is underway. (TSK) ----- I've been following Russian press lately and ...defense consolidation, internal "spymania," foreigner aggression, diplomatic hyperfrenzy, new emerging markets, corruption, transnational criminal networks, ... blah, blah, blachk. Their scientific failings are reaching editorial pages, and it appears to be a matter of some political determination. Looks like exceptionally evil espionage indicators to me, but I don't know how regional instability and their economic situation factor in. My understanding is that before, they didn't have the minds or the markets to complete the circle. Perhaps that is changing. At any rate, budgetary increases could suggest mirror expenditures elsewhere and increased collusion with "private networks." I'm really disappointed with the intelligence provided to the public sector: generic, 20/20, above the water-line public domain, budget-justification. I fail to see how it is helpful in private decision-making, allocation of resources, or tasking. (I am growing quite bitchy about this.) ~Aimee 4169 From: Aimee Farr Date: Wed Nov 21, 2001 5:53pm Subject: RE: Not-so-proud announcement from Russia. I said: > I'm really disappointed with the intelligence provided to the > public sector: I meant private sector, of course. ~Aimee 4170 From: Date: Wed Nov 21, 2001 1:31pm Subject: FBI Develops Eavesdropping Tools FBI Develops Eavesdropping Tools By TED BRIDIS .c The Associated Press WASHINGTON (AP) - The FBI is going to new lengths to eavesdrop, building software to monitor computer use and urging phone companies to help make wiretaps more reliable. The FBI's ``Magic Lantern'' technology would allow investigators, via the Internet, to secretly install powerful software that records every keystroke on a person's computer, according to people familiar with the effort. The software is similar to ``Trojan horse'' programs already used by some hackers and corporate spies. The FBI envisions using Magic Lantern, part of a broad FBI project called ``Cyber Knight,'' to record the secret key a person might use to encrypt messages or computer files. The bureau has been largely frustrated in efforts to break open such messages by trying random combinations, and officials are increasingly concerned about their inability to read encrypted messages in criminal or terrorist investigations. The FBI said in a statement Wednesday that it can not discuss details of its technical surveillance efforts, though it noted that ``encryption can pose potentially insurmountable challenges to law enforcement when used in conjunction with communication or plans for executing serious terrorist and criminal acts.'' The FBI added that its research is ``always mindful of constitutional, privacy and commercial equities,'' and that its use of new technology can be challenged in court and in Congress. The FBI's existing monitoring technology, called the ``Key Logger System,'' has required investigators to sneak into a target's home or business and attach the device to a computer. Magic Lantern could be installed over the Internet by tricking a person into opening an e-mail attachment or by exploiting the same weaknesses in popular software that allow hackers to break into computers. It's unclear whether Magic Lantern would transmit the keystrokes it records back to the FBI over the Internet or store the information to be seized later in a raid. The existence of Magic Lantern was first disclosed by MSNBC. ``If they are using this kind of program, it would be a highly effective way to bypass any encryption problems,'' said James E. Gordon, who heads the information technology practice for Pinkerton Consulting and Investigations Inc. ``Once they have the keys to the kingdom, they have complete access to anything that individual is doing.'' People familiar with the project, who spoke only on condition of anonymity, said the package is being developed at the FBI's electronic tools laboratory, the same outfit that built the bureau's ``Carnivore'' Internet surveillance technology. The former head of the lab, Donald M. Kerr, became head of the CIA's science and technology unit in August. Some experts said Magic Lantern raises important legal questions, such as whether the FBI would need a wiretap order from a judge to use it. The government has previously argued that the FBI can capture a person's computer keystrokes under the authority of a traditional search warrant, which involves less oversight by the courts. ``It's an open question whether the covert installation of something on a computer without a physical entry requires a search warrant,'' said David Sobel, a lawyer with the Washington-based Electronic Privacy Information Center, a civil liberties group. Earlier this month the FBI urged some of the nation's largest telephone companies to change their networks so that investigators can reliably eavesdrop on conversations using new data technology. At a conference Nov. 6 in Tucson, Ariz. - and in a 32-page follow-up letter sent about two weeks ago - the FBI told leading telecommunications officials that increasing use of Internet-style data technology to transmit voice calls is frustrating FBI wiretap efforts. Although Carnivore can be used to capture electronic messages, it can't record voice messages sent over data networks for a variety of technical reasons. The bureau's access to voice calls using traditional technology is guaranteed under the 1994 Communications Assistance to Law Enforcement Act, but it exempted ``information services.'' The FBI said Wednesday it is not seeking to broaden the 1994 law to cover modern data technology; industry officials say the changes being sought by the FBI could take years to make. The FBI told companies that it will need access to voice calls sent over data networks ``within a few hours'' in some emergency situations, and that any interference caused by a wiretap ``should not be perceptible'' to avoid tipping off a person that his calls might be monitored. AP-NY-11-21-01 1833EST 4171 From: e cummings Date: Wed Nov 21, 2001 11:08am Subject: FBI reportedly creating "Magic Lantern" anti-crypto virus some interesting countermeasures mentioned below: >To: politech@p... >From: Declan McCullagh >Subject: FC: FBI reportedly creating "Magic Lantern" anti-crypto virus >Sender: owner-politech@p... >Reply-To: declan@w... >X-URL: Politech is at http://www.politechbot.com/ >X-Author: Declan McCullagh is at http://www.mccullagh.org/ >X-News-Site: Cluebot is at http://www.cluebot.com/ > >[This has been talked about in tech circles for years; it's hardly >suprising that the FBI would finally get around to creating such a >beastie. Perhaps an enterprising netrepreneur will take the next step: >Creating a "Secure PC" that would be proof against such an attack. Perhaps >it would run a better OS than Windows (just about any would do) where >programs have privileges, boot from fixed media like a CDROM that would >require a physical break-in to alter, require a private key embedded in a >keychain plugged in through a USB port to unlock the hard drive partitions >where application data are stored, use a flatscreen monitor and certain >default typefaces to limit TEMPEST emissions, include an Ethernet/serial >port monitor that would try to detect suspicious outgoing packets, compute >checksums every night on all executable and other relevant files, feature >tamper-proof hardware that would leave a physical or virtual mark if >opened by an intruder, be protected by a motion-activated videocam >streaming images of intruders to secure offshore websites, and so on. >Dedicated hardware that could not be accessed remotely could be hooked up >to the SCSI chain and scan key files nightly for the same MD5 checksum as >the night before. Or instead of a keychain, your crypto-key could be kept >in your Palm, which through a serial link also could be used to offload >crypto processing on hardware that's unlikely to be compromised. It's an >interesting dual trend and arms race: Police turning to software to snoop >on alleged miscreants, while counter-techniques are developing apace. My >money's on the defense. --Declan] > >--- > >From: "Geoff Gariepy" >To: >Subject: FBI software cracks encryption wall >Date: Tue, 20 Nov 2001 14:24:21 -0500 > >FBI software cracks encryption wall > >'Magic Lantern' part of new 'Enhanced Carnivore Project' > >By Bob Sullivan >MSNBC > >Nov. 20 - The FBI is developing software capable of inserting a computer >virus onto a suspect's machine and obtaining encryption keys, a source >familiar with the project told MSNBC.com. The software, known as "Magic >Lantern," enables agents to read data that had been scrambled, a tactic >often employed by criminals to hide information and evade law enforcement. > >.... > MAGIC LANTERN installs so-called "keylogging" software on a suspect's >machine that is capable of capturing keystrokes typed on a computer. By >tracking exactly what a suspect types, critical encryption key information >can be gathered, and then transmitted back to the FBI, according to the >source, who requested anonymity. > The virus can be sent to the suspect via e-mail - perhaps sent for >the FBI by a trusted friend or relative. The FBI can also use common >vulnerabilities to break into a suspect's computer and insert Magic Lantern, >the source said. > >http://www.msnbc.com/news/660096.asp?0na=x21017M32 > > > > >------------------------------------------------------------------------- >POLITECH -- Declan McCullagh's politics and technology mailing list >You may redistribute this message freely if you include this notice. >Declan McCullagh's photographs are at http://www.mccullagh.org/ >To subscribe to Politech: http://www.politechbot.com/info/subscribe.html >This message is archived at http://www.politechbot.com/ >------------------------------------------------------------------------- From: Tech Sec Lab Date: Mon Nov 15, 2004 4:43pm Subject: RE: Impedance of a Typical Alarm PIR Cable Run Mike The ADEMCO system that uses the serial data stream, would I be right in saying that it would be possible to monitor the logic on the line and with a little bit of trickery identify the heart beat streams. Then it would just be a case of replaying them, or does it use an encrypted session stream whereby the packet stream differ continously...however judging that the end device would then need microcontrollers, memory and a host of other hardware to operate, driving the cost up to pointless ranges. Interested to hear anyone else's ideas... Kind regards -Ois ************************** Message: 3 Date: Sun, 14 Nov 2004 16:30:36 +1100 From: Michael Dever Subject: Re: Impedance of a Typical Alarm PIR Cable Run Jim Are you talking about the power wiring or the alarm signaling circuit? A typical PIR will operate on 12 VDC and draw approximately 10-20mA. Whereas, the alarm circuit 'normal' resistance varies depending on the manufacture. For example, ADEMCO (Honeywell) alarm panels typically use an 'end of line resistor' of 2.2k ohm or sometimes 10k (typical in Australia). Normally, the alarm circuit will be tripped if the resistance changes by more than +/- 10% variation. Simple DC based alarm circuits can easily be 'spoofed' by applying a voltage equal to the steady state value (typically 6V on a 12V system). However, a lot of alarm panels these days (including ADEMCO) use a proprietary serial data stream instead of the DC loop. This allows individual sensors to be addressed and for multiple sensors to multiplexed onto the same loop. There are even higher security methods of signaling using 'end of line' modules which are unique to each sensor. These type of systems can use encryption to further thwart substitution. For example, The Australian Government extensively uses a type of signaling system between sensors and the alarm panel that is encrypted. I think TDRing one of these circuits would trigger an alarm. Also, I would be concerned about the effects of TDR pulses on the electronics at both ends. Hope this helps! Regards Mike 10136 From: Thomas Shaddack Date: Mon Nov 15, 2004 4:52pm Subject: RE: Impedance of a Typical Alarm PIR Cable Run Given the about-a-dollar cost of some cheap micros that would be sufficient for basic SHA1 challenge-response, I think it's doable. PS: My luggage was torn but found. :) On Mon, 15 Nov 2004, Tech Sec Lab wrote: > > Mike > > The ADEMCO system that uses the serial data stream, would I be right in > saying that it would be possible to monitor the logic on the line and with a > little bit of trickery identify the heart beat streams. > > Then it would just be a case of replaying them, or does it use an encrypted > session stream whereby the packet stream differ continously...however > judging that the end device would then need microcontrollers, memory and a > host of other hardware to operate, driving the cost up to pointless ranges. > > Interested to hear anyone else's ideas... > > Kind regards > > -Ois > > ************************** > > Message: 3 > Date: Sun, 14 Nov 2004 16:30:36 +1100 > From: Michael Dever > Subject: Re: Impedance of a Typical Alarm PIR Cable Run > > > Jim > > Are you talking about the power wiring or the alarm signaling circuit? > > A typical PIR will operate on 12 VDC and draw approximately 10-20mA. > Whereas, the alarm circuit 'normal' resistance varies depending on the > manufacture. > > For example, ADEMCO (Honeywell) alarm panels typically use an 'end of line > resistor' of 2.2k ohm or sometimes 10k (typical in Australia). > > Normally, the alarm circuit will be tripped if the resistance changes by > more than +/- 10% variation. Simple DC based alarm circuits can easily be > 'spoofed' by applying a voltage equal to the steady state value (typically > 6V on a 12V system). However, a lot of alarm panels these days (including > ADEMCO) use a proprietary serial data stream instead of the DC loop. This > allows individual sensors to be addressed and for multiple sensors to > multiplexed onto the same loop. > > There are even higher security methods of signaling using 'end of line' > modules which are unique to each sensor. These type of systems can use > encryption to further thwart substitution. For example, The Australian > Government extensively uses a type of signaling system between sensors and > the alarm panel that is encrypted. I think TDRing one of these circuits > would trigger an alarm. Also, I would be concerned about the effects of TDR > pulses on the electronics at both ends. > > Hope this helps! > Regards > Mike > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10137 From: Thomas Shaddack Date: Mon Nov 15, 2004 5:27pm Subject: RE: Impedance of a Typical Alarm PIR Cable Run On Mon, 15 Nov 2004, Thomas Shaddack wrote: > Given the about-a-dollar cost of some cheap micros that would be > sufficient for basic SHA1 challenge-response, I think it's doable. Was intended as a quick off-list response, sorry. Will elaborate a bit more. There is a set of possibilities how to secure the device against the replay attack. Some of them are simple enough to implement on a sub-dollar microcontroller. The cheapest way for finite lifetime of sequences may be based on one-time pads; give the device an EEPROM with a long sequence of bytes used as authentication, use one at the time. There is a potential problem with sequence resynchronization if part of the communication is lost. The advantage is extremely low CPU requirements, and the sequence can be as short as a single bit (where the adversary has 50% chance to guess the bit value correctly, but this chance halves for every further bit in a sequence; we then can just listen for the heartbeat messages and check the auth bit in every one, and compare the bitstream that comes with the heartbeats with a reference one). This is a variation of one-time pads. Another way, similar, is to do a key-based generation of pseudo-random numbers. Here the bitstream is not stored in a medium, but generated from another, finite and short bitstream, a key. The key has to be long enough to resist brute force (so the 16-bit initialization vector of random() function in some compilers won't do), the function itself must be robust enough to avoid decoding the key/seed from a captured sequence. The CPU requirement is higher, but the sequence generated can be infinite. There are problems with resynchronization; this can be alleviated by the possibility of forcing a new seed (which opens a potential security hole), or other methods. Yet another approach is a full challenge-response with shared secret. Again, both ends of comm link have a shared secret. The central computer takes a non-repeating number (eg. the current time), let's call it C as Challenge; sends it to the sensor, and calculates a hash of C and the shared secret S, the result Rc. The sensor calculates a hash of C and S too, and sends it back as result Rs. The computer then compares Rc it calculated on its own with Rs sent from the sensor. If they match, then whoever sent the Rs back either knew the secret S, or managed to capture the communication and tinkered with computer to send a duplicated challenge with a known response (eg. forced the computer to reuse time - beware of using local time instead of GMT and the time of year when daylight savings correction duplicates the time for a hour). Fourth option, out of range of the computing power available to cheap microcontrollers, is using real digital signatures. Can be used when bidirectional communication isn't possible. One-time pad or pseudorandom stream generator could potentially help here as well, if we can cope with their tradeoffs. Fifth option is a variation on challenge-response. Here the sensor generates its own challenge, whether it is a timestamp or a response sequence number or both, and signs it with a hash of the plaintext part of the response with the shared secret. This is good enough for unidirectional communication, but we have to make sure the sensor didn't use the same challenge twice (which can mean both a malfunction or an attack, in both cases it is something worth attention). There are likely many more options. > PS: My luggage was torn but found. :) This was irrelevant for the List, sorry. To clarify the issue: KLM didn't manage to put my bag o' books to the same plane I was on. Annoying but at the end pretty harmless. 10138 From: Greg Horton Date: Sun Nov 14, 2004 7:33pm Subject: Re: White House has ordered new chief to eliminate officers who were disloyal to Bush Sounds like a good start to me. Of course the democrats would never do anything like that. Oops maybe something like travelgate or other slight problems. But nothing like this. Greg 10139 From: Michael Dever Date: Mon Nov 15, 2004 4:52pm Subject: Re: Impedance of a Typical Alarm PIR Cable Run I guess it would be possible to monitor the serial data stream with a 'serial data analyzer' but that sort of kit is not usually available to your average criminal. I don't know if the Ademco commercial systems use any type of encryption (I doubt it) but they do have unique IDs for every device. Yes you are right, the encrypted end of line government systems use varying codes and they are expensive! Regards Mike On 16 Nov 2004, at 09:43, Tech Sec Lab wrote: > > Mike > > The ADEMCO system that uses the serial data stream, would I be right in > saying that it would be possible to monitor the logic on the line and > with a > little bit of trickery identify the heart beat streams. > > Then it would just be a case of replaying them, or does it use an > encrypted > session stream whereby the packet stream differ continously...however > judging that the end device would then need microcontrollers, memory > and a > host of other hardware to operate, driving the cost up to pointless > ranges. > > Interested to hear anyone else's ideas... > > Kind regards > > -Ois > > ************************** > > Message: 3 > Date: Sun, 14 Nov 2004 16:30:36 +1100 > From: Michael Dever > Subject: Re: Impedance of a Typical Alarm PIR Cable Run > > > Jim > > Are you talking about the power wiring or the alarm signaling circuit? > > A typical PIR will operate on 12 VDC and draw approximately 10-20mA. > Whereas, the alarm circuit 'normal' resistance varies depending on the > manufacture. > > For example, ADEMCO (Honeywell) alarm panels typically use an 'end of > line > resistor' of 2.2k ohm or sometimes 10k (typical in Australia). > > Normally, the alarm circuit will be tripped if the resistance changes > by > more than +/- 10% variation. Simple DC based alarm circuits can easily > be > 'spoofed' by applying a voltage equal to the steady state value > (typically > 6V on a 12V system). However, a lot of alarm panels these days > (including > ADEMCO) use a proprietary serial data stream instead of the DC loop. > This > allows individual sensors to be addressed and for multiple sensors to > multiplexed onto the same loop. > > There are even higher security methods of signaling using 'end of line' > modules which are unique to each sensor. These type of systems can use > encryption to further thwart substitution. For example, The Australian > Government extensively uses a type of signaling system between sensors > and > the alarm panel that is encrypted. I think TDRing one of these circuits > would trigger an alarm. Also, I would be concerned about the effects > of TDR > pulses on the electronics at both ends. > > Hope this helps! > Regards > Mike > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Voice: (02) 6254 5337 Email: dca@b... This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 10140 From: kondrak Date: Mon Nov 15, 2004 8:03pm Subject: Re: CIA veterans clash with new chief - Senior officers fear Goss too isolated; resignations mount Just as my sources said. Asscroft, Powell, letsee.. agriculture? and a handfull of others. Good to see, I was seriously disappointed by Ashcroft. At 10:25 11/16/2004, you wrote: >Looks like Colin Powell just resigned this morning. > > ..... Original Message ....... >On Mon, 15 Nov 2004 07:44:54 -0500 "James M. Atkinson" wrote: > > > >[If you do sweeps for the agency, or work at the schoolhouse you should > >dust off your resume, start chatting with recruiters, and begin looking at > >the help wanted ads on Sundays. -jma] > > > > > >CIA veterans clash with new chief > >Senior officers fear Goss too isolated; resignations mount > > > >By Walter Pincus and Dana Priest > >The Washington Post > >Updated: 12:00 a.m. ET Nov. 14, 2004 > > > > > >WASHINGTON - Within the past month, four former deputy directors of > >operations have tried to offer CIA Director Porter J. Goss advice about > >changing the clandestine service without setting off a rebellion, but Goss > >has declined to speak to any of them, said former CIA officials aware of > >the communications. > > > >The four senior officials represent nearly two decades of experience > >leading the Directorate of Operations under both Republican and Democratic > >presidents. The officials were dismayed by the reaction and were concerned > >that Goss has isolated himself from the agency's senior staff, said former > >clandestine service officers aware of the offers. > > > >The senior operations officials "wanted to talk as old colleagues and tell > >him to stop what he was doing the way he was doing it," said a former > >senior official familiar with the effort. > > > >More defections coming? > >Last week, Deputy Director John E. McLaughlin retired after a series of > >confrontations between senior operations officials and Goss's top aide, > >Patrick Murray. Days before, the chief of the clandestine service, Stephen > >R. Kappes, said he would resign rather than carry out Murray's demand to > >fire Kappes's deputy, Michael Sulick, for challenging Murray's authority. > > > >Goss and the White House asked Kappes to delay his decision until Monday, > >but they are actively considering his replacement, several current and > >former CIA officials said. > > > >Kappes, whose accomplishments include persuading Libyan leader Moammar > >Gaddafi to renounce weapons of mass destruction this year, began removing > >personal photos from his office walls yesterday, associates said. > > > >A handful of other senior undercover operations officers have talked > >seriously about resigning, as soon as Monday. > > > >"Each side doesn't understand the other's culture very well," one former > >senior operations officer said. "There is a way to do this elegantly. You > >don't have to humiliate people. You bring in people with really weak > >credentials, and everyone is going to rally around the flag." > > > >Culture clash > >Agency officials have criticized as inexperienced the four former Hill > >staff members Goss brought with him. Goss's first choice for executive > >director ≠ the agency's third-ranking official ≠ withdrew his name after > >The Washington Post reported that he left the agency 20 years ago after > >having been arrested for shoplifting. > > > >Through his CIA spokesman, Goss, a former CIA case officer and chairman of > >the House intelligence committee, declined to comment about these matters. > > > >At his Senate confirmation hearing Sept. 14, Goss said, "There is too much > >management at headquarters," which he said was "too bureaucratic" and had > >"stifled some of the innovation, some of the creativity and, frankly some > >of the risk-taking in the field." > > > >He described one "stroke-of-a-pen fix" that he was considering: > >"Reassurance that people will be supported in the field, building the > >morale, those are more leadership issues." > > > >He also offered a glimpse of his management style. "I believe it takes, > >sometimes, very blunt, strong language" to get changes made. "I don't like > >doing it ≠ I call it tough love ≠ but I think occasionally you have to do > >that." > > > >Goss has adopted a management style that relies heavily on former committee > >staff aides, several of whom are former mid-level CIA employees not well > >regarded within the CIA's Directorate of Operations. Murray, the new chief > >of staff, has been perceived by operations officers as particularly > >disrespectful and mistrustful of career employees. > > > >One former senior DO official agreed yesterday that some changes were > >needed, saying: "Clean the place out if it's needed, but you've got to be > >clever about it." > > > >The disruption comes as the CIA is trying to stay abreast of a worldwide > >terrorist threat from al Qaeda, a growing insurgency in Iraq, the return of > >the Taliban in Afghanistan and congressional proposals to reorganize the > >intelligence agencies. The agency also has been criticized for not > >preventing the Sept. 11, 2001, attacks and not accurately assessing Saddam > >Hussein's ability to produce weapons of mass destruction. > > > >Advice reportedly rebuffed > >The four former deputy directors of operations who have tried to offer Goss > >advice are Thomas Twetten, Jack Downing, Richard F. Stoltz and the recently > >retired James L. Pavitt. > > > >They "wanted to save him from going through" what two other directors, > >Stansfield Turner and John M. Deutch, had experienced when they tried to > >make personnel changes quickly, one former senior official aware of their > >efforts said. > > > >Turner and Deutch served under Democratic presidents. Turner wanted to > >clean house after the Watergate scandal and CIA "dirty tricks" exposed > >during the Church Commission hearings. Deutch sought to change the inbred > >culture of the operations staff after the Iran-contra scandal. > > > >The Directorate of Operations numbers about 5,000 people, including about > >1,000 covert operators overseas, and runs foreign spying, including > >counterterrorism operations. Because its operators engage in undercover > >activities, often on their own, they are a difficult group to manage and > >control. > > > >To win their support, Goss's immediate predecessor, George J. Tenet, met > >with the former directors regularly. He sought advice from them > >individually and started to rebuild the clandestine service, which was cut > >by Deutch after its main adversary, the Soviet Union, dissolved, and before > >terrorism became a central focus. > > > >Although Kappes has not left his job, several people have been approached > >or screened as his replacement. One is the director of the counterterrorism > >center; the other is the station chief in London. Both are undercover and > >may not be identified by name. > > > >Another candidate, according to current and former CIA officials, is > >Richard P. Lawless Jr., a former CIA operations officer who is deputy > >assistant secretary of defense for Asian and Pacific affairs, according to > >a CIA official who asked not to be identified. Lawless served in the agency > >from 1972 to 1987, when he left after running afoul of senior DO officers > >while carrying out secret missions for then-CIA Director William J. Casey. > > > >Lawless then opened a private consulting firm that did business in Asia, > >particularly with Taiwan and South Korea. In a 2002 profile in the Taipei > >Times, Lawless was described as having "long-term ties to President Bush's > >brother, Florida Governor Jeb Bush." The two met shortly after Lawless set > >up his consulting firm and Jeb Bush was Florida's secretary of commerce > >seeking business in Asia. > > > > > > > >------------------------------------------------------------------------- > ---------------------------- > > > >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > >------------------------------------------------------------------------- > ---------------------------- > > > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue > #291 Web: http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > >------------------------------------------------------------------------- > ---------------------------- > > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > >------------------------------------------------------------------------- > ---------------------------- > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > > > >. > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10141 From: kondrak Date: Mon Nov 15, 2004 8:06pm Subject: Re: CIA veterans clash with new chief - Senior officers fear Goss too isolated; resignations mount Theres a group (I hear) of people loyal to the leftists who have interfered with things, and went against giving the right information to embarass the administration. These are the ones they will purge, some with 20 years experience I hear too... you make your bed, you lie in it.. At 07:44 11/15/2004, you wrote: >[If you do sweeps for the agency, or work at the schoolhouse you should >dust off your resume, start chatting with recruiters, and begin looking at >the help wanted ads on Sundays. -jma] > > >CIA veterans clash with new chief >Senior officers fear Goss too isolated; resignations mount > >By Walter Pincus and Dana Priest >The Washington Post >Updated: 12:00 a.m. ET Nov. 14, 2004 > > >WASHINGTON - Within the past month, four former deputy directors of >operations have tried to offer CIA Director Porter J. Goss advice about >changing the clandestine service without setting off a rebellion, but Goss >has declined to speak to any of them, said former CIA officials aware of >the communications. > >The four senior officials represent nearly two decades of experience >leading the Directorate of Operations under both Republican and Democratic >presidents. The officials were dismayed by the reaction and were concerned >that Goss has isolated himself from the agency's senior staff, said former >clandestine service officers aware of the offers. > >The senior operations officials "wanted to talk as old colleagues and tell >him to stop what he was doing the way he was doing it," said a former >senior official familiar with the effort. > >More defections coming? >Last week, Deputy Director John E. McLaughlin retired after a series of >confrontations between senior operations officials and Goss's top aide, >Patrick Murray. Days before, the chief of the clandestine service, Stephen >R. Kappes, said he would resign rather than carry out Murray's demand to >fire Kappes's deputy, Michael Sulick, for challenging Murray's authority. > >Goss and the White House asked Kappes to delay his decision until Monday, >but they are actively considering his replacement, several current and >former CIA officials said. > >Kappes, whose accomplishments include persuading Libyan leader Moammar >Gaddafi to renounce weapons of mass destruction this year, began removing >personal photos from his office walls yesterday, associates said. > >A handful of other senior undercover operations officers have talked >seriously about resigning, as soon as Monday. > >"Each side doesn't understand the other's culture very well," one former >senior operations officer said. "There is a way to do this elegantly. You >don't have to humiliate people. You bring in people with really weak >credentials, and everyone is going to rally around the flag." > >Culture clash >Agency officials have criticized as inexperienced the four former Hill >staff members Goss brought with him. Goss's first choice for executive >director ≠ the agency's third-ranking official ≠ withdrew his name after >The Washington Post reported that he left the agency 20 years ago after >having been arrested for shoplifting. > >Through his CIA spokesman, Goss, a former CIA case officer and chairman of >the House intelligence committee, declined to comment about these matters. > >At his Senate confirmation hearing Sept. 14, Goss said, "There is too much >management at headquarters," which he said was "too bureaucratic" and had >"stifled some of the innovation, some of the creativity and, frankly some >of the risk-taking in the field." > >He described one "stroke-of-a-pen fix" that he was considering: >"Reassurance that people will be supported in the field, building the >morale, those are more leadership issues." > >He also offered a glimpse of his management style. "I believe it takes, >sometimes, very blunt, strong language" to get changes made. "I don't like >doing it ≠ I call it tough love ≠ but I think occasionally you have to do >that." > >Goss has adopted a management style that relies heavily on former committee >staff aides, several of whom are former mid-level CIA employees not well >regarded within the CIA's Directorate of Operations. Murray, the new chief >of staff, has been perceived by operations officers as particularly >disrespectful and mistrustful of career employees. > >One former senior DO official agreed yesterday that some changes were >needed, saying: "Clean the place out if it's needed, but you've got to be >clever about it." > >The disruption comes as the CIA is trying to stay abreast of a worldwide >terrorist threat from al Qaeda, a growing insurgency in Iraq, the return of >the Taliban in Afghanistan and congressional proposals to reorganize the >intelligence agencies. The agency also has been criticized for not >preventing the Sept. 11, 2001, attacks and not accurately assessing Saddam >Hussein's ability to produce weapons of mass destruction. > >Advice reportedly rebuffed >The four former deputy directors of operations who have tried to offer Goss >advice are Thomas Twetten, Jack Downing, Richard F. Stoltz and the recently >retired James L. Pavitt. > >They "wanted to save him from going through" what two other directors, >Stansfield Turner and John M. Deutch, had experienced when they tried to >make personnel changes quickly, one former senior official aware of their >efforts said. > >Turner and Deutch served under Democratic presidents. Turner wanted to >clean house after the Watergate scandal and CIA "dirty tricks" exposed >during the Church Commission hearings. Deutch sought to change the inbred >culture of the operations staff after the Iran-contra scandal. > >The Directorate of Operations numbers about 5,000 people, including about >1,000 covert operators overseas, and runs foreign spying, including >counterterrorism operations. Because its operators engage in undercover >activities, often on their own, they are a difficult group to manage and >control. > >To win their support, Goss's immediate predecessor, George J. Tenet, met >with the former directors regularly. He sought advice from them >individually and started to rebuild the clandestine service, which was cut >by Deutch after its main adversary, the Soviet Union, dissolved, and before >terrorism became a central focus. > >Although Kappes has not left his job, several people have been approached >or screened as his replacement. One is the director of the counterterrorism >center; the other is the station chief in London. Both are undercover and >may not be identified by name. > >Another candidate, according to current and former CIA officials, is >Richard P. Lawless Jr., a former CIA operations officer who is deputy >assistant secretary of defense for Asian and Pacific affairs, according to >a CIA official who asked not to be identified. Lawless served in the agency >from 1972 to 1987, when he left after running afoul of senior DO officers >while carrying out secret missions for then-CIA Director William J. Casey. > >Lawless then opened a private consulting firm that did business in Asia, >particularly with Taiwan and South Korea. In a 2002 profile in the Taipei >Times, Lawless was described as having "long-term ties to President Bush's >brother, Florida Governor Jeb Bush." The two met shortly after Lawless set >up his consulting firm and Jeb Bush was Florida's secretary of commerce >seeking business in Asia. > > > >----------------------------------------------------------------------------------------------------- > > >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >----------------------------------------------------------------------------------------------------- > > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >----------------------------------------------------------------------------------------------------- > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10142 From: kondrak Date: Mon Nov 15, 2004 8:36pm Subject: Re: Impedance of a Typical Alarm PIR Cable Run Roger that James, much like an "antenna tuner", I'd expect. Im familiar with TDR and OTDR. Also the audio detection scheme you mention is well documented. backing up to the wall, is a simple way to get the wall to act as a resonator as well. Is it possible "to' introduce a small audio signal onto the line, and check at the panel to see IF theres a filter that's blocking the audio? I'd guess something low enough in amplitude to avoid skewing the +/- threshold of a semiconductor device, (less than .7v?) Thus by elimination, IF the audio is present, no filter, if no audio, a filter is prob present. Just grasping at straws here, but yes, with the plethora of different signals present, analog and digital, its easy to see why a false trip is so easy. Another idea, for shits and giggles, is it possible to bridge in an audio directional coupler, and see how much power is flowing either way and its waveform? Play a radio in the suspected room, and monitor the same station and see if theres a correlation in waveform change, either digital or analog to the audio from the radio station. As I said, we always "assume" twisted pair to be 600 ohm, but its more likely between 100 ohms and a K ohm in real life, dependant on the fine Chinese craftsmanship of the wire builder. (Cof) At 14:44 11/14/2004, you wrote: >Marc, > >I am trying to determine a range of impedances present on a variety of live >alarm sensor lines so that when I am running a TDR across the lines I can >set up a faster impedance match instead of "tuning up" the line each time I >switch into a different cable. With Time Domain Reflectometry it is >extremely important to have a smooth transition or impedance match between >the final driver in the TDR, the line under test, and the circuit that is >sampling the line. It is undesirable to connect to a line alarm line >without first having a close match as you will introduce a slight spike in >the line that may trip an alarm of that sensor. This is quite important if >you are in the non-alerting stage of the sweep and haven't yet approached >the sound stage. > >Quite a few alarm sensors in the U.S. integrate a microphone into the >system, but in some states it is illegal to have, use, or possess such a >system due to the eavesdropping laws. A few years back there where a number >of lawsuits over the issue, and the companies that were using, and the >companies that installed the systems lost a huge suit. > >The audio transmitters you mention can be done by introducing a microphone >into the sensor housing, or by taping or suspending a small piece of foil >or metalized mylar onto the microwave beam of the sensor. A good example of >this would be a PIR/Microwave sensor that is mounted on the wall of the >office of an executive and is directed towards the window with drapes. The >eavesdropper places a very lightweight piece of foil inside of behind the >drapes. The air in the room slightly moves the foil which causes a very >slight doppler shift in the 10 GHz signal that can be picked up some >distance away from the targeted area. The critical parts of the equation is >that the metallic foil has to be as thin and light as possible (minimal >mass), should be in the main beam (easy enough), and should have sharp, >almost saw tooth edges around the outside. > >The same type of threat exists on the infrared side of the sensor as well, >where a beam of infrared light can be used to carry the intelligence off of >the sound stage and into a repeater location. One of the more dangerous >situations (from a TSCM perspective) is PIR sensors inside a conference >room, or mounted on the walls just outside a conference room. In both cases >a spy can access the sensor for less than 5 minutes and introduce a hostile >device that will be missed by most TSCM equipment. The PIR's can then be >used to bounce the audio signal down the hall or out a window where the >eavesdropper can pick it up. > > In such cases a microphone is introduced into a PIR sensor in the >targeted area (in this case an executive conference room), since all cable >runs for the PIR's in the area are often shared; the audio signal is >present at all other PIR's in the immediate area. The spy simply picks an >office or other area on the same cable run and uses the audio signal to >modulate the IR at some distance away from the targeted area. This threat >can be blended with the microwave motion sensor where the IR receiver >directly modulates the microwave transmitter. Remember that most microwave >motion sensors are looking for a doppler shift, not a slight shift caused >by audio modulating the RF. The spy then picks the last chain on the PIR >wiring and introduces a filter to keep the audio from reaching the alarm >panel where it could cause a false alarm or cause the bugging to be >discovered by a TSCM person. > >But to get back to the issue of the impedance of alarm line... the biggest >annoyance is that you have not only the power supply wire to content >with but also the signalling lines which has to be handled carefully as >the alarm monitor will detect that mischief is afoot if your note careful. >Checking alarms line is also a hassle as there are invariably extra wires >in the cable that are not used for anything, and the sensors are commonly >installed in a shared bus configuration that was very time consuming to >examine. It doesn't help that each of the wires in the cable is at a >difference impedance, and has a different termination on the each end. > >-jma > > > >At 11:44 AM 11/14/2004, mark de Boer wrote: > > > >James, > > > >Here in the Nether lands Alarm systems are sold that have audio circuits > >in them for the Alarm central to"listen in" for alarm verification by a > >company called CIPE. this type of system almost asks for a wire tap routed > >via PSTN. > >this System is not used by quality installers but its out there. > >Do you have simular systems in the states? > > > >Also Ive heard of dual detector /radar PIR's transformed into radar > >transmitters that transmit the audio from the room, It was a reliable > >source (i personally never seen it myself). > > > >Perhaps the best way to check for audio is put the scope on the data bus > >lines and also check the power use in Milli amp for every detector(when > >having access to the specs from the alarm system . > > > >Best regard > > > >Marc > >RRBsecurity > >Netherlands > > > > >----------------------------------------------------------------------------------------------------- > > >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >----------------------------------------------------------------------------------------------------- > > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >----------------------------------------------------------------------------------------------------- > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10143 From: James M. Atkinson Date: Mon Nov 15, 2004 11:17pm Subject: Jobs Section I am considering setting up a section of the website where "full time employment type" job seekers can post , and where potential employers can look, and visa-versa. I would appreciate hearing from list members their thoughts on the subject matter. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10144 From: James M. Atkinson Date: Tue Nov 16, 2004 7:26am Subject: Dutch tapping room not kosher http://www.fnl.nl/ct/archief2002/ct2002-12/aftappen.htm Paul Wouters, Patrick Smits Dutch tapping room not kosher According to anonymous sources within the Dutch intelligence community, all tapping equipment of the Dutch intelligence services and half the tapping equipment of the national police force, is insecure and is leaking information to Israel. How difficult is it to make a back-door in the Dutch Transport of Intercepted IP Traffic[1] system? The discussion focuses on the tapping installations for telephony and internet delivered to the government in the last few years by the Israeli company Verint[2]. This company was called Comverse-Infosys[3] until half a year ago, but was quickly renamed when the FBI started several investigations against it and arrested some of its employees in the US on suspicion of espionage. (See pulled FoxNews stories, Politech, Cryptome or Google). People within the Dutch government got worried too. Especially because they had been warned as early as 1998 about the possible back-doors in the tapping equipment. The ex-ministers of interior ("Binnenlandse Zaken"), Peper and de Vries, could not comment. The minister of Justice at the time, Korthals Altes, was asked to report to parliament in December 2001, where he stated that the security measures meet the required level and that an investigation would be started if this, after all, was not the case. No investigation followed. In april 2002, Kolkert, procecutor in-chief of the Court of Appeals in Den Bosch, demanded clarification in a letter sent to Stein, the state prosecutor ("landelijk officier van justitie") and responsible for interception matters. Stein stated that there are no problems. On august 24 the project leader of the National Interception Organisation ("Landelijk Interceptie Orgaan", LIO) J.Steeg announced that he plans to check the tapping rooms for backdoors. However, when the equipment was bought from the Israelis, it was agreed that no one except Comverse personnel was authorized to touch the systems, according to the insider of the AIVD (formerly BVD), the Dutch intelligence organization that spoke to the EO radioprogram De Ochtenden[4]. Source code would never be available to anyone. Finally, on October 10th, the Council of Chiefs of Police ("raad van hoofdcommisarissen") sent a confidential letter to the vendors of tapping equipment for ISPs and telcos expressing its concern about the situation in the US. All of this came after questions were raised publicly in the trial against Baybasin, co-founder of the Kurd parliament in exile, about the possible leaks in the Dutch tapping room as well as manipulation of the collected evidence[4b]. Baybasin was recently sentenced to life-long imprisonment for his connections to assassinations, kidnappings and heroine transports. His lawyers called in experts to question them about the possibility that Israel had laid hands on information tapped by the Dutch. The lawyers claim that Israeli then forwarded the information to the Turkish secret service[5]. Baybasin recently told the media about the Turkish government's involvement with crime syndicates. c't magazine warned about the blackbox problem in its June 2001 issue[6]. Opentap[7] gave similar warnings on the hacker conference HAL2001[8] in august of 2001 and at the Chaos Computer Club (CCC)[9] in December 2001 with a presentation on lawful interception in the Netherlands[10]. Hebrew as crypto The insiders at the AIVD and the tapping room were interviewed by the radio program of the EO[11]. According to them, the Dutch government and Comverse have a gentlemen's agreement that the Dutch government would get the Comverse systems for a very reduced price and in exchange the Israelis would get full access to all tapped information. The systems still ended up being more expensive than rejected competitors' quotes. The Comverse maintenance contract alone apparently costs more then the installation itself, according to the anonymous sources. Since the leaks seem to be disguised as maintenance, one could say that the Dutch government is actually paying the cost of foreign intelligence against the Dutch state. Israeli Comverse employees apparently show up in the tapping rooms on a very regular basis for maintenance, since no Dutch are allowed to touch the equipment. The radio program further stated that the maintenance is done using their own Hebrew keyboards and language. They leave the tapping rooms with filled MO-discs and no-one from the Dutch government has any idea what the Comverse people are doing. To make things yet worse, Comverse can dial-in to the tapping room equipment at all times. The possible criminal nature of Comverse and their overpricing are not the only problems. A comparison of the Comverse tapping records with billing records of KPN, the largest Dutch telco, shows that 20% of the calls that should be tapped, are not tapped at all. The Dutch government still keeps buying Comverse equipment. On november 26, a day after the EO radio program was broadcasted, three political parties, D'66, GroenLinks and SP asked questions to the government in parliamant. The current minister of interior, Remkens, answered that the chance of the tapping rooms leaking information is small, but not zero. He further claimed that the Comverse employees were given the most strict screening by the Dutch intelligence agency AIVD, and that they are never allowed to work without supervision. Comverse was chosen based on its price-performance results, the minister said. Hacking the system? In an interview with 2Vandaag[12], a daily Dutch television news program, defense specialist and LPF party leader Herben believes that there is enough cryptography know-how available in the Netherlands to hack the systems, if Comverse does not assist in the evaluation process. Apparently, Herben hasn't thought about the intrusion detection system that has undoubtedly been installed in these tapping systems by Comverse. He also seems to forget (as did Remkes) that these systems work in Hebrew. On top of it, proving the inner workings of the machines to be correct and safe is anything but a trivial task. The capacity of the MO-discs and the bandwidth of the dial-up facilities is not enough to copy a lot of Internet traffic or entire telephone conversations. A Comverse employee would have to swap disks so often, that he would have to use the tapping room as a hotel. So, assuming that there is no (illegal) high-speed Internet connection between the tapping room and the Israeli embassy, what the Comvers staff can do at the most on these visits is to copy a list of who talks to whom, and the cryptographic keys that are used to secure the tapping communications. Therefore, the Israelis don't need to copy entire phone conversations or all Internet traffic of a user from within the tapping room, but can simply monitor the encrypted traffic that is sent to the tapping room. Having the cryptographic key to the data, they then decrypt it at their leisure. If any nation has the technical skills and knowledge to pull this off, it is Israel. The experts We explained the situation to two cryptography experts: Niels Provos[13] of the OpenBSD team and author of various crypto software such as Outguess[14], a program to detect steganographic content, and Michael Richardson[15] of the FreeSwan Project, the IPsec implementation of Linux. We posed the hypothesis of the insecure tapping room and asked whether it would be possible for the Israelis to get a hold of our taps. Provos explains that a very important part of strong cryptography is a good random source. Without a proper random generator, or worse, with a intentionally crippled random generator, the resulting ciphertext becomes trivial to break. Even if Comverse would let experts have a look at the source code, if there is one single unknown chip involved with the random generation, such as a hardware accelerator chip, all bets are off. Provos suggests to use only off-the-shelf PC hardware. If you can trust the hardware and you have access to the source code, then it should theoretically be possible to verify the system. This, however, can just not be done without the source code, according to Provos. One possible undetectable scheme could be to use a set of truly random, but pre-calculated keys. Only those who know the pre-calculated set, Comverse in this case, could break the cipher, which would become a sort of one-time pad for Comverse only. Provos also pointed us to the work of Adam Young en Moti Yung, who have written a few papers on what they dubbed, kleptography[16], the art of secretly stealing the cryptographic key from the ciphertext stream itself. Their research showed it is impossible for third parties to detect whether any given ciphertext is secretly leaking key material. An overview of TIIT The Dutch tapping protocol, Transport of Intercepted IP Traffic[1] is used for the communication between the tapping machine at the ISP, and the Dutch government. The suspect who is using the Internet generates IP traffic that is copied by a special sniffer machine, called S1. The S1 then encrypts the traffic with an RC4 (or AES) key supplied (and generated) by the Dutch tapping room, and sends the encrypted traffic to the S2, the ISP's collector machine. The collector sets up an encrypted connection, using SSL or IPsec to the government collector machine, the T2. This will normally happen over the internet itself. The T1 then sends the encrypted information onwards to one more agencies, who all have their own T2 for receiving the encrypted traffic. The T2's have the key to decrypt the gathered data into the original plaintext, as it was captured by the ISP. Both the SSL and IPsec protocol, which are part of the encryption scheme used by the Dutch tapping specification (TIIT), contain parts where one has to "fill" packets with random data. It is impossible to see whether this data is truly random, or contains a secret message. This means that no-one needs to go to the tapping room to fetch the key material. According to Provos, the keys can just be sneaked into the encrypted tap itself. Richardson agrees with this view. There has even been a software implementation of this in the past. The TIS-client implemented this feature as "Government Access to Session Keys method". There are even rumors that the ciphers SHA1 and DSS, both NSA ciphers, leak key information on purpose, with only the NSA knowing how to retrieve it. Richardson claims that it is easy to use weak key material. And there are other dangers as well. Because RC4 is based on XOR, using the same key twice is enough to crack the code. RC4 is used for the inner encryption of user data in the TIIT, since the final AES candidate wasn't known at the time when the protocol was set. But this RC4 encrpytion is packaged in another layer of encryption, SSL or IPsec. That layer needs to be broken as well. Richardson takes IPsec as example. Imagine that we need to leak an RC4 key and an IPsec key. For RC4, only the first 128bits are relevant. For IPsec 3DES is often used, which means another two times 56bits. Each IPsec packet has an IV of 64 bits. This IV is random filling to ensure that there will never be two identical packets encrypted with the same key, a deadly sin in the world of cryptography. So this makes it possible to hide 64bits in each IPsec packet. Theoretically, after two packets you have leaked the RC4 key, and after another two you have the 3DES key too, although Richardson says that if such a scheme is used, it is very likely that the leaking would take place a bit slower, so it can be covered up. For example, the 64 bits can be divided in four parts of 16 bits hidden in the first 20 bits of four IV's. 16 bits of actual key material and four bits to point to the position of those bits in the key. That means that about 16 IPsec packets are needed to leak the entire key. According to Richardson, that would leave plenty of randomness in the IV to make this leakage invisible. Due to the overhead of IPsec and of the TIIT, this means the tapped user needs to cause even less packets for this to happen. In other words, reading a few lines of email or looking at a single webpage, is more then enough to leak all key information. Weis and Lucks showed that the use of the IV isn't even needed, and presented their paper All your keybits...[17] at SANE2002[18] that mathematic proves that blackbox cryptography is fundamentally insecure and that leaking key material cannot be detected in any way. Conclusion Without the cooperation of Comverse, is it not possible to determine whether the Dutch tapping systems contain backdoors or not. Worse, even if Comverse would appear to cooperate, there is no way to detect a possible double-cross. Key information can leak quickly and undetectable and the only way to prevent that is by having full control over both the hardware and the software involved. In mid December, the parliament will discuss the annual report of the AIVD, but it seems unlikely that the public will ever find out what really happened. Remkes only wants to talk about these matters behind closed doors. De Graaf, party leader of D'66, said he finds the risk of possible manipulation of the tapping rooms "pretty serious", but cannot give more public statements, since he was a member of the watchdog commission that oversees the intelligence service AIVD, and therefore has inside sensitive knowledge. Remkes claims he didn't know about the dangers. Apparently, he was the last one that didn't know; Comverse and blackbox cryptography have been under heavy fire for years. Literature [1] http://www.opentap.org/documents/TIIT-v1.0.0.pdf [2] http://www.verintsystems.com/ [3] http://www.cominfosys.com/ [4] http://www.eo.nl/home/html/news.jsp?number=3209417 [4b] http://www.volkskrant.nl/binnenland/8761030113615.html [5] http://www.groene.nl/2002/0225/rz_tappen.html [6] http://www.fnl.nl/ct-nl/archief2001/ct2001-06/ct200106032033.htm [7] http://www.opentap.org/ [8] http://www.hal2001.nl/ [9] http://www.ccc.de/ [10] http://www.opentap.org/ccc/ [11] http://cgi.omroep.nl/cgi-bin/streams?/eo/redactie/radio/r1022511c.rm [12] http://cgi.omroep.nl/cgi-bin/streams?/eo/2vandaag/2vandaag_aftappen.rm [13] http://www.citi.umich.edu/u/provos [14] http://www.outguess.org/ [15] http://www.sandelman.ottawa.on.ca [16] http://home.bip.net/laszlob/cryptoag/kleptography.htm [17] http://www.nluug.nl/events/sane2002/papers/WeisLucksAllYourKeybit.ps [18] http://www.nluug.nl/events/sane2002/ ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10145 From: A Grudko Date: Tue Nov 16, 2004 9:28am Subject: RE: Jobs Section -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] > I am considering setting up a section of the website where "full time employment type" job seekers can post... Sounds like a reasonable idea to me. If you get any openings for a one armed sweeper with own equipment on a Caribbean island, I'm your man (being apolitical I am happy to consider overpaid offers from Cuba).... Andy G JHB --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.796 / Virus Database: 540 - Release Date: 2004/11/13 [Non-text portions of this message have been removed] 10146 From: Tommy W. DeArmond Date: Tue Nov 16, 2004 9:13am Subject: REI's Newsletter (11/15/2004 ) For those interested: Here is a newsletter that Research Electronics International (REI) puts out. They are the company that makes the ORION LP. They have a new piece of gear on the last page. http://www.reiusa.net/downloads/REI_Q4_2004_Newsletter.pdf Tom 10147 From: Lou Novacheck Date: Tue Nov 16, 2004 9:21am Subject: Re: Dutch tapping room not kosher Other than what's listed in the references, anybody know of anything further on this? "James M. Atkinson" wrote: http://www.fnl.nl/ct/archief2002/ct2002-12/aftappen.htm Paul Wouters, Patrick Smits Dutch tapping room not kosher According to anonymous sources within the Dutch intelligence community, all tapping equipment of the Dutch intelligence services and half the tapping equipment of the national police force, is insecure and is leaking information to Israel. How difficult is it to make a back-door in the Dutch Transport of Intercepted IP Traffic[1] system? The discussion focuses on the tapping installations for telephony and internet delivered to the government in the last few years by the Israeli company Verint[2]. This company was called Comverse-Infosys[3] until half a year ago, but was quickly renamed when the FBI started several investigations against it and arrested some of its employees in the US on suspicion of espionage. (See pulled FoxNews stories, Politech, Cryptome or Google). People within the Dutch government got worried too. Especially because they had been warned as early as 1998 about the possible back-doors in the tapping equipment. The ex-ministers of interior ("Binnenlandse Zaken"), Peper and de Vries, could not comment. The minister of Justice at the time, Korthals Altes, was asked to report to parliament in December 2001, where he stated that the security measures meet the required level and that an investigation would be started if this, after all, was not the case. No investigation followed. In april 2002, Kolkert, procecutor in-chief of the Court of Appeals in Den Bosch, demanded clarification in a letter sent to Stein, the state prosecutor ("landelijk officier van justitie") and responsible for interception matters. Stein stated that there are no problems. On august 24 the project leader of the National Interception Organisation ("Landelijk Interceptie Orgaan", LIO) J.Steeg announced that he plans to check the tapping rooms for backdoors. However, when the equipment was bought from the Israelis, it was agreed that no one except Comverse personnel was authorized to touch the systems, according to the insider of the AIVD (formerly BVD), the Dutch intelligence organization that spoke to the EO radioprogram De Ochtenden[4]. Source code would never be available to anyone. Finally, on October 10th, the Council of Chiefs of Police ("raad van hoofdcommisarissen") sent a confidential letter to the vendors of tapping equipment for ISPs and telcos expressing its concern about the situation in the US. All of this came after questions were raised publicly in the trial against Baybasin, co-founder of the Kurd parliament in exile, about the possible leaks in the Dutch tapping room as well as manipulation of the collected evidence[4b]. Baybasin was recently sentenced to life-long imprisonment for his connections to assassinations, kidnappings and heroine transports. His lawyers called in experts to question them about the possibility that Israel had laid hands on information tapped by the Dutch. The lawyers claim that Israeli then forwarded the information to the Turkish secret service[5]. Baybasin recently told the media about the Turkish government's involvement with crime syndicates. c't magazine warned about the blackbox problem in its June 2001 issue[6]. Opentap[7] gave similar warnings on the hacker conference HAL2001[8] in august of 2001 and at the Chaos Computer Club (CCC)[9] in December 2001 with a presentation on lawful interception in the Netherlands[10]. Hebrew as crypto The insiders at the AIVD and the tapping room were interviewed by the radio program of the EO[11]. According to them, the Dutch government and Comverse have a gentlemen's agreement that the Dutch government would get the Comverse systems for a very reduced price and in exchange the Israelis would get full access to all tapped information. The systems still ended up being more expensive than rejected competitors' quotes. The Comverse maintenance contract alone apparently costs more then the installation itself, according to the anonymous sources. Since the leaks seem to be disguised as maintenance, one could say that the Dutch government is actually paying the cost of foreign intelligence against the Dutch state. Israeli Comverse employees apparently show up in the tapping rooms on a very regular basis for maintenance, since no Dutch are allowed to touch the equipment. The radio program further stated that the maintenance is done using their own Hebrew keyboards and language. They leave the tapping rooms with filled MO-discs and no-one from the Dutch government has any idea what the Comverse people are doing. To make things yet worse, Comverse can dial-in to the tapping room equipment at all times. The possible criminal nature of Comverse and their overpricing are not the only problems. A comparison of the Comverse tapping records with billing records of KPN, the largest Dutch telco, shows that 20% of the calls that should be tapped, are not tapped at all. The Dutch government still keeps buying Comverse equipment. On november 26, a day after the EO radio program was broadcasted, three political parties, D'66, GroenLinks and SP asked questions to the government in parliamant. The current minister of interior, Remkens, answered that the chance of the tapping rooms leaking information is small, but not zero. He further claimed that the Comverse employees were given the most strict screening by the Dutch intelligence agency AIVD, and that they are never allowed to work without supervision. Comverse was chosen based on its price-performance results, the minister said. Hacking the system? In an interview with 2Vandaag[12], a daily Dutch television news program, defense specialist and LPF party leader Herben believes that there is enough cryptography know-how available in the Netherlands to hack the systems, if Comverse does not assist in the evaluation process. Apparently, Herben hasn't thought about the intrusion detection system that has undoubtedly been installed in these tapping systems by Comverse. He also seems to forget (as did Remkes) that these systems work in Hebrew. On top of it, proving the inner workings of the machines to be correct and safe is anything but a trivial task. The capacity of the MO-discs and the bandwidth of the dial-up facilities is not enough to copy a lot of Internet traffic or entire telephone conversations. A Comverse employee would have to swap disks so often, that he would have to use the tapping room as a hotel. So, assuming that there is no (illegal) high-speed Internet connection between the tapping room and the Israeli embassy, what the Comvers staff can do at the most on these visits is to copy a list of who talks to whom, and the cryptographic keys that are used to secure the tapping communications. Therefore, the Israelis don't need to copy entire phone conversations or all Internet traffic of a user from within the tapping room, but can simply monitor the encrypted traffic that is sent to the tapping room. Having the cryptographic key to the data, they then decrypt it at their leisure. If any nation has the technical skills and knowledge to pull this off, it is Israel. The experts We explained the situation to two cryptography experts: Niels Provos[13] of the OpenBSD team and author of various crypto software such as Outguess[14], a program to detect steganographic content, and Michael Richardson[15] of the FreeSwan Project, the IPsec implementation of Linux. We posed the hypothesis of the insecure tapping room and asked whether it would be possible for the Israelis to get a hold of our taps. Provos explains that a very important part of strong cryptography is a good random source. Without a proper random generator, or worse, with a intentionally crippled random generator, the resulting ciphertext becomes trivial to break. Even if Comverse would let experts have a look at the source code, if there is one single unknown chip involved with the random generation, such as a hardware accelerator chip, all bets are off. Provos suggests to use only off-the-shelf PC hardware. If you can trust the hardware and you have access to the source code, then it should theoretically be possible to verify the system. This, however, can just not be done without the source code, according to Provos. One possible undetectable scheme could be to use a set of truly random, but pre-calculated keys. Only those who know the pre-calculated set, Comverse in this case, could break the cipher, which would become a sort of one-time pad for Comverse only. Provos also pointed us to the work of Adam Young en Moti Yung, who have written a few papers on what they dubbed, kleptography[16], the art of secretly stealing the cryptographic key from the ciphertext stream itself. Their research showed it is impossible for third parties to detect whether any given ciphertext is secretly leaking key material. An overview of TIIT The Dutch tapping protocol, Transport of Intercepted IP Traffic[1] is used for the communication between the tapping machine at the ISP, and the Dutch government. The suspect who is using the Internet generates IP traffic that is copied by a special sniffer machine, called S1. The S1 then encrypts the traffic with an RC4 (or AES) key supplied (and generated) by the Dutch tapping room, and sends the encrypted traffic to the S2, the ISP's collector machine. The collector sets up an encrypted connection, using SSL or IPsec to the government collector machine, the T2. This will normally happen over the internet itself. The T1 then sends the encrypted information onwards to one more agencies, who all have their own T2 for receiving the encrypted traffic. The T2's have the key to decrypt the gathered data into the original plaintext, as it was captured by the ISP. Both the SSL and IPsec protocol, which are part of the encryption scheme used by the Dutch tapping specification (TIIT), contain parts where one has to "fill" packets with random data. It is impossible to see whether this data is truly random, or contains a secret message. This means that no-one needs to go to the tapping room to fetch the key material. According to Provos, the keys can just be sneaked into the encrypted tap itself. Richardson agrees with this view. There has even been a software implementation of this in the past. The TIS-client implemented this feature as "Government Access to Session Keys method". There are even rumors that the ciphers SHA1 and DSS, both NSA ciphers, leak key information on purpose, with only the NSA knowing how to retrieve it. Richardson claims that it is easy to use weak key material. And there are other dangers as well. Because RC4 is based on XOR, using the same key twice is enough to crack the code. RC4 is used for the inner encryption of user data in the TIIT, since the final AES candidate wasn't known at the time when the protocol was set. But this RC4 encrpytion is packaged in another layer of encryption, SSL or IPsec. That layer needs to be broken as well. Richardson takes IPsec as example. Imagine that we need to leak an RC4 key and an IPsec key. For RC4, only the first 128bits are relevant. For IPsec 3DES is often used, which means another two times 56bits. Each IPsec packet has an IV of 64 bits. This IV is random filling to ensure that there will never be two identical packets encrypted with the same key, a deadly sin in the world of cryptography. So this makes it possible to hide 64bits in each IPsec packet. Theoretically, after two packets you have leaked the RC4 key, and after another two you have the 3DES key too, although Richardson says that if such a scheme is used, it is very likely that the leaking would take place a bit slower, so it can be covered up. For example, the 64 bits can be divided in four parts of 16 bits hidden in the first 20 bits of four IV's. 16 bits of actual key material and four bits to point to the position of those bits in the key. That means that about 16 IPsec packets are needed to leak the entire key. According to Richardson, that would leave plenty of randomness in the IV to make this leakage invisible. Due to the overhead of IPsec and of the TIIT, this means the tapped user needs to cause even less packets for this to happen. In other words, reading a few lines of email or looking at a single webpage, is more then enough to leak all key information. Weis and Lucks showed that the use of the IV isn't even needed, and presented their paper All your keybits...[17] at SANE2002[18] that mathematic proves that blackbox cryptography is fundamentally insecure and that leaking key material cannot be detected in any way. Conclusion Without the cooperation of Comverse, is it not possible to determine whether the Dutch tapping systems contain backdoors or not. Worse, even if Comverse would appear to cooperate, there is no way to detect a possible double-cross. Key information can leak quickly and undetectable and the only way to prevent that is by having full control over both the hardware and the software involved. In mid December, the parliament will discuss the annual report of the AIVD, but it seems unlikely that the public will ever find out what really happened. Remkes only wants to talk about these matters behind closed doors. De Graaf, party leader of D'66, said he finds the risk of possible manipulation of the tapping rooms "pretty serious", but cannot give more public statements, since he was a member of the watchdog commission that oversees the intelligence service AIVD, and therefore has inside sensitive knowledge. Remkes claims he didn't know about the dangers. Apparently, he was the last one that didn't know; Comverse and blackbox cryptography have been under heavy fire for years. Literature [1] http://www.opentap.org/documents/TIIT-v1.0.0.pdf [2] http://www.verintsystems.com/ [3] http://www.cominfosys.com/ [4] http://www.eo.nl/home/html/news.jsp?number=3209417 [4b] http://www.volkskrant.nl/binnenland/8761030113615.html [5] http://www.groene.nl/2002/0225/rz_tappen.html [6] http://www.fnl.nl/ct-nl/archief2001/ct2001-06/ct200106032033.htm [7] http://www.opentap.org/ [8] http://www.hal2001.nl/ [9] http://www.ccc.de/ [10] http://www.opentap.org/ccc/ [11] http://cgi.omroep.nl/cgi-bin/streams?/eo/redactie/radio/r1022511c.rm [12] http://cgi.omroep.nl/cgi-bin/streams?/eo/2vandaag/2vandaag_aftappen.rm [13] http://www.citi.umich.edu/u/provos [14] http://www.outguess.org/ [15] http://www.sandelman.ottawa.on.ca [16] http://home.bip.net/laszlob/cryptoag/kleptography.htm [17] http://www.nluug.nl/events/sane2002/papers/WeisLucksAllYourKeybit.ps [18] http://www.nluug.nl/events/sane2002/ ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com [Non-text portions of this message have been removed] 10148 From: John Young Date: Tue Nov 16, 2004 8:45pm Subject: Re: Dutch tapping room not kosher Here is a 2002 description of the Comverse-Verint interception system: http://www.cryptome.org/verint-spysys.htm 10149 From: James M. Atkinson Date: Tue Nov 16, 2004 6:41pm Subject: Steve Wilson Case - New Home, and just in time for Thanksgiving Dinner Looks like Steve Wilson has made it to his new home in Atlanta just in time to get his Thanksgiving dinner. Curious that they are not listing a Projected Release Date on his record yet, perhaps the government plans to keep him a whole lot longer than expected. http://inmateloc.bop.gov/locatorservlet/gov.bop.inmatelocator.FindInmateHttpServlet?Indiv=1&Index=3&Indiv=1&MiddleName=&Results=10&SearchType=NAME&LastName=Wilson&FirstName=Stephen&Gender=U&Race=U&Age=&DateOfBirth= The facility where he is being held is a high security prison, so his stay there will be a lot rougher then the country club where he was staying for the past six months. He is listed as a significant escape risk, so he will be getting a lot of special attention from his keepers. The facility has a very strong population of The Aryan Brotherhood so they will likely be giving him some special attention as well, and if he tries to get close to them using his biker history he may find those tattoo's he likes to flash to be a significant medical liability. Inmate Register Number : 20444-074 Name : STEPHEN J WILSON Age : 60 Race : WHITE Sex : MALE Projected Release Date : UNKNOWN Location : ATLANTA USP 601 MCDONOUGH BLVD SE ATLANTA , GA 30315 Phone Number : (404)635-5100 ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10150 From: James M. Atkinson Date: Tue Nov 16, 2004 6:59pm Subject: Texas Chili Note: Please take time to read this slowly. If you pay attention to the first two judges, the reaction of the third judge is even better. For those of you who have lived in Texas, you know how true this is. They actually have a chili cook-off about the time Halloween comes around. It takes up a major portion of a parking lot at the San Antonio city park. The notes are from an inexperienced chili taster named Frank, who was visiting from Springfield, IL. Frank: "Recently, I was honored to be selected as a judge at a chili cook-off. The original person called in sick at the last moment and I happened to be standing there at the judge's table asking for directions to the Coors Light truck, when the call came in. I was assured by the other two judges (native Texans) that the chili wouldn't be all that spicy and, besides, they told me I could have free beer during the tasting, so I accepted." Here are the scorecards from the advent: (Frank is Judge #3) Chili # 1 Eddie's Maniac Monster Chili... Judge # 1 -- A little too heavy on the tomato. Amusing kick. Judge # 2 -- Nice, smooth tomato flavor. Very mild. Judge # 3 -- (Frank) What the hell is this stuff?! You could remove dried paint from your driveway. Took me two beers to put out the flames. I hope that's the worst one. These Texans are crazy! Chili # 2 Austin's Afterburner Chili... Judge # 1 -- Smoky, with a hint of pork. Slight jalapeno tang. Judge # 2 -- Exciting BBQ flavor; needs more peppers to be taken seriously. Judge # 3 -- Keep this out of the reach of children. I'm not sure what I'm supposed to taste besides pain. I had to wave off two people who wanted to give me the Heimlich maneuver. They had to rush in more beer when they saw the look on my face. Chili # 3 Ronny's Famous Burn Down the Barn Chili... Judge # 1 -- Excellent firehouse chili. Great kick. Needs more beans. Judge # 2 -- A beanless chili, a bit salty, good use of peppers. Judge # 3 -- Call the EPA. I've located a uranium spill. My nose feels like I have been snorting Drano. Everyone knows the routine by now. Get me more beer before I ignite. Barmaid pounded me on the back, now my backbone is in the front part of my chest. I'm getting pie-eyed from all of the beer... Chili # 4 Dave's Black Magic... Judge # 1 -- Black bean chili with almost no spice. Disappointing. Judge # 2 -- Hint of lime in the black beans. Good side dish for fish, or other mild foods; not much of a chili. Judge # 3 -- I felt something scraping across my tongue, but was unable to taste it. Is it possible to burn out taste buds? Sally, the barmaid, was standing behind me with fresh refills. That 300-lb. woman is starting to look HOT...just like this nuclear waste I'm eating! Is chili an aphrodisiac? Chili # 5 Lisa's Legal Lip Remover... Judge # 1 -- Meaty, strong chili. Cayenne peppers freshly ground, adding considerable kick. Very impressive. Judge # 2 -- Chili using shredded beef, could use more tomato. Must admit the cayenne peppers make a strong statement. Judge # 3 -- My ears are ringing, sweat is pouring off my forehead, and I can no longer focus my eyes. I farted and four people behind me needed paramedics. The contestant seemed offended when I told her that her chili had given me brain damage. Sally saved my tongue from bleeding by pouring beer directly on it from the pitcher. I wonder if I'm burning my lips off. It really pisses me off that the other judges asked me to stop screaming. Screw those rednecks. Chili # 6 Pam's Very Vegetarian Variety... Judge # 1 -- Thin, yet bold vegetarian variety chili. Good balance of spices and peppers. Judge # 2 -- The best yet. Aggressive use of peppers, onions, and garlic. Superb. Judge # 3 -- My intestines are now a straight pipe filled with gaseous, sulphuric flames. I pooped on myself when I farted and I'm worried it will eat through the chair! No one seems inclined to stand behind me except that Sally. Can't feel my lips anymore. I need to wipe my butt with a snow cone. Chili # 7 Carla's Screaming Sensation Chili... Judge # 1 -- A mediocre chili with too much reliance on canned peppers. Judge # 2 -- Ho-hum; tastes as if the chef literally threw in a can of chili peppers at the last moment. **I should take note that I am worried about Judge # 3. He appears to be in a bit of distress, as he is cursing uncontrollably. Judge # 3 -- You could put a grenade in my mouth, pull the pin, and I wouldn't feel a thing. I've lost sight in one eye, and the world sounds like it is made of rushing water. My shirt is covered with chili, which slid unnoticed out of my mouth. My pants are full of lava to match my shirt. At least during the autopsy, they'll know what killed me. I've decided to stop breathing; it's too painful. Screw it; I'm not getting any oxygen anyway. If I need air, I'll just suck it in through the 4-inch hole in my stomach. Chili # 8 Karen's Toenail Curling Chili... Judge # 1 -- The perfect ending, this is a nice blend chili. Not too bold, but spicy enough to declare its existence. Judge # 2 -- This final entry is a good, balanced chili. Neither mild, nor hot. Sorry to see that most of it was lost when Judge # 3 farted, passed out, fell over, and pulled the chili pot down on top of himself. Not sure if he's going to make it. Poor fella, wonder how he'd have reacted to really hot chili? ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10151 From: James M. Atkinson Date: Wed Nov 17, 2004 0:10am Subject: 2 top officials resign in CIA shakeup http://www.mytelus.com/news/article.do?pageID=cbc/world_home&articleID=1767993 Tuesday, Nov 16, 2004 2 top officials resign in CIA shakeup The top two officials at the CIA's undercover unit have resigned in what appears to be a revolt over new management. Stephen Kappes, the deputy director of operations for the intelligence agency, and his deputy, Michael Sulick, submitted their resignations Monday. It's unclear whether the two stepped down voluntarily or were asked to leave. The two men were part of the CIA's directorate of operations, or clandestine service. The directorate handles covert operations worldwide. Only last week the agency lost its number 2 official when deputy director of Central Intelligence John McLaughlin retired, citing personal reasons. "It is very fair to say there is tremendous turmoil in the middle ranks of the clandestine service," said Vince Cannistraro, former CIA counterterrorism chief. Learn how to use eBay Kappes and Sulick have reportedly been at loggerheads with senior advisers of the new CIA director, Porter Goss. ''The legacy that both officers leave behind them is one of dedication to the covert mission of this agency,'' said Goss in a statement released Monday evening. Goss was appointed two months ago with the intention of reforming the agency, under fire for intelligence failures before the attacks against the United States on Sept. 11, 2001, and for providing defective information about Iraq's alleged weapons of mass destruction. Goss was head of the House intelligence committee for eight years and brought four staff members with him. He has warned CIA employees to brace themselves for changes. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10152 From: James M. Atkinson Date: Wed Nov 17, 2004 0:09am Subject: White House to 'Gut' CIA http://www.alternet.org/columnists/story/20515/ White House to 'Gut' CIA By Molly Ivins, AlterNet. Posted November 16, 2004. Purging for disloyalty makes us sick to our stomachs. Whilst the punditry wanders weak and weary in the deep fogs of the "moral values debate," what say we pay some attention to what is going on, eh? According to Newsday, "The White House has ordered the new CIA director, Porter Goss, to purge the agency of officers believed to have been disloyal to President George W. Bush or of leaking damaging information to the media about the conduct of the Iraq war and the hunt for Osama bin Ladin..." Bad Nooz. In the first place, the concept of "purge" has not hitherto played much part in our history, and now is no time to start. Considerable pains have been taken to protect the civil service from partisan pressure for extremely good reasons. "Disloyalty to Bush," or any president, is not the same as disloyalty to the country. In fact, in the intelligence biz, opposing the White House is sometimes the highest form of loyalty to country, since when we fight without good intelligence, we fight blind. I would not have been troubled to learn there was to be a "purge" at the CIA of those responsible for giving bad information to the administration about Iraqi weapons of mass destruction. Even a "purge" of those who caved in under pressure from the White House to confirm the dubious WMD theory might be useful. (George Tenet is already gone.) But that's not what they're fixing to do here. This is not a purge of incompetent officers or of those who have caved under political pressure ≠ this is a political purge of those "disloyal to George W. Bush." That's what I was most afraid of in the next four years: the complete closing of the circle, the old Bush emphasis on loyalty as the first and most important asset, above brains, judgment or expertise. Bush has been making this mistake for years, and it is clear it will now get worse. The clash of ideas is not welcome in his office. He wants everything solved in a one-page memo. This effectively limits him from being exposed to anything but obsequious third-rate thinking. It's precisely how he got into Iraq. One of Bush's personal weaknesses is his tendency to go with his "gut" when both facts and logic are against him. This used to be just an intellectual failing, one that led many who know him to conclude he cannot think very well. It is more alarming to find that those around him are so familiar with the phenomenon that they have now invented a sort of justifying philosophy for it. According to Ron Suskind's much-noted New York Times Magazine article, some White House staffers now refer slightingly to "reality-based" decision-making, as though it were quite inferior to delusional thinking. This bodes poorly. One does not have to be an expert on the CIA to see the problem here. Bureaucracies are peculiarly vulnerable to bullying from the top: Everyone who has ever worked in an office is familiar with the gesture toward the ceiling for "upstairs" to explain some damn fool command from on high. Punishing those who were right is not smart. Michael Scheuer, the former head of the CIA's bin Laden unit, who wrote "Imperial Hubris" as Anonymous, has now resigned. The book is about the Bush team's failure to pursue bin Laden and about the diversion of intelligence and military manpower from the war on Al Qaeda to the war in Iraq. The thesis is dirt common, not a state secret. Another leak involved a report that concluded the likely outcomes in Iraq are all fairly grim and the worst-case is civil war. Since I wrote the very same thing all by my little self before this war even started, without a shred of input from the CIA, this strikes me as a "leak" of the self-evident. It's no secret there is a sort of culture war at the CIA ≠ see "Charlie Wilson's War," among others. The tug-of-styles is between gung-ho risk-taking agents prepared to jump into any harebrained scheme and the more cautious higher-ups, often Ivy Leaguers, who worry about dull stuff like breaking international law and starting World War III. Naturally, we like the gung-ho sort ("Huah!"), but it's not a bad idea to keep some grown-ups in charge. Otherwise, you wind up with stuff like the plot to make Castro's beard fall out or Ollie North taking a cake to Iran. We consistently see this administration trying to solve real policy problems by knocking out dissent, as though dissent itself were the problem. The Bushies always remind me of Cousin Claude, a major political thinker. Claude says: "Hell, yiss, I believe in the right to dissent. H'it's in the Constitution! What I can't stand is all this criticism. Criticize, criticize, criticize. Why don't they leave poor Dubya alone and let him fight his war in peace? "We're sendin' our best boys over there, and you know what them Eye-raqis do? They come out at night. Wearin' dirty robes. Not even Christian. If they don't like what we're doin' for 'em, whyn't they just go back where they come from?" Molly Ivins is a best-selling author and columnist who writes about politics, Texas and other bizarre happenings. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10153 From: A Grudko Date: Wed Nov 17, 2004 0:28am Subject: RE: Wilson Case -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: 17 November 2004 02:42 AM To: TSCM-L Subject: [TSCM-L] Steve Wilson Case - New Home, and just in time for Thanksgiving Dinner > The facility where he is being held is a high security prison, so his stay there will be a lot rougher then the country club where he was staying for the past six months. Inmate Register Number : 20444-074 I wonder if upon his release Mr Wilson will post his CV on jma's 'job-seeker' page. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.796 / Virus Database: 540 - Release Date: 2004/11/13 [Non-text portions of this message have been removed] 10154 From: David Alexander Date: Wed Nov 17, 2004 4:16am Subject: Re: Texas chilli Never mind Andy's desire to get a job in the Caribbean, anyone got a vacancy in Texas ? Gotta have me some of that chilli ! David Alexander Towcester, Northamptonshire, England Competition Co-ordinator - MSA British Drag Racing Championship Founder member, European Top Methanol Racers Association http://home.rednet.co.uk/homepages/dave_ale/dave_ale.html Gone racing, back in 5.4 seconds 10155 From: Loy Chapman Date: Wed Nov 17, 2004 7:00am Subject: RE: Jobs Section Sounds like fun, Andy. If you need an able-bodied assistant (used to do TSCM for US Gov); put me in the game. Larry --- A Grudko wrote: > > -----Original Message----- > From: James M. Atkinson [mailto:jmatk@tscm.com] > > I am considering setting up a section of the > website where "full time > employment type" job seekers can post... > > Sounds like a reasonable idea to me. If you get > any openings for a one > armed sweeper with own equipment on a Caribbean > island, I'm your man (being > apolitical I am happy to consider overpaid offers > from Cuba).... > > Andy G > JHB > > --- > Outgoing mail is certified Virus Free. > Checked by AVG anti-virus system > (http://www.grisoft.com). > Version: 6.0.796 / Virus Database: 540 - Release > Date: 2004/11/13 > > > [Non-text portions of this message have been > removed] > > __________________________________ Do you Yahoo!? The all-new My Yahoo! - Get yours free! http://my.yahoo.com 10156 From: Hawkspirit Date: Wed Nov 17, 2004 11:55am Subject: Polw Camera I certainly would not rely on a pole camera to examine wires in a ceiling of an executive office environment. The only way to handle a dropped tile ceiling is a six foot ladder and go into the ceiling at all points necessary to trace and identify every wire run. No shortcuts. Roger Tolces www.bugsweeps.com Date: Tue, 16 Nov 2004 10:13:53 -0500 From: "Tommy W. DeArmond" Subject: REI's Newsletter (11/15/2004 ) For those interested: Here is a newsletter that Research Electronics International (REI) puts out. They are the company that makes the ORION LP. They have a new piece of gear on the last page. http://www.reiusa.net/downloads/REI_Q4_2004_Newsletter.pdf Tom [Non-text portions of this message have been removed] 10157 From: Cristian Date: Wed Nov 17, 2004 2:07pm Subject: Re: Dutch tapping room not kosher >Other than what's listed in the references, anybody know of anything >further on this? Me. Cristian ---------- --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.786 / Virus Database: 532 - Release Date: 29/10/04 [Non-text portions of this message have been removed] 10158 From: fjansgmxnet Date: Wed Nov 17, 2004 7:20am Subject: Re: Dutch tapping room not kosher What I do not understand: Why is the dutch government not using a plenty of Linux-PCs or some certified routers (with hardware and software accessible to the dutch government) to build a secure VPN tunneling the IP traffic from the suspicious Comverse equipment? Regards, Frank 10159 From: Daryl Adams Date: Wed Nov 17, 2004 8:44am Subject: RE: White House to 'Gut' CIA I've frequently become sick at my stomach, but mostly while reading Molly's tripe. Molly's political affiliation is no mystery here, she, like the rest of the oblivious left has failed to harken the messge that they've heard for the last few years (and still can't hear evidently), and it's led to the poorest representation in government for thier party in a number of years. What Molly fails to understand is that public servents, be they military officers, spooks, cops, etc, should all asspire to be apolotical "at least while on duty" anything less is counterproductive and counterintuitive to governement, operations, our duties and sworm oath. I've yet to read any of the counterproductive activites Molly espouses below in a job description. We at least owe our objective loyalty, it's not passe, not in my book. In Mollys world, everyone yaps, and no one accomplishes anything substantive. I'll continue to read Molly's stuff, for comprehension, and to speed it to the bottom of my birdcage. Rgds. >From: "James M. Atkinson" >Reply-To: TSCM-L@yahoogroups.com >To: TSCM-L >Subject: [TSCM-L] White House to 'Gut' CIA >Date: Wed, 17 Nov 2004 01:09:29 -0500 > > >http://www.alternet.org/columnists/story/20515/ > >White House to 'Gut' CIA >By Molly Ivins, AlterNet. >Posted November 16, 2004. >Purging for disloyalty makes us sick to our stomachs. > > >Whilst the punditry wanders weak and weary in the deep fogs of the "moral >values debate," what say >we pay some attention to what is going on, eh? > > >According to Newsday, "The White House has ordered the new CIA director, >Porter Goss, to purge the >agency of officers believed to have been disloyal to President George W. >Bush or of leaking damaging >information to the media about the conduct of the Iraq war and the hunt for >Osama bin Ladin..." > > >Bad Nooz. In the first place, the concept of "purge" has not hitherto >played much part in our >history, and now is no time to start. Considerable pains have been taken to >protect the civil >service from partisan pressure for extremely good reasons. > > >"Disloyalty to Bush," or any president, is not the same as disloyalty to >the country. In fact, in >the intelligence biz, opposing the White House is sometimes the highest >form of loyalty to country, >since when we fight without good intelligence, we fight blind. > > >I would not have been troubled to learn there was to be a "purge" at the >CIA of those responsible >for giving bad information to the administration about Iraqi weapons of >mass destruction. Even a >"purge" of those who caved in under pressure from the White House to >confirm the dubious WMD theory >might be useful. (George Tenet is already gone.) But that's not what >they're fixing to do here. This >is not a purge of incompetent officers or of those who have caved under >political pressure ≠ this is >a political purge of those "disloyal to George W. Bush." > > >That's what I was most afraid of in the next four years: the complete >closing of the circle, the old >Bush emphasis on loyalty as the first and most important asset, above >brains, judgment or expertise. >Bush has been making this mistake for years, and it is clear it will now >get worse. The clash of >ideas is not welcome in his office. He wants everything solved in a >one-page memo. This effectively >limits him from being exposed to anything but obsequious third-rate >thinking. It's precisely how he >got into Iraq. > > >One of Bush's personal weaknesses is his tendency to go with his "gut" when >both facts and logic are >against him. This used to be just an intellectual failing, one that led >many who know him to >conclude he cannot think very well. > > >It is more alarming to find that those around him are so familiar with the >phenomenon that they have >now invented a sort of justifying philosophy for it. According to Ron >Suskind's much-noted New York >Times Magazine article, some White House staffers now refer slightingly to >"reality-based" >decision-making, as though it were quite inferior to delusional thinking. >This bodes poorly. > > >One does not have to be an expert on the CIA to see the problem here. >Bureaucracies are peculiarly >vulnerable to bullying from the top: Everyone who has ever worked in an >office is familiar with the >gesture toward the ceiling for "upstairs" to explain some damn fool command >from on high. Punishing >those who were right is not smart. > > >Michael Scheuer, the former head of the CIA's bin Laden unit, who wrote >"Imperial Hubris" as >Anonymous, has now resigned. The book is about the Bush team's failure to >pursue bin Laden and about >the diversion of intelligence and military manpower from the war on Al >Qaeda to the war in Iraq. The >thesis is dirt common, not a state secret. > > >Another leak involved a report that concluded the likely outcomes in Iraq >are all fairly grim and >the worst-case is civil war. Since I wrote the very same thing all by my >little self before this war >even started, without a shred of input from the CIA, this strikes me as a >"leak" of the >self-evident. > > >It's no secret there is a sort of culture war at the CIA ≠ see "Charlie >Wilson's War," among others. >The tug-of-styles is between gung-ho risk-taking agents prepared to jump >into any harebrained scheme >and the more cautious higher-ups, often Ivy Leaguers, who worry about dull >stuff like breaking >international law and starting World War III. Naturally, we like the >gung-ho sort ("Huah!"), but >it's not a bad idea to keep some grown-ups in charge. Otherwise, you wind >up with stuff like the >plot to make Castro's beard fall out or Ollie North taking a cake to Iran. > > >We consistently see this administration trying to solve real policy >problems by knocking out >dissent, as though dissent itself were the problem. The Bushies always >remind me of Cousin Claude, a >major political thinker. > > >Claude says: "Hell, yiss, I believe in the right to dissent. H'it's in the >Constitution! What I >can't stand is all this criticism. Criticize, criticize, criticize. Why >don't they leave poor Dubya >alone and let him fight his war in peace? > > >"We're sendin' our best boys over there, and you know what them Eye-raqis >do? They come out at >night. Wearin' dirty robes. Not even Christian. If they don't like what >we're doin' for 'em, whyn't >they just go back where they come from?" > > >Molly Ivins is a best-selling author and columnist who writes about >politics, Texas and other >bizarre happenings. > > > > > > > > >----------------------------------------------------------------------------------------------------- > >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >----------------------------------------------------------------------------------------------------- > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: >http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >----------------------------------------------------------------------------------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >----------------------------------------------------------------------------------------------------- > > > 10160 From: Tommy W. DeArmond Date: Wed Nov 17, 2004 0:43pm Subject: RE: Polw Camera Yeah, I would agree if time wasn't an issue. I would say that it's more of a nice toy to have in the tool box. Have a good one! Tom -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Wednesday, November 17, 2004 12:56 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Polw Camera I certainly would not rely on a pole camera to examine wires in a ceiling of an executive office environment. The only way to handle a dropped tile ceiling is a six foot ladder and go into the ceiling at all points necessary to trace and identify every wire run. No shortcuts. Roger Tolces www.bugsweeps.com Date: Tue, 16 Nov 2004 10:13:53 -0500 From: "Tommy W. DeArmond" Subject: REI's Newsletter (11/15/2004 ) For those interested: Here is a newsletter that Research Electronics International (REI) puts out. They are the company that makes the ORION LP. They have a new piece of gear on the last page. http://www.reiusa.net/downloads/REI_Q4_2004_Newsletter.pdf Tom [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor Get unlimited calls to U.S./Canada _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10161 From: taurii13 Date: Wed Nov 17, 2004 7:18am Subject: Re: Jobs Section I would be very interested, though it should probably include a projects or consulting section as well. I am a sales and marketing exec, and imagine that there may be more interim, short-term projects and single-focus needs vs. full time employment needs. --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > > I am considering setting up a section of the website where "full time > employment type" job seekers can post , and where potential employers can > look, and visa-versa. I would appreciate hearing from list members their > thoughts on the subject matter. > > -jma > > > > > ------------------------------------------------------------------- ---------------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ------------------------------------------------------------------- ---------------------------------- > > James M. Atkinson Phone: (978) 546- 3803 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ------------------------------------------------------------------- ---------------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ------------------------------------------------------------------- ---------------------------------- 10162 From: A.Lizard Date: Wed Nov 17, 2004 5:57pm Subject: re: paper embedable chips At 10:17 AM 11/13/04 +0000, you wrote: >Message: 8 > Date: Fri, 12 Nov 2004 18:36:00 -0800 > From: "Hawkspirit" >Subject: paper embedable chips > > > > Subject: Fwd: mass-producible paper embedable chips > > > >Subject: mass-producible paper embedable chips > > > >http://www.physorg.com/news1917.html > > a key to making cheaper RFID tags, among other things. A.Lizard -- member The Internet Society (ISOC), The HTML Writers Guild. "Feudal societies go broke. These top-heavy crony capitalists of the Enron ilk are nowhere near so good at business as they think they are." Bruce Sterling Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@g... PGP 8.0 key available by request or keyserver. Download PGP from: http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html ***Looking for INTELLIGENT new technology public policy alternatives?*** http://www.ecis.com/~alizard/technology.html 10163 From: A.Lizard Date: Wed Nov 17, 2004 6:10pm Subject: Re: Re: Microphones and internet At 02:11 PM 11/11/04 +0000, you wrote: >Message: 8 > Date: Wed, 10 Nov 2004 14:07:15 -0800 (PST) > From: Jan Vandenbos >Subject: Re: Re: Microphones and internet > > >Lots of comments out there on the web and discussion >in the past on this topic... > >Ie: > >http://www.landfield.com/isn/mail-archive/1999/Apr/0036.html > >First things I'd check (Basic I know, but important) - >also this is all assuming this is windows... (If its >on a unix/Linux variant machine I can send >instructions for that too) I'm interested, and the increasing number of Linux desktops in business and government environments rather suggests that everybody else ought to be, too. ps -A is relatively obvious, what next? A.Lizard -- member The Internet Society (ISOC), The HTML Writers Guild. "Feudal societies go broke. These top-heavy crony capitalists of the Enron ilk are nowhere near so good at business as they think they are." Bruce Sterling Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@g... PGP 8.0 key available by request or keyserver. Download PGP from: http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html ***Looking for INTELLIGENT new technology public policy alternatives?*** http://www.ecis.com/~alizard/technology.html 10164 From: Lou Novacheck Date: Wed Nov 17, 2004 7:07pm Subject: Re: Dutch tapping room not kosher Willing to enlighten us? If so, expound! Cristian wrote: >Other than what's listed in the references, anybody know of anything >further on this? Me. Cristian ---------- --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.786 / Virus Database: 532 - Release Date: 29/10/04 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com [Non-text portions of this message have been removed] From: mpaulsen6 Date: Sun Nov 16, 2003 1:37pm Subject: FS: cisco 3620, cisco 2502, cisco 2514, 10 wyse 2315se These are being pulled from our production network, all in good working order to our knowledge. We're moving from t1's to fiber optic metro ethernet. Sold as is, no warranty expressed/implied. We would highly suggest you purchase a smartnet maintenance agreement on these items once you receive them so if they do have problems, you can receive support on them. Smartnets only cost $100- 200 per year and are worth it. The Wyses are sold as is with power supply, all working to our knowledge. We are moving from ICA to RDP and these don't have RDP installed (optional) 3620 has 1 ser, 4 eth/2aui - $2395.00 S&H is $30.00 We highly recommend you purchase insurance. 2502 has 2 ser 1 t/r - $99.00 S&H is $30.00 We highly recommend you purchase insurance. (This is a steal of a deal if you want to start doing ISP stuff, want to host a small estore via frame relay or if you want to get a cisco router to learn IOS or whatever...at a cheap price. Maybe I'll buy it and use it at my home :) ) 2514 has 2 ser 2 aui - $299.00 S&H is $30.00 We highly recommend you purchase insurance. wyse 2315's - $100 for 10, $15 each. S&H is $10 each or $50 for all. We highly recommend you purchase insurance. I also have a 4000 and a 4500 series that I will be pulling in less than 60 days (hopefully). One has 2 ser, the other is loaded with 4 and both from memory have eth & t/r int's installed. These products contains cryptographic features and are subject to United States and local country laws governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using these products you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return these products immediately. A summary of U.S. laws governing Cisco cryptographic products may be found at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html If you require further assistance please contact Cisco by sending email to export@c.... I will do a format on the flash before ship, you will have to copy the IOS back up and configure it for your use. I will gladly consult for installation of the system into your network if you need help. My rate is $100 flat per hour which is more than reasonable. Prepaid in 10 hour blocks only. I work on weekends and nights only for this sort of work and require 1-2 weeks lead time with clear scopes defined. Cashiers check, money order, wire transfer. All must clear.... I don't take large checks and retransfer the balance back. :) Thanks, Matt 7985 From: Date: Sun Nov 16, 2003 3:07pm Subject: VetoMail message from jordan@u... Hello Important message from jordan@u... I have just installed VetoMail an anti spam filtering tool. VetoMail is free to evaluate for 30 days. More information is available at http://www.vetomail.com Vetomail simply and safely defeats all Spam [junk email] by ONLY allowing me to see email that has been authorised. Your email address TSCM-L@yahoogroups.com has now been auto authorised by me from my address book. However if you send me email from a different email address in future you will receive a message from Vetomail asking you to prove you are a real person and not just a spam sending robot. Should this occur it will only take you a few seconds, but I thought Id notify you now to save confusion in the future. You are receiving this message from jordan@u... a VetoMail customer. VetoMail asks that senders verify their address before email is delivered. Yours is now already authorised. This only needs to do this once per VetoMail protected email address. If you want more information on Vetomail and how it can save you time and money by defeating all the spam you receive please visit the Vetomail website - http://www.vetomail.com Thankyou. [Non-text portions of this message have been removed] 7986 From: mpaulsen6 Date: Mon Nov 17, 2003 8:43pm Subject: Re: Q Crpto Not FUD. Discounting Lov's opinion shouldn't be taken lightly. Here's a viewpoint from someone that works in an industry that needs and is required by federal legislation, just as banks and other institutes are required. It's less hassle to purchase something that costs $50K to $100K of this nature to offset the regulation / litigation costs associated with not purchasing/installing such a solution. Remember, I'm in active conversations to purchase tens to perhaps HUNDREDS of STE's at 5 figure prices because the govt. has decided to institute legal changes to our industry... and we're not the only one out there that's doing it. Now take our company size, and expand it by 70-700x's and you're getting the picture behind why $50-$100K is nothing to spend to offset expected lawsuits at the rate of 2-3 per physician employed, with premiums on insurance averaging $200K per physician. Matt Title: Encryption Promises Unbreakable Codes Source: Seattle Post-Intelligencer Date Written: November 16, 2003 Date Collected: November 17, 2003 Has the holy grail of encryption finally been achieved? A small startup called MagiQ believes it has created an "unbreakable" code. And others agree. "There are really no ways (of) cracking this code," said Lov Grover, a quantum computing researcher at Bell Laboratories who is not involved with MagiQ. MagiQ uses dedicated 19 inch black boxes that generate and read signals over a fiber-optic line. The system, which goes on sale this month, costs between $50,000 and $100,000 and will likely be purchased by banks, insurers, pharmaceutical companies and others who transmit highly sensitive data. Current technology generally relies upon long encryption keys which are considered safe because of the enormous computer processing power it would take to break, however they could theoretically be broken some day as computers increase processing power. The MqgiQ encryption depends upon a series of photons that are "snoop-proof" according to the laws of quantum mechanics. MagiQ is now in! the process of applying for permission to sell its solution overseas. If this product is successful, it will be one of the first to employ quantum physics. In the 1990s, research by Peter Shor demonstrated that a quantum computer could be powerful enough to break any existing encryption scheme except for quantum cryptography. http://seattlepi.nwsource.com/business/aptech_story.asp? category=1700&slug=Unbreakable%20Codes --- In TSCM-L@yahoogroups.com, "mpaulsen6" wrote: > To paraphrase: > http://www.infoworld.com/article/03/10/29/HNquantambreakthrough_1.htm > l > > a system with just 10 qubits could carry out 1,024 operations > simultaneously as though it were a massively parallel processing > system. A 40-qubit system could carry out one trillion simultaneous > operations. A 100-qubit system could carry out one trillion trillion > simultaneous operations. 7987 From: Date: Wed Nov 19, 2003 7:31am Subject: On Star Evesdropping Metropolitan News-Enterprise Ninth Circuit Places Limits on Use of GPS Systems in Vehicles for Government Surveillance Purposes By KENNETH OFGANG, Staff Writer/Appellate Courts The operator of an on-board communication system in a motor vehicle may be compelled to assist law enforcement in monitoring conversations within the vehicle, but only within certain limitations, the Ninth U.S. Circuit Court of Appeals ruled yesterday. A divided panel said a federal judge erred in allowing the FBI to disable the on-board communications system in an automobile in order to facilitate surveillance of the owner. The targets and subject matter of the investigation, conducted the Justice Department‚Äôs Las Vegas Organized Crime Strike Force, were not identified. On-board systems combine cellular telephone and global positioning satellite technology to put subscribers in touch with company staffers at a command center. As Judge Marsha Berzon explained it for the Ninth Circuit, such systems ‚Äú assist drivers in activities from the mundane‚Äîsuch as navigating an unfamiliar neighborhood or finding a nearby Chinese restaurant‚Äîto the more vital‚Äîsuch as responding to emergencies or obtaining roadside assistance.‚Äù The feature at issue in yesterday‚Äôs ruling, the judge went on to say, allows the operator to open a cellular connection to a vehicle and listen to oral communications within the car. When activated at the owner‚Äôs request, this feature enables the operator to communicate with emergency personnel, or to overhear the thieves if the car has been stolen. But the same technology permits eavesdropping, the judge noted, and has thus caught the interest of the FBI, leading to yesterday‚Äôs review of a series of orders by U.S. District Judge Lloyd D. George of the District of Nevada. George approved a series of four 30-day ‚Äúroving‚Äù wiretap orders requiring the system operator to assist in the investigation by permitting the FBI to monitor conversations within the vehicle. The Ninth Circuit declined to identify the system operator, referring cryptically to ‚ÄúThe Company‚Äù throughout the opinion. But its explanation of the system describes the technology placed in about two dozen models of luxury cars by General Motors, and operated by GM‚Äôs OnStar Corp. subsidiary. ‚ÄúThe Company,‚Äù after complying with George‚Äôs first ex parte order, challenged the remaining orders as an unlawful infringement upon its business. After George declined to quash his second order, the company complied with that and the subsequent orders, but challenged them on appeal. Berzon noted that the last order has long-since expired‚Äîthe case was argued in the Ninth Circuit in December of last year‚Äîbut said the case would not be dismissed as moot because similar orders are likely to be issued in the future. The Ninth Circuit panel held that operators of on-board systems come under the wiretap provisions of Title III of the Omnibus Crime Control and Safe Streets Act of 1968, as amended. The act permits ‚Äúduly authorized law enforcement officers‚Äù to engage in electronic surveillance and to obtain court orders requiring the assistance of a ‚Äú provider of wire or electronic communication service, landlord, custodian, or other person...to accomplish the interception unobtrusively and with a minimum of interference with the services‚Äù being provided to the target of the surveillance. Berzon agreed with the district judge that the operator of an on-board system is a ‚Äúprovider‚Äù of a communications service, and is the type of entity whose assistance Congress intended to require. But the orders granted by George went too far, Berzon wrote, because they permit more than ‚Äúa minimum amount of interference‚Äù with the company‚Äôs service. The appellate jurist explained: ‚ÄúIn this case, FBI surveillance completely disabled the monitored car‚Äôs System. The only function that worked in some form was the emergency button or aut omatic emergency response signal. These emergency features, however, were severely hampered by the surveillance: Pressing the emergency button and activation of the car‚Äôs airbags, instead of automatically contacting the Company, would simply emit a tone over the already open phone line. No one at the Company was likely to be monitoring the call at such a time, as the call was transferred to the FBI once received.‚Äù Since the FBI is prohibited by Title III from listening in on conversations unrelated to its investigation, Berzon elaborated, an emergency call would likely have gone unheeded. Besides, she wrote, ‚Äúthe FBI, however well-intentioned, is not in the business of providing emergency road services, and might well have better things to do when listening in than respond with such services to the electronic signal sent over the line.‚Äù Berzon explained in a footnote that even if it is possible for the operator to design a system in such a way that surveillance may be conducted without disabling other services, there is nothing in the Omnibus act that requires it to do so. Senior Judge John T. Noonan concurred in the opinion, but Judge Richard Tallman dissented. The majority, Tallman argued, erred in defining ‚Äúminimum amount of interference‚Äù by creating ‚Äúan absolute threshold instead of a relative standard.‚Äù Since there was no actual interference with services, and no showing that any lesser intrusion by the government could have met the legitimate needs of law enforcement, George‚Äôs orders should have been upheld. Copyright 2003, Metropolitan News Company [Non-text portions of this message have been removed] 7988 From: Hawkspirit Date: Wed Nov 19, 2003 8:33pm Subject: Digital Forensic Group http://www.protexintl.com/ Digital Forensic Group This is the web site for Daniel Libby, an investigator associate of mine who specializes in Digital Forensics. He is securing all our companies computers and many of my other clients. Any questions feel free to send him an e-mail. Roger Tolces Electronic Security www.bugsweeps.com 7989 From: Hawkspirit Date: Wed Nov 19, 2003 9:16pm Subject: New Historical Sweep Articles Here are some remarkable historical bug sweep articles from fifty years ago. It was by pure luck that I was able to obtain these articles to preserve them on the Internet. Here are actual pictures of Bernard Spindels' electronics kit. Awesome! Enjoy, Roger Who Else is Listening? An Expert Wiretapper Talks About His Trade - by Bernard B. Spindel with Bill Davidson - Collier's, June 10, 1955 http://www.bugsweeps.com/info/colliers_6-10-55.html Who Else is Listening? How to Stop Wiretapping - by Bernard B. Spindel with Bill Davidson - Collier's, June 24, 1955 http://www.bugsweeps.com/info/colliers_6-24-55.html 7990 From: Jordan Ulery Date: Thu Nov 20, 2003 7:21am Subject: TSCM REQUEST Date: Tue, 18 Nov 2003 12:33:06 -0500 From: "R.A. Chaty" Subject: TSCM Services We need a referral for a proven TSCM service to perform a sweep in SE Ohio. If you respond for your own service, please provide average cost and TAT. Thanks, Richard Chaty President The RISC Group P.O. Box 11023 Charleston, WV 25339-1023 304.746.0876 Fax: 304.746.0877 Email: riscompany@h... www.resourceintelligence.com "Government is like a baby. An alimentary canel with a big appetite at one end and no sense of responsibilty at the other"-- Ronald Reagan [Non-text portions of this message have been removed] 7991 From: Date: Sun Nov 23, 2003 11:03am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7992 From: Date: Sun Nov 23, 2003 11:03am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7993 From: Jordan Ulery Date: Sun Nov 23, 2003 2:04pm Subject: Request for Suggestions I have a client undergoing a "not nice" divorce situation. 2 kids, he is living with his girlfriend, openly, he is the breadwinner and is trying to make his soon to be ex look crazy so as 'not have to pay nothing.' In the past he has quoted verbatim what my client has told her attorney over the phone in the house. Verizon did some work several months ago (just a service technician) and disconnected some wiring that was "extraneous to the telephone operation and not apparently necessary for dial-up connections." The connections that Verizon showed my client are no longer present. Now the stream of data continues to the husband. Methinks that there is a rather sophisticated system on the computer using the telephones as receivers and the computer as the recorder. Computer was purchased with joint funds. Client and husband both have equal access to the computer Client has key to usually locked computer room. Husband is a computer geek professionally. My question is what to advise the client? I have suggested a total TSCM sweep, but she isn't rich any more since the husband left. Any suggestions would be appreciated. I was considering doing an Encase recovery of the hard drive. Your New Hampshire Connection Jordan G. Ulery Secretary NHLI: Member LPDAM; NAIS; IOA Licensed in NH & MA New Hampshire Notary Public www.ulrichinvestigations.com jordan@u... Outgoing Mail Scanned by Norton Anti-Virus CONFIDENTIALITY WARNING This Email contains information that is confidential, proprietary or otherwise protected and is for the addressee only It is protected by federal law. This message may contain privileged material and may not be shared, distributed or forwarded to any person or entity not the intended recipient. If you are not the intended receiver, return this message immediately. This message is the property of the sender alone. Attempts to intercept this message are in violation of 25 U.S.C. 2511. "Government is like a baby. An alimentary canal with a big appetite at one end and no sense of responsibility at the other"-- Ronald Reagan [Non-text portions of this message have been removed] 7994 From: Shawn Hughes Date: Sun Nov 23, 2003 5:38pm Subject: Re: client advice At 03:04 PM 11/23/03 , you wrote: > From: "Jordan Ulery" >Subject: Request for Suggestions > > >Now the stream of data continues to the husband. Methinks that there is a >rather sophisticated system on the computer using the telephones as >receivers and the computer as the recorder. Absolutely possible, most likely a software solution that records and sends whatever it hears on the phone line via modem to a 'throwdown' email account. >My question is what to advise the client? I have suggested a total TSCM >sweep, but she isn't rich any more since the husband left. Tell her to not use the house for confidential communications, buy a pay-as-you-go cell phone and talk outside until she can get somebody to go over the house with a fine - toothed comb. There's waaaay too many things that he could have done. He had unmonitored access to the place far in advance, and could have emplaced any number of intercept platforms. >Any suggestions would be appreciated. I was considering doing an Encase >recovery of the hard drive. EnCase is a good idea, if you have the resources to donate to her. Shawn Hughes Lead Instructor, Tactical Response, Inc. www.warriormindset.com 7995 From: Andre Holmes <1ach@g...> Date: Mon Nov 24, 2003 0:14am Subject: Re: Request for Suggestions Hello Jordan 1. Sounds like a DSL connection is in play. She can do a cross reference check with Verizon repair to see if she has been hooked up for DSL. 2. Go to network connections and disable all connections thats not Dial-up. 3. unplug the mic 4. In control panel uncheck all sound devices and lower all volumes. 5. In run menu type Direct X Dianostic Tool , on the Input block click and look for footprint of extra modem and write down the name look for at least 1 modem. 6.Cross check the modem name in Device manager on the modem icon. People Direct X is a very good tool that we all have on our systems that contains alot of detailed information about your computer its a good tool for research of problems as well. 7. Can also do a full system restore and uninstall the OS and reinstall it that way any thing attached might pop up and ask the computer operator if its ok to install. All the best Andre Holmes Neptune Enterprise Security 1ach@G... USA ----- Original Message ----- From: "Jordan Ulery" To: "TSCM" Sent: Sunday, November 23, 2003 3:04 PM Subject: [TSCM-L] Request for Suggestions > I have a client undergoing a "not nice" divorce situation. 2 kids, he is living with his girlfriend, openly, he is the breadwinner and is trying to make his soon to be ex look crazy so as 'not have to pay nothing.' > > In the past he has quoted verbatim what my client has told her attorney over the phone in the house. Verizon did some work several months ago (just a service technician) and disconnected some wiring that was "extraneous to the telephone operation and not apparently necessary for dial-up connections." The connections that Verizon showed my client are no longer present. > > Now the stream of data continues to the husband. Methinks that there is a rather sophisticated system on the computer using the telephones as receivers and the computer as the recorder. > > Computer was purchased with joint funds. > Client and husband both have equal access to the computer > Client has key to usually locked computer room. > Husband is a computer geek professionally. > > My question is what to advise the client? I have suggested a total TSCM sweep, but she isn't rich any more since the husband left. > > Any suggestions would be appreciated. I was considering doing an Encase recovery of the hard drive. > Your New Hampshire Connection > Jordan G. Ulery > Secretary NHLI: Member LPDAM; NAIS; IOA > Licensed in NH & MA > New Hampshire Notary Public > www.ulrichinvestigations.com > jordan@u... > Outgoing Mail Scanned by Norton Anti-Virus > CONFIDENTIALITY WARNING > This Email contains information that is confidential, proprietary or otherwise protected and is for the addressee only It is protected by federal law. > This message may contain privileged material and may not be shared, distributed or forwarded to any person or entity not the intended recipient. > If you are not the intended receiver, return this message immediately. > This message is the property of the sender alone. > Attempts to intercept this message are in violation of 25 U.S.C. 2511. > > > "Government is like a baby. An alimentary canal with a big appetite at one > end and no sense of responsibility at the other"-- Ronald Reagan > > > > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 7996 From: Steve Uhrig Date: Mon Nov 24, 2003 10:36pm Subject: Preventing document knockoffs http://www.verifyfirst.com Interesting range of products intended to prevent illicit copying of documents. One product is paper which cannot be photocopied. Another is envelopes which will attract powder (chemical or biological contamination) to the clear window to draw attention to potentially harmful letters. Good reference info to pass along to your clients as part of their overall security package. Check their DNA-impregnated paper. Clever stuff. Well established. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7997 From: John Kennedy Date: Tue Nov 25, 2003 8:29pm Subject: Re: Request for suggestions >Now the stream of data continues to the husband. Methinks that there is a >rather sophisticated system on the computer using the telephones as >receivers and the computer as the recorder. Given the possibility of audio going to data file by way of the sound card, have the client pick up the phone, call time/weather, or whatever, then do a search for files modified in the past 1 day. Sort by modification time, and see if something was just created in the last minute. Same approach is useful against keystroke loggers. -- John Kennedy johnk@s... Second Source, Inc. Annapolis, MD USA 7998 From: mpaulsen6 Date: Wed Nov 26, 2003 3:20am Subject: Re: Request for Suggestions Sounds like a trojan.. 27374 port activity? A few more suggestions. Install antivirus software from symantec and client firewall software, and hardware firewall part # befsr41 www.pricegrabber.com - search it. #5 - DXDIAG.EXE is utility. type that in run... Pull sound card from system, and disable pc speaker wires. Disable sound card in bios if sound is integrated with mobo. (f2, f10 or other key at cold boot) If the guy is a pc geek find out what specifically. There's a big difference between a programmer and network engineer. I'd be more suspicious of network / server / desktop engineers vs. programmers. --- In TSCM-L@yahoogroups.com, "Andre Holmes" <1ach@g...> wrote: > Hello Jordan > 1. Sounds like a DSL connection is in play. She can do a cross reference > check with Verizon repair to see if she has been hooked up for DSL. > > 2. Go to network connections and disable all connections thats not Dial-up. > > 3. unplug the mic > > 4. In control panel uncheck all sound devices and lower all volumes. > > 5. In run menu type Direct X Dianostic Tool , on the Input block click and > look for footprint of extra modem and write down the name look for at least > 1 modem. > > 6.Cross check the modem name in Device manager on the modem icon. > > People Direct X is a very good tool that we all have on our systems that > contains alot of detailed information about your computer its a good tool > for research of problems as well. > > 7. Can also do a full system restore and uninstall the OS and reinstall it > that way any thing attached might pop up and ask the computer operator if > its ok to install. > > All the best Andre Holmes > Neptune Enterprise Security > 1ach@G... USA > > > > ----- Original Message ----- > From: "Jordan Ulery" > To: "TSCM" > Sent: Sunday, November 23, 2003 3:04 PM > Subject: [TSCM-L] Request for Suggestions > > > > I have a client undergoing a "not nice" divorce situation. 2 kids, he is > living with his girlfriend, openly, he is the breadwinner and is trying to > make his soon to be ex look crazy so as 'not have to pay nothing.' > > > > In the past he has quoted verbatim what my client has told her attorney > over the phone in the house. Verizon did some work several months ago (just > a service technician) and disconnected some wiring that was "extraneous to > the telephone operation and not apparently necessary for dial-up > connections." The connections that Verizon showed my client are no longer > present. > > > > Now the stream of data continues to the husband. Methinks that there is a > rather sophisticated system on the computer using the telephones as > receivers and the computer as the recorder. > > > > Computer was purchased with joint funds. > > Client and husband both have equal access to the computer > > Client has key to usually locked computer room. > > Husband is a computer geek professionally. > > > > My question is what to advise the client? I have suggested a total TSCM > sweep, but she isn't rich any more since the husband left. > > > > Any suggestions would be appreciated. I was considering doing an Encase > recovery of the hard drive. > > Your New Hampshire Connection > > Jordan G. Ulery > > Secretary NHLI: Member LPDAM; NAIS; IOA > > Licensed in NH & MA > > New Hampshire Notary Public > > www.ulrichinvestigations.com > > jordan@u... > > Outgoing Mail Scanned by Norton Anti-Virus > > CONFIDENTIALITY WARNING > > This Email contains information that is confidential, proprietary or > otherwise protected and is for the addressee only It is protected by > federal law. > > This message may contain privileged material and may not be shared, > distributed or forwarded to any person or entity not the intended recipient. > > If you are not the intended receiver, return this message immediately. > > This message is the property of the sender alone. > > Attempts to intercept this message are in violation of 25 U.S.C. 2511. > > > > > > "Government is like a baby. An alimentary canal with a big appetite > at one > > end and no sense of responsibility at the other"-- Ronald Reagan > > > > > > > > > > > > [Non-text portions of this message have been removed] > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 7999 From: mpaulsen6 Date: Wed Nov 26, 2003 3:39am Subject: Re: Digital Forensic Group Roger, From level of difficulty and return on investment for 'security' for your computers... I suggest these... Their all pretty easy to do but cost for equipment is across the board. I use most if not all of this daily and it's easy to use and doesn't hinder 'laymen' productivity if put in professionally. In fact, you may not even know it's there. 1st, I prefer fingerprint scanners first to auth the user - people share passwords and fobs and pins. But it's harder to give someone your thumb. 2nd, group/user pki 1024bit up auth/session - admins only know group passwords, end users are members of groups in RADIUS/TACACS. 3rd, wireline protocol encryption systems, RSA, etc. built in - sometimes use RDC for example under VPN to terminal to a location to login using IPX on Novell which is encrypted. Go ahead, sniff the wire, junk... in junk... in junk... what fun. 4th, on the fly PGP crypto / sftp with private key exchanges. I like to load unix subsystems onto win2k servers, it's... quaint. (and drives unix folks batty which is why it's fun) 5th, 2ndary crypto password secured volumes locked and loaded (not a gun) inside crypto file systems. ie: twofish/blowfish volumes on ntfs encryption enabled drives. Since you're securing your systems, get a benchmark done against NSA level 2 to see what else you have to do. --- In TSCM-L@yahoogroups.com, Hawkspirit wrote: > http://www.protexintl.com/ > > Digital Forensic Group > > > This is the web site for Daniel Libby, an investigator associate of mine > who specializes in Digital Forensics. He is securing all our companies > computers and many of my other clients. Any questions feel free to send him > an e-mail. > Roger Tolces > Electronic Security > www.bugsweeps.com 8000 From: Paolo Sfriso Date: Wed Nov 26, 2003 7:45am Subject: REI Broadband (2-12GHz) Microwave Probe for CPM-700 Dear Listmembers. I have recently found out about the new REI (art. BMP-1200) Broadband Microwave (2-12 GHz) probe for the CPM-700 (see: http://www.research-electronics.com/downloads/Summer2003Newsletter.pdf ). What do you think about it ? Is it worth the 1.675$ sale price ? Kind Regards. Your Italian Connection. Paolo Sfriso CFE Director Gruppo S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY Phone +39 0422 828517 Fax +39 0422 823224 24hr GSM Cell +39 335 5257308 www.grupposit.com paulsfriso@t... info@g... [Non-text portions of this message have been removed] 8001 From: Date: Wed Nov 26, 2003 3:23am Subject: FBI Probes Videotaping of Jackson on Jet FBI Probes Videotaping of Jackson on Jet Agents seize tapes from Santa Monica charter firm. Judge temporarily bars the company from showing, distributing or selling them. By Andrew Blankstein and Richard Winton Times Staff Writers November 26, 2003 Federal authorities initiated a criminal investigation Tuesday into a Santa Monica jet company to determine whether any laws were broken when Michael Jackson and his attorneys were secretly videotaped last week on a private flight from Las Vegas to Santa Barbara, where the entertainer returned to face child molestation charges. FBI agents, armed with subpoenas, seized videotapes from the offices of XtraJet as a state judge granted Jackson's attorneys a temporary restraining order that forbids the company from selling, distributing or showing the videos taken during the Nov. 21 flight until at least a December hearing. Meanwhile, Mark Geragos, Jackson's attorney, vowed to come "down like a hammer" on anyone who sought to spread falsehoods about the singer. He said the molestation allegations that were the basis for the singer's arrest were motivated by money. "Michael Jackson is not going to be abused. Michael Jackson is not going to be slammed. He is not going to be a piÒata for every person who has financial motives," Geragos said. "If anyone does not think based upon what has happened s o far the true motivation of these charges and these allegations is anything but money and the seeking of money, then they are living in their own Neverland." In addition to securing a temporary restraining order, Jackson and Geragos filed an invasion-of-privacy lawsuit against XtraJet, alleging that the videotapes were made without their knowledge, using concealed video equipment. They said company officials sought to sell the tapes of the "attorney-client privilege" meeting on the plane for a six-figure sum to media outlets. Attorneys for Jackson allege that the taping, both with sound and video, violates California criminal statutes that require that all parties consent to any recording. "Throughout the flight, plaintiffs were conducting confidential and privileged attorney-client communications," their brief said. "Defendants now seek to profit from the surreptitious recording by peddling it to the highest bidder." XtraJet officials did not return calls for comment Tuesday. A day earlier, company officials disputed charges that they tried to create a bidding war for the video, saying instead that they were seeking advice from network news officials in confidential meetings about their legal and business options regarding the tapes. Company officials said they allowed reporters to view the videotapes in an effort to rebut news reports that Jackson had acted erratically on the flight or had asked to flee. Jeffrey Borer, an XtraJet corporate officer, told The Times that several news outlets had expressed interest in buying the tapes but were told that they were not available. He said his firm had explored selling the tapes "as any businessperson would." XtraJet officials Monday said they were investigating to determine who placed the cameras in the plane. XtraJet, under the temporary restraining order issued by Los Angeles Superior Court Judge David Yaffe on Tuesday, is barred from physically altering the plane pending a December hearing. FBI spokesman Matthew McLaughlin said its Los Angeles division is investigating to determine whether the videotaping violated any federal law. Though McLaughlin declined further comment, a source close to the investigat ion said the FBI is attempting to see if the tapes violate a law governing the interception and disclosure of wire, voice or electronic surveillance. On Tuesday morning, the FBI seized tapes after two agents served a subpoena on the Santa Monica Airport offices of the charter jet service that ferried Jackson and others on the day that he surrendered to authorities and was booked. In a legal declaration, Geragos said he was alerted to the existence of the videos Monday afternoon after receiving calls from news outlets, some of which had seen footage showing his conversations with his client. Geragos then placed a call to an XtraJet attorney. Geragos said the attorney acknowledged that a videotaping device had been covertly installed in the cabin of the plane and had recorded the interior of the cabin, but that he refused to turn over the tapes. Meanwhile, Santa Barbara County prosecutors announced that they were delaying the filing of molestation charges against Jackson until the week of Dec. 15. The singer is free on $3-million bail pending a January court appearance. Dist. Atty. Thomas W. Sneddon Jr. in a statement said the delay was to allow for the creation of a Web site on which court-related information in the case would be posted. An attorney who a decade ago secured a settlement of at least $15 million for a 13-year-old boy who alleged that he was molested by the singer is involved in the current case, sources close to the investigation said. Those sources said the mother of the boy that Jackson is alleged to have molested last winter approached Los Angeles attorney Larry Feldman in March after she became concerned that the singer had been giving wine to her cancer-stricken son, who had first asked to meet his idol. At that point she was not aware of any alleged molestation, the source said. But as the boy told of his friendship with Jackson in bits and pieces, Feldman concluded that the boy needed to talk to a therapist, who in June reported alleged sexual abuse by Jackson to police, the source said. Times staff writers Greg Krikorian and Elizabeth Jensen contributed to this story. [Non-text portions of this message have been removed] 8002 From: James M. Atkinson Date: Wed Nov 26, 2003 2:57pm Subject: Re: FBI Probes Videotaping of Jackson on Jet Airlines, and more particularly small charter airlines routinely videotape the cabin areas for security reason.. especially since 9/11. Also, celebrities and the groupies commonly trash the interiors of the cabins, shoot dope, snort coke, tear up the upholstery, etc, etc. SO it is prudent for the airline to document this when the customer claim that they are not responsible for the damage. Now, if Jackson and his attorney were foolish enough to have their "very private" discussion where both of them knew that a video camera was present then shame on them both. IMHO, his attorney should be severely sanctioned as he did not take due care to ensure the privacy of his client, and even more strongly sanctioned for filing a frivolous action. Note all the puffering, and saber rattling at the press conference; typical of an attorney when standing on thin ice. The only touchy point is wether the recordings have an audio track, and the juristicon issue relative to 18 USC 2510. If the bureau does in fact pursue it as a criminal action then they are showing favoritism to Jackson as they normal ignore this kind of thing, and sweep it under the rug (as any TSCM person knows). I have little doubt that the airline actually had a placard displayed to inform passengers that for security purposes the cabin would be subject to video and audio recording, which is very common. It should be interesting to see how it all pans out. -jma At 09:23 AM 11/26/2003, MACCFound@a... wrote: >FBI Probes Videotaping of Jackson on Jet > >Agents seize tapes from Santa Monica charter firm. Judge temporarily bars the >company from showing, distributing or selling them. > >By Andrew Blankstein and Richard Winton >Times Staff Writers > >November 26, 2003 > >Federal authorities initiated a criminal investigation Tuesday into a Santa >Monica jet company to determine whether any laws were broken when Michael >Jackson and his attorneys were secretly videotaped last week on a private >flight >from Las Vegas to Santa Barbara, where the entertainer returned to face child >molestation charges. > >FBI agents, armed with subpoenas, seized videotapes from the offices of >XtraJet as a state judge granted Jackson's attorneys a temporary >restraining order >that forbids the company from selling, distributing or showing the videos >taken during the Nov. 21 flight until at least a December hearing. > >Meanwhile, Mark Geragos, Jackson's attorney, vowed to come "down like a >hammer" on anyone who sought to spread falsehoods about the singer. He >said the >molestation allegations that were the basis for the singer's arrest were >motivated by money. > >"Michael Jackson is not going to be abused. Michael Jackson is not going to >be slammed. He is not going to be a piÒata for every person who has financial >motives," Geragos said. "If anyone does not think based upon what has >happened s >o far the true motivation of these charges and these allegations is anything >but money and the seeking of money, then they are living in their own >Neverland." > >In addition to securing a temporary restraining order, Jackson and Geragos >filed an invasion-of-privacy lawsuit against XtraJet, alleging that the >videotapes were made without their knowledge, using concealed video >equipment. They >said company officials sought to sell the tapes of the "attorney-client >privilege" meeting on the plane for a six-figure sum to media outlets. > >Attorneys for Jackson allege that the taping, both with sound and video, >violates California criminal statutes that require that all parties >consent to any >recording. > >"Throughout the flight, plaintiffs were conducting confidential and >privileged attorney-client communications," their brief said. "Defendants >now seek to >profit from the surreptitious recording by peddling it to the highest bidder." > >XtraJet officials did not return calls for comment Tuesday. A day earlier, >company officials disputed charges that they tried to create a bidding war >for >the video, saying instead that they were seeking advice from network news >officials in confidential meetings about their legal and business options >regarding >the tapes. > >Company officials said they allowed reporters to view the videotapes in an >effort to rebut news reports that Jackson had acted erratically on the >flight or >had asked to flee. Jeffrey Borer, an XtraJet corporate officer, told The >Times that several news outlets had expressed interest in buying the tapes >but >were told that they were not available. He said his firm had explored >selling the >tapes "as any businessperson would." XtraJet officials Monday said they were >investigating to determine who placed the cameras in the plane. > >XtraJet, under the temporary restraining order issued by Los Angeles Superior >Court Judge David Yaffe on Tuesday, is barred from physically altering the >plane pending a December hearing. > >FBI spokesman Matthew McLaughlin said its Los Angeles division is >investigating to determine whether the videotaping violated any federal law. > >Though McLaughlin declined further comment, a source close to the investigat >ion said the FBI is attempting to see if the tapes violate a law governing >the >interception and disclosure of wire, voice or electronic surveillance. On >Tuesday morning, the FBI seized tapes after two agents served a subpoena >on the >Santa Monica Airport offices of the charter jet service that ferried >Jackson and >others on the day that he surrendered to authorities and was booked. > >In a legal declaration, Geragos said he was alerted to the existence of the >videos Monday afternoon after receiving calls from news outlets, some of >which >had seen footage showing his conversations with his client. > >Geragos then placed a call to an XtraJet attorney. Geragos said the attorney >acknowledged that a videotaping device had been covertly installed in the >cabin of the plane and had recorded the interior of the cabin, but that he >refused >to turn over the tapes. > >Meanwhile, Santa Barbara County prosecutors announced that they were delaying >the filing of molestation charges against Jackson until the week of Dec. 15. >The singer is free on $3-million bail pending a January court appearance. >Dist. Atty. Thomas W. Sneddon Jr. in a statement said the delay was to >allow for >the creation of a Web site on which court-related information in the case >would >be posted. > >An attorney who a decade ago secured a settlement of at least $15 million for >a 13-year-old boy who alleged that he was molested by the singer is involved >in the current case, sources close to the investigation said. > >Those sources said the mother of the boy that Jackson is alleged to have >molested last winter approached Los Angeles attorney Larry Feldman in >March after >she became concerned that the singer had been giving wine to her >cancer-stricken son, who had first asked to meet his idol. > >At that point she was not aware of any alleged molestation, the source said. >But as the boy told of his friendship with Jackson in bits and pieces, >Feldman >concluded that the boy needed to talk to a therapist, who in June reported >alleged sexual abuse by Jackson to police, the source said. > >Times staff writers Greg Krikorian and Elizabeth Jensen contributed to this >story. > > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 8003 From: James M. Atkinson Date: Wed Nov 26, 2003 5:36pm Subject: Massive Security Breach at National Security Agency Headquarters Ha... now that I have your attention; I would like to wish everybody on the list a very Happy Thanksgiving, and wish all of the best for you, your family, your friends, and your community. Warmest Regards, -jma 8004 From: Date: Mon Nov 10, 2003 6:28am Subject: Dave DEMTEC re Paris Show I hope to attend the Minipol Exhibition in Paris 18th to 21st November Public and Industrial Security www.milipol.com Anybody else thinking of attending let me know with a view to meeting up for a chat and a cup of tea [beer is ok too but not American beer I cannot tell the difference] Best Regards Dave DEMTEC David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Counter Measures Specialist Ormskirk UK 01695 558544 07866206112 demtec@a... The manufacture and installation of custom made covert electronic audio and video devices SWEEP Services - Professional physical and electronic counter measures Note: any Private Investigator welcome to phone or call in to discuss projects and applications. Workshop located alongside the M58 junc 3 [Non-text portions of this message have been removed] 8005 From: Does it matter Date: Mon Nov 10, 2003 4:29pm Subject: More on Pellicano Saw this on Catherine Crier Live Ernie Rizzo? (a PI) from Chicago says he pulled lots of wire taps off with Pellicano including a wire tap from Kelly Lebrock to Steven Segal and Michael Jackson and another person. 8006 From: David Colton Date: Mon Nov 10, 2003 9:18pm Subject: Re: Re: Q Crypto Agree that PR comparisons re brute force as barometer unhelpful. Also agree that pedestrian infosec weaknesses ample enough to keep folks up and scared late at night. Regarding quantum approaches, DoD is funding numerous quantum cryptography experiments as part of its $20.6 million quantum information initiative at DARPA. Here, Magiq is offering (a) still limited distance point-to-point fiber-based; and (b) key-distribution-only systems. Regardless of conceptual attractiveness, doesn't scale yet to enterprise-level needs, let alone satellites, etc. False positive ratio (sensors reporting photon interception) still way too high. Another quantum approach that may be more cost effective is the PadLock Data Encryption Engine. Uses random electrical noise on a chip as its source of randomness ('entropy'), to securely produce random number values. Logic within the processor core collects entropy from this physical process, pre-processes the data, and then queues up to 32 bytes for immediate access by the processor. The point in collecting the data from physical sources this way -- output is more unpredictable and has the benefit of not being influenced by outside sources. And partitioning enables scaling of multiple applications to safely share the random number generator. David ----- Original Message ----- From: Steve Uhrig To: tscm-l@yahoogroups.com Sent: Monday, November 10, 2003 9:27 PM Subject: [TSCM-L] Re: Q Crypto On 7 Nov 2003 at 13:50, Ocean Group wrote: > So what do you think folks....is it the end of the line for comms > eavesdroppers.....? When it comes to security, most people, including government agencies, are far more talk than action. People don't take the most basic steps towards physical security to protect their facilities. What would encourage them to invest heavily in this highly specialized, extremely expensive niche when they won't bother with the basics? Do the threats justify something like this, even if it actually is as wonderful as described? > Why are the NSA not bricking it? Because I suspect its not that > impenetrable.... I believe people underestimate NSA. They may enjoy challenges over their coffee break. Crossword puzzle today, break the latest crypto effort tomorrow. > It uses a combination of quantum cryptography and traditional > cryptography to provide a virtual private network (VPN) running over > fiber-optic cable that's designed to be completely secure against all > eavesdroppers. The last is an awful dangerous statement. Completely secure against all eavesdroppers? There are a lot of really competent eavesdroppers out there, many using techniques most will never hear of. And I tend to discount hyperbole claims of magic when sprinkled with a lot of impressive sounding buzzwords. But crypto is not my field, so I do not speak with any level of authority. > If an eavesdropper such as the National Security Agency, the FBI, or a > criminal enterprise ever managed to find a much faster way to factor > large numbers, the Internet's current security model would be > vulnerable. See statement above about underestimating NSA. I doubt there's much now which is not 'vulnerable'. And I believe anyone who relies on pablum like PGP probably is not fooling many other than themselves. > Magiq's device is designed to solve that theoretical problem by tapping > into the weird and counterintuitive laws of quantum physics, which say > that it is impossible to eavesdrop on a transmission without disturbing > it. The above statement, absent further qualifications, is untrue and any professional would consider it absurd. > Magiq's Gelfond said he's offering "two flavors" of quantum encryption > products. "Navajo is the commercial device, really meant for > enterprise customers, which depending on the features, is $50,000 to > $100,000 a box," Gelfond said. "Qbox is just a research device, a lab > device, an open system that's completely configurable and does not do > any encryption." Selling for $40,000 to $50,000, a Qbox uses a quantum > link only for key distribution, and customers may add their own > encryption. STEs are cheaper than this. Sure sounds more like a corporate press release to me, seeking investors, than a news item. But I could be wrong. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 8007 From: mooty_7 Date: Tue Nov 11, 2003 6:21pm Subject: More on the Dcom RPC exploit, Aka: Blaster worm I loaded the patch on a disk from a clean box...but when i try to run it on the infected box the count down starts at 1 minute which is not enough time for the disk to read and load the patch..any ideas..i would like to avoid blowing away the os and starting over, 8008 From: Thomas Shaddack Date: Mon Nov 10, 2003 10:05pm Subject: Re: Re: Q Crypto On Mon, 10 Nov 2003, Steve Uhrig wrote: > People don't take the most basic steps towards physical security to > protect their facilities. What would encourage them to invest heavily > in this highly specialized, extremely expensive niche when they won't > bother with the basics? Marketing. Gee-whiz factor of obscure new technology. Shiny new toy to brag about. PR device ("hey shareholders, don't look at the unlocked main gate, please pay attention to our new Quantum Security Device we just purchased so you may *feel* more secure..."). > Do the threats justify something like this, even if it actually is as > wonderful as described? Maybe. Not sure about it. The technology is IMHO in way too early stage of development anyway. > > Why are the NSA not bricking it? Because I suspect its not that > > impenetrable.... Or because they are aware that the physics behind it is well-known, so it's just matter of time until the market will be flooded with cheap Taiwanese knock-offs. Restrictions on crypto weaken "us" while they don't affect "them" much. Besides, next to nobody uses it correctly anyway; Schneier's parable about bank vault door mounted on a tent comes to mind. > I believe people underestimate NSA. They may enjoy challenges over > their coffee break. Crossword puzzle today, break the latest crypto > effort tomorrow. They are very bright and very powerful. But their capacities aren't unlimited, and not even they can change the laws of physics. > > It uses a combination of quantum cryptography and traditional > > cryptography to provide a virtual private network (VPN) running over > > fiber-optic cable that's designed to be completely secure against all > > eavesdroppers. > > The last is an awful dangerous statement. Completely secure against > all eavesdroppers? There are a lot of really competent eavesdroppers > out there, many using techniques most will never hear of. > > And I tend to discount hyperbole claims of magic when sprinkled with > a lot of impressive sounding buzzwords. It's actually somehow possible here. Contemporary symmetrical ciphers are pretty difficult to crack, making their preceding key exchange algorithms (RSA, Diffie-Hellman...) a comparatively soft target. Quantum key exchange is aimed to solve this potential weakness. I found a good-looking explanation here: http://en2.wikipedia.org/wiki/Quantum_cryptography There are more of them on the Net but I am too sleepy now :( > But crypto is not my field, so I do not speak with any level of > authority. To make the matter more complicated, crypto gets intertwined here with quantum physics. The principle of quantum key exchange lies in the inevitability of changing of a photon's state by observing it (don't ask me how it works, my quantum-fu isn't good enough yet, but a friend physicist said the theory is sound). To further complicate things, there are two areas (known to me) in quantum cryptography; one is quantum computing, potentially useful for eg. attacking RSA (if I remember well, it doesn't offer so much advantage against symmetrical ciphers, don't ask me why), and the other - like this one - is aimed to ensure secure communication links, impossible to wiretap without detection. In order to maintain the havoc and confusion, some journalists often mix the two up. I don't want to look as an expert here, though - all my related qualification is some brush with more esoteric parts of physics (almost a decade back), some admin-level playing with PKI and SSL, and Schneier's "Practical Cryptography" (excellent book, written from the implementation point of view, almost no math) I am about halfway through now. > > If an eavesdropper such as the National Security Agency, the FBI, or a > > criminal enterprise ever managed to find a much faster way to factor > > large numbers, the Internet's current security model would be > > vulnerable. Maybe it is. But if it is, then in most cases it won't be used against any but the highest profile adversaries, as the very knowledge it is broken has way too high strategical value. For now... > See statement above about underestimating NSA. > > I doubt there's much now which is not 'vulnerable'. I believe that for most practical purposes a well-implemented cryptography makes attack on the data en-route impractical, even if theoretically possible, and shifts the most vulnerable point to the communication endpoints, where the attack attempt is more likely to be detected. The time of supercomputers is very very expensive. A good old way of planting a pinhole camera into the smoke sensor on the ceiling over the keyboard, installing a keylogger into the computer, or other physical security exploit used for key recovery, may be much more effective for dealing with encrypted data. > And I believe anyone who relies on pablum like PGP probably is not > fooling many other than themselves. Why should PGP (or preferably GPG) be considered insecure? Presuming the physical key management is done well and the machine and the machine room aren't compromised? Is there a more secure alternative? What one and why is it better? > > Magiq's device is designed to solve that theoretical problem by tapping > > into the weird and counterintuitive laws of quantum physics, which say > > that it is impossible to eavesdrop on a transmission without disturbing > > it. > > The above statement, absent further qualifications, is untrue and any > professional would consider it absurd. It's quite heavily popular-science sounding statement, but from what I know about wuantum physics, it may be pretty well true. It's impossible to observe something without changing it. In macroscopic world we call the "reality" it's usually not big enough change to be observable. In quantum physics scale it pretty well may be. This is why it is so counterintuitive and tricky to understand. > > Magiq's Gelfond said he's offering "two flavors" of quantum encryption > > products. "Navajo is the commercial device, really meant for > > enterprise customers, which depending on the features, is $50,000 to > > $100,000 a box," Gelfond said. "Qbox is just a research device, a lab > > device, an open system that's completely configurable and does not do > > any encryption." Selling for $40,000 to $50,000, a Qbox uses a quantum > > link only for key distribution, and customers may add their own > > encryption. > > STEs are cheaper than this. STEs are "conventional" technology. > Sure sounds more like a corporate press release to me, seeking > investors, than a news item. May be; there is a big gap between theoretical background and real implementation. The devil will be in the latter here; the physics itself sounds promising. > But I could be wrong. Me too... 8009 From: Thomas Shaddack Date: Thu Nov 13, 2003 5:16pm Subject: Sweep-friendly bug-unfriendly design? Certain locations, eg. some kinds of offices or cars of certain people, are known to be at risk even before built/designed. This knowledge, proactively exploited, could be potentially turned into an advantage. Are there any guidelines how to build a house, design/modify a car, or furnish an office to make subsequent sweeps and physical inspections as easy as reasonably possible? How would an ideal sweep-friendly car/office look? What to do, what to avoid? How suitable is this kind of approach? 8010 From: Date: Thu Nov 13, 2003 9:24pm Subject: Milipol Exhibition Paris Anybody attending the Exhibition in Paris please let me know perhaps we can meet up I will be there on the 19th Nov Regards To All Dave DEMTEC UK Lancs TSCM [Non-text portions of this message have been removed] 8011 From: Mr. G.Hord Date: Wed Nov 19, 2003 11:53am Subject: Eavesdropping-proof phone hits market Title: Eavesdropping-proof phone hits market Source: Silicon.com Date Written: November 18, 2003 Date Collected: November 18, 2003 German company Cryptophone, a unit of GSMK, has released a mobile handset which includes encryption technology, aimed at business executives looking to protect their conversations from eavesdroppers. Law enforcement in several European countries are concerned that criminals will also use the phone, hampering police investigations. Police in the Netherlands are especially concerned as one of the world's most active phone tappers, listening in on over 12,000 phone numbers each year. Cryptophone says that, unlike its rivals, it has no connections to national security and defense organizations, and has provided no backdoors for government agencies. Simon Davies of Privacy International defends the Cryptophone as "tremendous step forward" against surveillance. Amsterdam-based NAH6 publishes the source code for the encryption, opening it to public inspection. The phones, Microsoft-based XDA handhelds, are priced at Ä3,499 for a set of two. Cryptophone requires customer credentials! for a criminal background check before selling the phones http://www.silicon.com/0,39024729,39116952,00.htm Savanted1© Mr. Garrett Hord Innovations At The Speed Of A ThoughtÆ ~~~~~~~~~~~~~~~~~==============~~~~~~~~~~~~~~~~~~~ This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. --------------------------------- Do you Yahoo!? Protect your identity with Yahoo! Mail AddressGuard [Non-text portions of this message have been removed] 8012 From: Mr. G.Hord Date: Thu Nov 20, 2003 3:53pm Subject: Wiretapping of CDMA Phone Calls Possible The chairman and chief executive of Qualcomm Inc., a U.S. wireless technology giant that developed and holds various licenses for code division multiple access (CDMA) technology for mobile telecommunications, admitted the technological possibility of wiretapping phone calls made via CDMA mobile systems. See the following for more information below: http://times.hankooki.com/lpage/biz/200311/kt2003111918034011860.htm Savanted1© Mr. Garrett Hord Innovations At The Speed Of A ThoughtÆ ~~~~~~~~~~~~~~~~~==============~~~~~~~~~~~~~~~~~~~ This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. --------------------------------- Do you Yahoo!? Free Pop-Up Blocker - Get it now [Non-text portions of this message have been removed] 8013 From: mooty_7 Date: Fri Nov 21, 2003 7:26am Subject: tscm referral needed for sw Arkansas I am in need of a referral for a quality person or company to perform a full scale sweep of a multi building farm in Nevada county Arkansas. this will be a on going biweekly need for the 6 to 9 months. please include references and services provided. SERIOUS, EXPIERENCED, PROFESSIONALS ONLY PLEASE... thanks Wes Mooty vp. Stephens Timber Management Inc. 2001 Shumate Dr LITTLE ROCK , ARK 72212 501-247-6405 501-224-3151 FAX mooty@a... From: James M. Atkinson Date: Sun Nov 17, 2002 0:35pm Subject: GOD VS. SATAN GOD VS. SATAN And God populated the earth with broccoli and cauliflower and spinach and green and yellow vegetables of all kinds, so Man and Woman would live long and healthy lives. And Satan created McDonald's. And McDonald's brought forth the 99-cent double-cheeseburger. And Satan said to Man, "You want fries with that?" And Man said, "Super size them." And Man gained pounds. And God created the healthful yogurt, that woman might keep her figure that man found so fair. And Satan froze the yogurt, and he brought forth chocolate, nuts and brightly colored sprinkle candy to put on the yogurt. And woman gained pounds. And God said, "Try my crispy fresh salad." And Satan brought forth creamy dressings, bacon bits, and shredded cheese. And there was ice cream for dessert. And woman gained pounds. And God said, "I have sent your heart healthy vegetables and olive oil with which to cook them." And Satan brought forth chicken-fried steak from Cracker Barrel so big it needed its own platter. And Man gained pounds, and his bad cholesterol went through the roof. And God brought forth running shoes, and Man resolved to lose those extra pounds. And Satan brought forth cable TV with remote control so Man would not have to toil to change channels between ESPN and ESPN2. And Man gained pounds. And God said, "You're running up the score, Devil." And God brought forth the potato, a vegetable naturally low in fat and brimming with nutrition. And Satan peeled off the healthful skin and sliced the starchy center into chips and deep-fat fried them. And he created sour cream dip also. And Man clutched his remote control and ate the potato chips swaddled in cholesterol. And Satan saw and said, "It is good." And Man went into cardiac arrest. And God sighed, and created quadruple bypass surgery, angioplasties, and stints. And Satan created HMOs... -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6544 From: James M. Atkinson Date: Sun Nov 17, 2002 0:43pm Subject: Dog Pet Peeves About Humans Dog Pet Peeves About Humans 1. When you run away in the middle of a perfectly good leg humping. 2. Blaming your farts on me... not funny... not funny at all. 3. Yelling at me for barking... I'M A FRIGGIN' DOG, YOU IDIOT!! 4. How you naively believe that the stupid cat isn't all over everything while you're gone. (Have you noticed that your toothbrush tastes a little like cat butt?) 5. Taking me for a walk, then not letting me check stuff out. Exactly whose walk is this anyway? 6. Any trick that involves balancing food on my nose... STOP IT! 7. Yelling at me for rubbing my ass on your carpet. Why else did you buy carpet? 8. Getting upset when I sniff the crotches of your guests. Sorry, but I haven't quite mastered that handshake thing yet. 9. How you act disgusted when I lick myself. Look, we both know the truth...you're just jealous. 10. Dog Sweaters. Have you noticed the fur, imbecile? 11. Any haircut that involves bows or ribbons. Now you know why we chew up your stuff when you're not home. 12. When you pick up the crap piles in the yard. Do you realize how far behind schedule that puts me? 13. Taking me to the vet for "the big snip", then acting surprised when I freak out every time we go back. 14. The sleight-of-hand, fake fetch throw. You fooled a dog! What a proud moment for the top of the food chain, you nitwit. 15. Invisible fences. Why do you insist on screwing with us? To my knowledge, dogdom hasn't yet solved the visible fence problem!! -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6545 From: frost_bitten_ca Date: Sun Nov 17, 2002 0:24pm Subject: Russia, Canada, the US and the perfect naval weapon ... Canada worked with U.S. to get Russian torpedo: report Click Here For... Related Videos Related Video How Canada tried to buy lethal weapons 2:14 CTV News Staff Arms dealers hired by Ottawa have told CTV News that Canada's quest to obtain the technology behind the state-of-the-art Russian Squall torpedo was funded by the American Navy. As well they say, the effort was part of a U.S. project to build defence systems to counter the rocket-propelled Squall -- which can reach speeds of 400 kph. Canada had reportedly been trying to buy Squalls from a defence plant in the former Soviet republic of Kyrgyzstan. "We had indicated some time ago that we wanted to buy a quantity of them for research and testing purposes," says Defence Minister Art Eggleton. "I can only say that it was a purchase that was proposed by Canada." The arms dealers were close to landing the torpedoes for Canada last year, but the deal fell through. Shortly afterwards, Russian secret police arrested and charged former U.S. naval intelligence officer Edmond Pope for spying. He was accused of seeking information on the Squall. Pope was sentenced to 20 years in prison. But he only served eight months because he was pardoned by Russian President Vladimir Putin. Pope has now written a book proclaiming his innocence, and outlining how arms dealers informed him he was mistakenly tied to a Western alliance plot to buy the Squall. "Their words are that Canada was playing a partnership role with the U.S. and possibly Great Britain to procure or be the procurement source," says Pope. One former Canadian intelligence officer says he wouldn't be surprised if Canada and the U.S. worked together on the Squall project. "The two countries are constantly sharing intelligence -- daily, hourly, sometimes by the minute," offers Mike Frost, a former intelligence officer. Canada does admit it is still trying to acquire Squall technology -- with or without the help of Pope. http://www.ctv.ca/servlet/ArticleNews/story/CTVNews/1025061129694_2047 0329//#video 6546 From: Date: Mon Nov 18, 2002 6:13am Subject: Justice Dept. Wins Wiretap Ruling Justice Dept. Wins Wiretap Ruling By CURT ANDERSON .c The Associated Press WASHINGTON (AP) - The Justice Department has broad discretion in the use of wiretaps and other surveillance techniques to track suspected terrorists and spies, a federal appeals court panel ruled Monday. In a 56-page opinion overturning a May decision by the ultra-secret Foreign Intelligence Surveillance Court, the three-judge panel said the expanded wiretap guidelines sought by Attorney General John Ashcroft under the new USA Patriot Act law do not violate the Constitution. The special panel from the U.S. Circuit Court of Appeals for the District of Columbia ordered the lower court to issue a new ruling giving the government the powers it seeks. The American Civil Liberties Union and several other groups had argued that Ashcroft's proposed guidelines would unfairly restrict free speech and due process protections by giving the government far greater ability to listen to telephone conversations and read e-mail. ``No one is questioning the government's authority to prosecute spies and terrorists,'' said Ann Beeson, litigation director of the ACLU's technology and liberty program. ``But we do not need to waive the Constitution to do so.'' It's unclear whether the ACLU or other groups will appeal the case to the Supreme Court. The intelligence court is charged with overseeing sensitive law enforcement surveillance by the U.S. government. It's May ruling was the first-ever substantial defeat for the government on a surveillance issue. The Justice Department had argued that the spy court had ``wholly exceeded'' its authority and that Congress clearly approved of the greater surveillance authority when it passed the Patriot Act a month after the Sept. 11 terror attacks. The changes permit wiretaps when collecting information about foreign spies or terrorists is ``a significant purpose,'' rather than ``the purpose,'' of an investigation. Critics at the time said they feared the government might use the change as a loophole to employ espionage wiretaps in common criminal investigations. The spy court had concluded that Ashcroft's proposed rules under that law were ``not reasonably designed'' to safeguard the privacy of Americans. But the three-judge panel overturned that, saying the new law's provisions on surveillance ``certainly come close'' to meeting minimal constitutional standards regarding searches and seizures. The government's proposed use of the Patriot Act, the judges concluded, ``is constitutional because the surveillances it authorizes are reasonable.'' 11/18/02 12:08 EST [Non-text portions of this message have been removed] 6547 From: A.Lizard Date: Sun Nov 17, 2002 10:39pm Subject: re: The boom-boom is here...from Asia Times At 03:10 PM 11/16/02 +0000, you wrote: here's what Asia Times had to say about the article being a hoax: (also from the Open Sources Intelligence mailing list OSINT-L) Message: 1 Date: Fri, 15 Nov 2002 11:06:14 -0800 From: "Moray Pickering" Subject: Al-Jazeera interview a hoax This from the front page of the Asia Times' website:- THE BIG HOAX - WE FELL FOR IT Asia Times Online uploaded an article in this space entitled Apocalypse Now, or Alottanukes soon. The article has been withdrawn as it was based on the transcript of an interview that now appears to have been a hoax. We sincerely apologise to readers who were alarmed by the contents of the article. We thank those readers who pointed us to this page in antivirus.about.com, which, we would add, does not appear in a Google search for the name "Usuquf" or "Asuquf". We'd also like to point out that we did warn readers at the top of the article that "the identity of the man [al-Usuquf] has not been confirmed, nor has his membership within al-Qaeda". http://antivirus.about.com/library/hoaxes/bljazeera.htm Just a little bit about the world http://bitabout.blogspot.com ===================================== I checked things further with the author of the article cited in Asia Times, she said that the article shows internal evidence of being a hoax, and she followed up with verifying where possible with the alleged sources. Other than that... the article claimed "500 first-rank operatives" defined as being established in the US over 10 years ago with homes, families, etc. Think about how much this would cost in terms of money and organizational support. A.Lizard >Message: 7 > Date: Thu, 14 Nov 2002 21:57:54 -0500 > From: kondrak >Subject: The boom-boom is here...from Asia Times > > > >Worth a read, even IF it's a hoax. Asia times is pretty reputable. Scary > >stuff... > > > > > >http://www.atimes.com/atimes/Front_Page/DK15Aa01.html > > > >Apocalypse Now, or Alottanukes Soon > >By Pepe Escobar > > > >At a time when a tape handed over to the Qatar-based Al-Jazeera television > >station has received widespread expose for its purported comments by Osama > >bin Laden in praise of recent terror events around the world, another > >al-Qaeda message released to the same station has received little coverage. ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "They who would give up an essential liberty for temporary security, deserve neither liberty or security." Benjamin Franklin Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... PGP 7.0.3 key available by request,keyserver,or on my Web site Download PGP from http://www.pgpi.org for e-mail privacy. PGPfone v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ Disaster prep info: http://www.ecis.com/~alizard/y2k.html ************************************************************************ 6548 From: Date: Mon Nov 18, 2002 4:00pm Subject: Home Camera Sweeper ... does it perform like any of the stuff you guys use? Hi, The link below is for a camera detector. Does it perform like any of the stuff you guys use? http://www.technoscout.com/general/product/product.asp? product=1854&Prod_Name=Camera_Detector&site=87002 6549 From: Jeremy Funk Date: Mon Nov 18, 2002 5:00pm Subject: Remote monitoring question Hello, I have a lot of respect and admiration for everyone on this group and I hope that no one feels that my question is beneath them! I have a customer who owns a video arcade and needs remote camera surveillance access from his home. I have used a remote video transmission system from ATV Research (RSM-1600) before to accomplish this task. The boxes communicated via a dedicated phone line. That was several years ago. Is their a better way to go here? And- if anyone knows of a complete cameras + transmission system that works well let me know. Thank you for your time. Jeremy Funk PM, Ohio Cabling 6550 From: Steve Uhrig Date: Mon Nov 18, 2002 10:51pm Subject: Re: Remote monitoring question On 18 Nov 2002 at 17:00, Jeremy Funk wrote: > I have a customer who owns a video arcade and needs remote camera > surveillance access from his home. I have used a remote video > transmission system from ATV Research (RSM-1600) before to accomplish > this task. The boxes communicated via a dedicated phone line. Call Dan Potts at ATV Research www.atvresearch.com, mention my name, and ask about the Everfocus digital system. It will do everything you need, is reliable and in my opinion currently the best digital recorder/transmission system on the market. And not expensive. You will need a broadband web connection at each end. DSL, Cable modem or satellite. You can operate the thing over the web with full functionality. The Everfocus has built in onsite digital recording, mux, built in web server, Ethernet connectivity and a lot more. All you do is connect standard video cameras, plug the thing into the LAN at the client location, set it up on their network, and use any browser on the client side. If the store does not have a LAN, you can connect the thing directly to the broadband connection. Design the entire system before buying ANYTHING. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6551 From: Ben Evans Date: Mon Nov 18, 2002 10:46pm Subject: Re: Home Camera Sweeper ... does it perform like any of the stuff you guys use? It's a spy toy. Nothing more than a toy. In reality, a poorly made frequency counter without a display. At least it has a sensitivity control so that the really powerful transmitters can't disturb the unit. Cordially, -Ben At 10:00 PM 11/18/2002 +0000, you wrote: >Hi, > >The link below is for a camera detector. > >Does it perform like any of the stuff you guys use? > >http://www.technoscout.com/general/product/product.asp? >product=1854&Prod_Name=Camera_Detector&site=87002 > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ----------------------------------------------- Counter Intelligence Solutions Group, Inc. http://www.cisginc.com/ Corporate Website http://www.spywholesalers.com/ Covert Cameras http://www.slantback.com Just for fun 585.889.2321(v) 585.889.0823(f) ----------------------------------------------- 6552 From: kondrak Date: Tue Nov 19, 2002 1:30pm Subject: Re: Remote monitoring question Depending on the distance/path etc, wireless might work, some here don't like wireless, but its an alternative if youve got the path. Cablemodem might be another choice if you can get it at both locations. At 17:00 11/18/02 -0600, you wrote: >Hello, > >I have a lot of respect and admiration for everyone on this group and I hope >that no one feels that my question is beneath them! > >I have a customer who owns a video arcade and needs remote camera >surveillance access from his home. I have used a remote video transmission >system from ATV Research (RSM-1600) before to accomplish this task. The >boxes communicated via a dedicated phone line. > >That was several years ago. Is their a better way to go here? And- if >anyone knows of a complete cameras + transmission system that works well let >me know. > >Thank you for your time. > >Jeremy Funk >PM, Ohio Cabling > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6553 From: Hawkspirit Date: Tue Nov 19, 2002 4:26pm Subject: First Sweepers Here is a quote from page 121 of "The Ominous Ear" by and about Bernard Spindel Circa 1953 "In order to determine the full meaning and extent of this admonition, Hoffa employed me to assist him in several ways. First, he deemed it necessary to determine if his own telephone lines within the organization were being tapped. A physical inspection of Teamster Headquarters in Detroit disclosed that in June, 1953, there were seven active taps in operation. This number included the public telephone booth in the front lobby of the building. Upon the completion of this inspection, Hoffa discussed at length the various ways in which he might determine who in his organization was responsible for the accusations of 'shakedown' and coercion that were being leveled at the unions under his jurisdiction. We agreed to place a microphone - a completely legal procedure - in the offices of certain subordinates whom Hoffa deemed likely suspects. The first Teamster official tried and convicted for such illegal activity came to Hoffa's attention through the use of these microphones. Hoffa also wanted to know if it would be possible to remove the existing wiretaps and what steps might be taken to prevent further wiretapping. My recommendation was to install a series of tap testers that would indicated the existence of the kinds of taps most commonly used. I also suggested locking the building's main telephone terminal-board room along with other junction points in an effort to prevent - or at least delay - outsiders from placing microphones in any of the organization's key offices." Comment: It certainly would have been interesting to get a description of what a "tap tester" was back in 1953 but he does not make further mention of the subject. This book is well worth reading because this man was way ahead of his time and definitely a visionary. In the last chapter he warns about future government data bases crushing our privacy and freedom. Almost word for word the same warning made by William Safire last week on the overreach of homeland security and domestic spying. Spindel wrote his in 1968. 6554 From: Charles P. Date: Tue Nov 19, 2002 10:04pm Subject: Re: First Sweepers > Comment: It certainly would have been interesting to get a description of > what a "tap tester" was back in 1953 I think they're still for sale today in the spyshops or over in the PI Mall ----- Original Message ----- From: "Hawkspirit" To: "TSCM" Sent: Tuesday, November 19, 2002 5:26 PM Subject: [TSCM-L] First Sweepers > Here is a quote from page 121 of "The Ominous Ear" by and about Bernard Spindel > > Circa 1953 > "In order to determine the full meaning and extent of this admonition, > Hoffa employed me to assist him in several ways. First, he deemed it > necessary to determine if his own telephone lines within the organization > were being tapped. A physical inspection of Teamster Headquarters in > Detroit disclosed that in June, 1953, there were seven active taps in > operation. This number included the public telephone booth in the front > lobby of the building. Upon the completion of this inspection, Hoffa > discussed at length the various ways in which he might determine who in his > organization was responsible for the accusations of 'shakedown' and > coercion that were being leveled at the unions under his jurisdiction. We > agreed to place a microphone - a completely legal procedure - in the > offices of certain subordinates whom Hoffa deemed likely suspects. The > first Teamster official tried and convicted for such illegal activity came > to Hoffa's attention through the use of these microphones. > Hoffa also wanted to know if it would be possible to remove the existing > wiretaps and what steps might be taken to prevent further wiretapping. My > recommendation was to install a series of tap testers that would indicated > the existence of the kinds of taps most commonly used. I also suggested > locking the building's main telephone terminal-board room along with other > junction points in an effort to prevent - or at least delay - outsiders > from placing microphones in any of the organization's key offices." > > Comment: It certainly would have been interesting to get a description of > what a "tap tester" was back in 1953 but he does not make further mention > of the subject. This book is well worth reading because this man was way > ahead of his time and definitely a visionary. In the last chapter he warns > about future government data bases crushing our privacy and freedom. Almost > word for word the same warning made by William Safire last week on the > overreach of homeland security and domestic spying. Spindel wrote his in 1968. > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 6555 From: Jeremy Funk Date: Tue Nov 19, 2002 3:09pm Subject: Remote monitoring question Thanks to everyone who posted responses to my question about remote monitoring. I researched all your responses, and am meeting with my client in a few days. Everyone really helped me out and I appreciate it. A toast, for all of you. Sincerely, Jeremy Funk PM, Ohio Cabling >Hello, > >I have a lot of respect and admiration for everyone on this group and I hope >that no one feels that my question is beneath them! > >I have a customer who owns a video arcade and needs remote camera >surveillance access from his home. I have used a remote video transmission >system from ATV Research (RSM-1600) before to accomplish this task. The >boxes communicated via a dedicated phone line. > >That was several years ago. Is their a better way to go here? And- if >anyone knows of a complete cameras + transmission system that works well let >me know. > >Thank you for your time. > >Jeremy Funk >PM, Ohio Cabling 6556 From: Fernando Martins Date: Wed Nov 20, 2002 7:57am Subject: The Future of Surveillance Through Network Camera http://www.securityworldmag.com/index.html?main=current¤t=cover&co ver=01 Contents; The Future of Surveillance Through Network Camera Evolution of Network Camera and Its Technology CCTV Enters the Network Age The Security Industry goes Digital with the IP-Network Cameras Internet Data Center Security by Network Camera A Live Networked Video Solution for a Major International Airport The Future of Surveillance Through Network Camera By Anders Laurin, Vice President Network Facilities, Axis Communications Technological advances have spurred demand for a new form of surveillance in which users can remotely monitor people and property, as well as industrial processes. Network video technology, as it is called, creates digitized video streams that when transferred via a computer network, enable remote monitoring anywhere the Internet reaches. What are the advantages of digital, network-based systems for security and surveillance over analog Closed-Circuit TeleVision (CCTV) systems? How difficult is it to install and maintain? As digital, network-based video has gained acceptance due to improved technology and more cost-effective systems, an increasing number of companies have realized the benefits of digital video in security and surveillance applications. Surveillance systems are now also within reach of a greater mass of smaller companies, that previously could not afford a traditional CCTV system. Many systems for networked-based video utilize ethernet and TCP/IP standards. Most of these systems employ a PC at the heart of the system. Network cameras and video servers can be connected directly to the network. The video digitalization is being performed in the camera, and the computer network is being used to transfer the video back to the PC-based server for storage. This is beneficial because computer networks are generally readily available, and utilizing the LAN (Local Area Network) or the internet allows the video to be remotely managed and stored. The Network Camera A network camera serves many of the same purposes as the standard analog CCTV camera, but it provides users with much more functionality, at lower cost. Because network cameras directly connect into the existing data network, companies can save thousands of dollars by not having to wire their facilities with coaxial cabling as required for analog cameras. Because the network cameras also have integrated web servers, image compressors and operating systems, images can be viewed from standard web browsers anywhere on the network, or even anywhere in the world if the Internet is used. For more complex security surveillance systems, dedicated security software can be installed to manage the video from the network cameras (Figrure 1). However, if a computer network does not exist in the facility, and a wiring project is needed, ethernet networks are much more inexpensive to install than analog cabling. In addition, several cameras can share one line of ethernet cabling, requiring less cabling to be installed. Network cameras also save companies money by reducing the amount of dedicated equipment needed to manage the security system because they can be monitored from any PC along the network. Analog CCTV systems require dedicated monitors and security personnel who are readily available to view the images. To get started, all users have to do is connect the camera to the network. Users are now able to transmit and record images digitally over the network as well as view the images from a Web browser or from dedicated security software. Video recording can be done locally, or thousands of miles away, if required for security or convenience purposes. Sending Images Over the Network Once the system is in place, users can start transmitting images over the network via a number of imaging and compression standards such as motion JPEG and MPEG, transmitting high-quality video. Either a complete image is transmitted every time (JPEG) or a reference image is transmitted and updated little by little (MPEG) until a major change requires that a new reference image should be transmitted. Depending on the application, either method is suitable. The available bandwidth of the computer network is a key factor in all network video transmission. If bandwidth is limited, the amount of information being sent over the network must be reduced, either by longer update intervals or lower image quality. The Benefit of Digital Storage One main advantages of digital video over analog, is digital storage. Video can be saved on a hard disk by using Digital Video Recorders (DVRs), instead of using degradable videotapes to record and store video. With images saved in digital format, digital video can be played, forwarded and reversed, similar to videotape. There is no gradual decay of stored images, and as many copies as preferred can be produced. The ability to search for changing images and image sequences is greatly improved. Analog Systems Go Digital For companies that have already made large investments in analog CCTV systems, the existing analog system can easily be upgraded with digital video technology. Video servers enable conversion of analog video to digital video, making it possible to make a progressive move towards a digital system without having to discard functional analog equipment. Video servers can connect one to four analog CCTV cameras and connect to the network via an ethernet port. Like the cameras, they contain built-in web servers, compression chips and operating systems so that incoming analog feeds can be converted to digital video and transmitted over the computer network. Figure 2 shows a diagram for analog and digital components co-existence in this surveillance system. Getting More Value out of the Surveillance Investment Installing a digital, network-based surveillance system also increases a company? opportunity to use video or images in other applications such as access control. Network cameras can take images when someone swipes a keycard for access to a secure area. This indicates that someone has entered the premises and verifies whether that person was indeed the authorized cardholder. Alarms can be verified, avoiding sending security staff at false alarms. Future of Digital Surveillance The industry analyst company Frost & Sullivan survey ?he Network Camera and Video Server market?states that the combined global network camera and video server market is expected to reach approximately $399 million by 2003 and $791 million by 2005. This is up from $73 million in 2000 - in total a ten-fold increase in five years. With ever-increasing evolution of the digital technology for surveillance systems, the future will enable companies to create even safer and more flexible systems, meeting their exact needs of how to monitor critical areas. The CCTV Security Market and Network Video The CCTV market has shown increasing growth in the last few years. In addition to post 9/11-heightened security concerns, the rapid growth of CCTV has been aided by factors which include the convergence of computers with CCTV, the growth of digital video recorders, and the spread of video distributed over the Internet. These technological advances have also spurred demand for a new form of surveillance in which users can remotely monitor people and property, as well as industrial processes. Network video technology, as it is called, creates digitized video streams that when transferred via a computer network, enable remote monitoring anywhere the Internet reaches. After an initial few years needed to educate the market, it? now clear the migration to digital surveillance technology is quickly gaining momentum. In May of this year, industry analyst Frost and Sullivan forecast that during 2002 demand for analog and digital CCTV-based applications was approximately equal, and that by 2008 the conversion to digital technology in terms of demand for new systems will be nearly complete. The growing convergence of IT and traditional security technology, made possible by the spreading migration to digital technology, offers more and better choices to upgrade security management effectiveness. However, even though end users have shown interest in integrating digital technology into their surveillance systems, and a growing number of manufacturer offer solutions to enable integration of digital and analog systems, perceived implementation complexity and cost considerations continue to prevent many users from making the move to a digital networked system. Compounding this situation is the fact that many installers and consultants, established in the traditional, analog-based CCTV business, have not yet accepted the new technological realities. Status of CCTV and Network Video Markets According to the 2002 Frost and Sullivan report on the global CCTV market, the combined world market in 2001 for CCTV-based applications totaled $4.66 billion. This market is forecast to grow to about $10.61 billion by 2008, representing a Compound Annual Growth Rate (CAGR) of close to 12.7%. At present, Europe has the largest number of installations, but North America and Asia Pacific are catching up fast and represent tremendous market potential. Within the CCTV market, digital CCTV applications are enjoying even more robust growth. A recent Frost and Sullivan industry report on this segment of the CCTV industry, predicted that the network camera and video server markets will continue to grow at around 90% a year through 2005. Many businesses already use their computer networks for a vast array of functions. Network video technology utilizes and extends this same infrastructure for remote monitoring. The growth of network video for surveillance and monitoring is driven not only by a general increase in the need for security, but also by its many performance and cost advantages. Compelling User Benefits The fast-paced growth in the network video market has been fuelled by the very obvious and comprehensive benefits users get in moving to a system with digital technology: Remote Accessibility Cuts Costs Improved access over an intranet (e.g. LAN) or Internet provides quicker and more immediate access to images while substantially reducing travel costs to-and-from the monitored site locations. In addition, images can automatically be stored at off-site locations for convenience or to enhance security. Scalability A digital system is flexible and fully scalable in meeting a user? exact needs. Digital is designed to provide plug and play functionality for small installations or larger, more professional applications. Capacity for Integration Network video technology has the capacity to be integrated into other functions and services, making it a continually developing system. It also allows the user to keep their investment in legacy analog equipment and still receiving all the benefits of a digital system. Lower Total Cost of Ownership (TOC) Network video can leverage investments in the existing computer structure, network, and monitors. Installation costs are cheaper as network cabling is cheaper than coax cabling. In addition, on-going maintenance costs are reduced through elimination of tapes; a minimized number of moving parts; and a greatly reduced need for replacement and repair. Future Proof Use of open standard protocols and networks for communication enables easy system integration with equipment from a wide range of manufacturers. The changeover to digital technology means investing in a system that will last well into the future. Taking the First Steps to Network Video While most users are aware of the many benefits that network video surveillance technology offers, many remain concerned that it? not practical to replace perfectly good analog cameras with new digital cameras. They needn? worry. Network video technology enables users to take the strategic step toward developing a more open digital surveillance system by providing solutions for converting analog images into an easily distributed digital format-at a manageable level of investment. Network video represents the first step in integrating digital technology into a current analog system. A network video system offers an unlimited range of monitoring and surveillance capabilities by distributing live video anywhere with a network connection. A video server is a perfect bridge in converting from an analog to a digital system. The video server connects one or more existing analog cameras, transfers video via a computer network- like a LAN- and delivers it, automatically or on request, to a browser or other professional security applications. In the future, to expand coverage the end user can install additional analog cameras (with video server connections) or migrate to network camera technology, which links live video directly over the network. Figure 3 illustrates an analog surveillance system extended to digital with the help of a video server Another excellent example of progressive integration of digital technology into an existing analog system is a product like the Honeywell Digital Video Manager (DVM). The DVM is a scalable, digital CCTV surveillance solution, complete with an architecture that takes advantage of the user? network communications structure-eliminating the need for coaxial cables and providing highly flexible camera portability. Figure 4 illustrates a simple surveillance system built on a network camera. Network Video Applications The potential for surveillance applications is unlimited. Uses range from traditional security surveillance for offices, retail stores, transportation hubs, and financial and banking institutions. Other applications include monitoring of process and manufacturing industries as well as monitoring of traffic for logistical and security reasons. Following are two examples of how network video products in security surveillance and remote monitoring are changing the way we think about security and the way in which we do business. With 10,000 international journalists set to converge on the Salt Palace Convention Center in Salt Lake City to cover the 2002 Winter Olympic Games, the Salt Palace wanted to upgrade its existing analog security system. The Salt Palace is one of the largest and most high-tech convention centers in the Western U.S. The Convention Center? ability to offer a secure environment is paramount in attracting major national and international shows-so they take their security very seriously. While its 80-camera CCTV surveillance system provided excellent coverage of exterior and interior areas, after September 11th the Salt Palace decided to enhance system performance by moving beyond VCR technology and extend the system with digital capacity. After considering multiple potential security solutions, the Salt Palace director of operations chose to leverage the center? extensive computer network by installing Axis network cameras and video servers. By connecting the Axis cameras directly to the computer network via the built-in ethernet connections, the convention center avoided installing expensive coaxial cabling required for use with analog cameras. The Salt Palace also upgraded its existing analog cameras by connecting them to Axis video servers that transform incoming analog video feeds to digital formats, thus allowing images to be transmitted over the convention center? intranet or even the Internet. With the installation of network video technology, The Salt Palace now has the ability to view images and store images off-site, in case the on-site monitoring and recording system is tampered with or destroyed. Police and other law enforcement officials can make use of the images over the Internet as they can easily log on to the cameras and view activities in and around the convention center. In addition, digital recording makes previously time-consuming image searches quick and automatic. The Salt Palace improved security with a cost-effective network video system that digitizes existing security equipment and allows on and off-site monitoring and recording. The convention center was able to add Axis cameras and video servers directly to its existing network, saving significant time and money on installation. The Swedish sporting goods retail chain, Stadium, was experiencing an increase in incidents of threats and robberies. Stadium wanted a security solution to reduce crime in its stores and create a safer working environment for staff. Securitas, a large international security company, introduced Stadium to the ?afe Store?concept, a security system innovation involving IP-based network solutions aimed at preventing crimes before they happen. To implement the Safe Store network video solution, Stadium chose an analog camera, an AXIS 2401 Video Server, and a broadband (ISDN) modem connection. The solution required minimal investment in new hardware since the AXIS 2401 transforms analog video into high quality digital images that can be transmitted over an existing IP network. Now, when a Stadium staff member feels threatened, they can request Securitas?attention simply by pressing a fixed or portable button that activates a surveillance camera. From its emergency center, Securitas immediately swings into action to monitor the situation and take appropriate action. Since the installation of safe store at a ?roblem?Stadium location in Stockholm, there has not been a single incident of threat or theft reported. Staff found the system easy to use, and they reported feeling more secure and comfortable in their working environment. Stadium management found that the added security system makes their stores less attractive for break-ins and robberies and gives their staff the extra confidence they need to manage potentially troublesome situations more effectively. For Stadium, a relatively minor investment in network video technology for remote surveillance has proven to be a real winner. Conclusions Even with the enormous growth of both CCTV and network video technology, a number of hurdles remain to continued strong growth in the digital remote surveillance market. Many end users remain unaware that there is a step-by-step path available to transform existing analog security systems to digital technology. Furthermore, many installers, integrators, and consultants remain comfortable and established in the analog they know and have yet to wake up to a full understanding of the potential of digital solutions for their customers and for their own businesses. In this regard, it is up to a manufacturer to engender a deeper understanding of how digital systems are built and maintained and to encourage integrators to develop business structures and capabilities adapted to the growing demand for digital solutions. When end users gain a deeper understanding of the benefits and possibilities of digital and network-based surveillances systems, the technology shift in the market will go even faster. In the transition from analog to digital surveillance systems, it is obvious that no system is too small or too tightly tied to analog technology, to benefit from digital technology. Even a single analog camera connected to a video server will provide the user with the full range of advantages that come from digital, networked surveillance. Coverstory Last issues' section Nov./Dec. 2002 Sept./Oct. 2002 Jul./Aug. 2002 May./Jun. 2002 Mar./Apr. 2002 Jan./Feb. 2002 Nov./Dec. 2001 Sept./Oct. 2001 Jul./Aug. 2001 [ Top of The Page ] Home | Product Online! | About | Subscription | Advertising C Infothe Media Group 2001 Rm 1302 Taeyoung B/D, 252-5 Gongduck-Dong, Mapo-Gu Seoul 121-717 Korea Tel: +82-2-719-6931-4 / Fax: +82-2-715-8245 for more info.,webmaster@i... 6557 From: kondrak Date: Wed Nov 20, 2002 6:27pm Subject: black bag jobs http://story.news.yahoo.com/news?tmpl=story2&cid=519&u=/ap/20021120/ap_on_re_us/domestic_spies_1&printer=1 WASHINGTON (AP) - They have broken into homes, offices, hotel rooms and automobiles. Copied private computer files. Installed hidden cameras. Listened with microphones in one couple's bedroom for more than a year. Rummaged through luggage. Eavesdropped on telephone conversations. t's the FBI (news - web sites), operating with permission from a secretive U.S. court in a high-stakes effort pitting the nation's premier law enforcement agency against the world's spies and terrorists. 6558 From: Date: Wed Nov 20, 2002 7:12pm Subject: outsource the processing of subpoena and court ordered wiretaps fiducianet Closes Important Financing Round HERNDON, Va.--(BUSINESS WIRE)--Nov. 20, 2002--fiducianet, inc.(SM), the nation's first service bureau designed to allow telecommunications carriers to outsource the processing of subpoena and court ordered record production and wiretaps, has closed a significant round of financing with a group of senior technology angels. "This round brings to fiducianet, inc.(SM) the capital it needs to finance the business into the foreseeable future," said Mike Warren, President. The round was led by Jim Rutt, former CEO of Network Solutions, and included former executives of Network Solutions as well as The Thomson Corp. "Angel investors are being really selective these days," Warren stated. "The vote of confidence these experienced technology executives bring with their investment is an important affirmation of the strength of the opportunity and our ability to capture it," he added. Jim Rutt and his fellow investors are convinced that fiducianet has developed a strong service offering that is differentiated from others in the space. "Mike Warren has assembled a team with the deepest domain knowledge in the space," Rutt offered. "And, this group of investors has the capacity to assist fiducianet that extends way past our money. We can help them as they introduce themselves to potential customers, including the extension of their services into the internet provider community," said Rutt. Jim Rutt was the CEO of Network Solutions prior to its acquisition by Verisign (Nasdaq:VRSN) in June of 2000. His roots in the online information and internet industries include co-founder of First Call Corporation, Chief Technology Officer of The Thomson Corporation (NYSE:TOC), and various positions at THE SOURCE, the first consumer and small business online service. fiducianet, inc.(SM) is headed by Michael Warren, a 29 year veteran of the FBI who was in charge of CALEA implementation for the Bureau before retiring in September 2000. The name fiducianet derives from the Latin word fiducia or "trust" in English. About fiducianet, inc.(SM) As Carrier Agent fiducianet, inc.(SM) provides full-service outsourcing for the management of a carrier's compliance with subpoenas and court ordered record production, and it can also handle a carrier's obligations under lawful electronic surveillance law, including CALEA, USA PATRIOT Act, ECPA, T-III, and FISA. fiducianet, inc.(SM) frees carriers to focus on their core business of running a telecommunications company. For more information please contact fiducianet's corporate headquarters at (703) 753-1290 or visit their website at www.fiducianet.biz. CONTACT: fiducianet, inc. Brian Durham, 703/753-1290 Ext. 214 www.fiducianet.biz SOURCE: fiducianet, inc. Today's News On The Net - Business Wire's full file on the Internet with Hyperlinks to your home page. URL: http://www.businesswire.com 11/20/2002 15:47 EASTERN [Non-text portions of this message have been removed] 6559 From: Shawn Hughes Date: Thu Nov 21, 2002 0:07am Subject: handy doodad Found this while looking for the pinout of a video camera I've acquired. http://phd.philipscsi.com/fov_cal.cfm.cfm? Will help you determine field of view calculations. Shawn **************************************************************************** ****************************** Shawn Hughes Patrolman / Technician, Union County (TN) Sheriff's Office Uncertified Public Safety Bomb Technician Hazardous Materials Technician Subject Matter Expert; CBIRNE Operations, Technical Surveillance Operations Member, International Association of Bomb Technicians Region VI ORI - TN0870000 Ph. - (865)992-5212 email - srh@e... ---------------------------------------------------------------------------- ------------------------------------------------ 6560 From: A Grudko Date: Thu Nov 21, 2002 8:07am Subject: Alinco DR 150 Anyone out there using or has a manual for the Alinco DR 150. I lost my manual years ago and I must have hit an odd sequence of buttons yesterday. In the 'bandscope' display above the f. display there is either a central 4 bar column or, if I select SRCH, 7, 2 bar columns. If I open the squelch all the way there is no noise but the BUSY indicator comes on. Anything received below S6 is silent. The Alinco.com site does not have the Alinco DR 150 instructions. I'd rather not do a full reset and have to program the 100 memories again!! Help..... Andy Grudko (British) - D.P.M., Grad I.S, South Africa SIRA investigators Reg. No. 8642 Grudko Associates - www.grudko.com , andy@g... . Est. 1981. International business intelligence and investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust When you need it done right - first time 6561 From: Marcel Date: Thu Nov 21, 2002 0:24pm Subject: Glitch opens T-Mobile user to hacker probes Glitch opens T-Mobile user to hacker probes By BOB BREWIN NOVEMBER 18, 2002 Mike Palmer, technology director at The Associated Press news agency's broadcast division, learned a lesson this month: Mobile wireless data services need to be carefully monitored for hacker probes that could create security risks as well as cost issues. Palmer works in Washington for New York-based AP. He said he discovered 25 probes from hackers when he checked inbound traffic to a laptop PC that's used to send video and text files over T-Mobile USA Inc.'s General Packet Radio Service (GPRS) mobile data network. Palmer said he wasn't worried about security problems because he uses Atlanta-based Internet Security Systems Inc.'s BlackICE personal firewall technology. But what did bother him was the possibility that AP could end up paying for the probes if they pushed him over the 10MB monthly data transmission limit he has with T-Mobile. Like other major cellular network operators, T-Mobile, a subsidiary of Bonn-based Deutsche Telekom AG, charges for its data service on a per-megabyte basis that includes both incoming and outgoing transmissions. Kim Thompson, a spokeswoman for Bellevue, Wash.-based T-Mobile, acknowledged the problem that Palmer experienced. But she described it as an isolated incident and promised a fix by week's end. Thompson said T-Mobile has firewalled its network to prevent such probes and put mechanisms in place to ensure that customers don't have to pay for unsolicited inbound traffic. The probes of AP's systems stemmed from a recent upgrade of T-Mobile's network that resulted in a "glitch," she added. The problem affected fewer than 100 users, Thompson said. John Pescatore, a security analyst at Gartner Inc. in Stamford, Conn., said this is the first incident he's aware of in which a user of an IP-based mobile data network was subjected to probes that weren't blocked. But once a user opens up an IP connection, hackers can usually discover it "in about 10 minutes," he said. In such an environment, IT security tools and firewalls are essential, Pescatore said. Both GPRS data circuits and rival Code Division Multiple Access (CDMA) 1x services from carriers such as Sprint PCS Group utilize IP connections, he noted. Jim Grams, a senior vice president at AT&T Wireless Services Inc., said the Redmond, Wash.-based company helps its wireless data users avoid probes by not assigning static and exposed IP addresses to users. AT&T Wireless has also installed firewalls that stop such traffic before it reaches users, he said. Cellular Tips Per-megabyte pricing means you pay for inbound traffic. Check GPRS or CDMA 1x clients regularly to ensure they havenít been probed by hackers. Demand rebates if you get billed for unsolicited inbound traffic. http://www.computerworld.com/printthis/2002/0,4814,75957,00.html 6562 From: Marcel Date: Thu Nov 21, 2002 0:40pm Subject: New Generation of GPS Chips Headed for Cell Phones New Generation of GPS Chips Headed for Cell Phones The future looks bright for the next generation of Global Positioning System chips. They work indoors and use less power than earlier versions. Their ability to give the precise location of a cell phone or personal digital assistant is predicted for use beyond the 911 applications that inspired their design. According to the Cahners In-Stat research firm, in 2003, there will be 11.1 million GPS-enabled cell phones in the U.S. In 2006, there will be 77.5 million. But wireless companies must still come up with compelling services that will make money, an analyst said. (Source: Wall Street Journal) 6563 From: Marcel Date: Thu Nov 21, 2002 0:52pm Subject: Two Charged in Plot to Cheat on Entrance Exam November 20, 2002 Two Charged in Plot to Cheat on Entrance Exam By ELISSA GOOTMAN GARDEN CITY, N.Y., Nov. 19 ≠ Two Columbia University undergraduates have been charged with carrying out a high-tech plot to cheat on graduate school entrance examinations with the help of laptop computers, wireless microphones and a digital camera, the police said today. The students, Bryan Laulicht, 21, of Great Neck, N.Y., and Sasha Bakhru, 22, of Loudonville, N.Y., were arrested on Monday aftera staff member at a testing center here noticed Mr. Laulicht fiddling with a computer in a room where Mr. Bakhru was scheduled to take the Graduate Record Examinations moments later, officials said. At that point, the two students were still trying to iron out the kinks in their plan, which they were trying for the second time, the police said. The scheme called for one man to take the test on a computer in a private room at the Sylvan Learning Center, then attach a transmitter to the computer and send images of test questions to a laptop in a van parked nearby, the police said. In the van, they said, the other student would save the images. He would also look up or calculate answers and radio them to the test taker, who would be wearing a wireless earpiece. The police said the students told them they had designed the system, using equipment that Mr. Bakhru said cost $12,000, in the hopethat getting high scores on the test, known as the G.R.E., would earn them scholarships. But the police are investigating whether they were also going to sell exam questions to other prospective test takers. "This was an entire elaborate set-up," said Detective Sgt. James H. Bartkowski of the Garden City Police Department. "We think there are other motives involved." The students, who officials said were roommates scheduled to graduate in 2003, were arraigned today in First District Court in Hempstead on charges of unlawful duplication of computer material and third-degree burglary. They did not enter pleas. The Nassau County District Court judge, Norman Janowitz, allowed them to be freed on supervised release; if they violate the terms of the release, bail will be $100,000, an official said. The police said both students were released to the custody of their parents. A woman who answered the phone at the Bakhru home said the family did not wish to comment on the case. The Laulicht family could not be reached for comment. The students bought their equipment at stores including Best Buy and CompUSA, officials said, and used their technical know-how to create some of it. The police said Mr. Bakhru told them he was a micro-electronic engineer, and in 1999 the Great Neck Record published an article congratulating Mr. Laulicht and several other students for being named semifinalists in the Intel science contest. Earlier this year, the police said, both men signed up to take the examination at a testing center in Manhasset. They chose to retake it at the Garden City center, officials said, because it has a room where people with physical or learning disabilities can take the test privately. On Nov. 11, the authorities said, Mr. Laulicht took the test in the private room, citing respiratory problems. Mr. Bakhru sat in the van that day, the police said, where he was to use a device called a dazzler to save the images of test questions on the laptop; just in case, he would also photograph the laptop screen with a digital camera. But Mr. Laulicht abandoned the test because the wireless communication system was not working properly, the police said. According to test rules, students must wait 30 days before retaking the G.R.E., so on Monday, Mr. Bakhru, who also said he suffered respiratory problems, was scheduled to take the test in the private room, the police said. As he waited in the reception area, the police said, a testing center staff member saw Mr. Laulicht in the private room, attaching a transmitter to the computer. When caught, the police said, Mr. Laulicht explained his presence by saying he had lost his credit card, and quickly left the building. But staff members called the police, who arrested both men. Sergeant Bartkowski said investigators suspected that the men intended to make money from their scheme. He said that while questioning Mr. Bakhru, he had voiced sympathy about the difficulty of the test. "He got very indignant and said, `I can ace this with my eyes closed,' " the sergeant recalled. "Common sense would tell you that they're in on this gold mine. If you could pass this test with your eyes closed, why set up this elaborate scheme?" http://www.nytimes.com/2002/11/20/education/20EXAM.html?pagewanted=print&position=top 6564 From: Date: Wed Nov 20, 2002 6:57am Subject: CAMERA TRANSMISSION PROBLEM FM: Al Kelly, Amcor International TO: General Membership SUBJ: CAMERA TRANSMISSION PROBLEM A monument will be set in place in the near future in the downtown Philadelphia area. The monument is 30 feet wide and 12 feet high. It will be placed in an open park area. The park is located at Front and Chestnut Streets on the overpass of I-95. There are no structures in this park. I have the task of installing cameras to assist in the prevention of Vandalism. My original plan was to install four fixed color by day/black & white by night cameras via coax to a Digital Recorder. The recorder would be housed in a lock box or Kiosk. I chose Digital over Analog due to the high storage and the write over capability and we all know the problems associated with changing analog tapes. The proverbial, Fly in the Ointment. The manufacturers of these ten thousand plus recorders will not warrant the product when placed in a lock box or Kiosk, even if the environment is controlled. My next thought was sending the signal to one of the board members. The nearest would be the local Fraternal Order of Police Building about 5-10 miles away. I considered Microwave, too expensive, environment and licensing issues. I considered twisted pair, good for about one and a half miles, if you use Cat5. I ruled out RG59, 6, and 11. I hope one of the Geniuses has the solution to my problem. Thank you. [Non-text portions of this message have been removed] 6565 From: D. Douglas Rehman Date: Fri Nov 22, 2002 6:29am Subject: RE: CAMERA TRANSMISSION PROBLEM How about using either an engineered dedicated circuit or even DSL to remote the video? Back in the days it was legal to intercept cordless telephones, I built a small box containing a battery, a scanner, and a Heikeman (spelling?) slave. I would have the telephone company install a POTS line on a pole near the target. I installed the box on the pole (after some surveillance to determine the channel(s) used by the target's phone). All I had to do was dial the slave up from anywhere and instant link. I usually dialed the slave with a DNR (we were using Pamco's at the time) and recorded the audio with a Sony cassette recorder that had a date/time track. I also had some remote video platforms that could run over ISDN (about 2-6 frames per second). In Florida, you can get an ISDN line virtually anywhere in the state. Best Regards, Doug Rehman Rehman Technology Services, Inc. Specializing in Computer Forensics and Technology Related Investigations License A-9800119 Mount Dora, Florida (Orlando Area) (352)357-0500 http://www.electronicdiscovery.com 6566 From: Fernando Martins Date: Fri Nov 22, 2002 8:24am Subject: RE: CAMERA TRANSMISSION PROBLEM > The proverbial, Fly in the Ointment. The manufacturers of > these ten thousand > plus recorders will not warrant the product when placed in a > lock box or > Kiosk, even if the environment is controlled. Check the recording products at http://www.silentwitness.com They are for mobile surveillance systems, but because of that they are housed in resistant enclosures. I hope it can help. FM 6567 From: James M. Atkinson Date: Fri Nov 22, 2002 11:30am Subject: THE GORILLA A man wakes up one morning and finds a gorilla on his roof. So he looks in the yellow pages and, sure enough, there's an ad for "Gorilla Removers." He calls the number, and the gorilla remover says he'll be over in 30 minutes. The gorilla remover arrives and gets out of his van. He's got a ladder, a baseball bat, a shotgun and a mean old pit bull. "What are you going to do?" the homeowner asks. "I'm going to put this ladder up against the roof, then I'm going to go up there and knock the gorilla off the roof with this baseball bat. When the gorilla falls off, the pit bull is trained to grab his testicles and not let go. The gorilla will then be subdued enough for me to put him in the cage in the back of the van." He then hands the shotgun to the homeowner. "What's the shotgun for?" asks the homeowner. "If the gorilla knocks me off the roof, shoot the dog!" -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6568 From: Hawkspirit Date: Fri Nov 22, 2002 1:03pm Subject: Time Magazine 1964 Does anyone have a copy of a 1964 Time Magazine article titled "Bug Thy Neighbor"? 6569 From: James M. Atkinson Date: Fri Nov 22, 2002 5:44pm Subject: Who's on First? HU'S ON FIRST By James Sherman (and now we take you now to the Oval Office...) George: Condi! Nice to see you. What's happening? Condi: Sir, I have the report here about the new leader of China. George: Great. Lay it on me. Condi: Hu is the new leader of China. George: That's what I want to know. Condi: That's what I'm telling you. George: That's what I'm asking you. Who is the new leader of China? Condi: Yes. George: I mean the fellow's name. Condi: Hu. George: The guy in China. Condi: Hu. George: The new leader of China. Condi: Hu. George: The Chinaman! Condi: Hu is leading China. George: Now whaddya' asking me for? Condi: I'm telling you Hu is leading China. George: Well, I'm asking you. Who is leading China? Condi: That's the man's name. George: That's who's name? Condi: Yes. George: Will you or will you not tell me the name of the new leader of China? Condi: Yes, sir. George: Yassir? Yassir Arafat is in China? I thought he was in the Middle East. Condi: That's correct. George: Then who is in China? Condi: Yes, sir. George: Yassir is in China? Condi: No, sir. George: Then who is? Condi: Yes, sir. George: Yassir? Condi: No, sir. George: Look, Condi. I need to know the name of the new leader of China. Get me the Secretary General of the U.N. on the phone. Condi: Kofi? George: No, thanks. Condi: You want Kofi? George: No. Condi: You don't want Kofi. George: No. But now that you mention it, I could use a glass of milk. And then get me the U.N. Condi: Yes, sir. George: Not Yassir! The guy at the U.N. Condi: Kofi? George: Milk! Will you please make the call? Condi: And call who? George: Who is the guy at the U.N? Condi: Hu is the guy in China. George: Will you stay out of China?! Condi: Yes, sir. George: And stay out of the Middle East! Just get me the guy at the U.N. Condi: Kofi. George: All right! With cream and two sugars. Now get on the phone. (Condi picks up the phone.) Condi: Rice, here. George: Rice? Good idea. And a couple of egg rolls, too. Maybe we should send some to the guy in China. And the Middle East. Can you get Chinese food in the Middle East? -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6570 From: Gregory Perry Date: Fri Nov 22, 2002 8:19am Subject: Re: CAMERA TRANSMISSION PROBLEM Might be a good scenario for an 802.11b/a setup, depending on if you have line of sight to the FOP building. Superdirectional yagi with 802.11b camera (they now have 802.11 camera gadgets that support 640x480 NTSC, full motion, pan and tilt - check out http://www.axis.com), panel type or yagi at FOP. Could get you close to full motion video, with full control of the camera, and something on the other end to dump video to (DVD, VCR etc). 802.11 is ISM, so no need to worry about licensing and tariffs associated with microwave. Tree leaves attenuate 802.11b signals (it's in the microwave oven-plagued 2.4 gig band, so make sure you have direct line of sight for best signal; 802.11a (albeit 54 Mbps) is even worse in terms of line of sight requirements, it lives in the 5 gig UNII band. If you don't have line of sight, you can also play with bouncing/reflecting off of skyscrapers and other fixed objects downtown to get your signal over to the FOP building. Fairly cheap setup ! as well - those AXIS cameras are sub $500 at this point, have their own embedded Linux kernel and network stack, etc. - no need for a PC on the remote viewing end. --------------------------------- "Any sufficiently advanced technology is indistinguishable from magic" -- Arthur C. Clarke The following message was sent by Amcorinternational@C... on Wed, 20 Nov 2002 12:57:08 EST. > FM: Al Kelly, Amcor International > TO: General Membership > SUBJ: CAMERA TRANSMISSION PROBLEM > > A monument will be set in place in the near future in the downtown > Philadelphia area. The monument is 30 feet wide and 12 feet high. It > will > be placed in an open park area. The park is located at Front and Chestnut > > Streets on the overpass of I-95. There are no structures in this park. > > I have the task of installing cameras to assist in the prevention of > Vandalism. > > My original plan was to install four fixed color by day/black & white by > > night cameras via coax to a Digital Recorder. The recorder would be housed > > in a lock box or Kiosk. I chose Digital over Analog due to the high storage > > and the write over capability and we all know the problems associated with > > changing analog tapes. > > The proverbial, Fly in the Ointment. The manufacturers of these ten thousand > > plus recorders will not warrant the product when placed in a lock box or > > Kiosk, even if the environment is controlled. > > My next thought was sending the signal to one of the board members. The > > nearest would be the local Fraternal Order of Police Building about 5-10 > > miles away. I considered Microwave, too expensive, environment and licensing > > issues. I considered twisted pair, good for about one and a half miles, > if > you use Cat5. I ruled out RG59, 6, and 11. > > I hope one of the Geniuses has the solution to my problem. > > Thank you. > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6571 From: frost_bitten_ca Date: Fri Nov 22, 2002 0:12pm Subject: Wescam Wescam http://www.wescam.com/splash.htm 6572 From: Thom Taylor Date: Fri Nov 22, 2002 2:00pm Subject: California License Plate I need a California License Plate run. Please call me or respond with price and TAT. Thom Taylor Director of Investigations HireRight, Inc. 800.400.2671 x5864 ttaylor@h... From: Tom Mann Date: Sat Nov 18, 2000 7:39pm Subject: Re: this is good - humor That's a good start. Tom Mann Janis.Balklavs-Grinhofs@l... wrote: > > OK, but how we will test the sense of humor? ;-) > > Janis > > > > > > Dear List: > > A good sense of humor should be a mandatory requirement for inclusion on > the list. Lighten up, everyone! > > Tom Mann > Guardian International > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 1953 From: Talisker Date: Sat Nov 18, 2000 4:10am Subject: Re: Overview Toby wrote >I have found most vulnerability scanners to be >nothing more than checklists that are generally >out of date I disagree By their nature vulnerability scanners cannot scan for vulnerabilities they don't know about (in this they maybe described as an automated checklist)- However as someone who occasionally has to manually audit networks for vulnerabilities, these automated tools can be a godsend. There are 2 main types: Network Scanner, this can scan a network from the perspective of a hacker ie looking at your hosts from the outside in. An automated tool really cuts down on time massively, because the freeware versions are so good the commercial vendors have recently cut their costs massively Host Scanner, This scans your host from the inside, generally they require an agent to be installed on each host, though their are a few agentless variations emerging now. In my experience it can cut a manual audit down from 1 day per host to 1 minute, they also automatically write a report and these days they will fix most vulnerabilities found As to their currency sometimes they can be out of date, though vendors do try to keep them right up to date, otherwise we buy elsewhere - Also many tools will allow you to write your own vulnerabilies to check for, thereby adapting the scan to the local environment and addressing new vulnerabilities On my site below I detail every available commercial vulnerability scanner, this include database scanners and will shortly include online scanners and web server scanners Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo talisker@n... The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "Kohlenberg, Toby" To: Sent: Saturday, November 18, 2000 1:14 AM Subject: RE: [TSCM-L] Overview I have found most vulnerability scanners to be nothing more than checklists that are generally out of date, however there are a couple where that is not completely accurate. This last summer, I spent some time doing a pretty detailed review of many of the products in the market and would recommend that if you are looking for one, you look at Nessus, Retina(Eeye) and ISS. If anyone would like to talk more about my findings, please contact me off the list. This is not an official endorsement of any product and all opinions expressed are my own. I do not speak for Intel in any way. Toby Toby Kohlenberg, CISSP Intel Corporate Information Security STAT Team Information Security Specialist 503-264-9783 Office & Voicemail 877-497-1696 Pager "Just because you're paranoid, doesn't mean they're not after you." PGP Fingerprint: 92E2 E2FC BB8B 98CD 88FA 01A1 6E09 B5BA 9E84 9E70 > -----Original Message----- > From: Larry Hountz - -(©ø©)- [mailto:larryh@w...] > Sent: Thursday, November 16, 2000 3:10 PM > To: TSCM-L@egroups.com > Subject: [TSCM-L] Overview > > > Hello: > > I would just like to say I have been on this list now > about 10 days. And have seen more good information > then I have seen on most lists in weeks. And the humor was nice... > > I would like to know what you all thing of products like > Webtrends Security Anayzer as you can see I work for this > company. > > Thanks, > > Larry J. Hountz > Senior Technical Advisor > Security SWAT Team > Webtrends Corp > larryh@w... > > Don't Fear The Penguin > > .~. > /V\ > / / \ \ > / ( ) \ > ^~^ > LINUX > > > [Non-text portions of this message have been removed] > > > > -------------------------- eGroups Sponsor > -------------------------~-~> > Create your business web site your way now at Bigstep.com. > It's the fast, easy way to get online, to promote your business, > and to sell your products and services. Try Bigstep.com now. > http://click.egroups.com/1/9183/0/_/507420/_/974466052/ > -------------------------------------------------------------- > -------_-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1954 From: Talisker Date: Sun Nov 19, 2000 3:10am Subject: RE: overview Toby wrote >I have found most vulnerability scanners to be >nothing more than checklists that are generally >out of date I disagree By their nature vulnerability scanners cannot scan for vulnerabilities they don't know about (in this they maybe described as an automated checklist)- However as someone who occasionally has to manually audit networks for vulnerabilities, these automated tools can be a godsend. There are 2 main types: Network Scanner, this can scan a network from the perspective of a hacker ie looking at your hosts from the outside in. An automated tool really cuts down on time massively, because the freeware versions are so good the commercial vendors have recently cut their costs massively Host Scanner, This scans your host from the inside, generally they require an agent to be installed on each host, though their are a few agentless variations emerging now. In my experience it can cut a manual audit down from 1 day per host to 1 minute, they also automatically write a report and these days they will fix most vulnerabilities found As to their currency sometimes they can be out of date, though vendors do try to keep them right up to date, otherwise we buy elsewhere - Also many tools will allow you to write your own vulnerabilies to check for, thereby adapting the scan to the local environment and addressing new vulnerabilities On my site below I detail every available commercial vulnerability scanner, this include database scanners and will shortly include online scanners and web server scanners Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo talisker@n... The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. 1955 From: Kohlenberg, Toby Date: Sun Nov 19, 2000 4:31pm Subject: Vulnerability Scanner discussion- was RE: Overview > -----Original Message----- > From: Talisker [mailto:Talisker@n...] > I disagree > > By their nature vulnerability scanners cannot scan for > vulnerabilities they > don't know about (in this they maybe described as an > automated checklist)- > However as someone who occasionally has to manually audit networks for > vulnerabilities, these automated tools can be a godsend. I don't see this as disagreement. I am often in a situation where a vulnerability scanner of one sort or another takes my job from the impossible range to the merely improbable. :) The reason I looked at a number of them this summer is because I was unsatisfied with the one that our team had been using and wanted to settle the debates and find the best one to meet our needs. For our purposes, non-agent based scanners were our focus- we need a scanner that doesn't require having something on every host. As well, as Andy mentioned, there are a couple products where, at least with WinXX, if you provide an administrative account, they can do a great deal of the local checking as well. My statement was not intended to imply no worth, just limited worth. The problem shows up when people start believing everything their scanner tells them. Even the best ones are not always up to date and none of them can truly manage the level of correlation that a trained person can do. So long as you only use them to help gather data that you can expand on, they are not just okay but absolutely essential for large pen tests or audits. It is when you take the findings as absolute and don't bother to go beyond them that you run into problems. Toby 1956 From: Dawn Star Date: Mon Nov 20, 2000 11:04am Subject: Best Patients Five surgeons are discussing who makes the best patients to >operate on. >The first surgeon says, "I like to see accountants on my >operating table, because when you open them up, everything >inside is numbered." > >The second responds, "Yeah, but you should try electricians! >Everything inside them is color coded." > >The third surgeon says, "No, I really think librarians are >the best; everything inside them is in alphabetical order." > >The fourth surgeon chimes in: "You know, I like construction >workers...those guys always understand when you have a few >parts left over at the end, and when the job takes longer >than you said it would." > >But the fifth surgeon shut them all up when he observed: >"You're all wrong. Politicians are the easiest to operate >on. There's no guts, no heart, and no spine, and the head >and butt are interchangeable." [Non-text portions of this message have been removed] 1957 From: Date: Mon Nov 20, 2000 6:25am Subject: Spopoky Architects Click here: DNC Architects: High Tech 1958 From: Jay Coote Date: Mon Nov 20, 2000 7:55pm Subject: Which VHF-UHF handheld radio? (Please ignore the wrong datecode) I am seeking suggestions on handheld radios which cover 144-170 and 420-512 MHz. They must also have beaucomp channels, CTCSS, DCSS, cross-band and the ability to plug in earpieces or low-visibility speaker mikes. The Racal MBITR is a little costly (US $5000) and hard to fit into a pocket or soft briefcase ;-) Please email me off-list Thanks, Jay TSCM@j... 1959 From: Talisker Date: Mon Nov 20, 2000 11:49am Subject: Re: Vulnerability Scanner discussion- was RE: Overview Toby For Win32 agentless Take a look at SecurityExpressions from Pedestal, this may meet your needs, it comes with various ready written config files, the best is the US Navy file. Though since it was written the products has been improved it will now delete files on the target machines as well as checking their versions. It does need some tweaking to meet a policy but this is trivially easy - It doesn't require agents and the vendor support is excellent STAT A little more pricey than SE and from the short time I spent on it not quite as tuneable, it's range of checks is good including a dictionary attack. The reports are great enough to impress any manager ForixNT - I haven't looked at it but have heard some good things about it Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo talisker@n... The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "Kohlenberg, Toby" To: Sent: Sunday, November 19, 2000 10:31 PM Subject: Vulnerability Scanner discussion- was RE: [TSCM-L] Overview > > -----Original Message----- > > From: Talisker [mailto:Talisker@n...] > > I disagree > > > > By their nature vulnerability scanners cannot scan for > > vulnerabilities they > > don't know about (in this they maybe described as an > > automated checklist)- > > However as someone who occasionally has to manually audit networks for > > vulnerabilities, these automated tools can be a godsend. > > I don't see this as disagreement. I am often in a situation where > a vulnerability scanner of one sort or another takes my job from > the impossible range to the merely improbable. :) > The reason I looked at a number of them this summer is because I > was unsatisfied with the one that our team had been using and wanted > to settle the debates and find the best one to meet our needs. > For our purposes, non-agent based scanners were our focus- we need > a scanner that doesn't require having something on every host. As > well, as Andy mentioned, there are a couple products where, at > least with WinXX, if you provide an administrative account, they > can do a great deal of the local checking as well. > > My statement was not intended to imply no worth, just limited worth. > The problem shows up when people start believing everything their > scanner tells them. Even the best ones are not always up to date > and none of them can truly manage the level of correlation that a > trained person can do. > > So long as you only use them to help gather data that you can expand > on, they are not just okay but absolutely essential for large pen tests > or audits. It is when you take the findings as absolute and don't > bother to go beyond them that you run into problems. > > Toby > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1960 From: James M. Atkinson, Comm-Eng Date: Tue Nov 21, 2000 9:39am Subject: Re: Wardialers At 5:51 PM +0000 11/17/00, Talisker wrote: >As telco's have been mentioned I thought I'd trawl for wardialers >So far on the site I've got > >ModemScan >THC-PBX >TBA >Xiscan >PhoneSweep >THC-Scan >Toneloc >TeleSweep >PocketDial >Telephony Scanner >There's info on them on my site under vulnerability scanners >Do you know of any that I may be missing? Any information would be greatly >appreciated Err, My personal preference is to track down every single wire or fiber that enters or leaves the area being checked, and then to conduct a series of instrumented measurements to determine what *EXACTLY* is on the wire. Once the configuration is determined (and we know there is or may be a modem/fax is on the line) it is a waste of time to play with war-dialers and other such toys. I can tell you more with a Conducted Signals Analysis and TDR then any war-dailer software package, and I can do it faster, and be a hell of of lot less intrusive. If I really want to get cute I can simply squirt some 20 Hz into the loop and see which pair answers with a carrier. Just my humble opinion, -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1961 From: A Grudko Date: Tue Nov 21, 2000 5:06am Subject: Fw: [scip-sa] Steve Whitehead ----- Original Message ----- From: CBIA To: scip-sa@egroups.com Sent: Monday, November 20, 2000 10:10 AM Subject: [scip-sa] Steve Whitehead Thank you for all the messages wishing Steve well. Just to clear any confusion on the matter the following: Steve did fall off a "foofy slide" and was seriously injured. He broke three vertebrae, his breast bone and various ribs. The back operation was successfull but Steve will need at least three months to recover. We will keep you posted on his progress. Thank you for your support. Johan CBIA/ TSCM eGroups Sponsor To Post a message, send it to: scip-sa@eGroups.com To Unsubscribe, send a blank message to: scip-sa-unsubscribe@eGroups.com [Non-text portions of this message have been removed] 1962 From: mike f Date: Tue Nov 21, 2000 6:39pm Subject: Carnivore Concerns 17 November 2000 Carnivore Concerns A recent Carnivore test demonstrated that the FBI's packet sniffing software can capture all traffic going through an ISP. A privacy advocate questioned why the agency was testing the program's capability to catch everything. An FBI spokesman says that in a "real-world situation" Carnivore will not be used to capture communications so broadly; the law restricts its implementation. http://www.wired.com/news/politics/0,1283,40256,00.html later4,mike f Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 1963 From: mike f Date: Tue Nov 21, 2000 7:06pm Subject: <<<>>> Another site to check the security of your computer and if you have a firewall http://www.secure-me.net/scan Steve Gibson's site https://grc.com/x/ne.dll?bh0bkyd2 is still the Top's for testing computer security and to see if your 'Firewall Software PROGRAMS'===> R DOING WHAT THEY SHOULD BE DOING! later4,mike f. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 1964 From: James M. Atkinson, Comm-Eng Date: Wed Nov 22, 2000 5:24am Subject: MI5 Sued Over Bugging of Sinn Fein Car MI5 Sued Over Bugging of Sinn Fein Car http://www.guardianunlimited.co.uk/uk_news/story/0,3604,400688,00.html Richard Norton-Taylor Tuesday November 21, 2000 MI5 is being sued for bugging a car used by Sinn Fein leaders Gerry Adams and Martin McGuinness, security sources disclosed yesterday. A bugging and tracking device was found hidden in the roof of a Ford Mondeo carrying the two men at a highly sensitive time during the review of the Good Friday agreement last December. The owner of the car, understood to be the wife of Martin Lynch, who was convicted for arms offences in the early 1980s, is demanding exemplary damages for breach of privacy. Her lawyers originally planned to sue the Ministry of Defence in the belief that the bug was planted by military intelligence. They turned on MI5 when they discovered that agency was responsible. MI5 is vigorously contesting the claim for damages, defending its action under the 1994 Intelligence Services Act. It states: "No entry on or interference with property ... shall be unlawful" [in helping MI5 carry out its functions] if it is authorised by a warrant issued by the secretary of state". In an unusual intervention - ministers rarely comment on security operations - Mo Mowlam, the former Northern Ireland secretary, admitted this summer that she had sanctioned the bugging to "save lives". She told BBC1's You Only Live Once in July: "Lives were being lost. It was done to make sure we knew what was going on". Sinn Fein described Ms Mowlam's admission as "disappointing but not surprising". Official sources say MI5's intention was to target Mr Lynch rather than Mr Adams or Mr McGuinness. Mr Lynch was convicted for arms offences after he was seriously injured when he was shot at by police in 1982. Police found weapons in a car. Last year's decision to place a large bugging device in the one-year-old Mondeo surprised independent security experts because of its audacity and risk of political fallout. The owner's suspicions were apparently aroused when the car was stopped by the RUC at a roadblock and the driver detained. Mr Adams described the bugging as a "hugely serious breach of faith" and accused the intelligence services of attempting to sabotage the peace process. The Mondeo had apparently been used regularly by Sinn Fein, suggesting that the party's counter-intelligence experts had been lulled into a false security by the developing peace process. In the past Sinn Fein leaders and the IRA have regularly switched cars to avoid detection. The bug was equipped with aerials, a digitally-enhanced transmission system and a digital tracking capability which could be picked up by satellite. A Sinn Fein news release said it was "linear amplified" and had a built-in transmission aerial. Sinn Fein said a microphone had been built into the roof of the Mondeo, and wiring ran along the skin of the car. The device, which had rechargeable batteries, could be switched on and off by remote control, according to Mr Adams. It could be voice-activated or switched on by a remote radio signal operated by a computer or by an individual. The idea would be to conserve the battery's life, but, more importantly, to prevent the occupants from detecting the device by discovering an alternative energy source. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1965 From: Dawn Star Date: Wed Nov 22, 2000 10:58am Subject: Truth or imagination "The bug was equipped with aerials, a digitally-enhanced transmission system and a digital tracking capability which could be picked up by satellite. A Sinn Fein news release said it was "linear amplified" and had a built-in transmission aerial. Sinn Fein said a microphone had been built into the roof of the Mondeo, and wiring ran along the skin of the car. The device, which had rechargeable batteries, could be switched on and off by remote control, according to Mr Adams. It could be voice-activated or switched on by a remote radio signal operated by a computer or by an individual." Now how do you transmit to a satellite when the electronics package is stashed in the body of the car or under the frame. In addition it must receive remote on-off command signals. Truth or imagination? Roger [Non-text portions of this message have been removed] 1966 From: Steve Uhrig Date: Wed Nov 22, 2000 11:14am Subject: Re: Truth or imagination Once upon a midnight dreary, Dawn Star pondered, weak and weary: > "The bug was equipped with aerials, a digitally-enhanced > transmission system and a digital tracking capability which could > be picked up by satellite. A Sinn Fein news release said it was > "linear amplified" and had a built-in transmission aerial. Roger asks? > Truth or imagination? Good call Roger. When this first happened some months ago, there was extensive discussion in the BECCA circles, dissecting and analyzing the reports. In a nutshell, we decided the report was hype. Hype is the polite word. The actual analysis used a different term. For example, "linear amplified". Virtually all surveillance equipment uses FM. Voice or data. All transmission technologies referenced in this matter were either digital or FM, all of which dictate Class C amplifiers for efficiency, which as most know are specifically not linear. True Class A or AB "linear" amps are used in high fidelity audio, AM and SSB transmission modes where amplitude is the modulation, amplitude is critical and cannot be distorted. True linear amps are very inefficient due to their class A operation, and are the absolute worst choice for digital or FM amplification. Was a circuit analysis performed as to where a competent engineer could ascertain the class of operation of the amplifier stages? And was he wrong? Or was AM actually used in a surveillance transmitter? Or is there some other amplitude- related transmission mode being used of which we are not aware, and where true linear amplification is a requirement? Or did some sensationalist try to use a buzzword and use it incorrectly? I strongly suspect the latter, having seen countless spy shop descriptions of add on "linear" amplifiers to increase the power/range of their little FM bugs. This term probably is a throwback to the CB radio days, where the same type of people used linear amplifiers on their CB radios. In this instance, since CB is AM or SSB, a linear amp would be the proper choice. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1967 From: Miguel Puchol Date: Wed Nov 22, 2000 11:39am Subject: RE: Truth or imagination I think it's possible to substitute or adapt the FM radio antenna with a radiating element, so that you could transmit to something like an Orbcomm satellite. This sat system uses devices which contain GPS receiver and satellite uplink/downlink transceiver, running about 1W into a 1/4 wave vertical antenna at 137MHz. The main problem with these is power consumption. It could very easily be concealed between the metal roof and inside lining of a car, and transmit through a modified FM antenna - the driver/user wouldn't know about it - unless sweeps were performed. The Orbcomm device stores messages in internal memory, and when a satellite passes overhead, it gets in sync with it's 406MHz beacon. Then, it uplinks the stored messages, which are then forwarded to any pre-programmed email address. It can be done, it's just that poor intelligence and/or lack of decent sweeps on vehicles prevented Sinn Fein finding it. Other systems with freq hopping TX, burst transmission etc. could make detection more difficult, but the laws of physics tell us that to send info via radio to an orbiting bird, even a LEO one, we need a reasonable amount of power and a reasonable antenna. The smallest sat tracking devices I've seen are the ones used for studying bird migratory patterns (or lack thereof - name that film ;-)). These are low-powered devices that can be carried by a bird, and are about the size of a matchbox. The device transmits location data to receivers installed in the NOAA weather observation satellites. The name of the system escapes me now, I'll look it up later. Cheers, Mike > -----Mensaje original----- > De: Dawn Star [mailto:bratkid@e...] > Enviado el: 22 de noviembre de 2000 17:58 > Para: TSCM-L@egroups.com > Asunto: [TSCM-L] Truth or imagination > > > "The bug was equipped with aerials, a digitally-enhanced > transmission system > and a digital tracking capability which could be picked up by satellite. A > Sinn Fein news release said it was "linear amplified" and had a built-in > transmission aerial. > > Sinn Fein said a microphone had been built into the roof of the > Mondeo, and > wiring ran along the skin of the car. > > The device, which had rechargeable batteries, could be switched on and off > by remote control, according to Mr Adams. It could be voice-activated or > switched on by a remote radio signal operated by a computer or by an > individual." > > Now how do you transmit to a satellite when the electronics > package is stashed in the body of the car or under the frame. In > addition it must receive remote on-off command signals. > Truth or imagination? > Roger > > > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1968 From: James M. Atkinson, Comm-Eng Date: Wed Nov 22, 2000 0:53pm Subject: RE: Truth or imagination At 6:39 PM +0100 11/22/00, Miguel Puchol wrote: >I think it's possible to substitute or adapt the FM radio antenna with a >radiating element, so that you could transmit to something like an Orbcomm >satellite. >This sat system uses devices which contain GPS receiver and satellite >uplink/downlink transceiver, running about 1W into a 1/4 wave vertical >antenna at 137MHz. The main problem with these is power consumption. It >could very easily be concealed between the metal roof and inside lining of a >car, and transmit through a modified FM antenna - the driver/user wouldn't >know about it - unless sweeps were performed. >The Orbcomm device stores messages in internal memory, and when a satellite >passes overhead, it gets in sync with it's 406MHz beacon. Then, it uplinks >the stored messages, which are then forwarded to any pre-programmed email >address. > >It can be done, it's just that poor intelligence and/or lack of decent >sweeps on vehicles prevented Sinn Fein finding it. Other systems with freq >hopping TX, burst transmission etc. could make detection more difficult, but >the laws of physics tell us that to send info via radio to an orbiting bird, >even a LEO one, we need a reasonable amount of power and a reasonable >antenna. > >The smallest sat tracking devices I've seen are the ones used for studying >bird migratory patterns (or lack thereof - name that film ;-)). These are >low-powered devices that can be carried by a bird, and are about the size of >a matchbox. The device transmits location data to receivers installed in the >NOAA weather observation satellites. The name of the system escapes me now, >I'll look it up later. > >Cheers, > >Mike Ah... but keep in mind if you keep the signal bandwidth narrow enough you can work a satellite on only a few milliwatts or less. Beeping out a position can be extremely narrow band, and if the signal repetition rate is kept spaced far enough apart the signal would be tough to find during a TSCM sweep (not impossible... just tough). -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1969 From: James M. Atkinson, Comm-Eng Date: Wed Nov 22, 2000 1:32pm Subject: Popemobile Popemobile The Pope had just finished a tour of the East Coast and was taking a limousine to the airport. Having never driven a limo, he asked the chauffeur if he could drive for a while. Without much of a choice, the chauffeur climbed in the back of the limo and the Pope took the wheel. After gleefully accelerating to about 90 mph, the Pope was pulled over by the State Patrol. The trooper came to his window, took a look inside, and said, "Just a moment, please. I need to call in." The trooper called in and asked for the chief. He told the chief, "I've got a REALLY important person pulled over and I need to know what to do." The chief replied, "Who is it? A senator?" The trooper said, "No, even more important." The chief asked, "It's the Governor, isn't it?" "No. More important." "The President?" "No. More important." "Well, Who the heck is it?!," screams the chief. "I don't know," said the trooper. "But he's got the Pope as a chauffeur." ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= [Non-text portions of this message have been removed] 1970 From: Miguel Puchol Date: Wed Nov 22, 2000 3:57pm Subject: RE: Truth or imagination Yes, you could use a system which used some form of narrowband bitstream to send out compressed coordinates - data like lat/long date, time, speed and heading can be compressed into 72 bits, maybe less if you send differential position data, but what worries me most is the voice part of the report. This would need to be wideband to provide something useful - specially if you consider that you're going to have a noisy signal, coming from a moving car. Using a narrowband device to send position data and then a wideband one to send voice seems like an unlikely option - just my opinion. A better option, me thinks, would be a GSM cellular phone. You have freq hopping, wideband signal all built in, voice and data capabilities. If you assume that the passenger of the vehicle would have one cellular phone, at least, given the subject's nature, then you could turn on and off the phone as needed when the car is moving. I suppose that full TSCM sweeps would not be performed while the vehicle moved, and even if some form of permanent detection device was fitted, it wouldn't be able to distinguish between the passenger's phone and the one hidden in the roof. This way you don't need satellites (location can be done via the GSM network), you don't need visible antennas, and you have a low power device that only consumes 10mA max at rest, phone on, and maybe less than a mA with just the microprocessor on and sleeping. All the best, Mike -----Mensaje original----- De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] Enviado el: miercoles, 22 de noviembre de 2000 19:53 Para: TSCM-L@egroups.com Asunto: RE: [TSCM-L] Truth or imagination Ah... but keep in mind if you keep the signal bandwidth narrow enough you can work a satellite on only a few milliwatts or less. Beeping out a position can be extremely narrow band, and if the signal repetition rate is kept spaced far enough apart the signal would be tough to find during a TSCM sweep (not impossible... just tough). 1971 From: Steve Uhrig Date: Wed Nov 22, 2000 8:59pm Subject: Self contained receiving system FS Hello list, I happened across an interesting item recently, purchased from an overseas listening post. The unit is a very wideband receiving system, from 100 kc to 2036 megacycles. It receives narrow FM, wide FM, AM, CW and SSB. It consists of a compact desktop console containing an ICOM R100 receiver, 110 VAC power supply, Active Antenna/Preselector from 0-100 megacycles, and adjustable BFO for CW/SSB tuning. It can be powered by 110 VAC or 12 VDC. The entire thing is an integrated system. Make one connection to power, connections to antennas, and use it to tune anything from low frequency to AM, FM and television broadcast audio, to cellular, virtually all amateur frequencies, shortwave broadcast, military, all public safety including 800 megacycles, practically any possible surveillance frequency to low microwave. The receiver scans, has memories, and timers to turn it on and off at preset times. The Active Antenna and Preselector is a tunable antenna and amplifier section. This lets you use a small antenna and tune it for resonance at various frequencies. It provides incredible sensitivity. The Preselector removes unwanted frequencies before they even get into the receiver, allowing for a high gain preamp without overloading or generating images. It is sitting here on my desk with a clip lead for an antenna, listening to Radio Moscow strong and clear. There also is a decent front facing speaker for loud clear audio. This could have application as a surveillance listening post, TSCM receiver or general monitoring receiver for your bench, vehicle or desktop. If nothing else, it incorporates an ICOM R100 full coverage receiver (including the cellular frequencies which are restricted in all consumer equipment). The system is in nice condition. While it is very easy to operate, the user should have some communications expertise to get the maximum utility from this piece. Price for the package is $850. I do take credit cards. Email me to purchase it and you could have it by early next week. Any list member purchasing this will receive several free goodies with their order. Happy Thanksgiving to all. Take a minute to make a mental list of all the things you can thank God for, then do so. 99% of the people on this planet do not live as well as you do. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 1972 From: Jay Coote Date: Thu Nov 23, 2000 4:01pm Subject: Re: Truth or imagination Of possible interest, the TELETRAC vehicle recovery (and commercial tracking system) uses cellular-like technology to provide a display of moving or stationary vehicles on a computer map. The subscriber pays a fee to log on, and additional fee for each query. Queries of the tracking transponder may be set from every second to hours or to off. No sats or GPS involved, just triangulating and calculating time delays. The signal is in the 900-Mhz area. The transponder package is about 1 x 3 x 5 inches. There is a plug/jack with power and control leads for alarm or switching options. The antenna connector is TNC or SMA, and will work with a dribble antenna or a flat "patch" antenna which hides nicely under nonmetallic vehicle plastic or fabric. I think TX power is 1-2 watts. Jay ---------- > Yes, you could use a system which used some form of narrowband bitstream to > send out compressed coordinates - data like lat/long date, time, speed and > heading can be compressed into 72 bits, maybe less if you send differential > position data, but what worries me most is the voice part of the report. > This would need to be wideband to provide something useful - specially if > you consider that you're going to have a noisy signal, coming from a moving > car. > > Using a narrowband device to send position data and then a wideband one to > send voice seems like an unlikely option - just my opinion. > > A better option, me thinks, would be a GSM cellular phone. You have freq > hopping, wideband signal all built in, voice and data capabilities. If you > assume that the passenger of the vehicle would have one cellular phone, at > least, given the subject's nature, then you could turn on and off the phone > as needed when the car is moving. I suppose that full TSCM sweeps would not > be performed while the vehicle moved, and even if some form of permanent > detection device was fitted, it wouldn't be able to distinguish between the > passenger's phone and the one hidden in the roof. > > This way you don't need satellites (location can be done via the GSM > network), you don't need visible antennas, and you have a low power device > that only consumes 10mA max at rest, phone on, and maybe less than a mA with > just the microprocessor on and sleeping. > > All the best, > > Mike > > -----Mensaje original----- > De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] > Enviado el: miercoles, 22 de noviembre de 2000 19:53 > Para: TSCM-L@egroups.com > Asunto: RE: [TSCM-L] Truth or imagination > > Ah... but keep in mind if you keep the signal bandwidth narrow enough > you can work a satellite on only a few milliwatts or less. > > Beeping out a position can be extremely narrow band, and if the > signal repetition rate is kept spaced far enough apart the signal > would be tough to find during a TSCM sweep (not impossible... just > tough). > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1973 From: Dawn Star Date: Thu Nov 23, 2000 10:08pm Subject: Truth or Imagination "Ah... but keep in mind if you keep the signal bandwidth narrow enough you can work a satellite on only a few milliwatts or less. Beeping out a position can be extremely narrow band, and if the signal repetition rate is kept spaced far enough apart the signal would be tough to find during a TSCM sweep (not impossible... just tough)." -jma My comment was not so directed at power amplifier formats or bandwidth but that a vehicle is one gigantic ground plane. To try to transmit through the frame or out from under it and reach a satellite is a going to take mucho watts requiring jumbo batteries/ large power consumption. Roger [Non-text portions of this message have been removed] 1974 From: Dawn Star Date: Thu Nov 23, 2000 10:23pm Subject: Vehicle Sweeps "I suppose that full TSCM sweeps would not be performed while the vehicle moved," Miguel raises an interesting point here. When I have swept airplanes in the past I've always had the pilot take the plane up to cruising altitude during my tests. This to pick up any altitude triggered device. Now on car sweeps I usually go with the car running after the car has been moved a short distance. I wonder if we need to enable things such as dedicated auto cell phones and any other accessory equipment. Roger [Non-text portions of this message have been removed] 1975 From: Date: Thu Nov 23, 2000 10:54pm Subject: Re: Vehicle Sweeps Depends on what cycle you are in - good hunting 1976 From: Jason Counts Date: Wed Nov 22, 2000 5:00pm Subject: Tech Security tools Hi, I'm new here, but I joined because this field holds the most interest for me. I was thinking about starting an electronic and computer/network security firm. I would like to know of a good resource that offers the tools ones needs to do this type work. Most places I've seen only offer them to Government agencies. How would a commercial customer get ahold of these tools. I speak of IDS's (Network and physical), survaillence equipment, and forensic analysis software. Does anyone know of a resource that matches these specs? If so, email me. Thanx, i really dig this group. Jason Counts Network Specialist WD Net, Inc. 1977 From: Gordon Mitchell Date: Sat Nov 25, 2000 10:43am Subject: Re: Tech Security tools You are right. This is an interesting group. Likely you will find info that is closer to what you are looking for at the following, however: www.sans.org Sans is a broad based resource for network security work. They have respected conferences with the most complete courses on intrusion detection that I have seen. Some of the courses are on line. htcc@egroups.com This listserv is oriented toward the forensic side of your question. There are lots of vendor sites in the areas that you mention. You can chase them down with a search engine. Gordon Mitchell Future Focus, Inc Woodinville, WA Electronic eavesdropping detection & finding clues in computers Jason Counts wrote: > > Hi, I'm new here, but I joined because this field holds the most > interest for me. I was thinking about starting an electronic and > computer/network security firm. I would like to know of a good > resource that offers the tools ones needs to do this type work. Most > places I've seen only offer them to Government agencies. How would a > commercial customer get ahold of these tools. I speak of IDS's > (Network and physical), survaillence equipment, and forensic analysis > software. Does anyone know of a resource that matches these specs? If > so, email me. Thanx, i really dig this group. > > Jason Counts > Network Specialist > WD Net, Inc. > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 1978 From: William Knowles Date: Sat Nov 25, 2000 8:44pm Subject: Re: Tech Security tools On Wed, 22 Nov 2000, Jason Counts wrote: > Hi, I'm new here, but I joined because this field holds the most > interest for me. I was thinking about starting an electronic and > computer/network security firm. I would like to know of a good > resource that offers the tools ones needs to do this type work. > Most places I've seen only offer them to Government agencies. How > would a commercial customer get ahold of these tools. I speak of > IDS's (Network and physical), survaillence equipment, and forensic > analysis software. Does anyone know of a resource that matches > these specs? If so, email me. Thanx, i really dig this group. Probably the best all-around bet for getting network security tools and some grey hat tools tested before posting to the site is Packetstorm. http://packetstorm.securify.com/ Another site worth watching is Attrition, Attrition archives defaced and compromised websites: http://www.attrition.org/mirror/attrition Here's a local security practice's archive page: http://archives.neohapsis.com/ I also highly recommend that you check out these two sites. eEye Digital Security, Watch out for these guys in the future, I feel their tool Retina finds more vulerabilities and alot less false positives than say the ISS scanner, and is considerably less expensive. http://www.eeye.com Rain Forest Puppy: http://www.wiretrip.net/rfp While I am at it, Time for a shameless plug for ISN: InfoSec News is a mailing list I moderate for the daily distribution of computer security news, with about 5-7 messages a day, 5-7 times a week. http://www.c4i.org/isn.html Jason, and the rest of the list, I hope this helps! Cheers! William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 1979 From: Talisker Date: Sat Nov 25, 2000 0:22pm Subject: Re: Tech Security tools Jason I maintain just such a site, it details every known commercial IDS, vulnerability scanner and corporate anti virus solution. I'm currently working towards similar goals with firewalls - I have appliances and personal firewalls sorted but the software enterprise firewalls is an uphill struggle As to TSCM I am hoping to put up a page devoted to TSCM tools, but I suspect that it won't materialise until early next year - though there is a TEMPEST FAQ I've recently started a mailing list informing subscribers of new tools found and vulnerabilities on existing security tools security-tools-Subscribe@egroups.com http://www.egroups.com/subscribe/security-tools Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo talisker@n... The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "Jason Counts" To: Sent: Wednesday, November 22, 2000 11:00 PM Subject: [TSCM-L] Tech Security tools > Hi, I'm new here, but I joined because this field holds the most > interest for me. I was thinking about starting an electronic and > computer/network security firm. I would like to know of a good > resource that offers the tools ones needs to do this type work. Most > places I've seen only offer them to Government agencies. How would a > commercial customer get ahold of these tools. I speak of IDS's > (Network and physical), survaillence equipment, and forensic analysis > software. Does anyone know of a resource that matches these specs? If > so, email me. Thanx, i really dig this group. > > Jason Counts > Network Specialist > WD Net, Inc. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1980 From: mike f Date: Sun Nov 26, 2000 7:00pm Subject: RE: Tech Security tools Deanna did U C the email below? mike -----Original Message----- From: William Knowles [mailto:wk@c...] Sent: Saturday, November 25, 2000 9:44 PM To: Jason Counts Cc: TSCM-L@egroups.com Subject: Re: [TSCM-L] Tech Security tools On Wed, 22 Nov 2000, Jason Counts wrote: > Hi, I'm new here, but I joined because this field holds the most > interest for me. I was thinking about starting an electronic and > computer/network security firm. I would like to know of a good > resource that offers the tools ones needs to do this type work. > Most places I've seen only offer them to Government agencies. How > would a commercial customer get ahold of these tools. I speak of > IDS's (Network and physical), survaillence equipment, and forensic > analysis software. Does anyone know of a resource that matches > these specs? If so, email me. Thanx, i really dig this group. Probably the best all-around bet for getting network security tools and some grey hat tools tested before posting to the site is Packetstorm. http://packetstorm.securify.com/ Another site worth watching is Attrition, Attrition archives defaced and compromised websites: http://www.attrition.org/mirror/attrition Here's a local security practice's archive page: http://archives.neohapsis.com/ I also highly recommend that you check out these two sites. eEye Digital Security, Watch out for these guys in the future, I feel their tool Retina finds more vulerabilities and alot less false positives than say the ISS scanner, and is considerably less expensive. http://www.eeye.com Rain Forest Puppy: http://www.wiretrip.net/rfp While I am at it, Time for a shameless plug for ISN: InfoSec News is a mailing list I moderate for the daily distribution of computer security news, with about 5-7 messages a day, 5-7 times a week. http://www.c4i.org/isn.html Jason, and the rest of the list, I hope this helps! Cheers! William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1981 From: Jordan Ulery Date: Sun Nov 26, 2000 7:16pm Subject: Plus Guard electronic bug finder? Has anybody heard of this instrument? Subject: Plus Guard Electronic Bug Finder Message=You have received this email because the above person has recommended The Plus Guard to you! The Plus Guard will find Hidden Cameras and Eavesdroppers BEFORE your privacy is Invaded! Calm your fears of being under surveillance by peeping toms or stalkers! I suggest you click on this link and give them a visit. http://www.theplusguard.com From: contranl Date: Thu Nov 18, 2004 3:22pm Subject: I'm under attack ? ! ? . This is probably slightly off-topic ...sorry for that But i suppose someone out here can tell me what this is ? Since a few days i have a new PC with a new Norton internet security and anti-virus package. Today Norton told me 2 times that i am under attack and that "they" are trying to get into my computer it also talks about trojan stuff Norton told me about 2 ip adresses where these attacks come from if you click on these numbers a map shows up showing the physical locations of these ip-adresses: One is in Korea and the other one in Iran Have a look at the details Norton gave me on the last one: ----------------------------------------- inetnum: 62.193.0.0 - 62.193.31.255 org: ORG-DI3-RIPE netname: IR-DPI-20000717 descr: DP IRAN descr: PROVIDER country: IR admin-c: NN124-RIPE tech-c: FA2406-RIPE status: ALLOCATED PA mnt-by: RIPE-NCC-HM-MNT mnt-lower: DPI-MNT changed: hostmaster@r... 20000717 changed: hostmaster@r... 20020419 changed: hostmaster@r... 20020423 changed: hostmaster@r... 20020613 changed: hostmaster@r... 20020711 source: RIPE inetnum: 62.193.4.0 - 62.193.5.255 netname: DPI descr: Dialup Router ( Gozare1 ) - Data Processing Of Iran country: IR admin-c: FND4-RIPE tech-c: FA2406-RIPE status: ASSIGNED PA notify: dadgar@d... notify: faranak@d... mnt-by: DPI-MNT changed: krazavi@d... 20021028 changed: faranak@d... 20040704 source: RIPE % RIPE database, last updated Nov 17, 2004 12:09:57 AM ------------------------------------------------------- To be clear this does not happen while i am surfing the internet or downloading anything... i have a website but that runs at my host's location not here on my home pc What i understand of it is that they are directly attacking my PC God knows why me. What the hell is this ? I am not the Pentagon !! Is this normal business as usual ? Does everyone have these attacks on a daily base ? and are they part of let's call it mass-attacks to thousands of PC's ? From these same spooky countries ? Or am i specifically attacked here ? Thanks for any answers Tetrascanner www.tetrascanner.com 10166 From: Michael Puchol Date: Thu Nov 18, 2004 4:36pm Subject: Re: I'm under attack ? ! ? Hi, You shouldn't worry too much, unless your computer is open to the external world. A good hardware or if not possible / costly, software firewall works great against this sort of stuff. ZoneAlarm would be my recommendation if you want to go software. Norton is OK, although it doesn't have the granularity that ZA has IMHO. What you are most likely getting are automated port scans, and possibly connection attempts, which are making Norton balk. This is normal, every IP on the internet gets a few of these every day, so in most cases it's futile to try and wade through the hundreds of entries you'll end up with in your logs. As I say, don't worry too much. If you have DSL, and have a choice, place a router, not a modem, between the WAN and your computer(s), it offers just one more layer of protection (if correctly configured). To answer a bit more specifically: > What the hell is this ? It's called a port scan, and they run by the thousands and thousands all day long all over the internet. Compromised machines will start scanning themselves looking for other potential "costumers". > I am not the Pentagon !! Really? They get port scans too, and believe me, if they dispatched a tomahawk to every IP they got a scan from, the planet would be flat by now. > Is this normal business as usual ? Yep. What you should look for are more dedicated attacks, i.e. if you get a lot of scans from one IP during a period of time, or you get a scan on a few ports every so often from the same IP or a similar netblock it could indicate a targeted attack. There are certain patterns that are more worrying, but as you are not the Pentagon, you shouldn't worry, you most likely don't have all the pirates in Iran and Korea trying to get into your PC. > Does everyone have these attacks on a daily base ? and are they part > of let's call it mass-attacks to thousands of PC's ? Yes. Nowadays, viruses and worms spread not only via email and stupid people, but they attack specific ports and services that are known vulnerable, and which may be open on a large number of computers exposed to the internet. > From these same spooky countries ? From any country. Some worms/viruses/trojans scan their own netblocks, others pick totally random ranges, others have pre-programmed ranges to scan, there isn't really one rule for all. They could be using open proxies, so you can't even trust the IP to be the real one. > Or am i specifically attacked here ? No, everyone is attacked. As an example, an out-of-the-box RedHat Linux 6.3 computer exposed to the internet will be compromised in about 10 to 20 minutes in one way or another, maybe even faster. With the (excuse my french) shitstorm going on on the net, you couldn't even have enough time to download patches for your Windows or Linux systems before they are hit, if you don't take other in-between measures. Don't worry too much, and remember: keep thy system patched, and thy antivirus updated. Best regards, Mike 10167 From: kondrak Date: Thu Nov 18, 2004 6:17pm Subject: Re: I'm under attack ? ! ? Chances are it's a faked address, as I dont believe theres many dial-ups in Iran. The whole thing might be a ruse from the get-go. They're trying to compromise as many machines as possible for a "bot-net", an army of zombie machines that can be used for anything from actually conducting net-centric warfare, to sending spam. I tend to lean twords the latter, and think it's prob the spamsters faking addresses. The spamsters are starting to feel the pressure, and attempting to compromise as many machines as possible. Don't recall Norton contacting anyone about anything other than to demand more money. At 16:22 11/18/2004, you wrote: >. > >This is probably slightly off-topic ...sorry for that >But i suppose someone out here can tell me what this is ? > >Since a few days i have a new PC with a new Norton internet security >and anti-virus package. > >Today Norton told me 2 times that i am under attack and that "they" >are trying to get into my computer it also talks about trojan stuff > >Norton told me about 2 ip adresses where these attacks come from >if you click on these numbers a map shows up showing the physical >locations of these ip-adresses: > >One is in Korea and the other one in Iran > >Have a look at the details Norton gave me on the last one: > >----------------------------------------- > >inetnum: 62.193.0.0 - 62.193.31.255 >org: ORG-DI3-RIPE >netname: IR-DPI-20000717 >descr: DP IRAN >descr: PROVIDER >country: IR >admin-c: NN124-RIPE >tech-c: FA2406-RIPE >status: ALLOCATED PA >mnt-by: RIPE-NCC-HM-MNT >mnt-lower: DPI-MNT >changed: hostmaster@r... 20000717 >changed: hostmaster@r... 20020419 >changed: hostmaster@r... 20020423 >changed: hostmaster@r... 20020613 >changed: hostmaster@r... 20020711 >source: RIPE > >inetnum: 62.193.4.0 - 62.193.5.255 >netname: DPI >descr: Dialup Router ( Gozare1 ) - Data Processing Of Iran >country: IR >admin-c: FND4-RIPE >tech-c: FA2406-RIPE >status: ASSIGNED PA >notify: dadgar@d... >notify: faranak@d... >mnt-by: DPI-MNT >changed: krazavi@d... 20021028 >changed: faranak@d... 20040704 >source: RIPE > >% RIPE database, last updated Nov 17, 2004 12:09:57 AM > >------------------------------------------------------- > >To be clear this does not happen while i am surfing the internet >or downloading anything... i have a website but that runs at my >host's location not here on my home pc > >What i understand of it is that they are directly attacking my PC >God knows why me. > >What the hell is this ? >I am not the Pentagon !! >Is this normal business as usual ? >Does everyone have these attacks on a daily base ? and are they part >of let's call it mass-attacks to thousands of PC's ? > From these same spooky countries ? >Or am i specifically attacked here ? > > >Thanks for any answers > >Tetrascanner >www.tetrascanner.com > > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10168 From: kondrak Date: Thu Nov 18, 2004 6:20pm Subject: Re: I'm under attack ? ! ? Couldn't agree with you more Michael....I love my Penguin and IPtables. At 17:36 11/18/2004, you wrote: >Hi, > >You shouldn't worry too much, unless your computer is open to the external >world. A good hardware or if not possible / costly, software firewall works >great against this sort of stuff. ZoneAlarm would be my recommendation if >you want to go software. Norton is OK, although it doesn't have the >granularity that ZA has IMHO. > >What you are most likely getting are automated port scans, and possibly >connection attempts, which are making Norton balk. This is normal, every IP >on the internet gets a few of these every day, so in most cases it's futile >to try and wade through the hundreds of entries you'll end up with in your >logs. > >As I say, don't worry too much. If you have DSL, and have a choice, place a >router, not a modem, between the WAN and your computer(s), it offers just >one more layer of protection (if correctly configured). > >To answer a bit more specifically: > > > What the hell is this ? > >It's called a port scan, and they run by the thousands and thousands all day >long all over the internet. Compromised machines will start scanning >themselves looking for other potential "costumers". > > > I am not the Pentagon !! > >Really? They get port scans too, and believe me, if they dispatched a >tomahawk to every IP they got a scan from, the planet would be flat by now. > > > Is this normal business as usual ? > >Yep. What you should look for are more dedicated attacks, i.e. if you get a >lot of scans from one IP during a period of time, or you get a scan on a few >ports every so often from the same IP or a similar netblock it could >indicate a targeted attack. There are certain patterns that are more >worrying, but as you are not the Pentagon, you shouldn't worry, you most >likely don't have all the pirates in Iran and Korea trying to get into your >PC. > > > Does everyone have these attacks on a daily base ? and are they part > > of let's call it mass-attacks to thousands of PC's ? > >Yes. Nowadays, viruses and worms spread not only via email and stupid >people, but they attack specific ports and services that are known >vulnerable, and which may be open on a large number of computers exposed to >the internet. > > > From these same spooky countries ? > > From any country. Some worms/viruses/trojans scan their own netblocks, >others pick totally random ranges, others have pre-programmed ranges to >scan, there isn't really one rule for all. They could be using open proxies, >so you can't even trust the IP to be the real one. > > > Or am i specifically attacked here ? > >No, everyone is attacked. As an example, an out-of-the-box RedHat Linux 6.3 >computer exposed to the internet will be compromised in about 10 to 20 >minutes in one way or another, maybe even faster. With the (excuse my >french) shitstorm going on on the net, you couldn't even have enough time to >download patches for your Windows or Linux systems before they are hit, if >you don't take other in-between measures. > >Don't worry too much, and remember: keep thy system patched, and thy >antivirus updated. > >Best regards, > >Mike > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10169 From: Thomas Shaddack Date: Thu Nov 18, 2004 7:16pm Subject: Re: I'm under attack ? ! ? On Thu, 18 Nov 2004, kondrak wrote: > > Chances are it's a faked address, as I dont believe theres many dial-ups in > Iran. It is also possible that the geolocation information the firewall in question uses is stale. It may be quite well somewhere in China or basically anywhere else. I played with geolocation stuff recently, and the free things available often show information more than 4 years old. This is WHOIS, so it should be more accurate, but one never knows for sure. But Iran isn't as backwards as it may seem. > The whole thing might be a ruse from the get-go. Such kind of scanning is about as common as rain and about as annoying. All we can do is to have umbrellas. I recognize two kinds of scans: "horizontal", and "vertical" (when the x axis is the IP address space, and Y axis is the port number space). Horizontal scans are the most common ones; the adversary (being it a script kid with too much time or a worm with a mission) tries address by address, for a known service with a known vulnerability running there. This is so common it is just a background noise. The most common ports here are 135 and 445 (Windows disk shares), 80 (webservers, usually MS-IIS), 25 (spammers looking for open relays), 1080 (same looking for SOCKS proxies), 8080 and 3128 (HTTP/HTTPS proxies), and many many more. I suggest to take the presence of such events as a proof that the firewall reporting system is working. Much more perilous are vertical scans. That means somebody aims their spotlight at your machine, and tries many (or all) services, if they are present, and if so, further probe and possibly exploit is potentially used (if the aim is compromise the machine, not just use it as-is, as in case of open proxies and relays). Common event following a successful finding of an open port is an attempt to bruteforce passwords. Especially common it is with FTP servers, SSH and telnet accounts, and with Windows shares. Most people are dumb and use easy-to-guess passwords (a dictionary word, often "password") in exposed locations. There is even a worm that does this. I think even the very first worm, the Morris one, had a short password bruteforce list. The port numbers are important. The IP address says where the event comes from (if not spoofed, but that's unusual for TCP/SYN packets), but the port number carries its meaning. > They're trying to compromise as many machines as possible for a "bot-net", > an army of zombie machines that can be used for anything from actually > conducting net-centric warfare, to sending spam. The most dangerous feature of botnets is their ability to unleash DDoS attacks. It is very difficult to defend against that; it's being said that the most effective way is to trace (by hacking through the chain of the machines (compromised host -> IRC network -> find the IRC server the adversary uses to command the botnet -> disable or arrest the adversary), or, if the adversary wants money or communicates, by following the transaction or communication) one's way back to the perpetrator, the person behind the botnet, and take him down. > I tend to lean twords the latter, and think it's prob the spamsters faking > addresses. The spamsters are starting to feel the pressure, and attempting > to compromise as many machines as possible. The use of botnets is wide and plentiful. Russian DDoS blackmailers, spam kings... - everybody can use a swarm of disposable machines. > Don't recall Norton contacting anyone about anything other than to demand > more money. Two words: big company. > >To be clear this does not happen while i am surfing the internet > >or downloading anything... i have a website but that runs at my > >host's location not here on my home pc You have a public IP address, you get scans. Quite like if you are standing in the rain you get drops falling on you. > >What i understand of it is that they are directly attacking my PC > >God knows why me. Because it's there. > >What the hell is this ? Normal "network weather", and not too bad one. > >I am not the Pentagon !! Pentagon gets it much worse. > >Is this normal business as usual ? Yes. :) > >Does everyone have these attacks on a daily base ? and are they part > >of let's call it mass-attacks to thousands of PC's ? > > From these same spooky countries ? The sources vary. Couple months ago I got some loser attempting to bruteforce my machine from Israel (and many more, but I remember this one because I was in the mood and counterscanned him and he had the machine wide-open; I got his ICQ number from the exposed disk, and was very tempted to chat him up and spook him a bit). The attack signature suggested a warez-dude script-kid looking for some FTP space to trade stuff through. I got more "practice targets" trying their luck on my machines, but I am not in the counteroffensive mood that often. Maybe I should automate it... (Other, gentler possibility is to identify the adversary and tell the firewall that all packets from the given IP are to be ignored. Dummy services laying under listening ports on the firewall like antipersonnel mines are excellent for this, as the TCP syn/synack/ack three-way handshake in combination with a good randomness for the TCP sequence numbers (to prevent spoofing) can serve as the IP address authentication. It's quite weak mechanism, though, so a whitelist of friends is suggested to avoid an adversary purposefully firewalling you from your own machine, turning your own weapon against you. I have this in a stripped down form on my experimental machine; if somebody steps on the mine, he gets firewalled off and I get a mail with a WHOIS lookup of the offender.) Most often the adversary is somebody who just downloaded some l33t t00lz and more attitude than experience. Simple passive measures (firewall) together with a healthy dose of zen help here. They are fairly harmless, if annoying (though don't provoke them without reason, you never know if they have a botnet capable of DDoSing you offline for weeks); most will get bored with it (though only to be replaced with the next generation), a small fraction will grow up to good security specialists. This fraction is worth of the bother with the rest. *Really* good adversaries are rare and far between. Their characteristical trait is that you never realize they "visited" you, at least not until it is too late. > >Or am i specifically attacked here ? Most likely not. If you'd get a lot of connection attempts with different passwords and/or usernames to an exposed service, then you're under attack (most likely by some script kid). Same if you get a lot of probes from same source to different ports. Or if you get a flood of packets you can't cope with (DoS/DDoS attack). Don't panic. Don't expose more services than you have to. Occassionally read the firewall logs, in order to get used to what's normal. And keep in mind many attacks go right through the firewall; eg. embedded in an email, fetched by the client. A firewall will help against "port-borne" things like Code Red or Nimda or MSBlast, but won't be effective against "mail-borne" stuff like Mydoom or Bagle or Netsky or the infamous ILoveYou. Other measures have to be applied there. The one seriously bad thing about the "noise" on the Net is that many genuine attack attempts may get hidden in it. However, full-effect response to every port scan is just not economical, at least in normal corporate settings. 10170 From: Tommy W. DeArmond Date: Thu Nov 18, 2004 8:15am Subject: BlackBerry prickles Department of Defence spooks Title: BlackBerry prickles Department of Defence spooks Source: The Age Date Written: November 16, 2004 Date Collected: November 17, 2004 Australia's Defence Signals Directorate (DSD) has prohibited the use of BlackBerry devices to transmit confidential or secret information or to connect to systems holding such information. Users may handle unclassified, "in-confidence", and restricted information with the devices. BlackBerry devices provide access to e-mail from any location, and have become popular among corporations in the United States. Telstra, one BlackBerry service provider, insists the devices are secure, noting that officials in finance, industry, the CIA (Central Intelligence Agency), and the US Defense Department use the devices. Paul Osmond, regional director for BlackBerry developer Research in Motion, applauds the decision, since it lifts the complete prohibition Defence placed on the devices in 2003. The DSD will review its guidelines for BlackBerry use in February 2005 with input from Research in Motion and internet service providers. http://www.theage.com.au/articles/2004/11/15/1100384480556.html [Non-text portions of this message have been removed] 10171 From: netcmdd Date: Thu Nov 18, 2004 3:53pm Subject: Re: I'm under attack ? ! ? Contranl: These types of "attacks" happen all the time, so I wouldn't get too excited. I'm a network security analyst and handle digital forensic investigations and intrusions all the time. Home PCs running personal firewalls are helpful, but it take a couple days to get used to seeing these packets coming at your system if you have never seen them before. Don't be alarmed if you get these "attack" packets (did the firewall tell you what ports they were hitting or what was in the payload of the packet?). Any unsolicited packet from an outside address will cause one of these alerts. Also, it is likely these people could attacking you, but it's an automated scanner attacking (sending an attack) to every single machine in your class-c -- and probably much wider. These people scan bulk address space and send one or more attacks at every IP address. The tool either records machines that are vulnerable to the attack or automatically hacks the target and installs some malware. There are all kinds of worms that do this as well. You could be "attacked" (scanned is probably a better term because you haven't been compromised) by systems which themselves are infected. Today, there are worms that spread to create spam/bot nets. Spammers used these compromised systems to send spam or launch DDoS attacks against extortion targets: http://news.com.com/Expert+Online+extortion+growing+more+common/2100-7349_3-5403162.html If you see an attack that sets off many (40+) notifications, it's also likely to be one of these automated scanners. However, you should use a bit more caution if you see this, sending 40+ attacks obviously increases their odds of finding something your system is vulnerable to. Plus, your system should be secure even if you aren't sitting there to watch this stuff happening. You should learn to harden your system. This tool will help as a first step: http://www.microsoft.com/technet/security/tools/mbsahome.mspx If you want an even better idea of what is hitting you and what these attacks might be, try snort: http://www.snort.org/ http://www.snort.org/dl/binaries/win32/ Snort is an IDS and packets coming inbound to your system are inspected for attack signatures. If you are attacked by some known exploit, snort will alert you based on the payload in the packet matching the attack signature. This reduces the level of false positives (like you are kind of experiencing now). I'd suggest getting a hardware firewall and the personal firewall. The hardware firewall will block the bulk of these packets and the software will add an extra layer of protection. Make sure you configure the firewalls properly or they are essentially useless. Today, everyone on the Internet is under some type of attack, be it automated scanners, worms, or specifically targeted by attackers (uncommon). You are just suddenly seeing that which was always there. --- In TSCM-L@yahoogroups.com, "contranl" wrote: > > . > > This is probably slightly off-topic ...sorry for that > But i suppose someone out here can tell me what this is ? > > Since a few days i have a new PC with a new Norton internet security > and anti-virus package. > > Today Norton told me 2 times that i am under attack and that "they" > are trying to get into my computer it also talks about trojan stuff > > Norton told me about 2 ip adresses where these attacks come from > if you click on these numbers a map shows up showing the physical > locations of these ip-adresses: > > One is in Korea and the other one in Iran > > Have a look at the details Norton gave me on the last one: > > ----------------------------------------- > > inetnum: 62.193.0.0 - 62.193.31.255 > org: ORG-DI3-RIPE > netname: IR-DPI-20000717 > descr: DP IRAN > descr: PROVIDER > country: IR > admin-c: NN124-RIPE > tech-c: FA2406-RIPE > status: ALLOCATED PA > mnt-by: RIPE-NCC-HM-MNT > mnt-lower: DPI-MNT > changed: hostmaster@r... 20000717 > changed: hostmaster@r... 20020419 > changed: hostmaster@r... 20020423 > changed: hostmaster@r... 20020613 > changed: hostmaster@r... 20020711 > source: RIPE > > inetnum: 62.193.4.0 - 62.193.5.255 > netname: DPI > descr: Dialup Router ( Gozare1 ) - Data Processing Of Iran > country: IR > admin-c: FND4-RIPE > tech-c: FA2406-RIPE > status: ASSIGNED PA > notify: dadgar@d... > notify: faranak@d... > mnt-by: DPI-MNT > changed: krazavi@d... 20021028 > changed: faranak@d... 20040704 > source: RIPE > > % RIPE database, last updated Nov 17, 2004 12:09:57 AM > > ------------------------------------------------------- > > To be clear this does not happen while i am surfing the internet > or downloading anything... i have a website but that runs at my > host's location not here on my home pc > > What i understand of it is that they are directly attacking my PC > God knows why me. > > What the hell is this ? > I am not the Pentagon !! > Is this normal business as usual ? > Does everyone have these attacks on a daily base ? and are they part > of let's call it mass-attacks to thousands of PC's ? > From these same spooky countries ? > Or am i specifically attacked here ? > > > Thanks for any answers > > Tetrascanner > www.tetrascanner.com 10172 From: Daryl Adams Date: Thu Nov 18, 2004 5:16pm Subject: RE: I'm under attack ? ! ? Can you be a little more specific? Has Norton alerted to traffic inbound? Outbound to addresses in the netblocks that you have listed below? Whichever, I'd be curious to know what the source and destination ports are. It may have just been a random port probe, or it may have been, as your firewall seems to allude to, a trojan, attempting to make an outbound connection from your machine, to the "mothership" to upload or pass some info or control to someone else. Maybe an email message or download you did prior to getting Norton? I'd update and run antivius all the way through for some level of comfort, and write back. I'm curious now. Thx. >From: "contranl" >Reply-To: TSCM-L@yahoogroups.com >To: TSCM-L@yahoogroups.com >Subject: [TSCM-L] I'm under attack ? ! ? >Date: Thu, 18 Nov 2004 21:22:24 -0000 > > >. > >This is probably slightly off-topic ...sorry for that >But i suppose someone out here can tell me what this is ? > >Since a few days i have a new PC with a new Norton internet security >and anti-virus package. > >Today Norton told me 2 times that i am under attack and that "they" >are trying to get into my computer it also talks about trojan stuff > >Norton told me about 2 ip adresses where these attacks come from >if you click on these numbers a map shows up showing the physical >locations of these ip-adresses: > >One is in Korea and the other one in Iran > >Have a look at the details Norton gave me on the last one: > >----------------------------------------- > >inetnum: 62.193.0.0 - 62.193.31.255 >org: ORG-DI3-RIPE >netname: IR-DPI-20000717 >descr: DP IRAN >descr: PROVIDER >country: IR >admin-c: NN124-RIPE >tech-c: FA2406-RIPE >status: ALLOCATED PA >mnt-by: RIPE-NCC-HM-MNT >mnt-lower: DPI-MNT >changed: hostmaster@r... 20000717 >changed: hostmaster@r... 20020419 >changed: hostmaster@r... 20020423 >changed: hostmaster@r... 20020613 >changed: hostmaster@r... 20020711 >source: RIPE > >inetnum: 62.193.4.0 - 62.193.5.255 >netname: DPI >descr: Dialup Router ( Gozare1 ) - Data Processing Of Iran >country: IR >admin-c: FND4-RIPE >tech-c: FA2406-RIPE >status: ASSIGNED PA >notify: dadgar@d... >notify: faranak@d... >mnt-by: DPI-MNT >changed: krazavi@d... 20021028 >changed: faranak@d... 20040704 >source: RIPE > >% RIPE database, last updated Nov 17, 2004 12:09:57 AM > >------------------------------------------------------- > >To be clear this does not happen while i am surfing the internet >or downloading anything... i have a website but that runs at my >host's location not here on my home pc > >What i understand of it is that they are directly attacking my PC >God knows why me. > >What the hell is this ? >I am not the Pentagon !! >Is this normal business as usual ? >Does everyone have these attacks on a daily base ? and are they part >of let's call it mass-attacks to thousands of PC's ? >From these same spooky countries ? >Or am i specifically attacked here ? > > >Thanks for any answers > >Tetrascanner >www.tetrascanner.com > > > > > > > > > > 10173 From: mark de Boer Date: Fri Nov 19, 2004 0:52am Subject: Glass fiber Hi list, Recently i attended a fluke course on OTDR, Fluke has made a great test tool for checking glass fiber, the Optifiber. The question that i know have is, Can a single mode glass fiber be opened to tap the data without a network losing substantial capacity, with data flow up to 10 Gb in two directions it seems to me that that can't work. Is glass fiber testing with OTDR therefore necessary or is a less advanced method like a glass fiber microscope with visual inspection sufficient. Marc RRBSecurity. --------------------------------- ALL-NEW Yahoo! Messenger - all new features - even more fun! [Non-text portions of this message have been removed] 10174 From: Javier Villanueva Date: Thu Nov 18, 2004 10:17pm Subject: Re: I'm under attack ? ! ? Don¥t trust only your firewall to protect your privacy. If you want maximum security, consider the following: 1. Use a good firewall (OK, you¥ve got one) 2. Use a good antivirus (OK, you¥ve got one) 3. Keep your system patched. If you don¥t, you deserve to be hacked! 4. Use antispyware tools. Spyware is malicious code inserted by web sites while surfing. Used to hijack your browser, read your cookies, etc. Best are: Spybot Search & Destroy http://www.safer-networking.org/en/index.html Ad-aware SE Personal Edition http://www.lavasoft.de/ 5. Use Mozilla Firefox, instead of Internet Explorer (lot less known vulnerabilities) http://www.mozilla.org/products/firefox/ 6. Detect and delete Browser Helper Objects (modern troyans NOT detected by your antivirus/firewall, very dangerous ¥cause a hacker can establish two-way communications to your PC, "mounted" on Internet Explorer). Used to BYPASS your firewall. http://www.definitivesolutions.com/bhodemon.htm http://www.securiteam.com/windowsntfocus/5UP0P0AAKK.html 7. Protect your PC against "Zero Day Attacks" (attacks to vulnerabilities from which there¥s no patch available) http://www1.prevx.com/prevxhome.asp 8. Configure your mail/browser client to display text-only content. No HTML, cause is a great way to fingerprint you. I give this tips on my Professional Hacking training to corporations. With this, a hacker will have a really, really hard time tying to compromise your machine. Greetings. -- contranl wrote: > > > . > > This is probably slightly off-topic ...sorry for > that > But i suppose someone out here can tell me what this > is ? > > Since a few days i have a new PC with a new Norton > internet security > and anti-virus package. > > Today Norton told me 2 times that i am under attack > and that "they" > are trying to get into my computer it also talks > about trojan stuff > > Norton told me about 2 ip adresses where these > attacks come from > if you click on these numbers a map shows up showing > the physical > locations of these ip-adresses: > > One is in Korea and the other one in Iran > > Have a look at the details Norton gave me on the > last one: > > ----------------------------------------- > > inetnum: 62.193.0.0 - 62.193.31.255 > org: ORG-DI3-RIPE > netname: IR-DPI-20000717 > descr: DP IRAN > descr: PROVIDER > country: IR > admin-c: NN124-RIPE > tech-c: FA2406-RIPE > status: ALLOCATED PA > mnt-by: RIPE-NCC-HM-MNT > mnt-lower: DPI-MNT > changed: hostmaster@r... 20000717 > changed: hostmaster@r... 20020419 > changed: hostmaster@r... 20020423 > changed: hostmaster@r... 20020613 > changed: hostmaster@r... 20020711 > source: RIPE > > inetnum: 62.193.4.0 - 62.193.5.255 > netname: DPI > descr: Dialup Router ( Gozare1 ) - Data > Processing Of Iran > country: IR > admin-c: FND4-RIPE > tech-c: FA2406-RIPE > status: ASSIGNED PA > notify: dadgar@d... > notify: faranak@d... > mnt-by: DPI-MNT > changed: krazavi@d... 20021028 > changed: faranak@d... 20040704 > source: RIPE > > % RIPE database, last updated Nov 17, 2004 12:09:57 > AM > > ------------------------------------------------------- > > To be clear this does not happen while i am surfing > the internet > or downloading anything... i have a website but that > runs at my > host's location not here on my home pc > > What i understand of it is that they are directly > attacking my PC > God knows why me. > > What the hell is this ? > I am not the Pentagon !! > Is this normal business as usual ? > Does everyone have these attacks on a daily base ? > and are they part > of let's call it mass-attacks to thousands of PC's ? > From these same spooky countries ? > Or am i specifically attacked here ? > > > Thanks for any answers > > Tetrascanner > www.tetrascanner.com > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > $9.95 domain names from Yahoo!. Register anything. > http://us.click.yahoo.com/J8kdrA/y20IAA/yQLSAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > ===== Javier Villanueva C. Vcorp & Asociados Tel. (01 33) 36 19 47 09 cel. 044 33 33 92 64 50 msm. javier_vc@h... http://vcorpgdl.netfirms.com/news.pdf __________________________________ Do you Yahoo!? Meet the all-new My Yahoo! - Try it today! http://my.yahoo.com 10175 From: Thomas Shaddack Date: Fri Nov 19, 2004 1:09am Subject: Inmarsat zapping (old but nice article from 1997) http://www.drdish.com/features/spy_20.html This article appeared in TELE-satellite International Magazine, issue 12/97. Probably obsolete, but some of the principles (eg. executives chatting over insecure lines) aren't likely to change. Technology is a variable, user behavior is a constant. ---------------- Inmarsat Zapping There were two reasons for installing an old Inmarsat system. Number one, Koeditz company had been active again and had sent us an updated version of an improved version of their L-band antenna - reason number two was that Inmarsat had also been the topic of the latest Dr.Dish seminar. We chose a Monday to do all the prep work, a day when we were still kind of sleepy from the weekend at a time when Indian Summer provided ideal conditions for installing and aligning the antenna. After all we didn't want to strain either our brains or our bodies. We had an AR5000 receiver but decided not to use it for the time being. The AFN signal on 1537 MHz is an ideal source for adjusting the antenna. We did that in combination with a slightly antique SCPC receiver from the US. A 90 DM investment at a flea market which we had adapted over the weekend so we could use it as an Inmarsat compatible receiver. We also found another really antique Amstrad receiver somewhere and that's where we took the tuner from, because our SCPC receiver could not process signals higher than 1450 MHz. When will Americans ever realize that today's satellite communication works with an IF up to 2150? Anyway, even our Amstrad tuner stopped at 1750 MHz, but that wasn't a problem since Inmarsat transmits between 1525 and 1548 MHz. Finally we also had to get rid of the useless 110 kHz filter in exchange for a 20 kHz (for AFN) and a 12 kHz (for all other data) filter. Monday brought moment of truth - would our do-it-yourself version of an SCPC receiver really work? On the ground we had a small portable 60cm antenna and on the roof a professional 1 m dish. You guessed it, climbing up to the roof with all our gear was more than we could handle after a lazy weekend, so we equipped the 60 cm dish with the Koeditz antenna and cautiously started to move the unit in order to detect first Inmarsat signals. But caution was not in place because even after a very basic adjustment we could hear AFN Radio. And it got better by the minute. When a look at our spectrum analyser revealed that there was a signal at 1690 MHz we were quite puzzled. It was a very weak signal, but clearly above the general noise level. We tried out the signal on our receiver and voila: good old Meteosat came in at 1691 MHz. Obviously we hadn't mounted the antenna too exactly so that we could receive signals from both Inmarsat and Meteosat - albeit with less then perfect strength. We kept on improving the alignment and ended up with a combination of L-band feed and antenna that was probably the world's only multi-feed system for Inmarsat and Meteosat. Just imagine that these two birds have a 15 degree gap between them! Politicians Inmarsat features a few busy frequencies for analogue voice communication in the Inmarsat A mode. Most publications argue that only communications originating from a landline and going to an Inmarsat terminal can be intercepted. This is not true, and below 1535 MHz it is exactly the other way around. If a DTFM decoder is connected even the dialled landline number is shown on the display. One of the busiest frequencies to be found is 1534.350 MHz for 'ship-to-shore' communication, with 1535.325 MHz being used for'shoreto-ship' transmissions. We tested our converted SCPC receiver with the first frequency and were delighted to have a clear sound with a low noise level. Within a short time we monitored numerous calls, having to cope with a language mix similar to that at Heathrow Airport. Most Inmarsat users apparently didn't mind phone rates between four and five US$. To get to some really worthwhile calls we used Inmarsat-3 F2 at 15.5∞W, a satellite that covers the Eastern Atlantic Region including all of Europe, the Arabic countries, Africa and the East coast of the United States. This is the satellite that is most frequently used for experiments so we really only listened to calls that seemed to be about important topics. We didn't hunt after private calls, because even after all those years this always feels like peeping in. Calls in your own mother tongue are most easily detected, of course. On this Monday we discovered a female voice talking with her boss who was obviously en route to country X. They were discussing the results of a local election, and since our DTMF decoder made the phone number available to us we quickly checked that with our telephone book on CD ROM and were able to verify the authenticity of the two partners in the conversation. The election results basically forced the strongest party to enter a coalition with one of the two remaining parties which were both grossly unpopular. Officially no one knew which party was to be selected, but off the records the results of the internal discussions were already determined - thanks to Inmarsat. None of the two parties, however, knew anything about it. local politicians, party headquarters, journalists and hundreds of other important people would have given a lot to have that information. On the other hand, had they been able to follow all the secret Inmarsat talks they would also know a lot more about how the strongest party felt about them, and how they were planning to treat them once the party would form the next government. If you think that secret talks via Inmarsat are rare events, then think again. Many politicians rely on the outdated Inmarsat-A system, without realising how potentially disastrous secret information can become. One would imagine that their horrific experiences with the leaking analogue mobile telephones which used to get them into troubles have taught them a lesson or two. Today they avoid GSM technology (which also isn't foolproof anymore) while being fooled by catchy Inmarsat slogans like "secure connections". What is meant by that is the quality of the connection and by no means the privacy of information. One should almost feel empathy with certain secret services whose agents still cut out newspaper articles on which to base strategies instead of teaching politicians how to keep their mobile communications private. Pirates Pirates are the heroes of age-old adventure stories, but most of us forget that whole regions still depend on modern pirates. The coast around Malacca in Malaysia is such a spot, together with the Bay of Thailand and the Southern Chinese Sea. In South America the coast of Northern Brazil is another centre of pirate activity. On average every other day sees an attack, and whenever pirates strike they leave good manners at home. Typically all people on board of a ship are killed, unless they manage to escape with a rescue boat. Most pirates know in advance if the ship and its cargo is worth an attack, because they use state of the art equipment to monitor Inmarsat communications and even fax transmissions listing every single cargo item. Quite a substantial portion of Inmarsat reception units that are being sold in Germany or the United States are channelled to those regions where they are of invaluable service to modern age pirates. French journalist Eric Paquier managed to interview one pirate recently and when asked what pirates do with their victims he got the following response: 'We hang them upside down on one of the masts, then burn them alive and later eat their ears for dessert." But the pirates are not the only ones relying in Inmarsat. The International Maritime Bureau (IMB) monitors the distress band between 1544 and 1545 MHz to identify vicious attacks and to localise the exact position of an attack. If they manage to do that they then forward their information to one of the police authorities in the region and to ships within the potential danger zone. The IMB has monitoring stations in Kuala Lumpur for the South East Asian region and in Recife for the Brazilian coast. In most instances, however, the pirates are much quicker than local police, so that by the time law enforcement units reach the site the pirates have completed their attack and have left with all valuables. With good equipment and a good deal of patience emergency signals of threatened ships can even be received in Europe which is covered by three Inmarsat satellites. Positioned at 64∞ East Inmarsat-3 F1 covers the Indian Ocean. Inmarsat-3 F2 (15.5∞ West) controls the Eastern Atlantic Region while the 3 - (54∞ West) is in charge of the Western Atlantic region. Finally there is Inmarsat- F3 (1 78∞ East) whose footprint extends over the Pacific region. With the right receiver for the L-band and with a serial data port there is computer software available enabling the user to monitor a selected frequency range with high reliability. To check the distress band between 1544 and 1545 MHz the author uses an AR5000 in association with HAWK-5000 software. This software not only controls the receiver but also analyses the frequency spectrum of a given frequency range. Underworld To be sure, more than 95% of Inmarsat calls are used for absolutely legitimate purposes: to make calls between maritime, mobile and aeronautic units and landlines. In the past mobile phones have got a bad name due to Mafia bosses using them. After all there was a time when calls originating from a cellular phone were hard to trace and even harder to intercept. Times have changed and today chances are that underworld bigheads travel around with a light briefcase which includes a complete Inmarsat unit. Even two permanent underworld headquarters may decide to communicate via inexpensive Inmarsat-A terminals in order to circumvent the public telephone network. For instance, the author knows the case of a dubious money broker ("don't leave your money in your bank - put it in our secure investment project and enjoy interest of up to 49% per annum") residing on a Southern island who gets the daily figures from his chief money collector. Quote: "Sorry, it's been a real bad day just slightly over 200.000..." The combination of politics and business is another segment that surfaces frequently among the not quite legal activities on Inmarsat. The author of this article is now specifically looking for businesspeople and/or politicians who deliberately break international embargo laws. The AR5000 receiver comes with a built-in DTMF decoder which identifies and display the dialling tones of a telephone. The only disadvantage is that most numbers are fairly long and thus the first digits disappear when the display becomes too small for the whole number to be shown. In most cases, however, the first two digits are "00", the access code for international calls in many countries. With the right software, however, all this isn't a problem anymore. The receiver delivers the complete number to the PC which in turn displays, modifies or stores it. In addition to that, individual number sequences can be preprogrammed so that the PC issues a 'warning' whenever such a sequence of pre-set numbers is dialled via Inmarsat, It's a simple program, but very effective. We set the following numbers on our PC: 00964 for Iraq and 00218 for Libya. Both countries are subject to strict international trade embargoes. We set the numbers and chose 1534.350 MHz as our background frequency. During the night from Monday to Tuesday all we received was a call from a poor oil worker who announced the divorce from his wife on Inmarsat, plus many conversations about spare parts for a variety of cars. Not exactly the kind of stuff James Bond would be interested in. Our PC issued two alarms, but both calls were normal 'ship-to-shore' calls. Thursday, 4pm: another alarm from our PC! "009641xxxxxx", a male voice answers. The call originated from an A terminal, the language is English but with a strong accent whic h could be German. Luckily one side has their external speaker on so that both persons came in clear and sharp. The location of the caller with the A terminal could not be identified, but judging form the background voices it could have been Luxembourg. The caller asked to speak to Mr. Shamari (phonetic transcription) and his call was forwarded right away. The conversation was about electronics components and the possibility of assembling them in Iraq. Assembly was said to be rather easy and could be performed by untrained personnel. Next, the route of transportation was discussed - apparently the package was to be sent from the originating country to Iraq via at least two or three other countries in order to disguise the exact trace. Mr. Shamari then came back to the final assembly of the components and argued that it would best if it was performed in one of his departments, pending approval by Mr. Kartan (phonetic transcription). The conversation ended with the agreement to have another telephone conversation the following Monday. Both the type of conversation and the complicated delivery method for just 52 kg of electronic compon got us suspicious right away. But what could we do only one telephone number and two with possibly incorrect - names? How could we find somebody who knew Iraq from inside? There is a Technical University close to where we live and usually students from many nations live and work together on university campuses. It didn't take us long to find an Iraqi student, even though his family hadn't been to Iraq for years. Still, he was able to help us by referring us to the Iraqi opposition Iraqi National Congress INC" which has contact offices in many big cities. Believe it of not, they recognised our telephone number right away. The number belongs to an organisation called "Mukhabarat" and according to an INC speaker it is a kind of internal security service. The office with our number is in the Baghdad suburb of Zeyounna and the man we overheard on the phone could be a Mr. M. Y. AI Shammari who is assistant to the director of the D4 department. The D4 surveys politicians within Iraq, members of embassies and party members. The boss of the department is a person by the narne of General-Major A. Aziz AI Qurtan. Could this be man we identified as Mr. Kartan? Suddenly everything seemed to add up and the story started to make sense. The following Monday we set up our equipment again in order to identify the call that had been arranged the week before. However, we weren't as lucky as before. The busy frequencies, the large frequency range and the lack of an exact time when this call would be made all contributed to the failure of our search. And this is why this article has to end right here, rather abruptly. This article appeared in TELE-satellite International Magazine, issue 12/97. TELE-satellite International Magazine is available at major newsstands around the world, as well as by international subscription. (c)1998 by Dr.Dish. [Non-text portions of this message have been removed] 10176 From: contranl Date: Fri Nov 19, 2004 6:32am Subject: Re: I'm under attack ? ! ? . Thanks for all the replies...they have helped me to calm down a little Daryl...this was a "clean" installation on a new pc i have done several complete virus-scans ..the warnings said that the attacks were trying to install several trojans Now i am not a computer security expert and i do'nt want to spend hours a day on security...so let me ask this simple Question: How can i simply closedown/block all the ports on my pc and then just open 1 on demand when i need internet connection ? Said differently...i don't want any incoming traffic unless i say so In addition i like tell you why i did this complete new install.- Just 1 week before i ran into this shit..i had visited a website i did not download or open anything...but i did notice a sudden activity of my harddisk. Next thing was that i suddenly had an extra search bar in my browser i was not able to remove that ,the bar invited me to search for financing,mortgages and so on Also my default startup page (about:blank) was replaced by an advertisement page by a company called "www.web--search.com" (don't go there !!!) ..i could'nt remove that either I found out that this is called "homepage hyjacking" After reading about it it turns out that the adware could slow down my computer and eventually make it unworkable. In order to remove this you have to do some high level stuff like register-editing and run a so called "shredder" to remove the very persistent adware. I am warning you again not to visit "www.web--search.com" because that alone might be enough to give you the same problems as i had. Now this same company operates under a few hundred other names They are registered in Panama So what do we have here ...a official company damaging 1000's of computers everyday...and they can get away with it ? there must be 1000 of complaints against them...how is it possible that these people are alowed to do what they are doing. Why is this company not prosecuted and thrown off the net since they purposely damage 1000 of computers a day with there unwanted and very difficult to remove adware..seems to me that these pratices are illegal and forbidden by several laws in several countries..or are they not ? Where is the webpolice ? Tetrascanner 10177 From: Nalesnik, Matthew Date: Fri Nov 19, 2004 9:50am Subject: RE: Re: I'm under attack ? ! ? For a simple solution on the homepage hijacking... I like to run Spybot S&D (v1.3). If you run in Advanced mode, you can set your homepage and then disable having it get reset. Just something else for blocking/deleting spy/ad ware. - Matt -----Original Message----- From: contranl [mailto:contranl@y...] Sent: Friday, November 19, 2004 7:33 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: I'm under attack ? ! ? . Thanks for all the replies...they have helped me to calm down a little Daryl...this was a "clean" installation on a new pc i have done several complete virus-scans ..the warnings said that the attacks were trying to install several trojans Now i am not a computer security expert and i do'nt want to spend hours a day on security...so let me ask this simple Question: How can i simply closedown/block all the ports on my pc and then just open 1 on demand when i need internet connection ? Said differently...i don't want any incoming traffic unless i say so In addition i like tell you why i did this complete new install.- Just 1 week before i ran into this shit..i had visited a website i did not download or open anything...but i did notice a sudden activity of my harddisk. Next thing was that i suddenly had an extra search bar in my browser i was not able to remove that ,the bar invited me to search for financing,mortgages and so on Also my default startup page (about:blank) was replaced by an advertisement page by a company called "www.web--search.com" (don't go there !!!) ..i could'nt remove that either I found out that this is called "homepage hyjacking" After reading about it it turns out that the adware could slow down my computer and eventually make it unworkable. In order to remove this you have to do some high level stuff like register-editing and run a so called "shredder" to remove the very persistent adware. I am warning you again not to visit "www.web--search.com" because that alone might be enough to give you the same problems as i had. Now this same company operates under a few hundred other names They are registered in Panama So what do we have here ...a official company damaging 1000's of computers everyday...and they can get away with it ? there must be 1000 of complaints against them...how is it possible that these people are alowed to do what they are doing. Why is this company not prosecuted and thrown off the net since they purposely damage 1000 of computers a day with there unwanted and very difficult to remove adware..seems to me that these pratices are illegal and forbidden by several laws in several countries..or are they not ? Where is the webpolice ? Tetrascanner ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor Get unlimited calls to U.S./Canada _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10178 From: Daryl Adams Date: Fri Nov 19, 2004 10:04am Subject: Re: I'm under attack ? ! ? Since you mentioned the Penguin :-) . I know, I know, creeping off topic, but has anyone tried NSA's very nice Security Enhanced Linux? Those must be the smartest guys in the world. Like Grandpa always said, "cheap is good, free is better". http://www.nsa.gov/selinux/code/download0.cfm Rgds. >From: kondrak >Reply-To: TSCM-L@yahoogroups.com >To: TSCM-L@yahoogroups.com >Subject: Re: [TSCM-L] I'm under attack ? ! ? >Date: Thu, 18 Nov 2004 19:20:28 -0500 > >Couldn't agree with you more Michael....I love my Penguin and IPtables. > > >At 17:36 11/18/2004, you wrote: > > >Hi, > > > >You shouldn't worry too much, unless your computer is open to the >external > >world. A good hardware or if not possible / costly, software firewall >works > >great against this sort of stuff. ZoneAlarm would be my recommendation if > >you want to go software. Norton is OK, although it doesn't have the > >granularity that ZA has IMHO. > > > >What you are most likely getting are automated port scans, and possibly > >connection attempts, which are making Norton balk. This is normal, every >IP > >on the internet gets a few of these every day, so in most cases it's >futile > >to try and wade through the hundreds of entries you'll end up with in >your > >logs. > > > >As I say, don't worry too much. If you have DSL, and have a choice, place >a > >router, not a modem, between the WAN and your computer(s), it offers just > >one more layer of protection (if correctly configured). > > > >To answer a bit more specifically: > > > > > What the hell is this ? > > > >It's called a port scan, and they run by the thousands and thousands all >day > >long all over the internet. Compromised machines will start scanning > >themselves looking for other potential "costumers". > > > > > I am not the Pentagon !! > > > >Really? They get port scans too, and believe me, if they dispatched a > >tomahawk to every IP they got a scan from, the planet would be flat by >now. > > > > > Is this normal business as usual ? > > > >Yep. What you should look for are more dedicated attacks, i.e. if you get >a > >lot of scans from one IP during a period of time, or you get a scan on a >few > >ports every so often from the same IP or a similar netblock it could > >indicate a targeted attack. There are certain patterns that are more > >worrying, but as you are not the Pentagon, you shouldn't worry, you most > >likely don't have all the pirates in Iran and Korea trying to get into >your > >PC. > > > > > Does everyone have these attacks on a daily base ? and are they part > > > of let's call it mass-attacks to thousands of PC's ? > > > >Yes. Nowadays, viruses and worms spread not only via email and stupid > >people, but they attack specific ports and services that are known > >vulnerable, and which may be open on a large number of computers exposed >to > >the internet. > > > > > From these same spooky countries ? > > > > From any country. Some worms/viruses/trojans scan their own netblocks, > >others pick totally random ranges, others have pre-programmed ranges to > >scan, there isn't really one rule for all. They could be using open >proxies, > >so you can't even trust the IP to be the real one. > > > > > Or am i specifically attacked here ? > > > >No, everyone is attacked. As an example, an out-of-the-box RedHat Linux >6.3 > >computer exposed to the internet will be compromised in about 10 to 20 > >minutes in one way or another, maybe even faster. With the (excuse my > >french) shitstorm going on on the net, you couldn't even have enough time >to > >download patches for your Windows or Linux systems before they are hit, >if > >you don't take other in-between measures. > > > >Don't worry too much, and remember: keep thy system patched, and thy > >antivirus updated. > > > >Best regards, > > > >Mike > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > 10179 From: Marc DeRodes Date: Fri Nov 19, 2004 4:07pm Subject: under attack This is probably slightly off-topic ...sorry for that But i suppose someone out here can tell me what this is ? Probably, a port scan. Simply stated, they are looking for open ports to gain entry to your system. As the others have stated, this is a common event, happening constantly. If you really want to get a feel for it, look up "port scanning", then set your firewall for the highest setting--you will be amazed at how much activity is directed at your computer. Since a few days i have a new PC with a new Norton internet security and anti-virus package. Get rid of norton. Invest in a firewall that has a stealth mode. Also, there is freeware available that will close all your ports--some of them also can encrypt the swap drive in windows, and do other interesting things. I'm not giving away the names of my favorite software, since it is a valuable asset I'd rather not have commonly know, though it is in the public domain. Today Norton told me 2 times that i am under attack and that "they" are trying to get into my computer it also talks about trojan stuff Yep. They will also constantly remind you to upgrade their product. This is for two reasons. First, it makes you feel vulnerable, so you will gladly pay to renew your license when it runs out a year from now, and second, I suspect Norton (and probably ez-firewall, if you are running XP) have built in spyware that downloads your data to their server when you upgrade. Norton told me about 2 ip adresses where these attacks come from if you click on these numbers a map shows up showing the physical locations of these ip-adresses: One is in Korea and the other one in Iran Have a look at the details Norton gave me on the last one: ----------------------------------------- inetnum: 62.193.0.0 - 62.193.31.255 org: ORG-DI3-RIPE netname: IR-DPI-20000717 descr: DP IRAN descr: PROVIDER country: IR admin-c: NN124-RIPE tech-c: FA2406-RIPE status: ALLOCATED PA mnt-by: RIPE-NCC-HM-MNT mnt-lower: DPI-MNT changed: hostmaster@r... 20000717 changed: hostmaster@r... 20020419 changed: hostmaster@r... 20020423 changed: hostmaster@r... 20020613 changed: hostmaster@r... 20020711 source: RIPE inetnum: 62.193.4.0 - 62.193.5.255 netname: DPI descr: Dialup Router ( Gozare1 ) - Data Processing Of Iran country: IR admin-c: FND4-RIPE tech-c: FA2406-RIPE status: ASSIGNED PA notify: dadgar@d... notify: faranak@d... mnt-by: DPI-MNT changed: krazavi@d... 20021028 changed: faranak@d... 20040704 source: RIPE % RIPE database, last updated Nov 17, 2004 12:09:57 AM ------------------------------------------------------- If you REALLY want to know what all this means, there are tutorials on the net that can show you how to track down spammers (or anyone else) using that sort of information. There is also freeware that can track them down for you. Again, I'll not directly give up one of my assets, but if you are familiar at all with internet searches, you can use the information I've just given you find the tutorials and locate the software. To be clear this does not happen while i am surfing the internet or downloading anything... i have a website but that runs at my host's location not here on my home pc What i understand of it is that they are directly attacking my PC God knows why me. What the hell is this ? A common event. Don't take it personally. I am not the Pentagon !! Like the other poster said, the pentagon gets hacked all the time. If you are interested, look up some of the exploits of alt.2600. Since you must have an interest in this sort of thing (and I presume you do, since you've subscribed to this NG) You'd be wise to look up some basic hacking technique. Try running "hacking+tutorial", or, "nubie+hacking+guide", or something along those lines. Is this normal business as usual ? Does everyone have these attacks on a daily base ? and are they part of let's call it mass-attacks to thousands of PC's ? From these same spooky countries ? Or am i specifically attacked here ? Yes, yes, yes, yes, yes and no, yes and no. Thanks for any answers Tetrascanner www.tetrascanner.com ________________________________________________________________________ ________________________________________________________________________ --------------------------------- Do you Yahoo!? The all-new My Yahoo! ñ Get yours free! [Non-text portions of this message have been removed] 10180 From: Daryl Adams Date: Fri Nov 19, 2004 9:55am Subject: RE: Re: I'm under attack ? ! ? Whew. I'd start with Windows SP-2 (free) if I were you. The patches are a no brainer, and it has a nice firewall in it, manageable via Start > Control Panel > Security Center. Exceptions are manageable there, and you can limit the lions share of traffic there. A trick I use is to create a link to the windows firewall log file in C:\WINDOWS\pfirewall.log on my desktop. That way, if it starts acting up, or an app doesn't work, you can check there to see if it's dropping (or allowing) something it not supposed to. It also has some nice application awareness monitoring that will notify you when an application seeks a socket to connect to the internet, you can accept or deny dependant upon what you're doing at the time. This will also be a good backup for your Norton firewall in case you have some nasty trojan or adware thats shutting it down for you without your knowledge. Another (free for home or personal use; http://www.kerio.com/kpf_home.html ) firewall worth mentioning here is Kerio personal firewall. Add a rule denying all from the internet if you're paranoid, but it'll prolly break some things. You will always want DHCP unless you have a static IP, and a few other little things. Next, I'd go and get Adaware (free again). This will actually detect and remove or quarantine the adware you mentioned previously, prolly what Norton is detecting as a trojan, some can be pretty persistent dependant upon what kind of rebuild you did earlier. As a rule, I prefer to "nuke from high orbit" as they say, meaning reformat the harddrive by booting from floppy typing "format C:*.*" and reinstall from trusted media. Hope that helps. Rgds. >From: "contranl" >Reply-To: TSCM-L@yahoogroups.com >To: TSCM-L@yahoogroups.com >Subject: [TSCM-L] Re: I'm under attack ? ! ? >Date: Fri, 19 Nov 2004 12:32:38 -0000 > > >. > >Thanks for all the replies...they have helped me to calm down >a little > >Daryl...this was a "clean" installation on a new pc >i have done several complete virus-scans ..the warnings said >that the attacks were trying to install several trojans > >Now i am not a computer security expert and i do'nt want to spend >hours a day on security...so let me ask this simple >Question: >How can i simply closedown/block all the ports on my pc >and then just open 1 on demand when i need internet connection ? >Said differently...i don't want any incoming traffic unless i say so > >In addition i like tell you why i did this complete new install.- > >Just 1 week before i ran into this shit..i had visited a website >i did not download or open anything...but i did notice a sudden >activity of my harddisk. > >Next thing was that i suddenly had an extra search bar in my browser >i was not able to remove that ,the bar invited me to search for >financing,mortgages and so on >Also my default startup page (about:blank) was replaced by an >advertisement page by a company called > >"www.web--search.com" (don't go there !!!) > >..i could'nt remove that either > >I found out that this is called "homepage hyjacking" > >After reading about it it turns out that the adware could slow down >my computer and eventually make it unworkable. > >In order to remove this you have to do some high level stuff >like register-editing and run a so called "shredder" to remove the >very persistent adware. > >I am warning you again not to visit "www.web--search.com" because >that alone might be enough to give you the same problems as i had. > >Now this same company operates under a few hundred other names >They are registered in Panama > >So what do we have here ...a official company damaging 1000's of >computers everyday...and they can get away with it ? >there must be 1000 of complaints against them...how is it possible >that these people are alowed to do what they are doing. > >Why is this company not prosecuted and thrown off the net since they >purposely damage 1000 of computers a day with there unwanted and >very difficult to remove adware..seems to me that these pratices are >illegal and forbidden by several laws in several countries..or are >they not ? > >Where is the webpolice ? > >Tetrascanner 10181 From: Date: Fri Nov 19, 2004 11:11am Subject: Good Software. Any competent person should be well aware of NORTON's shortcomings Several classes of "Malware" will be completely missed by AVG Norton and Mc Afee.. Both local and on-line scans. That said this software http://tds.diamondcs.com.au/ found and disabled problems that all anti-virus scans listed above MISSED. The tools available with this software go beyond the average users needs. Port Scanner, Decryption, WHO IS etc. Anyone on line can benefit from the programs at http://www.grc.com Unplug and Pray\DCOMBOB etc Adaware SE is now out another good tool. Spybot Search & Destroy Zone Alarm TDS 3 Profesional is good software I own it and use it, Free Trial download is fully functional EXCEPT for automatic updates..they allow you to update manually. Download the software and then follow the update instructions. Scan your machine.http://tds.diamondcs.com.au/ Anyone with any problems with this software can contact me directly. bernard_(No Spam)stan@yah(No Spam)oo.Com 10182 From: Does it matter Date: Fri Nov 19, 2004 1:02pm Subject: Re: I'm under attack ? ! ? I think most ppl in the computer business would agree you need Ad aware Spy Bot CW Shredder and a new one that I like alot TDS-3 Be sure to UPDATE each one of those as new definitions come out weekly. If you need further help don't hesitate to ask. Darren --- In TSCM-L@yahoogroups.com, "contranl" wrote: > > . > > Thanks for all the replies...they have helped me to calm down > a little > > Daryl...this was a "clean" installation on a new pc > i have done several complete virus-scans ..the warnings said > that the attacks were trying to install several trojans > > Now i am not a computer security expert and i do'nt want to spend > hours a day on security...so let me ask this simple > Question: > How can i simply closedown/block all the ports on my pc > and then just open 1 on demand when i need internet connection ? > Said differently...i don't want any incoming traffic unless i say so > > In addition i like tell you why i did this complete new install.- > > Just 1 week before i ran into this shit..i had visited a website > i did not download or open anything...but i did notice a sudden > activity of my harddisk. > > Next thing was that i suddenly had an extra search bar in my browser > i was not able to remove that ,the bar invited me to search for > financing,mortgages and so on > Also my default startup page (about:blank) was replaced by an > advertisement page by a company called > > "www.web--search.com" (don't go there !!!) > > ..i could'nt remove that either > > I found out that this is called "homepage hyjacking" > > After reading about it it turns out that the adware could slow down > my computer and eventually make it unworkable. > > In order to remove this you have to do some high level stuff > like register-editing and run a so called "shredder" to remove the > very persistent adware. > > I am warning you again not to visit "www.web--search.com" because > that alone might be enough to give you the same problems as i had. > > Now this same company operates under a few hundred other names > They are registered in Panama > > So what do we have here ...a official company damaging 1000's of > computers everyday...and they can get away with it ? > there must be 1000 of complaints against them...how is it possible > that these people are alowed to do what they are doing. > > Why is this company not prosecuted and thrown off the net since they > purposely damage 1000 of computers a day with there unwanted and > very difficult to remove adware..seems to me that these pratices are > illegal and forbidden by several laws in several countries..or are > they not ? > > Where is the webpolice ? > > Tetrascanner 10183 From: Michael Dever Date: Fri Nov 19, 2004 4:31pm Subject: TSCM Procedures I am trying to educate some clients on the importance of specifying 'technical' parameters in their RFT (request for tender) for TSCM services, particularly on the RF side of the house. So far, most clients will specify a frequency range (e.g. one recently specified 10kHz to 5 GHz!!! another 21 GHz) but say nothing about sensitivity. As you can imagine it is sometimes very difficult to convince a client that specifying a frequency on its own is of very little value if you are not addressing the required sensitivity. Unfortunately the average corporate client knows very little about these issues and some are influenced by mavins or equipment vendors when putting together their RFT, making it hard to convince them of the difference between a PI using a broad band device versus a team with a lab grade SA. My question is: does anybody have a set of standard words that could be incorporated into the technical parameters of the RFT to ensure that a difference is created between providers in terms of their capability to find threats? Thanks in advance Regards Mike Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Voice: (02) 6254 5337 Email: dca@b... This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 10184 From: James M. Atkinson Date: Fri Nov 19, 2004 10:34pm Subject: Re: TSCM Procedures If I get enough requests I will post a copy of just such a guide to my site for the group to download. Can I get an Amen? -jma At 05:31 PM 11/19/2004, Michael Dever wrote: >I am trying to educate some clients on the importance of specifying >'technical' parameters in their RFT (request for tender) for TSCM >services, particularly on the RF side of the house. > >So far, most clients will specify a frequency range (e.g. one recently >specified 10kHz to 5 GHz!!! another 21 GHz) but say nothing about >sensitivity. > >As you can imagine it is sometimes very difficult to convince a client >that specifying a frequency on its own is of very little value if you >are not addressing the required sensitivity. Unfortunately the average >corporate client knows very little about these issues and some are >influenced by mavins or equipment vendors when putting together their >RFT, making it hard to convince them of the difference between a PI >using a broad band device versus a team with a lab grade SA. > >My question is: does anybody have a set of standard words that could be >incorporated into the technical parameters of the RFT to ensure that a >difference is created between providers in terms of their capability to >find threats? > >Thanks in advance > >Regards >Mike > >Michael J. Dever CPP >Dever Clark & Associates >GPO Box 1163 >Canberra ACT 2601 >Voice: (02) 6254 5337 >Email: dca@b... > >This message is sent in strict confidence for the addressee only. >It may contain legally privileged information. The contents are not to >be disclosed to anyone other than the addressee. >Unauthorised recipients are requested to preserve this confidentiality >and to advise the sender immediately of any error in transmission. > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10185 From: Michael Dever Date: Fri Nov 19, 2004 11:12pm Subject: Re: TSCM Procedures Amen to that Jim!! On 20 Nov 2004, at 15:34, James M. Atkinson wrote: > > > If I get enough requests I will post a copy of just such a guide to my > site > for the group to download. > > Can I get an Amen? > > -jma > > > > > > At 05:31 PM 11/19/2004, Michael Dever wrote: > > >> I am trying to educate some clients on the importance of specifying >> 'technical' parameters in their RFT (request for tender) for TSCM >> services, particularly on the RF side of the house. >> >> So far, most clients will specify a frequency range (e.g. one recently >> specified 10kHz to 5 GHz!!! another 21 GHz) but say nothing about >> sensitivity. >> >> As you can imagine it is sometimes very difficult to convince a client >> that specifying a frequency on its own is of very little value if you >> are not addressing the required sensitivity. Unfortunately the average >> corporate client knows very little about these issues and some are >> influenced by mavins or equipment vendors when putting together their >> RFT, making it hard to convince them of the difference between a PI >> using a broad band device versus a team with a lab grade SA. >> >> My question is: does anybody have a set of standard words that could >> be >> incorporated into the technical parameters of the RFT to ensure that a >> difference is created between providers in terms of their capability >> to >> find threats? >> >> Thanks in advance >> >> Regards >> Mike >> >> Michael J. Dever CPP >> Dever Clark & Associates >> GPO Box 1163 >> Canberra ACT 2601 >> Voice: (02) 6254 5337 >> Email: dca@b... >> >> This message is sent in strict confidence for the addressee only. >> It may contain legally privileged information. The contents are not to >> be disclosed to anyone other than the addressee. >> Unauthorised recipients are requested to preserve this confidentiality >> and to advise the sender immediately of any error in transmission. >> >> >> [Non-text portions of this message have been removed] >> >> >> >> >> >> >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== TSKS >> Yahoo! Groups Links >> >> >> >> > > > ----------------------------------------------------------------------- > ------------------------------ > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ----------------------------------------------------------------------- > ------------------------------ > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: > http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ----------------------------------------------------------------------- > ------------------------------ > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ----------------------------------------------------------------------- > ------------------------------ > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Voice: (02) 6254 5337 Email: dca@b... This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 10186 From: Gregory Hicks Date: Fri Nov 19, 2004 11:04pm Subject: Re: TSCM Procedures > To: TSCM-L@yahoogroups.com > From: "James M. Atkinson" > Date: Fri, 19 Nov 2004 23:34:31 -0500 > Subject: Re: [TSCM-L] TSCM Procedures > > > > If I get enough requests I will post a copy of just such a guide to my site > for the group to download. > > Can I get an Amen? Amen... > > -jma > > > > > > At 05:31 PM 11/19/2004, Michael Dever wrote: > > > >I am trying to educate some clients on the importance of specifying > >'technical' parameters in their RFT (request for tender) for TSCM > >services, particularly on the RF side of the house. > > > >So far, most clients will specify a frequency range (e.g. one recently > >specified 10kHz to 5 GHz!!! another 21 GHz) but say nothing about > >sensitivity. > > > >As you can imagine it is sometimes very difficult to convince a client > >that specifying a frequency on its own is of very little value if you > >are not addressing the required sensitivity. Unfortunately the average > >corporate client knows very little about these issues and some are > >influenced by mavins or equipment vendors when putting together their > >RFT, making it hard to convince them of the difference between a PI > >using a broad band device versus a team with a lab grade SA. > > > >My question is: does anybody have a set of standard words that could be > >incorporated into the technical parameters of the RFT to ensure that a > >difference is created between providers in terms of their capability to > >find threats? > > > >Thanks in advance > > > >Regards > >Mike > > > >Michael J. Dever CPP > >Dever Clark & Associates > >GPO Box 1163 > >Canberra ACT 2601 > >Voice: (02) 6254 5337 > >Email: dca@b... > > > >This message is sent in strict confidence for the addressee only. > >It may contain legally privileged information. The contents are not to > >be disclosed to anyone other than the addressee. > >Unauthorised recipients are requested to preserve this confidentiality > >and to advise the sender immediately of any error in transmission. > > > > > >[Non-text portions of this message have been removed] > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > -------------------------------------------------------------------------------- --------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > -------------------------------------------------------------------------------- --------------------- > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------------------- --------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------------------- --------------------- > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > --------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 | Fax: 408.894.3479 San Jose, CA 95134 | Internet: ghicks@c... I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton 10187 From: James M. Atkinson Date: Sat Nov 20, 2004 6:05am Subject: CCS/SITG - 10-QSB SEC Filing - Nov 20, 2004 More red ink, and posturing for probably bankruptcy filing within the next year. -jma United States Securities and Exchange Commission Washington, D.C. 20549 Form 10-QSB (Mark One) [X] QUARTERLY REPORT UNDER SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 FOR THE QUARTERLY PERIOD ENDED SEPTEMBER 30, 2004 OR [ ] TRANSITION REPORT UNDER SECTION 13 OR 15 (d) OF THE EXCHANGE ACT OF 1934 For the transition period from to Commission file number 000-31779 SECURITY INTELLIGENCE TECHNOLOGIES, INC. (Exact name of small business issuer as specified in its charter) Florida 65-0928369 ----------------------------- ------------ (State or other jurisdiction of (IRS Employer incorporation or organization) Identification No.) 145 Huguenot Street, New Rochelle, New York 10801 (Address of principal executive offices) (914) 654-8700 (Issuer's telephone number) Check whether the issuer (1) filed all reports required to be filed by Section 13 or 15(d) of the Exchange Act during the past 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days. Yes X No The number of shares of common stock $.0001 par value, of the Registrant issued and outstanding as of November 15, 2004 was 22,492,700. -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES FORM 10QSB PERIOD ENDED September 30, 2004 TABLE OF CONTENTS PART I - FINANCIAL INFORMATION ITEM 1. Consolidated Financial Statements: Consolidated Balance Sheets as of September 30, 2004 (unaudited) and June 30, 2004 3 Consolidated Statements of Operations (unaudited) for the three months ended September 30, 2004 and September 30, 2003 4 Consolidated Statements of Cash Flow (unaudited) for three months ended September 30, 2004 and September 30, 2003 5 Condensed Notes to Consolidated Financial Statements 6 Item 2. Management's Discussion and Analysis of Financial Condition and Results of Operations 12 Item 3. Controls and Procedures 16 PART II - OTHER INFORMATION Item 6. Exhibits and Reports on Form 8-K 16 2 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES CONSOLIDATED BALANCE SHEETS September 30, 2004 June 30, (Unaudited) 2004 ------------ ------------ ASSETS Current Assets: Cash $59,471 $172,621 Inventory 916,774 959,825 Other current assets 234,268 223,872 ------------ ------------ Total current assets 1,210,513 1,356,318 Property and Equipment, at cost less accumulated depreciation and amortization of $174,134 and $170,969 19,083 22,248 Other assets 35,071 35,071 ------------ ------------ Total assets $1,264,667 $1,413,637 ============ ============ LIABILITIES AND STOCKHOLDERS' DEFICIT Current liabilities: Accounts payable and accrued expenses $4,082,951 $3,722,228 Note payable - CEO/stockholder 1,584,910 1,509,151 Convertible notes payable 494,000 200,000 Customer deposits 2,167,455 1,917,031 Deferred revenue 1,209,052 1,408,679 ------------ ------------ Total current liabilities 9,538,368 8,757,089 ------------ ------------ Commitments and contingencies - See Notes Stockholders' deficit: Preferred stock, $.0001 par value, 10,000,000 shares authorized: Series A Convertible-$1.00 per share liquidation preference, 3,500,000 shares authorized, issued and outstanding 350 350 Series B Convertible-$1.00 per share liquidation preference, 1,500,000 shares authorized, issued and outstanding 150 150 Common stock, $.0001 par value, 100,000,000 shares authorized, 22,462,700 and 22,306,816 issued and outstanding at September 30, 2004, and June 30, 2004 respectively 2,246 2,231 Additional paid in capital 6,287,119 3,808,283 Accumulated deficit (14,547,680) (11,136,871) Accumulated other comprehensive loss (15,886) (17,595) ------------ ------------ Total stockholders' deficit (8,273,701) (7,343,452) ------------ ------------ Total liabilities and stockholders' deficit $1,264,667 $1,413,637 ============ ============ The accompanying notes are an integral part of these financial statements. 3 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES CONSOLIDATED STATEMENTS OF OPERATIONS (Unaudited) Three Months Ended ------------------------ September 30, ------------------------ 2004 2003 ------------ ----------- Sales $527,318 $936,686 ------------ ----------- Costs and expenses: Cost of sales 160,296 367,370 Compensation and benefits 550,495 622,610 Professional fees and legal matters 91,544 116,672 Debt issuance expense 2,304,455 - Stock based compensation 119,957 75,507 Selling, general and administrative expenses 349,069 414,392 Unrealized loss (gain) on financial guarantees 328,764 (254,440) Depreciation and amortization 3,165 13,351 ------------ ----------- 3,907,745 1,355,462 ------------ ----------- Operating loss (3,380,427) (418,776) Interest expense 30,382 19,681 ------------ ----------- Net loss $(3,410,809) $(438,457) ============ =========== Net loss per above $(3,410,809) $(438,457) Other comphrensive loss - translation adjustment (15,886) (8,508) ------------ ----------- $(3,426,695) $(446,965) ============ =========== Loss per share, basic and diluted $(0.15) $(0.02) ============ =========== Weighted average number of shares 22,354,006 18,727,378 ============ =========== The accompanying notes are an integral part of these financial statements. 4 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES CONSOLIDATED STATEMENTS OF CASH FLOWS (Unaudited) Three Months Ended ----------------------- September 30, ----------------------- 2004 2003 ------------ ---------- CASH FLOWS FROM OPERATING ACTIVITIES: Net loss $(3,410,809) $(438,457) Adjustments to reconcile net loss to net cash used in operating activities: Depreciation and amortization 3,165 13,351 Unrealized loss (gain) on financial guarantees 328,764 (254,440) Debt issuance expense 2,304,455 - Amortization of deferred compensation 107,957 75,507 Stock issued to employee for services 12,000 - Discount on common stock issued for services 12,000 - Decrease in other comphrensive loss 1,709 - Noncash compensation - CEO/stockholder 14,100 - Noncash interest expense - CEO/stockholder 17,739 10,881 CHANGES IN OPERATING ASSETS AND LIABILITIES: Decrease in inventory 43,051 86,176 (Increase) in other current assets (10,396) (56,547) Increase in accounts payable and accrued expenses 74,398 103,467 Increase (decrease) in customer deposits 250,424 (80,405) (Decrease) increase in deferred revenue (199,627) 46,418 ------------ ---------- Net cash used in operating activities (451,070) (494,049) ------------ ---------- CASH FLOWS FROM FINANCING ACTIVITIES: Borrowings under convertible credit facility 294,000 - Borrowings under note payable - CEO/stockholder 43,920 - Proceeds from issuance of common stock - 525,000 ------------ ---------- Net cash provided by financing activities 337,920 525,000 ------------ ---------- Net (decrease) increase in cash (113,150) 30,951 Cash, beginning of period 172,621 21,638 ------------ ---------- Cash, end of period $59,471 $52,589 ============ ========== Supplemental Disclosures of Cash Flow Information: Interest paid $5,259 $3,562 ============ ========== Taxes paid $4,573 $2,720 ============ ========== Non-cash financing and investing activities: Common stock issued to settle accounts payable $42,440 $(22,780) ============ ========== Accrued interest and deferred salary credited to note payable - CEO/stockholder $31,839 $10,881 ============ ========== The accompanying notes are an integral part of these financial statements. 5 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS SEPTEMBER 30, 2004 AND 2003 (Unaudited) Note 1 - Interim Financial Statements The accompanying unaudited financial statements of Security Intelligence Technologies, Inc. and subsidiaries (the "Company") have been prepared pursuant to generally accepted accounting principles for interim financial statements and the rules and regulations of the Securities and Exchange Commission. Accordingly, certain information and note disclosures normally included in annual financial statements prepared in accordance with generally accepted accounting principles have been condensed or omitted pursuant to those rules and regulations. These financial statements should be read in conjunction with the financial statements and the notes thereto included in the Company's latest audited financial statements for the year ended June 30, 2004 filed on Form 10-KSB. In the opinion of management, all adjustments (consisting of normal recurring adjustments) necessary for a fair presentation of the Company's financial condition, results of operations and cash flows for the periods presented have been included. The Company's quarterly results presented herein are not necessarily indicative of results for a full year. Organization and Nature of Business Security Intelligence Technologies, Inc. ("SIT"), a Florida corporation and its wholly owned subsidiaries (collectively the "Company") are engaged in the design, assembly and sale of security and surveillance products and systems. The Company purchases finished items for resale from independent manufacturers, and also assembles off-the-shelf electronic devices and other components into proprietary products and systems at its own facilities. The Company generally sells to businesses, distributors, government agencies and consumers through five sales offices located in Miami, Florida; Beverly Hills, California; Washington, DC; Hong Kong, its executive offices located in New Rochelle, New York and through its retail store/service center in London, England. Principles of Consolidation The consolidated financial statements include the accounts of SIT and its wholly-owned subsidiaries, CCS, Spy Shop, Ltd. d/b/a Counter Spy Shop of Delaware, a Delaware corporation (formerly a retail store closed on January 31, 2004); Security Design Group, Inc., a New York corporation (formerly a manufacturing operation, currently inactive); Counter Spy Shop of Mayfair London, Ltd., a District of Columbia corporation (formerly a retail store closed on July 1, 2003); CCS Counter Spy Shop of Mayfair London, Ltd., a California corporation (formerly a retail store closed on January 1, 2004); Counter Spy Shop of Mayfair, Ltd., a Florida corporation (formerly a sales office/retail store that ceased operations on March 31, 2004); and Homeland Security Strategies (UK), Ltd. (formerly Counter Spy Shop of Mayfair Limited, a United Kingdom corporation that operates a retail store/service center. The financial statements for the three months ended September 30, 2004 include the operations of Homeland Security Strategies, Inc., a New York corporation, that commenced operations on August 20, 2003; Homeland Security Strategies of California, Inc., a California corporation, that operates a sales office that commenced operations on December 26, 2003; and Homeland Security Strategies Inc of Florida, Inc., a Florida corporation, that operates a sales office that commenced operations on January 30, 2004. All significant intercompany balances and transactions have been eliminated in consolidation. Basis of Financial Statement Presentation The financial statements of the Company have been prepared assuming the Company will continue as a going concern, which contemplates the realization of assets and the satisfaction of liabilities in the normal course of business. The 6 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS SEPTEMBER 30, 2004 AND 2003 (Unaudited) Basis of Financial Statement Presentation - continued: Company incurred net losses of $3,410,809 and $438,457 for the three months ended September 30, 2004 and September 30, 2003 respectively. In addition, at September 30, 2004, the Company had a working capital deficit of $8,327,855 and a deficiency in stockholders' equity of $8,273,701. The Company is also a defendant in material and costly litigation, which has significantly impacted liquidity. See Note 6. The Company requires additional financing which may not be readily available. The Company's bank facility has terminated, and the only source of funds other than operations has been loans from the Company's chief executive officer, customer deposits and proceeds from convertible notes payable. (See Notes 2 and 3). These factors raise substantial doubt about the Company's ability to continue as a going concern. Management's plans with respect to these matters include; to settle vendor payables wherever possible, a reduction in operating expenses, and continued financing from the chief executive officer in the absence of other sources of funds. Management cannot provide any assurance that its plans will be successful in alleviating its liquidity concerns and bringing the Company to the point of profitability. The accompanying financial statements do not include any adjustments that might result from the outcome of these uncertainties. Revenue recognition The Company recognizes revenue from store sales upon the delivery of merchandise to a customer. Non-refundable advance payments received under marketing and distribution arrangements are deferred and either applied as payments towards customer purchases made pursuant to the terms of the respective agreements, or recognized as income at the termination of the agreement if specified purchase quotas have not been met by the customer. Customer deposits are initially recorded as liabilities and recognized as revenue when the related goods are shipped. Financial Guarantees Certain shares issued by the Company to settle debt obligations contain a price guarantee that requires the Company to settle in cash any difference between the original face amount of the debt and proceeds from the creditor's subsequent sale of the shares. The Company accounts for these transactions by recording the debt at fair value with periodic mark-to-market adjustments until the guarantee is settled. Unrealized gains or losses resulting from changes in fair value are included in earnings and accrued expenses. Stock-based Compensation The Company periodically grants stock options to employees in accordance with the provisions of its stock option plans, with the exercise price of the stock options being set at the closing market price of the common stock on the date of grant. The Company accounts for stock-based compensation plans under Accounting Principles Board Opinion No. 25, "Accounting for Stock Issued to Employees", and accordingly accounts for employee stock-based compensation utilizing the intrinsic value method. FAS No. 123, "Accounting for Stock-Based Compensation", establishes a fair value based method of accounting for stock-based compensation plans. The Company has adopted the disclosure only alternative under FAS No. 123, which requires disclosure of the pro forma effects on earnings and earnings per share as if FAS No. 123 had been adopted as well as certain other information. Stock options granted to non-employees are recorded at their fair value, as determined in accordance with SFAS No. 123 and Emerging Issues Task Force Consensus No. 96-18, and recognized over the related service period. Deferred charges for options granted to non-employees are periodically re-measured until the options vest. 7 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS SEPTEMBER 30, 2004 AND 2003 (Unaudited) Stock-based Compensation (continued) In December 2002, the FASB issued SFAS No. 148, Accounting for Stock-Based Compensation - Transition and Disclosure. SFAS No. 148 amends SFAS No. 123, Accounting for Stock-Based Compensation. Although it does not require use of fair value method of accounting for stock-based employee compensation, it does provide alternative methods of transition. It also amends the disclosure provisions of SFAS No.123 and APB No. 28, Interim Financial Reporting, to require disclosure in the summary of significant accounting policies of the effects of an entity's accounting policy with respect to stock-based employee compensation on reported net income and earnings per share in annual and interim financial statements. SFAS No. 148's amendment of the transition and annual disclosure requirements is effective for fiscal years ending after December 15, 2002. The amendment of disclosure requirements of APB No. 28 is effective for interim periods beginning after December 15, 2002. We adopted SFAS No. 148 and APB No.28 on January 1, 2003. FASB Statement 123, "Accounting for Stock-Based Compensation," requires the Company to provide pro forma information regarding net income (loss) and income (loss) per share as if compensation cost for the Company's stock option issuances had been determined in accordance with the fair value based method prescribed in FASB Statement 123. The Company estimates the fair value of each stock option at the grant date by using the Black-Scholes option-pricing model with the following weighted-average assumptions used for grants in fiscal 2004, 2003 and 2002: dividend yield of 0%, risk-free interest rate of 3.38%, expected lives of eight years, and expected volatility of 120%. Under the accounting provisions of SFAS Statement 123, the Company's net loss and loss per share for the 2004 Quarter and the 2003 Quarter would have been the pro forma amounts indicated below: Three Months Ended September 30, ----------------------- Net loss: 2004 2003 ------------ ---------- As reported $(3,410,809) $(438,457) Add: Stock based employee compensation expense included in reported net loss - - Deduct: Total stock based employee compensation expense determined under the fair value based method for all awards (33,289) (25,365) ------------ ---------- $(3,444,098) $(463,822) ============ ========== Loss per share, basic and diluted: As reported $(0.15) $(0.03) Proforma $(0.15) $(0.03) Foreign Currency Translation The functional currency of the Company's UK subsidiary is the local currency. Accordingly, the Company translates all assets and liabilities into U.S. dollars at current rates. Revenues, costs, and expenses are translated at average rates during each reporting period. Gains and losses resulting from the translation of the consolidated financial statements are excluded from results of operations and are reflected as a translation adjustment and a separate component of stockholders' deficit. Gains and losses resulting from foreign currency transactions are recognized in the consolidated statement of operations in the period they occur. 8 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS SEPTEMBER 30, 2004 AND 2003 (Unaudited) Reclassifications Cetain prior year balances have been reclassified to conform to the current year presentation. 2. Note Payable - CEO/stockholder This amount represents a note payable to the Company's chief executive officer and includes deferred salary of $210,371 and accrued interest of $156,481 based on an interest rate of 5% per annum. The Note is secured by substantially all of the assets of the Company and is due on demand. 3. Notes Payable Convertible Credit Facility; Debt Issuance Expense On June 10, 2004 the Company entered into a convertible credit agreement with private investors, including Michael D. Farkas, Ostonian Securities Limited, Kesef Equity Group, Inc., and GSM Communications, Inc. that provides for the Company to borrow up to $500,000 upon the attainment of certain performance criteria prior to September 15, 2004. At September 30, 2004 the Company had borrowed $494,000 under this agreement. The notes bear interest at the rate of 10% per annum, are convertible into the Company's common stock at $.10 per share and mature on June 30, 2005. The conversion feature was valued at $2,619,788 using the Black-Scholes option-pricing model. $315,333 of this amount was expensed during the year ended June 30, 2004 and $2,304,455 was expensed during the three months ended September 30, 2004 as debt issuance expense. 4. Loss Per Share The Company calculates earnings per share in accordance with SFAS No. 128, Earnings Per Share, and SEC Staff Accounting Bulletin No. 98. Accordingly, basic and diluted loss per share is computed using the weighted average number of shares of common stock outstanding and excludes all common stock equivalents outstanding during the period. Common stock equivalents consist of shares issuable upon the exercise of stock options and warrants using the treasury stock method. Stock options and preferred stock that are convertible into common stock based on the Company's attainment of performance goals are not includible in the calculation of earnings per share until the specified targets are met. The following securities have been excluded from the diluted computation for the three months ended September 30, 2004 and September 30, 2003 because they are contingently issuable and/or antidilutive: Three Months Ended September 30, 2004 2003 --------- --------- Series A Convertible Preferred Stock 3,500,000 3,500,000 Series B Convertible Preferred Stock 1,500,000 1,500,000 Stock options 2,609,500 1,992,500 Warrants 400,000 400,000 9 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS SEPTEMBER 30, 2004 AND 2003 (Unaudited) 5. Income taxes The Company did not incur any income tax liabilities during the three-month periods ended September 30, 2004 and 2003 due to operating losses. As of September 30, 2004, the Company has increased its tax valuation allowance to offset the deferred tax benefits of net operating losses and other temporary differences arising during the September 2004 quarter because management is uncertain as to their ultimate realization. 6. Legal Matters Litigation Settled matters On November 1, 2002, a former Company supplier filed suit in the United States District Court for the District of Maryland, captioned Micronel Safety, Inc. v. CCS International Ltd. seeking damages of $242,400 for breach of contract to purchase certain products. In August 2004, Micronel Safety, Inc. found another buyer for the products and on August 16, 2004 the case was dismissed. Pending Matters On or about March 13, 2003, an action was commenced against CCS and its subsidiary in the Circuit Court of the 11th Judicial Circuit, Miami-Dade County, Florida captioned Welcome Publishing Company, Inc. v. CCS International, Ltd. and Counter Spy Shop of Mayfair Ltd., Inc. seeking damages of $140,430 for an alleged breach of an advertising contract. CCS has denied the material allegations of the plaintiff's claim and has raised affirmative defenses thereto. The Company believes that it has valid defenses to the claim. The case appears to be going to trial, however, a trial date has not been set. The Company is also the defendant in three actions arising out of distributor agreements. On or about May 11, 2000 an action was commenced against CCS in the Supreme Court, New York County, captioned Ergonomic Systems Philippines Inc. v. CCS International Ltd. The plaintiff seeks to recover $81,000, which was paid to CCS in connection with a distributorship agreement between the parties, plus costs and interest. CCS has denied the material allegations of the claim and has raised affirmative defenses thereto. On August 3, 2004, the Court granted the plaintiff's claim which, together with accrued interest, totaled $120,223. The Company believes that it has a valid basis for appeal of the court's verdict, but it can give no assurance the court verdict will not be upheld. On or about October 12, 2001, an action was commenced against CCS in the United States District Court for the Southern District of New York, captioned China Bohai Group Co., Ltd. and USA International Business Connections Corp. v. CCS International, Ltd. The plaintiff seeks to recover $250,000 paid to CCS in connection with a distributorship agreement between the parties, plus $5,000,000 of punitive damages and costs and interest. CCS has denied the material allegations of the plaintiff's claim and has raised affirmative defenses thereto. CCS has asserted a counterclaim seeking damages in the approximate amount of $1,150,000 based upon the plaintiff's alleged breach of the parties' distributorship agreement. The Company believes that it has valid defenses to the claim. On December 3, 2002 EHS Elektronik Sistemleri submitted a demand for arbitration to the American Arbitration Association in New York City claiming CCS breached a joint venture agreement it had entered into with CCS in 1994 and seeking a refund of the $200,000 it had paid to CCS. On March 4, 2004 the arbitrator awarded the plaintiff's claim which, together with accrued interest, totaled $223,620. The Company believes that it has a valid basis for appeal of the arbitrator's award, but it can give no assurance the American Arbitration Association will not uphold the award. 10 -------------------------------------------------------------------------------- SECURITY INTELLIGENCE TECHNOLOGIES, INC. AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS SEPTEMBER 30, 2004 AND 2003 Litigation - Continued: Pending Matters On July 1, 2002, the Company's London subsidiary, Homeland Security Strategies (UK), Ltd. (formerly Counter Spy Shop of Mayfair Limited) ("HSS of UK"), entered into an agreement to assume the business operations of another United Kingdom corporation ("Predecessor") for nominal consideration. The Predecessor is a defendant in ongoing litigation brought by a former customer, who has sued for breach of a contract executed in 1998 and is seeking a refund of approximately $293,000 in products and services purchased from the Predecessor. Due to the business transfer, there is a possibility that the plaintiff could name HSS of UK as a defendant in the case. The Company, in consultation with counsel, believes that the Predecessor has valid defenses to the claim, and that HSS of UK has valid defenses against any action that may be brought against it. Because of our financial position, actions have been commenced or threatened by creditors. As of September 30, 2004 we are defending lawsuits for the collection of approximately $894,167 and have been unable to satisfy approximately $167,000 of judgments previously rendered in actions by creditors. Given that litigation is subject to many uncertainties, it is not possible to predict the outcome of the litigation pending against the Company. However, it is possible that the Company's business, results of operations, cash flows or financial position could be materially affected by an unfavorable outcome of certain pending litigation in amounts in excess of those that the Company has recognized. All such cases are being, and will continue to be vigorously defended, and the Company believes that it has meritorious and valid defenses against all such litigation, as well as a valid basis for appeal of any adverse verdicts, should they result. 11 -------------------------------------------------------------------------------- Item 2. MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS GENERAL OVERVIEW. The following discussion should be read in conjunction with the financial statements and notes thereto of the Company for the fiscal year ended June 30, 2004, which are included in our Annual Report on Form 10-KSB for such fiscal year. Historical results and trends should not be taken as indicative of future operations. Management's statements contained in this report include forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. Actual results may differ materially from those included in the forward-looking statements. The Company intends such forward-looking statements to be covered by the safe harbor provisions for forward-looking statements contained in the Private Securities Litigation Reform Act of 1995, and is including this statement for purposes of complying with those safe harbor provisions. Forward-looking statements, which are based on certain assumptions and describe future plans, strategies and expectations of the Company, are generally identifiable by use of the words "believe," "expect," "intend," "anticipate," "estimate," "project," "prospects" or similar expressions. The Company's ability to predict results or the actual effect of future plans or strategies is inherently uncertain. We are operating under a heavy financial burden as reflected in our substantial working capital deficiency and our continuing losses and negative cash flow from operations. We have sought to address these problems during fiscal 2004 by closing three of our retail operations and converting two of them to sales offices with lower operating costs, and entering into a credit agreement with an investor group pursuant to which we had borrowed $494,000 at September 30, 2004. We have no further availability under the credit agreement. Our working capital deficiency has made it difficult for us to attract new business and maintain relations with our customers and suppliers. Other than our credit agreement and loans from our chief executive officer, our main source of funds has been our customer deposits which we use for our operations. If we are unable to increase our sales and pay our note holders and other creditors, it may be necessary for us to cease business and seek protection under the Bankruptcy Code. Critical accounting policies The Company prepares its financial statements in accordance with accounting principles generally accepted in the United States of America. Preparing financial statements in accordance with generally accepted accounting principles requires the Company to make estimates and assumptions that affect the reported amounts of assets and liabilities and disclosure of contingent assets and liabilities as of the date of the financial statements and the reported amounts of revenues and expenses during the reporting period. The following paragraphs include a discussion of some of the significant accounting policies and methods applied to the preparation of the Company's consolidated financial statements. See Note 1 of Notes to Consolidated Financial Statements for further discussion of significant accounting policies. Use of estimates The preparation of financial statements in conformity with accounting principles generally accepted in the United States requires management to make estimates and assumptions that affect the reported amounts of assets and liabilities and disclosure of contingent assets and liabilities at the date of the combined financial statements, and the reported amounts of revenue and expenses during the reporting periods. Actual results could differ from those estimates. Inventories Inventories are valued at the lower of cost (first-in, first-out) or market. Revenue recognition 12 -------------------------------------------------------------------------------- The Company recognizes revenue from sales upon the delivery of merchandise to a customer. Non-refundable advance payments received under marketing and distribution arrangements are deferred and either applied as payments towards customer purchases made pursuant to the terms of the respective agreements, or recognized as income at the termination of the agreement if specified purchase quotas have not been met by the customer. Customer deposits are initially recorded as liabilities and recognized as revenue when the related goods are shipped. Stock-based Compensation We periodically grant stock options to employees in accordance with the provisions of our stock option plans, with the exercise price of the stock options being set at the closing market price of the common stock on the date of grant. We account for stock-based compensation plans under Accounting Principles Board Opinion No. 25, "Accounting for Stock Issued to Employees", and accordingly accounts for employee stock-based compensation utilizing the intrinsic value method. FAS No. 123, "Accounting for Stock-Based Compensation", establishes a fair value based method of accounting for stock-based compensation plans. We adopted the disclosure only alternative under FAS No. 123, which requires us to disclose the proforma effects on earnings and earnings per share as if FAS No. 123 had been adopted as well as certain other information. Stock options granted to non-employees are recorded at their fair value, as determined in accordance with SFAS No. 123 and Emerging Issues Task Force Consensus No. 96-18, and recognized over the related service period. Deferred charges for options granted to non-employees are periodically re-measured until the options vest. In December 2002, the FASB issued SFAS No. 148, Accounting for Stock-Based Compensation - Transition and Disclosure. SFAS No. 148 amends SFAS No. 123, Accounting for Stock-Based Compensation. Although it does not require use of the fair value method of accounting for stock-based employee compensation, it does provide alternative methods of transition. It also amends the disclosure provisions of SFAS No.123 and APB No. 28, Interim Financial Reporting, to require disclosure in the summary of significant accounting policies of the effects of an entity's accounting policy with respect to stock-based employee compensation on reported net income and earnings per share in annual and interim financial statements. SFAS No. 148's amendment of the transition and annual disclosure requirements is effective for fiscal years ending after December 15, 2002. The amendment of disclosure requirements of APB No. 28 is effective for interim periods beginning after December 15, 2002. We adopted SFAS No. 148 and APB No.28 on January 1, 2003. Income taxes We use the liability method to determine income tax expense. Under this method, deferred tax assets and liabilities are computed based on differences between financial reporting and tax basis of assets and liabilities and are measured using the enacted rates and laws that will be in effect when the differences are expected to reverse. Deferred tax assets are reduced by a valuation allowance if, based on the weight of the available evidence, it is more likely than not that all or some portion of the deferred tax assets will not be realized. The ultimate realization of the deferred tax asset depends on our ability to generate sufficient taxable income in the future. Because of our losses we did not incur any income tax expense during the three months ended September 30, 2004 or September 30, 2003. Financial guarantees Certain shares issued by the Company to settle debt obligations contain a price guarantee that requires the Company to settle in cash any difference between the original face amount of the debt and proceeds from the creditor's subsequent sale of the shares. The Company accounts for these transactions by recording the debt at fair value with periodic mark-to-market adjustments until the guarantee is settled. Unrealized gains or losses resulting from changes in fair value are included in earnings and accrued expenses. Fair Value of Financial Instruments The fair values of financial instruments recorded on the balance sheet are not significantly different from their carrying amounts due to the short-term nature of those instruments, or because they are accounted for at fair value. Joint Venture Agreements We are party to three joint venture agreements with technology companies. In connection with these agreements we and our joint venture partner formed new entities whose ownership and share of operating results are equally owned. 13 -------------------------------------------------------------------------------- The joint venture agreements grant the new entities exclusive marketing rights to the joint venture partner's products, except in the countries in which the joint venture partners are domiciled. We account for investments in the joint ventures using the equity method because our ownership is greater than 20% and we have the ability to exercise significant influence over the operating, investing and financing decisions of the joint venture entities. Under the equity method, we will record our share of joint venture income or losses and adjust the basis of its investment accordingly. As of September 30, 2004, the joint ventures have not generated any revenues and did not engage in any other significant business activity. Foreign Currency Translation The functional currency of our United Kingdom subsidiary is the local currency. Accordingly, we translate all assets and liabilities into U.S. dollars at current rates. Revenues, costs, and expenses are translated at average rates during each reporting period. Gains and losses resulting from the translation of the consolidated financial statements are excluded from results of operations and are reflected as a translation adjustment and a separate component of stockholders' deficit. Translation adjustments were $15,886 as of September 30, 2004. Gains and losses resulting from foreign currency transactions are recognized in the consolidated statement of operations in the period they occur. RESULTS OF OPERATIONS - Three Months Ended September 30, 2004 and 2003 Revenues. Revenues for the three months ended September 30, 2004 (the "2004 Quarter") were $527,318 a decrease of $409,368 or 43.7%, from revenues of $936,686 for the three months ended September 30, 2003 (the "2003 Quarter"). During fiscal 2004, we closed our retail stores in New York, Beverly Hills, Miami, and Washington, DC and converted our operations in Beverly Hills, Miami and Washington, DC from retail stores to sales offices. These closures resulted in a decrease of $462,790 from these four locations, representing a 88.2% decline is sales from $524,748 in the 2003 Quarter to $61,958 in the 2004 quarter. Our London office also experienced a decrease in revenues of $68,714 or 24.6% from revenues of $279,496 in the 2003 Quarter to $210,782 in the 2004 Quarter. These decreases were offset by increased revenues from our operations in New Rochelle, New York. Cost of Sales. Cost of sales decreased by $207,074 or 56.4%, to $160,296 in the 2004 Quarter from $367,370 in the 2003 Quarter. Cost of sales as a percentage of product sales decreased to 30.4% in the 2004 Quarter from 39.2% in the 2003 Quarter reflecting an improvement in product mix. Compensation and benefits. Compensation and benefits decreased by $72,115, or 11.6% to $550,495 in the 2004 Quarter from $622,610 in the 2003 Quarter primarily due to (i) a reduction in expense in our New York retail store that we closed on January 31, 2004 of $56,718, and (ii) decreases in our Beverly Hills and Washington DC operations where we converted from retail stores to sales offices and reduced these expenses by $50,432 both partially offset by an increase in our New Rochelle operation resulting from an increase in our marketing and sales staff. Professional fees and legal matters. Professional fees and legal matters decreased by $25,128, or 21.5% to $91,544 in the 2004 Quarter from $116,672 in the 2003 Quarter. Based on a review of outstanding legal matters and unpaid settlements, we have established, in consultation with outside counsel, reserves for litigation costs that are probable and can be reasonable estimated. We can provide no assurance, however, that such reserves will be sufficient to absorb actual losses that may result from unfavorable outcomes. Moreover, it is possible that the resolution of litigation contingencies will have a material adverse impact on our consolidated financial condition, results of operations, and cash flows. Because of our financial position, we are subject to claims, which may result in litigation from our creditors. As a result we expect that we will continue to incur attorney's fees and the use of management resources to defend these claims and litigation. Debt issuance expense. Debt issuance expense is attributable to debt we incurred that is convertible into shares of common stock at prices below the market price of our common stock on the date we incurred the debt. The potential shares of common stock were valued at $2,304,455 using the Black-Scholes option-pricing model and was expensed during the 2004 Quarter. There were no similar transactions in the 2003 Quarter. Stock based compensation. Stock based compensation is attributable to the grant of options and warrants to consultants and common stock which we issued to employees in payment of accrued wages at a discount from the market price. 14 -------------------------------------------------------------------------------- These items were valued at $119,957 using the Black-Scholes option-pricing model and were expensed during the 2004 Quarter. Comparable expense in the 2003 Quarter was $75,507. Selling, general and administrative expenses. Selling, general and administrative decreased by $65,323, or 15.8% to $349,069 in the 2004 Quarter from $414,392 in the 2003 Quarter. The decrease was primarily due to a decrease in rent expense of $76,213, or 47.4% to $84,741 in the 2004 Quarter from $160,954 in the 2003 Quarter due to lower rents in relocated sales offices partially offset by an increase in travel and attendance at trade shows. Unrealized loss (gain) on financial guarantees. Unrealized loss (gain) on financial guarantees is attributable to the increase or decrease in market value relating to our price guarantees on common stock which we have issued in payment of trade payables. Unrealized loss (gain) on financial guarantees changed $583,204 or 229.2%, to a loss of $328,764 in the 2004 Quarter from a gain of $254,440 in the 2003 Quarter. Depreciation and amortization. Depreciation and amortization decreased by $10,168, or 76.3% to $3,165 in the 2004 Quarter from $13,351 in the 2003 Quarter as a consequence of certain assets becoming fully depreciated in fiscal 2004. Interest expense. Interest expense increased by $10,701 or 54.4% to $30,382 in the 2004 Quarter from $19,681 in the 2003 Quarter as a result of a continued increase in the Company's interest bearing outstanding debt obligations. As a result of the factors described above, our net loss increased by $2,972,352, or 677.9% to $3,410,809, $.15 per share, in the 2004 Quarter from $438,457, $.02 per share, in the 2003 Quarter. LIQUIDITY AND CAPITAL RESOURCES We require significant working capital to fund our future operations. At September 30, 2004 we had cash of $59,471 and a working capital deficit of $8,327,855. During the 2004 Quarter, we had a negative cash flow from operations of $451,070. Our accounts payable and accrued expenses at September 30, 2004 were $4,082,951. As a result of our continuing losses, our working capital deficiency has increased. We funded our losses through the issuance of convertible notes. We also utilized vendor credit and customer deposits. Because we have not been able to pay our trade creditors in a timely manner, we have been subject to litigation and threats of litigation from our trade creditors and we have used common stock to satisfy our obligations to trade creditors. In many instances when we issue common stock, we have provided that if the stock does not reach a specified price level one year from issuance, we will pay the difference between that price level and the actual price. As a result, we have contingent obligations to our some of these creditors. With respect to 1,351,459 shares of common stock issued during the fiscal 2004, 2003 and 2002, the market value of the common stock on September 30, 2004 was approximately $489,776 less than the guaranteed price. Our accounts payable and accrued expenses increased from $3,722,228 at June 30, 2004 to $4,082,951 at September 30, 2004 an increase of $360,723. After a decrease in the market value of our common stock held by trade creditors of $328,764 our other accounts payable and accrued expenses increased by $31,959 reflecting our inability to pay creditors currently. We also had customer deposits and deferred revenue of $3,376,507 which relate to payments on orders which had not been filled at that date. We have used our advance payments to fund our operations. If our vendors do not extend us necessary credit we may not be able to fill current or new orders, which may affect the willingness of our clients to continue to place orders with us. During the past three years we have sought, and been unsuccessful, in our efforts to obtain adequate funding for our business. Because of our losses, we are not able to increase our borrowing. Our bank facility terminated on November 1, 2002 and to date, we do not have any agreements with any replacement bank. In June 2004 we entered into a convertible credit agreement with private investors that permits us to borrow up to $500,000 upon the attainment of certain performance criteria. At September 30, 2004 we had borrowed $494,000 and no more funds are available under this agreement. Our obligations to these lenders become due in June 2005. We do not presently have the resources to pay the lenders. Unless we are either able to raise equity or debt capital, which is unlikely based on our financial condition and history of losses which are continuing, or the lenders extend the maturity date or convert their debt into equity, we are unlikely to be able to pay the notes. If the lenders seek to enforce their notes, it may be necessary for us to seek protection under the Bankruptcy Code. Our failure to obtain financing would materially impair our ability to continue in business, and we cannot assure you that we will be able to obtain the necessary financing. Our main source of funds other than the private 15 -------------------------------------------------------------------------------- investors has been from loans from our chief executive officer, customer deposits and vendor credit. During fiscal 2004 we raised $813,000 resulting from the exercise of options to buy our common stock and the sale of our common stock. Management cannot provide any assurance that we will be able to raise any more money through the sale of our equity securities. We may not be able to obtain any additional funding, and, if we are not able to raise funding, we may be unable to continue in business. Furthermore, if we are able to raise funding in the equity markets, our stockholders might suffer significant dilution and the issuance of securities may result in a change of control. These factors raise substantial doubt about our ability to continue as a going concern. Our financial statements do not include any adjustments that might result from the outcome of these uncertainties. Item 3. Controls and Procedures Our chief executive officer and chief financial officer have supervised and participated in an evaluation of the effectiveness of our disclosure controls and procedures as of a date within 90 days of the date of this report, and, based on their evaluations, they believe that our disclosure controls and procedures (as defined in Rule 13a-14(c) of the Securities Exchange Act of 1934, as amended) are designed to ensure that information required to be disclosed by us in the reports that we file or submit under the Securities Exchange Act of 1934 is recorded, processed, summarized and reported, within the time periods specified in the Commission's rules and forms. As a result of the evaluation, there were no significant changes in our internal controls or in other factors that could significantly affect these controls subsequent to the date of their evaluation. PART II OTHER INFORMATION Item 6. EXHIBITS AND REPORTS OF FORM 8K (a) Exhibits 31.1 Certificate of Chief Executive Officer pursuant to Section 302 of the Sarbanes-Oxley Act of 2002. 31.2 Certificate of Chief Financial Officer pursuant to Section 302 of the Sarbanes-Oxley Act of 2002. 32.1 Certificate of Chief Executive Officer and Chief Financial Officer pursuant to Section 906 of the Sarbanes-Oxley Act of 2002. (b) Reports on Form 8-K None SIGNATURES Pursuant to the requirements of the Securities Exchange Act of 1934, the Registrant has duly caused this report to be signed on its behalf by the undersigned, thereunto duly authorized. SECURITY INTELLIGENCE TECHNOLOGIES, INC. By: /s/ Ben Jamil ----------------------------------- Ben Jamil, chief executive officer By: /s/ Chris R. Decker ----------------------------------- Chris R. Decker, chief financial officer Date: November 19, 2004 16 -------------------------------------------------------------------------------- Exhibit 31.1 CHIEF EXECUTIVE OFFICER CERTIFICATION PURSUANT TO SECTION 302 OF THE SARBANES-OXLEY ACT OF 2002 I, Ben Jamil, chief executive officer of Security Intelligence Technologies, Inc. (the "registrant"), certify that: 1. I have reviewed this quarterly report on Form 10-QSB of the registrant; 2. Based on my knowledge, this quarterly report does not contain any untrue statement of a material fact or omit to state a material fact necessary to make the statements made, in light of the circumstances under which such statements were made, not misleading with respect to the period covered by this quarterly report; 3. Based on my knowledge, the financial statements, and other financial information included in this quarterly report, fairly present in all material respects the financial condition, results of operations and cash flows of the registrant as of, and for, the periods presented in this quarterly report; 4. The registrant's other certifying officers and I are responsible for establishing and maintaining disclosure controls and procedures (as defined in Exchange Act Rules 13a-14 and 15d-14) for the registrant and we have: a) designed such disclosure controls and procedures to ensure that material information relating to the registrant, including its consolidated subsidiaries, is made known to us by others within those entities, particularly during the period in which this quarterly report is being prepared; b) evaluated the effectiveness of the registrant's disclosure controls and procedures as of a date within 90 days prior to the filing date of this quarterly report (the "Evaluation Date"); and c) presented in this quarterly report our conclusions about the effectiveness of the disclosure controls and procedures based on our evaluation as of the Evaluation Date; 5. The registrant's other certifying officers and I have disclosed, based on our most recent evaluation, to the registrant's auditors and the audit committee of registrant's board of directors (or persons performing the equivalent function): a) all significant deficiencies in the design or operation of internal controls which could adversely affect the registrant's ability to record, process, summarize and report financial data and have identified for the registrant's auditors any material weaknesses in internal controls; and b) any fraud, whether or not material, that involves management or other employees who have a significant role in the registrant's internal controls; and 6. The registrant's other certifying officers and I have indicated in this quarterly report whether or not there were significant changes in internal controls or in other factors that could significantly affect internal controls subsequent to the date of our most recent evaluation, including any corrective actions with regard to significant deficiencies and material weaknesses. Date: November 19, 2004 By: /s/ Ben Jamil Ben Jamil Chief Executive Officer 17 -------------------------------------------------------------------------------- Exhibit 31.2 CHIEF FINANCIAL OFFICER CERTIFICATION PURSUANT TO SECTION 302 OF THE SARBANES-OXLEY ACT OF 2002 I, Chris Decker, chief financial officer of Security Intelligence Technologies, Inc. (the "registrant"), certify that: 1. I have reviewed this quarterly report on Form 10-QSB of the registrant; 2. Based on my knowledge, this quarterly report does not contain any untrue statement of a material fact or omit to state a material fact necessary to make the statements made, in light of the circumstances under which such statements were made, not misleading with respect to the period covered by this quarterly report; 3. Based on my knowledge, the financial statements, and other financial information included in this quarterly report, fairly present in all material respects the financial condition, results of operations and cash flows of the registrant as of, and for, the periods presented in this quarterly report; 4. The registrant's other certifying officers and I are responsible for establishing and maintaining disclosure controls and procedures (as defined in Exchange Act Rules 13a-14 and 15d-14) for the registrant and we have: a) designed such disclosure controls and procedures to ensure that material information relating to the registrant, including its consolidated subsidiaries, is made known to us by others within those entities, particularly during the period in which this quarterly report is being prepared; b) evaluated the effectiveness of the registrant's disclosure controls and procedures as of a date within 90 days prior to the filing date of this quarterly report (the "Evaluation Date"); and c) presented in this quarterly report our conclusions about the effectiveness of the disclosure controls and procedures based on our evaluation as of the Evaluation Date; 5. The registrant's other certifying officers and I have disclosed, based on our most recent evaluation, to the registrant's auditors and the audit committee of registrant's board of directors (or persons performing the equivalent function): a) all significant deficiencies in the design or operation of internal controls which could adversely affect the registrant's ability to record, process, summarize and report financial data and have identified for the registrant's auditors any material weaknesses in internal controls; and b) any fraud, whether or not material, that involves management or other employees who have a significant role in the registrant's internal controls; and 6. The registrant's other certifying officers and I have indicated in this quarterly report whether or not there were significant changes in internal controls or in other factors that could significantly affect internal controls subsequent to the date of our most recent evaluation, including any corrective actions with regard to significant deficiencies and material weaknesses. Date: November 19, 2004 By: /s/ Chris R. Decker Chris R. Decker Chief Financial Officer 18 -------------------------------------------------------------------------------- Exhibit 32.1 CERTIFICATION PURSUANT TO SECTION 906 OF THE SARBANES-OXLEY ACT OF 2002 In connection with the quarterly report on Form 10-QSB of Security Intelligence Technologies, Inc. (the "Company") for the period ended September 30, 2004, as filed with the Securities and Exchange Commission on the date hereof (the "Report"), I, Ben Jamil, the Chief Executive Officer of the Company, and I, Chris R. Decker, Chief Financial Officer of the Company, do hereby certify pursuant to 18 U.S.C. ss.1350, as adopted pursuant to ss.906 of the Sarbanes-Oxley Act of 2002, to the best of my knowledge and belief that: (1) the Report fully complies with the requirements of Section 13(a) or 15(d) of the Securities Exchange Act of 1934, as amended; and (2) the information contained in the Report fairly presents, in all material respects, the financial condition and results of operations of the Company. Dated: November 19, 2004 /s/ Ben Jamil ------------- Ben Jamil Chief Executive Officer Dated: November 19, 2004 /s/ Chris R. Decker ------------------- Chris R. Decker Chief Financial Officer This certification accompanies each Report pursuant to ss.906 of the Sarbanes-Oxley Act of 2002 and shall not, except to the extent required by the Sarbanes-Oxley Act of 2002, be deemed filed by the Company for purposes of ss.18 of the Securities Exchange Act of 1934, as amended. CERTIFICATIONS OF CHIEF EXECUTIVE AND FINANCIAL OFFICERS The undersigned chief executive officer and chief financial officer of the Registrant do hereby certify that this Quarterly Report on Form 10-QSB fully complies with the requirements of Section 13(a) or 15(d) of the Securities Act of 1934, as amended, and that the information contained in this report fairly presents, in all material respects, the financial condition and results of operations of the Registrant at the dates and for the periods shown in such report. By: /s/ Ben Jamil Ben Jamil Chief Executive Officer By: /s/ Chris R. Decker Chris R. Decker Chief Financial Officer I, Ben Jamil, chief executive officer of Security Intelligence Technologies, Inc. (the "registrant"), certify that: 1. I have reviewed this quarterly report on Form 10-QSB of the registrant; 2. Based on my knowledge, this quarterly report does not contain any untrue statement of a material fact or omit to state a material fact necessary to make the statements made, in light of the circumstances under which such statements were made, not misleading with respect to the period covered by this quarterly report; 19 -------------------------------------------------------------------------------- 3. Based on my knowledge, the financial statements, and other financial information included in this quarterly report, fairly present in all material respects the financial condition, results of operations and cash flows of the registrant as of, and for, the periods presented in this quarterly report; 4. The registrant's other certifying officers and I are responsible for establishing and maintaining disclosure controls and procedures (as defined in Exchange Act Rules 13a-14 and 15d-14) for the registrant and we have: a) designed such disclosure controls and procedures to ensure that material information relating to the registrant, including its consolidated subsidiaries, is made known to us by others within those entities, particularly during the period in which this quarterly report is being prepared; b) evaluated the effectiveness of the registrant's disclosure controls and procedures as of a date within 90 days prior to the filing date of this quarterly report (the "Evaluation Date"); and c) presented in this quarterly report our conclusions about the effectiveness of the disclosure controls and procedures based on our evaluation as of the Evaluation Date; 5. The registrant's other certifying officers and I have disclosed, based on our most recent evaluation, to the registrant's auditors and the audit committee of registrant's board of directors (or persons performing the equivalent function): a) all significant deficiencies in the design or operation of internal controls which could adversely affect the registrant's ability to record, process, summarize and report financial data and have identified for the registrant's auditors any material weaknesses in internal controls; and b) any fraud, whether or not material, that involves management or other employees who have a significant role in the registrant's internal controls; and 6. The registrant's other certifying officers and I have indicated in this quarterly report whether or not there were significant changes in internal controls or in other factors that could significantly affect internal controls subsequent to the date of our most recent evaluation, including any corrective actions with regard to significant deficiencies and material weaknesses. Date: November 19, 2004 By: /s/ Ben Jamil Ben Jamil Chief Executive Officer I, Chris Decker, chief financial officer of Security Intelligence Technologies, Inc. (the "registrant"), certify that: 1. I have reviewed this quarterly report on Form 10-QSB of the registrant; 2. Based on my knowledge, this quarterly report does not contain any untrue statement of a material fact or omit to state a material fact necessary to make the statements made, in light of the circumstances under which such statements were made, not misleading with respect to the period covered by this quarterly report; 3. Based on my knowledge, the financial statements, and other financial information included in this quarterly report, fairly present in all material respects the financial condition, results of operations and cash flows of the registrant as of, and for, the periods presented in this quarterly report; 4. The registrant's other certifying officers and I are responsible for establishing and maintaining disclosure controls and procedures (as defined in Exchange Act Rules 13a-14 and 15d-14) for the registrant and we have: a) designed such disclosure controls and procedures to ensure that material information relating to the registrant, including its consolidated subsidiaries, is made known to us by others within those entities, particularly during the period in which this quarterly report is being prepared; 20 -------------------------------------------------------------------------------- b) evaluated the effectiveness of the registrant's disclosure controls and procedures as of a date within 90 days prior to the filing date of this quarterly report (the "Evaluation Date"); and c) presented in this quarterly report our conclusions about the effectiveness of the disclosure controls and procedures based on our evaluation as of the Evaluation Date; 5. The registrant's other certifying officers and I have disclosed, based on our most recent evaluation, to the registrant's auditors and the audit committee of registrant's board of directors (or persons performing the equivalent function): a) all significant deficiencies in the design or operation of internal controls which could adversely affect the registrant's ability to record, process, summarize and report financial data and have identified for the registrant's auditors any material weaknesses in internal controls; and b) any fraud, whether or not material, that involves management or other employees who have a significant role in the registrant's internal controls; and 6. The registrant's other certifying officers and I have indicated in this quarterly report whether or not there were significant changes in internal controls or in other factors that could significantly affect internal controls subsequent to the date of our most recent evaluation, including any corrective actions with regard to significant deficiencies and material weaknesses. Date: November 19, 2004 By: /s/ Chris R. Decker Chris R. Decker Chief Financial Officer 21 ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10188 From: kondrak Date: Sat Nov 20, 2004 3:54pm Subject: Re: I'm under attack ? ! ? Absofrigginloutely! I concur 100%! I use Symantec corporate for anti-viri, Sygate for a firewall, and regularly run ad-aware for adware infiltrations, and Spy-bot search and destroy for spyware. I suggest everyone do the same. As for the firewall and anti-virus, the choices are up to you, but ad-aware and spybot are free, and highly effective. A note on spybot, theres an option to secure your browsers from implants, I sugges you run this after your definitions are uldated, and the machine scanned. Currently there are around 21,000 different spywares it checks for, and it can protect "broken browsers" like IE from a number of threats. Spyware has been shown to reduce the efficiency of an otherwise normal machine to the point of non-functionality. Ive seen it. At 23:17 11/18/2004, you wrote: >Don¥t trust only your firewall to protect your >privacy. >If you want maximum security, consider the following: > >1. Use a good firewall (OK, you¥ve got one) > >2. Use a good antivirus (OK, you¥ve got one) > >3. Keep your system patched. If you don¥t, you deserve >to be hacked! > >4. Use antispyware tools. Spyware is malicious code >inserted by web sites while surfing. Used to hijack >your browser, read your cookies, etc. Best are: >Spybot Search & Destroy >http://www.safer-networking.org/en/index.html > >Ad-aware SE Personal Edition >http://www.lavasoft.de/ > >5. Use Mozilla Firefox, instead of Internet Explorer >(lot less known vulnerabilities) >http://www.mozilla.org/products/firefox/ > >6. Detect and delete Browser Helper Objects (modern >troyans NOT detected by your antivirus/firewall, very >dangerous ¥cause a hacker can establish two-way >communications to your PC, "mounted" on Internet >Explorer). Used to BYPASS your firewall. >http://www.definitivesolutions.com/bhodemon.htm >http://www.securiteam.com/windowsntfocus/5UP0P0AAKK.html > >7. Protect your PC against "Zero Day Attacks" (attacks >to vulnerabilities from which there¥s no patch >available) >http://www1.prevx.com/prevxhome.asp > >8. Configure your mail/browser client to display >text-only content. No HTML, cause is a great way to >fingerprint you. > >I give this tips on my Professional Hacking training >to corporations. With this, a hacker will have a >really, really hard time tying to compromise your >machine. > >Greetings. > >-- contranl wrote: > > > > > > > . > > > > This is probably slightly off-topic ...sorry for > > that > > But i suppose someone out here can tell me what this > > is ? > > > > Since a few days i have a new PC with a new Norton > > internet security > > and anti-virus package. > > > > Today Norton told me 2 times that i am under attack > > and that "they" > > are trying to get into my computer it also talks > > about trojan stuff > > > > Norton told me about 2 ip adresses where these > > attacks come from > > if you click on these numbers a map shows up showing > > the physical > > locations of these ip-adresses: > > > > One is in Korea and the other one in Iran > > > > Have a look at the details Norton gave me on the > > last one: > > > > ----------------------------------------- > > > > inetnum: 62.193.0.0 - 62.193.31.255 > > org: ORG-DI3-RIPE > > netname: IR-DPI-20000717 > > descr: DP IRAN > > descr: PROVIDER > > country: IR > > admin-c: NN124-RIPE > > tech-c: FA2406-RIPE > > status: ALLOCATED PA > > mnt-by: RIPE-NCC-HM-MNT > > mnt-lower: DPI-MNT > > changed: hostmaster@r... 20000717 > > changed: hostmaster@r... 20020419 > > changed: hostmaster@r... 20020423 > > changed: hostmaster@r... 20020613 > > changed: hostmaster@r... 20020711 > > source: RIPE > > > > inetnum: 62.193.4.0 - 62.193.5.255 > > netname: DPI > > descr: Dialup Router ( Gozare1 ) - Data > > Processing Of Iran > > country: IR > > admin-c: FND4-RIPE > > tech-c: FA2406-RIPE > > status: ASSIGNED PA > > notify: dadgar@d... > > notify: faranak@d... > > mnt-by: DPI-MNT > > changed: krazavi@d... 20021028 > > changed: faranak@d... 20040704 > > source: RIPE > > > > % RIPE database, last updated Nov 17, 2004 12:09:57 > > AM > > > > >------------------------------------------------------- > > > > To be clear this does not happen while i am surfing > > the internet > > or downloading anything... i have a website but that > > runs at my > > host's location not here on my home pc > > > > What i understand of it is that they are directly > > attacking my PC > > God knows why me. > > > > What the hell is this ? > > I am not the Pentagon !! > > Is this normal business as usual ? > > Does everyone have these attacks on a daily base ? > > and are they part > > of let's call it mass-attacks to thousands of PC's ? > > From these same spooky countries ? > > Or am i specifically attacked here ? > > > > > > Thanks for any answers > > > > Tetrascanner > > www.tetrascanner.com > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > the hands acquire shaking, the shaking is a > > warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== > > TSKS > > Yahoo! Groups Links > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > >===== >Javier Villanueva C. >Vcorp & Asociados >Tel. (01 33) 36 19 47 09 >cel. 044 33 33 92 64 50 >msm. javier_vc@h... >http://vcorpgdl.netfirms.com/news.pdf > > > >__________________________________ >Do you Yahoo!? >Meet the all-new My Yahoo! - Try it today! >http://my.yahoo.com > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10189 From: kondrak Date: Sat Nov 20, 2004 3:57pm Subject: Re: Re: I'm under attack ? ! ? There are none, this must be accomplished by protecting YOUR OWN computer. As an aside, I just checked that page, and nothing happened here, nothing gets thru a properly configured and protected computer, unless you invite it in by running it's nasty program. >Where is the webpolice ? > >Tetrascanner 10190 From: contranl Date: Sat Nov 20, 2004 4:03pm Subject: Comverse / Amdocs / Calea (online-video) . Here's a link to a video on the Comverse/Amdocs story http://www.whatreallyhappened.com/israeli.wmv I understand that this video was removed 1 day after it appeared on the net...no reason was given,as you see it's still around. Short contents and some additional info: Israelian company does the billing for several phone-companies in the US (and not only US ) Israelian company installs phone tapping facilities in the US (and not only US) Israelian criminals are involved(acting as spy's at the same time) Billing info (originating and dialed numbers) are passed on to the Israelian secret services) Above Tapping facilities did have secret backdoors,phones were tapped and tapped on top of that ...all the way from Israel,infact any phoneline of choice could be tapped,convenient(scrambled)T1 lines to Israel could carry 100's of conversations at the same time...some stories on the net even speak about the whitehouse's phone conversations being nicely relayed. Up till at least 9/11 this was the case...some say Israelian companies at the world trade center were warned thanks to information gathered from this bugging action...wich leads to other questions...to say the least. If you do some research on this subject you very soon end up at let's call them "activist" websites ...just as i did, i spend a few days on them and ended up with a very negative insight about where this world is leading to...you are warned ! Above companies are still around and have installed governmental tapping facilities worldwide including my country The Netherlands Amdocs still does billing for phone-companies worlwide in my country they do that for Vodaphone. All of this in reaction to a previous posting on this subject. Tetrascanner www.tetrascanner.com . 10191 From: contranl Date: Sat Nov 20, 2004 4:09pm Subject: Re: I'm under attack ? ! ? . Are you telling me that there is no institution where you can complain about an official company that sends virus-like adware ? To say it different: tomorrow i will register and run a official website that will destroy or mess up a few 1000 computers a day...and i can keep on doing that forever ?? ....so i hacker get's the FBI in his neck and such a malicious company not ? Tetrascanner 10192 From: Tech Sec Lab Date: Sat Nov 20, 2004 4:16pm Subject: RE: TSCM Procedures Go for it buddy! Nothing risked nothing gained. ********************** Message: 9 Date: Fri, 19 Nov 2004 23:34:31 -0500 From: "James M. Atkinson" Subject: Re: TSCM Procedures If I get enough requests I will post a copy of just such a guide to my site for the group to download. Can I get an Amen? -jma 10193 From: Mitch D Date: Sat Nov 20, 2004 4:53pm Subject: pole camera I agree w Roger, A pole cam would probably be more of a pain in the ass to drag around,more batteries to charge etc.The monitor is too small to even notice a well concealed wire.If someone needs one that bad,you could build one one for under $450.00.......... ===== Mitch Davis TSCM/Special Operations Group Inc. Nashville,TN.USA MitchD@t... site:www.tscmusa.com. Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 __________________________________ Do you Yahoo!? The all-new My Yahoo! - Get yours free! http://my.yahoo.com 10194 From: Thomas Shaddack Date: Sat Nov 20, 2004 5:55pm Subject: Re: pole camera A poor man's improvisation of the same can be done with a digital camera (even measly 2 megapixels are MUCH better than a NTSC/PAL camera, and 5 Mpix is quite affordable now). I routinely look at places difficult to get to by just sticking a cam there. A normal photographic tripod can be used as a pole, even if bulky and heavy, if you don't have time to put a M6 bolt to something else (eg. a broomstick). Or you can just duct-tape the cam to the broomstick. Most cams have the possibility of delayed shot, executed 10 seconds after pressing the trigger. This can be used for taking pictures above ceiling tiles without having to actually go there, with pretty decent resolution. Used it to survey water damage and cable placements in difficult-to-access areas, and it worked to my full satisfaction. If the cam has problems with not enough light for automatic focus, duct-tape a flashlight to the assembly. And you can get fancier than that. Many cameras have a TV output, usually configurable for both PAL and NTSC. This, in combination with a small LCD monitor, can be used for remote viewing, like a standard pole camera, but with the added advantage of zoom and, more important, taking high-resolution pictures of interesting areas (modern 8Mpix cameras have resolution similar to film, and I think I heard about Fuji having a 20 megapixels model and Kodak having a 22 Mpix now; common sub-1000$ ones (according to Froogle.google.com) are 6.3 and 8 megapixels, which should be good enough for most purposes). With zoom and macro, and digital image enhancement on the laptop right on-site, this could rival eyes, or even be better than them. Another advantage is that a camera can get to places human head is too big or too costly for. Some cameras have remote control, others can be modified by soldering a pair of pushbuttons in parallel to the trigger button (which is usually two-level: first position is "focus", the other is "shoot"). Same applies to the zoom control. Some cameras can be combined with a bank of infrared LEDs as a light, if a visible light is unsuitable for any reason. Warning, some have IR filters over the chip that can't be removed; these ones are unsuitable. A test with a TV remote control, if it can see the LED flashing, is useful here. (Same approach is handy for debugging IrDA connections, to see the transmit/receive patterns on the devices.) On another note... Given the rapidly falling price of lower-end digital cameras, it should be easy to couple a camera with a motion detector and a microcontroller and have a cheap and autonomous silent-sentry system taking relatively high-res pictures of the eventual intruders and capable of rapid deployment in the field. The only problem here is the source of light, as using a visible flash may not be suitable in all situations, as in some cases you don't want the adversary to know they just became movie stars. QUESTION FOR THE CROWD: Is it possible to make an infrared flash for a camera, powerful enough to give good response on a cheap CCD on a moderate distance (5-8 meters)? What is the best option here, go for a xenon flash with a filter for blocking the visible light, or is it better to rely on a bank of pulse-driven LEDs? On Sat, 20 Nov 2004, Mitch D wrote: > > I agree w Roger, > A pole cam would probably be more of a pain in the ass to drag > around,more batteries to charge etc.The monitor is too small to > even notice a well concealed wire.If someone needs one that > bad,you could build one one for under $450.00.......... > > ===== > > Mitch Davis > TSCM/Special Operations Group Inc. > Nashville,TN.USA > MitchD@t... site:www.tscmusa.com. > Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 > > > > > > > > > __________________________________ > Do you Yahoo!? > The all-new My Yahoo! - Get yours free! > http://my.yahoo.com > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > From: Shawn Hughes (Road) Date: Sat Nov 20, 2004 11:53pm Subject: Re: Linux Never do anything half way! ;) I am learning linux for a contract I have. This is WAY off topic, so if you want to reply off-line, that's fine. Anybody know how to keep linux from trying to take over a hardwired routers' job? Basically a SOHO setup, if the router takes too long to assign an address to anybody on the backbone, this server tries to jump in and take over. Driving me NUTS! Thx, -Shawn ==================================== Shawn Hughes Special Projects Consultant and Subcontractor (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response www.warriormindset.com Training at the Cutting Edge! (731) 676-2041 Main Office ////////////////////////////////////////////////////////////////////////////// ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. At 09:51 AM 11/20/04 +0000, you wrote: >Since you mentioned the Penguin :-) . I know, I know, creeping off topic, >but has anyone tried NSA's very nice Security Enhanced Linux? [Non-text portions of this message have been removed] 10196 From: contranl Date: Sun Nov 21, 2004 6:12am Subject: France biggest bugging scandal in court this week . France biggest bugging scandal in court this week Former French president Mitterrand used his counter-terrorism-unit called GIGN (http://www.gign.org/gign/index.php) to spy and bug on anyone he did'nt like. During his presidency (1981~1995 !)thousands where tapped at his convenience ,anyone writing or thinking against him was on his list writers,journalists,politicians,moviestars...etc He did have a "secret" unlawful child ..if you were planning to reveal that you had at least your phone bugged. The counter-terrorism-unit even went so far as to plant evidence of drugs-trafficing or weapons-possession in the cars or houses of those that were "unfriendly" to him. The trial started last week and is called "Big Ears" Mitterand has died a while ago and so has his former minister of defence Hernu who was responsable for the counter-terrorist-unit. What is left and on trial now are the people that did the actual bugging...without asking any questions, they are called "Petit mains" (little hands) Ofcourse this is al long ago ...those things don't happen anymore. Some links: http://tinyurl.com/5jaw4 http://www.ttc.org/200411150225.iaf2pg700837.htm http://edition.cnn.com/2004/WORLD/europe/11/15/mitterand.reut/ Tetrascanner www.tetrascanner.com . 10197 From: A Grudko Date: Sun Nov 21, 2004 6:27am Subject: Airport cops http://story.news.yahoo.com/news?tmpl=story&cid=519&e=13&u=/ap/airport_polic e Video Prompts L.A. Airport Police Probe Sat Nov 20, 5:51 PM ET LOS ANGELES - City officials are calling for an investigation of Los Angeles International Airport police after hidden cameras captured several officers abandoning their posts and ignoring emergency radio calls. "I am very concerned about airport police officers neglecting their duties," Mayor James K. Hahn wrote to Kim Day, executive director of the airport agency. "Security at the airport must not be compromised." The camera footage broadcast Thursday by KCBS-TV appeared to show officers spending hours of their shifts away from the airport or staying at the airport but not working. It also showed police chatting at a restaurant while ignoring radio calls about abandoned suitcases, and using a patrol car to pick up a child at school. KCBS reporters followed officers for two months with hidden cameras. The airport police force employs 300 officers. Airport Police Chief Bernard J. Wilson said a department probe already is under way and two employees have been placed on administrative leave with pay. "I will not tolerate misconduct," Wilson added. "And I won't allow the reputation of the airport police to be tarnished by a few." --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.799 / Virus Database: 543 - Release Date: 2004/11/19 [Non-text portions of this message have been removed] 10198 From: Ali-Reza Anghaie Date: Sat Nov 20, 2004 11:19pm Subject: Re: Re: Linux On Sun, 2004-11-21 at 00:53, Shawn Hughes (Road) wrote: > I am learning linux for a contract I have. This is WAY off topic, so if you > want to reply off-line, that's fine. Anybody know how to keep linux from > trying to take over a hardwired routers' job? Basically a SOHO setup, if > the router takes too long to assign an address to anybody on the backbone, > this server tries to jump in and take over. Driving me NUTS! It sounds like your Linux box is trying to act like a DHCP server and/or running routed. That is likely a combination of a misconfiguration of your box and the local router/switch. If you're using Red Hat or a Red Hat relatives then start "ntsysv" as root and uncheck the boxes for 'routed' and 'dhcp' and other dhcp server services.. or all dhcp* items if you assign a static IP to the Linux box anywy. If you're using Debian then first you should run "runlevel" to determine the runlevel you're in. It'll come back with something like "N 3"... for whatever that # is you should "cd /etc/rc.d/rc#.d/" where you insert the #.. in there you should see soft links that start with a capital "S".. "rm" the links that point to routed or DHCP servers. Not DHCPD as the client.... unless, again, you assign a static IP. If your using Gentoo look in /etc/runlevels/boot for the symlinks... Or better yet, since I have no idea what you're using and what versions then you can just Google for "turning off daemons " and figure it out from there. Cheers, -Ali -- OpenPGP Key: 030E44E6 -- Was I helpful?: http://svcs.affero.net/rm.php?r=packetknife -- Do not worry about your problems in mathematics. I assure you, my problems with mathematics are much greater than yours. -- Albert Einstein 10199 From: kondrak Date: Mon Nov 22, 2004 0:16am Subject: Re: Re: I'm under attack ? ! ? Not here, theyve resisted making it illegal for years now. At 17:09 11/20/2004, you wrote: >. > >Are you telling me that there is no institution where you can >complain about an official company that sends virus-like adware ? > >To say it different: tomorrow i will register and run a official >website that will destroy or mess up a few 1000 computers a >day...and i can keep on doing that forever ?? ....so i hacker get's >the FBI in his neck and such a malicious company not ? > >Tetrascanner > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10200 From: geodex Date: Mon Nov 22, 2004 2:29am Subject: Re: TSCM Procedures Count Me too. On Friday 19 November 2004 22:31, Michael Dever wrote: > I am trying to educate some clients on the importance of specifying > 'technical' parameters in their RFT (request for tender) for TSCM > services, particularly on the RF side of the house. 10201 From: delta Date: Mon Nov 22, 2004 4:16am Subject: Re: France biggest bugging scandal in court this week Former French president Mitterrand used his counter-terrorism-unit called GIGN (http://www.gign.org/gign/index.php) to spy and bug on anyone he did'nt like. this is not the gign but the gic gign is a militatry group trained to the security of the people and gic is the intercetion unit . david 10202 From: Nalesnik, Matthew Date: Mon Nov 22, 2004 9:55am Subject: RE: TSCM Procedures Amen! -----Original Message----- From: Tech Sec Lab [mailto:tscmteam@o...] Sent: Saturday, November 20, 2004 5:16 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] TSCM Procedures Go for it buddy! Nothing risked nothing gained. ********************** Message: 9 Date: Fri, 19 Nov 2004 23:34:31 -0500 From: "James M. Atkinson" Subject: Re: TSCM Procedures If I get enough requests I will post a copy of just such a guide to my site for the group to download. Can I get an Amen? -jma ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT click here _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10203 From: Hawkspirit Date: Mon Nov 22, 2004 11:26am Subject: Sweep Frequency Coverage I just swept a Union Office over the weekend that had a device operating at 5.8GHZ in the CEO's office so you better be going out to that as a minimum. Roger Tolces Electronic Security www.bugsweeps.com Date: Sat, 20 Nov 2004 09:31:28 +1100 From: Michael Dever Subject: TSCM Procedures I am trying to educate some clients on the importance of specifying 'technical' parameters in their RFT (request for tender) for TSCM services, particularly on the RF side of the house. So far, most clients will specify a frequency range (e.g. one recently specified 10kHz to 5 GHz!!! another 21 GHz) but say nothing about sensitivity. As you can imagine it is sometimes very difficult to convince a client that specifying a frequency on its own is of very little value if you are not addressing the required sensitivity. Unfortunately the average corporate client knows very little about these issues and some are influenced by mavins or equipment vendors when putting together their RFT, making it hard to convince them of the difference between a PI using a broad band device versus a team with a lab grade SA. My question is: does anybody have a set of standard words that could be incorporated into the technical parameters of the RFT to ensure that a difference is created between providers in terms of their capability to find threats? Thanks in advance Regards Mike Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Voice: (02) 6254 5337 Email: dca@b... This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] [Non-text portions of this message have been removed] 10204 From: xaeb8a Date: Mon Nov 22, 2004 1:24pm Subject: Conductive paint questions A couple of issues ago, there was a discussion about how to look for surveillance wires hidden in a high ceiling. One person suggested a pole camera, another suggested climbing up on a ladder and inspecting that way. I wonder, though, how would you check to see if conductive paint was used? is there any way to check for this type of system? how effective is the paint, and what are its limitations? is there a brand name? I'd like to hear some of the experts discuss conductive paint. Thanks 10205 From: Tech Sec Lab Date: Mon Nov 22, 2004 2:12pm Subject: Sometimes you just can't trust the kids to play nice...! ROFL! http://news.search.yahoo.com/news/search?p=bush+secret+service&ei=UTF-8&xarg s=0&pstart=1&c=images&b=1 10206 From: moellerthy <1ach@g...> Date: Mon Nov 22, 2004 2:12pm Subject: Re: Sweep Frequency Coverage --- In TSCM-L@yahoogroups.com, "Hawkspirit" wrote: > Hello I have seen just the type of device you describe it can be bought at Meire Stores about $70.00 really it's a wave com box at 5.8 gig. Also be aware of a threat at 1488.000 gig with side freq at 1477.775 and 1503.000 check NFM AND WFM The threat mentioned above can only be seen with a preamp connected to SA with V shaped antenna [Antenna Corporation Of America model 2203-li-d] The sound picked up using AOR8000 1477.775 NFM goes like BLEEP, BLEEP ,BLEEP ,BLEEP. My Icom 8500 barely captures the signal. Possible tracking tx I get bar signal strength only at night so it's out there in the wild, also seen is a flickering signal at 1000.000 gig again to far away to pick off the video. I had to swept my car to make sure it was not attached to it. I also pulled the Batt for a few days the signal remain fixed at 1488.000 GIG on the SA HP 8569B. I also swept car with broadband Kaiser equipment -40db which is by far the best equipment out here WITH NO HIT. Regards Andre Holmes Neptune Enterprise Security 1ach@G... > > I just swept a Union Office over the weekend that had a device operating at > 5.8GHZ in the CEO's office so you better be going out to that as a minimum. > > > > Roger Tolces > > Electronic Security > > www.bugsweeps.com > > > > > > > > Date: Sat, 20 Nov 2004 09:31:28 +1100 > > From: Michael Dever > > Subject: TSCM Procedures > > > > > > I am trying to educate some clients on the importance of specifying > 'technical' parameters in their RFT (request for tender) for TSCM services, > particularly on the RF side of the house. > > > > So far, most clients will specify a frequency range (e.g. one recently > specified 10kHz to 5 GHz!!! another 21 GHz) but say nothing about > sensitivity. > > > > As you can imagine it is sometimes very difficult to convince a client that > specifying a frequency on its own is of very little value if you are not > addressing the required sensitivity. Unfortunately the average corporate > client knows very little about these issues and some are influenced by > mavins or equipment vendors when putting together their RFT, making it hard > to convince them of the difference between a PI using a broad band device > versus a team with a lab grade SA. > > > > My question is: does anybody have a set of standard words that could be > incorporated into the technical parameters of the RFT to ensure that a > difference is created between providers in terms of their capability to find > threats? > > > > Thanks in advance > > > > Regards > > Mike > > > > Michael J. Dever CPP > > Dever Clark & Associates > > GPO Box 1163 > > Canberra ACT 2601 > > Voice: (02) 6254 5337 > > Email: dca@b... > > > > This message is sent in strict confidence for the addressee only. > > It may contain legally privileged information. The contents are not to be > disclosed to anyone other than the addressee. > > Unauthorised recipients are requested to preserve this confidentiality and > to advise the sender immediately of any error in transmission. > > > > > > [Non-text portions of this message have been removed] > > > > > > > > [Non-text portions of this message have been removed] 10207 From: Shawn Hughes (Road) Date: Mon Nov 22, 2004 3:56pm Subject: Re: Digest Number 1743 Ali, and the others, especially those who wrote offline, thanks VERY much! You've given me some great insight. I have since found a greater problem, in that the sysadmin who left ( by the way, NOT trying to replace him, just helping out the company president) didn't leave any way back into the box, much less root. Am researching rootkits for red hat linux now, then onto DHCP..... Thanks again! -Shawn >It sounds like your Linux box is trying to act like a DHCP server .... 10208 From: taylortscm@y... Date: Mon Nov 22, 2004 3:44pm Subject: Re: Conductive paint questions conductive paint is very effective and is available at many electronics stores in pen form and the best way to find it is to use a good quality uv light source and look for the traces under the paint sometimes disguised as paint runs. dan taylor group xaeb8a wrote: A couple of issues ago, there was a discussion about how to look for surveillance wires hidden in a high ceiling. One person suggested a pole camera, another suggested climbing up on a ladder and inspecting that way. I wonder, though, how would you check to see if conductive paint was used? is there any way to check for this type of system? how effective is the paint, and what are its limitations? is there a brand name? I'd like to hear some of the experts discuss conductive paint. Thanks ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? Meet the all-new My Yahoo! ñ Try it today! [Non-text portions of this message have been removed] 10209 From: taylortscm@y... Date: Mon Nov 22, 2004 3:50pm Subject: Re: Re: Sweep Frequency Coverage even in a domestic sweep(most of our work is) we go to 12-18ghz just to be sure. dan taylor group moellerthy <1ach@g...> wrote: --- In TSCM-L@yahoogroups.com, "Hawkspirit" wrote: > Hello I have seen just the type of device you describe it can be bought at Meire Stores about $70.00 really it's a wave com box at 5.8 gig. Also be aware of a threat at 1488.000 gig with side freq at 1477.775 and 1503.000 check NFM AND WFM The threat mentioned above can only be seen with a preamp connected to SA with V shaped antenna [Antenna Corporation Of America model 2203-li-d] The sound picked up using AOR8000 1477.775 NFM goes like BLEEP, BLEEP ,BLEEP ,BLEEP. My Icom 8500 barely captures the signal. Possible tracking tx I get bar signal strength only at night so it's out there in the wild, also seen is a flickering signal at 1000.000 gig again to far away to pick off the video. I had to swept my car to make sure it was not attached to it. I also pulled the Batt for a few days the signal remain fixed at 1488.000 GIG on the SA HP 8569B. I also swept car with broadband Kaiser equipment -40db which is by far the best equipment out here WITH NO HIT. Regards Andre Holmes Neptune Enterprise Security 1ach@G... > > I just swept a Union Office over the weekend that had a device operating at > 5.8GHZ in the CEO's office so you better be going out to that as a minimum. > > > > Roger Tolces > > Electronic Security > > www.bugsweeps.com > > > > > > > > Date: Sat, 20 Nov 2004 09:31:28 +1100 > > From: Michael Dever > > Subject: TSCM Procedures > > > > > > I am trying to educate some clients on the importance of specifying > 'technical' parameters in their RFT (request for tender) for TSCM services, > particularly on the RF side of the house. > > > > So far, most clients will specify a frequency range (e.g. one recently > specified 10kHz to 5 GHz!!! another 21 GHz) but say nothing about > sensitivity. > > > > As you can imagine it is sometimes very difficult to convince a client that > specifying a frequency on its own is of very little value if you are not > addressing the required sensitivity. Unfortunately the average corporate > client knows very little about these issues and some are influenced by > mavins or equipment vendors when putting together their RFT, making it hard > to convince them of the difference between a PI using a broad band device > versus a team with a lab grade SA. > > > > My question is: does anybody have a set of standard words that could be > incorporated into the technical parameters of the RFT to ensure that a > difference is created between providers in terms of their capability to find > threats? > > > > Thanks in advance > > > > Regards > > Mike > > > > Michael J. Dever CPP > > Dever Clark & Associates > > GPO Box 1163 > > Canberra ACT 2601 > > Voice: (02) 6254 5337 > > Email: dca@b... > > > > This message is sent in strict confidence for the addressee only. > > It may contain legally privileged information. The contents are not to be > disclosed to anyone other than the addressee. > > Unauthorised recipients are requested to preserve this confidentiality and > to advise the sender immediately of any error in transmission. > > > > > > [Non-text portions of this message have been removed] > > > > > > > > [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? Meet the all-new My Yahoo! ñ Try it today! [Non-text portions of this message have been removed] 10210 From: contranl Date: Mon Nov 22, 2004 8:09pm Subject: ! ZOMBIES ! (video) . Zombie PC's ,a little video on port-scanning and sleeping maliciuos software on your PC...ready to be awakened (by others)...and take part in huge attacks. Windows Media: http://tinyurl.com/45hcw Realplayer: http://tinyurl.com/6mgj7 Source: BBC Click Online Uk Greetings Tetrascanner 10211 From: kondrak Date: Mon Nov 22, 2004 9:30pm Subject: Laser printer marks (OT?) This was a topic a few weeks back, and to my surprise, theres a news story on it today on Yahoo news, from PC World. http://news.yahoo.com/news?tmpl=story&cid=1093&u=/pcworld/118664&printer=1 Government Uses Color Laser Printer Technology to Track Documents Mon Nov 22, 4:00 AM ET Technology - PC World Jason Tuohey, Medill News Service WASHINGTON--Next time you make a printout from your color laser printer, shine an LED flashlight beam on it and examine it closely with a magnifying glass. You might be able to see the small, scattered yellow dots printer there that could be used to trace the document back to you. According to experts, several printer companies quietly encode the serial number and the manufacturing code of their color laser printers and color copiers on every document those machines produce. Governments, including the United States, already use the hidden markings to track counterfeiters. Peter Crean, a senior research fellow at Xerox, says his company's laser printers, copiers and multifunction workstations, such as its WorkCentre Pro series, put the "serial number of each machine coded in little yellow dots" in every printout. The millimeter-sized dots appear about every inch on a page, nestled within the printed words and margins. "It's a trail back to you, like a license plate," Crean says. The dots' minuscule size, covering less than one-thousandth of the page, along with their color combination of yellow on white, makes them invisible to the naked eye, Crean says. One way to determine if your color laser is applying this tracking process is to shine a blue LED light--say, from a keychain laser flashlight--on your page and use a magnifier. Crime Fighting vs. Privacy Laser-printing technology makes it incredibly easy to counterfeit money and documents, and Crean says the dots, in use in some printers for decades, allow law enforcement to identify and track down counterfeiters. However, they could also be employed to track a document back to any person or business that printed it. Although the technology has existed for a long time, printer companies have not been required to notify customers of the feature. Lorelei Pagano, a counterfeiting specialist with the U.S. Secret Service, stresses that the government uses the embedded serial numbers only when alerted to a forgery. "The only time any information is gained from these documents is purely in [the case of] a criminal act," she says. John Morris, a lawyer for The Center for Democracy and Technology, says, "That type of assurance doesn't really assure me at all, unless there's some type of statute." He adds, "At a bare minimum, there needs to be a notice to consumers." If the practice disturbs you, don't bother trying to disable the encoding mechanism--you'll probably just break your printer. Crean describes the device as a chip located "way in the machine, right near the laser" that embeds the dots when the document "is about 20 billionths of a second" from printing. "Standard mischief won't get you around it," Crean adds. Neither Crean nor Pagano has an estimate of how many laser printers, copiers, and multifunction devices track documents, but they say that the practice is commonplace among major printer companies. "The industry absolutely has been extraordinarily helpful [to law enforcement]," Pagano says. According to Pagano, counterfeiting cases are brought to the Secret Service, which checks the documents, determines the brand and serial number of the printer, and contacts the company. Some, like Xerox, have a customer database, and they share the information with the government. Crean says Xerox and the government have a good relationship. "The U.S. government had been on board all along--they would actually come out to our labs," Crean says. History Unlike ink jet printers, laser printers, fax machines, and copiers fire a laser through a mirror and series of lenses to embed the document or image on a page. Such devices range from a little over $100 to more than $1000, and are designed for both home and office. Crean says Xerox pioneered this technology about 20 years ago, to assuage fears that their color copiers could easily be used to counterfeit bills. "We developed the first (encoding mechanism) in house because several countries had expressed concern about allowing us to sell the printers in their country," Crean says. Since then, he says, many other companies have adopted the practice. The United States is not the only country teaming with private industry to fight counterfeiters. A recent article points to the Dutch government as using similar anticounterfeiting methods, and cites Canon as a company with encoding technology. Canon USA declined to comment. [Non-text portions of this message have been removed] 10212 From: Gregory Hicks Date: Mon Nov 22, 2004 3:38pm Subject: Re: Digest Number 1743 > From: "Shawn Hughes (Road)" > Date: Mon, 22 Nov 2004 13:56:24 -0800 > > > Ali, and the others, especially those who wrote offline, thanks VERY much! > You've given me some great insight. I have since found a greater problem, > in that the sysadmin who left ( by the way, NOT trying to replace him, just > helping out the company president) didn't leave any way back into the box, > much less root. Am researching rootkits for red hat linux now, then onto > DHCP..... Shawn: (Why bother with a rootkit? They typically break more things than the good you will get by using it. If you have the console, you OWN the box... Which is what a rootkit user wants to do anyway.) If the box can go down for about 5 minutes, insert the cd, boot to single user mode, mount the "/" partition, edit the /etc/passwd or the /etc/shadow file to get rid of the root password and reboot. A typical password is stored in the second field thusly: /etc/passwd: root:Gb9TLkwtJ9rFU:0:0:root:/root:/bin/bash ^^^^^^^^^^^^^ <------------------------ 'hashed' password (This may be just "root:x:0:0:root:/root:/bin/bash" which means to look in /etc/shadow for the password... The "x" as the second field signifies "shadow passwords".) or /etc/shadow: root:$1$FÙvŒ»m“s$k95yasdfghjklqwertyuio:12244:0:99999:7::: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ <----------------- hashed password Just delete everything between the two colons and reboot. You will then be able to login as root w/o password. You can then set the password to whatever you want and commence fixing the rest of the box. Of course, you might want to image another box to perform the same functions and then switch drives other than the boot drive to the new box. You'll have a box in a known good configuration that you can configure as necessary. I mean, if the guy left w/o handing over the root password and passing down info on the functions performed, who knows what else he fixed the box to do? MY recommendation, in this case, would be to salvage what you can and put the salvaged data on a known good box... Regards, Gregory Hicks > > Thanks again! > --------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 | Fax: 408.894.3479 San Jose, CA 95134 | Internet: ghicks@c... I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton 10213 From: xaeb8a Date: Mon Nov 22, 2004 6:25pm Subject: Re: Conductive paint questions --- In TSCM-L@yahoogroups.com, "taylortscm@y..." wrote: > conductive paint is very effective and is available at many electronics stores in pen form and the best way to find it is to use a good quality uv light source and look for the traces under the paint sometimes disguised as paint runs. > > dan > taylor group > > xaeb8a wrote: > > > A couple of issues ago, there was a discussion about how to look for > surveillance wires hidden in a high ceiling. One person suggested a > pole camera, another suggested climbing up on a ladder and inspecting > that way. I wonder, though, how would you check to see if conductive > paint was used? is there any way to check for this type of system? > how effective is the paint, and what are its limitations? is there a > brand name? I'd like to hear some of the experts discuss conductive > paint. > Thanks Thanks for the reply! would it be logical to assume that the conductive paint would be used with RF devices anyways, so the most important part of the sweep would be finding the appropriate frequency? and would it be appropriate also to assume that if you did find RF type devices, that the buggist was most likely not a pro-- certainly not government? (whom I suppose, would be using sound wave, IR, or other more sophisticated means?) 10214 From: Michael Puchol Date: Tue Nov 23, 2004 3:24am Subject: Re: Laser printer marks (OT?) OK, so we are under a few large assumptions: a) Criminals duefully register their printers with manufacturers just in case they need warranty repair (duh!) b) In the process they give out the address of the garage where they make the fake bills (double duh!) c) They are stupid enough that they can only use [quote] "standard mischief", and cannot disable the technology. d) That they keep the printer for a time long enough for their work to be traced back to them using all of the above. This kindof reminds me of gun control, I guess pro-gun lobbys will also be in favor of no printer control technology, as if non-tracking printers are outlawed, only outlaws will have non-tracking printers.....whatever. I agree with some measures that some see as privacy-invading (for example, we have had a national ID card here for years, and I think it's a great thing), but others are borderline orwellian. For those of you not in the counterfeiting bussiness, and only print in black, a quick solution could be to photocopy the documents you print into black, thus eliminating any yellow that's in it. Now, don't tell me photocopiers also do this crap...... Cheers, and happy printing, Mike ----- Original Message ----- From: "kondrak" To: Sent: Tuesday, November 23, 2004 4:30 AM Subject: [TSCM-L] Laser printer marks (OT?) > Government Uses Color Laser Printer Technology to Track Documents > 10215 From: Tech Sec Lab Date: Tue Nov 23, 2004 4:17am Subject: RE: Conductive Paint No. You are not going to use conductive paint and then attach an RF tx at the end, you'd be just as well off connecting it directly. Using it as an atenna is a big no no, as it wouldn't be matched and you'd kill your signal. However it could be used for powering an rf device, but it's all messey. Signal loss etc would be large, unless you were painting onto an insulator, even then the "diameter" of the conductor would be variable etc. You will be quicker to pick up rf with your SA and then track it down. As to the attacker question, assumptions is the mother of all f**k ups. That's what I work by. ************************************ Message: 14 Date: Tue, 23 Nov 2004 00:25:09 -0000 From: "xaeb8a" Subject: Re: Conductive paint questions Thanks for the reply! would it be logical to assume that the conductive paint would be used with RF devices anyways, so the most important part of the sweep would be finding the appropriate frequency? and would it be appropriate also to assume that if you did find RF type devices, that the buggist was most likely not a pro-- certainly not government? (whom I suppose, would be using sound wave, IR, or other more sophisticated means?) 10216 From: Hawkspirit Date: Tue Nov 23, 2004 10:14am Subject: Document Tracking FROM: PCWORLD.COM Jason Tuohey, Medill News Service WASHINGTON--Next time you make a printout from your color laser printer, shine an LED flashlight beam on it and examine it closely with a magnifying glass. You might be able to see the small, scattered yellow dots printer there that could be used to trace the document back to you. According to experts, several printer companies quietly encode the serial number and the manufacturing code of their color laser printers and color copiers on every document those machines produce. Governments, including the United States, already use the hidden markings to track counterfeiters. Peter Crean, a senior research fellow at Xerox, says his company's laser printers, copiers and multifunction workstations, such as its WorkCentre Pro series, put the "serial number of each machine coded in little yellow dots" in every printout. The millimeter-sized dots appear about every inch on a page, nestled within the printed words and margins. "It's a trail back to you, like a license plate," Crean says. The dots' minuscule size, covering less than one-thousandth of the page, along with their color combination of yellow on white, makes them invisible to the naked eye, Crean says. One way to determine if your color laser is applying this tracking process is to shine a blue LED light--say, from a keychain laser flashlight--on your page and use a magnifier. Crime Fighting vs. Privacy Laser-printing technology makes it incredibly easy to counterfeit money and documents, and Crean says the dots, in use in some printers for decades, allow law enforcement to identify and track down counterfeiters. However, they could also be employed to track a document back to any person or business that printed it. Although the technology has existed for a long time, printer companies have not been required to notify customers of the feature. Lorelei Pagano, a counterfeiting specialist with the U.S. Secret Service, stresses that the government uses the embedded serial numbers only when alerted to a forgery. "The only time any information is gained from these documents is purely in [the case of] a criminal act," she says. John Morris, a lawyer for The Center for Democracy and Technology, says, "That type of assurance doesn't really assure me at all, unless there's some type of statute." He adds, "At a bare minimum, there needs to be a notice to consumers." If the practice disturbs you, don't bother trying to disable the encoding mechanism--you'll probably just break your printer. Crean describes the device as a chip located "way in the machine, right near the laser" that embeds the dots when the document "is about 20 billionths of a second" from printing. "Standard mischief won't get you around it," Crean adds. Neither Crean nor Pagano has an estimate of how many laser printers, copiers, and multifunction devices track documents, but they say that the practice is commonplace among major printer companies. "The industry absolutely has been extraordinarily helpful [to law enforcement]," Pagano says. According to Pagano, counterfeiting cases are brought to the Secret Service, which checks the documents, determines the brand and serial number of the printer, and contacts the company. Some, like Xerox, have a customer database, and they share the information with the government. Crean says Xerox and the government have a good relationship. "The U.S. government had been on board all along--they would actually come out to our labs," Crean says. History Unlike ink jet printers, laser printers, fax machines, and copiers fire a laser through a mirror and series of lenses to embed the document or image on a page. Such devices range from a little over $100 to more than $1000, and are designed for both home and office. Crean says Xerox pioneered this technology about 20 years ago, to assuage fears that their color copiers could easily be used to counterfeit bills. "We developed the first (encoding mechanism) in house because several countries had expressed concern about allowing us to sell the printers in their country," Crean says. Since then, he says, many other companies have adopted the practice. The United States is not the only country teaming with private industry to fight counterfeiters. A recent article points to the Dutch government as using similar anticounterfeiting methods, and cites Canon as a company with encoding technology. Canon USA declined to comment. [Non-text portions of this message have been removed] 10217 From: Hawkspirit Date: Tue Nov 23, 2004 10:29am Subject: Conductive paint questions In general conductive paint is used to bridge over short runs in areas that are obvious but the main part of the run will be using shielded wire. The exception can be a digital microphone set up using twisted pair. There is never a substitute for physical wire tracking in any manner. Keep in mind that along with this you need to test every punch block contact in the phone room for covert microphone feed. Roger Tolces www.bugsweeps.com Date: Mon, 22 Nov 2004 19:24:32 -0000 From: "xaeb8a" Subject: Conductive paint questions A couple of issues ago, there was a discussion about how to look for surveillance wires hidden in a high ceiling. One person suggested a pole camera, another suggested climbing up on a ladder and inspecting that way. I wonder, though, how would you check to see if conductive paint was used? is there any way to check for this type of system? how effective is the paint, and what are its limitations? is there a brand name? I'd like to hear some of the experts discuss conductive paint. Thanks [Non-text portions of this message have been removed] 10218 From: Date: Tue Nov 23, 2004 5:29am Subject: Re: Document Tracking [Non-text portions of this message have been removed] 10219 From: savanted1 Date: Tue Nov 23, 2004 9:58am Subject: Keylogger Devices Do Not Violate Federal Wiretap Law Says Judge A federal judge in Los Angeles, Gary Feess ruled that Larry Ropp, a former claims adjuster for Bristol West Insurance Group, did not violate the federal wiretap law when he used a "KEYKatcher" brand surveillance device on a secretary's computer. In his ruling, Feess wrote, ""...although defendant engaged in a gross invasion of privacy...his conduct did not violate the Wiretap Act. While this may be unfortunate, only Congress can cover bases untouched." http://www.securityfocus.com/news/99 10220 From: J. Oquendo Date: Tue Nov 23, 2004 10:38am Subject: Wiretappnig Legality Information Apologies for posting something that I could probably spend a few hours digging up, but I figured I would find more "fine-tuned/specific" information from others on the list. Would someone care to point out a set of documents (perhaps related to the EU (Spain would be kick a..) and the US) in relevance to the laws regarding TSCM upon finding say lawful taps, unlawful taps. Steps to take afterwards, removal (viable, non-viable, legal, illegal), etc. Any information would be appreciated. From the technological standpoint I don't have any qualms/issues, but I would like to understand the legal issues more. I thought about something along the lines of CALEA since I work in the "Internet related" field, and have perused those laws. Are there a set of "unofficial/official" laws, requirements to understand? =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo GPG Key ID 0x51F9D78D Fingerprint 2A48 BA18 1851 4C99 CA22 0619 DB63 F2F7 51F9 D78D http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D sil @ politrix . org http://www.politrix.org sil @ infiltrated . net http://www.infiltrated.net "How can we account for our present situation unless we believe that men high in this government are concerting to deliver us to disaster?" Joseph McCarthy "America's Retreat from Victory" 10221 From: Date: Tue Nov 23, 2004 1:39am Subject: Re: Digest Number 1744 Thanks, Mike, for your carefully reasoned approach to this. In some instances, however, there may be alternative approaches to the areas of question: In a message dated 11/23/2004 3:27:24 AM Central Standard Time, TSCM-L@yahoogroups.com writes: > > a) Criminals duefully register their printers with manufacturers just in > case they need warranty repair A sold product does not have to be registered with the manufacturer in order to find the purchaser. Following the line of sales may mean more time and legwork, but generally there are mistakes made by most who are trying to cover their tracks and nearly all legitimate businesses are happy to "give up" illegitimate-purpose customers. In short - it's generally possible to track the sales of things that are outside of the most mundane and common goods or services. > b) In the process they give out the address of the garage where they make > the fake bills (double duh!) See response to item "a" above. > c) They are stupid enough that they can only use [quote] "standard > mischief", and cannot disable the technology. I'd propose that, until this started becoming more common knowledge, most were not aware (not "stupid," but unaware) of the ability to ID specific printers and that this was a fairly effective tool in the hands of government treasury personnel. For those who were aware, the technology disabling element hampered or restrained their efforts. The number of those who were both aware and techically able to disable it are statistically a small group. Granted, the small group's members have the capacity to wreak havoc, but aren't this list's subscribers familiar with this sort of element? > d) That they keep the printer for a time long enough for their work to be > traced back to them using all of the above. Please refer to the notation for "c" above. If one were unaware of tracking capability, he wouldn't necessarily abandon the equipment, would he? Sort of how LoJack works in the United States.... car thieves who retain a stolen car equiped with the transmitter for more than a minimal time are relatively easily caught. Vehicle thieves with a modicum of sophistication know of and work around the "problem." This printer tracking will help to keep weekend money printers under some degree of control rather than letting the problem run amok. Paul [Non-text portions of this message have been removed] 10222 From: James M. Atkinson Date: Tue Nov 23, 2004 3:12pm Subject: Breaking eggs for that omelet http://www.dfw.com/mld/dfw/news/opinion/10232141.htm?1c Posted on Sun, Nov. 21, 2004 Breaking eggs for that omelet By J.R. Labbe Star-Telegram Staff Writer Douglas Macgregor's take on the exodus of top spooks at the CIA since Porter Goss took over is decidedly different from that of naysayers who see disaster in the intelligence agency's future. The retired colonel thinks that precisely the same thing needs to happen in the upper ranks of the military. "This is a complex issue because people carry culture," Macgregor, a tank commander in Operation Desert Storm, said during testimony at a House Armed Services Committee hearing in July. "Congress should investigate how officers in the Army are advanced to senior rank and what can be done to change the current institutional culture." With the Senate's confirmation Tuesday of Frances Harvey as the new secretary of the Army, perhaps the long-overdue, crucial overhaul of that service's organizational structure and operating procedures finally will take place. Harvey, 61, is former chief operating officer for a division of Westinghouse Electric, a leading defense contractor. It didn't take long for the expected grumbling from the military hierarchy to become audible -- how unfortunate it was for the Bush administration to select someone who never wore a uniform. "As I wrote in my book Transformation Under Fire, there is importance in moving past the ridiculous assumption that [the person] whom you appoint must have served in the military," Macgregor said in a telephone interview Friday. "There is a reason why military service isn't prescribed in the Constitution -- in a republic of free men, the concept of involuntary military service was anathema to the founders." Macgregor, who was planning director at NATO headquarters in Belgium in 1997 before becoming director of the NATO Joint Operations Center during the 1999 Kosovo war, is not a voice that the top brass likes to acknowledge. After all, he said during a Frontline interview that the Joint Chiefs of Staff is an institution "designed to obstruct, not facilitate. Ö It's designed to give the services and their representatives on the staff maximum leeway to veto anything that comes up that is new or anything that may not serve the interests of a particular service." The secretary of the Army's job isn't to map out invasion strategies but to manage a budget of $98.5 billion while overseeing noncombat operations, such as mobilizing and supplying troops. A successful former CEO holds precisely the credentials needed for today's Army secretary, made stronger by the fact that most bureaucracies benefit when a fresh pair of eyes takes a hard look at the organization. "Given Harvey's background, his first step will be to try to establish measures of merit to determine to what extent the organization works and is effective," Macgregor said. "Is what we are actually doing in action, in combat, reflected in how we are conducting research, development and acquisition?" Although changes aren't likely to happen overnight, Macgregor says that they need not take as long as those who benefit from bureaucratic malaise think they should. "Harvey is a former CEO, and I would argue that since the management of the Army from a standpoint of funds, procurement and personnel is such a disaster, it won't take him long to figure it out. "The Army is an organization that historically jettisons soldiers and combat power in favor of retaining headquarters and general officer and command billets," Macgregor said. "It's organized for the convenience of peacetime administration and bureaucratic promotion, in four-star and three-star single-service headquarters with no added value to the force." Macgregor argues that the notion that nothing can be done quickly is a "self-imposed constraint." And he takes a chapter from history to demonstrate how quickly change can happen when there is the will to do so. "When Gen. George Marshall was chief of staff, he received an executive order from President Roosevelt in March of 1942 to completely reorganize the War Department," Macgregor said. "He started from a very low level of readiness in terms of force structure and struggled to drag the Army out of a World War I force structure to what was needed. "By November of 1942 -- eight months later -- we were landing hundreds of thousands of new troops, with new sets of demands, commanders and equipment, on the shores of North Africa." If change is deemed appropriate, necessary and required for the United States to win the wars of the 21st century -- and that's what the entire military transformation debate is all about -- then nothing should stand in the way of that change, not even generals who are bent on fighting tomorrow's wars using yesterday's mind-set. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10223 From: xaeb8a Date: Tue Nov 23, 2004 2:34pm Subject: Re: Conductive paint questions --- In TSCM-L@yahoogroups.com, "Hawkspirit" wrote: > > > In general conductive paint is used to bridge over short runs in areas that > are obvious but the main part of the run will be using shielded wire. The > exception can be a digital microphone set up using twisted pair. There is > never a substitute for physical wire tracking in any manner. Keep in mind > that along with this you need to test every punch block contact in the phone > room for covert microphone feed. > > > > Roger Tolces > > www.bugsweeps.com > > > > Date: Mon, 22 Nov 2004 19:24:32 -0000 > > From: "xaeb8a" > > Subject: Conductive paint questions > > > > > > > Punch block contact? 10224 From: lynnwagoner007 Date: Tue Nov 23, 2004 3:27pm Subject: Re: Sweep Frequency Coverage --- In TSCM-L@yahoogroups.com, "Hawkspirit" wrote: > > > I just swept a Union Office over the weekend that had a device operating at > 5.8GHZ in the CEO's office so you better be going out to that as a minimum. > > > > Roger Tolces > > Electronic Security > > www.bugsweeps.com > > > > Just wondering.....would a thorough physical search turned up the device? > > > > Date: Sat, 20 Nov 2004 09:31:28 +1100 > > From: Michael Dever > > Subject: TSCM Procedures > > > > > > I am trying to educate some clients on the importance of specifying > 'technical' parameters in their RFT (request for tender) for TSCM services, > particularly on the RF side of the house. > > > > So far, most clients will specify a frequency range (e.g. one recently > specified 10kHz to 5 GHz!!! another 21 GHz) but say nothing about > sensitivity. > > > > As you can imagine it is sometimes very difficult to convince a client that > specifying a frequency on its own is of very little value if you are not > addressing the required sensitivity. Unfortunately the average corporate > client knows very little about these issues and some are influenced by > mavins or equipment vendors when putting together their RFT, making it hard > to convince them of the difference between a PI using a broad band device > versus a team with a lab grade SA. > > > > My question is: does anybody have a set of standard words that could be > incorporated into the technical parameters of the RFT to ensure that a > difference is created between providers in terms of their capability to find > threats? > > > > Thanks in advance > > > > Regards > > Mike > > > > Michael J. Dever CPP > > Dever Clark & Associates > > GPO Box 1163 > > Canberra ACT 2601 > > Voice: (02) 6254 5337 > > Email: dca@b... > > > > This message is sent in strict confidence for the addressee only. > > It may contain legally privileged information. The contents are not to be > disclosed to anyone other than the addressee. > > Unauthorised recipients are requested to preserve this confidentiality and > to advise the sender immediately of any error in transmission. > > > > > > [Non-text portions of this message have been removed] > > > > > > > > [Non-text portions of this message have been removed] From: sdonnell Date: Wed Nov 21, 2001 7:21pm Subject: Re: PCB Log Beams Hi, I saw the PCB log beam in the new Ramsey catalog too, but I thought that you be interested in another source. One that's a lot cheaper too,,. I suspect these may be where Ramsey gets the antennas they sell, but havent confirmed this. I picked up a couple of the 900 - 2,600 beams from this gentleman at the Dayton Ham show a year and half ago. As far as I know, these are just the bare boards w/o the feed cable, however as recomended on the info sheet that comes w/ them, we attached a piece of .141" mini-hardline to the board. We bent the coax at a right angle to the board and attached(or already was attached,,) an SMA connector at the far end. W/ the addition of an SMA/BNC addaptor, the antenna can easily attach to the RF input of a portable receiver or SpecA. In trying the beam on an IC-R3 that we evaluated, it greatly improved the range at which the R3 could pick up a 2.4 GHz video signal. The antenna isn't especially directional(forward and side lobes), which I believe is typical of log beams, however, it does have a very good front/back ratio that can producce pretty good nulls for DFing. Yet another similar product that we have recently been playing with is the AX-31B "planar" log beam w/ preamp from Winradio. Although there are a couple of things that I wish they had done differently/better, I was quite impressed w/ its performance. It should be a useful tool for sniffing out weak signals in the 400 -1,000 MHz area. Ive seen the 2 -6 Ghz antennas that Kent has, they're the cutest little things, about the size of a business card... A 400-1,000 MHz version would be useful too, especially if its a bit smaller than the AX-31B. Kent Britain wrote: > Yes to both, but I need to have another batch run though the PC Board house. > Been though almost 1000! > > The 900-2600 MHz ones are $10 ea > The 2.1-6.0 GHz ones are $5 ea. > > I have made up a 400-1000 MHz version. > I haven't run a batch though as yet, just wondering how much interest they > would stir up at $20 ea. before coughing up some big bucks to have > 500 made. > > 73's Kent WA5VJB > 1626 Vineyard Rd. > Grand Prairie, TX 75052-1405 4173 From: Matthew Paulsen Date: Wed Nov 21, 2001 7:23pm Subject: RE: FBI Develops Eavesdropping Tools [on soapbox] Why the government constantly complains about security that it created in the first place is beyond me. Don't like it, don't give it out to the public. Quit making leaks by paying employees better. Screen your top secret clearance personnel in greater depth. Hold people accountable for their actions when they breach security, if they lie on their SF86 and are caught, don't give people options for contesting it, revoke their privilege and put them in maximum security prison for life. NO option. "Owning the key" isn't going to do squat if there's no way to get at the OS or traffic over the wire. This system is easily bypassed using laptops with acoustic couplers, public email drop boxes that utilize ssl, session based encryption and multiple encryption systems for non-dynamic data - such as PGP and Twofish in the email and strong local OS security procedures. Top it off with a non-windows OS running a shell OS underneath it and perhaps for good measure another under that such as BeOS and inside that MacOS and in that SoftWindows, and a "telnet style session" through a few mainframes (shell is a shell) via secure http or another SPIPE and you're going to have a hard time getting this to work. If people want privacy and security they will be able to bypass any sort of standard "trojan" that the government can come up with currently. Attached is a sample "secure" system to create a "secure" windows nt 4.0 environment. May not be up to date for Win2K, but it wouldn't take much to do it. Configurations such as this are readily available which were made to conform to government specifications for C2 security... which I believe is why the government decided to create security classifications in the first place..... -----Original Message----- From: MACCFound@a... [mailto:MACCFound@a...] Sent: Wednesday, November 21, 2001 4:32 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] FBI Develops Eavesdropping Tools FBI Develops Eavesdropping Tools By TED BRIDIS .c The Associated Press WASHINGTON (AP) - The FBI is going to new lengths to eavesdrop, building software to monitor computer use and urging phone companies to help make wiretaps more reliable. The FBI's ``Magic Lantern'' technology would allow investigators, via the Internet, to secretly install powerful software that records every keystroke on a person's computer, according to people familiar with the effort. The software is similar to ``Trojan horse'' programs already used by some hackers and corporate spies. The FBI envisions using Magic Lantern, part of a broad FBI project called ``Cyber Knight,'' to record the secret key a person might use to encrypt messages or computer files. The bureau has been largely frustrated in efforts to break open such messages by trying random combinations, and officials are increasingly concerned about their inability to read encrypted messages in criminal or terrorist investigations. The FBI said in a statement Wednesday that it can not discuss details of its technical surveillance efforts, though it noted that ``encryption can pose potentially insurmountable challenges to law enforcement when used in conjunction with communication or plans for executing serious terrorist and criminal acts.'' The FBI added that its research is ``always mindful of constitutional, privacy and commercial equities,'' and that its use of new technology can be challenged in court and in Congress. The FBI's existing monitoring technology, called the ``Key Logger System,'' has required investigators to sneak into a target's home or business and attach the device to a computer. Magic Lantern could be installed over the Internet by tricking a person into opening an e-mail attachment or by exploiting the same weaknesses in popular software that allow hackers to break into computers. It's unclear whether Magic Lantern would transmit the keystrokes it records back to the FBI over the Internet or store the information to be seized later in a raid. The existence of Magic Lantern was first disclosed by MSNBC. ``If they are using this kind of program, it would be a highly effective way to bypass any encryption problems,'' said James E. Gordon, who heads the information technology practice for Pinkerton Consulting and Investigations Inc. ``Once they have the keys to the kingdom, they have complete access to anything that individual is doing.'' People familiar with the project, who spoke only on condition of anonymity, said the package is being developed at the FBI's electronic tools laboratory, the same outfit that built the bureau's ``Carnivore'' Internet surveillance technology. The former head of the lab, Donald M. Kerr, became head of the CIA's science and technology unit in August. Some experts said Magic Lantern raises important legal questions, such as whether the FBI would need a wiretap order from a judge to use it. The government has previously argued that the FBI can capture a person's computer keystrokes under the authority of a traditional search warrant, which involves less oversight by the courts. ``It's an open question whether the covert installation of something on a computer without a physical entry requires a search warrant,'' said David Sobel, a lawyer with the Washington-based Electronic Privacy Information Center, a civil liberties group. Earlier this month the FBI urged some of the nation's largest telephone companies to change their networks so that investigators can reliably eavesdrop on conversations using new data technology. At a conference Nov. 6 in Tucson, Ariz. - and in a 32-page follow-up letter sent about two weeks ago - the FBI told leading telecommunications officials that increasing use of Internet-style data technology to transmit voice calls is frustrating FBI wiretap efforts. Although Carnivore can be used to capture electronic messages, it can't record voice messages sent over data networks for a variety of technical reasons. The bureau's access to voice calls using traditional technology is guaranteed under the 1994 Communications Assistance to Law Enforcement Act, but it exempted ``information services.'' The FBI said Wednesday it is not seeking to broaden the 1994 law to cover modern data technology; industry officials say the changes being sought by the FBI could take years to make. The FBI told companies that it will need access to voice calls sent over data networks ``within a few hours'' in some emergency situations, and that any interference caused by a wiretap ``should not be perceptible'' to avoid tipping off a person that his calls might be monitored. AP-NY-11-21-01 1833EST ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ [Non-text portions of this message have been removed] 4174 From: David Alexander Date: Thu Nov 22, 2001 6:30am Subject: Re: eavesdropping tools >[on soapbox] >Why the government constantly complains about security that it created in the first place is beyond me. Don't like it, don't give it out to the public. >Quit making leaks by paying employees better. Screen your top secret clearance personnel in greater depth. Hold people accountable for their actions >when they breach security, if they lie on their SF86 and are caught, don't give people options for contesting it, revoke their privilege and put them in >maximum security prison for life. NO option. There trouble is that, with this approach, the cat is out of the bag. The other side knows your secrets and there is no way to undo this. Much better not to let them find out. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4175 From: Matthew Paulsen Date: Thu Nov 22, 2001 4:06am Subject: RE: FBI Develops Eavesdropping Tools Hmm.. The attachments didn't come through. OOps. My boo. Here's a sample reg and doc. Had screenshots but those don't go through so.... Sorry. Matt REGEDIT4 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explor er] "LinkResolvedIgnoreLinkInfo"=dword:00000001 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explor er] "NoFileMenu"=dword:00000001 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explor er] "NoNetConnectDisconnect"=dword:00000001 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explor er] "NoTrayContextMenu"=dword:00000001 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explor er] "NoViewContextMenu"=dword:00000001 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Tips] "Show"=dword:00000001 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Tips] "ShowIE4"=dword:00000001 Explorer File Menu: Category: Windows NT Shell Subcategory: Restrictions Selection: Remove File menu from Explorer Description: Removes the File option from Explorer's toolbar. (This option was added in Service Pack 2.) Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Policies\Explorer Registry Value Registry Data Description NoFileMenu REG_DWORD Off = 0 or value is removed; On = 1 Taskbar Context Menus: Category: Windows NT Shell Subcategory: Restrictions Selection: Disable context menus for the Taskbar Description: Removes the context menus for the tray, including the Start button, Tab control, and Clock. (This option was added in Service Pack 2.) Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Policies\Explorer Registry Value Registry Data Description NoTrayContextMenu REG_DWORD Off = 0 or value is removed; On = 1 Explorer Context Menu: Category: Windows NT Shell Subcategory: Restrictions Selection: Disable Explorer's default context menu Description: Removes the context menu that would normally appear when the user right clicks on the desktop or in the Explorer right results pane. (This option was added in Service Pack 2.) Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Policies\Explorer Registry Value Registry Data Description NoViewContextMenu REG_DWORD Off = 0 or value is removed; On = 1 Network Connections: Category: Windows NT Shell Subcategory: Restrictions Selection: Remove the Map Network Drive and Disconnect Network Drive options Description: Prevents users from making additional network connections by removing the Map Network Drive and Disconnect Network Drive buttons from the toolbar in Explorer and also removing the menu items from the Context menu of My Computer and the Tools menu of Explorer. (This option was added in Service Pack 2.) Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Policies\Explorer Registry Value Registry Data Description NoNetConnectDisconnect REG_DWORD Off = 0 or value is removed; On = 1 Explorer Context Menu: Category: Windows NT Shell Subcategory: Restrictions Selection: Disable link file tracking Description: When enabled, link file tracking uses the configured path shown in properties for the shortcut to an application instead of the absolute path. This option disables link file tracking. (This option was added in Service Pack 2.) Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Policies\Explorer Registry Value Registry Data Description LinkResolvedIgnoreLinkInfo REG_DWORD Off = 0 or value is removed; On = 1 Welcome Tips: Category: Windows NT System Selection: Show welcome tips at logon Description: Enables or disables the display of the Welcome screen when the user logs on for the first and second time. (This option was added in Service Pack 2.) Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Explorer\Tips Registry Value Registry Data Description Show REG_DWORD Off = 0; On = 1 REGISTRY ENTRIES NOT INCLUDED IN THE SYSTEM POLICY EDITOR ========================================================= The following section describes the locations and values for useful registry entries that are available in the operating system, but not available in the System Policy Editor. Autorun: Category: Windows NT Shell Subcategory: Removable media Description: Determines whether the Autorun feature is enabled on each drive connected to the system. When Autorun is enabled, media is started automatically when it is inserted in the drive. This value is comprised of 32 bits. The lower 26 bits each represent a drive, with the lowest (right- most) bit representing drive A and the 26th bit from the right representing drive Z. If a bit is set to 0, the autorun feature is enabled on that drive. If a bit is set to 1, the autorun feature is disabled on that drive. For example, if the value of this entry is 0x8 (1000 binary), autorun is disabled on drive D. Note that a value of 1 in the bit representing the CD- ROM drive takes precedence over the value of Autorun. Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Policies\Explorer Registry Value Registry Data Description NoDriveAutoRun REG_DWORD 0x0 - 0x3FFFFFF Start Banner: Category: Windows NT Shell Subcategory: Start banner Description: Hides the arrow and "Click here to start" caption that appears on the taskbar when you start Windows NT. Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Policies\Explorer Registry Value Registry Data Description NoStartBanner REG_DWORD 0 = enabled; 1= disabled. -----Original Message----- From: Matthew Paulsen [mailto:mpaulsen6@h...] Sent: Wednesday, November 21, 2001 5:24 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] FBI Develops Eavesdropping Tools [on soapbox] Why the government constantly complains about security that it created in the first place is beyond me. Don't like it, don't give it out to the public. Quit making leaks by paying employees better. Screen your top secret clearance personnel in greater depth. Hold people accountable for their actions when they breach security, if they lie on their SF86 and are caught, don't give people options for contesting it, revoke their privilege and put them in maximum security prison for life. NO option. "Owning the key" isn't going to do squat if there's no way to get at the OS or traffic over the wire. This system is easily bypassed using laptops with acoustic couplers, public email drop boxes that utilize ssl, session based encryption and multiple encryption systems for non-dynamic data - such as PGP and Twofish in the email and strong local OS security procedures. Top it off with a non-windows OS running a shell OS underneath it and perhaps for good measure another under that such as BeOS and inside that MacOS and in that SoftWindows, and a "telnet style session" through a few mainframes (shell is a shell) via secure http or another SPIPE and you're going to have a hard time getting this to work. If people want privacy and security they will be able to bypass any sort of standard "trojan" that the government can come up with currently. Attached is a sample "secure" system to create a "secure" windows nt 4.0 environment. May not be up to date for Win2K, but it wouldn't take much to do it. Configurations such as this are readily available which were made to conform to government specifications for C2 security... which I believe is why the government decided to create security classifications in the first place..... -----Original Message----- From: MACCFound@a... [mailto:MACCFound@a...] Sent: Wednesday, November 21, 2001 4:32 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] FBI Develops Eavesdropping Tools FBI Develops Eavesdropping Tools By TED BRIDIS .c The Associated Press WASHINGTON (AP) - The FBI is going to new lengths to eavesdrop, building software to monitor computer use and urging phone companies to help make wiretaps more reliable. The FBI's ``Magic Lantern'' technology would allow investigators, via the Internet, to secretly install powerful software that records every keystroke on a person's computer, according to people familiar with the effort. The software is similar to ``Trojan horse'' programs already used by some hackers and corporate spies. The FBI envisions using Magic Lantern, part of a broad FBI project called ``Cyber Knight,'' to record the secret key a person might use to encrypt messages or computer files. The bureau has been largely frustrated in efforts to break open such messages by trying random combinations, and officials are increasingly concerned about their inability to read encrypted messages in criminal or terrorist investigations. The FBI said in a statement Wednesday that it can not discuss details of its technical surveillance efforts, though it noted that ``encryption can pose potentially insurmountable challenges to law enforcement when used in conjunction with communication or plans for executing serious terrorist and criminal acts.'' The FBI added that its research is ``always mindful of constitutional, privacy and commercial equities,'' and that its use of new technology can be challenged in court and in Congress. The FBI's existing monitoring technology, called the ``Key Logger System,'' has required investigators to sneak into a target's home or business and attach the device to a computer. Magic Lantern could be installed over the Internet by tricking a person into opening an e-mail attachment or by exploiting the same weaknesses in popular software that allow hackers to break into computers. It's unclear whether Magic Lantern would transmit the keystrokes it records back to the FBI over the Internet or store the information to be seized later in a raid. The existence of Magic Lantern was first disclosed by MSNBC. ``If they are using this kind of program, it would be a highly effective way to bypass any encryption problems,'' said James E. Gordon, who heads the information technology practice for Pinkerton Consulting and Investigations Inc. ``Once they have the keys to the kingdom, they have complete access to anything that individual is doing.'' People familiar with the project, who spoke only on condition of anonymity, said the package is being developed at the FBI's electronic tools laboratory, the same outfit that built the bureau's ``Carnivore'' Internet surveillance technology. The former head of the lab, Donald M. Kerr, became head of the CIA's science and technology unit in August. Some experts said Magic Lantern raises important legal questions, such as whether the FBI would need a wiretap order from a judge to use it. The government has previously argued that the FBI can capture a person's computer keystrokes under the authority of a traditional search warrant, which involves less oversight by the courts. ``It's an open question whether the covert installation of something on a computer without a physical entry requires a search warrant,'' said David Sobel, a lawyer with the Washington-based Electronic Privacy Information Center, a civil liberties group. Earlier this month the FBI urged some of the nation's largest telephone companies to change their networks so that investigators can reliably eavesdrop on conversations using new data technology. At a conference Nov. 6 in Tucson, Ariz. - and in a 32-page follow-up letter sent about two weeks ago - the FBI told leading telecommunications officials that increasing use of Internet-style data technology to transmit voice calls is frustrating FBI wiretap efforts. Although Carnivore can be used to capture electronic messages, it can't record voice messages sent over data networks for a variety of technical reasons. The bureau's access to voice calls using traditional technology is guaranteed under the 1994 Communications Assistance to Law Enforcement Act, but it exempted ``information services.'' The FBI said Wednesday it is not seeking to broaden the 1994 law to cover modern data technology; industry officials say the changes being sought by the FBI could take years to make. The FBI told companies that it will need access to voice calls sent over data networks ``within a few hours'' in some emergency situations, and that any interference caused by a wiretap ``should not be perceptible'' to avoid tipping off a person that his calls might be monitored. AP-NY-11-21-01 1833EST ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4176 From: Damien O'Rourke Date: Thu Nov 22, 2001 5:38am Subject: Spectrum Analyzer problem Hi folks, I have a little problem and thought maybe I could turn to the expertise of the group for a solution. I have in my possesion two Anritsu MS2651A spectrum analyzers. One of them is working as expected but the other has a really annoying problem with it. Basically what is happening is that when I preset the analyzer back to its default settings the noise floor appears right up at the reference level (-10dBm) which is clearly ridiculous. However when I preset the operational spectrum analyzer it shows a noise floor of about -72dBm (with the RLV at -10dBm also). I have compared the settings of the two and they are exactly the same after a full preset for example they both have the following: Centre Frequency: 1.5GHz Span: 3 GHz RLV: -10dBm RBW: 1MHz VBW: 1MHz Attenuation: 10dB I am in the dark as to what is wrong with this and I hope that maybe one of you could offer a solution. If you have any questions please just ask me. I look forward to a response. Thank you for your time, Damien. 4177 From: sdonnell Date: Thu Nov 22, 2001 1:02am Subject: Re: Re: PCB Log Beams Mike wrote: > Do you have an url for him or his site?Mike Hi, Oops, thought it was in there, here it is: WA5VJB@f... SD [Non-text portions of this message have been removed] 4178 From: James M. Atkinson Date: Thu Nov 22, 2001 8:16am Subject: Re: Spectrum Analyzer problem I would suspect either a defective input attenuator, or a screwed up relay in the auto alignment segment of the unit. Carefully run the unit through each of the attenuator though each settings, both in linear scale, and in log scale. It is also possible that the firmware in the instrument brings the reference level to it's maximum level as some kind of a protective measure. Simply put, the unit could be applying maximum attenuation and dropping to max scale to keep big signals from burning out the front end if the unit was reset when a large when a hot signal was present. -jma At 11:38 AM +0000 11/22/01, Damien O'Rourke wrote: >Hi folks, > >I have a little problem and thought maybe I could turn to the expertise >of the group for a solution. >I have in my possesion two Anritsu MS2651A spectrum analyzers. One of >them is working as >expected but the other has a really annoying problem with it. Basically >what is happening is that >when I preset the analyzer back to its default settings the noise floor >appears right up at the >reference level (-10dBm) which is clearly ridiculous. However when I >preset the operational >spectrum analyzer it shows a noise floor of about -72dBm (with the RLV >at -10dBm also). >I have compared the settings of the two and they are exactly the same >after a full preset for example >they both have the following: > >Centre Frequency: 1.5GHz >Span: 3 GHz >RLV: -10dBm >RBW: 1MHz >VBW: 1MHz >Attenuation: 10dB > >I am in the dark as to what is wrong with this and I hope that maybe one >of you could offer a solution. >If you have any questions please just ask me. I look forward to a >response. > >Thank you for your time, >Damien. -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4179 From: MIKE F Date: Thu Nov 22, 2001 11:04am Subject: Review of Carnivore Independant Technical Review of Carnivore large PDF document 122Pages http://www.usdoj.gov/jmd/publications/carnivore_draft_1.pdf <====9.22 Megs , ëMagic Lanterní part of new ëEnhanced Carnivore Projectí http://www.msnbc.com/news/660096.asp?cp1=1 MORE IMPORTANTLY from: folks of http://www.ml4mi.com mike f. & Deanna I. Want you All 2 have a "" Happy Thanksgiving to you & your family. A HAPPY THANKSGIVING TO ALL........... take One Minute to to think about Each & Every Person present at the Table....!! Be THANKFUL They Are ............ (present at the Table....!!) --------------------------- lATER4,Mike Fiorentino Master Links 4 Master Investigators http://www.ml4mi.com e-mail:friindy@a... OR info@m... "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or Confidential. The information is intended for use only by the individual(s)or entity named/indicated above.If you are the identified/intended recipient, be aware that (Unless you seek Permission.) any disclosure, COPYING, DISTRIBUTION,& or use of the contents of this Message/Information is Prohibited! 4180 From: factfind Date: Thu Nov 22, 2001 2:43pm Subject: Miniature robotics This may create a whole new threat for surveillance.Allegedly should be available for public purchase in 2006 .Interesting. http://www.sandia.gov/isrc/Marv.html Dave Linsky SSC Security and Investigations http://www.securesvc.com [Non-text portions of this message have been removed] 4181 From: James M. Atkinson Date: Thu Nov 22, 2001 6:41pm Subject: Then Who Will? Please remember our troops abroad on this Thanksgiving day. +++++ Every day on my morning walk I see a man standing on the wall looking outward. Today I approached him, I asked "why do you stand here day after day instead of spending time with your family and friends He said this: " I stand here on this wall for all of our people that can not. If I was to step away then there would be a gap in our wall. Then the terror outside could come inside." So with this I ask you "will you stand on the wall? If not you, then who?" -jma -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4182 From: Date: Thu Nov 22, 2001 0:16pm Subject: Insurance If anyone has any experience or advice on carrying insurance for sweep gear, I could use some. I'm now at a point where clients branch offices are too far for road trips and will have to start shipping my gear with me on the airlines. I can't find anyone local in the Detroit area that will cover my gear against loss or damage in transit. How do you handle this? Chad 4183 From: James M. Atkinson Date: Thu Nov 22, 2001 7:51pm Subject: HP server sings after spy turned canary Tuesday 20th November 2001 11:33am HP server sings after spy turned canary http://www.silicon.com/public/door?6004REQEVENT=&REQINT1=49290&REQSTR1=silicon.com Cloak and dagger era ends and server comes into its own... The performance of HP's Superdome server has leapt after the company sacked an employee who admitted committing industrial sabotage. Hock-Beng Lim confessed in September to cutting cables, reformatting hard disks and setting reset commands. Since his departure an independent test has revealed that Superdome has nearly doubled the speed at which it is able to communicate with a database. It took HP some time to fathom quite why Superdome was consistently under-performing in measurement tests. In total the company ploughed more than $1m into trying to get to the root of the problem. Industry watchers were quick to criticise the speed with which HP dealt with the crisis. Clive Longbottom, service director at quocirca, said: "This shows HP doesn't have control over its internal processes - if something like this happens they should be on it in a flash." -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4184 From: James M. Atkinson Date: Thu Nov 22, 2001 7:55pm Subject: FBI asks for telecom help on surveillance Report: FBI asks for telecom help on surveillance http://www.idg.net/ic_733265_1794_9-10000.html By George A. Chidi November 21, 2001 1:21 pm PT BOSTON -- WITH telecommunication service providers using packet-based transmissions like VoIP (voice over IP) for phone calls more often, the FBI wants carriers to help make those new kinds of networks easier to tap, according to a report. The FBI requested carriers make network changes to assist law enforcement agencies to tap packet-based phone calls, The Wall Street Journal reported Wednesday. Complying with the demands could cost carriers $1 billion, according to comments made by Albert Gidari, a telecommunications lawyer at Perkins Coie in Seattle, in the report. In a 32-page letter to major carriers, the FBI made the demands in an effort to gain compliance with the Communications Assistance to Law Enforcement Act (CALEA) of 1994, according to the report. CALEA requires carriers to modify their equipment, facilities, and services to allow police to conduct authorized electronic surveillance on packet-based networks. In the letter, the FBI asks carriers, among other things, to provide the ability to lay multiple taps on a single line, to provide real-time monitoring of network traffic, to allow undetectable wiretaps, and to have better wiretap reliability, according to the Journal. The Sept. 30 deadline for compliance with the list of requirements was pushed back to Nov. 19 by the U.S. Federal Communications Commission (FCC) at the pleading of the Cellular Telecommunications & Internet Association (CTIA). The CTIA and other parties contested certain technical compliance standards on privacy grounds in the United States Court of Appeals for the District of Columbia Circuit, according to the FCC order temporarily suspending the Sept. 30 deadline. The CTIA argued carriers could not lawfully deliver the full content of a data packet to a law enforcement agency under a "pen register" order, and that the current packet-mode standard could be deficient if it fails to protect the privacy of communications from people not under surveillance. The CTIA argument is very similar to those made asking for a ban or restrictions on the Carnivore e-mail surveillance technology used by the FBI. Neither the FBI nor several carriers contacted had representatives available to comment. George A. Chidi is a Boston-based correspondent for the IDG News Service, an InfoWorld affiliate. Stacy Cowley in New York contributed to this report. -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4185 From: James M. Atkinson Date: Thu Nov 22, 2001 7:58pm Subject: Sept. 11 Boosts Demand for James Bond-Style Gadgets Sept. 11 Boosts Demand for James Bond-Style Gadgets http://news.excite.com/news/r/011122/15/news-attack-gadgets-dc Updated: Thu, Nov 22 3:07 PM EST By Rebecca Harrison PARIS (Reuters) - Demand for hi-tech spy gadgets and weapons has soared since September 11 and companies are scrambling to invent more as governments beef up security in response to global jitters, experts said Thursday. Sipping champagne among racks of guns, government and corporate representatives at a trade fair in Paris this week checked out the latest systems, including exploding robots and remote-controlled spy planes. "It looks very James Bond, but it is very professional and not a toy," Francois Mottin from French firm Exavision said, as his robot surveillance invention whizzed past. "People knew a lot of these technologies existed before but they were unwilling to invest in them. Since September 11 we have had a lot more interest because security has become such a top priority." Exavision says that at 18 lbs., the remote-controlled robot is the smallest of its kind in the world. It carries two sets of explosives and can relay pictures day or night from hostile environments while soldiers or police keep a safe distance. ANTHRAX DETECTOR Some exhibitors at the Milipol fair in the northern Paris suburb Le Bourget said they had started work on new inventions since the attacks -- either at the request of governments or because investors want to cash in on heightened terrorism fears. Swedish biotechnology company Biosensor reckons it will not be long before it can harness its drug detection technology, which vacuums up grains of narcotics like heroin, to home in on anthrax spores. "We know it can be done...We've already had huge interest from investors in the United States...and have had some requests from governments," said chief inventor Kjeld Jensen. "The only problem is that we need a sample. This can be easy to get with drug smugglers because they are often stupid. But anthrax smugglers might be a bit cleverer," Jensen added. Trade fair organizers said the hijacked plane attacks on New York and Washington had pushed visitor numbers up to 25,000 this year from 20,000 in 1999, when the fair was last held in Paris. PERSONALISED GUN HOLDERS Near a stand of bullet-proof vests emblazoned with the American flag, visitors marveled at a personalized gun holder, which recognizes its owner's fingerprints and jams if an impostor tries to fire it. The holster is not yet on the market but Oregon-based company Michaels said advance orders were already pouring in, and it expected a knock-on effect from increased firearm sales in the United States since September 11. Next door, British company Aurora Computer Services Ltd said they were pioneering a facial recognition airport security system that would mean officials could instantly check passengers against lists of wanted terrorists. "Airport security clearly needs to be tougher," Technical Director Patrick Usher said. "It has obviously become a major issue since September 11 and we explored this face recognition concept as a direct results of those attacks." -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4186 From: James M. Atkinson Date: Thu Nov 22, 2001 7:53pm Subject: Spy used Internet to communicate with foreign agent Spy used Internet to communicate with foreign agent http://www.theage.com.au/breaking/2001/11/21/FFXEVZ977UC.html CANBERRA, Nov 21 AAP|Published: Wednesday November 21, 6:11 PM A spy facing espionage charges communicated over the internet with a man connected to a foreign intelligence agency, a court was told today. The ACT Supreme Court was told that Simon Lappas, a former intelligence analyst with the Defence Intelligence Organisation (DIO), had internet exchanges with a man referred to only as Mr Tomlinson before Lappas was employed with DIO. Lappas, 26, has pleaded not guilty to two counts of supplying top secret documents, directly or indirectly useful to a foreign power, with intent to prejudice the safety or defence of Australia. However, he has pleaded guilty to two further charges of giving the three documents to former prostitute Sherryll Ellen Dowling. Dowling, also 26, has pleaded not guilty to two charges of receiving the documents with the intention of prejudicing Australia's defence by making them useful to a foreign power. Lappas' counsel, Paul Willee, QC, told the court today that Lappas had communicated with the man known as Mr Tomlinson. "Tomlinson was somebody who had apparently had connections with a foreign intelligence agency and who had also communicated with Mr Lappas over the internet publishing names of agents," Mr Willee said. Australian Federal Police agent Christopher McDevitt said Lappas had revealed the details of his contact with Mr Tomlinson to the relevant Australian agencies. Agent McDevitt said the matter had been investigated after it was revealed Lappas had supplied Dowling with the top secret documents. He said the communications between Mr Tomlinson and Lappas had not been of concern to federal police investigations. "Mr Lappas declared that he had passed details onto ASIO and his own organisation and I don't know whether or not it was finalised," he said. The court has been told Lappas supplied Dowling with the highly confidential documents on July 11 and 12 last year. Crown prosecutor Des Fagan said Lappas gave Dowling the telephone number of a foreign embassy where she could sell the information, providing her with money to recover custody of her two children. Mr Willee said Lappas had complained to Agent McDevitt some time after he had been interviewed by federal agents that his home had been broken into and the hard drive disconnected from his computer. Agent McDevitt said the federal police had not been responsible for the break-in. "I actually raised that with a partner at ASIO and they had no knowledge of it," he told the court. "The federal police certainly didn't do it." Much of today's trial, before Justice Malcolm Gray, was closed to the media and public as details of the confidential documents were raised. The trial continues tomorrow. By Sharon Mathieson -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4187 From: Aimee Farr Date: Thu Nov 22, 2001 8:00pm Subject: RE: FBI Develops Eavesdropping Tools > [on soapbox] > Why the government constantly complains about security that it created in > the first place is beyond me. Don't like it, don't give it out to the > public. Quit making leaks by paying employees better. Screen your top > secret clearance personnel in greater depth. Hold people accountable for > their actions when they breach security, if they lie on their SF86 and are > caught, don't give people options for contesting it, revoke their > privilege > and put them in maximum security prison for life. NO option.> My problem is that our criminal espionage/treason scheme is only a deterrent for consensual dealings, and some spies are victims. It creates trust between the dupe and the handler, and a rift between the dupe and his employer. This would seem to increase the utility and longevity of the source. I also fear our security schemes encourage rough tactics. If we amended the constitutional treason clause to allow for easier convictions and always got the death penalty, --- if I was a bad guy, I would dance on the ceiling. What a nice soul contract. There are "leakers," and then there are info-sabotagers. See United States v. Morison, 844 F.2d 1057 (4th Cir. 1988). Morison involved the Jane's Defense leak. The photos were left on somebody's desk, he got $300 for them, and was said to have hoped to grease a job with Janes. The court highlighted the unique interests in surveillance technologies. The Morison court: ''Both 18 U.S.C.S. ß 793(d) and (e) plainly apply to "whoever" having access to national defense information has under section ß 793(d) willfully communicated, delivered or transmitted to a person not entitled to receive it, or has retained it in violation of section ß 793(e). The language of the two statutes includes no limitation to spies or to an agent of a foreign government, either as to the transmitter or the transmittee of the information, and they declare no exemption in favor of one who leaks to the press. It covers "anyone." '' ''...with reason to know that the publication of such materials reasonably would imperil the secrecy and confidentiality of the nation's intelligence-gathering capabilities, communicated such materials to one "not entitled to receive" them, reasonably knowing that the receiver of the material would publish it to all the world.'' "National defense is a generic concept of broad connotations, referring to the military and naval establishments and the related activities of national preparedness." Gorin, 312 US 19. Miller's (FBI) hand-off of the PIRG was national defense info. He got 2 life terms before the polygraph reversal. Miller, 874 F2d 1255. Our statutory espionage statutes are known for consecutive life terms (Pelton got 3). In today's domestic climate, the connection to national defense is stronger than ever, and moving farther into the law enforcement realm. I just ordered the '76 (?) hearings on the Subversion of Intelligence Gathering -- Agee and The Fifth Estate. (For non-U.S. residents: around the time of our Church & Pike hearings, a bunch of DC drink parties had a bunch of guys deciding they would just spy back on the FBI and CIA.) I fear a rogue 5th Estate is coming about, in a much "smarter" form than originally envisioned. If the climate does not improve....the tip of a very large iceberg. Calling some of this stuff "leaks," masks the paradigm shift. ~Aimee 4188 From: James M. Atkinson Date: Thu Nov 22, 2001 8:08pm Subject: Re: Insurance At 6:16 PM +0000 11/22/01, offdutysecurity@h... wrote: >If anyone has any experience or advice on carrying insurance for >sweep gear, I could use some. I'm now at a point where clients >branch offices are too far for road trips and will have to start >shipping my gear with me on the airlines. I can't find anyone local >in the Detroit area that will cover my gear against loss or damage in >transit. How do you handle this? >Chad Simply go to the company that provides your regular business insurance, and get a simple carrier added to cover your gear. Also, ensure that the insurance you have for all of your vehicles covers cargo or professional equipment. -jma -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4189 From: Matthew Paulsen Date: Thu Nov 22, 2001 8:11pm Subject: RE: Insurance Check http://www.zurichna.com/ or www.chubb.com Sincerely, Matt Paulsen Independant Services for Network Integration and Computer Security Systems http://www.geocities.com/matthew_paulsen/ Do not forget them. http://www.sweepgear.com/tribute911.html The information in this email is confidential and may be legally privileged. It is intended solely for the addressee. Access to this email by anyone else is unauthorized. If you believe this method of communication to be compromised or at risk, do not contact me through this medium, instead establish a secondary method of communication with me through secure courier, personal contact, multiple encryption systems, or if not possible please do not respond to the message. -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 7.0.3 for non-commercial use mQGiBDuoDQgRBADcOOT+8bdrRTorYkI3/uFhxSCaQkSFXE0tj7oLLr+BMIc409vD n2woHrlPnhGZyYUX8JfNBe2TvFfW8EwD4L/Exd3M7ywff2sRIAoZeuQMZbNI69N5 lYMvsb/Knux7EpCY/lSSOqfT1Lo0mSEq/KmFDA+akUrBq6tXQHo+ak2h3QCg/5Cl Xyyr3zhOCP9oKc4sk2RUQvED/2HpoQt1FIXOLEUDjLVXd/IdwIZbGfxTkeJhq5vW exrjnKhDgDAFMl3kVvhsDvM0JA1AODGOa821oReca2dK+blSBpXS652k4FMzQuGc Q91H174bFjLmsL75PSRYjGo2qZC2JbLMFnAtR6k8Dhdz3EgE3ttrU5G/A05xQ9ux gUZLBADEhVxr7kXYNwYedp+Hv+xWJpBnYwrLOy9dGr1hoM0AhPtT+/L6uyv0yJmd HWYZUbhyeUy5dwWdquilLOBaF+l0BtgRdrmtl5T+20rsI+sc/aVNbtfp7GjwWriy Ygep3BCf24PPvzh8JgY3PlTmVYOE8StDBQm+Z7pBZ80ouIA4brQkTWF0dGhldyBQ YXVsc2VuIDxtcGF1bHNlbjZAaG9tZS5jb20+iQBYBBARAgAYBQI7qA0ICAsDCQgH AgEKAhkBBRsDAAAAAAoJELjYcPfEakW9IRsAoOgv510tXgAot4LI3zdV7iaVr0Io AJ4w9CSCx/t0C4lDBlZM5PgZJ0qABLkCDQQ7qA0IEAgA9kJXtwh/CBdyorrWqULz Bej5UxE5T7bxbrlLOCDaAadWoxTpj0BV89AHxstDqZSt90xkhkn4DIO9ZekX1KHT UPj1WV/cdlJPPT2N286Z4VeSWc39uK50T8X8dryDxUcwYc58yWb/Ffm7/ZFexwGq 01uejaClcjrUGvC/RgBYK+X0iP1YTknbzSC0neSRBzZrM2w4DUUdD3yIsxx8Wy2O 9vPJI8BD8KVbGI2Ou1WMuF040zT9fBdXQ6MdGGzeMyEstSr/POGxKUAYEY18hKcK ctaGxAMZyAcpesqVDNmWn6vQClCbAkbTCD1mpF1Bn5x8vYlLIhkmuquiXsNV6TIL OwACAggAvP1XSJNhkYvPiTVrM41MBBuAAPR21PxJbrMkB5z89+3KaJ7h+gEHeCDy GE8QmVYfSMpz7/sq8W2B9vNDUn2dLnKCI3VPeszMW9oN/JR3QnL2T+sThXvLY8TF 966NIIGrHIVDeb9hFoVOPrzghuWOv8Q0K0V0LquBF4IndgNy3S7s4ZjTExcMi3hn Pu/PgUXzb1gGsmFoyZFy6YYGKqQ5+27UtghHbEeOIL90+bep4xuDAZ0v3Hjh+tnI a+vIFdjVLxsTTwwB4GW3o1P1+F9wj+KfkPqWroDAYBtwV2a3YQ4MfXgTSGYysm2+ mvnyHwrE0ZnO+0KLK7pPJ/tCMagFEYkATAQYEQIADAUCO6gNCAUbDAAAAAAKCRC4 2HD3xGpFvVKWAJ9Uz57//yNxW1pmdfjcJc3rCI/FiwCeKZV8pnywou/rqlRy0Jfy 6oPOPrk= =97B9 -----END PGP PUBLIC KEY BLOCK----- -----Original Message----- From: offdutysecurity@h... [mailto:offdutysecurity@h...] Sent: Thursday, November 22, 2001 10:17 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Insurance If anyone has any experience or advice on carrying insurance for sweep gear, I could use some. I'm now at a point where clients branch offices are too far for road trips and will have to start shipping my gear with me on the airlines. I can't find anyone local in the Detroit area that will cover my gear against loss or damage in transit. How do you handle this? Chad ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4190 From: Gil Zimmerman Date: Thu Nov 22, 2001 9:04pm Subject: RE: Gov't seed capital for emerging technologies I thought there was an article or email bulletin about a recent US government program to encourage development, streamlined acquisition, and utilization of emerging technologies, especially voice, video, audio, wireless, and data integration concepts to support counter-terrorism, homeland defense, security, screening, etc., which I thought was separate from the ongoing program at DARPA. Following is information on the Small Business Innovation Research (SBIR) Program, the Defense Advanced Research Projects Agency's (DARPA) SBIR Program specifically, and the National SBIR Conferences. http://www.darpa.mil/sbir/sbir.html Does anyone know of new funding and research programs that have been rolled out since 11 September? Warmest regards, Gil Gil Zimmerman Erhart Sawyer International 676A Ninth Avenue, #207 New York, NY 10036-3611 nonsecure email gilzimm@a... secure email auto93971@h... text message 6462617378@m... (973) 571-0302 USA office (646) 261-7378 mobile/GSM (646) 349-1485 fax (877) 856-1774 US toll free (33) (0)1 43 66 81 05 Paris bureau (33) (0)1 43 66 14 94 Paris fax --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.282 / Virus Database: 150 - Release Date: 9/25/01 4191 From: MIKE F Date: Fri Nov 23, 2001 11:01am Subject: RE: Insurance Chad, I Would Check Ralf Rigo. Compare Prices. Email==> info@b... Web page ===> http://www.bondsexpress.com Phone=======>800-331-5453 Tell Ralf,Mike F. sent you, can't hurt might even help. later4,mike f -----Original Message----- From: offdutysecurity@h... [mailto:offdutysecurity@h...] Sent: Thursday, November 22, 2001 10:17 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Insurance If anyone has any experience or advice on carrying insurance for sweep gear, I could use some. I'm now at a point where clients branch offices are too far for road trips and will have to start shipping my gear with me on the airlines. I can't find anyone local in the Detroit area that will cover my gear against loss or damage in transit. How do you handle this? Chad 4192 From: Aimee Farr Date: Fri Nov 23, 2001 3:26pm Subject: Russian Technology Acquisition Summit (?) > and then there are info-sabotagers. "Sabotagers." :-P *slap* Saboteurs. I won't spam with any more of this Russia-stuff, recognizing the small % and interest in foreign collection, but I thought the following clip is illustrative of what I pondered on earlier.... "Russian Business Summit" ------------------------- The assembly of Russia's business circles was opened November 22, 2001 in Moscow. President Putin, Chairman of the Federation of Council Yegor Stroyev, Chairman of the State Duma Gennady Seleznyov, Prime Minister Mikhail Kasyanov, Chief of the presidential administration Alexander Voloshin, other statesmen and representatives of international business circles were invited to the assembly. The assembly's key subject was defined as follows: Creation of favourable business climate is basis of Russia's prosperity. One of the main questions considered at the assembly was the one of cooperation, mutual understanding and confidence between business structures and society. ....Chairman of Nika Group of Companies holding Mikhail Kovalyov said that if business does not work in the interests of society, "Russia may lose almost everything". In his words, if things in the country go on like at present, Russia will face the problem of brain-drain and if it loses its intellectual potential neither oil nor gas will save its economy. Mr. Kovalyov observes that raising the problem of intellectual property we speak about economic development and security of the state. Russia has lost a lot of intellectual property and capital. But these losses may be made up for if Russian entrepreneurs and state authorities pay more attention to this problem. - Oreanda ----- *ponder* - What does it mean when Russian business "works in the interest of society?" - What is another Russian word for "society?" - "mutual understanding?" - "confidence?" - "international business circles?" - What does it mean when "Russian entrepreneurs and state authorities pay more attention to the ''loss'' of intellectual property?" Just kidding, this was a news account...but it still sounds like horse-trading. ~Aimee 4193 From: Paolo Sfriso Date: Sat Nov 24, 2001 5:45am Subject: Covert Monitoring Endoscope needed Dear Colleagues. Can anybody suggest where to purchase a reasonable priced endoscope that can be wired to a Time-Lapse VCR for a covert surveillance application. Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... 4194 From: Steve Uhrig Date: Sat Nov 24, 2001 11:45am Subject: Re: Covert monitoring endoscope Once upon a midnight dreary, Paolo Sfriso pondered, weak and weary: > Can anybody suggest where to purchase a reasonable priced > endoscope that can be wired to a Time-Lapse VCR for a covert > surveillance application. http://www.mars-cam.com/osd/fibersc/videosc.html They have several models, one of which should suit your needs. They were designed for surveillance, not converted from medical applications. You might consider a scope originally intended for medical use. Might give you something to fill in the off hours when you are not sweeping. You could do a few colonoscopies a year or something! Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4195 From: James M. Atkinson Date: Sat Nov 24, 2001 1:12pm Subject: Mobile explodes a day after new battery was installed Mobile explodes a day after new battery was installed http://www.arabnews.com/Article.asp?ID=10782 By Jameel Al-Balawi, Arab News Staff Saturday, November 24, 2001 RIYADH, 24 November - The commerce ministry will inquire into a complaint made by a mobile phone user about the explosion of his handset the day after he bought a new battery for it. The blast, which occurred while he was asleep, injured him and caused a fire in his bedroom. The battery was bought from a telecommunications accessories shop. Dr. Abdul Ali Al-Ali, director general of the commercial fraud department at the ministry, said that the ministry will investigate the incident in accordance with the regulations governing such situations. "The case will be handed over to a committee that handles complaints about commercial fraud and takes penal actions depending on the degree of the damage," he added. "I was awakened from the sleep by the loud explosion inside the house. At first I feared the gas cylinder in the kitchen had exploded. Then I noticed parts of the mobile scattered in the room," Fahd Al-Ghanim, the victim of the accident, recalled. Al-Ghanim added that he is not after compensation. "I just want the news to be published and people be warned about the risks involved in using this kind of battery which might have caused my death if it had exploded while I was making a call," he said. However, the shop owner who supplied the battery to him said he did not know any details about the battery except that he had bought some packets of batteries from the sales representative of an importing agency in Riyadh. The importing agent denied the charge, saying that there was no evidence to prove that it was sold by his firm as this brand of battery was imported by several establishments. The importing agency insisted that no case of this particular brand of battery exploding had been reported before. The batteries may explode if they are exposed to heat or in some other exceptional circumstances, he admitted. He also said a battery will not be usable six months after manufacturing. Al-Ghanim insists that he used the set in normal circumstances and was never exposed to fire or any thing like that. However, he feared that the battery might have been past its expiry date. The date recorded on it was 30/9/2000, but it was not specified whether this was the manufacturing or expiration date. -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4196 From: Aimee Farr Date: Sat Nov 24, 2001 1:38pm Subject: Sabotage biblio. > Tuesday 20th November 2001 11:33am > The performance of HP's Superdome server has leapt after the > company sacked > an employee who admitted committing industrial sabotage. Corporate warfare has entered the 4th dimension. (subversion, resistance/insurgency, espionage, sabotage, legal war, psywar, political warfare....isn't that the 4th dimension?) I was stumbling around for "sabotage" material, made difficult by the fact it's a psycho-bull-buzzword now. I thought I would pass my list along, because of the espionage connection. Perhaps somebody will find it of use. ~Aimee -------- [1] http://www.bullybusters.org/home/twd/bb/res/neuman4.html In a six year, longitudinal study on workplace sabotage, Analoui (1995) found that 65% of all acts of sabotage stemmed from discontent with management and its unfair behavior toward workers. Similarly, Crino and Leap (1989) suggest that this discontent with management leads to reduced loyalty and "once that loyalty has been destroyed, an employee is more likely to commit an act of sabotage" (p. 32). These authors point out that events such as the Union Carbide plant explosion in Bhopal, a Pacific Southwest Airline crash in California, and a devastating hotel fire in San Juan, Puerto Rico, "were allegedly initiated by disgruntled employees with a score to settle" (Crino & Leap, 1989, p. 32). With our increasing reliance on computers, the threat of sabotage becomes even greater. Computer viruses ("logic bombs") may be planted with ease and their effects can be extremely costly to organizations and individuals (McEwen, 1990). [2] http://www.infoshop.org/sabotage.html We all know that work sucks. So what are people doing to fight back on the job? Workplace sabtoage is among the many things that workers do on the job to deal with the alienation that all wage slaves suffer. We like to encourage this practice, so this page is dedicated to your stories about throwing wrenches into the work machine. Please send your stories and anecdotes to us and will print them here. We'll protect your identity of course. [3] http://www.rtmark.com/more/articles/latimes20010204.html Giacalone, a trained psychologist and an expert on organizational behavior, has become a scholar of workplace sabotage, which he broadly defines as "an attempt, usually by employees, to damage the company." His work has included consulting with corporations beset by sabotage and with government agencies, including the U.S. Department of Defense, the U.S. Army, the Federal Reserve Bank of Richmond and the Federal Bureau of Investigation. His research has led him to conclude that companies with chronic problems almost always invite trouble by either failing to notice or blatantly ignoring discontent among employees. [4] http://www.thomsonlearning.co.uk/busmgt/hrm/iebm/industrial_sabotage.htm The contemporary and future importance of sabotage are hard to deny. It is therefore time for theorists of organizational behaviour and management to make a sustained effort to understand it. [5] Counter-Sabotage. by The War Office (1943) (Nice collector piece. Available on alibris.com, which has a lot of "traditional" sabotage offerings c. 1940-50s.) [6] http://www.spunk.org/texts/reviews/sp000215.txt (review) Sabotage in the American Workplace. : Anecdotes of Dissatisfaction, Mischief & Revenge. by Martin Sprouse And Tracy Cox. (available on Amazon.com) [7] Office Dirty Tricks 50 Ways to Sabotage by Fulghum, Hunter S [8] Analoui, F. (1995) Workplace sabotage: styles, motives and management. Journal of Management Development, 14, 48-65. [9] Sabotage: A Study in Industrial Conflict by Brown, Geoff Unstated ed. Hardcover. Spokesman Books, Bristol ((1977)) [10] *new* 2001 http://www.amazon.com/exec/obidos/ASIN/1840147881/qid=1006594042/sr=1-10/ref =sr_1_11_10/104-5368001-9516765 Work Place Sabotage (The International Library of Criminology, Criminal Justice and Penology) by Gerald Mars (Editor) [11] http://www.uncc.edu/ragiacal/bibliography.html General sabotage biblio. [12] Countersabotage - A Counterintelligence Function : Timm, Eric W. : Spring 1963 (Studies In Intelligence) 4197 From: Aimee Farr Date: Sat Nov 24, 2001 4:54pm Subject: RE: Sabotage biblio. > Perhaps somebody will find it of use. ~Aimee You know what I meant. Sabotage is BAD. Don't do it. A couple of jackals are snickering and messing with my mind offlist.... :-] It was interesting to me that sabotage trends indicate that it's EASIER to cultivate internal/workforce co-option today than it used to be, despite increased awareness, criminal punishment, and security vigilance. My biblio offers credible research for you to point to in support of that proposition, and it sounds like another shade of traitor psychology/profiles that might be of interest to a few here. As an affirmative defense to any ethical transgressions, it's very-public info, largely research and antidotal and helpful for "reverse target analysis," "societal trend mapping," "threat assessments," "budgetary justification," and "blame transference" (minor monkey wrenching is often viewed as a management, rather than a security failure). Defendant generally denies the allegations in Plaintiffs' petitions that she is a "lawyer-saboteur," and demands strict proof thereof. ;p ~Aimee 4198 From: Matthew Paulsen Date: Sat Nov 24, 2001 1:35pm Subject: RE: Mobile explodes a day after new battery was installed Interesting. A week or two ago I was having a discussion about circumvention techniques for existing security systems in public buildings for localized assassination tools and methods. One idea was a cellphone bomb that utilized a replacement battery component as the tool which could be triggered remotely through a call made to the phone or when it is activated by the user, or time based on most phone's timing systems. Sincerely, Matt Paulsen Independant Services for Network Integration and Computer Security Systems http://www.geocities.com/matthew_paulsen/ Do not forget them. http://www.sweepgear.com/tribute911.html The information in this email is confidential and may be legally privileged. It is intended solely for the addressee. Access to this email by anyone else is unauthorized. If you believe this method of communication to be compromised or at risk, do not contact me through this medium, instead establish a secondary method of communication with me through secure courier, personal contact, multiple encryption systems, or if not possible please do not respond to the message. -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 7.0.3 for non-commercial use mQGiBDuoDQgRBADcOOT+8bdrRTorYkI3/uFhxSCaQkSFXE0tj7oLLr+BMIc409vD n2woHrlPnhGZyYUX8JfNBe2TvFfW8EwD4L/Exd3M7ywff2sRIAoZeuQMZbNI69N5 lYMvsb/Knux7EpCY/lSSOqfT1Lo0mSEq/KmFDA+akUrBq6tXQHo+ak2h3QCg/5Cl Xyyr3zhOCP9oKc4sk2RUQvED/2HpoQt1FIXOLEUDjLVXd/IdwIZbGfxTkeJhq5vW exrjnKhDgDAFMl3kVvhsDvM0JA1AODGOa821oReca2dK+blSBpXS652k4FMzQuGc Q91H174bFjLmsL75PSRYjGo2qZC2JbLMFnAtR6k8Dhdz3EgE3ttrU5G/A05xQ9ux gUZLBADEhVxr7kXYNwYedp+Hv+xWJpBnYwrLOy9dGr1hoM0AhPtT+/L6uyv0yJmd HWYZUbhyeUy5dwWdquilLOBaF+l0BtgRdrmtl5T+20rsI+sc/aVNbtfp7GjwWriy Ygep3BCf24PPvzh8JgY3PlTmVYOE8StDBQm+Z7pBZ80ouIA4brQkTWF0dGhldyBQ YXVsc2VuIDxtcGF1bHNlbjZAaG9tZS5jb20+iQBYBBARAgAYBQI7qA0ICAsDCQgH AgEKAhkBBRsDAAAAAAoJELjYcPfEakW9IRsAoOgv510tXgAot4LI3zdV7iaVr0Io AJ4w9CSCx/t0C4lDBlZM5PgZJ0qABLkCDQQ7qA0IEAgA9kJXtwh/CBdyorrWqULz Bej5UxE5T7bxbrlLOCDaAadWoxTpj0BV89AHxstDqZSt90xkhkn4DIO9ZekX1KHT UPj1WV/cdlJPPT2N286Z4VeSWc39uK50T8X8dryDxUcwYc58yWb/Ffm7/ZFexwGq 01uejaClcjrUGvC/RgBYK+X0iP1YTknbzSC0neSRBzZrM2w4DUUdD3yIsxx8Wy2O 9vPJI8BD8KVbGI2Ou1WMuF040zT9fBdXQ6MdGGzeMyEstSr/POGxKUAYEY18hKcK ctaGxAMZyAcpesqVDNmWn6vQClCbAkbTCD1mpF1Bn5x8vYlLIhkmuquiXsNV6TIL OwACAggAvP1XSJNhkYvPiTVrM41MBBuAAPR21PxJbrMkB5z89+3KaJ7h+gEHeCDy GE8QmVYfSMpz7/sq8W2B9vNDUn2dLnKCI3VPeszMW9oN/JR3QnL2T+sThXvLY8TF 966NIIGrHIVDeb9hFoVOPrzghuWOv8Q0K0V0LquBF4IndgNy3S7s4ZjTExcMi3hn Pu/PgUXzb1gGsmFoyZFy6YYGKqQ5+27UtghHbEeOIL90+bep4xuDAZ0v3Hjh+tnI a+vIFdjVLxsTTwwB4GW3o1P1+F9wj+KfkPqWroDAYBtwV2a3YQ4MfXgTSGYysm2+ mvnyHwrE0ZnO+0KLK7pPJ/tCMagFEYkATAQYEQIADAUCO6gNCAUbDAAAAAAKCRC4 2HD3xGpFvVKWAJ9Uz57//yNxW1pmdfjcJc3rCI/FiwCeKZV8pnywou/rqlRy0Jfy 6oPOPrk= =97B9 -----END PGP PUBLIC KEY BLOCK----- -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Saturday, November 24, 2001 11:13 AM To: TSCM-L Mailing List Subject: [TSCM-L] Mobile explodes a day after new battery was installed Mobile explodes a day after new battery was installed http://www.arabnews.com/Article.asp?ID=10782 By Jameel Al-Balawi, Arab News Staff Saturday, November 24, 2001 RIYADH, 24 November - The commerce ministry will inquire into a complaint made by a mobile phone user about the explosion of his handset the day after he bought a new battery for it. The blast, which occurred while he was asleep, injured him and caused a fire in his bedroom. The battery was bought from a telecommunications accessories shop. Dr. Abdul Ali Al-Ali, director general of the commercial fraud department at the ministry, said that the ministry will investigate the incident in accordance with the regulations governing such situations. "The case will be handed over to a committee that handles complaints about commercial fraud and takes penal actions depending on the degree of the damage," he added. "I was awakened from the sleep by the loud explosion inside the house. At first I feared the gas cylinder in the kitchen had exploded. Then I noticed parts of the mobile scattered in the room," Fahd Al-Ghanim, the victim of the accident, recalled. Al-Ghanim added that he is not after compensation. "I just want the news to be published and people be warned about the risks involved in using this kind of battery which might have caused my death if it had exploded while I was making a call," he said. However, the shop owner who supplied the battery to him said he did not know any details about the battery except that he had bought some packets of batteries from the sales representative of an importing agency in Riyadh. The importing agent denied the charge, saying that there was no evidence to prove that it was sold by his firm as this brand of battery was imported by several establishments. The importing agency insisted that no case of this particular brand of battery exploding had been reported before. The batteries may explode if they are exposed to heat or in some other exceptional circumstances, he admitted. He also said a battery will not be usable six months after manufacturing. Al-Ghanim insists that he used the set in normal circumstances and was never exposed to fire or any thing like that. However, he feared that the battery might have been past its expiry date. The date recorded on it was 30/9/2000, but it was not specified whether this was the manufacturing or expiration date. -- ---------------------------------------------------------------------------- -------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- -------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------------- -------------- "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ---------------------------------------------------------------------------- -------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4199 From: iDEN-Test Mobile-Marcel Date: Sat Nov 24, 2001 5:40pm Subject: Re: Mobile explodes a day after new battery was installed I'm sure many of you have seen the latest cellphone gun................. Guns have been discovered OCONUS. The attached video clip shows how cell phone guns operate. These phones are not in the U.S. yet, but they are in use overseas. Beneath the digital phone face is a .22 -caliber handgun capable of firing four rounds in rapid succession using the standard telephone keypad. European law enforcement officials are stunned by the discovery of these deadly decoys. They say phone guns are changing the rules of engagement in Europe. We find it very alarming, says Wolfgang Dicke of the German Police Union. It means police will have to draw their weapons whenever a person being checked reaches for their cell phone. Although cell phone guns have not reached the U.S. yet, the FBI, Bureau of Alcohol, Tobacco and Firearms and the U.S. Customs Service say they have been briefed on the new weapons. All U.S. ports of entry have been alerted. These covert weapons were first discovered in October of 2000 when Dutch police came upon a cache during a drug raid in Amsterdam. In another recent incident, a Croatian gun dealer was caught attempting to smuggle a shipment through Slovenia into Western Europe. Police say both shipments are believed to have originated in Yugoslavia. Interpol sent a warning to law enforcement agencies around the world. If you didn't know they were guns, you would think they were cell phones, said Ari Zandbergen, spokesperson for the Amsterdam police. Only when you have one in your hand do you realize that they are heavier than a regular cell phone. Matthew Paulsen wrote: > Interesting. A week or two ago I was having a discussion about circumvention > techniques for existing security systems in public buildings for localized > assassination tools and methods. One idea was a cellphone bomb that > utilized a replacement battery component as the tool which could be > triggered remotely through a call made to the phone or when it is activated > by the user, or time based on most phone's timing systems. > > Sincerely, > > Matt Paulsen "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 [Non-text portions of this message have been removed] 4200 From: iDEN-Test Mobile-Marcel Date: Sat Nov 24, 2001 5:46pm Subject: Re: Mobile explodes a day after new battery was installed If anyone wants to see the video let me know. JMA- can you open up the file section so I can load the video there for all to see?\ Thx Marcel iDEN-Test Mobile-Marcel wrote: > I'm sure many of you have seen the latest cellphone gun................. > > Guns have been discovered OCONUS. The attached video clip > shows how cell phone guns operate. > > These phones are not in the U.S. yet, but they are in use overseas. Beneath > the digital phone face is a .22 -caliber handgun capable of firing four > rounds in rapid succession using the standard telephone keypad. European > law enforcement officials are stunned by the discovery of these deadly > decoys. > > They say phone guns are changing the rules of engagement in Europe. We find > it very alarming, says Wolfgang Dicke of the German Police Union. It means > police will have to draw their weapons whenever a person being checked > reaches for their cell phone. > > Although cell phone guns have not reached the U.S. yet, the FBI, Bureau of > Alcohol, Tobacco and Firearms and the U.S. Customs Service say they have > been briefed on the new weapons. All U.S. ports of entry have been alerted. > > These covert weapons were first discovered in October of 2000 when Dutch > police came upon a cache during a drug raid in Amsterdam. > > In another recent incident, a Croatian gun dealer was caught attempting to > smuggle a shipment through Slovenia into Western Europe. Police say both > shipments are believed to have originated in Yugoslavia. Interpol sent a > warning to law enforcement agencies around the world. > > If you didn't know they were guns, you would think they were cell phones, > said Ari Zandbergen, spokesperson for the Amsterdam police. Only when you > have one in your hand do you realize that they are heavier than a regular > cell phone. > > Matthew Paulsen wrote: > > > Interesting. A week or two ago I was having a discussion about circumvention > > techniques for existing security systems in public buildings for localized > > assassination tools and methods. One idea was a cellphone bomb that > > utilized a replacement battery component as the tool which could be > > triggered remotely through a call made to the phone or when it is activated > > by the user, or time based on most phone's timing systems. > > > > Sincerely, > > > > Matt Paulsen > > "NEXTEL1 IT'S NOT JUST NEXTEL" > Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 > > "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" > Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 4201 From: Miguel Puchol Date: Sat Nov 24, 2001 6:47pm Subject: RE: Mobile explodes a day after new battery was installed I believe that Mossad used such a technique against a Hamas leader some time ago - exploding phone booths seem to be popular also. Cellphones are being used in Spain by terrorist (I hope nobody is still calling them a 'liberation movement'...) group ETA to remotely trigger car bombs, even a bomb mounted inside a bicycle's frame a few months ago. A recent raid on a flat used to manufacture bombs produced some 50 cellular telephones, ready to be used as triggers. They even fitted standard 9-volt battery leads to some of them, so a terrorist wouldn't have to worry about having the right charger to be able to have the bomb ready - just pop down to the local 7-11 to get fresh alkalines. All the best, Mike > -----Mensaje original----- > De: Matthew Paulsen [mailto:mpaulsen6@h...] > Enviado el: s·bado, 24 de noviembre de 2001 20:35 > Para: TSCM-L@yahoogroups.com > Asunto: RE: [TSCM-L] Mobile explodes a day after new battery was > installed > > > Interesting. A week or two ago I was having a discussion about > circumvention > techniques for existing security systems in public buildings for localized > assassination tools and methods. One idea was a cellphone bomb that > utilized a replacement battery component as the tool which could be > triggered remotely through a call made to the phone or when it is > activated > by the user, or time based on most phone's timing systems. > > Sincerely, > > Matt Paulsen > Independant Services for Network Integration and Computer Security Systems > http://www.geocities.com/matthew_paulsen/ > > > Do not forget them. > http://www.sweepgear.com/tribute911.html > > > The information in this email is confidential and may be legally > privileged. > It is intended solely for the addressee. Access to this email by anyone > else is unauthorized. > > If you believe this method of communication to be compromised or at risk, > do not contact me through this medium, instead establish a > secondary method > of communication with me through secure courier, personal > contact, multiple > encryption systems, or if not possible please do not respond to > the message. > > > -----BEGIN PGP PUBLIC KEY BLOCK----- > Version: PGPfreeware 7.0.3 for non-commercial use > > mQGiBDuoDQgRBADcOOT+8bdrRTorYkI3/uFhxSCaQkSFXE0tj7oLLr+BMIc409vD > n2woHrlPnhGZyYUX8JfNBe2TvFfW8EwD4L/Exd3M7ywff2sRIAoZeuQMZbNI69N5 > lYMvsb/Knux7EpCY/lSSOqfT1Lo0mSEq/KmFDA+akUrBq6tXQHo+ak2h3QCg/5Cl > Xyyr3zhOCP9oKc4sk2RUQvED/2HpoQt1FIXOLEUDjLVXd/IdwIZbGfxTkeJhq5vW > exrjnKhDgDAFMl3kVvhsDvM0JA1AODGOa821oReca2dK+blSBpXS652k4FMzQuGc > Q91H174bFjLmsL75PSRYjGo2qZC2JbLMFnAtR6k8Dhdz3EgE3ttrU5G/A05xQ9ux > gUZLBADEhVxr7kXYNwYedp+Hv+xWJpBnYwrLOy9dGr1hoM0AhPtT+/L6uyv0yJmd > HWYZUbhyeUy5dwWdquilLOBaF+l0BtgRdrmtl5T+20rsI+sc/aVNbtfp7GjwWriy > Ygep3BCf24PPvzh8JgY3PlTmVYOE8StDBQm+Z7pBZ80ouIA4brQkTWF0dGhldyBQ > YXVsc2VuIDxtcGF1bHNlbjZAaG9tZS5jb20+iQBYBBARAgAYBQI7qA0ICAsDCQgH > AgEKAhkBBRsDAAAAAAoJELjYcPfEakW9IRsAoOgv510tXgAot4LI3zdV7iaVr0Io > AJ4w9CSCx/t0C4lDBlZM5PgZJ0qABLkCDQQ7qA0IEAgA9kJXtwh/CBdyorrWqULz > Bej5UxE5T7bxbrlLOCDaAadWoxTpj0BV89AHxstDqZSt90xkhkn4DIO9ZekX1KHT > UPj1WV/cdlJPPT2N286Z4VeSWc39uK50T8X8dryDxUcwYc58yWb/Ffm7/ZFexwGq > 01uejaClcjrUGvC/RgBYK+X0iP1YTknbzSC0neSRBzZrM2w4DUUdD3yIsxx8Wy2O > 9vPJI8BD8KVbGI2Ou1WMuF040zT9fBdXQ6MdGGzeMyEstSr/POGxKUAYEY18hKcK > ctaGxAMZyAcpesqVDNmWn6vQClCbAkbTCD1mpF1Bn5x8vYlLIhkmuquiXsNV6TIL > OwACAggAvP1XSJNhkYvPiTVrM41MBBuAAPR21PxJbrMkB5z89+3KaJ7h+gEHeCDy > GE8QmVYfSMpz7/sq8W2B9vNDUn2dLnKCI3VPeszMW9oN/JR3QnL2T+sThXvLY8TF > 966NIIGrHIVDeb9hFoVOPrzghuWOv8Q0K0V0LquBF4IndgNy3S7s4ZjTExcMi3hn > Pu/PgUXzb1gGsmFoyZFy6YYGKqQ5+27UtghHbEeOIL90+bep4xuDAZ0v3Hjh+tnI > a+vIFdjVLxsTTwwB4GW3o1P1+F9wj+KfkPqWroDAYBtwV2a3YQ4MfXgTSGYysm2+ > mvnyHwrE0ZnO+0KLK7pPJ/tCMagFEYkATAQYEQIADAUCO6gNCAUbDAAAAAAKCRC4 > 2HD3xGpFvVKWAJ9Uz57//yNxW1pmdfjcJc3rCI/FiwCeKZV8pnywou/rqlRy0Jfy > 6oPOPrk= > =97B9 > -----END PGP PUBLIC KEY BLOCK----- > > -----Original Message----- > From: James M. Atkinson [mailto:jmatk@tscm.com] > Sent: Saturday, November 24, 2001 11:13 AM > To: TSCM-L Mailing List > Subject: [TSCM-L] Mobile explodes a day after new battery was installed > > > > Mobile explodes a day after new battery was installed > > http://www.arabnews.com/Article.asp?ID=10782 > > By Jameel Al-Balawi, Arab News Staff > Saturday, November 24, 2001 > > RIYADH, 24 November - The commerce ministry will inquire into a complaint > made by a mobile phone user about the explosion of his handset > the day after > he bought a new battery for it. The blast, which occurred while he was > asleep, injured him and caused a fire in his bedroom. The battery > was bought > from a telecommunications accessories shop. > > Dr. Abdul Ali Al-Ali, director general of the commercial fraud > department at > the ministry, said that the ministry will investigate the incident in > accordance with the regulations governing such situations. > > "The case will be handed over to a committee that handles complaints about > commercial fraud and takes penal actions depending on the degree of the > damage," he added. > > "I was awakened from the sleep by the loud explosion inside the house. At > first I feared the gas cylinder in the kitchen had exploded. Then > I noticed > parts of the mobile scattered in the room," Fahd Al-Ghanim, the victim of > the accident, recalled. > > Al-Ghanim added that he is not after compensation. > > "I just want the news to be published and people be warned about the risks > involved in using this kind of battery which might have caused my death if > it had exploded while I was making a call," he said. > > However, the shop owner who supplied the battery to him said he > did not know > any details about the battery except that he had bought some packets of > batteries from the sales representative of an importing agency in Riyadh. > > The importing agent denied the charge, saying that there was no > evidence to > prove that it was sold by his firm as this brand of battery was > imported by > several establishments. > > The importing agency insisted that no case of this particular brand of > battery exploding had been reported before. The batteries may explode if > they are exposed to heat or in some other exceptional circumstances, he > admitted. He also said a battery will not be usable six months after > manufacturing. > > Al-Ghanim insists that he used the set in normal circumstances > and was never > exposed to fire or any thing like that. However, he feared that > the battery > might have been past its expiry date. The date recorded on it was > 30/9/2000, > but it was not specified whether this was the manufacturing or expiration > date. > > -- > > ------------------------------------------------------------------ > ---------- > -------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ------------------------------------------------------------------ > ---------- > -------------- > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008jmatk@tscm.com > ------------------------------------------------------------------ > ---------- > -------------- > "Success without honor is an unseasoned dish; > it will satisfy your hunger, but it won't taste good." > ------------------------------------------------------------------ > ---------- > -------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > From: Lou Novacheck Date: Tue Nov 23, 2004 6:18pm Subject: Re: Wiretappnig Legality Information Germany is real tough on any infringement at all. If you have more than one phone on a line in Germany, you're unable to hear a conversation from any other instrument on the same line. It's OK to have an extension on a line, but it's verboten to be able to hear from another extension. Very tough penalties for anything along those lines. These laws were enacted post WW II in an attempt to preclude a repeat of Gestapo tactics. "J. Oquendo" wrote: Apologies for posting something that I could probably spend a few hours digging up, but I figured I would find more "fine-tuned/specific" information from others on the list. Would someone care to point out a set of documents (perhaps related to the EU (Spain would be kick a..) and the US) in relevance to the laws regarding TSCM upon finding say lawful taps, unlawful taps. Steps to take afterwards, removal (viable, non-viable, legal, illegal), etc. Any information would be appreciated. From the technological standpoint I don't have any qualms/issues, but I would like to understand the legal issues more. I thought about something along the lines of CALEA since I work in the "Internet related" field, and have perused those laws. Are there a set of "unofficial/official" laws, requirements to understand? =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo GPG Key ID 0x51F9D78D Fingerprint 2A48 BA18 1851 4C99 CA22 0619 DB63 F2F7 51F9 D78D http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D sil @ politrix . org http://www.politrix.org sil @ infiltrated . net http://www.infiltrated.net "How can we account for our present situation unless we believe that men high in this government are concerting to deliver us to disaster?" Joseph McCarthy "America's Retreat from Victory" ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor Get unlimited calls to U.S./Canada --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? Discover all thatís new in My Yahoo! [Non-text portions of this message have been removed] 10226 From: John and Sheryl Date: Tue Nov 23, 2004 6:18pm Subject: RE: AOR AR-ONE Information is very scarce on this receiver and no one seems to want to talk about its capabilities. A cut sheet on the AOR web site indicates continuous coverage from 10 - 3.3 gig. Nothing indicates tuning step speed. Is this actually a harmonic receiver similiar to a scanlock M2. John [Non-text portions of this message have been removed] 10227 From: dj Date: Tue Nov 23, 2004 7:00pm Subject: Re: Wiretappnig Legality Information You should check into the Electronics Comm Privacy Act, The USC code 6 I think and also any state laws involving privacy and eavesdropping. --------------------------------- Do you Yahoo!? Discover all thatís new in My Yahoo! [Non-text portions of this message have been removed] 10228 From: jw mooty Date: Tue Nov 23, 2004 6:19pm Subject: Re: Re: Sweep Frequency Coverage key word being... a team with a lab grade SA. Wes Mooty co. Owner Better Tree Service LLC. 1510 S Bowman Rd Litte Rock , AR 72211 501.247.6405 cell 501.227.4775 office 501.227.4617 Data Wes Mooty 501-247-6405 501-227-4719 Fax ----- Original Message ----- From: lynnwagoner007 To: TSCM-L@yahoogroups.com Sent: Tuesday, November 23, 2004 3:27 PM Subject: [TSCM-L] Re: Sweep Frequency Coverage --- In TSCM-L@yahoogroups.com, "Hawkspirit" wrote: > > > I just swept a Union Office over the weekend that had a device operating at > 5.8GHZ in the CEO's office so you better be going out to that as a minimum. > > > > Roger Tolces > > Electronic Security > > www.bugsweeps.com > > > > Just wondering.....would a thorough physical search turned up the device? > > > > Date: Sat, 20 Nov 2004 09:31:28 +1100 > > From: Michael Dever > > Subject: TSCM Procedures > > > > > > I am trying to educate some clients on the importance of specifying > 'technical' parameters in their RFT (request for tender) for TSCM services, > particularly on the RF side of the house. > > > > So far, most clients will specify a frequency range (e.g. one recently > specified 10kHz to 5 GHz!!! another 21 GHz) but say nothing about > sensitivity. > > > > As you can imagine it is sometimes very difficult to convince a client that > specifying a frequency on its own is of very little value if you are not > addressing the required sensitivity. Unfortunately the average corporate > client knows very little about these issues and some are influenced by > mavins or equipment vendors when putting together their RFT, making it hard > to convince them of the difference between a PI using a broad band device > versus a team with a lab grade SA. > > > > My question is: does anybody have a set of standard words that could be > incorporated into the technical parameters of the RFT to ensure that a > difference is created between providers in terms of their capability to find > threats? > > > > Thanks in advance > > > > Regards > > Mike > > > > Michael J. Dever CPP > > Dever Clark & Associates > > GPO Box 1163 > > Canberra ACT 2601 > > Voice: (02) 6254 5337 > > Email: dca@b... > > > > This message is sent in strict confidence for the addressee only. > > It may contain legally privileged information. The contents are not to be > disclosed to anyone other than the addressee. > > Unauthorised recipients are requested to preserve this confidentiality and > to advise the sender immediately of any error in transmission. > > > > > > [Non-text portions of this message have been removed] > > > > > > > > [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links [Non-text portions of this message have been removed] 10229 From: Greg Horton Date: Tue Nov 23, 2004 10:00pm Subject: Re: Breaking eggs for that omelet It always baffles me how the mustang officers and officers like this Macgregor and Hackworth offer sage advice on how to make positive changes in the military yet are blown off by everyone. Jim, that was a great article and a really good read. Thanks Greg 10230 From: jtowler Date: Wed Nov 24, 2004 0:25am Subject: RE: RE: AOR AR-ONE Re details on AR-One from AOR: Firstly, putting "AOR" and "ar1" into google will turn up a good number of hits. One of the first few gives some specs at http://www.universal-radio.com/catalog/widerxvr/4560spec.html I know a year or two ago, when it was even harder to find any details, before the product was released, there had been information about the product on official AOR web site(s). That information was then later removed. Maybe as the product ship dates might have been late. Who knows. Anyway, at that time it was possible to still find some of the removed pages via the Wayback Machine at http://www.waybackmachine.org/ if you had some of the old URLs, e,g, from hits in search engines. At face value, I expect the radio is everything from the AR-5000+3 with range lifted to 3.3 GHz, as for many of their newer lines, and a few other goodies. Clearly many of the AR-3000 and then AR-5000 were sold to the 3-letter gov guys (FBI, CIA, NSA whatever ...), and that was not lost on AOR, so they moved to the next level. Clearly a useful device for general comms monitoring, but of much less value for a bug sweep with devices now hiding at 5.8 GHz etc. I have both the AR-3000A and original AR-5000. For me, I would see no real value in an AR-ONE apart from the small amount of extra coverage from 2.6 GHz up to 3.3 GHz. But to be fair, unless the antenna is almost directly into the back with a near-zero-length coax, the losses up there are too high. Better to have a preamp/downconverter into a lower band. E.G. For me, if I wanted to monitor AO-51/Echo Satellite on 2.4 GHz downlink, running 2.4 over coax from outside would clearly be pointless. Better to downlink to something much lower. Re your specific question on AR-One step speed, you can download a PDF of the operator manual from http://www.aoruk.com/products/receiver/arone/arone.htm#manual Per that manual, computer control is 4800 or 9600 baud, so any software that manually steps the VFO, will be limited by the baud rate, and the response detect time having arrived on that new freq. Maximum rate to manually scan via computer control would be to only send the "Step Up" or "Step Down" command, which is a single byte for the AR-5000. I think it was not in the first version of the manual. Can't remember, but there was something about that. You still need to wait from any response before moving on. Note: I'm talking about setting the VFO to new values in turn, NOT using any of the built-in scan or search features. Like the AR-5000, the manual claims the unit has a "Hyper Scan" mode, that scans at the highest possible speed, but does not update the display until the scan halts on squelch. Note that this is fine for looking within a range or set of freqs, but of less value doing a full background sweep. I can imagine a typical PC program would do something like: Set VFO mode, bandwidth, RF gain etc ... FOR Freq = Lower_Limit TO Upper_Limit STEP step_size Set VFO to Freq (or use the faster [less bytes] "Step Up" command if there is one) Read level with one of the AR-ONE commands: "Signal Level Unit (dBuV) - Read" or "Signal Level Unit (dBm) - Read" per manual page 74 or "Signal Level" per manual page 70/71. Log required portions of Date, Time, Freq, Sig Level Next Step If you had a logged sweep at various times as a base level, the plan would clearly be to look for anything new, changed, unexpected etc. Not that if you plug in the SDU-5000 etc, its still just controlling the radio the same way, at least in the case of the AR-5000. Shame they did not add some sort of range-scan-and-report command, so the radio could go at full speed and just give up the results, but no, the AR-5000 does not do so, and nothing I see in the AR-One manual suggests it does either. I hope the above is useful, and not just about Granny and eggs ... Regards, Jim. -----Original Message----- From: John and Sheryl [mailto:pricey1@t...] Sent: Wednesday, 24 November 2004 1:18 p.m. To: TSCM-L@yahoogroups.com Subject: [TSCM-L] RE: AOR AR-ONE Information is very scarce on this receiver and no one seems to want to talk about its capabilities. A cut sheet on the AOR web site indicates continuous coverage from 10 - 3.3 gig. Nothing indicates tuning step speed. Is this actually a harmonic receiver similiar to a scanlock M2. John [Non-text portions of this message have been removed] [Non-text portions of this message have been removed] 10231 From: Hawkspirit Date: Wed Nov 24, 2004 9:58am Subject: Sweep Frequency Coverage In this case the thorough physical search probably not unless you x-rayed all objects in the room. I am a five hundred pound test equipment guy because I have confidence in my gear. We do a physical search but 95% of the time a discovery comes through test equipment readings. In this case of the 5.8GHZ transmitter, I saw it on the SA while running my first frequency sweep on the first floor vice presidents office and the device was in the CEO's office on the second floor. Roger Tolces www.bugsweeps.com Date: Tue, 23 Nov 2004 21:27:21 -0000 From: "lynnwagoner007" Subject: Re: Sweep Frequency Coverage --- In TSCM-L@yahoogroups.com, "Hawkspirit" wrote: > > > I just swept a Union Office over the weekend that had a device operating at > 5.8GHZ in the CEO's office so you better be going out to that as a minimum. > > > > Roger Tolces > > Electronic Security > > www.bugsweeps.com > > > > Just wondering.....would a thorough physical search turned up the device? > [Non-text portions of this message have been removed] 10232 From: Date: Wed Nov 24, 2004 10:01am Subject: Re: RE: AOR AR-ONE John, I have the AOR 8600 MKIII Which according to the engineers from AOR that were at the Dayton Hamvention stated to me that it is simular but also disimular, it looks like the step and other functions are very much the same as the "ONE" othe then the extended frequency coverage. A "chip" is a chip as one of them said however I think they targeted the goverment market and did some additional things to attract them.. My 8600 MKIII works very well with the "Scancat" software and there are a couple of others out there as well. I have a winradio 3000E which goes to 4ghz and it also works well with their software.. This probably hasnt helped you much but all of these items used for tscm or other are good tools that allow you to if not have the perfect item a good tool in your tscm took kit. thanks Bill Rhoads 10233 From: Daryl Adams Date: Wed Nov 24, 2004 9:30am Subject: Status Inquiry Does anyone on the list happen to know what Ray Jarvis is doing these days? Status of JII? I attended a few of his courses years ago, and have entertained the idea of following up. Thanks and rgds. 10234 From: Date: Wed Nov 24, 2004 1:08pm Subject: RE: RE: AOR AR-ONE Gentlemen, It would be ridiculous to assume that three letter agencies (maybe apart for police - professional level equipment may be too expensive for them) procured AOR receivers. There is only ONE AOR RECEIVER widely used in government products as a building block. I repeat - as a building block, not as a receiver. This one is AR3000A. It was and still is widely used for building low end government line surveillance and Direction Finding equipment. Even renomed companies use it, including Rockwell and Cubic. Their own receivers are too expensive for that purposes! I suppose that being aware of this, AOR decided to make one more receiver which eventually becomes attractive for similar purposes and they made a $3000.00 machine performing worse than AR3000A but having one feature allegedly beneficial for DF: internal coherency. That is, all oscillators are locked to a common internal standard, a feature found in every professional receiver last 15 years. But having made equipment mostly for hobbyisrs they have forgotten that receivers designed for coherent multichannel application require not only frequency domain coherency, but also controllable response in the domain, allowing for phase adjustments, calibration and - even more critical - equal time delay within AGC range. All that lacks new AOR child. It is not difficult to modify AR3000A for coherent operation (I have done it), but still the receiver shows different delay within AGC range, that makes it unusable for DF other than single channel orthogonal loop DF. The same remains true for AR-ONE (I have tested it) Another receiver AR8600 is not worth discussing, it is a table-top version of a handheld toy. Regards, A.W. "jtowler" wrote: > > >Re details on AR-One from AOR: > >Firstly, putting "AOR" and "ar1" into google will turn up a good number of >hits. > >One of the first few gives some specs at >http://www.universal-radio.com/catalog/widerxvr/4560spec.html > >I know a year or two ago, when it was even harder to find any details, >before the product was released, there had been information about the >product on official AOR web site(s). That information was then later >removed. Maybe as the product ship dates might have been late. Who knows. > >Anyway, at that time it was possible to still find some of the removed pages >via the Wayback Machine at http://www.waybackmachine.org/ if you had some of >the old URLs, e,g, from hits in search engines. > >At face value, I expect the radio is everything from the AR-5000+3 with >range lifted to 3.3 GHz, as for many of their newer lines, and a few other >goodies. > >Clearly many of the AR-3000 and then AR-5000 were sold to the 3-letter gov >guys (FBI, CIA, NSA whatever ...), and that was not lost on AOR, so they >moved to the next level. > >Clearly a useful device for general comms monitoring, but of much less value >for a bug sweep with devices now hiding at 5.8 GHz etc. > >I have both the AR-3000A and original AR-5000. For me, I would see no real >value in an AR-ONE apart from the small amount of extra coverage from 2.6 >GHz up to 3.3 GHz. But to be fair, unless the antenna is almost directly >into the back with a near-zero-length coax, the losses up there are too >high. > >Better to have a preamp/downconverter into a lower band. E.G. For me, if I >wanted to monitor AO-51/Echo Satellite on 2.4 GHz downlink, running 2.4 over >coax from outside would clearly be pointless. Better to downlink to >something much lower. > >Re your specific question on AR-One step speed, you can download a PDF of >the operator manual from >http://www.aoruk.com/products/receiver/arone/arone.htm#manual > >Per that manual, computer control is 4800 or 9600 baud, so any software that >manually steps the VFO, will be limited by the baud rate, and the response >detect time having arrived on that new freq. > >Maximum rate to manually scan via computer control would be to only send the >"Step Up" or "Step Down" command, which is a single byte for the AR-5000. I >think it was not in the first version of the manual. Can't remember, but >there was something about that. You still need to wait from any response >before moving on. Note: I'm talking about setting the VFO to new values in >turn, NOT using any of the built-in scan or search features. > >Like the AR-5000, the manual claims the unit has a "Hyper Scan" mode, that >scans at the highest possible speed, but does not update the display until >the scan halts on squelch. Note that this is fine for looking within a range >or set of freqs, but of less value doing a full background sweep. > >I can imagine a typical PC program would do something like: > >Set VFO mode, bandwidth, RF gain etc ... > >FOR Freq = Lower_Limit TO Upper_Limit STEP step_size > Set VFO to Freq (or use the faster [less bytes] "Step Up" command if >there is one) > Read level with one of the AR-ONE commands: > "Signal Level Unit (dBuV) - Read" > or "Signal Level Unit (dBm) - Read" per manual page 74 > or "Signal Level" per manual page 70/71. > Log required portions of Date, Time, Freq, Sig Level >Next Step > >If you had a logged sweep at various times as a base level, the plan would >clearly be to look for anything new, changed, unexpected etc. > >Not that if you plug in the SDU-5000 etc, its still just controlling the >radio the same way, at least in the case of the AR-5000. > >Shame they did not add some sort of range-scan-and-report command, so the >radio could go at full speed and just give up the results, but no, the >AR-5000 does not do so, and nothing I see in the AR-One manual suggests it >does either. > >I hope the above is useful, and not just about Granny and eggs ... > >Regards, >Jim. > >-----Original Message----- >From: John and Sheryl [mailto:pricey1@t...] >Sent: Wednesday, 24 November 2004 1:18 p.m. >To: TSCM-L@yahoogroups.com >Subject: [TSCM-L] RE: AOR AR-ONE > > > > > Information is very scarce on this receiver and no one seems to want to >talk about its capabilities. A cut sheet on the AOR web site indicates >continuous coverage from 10 - 3.3 gig. Nothing indicates tuning step speed. >Is this actually a harmonic receiver similiar to a scanlock M2. > > John > > >[Non-text portions of this message have been removed] > > > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > __________________________________________________________________ Switch to Netscape Internet Service. As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register Netscape. Just the Net You Need. New! Netscape Toolbar for Internet Explorer Search from anywhere on the Web and block those annoying pop-ups. Download now at http://channels.netscape.com/ns/search/install.jsp 10235 From: James M. Atkinson Date: Wed Nov 24, 2004 2:36pm Subject: Happy Thanksgiving I would like to wish everybody on the list a very happy Thanksgiving Day. -jma PS: For the benefit of our list member who are outside of the United States I will mention that "Thanksgiving Day" is a holiday where we get together with our friends and families to give thanks to a higher power and to give recognition to the source of that which provides for and sustains us. Essentially it is a time that we all stop what we are doing, and reflect of how truly blessed we are, and in turn we as a nation "Give Thanks" to God for providing for us. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10236 From: James M. Atkinson Date: Wed Nov 24, 2004 3:41pm Subject: Illegal Border Crossings American liberals sneaking across the border... Tuesday, November 16, 2004 The Columbus Dispatch by JOE BLUNDO The flood of American liberals sneaking across the border into Canada has intensified in the past week, sparking calls for increased patrols to stop the illegal immigration. The re-election of President Bush is prompting the exodus among left leaning citizens who fear they will soon be required to hunt, pray and agree with Bill O'Reilly. Canadian border farmers say it's not uncommon to see dozens of sociology professors, animal rights activists and Unitarians crossing their fields at night. "I went out to milk the cows the other day, and there was a Hollywood producer huddled in the barn," said Manitoba farmer Red Greenfield, whose acreage borders North Dakota. The producer was cold, exhausted and hungry. "He asked me if I could spare a latte and some free-range chicken. When I said I didn't have any, he left. Didn't even get a chance to show him my screenplay, eh?" In an effort to stop the illegal aliens, Greenfield erected higher fences, but the liberals scaled them. So he tried installing speakers that blare Rush Limbaugh across the fields. "Not real effective," he said. "The liberals still got through, and Rush annoyed the cows so much they wouldn't give milk." Officials are particularly concerned about smugglers who meet liberals near the Canadian border, pack them into Volvo station wagons, drive them across the border and leave them to fend for themselves. "A lot of these people are not prepared for rugged conditions," an Ontario border patrolman said. "I found one carload without a drop of drinking water. They did have a nice supple little Russian River Pinot Noir, though." When liberals are caught, they're sent back across the border, often wailing loudly that they fear retribution from conservatives. Rumors have been circulating about the Bush administration establishing re-education camps in which liberals will be forced to drink keg beer and watch NASCAR. In the days since the election, liberals have turned to sometimes ingenious ways of crossing the border. Some have taken to posing as senior citizens on bus trips to buy cheap Canadian prescription drugs. After catching a half-dozen young vegans disguised in powdered wigs, Canadian immigration authorities began stopping buses and quizzing the supposed senior-citizen passengers. "If they can't identify the accordion player on The Lawrence Welk Show, we get suspicious about their age," an official said. Canadian citizens have complained that the illegal immigrants are creating an organic-broccoli shortage and renting all the good Susan Sarandon movies. "I feel sorry for American liberals, but the Canadian economy just can't support them," an Ottawa resident said. "How many art-history majors that went to Columbia does one country need?" In an effort to ease tensions between the United States and Canada, Vice President Dick Cheney met with the Canadian ambassador and pledged that the administration would take steps to reassure liberals, a source close to Cheney said. "We're going to have some Peter, Paul & Mary concerts. And we might put some endangered species on postage stamps. The president is determined to reach out." ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10237 From: Thomas Kellar Date: Wed Nov 24, 2004 5:25pm Subject: Re: Illegal Border Crossings It is funny how one can tell what groups users have interests similar to your own when you get the same mail in several groups! I thought I would comment as I joined this group out of curiosity. I also think I will say something about myself, in case anyone is interested. I joined this group as I have an interest in RF and security (not together). I mainly work with computer security. I currently am employed as a System Administrator for TYBRIN Corporation with a government contract. I spend about 40 percent of my time on security matters these days. I am an amateur radio operator who did a lot of packet in the past but do not do much these days. I don't talk a lot so I do not have much use for 2 meters or 440 either. I am an extreme Linux fan and have been an advocate for Linux for many many years. I am interested in distributed processing as well. I used to work for the Air Force in one of their avionics laboratories testing radar warning receivers. I have a familiarity with HP 8566 Spectrum Analyzers and if I won the lottery would probably purchase one just to play with. I will probably not say anthing here other than this. Thanks for your time. Thomas -- w8twk Freelance Systems Programming http://www.fsp.com 10238 From: A Grudko Date: Thu Nov 25, 2004 0:53am Subject: RE: Illegal Border Crossings -----Original Message----- " Officials are particularly concerned about smugglers who meet liberals near the Canadian border, pack them into Volvo station wagons, drive them across the border and leave them to fend for themselves. I took delivery of a black Volvo last week. It looks good parked next to my black SUV but now I feel politically confused. What can you advise Dr? I'm rushing out on my way out to complete a sweep I started yesterday. Had an interesting one with my IR probe on my CPM 700 in an MD's office. Usual buzzes from LCD displays etc but then got a big sig ... off a cast iron fireplace. Did a thorough inspection and there was no device there or even mains power near. And there was another in the board room which was the same. My conclusion - a metallic finish paint that looked like a really hard enamel had been used and this was causing a bimetallic reaction which was QRMing the IR probe. Or the iron was from a mine which also contained uranium..........(If I turn green soon you'll know what to tell the coroner) Andy G Afrika --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.799 / Virus Database: 543 - Release Date: 2004/11/19 [Non-text portions of this message have been removed] 10239 From: Hawkspirit Date: Thu Nov 25, 2004 1:07am Subject: Sweep Needed Residential sweep needed in Lewisville North Carolina. Contact me as soon as possible if you can handle this assignment. Roger Tolces Electronic Security co. [Non-text portions of this message have been removed] 10240 From: satcommunitfive Date: Wed Nov 24, 2004 7:24pm Subject: Re: AOR AR-ONE one the questions was speed the AOR 8600 mark2 is very slow on the freq and channel scanning -the `spec-ann` software is kinda handy.... If you what cheap speed get a bearcat XLT9000 etc etc yep its toy really -even the IF output is to narrow for most my 2c 10241 From: Agent Geiger Date: Wed Nov 24, 2004 8:27pm Subject: Re: Illegal Border Crossings Welcome --- Thomas Kellar wrote: > > > It is funny how one can tell what groups users have > interests similar to > your own when you get the same mail in several > groups! I thought I would > comment as I joined this group out of curiosity. I > also think I will say > something about myself, in case anyone is > interested. > > I joined this group as I have an interest in RF and > security (not > together). I mainly work with computer security. I > currently am employed > as a System Administrator for TYBRIN Corporation > with a government > contract. I spend about 40 percent of my time on > security matters these > days. I am an amateur radio operator who did a lot > of packet in the past > but do not do much these days. I don't talk a lot > so I do not have much > use for 2 meters or 440 either. I am an extreme > Linux fan and have been > an advocate for Linux for many many years. I am > interested in distributed > processing as well. I used to work for the Air > Force in one of their > avionics laboratories testing radar warning > receivers. I have a > familiarity with HP 8566 Spectrum Analyzers and if I > won the lottery would > probably purchase one just to play with. I will > probably not say anthing > here other than this. > > Thanks for your time. > > Thomas > -- > w8twk Freelance Systems Programming > http://www.fsp.com > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - You care about security. So do we. http://promotions.yahoo.com/new_mail 10242 From: Paul Curtis Date: Thu Nov 25, 2004 0:25pm Subject: RE: Status Inquiry I too attended one of Ray Jarvis's courses (about a week long) in Tulsa in about 1984. He and his crew were very nice people and very helpful. I would also be interested in knowing what he is up to these days. Paul Curtis -----Original Message----- From: Daryl Adams [mailto:dary1_adams@h...] Sent: Wednesday, November 24, 2004 07:30 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Status Inquiry Does anyone on the list happen to know what Ray Jarvis is doing these days? Status of JII? I attended a few of his courses years ago, and have entertained the idea of following up. Thanks and rgds. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10243 From: Steve Weinert at Excel.Net Date: Fri Nov 26, 2004 6:12pm Subject: Samsung (by Qualcomm) Cell Phone GPS & Issues A friendly USA based engineering team has been offered no-cost "upgrades" in cellphones to newer model, that they have been told features a GPS type device. The phones they are being offered: Samsung (by Qualcomm) Model: SPH-A660 04.10 (Software/version?) FCC ID: A3LSPHA660 Interesting to know what this GPS Option is all about, if it shuts down with the removal of the battery-pack, or if it is still alive for a while from a secondary battery? Any insight appreciated! I am far from expert on the ins & outs of cellphones! Thanks! Steve W 10244 From: Paul Curtis Date: Sat Nov 27, 2004 0:04am Subject: RE: Corporate Lingo Dear James, In re: add value - there is a term for decrease the worth of something - we call it vandalism and theft :) or the application of the value reduction system :) Your list is pretty funny stuff. Thanks for sending it along. Paul Curtis -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Thursday, November 11, 2004 20:02 To: TSCM-L Subject: [TSCM-L] Corporate Lingo http://www.spies.com/~gus/ran/corporate.htm action item Something which needs to be either done or at least placed in a list of things in need of doing. For example, an action item in the de-hiring of a resource would be the revocation of the resource's network privileges. add value Increase the worth of something. There is no term for "decrease the worth of something." bottleneck An essential resource who impedes the rapid completion of a project. Resource bottlenecks are generally those which are overworked and understaffed. In my erstwhile employer's case, bottlenecks occurred most often in graphic design, database approval, and quality assurance. challenge A problem. Simply using the word "problem" generates excessive negativity and implies there's nothing that can be done, which is often the case. coach A boss; someone who orders others around. The term "coach" has fewer negative connotations in our society than the term "boss." "Coach" indicates that the game of business is much like football or baseball, an idea that appeals to many who would have preferred to get rich that way. compensation package The expense of having a resource. Unfortunately, resources must rent homes, drive cars and eat food, so to keep them alive (so that they can work), they must be compensated. Sometimes the cost of hiring a specific resource is such that his or her compensation package is out of all proportion to the compensation packages of other resources doing similar work. Thus compensation specifics are regarded as "highly-sensitive" information, and resources are warned that they can be de-hired if they discuss their compensation packages with other resources. de-hire To forcibly terminate a resource's employment, usually using the Change of Relationship Form. The resource is then supervised as he or she packs his stuff and is then escorted to the door. deliverables Features of a product that can be achieved by a specific date. Always spoken of in the future tense. drill down For someone to examine something in detail, feature by feature, regardless of level of management. Since this almost never happens in the course of real business (since such action might be interpreted as "taking ownership"), this term is used almost exclusively in the future tense, often as a threat. embrace and extend To copy another company's product and then add a few features. That's how it works in theory. In reality, most attempts at embrace and extend result in a buggy, overly-hyped knock-off which, through multiple versions, never quite attains the functionality of the original product being copied. focus Concentration on a single task. This rarely lasts more than a few hours even when jealously guarded. incentivize To create a reason for a resource to do something that a manager or a project leader needs done. Often this involves the payment of a bonus, but it can also be the threat of de-hiring. knowledge transfer For a resource to teach someone how to do something that only he or she knows how to do. Generally a corporation encourages knowledge transfer as much as possible since it makes it much easier to de-hire a resource whose knowledge has been completely transferred. Paradoxically, the project management system actually discourages knowledge transfer, since, with its strict capitalist model, there is no incentive for one resource to give another resource competitive skills. leverage A longer word meaning "use." Since much of what a corporation actually has is wasted, managers like to put added emphasis on occasions when they actually use something they already have. metric An objective measurement of success or value. In the web world, metrics can be things like "retention," "revenue per unit time," or, in the negative sense of the word, "man-years." While corporations would like to have their employees and the public at large believe that their actions are all entirely based on a careful reading of measurable parameters, in reality many corporate actions are the result of a complex mix of bad science, wishful-thinking and the personal selfishness of managers. milestone A date related to the level of completion for a project, always spoken of in the future tense. Since milestones are rarely predicted to fall anywhere near where they end up falling, the judgment of whether or not a milestone has been reached is more of an art than a science. offline A term meaning "at another, unspecified meeting." Suggesting that an uncomfortable or technically-complex topic be taken "offline" is an excellent way to put off its further discussion indefinitely. open communication A policy allowing one person in the firm to speak to another candidly, even emotionally, about some concern, regardless of the position within the firm of either employee. The existance of such a policy is often paraded around with much fanfare in the hopes that employees will feel that they have a voice within the firm. In actuality, of course, the moment an employee starts making real use of open communication, he or she is placed on the short list of rabble-rousers earmarked for de-hiring. The only people truly free to openly communicate are coaches and other bosses, as long as they don't give their bosses any lip. out of the loop A phrase meaning "not connected with a decision." It is used to deny responsibility or to complain about not having been consulted. own To take responsibility for something. Someone who "owns" something can never claim that they are "out of the loop." point of contact Someone who is the voice for an entire team or subgroup. Effective points of contact often maintain that they are "out of the loop" when challenges occur. proactive Doing something without being told. This is such a rare assertion of individual initiative that the very word has a mystical aura about it, much like "holy grail." project management system A management system that divides a company into small working groups which are left to operate fairly independently and are held independently accountable for their successes and failures. This is how PMS works in theory. In the case of my erstwhile employer, PMS (renamed, for Êsthetic reasons, to RAM) was continually corrupted and influenced by such forces as CEO whim, resource manager decree, co-founder bullying (especially in the case of e-commerce projects), shoddy quantification, the special needs of acquired company integration, and the incentivizable demands of overall corporate health (especially with regard to recruitment and knowledge transfer). resource A living, breathing human being having a skill set and a compensation package. Resources are managed by a cloistered group which calls itself "Human Resources." Like hardware, resources have fixed lifespans, can become obsolete and can even malfunction. resource bonus An entirely fictional payment that resources are supposed to receive monthly for work done outside the project management system. responsibility assignment To pass the buck. Not just anyone can participate in an act of responsibility assignment. Generally speaking, a resource can assign responsibility only when he or she receives a larger paycheck than the resource being assigned the responsibility. A manager adept in the art of responsibility assignment can advance his or her position indefinitely beneath the level of CEO. results-driven A project or a resource which/who displays a machiavellian indifference for procedure so long as a key metric is met. scope creep The gradual inflation of the goals of a project as its leaders imagine more things for it to do. For a developer, this situation can quickly spiral out of control, especially since scope creep always seems to advance faster and faster as a deadline is approached. skill set Things a resource has the ability to do. Often the skill set is defined arbitrarily narrow so as to focus a resource on a limited aspect of company business. The fewer seeing the big picture for themselves, the better. subject matter expert The person who knows the most about a particular product. If that person has been de-hired, the subject matter expert is whoever wants to be de-hired next. sync up To have a meeting, especially but not necessarily between two people. Evidently borrowed from the Palm Pilot lexicon. take ownership Assume responsibility. This is the opposite of the more normal practice of "responsibility assignment." take ___ to the next level To improve, extend or advance. This is usually stated as a goal; few actual advancements are ever regarded in retrospect as having quite been "to the next level." (This phrase faded from popularity in the summer of 1999.) team A group of people working together. Taken directly from the obnoxious language of sports. touch base Sync up or otherwise have a brief meeting. Another term taken directly from the obnoxious language of sports. WIIFM "What's in it for me?" Under the harsh capitalist rules of the Project Management System, supposedly no one had to do anything unless they were personally incentivized. Implicitly or explicitly, this led many resources to ask when approached for a project, "What's in it for me?" The CEO occasionally joked that WIIFM was everybody's favorite radio station. WTAWTAW "Where there's a will, there's a way." This is less of a corporate slogan than it is a start-up company mantra. Basically this means that anything is possible if a resource is willing to focus hard enough on the task at hand. In my experience, though, the end result of WTAWTAW is buggy software, shattered expectations and mass de-hirings. ---------------------------------------------------------------------------- ------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10245 From: Mitch D Date: Sat Nov 27, 2004 8:18pm Subject: RE: Status Inquiry More than likely they're busy w classes,I called about 3 weeks ago,and everyone was busy. MD ( jarvis alumni) --- Paul Curtis wrote: > I too attended one of Ray Jarvis's courses (about a week long) > in Tulsa in > about 1984. He and his crew were very nice people and very > helpful. I > would also be interested in knowing what he is up to these > days. > > Paul Curtis ===== Mitch Davis TSCM/Special Operations Group Inc. Nashville,TN.USA MitchD@t... site:www.tscmusa.com. Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 __________________________________ Do you Yahoo!? Yahoo! Mail - You care about security. So do we. http://promotions.yahoo.com/new_mail 10246 From: Doug Runyon Date: Sat Nov 27, 2004 8:55pm Subject: Re: Status Inquiry I did 3 weeks at Jarvis back in 1987. I did the Basic and Advanced TSCM courses, followed by the Video Operations course. Great stuff and great people. I was fortunate to work with Ray on few sweeps after that and learned even more during those "OJT" opportunities. Ray, Cindy, Ray's sons, and Milo all bring back good memories. And another bright spot was eating at Diamond Lil's at the airport almost everyday. Yum! I know he's been teaching the TSCM component of the Executive Security International (ESI) program for a while now. Hope he's doing well. Doug Runyon 10247 From: Dexter Mills Jr. Date: Sat Nov 27, 2004 8:30am Subject: Re: Sweep Needed Roger, Is this assignment still available? Any Information would be greatly appreciated. Regards, Dexter Mills Jr. Micol Information Security ----- Original Message ----- From: "Hawkspirit" To: Sent: Thursday, November 25, 2004 2:07 AM Subject: [TSCM-L] Sweep Needed > > > > Residential sweep needed in Lewisville North Carolina. Contact me as soon > as possible if you can handle this assignment. > > Roger Tolces > > Electronic Security co. > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10248 From: Paul Curtis Date: Sun Nov 28, 2004 4:54am Subject: RE: Status Inquiry Thank you, Mitch. I appreciate your response. Paul Curtis -----Original Message----- From: Mitch D [mailto:rockdriver@y...] Sent: Saturday, November 27, 2004 18:19 To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Status Inquiry More than likely they're busy w classes,I called about 3 weeks ago,and everyone was busy. MD ( jarvis alumni) --- Paul Curtis wrote: > I too attended one of Ray Jarvis's courses (about a week long) > in Tulsa in > about 1984. He and his crew were very nice people and very > helpful. I > would also be interested in knowing what he is up to these > days. > > Paul Curtis ===== Mitch Davis TSCM/Special Operations Group Inc. Nashville,TN.USA MitchD@t... site:www.tscmusa.com. Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 __________________________________ Do you Yahoo!? Yahoo! Mail - You care about security. So do we. http://promotions.yahoo.com/new_mail ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10249 From: Eric Leonard Date: Sun Nov 28, 2004 6:50pm Subject: Swift Could someone privately forward Swift's contact info? I'd like to order a few more of his books. Thanks. EL Los Angeles 10250 From: J. Oquendo Date: Sun Nov 28, 2004 11:24pm Subject: Big Brother watching your printers Government Uses Color Laser Printer Technology to Track Documents Mon Nov 22, 4:00 AM ET (http://story.news.yahoo.com/news?tmpl=story&cid=1093&e=4&u=/pcworld/20041122/tc_pcworld/118664) WASHINGTON--Next time you make a printout from your color laser printer, shine an LED flashlight beam on it and examine it closely with a magnifying glass. You might be able to see the small, scattered yellow dots printer there that could be used to trace the document back to you. According to experts, several printer companies quietly encode the serial number and the manufacturing code of their color laser printers and color copiers on every document those machines produce. Governments, including the United States, already use the hidden markings to track counterfeiters. Peter Crean, a senior research fellow at Xerox, says his company's laser printers, copiers and multifunction workstations, such as its WorkCentre Pro series, put the "serial number of each machine coded in little yellow dots" in every printout. The millimeter-sized dots appear about every inch on a page, nestled within the printed words and margins. "It's a trail back to you, like a license plate," Crean says. The dots' minuscule size, covering less than one-thousandth of the page, along with their color combination of yellow on white, makes them invisible to the naked eye, Crean says. One way to determine if your color laser is applying this tracking process is to shine a blue LED light--say, from a keychain laser flashlight--on your page and use a magnifier. Crime Fighting vs. Privacy Laser-printing technology makes it incredibly easy to counterfeit money and documents, and Crean says the dots, in use in some printers for decades, allow law enforcement to identify and track down counterfeiters. However, they could also be employed to track a document back to any person or business that printed it. Although the technology has existed for a long time, printer companies have not been required to notify customers of the feature. Lorelei Pagano, a counterfeiting specialist with the U.S. Secret Service, stresses that the government uses the embedded serial numbers only when alerted to a forgery. "The only time any information is gained from these documents is purely in [the case of] a criminal act," she says. John Morris, a lawyer for The Center for Democracy and Technology, says, "That type of assurance doesn't really assure me at all, unless there's some type of statute." He adds, "At a bare minimum, there needs to be a notice to consumers." If the practice disturbs you, don't bother trying to disable the encoding mechanism--you'll probably just break your printer. Crean describes the device as a chip located "way in the machine, right near the laser" that embeds the dots when the document "is about 20 billionths of a second" from printing. "Standard mischief won't get you around it," Crean adds. Neither Crean nor Pagano has an estimate of how many laser printers, copiers, and multifunction devices track documents, but they say that the practice is commonplace among major printer companies. "The industry absolutely has been extraordinarily helpful [to law enforcement]," Pagano says. According to Pagano, counterfeiting cases are brought to the Secret Service, which checks the documents, determines the brand and serial number of the printer, and contacts the company. Some, like Xerox, have a customer database, and they share the information with the government. Crean says Xerox and the government have a good relationship. "The U.S. government had been on board all along--they would actually come out to our labs," Crean says. History Unlike ink jet printers, laser printers, fax machines, and copiers fire a laser through a mirror and series of lenses to embed the document or image on a page. Such devices range from a little over $100 to more than $1000, and are designed for both home and office. Crean says Xerox pioneered this technology about 20 years ago, to assuage fears that their color copiers could easily be used to counterfeit bills. "We developed the first (encoding mechanism) in house because several countries had expressed concern about allowing us to sell the printers in their country," Crean says. Since then, he says, many other companies have adopted the practice. The United States is not the only country teaming with private industry to fight counterfeiters. A recent article points to the Dutch government as using similar anticounterfeiting methods, and cites Canon as a company with encoding technology. Canon USA declined to comment. =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo GPG Key ID 0x51F9D78D Fingerprint 2A48 BA18 1851 4C99 CA22 0619 DB63 F2F7 51F9 D78D http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D sil @ politrix . org http://www.politrix.org sil @ infiltrated . net http://www.infiltrated.net "How can we account for our present situation unless we believe that men high in this government are concerting to deliver us to disaster?" Joseph McCarthy "America's Retreat from Victory" 10251 From: jtowler Date: Mon Nov 29, 2004 8:35pm Subject: Off Topic comments about poor(?) use of security system Hi, Seems no-one is talking much since someone ripped into my last email, offered in good faith, a week ago ... but anyway ... Today, I purchased 4 books at one of the larger book shops in the city. The person on the serving counter swiped all the books over the gizmo to deactivate the hidden RF tags and I headed for the door. So far, so good. I walked from the rear of the store where I was served, towards the front main counter, and started out the main doors. And then the anti-theft alarm on the exit went off, so I turned back to their main counter. NOT the one that had just served me in a different part of the store. The lady said sorry, and passed the entire carry bag over the deactivator in the counter top. She smiled and muttered something about sorry and someone forgetting ... At no point did she look in the bag, count the books (see point 1), or ask to see my sales receipt. I said thanks and headed out the door. No alarm this time. If I had added to my bag on my way forward, I'd now have a free book, but at some significant risk. Question: Did the store security system work or did it fail in the above example? The system proved the risk of being detected is very real. But what of their procedures? Regards, Jim. [Non-text portions of this message have been removed] 10252 From: Agent Geiger Date: Tue Nov 30, 2004 0:08am Subject: Re: Off Topic comments about poor(?) use of security system It failed. People are often the weakest link in any system. This type of thing happens to me all the time, especially if if I have a good rapport with the people working there. --- jtowler wrote: > > Hi, > > Seems no-one is talking much since someone ripped > into my last email, > offered in good faith, a week ago ... but anyway ... > > Today, I purchased 4 books at one of the larger book > shops in the city. > > The person on the serving counter swiped all the > books over the gizmo to > deactivate the hidden RF tags and I headed for the > door. So far, so good. > > I walked from the rear of the store where I was > served, towards the front > main counter, and started out the main doors. > > And then the anti-theft alarm on the exit went off, > so I turned back to > their main counter. NOT the one that had just served > me in a different part > of the store. > > The lady said sorry, and passed the entire carry bag > over the deactivator in > the counter top. She smiled and muttered something > about sorry and someone > forgetting ... > > At no point did she look in the bag, count the books > (see point 1), or ask > to see my sales receipt. > > I said thanks and headed out the door. No alarm this > time. > > If I had added to my bag on my way forward, I'd now > have a free book, but at > some significant risk. > > Question: Did the store security system work or did > it fail in the above > example? > > The system proved the risk of being detected is very > real. But what of their > procedures? > > Regards, > Jim. > > > > > > [Non-text portions of this message have been > removed] > > > > > __________________________________ Do you Yahoo!? The all-new My Yahoo! - What will yours do? http://my.yahoo.com 10253 From: Gregory Horton Date: Mon Nov 29, 2004 10:24pm Subject: Re: Off Topic comments about poor(?) use of security system It sounds like human error on both ends of the equation. The first clerk failed to properly deactivate the tags and didn't listen for the telltale beep that indicates the procedure worked. Then the second clerk, probably scared that you would make a big scene or sue her and the store, failed to properly ensure that you had receipts for the merchandise and then properly deactivate the tags. But then again, a great majority of clerks do not want to get involved in store security what-so-ever and don't make an effort to help at all. I have had 5 clerks at my Home Depot not even look up when my bag (same problem as yours) activated the alarm. I stood there until one clerk finally looked over in my direction and said OK go on through. Oh well. Greg Horton ----- Original Message ----- From: jtowler To: TSCM-L@yahoogroups.com Sent: Monday, November 29, 2004 6:35 PM Subject: [TSCM-L] Off Topic comments about poor(?) use of security system Hi, Seems no-one is talking much since someone ripped into my last email, offered in good faith, a week ago ... but anyway ... Today, I purchased 4 books at one of the larger book shops in the city. The person on the serving counter swiped all the books over the gizmo to deactivate the hidden RF tags and I headed for the door. So far, so good. I walked from the rear of the store where I was served, towards the front main counter, and started out the main doors. And then the anti-theft alarm on the exit went off, so I turned back to their main counter. NOT the one that had just served me in a different part of the store. The lady said sorry, and passed the entire carry bag over the deactivator in the counter top. She smiled and muttered something about sorry and someone forgetting ... At no point did she look in the bag, count the books (see point 1), or ask to see my sales receipt. I said thanks and headed out the door. No alarm this time. If I had added to my bag on my way forward, I'd now have a free book, but at some significant risk. Question: Did the store security system work or did it fail in the above example? The system proved the risk of being detected is very real. But what of their procedures? Regards, Jim. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10254 From: A Grudko Date: Tue Nov 30, 2004 2:38am Subject: RE: Off Topic comments about poor(?) use of security system -----Original Message----- From: jtowler [mailto:jtowler@x...] > Question: Did the store security system work or did it fail in the above example? From a security perspective the system seems to have failed, but there might be some mitigating factors*. Some stores have the checkout at the exit point but this looks regimented and 'unfriendly'. So marketing conscious stores place more 'intimate' paypoints within the store. This produces the security risk you have pointed out. * To counter this the stores with satellite paypoints should add; * bag sealing at the paypoint * CCTV or * store detectives to reduce exploitation of the 'loophole'. It's sad that we live in consumer driven societies where ownership is more important than morals, but such is life. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.802 / Virus Database: 545 - Release Date: 2004/11/26 [Non-text portions of this message have been removed] From: Date: Sun Nov 24, 2002 4:28am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County, San Francisco, Silicon Valley, San Jose, San Diego, and Las Vegas. (Also, anywhere in a thousand mile radius from Los Angeles.) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 6574 From: Date: Sun Nov 24, 2002 4:28am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6575 From: Fernando Martins Date: Sun Nov 24, 2002 4:49am Subject: Fw: [VulnWatch] Paper Release: Security Risk Factors with IP Telephony based Networks ----- Original Message ----- From: "Ofir Arkin" To: Sent: Saturday, November 23, 2002 5:06 PM Subject: [VulnWatch] Paper Release: Security Risk Factors with IP Telephony based Networks > >From the Abstract: > IP Telephony based networks, which might be a core part of our Telephony > infrastructure in the near future, introduce caveats and security > concerns which traditional telephony based networks do not have to deal > with, have long forgotten about, or have learned to cope with. The > security risk is usually overshadowed by the technological hype and the > way IP Telephony equipment manufacturers push the technology to the > masses. This paper highlights the different security risk factors with > IP Telephony based networks. > > > A PDF version of the paper (~480kb) is available from: > http://www.sys-security.com/archive/papers/Security_Risk_Factors_with_IP > _Telephony_based_Networks.pdf > > A PDF Zipped version of the paper is available from: > http://www.sys-security.com/archive/papers/Security_Risk_Factors_with_IP > _Telephony_based_Networks.zip > > > Yours, > Ofir Arkin [ofir@s...] > Founder > The Sys-Security Group > http://www.sys-security.com > PGP CC2C BE53 12C6 C9F2 87B1 B8C6 0DFA CF2D D360 43FA > > > > 6576 From: kondrak Date: Sun Nov 24, 2002 4:57am Subject: Saudi Diplomats up to their asses in 9.11 http://www.msnbc.com/news/838867.asp?0cv=KB10&cp1=1 THE BUREAU, THEY SAY, has uncovered financial records showing a steady stream of payments to the family of one of the students, Omar Al Bayoumi. The money moved into the familyís bank account beginning in early 2000, just a few months after hijackers Khalid Almidhar and Nawaf Alhazmi arrived in Los Angeles from an Al Qaeda planning summit in Kuala Lumpur, Malaysia, according to the sources. Within days of the terroristsí arrival in the United State, Al Bayoumi befriended the two men who would eventually hijack American Flight 77, throwing them a welcoming party in San Diego and guaranteeing their lease on an apartment next door to his own. Al Bayoumi also paid $1,500 to cover the first two months of rent for Al Midhar and Alhazmi, although officials said it is possible that the hijackers later repaid the money. Sources familiar with the evidence say the payments≠amounting to about $3,500 a month≠came from an account at Washingtonís Riggs Bank in the name of Princess Haifa Al-Faisal, the wife of Saudi Ambassador to the United States, Prince Bandar bin Sultan, and the daughter of the late Saudi King Faisal. After Al Bayoumi left the country in July 2001≠two months before the September 11 terror attacks≠payments for roughly the same amount began flowing every month to Osama Basnan, a close associate of Al Bayoumiís who also befriended the hijackers. A federal law-enforcement source told NEWSWEEK that Basnan≠who was recently convicted of visa fraud and is awaiting deportation≠was a known ìAl Qaeda sympathizerî who ìcelebrated the heroes of September 11î at a party after the attacks and openly talked about ìwhat a wonderful, glorious day it had been.î Administration officials stressed repeatedly in interviews that they do not know the purpose of the payments from Princess Haifaís account. It is also uncertain whether the money was given to the hijackers by Al Bayoumi or Basman. White House sources also raised a number of other cautionary notes, saying that it was not uncommon for wealthy Saudis to provide financial assistance to struggling Saudi families in the United States. ìThe facts are unclear, and thereís no need to rush to judgment,î said one administration official. But other sources describe the financial records as ìexplosiveî and say the information has spurred an intense, behind-the-scenes battle between congressional leaders and the Bush administration over whether evidence highly embarrassing to the Saudi government should be publicly disclosed≠especially at a time that the White House is aggressively seeking Saudi support for a possible war against Iraq. ìThis is a matter of the foreign-policy interests of the United States,î said another administration official, who cited the need to prevent a rift in the U.S.-Saudi relationship. A spokesperson for Princess Haifa said ìshe will cooperate fully with the United States.î The princess hasnít been asked about the payments by any representatives of the U.S. government, and she wasnít aware of the allegations until today, her spokesperson said. Administration officials expressed concerns that premature disclosure of the evidence of the financial payments could jeopardize the ongoing FBI probe, especially the bureauís efforts to apprehend and develop a case against Al Bayoumi. Upon leaving the United States last year, Al Bayoumi flew to Great Britain where he enrolled in a graduate-level business program at Birminghamís Aston University. He was arrested by New Scotland Yard after September 11 but adamantly denied any connection to the attacks or knowledge of the hijackerís links to Al Qaeda and was released a week later for lack of evidence. He is now believed to be back in Saudi Arabia. Law-enforcement officials say they are still intensely investigating his activities, suspecting that he may have served as an ìadvance manî for the hijackers. 9-11 Hijackers: A Saudi Money Trail? November 23, 2002 ≠ Dan Klaidman, Newsweekís Washington bureau chief, talks with MSNBCís Alex Witt about the investigation into possible links between Saudi royalty and 9/11 hijackers. The leaders of a joint House-Senate Intelligence Committees investigation have vigorously pushed for the release of a classified report that lays out the evidence of the Saudi money flow. But Bush administration officials, led by Attorney General John Ashcroft and FBI Director Robert Mueller, have adamantly refused to declassify the evidence upon which the report is based. Senate Intelligence Committee chairman Sen. Bob Graham declined to discuss the evidence gathered by the joint inquiry, but he said he was upset over the Bush administrationís intransigence. ìThis one stinks of people using classified informationî for political purposes, said Graham. 6577 From: Andre Holmes <1ach@g...> Date: Sat Nov 23, 2002 7:52pm Subject: MASON RECEIVER Greetings Im seeking information on the Maon Radio Receiver A-3B 1) History behind unit. I own the unit in question but could not find anything on it Andre Holmes Neptune Enterprise Security [Non-text portions of this message have been removed] 6578 From: Matt Paulsen Date: Sun Nov 24, 2002 7:51pm Subject: secure comm systems for UN inspection in iraq This brief blurb touches on a previous thread... full article - http://www.cnn.com/2002/WORLD/meast/11/24/iraq.inspectors/index.html With Wednesday as the scheduled start date for the inspections, the 38-member U.N. advance team brought in several tons of equipment over the weekend. Of utmost concern was securing the U.N. headquarters in Baghdad. Workers installed new computers in refurbished laboratories packed with secure communications equipment. Hiro Ueki, spokesman for the U.N. Monitoring, Verification and Inspection Committee, or UNMOVIC, said the equipment would ensure that "in case something happens, we can communicate with each other." 6579 From: Andre Holmes <1ach@g...> Date: Sat Nov 23, 2002 10:40pm Subject: Fw: MASON RECEIVER ----- Original Message ----- From: "Andre Holmes" <1ach@G...> To: Sent: Saturday, November 23, 2002 21:17 Subject: Re: [TSCM-L] MASON RECEIVER > Thank You Gil Zimmerman > > > Im just breaking in the unit. I do have the manual. > > I do have spectrum analysis and it seems to only demod in AM at this point. > > I am using a amplified speaker to hear and Ive used 2kohm head phones with > no big improvement. > > Im using a Discone antenna 450-2500 Mhz with no preamp.Close to the Ramsey > cone in looks.This Discone kicks butt. > > Ive used a high direction log peroidic antenna with no preamp that works > well. > > > Test still pending baseband raster analysis. > > It picks up a wireless mic well around 170Mhz > Freq coverage 2 KHz to 1600 MHz > Andre Holmes > Neptune Enterprise Security > > > ----- Original Message ----- > From: "Gil Zimmerman" > To: "'Andre Holmes'" <1ach@g...> > Sent: Sunday, November 24, 2002 20:43 > Subject: RE: [TSCM-L] MASON RECEIVER > > > > Might give him a ring? > > > > From: John Reed > > Subject: Re: Prem-Rx: Unusual receivers > > Date: Mon, 08 Mar 1999 09:52:27 -0800 > > > > I have a Mason Engineering A-3B receiver. It covers 2 KHz to 1200 MHz > > and has a > > spectrum analyzer scope built in, all contained in a large briefcase and > > operated from > > AA batteries or an AC supply. It was used by the NSA or CIA for > > surveillance > > countermeasures. A lot of attention was given to bugs operated as > > subcarriers of FM > > signals and it has a built in subcarrier receiver as a part of the unit. > > Works well and > > I use it occasionally. I also have the manual for it. Whether or not > > it would be > > considered a premium receiver or not, I don't know. It's analog tuned, > > no > > microprocessors, however I'm kind of partial to receivers that may not > > be "premium" but > > are unusual. Among my collection: > > > > Mason A-3B Surveillance countermeasures > > Eddystone EC958/3 Wadley triple mix LF MF HF Canadian surplus > > CEI 373A-2 Analog tuned surveillance countermeasures HF > > Sylvania R1414/URR Navy surplus early 1970's special purpose HF > > receiver > > National R1490/GRR-17 Marine Corps synthesized HF receiver > > Sylvania WLR-6 Submarine covert surveillance receiver "Water > > Boy 1" > > > > All these are solid state and cover the shortwave bands. I would put > > the R1414 up > > against any premium receiver as far as quality of reception. I've done > > many A/B tests > > with Harris, W-J and Racal receivers and the Sylvania beats them all on > > MW. > > > > > > Good luck, > > > > Gil > > > > > > > > Gil Zimmerman > > ESI / AGER / BMI > > New York / Paris / Panama City > > mailto:esintl@o... > > (646) 872-5893 > > (646) 349-1485 Fax > > NJSP No. 6869 > > > > -----Original Message----- > > From: Andre Holmes [mailto:1ach@g...] > > Sent: Saturday, November 23, 2002 8:52 PM > > To: TSCM-L@yahoogroups.com > > Subject: [TSCM-L] MASON RECEIVER > > > > > > Greetings > > > > Im seeking information on the Maon Radio Receiver A-3B > > > > 1) History behind unit. > > > > I own the unit in question but could not find anything on it > > > > Andre Holmes > > Neptune Enterprise Security > > > > > > > > [Non-text portions of this message have been removed] > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, the > > hands acquire shaking, the shaking is a warning. It is by caffeine > > alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to > > http://docs.yahoo.com/info/terms/ > > > > > > --- > > Incoming mail is certified Virus Free. > > Checked by AVG anti-virus system (http://www.grisoft.com). > > Version: 6.0.419 / Virus Database: 235 - Release Date: 11/13/2002 > > > > > > --- > > Outgoing mail is certified Virus Free. > > Checked by AVG anti-virus system (http://www.grisoft.com). > > Version: 6.0.419 / Virus Database: 235 - Release Date: 11/13/2002 > > > > > 6580 From: Gregory Perry Date: Mon Nov 25, 2002 4:36pm Subject: Fwd: KEEP BIG BROTHER'S HANDS OFF THE INTERNET by Senator John Ashcroft > http://usinfo.state.gov/journals/itgic/1097/ijge/gj-7.htm > > [ How ironic ] > > KEEP BIG BROTHER'S HANDS OFF THE INTERNET > > By Senator John Ashcroft > > Republican, Missouri > Chairman of the Senate Commerce Subcommittee on Consumer > Affairs, Foreign Commerce and Tourism > > [Senator Ashcroft takes issue with administration views on the > Internet > and the use of encryption technology.] > > --------------------------------------------------------------- > > The Internet provides a great opportunity to our country, in > part by representing the most inviting form of communication > ever developed. It draws people together from all corners of > the globe to share and communicate on an unprecedented level, > and brings all branches of government closer to the public that > they serve. > > The Internet allows small businesses to reach out across the > globe and conquer the distances between them and potential > customers. Individuals can view merchandise and make purchases > without leaving home. The Internet also holds great promise for > education. Students -- rural, suburban, and urban -- are > increasingly able to access a wealth of information with their > fingertips that was previously beyond their reach. > > In order to guarantee that the United States meets the > challenge of this new means of commerce, communication, and > education, government must be careful not to interfere. We > should not harness the Internet with a confusing array of > intrusive regulations and controls. Yet, the Clinton > administration is trying to do just that. > > The Clinton administration would like the Federal government to > have the capability to read any international or domestic > computer communications. The FBI wants access to decode, > digest, and discuss financial transactions, personal e-mail, > and proprietary information sent abroad -- all in the name of > national security. To accomplish this, President Clinton would > like government agencies to have the keys for decoding all > exported U.S. software and Internet communications. > > This proposed policy raises obvious concerns about Americans' > privacy, in addition to tampering with the competitive > advantage that our U.S. software companies currently enjoy in > the field of encryption technology. Not only would Big Brother > be looming over the shoulders of international cyber-surfers, > but the administration threatens to render our state-of-the-art > computer software engineers obsolete and unemployed. > > There is a concern that the Internet could be used to commit > crimes and that advanced encryption could disguise such > activity. However, we do not provide the government with phone > jacks outside our homes for unlimited wiretaps. Why, then, > should we grant government the Orwellian capability to listen > at will and in real time to our communications across the Web? > > The protections of the Fourth Amendment are clear. The right to > protection from unlawful searches is an indivisible American > value. Two hundred years of court decisions have stood in > defense of this fundamental right. The state's interest in > effective crime-fighting should never vitiate the citizens' > Bill of Rights. > > The president has proposed that American software companies > supply the government with decryption keys to high level > encryption programs. Yet, European software producers are free > to produce computer encryption codes of all levels of security > without providing keys to any government authority. Purchasers > of encryption software value security above all else. These > buyers will ultimately choose airtight encryption programs that > will not be American-made programs to which the U.S. government > maintains keys. > > In spite of this truism, the president is attempting to foist > his rigid policy on the exceptionally fluid and fast-paced > computer industry. Furthermore, recent developments in > decryption technology bring into question the dynamic of > government meddling in this industry. Three months ago, the > 56-bit algorithm government standard encryption code that > protects most U.S. electronic financial transactions from ATM > cards to wire transfers was broken by a low-powered 90 MHZ > Pentium processor. > > In 1977, when this code was first approved by the U.S. > government as a standard, it was deemed unbreakable. And for > good reason. There are 72 quadrillion (72,000 trillion) > different combinations in a 56-bit code. However, with today's > technology these 72 quadrillion combinations can each be tried > in a matter of time. > > Two days after this encryption code was broken, a majority of > the U.S. Senate Commerce Committee voted, in accordance with > administration policy, to force American software companies to > perpetuate this already compromised 56-bit encryption system. > In spite of the fact that 128-bit encryption software from > European firms is available on Web sites accessible to every > Internet user. Interestingly, European firms can import this > super-secure encryption technology (originally developed by > Americans) to the United States, but U.S. companies are > forbidden by law from exporting these same programs to other > countries. > > I believe that moving forward with the president's policy or > the Commerce Committee's bill would be an act of folly, > creating a cadre of government "peeping toms" and causing > severe damage to our vibrant software industries. Government > would be caught in a perpetual game of catch-up with whiz-kid > code-breakers and industry advances. Senate Majority Leader > Trent Lott has signaled his objection to both proposals. > > The leader and I would like to work to bring solid encryption > legislation to the Senate floor. Any proposal should give U.S. > encryption software manufacturers the freedom to compete on > equal footing in the international marketplace, by providing > the industry with a quasi-governmental board that would decide > encryption bit strength based on the level of international > technological development. > > U.S. companies are on the front line of on-line technologies -- > value-added industries of the future. Consider this: Every > eighteen months, the processing capability of a computer > doubles. The speed with which today's fastest computers > calculate will be slug-like before the next millennium or the > next presidential election comes along. The best policy for > encryption technology is one that can rapidly react to > breakthroughs in decoding capability and roll back encryption > limits as needed. > > The administration's interest in all e-mail is a wholly > unhealthy precedent, especially given this administration's > track record on FBI files and IRS snooping. Every medium by > which people communicate can be subject to exploitation by > those with illegal intentions. Nevertheless, this is no reason > to hand Big Brother the keys to unlock our e-mail diaries, open > our ATM records, read our medical records, or translate our > international communications. > > Additionally, the full potential of the Internet will never be > realized without a system that fairly protects the interests of > those who use the Internet for their businesses, own > copyrighted material, deliver that material via the Internet, > or individual users. The implications here are far-reaching, > with impacts that touch individual users, companies, libraries, > universities, teachers, and students. > > In December 1996, two treaties were adopted by the diplomatic > conference of the World Intellectual Property Organization > (WIPO) to update international copyright law. These treaties > would extend international copyright law into the digital > environment, including the Internet. However, these treaties do > not provide a comprehensive response to the many copyright > issues raised by the flourishing of the Internet and the > promise of digital technology. We must work to keep the scales > of copyright law balanced, providing important protections to > creators of content, while ensuring their widespread > distribution. In an attempt to meet these goals, I introduced > the Digital Copyright Clarification and Technology Education > Act of 1997. > > Equally important, we must begin a process that is structured > to balance the rights of copyright owners with the needs and > technological limitations of those who enable the distribution > of the electronic information, and with the rights and needs of > individual end users. The current treaties and statements are > not sufficient, and include some language that could create > legal uncertainty. This vague language could lead to laws that > ignore technical realities. The language must be clarified > through the enactment of legislation in conjunction with the > Senate's ratification of the treaties. > > Another issue that could prevent the Internet from reaching its > potential is taxation. If we tax the Internet prematurely or > allow discriminatory taxing, we may stifle a burgeoning > technological development that holds much commercial, social, > and educational promise for all Americans. Taxation should be > considered only after we have fully examined and understood the > impact that unequivocal taxation would have on this new means > of commerce. The Internet Tax Freedom Act would allow for full > consideration of the opportunities and possible abuses by > placing a moratorium on further taxation of online commerce and > technologically discriminatory taxes. It is important to note > that S. 442 will allow states and local jurisdictions to > continue to collect any tax already levied on electronic > commerce. > > On-line communications technology is akin to the Wild West of > the 19th century. To best settle this new frontier, we should > unleash American know-how and ingenuity. The government's > police-state policy on encryption is creating hindrances and > hurdles that will eventually injure our ability to compete > internationally. Government's role should be to break down > barriers, to allow everyone to excel to their highest and best. > > __________ > > Senator Ashcroft is a member of the Senate Commerce, Judiciary, > and Foreign Relations Committees. His Web homepage is: http:// > www.senate.gov/~ashcroft/ and his e-mail address is: > john_ashcroft@a... > > --------------------------------------------------------------- > Global Issues > USIA Electronic Journal, Vol. 2, No. 4, October 1997 > > [Non-text portions of this message have been removed] 6581 From: Date: Mon Nov 25, 2002 4:06pm Subject: A private investigator under investigation - LA Times A private investigator under investigation Anthony Pellicano has made a name for himself in Hollywood. Now he finds himself in legal hot water. By Paul Lieberman and Louise Roug Times Staff Writers Times Staff Writers November 25 2002 Among those who seek the moniker "Hollywood detective," Anthony Pellicano, who was arrested last week, has set the standard for two decades -- even the rivals who portray him as a greedy, self-promoting bully concede that much. John Nazarian, a fearsome-looking former San Francisco cop who has done private-eye work for the likes of Dean Martin and Peggy Lee, tells of going to the Lalique store in Beverly Hills a few weeks ago to buy a $3,000 piece of crystal for a client who has given him a good deal of business, the gift being one of those gestures that keeps up the mystique, like wearing a Rolex. So what did the clerk say when he handed her his business card? "She said, 'Oh, you must know Mr. Pellicano,' " Nazarian recalls. "Mr. Pellicano comes here all the time." There's a grudging respect in such stories, even as a competitor like Nazarian points out how Pellicano did not come from the ranks of law enforcement, but started back in Chicago as a "skip tracer" for the Spiegel catalog. "Image in this town is everything," Nazarian says. "I don't know how he does what he does, but he's very good at it.... Everybody wants to be in that little select club." Pellicano established his image long before the latest incident -- the discovery of weapons at his office as part of an investigation into whether he orchestrated a threat against a Times reporter -- landed him in the news. He's the P.I. with the arms-folded, stare-you-down look, a trademark logo -- a pelican, of course -- and a motto for clients, "Your problem becomes my problem." But part of his image, too, has been that he's one detective who does not need a gun to deal with the enemies of such celebrity clients as Michael Jackson and Sylvester Stallone. He might use a little dirt, sure -- or a lot of dirt. And a bat too -- his signature Louisville slugger. But not a gun. "I always start out by being a gentleman," he said once. "I only use intimidation and fear when I absolutely have to." Another time, he described his approach as appealing to someone's sense of values first, and only then, "if they don't have any, then I have to counter-blackmail 'em." Or as he put it on another occasion, "Anybody who wants to malign one of my clients, I dig into their pasts. So they gotta take the same heat that they dish out." That's been the image -- built on tough talk, dirt and a bat -- that has helped the 58-year-old father of nine win both business and headlines for 20 years now in Los Angeles. And in a city whose own image was crafted in part by a line of fictional private eyes -- from Raymond Chandler's Philip Marlowe to Jack Nicholson's Jake Gittes in "Chinatown" -- the Hollywood detective is almost expected to play the loner walking an ethical tightrope, even if the image has only a marginal relationship to reality. But now the detective who supposedly didn't need a gun will have to explain why federal authorities stumbled on far more than that last week when they searched two safes in his Sunset Boulevard office. The FBI agents were there to investigate allegations on an FBI informant's tape recordings that Pellicano may have orchestrated a threat in June against Times reporter Anita M. Busch, perhaps at the behest of actor Steven Seagal -- an allegation both men deny. The FBI agents said they found two loaded guns and 15 to 20 bundles of cash, "the majority of which bore $10,000 wrappers." But what's cost Pellicano his freedom, at least until a hearing Wednesday in U.S. District Court, is the discovery of two practice hand grenades, allegedly "altered for the specific purpose of rendering them lethal," and plastic explosives "consistent with military C-4," according to an affidavit by special agent Stanley E. Ornellas. Pellicano is said to have told another agent at the scene that "the items in the safe were from an old case of his and that he had forgotten they were there." "I don't like to talk about defenses before I have to use defenses. But I think there's a reasonable explanation," Pellicano's attorney, Donald M. Re, said over the weekend. The defense attorney promised an explanation this week that would at least suggest a "mitigating circumstance" for why the city's most famous private detective had the favored weapons of terrorists. "The explosive could easily be used to blow up a car," Ornellas said, "and was in fact strong enough to bring down an airplane." High school dropout Anthony "The Pelican" Pellicano learned the value of myth-making, and even a touch of scandal, before he came to L.A. He takes pride in having transformed himself from a high school dropout off the streets of Cicero, Ill., raised by a divorced single mom, into a detective able to command, as an "ultimate problem solver," $25,000 retainers. He used the name Tony Fortune during his days collecting debts for the Spiegel catalog, then went into business for himself in 1969. He won appointment to the Illinois Law Enforcement Commission, which distributed federal crime-fighting funds, but resigned in 1976 in the wake of news reports that he had accepted a $30,000 loan from the son of an underworld figure. Pellicano said the son was a childhood friend and his daughter's godfather, "just like any other guy in the neighborhood." He made a splash again in 1977, for finding not a missing person but missing bones -- the remains of movie producer Michael Todd, who was married to Elizabeth Taylor when he died in a 1958 plane crash. When Todd's remains vanished from an Illinois cemetery and local police couldn't find them, Pellicano did, saying an informant had told him to search under leaves and dirt near the grave. His detractors whispered, but it was a perfect noir moment -- who could say where the truth lay? What competitors did not dispute, then or now, was that Pellicano had some real skills beyond the ability to garner publicity. The most notable was his ability to analyze recordings, and to enhance the quality of surveillance tapes used by private detectives and the government alike. That's what brought him to Los Angeles in 1983; he was hired by attorney Howard Weitzman to assist in the defense of carmaker John Z. DeLorean, who was caught in a government sting and charged in a bizarre scheme to raise millions of dollars selling cocaine. Pellicano helped dissect the prosecution tapes and Weitzman won an acquittal for DeLorean. Weitzman went on to use the detective in "a great number of cases afterward" and to this day remains one of Pellicano's fans, saying over the weekend that he did "a great job as an investigator." These days, even the government sometimes uses Pellicano's technical skills. Pellicano also began offering the "damage control" services that made him a P.I. of choice for a coterie of lawyers with the sort of celebrity clients who have to fend off stalkers, extortionists, the tabloids, paternity claims -- or combinations of the above. "There was a time when a male celebrity I was representing was getting really threatening letters," recalls one of those lawyers, Bertram Fields. "No police agency could find [the culprit]. The letters were being mailed from a small town in New York. The FBI had worked on it, even some foreign intelligence agency. Within 24, maybe 48 hours, Anthony called me and said, 'I'm across the street from the guy who's sending the letters. What do you want me to do?' " A decade after the DeLorean case, Pellicano became a full-fledged celebrity in his own right, when he surfaced as a defender and spin-master for singer Michael Jackson, who faced career-threatening molestation allegations from the family of a young boy. In more recent years, Pellicano represented actor Mike Myers, when he was sued by Universal Pictures for allegedly breaching his contract to write and star in a movie called "Dieter.'' For all the attorneys who use Pellicano, and swear by him, there are others who question how he works, like the Beverly Hills lawyer convinced that Pellicano's men are the ones now watching one of his clients, a nanny to a wealthy family, though he admits: "I can't prove it." One on-the-record critic is criminal defense attorney Leslie Abramson, who has become famous for her work for the Menendez brothers and others. She says Pellicano charged a client of hers $80,000 but did little for that fee. "He's a joke," she says, "except he's not funny." Nazarian, the Encino-based investigator, likes to joke that "there are only two types of people who use private investigators: crazy people and rich people. In our business, if you get a crazy rich person, that's a good day." One private investigator who says he has worked a couple of cases with Pellicano said "there's a little bit of envy in the community" over the big fees and publicity Pellicano draws. He said Pellicano is "a loose cannon ... a big show," an investigator who has "done very well in the perception business." Company he keeps Now the public perception of L.A.'s best known private investigator is at a crossroads, caught up in some of the very things that have brought him cases over the years: a blood feud, informants and lots of taping. The feud is between Seagal, the martial arts instructor turned action star, and his former producing partner, Julius R. Nasso. The pair split two years ago and Nasso filed a $60-million lawsuit against the actor this spring for refusing to appear in four movies. Then the seemingly routine Hollywood squabble became anything but -- due to a Mafia investigation in Staten Island, where Nasso lives. According to court records, FBI bugs at mob hangouts there picked up conversations between Nasso and the local capo, Sonny Ciccone. Nasso was seeking help in dealing with an "entertainment figure," and Ciccone spoke of demanding $150,000 for each movie Seagal made. The filing of extortion charges last May against Nasso, Ciccone and others set off a slew of new accusations between the Nasso and Seagal camps, and publicity neither needed. In June, Busch, one of two L.A. Times reporters investigating the relationship between Seagal and Nasso, discovered a bullet hole in her car, along with a dead fish and rose, and a note warning, "Stop." A federal search warrant application later outlined how a man then began calling Busch, claiming to know who did it, and how federal agents and Los Angeles police then confronted the informant. He agreed to wear a wire at meetings with the man he said carried out the vandalism, ex-convict Alexander Proctor. In a July 3 conversation, Proctor confided that he had set out to terrorize the reporter for one "Anthony," who was "a big investigator in Los Angeles," according to the FBI document. On Aug. 13, "Proctor acknowledged that the Anthony who hired him was the private investigator Anthony Pellicano." Though Proctor was arrested Oct. 16, federal authorities said there still was no independent evidence to prove who had ordered the attack, just his "uncorroborated statements." So FBI agents showed up Thursday at Pellicano's offices, looking for that evidence -- only to find something else. Pellicano now will have to answer the weapons charges even if he is never linked to the June threat against Busch. His standing seems secure, however. As Pellicano was arraigned Friday on the weapons charges, an official sitting in the holding area for prisoners gave Pellicano a newspaper with the story of his arrest, according to Re, the detective's lawyer. "The other inmates," the official told Re, "will consider him a celebrity now." * Times staff writer Dana Calvo contributed to this story. [Non-text portions of this message have been removed] 6582 From: kondrak Date: Mon Nov 25, 2002 9:30pm Subject: Re: Fwd: KEEP BIG BROTHER'S HANDS OFF THE INTERNET by Senator John Ashcroft Yes, thats old copy...now he advances a police-state attitude twords the internet and freedom. A traitor to the constitution. So much for a "good Christian man"...sigh.. At 16:36 11/25/02 -0600, you wrote: > > http://usinfo.state.gov/journals/itgic/1097/ijge/gj-7.htm > > > > [ How ironic ] > > > > KEEP BIG BROTHER'S HANDS OFF THE INTERNET > > > > By Senator John Ashcroft > > > > Republican, Missouri > > Chairman of the Senate Commerce Subcommittee on Consumer > > Affairs, Foreign Commerce and Tourism > > 6583 From: James M. Atkinson Date: Tue Nov 26, 2002 11:05am Subject: Happy Turkey Day Greetings, I would like to extend a holiday greeting to all of our friends and customers. Wishing you and your family a very Happy Thanksgiving. Warmest Regards, James M. Atkinson -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6584 From: Steve Uhrig Date: Wed Nov 27, 2002 10:42pm Subject: Another use for fluoroscopes See: http://www.secursite.net/misa/misamsgr.pdf page 14. This is the newsletter for the Maryland private detective association. Fluoroscopes have more uses than inspecting artifacts for bugs. Happy holidays everyone. We have more to be thankful for than we possibly can enumerate. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6585 From: David Alexander Date: Thu Nov 28, 2002 6:44am Subject: Engineer gags How many first year engineering students does it take to change a light bulb? None. That's a second year subject. How many second year engineering students does it take to change a light bulb? One, but the rest of the class copies the report. How many third year engineering students does it take to change a light bulb? "Will this question be in the final examination?" How many electrical engineers does it take to change a light bulb? None. They simply redefine darkness as the industry standard. How many nuclear engineers does it take to change a light bulb? Seven. One to install the new bulb and six to figure out what to do with the old one for the next 10,000 years. _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 6586 From: David Alexander Date: Thu Nov 28, 2002 6:46am Subject: computers in films Word processors never display a cursor. You never have to use the space-bar. Movie characters never make typing mistakes. All monitors display inch-high letters. High-tech computers, such as those used by NASA, the CIA or some such governmental institution, will have easy to understand graphical interfaces. Those that don't have graphical interfaces will have incredibly powerful text-based command shells that can correctly understand and execute commands typed in plain English. Note: Command line interfaces will give you access to any information you want by simply typing, "ACCESS THE SECRET FILES" on any near-by keyboard. You can also infect a computer with a destructive virus by simply typing "UPLOAD VIRUS". (See "Fortress".) All computers are connected. You can access the information on someone's desktop computer even if it's turned off. Powerful computers beep whenever you press a key or the screen changes. Some computers also slow down the output on the screen so that it doesn't go faster than you can read. (Really advanced computers will also emulate the sound of a dot-matrix printer.) All computer panels operate on thousands of volts and have explosive devices underneath their surface. Malfunctions are indicated by a bright flash of light, a puff of smoke, a shower of sparks and an explosion that causes you to jump backwards. People typing on a computer can safely turn it off without saving the data. A hacker is always able to break into the most sensitive computer in the world by guessing the secret password in two tries. You may bypass "PERMISSION DENIED" message by using the "OVERRIDE" function. (See "Demolition Man".) Computers only take 2 seconds to boot up. Complex calculations and loading of huge amounts of data will be accomplished in under three seconds. Movie modems usually appear to transmit data at the speed of two gigabytes per second. When the power plant/missile site/main computer overheats, all control panels will explode shortly before the entire building will. If you display a file on the screen and someone deletes the file, it also disappears from the screen (See "Clear and Present Danger"). If a disk contains encrypted files, you are automatically asked for a password when you insert it. Computers can interface with any other computer regardless of the manufacturer or galaxy where it originated. (See "Independence Day".) Computer disks will work on any computer has a floppy drive and all software is usable on any platforms. The more high-tech the equipment, the more buttons it will have. (See "Aliens".) Note: You must be highly trained to operate high-tech computers because the buttons have no labels except for the "SELF-DESTRUCT" button. Most computers, no matter how small, have three-dimensional active animation, photo-realistic graphics capabilities. Laptops always have amazing real-time video phone capabilities and performance similar to a CRAY Supercomputer. Whenever a character looks at a monitor, the image is so bright that it projects itself onto their face. (See "Alien" or "2001".) Searches on the internet will always return what you are looking for no matter how vague your keywords are. (See "Mission Impossible", Tom Cruise searches with keywords like "file" and "computer" and 3 results are returned.) _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 6587 From: David Alexander Date: Thu Nov 28, 2002 6:50am Subject: personal communications A guy walks into a bar and sits down. After a few minutes, he starts dialing numbers... like a telephone...but on the back of his hand. He then flips his hand over, and starts talking into the palm of his hand. The bartender walks over and tells him this is a very tough neighborhood and he doesn't need any trouble from weirdoes here. The guy says, "You don't understand. I'm very hi-tech.I had a phone installed in my hand because I was tired of carrying the cellular." The bartender says, "Prove it!", so the guy dials up a number and hands his hand to the bartender. The bartender talks into the hand and carries on a brief conversation. "That's incredible," says the bartender, "I would never have believed it! "Yeah," said the guy, "I can keep in touch with my broker, my wife, you name it. By the way, where is the men's room?" The bartender directs him to the men's room. The guy goes in, and 5,10,20 minutes go by, and he doesn't return. Fearing the worst, given the violence in the neighborhood, the bartender goes into the men's room. The guy is spread-eagle against the wall. His pants are pulled down and he has a roll of toilet paper shoved up his butt. "What the hell!" said the bartender. "Did the locals rob you? Are you hurt?" The guy casually turns around, and says: "No, I'm OK. I'm just waiting for a fax." _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... [Non-text portions of this message have been removed] 6588 From: James M. Atkinson Date: Thu Nov 28, 2002 8:25am Subject: The Parrot Three sons left home to make their fortunes, and they all did very, very well for themselves. They got together recently and were discussing what they each had done to benefit their aging mother. "Well," said the first one, "I bought Mom a huge house in Beverly Hills." "I bought her a Mercedes and hired a full-time driver for her," said the second. "I've got you both beat," said the third. "I bought her a miraculous Harvard educated parrot that can recite any piece of literature or poem, has a masters degree in business, and is fluent is eight languages." A little later, the mother sent out a thank you letter to all three sons. "Gerald -- the house you bought was too big. I only live in one room, but I have to clean the entire house. Milton -- the car is useless because I don't go anywhere because I'm too old. But Robert -- you know exactly what I like. The chicken was delicious." Happy Thanksgiving -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6589 From: Does it matter Date: Thu Nov 28, 2002 1:24pm Subject: my favorite line I think that what you posted about computers in movies is funny. My favorite computer line is from Airplane 2 when this worker says to William Shatner "Sir I've been watching this computer all day and all I can gather is that these lights keep blinking out of sequence" Shatner replies "Well make them blink in Sequence" 6590 From: greendots . Date: Thu Nov 28, 2002 3:11pm Subject: Re: computers in films Movie characters always read aloud whatever it is they are typing even though the camera is clearly focused on their computer screen. Even when saving a file to the hard disk, computers make a sound like the old noisy Macintosh floppy drives. >From: David Alexander >To: 'TSCM submissions' >Subject: [TSCM-L] computers in films >Date: Thu, 28 Nov 2002 12:46:20 -0000 > > >Word processors never display a cursor. > >You never have to use the space-bar. > >Movie characters never make typing mistakes. > >All monitors display inch-high letters. > >High-tech computers, such as those used by NASA, the CIA or some such >governmental institution, will have easy to understand graphical >interfaces. > >Those that don't have graphical interfaces will have incredibly powerful >text-based command shells that can correctly understand and execute >commands typed in plain English. > >Note: Command line interfaces will give you access to any information you >want by simply typing, "ACCESS THE SECRET FILES" on any near-by keyboard. > >You can also infect a computer with a destructive virus by simply typing >"UPLOAD VIRUS". (See "Fortress".) > >All computers are connected. You can access the information on someone's >desktop computer even if it's turned off. > >Powerful computers beep whenever you press a key or the screen changes. >Some computers also slow down the output on the screen so that it doesn't >go faster than you can read. (Really advanced computers will also emulate >the sound of a dot-matrix printer.) > >All computer panels operate on thousands of volts and have explosive >devices underneath their surface. Malfunctions are indicated by a bright >flash of light, a puff of smoke, a shower of sparks and an explosion that >causes you to jump backwards. > >People typing on a computer can safely turn it off without saving the data. > >A hacker is always able to break into the most sensitive computer in the >world by guessing the secret password in two tries. > >You may bypass "PERMISSION DENIED" message by using the "OVERRIDE" >function. (See "Demolition Man".) > >Computers only take 2 seconds to boot up. > >Complex calculations and loading of huge amounts of data will be >accomplished in under three seconds. Movie modems usually appear to >transmit data at the speed of two gigabytes per second. > >When the power plant/missile site/main computer overheats, all control >panels will explode shortly before the entire building will. > >If you display a file on the screen and someone deletes the file, it also >disappears from the screen (See "Clear and Present Danger"). > >If a disk contains encrypted files, you are automatically asked for a >password when you insert it. > >Computers can interface with any other computer regardless of the >manufacturer or galaxy where it originated. (See "Independence Day".) > >Computer disks will work on any computer has a floppy drive and all >software is usable on any platforms. > >The more high-tech the equipment, the more buttons it will have. (See >"Aliens".) > >Note: You must be highly trained to operate high-tech computers because the >buttons have no labels except for the "SELF-DESTRUCT" button. > >Most computers, no matter how small, have three-dimensional active >animation, photo-realistic graphics capabilities. > >Laptops always have amazing real-time video phone capabilities and >performance similar to a CRAY Supercomputer. > >Whenever a character looks at a monitor, the image is so bright that it >projects itself onto their face. (See "Alien" or "2001".) > >Searches on the internet will always return what you are looking for no >matter how vague your keywords are. (See "Mission Impossible", Tom Cruise >searches with keywords like "file" and "computer" and 3 results are >returned.) > > >_______________________________ >David Alexander M.INSTIS >Global Infrastructure Director >Bookham Technology plc >Tel: +44 (0) 1327 356264 >Mobile: +44 (0) 7799 881284 >Fax: +44 (0) 1327 356775 >http://www.bookham.com > > > >======================================================================= >This e-mail is intended for the person it is addressed to only. The >information contained in it may be confidential and/or protected by >law. If you are not the intended recipient of this message, you must >not make any use of this information, or copy or show it to any >person. Please contact us immediately to tell us that you have >received this e-mail, and return the original to us. Any use, >forwarding, printing or copying of this message is strictly prohibited. >No part of this message can be considered a request for goods or >services. >======================================================================= >Any questions about Bookham's E-Mail service should be directed to >postmaster@b.... > > > >[Non-text portions of this message have been removed] > _________________________________________________________________ Protect your PC - get McAfee.com VirusScan Online http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963 6591 From: Matt Paulsen Date: Fri Nov 29, 2002 8:28am Subject: RE: computers in films My favorite is the general from 'War Games' when he's talking about pulling the plug on WOPR.. -----Original Message----- From: greendots . [mailto:greendots@h...] Sent: Thursday, November 28, 2002 1:11 PM To: tscm-l@yahoogroups.com Subject: Re: [TSCM-L] computers in films Movie characters always read aloud whatever it is they are typing even though the camera is clearly focused on their computer screen. Even when saving a file to the hard disk, computers make a sound like the old noisy Macintosh floppy drives. >From: David Alexander >To: 'TSCM submissions' >Subject: [TSCM-L] computers in films >Date: Thu, 28 Nov 2002 12:46:20 -0000 > > >Word processors never display a cursor. > >You never have to use the space-bar. > >Movie characters never make typing mistakes. > >All monitors display inch-high letters. > >High-tech computers, such as those used by NASA, the CIA or some such >governmental institution, will have easy to understand graphical >interfaces. > >Those that don't have graphical interfaces will have incredibly powerful >text-based command shells that can correctly understand and execute >commands typed in plain English. > >Note: Command line interfaces will give you access to any information you >want by simply typing, "ACCESS THE SECRET FILES" on any near-by keyboard. > >You can also infect a computer with a destructive virus by simply typing >"UPLOAD VIRUS". (See "Fortress".) > >All computers are connected. You can access the information on someone's >desktop computer even if it's turned off. > >Powerful computers beep whenever you press a key or the screen changes. >Some computers also slow down the output on the screen so that it doesn't >go faster than you can read. (Really advanced computers will also emulate >the sound of a dot-matrix printer.) > >All computer panels operate on thousands of volts and have explosive >devices underneath their surface. Malfunctions are indicated by a bright >flash of light, a puff of smoke, a shower of sparks and an explosion that >causes you to jump backwards. > >People typing on a computer can safely turn it off without saving the data. > >A hacker is always able to break into the most sensitive computer in the >world by guessing the secret password in two tries. > >You may bypass "PERMISSION DENIED" message by using the "OVERRIDE" >function. (See "Demolition Man".) > >Computers only take 2 seconds to boot up. > >Complex calculations and loading of huge amounts of data will be >accomplished in under three seconds. Movie modems usually appear to >transmit data at the speed of two gigabytes per second. > >When the power plant/missile site/main computer overheats, all control >panels will explode shortly before the entire building will. > >If you display a file on the screen and someone deletes the file, it also >disappears from the screen (See "Clear and Present Danger"). > >If a disk contains encrypted files, you are automatically asked for a >password when you insert it. > >Computers can interface with any other computer regardless of the >manufacturer or galaxy where it originated. (See "Independence Day".) > >Computer disks will work on any computer has a floppy drive and all >software is usable on any platforms. > >The more high-tech the equipment, the more buttons it will have. (See >"Aliens".) > >Note: You must be highly trained to operate high-tech computers because the >buttons have no labels except for the "SELF-DESTRUCT" button. > >Most computers, no matter how small, have three-dimensional active >animation, photo-realistic graphics capabilities. > >Laptops always have amazing real-time video phone capabilities and >performance similar to a CRAY Supercomputer. > >Whenever a character looks at a monitor, the image is so bright that it >projects itself onto their face. (See "Alien" or "2001".) > >Searches on the internet will always return what you are looking for no >matter how vague your keywords are. (See "Mission Impossible", Tom Cruise >searches with keywords like "file" and "computer" and 3 results are >returned.) > > >_______________________________ >David Alexander M.INSTIS >Global Infrastructure Director >Bookham Technology plc >Tel: +44 (0) 1327 356264 >Mobile: +44 (0) 7799 881284 >Fax: +44 (0) 1327 356775 >http://www.bookham.com > > > >======================================================================= >This e-mail is intended for the person it is addressed to only. The >information contained in it may be confidential and/or protected by >law. If you are not the intended recipient of this message, you must >not make any use of this information, or copy or show it to any >person. Please contact us immediately to tell us that you have >received this e-mail, and return the original to us. Any use, >forwarding, printing or copying of this message is strictly prohibited. >No part of this message can be considered a request for goods or >services. >======================================================================= >Any questions about Bookham's E-Mail service should be directed to >postmaster@b.... > > > >[Non-text portions of this message have been removed] > _________________________________________________________________ Protect your PC - get McAfee.com VirusScan Online http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6592 From: James M. Atkinson Date: Fri Nov 29, 2002 2:29pm Subject: The School of Juvenile Espionage and Sex Bombs for Russian Soldiers http://english.pravda.ru/society/2002/11/27/40030.html 16:32 2002-11-27 The School of Juvenile Espionage and Sex Bombs for Russian Soldiers German intelligence used kids for their purposes in WWI Crowds of homeless boys and girls gathered at railway stations, marketplaces, and especially around Russian military units back in 1914. There were a lot of those ragged little children everywhere around. There was nothing surprising about that, since it was the time, when the war was getting started. However, the sneaky ability of those poor human creatures was really something special. Russian counter-intelligence officers detained agent Leonard Rembitsky around the deployment of a military unit. Mr.Rembitsky told a long and a detailed story. He told intelligence officers, how the Germans forced him to become their agent in order to spy in the Russian rear. He was given a task to find out the information pertaining to the Russian artillery troops, and about food prices in the city of Riga. After being forced to become a German spy, Rembitsky had to go to a spy school in Warsaw. Leonard Rembitsky was only 12 years at the moment, when he was nabbed. The school of juvenile spies, from where a young James Bond came from, counted 72 boys and 300 girls as well as several grownup girls. All of them were enlisted contrary to their own will. When Russian intelligence officers were listening to Leonard Rembitskyís story, no one of them had a wish to smile. Everything was more than just serious. The Germans made little spies execute all their goals and tasks strictly. As a guarantee, the Germans arrested childrenís parents or close relatives. They threatened to shoot them, in case of childrenís decision to run away or not to do what they were ordered to do. When small children were given tasks to fulfil, they were also given money for that: 15 rubles for boys and 20 rubles for girls. No documents were given to them. Spy boys were dressed in black school coats with white buttons or short black jackets, black boots, gray shirts, gray pants. Spy girls used to wear black coats, black dresses, black boots, everything was black and gray, to put it shortly. After spy children finished their ìschool education,î they were attached to various military units of the Russian troops. A troop number was their passwords to return from a task. Under the disguise of refugees, spy kids could get deep into the rear of the country and collect a lot of information that was extremely valuable for Germany. As a rule, soldiers missed their families, so they were happy to get a homeless girl or a homeless boy in their detachment. Soldiers treated them like their own kids. No one of them could ever guess that those little children could blow up trains and bridges. Little ìangels of deathî organized fires at defense factories and warehouses, they would blow up trains, throwing bombs in ovens. Needless to mention, that they were conducting very active military espionage. The women, who worked for intelligence services, were basically prostitutes. As a rule, the Germans selected gorgeous, slim and interesting women for their espionage purposes. There were a couple of special spy schools in Warsaw. One of them trained both men and women. Basically all spy women had an experience of prostitution in their lives. The Germans would send them to the rear of the Russian army, making them use that experience. Yet, beautiful girls and lovely children were not all that the German intelligence used in 1915 against the Russian soldiers. Various charitable and commercial organizations attempted to obtain an access to the rear too. There was an organization that rendered financial help to German captives in Siberia, simultaneously establishing contacts with them. There was a special bureau organized in China. The bureau helped German war prisoners to escape to China, where they were later provided with the passports of neutral countries. In China, the German intelligence set up an organization that would provide Austrian and German spies with fake documents. The documents were produced in Shanghai. Another spy organization that operated during WWI particularly ìworkedî in the field of commerce. It was established in 1908 and by the year 1915 it embraced the whole of Russia. The so-called ìcompanyî looked like an organization of the German kind. It had its offices in Riga, Warsaw, Kiev, Odessa, Rostov-on-Don, and at Russiaís huge Nizhni Novgorod Fair. All responsible positions in that company were taken by Germans. A companyís ìspokespeopleî were sent to a Russian region. They had maps with them, on which they would mark new railways, bridges and other important objects. When they came back from their ìbusiness trips,î they would write special reports and then send the entire spy material to Berlin. A group of spies like that was detained in April of 1915. They were all German women. Economic research was the most convenient form of espionage. A senior official of the Nizhni Novgorod Fair Sergey Speransky was caught writing letters for the Copenhagen organization called Studying the Society in the Wartime. This was another organization that worked for Germany. Sergey Speransky provided the organization with detailed information about the economic activity of one of the largest trade fairs in Russia. Of course, this is not the complete list of foreign spy ruses that was used during WWI. For instance, German and Austrian special services used special conditional characters in their written correspondence. Those specific characters would be used in postcards, letters, telegrams and even on luggage labels. A.Osipov Candidate of philosophy science, N.Rezontova, editor-in-chief of NTA Privolzhye -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6593 From: kondrak Date: Fri Nov 29, 2002 4:11pm Subject: Company admits it sold illegal audio bugs > > >The following article is highly interesting for the constitutional >issues involved. A discussion of some of those issues follows the >article. > >------ > >Company admits it sold illegal audio bugs >Customs Service says hidden microphones violate privacy laws. > >By Cara Anna >AMERICAN-STATESMAN STAFF >Thursday, November 28, 2002 >http://www.austin360.com/auto_docs/epaper/editions/thursday/business_4.html > >A Liberty Hill company that specializes in spy-like gadgets has admitted >to illegally selling audio eavesdropping devices, ending a three-year >investigation by the U.S. Customs Service. > >Supercircuits Inc. was found to be selling smoke detectors, clock radios >and hundreds of other household items that contained tiny video cameras >with microphones. On Wednesday, the company agreed to a punishment that >could include five years in prison for executives and a fine of no more >than $500,000. > >Vincent Klink, the Customs Service agent in charge in Austin, said >Supercircuits might get a year's probation and pay a fine of about >$250,000. A sentencing date will be set in the next month or two. > >"There's a huge privacy issue involved here," Klink said. Even law >enforcement -- itself a big Supercircuits client -- has to get >permission from a federal judge to use eavesdropping devices, he said. > >"This case is significant because of the volume of sales Supercircuits >does," Klink added. "They're definitely among the largest companies in >the world in this area." > >Supercircuits, founded in 1989, grew from a small mail-order >surveillance camera business to one with sales of about $20 million last >year. The company has said its sales grow by about 50 percent a year. > >When the company recently moved to Liberty Hill from Leander, owner and >founder Steven Klindworth paid for the 15 acres and a 18,000-square-foot >plant in cash. > >Supercircuits' tiny cameras are tucked into clothing, buttons and other >items. The company made the 2002 Guinness Book of World Records for >making a color video camera the size of a sugar cube. > >But it was the mini-microphones that got the Customs Service going. >After noticing the eavesdropping products in a Supercircuits catalog, >agents seized about 650 devices during a raid in late 1999. > >The audio quality of the devices "was as good as you and I talking right >now," Klink said during a non-cellular telephone call. > >The Customs Service continues to investigate the buyers of the thousands >of eavesdropping products Supercircuits sold. The more than 100 groups, >which include hotels, lawyers, news organizations and schools, could >face charges for owning the products, Klink said. "There's no one >local," he added. > >Foreign governments bought the items, but the Customs Service is only >looking at U.S.-based groups, Klink said. > >Klindworth said in a statement that at the time the company didn't know >it was illegal to sell such items to the public. > >"Supercircuits is a law-abiding company," Klindworth said. "In fact, >nearly half of our sales are to law enforcement and military agencies. >... Supercircuits deeply regrets its actions." > >The sales of the products represented 2.4 percent of the company's >sales, Klindworth said. > >Klink said the eavesdropping devices will be destroyed once >Supercircuits is sentenced. > >canna@s...; 445-3639 > >------ > >Constitutional commentary on the above article > >The provisions of the United States Code that are the basis for the >charges in this case are 18 USC Ch. 119, online at >http://www4.law.cornell.edu/uscode/18/pIch119.html . The key provision >is 18 USC 2512 which states in part: > >(1) Except as otherwise specifically provided in this chapter, any >person who intentionally - > >... > > (b) manufactures, assembles, possesses, or sells any electronic, > mechanical, or other device, knowing or having reason to know that > the design of such device renders it primarily useful for the > purpose of the surreptitious interception of wire, oral, or > electronic communications, and that such device or any component > thereof has been or will be sent through the mail or transported in > interstate or foreign commerce; ... > >... shall be fined under this title or imprisoned not more than five >years, or both. > >------ > >The authority cited for the statutes that are the basis for these >provisions of the USC is the Commerce Clause, on the theory that >interception of communications has a "substantial effect" on interstate >or foreign commerce. This doctrine is based on the decision in Wickard >v. Filmore, 317 US 111, which was wrongly decided. For a more complete >discussion of why this is so, see "Original Understanding of the >Commerce Clause", Jon Roland, July 29, 2002, at >http://www.constitution.org/col/02729_fed- usurp.htm . Also see >http://www.bu.edu/rbarnett/Original.htm , >http://www.constitution.org/lrev/bork-troy.htm , >http://www.constitution.org/becraft/interstatecommerce.htm , and >http://www.constitution.org/becraft/limits1.htm . > > >Essentially, there is no constitutional authority under the Commerce >Clause to do more than prohibit some, but not all, modalities of >tangible commodities the ownership and possession of which are >transferred from a party in one state or nation to a party in another >state. That does not include services, or manufacture, intrastate sale, >possession, or use of anything whatsoever, except on the territory of >federal enclaves created under Art. I Sec. 8 Cl. 17 of the U.S. >Constitution, such as the District of Columbia and some federal >facilities like military bases, federal courthouses, arsenals, >dockyards, etc. For more on this see Jurisdiction over Federal Areas >within the States ≠ Report of the Interdepartmental Committee for the >Study of Jurisdiction over Federal Areas within the States (1956), at >http://www.constitution.org/juris/fjur/fj0-0000.htm , and also >http://www.constitution.org/juris/fedjur1.htm . > >Even if the statutes were not unconstitutional, however, there are >constitutional problems with how they are worded. The key problem is >with the phrase "the design of such device renders it primarily useful >for the purpose of the surreptitious interception of wire, oral, or >electronic communications". Who is to decide what a design is "primarily >useful" for? Evidently, it is left to the discretion of the federal >agents and courts. The code seems to make an exception for cellphones >and hearing aids, but not for the portable wireless microphones used >every day by stage performers, or as part of camcorders, or as >accessories to every kind of 2-way radio, the designs of all of which >are technologically indistinguishable from the devices for this >prosecution was brought. Indeed, almost all of them were designed to be >components of camcorders, and their primary purpose is to be replacement >parts for the repair of camcorders. > >There is also a problem with the definition of "interception of oral >communication" that is prohibited: > > 18 USC 2510(2) "oral communication" means any oral communication > uttered by a person exhibiting an expectation that such > communication is not subject to interception under circumstances > justifying such expectation.... > >In other words, the discretion is not only about what the device is >"primarily useful" for, but about what constitutes persons "exhibiting >an expectation" of privacy. The language of this code deserves to be >ruled unconstitutional as "void for vagueness", among other reasons. > >The fact is that the primary uses of such devices is not for the >surreptitious interception of oral communications where the speaker has >an expectation of privacy. If the statistics of actual use are an >indication of design purpose, then these devices do not satisfy the >definition. > >The spurious character of the charge is also indicated by the economic >fact that surreptitious use is not a large enough market to justify the >cost of development of such devices. As said before, they are almost all >components of other systems like camcorders. If camcorders are >prohibited by the code, then a substantial proportion of the American >public are federal felons. > >The accused in this case undoubtedly made a plea bargain under threat of >prosecution. That is unfortunate, because the case against them is >without merit, and someone needs to fight the charges in court as far as >is needed to get the statute struck down. > >The code makes several references to exceptions for persons "authorized" >to conduct criminal investigations, but the fact is that unless a >criminal statute makes an exception for who may enforce it, anyone may, >and that means anyone may conduct criminal inverstigations. Most >statutes on felonies and more serious misdemeanors, both state and >federal, make no exceptions, are are enforceable by anyone. That makes >criminal investigation by civilians a defense against prosecution under >this code. > >Of course, this prosecution indicates the ulterior purpose of the >federal government, which is to deprive citizens of the means to >investigate criminal wrongdoing on the part of federal agents, which is >so intense and pervasive as to qualify the federal government as a >criminal enterprise, and almost all of its agents as accomplices. > >It is all futile, of course. There is no way to stop the trade in such >devices. All anyone has to do is salvage them as parts from no longer >working camcorders. 6594 From: Steve Uhrig Date: Fri Nov 29, 2002 4:39pm Subject: Company admits it sold illegal audio bugs On 29 Nov 2002 at 17:11, kondrak wrote: > Supercircuits Inc. was found to be selling smoke detectors, clock > radios and hundreds of other household items that contained tiny video > cameras with microphones. On Wednesday, the company agreed to a > punishment that could include five years in prison for executives and a > fine of no more than $500,000. > Klindworth said in a statement that at the time the company didn't know > it was illegal to sell such items to the public. If he didn't know it was illegal, why did he include an impotent disclaimer in his catalog all these years? ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6595 From: kondrak Date: Fri Nov 29, 2002 7:08pm Subject: No Surprise : > >Weapons inspectors fear their HQ may be bugged > >Brian Whitaker in Cairo and agencies >Friday November 29, 2002 >The Guardian > >On the second day of the hunt for illicit weapons in Iraq, UN inspectors >again found Iraqi officials well-prepared for their "surprise" visits. > >In response to fears that the inspectors' Baghdad headquarters may be >bugged, UN sources said yesterday that the building will be checked with >sweeping devices over the weekend. > >"The problem is that nobody knows if the facility is compromised," the >source said. > >One team - which included at least six biological experts - was >immediately allowed into a laboratory at al-Dawrah on the outskirts of >Baghdad, while another quickly gained admission to a munitions factory >at Taji, north of the capital. > >On Wednesday, a UN team found factory management waiting to greet them >at the military-industrial Tahidi plant. > >The inspectors have been anxious to keep their destinations secret to >avoid giving the Iraqis time to remove anything from the suspect sites >as in previous inspections in the 1990s. > >Iraqi officials say this time their readiness is a sign of co-operation >and that sites likely to be inspected have been told to stand by for a >visit. > >At al-Dawrah, the inspectors also looked well-prepared, ticking off >items on clipboards as they looked over tanks, pipes and other fixtures. > >Steel doors were opened in small, concrete-block outbuildings and one >inspector, wearing jeans, climbed to the top of a 20ft tank, peered >inside and nodded to a colleague below. The team then disappeared from >view and left after four hours. > >The site, officially known as the Foot and Mouth Disease Vaccine >Production Laboratory, produced botulinum toxin - which kills by >paralysis and suffocation - in the 1980s, but during previous >inspections the UN destroyed much of its equipment. > >After yesterday's inspection Iraqi officials allowed journalists into >the site. >"It is good cooperation," the former director, Montasser Omar Abdel >Aziz, said. He added that the inspectors had taken swabs from an air >filtration system, tanks and other fixtures. > >Asked why the UN might suspect illicit activities at al-Dawrah, he >replied: "You can see, enter inside and see ... Nobody can do anything >here." > >The darkened rooms of the compound's main building were strewn with >mangled equipment, piles of paper, boxes of dusty books and other >debris. > >A second team of inspectors yesterday went to the industry ministry's >al-Nasr ("Victory") complex at Taji. > >Iraqi guards stood at the entrance of the large site where a large >picture of Saddam Hussein rose over the main gate. A UN helicopter >hovered overhead as the inspectors began work inside. > >In the past, al-Nasr produced "special munitions", particularly bombs >that were believed to hold chemical agents. >The complex also formerly extended the range of Scud missiles imported >from the former Soviet Union. > >The director of the ammunition plant told reporters that its work was >legitimate and did not breach any UN resolutions. > >Both sites inspected yesterday had been mentioned by the United States >in recent months as suspected of producing banned weapons. > >UN inspectors pulled out of Baghdad in 1998 after seven years' effort to >disarm Iraq of weapons of mass destruction and to remove its capacity to >make them. > >A series of clashes with Iraqi officials culminated in a row over the >inspection of "presidential sites" - which Iraq viewed as an >infringement of its sovereignty. > >This time, armed with the implicit threat of an American-led invasion if >President Saddam fails to cooperate, the inspectors say they will >tolerate no prevarication. > >There are currently 17 inspectors in Baghdad, though their number is >expected to reach 100 around Christmas. > >Guardian Unlimited © Guardian Newspapers Limited 2002 6596 From: James M. Atkinson Date: Fri Nov 29, 2002 7:46pm Subject: Slap and Tickle U.N. Weapons Inspector - I [Most unfortunate] SADDAMASOCHIST http://nypost.com/news/worldnews/51175.htm November 29, 2002 -- A U.N. weapons inspector with a penchant for S&M and leather may be a little too pushy for the Baghdad-bound arms-probe team. Harvey John "Jack" McGeorge, of Woodbridge, Va., was set to travel to Iraq as part of a team monitoring Saddam Hussein's arms cache. But the former Secret Service specialist now says he will quit after revelations that he had a leadership role in several sadomasochistic sex clubs. McGeorge is co-founder of Black Rose, a Washington-area pansexual S&M group that offers a forum for "different expressions of power in love and play," including "bondage and discipline, fetishism and cross-dressing." The chubby 53-year-old former chairman of the board at the National Coalition for Sexual Freedom was recommended for the Iraq inspection team by the State Department. While it was unclear whether his experience in dominance and submission might be useful in probing Saddam's arsenal, his group's Web site listed a number of salty approaches for "coming on to the person you want to know." McGeorge, who was picked for the Iraq mission over some of the most experienced disarmament sleuths in the world, was said to be in New York preparing for his first scheduled trip to Iraq. But as news of his peculiar private life became public knowledge, McGeorge was nowhere to be found. "I have really no clue where he is at this time," said someone who answered the phone at his Virginia home. McGeorge, who worked for the Secret Service in the 1980s, was also founder of the Leather Leadership Conference, whose Web site claims to produce "training sessions for current and potential leaders of the sadomasochism/leather/fetish community." He told The Washington Post he would resign if the newspaper revealed his eccentric sexual history, but it was not immediately clear whether he had done so. U.N. officials did not return calls yesterday. Several S&M Web sites describe McGeorge's bizarre training seminars, which involve acts conducted with knives and ropes. McGeorge served for several years as a Marine munitions technician and weapons expert for the Secret Service. The United Nations said it had not conducted a background check on McGeorge, who has no specialized scientific degree. Former inspectors said the new team assembled by Hans Blix, which began its weapons search on Wednesday, lacked experience and expertise and was chosen in part to avoid offending Iraq. In an interview with The Washington Post, McGeorge said he was not ashamed of his actions but would act to save the United Nations from embarrassment. "I have been very upfront with people in the past about what I do, and it has never prevented me from getting a job or doing service," he told The Washington Post. "I am who I am. I am not ashamed of who I am - not one bit. But I cannot allow my actions, as they may be perceived by others, to damage an organization which has done nothing to deserve that damage." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6597 From: James M. Atkinson Date: Fri Nov 29, 2002 7:46pm Subject: Slap and Tickle U.N. Weapons Inspector - II [Most unfortunate] http://www.washingtonpost.com/wp-dyn/articles/A48596-2002Nov27.html http://www.Leatheru.com/ Weapons Inspectors' Experience Questioned Va. Man Is Cited As Example; Hiring Process Criticized By James V. Grimaldi Washington Post Staff Writer Thursday, November 28, 2002; Page A01 The United Nations launched perhaps its most important weapons inspections ever yesterday with a team that includes a 53-year-old Virginia man with no specialized scientific degree and a leadership role in sadomasochistic sex clubs. The United Nations acknowledged yesterday that it did not conduct a background check on Harvey John "Jack" McGeorge of Woodbridge, who was in New York waiting to be sent to Iraq as a munitions analyst. McGeorge was picked for the diplomatically sensitive mission over some of the most experienced disarmament sleuths in the world. A U.N. spokesman said McGeorge was part of a group recommended by the State Department, which in turn said it was merely forwarding names for consideration. The disclosures about McGeorge's qualifications come as concerns are being raised among some former U.N. weapons inspectors that the current team lacks experience. The former inspectors, who worked for the United Nations Special Commission created after the Persian Gulf War, say the new inspectors have been selected in part to avoid offending Iraq. These critics say that Hans Blix, the executive chairman of the U.N. Monitoring, Verification and Inspection Commission (UNMOVIC), is bypassing some experienced inspectors because they were opposed by Iraq as too aggressive in the earlier inspections. Former inspectors also say that rules requiring applicants to quit their government jobs meant that some of the best-qualified experts did not apply, leaving many positions to be filled by applicants, such as McGeorge, from the private sector. The former inspectors also say the current inspection team lacks the size, mobility and equipment to do its job adequately, and that the new U.N. policy of not sharing information with intelligence agencies could further handicap the team's ability to find weapons sites. U.N. officials defended their team of inspectors, saying that they are highly qualified and among the best in the field. But they acknowledged that they conducted no background checks. "As the United Nations, with people applying from many countries, we do not have the capability to do that," said Ewen Buchanan, a spokesman for UNMOVIC. "How would you check?" McGeorge is a former Marine and Secret Service specialist who offers seminars on "weaponization of chemical and biological agents" for $595 a session. Since 1983, he has been president of his own firm, Public Safety Group Inc., which sells bioterror products to governments. One online ad promotes his role as a "certified United Nations Weapons inspector." McGeorge does not possess a degree in one of the specialized fields -- such as biochemistry, bacteriology or chemical engineering -- that the United Nations says it seeks in its inspectors. U.S. and U.N. officials said a background check apparently was not conducted on McGeorge or any of the inspector applicants. An Internet search of open Web sites conducted by The Washington Post found that McGeorge is the co-founder and past president of Black Rose, a Washington-area pansexual S&M group, and the former chairman of the board of the National Coalition for Sexual Freedom. He is also a founding officer of the Leather Leadership Conference Inc., which "produces training sessions for current and potential leaders of the sadomasochism/leather/fetish community," according to its Web site. Several Web sites describe McGeorge's training seminars, which involve various acts conducted with knives and ropes. McGeorge said yesterday that a State Department official invited him to apply for the U.N. team, and officials at State and the United Nations did not ask about his S&M background. But he said he would tender his resignation to Blix if The Post printed a story about it. "I have been very upfront with people in the past about what I do, and it has never prevented me from getting a job or doing service," McGeorge said. "I am who I am. I am not ashamed of who I am -- not one bit. But I cannot allow my actions, as they may be perceived by others, to damage an organization which has done nothing to deserve that damage." A State Department official said that the Bureau of Nonproliferation collected rÈsumÈs from potential UNMOVIC candidates and then passed along, without recommendation, those who appeared to meet the general criteria of the jobs. However, the official said he believes that background checks were not conducted before the rÈsumÈs were forwarded. Half the 100 inspectors picked so far were recommended by governments, and the other half applied directly to the United Nations. Buchanan added that the United Nations considers McGeorge's private life irrelevant to his role as a munitions analyst. "I believe that Mr. McGeorge is technically very competent," Buchanan said. "He knows his subject, which is weapons. As a general principle, I think what people do in their private life, as long as it doesn't interfere with [their] professional life -- and I'm not aware that it has interfered -- or doesn't break any rules or laws, shouldn't be a significant issue." Interviewed by telephone, McGeorge defended his training and experience. "I was a military ordnance explosive disposal specialist," McGeorge said. "I was very well trained on chemical and biological agents." McGeorge's rÈsumÈ indicates that he trained as an inspector with UNMOVIC in February 2001 in Vienna. He said he was interviewed in person by Blix and joined the team as a temporary staff member in December 2001. McGeorge's professional background reveals he served for a few years each as a Marine ordnance disposal technician and a munitions countermeasures specialist with the Secret Service, both stints occurring more than 20 years ago. On his rÈsumÈ, McGeorge lists an honorary doctorate from a Russian institute in Moscow. McGeorge received an associate's degree in security management from Northern Virginia Community College in 1983. He also lists numerous articles on chemical and biological weapons in such publications as Defense and Foreign Affairs and NBC Defense & Technology International. One of his most cited achievements is preparing, under contract with the federal government, a compendium of incidents involving biological and chemical agents dating back to the 1940s. Past weapons inspectors have criticized the selection of inspectors, saying experienced candidates, including former missile inspector Timothy V. McCarthy, were passed over. The critics say the new team needs seasoning if it is to find minute evidence of weapons-making in a country the size of Texas. "We just knew too much," said Richard Spertzel, former head of the biological weapons inspection team for the U.N. Special Commission on Iraq. "They couldn't pull the wool over our eyes." The two renowned experts retained, Igor Mitrokhin and Nikita Smidovich, will not be conducting field inspections. Mitrokhin, a respected Russian chemical weapons expert, has been named the chief of the agency's health and safety division. Smidovich, a Russian missile expert whose encyclopedic knowledge of Iraq's missile program has long made him unpopular in Iraq, has been appointed head of inspector training. Smidovich said during a break at recent training session that although there is a "new culture" at UNMOVIC, the agency still has "very tough inspectors." He said that the less experienced inspectors can learn everything they need to know from a massive archive that includes a recording of virtually every meeting with the Iraqis. "We have it all on tape," he said. Blix defended the abilities of the new inspectors, saying that his chief inspector, Demetrius Perricos, "probably has the greatest experience in the world." "He has 30 years of inspections behind him," he added. "He handled the whole North Korea business in the IAEA [International Atomic Energy Agency]; he was in Iraq in the beginning of the '90s; he was in South Africa and handled the verification of the disarming of their nuclear weapons." A U.N. Security Council diplomat said that Washington wants to increase the number of inspections and double the size of the inspection team's roster, which now consists of 300 people. The Bush administration has been pressing UNMOVIC to move up the date of the next scheduled training session from January to December. One council official said that Blix was likely to begin "a sort of worldwide trawl" for new inspectors. Another council diplomat acknowledged the new inspection agency lacks the experience of its predecessor and that it will take time to reach full speed. "A lot of the inspectors are inexperienced, and it's a matter of not trying to push UNMOVIC to run before it can walk," said a council member. Former inspectors also were concerned about reports that members of the current UNMOVIC team work in the private sector and might have products to sell. A stint on a U.N. inspections team can boost an inspector's profile, bringing media attention and lucrative business opportunities, as some of the former inspectors found. One current inspector works for a company developing a sensor to detect biological substances, such as anthrax spores. "I don't know of any technology out there for biology that you could wave over and say this is a bad building," said former inspector and biological warfare expert David Franz. Correspondent Column Lynch and researcher Alice Crites also contributed to this report. © 2002 The Washington Post Company -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6598 From: Steve Uhrig Date: Fri Nov 29, 2002 8:36pm Subject: Slap and Tickle U.N. Weapons Inspector On 29 Nov 2002 at 20:46, James M. Atkinson wrote: > November 29, 2002 -- A U.N. weapons inspector with a penchant for S&M > and leather may be a little too pushy for the Baghdad-bound arms-probe > team. Harvey John "Jack" McGeorge, of Woodbridge, Va., was set to > travel to Iraq as part of a team monitoring Saddam Hussein's arms > cache. Many of the people who have been around for a while remember Jack and his antics from MGM Security. This is not surprising. Nothing would be surprising from him. He has been around for nearly as long as anyone though. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6599 From: James M. Atkinson Date: Fri Nov 29, 2002 10:06pm Subject: A Truck Driver A truck driver used to amuse himself by running over lawyers he would see walking down the side of the road. Every time he would see a lawyer walking along the road, he would swerve to hit him, and there would be a loud "THUMP" and then he would swerve back on the road. One day, as the truck driver was driving along he saw a priest hitchhiking. He thought he would do a good turn and pulled the truck over. He asked the priest, "Where are you going, Father?". "I'm going to the church 5 miles down the road," replied the priest. "No problem, Father! I'll give you a lift. Climb in the truck." The happy priest climbed into the passenger seat and the truck driver continued down the road. Suddenly the truck driver saw a lawyer walking down the road and instinctively he swerved to hit him. But then he remembered there was a priest in the truck with him, so at the last minute he swerved back to the road, narrowly missing the lawyer. Even though he was certain he missed the lawyer, he still heard a loud "THUD." Not understanding where the noise came from he glanced in his mirrors and when he didn't see anything, he turned to the priest and said, "I'm sorry Father. I almost hit that lawyer." "That's okay," replied the priest. "I got him with the door." -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6600 From: Matt Paulsen Date: Fri Nov 29, 2002 10:03pm Subject: SSO / crypto/ autoauth solution I'm looking for a locality-based wireless (NOT requiring a specific type of wireless, but should be able to get through metal enclosures) authentication 'system' (the wireless doesn't have to be secure) with an effective radius of a few feet which can be tied to a fob (of an ounce or three in weight which will be attached to existing security fobs - will get a lot of physical abuse which must be covered by the same type of warranty as a swipe badge would be, should stand up to being slapped against walls, etc., over a few years) on one side and stored inside a metal enclosure on the other side which will detect when the fob is within the short radius and log events/allow the first level of authentication to the 'system' to occur. The 'system' will need to use a pin code for this component which is ID'd to the two devices, and given to the authorized user to use. Secondly, the 'system' will be tied to other authentication and crypto systems and should not interfere with these systems. Third, the 'system' needs to interface with and be manageable with generally accepted technologies such as active directory/NDS/domains/TACACS+ / RADIUS, etc. and have extensive reporting and auditing capabilities over openly acceptable protocols yet be signed and encrypted using two PGP keys and a secure communications protocol over which all communications will occur - this will be sniffed for authenticity to ensure that it is secured. Fourth, the 'system' must interface with HP Openview and will get bonus points for being a HP Openview certified reporting device. Fifth, multiple master override pins will have to be storable in all the fobs for security and administration and facilities to bypass the security controls on the single fobs. Sixth, the fob and internal device should have a multi-year battery life and be self-sealed and will terminate authentication if opened. For those that have such a solution, email me directly at this email - mpaulsen@a..., and if you screen past, we'll move on to the customer. I'll need around 1000 devices, a server system, reporting system and automated intrusion analysis coverage for it. This isn't going to be a quick sale but the right solution will begin getting sales shortly for testing purposes, and I will order around 1000 over the next few years and additional after that at an estimated 20% maintenance plan every year thereafter. Thanks, Matt 6601 From: Matt Paulsen Date: Fri Nov 29, 2002 10:04pm Subject: It's official Heaven uses macintosh, so much for linux and Microsoft (we all know where that was made...) Just saw it on the Muppet christmas special on NBC 6602 From: kondrak Date: Sat Nov 30, 2002 3:51am Subject: Re: It's official MMmm...share some of that stuff youre smokin, Heaven runs Linux...believe me... At 20:04 11/29/02 -0800, you wrote: >Heaven uses macintosh, so much for linux and Microsoft (we all know where >that was made...) Just saw it on the Muppet christmas special on NBC From: Jim Conrad Date: Sun Nov 25, 2001 0:55am Subject: FS: AT&T Hostage Phone & Microwave Antenna One last time on the Hostage Phone .. No Reserve and the price was reduced; For any Organization that might have the need to deal with a Hostage or Barricade situation I have for sale on Ebay an AT&T Hostage phone. I have checked out the basic functions and it appears to work OK. Only deficiency that I could find is the rechargeable batteries would not hold a charge. http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=1037432568 If you need a compact wideband circular polarized microwave antenna for sweeps this is it; http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=1668702179 Feel free to email any questions to me privately. Thanks .. Jim <:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:> Jim Conrad - jjc@o... or jimc1790@a... (backup) 757-560-5970 Office/Voicemail/Pager - 757-587-8251 Fax CAGE 0UD60 - http://www.oceanviewcom.com/ 4203 From: Shawn Hughes Date: Sun Nov 25, 2001 1:28pm Subject: Re: 'sploding batteries >The commerce ministry will inquire into a complaint >made by a mobile phone user about the explosion of his handset (voice of shopkeeps' assistant): "Oops, I just give Bin Ladens' new battery to that guy. Oh, well, what could possibly happen?" 4204 From: Shawn Hughes Date: Sun Nov 25, 2001 1:37pm Subject: Re: Digest Number 778 At 05:56 AM 11/25/01 , you wrote: >One idea was a cellphone bomb that utilized a replacement battery component Matt, These devices already exist. Most recently, a senior bombmaker was poofed in a middle eastern country with one. Gives a whole new dimension to' Reach out and touch somebody', doesn't it? Shawn 4205 From: Aimee Farr Date: Mon Nov 26, 2001 1:02pm Subject: Criminal Warfare http://pro.harvard.edu/papers/005/005002MuellerJoh.pdf Link to a thought-provoking paper, dated August of this year. You "warrior-philosopher" types will like it (although you may not agree with it), as will those associated with government service. Squarely researched. ~Aimee 4206 From: William Knowles Date: Mon Nov 26, 2001 8:07pm Subject: Re: Digest Number 778 On Sun, 25 Nov 2001, Shawn Hughes wrote: > At 05:56 AM 11/25/01 , you wrote: > >One idea was a cellphone bomb that utilized a replacement battery component > > These devices already exist. Most recently, a senior bombmaker was > poofed in a middle eastern country with one. Gives a whole new > dimension to' Reach out and touch somebody', doesn't it? The party you're thinking of known as the "The Engineer" His real name was Yahya Ayyash and when his old cell phone stopped working, his uncle gave him another one, which on January 6th, 1996 blew up taking most of his head with it. His uncle since disappeared. - WK *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 4207 From: Aimee Farr Date: Tue Nov 27, 2001 11:17am Subject: Anti-leak paper. A tack-on to recent leak discussions. http://www.georgetown.edu/sfs/programs/nssp/nssq/Hurt.pdf Leaking National Security Secrets: Effects on Security and Measures to Mitigate Michael Hurt National Security Studies Quarterly Volume VII, Issue 4 (Autumn 2001). The focus is on foreign Denial & Deception, and mentions the role of surveillance technologies. ---- While the First Amendment is weighty, so are new developments: nontraditional media, infomarkets, and the increasing use of hostile techniques ("spyactivism"). I appreciate private pointers on this sort of material, because I don't think it's getting enough attention. (Quite an insult, considering the fact it implicates the lives of current/former intelligence officers.) ~Aimee 4208 From: Date: Tue Nov 27, 2001 1:43pm Subject: T.S. clearance. -----BEGIN PGP SIGNED MESSAGE----- I recently interviewed for a position that requires a top secret clearance. I am wondering if any listmembers can post to the list, or e.mail me, with links or info. as to what -exactly- is involved in the t.s. clearance process. I am concerned that I would lose too much privacy in this position, and I sort of want to know what I will be walking into. I know there must be a .gov or .mil page on it somewhere. Daemon7@h... Thank you. Erik. -----BEGIN PGP SIGNATURE----- Version: Hush 2.1 Note: This signature can be verified at https://www.hushtools.com wlwEARECABwFAjwD7IIVHGRhZW1vbjdAaHVzaG1haWwuY29tAAoJEIqGlhRaN0MTqHQA niLFpKRL/9GExZFWXbU4Ziarg2+7AKCPgsZ0OctRpoqDLCa4RH4cBvwq1g== =8rux -----END PGP SIGNATURE----- 4209 From: Scott Malcolm Date: Tue Nov 27, 2001 6:14pm Subject: Re: Digest Number 778 . Regards, Scott Malcolm Malcolm & Associates, Inc. Serving the State of Wisconsin http://www.execpc.com/~conf-pi Office 262 965 4426 / Fax 262 965 4629 4210 From: gkeenan Date: Tue Nov 27, 2001 7:05pm Subject: Re: T.S. clearance. Hi Erik, I don't know if there's a website for what you're looking for -- I doubt it, but I could be wrong. What will probably happen is that, if you're hired, you'll receive an "ITS" clearance -- Interim Top Secret. This will allow you access to your work spaces and you'll be able to perform your duties until the "FTS" is received (Final Top Secret). This can take 18 months or more -- in your case, depending on your age, whether you've served in the military, if you previously held a clearance, and many other factors will all come into play. The older you are, the longer it will take because they go back 10 or more years into your background. Frankly, if you're worried about privacy -- you better not take the job. They'll dig deeper than any credit check or even pre-employment background check will, or even can go. I held a TS clearance for 25 years (20 yrs active duty Navy, 5 years civil service as a local hire for Naval Security and Investigative Command). I also held special access for SCI (Sensitive Compartmented Information), SIOP-ESI (Single Integrated Operations Program-Extremely Sensitive Information), PRP (Personal Reliability Program; required because of my access to aircraft carrier nuclear battle plans), TICON (Tight CONtrol), PASSWORD, US/UK EYES ONLY, NATO TOP SECRET/COSMIC TOP SECRET/ATOMAL TOP SECRET, CODEWORD, and many others. A TS clearance is required to be updated every five years; this means an updated background investigation will be conducted every five years. When I was under investigation for my initial TS back in '64, they went back and went door-to-door interviewing people. These people included neighbors whose names, to this day, are unfamiliar to me and they went back to when I was only 10 years old (keeping in mind that I was 18 when I got my TS). As I progressed in my military/civil service careers, my 5 year updates included interviews not only with co-workers, but also friends and neighbors at my civilian addresses -- the vast majority of whom were foreign nationals. Of my 25 years of government service, I served 23 in Europe and lived on the local economy at all times -- never in military housing. I was also married to a foreign national for a time and, about 2 years after the divorce, was investigated for my SCI access. This required an SBI (Special Background Investigation) which began during my time as a student in San Diego (a 3 month Navy school which resulted in my 4th specialty code (NEC - Navy Enlisted Classification Code; just a different name for the MOS codes used by the Army/AF/Marines) as a telecommunications systems technician. But even though I'd just gone through a 5 year update for my TS, it took nearly 2 more years for me to receive my SCI access. You can imagine just how deep into my background they went for this one; considering how deep they go for a TS to begin with. They will interview, either by phone or in person, everyone you list in the "Personal History" form you'll have to fill out. This form will require (there are no 'optional' sections in this form -- which consists of about 10 pages and requires the addition of additional sheets where necessary; every section must be filled out completely) you to list your parents (whether still alive or not), your siblings, their spouses, their children, their children's spouses (if appropriate), their children. All your cousins (as far removed as you can remember) and their spouses, children, etc. All your teachers throughout school (grammar, high school and college) as far as you can remember. They will also ask about religious affiliation, and the contacts for your church (deacon, pastor, imam, rabbi, priest, whatever). You will also have to swear you are not, and have never been involved with a group (not necessarily a member, but simply involved) that was/is anti-government in any way. Failure to fill in any section of the Personal History form usually results in being canned and you wont' get the job; unless there's a very good reason why you didn't fill it in. Refusal to fill in any section of the form is grounds for automatic rejection for employment -- and though I have no proof of it, it can lead to an investigation anyway; especially following the Sept. 11 events. They'll want to know why you refused to answer; what have you got to hide? So they'll most likely look into you anyway. They will also dig very deeply into your financial records/situation. Though bankruptcy, for all intents and purposes, is erased from your record after 10 years in the civilian world, it will still reflect on you as far as a TS clearance is concerned -- no matter how long ago it was (15-20 years or more will still count for security purposes). Even juvenile records are taken into account -- whether it was stealing a candy bar from the corner shop -- or stealing cars for joy rides. They are all considered. They'll talk to former teachers/instructors/professors, church leaders, your friends (and, yes, they'll also talk to your friends' parents, siblings, and so on). When done properly, background checks for security clearances of TS, and subsequent special access programs, will turn up information on you that even you don't know about. And forget about getting a copy of it through the FOIA. I tried that -- several times. You wouldn't believe how much they'll delete from what is sent to you. Considering my initial investigation in '64, right through all the five year updates, the SBIs for the numerous special access programs and so on, all I was able to get my hands on via FOIA were something like 6 pages of information! And that covered 25 years! Plus what you do receive is also 'sanitized' (you know, the big black magic marker used to delete names, etc.). Not that it mattered, since I already had most of the information they wouldn't give me (including names and other info, like SSNs/service numbers) which I'd been able to obtain from other sources. There's much, much more of course. As you may have guessed, I served 20 years in the USN, plus an additional five in the Civil Service. In the latter part of my Navy career I assisted in background investigations on both US and British nationals, and for most of my civil service employment I was responsible for conducting background investigations on both US and British civilians for employment and clearance purposes prior to hiring by the US Navy in the United Kingdom, as well as investigations into security breaches, break-ins in offices containing classified material/information, and similar investigations in the US Navy HQ building in London (being the HQ for the Commander in Chief US Naval Forces Europe, virtually every office in that 8 storey building contained classified material) and we also assisted in some investigations at the US Embassy in London, which was right across the street from us on Grosvenor Square in W1 (the West End -- Mayfair, to be exact). Well, to cut it short -- if you are worried about privacy issues; don't take the job. Where clearances are concerned; there is no privacy. The gov't will end up knowing more about you than you know about yourself. And that's a fact. Jerry Keenan GPKeenan Co., Int'l Security Services West Islip, NY P.S. - If you need to know anything more about it, let me know. ----- Original Message ----- From: To: Sent: Tuesday, November 27, 2001 2:43 PM Subject: [TSCM-L] T.S. clearance. > > -----BEGIN PGP SIGNED MESSAGE----- > > I recently interviewed for a position that requires a top secret clearance. I am wondering if any listmembers can post to the list, or e.mail me, with links or info. as to what -exactly- is involved in the t.s. clearance process. I am concerned that I would lose too much privacy in this position, and I sort of want to know what I will be walking into. > > I know there must be a .gov or .mil page on it somewhere. > Daemon7@h... > Thank you. > Erik. > -----BEGIN PGP SIGNATURE----- > Version: Hush 2.1 > Note: This signature can be verified at https://www.hushtools.com > > wlwEARECABwFAjwD7IIVHGRhZW1vbjdAaHVzaG1haWwuY29tAAoJEIqGlhRaN0MTqHQA > niLFpKRL/9GExZFWXbU4Ziarg2+7AKCPgsZ0OctRpoqDLCa4RH4cBvwq1g== > =8rux > -----END PGP SIGNATURE----- > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 4211 From: Matthew Paulsen Date: Tue Nov 27, 2001 8:45pm Subject: RE: T.S. clearance. Here's the basics: http://www.lanl.gov/orgs/s/clearances/forms.shtml DSS also has good information: http://www.dss.mil So does DOE: http://www.energy.gov If you're a contract organization to a government system or service, you may fall under CONUS/OCONUS & NISPOM which in a nutshell means, you're not the one that has to figure it all out. You should talk with the company you interviewed with to determine the proper methods to establish your security clearance, and the company should already have information from the security manager at the facility(ies) you'll be interacting with to assist with this process which should include predefined information on what you're allowed to access and what not to. To my knowledge, there wouldn't be much benefit in filling out the 20 page papers and sending them in if you're not employed, since you're waiving many rights when you sign the papers (read it.. it's not happy go lucky paperwork) but you can always call and leave a message and not have it returned :). As Jerry said, be prepared to disclose everything you've ever done, ever. Even if you have expunged records, you must list them. Parking ticket? List it to be safe. If you've had financial problems, list them. Bad spouse issues? List... Psych exams.. list... If you've run over the neighbors cat, list it. You may take 1 or more polygraph exams in this process. And you may be denied either way. Long road, good luck. If you're wondering why a shining light in your throat shows up.. it's not the light at the end of the rainbow.... But anyways... -----Original Message----- From: gkeenan [mailto:gkeenan@s...] Sent: Tuesday, November 27, 2001 5:05 PM To: TSCM-L@yahoogroups.com; Daemon7@h... Subject: Re: [TSCM-L] T.S. clearance. Hi Erik, I don't know if there's a website for what you're looking for -- I doubt it, but I could be wrong. What will probably happen is that, if you're hired, you'll receive an "ITS" clearance -- Interim Top Secret. This will allow you access to your work spaces and you'll be able to perform your duties until the "FTS" is received (Final Top Secret). This can take 18 months or more -- in your case, depending on your age, whether you've served in the military, if you previously held a clearance, and many other factors will all come into play. The older you are, the longer it will take because they go back 10 or more years into your background. Frankly, if you're worried about privacy -- you better not take the job. They'll dig deeper than any credit check or even pre-employment background check will, or even can go. I held a TS clearance for 25 years (20 yrs active duty Navy, 5 years civil service as a local hire for Naval Security and Investigative Command). I also held special access for SCI (Sensitive Compartmented Information), SIOP-ESI (Single Integrated Operations Program-Extremely Sensitive Information), PRP (Personal Reliability Program; required because of my access to aircraft carrier nuclear battle plans), TICON (Tight CONtrol), PASSWORD, US/UK EYES ONLY, NATO TOP SECRET/COSMIC TOP SECRET/ATOMAL TOP SECRET, CODEWORD, and many others. A TS clearance is required to be updated every five years; this means an updated background investigation will be conducted every five years. When I was under investigation for my initial TS back in '64, they went back and went door-to-door interviewing people. These people included neighbors whose names, to this day, are unfamiliar to me and they went back to when I was only 10 years old (keeping in mind that I was 18 when I got my TS). As I progressed in my military/civil service careers, my 5 year updates included interviews not only with co-workers, but also friends and neighbors at my civilian addresses -- the vast majority of whom were foreign nationals. Of my 25 years of government service, I served 23 in Europe and lived on the local economy at all times -- never in military housing. I was also married to a foreign national for a time and, about 2 years after the divorce, was investigated for my SCI access. This required an SBI (Special Background Investigation) which began during my time as a student in San Diego (a 3 month Navy school which resulted in my 4th specialty code (NEC - Navy Enlisted Classification Code; just a different name for the MOS codes used by the Army/AF/Marines) as a telecommunications systems technician. But even though I'd just gone through a 5 year update for my TS, it took nearly 2 more years for me to receive my SCI access. You can imagine just how deep into my background they went for this one; considering how deep they go for a TS to begin with. They will interview, either by phone or in person, everyone you list in the "Personal History" form you'll have to fill out. This form will require (there are no 'optional' sections in this form -- which consists of about 10 pages and requires the addition of additional sheets where necessary; every section must be filled out completely) you to list your parents (whether still alive or not), your siblings, their spouses, their children, their children's spouses (if appropriate), their children. All your cousins (as far removed as you can remember) and their spouses, children, etc. All your teachers throughout school (grammar, high school and college) as far as you can remember. They will also ask about religious affiliation, and the contacts for your church (deacon, pastor, imam, rabbi, priest, whatever). You will also have to swear you are not, and have never been involved with a group (not necessarily a member, but simply involved) that was/is anti-government in any way. Failure to fill in any section of the Personal History form usually results in being canned and you wont' get the job; unless there's a very good reason why you didn't fill it in. Refusal to fill in any section of the form is grounds for automatic rejection for employment -- and though I have no proof of it, it can lead to an investigation anyway; especially following the Sept. 11 events. They'll want to know why you refused to answer; what have you got to hide? So they'll most likely look into you anyway. They will also dig very deeply into your financial records/situation. Though bankruptcy, for all intents and purposes, is erased from your record after 10 years in the civilian world, it will still reflect on you as far as a TS clearance is concerned -- no matter how long ago it was (15-20 years or more will still count for security purposes). Even juvenile records are taken into account -- whether it was stealing a candy bar from the corner shop -- or stealing cars for joy rides. They are all considered. They'll talk to former teachers/instructors/professors, church leaders, your friends (and, yes, they'll also talk to your friends' parents, siblings, and so on). When done properly, background checks for security clearances of TS, and subsequent special access programs, will turn up information on you that even you don't know about. And forget about getting a copy of it through the FOIA. I tried that -- several times. You wouldn't believe how much they'll delete from what is sent to you. Considering my initial investigation in '64, right through all the five year updates, the SBIs for the numerous special access programs and so on, all I was able to get my hands on via FOIA were something like 6 pages of information! And that covered 25 years! Plus what you do receive is also 'sanitized' (you know, the big black magic marker used to delete names, etc.). Not that it mattered, since I already had most of the information they wouldn't give me (including names and other info, like SSNs/service numbers) which I'd been able to obtain from other sources. There's much, much more of course. As you may have guessed, I served 20 years in the USN, plus an additional five in the Civil Service. In the latter part of my Navy career I assisted in background investigations on both US and British nationals, and for most of my civil service employment I was responsible for conducting background investigations on both US and British civilians for employment and clearance purposes prior to hiring by the US Navy in the United Kingdom, as well as investigations into security breaches, break-ins in offices containing classified material/information, and similar investigations in the US Navy HQ building in London (being the HQ for the Commander in Chief US Naval Forces Europe, virtually every office in that 8 storey building contained classified material) and we also assisted in some investigations at the US Embassy in London, which was right across the street from us on Grosvenor Square in W1 (the West End -- Mayfair, to be exact). Well, to cut it short -- if you are worried about privacy issues; don't take the job. Where clearances are concerned; there is no privacy. The gov't will end up knowing more about you than you know about yourself. And that's a fact. Jerry Keenan GPKeenan Co., Int'l Security Services West Islip, NY P.S. - If you need to know anything more about it, let me know. ----- Original Message ----- From: To: Sent: Tuesday, November 27, 2001 2:43 PM Subject: [TSCM-L] T.S. clearance. > > -----BEGIN PGP SIGNED MESSAGE----- > > I recently interviewed for a position that requires a top secret clearance. I am wondering if any listmembers can post to the list, or e.mail me, with links or info. as to what -exactly- is involved in the t.s. clearance process. I am concerned that I would lose too much privacy in this position, and I sort of want to know what I will be walking into. > > I know there must be a .gov or .mil page on it somewhere. > Daemon7@h... > Thank you. > Erik. > -----BEGIN PGP SIGNATURE----- > Version: Hush 2.1 > Note: This signature can be verified at https://www.hushtools.com > > wlwEARECABwFAjwD7IIVHGRhZW1vbjdAaHVzaG1haWwuY29tAAoJEIqGlhRaN0MTqHQA > niLFpKRL/9GExZFWXbU4Ziarg2+7AKCPgsZ0OctRpoqDLCa4RH4cBvwq1g== > =8rux > -----END PGP SIGNATURE----- > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4212 From: Matthew Paulsen Date: Tue Nov 27, 2001 9:05pm Subject: RE: T.S. clearance. One thing that I forgot - depending on your clearance and the system(s) you're assigned to you may have yearly investigations after your clearance is cancelled/deactivated. Timeline may vary from a year or more. My father worked on nukes in the air force and was subject to yearly discussions for more than 30 years, which included fbi stopovers at my house when I was growing up. "Do you know these people" "are you affiliated with these groups" etc.. My grandfather developed the western hemisphere telecomm network and was debriefed yearly until his retirement from military service. Hmm. reflection - met a lot of interesting people when I was a kid, and Boy Scouts was always fun since we got to go to many different government facilities.. Fun seeing jets take off when you're out on the pad and their 200 meters away.. Nothing like it. LOUD cannot describe the feeling when they are that close. Completely pervasive feeling. -----Original Message----- From: gkeenan [mailto:gkeenan@s...] Sent: Tuesday, November 27, 2001 5:05 PM To: TSCM-L@yahoogroups.com; Daemon7@h... Subject: Re: [TSCM-L] T.S. clearance. Hi Erik, I don't know if there's a website for what you're looking for -- I doubt it, but I could be wrong. What will probably happen is that, if you're hired, you'll receive an "ITS" clearance -- Interim Top Secret. This will allow you access to your work spaces and you'll be able to perform your duties until the "FTS" is received (Final Top Secret). This can take 18 months or more -- in your case, depending on your age, whether you've served in the military, if you previously held a clearance, and many other factors will all come into play. The older you are, the longer it will take because they go back 10 or more years into your background. Frankly, if you're worried about privacy -- you better not take the job. They'll dig deeper than any credit check or even pre-employment background check will, or even can go. I held a TS clearance for 25 years (20 yrs active duty Navy, 5 years civil service as a local hire for Naval Security and Investigative Command). I also held special access for SCI (Sensitive Compartmented Information), SIOP-ESI (Single Integrated Operations Program-Extremely Sensitive Information), PRP (Personal Reliability Program; required because of my access to aircraft carrier nuclear battle plans), TICON (Tight CONtrol), PASSWORD, US/UK EYES ONLY, NATO TOP SECRET/COSMIC TOP SECRET/ATOMAL TOP SECRET, CODEWORD, and many others. A TS clearance is required to be updated every five years; this means an updated background investigation will be conducted every five years. When I was under investigation for my initial TS back in '64, they went back and went door-to-door interviewing people. These people included neighbors whose names, to this day, are unfamiliar to me and they went back to when I was only 10 years old (keeping in mind that I was 18 when I got my TS). As I progressed in my military/civil service careers, my 5 year updates included interviews not only with co-workers, but also friends and neighbors at my civilian addresses -- the vast majority of whom were foreign nationals. Of my 25 years of government service, I served 23 in Europe and lived on the local economy at all times -- never in military housing. I was also married to a foreign national for a time and, about 2 years after the divorce, was investigated for my SCI access. This required an SBI (Special Background Investigation) which began during my time as a student in San Diego (a 3 month Navy school which resulted in my 4th specialty code (NEC - Navy Enlisted Classification Code; just a different name for the MOS codes used by the Army/AF/Marines) as a telecommunications systems technician. But even though I'd just gone through a 5 year update for my TS, it took nearly 2 more years for me to receive my SCI access. You can imagine just how deep into my background they went for this one; considering how deep they go for a TS to begin with. They will interview, either by phone or in person, everyone you list in the "Personal History" form you'll have to fill out. This form will require (there are no 'optional' sections in this form -- which consists of about 10 pages and requires the addition of additional sheets where necessary; every section must be filled out completely) you to list your parents (whether still alive or not), your siblings, their spouses, their children, their children's spouses (if appropriate), their children. All your cousins (as far removed as you can remember) and their spouses, children, etc. All your teachers throughout school (grammar, high school and college) as far as you can remember. They will also ask about religious affiliation, and the contacts for your church (deacon, pastor, imam, rabbi, priest, whatever). You will also have to swear you are not, and have never been involved with a group (not necessarily a member, but simply involved) that was/is anti-government in any way. Failure to fill in any section of the Personal History form usually results in being canned and you wont' get the job; unless there's a very good reason why you didn't fill it in. Refusal to fill in any section of the form is grounds for automatic rejection for employment -- and though I have no proof of it, it can lead to an investigation anyway; especially following the Sept. 11 events. They'll want to know why you refused to answer; what have you got to hide? So they'll most likely look into you anyway. They will also dig very deeply into your financial records/situation. Though bankruptcy, for all intents and purposes, is erased from your record after 10 years in the civilian world, it will still reflect on you as far as a TS clearance is concerned -- no matter how long ago it was (15-20 years or more will still count for security purposes). Even juvenile records are taken into account -- whether it was stealing a candy bar from the corner shop -- or stealing cars for joy rides. They are all considered. They'll talk to former teachers/instructors/professors, church leaders, your friends (and, yes, they'll also talk to your friends' parents, siblings, and so on). When done properly, background checks for security clearances of TS, and subsequent special access programs, will turn up information on you that even you don't know about. And forget about getting a copy of it through the FOIA. I tried that -- several times. You wouldn't believe how much they'll delete from what is sent to you. Considering my initial investigation in '64, right through all the five year updates, the SBIs for the numerous special access programs and so on, all I was able to get my hands on via FOIA were something like 6 pages of information! And that covered 25 years! Plus what you do receive is also 'sanitized' (you know, the big black magic marker used to delete names, etc.). Not that it mattered, since I already had most of the information they wouldn't give me (including names and other info, like SSNs/service numbers) which I'd been able to obtain from other sources. There's much, much more of course. As you may have guessed, I served 20 years in the USN, plus an additional five in the Civil Service. In the latter part of my Navy career I assisted in background investigations on both US and British nationals, and for most of my civil service employment I was responsible for conducting background investigations on both US and British civilians for employment and clearance purposes prior to hiring by the US Navy in the United Kingdom, as well as investigations into security breaches, break-ins in offices containing classified material/information, and similar investigations in the US Navy HQ building in London (being the HQ for the Commander in Chief US Naval Forces Europe, virtually every office in that 8 storey building contained classified material) and we also assisted in some investigations at the US Embassy in London, which was right across the street from us on Grosvenor Square in W1 (the West End -- Mayfair, to be exact). Well, to cut it short -- if you are worried about privacy issues; don't take the job. Where clearances are concerned; there is no privacy. The gov't will end up knowing more about you than you know about yourself. And that's a fact. Jerry Keenan GPKeenan Co., Int'l Security Services West Islip, NY P.S. - If you need to know anything more about it, let me know. ----- Original Message ----- From: To: Sent: Tuesday, November 27, 2001 2:43 PM Subject: [TSCM-L] T.S. clearance. > > -----BEGIN PGP SIGNED MESSAGE----- > > I recently interviewed for a position that requires a top secret clearance. I am wondering if any listmembers can post to the list, or e.mail me, with links or info. as to what -exactly- is involved in the t.s. clearance process. I am concerned that I would lose too much privacy in this position, and I sort of want to know what I will be walking into. > > I know there must be a .gov or .mil page on it somewhere. > Daemon7@h... > Thank you. > Erik. > -----BEGIN PGP SIGNATURE----- > Version: Hush 2.1 > Note: This signature can be verified at https://www.hushtools.com > > wlwEARECABwFAjwD7IIVHGRhZW1vbjdAaHVzaG1haWwuY29tAAoJEIqGlhRaN0MTqHQA > niLFpKRL/9GExZFWXbU4Ziarg2+7AKCPgsZ0OctRpoqDLCa4RH4cBvwq1g== > =8rux > -----END PGP SIGNATURE----- > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4213 From: John Sforza Date: Tue Nov 27, 2001 9:31pm Subject: RE: T.S. clearance. A good starting place is here: http://www.dss.mil/ This site will inform you about both DoD and Industry security clearance processes. There is the good and the bad in opportunities requiring a clearance but if privacy is your primary concern then be aware that there is darn little of it to be had even in the civil space. A security clearance is a 'hot' item in the job marketplace so unless you have a very specific issue I would suggest taking the opportunity. I found that having a clearance certainly focused the role of personal responsibility you take for the information that is entrusted to you. Best of luck. John Sforza ISRisk [Non-text portions of this message have been removed] 4214 From: Shawn Hughes Date: Wed Nov 28, 2001 10:09am Subject: Re: Digest Number 781 Daemon, Jerry hit it squarely on the head. It's kind of surprising that you are going directly into a position that requires such access; it used to be easy to obtain clearances. For the past 5 -8 years, though, they have really tightened down on who gets what. If you would like to know exactly what they will ask you, (and lie detector you, and ask your neighbors about you, he really wasn't lying) go to www.fedforms.gov and download a Standard Form SF-86, Questionnaire for Sensitive Positions. Be prepared to answer if you have ever consorted with kommunists, or groups advocating the overthrow of the USG. I think what you are really wanting to know; is, how is your life going to change with a USG NSI clearance? I'm sorry to answer that it will, and it won't. You'll have access to stuff, that makes NO sense why it is Classified (they even have a category for stuff that ISNT classified, but it is still not releasable to the public - go figure.) Then, you'll have well meaning people wanting to know what you do / have access to , and YOU CAN"T TELL THEM. Frustrating. You can still go to bars, and run around with friends, but if you accidentally let something slip you could get in hot water. If you hold access to certain information, you *might* become a target for foreign intelligence programs. Sounds James Bond-y, but it happens all the time. Because of this, you'll have to make a list of ever country you've visited (aaaah, May-hee-co!) and all the foreign nationals you've associated with. Depending how high you wind up getting access to, you might have to inform your company / agencies' security people before any trip over a certain length of miles or days. On a day to day basis, they have a bazillion rules for the handling of classified info, like if you leave a file unsecured and go to the bathroom, that could be a no-no. Same for water cooler talk. Everywhere you go, theres signs stating the level of classified matter that can be discussed. Theres stickers on everything listing what the item can be used for. If you want to talk (C), you got to use a special phone that is rated for (C) traffic, and it'll say it on the little window. When an uncleared person comes in, they announce it over the PA,and you have to shut monitors off, cover books up, put these big red blankets that say 'Classified' all over them (always wanted one of them. neat) over things. It can be frustrating, because if you want to print out ONE PAGE, that happens to be (TS), and all that is available is a copier cleared for (S), you are SOL. The difference between having Lockheed Martins' sales strategy, and classified info is that if you leak LM's stuff, they'll sue your ass into oblivion. If you leak NSI, some agency (OIG, FBI, OPM), will come and put in a Federal pen for a looooong time. Under national Security, you don't get hardly ANY rights. Then, if your ex-wife gets pissed off at you, she can call a 1-800 number and claim anonymously that you are a dope smoking, homosexual communist with a picture of Stalin in your wallet. Then the next day, the Men in Black come by and seize your access cards, and you get to sit in the Uncleared cafeteria for a month while they investigate. ( Seriously. ) I live about five miles from Oak Ridge, Tennessee. Everybody, and I mean everybody in my family, and most of my neighbors have clearances. (jerry, guess you had CNWDI, too, right?) well, that about sums it up. It's no fun, but it's survivable. Unless you seriously value personal privacy, and aren't very anal-retentive, then a position that requires a clearnce probably isn't for you. Good luck! Shawn 4215 From: MIKE F Date: Wed Nov 28, 2001 0:03pm Subject: RE: Standard Forms site & SF-86 Standard Forms site http://forms.psc.gov/forms/SF/sf.html SF-86 http://forms.psc.gov/forms/SF/SF-86.pdf SF-86A http://forms.psc.gov/forms/SF/SF-86A.pdf mike f. --------------------------- lATER4,Mike Fiorentino Master Links 4 Master Investigators http://www.ml4mi.com e-mail:friindy@a..., OR info@m... ------------------------------------------ "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or Confidential. The information is intended for use only by the individual(s)or entity named/indicated above.If you are the identified/intended recipient, be aware that (Unless you seek Permission.) any disclosure, COPYING, DISTRIBUTION,& or use of the contents of this Message/Information is Prohibited! -----Original Message----- From: Shawn Hughes [mailto:srh@e...] Sent: Wednesday, November 28, 2001 11:09 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Digest Number 781 Daemon, Jerry hit it squarely on the head. It's kind of surprising that you are going directly into a position that requires such access; it used to be easy to obtain clearances. For the past 5 -8 years, though, they have really tightened down on who gets what. If you would like to know exactly what they will ask you, (and lie detector you, and ask your neighbors about you, he really wasn't lying) go to www.fedforms.gov and download a Standard Form SF-86, Questionnaire for Sensitive Positions. Be prepared to answer if you have ever consorted with kommunists, or groups advocating the overthrow of the USG. I think what you are really wanting to know; is, how is your life going to change with a USG NSI clearance? I'm sorry to answer that it will, and it won't. You'll have access to stuff, that makes NO sense why it is Classified (they even have a category for stuff that ISNT classified, but it is still not releasable to the public - go figure.) Then, you'll have well meaning people wanting to know what you do / have access to , and YOU CAN"T TELL THEM. Frustrating. You can still go to bars, and run around with friends, but if you accidentally let something slip you could get in hot water. If you hold access to certain information, you *might* become a target for foreign intelligence programs. Sounds James Bond-y, but it happens all the time. Because of this, you'll have to make a list of ever country you've visited (aaaah, May-hee-co!) and all the foreign nationals you've associated with. Depending how high you wind up getting access to, you might have to inform your company / agencies' security people before any trip over a certain length of miles or days. On a day to day basis, they have a bazillion rules for the handling of classified info, like if you leave a file unsecured and go to the bathroom, that could be a no-no. Same for water cooler talk. Everywhere you go, theres signs stating the level of classified matter that can be discussed. Theres stickers on everything listing what the item can be used for. If you want to talk (C), you got to use a special phone that is rated for (C) traffic, and it'll say it on the little window. When an uncleared person comes in, they announce it over the PA,and you have to shut monitors off, cover books up, put these big red blankets that say 'Classified' all over them (always wanted one of them. neat) over things. It can be frustrating, because if you want to print out ONE PAGE, that happens to be (TS), and all that is available is a copier cleared for (S), you are SOL. The difference between having Lockheed Martins' sales strategy, and classified info is that if you leak LM's stuff, they'll sue your ass into oblivion. If you leak NSI, some agency (OIG, FBI, OPM), will come and put in a Federal pen for a looooong time. Under national Security, you don't get hardly ANY rights. Then, if your ex-wife gets pissed off at you, she can call a 1-800 number and claim anonymously that you are a dope smoking, homosexual communist with a picture of Stalin in your wallet. Then the next day, the Men in Black come by and seize your access cards, and you get to sit in the Uncleared cafeteria for a month while they investigate. ( Seriously. ) I live about five miles from Oak Ridge, Tennessee. Everybody, and I mean everybody in my family, and most of my neighbors have clearances. (jerry, guess you had CNWDI, too, right?) well, that about sums it up. It's no fun, but it's survivable. Unless you seriously value personal privacy, and aren't very anal-retentive, then a position that requires a clearnce probably isn't for you. Good luck! Shawn 4216 From: Aimee Farr Date: Wed Nov 28, 2001 0:12pm Subject: Russia's new spy-or-die program? [The only way out of state control would be intensive innovation. The continued monitoring also seems suggestive of motivations other than the state "getting its due." ~Aimee] http://www.themoscowtimes.com/stories/2001/11/28/045.html Wednesday, Nov. 28, 2001. Page 7 State Wants Intellectual Property Vedomosti The Property Ministry has submitted a draft resolution to the Cabinet that would allow the state to confiscate intellectual property -- primarily patents and technical documents -- that was registered during the Soviet era. "It so happens that all our defense sector enterprises are illegally using state property with no resistance from the government," Deputy Prime Minister Ilya Klebanov, who proposed the measure, said in August. According to the plan, if intellectual property was created using budget money during the Soviet period, then it should be nationalized. Since Soviet inventions are the main source of income for Russian arms companies, the state would effectively be handed control of the defense sector, including privately owned companies. A source in one of the biggest oil companies said 60 percent to 70 percent of the know-how, technology and technical documentation used in the oil sector was developed in the Soviet era. Under the draft, companies must draw up an inventory of intellectual property in any of three cases: during the reorganization or liquidation of a state unitary company; when signing export contracts for goods that incorporate scientific developments; or when launching joint projects with foreign companies. After conducting an inventory, property found to have been developed on Soviet funds must be returned to the state and a contract concluded with the Property Ministry for its use. -###- Maybe the just want to prey-off foreign ownership. 4217 From: James M. Atkinson Date: Wed Nov 28, 2001 3:02pm Subject: The Black Hat Windows Security Briefings 2002 I wonder if my presentation on the "analytical vulnerabilities of ciphers based on prime number seeding" would would get the weenies at Ft. Meade all bent out of shape? -jma >The Black Hat Windows Security Briefings 2002 >New Orleans, Louisiana >Call for Papers Reminder > >http://www.blackhat.com/ > >Windows Security Briefings will be February 7th - 8th 2002 at >the New Orleans Radisson Hotel, back-to-back with the city's Mardi Gras >celebration. > >The Black Hat Windows Security Briefings focuses on the security >issues created in the Microsoft Windows environment -- specifically >the Windows 2000 and Windows XP family of operating systems. >Briefings will be 3 tracks (Techical, More Technical, and Deep >Knowledge) over 2 days, with approximately 25 different speakers >being chosen to present. > >Black Hat Inc. is currently soliciting speakers through a Call for >Papers which ends 15 December 2001. We're very interested in talks >focussed on the recently-released >Windows XP and the Microsoft .NET development platform - >presentations that include tools and/or demonstrations will be given >special consideration. ABSOLUTELY no vendor presentations. > >If selected, speakers will receive free conference entrance, an >honorarium of $1,000 USD, and airfare & hotel costs will be covered. >(If you are on a panel, the honararium and expenses must be divided >between participants.) > >Check out the conference details and speaking requirements needed to fulfill >the Call for Papers at >http://www.blackhat.com/html/win-usa-02/win-usa-02-cfp.html > >Thank you, >Jeff Moss -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4218 From: James M. Atkinson Date: Thu Nov 29, 2001 9:35am Subject: Gell Cells and NiCads Given the recent discussion of batteries blowing up I would like to point out the following safety issue (but then of course the techs on this list already knew about this).. Just a word of warning: If you have equipment that uses a lead acid battery or Gell-cell do not store, use, or charge near any kind of Ni-Cad or lithium Ion batteries (and visa-versa). When any kind of a lead acid battery is operated, charged, or discharged it emits small amounts of gas which when mixed with similar fumes from a NiCad created a poisonous, highly corrosive, and explosive gas that can quite literally cause the NiCad batteries to explode or at least spring a serious leak. For example, if you have an OSCOR, a Signal Sentry, SuperScout, 1080H or other pieces of equipment with a sealed lead-acid cell do not charge them within six feet of anything containing a NiCad or lithium ion battery (such as an ORION, Cell Phone, flashlights, CPM-700, spectrum analyzer, and so on). While the big problem is during the CHARGING cycle (due to a potential for explosion or fire), there is also an issue of STORING or shipping the equipment with mismatched batteries. When you store or ship mis-matched batteries you run a strong risk of deteriorating the seals on both battery types, but the NiCads will suffer more damage then the lead-acid cells. Hint: as a practical suggestion do not store, ship, or charge both your OSCOR and ORION in the same transit case. Know what kind of batteries your equipment has, and practice good safety -jma -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4219 From: David Alexander Date: Thu Nov 29, 2001 11:05am Subject: Phone system security You may remember that we had a thread that discussed telephone system security earlier this year, both from an TSCM perspective and also with regard to prevent financial loss. Here is a prime example of why: "Earlier this year, hackers tapped into computer switchboards of 12 of Australia's largest corporations and ran up $12 million worth of untraceable calls," said Australian Federal Police commissioner Mick Keelty. If that doesn't motivate people, nothing will. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4220 From: none Date: Wed Nov 28, 2001 9:38pm Subject: Re: The Black Hat Windows Security Briefings 2002 Sounds interesting. Have you published it anywhere? Stu "James M. Atkinson" wrote: > > I wonder if my presentation on the "analytical vulnerabilities of > ciphers based on prime number seeding" would would get the weenies at > Ft. Meade all bent out of shape? > > -jma > > >The Black Hat Windows Security Briefings 2002 > >New Orleans, Louisiana > >Call for Papers Reminder > > > >http://www.blackhat.com/ > > > >Windows Security Briefings will be February 7th - 8th 2002 at > >the New Orleans Radisson Hotel, back-to-back with the city's Mardi Gras > >celebration. > > > >The Black Hat Windows Security Briefings focuses on the security > >issues created in the Microsoft Windows environment -- specifically > >the Windows 2000 and Windows XP family of operating systems. > >Briefings will be 3 tracks (Techical, More Technical, and Deep > >Knowledge) over 2 days, with approximately 25 different speakers > >being chosen to present. > > > >Black Hat Inc. is currently soliciting speakers through a Call for > >Papers which ends 15 December 2001. We're very interested in talks > >focussed on the recently-released > >Windows XP and the Microsoft .NET development platform - > >presentations that include tools and/or demonstrations will be given > >special consideration. ABSOLUTELY no vendor presentations. > > > >If selected, speakers will receive free conference entrance, an > >honorarium of $1,000 USD, and airfare & hotel costs will be covered. > >(If you are on a panel, the honararium and expenses must be divided > >between participants.) > > > >Check out the conference details and speaking requirements needed to fulfill > >the Call for Papers at > >http://www.blackhat.com/html/win-usa-02/win-usa-02-cfp.html > > > >Thank you, > >Jeff Moss > -- > > ------------------------------------------------------------------------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ------------------------------------------------------------------------------------------ > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ------------------------------------------------------------------------------------------ > "Success without honor is an unseasoned dish; > it will satisfy your hunger, but it won't taste good." > ------------------------------------------------------------------------------------------ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4221 From: Date: Thu Nov 29, 2001 4:20pm Subject: Humor O/T POLAND JOINS THE COALITION--GOD BLESS THEM Polish Marines stormed Bloomingdale's Department Store in New York yesterday after it's intelligence agency reported that Bed Linen was on the fourth floor. No one important was hurt. Happy Holidays to All ! HAVE A GREAT DAY !!! 4222 From: Date: Thu Nov 29, 2001 1:57pm Subject: New Surveillance Measures Considered New Surveillance Measures Considered By TED BRIDIS .c The Associated Press WASHINGTON (AP) - Just weeks after approving powerful new anti-terrorism laws, some lawmakers already are considering giving the government new police powers to make it easier to obtain special wiretaps and search warrants usually reserved for finding foreign spies. The new changes would allow government agents to secretly request wiretaps even if details about the target of the surveillance, such as his identity or the location of his phone, aren't known. They also would allow agents to make broader demands for most business records, as long as the documents were related to an investigation. Another change would permit the United States to invoke a powerful anti-espionage law even in cases against individual foreigners. That law is currently reserved for cases against people working as spies for foreign governments or other foreign organizations. A fourth change would give the government up to three days to seek a judge's approval for warrants after investigators conduct a search or wiretap in emergencies. The government currently must obtain a judge's permission after 24 hours. The changes, under consideration by House and Senate members working on the intelligence bill that would set the budget for the CIA, would affect a powerful 1978 anti-espionage law, the Foreign Intelligence Surveillance Act. Under that law, a secret U.S. court considers requests for searches or wiretaps, and these generally require a lower standard of proof for approval than in traditional criminal cases. The Justice Department characterized the changes being sought as narrow, technical amendments to the surveillance act. But civil liberties groups cautioned that the changes were substantive and considerably broadened police powers. ``This is a significant expansion of electronic surveillance in the United States,'' said Jerry Berman, head of the Washington-based Center for Democracy and Technology. ``It's only been a month or so, and they're already asking for expansions.'' ``Subjecting any foreign person to FISA is a fundamental change to the statute,'' agreed Morton H. Halperin, a senior fellow at the Council on Foreign Relations. ``These can by no means be characterized as technical.'' That change would specify that the surveillance law could be used against ``a foreign individual,'' according to draft language by the Justice Department, which was obtained Thursday by The Associated Press. Justice lawyers wrote that otherwise restricting use of the espionage law ``limits the ability of the president to use this statute against ... hijackers or other terrorists without affiliation or known affiliation with a specific group or foreign state.'' Another change would add the phrase ``if known'' to the requirement for wiretap approvals of identifying the location of a target's electronic communications. Justice lawyers said the change would be useful in cases of wireless telephones or e-mail accounts, ``where the facility to be monitored is typically not known in advance.'' Reacting to the Sept. 11 terrorist attacks, Congress under the new Patriot Act gave government agents broad new powers to detain immigrants, eavesdrop on telephone calls and e-mails and share sensitive details of criminal investigations with the CIA. President Bush signed the Patriot Act on Oct. 26. Among other things, the law permits U.S. prosecutors to invoke the anti-espionage law even when the primary focus of their investigation isn't spying by a foreign government. It also makes it legal for investigators to pass sensitive information about criminal cases to intelligence agencies. Assistant U.S. Attorney General Michael Chertoff, in testimony earlier this week before the Senate Judiciary Committee, said that information-sharing allowed under the Patriot Act ``has been indispensable to satisfying our direction to protect the American people against future acts of terrorism.'' The intelligence bill, which is largely classified, provides funding and some policy guidance to the 13 U.S. intelligence agencies, including the CIA and the National Security Agency. Its total amount is secret but thought to be around $30 billion annually. The House and Senate have already passed separate versions of the bill, which contain large increases for the agencies. AP-NY-11-29-01 1955EST 4223 From: Aimee Farr Date: Thu Nov 29, 2001 9:02pm Subject: Have you seen *THIS?* ["There is nothing in the intellect that was not first in the senses." -- Aristotle.] From NLECTC (whatever): "Climbing Inside the Criminal Mind; The Brain Scientist" Time (11/26/01) P. 80; Dale, Sarah Sturmon As he was working on technology to help vocally paralyzed individuals to speaks, Lawrence Farwell stumbled onto a collection of signals warehoused in the brain. Assuming he could find a practical use for the information, Farwell developed a new forensic technology he calls brain fingerprinting. A sensor-filled headband is fitted to a suspect's head, and then a series of pictures are flashed on a screen. Familiarity to the stimulus will trigger an involuntary response from the subject, beginning between 300 and 800 milliseconds after the picture is shown. The reaction interprets the real connection between the suspect and the stimulus--be it a phone number or a coded terrorist message, and with additional technologies he has already patented, it becomes a polygraph of sorts. Farwell's research has been funded by more than $1 million by the CIA, and recently, a former FBI point man for biological and chemical weapons has joined his firm. (www.time.com) ------ Story here: http://www.time.com/time/magazine/article/0,9171,1101011126-184979,00.html Quote: "The fundamental task in law enforcement and espionage and counterespionage is to determine the truth," he says. ------ Well, minds differ but, it sure brings a whole new meaning to the term, "see no evil." So much for your polygraph complaints. Combined with future bioscanning technology, we are nearing surreptitious knowledge elicitation: learning what somebody knows, or does not know, without them knowing it. (A terrorist walks down and glances at a mural along a passengerway and remote bioscanning registers multiple recognition patterns....a job interviewee is subtlety tested for knowledge of a certain project... and so on.) This project is based on nonpropositional knowledge (actual knowledge), often couched in terms of "familiarity knowledge," or "object knowledge." Object knowledge is based on a direct acquaintance with a person, place, or thing. For example, "Mr. X knows Mr. Y./Object Y." Or, "object ignorance," in that "Mr. X has no direct acquaintance with Mr. Y/Object Y." (You can develop object familiarity profiles. You could find out if I was a "real lawyer," for example.) Of obvious use in counterintelligence, aside from eliciting knowledge of particular associations and acts. Of course, this ignores the question why a supposedly cutting-edge counterintelligence interrogation technology is featured in _TIME magazine_, mentioned along with CIA R&D grants (in excess of $1 mill) and x-FBI agents. I always considered this stuff a "dual-use" technology, in the sense that it can be used against our own people in other areas of the world, usually in combination with more coercive methods. Maybe I'm just being a ninny.... ~Aimee 4224 From: Matthew Paulsen Date: Thu Nov 29, 2001 1:18pm Subject: RE: Gell Cells and NiCads Another safety note.. but you all know this...(and if you're like me you don't really follow it very much...) You should also drain the charge and remove the batteries if you're not going to use the device for a while. It can corrode and ruin it, and most manufacturers won't cover battery corrosion under their warranty. You should always transport your equipment without the battery installed. -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Thursday, November 29, 2001 7:35 AM To: TSCM-L Mailing List Subject: [TSCM-L] Gell Cells and NiCads Given the recent discussion of batteries blowing up I would like to point out the following safety issue (but then of course the techs on this list already knew about this).. Just a word of warning: If you have equipment that uses a lead acid battery or Gell-cell do not store, use, or charge near any kind of Ni-Cad or lithium Ion batteries (and visa-versa). When any kind of a lead acid battery is operated, charged, or discharged it emits small amounts of gas which when mixed with similar fumes from a NiCad created a poisonous, highly corrosive, and explosive gas that can quite literally cause the NiCad batteries to explode or at least spring a serious leak. For example, if you have an OSCOR, a Signal Sentry, SuperScout, 1080H or other pieces of equipment with a sealed lead-acid cell do not charge them within six feet of anything containing a NiCad or lithium ion battery (such as an ORION, Cell Phone, flashlights, CPM-700, spectrum analyzer, and so on). While the big problem is during the CHARGING cycle (due to a potential for explosion or fire), there is also an issue of STORING or shipping the equipment with mismatched batteries. When you store or ship mis-matched batteries you run a strong risk of deteriorating the seals on both battery types, but the NiCads will suffer more damage then the lead-acid cells. Hint: as a practical suggestion do not store, ship, or charge both your OSCOR and ORION in the same transit case. Know what kind of batteries your equipment has, and practice good safety -jma -- ---------------------------------------------------------------------------- -------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- -------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------------- -------------- "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ---------------------------------------------------------------------------- -------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4225 From: Date: Thu Nov 29, 2001 9:36pm Subject: Re: Gov't seed capital for emerging technologies --- In TSCM-L@y..., "Gil Zimmerman" wrote: > I thought there was an article or email bulletin about a recent US > government program to encourage development, streamlined acquisition, > and utilization of emerging technologies, especially voice, video, > audio, wireless, and data integration concepts to support > counter-terrorism, homeland defense, security, screening, etc., which I > thought was separate from the ongoing program at DARPA. > > Following is information on the Small Business Innovation Research > (SBIR) Program, the Defense Advanced Research Projects Agency's (DARPA) > SBIR Program specifically, and the National SBIR Conferences. > http://www.darpa.mil/sbir/sbir.html > > Does anyone know of new funding and research programs that have been > rolled out since 11 September? > The DoD released a BAA (Broad Agency Announcement) on 23 October that has a comprehensive list of counter-terrorism technology requirements that anyone can register to bid on. Check: http://www.bids.tswg.gov Jim Nolan 4226 From: Steve Whitehead Date: Thu Nov 29, 2001 10:05pm Subject: 'Peeping Tom' camera seized "Port Elizabeth - Police have seized a suspected "peeping Tom" video camera discovered in the bathroom ceiling of a local nurse. They also took possession of an extension cable and video tapes and are investigating a case of crimen injuria against a suspect. According to Salome du Plessis a 13-year-old girl had discovered a small hole in the ceiling while getting ready to take a bath. The girl claimed that she has had a feeling for some time that she was being watched when in the bathroom. The son of a neighbour, Gideon Wagner, decided to investigate and found a small video camera mounted in the roof. Du Plessis called the police, who took the camera and, acting on information, searched a nearby house where they confiscated several tapes. Police spokesperson Captain Dirk Coetzee confirmed an investigation was underway but said no-one has been arrested" Story at http://www.news24.co.za/News24/South_Africa/EasternCape/0,1113,2-7-836_1115314,00.html Steve Whitehead E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa TSCM Services URL : http://www.tscm.co.za [Non-text portions of this message have been removed] 4227 From: Matthew Paulsen Date: Fri Nov 30, 2001 0:24am Subject: RE: 'Peeping Tom' camera seized Tried to check it.. looks down.. DNS and IP lookup failed, checked the zonefile (unprotected of course.. why would they restrict digs...) Zone records for bids.tswg.gov bids.tswg.gov. 86400 IN SOA 3dns.idshq.com. ccoleman.idshq.com. ( 2001111617 ; Serial 7200 ; Refresh 3600 ; Retry 604800 ; Expire 86400 ) ; Minimum TTL bids.tswg.gov. 86400 IN NS 3dns.idshq.com. www.bids.tswg.gov. 30 IN A 65.167.192.52 www.bids.tswg.gov. 30 IN A 65.167.192.52 www.bids.tswg.gov. 86400 IN A 65.167.192.51 2 A records for same host.. hmm. odd... Guess the site isn't up right at this specific moment.. Will try later. -----Original Message----- From: Steve Whitehead [mailto:sceptre@m...] Sent: Thursday, November 29, 2001 8:06 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] 'Peeping Tom' camera seized "Port Elizabeth - Police have seized a suspected "peeping Tom" video camera discovered in the bathroom ceiling of a local nurse. They also took possession of an extension cable and video tapes and are investigating a case of crimen injuria against a suspect. According to Salome du Plessis a 13-year-old girl had discovered a small hole in the ceiling while getting ready to take a bath. The girl claimed that she has had a feeling for some time that she was being watched when in the bathroom. The son of a neighbour, Gideon Wagner, decided to investigate and found a small video camera mounted in the roof. Du Plessis called the police, who took the camera and, acting on information, searched a nearby house where they confiscated several tapes. Police spokesperson Captain Dirk Coetzee confirmed an investigation was underway but said no-one has been arrested" Story at http://www.news24.co.za/News24/South_Africa/EasternCape/0,1113,2-7-836_11153 14,00.html Steve Whitehead E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa TSCM Services URL : http://www.tscm.co.za [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4228 From: MIKE F Date: Fri Nov 30, 2001 9:42am Subject: FBI Remote keylogger & other Stuff You Know what I think is INCREDIBLe, not that the FBI may be in Possession and using the a tool. <====Well Duh....... That some many people just don't believe it! later4,mike f ---------------------- FBI runs Trojan horse The FBI may be in possession of software capable of remotely compromising a suspect's computer and installing a keylogger to harvest encryption key passwords. The discovery comes only weeks after the Bureau made a motion to suppress evidence about the use of similar technology in the recent US versus Nicodemo Scarfo case. The FBI claimed that releasing information about the technology would jeopardise current as well as future investigations. Read the full story at: http://www.vnunet.com/News/1127038 ============================================================================ =================== Symantec pledges to acquiese to FBI backdoor demands Eric Chien, chief researcher at Symantec's antivirus research lab, said that provided a hypothetical keystroke logging tool was used only by the FBI, then Symantec would avoid updating its antivirus tools to detect such a Trojan. The security firm is yet to hear back from the FBI on its enquiries about Magic Lantern but it already has a policy on the matter. Read the full story at: http://www.politechbot.com/p-02851.html ---------------------------------------------------------------------------- ------------------------------------------------ SPYKING-aka Frank Jone's-- Dirt http://www.vnunet.com/News/1122902 ============================================================================ ======================================== DOJ's Already Monitoring Modems ============================================================================ ==================================== DOJ's Already Monitoring Modems http://www.wired.com/news/conflict/0,2100,48711,00.html DOJ's Already Monitoring Modems By Declan McCullagh and Ben Polen ---------------------------------------------------------------------------- ----------------------------------------------- --------------------------- lATER4,Mike Fiorentino Master Links 4 Master Investigators http://www.ml4mi.com e-mail:friindy@a..., OR info@m... ------------------------------------------ "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or Confidential. The information is intended for use only by the individual(s)or entity named/indicated above.If you are the identified/intended recipient, be aware that (Unless you seek Permission.) any disclosure, COPYING, DISTRIBUTION,& or use of the contents of this Message/Information is Prohibited! 4229 From: Dawn Star Date: Fri Nov 30, 2001 11:45am Subject: Equipment for Sale I was recently contacted by some people who have this equipment for sale, If anyone is interested contact me for their personal e-mail address. Roger FOR SALE FOR SALE FOR SALE FOR SALE FOR SALE 1. Telephone Analysis System Model TAS-1 (made by Technical Services Agency, Inc.) $700 2. Eagle Plus Scanning Receiver Model 8601 (made by Technical Services Agency, Inc.) $7,000 3. Spectrum Monitor Model SM-2 (made by Technical Services Agency, Inc.) $1,900 4. Linelock Model CCR-3 (made by Technical Services Agency, Inc.) $800 5. Rangelock Model 3801 (made by Technical Services Agency, Inc.) $550 Plus, the following publications all by Glenn H. Whidden of Technical Services Agency, Inc.: The Ear (A home study course on eavesdropping and eavesdropping defenses) Volume I, II, III $130 EACH The TSCM Threat Book Volume I (Eavesdropping Signal Characteristics) & II (Telephone Attack Methods and Defensive Tests) $145 EACH $9,920 FOR THE ENTIRE PACKAGE (CERTIFIED U.S. FUNDS ONLY) WILL SELL SINGLE PIECES/PRICE BREAK FOR ENTIRE PACKAGE 4230 From: James M. Atkinson Date: Fri Nov 30, 2001 10:50am Subject: The 25 Commandments of Operational Security The 25 Commandments of Operational Security (also known as "The SAS Guide to OPSEC") I. Thou shalt not park thy helicopter in the open, for it bringeth the rain of steel. II. Thou shalt not expose thy shiny mess gear, for it bringeth unwanted guests to chow. III. Thou shalt not wear white T-shirts, or thine enemies will dye them red. IV. Thou shalt provide overhead concealment, for thine enemies' eyes are upon thee. V. Thou shalt cover thy tall antenna, for fly swatters groweth not in yon wood. VI. Thou shalt use a red lens on thy flashlight, or it shall appear as a star in the East. VII. Thou shalt cover the glass on thy vehicle, for the glare telleth thine enemy thy location. VIII. Thou shalt blend with thy surroundings, for trees groweth not in yon desert. IX. Thou shalt cover the tracks of thy vehicle, for they draweth pretty pictures. X. Thou shalt cover thy face, hands, and helmet, for thine enemies maketh war not on bushes. XI. Thou shalt not drape thy net on thy tent, for it looketh like tent draped in net. XII. Thou shalt hide the wires of thy cammo, for they pointeth to thee. XIII. Thou shalt practice the art of dispersion, or one round will finish you all. XIV. Thou shalt pick up thy trash and litter, for they exposeth thy presence. XV. Thou shalt conceal the noise of thy generator, for thine enemies are listening. -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4231 From: Aimee Farr Date: Fri Nov 30, 2001 8:02pm Subject: Spyactivism story. http://www.wired.com/news/culture/0,1284,48692,00.html?tw=wn20011129 Abortion Clinics on New Net Alert By Julia Scheeres 2:00 a.m. Nov. 29, 2001 PST An anti-abortion extremist who is also one of the FBI's 10 Most Wanted has allegedly threatened to kill 42 abortion clinic workers unless they notify him through the Internet that they have quit their jobs. On Friday, the fugitive allegedly paid a visit to the Carrollton, Georgia, home of Neal Horsley, who operates several anti-abortion websites, including the controversial Nuremberg Files, which publishes detailed personal information about clinic workers. The Nuremberg Files has been called a "hit list" by critics. "When I turned around and saw him in my home again, brandishing a weapon, I was initially very shocked; but when I realized who it was, I didn't feel threatened," said Horsley, who added that Waagner had tracked him down using a laptop equipped with Global Positioning System (GPS) software. According to the transcripts, Waagner said he would target rank-and-file clinic workers, such as janitors and receptionists, because they were less protected than the doctors. "I have a list of 42, and this is to that 42: I know where you live; I know what you drive; I actually don't know all your names, but I've got your car license and I've followed you home, so I've got your street address.... Obviously, I won't tell who's on my list because that's the beauty of it." During his trial, Waagner testified that he had carried out surveillance on abortion clinics for months.... [...] ===== This guy is a NUT, but the abortion activists lead the field in social-cause espionage and institutional subversion. They even have a website aimed at disgruntled abortion clinic insiders, and claim a large private intelligence network of "moles." They use multiple collection platforms, engage in hostile surveillance, use "impression of surveillance" for intimidation, hone in on personal pressure points, and use extortionary tactics like TNAing (target name and address) seen here. Notice this guy's targets: "rank-and-file clinic workers, such as janitors and receptionists." Interesting, huh? Makes you wonder what sorts of books activists are reading these days, or if this is just a natural evolution from advanced net-activism, which gives them networks and reach. Spyactivism/surveillactivism trends are worthy of notice for both private and public protectors. (Note Flint's Hustler reporters seeking the front lines.) Historically, the #1 target of activists: 'da guvmint. ~Aimee From: Ocean Group Date: Tue Nov 25, 2003 0:18pm Subject: Traffic Speed Detection Does anyone on the list have any experience with fixed speed detection systems? Or know of any companies or manufacturers of this type of system? Appreciate any input Regards Oisin 8015 From: A.Lizard Date: Thu Nov 20, 2003 0:25pm Subject: encrypted GSM phone... snake oil or real? Cryptophone locks out snoopers By electricnews.net Posted: 20/11/2003 at 10:16 GMT http://theregister.co.uk/content/68/34096.html A German firm has launched a GSM mobile phone that promises strong end-to-end encryption on calls, preventing the possibility of anybody listening in. If you think that you'll soon be seeing this on the shelves of your local mobile phone shop though, think again. For a start, the Cryptophone http://www.cryptophone.de/ sells for Ä1,799 per handset, which puts it out of the reach of most buyers. Second, the phone's maker, Berlin-based GSMK, say the phone will not be sold off the shelf because of the measures needed to ensure that the product received by the customer is untampered with and secure. Buyers must buy the phone direct from GSMK. According to GSMK, the new phone is designed to counteract known measures used to intercept mobile phone calls. While GSM networks are far more secure than their analogue predecessors, there are ways and means to circumvent security measures. The encryption in GSM is only used to protect the call while it is in the air between the GSM base station and the phone. During its entire route through the telephone network, which may include other wireless links, the call is not protected by encryption. Encryption on the GSM network can also be broken. The equipment needed to do this is extremely expensive and is said to be only available to law enforcement agencies, but it has be known to fall into the hands of criminal organisations. The Cryptophone is a very familiar-looking device, since it is based around the same HTC smartphone that O2 used as its original XDA platform. The phone runs on a heavily modified version of Microsoft Pocket PC 2002. GSMK says it is the only manufacturer of such devices that has its source code publicly available for review. It says this will prove that there are no back-doors in the software, thus allaying the fears of the security-conscious. Publication of the source code doesn't compromise the phone's security, according to GSMK. The Cryptophone is engineered in such a way that the encryption key is only stored in the phone for the duration of the call and securely erased immediately afterwards. One drawback of the device is that it requires the recipient of calls to also use a Cryptophone to ensure security. GSMK does sell the device in pairs, but also offers a free software download that allows any PC with a modem to be used as a Cryptophone. GSMK says that the Cryptophone comples with German and EU export law. This means the device can be sold freely within the EU and a number of other states such as the US, Japan and Australia. It cannot be sold to customers within Afghanistan, Syria, Iraq, Iran, Libya and North Korea. A number of other states are subject to tight export controls and a special licence will have to be obtained. © ElectricNews.Net Related Products ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "Outlook is a security hole that masqurades as an e-mail client." Steven J. Vaughan-Nichols Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... [temporarily fubared, will be fixed or replaced] PGP 8.0 key available by request or keyserver. Download PGP from http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html For new music, try http://www.eliangedeon.com ************************************************************************ 8016 From: Thomas Shaddack Date: Tue Nov 25, 2003 9:43pm Subject: Re: Re: Request for suggestions > >Now the stream of data continues to the husband. Methinks that there is a > >rather sophisticated system on the computer using the telephones as > >receivers and the computer as the recorder. > > Given the possibility of audio going to data file by way of the sound card, > have the client pick up the phone, call time/weather, or whatever, then > do a search for files modified in the past 1 day. Sort by modification time, > and see if something was just created in the last minute. > > Same approach is useful against keystroke loggers. This method is very useful against lower-class adversaries. However, there are ways how to hide the files in question from this kind of inspection; the program can reset the file modification date (DOS viruses used to do this after infection of the files (good old times when the virus writers had to know assembler instead of just Visual Basic)). Another possibility is to store the audio data right on the disk, bypassing the filesystem altogether; this either requires a dedicated partition (this is also good approach for dedicated applications, eg. a circular buffer for sound or video, which could be handy for security applications), or some clever algorithm for sector allocation that won't collide with allocating the sectors with the filesystem itself. (Example: Ages ago I wrote a small program for smuggling data on floppies, which was able to take a zip file and save it on the floppy sector-by-sector, starting from the very last one, as FAT filesystems fill the disk from the beginning. Details for request, the source is long time gone, but wasn't difficult to write - it was a simple Pascal program calling direct disk access over INT13 (I was only about 16 years old when I did it), in unixes it would be even simpler by direct access of the corresponding block device, don't know enough about Windows but could be similar.) I don't suppose, that such advanced approach would be deployed in mere domestic case; can't rule it out, though - depends on the geekiness level of the adversary. However, because of the not-exactly-negligible amount of data that have to be processed for audio wiretaps (72 kB per minute for 9600bps GSM compression, which is what I'd use, but any other codec is possible - the most likely other ones to be used in a homebrew system are MP3 and WMA, which take more disk space per minute), there will be noticeable disk activity during the phone call. Try on an inactive machine with no programs running on the foreground and screensaver set to blanked screen or disabled so its activity won't interfere. I don't think this is possible to hide in any other way than directly sending the data out by some kind of Net connection, which is detectable too by increased network activity during the call. The "traffic analysis" approach, watching disk and network activity changes, is maybe impossible to fool (at least I don't know how). There are also programs at http://www.sysinternals.com/ for monitoring various kinds of Windows system activity - registry accesses, network accesses, and even disk accesses. May be useful in this case. 8017 From: Charlie O'Neal Date: Wed Nov 26, 2003 7:35am Subject: RE: Re: Request for suggestions To find a description of one possible method that recreates your problem, point your browser to the the FBI's home page and check the June 1998 issue of the FBI Law Enforcement Bulletin. Once there see the article re clandestine audio surveillance by computer. Good luck. -----Original Message----- From: John Kennedy [mailto:johnk@s...] Sent: Tuesday, November 25, 2003 9:30 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Request for suggestions >Now the stream of data continues to the husband. Methinks that there >is a rather sophisticated system on the computer using the telephones >as receivers and the computer as the recorder. Given the possibility of audio going to data file by way of the sound card, have the client pick up the phone, call time/weather, or whatever, then do a search for files modified in the past 1 day. Sort by modification time, and see if something was just created in the last minute. Same approach is useful against keystroke loggers. -- John Kennedy johnk@s... Second Source, Inc. Annapolis, MD USA ------------------------ Yahoo! Groups Sponsor ---------------------~--> Buy Ink Cartridges or Refill Kits for your HP, Epson, Canon or Lexmark Printer at MyInks.com. Free s/h on orders $50 or more to the US & Canada. http://www.c1tracking.com/l.asp?cid=5511 http://us.click.yahoo.com/mOAaAA/3exGAA/qnsNAA/kgFolB/TM ---------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 8018 From: kondrak Date: Wed Nov 26, 2003 10:03pm Subject: Re: Re: Q Crypto Problem I see is that if you run "random" long enough, it starts to show paterns. At 22:18 11/10/2003, you wrote: >Agree that PR comparisons re brute force as barometer unhelpful. Also >agree that pedestrian infosec weaknesses ample enough to keep folks up and >scared late at night. > >Regarding quantum approaches, DoD is funding numerous quantum cryptography >experiments as part of its $20.6 million quantum information initiative at >DARPA. Here, Magiq is offering (a) still limited distance >point-to-point fiber-based; and (b) key-distribution-only >systems. Regardless of conceptual attractiveness, doesn't scale yet to >enterprise-level needs, let alone satellites, etc. False positive ratio >(sensors reporting photon interception) still way too high. > >Another quantum approach that may be more cost effective is the PadLock >Data Encryption Engine. Uses random electrical noise on a chip as its >source of randomness ('entropy'), to securely produce random number >values. Logic within the processor core collects entropy from this >physical process, pre-processes the data, and then queues up to 32 bytes >for immediate access by the processor. > >The point in collecting the data from physical sources this way -- output >is more unpredictable and has the benefit of not being influenced by >outside sources. And partitioning enables scaling of multiple >applications to safely share the random number generator. > >David > 8019 From: Mitch D Date: Wed Nov 26, 2003 10:10pm Subject: xtra jet tapes So much for posting in a coanspicuous place: All Persons entering this Aircraft are subject to Audio and Video Monitoring......... __________________________________ Do you Yahoo!? Free Pop-Up Blocker - Get it now http://companion.yahoo.com/ 8020 From: David Alexander Date: Thu Nov 27, 2003 4:20am Subject: RE: Re: Q Crypto The part about not being able to eavesdrop on a message without the receiving party knowing is true. Look up the Heisenberg Uncertainty Theorem which proves that you cannot detect the actual physical position and status of an sub-atomic particle without moving it from it's current state or position within the electron shell or nucleus. I did the mathematical proof at school in A level physics but that was about 25 years ago and long-since forgotten. Because part of the message status depends on that state or position, the communicating parties know that someone has been listening. I seem to remember something about Schroedingers cat too, but can't for the life of me think if it's relevant here. Hope that makes sense. David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: Thomas Shaddack [mailto:tscm-l@s...] Sent:11 November 2003 04:05 To:Steve Uhrig Cc:tscm-l@yahoogroups.com Subject:Re: [TSCM-L] Re: Q Crypto On Mon, 10 Nov 2003, Steve Uhrig wrote: > People don't take the most basic steps towards physical security to > protect their facilities. What would encourage them to invest heavily > in this highly specialized, extremely expensive niche when they won't > bother with the basics? Marketing. Gee-whiz factor of obscure new technology. Shiny new toy to brag about. PR device ("hey shareholders, don't look at the unlocked main gate, please pay attention to our new Quantum Security Device we just purchased so you may *feel* more secure..."). > Do the threats justify something like this, even if it actually is as > wonderful as described? Maybe. Not sure about it. The technology is IMHO in way too early stage of development anyway. > > Why are the NSA not bricking it? Because I suspect its not that > > impenetrable.... Or because they are aware that the physics behind it is well-known, so it's just matter of time until the market will be flooded with cheap Taiwanese knock-offs. Restrictions on crypto weaken "us" while they don't affect "them" much. Besides, next to nobody uses it correctly anyway; Schneier's parable about bank vault door mounted on a tent comes to mind. > I believe people underestimate NSA. They may enjoy challenges over > their coffee break. Crossword puzzle today, break the latest crypto > effort tomorrow. They are very bright and very powerful. But their capacities aren't unlimited, and not even they can change the laws of physics. > > It uses a combination of quantum cryptography and traditional > > cryptography to provide a virtual private network (VPN) running over > > fiber-optic cable that's designed to be completely secure against all > > eavesdroppers. > > The last is an awful dangerous statement. Completely secure against > all eavesdroppers? There are a lot of really competent eavesdroppers > out there, many using techniques most will never hear of. > > And I tend to discount hyperbole claims of magic when sprinkled with > a lot of impressive sounding buzzwords. It's actually somehow possible here. Contemporary symmetrical ciphers are pretty difficult to crack, making their preceding key exchange algorithms (RSA, Diffie-Hellman...) a comparatively soft target. Quantum key exchange is aimed to solve this potential weakness. I found a good-looking explanation here: http://en2.wikipedia.org/wiki/Quantum_cryptography There are more of them on the Net but I am too sleepy now :( > But crypto is not my field, so I do not speak with any level of > authority. To make the matter more complicated, crypto gets intertwined here with quantum physics. The principle of quantum key exchange lies in the inevitability of changing of a photon's state by observing it (don't ask me how it works, my quantum-fu isn't good enough yet, but a friend physicist said the theory is sound). To further complicate things, there are two areas (known to me) in quantum cryptography; one is quantum computing, potentially useful for eg. attacking RSA (if I remember well, it doesn't offer so much advantage against symmetrical ciphers, don't ask me why), and the other - like this one - is aimed to ensure secure communication links, impossible to wiretap without detection. In order to maintain the havoc and confusion, some journalists often mix the two up. I don't want to look as an expert here, though - all my related qualification is some brush with more esoteric parts of physics (almost a decade back), some admin-level playing with PKI and SSL, and Schneier's "Practical Cryptography" (excellent book, written from the implementation point of view, almost no math) I am about halfway through now. > > If an eavesdropper such as the National Security Agency, the FBI, or a > > criminal enterprise ever managed to find a much faster way to factor > > large numbers, the Internet's current security model would be > > vulnerable. Maybe it is. But if it is, then in most cases it won't be used against any but the highest profile adversaries, as the very knowledge it is broken has way too high strategical value. For now... > See statement above about underestimating NSA. > > I doubt there's much now which is not 'vulnerable'. I believe that for most practical purposes a well-implemented cryptography makes attack on the data en-route impractical, even if theoretically possible, and shifts the most vulnerable point to the communication endpoints, where the attack attempt is more likely to be detected. The time of supercomputers is very very expensive. A good old way of planting a pinhole camera into the smoke sensor on the ceiling over the keyboard, installing a keylogger into the computer, or other physical security exploit used for key recovery, may be much more effective for dealing with encrypted data. > And I believe anyone who relies on pablum like PGP probably is not > fooling many other than themselves. Why should PGP (or preferably GPG) be considered insecure? Presuming the physical key management is done well and the machine and the machine room aren't compromised? Is there a more secure alternative? What one and why is it better? > > Magiq's device is designed to solve that theoretical problem by tapping > > into the weird and counterintuitive laws of quantum physics, which say > > that it is impossible to eavesdrop on a transmission without disturbing > > it. > > The above statement, absent further qualifications, is untrue and any > professional would consider it absurd. It's quite heavily popular-science sounding statement, but from what I know about wuantum physics, it may be pretty well true. It's impossible to observe something without changing it. In macroscopic world we call the "reality" it's usually not big enough change to be observable. In quantum physics scale it pretty well may be. This is why it is so counterintuitive and tricky to understand. > > Magiq's Gelfond said he's offering "two flavors" of quantum encryption > > products. "Navajo is the commercial device, really meant for > > enterprise customers, which depending on the features, is $50,000 to > > $100,000 a box," Gelfond said. "Qbox is just a research device, a lab > > device, an open system that's completely configurable and does not do > > any encryption." Selling for $40,000 to $50,000, a Qbox uses a quantum > > link only for key distribution, and customers may add their own > > encryption. > > STEs are cheaper than this. STEs are "conventional" technology. > Sure sounds more like a corporate press release to me, seeking > investors, than a news item. May be; there is a big gap between theoretical background and real implementation. The devil will be in the latter here; the physics itself sounds promising. > But I could be wrong. Me too... ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 8021 From: Mitch D Date: Thu Nov 27, 2003 11:44am Subject: TSCM related article in Dec. Nuts and Volts Magazine Dec issue contains a "cliff note" article on tscm,written by david vine. The article revolves around Alinco scanners,and a few other products,there were quick references to ISA and Marty Kaiser. Happy Thanksgiving! MD __________________________________ Do you Yahoo!? Free Pop-Up Blocker - Get it now http://companion.yahoo.com/ 8022 From: Thomas Shaddack Date: Wed Nov 26, 2003 11:11pm Subject: Re: Re: Q Crypto On Wed, 26 Nov 2003, kondrak wrote: > Problem I see is that if you run "random" long enough, it starts to show > paterns. This is the most fundamental difference between generating random numbers algorithmically and physically. You never get reliably random numbers (in cryptographic sense) from any kind of algorithm (though long pseudo-random sequences that can be generated again can be useful eg. as testing inputs, or as stream ciphers). You can get cryptographical quality randomness from hardware sources; thermal noise of a Zener diode junction is the one I heard of most often. I also saw a construction of a random number generator made of a Geiger tube and a disassembled smoke detector (the one with little piece of americium or other radioactive isotope inside). Physically-generated random numbers typically still have some orderliness in them; the generator may be biased and produce more ones than zeroes, change the 1/0 ratio with 50 or 60 Hz period because of induced hum, have nonuniform distribution of output, etc; the noise isn't completely "white". But this has a solution too - you take the output and "whiten" it through a hash function; take eg. 256 or 512 or 1024 bits of input and run them through eg. MD5 hash function and use the resulting 128 bits as a truly random number. How many bits you use as input depends on the quality of your noise generator; the better it is, the lower input/output ratio is necessary. A faulty RNG can ruin otherwise perfect security system. RNG is a sttrategical part of an encryption device; if you manage to compromise it, so instead of white noise it produces a reproducible repeatable sequence, it still may behave "random" enough to pass the tests, but may be easy to exploit. Reportedly this venue of attack was already used; see eg. here: A good page about cryptographic randomness is at . A more practically oriented page is at , describing the hardware RNG on VIA motherboards, and their use (and drivers) in Linux. 8023 From: Jack Powers Date: Thu Nov 27, 2003 2:35am Subject: New guy on the list Hi- I'm new here and in response to "We suggest you introduce yourself on the list by listing (at least) your name, company, background and interests." here is some information about me: name: Jack Powers company: Powers Technical Services background: Programmer (22+ years with IBM), Network Engineer Product Manager interests: Embedded Control Systems Video RF (newbie) I joined this list hoping to learn how microprocessor control might add value to countersurveilance systems. I'll probably be very quiet, as I have a great deal to learn. 8024 From: Date: Thu Nov 27, 2003 7:41am Subject: The difference between an amater and a professional? An amateur plays with gadgets, a professional studies his instruments. For your entertainment, here is some SPAM I received today. ----- Inoltrato da Remo Cornali/dsi/enti centrali/rcs/it il 27/11/2003 14.36 ----- "Charlyn Coxum" Cc: Oggetto: cornali Anti-Spy Device Detects Hidden Cams 27/11/2003 05.27 Dear: cornali@r... (Embedded image moved to file: pic18467.gif) Gadget roots out hidden `pervert' cams Big Brother is here, big time. You may not know it but you may be watched in places where you'd expect privacy - such as dressing rooms, hotel rooms, tanning beds, private offices, public washrooms etc. Now there is a device that can detect the presence of a hidden camera or any device that emits an electronic signal. A woman can use this device to check their surroundings when she goes in a washroom or any place where a camera may be hidden. CLICK HERE for details. unsubscribe cornali lXS 506Z [Non-text portions of this message have been removed] 8025 From: Date: Thu Nov 27, 2003 11:50am Subject: Poll results for TSCM-L The following TSCM-L poll is now closed. Here are the final results: POLL QUESTION: Assuming that you were limited to a SINGLE piece of equipment for a bug sweep (RF segment only) which would you select. CHOICES AND RESULTS - Spectrum Analyzer, 15 votes, 71.43% - Scanlock, 1 votes, 4.76% - OSC-5000, 4 votes, 19.05% - CPM-700, 1 votes, 4.76% - Delta V, 0 votes, 0.00% - DAR, 0 votes, 0.00% - 2044, 0 votes, 0.00% - 2057, 0 votes, 0.00% - TRD-800, 0 votes, 0.00% - MSR-900 series, 0 votes, 0.00% - PR-700, 0 votes, 0.00% - EMC-25, 0 votes, 0.00% - EMC-35, 0 votes, 0.00% - RSSI-101, 0 votes, 0.00% - ESH, 0 votes, 0.00% - R-9000, 0 votes, 0.00% - PCR-100, 0 votes, 0.00% - PCR-100, 0 votes, 0.00% - R-8500, 0 votes, 0.00% - Spy Shop Gizmo, 0 votes, 0.00% For more information about this group, please visit http://groups.yahoo.com/group/TSCM-L For help with Yahoo! Groups, please visit http://help.yahoo.com/help/us/groups/ 8026 From: Date: Thu Nov 27, 2003 11:52am Subject: Poll results for TSCM-L The following TSCM-L poll is now closed. Here are the final results: POLL QUESTION: Who Do You Suspect of Having Planted the Eavesdropping Device in the Office of the Mayor of Philadelphia? CHOICES AND RESULTS - FBI, 5 votes, 35.71% - DOJ Integrity, 1 votes, 7.14% - Pennsylanvia State Police, 0 votes, 0.00% - Philadelphia Police Department, 0 votes, 0.00% - Member of the Mayors Bodyguard Detail, 1 votes, 7.14% - The Mayors Political Opposition, 0 votes, 0.00% - The sweep team that found it, 3 votes, 21.43% - An Outside PI, 0 votes, 0.00% - An amatuer, 4 votes, 28.57% - CIA, actung under order from the aliens living at aera 51, 0 votes, 0.00% For more information about this group, please visit http://groups.yahoo.com/group/TSCM-L For help with Yahoo! Groups, please visit http://help.yahoo.com/help/us/groups/ 8027 From: Date: Thu Nov 27, 2003 11:52am Subject: Poll results for TSCM-L The following TSCM-L poll is now closed. Here are the final results: POLL QUESTION: Do your belive that the Eavesdropping Device found in the Mayor of Philadelphia's office is a legitimate court ordered device? CHOICES AND RESULTS - Yes, 3 votes, 33.33% - No, 6 votes, 66.67% For more information about this group, please visit http://groups.yahoo.com/group/TSCM-L For help with Yahoo! Groups, please visit http://help.yahoo.com/help/us/groups/ 8028 From: Date: Thu Nov 27, 2003 11:53am Subject: Poll results for TSCM-L The following TSCM-L poll is now closed. Here are the final results: POLL QUESTION: How long would you say a typical bugsweep of one or two corporate offices and boardroom should take. CHOICES AND RESULTS - less then 15 minutes, 0 votes, 0.00% - 15 minutes to two hours, 0 votes, 0.00% - less than 4 hours, 1 votes, 5.26% - four to eight hours, 7 votes, 36.84% - eight to twelve hours, 2 votes, 10.53% - at least one full day (8+ hours), 3 votes, 15.79% - one to two days (12 to 24 hours), 4 votes, 21.05% - two to three days (24-36 hours), 1 votes, 5.26% - more than 3 days (over 36 hours), 1 votes, 5.26% - more than 5 days (over 60 hours), 0 votes, 0.00% For more information about this group, please visit http://groups.yahoo.com/group/TSCM-L For help with Yahoo! Groups, please visit http://help.yahoo.com/help/us/groups/ 8029 From: Date: Thu Nov 27, 2003 11:54am Subject: Poll results for TSCM-L The following TSCM-L poll is now closed. Here are the final results: POLL QUESTION: Do you feel that a TDR is a useful piece of TSCM equipment, or simply put... do you use a TDR? CHOICES AND RESULTS - The bells, the bells, the bells,the bells, the bells, the bells, the bells, the bells, the bells, the bells, the bells, the bells, the bells, the bells, the bells, the bells, the bells, the pentenabulations of the bells, 0 votes, 0.00% - Yes, and I feel that people who speak poorly of them are morons., 3 votes, 18.75% - Yes, they are great instruments., 5 votes, 31.25% - Yes, but I only use them is a client asked for it, and then only if they are watching, 0 votes, 0.00% - Yes, 5 votes, 31.25% - Sometimes, 0 votes, 0.00% - What's a TDR?, 0 votes, 0.00% - No, I do not use a TDR, 1 votes, 6.25% - No, but I would if I owned one, 0 votes, 0.00% - No, but I would use one if I knew what one was., 0 votes, 0.00% - No, I do not use them, they don't work, the earth is flat, I am a clueless moron., 2 votes, 12.50% - No, because my mommy/wife will not let me use her money to buy one,, 0 votes, 0.00% For more information about this group, please visit http://groups.yahoo.com/group/TSCM-L For help with Yahoo! Groups, please visit http://help.yahoo.com/help/us/groups/ 8030 From: Date: Thu Nov 27, 2003 11:53am Subject: Poll results for TSCM-L The following TSCM-L poll is now closed. Here are the final results: POLL QUESTION: When you go out to a clients location to perform a typical corporate bugsweep, how much weight (of tools and equipment) are to hauling to the location. CHOICES AND RESULTS - under 25 pounds, 0 votes, 0.00% - 25-50 pounds, 0 votes, 0.00% - 50-100 pounds, 0 votes, 0.00% - 100-250 pounds, 5 votes, 35.71% - 250-500 pounds, 2 votes, 14.29% - 500-1000 pounds, 2 votes, 14.29% - 1000-2500 pounds, 2 votes, 14.29% - 2500-5000 pounds, 1 votes, 7.14% - 5000-10000 pounds, 0 votes, 0.00% - over 10000 pounds (5 tons), 0 votes, 0.00% - Requires a Class A CDL, with airbrakes, doubles, triples, and such, 0 votes, 0.00% - Weight is not an issue, spy shop blinky boxesweigh almost nothing, 0 votes, 0.00% - I don't require any more than a frequency meter, it weighs less than my shoe, 0 votes, 0.00% - The voices in my head tell me when to find the bugs, so I don't need to waste time of equipment., 1 votes, 7.14% - What, do you have a problem with my fancy briefcase system?, 1 votes, 7.14% For more information about this group, please visit http://groups.yahoo.com/group/TSCM-L For help with Yahoo! Groups, please visit http://help.yahoo.com/help/us/groups/ 8031 From: Steve Uhrig Date: Fri Nov 28, 2003 2:21am Subject: Re: Q Crypto - I don't understand On 27 Nov 2003 at 10:20, David Alexander wrote: > The part about not being able to eavesdrop on a message without the > receiving party knowing is true. > Look up the Heisenberg Uncertainty Theorem which proves that you cannot > detect the actual physical position and status of an sub-atomic > particle without moving it from it's current state or position within > the electron shell or nucleus. There must be something I am not understanding here, esp the first sentence above. Definitely in the second as well. My company manufactures a pager intercept system (we call it the Beeper Buster). If I sit it on my desk, I can grab any pager or message off the air. The RF I grab and ultimately demodulate and process is passing through the room, walls, my body anyway, whether I happen to have the antenna connected the system's receiver or not. My metal ballpoint pen is picking up a similar amount of RF from the paging system transmitter as the short whip on the receiver of the Beeper Buster. Many/most pager messages anymore, at least in the U.S., are simulcast by anywhere from a few dozen to several tens of thousands of transmitters, on 9xx megacycles. Read the first sentence above. How can my intercepting a pager message off the air allow anyone to know I am doing so? I'm eavesdropping, but I'm doing nothing materially different than a standard pager programmed to the proper frequency and capcode of the target. By the same token, my pager intercept system converts no more RF to electricity than my metal ballpoint pen. I well admit I don't understand all the math and theory, but just taking the simple statement above, apparently I don't understand a basic concept. I could name numerous intercept techniques where I don't believe, in actual practice or even pure theory, the fact I am intercepting could be known by technical means. ??? Please keep explanations fairly simple as I am not conversant in quantum physics. Now I will go back to my work on the Unified Field Theory. Steve (does the name Pavlov ring a bell?) ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8032 From: Andrus Aaslaid Date: Fri Nov 28, 2003 8:27am Subject: RE: Re: Q Crypto (Random numbers quality) Random number quality control is quite tricky. Most hardware random generators give feeds what are long strings of ones and zeros. This practically eliminates occurances like 0x55 or 0xAA from the output. You always have to hash the output of the hardware generator for that reason. This, however, may lead to random what bases on hach algorithm only, when generator fails and starts outputing zeros or ones only. One solution we had for detecting if hardware random number generator is working properly was to gzip the feed and see, if the 10K pieces did compress a reasonable amount. If they did, the generator was considered to be faulty (too long strains of 1's and 0's). If gzip test succeeded, we hashed the feed and counted all the digit (0x00-0xFF) occurances and in a long run expected the numbers to appear with the close probability. Regards, Andrus. > -----Original Message----- > From: Thomas Shaddack [mailto:tscm-l@s...] > Sent: Thursday, November 27, 2003 7:12 AM > To: kondrak > Cc: David Colton; TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] Re: Q Crypto > > > > On Wed, 26 Nov 2003, kondrak wrote: > > > Problem I see is that if you run "random" long enough, it starts to > > show paterns. > > This is the most fundamental difference between generating > random numbers algorithmically and physically. You never get > reliably random numbers (in cryptographic sense) from any > kind of algorithm (though long pseudo-random sequences that > can be generated again can be useful eg. as testing inputs, > or as stream ciphers). You can get cryptographical quality > randomness from hardware sources; thermal noise of a Zener > diode junction is the one I heard of most often. I also saw a > construction of a random number generator made of a Geiger > tube and a disassembled smoke detector (the one with little > piece of americium or other radioactive isotope inside). > > Physically-generated random numbers typically still have some > orderliness in them; the generator may be biased and produce > more ones than zeroes, change the 1/0 ratio with 50 or 60 Hz > period because of induced hum, have nonuniform distribution > of output, etc; the noise isn't completely "white". But this > has a solution too - you take the output and "whiten" it > through a hash function; take eg. 256 or 512 or 1024 bits of > input and run them through eg. MD5 hash function and use the > resulting 128 bits as a truly random number. How many bits > you use as input depends on the quality of your noise > generator; the better it is, the lower input/output ratio is > necessary. > > A faulty RNG can ruin otherwise perfect security system. RNG > is a sttrategical part of an encryption device; if you manage > to compromise it, so instead of white noise it produces a > reproducible repeatable sequence, it still may behave > "random" enough to pass the tests, but may be easy to > exploit. Reportedly this venue of attack was already used; see eg. here: > A good page about cryptographic randomness is at . A more practically oriented page is at , describing the hardware RNG on VIA motherboards, and their use (and drivers) in Linux. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 8033 From: Steve Uhrig Date: Fri Nov 28, 2003 10:40pm Subject: Thomas Habets front and center Thomas -- I replied to your mail. My message bounces with a fatal error, sent to: thomas@h... SMTP error from remote mailer after MAIL FROM:: host mail.darkface.pp.se [195.100.131.90]: 550 5.7.1 Access denied ========== Pse contact me with a different email address, or when this one is fixed, so I can resend my msg. Tks .. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8034 From: William Knowles Date: Sun Nov 30, 2003 3:17pm Subject: Mics Found At Santa Barbara Sheriff's HQ http://www.local6.com/news/2671587/detail.html POSTED: 9:15 a.m. EST November 30, 2003 UPDATED: 9:36 a.m. EST November 30, 2003 SANTA BARBARA, Calif. -- Sheriff's officials said several wireless microphones discovered outside their headquarters could be the latest of several attempts by journalists to surreptitiously get information on the Michael Jackson molestation case. The devices were found in a brushy area where Sheriff's Department employees frequently take breaks and where reporters are not normally allowed. Officials did not say when they discovered the microphones. "It is being interpreted by the department as an attempt by somebody within the media to garner information that otherwise would not be available," Sgt. Chris Pappas of the Santa Barbara County Sheriff's Department, said Saturday. Hundreds of reporters and photographers converged on the Sheriff's Department on Nov. 20, when Jackson was booked at a nearby jail on suspicion of sexually molesting a child under 14. The entertainer, who is free on $3 million bail, has maintained his innocence. Authorities say he probably won't be charged until after Dec. 15. A man claiming to be a news and photo agency reporter was arrested Nov. 20 after Jackson's security staff found him aboard the entertainer's private plane while Jackson was surrendering to authorities. Last week, Jackson and his lawyer learned they were secretly videotaped by a camera hidden aboard the plane when Jackson traveled from Las Vegas to Santa Barbara to turn himself in. The discovery triggered an FBI investigation and a lawsuit by Jackson against the charter jet company. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ---------------------------------------------------------------- C4I.org - Computer Security, & Intelligence - http://www.c4i.org ================================================================ Help C4I.org with a donation: http://www.c4i.org/contribute.html *==============================================================* 8035 From: Mitch D Date: Mon Dec 1, 2003 9:09am Subject: Stolen Wells Fargo Laptop recovered > November 27, 2003 > By Reuters > > Police have arrested a California man in connection with a burglary in > which a computer with sensitive information about Wells Fargo > customers was stolen, officials said Wednesday. > > Edward Jonathan Krastof, 38, was arrested at his home late on Tuesday > in Concord, Calif., the same town where the computer was stolen > earlier this month, said Concord Police Sergeant Steve White. > > Krastof, who works at Home Depot, confessed to stealing the computer, > as well as another computer and a laptop, after breaking into the > office of an analyst for Wells Fargo, White said. > > Police recovered the equipment at Krastof's home, along with equipment > used for scanning identity cards and checks, he said. > > "He is a low-level ID theft kind of guy," White said of Krastof. ===== Mitch Davis TSCM/Special Operations Group Inc. Antioch,TN.USA MitchD@t... website:www.tscmusa.com. Tel (615)837-9933 Cell(615) 584-9933 __________________________________ Do you Yahoo!? Free Pop-Up Blocker - Get it now http://companion.yahoo.com/ 8036 From: srhayes3 Date: Mon Dec 1, 2003 1:15pm Subject: On matters of Forensics and other topics. I had a weird dream the other day that put this question in my mind and I thought maybe someone in the group could answer it. Are the forensic computer analysis techniques used on common storage mediums i.e, floppy disk,CDroms, hard drives, the same techniques that would be used to recover images from digital camera storage cards that have been deleted (assuming no other pics have been overwritten on the card)? Second query, am I being overly paraniod by thinking that the "Onstar" system featured in over 50 GM vehicles would make it relatively simple for an easedropper to "spy" on the vehicles owner by listening in on conversations as well as tracking their movement with very limited modifications to the factory wiring and installation? Would the primary functions of this system (which incidently would be the EXACT thing an easedropper would use it for) make it dificult for a TSCMer to determine any technical penetrations to the system? Samuel R Hayes III ,NCLAMN. NCLAMN= No Cool Letters After My Name 8037 From: Hawkspirit Date: Tue Dec 2, 2003 8:04pm Subject: Historical Bug Sweep Article Another historical bug sweep article. The Battle of the Bugs Newsweek, April 20, 1987 The embassy wars offer lessons in mismanagement-and more than enough blame to go around. http://bugsweeps.com/info/battle_of_bugs-newsweek-04-20-87.html 8038 From: Hawkspirit Date: Wed Dec 3, 2003 2:17pm Subject: Sweep Needed Can someone handle a sweep in Tulsa Oklahoma? Email me directly. Roger 8039 From: Hawkspirit Date: Thu Dec 4, 2003 10:46am Subject: Unit Anybody know the principle of operation on these units? Roger http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=2578689997&category=25397 8040 From: Steve Uhrig Date: Thu Dec 4, 2003 11:35am Subject: Re: Unit On 4 Dec 2003 at 8:46, Hawkspirit wrote: > Anybody know the principle of operation on these units? > http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=2578689997&category > =25397 Above translates to: http://tinyurl.com/xq4j for convenience. I encourage people to visit, bookmark and use www.tinyurl.com. In a few seconds you can prevent line overflows on long URLs and make it more convenient for people to visit websites referenced in an email. Re the mentioned device, first of all their claims are a lie. The thing will not defeat all known wiretap devices. Maybe all those known to the guy who wrote the ad. The thing seems to have three functions: 1)Digital voltmeter 2)Noise generator 3)Voltage multiplier or voltage shifter ========== #1 is obvious. Its utility is questionable, especially to a novice. #2 injects noise into the line whenever the phone is not in use, to trip a VOX of an attached recorder and run it out of tape quickly. The one I saw used a PN junction of a transistor as the noise source. Only two leads of a transistor were connected. I think this uses avalanche noise of the junction breaking down, but I am not an atomic physics type and it's been a long time since I studied this stuff. This technique would be effective against crude VOX recorders. #3 is intended to prevent tape recorder and similar line start devices from activating. These work by detecting the voltage drop when the phone goes off hook, and starting a recorder when it does. Some parallel transmitters operate this way too. I suspect the mentioned device uses a voltage multiplier stage of some sort to raise artificially the phone line off hook voltage, theoretically above the point where the attached wiretap would activate. This could be effective against crude devices. It would not be effective against our #5710 line start, as we sense a change in voltage, not an absolute voltage using a Zener as practically all other devices do. It won't defeat AID's line start either, although theirs uses batteries and a relay. You can inject all the voltage you want to, and if the phone company central office can still go off hook, our line start will activate. You can't prevent all delta voltage (change) between on hook and off hook status or the phone company central office wouldn't activate when you go off hook. This thing must take a guess at where most cheap line starts, like the Radio Shack one, trips, and they keep the voltage above that by injecting something back into the line. It's a clever design to do all this from line power. Offhand I can't think of how to do all these functions unless they store power in a slow charged battery or something, maintained by the high on hook voltage. Haven't given it much thought. You don't have much to work with when the phone is off hook. The alleged claim of a shift in crystal controlled transmitter frequency probably is hype too. Poorly designed free running LC (L = inductance and C = capacitance, for the novices) transmitters will shift in frequency with a voltage change, but crystal controlled units or units with a buffer stage will not. Even very inexpensive LC units like Winston Arrington's, which are voltage regulated, would not be affected by any attempt to wiggle the voltage and shift an oscillator frequency. And even if the oscillator did shift, any decent receiver will have an AFC which could follow. Summary: the thing is a typical piece of hyperbole spy crap. It may be somewhat effective against certain toy wiretaps. It will be completely ineffective against anything even knocking on the door of professional grade. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8041 From: mpaulsen6 Date: Thu Dec 4, 2003 3:06pm Subject: Re: Traffic Speed Detection Try submitting a discovery request with your county, you might get some information. I'm not certain if you need active litigation for a discovery request or not. --- In TSCM-L@yahoogroups.com, "Ocean Group" wrote: > Does anyone on the list have any experience with fixed speed detection > systems? > > Or know of any companies or manufacturers of this type of system? > > Appreciate any input > > Regards > > Oisin 8042 From: Mitch D Date: Fri Dec 5, 2003 0:18pm Subject: Hidden Video litigation The way this case is being handled is interesting to say the least.Especially when there's 13 million dollars at stake: md NOVEMBER 27 - DECEMBER 4, 2003 -- CITY LIMITS Courtroom Penalty Attorneys for Predators and Powers play hardball with the Kats cheerleaders By Matt Pulle It's been a hidden and tawdry subplot to the ongoing $13 million lawsuit filed by 12 former Nashville Kats cheerleaders against the Nashville Predators and its sister company, Powers Management: Lawyers for the NHL franchise and Powers, which manages the Gaylord Entertainment Center where the Kats once played arena football, have asked the women a series of invasive questions during discovery for the case, which goes to trial next April. Defense attorney Rose Cantrell even interrogated one of the former cheerleaders about whether the woman had contracted a venereal disease from her boyfriend. The answer was "no." What that has to do with the case of cameras found in the Kats locker room is anyone's guess. If the plan was to rattle the women into dropping their suit, it didn't work. "After their initial sense of violation, those kinds of questions ended up steeling their resolve to hold the Predators and Powers accountable for their conduct," says Mark Chalos, the attorney for the plaintiffs. This whole unseemly episode began in July 2001 when two employees--one working for the Predators, the other for Powers Management--allegedly installed a secret video camera in a locker room used by the Kats cheerleaders. Two other employees discovered the camera and informed management, including then-arena president Russ Simons. After a one-day investigation led by attorney Hal Hardin, Powers Management discovered the two camera culprits and fired them. After the tapes were seized, four male arena employees reviewed the videotapes, which showed the women undressing. They then took their findings to district attorney Torry Johnson, who allowed Hardin to destroy the tapes. While Johnson pursued criminal charges in a similar case involving a female victim whose family lived in an affluent Green Hills neighborhood, he declined to do so in this case. Nor did he consult with the cheerleaders, who learned that they had been videotaped undressing only after the press, including the Scene, picked up the story. Shortly afterward, the cheerleaders sued John Day and Jimmy Corn, the two employees accused of installing the cameras, and Powers Management, the company that manages the Gaylord Entertainment Center. They later added the Predators to the lawsuit when they discovered that Corn worked for the NHL franchise. Earlier this month, Judge Hamilton Gayden denied a motion to dismiss the case, but he did throw out some of the plaintiff's claims, including one accusing Predators and Powers of outrageous conduct in their handling of the tapes. Gayden also defended the decision to destroy the videotapes. "I would say that the families, husbands and brothers of the cheerleaders are grateful for that," he said, seeming to forget about the female plaintiffs, who might have an opinion of their own about the matter. Everyone agrees that the cheerleaders weren't responsible for what happened. But during depositions, attorneys for the Predators and Powers peppered the women with all sorts of hard-line questions. Here's one typical exchange between Deborah Smith, one of the attorneys for Powers, and a cheerleader she interviewed: Q: "I've asked everyone this question, and I don't like it. Have you ever posed nude?" A: "No, I have not." Q. "Posed topless?" A. "No, ma'am." Q. "Worked in a strip club?" A. "No, ma'am." Q. "Now you're one of the bunch; I've asked everybody." In another deposition, Powers attorney Winston Harless, who received his undergraduate degree at David Lipscomb University, a Church of Christ institution, struggled to ask one of the women a sexual question. Appropriately, the woman didn't make it easy on him: Q. "You testified about these private acts that you believe may have been taped by this hidden camera, and you've gone through a whole list of those things that you believe or that you've categorized as being inappropriate or as private acts, rather, I'm sorry. I take it that that does not include any inappropriate behavior between any of the cheerleaders. Is that correct?" A. "I don't understand your question." Q. "There was no inappropriate, in your mind, inappropriate behavior going on between any of the cheerleaders. Is that correct?" A. "I still don't know what you mean by your question of inappropriate behavior." Q. "OK. Behavior between one woman and another woman that maybe they wouldn't want to be seen in public--kissing or whatever, that kind of thing." A. "There was no kissing going on that I know of." Harless, who worked as a theater professor before going to law school later in life, asked the cheerleaders a few rather voyeuristic questions. Q. "But there were times during the dance routines that the choreography that you rehearsed required you to shake the upper portion of your body to where your breasts would be featured?" A. "I don't think there was ever specific choreography." Q. "Was there ever a point where...the choreography required you to shake your backside?" A. "No." Harless also peppered one cheerleader with a hat trick of invasive questions. He asked if she had ever undergone breast augmentation surgery, if she had been photographed in the nude or if she ever worked in a strip club. The answer to all three questions was "no." What does any of this have to do with whether the Predators and Powers bear at least some responsibility for the secret videotape in the cheerleaders' changing room? Cantrell and Harless, unlike the cheerleaders they deposed, declined to talk about the case with the Scene. Cantrell, who, incidentally, served as the first female judge in Davidson County, instead sent a rather lawyerly e-mail defending her approach to the case. "Each and every question I asked on behalf of the Nashville hockey club was in accordance with the Tennessee Rules of Civil Procedure and the scope of discovery defined therein." Gerry Helper, a spokesperson for the Nashville Predators, didn't return messages asking him whether Predators and Powers owner Craig Leipold approves of his attorneys' approach to this case. Other lawyers have suggested that Cantrell and Harless are merely trying to limit the amount of punitive damages the plaintiffs are seeking--the theory being that, right or wrong, a jury might not be as likely to empathize with a woman who was secretly videotaped if she was a stripper. "If one works at Deja Vu, perhaps the damages might not be considered as great as for an organist for a church," says Jim Weatherly, an attorney at Hollins, Wagster & Yarbrough and a former public defender. So then why does it matter if one of the women contracted a venereal disease? "I'm not sure where that was going, unless there's some suggestion that she's engaging in reckless sexual activity," Weatherly says. "If she's hitting all the bars and going home with everyone she meets, that could be found by a court and jury to go back to the issue of damages and the value of the invasion of her privacy." Weatherly says that these questions are on the verge of being disallowed by courts, and would generally require some explanation to be justifiable. "It's the job of the defense lawyers to make sure that a plaintiff is fully challenged on claims of both liability and damages, but the court will draw the line should it appear the purpose is more to intimidate and harass the plaintiff," he says. Chalos says that none of the answers the cheerleaders provided could possibly be used against them. Besides, Judge Gayden said that he wouldn't allow many of those questions in court, including the one about venereal disease. "Even if she does [have VD], I wouldn't let that go to the jury," he said in a recent ruling. In fact, the hardball defense strategy may backfire. After the depositions, Chalos referenced many of the questions asked by the defense as part of his argument for punitive damages. Asking women all sorts of graphic, irrelevant questions is just another example of how the Predators and Powers management mistreated his clients, Chalos argues. At the hearing, Gayden ruled that the plaintiffs are entitled to make that argument. "They were certainly disturbed by those questions," Chalos says. "They felt like the Predators and Powers were victimizing them all over again." Linda Manning, a senior lecturer in women's studies at Vanderbilt University, says that the questions posed by the defense lawyers are reminiscent of a time when the justice system stigmatized women in rape and sexual abuse cases. "Unfortunately, when woman are victimized, our culture attempts to normalize that by first denying it happened and then blaming the victims," she says. "I'm outraged that this continues to occur." ===== Mitch Davis TSCM/Special Operations Group Inc. Antioch,TN.USA MitchD@t... website:www.tscmusa.com. Tel (615)837-9933 Cell(615) 584-9933 __________________________________ Do you Yahoo!? Free Pop-Up Blocker - Get it now http://companion.yahoo.com/ 8043 From: Steve Uhrig Date: Fri Dec 5, 2003 7:54pm Subject: CPM-700 for sale Hello all, Available for sale is a CPM-700 kit in excellent condition with a the most desired accessories and probes. It was unpacked and played with once but never used. I have thoroughly checked every aspect of operation and it's perfect. With the probe extended and the unit set on high sensitivity, it's hearing foreign shortwave broadcast stations. If it can hear transmitters on other continents, you can be sure it will hear a surveillance transmitter in an area you're sweeping. It's a late serial number black front unit with following accessories: ============= * CPM-700 * Black ballistic nylon carrying case with pouches for all accessories * Adjustable shoulder strap * All instruction manuals * 8 wire banjo and LAN adapter cable * Active antenna probe with cable * Acoustic leakage probe * Magnetic leakage probe (claimed by REI as useful for locating transmitters and video cameras) * VLF filter/subcarrier adapter for wireline and power line * 12VDC power supply and charger for 110VAC (220VAC optional on request) * New nicad batteries * Low acoustic leakage headphones * Audio patch cable with alligator clips * Audio cassette training tape with examples of what bugs would sound like on the unit when detected * My guarantee of perfect operating condition ================== There is one negative thing about the unit. It had been purchased by a foreign government and they scratched an agency property number into the side. It is nine digits, scratched into but not through the paint, and barely is noticeable. I do need to mention it though. The digits are about as high as a paper match is wide. I can remove this number if the buyer wishes, but in doing so I will have to remove paint down to bare metal and it's really nearly invisible as it is. The unit comes with rechargeable batteries which ran it all day for me in testing, but you can use alkaline AA cells if you prefer, or even run it off AC mains if you so desire. A switch inside the battery compartment selects nicad or alkaline batteries. Most know the CPM-700 as a world standard in basic RF TSCM gear. It also has applications for audio inspection as well, with the internal audio amplifier, patch cord to connect to suspicious wiring, and acoustic leakage probe. An average street price for this package with all mentioned accessories and options is $2995. My price is $1850. I take credit cards and will ship to any non-embargoed country. If you will be purchasing this to use outside the U.S., please let me know if you will need a 220 volt mains power supply/charger instead of the 110 volt unit and I will substitute at no cost. These units are popular and go fairly quickly. Now is a good time to make capital investments and take a tax deduction, before the end of the year. Full specs on the CPM-700 and accessories can be found here: http://tinyurl.com/he2y Holler if questions or if you are interested. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: Charles@t... Date: Sun Nov 26, 2000 5:11pm Subject: Re: Plus Guard electronic bug finder? Looks like another $5 rf detector. I like the fine print on the ad: <<<" NOTE: RF (Radio Waves) from various sources can cause false alarms: TVs, CELL/PCS Phones, 2-way pagers, 2-way radios, computers, etc. can give off RF. * Read the instructions completely and contact a counter-surveillance professional if needed. ">>> charles ----- Original Message ----- From: "Jordan Ulery" To: "TSCM" Sent: Sunday, November 26, 2000 8:16 PM Subject: [TSCM-L] Plus Guard electronic bug finder? > Has anybody heard of this instrument? > > Subject: Plus Guard Electronic Bug Finder > > Message=You have received this email because the above > person has recommended The Plus Guard to you! The Plus > Guard will find Hidden Cameras and Eavesdroppers BEFORE > your privacy is Invaded! Calm your fears of > being under surveillance by peeping toms or stalkers! I > suggest you click on this link and give them a visit. > http://www.theplusguard.com > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > 1983 From: James M. Atkinson, Comm-Eng Date: Sun Nov 26, 2000 10:59pm Subject: Re: Plus Guard electronic bug finder? At 8:16 PM -0500 11/26/00, Jordan Ulery wrote: >Has anybody heard of this instrument? > >Subject: Plus Guard Electronic Bug Finder > >Message=You have received this email because the above >person has recommended The Plus Guard to you! The Plus >Guard will find Hidden Cameras and Eavesdroppers BEFORE >your privacy is Invaded! Calm your fears of >being under surveillance by peeping toms or stalkers! I >suggest you click on this link and give them a visit. >http://www.theplusguard.com Yes, I have several of them, and have evaluated them in both a laboratory and field environment. In my professional opinion they are shit, fairly worthless, you might as well be using a poached salmon fillet to find bugs. -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 1984 From: Jordan Ulery Date: Mon Nov 27, 2000 9:19am Subject: Plus Guard Succinct answer to the question was provided, thank you. Info was posted under the theory of 'know your enemy.' 1985 From: Nick Krasnostup Date: Tue Nov 28, 2000 4:06am Subject: New generation of security software. ANNA ltd - Independent Security Software Developer presents new generation of security software: ------------------------------------------------- Invisible Files 2000 Professional(IF2000Pro) v5.0 ------------------------------------------------- IF2000Pro is a general-purpose security program that allows to protect confidential information on your computer. Main difference of our product from other similar software is invisibility of your information for unauthorized user. Similar explotable software uses password restriction algorithm to protect information. But if there is visible password protected information (or software to protect it), somewhere there is password itself (or software keeping it), what is cause to search one using big variety of appropriated tools (monitoring software, Trojans and so on). In contrast to others our product just makes information invisible both for unauthorized user and for operational system itself. What is more IF2000Pro itself is invisible as well so nothing can detects presence of your private information on computer. There is no cause - there is no desire for searching of anything. For more details please go to our site: http://www.softsecurity.com/ Best regards, Nick Krasnostup mailto:nick@s... ================================================== ANNA ltd - Independent Security Software Developer http://www.networkremotemonitor.com http://www.softsecurity.com http://www.keyloggers.com http://www.pcacme.com 1986 From: A Grudko Date: Tue Nov 28, 2000 4:23am Subject: Re: Plus Guard snack ----- Original Message ----- >>Has anybody heard of this instrument? > In my professional opinion they are shit, fairly worthless, you might > as well be using a poached salmon fillet to find bugs. At least you can eat the smoked salmon after the sweep. An esteemed colleague here in South Africa recently found a very nicely modified and well installed commercial device in a very high sensitivity environment. The matter is current so we cannot say more at this point, but what I found interesting is that it uses 1980s NBFM and Xtal technology. Not an IC in sight when there's so much more advanced equipment out there. Of course, this could have been a 'red herring' to stop us looking further. All this talk of salmon and herrings has made me hungry for a plate of good old British fish 'n' chips ('ey mate, you want that wiff PNP and Germanium or just the silicone in the chips?). Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 1987 From: Date: Sun Nov 26, 2000 0:28pm Subject: Pre-Owned books for sale "Pre-owned" books for sale. In new condition unless otherwise noted Telephone Repair Illustrated (1993) TAB Hardcover, 220 pages $10.00 postpaid Build your own short-wave antennas (1994) TAB Paperback 208 pages, illustrated $10.00 postpaid Tuning into RF Scanning (1994) TAB Hardcover 145 pages illustrated $10.00 postpaid Now Hear This (1997) Electronic eavesdropping equipment design by Winston Arrington 126 pages. Used, cover lightly scratched. $22.00 postpaid 2600 Magazine, 12 issues: Fall 96, Fall 98, Winter 99, Summer 96, Spring 97, Spring 98, Summer 98, Fall 98, Winter 98, Spring 99, Summer 99, Fall 99 Blacklisted 411, Aug 96, Jan 98 $50.00 for the lot postpaid slight damage to two copies Fundamentals of Electronic Countermeasures Technology W. Davis, Cptn. USAF Spiral bound, 81 pages Date unknown; old, some damage, perfectly readable $7.00 postpaid The Paper Trip III Barry Reid, Eden Press 1998 Paperback 160 pages $15.00 postpaid How to get anything on anybody Book II Paperback 223 pages Used, cover scratched $16.00 postpaid CIA Flaps & Seals Manual $5.00 postpaid Guns, Bullets and Gunfights 1996 Paperback 118 pages $7.00 postpaid Television Gray Market Index Publishing 1993 Paperback 163 pages $5.00 postpaid. Cellular Radio Principles & Design Hardcover 1993, 212 pages $5.00 postpaid Vengeance Is Mine 140 pages, revenge humor ala Hayduke. $7.00 postpaid Or lot sale, all 24 titles $150.00 prepaid UPS ground. Money order, please. Send Email if interested 1988 From: Date: Sun Nov 26, 2000 0:49pm Subject: New Books For Sale by Author Don't Bug Me The Bug Book The Phone Book Surveillance and countermeasures. Autographed free if requested. Details at www.fusionsites.com in the Lysias Press directory. M L Shannon 1989 From: Date: Mon Nov 27, 2000 10:48am Subject: Books for sale by author Books for sale by author The Bug Book, on surveillance transmitters The Phone Book, about phones, wiretapping, cellular monitoring, etc. Don't Bug Me, an overview of surveillance Details at http://www.fusionsites.com/Lysias/My_Books/my_books.html Autographed free if desired. Writer34us@y... 1990 From: Gerard P. Keenan Date: Mon Nov 27, 2000 4:30pm Subject: Need some computer help Sorry for the cross-postings, but I need some help with something that has me rather confused. I maintain a regulated, restricted mailing list on anti/counter terrorism with 45 subscribers in 7 countries. Most of the subscribers are with government agencies in 3 countries, are heads of major international corporations' security departments, or are with large private security firms. Only 5 of these 45 subscribers use AOL as their server. Now my question is this. For the past couple of weeks I've been getting "bounced-back" or returned mail from aol addresses. Not too unusual; except for the fact that the three addresses that keep getting kicked back to me don't exist anywhere in my address book -- either as individual addresses or as members of the list. I've already cleared out my delete box, but just got one of those bounced back to me yet again. Here's the address -- frankwe911@a.... I have no idea who this is, where it is, or anything else about it. It does not exist on my list, nor anywhere else in my address book. I can't remember the other two. I was wondering if any of you computer gurus out there might have a theory about this. Is this just some kind of glitch at AOL (this is the only server that this happens with -- no other emails are returned from any other server)? Or is it something that I should be concerned about? Thanks for any assistance. Jerry Keenan GPKeenan Co., Int'l Security Services West Islip, NY 11795 [Non-text portions of this message have been removed] 1991 From: Kohlenberg, Toby Date: Tue Nov 28, 2000 11:34am Subject: RE: Vulnerability Scanner discussion- was RE: Overview Thanks for the references. The SecurityExpressions looks similar to AdvancedChecker by Trusted Systems. They are excellent products but are focused on Windows. For environments where we have only one OS to worry about, we use products that nail those OS's completely, but for multi-OS coverage, my initial statement about products stands. STAT is again, a single OS product. I haven't used ForixNT, I will take a look. Toby > -----Original Message----- > From: Talisker [mailto:Talisker@n...] > Sent: Monday, November 20, 2000 9:49 AM > To: TSCM-L@egroups.com > Subject: Re: Vulnerability Scanner discussion- was RE: > [TSCM-L] Overview > > > Toby > For Win32 agentless > Take a look at SecurityExpressions from Pedestal, this may > meet your needs, > it comes with various ready written config files, the best is > the US Navy > file. Though since it was written the products has been > improved it will > now delete files on the target machines as well as checking > their versions. > It does need some tweaking to meet a policy but this is > trivially easy - It > doesn't require agents and the vendor support is excellent > > STAT A little more pricey than SE and from the short time I > spent on it not > quite as tuneable, it's range of checks is good including a dictionary > attack. The reports are great enough to impress any manager > > ForixNT - I haven't looked at it but have heard some good > things about it > > Andy > http://www.networkintrusion.co.uk > Talisker's Network Security Tools List > ''' > (0 0) > ----oOO----(_)---------- > | The geek shall | > | Inherit the earth | > -----------------oOO---- > |__|__| > || || > ooO Ooo > talisker@n... > > The opinions contained within this transmission are entirely > my own, and do > not necessarily reflect those of my employer. > > > > > > ----- Original Message ----- > From: "Kohlenberg, Toby" > To: > Sent: Sunday, November 19, 2000 10:31 PM > Subject: Vulnerability Scanner discussion- was RE: [TSCM-L] Overview > > > > > -----Original Message----- > > > From: Talisker [mailto:Talisker@n...] > > > I disagree > > > > > > By their nature vulnerability scanners cannot scan for > > > vulnerabilities they > > > don't know about (in this they maybe described as an > > > automated checklist)- > > > However as someone who occasionally has to manually audit > networks for > > > vulnerabilities, these automated tools can be a godsend. > > > > I don't see this as disagreement. I am often in a situation where > > a vulnerability scanner of one sort or another takes my job from > > the impossible range to the merely improbable. :) > > The reason I looked at a number of them this summer is because I > > was unsatisfied with the one that our team had been using and wanted > > to settle the debates and find the best one to meet our needs. > > For our purposes, non-agent based scanners were our focus- we need > > a scanner that doesn't require having something on every host. As > > well, as Andy mentioned, there are a couple products where, at > > least with WinXX, if you provide an administrative account, they > > can do a great deal of the local checking as well. > > > > My statement was not intended to imply no worth, just limited worth. > > The problem shows up when people start believing everything their > > scanner tells them. Even the best ones are not always up to date > > and none of them can truly manage the level of correlation that a > > trained person can do. > > > > So long as you only use them to help gather data that you can expand > > on, they are not just okay but absolutely essential for > large pen tests > > or audits. It is when you take the findings as absolute and don't > > bother to go beyond them that you run into problems. > > > > Toby > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > -------------------------- eGroups Sponsor > -------------------------~-~> > eLerts > It's Easy. It's Fun. Best of All, it's Free! > http://click.egroups.com/1/9699/0/_/507420/_/974820399/ > -------------------------------------------------------------- > -------_-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1992 From: Bryan Herbert Date: Sun Nov 26, 2000 7:52pm Subject: Re: Plus Guard electronic bug finder? Thats basically what it is... Various electronic shops sell them as cell phone/pager accessories for when you have your device on "mute". I bought one from the Ham Radio Outlet and mounted it in my car, so whenever my phone rings or I talk on one of my ham rigs it produces a nice little light show :) TSCM Rule #2: Never buy equipment attached to a key chain ;) "Charles@t..." wrote: > Looks like another $5 rf detector. > I like the fine print on the ad: > <<<" > NOTE: RF (Radio Waves) from various sources can cause false alarms: > TVs, > CELL/PCS Phones, 2-way pagers, 2-way radios, computers, etc. can give > off > RF. > * Read the instructions completely and contact a counter-surveillance > professional if needed. > ">>> > > charles > > > ----- Original Message ----- > From: "Jordan Ulery" > To: "TSCM" > Sent: Sunday, November 26, 2000 8:16 PM > Subject: [TSCM-L] Plus Guard electronic bug finder? > > > > Has anybody heard of this instrument? > > > > Subject: Plus Guard Electronic Bug Finder > > > > Message=You have received this email because the above > > person has recommended The Plus Guard to you! The Plus > > Guard will find Hidden Cameras and Eavesdroppers BEFORE > > your privacy is Invaded! Calm your fears of > > being under surveillance by peeping toms or stalkers! I > > suggest you click on this link and give them a visit. > > http://www.theplusguard.com > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > > eGroups Sponsor [click here] > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- Bryan Herbert (661) 714-2611 AIM: EAVE5DR0P ICQ: 92114706 http://www.geocities.com/b_herbert_91321/index.html 1993 From: Miguel Puchol Date: Tue Nov 28, 2000 3:20pm Subject: RE: Need some computer help Gerard, Maybe one of the list members has set their mail server account on some kind of out-of-office reply. If you maintain your list with a third party server, make sure they have not subscribed these addresses mistakenly onto your list instead of some other one. With a list carrying a subject like yours, I'd be sure to use a trusted mailing list server. Another option is that some of your members have their email forwarded to an AOL address, and that the mail server from AOL rejects (for whatever obscure reason) the messages, but back to the original source, you. Could you give a more detailed description on the returned emails - the reason, no such address, etc? Just some thoughts, hope you get it sorted! All the best, Mike -----Mensaje original----- De: Gerard P. Keenan [mailto:gkeenan@s...] Enviado el: lunes, 27 de noviembre de 2000 23:30 Para: TSCM-L@egroups.com; PRIVATE-EYE; execprotection@egroups.com Asunto: [TSCM-L] Need some computer help Sorry for the cross-postings, but I need some help with something that has me rather confused. I maintain a regulated, restricted mailing list on anti/counter terrorism with 45 subscribers in 7 countries. Most of the subscribers are with government agencies in 3 countries, are heads of major international corporations' security departments, or are with large private security firms. Only 5 of these 45 subscribers use AOL as their server. Now my question is this. For the past couple of weeks I've been getting "bounced-back" or returned mail from aol addresses. Not too unusual; except for the fact that the three addresses that keep getting kicked back to me don't exist anywhere in my address book -- either as individual addresses or as members of the list. I've already cleared out my delete box, but just got one of those bounced back to me yet again. Here's the address -- frankwe911@a.... I have no idea who this is, where it is, or anything else about it. It does not exist on my list, nor anywhere else in my address book. I can't remember the other two. I was wondering if any of you computer gurus out there might have a theory about this. Is this just some kind of glitch at AOL (this is the only server that this happens with -- no other emails are returned from any other server)? Or is it something that I should be concerned about? Thanks for any assistance. Jerry Keenan GPKeenan Co., Int'l Security Services West Islip, NY 11795 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 1994 From: Dawn Star Date: Tue Nov 28, 2000 7:14pm Subject: Cyberattack November 22, 2000 Web posted at: 9:35 a.m. EST (1435 GMT) by Ellen Messmer (IDG) -- The U.S. military has a new mission: Be ready to launch a cyberattack against potential adversaries, some of whom are stockpiling cyberweapons. Such an attack would likely involve launching massive distributed denial-of-service assaults, unleashing crippling computer viruses or Trojans, and jamming the enemy's computer systems through electronic radio-frequency interference. An order from the National Command Authority - backed by President Clinton and Secretary of Defense William Cohen - recently instructed the military to gear up to wage cyberwar. The ability of the U.S. to conduct such warfare "doesn't exist today," according to a top Army official speaking at a conference in Arlington, Va., last week. "We see three emerging threats: ballistic missiles, cyberwarfare and space control," said Lt. Gen. Edward Anderson, deputy commander in chief at U.S. Space Command, which was recently assigned the task of creating a cyberattack strategy. "Cyberwarfare is what we might think of as attacks against digital ones and zeros." Anderson spoke about the Space Command's cyberwarfare responsibilities at the National Strategies and Capabilities for a Changing World conference. The event was organized by the Institute for Foreign Policy Analysis, Tufts University's Fletcher School of Law and Diplomacy and the U.S. Army. The conference attracted military top brass and international diplomats. Anderson told attendees that the U.S. Space Command, the agency in charge of satellite communications, has begun to craft a computer network attack strategy. This strategy would detail actions to be followed by the Unified Commanders in Chief (CINC) if the president and the secretary of defense order a cyber strike. The CINCs are senior commanders in the Army, Navy, Air Force and Marines deploying U.S. forces around the world. The information-warfare strategy will be detailed in a defense plan called "OPLAN 3600" that Anderson said will require "unprecedented cooperation with commercial enterprises and other organizations." There's no set deadline for completing OPLAN 3600, Anderson told Network World. But he noted that other countries, including Russia, Israel and China, are further along in building their information-warfare capabilities. Anderson said the U.S. may end up with a new type of weaponry for launching massive distributed denial-of-service attacks and computer viruses. "The Chinese recently indicated they are already moving along with this," he added. In addition to the possibility of cybercombat between nations, the military acknowledges that terrorists without the backing of any country can potentially use cyberweapons to disrupt U.S. telecommunications or banking systems that are largely electronic. That's one reason the U.S. Space Command is joining with the FBI to build an information-warfare strategy. "This requires a close relationship between military and law enforcement," said Michael Vatis, an FBI official who also spoke at the conference. He noted that the FBI will have to help determine if any cyberattack suffered by U.S. military or business entities calls for a military or law enforcement response. "The Internet is ubiquitous. It allows attacks from anywhere in the world. Attackers can loop in from many different Internet providers," said Vatis, who noted that a cyberattack can include espionage using computer networks. "It could start across the street but appear to be coming from China. And something that might look like a hacker attack could be the beginning of cyberwarfare," he added. Vatis said the growing bullets-and-guns conflict in the Middle East between Israel and the Palestinians, with Islamic supporters elsewhere, is being accompanied by cyberattacks from each side against the other. It's serious enough, he said, that the FBI issued an alert about it to the U.S. Space Command, giving U.S. forces warning that the action on the cyber front could affect them, too. http://www.cnn.com/2000/TECH/computing/11/22/cyberwar.machine.idg/index.html MCAC [Non-text portions of this message have been removed] 1995 From: Talisker Date: Tue Nov 28, 2000 2:15pm Subject: Re: Need some computer help Jerry It's possible that some are using mail forwarding domain names, such as bigfoot which will allow the aol user to hide his screen name, they will also distribute these mails to multiple addresses ie work and home. If they have closed their aol account this may be why they bounce from that address. If you check the mail headers they may provide a clue as to the routing Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo talisker@n... The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "Gerard P. Keenan" To: ; "PRIVATE-EYE" ; Sent: Monday, November 27, 2000 10:30 PM Subject: [TSCM-L] Need some computer help > Sorry for the cross-postings, but I need some help with something that has me rather confused. > > I maintain a regulated, restricted mailing list on anti/counter terrorism with 45 subscribers in 7 countries. Most of the subscribers are with government agencies in 3 countries, are heads of major international corporations' security departments, or are with large private security firms. > > Only 5 of these 45 subscribers use AOL as their server. > > Now my question is this. For the past couple of weeks I've been getting "bounced-back" or returned mail from aol addresses. Not too unusual; except for the fact that the three addresses that keep getting kicked back to me don't exist anywhere in my address book -- either as individual addresses or as members of the list. > > I've already cleared out my delete box, but just got one of those bounced back to me yet again. Here's the address -- frankwe911@a.... I have no idea who this is, where it is, or anything else about it. It does not exist on my list, nor anywhere else in my address book. > > I can't remember the other two. > > I was wondering if any of you computer gurus out there might have a theory about this. Is this just some kind of glitch at AOL (this is the only server that this happens with -- no other emails are returned from any other server)? Or is it something that I should be concerned about? > > Thanks for any assistance. > > Jerry Keenan > > GPKeenan Co., Int'l Security Services > West Islip, NY 11795 > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 1996 From: Date: Tue Nov 28, 2000 4:57pm Subject: Introduction Greetings My name is M. L. Shannon. I am a former countermeasures sweep technician, have worked for two companies who produced surveillance and countermeasures equipment and author of the books posted here. While I no longer write on surveillance, I have some interest in the subject which is why I have joined this group. I maintain a surveilance FAQ at my site, www.fusionsites.com, which contains some good info, but have not updated it recently. Comments are welcome. I will attempt to answer questions posted here, however I am not current in the business or the equipment, and there are several others who know the business better than do I. Also, Nuts & Volts magazine will soon publish series of six articles on basic Internet security and privacy entitled Cyber-Street Survival. The first is supposed to be in the January 2001 issue. At some future date, I will combine and expand them into a book of the same title. M L Shannon San Francisco 1997 From: A Grudko Date: Wed Nov 29, 2000 7:30am Subject: Re: TSCM Rule # 2 ----- Original Message ----- From: Bryan Herbert > > TSCM Rule #2: Never buy equipment attached to a key chain ;) Does this principal apply to only American cars ?............ Andy Grudko ZR6UU G8RXE Johannesburg Incidentally, no dig actually intended. Former owner of 2 'vettes, a Mustang, a Camaro, a Buick, a Cadillac and now a Chrysler Voyager (for the wife). I'm relegated to a boring German car, but there's a Viper out there somewhere with my name on it....... 1998 From: A Grudko Date: Wed Nov 29, 2000 7:20am Subject: Smart Dust If this is true it's going to change the way we protect ourselves from surveillance Andy Grudko Johannesburg > If Kristofer Pister has his way, we will never think about dust in quite the > same way again. > > Pister is leading a team of researchers at the University of California at > Berkeley that is developing tiny, electronic devices called "smart dust," > designed to capture mountains of information about their surroundings while > literally floating on air. > > If the project is successful, clouds of smart dust could one day be used in > an astonishing array of applications, from following enemy troop movements > and hunting Scud missiles to detecting toxic chemicals in the environment > and monitoring weather patterns around the globe. > > The idea behind smart dust is to pack sophisticated sensors, tiny computers > and wireless communicators onto minuscule "motes" of silicon light enough to > remain suspended in air for hours at a time. As the motes drift on the wind, > they can monitor the environment for light, sound, temperature, chemical > composition and a wide range of other information, and beam that data back > to a base station miles away. > > Pister, an associate professor of electrical engineering and computer > science at UC Berkeley, said he came up with the idea for smart dust eight > years ago at a conference on future technology. "I realized that sensors, > computers and communications were going to shrink down to ridiculously small > sizes," he said. "So why not package them into a single, tiny device?" > > Pister submitted a proposal to the federal Defense Advanced Research > Projects Agency, a branch of the Defense Department, which agreed to provide > about $1.2 million over three years to fund the project. > > Each mote of smart dust is composed of a number of microelectromechanical > systems, or MEMS, wired together to form a simple computer. > > MEMS are made using the same photolithographic techniques used to make > computer chips. Once perfected, they are relatively easy and inexpensive to > mass-produce. But unlike computer chips, which are solid, MEMS contain > moving parts. Patterns are etched with light into a silicon wafer to create > structures such as optical mirrors or tiny engines. > > Each mote contains a solar cell to generate power, sensors that can be > programmed to look for specific information, a tiny computer that can store > the information and sort out which data is worth reporting, and a > communicator that enables the mote to be "interrogated" by the base unit. > Later versions may also contain a lilliputian lithium battery so the motes > can operate at night. > > While much of the technology used to develop smart dust already exists, the > UC researchers are breaking new ground by integrating these systems into > remarkably small, self-powered packages. > > Pushing the Limits > > "We are pushing the limits of miniaturization, integration and power > management," said Brett Warneke, a graduate student in electrical > engineering working on the project. > > In one experiment to demonstrate the viability of the concept, researchers > deployed a golf ball-sized device on Twin Peaks in San Francisco that > measured weather conditions in the area - temperature, light, barometric > pressure and humidity - and beamed that information back to a base station > in Berkeley, more than 13 miles away. > > So far, the smallest device the UC researchers have developed is 62 cubic > millimeters - about the size of a pea - but Pister expects to shrink the > devices to a nearly microscopic cubic millimeter by next summer. At that > scale, > > they would be truly like dust: small enough to remain suspended in air, > buoyed by the currents, sensing and communicating for hours. > > One of the biggest hurdles the UC researchers face is building a mechanism > that can survive on extremely low power but is still capable of sensing, > sorting and sending vast amounts of information. For that reason, they have > designed a computer operating system called Tiny OS that can function on a > mere 512 bytes of RAM - about the amount of processing power found in a > toaster. > > The UC researchers are also experimenting with an ingenious optical > communicator called a corner-cube reflector, which enables the motes to > communicate while expending virtually no energy. > > Pioneered at the University of California at Los Angeles, the reflector is > essentially a tiny, hinged mirror that can flash millions of Morse code-like > signals per second. When a smart mote is illuminated by a laser fired from > the base station, the station can "read" the code reflected in the twitching > mirror. The mirror itself is powered by electrostatic energy, the force that > makes your socks cling together when they come out of the dryer. > > Smart dust devices are now capable of communicating only with a single base > station, but will eventually be able to share information with each other. > Such a system of "massively distributed intelligence" will vastly increase > their ability to organize and communicate information. > > "They will be able to do things collectively that they can't do > individually, just like an ant colony," Warneke said. "An individual ant > isn't very smart, but collectively, they are very smart." > > Researchers are exploring a number of methods for deploying smart dust. One > involves the use of tiny, unmanned aircraft that would spray motes over an > area like a miniature crop duster and relay the resulting information back > to a base station. MLB Co., a Palo Alto firm that develops experimental > aircraft, has already built such a plane - an 8-inch radio-controlled > aircraft equipped with a video camera that can stay aloft for 18 minutes at > a speed of 60 mph. > > MLB's "micro air vehicle" could be useful in a battlefield situation where > low clouds impeded satellite surveillance. The tiny, unmanned plane could > soar undetected above the battlefield, disperse a swarm of smart dust and > begin relaying a stream of data about the movement of enemy troops and > equipment. > > The UC researchers are also exploring ways to prolong the time smart dust > remains airborne by adding "wings" like those on maple seeds. A cubic- > millimeter-sized mote dropped at 30,000 feet would normally take five hours > to reach the ground. By attaching wings, the researchers hope to extend that > period two- or three-fold. > > Other researchers are attaching tiny legs to the motes to create so-called > microbots or smart insects. Instead of wafting aimlessly through the air > like dust, microbots could be programmed to perform specific tasks, such as > crawling through a collapsed building to search for warm bodies. > > "Smart dust is like the brain, and we're building the body," said Richard > Yeh, a graduate student researcher specializing in microrobotics who is > working on the smart dust project. > > Yeh and his colleagues have already developed the basic components of a > smart insect - tiny, jointed members, which function as legs, and minuscule > motors, the equivalent of muscles. All that remains is to connect the > components to a mote of smart dust, a step Yeh expects to accomplish within > weeks. > > Although the smart dust research is supported by the Defense Department, its > proponents see many nonmilitary applications for it, many for motes that > would stay in one place. > > Crunchless Cap'n Crunch > > They could be used to detect fires and earthquakes, tailor the climate in > office buildings to suit the preferences of individual workers, and monitor > product quality from factory to consumer (a mote of smart dust could tell, > for example, if a box of Cap'n Crunch had been exposed to high humidity, and > lost its crunch, or if a crate filled with delicate electronic components > had been dropped). > > Like many other new technologies, smart dust clearly has the potential to be > used for nefarious purposes. Foreign governments (or our own), terrorist > organizations, criminals and industrial spies could use high-tech motes to > spy. > > "This is a technology of total surveillance," said Richard Sclove, founder > of the Loka Institute, a nonprofit organization in Amherst, Mass., that > studies the social implications of technology. > > "I have no doubt that there will be plenty of benign and wonderful > applications of this technology, but it's easier to imagine the lousy ones. > The CIA and the National Security Administration would love to get their > hands on this, and there's no way to control what they do with it." > > While Pister acknowledges the possibility that smart dust could be misused, > he says the potential benefits of the technology "far, far outweigh" any > risks. > > "You can find harmful effects in everything," added Yeh. "But the threat is > small. If a rogue state wanted to use them to spy on us, they could do it, > but not much more. They probably couldn't carry enough poison or gas to do > much damage." > > The specter of millions, or even billions, of electronic motes drifting > around the globe has also raised concerns about the potential ill effects on > the environment and health. > > But Pister dismissed such concerns. "Even in my wildest imagination, I don't > think we'll ever produce enough smart dust to bother anyone," he said. "Most > of these materials are not environmentally harmful. Essentially they are > made out of sand, and that's not toxic." > > Potentially, the most dangerous element of a smart dust mote would be the > lithium battery, Pister says, but its minuscule size would pose little risk. > > "A small town throws away more batteries per year than we can distribute > across the entire universe," he said. "It's really a question of trade-offs. > If you can sprinkle a few ounces of battery over a rain forest and thereby > get a better understanding of the ecology, that's a trade-off worth making." > > And what if someone accidentally inhaled a mote of smart dust? "If by ill > chance you did inhale one, it would be like inhaling a gnat. You'd cough it > up post-haste. Unpleasant, but not very likely." > ---- > How to Reach Us > > Comments, questions and suggestions for The Chronicle's Science page are > welcome. Reach us by e-mail at science@s..., by fax at (415) 896-1107 > or in care of Science Page, San Francisco Chronicle, 901 Mission St., San > Francisco, CA 94103. > > For updated science news throughout the week and links to science Web sites, > > go to sfgate.com/science/. > > ---- > > GATHERING DATA ON THE FLY > > Researchers at the University of California are developing tiny, electronic > devices called "smart dust" designed to capture information about their > environment while literally floating on air. Each dust "mote" packs sensors, > computers and wireless communicators onto a tiny silicon chip light enough > to remain airborne for hours at a time. As the motes drift, they can monitor > their surroundings and beam data back to a base station. > > Researchers are exploring a number of methods for deploying "smart dust." > One technique involves the use of tiny, unmanned aircraft that would spray > motes over an area like a miniature crop duster and then relay the resulting > information back to a base station..EARLY PROTOTYPE > > Smart dust ``macro-mote'' made with readily available components > > To test their concept, researchers planted golf ball-sized smart dust > devices at Twin Peaks and on Coit Tower. Using a modified laser pointer, the > device beamed weather information back to Berkeley. > > ---- > > POTENTIAL USES-- Military uses include tracking enemy troop movements from > above and detecting chemical warfare agents in the air. -- Monitoring > weather conditions around the globe and detecting fires and earthquakes are > among the nonmilitary uses. -- Stationary motes could be used to monitor the > quality of products from factory to consumer.. > > Source: University of California Department of Electrical Engineering and > Computer Sciences. 1999 From: Miguel Puchol Date: Thu Nov 30, 2000 4:42am Subject: RE: Smart Dust If you breathe in enough of these things you'll end up mutating into a Terminator... Cheers, and good news for NBC gear manufacturers! Mike -----Mensaje original----- De: A Grudko [mailto:agrudko@i...] Enviado el: miercoles, 29 de noviembre de 2000 14:20 Para: andy@g... Asunto: [TSCM-L] Smart Dust If this is true it's going to change the way we protect ourselves from surveillance Andy Grudko Johannesburg > If Kristofer Pister has his way, we will never think about dust in quite the > same way again. > > Pister is leading a team of researchers at the University of California at > Berkeley that is developing tiny, electronic devices called "smart dust," > designed to capture mountains of information about their surroundings while > literally floating on air. > > If the project is successful, clouds of smart dust could one day be used in > an astonishing array of applications, from following enemy troop movements > and hunting Scud missiles to detecting toxic chemicals in the environment > and monitoring weather patterns around the globe. > > The idea behind smart dust is to pack sophisticated sensors, tiny computers > and wireless communicators onto minuscule "motes" of silicon light enough to > remain suspended in air for hours at a time. As the motes drift on the wind, > they can monitor the environment for light, sound, temperature, chemical > composition and a wide range of other information, and beam that data back > to a base station miles away. > > Pister, an associate professor of electrical engineering and computer > science at UC Berkeley, said he came up with the idea for smart dust eight > years ago at a conference on future technology. "I realized that sensors, > computers and communications were going to shrink down to ridiculously small > sizes," he said. "So why not package them into a single, tiny device?" > > Pister submitted a proposal to the federal Defense Advanced Research > Projects Agency, a branch of the Defense Department, which agreed to provide > about $1.2 million over three years to fund the project. > > Each mote of smart dust is composed of a number of microelectromechanical > systems, or MEMS, wired together to form a simple computer. > > MEMS are made using the same photolithographic techniques used to make > computer chips. Once perfected, they are relatively easy and inexpensive to > mass-produce. But unlike computer chips, which are solid, MEMS contain > moving parts. Patterns are etched with light into a silicon wafer to create > structures such as optical mirrors or tiny engines. > > Each mote contains a solar cell to generate power, sensors that can be > programmed to look for specific information, a tiny computer that can store > the information and sort out which data is worth reporting, and a > communicator that enables the mote to be "interrogated" by the base unit. > Later versions may also contain a lilliputian lithium battery so the motes > can operate at night. > > While much of the technology used to develop smart dust already exists, the > UC researchers are breaking new ground by integrating these systems into > remarkably small, self-powered packages. > > Pushing the Limits > > "We are pushing the limits of miniaturization, integration and power > management," said Brett Warneke, a graduate student in electrical > engineering working on the project. > > In one experiment to demonstrate the viability of the concept, researchers > deployed a golf ball-sized device on Twin Peaks in San Francisco that > measured weather conditions in the area - temperature, light, barometric > pressure and humidity - and beamed that information back to a base station > in Berkeley, more than 13 miles away. > > So far, the smallest device the UC researchers have developed is 62 cubic > millimeters - about the size of a pea - but Pister expects to shrink the > devices to a nearly microscopic cubic millimeter by next summer. At that > scale, > > they would be truly like dust: small enough to remain suspended in air, > buoyed by the currents, sensing and communicating for hours. > > One of the biggest hurdles the UC researchers face is building a mechanism > that can survive on extremely low power but is still capable of sensing, > sorting and sending vast amounts of information. For that reason, they have > designed a computer operating system called Tiny OS that can function on a > mere 512 bytes of RAM - about the amount of processing power found in a > toaster. > > The UC researchers are also experimenting with an ingenious optical > communicator called a corner-cube reflector, which enables the motes to > communicate while expending virtually no energy. > > Pioneered at the University of California at Los Angeles, the reflector is > essentially a tiny, hinged mirror that can flash millions of Morse code-like > signals per second. When a smart mote is illuminated by a laser fired from > the base station, the station can "read" the code reflected in the twitching > mirror. The mirror itself is powered by electrostatic energy, the force that > makes your socks cling together when they come out of the dryer. > > Smart dust devices are now capable of communicating only with a single base > station, but will eventually be able to share information with each other. > Such a system of "massively distributed intelligence" will vastly increase > their ability to organize and communicate information. > > "They will be able to do things collectively that they can't do > individually, just like an ant colony," Warneke said. "An individual ant > isn't very smart, but collectively, they are very smart." > > Researchers are exploring a number of methods for deploying smart dust. One > involves the use of tiny, unmanned aircraft that would spray motes over an > area like a miniature crop duster and relay the resulting information back > to a base station. MLB Co., a Palo Alto firm that develops experimental > aircraft, has already built such a plane - an 8-inch radio-controlled > aircraft equipped with a video camera that can stay aloft for 18 minutes at > a speed of 60 mph. > > MLB's "micro air vehicle" could be useful in a battlefield situation where > low clouds impeded satellite surveillance. The tiny, unmanned plane could > soar undetected above the battlefield, disperse a swarm of smart dust and > begin relaying a stream of data about the movement of enemy troops and > equipment. > > The UC researchers are also exploring ways to prolong the time smart dust > remains airborne by adding "wings" like those on maple seeds. A cubic- > millimeter-sized mote dropped at 30,000 feet would normally take five hours > to reach the ground. By attaching wings, the researchers hope to extend that > period two- or three-fold. > > Other researchers are attaching tiny legs to the motes to create so-called > microbots or smart insects. Instead of wafting aimlessly through the air > like dust, microbots could be programmed to perform specific tasks, such as > crawling through a collapsed building to search for warm bodies. > > "Smart dust is like the brain, and we're building the body," said Richard > Yeh, a graduate student researcher specializing in microrobotics who is > working on the smart dust project. > > Yeh and his colleagues have already developed the basic components of a > smart insect - tiny, jointed members, which function as legs, and minuscule > motors, the equivalent of muscles. All that remains is to connect the > components to a mote of smart dust, a step Yeh expects to accomplish within > weeks. > > Although the smart dust research is supported by the Defense Department, its > proponents see many nonmilitary applications for it, many for motes that > would stay in one place. > > Crunchless Cap'n Crunch > > They could be used to detect fires and earthquakes, tailor the climate in > office buildings to suit the preferences of individual workers, and monitor > product quality from factory to consumer (a mote of smart dust could tell, > for example, if a box of Cap'n Crunch had been exposed to high humidity, and > lost its crunch, or if a crate filled with delicate electronic components > had been dropped). > > Like many other new technologies, smart dust clearly has the potential to be > used for nefarious purposes. Foreign governments (or our own), terrorist > organizations, criminals and industrial spies could use high-tech motes to > spy. > > "This is a technology of total surveillance," said Richard Sclove, founder > of the Loka Institute, a nonprofit organization in Amherst, Mass., that > studies the social implications of technology. > > "I have no doubt that there will be plenty of benign and wonderful > applications of this technology, but it's easier to imagine the lousy ones. > The CIA and the National Security Administration would love to get their > hands on this, and there's no way to control what they do with it." > > While Pister acknowledges the possibility that smart dust could be misused, > he says the potential benefits of the technology "far, far outweigh" any > risks. > > "You can find harmful effects in everything," added Yeh. "But the threat is > small. If a rogue state wanted to use them to spy on us, they could do it, > but not much more. They probably couldn't carry enough poison or gas to do > much damage." > > The specter of millions, or even billions, of electronic motes drifting > around the globe has also raised concerns about the potential ill effects on > the environment and health. > > But Pister dismissed such concerns. "Even in my wildest imagination, I don't > think we'll ever produce enough smart dust to bother anyone," he said. "Most > of these materials are not environmentally harmful. Essentially they are > made out of sand, and that's not toxic." > > Potentially, the most dangerous element of a smart dust mote would be the > lithium battery, Pister says, but its minuscule size would pose little risk. > > "A small town throws away more batteries per year than we can distribute > across the entire universe," he said. "It's really a question of trade-offs. > If you can sprinkle a few ounces of battery over a rain forest and thereby > get a better understanding of the ecology, that's a trade-off worth making." > > And what if someone accidentally inhaled a mote of smart dust? "If by ill > chance you did inhale one, it would be like inhaling a gnat. You'd cough it > up post-haste. Unpleasant, but not very likely." > ---- > How to Reach Us > > Comments, questions and suggestions for The Chronicle's Science page are > welcome. Reach us by e-mail at science@s..., by fax at (415) 896-1107 > or in care of Science Page, San Francisco Chronicle, 901 Mission St., San > Francisco, CA 94103. > > For updated science news throughout the week and links to science Web sites, > > go to sfgate.com/science/. > > ---- > > GATHERING DATA ON THE FLY > > Researchers at the University of California are developing tiny, electronic > devices called "smart dust" designed to capture information about their > environment while literally floating on air. Each dust "mote" packs sensors, > computers and wireless communicators onto a tiny silicon chip light enough > to remain airborne for hours at a time. As the motes drift, they can monitor > their surroundings and beam data back to a base station. > > Researchers are exploring a number of methods for deploying "smart dust." > One technique involves the use of tiny, unmanned aircraft that would spray > motes over an area like a miniature crop duster and then relay the resulting > information back to a base station..EARLY PROTOTYPE > > Smart dust ``macro-mote'' made with readily available components > > To test their concept, researchers planted golf ball-sized smart dust > devices at Twin Peaks and on Coit Tower. Using a modified laser pointer, the > device beamed weather information back to Berkeley. > > ---- > > POTENTIAL USES-- Military uses include tracking enemy troop movements from > above and detecting chemical warfare agents in the air. -- Monitoring > weather conditions around the globe and detecting fires and earthquakes are > among the nonmilitary uses. -- Stationary motes could be used to monitor the > quality of products from factory to consumer.. > > Source: University of California Department of Electrical Engineering and > Computer Sciences. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2000 From: James M. Atkinson, Comm-Eng Date: Thu Nov 30, 2000 8:11am Subject: Re: TSCM Rule # 2 At 3:30 PM +0200 11/29/00, A Grudko wrote: >----- Original Message ----- >From: Bryan Herbert > > > > TSCM Rule #2: Never buy equipment attached to a key chain ;) > >Does this principal apply to only American cars ?............ > Since TSCM equipment has been know to sprout legs and go for a walk by itself in the middle of a sweep is it OK to attach a lock and chain to your equipment? -jma ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 2001 From: Date: Wed Nov 29, 2000 7:59pm Subject: Things for sale Apparently it is still legal to sell: One Securicom TVS-250 frequency inversion scrambler. Consists of circuit board with rubber 'feet' and plugs between base and handset of phone. Powered by 9v battery. Assembled, tested, works. Second unit the same except missing 4 slide switches but can be jumpered as they aren't necessary for standard phones. Includes some extra parts, assembly and operators manual. Originally cost apx $90 each. Make offer. Tek 2215A scope. 60 MHz dual trace with two Tek 10x probes. No manual. Light scratches from normal use, otherwise undamaged and in perfect working condition. Make offer m l shannon 2002 From: Date: Thu Nov 30, 2000 4:50am Subject: Used books for sale revisited Greetings Have more books I want to get rid of, and a few other things. Check it out at www.fusionsites.com/forsale "I complained because I had only 2000 books until I met a man who had none. So I sold him some of mine" M L Shannon 2003 From: Gerard P. Keenan Date: Sat Dec 2, 2000 9:38am Subject: Need some computer help Hi Everyone, I want to thank everyone who responded to my cries for help earlier this week. I'd like to thank all of you individually but as with all requests for assistance on these lists, there are really too many of you who responded to thank each of you personally. But I want each of you to know that your responses and suggestions to correct the problem have been greatly appreciated. I especially want to thank Roy Niles who went out of his way to try and get a profile of the address in question. But even his attempts came up with what amounts to a non-existant address. And thanks to Ian Carter as well for his offer to try and track it down. Ian, I would've sent the bounced header to you but this bounce-back on this particular address has stopped just as suddenly, and mysteriously, as it started -- along with the other two (these haven't showed up again since my original posting for assistance). Seems this is one of those cyber mysteries. I haven't had anything bounce back from frankwe911@a... for two days now. And I did nothing. Tried the virus scans, putting the addee into my mail box and then deleting it, and many of the other suggestions I received. But still got the bounce back. Then, all of a sudden, about 2 days ago, this address no longer was being bounced back. Guess I'll just have to put it down to the fickleness of the gods (hehe). But again, thanks to everyone who responded provided suggestions. You guys are terrific, and these lists have proved their worth yet again! Thanks! Jerry [Non-text portions of this message have been removed] 2004 From: 1RCM <1RCM@M...> Date: Sun Dec 3, 2000 7:05pm Subject: Computer Info Needed Hi Group, Does anyone know how to get to the CMOS battery in a Toshiba Satellite Pro T2400CS laptop? In looking for the battery in an older model my hunt & seek dismantling nearly led me to have several pieces left over when I reassembled it. I'd rather not go through that again. Thanks, Just another "Bob" 2005 From: Steve Uhrig Date: Sun Dec 3, 2000 7:37pm Subject: Re: Computer Info Needed Once upon a midnight dreary, 1RCM pondered, weak and weary: > Does anyone know how to get to the CMOS battery in a Toshiba > Satellite Pro T2400CS laptop? Every laptop I've had (six) have had a tiny door on the back which swings open edgewise and holds a lithium coin cell about the size of a dime. You need to pry the door open with a fingernail or small tool. If you didn't know exactly where to look you'd miss the door. Yours might have something similar. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2006 From: Date: Sun Dec 3, 2000 9:51pm Subject: test post; disregard test... 2007 From: Cristian Date: Mon Dec 4, 2000 1:23am Subject: Re: Computer Info Needed Hi Bob Some Thoshibas have the battery well hidden on the display side. Morphy's universal engineering rule: after a dismantling/assembling procedure you'll spare al least some screws. Regards, Cristian. At 20:05 03.12.2000 -0500, you wrote: >Hi Group, > >Does anyone know how to get to the CMOS battery in a Toshiba Satellite Pro >T2400CS laptop? In looking for the battery in an older model my hunt & seek >dismantling nearly led me to have several pieces left over when I >reassembled it. I'd rather not go through that again. > >Thanks, > >Just another "Bob" > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS 2008 From: Steve Uhrig Date: Mon Dec 4, 2000 7:01am Subject: Universal law Once upon a midnight dreary, Cristian pondered, weak and weary: > Morphy's universal engineering rule: after a > dismantling/assembling procedure you'll spare al least some > screws. Something I learned as part owner of a Harley Davidson shop some years ago: If you take something apart and put it back together enough times, eventually you will have two of them. Steve (making a list and checking it *twice*) ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2009 From: Steve Uhrig Date: Mon Dec 4, 2000 8:33am Subject: Enemy of the State List member Pat Edwards pointed out that the movie "Enemy of the State" featuring Gene Hackman and Will Smith is currently showing on cable TV ,either channel 529 or channel 2 Turner Movie classics. Pat asked for some specifics on my and Marty Kaiser's part in the movie. We were technical consultants on electronic surveillance to the production. I was on set for most of the filming which was done in Baltimore, DC and Hollywood. We worked daily with Hackman and Will Smith. I trained them to install electronic surveillance so they could do it realistically in the movie, and they were quick studies so the joke around the set was I should hire them to work for me. My company also supplied most of the surveillance equipment you saw used in the movie. They used the genuine stuff, the same equipment we sell to governments worldwide. If you look closely you will see my personal Scanlock used in two different scenes, one in Hackman's screen room and again in the Senator's hotel suite after bugs were discovered. The set designer built Hackman's bug proof screen room to our specs, and they did it right. It worked so well that the wireless mikes on the actors would not radiate fifteen feet out of the screen room to the receivers. The sound guys were going crazy. They couldn't understand what was happening and why they couldn't get the signal. They kept swapping equipment in and out and could not believe it all went bad overnight. I ended up stripping out the center conductor from a piece of coax to make a crude antenna, and dropped it down inside the top of the screen room in the back. We used that as a receive antenna and that is what worked for the shooting. Except for some of the satellite info and a bit of the video networking, everything you saw was the real thing, or a simulation thereof. We do manufacture video and audio transmitters in smoke detectors, body worn video/audio cameras, the audio surveillance, tracking beacons as shown and the rest of the stuff. Any of the black and white video you saw in the movie was actual footage shot through my surveillance stuff, especially in the shootout in the restaurant near the end. We did have a camera and transmitter concealed in a Christmas tree ornament and the same in the air vent in the Senator's suite. I had a short acting part, as the merchant who sold the surveillance equipment to Hackman in the electronics shop. Curiously enough, I had been dealing with that electronics shop since high school. We worked for six weeks in the building which was blown up. 200 people for 6 weeks for the building to have 10 minutes on screen. I was by there the other day, and the former 5 story large concrete building which formerly was a Dr. Pepper bottling plant is completely gone and there is a gas station there now. Most of the good equipment scenes were cut in editing. The satellite sending CQ in CW was my doing. I tried to get them to slip my ham callsign in there in CW but it was more than they could understand. I had written the dits and dahs for CQ down on a napkin. More information on the players including Marty and me is available at: http://movieweb.com/movie/enemystate/enemy.txt Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2010 From: Date: Sat Dec 2, 2000 11:38pm Subject: Re: Need some computer help How can a message "bounce back" to you if you never sent it? If it happens again, save the header which may reveal something. A packet sniffer such as CommView will record all outgoing data which can be analyzed to see if you are somehow sending something you weren't aware of. There are other things to consider, maybe a few other tricks if you save the message and header. M L Shannon --- In TSCM-L@egroups.com, "Gerard P. Keenan" wrote: > Sorry for the cross-postings, but I need some help with something that has me rather confused. > > I maintain a regulated, restricted mailing list on anti/counter terrorism with 45 subscribers in 7 countries. Most of the subscribers are with government agencies in 3 countries, are heads of major international corporations' security departments, or are with large private security firms. > > Only 5 of these 45 subscribers use AOL as their server. > > Now my question is this. For the past couple of weeks I've been getting "bounced-back" or returned mail from aol addresses. Not too unusual; except for the fact that the three addresses that keep getting kicked back to me don't exist anywhere in my address book -- either as individual addresses or as members of the list. > > I've already cleared out my delete box, but just got one of those bounced back to me yet again. Here's the address -- frankwe911@a... I have no idea who this is, where it is, or anything else about it. It does not exist on my list, nor anywhere else in my address book. > > I can't remember the other two. > > I was wondering if any of you computer gurus out there might have a theory about this. Is this just some kind of glitch at AOL (this is the only server that this happens with -- no other emails are returned from any other server)? Or is it something that I should be concerned about? > > Thanks for any assistance. > > Jerry Keenan > > GPKeenan Co., Int'l Security Services > West Islip, NY 11795 > > > > [Non-text portions of this message have been removed] 2011 From: Rob Muessel Date: Mon Dec 4, 2000 11:25am Subject: Turret Telephones I'm looking for information on the operation and vulnerabilities of a specific type of turret telephone: Tradenet/MX system and instruments manufactured by IPC Information Systems. Has anyone on th list had any experience with these? -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA From: Date: Fri Nov 30, 2001 9:51am Subject: PERSONAL PROTECTION/SURVIVAL/SPY EQUIP/--for the public COMMENT: BEING POSTED FY INTEL PURPOSES ONLY. THIS IS NOT AN ENDORSEMENT NOR DO WE HAVE ANY INTEREST IN THE CORP. SOME OF THE ITEMS MAY EFFECT OFCR SAFETY! The catalogue is also "interesting." www.phxsystems.com 4233 From: Aimee Farr Date: Sat Dec 1, 2001 1:27pm Subject: RE: New Surveillance Measures Considered MACCFound clipped from a news story: > ``Subjecting any foreign person to FISA is a fundamental change to the > statute,'' agreed Morton H. Halperin, a senior fellow at the Council on > Foreign Relations. ``These can by no means be characterized as > technical.'' > Bah. MR. HALPERIN IN '78: "If the intention of the bill is to permit surveillance simply of people who might well be agents of Soviet intelligence, I think it's not beyond the ingenuity of the drafters to draft the provision which is in fact limited to such people but does not offend the sensibilities of the State Department in identifying particular countries as enemies. My understanding is that that has, in fact, been the main block to drafting the provision in a more narrow way, and I think some way can and in fact should be found around that." -- p. 144, 95th Cong. (The Jan-Feb. FISA Hearings). ----- MORE AIMEE'S FAMOUS FISA QUOTES Testimony of Authur S. Miller and Morton Halperin, cont., MR. MILLER. ...And one more thing, I don't like it when the executive, including the Attorney General, comes up and says I like this bill. You know, that makes me nervous, if you will excuse me, nervous as hell. MR. MURPHY. Why does that make you nervous? MR. MILLER. Well, any time I find the executive approving bills that purportedly circumscribe the executive's behavior, I wonder why. MR. McCLORY. The foreign embassy, in a sense, doesn't that represent a part of the foreign country here, and we can't go into the Soviet embassy with a court order, can we, and put a wiretap on them, if they have immunity? MR. MILLER. Well, I am not privy to what our intelligence services do to the Soviet embassy, but I would be appalled if they did not do everything possible to find out what is going on inside. [...] 4234 From: Dawn Star Date: Sun Dec 2, 2001 0:49pm Subject: Question on T! links Yesterday I did a sweep on a large financial company in Los Angeles. Their 40 phone lines were linked by T1 to the central office using a Encore Multiport DSU/CSU made by Digital Link. This means their phone trunks are digitally time domain multiplexed. To my knowledge this format would make it very difficult to attack this line and demodulate the CEO's calls which would be at random to begin with in the 40 trunks (switch pecking order). The switch, by the way was Meridian option 11 with 23-35 software. I have to write the final report to the client tomorrow so I would like to get the opinion of you network security specialists on the list out there, on a one to ten how difficult would it be to attack a line of this complexity and retrieve the CEO's conversations. Thanks in advance for your help. Roger Tolces Electronic Security Co. www.bugsweeps.com 4235 From: James M. Atkinson Date: Sun Dec 2, 2001 5:37pm Subject: Re: Question on T! links First of all a T1 does not support 40 circuits, but 12... actually it is 24 circuits, but 12 signals paths (2 in each direction). If the executive is on a dedicated line of number then he would always appear on the same time slice, otherwise it would be mixed in the time slices with all the other lines. To actually perform an intercept on a T1 you have to grab the line, pull out the time-slice of interest and reconstruct it. There are a number of small "test" boxes which can do this for less then a few hundred dollars. However, for a few grand an eavesdropper can simply such down the enitre T-1 and record it on a wideband recorder, or even drop it into a laptop and have the PC simply VR for the guy to show up I seem to recall a company in Nebraska that had a laptop based product that would let you monitor the traffic on 4 or more T-1 lines, and extract each circuit into a .wav file (which you could then convert though text via voice recognition). On a scale of 1 to 10 (ten being hard), this one would rank about a 3 for a tech guy, but a 10 for an amateur. -jma At 10:49 AM -0800 12/2/01, Dawn Star wrote: >Yesterday I did a sweep on a large financial company in Los Angeles. Their >40 phone lines were linked by T1 to the central office using a Encore >Multiport DSU/CSU made by Digital Link. This means their phone trunks are >digitally time domain multiplexed. To my knowledge this format would make >it very difficult to attack this line and demodulate the CEO's calls which >would be at random to begin with in the 40 trunks (switch pecking order). >The switch, by the way was Meridian option 11 with 23-35 software. I have >to write the final report to the client tomorrow so I would like to get the >opinion of you network security specialists on the list out there, on a one >to ten how difficult would it be to attack a line of this complexity and >retrieve the CEO's conversations. Thanks in advance for your help. > >Roger Tolces >Electronic Security Co. > >www.bugsweeps.com -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4236 From: David Alexander Date: Mon Dec 3, 2001 4:08am Subject: Re; FBI surveillance tool How on earth did this guy get the job as chief researcher ? >Eric Chien, chief researcher at Symantec's antivirus research lab, said that provided a hypothetical keystroke logging tool was used only by the FBI, then >Symantec would avoid updating its antivirus tools to detect such a Trojan. The security firm is yet to hear back from the FBI on its enquiries about Magic >Lantern but it already has a policy on the matter. Any fule kno that the technique this tool uses won't stay secret for long and if they deliberately don't plug the gap then every black hat and his neighbours dog will be exploiting it before you can say 'hacker'. Can someone please show this guy the way back to reality ? David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4237 From: Dave Emery Date: Mon Dec 3, 2001 2:10am Subject: Re: Question on T! links On Sun, Dec 02, 2001 at 06:37:18PM -0500, James M. Atkinson wrote: > First of all a T1 does not support 40 circuits, but 12... actually it > is 24 circuits, but 12 signals paths (2 in each direction). Apparent slip of the typing fingers here. Full T1 (DS-1) lines are indeed 24 channels in both directions plus some signalling and framing overhead bits and in the more modern frame formats also some alarm bits as well. This all fits in the 1.554 Mbs DS-1 signal (each voice channel is 64 kbs - 8 khz sample rate times 8 bits per sample (actually non-linear coded so effectively more). In some systems, of course, the LSB of each channel gets stolen every so often for supervisory signalling resulting in a 56 kb clear channel rather than 64 kb. Most DS-1 links are of course full duplex, but I guess one can order a half duplex one on a special basis. Naturally no central office T1 trunks are half duplex - it wouln't make sense - which means they all have 1.544 Mbs flowing in both directions simultaneously. > If the executive is on a dedicated line of number then he would > always appear on the same time slice, otherwise it would be mixed in > the time slices with all the other lines. > The time slice used by a particular trunk is fixed, but of course a standard DID trunk arrangement puts incoming calls on the first available trunk that isn't busy regardless of what number is being called (plus or minus dedicated trunks and special trunk priority arrangements). Outgoing calls are likely also similarly handled. Thus most likely the CEOs calls could be found on any trunk unless he has exclusive lines with special access provisions reserved for only him - just having a special phone number on most DID arrangements is not enough for this to be true however. > To actually perform an intercept on a T1 you have to grab the line, > pull out the time-slice of interest and reconstruct it. There are a > number of small "test" boxes which can do this for less then a few > hundred dollars. However, for a few grand an eavesdropper can simply > such down the enitre T-1 and record it on a wideband recorder, or > even drop it into a laptop and have the PC simply VR for the guy to > show up 1.544 Mega bits per second isn't very fast by comparison with modern computer disk channel speeds (40 Mega Bytes per second) or even ethernet. Thus even a rather feeble modern laptop can readily store two 1.544 Mbs data streams on disk at once and have time to do lots of other things. Fancy wideband recorders are not needed - just a cheap latop and an appropriate interface card. And current hard drives (100 Gb) will hold a lot of traffic. > > I seem to recall a company in Nebraska that had a laptop based > product that would let you monitor the traffic on 4 or more T-1 > lines, and extract each circuit into a .wav file (which you could > then convert though text via voice recognition). > Relatively easy for someone to code up fairly quickly and probably the desirable format (MP3 compressed would get more hours out of the disk however). > On a scale of 1 to 10 (ten being hard), this one would rank about a 3 > for a tech guy, but a 10 for an amateur. > I would rate it at about a 2, as I have seen hand test boxes for this on Ebay for very little money that can bridge across the standard T1 line interface. Granted these monitor one channel at a time, but an eavesdropper could at least intercept some of the traffic and search for the desired calls by hand. > -jma > > > At 10:49 AM -0800 12/2/01, Dawn Star wrote: > >Yesterday I did a sweep on a large financial company in Los Angeles. Their > >40 phone lines were linked by T1 to the central office using a Encore > >Multiport DSU/CSU made by Digital Link. This means their phone trunks are > >digitally time domain multiplexed. To my knowledge this format would make > >it very difficult to attack this line and demodulate the CEO's calls which > >would be at random to begin with in the 40 trunks (switch pecking order). > >The switch, by the way was Meridian option 11 with 23-35 software. I have > >to write the final report to the client tomorrow so I would like to get the > >opinion of you network security specialists on the list out there, on a one > >to ten how difficult would it be to attack a line of this complexity and > >retrieve the CEO's conversations. Thanks in advance for your help. > > > >Roger Tolces > >Electronic Security Co. > > > >www.bugsweeps.com > > -- > > ------------------------------------------------------------------------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > ------------------------------------------------------------------------------------------ > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008jmatk@tscm.com > ------------------------------------------------------------------------------------------ > "Success without honor is an unseasoned dish; > it will satisfy your hunger, but it won't taste good." > ------------------------------------------------------------------------------------------ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 4238 From: Paolo Sfriso Date: Mon Dec 3, 2001 4:57am Subject: New 2002 Klingenfuss Catalogue out Dear Colleagues. FYI the new 2002 Klingenfuss catalogue is out and can also be consulted online at www.klingenfuss.org . Of particular interest for TSCMers are the two Modulation Types Audio CD sets (total 4 CDs). This notice is solely intended as a utility message to fellow listmembers.I have no financial or personal interest in Klingenfuss and/or related companies. Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 4239 From: Dawn Star Date: Mon Dec 3, 2001 11:42am Subject: Re: Question on T! links Rob, I am going to respond to you here on the TSCM list, I hope you don't mind me posting this to the list, I always appreciate your input. The in house tech at this facility does not do much about reported framing errors unless something really goes down. So if we put some type of covert demodulator temporarily on the line it probably would not get noticed. The important factor here I think is the size of the intercept equipment, pretty hard to conceal unless you are willing to bolt it on the wall of an existing phone closet and hope no one will look into it. In a building with many companies sharing the phone room you may get away with it. To do it right, It really sounds like you would need to have a listening post area and that means a suite would have to be rented someplace in the same building to have cable access. Not easy and expensive. Then you still have to deal with where in the 40 lines the CEO is going to appear. This switch takes incoming from the top and dial 9 outs from the bottom. On the TDR question I definitely do use it on all the executive office station feeds to the switch. I do it while the data is flowing (even turning off the input cards by software in many cases does not stop the data flow to the station) I use the noise filter to cut down on the jitter and lower the amplitude and the chart printer write speed filters the rest. TDR, still in my onion the single most powerful phone line testing instrument. You do have to watch some switch input cards though. They will see the TDR signal as a fault condition and shut down. Some switches will automatically reset the card after a period of time and some have to be reset with software. So you better know you stuff before you proceed with this test. Roger Tolces Electronic Security Los Angeles www.bugsweeps.com At 08:42 AM 12/03/2001 -0500, you wrote: >Roger, > >On a scale of 1-10, T-1s are around an 8.5 in difficulty. > >You're right- thery're digital, so they're secure. But, since all T-1s >here in North America use the same protocol, there is standard equipment >that can demodulate and retransmit. Typically called bit error rate >testers, they can be connected in series with the T-1 and "scan" all 24 >channels. There are a couple of points here, too. > >First and obvious, the badguy has to monitor all conversations and be >able to identify his target by voice. Second, to install the tester, it >goes in series with the T-1. That means breaking the connection and >causing it to fail. This causes alarms at the PBX and at the CO. >MOnitoring T-1 status can be a clue to installation. Third, testers are >fairly large- at least half the size of Tek 1503, for example and they >cost in the $8000 range. > >Professionally, I consider them secure and don't worry about them too >much. > >A question for you: You rely heavily on TDRs, I recall. What's your >stand on TDR usage on digital PBX extensions when you can't disconnect >the wiring into the switch? > >-- >Rob Muessel, Director email: rmuessel@t... >TSCM Technical Services Phone: 203-354-9040 >11 Bayberry Lane Fax: 203-354-9041 >Norwalk, CT 06851 >USA 4240 From: Steve Uhrig Date: Mon Dec 3, 2001 11:12am Subject: Suggested sweep rates Suggested sweep rates: ===================== $500/hour to let you do it your way, alone except for your team $750/hour if the client (or anyone else like the PI who referred the case) wants to watch $1000/hour if the client (or anyone else) wants to help $2500 one time annoyance fee if the client does not have keys to EVERYTHING in the building. Double that fee if the client promised you he'd have a ladder available, and doesn't. $2500 rescheduling fee if the check they said they would have waiting for you is not available for any reason, and you and your team have to return to base immediately and reschedule the sweep for another date after receiving payment in advance. $2500 one time annoyance/punishment fee if anyone else has swept the place before other than you. $1000 discount if the client helps you carry in your gear, politely excuses himself, returns unasked with coffee and sandwiches, then disappears back into his office where he belongs. Final rule: price depends on my mood and your attitude ===================== Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4241 From: Dawn Star Date: Mon Dec 3, 2001 0:24pm Subject: Question on T! links Jim, the config on this system is that each of these Encore Multiport DSU/CSU made by Digital Link have a 24 trunk capacity. Looking at your suggested intercept scenario, keeping in mind that the CEO with this switch could show up anywhere in 40 trunks, if you were to try to capture the data on a wide band recorder, how much recording medium would this occupy ( 8 hrs.a day/ five days a week) and if it was a covert installation how much time capacity would the recorder have if it was an unattended setup. On a covert installation, what do you figure the minimum size of the hardware would be? As far as the analysis phase, with out voice recognition it would be a laborious and time consuming job to then convert 40 trunks back to analog and review 8 hours of 40 trunk phone activity, then sift down all the CEO conversation to a final cassette. Would you like to reconsider your 3 on a 10 for a tech guy? P.S. I would like to look at this info on this company in Nebraska, it would be real helpful, any key words on a search engine that might get me there?. Thanks, Roger Tolces Electronic Security Los Angeles www.bugsweeps.com Date: Sun, 2 Dec 2001 18:37:18 -0500 From: "James M. Atkinson" Subject: Re: Question on T! links First of all a T1 does not support 40 circuits, but 12... actually it is 24 circuits, but 12 signals paths (2 in each direction). If the executive is on a dedicated line of number then he would always appear on the same time slice, otherwise it would be mixed in the time slices with all the other lines. To actually perform an intercept on a T1 you have to grab the line, pull out the time-slice of interest and reconstruct it. There are a number of small "test" boxes which can do this for less then a few hundred dollars. However, for a few grand an eavesdropper can simply such down the enitre T-1 and record it on a wideband recorder, or even drop it into a laptop and have the PC simply VR for the guy to show up I seem to recall a company in Nebraska that had a laptop based product that would let you monitor the traffic on 4 or more T-1 lines, and extract each circuit into a .wav file (which you could then convert though text via voice recognition). On a scale of 1 to 10 (ten being hard), this one would rank about a 3 for a tech guy, but a 10 for an amateur. -jma 4242 From: Aimee Farr Date: Mon Dec 3, 2001 11:42am Subject: Shades of our future? http://www.chosun.com/w21data/html/news/200112/200112020150.html Officials Fear of Wiretapping Grows Fears of having telephones wiretapped are spreading throughout government agencies including the National Police Agency, Public Prosecutors' Office, the National Intelligence Service (NIS) and Cheong Wa Dae, according to recent telephone poll by Chosun Ilbo with Mbizon.com released Sunday. Senior officials of the Ministry of Justice and the prosecutor's office in handling sensitive matters use cell phones instead of wired phones to discuss them, while NIS workers consider two to three mobile phones, a necessity. The poll on wiretapping of 505 people over 20 years old on November 28 showed that 73.7% of respondents felt concern over possible wiretaps of their phones, nearly double that of a survey by Hyundai Research in September 1999 that showed 38.0% had fears on possible exposure of their private lives. Some 8.9% of respondents said they had evidence that their phones had been tapped, a steep increase since 1999's 4.7%, while 46.7% of said they felt they were being overheard on the phone. As a result of these fears, however, an unexpected silver lining has been revealed for private security companies. A manager of Hankuk Spyzone said this year there were three to four requests for wiretaps a day on average. "Last year from January to September there were 305 warrant requests but this year it has ballooned to 662," he noted. Security company S1 has seen its business grow 20% year-on-year and its communications team created in 1998 has 100 fixed customers. Kumsong Security said that this year it has screened 150 clients, while Hankuk Business Security claims to have carried out 400 searches so far this year. Early this year, a famous hotel in Seoul screened its Conference Room following customer complaints and found six electronic eaves dropping devices. Big businesses such as Samsung and LG have their own security teams and regularly screen directors offices, conference rooms and laboratories. LG Electronics has bought five counter measures devices at W50 million apiece, and a manager there noted that every year they uncover bugs planted in the company's buildings. Chief of Psychiatry at Asan medical center Kim Chang-yoon noted that such fears could develop into an obsessive neurosis such as paranoia, something he has seen among an increasing number of patient referrals. 4243 From: John McCain Date: Mon Dec 3, 2001 0:31pm Subject: Re: Question on T! links Like someone said, T-1 is 24 channels full duplex, 1.544 Mbps. And one simple way to compromise it... A DSX signal is low voltage, bipolar 3.6V or less... use a hi Z input op amp tap directly into a T1 line driver chip (say a Level-one or PMC-Sierra component), and run it off-site as a new T1 line. Quad and octal T1 interface chips are inexpensive. So this is only a few cubic inches. Then, at the LP if custom coding a PC is too much trouble, pick up a used channel bank on ebay for $500. You then get 24 analog lines to record. I'd bet a 3/10 level person could do this for a grand or less in hardware. The T1 (and all energy carrying conductors) out of the premises should be suspect. Just be cause it's T1, OC-3, frame relay, xDSL, VOIP, etc, don't assume it's too complex for an attacker to go after. Here's a tutorial on the innards of T-spans if you're really interested... " All You Wanted to Know About T1 But Were Afraid to Ask" is the title. HTTP://www.dcbnet.com/notes/9611t1.html Cheers, JohnM 4244 From: Miguel Puchol Date: Mon Dec 3, 2001 6:54pm Subject: Re: Question on T! links With a little handycraft, you could adapt a DECT engine to feed at least part of the trunk (or have a few DECT engines to grab it all). DECT can offer data rates of up to 552kbps, with potential to go further. A Siemens DECT board is very small, and can be concealed in many places. Also, most spyshop sweepers would dismiss a DECT signal as a near-by wireless telephone setup. So, you could combine the method you describe with some DECT boards, and have a wireless T1 intercept system. Watch out for this, 'cos if it's not been invented yet, I bet it will soon be...(if not with DECT using something alike). Cheers all, Mike ----- Original Message ----- From: "John McCain" To: Sent: Monday, December 03, 2001 7:31 PM Subject: Re: [TSCM-L] Question on T! links > Like someone said, T-1 is 24 channels full duplex, 1.544 Mbps. > > And one simple way to compromise it... > > A DSX signal is low voltage, bipolar 3.6V or less... use a hi Z input op > amp tap directly into a T1 line driver chip (say a Level-one or PMC-Sierra > component), and run it off-site as a new T1 line. Quad and octal T1 > interface chips are inexpensive. So this is only a few cubic inches. > > Then, at the LP if custom coding a PC is too much trouble, pick up a used > channel bank on ebay for $500. You then get 24 analog lines to > record. I'd bet a 3/10 level person could do this for a grand or less in > hardware. > > The T1 (and all energy carrying conductors) out of the premises should be > suspect. Just be cause it's T1, OC-3, frame relay, xDSL, VOIP, etc, don't > assume it's too complex for an attacker to go after. > > Here's a tutorial on the innards of T-spans if you're really interested... > " All You Wanted to Know About T1 But Were Afraid to Ask" is the title. > HTTP://www.dcbnet.com/notes/9611t1.html > > Cheers, > JohnM > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4245 From: Aimee Farr Date: Mon Dec 3, 2001 8:09pm Subject: HR 3367 [In general, I don't understand Eisenhowerish clearance procedures, because I think it's a false sense of security in search of some "traitor gene" that does not exist. ~Aimee] H. R. 3367 To amend title 10, United States Code, to require certain contractors with the Department of Defense to perform background investigations, psychological assessments, and behavioral observations, and provide fingerprint cards, with respect to individuals who perform work on military installations or facilities. IN THE HOUSE OF REPRESENTATIVES November 28, 2001 Mr. SAXTON (for himself, Ms. HARMAN, Mr. LOBIONDO, and Mr. ANDREWS) introduced the following bill; which was referred to the Committee on Armed Services ---------------------------------------------------------------------------- ---- A BILL To amend title 10, United States Code, to require certain contractors with the Department of Defense to perform background investigations, psychological assessments, and behavioral observations, and provide fingerprint cards, with respect to individuals who perform work on military installations or facilities. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SECURITY REQUIREMENTS REGARDING CERTAIN INDIVIDUALS PERFORMING WORK UNDER DOD CONTRACTS. (a) IN GENERAL- (1) Chapter 137 of title 10, United States Code, is amended by inserting after section 2305a the following new section: `Sec. 2305b. Contracts to perform work at military facilities and installations: security procedures required `(a) IN GENERAL- No contract, for which the duration for the time of performance exceeds 3 days, may be awarded to perform work at a facility or installation of the Department of Defense unless the potential contractor implements procedures under which a background investigation, psychological assessment, and behavioral observation is conducted, and fingerprint cards are provided, with respect to any individual who will perform such work. `(b) BACKGROUND INVESTIGATION- A background investigation required under this section shall-- `(1) be designed to identify past actions that are indicative of an individual's future reliability with respect to performing work at a facility or installation of the Department of Defense; `(2) verify the individual's true identity; `(3) develop information concerning the individual's employment history, education history, credit history, criminal history, and military service; and `(4) verify the individual's character and reputation. `(c) PSYCHOLOGICAL ASSESSMENT- A psychological assessment required under this section shall be designed to evaluate the possible impact of any noted psychological characteristics that may have a bearing on trustworthiness and reliability. `(d) BEHAVIORAL OBSERVATION- A behavioral observation required under this section shall be conducted by supervisors and shall be designed to detect individual behavioral changes that, if left unattended, could lead to acts detrimental to the public health and safety.'. (2) The table of sections at the beginning of such chapter is amended by inserting after the item relating to section 2305a the following new item: `2305b. Contracts to perform work at military facilities and installations: security procedures required.'. (b) APPLICABILITY- Section 2305b of title 10, United States Code, as added by subsection (a), shall apply with respect to contracts under which work is commenced on or after the date that is one year after the date of the enactment of this Act. END 4246 From: James M. Atkinson Date: Mon Dec 3, 2001 8:36pm Subject: The Wizards of Langley Here is another book that list members may find of interest http://www.amazon.com/exec/obidos/ASIN/0813366992/graniteisland-20 The Wizards of Langley: Inside the CIA's Directorate of Science and Technology by Jeffrey T. Richelson Editorial Reviews Amazon.com For many, the CIA conjures up a shadowy world of spies, international intrigue, and secret corridors of power. While this image may be partially accurate, the primary function of the agency is less romantic: the collection and analysis of information. To this end, the CIA's Directorate of Science and Technology is indispensable. As the group responsible for creating the tools that allow the spymasters to do their jobs, the DS&T has been "a key element in the history of both the CIA and the entire intelligence community," writes Jeffrey Richelson, a specialist on American intelligence operations. In The Wizards of Langley, he traces the directorate from its inception in 1947 to the present, analyzing each aspect of its activities and responsibilities in exhaustive detail, along with the infighting and political wrangling that have accompanied its growth. As Richelson points out, there were some missteps, such as administering LSD to scientists without their knowledge (one committed suicide as a result), employing cats as bugging devices, and the use of psychics, but overall the DS&T has made "an enormous contribution to U.S. intelligence capabilities and national security." Notably, the directorate has developed the U-2 spy plane and some of the U.S.'s most important surveillance satellites, and has been a pioneer in photointerpretation, the collection of signals intelligence, and foreign missile and space programs analysis. Some innovations have even had significant effects beyond the intelligence community, such as lithium batteries for pacemakers and methods for the detection of breast cancer. The book also offers a wealth of anecdotes, giving readers a rare look at top-secret operations and spy games of the cold war. Though the sheer amount of detail sometimes bogs down the narrative, this is a gold mine for those interested in the largely unsung heroes who have enabled the CIA to work so effectively. --Shawn Carkonen From Publishers Weekly In recent years, the media have presented several reports on the tragic and scandalous 1953 death of army scientist Frank Olson. Ten days before Olson died, a Central Intelligence Agency researcher had slipped a dose of LSD into the unwitting Olson's drink. The hapless army scientist quite literally went mad and leapt to his death from the window of his New York hotel room. Press accounts have couched Olson's death as the work of a sinister CIA. In Richelson's even presentation, the Olson case,... read more -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4247 From: James M. Atkinson Date: Mon Dec 3, 2001 9:23pm Subject: The 21st Century 23rd Psalm (with apologies to the psalmist David) The U.S. Constitution is my Shepherd; I shall not yield. It maketh me to speak my mind. It compelleth me to keep and bear arms. It restoreth my hope. It leadeth me in the paths of righteousness, for Liberty's sake. Yea, though I walk through the Valley of the Shadow of Carnivore, I will fear no Agency; for hardened UNIX is with me. Thy Pine and thy PGP, they comfort me. Thou preparest a banquet before me; on the menu are my enemies. Thou anointest my cipher with random_seed; My buffer will never runneth over. Surely vigilance and security will follow my wake all the days of my life, and I will dwell in the Land of the Free forever. Amen -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4248 From: James M. Atkinson Date: Mon Dec 3, 2001 10:29pm Subject: The New Radio A lady bought a new Lexus. Cost a bundle. Two days later, she brought it back, complaining that the radio was not working. "Madam," said the sales manager, "the audio system in this car is completely automatic. All you need to do is tell it what you want to listen to, and you will hear exactly that!" She drives out, somewhat amazed and a little confused. She looked at the radio and said "Nelson." The radio responded, "Ricky or Willie?" Soon, she was speeding down the highway to the sounds of "On the road again". The lady was astounded. If she wanted Beethoven, that's what she got. If she wanted Nat King Cole, she got it. Suddenly, at a traffic light, her light turned green and she pulled out. Off to her right, out of the corner of her eye, she saw a small sports utility vehicle speeding toward her. She swerved and narrowly missed a head-on collision. "F*%#ING ASSHOLE," she muttered. And, from the radio.... "Live from Afghanistan, an interview with Osama Bin Laden ..." -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4249 From: Dave Emery Date: Mon Dec 3, 2001 7:09pm Subject: Re: Question on T! links On Tue, Dec 04, 2001 at 01:54:23AM +0100, Miguel Puchol wrote: > With a little handycraft, you could adapt a DECT engine to feed at least > part of the trunk (or have a few DECT engines to grab it all). DECT can > offer data rates of up to 552kbps, with potential to go further. A Siemens > DECT board is very small, and can be concealed in many places. Also, most > spyshop sweepers would dismiss a DECT signal as a near-by wireless telephone > setup. > > So, you could combine the method you describe with some DECT boards, and > have a wireless T1 intercept system. Watch out for this, 'cos if it's not > been invented yet, I bet it will soon be...(if not with DECT using something > alike). > > Cheers all, > > Mike A similar approach, but less easily concealled, would be to use a laptop or PC with both a T1 interface card and a 802.11b modem. 802.11b can relatively easily handle the aggregate data throughput of both sides of a T1, and presumably one would make the software combine both directions of the trunks into one audio stream anyway and ship it out in some conveniant format as Voice over IP rather than as raw streams of bits resulting in considerable compression. Also not to be overlooked or forgotten in sweeps is someone compressing and shipping the intercepted audio out over the Internet as an encrypted Real-Audio or similar relatively low bandwidth stream, or even as big files on a hidden web site... > -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 4250 From: Miguel Puchol Date: Tue Dec 4, 2001 2:37am Subject: Re: Question on T! links Yep. You could even drive an 802.11b PCCard card from a microcontroller (it has been done for vehicle tracking inside airports), and thus part with the laptop. Regarding the Internet output option, this is a real threat to be taken seriously. You could plug into the company's LAN and send out the audio as you mention. A very nifty program I use to see network traffic is CommView, runs on Windows platforms, and lets you capture every packet sent from/to a LAN interface or dial-up adapter to dissect it. It has turned up some very interesting (and privacy-busting) software a few times, hidden away as trojans on client's computers. All the best, Mike ----- Original Message ----- From: "Dave Emery" To: "Miguel Puchol" Cc: Sent: Tuesday, December 04, 2001 2:09 AM Subject: Re: [TSCM-L] Question on T! links > A similar approach, but less easily concealled, would be to use > a laptop or PC with both a T1 interface card and a 802.11b modem. > 802.11b can relatively easily handle the aggregate data throughput of > both sides of a T1, and presumably one would make the software combine > both directions of the trunks into one audio stream anyway and ship it > out in some conveniant format as Voice over IP rather than as raw > streams of bits resulting in considerable compression. > > Also not to be overlooked or forgotten in sweeps is someone > compressing and shipping the intercepted audio out over the Internet > as an encrypted Real-Audio or similar relatively low bandwidth stream, > or even as big files on a hidden web site... > > > > > > > -- > Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. > PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4251 From: Ray Van Staden Date: Tue Dec 4, 2001 9:40am Subject: Re: Question on T! links >On Tue, Dec 04, 2001 at 01:54:23AM +0100, Miguel Puchol wrote: >With a little handycraft, you could adapt a DECT engine to feed at least >part of the trunk (or have a few DECT engines to grab it all). DECT can >offer data rates of up to 552kbps, with potential to go further. A Siemens >DECT board is very small, and can be concealed in many places. Also, >most spyshop sweepers would dismiss a DECT signal as a near-by wireless >telephone setup. Most 'spy-shop sweepers' can't even detect a DECT signal. Scanlock ECM users can't. Ranger users can't. OSCOR users can't. For those who can detect it, their troubles are just starting. How many channels in use and how many users in each channel? The Scanlock M2 can detect DECT but does not do so very well, In an operational environment, it can't detect the channel set or obtain the spot frequencies of any channel it does detect. Unless the DECT signal is the strongest in the environment (which it rarely is), a DECT signal will usually be dismissed by an M2 user as noise. The channel bandwidth is 1.7 MHz and the 'capture' in each scan is very fragmentary. > So, you could combine the method you describe with some DECT boards, > and have a wireless T1 intercept system. Watch out for this, 'cos if it's >not been invented yet, I bet it will soon be...(if not with DECT using >something alike). It (and variations on it) have been in the field for some time now -not from spy shops though ;-) Raymond --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 4252 From: James M. Atkinson Date: Tue Dec 4, 2001 11:12am Subject: Re: Question on T! links Yes, the Scanlock, Ranger, Eagle,OSC-5000, and similar products are effectively deaf to such a signal. While they can be tuned to the signal, and you can see the energy, you have virtually no way to demodulate it. But a decent quality spectrum analyzer will detect it 100% of the time, and if you use a fast time domain sweep you can break the signal own even further. BTW: I stand corrected on the number of channels in a T1 line... I was thinking about a half T1.. it had been a long day, and I had recently spent some time fighting with several cross-continental half T1 circuits so my brain was in a half T1 state of mind. -jma At 5:40 PM +0200 12/4/01, Ray Van Staden wrote: > >On Tue, Dec 04, 2001 at 01:54:23AM +0100, Miguel Puchol wrote: >>With a little handycraft, you could adapt a DECT engine to feed at least >>part of the trunk (or have a few DECT engines to grab it all). DECT can >>offer data rates of up to 552kbps, with potential to go further. A Siemens >>DECT board is very small, and can be concealed in many places. Also, >>most spyshop sweepers would dismiss a DECT signal as a near-by wireless >>telephone setup. > >Most 'spy-shop sweepers' can't even detect a DECT signal. Scanlock ECM users >can't. Ranger users can't. OSCOR users can't. For those who can >detect it, their >troubles are just starting. How many channels in use and how many users in >each channel? > >The Scanlock M2 can detect DECT but does not do so very well, In an >operational >environment, it can't detect the channel set or obtain the spot frequencies >of any channel it does detect. Unless the DECT signal is the strongest in >the environment (which it rarely is), a DECT signal will usually be >dismissed by an >M2 user as noise. The channel bandwidth is 1.7 MHz and the 'capture' >in each scan >is very fragmentary. > >> So, you could combine the method you describe with some DECT boards, >> and have a wireless T1 intercept system. Watch out for this, 'cos if it's >>not been invented yet, I bet it will soon be...(if not with DECT using >>something alike). > >It (and variations on it) have been in the field for some time now >-not from spy shops though ;-) > >Raymond > >--- > >>From the desk of Raymond van Staden >Van Staden and Associates cc > >P.O. Box 1150 >Amanzimtoti >4125 >South Africa > >Tel: +27 (0)31 916-1262 >Fax: +27 (0)31 916-1263 > >Email: raymond@v... >Internet: http://www.vanstaden.co.za -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4253 From: Steve Uhrig Date: Tue Dec 4, 2001 0:04pm Subject: ics@f... Above list member has a virus in his machine. Anyone in his personal address book will get a mailing from him of an infected message. Delete without opening. Steve (detected and quarantined 38 viruses this AM alone). ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4254 From: Date: Tue Dec 4, 2001 11:14am Subject: U.S. seeks to use Canadian wiretaps in terror case U.S. seeks to use Canadian wiretaps in terror case By James Pierpoint CHARLOTTE, N.C., Dec 4 (Reuters) - U.S. prosecutors urged a federal judge on Tuesday to allow them to use evidence gathered by Canadian intelligence agents in the trial of nine members of an alleged Hizbollah cell operating out of North Carolina. The criminal trial, set to begin in April in a Charlotte, North Carolina, courtroom, has emerged as a test case for U.S. prosecutors as they seek to open a new front in the war on terrorism in federal court, attorneys on both sides said. Defense attorneys, trying to block what prosecutors admitted was the linchpin of their anti-terror case, argued that a 117-page intelligence summary of wiretapped Arabic conversations was unreliable, in large part because the original tapes have been destroyed. "We're hoping this will set good precedent for us," Assistant U.S. Attorney Ken Bell said of a ruling on the evidence, expected to be handed down in the coming weeks. The case, which began as an investigation into cigarette smuggling, would be the first to come to trial under a 1996 law that makes it illegal to aid foreign groups designated by the U.S. government as terrorist organizations, prosecutors said. Although the case has been under investigation for more than three years, the trial has drawn particular attention because it is being conducted as the Bush administration moves to try alleged terrorists involved in the Sept. 11 attacks in special military tribunals. Critics have said such tribunals would undermine the course of justice. Using proceeds from a multimillion-dollar cigarette-smuggling operation, nine members of the alleged Hizbollah cell stand charged with conspiring to funnel cash and military supplies to the Lebanese-based guerrilla group. Dubbed "Operation Smokescreen," the probe evolved into a terrorism investigation after the Canadian Security Intelligence Service (CSIS) alerted the FBI that they were tracking one of the defendants, Said Harb, and his alleged ties to Hizbollah. SECRET EVIDENCE A team of three U.S. prosecutors and two FBI agents later reviewed about 300 pages of summary reports of CSIS wiretaps. Those summaries became the key evidence used to obtain search warrants and indictments in the United States. During a two-day hearing that wrapped up on Tuesday, defense attorney John Cline criticized U.S. prosecutors for winnowing the 300 pages of wiretap summaries down to about 117 pages, possibly excluding evidence that would undermine the U.S. case against the alleged Hizbollah supporters. "What the government views as relevant is often very different from what the defense views as relevant," he said. Defense attorneys also challenged conclusions drawn by Canadian intelligence analysts translating the tapes into summary reports. On one summary, for example, one of the defendants was quoted as saying he had "great respect for the men of the resistance," which the analysts took to be a reference to anti-Israeli guerrillas in southern Lebanon. "What we're talking about is secret evidence that the (Canadian) government compiled in a secret manner," Harb's court-appointed defense attorney, Chris Fialko, said. Federal prosecutors lost an earlier bid to have CSIS wiretap summaries admitted into evidence. A federal judge presiding over the trial of Algerian national Ahmed Ressam, convicted in April of plotting an attack during the millennium celebrations, tossed out 705 pages of CSIS wiretap summaries in that case, in part because the tapes themselves had been destroyed. Ted Flanigan, CSIS chief of counter-terrorism for the Toronto region, said during the hearing that the agency routinely destroys tapes after they have been summarized into analysts' reports to avoid compromising its intelligence operation. "We're not collecting tapes for an evidentiary purpose," he said. "When we have completed that reporting process, we have no need for the tape." Prosecutors said they plan to call at least one Canadian intelligence analyst to testify during the trial, and have asked the court to consider several "protective measures," including a screen to shield the agent's identity. 15:50 12-04-01 4255 From: Paolo Sfriso Date: Tue Dec 4, 2001 3:49pm Subject: Fw: Urgent New Virus Not Yet detected by Norton Dear Colleagues. Following is a report on an extremely new virus not yet detected by TODAY'S update of Norton 2002 ! Malicious Software Report W32/Gone.A@mm, I-Worm.Goner, Gone ============== New virus just appeared. Research indicates that it may cause some problems as not all antivirus products have software updates available as yet. At the time of writing, Messagelabs indicate that they are seeing increasing numbers of infected files being stopped by their systems. http://www.messagelabs.co.uk/viruseye/ Detail ====== NAME: Goner ALIAS: W32/Gone.A@mm, I-Worm.Goner, Gone Goner is a mass-mailer written in Visual Basic. It appeared on December 4th, 2001. The worm spreads itself using Outlook and ICQ if it's installed on an infected computer. When the worm's file is run, it shows a dialog box with greetings and some animation. This is done to disguise itself. Then it shows a messagebox with a fake error message. The worm copies itself as GONE.SCR to Windows System folder and tries to creates its startup key in the Registry. Then the worm connects to Outlook Address Book, reads e-mail addresses from it and sends itself to all these addresses. The infected message looks like: Subject: Hi Body: How are you ? When I saw this screen saver, I immediately thought about you I am in a harry, I promise you will love it! Attachment: Gone.scr URL: http://www.fsecure.com/v-descs/goner.shtml http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=WORM_GONE.A http://www.sophos.com.au/virusinfo/analyses/w32gonera.html Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 4256 From: MIKE F Date: Wed Dec 5, 2001 8:28am Subject: RE: Urgent New Virus Not Yet detected by Norton You Can Update your Norton Virus Definition Files ,Today Dec 5,2002 It became available for updating yesterday. I don't know if the Virus mentioned by Paolo is Detected. later4,mike f. -----Original Message----- From: Paolo Sfriso [mailto:paulsfriso@t...] Sent: Tuesday, December 04, 2001 4:50 PM To: TSCM-L@yahoogroups.com; osint@yahoogroups.com Subject: [TSCM-L] Fw: Urgent New Virus Not Yet detected by Norton Importance: High Dear Colleagues. Following is a report on an extremely new virus not yet detected by TODAY'S update of Norton 2002 ! Malicious Software Report W32/Gone.A@mm, I-Worm.Goner, Gone ============== New virus just appeared. Research indicates that it may cause some problems as not all antivirus products have software updates available as yet. At the time of writing, Messagelabs indicate that they are seeing increasing numbers of infected files being stopped by their systems. http://www.messagelabs.co.uk/viruseye/ Detail ====== NAME: Goner ALIAS: W32/Gone.A@mm, I-Worm.Goner, Gone Goner is a mass-mailer written in Visual Basic. It appeared on December 4th, 2001. The worm spreads itself using Outlook and ICQ if it's installed on an infected computer. When the worm's file is run, it shows a dialog box with greetings and some animation. This is done to disguise itself. Then it shows a messagebox with a fake error message. The worm copies itself as GONE.SCR to Windows System folder and tries to creates its startup key in the Registry. Then the worm connects to Outlook Address Book, reads e-mail addresses from it and sends itself to all these addresses. The infected message looks like: Subject: Hi Body: How are you ? When I saw this screen saver, I immediately thought about you I am in a harry, I promise you will love it! Attachment: Gone.scr URL: http://www.fsecure.com/v-descs/goner.shtml http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=WORM_GONE.A http://www.sophos.com.au/virusinfo/analyses/w32gonera.html Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [ 4257 From: Date: Wed Dec 5, 2001 4:35am Subject: Tripp May Lose Home to Foreclosure Tripp May Lose Home to Foreclosure .c The Associated Press COLUMBIA, Md. (AP) - Linda Tripp is facing foreclosure on the home where she recorded the telephone calls with former White House intern Monica Lewinsky that triggered the impeachment of President Clinton. CitiMortgage Inc. filed a foreclosure action in Howard County Circuit Court against Tripp late last month, noting a mortgage balance of $116,098.61, including late charges and interest. Attorney Joseph Murtha, who defended Tripp in the state's unsuccessful prosecution on wiretap charges, said she hasn't lived in the house for months, and has been out of work since she was fired from the Department of Defense. Tripp surreptitiously taped recordings of Lewinsky confiding a sexual relationship with Clinton. Tripp lost her job at the Pentagon after she refused to resign like other political appointees on the last day of Clinton's term, her lawyer has said. The Defense Department said her termination letter was routine and that she was not singled out. ``It's been very difficult for Linda to focus on where her career goes from this point in her life,'' he said. Tripp, who now lives in Middleburg, Va., had hoped to find another government job, but has not been rehired, Murtha said. She had rented out the Columbia house for a while after moving, but the house is currently unoccupied. Murtha said Tripp hopes to resolve any issues with the mortgage and possibly sell the house on her own. Tripp earned nearly $100,000 a year as a public affairs specialist at the Defense Department's Defense Manpower Data Center in Arlington, Va. She had been in a civil service job in the White House under former President Bush before getting a political appointment, pay raise and new job at the Pentagon in 1994. AP-NY-12-05-01 1009EST 4258 From: James M. Atkinson Date: Wed Dec 5, 2001 10:07am Subject: Re: Tripp May Lose Home to Foreclosure Ha, It couldn't happen to a nice dirt bag, er.. I mean person. -jma At 10:35 AM -0500 12/5/01, MACCFound@a... wrote: >Tripp May Lose Home to Foreclosure > >.c The Associated Press > > >COLUMBIA, Md. (AP) - Linda Tripp is facing foreclosure on the home where she >recorded the telephone calls with former White House intern Monica Lewinsky >that triggered the impeachment of President Clinton. > >CitiMortgage Inc. filed a foreclosure action in Howard County Circuit Court >against Tripp late last month, noting a mortgage balance of $116,098.61, >including late charges and interest. > >Attorney Joseph Murtha, who defended Tripp in the state's unsuccessful >prosecution on wiretap charges, said she hasn't lived in the house for >months, and has been out of work since she was fired from the Department of >Defense. > >Tripp surreptitiously taped recordings of Lewinsky confiding a sexual >relationship with Clinton. Tripp lost her job at the Pentagon after she >refused to resign like other political appointees on the last day of >Clinton's term, her lawyer has said. The Defense Department said her >termination letter was routine and that she was not singled out. > >``It's been very difficult for Linda to focus on where her career goes from >this point in her life,'' he said. > >Tripp, who now lives in Middleburg, Va., had hoped to find another government >job, but has not been rehired, Murtha said. > >She had rented out the Columbia house for a while after moving, but the house >is currently unoccupied. Murtha said Tripp hopes to resolve any issues with >the mortgage and possibly sell the house on her own. > >Tripp earned nearly $100,000 a year as a public affairs specialist at the >Defense Department's Defense Manpower Data Center in Arlington, Va. She had >been in a civil service job in the White House under former President Bush >before getting a political appointment, pay raise and new job at the Pentagon >in 1994. > >AP-NY-12-05-01 1009EST -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4259 From: James M. Atkinson Date: Wed Dec 5, 2001 10:13am Subject: Ramsey DAP25 - Amplified Broadband Discone Antenna [Initial Comments] Good Morning, Several weeks ago I ordered a DAP25 - Amplified Broadband Discone Antenna kit from Ramsey Electronics. The product cost is less them $34.95 in kit form, or $49.95 in pre-assembled form. being that I am a tech-head (and a cheap bastard) I opted for the kit version. The project took less then 45 minutes, with most of the time spend reading the manual and looking for parts listed in the bill-of-materials, but missing from the kit. The actual soldering and physical assembly was about 20 minutes, and I had all my tools, solder, SMT cement, and glue laid out prior to starting assembly. My initial impression is that the kit is a piece of crap... yes, that's right... a piece of crap, and it will remain a pieces of crap until Ramsey gets their act together reworks the PCB, the manual, and the kit components. 1) The horizontal element (top) is a poorly cut out piece of jagged sheet metal with burrs and sharp edges. The holes punched in the metal for the nylon standoffs appear to have been simply punched out with a nail which makes the hole ragged. Drilling the holes would not have taken any longer, but would have made it a better product. The top could afford to be a little thicker as it is just a wee bit too flimsy. 2) The "cone" or vertical element is nothing more then a cheap sheet metal funnel, but it seems do the job. As an engineer who is also a native new Englander I appreciate the resourcefulness of the product design, but felt it was cheesy for the product to consist of a piece of clip out sheet metal and a funnel. 3) The pictures in the catalog clearly show that the cable is several considerably longer then the one that actually came with the kit. The picture also shows what appears to be an N-Type connector, but what was supplied was a crappy little F-Style which is totally inappropriate for the for signals below 1.5 GHz (the antenna specs actually claims that it is operational to 2.5 GHz) 4) I figured out that they used the F-Style cable to cheaply interface to a "Feed thru power inserter", which someone had neglected to include in the kit I purchased for this evaluation. (More on this later) 5) The SMT assembly is fairly simple, but I found that the PCB was not laid out very well, and that it really should have had more of a ground plane on the component side. I used a fast set SMT glue, an fluxed the pads, then placed the components in their respective positions. I used a SMT soldering tip for the components, performed a visual inspection, and went on with the assembly. 6) Instead of using the crappy little cable they supplied I opted for a nice piece of my own RG-223 and an SMA cable for testing. In no location does the book actually indicate 7) I would STRONGLY advise that prior to assembling the kit that you carefully remove the pad for P1 on the NON-COMPONENT side of the PCB. Due to a poor board layout you run a risk of accidently shorting out the unit when you solder the braid to the ground plane. Simply use an Exacto blade or a Dremel tool and remove the pad and the through hole (but be careful to leave the pad on the component side intact). 8) The manual fails to mention the IMPEDANCE of the antenna, so your kind of on your own with the thing. I would caution people who use the PASSIVE (non-preamplifed) version for any kind of transmitting... If you do not know what the antenna impedance is, you run a risk of an impedance mismatch and could burn up your transmitter. 9) Since my kit was lacking the bias coupler (Ramsey calls it a "Feed thru power inserter") I grabbed one of my lab grade units and dropped it between the antenna and Spectrum Analyzer. 10) The electrical performance is really, really poor above 1.5 GHz, but performs admirably on the 902-928 ISM band and performs well from about 300 MHz to about 1 GHz . 11) I did notice some problems with the circuit oscillating at about 300 MHz, and would suggest adding a small ferrite bead to the board in future designs. 12) Overall gain of the preamp was minimal, and measured between 12-15 dB (it looks like a 18-20 dB MMIC) 13) Since the preamp circuit is an integral part of the antenna and you get some fairly decent gain when compared to a telescoping whip antenna (even one with a pre-amp). 14) The antenna is by no means a replacement for a professional grade DISCONE or waveguide and LNA during a sweep, but it does give you a cheap (as in really cheap) antenna to cover things above about 350 MHz. 15) The antenna and preamp performs decently from 385 to 450 MHz so you could use it with a dedicated scanner to cheaply hunt for nasty little Japanese bugs in this range. You could dedicate a second antenna and scanner to the 900 MHz band and so on. 15) I found it helpful to cut a notch in the PVC antenna mount they provided, and then added my own length of PVC pipe for a crude, but easily transported floor stand. 16) I also fiddled around a little bit with a variable cap and inductor installed at the front end of the preamp to act as a tunable high pass filter to clean up the lower end a little better. 17) I then got a little more "nerdly", got out my calculator, recomputed the discone dimensions, took a marking pen, marked out some lines, and chopped off about half of each discone elements (I am dangerous with a Dremel tool). I also cut down the size of the standoff to the appropriate size. I then added a couple of extra SMT components for a 900 GHz highpass filter and ended up with a pretty snazzy preamplified discone that covered 900 to 2.5 GHz. 18) I would also suggest that you completely ditch the coax they provide you with and simply mount a male SMA connector right to the back of the PCB. Overall, I would encourage you to buy a couple to play with, and maybe even re-cut several for use during a sweep hooked up to a dedicated receiver or scanner (each watching a specific bug band.. Ramsey needs to clean up the design, and then offer the product pre-cut to four to six different bands. -jma -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4260 From: Paolo Sfriso Date: Wed Dec 5, 2001 9:16am Subject: Internet Provider censors client's Emails Dear Colleagues. Following my Virus alert of yesterday evening, I received the following automated Email from an Internet Provider. IMHO this "Carnivore" like system could be well used for censoring and/or intercepting client's Email traffic. Food for thought ? Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... ----- Original Message ----- From: To: Sent: Wednesday, December 05, 2001 4:46 AM Subject: ALERT Possible Worm.A Infection > From: "Paolo Sfriso" > To: , > Subject: [TSCM-L] Fw: Urgent New Virus Not Yet detected by Norton > > The e-mail message cited above, apparently from you, was NOT delivered. > SuffolkWeb filters all incoming e-mail messages for the presence of phrases > typically found in messages that distribute viruses, worms, or other > malicious code. The cited message contained one or more of the phrases > that we filter. > > Our email gateway has detected that your message MAY contain > hazardous attachments or embedded scripting, and has prevented its > delivery to the intended recipient. The System Administrator has been > notified. > > It is possible that your computer has been infected by a virus, > or you have been the target of an email worm which is now attacking > other computers on its own, without your knowledge or consent. This > is particularly possible if you don't recall sending the message that > caused this notice to be sent to you. > > Information on SuffolkWeb filtering policy may be viewed at the following URL: > > http://www.suffolk.lib.ny.us/virus > > If you used one of the rejected phrases, please reword your message and resend > your message again. SuffolkWeb will be happy to deliver the message. > > If you did NOT send the message, you should check your computer for the virus, worm, or malicious code mentioned in the subject line of this e-mail. The PCFA.ORG web pages give additional sources of information to assist you. It is possible someone is using your e-mail address, that a virus has mutated to appear to be from your address, or something else. Good luck. > > SuffolkWeb System Administrator > 4261 From: Roger Pilkington Date: Wed Dec 5, 2001 10:24am Subject: Re: Question on T! links I noted with interest Raymond van Staden's comments regrding DECT signals and agree the old Scanlock ECM had to be pretty close to pick up DECT handsets. In addition to DECT, modified GSM cellphones are regarded as a major threat here in Europe, particularly in UK. After all, it's a cheap,readily available, digital, encrypted, remotely controlled bugging system. As Raymond points out, the burst nature of DECT makes it impossible for Ranger and OSCOR users to be alerted. We tested an OSCOR last year but were disapppointed when it failed to pick up a number of common digital devices and in fact didn't see a simple sub-carier transmitter, which was a shame as its'a nicely packaged TSCM unit. We eventually replaced our Scanlock ECMs with Scanlock M2s which do what we want. Raymond - if you are looking for DECT phones with the Scanlock M2, a quick method is to operate in SSS mode with the AM demodulator selected. The best way to locate the source is to use the Squelch setting to home in on the device. The M2 spectral analysis software is useable for this, but as you say, the resultant scan will be fragmentary. A very useful unit for sweepers to carry around on their belt is Sig-Net. It's a handheld, broadband, bug detector. Around 10MHz to 3GHz. It detects all digital and analogue transmitters in that range including DECT,GSM, 2.4-2.5GHz video Tx and all those other tricky little devils. Two alarms allow you to differentiate between burst and conventional transmissions. It also has sensitivity and alarm threshold settings. At a cost of under £1,000.00 ($1,400.00?), we are giving them to key clients to carrry out pre-meeting sweeps and have running real-time. (Between sweeps and when we are not present for the extra sensitive meetings of course). Yes I know! But most of our clients have good access control and the inter-sweep threat is mainly from 'quick-plant' RF bugs. Hope this helps Roger Pilkington Resolution Security/Audit Com UK London From: kondrak Date: Sat Nov 30, 2002 3:52am Subject: Re: SSO / crypto/ autoauth solution The main problem I see here is: "be able to get through metal enclosures"... Metal enclosures make an ideal faraday shield, and nothing in the frequencies they block (varied depending on the enclosure type) will get through, thus the durability is moot if the signal doesn't pass well.. At 20:03 11/29/02 -0800, you wrote: >I'm looking for a locality-based wireless (NOT requiring a specific type of >wireless, but should be able to get through metal enclosures) authentication >'system' (the wireless doesn't have to be secure) with an effective radius >of a few feet which can be tied to a fob (of an ounce or three in weight >which will be attached to existing security fobs - will get a lot of >physical abuse which must be covered by the same type of warranty as a swipe >badge would be, should stand up to being slapped against walls, etc., over a >few years) on one side and stored inside a metal enclosure on the other side >which will detect when the fob is within the short radius and log >events/allow the first level of authentication to the 'system' to occur. >The 'system' will need to use a pin code for this component which is ID'd to >the two devices, and given to the authorized user to use. > >Secondly, the 'system' will be tied to other authentication and crypto >systems and should not interfere with these systems. > >Third, the 'system' needs to interface with and be manageable with generally >accepted technologies such as active directory/NDS/domains/TACACS+ / RADIUS, >etc. and have extensive reporting and auditing capabilities over openly >acceptable protocols yet be signed and encrypted using two PGP keys and a >secure communications protocol over which all communications will occur - >this will be sniffed for authenticity to ensure that it is secured. > >Fourth, the 'system' must interface with HP Openview and will get bonus >points for being a HP Openview certified reporting device. > >Fifth, multiple master override pins will have to be storable in all the >fobs for security and administration and facilities to bypass the security >controls on the single fobs. > >Sixth, the fob and internal device should have a multi-year battery life and >be self-sealed and will terminate authentication if opened. > >For those that have such a solution, email me directly at this email - >mpaulsen@a..., and if you screen past, we'll move on to the customer. >I'll need around 1000 devices, a server system, reporting system and >automated intrusion analysis coverage for it. This isn't going to be a >quick sale but the right solution will begin getting sales shortly for >testing purposes, and I will order around 1000 over the next few years and >additional after that at an estimated 20% maintenance plan every year >thereafter. > >Thanks, > >Matt > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6604 From: Fernando Martins Date: Sat Nov 30, 2002 4:42am Subject: RE: It's official Heaven is the only place where Windows can run without evil people around Purgatory use linux to set a secure way to heaven About Mac, let it burn, who cares? FM > -----Original Message----- > From: kondrak [mailto:kondrak@s...] > Sent: Saturday, November 30, 2002 9:52 AM > To: mpaulsen6@a... > Cc: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] It's official > > > MMmm...share some of that stuff youre smokin, Heaven runs > Linux...believe me... > > At 20:04 11/29/02 -0800, you wrote: > >Heaven uses macintosh, so much for linux and Microsoft (we all know > >where that was made...) Just saw it on the Muppet christmas > special on > >NBC 6605 From: kondrak Date: Sat Nov 30, 2002 5:36am Subject: RE: It's official heh..I'll agree about Mac, but Linux is used by the knowledgeable, and those, are certainly NOT the M$ users... (The devotee's of Tux are the ones that make it to nirvana...actually I prefer the name Stovakor...heh.. my Klingon is showing) At 10:42 11/30/02 +0000, you wrote: >Heaven is the only place where Windows can run without evil people >around AND prob the only place without the BSOD... >Purgatory use linux to set a secure way to heaven uh..But that implies forever in limbo, and though theres a learning curve, those that succeed in mastering it are indeed the chosen..and blessed, for they live without the 'evil' bird, the albatross of Bill Gates around their neck.. >About Mac, let it burn, who cares? Agreed...a waste of intellectual capital... >FM Great insight Fernando....thanks! 6606 From: Matt Paulsen Date: Sat Nov 30, 2002 11:58pm Subject: RE: It's official Other things to note about that show which were displayed for your 5 year old to learn... Binge drinking - Animal and a beer bong getting hammered until he passes out onstage... Domestic violence - Miss Piggy and Kermit.. Racial slur against asians - security guard at the bank not understanding english and letting Fozzie Bear in... God is a black female - Whoopie Goldberg doing her thing, I'm sure the vatican would approve... The jurrasic butterfly - Acid trip.. pure and simple analogy of drug use. Mob violence - Fozzie Bear being chased by a bunch of Who's. Breaking and entering - Fozzie Bear breaking into a bank. -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: Saturday, November 30, 2002 3:37 AM To: fernando.martins@e... Cc: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] It's official heh..I'll agree about Mac, but Linux is used by the knowledgeable, and those, are certainly NOT the M$ users... (The devotee's of Tux are the ones that make it to nirvana...actually I prefer the name Stovakor...heh.. my Klingon is showing) At 10:42 11/30/02 +0000, you wrote: >Heaven is the only place where Windows can run without evil people >around AND prob the only place without the BSOD... >Purgatory use linux to set a secure way to heaven uh..But that implies forever in limbo, and though theres a learning curve, those that succeed in mastering it are indeed the chosen..and blessed, for they live without the 'evil' bird, the albatross of Bill Gates around their neck.. >About Mac, let it burn, who cares? Agreed...a waste of intellectual capital... >FM Great insight Fernando....thanks! ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6607 From: Hawkspirit Date: Sun Dec 1, 2002 0:55pm Subject: Ross Newsletters Old Jim Ross Newsletters http://www.textfiles.com/magazines/COMSEC/ 6608 From: private investigations Date: Sun Dec 1, 2002 1:27pm Subject: italian investigator and security consultant My name is Alberto Biancofiore. Thank for my subscription. I'm the owner of Radar Detectives agency - located in Livorno Italy. I have often been in touch with foreign collegues amd my activities cover all around Italy. At your disposale there will be my experience in the investigating and security field since many years of full time skilled work. I often work for firms who need security and TSCM services. Nowdays it is very important to stay in touch with well trained collegues. All the best, Alberto Alberto Biancofiore Radar Detectives Agency Scali del Corso n.5 57123 Livorno - Italy International Investigations Marine Investigations www.radardetectives.com f.ferro1@v... [Non-text portions of this message have been removed] 6609 From: Lewis Z. Koch Date: Mon Dec 2, 2002 11:24am Subject: Insights, discussions for a book I'm writing To TSCM list members: I am in the process of early research for a book which, in part, deals with private police. In connection with my research I've found several law review articles and one book -- the most serious articles are by David Sklansky in the 1999 UCLA Law Review, Professor Susan Brenner's California Law Review article, "Is There Such a Thing as a 'Virtual Crime?" and Kelly D. Hines' "Vigilantism Revisited: An Economic Analysis of the Law of Extra-Judicial Self-Help or Why Can't Dick Shoot Henry for Stealing Jane's Truck? The book is "The New Parapolice -- Risk Markets and Commodfied Social Control." by George S. Rigakos It turns out there are very, very few laws which "govern" the actions of private police -- be it it a large agency, a small one, or even the individual entrepreneur. I was surprised, for example, that "private police" can gather evidence in a manner considered unconstitutional if done by a state-regulated "police" agent (local, state, federal) -- yet that same evidence, gathered in an extra-legal way by a non-state agent, can be turned over to state agency police and prosecutors and used in a court of law to convict the accused. (In a recent case, a Turkish physician/hacker "found" child porn on a American citizen's computer -- an act which, if committed in the United States by a "hacker" would be illegal, and put the perpetrator in jeopardy (or vulnerable to civil action) yet this out of country hacker notified US authorities about the contents he had found in the computer, who in turn arrested the US citizen, tried and convicted him. His long conviction and jail sentence are under review.) I am not specifically looking for "computer cases" (though that would be fine as part of my overall investigation.) I am looking for private police actions and behaviors which extend the boundaries which confine state-agent police. Since it appears there a few "lines in the sand" which may not be crossed with almost absolute impunity, what "governs" private police behavior? What "oversights," if any, on private police exist. Examples are much desired, but naturally, the strictest confidences will be observed. For those of you interested in helping with this research, please respond off list. If you have any questions about my writing, please look at the web site listed below, for my bio and some columns I recently wrote.If you have further questions, please don't hesitate to contact the owner of this list, Jim Atkinson, who has known my work and my ethical conduct for some time. (A Google search of my name will turn up other materials I have written.) Any further reading materials, cases studies references appreciated. Thank you. Lewis Z. Koch (pronounced "Cook") [Non-text portions of this message have been removed] 6610 From: Sisk Date: Tue Dec 3, 2002 2:14am Subject: police hidden videocamera without a warrant witnesses a felony re: police hidden videocamera, without a warrant, witnesses a felony obviouly I would assume the tape would be inadmissable. the camera was planted outside, but on private property, in a tree by police for drug surveillance. no warrant. it tapes a felony assault resulting in an indictment for felony assault. no drug charges. anyone know the actual legalities? happened in USA, Texas. Thanks! 6611 From: ed Date: Tue Dec 3, 2002 4:23pm Subject: Dutch wiretapping not kosher This article is a translation of the Dutch article Nederlandse tapkamers niet kosjer that will appear in c't 2003-01, which will be available in the shops on december 19 2002: http://www.fnl.nl/ct-nl/archief2003/ct2003-01-02/aftappen.htm Dutch tapping room not kosher by Paul Wouters, Patrick Smits According to anonymous sources within the Dutch intelligence community, all tapping equipment of the Dutch intelligence services and half the tapping equipment of the national police force, is insecure and is leaking information to Israel. How difficult is it to make a back-door in the Dutch Transport of Intercepted IP Traffic[1] system? The discussion focusses on the tapping installations for telephony and internet delivered to the government in the last few years by the Israeli company Verint[2]. This company was called Comverse-Infosys[3] until half a year ago, but was quickly renamed when the FBI started several investigations against it and arrested some of its employees in the US on suspicion of espionage. (See pulled FoxNews stories, Politech, Cryptome or Google). People within the Dutch government got worried too. Especially because they had been warned as early as 1998 about the possible back-doors in the tapping equipment. The ex-ministers of interior ("Binnenlandse Zaken"), Peper and de Vries, could not comment. The minister of Justice at the time, Korthals Altes, was asked to report to parliament in december 2001, where he stated that the security measures meet the required level and that an investigation would be started if this, after all, was not the case. No investigation followed. In april 2002, Kolkert, procecutor in-chief of the Court of Appeals in Den Bosch, demanded clarification in a letter sent to Stein, the state procecutor ("landelijk officier van justitie") and responsible for interception matters. Stein stated that there are no problems. On august 24 the project leader of the National Interception Organisation ("Landelijk Interceptie Orgaan", LIO) J.Steeg announced that he plans to check the tapping rooms for backdoors. However, when the equipmenent was bought from the Israelis, it was agreed that no one except Comverse personel was authorized to touch the systems, according to the insider of the AIVD (formerly BVD), the Dutch intelligence organisation that spoke to the EO radioprogram De Ochtenden[4]. Source code would never be available to anyone. Finally, on October 10th, the Council of Chiefs of Police ("raad van hoofdcommisarissen") sent a confidential letter to the vendors of tapping equipment for ISPs and telcos expressing its concern about the situation in the US. All of this came after questions were raised publicly in the trial against Baybasin, co-founder of the Kurd parliament in excile, about the possible leaks in the Dutch tapping room as well as manipulation of the collected evidence[4b]. Baybasin was recently sentenced to life-long imprisonment for his connections to assasinations, kidnappings and heroine transports. His lawyers called in experts to question them about the possibility that Israel had laid hands on information tapped by the Dutch. The lawyers claim that Israeli then forwarded the information to the Turkish secret service[5]. Baybasin recently told the media about the Turkish government's involvement with crime syndicates. c't magazine warned about the blackbox problem in its June 2001 issue[6]. Opentap[7] gave similar warnings on the hacker conference HAL2001[8] in august of 2001 and at the Chaos Computer Club (CCC)[9] in december 2001 with a presentation on lawful interception in the Netherlands[10]. Hebrew as crypto The insiders at the AIVD and the tapping room were interviewed by the radio program of the EO[11]. According to them, the Dutch government and Comverse have a gentlemen's agreement that the Dutch government would get the Comverse systems for a very reduced price and in exchange the Israelis would get full access to all tapped information. The systems still ended up being more expensive than rejected competitors' quotes. The Comverse maintanance contract alone apparently costs more then the installation itself, according to the anonymous sources. Since the leaks seem to be disguised as maintenance, one could say that the Dutch government is actually paying the cost of foreign intelligence against the Dutch state. Israeli Comverse employees apparently show up in the tapping rooms on a very regular basis for maintanance, since no Dutch are allowed to touch the equipment. The radio program further stated that the maintanance is done using their own Hebrew keyboards and language. They leave the tapping rooms with filled MO-discs and no-one from the Dutch government has any idea what the Comverse people are doing. To make things yet worse, Comverse can dial-in to the tapping room equipment at all times. The possible criminal nature of Comverse and their overpricing are not the only problems. A comparison of the Comverse tapping records with billing records of KPN, the largest Dutch telco, shows that 20% of the calls that should be tapped, are not tapped at all. The Dutch government still keeps buying Comverse equipment. On november 26, a day after the EO radio program was broadcasted, three political parties, D'66, GroenLinks and SP asked questions to the government in parliamant. The current minister of interior, Remkens, answered that the chance of the tapping rooms leaking information is small, but not zero. He further claimed that the Comverse employees were given the most strict screening by the Dutch intelligence agency AIVD, and that they are never allowed to work without supervision. Comverse was chosen based on its price-performance results, the minister said. Hacking the system? In an interview with 2Vandaag[12], a daily Dutch television news program, defense specialist and LPF party leader Herben believes that there is enough cryptography know-how available in the Netherlands to hack the systems, if Comverse does not assist in the evaluation process. Apparently, Herben hasn't thought about the intrusion detection system that has undoubtedly been installed in these tapping systems by Comverse. He also seems to forget (as did Remkes) that these systems work in Hebrew. On top of it, proving the inner workings of the machines to be correct and safe is anything but a trivial task. The capacity of the MO-discs and the bandwidth of the dial-up facilities is not enough to copy a lot of internet traffic or entire telephone conversations. A Comverse employee would have to swap disks so often, that he would have to use the tapping room as a hotel. So, assuming that there is no (illegal) high-speed internet connection between the tapping room and the Israeli embassy, what the Comvers staff can do at the most on these visits is to copy a list of who talks to whom, and the cryptographic keys that are used to secure the tapping communications. Therefore, the Israelis don't need to copy entire phone conversations or all internet traffic of a user from within the tapping room, but can simply monitor the encrypted traffic that is sent to the tapping room. Having the cryptographic key to the data, they then decrypt it at their leisure. If any nation has the technical skills and knowledge to pull this off, it is Israel. The experts We explained the situation to two cryptography experts: Niels Provos[13] of the OpenBSD team and autor of various crypto software such as Outguess[14], a program to detect steganographic content, and Michael Richardson[15] of the FreeSwan Project, the IPsec implementation of Linux. We posed the hypothesis of the insecure tapping room and asked whether it would be possible for the Israelis to get a hold of our taps. Provos explains that a very important part of strong cryptography is a good random source. Without a proper random generator, or worse, with a intentionally crippled random generator, the resulting ciphertext becomes trivial to break. Even if Comverse would let experts have a look at the source code, if there is one single unknown chip involved with the random generation, such as a hardware accelerator chip, all bets are off. Provos suggests to use only off-the-shelf PC hardware. If you can trust the hardware and you have access to the source code, then it should theoretically be possible to verify the system. This, however, can just not be done without the source code, according to Provos. One possible undetectable scheme could be to use a set of truly random, but pre-calculated keys. Only those who know the pre-calculated set, Comverse in this case, could break the cipher, which would become a sort of one-time pad for Comverse only. Provos also pointed us to the work of Adam Young en Moti Yung, who have written a few papers on what they dubbed, kleptography[16], the art of secretly stealing the cryptograhic key from the ciphertext stream itself. Their research showed it is impossible for third parties to detect whether any given ciphertext is secretly leaking key material. An overview of TIIT The Dutch tapping porotocol, Transport of Intercepted IP Traffic[1] is used for the communication between the tapping machine at the ISP, and the Dutch government. The suspect who is using the internet generates IP traffic that is copied by a special sniffer machine, called S1. The S1 then encrypts the traffic with an RC4 (or AES) key supplied (and generated) by the Dutch tapping room, and sends the encrypted traffic to the S2, the ISP's collector machine. The collector sets up an encrypted connection, using SSL or IPsec to the government collector machine, the T2. This will normally happen over the internet itself. The T1 then sends the encrypted information onwards to one more agencies, who all have their own T2 for receiving the encrypted traffic. The T2's have the key to decrypt the gathered data into the original plaintext, as it was captured by the ISP. Both the SSL and IPsec protocol, which are part of the encrpytion scheme used by the Dutch tapping specification (TIIT), contain parts where one has to "fill" packets with random data. It is impossible to see whether this data is truly random, or contains a secret message. This means that no-one needs to go to the tapping room to fetch the key material. According to Provos, the keys can just be sneaked into the encrypted tap itself. Richardson agrees with this view. There has even been a software implementation of this in the past. The TIS-client implemented this feature as "Government Access to Session Keys method". There are even rumors that the ciphers SHA1 and DSS, both NSA ciphers, leak key information on purpose, with only the NSA knowing how to retrieve it. Richardson claims that it is easy to use weak key material. And there are other dangers as well. Because RC4 is based on XOR, using the same key twice is enough to crack the code. RC4 is used for the inner encryption of user data in the TIIT, since the final AES candidate wasn't known at the time when the protocol was set. But this RC4 encrpytion is packaged in another layer of encryption, SSL or IPsec. That layer needs to be broken as well. Richardson takes IPsec as example. Imagine that we need to leak an RC4 key and an IPsec key. For RC4, only the first 128bits are relevant. For IPsec 3DES is often used, which means another two times 56bits. Each IPsec packet has an IV of 64 bits. This IV is random filling to ensure that there will never be two identical packets encrypted with the same key, a deadly sin in the world of cryptography. So this makes it possible to hide 64bits in each IPsec packet. Theoretically, after two packets you have leaked the RC4 key, and after another two you have the 3DES key too, although Richardson says that if such a scheme is used, it is very likely that the leaking would take place a bit slower, so it can be covered up. For example, the 64 bits can be divided in four parts of 16 bits hidden in the first 20 bits of four IV's. 16 bits of actual key material and four bits to poiint to the position of those bits in the key. That means that about 16 IPsec packets are needed to leak the entire key. According to Richardson, that would leave plenty of randomness in the IV to make this leakage invisible. Due to the overhead of IPsec and of the TIIT, this means the tapped user needs to cause even less packets for this to happen. In other words, reading a few lines of email or looking at a single wegpage, is more then enough to leak all key information. Weis and Lucks showed that the use of the IV isn't even needed, and presented their paper All your keybits...[17] at SANE2002[18] that mathematicly proves that blackbox crpytography is fundamentally insecure and that leaking key material cannot be detected in any way. Conclusion Without the cooperation of Comverse, is it not possible to determine whether the Dutch tapping systems contain backdoors or not. Worse, even if Comverse would appear to cooperate, there is no way to detect a possible double-cross. Key information can leak quickly and undetectably and the only way to prevent that is by having full control over both the hardware and the software involved. In mid december, the parliament will discuss the annual report of the AIVD, but it seems unlikely that the public will ever find out what really happened. Remkes only wants to talk about these matters behind closed doors[19]. De Graaf, party leader of D'66, said he finds the risk of possible manipulation of the tapping rooms "pretty serious", but cannot give more public statements, since he was a member of the watchdog commision that oversees the intelligence service AIVD, and therefore has inside sensitive knowledge. Remkes claims he didn't know about the dangers. Apparently, he was the last one that didn't know; Comverse and blackbox cryptography have been under heavy fire for years. Literature [1] http://www.opentap.org/documents/TIIT-v1.0.0.pdf [2] http://www.verintsystems.com/ [3] http://www.cominfosys.com/ [4] http://www.eo.nl/home/html/news.jsp?number=3209417 [4b] http://www.volkskrant.nl/binnenland/8761030113615.html [5] http://www.groene.nl/2002/0225/rz_tappen.html [6] http://www.fnl.nl/ct-nl/archief2001/ct2001-06/ct200106032033.htm [7] http://www.opentap.org/ [8] http://www.hal2001.nl/ [9] http://www.ccc.de/ [10] http://www.opentap.org/ccc/ [11] http://cgi.omroep.nl/cgi-bin/streams?/eo/redactie/radio/r1022511c.rm [12] http://cgi.omroep.nl/cgi-bin/streams?/eo/2vandaag/2vandaag_aftappen.rm [13] http://www.citi.umich.edu/u/provos [14] http://www.outguess.org/ [15] http://www.sandelman.ottawa.on.ca [16] http://home.bip.net/laszlob/cryptoag/kleptography.htm [17] http://www.nluug.nl/events/sane2002/papers/WeisLucksAllYourKeybit.ps [18] http://www.nluug.nl/events/sane2002/ [19] http://www.opentap.org/vragenuurtje-comverse-verint-telefoontaps-israel.htm Media links Trouw Volkskrant 2Vandaag Planet Multimedia EuropeMedia Trouw 2Vandaag EO De Ochtenden and the (dutch) Radio broadcast Planet Multimedia Webwereld 6612 From: human being Date: Tue Dec 3, 2002 8:51pm Subject: ~e; call for works: EM Assemblage [maybe this can be considered in the joke category... yet i figured i would send it to TSCM-L because this audience is also one that i hope finds interest in the exploration of electromagnetism (electronics) in art, and also, TSCM-L related sci-tech is also going to be included, so if anyone has any ideas of what might be interesting to include in terms of historical electric or electronic experiments, or some interesting art that relates to electromagnetism, please send me an e-mail.] Electronetwork.org is creating an online gallery of electromagnetic art & artifacts, and work is currently underway to present works from various vantages of art, science, and technology, across timespans and mediums. Thus far work is being collected and compiled according to those works, whatever they may be, that explore the realm of electromagnetism in a way that helps one to better understand or question it. Where the line between electromagnetic and non-electromagnetic art & artifacts is drawn is still an unknown. Thus, this is an experiment, and an open-development of sorts. With copyright restrictions, few if any famous artworks can be shown, such as Warhol's Electric Chair screen prints or Jasper Johns' brass lightbulb sculptures. So there is some difficulty is using museum work in related to other works, because of the restriction on educational fair-use of imagery for raising public awareness of electromagnetism. Thus, one of the questions is works people have experienced which relate to electromagnetism, consciously or not, yet meaningful and substantial exploration and interrogation of the electromagnetic realm, in some significant way. Second, is to ask for those artists whose work focuses on this realm to consider participating in the show and to make contact. Works are sought to represent major mediums, to demonstrate how an electromagnetic context transcends present-day issues about the interaction of New Media and Digital Art with that of traditional artworks and collections. These works will be juxtaposed with artifacts of the electrical infrastructure in addition to inventions such as cathode ray tubes, equations, and experiments such as the first transistor. The hypothesis being utilized is that there has been a gradual incorporation, more and more so, of electromagnetism in artworks and artifacts, and that this lineage can be seen in various ways and at various stages. Works in pottery, sculpture, installation art, video art, poetry, dance, music, weaving, and other mediums where electromagnetism is a central idea are currently sought. Please e-mail if you know of work that relates to this idea, and- or if you are interested in participating in this online show. brian thomas carroll, founder http://www.electronetwork.org more information on phase 1 available at: the Electromagnetic Education Initiative http://www.electronetwork.org/works/eei/ the electromagnetic internetwork-list electromagnetism / infrastructure / civilization archives.openflows.org/electronetwork-l http://www.electronetwork.org/ 6613 From: Hawkspirit Date: Wed Dec 4, 2002 10:47am Subject: Sound bug http://www.soundbug.biz/ - Listen to music without speakers or headphones - Play your favourite music wherever you want - Creates a sounding board out of any surface you attach it to - Attaches to any glossy, hard surface (windows, tables etc) - Connects to personal stereos, mini-disc, CD or MP3 players, handheld games, camcorders or laptops using a 3.5mm jack - Connect 2 Soundbugs together for full stereo sound - Up to 75 decibels for a single Soundbug - Power sleep circuit - Pocket size: 95mm x 50mm x 35mm - Weight 180g including batteries - Comes supplied with 3 x AAA batteries - Exclusive to Olympia ñ patents pending 6614 From: Steve Uhrig Date: Wed Dec 4, 2002 10:49am Subject: Old info on cellular intercept List member Andre Holmes shared this info with me which I thought others might enjoy: http://www.techtv.com/cybercrime/privacy/story/0,23008,8201,00.html Click on the items on the right for short movies by the Secret Service on cellular intercept, cloning, pager intercept and related technologies. The information is many years old and no longer valid, but is interesting watching. And interesting seeing the relatively naive Secret Service agent hamming it up for the cameras. Because they are MPEG movies, it's probably not practical to try to view the things on a dialup line. A broadband connection may be necessary. The information in the article on the above page also is very outdated. It is not nearly as easy as they claim for information to be intercepted off cellular. If you are on digital, as nearly everyone is nowadays, you're virtually immune (in the U.S.) from any other than a court ordered intercept. CDMA is safer than TDMA, but if a court order is happening, nothing will protect you. It is much easier to locate a mobile phone than to intercept calls to and from it. Analog is dangerous, but not as bad as you might think. Off air cellular intercept is virtually extinct, especially for digital. Intercepts are done through the service provider, after they have been wallpapered legally. Thanks to Andre for sharing the above site. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6615 From: Steve Uhrig Date: Wed Dec 4, 2002 9:21pm Subject: Various TSCM and surveillance items for sale Hi all, I need to clean the shop, plus this is a good time to make investments in your business to get the tax deductions in before the end of the year. Please forward this message to any other pertinent lists you monitor. The following items are available, described in more detail below: 5@ ICOM VHF Portable Transceivers 4@ Motorola VHF Portable Transceivers ICOM R8500 full coverage receivers ICOM R8500 cellular blocked receivers ICOM R100 full coverage receivers Riser Bond 1270 Yellow Box TDR Riser Bond 2401b+ TDR Riser Bond 1205C Yellow Box TDR Riser Bond 1205CX Yellow Box TDR Riser Bond 1205CXA Yellow Box TDR Riser Bond Model 1000 TDR Felix Surveillance Van Periscope w/ accessories & documentation Vanner Shottky Dual Battery Isolator for Surveillance Van Surveillance Van Power Distribution System Custom Fiberglass Surveillance Console for 1980s Chevy Van ================ Everyone needs communications on sweeps, surveillances or when in caravans traveling. Cellular is complicated to dial in a hurry, doesn't work everywhere, you can't set them down and listen to them, and is expensive. Simple, rugged, powerful two way radios are very useful. VHF radios have about 1/3 more range compared to UHF portables. Have 5@ VHF ports, ICOM F11S new in box, opened only to charge nicads. Never programmed, w/ 2 year warranty by ICOM starting when you send in the warranty card. Current production, latest models. 2 channel 5 watt portable, simple, small and rugged. Manual, nicad, drop in slow charger and belt clip included. Programming cable and original legal software available also. $750 for the lot, including programming stuff. Remember these are new with full 2 year factory warranty. Also have 4@ Motorola HT50 with new Fall 2002 nicads, 5 watt, 2 channel, exc condition, purchased as standby radios and excessed never used when fleet went to 800. Radios have good rubber ducks, DTMF pads, rapid charger. DTMF pads can be used for command uplinks or telephone interconnect. Can program or can supply with aftermarket programming cable and aftermarket RIB (Radio Interface Box) but *not* RSS (Radio Service Software). Super rugged, simple radios. $400 for radios, $500 if RIB and programming cable included. RIB of course can be used for other Motorola radios. Batteries alone were around $45 each. Both have jacks for speaker mikes. I probably have some speaker mikes for the ICOMS if interested but not the Motorolas. The above all could be programmed to talk to each other and make a fleet of nine VHF portables in excellent condition. I believe all will go down into the amateur band without problems. See batlabs for programming the HT50s on amateur. All the above will do marine channels also. ================== I've been able to come up with a few more unblocked ICOM receivers in excellent condition. Supply is limited and I never know when I will get more in. Many are familiar with the R8500. This is ICOM's newest and current production wideband HF/VHF/UHF receiver, quite common with sweepers or for surveillance listening posts. The problem is getting them with 800 megacycle coverage. All the ones sold commercially are cellular blocked, with no provision for TSCM practitioners to obtain unblocked ones legally. We do not want receivers with holes in the coverage. Here are some that don't have the holes. These are full coverage receivers originally restricted to and purchased by the government, generally used for one weekend in a surveillance, then traded in. Basic specs are 100kc to 2 gigs, AM, Wide FM, Narrow FM, CW, SSB. This is a triple conversion tabletop receiver powered by 12VDC or 110VAC with included power supply. Can be used portable or mobile or fixed station. Go here for full specs and a photo: http://www.icomamerica.com/receivers/tabletop/icr8500.html This receiver is the best one ICOM has released to date, significantly better than the R9000 and the R7100, and a later model in the series of R7000/R7100. Remember this is a full coverage receiver, and covers from 100kc (0.1 megacycles) to 2 gigs (2000 megacycles). You do not need an additional receiver to cover the HF portion of the spectrum. When not sweeping, you will use this as a lab receiver on your test bench. There is an RS232 input port as part of this receiver, so you do not need the expensive external level converter to computer control it required on other receivers. There are a number of third party software packages available to remotely operate the receiver. Rather than one of the computer -- controlled black box receivers, the R8500 can be computer controlled as well as it has a full featured front panel for standalone use. There may be times when you do not want to drag a laptop around just to run your receiver. There also is an IF and discriminator output on the rear panel for accessories. One of the standard internal features will scan and store any signals found in a special memory bank for later review. ICOM recently raised the price on these substantially, and that higher price will soon be reflected on dealers' pricing. Even then, you can't buy them full coverage without a government sponsor willing to give you a blessing. And I never know when or if I will get more. Unblocked (full coverage) $2000. One available blocked for $1200. No nonsense or risk trying to sneak one through Customs, with a nearly 100% chance of getting caught and losing the radio. Price includes insured shipping inside the U.S. I only have a few of these, so don't wait if you need a decent full coverage receiver. Practically every time I list these, every one I have sells within a few days and I have to refuse orders from people who come too late. These all are in like new condition. A wideband receiver is one of the first items in a professional sweep kit. When the other equipment sniffs a potentially hostile transmitter, you then tune this to the frequency and disassemble the signal manually. The R100 is a little brother to the R8500 receivers. The performance is basically the same as far as frequency coverage and modes, but the R100 does not have all the "soft" capabilities of the R8500, nor do they have the computer control port or ability to display alpha tags on programmed channels. These are good if you want a full coverage receiver to install in your vehicle or something a bit smaller for a portable sweep kit. These can be analog tuned with a knob and also cover the restricted 800 meg frequencies blocked on consumer receivers. Here are basic specs on the R100 mobile/portable receiver: Frequency Coverage: 100 kHz to 1856 MHz continuous Mode: AM, FM, Wide FM (WFM) Power Supply Requirement: 13.8 V DC +/-15% Current Drain (at 13.8 V DC): Less than 1.1 A The R100 was discontinued some time ago and unfortunately there is no replacement for these friendly and versatile receivers. The supply of these is dwindling, especially in the restricted unblocked (government) versions. They make excellent compact multimode demodulators for IF outputs of spectrum analyzers (I use one Velcroed to the top of my Tek 494AP for a demodulator), and can be used standalone besides. Don't use a handheld with a wide open front end which is killed by intermod. Use this R100 which has both an excellent front end as well as filtering. Price of full coverage R100 is $650 shipped and insured in the U.S. Anyone buying either model receiver is eligible to purchase a wideband discone antenna for $75, which is a $50 discount off the normal price of $125. This antenna is ideal for these receivers, and is a good universal antenna for sweeping. Mount it on a tripod or microphone stand and move the antenna around the area you are sweeping. Antenna can be used for transmit also, from 25-2000 megs. I guarantee everything for proper performance, because we personally align each and every receiver from antenna to speaker. They don't just come off the robotic assembly line 'good enough' to meet factory spec. We get the most performance each receiver is capable of suppying, which is a noticeable bit more than an out of the box receiver. Holler if interested and your receiver can ship immediately. Remember we pay the freight and insurance, which is considerable on equipment of this value. With the new heavy duty restrictions recently announced on full coverage receivers, these will become even more difficult to get. Don't miss this opportunity. As of this point, they are still legal to possess and sell used, but mere possession may be prohibited any day now, or any sales at all, new or used. You may have read about this on the newsgroups. Perhaps 30 people on this list have purchased receivers from me and use them regularly in their sweeping. Feel free to ask for references. ========================= If you need a TDR (and if you don't have one and are thinking about sweeping telephones, you need one) I have several for sale. As you all know, I am a major big time fan of Riser Bond 'yellow box' TDRs. I've owned every model they've made, used every model, and sold every model, to the tune of probably a hundred machines. They're by far the easiest to use, most logical, most capable and most rugged TDR out there, and well suited for TSCM. A TDR will become your main tool, and once you master it (a few evening's work), you'll be very confident, and a fairly wicked telephone sweeper. The latest, fanciest model is the 1270. This actually is overkill for TSCM, but nothing wrong with having the best. And if you are buying a tax deductible business tool, might as well put your money into test equipment as into some social program funded by taxes. I have one only 1270 for sale. It has new batteries, a fresh calibration, all accessories (two sets of heavy duty alligator clip lead sets, cigarette lighter charger, AC charger, coax lead set, computer interface cable, manual, accessory pouch, wallet laminated cheat sheet of velocity factors, etc.), in like new condition. This one was used once on a massive cable install, for less than a week. I don't send the software for Wave View, because Riser Bond is always updating it and you can download the latest version from their website www.riserbond.com, for free. You can run it and play with it right now without having a TDR connected to the computer, to get a feel for it. This reference to software means the yellow box TDRs can be computer controlled, trace dumped directly to a serial printer, trace digitized and stored on the computer, or the waveform info can be stored inside the TDR digitally, to be printed or transferred to the computer for your report at some later date. You do NOT have to carry a computer with you to take advantage of the digital storage. Nor do you need to feed and water weirdo internal chart printers in a Tek TDR. The 1270 will include at no extra charge a briefcase-sized padded carrying case, which is redundant because the TDR Pelican case is actually more rugged than the hard carrying case. But the hard case will keep the 1270 looking new and give you room for extra accessory cables and your lunch and stuff. They're a $100 option from Riser Bond (they fit any yellow box TDR). I never know when I will get used yellow box TDRs in, in excellent shape. Could be next week, might not be for six months. But I have only ever gotten five of these 1270s in. My tech Ron and I got two, and the two I sold recently went for $2500 for one and $2750 for another. They are $3500 new from the distributors, and there are no discounts. One is left. Do you want it? My price is $2000 with all accessories including the accessory carrying case. You can see the 1270 on www.riserbond.com. Jensen and Tessco are distributors if you want to check prices, but Riser Bond prices fixes like Fluke and no one discounts them any. Anywhere you look they will be $3500 +/- ten bucks, and the cheaper ones charge more shipping. Get it from me for a little more than half that price with maybe 8 hours of use, and my guarantee, and you can put it on a credit card. As an FYI, every used Riser Bond TDR you buy, regardless of model and without exception, will need a new battery, which costs $100.03 each for almost every type of battery as I just got a new batch in last week. Many will need a $20 charger, and all should be calibrated. Riser Bond will calibrate the newer 'yellow box' TDRs for $150. I can calibrate older ones, and they all need it. Nothing you buy on ebay is guaranteed, many being sold by pawn shops and guys who stole them from their employer and will not tell you anything about them. If they light up for ten seconds, they'll say they're working. And you get to calibrate it and buy a $100.03 battery pack and probably test leads. I put a new battery in each TDR before I sell it. You don't have to bother. Caveats not necessary here. I guarantee everything as countless TDR and other equipment buyers on this list will testify, not that I need to do anything regarding guarantees as the stuff I sell is in the condition I claim. And, unlike the Tek TDRs, you don't have to worry about fragile, antique CRTs or weirdo stripchart recorders. And the Riser Bond models are much easier to use than any others I've tried. << All TDRs include a NEW battery, recent calibration, documentation and most include test leads. The latest version of the Waveview software, which changes frequently, can be downloaded for free from www.riserbond.com, so I don't include it with the equipment. >> If you'd like a Riser Bond TDR but can't quite afford the cost of the 1270 mentioned above, I have the following other model Riser Bond machines available. All are yellow box unless otherwise indicated. 2401B+ (little ping box with digital readout; possibly one of the most common TDRs used in TSCM). Not a yellow box. Must be used with an external oscilloscope with at least 100 Megacycle frequency response. Nicad powered. Best for beginners and/or anyone who already owns a decent oscilloscope. One of the more compact units; will fit in a briefcase where most of the others will not. Takes a $100.03 battery. $400 with padded carrying case, charger and manual. 1205C -- has large LCD display built in, auto setting, very simple front panel, variable pulse widths, variable velocity factor, variable impedance. Backlit screen. Battery gauge. Automatically calculates and displays fault on the screen as well as distance to the fault and dB loss through the fault. Very nice unit, one of the Cadillacs of TDRs. Digital storage of traces can be downloaded to a computer or printer later. Very easy to use. Connect the line to test, turn it on, and it does it all automatically. Has automatic noise filters which switch in automatically to give you the cleanest trace. Waterproof Pelican case. An exception to the battery rule. This one takes a $22 battery from MCM. $1000 1205CX - later model than 1205C, no meaningful differences. Takes $22 battery. $1350. Overall probably the simplest and easiest to use full features 'yellow box' TDR. Does have digital storage, as to all other yellow box ones. Best investment for TSCM all considered. 1205CXA -- now uses nickel metal battery instead of lead acid like in the 1205 and 1205C and 1205CX series, for lighter weight, longer life per charge. Has sub nanosecond pulse for finding intermittents or very quick happenings on digital lines. The absolute Cadillac of TDRs, essentially the same as the 1270 except does not have separate outputs for both coax and twisted pair (and doesn't need them. An adapter from a BNC is what all other TDRs use including Riser Bond). Current model; see Riser Bond's website for details. Costs $3000 new, today, from the distributors. My price $1500. Model 1000 -- 'Line Judge', checks any type of cable, for length and faults only. Not a yellow box. Not especially suited for TSCM since there are no provisions for viewing a trace either internally or externally. Great for people who install cable and need to measure lengths or find faults but do not particularly care about TSCM. Digital readout to fault, no screen for a trace. Smallest TDR made by Riser Bond, and latest model. Uses a 9 volt battery. Not suited for TSCM except in rare cases. Cannot drive an oscilloscope. Use the 2401 if you are at this level. Price $150. This is a good TDR for installers who need the simplest piece to measure the length of a line but are not inspecting it for tampering. Contact me if you have an interest in picking up a top quality TDR that will last the rest of your career. Now is the best time since I am very serious about winter cleaning and making more space in my shop. Call me with your needs or to discuss where you are, and I will recommend the best one for your level of experience, your budget and your personal capabilities. A TDR is easy to use, can read rat piss on the lines, and separates the men from the boys. You'll need one eventually. Here's your chance to save a lot of money and probably buy a better unit than you will be able to afford in the future. Practice some with these things, get confident in it, and you will be a major reckoning force in the industry. Few professional sweepers have TDRs as nice as are described on this page. Most also come with leads, all come with manuals and chargers. All come with a padded carrying case OR a Pelican waterproof case (depending on model). Most also come with an outboard accessory pouch to hold extra sets of leads, jumper cables, the charger, etc. Most models have a place inside the lid to hold the instruction manual, a coax jumper and an alligator clip set of input leads. Call if interested in breaking through the equipment barrier from novice to journeyman. Are you going to play games all your life on telephone lines where the majority of the threats target, or are you going to equip yourself and learn to use the same silver bullet professionals use but like to keep quiet? ================ If anyone is thinking of building a surveillance van, I have available some necessary components you will need to put together a reliable and effective van. I had purchased them for my own use, but never actually built the van. One is an original Larry Felix periscope complete with all accessories, ready to install. The frame only was installed in a van for some years, but the periscope itself was never mounted except initially to make sure it fit. It has been in storage ever since. To install the periscope, you cut a 14 inch square hole in the roof of the van and mount the frame with some nuts, bolts, lockwashers and plenty of silicone caulk. Note most van roof vents are 14 inches square, so this may directly replace an existing roof vent. If you take your time and work carefully, it will never leak. This is not true of other periscopes. Then the periscope itself mounts inside the van onto 4 bolts hanging down from the frame. I used wing nuts to let me install and remove it in two minutes if I needed more room in the back of the van. One man can install it or remove it in very short order. The roof vent is spring loaded, with the springs forcing it closed. You crank up the periscope several inches against the spring tension, and raise a screen with a lever to hide the optics. You don't need to raise it much. An inch or two is sufficient unless you are trying to follow someone up steps in front of a building for example. There are fold down handles on the periscope like on a submarine, and you can turn it around through 360 degrees and crank the angle on one of the mirrors up and down to follow a subject up steps or whatever. There is a removeable arm which clamps 90 degrees to the viewing port, with long slots in it to let you mount any optics or cameras there. Any camcorder, 35mm camera, night vision with or without video, etc. mounts to the arm. You can slide things back and forth to get proper alignment. As this was designed for serious surveillance use, there is plenty of room for long lenses on any kind of camera. As long as your optical item has a tripod mount, it will work on this periscope. With a long lens, you can be a considerable distance away from the subject while surveilling them. This periscope is long out of production, and is the original design from which most others were copied. This is the quality unit, all metal with front surface mirrors. The original price was high, and the copies were cheaper being made of plastic. The copies don't work as well, have complicated gearing and belts, have distortion in the optics precluding use of long lenses and require frequent readjustment. This one doesn't. The people who spent the bucks for the Felix equipment, who were almost exclusively government, insisted on top performance and quality, not low price. Put it in and leave it in, or put it in only when needed in case your surveillance van also doubles as a soccer van. When the periscope is removed, very little of the frame sticks down inside the van. The periscope can be moved from one vehicle to another if you sell your current one, so this periscope is a lifetime investment, not a one shot deal. The optics have been stored inside a plastic bag with a dessicant and everything is in excellent condition. The frame, as I mentioned, was installed for a while in a van, but not used. I removed it and had a body shop install a plate over the hole. If you have used a high end government surveillance van, you probably used this periscopes. The piece comes with installation instructions, which are fairly straightforward. You can cut the hole yourself or have an automotive place do it. This is a rugged, high performance piece made by the acknowledged master of surveillance van hardware. Larry Felix is now retired, but his work lives on. Many hundreds of these were sold in their day, most still being in use. You practically never see these things on the used market. I'm not thrilled about getting rid of it, but I don't do street investigations anymore either. The unit sold for $2750 when I bought it about ten years ago. My price is $1250 plus shipping from Maryland. It is somewhat large, not excessively so, but not particularly heavy. I would prefer pickup in the Harford County, Maryland area (north of Baltimore), but can ship worldwide if necessary. There will be a charge for packing on top of the freight costs due to the extensive work it will take to pack this thing properly for shipment. If you've wanted a REAL periscope, here it is. Periscopes in general are difficult to find, and when you do find them, they generally are the tacky homemade ones, or knockoffs of this one, and don't work nearly as well. Felix was known for his optics, clever design, and smooth operation. From the outside with the periscope retracted, you can't tell it from a standard roof vent. With the periscope up a few inches, someone would have to know exactly what they are looking at to make it, and that's not likely to happen. The screen breaks up the outline of the mirrors. Since the thing is mounted on the top of your van, you'd have to be above looking down even to see it, and then no one would recognize it for what it is. Anyone interested, mail me off list and we can make arrangements. I can take credit cards. It will probably take a week or two to ship if I have to build a crate, or you can pick it up. I'm north of Baltimore not far off Route 95. I also have a super rugged dual battery isolator, to let the alternator in your van charge both the original battery as well as a secondary battery to operate all your electronics. This is fully automatic, no manual switches. The isolator was designed for an ambulance where lives depend on it. It uses Schottky diodes for ultra low forward voltage drop. Generally most surveillance vans are wired so the original battery does nothing but start the engine, and all other loads (commo, surveillance, lighting, air conditioner, etc.) are drawn from the secondary battery. That way, you always have a fresh battery to get you home. This isolator is not a toy, and is about the size of a small shoebox. Cheap ones are much smaller. This has plenty of heatsink and can handle to 200 amps which is a lot bigger alternator than you will have in any consumer van. Manufacturer is Vanner, considered the top brand in isolators. New, never installed. Hookup is simple. There are three terminals on the isolator, in a row. You disconnect the output of your alternator and connect it to the middle terminal. A line from each outside terminal goes to the positive side of each of the two batteries. That's all there is to it. Price is $250. You'll pay that for a toy. This is a real one. If you're doing a lot of electrical work in your van, I also have a new never installed power distribution system used in police cars and ambulances, with multiple fused lines. Call if interested. And if anyone has a 1980s series Chevy van they currently or would like to use for surveillance, contact me for a custom made fiberglass surveillance console for this exact series of vans. New, made for government, never used, perfect condition. Very spiffy piece. Holler if you are interested in any of the above, or if you have any questions. I can fax info on the periscope if someone is *really* interested. I also will consider trades towards the above, and I purchase surveillance, countersurveillance and communications equipment. Email me with anything you have to sell or trade. I am willing to ship anything anywhere in the world. If you order from a country with 220VAC mains, please remember to mention this so I can get you the proper charger or power supply for your equipment. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6616 From: Fernando Martins Date: Thu Dec 5, 2002 4:52pm Subject: Camera question ... Any known cctv color camera with resolution >500TVL ? FM 6617 From: Matt Paulsen Date: Thu Dec 5, 2002 10:33pm Subject: RE: Camera question ... 700.. $6500 http://www.bhphotovideo.com/bh2.sph/FrameWork.class?FNC=GetItem__Aindex_html ___IC=SODXC9000___SID=F2294AD82E0 -----Original Message----- From: Fernando Martins [mailto:fernando.martins@e...] Sent: Thursday, December 05, 2002 2:52 PM To: Tscm-l@yahoogroups.com Subject: [TSCM-L] Camera question ... Any known cctv color camera with resolution >500TVL ? FM ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6618 From: Geoff M <157@s...> Date: Fri Dec 6, 2002 3:21am Subject: --- HAVE A STEALTH CHRISTMAS --- ************************************************ Night Before Christmas (Stealth) ========== --- HAVE A STEALTH CHRISTMAS --- Twas the night before Christmas, and all through the skies, Air defenses were up, with electronic eyes. Combat pilots were nestled in ready-room beds, As enemy silhouettes danced in their heads. Every jet on the apron, each SAM in its tube, Was triply-redundant linked to the Blue Cube, And ELINT and AWACS gave coverage so dense, That nothing that flew could slip through our defense. When out of the klaxon arose such a clatter, I dashed to the screen to see what was the matter, I dialed up the gain and then quick as a flash, Fine-adjusted the filters to damp out the hash. And there found the source of the warning we'd heeded, An incoming blip, by eight escorts preceded. "Alert status red!" went the word down the wire, As we gave every system the codes that meant "FIRE"! On Aegis! Up Patriot, Phalanx and Hawk! And scramble our fighters let's send the whole flock! Launch decoys and missiles! Use chaff by the yard! Get the kitchen sink up! Call the National Guard! They turned toward the target, moved toward it, converged, Till the tracks on the radar all finally merged, And the sky was lit up with a demonic light, As the foe met his fate in the high arctic night. So we sent out some recon to look for debris, Yet all that they found, both on land and on sea, Were some toys, a red hat, a charred left leather boot, Broken sleighbells, white hair, and a deer's parachute. Now it isn't quite Christmas, with Saint Nick shot down. There are unhappy kids in each village and town. For the Spirit of Christmas can't hope to evade, All the web of defenses we've carefully made. Just look how the gadgets we use to protect us, In other ways alter, transform, and affect us. They keep us from things that make life more worth living, Like love for each other, and thoughts of just giving. But a crash program's on: Working hard, night and day, All the elves are constructing a radar-proof sleigh. So let's wait for next Christmas, in cheer and in health, For the future has hope: Santa's coming by stealth! ************************************************ 6619 From: Steve Uhrig Date: Sat Dec 7, 2002 9:23am Subject: Wi-Fi a Terrorist Tool Feds Label Wi-Fi a Terrorist Tool By Paul Boutin Wired News Dec. 06, 2002 PT SANTA CLARA, California -- Attention, Wi-Fi users: The Department of Homeland Security sees wireless networking technology as a terrorist threat. That was the message from experts who participated in working groups under federal cybersecurity czar Richard Clarke and shared what they learned at this week's 802.11 Planet (http://www.jupiterevents.com/80211/fall02/index.html) conference. Wi- Fi manufacturers, as well as home and office users, face a clear choice, they said: Secure yourselves or be regulated. "Homeland Security is putting people in place who will be in a position to say, 'If you're going to get broken into ... we're going to start regulating,'" said Cable and Wireless security architect Shannon Myers in a panel dubbed "Homeland Security vs. Wi-Fi." Myers was one of several consultants for President Bush's Critical Infrastructure Protection Board, which is finalizing its National Strategy to Secure Cyberspace. (http://www.whitehouse.gov/pcipb/cyberstrategy-draft.html) Since being named special advisor to the president for cyberspace security last year, Clarke has stressed wireless access points as a national security threat. "Companies throughout the country have networks that are wide open because of wireless LANs.... Millions of houses are getting connected, which means that more and more are getting vulnerable," Clarke told attendees at the Black Hat Security Briefings in Las Vegas earlier this year. "We know that (an attack) could bring down the network of this country very quickly. Once you're on the network, it doesn't matter where you got in," said Daniel Devasirvatham, who headed the Homeland Security task force for the Wireless Communications Association International (http://www.wcai.com/) trade association. Devasirvatham said the telecom industry was represented at security planning talks with federal agencies, but the wireless sector itself was not. "Do you consider yourself part of the telecom industry?" he asked the 802.11 Planet audience. "If you're a Nethead instead of a Bellhead, you probably don't. I think there's a major disconnect here." But Myers acknowledged that regulators were frustrated in their search for a quick fix to plug Wi-Fi holes. "There's just not a lot of technology out there right now that can be used to secure the technology in place," she said. "They're not at a point where they can say, 'This will solve the problem,' and mandate it." Rather, the most recent draft of the National Strategy document lists stopgap steps that home and office Wi-Fi users should take to make their networks harder to crack. The National Institute of Standards and Technology's Wireless Network Security document (http://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48. pdf) contains more detailed guidelines. Speakers called on corporate Wi-Fi customers to participate in creating security enhancements and best practices, lest regulators do it for them. "Expert advice needs to be obtained from more than just the industry that makes the equipment," Devasirvatham said. Conference attendees were split on the potential of wireless nodes as terrorist access points. Boingo CEO Sky Dayton suggested turnkey security standards under development would improve the technology's reputation. "It's possible to secure a wireless network today," he said. "But it needs to get easier." http://www.wired.com/news/wireless/0,1382,56742,00.html ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6620 From: Steve Uhrig Date: Sat Dec 7, 2002 9:50am Subject: Holiday Security Warning Every year about this time, many businesses notice their postage costs jumping way up. In numerous covert video installations over the years, we have seen employees, night shift crews, janitorial personnel and the like running large stacks of Christmas cards through the company's postage machine. Since postage machines now are refilled over the phone, and there is little security, even running the meter empty doesn't matter. Our meter here at my place has no password protection or any security whatever to fill it. Merely push the button, enter $500 or whatever amount to load, and it does it over the phone in seconds. A few weeks later we get a bill. Since many businesses, especially those who do retail business which picks up over the holidays, would not notice the increased postage use, violators get away with it. And, a lot of businesses send their own Christmas cards, some by the hundreds, so the additional postage costs are considered normal, and not audited. Moral: If you have a meter, keep an eye on it. Advise your clients to do the same. Some meters may have a key which can be removed at night, to preclude use by night shift workers, janitorial types, whomever. If there is no key, start a simple log page of meter readings, and check each morning to see if has been advanced from the previous evening's total. This last will show abuse, but not who the abuser was. Secure access to the meter, putting it in a locked room with key control, or in a very visible area like the front office so theft does not take place behind closed doors. Post a policy on the bulletin board to let employees know you are aware of the matter. Disconnecting and removing the postage machine's power cord at night is cheap and simple security, and most cords have special weird connectors to preclude using a standard IEC cord (the worldwide standard for power cords, like the one on your computer) as a substitute. You also could unplug and remove the phone line to make it more inconvenient to refill the machine. These measures alone will stop most abuse taking place after hours. In extreme cases, covert video may be necessary to catch, prove or exonerate suspects. Restitution may be possible. 37 cents each times 100 Christmas cards times 20 employees can add up. Many employees see access to things like photocopies, postage meter, company telephone long distance accounts, etc. as percs of the job. Not enforcing misuse sets a precedent and is tacit endorsement. At a minimum, a company should have a written policy on things like this. If your company doesn't use a postage meter, are your stamps kept locked away, or in a box in the mailroom or public access area? Same cautions apply. Stamps are worse, because they can just be stolen and applied at home, where with a meter the cards/envelopes need to be run physically through the machine. A few hundred dollars' worth of stamps disappear in a shirt pocket. Of course, a clever employee could run tapes through a postage meter instead of the actual envelopes, but I haven't seen any instances of this. Could happen, though. Stamps also are untraceable, where postage meters imprint a unique license number and can be traced by anyone anywhere even long after the fact. If you publish a newsletter to your clients, the above would be a timely item to include. You also could include a copy of it on company letterhead in with monthly billings or whatever. It shows you care and are on top of things. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6621 From: Steve Uhrig Date: Sat Dec 7, 2002 10:02am Subject: Protecting Commo Infrastructure Subject: Wireless industry reviewing 'best practices' to protect nations comm infrastucture FCC News For Immediate Release December 6, 2002 HOMELAND SECURITY: COMMUNICATIONS INDUSTRY CONSIDERS MEASURES TO PROTECT NATIONíS COMMUNICATIONS SERVICES AGAINST ATTACK Washington, D.C. Representatives from across the communications industry came together today to consider recommendations to protect and strengthen the nationís communications infrastructure against terrorist attacks or national disasters. The measures were considered by the Network Reliability and Interoperability Council (NRIC) VI which held its quarterly meeting today at the FCC. NRIC is composed of representatives from the telecommunications, cable, wireless, satellite and ISP industries. The 56-member Council will review some 300 best practices ñ many of which are currently being practiced by industry members ñ for widespread adoption and implementation across the industry. Best practices range from increasing physical security at communications facilities to process changes and training to increased protection of proprietary information. NRIC members have until December 20, 2002 to vote on recommendations to the industry that these best practices voluntarily be implemented. FCC Chairman Michael Powell said, ìHomeland Security is a critical issue that touches every consumer in America. People want to know that in an emergency their calls will go through and they can reach loved ones. Every bit as important, our nationís communications network must be secure and protected to ensure that public safety, health, and law enforcement officials are able to respond and ensure the flow of information.î Richard C. Notebaert, NRIC chairman and chairman and CEO of Qwest Communications International, said, "Today's meeting illustrates the industry commitment to work together and share best practices in an effort to improve network reliability and strengthen the nation's communications network against terrorist attacks and natural disasters." ìThe telecommunications industry has taken a leadership role in proactively identifying and protecting our nationís communications infrastructure. Many of the best practices we have heard today are actively being implemented by many companies. I strongly urge the industry to adopt as many of these Best Practices as appropriate to ensure the protection and reliability of our nationís communications system,î Powell continued. In developing its best practices, NRICís Physical Security Focus Group, led by Karl Rauscher, director, network reliability office, Lucent Technologies Bell Labs, and NRICís Cyber Security Focus Group, led by Dr. Bill Hancock, vice president, Cable & Wireless, underwent a rigorous process that included a detailed vulnerability and threat assessment and identified the best practices currently in use by the industry to take necessary steps to improve security and mitigate associated risks. The items considered today include: Best Practices for Securing the Physical Network: - Technology. Best practices for the application of new technologies to better mitigate the effects of an attack. - Access Controls. Best practices for access control methods and procedures to help ensure that unauthorized personnel do not have access to critical network infrastructures. Best practices include the development of formal procedures for assigning facility access and constructing physical barriers to prevent vehicular and pedestrian ìtailgating,î electronic surveillance at critical access points and changes to landscaping and outdoor lighting. - Personnel. Best practices for security procedures and associated training including recognizing and reporting suspicious items and handling of proprietary information. - Design and Construction. Best practices for new network and facility design and construction methods to help secure critical infrastructure. - Inventory Management. Best practices and procedures for managing critical inventory to hasten restoration of service in the event of an attack. This includes best practices to establish procedures, including storage, handling, transfer and transmission. - Auditing and Surveillance. Best practices for measuring and assessing security readiness in a communications firm, including physical inspection of equipment, network and software and plant locations. - Elevate Internal Role of Security. Best practices to elevate security as an integral part of strategic business planning. Best Practices for Securing the Cyber Network: - Technology . Best practices for secure cyber technologies and architectures. - Operations and Administrative. Best practices to help secure network information and operations support systems. The Focus Groupís recommendations covered areas such as authentication and logging of network management actions, special access controls for network operations systems, and secure, swift distribution of operations system patches. - Authentication and Access Control. Best practices for access control methods, policies and procedures to help ensure that only authorized personnel have access to critical network elements and information systems. - Incident Management. Best practices for identifying, reporting, surviving and responding to cyber attacks. - Users. Best practices for protecting public communications networks against attacks from end-user networks. NRIC VI will recommend adopting voluntary outage reporting for cable, wireless, data and ISP service providers. The trial will commence on January 1, 2003 and conclude on December 31, 2003 and provide valuable information to improve the reliability of these networks. NRIC, which has been in place since 1992, has a long history of providing the industry with a collaborative forum for developing and voluntarily implementing best practices. Earlier this year, NRIC VI adopted an Emergency Assistant Agreement which provides the means by which industry carriers and service providers can elect to enter agreements to collaborate to restore service in the wake of an emergency. It also adopted industry emergency contact procedures and protocol to provide detailed contact information, procedures and protocol to members in times of emergency and to identify communications industry representatives who are essential to effective communications and Internet service restoration efforts. Chairman Powell chartered NRIC VI January 7, 2002 to focus on homeland security by ensuring the security and sustainability of public telecommunications networks in the event of a terrorist attack or national disaster. Membership in NRIC was significantly expanded through NRIC VI to include corporate representatives from the cable, wireless, satellite and ISP industries. It also established four new working groups to address homeland security: Physical Security, Cyber Security, Disaster Recovery and Public Safety. -FCC- News Media Contacts: FCC: Robin Pence (202) 418-0505 Qwest: Vince Hancock (303) 965-6950 http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-229263A1.doc ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6622 From: Steve Uhrig Date: Sat Dec 7, 2002 2:08pm Subject: Interesting site This site: http://www.naturalvoices.att.com/demos/ will let you key in a phrase up to 30 words, and it will recite it in various languages and sexes. It is a demo of ATT's text to speech software. May have some interesting uses. Be prepared to record. 'Please excuse Johnny from school today. He is feeling ill.' Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6623 From: Date: Sun Dec 8, 2002 4:38am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County, San Francisco, Silicon Valley, San Jose, San Diego, and Las Vegas. (Also, anywhere in a thousand mile radius from Los Angeles.) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 6624 From: Date: Sun Dec 8, 2002 4:38am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6625 From: Robin Hunter Date: Fri Dec 6, 2002 9:59am Subject: HAVE A STEALTH CHRISTMAS To Geoff and all members, excellent!!! All the best to everyone for the festive period. regards from Scotland, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. [Non-text portions of this message have been removed] 6626 From: frost_bitten_ca Date: Fri Dec 6, 2002 1:41pm Subject: Radio Frequency Radiation BIOEFFECTS RESEARCH Radio Frequency Radiation BIOEFFECTS RESEARCH at the United States Air Force Research Laboratory http://www.brooks.af.mil/AFRL/HED/hedr/hedr.html 6627 From: James M. Atkinson Date: Mon Dec 9, 2002 0:49pm Subject: The Prayer The CEO of Tyson Foods manages to arrange a meeting with the Pope at the Vatican. After receiving the papal blessing, he whispers, "Your eminence, we have an offer for you. Tyson Foods is prepared to donate $100 million dollars to the church if you change the Lord's Prayer from 'give us this day our daily bread' to 'give us this day our daily chicken.'" The Pope responds, "That is impossible. The Prayer is the word of the Lord - it must not be changed." "Well," says the Tyson man, "we anticipated your reluctance. For this reason, we will increase our offer to $300 million dollars. All we require is that you change the Lord's Prayer from 'give us this day our daily bread' to 'give us this day our daily chicken.'" Again, the Pope replies, "That, my son, is impossible. For the prayer is the word of the Lord and it must not be changed." Finally, the Tyson guy says, "Your Holiness, we at Tyson Foods respect your adherence to your faith, but we do have one final offer. We will donate $500 million dollars - that's half a billion dollars - to the great Catholic Church if you would only change the Lord's Prayer from 'give us this day our daily bread' to 'give us this day our daily chicken.' Please consider it." And he leaves. The next day the Pope convenes the College of Cardinals. "There is some good news," he announces, "and some bad news. The good news is that the Church has come into $500 million dollars." "And the bad news, your eminence?" asks a Cardinal. "We're losing the Wonder Bread account." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 6628 From: Steve Uhrig Date: Tue Dec 10, 2002 5:00pm Subject: Loony tunes A reminder of a good resource for those loony tune cases: http://zapatopi.net/afdb.html Bookmark it so you can refer lunatics who call to this site. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6629 From: James M. Atkinson Date: Tue Dec 10, 2002 5:21pm Subject: Oh the Shame Oh the Shame This just tells you how hard it is to be single nowadays... This was on the Tonight Show with Jay Leno on September 7, 1999. Jay went into the audience to find the most embarrassing first date that a woman ever had. When the winner described her worst first date experience, there was absolutely no question as to why her tale took the prize. Marilyn said it was midwinter...snowing and quite cold. The guy had taken her skiing to Lake Arrowhead. It was a day trip (no overnight). The outing was fun but relatively uneventful until they were headed home late that afternoon. They were driving back down the mountain when she gradually began to realize that she should not have had that extra latte. They were about an hour away from anywhere with a rest room and in the middle of nowhere. Her companion suggested she try to hold it, which she did for a while. Unfortunately, because of the heavy snow and slow going, there came a point where she told him that he had better stop and let her pee beside the road, or she would go on the front seat of his car. They stopped and she quickly crawled out beside the car, yanked down her pants and started. Unfortunately in the deep snow she didn't have good footing, so she let her butt rest against the rear fender to steady herself. Her companion stood on the side of the car watching for traffic and indeed was a real gentleman and refrained from peeking. All she could think about was the relief she felt despite the rather embarrassing nature of the situation. Upon finishing however, she soon became aware of another sensation. As she bent to pull up her pants, the young lady discovered her buttocks were firmly glued against the car's fender. Thoughts of tongues frozen to pump handles immediately came to mind as she attempted to disengage her flesh from the icy metal. It was quickly apparent that she had a brand new problem due to the extreme cold. Horrified by her plight and yet aware of the humor, she answered her date's concerns about what was taking so long" with a reply that indeed, she was freezing her butt off and needed some assistance. He came around the car as she tried to cover herself with her sweater and then, as she looked imploringly into his eyes, he burst out laughing. She, too, got the giggles and when they finally managed to compose themselves, they assessed her dilemma. Obviously, as hysterical as the situation was, they also were faced with a real problem. Both agreed it would take something hot to free her chilly cheeks from the grip of the icy metal. Thinking about what had gotten her into the predicament in the first place, both quickly realized that there was only one way to get her free so, as she looked the other way, her first time date proceeded to unzip his pants and pee her butt off the fender. As for the Tonight Show... she took the prize hands down... or perhaps that should be "pants down." And you thought your first date was embarrassing, this gives a whole new definition of being "pissed off". -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6630 From: Steve Uhrig Date: Tue Dec 10, 2002 5:42pm Subject: More on Enemy of the State Here is about a 30 second Quicktime movie (3 megs, so think twice if you have a dialup line) of an interview with Jerry Bruckheimer on 'Research' for his movie Enemy of the State. He is referring to me as the consultant the Baltimore Sun hired when they did their piece on NSA, and also as one of the two people (Marty Kaiser was the other) who built the equipment used in the movie. Interesting short piece. Jerry states all the equipment was real, the same as used by governments, made specially for the movie by the people who made it for the FBI and CIA. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6631 From: Steve Uhrig Date: Tue Dec 10, 2002 8:49pm Subject: Re: More on Enemy of the State WOOPS On 10 Dec 2002 at 18:42, Steve Uhrig wrote: > Here is about a 30 second Quicktime movie (3 megs, so think twice if > you have a dialup line) of an interview with Jerry Bruckheimer on > 'Research' for his movie Enemy of the State. Woops. Forgot link: http://www.filmscouts.com/scripts/clips.cfm?Film=ene-sta Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6632 From: William Knowles Date: Wed Dec 11, 2002 1:39am Subject: Re: Loony tunes On Tue, 10 Dec 2002, Steve Uhrig wrote: > A reminder of a good resource for those loony tune cases: > > http://zapatopi.net/afdb.html > > Bookmark it so you can refer lunatics who call to this site. Lately they have been coming out of the woodwork, I'm blaming it all on the ScFi channel showing the UFO mini-series 'Taken' One more for the list... http://www.lessemf.com/personal.html My favorite on the page is the Faraday Canopy Kit for $299.00 Think of the $$$ we could rack in if these guys offered an affiliates program! :) Cheers! William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* From: Michael Puchol Date: Tue Nov 30, 2004 2:44am Subject: Re: Off Topic comments about poor(?) use of security system This is one of the worst problems in retail - assuming that a bag is an authentication mechanism. In the eyes of the clerks, for some reason, if you are carrying something in a 'company' bag, then everything that's in it must have been paid for. Security people think differently, and at stores where guards are at each exit, they will check the entire contents and tickets to make sure you haven't 'added' something extra to the bag. I also found out that a TETRA radio transmitting in the 380-382 MHz band will effectively kill some tag cancelling devices, they start beeping as if they were getting tags sweeped all the time. Regards, Mike ----- Original Message ----- From: "jtowler" To: Sent: Tuesday, November 30, 2004 3:35 AM Subject: [TSCM-L] Off Topic comments about poor(?) use of security system > > > Hi, > > Seems no-one is talking much since someone ripped into my last email, > offered in good faith, a week ago ... but anyway ... > > Today, I purchased 4 books at one of the larger book shops in the city. > > The person on the serving counter swiped all the books over the gizmo to > deactivate the hidden RF tags and I headed for the door. So far, so good. > > I walked from the rear of the store where I was served, towards the front > main counter, and started out the main doors. > > And then the anti-theft alarm on the exit went off, so I turned back to > their main counter. NOT the one that had just served me in a different part > of the store. > > The lady said sorry, and passed the entire carry bag over the deactivator in > the counter top. She smiled and muttered something about sorry and someone > forgetting ... > > At no point did she look in the bag, count the books (see point 1), or ask > to see my sales receipt. > > I said thanks and headed out the door. No alarm this time. > > If I had added to my bag on my way forward, I'd now have a free book, but at > some significant risk. > > Question: Did the store security system work or did it fail in the above > example? > > The system proved the risk of being detected is very real. But what of their > procedures? > > Regards, > Jim. > > > > > > [Non-text portions of this message have been removed] > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 10256 From: Thomas Shaddack Date: Tue Nov 30, 2004 2:58am Subject: Re: Off Topic comments about poor(?) use of security system On Tue, 30 Nov 2004, Michael Puchol wrote: > This is one of the worst problems in retail - assuming that a bag is an > authentication mechanism. In the eyes of the clerks, for some reason, if > you are carrying something in a 'company' bag, then everything that's in > it must have been paid for. This is probably caused by the ratio of false alarms to successful detection with people carrying a bag and the ones without one. > Security people think differently, and at stores where guards are at > each exit, they will check the entire contents and tickets to make sure > you haven't 'added' something extra to the bag. Given the time to inspection, I would be entirely unsurprised if even they would be beatable by not adding an item, but by replacing it with a similar one. Could be especially effective with books, especially if the ticket doesn't specify the title. > I also found out that a TETRA radio transmitting in the 380-382 MHz band > will effectively kill some tag cancelling devices, they start beeping as > if they were getting tags sweeped all the time. AFAIK, the tag is a simple LC resonator, a kind of a hyper-primitive RFID without the data storage and modulation circuits. The readers flood the area between the coils with RF, and look for harmonics returned by a non-destructed resonator. Any signal source that fits the detector's definition of "response" will do. Pulsing the reader's signal and discounting the responses that are present in "silent" periods would prevent this, for the possible price of "blinding" the detector with such transmitter; the chance of a potentially hostile signal source causing a false alarm vs a false negative has to be weighted here. Even the false alarm can lead to an attack at the system; a transmitter can be hidden in a car on the parking lot, randomly pulsed. After couple hours the staff is likely to become completely desensitized to the alarms, especially if the number of personnel normally required for additional screening gets grossly overwhelmed with "demand". More directional detectors with rejection of external signals could be a good countermeasure against this kind of attack. If it's worth the added cost and installation hassle remains a question for the Management. 10257 From: Michael Puchol Date: Tue Nov 30, 2004 4:59am Subject: Re: Off Topic comments about poor(?) use of security system Just for the record, ----- Original Message ----- From: "Thomas Shaddack" To: Sent: Tuesday, November 30, 2004 9:58 AM Subject: Re: [TSCM-L] Off Topic comments about poor(?) use of security system >> I also found out that a TETRA radio transmitting in the 380-382 MHz band >> will effectively kill some tag cancelling devices, they start beeping as >> if they were getting tags sweeped all the time. > > AFAIK, the tag is a simple LC resonator, a kind of a hyper-primitive RFID > without the data storage and modulation circuits. For the record, I discovered this a day I was casually shopping, and had the radio with me switched on. These radios periodically change repeaters, and when they do they register with the new site by sending some signalling, and this is what was triggering the devices. Apparently, the coverage inside this mall was not good and the radio was changing repeaters very often, I finally managed to find out the relationship because I had this "aura" of beeps following me around the store. Best regards, Mike 10258 From: delta Date: Tue Nov 30, 2004 3:36am Subject: tempest hello everybody a link about the tempest systeme in french language david from paris http://hyatus.dune2.info/Miscellanous/tempest.html 10259 From: Graeme T. Simpson Date: Tue Nov 30, 2004 8:14am Subject: Helped needed Dear All, We have foolishly misplaced our copy of ECR-3 Smartscan software. Is there anyone who could come to our rescue and supply me with a replacement copy? Many thanks, Graeme Simpson Olive Security gsimpson@o... [Non-text portions of this message have been removed] 10260 From: Hawkspirit Date: Tue Nov 30, 2004 4:52pm Subject: Sweep Needed Sweep needed in the Atlanta Ga. area. Roger Tolces Electronic Security [Non-text portions of this message have been removed] 10261 From: Greg Horton Date: Tue Nov 30, 2004 9:30pm Subject: Man Cleared in Keyboard-Wiretapping Case Man Cleared in Keyboard-Wiretapping Case November 29, 2004 9:01 AM PST LOS ANGELES - A man accused of planting a keystroke recording device on a workplace computer wasn't violating federal wiretapping law, a judge has ruled. Larry Lee Ropp, 46, was indicted in March on charges he installed such a device to obtain e-mails, passwords and other information from a computer used by the secretary to the vice president of an Anaheim, Calif.-based insurance company. According to the indictment, he gave some documents relating to the company's handling of claims to the California Department of Insurance, which was working with a private attorney who was drawing up a class-action lawsuit against the company, Bristol West Insurance Group/Coast National Insurance Co. Ropp told the FBI he was operating as a whistleblower, though the Department of Insurance said it had never asked Ropp for any evidence he would not have been able to obtain in the normal course of business. U.S. District Court Judge Gary Feess dismissed the case last month, saying the wiretap law does not extend to the interception of electronic signals from a keyboard to a computer's central processing unit. Ropp did not intercept the messages as they traveled over the Internet and thus his actions, while a violation of privacy rights, did not amount to wiretapping, Feess wrote. The government plans to appeal. [Non-text portions of this message have been removed] 10262 From: Steve Whitehead Date: Tue Nov 30, 2004 10:30pm Subject: Re: Helped needed Graeme We at TSCM Services can. Please contact Lorenzo Lombard on tscmtech@m... Regards Steve Whitehead ----- Original Message ----- From: "Graeme T. Simpson" To: Sent: Tuesday, November 30, 2004 4:14 PM Subject: [TSCM-L] Helped needed > > > Dear All, > > We have foolishly misplaced our copy of ECR-3 Smartscan software. Is > there anyone who could come to our rescue and supply me with a > replacement copy? > > Many thanks, > Graeme Simpson > Olive Security > gsimpson@o... > > > [Non-text portions of this message have been removed] > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 10263 From: Date: Wed Dec 1, 2004 4:40am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 10264 From: contranl Date: Wed Dec 1, 2004 10:34am Subject: RFID-Jammer ? . Since RFID tags or transmitters/reader use only a few standaard frequencies would it be usefull to built a jammer for that ? ...such a jammer with let's say 100mW output and with some audio noise modulation would be relatively simple and lowcost and small enough to fit in your pocket. A noisy signal at the right frequency could "deafen" the reader wich would not be able to read any tags anymore Frequencies can be easely found doing a little internet research or/and going to the victim-shop with your handheld scanner and do a frequency search, taking such a tag home could reveal it's working frequency too (i am not shure how the disabling works but the resonant frequncy might still be discoverable) Such a unit could be very popular in Eastern Europe where they love these kind of "gadgets" :) Tetrascanner 10265 From: kondrak Date: Wed Dec 1, 2004 10:53am Subject: Re: RFID-Jammer ? The device ive read about emulates a box full of RFID tags, and responds to all requests with all numbers, forcing the reader to start and read 000001, 000002, etc... Its entirely passive, (Which i like as well) and confuses the scanner into endless bogus scans Manufacturing ideas include wristwatch bands, key fobs, and eyeglass frames as the tags are almost always in close locations to these points when used in a retail environment. At 11:34 12/1/2004, you wrote: >. > >Since RFID tags or transmitters/reader use only a few standaard >frequencies would it be usefull to built a jammer >for that ? ...such a jammer with let's say 100mW output and with >some audio noise modulation would be relatively simple and lowcost >and small enough to fit in your pocket. > >A noisy signal at the right frequency could "deafen" the reader wich >would not be able to read any tags anymore > >Frequencies can be easely found doing a little internet research >or/and going to the victim-shop with your handheld scanner and do a >frequency search, taking such a tag home could reveal it's working >frequency too (i am not shure how the disabling works but the >resonant frequncy might still be discoverable) > >Such a unit could be very popular in Eastern Europe where they love >these kind of "gadgets" :) > >Tetrascanner > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10266 From: Andy Cuff Date: Wed Dec 1, 2004 3:28pm Subject: NLJD List of Products Hi, I've actually bitten the bullet and have chosen to purchase a NLJD, hiring them just didn't work out! I have built a list of every product that is currently available and invite list members to check it out, making sure I'm not missing any. The list is impartial and links to the manufacturers rather than the resellers, or so I hope. http://www.securitywizardry.com/TSCMnljd.htm If you do find some that I'm missing could you please include a URL (link) to where I can collate further information Regards -andy cuff The Talisker Network Security Portal http://securitywizardry.com Computer Network Defence Ltd --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.801 / Virus Database: 544 - Release Date: 24/11/2004 10267 From: Andy Cuff Date: Wed Dec 1, 2004 3:29pm Subject: Jamming Mobile Phones Good Evening Folks, I have built a web page around a new service for detecting and jamming mobile phones and sought list members constructive criticism about the page content, especially surrounding the negative aspects of jamming phones, which were off the top of my head. http://securitywizardry.com/serviceMOBILE.htm cheers for your time Regards -andy cuff The Talisker Network Security Portal http://securitywizardry.com Computer Network Defence Ltd --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.801 / Virus Database: 544 - Release Date: 24/11/2004 10268 From: Hawkspirit Date: Wed Dec 1, 2004 8:44pm Subject: Antennas I just picked up both of these antennas recently and they work real well. Roger http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem &category=73156&item=3856753168&rd=1 http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem &category=73156&item=3856753165&rd=1 [Non-text portions of this message have been removed] 10269 From: mig selv Date: Wed Dec 1, 2004 2:59pm Subject: Re: Helped needed Dear All I got the same problem Reg. Jens --- "Graeme T. Simpson" wrote: > > Dear All, > > We have foolishly misplaced our copy of ECR-3 > Smartscan software. Is > there anyone who could come to our rescue and supply > me with a > replacement copy? > > Many thanks, > Graeme Simpson > Olive Security > gsimpson@o... > > > [Non-text portions of this message have been > removed] > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - You care about security. So do we. http://promotions.yahoo.com/new_mail 10270 From: A Grudko Date: Thu Dec 2, 2004 0:38pm Subject: RE: RFID-Jammer ? -----Original Message----- From: contranl [mailto:contranl@y...] > Since RFID tags or transmitters/reader use only a few standaard frequencies would it be usefull to built a jammer Are you planning to become a shoplifter? If so, can I offer you some career advice? Get into politics. You can steal far more with much less risk of getting caught. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.802 / Virus Database: 545 - Release Date: 2004/11/26 [Non-text portions of this message have been removed] 10271 From: Agent Geiger Date: Thu Dec 2, 2004 1:34pm Subject: RE: RFID-Jammer ? I do not think that is the point. RFID's do not shut off. Thus, everytime you go anywhere with an RFID on your person, your moved are being recorded and your privacy breached. I had a small RFID type tag in my wallet that I did not know about until recently. I set off the metal detectors at stores all the time but did not know why. People always searched me, and I was always treated like a shoplifter. --- A Grudko wrote: > > -----Original Message----- > From: contranl [mailto:contranl@y...] > > > Since RFID tags or transmitters/reader use only > a few standaard > frequencies would it be usefull to built a jammer > > Are you planning to become a shoplifter? If so, > can I offer you some > career advice? Get into politics. You can steal far > more with much less risk > of getting caught. > > Andy Grudko (British), DPM, Grad IS (South > Africa) > MIS/Grudko Associates, Est. 1981. PSIRA reg. No. > 8642 > www.grudko.com , agrudko@i... > Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) > Branches: > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > Mid Rand (+27 11) 318 1451 - 318 6846(Fax) > Cellular (+27) 82 778 6355 - ICQ 146498943 > SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. > "When you need it done right - first time" > > > > > --- > Outgoing mail is certified Virus Free. > Checked by AVG anti-virus system > (http://www.grisoft.com). > Version: 6.0.802 / Virus Database: 545 - Release > Date: 2004/11/26 > > > [Non-text portions of this message have been > removed] > > __________________________________ Do you Yahoo!? Take Yahoo! Mail with you! Get it on your mobile phone. http://mobile.yahoo.com/maildemo 10272 From: A Grudko Date: Thu Dec 2, 2004 2:43pm Subject: RE: RFID-Jammer ? -----Original Message----- From: Agent Geiger [mailto:agentgeiger@y...] > RFID's do not shut off. Thus, everytime you go anywhere with an RFID on your person, your moved are being recorded and your privacy breached. By who? Why? --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.802 / Virus Database: 545 - Release Date: 2004/11/26 [Non-text portions of this message have been removed] 10273 From: Thomas Shaddack Date: Thu Dec 2, 2004 2:55pm Subject: RE: RFID-Jammer ? On Thu, 2 Dec 2004, A Grudko wrote: > > RFID's do not shut off. Thus, everytime you go > anywhere with an RFID on your person, your moved are > being recorded and your privacy breached. > > By who? Everybody with a reader and a logging software. > Why? Marketing, targeted advertising. "Security" profiling. Curiosity, or "just log it, we'll datamine it later". Automatic identification/tracking of people by a known object in their ownership. Depends on who you are, who your adversaries are, and what they can benefit from. 10274 From: Agent Geiger Date: Thu Dec 2, 2004 3:06pm Subject: RE: RFID-Jammer ? For now, retail outlets; to manage supply chain logistics and to monitor/influence buyer behavior. --- A Grudko wrote: > > -----Original Message----- > From: Agent Geiger [mailto:agentgeiger@y...] > > > RFID's do not shut off. Thus, everytime you go > anywhere with an RFID on your person, your moved > are > being recorded and your privacy breached. > > By who? > > Why? > > > --- > Outgoing mail is certified Virus Free. > Checked by AVG anti-virus system > (http://www.grisoft.com). > Version: 6.0.802 / Virus Database: 545 - Release > Date: 2004/11/26 > > > [Non-text portions of this message have been > removed] > > __________________________________ Do you Yahoo!? The all-new My Yahoo! - What will yours do? http://my.yahoo.com 10275 From: Michael Puchol Date: Thu Dec 2, 2004 5:03pm Subject: Re: RFID-Jammer ? While we are at it, some news on local TV reported that a disco in Barcelona is using RFID tags, the same type as used in pets, for billing and access control. They insert the glass capsule inside the arm of willing clients, using the same type of needles my dog's vet uses. When you want to pay for a drink, swing your arm, same goes for getting inside the place as a VIP when it's packed. All these people running around the city now with RFID tags in their arms, ready to be tracked and datamined to bits.... Photos of the thing being implanted in some clueless soul here: http://www.baja-beachclub.com/bajaes/asp/zonavip.aspx#implantacion There are links there to press reports on the subject, mostly in spanish. Regards, Mike ----- Original Message ----- From: "Agent Geiger" To: Sent: Thursday, December 02, 2004 10:06 PM Subject: RE: [TSCM-L] RFID-Jammer ? > > For now, retail outlets; to manage supply chain > logistics and to monitor/influence buyer behavior. > > > > --- A Grudko wrote: > > > > > -----Original Message----- > > From: Agent Geiger [mailto:agentgeiger@y...] > > > > > RFID's do not shut off. Thus, everytime you go > > anywhere with an RFID on your person, your moved > > are > > being recorded and your privacy breached. > > > > By who? > > > > Why? > > > > > > --- > > Outgoing mail is certified Virus Free. > > Checked by AVG anti-virus system > > (http://www.grisoft.com). > > Version: 6.0.802 / Virus Database: 545 - Release > > Date: 2004/11/26 > > > > > > [Non-text portions of this message have been > > removed] > > > > > > > > > __________________________________ > Do you Yahoo!? > The all-new My Yahoo! - What will yours do? > http://my.yahoo.com > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 10276 From: kondrak Date: Thu Dec 2, 2004 5:51pm Subject: RE: RFID-Jammer ? just imagine the ramifications of when they install sensors at toll booths and track the ones in your tires (Michilin recently started embedding them). Just like easy-pass,, it will be whored by some jackbooted thugs. At 16:06 12/2/2004, you wrote: >For now, retail outlets; to manage supply chain >logistics and to monitor/influence buyer behavior. > > > >--- A Grudko wrote: > > > > > -----Original Message----- > > From: Agent Geiger [mailto:agentgeiger@y...] > > > > > RFID's do not shut off. Thus, everytime you go > > anywhere with an RFID on your person, your moved > > are > > being recorded and your privacy breached. > > > > By who? > > > > Why? > > > > > > --- > > Outgoing mail is certified Virus Free. > > Checked by AVG anti-virus system > > (http://www.grisoft.com). > > Version: 6.0.802 / Virus Database: 545 - Release > > Date: 2004/11/26 > > > > > > [Non-text portions of this message have been > > removed] > > > > > > > > >__________________________________ >Do you Yahoo!? >The all-new My Yahoo! - What will yours do? >http://my.yahoo.com > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10277 From: Agent Geiger Date: Thu Dec 2, 2004 5:59pm Subject: RE: RFID-Jammer ? Hence, I need someone to help me build a RFID-jammer product line. :) --- kondrak wrote: > just imagine the ramifications of when they install > sensors at toll booths > and track the ones in your tires (Michilin recently > started embedding them). > Just like easy-pass,, it will be whored by some > jackbooted thugs. > > At 16:06 12/2/2004, you wrote: > > >For now, retail outlets; to manage supply chain > >logistics and to monitor/influence buyer behavior. > > > > > > > >--- A Grudko wrote: > > > > > > > > -----Original Message----- > > > From: Agent Geiger > [mailto:agentgeiger@y...] > > > > > > > RFID's do not shut off. Thus, everytime you > go > > > anywhere with an RFID on your person, your > moved > > > are > > > being recorded and your privacy breached. > > > > > > By who? > > > > > > Why? > > > > > > > > > --- > > > Outgoing mail is certified Virus Free. > > > Checked by AVG anti-virus system > > > (http://www.grisoft.com). > > > Version: 6.0.802 / Virus Database: 545 - Release > > > Date: 2004/11/26 > > > > > > > > > [Non-text portions of this message have been > > > removed] > > > > > > > > > > > > > > > >__________________________________ > >Do you Yahoo!? > >The all-new My Yahoo! - What will yours do? > >http://my.yahoo.com > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== > TSKS > >Yahoo! Groups Links > > > > > > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Find what you need with new enhanced search. http://info.mail.yahoo.com/mail_250 10278 From: Agent Geiger Date: Thu Dec 2, 2004 6:04pm Subject: Re: RFID-Jammer ? It wasn't hard to convince these people, as they would not let guys into the "cool" area without getting chipped first. Plus, they were drunk and horny. Great marketers, aye? --- Michael Puchol wrote: > While we are at it, some news on local TV reported > that a disco in Barcelona > is using RFID tags, the same type as used in pets, > for billing and access > control. They insert the glass capsule inside the > arm of willing clients, > using the same type of needles my dog's vet uses. > When you want to pay for a > drink, swing your arm, same goes for getting inside > the place as a VIP when > it's packed. > > All these people running around the city now with > RFID tags in their arms, > ready to be tracked and datamined to bits.... > > Photos of the thing being implanted in some clueless > soul here: > > http://www.baja-beachclub.com/bajaes/asp/zonavip.aspx#implantacion > > There are links there to press reports on the > subject, mostly in spanish. > > Regards, > > Mike > > > ----- Original Message ----- > From: "Agent Geiger" > To: > Sent: Thursday, December 02, 2004 10:06 PM > Subject: RE: [TSCM-L] RFID-Jammer ? > > > > > > For now, retail outlets; to manage supply chain > > logistics and to monitor/influence buyer behavior. > > > > > > > > --- A Grudko wrote: > > > > > > > > -----Original Message----- > > > From: Agent Geiger > [mailto:agentgeiger@y...] > > > > > > > RFID's do not shut off. Thus, everytime you > go > > > anywhere with an RFID on your person, your > moved > > > are > > > being recorded and your privacy breached. > > > > > > By who? > > > > > > Why? > > > > > > > > > --- > > > Outgoing mail is certified Virus Free. > > > Checked by AVG anti-virus system > > > (http://www.grisoft.com). > > > Version: 6.0.802 / Virus Database: 545 - Release > > > Date: 2004/11/26 > > > > > > > > > [Non-text portions of this message have been > > > removed] > > > > > > > > > > > > > > > > __________________________________ > > Do you Yahoo!? > > The all-new My Yahoo! - What will yours do? > > http://my.yahoo.com > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > > > =================================================== > TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > > __________________________________ Do you Yahoo!? The all-new My Yahoo! - What will yours do? http://my.yahoo.com 10279 From: Date: Thu Dec 2, 2004 1:09pm Subject: technical definitions jackboot: Noun 1. A stout military boot that extends above the knee. 2. A person who uses bullying tactics, especially to force compliance. 3. The spirit sustaining and motivating a militaristic, highly aggressive, or totalitarian regime or system. thug: Noun 1. A cutthroat or ruffian; a hoodlum. 2. also Thug One of a band of professional assassins formerly active in northern India who worshiped Kali and offered their victims to her. Etymology Hindi *hag, perhaps from Sanskrit sthaga*, a cheat, from sthagati, sthagayati, he conceals; see (s)teg- in Indo-European roots. Other forms thug'ger∑y n.thug'gish adj. Definition provided by The American HeritageÆ Dictionary of the English Language, Fourth Edition. Copyright © 2000 by Houghton Mifflin Company. [Non-text portions of this message have been removed] 10280 From: Robert G. Ferrell Date: Thu Dec 2, 2004 0:43pm Subject: RE: RFID-Jammer ? At 12:38 PM 12/2/2004, A Grudko wrote: > Are you planning to become a shoplifter? If so, can I offer you some >career advice? Get into politics. You can steal far more with much less risk >of getting caught. Um, how about someone who doesn't want his every move and purchasing decision monitored, tracked, evaluated, and catalogued by an unscrupulous corporate marketroid? RGF 10281 From: Daryl Adams, CISSP Date: Thu Dec 2, 2004 1:18pm Subject: RE: RFID-Jammer ? LOL. >From: "A Grudko" >Reply-To: TSCM-L@yahoogroups.com >To: >Subject: RE: [TSCM-L] RFID-Jammer ? >Date: Thu, 2 Dec 2004 20:38:11 +0200 >MIME-Version: 1.0 >X-Sender: agrudko@i... >Received: from n5a.bulk.scd.yahoo.com ([66.94.237.39]) by >mc4-f30.hotmail.com with Microsoft SMTPSVC(5.0.2195.6824); Thu, 2 Dec 2004 >10:39:38 -0800 >Received: from [66.218.69.6] by n5.bulk.scd.yahoo.com with NNFMP; 02 Dec >2004 18:38:50 -0000 >Received: from [66.218.66.94] by mailer6.bulk.scd.yahoo.com with NNFMP; 02 >Dec 2004 18:38:50 -0000 >Received: (qmail 17508 invoked from network); 2 Dec 2004 18:38:46 -0000 >Received: from unknown (66.218.66.167) by m1.grp.scd.yahoo.com with QMQP; >2 Dec 2004 18:38:46 -0000 >Received: from unknown (HELO ctb-mesg5.saix.net) (196.25.240.77) by >mta6.grp.scd.yahoo.com with SMTP; 2 Dec 2004 18:38:45 -0000 >Received: from compaqp4 (tpr-ip-nas-1-p116.telkom-ipnet.co.za >[155.239.184.116])by ctb-mesg5.saix.net (Postfix) with SMTP id >97B8D35713for ; Thu, 2 Dec 2004 20:38:13 +0200 >(SAST) >X-Message-Info: JGTYoYF78jGQ7BJ9pnVLWAdvBuQO7YCy >X-Yahoo-Newman-Property: groups-email >X-Apparently-To: TSCM-L@yahoogroups.com >X-MSMail-Priority: Normal >X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0) >X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000 >X-eGroups-Remote-IP: 196.25.240.77 >X-Yahoo-Profile: damstuff2000 >Mailing-List: list TSCM-L@yahoogroups.com; contact >TSCM-L-owner@yahoogroups.com >Delivered-To: mailing list TSCM-L@yahoogroups.com >Precedence: bulk >List-Unsubscribe: >Return-Path: >sentto-49964-10751-1102012728-dary1_adams=hotmail.com@r... >X-OriginalArrivalTime: 02 Dec 2004 18:39:39.0022 (UTC) >FILETIME=[478F42E0:01C4D89E] > > > -----Original Message----- > From: contranl [mailto:contranl@y...] > > > Since RFID tags or transmitters/reader use only a few standaard > frequencies would it be usefull to built a jammer > > Are you planning to become a shoplifter? If so, can I offer you some >career advice? Get into politics. You can steal far more with much less >risk >of getting caught. > > Andy Grudko (British), DPM, Grad IS (South Africa) > MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 > www.grudko.com , agrudko@i... > Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > Mid Rand (+27 11) 318 1451 - 318 6846(Fax) > Cellular (+27) 82 778 6355 - ICQ 146498943 > SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. > "When you need it done right - first time" > > > > >--- >Outgoing mail is certified Virus Free. >Checked by AVG anti-virus system (http://www.grisoft.com). >Version: 6.0.802 / Virus Database: 545 - Release Date: 2004/11/26 > > >[Non-text portions of this message have been removed] > 10282 From: Thomas Shaddack Date: Thu Dec 2, 2004 7:31pm Subject: RE: RFID-Jammer - speculative design On Thu, 2 Dec 2004, Agent Geiger wrote: > Hence, I need someone to help me build a RFID-jammer > product line. :) Couple months ago I wrote down a design idea for a "smart" micropower jammer. My belt in the high-frequency kung-fu is not sufficiently dark to attempt the construction on my own, so here it is as a free-to-use proposal. Comments warmly welcomed. Micropower RFID jammer - speculative design proposal Radiofrequency tags bring a wide variety of privacy-related concerns. A semi-passive jammer may be an option to alleviate some of them. The tags are powered from the electromagnetic field the reader irradiates them with, then they transmit back on another frequency.The transmission takes some time, I guess few milliseconds, and is detectable by a nearby receiver. The tags are made in two kinds: "plain", and more advanced collision-resistant ones. The first kind transmits blindly whenever powered, repeating its signature over and over, which causes two tags within the field of one reader to jam each other, as their responses get mixed together. The second, more expensive kind, uses algorithms to avoid the situation when two tags transmit at the same time (which overlaps their responses and makes them difficult to recognize); most often detecting another tag transmitting, and then going silent for random amount of time. This behavior makes it possible to design a micropower jammer. The device shall listen on the frequencies both the readers and the tags transmit on. When the tag read attempt is detected, the device owner may be alerted - by a LED, a sound, a vibration. Then when the device detects the tag's attempt to answer, it broadcasts pulses looking like the answer of another tag, forcing a collision anda misread into every answer. The tiny power required for occassional transmitting of few very short pulses makes the device unlikely to cause other kinds of trouble, while additionaly making it less easy to be detected if declared illegal than "continuous" jammers. Update: Considering that the tags response is predictable, always beginning with a preamble, a sequence of synchronization pulses, we can have the jammer keyed by these pulses; whenever a preamble sequence is heard on the tag answer frequency, a short burst of jamming pulses is broadcast. 10283 From: Greg Horton Date: Thu Dec 2, 2004 9:19pm Subject: Re: RFID-Jammer ? > Are you planning to become a shoplifter? If so, can I offer you some career advice? Get into politics. You can steal far more with much less risk of getting caught. > > Um, how about someone who doesn't want his every move and purchasing > decision monitored, tracked, evaluated, and catalogued by an unscrupulous > corporate marketroid? > > Here is a thought for anyone who is thinking about carrying a device into a store to disable the tags. Some enterprising security agent may catch you with your device and then I can see you getting arrested and booked for conspiracy to commit burglary. When your case comes up before the judge, I am sure that they will believe you when you say that you don't want to be tracked by some corporate marketroid. Kind of like catching a guy with a set of master keys outside a commercial area. But officer, I am training to be a locksmith. Ya sure! Greg 10284 From: Shawn Hughes (Road) Date: Fri Dec 3, 2004 1:35am Subject: Re: Digest Number 1753 At 12:20 AM 12/3/04 +0000, you wrote: >just imagine the ramifications of when they install > > sensors at toll booths > > and track the ones in your tires (Michilin recently > > started embedding them). > > Just like easy-pass,, it will be whored by some > > jackbooted thugs. Yawn. (reaching for the tinfoil to fashion a hat) Right. So, these 'they' people, jackboots and all, are smart enough to figure out how to track you by your tires, but too dumb to sniff an active countermeasure that would interfere with the system. Kinda like the radar detector detector detector. Wait til you guys find out about the system they are working on that uses DNA from scent molecules to uniquely identify you...... -Shawn ==================================== Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response www.warriormindset.com Training at the Cutting Edge! (731) 676-2041 Main Office ////////////////////////////////////////////////////////////////////////////// ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. [Non-text portions of this message have been removed] From: A Grudko Date: Fri Dec 3, 2004 8:16am Subject: RE: RFID-Jammer ? Well, my comments certainly sparked some lively debate. This is obviously an issue to some people - it's not an issue over here in SA because very little tagging goes on and what there is is not integrated into an intel. collection system as far as I know (I guess 'they' could have a Top Secret project running somewhere). -----Original Message----- From: Thomas Shaddack [mailto:tscm-l@s...] Agent Geiger> > RFID's do not shut off. Thus, everytime you go > anywhere with an RFID on your person, your moved are > being recorded and your privacy breached. > A Grudko > By who? I guess I shouldn't be so cryptic. 'Everytime you go anywhere' sounded like a huge exaggeration to me, but I suppose that in countries like the US that are under constant and oppressive surveillance it's possible. I guess that the tag in your underwear could have been read by the covert scanner in a Diebold (sp?) voting machine to see who you voted for vast month. Bush needs to know if you are with him or against him. Agent Geiger> Everybody with a reader and a logging software. Given the short range of these readers that must be a fantastic business to be in, making billions of readers so that 'they' have the country covered. A Grudko > Why? > Marketing, targeted advertising. "Security" profiling. Curiosity, or "just log it, we'll datamine it later". Automatic identification/tracking of people by a known object in their ownership. Depends on who you are, who your adversaries are, and what they can benefit from. Adversaries! Wow, I didn't realise I'm so important. I can see the entry in the CIA log now, "17h56, Andy Grudko leaves cubical 4 of the men's toilet at JFK International arrivals lounge 3. Remote analysis of the bowl shows that he has not consumed any controlled substances on the flight over but had 2 glasses of wine with the chicken supper, although steak and beer was available, possibly indicating liberal tendencies. Camera DD14 in the cubical confirmed that he is carrying the same black briefcase that was X-rayed at 17h42 - see copy of scan at file 5503235234186/02122004/1742/Hkk. No suspicious items therein but note has been made in his sexual activity file that he has a packet of 3 extra-large condoms and his wife is not on this trip with him." Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.802 / Virus Database: 545 - Release Date: 2004/11/26 [Non-text portions of this message have been removed] 10286 From: Agent Geiger Date: Fri Dec 3, 2004 8:57am Subject: RE: RFID-Jammer ? It's the blanket spying on everyone, which means that you control everyone much easier. The possibilities are endless. --- A Grudko wrote: > Well, my comments certainly sparked some lively > debate. This is obviously an > issue to some people - it's not an issue over here > in SA because very little > tagging goes on and what there is is not integrated > into an intel. > collection system as far as I know (I guess 'they' > could have a Top Secret > project running somewhere). > -----Original Message----- > From: Thomas Shaddack > [mailto:tscm-l@s...] > Agent Geiger> > RFID's do not shut off. Thus, > everytime you go > > anywhere with an RFID on your person, your > moved are > > being recorded and your privacy breached. > > > A Grudko > By who? > > I guess I shouldn't be so cryptic. 'Everytime you > go anywhere' sounded > like a huge exaggeration to me, but I suppose that > in countries like the US > that are under constant and oppressive surveillance > it's possible. I guess > that the tag in your underwear could have been read > by the covert scanner in > a Diebold (sp?) voting machine to see who you voted > for vast month. Bush > needs to know if you are with him or against him. > > Agent Geiger> Everybody with a reader and a > logging software. > > Given the short range of these readers that must > be a fantastic business > to be in, making billions of readers so that 'they' > have the country > covered. > > A Grudko > Why? > > > Marketing, targeted advertising. "Security" > profiling. Curiosity, or > "just > log it, we'll datamine it later". Automatic > identification/tracking of > people by a known object in their ownership. > Depends on who you are, who > your adversaries are, and what they can benefit > from. > > Adversaries! Wow, I didn't realise I'm so > important. I can see the entry > in the CIA log now, "17h56, Andy Grudko leaves > cubical 4 of the men's toilet > at JFK International arrivals lounge 3. Remote > analysis of the bowl shows > that he has not consumed any controlled substances > on the flight over but > had 2 glasses of wine with the chicken supper, > although steak and beer was > available, possibly indicating liberal tendencies. > Camera DD14 in the > cubical confirmed that he is carrying the same black > briefcase that was > X-rayed at 17h42 - see copy of scan at file > 5503235234186/02122004/1742/Hkk. > No suspicious items therein but note has been made > in his sexual activity > file that he has a packet of 3 extra-large condoms > and his wife is not on > this trip with him." > Andy Grudko (British), DPM, Grad IS (South > Africa) > MIS/Grudko Associates, Est. 1981. PSIRA reg. No. > 8642 > www.grudko.com , agrudko@i... > Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) > Branches: > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > Mid Rand (+27 11) 318 1451 - 318 6846(Fax) > Cellular (+27) 82 778 6355 - ICQ 146498943 > SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. > "When you need it done right - first time" > > > > > > --- > Outgoing mail is certified Virus Free. > Checked by AVG anti-virus system > (http://www.grisoft.com). > Version: 6.0.802 / Virus Database: 545 - Release > Date: 2004/11/26 > > > [Non-text portions of this message have been > removed] > > __________________________________ Do you Yahoo!? All your favorites on one personal page ñ Try My Yahoo! http://my.yahoo.com 10287 From: Robert G. Ferrell Date: Thu Dec 2, 2004 10:05pm Subject: Re: RFID-Jammer ? At 09:19 PM 12/2/2004, you wrote: >Here is a thought for anyone who is thinking about carrying a device >into a store to disable the tags. Some enterprising security agent may >catch you with your device and then I can see you getting arrested and >booked for conspiracy to commit burglary. When your case comes up >before the judge, I am sure that they will believe you when you say that >you don't want to be tracked by some corporate marketroid. Kind of like >catching a guy with a set of master keys outside a commercial area. But >officer, I am training to be a locksmith. Ya sure! Well, no one ever claimed that the struggle for personal privacy was going to be risk-free. If enough people adopt this tactic, it will become harder for the justice system to view it as "conspiracy to commit burglary." I happen to view most corporate marketing as "conspiracy to commit consumer fraud." RGF 10288 From: fjansgmxnet Date: Fri Dec 3, 2004 6:24am Subject: Re: RFID-Jammer ? > Are you planning to become a shoplifter? No, the plan is to become a SEM (shopliter equipment manufactor ;-) > If so, can I offer you some career advice? Get into politics. You can steal far more with much less risk of getting caught. Of cause, this would be legal (if not, change the law) but immoral. Therefore I wouldn't consider it ;-) Regards, Frank 10289 From: fjansgmxnet Date: Fri Dec 3, 2004 6:38am Subject: Re: RFID-Jammer ? > Here is a thought for anyone who is thinking about carrying a device into a store to disable the tags. Some enterprising security agent may catch you with your device and then I can see you getting arrested and booked for conspiracy to commit burglary. Of cause, somebody else will carry the jammer near and never in the store. The proposed 100mW with a continous modulated carrier will jam the small RFID answers over a pretty huge area, maybe a few 100 meters. I think that the problem is to build an universal jammer, which will jam a lot of systems without any user interaction. Even if you only jam the 10 most common frequencies the device will need a power of about 2W if we assume an efficiency of 50%. 2W will kill your batteries pretty soon. Regards, Frank 10290 From: Tech Sec Lab Date: Fri Dec 3, 2004 11:17am Subject: TSCM Course I see this University is doing TSCM courses, anyone know anything about them? http://www.cupim.org/cupm/index.php Regards -Ois 10292 From: James M. Atkinson Date: Fri Dec 3, 2004 5:18pm Subject: Re: Helped needed [cough] If you or any other list member has misplaced there copy of the software then I would encourage you to contact ISA and arrange with them to obtain another copy to replace the one that you misplaced. ISA will be quite happy to supply you with a replacement copy, but only if you bought it from them in the first place are you are the licensed user. Along those same lines, please do not supply, offer to supply, or ask someone else to supply software to anybody else unless you have the copyright holders explicit permission to do so. -jma At 09:14 AM 11/30/2004, Graeme T. Simpson wrote: >Dear All, > >We have foolishly misplaced our copy of ECR-3 Smartscan software. Is >there anyone who could come to our rescue and supply me with a >replacement copy? > >Many thanks, >Graeme Simpson >Olive Security >gsimpson@o... ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10293 From: Shawn Hughes (Road) Date: Fri Dec 3, 2004 10:34pm Subject: Re:RFID At 04:50 PM 12/3/04 +0000, you wrote: >It's the blanket spying on everyone, which means that >you control everyone much easier. Respectfully disagree. Having spied on people for the Government myself, just because you can observe them and track them does * NOT * mean you can control them. >If enough people adopt this tactic, >it will become harder for the justice system to view it as >"conspiracy to commit burglary." Also respectfully disagree. My experience has been that when an intercept method becomes compromised, another surfaces. Rapidly. Or, if the infrastructure is great, a countermeasure to the countermeasure appears. >I think that the problem is to build an universal jammer, which will >jam a lot of systems without any user interaction. Then 'they' will develop a long-range reception capability for detecting persons who pump large amounts of interference in this band. Instead of having to use current tactics to find shoplifters, they will instead focus on the ones emitting a large low-frequency signature. Rather self-defeating, and under FCC interference rules, illegal in and of itself. I think I will get an identification plaque set for my raid vest made up that says "THEY", instead of EOD. It's good to put a face to 'them'. lol Just so my position is clear among the levity.... I am for personal privacy. However, privacy is an illusion, and has been for many, many years. To be private and anonymous requires heraculean efforts, and not ever being part of any comfort and convienence services for several years. And, especially so, no internet. Fact is, there isn't enough resources to track you all. IF 'THEY' are tracking you, you have appeared on their radar for something. Occams' razor applies.... -Shawn ==================================== Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response www.warriormindset.com Training at the Cutting Edge! (731) 676-2041 Main Office ////////////////////////////////////////////////////////////////////////////// ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. 10294 From: Agent Geiger Date: Fri Dec 3, 2004 8:45pm Subject: Re: Re:RFID Example: If you know what people like to buy, eat, wear. You can influence their buying behavior through advertising. If you know that a person eats fatty foods, you then charge them more for their insurance. If you know they like to hang out in casinos, you raise their credit card interest rates. If you know a person like to drive a lot for whatever reason, you raise their insurance rates. All of those things invariably would change and influence (control) people. If I buy lots of baggies, I guess that means that I should have a dynamic entry conducted on my personal residence? How about people like me whom will try and avoid places and items that force the use of RFID devices? Bam! I have been influenced as well. These things have dramatic ramifications and implications. Maybe your comments are symantical in nature. The "control" will be indirect of course, at least at first. --- "Shawn Hughes (Road)" wrote: > At 04:50 PM 12/3/04 +0000, you wrote: > >It's the blanket spying on everyone, which means > that > >you control everyone much easier. > > Respectfully disagree. Having spied on people for > the Government myself, > just because you can observe them and track them > does * NOT * mean you can > control them. > > > >If enough people adopt this tactic, > >it will become harder for the justice system to > view it as > >"conspiracy to commit burglary." > > > Also respectfully disagree. My experience has been > that when an intercept > method becomes compromised, another surfaces. > Rapidly. Or, if the > infrastructure is great, a countermeasure to the > countermeasure appears. > > >I think that the problem is to build an universal > jammer, which will > >jam a lot of systems without any user interaction. > > > Then 'they' will develop a long-range reception > capability for detecting > persons who pump large amounts of interference in > this band. Instead of > having to use current tactics to find shoplifters, > they will instead focus > on the ones emitting a large low-frequency > signature. Rather > self-defeating, and under FCC interference rules, > illegal in and of itself. > > > I think I will get an identification plaque set for > my raid vest made up > that says "THEY", instead of EOD. It's good to put a > face to 'them'. lol > > Just so my position is clear among the levity.... I > am for personal > privacy. However, privacy is an illusion, and has > been for many, many > years. To be private and anonymous requires > heraculean efforts, and not > ever being part of any comfort and convienence > services for several years. > And, especially so, no internet. > > Fact is, there isn't enough resources to track you > all. IF 'THEY' are > tracking you, you have appeared on their radar for > something. Occams' > razor applies.... > > > -Shawn > ==================================== > Shawn Hughes > Special Projects Consultant and Subcontractor > 110 Hughes Hale Lane, Harriman, TN 37748 USA > (865) 335-7992 Voicemail > srh@e... > /////////////////////////////////////////////////////////////////////////////// > Lead Instructor > Explosives, WMD, and Technical Operations > Tactical Response > www.warriormindset.com > Training at the Cutting Edge! > (731) 676-2041 Main Office > ////////////////////////////////////////////////////////////////////////////// > > ******NOTICE: Due to the age of my email account, I > have to set spam > filtering VERY high. If you do not receive a > response in a reasonable > amount of time, please try an alternate > communications method. I apologize > for the inconvienence. > __________________________________ Do you Yahoo!? The all-new My Yahoo! - Get yours free! http://my.yahoo.com 10295 From: A Grudko Date: Sat Dec 4, 2004 4:22am Subject: RE: Helped needed -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] > Along those same lines, please do not supply, offer to supply, or ask someone else to supply software to anybody else unless you have the copyright holders explicit permission to do so. James makes an important point. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.802 / Virus Database: 545 - Release Date: 2004/11/26 [Non-text portions of this message have been removed] 10296 From: kondrak Date: Sat Dec 4, 2004 4:27am Subject: RE: RFID-Jammer ? You know, that's a product I can get behind....let me see what I can get as far as what's being done now...since I know the sequential reader thing is passive, it shouldn't be too hard...after all its part 90 stuff, and they MUST take all interference available. We need to stomp this thing out now...as its obvious its an enabling tool for the JBT. Making its deployment as difficult, and as costly as possible should be a good start...they want it to be a 5c tool, we need to run up their deployment costs...to millions if possible and with as much UN-reliability as possible....corporate shills will balk when deployment costs skyrockets. Next, active measures, like depositing "confusers" near readers should be employed, and the development of a detection and destruction tool needs to be a high priority...salting the Chinese prison-mart would be a good start...drop a confuser in wall cracks, near checkouts..etc.etc. make their readings as unreliable as possible. A detection and destruction tool is of high priority, if we can come up with one for say $50, we will be wealthy. Then we do an infomercial for it, and flood paranoid Amerika with it, and they buy buy buy...it'll be the next teflon pan/ginu knife set. At 18:59 12/2/2004, you wrote: >Hence, I need someone to help me build a RFID-jammer >product line. :) > > >--- kondrak wrote: > > > just imagine the ramifications of when they install > > sensors at toll booths > > and track the ones in your tires (Michilin recently > > started embedding them). > > Just like easy-pass,, it will be whored by some > > jackbooted thugs. > > > > At 16:06 12/2/2004, you wrote: > > > > >For now, retail outlets; to manage supply chain > > >logistics and to monitor/influence buyer behavior. > > > > > > > > > > > >--- A Grudko wrote: > > > > > > > > > > > -----Original Message----- > > > > From: Agent Geiger > > [mailto:agentgeiger@y...] > > > > > > > > > RFID's do not shut off. Thus, everytime you > > go > > > > anywhere with an RFID on your person, your > > moved > > > > are > > > > being recorded and your privacy breached. > > > > > > > > By who? > > > > > > > > Why? > > > > > > > > > > > > --- > > > > Outgoing mail is certified Virus Free. > > > > Checked by AVG anti-virus system > > > > (http://www.grisoft.com). > > > > Version: 6.0.802 / Virus Database: 545 - Release > > > > Date: 2004/11/26 > > > > > > > > > > > > [Non-text portions of this message have been > > > > removed] > > > > > > > > > > > > > > > > > > > > > > >__________________________________ > > >Do you Yahoo!? > > >The all-new My Yahoo! - What will yours do? > > >http://my.yahoo.com > > > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is > > strength" > > > > > > To subscribe to the TSCM-L mailing list > > visit: > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > > the hands acquire shaking, the shaking is a > > warning. > > > It is by caffeine alone I set my mind in motion. > > >=================================================== > > TSKS > > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > >__________________________________ >Do you Yahoo!? >Yahoo! Mail - Find what you need with new enhanced search. >http://info.mail.yahoo.com/mail_250 > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10297 From: kondrak Date: Sat Dec 4, 2004 4:28am Subject: Re: technical definitions Entirely correct in my humble observation. At 19:09 12/2/2004, you wrote: >jackboot: > >Noun >1. A stout military boot that extends above the knee. 2. A person who uses >bullying tactics, especially to force compliance. 3. The spirit sustaining >and >motivating a militaristic, highly aggressive, or totalitarian regime or >system. > > >thug: > >Noun >1. A cutthroat or ruffian; a hoodlum. 2. also Thug One of a band of >professional assassins formerly active in northern India who worshiped >Kali and offered >their victims to her. >Etymology >Hindi *hag, perhaps from Sanskrit sthaga*, a cheat, from sthagati, >sthagayati, he conceals; see (s)teg- in Indo-European roots. >Other forms >thug'ger∑y n.thug'gish adj. > >Definition provided by The American HeritageÆ Dictionary of the English >Language, Fourth Edition. Copyright © 2000 by Houghton Mifflin Company. > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10298 From: kondrak Date: Sat Dec 4, 2004 4:32am Subject: RE: RFID-Jammer - speculative design Wherein lies the research Ive been finding. its easy to confuse the readers by feeding it garbage after the pre-amble, it forces the system to reset and try again, thus the jamming potential. Remember, since these are part 90 devices, they MUST take all interference possible. >Update: Considering that the tags response is predictable, always >beginning with a preamble, a sequence of synchronization pulses, we can >have the jammer keyed by these pulses; whenever a preamble sequence is >heard on the tag answer frequency, a short burst of jamming pulses is >broadcast. > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10299 From: kondrak Date: Sat Dec 4, 2004 4:54am Subject: Re: RFID-Jammer ? Problem is, no security guard is the FCC and its their (the FCC) exclusive domain. Try it and I'll OWN wall mart, and their security company when I sue for 10 billion. No make that a class action, and go for 250 billion. See I didn't give any particular written permission for a commercial entity to engage in surveillance, thus my civil rights have been compromised, ca-ching, title 42....federal civil rights suit. My device is legal under part 90, its passive. Part 90 MUST take any and all interference by statute. If some hayseed security thugs try that, I'll own them before their doughnuts get stale. You fail to provide a positive method of disabling the devices, each and every one when it leaves your store, and a method to allow a customer to verify, I'll claim an illegal bug, and sue for civil rights violation, and illegal surveillance. Just get one case before a jury, and let some "expert witnesses" like from this list testify, and I can almost guarantee a multi-million judgement, and a cease and desist order. "Gentleman and woman of the jury, the "corporation" infused commonly sold products like clothing, auto parts, and other things that a person would normally carry on or about his person with surveillance devices commonly readable by anyone possessing the readers. The Corporation then gave codes by default to people and or persons whom we have no knowledge of, but not limited to government thugs who would use these "tracking devices" to surveil, harass, and violate the privacy rights of said citizens.... OH yeah, let me get that in front of a Jury of 12.....cakewalk....Even a 2nd year law student would drool over this one...I smell $$$$$ to the tune of billions here...sue, then sue again, and keep suing till it's a dead technology. At 22:19 12/2/2004, you wrote: > > Are you planning to become a shoplifter? If so, can I offer you >some career advice? Get into politics. You can steal far more with much >less risk of getting caught. > > > > > Um, how about someone who doesn't want his every move and purchasing > > decision monitored, tracked, evaluated, and catalogued by an unscrupulous > > corporate marketroid? > > > > >Here is a thought for anyone who is thinking about carrying a device >into a store to disable the tags. Some enterprising security agent may >catch you with your device and then I can see you getting arrested and >booked for conspiracy to commit burglary. When your case comes up >before the judge, I am sure that they will believe you when you say that >you don't want to be tracked by some corporate marketroid. Kind of like >catching a guy with a set of master keys outside a commercial area. But >officer, I am training to be a locksmith. Ya sure! > >Greg > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10300 From: kondrak Date: Sat Dec 4, 2004 4:59am Subject: RE: RFID-Jammer ? We may jest about it now, but undoubtedly some police-state agency is working on a database (recently prohibited by congress, but resurrected under a black project) to do just that. So if you or I can imagine the evil, someone at DARPA has already got a grant to "make it so". At 09:16 12/3/2004, you wrote: >Well, my comments certainly sparked some lively debate. This is obviously an >issue to some people - it's not an issue over here in SA because very little >tagging goes on and what there is is not integrated into an intel. >collection system as far as I know (I guess 'they' could have a Top Secret >project running somewhere). > -----Original Message----- > From: Thomas Shaddack [mailto:tscm-l@s...] > Agent Geiger> > RFID's do not shut off. Thus, everytime you go > > anywhere with an RFID on your person, your moved are > > being recorded and your privacy breached. > > > A Grudko > By who? > > I guess I shouldn't be so cryptic. 'Everytime you go anywhere' sounded >like a huge exaggeration to me, but I suppose that in countries like the US >that are under constant and oppressive surveillance it's possible. I guess >that the tag in your underwear could have been read by the covert scanner in >a Diebold (sp?) voting machine to see who you voted for vast month. Bush >needs to know if you are with him or against him. > > Agent Geiger> Everybody with a reader and a logging software. > > Given the short range of these readers that must be a fantastic business >to be in, making billions of readers so that 'they' have the country >covered. > > A Grudko > Why? > > > Marketing, targeted advertising. "Security" profiling. Curiosity, or >"just > log it, we'll datamine it later". Automatic identification/tracking of > people by a known object in their ownership. Depends on who you are, who > your adversaries are, and what they can benefit from. > > Adversaries! Wow, I didn't realise I'm so important. I can see the entry >in the CIA log now, "17h56, Andy Grudko leaves cubical 4 of the men's toilet >at JFK International arrivals lounge 3. Remote analysis of the bowl shows >that he has not consumed any controlled substances on the flight over but >had 2 glasses of wine with the chicken supper, although steak and beer was >available, possibly indicating liberal tendencies. Camera DD14 in the >cubical confirmed that he is carrying the same black briefcase that was >X-rayed at 17h42 - see copy of scan at file 5503235234186/02122004/1742/Hkk. >No suspicious items therein but note has been made in his sexual activity >file that he has a packet of 3 extra-large condoms and his wife is not on >this trip with him." > Andy Grudko (British), DPM, Grad IS (South Africa) > MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 > www.grudko.com , agrudko@i... > Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > Mid Rand (+27 11) 318 1451 - 318 6846(Fax) > Cellular (+27) 82 778 6355 - ICQ 146498943 > SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. > "When you need it done right - first time" > > > > > >--- >Outgoing mail is certified Virus Free. >Checked by AVG anti-virus system (http://www.grisoft.com). >Version: 6.0.802 / Virus Database: 545 - Release Date: 2004/11/26 > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10301 From: kondrak Date: Sat Dec 4, 2004 5:08am Subject: Re: Re: RFID-Jammer ? NO NO NO....Youre failing to understand the basic nature of the device...its POWERED from remote. THUS you can use a passive device, which will do exactly like THEIR device does, take their power and use it to confuse. Youre thinking in normal TSCM mode here, where something transmits and we need to jam it. Its almost an opposite, THEY power it up, we just need to feed it garbage. Its a unique situation where by THEY give us the communications channel, we just need to feed it the most inappropriate signal, confuse their machinery, and cause it to do insane, non expected things. In any case, cause it NOT do what its intended to do. Its more akin to knowing you're bugged, and that allows you to feed it dis-information. At 07:38 12/3/2004, you wrote: > > Here is a thought for anyone who is thinking about carrying a >device into a store to disable the tags. Some enterprising security >agent may catch you with your device and then I can see you getting >arrested and booked for conspiracy to commit burglary. > >Of cause, somebody else will carry the jammer near and never in the >store. The proposed 100mW with a continous modulated carrier will jam >the small RFID answers over a pretty huge area, maybe a few 100 >meters. > >I think that the problem is to build an universal jammer, which will >jam a lot of systems without any user interaction. Even if you only >jam the 10 most common frequencies the device will need a power of >about 2W if we assume an efficiency of 50%. 2W will kill your >batteries pretty soon. > >Regards, > Frank > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10302 From: Thomas Shaddack Date: Sat Dec 4, 2004 5:13am Subject: RE: RFID-Jammer - speculative design On Sat, 4 Dec 2004, kondrak wrote: > Wherein lies the research Ive been finding. its easy to confuse the readers > by feeding it garbage after the pre-amble, it forces the system to reset > and try again, thus the jamming potential. > Remember, since these are part 90 devices, they MUST take all interference > possible. Another important device to build is a reader/response detector. A reader detector may be as simple as a receiver tuned to the frequencies of the commonly used tags, displaying field strength on each of the frequencies. A response detector listens for the tags' response preambles, eventually the responses themselves, and either shows the decoded values, or just blinks a LED, or beeps. The reader detector can also, instead of field strength indicators, have a preprogrammed threshold and alert its user by eg. light vibration, allowing a discrete way to detect the readers. Denying the adversary the ability to read all they want is at this moment less important than awareness of the location of the readers. Knowledge of their deployment is an important factor for fine-tuning the defenses, without falling into unfounded they-are-everywhere paranoia. 10303 From: kondrak Date: Sat Dec 4, 2004 5:18am Subject: Re: Re:RFID At 23:34 12/3/2004, you wrote: >At 04:50 PM 12/3/04 +0000, you wrote: > >It's the blanket spying on everyone, which means that > >you control everyone much easier. > >Respectfully disagree. Having spied on people for the Government myself, >just because you can observe them and track them does * NOT * mean you can >control them. Thats the job of the people who employ YOU! > >If enough people adopt this tactic, > >it will become harder for the justice system to view it as > >"conspiracy to commit burglary." > > >Also respectfully disagree. My experience has been that when an intercept >method becomes compromised, another surfaces. Rapidly. Or, if the >infrastructure is great, a countermeasure to the countermeasure appears. Not readily when you want it to be a 5c chip. > >I think that the problem is to build an universal jammer, which will > >jam a lot of systems without any user interaction. This is good. >Then 'they' will develop a long-range reception capability for detecting >persons who pump large amounts of interference in this band. Instead of >having to use current tactics to find shoplifters, they will instead focus >on the ones emitting a large low-frequency signature. Rather >self-defeating, and under FCC interference rules, illegal in and of itself. The devices would be passive, and certainly within the part 90 power limits, and incidentally powered BY the offenders themselves. So I want to see the case where "Im making a complaint where MY own transmission" is causing ME interference. Truth is they're part 90 devices, and by statute must take any interference they may receive. YOU caused my passive device to transmit a signal that interfered with YOUR spying. Oh yeah, just let me get this in front of a jury...uh huh... >I think I will get an identification plaque set for my raid vest made up >that says "THEY", instead of EOD. It's good to put a face to 'them'. lol > >Just so my position is clear among the levity.... I am for personal >privacy. However, privacy is an illusion, and has been for many, many >years. To be private and anonymous requires heraculean efforts, and not >ever being part of any comfort and convienence services for several years. >And, especially so, no internet. > >Fact is, there isn't enough resources to track you all. IF 'THEY' are >tracking you, you have appeared on their radar for something. Occams' >razor applies.... > > >-Shawn >==================================== >Shawn Hughes >Special Projects Consultant and Subcontractor >110 Hughes Hale Lane, Harriman, TN 37748 USA >(865) 335-7992 Voicemail >srh@e... >/////////////////////////////////////////////////////////////////////////////// >Lead Instructor >Explosives, WMD, and Technical Operations >Tactical Response >www.warriormindset.com >Training at the Cutting Edge! >(731) 676-2041 Main Office >////////////////////////////////////////////////////////////////////////////// > >******NOTICE: Due to the age of my email account, I have to set spam >filtering VERY high. If you do not receive a response in a reasonable >amount of time, please try an alternate communications method. I apologize >for the inconvienence. > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10304 From: kondrak Date: Sat Dec 4, 2004 5:29am Subject: Re: Re:RFID One of the prime things here is the linking back to a known person, most usually by a credit or debit card. One should only use them to obtain cash and pay for items IN cash and never feed the surveillance machine. Say I cash my paycheck and every time the account reaches say $1500, I withdraw $1000. Purpose, no one knows what I have in my possession in cash, I have a ready reserve of in case on an instant's notice, and now law-vulture can steal it and put me out of business. You've got to look at it from the other side. Most of the sheeple are scared to carry cash. I dont have any problem carrying say 500-1000 in cash and my .44 magnum. Both make me comfortable. I just dont allow the banksters and the surveillance establishment to know what I spend MY money on. And don't fool yourselves for a second, this is ALL about finding out that particular information. At 21:45 12/3/2004, you wrote: >Example: > >If you know what people like to buy, eat, wear. You >can influence their buying behavior through >advertising. > >If you know that a person eats fatty foods, you then >charge them more for their insurance. > >If you know they like to hang out in casinos, you >raise their credit card interest rates. > >If you know a person like to drive a lot for whatever >reason, you raise their insurance rates. > >All of those things invariably would change and >influence (control) people. > >If I buy lots of baggies, I guess that means that I >should have a dynamic entry conducted on my personal >residence? > >How about people like me whom will try and avoid >places and items that force the use of RFID devices? >Bam! I have been influenced as well. > >These things have dramatic ramifications and >implications. > >Maybe your comments are symantical in nature. The >"control" will be indirect of course, at least at >first. > > >--- "Shawn Hughes (Road)" wrote: > > > At 04:50 PM 12/3/04 +0000, you wrote: > > >It's the blanket spying on everyone, which means > > that > > >you control everyone much easier. > > > > Respectfully disagree. Having spied on people for > > the Government myself, > > just because you can observe them and track them > > does * NOT * mean you can > > control them. > > > > > > >If enough people adopt this tactic, > > >it will become harder for the justice system to > > view it as > > >"conspiracy to commit burglary." > > > > > > Also respectfully disagree. My experience has been > > that when an intercept > > method becomes compromised, another surfaces. > > Rapidly. Or, if the > > infrastructure is great, a countermeasure to the > > countermeasure appears. > > > > >I think that the problem is to build an universal > > jammer, which will > > >jam a lot of systems without any user interaction. > > > > > > Then 'they' will develop a long-range reception > > capability for detecting > > persons who pump large amounts of interference in > > this band. Instead of > > having to use current tactics to find shoplifters, > > they will instead focus > > on the ones emitting a large low-frequency > > signature. Rather > > self-defeating, and under FCC interference rules, > > illegal in and of itself. > > > > > > I think I will get an identification plaque set for > > my raid vest made up > > that says "THEY", instead of EOD. It's good to put a > > face to 'them'. lol > > > > Just so my position is clear among the levity.... I > > am for personal > > privacy. However, privacy is an illusion, and has > > been for many, many > > years. To be private and anonymous requires > > heraculean efforts, and not > > ever being part of any comfort and convienence > > services for several years. > > And, especially so, no internet. > > > > Fact is, there isn't enough resources to track you > > all. IF 'THEY' are > > tracking you, you have appeared on their radar for > > something. Occams' > > razor applies.... > > > > > > -Shawn > > ==================================== > > Shawn Hughes > > Special Projects Consultant and Subcontractor > > 110 Hughes Hale Lane, Harriman, TN 37748 USA > > (865) 335-7992 Voicemail > > srh@e... > > >/////////////////////////////////////////////////////////////////////////////// > > Lead Instructor > > Explosives, WMD, and Technical Operations > > Tactical Response > > www.warriormindset.com > > Training at the Cutting Edge! > > (731) 676-2041 Main Office > > >////////////////////////////////////////////////////////////////////////////// > > > > ******NOTICE: Due to the age of my email account, I > > have to set spam > > filtering VERY high. If you do not receive a > > response in a reasonable > > amount of time, please try an alternate > > communications method. I apologize > > for the inconvienence. > > > > > > >__________________________________ >Do you Yahoo!? >The all-new My Yahoo! - Get yours free! >http://my.yahoo.com > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10305 From: A Grudko Date: Sat Dec 4, 2004 10:37am Subject: Hitachi KH-WS1 I wonder if anyone has or has access to the Operator Manual for the Hitachi KH-WS1 Worldspace satellite RX? I found some technical and hobbyist stuff on the net but the RX is now in the hands of a non-tech friend who did not get a manual when he bought it second hand. Andy G Afrika --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.802 / Virus Database: 545 - Release Date: 2004/11/26 10306 From: A Grudko Date: Sat Dec 4, 2004 10:37am Subject: RE: RFID-Jammer ? -Original Message- From: Agent Geiger [mailto:agentgeiger@y...] > The possibilities are endless. Correct - and the possibilities are divided into good and bad in exactly the same ratio as man's moral intent. Technology is neutral but if you are that worried that 'they' are monitoring your book purchases for instance: (The following is humour) 1) Shoplift a copy of 'KKKs Revenge' from your local book store. 2) Your home made RFID jammer will assist in this process. If it does not and you get caught, eat this instruction list and we will have a lawyer bail you out. Failure to eat this list WILL result in your immediate detention at GTMO 3) If shoplifting fails, use a cloned credit card. If you don't have one your local Pizza Hut delivery person can direct you to the committed hackers in your area as they never leave their parent's basement and the company of their DSL connection and only eat in 3) Don't forget to wear a disguise or else 'their' facial recognition software will ID you through the Homeland Security cameras in the store by cross-referencing to the ones in your home 4) Make sure you don't get any parking or speeding tickets during this operation, even if you are driving your mother's car. 'They' will find you through her and you don't want to see what old ladies look like after they have been given the 'Abu Gherab' treatment 5) Carefully remove the RFID strip from your right wing book and place it into a copy of Bill Clinton's latest book. 6) Give this to your most annoying democrat associate for Xmas/Hanukah 7) Sit back with your night vision goggles and log the Rep. government surveillance agents watching/entering his/her house 8) Pan back and watch the Dem counter surveillance agents watching the Rep. government surveillance agents (the dems slipped RFID tags in their Glocks) (End humour) Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.802 / Virus Database: 545 - Release Date: 2004/11/26 10307 From: Agent Geiger Date: Sat Dec 4, 2004 10:43am Subject: RE: RFID-Jammer ? I would seriously consider this. Walmart rolls theirs out in January. --- kondrak wrote: > You know, that's a product I can get behind....let > me see what I can get as > far as what's being done now...since I know the > sequential reader thing is > passive, it shouldn't be too hard...after all its > part 90 stuff, and they > MUST take all interference available. > We need to stomp this thing out now...as its obvious > its an enabling tool > for the JBT. Making its deployment as difficult, and > as costly as possible > should be a good start...they want it to be a 5c > tool, we need to run up > their deployment costs...to millions if possible and > with as much > UN-reliability as possible....corporate shills will > balk when deployment > costs skyrockets. > Next, active measures, like depositing "confusers" > near readers should be > employed, and the development of a detection and > destruction tool needs to > be a high priority...salting the Chinese prison-mart > would be a good > start...drop a confuser in wall cracks, near > checkouts..etc.etc. make their > readings as unreliable as possible. > > A detection and destruction tool is of high > priority, if we can come up > with one for say $50, we will be wealthy. Then we do > an infomercial for it, > and flood paranoid Amerika with it, and they buy buy > buy...it'll be the > next teflon pan/ginu knife set. > > > > > At 18:59 12/2/2004, you wrote: > > >Hence, I need someone to help me build a > RFID-jammer > >product line. :) > > > > > >--- kondrak wrote: > > > > > just imagine the ramifications of when they > install > > > sensors at toll booths > > > and track the ones in your tires (Michilin > recently > > > started embedding them). > > > Just like easy-pass,, it will be whored by some > > > jackbooted thugs. > > > > > > At 16:06 12/2/2004, you wrote: > > > > > > >For now, retail outlets; to manage supply chain > > > >logistics and to monitor/influence buyer > behavior. > > > > > > > > > > > > > > > >--- A Grudko wrote: > > > > > > > > > > > > > > -----Original Message----- > > > > > From: Agent Geiger > > > [mailto:agentgeiger@y...] > > > > > > > > > > > RFID's do not shut off. Thus, everytime > you > > > go > > > > > anywhere with an RFID on your person, your > > > moved > > > > > are > > > > > being recorded and your privacy breached. > > > > > > > > > > By who? > > > > > > > > > > Why? > > > > > > > > > > > > > > > --- > > > > > Outgoing mail is certified Virus Free. > > > > > Checked by AVG anti-virus system > > > > > (http://www.grisoft.com). > > > > > Version: 6.0.802 / Virus Database: 545 - > Release > > > > > Date: 2004/11/26 > > > > > > > > > > > > > > > [Non-text portions of this message have been > > > > > removed] > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >__________________________________ > > > >Do you Yahoo!? > > > >The all-new My Yahoo! - What will yours do? > > > >http://my.yahoo.com > > > > > > > > > > > > > > > > > > >======================================================== > > > > TSCM-L Technical Security Mailing > List > > > > "In a multitude of counselors there is > > > strength" > > > > > > > > To subscribe to the TSCM-L mailing list > > > visit: > > > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > > > It is by caffeine alone I set my mind in > motion. > > > > It is by the juice of Star Bucks that > thoughts > > > acquire speed, > > > > the hands acquire shaking, the shaking is a > > > warning. > > > > It is by caffeine alone I set my mind in > motion. > > > > >=================================================== > > > TSKS > > > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >__________________________________ > >Do you Yahoo!? > >Yahoo! Mail - Find what you need with new enhanced > search. > >http://info.mail.yahoo.com/mail_250 > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== > TSKS > >Yahoo! Groups Links > > > > > > > > > > __________________________________ Do you Yahoo!? Meet the all-new My Yahoo! - Try it today! http://my.yahoo.com 10308 From: Agent Geiger Date: Sat Dec 4, 2004 10:52am Subject: Re: Re:RFID I agree. Check out www.nocards.org. Are the plastic/metal threads in money RFID's as well? I heard that they are. If so, carry cash is still not keeping your privacy secure. --- kondrak wrote: > One of the prime things here is the linking back to > a known person, most > usually by a credit or debit card. One should only > use them to obtain cash > and pay for items IN cash and never feed the > surveillance machine. Say I > cash my paycheck and every time the account reaches > say $1500, I withdraw > $1000. Purpose, no one knows what I have in my > possession in cash, I have a > ready reserve of in case on an instant's notice, > and now law-vulture can > steal it and put me out of business. > You've got to look at it from the other side. > Most of the sheeple are scared to carry cash. I dont > have any problem > carrying say 500-1000 in cash and my .44 magnum. > Both make me comfortable. > I just dont allow the banksters and the surveillance > establishment to know > what I spend MY money on. And don't fool yourselves > for a second, this is > ALL about finding out that particular information. > > > > At 21:45 12/3/2004, you wrote: > > >Example: > > > >If you know what people like to buy, eat, wear. > You > >can influence their buying behavior through > >advertising. > > > >If you know that a person eats fatty foods, you > then > >charge them more for their insurance. > > > >If you know they like to hang out in casinos, you > >raise their credit card interest rates. > > > >If you know a person like to drive a lot for > whatever > >reason, you raise their insurance rates. > > > >All of those things invariably would change and > >influence (control) people. > > > >If I buy lots of baggies, I guess that means that I > >should have a dynamic entry conducted on my > personal > >residence? > > > >How about people like me whom will try and avoid > >places and items that force the use of RFID > devices? > >Bam! I have been influenced as well. > > > >These things have dramatic ramifications and > >implications. > > > >Maybe your comments are symantical in nature. The > >"control" will be indirect of course, at least at > >first. > > > > > >--- "Shawn Hughes (Road)" wrote: > > > > > At 04:50 PM 12/3/04 +0000, you wrote: > > > >It's the blanket spying on everyone, which > means > > > that > > > >you control everyone much easier. > > > > > > Respectfully disagree. Having spied on people > for > > > the Government myself, > > > just because you can observe them and track them > > > does * NOT * mean you can > > > control them. > > > > > > > > > >If enough people adopt this tactic, > > > >it will become harder for the justice system to > > > view it as > > > >"conspiracy to commit burglary." > > > > > > > > > Also respectfully disagree. My experience has > been > > > that when an intercept > > > method becomes compromised, another surfaces. > > > Rapidly. Or, if the > > > infrastructure is great, a countermeasure to the > > > countermeasure appears. > > > > > > >I think that the problem is to build an > universal > > > jammer, which will > > > >jam a lot of systems without any user > interaction. > > > > > > > > > Then 'they' will develop a long-range reception > > > capability for detecting > > > persons who pump large amounts of interference > in > > > this band. Instead of > > > having to use current tactics to find > shoplifters, > > > they will instead focus > > > on the ones emitting a large low-frequency > > > signature. Rather > > > self-defeating, and under FCC interference > rules, > > > illegal in and of itself. > > > > > > > > > I think I will get an identification plaque set > for > > > my raid vest made up > > > that says "THEY", instead of EOD. It's good to > put a > > > face to 'them'. lol > > > > > > Just so my position is clear among the > levity.... I > > > am for personal > > > privacy. However, privacy is an illusion, and > has > > > been for many, many > > > years. To be private and anonymous requires > > > heraculean efforts, and not > > > ever being part of any comfort and convienence > > > services for several years. > > > And, especially so, no internet. > > > > > > Fact is, there isn't enough resources to track > you > > > all. IF 'THEY' are > > > tracking you, you have appeared on their radar > for > > > something. Occams' > > > razor applies.... > > > > > > > > > -Shawn > > > ==================================== > > > Shawn Hughes > > > Special Projects Consultant and Subcontractor > > > 110 Hughes Hale Lane, Harriman, TN 37748 USA > > > (865) 335-7992 Voicemail > > > srh@e... > > > > >/////////////////////////////////////////////////////////////////////////////// > > > Lead Instructor > > > Explosives, WMD, and Technical Operations > > > Tactical Response > > > www.warriormindset.com > > > Training at the Cutting Edge! > > > (731) 676-2041 Main Office > > > > >////////////////////////////////////////////////////////////////////////////// > > > > > > ******NOTICE: Due to the age of my email > account, I > > > have to set spam > > > filtering VERY high. If you do not receive a > > > response in a reasonable > > > amount of time, please try an alternate > > > communications method. I apologize > > > for the inconvienence. > > > > > > > > > > > > >__________________________________ > >Do you Yahoo!? > >The all-new My Yahoo! - Get yours free! > >http://my.yahoo.com > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > === message truncated === __________________________________ Do you Yahoo!? All your favorites on one personal page ñ Try My Yahoo! http://my.yahoo.com 10309 From: Agent Geiger Date: Sat Dec 4, 2004 10:53am Subject: RE: RFID-Jammer - speculative design What would that take? --- Thomas Shaddack wrote: > On Sat, 4 Dec 2004, kondrak wrote: > > > Wherein lies the research Ive been finding. its > easy to confuse the readers > > by feeding it garbage after the pre-amble, it > forces the system to reset > > and try again, thus the jamming potential. > > Remember, since these are part 90 devices, they > MUST take all interference > > possible. > > Another important device to build is a > reader/response detector. > > A reader detector may be as simple as a receiver > tuned to the frequencies > of the commonly used tags, displaying field strength > on each of the > frequencies. > > A response detector listens for the tags' response > preambles, eventually > the responses themselves, and either shows the > decoded values, or just > blinks a LED, or beeps. > > The reader detector can also, instead of field > strength indicators, have a > preprogrammed threshold and alert its user by eg. > light vibration, > allowing a discrete way to detect the readers. > > Denying the adversary the ability to read all they > want is at this moment > less important than awareness of the location of the > readers. Knowledge of > their deployment is an important factor for > fine-tuning the defenses, > without falling into unfounded they-are-everywhere > paranoia. > __________________________________ Do you Yahoo!? Yahoo! Mail - You care about security. So do we. http://promotions.yahoo.com/new_mail 10310 From: Thomas Shaddack Date: Sat Dec 4, 2004 11:44am Subject: RE: RFID-Jammer - speculative design On Sat, 4 Dec 2004, Agent Geiger wrote: > What would that take? That depends on what exactly you want to achieve. (I personally would hire somebody for the radio part, and look under his hands to learn more about it.) Let's for start expect that you want to just detect the presence of the tag readers. This should be fairly easy, given the laws of physics: the tag has to be fed with quite high amount of energy, so the reader has to pump a lot of EM energy to the space it wants to "see". The tags need certain minimal level of energy to power their circuits; they are digital in nature. They are similar to some ancient AM radios, where there was just a detection diode and a tuned circuit and the energy from the antenna was used to power the radio. Then there is a PROM-type memory with the tag's identification number, a clock generator, and a counter that steps through the memory over and over, whenever powered, and the memory's output is used to clock the tag's own transmitter. This is pretty complicated and needs a certain minimal power level to kick in, so not even the highest-class adversary can read the tag remotely without illuminating it with certain minimal power. Use less power than the limit for the tag, and the tag won't wake up. (keep in mind that the real minimal values will vary per chip because of manufacturing tolerances, and will be typically smaller than the catalog values). A simple kind of a field strength meter should do the job. Just an antenna, receiver tuned to the desired frequency, and an indicator of signal strength. It is possible I get to experiment with a warehouse management class RFID system sometime within 2005, so if time and knowledge permits, I may play around a bit. There are chips on the market for AM/FM radios that need just few parts around, and have a signal strength output pin with voltage corresponding to the signal level. You can feed signal from this pin directly to a microcontroller with a built-in ADC. Then connect anything you want to the chip's output - a line of LEDs, a vibration motor, a buzzer, a GPS receiver and an EEPROM chip to silently log the values vs positions - anything you want, and program the microcontroller to respond to the presence of the signal the way you wish it to. (Then make money on it if you market it well and make it cheap.) If you want to monitor more frequencies, you use several input circuits, one per frequency. (There are several kinds of tags, operating on wildly different frequencies, requiring different constructions of antennas and receivers.) Microcontrollers often have several analog inputs; my favorite ones are the Microchip PIC ones, but some people prefer ATMELs. A receiver of the tag responses is much more complicated. The tag responses are MUCH weaker than the reader's field, which requires bigger antennas and more sensitive receivers. The tag responses have to be recognized and isolated from the signal. You can either do it yourself using eg. a DSP chip, or use a commercially manufactured RFID receiver chip. You need to know what tags the adversary uses, so you can use the right chip that talks the desired protocol. However, there are only few standards on the market now, and the standardization efforts between the manufacturers will simplify this too. RFID detector is much easier than a "generic bug detector", as the frequencies and devices are well-known and there is no attempt to hide or mask them (at least for widespread commercial systems, which is the kind that poses threat privacy-wise). The principles are otherwise the same. For many people here the construction should be a piece of cake. Tetrascanner, what is your opinion? > > --- Thomas Shaddack > wrote: > > > On Sat, 4 Dec 2004, kondrak wrote: > > > > > Wherein lies the research Ive been finding. its > > easy to confuse the readers > > > by feeding it garbage after the pre-amble, it > > forces the system to reset > > > and try again, thus the jamming potential. > > > Remember, since these are part 90 devices, they > > MUST take all interference > > > possible. > > > > Another important device to build is a > > reader/response detector. > > > > A reader detector may be as simple as a receiver > > tuned to the frequencies > > of the commonly used tags, displaying field strength > > on each of the > > frequencies. > > > > A response detector listens for the tags' response > > preambles, eventually > > the responses themselves, and either shows the > > decoded values, or just > > blinks a LED, or beeps. > > > > The reader detector can also, instead of field > > strength indicators, have a > > preprogrammed threshold and alert its user by eg. > > light vibration, > > allowing a discrete way to detect the readers. > > > > Denying the adversary the ability to read all they > > want is at this moment > > less important than awareness of the location of the > > readers. Knowledge of > > their deployment is an important factor for > > fine-tuning the defenses, > > without falling into unfounded they-are-everywhere > > paranoia. > > > > > > > > __________________________________ > Do you Yahoo!? > Yahoo! Mail - You care about security. So do we. > http://promotions.yahoo.com/new_mail > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10311 From: kondrak Date: Sat Dec 4, 2004 0:19pm Subject: RE: RFID-Jammer - speculative design The other thing needed is a pinpoint detector...something you can pass over something you think is bugged to locate the tiny RFID device. At 06:13 12/4/2004, you wrote: >On Sat, 4 Dec 2004, kondrak wrote: > > > Wherein lies the research Ive been finding. its easy to confuse the > readers > > by feeding it garbage after the pre-amble, it forces the system to reset > > and try again, thus the jamming potential. > > Remember, since these are part 90 devices, they MUST take all interference > > possible. > >Another important device to build is a reader/response detector. > >A reader detector may be as simple as a receiver tuned to the frequencies >of the commonly used tags, displaying field strength on each of the >frequencies. > >A response detector listens for the tags' response preambles, eventually >the responses themselves, and either shows the decoded values, or just >blinks a LED, or beeps. > >The reader detector can also, instead of field strength indicators, have a >preprogrammed threshold and alert its user by eg. light vibration, >allowing a discrete way to detect the readers. > >Denying the adversary the ability to read all they want is at this moment >less important than awareness of the location of the readers. Knowledge of >their deployment is an important factor for fine-tuning the defenses, >without falling into unfounded they-are-everywhere paranoia. > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10312 From: kondrak Date: Sat Dec 4, 2004 0:27pm Subject: RE: RFID-Jammer ? Wall-Mart's is like the military's so far as Im told, its pallet tagging only now. Vendors that tag items individually we simply put on a do-not-buy list like Gillette and whoever else foists this, thus the great importance of detecting the tags so retribution can be swift. At 11:43 12/4/2004, you wrote: >I would seriously consider this. Walmart rolls theirs >out in January. > >--- kondrak wrote: > > > You know, that's a product I can get behind....let > > me see what I can get as > > far as what's being done now...since I know the > > sequential reader thing is > > passive, it shouldn't be too hard...after all its > > part 90 stuff, and they > > MUST take all interference available. > > We need to stomp this thing out now...as its obvious > > its an enabling tool > > for the JBT. Making its deployment as difficult, and > > as costly as possible > > should be a good start...they want it to be a 5c > > tool, we need to run up > > their deployment costs...to millions if possible and > > with as much > > UN-reliability as possible....corporate shills will > > balk when deployment > > costs skyrockets. > > Next, active measures, like depositing "confusers" > > near readers should be > > employed, and the development of a detection and > > destruction tool needs to > > be a high priority...salting the Chinese prison-mart > > would be a good > > start...drop a confuser in wall cracks, near > > checkouts..etc.etc. make their > > readings as unreliable as possible. > > > > A detection and destruction tool is of high > > priority, if we can come up > > with one for say $50, we will be wealthy. Then we do > > an infomercial for it, > > and flood paranoid Amerika with it, and they buy buy > > buy...it'll be the > > next teflon pan/ginu knife set. > > > > > > > > > > At 18:59 12/2/2004, you wrote: > > > > >Hence, I need someone to help me build a > > RFID-jammer > > >product line. :) > > > > > > > > >--- kondrak wrote: > > > > > > > just imagine the ramifications of when they > > install > > > > sensors at toll booths > > > > and track the ones in your tires (Michilin > > recently > > > > started embedding them). > > > > Just like easy-pass,, it will be whored by some > > > > jackbooted thugs. > > > > > > > > At 16:06 12/2/2004, you wrote: > > > > > > > > >For now, retail outlets; to manage supply chain > > > > >logistics and to monitor/influence buyer > > behavior. > > > > > > > > > > > > > > > > > > > >--- A Grudko wrote: > > > > > > > > > > > > > > > > > -----Original Message----- > > > > > > From: Agent Geiger > > > > [mailto:agentgeiger@y...] > > > > > > > > > > > > > RFID's do not shut off. Thus, everytime > > you > > > > go > > > > > > anywhere with an RFID on your person, your > > > > moved > > > > > > are > > > > > > being recorded and your privacy breached. > > > > > > > > > > > > By who? > > > > > > > > > > > > Why? > > > > > > > > > > > > > > > > > > --- > > > > > > Outgoing mail is certified Virus Free. > > > > > > Checked by AVG anti-virus system > > > > > > (http://www.grisoft.com). > > > > > > Version: 6.0.802 / Virus Database: 545 - > > Release > > > > > > Date: 2004/11/26 > > > > > > > > > > > > > > > > > > [Non-text portions of this message have been > > > > > > removed] > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >__________________________________ > > > > >Do you Yahoo!? > > > > >The all-new My Yahoo! - What will yours do? > > > > >http://my.yahoo.com > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > > > > TSCM-L Technical Security Mailing > > List > > > > > "In a multitude of counselors there is > > > > strength" > > > > > > > > > > To subscribe to the TSCM-L mailing list > > > > visit: > > > > > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > > > > > It is by caffeine alone I set my mind in > > motion. > > > > > It is by the juice of Star Bucks that > > thoughts > > > > acquire speed, > > > > > the hands acquire shaking, the shaking is a > > > > warning. > > > > > It is by caffeine alone I set my mind in > > motion. > > > > > > >=================================================== > > > > TSKS > > > > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >__________________________________ > > >Do you Yahoo!? > > >Yahoo! Mail - Find what you need with new enhanced > > search. > > >http://info.mail.yahoo.com/mail_250 > > > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is > > strength" > > > > > > To subscribe to the TSCM-L mailing list > > visit: > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > > the hands acquire shaking, the shaking is a > > warning. > > > It is by caffeine alone I set my mind in motion. > > >=================================================== > > TSKS > > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > >__________________________________ >Do you Yahoo!? >Meet the all-new My Yahoo! - Try it today! >http://my.yahoo.com > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10313 From: kondrak Date: Sat Dec 4, 2004 0:33pm Subject: Re: Re:RFID They're optical confirmation that the bill is genuine. No RF sensitivity has been observed in them. At 11:52 12/4/2004, you wrote: >I agree. Check out www.nocards.org. > >Are the plastic/metal threads in money RFID's as well? > I heard that they are. If so, carry cash is still >not keeping your privacy secure. > >--- kondrak wrote: > > > One of the prime things here is the linking back to > > a known person, most > > usually by a credit or debit card. One should only > > use them to obtain cash > > and pay for items IN cash and never feed the > > surveillance machine. Say I > > cash my paycheck and every time the account reaches > > say $1500, I withdraw > > $1000. Purpose, no one knows what I have in my > > possession in cash, I have a > > ready reserve of in case on an instant's notice, > > and now law-vulture can > > steal it and put me out of business. > > You've got to look at it from the other side. > > Most of the sheeple are scared to carry cash. I dont > > have any problem > > carrying say 500-1000 in cash and my .44 magnum. > > Both make me comfortable. > > I just dont allow the banksters and the surveillance > > establishment to know > > what I spend MY money on. And don't fool yourselves > > for a second, this is > > ALL about finding out that particular information. > > > > > > > > At 21:45 12/3/2004, you wrote: > > > > >Example: > > > > > >If you know what people like to buy, eat, wear. > > You > > >can influence their buying behavior through > > >advertising. > > > > > >If you know that a person eats fatty foods, you > > then > > >charge them more for their insurance. > > > > > >If you know they like to hang out in casinos, you > > >raise their credit card interest rates. > > > > > >If you know a person like to drive a lot for > > whatever > > >reason, you raise their insurance rates. > > > > > >All of those things invariably would change and > > >influence (control) people. > > > > > >If I buy lots of baggies, I guess that means that I > > >should have a dynamic entry conducted on my > > personal > > >residence? > > > > > >How about people like me whom will try and avoid > > >places and items that force the use of RFID > > devices? > > >Bam! I have been influenced as well. > > > > > >These things have dramatic ramifications and > > >implications. > > > > > >Maybe your comments are symantical in nature. The > > >"control" will be indirect of course, at least at > > >first. > > > > > > > > >--- "Shawn Hughes (Road)" wrote: > > > > > > > At 04:50 PM 12/3/04 +0000, you wrote: > > > > >It's the blanket spying on everyone, which > > means > > > > that > > > > >you control everyone much easier. > > > > > > > > Respectfully disagree. Having spied on people > > for > > > > the Government myself, > > > > just because you can observe them and track them > > > > does * NOT * mean you can > > > > control them. > > > > > > > > > > > > >If enough people adopt this tactic, > > > > >it will become harder for the justice system to > > > > view it as > > > > >"conspiracy to commit burglary." > > > > > > > > > > > > Also respectfully disagree. My experience has > > been > > > > that when an intercept > > > > method becomes compromised, another surfaces. > > > > Rapidly. Or, if the > > > > infrastructure is great, a countermeasure to the > > > > countermeasure appears. > > > > > > > > >I think that the problem is to build an > > universal > > > > jammer, which will > > > > >jam a lot of systems without any user > > interaction. > > > > > > > > > > > > Then 'they' will develop a long-range reception > > > > capability for detecting > > > > persons who pump large amounts of interference > > in > > > > this band. Instead of > > > > having to use current tactics to find > > shoplifters, > > > > they will instead focus > > > > on the ones emitting a large low-frequency > > > > signature. Rather > > > > self-defeating, and under FCC interference > > rules, > > > > illegal in and of itself. > > > > > > > > > > > > I think I will get an identification plaque set > > for > > > > my raid vest made up > > > > that says "THEY", instead of EOD. It's good to > > put a > > > > face to 'them'. lol > > > > > > > > Just so my position is clear among the > > levity.... I > > > > am for personal > > > > privacy. However, privacy is an illusion, and > > has > > > > been for many, many > > > > years. To be private and anonymous requires > > > > heraculean efforts, and not > > > > ever being part of any comfort and convienence > > > > services for several years. > > > > And, especially so, no internet. > > > > > > > > Fact is, there isn't enough resources to track > > you > > > > all. IF 'THEY' are > > > > tracking you, you have appeared on their radar > > for > > > > something. Occams' > > > > razor applies.... > > > > > > > > > > > > -Shawn > > > > ==================================== > > > > Shawn Hughes > > > > Special Projects Consultant and Subcontractor > > > > 110 Hughes Hale Lane, Harriman, TN 37748 USA > > > > (865) 335-7992 Voicemail > > > > srh@e... > > > > > > > >///////////////////////////////////////////////////////////////////////// > ////// > > > > Lead Instructor > > > > Explosives, WMD, and Technical Operations > > > > Tactical Response > > > > www.warriormindset.com > > > > Training at the Cutting Edge! > > > > (731) 676-2041 Main Office > > > > > > > >///////////////////////////////////////////////////////////////////////// > ///// > > > > > > > > ******NOTICE: Due to the age of my email > > account, I > > > > have to set spam > > > > filtering VERY high. If you do not receive a > > > > response in a reasonable > > > > amount of time, please try an alternate > > > > communications method. I apologize > > > > for the inconvienence. > > > > > > > > > > > > > > > > > > >__________________________________ > > >Do you Yahoo!? > > >The all-new My Yahoo! - Get yours free! > > >http://my.yahoo.com > > > > > > > > > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is > > strength" > > > > > > To subscribe to the TSCM-L mailing list > > visit: > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > > the hands acquire shaking, the shaking is a > > warning. > > >=== message truncated === > > > > >__________________________________ >Do you Yahoo!? >All your favorites on one personal page ≠ Try My Yahoo! >http://my.yahoo.com > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10314 From: kondrak Date: Sat Dec 4, 2004 0:51pm Subject: RE: RFID-Jammer - speculative design Yes, you are right there on a lot of that..the close proximity necessary indicates theyre like a RF powered bugging device, taking the power they need to charge a cap till they have enough power to transpond with the mother-reader. Now where they transpond, what freq is kind of limited by two things, their infinitesimal small size, and the desire to keep these things cheap. BTW, the other idea ive had that will force them to install a RFID destruction unit at every checkout, is to save the chips, and continually salt their stores with the old usable tags. Once the readings reach a level of unreliability, their investment is wasted, and the level of customer distrust would force them to go back to old methods. WHAT! You're charging me $44. for this box of Kleenex..? Ill shop somewhere else..once it gets around that the Red-Chinese slave labor store is using the system to defraud the customers it will be all over for RFID there. Its the same as bar-coding was, people KNOW they're going to use it to steal from the customers to pay for the system, and anyone who watches the scanning and knows the prices of what they purchased has obviously caught the errors like I have. Isn't it funny, ALL the errors always benefit the store, not the other way around. At 12:44 12/4/2004, you wrote: >On Sat, 4 Dec 2004, Agent Geiger wrote: > > > What would that take? > >That depends on what exactly you want to achieve. (I personally would hire >somebody for the radio part, and look under his hands to learn more about >it.) > >Let's for start expect that you want to just detect the presence of the >tag readers. This should be fairly easy, given the laws of physics: the >tag has to be fed with quite high amount of energy, so the reader has to >pump a lot of EM energy to the space it wants to "see". The tags need >certain minimal level of energy to power their circuits; they are digital >in nature. They are similar to some ancient AM radios, where there was >just a detection diode and a tuned circuit and the energy from the antenna >was used to power the radio. Then there is a PROM-type memory with the >tag's identification number, a clock generator, and a counter that steps >through the memory over and over, whenever powered, and the memory's >output is used to clock the tag's own transmitter. This is pretty >complicated and needs a certain minimal power level to kick in, so not >even the highest-class adversary can read the tag remotely without >illuminating it with certain minimal power. Use less power than the limit >for the tag, and the tag won't wake up. (keep in mind that the real >minimal values will vary per chip because of manufacturing tolerances, and >will be typically smaller than the catalog values). > > >A simple kind of a field strength meter should do the job. Just an >antenna, receiver tuned to the desired frequency, and an indicator of >signal strength. It is possible I get to experiment with a warehouse >management class RFID system sometime within 2005, so if time and >knowledge permits, I may play around a bit. > >There are chips on the market for AM/FM radios that need just few parts >around, and have a signal strength output pin with voltage corresponding >to the signal level. You can feed signal from this pin directly to a >microcontroller with a built-in ADC. Then connect anything you want to the >chip's output - a line of LEDs, a vibration motor, a buzzer, a GPS >receiver and an EEPROM chip to silently log the values vs positions - >anything you want, and program the microcontroller to respond to the >presence of the signal the way you wish it to. (Then make money on it if >you market it well and make it cheap.) > >If you want to monitor more frequencies, you use several input circuits, >one per frequency. (There are several kinds of tags, operating on wildly >different frequencies, requiring different constructions of antennas and >receivers.) Microcontrollers often have several analog inputs; my favorite >ones are the Microchip PIC ones, but some people prefer ATMELs. > > >A receiver of the tag responses is much more complicated. The tag >responses are MUCH weaker than the reader's field, which requires bigger >antennas and more sensitive receivers. The tag responses have to be >recognized and isolated from the signal. You can either do it yourself >using eg. a DSP chip, or use a commercially manufactured RFID receiver >chip. You need to know what tags the adversary uses, so you can use the >right chip that talks the desired protocol. However, there are only few >standards on the market now, and the standardization efforts between the >manufacturers will simplify this too. > >RFID detector is much easier than a "generic bug detector", as the >frequencies and devices are well-known and there is no attempt to hide or >mask them (at least for widespread commercial systems, which is the kind >that poses threat privacy-wise). The principles are otherwise the same. >For many people here the construction should be a piece of cake. >Tetrascanner, what is your opinion? > > > > > > > > --- Thomas Shaddack > > wrote: > > > > > On Sat, 4 Dec 2004, kondrak wrote: > > > > > > > Wherein lies the research Ive been finding. its > > > easy to confuse the readers > > > > by feeding it garbage after the pre-amble, it > > > forces the system to reset > > > > and try again, thus the jamming potential. > > > > Remember, since these are part 90 devices, they > > > MUST take all interference > > > > possible. > > > > > > Another important device to build is a > > > reader/response detector. > > > > > > A reader detector may be as simple as a receiver > > > tuned to the frequencies > > > of the commonly used tags, displaying field strength > > > on each of the > > > frequencies. > > > > > > A response detector listens for the tags' response > > > preambles, eventually > > > the responses themselves, and either shows the > > > decoded values, or just > > > blinks a LED, or beeps. > > > > > > The reader detector can also, instead of field > > > strength indicators, have a > > > preprogrammed threshold and alert its user by eg. > > > light vibration, > > > allowing a discrete way to detect the readers. > > > > > > Denying the adversary the ability to read all they > > > want is at this moment > > > less important than awareness of the location of the > > > readers. Knowledge of > > > their deployment is an important factor for > > > fine-tuning the defenses, > > > without falling into unfounded they-are-everywhere > > > paranoia. > > > > > > > > > > > > > > > __________________________________ > > Do you Yahoo!? > > Yahoo! Mail - You care about security. So do we. > > http://promotions.yahoo.com/new_mail > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10315 From: A Grudko Date: Sat Dec 4, 2004 1:52pm Subject: RE: RFID-Jammer - speculative design -----Original Message----- From: Agent Geiger [mailto:agentgeiger@y...] > What would that take? Money. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.802 / Virus Database: 545 - Release Date: 2004/11/26 [Non-text portions of this message have been removed] From: Date: Mon Dec 4, 2000 5:18pm Subject: Re: Universal law And then there is the good old fashioned Yanqui-Ingenuity mathod. Place computer on a flat hard surfece such as concrete, using a felt pad to protect against scratches. Place a camcorder on tripod, focus carefully and start it running. Strike computer in the center with a 16# sledge until battery is seen flying out. Run the tape in reverse and observe carefully to see where battery originated. So simple... --- Steve Uhrig wrote: > Once upon a midnight dreary, Cristian pondered, weak > and weary: > > > Morphy's universal engineering rule: after a > > dismantling/assembling procedure you'll spare al > least some > > screws. > > Something I learned as part owner of a Harley > Davidson shop some > years ago: > > If you take something apart and put it back together > enough > times, eventually you will have two of them. > > Steve (making a list and checking it *twice*) > > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website > http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > -------------------------- eGroups Sponsor > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== > TSKS > __________________________________________________ Do You Yahoo!? Yahoo! Shopping - Thousands of Stores. Millions of Products. http://shopping.yahoo.com/ 2013 From: Date: Mon Dec 4, 2000 1:51pm Subject: Countermeasures Equipment Our Organization is at the present time integrating a turnkey project for the Government of Mexico. If your company is related to the manufacture of Countermeasures Equipment, please let us know. Also, has anyone on the list the URL or web site address for the following companies: Information Security Associates Research Electronics Thanks for your help. M. Gleich Technical Manager Worldwide Intelligence & Security, Inc. 14001 Dallas Parkway Suite 1200 Dallas, Texas 75240 e-mail:technicalmgr@w... [Non-text portions of this message have been removed] 2014 From: Date: Tue Dec 5, 2000 1:58am Subject: Enemy Of The State Steve; Thanks ! You and Marty did a tremendous job! The movie is really a work of art! Will look for your cameo appearance . super cool !! as they say ! the movie really did not say much about the wire transmitter in the crease of the pants ,but Marty had elaborated on that in an earlier post. Hackman's office " transmission free cage" ,was a sight! the satellite photos were great! one slick escapade ! congrats for a job well done! moviegoers will be able to appreciate this film for a long time to come. as technology advances. Enemy of the State 2 should be equally enthralling ! HAVE A GREAT DAY !!! 2015 From: James M. Atkinson, Comm-Eng Date: Tue Dec 5, 2000 8:37am Subject: ALDRICH AMES WRITES TO FAS FROM PENITENTIARY ABOUT POLYGRAPH ALDRICH AMES WRITES TO FAS FROM PENITENTIARY ABOUT POLYGRAPH (Nov28). http://www.fas.org/sgp/othergov/polygraph/ames.html ----------------------------------- FAS Note: As one who successfully defeated the counterintelligence polygraph examination, convicted spy Aldrich H. Ames speaks with some authority on this subject at least. The following letter was sent by Ames from Allenwood federal penitentiary to Steven Aftergood at the Federation of American Scientists. The handwritten letter was undated, but was postmarked November 28, 2000. ----------------------------------- Dear Mr. Aftergood, Having had considerable experience with the polygraph (well beyond that which you referred to), I read your very sensible essay in Science with great interest. I offer you a few comments on the topic for whatever interest or use they may have. Like most junk science that just won't die (graphology, astrology and homeopathy come to mind), because of the usefulness or profit their practitioners enjoy, the polygraph stays with us. Its most obvious use is as a coercive aid to interrogators, lying somewhere on the scale between the rubber truncheon and the diploma on the wall behind the interrogator's desk. It depends upon the overall coerciveness of the setting -- you'll be fired, you won't get the job, you'll be prosecuted, you'll go to prison -- and the credulous fear the device inspires. This is why the Redmond report ventures into the simultaneously ludicrous and sinister reality that citizens' belief in what is untrue must be fostered and strengthened. Rarely admitted, this proposition is of general application for our national security apparatus. You didn't mention one of the intriguing elements of the interrogations of Dr. Lee which is in fact quite common -- the false representation to the subject of the polygraph results. Because interrogations are intended to coerce confessions of one sort or another, interrogators feel themselves entirely justified in using their coercive means as flexibly as possible to extract them. Consistency regarding the particular technique is not important; inducing anxiety and fear is the point. Polygraphers are fond of the technique used by psychics called cold reading, as a slightly less dramatic practice than actually lying to the subject about the results. In this sort of cold reading, the interrogator will suggest to the subject that there may be a potential problem, an ambiguous result, to one of the questions and inquire whether the subject knows of anything that might help clear it up, etc, etc. Your account of the Redmond report -- I haven't seen it -- shows how another hoary slider is thrown past the public. The polygraph is asserted to have been a useful tool in counterintelligence investigations. This is a nice example of retreating into secret knowledge: we know it works, but it's too secret to explain. To my own knowledge and experience over a thirty year career this statement is a false one. The use of the polygraph (which is inevitably to say, its misuse) has done little more than create confusion, ambiguity and mistakes. I'd love to lay out this case for you, but unfortunately I cannot -- it's a secret too. Most people in the intelligence and CI business are well aware of the theoretical and practical failings of the polygraph, but are equally alert to its value in institutional, bureaucratic terms and treasure its use accordingly. This same logic applies to its use in screening potential and current employees, whether of the CIA, NSA, DOE or even of private organizations. Deciding whether to trust or credit a person is always an uncertain task, and in a variety of situations a bad, lazy or just unlucky decision about a person can result not only in serious problems for the organization and its purposes, but in career-damaging blame for the unfortunate decision-maker. Here, the polygraph is a scientific godsend: the bureaucrat accounting for a bad decision, or sometimes for a missed opportunity (the latter is much less often questioned in a bureaucracy) can point to what is considered an unassailably objective, though occasionally and unavoidably fallible, polygraph judgment. All that was at fault was some practical application of a "scientific" technique, like those frozen O-rings, or the sandstorms between the Gulf and Desert One in 1980. I've seen these bureaucratically-driven flights from accountability operating for years, much to the cost of our intelligence and counterintelligence effectiveness. The US is, so far as I know, the only nation which places such extensive reliance on the polygraph. (The FBI, to its credit in a self-serving sort of way, also rejects the routine use of the polygraph on its own people.) It has gotten us into a lot of trouble. On the other hand, there have been episodes in which high-level pressures to use or acquire certain persons entirely override pious belief in the polygraph. One instance which made the press is that of the Iranian connection in the Iran-Contra affair. I wish you well in this particularly important theater of the struggle against pseudoscience: the national security state has many unfair and cruel weapons in its arsenal, but that of junk science is one which can be fought and perhaps defeated by honest and forthright efforts like yours. Sincerely, Aldrich H. Ames 40087-083 P.O. Box 3000 White Deer, PA 17887 P.S. I should say that all my outgoing mail goes through the CIA -- unlawfully -- for review, censorship and whatever use it chooses to make of it. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 2016 From: Jordan Ulery Date: Tue Dec 5, 2000 10:02am Subject: cyber alert Interesting warning for our clients ** Task Force Issues Warning On Cyberattacks A government-led task force is warning companies doing business over the Internet to tighten security after an increase in computer attacks that have focused on systems related to E-commerce or banking and financial businesses. In its advisory, the National Infrastructure Protection Center cites three holes in Microsoft Windows NT that are increasingly used by intruders to gain unauthorized access to computer systems and download proprietary information. The center is urging systems administrators to apply patches that will close the holes. The center has also warned against new holiday-oriented viruses, such as "Navidad," a Spanish-language E-mail worm, and "Music," an E-mail attachment that displays a picture of Santa Claus and plays several seconds of "We Wish You a Merry Christmas" while it sends itself to all the recipients in the infected user's address book. The center was established in 1998 as a joint effort between the FBI, various federal and state government agencies, and the private sector. Its mission, according to its Web site, is to "serve as the U.S. government's focal point for threat assessment, warning, investigation, and response for threats or attacks against our critical infrastructures." - David M. Ewalt 2017 From: James M. Atkinson, Comm-Eng Date: Tue Dec 5, 2000 11:53am Subject: Reporter's Fake Job Irks Real Dot-Com http://www.thestandard.com/article/display/0,1151,20534,00.html?nl=dnh December 01, 2000 Reporter's Fake Job Irks Real Dot-Com A New Yorker piece by an Internet impostor is the talk of Silicon Alley, but Luminant isn't laughing. By Richard Martin New York's Silicon Alley was in a tizzy last week after the New Yorker ran a hilarious piece called "My Fake Job," in which former Letterman writer Rodney Rothman recounted his days of masquerading as an employee at an unnamed Manhattan dot-com consultancy. After walking into the company's offices, claiming a desk and securing a phone extension under a phony name, Rothman spent three weeks noshing on free snacks, enjoying company-provided massages and carrying on imaginary business calls from his cubicle. The identity of the company was not revealed. But it didn't take long for employees of Luminant Worldwide , an Internet consultant and Web design company that recently laid off about 25 percent of its workforce, to recognize the reporter's descriptions of their workplace. (The most telling clue was a T-shirt mentioned by Rothman that read "May the e-force be with you." Luminant distributed the shirts to employees this year.) Repercussions quickly ensued. CEO Jim Corey sent out a company-wide e-mail (later posted on a message board on the job site thevault.com) in which he said "there are descriptions in the story that strongly suggest he was writing about Luminant" and that the company has "reason to believe it could have happened." Corey went on to list a series of beefed-up security procedures, including "Introduce yourself to unfamiliar people" ("Hey, it is also a great way to make some friends") and "Don't allow unfamiliar people to follow you through doors with secure access." Corey's message also hinted at possible lawsuits: "The author of the story was clearly deceptive in posing as an employee, and worked to gain access to the building by following persons with key cards and providing vague and false information to employees. We will be seeking the advice of our legal counsel on how, if at all, we should respond to this incident. If it turns out that the company was Luminant, I'd like to know if he took anything from our offices, interfered with our work in any way or harassed any of our employees." Luminant had no official comment. Rothman could not be reached for comment. ---------------------------------------------------- (Copy of Email sent to Luminant Employees by Rothman) December 1, 2000 To: Luminant Everyone Subject: New Yorker Magazine Article Most of you are probably aware of an article that appeared in the November 27th issue of The New Yorker magazine in which a writer discusses how he posed as an employee in the New York City offices of an e-consultancy for 16 days. While the article did not mention a company name, there are descriptions in the story that strongly suggest he was writing about Luminant. Initial information we have received from members of our New York staff gives us reason to believe it could have happened, and this person may have been the son of a former employee that made his access to our offices much easier. While the article was humorous, it does raise security issues that we should take seriously. As best we can tell, this individual was harmless but I am concerned about the safety implications of someone posing as an employee on our premises. We have already begun an internal investigation about the event. Even if the story turns out to be a fabrication or an experience at some other firm, we intend to closely evaluate our security procedures and implement measures as necessary to improve our safety and the confidentiality of our materials. I will inform you of our findings and recommendations. We will also be looking at the legal implications of someone entering our premises without authorization. The author of the story was clearly deceptive in posing as an employee, and worked to gain access to the building by following persons with key cards and providing vague and false information to employees. We will be seeking the advice of our legal counsel on how, if at all, we should respond to this incident. If it turns out that the company was Luminant, I'd like to know if he took anything from our offices, interfered with our work in any way or harassed any of our employees. As we evaluate our security and take corrective measures, I would like to ask for your cooperation in immediately improving our building security. There are many things each of us can do, just by being aware and alert, to improve our workplace safety. In fact, no matter what security procedures we have in place, they won't be effective unless we are each responsible for following them. Here are a few procedures to keep in mind: 1) Introduce yourself to unfamiliar people. Don't be afraid to ask anyone what they do at Luminant. Hey, it is also a great way to make some friends. 2) Store personal articles such as purses, cell phones, and PDAs out of sight. 3) Make an effort to know what client projects are underway around you and know who is typically involved with these projects. 4) Make sure client information is stored away when you are not using it or when you are gone for the day. 5) Don't allow unfamiliar people to follow you through doors with secure access. While it may seem impolite not to hold the door for someone, you can pardon yourself by saying you will be in trouble if you don't follow company policy and direct them to the proper entrance. 6) Never let anyone, familiar or not, have access to your computer. 7) If you have meetings in the office with non-employees, try to use one of the central conference rooms rather than your individual work area. This can protect you from the potential of exposing confidential client information or our ongoing sales efforts. 8) Make sure that you close locked security doors behind you. Our security doors can't be effective if we leave them propped open. If you have questions about this situation, we want to address them. Please raise them during this week's conference call on Friday. ---------------------------------------------------- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 2018 From: Date: Tue Dec 5, 2000 10:15am Subject: Re: Reporter's Fake Job Irks Real Dot-Com In a message dated 12/5/00 10:01:25 AM Pacific Standard Time, jmatk@tscm.com writes: << http://www.thestandard.com/article/display/0,1151,20534,00.html?nl=dnh December 01, 2000 Reporter's Fake Job Irks Real Dot-Com >> Very interesting story! Funny too! Some of us know what can be accomplished while carrying a clipboard, buttset and or a hand held radio. 2019 From: Date: Tue Dec 5, 2000 1:00pm Subject: Interesting Article - Interesting Links - Great Police work >From: David Sobel >Subject: FBI Break-in Targets Use of Encryption > > >As many of us have long predicted, it is now a matter of record >that the FBI can, and does, conduct surreptitious entries >to counter the use of encryption. > >The FBI application is at: > > http://www.epic.org/crypto/breakin/application.pdf > http://www.epic.org/crypto/breakin/application.pdf > >The court order is at: > > http://www.epic.org/crypto/breakin/order.pdf > http://www.epic.org/crypto/breakin/order.pdf >========================================================= > >http://inq.philly.com/content/inquirer/2000/12/04/front_page/JMOB04.htm > >A federal gambling case against the son of jailed mob boss >Nicodemo "Little Nicky" Scarfo could instead be the first legal >test of cutting-edge cyber-surveillance technology that some >critics of federal investigations say borders on Big Brotherism. > >Court records in the pending case indicate that Nicodemo S. >Scarfo, 35, was the target of a sophisticated surveillance tool >- a so-called keystroke-logging device - that allowed the FBI to >reproduce every stroke he entered on a computer on which >gambling records allegedly were stored. > >Scarfo subsequently was charged with supervising a mob-linked >bookmaking and loan-sharking operation in North Jersey. > >Questions about the FBI's spying methods in the Scarfo >investigation surface at a time when defense lawyers and civil >libertarians have begun to ask how far federal authorities >should be permitted to go with electronic surveillance. Critics >say that technology is evolving faster than the laws governing >privacy rights and that federal investigators, emboldened by the >capabilities of their cyber-tools, frequently disregard >constitutional guarantees. > >. . . > >The FBI would not comment. Assistant U.S. Attorney Ronald D. >Wigler, the prosecutor in the case, said only that he expected >the FBI's surveillance methods would be challenged in a pretrial >defense motion and that arguments could establish new case law. > >"I can't talk about any of it," he said, "but I think it's >correct to say this is [a] cutting-edge [legal issue]." > >. . . > >[Scarfo's lawyer] would not discuss what his client was storing >on the encrypted program but said Scarfo was using software known >as PGP. > >"It stands for Pretty Good Privacy," the lawyer said with a >chuckle. 2020 From: Date: Tue Dec 5, 2000 1:01pm Subject: Supreme Court Enters Taped-Call Case Supreme Court Enters Taped-Call Case By CLAUDE R. MARX .c The Associated Press WASHINGTON (AP) - A secretly recorded telephone conversation had a union negotiator seeming to threaten a bombing attack on school board members. Two local radio stations played the tape over the air. On Tuesday, the Supreme Court entered the case. The justices heard arguments on the constitutionality of state and federal wiretap laws that held a local activist, a talk show host and the radio stations liable for airing the conversation. Their finding could define limits on telephone privacy and determine when news organizations may broadcast or print private phone conversations. The case involved a cellular telephone conversation in which a teachers' union negotiator said about school board members, ``We're gonna have to go to their homes ... to blow off their front porches.'' The taped conversation was turned over to the radio show host and played on the air. Laws at issue in the Supreme Court case prohibit disclosing contents of telephone calls that are illegally intercepted. Justice Anthony Kennedy said there is ``simply no precedent in the history of this court'' for isolating certain types of speech, regardless of its content, and subjecting it to regulation. He said the laws restricting the use of wiretapped conversations have the effect of ``suppressing speech that is valuable to the public.'' Justice Stephen Breyer retorted that those laws preserve the privacy and dignity of individuals. And Justice Antonin Scalia said knowing that his private conversations could be published ``inhibits my speech.'' The conversation occurred during a labor dispute in Wyoming, Pa., a community between Scranton and Wilkes-Barre. The conversation between Gloria Bartnicki and Anthony Kane Jr. was intercepted and recorded onto a cassette tape by someone whose identity is unknown and who placed it in the mailbox of Jack Yocum, who led a group opposed to the teacher union's wage proposals. Yocum gave a copy of the tape to the talk show host, Frederick Vopper, who played the conversation in its entirety on his show in September 1993. The show was aired by area stations WILK and WGBI. Bartnicki and Kane sued Yocum, Vopper and the radio stations under both the state and federal laws for having used and disclosed the tape of their intercepted phone conversation. In laying out the government's position, U.S. Solicitor General Seth Waxman told the justices the ban was designed to protect ``the ability to speak in an uninhibited and confidential fashion.'' But Thomas Goldstein, who represented Yocum, said, ``No one has shown that this is a serious problem.'' Lower courts have split on the issue. In the Yocum case, the 3rd U.S. Circuit Court of Appeals ruled the federal and Pennsylvania laws unconstitutional. But the U.S. Circuit Court of Appeals for the District of Columbia upheld the federal law in a lawsuit filed by Rep. John Boehner, R-Ohio, against Rep. Jim McDermott, D-Wash. Boehner accused McDermott of disclosing contents of a secretly recorded phone call in which then-House Speaker Newt Gingrich and other House leaders discussed strategy involving the announcement of an ethics finding against Gingrich. Only seven states do not have wiretapping laws, according to the appeals court in the District of Columbia: Arkansas, Mississippi, South Carolina, South Dakota, Virginia, Vermont and Washington. The cases are Bartnicki vs. Vopper, 99-1687, and U.S. vs. Vopper, 99-1728. 2021 From: James M. Atkinson, Comm-Eng Date: Wed Dec 6, 2000 6:32am Subject: It's Time for the 2000 Darwin Award Nominees! It's Time for the 2000 Darwin Award Nominees! Entries in this short list of 2000 Nominees are confirmed by Darwin, and the current score (November 8, 2000) is shown next to each story. Read the full text and cast your vote! Moscow Marauder (4.0/10) A man who threatened to deal with his wife and her lover blew himself up with a home-made bomb in September when the device the man was attaching to the door of their not-so-secret apartment boudoir exploded in his hands. Throwing Stones (4.4/10) A Middle East protestor standing in the road throwing stones at oncoming cars died when a driver tried to swerve away from the stones, but lost control of his car and careened across the road, injuring the driver and killing the assailant. Tired of it All (4.6/10) An experienced thief sneaked onto the lot of the Buckeye Ford Dealership in London, Ohio, intending to steal tires from the new cars. But his expertise failed him when the vehicle he had jacked up slipped and fell, landing squarely on his chest. Perilous Pose (4.6/10) A 53-year-old tourist posing nude for his camera in picturesque Rothemberg, Germany, slipped from the stone wall while preparing for the shot, and fell sixteen feet to his death. Duct Tape (4.7/10) A misplaced faith in the miracle of duct tape led to the demise of a man boating on the Columbia River when his 12-foot aluminum dinghy, held together with duct tape repairs, capsized during a fishing trip. Passionate Plunge (5.0/10) A man with the unlikely ambition to jump off every river bridge in Norwich ended his athletic career with a deadly seventy foot leap into three feet of water in April. Emergency workers were unable to resuscitate the man, who was said to possess "a strange and unusual passion for jumping into rivers." Kiss of Death (5.0/10) A 36-year-old biochemist who attended a farewell performance of the legendary rock band KISS climbed a 7-foot wall to gain a better view of the stage--only to mistake a curtain for a solid wall, and plunge to his death on an escalator 100 feet below. Stoned Sleep (5.5/10) A North Carolina woman who had been smoking marijuana learned a hard lesson about drugs when she decided to sleep on the roof of the King Charles Inn. Sound asleep, she slid off the roof and fell to her death shortly before dawn. When police arrived at the scene, her stoned boyfriend was found still sleeping on the roof. Hornet Challenge (5.8/10) A 53-year-old man with a reputation as a 'strong man' accepted a dare to stand beneath a hornets' nest in Phnom Penh, while two men pelted it with stones. He endured the pain of countless stinging hornets before expiring from the toxic injections. Two Avalanche Alaskan (5.8/10) A 43-year-old Fairbanks man attempting to highmark the mountains in his snowmobile died in an avalanche in Fairbanks Alaska in April. It was the second snowmobile-induced avalanche he had been caught in that day, and he had already been warned by authorities to stop highmarking in the dangerous snow conditions. Baby You Drive Me Crazy (5.9/10) The bodies of a young couple were discovered naked in the wreckage of a freak car accident in Italy in May. Investigators assume that prior to the accident, the couple was having sex in their small Italian vehicle while it raced along windy roads at upwards of 80mph. Running of the Bulls (5.9/10) A Berlin woman attempting to capture a memorable photograph of the Running Bulls in the southern town of Nimes paid for her stupidity with her life on Sunday. The 68-year-old photographer removed a metal safety barricade and strode into the street with her camera to her eye, where she was trampled by a horse and six rampaging bulls. Rappin' on Heaven's Door (6.1/10) Artists sometimes bleed for their work, but usually not literally. A gangster-rap video artist changed all that when he put a gun to his head and shot himself through the temple while the cameras rolled, accidentally putting an end to his creative efforts. Out With a Bang! (6.2/10) Heating air in a sealed container such as a truck tire causes the gas to expand and the pressure to increase. A mechanic at a tire store in Georgia learned this lesson in physics the hard way when an inflated tire he and was welding exploded, spewing shrapnel and killing him instantly. William Tell Overture (6.3/10) A Kentucky man died after he and his friend decided to reenact the William Tell scene where the famous archer is forced to shoot an apple off his son's head. They used a beer can instead of an apple, and their aim was not as accurate as the legendary archer. Human Hitching Post (6.3/10) A 29-year-old woman was killed in Nevada when she attempted to quell the temper of her spirited Arabian horse by tying herself to its head. The excitable animal spooked and dragged her around the paddock, trampling her beneath its hooves. Shocking Fall (6.8/10) 26-year-old man earned a place in history as the first person to die celebrating the millennium. Minutes before midnight, the Stanford graduate climbed to the top of a street light in front of the Paris Las Vegas Hotel and waved to the enthusiastic revelers below. At midnight he slipped and, in an effort to break his fall, grabbed the electric wires and found himself conducting more than a cheering crowd. Do It Yourself, Do Yourself In (6.8/10) A 34-year-old Colorado contractor wired his garden fence with household current in an attempt to keep his dog confined to the yard. He electrocuted himself when he inadvertently brushed the fence while reaching for a ripe tomato. Fireworks Fiasco (7.1/10) People routinely lose fingers and eyes in fireworks explosions during America's Independence Day celebration, and the bigger the fireworks, the greater the damage. A 34-year-old man suffered partial decapitation when he peered into the mouth of a launching tube containing what he incorrectly assumed was a malfunctioning aerial firework. It exploded, producing a spectacular grand finale for both his head and the party. Human Popsicle (7.3/10) Ohio police located the body of a missing truck driver in January after his employer reported him missing in action. The man was found frozen head down among the broccoli pallets, where he had apparently slipped while trying to retrieve a hidden stash of cocaine, The Daily Grind (7.7/10) The owner of a chipping company in Maine was rent asunder by his own wood chipper when he stumbled into the intake while trying to break up a bark jam without first disconnecting the power. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= [Non-text portions of this message have been removed] 2022 From: James M. Atkinson, Comm-Eng Date: Wed Dec 6, 2000 8:45am Subject: Mafia trial will test FBI spying tactics Mafia trial will test FBI spying tactics http://www.theregister.co.uk/content/4/15268.html By: John Leyden Posted: 06/12/2000 at 12:53 GMT A trial of an alleged mafia boss will test whether the FBI surveillance teams are entitled to plant keystroke-logging devices on the computers of suspects. Nicodemo S. Scarfo Jr., 35, the son of the jailed former boss of the Philadelphia mob, faces charges of masterminding a mob-linked bookmaking and loansharking operation. A key aspect of prosecution evidence was obtained by FBI agents who rigged his computer in order to be able to monitor every keystroke. This was necessary because conventional surveillance on Scarfo, who used to work for a Florida software firm and is considered something of a geek, was frustrated by his use of the encryption program PGP (Pretty Good Privacy). According to US reports, Scarfo's lawyers will challenge the admissibility of this evidence in a move that will make him the first defendant to challenge covert computer surveillance by the FBI. In a pre-trial motion defence lawyers for Scarfo argued that federal investigators misused a search warrant to install a bugging device on Scarfo's business PC. Monitoring the keystrokes entered into the machine allowed investigators to find out the password Scarfo used to access an encrypted program which, it was suspected, he was using to store gambling and loan-sharking records. Civil liberties activists argue that the widespread use of the techniques used against Scarfo extend current wiretap laws and would be open to abuses that violate privacy. "Anything he typed on that keyboard - a letter to his lawyer, personal or medical records, legitimate business records - they got it all," said Donald Manno, Scarfo's lawyer told The Philadelphia Inquirer. "That's scary. It's dangerous," he said. The use of keystroke-logging devices in the Scarfo case was revealed by The Philadelphia Inquirer. However it is not known whether software loaded onto a computer, an attachment linked to the keyboard part of a PC or a 'bug' inside the keyboard was used in the case. The most sophisticated, and least likely to be discovered, of these techniques is the bug. The case throws up the issue of whether technology is evolving faster than laws regulating the privacy and individuals. It also highlights potential gaps in the capability of the Federal government's controversial Carnivore e-mail monitoring techniques to effectively obtain information from the very types of people it is designed to monitor. Scarfo faces trial early next year on charges he ran an illegal gambling business that took in more than $2,000 a day and that he used extortion to collect loans. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 2023 From: Marty Kaiser Date: Tue Dec 5, 2000 1:42am Subject: Re: Countermeasures Equipment We manufacture electronic countermeasure equipment. Go to http://www.martykaiser.com to view our product line. ISA and REI are our competitors. Marty ----- Original Message ----- From: To: Sent: Monday, December 04, 2000 7:51 PM Subject: [TSCM-L] Countermeasures Equipment > Our Organization is at the present time integrating a turnkey project for the Government of Mexico. > > If your company is related to the manufacture of Countermeasures Equipment, please let us know. > > Also, has anyone on the list the URL or web site address for the following companies: > > Information Security Associates > Research Electronics > > > Thanks for your help. > > > M. Gleich > Technical Manager > Worldwide Intelligence & Security, Inc. > 14001 Dallas Parkway > Suite 1200 > Dallas, Texas 75240 > > e-mail:technicalmgr@w... > > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2024 From: Creager, Jerry Date: Tue Dec 5, 2000 10:04am Subject: RE: Countermeasures Equipment I have been able to locate the URL for ISA, however, I am not familiar with Research Electronics and am unable to locate any information about the company at this time. Information Security Associates 350 Fairfield Avenue Stamford, CT 06902-0720 203 357 8051 www.isa-tscm.com Gerald L. Creager TSCM Specialist Advance Security, Inc. Sandia National Laboratory, California -----Original Message----- From: technicalmgr@w... [mailto:technicalmgr@w...] Sent: December 04, 2000 11:51 AM To: TSCM-L@egroups.com Subject: [TSCM-L] Countermeasures Equipment Our Organization is at the present time integrating a turnkey project for the Government of Mexico. If your company is related to the manufacture of Countermeasures Equipment, please let us know. Also, has anyone on the list the URL or web site address for the following companies: Information Security Associates Research Electronics Thanks for your help. M. Gleich Technical Manager Worldwide Intelligence & Security, Inc. 14001 Dallas Parkway Suite 1200 Dallas, Texas 75240 e-mail:technicalmgr@w... [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2025 From: David Alexander Date: Wed Dec 6, 2000 5:24am Subject: techno-bagpipe music A while ago on this list someone mentioned techno-bagpipe music as the bets thing to use when spotting bugs. I really would like to get a sample of this as it really has my curiosity fired up. If anyone has a wav sample they could send me I (and the guys in the office) would be eternally grateful. TIA David Alexander Project Manager & Information Security Consultant Qualified BS7799 Lead Auditor Triskele Ltd. Office 01491 833280 Mobile 0780 308 3130 [Non-text portions of this message have been removed] 2026 From: Date: Wed Dec 6, 2000 8:43am Subject: NYTimes.com Article: Mexico Plans to Unravel Illegal Web of Wiretaps This article from NYTimes.com has been sent to you by Chris Childs childschris@h.... TSCM-L Thought you folks might find this interesting Chris Childs childschris@h... /-------------------- advertisement -----------------------\ LOOKING FOR A TRULY HIGH-SPEED INTERNET EXPERIENCE? Then visit Alcatel.com and see what makes us the world's leading supplier of DSL solutions. Alcatel, world leader in DSL solutions. http://www.nytimes.com/ads/email/alcatel/index.html \----------------------------------------------------------/ Mexico Plans to Unravel Illegal Web of Wiretaps http://www.nytimes.com/2000/12/06/world/06MEXI.html December 6, 2000 By TIM WEINER MEXICO CITY, Dec. 5 President Vicente Fox's newly appointed national security chief said today that he would try to unravel a rat's nest of illegal government wiretaps that politicians and the police had used "not to fight crime, but to fight criticism." Adolfo Aguilar Zinser, the head of Mexico's new national security council, said government spying, especially electronic surveillance, had become "an institution used partly to intimidate opposition leaders, political parties, newspaper editors, newspaper reporters, union leaders people the government considered enemies." Mr. Fox, the first opposition leader to wrest control of the presidency from Mexico's Institutional Revolutionary Party since 1929, signaled his intent to stop illegal government surveillance in his inaugural speech on Friday. "A government that spies on people to find out what they are thinking is a government that isn't listening to them," he said. "My government will not continue to implement these practices: never again will repression be the way to resolve political differences." Two years ago, when his campaign for the presidency was barely under way, Mr. Fox discovered that his telephones were tapped. Two months ago, during the presidential transition, a respected Mexico City newspaper, El Universal, published transcripts of Mr. Fox's private telephone conversations that it said had come from within the government. The government denied spying on the president-elect. Its protestations were widely scorned. Mr. Zinser, a politically independent senator before joining Mr. Fox's cabinet, said the government would reserve the power to seek court-authorized wiretaps against organized crime, drug traffickers and genuine national security threats. But he said the use of domestic spying as a political tool was over. He said the new government still did not know the extent of the wiretapping network it inherited. "I cannot tell you yet, as the government official in charge of dismantling this network, how big it is," he said. But he said it was clear that "intelligence, as it was used by the state, was mainly a mechanism for spying on its own people, spying on its own bureaucracy." On paper, the only government agency with the power to spy is the Center for Information on National Security, an arm of the Interior Ministry that was created in 1989. But Mr. Zinser said clandestine domestic spy networks that were started years earlier under the center's predecessor, the Federal Directorate of National Security, had multiplied beyond anyone's ability to keep track of them. Many politicians and human rights activists say the federal attorney general's office, the military and dozens of state and federal police agencies are among the departments engaged in spying. One consequence is that government wiretappers take bribes to tip off criminals with useful information. "Today we don't know how many agencies, how many people, are spying," Mr. Zinser said. "We are being tapped and watched in intelligence, counterintelligence and counter- counterintelligence operations, with everybody spying on everybody else." Plenty of evidence supports that. Many illegal government bugs have been discovered in recent years, usually by accident. Bugging equipment has been found in the walls of Mexico's national human rights commission, several state supreme court chambers and the offices of many opposition politicians notably, in 1998, the office of Santiago Creel Miranda, then a legislator allied with Mr. Fox, and as of Friday the new interior minister. That same year, alerted by an anonymous note, Senator Layda Sansores Sanroman uncovered a government wiretapping center in the southern city of Campeche. It held a tangle of wiretapping technology, financial records detailing the purchase of $1.2 million in surveillance equipment from Israel and thousands of pages of transcripts dating back to 1991, detailing the personal lives of many prominent citizens including Senator Sansores. "That's what I have to dismantle everything that's illegal," Mr. Zinser said today. "It's going to be a big fight." That fight will take place in Congress, where the politicians of the Institutional Revolutionary Party hold a plurality. Legislation restructuring the national security system will be submitted to Congress before the first 100 days of Mr. Fox's administration are through, he said. "We do not want to deprive the country of intelligence to fight organized crime, drug trafficking and to protect national security," Mr. Zinser said. "But we will cease thinking of our political opponents as a national security problem." The New York Times on the Web http://www.nytimes.com /-----------------------------------------------------------------\ Visit NYTimes.com for complete access to the most authoritative news coverage on the Web, updated throughout the day. Become a member today! It's free! http://www.nytimes.com?eta \-----------------------------------------------------------------/ HOW TO ADVERTISE --------------------------------- For information on advertising in e-mail newsletters or other creative advertising opportunities with The New York Times on the Web, please contact Alyson Racer at alyson@n... or visit our online media kit at http://www.nytimes.com/adinfo For general information about NYTimes.com, write to help@n.... Copyright 2000 The New York Times Company 2027 From: Date: Wed Dec 6, 2000 4:05am Subject: Re: techno-bagpipe music In a message dated 12/6/00 7:02:18 AM Pacific Standard Time, dalexander@t... writes: << If anyone has a wav sample they could send me I (and the guys in the office) would be eternally grateful. >> Me, as well. 2028 From: Steve Uhrig Date: Wed Dec 6, 2000 9:15am Subject: Used surveillance and TSCM equip FS Hello list entities, We have updated our list of used surveillance, countersurveillance, communications and miscellaneous electronics for sale page. http://www.swssec.com/used.html Just updated last night so youse guys get first crack. We take credit cards for payment. I also buy used, surplus or unneeded equipment of these types. Email me with anything you have to sell. I also collect, buy and sell Minox submini cameras. That page was updated also, including a new section on how to pick the best model for you. Anyone from this list buying anything will get something extra with their order. http://www.swssec.com/minox.html If interested, you can sign up on the bottom of the pages to get an automatic email message whenever the pages are updated. Regards .. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2029 From: James M. Atkinson, Comm-Eng Date: Wed Dec 6, 2000 9:16am Subject: RE: Countermeasures Equipment Gerald, If you need any assistance with REI product please give me a call. I have personally used their equipment for years, own several OSCOR's and CPM's of my own, have been formally trained by them on their products, have taught their products to others, developed my own courseware, etc... I can normally be reached in the office from 7:30 AM until at least 5:30 PM EST at (978) 381-9111. -jma At 9:04 AM -0700 12/5/00, Creager, Jerry wrote: >I have been able to locate the URL for ISA, however, I am not familiar with >Research Electronics and am unable to locate any information about the >company at this time. > >Information Security Associates >350 Fairfield Avenue >Stamford, CT 06902-0720 203 357 8051 >www.isa-tscm.com > >Gerald L. Creager >TSCM Specialist >Advance Security, Inc. >Sandia National Laboratory, California > > > >-----Original Message----- >From: technicalmgr@w... >[mailto:technicalmgr@w...] >Sent: December 04, 2000 11:51 AM >To: TSCM-L@egroups.com >Subject: [TSCM-L] Countermeasures Equipment > > >Our Organization is at the present time integrating a turnkey project for >the Government of Mexico. > >If your company is related to the manufacture of Countermeasures Equipment, >please let us know. > >Also, has anyone on the list the URL or web site address for the following >companies: > >Information Security Associates >Research Electronics > > >Thanks for your help. > > >M. Gleich >Technical Manager >Worldwide Intelligence & Security, Inc. >14001 Dallas Parkway >Suite 1200 >Dallas, Texas 75240 > >e-mail:technicalmgr@w... > > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Do not try the patience of Wizards, for they are subtle and quick to anger. ======================================================================= 2030 From: Steve Uhrig Date: Wed Dec 6, 2000 9:27am Subject: Re: Mexico Plans to Unravel Illegal Web of Wiretaps Once upon a midnight dreary, childschris@h... pondered, weak and weary: > This article from NYTimes.com > Two years ago, when his campaign for the presidency was > barely under way, Mr. Fox discovered that his telephones were > tapped. Two months ago, during the presidential transition, a > respected Mexico City newspaper, El Universal, published > transcripts of Mr. Fox's private telephone conversations that > it said had come from within the government. This says it all. Having been a victim, the new regime is totally against the use of electronic surveillance. Properly applied, it is a potent defense against narcotrafficking, smuggling, kidnapping and all sorts of crimes against the people. I believe this new government is overreacting and does not have the experience to make decisions of this sort. A lot of people newly in power are starry eyed in the beginning. And, as the Mexican government was my second largest customer for surveillance platforms, this really impacts my business! I expect this new attitude to quietly wind down as the cold hard light of day settles in, and the new government realizes that intelligence is a necessary tool in fighting the bad guys. Idealism sounds great but generally is ineffective in the long run, as history has proven time and again. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2031 From: Date: Wed Dec 6, 2000 5:52am Subject: Re: techno-bagpipe music In a message dated 12/6/00 8:09:28 a US Mountain Standard Time, MACCFound@a... writes: > In a message dated 12/6/00 7:02:18 AM Pacific Standard Time, > dalexander@t... writes: > > << If anyone has a wav sample they > could send me I (and the guys in the office) would be eternally grateful. > > > > > Me, as well. > Me too =) 2032 From: James M. Atkinson, Comm-Eng Date: Wed Dec 6, 2000 3:08pm Subject: FBI Hacks Alleged Mobster FBI Hacks Alleged Mobster http://www.wired.com/news/politics/0,1283,40541,00.html by Declan McCullagh 2:00 a.m. Dec. 6, 2000 PST WASHINGTON -- Nicodemo S. Scarfo, the son of Philadelphia's former mob boss, was almost paranoid enough. Scarfo, who has been charged with masterminding a mob-linked loan sharking operation in New Jersey, reportedly used the popular PGP encryption software to shield his computer's secrets from prying eyes. But when the feds learned of Scarfo's security measures, they decided to do something that would bypass even the best encryption software: FBI agents sneaked into Scarfo's office in Belleville, New Jersey, on May 10, 1999, and installed a keyboard-sniffing device to record his password when he typed it in. A seven-page court order authorized the FBI and cooperating local police to break into Scarfo's first-floor "Merchant Services of Essex County" office as many times as necessary to deploy, maintain, and then remove "recovery methods which will capture the necessary key-related information and encrypted files." The case, which is awaiting trial, appears to be the first in which the U.S. government used such aggressive surveillance techniques during an investigation, and some legal observers say the FBI's breaking-and-entering procedures go too far. "I don't think it's constitutional," says David Sobel, general counsel of the Electronic Privacy Information Center in Washington, D.C. "This case has the potential to establish some very important precedents on this issue." Scarfo's prosecution comes at a time when the FBI's Carnivore surveillance system is under increasingly heavy fire from privacy groups, and the use of data-scrambling encryption products appears to be growing. Last week, for instance, news leaked out about Yahoo's encrypted Web-based e-mail service it introduced through a deal with Zixit, a Dallas firm. Scarfo has been charged with supervising "an illegal gambling business" in violation of state and federal law and using extortionate loan shark tactics, according to a three-count indictment filed in federal court in June 2000. He has pleaded not guilty. "There's nothing that we can talk about or are at liberty to talk about in the case," says Michael Drewniak, a spokesman for the U.S. Attorney's office for the District of New Jersey. Drewniak would not comment on the use of encryption, saying "we do not discuss evidence." The elder Scarfo, who once ran the Philadelphia mob that also dominated the Atlantic City gambling racket, was imprisoned in 1991 on racketeering charges. The spring 1999 investigation of the younger Scarfo, who is 35 years old, may be what prompted the Clinton administration to recommend changing federal law to allow police to conduct electronic "black bag" jobs. The idea first publicly surfaced in mid-1999, when the Justice Department proposed legislation that would let police obtain surreptitious warrants and "postpone" notifying the person whose property they entered for 30 days. After vocal objections from civil liberties groups, the administration backed away from the controversial bill. In the final draft of the Cyberspace Electronic Security Act submitted to Congress, the secret-search portions had disappeared. In January 2000, the Clinton administration seemed to change its mind. "When criminals like drug dealers and terrorists use encryption to conceal their communications, law enforcement must be able to respond in a manner that will not thwart an investigation or tip off a suspect," Attorney General Janet Reno and Deputy Defense Secretary John Hamre wrote in a seven-page letter to Congress. That letter, however, suggested the feds didn't need a new law -- and would instead rely on "general authorities" when asking judges to authorize black bag jobs. A related "secret search" proposal resurfaced in May 2000 in a Senate bankruptcy bill. In the Scarfo case, the FBI in May 1999 asked for "authority to search for and seize encryption-key-related pass phrases" from his computer as well as "install and leave behind software, firmware, and/or hardware equipment which will monitor the inputted data entered on Nicodemo S. Scarfo's computer by recording the key related information as they (sic) are entered." Although the government has refused to release details, this appears to indicate the FBI was using either a hardware device -- inserted into the keyboard or attached to the keyboard cable -- or a software program that would quietly run in the background and record keystrokes. With the PGP private key and Scarfo's secret password, the government could then view whatever documents or files he had encrypted and stored on his computer. Ruling that "normal investigative procedures to decrypt the codes and keys necessary to decipher the 'factors' encrypted computer file have been tried and have failed," U.S. Magistrate Judge G. Donald Haneke granted the FBI's request. EPIC's Sobel suggested that Haneke did not, under federal law, have the authority to grant such an order. "The interesting issue is that they in those (court) documents specifically disclaim any reliance on the wiretap statute," Sobel says. "If they're on record saying this isn't communications -- and it isn't -- then that extraordinary authority they have under the wiretap laws does not apply." "If we're now talking about expanding (black bag jobs) to every case in which the government has an interest where the subject is using a computer and encryption, the number of break-ins is going to skyrocket," Sobel said. "Break-ins are going to become commonplace." Eugene Volokh, a law professor at UCLA, said he believed the government could successfully argue the break-in was constitutional. "There's nothing in the Constitution that prohibits this kind of anticipatory search," says Volokh. "In many respects it's no different from a wiretap." A lawyer for Scarfo told the Philadelphia Inquirer that he would file a motion challenging the legality of the FBI's black bag job. "Anything he typed on that keyboard -- a letter to his lawyer, personal or medical records, legitimate business records -- they got it all," attorney Donald Manno told the paper. Manno could not be reached for comment on Tuesday. Scarfo, who is out on bail, was scheduled to appear in court Tuesday for a hearing before U.S. District Judge Nicholas Politan. The purpose of the hearing was to appoint a new attorney -- Manno has represented a client who may testify for the government against Scarfo. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= It is by caffeine alone I set my mind in motion. It is by the Juice of StarBucks that the thoughts acquire speed, The hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. ======================================================================= 2033 From: Chris Childs Date: Wed Dec 6, 2000 9:34am Subject: Re: Re: Mexico Plans to Unravel Illegal Web of Wiretaps Fox's government is just reacting to abuses in the past, all governments do the same thing the world over. Once elected, they react by completely dismantling projects started by their predecessors. Often, I would say most times, governments usually end up starting projects that are far more complicated than existed before. Because of the nature of Fox's victory, he has a "political" obligation but within certainly the next year the reality will set in. Cheers Chris >From: "Steve Uhrig" >Reply-To: TSCM-L@egroups.com >To: TSCM-L@egroups.com >Subject: [TSCM-L] Re: Mexico Plans to Unravel Illegal Web of Wiretaps >Date: Wed, 6 Dec 2000 10:27:34 -0500 >MIME-Version: 1.0 >Received: from [64.211.240.229] by hotmail.com (3.2) with ESMTP id >MHotMailBBF7A5ED00BCD820F3E540D3F0E5568A86; Wed Dec 06 07:28:11 2000 >Received: from [10.1.4.53] by ef.egroups.com with NNFMP; 06 Dec 2000 >15:27:55 -0000 >Received: (EGP: mail-6_3_1_3); 6 Dec 2000 15:27:44 -0000 >Received: (qmail 56849 invoked from network); 6 Dec 2000 15:27:44 -0000 >Received: from unknown (10.1.10.26) by l7.egroups.com with QMQP; 6 Dec 2000 >15:27:44 -0000 >Received: from unknown (HELO prserv.net) (32.97.166.34) by mta1 with SMTP; >6 Dec 2000 15:27:44 -0000 >Received: from steve-laptop ([32.102.22.20]) by prserv.net (out4) with >ESMTP id <2000120615274120404vie4fe>; Wed, 6 Dec 2000 15:27:42 +0000 >From sentto-49964-2493-976116465-childschris Wed Dec 06 07:30:00 2000 >X-eGroups-Return: >sentto-49964-2493-976116465-childschris=hotmail.com@returns.onelist.com >X-Sender: Steve@s... >X-Apparently-To: TSCM-L@egroups.com >Organization: SWS Security >Message-ID: <3A2E1496.9391.77EC8EE@localhost> >Priority: normal >In-reply-to: <20001206144353.7213458A5F@e...> >X-mailer: Pegasus Mail for Win32 (v3.12c) >Mailing-List: list TSCM-L@egroups.com; contact TSCM-L-owner@egroups.com >Delivered-To: mailing list TSCM-L@egroups.com >Precedence: bulk >List-Unsubscribe: > >Once upon a midnight dreary, childschris@h... pondered, weak and >weary: > > > This article from NYTimes.com > > > Two years ago, when his campaign for the presidency was > > barely under way, Mr. Fox discovered that his telephones were > > tapped. Two months ago, during the presidential transition, a > > respected Mexico City newspaper, El Universal, published > > transcripts of Mr. Fox's private telephone conversations that > > it said had come from within the government. > >This says it all. > >Having been a victim, the new regime is totally against the use >of electronic surveillance. > >Properly applied, it is a potent defense against >narcotrafficking, smuggling, kidnapping and all sorts of crimes >against the people. > >I believe this new government is overreacting and does not have >the experience to make decisions of this sort. A lot of people >newly in power are starry eyed in the beginning. > >And, as the Mexican government was my second largest customer >for surveillance platforms, this really impacts my business! > >I expect this new attitude to quietly wind down as the cold hard >light of day settles in, and the new government realizes that >intelligence is a necessary tool in fighting the bad guys. >Idealism sounds great but generally is ineffective in the long >run, as history has proven time and again. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* _____________________________________________________________________________________ Get more from the Web. FREE MSN Explorer download : http://explorer.msn.com 2034 From: Mike Date: Wed Dec 6, 2000 2:45pm Subject: Re: techno-bagpipe music I mentioned bagpipe music could be used as backround noise on a window pane to counter laser surveillance. I heard this years ago from an ole pro - Jim Carter. Nuff Said- Bootleg ----- Original Message ----- From: David Alexander To: 'Technical security mailing list' Sent: Wednesday, December 06, 2000 3:24 AM Subject: [TSCM-L] techno-bagpipe music > A while ago on this list someone mentioned techno-bagpipe music as the bets > thing to use when spotting bugs. I really would like to get a sample of this > as it really has my curiosity fired up. If anyone has a wav sample they > could send me I (and the guys in the office) would be eternally grateful. > > TIA > > David Alexander > Project Manager & Information Security Consultant > Qualified BS7799 Lead Auditor > Triskele Ltd. > > Office 01491 833280 > Mobile 0780 308 3130 > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2035 From: Andre Holmes <1ach@g...> Date: Wed Dec 6, 2000 3:50pm Subject: Re: Re: Need some computer help Hello ML I need some type of report writing procedures that can be giving to the client. Do you sell such material ! Thanks for your time Andre ----- Original Message ----- From: To: Sent: Sunday, December 03, 2000 12:38 AM Subject: [TSCM-L] Re: Need some computer help > How can a message "bounce back" to you if you never sent it? > If it happens again, save the header which may reveal something. > A packet sniffer such as CommView will record all outgoing data which > can be analyzed to see if you are somehow sending something you > weren't aware of. > There are other things to consider, maybe a few other tricks if you > save the message and header. > > M L Shannon > > > > > > --- In TSCM-L@egroups.com, "Gerard P. Keenan" wrote: > > Sorry for the cross-postings, but I need some help with > something that has me rather confused. > > > > I maintain a regulated, restricted mailing list on anti/counter > terrorism with 45 subscribers in 7 countries. Most of the subscribers > are with government agencies in 3 countries, are heads of major > international corporations' security departments, or are with large > private security firms. > > > > Only 5 of these 45 subscribers use AOL as their server. > > > > Now my question is this. For the past couple of weeks I've been > getting "bounced-back" or returned mail from aol addresses. Not too > unusual; except for the fact that the three addresses that keep > getting kicked back to me don't exist anywhere in my address book -- > either as individual addresses or as members of the list. > > > > I've already cleared out my delete box, but just got one of those > bounced back to me yet again. Here's the address -- frankwe911@a... I > have no idea who this is, where it is, or anything else about it. It > does not exist on my list, nor anywhere else in my address book. > > > > I can't remember the other two. > > > > I was wondering if any of you computer gurus out there might have a > theory about this. Is this just some kind of glitch at AOL (this is > the only server that this happens with -- no other emails are returned > from any other server)? Or is it something that I should be concerned > about? > > > > Thanks for any assistance. > > > > Jerry Keenan > > > > GPKeenan Co., Int'l Security Services > > West Islip, NY 11795 > > > > > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2036 From: Thomas H. Jones Date: Wed Dec 6, 2000 5:03pm Subject: RE: REI equipment Info. For information regarding REI equipment, Please visit "www.research-electronics.com" or contact us directly at: Research Electronics International 515 South Old Kentucky Rd. Cookeville, TN 38501 voice: 931 528 5756 fax: 931 528 7854 or E-mail sales@r... 2037 From: Date: Wed Dec 6, 2000 8:38pm Subject: 2 questions, Encryption & who's signature could this be? Does anyone in the group have any further info on how the FBI is penetrating encrypted devices. What technology are they using etc? One other question for the group. A client called me last week. He bought a new model home in western Minnesota. His expertise is plumbing and heating. He doesn't know why he did it, other than curiosity, but just before he closed on the house he inspected the fan in the master bath. He said "Its probably force of habit because I'm in the business of installing this stuff". After closing on the house, the next day he went back into that bath and discovered that the fan had been changed. He found a few ceiling particles on the floor so he went to investigate. He is asking me if its possible to install a camera inside of the fan housing. I am asking the group if you might know, who goes to the trouble of this kind of installation? Is this a trademark or signature, if you will, of a particular agency? This is of course assuming the guy is right and there is a camera up there. I don't want to travel 3hrs and waste this guys money if I don't have to. What do you think? Dan McGraw 2038 From: Charles@t... Date: Wed Dec 6, 2000 6:36pm Subject: Re: 2 questions, Encryption & who's signature could this be? You can install a camera in just about anything. A fan housing would be no problem. No need for a signature, leave those for the movies. If this guy is really in plumbing and heating, then he would be a good person to perform an inspection of the suspect fan. If there's anything in it that doesn't look like it should be there, then he can call you and hire you to check it out further. Charles ----- Original Message ----- From: To: Sent: Wednesday, December 06, 2000 9:38 PM Subject: [TSCM-L] 2 questions, Encryption & who's signature could this be? > Does anyone in the group have any further info on how the FBI is > penetrating encrypted devices. What technology are they using etc? > One other question for the group. A client called me last week. He > bought a new model home in western Minnesota. His expertise is > plumbing and heating. He doesn't know why he did it, other than > curiosity, but just before he closed on the house he inspected the > fan in the master bath. He said "Its probably force of habit because > I'm in the business of installing this stuff". After closing on the > house, the next day he went back into that bath and discovered that > the fan had been changed. He found a few ceiling particles on the > floor so he went to investigate. He is asking me if its possible to > install a camera inside of the fan housing. > I am asking the group if you might know, who goes to the trouble of > this kind of installation? Is this a trademark or signature, if you > will, of a particular agency? This is of course assuming the guy is > right and there is a camera up there. > I don't want to travel 3hrs and waste this guys money if I don't have > to. > What do you think? > Dan McGraw > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > 2039 From: Ed Naylor Date: Wed Dec 6, 2000 10:43pm Subject: Re: 2 questions, Encryption & who's signature could this be? >I am asking the group if you might know, who goes to the trouble of >this kind of installation? Is this a trademark or signature, if you >will, of a particular agency? This is of course assuming the guy is >right and there is a camera up there. >I don't want to travel 3hrs and waste this guys money if I don't have >to. >What do you think? >Dan McGraw ============================= Dan, I cannot think of a legitimate criminal reason for any federal agency to put a camera in a bathroom. It would be a defense lawyer's dream and a potential massive embarrassment to a professional agency. Ed 2040 From: James M. Atkinson, Comm-Eng Date: Wed Dec 6, 2000 10:52pm Subject: Another Fish Story Having arrived at the edge of the river, the fisherman soon realized he had forgotten to bring any bait. Just then he happened to see a little snake passing by who had caught a worm. The fisherman snatched up the snake and robbed him of his worm. Feeling sorry for the little snake with no lunch, he snatched him up again and poured a little beer down his throat and went about his fishing. An hour or so later the fisherman felt a tug at his pant leg. Looking down, he saw the same snake.... with three more worms. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= It is by caffeine alone I set my mind in motion. It is by the Juice of StarBucks that the thoughts acquire speed, The hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. ======================================================================= [Non-text portions of this message have been removed] 2041 From: James M. Atkinson, Comm-Eng Date: Fri Dec 8, 2000 7:42pm Subject: Soundless videotaping not a recording under wiretap statute Soundless videotaping not a recording under wiretap statute http://www.rcfp.org/news/2000/1128drenna.html A state appeals court overturned a conviction by emphasizing the wiretapping statute prohibits recording the contents of audible or symbol-based communications. The still, soundless images taken by a hidden video camera did not constitute recording of a confidential communication, a California appellate court unanimously ruled on Nov. 27. The decision reversed the conviction of a school superintendent. Craig Boyd Drennan, the superintendent of the Modoc Unified School District, was convicted of violating the state eavesdropping statute when he instructed a maintenance worker to have a video camera installed in a smoke detector in the office of a high school principal. The video camera recorded a still image every three seconds, without sound, of the area around the principal's desk, computer, file cabinet, credenza and bookcase. Drennan, who did not inform the principal of the camera, said he used the taping from December 1998 to March 1999 to determine if someone was breaking in to the office. A jury convicted Drennan of violating section 632(a) of the state penal code, which prohibits the recording of confidential communications. Drennan received a three-year felony probation sentence on the condition he first serve 10 days in the county jail and pay $7,010 in fines. The Third District Court of Appeals in Sacramento ruled that the statute does not establish a general privacy right. The statute specifically prohibits recording of confidential communications. The court held that the legislative intent of "communications" was clear: it was meant "to protect only sound-based or symbol-based communications." The court supported its view of the statute's meaning by gleaning the legislative history. "These documents confirm what the language of section 632 states, that the Legislature intended to prohibit the recording of oral or telegraphic communications between two or more persons, not the photographing of two or more people carrying on a conversation," the court wrote. "Such a video recording does not capture the communication itself, only evidence that a communication has occurred." The court suggested prosecutors could have charged Drennan with violating section 647(k), which prohibits invasions of personal privacy by visual enhancements such as cameras. (California v. Drennan) -- DB -------------- © 2000 The Reporters Committee for Freedom of the Press ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= It is by caffeine alone I set my mind in motion. It is by the Juice of StarBucks that the thoughts acquire speed, The hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. ======================================================================= From: A Grudko Date: Sat Dec 4, 2004 1:52pm Subject: RE: Re:RFID -Original Message- From: Agent Geiger [mailto:agentgeiger@y...] > Are the plastic/metal threads in money RFID's as well? I heard that they are. Of course they are. I heard from a reliable source that someone's brother helped design the threads in a TOP SECRET joint venture with the USGov, SA Gov. and Israel in a secret project headed by Henry Kissinger in Alberton for the CFR in the 80's, called "The Oppenheimer Thread Project" (Where do the bad guys think up these clever evil names?). I'd love to continue this thread (forgive the pun) but I can hear there's a great band playing at the boat club so I'm going to wonder over there to scan the Southern Comfort bottles for RFIDs. Andy G Afrika --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.802 / Virus Database: 545 - Release Date: 2004/11/26 10317 From: Agent Geiger Date: Sat Dec 4, 2004 3:30pm Subject: RE: RFID-Jammer ? Wal-mart and several others are demanding that ALL their suppliers eventually use this technology. --- kondrak wrote: > Wall-Mart's is like the military's so far as Im > told, its pallet tagging > only now. Vendors that tag items individually we > simply put on a do-not-buy > list like Gillette and whoever else foists this, > thus the great importance > of detecting the tags so retribution can be swift. > > > At 11:43 12/4/2004, you wrote: > > >I would seriously consider this. Walmart rolls > theirs > >out in January. > > > >--- kondrak wrote: > > > > > You know, that's a product I can get > behind....let > > > me see what I can get as > > > far as what's being done now...since I know the > > > sequential reader thing is > > > passive, it shouldn't be too hard...after all > its > > > part 90 stuff, and they > > > MUST take all interference available. > > > We need to stomp this thing out now...as its > obvious > > > its an enabling tool > > > for the JBT. Making its deployment as difficult, > and > > > as costly as possible > > > should be a good start...they want it to be a 5c > > > tool, we need to run up > > > their deployment costs...to millions if possible > and > > > with as much > > > UN-reliability as possible....corporate shills > will > > > balk when deployment > > > costs skyrockets. > > > Next, active measures, like depositing > "confusers" > > > near readers should be > > > employed, and the development of a detection and > > > destruction tool needs to > > > be a high priority...salting the Chinese > prison-mart > > > would be a good > > > start...drop a confuser in wall cracks, near > > > checkouts..etc.etc. make their > > > readings as unreliable as possible. > > > > > > A detection and destruction tool is of high > > > priority, if we can come up > > > with one for say $50, we will be wealthy. Then > we do > > > an infomercial for it, > > > and flood paranoid Amerika with it, and they buy > buy > > > buy...it'll be the > > > next teflon pan/ginu knife set. > > > > > > > > > > > > > > > At 18:59 12/2/2004, you wrote: > > > > > > >Hence, I need someone to help me build a > > > RFID-jammer > > > >product line. :) > > > > > > > > > > > >--- kondrak wrote: > > > > > > > > > just imagine the ramifications of when they > > > install > > > > > sensors at toll booths > > > > > and track the ones in your tires (Michilin > > > recently > > > > > started embedding them). > > > > > Just like easy-pass,, it will be whored by > some > > > > > jackbooted thugs. > > > > > > > > > > At 16:06 12/2/2004, you wrote: > > > > > > > > > > >For now, retail outlets; to manage supply > chain > > > > > >logistics and to monitor/influence buyer > > > behavior. > > > > > > > > > > > > > > > > > > > > > > > >--- A Grudko wrote: > > > > > > > > > > > > > > > > > > > > -----Original Message----- > > > > > > > From: Agent Geiger > > > > > [mailto:agentgeiger@y...] > > > > > > > > > > > > > > > RFID's do not shut off. Thus, > everytime > > > you > > > > > go > > > > > > > anywhere with an RFID on your person, > your > > > > > moved > > > > > > > are > > > > > > > being recorded and your privacy > breached. > > > > > > > > > > > > > > By who? > > > > > > > > > > > > > > Why? > > > > > > > > > > > > > > > > > > > > > --- > > > > > > > Outgoing mail is certified Virus Free. > > > > > > > Checked by AVG anti-virus system > > > > > > > (http://www.grisoft.com). > > > > > > > Version: 6.0.802 / Virus Database: 545 - > > > Release > > > > > > > Date: 2004/11/26 > > > > > > > > > > > > > > > > > > > > > [Non-text portions of this message have > been > > > > > > > removed] > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >__________________________________ > > > > > >Do you Yahoo!? > > > > > >The all-new My Yahoo! - What will yours do? > > > > > >http://my.yahoo.com > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > > > > > TSCM-L Technical Security Mailing > > > List > > > > > > "In a multitude of counselors there is > > > > > strength" > > > > > > > > > > > > To subscribe to the TSCM-L mailing > list > > > > > visit: > > > > > > > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > > > > > > > It is by caffeine alone I set my mind in > > > motion. > > > > > > It is by the juice of Star Bucks that > > > thoughts > > > > > acquire speed, > > > > > > the hands acquire shaking, the shaking is > a > > > > > warning. > > > > > > It is by caffeine alone I set my mind in > > > motion. > > > > > > > > > >=================================================== > > > > > TSKS > > > > > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >__________________________________ > > > >Do you Yahoo!? > > > >Yahoo! Mail - Find what you need with new > enhanced > > > search. > > > >http://info.mail.yahoo.com/mail_250 > > > > > > > > > > > > > > > > > > >======================================================== > > > > TSCM-L Technical Security Mailing > List > > > > "In a multitude of counselors there is > > > strength" > > > > > > > > To subscribe to the TSCM-L mailing list > === message truncated === __________________________________ Do you Yahoo!? Take Yahoo! Mail with you! Get it on your mobile phone. http://mobile.yahoo.com/maildemo 10318 From: Agent Geiger Date: Sat Dec 4, 2004 3:33pm Subject: RE: RFID-Jammer - speculative design Grocery stores are notorious for that. --- kondrak wrote: > Yes, you are right there on a lot of that..the close > proximity necessary > indicates theyre like a RF powered bugging device, > taking the power they > need to charge a cap till they have enough power to > transpond with the > mother-reader. Now where they transpond, what freq > is kind of limited by > two things, their infinitesimal small size, and the > desire to keep these > things cheap. > > BTW, the other idea ive had that will force them to > install a RFID > destruction unit at every checkout, is to save the > chips, and continually > salt their stores with the old usable tags. Once the > readings reach a level > of unreliability, their investment is wasted, and > the level of customer > distrust would force them to go back to old methods. > WHAT! You're charging > me $44. for this box of Kleenex..? Ill shop > somewhere else..once it gets > around that the Red-Chinese slave labor store is > using the system to > defraud the customers it will be all over for RFID > there. Its the same as > bar-coding was, people KNOW they're going to use it > to steal from the > customers to pay for the system, and anyone who > watches the scanning and > knows the prices of what they purchased has > obviously caught the errors > like I have. Isn't it funny, ALL the errors always > benefit the store, not > the other way around. > > > At 12:44 12/4/2004, you wrote: > > >On Sat, 4 Dec 2004, Agent Geiger wrote: > > > > > What would that take? > > > >That depends on what exactly you want to achieve. > (I personally would hire > >somebody for the radio part, and look under his > hands to learn more about > >it.) > > > >Let's for start expect that you want to just detect > the presence of the > >tag readers. This should be fairly easy, given the > laws of physics: the > >tag has to be fed with quite high amount of energy, > so the reader has to > >pump a lot of EM energy to the space it wants to > "see". The tags need > >certain minimal level of energy to power their > circuits; they are digital > >in nature. They are similar to some ancient AM > radios, where there was > >just a detection diode and a tuned circuit and the > energy from the antenna > >was used to power the radio. Then there is a > PROM-type memory with the > >tag's identification number, a clock generator, and > a counter that steps > >through the memory over and over, whenever powered, > and the memory's > >output is used to clock the tag's own transmitter. > This is pretty > >complicated and needs a certain minimal power level > to kick in, so not > >even the highest-class adversary can read the tag > remotely without > >illuminating it with certain minimal power. Use > less power than the limit > >for the tag, and the tag won't wake up. (keep in > mind that the real > >minimal values will vary per chip because of > manufacturing tolerances, and > >will be typically smaller than the catalog values). > > > > > >A simple kind of a field strength meter should do > the job. Just an > >antenna, receiver tuned to the desired frequency, > and an indicator of > >signal strength. It is possible I get to experiment > with a warehouse > >management class RFID system sometime within 2005, > so if time and > >knowledge permits, I may play around a bit. > > > >There are chips on the market for AM/FM radios that > need just few parts > >around, and have a signal strength output pin with > voltage corresponding > >to the signal level. You can feed signal from this > pin directly to a > >microcontroller with a built-in ADC. Then connect > anything you want to the > >chip's output - a line of LEDs, a vibration motor, > a buzzer, a GPS > >receiver and an EEPROM chip to silently log the > values vs positions - > >anything you want, and program the microcontroller > to respond to the > >presence of the signal the way you wish it to. > (Then make money on it if > >you market it well and make it cheap.) > > > >If you want to monitor more frequencies, you use > several input circuits, > >one per frequency. (There are several kinds of > tags, operating on wildly > >different frequencies, requiring different > constructions of antennas and > >receivers.) Microcontrollers often have several > analog inputs; my favorite > >ones are the Microchip PIC ones, but some people > prefer ATMELs. > > > > > >A receiver of the tag responses is much more > complicated. The tag > >responses are MUCH weaker than the reader's field, > which requires bigger > >antennas and more sensitive receivers. The tag > responses have to be > >recognized and isolated from the signal. You can > either do it yourself > >using eg. a DSP chip, or use a commercially > manufactured RFID receiver > >chip. You need to know what tags the adversary > uses, so you can use the > >right chip that talks the desired protocol. > However, there are only few > >standards on the market now, and the > standardization efforts between the > >manufacturers will simplify this too. > > > >RFID detector is much easier than a "generic bug > detector", as the > >frequencies and devices are well-known and there is > no attempt to hide or > >mask them (at least for widespread commercial > systems, which is the kind > >that poses threat privacy-wise). The principles are > otherwise the same. > >For many people here the construction should be a > piece of cake. > >Tetrascanner, what is your opinion? > > > > > > > > > > > > > > --- Thomas Shaddack > > > > wrote: > > > > > > > On Sat, 4 Dec 2004, kondrak wrote: > > > > > > > > > Wherein lies the research Ive been finding. > its > > > > easy to confuse the readers > > > > > by feeding it garbage after the pre-amble, > it > > > > forces the system to reset > > > > > and try again, thus the jamming potential. > > > > > Remember, since these are part 90 devices, > they > > > > MUST take all interference > > > > > possible. > > > > > > > > Another important device to build is a > > > > reader/response detector. > > > > > > > > A reader detector may be as simple as a > receiver > > > > tuned to the frequencies > > > > of the commonly used tags, displaying field > strength > > > > on each of the > > > > frequencies. > > > > > > > > A response detector listens for the tags' > response > > > > preambles, eventually > > > > the responses themselves, and either shows the > > > > decoded values, or just > > > > blinks a LED, or beeps. > > > > > > > > The reader detector can also, instead of field > > > > strength indicators, have a > > > > preprogrammed threshold and alert its user by > eg. > > > > light vibration, > === message truncated === __________________________________ Do you Yahoo!? The all-new My Yahoo! - What will yours do? http://my.yahoo.com 10319 From: Shawn Hughes (Road) Date: Sat Dec 4, 2004 9:58pm Subject: Re:control of the masses At 08:35 AM 12/4/04 +0000, you wrote: >All of those things invariably would change and >influence (control) people. Sir, you stated it perfectly in your first _if_. If you equate advertising influence with control, then we have been controlled since the advent of the Gutenberg press. Use of personal data to tailor advertising, and adjust rates are old hat. RFID is new technology with old roots. There are standoff methods to make almost the same determinations that, uh, 'they' have used for years with great success. I will concede that surveillance should take a lesson or two from marketing, however, but I am relatively unconcerned about RFID being used by the .gov community at this point. The technology has not matured enough. I am not telling you not to obsess about those tags being put in your stuff, or the fact that manufacturers will eventually incorporate the items directly into the items. I am saying that this isn't your grandfathers' world anymore. -Shawn 10320 From: Vic Healey @cashette.com Date: Sat Dec 4, 2004 3:12pm Subject: Neat idea for defeating TSCM I have a neat idea for the clandestine recording of speech. While playing with several flash MP3 player recorders I have noticed that the quality of the recording is much better than what you get from micro cassette recorders. These devices are relatively small about the size of a man's thumb. There is no tape hiss or cassette motor noise in the recordings. A one-gig player can record 64 hours if you reduce the bit rate to 32 kbps. The iRiver IFP 799 can even trigger on sound and shut off recording to save energy and space on silence. Delays and sound level for the trigger are programmable. The same iRiver can scan at an accelerated pace the audio and even play it back at twenty five percent faster that normal speech. Since these are self-contained one could covertly drop one in a target area and later retrieve it or even wear it under ones shirt and tie. They all come with a nice lanyard that suit that purpose. The only limiting factor of the off the shelf product is that a PNY VIBE uses an AAA battery and recording life is around eight hours. The IRiver series use an AA battery and I suspect it is good for 12 to 20 hours. It lasts 43 hours if all you are doing is playing back files. The iRiver is the more sophisticated unit with many user settings including AGC toggle on recording and the ability to use an external mike or other line input. --- avast! Antivirus: Outbound message clean. Virus Database (VPS): 0449-1, 12/02/2004 Tested on: 12/4/2004 12:48:39 PM avast! - copyright (c) 2000-2004 ALWIL Software. http://www.avast.com 10321 From: Date: Sat Dec 4, 2004 8:03pm Subject: RFID DEBATE.. Please take your debates to a personal 1-1 email session and stop cluttering this board and my inbox with theoretical RFID queries. While we are at it.. OLIVE GROUP BEGGING FOR SOFTWARE is out of line as well. If you own legal software and you lose it.. if its registered for a fee they replace it. Dont Cyberbeg its unprofessional buy some new software. 10322 From: Mitch D Date: Sat Dec 4, 2004 8:56pm Subject: RFID Jammer complete rfid jammer prototype photo: http://images.studio31.org/hammer.jpg __________________________________ Do you Yahoo!? Yahoo! Mail - You care about security. So do we. http://promotions.yahoo.com/new_mail 10323 From: Thomas Shaddack Date: Sat Dec 4, 2004 9:01pm Subject: Defeating radar detector detectors - speculative proposal Thinking about RFID and a related comment about radar detector detector detectors reminded me of an idea that is bugging me for years. Radar detector works on a superheterodyne principle. There is an oscillator inside, located on fixed frequency, which is the radar frequency we are looking for plus couple megahertz. This signal is mixed with the signal from the antenna, and the resulting low-frequency component of mixing is used to indicate presence of the radar signal. This signal, radar freq plus an offset, is also the RF that bleeds from the unit and is listened for by the detector detectors. (They use the same principle, which the radar detector detector detectors use - they listen for this signal, and when it is present, they shut down the main detector and alert the driver. It is matter of time until detector detector detector detectors will appear on the market, which triggers next round of the EWAR-on-the-road.) However, the offset between the received and reference frequency is within certain limits arbitrary. Today's cars are crammed full with microprocessors, including signal processors with relatively high clock speed. There is often comm and navigation equipment on-board - cellphones, GPS receivers - which contains high-speed digital circuits as well, and this trend will only increase. All these circuits operate with high-frequency square-wave currents, which bleed EM noise like crazy and contain LOTS of harmonics that go to pretty high frequencies. It should be possible to hide a lot in there. How difficult it is to design a radar detector whose EM signature is sufficiently close to the "natural" signature of an average car to not stick out of the spectrum like a sore thumb? 10324 From: Shawn Hughes (Road) Date: Sun Dec 5, 2004 0:19am Subject: Re:Part 90 At 01:38 AM 12/5/04 +0000, you wrote: >Truth is they're part 90 devices, and by statute must take any interference >they may receive. YOU caused my passive device to transmit a signal that >interfered with YOUR spying. Oh yeah, just let me get this in front of a >jury...uh huh... The thing is, even though Part 90 says it has to accept interference, nowhere does it say that you can intentionally generate interference. >5) Carefully remove the RFID strip from your right wing book and place it >into a copy of Bill Clinton's latest book. Hey, Andy - true story. Was working with a guy doing some surveillance. I didn't care for him, so, I stuck a loss prevention tag on his untucked shirt tail. (Snicker) Took him a while to figure that one out... >They're optical confirmation that the bill is genuine. No RF sensitivity >has been observed in them. Don't be so certain. -Shawn 10325 From: Date: Sat Dec 4, 2004 4:55pm Subject: Re: RFID DEBATE.. In a message dated 12/4/2004 6:50:06 PM Pacific Standard Time, bernard_stan@y... writes: Please take your debates to a personal 1-1 email session and stop cluttering this board and my inbox with theoretical RFID queries. While we are at it.. OLIVE GROUP BEGGING FOR SOFTWARE is out of line as well. If you own legal software and you lose it.. if its registered for a fee they replace it. Dont Cyberbeg its unprofessional buy some new software. Amen [Non-text portions of this message have been removed] 10326 From: Leanardo Date: Sun Dec 5, 2004 9:53am Subject: Re: Neat idea for defeating TSCM Your idea of using a digital MP3 player/recorder is a valid option and one that can easily be used without modification. With a little creativity and modification these units can be converted into a great covert recording devicesÖbut I would be careful thinking these devices would be effective at "defeating" TSCM sweeps. I feel the majority of those new to the field of technical counter surveillance without training or access to the advice of other professionals in the field tend to focus to much on the RF aspect. I think this is mostly because it is more glamorous and that there are hundreds of gadgets targeting RF generating devices. I think most would agree that physical inspection of the area of concern is the most effective method of detection. The physical inspection of electrical outlets, telephones, books, and other places where microphones and recording devices would be hidden may not be as exciting, but will do a much better job of finding both devices RF and non-RF generating surveillance devices. The MP3 surveillance recorder would also be easily found in areas where they could not be located visually such as furniture and doors using a non-linear junction detector. Bruce --- In TSCM-L@yahoogroups.com, "Vic Healey @c... " wrote: > > I have a neat idea for the clandestine recording of speech. > > While playing with several flash MP3 player recorders I have noticed that....... 10327 From: Steve Whitehead Date: Sun Dec 5, 2004 10:52am Subject: Re: Helped needed List Members Just for the record - why we offered to help Olive Security with their dilemma. TSCM Services sold the ECR-3 and the SmartScan software to Olive Security in the UK a few years ago. We were also an authorised ISA equipment distributor at the time. Regards Steve Whitehead TSCM Services South Africa www.tscm.co.za info@t... ----- Original Message ----- From: "James M. Atkinson" To: Sent: Saturday, December 04, 2004 1:18 AM Subject: Re: [TSCM-L] Helped needed > > [cough] > > If you or any other list member has misplaced there copy of the software > then I would encourage you to contact ISA and arrange with them to obtain > another copy to replace the one that you misplaced. > > ISA will be quite happy to supply you with a replacement copy, but only if > you bought it from them in the first place are you are the licensed user. > > Along those same lines, please do not supply, offer to supply, or ask > someone else to supply software to anybody else unless you have the > copyright holders explicit permission to do so. > > -jma > > > At 09:14 AM 11/30/2004, Graeme T. Simpson wrote: > > >>Dear All, >> >>We have foolishly misplaced our copy of ECR-3 Smartscan software. Is >>there anyone who could come to our rescue and supply me with a >>replacement copy? >> >>Many thanks, >>Graeme Simpson >>Olive Security >>gsimpson@o... > > > ----------------------------------------------------------------------------------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ----------------------------------------------------------------------------------------------------- > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: > http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ----------------------------------------------------------------------------------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ----------------------------------------------------------------------------------------------------- > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10328 From: Greg Horton Date: Sun Dec 5, 2004 4:11pm Subject: Tracking Question (OT) Is it just me, or does anyone else find it amazing that our government can track a cow born in Canada almost three years ago, right to the stall where she sleeps in the state of Washington? And they tracked her calves to their stalls. But, they are unable to locate 11 million illegal aliens wandering around in our country. Maybe we should give each one a cow (or RFID). 10329 From: Agent Geiger Date: Sun Dec 5, 2004 10:37pm Subject: Re: Tracking Question (OT) LOL. I about pissed myself on that one! --- Greg Horton wrote: > > Is it just me, or does anyone else find it amazing > that our government can track a cow born in Canada > almost three years ago, right to the stall where she > sleeps in the state of Washington? And they tracked > her calves to their stalls. But, they are unable to > locate 11 million illegal aliens wandering around in > our country. Maybe we should give each one a cow > (or RFID). > > > > > > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10330 From: Paul Curtis Date: Sun Dec 5, 2004 10:21pm Subject: RE: Tracking Question (OT) Greg, Maybe the problem is that we don't sell our illegal aliens or consume them when they grow up. Ya just gotta follow the money :) Paul Curtis -----Original Message----- From: Greg Horton [mailto:sgtpelon@e...] Sent: Sunday, December 05, 2004 14:12 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Tracking Question (OT) Is it just me, or does anyone else find it amazing that our government can track a cow born in Canada almost three years ago, right to the stall where she sleeps in the state of Washington? And they tracked her calves to their stalls. But, they are unable to locate 11 million illegal aliens wandering around in our country. Maybe we should give each one a cow (or RFID). ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10331 From: James M. Atkinson Date: Sun Dec 5, 2004 10:50pm Subject: Re: Tracking Question (OT) At 05:11 PM 12/5/2004, Greg Horton wrote: >Is it just me, or does anyone else find it amazing that our government can >track a cow born in Canada almost three years ago, right to the stall >where she sleeps in the state of Washington? And they tracked her calves >to their stalls. But, they are unable to locate 11 million illegal aliens >wandering around in our country. Maybe we should give each one a cow (or >RFID). Ah, but the cows are part of our food chain. The FDA is still on the fence about serving aliens as food. ;-) -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10332 From: James M. Atkinson Date: Mon Dec 6, 2004 0:17am Subject: Re: Re: Neat idea for defeating TSCM The value of a physical inspection is very high, but it requires that you actually enter the targeted area which is an act that can tip off the eavesdropper. The RF segment can be performed at a considerable distance from the suspect area without letting the eavesdropper or anybody else know that a bug sweep is afoot. The RF segment of the sweep starts several miles away from the facility, and spirals down to within a few hundred feet of the location being checked... all the while cataloging the RF spectrum OUTSIDE the area to not only catalog the non-hostile signals, but to also get luckily and catalog a hostile signal as well. The RF segment [outside of the area being checked] is to prepare you to approach the sound stage or suspected area PRIOR it actually brining equipment into the area, or doing anything that might tip your hand. Once the equipment is moved into the area being check you can set up and re-inventory the RF spectrum while you do you sketches and charts for the physical search. -jma At 10:53 AM 12/5/2004, Leanardo wrote: >Your idea of using a digital MP3 player/recorder is a valid option >and one that can easily be used without modification. With a little >creativity and modification these units can be converted into a great >covert recording devicesÖbut I would be careful thinking these >devices would be effective at "defeating" TSCM sweeps. > >I feel the majority of those new to the field of technical counter >surveillance without training or access to the advice of other >professionals in the field tend to focus to much on the RF aspect. I >think this is mostly because it is more glamorous and that there are >hundreds of gadgets targeting RF generating devices. > >I think most would agree that physical inspection of the area of >concern is the most effective method of detection. The physical >inspection of electrical outlets, telephones, books, and other places >where microphones and recording devices would be hidden may not be as >exciting, but will do a much better job of finding both devices RF >and non-RF generating surveillance devices. The MP3 surveillance >recorder would also be easily found in areas where they could not be >located visually such as furniture and doors using a non-linear >junction detector. > >Bruce > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10333 From: Hawkspirit Date: Mon Dec 6, 2004 8:50am Subject: Mobile RF Sweep In the thirty years I have been sweeping the over 2500 locations only rarely have I made off site ambient RF measurements. When we sweep we have to focus on the best time and dollar value for the client; especially when we go from sweep to sweep with no time to waste. The ambient remote measurements have problems. First are keyed transmissions and mobile transmitters, both will vary a spectrum over time. In most cities that I am working, I have direct knowledge of what the spectrum should look like from sweeping them for many years. This is where the experience comes in. Also the rate that the spectrum allocations/applications change we are seeing new transmissions and formats all the time. These days we really focus on the cell band for cell bugs. This section of the spectrum is constantly changing as subscribers go on and off, so you must decode the Walsh Codes real time and have a clear view of traffic. There are occasions that I have found an unknown localized signal and will take the battery powered spectrum analyzer out to the truck from the facility in question and drive away monitoring the suspected signal. But I definitely do not have time to "catalog" the RF spectrum all over town. Most bugs I have found over the years have had a maximum range of about 500 ft. Roger Tolces www.bugsweeps.com Date: Mon, 06 Dec 2004 01:17:53 -0500 From: "James M. Atkinson" Subject: Re: Re: Neat idea for defeating TSCM The value of a physical inspection is very high, but it requires that you actually enter the targeted area which is an act that can tip off the eavesdropper. The RF segment can be performed at a considerable distance from the suspect area without letting the eavesdropper or anybody else know that a bug sweep is afoot. The RF segment of the sweep starts several miles away from the facility, and spirals down to within a few hundred feet of the location being checked... all the while cataloging the RF spectrum OUTSIDE the area to not only catalog the non-hostile signals, but to also get luckily and catalog a hostile signal as well. The RF segment [outside of the area being checked] is to prepare you to approach the sound stage or suspected area PRIOR it actually brining equipment into the area, or doing anything that might tip your hand. Once the equipment is moved into the area being check you can set up and re-inventory the RF spectrum while you do you sketches and charts for the physical search. -jma [Non-text portions of this message have been removed] 10334 From: savanted1 Date: Mon Dec 6, 2004 10:23am Subject: Comments Dear, Esteemed Group Members After seeing this tid bit of information on the network I thought that this would be a valuable piece of information to disseminate. http://www.antifraudalliance.com Regards and Best Wishes 10335 From: satcommunitfive Date: Mon Dec 6, 2004 8:04pm Subject: Re: RFID-Jammer - speculative design what about grabbbing a RFID and putting a fast square wave voltage into its cap so it transmits all the time -on their frequency then all you need to do is buy one item from whatever store and add it to the rest HA! you could always put a magnatron in your hat? Im turning on my iron..... 10336 From: kondrak Date: Mon Dec 6, 2004 9:06pm Subject: Re: RFID Jammer complete You are entirely correct Sir, THAT would seriously impede the use of RFID devices. However, your more pressing problem, would be the store staff seriously pissed about you smashing all their stock with that device. At 21:56 12/4/2004, you wrote: > rfid jammer prototype photo: >http://images.studio31.org/hammer.jpg > > > > >__________________________________ >Do you Yahoo!? >Yahoo! Mail - You care about security. So do we. >http://promotions.yahoo.com/new_mail > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10337 From: kondrak Date: Mon Dec 6, 2004 9:11pm Subject: Re: Tracking Question (OT) Er, 15 million, and 3000 more a day since amnesty was proposed. (Not counting the 100 estimated AlQuada a day with them) We're even getting flooded with the Mexis up in the Northeast, looking for welfare. Its Chinese down from Canada and Mexi's up from the south... At 17:11 12/5/2004, you wrote: >Is it just me, or does anyone else find it amazing that our government can >track a cow born in Canada almost three years ago, right to the stall >where she sleeps in the state of Washington? And they tracked her calves >to their stalls. But, they are unable to locate 11 million illegal aliens >wandering around in our country. Maybe we should give each one a cow (or >RFID). > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10338 From: kondrak Date: Mon Dec 6, 2004 9:12pm Subject: RE: Tracking Question (OT) Yeah, even the dog wont eat them, no matter how fine you grind them... At 23:21 12/5/2004, you wrote: >Greg, > >Maybe the problem is that we don't sell our illegal aliens or consume them >when they grow up. Ya just gotta follow the money :) > >Paul Curtis 10339 From: kondrak Date: Mon Dec 6, 2004 9:14pm Subject: Re: Tracking Question (OT) Well, they smell bad, perhaps McDonalds will find a use for them besides cooking burgers.... The McMexi with Guacamole? Mexi-McNuggets? At 23:50 12/5/2004, you wrote: >At 05:11 PM 12/5/2004, Greg Horton wrote: > > > >Is it just me, or does anyone else find it amazing that our government can > >track a cow born in Canada almost three years ago, right to the stall > >where she sleeps in the state of Washington? And they tracked her calves > >to their stalls. But, they are unable to locate 11 million illegal aliens > >wandering around in our country. Maybe we should give each one a cow (or > >RFID). > > >Ah, but the cows are part of our food chain. The FDA is still on the fence >about serving aliens as food. > >;-) > >-jma > > > >----------------------------------------------------------------------------------------------------- > > >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >----------------------------------------------------------------------------------------------------- > > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >----------------------------------------------------------------------------------------------------- > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10340 From: Kevin D.Murray Date: Mon Dec 6, 2004 10:53pm Subject: Re: Tracking Question (OT) My apologies to my international TSCM colleagues, friends and all other international TSCM-L readers. Please be assured that the overwhelming majority of Americans _do not_ feel this way. I am sure they are as disgusted and embarrassed by this display of thoughtless prejudice as I am. I would very much like to see this "moderated" "professional" forum return to its original charter immediately. Kevin Kevin D. Murray - CPP, CFE, BCFE Murray Associates Eavesdropping Detection and Counterespionage Consultants to Business & Government http://www.spybusters.com On Dec 6, 2004, at 10:14 PM, kondrak wrote: > > Well, they smell bad, perhaps McDonalds will find a use for them > besides > cooking burgers.... > The McMexi with Guacamole? > Mexi-McNuggets? > > > At 23:50 12/5/2004, you wrote: > >> At 05:11 PM 12/5/2004, Greg Horton wrote: >> >> >>> Is it just me, or does anyone else find it amazing that our >>> government can >>> track a cow born in Canada almost three years ago, right to the stall >>> where she sleeps in the state of Washington? And they tracked her >>> calves >>> to their stalls. But, they are unable to locate 11 million illegal >>> aliens >>> wandering around in our country. Maybe we should give each one a >>> cow (or >>> RFID). >> >> >> Ah, but the cows are part of our food chain. The FDA is still on the >> fence >> about serving aliens as food. >> >> ;-) >> >> -jma [Non-text portions of this message have been removed] 10341 From: Kevin Harris Date: Mon Dec 6, 2004 11:02pm Subject: An Introduction Hello Everyone, I wanted to take a moment to introduce myself to the group. My name is Kevin Harris. I am currently a high school junior from St. Louis, MO. I developed an active interest in intelligence at the age of 13, when I got into cryptology. Ever since, I've been considering my options within the field, aspiring to pursue a career in it some day. (I would like to intern with NSA the summer after my senior year.) Looking back, I've realized that I've been a closet case for years. ;) I was first introduced to TSCM (as TSCM, and not by reading spy thrillers) through my "research" of TEMPEST, and secondarily through the TSCM web site (which is apparantly run by the guy/organization that runs this group, how about that?). I'm hoping to learn a lot here. Regards, Kevin 10342 From: John and Sheryl Date: Mon Dec 6, 2004 10:58pm Subject: RE: Tracking Question (OT) Thank you Kevin, You speak for the many.. John -----Original Message----- From: Kevin D.Murray [mailto:murray@s...] Sent: December 6, 2004 9:53 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Tracking Question (OT) My apologies to my international TSCM colleagues, friends and all other international TSCM-L readers. Please be assured that the overwhelming majority of Americans _do not_ feel this way. I am sure they are as disgusted and embarrassed by this display of thoughtless prejudice as I am. I would very much like to see this "moderated" "professional" forum return to its original charter immediately. Kevin Kevin D. Murray - CPP, CFE, BCFE Murray Associates Eavesdropping Detection and Counterespionage Consultants to Business & Government http://www.spybusters.com On Dec 6, 2004, at 10:14 PM, kondrak wrote: > > Well, they smell bad, perhaps McDonalds will find a use for them > besides > cooking burgers.... > The McMexi with Guacamole? > Mexi-McNuggets? > > > At 23:50 12/5/2004, you wrote: > >> At 05:11 PM 12/5/2004, Greg Horton wrote: >> >> >>> Is it just me, or does anyone else find it amazing that our >>> government can >>> track a cow born in Canada almost three years ago, right to the stall >>> where she sleeps in the state of Washington? And they tracked her >>> calves >>> to their stalls. But, they are unable to locate 11 million illegal >>> aliens >>> wandering around in our country. Maybe we should give each one a >>> cow (or >>> RFID). >> >> >> Ah, but the cows are part of our food chain. The FDA is still on the >> fence >> about serving aliens as food. >> >> ;-) >> >> -jma [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10343 From: Tech Sec Lab Date: Tue Dec 7, 2004 5:55am Subject: RE: Tracking Question (OT) My god... Need I remind you so called true blood Americans that your race is composed of immigrants. Without the Irish, British, Spanish, French origins, there would be NO USA. It is in YOUR blood. Have a little think before you open your mouth. I thought some group members would have more sense. *************************** Message: 7 Date: Mon, 06 Dec 2004 22:14:53 -0500 From: kondrak Subject: Re: Tracking Question (OT) Well, they smell bad, perhaps McDonalds will find a use for them besides cooking burgers.... The McMexi with Guacamole? Mexi-McNuggets? 10344 From: Agent Geiger Date: Tue Dec 7, 2004 8:36am Subject: RE: Tracking Question (OT) I agree, that these comments were rascist and redneck. On the backside, when I lived in Ireland and they asked what my heritage was, I told them Irish, as my grandparents came from there. They laughed at me and told me I was an "American" and not Irish. Now I am confused. --- Tech Sec Lab wrote: > My god... > > > Need I remind you so called true blood Americans > that your race is composed > of immigrants. > > Without the Irish, British, Spanish, French origins, > there would be NO USA. > It is in YOUR blood. > > Have a little think before you open your mouth. I > thought some group members > would have more sense. > > > > *************************** > > > Message: 7 > Date: Mon, 06 Dec 2004 22:14:53 -0500 > From: kondrak > Subject: Re: Tracking Question (OT) > > Well, they smell bad, perhaps McDonalds will find a > use for them besides > cooking burgers.... > The McMexi with Guacamole? > Mexi-McNuggets? > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail 10345 From: kondrak Date: Tue Dec 7, 2004 11:04am Subject: Re: An Introduction Then I take it you're familiar with the Cypherpunks as well? At 00:02 12/7/2004, you wrote: >Hello Everyone, > >I wanted to take a moment to introduce myself to the group. My name is >Kevin Harris. I am currently a high school junior from St. Louis, MO. >I developed an active interest in intelligence at the age of 13, when >I got into cryptology. Ever since, I've been considering my options >within the field, aspiring to pursue a career in it some day. (I would >like to intern with NSA the summer after my senior year.) Looking >back, I've realized that I've been a closet case for years. ;) > >I was first introduced to TSCM (as TSCM, and not by reading spy >thrillers) through my "research" of TEMPEST, and secondarily through >the TSCM web site (which is apparantly run by the guy/organization >that runs this group, how about that?). > >I'm hoping to learn a lot here. > >Regards, >Kevin > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > From: gkeenan Date: Wed Dec 5, 2001 1:58pm Subject: Re: Internet Provider censors client's Emails Paul, This is very interesting. I haven't checked into it yet, but I'll try to get to it today if possible. The provider -- Suffolk Web -- is my provider. As far as I know, no one else on this (or other lists, for that matter) use this provider. So it's gotta be me! Oddly enough, I sent out a virus warning on the goner this morning -- and I received a message from the provider that said pretty much the same thing; they didn't forward it. I, like you, used the official name of the virus in my subject line. I figure that when it scanned at the ISP, it caught the name and determined it was an infection by that virus. So also like you, it didn't send the message. At least, not to the identified email addresses in the TO line. It did go to the 80+ addresses on my mailing list 'cause I always send them BCC. I asked a couple of my subscribers if they received the ISP generated message, and they said they didn't. So apparently the ISP didn't read the other email addresses. But only the ones open to view. And I got queries from both of those; one by email, and the other one called me. But now, having mentioned the name of the virus in this email, I'm just wondering if this'll get out!! Also, just to let you know, in spite of the message below from my provider, I did, in fact, receive your virus warning!! That being the case, I wonder just how good their "screening" system really is?? They say they didn't deliver it because of the possible virus, and yet I received it. And I received it last evening, when you sent it. I don't know if I'll get a chance to check on this today (mucho busy), but I'll see about getting hold of someone tomorrow. The system is the one supports all 54 public libraries here in Suffolk County, Long Island. As long as you're a library patron, you get free email/internet access - unlimited. A local provider, so to speak. I know the woman at my local library who runs things for my area, and I know the guy at the ISP location who runs that place. So I'll try and get hold of one of them, if I can, and see what the deal is on this. Jerry Keenan ----- Original Message ----- From: "Paolo Sfriso" To: Sent: Wednesday, December 05, 2001 10:16 AM Subject: [TSCM-L] Internet Provider censors client's Emails > > Dear Colleagues. > > Following my Virus alert of yesterday evening, I received the following > automated Email from an Internet Provider. > > IMHO this "Carnivore" like system could be well used for censoring and/or > intercepting client's Email traffic. > > Food for thought ? > > Kind Regards. > > Paul Sfriso > Director > GRUPPO S.I.T. > Security, Investigations & Technology > Quarto d'Altino, Venice > ITALY > > phone +39 0422 828517 > fax +39 0422 823224 > 24hr GSM cellphone +39 335 5257308 > www.grupposit.com > paulsfriso@t... > > > ----- Original Message ----- > From: > To: > Sent: Wednesday, December 05, 2001 4:46 AM > Subject: ALERT Possible Worm.A Infection > > > > From: "Paolo Sfriso" > > To: , > > Subject: [TSCM-L] Fw: Urgent New Virus Not Yet detected by Norton > > > > The e-mail message cited above, apparently from you, was NOT delivered. > > SuffolkWeb filters all incoming e-mail messages for the presence of > phrases > > typically found in messages that distribute viruses, worms, or other > > malicious code. The cited message contained one or more of the phrases > > that we filter. > > > > Our email gateway has detected that your message MAY contain > > hazardous attachments or embedded scripting, and has prevented its > > delivery to the intended recipient. The System Administrator has been > > notified. > > > > It is possible that your computer has been infected by a virus, > > or you have been the target of an email worm which is now attacking > > other computers on its own, without your knowledge or consent. This > > is particularly possible if you don't recall sending the message that > > caused this notice to be sent to you. > > > > Information on SuffolkWeb filtering policy may be viewed at the following > URL: > > > > http://www.suffolk.lib.ny.us/virus > > > > If you used one of the rejected phrases, please reword your message and > resend > > your message again. SuffolkWeb will be happy to deliver the message. > > > > If you did NOT send the message, you should check your computer for the > virus, worm, or malicious code mentioned in the subject line of this e-mail. > The PCFA.ORG web pages give additional sources of information to assist you. > It is possible someone is using your e-mail address, that a virus has > mutated to appear to be from your address, or something else. Good luck. > > > > SuffolkWeb System Administrator > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 4263 From: Miguel Puchol Date: Thu Dec 6, 2001 9:18am Subject: Digital voice recorder modules Hi all, Just as some info, here are some voice recorder modules, very small, and that could be concealed in many places - if you find a strange board where it shouldn't be, it could be one of these: http://www.telesys.ru/english/modules.shtml The largest one records up to some 35 hours of audio in a 256MB memory. Cheers, Mike 4264 From: Dawn Star Date: Thu Dec 6, 2001 0:39pm Subject: Final Report I want to post this small piece of a private discussion that I am having with another sweeper, Roger >It has always been my view, supported by my experience, that telephone >company's provide no security at all in protecting their subscribers from >privacy attacks. This is one of the main reasons people hire us to attempt >to protect themselves from this indifference and incompetence. Let's face >it, the phone company will tell you that their job is communications not >customer privacy. >By default we must assume this domain. >The first day I started my service 28 years ago, I felt that there was >only two answers that can be given at the end of a sweep. Yes you have >your privacy and no you are not bugged, or you don't have you privacy and >you are bugged. There are obviously some exclusions such as if you use a >R.F. convenience phones they are giveaways. But with those kind of >exceptions, in my over 2500 sweeps I have never given a conditional >report. It is not in my professional vocabulary to say I'm not sure, due >to conditions beyond my control, or not my job, go talk to your phone >company. Roger Tolces Electronic Security www.bugsweeps.com 4265 From: Aimee Farr Date: Thu Dec 6, 2001 11:45am Subject: Nietzsche On National Security; Sartre On 'Spies' ------------------------------- NIETZSCHE ON NATIONAL SECURITY ...a famous security director speaking of adjudication, security objectives, and the nature of the workforce. ------------------------------- http://www.inquiria.com/nz/bge/bge_noble.html "He whose task and practice it is to investigate souls, will avail himself of many varieties of this very art to determine the ultimate value of a soul, the unalterable, innate order of rank to which it belongs: he will test it by its instinct for reverence.... Much is gained once the feeling has finally been cultivated in the masses (among the shallow and in the highspeed intestines of every kind) than they are not to touch everything; that there are holy experiences before which they have to take off their shoes and keep away their unclean hands -- this is almost their greatest advance toward humanity.... On the contrary, in the so-called cultured classes, the believers in "modern ideas," nothing is perhaps so repulsive as their lack of shame, the easy insolence of eye and hand with which they touch, taste, and finger everything;...." ------------------ SARTRE ON 'SPIES': ...a famous counterespionage guru finding fault with our clearance process. ------------------ http://www.sonoma.edu/people/daniels/Sartre%20sum.html (academic summary) EXISTENCE PRECEDES ESSENCE. "Freedom is existence, and in it existence precedes essence." This means that what we do, how we act in our life, determines our apparent "qualities." It is not that someone tells the truth because she is honest, but rather she defines herself as honest by telling the truth again and again. PAST DETERMINANTS SELDOM TELL US THE CRUCIAL INFORMATION. We transform past determining tendencies through our choices. Explanations in terms of family, socioeconomic status, etc., do not tell us why a person makes the crucial choices we are most interested in. WE CONTINUALLY MAKE OURSELVES AS WE ARE. A "brave" person is simply someone who usually acts bravely. Each act contributes to defining us as we are, and at any moment we can begin to act differently and draw a different portrate of ourselves. There is always a possibility to change, to start making a different kind of choice. OUR REALITY AND OUR ENDS. Human reality "identifies and defines itself by the ends which it pursues", rather than by alleged "causes" in the past. ---- Nietzsche wasn't *really* talking about national security, and Sartre wasn't *really* talking about spies, but they nonetheless their words often seem to fit our experiences and data. Both philosophers wrote of shame. ~Aimee 4266 From: iDEN-Test Mobile-Marcel Date: Thu Dec 6, 2001 11:52am Subject: "As Businesses Seek Protection From Terrorists, Workers Secure in Security" "As Businesses Seek Protection From Terrorists, Workers Secure in Security" Wisconsin Post-Crescent (12/02/01); Waggoner, Judy Security companies have flourished since the recent terrorist attacks. Jerry Antoon, chairman of Fox Valley, Wis., Technical College's Security and Crime Prevention Department, is making an all-inclusive training course to meet government's and business' security needs. He notes that the biggest problem in the security industry is a dearth of qualified workers. The Fox Valley classes are adaptive and customer-responsive, according to Antoon. Little Chute-based Lappen Security Products owner Mike Wildenberg indicates that his company is being asked to do future projects immediately. The current $6.7 billion information security industry is expected to increases threefold in the next four years. (www.wisinfo.com/postcrescent) -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 4267 From: iDEN-Test Mobile-Marcel Date: Thu Dec 6, 2001 0:08pm Subject: [Fwd: 12/06/2001 -- NLECTC News Summary] "Mod Squad to Cost $100 Million" www.heraldsunnews.com.au (12/02/01) P. 1; Hodgson, Shelley Police in Australia's state of Victoria will have access to criminal offenders' records, driver details, vehicle registration information, and intelligence data via vehicle computer terminals by 2003. The first phase of the project costs A$100 million and installation of terminals could begin by next year. The project will eventually equip 1,100 police cars and 135 ambulance vehicles serving the metropolitan area with onboard computers. Police Minister Andre Haermeyer said the project will reduce paperwork and radio traffic, while improving the settling of crimes and overall efficiency. The terminals will offer police access to the Law Enforcement Assistance Program's criminal data, in addition to other important databases, such as the firearms register. The network will also employ Global Positioning Technology for entering data into the computer and cut down on dispatch times. (www.express.co.uk) "In Intelligence Revamp, Technology Challenge Is Just the Beginning" National Journal Online (12/03/01); Munro, Neil When U.S. officials talk about overhauling the intelligence agencies, technology is often a topic that leads to heated debates regarding the issue. While advocates of technology maintain it is needed to gather, analyze, and share data, opponents argue that the reliance on technology is discouraging agencies from placing agents on the ground in dangerous parts of the world. The terrorist attacks on the United States have made the issue of restructuring the intelligence agencies a more timely concern. Some observers believe the United States may have been able to recruit spies in Afghanistan or detect the Sept. 11 plot if the agencies had used their networks of hidden spies. Technology will even hurt the reform effort, some experts say. Former CIA field agent Reuel Marc Gerecht says, "New and better technology will not crack the grip of 'inside' officers--the fake diplomats--over the culture and modus operandi of the [CIA]." Indeed, lawmakers such as Sens. Bob Graham (D-Fla.) and Richard C. Shelby (R-Ala.) stress that the bureaucratic culture of inflexibility in the intelligence community is a more critical factor in a restructuring than technology. A team of senior government officials and another panel of private-sector experts will present in the coming months their recommendations for revamping the intelligence agencies. (www.nationaljournal.com) "B-Intercept Developed for Intelligence and Law Enforcement Communities" Business Wire (11/27/01) Be-Bee, located in San Diego and Syracuse, N.Y., has developed the B-Intercept product to read electronic messages for mood, intent, and concept in real time. In testing for use as a law enforcement tool, the system was better at intercepting dangerous messages and letting innocuous ones pass then a keyword based-system. The product is already available for intelligence and law enforcement agencies. (www.businesswire.com) "National Center Combats Internet Fraud" Sheriff (11/01) Vol. 53, No. 6, P. 50; Skorackyj, Olga In May 2000, the Internet Fraud Complaint Center(IFCC) was established in order to take a victim's complaint and match it to the proper authority with the legal jurisdiction to prosecute. The IFCC partnered with the FBI and the National White Collar Crime Center (NW3C), a nonprofit group whose members are law enforcement and regulatory agencies at state and local levels, that provides support services to the IFCC and the FBI. When a case held by the IFCC is being investigated by a law enforcement agency, the FBI is brought in. The investigation begins in earnest when there are 10 complaints on file or more than $2,500 in losses. (www.sheriffs.org) "Pennsylvania State Police Upgrade to Get Better Data, Communications" Government Computer News (11/01) Vol. 7, No. 11,; Miller, Jason Pennsylvania State Police officials recently made a $1.3 million agreement with Unisys for the company to provide the law enforcement agency with the Commonwealth Law Enforcement Assistance Network upgrade. The move is an effort to meet the FBI's National Crime Information Center (NCIC) July 2002 deadline, which requires interoperability improvements. The state agency will also receive an entire upgrade to its network, as well as access to the NCIC system, to the national databases of convicts and parolees, and to an automated single-finger matching system. The new initiative will eventually be transformed to a thin-client system able to run the network and tie all the other applications together. According to state police officials, the program will likely beat the July 2002 deadline and "will be much quicker and more user-friendly." (www.gcn.com) "Maryland Patching Safety Nets" Government E-Business (11/20/01); Sarkar, Dibya Maryland state government will spend $400,000 on a plan to install voice and data communications systems in an effort to provide up to five jurisdictions with "fluid communication." The ACU-1000 cross-band radio connector devices are being funded by the Governor's Office of Crime and Control and Prevention, and will provide coverage for law enforcement agencies within most of central Maryland. The voice system, provided by Aether Systems, will be installed within nine months, and 100 of Aether's PocketBlue hand-held computers will be distributed throughout the agencies. In turn, users will receive access to Maryland's Interagency Law Enforcement System database, along with the FBI's National Crime Information System database. (www.fcw.com) "PA Police to Unite E-Records" Federal Computer Week (11/19/01); Robinson, Brian Unisys Corporation was recently awarded a three-year, $17 million contract by the Pennsylvania State Police to integrate its criminal records system, which includes a 2 million documents, into a single electronic document system. One of the components to be integrated is the Pennsylvania Access to Criminal History System (PATCH), which is already Web-based, but has limited capacity, so access is restricted to high-volume users. Upgrading PATCH will mean that users will be able to run criminal background checks on anyone-- perhaps as part of their hiring procedure--and also allow users to pay for the report by credit card. Capt. John Thierwechter, director of the operational records division in the state police Bureau of Records and Identification, says the Unisys program will eliminate the manual task of records comparisons, by doing it electronically, plus it will extend the capacity of the department in that it will allow multi-agency use. Scanning, storing, and imaging are also part of the system. Unisys anticipates it will take about three years to complete the integration with some components, like the new PATCH system and a data archiving system, to be available within a year. (www.fcw.com/fcw) "Emergency Management and Emergency Operations Centers" Police (11/01) Vol. 25, No. 11, P. 32; Douglas, Dave The ability of emergency services was pushed to its limits on Sept. 11, with agencies across the country preparing for more possible terrorist attacks. Emergency Operations Centers (EOC) nationwide work with the Federal Emergency Management Agency to prepare their jurisdictions for catastrophic events, such as natural disasters and airliner crashes. To ready center employees, officials coordinate drills in which the situations are broken down into time-lined events and then played out in real-time to EOC representatives. One of the most important aspects of the job is communication, meaning all representatives have to be able to contact other officials when needed, without interruption. The final most important factor facing EOC officials is the recovery, which tends to include low-interest rate government loan programs, designed to provide supplemental federal disaster grant assistance to help state and local governments. (www.policemag.com) 4268 From: Steve Uhrig Date: Thu Dec 6, 2001 2:24pm Subject: BECCA Affiliation Anyone interested in affiliating with BECCA should visit the new website: http://www.becca-online.org/ and read what you can do for the organization and what the organization might do for you. As most of you know, there are no legal, licensing or regulation, nor any standards for evaluating the true capabilities of TSCM practitioners. Also, there is no single organization to set standards, to where professionals can turn to for assistance in various technical, legal or business affairs affecting sweepers. Further, there is a distinct shortage/absence of readily available training not affiliated with a manufacturer or someone who otherwise sells products. Potential consumers of TSCM services really have no idea how to evaluate the capabilities of someone they may consider engaging., They can rely only on websites, printed matter, hyperbole or periodically references from other consumers. With the exception of references, nothing I just mentioned would separate spy shops from any of the competent practitioners. BECCA affiliation in itself would be a good indicator that the practitioner is serious about his work. And, since membership is not merely an automatic matter of sending in dues and wallpapering your orifice with membership certificates, BECCA membership actually will mean something. BECCA is an acronym for Business Espionage Controls and Countermeasures Association. It was formed by Wil Johnson wiljohnson@w... in 1990. BECCA also offers the CCO (Certified Confidentiality Officer) program, which is training and certification in various related disciplines centering around, but not restricted to, TSCM. See the above website for more info on the CCO program. Since BECCA is becoming more and more accepted in the industry as the only recognized independent organization of sweepers, a CCO certification is the best paper you currently can hold to demonstrate your competency in the field. One does not necessarily need to be a full time trained sweeper with hundreds of sweeps under his or her belt, equipped with a fortune in TSCM gear. To a certain extent, it is the newcomers or less experienced people who most would benefit from BECCA. Membership applications will be considered on an individual basis. Visit the website regardless of your level of experience, and consider whether membership in BECCA might be a good move for your profession or personal interest in TSCM and related information security. I am speaking as a member only, not as anyone who has any authority within BECCA. General questions or discussion would be appropriate for this list. Specific questions or individualized requests would best be addressed to Wil Johnson whose email is listed above. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4269 From: Date: Thu Dec 6, 2001 0:57pm Subject: (no subject) DOJ Discloses AP Subpoena Delay By PETE YOST .c The Associated Press WASHINGTON (AP) - The Justice Department engaged in a highly unusual three-month delay before notifying an Associated Press reporter that it had subpoenaed his home telephone records, according to information released Thursday by a senator. In a Nov. 28 letter to Sen. Charles Grassley, R-Iowa, the department cited no other instance over the past decade where such a long delay had occurred. The letter was in response to Grassley's questions about the subpoenaed phone records of AP reporter John Solomon. In a May 4 story, Solomon disclosed that an FBI wiretap several years ago in an organized crime investigation had intercepted a conversation in which Sen. Robert Torricelli, D-N.J., discussed campaign donations. After the AP story ran, the Justice Department began a criminal investigation to find out who leaked the information about the wiretap. There have been at least 88 instances in the past decade in which the department has authorized subpoenas for the news media, 12 of them for phone records, the DOJ letter said. The others have been for documents or testimony from journalists. The department said that it had engaged in delays in notifying reporters in just four other instances where journalists' phone records were subpoenaed. But those delays were for 45 days or less. The department gave no explanation for the longer three-month delay in the AP leak investigation. Federal prosecutors notified Solomon in an Aug. 20 letter that his phone records had been subpoenaed for the period May 2 to May 7. Grassley asked the Justice Department to identify who decided on the three-month delay. ``The Department of Justice takes very seriously issues regarding freedom of the press,'' but ``we cannot ... ignore our responsibility to investigate and prosecute crimes,'' stated the letter by Assistant Attorney General Daniel Bryant. Grassley said the subpoena was troubling because it sought to discover Solomon's sources. ``Attempts to identify a reporter's sources create a chilling effect on whistle-blowers and others who speak out and expose government action,'' the Iowa senator said. The department detailed 33 cases since 1991 in which the attorney general authorized subpoenas for testimony or documents from the news media for use in criminal trials. Subpoenas for reporters' testimony was authorized 21 times, in most instances to verify the contents of published interviews with defendants. In addition, the government subpoenaed videotapes in nine cases; subpoenaed reporters' notes in two cases; and subpoenaed an editor for copy of a partially published letter from a defendant. AP-NY-12-06-01 1726EST 4270 From: johnjt44 Date: Thu Dec 6, 2001 2:04pm Subject: Re: Internet Provider censors client's Emails Hello, I'm in Suffolk as well; I don't use the library system, but out of curiosity checked into the info on their web site. The page linked only references filtering of certain suspect attachments, not phrases within email. They also state that they do not scan for viruses within email. If they have come up with some sort of phrase list to filter as well, they haven't posted it where they said they did. So the originator of a benign email that bounces due to a phrase has no way of knowing what phrase was the culprit! In fact, I can't think of a useful way for a phrase list to be useful without severely affecting valid email service. For example, If I were to send out information on what to look for to identify a specific virus, I would likely list it's name and whatever signatures identify it. If Subject line phrases and/or affected system files names are being scanned for and email being bounced because of them, such a system will only effectively suppress discussion of the offending topic, not necessarily the virus itself. I am curious to see what your contacts at the library have to say! .JT. --- In TSCM-L@y..., "gkeenan" wrote: > Paul, > > This is very interesting. I haven't checked into it yet, but I'll try to get to it today if possible. > > The provider -- Suffolk Web -- is my provider. As far as I know, no one else on this (or other lists, for that matter) use this provider. So it's gotta be me! > > Oddly enough, I sent out a virus warning on the goner this morning - - and I received a message from the provider that said pretty much the same thing; they didn't forward it. I, like you, used the official name of the virus in my subject line. I figure that when it scanned at the ISP, it caught the name and determined it was an infection by that virus. So also like you, it didn't send the message. At least, not to the identified email addresses in the TO line. It did go to the 80+ addresses on my mailing list 'cause I > always send them BCC. I asked a couple of my subscribers if they received the ISP generated message, and they said they didn't. So apparently the ISP didn't read the other email addresses. But only the ones open to view. And I got queries from both of those; one by email, and the other one called me. > > But now, having mentioned the name of the virus in this email, I'm just wondering if this'll get out!! > > Also, just to let you know, in spite of the message below from my provider, I did, in fact, receive your virus warning!! > > That being the case, I wonder just how good their "screening" system really is?? They say they didn't deliver it because of the possible virus, and yet I received it. And I received it last evening, when you sent it. > > I don't know if I'll get a chance to check on this today (mucho busy), but I'll see about getting hold of someone tomorrow. The system is the one supports all 54 public libraries here in Suffolk County, Long Island. As long as you're a library patron, you get free email/internet access - unlimited. A local provider, so to speak. I know the woman at my local library who runs things for my area, and I know the guy at the ISP location who runs that place. So I'll try and get hold of one of them, if I can, and see what the deal is on this. > > Jerry Keenan 4271 From: bigzerodog Date: Thu Dec 6, 2001 9:35pm Subject: Strange things happenin' on the phone Hello all. I have a client who hears 'autodialer' type dtmfs everytime he picks up his home telephone to place a call, immediately after placing a previous outgoing call. No tones are heard on picking up incoming calls. Phone instruments were switched out and examined with no unusual findings. The same thing happens regardless of the individual instrument. With his permission all calls were monitored for several days, establishing a clear pattern of this occurence. I did not detect any abnormal ac, dc, or rf activity on the line during this time. I learned the dtmfs are the exact number dialed of the previous outgoing call with a varrying four-digit code preceding it - not an area code combination. Client has a very good reason to be concerned. Any ideas? -Eric bugsweeper@e... 4272 From: Bug Sweeper Date: Thu Dec 6, 2001 11:11pm Subject: RE: Strange things happenin' on the phone I should add TDR traces of his line compared with two (accomodating) next door neighbors were virtually identical and inconclusive (to me). SLC about 960 yards away - who knows what's beyond...? Wary about contacting the CO re: nature of client's situation. -Eric -----Original Message----- From: admin@t... [mailto:admin@t...] Sent: Thursday, December 06, 2001 8:51 PM To: bugsweeper@e... Subject: RE: [TSCM-L] Strange things happenin' on the phone Has the telephone company been contacted re there CO switching system? Other possibility is a "slave" type unit located in the SLK. Please let us know what you discover. Best regards, Sean J. Walsh Walsh & Associates www.tscm.net Original Message: ----------------- Wrom: SWZIDREXCAXZOWCONEUQZAAFXISHJEXXIMQ Date: Fri, 07 Dec 2001 03:35:15 -0000 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Strange things happenin' on the phone Hello all. I have a client who hears 'autodialer' type dtmfs everytime he picks up his home telephone to place a call, immediately after placing a previous outgoing call. No tones are heard on picking up incoming calls. Phone instruments were switched out and examined with no unusual findings. The same thing happens regardless of the individual instrument. With his permission all calls were monitored for several days, establishing a clear pattern of this occurence. I did not detect any abnormal ac, dc, or rf activity on the line during this time. I learned the dtmfs are the exact number dialed of the previous outgoing call with a varrying four-digit code preceding it - not an area code combination. Client has a very good reason to be concerned. Any ideas? -Eric bugsweeper@e... ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -------------------------------------------------------------------- mail2web - Check your email from the web at http://mail2web.com/ . 4273 From: evo_team2001 Date: Fri Dec 7, 2001 7:52am Subject: locator pro plus Hi, Can anyone help me out with some information about the manufacturer of the locator pro plus nljd? many thanks and greetings from Holland 4274 From: Matthew Paulsen Date: Fri Dec 7, 2001 1:54am Subject: RE: Re: Internet Provider censors client's Emails Had one client complaining that her daily exe's for transaction reports to her accounting system from the bank weren't showing up. Easystreet.Com the ISP (a large local one in Portland, Oregon) decided to institute exe filtering without asking their clients if this was ok. Just arbitrary.. They sent out a letter to everyone after they had implemented it - no .exe attachments. As far as I know it is still in effect. Want to send an exe, zip it is their response. Just wrong if you ask me. Be an ISP, not a security company, otherwise I'll go sell dialup accounts and frame relay circuits and see how an ISP likes it :P. I pulled all my clients out of their network when they did it. Put the aforementioned client on a direct T1 to "resolve" any future potential issues of this nature. Needless to say, they lost my business. <10 minute pause> Woah.. Just had something strange happen.. It appears someone is trying to hack an account I have with an ISP. Their spoofing my wife's email addy... oh goody.. more fun stuff to deal with.. -----Original Message----- From: johnjt44 [mailto:tierneyj@c...] Sent: Thursday, December 06, 2001 12:04 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Internet Provider censors client's Emails Hello, I'm in Suffolk as well; I don't use the library system, but out of curiosity checked into the info on their web site. The page linked only references filtering of certain suspect attachments, not phrases within email. They also state that they do not scan for viruses within email. If they have come up with some sort of phrase list to filter as well, they haven't posted it where they said they did. So the originator of a benign email that bounces due to a phrase has no way of knowing what phrase was the culprit! In fact, I can't think of a useful way for a phrase list to be useful without severely affecting valid email service. For example, If I were to send out information on what to look for to identify a specific virus, I would likely list it's name and whatever signatures identify it. If Subject line phrases and/or affected system files names are being scanned for and email being bounced because of them, such a system will only effectively suppress discussion of the offending topic, not necessarily the virus itself. I am curious to see what your contacts at the library have to say! .JT. --- In TSCM-L@y..., "gkeenan" wrote: > Paul, > > This is very interesting. I haven't checked into it yet, but I'll try to get to it today if possible. > > The provider -- Suffolk Web -- is my provider. As far as I know, no one else on this (or other lists, for that matter) use this provider. So it's gotta be me! > > Oddly enough, I sent out a virus warning on the goner this morning - - and I received a message from the provider that said pretty much the same thing; they didn't forward it. I, like you, used the official name of the virus in my subject line. I figure that when it scanned at the ISP, it caught the name and determined it was an infection by that virus. So also like you, it didn't send the message. At least, not to the identified email addresses in the TO line. It did go to the 80+ addresses on my mailing list 'cause I > always send them BCC. I asked a couple of my subscribers if they received the ISP generated message, and they said they didn't. So apparently the ISP didn't read the other email addresses. But only the ones open to view. And I got queries from both of those; one by email, and the other one called me. > > But now, having mentioned the name of the virus in this email, I'm just wondering if this'll get out!! > > Also, just to let you know, in spite of the message below from my provider, I did, in fact, receive your virus warning!! > > That being the case, I wonder just how good their "screening" system really is?? They say they didn't deliver it because of the possible virus, and yet I received it. And I received it last evening, when you sent it. > > I don't know if I'll get a chance to check on this today (mucho busy), but I'll see about getting hold of someone tomorrow. The system is the one supports all 54 public libraries here in Suffolk County, Long Island. As long as you're a library patron, you get free email/internet access - unlimited. A local provider, so to speak. I know the woman at my local library who runs things for my area, and I know the guy at the ISP location who runs that place. So I'll try and get hold of one of them, if I can, and see what the deal is on this. > > Jerry Keenan ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4275 From: Steve Uhrig Date: Sat Dec 8, 2001 0:21am Subject: TDRs available at excellent prices Hi all, Having just finished a large job which took ten months to complete and involved running several miles of cable underground, I have a number of TDRs we no longer need. These are Riser Bond 2401B+ models, and one 2401C which is essentially the identical unit. Most come with padded cases and shoulder strap, new or very recent nicads packs, a bound manual, a battery charger and test leads. Check here for info on TDRs in general, also an excellent tutorial on using TDRs: http://www.riserbond.com/ Also good info is here on using TDRs specifically for TSCM: http://www.tscm.com/tdr.html Specs can be found here: http://www.tscm.com/rids2901.html For this TDR, it is most effective if you parallel the output with an oscilloscope. You can do this using a simple BNC Tee adapter. I used a 2401 TDR for 100% of my TSCM until I picked up a large client this year where I would be using a TDR several times a week so I bought a real fancy Riser Bond model the client paid for. The 2401 is kind of a standard TDR for sweepers. It is compact, reliable, rugged, and extremely easy to use. It will tell you in feet the distance to the fault, where looking at the trace on a scope will tell you something about what is connected to the line out there. You can easily see a series tap, a parallel tap, a bridge or anything on the line. These things are so sensitive you will have to try it to believe it. They will read rat piss on the wires with only the smallest bit of practice. Although you can use any scope with 50 megacycle or better frequency response, I used a Fluke Scopemeter, Velcroed both it and the TDR to a legal sized clipboard, and hung it in a convenient place in the telephone closet. I could work without having to diddle with the equipment, and it all made a compact, effective package. EVERY serious sweeper needs a TDR. Most start with this one, and many never see the need to progress further. Yes, the 2401 series of TDRs will read wet (powered) lines. And you can read coax as well as any type of metallic conductor. It works especially well on phone lines. Prices range from $500 to $750 depending on exact model, condition and accessories. All are guaranteed to work. Email me if interested. If you are a sweeper, or thinking of getting into the profession, you need a TDR. It is not optional. Here is your opportunity. Tessco's current price for the 2901 is $1095. You can get one for half of that. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4276 From: zack <10-33@c...> Date: Sat Dec 8, 2001 4:19am Subject: Re: Digest Number 791 Is this what you are looking for: http://www.tscm-southafrica.com/ At 10:01 AM 12/8/2001 +0000, you wrote: >From: "evo_team2001" >Subject: locator pro plus > >Hi, > >Can anyone help me out with some information about the manufacturer >of the locator pro plus nljd? > >many thanks and greetings from Holland visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "War has been waged against us by stealth and deceit and murder. This nation is peaceful, but fierce when stirred to anger. This conflict was begun on the timing and terms of others. It will end in a way, and at an hour, of our choosing. " George W Bush President of the United States America God Bless The USA http://www.copscops.com/blessusa.htm 4277 From: Charles P Date: Sat Dec 8, 2001 4:37pm Subject: looking for Microlab Superscout manual I would like to find a copy of a manual for the Microlab Superscout. If anyone is willing and able to make a copy of one I would appreciate hearing from you. Thanks Charles Charles Patterson charles@t... Tarrytown, NY www.telephonesecurity.com 4278 From: Dawn Star Date: Sat Dec 8, 2001 10:30pm Subject: Dialer Tap This sounds like a dialer tap, a unit that that taps into a targets phone line and also feeds to a second phone line under the tappers control. When the target lifts his phone the dialer tap puts one or two tones across the covert line so it auto dials to the listening post and when the listening post answers, the dialer connects the targets line to the listening post where it is recorded. Roger Tolces Electronic Security www.bugsweeps.com Date: Fri, 07 Dec 2001 03:35:15 -0000 From: "bigzerodog" Subject: Strange things happenin' on the phone Hello all. I have a client who hears 'autodialer' type dtmfs everytime he picks up his home telephone to place a call, immediately after placing a previous outgoing call. No tones are heard on picking up incoming calls. Phone instruments were switched out and examined with no unusual findings. The same thing happens regardless of the individual instrument. With his permission all calls were monitored for several days, establishing a clear pattern of this occurence. I did not detect any abnormal ac, dc, or rf activity on the line during this time. I learned the dtmfs are the exact number dialed of the previous outgoing call with a varrying four-digit code preceding it - not an area code combination. Client has a very good reason to be concerned. Any ideas? -Eric bugsweeper@e... 4279 From: James M. Atkinson Date: Sat Dec 8, 2001 9:54pm Subject: An engineer's view of Santa and Christmas An engineer's view of Santa and Christmas... There are approximately two billion children (persons under 18) in the world. However, since Santa does not visit children of Muslim, Hindu, Jewish or Buddhist (except maybe in Japan) religions, this reduces the workload for Christmas night to 15% of the total, or 378 million (according to the population reference bureau). At an average (census)rate of 3.5 children per household, that comes to 108 million homes, presuming there is at least one good child in each. Santa has about 31 hours of Christmas to work with, thanks to the different time zones and the rotation of the earth, assuming east to west (which seems logical). This works out to 967.7 visits per second. This is to say that for each Christian household with a good child, Santa has around 1/1000th of a second to park the sleigh, hop out, jump down the chimney, fill the stocking, distribute the remaining presents under the tree, eat whatever snacks have been left for him, get back up the chimney, jump into the sleigh and get onto the next house. Assuming that each of these 108 million stops is evenly distributed around the earth (which, of course, we know to be false, but will accept for the purposes of our calculations), we are now talking about 0.78 miles per household; a total trip of 75.5 million miles, not counting bathroom stops or breaks. This means Santa's sleigh is moving at 650 miles per second -- 3,000 times the speed of sound. For purposes of comparison, the fastest man made vehicle, the Ulysses space probe, moves at a pokey 27.4 miles per second, and a conventional reindeer can run (at best) 15 miles per hour. The payload of the sleigh adds another interesting element. Assuming that each child gets nothing more than a medium sized LEGO set (two pounds), the sleigh is carrying over 500 thousands tons, not counting Santa himself. On land, a conventional reindeer can pull no more than 300 pounds. Even granting that the "flying" reindeer can pull 10 times the normal amount, the job can't be done with eight or even nine of them -- Santa would need 360,000 of them. This increases the payload, not counting the weight of the sleigh, another 54,000 tons, or roughly seven times the weight of the Queen Elizabeth (the ship, not the monarch). Six hundred thousand (600,000) tons traveling at 650 miles per second creates enormous air resistance -- this would heat up the reindeer in the same fashion as a spacecraft re-entering the earth's atmosphere. The lead pair of reindeer would adsorb 14.3 quintillion joules of energy per second each. In short, they would burst into flames almost instantaneously, exposing the reindeer behind them and creating deafening sonic booms in their wake. The entire reindeer team would be vaporized within 4.26 thousandths of a second, or right about the time Santa reached the fifth house on his trip. Not that it matters, however, since Santa, as a result of accelerating from a dead stop to 650 m.p.s. in .001 seconds, would be subjected to acceleration forces of 17,000 g's. A 250-pound Santa (which seems ludicrously slim) would be pinned to the back of the sleigh by 4,315,015 pounds of force, instantly crushing his bones and organs and reducing him to a quivering blob of pink goo. Therefore, if Santa did exist, he's dead now. Merry Christmas, everybody. -jma -- ------------------------------------------------------------------------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ------------------------------------------------------------------------------------------ James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ------------------------------------------------------------------------------------------ "Success without honor is an unseasoned dish; it will satisfy your hunger, but it won't taste good." ------------------------------------------------------------------------------------------ 4280 From: Charles P Date: Sat Dec 8, 2001 10:14pm Subject: Re: Final Report >exceptions, in my over 2500 sweeps I have never given a conditional >report. Hmmm, I think ALL of my reports have been conditional. "AT THE TIME of the inspection, no devices were found... etc." And there are limits to all tests, so results really are conditional based on the level of testing performed. How that gets phrased to the client can be significant, though. cp ----- Original Message ----- From: "Dawn Star" To: Sent: Thursday, December 06, 2001 1:39 PM Subject: [TSCM-L] Final Report > I want to post this small piece of a private discussion that I am having > with another sweeper, Roger > > >It has always been my view, supported by my experience, that telephone > >company's provide no security at all in protecting their subscribers from > >privacy attacks. This is one of the main reasons people hire us to attempt > >to protect themselves from this indifference and incompetence. Let's face > >it, the phone company will tell you that their job is communications not > >customer privacy. > >By default we must assume this domain. > >The first day I started my service 28 years ago, I felt that there was > >only two answers that can be given at the end of a sweep. Yes you have > >your privacy and no you are not bugged, or you don't have you privacy and > >you are bugged. There are obviously some exclusions such as if you use a > >R.F. convenience phones they are giveaways. But with those kind of > >exceptions, in my over 2500 sweeps I have never given a conditional > >report. It is not in my professional vocabulary to say I'm not sure, due > >to conditions beyond my control, or not my job, go talk to your phone > >company. > > Roger Tolces > Electronic Security > www.bugsweeps.com > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4281 From: Matthew Paulsen Date: Sat Dec 8, 2001 10:15pm Subject: RE: Dialer Tap Just oddball questions.. maybe something will spark... or not. Is the client inside or outside the US? Canadian? UK? Is the client involved in any IP telephony research? So the format is "xxxx"+"lastnumberdialed" and xxxx is a random sequence every time? Perhaps a 4 digit dialer tap? Is the client using a least cost routing system for phone calls/indirect access telco and/or using a local PBX to bridge out from his location? Have you recorded the information to tape or mpeg or some other audio format and tried replaying the dtmf back on a remote payphone and seeing what happens? I'm not certain if NANPA (or even if NANPA is the right name these days) is 3 or 4 digit these days since I don't do much telco work, but have you confirmed it doesn't match NANPA? Have you checked with Lockheed Martin IMS? Does the NPA first digit fall outside the 2-9 range? Is it possible that the CO is using a 4 digit prefix switch as a test and he's hearing a conversion from 4 to 3? Can you transfer him off the telco to a cable company for digital voice over cable? -----Original Message----- From: Dawn Star [mailto:bratkid@e...] Sent: Saturday, December 08, 2001 8:31 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Dialer Tap This sounds like a dialer tap, a unit that that taps into a targets phone line and also feeds to a second phone line under the tappers control. When the target lifts his phone the dialer tap puts one or two tones across the covert line so it auto dials to the listening post and when the listening post answers, the dialer connects the targets line to the listening post where it is recorded. Roger Tolces Electronic Security www.bugsweeps.com Date: Fri, 07 Dec 2001 03:35:15 -0000 From: "bigzerodog" Subject: Strange things happenin' on the phone Hello all. I have a client who hears 'autodialer' type dtmfs everytime he picks up his home telephone to place a call, immediately after placing a previous outgoing call. No tones are heard on picking up incoming calls. Phone instruments were switched out and examined with no unusual findings. The same thing happens regardless of the individual instrument. With his permission all calls were monitored for several days, establishing a clear pattern of this occurence. I did not detect any abnormal ac, dc, or rf activity on the line during this time. I learned the dtmfs are the exact number dialed of the previous outgoing call with a varrying four-digit code preceding it - not an area code combination. Client has a very good reason to be concerned. Any ideas? -Eric bugsweeper@e... ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4282 From: tek492p Date: Sun Dec 9, 2001 9:43pm Subject: Re: Strange things ... >Phone instruments were switched out ... Were the phones switched out with the excact same model of phone? If so, try a completely different manufacturer and model of phone. If the phone line (home) is a CO line, this should not be a problem. >I learned the dtmfs are the exact number dialed of the previous outgoing call ... Could be a malfunctioning "redial" feature of the phone. Again, try a completely different model of phone. If the results are the same, suspect a dialer tap / slave. Jack 4283 From: tek492p Date: Mon Dec 10, 2001 3:37am Subject: Strange things... Part 2 > I learned the dtmfs are the exact number dialed of the previous outgoing call... Come to think of it, (see my last post), the way a so-called "dialing tap" works is like this: Whenever the target line goes off-hook, on an outgoing or incoming call, the "dialing tap" (which requires a second phone line, to bridge across the target line) will dial the listening post and send the target's audio to the LP. The dialing tap must be programmed with the LP's number. If this device is discovered, it will lead the men-in-black to the eavesdropper, since it is programmed to dial the LP. So this is a short-term use device. The client hears the last number HE dialed on outgoing calls only. It seems to me that a telephone instrument "redial" feature is malfunctioning. Disconnect the phone line where it enters the house. Connect a linemans test set to the CO side and place a few calls. If everything works normally, then the house phone instruments could be messed-up. If you still hear the DTMF tones on outgoing calls, then something is happening at the CO. Jack 4284 From: James M. Atkinson Date: Mon Dec 10, 2001 11:46am Subject: New for 2002 - Eavesdropping Threat Profile Happy Holidays Folks, I have a project that I am considering starting in a few weeks where once a month where I profile in detail a specific eavesdropping device from a TSCM practitioners view point. In a nutshell, it will be a detail technical overview of very specific eavesdropping threat, and specifically how it can be detected and located. I will start with some of the more common items openly being sold in Spyshops, and will cover numerous items of historical significance as well as modern threats. If there is sufficient demand I could be convinced to make the posting weekly instead of monthly. Any thoughts? I plan to start the first week of January. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4285 From: Date: Mon Dec 10, 2001 8:21am Subject: Re: New for 2002 - Eavesdropping Threat Profile In a message dated 12/10/01 9:51:42 AM Pacific Standard Time, jmatk@tscm.com writes: << In a nutshell, it will be a detail technical overview of very specific eavesdropping threat, and specifically how it can be detected and located. >> Great idea. An excellent starting point might be the Radio Shack 43-1236. In the 2002 catalog it's on page number 52. They're many other manufacturers of this device. They've been around forever. Michael 4286 From: James M. Atkinson Date: Mon Dec 10, 2001 1:59pm Subject: Re: New for 2002 - Eavesdropping Threat Profile Good, I will add that item, and similar devices to the list of intended targets. They are VERY easy to find with a TDR, especially if you can get two pair in the cable and can run a cross-talk analysis. -jma At 2:21 PM -0500 12/10/01, MACCFound@a... wrote: >In a message dated 12/10/01 9:51:42 AM Pacific Standard Time, jmatk@tscm.com >writes: > ><< In a nutshell, it will be a detail technical overview of very > specific eavesdropping threat, and specifically how it can be > detected and located. >> > >Great idea. An excellent starting point might be the Radio Shack 43-1236. >In the 2002 catalog it's on page number 52. They're many other manufacturers >of this device. They've been around forever. > >Michael -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4287 From: James M. Atkinson Date: Mon Dec 10, 2001 2:05pm Subject: The Cave From: BinLaden,Osama Sent: Monday, December 10, 2001 8:17 AM To: Cavemates Subject: The Cave Hi guys. We've all been putting in long hours but we've really come together as a group and I love that. Big thanks to Omar for putting up the poster that says "There is no I in team" as well as the one that says "Hang In There, Baby." That cat is hilarious. However, while we are fighting a jihad, we can't forget to take care of the cave. And frankly I have a few concerns. First of all, while it's good to be concerned about cruise missiles, we should be even more concerned about the scorpions in our cave. Hey, you don't want to be stung and neither do I, so we need to sweep the cave daily. I've posted a sign-up sheet near the main cave opening. Second, it's not often I make a video address but when I do, I'm trying to scare the most powerful country on earth, okay? That means that while we're taping, please do not ride your razor scooter in the background. Just while we're taping. Thanks. Third point, and this is a touchy one. As you know, by edict, we're not supposed to shave our beards. But I need everyone to just think hygiene, especially after mealtime. We're all in this together. Fourth: food. I bought a box of Cheez-Its recently, clearly wrote "Osama" on the front, and put it on the top shelf. Today, my Cheez-Its were gone. Consideration. That's all I'm saying. Finally, we've heard that there may be American soldiers in disguise trying to infiltrate our ranks. I want to set up patrols to look for them. First patrol will be Omar, Muhammad, Abdul, Akbar, and Richard. Love you lots. Osama -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4288 From: James M. Atkinson Date: Mon Dec 10, 2001 2:20pm Subject: Corporate TSCM Policy Guide I have developed a "boiler-plate" or model Corporate TSCM Policy Guide that may be of some assistance to the list membership. I wrote it in such a way that it could be applied to anything from a very small public company to the larger multi-billion public corporations. It is rather long and detailed, but I can post it to my website as an html document if anybody is interested. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4289 From: A Grudko Date: Sun Dec 9, 2001 6:26am Subject: Final Report - Am I missing something? - Original Message - > in my over 2500 sweeps I have never given a conditional report. Every TSCM report I have given in 20 years has been conditional. Apart from the constantly changing spy-v-spy game of who's equipment/skill is better, me or the bugger, and the rapid changing technology I cite, there's one condition I write into not only every report but into every QUOTE even before I start... If I detect surveillance legally put in place by the government I will not inform the client of that and the clients know it - a simple condition that has probably kept me out of jail on a few occasions. I've also had a client who at the end of the sweep wanted a guarantee that he was not under surveillance from entities within the Andromeda constellation! As I'm not familliar with their technology (even jma might fall short here) I had to say no. Sometimes in life, conditions apply. I'm not suggesting that Roger (who did refer to exceptions and most of us would see Andromedean bugs as exceptions) is operating in any illegal or unethical way. I'm simply presenting the idea that in TSCM, as in life, conditions ALWAYS apply. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4290 From: The Dog's Bollix Date: Mon Dec 10, 2001 4:14pm Subject: Re: Corporate TSCM Policy Guide I certainly would be interested. Thank you, --- "James M. Atkinson" wrote: > > I have developed a "boiler-plate" or model Corporate > TSCM Policy > Guide that may be of some assistance to the list > membership. > > I wrote it in such a way that it could be applied to > anything from a > very small public company to the larger > multi-billion public > corporations. > > It is rather long and detailed, but I can post it to > my website as an > html document if anybody is interested. > > -jma > -- > > -------------------------------------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The > Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site > on the Internet. > -------------------------------------------------------------------------------------------------- > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008jmatk@tscm.com > -------------------------------------------------------------------------------------------------- > People sleep peaceably in their beds at night > only because rough > men stand ready to do violence on their behalf. > - George Orwell > > -------------------------------------------------------------------------------------------------- > __________________________________________________ Do You Yahoo!? Send your FREE holiday greetings online! http://greetings.yahoo.com 4291 From: Steve Uhrig Date: Mon Dec 10, 2001 7:52pm Subject: Space Shuttle Audio If anyone cares, you can hear a live feed of Shuttle to ground audio on this site: http://www.chron.com/content/interactive/space/vdo/ Click on Station Audio. You will need Real Player installed, but it is a free plugin with no side effects. Lot of interesting activity, perfect audio. They are talking about quail eggs now and how they expect they will develop in zero gravity. Anyone with shortwave capability also can copy retransmissions on all of the amateur bands, but I don't have the freqs offhand. Steve (WA3SWS) ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: Fernando Martins Date: Sat Dec 6, 2003 7:20am Subject: Re: Re: Traffic Speed Detection I know Nokia have radars for speed detection. There are even some stories about how with a cellphone one can detect those radars ... some years ago this was cover story on a newspapers here. Somehow at the time my nokia 6*** (GSM900, 5year old model) had a strange life experience :> Anyway ... with two infrared sensors it's possible/easy to build a little device for speed detection (details at Elektor magazine?). FM ----- Original Message ----- From: "mpaulsen6" To: Sent: Thursday, December 04, 2003 9:06 PM Subject: [TSCM-L] Re: Traffic Speed Detection > Try submitting a discovery request with your county, you might get > some information. I'm not certain if you need active litigation for > a discovery request or not. > > > --- In TSCM-L@yahoogroups.com, "Ocean Group" wrote: > > Does anyone on the list have any experience with fixed speed > detection > > systems? > > > > Or know of any companies or manufacturers of this type of system? > > > > Appreciate any input > > > > Regards > > > > Oisin > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 8045 From: Fernando Martins Date: Sat Dec 6, 2003 7:31am Subject: Re: Re: Traffic Speed Detection a little add ... at ifsec site probably there are (uk) manufacturers listed. At latest securex here at Lisbon I did visit some exhibitors with those devices, but since was not my reason to be there, I even don't remember more details. http://www.ifsec.co.uk http://segurex.fil.pt (all in portuguese) FM 8046 From: Date: Sun Dec 7, 2003 3:56am Subject: FBI tapped 3 other offices FBI tapped 3 other offices Posted on Sun, Dec. 07, 2003 Phones of Ronald A. White, a second Street ally, and the city treasurer were targeted. By Emilie Lounsberry and Nancy Phillips Inquirer Staff Writers Besides bugging Mayor Street's office, the FBI tapped the office phones of the city treasurer and two of the mayor's most influential political allies. Federal authorities placed wiretaps on the phones of Center City power broker Ronald A. White; city Treasurer Corey Kemp; and Imam Shamsud-din Ali, a prominent Muslim cleric, according to court-system sources familiar with aspects of the investigation. White, 54, a top political ally of the mayor's and a major player in the city's lucrative government bond business, has emerged as a central figure in the wide-ranging inquiry that has shaken City Hall. Last week, John Christmas, a deputy chief of staff in the mayor's office, testified before a federal grand jury that has begun reviewing evidence in the case. In an interview yesterday, he declined to disclose the focus of the prosecutor's questions or to say what he had told the panel. Christmas said he did not want to "aggravate" federal authorities. "I really don't want to run afoul of them," he said. The wide use of phone taps underscores the ambition and reach of the federal corruption investigation. Conversations recorded from the taps may have provided the evidence needed to persuade a judge to take the extraordinary step of allowing the government to place a listening device in the ceiling of Street's City Hall office. Investigators have played tapes or cited details of recorded conversations as they have questioned people who had dealings with White. The tap on White's phone was in place for six to nine months, according to sources in the court system, speaking on the condition of anonymity. Two people also said that federal agents, during an FBI raid in October at White's Center City law office, intimated by their remarks that they had information from taped conversations. "They were clearly trying to [say] this office was bugged so don't lie to us," said one person. The FBI, with the permission of a federal judge, also had a tap on the office phone of Kemp, 34, who quit as city treasurer last month amid reports that the FBI had been pressing him to cooperate in the investigation. Kemp's lawyer, Michael McGovern, could not be reached for comment Friday. As treasurer, Kemp played an important role in bond deals, bringing together lawyers, financial advisers and underwriters. With the finance director and the Mayor's Office, the treasurer helps determine who gets a share of the hefty fees from bond work. Another phone tap, one source said, was at the office of Keystone Information & Financial Services, a business run by Ali, 54, a longtime backer of Street's whose business enterprises collected $1.2 million in city fees in fiscal year 2002 alone. Ali's lawyer, Joel Slomsky, declined to comment yesterday. Reelected by a landslide Federal agents searched Ali's home and offices and confiscated documents and computers on Oct. 8, the day after the bug was found in the mayor's office and the federal investigation became public - during the height of Street's reelection campaign. Street, who was subsequently identified as a subject of the investigation, has insisted that he has engaged in no wrongdoing. He was reelected to a second term by a landslide on Nov. 4. The bug planted in his office, which was in place for two weeks, did not record any incriminating evidence, The Inquirer has previously reported. The investigation has reached into many corners of city government, from the Housing Authority to the Finance Department to the Board of Pensions to the Minority Business Enterprise Council to the Philadelphia International Airport. As investigators seek to follow the money that drives the city's business, contractors, investment advisers and Commerce Bank have received subpoenas. Commerce Bancorp announced in a filing last week that it will extend to Pennsylvania and to the rest of the nation its suspension of political contributions while it evaluates the "reputation risks" of such activity. In April, Commerce - long known for its extensive political ties - said it would stop making political contributions in New Jersey. White quit as a member of the board of directors at Commerce's Pennsylvania subsidiary on Oct. 16, the day his office was raided by the FBI. Federal prosecutors are investigating possible violations of the Hobbs Act, the anti-extortion law often used to prosecute public officials, and also are looking for evidence of bid-rigging, according to documents. White's lawyer, Creed Black Jr., declined to comment on the federal inquiry. Primary fund-raiser White has been one of Street's primary fund-raisers, contributing $234,000 through two political action committees since Street became mayor. He has received $2.6 million in bond fees and other legal work for the city. The effort to obtain secretly recorded conversations is regarded as a critical element in public corruption investigations, which are among the most difficult cases to initiate and prosecute. Dennis J. Cogan, a veteran Center City defense lawyer, said that in a case involving campaign contributions, prosecutors would have to show a specific "quid pro quo" relationship between a contribution and the award of a contract. "It's got to be explicit," he said. Temple University law professor Charles H. Rogovin called electronic surveillance "an essential part of the arsenal" used by prosecutors to target corruption. "To a high degree, you need electronic surveillance," he said. "There's nothing better to corroborate testimony than the tape." And one bug often leads to another. Investigators "like to get recordings and then leapfrog to the next level," said one defense lawyer, who said that a phone tap in White's office could have been what provided probable cause to place a bug in the mayor's office. Rogovin said that the premature discovery of the bug in the mayor's office may have hurt the investigation, but that it may not have been permanently compromised. "I'd be surprised if they're not working assiduously," Rogovin said of federal agents and prosecutors. One local lawyer, meanwhile, said that the multifaceted investigation has caused a lot of jitters at City Hall and among people who do business with the city. "A lot of people are pretty scared in this town," he said. http://www.philly.com/mld/inquirer/news/local/7430620.htm [Non-text portions of this message have been removed] 8047 From: Date: Sun Dec 7, 2003 11:24am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 8048 From: Date: Sun Dec 7, 2003 11:24am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 8049 From: kondrak Date: Sun Dec 7, 2003 4:59pm Subject: This is funny... For you telco guys, this is a howl.... http://www.pcuf.fi/~pjt/pink/dogbark.html 8050 From: Steven Donnell WA1YKL Date: Thu Nov 27, 2003 5:29pm Subject: Re: The difference between an amater and a professional? Whats a matter? Worried youre paying too much for your "instruments"?? Or do your expect the average person(M/F) to lug an HP SpecA around w/ them, or pay for a sweep each time they use a restroom... Gadgets are fine if you know how to use them and what their limitations are. I use one of those "gadgets" called the "Prvacy Guard" for quick checks and to root out the specific location of low power transmitters all the time. Very discrete way to tell if a person is wearing a "wire" too. Just because it doesnt come w/ the high price label, doesnt mean its not effective. Steve cornali@r... wrote: > An amateur plays with gadgets, a professional studies his instruments. > > For your entertainment, here is some SPAM I received today. > > ----- Inoltrato da Remo Cornali/dsi/enti centrali/rcs/it il 27/11/2003 > 14.36 ----- > > "Charlyn Coxum" > otmail.com> Cc: > Oggetto: cornali Anti-Spy Device Detects Hidden Cams > 27/11/2003 05.27 > > > > Dear: > cornali@r... > > (Embedded image moved to file: pic18467.gif) > > Gadget roots out hidden `pervert' cams > > > Big Brother is here, big time. You may not know > it but you may be watched in places where you'd > expect privacy - such as dressing rooms, hotel > rooms, tanning beds, private offices, public > washrooms etc. Now there is a device that can > detect the presence of a hidden camera or any > device that emits an electronic signal. > > A woman can use this device to check their > surroundings when > she goes in a washroom or any place where a > camera may be hidden. CLICK HERE for details. > > > unsubscribe > > cornali lXS > > 506Z > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 8051 From: Thomas Shaddack Date: Fri Nov 28, 2003 4:25am Subject: Easy introduction to quantum physics Quantum physics is an esoteric field few people know something about. Even fewer can actually imagine the quantum-scale effects. To counter this problem, George Gamow, a famed and excellent physicist, wrote couple imagination-heavy books illustrating the concepts. The hero of the books is a mild-mannered bank clerk, Mr. Tompkins, attending advanced physics lectures, sleeping through them, and having weird dreams. Couple years ago I read "Mr. Tompkins in Wonderland". Good part of my (more fragmented than I'd like to admit, though) understanding of quantum and relativistic effects comes from there. From secondhand online recommendations I'd suggest the updated edition, "The New World of Mr. Tompkins": http://pdxbooks.com/compare/0521630096 http://books.cambridge.org/0521639921.htm 8052 From: Date: Sun Dec 7, 2003 6:27pm Subject: Re: Q Crypto - I don't understand Heisenberg's Uncertainty Principle states that any observation of a quantum system changes the system being observed. The fundamental crux of quantum crypto is a laser capable of emitting one photon of light at a time (one for each end of the conversation), each of which uses shifts between the four states of a photon to transmit information. Observing a photon "on the wire" causes the photon under observation to jump to a well-defined state (a specific polarization), so the act of eavesdropping on the communication path causes each photon that has been "looked at" to jump to a different state/polarization, which in turn changes the information en route and alerts the receiving end that information has been eavesdropped on and thus modified in transit as a result. The theory has been proven, but lasers capable of emitting one photon at a time remain the hardest part of a quantum crypto implementation. Similar communications systems attempt to exploit entanglement properties of photons, but that is more about so-called "super luminal" communications without propagation delay vs. secure comms. ---------- >There must be something I am not understanding here, esp the first sentence above. Definitely in the second as well. My company manufactures a pager intercept system (we call it the Beeper Buster). If I sit it on my desk, I can grab any pager or message off the air. The RF I grab and ultimately demodulate and process is passing through the room, walls, my body anyway, whether I happen to have the antenna connected the system's receiver or not. My metal ballpoint pen is picking up a similar amount of RF from the paging system transmitter as the short whip on the receiver of the Beeper Buster. Many/most pager messages anymore, at least in the U.S., are simulcast by anywhere from a few dozen to several tens of thousands of transmitters, on 9xx megacycles. Read the first sentence above. How can my intercepting a pager message off the air allow anyone to know I am doing so? I'm eavesdropping, but I'm doing nothing materially different than a standard pager programmed to the proper frequency and capcode of the target. By the same token, my pager intercept system converts no more RF to electricity than my metal ballpoint pen. I well admit I don't understand all the math and theory, but just taking the simple statement above, apparently I don't understand a basic concept. I could name numerous intercept techniques where I don't believe, in actual practice or even pure theory, the fact I am intercepting could be known by technical means. ??? Please keep explanations fairly simple as I am not conversant in quantum physics. Now I will go back to my work on the Unified Field Theory. Steve (does the name Pavlov ring a bell?) ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8053 From: Edward Yagger Date: Sat Nov 29, 2003 0:41am Subject: TSCM membershipn Thanks !!! Thanks for letting me into this group. I am (slowly through the years) learning this fine art called TSCM. I have been involved in electronics for the last 10 years and I have obtained my "general class license" in the amateur radio field. I have been a "ham" for the last 11 years. I am currently studying for my F.C.C. electronic technician class certification with radar endorsement. I am very interested in TSCM and the studies of it. looking forward in meeting new friends and sharing ideas. Thanks Edward Yagger N2VRT --------------------------------- Do you Yahoo!? Free Pop-Up Blocker - Get it now [Non-text portions of this message have been removed] 8054 From: Thomas Habets Date: Sat Nov 29, 2003 8:16pm Subject: Re: Re: Q Crypto - I don't understand -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Disclaimer: Note that I am not a physicist, I'm just interested in lots of things and have read some books on quantum physics. (Steve had problems sending me mail off-list, I get the list mail ok, but if anyone else has problems, try thomas@h... instead, without the .pp) The short version is: You can create a secure non-sniffable channel if your communications channel only send one photon per bit. Think fiber with one photon (light-particle) per bit. And you need a media (air/fiber) that goes end-to-end between the communicating parties. This mail does not discuss quantum computing, breaking normal cryptos and factoring numbers. Quantum computing can not break quantum crypto though. On Friday 28 November 2003 09:21, Steve Uhrig wrote: > If I sit it on my desk, I can grab any pager or message off the air. Ah, but you see, quantum physics doesn't "make sense" in the classical sense. Heh, the above sentense is the core of quantum physics. When you discuss features from quantum physics, everything you're used to breaks down. And it's not "just theory", an estimated 80% of all devices we have in our homes would not work if quantum physics was wrong. There is no experiment that violates quantum theory. None. Quantum "crypto" is actually a "secure quantum channel", where you send individual photons with certain properties. If you "read" the photon incorrectly, then you get a random value[1] and the information gets lost. You can therefore not read the property multiple times to brute-force the correct way to read it. As far as I know, quantum crypto is not something you can do over the air in a omnidirectional sort of way. But maybe it could be used in some smart way to enable that too. You'd have to watch out for sending multiple photons in the same state though, since that would enable multiple reads[2]. Laser links should work fine. Quantum crypto doesn't really prevent anyone from measuring the particles (see below how it works). But it does detect it, since an incorrect guess on the correct way to read a signal photon destroys the information in it, which will then never reach the recipient. As long as the communicating parties are never fooled into "giving up, since the damn crypto never works" (which would imply an evesdropper) they can leave the fiber (or whatever communications media) unprotected, without fear of sniffing. So, quoting Bruce Schneier in Applied Cryptography (chapter 23.16): "The laws of physics secure this quantum channel: even if the evesdropper can do whatever he wants, even if the evesdropper has unlimited computing power, even if P=NP." He also has pointers to how to do: quantum key distribution q. coin flipping q. bit commitment q. oblivious transfer q. secure multiparty computation More fun on quantum physics (an actual experiment too): There is a property called "polarization". Visualize it as an arrow at 90 degrees from a beam of light (forming a "T" with the lightbeam, sort of, where the lightbeam is the top of the "T"). The arrow can point anywhere within these 360 degrees. When we "read" the polarization value, we check "is it pointing this perticular way?", and we get "yes" or "no". The probability for a "yes" is higher the more correct we are. If the answer is "yes" then the photon is polarized exactly as we set up the test. If we get "no", then the photon is polarized EXACTLY 90 degrees off from our test. So a "no" in a vertical test means that the photon *is* polarized exactly horizontally. You can not get a "maybe" from these tests. If you test for vertical polarity and the photon is polarized diagonally, then you will have a 50% probability of "yes", and 50% of "no" ("yes" being vertical polarity and "no" being horizontal). Incidentally, this is a true random source. Polarize a laser diagonally and read photons horizontally as 0 and vertically as 1. If we have a filter that only passes light that is polarized vertically. That is, half the light will get through. All photons (light-particles) that pass through the filter are now polarized vertically. (these filters are cheap things, But I haven't checked where they can be bought) If we then have a filter that only passes horizontally polarized particles, no particles will get through that (after passing the first filter). First we filter 50%, then the other 50%. Now here comes the non-sensical part: If we stick a filter between the two filters that passes particles polarized as 45 degrees, there *WILL* be light at the end of the three filters. filter 1) only let through vertically polarized particles filter 2) only let through particles polarized at 45 degrees filter 3) only let through horizontally polarized particles. At the end there is light. If we don't have the middle filter, then no light passes the last filter. Just why that is, and what happens, is... well... complicated. Like famous physicist Richard Feynman said: "I think it is safe to say that no one understands quantum mechanics. Do not keep saying to youself, if you can possibly avoid it, 'but how can it be like that?' because you will go 'down the drain' into a blind alley from which nobody has yet escaped. Nobody knows how it can be like that." In order to explain it, you have to give up on particles having properties. For example, a photon doens't have a definite polarization until we measure it. Taken to the normal macroscopic world, this is the equivalent of "The moon isn't there when nobody's looking". Except that in quantum physics, it has a real practical truth in it. So, back to Q crypto. Alice and Bob agree on a key in advance. For example 0101. A zero means "horizontal-vertical" and a one means "diagonal-slant" (we'll call diagonal "/" and slant "\"). Let's call h-v detector "+" and d-s detector "X". If a photon is sent with either horizontal or vertical polarization, the +-filter can 100% correctly say which one it was. the X-filter would just get a random answer. It's the same the other way around. Alice sends - / | \ Bob sets detectors + X + X Bob gets answers - / | \ Evesdropper Eve sets: + + X X And she gets - ? ? \ Where "?" is completely random. Eve can't re-read the middle photons with other polarization to get the info, the best she can do is send the message on to Bob as she saw it: "- ? ? \". Note that Eve has no way of knowing which, if any, of the four bits are read correctly. She may send "- - \ \" to Bob, since that's what she read. But that's not the correct message, so it will be detected. Eve can't forge a message so that it's not detected, since she doesn't know the key she won't know what Bob will receive. And Bob can't just read the original photons since the information in them is destroyed. When combined with one-time pads, first sending the pad and then the message, zero information is leaked as a result of evesdropping. Unlike above where Eve got two bits of plaintext. If you don't understand any of this, it's not just because I'm bad at explaining it, but also that in order to grasp the ideas of quantum physics, you have to hear a lot of similes, "attacking" the problems from different angles. The best book I've read on quantum physics is "Quantum Reality", by Nick Herbert. ISBN 0-385-23569-0. As mentioned above, Applied Cryptography by Bruce Schneier has a section on quantum crypto. Have a nice day. /Thomas Habets [1] "random" as in "the information of what value you will get does not exist until you read it". It's not that we're ignorant of the prediction, more like there can be no prediction. Compare this with the outcome of throwing a dice, where we are ignorant of all the parameters of the movement of the dice. The dice will have a definite predictable outcome, which we can predict if we know enough about the dice and its surroundings. [2] "quantum measurments" if you like - --------- typedef struct me_s { char name[] = { "Thomas Habets" }; char email[] = { "thomas@h..." }; char kernel[] = { "Linux 2.4" }; char *pgpKey[] = { "http://www.habets.pp.se/pubkey.txt" }; char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; } me_t; -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (GNU/Linux) iD8DBQE/yVL7KGrpCq1I6FQRAvMvAKDYH0J1wgPTenbDIJkaSAaJ+hIgHQCglaZT IRDghbkaPVjnvsiBxIHS3bw= =xrq/ -----END PGP SIGNATURE----- 8055 From: Thomas Habets Date: Sat Nov 29, 2003 0:11pm Subject: Re: Re: Q Crypto - I don't understand -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Saturday 29 November 2003 17:17, you wrote: > If I have an omnidirectional light bulb in the middle of a field > illuminating, and a ring of people watching it from some distance > away, and I start blinking that light in a code pattern to convey > intelligence, how would any known theory determine if or how many > eyeballs have those photons impinging on them? > > Seems a realistic question, and all the theory apparently claims > there is some way to determine if that blinking light is being > viewed. You can see if anyone has measured a given photon before you did[1]. Because in all likelyhood, they measured it incorrectly. You can make this probablility arbitrarily large with more "bits of key" (actually detectors set certain ways, like the other mail explained). They have one chance, and one chance only of guessing your key. After that, you'll know they've tried. If however they read the photon *after* you did, then they get one try per message, since your reading did not destroy the information (unless you destroyed it by following the correct measurment with an incorrect one[2], or you destroyed the particle). If the evesdropper has measured photons in the datastream then the datastream will output random values, both to you and to the evesdropper. And not the same random data. > Put sensors on ten thousand eyeballs and one more guy walks up and > sees the light flashing and the information is intercepted with no > means of feedback I can see. The new guy will not receive the same photons that the other guys see. His photons will not have been read until *he* reads them. He will be able to try one key per message sent. > > As far as I know, quantum crypto is not something you can do over the > > air in a omnidirectional sort of way. > Then absolute statements that any intercepted information can be > known to have been intercepted must be qualified. Any information intercepted from the channel where the photons travel will be read as random data, and the recipient will receive random data for all evesdropped traffic. They will not get the same random data. Quantum crypto only works to protect information sent as a property of a particle. I give you a particle, and only you know how to read it. And you get one chance only. This property will self-destruct (randomize) after one (incorrect) measurment, good luck Jim. > I'm looking at the statements made at arm's length, and am > challenging the absolutes in my universe as I understand it. The quantum world is indeed very different. When quantum effects are used in our normal world they tend to look like magic. > Thanks so much for taking the time to share. I've learned a lot from your posts, glad to get the chance to return the favour. [1] Also includes all particles in the same entangled state, but I'm not going to go into that. [2] And here there might be a window of opertunity for entangled particles being read; Between the two measurments the rightful recipient did. I don't know if it's possible to entangle one particle with another without disturbing both of their states. I guess it isn't, or quantum crypto would suck. - --------- typedef struct me_s { char name[] = { "Thomas Habets" }; char email[] = { "thomas@h..." }; char kernel[] = { "Linux 2.4" }; char *pgpKey[] = { "http://www.habets.pp.se/pubkey.txt" }; char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; } me_t; -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (GNU/Linux) iD8DBQE/yOFsKGrpCq1I6FQRAgo0AKCMWVtXV1JNWJ4UvSy0szUphTkRugCbBfsL ekRtx2FiNWXMdl0yyQixb6c= =aOio -----END PGP SIGNATURE----- 8056 From: Thomas Shaddack Date: Mon Dec 1, 2003 2:29pm Subject: Re: On matters of Forensics and other topics. On Mon, 1 Dec 2003, srhayes3 wrote: > I had a weird dream the other day that put this question in my mind > and I thought maybe someone in the group could answer it. Are the > forensic computer analysis techniques used on common storage mediums > i.e, floppy disk,CDroms, hard drives, the same techniques that would > be used to recover images from digital camera storage cards that have > been deleted (assuming no other pics have been overwritten on the > card)? The card behaves like a block device with a simple filesystem. You can access the card by two ways; through the filesystem (where you see the files as they are there), and through lower level, as an array of sectors over whose the files and filesystem metadata are scattered. Erasing is usually done just by freeing the space in the allocation tables and directory structures (cards usually use FAT filesystem), so the image data themselves will stay on the card. (Besides, overwriting them would increase the wear on the solid-state memory cells, which would shorten the lifespan of the card.) I believe there are even off-the-shelf data recovery programs that can retrieve data from erased or damaged memory cards. If you have a card that was written to sequentially, so you don't suppose there will be any fragmentation of the files, you may try to access the card from Linux, mount it as a block device (eg. /dev/sd0 or wherever the USB driver puts it to), then copy it to a file (dd if=/dev/sd0 of=card_image.bin), then play with the image itself without further touching the card; find all the offsets divisible by the sector size of the card that begin with JPEG magic number (0xFFD8), and extract files from those offsets to the offsets of the next JPEG headers. Then look at the resulting blocks with a suitable picture viewer. Could help; by similar method I restored some files from a disk badly damaged by a Chernobyl virus that erased both FATs - I wrote a software that walked through the disk, found all the directory records, extracted the lengths and starting sectors of the files of given type, and then fed the data to a second program that extracted the files themselves to another disk. At this moment I am facing a similar problem of higher magnitude, or how to get back my vacation photos from an ext3 filesystem that got accidentally erased, left behind absolutely no metadata and turned into a pile of some 30 gigabytes of 1-kB sectors with no information about what belongs where. I can easily walk through the disk and find the beginnings of the files (as the JPEG files have magic numbers in their headers - two characteristical bytes (0xFFD8) and then the JFIF header), the challenging part is posed by the fragmentation of the files. However, the JPEG files have characteristical internal structure, which makes it theoretically possible to find all the sectors that contain a JPEG file, then match the sectors that follow each other by looking if the sequences decode to something meaningful, and doing simple image analysis on the resulting decoded lines if there are sharp differences or if the vertical structures in the images continue reasonably smoothly. (Eg, if the decoded lines length matches the image size from the header, consider it a possible match, then try the more advanced analysis.) However, at this moment the project is in the stage of theoretical speculation, as my knowledge of the details of JPEG format is far from complete. How useful would such software be, or does it already exist? On a side note, an interesting add-on for a camera firmware could be implementation of asymmetric cryptography; the cam then has a random number generator (the CCD noise would do) and knows the user's public key (the private key being stored off-camera, in geographically different location). Then each file would be encrypted by eg. AES with a randomly generated key, and the key stored together with the file, encrypted with the public key. Without getting ahold of the corresponding private key, the pictures from the camera can't be recovered; the camera holder doesn't even have to be the one who owns the private key. With a modification of the filesystem to not use timestamps even the dates/times of making the pictures won't be recoverable without the key (though they still can be stored in - encrypted - EXIF JPEG headers). Could have interesting applications. If a digital camera with open-source firmware (or at least easy-to-reverse-engineer one) appears on the market, we may look forward for interesting new uses. > Second query, am I being overly paraniod by thinking that > the "Onstar" system featured in over 50 GM vehicles would make it I can't answer this reliably, having no more than incidental theoretical knowledge of the system in question. 8057 From: Brian Varine Date: Mon Dec 1, 2003 6:42pm Subject: Re: Digest Number 1428 ----- Original Message ----- > Date: Mon, 01 Dec 2003 19:15:23 -0000 > From: "srhayes3" > Subject: On matters of Forensics and other topics. > > I had a weird dream the other day that put this question in my mind > and I thought maybe someone in the group could answer it. Are the > forensic computer analysis techniques used on common storage mediums > i.e, floppy disk,CDroms, hard drives, the same techniques that would > be used to recover images from digital camera storage cards that have > been deleted (assuming no other pics have been overwritten on the > card)? Yes, it's pretty much the same. Most of the flash type mediums show up as hard drives. Make an image of it and process it like a normal hard drive. > Second query, am I being overly paraniod by thinking that > the "Onstar" system featured in over 50 GM vehicles would make it > relatively simple for an easedropper to "spy" on the vehicles owner > by listening in on conversations as well as tracking their movement > with very limited modifications to the factory wiring and > installation? Would the primary functions of this system (which > incidently would be the EXACT thing an easedropper would use it for) > make it dificult for a TSCMer to determine any technical penetrations > to the system? Funny you should mention OnStar, there was a story on this last week. The FBI tapped and/or tracked a target that had a system like the OnStar system (the court didn't mention the actual system). Apparently it was technically possible to do everything remotely (no need to get dirty and wire stuff), however it would have disabled a part of the system so the court ruled that the district court should not have issued the warrant because it didn't meet the "minimum of interference" part of the law. I'm not sure how you'd detect something like that, though something as cheap as those cellphone antennas that light up when in use might do the trick. If it's sparkling and you're not making a call...... Court to FBI: No spying on in-car computers http://zdnet.com.com/2100-1103_2-5109435.html I've also heard of LE agencies attempting to download GPS "breadcrumb" data from GPS Nav system installed in seized automobiles. 8058 From: Michael Puchol Date: Tue Dec 2, 2003 5:49pm Subject: Re: On matters of Forensics and other topics. Samuel: On the first question, older digital cameras used propietary filesystem structures or internal memory configurations, thus forcing you to use their download & management software. Nowadays, in the current media formats (CF, SmartMedia, etc.) a standard filesystem is used, so the deletion process is the same as for a hard drive, floppy disk, and so on. Thus, the recovery methods could be the same as used for normal magnetic media. In fact, a friend gave me a memory card (CF) the other day, with pictures of a brother's wedding that had been accidentally deleted, and I'll be using the usual tools for recovery (wish me luck!). On the second question, read a message posted on this board a few days ago on the subject (FBI using OnStar as bugging devices). Regards, Mike ----- Original Message ----- From: "srhayes3" To: Sent: Monday, December 01, 2003 8:15 PM Subject: [TSCM-L] On matters of Forensics and other topics. > I had a weird dream the other day that put this question in my mind > and I thought maybe someone in the group could answer it. Are the > forensic computer analysis techniques used on common storage mediums > i.e, floppy disk,CDroms, hard drives, the same techniques that would > be used to recover images from digital camera storage cards that have > been deleted (assuming no other pics have been overwritten on the > card)? > Second query, am I being overly paraniod by thinking that > the "Onstar" system featured in over 50 GM vehicles would make it > relatively simple for an easedropper to "spy" on the vehicles owner > by listening in on conversations as well as tracking their movement > with very limited modifications to the factory wiring and > installation? Would the primary functions of this system (which > incidently would be the EXACT thing an easedropper would use it for) > make it dificult for a TSCMer to determine any technical penetrations > to the system? > Samuel R Hayes III ,NCLAMN. > NCLAMN= No Cool Letters After My Name > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 8059 From: Richard Donovan Date: Wed Dec 3, 2003 2:42am Subject: FBI moves to bring online calls under scanner FBI moves to bring online calls under scanner JUBE SHIVER JR. WASHINGTON, DECEMBER 2: Worried that terrorists and criminals can communicate without being caught, the FBI wants to tap into online phone calls. As federal regulators on Monday debated how ≠ or whether ≠ to regulate the fast-growing technology of Internet phone service, the FBI and Justice Department sought to ensure that law enforcement has the same ability to eavesdrop as it does on virtually every other form of communication. Exempting Internet telephony from the wiretap provisions of federal law would, ëëjeopardise the ability of federal, state and local governments to protect public and national security against domestic and foreign threats,íí Patrick W. Kelley, the FBIís deputy general counsel and Justice Department Attorney General John G. Malcolm wrote in a filing with the Federal Communications Commission. The technology of so-called voice-over-Internet protocol chops calls into digital packets and sends them over the Internet like e-mail only to be reassembled at their destination as speech. The FBI and Justice Department want FCC to classify Internet telephony as a traditional telecommunications service, which would subject it to federal laws requiring carriers ëëto develop intercept solutions for lawful electronic surveillance.íí The Communications Assistance for Law Enforcement Act of 1994 established a process that allows the FCC to order standards to facilitate wiretapping. Civil liberty experts draw the line at the current effort, saying it gives law enforcement too much control over how computer networks are built. They fear it could also lead to efforts to outlaw powerful data encryption if Internet telephony users begin encrypting calls. ëëThis represents a great threat to privacy and free speech,íí said Lee Tien, a staff attorney with the Electronic Frontier Foundation in San Francisco. (LAT-WP) 8060 From: Does it matter Date: Wed Dec 3, 2003 6:24pm Subject: Re: Sweep Needed Ray Jarvis and his sons are in Tulsa, can't think of anyone better to handle it them him, good people. --- In TSCM-L@yahoogroups.com, Hawkspirit wrote: > Can someone handle a sweep in Tulsa Oklahoma? Email me directly. > > Roger 8061 From: The Dog's Bollix Date: Fri Dec 5, 2003 7:40am Subject: Re: Unit They work excellently. Upon installation you adjust the voltage level to just allow a dial tone on off-hook. On hook it transmits a tone continuously down the line to fill up any recording devices that may be attached. It's pretty neat. You can buy them cheaper than that though, more like $149. Niall. Hawkspirit wrote: Anybody know the principle of operation on these units? Roger http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=2578689997&category=25397 Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? Free Pop-Up Blocker - Get it now [Non-text portions of this message have been removed] 8062 From: James M. Atkinson Date: Mon Dec 8, 2003 10:29am Subject: West Point guide on what to do on a sweep West Point guide on what to do on a sweep: A. Hide a transmitter B. Drink coffee C. Rummage through desk drawers to steal change for the vending machines D. Hide a recorder E. Have a 5150 call the client to explain why they should fear microwave saturation F. Leave a note on the bathroom mirror that says the CIA was here G. Leave brochures out in the lobby for a relatives business H. Leave an NCIC report on the client on his or her desk I. Call Dominoes for a Pizza, charge to clients office J. Punch holes in ladies bathroom ceiling tile, installed web-based cams K. Drop a non working microphone in a desk drawer L. Read the manual for the Bearcat scanner likely the only piece of sweep-gear brought on-site M. Anything Frank Jones would do N. Perform a TSCM Survey with only a CPM-700 O. Dremel out a hole in a wood object in the clients office to show he's been a victim of a "parametric cavity" device P. Drink even more coffee Q. Use customers private bathroom for 60 minutes, leaving the commode full, and clogged R. All the above 8063 From: Steve Uhrig Date: Mon Dec 8, 2003 1:19pm Subject: CPM is sold Please stop calling. Thanks to those who inquired. Too many to reply separately. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8064 From: James M. Atkinson Date: Mon Dec 8, 2003 1:49pm Subject: Wall of Shame - Someone Else Ripping Me Off Here is yet another guy who is ripping me off. I would *** REALLY *** appreciate it if the list membership could contact this guy and express their displeasure concerning him openly stealing from me. Other in the profession may find it appropriate to shun this guy until he issues a sincere and heart felt apology. Here are the pages where he uses a number of my animated graphics, and directly stolen text concerning TSCM. http://www.vanintel.com/Threat_levels.html http://www.vanintel.com/Warning_signs.html From what I can see, he has been using the stolen materials for quite a while, and given my usage/copyright agreement ( http://www.tscm.com/copyright.html ) he now owns me well over $318,000 USD. Has anybody else on the list had problems with this guy? He lists his bio as: MARK FENTON, B.A., is the Vice President of CBIA. Mark has been a law enforcement officer for the past 15 years and is currently assigned to the Criminal Intelligence Section. As well as law enforcement experience Mark also has 2 years of private security experience. He is the founder, and president of, vanintel , a company devoted to the protection of proprietary information. Mark is also a member of the Society for the Protection of Cyberspace. A joint public and private organization that discusses security on the Internet. The illegal usage constitutes a serious criminal act, and if Mr. Fenton is actually assigned to the Criminal Intelligence Section, then his employer should be notified of his misdeeds (if the membership would be so kind) His domain registration is: vanintel M Fenton Box 91431 West Vancouver, bc V7V3N3 CA Phone: 604-632-7548 Email: mfenton@i... Registrar Name....: Register.com Registrar Whois...: whois.register.com Registrar Homepage: http://www.register.com Domain Name: VANINTEL.COM Created on..............: Tue, Jun 19, 2001 Expires on..............: Sun, Jun 19, 2005 Record last updated on..: Mon, Oct 06, 2003 Administrative Contact: vanintel M Fenton Box 91431 West Vancouver, bc V7V3N3 CA Phone: 604-632-7548 Email: mfenton@i... Technical Contact: vanintel M Fenton Box 91431 West Vancouver, bc V7V3N3 CA Phone: 604-632-7548 Email: mfenton@i... Zone Contact: vanintel M Fenton Box 91431 West Vancouver, bc V7V3N3 CA Phone: 604-632-7548 Email: mfenton@i... Domain servers in listed order: NS.ACEOFSPACE.COM 64.177.143.176 NS2.ACEOFSPACE.COM 64.177.143.177 -jma [Non-text portions of this message have been removed] 8065 From: Hawkspirit Date: Mon Dec 8, 2003 8:42pm Subject: Sweepers Does anyone know what happened to these two sweepers? Roger http://www.bugsweeps.com/info/debug_mania_newswk8-18-75.html The Debugging Mania Newsweek, August 18, 1975 - Mark Gerchich with Ann Lallande in New York and Jon Lowell in Detroit 8066 From: Andre Holmes <1ach@g...> Date: Mon Dec 8, 2003 9:33pm Subject: Fw: Wall of Shame - Someone Else Ripping Me Off ----- Original Message ----- From: <1ach@v...> To: <1ach@G...> Sent: Monday, December 08, 2003 10:31 PM Subject: Re: [TSCM-L] Wall of Shame - Someone Else Ripping Me Off > > Hello > > I have failed to in my search as to past training on the web site mentioned for TSCM,ELECTRONICS,and College. > > I hope that James will not rest with only exposing a breach but will prosecute in court. > > I personally had to bring a fraud to lite in Hamilton County Court in CinCinnati Ohio while he did not steal for my web site he did steal from me. > > All can see the public record Case No. A 0302859 > > All the best ANDRE HOLMES > Neptune Enterprise Security > 1ach@G... > > > > From: "James M. Atkinson" > > Date: 2003/12/08 Mon PM 01:49:51 CST > > To: TSCM-L > > Subject: [TSCM-L] Wall of Shame - Someone Else Ripping Me Off > > > > > > Here is yet another guy who is ripping me off. > > > > I would *** REALLY *** appreciate it if the list membership could contact > > this guy and express their displeasure concerning him openly stealing from me. > > > > Other in the profession may find it appropriate to shun this guy until he > > issues a sincere and heart felt apology. > > > > Here are the pages where he uses a number of my animated graphics, and > > directly stolen text concerning TSCM. > > > > http://www.vanintel.com/Threat_levels.html > > > > http://www.vanintel.com/Warning_signs.html > > > > From what I can see, he has been using the stolen materials for quite a > > while, and given my usage/copyright agreement ( > > http://www.tscm.com/copyright.html ) he now owns me well over $318,000 USD. > > > > Has anybody else on the list had problems with this guy? > > > > He lists his bio as: > > MARK FENTON, B.A., is the Vice President of CBIA. Mark has been a law > > enforcement officer for the past 15 years and is currently assigned to the > > Criminal Intelligence Section. As well as law enforcement experience Mark > > also has 2 years of private security experience. He is the founder, and > > president of, vanintel , a company devoted to the > > protection of proprietary information. Mark is also a member of the Society > > for the Protection of Cyberspace. A joint public and private organization > > that discusses security on the Internet. > > > > The illegal usage constitutes a serious criminal act, and if Mr. Fenton is > > actually assigned to the Criminal Intelligence Section, then his employer > > should be notified of his misdeeds (if the membership would be so kind) > > > > His domain registration is: > > > > vanintel > > M Fenton > > Box 91431 > > West Vancouver, bc V7V3N3 > > CA > > Phone: 604-632-7548 > > Email: mfenton@i... > > Registrar Name....: Register.com > > Registrar Whois...: whois.register.com > > Registrar Homepage: http://www.register.com > > > > Domain Name: VANINTEL.COM > > > > Created on..............: Tue, Jun 19, 2001 > > Expires on..............: Sun, Jun 19, 2005 > > Record last updated on..: Mon, Oct 06, 2003 > > Administrative Contact: > > vanintel > > M Fenton > > Box 91431 > > West Vancouver, bc V7V3N3 > > CA > > Phone: 604-632-7548 > > Email: mfenton@i... > > Technical Contact: > > vanintel > > M Fenton > > Box 91431 > > West Vancouver, bc V7V3N3 > > CA > > Phone: 604-632-7548 > > Email: mfenton@i... > > Zone Contact: > > vanintel > > M Fenton > > Box 91431 > > West Vancouver, bc V7V3N3 > > CA > > Phone: 604-632-7548 > > Email: mfenton@i... > > Domain servers in listed order: > > > > NS.ACEOFSPACE.COM 64.177.143.176 > > NS2.ACEOFSPACE.COM 64.177.143.177 > > > > > > -jma > > > > [Non-text portions of this message have been removed] > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > 8067 From: Does it matter Date: Mon Dec 8, 2003 8:20pm Subject: Re: Wall of Shame - Someone Else Ripping Me Off JMA, I had someone steal from my site a chain of custody form for the computer forensics industry. Not only did he take the form but he also had to break encryption on the document that .pdf embeds in it. We got signed papers from Adobe and another company etc and then sent out a cease and desist letter. The page was taken down immediately. You can sue later on for damages if you feel the need. If an investigation ends up being needed for files residing on his pc etc, I would be glad to help you out however I can. --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > Here is yet another guy who is ripping me off. > > I would *** REALLY *** appreciate it if the list membership could contact > this guy and express their displeasure concerning him openly stealing from me. > > Other in the profession may find it appropriate to shun this guy until he > issues a sincere and heart felt apology. > > Here are the pages where he uses a number of my animated graphics, and > directly stolen text concerning TSCM. > > http://www.vanintel.com/Threat_levels.html > > http://www.vanintel.com/Warning_signs.html > > From what I can see, he has been using the stolen materials for quite a > while, and given my usage/copyright agreement ( > http://www.tscm.com/copyright.html ) he now owns me well over $318,000 USD. > > Has anybody else on the list had problems with this guy? > > He lists his bio as: > MARK FENTON, B.A., is the Vice President of CBIA. Mark has been a law > enforcement officer for the past 15 years and is currently assigned to the > Criminal Intelligence Section. As well as law enforcement experience Mark > also has 2 years of private security experience. He is the founder, and > president of, vanintel , a company devoted to the > protection of proprietary information. Mark is also a member of the Society > for the Protection of Cyberspace. A joint public and private organization > that discusses security on the Internet. > > The illegal usage constitutes a serious criminal act, and if Mr. Fenton is > actually assigned to the Criminal Intelligence Section, then his employer > should be notified of his misdeeds (if the membership would be so kind) > > His domain registration is: > > vanintel > M Fenton > Box 91431 > West Vancouver, bc V7V3N3 > CA > Phone: 604-632-7548 > Email: mfenton@i... > Registrar Name....: Register.com > Registrar Whois...: whois.register.com > Registrar Homepage: http://www.register.com > > Domain Name: VANINTEL.COM > > Created on..............: Tue, Jun 19, 2001 > Expires on..............: Sun, Jun 19, 2005 > Record last updated on..: Mon, Oct 06, 2003 > Administrative Contact: > vanintel > M Fenton > Box 91431 > West Vancouver, bc V7V3N3 > CA > Phone: 604-632-7548 > Email: mfenton@i... > Technical Contact: > vanintel > M Fenton > Box 91431 > West Vancouver, bc V7V3N3 > CA > Phone: 604-632-7548 > Email: mfenton@i... > Zone Contact: > vanintel > M Fenton > Box 91431 > West Vancouver, bc V7V3N3 > CA > Phone: 604-632-7548 > Email: mfenton@i... > Domain servers in listed order: > > NS.ACEOFSPACE.COM 64.177.143.176 > NS2.ACEOFSPACE.COM 64.177.143.177 > > > -jma > > [Non-text portions of this message have been removed] 8068 From: Ocean Group Date: Tue Dec 9, 2003 11:55am Subject: Rip off issue Hmmm, I don't mean to sound condescending, but did you try ringing/emailing the guy and asking him to take it down and air your grievances etc. Just a thought, Regards Ois ***************************** Message: 2 Date: Mon, 08 Dec 2003 14:49:51 -0500 From: "James M. Atkinson" Subject: Wall of Shame - Someone Else Ripping Me Off Here is yet another guy who is ripping me off. I would *** REALLY *** appreciate it if the list membership could contact this guy and express their displeasure concerning him openly stealing from me. Other in the profession may find it appropriate to shun this guy until he issues a sincere and heart felt apology. Here are the pages where he uses a number of my animated graphics, and directly stolen text concerning TSCM. http://www.vanintel.com/Threat_levels.html http://www.vanintel.com/Warning_signs.html From what I can see, he has been using the stolen materials for quite a while, and given my usage/copyright agreement ( http://www.tscm.com/copyright.html ) he now owns me well over $318,000 USD. Has anybody else on the list had problems with this guy? He lists his bio as: MARK FENTON, B.A., is the Vice President of CBIA. Mark has been a law enforcement officer for the past 15 years and is currently assigned to the Criminal Intelligence Section. As well as law enforcement experience Mark also has 2 years of private security experience. He is the founder, and president of, vanintel , a company devoted to the protection of proprietary information. Mark is also a member of the Society for the Protection of Cyberspace. A joint public and private organization that discusses security on the Internet. The illegal usage constitutes a serious criminal act, and if Mr. Fenton is actually assigned to the Criminal Intelligence Section, then his employer should be notified of his misdeeds (if the membership would be so kind) His domain registration is: vanintel M Fenton Box 91431 West Vancouver, bc V7V3N3 CA Phone: 604-632-7548 Email: mfenton@i... Registrar Name....: Register.com Registrar Whois...: whois.register.com Registrar Homepage: http://www.register.com 8069 From: Spook Date: Tue Dec 9, 2003 7:16pm Subject: Re: Rip off issue At 12:55 PM 12/9/2003, Ocean Group wrote: >Hmmm, I don't mean to sound condescending, but did you try ringing/emailing >the guy and asking him to take it down and air your grievances etc. > >Just a thought, > >Regards > >Ois Yes, I emailed him several times, and called him and left messages... no response. -jma 8070 From: Edward J.. Michaels Date: Tue Dec 9, 2003 11:17am Subject: Fw: FOLLOW-UP Ed: Curious ...did you tell them it was PSB, I did not. Other Ed ----- Original Message ----- From: Joekul0519@a... To: edmichaels@c... Sent: Tuesday, December 09, 2003 11:50 AM Subject: FOLLOW-UP ED: Thanks for getting back to me (several times). Not ignoring you...just swamped as usual. Might be interested in the PSB list..just have to work out the details (once again..if any) with you. Hang in there....JOE [Non-text portions of this message have been removed] 8071 From: James M. Atkinson Date: Wed Dec 10, 2003 6:57pm Subject: A Little Town in Louisiana This story happened about a month ago in a little town in Louisiana, and while it sounds like an Alfred Hitchcock tale, it's real. Read to the end. This guy was on the side of the road hitch hiking on a very dark night in the middle of a storm. The night passed slowly and no cars went by. The storm was so strong he could hardly see a few feet ahead of him. Suddenly he saw a car slowly looming, ghostlike, out of the gloom. It slowly crept toward him and stopped. Reflexively, the guy got into the car and closed the door, then realized that there was nobody behind the wheel. The car slowly started moving again. The guy was terrified, too scared to think of jumping out and running. The guy saw that the car was slowly approaching a sharp curve. The guy started to pray, begging for his life; he was sure the ghost car would go off the road and he would plunge to his death, when just before the curve, a hand appeared thru the window and turned the steering wheel, guiding the car safely around the bend. Paralyzed with terror, the guy watched the hand reappear every time they reached a curve. Finally, the guy gathered his wits and leaped from the car and ran to the nearest town. Wet and in shock, he went into a bar and voice quavering, ordered two shots of tequila, and told everybody about his horrible, supernatural experience. A silence enveloped everybody when they realized the guy was apparently sane and not drunk. About half an hour later two guys walked into the same bar. One says to the other, "Look Nick, that's that idiot that rode in our car when we was pushing it in the rain." 8072 From: Steve Uhrig Date: Wed Dec 10, 2003 7:58pm Subject: Avcom Spectrum Analyzer kit for sale Avcom Spectrum Analyzer & Freq Extender & More Avcom PSA-65C spectrum analyzer, 1-1250 megacycle coverage. For full specs, go here: http://www.avcomofva.com/cover.asp and click on Spectrum Analyzers and Analyzer Accessories. This package has an interesting history. It is a -65C analyzer with V2.1 firmware, optional accessory plastic cover, carrying handle aka bail, padded carrying case, AC and DC power cords, RFP-24 low noise 22dB gain preamp, BNC antenna, BNC>F coaxial adapter, *and* a MFC- 2000/5000 frequency extender which covers 2.0 - 3.0 gigs and 5.0 - 6.0 gigs. Also included is a military-grade BNC jumper cable to connect the extender to the spectrum analyzer. Note the two extended bands are the popular ISM (Industrial, Scientific & Medical) bands where inexpensive consumer grade wireless video is prevalent. Oh, an instruction manual is included. The package was purchased by a small cable TV operation in Virginia who was experiencing terrestrial interference on one of their satellite downlinks and needed this to find the problem. They purchased everything in a panic, but by the time the extender was specially made and the equipment shipped, the problem had gone away. They never used the system, stacked it in their shop, and after a short while resold it to me to recover some of their investment. They never even attached the optional bail. They paid USD $5099 for the package. Avcom threw in the hard cover for nothing. You would pay that plus shipping anywhere you purchased the equipment. Look it up yourself on the web and see. The -65C has the AM and FM demodulators but does not have the 10 KC bandwidth filter or the video demodulator. If you feel you need these, you can purchase them yourself from an Avcom distributor. Any TSCMer will recognize the friendly, easy to operate yet potent PSA-65C as the most popular spectrum analyzer ever in TSCM. Thousands of them are in use by professional sweepers. The unit is instinctive to use and capable, in the hands of a competent user, of identifying nearly any RF threat within its coverage range of 1-6 gigs (except 4 - 5 gigs where the extenders do not overlap and I have never heard of a surveillance device being found in that region). If you are just starting and need something you can grow with, an experienced professional needing a spare unit, a peripatetic sweeper (look it up) needing a spare kit to leave at a regular customer's location or anyone who needs a complete, inexpensive, capable RF kit, here it is. A fellow TSCMer commented when reading the above listing he works for a Fortune 50 defense contractor, does TSCM as part of his duties, has access to an entire lab full of equipment, and uses an Avcom for sweeping because it does the job and is easier to use than gear costing one hundred times as much. Unit is in perfect operating condition and correlates properly with my $50,000 Tek unit which was calibrated this year and cost more when it was new than my house did. It's getting to year end. Businesses making a capital investment in equipment may be able to take a tax deduction on something like this. Pay the money in taxes, or buy gear. Your choice. I've had a number of these Avcom pieces before, and they generally sell quickly. If you're interested, don't hesitate. Almost every time I advertise a decent piece, it sells quickly and I have to disappoint a number of friends, which makes me sad. New price is $5099. Your price for the complete package as described above is $3500. Save $1600. Not bad. Price includes domestic insured shipping so $3500 is the total you pay. I will credit international buyers with the equivalent of domestic shipping. Comes with my guarantee -- check the references section of my website or ask anyone in the TSCM business if you have any concerns. I take credit cards and can ship internationally. If you are outside the U.S., please let me know if you will need a 220V to 110V converter as this unit is set up for 110VAC. This is a rare opportunity. Someone will get a real nice piece in perfect condition and save a large chunk of change. Holler if questions. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8073 From: Ocean Group Date: Thu Dec 11, 2003 7:19am Subject: Crypto Go for it guys: http://www.cipher.maths.soton.ac.uk/ From: kondrak Date: Tue Dec 7, 2004 11:05am Subject: RE: Tracking Question (OT) Well, to be brief, THOSE groups came here to be Americans, not Balkanize themselves and leech off of society. Be politically Korreckt, but its your lunch they're coming to eat. At 06:55 12/7/2004, you wrote: >My god... > > >Need I remind you so called true blood Americans that your race is composed >of immigrants. > >Without the Irish, British, Spanish, French origins, there would be NO USA. >It is in YOUR blood. > >Have a little think before you open your mouth. I thought some group members >would have more sense. > > > >*************************** > > >Message: 7 > Date: Mon, 06 Dec 2004 22:14:53 -0500 > From: kondrak >Subject: Re: Tracking Question (OT) > >Well, they smell bad, perhaps McDonalds will find a use for them besides >cooking burgers.... >The McMexi with Guacamole? >Mexi-McNuggets? > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10347 From: kondrak Date: Tue Dec 7, 2004 11:07am Subject: RE: Tracking Question (OT) Oh I mess all those bed-wetting apologists up, when I tell them I'm "Native American" since I was born here. At 09:36 12/7/2004, you wrote: >I agree, that these comments were rascist and redneck. > > >On the backside, when I lived in Ireland and they >asked what my heritage was, I told them Irish, as my >grandparents came from there. They laughed at me and >told me I was an "American" and not Irish. > >Now I am confused. > > >--- Tech Sec Lab wrote: > > > My god... > > > > > > Need I remind you so called true blood Americans > > that your race is composed > > of immigrants. > > > > Without the Irish, British, Spanish, French origins, > > there would be NO USA. > > It is in YOUR blood. > > > > Have a little think before you open your mouth. I > > thought some group members > > would have more sense. > > > > > > > > *************************** > > > > > > Message: 7 > > Date: Mon, 06 Dec 2004 22:14:53 -0500 > > From: kondrak > > Subject: Re: Tracking Question (OT) > > > > Well, they smell bad, perhaps McDonalds will find a > > use for them besides > > cooking burgers.... > > The McMexi with Guacamole? > > Mexi-McNuggets? > > > > > > > > > > >__________________________________ >Do you Yahoo!? >Yahoo! Mail - Helps protect you from nasty viruses. >http://promotions.yahoo.com/new_mail > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10348 From: Andy Cuff Date: Tue Dec 7, 2004 4:35pm Subject: TSCM Dream Team Hi, Whilst I'm on a roll, I thought I'd ask the list members if anyone is willing to share their TSCM equipment dream team, vendors excluded for obvious reasons. I'd also suggest that negative opinions on the various products be avoided. Regards -andy cuff The Talisker Network Security Portal http://securitywizardry.com Computer Network Defence Ltd --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.804 / Virus Database: 546 - Release Date: 30/11/2004 10349 From: lynnwagoner007 Date: Tue Dec 7, 2004 2:37pm Subject: Re: Neat idea for defeating TSCM --- In TSCM-L@yahoogroups.com, "Vic Healey @c... " wrote: > > I have a neat idea for the clandestine recording of speech. > > While playing with several flash MP3 player recorders I have noticed that > the quality of the recording is much better than what you get from micro > cassette recorders. These devices are relatively small about the size of a > man's thumb. There is no tape hiss or cassette motor noise in the > recordings. A one-gig player can record 64 hours if you reduce the bit rate > to 32 kbps. The iRiver IFP 799 can even trigger on sound and shut off > recording to save energy and space on silence. Delays and sound level for > the trigger are programmable. The same iRiver can scan at an accelerated > pace the audio and even play it back at twenty five percent faster that > normal speech. Since these are self-contained one could covertly drop one in > a target area and later retrieve it or even wear it under ones shirt and > tie. They all come with a nice lanyard that suit that purpose. > > The only limiting factor of the off the shelf product is that a PNY VIBE > uses an AAA battery and recording life is around eight hours. The IRiver > series use an AA battery and I suspect it is good for 12 to 20 hours. It > lasts 43 hours if all you are doing is playing back files. The iRiver is the > more sophisticated unit with many user settings including AGC toggle on > recording and the ability to use an external mike or other line input. > > .....I agree with the other gentlemen regarding good physical searches. An experienced technician, one with many years with an agency specializing in TSCM sweeps, can find about any device through recognition. Don't get me wrong, I still use all of the other goodies, i.e. Spectrum Analyzer, TDR, etc., but also but a lot of faith in my experience. IMHO. > > > --- > avast! Antivirus: Outbound message clean. > Virus Database (VPS): 0449-1, 12/02/2004 > Tested on: 12/4/2004 12:48:39 PM > avast! - copyright (c) 2000-2004 ALWIL Software. > http://www.avast.com 10350 From: jw mooty Date: Tue Dec 7, 2004 9:39am Subject: Re: An Introduction give it all you got and to hem some...never lookback , just keep learning...sooner or later it will PAY OFF...ALWAYS FOLLOW YOUR PASSION...and never ignore the obvious... Wes Mooty co. Owner Better Tree Service LLC. 1510 S Bowman Rd Litte Rock , AR 72211 501.247.6405 cell 501.227.4775 office 501.227.4617 Data ----- Original Message ----- From: Kevin Harris To: TSCM-L@yahoogroups.com Sent: Monday, December 06, 2004 11:02 PM Subject: [TSCM-L] An Introduction Hello Everyone, I wanted to take a moment to introduce myself to the group. My name is Kevin Harris. I am currently a high school junior from St. Louis, MO. I developed an active interest in intelligence at the age of 13, when I got into cryptology. Ever since, I've been considering my options within the field, aspiring to pursue a career in it some day. (I would like to intern with NSA the summer after my senior year.) Looking back, I've realized that I've been a closet case for years. ;) I was first introduced to TSCM (as TSCM, and not by reading spy thrillers) through my "research" of TEMPEST, and secondarily through the TSCM web site (which is apparantly run by the guy/organization that runs this group, how about that?). I'm hoping to learn a lot here. Regards, Kevin ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links [Non-text portions of this message have been removed] 10351 From: lynnwagoner007 Date: Tue Dec 7, 2004 2:46pm Subject: Get Real Come on here....are you guys REALLY in the TSCM business or just wanna bees? This RFID stuff is really old and who cares? The illegal alien stuff is out of line also. I joined this group for professional information as I AM in the business. Just my opinion. 10352 From: kondrak Date: Tue Dec 7, 2004 8:38pm Subject: Re: Get Real Then you should know RFID is a means of surveillance. Cant pick and choose...as far as regular nuts and bolts TSCM goes, theres prob a handful of posts a week....gets boring otherwise...you sit and wait for the phone to ring? Zzzzzzzz.... >Come on here....are you guys REALLY in the TSCM business or just >wanna bees? This RFID stuff is really old and who cares? The >illegal alien stuff is out of line also. I joined this group for >professional information as I AM in the business. Just my opinion. > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10353 From: kondrak Date: Tue Dec 7, 2004 8:39pm Subject: Re: An Introduction Yup, couldn't agree more. of course you could starve waiting for the payoff, so get REAL good at what you do...it may have other uses... At 10:39 12/7/2004, you wrote: >give it all you got and to hem some...never lookback , just keep >learning...sooner or later it will PAY OFF...ALWAYS FOLLOW YOUR >PASSION...and never ignore the obvious... > >Wes Mooty co. Owner > >Better Tree Service LLC. >1510 S Bowman Rd >Litte Rock , AR 72211 > >501.247.6405 cell >501.227.4775 office >501.227.4617 Data > > > > > > > ----- Original Message ----- > From: Kevin Harris > To: TSCM-L@yahoogroups.com > Sent: Monday, December 06, 2004 11:02 PM > Subject: [TSCM-L] An Introduction > > > > > > Hello Everyone, > > I wanted to take a moment to introduce myself to the group. My name is > Kevin Harris. I am currently a high school junior from St. Louis, MO. > I developed an active interest in intelligence at the age of 13, when > I got into cryptology. Ever since, I've been considering my options > within the field, aspiring to pursue a career in it some day. (I would > like to intern with NSA the summer after my senior year.) Looking > back, I've realized that I've been a closet case for years. ;) > > I was first introduced to TSCM (as TSCM, and not by reading spy > thrillers) through my "research" of TEMPEST, and secondarily through > the TSCM web site (which is apparantly run by the guy/organization > that runs this group, how about that?). > > I'm hoping to learn a lot here. > > Regards, > Kevin > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10354 From: satcommunitfive Date: Tue Dec 7, 2004 11:04pm Subject: Re: Get Real RDIDs are so satellites can track & kill you from space using LASERs HA ! 10355 From: James M. Atkinson Date: Wed Dec 8, 2004 0:32am Subject: Re: TSCM Dream Team Easy, RF: Give me a bank of 1.5 billion sample per second, 16 bit digitizers that each have a dedicated multi-teraflop DSP pre-processor on the back end that provides a massively parallel, infinite bandwidth direct conversion receiver, and then hub all of the receivers into a harvest 64/128 CPU with 18 GB of RAM, and several terabytes of hard drive. Basic system would have 32 banks, each with a pre-selected 150 MHz band-width, so that it is impossible to every miss any burst or packet transmission (even UWB). Line Analysis: Auto impedance matching, Auto-Ranging time and frequency domain reflectometer system with pulse rise times as small as 50 ps. Shoots 8 pairs/16 wires at once, and all circuits protected up to 600 volts. Built in search receiver, laboratory grade instrument capable to making repeatable measurements. Coded data burst to identify and help trace out wiring. Inside a building the system must have 10 mm resolution on all power, telephone, and similar conductive paths. Physical Search: Combined X-Ray, Thermal inspection, and Forensic lighting system where the images taken during construction or introduction are used to index every perceivable imaged anomaly found during the sweep, completely under computer control. A very small hydraulic man-lift with rubber tires that can walk up the stairs by itself, or that can be moved in passenger elevators. This way you don't have to climb ladders during the sweep, and can just roll from ceiling tile to ceiling tile. How about a tripod mounted ultra-high precision 16 bit all digital thermal camera, with a resolution of at least .01 degree. Tripod contains a computer controlled servo system that pans and tilts the camera under computer control to seek out and catalog all thermal anomalies automatically. and so on. -jma At 05:35 PM 12/7/2004, Andy Cuff wrote: >Hi, >Whilst I'm on a roll, I thought I'd ask the list members if anyone is >willing to share their TSCM equipment dream team, vendors excluded for >obvious reasons. I'd also suggest that negative opinions on the various >products be avoided. > > Regards > -andy cuff >The Talisker Network Security Portal >http://securitywizardry.com >Computer Network Defence Ltd ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10356 From: Hawkspirit Date: Wed Dec 8, 2004 9:41am Subject: TSCM Dream Team- Greatest Sweepers How about the greatest sweepers dream team? http://www.bugsweeps.com/info/original_bugsweepers.html Date: Tue, 7 Dec 2004 22:35:37 -0000 From: "Andy Cuff" Subject: TSCM Dream Team Hi, Whilst I'm on a roll, I thought I'd ask the list members if anyone is willing to share their TSCM equipment dream team, vendors excluded for obvious reasons. I'd also suggest that negative opinions on the various products be avoided. Regards -andy cuff The Talisker Network Security Portal http://securitywizardry.com Computer Network Defence Ltd [Non-text portions of this message have been removed] 10357 From: kondrak Date: Mon Dec 6, 2004 9:29pm Subject: Re: Re: RFID-Jammer - speculative design I still like the idea of detecting, saving and salting the entire store....has anyone wondered what's going to happen when all the numbers are exhausted? Every one invoked a response? When they're as common as grains of sand or dust? Since they are apparently indestructible under normal conditions...they could be a point source of EM pollution.... We could get old people harvesting them to sell by the pound....a pound of RFID granules dispersed around the checkouts and the freight entrances of the Red-Chinese slave labor store, and POOF, your million dollar investment goes away. You'd have to re-tag all the merchandise..CA_CHING$$$$ . You'd have lawn mowers reading $1.29 and candy bars for $499.95. Consumer confidence would evaporate overnight. I cant wait! At 21:04 12/6/2004, you wrote: >what about grabbbing a RFID and putting a fast square wave voltage >into its cap so it transmits all the time -on their frequency then >all you need to do is buy one item from whatever store and add it to >the rest HA! > >you could always put a magnatron in your hat? > >Im turning on my iron..... > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10358 From: Tech Sec Lab Date: Wed Dec 8, 2004 5:38pm Subject: RE: Tracking Question (OT) Hmmm, just like General Custer... EOC. ********************************** Message: 5 Date: Tue, 07 Dec 2004 12:07:15 -0500 From: kondrak Subject: RE: Tracking Question (OT) Oh I mess all those bed-wetting apologists up, when I tell them I'm "Native American" since I was born here. 10359 From: Tech Sec Lab Date: Wed Dec 8, 2004 5:39pm Subject: RE: TSCM Dream Team LOL, would you like fries with that!?!!! ******************************** Message: 13 Date: Wed, 08 Dec 2004 01:32:12 -0500 From: "James M. Atkinson" Subject: Re: TSCM Dream Team Easy, RF: Give me a bank of 1.5 billion sample per second, 16 bit digitizers that each have a dedicated multi-teraflop DSP pre-processor on the back end that provides a massively parallel, infinite bandwidth direct conversion receiver, and then hub all of the receivers into a harvest 64/128 CPU with 18 GB of RAM, and several terabytes of hard drive. Basic system would have 32 banks, each with a pre-selected 150 MHz band-width, so that it is impossible to every miss any burst or packet transmission (even UWB). 10360 From: James M. Atkinson Date: Wed Dec 8, 2004 6:25pm Subject: RE: TSCM Dream Team [grin] Yes, Fries, Chili, and Cheese... lots of cheese. -jma At 06:39 PM 12/8/2004, Tech Sec Lab wrote: >LOL, would you like fries with that!?!!! > > >******************************** > > >Message: 13 > Date: Wed, 08 Dec 2004 01:32:12 -0500 > From: "James M. Atkinson" >Subject: Re: TSCM Dream Team > > >Easy, > >RF: Give me a bank of 1.5 billion sample per second, 16 bit digitizers that >each have a dedicated multi-teraflop DSP pre-processor on the back end that >provides a massively parallel, infinite bandwidth direct conversion >receiver, and then hub all of the receivers into a harvest 64/128 CPU with >18 GB of RAM, and several terabytes of hard drive. Basic system would have >32 banks, each with a pre-selected 150 MHz band-width, so that it is >impossible to every miss any burst or packet transmission (even UWB). > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10361 From: Kevin Harris Date: Wed Dec 8, 2004 5:51pm Subject: Re: An Introduction I'm vaguely familiar with the Cypherpunks. There's a book that I'm still trying to get through, Crypto by Steven Levy. It's pretty much about how the code rebels took on the government and won. An interested read thus far, Levy discusses Diffie, Hellman, Zimmerman, and all of those people. --- In TSCM-L@yahoogroups.com, kondrak wrote: > Then I take it you're familiar with the Cypherpunks as well? > > At 00:02 12/7/2004, you wrote: > > > > >Hello Everyone, > > > >I wanted to take a moment to introduce myself to the group. My name is > >Kevin Harris. I am currently a high school junior from St. Louis, MO. > >I developed an active interest in intelligence at the age of 13, when > >I got into cryptology. Ever since, I've been considering my options > >within the field, aspiring to pursue a career in it some day. (I would > >like to intern with NSA the summer after my senior year.) Looking > >back, I've realized that I've been a closet case for years. ;) > > > >I was first introduced to TSCM (as TSCM, and not by reading spy > >thrillers) through my "research" of TEMPEST, and secondarily through > >the TSCM web site (which is apparantly run by the guy/organization > >that runs this group, how about that?). > > > >I'm hoping to learn a lot here. > > > >Regards, > >Kevin > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > 10362 From: Charles Taylor Date: Wed Dec 8, 2004 6:12pm Subject: TSCM Video Hello Everyone, My name is Charles Taylor and I want to introduce myself to the group. My name may sound familiar to a few of you since I was the primary author for the text book "Telephone Eavesdropping and Detection", and was the Program Coordinator and primary instruction for the two 40 hour course taught at Texas A&M: Basic Electronic Eavesdropping Countermeasures and "Advanced Telephone Eavesdropping Countermeasures" I am currently working on 1 hour and 40 minute video which will be available in early February on Industrial Espionage and Electronic Eavesdropping. The video, entitled "The Red Balloon" is primarily targeted towards three markets. The first being the lay people who are wanting to find a TSCM company to sweep their offices; the second being Security Directors; and the third being security companies and private investigators contemplating entering the TSCM business. The video is divided into 12 Chapters and bread down as follows: CHAPTERTITLE Chapter 1 Introduction Chapter 2 Real Issues Surrounding Espionage Chapter 3 How Big is the Problem Chapter 4 Bugs - Radio Transmitters Chapter 5 Wiretapping Chapter 6 Telephone Instrument Modifications and Infinity Transmitters Chapter 7 Other Eavesdropping Devices Chapter 8 Confidential Information, Threat Levels and Recommendations Chapter 9 Properly Equipped TSCM Service Providers Chapter 10 Finding a TSCM Service Provider Chapter 11 Legal Issues Surrounding Electronic Eavesdropping and TSCM Services Chapter 12 Wrap Up The first 8 Chapters are 98% completed and the entire video should be completed in about 6 weeks. The price for the DVD is projected to be released at an introductory price of $99, but will eventually sell at the full retail price of $199. Jim Atkinson as already viewed the first 8 Chapters and is a supporter of the video. Accordingly, I have asked and received his permission to contact the group and ask for you to contribute any photographs or videos that you may have that you feel might be beneficial to the video. All contributions will be clearly identified as being contributed by your company and you will be given full recognition in the last segment "The Credits" of the video. Please contact me directly at ctaylor@p... if you need further information or wish to send me any photos or videos. Thanks, Charlie 10363 From: Date: Wed Dec 8, 2004 9:52pm Subject: Re: TSCM Video Hello Charles your video sounds very interesting and I will certainly order a copy if in PAL format[ if not I will try to obtain an NTSC player Might be useful to record a number in PAL for the UK and others and also various other formats for worldwide distribution. Please add me to your list of purchasers Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF England 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom designed covert electronic audio and video devices. Sweep Services - Professional physical and Electronic countermeasures utilising state of the art laboratory radio scanning and detection equipment. Note: Any fellow WAPI and UKPIN members welcome to phone or call in to discuss projects and applications or simply for free advice. Workshop located alongside M58 junc 3. [Non-text portions of this message have been removed] 10364 From: Michael Dever Date: Wed Dec 8, 2004 10:49pm Subject: Dream Specification Further to recent posts about 'dream teams' and 'dream instrumentation' suites and my earlier post about tender specifications, would anyone care to offer input to a 'dream' tender specification for TSCM services. Thanks in advance Regards Mike Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 10365 From: Andy Cuff Date: Thu Dec 9, 2004 0:27pm Subject: RE: TSCM Dream Team Hey, Great list but it'll be a bitch for Santa to get it down your chimney ;o) Regards -andy cuff The Talisker Network Security Portal http://securitywizardry.com Computer Network Defence Ltd -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: 08 December 2004 06:32 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] TSCM Dream Team Easy, RF: Give me a bank of 1.5 billion sample per second, 16 bit digitizers that each have a dedicated multi-teraflop DSP pre-processor on the back end that provides a massively parallel, infinite bandwidth direct conversion receiver, and then hub all of the receivers into a harvest 64/128 CPU with 18 GB of RAM, and several terabytes of hard drive. Basic system would have 32 banks, each with a pre-selected 150 MHz band-width, so that it is impossible to every miss any burst or packet transmission (even UWB). Line Analysis: Auto impedance matching, Auto-Ranging time and frequency domain reflectometer system with pulse rise times as small as 50 ps. Shoots 8 pairs/16 wires at once, and all circuits protected up to 600 volts. Built in search receiver, laboratory grade instrument capable to making repeatable measurements. Coded data burst to identify and help trace out wiring. Inside a building the system must have 10 mm resolution on all power, telephone, and similar conductive paths. Physical Search: Combined X-Ray, Thermal inspection, and Forensic lighting system where the images taken during construction or introduction are used to index every perceivable imaged anomaly found during the sweep, completely under computer control. A very small hydraulic man-lift with rubber tires that can walk up the stairs by itself, or that can be moved in passenger elevators. This way you don't have to climb ladders during the sweep, and can just roll from ceiling tile to ceiling tile. How about a tripod mounted ultra-high precision 16 bit all digital thermal camera, with a resolution of at least .01 degree. Tripod contains a computer controlled servo system that pans and tilts the camera under computer control to seek out and catalog all thermal anomalies automatically. and so on. -jma At 05:35 PM 12/7/2004, Andy Cuff wrote: >Hi, >Whilst I'm on a roll, I thought I'd ask the list members if anyone is >willing to share their TSCM equipment dream team, vendors excluded for >obvious reasons. I'd also suggest that negative opinions on the various >products be avoided. > > Regards > -andy cuff >The Talisker Network Security Portal >http://securitywizardry.com >Computer Network Defence Ltd ---------------------------------------------------------------------------- ------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links --- Incoming mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.804 / Virus Database: 546 - Release Date: 30/11/2004 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.807 / Virus Database: 549 - Release Date: 07/12/2004 10366 From: delta Date: Thu Dec 9, 2004 0:47pm Subject: megohmeter http://www.chauvin-arnoux.com/produit/Famille_detail.asp?idFam=679&idPole=1 hello everybody is this instrument a good one for tscm ? do you know this product ? david 10367 From: Mitch D Date: Fri Dec 10, 2004 3:13am Subject: Re: megohmeter youd get more practical use out of a fluke 177 or better that can handle 40 m ohms for line balance testing etc --- delta wrote: > > http://www.chauvin-arnoux.com/produit/Famille_detail.asp?idFam=679&idPole=1 > > hello everybody > is this instrument a good one for tscm ? do you know this > product ? > david > > > > > ===== Mitch Davis TSCM/Special Operations Group Inc. Nashville,TN.USA MitchD@t... site:www.tscmusa.com. Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 __________________________________ Do you Yahoo!? The all-new My Yahoo! - Get yours free! http://my.yahoo.com 10368 From: Mitch D Date: Fri Dec 10, 2004 3:37am Subject: Re: TSCM Dream Team In a perfect world I'd really love to deploy a kookachu monkey that would be capable of finding spare pairs,and devices etc above ceiling tiles and wouild be proficient with thermal imaging operational capabilities in confined areas. I would also like to use this monkey to chase after the client that insists on dissappearing with the building keys during a sweep. This would be done in an effort to cut down on using multiple size ladders,and wasting hours tracking down the key "honcho",repeatedly...;) --- Andy Cuff wrote: > > Hi, > Whilst I'm on a roll, I thought I'd ask the list members if > anyone is > willing to share their TSCM equipment dream team, vendors > excluded for > obvious reasons. I'd also suggest that negative opinions on > the various > products be avoided. > > Regards > -andy cuff > The Talisker Network Security Portal > http://securitywizardry.com > Computer Network Defence Ltd __________________________________ Do you Yahoo!? Jazz up your holiday email with celebrity designs. Learn more. http://celebrity.mail.yahoo.com 10369 From: James M. Atkinson Date: Fri Dec 10, 2004 0:14pm Subject: Re: TSCM Dream Team Maybe the monkey could have a CCD video camera and IR illuminator surgically installed on his head. Do you think the monkey could attend West Point? Maybe the monkey could be taught to pick locks. -jma At 04:37 AM 12/10/2004, Mitch D wrote: >In a perfect world I'd really love to deploy a kookachu monkey >that would be capable of finding spare pairs,and devices etc >above ceiling tiles and wouild be proficient with thermal >imaging operational capabilities in confined areas. >I would also like to use this monkey to chase after the client >that insists on dissappearing with the building keys during a >sweep. > >This would be done in an effort to cut down on using multiple >size ladders,and wasting hours tracking down the key >"honcho",repeatedly...;) ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10370 From: John Papaleo Date: Fri Dec 10, 2004 0:42pm Subject: RE: TSCM Dream Team test -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Friday, December 10, 2004 1:15 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] TSCM Dream Team Maybe the monkey could have a CCD video camera and IR illuminator surgically installed on his head. Do you think the monkey could attend West Point? Maybe the monkey could be taught to pick locks. -jma At 04:37 AM 12/10/2004, Mitch D wrote: >In a perfect world I'd really love to deploy a kookachu monkey >that would be capable of finding spare pairs,and devices etc >above ceiling tiles and wouild be proficient with thermal >imaging operational capabilities in confined areas. >I would also like to use this monkey to chase after the client >that insists on dissappearing with the building keys during a >sweep. > >This would be done in an effort to cut down on using multiple >size ladders,and wasting hours tracking down the key >"honcho",repeatedly...;) ------------------------------------------------------------------------ ----------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ------------------------------------------------------------------------ ----------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ------------------------------------------------------------------------ ----------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ------------------------------------------------------------------------ ----------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10371 From: James M. Atkinson Date: Fri Dec 10, 2004 3:38pm Subject: Someone is dumping CCS stock again About 60 minutes ago someone started dumping CCS stock, again the stock price plummeted (again) to .20 They must be getting ready to disclose some more unfortunate news again. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10372 From: James M. Atkinson Date: Fri Dec 10, 2004 4:15pm Subject: New bill targets some peeping Toms - Hidden cameras found on warships http://www.cnn.com/2004/LAW/12/09/video.voyeurs.ap/index.html New bill targets some peeping Toms - Hidden cameras found on warships WASHINGTON (AP) -- Camera phones may make great Christmas gifts, but people better not use them for peeping-Tom photos on federal property. In one of its last moves of the year, Congress passed a bill that would levy heavy fines and prison time for anyone who sneaks photos or videos of people in various stages of undress, a problem lawmakers and activists called the new frontier of stalking. While camera phone voyeurism probably won't be high on the list of federal crimes the FBI and other federal agencies pursue, "at least in theory there is now federal protection available so people can't unknowingly have their private parts photographed, downloaded and transmitted around the world," said Hanan B. Kolko, a New York civil liberties lawyer. The bill, which President Bush is expected to sign, would make it a crime to videotape or photograph the naked or underwear-covered private parts of a person without consent when the person has a reasonable expectation of privacy. Conviction could lead to a fine of not more than $100,000 or imprisonment for up to one year, or both. 'Upskirting' and 'downblousing' The measure got voice vote approval in both chambers of Congress -- the House on September 21 and the Senate on Tuesday. The legislation would apply only in federal jurisdictions, such as federal buildings, national parks or military bases, but it carves out exceptions for law enforcement, intelligence and prison work. The use of "nanny cams" and other hidden recording devices like pinhole cameras have been favorites of peeping Toms for years, lawmakers say. But the proliferation of tiny cellular telephones that can take pictures silently and shoot video has taken the crime out of bedrooms and bathrooms and into public places such as grocery stores, sidewalks and restaurants. Some people then transfer the photos to Internet sites featuring what are called "upskirting" and "downblousing," lawmakers said. While secretly photographing people in a compromising position is against the law in some states -- Florida and South Dakota instituted cameraphone voyeurism laws in July, for example -- "what this does is set a national standard," Kolko said. "It's pretty narrowly crafted, and protects those parts of a person's body that they wouldn't want to be photographed or videotaped, and especially now that photography and video images can be downloaded and transmitted across the Internet within seconds around the world, it gives people protection from worldwide exposure without their consent," he said. Peeping on ships Although the bill limits the jurisdiction to federal property, that doesn't mean it won't be used. Navy officials in the past few years have twice found small cameras hidden in women's rooms on ships heading out of Norfolk, Virginia. In March, a female officer on the cruiser USS Monterey discovered a small wireless camera mounted in the changing area of the women's shower, and in November 2002, Navy officials charged a first-class petty officer on destroyer USS Briscoe with planting a miniature video camera in a women's room on that ship. The Briscoe sailor pleaded guilty at a summary court-martial and had his rank reduced. No one was charged in the Monterey incident because the camera was not yet operable and the ship was unable to establish criminal liability to the commanding officer's satisfaction, Charles Owens, spokesman for the Atlantic Fleet Naval Surface Force, said Thursday. The United States isn't the only place cracking down on camera phones. Saudi Arabia's highest religious authority barred the use of them for "spreading obscenity," while Australian police in November arrested a man for using his camera phone to take pictures of topless women sunning themselves on a Sydney beach. The phone was ordered destroyed and the man was fined 500 Australian dollars ($388 U.S.) after pleading guilty. "While it's a personal choice for female sunbathers to sunbake topless at a beach, this type of incident is clearly an invasion of one's privacy," a police spokesman said. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10373 From: James M. Atkinson Date: Fri Dec 10, 2004 4:18pm Subject: Surveillance camera found onboard USS MONTEREY http://www.cnsl.spear.navy.mil/PR/pressrls.asp?ID=204 For Immediate Release March 04, 2004 Release No. 16-04 Surveillance camera found onboard USS MONTEREY NORFOLK, VA. (CNSL) ñ At approximately 6:30 p.m., March 1, a female officer onboard USS MONTEREY discovered a metal bracket mounted in the changing area of the female shower. Further inspection by the officer revealed a small black wireless camera. Scene was immediately secured to non-essential personnel and the area was investigated. The shipís chain of command was also immediately notified along with NCIS who are currently conducting an investigation. It appeared that the camera had been recently installed and was not assessed as operational due to the receiver not being present and the coaxial cable did not have a crimped on connection. There is no evidence to suggest that any pictures or video had been taken or a personís privacy compromised. - USN - ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10374 From: James M. Atkinson Date: Fri Dec 10, 2004 4:18pm Subject: Camera found in women's restroom on Navy destroyer http://www.estripes.com/article.asp?section=104&article=8598&archive=true Camera found in women's restroom on Navy destroyer By Sandra Jontz, Washington bureau European edition, Friday, June 21, 2002 ARLINGTON, Va. ≠ Naval investigators are probing a case in which a telephone repairman found a miniature video camera tucked above a womanís restroom aboard the Navy destroyer USS Briscoe, in port in Norfolk, Va., an official said. Upon discovering the wires Monday, the repairman followed the cables to an adjacent room, where he found surveillance equipment and television cameras, said spokesman Cmdr. Terry Sutherland, of the Naval Surface Warfare of the U.S. Atlantic Fleet. The shipís commander has taken the lead in the investigation and called in help from the Naval Criminal Investigation Service, Sutherland said. The incident was first reported Wednesday in the (Newport News, Va.) Daily Press and the Virginian-Pilot. Sutherland said he did not know how long the camera had been in the bathroom or if any videotapes had been made. "Thatís all part of the investigation," he said. The Navy has no plans to inspect other ships, he said. "This is an isolated incident. Itís not like itís an F-14 where a wheel falls off and we ground the whole fleet. It was found on one ship and the commanding officer has taken appropriate action," Sutherland said. "We donít want this to be a knee-jerk reaction Ö and there is no witch hunt out there. Anything that affects good order and discipline will be dealt with. But we donít want to make this into an uproar." Immediately after the discovering, the commanding officer cordoned off the area, called in for NCIS personnel and began interviewing sailors, Sutherland said. About 35 to 40 of the 300-plus member crew are women, Sutherland said. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10375 From: James M. Atkinson Date: Fri Dec 10, 2004 4:39pm Subject: Sailor Faces Punishment For Spying On Shipmates https://www.patrick.af.mil/deomi/Library/EOReadFile/Gender/Gen_Spring03/Sailor%20Faces%20Punishment%20For%20Spying%20On%20Shipmates.pdf Sailor Faces Punishment For Spying On Shipmates 1 Newport News Daily Press November 23, 2002 Sailor Faces Punishment For Spying On Shipmates By R.W. Rogers, Daily Press A Navy noncommissioned officer is facing what amounts to an administrative action for wiring a miniature video camera to spy on female shipmates aboard the USS Briscoe, a destroyer based in Hampton Roads. The petty officer first class, who was not named, has been charged with violating Article 134 - crimes against good order and discipline. The charge will be heard in a summary court- martial, which has yet to be scheduled and won't be open to the press or the public because it is considered a personnel action. If found guilty, the sailor's maximum punishment could be loss of one rank, loss of two -thirds of his pay for a month and restriction for two months. Navy officials said the petty officer is off the Briscoe pending the court- martial. He could potentially go back to the ship, a Navy spokesman said. A petty officer first class, especially on a ship the size of the Briscoe, holds a leadership position. It usually takes several years for an enlisted sailor to reach that rank. The miniature camera was found in mid-June above a female restroom. A telephone repair technician found the camera cables and followed them to a television set in an adjacent workshop. Navy officials did not say how long investigators believe the camera was in place or if it was used to make any videotapes. The Naval Criminal Investigative Service conducted an investigation and turned its findings over to the captain of the Briscoe, Cmdr. Scott M. Sundt. Sundt decided that the sailor should be tried in a summary court-martial - the lowest of three categories of courts- martial under the Uniformed Code of Military Justice. Sundt could have ordered the sailor tried in another court where punishment upon conviction would have brought a harsher sentence. A single officer will preside over the court- martial. About 40 female and 300 male sailors are assigned to the Spruance-class destroyer. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- From: James M. Atkinson, Comm-Eng Date: Fri Dec 8, 2000 7:43pm Subject: Mexico to Cut Illegal Wiretaps Mexico to Cut Illegal Wiretaps http://www.iht.com/articles/3609.html NYT NYT Thursday, December 7, 2000 MEXICO CITY President Vicente Fox's newly appointed national security chief says he will try to unravel a rat's nest of illegal government wiretaps that politicians and the police have used "not to fight crime, but to fight criticism." Adolfo Aguilar Zinser, chief of Mexico's new national security council, said Tuesday that government spying, especially electronic surveillance, had become "an institution used partly to intimidate opposition leaders, political parties, newspaper editors, newspaper reporters, union leaders - people the government considered enemies." Mr. Fox, the first opposition leader to wrest control of the presidency from Mexico's Institutional Revolutionary Party since 1929, signaled in his inauguration speech on Friday his intent to stop illegal government surveillance. Organized crime and drug traffickers may still be targeted, however. For Related Topics See: Americas < < Back to Start of Article MEXICO CITY President Vicente Fox's newly appointed national security chief says he will try to unravel a rat's nest of illegal government wiretaps that politicians and the police have used "not to fight crime, but to fight criticism." Adolfo Aguilar Zinser, chief of Mexico's new national security council, said Tuesday that government spying, especially electronic surveillance, had become "an institution used partly to intimidate opposition leaders, political parties, newspaper editors, newspaper reporters, union leaders - people the government considered enemies." Mr. Fox, the first opposition leader to wrest control of the presidency from Mexico's Institutional Revolutionary Party since 1929, signaled in his inauguration speech on Friday his intent to stop illegal government surveillance. Organized crime and drug traffickers may still be targeted, however. MEXICO CITY President Vicente Fox's newly appointed national security chief says he will try to unravel a rat's nest of illegal government wiretaps that politicians and the police have used "not to fight crime, but to fight criticism." Adolfo Aguilar Zinser, chief of Mexico's new national security council, said Tuesday that government spying, especially electronic surveillance, had become "an institution used partly to intimidate opposition leaders, political parties, newspaper editors, newspaper reporters, union leaders - people the government considered enemies." Mr. Fox, the first opposition leader to wrest control of the presidency from Mexico's Institutional Revolutionary Party since 1929, signaled in his inauguration speech on Friday his intent to stop illegal government surveillance. Organized crime and drug traffickers may still be targeted, however. MEXICO CITY President Vicente Fox's newly appointed national security chief says he will try to unravel a rat's nest of illegal government wiretaps that politicians and the police have used "not to fight crime, but to fight criticism." Adolfo Aguilar Zinser, chief of Mexico's new national security council, said Tuesday that government spying, especially electronic surveillance, had become "an institution used partly to intimidate opposition leaders, political parties, newspaper editors, newspaper reporters, union leaders - people the government considered enemies." Mr. Fox, the first opposition leader to wrest control of the presidency from Mexico's Institutional Revolutionary Party since 1929, signaled in his inauguration speech on Friday his intent to stop illegal government surveillance. Organized crime and drug traffickers may still be targeted, however. ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= It is by caffeine alone I set my mind in motion. It is by the Juice of StarBucks that the thoughts acquire speed, The hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. ======================================================================= 2043 From: James M. Atkinson, Comm-Eng Date: Sat Dec 9, 2000 11:45am Subject: A tale of corporate espionage Published Saturday, December 9, 2000, in the Miami Herald A tale of corporate espionage http://www.herald.com/content/today/business/digdocs/008082.htm BY ELAINE WALKER ewalker@h... Given the nature of the competitive office supply business, Aubrey James Fisher figured he had information that Office Depot's rivals would be willing to pay for. A graphic designer for the Delray Beach retail chain, Fisher had access to Office Depot's sale prices and promotions several weeks before they became public. In an effort to make some extra money, Fisher arranged deals to sell the information to rivals Office Max and Staples for payments of $1,000 and $2,500. The idea was that the competition could use the information to undercut Office Depot's prices. While Fisher thought his scheme was working, what he didn't know was that both companies had reported his offer to the FBI. All the conversations and any payments to Fisher were monitored by the FBI, as part of a sting operation. ``I think they want to win the competitive wars, but only legitimately,'' said Allison Burroughs, assistant U.S. attorney in Boston. Fisher, 28, of Coconut Creek, was charged this week with one count of mail fraud by the U.S. Attorney's Office in Boston for trying to sell confidential Office Depot information to Staples. He had been indicted in July by a federal grand jury in Cleveland on 20 counts of wire fraud and seven counts of mail fraud for a similar scheme involving Office Max. The Boston case is being transferred to Cleveland. ``Office Depot is supporting and cooperating with the FBI,'' said company spokeswoman Lauren Garvey. ``We commend the FBI for their work in the case. It's now a matter for the federal courts to decide.'' Although Fisher initially pleaded not guilty when he was arrested Sept. 13 in Delray Beach on the Ohio charges, he intends to plead guilty later this month in both cases, said his Fort Lauderdale attorney John Contini. Fisher has been allowed to remain in South Florida on a $30,000 bond since his arrest. Contini said he has worked out a deal with prosecutors in Boston and Cleveland that will allow for most of the charges to be dropped. He is hoping that the court will consider the fact that Fisher had no prior criminal record and let him off without jail time. The maximum penalty for each charge is five years imprisonment, a fine up to $250,000 or both. ``The prosecutors recognize that he's not a poster boy for corporate espionage,'' Contini said. ``He's a young man who obviously had a little too much time on his hands. ``This is one abhorrent series of actions that are completely incongruous with everything he has done to date in his life,'' Contini said. ``He's a bright young man and a hard worker. Hopefully he'll receive a sentence that amounts to a second chance.'' Fisher's scheme unfolded between January and August of this year, when he was fired from his job at Office Depot. During that time, he used pseudonyms of ``Molly McGregor'' in e-mail communication with Staples and ``Stewart Case'' with Office Max. His e-mails offered information scheduled to appear in Office Depot's newspaper insert, including products, prices and stock numbers in exchange for payments. Fisher's correspondence with Office Max took place in 20 e-mail messages between Jan. 24 and May 21. During those conversations, Fisher agreed to provide the confidential information for $1,000 per weekly insert. Between March 1 and June 16, Fisher received seven envelopes from Office Max containing $1,000 checks sent via U.S. mail to a Delray Beach Mail Boxes Etc. Although the Ohio grand jury returned an indictment against Fisher on July 11, the indictment was sealed and Fisher remained employed with Office Depot until an undisclosed time in August. Feeling confident that his scheme had worked with one company, Fisher tried again with Staples. During a series of e-mail messages between Aug. 1 and Aug. 24, Fisher agreed to provide Staples with access to Office Depot's sale information for $2,500. The agreement was that Fisher would send the information after he received the first half of the payment sent by Federal Express to the Mail Boxes Etc. Fisher was arrested in connection with the Ohio indictment when he went to pick up the Staples checks on Sept. 13. ``He was in desperate need of money and lost all sense of reason,'' Contini said. ``He exercised extremely bad judgment and made some bad choices. He now recognizes that he had no chance of getting away with this. He is willing to accept responsibility for his actions and recognize that there are consequences for bad choices.'' ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= It is by caffeine alone I set my mind in motion. It is by the Juice of StarBucks that the thoughts acquire speed, The hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. ======================================================================= 2044 From: Craig Snedden Date: Thu Dec 7, 2000 3:19am Subject: Re: techno-bagpipe music Hi Guys, I cant play the bagpipes, so me trying should sound a bit techno.... Any takers? Seriously, "bagpipe" (techno or not) or "harmonica" sounds are often used in place of "white noise" in masking procedures to counter TS & also are favoured in Electronic Warfare operations to try to jam enemy radio transmissions. There's nothing more infuriating to a Sigint Operator to find his headphones full of the Pipes and Drums of the Strathclyde Police Pipe Band..... :-) I'd hve thought a suitable MP3 file would be easily found. (Since I'm in Scotland I'd offer to go and source one locally and post at cost if anyone is that seriously interested, but with Christmas fast approaching, it would probably be February before it got to the US!) Regards, Craig ----- Original Message ----- From: "Mike" To: Sent: Wednesday, December 06, 2000 8:45 PM Subject: Re: [TSCM-L] techno-bagpipe music > I mentioned bagpipe music could be used as backround noise > on a window pane to counter laser surveillance. I heard this > years ago from an ole pro - Jim Carter. > Nuff Said- > Bootleg > > ----- Original Message ----- > From: David Alexander > To: 'Technical security mailing list' > Sent: Wednesday, December 06, 2000 3:24 AM > Subject: [TSCM-L] techno-bagpipe music > > > > A while ago on this list someone mentioned techno-bagpipe music as the > bets > > thing to use when spotting bugs. I really would like to get a sample of > this > > as it really has my curiosity fired up. If anyone has a wav sample they > > could send me I (and the guys in the office) would be eternally grateful. > > > > TIA > > > > David Alexander > > Project Manager & Information Security Consultant > > Qualified BS7799 Lead Auditor > > Triskele Ltd. > > > > Office 01491 833280 > > Mobile 0780 308 3130 > > > > > > [Non-text portions of this message have been removed] > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 2045 From: Craig Snedden Date: Thu Dec 7, 2000 3:26am Subject: Re: 2 questions, Encryption & who's signature could this be? I'd agree with Charles' comments below. I have a good friend who is a Tech Officer with a law enforcement agency here in the U.K. He has installed cameras and mic's in just about any obect you care to mention. During a "period between posts" he gave me a hand installing a covert camera in a clients premises. The job was done very quickly, professionally, with all the angles covered and no "signature". Particular attention was paid to leaving the scene exactly as we found it, digital pictures being taken before and after and each crumb of debris knocked down during the install (in a roof space) was picked up (hands and knees job) and taken away by us. I'd have to imagine that US agencies work to similar standards, so the debris would suggest to me an "amateur" job. Either way, your client seems to be the best man to check the thing out for himself. Craig ----- Original Message ----- From: "Charles@t..." To: Sent: Thursday, December 07, 2000 12:36 AM Subject: Re: [TSCM-L] 2 questions, Encryption & who's signature could this be? > You can install a camera in just about anything. A fan housing would be no > problem. > No need for a signature, leave those for the movies. > > If this guy is really in plumbing and heating, then he would be a good > person to perform an inspection of the suspect fan. If there's anything in > it that doesn't look like it should be there, then he can call you and hire > you to check it out further. > > Charles > > > > ----- Original Message ----- > From: > To: > Sent: Wednesday, December 06, 2000 9:38 PM > Subject: [TSCM-L] 2 questions, Encryption & who's signature could this be? > > > > Does anyone in the group have any further info on how the FBI is > > penetrating encrypted devices. What technology are they using etc? > > One other question for the group. A client called me last week. He > > bought a new model home in western Minnesota. His expertise is > > plumbing and heating. He doesn't know why he did it, other than > > curiosity, but just before he closed on the house he inspected the > > fan in the master bath. He said "Its probably force of habit because > > I'm in the business of installing this stuff". After closing on the > > house, the next day he went back into that bath and discovered that > > the fan had been changed. He found a few ceiling particles on the > > floor so he went to investigate. He is asking me if its possible to > > install a camera inside of the fan housing. > > I am asking the group if you might know, who goes to the trouble of > > this kind of installation? Is this a trademark or signature, if you > > will, of a particular agency? This is of course assuming the guy is > > right and there is a camera up there. > > I don't want to travel 3hrs and waste this guys money if I don't have > > to. > > What do you think? > > Dan McGraw > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 2046 From: Date: Sun Dec 10, 2000 10:36pm Subject: Newbie interested in a TSCM career I hope this subject matter is appropriate for the list. I am interested in a career in the TSCM industry. I either have completed, am completing, or have made arrangements to complete phases 1-4 of the training outline on JMA's website. However, I live in west TN and am having a difficult time arranging for the proper instruction for phases 5 and 6. I was hoping maybe you could provide some insight into where this training is available. I am willing to travel if it is not available in my area. Upon completion of phases 1-6 I am assuming that the next step would be an introductory TSCM program. If anyone has any advice could you please forward some information to me at this email address. Thank you for your time. 2047 From: Vangelis Date: Sun Dec 10, 2000 8:29pm Subject: Re: A tale of corporate espionage >Fisher, 28, of Coconut Creek, was charged this week with one count of mail >fraud by the U.S. Attorney's Office in Boston for trying to sell >confidential Office Depot information to Staples. He had been indicted in >July by a federal grand jury in Cleveland on 20 counts of wire fraud and >seven counts of mail fraud for a similar scheme involving Office Max. Curious, mail and wire fraud? I fail to see how such charges are applicable. It's not even an espionage case, to my mind. Any insider who betrays the confidence of his own employer, is simply a backstabbing turncoat. Next thing you know, possession of select TSCM-related devices will be "conspiracy to commit wire fraud" by some leap of anti-logic. -V 2048 From: Steve Uhrig Date: Mon Dec 11, 2000 11:29am Subject: Submini mic for mini disc recorder Hello all, While this is a bit off the list charter, several members have legitimate need to do low profile or clandestine audio recording for situations where it is legal. A friend is manufacturing a tiny mic intended for mini disc recorders that likely would have other applications as well. http://cboss.com/jam/MDSM-1.htm I get no commission for any sales. Just referring something which may be useful to list members. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2049 From: mike f Date: Mon Dec 11, 2000 11:40am Subject: RE: Submini mic for mini disc recorder Steve,is that the picture of the Mic on the top of the web page,Thats the Mic!!!! If so Steve Thanks for Info! later4,mike fiorentino From: Steve Uhrig [mailto:steve@s...] Sent: Monday, December 11, 2000 12:30 PM To: TSCM-L@egroups.com Subject: [TSCM-L] Submini mic for mini disc recorder Hello all, While this is a bit off the list charter, several members have legitimate need to do low profile or clandestine audio recording for situations where it is legal. A friend is manufacturing a tiny mic intended for mini disc recorders that likely would have other applications as well. http://cboss.com/jam/MDSM-1.htm I get no commission for any sales. Just referring something which may be useful to list members. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2050 From: Robert Dyk Date: Mon Dec 11, 2000 1:04pm Subject: The Football We are presently building several "prop" surveillance units for a company shooting a film here in Canada. They have asked that we build a mockup of the presidential "Football". Does anyone on the list have any information on this device. What does it look like, and what actions might take place for the Commander in Chief to actually authorize a nuclear strike using this unit? Any input would be greatly appreciated. Many thanks, Robert Dyk dyk@c... Worldwide Security Ltd. Mississauga, Ontario, Canada 2051 From: William Knowles Date: Mon Dec 11, 2000 1:48pm Subject: Re: The Football On Mon, 11 Dec 2000, Robert Dyk wrote: Robert, > We are presently building several "prop" surveillance units for a > company shooting a film here in Canada. They have asked that we > build a mockup of the presidential "Football". Does anyone on the > list have any information on this device. What does it look like, > and what actions might take place for the Commander in Chief to > actually authorize a nuclear strike using this unit? Any input > would be greatly appreciated. I don't know if this helps or not, But during a usual late night of research I found myself watching a straight to video movie on HBO called 'Chain of Command ' with Roy Scheider playing the president. The movie revolves the "Football" falling into the wrong hands, You might want to rent that one to see what these guys did for a mock-up. I wish I could be more help. William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 2052 From: Robert Dyk Date: Mon Dec 11, 2000 1:19pm Subject: The Football My apologies in advance, if this request is somewhat beyond the normal scope of the list. Robert Dyk Worldwide Security Ltd. Mississauga, Ontario, Canada dyk@c... 2053 From: Date: Mon Dec 11, 2000 2:06pm Subject: Re: Submini mic for mini disc recorder In a message dated 12/11/00 9:30:41 AM Pacific Standard Time, steve@s... writes: << A friend is manufacturing a tiny mic intended for mini disc recorders that likely would have other applications as well. http://cboss.com/jam/MDSM-1.htm >> Fifty cents for mic, 30 cents for mini plug ten minutes to make. Not bad for $27.95 This project is used as a confidence builder for techs in Electronic Surveillance 101 at FLETC, AID, Jarvis and other intel schools. 2054 From: Miguel Puchol Date: Mon Dec 11, 2000 7:13pm Subject: RE: Submini mic for mini disc recorder I was going to say something on this line, but decided not to hurt anyone's feelings :-) You could make it even smaller, by soldering the mic element directly to the 3.5mm plug and wrapping it with a short length of heatshrink tube. For a little more than what is asked, you can get a Sony stereo mic that plugs straight into the Mic jack of a MiniDisc, and produces great quality recordings, being not very large. Cheers all, Mike > -----Mensaje original----- > De: MACCFound@a... [mailto:MACCFound@a...] > Enviado el: martes, 12 de diciembre de 2000 2:07 > Para: TSCM-L@egroups.com > Asunto: Re: [TSCM-L] Submini mic for mini disc recorder > > > In a message dated 12/11/00 9:30:41 AM Pacific Standard Time, > steve@s... writes: > > << A friend is manufacturing a tiny mic intended for mini disc > recorders that likely would have other applications as well. > http://cboss.com/jam/MDSM-1.htm >> > > Fifty cents for mic, 30 cents for mini plug ten minutes to make. > Not bad for $27.95 > > This project is used as a confidence builder for techs in Electronic > Surveillance 101 at FLETC, AID, Jarvis and other intel schools. > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2055 From: Mike Date: Mon Dec 11, 2000 11:46am Subject: Re: A tale of corporate espionage That's NOTHING! Want to see something really scary, try reading the Code of Federal Regulations. You soon find the Feds have laws covering Jaywalking all the way up but not one for Murder. If you say murder someone on Federal property they charge you with violating his Civil Rights. (by killing him) Of course they then load you up with 100 years with no parole. The Feds LOVE giving out HUGE sentences. Now about those devices. Several items that some people use in their business, are illegal to possess and it's a small fed felony to get caught with them. BUT- when you are in the process of buying the unit and you involve a third person in even the smallest way. (Did your wife drive you to buy it or write the check or mail it?) The feds now can file Little RICO charges against you for Racketeering since 3 people were involved. (Buyer, Seller and Wife/etc.) Minimum time on that conviction is 20 years. (Yes - they WILL lie in court and even bring in fake witnesses to get their conviction) Yes, if they search your home and find just a few parts of something or a few chemicals, the will expound theories about what dangerous devices you were in the process of building for evil purposes. (Better not keep bleach and ammonia in the same home. Together they make deadly Chlorine gas which might get you charged with some terrorist plot under vague NBC statutes. These things don't happen you say? I knew a guy that got 15 years for being at a place where things were found. The Feds had NO proof he was there other than a single print on a beer bottle they found at the bottom of the outside trash container. THINGS can easily be any of many devices commonly used by Security Companies. Think these are horror stories? Wrong! NEXT - go to any decent law library and pick up any law book containing federal case law and start reading about what the feds did to those guys. (And especially HOW they did it!) I can easily think of many ways your guy could have been indicted on all those charges. Federal law in NOTHING like State law. If they arrest, they'll indict. If they indict, you WILL be coonvicted! Often they hold you WITHOUT bail on even the smallest felony, start forfeiture on your assets and confiscate EVERYTHING including cash, bank accts, vehicles, property and Real Estate soon after your arrest so you can't use these to pay a lawyer. Yes- far before you go to trial, the civil forfeiture against your assets will have been completed while you sit in the Can, broke, with a Lazy Public defender. WOW The above is not a rare case - it's a COMMON situation for most that the Feds arrest! Their conviction rate was above 98 % last Time I looked. Most don't choose trial and simply plea out for a cut in their sentence. The Feds love to LOAD a person up with a zillion charges. They know after sitting in some county jail a year waiting to get to trial, they can get the guy to plea out to the most serious charge and they'll drop the rest. If ever questioned by a Fed, simply politely say you don't want to talk to him unless your lawyer is present. Say NO MORE EVER. Often the Feds go fishing and catch someone saying something that gives them grounds to get a search warrent. BELIEVE THIS, if they ever question you, they'll be looking for the smallest reason to bust you or get a warrent, no matter how friendly they seem. No- your friends case is not surprising at all. But again, that's just the way the Feds operate. They make many regular cops nervous just being near them. That tells ya something! Whenever I've been in situations that meant Feds were also around, I interact with them as little as possibe and show them nothing interesting in the way of hardware or software. Most of the security and hacker conventions are perfect examples places where many strangers are interacting including the teams of various Federal Agents undercover. No one is that perfect that diligent Feds can't sooner or later trick and trap them if they want you even if you are innocent, diligent and the BEST security pro in the world. Likely every word you say on here is being monitored. Think "Carnivore" Think "NSA" Think-Think-Think! Merry Christmass to All - smiles..... Nuff said- Bootleg ----- Original Message ----- From: Vangelis To: TSCM-L Mailing List Sent: Sunday, December 10, 2000 6:29 PM Subject: Re: [TSCM-L] A tale of corporate espionage > > >Fisher, 28, of Coconut Creek, was charged this week with one count of mail > >fraud by the U.S. Attorney's Office in Boston for trying to sell > >confidential Office Depot information to Staples. He had been indicted in > >July by a federal grand jury in Cleveland on 20 counts of wire fraud and > >seven counts of mail fraud for a similar scheme involving Office Max. > > Curious, mail and wire fraud? I fail to see how such charges are > applicable. It's not even an espionage case, to my mind. Any insider who > betrays the confidence of his own employer, is simply a backstabbing turncoat. > > Next thing you know, possession of select TSCM-related devices will be > "conspiracy to commit wire fraud" by some leap of anti-logic. > > -V > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2056 From: James M. Atkinson, Comm-Eng Date: Mon Dec 11, 2000 11:05pm Subject: Re: A tale of corporate espionage Ah Mike, I fail to see what your rant had to do with TSCM, or methods and techniques to find bugs. Granted there are some issues related with the government prosecuting criminals who misuse technology, however; ranting on about how evil the government is because they have the job of punishing wrongdoers is not within the charter of this group. If the law says that private individual can not possess a bug, it's not the governments fault when someone who openly defies the law get convicted. It is also not the governments fault when several criminals get together and conspire to "dance around the law" (who then get busted under RICO). If someone gets busted for selling illegal bugs, and the cops also find a lid of grass, fifteen water pipes, 200 baggies, and a hand grenade they would not be doing their jobs if they only gave the guy a ticket. It is not the government fault when someone openly defies the law, and then openly flaunts their criminal acts daring to be busted (for anything). Since most TSCM'ers have a good (if not great) relationship with various law enforcement agencies there is rarely any serious issues that come up (outside of the occasional parking ticket, etc). TSCM'ers do not violate the law and actually take great effort to avoid anything that could even remotely be considered questionable or outside the law in any way. Please do not post long rants against law enforcement, federal agencies, and so on to the list. Our government is not perfect, but it's what we have... If you don't like the government then vote for a new one, and complain to your government representatives (you do have the power to change things, but only if you vote) -jma At 9:46 AM -0800 12/11/00, Mike wrote: >That's NOTHING! Want to see something really scary, try reading the Code of >Federal Regulations. You soon find the Feds have laws covering Jaywalking >all the way up but not >one for Murder. If you say murder someone on Federal property they charge >you with violating >his Civil Rights. (by killing him) Of course they then load you up with 100 >years with no parole. [Long Winded Rant Snipped] -- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, The hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. ======================================================================= 2057 From: Date: Tue Dec 12, 2000 0:22am Subject: Re: Submini mic for mini disc recorder What is FLETC? Janis MACCFound@aol .com To: TSCM-L@egroups.com cc: 12.12.2000 Subject: Re: [TSCM-L] Submini mic for mini disc recorder 03:06 Please respond to TSCM-L In a message dated 12/11/00 9:30:41 AM Pacific Standard Time, steve@s... writes: << A friend is manufacturing a tiny mic intended for mini disc recorders that likely would have other applications as well. http://cboss.com/jam/MDSM-1.htm >> Fifty cents for mic, 30 cents for mini plug ten minutes to make. Not bad for $27.95 This project is used as a confidence builder for techs in Electronic Surveillance 101 at FLETC, AID, Jarvis and other intel schools. 2058 From: Robert G. Ferrell Date: Tue Dec 12, 2000 8:04am Subject: Re: A tale of corporate espionage >Our government is not perfect, but it's what we have... If you don't >like the government then vote for a new one, and complain to your >government representatives (you do have the power to change things, >but only if you vote) So long as you don't leave any hanging chads... ;-) RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 2059 From: Robert G. Ferrell Date: Tue Dec 12, 2000 8:08am Subject: Re: Submini mic for mini disc recorder >What is FLETC? US Federal Law Enforcement Training Center in Glynco, Georgia. http://www.fletc.gov/ (but there's only a test page up right now, for some reason...) Cheers, RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 2060 From: Date: Tue Dec 12, 2000 3:28am Subject: Re: Submini mic for mini disc recorder In a message dated 12/12/00 5:23:02 AM Pacific Standard Time, Janis.Balklavs-Grinhofs@l... writes: << What is FLETC? >> Federal Law Enforcement Training Center located primarily in Glynco Ga. Also in Arizona. 2061 From: A Grudko Date: Tue Dec 12, 2000 7:06am Subject: Yaesu FT90R Any Yaesu experts out there? I just installed the FT90R (Euro version) in my car for general comms use - I'm involved with local emergency monitoring/response so need a wide range of frequencies (TX&RX from 27 megs to 409megs). This transceiver gives me all the VHF channels I need, but I have a problem on UFH. It receives from 300 - 530 megs but only transmits from 410 to 480 megs - exactly! I need to transmit just a bit lower, 397 and up. As the cut-off on the radio is at exactly 410.00 it must be a band program function rather than a physical limitation of the RF circuitry. Does any one know how to get this radio to TX beyond those limitations (I used to know all the tricks/mods for Bearcat/JIL scanners and Alinco radios to 'open' them)? Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2062 From: A Grudko Date: Tue Dec 12, 2000 7:24am Subject: Re: A tale of corporate espionage ----- Original Message ----- From: James M. Atkinson, Comm-Eng > I fail to see what your rant had to do with TSCM, or methods and > techniques to find bugs. Just a thought Quite often a list member makes a point which is off topic, but of interest - as I feel Mike did here. I had some issues I would have like to address to Mike, but there was no personal address referred to in the body of the text. So if I was to reply it would have been on the list, which would have been, in the words of William Jefferson Clinton 'inappropriate..... There are understandable reasons for members of a list such as this to remain anonymous, but there are many ways to still be in eMail contact. I'd like to suggest that all list members suffix their mails with an eMail address, all be it an anonymous Hot Mail or similar address. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2063 From: Date: Tue Dec 12, 2000 6:32am Subject: The equipment was listed as a cell phone connected to 24 batteries, http://www.cvni.net/radio/e2k/ Mossad: A Sentence and Strike action. In February 1998 an Israeli agent, now known only as Yitzhak Ben-Tal, was arrested in Switzerland by two Swiss Policeman after being caught attempting to place a wire tap on the telephone line of a suspected Hezbollah operative. Abdullah el-Zein a Swiss citizen of Lebanese descent denied any connection with the Hezbollah and claimed to run an Islamic Centre. The centre, Ahl Al-Beit Islamic Centre has links with Lebanon and Iran. El-Zein was also described as a 'car salesman'. Ben -Tal was a member of a team of five Mossad agents tasked to perform the operation in Kenitz, a town near Berne, the others quickly making their escape due to the inability of the Swiss Policemen to realise that they were dealing with a case of espionage. Ben-Tal was caught carrying a bag, of diplomatic origin, containing bugging equipment. The equipment was listed as a cell phone connected to 24 batteries, which when plugged into Abdullah el-Zein's telephone line, would have called a monitoring centre every time el-Zein picked his handset up. In court the Swiss Police officers recounted how they caught Ben-Tal, and others, installing listening devices in the home of the Lebanese car dealer. Ben-Tal, at the time of his arrest admitted his part in the surveillance operation and was remanded. This process took place because the technical equipment was contained in a Diplomatic Bag known to have entered Switzerland via Israeli diplomatic mail. Ben-Tal was later released on £2 million bail, paid by Israel in return for a promise that the agent, Ben-Tal, would return to Israel to face trial. The hearing, two years later, was held in front of 5 judges and Ben-Tal was found guilty of acts committed illegally for a foreign state, of political espionage and of repeated use of false identity documents. The trial lasted a week and at the conclusion the charge of illegal phone tapping was dropped. The presiding judge, Hans Wiprachtiger stated that "The crimes were considerable. Switzerland's sovereignty was violated in a callous way." Ben-Tal was barred from entering Swiss territory for five years, fined 100,000 Swiss Francs and received a suspended sentence of twelve months. The prosecution had originally asked for a 5,000 Franc fine and a jail term of 15 months. Ehud Barak, Israel's prime minister expressed satisfaction at the sentence attracted by Ben-Tal. However the decision to allow Ben-Tal to stand trial was made by the head of Mossad, Ephraim Halevy. This decision led to anger within Mossad and the agents apparently considered strike action , the greatest anger said to be within the specialist units charged with data hacking, electronic eavesdropping and assassination. This obvious humiliation has led to Halevy curbing the agency's activities in Europe of spying on Arab Embassies and other counter-terrorism activities. Even actions in the Arab world were known to have ceased. It is reported that Ehud Barak offered Halevy's post to Ami Ayalon, but as yet there has been no appointment. Ami Ayalon is the head of Shin Beth, the Israeli internal security service. http://www.cvni.net/radio/e2k/ 2064 From: Date: Tue Dec 12, 2000 4:20am Subject: Re: Submini mic for mini disc recorder FYI, Glenco is Glen County, GA. (Brunswick GA.) Paul "Guppy" Gibson [Non-text portions of this message have been removed] 2065 From: Chris Childs Date: Tue Dec 12, 2000 10:46am Subject: Re: A tale of corporate espionage I agree with you James, where I do think the government and law enforcement do need help are in modernizing laws, especially relating to internet, and corporate privacy. Law enforcement has been slow in catching up with modern technology, this is probably due to the fact that they do not have the same access to resources, and government is notoriously slow in responding to changing technology. One look at the shenanigans should dispel any myths about conspiracies theories. Regards Chris >From: "James M. Atkinson, Comm-Eng" >Reply-To: TSCM-L@egroups.com >To: TSCM-L@egroups.com >Subject: Re: [TSCM-L] A tale of corporate espionage >Date: Tue, 12 Dec 2000 00:05:16 -0500 >MIME-Version: 1.0 >Received: from [208.50.144.70] by hotmail.com (3.2) with ESMTP id >MHotMailBBFEFD96003E40042A1DD0329046544D114; Mon Dec 11 21:09:03 2000 >Received: from [10.1.4.53] by fg.egroups.com with NNFMP; 12 Dec 2000 >05:09:14 -0000 >Received: (EGP: mail-6_3_1_3); 12 Dec 2000 05:09:03 -0000 >Received: (qmail 64250 invoked from network); 12 Dec 2000 05:09:03 -0000 >Received: from unknown (10.1.10.27) by l7.egroups.com with QMQP; 12 Dec >2000 05:09:03 -0000 >Received: from unknown (HELO ns.cove.com) (209.113.166.1) by mta2 with >SMTP; 12 Dec 2000 05:09:02 -0000 >Received: from [209.113.204.9] (capm3-9.cove.com [209.113.204.9]) by >ns.cove.com (8.9.3/8.9.3) with ESMTP id AAA29868 for ; >Tue, 12 Dec 2000 00:14:40 -0500 (EST) >From sentto-49964-2519-976597744-childschris Mon Dec 11 21:09:28 2000 >X-eGroups-Return: >sentto-49964-2519-976597744-childschris=hotmail.com@returns.onelist.com >X-Sender: jmatk@tscm.com >X-Apparently-To: TSCM-L@egroups.com >X-Sender: spook@c... >Message-Id: >In-Reply-To: <000001c063a4$e73b8d80$82ec91c6@default> >References: <4.3.2.7.2.20001210182237.02671700@q...> ><000001c063a4$e73b8d80$82ec91c6@default> >Mailing-List: list TSCM-L@egroups.com; contact TSCM-L-owner@egroups.com >Delivered-To: mailing list TSCM-L@egroups.com >Precedence: bulk >List-Unsubscribe: > >Ah Mike, > >I fail to see what your rant had to do with TSCM, or methods and >techniques to find bugs. > >Granted there are some issues related with the government prosecuting >criminals who misuse technology, however; ranting on about how evil >the government is because they have the job of punishing wrongdoers >is not within the charter of this group. > >If the law says that private individual can not possess a bug, it's >not the governments fault when someone who openly defies the law get >convicted. It is also not the governments fault when several >criminals get together and conspire to "dance around the law" (who >then get busted under RICO). > >If someone gets busted for selling illegal bugs, and the cops also >find a lid of grass, fifteen water pipes, 200 baggies, and a hand >grenade they would not be doing their jobs if they only gave the guy >a ticket. > >It is not the government fault when someone openly defies the law, >and then openly flaunts their criminal acts daring to be busted (for >anything). > >Since most TSCM'ers have a good (if not great) relationship with >various law enforcement agencies there is rarely any serious issues >that come up (outside of the occasional parking ticket, etc). > >TSCM'ers do not violate the law and actually take great effort to >avoid anything that could even remotely be considered questionable or >outside the law in any way. > >Please do not post long rants against law enforcement, federal >agencies, and so on to the list. > >Our government is not perfect, but it's what we have... If you don't >like the government then vote for a new one, and complain to your >government representatives (you do have the power to change things, >but only if you vote) > >-jma > > > >At 9:46 AM -0800 12/11/00, Mike wrote: > >That's NOTHING! Want to see something really scary, try reading the Code >of > >Federal Regulations. You soon find the Feds have laws covering Jaywalking > >all the way up but not > >one for Murder. If you say murder someone on Federal property they charge > >you with violating > >his Civil Rights. (by killing him) Of course they then load you up with >100 > >years with no parole. > > > >[Long Winded Rant Snipped] >-- > > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > The hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > ======================================================================= _____________________________________________________________________________________ Get more from the Web. FREE MSN Explorer download : http://explorer.msn.com 2066 From: Date: Tue Dec 12, 2000 11:11am Subject: tscm ethics and training I am a new member to the group. After reading the 2000+ archived posts it seems to me that a major topic of discussion (second only to humor ;)) is the lack of ethics and proper training. I can possibly understand the lack of training and poor ethics. After first becoming interested in TSCM a year or so ago i jumped in to research with both feet. I have purchased several books (and after reading the archives have realized i need to add to the library), combed the net, and tried to make some actual contact with people in the industry (by telephone, email, and this list) with little or no success. I have followed the suggested path of training as outlined on TSCM.com. However when attempting to get serious information on specific training I run in to roadblocks. I can see where some people might turn to a 2 day seminar and hang up a shingle. I wish to avoid this and obtain the proper training and experience. However, I cannot imagine where to go next if the members of this list are unable to suggest guidance. The only options that seem to be left are the charlatans that everyone in this group so wants the novice to avoid. Perplexed, Marc ps- is it the hotmail email? 2067 From: Date: Tue Dec 12, 2000 6:42am Subject: Red/black A while back many of you contributed to a discussion regarding TEMPEST which I found enlightening and enjoyable. Would anyone be interested in discussing Red/Black separation as it applies to TSCM? Also as a general question for those knowledgeable of the US Army SIGSEC program. Or other US services in which SIGSEC was dissolved as an intelligence discipline. Would you TSCM folks have preferred embracing SIGSEC'ers or, as it ended up, with Counter Intell (HUMINT) types! Thanks, Paul "Guppy" Gibson [Non-text portions of this message have been removed] 2068 From: Date: Tue Dec 12, 2000 11:49am Subject: Re: A tale of corporate espionage A display of "full headers" should show the originators "From:" line. If you are using a windows email client you may need to change this setting within the mail clients "options" or "preferences". Other than the occassional "attempted" spoof mail, all emails I have recieved via this list have contained: From:, To: and Reply-To: Hope this helps, if even in just a small way. Niko On Tue, 12 Dec 2000, A Grudko wrote: > ----- Original Message ----- > From: James M. Atkinson, Comm-Eng > > I fail to see what your rant had to do with TSCM, or methods and > > techniques to find bugs. > > > Just a thought > > Quite often a list member makes a point which is off topic, but of > interest - as I feel Mike did here. I had some issues I would have like to > address to Mike, but there was no personal address referred to in the body > of the text. So if I was to reply it would have been on the list, which > would have been, in the words of William Jefferson Clinton > 'inappropriate..... > > There are understandable reasons for members of a list such as this to > remain anonymous, but there are many ways to still be in eMail contact. > > I'd like to suggest that all list members suffix their mails with an eMail > address, all be it an anonymous Hot Mail or similar address. > > > Andy Grudko. D.P.M., Grad I.S, (S.A.) > CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & > intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 > 11) 465 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom > "When you need it done right - first time" > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2069 From: mike f Date: Tue Dec 12, 2000 1:28pm Subject: RE: A tale of corporate espionage Your Post Helped Me.I was trying to Remember How to Access, THE FULL HEADERS info earlier today! I could not remember,how to do it.The Thing is I had Just done it Last week. Today,clicked & clicked on the wrong things. After reading your Post 2 clicks later their it is, thanks,I better save & print this. later4,mike f A tale of corporate espionage A display of "full headers" should show the originators "From:" line. If you are using a windows email client you may need to change this setting within the mail clients "options" or "preferences". Other than the occassional "attempted" spoof mail, all emails I have recieved via this list have contained: From:, To: and Reply-To: Hope this helps, if even in just a small way. Niko On Tue, 12 Dec 2000, A Grudko wrote: > ----- Original Message ----- > From: James M. Atkinson, Comm-Eng > > I fail to see what your rant had to do with TSCM, or methods and > > techniques to find bugs. > > > Just a thought > > Quite often a list member makes a point which is off topic, but of > interest - as I feel Mike did here. I had some issues I would have like to > address to Mike, but there was no personal address referred to in the body > of the text. So if I was to reply it would have been on the list, which > would have been, in the words of William Jefferson Clinton > 'inappropriate..... > > There are understandable reasons for members of a list such as this to > remain anonymous, but there are many ways to still be in eMail contact. > > I'd like to suggest that all list members suffix their mails with an eMail > address, all be it an anonymous Hot Mail or similar address. > > > Andy Grudko. D.P.M., Grad I.S, (S.A.) > CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & > intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 > 11) 465 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom > "When you need it done right - first time" > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2070 From: James M. Atkinson, Comm-Eng Date: Tue Dec 12, 2000 1:59pm Subject: FBI admits breaking into homes of suspected Cuban spies on 5 occasions FBI admits breaking into homes of suspected Cuban spies on 5 occasions http://www.sun-sentinel.com/news/daily/detail/0,1136,36000000000141944,00.html http://www.sun-sentinel.com/news/daily/detail/0,1136,36000000000142039,00.html By VANESSA BAUZ¡ Sun-Sentinel Web-posted: 11:23 p.m. Dec. 11, 2000 MIAMI -- Two years before making any arrests, federal agents entered the homes of five alleged Cuban spies with federal court orders and surreptitiously copied hundreds of encrypted computer diskettes. For years, they watched the comings and goings of the alleged ringleader from an apartment they rented across the street from his North Miami Beach home. Details of the FBI's investigation into the alleged "Wasp Network" spy ring surfaced Monday in special agent Vicente M. Rosado's testimony in federal court in Miami. Rosado said he and other agents from the bureau's Computer Analysis Response Team entered the homes of the five accused spies five times from September 1996 to April 1998, carefully copying the diskettes and then placing them exactly where they found them. The defendants were arrested on Sept. 12, 1998, and charged with acting as unregistered agents of the Cuban government. The U.S. government has accused three of the men of penetrating U.S. military installations and passing defense secrets to Havana. The man accused of being the ringleader, Gerardo Hern·ndez, faces the most-serious charge: conspiracy to commit murder in the deaths of four Brothers to the Rescue fliers who were shot down by Cuban MiGs in 1996. Rosado, a 20-year FBI veteran who specializes in Cuban counterintelligence, testified Monday that he decoded some of the encrypted disks by using Spanish passwords such as "afinacion," "mambi," "cientifico," and "fuerte." He said he found reports relating to the activities the exile organization, Brothers to the Rescue. Searches of the modest apartments, in Hollywood, North Miami Beach and Miami Beach, also yielded two shortwave radios, a Tandy computer and an Epson laptop. Defense attorneys do not dispute their clients were working in South Florida on orders from the Cuban government. However, they argue that the alleged spies did not pass U.S. defense secrets to their bosses in Havana or do anything to endanger the United States. Rather, they say, the suspects infiltrated exile organizations to prevent terrorism on their island. Defense attorneys also say the men acted as de facto agents of the FBI. On Monday, defense attorney Phil Horowitz told jurors his client, Rene Gonzalez, gave the agency information about cocaine smuggling by a member of a now-defunct paramilitary group. Three of the men had worked here under the aliases Manuel Viramontes, Luis Medina and Ruben Campa. In addition to Hern·ndez, the defendants are Antonio Guerrero, Rene Gonz·lez, Ramon Labanino and Fernando Gonz·lez. -- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, The hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. ======================================================================= 2071 From: Miguel Puchol Date: Tue Dec 12, 2000 3:49pm Subject: RE: Yaesu FT90R Hi Andy, My recommendation would be to get a VX-5 or FT-50, if needed with a power amp, as these two do cover down to around 380MHz. I am in the local volunteer fire dept. and we are connected to the professional fire brigade via UHF repeaters that have an uplink in the 403MHz region. For serious work we use Kenwood rigs, but I always have my VX-5 handy just in case. The FT-90 cannot be modified to transmit below 410MHz. For some obscure reason ALL Yaesu mobile/base rigs only go down to 410MHz, whereas ALL portables/handies go down to 380MHz (at least). All the best, Mike > -----Mensaje original----- > De: A Grudko [mailto:agrudko@i...] > Enviado el: martes, 12 de diciembre de 2000 14:06 > Para: TSCM-L@egroups.com > Asunto: [TSCM-L] Yaesu FT90R > > > Any Yaesu experts out there? > > I just installed the FT90R (Euro version) in my car for general > comms use - > I'm involved with local emergency monitoring/response so need a wide range > of frequencies (TX&RX from 27 megs to 409megs). > > This transceiver gives me all the VHF channels I need, but I have > a problem > on UFH. It receives from 300 - 530 megs but only transmits from 410 to 480 > megs - exactly! > > I need to transmit just a bit lower, 397 and up. As the cut-off > on the radio > is at exactly 410.00 it must be a band program function rather than a > physical limitation of the RF circuitry. > > Does any one know how to get this radio to TX beyond those limitations (I > used to know all the tricks/mods for Bearcat/JIL scanners and > Alinco radios > to 'open' them)? > > > Andy Grudko. D.P.M., Grad I.S, (S.A.) > CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & > intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS From: Dave Emery Date: Mon Dec 10, 2001 10:07pm Subject: Re: Final Report - Am I missing something? On Sun, Dec 09, 2001 at 02:26:34PM +0200, A Grudko wrote: > > If I detect surveillance legally put in place by the government I will not > inform the client of that and the clients know it - a simple condition that > has probably kept me out of jail on a few occasions. > Just out of curiousity, how do you know that the surveillance is really government (FBI, DEA etc), and especially truly legal as opposed to rogue ? I realize that government bugging gear is pretty characteristic and has well known signatures, but do you have contacts at the agencies involved to check out devices you find or are you just assuming that if it quacks like a duck it must be a duck and a legal one at that ? Obviously the risk here is that if you *assume* it is on the up and up the bad guys can exploit this and attempt to use devices, frequencies and installations that match typical government stuff so you will ignore it. And of course to the extent the government (and especially local and state government) does less than fully warrent authorized bugging I should imagine that your policy means that you don't ever seriously check the legality of a government bug - as I rather doubt you get to examine the wiretap warrents involved... -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 4293 From: tek492p Date: Mon Dec 10, 2001 10:47pm Subject: Re: New for 2002 - Eavesdropping Threat Profile Jim -- I would be interested in the detection of devices used by foreign government agencies in industrial espionage. Jack 4294 From: Aimee Farr Date: Tue Dec 11, 2001 0:04am Subject: Make & Model: FOIA threats to surv equip. http://dailynews.yahoo.com/h/ap/20011210/us/police_fund_1.html Monday December 10 2:34 PM ET Police Release Drug Plan Details By ANDREA CECIL, Associated Press Writer BALTIMORE (AP) - Police released some details Monday of a $250,000 drug enforcement fund, settling a lawsuit over what critics had called a ``clandestine'' fund subject to little oversight. The newly released invoices showed purchases of wiretap, video and computer equipment but excluded details such as manufacturers and models that Circuit Judge John C. Themelis said could jeopardize public safety. [...] ### ~Aimee 4295 From: James Goldston Date: Tue Dec 11, 2001 6:08am Subject: RE: Corporate TSCM Policy Guide I 2nd the motion. James > -----Original Message----- > From: The Dog's Bollix [mailto:isxpro@y...] > Sent: Monday, December 10, 2001 5:14 PM > To: James M. Atkinson; TSCM-L Mailing List > Subject: Re: [TSCM-L] Corporate TSCM Policy Guide > > > I certainly would be interested. > > Thank you, > > > --- "James M. Atkinson" wrote: > > > > I have developed a "boiler-plate" or model Corporate > > TSCM Policy > > Guide that may be of some assistance to the list > > membership. > > > > I wrote it in such a way that it could be applied to > > anything from a > > very small public company to the larger > > multi-billion public > > corporations. > > > > It is rather long and detailed, but I can post it to > > my website as an > > html document if anybody is interested. > > > > -jma 4296 From: Steve Uhrig Date: Tue Dec 11, 2001 7:35am Subject: Re Make & Model: FOIA threats to surv equip. Once upon a midnight dreary, Aimee Farr pondered, weak and weary: > BALTIMORE (AP) - Police released some details Monday of a > $250,000 drug enforcement fund, settling a lawsuit over what > critics had called a ``clandestine'' fund subject to little > oversight. > The newly released invoices showed purchases of wiretap, video > and computer equipment but excluded details such as manufacturers > and models that Circuit Judge John C. Themelis said could > jeopardize public safety. [...] What this means is 101 Preston Street did not publicly post IFBs (Invitation for Bids) for the law enforcement surveillance requirements listing FREQUENCIES and certain other details which would be given to the successful bidder. The bad guys stop in and read the bid board the same way I do. Do you want the city to ADVERTISE what surveillance frequencies and modes they will be using? The local Radio Shacks will have those frequencies posted on their chart before the equipment is even delivered. You have to consider the safety of the officer on the street as well as the agency as a whole. Do you want the bad guys listening to your body wire repeater on a scanner as you are busting his door down just to find yourself looking down the barrel of his shotgun? It *has* happened. Sometimes it is not conspiracy; it is survival in the real world. And only those who live in that real world should be qualified to comment, which excluded newspaper reporters. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4297 From: Steev Date: Tue Dec 11, 2001 6:14am Subject: RE: Corporate TSCM Policy Guide i concur --- James Goldston wrote: > I 2nd the motion. > > James > > > > > -----Original Message----- > > From: The Dog's Bollix [mailto:isxpro@y...] > > Sent: Monday, December 10, 2001 5:14 PM > > To: James M. Atkinson; TSCM-L Mailing List > > Subject: Re: [TSCM-L] Corporate TSCM Policy Guide > > > > > > I certainly would be interested. > > > > Thank you, > > > > > > --- "James M. Atkinson" wrote: > > > > > > I have developed a "boiler-plate" or model Corporate > > > TSCM Policy > > > Guide that may be of some assistance to the list > > > membership. > > > > > > I wrote it in such a way that it could be applied to > > > anything from a > > > very small public company to the larger > > > multi-billion public > > > corporations. > > > > > > It is rather long and detailed, but I can post it to > > > my website as an > > > html document if anybody is interested. > > > > > > -jma > ===== i want my lay my cack http://www.poontangboy.co.uk and the cack came back. it wouldnt stay away __________________________________________________ Do You Yahoo!? Check out Yahoo! Shopping and Yahoo! Auctions for all of your unique holiday gifts! Buy at http://shopping.yahoo.com or bid at http://auctions.yahoo.com 4298 From: Date: Tue Dec 11, 2001 3:44am Subject: Police Release Drug Plan Details Police Release Drug Plan Details By ANDREA CECIL .c The Associated Press BALTIMORE (AP) - Police released some details Monday of a $250,000 drug enforcement fund, settling a lawsuit over what critics had called a ``clandestine'' fund subject to little oversight. The newly released invoices showed purchases of wiretap, video and computer equipment but excluded details such as manufacturers and models that Circuit Judge John C. Themelis said could jeopardize public safety. The case arose after a city board approved the police department's request for the money in January. Police Commissioner Edward Norris said at the time it would be used to buy sophisticated surveillance equipment to fight Baltimore's $1 billion-a-year drug trade. Neither police nor the city elaborated, and they rejected efforts to obtain details through the Public Information Act, which guarantees access to most government documents. Officials at Viva House, a Roman Catholic community group and soup kitchen, said Mayor Martin O'Malley was funding the police at the expense of the poor, and the American Civil Liberties Union sued on Viva House's behalf. On Friday, the first day of trial, Themelis ordered the information released without information that could jeopardize police. The invoices released Monday covered purchases made from mid-January through mid-April, totaling $116,456. The department spent $67,935 on wiretap equipment, $23,321 on video equipment and $25,200 on computer equipment, the documents show. Both sides declared victory Monday. Dwight Sullivan, the ACLU's managing attorney, said the decision showed that the police department had to provide some information about how it spent taxpayers' money. ``The public's right to know has been vindicated, and that's what this case was about,'' Sullivan said. Sean R. Malone, the police department's chief legal counsel, called Themelis' decision a ``commonsense approach.'' ``We're thrilled with the result. We've protected the interest of the police department, which is catching narcotics dealers,'' Malone said. Malone said the refusal to release information was consistent with actions by police around the country. ``To make it public really hurts our public safety mission,'' Malone said. ``It's not just the street dealer we're going after, it's the suppliers. In order to get the suppliers, we have to do it smart.'' 4299 From: James M. Atkinson Date: Tue Dec 11, 2001 8:55am Subject: Psychiatric Hotline Voice Mail Psychiatric Hotline Voice Mail RING...RING...click Welcome to the Psychiatric Hotline. If you are obsessive-compulsive, please press 1 repeatedly. If you are codependent, please ask someone to press 2. If you have multiple personalities, please press 3, 4, 5 and 6. If you are paranoid-delusional, we know who you are and what you want. Just stay on the line so we can trace the call. If you are schizophrenic, listen carefully and a little voice will tell you which number to press. If you are manic-depressive, it doesn't matter which number you press. No one will answer. If you are delusional and occasionally hallucinate, please be aware that the thing you are holding on the side of your head is alive and about to bite off your ear -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4300 From: James M. Atkinson Date: Tue Dec 11, 2001 9:12am Subject: The ICD-10 Classification of Mental and Behavioural Disorders - Schizophrenia [For discussion by the list as it applies to screening inquiries, more to follow - jma] ------------------------------------------------------------------------ The ICD-10 Classification of Mental and Behavioural Disorders World Health Organization, Geneva, 1992 ------------------------------------------------------------------------ Contents *F20 Schizophrenia *F20.0 Paranoid Schizophrenia *Hebephrenic Schizophrenia *F20.2 Catatonic Schizophrenia *F20.3 Undifferentiated Schizophrenia *F20.4 Post-Schizophrenic Depression *F20.5 Residual Schizophrenia *F20.6 Simple Schizophrenia ------------------------------------------------------------------------ F20 Schizophrenia The schizophrenic disorders are characterized in general by fundamental and characteristic distortions of thinking and perception, and by inappropriate or blunted affect. Clear consciousness and intellectual capacity are usually maintained, although certain cognitive deficits may evolve in the course of time. The disturbance involves the most basic functions that give the normal person a feeling of individuality, uniqueness, and self-direction. The most intimate thoughts, feelings, and acts are often felt to be known to or shared by others, and explanatory delusions may develop, to the effect that natural or supernatural forces are at work to influence the afflicted individual's thoughts and actions in ways that are often bizarre. The individual may see himself or herself as the pivot of all that happens. Hallucinations, especially auditory, are common and may comment on the individual's behaviour or thoughts. Perception is frequently disturbed in other ways: colours or sounds may seem unduly vivid or altered in quality, and irrelevant features of ordinary things may appear more important than the whole object or situation. Perplexity is also common early on and frequently leads to a belief that everyday situations possess a special, usually sinister, meaning intended uniquely for the individual. In the characteristic schizophrenic disturbance of thinking, peripheral and irrelevant features of a total concept, which are inhibited in normal directed mental activity, are brought to the fore and utilized in place of those that are relevant and appropriate to the situation. Thus thinking becomes vague, elleptical, and obscure, and its expression in speech sometimes incomprehensible. Breaks and interpolations in the train of thought are frequent, and thoughts may seem to be withdrawn by some outside agency. Mood is characteristically shallow, capricious, or incongruous. Ambivalence and disturbance of volition may appear as inertia, negativism, or stupor. Catatonia may be present. The onset may be acute, with seriously disturbed behaviour, or insidious, with a gradual development of odd ideas and conduct. The course of the disorder shows equally great variation and is by no means inevitably chronic or deteriorating (the course is specified by five-character categories). In a proportion of cases, which may vary in different cultures and populations, the outcome is complete, or nearly complete, recovery. The sexes are approximately equally affected by the onset tends to be later in women. Although no strictly pathognomonic symptoms can be identified, for practical purposes it is useful to divide the above symptoms into groups that have special importance for the diagnosis and often occur together, such as: (a) thought echo, thought insertion or withdrawal, and thought broadcasting; (b) delusions of control, influence, or passivity, clearly referred to body or limb movements or specific thoughts, actions, or sensations; delusional perception; (c) hallucinatory voices giving a running commentary on the patient's behaviour, or discussing the patient among themselves, or other types of hallucinatory voices coming from some part of the body; (d) persistent delusions of other kinds that are culturally inappropriate and completely impossible, such as religious or political identity, or superhuman powers and abilities (e.g. being able to control the weather, or being in communication with aliens from another world); (e) persistent hallucinations in any modality, when accompanied either by fleeting or half-formed delusions without clear affective content, or by persistent over-valued ideas, or when occurring every day for weeks or months on end; (f) breaks or interpolations in the train of thought, resulting in incoherence or irrelevant speech, or neologisms; (g) catatonic behaviour, such as excitement, posturing, or waxy flexibility, negativism, mutism, and stupor; (h) "negative" symptoms such as marked apathy, paucity of speech, and blunting or incongruity of emotional responses, usually resulting in social withdrawal and lowering of social performance; it must be clear that these are not due to depression or to neuroleptic medication; (i) a significant and consistent change in the overall quality of some aspects of personal behaviour, manifest as loss of interest, aimlessness, idleness, a self-absorbed attitude, and social withdrawal. Diagnostic Guidelines The normal requirement for a diagnosis of schizophrenia is that a minimum of one very clear symptom (and usually two or more if less clear-cut) belonging to any one of the groups listed as (a) to (d) above, or symptoms from at least two of the groups referred to as (e) to (h), should have been clearly present for most of the time during a period of 1 month or more. Conditions meeting such symptomatic requirements but of duration less than 1 month (whether treated or not) should be diagnosed in the first instance as acute schizophrenia-like psychotic disorder and are classified as schizophrenia if the sumptoms persist for longer periods. Viewed retrospectively, it may be clear that a prodromal phase in which symptoms and behaviour, such as loss of interest in work, social activities, and personal appearance and hygiene, together with generalized anxiety and mild degrees of depression and preoccupation, preceded the onset of psychotic symptoms by weeks or even months. Because of the difficulty in timing onset, the 1-month duration criterion applies only to the specific symptoms listed above and not to any prodromal nonpsychotic phase. The diagnosis of schizophrenia should not be made in the presence of extensive depressive or manic symptoms unless it is clear that schizophrenic symptoms antedated the affective disturbance. If both schizophrenic and affective symptoms develop together and are evenly balanced, the diagnosis of schizoaffective disorder should be made, even if the schizophrenic symptoms by themselves would have justified the diagnosis of schizophrenia. Schizophrenia should not be diagnosed in the presence of overt brain disease or during states of drug intoxication or withdrawal. ------------------------------------------------------------------------ F20.0 Paranoid Schizophrenia This is the commonest type of schizophrenia in most parts of the world. The clinical picture is dominated by relatively stable, often paranoid, delusions, usually accompanied by hallucinations, particularly of the auditory variety, and perceptual disturbances. Disturbances of affect, volition, and speech, and catatonic symptoms, are not prominent. Examples of the most common paranoid symptoms are: (a) delusions of persecution, reference, exalted birth, special mission, bodily change, or jealousy; (b) hallucinatory voices that threaten the patient or give commands, or auditory hallucinations without verbal form, such as whistling, humming, or laughing; (c) hallucinations of smell or taste, or of sexual or other bodily sensations; visual hallucinations may occur but are rarely predominant. Thought disorder may be obvious in acute states, but if so it does not prevent the typical delusions or hallulcinations from being described clearly. Affect is usually less blunted than in other varieties of schizophrenia, but a minor degree of incongruity is common, as are mood disturbances such as irritability, sudden anger, fearfulness, and suspicion. "Negative" symptoms such as blunting of affect and impaired volition are often present but do not dominate the clinical picture. The course of paranoid schizophrenia may be episodic, with partial or complete remissions, or chronic. In chronic cases, the florid symptoms persist over years and it is difficult to distinguish discrete episodes. The onset tends to be later than in the hebephrenic and catatonic forms. Diagnostic Guidelines The general criteria for a diagnosis of schizophrenia (see introduction to F20 above) must be satisfied. In addition, hallucinations and/or delusions must be prominent, and disturbances of affect, volition and speech, and catatonic symptoms must be relatively inconspicuous. The hallucinations will usually be of the kind described in (b) and (c) above. Delusions can be of almost any kind of delusions of control, influence, or passivity, and persecutory beliefs of various kinds are the most characteristic. Includes: * paraphrenic schizophrenia Differential diagnosis. It is important to exclude epileptic and drug-induced psychoses, and to remember that persecutory delusions might carry little diagnostic weight in people from certain countries or cultures. Excludes: * involutional paranoid state (F22.8) * paranoia (F22.0) ------------------------------------------------------------------------ Hebephrenic Schizophrenia A form of schizophrenia in which affective changes are prominent, delusions and hallucinations fleeting and fragmentary, behaviour irresponsible and unpredictable, and mannerisms common. The mood is shallow and inappropirate and often accompanied by giggling or self-satisfied, self-absorbed smiling, or by a lofty manner, grimaces, mannerisms, pranks, hypochondriacal complaints, and reiterated phrases. Thought is disorganized and speech rambling and incoherent. There is a tendency to remain solitary, and behaviour seems empty of purpose and feeling. This form of schizphrenia usually starts between the ages of 15 and 25 years and tends to have a poor prognosis because of the rapid development of "negative" symptoms, particularly flattening of affect and loss of volition. In addition, disturbances of affect and volition, and thought disorder are usually prominent. Hallucinations and delusions may be present but are not usually prominent. Drive and determination are lost and goals abandoned, so that the patient's behaviour becomes characteristically aimless and empty of purpose. A superficial and manneristic preoccupation with religion, philosophy, and other abstract themes may add to the listener's difficulty in following the train of thought. Diagnostic Guidelines The general criteria for a diagnosis of schizophrenia (see introduction to F20 above) must be satisified. Hebephrenia should normally be diagnosed for the first time only in adolescents or young adults. The premorbid personality is characteristically, but not necessarily, rather shy and solitary. For a confident diagnosis of hebephrenia, a period of 2 or 3 months of continuous observation is usually necessary, in order to ensure that the characteristic behaviours described above are sustained. Includes: * disorganized schizophrenia * hebephrenia ------------------------------------------------------------------------ F20.2 Catatonic Schizophrenia Prominent psychomotor disturbances are essential and dominant features and may alternate between extremes such as hyperkinesis and stupor, or automatic obedience and negativism. Constrained attitudes and postures may be maintained for long periods. Episodes of violent excitement may be a striking feature of the condition. For reasons that are poorly understood, catatonic schizophrenia is now rarely seen in industrial countries, though it remains common elsewhere. These catatonic phenomena may be combined with a dream-like (oneiroid) state with vivid scenic hallucinations. Diagnostic Guidelines The general criteria for a diagnosis of schizophrenia (see introduction to F20 above) must be satisfied. Transitory and isolated catatonic symptoms may occur in the context of any other subtype of schizophrenia, but for a diagnosis of catatonic schizophrenia one or more of the following behaviours should dominate the clinical picture: (a) stupor (marked decrease in reactivity to the environment and in spontaneous movements and activity) or mutism; (b) excitement (apparently purposeless motor activity, not influenced by external stimuli); (c) posturing (voluntary assumption and maintenance of inappropriate or bizarre postures); (d) negativism (an apparently motiveless resistance to all instructions or attempts to be moved, or movement in the opposite direction); (e) rigidity (maintenance of a rigid posture against efforts to be moved); (f) waxy flexibility (maintenance of limbs and body in externally imposed positions); and (g) other symptoms such as command automatism (automatic compliance with instructions), and perseveration of words and phrases. In uncommunicative patients with behavioural manifestations of catatonic disorder, the diagnosis of schizophrenia may have to be provisional until adequate evidence of the presence of other symptoms is obtained. It is also vital to appreciate that catatonic symptoms are not diagnostic of schizophrenia. A catatonic symptom or symptoms may also be provoked by brain disease, metabolic disturbances, or alcohol and drugs, and may also occur in mood disorders. Includes: * catatonic stupor * schizophrenic catalepsy * schizophrenic catatonia * schizophrenic flexibilitas cerea ------------------------------------------------------------------------ F20.3 Undifferentiated Schizophrenia Conditions meeting the general diagnostic criteria for schizophrenia (see introduction to F20 above) but not conforming to any of the above subtypes, or exhibiting the features of more than one of them without a clear predominance of a particular set of diagnostic characteristics. This rubric should be used only for psychotic conditions (i.e. residual schizophrenia and post-schizophrenic depression are excluded) and after an attempt has been made to classify the condition into one of the three preceding categories. Diagnostic Guidelines This category should be reserved for disorders that: (a) meet the diagnostic criteria for schizophrenia; (b) do not satisfy the criteria for the paranoid, hebephrenic, or catatonic subtypes; (c) do not satisfy the criteria for residual schizophrenia or post-schizophrenic depression. Includes: atypical schizophrenia ------------------------------------------------------------------------ F20.4 Post-Schizophrenic Depression A depressive episode, which may be prolonged, arising in the aftermath of a schizophrenic illness. Some schizophrenic symptoms must still be present but no longer dominate the clinical picture. These persisting schizophrenic symptoms may be "positive" or "negative", though the latter are more common. It is uncertain, and immaterial to the diagnosis, to what extent the depressive symptoms have merely been uncovered by the resolution of earlier psychotic symptoms (rather than being a new development) or are an intrinsic part of schizophrenia rather than a psychological reaction to it. They are rarely sufficiently severe or extensive to meet criteria for a severe depressive episode, and it is often difficult to decide which of the patient's symptoms are due to depression and which to neuroleptic medication or to the impaired volition and affective flattening of schizophrenia itself. This depressive disorder is associated with an increased risk of suicide. Diagnostic Guidelines The diagnosis should be made only if: (a) the patient has had a schizophrenic illness meeting the general criteria for schizophrenia (see introduction to F20 above) within the past 12 months; (b) some schizophrenic symptoms are still present; and (c) the depressive symptoms are prominent and distressing, fulfilling at least the criteria for a depressive episode, and havew been present for at least 2 weeks. If the patient no longer has any schizophrenic symptoms, a depressive episode should be diagnosed. If schizophrenic symptoms are still florid and prominent, the diagnosis should remain that of the appropriate schizophrenic subtype. ------------------------------------------------------------------------ F20.5 Residual Schizophrenia A chronic stage in the development of a schizophrenic disorder in which there has been a clear progression from an early stage (comprising one or more episodes with psychotic symptoms meeting the general criteria for schizophrenia described above) to a later stage characterized by long-term, though not necessarily irreversible, "negative" symptoms. Diagnostic Guidelines For a confident diagnosis, the following requirements should be met: (a) prominent "negative" schizophrenic symptoms, i.e. psychomotor slowing, underactivity, blunting of affect, passivity and lack of initiative, poverty of quantity or content of speech, poor nonverbal communication by facial expression, eye contact, voice modulation, and posture, poor self-care and social performance; (b) evidence in the past of at least one clear-cut psychotic episode meeting the diagnostic criteria for schizophrenia; (c) a period of at least 1 year during which the intensity and frequency of florid symptoms such as delusions and hallucinations have been minimal or substantially reduced and the "negative" schizophrenic syndrome has been present; (d) absence of dementia or other organic brain disease or disorder, and of chronic depression or institutionalism sufficient to explain the negative impairments. If adequate information about the patient's previous history cannot be obtained, and it therefore cannot be established that criteria for schizophrenia have been met at some time in the past, it may be necessary to make a provisional diagnosis of residual schizophrenia. Includes: * chronic undifferentiated schizophrenia * "Restzustand" * schizophrenic residual state ------------------------------------------------------------------------ F20.6 Simple Schizophrenia An uncommon disorder in which there is an insidious but progressive development of oddities of conduct, inability to meet the demands of society, and decline in total performance. Delusions and hallucinations are not evident, and the disorder is less obviously psychotic than the hebephrenic, paranoid, and catatonic subtypes of schizophrenia. The characteristic "negative" features of residual schizophrenia (e.g. blunting of affect, loss of volition) develop without being preceded by any overt psychotic symptoms. With increasing social impoverishment, vagrancy may ensue and the individual may then become self-absorbed, idle, and aimless. Diagnostic Guidelines Simple schizophrenia is a difficult diagnosis to make with any confidence because it depends on establishing the slowly progressive development of the characteristic "negative" symptoms of residual schizophrenia without any history of hallucinations, delusions, or other manifestations of an earlier psychotic episode, and with significant changes in personal behaviour, manifest as a marked loss of interest, idleness, and social withdrawal. Includes: * schizophrenia simplex ------------------------------------------------------------------------ ------------------------------------------------------------------------ Contents *F33 Recurrent Depressive Disorder *F32 Depressive Episode *F32.0 Mild Depressive Episode *F32.1 Moderate Depressive Episode *F32.2 Severe Depressive Episode Without Psychotic Symptoms *F32.3 Severe Depressive Episode With Psychotic Symptoms ------------------------------------------------------------------------ F33 Recurrent Depressive Disorder The disorder is characterized by repeated episodes of depression as specified in depressive episode (mild, moderate, or severe), without any history of independent episodes of mood elevation and overactivity that fulfill thecriteria of mania. However, the category should still be used if there is evidence of brief episodes of mild mood elevation and overactivity which fulfill the criteria of hypomania immediately after a depressive episode (sometimes apparently precipitated by treatment of a depression). The age of onset and the severity, duration, and frequency of the episodes of depression are all highly variable. In general, the first episode occurs later than in bipolar disorder, with a mean age of onset in the fifth decade. Individual episodes also last between 3 and 12 months (median duration about 6 months) but recur less frequently. Recovery is usually complete between episodes, but a minority of patients may develop a persistent depression, mainly in old age (for which this category should still be used). Individual episodes of any severity are often precipitated by stressful life events; in many cultures, both individual episodes and persistent depression are twice as common in women as in men. The risk that a patient with recurrent depressive disorder will have an episode of mania never disappears completely, however many depressive episodes he or she has experienced. If a manic episode does occur, the diagnosis should change to bipolar affective disorder. Recurrent depressive episode may be subdivided, as below, by specifying first the type of the current episode and then (if sufficient information is available) the type that predominates in all the episodes. Includes: * recurrent episodes of depressive reaction, psychogenic depression, reactive depression, seasonal affective disorder * recurrent episodes of endogenous depression, major depression, manic depressive psychosis (depressed type), psychogenic or reactive depressive psychosis, psychotic depression, vital depression Excludes: * recurrent brief depressive episodes ------------------------------------------------------------------------ F32 Depressive Episode In typical depressive episodes of all three varieties described below (mild, moderate, and severe), the individual usually suffers from depressed mood, loss of interest and enjoyment, and reduced energy leading to increased fatiguability and diminished activity. Marked tiredness after only slight effort is common. Other common symptoms are: (a) reduced concentration and attention; (b) reduced self-esteem and self-confidence; (c) ideas of guilt and unworthiness (even in a mild type of episode); (d) bleak and pessimistic views of the future; (e) ideas or acts of self-harm or suicide; (f) disturbed sleep; (g) diminished appetite. The lowered mood varies little from day to day, and is often unresponsive to circumstances, yet may show a characteristic diurnal variation as the day goes on. As with manic episodes, the clinical presentation shows marked individual variations, and atypical presentations are particularly common in adolescence. In some cases, anxiety, distress, and motor agitation may be more prominent at times than the depression, and the mood change may also be masked by added features such as irritability, excessive consumption of alcohol, histrionic behaviour, and exacerbation of pre-existing phobic or obsessional symptoms, or by hypochondriacal preoccupations. For depressive episodes of all three grades of severity, a duration of at least 2 weeks is usually required for diagnosis, but shorter periods may be reasonable if symptoms are unusually severe and of rapid onset. Some of the above symptoms may be marked and develop characteristic features that are widely regarded as having special clinical significance. The most typical examples of these "somatic" symptoms are: loss of interest or pleasure in activities that are normally enjoyable; lack of emotional reactivity to normally pleasurable surroundings and events; waking in the morning 2 hours or more before the usual time; depression worse in the morning; objective evidence of definite psychomotor retardation or agitation (remarked on or reported by other people); marked loss of appetite; weight loss (often defined as 5% or more of body weight in the past month); marked loss of libido. Usually, this somatic syndrome is not regarded as present unless about four of these symptoms are definitely present. The categories of mild, moderate and severe depressive episodes described in more detail below should be used only for a single (first) depressive episode. Further depressive episodes should be classified under one of the subdivisions of recurrent depressive disorder. These grades of severity are specified to cover a wide range of clinical states that are encountered in different types of psychiatric practice. Individuals with mild depressive episodes are common in primary care and general medical settings, whereas psychiatric inpatient units deal largely with patients suffering from the severe grades. Acts of self-harm associated with mood (affective) disorders, most commonly self-poisoning by prescribed medication, should be recorded by means of an additional code from Chapter XX of ICD-10 (X60-X84). These codes do not involve differentiation between attempted suicide and "parasuicide", since both are included in the general category of self-harm. Differentiation between mild, moderate, and severe depressive episodes rests upon a complicated clinical judgement that involves the number, type, and severity of symptoms present. The extent of ordinary social and work activities is often a useful general guide to the likely degree of severity of the episode, but individual, social, and cultural influences that disrupt a smooth relationship between severity of symptoms and social performance are sufficiently common and powerful to make it unwise to include social performance amongst the essential criteria of severity. The presence of dementia or mental retardation does not rule out the diagnosis of a treatable depressive episode, but communication difficulties are likely to make it necessary to rely more than usual for the diagnosis upon objectively observed somatic symptoms, such as psychomotor retardation, loss of appetite and weight, and sleep disturbance. Includes: * single episodes of depression (without psychotic symptoms), psychogenic depression or reactive depression) ------------------------------------------------------------------------ F32.0 Mild Depressive Episode Diagnostic Guidelines Depressed mood, loss of interest and enjoyment, and increased fatiguability are usually regarded as the most typical symptoms of depression, and at least two of these, plus at least two of the other symptoms described above should usually be present for a definite diagnosis. None of the symptoms should be present to an intense degree. Minimum duration of the whole episode is about 2 weeks. An individual with a mild depressive episode is usually distressed by the symptoms and has some difficulty in continuing with ordinary work and social activities, but will probably not cease to function completely. A fifth character may be used to specify the presence of the somatic syndrome: F32.00 Without somatic symptoms The criteria for mild depressive episode are fulfilled, and there are few or none of the somatic symptoms present. F32.01 With somatic symptoms The criteria for mild depressive episode are fulfilled, and four or more of the somatic symptoms are also present. (If only two or three somatic symptoms are present but they are unusually severe, use of this category may be justified.) ------------------------------------------------------------------------ F32.1 Moderate Depressive Episode Diagnostic Guidelines At least two of the three most typical symptoms noted for mild depressive episode should be present, plus at least three (and preferably four) of the other symptoms. Several symptoms are likely to be present to a marked degree, but this is not essential if a particularly wide variety of symptoms is present overall. Minimum duration of the whole episode is about 2 weeks. An individual with a moderately severe depressive episode will usually have considerable difficulty in continuing with social, work or domestic activities. A fifth character may be used to specify the occurrence of somatic symptoms: F32.10 Without somatic symptoms The criteria for moderate depressive episode are fulfilled, and few if any of the somatic symptoms are present. F32.11 With somatic symptoms The criteria for moderate depressive episode are fulfilled, and four or more or the somatic symptoms are present. (If only two or three somatic symptoms are present but they are unusually severe, use of this category may be justified.) ------------------------------------------------------------------------ F32.2 Severe Depressive Episode Without Psychotic Symptoms In a severe depressive episode, the sufferer usually shows considerable distress or agitation, unless retardation is a marked feature. Loss of self-esteem or feelings of uselessness or guilt are likely to be prominent, and suicide is a distinct danger in particularly severe cases. It is presumed here that the somatic syndrome will almost always be present in a severe depressive episode. Diagnostic Guidelines All three of the typical symptoms noted for mild and moderate depressive episodes should be present, plus at least four other symptoms, some of which should be of severe intensity. However, if important symptoms such as agitationor retardation are marked, the patient may be unwilling or unable to describe many symptoms in detail. An overall grading of severe episode may still be justified in such instances. The depressive episode should usually last at least 2 weeks, but if the symptoms are particularly severe and of very rapid onset, it may be justified to make this diagnosis after less than 2 weeks. During a severe depressive episode it is very unlikely that the sufferer will be able to continue with social, work, or domestic activities, except to a very limited extent. This category should be used only for single episodes of severe depression without psychotic symptoms; for further episodes, a subcategory of recurrent depressive disorder should be used. Includes: * single episodes of agitated depression * melancholia or vital depression without psychotic symptoms ------------------------------------------------------------------------ F32.3 Severe Depressive Episode With Psychotic Symptoms Diagnostic Guidelines A severe depressive episode which meets the criteria given for severe depressive episode without psychotic symptoms and in which delusions, hallucinations, or depressive stupor are present. The delusions usually involve ideas of sin, poverty, or imminent disasters, responsibility for which may be assumed by the patient. Auditory or olfactory hallucinations are usually of defamatory or accusatory voices or of rotting filth or decomposing flesh. Severe psychomotor retardation may progress to stupor. If required, delusions or hallucinations may be specified as mood-congruent or mood-incongruent. Differential Diagnosis Depressive stupor must be differentiated from catatonic schizophrenia, from dissociative stupor, and from organic forms of stupor. This category should be used only for single episodes of severe depression with psychotic symptoms; for further episodes a subcategory of recurrent depressive disorder should be used. Includes: * single episodes of major depression with psychotic symptoms, psychotic depression, psychogenic depressive psychosis, reactive depressive psychosis ------------------------------------------------------------------------ ------------------------------------------------------------------------ *F31 Bipolar Affective Disorder *F31.6 Bipolar Affective Disorder, Current Episode Mixed *F30 Manic Episode *F30.0 Hypomania *F30.1 Mania Without Psychotic Symptoms *F30.2 Mania With Psychotic Symptoms *F32 Depressive Episode *F32.0 Mild Depressive Episode *F32.1 Moderate Depressive Episode *F32.2 Severe Depressive Episode Without Psychotic Symptoms *F32.3 Severe Depressive Episode With Psychotic Symptoms ------------------------------------------------------------------------ F31 Bipolar Affective Disorder This disorder is characterized by repeated (i.e. at least two) episodes in which the patient's mood and activity levels are significantly disturbed, this disturbance consisting on some occasions of an elevation of mood and increased energy and activity (mania or hypomania), and on others of a lowering of mood and decreased energy and activity (depression). Characteristically, recovery is usually complete between episodes, and the incidence in the two sexes is more nearly equal than in other mood disorders. As patients who suffer only from repeated episodes of mania are comparatively rare, and resemble (in their family history, premorbid personality, age of onset, and long-term prognosis) those who also have at least occasional episodes of depression, such patients are classified as bipolar. Manic episodes usually begin abruptly and last for between 2 weeks and 4-5 months (median duration about 4 months). Depressions tend to last longer (median length about 6 months), though rarely for more than a year, except in the elderly. Episodes of both kinds often follow stressful life events or other mental trauma, but the presence of such stress is not essential for the diagnosis. The first episode may occur at any age from childhood to old age. The frequency of episodes and the pattern of remissions and relapses are both very variable, though remissions tend to get shorter as time goes on and depressions to become commoner and longer lasting after middle age. Although the original concept of "manic-depressive psychosis" also included patients who suffered only from depression, the term "manic-depressive disorder or psychosis" is now used mainly as a synonym for bipolar disorder. Includes: * manic-depressive illness, psychosis or reaction Excludes: * bipolar disorder, single manic episode * cyclothymia ------------------------------------------------------------------------ F31.6 Bipolar Affective Disorder, Current Episode Mixed The patient has had at least one manic, hypomanic, or mixed affective episode in the past and currently exhibits either a mixture of a rapid alternation of manic, hypomanic, and depressive symptoms. Diagnostic Guidelines Although the most typical form of bipolar disorder consists of alternating manic and depressive episodes separated by periods of normal mood, it is not uncommon for depressive mood to be accompanied for days or weeks on end by overactivity and pressure of speech, or for a manic mood and grandiosity to be accompanied by agitation and loss of energy and libido. Depressive symptoms and symptoms of hypomania or mania may also alternate rapidly, from day to day or even from hour to hour. A diagnosis of mixed bipolar affective disorder shouldbe made only if the two sets of symptoms are both prominent for the greater part of the current episode of illness, and if that episode has lasted for a least 2 weeks. Excludes: * single mixed affective episode ------------------------------------------------------------------------ F30 Manic Episode Three degrees of severity are specified here, sharing the common underlying characteristics of elevated mood, and an increase in the quantity and speed of physical and mental activity. All the subdivisions of this category should be used only for a single manic episode. If previous or subsequent affective episodes (depressive, manic, or hypomanic), the disorder should be coded under bipolar affective disorder. Includes: * bipolar disorder, single manic episode ------------------------------------------------------------------------ F30.0 Hypomania Hypomania is a lesser degree of mania, in which abnormalities of mood and behaviour are too persistent and marked to be included under cyclothymia but are not accompanied by hallucinations or delusions. There is a persistent mild elevation of mood (for at least several days on end), increased energy and activity, and usually marked feelings of well-being and both physical and mental efficiency. Increased sociability, talkativeness, overfamiliarity, increased sexual energy, and a decreased need for sleep are often present but not to the extent that they lead to severe disruption of work or result in social rejection. Irritability, conceit, and boorish behaviour may take the place of the more usual euphoric sociability. Concentration and attention may be impaired, thus diminishing the ability to settle down to work or to relaxation and leisure, but this may not prevent the appearance of interests in quite new ventures and activities, or mild over-spending. Diagnostic Guidelines Several of the features mentioned above, consistent with elevated or changed mood and increased activity, should be present for at least several days on end, to a degree and with a persistence greater than described for cyclothymia. Considerable interference with work or social activity is consistent with a diagnosis of hypomania, but if disruption of these is severe or complete, mania should be diagnosed. Differential Diagnosis Hypomania covers the range of disorders of mood and level of activities between cyclothymia and mania. The increased activity and restlessness (and often weight loss) must be distinguished from the same symptoms occurring in hyperthyroidism and anorexia nervosa; early states of "agitated depression", particularly in late middle-age, may bear a superficial resemblance to hypomania of the irritable variety. Patients with severe obsessional symptoms may be active part of the night completing their domestic cleaning rituals, but their affect will usually be the opposite of that described here. When a short period of hypomania occurs as a prelude to or aftermath of mania, it is usually not worth specifying the hypomania separately. ------------------------------------------------------------------------ F30.1 Mania Without Psychotic Symptoms Mood is elevated out of keeping with the individual's circumstances and may vary from carefree joviality to almost uncontrollable excitement. Elation is accompanied by increased energy, resulting in overactivity, pressure of speech, and a decreased need for sleep. Normal social inhibitions are lost, attention cannot be sustained, and there is often marked distractability. Self-esteem is inflated, and grandiose or over-optimistic ideas are freely expressed. Perceptual disorders may occur, such as the appreciation of colours as especially vivid (and usually beautiful), a preoccupation with fine details of surfaces or textures, and subjective hyperacusis. The individual may embark on extravagant and impractical schemes, spend money recklessly, or become aggressive, amorous, or facetious in inappropriate circumstances. In some manic episodes the mood is irritable and suspicious rather than elated. The first attack occurs most commonly between the ages of 15 and 30 years, but may occur at any age from late childhood to the seventh or eighth decade. Diagnostic Guidelines The episode should last for at least 1 week and should be severe enough to disrupt ordinary work and social activities more or less completely. The mood change should be accompanied by increased energy and several of the symptoms referred to above (particularly pressure of speech, decreased need for sleep, grandiosity, and excessive optimism). ------------------------------------------------------------------------ F30.2 Mania With Psychotic Symptoms The clinical picture is that of a more severe form of mania as described above. Inflated self-esteem and grandiose ideas may develop into delusions, and irritability and suspiciousness into delusions of persecution. In severe cases, grandiose or religious delusions of identity or role may be prominent, and flight of ideas and pressure of speech may result in the individual becoming incomprehensible. Severe and sustained physical activity and excitement may result in aggression or violence, and neglect of eating, drinking, and personal hygiene may result in dangerous states of dehydration and self-neglect. If required, delusions or hallucinations can be specified as congruent or incongruent with the mood. "Incongruent" should be taken as including affectively neutral delusions and hallucinations; for example, delusions of reference with no guilty or accusatory content, or voices speaking to the individual about events that have no special emotional significance. Differential Diagnosis One of the commonest problems is differentiation of this disorder from schizophrenia, particularly if the stages of development through hypomania have been missed and the patient is seen only at the height of the illness when widespread delusions, incomprehensible speech, and violent excitement may obscure the basic disturbance of affect. Patients with mania that is responding to neuroleptic medication may present a similar diagnostic problem at the stage when they have returned to normal levels of physical and mental activity but still have delusions or hallucinations. Occasional hallucinations or delusions as specified for schizophrenia may also be classed as mood-incongruent, but if these symptoms are prominent and persistent, the diagnosis of schizoaffective disorder is more likely to be appropriate. Includes: * manic stupor ------------------------------------------------------------------------ F32 Depressive Episode In typical depressive episodes of all three varieties described below (mild, moderate, and severe), the individual usually suffers from depressed mood, loss of interest and enjoyment, and reduced energy leading to increased fatiguability and diminished activity. Marked tiredness after only slight effort is common. Other common symptoms are: (a) reduced concentration and attention; (b) reduced self-esteem and self-confidence; (c) ideas of guilt and unworthiness (even in a mild type of episode); (d) bleak and pessimistic views of the future; (e) ideas or acts of self-harm or suicide; (f) disturbed sleep; (g) diminished appetite. The lowered mood varies little from day to day, and is often unresponsive to circumstances, yet may show a characteristic diurnal variation as the day goes on. As with manic episodes, the clinical presentation shows marked individual variations, and atypical presentations are particularly common in adolescence. In some cases, anxiety, distress, and motor agitation may be more prominent at times than the depression, and the mood change may also be masked by added features such as irritability, excessive consumption of alcohol, histrionic behaviour, and exacerbation of pre-existing phobic or obsessional symptoms, or by hypochondriacal preoccupations. For depressive episodes of all three grades of severity, a duration of at least 2 weeks is usually required for diagnosis, but shorter periods may be reasonable if symptoms are unusually severe and of rapid onset. Some of the above symptoms may be marked and develop characteristic features that are widely regarded as having special clinical significance. The most typical examples of these "somatic" symptoms are: loss of interest or pleasure in activities that are normally enjoyable; lack of emotional reactivity to normally pleasurable surroundings and events; waking in the morning 2 hours or more before the usual time; depression worse in the morning; objective evidence of definite psychomotor retardation or agitation (remarked on or reported by other people); marked loss of appetite; weight loss (often defined as 5% or more of body weight in the past month); marked loss of libido. Usually, this somatic syndrome is not regarded as present unless about four of these symptoms are definitely present. The categories of mild, moderate and severe depressive episodes described in more detail below should be used only for a single (first) depressive episode. Further depressive episodes should be classified under one of the subdivisions of recurrent depressive disorder. These grades of severity are specified to cover a wide range of clinical states that are encountered in different types of psychiatric practice. Individuals with mild depressive episodes are common in primary care and general medical settings, whereas psychiatric inpatient units deal largely with patients suffering from the severe grades. Acts of self-harm associated with mood (affective) disorders, most commonly self-poisoning by prescribed medication, should be recorded by means of an additional code from Chapter XX of ICD-10 (X60-X84). These codes do not involve differentiation between attempted suicide and "parasuicide", since both are included in the general category of self-harm. Differentiation between mild, moderate, and severe depressive episodes rests upon a complicated clinical judgement that involves the number, type, and severity of symptoms present. The extent of ordinary social and work activities is often a useful general guide to the likely degree of severity of the episode, but individual, social, and cultural influences that disrupt a smooth relationship between severity of symptoms and social performance are sufficiently common and powerful to make it unwise to include social performance amongst the essential criteria of severity. The presence of dementia or mental retardation does not rule out the diagnosis of a treatable depressive episode, but communication difficulties are likely to make it necessary to rely more than usual for the diagnosis upon objectively observed somatic symptoms, such as psychomotor retardation, loss of appetite and weight, and sleep disturbance. Includes: * single episodes of depression (without psychotic symptoms), psychogenic depression or reactive depression) ------------------------------------------------------------------------ F32.0 Mild Depressive Episode Diagnostic Guidelines Depressed mood, loss of interest and enjoyment, and increased fatiguability are usually regarded as the most typical symptoms of depression, and at least two of these, plus at least two of the other symptoms described above should usually be present for a definite diagnosis. None of the symptoms should be present to an intense degree. Minimum duration of the whole episode is about 2 weeks. An individual with a mild depressive episode is usually distressed by the symptoms and has some difficulty in continuing with ordinary work and social activities, but will probably not cease to function completely. A fifth character may be used to specify the presence of the somatic syndrome: F32.00 Without somatic symptoms The criteria for mild depressive episode are fulfilled, and there are few or none of the somatic symptoms present. F32.01 With somatic symptoms The criteria for mild depressive episode are fulfilled, and four or more of the somatic symptoms are also present. (If only two or three somatic symptoms are present but they are unusually severe, use of this category may be justified.) ------------------------------------------------------------------------ F32.1 Moderate Depressive Episode Diagnostic Guidelines At least two of the three most typical symptoms noted for mild depressive episode should be present, plus at least three (and preferably four) of the other symptoms. Several symptoms are likely to be present to a marked degree, but this is not essential if a particularly wide variety of symptoms is present overall. Minimum duration of the whole episode is about 2 weeks. An individual with a moderately severe depressive episode will usually have considerable difficulty in continuing with social, work or domestic activities. A fifth character may be used to specify the occurrence of somatic symptoms: F32.10 Without somatic symptoms The criteria for moderate depressive episode are fulfilled, and few if any of the somatic symptoms are present. F32.11 With somatic symptoms The criteria for moderate depressive episode are fulfilled, and four or more or the somatic symptoms are present. (If only two or three somatic symptoms are present but they are unusually severe, use of this category may be justified.) ------------------------------------------------------------------------ F32.2 Severe Depressive Episode Without Psychotic Symptoms In a severe depressive episode, the sufferer usually shows considerable distress or agitation, unless retardation is a marked feature. Loss of self-esteem or feelings of uselessness or guilt are likely to be prominent, and suicide is a distinct danger in particularly severe cases. It is presumed here that the somatic syndrome will almost always be present in a severe depressive episode. Diagnostic Guidelines All three of the typical symptoms noted for mild and moderate depressive episodes should be present, plus at least four other symptoms, some of which should be of severe intensity. However, if important symptoms such as agitationor retardation are marked, the patient may be unwilling or unable to describe many symptoms in detail. An overall grading of severe episode may still be justified in such instances. The depressive episode should usually last at least 2 weeks, but if the symptoms are particularly severe and of very rapid onset, it may be justified to make this diagnosis after less than 2 weeks. During a severe depressive episode it is very unlikely that the sufferer will be able to continue with social, work, or domestic activities, except to a very limited extent. This category should be used only for single episodes of severe depression without psychotic symptoms; for further episodes, a subcategory of recurrent depressive disorder should be used. Includes: * single episodes of agitated depression * melancholia or vital depression without psychotic symptoms ------------------------------------------------------------------------ F32.3 Severe Depressive Episode With Psychotic Symptoms Diagnostic Guidelines A severe depressive episode which meets the criteria given for severe depressive episode without psychotic symptoms and in which delusions, hallucinations, or depressive stupor are present. The delusions usually involve ideas of sin, poverty, or imminent disasters, responsibility for which may be assumed by the patient. Auditory or olfactory hallucinations are usually of defamatory or accusatory voices or of rotting filth or decomposing flesh. Severe psychomotor retardation may progress to stupor. If required, delusions or hallucinations may be specified as mood-congruent or mood-incongruent. Differential Diagnosis Depressive stupor must be differentiated from catatonic schizophrenia, from dissociative stupor, and from organic forms of stupor. This category should be used only for single episodes of severe depression with psychotic symptoms; for further episodes a subcategory of recurrent depressive disorder should be used. Includes: * single episodes of major depression with psychotic symptoms, psychotic depression, psychogenic depressive psychosis, reactive depressive psychosis -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4301 From: James M. Atkinson Date: Tue Dec 11, 2001 9:23am Subject: Delusional Disorder Delusional Disorder SYMPTOMS This disorder is characterized by the presence of non-bizarre delusions which have persisted for at least one month. Non-bizarre delusions typically are beliefs of something occurring in a person's life which is not out of the realm of possibility. For example, the person may believe their significant other is cheating on them, that someone close to them is about to die, a friend is really a government agent, etc. All of these situations could be true or possible, but the person suffering from this disorder knows them not to be (e.g., through fact-checking, third-person confirmation, etc.). People who have this disorder generally don't experience a marked impairment in their daily functioning in a social, occupational or other important setting. Outward behavior is not noticeably bizarre or objectively characterized as out-of-the-ordinary. The delusions can not be better accounted for by another disorder, such as schizophrenia, which is also characterized by delusions (which are bizarre). The delusions also cannot be better accounted for by a mood disorder, if the mood disturbances have been relatively brief. Criteria summarized from: American Psychiatric Association. (1994). Diagnostic and statistical manual of mental disorders, fourth edition. Washington, DC: American Psychiatric Association. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4302 From: James M. Atkinson Date: Tue Dec 11, 2001 9:23am Subject: Narcissistic Personality Disorder [Pontiff Dementia] Narcissistic Personality Disorder [Pontiff Dementia] SYMPTOMS A pervasive pattern of grandiosity (in fantasy or behavior), need for admiration, and lack of empathy, beginning by early adulthood and present in a variety of contexts, as indicated by five (or more) of the following: (1) has a grandiose sense of self-importance (e.g., exaggerates achievements and talents, expects to be recognized as superior without commensurate achievements) (2) is preoccupied with fantasies of unlimited success, power, brilliance, beauty, or ideal love (3) believes that he or she is "special" and unique and can only be understood by, or should associate with, other special or high-status people (or institutions) (4) requires excessive admiration (5) has a sense of entitlement, i.e., unreasonable expectations of especially favorable treatment or automatic compliance with his or her expectations (6) is interpersonally exploitative, i.e., takes advantage of others to achieve his or her own ends (7) lacks empathy: is unwilling to recognize or identify with the feelings and needs of others (8) is often envious of others or believes that others are envious of him or her (9) shows arrogant, haughty behaviors or attitudes Medical Treatment Hospitalization The hospitalization of patients with severe Narcissistic Personality occurs frequently. For some, such as those who are quite impulsive or self-destructive, or who have poor reality-testing, this is the result of Axis I symptoms which are overlaid upon the personality disorder. Hospitalizations should be brief, and the treatment specific to the particular symptom involved. Another group of patients for whom hospitalization is indicated, provided long-term residential treatment is available, are those who have poor motivation for outpatient treatment, fragile object relationships, chronic destructive acting out, and chaotic life-styles. An inpatient program can offer an intensive milieu which includes individual psychotherapy, family involvement, and a specialized residential environment. The structure is physically and emotionally secure enough to sustain the patient with severe ego weakness throughout the course of expressive, conflict-solving psychotherapy. Small staff-patient groups within the wards, as well as large community meetings, at which feelings are shared and patients' comments taken seriously by staff, and constructive work assignments, recreational activities, and opportunities to sublimate painfully conflictual impulses make the hospital a "holding" environment rather than merely a containing one. The ultimate goals are of effecting a better integrated internal world, more cohesive and modulated self-object representation, and a self-concept less vulnerable to narcissistic injury. ------------------------------------------------------------------------ Psychosocial Treatment Basic Principles Narcissistic patients try to sustain an image of perfection and personal invincibility for themselves and attempt to project that impression to others as well. Physical illness may shatter this illusion, and a patient may lose the feeling of safety inherent in a cohesive sense of self. This loss precipitates a panicky sensation that "my world is falling to pieces," and the patient feels a sense of personal fragmentation. The histrionic patient's idealization of the physician stands in contrast to the narcissistic patient's frequent contemptuous disregard for the physician, who is denigrated in a defensive effort to maintain a sense of superiority and mastery over illness. Only the most senior physician in a prestigious institution is deemed worthy of respect as the frightened patient seeks an external reflection of his or her own fragile grandeur in the doctor. More junior members of the health care team may be the targets of derision as the patient seeks to establish hierarchical dominance in order to counter the shame and fear triggered by illness. Health care professionals must convey a feeling of respect and acknowledge the patient's sense of self-importance so that the patient can reestablish a coherent sense of self, but they must at the same time avoid reinforcing either pathologic grandiosity (which may contribute to denial of illness) or weakness (which frightens the patient). An initial approach of support followed by step-by-step confrontation of the patient's vulnerabilities may enable the patient to deal with the implications of illness with feelings of greater subjective strength. The increased self-confidence may reduce the patient's need to attack the health care team in a misguided effort at psychologic self-preservation and eases the pressure to provide perfect care, since the patient's antagonistic feeling of entitlement (defined by DSM-III as an "expectation of special favors without assuming reciprocal responsibilities") is reduced. Many of the treatment principles and approaches discussed for this disorder apply as well to Borderline Personality Disorder. The individual with narcissistic and related personality disorders is likely to present with Axis I symptoms and disorders at various times in his or her life. These should be treated as described elsewhere. Caution should be observed, however, not to overdiagnose psychotic decompensation as Schizophrenia unless all DSM-III criteria are apparent. The same caveat applies to the pharmacologic treatment of depressive symptoms in the absence of clinical signs of Major Affective Disorder. When treating presenting symptoms and Axis I disorders in patients with Narcissistic Personality Disorder and other similar conditions, attention should be paid to the consequences of removing symptoms in a patient whose underlying character is primitive and or fragile. Some clinicians, suggest that the grandiosity and tendency to idealize and devalue should be interpreted as defensive maneuvers when aspects of early conflictual relationships are played out in adult life. Other clinicians, posit that the emergence of the patient's grandiosity and tendency to idealize the therapist should initially be viewed supportively. To help the individual develop stronger self-esteem regulation, the therapist then gradually points out the realistic limitations of patient and therapist alike while also offering an empathic ambience to cushion patients in their efforts to accept and integrate these experiences. Unfortunately, much research will be required to validate the description and course of narcissistic personality disorder before further research can answer which techniques bring about a better response to treatment. Individual Psychotherapy Most psychiatrists will, as a practical matter, treat most of their severely narcissistic patients for symptoms related to crises and relatively external Axis I diagnoses, rather than in an effort to address the personality disorder itself. The therapist must be aware of the importance of narcissism to the contiguity of the patient's psyche, refrain from confronting the need for self-aggrandizement, and help the patient use his or her narcissistic characteristics to reconstitute an intact self-image. Positive transference and therapeutic alliance should not be relied upon, since the patient may not be able to acknowledge the real humanness of the therapist but may have to see him/her as either superhuman or devalued. Those patients who do not terminate treatment after symptom relief has been obtained may wish help for some of the problems related to their personality disorder, such as interpersonal difficulties or depression. The therapist must have a good understanding of the principles of the narcissistic personality style, both for interpretation to the patient and for use in combating counter transference. Goals for ordinary psychotherapy should not be too great, since the source of these patients' difficulties lies deep in pathological development. Group Therapy The goals are to help the patient develop a healthy individuality (rather than a resilient narcissism) so that he or she can acknowledge others as separate persons, and to decrease the need for self-defeating coping mechanisms. The first step toward developing a working alliance is empathy with the surprise and hurt that the patient experiences as a result of confrontations within the group. The external structuring group therapy provides can control destructive behavior in spite of ego weakness. In groups, the therapist is less authoritative (and less threatening to the patient's grandiosity); intensity of emotional experience is lessened; and regression is more controlled, creating a better setting for confrontation and clarification. Outpatient analytic-expressive group therapy requires a concomitant individual relationship for most patients, which should be somewhat supportive. The need for this additional support, the likelihood of the patient's leaving the group at the first sign of psychic insult, and proneness to disorganized thinking are all found more often in the Borderline patient. The patient with a Narcissistic Personality Disorder does not appear so vulnerable to separation anxieties as the Borderline patient, but is instead involved in issues centered around maintaining a sense of self-worth. Criteria summarized from: American Psychiatric Association. (1994). Diagnostic and statistical manual of mental disorders, fourth edition. Washington, DC: American Psychiatric Association. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4303 From: James M. Atkinson Date: Tue Dec 11, 2001 9:27am Subject: Shared Psychotic Disorder Shared Psychotic Disorder SYMPTOMS A delusion develops in an individual in the context of a close relationship with another person(s), who has an already-established delusion. The delusion is similar in content to that of the person who already has the established delusion. The disturbance is not better accounted for by another Psychotic Disorder (e.g., Schizophrenia) or a Mood Disorder With Psychotic Features and is not due to the direct physiological effects of a substance (e.g., a drug of abuse, a medication) or a general medical condition. Criteria summarized from: American Psychiatric Association. (1994). Diagnostic and statistical manual of mental disorders, fourth edition. Washington, DC: American Psychiatric Association. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4304 From: James M. Atkinson Date: Tue Dec 11, 2001 9:32am Subject: Generalized Anxiety Disorder Generalized Anxiety Disorder SYMPTOMS Generalized anxiety disorder (GAD) is much more than the normal anxiety people experience day to day. It's chronic and exaggerated worry and tension, even though nothing seems to provoke it. Having this disorder means always anticipating disaster, often worrying excessively about health, money, family, or work. Sometimes, though, the source of the worry is hard to pinpoint. Simply the thought of getting through the day provokes anxiety. People with GAD can't seem to shake their concerns, even though they usually realize that their anxiety is more intense than the situation warrants. People with GAD also seem unable to relax. They often have trouble falling or staying asleep. Their worries are accompanied by physical symptoms, especially trembling, twitching, muscle tension, headaches, irritability, sweating, or hot flashes. They may feel lightheaded or out of breath. They may feel nauseated or have to go to the bathroom frequently. Or they might feel as though they have a lump in the throat. Many individuals with GAD startle more easily than other people. They tend to feel tired, have trouble concentrating, and sometimes suffer depression, too. Usually the impairment associated with GAD is mild and people with the disorder don't feel too restricted in social settings or on the job. Unlike many other anxiety disorders, people with GAD don't characteristically avoid certain situations as a result of their disorder. However, if severe, GAD can be very debilitating, making it difficult to carry out even the most ordinary daily activities. GAD comes on gradually and most often hits people in childhood or adolescence, but can begin in adulthood, too. It's more common in women than in men and often occurs in relatives of affected persons. It's diagnosed when someone spends at least 6 months worried excessively about a number of everyday problems. Specific Symptoms of this Disorder: Excessive anxiety and worry (apprehensive expectation), occurring more days than not for at least 6 months, about a number of events or activities (such as work or school performance). The person finds it difficult to control the worry. The anxiety and worry are associated with three (or more) of the following six symptoms (with at least some symptoms present for more days than not for the past 6 months; children don't need to meet as many criteria). *restlessness or feeling keyed up or on edge *being easily fatigued *difficulty concentrating or mind going blank *irritability *muscle tension *sleep disturbance (difficulty falling or staying asleep, or restless unsatisfying sleep) Additionally, the anxiety or worry is not about having a Panic Attack, being embarrassed in public (as in Social Phobia), being contaminated (as in Obsessive-Compulsive Disorder), being away from home or close relatives (as in Separation Anxiety Disorder), gaining weight (as in Anorexia Nervosa), having multiple physical complaints (as in Somatization Disorder), or having a serious illness (as in Hypochondriasis), and the anxiety and worry do not occur exclusively during Posttraumatic Stress Disorder (PTSD). The anxiety, worry, or physical symptoms cause clinically significant distress or impairment in social, occupational, or other important areas of functioning. The disturbance is not due to the direct physiological effects of a substance (e.g., a drug of abuse, a medication) or a general medical condition (e.g., hyperthyroidism) and does not occur exclusively during a Mood Disorder, a Psychotic Disorder, or a Pervasive Developmental Disorder. +++++++++++++++++++++++++++++ Generalized Anxiety Disorder TREATMENT Introduction Since all anxiety disorders can have medical cause or component, it is important for individuals to be thoroughly medically checked out before consulting psychological or psychiatric care. For instance, individuals who drink a lot of caffeine can present with many similar symptoms of anxiety, and even panic attacks. A good medical examination will rule out this and other biological or environmental causes and possibilities. Anxiety is often a component found within many other mental disorders as well. The most common mental disorder which presents with anxiety is depression. Clinicians generally regard such anxiety as a good sign, because it means that the individual hasn't simply accepted their depressed mood as they would a free meal... They are depressed and they are anxious because they are concerned about the ego dystonic nature of their depressed mood. A thorough initial evaluation is rudimentary to ruling out other possible and more appropriate diagnoses. Treatment for generalized anxiety disorder (also known as GAD) is varied and a number of approaches work equally well. Typically the most effective treatment will be an approach which incorporates both psychological and psychopharmacologic approaches. Medications, while usually helpful in treating the bodily symptoms of acute anxiety (e.g., panic attacks), are best used for this disorder as a short-term treatment only (a few months). Clinicians should be especially watchful of the individual becoming psychologically or physiologically addicted to certain anti-anxiety medications, such as Xanax. ------------------------------------------------------------------------ Psychotherapy Psychotherapy for GAD should be oriented toward combatting the individual's low-level, ever-present anxiety. Such anxiety is often accompanied by poor planning skills, high stress levels, and difficulty in relaxing. This last point is important because it the easiest one in which the therapist can play an especially effective teaching role. Relaxation skills can be taught either alone or with the use of biofeedback. Education about relaxation and simple relaxation exercises, such as deep breathing, are excellent places to begin therapy. While biofeedback (the ability to allow the patient to hear or see feedback of their body's physiological state) is beneficial, it is not required for effective relaxation to be taught to most people. Progressive muscle relaxation and more general imagery techniques can be used as therapy progresses. Teaching an individual how to relax, and the ability to do it in any place or situation is vital to reducing the low-level anxiety levels. Individuals who learn these skills, which can be taught in a brief-therapy framework, go on to lead productive, generally anxiety-free lives once therapy is complete. A common reason for failure to make any gains with relaxation skills is simply because the client does not practice them outside of the therapy session. From the onset of therapy, the individual who suffers from GAD should be encouraged to set a regular schedule in which to practice relaxation skills learned in session, at least twice a day for a minimum of 20 minutes (although more often and for longer periods of time is better). Lack of treatment progress can often be traced to a failure to follow through with homework assignments of practicing relaxation. Reducing stress and increasing overall coping skills may also be beneficial in helping the client. Many people who have GAD also lead very active (some would say, "hectic") lives. Helping the individual find a better balance in their lives between self-enrichment, family, significant other, and work may be important. People who have GAD have lived with their anxiety for such a long time they may not recognize a life without constant worrying and activity. Helping the individual realize that life doesn't have to boring just because one isn't always worrying or doing things may also help. Individual therapy is usually the recommended treatment modality. Many times people who present with GAD feel a bit awkward discussing their anxiety in front of others, especially if they are less than accepting. A clear distinction should be made at the onset of the evaluation to differentiate GAD from social phobia, however, and the appropriate diagnosis should be made. It would be unwise to recommend group therapy to someone who had social phobia or GAD early on, because of the social component to either disorder. Placing a person into a group setting without minimal interpersonal and relaxation skills being taught first in individual therapy is a recipe for disaster and early treatment termination. Non-specific factors in therapy are important to these patients, as they will make the most beneficial gains in a supportive and accepting therapeutic environment. Simply listening to the individual and offering objective feedback about their experiences is likely helpful. Examining stressors in the client's life and helping the individual find better ways of handling these stressors is likely to be beneficial. Modeling techniques of appropriate social behaviors within therapy session may help. Clinicians should not confuse GAD with specific phobias, which have much more acute and traumatic symptoms. In the same respect, treatments for specific phobias generally are not appropriate nor effective with GAD. Some clinicians easily confuse this important distinction. Hypnotherapy is also an appropriate treatment modality for those individuals who are highly suggestible. Often hypnotherapy is combined with other relaxation techniques. If an individual finds themselves hyperventilating then they are breathing in too much oxygen. One of the correct things to do is to direct them to breath into a paper bag. This does increase the percent of C02 in the inhalation, which thereby helps keep the 02/C02 balance. While this technique is valid, the better technique is to slow down respiration rate and volume with slow deep breaths (without the paper bag). Robert Fried, Ph. D. (psychologist) has a couple books out on respiration you might want to check out. One of his books is "The Hyperventilation Syndrome," Baltimore, Johns Hopkins Univ. Press, 1987. ------------------------------------------------------------------------ Medications Medication should be prescribed if the anxiety symptoms are serious and interfering with normal daily functioning. Psychotherapy and relaxation techniques can't be worked on effectively if the individual is overwhelmed by anxiety or cannot concentrate. The most commonly prescribed anti-anxiety agent for this disorder has historically been benzodiazepines, despite a dearth of clinical research that shows this particular class of drugs is any more effective than others. Diazepam (Valium) and lorazepam (Ativan) are the two most prescribed benzodiazepines. Lorazepam will produce a more lengthy sedating effect than diazepam, although it will take longer to appear. Individuals on these medications should always be advised about the medications' side effects, especially their sedative properties and impairment on performance. Tricyclic antidepressants often are an effective treatment alternative to benzodiazepines and may be a better choice over a longer treatment period. Medication for this disorder should only be used to treat acute symptoms of anxiety. Medication should be tapered off when it is discontinued. Phillip W. Long, M.D. also notes: "Buspirone, a new nonbenzodiazepine antianxiety drug, is non-addictive and does not impair mechanical performance such as driving. Response to buspirone occurs approximately in two weeks, as compared to the more rapid onset associated with benzodiazepines. Schwiezer et al. (1986) studied patients who previously had taken benzodiazepines for the treatment of anxiety and who were later placed on buspirone. These patients were found to have a poor response to buspirone." ------------------------------------------------------------------------ Self-Help Self-help methods for the treatment of this disorder are often overlooked by the medical profession because very few professionals are involved in them. Many support groups exist within communities throughout the world which are devoted to helping individuals with this disorder share their commons experiences and feelings of anxiety. Individuals should first be able to tolerate and effectively handle a social group interaction. Pushing an individual into a group setting, whether it be self-help or a regular group therapy experience, is counterproductive and may lead to a worsening of symptoms. References: American Psychiatric Association. (1994). Diagnostic and statistical manual of mental disorders, fourth edition. Washington, DC: American Psychiatric Association. National Institutes of Health, National Institute of Mental Health, NIH Publication No. 95-3879 (1995) -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4305 From: James M. Atkinson Date: Tue Dec 11, 2001 11:24am Subject: Re: Corporate TSCM Policy Guide Wow, Talk about feedback, I have now had over 100 list members tell me they feel very strongly about the posting of my "Model Corporate TSCM Policy Guide",and I was rather stunned that so many people responded positively. Here is what I will do... I will bring the policy up to date, clean up the formatting, and then upload it first as a html page on my site, and then also as a Microsoft Word document. All I ask is that you always give me credit as the author, and if you plagiarize it for your own use that you slide a Franklin my way for each copy you distribute or use for your own versions. -jma At 3:20 PM -0500 12/10/01, James M. Atkinson wrote: >I have developed a "boiler-plate" or model Corporate TSCM Policy >Guide that may be of some assistance to the list membership. > >I wrote it in such a way that it could be applied to anything from a >very small public company to the larger multi-billion public >corporations. > >It is rather long and detailed, but I can post it to my website as an >html document if anybody is interested. > >-jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4306 From: Miguel Puchol Date: Tue Dec 11, 2001 11:46am Subject: Re: Corporate TSCM Policy Guide Hi Jim, For those of us poor souls who are about to be painfully transitioned to the euro, how much is a Franklin worth? As I'm in the middle of fighting a flu (not doing to bad so far), I can't be bothered to look it up...I'll do my best to convert it to euros and send you some shiny new notes that look like sweet wrappings... BTW the mental health criteria will come in handy when dealing with a costumer - imagine a risk assessment form: "Please tick all of those which apply". You could probably eliminate 50% of clients before even unloading a single bit of gear. "If you fall into section F20.0, please pay our standard fee, we'll send you the report on your Andromedian bugs to the mental institution of your choice." (I'll have to slide something to Andy for using that one :-)) As a final note, to anyone interested, I'll be carrying out a risk awareness study on 2.4GHz WLANs over the next few weeks, in which different attack methods will be evaluated, and some form of report produced, mentioning ways to prevent such attacks. You'd be amazed on the amount of 'open' WLANs out there. Thanks, all the best, Mike ----- Original Message ----- From: "James M. Atkinson" To: "TSCM-L Mailing List" Sent: Tuesday, December 11, 2001 6:24 PM Subject: Re: [TSCM-L] Corporate TSCM Policy Guide > Wow, > > Talk about feedback, I have now had over 100 list members tell me > they feel very strongly about the posting of my "Model Corporate TSCM > Policy Guide",and I was rather stunned that so many people responded > positively. > > Here is what I will do... > > I will bring the policy up to date, clean up the formatting, and then > upload it first as a html page on my site, and then also as a > Microsoft Word document. > > All I ask is that you always give me credit as the author, and if you > plagiarize it for your own use that you slide a Franklin my way for > each copy you distribute or use for your own versions. > > -jma > > > > > At 3:20 PM -0500 12/10/01, James M. Atkinson wrote: > >I have developed a "boiler-plate" or model Corporate TSCM Policy > >Guide that may be of some assistance to the list membership. > > > >I wrote it in such a way that it could be applied to anything from a > >very small public company to the larger multi-billion public > >corporations. > > > >It is rather long and detailed, but I can post it to my website as an > >html document if anybody is interested. > > > >-jma > > > -- > > -------------------------------------------------------------------------- ------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------- ------------------------ > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > -------------------------------------------------------------------------- ------------------------ > People sleep peaceably in their beds at night only because rough > men stand ready to do violence on their behalf. - George Orwell > ------------------------------------------------------------------------ -------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4307 From: J‚nis Balklavs - GrÓnhofs Date: Tue Dec 11, 2001 9:19am Subject: Answer To Age Old Problem A Georgia woodpecker and a Kentucky woodpecker were arguing about which state had the toughest trees. The Georgia woodpecker said that they had a tree that no woodpecker could peck. The Kentucky woodpecker challenged him and promptly pecked a hole in the tree with no problem. The Georgia woodpecker was in awe. The Kentucky woodpecker then challenged the Georgia woodpecker to peck a tree in Kentucky that was absolutely un-peckable. The Georgia woodpecker expressed confidence that he could do it and accepted the challenge. After flying to Kentucky, the Georgia woodpecker successfully pecked the tree with no problem. The two woodpeckers were now confused. How is it that the Kentucky woodpecker was able to peck the Georgia tree and the Georgia woodpecker was able to peck the Kentucky tree when neither one was able to peck the tree in their own state? After much woodpecker pondering, they both came to the same conclusion: Your pecker is always harder when you're away from home. 4308 From: Perry Myers Date: Tue Dec 11, 2001 9:44am Subject: Antivirus firms: FBI loophole is out of line Antivirus software vendors said Monday they don't want to create a loophole in their security products to let the FBI or other government agencies use a virus to eavesdrop on the computer communications of suspected criminals. Under a project code-named "Magic Lantern," the U.S. Federal Bureau of Investigation is creating an e-mail-borne virus or Trojan horse that hides itself on the computer and captures all keystrokes made, including passwords that could be used to read encrypted mail . Despite subsequent reports to the contrary, officials at Symantec and Network Associates said they had no intention of voluntarily modifying their products to satisfy the FBI. Spokesmen at two other computer security companies, Japan-based Trend Micro and the U.S. subsidiary of U.K.-based Sophos made similar statements. All four antivirus companies said they had not contacted or been contacted by the U.S. government on the matter. The FBI declined to confirm or deny the report about "Magic Lantern," when it was first published by MSNBC and a spokesman was not available for comment Monday. "We're in the business of providing a virus-free environment for our users and we're not going to do anything to compromise that security," said Tony Thompson of Network Associates. "Symantec's first priority is to protect our customers from malicious and illegal attacks," Symantec Chief Executive John W. Thompson said in a statement. "We have no intention of creating or leaving a hole in our software that might compromise that security." If antivirus vendors were to leave a hole for an FBI-created Trojan horse program, malicious hackers would try to exploit the hole too, experts said. "If you leave the weakness for the FBI, you leave it for everybody," said Fred Cohen, an independent security expert and digital forensics professor at the University of New Haven. From the industry perspective, leaving a hole in antivirus software would erode public confidence and damage the reputation of the vendor, sending customers to competing companies, the vendors said. The government would have to convince all antivirus vendors to cooperate or the plan wouldn't work, since those not cooperating would have a market advantage and since they all share information, a Symantec spokeswoman said. "The thought that you would be able to convince the industry as a whole to do this is kind of naive," she said. Symantec and Networks Associates, both of which have investments in China, would not jeopardize their footings in that market, said Rob Rosenberger, editor of Vmyths.com , a Web site that debunks virus hoaxes. "If (the Chinese) thought that the company was a tool of the CIA, China would stop using those products in critical environments," Rosenberger said. "It is in the best interest of antivirus vendors not to heed the call of the FBI." "We always try to cooperate with the authorities when it's appropriate. Having said that, our No. 1 goal is to protect our customers," said Barbara Woolf of Trend Micro. "I've heard reports that the government is upset this got out and is going back to the drawing board." Appeasing the U.S. government would be difficult for vendors that have parent companies and customers outside the United States, they said. "If the laws of the land were to change to permit this kind of activity, then we would abide by the law," said David Hughes, president of Sophos' U.S. subsidiary. But "how would a vendor provide protection for customers outside of the specific jurisdiction?" Hughes said. "If we were to do this for the U.S. government we'd also have to do it for the government of any other nation that would want to do something similar." Perry D. Myers, CFE President & CEO E-mail: perry@d... MSI Detective Services Myers Service, Inc. Corporate Headquarters 2076 N. Elston Ave. Suite 200 Chicago, IL. 60614-3940 Phone 773-342-8300 Facsimile 773-486-4430 Professional Investigators Since 1959 Investigations Nationwide 24 Hour Availability www.detectiveservices.com Process Service Division - Downtown Chicago 205 W. Randolph St., Ste. 1210 Chicago, IL. 60606 Phone 312-782-4000 Fax 312-853-3119 For Security, Surveillance & Privacy Products U-Spy Store Chicago - Orlando - Internet Sales www.u-spystore.com Orlando Warehouse - (800) 393-4779 Chicago Sales - (773) 395-0220 For more information on our investigative services please visit our web site at www.detectiveservices.com This e-mail is strictly confidential. If you receive this e-mail in error, please forward immediately to info@d... 4309 From: A Grudko Date: Tue Dec 11, 2001 9:51am Subject: Re: TSCM Policy Guide - Original Message - > It is rather long and detailed, but I can post it to my website as an > html document if anybody is interested. Put me down as interested. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4310 From: A Grudko Date: Tue Dec 11, 2001 10:29am Subject: Eavesdropping Threat Profile - Original Message - > I have a project that I am considering starting in a few weeks where > once a month where I profile in detail a specific eavesdropping > device ... > If there is sufficient demand I could be convinced to make the > posting weekly instead of monthly. Can I be added to the demand list? Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4311 From: James M. Atkinson Date: Tue Dec 11, 2001 0:13pm Subject: Re: Corporate TSCM Policy Guide A "Frankin" is $100 USD, equivalent to roughly a third ounce of gold, or about twenty ounces of silver. Once I post the policy I'll offer several options to provide tribute back to the author. -jma At 6:46 PM +0100 12/11/01, Miguel Puchol wrote: >Hi Jim, > >For those of us poor souls who are about to be painfully transitioned to the >euro, how much is a Franklin worth? As I'm in the middle of fighting a flu >(not doing to bad so far), I can't be bothered to look it up...I'll do my >best to convert it to euros and send you some shiny new notes that look like >sweet wrappings... > >BTW the mental health criteria will come in handy when dealing with a >costumer - imagine a risk assessment form: "Please tick all of those which >apply". You could probably eliminate 50% of clients before even unloading a >single bit of gear. "If you fall into section F20.0, please pay our standard >fee, we'll send you the report on your Andromedian bugs to the mental >institution of your choice." (I'll have to slide something to Andy for using >that one :-)) > >As a final note, to anyone interested, I'll be carrying out a risk awareness >study on 2.4GHz WLANs over the next few weeks, in which different attack >methods will be evaluated, and some form of report produced, mentioning ways >to prevent such attacks. You'd be amazed on the amount of 'open' WLANs out >there. > >Thanks, all the best, > >Mike > >----- Original Message ----- >From: "James M. Atkinson" >To: "TSCM-L Mailing List" >Sent: Tuesday, December 11, 2001 6:24 PM >Subject: Re: [TSCM-L] Corporate TSCM Policy Guide > > >> Wow, >> >> Talk about feedback, I have now had over 100 list members tell me >> they feel very strongly about the posting of my "Model Corporate TSCM >> Policy Guide",and I was rather stunned that so many people responded >> positively. >> >> Here is what I will do... >> >> I will bring the policy up to date, clean up the formatting, and then >> upload it first as a html page on my site, and then also as a >> Microsoft Word document. >> >> All I ask is that you always give me credit as the author, and if you >> plagiarize it for your own use that you slide a Franklin my way for >> each copy you distribute or use for your own versions. >> >> -jma >> >> >> >> >> At 3:20 PM -0500 12/10/01, James M. Atkinson wrote: >> >I have developed a "boiler-plate" or model Corporate TSCM Policy >> >Guide that may be of some assistance to the list membership. >> > >> >I wrote it in such a way that it could be applied to anything from a >> >very small public company to the larger multi-billion public >> >corporations. >> > >> >It is rather long and detailed, but I can post it to my website as an >> >html document if anybody is interested. >> > > > >-jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4312 From: Aimee Farr Date: Tue Dec 11, 2001 0:55pm Subject: RE: Re Make & Model: FOIA threats to surv equip. > Once upon a midnight dreary, Aimee Farr pondered, weak and weary: > > > BALTIMORE (AP) - Police released some details Monday of a > > $250,000 drug enforcement fund, settling a lawsuit over what > > critics had called a ``clandestine'' fund subject to little > > oversight. > > > The newly released invoices showed purchases of wiretap, video > > and computer equipment but excluded details such as manufacturers > > and models that Circuit Judge John C. Themelis said could > > jeopardize public safety. [...] > > > What this means is 101 Preston Street did not publicly post IFBs > (Invitation for Bids) for the law enforcement surveillance > requirements listing FREQUENCIES and certain other details which > would be given to the successful bidder. > > The bad guys stop in and read the bid board the same way I do. > Do you want the city to ADVERTISE what surveillance frequencies > and modes they will be using? The local Radio Shacks will have > those frequencies posted on their chart before the equipment is > even delivered. > > You have to consider the safety of the officer on the street as > well as the agency as a whole. Do you want the bad guys > listening to your body wire repeater on a scanner as you are > busting his door down just to find yourself looking down the > barrel of his shotgun? It *has* happened. > > Sometimes it is not conspiracy; it is survival in the real > world. And only those who live in that real world should be > qualified to comment, which excluded newspaper reporters. I'm a strong supporter of source-method protection, which is why I FWD'd it. However, I appreciate the explanation. ~Aimee 4313 From: James M. Atkinson Date: Tue Dec 11, 2001 1:57pm Subject: Re: The ICD-10 Classification of Mental and Behavioural Disorders - Schizophrenia See my comments scattered though the text: At 10:12 AM -0500 12/11/01, James M. Atkinson wrote: >[For discussion by the list as it applies to screening inquiries, >more to follow - jma] > > >------------------------------------------------------------------------ >The ICD-10 Classification of Mental and Behavioural Disorders >World Health Organization, Geneva, 1992 >------------------------------------------------------------------------ > >Contents > >*F20 Schizophrenia >*F20.0 Paranoid Schizophrenia >*Hebephrenic Schizophrenia >*F20.2 Catatonic Schizophrenia >*F20.3 Undifferentiated Schizophrenia >*F20.4 Post-Schizophrenic Depression >*F20.5 Residual Schizophrenia >*F20.6 Simple Schizophrenia > >------------------------------------------------------------------------ > >F20 Schizophrenia > >The schizophrenic disorders are characterized in general by >fundamental and characteristic distortions of thinking and >perception, and by inappropriate or blunted affect. OK, this applies to quite a few executives and even a few officers >Clear >consciousness and intellectual capacity are usually maintained, >although certain cognitive deficits may evolve in the course of time. Yep, quite a few people >The disturbance involves the most basic functions that give the >normal person a feeling of individuality, uniqueness, and >self-direction. But when these feelings become so strong that they can be unhealthy. >The most intimate thoughts, feelings, and acts are >often felt to be known to or shared by others, and explanatory >delusions may develop, to the effect that natural or supernatural >forces are at work to influence the afflicted individual's thoughts >and actions in ways that are often bizarre. Gee, if you've been doing TSCM for a while you have had more then a few cases where potential customers voice any or all of the following: 1) Thoughts, feelings, and acts are often felt to be known to or shared by others Now, we have to be careful here as the client may be completely healthy and is simply the victim of a bugging. Never dismiss someone as being mentally ill simply because "others know things" (dig a little deeper). 2) Explanatory delusions We also have to be careful here as the client may have researched eavesdropping technologies, and may quite rationally belive that an eavesdropping device has been turned against them due to a breech of their privacy. Remember hat the Internet is a good source of good legitimate information, but it is also a cornucopia of complete bullshit. The client may not at all be delusionary, but is simply unable to effectively communicate wheat is going on (dig a little deeper). 3) Claims of a natural or supernatural forces are at work The person needs to be pushed to disclose WHO is eavesdropping on them, and WHY. This is usually where the person's story breaks down if they are mentally ill. It is one thing if they suspect a business partner, competitor, or investigator, but entirely something else if the contact claims it's the CIA, FBI, NSA, un-named government agency, or alien beings. 4) Claims that someone" is attempting to influence the afflicted individual's thoughts Ah-Ha, this is a dead give away that you are dealing with someone who is mentally ill. When the client tells you they are "getting messages" it indicates they need immediate medical help, and not the services of a TSCM practitioner. Now on the other hand this could. 5) Claims that someone" is attempting to influence the afflicted individual's actions Same as above, this is particularly interesting when the client claims that others are causing him pain or physical malady though some kind of "energy beam" or microwave weapon. >The individual may see >himself or herself as the pivot of all that happens. Yep, like the government has an entire team of agents following and harassing the poor soul >Hallucinations, >especially auditory, are common and may comment on the individual's >behaviour or thoughts. Usually when the contact claims that their antagonist is commenting on things they are doing in the privacy of their own home you have a high probability of someone being mentally ill (ie: commenting on their private thoughts, etc... NOT commenting on actions ). Of course you have to remember that we are talking about "Auditory Hallucinations" where the subject is "hearing things" and being specifically addressed. I know of case where people were "hearing things" and the problem was found to be a hearing aid, a telephone, or radio responding to high RFI field. >Perception is frequently disturbed in other >ways: colours or sounds may seem unduly vivid or altered in quality, Yes, or the person may have a vision problem when they get stressed out. >and irrelevant features of ordinary things may appear more important >than the whole object or situation. ...or the person have simply become enlightened as to what a bug looks like. >Perplexity is also common early >on and frequently leads to a belief that everyday situations possess >a special, usually sinister, meaning intended uniquely for the >individual. The Perplexity often leads to the subject tying to research their problem, and other they end of eating up some bullshit psuedo-science foisted on the public. The most common (and destructive) of these are the Electronic Warfare sites, Mind Control Sites, and Conspiracy Theory sites. Find out what you potential customer is reading... what sites are they visiting? Do they claim to have read an article of mind control? implanted trackers? etc? >In the characteristic schizophrenic disturbance of >thinking, peripheral and irrelevant features of a total concept, >which are inhibited in normal directed mental activity, are brought >to the fore and utilized in place of those that are relevant and >appropriate to the situation. Do they keep mentally wandering off the subject at hand? >Thus thinking becomes vague, >elleptical, and obscure, and its expression in speech sometimes >incomprehensible. The subject will often skip around to totally unrelated subjects >Breaks and interpolations in the train of thought >are frequent, and thoughts may seem to be withdrawn by some outside >agency. It is amazing how many people think the FBI can use "Carnivore Mind Reading Software", and uses classified equipment to harass them specifically "because they know something". Push for what they claim to know, and why is it of value... and to whom... >Mood is characteristically shallow, capricious, or >incongruous. Yep, >Ambivalence and disturbance of volition may appear as >inertia, negativism, or stupor. Ah, they often exhibit claim that "this" has been going on for years, and that nobody has been able to help them. >Catatonia may be present. The onset >may be acute, with seriously disturbed behaviour, or insidious, with >a gradual development of odd ideas and conduct. Watch out for the "aluminum foil hats", and shielded bedrooms. >The course of the >disorder shows equally great variation and is by no means inevitably >chronic or deteriorating (the course is specified by five-character >categories). I have seen cases where a senior executive was suffering from full blown Schizophrenia, and yet was able to keep the company together, make a profit and keep his job. Just because they wear a suit and hold a job doesn't mean that they are ok. Conversely, jut because the subject is drooling on themselves, and mumbles all days does not mean he has a psychiatric disorder. >In a proportion of cases, which may vary in different >cultures and populations, the outcome is complete, or nearly >complete, recovery. Take a look at some of the people who work at Fort Meade. >The sexes are approximately equally affected by >the onset tends to be later in women. Watch out for the single middle age women working in administrative or slightly technical menial rolls where their background and training is not on par with their job responsibilities. For example, someone who is 30-40 years old, graduated from MIT or Harvard, and so on is not going to be working in a crappy tech support job unless there is something very wrong. Watch out for people in menial jobs, who are otherwise overqualified. >Although no strictly pathognomonic symptoms can be identified, for >practical purposes it is useful to divide the above symptoms into >groups that have special importance for the diagnosis and often occur >together, such as: > >(a) thought echo, thought insertion or withdrawal, and thought broadcasting; Also, claims of thought interception secret messages, or mind control. >(b) delusions of control, influence, or passivity, clearly referred >to body or limb movements or specific thoughts, actions, or >sensations; delusional perception; Ringing-of-the-ears or muscle spasms not included. >(c) hallucinatory voices giving a running commentary on the patient's >behaviour, or discussing the patient among themselves, or other types >of hallucinatory voices coming from some part of the body; This does not include my stomach growling . >(d) persistent delusions of other kinds that are culturally >inappropriate and completely impossible, such as religious or >political identity, or superhuman powers and abilities (e.g. being >able to control the weather, or being in communication with aliens >from another world); Also, watch for contact trying to present too strong of a case, and trying just a little bit too hard to get you to belive them. For example, does the contact keep offering medical reports, and so on. >(e) persistent hallucinations in any modality, when accompanied >either by fleeting or half-formed delusions without clear affective >content, or by persistent over-valued ideas, or when occurring every >day for weeks or months on end; Notice that you should be watching for "fleeting or half-formed delusions", and try pushing the contact for in depth content. >(f) breaks or interpolations in the train of thought, resulting in >incoherence or irrelevant speech, or neologisms; Is the contact skipping around and not staying on subject? >(g) catatonic behaviour, such as excitement, posturing, or waxy >flexibility, negativism, mutism, and stupor; His is different then the client who gets offended when you are skeptical about thier claims >(h) "negative" symptoms such as marked apathy, paucity of speech, and >blunting or incongruity of emotional responses, usually resulting in >social withdrawal and lowering of social performance; it must be >clear that these are not due to depression or to neuroleptic >medication Have you ever had a client go in to near hysterics when you explained to them that the CIA was not using their latest mind control beam on them? >(i) a significant and consistent change in the overall quality of >some aspects of personal behaviour, manifest as loss of interest, >aimlessness, idleness, a self-absorbed attitude, and social >withdrawal. > When the potential client is talking to you try to slip some small-talk into the conversation so you can feel out how they are doing socially, are they self-absorbed, what about thier long term goals, etc. >Diagnostic Guidelines > >The normal requirement for a diagnosis of schizophrenia is that a >minimum of one very clear symptom (and usually two or more if less >clear-cut) belonging to any one of the groups listed as (a) to (d) >above, or symptoms from at least two of the groups referred to as (e) >to (h), should have been clearly present for most of the time during >a period of 1 month or more. How long have they been the victim of eavesdropping or electronic harassment? The longer the problem the more likely it is the person needs mental help... one month or more is a dead give-away. >Conditions meeting such symptomatic >requirements but of duration less than 1 month (whether treated or >not) should be diagnosed in the first instance as acute >schizophrenia-like psychotic disorder and are classified as >schizophrenia if the sumptoms persist for longer periods. > >Viewed retrospectively, it may be clear that a prodromal phase in >which symptoms and behaviour, such as loss of interest in work, >social activities, and personal appearance and hygiene, together with >generalized anxiety and mild degrees of depression and preoccupation, >preceded the onset of psychotic symptoms by weeks or even months. >Because of the difficulty in timing onset, the 1-month duration >criterion applies only to the specific symptoms listed above and not >to any prodromal nonpsychotic phase. > >The diagnosis of schizophrenia should not be made in the presence of >extensive depressive or manic symptoms unless it is clear that >schizophrenic symptoms antedated the affective disturbance. If both >schizophrenic and affective symptoms develop together and are evenly >balanced, the diagnosis of schizoaffective disorder should be made, >even if the schizophrenic symptoms by themselves would have justified >the diagnosis of schizophrenia. Schizophrenia should not be diagnosed >in the presence of overt brain disease or during states of drug >intoxication or withdrawal. > > >------------------------------------------------------------------------ > >F20.0 Paranoid Schizophrenia > >This is the commonest type of schizophrenia in most parts of the >world. Also, the most common time-bandit in our profession. >The clinical picture is dominated by relatively stable, often >paranoid, delusions, usually accompanied by hallucinations, >particularly of the auditory variety, and perceptual disturbances. >Disturbances of affect, volition, and speech, and catatonic symptoms, >are not prominent. > >Examples of the most common paranoid symptoms are: > >(a) delusions of persecution, reference, exalted birth, special >mission, bodily change, or jealousy; Can include eavesdropping or some kind of technical harassment. >(b) hallucinatory voices that threaten the patient or give commands, >or auditory hallucinations without verbal form, such as whistling, >humming, or laughing; The "giving commands" part is important... what are they saying to the subject, and what are thy telling him to do? >(c) hallucinations of smell or taste, or of sexual or other bodily >sensations; visual hallucinations may occur but are rarely >predominant. > >Thought disorder may be obvious in acute states, but if so it does >not prevent the typical delusions or hallulcinations from being >described clearly. Affect is usually less blunted than in other >varieties of schizophrenia, but a minor degree of incongruity is >common, as are mood disturbances such as irritability, sudden anger, >fearfulness, and suspicion. "Negative" symptoms such as blunting of >affect and impaired volition are often present but do not dominate >the clinical picture. > >The course of paranoid schizophrenia may be episodic, with partial or >complete remissions, or chronic. In chronic cases, the florid >symptoms persist over years and it is difficult to distinguish >discrete episodes. The onset tends to be later than in the >hebephrenic and catatonic forms. > > > >Diagnostic Guidelines > >The general criteria for a diagnosis of schizophrenia (see >introduction to F20 above) must be satisfied. In addition, >hallucinations and/or delusions must be prominent, and disturbances >of affect, volition and speech, and catatonic symptoms must be >relatively inconspicuous. The hallucinations will usually be of the >kind described in (b) and (c) above. Delusions can be of almost any >kind of delusions of control, influence, or passivity, and >persecutory beliefs of various kinds are the most characteristic. > >Includes: >* paraphrenic schizophrenia > >Differential diagnosis. It is important to exclude epileptic and >drug-induced psychoses, and to remember that persecutory delusions >might carry little diagnostic weight in people from certain countries >or cultures. > >Excludes: >* involutional paranoid state (F22.8) >* paranoia (F22.0) > > >------------------------------------------------------------------------ > >Hebephrenic Schizophrenia > >A form of schizophrenia in which affective changes are prominent, >delusions and hallucinations fleeting and fragmentary, behaviour >irresponsible and unpredictable, and mannerisms common. The mood is >shallow and inappropirate and often accompanied by giggling or >self-satisfied, self-absorbed smiling, or by a lofty manner, >grimaces, mannerisms, pranks, hypochondriacal complaints, and >reiterated phrases. Watch out for the hypochondriacal complaints > Thought is disorganized and speech rambling and >incoherent. There is a tendency to remain solitary, and behaviour >seems empty of purpose and feeling. This form of schizphrenia usually >starts between the ages of 15 and 25 years and tends to have a poor >prognosis because of the rapid development of "negative" symptoms, >particularly flattening of affect and loss of volition. > >In addition, disturbances of affect and volition, and thought >disorder are usually prominent. Hallucinations and delusions may be >present but are not usually prominent. Drive and determination are >lost and goals abandoned, so that the patient's behaviour becomes >characteristically aimless and empty of purpose. A superficial and >manneristic preoccupation with religion, philosophy, and other >abstract themes may add to the listener's difficulty in following the >train of thought. > > > >Diagnostic Guidelines > >The general criteria for a diagnosis of schizophrenia (see >introduction to F20 above) must be satisified. Hebephrenia should >normally be diagnosed for the first time only in adolescents or young >adults. The premorbid personality is characteristically, but not >necessarily, rather shy and solitary. For a confident diagnosis of >hebephrenia, a period of 2 or 3 months of continuous observation is >usually necessary, in order to ensure that the characteristic >behaviours described above are sustained. > >Includes: >* disorganized schizophrenia >* hebephrenia > > >------------------------------------------------------------------------ > >F20.2 Catatonic Schizophrenia > >Prominent psychomotor disturbances are essential and dominant >features and may alternate between extremes such as hyperkinesis and >stupor, or automatic obedience and negativism. Constrained attitudes >and postures may be maintained for long periods. Episodes of violent >excitement may be a striking feature of the condition. > >For reasons that are poorly understood, catatonic schizophrenia is >now rarely seen in industrial countries, though it remains common >elsewhere. These catatonic phenomena may be combined with a >dream-like (oneiroid) state with vivid scenic hallucinations. Doubtful that a TSCM'er would have to deal with someone suffering from Catatonic Schizophrenia > > >Diagnostic Guidelines > >The general criteria for a diagnosis of schizophrenia (see >introduction to F20 above) must be satisfied. Transitory and isolated >catatonic symptoms may occur in the context of any other subtype of >schizophrenia, but for a diagnosis of catatonic schizophrenia one or >more of the following behaviours should dominate the clinical picture: > >(a) stupor (marked decrease in reactivity to the environment and in >spontaneous movements and activity) or mutism; >(b) excitement (apparently purposeless motor activity, not influenced >by external stimuli); >(c) posturing (voluntary assumption and maintenance of inappropriate >or bizarre postures); >(d) negativism (an apparently motiveless resistance to all >instructions or attempts to be moved, or movement in the opposite >direction); >(e) rigidity (maintenance of a rigid posture against efforts to be moved); >(f) waxy flexibility (maintenance of limbs and body in externally >imposed positions); and >(g) other symptoms such as command automatism (automatic compliance >with instructions), and perseveration of words and phrases. > >In uncommunicative patients with behavioural manifestations of >catatonic disorder, the diagnosis of schizophrenia may have to be >provisional until adequate evidence of the presence of other symptoms >is obtained. It is also vital to appreciate that catatonic symptoms >are not diagnostic of schizophrenia. A catatonic symptom or symptoms >may also be provoked by brain disease, metabolic disturbances, or >alcohol and drugs, and may also occur in mood disorders. > >Includes: >* catatonic stupor >* schizophrenic catalepsy >* schizophrenic catatonia >* schizophrenic flexibilitas cerea > > >------------------------------------------------------------------------ > >F20.3 Undifferentiated Schizophrenia > >Conditions meeting the general diagnostic criteria for schizophrenia >(see introduction to F20 above) but not conforming to any of the >above subtypes, or exhibiting the features of more than one of them >without a clear predominance of a particular set of diagnostic >characteristics. This rubric should be used only for psychotic >conditions (i.e. residual schizophrenia and post-schizophrenic >depression are excluded) and after an attempt has been made to >classify the condition into one of the three preceding categories. > > > >Diagnostic Guidelines > >This category should be reserved for disorders that: > >(a) meet the diagnostic criteria for schizophrenia; >(b) do not satisfy the criteria for the paranoid, hebephrenic, or >catatonic subtypes; >(c) do not satisfy the criteria for residual schizophrenia or >post-schizophrenic depression. > >Includes: >atypical schizophrenia > > >------------------------------------------------------------------------ > >F20.4 Post-Schizophrenic Depression > >A depressive episode, which may be prolonged, arising in the >aftermath of a schizophrenic illness. Some schizophrenic symptoms >must still be present but no longer dominate the clinical picture. >These persisting schizophrenic symptoms may be "positive" or >"negative", though the latter are more common. It is uncertain, and >immaterial to the diagnosis, to what extent the depressive symptoms >have merely been uncovered by the resolution of earlier psychotic >symptoms (rather than being a new development) or are an intrinsic >part of schizophrenia rather than a psychological reaction to it. >They are rarely sufficiently severe or extensive to meet criteria for >a severe depressive episode, and it is often difficult to decide >which of the patient's symptoms are due to depression and which to >neuroleptic medication or to the impaired volition and affective >flattening of schizophrenia itself. This depressive disorder is >associated with an increased risk of suicide. > > > >Diagnostic Guidelines > >The diagnosis should be made only if: > >(a) the patient has had a schizophrenic illness meeting the general >criteria for schizophrenia (see introduction to F20 above) within the >past 12 months; >(b) some schizophrenic symptoms are still present; and >(c) the depressive symptoms are prominent and distressing, fulfilling >at least the criteria for a depressive episode, and havew been >present for at least 2 weeks. > >If the patient no longer has any schizophrenic symptoms, a depressive >episode should be diagnosed. If schizophrenic symptoms are still >florid and prominent, the diagnosis should remain that of the >appropriate schizophrenic subtype. > > >------------------------------------------------------------------------ > >F20.5 Residual Schizophrenia > >A chronic stage in the development of a schizophrenic disorder in >which there has been a clear progression from an early stage >(comprising one or more episodes with psychotic symptoms meeting the >general criteria for schizophrenia described above) to a later stage >characterized by long-term, though not necessarily irreversible, >"negative" symptoms. > > This is something that TSCM'ers need to keep an eye out for as someone can be fully functional, and yet have a borderline or residual problem. > >Diagnostic Guidelines > >For a confident diagnosis, the following requirements should be met: > >(a) prominent "negative" schizophrenic symptoms, i.e. psychomotor >slowing, underactivity, blunting of affect, passivity and lack of >initiative, poverty of quantity or content of speech, poor nonverbal >communication by facial expression, eye contact, voice modulation, >and posture, poor self-care and social performance; >(b) evidence in the past of at least one clear-cut psychotic episode >meeting the diagnostic criteria for schizophrenia; >(c) a period of at least 1 year during which the intensity and >frequency of florid symptoms such as delusions and hallucinations >have been minimal or substantially reduced and the "negative" >schizophrenic syndrome has been present; >(d) absence of dementia or other organic brain disease or disorder, >and of chronic depression or institutionalism sufficient to explain >the negative impairments. > >If adequate information about the patient's previous history cannot >be obtained, and it therefore cannot be established that criteria for >schizophrenia have been met at some time in the past, it may be >necessary to make a provisional diagnosis of residual schizophrenia. > >Includes: >* chronic undifferentiated schizophrenia >* "Restzustand" >* schizophrenic residual state > > >------------------------------------------------------------------------ > >F20.6 Simple Schizophrenia > >An uncommon disorder in which there is an insidious but progressive >development of oddities of conduct, inability to meet the demands of >society, and decline in total performance. Delusions and >hallucinations are not evident, and the disorder is less obviously >psychotic than the hebephrenic, paranoid, and catatonic subtypes of >schizophrenia. The characteristic "negative" features of residual >schizophrenia (e.g. blunting of affect, loss of volition) develop >without being preceded by any overt psychotic symptoms. With >increasing social impoverishment, vagrancy may ensue and the >individual may then become self-absorbed, idle, and aimless. > > > >Diagnostic Guidelines >Simple schizophrenia is a difficult diagnosis to make with any >confidence because it depends on establishing the slowly progressive >development of the characteristic "negative" symptoms of residual >schizophrenia without any history of hallucinations, delusions, or >other manifestations of an earlier psychotic episode, and with >significant changes in personal behaviour, manifest as a marked loss >of interest, idleness, and social withdrawal. > >Includes: >* schizophrenia simplex -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4314 From: PVS4 Date: Tue Dec 11, 2001 0:25pm Subject: seeking a source of engineering and design blast containment vessels I need to locate a source for engineering and design of blast containment vessels for explosive blast containment. At this time I all we need is design and consultation not manufacture. Thank You Lindsay Hodgdon [Non-text portions of this message have been removed] 4315 From: James M. Atkinson Date: Tue Dec 11, 2001 4:17pm Subject: Re: Narcissistic Personality Disorder [Pontiff Dementia] OK, I picked on the mental cases a bit, so let's explore a more common mental health problem present in a few people who claim to be experts in those things they know little or nothing about. Narcissistic Personality Disorder is chronic in highly specialized professions where it is easy for someone to "fake good", and there is a minimal of government oversight or regulation. -jma At 10:23 AM -0500 12/11/01, James M. Atkinson wrote: >Narcissistic Personality Disorder [Pontiff Dementia] > >SYMPTOMS > >A pervasive pattern of grandiosity (in fantasy or behavior), need for >admiration, and lack of empathy, beginning by early adulthood and >present in a variety of contexts, as indicated by five (or more) of >the following: No remember, someone only needs to hit on five of the following indicators. >(1) has a grandiose sense of self-importance (e.g., exaggerates >achievements and talents, expects to be recognized as superior >without commensurate achievements) The person in question may also present totally irrelevant credentials to the capabilities he or she is claiming. A good example of this is someone who claims to be a TSCM or TEMPEST expert but has completed little or no formal training SPECIFICALLY in TSCM. Another example is someone who is a graduate of an particular college, has done virtually nothing of value with the degree, but waves that one particular sheepskin around making wild claims of bogus expertise. The big question is "what value does that person place on themselves", and do they basically consider themselves as someone "who is better then everybody else" when in fact they are living on nonexistent or near extinct credentials (hint: what college you graduated from was only of value when you were 25). This also goes for people who "talk around" their credentials.. Yes, getting a CPP or similar credential is nice, but it doesn't mean diddly shit when it comes to TSCM. Heck, installing a single computer network better qualifies you for TSCM then a CPP. Not that there is anything wrong with getting all kinds of credentials and training, but if your going to claim expertise in TSCM make sure that they are ***TSCM*** certificates or you may be fooling only yourself. >(2) is preoccupied with fantasies of unlimited success, power, >brilliance, beauty, or ideal love Nobody in this business is going to get rich quickly, so be just a little bit suspicious when someone starts talking about the millions of dollars they are raking in, how much money is in the business, and how they have legions of employees, etc, etc, etc... The bigger they talk up themselves (and their money), usually the more full of shit they actually are. Now, strangely enough; some people are drawn to TSCM and the related professions because they seek some kind of personal empowerment, suffer from Narcissistic Personality Disorder, and try to squeeze everybody around them into believing they are really cool, really smart, hung like a rhino, and so on. They may have all kind of neat toys, and can talk a mean game, but can't change the batteries in a flashlight without a video tape of instructions. There is all kinds of flash, tons of stories, but nothing of substance. >(3) believes that he or she is "special" and unique and can only be >understood by, or should associate with, other special or high-status >people (or institutions) These are the name droppers who are just dying to tell you all about the rich client they just did the sweep for, how they were the bodyguard for so-and-so, the rich people who they talk to all the time, and so on. While a little bit of shop talk is to be expected anytime similar professionals spend anytime together a true Narcissistic will go on endlessly about all the cool people they work for or know (a healthy TSCM'er may mention his clients but will not take spend the entire conversation hyping his relationship with them). On the one hand taking 30 seconds mentioning that you did a sweep to Britney Spears is interesting, but when it devolves in to you talking about how cool she thinks you are you should seek immediate psychiatric help. >(4) requires excessive admiration This is particularly bad when the subject sets up "round tables, conferences, and trade shows where they are directly or in directly the center of the attention. >(5) has a sense of entitlement, i.e., unreasonable expectations of >especially favorable treatment or automatic compliance with his or >her expectations ...or, someone who demands a certain level of respect based on their age, or past work history, college degree, or color of their hair (or lack thereof)... Narcissistic can take many forms. >(6) is interpersonally exploitative, i.e., takes advantage of others >to achieve his or her own ends Like the TSCM'er who steals a little something from every sweep he is on, steal from other TSCM'ers, screws his customers, etc, etc... and all because "They owe him" >(7) lacks empathy: is unwilling to recognize or identify with the >feelings and needs of others This is a real biggy in our business... and they way you deal with people who contact you says a lot about your level of empathy. Do you handle them with compassions, and firmly, yet gentle encourage them to seek medical help? do you push them to engage you for a sweep? or do you tell them to get stuffed? >(8) is often envious of others or believes that others are envious of >him or her Let's not go there... I think we al know what it means >(9) shows arrogant, haughty behaviors or attitudes ... we will not go here either... "The downside of being better than everyone else is that people tend to assume you're pretentious." >Medical Treatment > >Hospitalization >The hospitalization of patients with severe Narcissistic Personality >occurs frequently. For some, such as those who are quite impulsive or >self-destructive, or who have poor reality-testing, this is the >result of Axis I symptoms which are overlaid upon the personality >disorder. Hospitalizations should be brief, and the treatment >specific to the particular symptom involved. The subjects grasp on reality is important... if they are they are Narcissistic and they don't have a good grasp on reality their entire world can come crashing down. >Another group of patients for whom hospitalization is indicated, >provided long-term residential treatment is available, are those who >have poor motivation for outpatient treatment, fragile object >relationships, chronic destructive acting out, and chaotic >life-styles. Strangely enough, some people who claim to be in the TSCM business really need to sped some inpatient time. >An inpatient program can offer an intensive milieu which >includes individual psychotherapy, family involvement, and a >specialized residential environment. The structure is physically and >emotionally secure enough to sustain the patient with severe ego >weakness throughout the course of expressive, conflict-solving >psychotherapy. > >Small staff-patient groups within the wards, as well as large >community meetings, at which feelings are shared and patients' >comments taken seriously by staff, and constructive work assignments, >recreational activities, and opportunities to sublimate painfully >conflictual impulses make the hospital a "holding" environment rather >than merely a containing one. The ultimate goals are of effecting a >better integrated internal world, more cohesive and modulated >self-object representation, and a self-concept less vulnerable to >narcissistic injury. > >------------------------------------------------------------------------ > >Psychosocial Treatment > > >Basic Principles >Narcissistic patients try to sustain an image of perfection and >personal invincibility for themselves and attempt to project that >impression to others as well. Physical illness may shatter this >illusion, and a patient may lose the feeling of safety inherent in a >cohesive sense of self. This loss precipitates a panicky sensation >that "my world is falling to pieces," and the patient feels a sense >of personal fragmentation. > >The histrionic patient's idealization of the physician stands in >contrast to the narcissistic patient's frequent contemptuous >disregard for the physician, who is denigrated in a defensive effort >to maintain a sense of superiority and mastery over illness. Only the >most senior physician in a prestigious institution is deemed worthy >of respect as the frightened patient seeks an external reflection of >his or her own fragile grandeur in the doctor. More junior members of >the health care team may be the targets of derision as the patient >seeks to establish hierarchical dominance in order to counter the >shame and fear triggered by illness. > >Health care professionals must convey a feeling of respect and >acknowledge the patient's sense of self-importance so that the >patient can reestablish a coherent sense of self, but they must at >the same time avoid reinforcing either pathologic grandiosity (which >may contribute to denial of illness) or weakness (which frightens the >patient). An initial approach of support followed by step-by-step >confrontation of the patient's vulnerabilities may enable the patient >to deal with the implications of illness with feelings of greater >subjective strength. The increased self-confidence may reduce the >patient's need to attack the health care team in a misguided effort >at psychologic self-preservation and eases the pressure to provide >perfect care, since the patient's antagonistic feeling of entitlement >(defined by DSM-III as an "expectation of special favors without >assuming reciprocal responsibilities") is reduced. > >Many of the treatment principles and approaches discussed for this >disorder apply as well to Borderline Personality Disorder. > >The individual with narcissistic and related personality disorders is >likely to present with Axis I symptoms and disorders at various times >in his or her life. These should be treated as described elsewhere. >Caution should be observed, however, not to overdiagnose psychotic >decompensation as Schizophrenia unless all DSM-III criteria are >apparent. The same caveat applies to the pharmacologic treatment of >depressive symptoms in the absence of clinical signs of Major >Affective Disorder. When treating presenting symptoms and Axis I >disorders in patients with Narcissistic Personality Disorder and >other similar conditions, attention should be paid to the >consequences of removing symptoms in a patient whose underlying >character is primitive and or fragile. > >Some clinicians, suggest that the grandiosity and tendency to >idealize and devalue should be interpreted as defensive maneuvers >when aspects of early conflictual relationships are played out in >adult life. Other clinicians, posit that the emergence of the >patient's grandiosity and tendency to idealize the therapist should >initially be viewed supportively. To help the individual develop >stronger self-esteem regulation, the therapist then gradually points >out the realistic limitations of patient and therapist alike while >also offering an empathic ambience to cushion patients in their >efforts to accept and integrate these experiences. Unfortunately, >much research will be required to validate the description and course >of narcissistic personality disorder before further research can >answer which techniques bring about a better response to treatment. > > >Individual Psychotherapy >Most psychiatrists will, as a practical matter, treat most of their >severely narcissistic patients for symptoms related to crises and >relatively external Axis I diagnoses, rather than in an effort to >address the personality disorder itself. The therapist must be aware >of the importance of narcissism to the contiguity of the patient's >psyche, refrain from confronting the need for self-aggrandizement, >and help the patient use his or her narcissistic characteristics to >reconstitute an intact self-image. Positive transference and >therapeutic alliance should not be relied upon, since the patient may >not be able to acknowledge the real humanness of the therapist but >may have to see him/her as either superhuman or devalued. > >Those patients who do not terminate treatment after symptom relief >has been obtained may wish help for some of the problems related to >their personality disorder, such as interpersonal difficulties or >depression. The therapist must have a good understanding of the >principles of the narcissistic personality style, both for >interpretation to the patient and for use in combating counter >transference. Goals for ordinary psychotherapy should not be too >great, since the source of these patients' difficulties lies deep in >pathological development. > > >Group Therapy >The goals are to help the patient develop a healthy individuality >(rather than a resilient narcissism) so that he or she can >acknowledge others as separate persons, and to decrease the need for >self-defeating coping mechanisms. The first step toward developing a >working alliance is empathy with the surprise and hurt that the >patient experiences as a result of confrontations within the group. >The external structuring group therapy provides can control >destructive behavior in spite of ego weakness. In groups, the >therapist is less authoritative (and less threatening to the >patient's grandiosity); intensity of emotional experience is >lessened; and regression is more controlled, creating a better >setting for confrontation and clarification. > >Outpatient analytic-expressive group therapy requires a concomitant >individual relationship for most patients, which should be somewhat >supportive. The need for this additional support, the likelihood of >the patient's leaving the group at the first sign of psychic insult, >and proneness to disorganized thinking are all found more often in >the Borderline patient. The patient with a Narcissistic Personality >Disorder does not appear so vulnerable to separation anxieties as the >Borderline patient, but is instead involved in issues centered around >maintaining a sense of self-worth. > > >Criteria summarized from: >American Psychiatric Association. (1994). Diagnostic and statistical >manual of mental disorders, fourth edition. Washington, DC: American >Psychiatric Association. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4316 From: Matthew Paulsen Date: Tue Dec 11, 2001 5:08pm Subject: RE: seeking a source of engineering and design blast containment vessels Contact Oregon Iron Works nuclear division. They should be able to provide you with all the information you need to get started from design and consultation to final manufacturing when you're ready. If they can't do it they'll probably know who can. Telephone 503-653-6300 FAX 503-653-5870 Postal address 9700 SE Lawnfield Road Clackamas Oregon 97045 Sales: Mr. Bradley D. Dunkin bdunkin@o... Sincerely, Matt Paulsen Matthew Paulsen Consulting http://home.attbi.com/~mpconsulting The information in this email is confidential and may be legally privileged. It is intended solely for the addressee. Access to this email by anyone else is unauthorized. If you believe this method of communication to be compromised or at risk, do not contact me through this medium, instead establish a secondary method of communication with me through secure courier, personal contact, multiple encryption systems, or if not possible please do not respond to the message. -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 7.0.3 for non-commercial use mQGiBDuoDQgRBADcOOT+8bdrRTorYkI3/uFhxSCaQkSFXE0tj7oLLr+BMIc409vD n2woHrlPnhGZyYUX8JfNBe2TvFfW8EwD4L/Exd3M7ywff2sRIAoZeuQMZbNI69N5 lYMvsb/Knux7EpCY/lSSOqfT1Lo0mSEq/KmFDA+akUrBq6tXQHo+ak2h3QCg/5Cl Xyyr3zhOCP9oKc4sk2RUQvED/2HpoQt1FIXOLEUDjLVXd/IdwIZbGfxTkeJhq5vW exrjnKhDgDAFMl3kVvhsDvM0JA1AODGOa821oReca2dK+blSBpXS652k4FMzQuGc Q91H174bFjLmsL75PSRYjGo2qZC2JbLMFnAtR6k8Dhdz3EgE3ttrU5G/A05xQ9ux gUZLBADEhVxr7kXYNwYedp+Hv+xWJpBnYwrLOy9dGr1hoM0AhPtT+/L6uyv0yJmd HWYZUbhyeUy5dwWdquilLOBaF+l0BtgRdrmtl5T+20rsI+sc/aVNbtfp7GjwWriy Ygep3BCf24PPvzh8JgY3PlTmVYOE8StDBQm+Z7pBZ80ouIA4brQkTWF0dGhldyBQ YXVsc2VuIDxtcGF1bHNlbjZAaG9tZS5jb20+iQBYBBARAgAYBQI7qA0ICAsDCQgH AgEKAhkBBRsDAAAAAAoJELjYcPfEakW9IRsAoOgv510tXgAot4LI3zdV7iaVr0Io AJ4w9CSCx/t0C4lDBlZM5PgZJ0qABLkCDQQ7qA0IEAgA9kJXtwh/CBdyorrWqULz Bej5UxE5T7bxbrlLOCDaAadWoxTpj0BV89AHxstDqZSt90xkhkn4DIO9ZekX1KHT UPj1WV/cdlJPPT2N286Z4VeSWc39uK50T8X8dryDxUcwYc58yWb/Ffm7/ZFexwGq 01uejaClcjrUGvC/RgBYK+X0iP1YTknbzSC0neSRBzZrM2w4DUUdD3yIsxx8Wy2O 9vPJI8BD8KVbGI2Ou1WMuF040zT9fBdXQ6MdGGzeMyEstSr/POGxKUAYEY18hKcK ctaGxAMZyAcpesqVDNmWn6vQClCbAkbTCD1mpF1Bn5x8vYlLIhkmuquiXsNV6TIL OwACAggAvP1XSJNhkYvPiTVrM41MBBuAAPR21PxJbrMkB5z89+3KaJ7h+gEHeCDy GE8QmVYfSMpz7/sq8W2B9vNDUn2dLnKCI3VPeszMW9oN/JR3QnL2T+sThXvLY8TF 966NIIGrHIVDeb9hFoVOPrzghuWOv8Q0K0V0LquBF4IndgNy3S7s4ZjTExcMi3hn Pu/PgUXzb1gGsmFoyZFy6YYGKqQ5+27UtghHbEeOIL90+bep4xuDAZ0v3Hjh+tnI a+vIFdjVLxsTTwwB4GW3o1P1+F9wj+KfkPqWroDAYBtwV2a3YQ4MfXgTSGYysm2+ mvnyHwrE0ZnO+0KLK7pPJ/tCMagFEYkATAQYEQIADAUCO6gNCAUbDAAAAAAKCRC4 2HD3xGpFvVKWAJ9Uz57//yNxW1pmdfjcJc3rCI/FiwCeKZV8pnywou/rqlRy0Jfy 6oPOPrk= =97B9 -----END PGP PUBLIC KEY BLOCK----- -----Original Message----- From: PVS4 [mailto:pvs4@a...] Sent: Tuesday, December 11, 2001 10:26 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] seeking a source of engineering and design blast containment vessels I need to locate a source for engineering and design of blast containment vessels for explosive blast containment. At this time I all we need is design and consultation not manufacture. Thank You Lindsay Hodgdon [Non-text portions of this message have been removed] Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 4317 From: Aimee Farr Date: Tue Dec 11, 2001 4:58pm Subject: Surveillance laundering? Video Shows CIA Threatened to Let Prisoner Be Killed (was videotaped by an Afghan cameraman) http://news.independent.co.uk/world/asia_china/story.jsp?story=108988 http://www.msnbc.com/news/668588.asp http://www.thetimes.co.uk/article/0,,2001560012-2001565689,00.html ..... Along similar thought-patterns, I've been watching for examples of "surveillance laundering" via the Net lately. If anybody runs across anything, I would appreciate a note. ("Laundering" surveillance transcripts and dossier fruits through cooperative press allowed somebody to smear the target, use it, or point to it free of taint. The Net allows you to do the same thing to the hyperlink-degree. Historically, it targeted the personal sphere. It was darn effective. Today, it would be more so.) Related issue: http://www.fas.org/irp/congress/2001_rpt/hrep107-328.html (see also FISA modifications) SEC. 310. REVIEW OF PROTECTIONS AGAINST THE UNAUTHORIZED DISCLOSURE OF CLASSIFIED INFORMATION. ... (1) whether the administrative regulations and practices of the intelligence community are adequate, in light of the particular requirements of the intelligence community, to protect against the unauthorized disclosure of classified information; and (2) whether recent developments in technology, and anticipated developments in technology, necessitate particular modifications of current protections against the unauthorized disclosure of classified information in order to further protect against the unauthorized disclosure of such information. .... There was no provision or encouragement for private sector involvement with regard to this provision. I thought that ignored a stakeholder population and source of expertise. ~Aimee 4318 From: Dawn Star Date: Tue Dec 11, 2001 9:56pm Subject: Who Do You Call? Dave Emery Makes an excellent point here: "Just out of curiosity, how do you know that the surveillance is really government (FBI, DEA etc), and especially truly legal as opposed to rogue ? I realize that government bugging gear is pretty characteristic and has well known signatures, but do you have contacts at the agencies involved to check out devices you find or are you just assuming that if it quacks like a duck it must be a duck and a legal one at that ?" From my experience there is not a particular "characteristic" to a government bug, they come in all flavors, formats, and size's. Just ask John Gotty's former sweepers. So if you find a bug or wiretap, who do you call? No one! You have to step up to the plate and make your report, and the chips fall where they may. Sweeping ain't a vocation for lightweights! Roger Tolces Electronic Security Co. www.bugsweeps.com 4319 From: Steve Uhrig Date: Tue Dec 11, 2001 9:03pm Subject: Re: Delusional Disorder > Delusional Disorder I'll have you all know: My inferiority complex is bigger and better than anyone else's! Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4320 From: admin@t... Date: Tue Dec 11, 2001 6:25pm Subject: RE: Re: The ICD-10 Classification of Mental and Behavioural Disorders - Schizophrenia Client are sometimes agitated, emotional and odd. It can go with the territory. In a recent TSCM inspection the client was referred by a larger client and so we felt obliged to perform what appeared to be an inspection for a "paranoid" individual. The person referring this case indicated as much. We interviewed the client who indicated that she believed she was being surveilled in her apartment. She believed that Federal agents were living above her and in her building. (This was actually true.) She was concerned that they were tapping her lines. However, the client revealed no real motive for surveillance after many questions. The client also appeared to have much of her information on eavesdropping from "Enemy of the State." and various "Spy-shop" sites on the internet. Inquiries were made, no indication of a LE investigation at the site. All of the tennants appeared to know who lived at the site. The Federal agents were open about their occupations. The inspection was initiated. A miniature video camera was discovered in a short period of time. The lines were traced to a location used by the building manager. The motive appears to be perversion. On the face of it, we might not have taken this assignment based on a number of statements by both the client and the contact who referred her. In the end, we will still shy away from these types of clients, however, we will listen to their story and hopefully ask the right questions. Sean Walsh Walsh & Associates Original Message: ----------------- Wrom: RWTQTIPWIGYOKSTTZRCLBDXRQBGJSNBO Date: Tue, 11 Dec 2001 14:57:57 -0500 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] The ICD-10 Classification of Mental and Behavioural Disorders - Schizophrenia See my comments scattered though the text: At 10:12 AM -0500 12/11/01, James M. Atkinson wrote: >[For discussion by the list as it applies to screening inquiries, >more to follow - jma] > > >------------------------------------------------------------------------ >The ICD-10 Classification of Mental and Behavioural Disorders >World Health Organization, Geneva, 1992 >------------------------------------------------------------------------ > >Contents > >*F20 Schizophrenia >*F20.0 Paranoid Schizophrenia >*Hebephrenic Schizophrenia >*F20.2 Catatonic Schizophrenia >*F20.3 Undifferentiated Schizophrenia >*F20.4 Post-Schizophrenic Depression >*F20.5 Residual Schizophrenia >*F20.6 Simple Schizophrenia > >------------------------------------------------------------------------ > >F20 Schizophrenia > >The schizophrenic disorders are characterized in general by >fundamental and characteristic distortions of thinking and >perception, and by inappropriate or blunted affect. OK, this applies to quite a few executives and even a few officers >Clear >consciousness and intellectual capacity are usually maintained, >although certain cognitive deficits may evolve in the course of time. Yep, quite a few people >The disturbance involves the most basic functions that give the >normal person a feeling of individuality, uniqueness, and >self-direction. But when these feelings become so strong that they can be unhealthy. >The most intimate thoughts, feelings, and acts are >often felt to be known to or shared by others, and explanatory >delusions may develop, to the effect that natural or supernatural >forces are at work to influence the afflicted individual's thoughts >and actions in ways that are often bizarre. Gee, if you've been doing TSCM for a while you have had more then a few cases where potential customers voice any or all of the following: 1) Thoughts, feelings, and acts are often felt to be known to or shared by others Now, we have to be careful here as the client may be completely healthy and is simply the victim of a bugging. Never dismiss someone as being mentally ill simply because "others know things" (dig a little deeper). 2) Explanatory delusions We also have to be careful here as the client may have researched eavesdropping technologies, and may quite rationally belive that an eavesdropping device has been turned against them due to a breech of their privacy. Remember hat the Internet is a good source of good legitimate information, but it is also a cornucopia of complete bullshit. The client may not at all be delusionary, but is simply unable to effectively communicate wheat is going on (dig a little deeper). 3) Claims of a natural or supernatural forces are at work The person needs to be pushed to disclose WHO is eavesdropping on them, and WHY. This is usually where the person's story breaks down if they are mentally ill. It is one thing if they suspect a business partner, competitor, or investigator, but entirely something else if the contact claims it's the CIA, FBI, NSA, un-named government agency, or alien beings. 4) Claims that someone" is attempting to influence the afflicted individual's thoughts Ah-Ha, this is a dead give away that you are dealing with someone who is mentally ill. When the client tells you they are "getting messages" it indicates they need immediate medical help, and not the services of a TSCM practitioner. Now on the other hand this could. 5) Claims that someone" is attempting to influence the afflicted individual's actions Same as above, this is particularly interesting when the client claims that others are causing him pain or physical malady though some kind of "energy beam" or microwave weapon. >The individual may see >himself or herself as the pivot of all that happens. Yep, like the government has an entire team of agents following and harassing the poor soul >Hallucinations, >especially auditory, are common and may comment on the individual's >behaviour or thoughts. Usually when the contact claims that their antagonist is commenting on things they are doing in the privacy of their own home you have a high probability of someone being mentally ill (ie: commenting on their private thoughts, etc... NOT commenting on actions ). Of course you have to remember that we are talking about "Auditory Hallucinations" where the subject is "hearing things" and being specifically addressed. I know of case where people were "hearing things" and the problem was found to be a hearing aid, a telephone, or radio responding to high RFI field. >Perception is frequently disturbed in other >ways: colours or sounds may seem unduly vivid or altered in quality, Yes, or the person may have a vision problem when they get stressed out. >and irrelevant features of ordinary things may appear more important >than the whole object or situation. ..or the person have simply become enlightened as to what a bug looks like. >Perplexity is also common early >on and frequently leads to a belief that everyday situations possess >a special, usually sinister, meaning intended uniquely for the >individual. The Perplexity often leads to the subject tying to research their problem, and other they end of eating up some bullshit psuedo-science foisted on the public. The most common (and destructive) of these are the Electronic Warfare sites, Mind Control Sites, and Conspiracy Theory sites. Find out what you potential customer is reading... what sites are they visiting? Do they claim to have read an article of mind control? implanted trackers? etc? >In the characteristic schizophrenic disturbance of >thinking, peripheral and irrelevant features of a total concept, >which are inhibited in normal directed mental activity, are brought >to the fore and utilized in place of those that are relevant and >appropriate to the situation. Do they keep mentally wandering off the subject at hand? >Thus thinking becomes vague, >elleptical, and obscure, and its expression in speech sometimes >incomprehensible. The subject will often skip around to totally unrelated subjects >Breaks and interpolations in the train of thought >are frequent, and thoughts may seem to be withdrawn by some outside >agency. It is amazing how many people think the FBI can use "Carnivore Mind Reading Software", and uses classified equipment to harass them specifically "because they know something". Push for what they claim to know, and why is it of value... and to whom... >Mood is characteristically shallow, capricious, or >incongruous. Yep, >Ambivalence and disturbance of volition may appear as >inertia, negativism, or stupor. Ah, they often exhibit claim that "this" has been going on for years, and that nobody has been able to help them. >Catatonia may be present. The onset >may be acute, with seriously disturbed behaviour, or insidious, with >a gradual development of odd ideas and conduct. Watch out for the "aluminum foil hats", and shielded bedrooms. >The course of the >disorder shows equally great variation and is by no means inevitably >chronic or deteriorating (the course is specified by five-character >categories). I have seen cases where a senior executive was suffering from full blown Schizophrenia, and yet was able to keep the company together, make a profit and keep his job. Just because they wear a suit and hold a job doesn't mean that they are ok. Conversely, jut because the subject is drooling on themselves, and mumbles all days does not mean he has a psychiatric disorder. >In a proportion of cases, which may vary in different >cultures and populations, the outcome is complete, or nearly >complete, recovery. Take a look at some of the people who work at Fort Meade. >The sexes are approximately equally affected by >the onset tends to be later in women. Watch out for the single middle age women working in administrative or slightly technical menial rolls where their background and training is not on par with their job responsibilities. For example, someone who is 30-40 years old, graduated from MIT or Harvard, and so on is not going to be working in a crappy tech support job unless there is something very wrong. Watch out for people in menial jobs, who are otherwise overqualified. >Although no strictly pathognomonic symptoms can be identified, for >practical purposes it is useful to divide the above symptoms into >groups that have special importance for the diagnosis and often occur >together, such as: > >(a) thought echo, thought insertion or withdrawal, and thought broadcasting; Also, claims of thought interception secret messages, or mind control. >(b) delusions of control, influence, or passivity, clearly referred >to body or limb movements or specific thoughts, actions, or >sensations; delusional perception; Ringing-of-the-ears or muscle spasms not included. >(c) hallucinatory voices giving a running commentary on the patient's >behaviour, or discussing the patient among themselves, or other types >of hallucinatory voices coming from some part of the body; This does not include my stomach growling . >(d) persistent delusions of other kinds that are culturally >inappropriate and completely impossible, such as religious or >political identity, or superhuman powers and abilities (e.g. being >able to control the weather, or being in communication with aliens >from another world); Also, watch for contact trying to present too strong of a case, and trying just a little bit too hard to get you to belive them. For example, does the contact keep offering medical reports, and so on. >(e) persistent hallucinations in any modality, when accompanied >either by fleeting or half-formed delusions without clear affective >content, or by persistent over-valued ideas, or when occurring every >day for weeks or months on end; Notice that you should be watching for "fleeting or half-formed delusions", and try pushing the contact for in depth content. >(f) breaks or interpolations in the train of thought, resulting in >incoherence or irrelevant speech, or neologisms; Is the contact skipping around and not staying on subject? >(g) catatonic behaviour, such as excitement, posturing, or waxy >flexibility, negativism, mutism, and stupor; His is different then the client who gets offended when you are skeptical about thier claims >(h) "negative" symptoms such as marked apathy, paucity of speech, and >blunting or incongruity of emotional responses, usually resulting in >social withdrawal and lowering of social performance; it must be >clear that these are not due to depression or to neuroleptic >medication Have you ever had a client go in to near hysterics when you explained to them that the CIA was not using their latest mind control beam on them? >(i) a significant and consistent change in the overall quality of >some aspects of personal behaviour, manifest as loss of interest, >aimlessness, idleness, a self-absorbed attitude, and social >withdrawal. > When the potential client is talking to you try to slip some small-talk into the conversation so you can feel out how they are doing socially, are they self-absorbed, what about thier long term goals, etc. >Diagnostic Guidelines > >The normal requirement for a diagnosis of schizophrenia is that a >minimum of one very clear symptom (and usually two or more if less >clear-cut) belonging to any one of the groups listed as (a) to (d) >above, or symptoms from at least two of the groups referred to as (e) >to (h), should have been clearly present for most of the time during >a period of 1 month or more. How long have they been the victim of eavesdropping or electronic harassment? The longer the problem the more likely it is the person needs mental help... one month or more is a dead give-away. >Conditions meeting such symptomatic >requirements but of duration less than 1 month (whether treated or >not) should be diagnosed in the first instance as acute >schizophrenia-like psychotic disorder and are classified as >schizophrenia if the sumptoms persist for longer periods. > >Viewed retrospectively, it may be clear that a prodromal phase in >which symptoms and behaviour, such as loss of interest in work, >social activities, and personal appearance and hygiene, together with >generalized anxiety and mild degrees of depression and preoccupation, >preceded the onset of psychotic symptoms by weeks or even months. >Because of the difficulty in timing onset, the 1-month duration >criterion applies only to the specific symptoms listed above and not >to any prodromal nonpsychotic phase. > >The diagnosis of schizophrenia should not be made in the presence of >extensive depressive or manic symptoms unless it is clear that >schizophrenic symptoms antedated the affective disturbance. If both >schizophrenic and affective symptoms develop together and are evenly >balanced, the diagnosis of schizoaffective disorder should be made, >even if the schizophrenic symptoms by themselves would have justified >the diagnosis of schizophrenia. Schizophrenia should not be diagnosed >in the presence of overt brain disease or during states of drug >intoxication or withdrawal. > > >------------------------------------------------------------------------ > >F20.0 Paranoid Schizophrenia > >This is the commonest type of schizophrenia in most parts of the >world. Also, the most common time-bandit in our profession. >The clinical picture is dominated by relatively stable, often >paranoid, delusions, usually accompanied by hallucinations, >particularly of the auditory variety, and perceptual disturbances. >Disturbances of affect, volition, and speech, and catatonic symptoms, >are not prominent. > >Examples of the most common paranoid symptoms are: > >(a) delusions of persecution, reference, exalted birth, special >mission, bodily change, or jealousy; Can include eavesdropping or some kind of technical harassment. >(b) hallucinatory voices that threaten the patient or give commands, >or auditory hallucinations without verbal form, such as whistling, >humming, or laughing; The "giving commands" part is important... what are they saying to the subject, and what are thy telling him to do? >(c) hallucinations of smell or taste, or of sexual or other bodily >sensations; visual hallucinations may occur but are rarely >predominant. > >Thought disorder may be obvious in acute states, but if so it does >not prevent the typical delusions or hallulcinations from being >described clearly. Affect is usually less blunted than in other >varieties of schizophrenia, but a minor degree of incongruity is >common, as are mood disturbances such as irritability, sudden anger, >fearfulness, and suspicion. "Negative" symptoms such as blunting of >affect and impaired volition are often present but do not dominate >the clinical picture. > >The course of paranoid schizophrenia may be episodic, with partial or >complete remissions, or chronic. In chronic cases, the florid >symptoms persist over years and it is difficult to distinguish >discrete episodes. The onset tends to be later than in the >hebephrenic and catatonic forms. > > > >Diagnostic Guidelines > >The general criteria for a diagnosis of schizophrenia (see >introduction to F20 above) must be satisfied. In addition, >hallucinations and/or delusions must be prominent, and disturbances >of affect, volition and speech, and catatonic symptoms must be >relatively inconspicuous. The hallucinations will usually be of the >kind described in (b) and (c) above. Delusions can be of almost any >kind of delusions of control, influence, or passivity, and >persecutory beliefs of various kinds are the most characteristic. > >Includes: >* paraphrenic schizophrenia > >Differential diagnosis. It is important to exclude epileptic and >drug-induced psychoses, and to remember that persecutory delusions >might carry little diagnostic weight in people from certain countries >or cultures. > >Excludes: >* involutional paranoid state (F22.8) >* paranoia (F22.0) > > >------------------------------------------------------------------------ > >Hebephrenic Schizophrenia > >A form of schizophrenia in which affective changes are prominent, >delusions and hallucinations fleeting and fragmentary, behaviour >irresponsible and unpredictable, and mannerisms common. The mood is >shallow and inappropirate and often accompanied by giggling or >self-satisfied, self-absorbed smiling, or by a lofty manner, >grimaces, mannerisms, pranks, hypochondriacal complaints, and >reiterated phrases. Watch out for the hypochondriacal complaints > Thought is disorganized and speech rambling and >incoherent. There is a tendency to remain solitary, and behaviour >seems empty of purpose and feeling. This form of schizphrenia usually >starts between the ages of 15 and 25 years and tends to have a poor >prognosis because of the rapid development of "negative" symptoms, >particularly flattening of affect and loss of volition. > >In addition, disturbances of affect and volition, and thought >disorder are usually prominent. Hallucinations and delusions may be >present but are not usually prominent. Drive and determination are >lost and goals abandoned, so that the patient's behaviour becomes >characteristically aimless and empty of purpose. A superficial and >manneristic preoccupation with religion, philosophy, and other >abstract themes may add to the listener's difficulty in following the >train of thought. > > > >Diagnostic Guidelines > >The general criteria for a diagnosis of schizophrenia (see >introduction to F20 above) must be satisified. Hebephrenia should >normally be diagnosed for the first time only in adolescents or young >adults. The premorbid personality is characteristically, but not >necessarily, rather shy and solitary. For a confident diagnosis of >hebephrenia, a period of 2 or 3 months of continuous observation is >usually necessary, in order to ensure that the characteristic >behaviours described above are sustained. > >Includes: >* disorganized schizophrenia >* hebephrenia > > >------------------------------------------------------------------------ > >F20.2 Catatonic Schizophrenia > >Prominent psychomotor disturbances are essential and dominant >features and may alternate between extremes such as hyperkinesis and >stupor, or automatic obedience and negativism. Constrained attitudes >and postures may be maintained for long periods. Episodes of violent >excitement may be a striking feature of the condition. > >For reasons that are poorly understood, catatonic schizophrenia is >now rarely seen in industrial countries, though it remains common >elsewhere. These catatonic phenomena may be combined with a >dream-like (oneiroid) state with vivid scenic hallucinations. Doubtful that a TSCM'er would have to deal with someone suffering from Catatonic Schizophrenia > > >Diagnostic Guidelines > >The general criteria for a diagnosis of schizophrenia (see >introduction to F20 above) must be satisfied. Transitory and isolated >catatonic symptoms may occur in the context of any other subtype of >schizophrenia, but for a diagnosis of catatonic schizophrenia one or >more of the following behaviours should dominate the clinical picture: > >(a) stupor (marked decrease in reactivity to the environment and in >spontaneous movements and activity) or mutism; >(b) excitement (apparently purposeless motor activity, not influenced >by external stimuli); >(c) posturing (voluntary assumption and maintenance of inappropriate >or bizarre postures); >(d) negativism (an apparently motiveless resistance to all >instructions or attempts to be moved, or movement in the opposite >direction); >(e) rigidity (maintenance of a rigid posture against efforts to be moved); >(f) waxy flexibility (maintenance of limbs and body in externally >imposed positions); and >(g) other symptoms such as command automatism (automatic compliance >with instructions), and perseveration of words and phrases. > >In uncommunicative patients with behavioural manifestations of >catatonic disorder, the diagnosis of schizophrenia may have to be >provisional until adequate evidence of the presence of other symptoms >is obtained. It is also vital to appreciate that catatonic symptoms >are not diagnostic of schizophrenia. A catatonic symptom or symptoms >may also be provoked by brain disease, metabolic disturbances, or >alcohol and drugs, and may also occur in mood disorders. > >Includes: >* catatonic stupor >* schizophrenic catalepsy >* schizophrenic catatonia >* schizophrenic flexibilitas cerea > > >------------------------------------------------------------------------ > >F20.3 Undifferentiated Schizophrenia > >Conditions meeting the general diagnostic criteria for schizophrenia >(see introduction to F20 above) but not conforming to any of the >above subtypes, or exhibiting the features of more than one of them >without a clear predominance of a particular set of diagnostic >characteristics. This rubric should be used only for psychotic >conditions (i.e. residual schizophrenia and post-schizophrenic >depression are excluded) and after an attempt has been made to >classify the condition into one of the three preceding categories. > > > >Diagnostic Guidelines > >This category should be reserved for disorders that: > >(a) meet the diagnostic criteria for schizophrenia; >(b) do not satisfy the criteria for the paranoid, hebephrenic, or >catatonic subtypes; >(c) do not satisfy the criteria for residual schizophrenia or >post-schizophrenic depression. > >Includes: >atypical schizophrenia > > >------------------------------------------------------------------------ > >F20.4 Post-Schizophrenic Depression > >A depressive episode, which may be prolonged, arising in the >aftermath of a schizophrenic illness. Some schizophrenic symptoms >must still be present but no longer dominate the clinical picture. >These persisting schizophrenic symptoms may be "positive" or >"negative", though the latter are more common. It is uncertain, and >immaterial to the diagnosis, to what extent the depressive symptoms >have merely been uncovered by the resolution of earlier psychotic >symptoms (rather than being a new development) or are an intrinsic >part of schizophrenia rather than a psychological reaction to it. >They are rarely sufficiently severe or extensive to meet criteria for >a severe depressive episode, and it is often difficult to decide >which of the patient's symptoms are due to depression and which to >neuroleptic medication or to the impaired volition and affective >flattening of schizophrenia itself. This depressive disorder is >associated with an increased risk of suicide. > > > >Diagnostic Guidelines > >The diagnosis should be made only if: > >(a) the patient has had a schizophrenic illness meeting the general >criteria for schizophrenia (see introduction to F20 above) within the >past 12 months; >(b) some schizophrenic symptoms are still present; and >(c) the depressive symptoms are prominent and distressing, fulfilling >at least the criteria for a depressive episode, and havew been >present for at least 2 weeks. > >If the patient no longer has any schizophrenic symptoms, a depressive >episode should be diagnosed. If schizophrenic symptoms are still >florid and prominent, the diagnosis should remain that of the >appropriate schizophrenic subtype. > > >------------------------------------------------------------------------ > >F20.5 Residual Schizophrenia > >A chronic stage in the development of a schizophrenic disorder in >which there has been a clear progression from an early stage >(comprising one or more episodes with psychotic symptoms meeting the >general criteria for schizophrenia described above) to a later stage >characterized by long-term, though not necessarily irreversible, >"negative" symptoms. > > This is something that TSCM'ers need to keep an eye out for as someone can be fully functional, and yet have a borderline or residual problem. > >Diagnostic Guidelines > >For a confident diagnosis, the following requirements should be met: > >(a) prominent "negative" schizophrenic symptoms, i.e. psychomotor >slowing, underactivity, blunting of affect, passivity and lack of >initiative, poverty of quantity or content of speech, poor nonverbal >communication by facial expression, eye contact, voice modulation, >and posture, poor self-care and social performance; >(b) evidence in the past of at least one clear-cut psychotic episode >meeting the diagnostic criteria for schizophrenia; >(c) a period of at least 1 year during which the intensity and >frequency of florid symptoms such as delusions and hallucinations >have been minimal or substantially reduced and the "negative" >schizophrenic syndrome has been present; >(d) absence of dementia or other organic brain disease or disorder, >and of chronic depression or institutionalism sufficient to explain >the negative impairments. > >If adequate information about the patient's previous history cannot >be obtained, and it therefore cannot be established that criteria for >schizophrenia have been met at some time in the past, it may be >necessary to make a provisional diagnosis of residual schizophrenia. > >Includes: >* chronic undifferentiated schizophrenia >* "Restzustand" >* schizophrenic residual state > > >------------------------------------------------------------------------ > >F20.6 Simple Schizophrenia > >An uncommon disorder in which there is an insidious but progressive >development of oddities of conduct, inability to meet the demands of >society, and decline in total performance. Delusions and >hallucinations are not evident, and the disorder is less obviously >psychotic than the hebephrenic, paranoid, and catatonic subtypes of >schizophrenia. The characteristic "negative" features of residual >schizophrenia (e.g. blunting of affect, loss of volition) develop >without being preceded by any overt psychotic symptoms. With >increasing social impoverishment, vagrancy may ensue and the >individual may then become self-absorbed, idle, and aimless. > > > >Diagnostic Guidelines >Simple schizophrenia is a difficult diagnosis to make with any >confidence because it depends on establishing the slowly progressive >development of the characteristic "negative" symptoms of residual >schizophrenia without any history of hallucinations, delusions, or >other manifestations of an earlier psychotic episode, and with >significant changes in personal behaviour, manifest as a marked loss >of interest, idleness, and social withdrawal. > >Includes: >* schizophrenia simplex -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -------------------------------------------------------------------- mail2web - Check your email from the web at http://mail2web.com/ . 4321 From: David Alexander Date: Wed Dec 12, 2001 2:30am Subject: Re: your policy Jim I have no problem in 'slipping you a Franklin' if I use your material, but can you explain which banknote that is for us 'Johnny foreigners' thanks David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... From: Tech Sec Lab Date: Fri Dec 10, 2004 5:58pm Subject: SCIF Design In terms of SCIF design, can anyone shed some light on what steps can be taken to ensure max rf signal attenuation when windows have to be used in SCIF areas? In terms of working environments most people prefer to have some form of windows, makes for the more productive worker apparently! I'd welcome any information on construction and available products on or off list. Kind regards -Ois 10377 From: John Young Date: Fri Dec 10, 2004 9:30pm Subject: Re: SCIF Design Pilkington Architectural Glass offers shielding against EMR, though your SCIF requirements might exceed the product's capability. Multiple layers of the glass might be effective but glass edges and frames could be points of vulnerability: http://www.tempestusa.com/ Dontech Incorporated offers EMR/RF coatings for glass and wire mesh products: http://www.dontechinc.com For general discussions of architectural products and details for EM shielding here: "Data Security by Design:" http://cryptome.org/datasec.htm US Army Corps of Engineers, "Electromagnetic Pulse (EMP) and Tempest Protection for Facilities:" http://jya.com/emp.htm 10378 From: Michael Dever Date: Fri Dec 10, 2004 4:02pm Subject: Monkey Business Maybe trained monkeys are not that far fetched: http://www.abc.net.au/news/newsitems/200412/s1262628.htm Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Voice: (02) 6254 5337 Email: dca@b... This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 10379 From: James M. Atkinson Date: Fri Dec 10, 2004 7:43pm Subject: Re: SCIF Design Why would you put a window in a SCIF? It's like putting a window into a bank vault. -jma At 06:58 PM 12/10/2004, Tech Sec Lab wrote: >In terms of SCIF design, can anyone shed some light on what steps can be >taken to ensure max rf signal attenuation when windows have to be used in >SCIF areas? > >In terms of working environments most people prefer to have some form of >windows, makes for the more productive worker apparently! > >I'd welcome any information on construction and available products on or off >list. > >Kind regards > >-Ois ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10380 From: Paul Curtis Date: Fri Dec 10, 2004 10:19pm Subject: RE: Someone is dumping CCS stock again Jim, Unfortunate for whom? :) Paul Curtis -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Friday, December 10, 2004 13:38 To: TSCM-L Subject: [TSCM-L] Someone is dumping CCS stock again About 60 minutes ago someone started dumping CCS stock, again the stock price plummeted (again) to .20 They must be getting ready to disclose some more unfortunate news again. -jma ---------------------------------------------------------------------------- ------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10381 From: Mitch D Date: Sat Dec 11, 2004 1:12am Subject: Re: TSCM Dream Team --- "James M. Atkinson" wrote: > > Maybe the monkey could have a CCD video camera and IR > illuminator > surgically installed on his head. > > Do you think the monkey could attend West Point? > > Maybe the monkey could be taught to pick locks. > > > -jma absolutely Could also train him to write code for scanning software. ===== Mitch Davis TSCM/Special Operations Group Inc. Nashville,TN.USA MitchD@t... site:www.tscmusa.com. Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 __________________________________ Do you Yahoo!? Yahoo! Mail - now with 250MB free storage. Learn more. http://info.mail.yahoo.com/mail_250 10382 From: Eric Leonard Date: Sat Dec 11, 2004 0:23am Subject: Antennae matrix Hello all. I'm curious if anyone has devised a 'clean' matrix switching system for antennas, filters, preamplifiers, etc. Perhaps I need to improve my workflow, but I seem to spend an inordinate amount of time connecting, disconnecting, reconnecting... Thanks. Eric 10383 From: James M. Atkinson Date: Sat Dec 11, 2004 2:12am Subject: Re: TSCM Dream Team Mitch, If you can teach the monkey to run down to dunkin dounts and bring back a large coffe and some donuts I will buy several. -jma At 02:12 AM 12/11/2004, Mitch D wrote: >--- "James M. Atkinson" wrote: > > > > > Maybe the monkey could have a CCD video camera and IR > > illuminator > > surgically installed on his head. > > > > Do you think the monkey could attend West Point? > > > > Maybe the monkey could be taught to pick locks. > > > > > > -jma > >absolutely >Could also train him to write code for scanning software. > > > >===== > >Mitch Davis >TSCM/Special Operations Group Inc. >Nashville,TN.USA >MitchD@t... site:www.tscmusa.com. >Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10384 From: James M. Atkinson Date: Sat Dec 11, 2004 2:14am Subject: Re: Antennae matrix Erik, Yes, there are numerous systems that will do this for you, and will allow you operate the switched from your PC. You will have to specify the bandwidth of the switch, then the number of pole, the active number of circuits, and so on. Take a look as the switch boxes sold by Agilent, National Instruments, and so on. What kinds of things would you like the box to be able to do? -jma At 01:23 AM 12/11/2004, Eric Leonard wrote: >Hello all. > >I'm curious if anyone has devised a 'clean' matrix switching system >for antennas, filters, preamplifiers, etc. Perhaps I need to improve >my workflow, but I seem to spend an inordinate amount of time >connecting, disconnecting, reconnecting... > >Thanks. > >Eric > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10385 From: kondrak Date: Sat Dec 11, 2004 4:01am Subject: Re: Monkey Business OOoo! Basketball and a joke come to mind... At 17:02 12/10/2004, you wrote: >Maybe trained monkeys are not that far fetched: > >http://www.abc.net.au/news/newsitems/200412/s1262628.htm 10386 From: kondrak Date: Sat Dec 11, 2004 4:04am Subject: Re: SCIF Design Yeah, I was coming to say a plasma TV and a loop tape of outdoors will accomplish the same thing. Fine wire mesh in the glass comes to mind, as does metallic coatings, and burying the thing underground at about 60'. At 20:43 12/10/2004, you wrote: >Why would you put a window in a SCIF? > >It's like putting a window into a bank vault. > >-jma > > >At 06:58 PM 12/10/2004, Tech Sec Lab wrote: > > >In terms of SCIF design, can anyone shed some light on what steps can be > >taken to ensure max rf signal attenuation when windows have to be used in > >SCIF areas? > > > >In terms of working environments most people prefer to have some form of > >windows, makes for the more productive worker apparently! > > > >I'd welcome any information on construction and available products on or off > >list. > > > >Kind regards > > > >-Ois > > >----------------------------------------------------------------------------------------------------- > > >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >----------------------------------------------------------------------------------------------------- > > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >----------------------------------------------------------------------------------------------------- > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10387 From: Paul E. Niedermeyer Date: Sat Dec 11, 2004 3:18am Subject: RE: SCIF Design > A pre-condition of any SCIF state is that no windows > be present in the protected environment. As such, > I'm confused by the question as the inquiry begs the > following: What end-game is desired by the > installation? The only reasonable answer is to > create a gee-whiz room for investors or non- > technical personnel. > > Regards, > - Paul E. Niedermeyer > > --- "James M. Atkinson" wrote: > > --------------------------------- > > Why would you put a window in a SCIF? > > It's like putting a window into a bank vault. > > -jma > > At 06:58 PM 12/10/2004, Tech Sec Lab wrote: > > >In terms of SCIF design, can anyone shed some light > on what steps can be > >taken to ensure max rf signal attenuation when > windows have to be used in > >SCIF areas? > > > >In terms of working environments most people prefer > to have some form of > >windows, makes for the more productive worker > apparently! > > > >I'd welcome any information on construction and > available products on or off > >list. > > > >Kind regards > > > >-Ois 10388 From: J.A. Terranson Date: Sat Dec 11, 2004 9:01am Subject: Re: TSCM Dream Team On Fri, 10 Dec 2004, Mitch D wrote: > > Maybe the monkey could be taught to pick locks. > > > > > > -jma > > absolutely > Could also train him to write code for scanning software. But then he'd have to work for M$ - with the other monkeys... -- Yours, J.A. Terranson sysadmin@m... 0xBD4A95BF Civilization is in a tailspin - everything is backwards, everything is upside down- doctors destroy health, psychiatrists destroy minds, lawyers destroy justice, the major media destroy information, governments destroy freedom and religions destroy spirituality - yet it is claimed to be healthy, just, informed, free and spiritual. We live in a social system whose community, wealth, love and life is derived from alienation, poverty, self-hate and medical murder - yet we tell ourselves that it is biologically and ecologically sustainable. The Bush plan to screen whole US population for mental illness clearly indicates that mental illness starts at the top. Rev Dr Michael Ellner 10389 From: John Young Date: Sat Dec 11, 2004 1:22pm Subject: Re: RE: SCIF Design Some SCIFs do not require EMR protection, and the CIA SCIF spec describes how windows should be treated to prevent acoustical and visual observation (but does not cover EMR window protection: http://www.fas.org/irp/offdocs/dcid1-21.htm Presumably TEMPEST protection of SCIFs is a special requirement which is not as easily determined from public sources. Most often the requirement is handled by stating the TEMPEST officer shall approve measures to be taken. As with all TEMPEST a final test of the installation determines whether measures taken are sufficient. So hire one of those mysterious black officers and stand ready with a contingency budget for fine-grained and tarpaulin-covered remedial work. And expect regular return inspections, for most secure facilities spring leaks just when you thought you'd seen the end of them -- whether deliberately implanted or acts of gods. There are leakmeisters in every field, every ready to come in for a thorough overhaul of the porous layers of amateur professional pluggers who skinned you alive. What steamfitters don't know plumbers do, and what plumbers don't know roofers do, and what roofers don't know waterproofers do, and what none of them know is what moisture protection maestros sell for Giuliani Partners-grade snake oil, but that's cheap compared to military-grade black hole voodoo. 10390 From: kondrak Date: Sat Dec 11, 2004 0:06pm Subject: FYI: Mobile Radio Installation FYI: Reference material >Mobile Radio Installation > >Ford Motor Company vehicles are designed and tested for safe operation with >properly installed and properly used land mobile and amateur radio >communication equipment with up to 100 Watt transmitter power. Special >design considerations are incorporated into all Ford vehicle electronic >systems to provide immunity to radio frequency signals. To maintain >compatibility with these electronic systems, trained personnel must install >mobile two-way radio equipment properly. > >Ford has created guidelines for proper installation of this equipment, which >is available for download. > > >http://www.fordemc.com/ 10391 From: Tech Sec Lab Date: Sat Dec 11, 2004 0:17pm Subject: RE: SCIF Design I would tend to agree, however this is for a research area and the company feels that daylight is important to the added productivity of their researchers.... So, a compromise has to be found... Suggestions welcome...! -Ois PS. Jim, in this case it's not, secure data is stored in hardened safes, it's the equivalent of having windows in a bank, which is quite common, now why do you think that is!? ************** Message: 11 Date: Fri, 10 Dec 2004 20:43:36 -0500 From: "James M. Atkinson" Subject: Re: SCIF Design Why would you put a window in a SCIF? It's like putting a window into a bank vault. -jma 10392 From: Daryl Adams, CISSP Date: Sat Dec 11, 2004 0:58pm Subject: RE: SCIF Design Architectually speking; Plasma screen monitor projecting an image of the area on the other side of the wall or RF attenuated glass reflected around an RF corridor similiar to a tank periscope? Just thinking outside the box. >From: "Tech Sec Lab" >Reply-To: TSCM-L@yahoogroups.com >To: >Subject: [TSCM-L] SCIF Design >Date: Fri, 10 Dec 2004 23:58:36 -0000 >MIME-Version: 1.0 >X-Sender: tscmteam@o... >Received: from n21a.bulk.scd.yahoo.com ([66.94.237.50]) by >mc4-f40.hotmail.com with Microsoft SMTPSVC(5.0.2195.6824); Fri, 10 Dec 2004 >16:03:31 -0800 >Received: from [66.218.69.1] by n21.bulk.scd.yahoo.com with NNFMP; 10 Dec >2004 23:58:53 -0000 >Received: from [66.218.66.94] by mailer1.bulk.scd.yahoo.com with NNFMP; 10 >Dec 2004 23:58:53 -0000 >Received: (qmail 42387 invoked from network); 10 Dec 2004 23:58:52 -0000 >Received: from unknown (66.218.66.217) by m1.grp.scd.yahoo.com with QMQP; >10 Dec 2004 23:58:52 -0000 >Received: from unknown (HELO hostname.dreamlink001.net) (64.157.176.240) >by mta2.grp.scd.yahoo.com with SMTP; 10 Dec 2004 23:58:52 -0000 >Received: from [82.141.250.13] (helo=ocean)by hostname.dreamlink001.net >with esmtpa (Exim 4.43)id 1Ccuf0-0003CP-Qvfor TSCM-L@yahoogroups.com; Fri, >10 Dec 2004 18:58:55 -0500 >X-Message-Info: JGTYoYF78jGp2t5wC1m+M7Fe7IrpxNFO >X-Yahoo-Newman-Property: groups-email >X-Apparently-To: TSCM-L@yahoogroups.com >X-Mailer: Microsoft Office Outlook, Build 11.0.6353 >Thread-Index: AcTfFCl/w3CuNhy7QxmR2vMM5Y9a0w== >X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1441 >X-PopBeforeSMTPSenders: >tscmteam@o...,ygroups@o... >X-AntiAbuse: This header was added to track abuse, please include it with >any abuse report >X-AntiAbuse: Primary Hostname - hostname.dreamlink001.net >X-AntiAbuse: Original Domain - yahoogroups.com >X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12] >X-AntiAbuse: Sender Address Domain - ocean-research.net >X-Source: X-Source-Args: X-Source-Dir: X-eGroups-Remote-IP: 64.157.176.240 >X-Yahoo-Profile: secureoffice >Mailing-List: list TSCM-L@yahoogroups.com; contact >TSCM-L-owner@yahoogroups.com >Delivered-To: mailing list TSCM-L@yahoogroups.com >Precedence: bulk >List-Unsubscribe: >Return-Path: >sentto-49964-10857-1102723133-dary1_adams=hotmail.com@r... >X-OriginalArrivalTime: 11 Dec 2004 00:03:31.0367 (UTC) >FILETIME=[D971CB70:01C4DF14] > >In terms of SCIF design, can anyone shed some light on what steps can be >taken to ensure max rf signal attenuation when windows have to be used in >SCIF areas? > >In terms of working environments most people prefer to have some form of >windows, makes for the more productive worker apparently! > >I'd welcome any information on construction and available products on or >off >list. > >Kind regards > >-Ois > > 10393 From: Eric Leonard Date: Sat Dec 11, 2004 1:26pm Subject: Re: Antennae matrix One example: I have a series of narrow pass tunable filters for certain high-threat bands, but I can't quickly sweep the bands with my SA with the filters in-line. I'd like to have a switching matrix whereby the antenna is connected to a single point, the filters and preamps are connected, and I could quickly switch the rf path through and around the various devices. Another: I'd like to be able to quickly switch antennas feeding a Miniceptor - sometimes with extra filtering, sometimes not. Obviously, this gets very complicated and very large very quickly, but I think something like this would be most useful cruising through VHF/UHF with various antennae. It's probably too expensive for me to justify its acquisition, though (can't beat the price of playing musical connectors). While we're on the topic - has anyone had any experience with the antenna multicoupler systems offered by M/A Com and others? Items like these would be neccessary at the front end of my matrix mess. JMA - since you mentioned it - the NI SCXI-1191 does exactly what I'd like at a not-too-outrageous price - but the chassis needed to seat it seems awful big. Any experience with these? Insertion loss seems acceptable. Thanks. EL --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > Erik, > > Yes, there are numerous systems that will do this for you, and will allow > you operate the switched from your PC. > > You will have to specify the bandwidth of the switch, then the number of > pole, the active number of circuits, and so on. > > Take a look as the switch boxes sold by Agilent, National Instruments, and > so on. > > What kinds of things would you like the box to be able to do? > > -jma > > > > > At 01:23 AM 12/11/2004, Eric Leonard wrote: > > > > >Hello all. > > > >I'm curious if anyone has devised a 'clean' matrix switching system > >for antennas, filters, preamplifiers, etc. Perhaps I need to improve > >my workflow, but I seem to spend an inordinate amount of time > >connecting, disconnecting, reconnecting... > > > >Thanks. > > > >Eric > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > ----------------------------------------------------------------------------------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ----------------------------------------------------------------------------------------------------- > > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ----------------------------------------------------------------------------------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ----------------------------------------------------------------------------------------------------- 10394 From: Mitch D Date: Sat Dec 11, 2004 4:51pm Subject: Re: TSCM Dream Team --- "James M. Atkinson" wrote: > Mitch, > > If you can teach the monkey to run down to dunkin dounts and > bring back a > large coffe and some donuts I will buy several. > > -jma I can always signal 9 someone to do that ;) __________________________________ Do you Yahoo!? Yahoo! Mail - 250MB free storage. Do more. Manage less. http://info.mail.yahoo.com/mail_250 10395 From: moellerthy <1ach@g...> Date: Sat Dec 11, 2004 6:33pm Subject: BUGS, CAMERA'S, AND WIRETAPS Spying done against the everyday citizen and corporation has no limit. Spying is done by drug lords,neighbors,gov't,police,terrorists,PI's, friends and anybody that has the money to buy surveillance equipment. Anytime someone or some organization want's intelligence against another the act can be sucessfully completed in time with money and operative's. Tscm is usually carried out after a victim recognizes that they have circome to a surveillance act. Spying is done by trash trollers, conversationalist, electronic's, and what ever your routine leads to an opening for some person to take advantage. Turn caution to the wind with your eye's on the sails protect yourself. Happy Holidays From: Neptune Enterprise Security 1ach@G... 10396 From: James M. Atkinson Date: Sat Dec 11, 2004 9:21pm Subject: Re: Re: Antennae matrix Eric, You can either do it under complete computer control, under complete manual control, or a combination of both. If you go the computer only route you can get into some extraordinarily complex system, but I would caution you to use switches that are separate or removable from the controller instead of having them as integral to the controller. You will also need to be able to control two separate switches in parallel so they you can rotate filters into and out of the circuit. IF you want to get into some complex filtering then you will need to gang-up a number of these controlled relays into other controlled relays. You can also just use a manual switch and dial up what event connections you choose. -jma At 02:26 PM 12/11/2004, Eric Leonard wrote: >One example: I have a series of narrow pass tunable filters for >certain high-threat bands, but I can't quickly sweep the bands with my >SA with the filters in-line. I'd like to have a switching matrix >whereby the antenna is connected to a single point, the filters and >preamps are connected, and I could quickly switch the rf path through >and around the various devices. > >Another: I'd like to be able to quickly switch antennas feeding a >Miniceptor - sometimes with extra filtering, sometimes not. > >Obviously, this gets very complicated and very large very quickly, but >I think something like this would be most useful cruising through >VHF/UHF with various antennae. It's probably too expensive for me to >justify its acquisition, though (can't beat the price of playing >musical connectors). > >While we're on the topic - has anyone had any experience with the >antenna multicoupler systems offered by M/A Com and others? Items like >these would be neccessary at the front end of my matrix mess. > >JMA - since you mentioned it - the NI SCXI-1191 does exactly what I'd >like at a not-too-outrageous price - but the chassis needed to seat it >seems awful big. Any experience with these? Insertion loss seems >acceptable. > >Thanks. > >EL > > > > > >--- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > Erik, > > > > Yes, there are numerous systems that will do this for you, and will >allow > > you operate the switched from your PC. > > > > You will have to specify the bandwidth of the switch, then the >number of > > pole, the active number of circuits, and so on. > > > > Take a look as the switch boxes sold by Agilent, National >Instruments, and > > so on. > > > > What kinds of things would you like the box to be able to do? > > > > -jma > > > > > > > > > > At 01:23 AM 12/11/2004, Eric Leonard wrote: > > > > > > > > >Hello all. > > > > > >I'm curious if anyone has devised a 'clean' matrix switching system > > >for antennas, filters, preamplifiers, etc. Perhaps I need to improve > > >my workflow, but I seem to spend an inordinate amount of time > > >connecting, disconnecting, reconnecting... > > > > > >Thanks. > > > > > >Eric > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > the hands acquire shaking, the shaking is a warning. > > > It is by caffeine alone I set my mind in motion. > > >=================================================== TSKS > > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > >----------------------------------------------------------------------------------------------------- > > > > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > > >----------------------------------------------------------------------------------------------------- > > > > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 Web: >http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > > >----------------------------------------------------------------------------------------------------- > > > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > > >----------------------------------------------------------------------------------------------------- > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10397 From: Ramon Date: Sat Dec 11, 2004 7:02pm Subject: Cellphone sniffs out dirty bombs A smart phone that can detect radiation may soon be helping the police to find the raw materials for radioactive "dirty bombs" before they are deployed. The phones will glean data as the officers carrying them go about their daily business, and the information will be used to draw up maps of radiation that will expose illicit stores of nuclear material. The detector is the brainchild of engineers at the Lawrence Livermore National Laboratory (LLNL) in California, US, who developed it in response to the rise in illicit trafficking of radioactive materials (see graphic). Customs officers at ports and airports already wear pagers that detect radiation. But any radioactive material not picked up by border controls can be hidden in towns and cities, with little chance that it will be found. Now LLNL engineers funded by the US Department of Homeland Security have devised a way to tackle the problem. They have turned a multi-function internet cellphone into a wireless sensor that will feed data into a new type of radiation monitoring network that they are calling a RadNet. The phone transmits radiation readings continuously over an always-on internet connection to a central computer. A GPS receiver in the phone labels the data with a time and location, allowing it to be used to build up a radiation map of a particular area. Target price The challenge for the LLNL engineers was to devise a radiation sensor cheap enough to make the project viable. "It's relatively straightforward to make a $10,000 radiation detection device that works well," says project leader Bill Craig at LLNL's Radiation Detection Center. "But the target price of these units is $1000. That's the phone, the whole thing." Craig's team cut costs by compromising on the quality of the cadmium zinc telluride (CZT) semiconductor crystals that lie at the heart of the detectors. When a gamma-ray photon strikes the CZT it knocks a number of electrons out of position, producing a cascade of electron-hole pairs. A voltage applied across the crystal turns these into a current whose strength depends on the energy of the incident photons. This in turn allows the radionuclide that generated the gamma rays - caesium-137 or cobalt-60, for example - to be identified. LLNL's innovation has been to come up with a way to make CZT detectors using cheap crystals. These normally contain defects or impurities that make the radiation-induced current too noisy, faint and difficult to interpret. But Craig's group has found a way to use them. Reasonable sensitivity They divide the crystal into 64 separate sensing "pixels" in which each pixel acts as a detector on its own. They then simply discard the output from the 10% to 15% of pixels that do not work because of defects. The team has found that by using four of these crystals in each phone, they can achieve reasonable sensitivity. The team is aiming to produce a device that will run for at least a day on the phone's battery. They expect to begin field tests of prototypes within three months. The RadNet's ability to create a picture of the radiation environment across a wide area makes it a unique tool for security forces, says Rolf Arlt of the International Atomic Energy Agency in Vienna, Austria. "New detection devices are crucial to address the new challenges we face on an almost constant basis regarding weapons of mass destruction and non-proliferation issues," says Bryan Wilkes of the US National Nuclear Security Administration in Washington DC, US, which funded initial development of the RadNet phone. LLNL is hoping eventually to sign up a manufacturer to mass-produce the RadNet phones, and they could one day even be sold to members of the public. But as Simon Labov, head of LLNL's Radiation Detection Center warns, with both GPS and radiation sensors on board, RadNet phones will be a lot chunkier than the average cellphone. Original from: http://www.newscientist.com/news/news.jsp?id=ns99996766 10398 From: Shawn Hughes (Road) Date: Sun Dec 12, 2004 4:41am Subject: Re:SCIF construction I feel for you, Ois. You are in the position of telling the People That Control The Money that they can't have their cake and eat it, too. Every penetration into the protected space is a potential conduit for intercepting data and conducting business espionage. Camera systems with extremely long range and clarity are now within the buying power of small organizations. There's no way to visually attenuate those without making it nearly impossible to see out, RF and audio considerations aside. Have them determine what the potential loss of an idea or process is worth, versus the potential benefit of having windows. Especially if you are in an area with no decent view, or a dearth of inclement weather. There are solutions to the lack of view and available light that are being used with great success in enclosed buildings. The Japanese are masters at that nishin stuff. Good luck, let us know what you wound up doing..... -Shawn At 06:12 AM 12/12/04 +0000, you wrote: >I would tend to agree, however this is for a research area and the company >feels that daylight is important to the added productivity of their >researchers.... > >So, a compromise has to be found... > >Suggestions welcome...! > >-Ois 10399 From: kondrak Date: Sun Dec 12, 2004 6:01am Subject: IAEA Leader's Phone Tapped U.S. Pores Over Transcripts to Try to Oust Nuclear Chief http://www.washingtonpost.com/wp-dyn/articles/A57928-2004Dec11.html?nav=rss_nation The Bush administration has dozens of intercepts of Mohamed ElBaradei's phone calls with Iranian diplomats and is scrutinizing them in search of ammunition to oust him as director general of the International Atomic Energy Agency, according to three U.S. government officials. But the diplomatic offensive will not be easy. The administration has failed to come up with a candidate willing to oppose ElBaradei, who has run the agency since 1997, and there is disagreement among some senior officials over how hard to push for his removal, and what the diplomatic costs of a public campaign against him could be. 10400 From: contranl Date: Sun Dec 12, 2004 3:52pm Subject: Minicircuits new filters (usable for many things) . Minicircuits now have a new series of very small (SMD) rf-filters Their range now goes all the way up to 7000 mhz ! These filters come as very small SMD devices or as INLINE units with a connector on both sides. The are very very cheap...smd filters start at less then 2 US $ ! 2 type of filters are available: Low pass (cuts off everything above a certain frequency) High pass (cuts off everything below a certain frequency) By combining a higpass and a highpass filter you can make a bandpass filter ...just put a higpass and a lowpass in series and then you have a bandpass filter. By combining a lowpass and a highpass you can also make a notch-filter...such a filter does the opposite of a bandpass filter since it will notch-out (block) a certain frequency range Example: you need a bandpass filter that will only pass frequencies between let's say 1000 and 2000 mhz, you would then take a lowpass for 2000 mhz and connect it in series with a 1000 mhz highpass...that's all , it will cost you less then 5 US $ ! Very cheap and good since Minicircuits is good stuff. What can you do with these filters: 1)Make detectors that only detect certain frequencies by cutting out unwanted signals. 2)Have other wideband equipment only do certain frequency-ranges 3)Make amplifiers for only certain ranges. 4) Cut-out certain signals that you don't want cause they are not of interest or because they cause interference or overload (local transmitters like pager and cellphone base stations) 5)Increase the sensitivity of certain inquipment by narrowing down it's frequency range (frequency counter/analyzer/am-detector) for example a bandpassfilter from 400~500 mhz will make your frequency-counter several times more "sensitive" for that range even more when you add an amplifier (wich you could'nt do before since it would have overloaded the counter) 6)Improve the sensitivity/selectivity of receivers like scanners 7)Use various antennas and connect them all at the same time to just one receiver,each antenna is optimized for a certain frequency range, each antenna will have a bandpass-filter that goes with the antennas frequency range,like this you avoid that the antennas influence each other,you also avoid that signals null each other out since without the filters some freqeuncies would be received by all antennas. I have very good results with this trick and i have used it for example with a wideband radio-scanner that had only 1 antenna connector,like this i always have best reception at each frequency band,provided you put the corresponding filters in place. for example ant1=20~88 mhz , ant2=110~200 mhz , ant3=400~500 mhz 8)When used with transmitters you could avoid any harmonics. And so on Now this is nothing new and filters have been around for a long time...but since Minicircuits now have filters that go all the way up till 7000 mhz (instead of only 500 mhz before)they now are very suitable for TSCM purposes at very low cost. Check it out here: http://www.minicircuits.com/filter.html Greetings Tetrascanner www.tetrascanner.com 10401 From: Paolo Sfriso Date: Sun Dec 12, 2004 4:06pm Subject: Spyshop cheap ploy Dear Colleagues. Yesterday (Saturday 11 December) I was in London and, by pure chance (not far from the US Embassy), came across a "Spy Shop" (there are actually 2 different shops about 15 metres one from the other in the same road). While looking at their window, adorned with the usual 5000% markup trash, a young salesperson came out of the shop and asked me if I had a GSM cellphone on me. Curious to know where this would lead, I said yes so he hands me a handwritten note with a toll-free number claiming that if I called that number and spoke to whoever answered he could intercept my GSM cellphone and let me listen to a recording of the conversation. I then told this genius that if he was really able to intercept GSM phones, he should create a local cell and tell me my cellphone nr. and IMEI number. "Einstein's" answer was "what's an IMEI number" ?..... I then told him what I thought about him, his company, etc. etc. Have a nice week. Your Italian Connection. Paolo Sfriso CFE, CII Director Gruppo S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY Phone +39 0422 828517 Fax +39 0422 823224 24hr GSM Cell +39 335 5257308 www.grupposit.com paulsfriso@t... info@g... [Non-text portions of this message have been removed] 10402 From: James M. Atkinson Date: Mon Dec 13, 2004 1:17am Subject: Steve Wilson Update - Now is in a Mental Hosptital Over the past week Steve Wilson was transfer from Atlanta (where he spent the past few weeks, and had his first encounter with a real prison) to the BOP Transit Facility in Oklahoma (via Con Air) where he spend a few days before being transferred to the Psych Ward of the Lexington facility. He could have been attacked in Atlanta (the Aryan's and Pagan MC just had an incident there), or he may just of had a complete meltdown when he realized that his CIA buddies wer not coming to rescue him. Either way, he has not been committed to the Federal Medical Facility in Lexington. It should be interesting to see is he tries to escape to facility (many others have escaped this facility recently). Inmate Information for STEPHEN J WILSON Inmate Register Number : 20444-074 Name : STEPHEN J WILSON Age : 60 Race : WHITE Sex : MALE Projected Release Date : UNKNOWN Location : LEXINGTON FMC 3301 LEESTOWN ROAD LEXINGTON , KY 40511 Phone Number : (859)255-6812 ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10403 From: Date: Sun Dec 12, 2004 8:55pm Subject: Fwd: Re Miniocircuits Filter explanation David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom designed covert electronic audio and video devices. Sweep Services - Professional physical and Electronic countermeasures utilising state of the art laboratory radio scanning and detection equipment. Note: Any fellow WAPI and UKPIN members welcome to phone or call in to discuss projects and applications or simply for free advice. Workshop located alongside M58 junc 3. [Non-text portions of this message have been removed] 10404 From: Date: Sun Dec 12, 2004 9:12pm Subject: RE Minicircuits article by Tetrascanner Concratulations Tetrascanneron your small article re Minicircuits, precisely put. no BS.doesnt assume all readers are already experts,no unfathomable abbreviations,and very useful to the beginner this is what many people on this group are looking for I suspect Well Done David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) [Non-text portions of this message have been removed] 10405 From: Chad Margita Date: Sun Dec 12, 2004 10:14pm Subject: Re: Minicircuits new filters (usable for many things) Cheapest I've seen yet, thanks for the info! Chad ----- Original Message ----- From: "contranl" To: Sent: Sunday, December 12, 2004 4:52 PM Subject: [TSCM-L] Minicircuits new filters (usable for many things) > > > . > > > Minicircuits now have a new series of very small (SMD) rf-filters > > Their range now goes all the way up to 7000 mhz ! > > These filters come as very small SMD devices or as INLINE units > with a connector on both sides. > > The are very very cheap...smd filters start at less then 2 US $ ! > > 2 type of filters are available: > > Low pass (cuts off everything above a certain frequency) > High pass (cuts off everything below a certain frequency) > > By combining a higpass and a highpass filter you can make > a bandpass filter ...just put a higpass and a lowpass in series > and then you have a bandpass filter. > > By combining a lowpass and a highpass you can also make a > notch-filter...such a filter does the opposite of a bandpass filter > since it will notch-out (block) a certain frequency range > > Example: you need a bandpass filter that will only pass frequencies > between let's say 1000 and 2000 mhz, you would then take a > lowpass for 2000 mhz and connect it in series with a 1000 mhz > highpass...that's all , it will cost you less then 5 US $ ! > Very cheap and good since Minicircuits is good stuff. > > What can you do with these filters: > > 1)Make detectors that only detect certain frequencies by cutting > out unwanted signals. > > 2)Have other wideband equipment only do certain frequency-ranges > > 3)Make amplifiers for only certain ranges. > > 4) Cut-out certain signals that you don't want cause they are not of > interest or because they cause interference or overload > (local transmitters like pager and cellphone base stations) > > 5)Increase the sensitivity of certain inquipment by narrowing down > it's frequency range (frequency counter/analyzer/am-detector) > for example a bandpassfilter from 400~500 mhz will make your > frequency-counter several times more "sensitive" for that range > even more when you add an amplifier (wich you could'nt do before > since it would have overloaded the counter) > > 6)Improve the sensitivity/selectivity of receivers like scanners > > 7)Use various antennas and connect them all at the same time to just > one receiver,each antenna is optimized for a certain frequency range, > each antenna will have a bandpass-filter that goes with the antennas > frequency range,like this you avoid that the antennas influence each > other,you also avoid that signals null each other out since without > the filters some freqeuncies would be received by all antennas. > > I have very good results with this trick and i have used it for > example with a wideband radio-scanner that had only 1 antenna > connector,like this i always have best reception at each frequency > band,provided you put the corresponding filters in place. > for example ant1=20~88 mhz , ant2=110~200 mhz , ant3=400~500 mhz > > 8)When used with transmitters you could avoid any harmonics. > > And so on > > Now this is nothing new and filters have been around for a > long time...but since Minicircuits now have filters that go all the > way up till 7000 mhz (instead of only 500 mhz before)they now are > very suitable for TSCM purposes at very low cost. > > Check it out here: > > http://www.minicircuits.com/filter.html > > > Greetings > > Tetrascanner > www.tetrascanner.com > > > > > > > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > From: James M. Atkinson Date: Wed Dec 11, 2002 7:01am Subject: Diplomatic expulsions: Sophistication has increased since end of Cold War http://www.nationalpost.com/national/story.html?id=%7BA73A4C3D-2E55-48F4-9F2F-113F245610A9%7D Diplomatic expulsions: Sophistication has increased since end of Cold War December 11, 2002 National Post CANADA --The Cold War is over, but Russian spies have never worked harder in the West, gathering both military and diplomatic secrets. That's the view of some Russia observers who have been keenly watching the events of the last few weeks in which both Canada and Sweden have expelled Russian diplomats from their respective countries for alleged spying. "Just because the Cold War is over doesn't mean that there isn't a lot of spying going on," said Sean Maloney, professor of war studies at the Royal Military College in Kingston. "The Russians are playing the same games they always did, but now they are much more sophisticated." Last month, Canadian officials ordered the expulsion of two unnamed Russian diplomats, identified yesterday as military attachÈs, for "activities in Canada inconsistent with their diplomatic status" -- for alleged espionage. Last week, in a tit-for-tat move, Russia expelled two Canadian diplomats, also accusing them of being spies. One of the Canadians is Guillaume Siemienski, a first secretary based at the embassy who works for the Canadian International Development Agency. The other Canadian diplomat is one of two military attachÈs at the Moscow embassy. Vladimir Oshurkov, a Foreign Ministry spokesman for Russia, was quoted in Moscow yesterday as saying the two Canadian diplomats were asked to leave because of "activities incompatible with their diplomatic status." Both Canadians are considered "to be beyond reproach," said Kimberley Phillips, a spokeswoman for the Department of Foreign Affairs. Yesterday, Bill Graham, the Foreign Affairs Minister, tried to downplay the entire scandal, noting that following the expulsion of the two Canadians requested by the Russian government, he considers the matter closed. "The Cold War is over and we are no longer living in the climate of the Cold War," Mr. Graham said. "It is, rather, a climate in which we are instead co-operating with Russia in terms of NATO, their admission to NATO, and also anti-terrorism." But as far as spying goes, the Cold War may not be over, analysts say, adding that Canada's diplomatic contretemps comes just days after Sweden's own Russian espionage scandal. Last week, the Scandinavian country expelled two Russian diplomats for alleged industrial espionage at the telecom and defence giant Ericsson. Observers say the whole situation is drawing comparisons to Soviet-era foreign policy tactics in which Russia's secret service had undercover agents all over the Western world. The only difference now, analysts say, is that Russia's espionage activities may actually be much more pronounced than they were during the Cold War. "I think that there is more Russian spying going on now than during the Cold War," said Michael Ledeen, resident scholar at the American Enterprise Institute in Washington, who has written several books on international affairs and intelligence. "It's not just industrial espionage, but diplomatic as well." In November, Swedish police arrested three people on suspicion of supplying confidential documents to Russia at an Ericsson subsidiary plant. Although the company has not identified which documents were leaked, Reuters reported a senior source within the company said they did not appear to be linked to any military operations. Swedish journalists speculated the documents might be related to technology that controls telephone networks or the radar systems produced by Ericsson. In Canada, government officials would not comment on what kind of alleged espionage may have been committed by the two expelled Russian diplomats. "Both Canada and Sweden are advanced industrial countries, and both are allies of the United States," Mr. Ledeen said. "Both countries would offer Russians an important window into the United States. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 6634 From: James M. Atkinson Date: Wed Dec 11, 2002 7:04am Subject: US intelligence appeals court sanctions increased domestic spying US intelligence appeals court sanctions increased domestic spying By John Andrews 22 November 2002 http://www.wsws.org/articles/2002/nov2002/spy-n22.shtml Although it has been in existence for 25 years, the secret United States Foreign Intelligence Surveillance Court of Review, which consists of three semi-retired appeals court judges selected by Supreme Court Chief Justice William Rehnquist, issued its first-ever ruling on November 18, gutting a Watergate-era law intended to limit government wiretap surveillance within the US. Each of the three judges on the Court of Review was initially appointed to the federal judiciary by Ronald Reagan and has a well-documented right-wing history. The hearing was conducted in closed chambers on September 9. Only the Bush administration was allowed to appear and argue its side. The immediate impact of the November 18 ruling is to permit government agents to eavesdrop and search homes and offices simply by claiming that the information might relate to the activities of "agents of foreign powers"-regardless of whether criminal activity is involved-and to use the results in criminal prosecutions. Ordinarily in criminal cases, a search warrant based on probable cause to suspect illegal activity is required. The ruling is the latest in a series of government actions and court decisions since September 11, 2001 attacking democratic rights, expanding the police powers of the state, and paving the way for authoritarian rule in the US. Traditionally, the Fourth Amendment to the US Constitution's Bill of Rights bars police from eavesdropping on calls or searching premises without warrants, which require affidavits establishing probable cause. A judge must issue the warrant and limit its scope to the probable cause presented. Evidence obtained in violation of the Fourth Amendment is subject to the exclusionary rule, which prevents the use of illegally obtained evidence in criminal trials. Because of the November 18 decision, these basic rules no longer apply so long as the government uses intelligence gathering and counterterrorism as the justification for the wiretap or search. Congressional investigations triggered by the excesses of the Nixon administration culminated in the mid-1970s with revelations of widespread government spying on domestic political organizations and figures. In 1978 Congress, accepting the contention that some spying had to be carried out for national security regardless of criminal conduct, passed the Foreign Intelligence Surveillance Act (FISA), which prohibits government agents from wiretapping or searching under the guise of national security unless they first obtain an order from the secret "FISA Court." FISA applies a much lower legal standard than the Fourth Amendment warrant clause. Instead of probable cause relating to criminal activity, a surveillance order requires only a showing of reasonable suspicion that the target of the surveillance, who could be a US citizen or a foreign national, is an "agent of a foreign power." The definition of "foreign power" is not restricted to other nations, but includes "a group engaged in international terrorism or activities in preparation therefore," as well as "a foreign-based political organization, not substantially composed of United States persons." There was concern from the beginning that government agents would use FISA orders to circumvent the Fourth Amendment's warrant requirement by using foreign intelligence investigations as a pretext for gathering evidence for use in domestic criminal prosecutions. Accordingly, FISA required that intelligence gathering be the "primary purpose" of a FISA wiretap order. Prior administrations established a "wall" separating intelligence gathering from criminal prosecutions, and previous court decisions, including one from the conservative Fourth Circuit Court of Appeals, established that the Fourth Amendment required the "wall." These limitations were discarded by this week's ruling, leaving the field wide open for warrantless domestic wiretapping under the pretext of foreign intelligence gathering. The case began last May when the FBI in secret sought two wiretap orders from the FISA court. The contents of those applications are still secret, so the public remains unaware of the surveillance targets or reasons for the government's interest in them. The FISA court judges issued a confidential ruling denying the applications, and set out guidelines to separate intelligence gathering from criminal prosecutions. In its 25-year history, the FISA court has approved over 13,000 surveillance orders. There is no record of any other applications being refused. The written decision, which was signed by seven FISA judges, became public during Senate Judiciary Committee hearings last August, and its disclosure that the FBI lied on as many as 75 wiretap applications received widespread attention in the media. That decision also affirmed the requirement that FISA wiretap orders be primarily for foreign intelligence gathering, and it placed strict limitations on use of the information gathered "to enhance criminal prosecutions." The USA Patriot Act, which was rammed through Congress last year in the weeks following the September 11 attacks, replaced FISA's rule that foreign intelligence must be the "primary purpose" with a weaker standard, declaring that it must be "a significant purpose" of the spying. In this week's opinion reversing the lower FISA court decision, the Court of Review interpreted that provision to mean that foreign intelligence wiretapping is barred only when the "sole objective" is a criminal prosecution for "wholly unrelated ordinary crimes." The lower court's May ruling made clear that foreign intelligence probes could not be controlled by prosecutors. The Court of Review's decision reversed that rule as well, finding that FISA courts cannot delve into "the origins of an investigation, nor examination of the personnel involved." By limiting the amount of review the FISA court can exercise over surveillance order applications, the Court of Review transferred most of the discretion to authorize a search from the FISA court to the Department of Justice itself, a further erosion of the Constitution's checks and balances. An obviously elated Attorney General John Ashcroft hailed the decision, stating, "In intelligence, in counterintelligence and counterterrorism investigations, the court's ruling confirmed the Department of Justice's legal authority to integrate fully the functions of law enforcement and intelligence." The ruling was denounced by civil libertarians, such as Ann Beeson, an attorney for the American Civil Liberties Union (ACLU), who explained that the ruling means "the attorney general can suspend the ordinary requirements of the Fourth Amendment in order to listen in on phone calls, read emails, and conduct secret searches of Americans' homes and offices." The ruling "rolled back 25 years of precedent as to the proper boundaries between criminal investigation and foreign intelligence surveillance," according to Joshua Dratel of the National Association of Criminal Defense Lawyers (NACDL). Both the ACLU and the NACDL were allowed to file "friend of the court" briefs as Amicus Curiae, but only Theodore Olsen, the US Solicitor General, was permitted to argue before the Court of Review. Olsen, a founding member of the right-wing Federalist Society, played a major role in the political conspiracy by right-wing Republicans to destabilize the Clinton administration, culminating in the Paula Jones sexual harassment suit, the Kenneth Starr investigation and the impeachment and Senate trial of Clinton. ( See Behind the Clinton impeachment trial-Profile of a right-wing conspirator: The case of Theodore Olson) Olsen's last legal case before his current appointment was representing candidate George W. Bush before the US Supreme Court in the proceedings leading up to the High Court's infamous December 12, 2000 ruling that blocked the Florida vote recount and effectively installed Bush in the White House. The judges on the FISA Court of Review include Laurence Silberman of the Court of Appeals for the District of Columbia Circuit. A career Republican Party operative before his appointment by Reagan to the most powerful appellate court next to the Supreme Court, Silberman has been instrumental in numerous right-wing legal provocations over the last 20 years. With fellow DC appellate judge David Sentelle, himself a former aide to right-wing Republican Senator Jesse Helms, Silberman reversed the criminal convictions of Lt. Col. Oliver North and Admiral John Poindexter in 1990, thus scuttling the efforts of Special Prosecutor Lawrence Walsh to prosecute the key figures in the Iran-Contra scandal. Silberman and Sentelle were two of the three appellate judges responsible for installing Kenneth Starr as special prosecutor in 1994. Flipping 180 degrees on the powers of the special prosecutor, in 1998 Silberman penned a vitriolic opinion ordering secret service agents to cooperate with Starr in his witch-hunt over the Monica Lewinsky affair, writing that Clinton "has declared war on the United States." Ashcroft has already implemented plans to create a new FBI unit for seeking FISA surveillance orders, assigning a "special intelligence prosecutor" for every judicial district and developing a computer system to get rapid FISA court approval of wiretaps. Legal experts appear to agree that because the only party to the case is the government, there is no legal standing to appeal the November 18 decision to the US Supreme Court. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 6635 From: James M. Atkinson Date: Wed Dec 11, 2002 7:50am Subject: US accused of tampering with Iraq report [Bwahhh, Ha-Ha, Ha-Ha, Ha... score one point for the US intelligence services.. good show] -jma US accused of tampering with Iraq report Associated Press Globe & Mail Tuesday, December 10 - Online Edition, Posted at 5:38 PM EST Baghdad - The Iraqi government accused Washington on Tuesday of taking control of a UN master copy of Baghdad's arms declaration in order to tamper with it and create a pretext for war. In the United States, specialists at the CIA and other U.S. agencies began poring over the 12,000-page declaration, in which Baghdad is supposed to "tell all" about its chemical, biological and nuclear programs. American officials said much of the material appeared to be recycled versions of earlier documents. ∑ For more information, see Backgrounder: Iraq Meanwhile, inspectors stepped up their search Tuesday, fanning across Iraq on surprise missions to 13 sites, the largest number of inspections since the UN operation resumed two weeks ago. One team moved in on a uranium mining site 400 kilometres west of Baghdad. White House spokesman Ari Fleischer said the U.S. analysis of Iraq's declaration would be "deliberative" and "careful" in order to "understand what it is that Iraq is purporting to declare, as well as what they have failed to declare." Two copies of the Iraqi documents were delivered to UN headquarters in New York late Sunday, one to the Security Council and the other to the UN Monitoring, Verification and Inspection Commission. The complex declaration describes Iraq's former chemical, biological and nuclear weapons programs, and details hundreds of so-called dual-use sites in Iraq, whose products or equipment can be alternated between civilian and military uses. Around midnight Sunday, the council's lone copy left the building in U.S. hands, supposedly because only the U.S. government could photocopy thousands of pages in secure surroundings. The transfer, which occurred before any other governments could examine the Iraqi reports, had the approval of the council's current president, Ambassador Alfonso Valdivieso of Colombia. The master copy was in U.S. hands for most of Monday, before copies were distributed to other council members. Official Iraqi reaction was swift. "This is unprecedented extortion in the history of the United Nations, when it [the United States] forced the president of the Security Council to give it the original copy of Iraq's declaration," the Iraqi Foreign Ministry said in a statement faxed to news organizations. It accused Washington of "possibly forging what it wants to forge." "This American behaviour aims to play with the United Nations' documents with the aim of finding a cover for aggression against Iraq," it said. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 6636 From: James M. Atkinson Date: Wed Dec 11, 2002 7:52am Subject: Phone hackers discovered by system service business http://www.seacoastonline.com/news/rock/11292002/news/777.htm Phone hackers discovered by system service business By Jason Schreiber news@s... RAYMOND - A Raymond company has uncovered an unusual telephone-hacking scheme that could cost businesses big bucks when they get their phone bill. John Laurence, owner of Telephone Systems Consultation and Maintenance, said his company has discovered that hackers are breaking into business voice-mail systems to make long-distance calls and send numerical codes to the Philippines. Company technicians have spent the last few weeks helping businesses repair their voice-mail systems after they were hit. The phone systems being attacked are all a brand made by Panasonic, Laurence said. The problem was first discovered when Laurenceís company, which sells and installs telephone and voice-mail systems for businesses here and across the country, began receiving calls from clients reporting that their voice mail wasnít working properly. Some businesses have discovered problems when they attempt to retrieve messages but find their voice-mail is not accessible. After investigating the complaints, Laurence said his company found several cases where someone, presumably a hacker familiar with phone systems, managed to call businesses at night and alter their voice mail systems by creating a new mailbox that the person could then use to dial long-distance phone calls from an unknown location. Many of the bogus calls from business voice mail systems were made to the Philippines, Laurence said. Technicians havenít been able to trace the location where the calls from the hacker originated, nor do they know to whom the overseas numbers that were called belong. All of the long-distance calls are being billed to the affected businesses, said Laurence, who urged employees in charge of handling company phone bills to closely examine their bills. Some businesses may not be aware that their voice mail systems have been hacked into. "This could be happening to a lot of businesses across the country. This has happened to us several times over the past two weeks, so I can just imagine the volume of this that could be happening around the country," said Laurence, adding that companies should make sure that their phone systems are password-protected to make them less vulnerable. Laurenceís company has a customer base of 600 businesses in New England and 1,000 more in other parts of the country. He said customers as far west as California have reported problems with apparent voice-mail hacking. Chris Goodrow, a senior technician for the Raymond phone company, said the hackers have also found a way to change the voice-mail programming so that it can forward voice mail messages from the companyís system to the Philippines. For instance, he said some businesses have discovered strange voice mail messages that include what appear to be numerical codes followed by the voice of a person speaking just a few words in an unknown foreign language. EOS Research in Portsmouth is among the growing number of businesses attacked by the phone hackers. Ron Gehl, the companyís president, said the problem was detected when employees noticed that one of the companyís many phone lines appeared to be in use even though no one in the building was using that line. "Something was picking up the line and placing what seemed to be a brief call. After investigating, we found the voice mail was up to something. We unplugged the voice mail device and the problem seemed to go away," Gehl said. Technicians researched the problem and found that the voice mail system had been attacked. "Whoever hacked into it had established a new voice mail account which automatically was going out and repeatedly dialing long-distance numbers overseas and was transmitting numerical messages," Gehl said. Gehl said some of the voice mail box accounts were not protected by a password and he believes that was how the hacker was able to get into the system. Now, he said, all of the companyís voice mail accounts are password-protected. Businesses need to be aware of the problem before they become victims too, Gehl said. People usually try to make sure their computers are protected from hackers, Gehl said, but now they must worry about their phone system. "I would certainly recommend that folks consider this as a potential target of a hacker. It may not be the first thing that comes to mind. Hereís just another device thatís essentially opened to the outside world in some form or another," he said. "I would simply recommend people look into the security of what their current voice mail system is and if it appears there may be a way to break into it, there may be steps to additionally secure it." Authorities say itís the first time theyíve heard of such a phone-hacking scheme. Raymond Police Chief David Salois said that because the case involves several businesses in different states, the FBI would be an appropriate agency to launch an investigation. Salois said he put Laurence in touch with an FBI agent. "Iíve never heard a thing about it," said Mike Bahan, chief criminal investigator for the state attorney generalís office. Bahan referred calls on the matter to the FBI. While Laurenceís company is in Raymond, no crime has actually occurred in that town because the businesses hit by the hackers are located in other parts of the state and country. "A crime could be where the call originated from and also where the theft took place, in this place at the company. The theft would be considered the cost of the phone call," Salois said. Whether the case is ever prosecuted really depends on the dollar amount attached to the illegal long-distance calls, said Jay Grant, a spokesman for the FBIís Boston office. At this point no one knows the cost of all the calls made by the hackers through different businesses. Laurence pointed out that many companies do not know their voice mail was attacked until they receive their phone bill and find unusual long-distance calls. Laurence said he has wondered whether the calls are just a prank or somehow connected to terrorists. Grant quickly discounted that theory, saying the odds are slim that the calls to the Philippines could be tied to terrorism, even though there have been reports in recent months of increased terrorist activity in that country. After all, he said, most people who live in the Philippines arenít terrorists. Salois was not so quick to write off Laurenceís theory that the case could be linked to terrorism. "There is the potential. Not knowing and given the climate we live in Iíd say it should definitely be looked at," he said. Amanda Noonan, director of consumer affairs for the stateís Public Utilities Commission, said she also has never heard of a problem with hackers corrupting voice-mail systems. While the PUC does not investigate cases such as this, Noonan said, the agency will help those companies victimized by phone hackers. Noonan said the PUC would assist customers having trouble getting their long-distance phone carrier to take the illegal calls off their phone bill. "We will work with them and their phone company to get an adjustment made for their calls. I think we would be able to assist customers in that respect," she said. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6637 From: James M. Atkinson Date: Wed Dec 11, 2002 8:04am Subject: 'Culture of Theft' Reported at U.S. Nuclear Lab http://www.cantonrep.com/index.php?Category=23&ID=75201&r=0 'Culture of Theft' Reported at U.S. Nuclear Lab December 9, 2002 Los Angeles Times LOS ALAMOS, N.M. - A "culture of theft" at Los Alamos National Laboratory costs taxpayers millions of dollars each year and endangers national security, according to two investigators recently fired by the laboratory. Glenn A. Walp and Steven Doran, both former police officers, say they were recruited by Los Alamos officials earlier this year to investigate corruption at the lab, which houses the nation's nuclear secrets and monitors the quality of the nuclear arsenal. But after finding far more corruption than Los Alamos officials suspected - including hundreds of missing items that could prove valuable to terrorists or rogue nations - the investigators were handed identical letters of dismissal on Nov. 25 and escorted from the laboratory by armed guards. While becoming yet another embarrassment for the famously troubled laboratory, the firings have sparked outcries in Congress and conspiracy charges in the public. "They're going to rue the day they did this," said Pete Stockton, senior investigator with Project On Government Oversight, a nonprofit group that monitors waste and fraud in the federal government. "This ranks as one of the stupidest things I've ever seen an institution do." Laboratory officials say the investigators were fired because their overly aggressive tactics and combative attitude alienated workers. But the investigators contend they were fired because their bosses cared less about safeguarding one of the nation's most important scientific and military sites than about protecting the image of the University of California, which runs Los Alamos for the Department of Energy. Los Alamos officials acknowledge that the FBI and the Department of Energy are looking into several leads turned up by the fired investigators. Walp and Doran say those leads include glaring lapses in security - like one worker who tried to buy a $30,000 customized Ford Mustang with laboratory money, and another who used her laboratory credit card to get $2,500 in cash at a casino. University of California officials said Friday that they will urge the Energy Department to widen its inquiry into Los Alamos to include the firings. "We want them to address the assertion that (Walp and Doran) may have been fired in retaliation for (their) investigation," said Michael Reese, spokesman for UC President Richard Atkinson. Begin optional trim Home in the 1940s to the Manhattan Project, the nation's historic nuclear weapons program, Los Alamos has been sullied in recent years by a series of security breakdowns - including the disappearance in June 2000 of classified computer hard drives that later turned up behind a copy machine and the December 1999 indictment of Wen Ho Lee, a former lab scientist accused of leaking nuclear secrets to China. Although nearly all charges eventually were dropped against Lee, he was found to have removed secret data from the laboratory, a stunning breach. "Through the years there has been ingrained within the laboratory this culture of theft," said Walp, 61, former head of the Pennsylvania State Police who was hired to lead the internal security force at Los Alamos last January. "There is an attitude that (theft) is the price of doing business." Los Alamos workers joke about theft increasing around the holidays, Walp said, because some fill out their Christmas lists with big-ticket items from the lab. "The problem isn't with scientists," Walp said. "They're just there doing their jobs. It's the middle people." Soon after arriving at the laboratory, Walp wrote a damning report that estimated $3 million in equipment had been stolen since 1999. Among the missing items were more than 260 computers - some from the most sensitive areas of the laboratory, where nuclear weapons are designed. The report, Walp said, only served to irritate his bosses, who often told Walp that his first loyalty was to the University of California, not the U.S. taxpayer. Los Alamos spokesman Jim Danneskiold dismissed the charge that the facility is rife with corruption. "There is no culture of theft here," he said. "People do not walk out of here with property." Danneskiold said roughly one-tenth of 1 percent of the lab's $1 billion inventory disappears each year, far below the percentage that large retail stores deem acceptable. Many items that appear stolen, he said, are stored in some forgotten Quonset hut or World War II-era shed. Los Alamos has more than 2,000 buildings on its 40-square mile site, he said, and things get mislaid. However, he insisted, "there is no evidence that there is any classified information on computers reported as missing." Although Walp and Doran considered themselves investigators, Danneskiold said, they had no "investigatory powers" but were given the tasks of gathering information and acting as "liaisons with law enforcement." "The reason for terminating their employment was that they had lost the confidence of different officials they had to work with, both inside the laboratory and outside," Danneskiold said. Doran and Walp, however, said it was absurd to expect them to retain the confidence of workers they were questioning. "It's the most screwed-up system you ever saw in your life," said Doran, 39, whom Walp hired at the laboratory in July. "The fox is watching the chicken house." Doran also scoffed at the suggestion that missing items were merely "mislaid." "One of the missing items was a 2-ton magnet," he said. "How do you lose a 2-ton magnet?" The most shocking case of theft, Walp and Doran said, involved two workers with access to all top secret areas. The workers allegedly went on a brazen spree, using lab purchase orders to acquire hundreds of items - including spy gear, for reasons that remain unknown. "It's unbelievable," said Doran, a former Marine and ex-police chief in Idaho City, Idaho. "They bought camping equipment, backpacks, lock picks, beacons, radio equipment, high speed digital cameras, $9,000 worth of the best knives money can buy, tractors, lawn mowers, wood chippers, floor sanders, fencing, decks, carports, high-pressure washers, air conditioning units." Also, the two workers allegedly stole cryogenic freezers, which Doran said could be useful to anyone developing biological weapons. The two suspected workers have been placed on paid leave, Los Alamos officials said, while the FBI investigates. Doran called it unfair and insulting that workers suspected of felonies remain on paid leave, while he and Walp were summarily fired. Also, Doran said, both he and Walp received outstanding performance reviews just before being fired. Walp even got a $5,000 bonus. Both Walp and Doran have hired lawyers and may file a lawsuit. (Optional add end) Walp and Doran also may testify before Congress. A spokesman for the House Committee on Energy and Commerce said the firings have prompted grave concern among lawmakers, who likely will hold hearings soon and send a team of their own investigators to Los Alamos in the next few weeks. "For some time now the committee has been quietly looking into operations at Los Alamos," said Ken Johnson, spokesman for Rep. W.J. "Billy" Tauzin, R-La., the committee chairman. "But these dramatic new developments clearly warrant full-scale congressional investigation. "Frankly, the accusations are extraordinary, and we're determined to get to the bottom of this mess." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6638 From: Charles P. Date: Wed Dec 11, 2002 9:05am Subject: Re: Loony tunes That "no cell phones" decal might actually have some decent appllications. cp ----- Original Message ----- From: "William Knowles" To: "Steve Uhrig" ; Sent: Wednesday, December 11, 2002 2:39 AM Subject: Re: [TSCM-L] Loony tunes > On Tue, 10 Dec 2002, Steve Uhrig wrote: > > > A reminder of a good resource for those loony tune cases: > > > > http://zapatopi.net/afdb.html > > > > Bookmark it so you can refer lunatics who call to this site. > > Lately they have been coming out of the woodwork, I'm blaming it all > on the ScFi channel showing the UFO mini-series 'Taken' > > One more for the list... > > http://www.lessemf.com/personal.html > > My favorite on the page is the Faraday Canopy Kit for $299.00 > > Think of the $$$ we could rack in if these guys offered an > affiliates program! :) > > Cheers! > > William Knowles > wk@c... > > > > *==============================================================* > "Communications without intelligence is noise; Intelligence > without communications is irrelevant." Gen Alfred. M. Gray, USMC > ================================================================ > C4I.org - Computer Security, & Intelligence - http://www.c4i.org > *==============================================================* > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 6639 From: Charles P. Date: Wed Dec 11, 2002 9:21am Subject: Re: Phone hackers discovered by system service business As many of you know, these voicemail hacks have been going on for a few years. The main target of the Philippine hacker appears to be Panasonic KXT systems, since he must know them the best, but we found him in other systems as well. Panasonic notified all of their certified technicians of the problem about two years ago, yet he continues to operate. The same technique used by the Philippine hacker has also been employed by state-side vandals, forcing one of my clients' systems to call a 900 chat line regularly for two weeks. Passwords are the main defense to keep unauthorized persons out of a system but there are some other simple methods to prevent "damage". They involve programming the system toll restriction levels. If you have any clients with Panasonic KXT digital voicemail (KX-TVS-###) feel free to contact me for more information. Since it requires programming, it is recommended to be done by someone familiar with the system. Charles Charles Patterson Global Communications Tarrytown, NY charles@t... ----- Original Message ----- From: "James M. Atkinson" To: "TSCM-L Mailing List" Sent: Wednesday, December 11, 2002 8:52 AM Subject: [TSCM-L] Phone hackers discovered by system service business http://www.seacoastonline.com/news/rock/11292002/news/777.htm Phone hackers discovered by system service business By Jason Schreiber news@s... RAYMOND - A Raymond company has uncovered an unusual telephone-hacking scheme that could cost businesses big bucks when they get their phone bill. John Laurence, owner of Telephone Systems Consultation and Maintenance, said his company has discovered that hackers are breaking into business voice-mail systems to make long-distance calls and send numerical codes to the Philippines. Company technicians have spent the last few weeks helping businesses repair their voice-mail systems after they were hit. The phone systems being attacked are all a brand made by Panasonic, Laurence said. The problem was first discovered when Laurence's company, which sells and installs telephone and voice-mail systems for businesses here and across the country, began receiving calls from clients reporting that their voice mail wasn't working properly. Some businesses have discovered problems when they attempt to retrieve messages but find their voice-mail is not accessible. After investigating the complaints, Laurence said his company found several cases where someone, presumably a hacker familiar with phone systems, managed to call businesses at night and alter their voice mail systems by creating a new mailbox that the person could then use to dial long-distance phone calls from an unknown location. Many of the bogus calls from business voice mail systems were made to the Philippines, Laurence said. Technicians haven't been able to trace the location where the calls from the hacker originated, nor do they know to whom the overseas numbers that were called belong. All of the long-distance calls are being billed to the affected businesses, said Laurence, who urged employees in charge of handling company phone bills to closely examine their bills. Some businesses may not be aware that their voice mail systems have been hacked into. "This could be happening to a lot of businesses across the country. This has happened to us several times over the past two weeks, so I can just imagine the volume of this that could be happening around the country," said Laurence, adding that companies should make sure that their phone systems are password-protected to make them less vulnerable. Laurence's company has a customer base of 600 businesses in New England and 1,000 more in other parts of the country. He said customers as far west as California have reported problems with apparent voice-mail hacking. Chris Goodrow, a senior technician for the Raymond phone company, said the hackers have also found a way to change the voice-mail programming so that it can forward voice mail messages from the company's system to the Philippines. For instance, he said some businesses have discovered strange voice mail messages that include what appear to be numerical codes followed by the voice of a person speaking just a few words in an unknown foreign language. EOS Research in Portsmouth is among the growing number of businesses attacked by the phone hackers. Ron Gehl, the company's president, said the problem was detected when employees noticed that one of the company's many phone lines appeared to be in use even though no one in the building was using that line. "Something was picking up the line and placing what seemed to be a brief call. After investigating, we found the voice mail was up to something. We unplugged the voice mail device and the problem seemed to go away," Gehl said. Technicians researched the problem and found that the voice mail system had been attacked. "Whoever hacked into it had established a new voice mail account which automatically was going out and repeatedly dialing long-distance numbers overseas and was transmitting numerical messages," Gehl said. Gehl said some of the voice mail box accounts were not protected by a password and he believes that was how the hacker was able to get into the system. Now, he said, all of the company's voice mail accounts are password-protected. Businesses need to be aware of the problem before they become victims too, Gehl said. People usually try to make sure their computers are protected from hackers, Gehl said, but now they must worry about their phone system. "I would certainly recommend that folks consider this as a potential target of a hacker. It may not be the first thing that comes to mind. Here's just another device that's essentially opened to the outside world in some form or another," he said. "I would simply recommend people look into the security of what their current voice mail system is and if it appears there may be a way to break into it, there may be steps to additionally secure it." Authorities say it's the first time they've heard of such a phone-hacking scheme. Raymond Police Chief David Salois said that because the case involves several businesses in different states, the FBI would be an appropriate agency to launch an investigation. Salois said he put Laurence in touch with an FBI agent. "I've never heard a thing about it," said Mike Bahan, chief criminal investigator for the state attorney general's office. Bahan referred calls on the matter to the FBI. While Laurence's company is in Raymond, no crime has actually occurred in that town because the businesses hit by the hackers are located in other parts of the state and country. "A crime could be where the call originated from and also where the theft took place, in this place at the company. The theft would be considered the cost of the phone call," Salois said. Whether the case is ever prosecuted really depends on the dollar amount attached to the illegal long-distance calls, said Jay Grant, a spokesman for the FBI's Boston office. At this point no one knows the cost of all the calls made by the hackers through different businesses. Laurence pointed out that many companies do not know their voice mail was attacked until they receive their phone bill and find unusual long-distance calls. Laurence said he has wondered whether the calls are just a prank or somehow connected to terrorists. Grant quickly discounted that theory, saying the odds are slim that the calls to the Philippines could be tied to terrorism, even though there have been reports in recent months of increased terrorist activity in that country. After all, he said, most people who live in the Philippines aren't terrorists. Salois was not so quick to write off Laurence's theory that the case could be linked to terrorism. "There is the potential. Not knowing and given the climate we live in I'd say it should definitely be looked at," he said. Amanda Noonan, director of consumer affairs for the state's Public Utilities Commission, said she also has never heard of a problem with hackers corrupting voice-mail systems. While the PUC does not investigate cases such as this, Noonan said, the agency will help those companies victimized by phone hackers. Noonan said the PUC would assist customers having trouble getting their long-distance phone carrier to take the illegal calls off their phone bill. "We will work with them and their phone company to get an adjustment made for their calls. I think we would be able to assist customers in that respect," she said. -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- Vocatus atque non vocatus deus aderit ---------------------------------------------------------------------------- ---------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 6640 From: Kutlin, Josh Date: Tue Dec 10, 2002 10:54am Subject: Microwave tap? Can anyone recommend a company that sells a product specifically to tap a microwave signal? I need to identify the types of data going over it and send it to a remote computer. Thanks Josh Kutlin Sr. Security Engineer SAIC 6641 From: Date: Tue Dec 10, 2002 7:29am Subject: Pennsylvania Governor Schweiker Signs Bills Pennsylvania Governor Schweiker Signs Bills HARRISBURG, Pa., Dec. 10 /PRNewswire/ -- Pa. Gov. Mark Schweiker yesterday signed House Bill 592, which requires all supervising officers and teachers in charge of public, private or parochial schools to display the U.S. flag in every classroom during the school days and provides for the recitation of the Pledge of Allegiance or the signing of the National Anthem at the beginning of each school day. Under the bill, students may decline to pledge and may refrain from saluting the flag on the basis of religious conviction or personal belief. The legislation, sponsored by Rep. Allan Egolf (R- Cumberland/Franklin/Perry), passed the Senate unanimously and passed the House by a 200-1 vote. It takes effect in 60 days. Gov. Schweiker also signed the following bills into law: House Bill 152, sponsored by Rep. Richard Geist (R-Blair), revises PENNDOT's procedures regarding driver's licenses, commercial driver's licenses and hazmat licenses, bringing Pennsylvania law in line with provisions from the USA Patriot Act and other homeland-security initiatives. The bill also increases penalties against school bus drivers who drive, operate or physically control a school bus with any alcohol in his or her system. It also enables PENNDOT to penalize motorists who drive without insurance. The bill passed the Senate unanimously and the House by a 195-1 vote. The bill is generally effective in 60 days. House Bill 204, sponsored by Rep. Jess Stairs (R-Fayette/Westmoreland), provides for a State Report Card and for the collection of data and also provides for employment criminal background checks. The bill passed unanimously and takes effect immediately. House Bill 235, sponsored by Rep. Jess Stairs (R-Fayette/Westmoreland), creates a new right of action for the unauthorized use of name or likeness. Under the bill, any person whose name or likeness has commercial value and is used for any commercial or advertised purpose without the written consent of the person or the written consent of an authorized party may bring an action to enjoin the unauthorized use and to recover any damages for any loss or injury incurred as a result of the use. The legislation passed the Senate unanimously and passed the House by a 193-5 vote. It takes effect in 60 days. House Bill 401, sponsored by Rep. Timothy Solobay (D-Washington), allows insurance producers to now offer mine subsidence insurance coverage through the Department of Environmental Protection along with other insurance products. The bill passed unanimously and takes effect in 180 days. House Bill 851, sponsored by Rep. Alan Butkovitz (D-Philadelphia), amends the Notary Public Law to revise, change and consolidate the law regarding the appointment of notaries public for the Commonwealth of Pennsylvania. The bill passed the House by a 153-43 vote and the Senate by a 48-1 vote. It takes effect July 1, 2003. House Bill 974, sponsored by Rep. Connie Williams (D-Montgomery), amends the Child Labor Law to prohibit youth peddling except in limited circumstances. The bill passed unanimously and takes effect in 60 days. House Bill 976, sponsored by Rep. Dick Hess (Bedford/Fulton/Huntingdon), amends Title 18, further providing for theft of services; providing for rape, involuntary deviate sexual intercourse and aggravated indecent assault; providing for reporting criminal injuries; defining "suspected criminal activity" for purposes of wiretapping and electronic surveillance; and further providing for certain exceptions for orders authorizing interception of wire, electronic or oral communications for application for order and for emergency situations. The legislation passed the Senate unanimously and House by a 197-2 vote. It takes effect in 60 days. House Bill 1255, sponsored by Rep. Paul Costa (D-Allegheny), reenacts provisions for the disposal (including charitable donation) of unclaimed garments left for cleaning with a retail dry cleaner or retail launderer and not retrieved and paid for by the customer within 90 days of a date specified on a customer's receipt. The bill amends the act to include footwear and other items left with a shoe repairer. The legislation passed unanimously and takes effect in 60 days. House Bill 1696, sponsored by Rep. Gary Haluska (D-Cambria), amends the Conservation and Natural Resources Act to provide for the transfer of funds to provide grants for forestry research. The bill passed unanimously and takes effect immediately. House Bill 1742, sponsored by Rep. Art Hershey (R-Chester/Lancaster), amends the Veterinary Medicine Practice Act by making changes to the definitions of "veterinary college" and "practice of veterinary medicine." It adds new definitions for "veterinary technology," "certified veterinary technician," "veterinary assistant," and "veterinarian-client-patient relationship." The bill passed unanimously and takes effect in 60 days. House Bill 1804, sponsored by Rep. Roy Reinard (R-Bucks), provides for pooled trusts for persons with disabilities. The legislation passed the Senate unanimously and the House by a 195-1 vote. It takes effect in 90 days. House Bill 1900, sponsored by Rep. Timothy Solobay (D-Washington), excludes compensation to members of a reserve component of the armed forces during a state declared emergency, drill or instruction from unemployment compensation coverage. The exclusion is not applicable to active duty. The bill passed unanimously and takes effect in 60 days. House Bill 2055, sponsored by Rep. Bruce Smith (R-York), creates the Elder Care Payment Restitution Act. It also provides for the inventory of personal property and authorizes the storage of personal property by elder care facilities. The bill passed unanimously and takes effect in 60 days. House Bill 2070, sponsored by Rep. John Evans (R-Crawford/Erie), makes it an offense for a person to conceal or attempt to conceal a hypodermic needle on his/her person and intentionally or knowingly penetrates an officer or employee or a correctional institution, county jail or prison, detention facility or mental hospital, in addition to the current provisions which make it an offense to do so against a law-enforcement officer. The legislation also provides for the restoration of firearm rights for certain offenses under the old Vehicle Code and Penal Code of this Commonwealth. The bill passed the House unanimously and the Senate by a 45-3 vote. It takes effect in 60 days; provisions related to the restoration of firearm rights take effect immediately. House Bill 2131, sponsored by Rep. Stephen Maitland (R-Adams), provides that the proceeds from the sale of historic properties be credited to the Historic Preservation Fund. Under the law, the Pennsylvania Historical and Museum Commission will be responsible for the State Book Store. The legislation passed unanimously and takes effect immediately. House Bill 2183, sponsored by Rep. Alan Butkovitz (D-Philadelphia), authorizes collective bargaining between first-level supervisors and their public employers; provides for arbitration rather than striking to settle disputes; and requires compliance with collective bargaining agreement and findings of arbitrators. The bill passed the House by a 153-43 vote and the Senate by a 48-1 vote. It takes effect immediately. House Bill 2196, sponsored by Rep. Bob Allen (R-Schuylkill), establishes the Shaken Baby Syndrome Education Act within the Department of Health and requires the department to provide hospitals and birthing centers with educational information about Shaken Baby Syndrome. The legislation passed unanimously and takes effect in 90 days. House Bill 2256, sponsored by Rep. Lita Cohen (R-Montgomery), changes the education requirements for marriage and family therapists and professional counselors. The bill passed unanimously and takes effect immediately. House Bill 2296, sponsored by Rep. David Levdansky (D-Allegheny), designates 11 interchanges of the Mon/Fayette Expressway in recognition of Medal of Honor recipients and requires that the Pennsylvania Turnpike Commission erect appropriate signs at the interchanges. The bill also designated State Route 1011 in Clearfield, Cameron and Elk counties as the Quehanna Highway. The bill passed unanimously and takes effect immediately. House Bill 2350, sponsored by Rep. Jeff Coy (D-Cumberland/Franklin), amends the Public Eating and Drinking Place Law to require the Department of Agriculture to provide for the inspection of school cafeterias and for the training of school cafeteria personnel. The bill passed unanimously and takes effect in 60 days. House Bill 2411, sponsored by Rep. Lynn B. Herman (R-Centre), requires athlete agents to hold a certificate of registration issued by the State Athletic Commission and sets forth requirements and procedures to be followed in applying for and renewing a certificate. The bill passed the House by a 192-3 vote and passed the Senate unanimously. It takes effect in 60 days. House Bill 2424, sponsored by Rep. Merle Phillips (R-Northumberland), amends the Dual Party Relay Service and Telecommunication Device Distribution Program Act to include individuals with a disability that requires technology to independently access telecommunications services. The bill passed unanimously and takes effect in 60 days. House Bill 2444, sponsored by Rep. Ronald Miller (R-York), amends the Workers' Compensation Act by adding local coordinators of emergency management to the definition of "employe." The bill passed unanimously and takes effect in 60 days. House Bill 2445, sponsored by Rep. Wallis Brooks (R-Montgomery), establishes maximum sentences for violations of the Controlled Substance, Drug Device and Cosmetic Act involving the drug Ecstasy. It also provides for penalties related to cruelty to animals, by requiring the offender to pay restitution in the form of medical costs or replacement costs for injuries inflicted upon guide dogs for the hearing and visually impaired. The bill passed the House by a 200-1 vote and passed the Senate unanimously. It takes effect in 60 days. House Bill 2456, sponsored by Rep. Jerry Stern (R-Bedford/Blair), amends the Deputy Sheriff's Education and Training Act to increase the reimbursement level to counties for deputy sheriffs who participate and attend the education and training program from 50 percent to 100 percent of allowable tuition, living and travel expenses. The bill passed the House by a 194-1 vote and passed the Senate unanimously. It takes effect in 60 days. House Bill 2595, sponsored by Rep. John Pippy (R-Allegheny), permits individuals who become members of the county retirement fund to purchase military service credit. It also permits individuals employed by an authority created by the county on or after Feb. 14, 1950, under the Urban Redevelopment Law and who became a county employee on or before Jan. 1, 2001, to purchase county service credit for their service as an employee of the authority. The bill passed unanimously and takes effect in 60 days. House Bill 2599, sponsored by Rep. Bob Allen (R-Schuylkill), amends and modernizes the Motor Vehicle Sales Finance Act by authorizing the financing of costs and charges related and incidental to financing the sale of motor vehicles and provides the Department of Banking with expanded regulatory authority. The bill passed unanimously and takes effect in 90 days. House Bill 2644, sponsored by Rep. Jere Schuler (R-Lancaster), changes the status of Thaddeus Stevens State School of Technology to the Thaddeus Stevens College of Technology and providing it with greater autonomy by removing it from the organizational structure of the Department of Education. Under the bill, students who return to school from placement as a result of being an adjudicated delinquent or adjudged to have committed an adult crime must be placed in a transition center operated by the school district, and a transition plan for the student must be developed before the student may return to the regular classroom. The bill also recognizes sign-language courses as satisfying foreign-language requirements for high school graduation. The bill passed unanimously and takes effect immediately. House Bill 2725, sponsored by Rep. Fred Trello (D-Allegheny), designates various highways, roads and interchanges. The bill passed unanimously and takes effect in 60 days. House Bill 2842, sponsored by Rep. Russell Fairchild (R-Snyder/Union), amends Title 3 to authorize the Department of Agriculture to make payments to farmers for clean up and disposal costs incurred after Oct. 1, 2001, when the department issues a quarantine order or enters into a depopulation agreement with a farmer to control or contain a dangerous transmissible disease. The bill also provides for Cervidae livestock operations. The legislation passed the House unanimously and passed the Senate by a 46-2 vote. The legislation is generally effective immediately; the subchapter on Cervidae livestock operations is effect in 120 days. House Bill 2898, sponsored by Rep. Edward Staback (D-Lackawanna/Wayne), authorizes the Department of General Services, upon approval of the Governor and the Department of Corrections, to grant to Waymart Wind Farm L.P. a 50- year easement for an electric transmission line on a parcel of land in Canaan Township, Wayne County. The bill passed unanimously and is effective immediately. House Bill 2923, sponsored by Rep. Chris Ross (R-Chester), authorizes and directs the Department of General Services, upon approval of the Governor and the Department of Public Welfare, to grant and convey on behalf of the Commonwealth land in West Bradford Township, Chester County, to the Society for the Prevention of Cruelty to Animals of Chester County Inc. The legislation passed unanimously and takes effect immediately. House Bill 2924, sponsored by Rep. Chris Ross (R-Chester), authorizes and directs the Department of General Services, upon approval of the Governor and the Secretary of Public Welfare, to sell and convey on behalf of the Commonwealth to West Bradford Township, Chester County, a tract of land in the township. The land will be used for a wastewater spray irrigation system. The legislation passed unanimously and takes effect immediately. Senate Bill 14, sponsored by Sen. Edwin Holl (R-Montgomery), creates the Mortgage Satisfaction Act. The bill has two major purposes: (1) to provide a modern method of ensuring that mortgage satisfaction is done in a manner that provides both the lender and the borrower with the ability to ensure that mortgage satisfaction has been adequately filed; and (2) to provide alternative methods for satisfying a mortgage. The legislation passed the Senate unanimously and the House by a 199-1 vote. It takes effect in 60 days. Senate Bill 413, sponsored by Sen. Jake Corman (R-Centre), creates the Substance Abuse Education and Demand Reduction Fund and a new grant program to be administered by the Pennsylvania Commission on Crime and Delinquency. The legislation passed the House unanimously and the Senate by a 46-3 vote. It takes effect in 60 days. Senate Bill 460, sponsored by Sen. Hal Mowery (R-Cumberland), amends the Check Casher Licensing Act to provide an exemption from the act to retail stores that cash checks for a fee. The legislation passed unanimously and takes effect in 60 days. Senate Bill 463, sponsored by Sen. Richard Kasunic (D-Fayette), requires the Pennsylvania Fish and Boat Commission to establish a mandatory boater safety education program for boaters born on or before Jan. 1, 1982. The bill passed the Senate by a 48-1 vote and the House by a 170-24 vote. It takes effect in 60 days. Senate Bill 813, sponsored by Sen. Gibson Armstrong (R-Lancaster), amends the Workers' Compensation Act to make the 5-percent safety committee discount permanent. The legislation passed unanimously and takes effect immediately. Senate Bill 824, sponsored by Sen. Charles Lemmond (R-Pike), provides for compensation of county officers to further provide compensation of district election officers. It also further provides for the manner of applying to vote, provisional balloting, assistance in voting by certain absentee electors, canvassing of official absentee ballots and for enforcement. The legislation passed the Senate 48-1 and the House by a 190-7 vote. It generally takes effect in 60 days with some provisions taking effect immediately. Senate Bill 879, sponsored by Sen. Jane Earll (R-Erie), makes a surcharge imposed on and paid by a public utility recoverable by such means as approved by the Public Utility Commission. The bill passed the Senate unanimously and the House by a 169-28 vote. It takes effect in 60 days. Senate Bill 1179, sponsored by Sen. Gerald Lavalle (D-Beaver), authorizes and directs the Department of General Services to accept by donation certain lands and buildings in Ambridge, Beaver County. It also conveys land and buildings to Tinicum Township, Delaware County, for the maintenance and preservation of the premises as an historical park; land and buildings to Liberty Township, Bedford County, for the maintenance and preservation of the premises as an historical park; lands and buildings to Montgomery County; conveys the Thomas Hughes House to Greene County; and conveys the Hunter House to Northumberland County Historical Society. The bill passed the Senate unanimously and the House by a 192-2 vote. The Ambridge Borough provision takes effect in 60 days; the remainder of the bill takes effect immediately. Senate Bill 1290, sponsored by Sen. Tommy Tomlinson (R-Bucks), authorizes certain members of the Pennsylvania National Guard to operate state-owned vehicles for security purposes. The bill passed unanimously and takes effect immediately. Senate Bill 1222, sponsored by Sen. Stewart Greenleaf (R-Montgomery), expands and modernizes the authority of Pennsylvania state-chartered credit unions by granting them parity with federally chartered credit unions. The legislation passed unanimously and takes effect in 60 days. Senate Bill 1325, sponsored by Sen. Michael Waugh (D-York), creates a new chapter of Title 3 (Agriculture) to address animal exhibition sanitation. The legislation sets out sanitation standards for animal exhibitions, such as petting zoos, agricultural fairs or other events, where animals are on display for view and physical contact with humans and for which the owner advertises or charges and admission fee. The legislation passed unanimously and takes effect in 120 days. Senate Bill 1421, sponsored by Sen. Robert Jubelirer (R-Blair), protects the free exercise of religion and prescribes the conditions under which government may substantially burden a person's free exercise of religion. The legislation passed the Senate by a 46-3 vote and the House by a 171-21 vote. It takes effect immediately. Senate Bill 1452, sponsored by Sen. Stewart Greenleaf (R-Montgomery), makes omnibus amendments to Title 42 (Judiciary and Judicial Procedure), including adding judges in Bucks, Centre, Indiana, Mercer, Montgomery, Northampton, McKean and Monroe and Pike counties; granting juvenile probation officers greater search and seizure powers over juveniles under their supervision; and making conforming amendments to the Juvenile Act to bring Pennsylvania into compliance with the Federal Adoption and Safe Families Act of 1997 regulations. The legislation passed the Senate unanimously and the House by a 177-18 vote. It takes effect in 60 days. Senate Bill 1515, sponsored by Sen. Joe Conti (R-Bucks), amends the Pennsylvania Crimes Code to provide for two separate and distinct offenses of harassment and stalking. The legislation passed unanimously and takes effect in 60 days. Senate Bill 1576, sponsored by Sen. Jake Corman (R-Centre), authorizes and directs the Department of General Services to convey lands in Benner Township to Centre County. The proposed use of the property is for the Centre County prison and fire training facility. The legislation passed unanimously and takes effect immediately. CONTACT: Michael Lukens of the Pennsylvania Office of the Governor, +1-717-783-1116. MAKE YOUR OPINION COUNT - Click Here http://tbutton.prnewswire.com/prn/11690X56845066 SOURCE Pennsylvania Office of the Governor CO: Pennsylvania Office of the Governor ST: Pennsylvania SU: LEG http://www.prnewswire.com 12/10/2002 13:08 EST [Non-text portions of this message have been removed] 6642 From: James M. Atkinson Date: Thu Dec 12, 2002 11:19pm Subject: When Wimps Meet Warriors, Hot Air Rises Battle of the Elements When Wimps Meet Warriors, Hot Air Rises By Paul Farhi Washington Post Staff Writer Thursday, December 12, 2002; Page C01 http://www.washingtonpost.com/wp-dyn/articles/A42530-2002Dec11.html Identify yourself: Weather warrior or weather wimp? The wimp applauds the prudence of bureaucrats who close down schools and government offices hours before the Doppler radar detects a single flurry, or (like yesterday) before the thinnest wafer of ice forms. The wimp watches the Weather Channel incessantly, expectantly, fretfully. Sometimes he takes notes. The warrior exists primarily to belittle the wimp. The warrior sneers at the weather, and at the wimp's rueful contemplation of it. He or she is most likely a transplant from Milwaukee or Minneapolis or Cleveland or perhaps that epitome of manful winter-weather endurance, Buffalo. Places where they'll be gosh darned if a little 14-inch blizzard is going to disrupt their hearty Rust Belt way of life. The wimp drives a standard two-wheel-drive car but thinks seriously about buying a jacked-up 4WD Navigator for the three days of the year it might come in handy. The warrior is shopping for a new Harley. The wimp's motto is "Omigod." The warrior's is "Get over it." The wimp bundles up, wearing a parka over snow pants over flannel shirt, long johns and thermal undershirt, accessorizing with a ski cap and mittens, to take advantage of the insulating effects of "layering." The warrior debates whether to put on his flip-flops to shovel the driveway. Wimps rush to the store at the sight of the first flake to stock up on milk, bread, canned goods and toilet paper. Warriors go out in the middle of the storm because they've run out of beer. The wimp seeks a carefully plowed parking space, no matter how far from the destination. The warrior knows how to parallel-park in ice ruts and snowbanks. Wimp: Slush! Warrior: Mush! Wimps own snow blowers. Warriors own winches. The warrior will tell you stories about real weather, not this pale-imitation stuff. He'll remember the storms of his childhood, how the snows piled around him, how the frost snapped power lines and froze the pipes in his house. His is a tale of survival against the elements straight out of Tolstoy. Once the warrior starts in on this story, you'll want to shoot yourself. Or him. Alas, we are predominantly wimp in the Washington area. In fact, we are 82 percent wimp, with only an 18 percent chance of warrior. But our wimpiness isn't our fault. We have been trained to be this way. We can't help it. It's all the news media's fault. The media -- particularly television -- have all but erased the threshold of rational weather evaluation and reaction. In the run-for-your-lives coverage accorded even a rumor of snow, we are presumed wimpy, all the time. And so we have become the reflection of a fevered weather map. Channel 5, among others, went into full Armageddon mode the night before Wednesday's ice storm, offering multiple reports of impending doom. Among the station's "coping" suggestions: Wear rubber-soled shoes and "bend your knees" when walking on icy patches. (What next? To avoid getting wet in the rain, carry an umbrella?) Channel 4 reporter Darcy Spencer offered irrefutable evidence yesterday morning of something that was obvious to anyone with a window. Standing at a gas station in Frederick, Spencer held up a piece of sheet ice to the camera as if it were a rare dinosaur bone. The blizzard of excessive media attention triggers a sustained wimp response, which makes a region-wide shutdown all but inevitable. First comes the coverage. Then, media-conscious law enforcement officials get with the program, advising everyone to exercise caution (considering the alternative, why not?). Soon, school and government officials get the message and announce that they're rolling up their sidewalks (woe to the bureaucrat who defies the prevailing close-ocracy!). Next, the media report the school closings . . . and the circle is complete. But some bravely resist. On Channel 4 yesterday morning, reporter Brian Mooar retailed the horrors of downed trees, iced-over power lines, the travails of a morning commute from Winchester, Va. "It's been very trying, very wet, very slippery," reported Mooar. "You name it, it's been very tough for folks who've been out on the road this morning." Mooar then moved in to interview an unidentified commuter sitting in her car. "How was your drive this morning?" he asked. "It was okay this morning. A little wet. It's mostly wet," she replied cheerfully. "Okay?" asked an incredulous Mooar. "A little wet? . . . You're getting around okay?" "Yeah, I made it okay," she replied. "Where are you from originally?" Mooar asked. "I'm from northern Pennsylvania," she said. "So this is normal weather?" "Yeah, this is normal weather. I'm used to driving in this." This is what happens when two fronts collide. When wimps and warriors get together, count on a disturbance in the atmosphere. © 2002 The Washington Post Company -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6643 From: Kutlin, Josh Date: Thu Dec 12, 2002 6:54am Subject: RE: Microwave tap? Please use anti-virus!!! To all others, the attachment in this thread has a virus on it. Do not open it, if you did use an anti virus to clean your system. Josh Kutlin Sr. Security Engineer SAIC -----Original Message----- From: Kutlin, Josh [mailto:KutlinJ@S...] Sent: Tuesday, December 10, 2002 11:54 AM To: TSCM-L Mailing List Subject: [TSCM-L] Microwave tap? Can anyone recommend a company that sells a product specifically to tap a microwave signal? I need to identify the types of data going over it and send it to a remote computer. Thanks Josh Kutlin Sr. Security Engineer SAIC ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6644 From: Steve Uhrig Date: Fri Dec 13, 2002 9:06am Subject: RE: Microwave tap / Virus? On 12 Dec 2002 at 7:54, Kutlin, Josh wrote: > Please use anti-virus!!! > To all others, the attachment in this thread has a virus on it. Do not > open it, if you did use an anti virus to clean your system. This list does not pass attachments. If you got a virus, it wasn't from any message disseminated on this list. Anyone naive enough to send an attachment, deliberately or inadvertently, to this list will have it stripped off and a tag appended to the distribution version indicating an attachment was removed. The people who run this list know better than to allow attachments. However, you are absolutely right. Anyone not running antivirus and updating the definitions several times a week is playing Russian Roulette with an automatic. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6645 From: A Grudko Date: Sun Dec 15, 2002 8:07pm Subject: Alinco DR150 manual? Anyone out there familiar with the Alinco DR150? It's about 9 years old I can't find my manual, the dealer I got it from is out of business and it's the only manual not on the Arlinco site!!! I think I have a simple programing problem. Private replies pls. to Andy Grudko andy@g... South Africa ZR6UU ZRAJ7795 G8RXE 6646 From: Paolo Sfriso Date: Mon Dec 16, 2002 2:30am Subject: Remedy for wierd clients Dear Colleagues. I recently stumbled across a market stand selling the following "piece of equipment": http://www.orgasmatron.com.au/frameset.htm It might be of use for those clients with cranial impalanted bugs by the NSA, Aliens from outer space, etc. etc. Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 6647 From: Steve Uhrig Date: Tue Dec 17, 2002 7:27pm Subject: Caution about ebay Avcom There is an Avcom PSA-65C on ebay closing tomorrow evening. I believe I know this unit, and it has been dropped, suffered fairly serious physical damage, and is not working. If you were thinking about bidding on it, I'd ask some pointed questions of the seller and get some sort of guarantee. You can see the physical damage in the photo along the top and upper right corner, and no trace on the CRT. That should tell you something. I do not know the seller, but he has excellent feedback. The unit is being sold as is. It would not be a good investment at any price. Avcom service is expensive. Use your discretion. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6648 From: Hawkspirit Date: Thu Dec 19, 2002 1:08pm Subject: Ebay Unitel 121 Surveillance VHF receiver Item # 1946101291 6649 From: Kutlin, Josh Date: Fri Dec 13, 2002 8:19am Subject: RE: When Wimps Meet Warriors, Hot Air Rises "It's amusing to see who doesn't show up for work when the weather is bad. It's usually the people we could do without any day" Andy Rooney Josh Kutlin Sr. Security Engineer SAIC -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Friday, December 13, 2002 12:20 AM To: TSCM-L Mailing List Subject: [TSCM-L] When Wimps Meet Warriors, Hot Air Rises Battle of the Elements When Wimps Meet Warriors, Hot Air Rises By Paul Farhi Washington Post Staff Writer Thursday, December 12, 2002; Page C01 http://www.washingtonpost.com/wp-dyn/articles/A42530-2002Dec11.html Identify yourself: Weather warrior or weather wimp? The wimp applauds the prudence of bureaucrats who close down schools and government offices hours before the Doppler radar detects a single flurry, or (like yesterday) before the thinnest wafer of ice forms. The wimp watches the Weather Channel incessantly, expectantly, fretfully. Sometimes he takes notes. The warrior exists primarily to belittle the wimp. The warrior sneers at the weather, and at the wimp's rueful contemplation of it. He or she is most likely a transplant from Milwaukee or Minneapolis or Cleveland or perhaps that epitome of manful winter-weather endurance, Buffalo. Places where they'll be gosh darned if a little 14-inch blizzard is going to disrupt their hearty Rust Belt way of life. The wimp drives a standard two-wheel-drive car but thinks seriously about buying a jacked-up 4WD Navigator for the three days of the year it might come in handy. The warrior is shopping for a new Harley. The wimp's motto is "Omigod." The warrior's is "Get over it." The wimp bundles up, wearing a parka over snow pants over flannel shirt, long johns and thermal undershirt, accessorizing with a ski cap and mittens, to take advantage of the insulating effects of "layering." The warrior debates whether to put on his flip-flops to shovel the driveway. Wimps rush to the store at the sight of the first flake to stock up on milk, bread, canned goods and toilet paper. Warriors go out in the middle of the storm because they've run out of beer. The wimp seeks a carefully plowed parking space, no matter how far from the destination. The warrior knows how to parallel-park in ice ruts and snowbanks. Wimp: Slush! Warrior: Mush! Wimps own snow blowers. Warriors own winches. The warrior will tell you stories about real weather, not this pale-imitation stuff. He'll remember the storms of his childhood, how the snows piled around him, how the frost snapped power lines and froze the pipes in his house. His is a tale of survival against the elements straight out of Tolstoy. Once the warrior starts in on this story, you'll want to shoot yourself. Or him. Alas, we are predominantly wimp in the Washington area. In fact, we are 82 percent wimp, with only an 18 percent chance of warrior. But our wimpiness isn't our fault. We have been trained to be this way. We can't help it. It's all the news media's fault. The media -- particularly television -- have all but erased the threshold of rational weather evaluation and reaction. In the run-for-your-lives coverage accorded even a rumor of snow, we are presumed wimpy, all the time. And so we have become the reflection of a fevered weather map. Channel 5, among others, went into full Armageddon mode the night before Wednesday's ice storm, offering multiple reports of impending doom. Among the station's "coping" suggestions: Wear rubber-soled shoes and "bend your knees" when walking on icy patches. (What next? To avoid getting wet in the rain, carry an umbrella?) Channel 4 reporter Darcy Spencer offered irrefutable evidence yesterday morning of something that was obvious to anyone with a window. Standing at a gas station in Frederick, Spencer held up a piece of sheet ice to the camera as if it were a rare dinosaur bone. The blizzard of excessive media attention triggers a sustained wimp response, which makes a region-wide shutdown all but inevitable. First comes the coverage. Then, media-conscious law enforcement officials get with the program, advising everyone to exercise caution (considering the alternative, why not?). Soon, school and government officials get the message and announce that they're rolling up their sidewalks (woe to the bureaucrat who defies the prevailing close-ocracy!). Next, the media report the school closings . . . and the circle is complete. But some bravely resist. On Channel 4 yesterday morning, reporter Brian Mooar retailed the horrors of downed trees, iced-over power lines, the travails of a morning commute from Winchester, Va. "It's been very trying, very wet, very slippery," reported Mooar. "You name it, it's been very tough for folks who've been out on the road this morning." Mooar then moved in to interview an unidentified commuter sitting in her car. "How was your drive this morning?" he asked. "It was okay this morning. A little wet. It's mostly wet," she replied cheerfully. "Okay?" asked an incredulous Mooar. "A little wet? . . . You're getting around okay?" "Yeah, I made it okay," she replied. "Where are you from originally?" Mooar asked. "I'm from northern Pennsylvania," she said. "So this is normal weather?" "Yeah, this is normal weather. I'm used to driving in this." This is what happens when two fronts collide. When wimps and warriors get together, count on a disturbance in the atmosphere. © 2002 The Washington Post Company -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- Vocatus atque non vocatus deus aderit ---------------------------------------------------------------------------- ---------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6650 From: Date: Fri Dec 13, 2002 8:44am Subject: Rejection lines might be more valuable than ANI / ANAC Rejection line: If you are a woman/man and are constantly approached by unattractive or undesirable women/men asking for your phone number, give them one of these numbers: DC: 202-452-7468 Seattle: 206-781-3928 New York City: 212-479-7990 Los Angeles: 310-217-7638 San Francisco: 415-356-9833 Atlanta: 770-908-7383 Chicago: 773-509-5096 [Non-text portions of this message have been removed] 6651 From: private investigations Date: Fri Dec 13, 2002 4:33pm Subject: Fw: italian investigator Alberto Biancofiore Radar Detectives Agency Scali del Corso n.5 57123 Livorno - Italy International Investigations Marine Investigations Security consultant www.radardetectives.com f.ferro1@v... Tel + 39 0586 219094 License Number 1575/II sett. Livorno Prefecture ----- Original Message ----- From: "private investigations" To: Sent: Friday, December 13, 2002 11:29 PM Subject: Fw: italian investigator > No reply about my question ! > I think I am losing my time. > Nobody answer to my question. > I think this is not a positive thing. > What about this TSCM group. > > Alberto Biancofiore > Radar Detectives Agency > Scali del Corso n.5 > 57123 Livorno - Italy > International Investigations > Marine Investigations > Security consultant > www.radardetectives.com > f.ferro1@v... > Tel + 39 0586 219094 > License Number 1575/II sett. > Livorno Prefecture > > ----- Original Message ----- > From: "private investigations" > To: > Sent: Friday, December 13, 2002 12:21 AM > Subject: italian investigator > > > > > > > > > > > > I have joined this group. > > > > > I have sent 3 email about cpm 700 at jmatk@tscm.com > > > without reply. Is it right this ? > > > I need to buy a CPM 700 and I have asked for news about this instrument > > and firms where I can buy it. > > I would like to have an estimate cost. > > All the best > > Alberto > > > > > > > > > > > Alberto Biancofiore > > > Radar Detectives Agency > > > Scali del Corso n.5 > > > 57123 Livorno - Italy > > > International Investigations > > > Marine Investigations > > > Security consultant > > > www.radardetectives.com > > > f.ferro1@v... > > > Tel + 39 0586 219094 > > > License Number 1575/II sett. > > > Livorno Prefecture > > > > > > ----- Original Message ----- > > > From: "TSCM-L Moderator" > > > To: > > > Sent: Sunday, December 01, 2002 5:14 PM > > > Subject: File - mission.txt > > > > > > > > > > > > > > TSCM-L Technical Security Mailing List > > > > > > > > Dedicated to TSCM specialists engaging in expert technical and > > analytical > > > research for the detection, nullification, and isolation of > eavesdropping > > > devices, wiretaps, bugging devices, technical surveillance penetrations, > > > technical surveillance hazards, and physical security weaknesses. This > > also > > > includes bug detection, bug sweep, and wiretap detection services. > > > > > > > > Special emphasis is given to detecting and countering espionage and > > other > > > threats and activities directed by foreign intelligence services against > > the > > > United States Government, United States corporations, establishments, > and > > > citizens. > > > > > > > > The list includes technical discussion regarding the design and > > > construction of SCIF facilities, Black Chambers, and Screen Rooms. This > > list > > > is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 > compliance. > > > > > > > > The primary goal and mission of this list is to "raise the bar" and > > > increase the level of professionalism present within the TSCM business. > > > > > > > > The secondary goal of this list is to increase the quality and > > > effectiveness of our efforts so that we give spies and eavesdroppers no > > > quarter, and to neutralize all of their espionage efforts. > > > > > > > > This mailing list is moderated by James M. Atkinson and sponsored by > > > Granite Island Group as a public service to the TSCM, Counter > > Intelligence, > > > and technical security community. > > > > > > > > > > > > > > 6652 From: AccessOneNetworkNorthwest AONNRecords Date: Sat Dec 14, 2002 4:30am Subject: Kind intro Greetings TSCM: It has been recommended that I introduce myself to the group, thus I shall. By the way, thank you for letting me join. In brief, my name is Straum Lanham and I am a science and tech (S&T) analyst for AONN DSI. I've been with the Network since 2000, was transferred from an extended overseas Naval communications assignment, have roughly two years of (EE) Electronics Engineering experience and have operated within various capacities of the field of HUMINT. In terms of R&R, I rather enjoy hiking, sport shooting and European lit. Regards, SKL __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6653 From: private investigations Date: Sat Dec 14, 2002 6:11pm Subject: Fw: File - mission.txt Alberto Biancofiore Radar Detectives Agency Scali del Corso n.5 57123 Livorno - Italy International Investigations Marine Investigations Security consultant www.radardetectives.com f.ferro1@v... Tel + 39 0586 219094 License Number 1575/II sett. Livorno Prefecture ----- Original Message ----- From: "private investigations" To: "TSCM-L Moderator" Sent: Wednesday, December 11, 2002 11:32 PM Subject: Re: File - mission.txt > I have sent 3 email about cpm 700 at jmatk@tscm.com > without reply. Is it right this ? > I need to buy a CPM 700. > > > Alberto Biancofiore > Radar Detectives Agency > Scali del Corso n.5 > 57123 Livorno - Italy > International Investigations > Marine Investigations > Security consultant > www.radardetectives.com > f.ferro1@v... > Tel + 39 0586 219094 > License Number 1575/II sett. > Livorno Prefecture > > ----- Original Message ----- > From: "TSCM-L Moderator" > To: > Sent: Sunday, December 01, 2002 5:14 PM > Subject: File - mission.txt > > > > > > TSCM-L Technical Security Mailing List > > > > Dedicated to TSCM specialists engaging in expert technical and analytical > research for the detection, nullification, and isolation of eavesdropping > devices, wiretaps, bugging devices, technical surveillance penetrations, > technical surveillance hazards, and physical security weaknesses. This also > includes bug detection, bug sweep, and wiretap detection services. > > > > Special emphasis is given to detecting and countering espionage and other > threats and activities directed by foreign intelligence services against the > United States Government, United States corporations, establishments, and > citizens. > > > > The list includes technical discussion regarding the design and > construction of SCIF facilities, Black Chambers, and Screen Rooms. This list > is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. > > > > The primary goal and mission of this list is to "raise the bar" and > increase the level of professionalism present within the TSCM business. > > > > The secondary goal of this list is to increase the quality and > effectiveness of our efforts so that we give spies and eavesdroppers no > quarter, and to neutralize all of their espionage efforts. > > > > This mailing list is moderated by James M. Atkinson and sponsored by > Granite Island Group as a public service to the TSCM, Counter Intelligence, > and technical security community. > > > > > 6654 From: frost_bitten_ca Date: Mon Dec 16, 2002 4:43pm Subject: More whacky shyte from frost bitten funky town ... When they start sounding like this, it's usually time to take a walk into the blizzard. Counter intelligence reports some heavy weather coming soon. JV --- RCMP asked to consider charging Ahenakew over Hitler remarks Last Updated Mon, 16 Dec 2002 17:32:40 SASKATOON - The attorney general of Saskatchewan is asking the RCMP to consider hate crime charges against David Ahenakew for anti-Jewish comments he made last week. Chris Axworthy told reporters on Monday afternoon that Ahenakew's comments constitute a "prima facie" offence. David Ahenakew Last week, Ahenakew told a reporter he believes Adolf Hitler was right to "fry" six million Jews during the Second World War, saying Hitler was trying to "clean up the world." Premier Lorne Calvert called on Ahenakew, a former chief of the Federation of Saskatchewan Indian Nations (FSIN), to apologize. "These remarks (are) very offensive and totally inappropriate," Calvert said. Ahenakew, currently an FSIN senator, admitted he made the comments, but said they were "exaggerated." FSIN chief Perry Bellegarde called Ahenakew's comments surprising and upsetting, especially because First Nations people who attended residential schools consider themselves the survivors of genocide. Bellegarde said he still considers Ahenakew a respected elder, but that he was not speaking on behalf of the federation. Bellegarde told CBC Newsworld that Ahenakew should be removed from his post as head of the FSIN senate. There was also a quick reaction from Matthew Coon Come, national chief of the Assembly of First Nations. "We regret these insulting comments directed at our Jewish brothers and sisters who have in fact supported First Nations in many of our struggles," he said. Canadian Alliance Leader Stephen Harper said Ahenakew's comments were "way beyond expressing a vile political opinion." Prime Minister Jean ChrÈtien was also upset about the remarks. After a ceremony to sign the Kyoto Protocol, he called Ahenakew's comments "completely unacceptable." The Canadian Jewish Congress (CJC) called for a hate-crimes investigation and the Assembly of First Nations condemned Ahenakew's comments. CJC president Keith Landy said Ahenakew should be kicked out of the Order of Canada. Landy said the congress will ask Governor General Adrienne Clarkson for a review of the requirements for members of the Order of Canada. Benjamin Goldstein, a Saskatoon judge and president of the Shir Hadash Synagogue, said he was deeply saddened by the remarks. "Our brothers and sisters who are aboriginal, how terrible they must feel to have somebody who's a leader of theirs make such mad, insane comments," said Goldstein. Bellegarde said he would personally tell the Jewish community that the FSIN doesn't share its former chief's opinions. Written by CBC News Online staff http://www.cbc.ca/stories/2002/12/16/ahenakew021216 6655 From: Ocean Group Date: Wed Dec 18, 2002 11:42am Subject: Re: Portable phone suggestions... Hi, I was wondering if anyone had any relevent ideas this... I have a client that we just installed a new isdn(euro) pbx for and he is looking for a cordless phone, small, ruggedised and with a -good- range that he can add to it. A 1km range would be fine as long as thats the pratical value and not the line of sight value. It can be attached to a digital or analogue port so either option works. If it was waterproof it would be ideal, this is so he can move around his site, in between buildings and still get his calls, they are based by the sea so hence the waterproof factor, apparently he drops his phone alot!?! I know this is slightly weird request but I thought you guys would be just the people to have tried and tested this type of equipment when working out on field. This is for export(well unless the supplier is Irish) so any kind of VHF/UHF phone would be ideal for the range factor. Appreciate your time, Cheers Vance Deran, Ocean Group, Technical Security Divison, Ireland. 6656 From: Larry Malmberg Date: Wed Dec 18, 2002 7:30pm Subject: England Address I am doing a "favor" pro bono for a client, well a very good client so funds are limited. Here is the "story" my client purchased a 1946 Rolls Royce, now you know why I'm doing him a favor, that was originally built for a individual. We believe the original owner lived in Victoria BC Canada however the "build record" on the vehicle shows the following information which we think may actually be a address in England. Is it possible for someone to decipher the address for me and possibly tell me if this business and or address still exists? I would owe you one big one for this. Here is the information on the person that ordered the vehicle built: H.T. Yates, Esq. Yates (taverns) Ltd., Savoy House, 115, Strand, W.C. Apparently the vehicle was shipped to this person at the address. Please respond privately to my e mail address of: larrypi@l... Best regards, Larry Malmberg Larry Malmberg Investigations and Security, Inc. 638 North D Street San Bernardino, CA 92401-1110 909-383-8565, 800-655-4549 Facsimile 909-383-8566 PI 15211, PPO 112446 www.larrypi.com Lead me not into temptation, I can find it myself! 6657 From: Steve Uhrig Date: Thu Dec 19, 2002 9:39pm Subject: Re: Portable phone suggestions... On 18 Dec 2002 at 17:42, Ocean Group wrote: > I was wondering if anyone had any relevent ideas this... I have a > client that we just installed a new isdn(euro) pbx for and he is > looking for a cordless phone, small, ruggedised and with a -good- range > that he can add to it. A 1km range would be fine as long as thats the > pratical value and not the line of sight value. Many companies make many claims. My home and office are next door to each other, and I live in the country with a fairly large place. I like cordless phones that will work in the house, the shop, the barn, all the way up to the mailbox and all the way back to the pond. I've owned perhaps 15 cordless phones. The ONLY one which was satisfactory was the Engenius SN-920. You can have multiple lines and multiple handsets. The thing is 900 megacycle CDMA, base 900 milliwatts and handset 600 milliwatts. I get 100% coverage anywhere on my properties and in all buildings with the stubby antenna on the handset and the built in base antennas. You get stubby and long antennas with the handset, and can add an outside antenna to the base for apparently very impressive coverage. I get totally adequate coverage with the minimum antennas. The Engenius system is industrial grade rugged, not consumer plastic castings. I am very pleased with it. You also can communicate handset to handset full duplex with CDMA security, without the need for the base station. So you can use them in caravans or as full duplex portable communications anywhere. They accept headsets if you need hands-free operation. The handsets are a slight bit larger than an average cell phone, and nearly every visitor you hand one to when they need a phone thinks it is a cell phone. The cheapest place I have found, by far, to buy them is Teledynamics www.teledynamics.com. They are a wholesaler only, so use a company name if you talk to them. They will sell over the phone with a credit card. You have to call them for prices, but I have their catalog and sales flyer here and they were $30 cheaper on a spare handset then the next cheapest place I had been dealing with. I have three lines and four handsets on the system at work, have for a year, and have had zero problems. Do a Google search to find specs (it's NOT engenius.com. That's a different company), but you'll probably find the best prices at Teledynamics. The manual is not all that great, but tech support is excellent and I have never waited more than 30 seconds to get a real live tech who knows the system inside and out and will tell you all sorts of secret functions not mentioned in the manual. I have no doubt you would get a reliable 1km out of the system if you used an outside antenna, and maybe not even that. I have not range tested mine, but I'm definitely getting 500 feet through buildings and woods long ways diagonal on my properties. There is a newer system than SN-920 from Engenius which I do NOT recommend. Its only major benefits are it can handle more CO lines and more handsets, but it has disadvantages in that you cannot choose which outgoing line you use when you place the call. With the SN-920 you can. Charles Patterson on the list here is our resident telephone commo expert. See what he has to suggest and listen to him. I do. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6658 From: Matt Paulsen Date: Thu Dec 19, 2002 11:10pm Subject: RE: Re: Portable phone suggestions... Has pics and prices on this phone. What price are you getting Steve? You didn't say. http://www.101phones.com/pricegrabber/engenius/920/ -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Thursday, December 19, 2002 7:39 PM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Re: Portable phone suggestions... On 18 Dec 2002 at 17:42, Ocean Group wrote: > I was wondering if anyone had any relevent ideas this... I have a > client that we just installed a new isdn(euro) pbx for and he is > looking for a cordless phone, small, ruggedised and with a -good- range > that he can add to it. A 1km range would be fine as long as thats the > pratical value and not the line of sight value. Many companies make many claims. My home and office are next door to each other, and I live in the country with a fairly large place. I like cordless phones that will work in the house, the shop, the barn, all the way up to the mailbox and all the way back to the pond. I've owned perhaps 15 cordless phones. The ONLY one which was satisfactory was the Engenius SN-920. You can have multiple lines and multiple handsets. The thing is 900 megacycle CDMA, base 900 milliwatts and handset 600 milliwatts. I get 100% coverage anywhere on my properties and in all buildings with the stubby antenna on the handset and the built in base antennas. You get stubby and long antennas with the handset, and can add an outside antenna to the base for apparently very impressive coverage. I get totally adequate coverage with the minimum antennas. The Engenius system is industrial grade rugged, not consumer plastic castings. I am very pleased with it. You also can communicate handset to handset full duplex with CDMA security, without the need for the base station. So you can use them in caravans or as full duplex portable communications anywhere. They accept headsets if you need hands-free operation. The handsets are a slight bit larger than an average cell phone, and nearly every visitor you hand one to when they need a phone thinks it is a cell phone. The cheapest place I have found, by far, to buy them is Teledynamics www.teledynamics.com. They are a wholesaler only, so use a company name if you talk to them. They will sell over the phone with a credit card. You have to call them for prices, but I have their catalog and sales flyer here and they were $30 cheaper on a spare handset then the next cheapest place I had been dealing with. I have three lines and four handsets on the system at work, have for a year, and have had zero problems. Do a Google search to find specs (it's NOT engenius.com. That's a different company), but you'll probably find the best prices at Teledynamics. The manual is not all that great, but tech support is excellent and I have never waited more than 30 seconds to get a real live tech who knows the system inside and out and will tell you all sorts of secret functions not mentioned in the manual. I have no doubt you would get a reliable 1km out of the system if you used an outside antenna, and maybe not even that. I have not range tested mine, but I'm definitely getting 500 feet through buildings and woods long ways diagonal on my properties. There is a newer system than SN-920 from Engenius which I do NOT recommend. Its only major benefits are it can handle more CO lines and more handsets, but it has disadvantages in that you cannot choose which outgoing line you use when you place the call. With the SN-920 you can. Charles Patterson on the list here is our resident telephone commo expert. See what he has to suggest and listen to him. I do. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6659 From: Mitch D Date: Fri Dec 20, 2002 1:58am Subject: Re: More whacky shyte from frost bitten funky town ... I guess that takes the heat off of Sen Trent Lott __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6660 From: Charles P. Date: Fri Dec 20, 2002 9:30pm Subject: Portable phone suggestions... Hi, >looking for a cordless phone, small, ruggedised and with a -good- range The Engenius is probably the best bet for your needs. Since you can get an external antenna for it, that will be the thing that can give you the best range. Do not expect to get even close to a 1 km range, though. That kind of distance you will not find in any off the shelf cordless phone I've ever seen. 1/2 km might be attainable with good antenna. Mobicel made a phone that worked like a cellular system. You can link multiple bases by wire (up to 4 co lines) and the bases will pass the portables from base to base as you travel. Problems are that the basic range per unit was not very good, and it used analog signaling. You mentioned a euro isdn pbx, >It can be attached to a digital or analogue port so either option works. The only way to use the digital port on the pbx would be to use a phone made by that manufacturer (unless it's a standard isdn format- we don't see much of that on this side of the pond). Otherwise any other phone would need to be connected to the analog port (even if the phone is "digital" spread spectrum signalling, it still connects to an analog port). ******** Another interesting system I'll mention here is the Panasonic KXTG4000 or KXTG2000 (4 line and 2 line) cordless phone systems. These systems are 2.4 Ghz full spread spectrum in both directions (tx, rcv). There is one base and up to 8 handsets with voicemail/answering system. Neat thing is that there is also a cordless desk phone, and the base unit has built-in battery backup for up to 20 minutes. I've heard good reports reports about it and I have a new system here I'm setting up to test tonight. My thought on applications would include executive protection teams such as in a hotel detail, linking rooms in a private phone network; or mobile operations where multiple com-vans or command-posts are used, such as disaster relief or event coordination. I put a small pbx in our local Red Cross com-van, we usually would throw wire out the window to link up with other vans and rv's at a site. It would be neat to just plop a desk phone down with no wires other than a charger. (We do the NYC Marathon every year among others, talk about a communications nightmare!). Charles Charles Patterson Global Communications Tarrytown, NY charles@t... ----- Original Message ----- From: "Steve Uhrig" To: Sent: Thursday, December 19, 2002 10:39 PM Subject: [TSCM-L] Re: Portable phone suggestions... > On 18 Dec 2002 at 17:42, Ocean Group wrote: > > > I was wondering if anyone had any relevent ideas this... I have a > > client that we just installed a new isdn(euro) pbx for and he is > > looking for a cordless phone, small, ruggedised and with a -good- range > > that he can add to it. A 1km range would be fine as long as thats the > > pratical value and not the line of sight value. > > Many companies make many claims. > > My home and office are next door to each other, and I live in the > country with a fairly large place. I like cordless phones that will > work in the house, the shop, the barn, all the way up to the mailbox > and all the way back to the pond. > > I've owned perhaps 15 cordless phones. > > The ONLY one which was satisfactory was the Engenius SN-920. You can > have multiple lines and multiple handsets. The thing is 900 megacycle > CDMA, base 900 milliwatts and handset 600 milliwatts. I get 100% > coverage anywhere on my properties and in all buildings with the > stubby antenna on the handset and the built in base antennas. > > You get stubby and long antennas with the handset, and can add an > outside antenna to the base for apparently very impressive coverage. > I get totally adequate coverage with the minimum antennas. > > The Engenius system is industrial grade rugged, not consumer plastic > castings. I am very pleased with it. You also can communicate handset > to handset full duplex with CDMA security, without the need for the > base station. So you can use them in caravans or as full duplex > portable communications anywhere. They accept headsets if you need > hands-free operation. The handsets are a slight bit larger than an > average cell phone, and nearly every visitor you hand one to when > they need a phone thinks it is a cell phone. > > The cheapest place I have found, by far, to buy them is Teledynamics > www.teledynamics.com. They are a wholesaler only, so use a company > name if you talk to them. They will sell over the phone with a credit > card. You have to call them for prices, but I have their catalog and > sales flyer here and they were $30 cheaper on a spare handset then > the next cheapest place I had been dealing with. I have three lines > and four handsets on the system at work, have for a year, and have > had zero problems. > > Do a Google search to find specs (it's NOT engenius.com. That's a > different company), but you'll probably find the best prices at > Teledynamics. > > The manual is not all that great, but tech support is excellent and I > have never waited more than 30 seconds to get a real live tech who > knows the system inside and out and will tell you all sorts of secret > functions not mentioned in the manual. > > I have no doubt you would get a reliable 1km out of the system if you > used an outside antenna, and maybe not even that. I have not range > tested mine, but I'm definitely getting 500 feet through buildings > and woods long ways diagonal on my properties. > > There is a newer system than SN-920 from Engenius which I do NOT > recommend. Its only major benefits are it can handle more CO lines > and more handsets, but it has disadvantages in that you cannot choose > which outgoing line you use when you place the call. With the SN-920 > you can. > > Charles Patterson on the list here is our resident telephone commo > expert. See what he has to suggest and listen to him. I do. > > Regards ... Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel ?879-4035, fax ?836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 6661 From: James M. Atkinson Date: Fri Dec 20, 2002 10:33pm Subject: Funny Church Bulletin Mistakes Funny Church Bulletin Mistakes 20. The service will close with "Little Drops of Water." One of the ladies will start quietly and the rest of the congregation will join in 19. This afternoon there will be a meeting in the South and North ends of the church. Children will be baptized at both ends. 18. The eighth graders will be presenting Shakespeare's "Hamlet" in the church basement on Friday at 7 p.m. The congregation is invited to attend this tragedy. 17. Thursday night - Potluck supper. Prayer and medication to follow. 16. Tuesday at 4:00 PM there will be an ice cream social. All ladies giving milk will please come early. 15. This being Easter Sunday, we will ask Mrs. Lewis to come forward and lay an egg on the altar. 14. Next Sunday a special collection will be taken to defray the cost of the new carpet. All those wishing to do something on the new carpet will come forward and do so. 13. bean supper will be held on Tuesday evening in the church hall. Music will follow. 12. The rosebud on the altar this morning is to announce the birth of David Alan Belzer, the sin of Rev. and Mrs. Julius Belzer. 11. At the evening service tonight, the sermon topic will be "What is Hell?" Come early and listen to our choir practice. 10. The preacher will preach his farewell message, after which the choir will sing, "Break Forth With Joy." 9. During the absence of our pastor, we enjoyed the rare privilege of hearing a good sermon when A. B. Doe supplied our pulpit. 8. Remember in prayer the many who are sick of our church and community. 7. The church is glad to have with us today as our guest minister the Rev. Shirley Green who has Mrs. Green with him. After the service, we request that all remain in the sanctuary for the Hanging of the Greens. 6. Thursday at 5:00 PM there will be a meeting of the Little Mothers Club. All ladies wishing to be "Little Mothers" will meet with the Pastor in his private study. 5. For those of you who have children and don't know it, we have a nursery downstairs. 4. The Rev. Adams spoke briefly, much to the delight of his audience. 3. Don't let worry kill you -- let the church help. 2. Wednesday the ladies liturgy will meet. Mrs. Johnson will sing "Put me in my little bed" accompanied by the pastor. 1. The ladies of the church have cast off clothing of every kind. They can be seen in the church basement Saturday. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6662 From: Date: Sun Dec 22, 2002 8:08am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County, San Francisco, Silicon Valley, San Jose, San Diego, and Las Vegas. (Also, anywhere in a thousand mile radius from Los Angeles.) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ From: Cornolio Date: Thu Dec 11, 2003 6:54am Subject: Cryptophone Hi, In the past I have seen many postings on cryptophones passing this list. Since our product was not ready at that time, I did not reply to those messages. However, we have now reached the stage where we can face the public. We published today the full source code of our CryptoPhone products at http://www.cryptophone.de/. Also available for download is now the first public Beta version of the free GSMK CryptoPhone for Windows software. The publication of the source code enables you to perform independent security assessments. While it is standard for internet security products to have the source code available for review, in the telecommunications world this is an industry first. So far the market for voice encryption products consists only of black-box products that can not be independently verified and may contain dangerous bugs or backdoors. With the GSMK CryptoPhone, potential vulnerabilities would be found by the security researcher community and fixed by GSMK in a timely and transparent manner. The free GSMK CryptoPhone for Windows is currently in public Betatest. Please note that some bugs may still be in there as we concentrated our efforts primarily on the testing and debugging of our commercial product GSMK CryptoPhone 100. The GSMK CryptoPhone technology is currently used in two main products: the mobile GSMK CryptoPhone 100 that works in GSM cellular networks and the free CryptoPhone for Windows client that enables cost efficient secure voice communication from fixed lines The strong cryptography, built on a conservative choice of key length and algorithms for the GSMK CryptoPhone, provide a secure foundation for trustworthy voice encryption. GSMK will use this core technology in more products for fixed and mobile platforms, bringing secure voice communication to as many devices as possible.. With regards, Barry Wels 8075 From: Steve Uhrig Date: Thu Dec 11, 2003 6:47pm Subject: More on quantum hacking I still don't understand, but maybe this will be of interest to several of the gentlemen who were kind enough to try to educate me on the matter. ... Steve "The Secret Is Out" New Scientist (11/29/03) Vol. 180, No. 2423, P. 24; Anderson, Mark Kendall Quantum communication has long been publicized as completely hack- proof, but quantum hacking is an area of research that engineers are exploring in parallel with the development of true quantum networks-- and they are uncovering possible exploits that quantum encryption designers never anticipated. "The models that tell us quantum cryptography is hot stuff are drastically simplified," explains Harvard University's John Myers. Quantum communication encryption's basic incarnation is the BB84 scheme devised by IBM's Charles Bennett and the University of Montreal's Gilles Brassard, in which a message sender (Alice) and receiver (Bob) employ both a public link and a quantum communication link to set up a secret quantum key used to encrypt messages that an eavesdropper (Eve) cannot guess without being detected, since Eve's measurement of Alice's photons disturbs their quantum state. However, engineers have found several practical techniques that eavesdroppers could use to correctly guess the key: In a photon number-splitting attack designed by Nicolas Gisin of the University of Geneva, Alice's laser accidentally releases two or three photons instead of just one, and Eve diverts and measures these extra photons without Alice and Bob knowing. In another quantum hack, known as a frying attack, Eve sends an intense pulse of laser light into Bob's 1 photon detector, rendering it inoperative and making Bob capable of only receiving 0s; Alice and Bob's key will therefore be all 0s, which means that their data will be unencrypted without their realizing it. "In general, I do not think that a real quantum cryptography system will ever be 100 percent secure, because a real system will always implement an approximation of the theorist's system," states Gisin. Military and intelligence agencies as well as financial firms are employing commercial quantum communication products, but establishing secure quantum communication in a public Internet is a more complex proposition, especially since there is such a wide variety of quantum communication schemes. http://www.newscientist.com ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8076 From: Steve Uhrig Date: Thu Dec 11, 2003 6:37pm Subject: GPS jamming and spoofing Interesting paper, just released: http://tinyurl.com/yv1g Good cram course on GPS operation in general as well as methods and techniques of jamming and spoofing, and countermeasures to same. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8077 From: William Knowles Date: Fri Dec 12, 2003 9:37pm Subject: Johnson gets official nod as DHS security chief http://www.fcw.com/fcw/articles/2003/1208/web-dhs-12-12-03.asp By Dibya Sarkar Dec. 12, 2003 Jack Johnson, who has been the Homeland Security Department's chief security officer since January, has been officially appointed to that post by Secretary Tom Ridge. As chief security officer, Johnson will continue to direct all security-related activities, including developing policies and procedures in personnel, administrative, and physical and technical security-related areas, counterintelligence and operations security, investigations, inspections and special programs. The chief security officer also supports the chief information officer in security policies and procedures as they relate to classified information technology. Johnson's previous jobs include special agent in charge and deputy assistant director for the Secret Service, police officer and detective in Fairfax County, Va., and a criminal investigator with the U.S. Army. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ---------------------------------------------------------------- C4I.org - Computer Security, & Intelligence - http://www.c4i.org ================================================================ Help C4I.org with a donation: http://www.c4i.org/contribute.html *==============================================================* 8078 From: James M. Atkinson Date: Sat Dec 13, 2003 11:04am Subject: MI5 accused of trying to bug US London embassy http://politics.guardian.co.uk/homeaffairs/story/0,11026,1076567,00.html MI5 accused of trying to bug US London embassy MI5 accused of trying to bug ally Richard Norton-Taylor Monday November 3, 2003 The Guardian MI5 planned to bug the London embassy of one of Britain's allies in the so-called "war on terror", it was disclosed yesterday. It was approached by the man in charge of restoring the embassy, a project which began in 2001, according to Whitehall sources last night. The initial approach met with no response, so the man went to the CIA, who suggested he should contact Scotland Yard's anti-terrorist branch, according to the report. Eventually MI5 recruited the man, gave him the codename Notation, and allegedly asked him to bug the embassy and take confidential documents. It also allegedly planned to take away confidential documents on the pretext that they would be destroyed by a reputable waste disposal firm. However, unknown to MI5, the agent had once been sectioned under the Mental Health Act. Under growing pressure he refused to go ahead with the operation, and claimed that his MI5 handlers had bungled it. He has told the embassy concerned, and the US embassy in London, about the operation. He has also written to Ann Taylor, the MP who chairs the parliamentary intelligence and security committee. Whitehall sources refused to comment on the operation yesterday, although it is clear that it has caused the government acute embarrassment. "Notation" arranged for MI5 officers posing as his workmates to have unrestricted access to the embassy, it is claimed. It is not the first time that the security and intelligence agencies have recruited people undertaking work in official buildings belonging to foreign governments. During the cold war they recruited a man installing a central heating system at the Soviet trade mission in Highgate, north London. Peter Wright described in his memoir, Spycatcher, how MI5 had bugged allied embassies in London, as well as the Egyptian embassy during the 1956 Suez crisis. A more recent example of western intelligence agencies planning aggressive operations was disclosed this year: the American national security agency mounted surveillance of UN security council members while Washington was trying to win votes in favour of the war on Iraq. A secret NSA memo suggested bugging the offices and homes of diplomats from a number of neutral countries. A foreign agency - believed to be the British GCHQ - was asked for "support" in the operation. 8079 From: William Knowles Date: Sun Dec 14, 2003 7:41am Subject: Hussein Captured http://www.washingtonpost.com/wp-dyn/articles/A63555-2003Dec14.html By Bradley Graham Washington Post Staff Writer Sunday, December 14, 2003; 7:36 AM Former Iraqi president Saddam Hussein was captured by U.S. troops during a raid on a farmhouse near Tikrit, U.S. officials said in a news conference in Baghdad today. "We got him . . . ," L. Paul Bremer, Iraq's U.S. civilian administrator, said when making the announcement. "The tyrant is now a prisoner . . ." Lt. Gen. Ricardo Sanchez, the top U.S. military commander in Iraq, described the operation and said that "not a single shot was fired." Sanchez said Hussein, who was hiding in a "spider hole" dug near the house, was talking to his captors and "being cooperative." Video of Hussein, with a long gray beard, getting a medical checkup after his capture was shown by Sanchez. Then, he showed video of the man after he had been shaved and compared that to earlier photos of Hussein. Continuous celebratory gunfire could be heard in Baghdad as the news of Hussein's possible arrest spread across the Iraqi capital. The capture of Hussein has been a high priority for U.S. forces since last spring's invasion, but the former Iraqi leader had proven elusive despite a $25 million reward that the Bush administration offered for information that led to him. U.S. authorities had received numerous tips about possible hiding places for Hussein and suspect they were close to nabbing him on a few occasions. Hussein's two sons, Uday and Qusay, were found in July in a house in Tikrit and died in a firefight with U.S. troops. From his hideouts, Hussein continued to taunt U.S. authorities, issuing periodic audio tapes urging resistance to the American-led occupation. To spearhead the search for him, the Pentagon established a group of Special Operations forces known as Task Force 121. In recent months, U.S. forces have focused on hunting down mid-level former Iraqi officers and mid-ranking onetime Baath Party operatives in hopes they could provide intelligence that might lead to Hussein. Although frustrated by the length of time it was taking to find Hussein, U.S. commanders had repeatedly expressed confidence they would eventually find the former Iraqi leader. At the same time, they said that Hussein's capture would not by itself end the insurgency that has swelled during the past few months. Washington Post staff writer Barton Gellman in Baghdad contributed to this report. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ---------------------------------------------------------------- C4I.org - Computer Security, & Intelligence - http://www.c4i.org ================================================================ Help C4I.org with a donation: http://www.c4i.org/contribute.html *==============================================================* 8080 From: R. Snyder Date: Sat Dec 13, 2003 6:52am Subject: Re: More on quantum hacking Well, that sort of raises the bar for TSCM if practitioners will be required to determine if their clients are emitting even a single unwanted photon. It will be interesting to see what new gadgets the quantum physicists at the spy shops come out with to counter this new threat. __________________________________ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/ 8081 From: Robin Hunter Date: Sun Dec 14, 2003 7:47am Subject: RE- MI5 accused of trying to bug US London embassy This story was published in full a couple of weeks ago by the Sunday Times, it did not concern the U.S. Embassy but did in fact relate to the Pakistan High Commission in London. regards from Edinburgh, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. [Non-text portions of this message have been removed] 8082 From: Hawkspirit Date: Tue Dec 16, 2003 5:58pm Subject: Historical Bug Sweep Articles Here are two new historical bug sweep articles. Enjoy Roger No Place to Hide Russell Watson with Evert Clark and Anthony Marro in Washington - Newsweek September 8, 1975 http://bugsweeps.com/info/newswk9-8-75.html It's Still Spy vs. Spy By Elaine Shannon, Washington - Time, December 20, 1999 A Russian diplomat is ordered to leave after a bug is discovered at the State Department http://bugsweeps.com/info/time12-20-99.html 8083 From: Date: Wed Dec 17, 2003 2:38am Subject: Police knew the suspects had electronic surveillance equipment ...... Police avoid gunplay December 17, 2003 1:11 am By KEITH EPPS Two suspects in a marijuana distribution operation narrowly escaped a shootout this week after King George deputies burst into their home, police said. Sheriff's Capt. Steve Dempsey said the men had 12-gauge shotguns drawn on the deputies, but dropped them upon being ordered to do so. The suspects were taken into custody without further incident. "Our Special Response Team is well-trained, and it really came in handy this time," Dempsey said. "It's fortunate that [the suspects] dropped those guns when they did." The incident occurred about 11:15 p.m. Monday on Davis Drive off James Madison Parkway in King George, where about 13 officers went to execute a search warrant. Dempsey said undercover officers had been investigating suspected drug dealing at the home in the area of the Hillcrest Motel since October and made a number of undercover purchases. Police knew the suspects had electronic surveillance equipment outside the home and that they were armed, Dempsey said. Officers avoided the outside cameras and knocked down the front door without warning. Two armed men were immediately found in the living room, one standing and the other sitting, Dempsey said. The guns were pointed at the officers as they entered the room, but the men dropped the guns upon being ordered to do so, Dempsey said. Three ounces of marijuana and about $200 cash were recovered from the home, along with two other guns--a Tech 9 mm and a .45-caliber revolver, police said. Richard A. Wenninger, 20, and Sean R. Colley, 19, were each charged with possession of marijuana with the intent to distribute and with brandishing a firearm. They were placed in the Rappahannock Regional Jail. Dempsey said an investigation is continuing, and more charges are possible. To reach KEITH EPPS: 540/374-5404 kepps@f... Copyright 2001 The Free Lance-Star Publishing Company. [Non-text portions of this message have been removed] 8084 From: William Knowles Date: Thu Dec 18, 2003 5:33am Subject: Device on Limo May Have Saved Musharraf http://www.guardian.co.uk/worldlatest/story/0,1280,-3516781,00.html December 17, 2003 By MUNIR AHMAD Associated Press Writer ISLAMABAD, Pakistan (AP) - Equipment installed on the Pakistani leader's limousine to jam devices that trigger bombs probably saved him from an assassination attempt over the weekend, intelligence officials said Wednesday. The powerful bomb that exploded moments after President Gen. Pervez Musharraf's motorcade passed over a bridge on Sunday evening was delayed by crucial seconds by jammers that temporarily disabled the bomb, they said. ``It was enough time for Musharraf to cross the bridge,'' an intelligence official said on condition of anonymity. No one was hurt in the bombing, which destroyed a section of the bridge in Rawalpindi, a city near the capital of Islamabad. It was at least the second assassination attempt on Musharraf, a key ally in the U.S. war on terror. Investigators have yet to identify any suspects but were looking into the possible involvement of al-Qaida and banned Pakistani militant groups, officials said. The sophisticated bomb - initially estimated to contain 550 pounds of explosive - was believed to include both a remote control and a timing device to trigger it, two intelligence officials said. The equipment in Musharraf's car jammed the timer for about a minute, and also jammed the remote control, the officials said. The jammers usually work by emitting a magnetic impulse to block frequencies used to trigger explosive devices - including the electronic signals from precision timers. Musharraf has said he heard and felt the blast between 30 seconds and a minute after he passed the bridge. There were no injuries as the bridge was blocked to traffic to let his motorcade pass. On Tuesday, the president made a 20-minute visit to the site of the blast and asked investigators to find and arrest the people who were behind it as soon as possible, officials said. The U.S. government condemned the attack and said they were prepared to help Pakistani officials investigate it. The White House said that President Bush had been fully briefed on the assassination attempt. ``President Musharraf is someone that has worked very closely with us in the war on terrorism, and it's another indication that that war continues, and we must confront it everywhere,'' White House press secretary Scott McClellan said. Musharraf, who took power in a bloodless coup in 1999, angered hard-liners here by reversing Pakistan's support for the Taliban regime in neighboring Afghanistan after the Sept. 11 attacks. He has said homegrown religious extremists were the most likely perpetrators of the assassination attempt. Although some in Pakistan question his determination to crack down on politically influential religious radicals, Musharraf has taken some bold and controversial steps in tackling the threat from extremists. He has deployed at least 70,000 troops to track suspects in sensitive tribal regions along the border with Afghanistan where sympathies for the Taliban run high, and has handed over hundreds of terror suspects to the United States. Pakistani Information Minister Sheikh Rashid Ahmed said, ``The involvement of al-Qaida cannot be ruled out, but we do not have any clue to establish their links with the assassination attempt.'' A Pakistani defense analyst, Talat Masood, said that security agencies all over the world use ``jammers'' and other equipment for the security of dignitaries, which had been imported to Pakistan. He said these jammers can be installed in cars and even in the aircraft to foil terrorist attacks by blocking frequencies used to trigger explosive devices for some time. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ---------------------------------------------------------------- C4I.org - Computer Security, & Intelligence - http://www.c4i.org ================================================================ Help C4I.org with a donation: http://www.c4i.org/contribute.html *==============================================================* 8085 From: Shawn Hughes Date: Thu Dec 18, 2003 10:47am Subject: Point of Contact Got a question........ My wireless service and I are butting heads. Starting in August of this year, they believe I live in the Central Time Zone, and I say I live in the Eastern Time Zone. Any ideas on how to legally prove what zone I live in? I've given them maps from the net, and a letter from the city I live in. Also, if anybody is technically familiar with how Nextel does billing, I need a reference from the Motorola reference manual(s) that explain how time is derived for 1) display on the subscriber's handset, and 2) for the time/date stamp in the billing computer. Apparently, in my case, they are exactly one hour apart. Thanks in advance, Shawn Shawn Hughes, Lead Instructor, Tactical Response, Inc. 8086 From: Robin Hunter Date: Tue Dec 16, 2003 2:55pm Subject: 12 Days of Politically Correct Christmas On the 12th day of the Eurocentrically imposed midwinter festival, my Significant Other in a consenting adult, monogamous relationship gave to me: TWELVE males reclaiming their inner warrior through ritual drumming, ELEVEN pipers piping (plus the 18-member pit orchestra made up of members in good standing of the Musicians Equity Union as called for in their union contract even though they will not be asked to play a note), TEN melanin-deprived testosterone-poisoned scions of the patriarchal ruling class system leaping, NINE persons engaged in rhythmic self-expression, EIGHT economically disadvantaged female persons stealing milk-products from enslaved Bovine-Americans, SEVEN endangered swans swimming on federally protected wetlands, SIX enslaved Fowl-Americans producing stolen non-human animal products, FIVE golden symbols of culturally sanctioned enforced domestic incarceration, (NOTE: after members of the Animal Liberation Front threatened to throw red paint at my computer, the calling birds, French hens and partridge have been reintroduced to their native habitat. To avoid further Animal-American enslavement, the remaining gift package has been revised.) FOUR hours of recorded whale songs, THREE deconstructionist poets, TWO Sierra Club calendars printed on recycled processed tree carcasses and... ONE Spotted Owl activist chained to an old-growth pear tree. Merry Christmas. Happy Chanukah. Good Kwanzaa. Blessed Yule. Oh, heck! Happy Holidays!!!! (unless otherwise prohibited by law)* *Unless, of course, you are suffering from Seasonally Affected Disorder (SAD). If this be the case, please substitute this gratuitous call for celebration with a suggestion that you have a thoroughly adequate day. "Anything good in life is either illegal, immoral, or fattening. Anything not fitting into these categories causes cancer in rats." ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. [Non-text portions of this message have been removed] 8087 From: larry d chapman Date: Wed Dec 17, 2003 11:58am Subject: Camra cell phones Camera cell phones, one of the hottest items on this year's Christmas must-have list, is also a growing privacy issue for both consumers and organizations. The phones, with their discreet lens, tiny size and ability to immediately transmit images onto the Internet or other cell phones, are a voyeur's dream. Have any of you had clients expressing concern over these? http://story.news.yahoo.com/news?tmpl=story&cid=581&ncid=581&e=4&u=/nm/20031209/tc_nm/tech_cameraphones_privacy_dc ____________________________________________________________ Free Poetry Contest. Win $10,000. Submit your poem @ Poetry.com! http://ad.doubleclick.net/clk;6750922;3807821;l?http://www.poetry.com/contest/contest.asp?Suite=A59101 8088 From: Dragos Ruiu Date: Wed Dec 17, 2003 5:49pm Subject: CanSecWest/core04 Really Really Last CFP LAST CALL FOR PAPERS CanSecWest/core04 Network Security Training Conference http://cansecwest.com April 21,22,23 - 2004 Vancouver, B.C. Canada CanSecWest would like to announce the final really, really, last call for papers of the spring, fifth annual, CanSecWest/core04 network security training conference. The conference will be held on April 21,22,23 at the Mariott Renaissance in downtown Vancouver, British Columbia, Canada. The conference focuses on emerging information security tutorials and technology. So many people have come in after the deadline because we did it earlier this year and asked for more time... That the deadline will be extended to: January 5, 2004. Preference will be given to earlier proposals. Resubmissions are not necessary for those who have submitted though they may resubmit at their option. LIGHTNING TALKS I would also like to announce the call for a second type of presentation. This year we will do a session of "lightning talks": 5 minutes max (BigHook/Gong enforced) and 1-3 slides. Selected "lightning talk" presenters will only receive registration discounts (or rebates) - travel and accomodations are their responsibility. "Ligntning talk" submissions should follow the same submission guidelines below. Deadline for "lightning talk" submissions is January 15th, 2004. Please make your paper proposal submissions on/before January 5, 2004! The conference is responsible for travel and accomodations for the speakers. If you have a proposal for a tutorial session then please email a synopsis of the material and your biography, papers, and speaking background to core04@c.... Tutorials are one hour in length, Only slides will be needed for the March paper deadline, full text does not have to be submitted. The CanSecWest/core04 conference consists of tutorials on technical details about current issues, innovative techniques and best practices in the information security realm. The audiences are a multi-national mix of professionals involved on a daily basis with security work: security product vendors, programmers, security officers, and network administrators. We give preference to technical details and education for a technical audience. The conference itself is a single track series of presentations in a lecture theater environment. The presentations offer speakers the opportunity to showcase on-going research and collaborate with peers while educating and highlighting advancements in security products and techniques. The focus is on innovation, tutorials, and education instead of overt product pitches. Some commercial content is tolerated, but it needs to be backed up by a technical presenter - either giving a valuable tutorial and best practices instruction or detailing significant new technology in the products. Paper proposals should consist of the following information: 1) Presenter, and geographical location (country of origin/passport) and contact info (e-mail, postal address, phone, fax). 2) Employer and/or affiliations. 3) Brief biography, list of publications and papers. 4) Any significant presentation and educational experience/background. 5) Topic synopsis, Proposed paper title, and a one paragraph description. 6) Reason why this material is innovative or significant or an important tutorial. 7) Optionally, any samples of prepared material or outlines ready. Please forward the above information to core04@c... to be considered for placement on the speaker roster. CanSecWest/core04 details can be found at http://cansecwest.com thanks, --dr -- Top security experts. Cutting edge tools, techniques and information. Vancouver, CanadaApril 21-23 2004 http://cansecwest.com pgpkey http://dragos.com/ kyxpgp 8089 From: Date: Thu Dec 18, 2003 2:09pm Subject: Re: Point of Contact official stuff http://www.nationalatlas.gov/timeznm.html Use this to create a map to print http://nationalatlas.gov/mapit.html At 10:47 12/18/2003, Shawn Hughes wrote: >Got a question........ > > >My wireless service and I are butting heads. Starting in August of this >year, they believe I live in the Central Time Zone, and I say I live in the >Eastern Time Zone. Any ideas on how to legally prove what zone I live in? > >I've given them maps from the net, and a letter from the city I live in. > >Also, if anybody is technically familiar with how Nextel does billing, I >need a reference from the Motorola reference manual(s) that explain how >time is derived for 1) display on the subscriber's handset, and 2) for the >time/date stamp in the billing computer. > >Apparently, in my case, they are exactly one hour apart. > >Thanks in advance, > > >Shawn > >Shawn Hughes, >Lead Instructor, >Tactical Response, Inc. > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Yahoo! Groups Links > >To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > >To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > >Your use of Yahoo! Groups is subject to: > http://docs.yahoo.com/info/terms/ 8090 From: Mitch D Date: Sat Dec 20, 2003 2:16am Subject: Interra call recorder software Thought this may be of interest to list members: http://www.doubletalk.net/SoftwareSolutions/INterraCR.asp Voice Detection With the automatic Voice Detection option you don't have to remember to click Record, Call Recorder begins recording immediately when sound is detected. Voice Detect Parameters can be set to define your start and stop recording volume levels. Easy Call Recording Easy to use controls allow manual recording by a simple click of your mouse. Pause, stop or start recordings at any time during your conversation as well as mark key points in your discussion for future reference via the "Audio Mark" feature. Email Ready Files Since Call Recorder saves files in standard .wav file format, they can be emailed, accessed, and played from virtually any Windows based PC. Recipients do not need call recorder. As long as they have a sound card they can listen to your message or telephone recording merely by double clicking on the file contained in the email. Notes and Reminders The "AudioMark" feature allows you to mark your file at any time during your recording or during playback. Audio Marks are a convenient way to highlight a particular passage in your recording for future reference and associate a textual comment. All Audio Marks can hold unlimited text and are embedded within the recorded file. ===== Mitch Davis TSCM/Special Operations Group Inc. Antioch,TN.USA MitchD@t... website:www.tscmusa.com. Tel (615)837-9933 Cell(615) 584-9933 __________________________________ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/ 8091 From: lynndiwagoner Date: Fri Dec 19, 2003 8:34am Subject: Greetings Gentlemen, I'm new to the board and thought I would introduce myself. My name is Lynn D. Wagoner (male), and I am within 2 months of retireing from a national law enforcement agency after 35 years of service. I started off as an Electronic Technician for the U.S. Navy and then to the law enforcement community as an electronic technician, and eventually the job of Telecommunications Manager. I currently manage a team of IT Specialist and Electronic Technicians. We handle everything associated with LAN/WAN, encryption, RF Communications, physical security, access control, etc. I have quite a bit of experience with the things you guys discuss. I will form a small company named Technical Investigative Services, and sub my services to retired personnel already in the PI business. Thanks for letting me be a participant on your board, and I look forwards to communicating with you in the future. 8092 From: Steve Uhrig Date: Mon Dec 22, 2003 5:04pm Subject: Greg Horton Please contact me off list. Tks .... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8093 From: Date: Mon Dec 22, 2003 7:10pm Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 8094 From: Date: Mon Dec 22, 2003 7:10pm Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 8095 From: James M. Atkinson Date: Wed Dec 24, 2003 11:54am Subject: Seasons Greetings Our thoughts and prayers are with those who make it possible for our country to celebrate the holidays.. 'twas the night before Christmas, they lived all alone, in a one bedroom house made of plaster and stone. I had come down the chimney with presents to give, and to see just who in this home did live. I looked all about, a strange sight I did see, no tinsel, no presents, not even a tree. No stocking by mantle, just boots filled with sand, on the wall hung pictures of far distant lands. With medals and badges, awards of all kinds, a sober thought came through my mind. For this house was different, it was dark and dreary, I found the home of a soldier, once I could see clearly. The soldier lay sleeping, silent, alone, curled up on the floor in this one bedroom home. The face was so gentle, the room in such disorder, not how I pictured a united states soldier. Was this the hero of whom I'd just read? Curled up on a poncho, the floor for a bed? I realized the families that I saw this night, owed their lives to these soldiers who were willing to fight. Soon round the world, the children would play, and grownups would celebrate a bright Christmas day. They all enjoyed freedom each month of the year, because of the soldiers, like the one lying here. I couldn't help wonder how many lay alone, on a cold Christmas eve in a land far from home. The very thought brought a tear to my eye, I dropped to my knees and started to cry. The soldier awakened and I heard a rough voice, "Santa don't cry, this life is my choice; I fight for freedom, I don't ask for more, my life is my god, my country, my corps." The soldier rolled over and drifted to sleep, I couldn't control it, I continued to weep. I kept watch for hours, so silent and still and we both shivered from the cold night's chill. I didn't want to leave on that cold, dark, night, this guardian of honor so willing to fight. Then the soldier rolled over, with a voice soft and pure, whispered, "carry on Santa, it's Christmas day, all is secure." One look at my watch, and I knew he was right. "Merry Christmas my friend, and to all a good night," -jma 8096 From: Thomas Reagan Date: Sun Dec 21, 2003 4:31pm Subject: Re: Interra call recorder software Modem spy will do mostly the same thing for a lot less. http://www.modemspy.com/en/index.php 8097 From: Date: Sun Dec 21, 2003 5:38pm Subject: Maltese Falcon (What Some Say Dreams Are Made Of) Dear Group; REFERENCE: Maltese Falcon (What Some Say Dreams Are Made Of) Just in time for the New Year, 2004! We are again offering to the membership a replica of the famous Maltese Falcon. This icon replica stands 11 1/2 inches tall, solid, with a black laquer finish. We have a new shipment of 400 available for immediate delivery. We are offering this movie icon to the membership, including postage and handling, for a flat rate of $75.00. This movie icon is a great gift for clients and/or just looks great in your office or home! There is not a week that goes by that someone does not comment on ours. Place your order in the next two weeks to insure delivery in January! To place your order, either E-mail us your fax number or fax your request to Don C. Haworth at 773-772-7319 or 312-661-0734. We will fax you an order form immediately. If you have any questions, please contact me, your Chicago connection, Don Haworth, LPD, CFE, CII. [Non-text portions of this message have been removed] 8098 From: David Alexander Date: Wed Dec 24, 2003 1:15am Subject: message from Santa FROM THE DESK OF S. CLAUS I regret to inform you that, effective immediately, I will no longer serve the states of Georgia, Florida, Virginia, N.& S. Carolina, Tenn., Alabama, Mississippi, Texas, and Arkansas on Christmas Eve. Due to the overwhelming current population of the earth, my contract was renegotiated by the North American Fairies and Elves Local 209. As part of the new and better contract I also get longer breaks for milk and cookies so keep that in mind. However, I'm certain that your children will be in good hands with your local replacement, who happens to be my third cousin, Bubba Joe Claus. His side of the family is from the South Pole. He shares my goal of delivering toys to all the good boys and girls: however, there are a few differences between us: 1. There is no danger of the Grinch stealing your presents from Bubba Joe because he has a gun rack on his sleigh and a bumper sticker that reads, 'These Toys Insured By Smith & Wesson.' 2. Instead of milk & cookies, Bubba Joe prefers that children leave an RC cola and some Bar- BQ pork rinds ( or a moon pie) on the table next to your fathers easy chair. And Bubba Joe doesn't smoke a pipe. He chews tobacco though, so please have an empty coffee can handy. 3. Bubba Joe Claus' sleigh is pulled by floppy-eared, flyin' coon hounds instead of reindeer. I made the mistake of loaning him a couple of my reindeer one time, and Blitzen's head now overlooks Bubba Joe's fireplace. 4. You won't hear, 'On Comet, on Cupid and Donner and Blitzen' when Bubba Joe arrives. Instead, you'll hear, On Earnhardt, on Andretti, on Elliott, and Petty. 5. 'Ho, Ho, Ho!' has been replaced by 'Yee Haww!!' You also are likely to hear Bubba Joes' elves respond, 'I her'd dat!' 6. As required by the Southern D.O.T. highway laws, Bubba Joes' sleigh does have Yosemite Sam safety triangle on the back with the words, 'Back Off '. 7. The usual Christmas movie classics will be replaced with 'Boss Hogg Saves Christmas' and 'Smokey and the Bandit IV' featuring Burt Reynolds as Bubba Joe Claus and dozens of state patrol cars crashing into each other. And Finally, 8. Bubba Joe Claus doesn't wear a belt. If I were you, I'd make sure your wife and kids turn the other way when he bends over to put presents under the tree. Cause crack kills! Sincerely yours, Santa Claus David Alexander Towcester, Northamptonshire, England Competition Co-ordinator - MSA British Drag Racing Championship Founder member, European Top Methanol Racers Association http://home.rednet.co.uk/homepages/dave_ale/dave_ale.html Gone racing, back in 5.4 seconds 8099 From: Ocean Group Date: Thu Dec 25, 2003 8:12am Subject: Seasons Greetings Wishing everyone in the TSCM industry the best for Christmas...or the equivalent!! Best wishes for a prosperous and happy new year. Peace and good will to all men.....and women! Regards Oisin Ocean Group Security Engineering and Research Ireland. 8100 From: Date: Fri Dec 26, 2003 0:03am Subject: Ex-Wife of Investigator in Wiretap Inquiry Wants to Talk to.... December 26, 2003 Ex-Wife of Investigator Involved in Wiretap Inquiry Wants to Talk to Publishers, Not F.B.I. By BERNARD WEINRAUB OS ANGELES — The cast of characters in the murky Hollywood drama surrounding the imprisoned private investigator, Anthony Pellicano, is already as colorful as the players in James Ellroy's "L.A. Confidential." Now another figure has emerged from Mr. Pellicano's past, someone with a story of her own to tell, and perhaps even to sell. The figure, Kat Pellicano, is a former wife of Mr. Pellicano and the mother of four of his children. Because she and he spent nearly 20 years together, F.B.I. agents are intent on questioning her as part of their investigation into whether Mr. Pellicano illegally wiretapped people, including Hollywood celebrities. Federal authorities are also seeking to determine if prominent lawyers and entertainment figures who have hired Mr. Pellicano (now serving a sentence on unrelated weapons possession charges) were complicit in the alleged wiretapping. Despite repeated entreaties from F.B.I. agents, Mrs. Pellicano said she had politely refused to talk about her former husband, saying she has no interest in having him stay in prison. But she said she was willing to write a book about her life with Mr. Pellicano and was looking for a publisher. After the new year, the Pellicano case has the potential of turning into a significant Hollywood scandal. Federal authorities have said indictments are possible from a grand jury investigation in the wiretap case. An F.B.I spokeswoman in Los Angeles declined to comment and said the agency did not discuss investigations in progress. Mrs. Pellicano, who was divorced from her husband last year after an 18-year marriage, said she knew intimate details of his business, including how he handled cases for top Hollywood movie stars, producers and lawyers. Mr. Pellicano has worked for entertainment lawyers like Bert Fields, and his clients have included Michael Jackson, Kevin Costner and John Travolta. "He must have talked to me four or five times a day," Mrs. Pellicano said. They often spoke by cellphone, she said, adding, "He had an hour-and-a-half drive home every day. The same thing in the morning. We talked constantly." Mrs. Pellicano, a blonde, feisty woman in her 40's, discussed her husband in several phone conversations as well as at a restaurant near her home in the Oak Park area. She said she met Mr. Pellicano in 1984 when she was working for an entertainment company in the same building on Sunset Boulevard where he had an office. "What was he like? Very macho," she said. "I grew up in Oklahoma with cowboys. That's a different kind of macho. Anthony's from Chicago. He's a Chicago kind of guy. I found him to be a very intriguing guy." "He's an old-style Italian guy who enjoys living on the edge," she added. "He did what he needed to do. He took care of people's problems. He could be a bully. That's what he did for a living. And he did it very well." How he actually performed his job is of intense interest to the F.B.I. The interest was piqued last year after Anita M. Busch, a reporter at The Los Angeles Times who had been researching the relationship between the actor Steven Seagal and a suspected organized crime figure, found a dead fish and a rose on her car with a cardboard sign that said "Stop." According to court documents, the man who implicated himself in the threat against Ms. Busch told an F.B.I. informant in a tape-recorded conversation that he was offered $10,000 by Mr. Pellicano. The man asserted that Mr. Pellicano was hired by Mr. Seagal to burn Ms. Busch's car. This resulted in an F.B.I. raid on Mr. Pellicano's offices last year during which agents found not only hand grenades and plastic explosives, but also transcripts of phone conversations involving various Hollywood figures. Mr. Pellicano, who pleaded guilty to the weapons charges on Oct. 9, began serving a 27- to 33-month prison sentence last month. He and Mr. Seagal have denied any involvement in the threat against Ms. Busch, the reporter. Federal officials, who have declined to discuss the continuing inquiry, appear to be investigating whether prominent lawyers and others sanctioned or knew about possible illegal wiretapping. Mrs. Pellicano said she had not spoken to the F.B.I. about her former husband's activities, even though she said agents had called her several times a week since his arrest. "The conversations are all very friendly, very polite, nothing threatening," she said. "It's pretty much on a first-name basis. But what is the benefit to me of talking to them? It's more beneficial to me for Anthony to be out of jail than in jail." But Mrs. Pellicano did learn some interesting news from the F.B.I. last month when an agent told her that her former husband was in Las Vegas and getting married again. "The F.B.I. agent hoped to upset me," Mrs. Pellicano said. " I told him, `What do I care?' He started laughing and said, `Can't I rock you at all?' I told him, `The only thing that rocks me is my kids.' That's the exact conversation." Mr. Pellicano, who has been married five times, twice to the same woman, has nine children from the marriages, including four with Mrs. Pellicano. "Instead of flying to Las Vegas the last weekend of his freedom to get married, he could have hugged and kissed his kids goodbye," Mrs. Pellicano said. She added that Mr. Pellicano had made no effort to have their children visit him in prison. Mr. Pellicano's lawyer, Donald Re, did not to respond to phone calls. Mrs. Pellicano insisted during the interviews that she was not bitter and recalled happier times when her husband took her out on weekends to the best restaurants and hotels. But the flow of money dwindled by the time they separated, and in the last year, Mrs. Pellicano said she had scraped by with only a little money from him. "Typical Hollywood wife," she said. "From everything to nothing." [Non-text portions of this message have been removed] 8101 From: James M. Atkinson Date: Fri Dec 26, 2003 1:40pm Subject: Stephanie's Law http://customwire.ap.org/dynamic/stories/N/NY_RESTROOM_VIDEOTAPES?SITE=NYBIN&SECTION=HOME&TEMPLATE=DEFAULT Dec 23, 12:05 PM EST Janitor accused of videotaping students in restroom is found dead PHELPS, N.Y. (AP) -- A janitor accused of secretly videotaping female students and faculty in a restroom at a suburban Rochester high school has died of an apparently self-inflicted gunshot wound, authorities said. Allen Wemes, 52, was suspended from his job as chief custodian at Pittsford Sutherland High School last month after school officials found videotapes that surreptitiously depict a dozen students and faculty in restroom stalls. Wemes, who was married, was found dead Monday night in woods behind his home in Phelps, 40 miles southeast of Rochester, said Ontario County Sheriff Phil Povero. An autopsy was to be performed Tuesday but "there does not appear to be any signs of foul play," Povero said. Wemes was suspended from his job without pay on Nov. 26 after he was discovered with pornographic materials at the school, authorities said. The investigation was still under way and no charges had been filed. Wemes had worked for the Pittsford school district for 20 years. Video voyeurism - secretly capturing images of another person for sexual purposes - became a felony in New York this summer punishable by up to seven years in prison. The so-called Stephanie's Law was named after a Long Island woman, Stephanie Fuller, 29, whose landlord pleaded guilty to trespassing after spying on her for months by hiding a tiny video camera in a smoke detector above her bed. He was fined $1,468, placed on probation for three years and ordered to perform 280 hours of community service. Under the law, most video voyeurism can result in sentences ranging from one year to seven years in prison. The longest sentences apply to cases in which images are disseminated, including over the Internet. 8102 From: Steve Uhrig Date: Fri Dec 26, 2003 1:46pm Subject: Re: Stephanie's Law On 26 Dec 2003 at 14:40, James M. Atkinson wrote: > Janitor accused of videotaping students in restroom is found dead Anybody doing any sort of videotaping sooner or later will end up dead. 8103 From: James M. Atkinson Date: Fri Dec 26, 2003 3:28pm Subject: Secrets, Lies and Media Privilege http://www.alternet.org/story.html?StoryID=17456 SCHEER: Secrets, Lies and Media Privilege By Robert Scheer, AlterNet December 23, 2003 Should government agents, operating on their own authority and in violation of privacy law, be allowed to smear Americans by leaking false information to the media? Are journalists who print those lies protected by the 1st Amendment from revealing their sources, thereby preventing those falsely accused from obtaining justice through lawsuits? Those issues were raised by a federal judge's recent ruling that demanded the names of the sources used by reporters who in 1999 printed false claims that scientist Wen Ho Lee had passed on nuclear secrets to China. Lee was held in solitary confinement for nine months before the government's case collapsed and 58 of the 59 charges against him were dropped. The conservative Reagan-appointed judge in the case said in freeing Lee, "I sincerely apologize to you, Dr. Lee, for the unfair manner in which you were held in custody by the executive branch." To sue for violation of his rights under the federal Privacy Act, Lee must identify the government agencies that leaked the defamatory information. Last week, New York Times reporters Jeff Gerth and James Risen, who did the most to hype claims of Lee spying for China, for which the paper later apologized, defied the judge's order to reveal their sources. (Three other reporters - including one from the Los Angeles Times - are also under subpoena.) A spokesperson for the New York Times defended its reporters' actions, saying they "chose to take advantage of their 1st Amendment privilege on identifying sources." What about the constitutionally protected rights of Lee, whose reputation, livelihood and freedom were destroyed by the irresponsible reporting of the Times? That is often the dire consequence of leaked government smears and is a serious concern in the defamation of individuals accused after 9/11 of having links to terrorism under the USA Patriot Act. Yet the knee-jerk reaction of the media is to claim a 1st Amendment protection, even if it results in defaming individuals on the basis of secret sources. That claim of unfettered privilege was rejected by the U.S. Supreme Court the last time it visited this issue; it ruled in 1972 that reporters were required to reveal sources if the information went "to the heart" of a case and could not otherwise be obtained. That's exactly the situation faced by Lee. In an attempt to limit his request for information to what is essential to proceed with the privacy case, Lee's attorney, Brian Sun, told the judge he would settle for knowing the names of the government agencies rather than the individuals who leaked Lee's polygraph report, classified conversations with his superiors and other information. Indeed, Lee's polygraphs, taken voluntarily and stamped with a notation that it was covered by the Privacy Act, tended to exonerate him but were distorted in the leaks to the media. Journalists make the argument that it is sometimes necessary to protect whistle-blowers from reprisals for exposing the truth. However, that argument is undermined by the increasingly common practice of government sources using reporters to spread falsehoods or discredit foes, knowing reporters will hide their identity. A recent example involves members of the Bush administration who allegedly leaked to reporters a CIA agent's identity, a felony, to discredit her husband, former Ambassador Joseph C. Wilson IV, a Bush critic. A criminal investigation into the matter has been stymied as reporters invoke their right to not reveal their sources. Clearly, a truly free press would have a higher stake in exposing the government's manipulation of reporters - and the truth - than in trafficking in innuendo and unsubstantiated rumor. In the Lee case, it is difficult to claim that a reporter's access to secret sources was vital to the functioning of a free press when it is clear that the reporters were being used to spread falsehoods. An example is the New York Times' front-page story about Chinese spying headlined "China Stole Secrets for Bombs, U.S. Aides Say." Those "aides" were never named, and the government's subsequent indictment of Lee, after months of pressure from such stories in the Times and other media, did not even claim that Lee had been spying for China. In the end, in a plea bargain forced by prosecutors threatening Lee with life in prison, the scientist admitted to one count of mishandling government data. The data had not even been classified as secret when Lee mishandled it. But no matter, his reputation and career had been destroyed, leaving U.S. District Judge James Parker to conclude that the government's treatment of Lee "embarrassed our entire nation and each of us who is a citizen of it." Lee is now exercising a sacred legal right - that of the accused to confront his accuser. Free-press advocates should be more interested in exposing how the government manipulated the media to malign a loyal citizen than in defending the right of reporters to protect anonymous sources. Robert Scheer writes a weekly column for The Times and is co-author of "The Five Biggest Lies Bush Told Us About Iraq" (Seven Stories Press/Akashic Books, 2003). From: 1RCM <1RCM@M...> Date: Tue Dec 12, 2000 4:33pm Subject: Re: tscm ethics and training Marc, Not too many years ago I found myself at the juncture that you are at. By a combination of research and luck I was able to find on my own some very good basic and advanced training. Also I was fortunate enough to be accepted into a TSCM-related association where I am privileged to be able to 'hang' with some of the most preeminent folks in the industry. Having once 'been there' myself I applaud your desire to find and to follow the correct career path. So please e-mail me off list with a bit more about yourself, where you presently are in the field and where you intend to go. I'll be more than happy to reply with my personal thoughts and observations as far as what I've seen along the way during my own journey. But remember, they are just my thoughts and observations - obviously your own mileage may vary. 'Just Another Bob' 1RCM@M... ----- Original Message ----- From: To: Sent: Tuesday, December 12, 2000 12:11 PM Subject: [TSCM-L] tscm ethics and training > I am a new member to the group. After reading the 2000+ archived posts > it seems to me that a major topic of discussion (second only to > humor ;)) is the lack of ethics and proper training. I can possibly > understand the lack of training and poor ethics. After first becoming > interested in TSCM a year or so ago i jumped in to research with both > feet. I have purchased several books (and after reading the archives > have realized i need to add to the library), combed the net, and tried > to make some actual contact with people in the industry (by > telephone, email, and this list) with little or no success. I have > followed the suggested path of training as outlined on TSCM.com. > However when attempting to get serious information on specific > training I run in to roadblocks. I can see where some people might > turn to a 2 day seminar and hang up a shingle. I wish to avoid this > and obtain the proper training and experience. However, I cannot > imagine where to go next if the members of this list are unable to > suggest guidance. The only options that seem to be left are the > charlatans that everyone in this group so wants the novice to avoid. > > Perplexed, > Marc > > ps- is it the hotmail email? > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2073 From: James M. Atkinson, Comm-Eng Date: Tue Dec 12, 2000 10:40pm Subject: Irishman, an Englishman and Claudia Schiffer There was an Irishman, an Englishman and Claudia Schiffer sitting together in a carriage in a train going through Tasmania. Suddenly the train went through a tunnel and as it was an old style train, there were no lights in the carriages and it went completely dark. Then there was this kissing noise and the sound of a really loud slap. When the train came out of the tunnel, Claudia Schiffer and the Irishman were sitting as if nothing had happened and the Englishman had his hand against his face as he had been slapped there. The Englishman was thinking: 'The Irish fella must have kissed Claudia Schiffer and she missed him and slapped me instead.' Claudia Schiffer was thinking: 'The English fella must have tried to kiss me and actually kissed the Irishman and got slapped for it.' And the Irishman was thinking: 'This is great. The next time the train goes through a tunnel I'll make another kissing noise and slap that Englishman again. -- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, The hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. ======================================================================= 2074 From: Date: Tue Dec 12, 2000 8:58pm Subject: Re: tscm ethics and training Read the articles at swssec.com. Read Mr. Whiddens books. Check out www.martykaiser.com Read my books. Read the faq at www.fusionsites.com. This will get you off to a better start. But don't expect to master the countermeasures business from books or articles or training classes. It's sort of like playing the piano. With practice, most people can learn enough to be 'good' but to really excel, you need to have a natural aptitude for tradecraft. --- solo_sneaker@h... wrote: > I am a new member to the group. After reading the > 2000+ archived posts > it seems to me that a major topic of discussion > (second only to > humor ;)) is the lack of ethics and proper training. > I can possibly > understand the lack of training and poor ethics. > After first becoming > interested in TSCM a year or so ago i jumped in to > research with both > feet. I have purchased several books (and after > reading the archives > have realized i need to add to the library), combed > the net, and tried > to make some actual contact with people in the > industry (by > telephone, email, and this list) with little or no > success. I have > followed the suggested path of training as outlined > on TSCM.com. > However when attempting to get serious information > on specific > training I run in to roadblocks. I can see where > some people might > turn to a 2 day seminar and hang up a shingle. I > wish to avoid this > and obtain the proper training and experience. > However, I cannot > imagine where to go next if the members of this list > are unable to > suggest guidance. The only options that seem to be > left are the > charlatans that everyone in this group so wants the > novice to avoid. > > Perplexed, > Marc > > ps- is it the hotmail email? > > > > > -------------------------- eGroups Sponsor > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== > TSKS > __________________________________________________ Do You Yahoo!? Yahoo! Shopping - Thousands of Stores. Millions of Products. http://shopping.yahoo.com/ 2075 From: Date: Tue Dec 12, 2000 9:30pm Subject: Cellphone service interruption? The following is part of the text of a poster placed on a traffic control box in the Embarcadero area. The poster was partially torn off which is why only part of the text is here. I called the FCC number below but nothing on the menu related to this poster. Has anyone heard about such a thing as interruption of radio activity? ATTENTION CELLULAR CUSTOMERS NOTICE OF INTERRUPTION IN CELLULAR SERVICE September 20 - 23, 2000 In order to assure public safety the following transmission activity within the City and County of San FranciscoÖ Anti-terrorism and Effective Death Penalty Act of 1996. Any will be prosecuted to the fullest extent of the law and is punishable by a $10,000.00 fine operation of any short-wave or Citizens Band radio Öreport and order and Third Notice of Proposed Ö19451 Chairman Kennard, Commissioners Ness Öational call center 888-225-5322 www.fcc.gov 2076 From: Charles@t... Date: Tue Dec 12, 2000 9:20pm Subject: Re: Cellphone service interruption? Whaaa? sounds utterly ridiculous to me. shut down all radio transmissions? impossible. my $.02 charles ----- Original Message ----- From: To: Sent: Tuesday, December 12, 2000 10:30 PM Subject: [TSCM-L] Cellphone service interruption? > The following is part of the text of a poster placed on a traffic > control box in the Embarcadero area. The poster was partially torn off > which is why only part of the text is here. > I called the FCC number below but nothing on the menu related to this > poster. > Has anyone heard about such a thing as interruption of radio activity? > > ATTENTION CELLULAR CUSTOMERS > NOTICE OF INTERRUPTION > IN CELLULAR SERVICE > September 20 - 23, 2000 > > In order to assure public safety the following transmission activity > within the City and County of San Francisco. > > Anti-terrorism and Effective Death Penalty Act of 1996. Any > will be prosecuted to the fullest extent of the law and is punishable > by a $10,000.00 > fine > operation of any short-wave or Citizens Band radio > .report and order and Third Notice of Proposed > .19451 Chairman Kennard, Commissioners Ness > .ational call center 888-225-5322 www.fcc.gov > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > 2077 From: A Grudko Date: Wed Dec 13, 2000 1:46am Subject: Re: A tale of corporate espionage ----- Original Message ----- > A display of "full headers" should show the originators "From:" line. > If you are using a windows email client you may need to change this > setting within the mail clients "options" or "preferences". Other than > the occassional "attempted" spoof mail, all emails I have recieved via > this list have contained: From:, To: and Reply-To: Thanks Niko I use a simple version of Outlook Express that came installed and set it up to display as little detal as possible to avoid cluttering up the page. Usually to get a reply address I right click of the message name in the inbox field and then on properties. That action also brings up a Detail tag which gives a lot more info on the message's path. But some people use remailers or third party addresses. I like to give all my details in my sig. file, and it sits quietly at the bottom if the page so if anyone wants to phone me at 3 in the morning (last week a guy in the US forgot the timezone thing!!) it's right there.Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2078 From: A Grudko Date: Wed Dec 13, 2000 2:33am Subject: Re: Cellphone service interruption? Sounds like a hoax. Maybe someone (at the last given number) trying to harvest info on gullable cell users, maybe for cloning purposes. What is an 888 number ? We have 086 numbers where the subscriber pays a $ a minute or so to be on hold and the fees are split with the owner of the 086 number. There have been plenty of scams using that. ----- Original Message ----- > Has anyone heard about such a thing as interruption of radio activity? > NOTICE OF INTERRUPTION > IN CELLULAR SERVICE > September 20 - 23, 2000 Presumably nothing happend those dates. Check your itemised billing. > In order to assure public safety the following transmission activity > within the City and County of San Francisco. > Anti-terrorism and Effective Death Penalty Act of 1996. Sounds like kids - is there such an Act. What would it have to do with cellphpnes and CBs (yes, I know that's how they bust Pablo Escobar, but they didn't advertise the operation on posters in advance!) > Any will be prosecuted to the fullest extent of the law and is punishable > by a $10,000.00 fine Oooooh... > operation of any short-wave or Citizens Band radio And the connection to cellular phones, operating almost a gig away? What about the spectra inbetween (like 25 killiwatt broadcast stations). Oh, hey, don't forget to switch off all those radios at the airport (I'd stay off any flightpath those 3 days). Gimme a break! > .report and order and Third Notice of Proposed > .19451 Chairman Kennard, Commissioners Ness > .ational call center 888-225-5322 www.fcc.gov Easy enough to confirm. Maybe a disgruntled type who wants to flood the Commissioner's office with bogus calls. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2079 From: Date: Wed Dec 13, 2000 4:12am Subject: Re: Cellphone service interruption? Good grief. Ask a question and what do I get? Where do you come up with "Last given number? and "Cloning"? "D.P.M., Grad I.S, (S.A.)CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence"? Whatever "intelligence" you provide to your clients, I hope it has nothing to do with the cellular radio system. May I suggest you read the post and think about it before replying? Sheesh... a - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 > 11) 465 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom > "When you need it done right - first time" 2080 From: Date: Wed Dec 13, 2000 4:21am Subject: Stuff for sale Last chance to buy stuff listed at www.fusionsites.com If not sold, most of it goes in long term storage and the books go to Goodwill or the dumpster. I am seriously out of space here... 2081 From: Bryan Herbert Date: Wed Dec 13, 2000 3:50am Subject: Re: Cellphone service interruption? There are at least 3 toll free numbers now here in the US (800, 877, and 888)... Im not even sure there is an "Anti-Terrorism and Death Penalty Act of 1996" especially relating to the use of cellphones and two way radio equipment while mobile, however, some cities here in California and in other states are passing laws prohibiting the use of and in some cases possession of cell phones and radio equipment while driving. There is one law still on the books here in Los Angeles from the early 1940s that prohibits shortwave and scanning receivers in cars unless permitted by the sheriff or fire warden, if caught it could result in a fine of up to $250 depending on the number of convictions you net in one year (Title 13, Chapter 13.10: Public Peace, Morals and Welfare-Official Radio Broadcast Receivers) but not to worry this law hasnt been enforced since I think the start of the "CB" era. A Grudko wrote: > Sounds like a hoax. Maybe someone (at the last given number) trying to > > harvest info on gullable cell users, maybe for cloning purposes. What > is an > 888 number ? We have 086 numbers where the subscriber pays a $ a > minute or > so to be on hold and the fees are split with the owner of the 086 > number. > There have been plenty of scams using that. > > ----- Original Message ----- > > Has anyone heard about such a thing as interruption of radio > activity? > > NOTICE OF INTERRUPTION > > IN CELLULAR SERVICE > > September 20 - 23, 2000 > > Presumably nothing happend those dates. Check your itemised billing. > > > In order to assure public safety the following transmission activity > > > within the City and County of San Francisco. > > Anti-terrorism and Effective Death Penalty Act of 1996. > > Sounds like kids - is there such an Act. What would it have to do with > > cellphpnes and CBs (yes, I know that's how they bust Pablo Escobar, > but they > didn't advertise the operation on posters in advance!) > > > Any will be prosecuted to the fullest extent of the law and is > punishable > > by a $10,000.00 fine > > Oooooh... > > > operation of any short-wave or Citizens Band radio > > And the connection to cellular phones, operating almost a gig away? > What > about the spectra inbetween (like 25 killiwatt broadcast stations). > > Oh, hey, don't forget to switch off all those radios at the airport > (I'd > stay off any flightpath those 3 days). Gimme a break! > > > .report and order and Third Notice of Proposed > > .19451 Chairman Kennard, Commissioners Ness > > .ational call center 888-225-5322 www.fcc.gov > > Easy enough to confirm. Maybe a disgruntled type who wants to flood > the > Commissioner's office with bogus calls. > -- Bryan Herbert (661) 714-2611 AIM: EAVE5DR0P ICQ: 92114706 http://www.geocities.com/b_herbert_91321/index.html 2082 From: Damien O'Rourke Date: Wed Dec 13, 2000 4:22am Subject: Re: Irishman, an Englishman and Claudia Schiffer Being Irish I must admit this gave me a good laugh. Damo. "James M. Atkinson, Comm-Eng" wrote: > There was an Irishman, an Englishman and Claudia Schiffer sitting > together in a carriage in a train going through Tasmania. Suddenly the > train went through a tunnel and as it was an old style train, there were > no lights in the carriages and it went completely dark. Then there was > this kissing noise and the sound of a really loud slap. > > When the train came out of the tunnel, Claudia Schiffer and the Irishman > were sitting as if nothing had happened and the Englishman had his hand > against his face as he had been slapped there. > > The Englishman was thinking: 'The Irish fella must have kissed Claudia > Schiffer and she missed him and slapped me instead.' > > Claudia Schiffer was thinking: 'The English fella must have tried to > kiss me and actually kissed the Irishman and got slapped for it.' > > And the Irishman was thinking: 'This is great. The next time the train > goes through a tunnel I'll make another kissing noise and slap that > Englishman again. > -- > > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > The hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > ======================================================================= > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 2083 From: mike f Date: Wed Dec 13, 2000 8:02am Subject: RE: Cellphone service interruption? You can check here for info on toll free numbers Prefixes http://www.tollfreenumbers.com/ later4,mike f From: Bryan Herbert [mailto:eavesdrop@e...] Sent: Wednesday, December 13, 2000 4:50 AM To: TSCM-L@egroups.com Subject: Re: [TSCM-L] Cellphone service interruption? There are at least 3 toll free numbers now here in the US (800, 877, and 888)... Im not even sure there is an "Anti-Terrorism and Death Penalty Act of 1996" especially relating to the use of cellphones and two way radio equipment while mobile, however, some cities here in California and in other states are passing laws prohibiting the use of and in some cases possession of cell phones and radio equipment while driving. There is one law still on the books here in Los Angeles from the early 1940s that prohibits shortwave and scanning receivers in cars unless permitted by the sheriff or fire warden, if caught it could result in a fine of up to $250 depending on the number of convictions you net in one year (Title 13, Chapter 13.10: Public Peace, Morals and Welfare-Official Radio Broadcast Receivers) but not to worry this law hasnt been enforced since I think the start of the "CB" era. A Grudko wrote: > Sounds like a hoax. Maybe someone (at the last given number) trying to > > harvest info on gullable cell users, maybe for cloning purposes. What > is an > 888 number ? We have 086 numbers where the subscriber pays a $ a > minute or > so to be on hold and the fees are split with the owner of the 086 > number. > There have been plenty of scams using that. > > ----- Original Message ----- > > Has anyone heard about such a thing as interruption of radio > activity? > > NOTICE OF INTERRUPTION > > IN CELLULAR SERVICE > > September 20 - 23, 2000 > > Presumably nothing happend those dates. Check your itemised billing. > > > In order to assure public safety the following transmission activity > > > within the City and County of San Francisco. > > Anti-terrorism and Effective Death Penalty Act of 1996. > > Sounds like kids - is there such an Act. What would it have to do with > > cellphpnes and CBs (yes, I know that's how they bust Pablo Escobar, > but they > didn't advertise the operation on posters in advance!) > > > Any will be prosecuted to the fullest extent of the law and is > punishable > > by a $10,000.00 fine > > Oooooh... > > > operation of any short-wave or Citizens Band radio > > And the connection to cellular phones, operating almost a gig away? > What > about the spectra inbetween (like 25 killiwatt broadcast stations). > > Oh, hey, don't forget to switch off all those radios at the airport > (I'd > stay off any flightpath those 3 days). Gimme a break! > > > .report and order and Third Notice of Proposed > > .19451 Chairman Kennard, Commissioners Ness > > .ational call center 888-225-5322 www.fcc.gov > > Easy enough to confirm. Maybe a disgruntled type who wants to flood > the > Commissioner's office with bogus calls. > -- Bryan Herbert (661) 714-2611 AIM: EAVE5DR0P ICQ: 92114706 http://www.geocities.com/b_herbert_91321/index.html ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2084 From: Date: Wed Dec 13, 2000 10:26am Subject: Re: tscm ethics and training --- In TSCM-L@egroups.com, wrote: > Read the articles at swssec.com. > Read Mr. Whiddens books. > Check out www.martykaiser.com > Read my books. Read the faq at www.fusionsites.com. > This will get you off to a better start. > But don't expect to master the countermeasures > business from books or articles or training classes. > It's sort of like playing the piano. With practice, > most people can learn enough to be 'good' but to > really excel, you need to have a natural aptitude for > tradecraft. > Thank you very much. I appreciate any guidance. I do have one of Mr. Whiddens boks, and plan on ordering more. I will check out the mentioned sites. How does one go about getting quality, knowledgeable, and most of all "real" hands-on training, after completing an academic base? Once again thanks. > > > --- solo_sneaker@h... wrote: > > I am a new member to the group. After reading the > > 2000+ archived posts > > it seems to me that a major topic of discussion > > (second only to > > humor ;)) is the lack of ethics and proper training. > > I can possibly > > understand the lack of training and poor ethics. > > After first becoming > > interested in TSCM a year or so ago i jumped in to > > research with both > > feet. I have purchased several books (and after > > reading the archives > > have realized i need to add to the library), combed > > the net, and tried > > to make some actual contact with people in the > > industry (by > > telephone, email, and this list) with little or no > > success. I have > > followed the suggested path of training as outlined > > on TSCM.com. > > However when attempting to get serious information > > on specific > > training I run in to roadblocks. I can see where > > some people might > > turn to a 2 day seminar and hang up a shingle. I > > wish to avoid this > > and obtain the proper training and experience. > > However, I cannot > > imagine where to go next if the members of this list > > are unable to > > suggest guidance. The only options that seem to be > > left are the > > charlatans that everyone in this group so wants the > > novice to avoid. > > > > Perplexed, > > Marc > > > > ps- is it the hotmail email? > > > > > > > > > > -------------------------- eGroups Sponsor > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== > > TSKS > > > > > __________________________________________________ > Do You Yahoo!? > Yahoo! Shopping - Thousands of Stores. Millions of Products. > http://shopping.yahoo.com/ 2085 From: Sky Date: Wed Dec 13, 2000 10:35am Subject: Re: Stuff for sale I have a probably 'basic' question- I went to your site and got a 'Runtime' error- said: Line 1, User Undefined- A little box asked me if I wanted to debug- I replied no I don't know what that means- but I can see the site just fine- sky From: > Last chance to buy stuff listed at www.fusionsites.com > > If not sold, most of it goes in long term storage and the books go to > Goodwill or the dumpster. > > I am seriously out of space here... 2086 From: Talisker Date: Wed Dec 13, 2000 11:54am Subject: Re: Irishman, an Englishman and Claudia Schiffer HUMOR > Being Irish I must admit this gave me a good laugh. Being English I too enjoyed it :o) Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo talisker@n... The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "Damien O'Rourke" To: Sent: Wednesday, December 13, 2000 10:22 AM Subject: Re: [TSCM-L] Irishman, an Englishman and Claudia Schiffer > Being Irish I must admit this gave me a good laugh. > > Damo. > > "James M. Atkinson, Comm-Eng" wrote: > > > There was an Irishman, an Englishman and Claudia Schiffer sitting > > together in a carriage in a train going through Tasmania. Suddenly the > > train went through a tunnel and as it was an old style train, there were > > no lights in the carriages and it went completely dark. Then there was > > this kissing noise and the sound of a really loud slap. > > > > When the train came out of the tunnel, Claudia Schiffer and the Irishman > > were sitting as if nothing had happened and the Englishman had his hand > > against his face as he had been slapped there. > > > > The Englishman was thinking: 'The Irish fella must have kissed Claudia > > Schiffer and she missed him and slapped me instead.' > > > > Claudia Schiffer was thinking: 'The English fella must have tried to > > kiss me and actually kissed the Irishman and got slapped for it.' > > > > And the Irishman was thinking: 'This is great. The next time the train > > goes through a tunnel I'll make another kissing noise and slap that > > Englishman again. > > -- > > > > ======================================================================= > > The First, The Largest, The Most Popular, and The Most Complete TSCM, > > Technical Security, and Counterintelligence Site on the Internet. > > ======================================================================= > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 http://www.tscm.com/ > > Gloucester, MA 01931-8008 jmatk@tscm.com > > ======================================================================= > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > The hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > ======================================================================= > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2087 From: Steve Uhrig Date: Wed Dec 13, 2000 4:03pm Subject: Re: TSCM training Once upon a midnight dreary, solo_sneaker@h... pondered, weak and weary: > How does one go about getting quality, knowledgeable, and most > of all "real" hands-on training, after completing an academic > base? The only practical available training in the private sector, as far as I am aware, is Glenn Whidden's and Ray Jarvis. Unless you have a certain amount of electronics, communications and intelligence background, I would strongly recommend Glenn's training initially. He can help you achieve the level to where you will get the most from Jarvis' offerings. There may be some others, but they either are too sporadic (Texas A&M), or vendor specific (ISA, REI, etc.), or not credible (too many to mention). There's nothing wrong with the vendor training if you have their exact equipment, and if you do you should investigate their training. However, see below. Glenn Whidden - http://www.espionbusiness.com/index2.ivnu Books, training, BECCA info (Glenn is located in the D.C. suburbs of Maryland) Ray Jarvis - http://www.jarvisinternational.com/ Training (Tulsa, Oklahoma) Re equipment, do not buy anything until you have been trained. Read that previous sentence again. You are likely to completely readjust your thinking about equipment after being trained. You do not start in the TSCM business by buying some gadget from a spy shop, some quality used gear from a reputable source, or even a new OSCOR. There also is a lot of used TSCM gear around, most sold by people who bought it while starry eyed seeing nonexistent dollar signs and who later sold it at a huge loss in order to pay the rent. Anything you can buy new you will find used if you look around some. And in training, you likely will develop contacts to obtain used gear at reasonable prices. Few ever recover their investment in TSCM equipment. Do *genuine* market research before spending any money beyond books. There is a world of difference between local PIs saying they get calls all the time and would be glad to refer them to you, and someone actually putting money down on the table. Likewise with law firms and corporate entities. By far the bulk of your effort and possibly money ultimately should be invested in marketing. People do not knock on your door and wave money at you to do a sweep. Neither do you just go knock on doors and start sweeping. You need a comprehensive marketing plan involving many phases of soliciting many clients. It takes years to where anyone will turn a profit considering the necessary investment in training and equipment. Most never do. Anyone believing differently probably is not living in the real world of conducting professional TSCM inspections. Most persons interested in the field from a pecuniary (sp?) point of view would ultimately earn more referring any interested persons to a genuinely qualified, equipped and experienced practitioner. PIs in the local area I service primarily (MD, DC, VA, PA, DE) largely have stopped doing their own $500 sweeps and refer them to me. The referral I pay them is as much or more than they would get for doing the work themselves. And they are able to look at themselves in the mirror as well as avoid potential liability for *when* (NOT if) they ultimately screw up. All that said, anyone seriously interested should seek professional training as referenced above, and find a local cooperative *competent, reputable and ethical* local sweeper who will use you as an apprentice. Virtually all the real players in the business apprenticed under someone else. Be honest with them, work hard for them, learn the business at someone else's expense, and you both will benefit. Maybe you can learn marketing by referring anything you happen across to this person, and earn a referral at the same time. Most professional sweepers are fairly willing to mentor a serious student and do not feel threatened by them. We welcome the assistance. Be prepared to carry all those heavy cases from the van up 3 flights of stairs to the job! If nothing else sinks in from all the above, remember TSCM ultimately is your mind against the mind of the bad guy. Equipment merely is a means to that end, not the end itself. What's between your ears is far more important than what's in the back of your van. You have the right idea about seeking competent training, and I commend you for that. A respected member of this list, himself an extremely experienced though now retired sweeper, made a comment to the effect that he would be more effective sweeping with a screwdriver and flashlight than most on this list with any equipment they cared to name. I wouldn't disagree, in his case. A significant part of your lifetime spent bugging and debugging teaches you how the bad guys think, and that is what matters most. One book Mr. Shannon did not mention in his list of reference material is Ted Swift's book on telephone countermeasures. Highly recommended for both the novice and professional. Anyone interested in TSCM, either as a profession or merely a curiousity, should have this book. Ted Swift - http://www.angelfire.com/biz/investigator/index.html Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2088 From: St. Clair, James Date: Wed Dec 13, 2000 2:29pm Subject: Mossad spy arrest Mossad: A Sentence and Strike action. CVNI.net December 12, 2000 In February 1998 an Israeli agent, now known only as Yitzhak Ben-Tal, = was arrested in Switzerland by two Swiss Policeman after being caught = attempting to place a wire tap on the telephone line of a suspected = Hezbollah operative. Abdullah el-Zein a Swiss citizen of Lebanese = descent denied any connection with the Hezbollah and claimed to run an = Islamic Centre. The centre, Ahl Al-Beit Islamic Centre has links with = Lebanon and Iran. El-Zein was also described as a 'car salesman'. Ben -Tal was a member of a team of five Mossad agents tasked to perform = the operation in Kenitz, a town near Berne, the others quickly making = their escape due to the inability of the Swiss Policemen to realise that = they were dealing with a case of espionage. Ben-Tal was caught carrying = a bag, of diplomatic origin, containing bugging equipment. The equipment = was listed as a cell phone connected to 24 batteries, which when plugged = into Abdullah el-Zein's telephone line, would have called a monitoring = centre every time el-Zein picked his handset up. In court the Swiss Police officers recounted how they caught Ben-Tal, = and others, installing listening devices in the home of the Lebanese car = dealer.Ben-Tal, at the time of his arrest admitted his part in the = surveillance operation and was remanded. This process took place because = the technical equipment was contained in a Diplomatic Bag known to have = entered Switzerland via Israeli diplomatic mail. Ben-Tal was later = released on =A32 million bail, paid by Israel in return for a promise = that the agent, Ben-Tal, would return to Israel to face trial. The hearing, two years later, was held in front of 5 judges and Ben-Tal = was found guilty of acts committed illegally for a foreign state, of = political espionage and of repeated use of false identity documents. The = trial lasted a week and at the conclusion the charge of illegal phone = tapping was dropped. The presiding judge, Hans Wiprachtiger stated that "The crimes were = considerable. Switzerland's sovereignty was violated in a callous way." = Ben-Tal was barred from entering Swiss territory for five years, fined = 100,000 Swiss Francs and received a suspended sentence of twelve months. = The prosecution had originally asked for a 5,000 Franc fine and a jail = term of 15 months. Ehud Barak, Israel's prime minister expressed satisfaction at the = sentence attracted by Ben-Tal. However the decision to allow Ben-Tal to = stand trial was made by the head of Mossad, Ephraim Halevy. This = decision led to anger within Mossad and the agents apparently considered = strike action , the greatest anger said to be within the specialist = units charged with data hacking, electronic eavesdropping and = assassination. This obvious humiliation has led to Halevy curbing the agency's = activities in Europe of spying on Arab Embassies and other = counter-terrorism activities. Even actions in the Arab world were known = to have ceased. It is reported that Ehud Barak offered Halevy's post to Ami Ayalon, but = as yet there has been no appointment. Ami Ayalon is the head of Shin = Beth, the Israeli internal security service. 2089 From: Date: Thu Dec 14, 2000 11:04am Subject: Re: Re: tscm ethics and training This question can be better answered by Steve Uhrig as he is on top of things and I am not; I stopped writing about surveillance. --- solo_sneaker@h... wrote: > --- In TSCM-L@egroups.com, wrote: > > Read the articles at swssec.com. > > Read Mr. Whiddens books. > > Check out www.martykaiser.com > > Read my books. Read the faq at > www.fusionsites.com. > > This will get you off to a better start. > > But don't expect to master the countermeasures > > business from books or articles or training > classes. > > It's sort of like playing the piano. With > practice, > > most people can learn enough to be 'good' but to > > really excel, you need to have a natural aptitude > for > > tradecraft. > > > > > Thank you very much. I appreciate any guidance. I do > have one of Mr. > Whiddens boks, and plan on ordering more. I will > check out the > mentioned sites. How does one go about getting > quality, knowledgeable, > and most of all "real" hands-on training, after > completing an academic > base? > > Once again thanks. > > > > > > > --- solo_sneaker@h... wrote: > > > I am a new member to the group. After reading > the > > > 2000+ archived posts > > > it seems to me that a major topic of discussion > > > (second only to > > > humor ;)) is the lack of ethics and proper > training. > > > I can possibly > > > understand the lack of training and poor ethics. > > > After first becoming > > > interested in TSCM a year or so ago i jumped in > to > > > research with both > > > feet. I have purchased several books (and after > > > reading the archives > > > have realized i need to add to the library), > combed > > > the net, and tried > > > to make some actual contact with people in the > > > industry (by > > > telephone, email, and this list) with little or > no > > > success. I have > > > followed the suggested path of training as > outlined > > > on TSCM.com. > > > However when attempting to get serious > information > > > on specific > > > training I run in to roadblocks. I can see where > > > some people might > > > turn to a 2 day seminar and hang up a shingle. I > > > wish to avoid this > > > and obtain the proper training and experience. > > > However, I cannot > > > imagine where to go next if the members of this > list > > > are unable to > > > suggest guidance. The only options that seem to > be > > > left are the > > > charlatans that everyone in this group so wants > the > > > novice to avoid. > > > > > > Perplexed, > > > Marc > > > > > > ps- is it the hotmail email? > > > > > > > > > > > > > > > -------------------------- eGroups Sponsor > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is > strength" > > > > > > To subscribe to the TSCM-L mailing list > visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > > =================================================== > > > TSKS > > > > > > > > > __________________________________________________ > > Do You Yahoo!? > > Yahoo! Shopping - Thousands of Stores. Millions of > Products. > > http://shopping.yahoo.com/ > > > > -------------------------- eGroups Sponsor > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== > TSKS > __________________________________________________ Do You Yahoo!? Yahoo! Shopping - Thousands of Stores. Millions of Products. http://shopping.yahoo.com/ 2090 From: A Grudko Date: Thu Dec 14, 2000 10:59am Subject: Re: Re: Cellphone service interruption? ----- Original Message ----- From: > Whatever "intelligence" you provide to your clients, I hope it has > nothing to do with the cellular radio system. Sorry, I thought I was making useful comments. Thank you to those members who answered my query on the 888 prefix. Here in South Africa we only have 0800 as a toll free number, but many people assume that our 0860 prefix is also toll free when it is charged at a much higher rate than normal. Many parents have faced huge phone bills after their teenage kids have spent hours listening to stories about their favourite pop/soap stars. It's interesting to learn how systems operate in other countries. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2091 From: Date: Thu Dec 14, 2000 1:30pm Subject: Re: Re: Cellphone service interruption? There was supposed to be a ':-)' after that but I guess I goofed. I was being facetious rather than insulting. My appoligies. M Shannon --- A Grudko wrote: > ----- Original Message ----- > From: > > Whatever "intelligence" you provide to your > clients, I hope it has > > nothing to do with the cellular radio system. > > > Sorry, I thought I was making useful comments. > > Thank you to those members who answered my query on > the 888 prefix. Here in > South Africa we only have 0800 as a toll free > number, but many people assume > that our 0860 prefix is also toll free when it is > charged at a much higher > rate than normal. Many parents have faced huge phone > bills after their > teenage kids have spent hours listening to stories > about their favourite > pop/soap stars. > > It's interesting to learn how systems operate in > other countries. > > Andy Grudko. D.P.M., Grad I.S, (S.A.) > CEO - Grudko Wilson Associates (SA) (Pty) Ltd - > Crime investigation & > intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - > US - Canada - > Australia - Israel - Bosnia. Agents in 41 countries > - www.grudko.com - (+27 > 11) 465 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, > SAMLF, SCIP (SA > Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, > AmChamCom > "When you need it done right - first time" > > > > -------------------------- eGroups Sponsor > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== > TSKS > __________________________________________________ Do You Yahoo!? Yahoo! Shopping - Thousands of Stores. Millions of Products. http://shopping.yahoo.com/ 2092 From: Steve Uhrig Date: Thu Dec 14, 2000 3:16pm Subject: Radiation measuring kits for sale Hello list, I am repeating this because we are rapidly running out of room here and I would like to move these before we pull the end of year inventory. There are about 25 kits remaining out of the original 60. Note the price decrease and offer for discounted multiple orders. Buy some for resale in your group or community. ---------------------------------- I have some Canadian government surplus radiation measuring sets in new unused condition. These things are 60s and 70s vintage, purchased, never issued, and now excessed. Periodic calibration was performed during storage. Everything is in excellent physical condition and all equipment was built to the then- superb military standards. It probably is not possible anymore to buy equipment this well built and rugged. Each kit contains 10 dosimeters, 2 chargers and 2 handheld radiation meters. The chargers and meters are powered by a single D cell each. The dosimeters, for those who haven't seen them, are small tubes about the size of a fat pen you look through at a light. You see a round dial with a vertical needle that moves left to right across scale marked in Roentgens. No batteries used. The thing basically is an electrometer with the needle in a glass chamber pressurized with some sort of gas. There is an electrostatic charge on the needle holding it to one edge. I am speculating on the rest, but I believe beta and gamma rays somehow knock electrons loose from the gas atoms and they collect on the needle changing its charge. The needle moves across the screen in proportion to how much radiation the thing has seen. The dosimeter measures cumulative radiation over time. (minutes to months). These things always were extremely expensive, hundreds of dollars each in 1960 dollars. My father many years ago worked in areas where radiation was used, and he was required to wear one of these. I remember even back then the concern about cost. The charger is about the size of a fat cheese sandwich. You press the dosimeter down on a contact which activates a light so you can see the reading. It also activates an inverter which generates high voltage applied to the needle. A pot varies the voltage to zero the needle (called "charging"). Easy to do and takes only a few seconds. The chargers also are very rugged, with a schematic inside the cover and a spare bulb also. Simple point to point wiring, standard components, plenty of room inside. Easy to service if that ever would be necessary. The dosimeters are in various ranges but mostly in the high end. These were intended for serious up close and personal use, not reading the radiation from a radium wristwatch dial. I have mixed the values up as much as I could to give a variety of ranges with each kit. The dosimeters have a pocket clip, but the calibration assumes you will wear it at waist level although you see technoweenies wearing them in a pocket protector. The meters measure instant radiation, not cumulative like the dosimeters. They are simple and rugged also. 3 controls: a zero, a battery test and on/off. Each is in a new canvas O.D. carrying case with shoulder strap. Included is some literature for the layman on shelter construction and the like. Dated but still valid. I'm not as concerned about weapons of war as I am about Peachbottom Atomic Power Plant ten miles from my home. There is a warning siren on my street so we are considered in the danger area. If something happened, I rather doubt the government would tell the truth. With this stuff I can check radiation levels for myself, both immediately and over time. I got this gear into the country at the last instant. As of the end of August, the import of this gear into the U.S. is now prohibited as an implement of war. Even though they are totally defensive in nature, importing them now carries the same penalty as importing an illegal weapon. There are no restrictions (yet) on sales or possession in the U.S. Taking a lesson from history, next step will be a ban on sales, then possession. Why? These would be good items to put away "just in case". They are unlikely to spoil and may be more valuable in the future if sale is banned. We all could be wealthy by now if we would have known to put aside a bunch of full coverage scanners before the ones able to monitor cell freqs were banned. Each kit is in a cardboard box about half the size of a carton of photocopy paper. The individual meters and chargers are packaged in reusable styrofoam blocks which are good for storage. The kit is not heavy. The size is mostly protective packing (possibly for air drop?). Price for: 10 dosimeters 2 chargers 2 radiation meters Sturdy packing shells for meters and chargers Literature is $150 plus freight. (NOTE 14TH DEC 2000, PRICE NOW REDUCED TO $125 PER KIT, SHIPPED WITHIN THE U.S. DISCOUNTS AVAILABLE FOR MULTIPLE KITS. CAN SHIP UP TO 4 TAPED TOGETHER AS ONE PARCEL, VIA POST). Willing to work out special pricing for quantity orders. I would estimate the original cost to the government as maybe $5000 in 1960 dollars. Can take credit cards for payment. Estimated post orifice shipping is $15. Buyer will pay exact cost. NOTE: DOMESTIC SHIPPING NOW INCLUDED IN PRICE. There are no problems with *exporting* so international orders are welcome. Higher shipping charge, of course. Holler if questions. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2093 From: James M. Atkinson, Comm-Eng Date: Thu Dec 14, 2000 8:43pm Subject: FBI agent outlines moves, tools of accused Cuban spies Published Thursday, December 14, 2000, in the Miami Herald FBI agent outlines moves, tools of accused Cuban spies http://www.miamiherald.com/content/today/news/dade/digdocs/106388.htm BY GAIL EPSTEIN NIEVES gepstein@h... What does a suspected spy do to blend into the crowd? Act like you and me -- but use a fake name. FBI agent Joseph Hall, on the witness stand Wednesday for his second day in the Cuban spy trial, testified in exhausting detail about ID cards and other items confiscated from the Hollywood studio apartment of defendants Ruben Campa and Luis Medina. Sam's Club. Blockbuster. AAA. You name it, they signed up, according to membership cards shown to jurors in federal court Wednesday. The names Campa and Medina were fake, appropriated from death certificates of babies who died in California in the late 1960s, both sides agree. The men used the stolen identities to get everything from driver's licenses to Social Security cards, Hall testified. Medina -- real name Ramon LavaniÒo -- even got a U.S. passport and registered with the Selective Service under his assumed identity. He's a Cuban citizen, not an American. His attorney, Bill Norris, described him in opening statements as a Cuban who is ``proud of his country . . . and committed to defending it.'' Campa's real name is Fernando Gonzalez. The FBI found some 31 death certificates among his belongings, Hall testified. Prosecutors allege that Campa and Medina were Cuban intelligence operatives using false identities and fake life stories to give them cover while in the United States. Medina had paperwork showing he was a shoe salesman, Hall testified. Campa had a business card identifying him as a desktop publisher. The five defendants on trial before U.S. District Judge Joan Lenard were arrested Sept. 12, 1998, and charged with acting as unregistered agents of Cuba. Prosecutors also have accused Medina, Gerardo Hernandez and Antonio Guerrero of penetrating U.S. military installations in a bid to pass defense secrets to Havana. The man accused of being the ringleader, Hernandez, faces the most-serious charge: conspiracy to commit murder in the deaths of four Brothers to the Rescue fliers who were shot down by Cuban MiGs in 1996. Charged in other counts is Rene Gonzalez. Defense attorneys acknowledge their clients were working for Cuba. But they insist that the alleged spies did not pass classified information to their bosses or do anything to harm the United States. -- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, The hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. ======================================================================= 2094 From: Dawn Star Date: Fri Dec 15, 2000 10:29am Subject: Full Circle Of Life The Full Circle of Life... At age 4....success is....not peeing in your pants. At age 12...success is....having friends. At age 16...success is....having a drivers license. At age 20...success is....having sex. At age 35...success is....having money. At age 50...success is....having money. At age 60...success is....having sex. At age 70...success is....having a drivers license. At age 75...success is....having friends. At age 80...success is....not peeing in your pants [Non-text portions of this message have been removed] 2095 From: Dawn Star Date: Fri Dec 15, 2000 1:28pm Subject: G*d Damn the Pizza Man Subject: FBI Agents In San Diego As related by a retired bureau agent. FBI agents conducted a raid of a psychiatric hospital in San Diego that was under investigation for medical insurance fraud. After hours of reviewing thousands of medical records, the dozens of agents had worked up quite an appetite. The agent in charge of the investigation called a nearby pizza parlor with delivery service to order a quick dinner for his colleagues. The following telephone conversation took place and was recorded by the FBI because they were taping all conversations at the hospital. Agent: Hello. I'd like to order 19 large pizzas and 3 cases of soda. Pizza Man: And where would you like them delivered? Agent: We're over at the psychiatric hospital. Pizza Man: The psychiatric hospital? Agent: That's right. I'm an FBI agent. Pizza Man: You're an FBI agent? Agent: That's correct. Just about everybody here is. Pizza Man: And you're at the psychiatric hospital? Agent: That's correct. And make sure you don't go through the front doors. We have them locked. You'll have to go around to the back service entrance to deliver the pizzas. Pizza Man: And you say you're all FBI agents? Agent: That's right. How soon can you have them here? Pizza Man: Everyone at the psychiatric hospital is an FBI agent? Agent: That's right. We've been here all day and we're starving. Pizza Man: How are you going to pay for all of this? Agent: We've collected a pool of cash. Pizza Man: And you're all FBI agents? Agent: Yes. Pizza Man: With guns? Agent: That's right. Now, can you remember to bring the pizzas and sodas to the service entrance in the rear? We have the front doors locked. Pizza Man: No fu**in' way. *Click* [Non-text portions of this message have been removed] 2096 From: St. Clair, James Date: Fri Dec 15, 2000 10:30am Subject: RE: Full Circle Of Life Full circle of life (at Christmas) First, you believe in Santa Then, you don't think there is a santa Then, you are santa Finally..you look like santa James St. Clair -----Original Message----- From: Dawn Star [mailto:bratkid@e...] Sent: Friday, December 15, 2000 11:30 AM To: TSCM-L@egroups.com Subject: [TSCM-L] Full Circle Of Life The Full Circle of Life... At age 4....success is....not peeing in your pants. At age 12...success is....having friends. At age 16...success is....having a drivers license. At age 20...success is....having sex. At age 35...success is....having money. At age 50...success is....having money. At age 60...success is....having sex. At age 70...success is....having a drivers license. At age 75...success is....having friends. At age 80...success is....not peeing in your pants [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2097 From: A Grudko Date: Mon Dec 18, 2000 0:42pm Subject: Off topic - Lightning We conducted a sweep last thursday during one of our almost daily afternoon summer thunder storms - which can be very violent. It was about 5 km away at it's closest, but erring on the side of caution we deferred the 'phone line inspection until the next morning (many years ago I was in our workshop when our 15 Mtr high steel mast took a direct hit. The room was instantly filled with noxious black smoke as every connected cable and circuit was vapourised - that was a considerable insurance claim). Anyway, that's not my point, which is somewhat off topic, so I guess off list replies would be appropriate. For personal reasons I won't go into here, I'm interested in predicting the approach of thunderstorms. It occurred to me that the RF characteristics of the 'static' we are all familiar with, especially on the lower frequencies, when a storm is even hundreds of km away, could be differentiated from other signals, identified and measured to give an inexpensive indication of a storm approaching (one could also combine filtered audio and visual detection to calculate the distance of closer storms). Anyone familiar with such technology? Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2098 From: James M. Atkinson, Comm-Eng Date: Mon Dec 18, 2000 2:13pm Subject: Re: Off topic - Lightning When performing a TSCM project I will avoid conducted or radiated signals analysis if there is any lighting within five miles of the sweep locations. I also avoid any telephone or electrical work on lines which go outside of the building during such times. -jma At 8:42 PM +0200 12/18/00, A Grudko wrote: >We conducted a sweep last thursday during one of our almost daily afternoon >summer thunder storms - which can be very violent. It was about 5 km away at >it's closest, but erring on the side of caution we deferred the 'phone line >inspection until the next morning (many years ago I was in our workshop when >our 15 Mtr high steel mast took a direct hit. The room was instantly filled >with noxious black smoke as every connected cable and circuit was >vapourised - that was a considerable insurance claim). > >Anyway, that's not my point, which is somewhat off topic, so I guess off >list replies would be appropriate. > >For personal reasons I won't go into here, I'm interested in predicting the >approach of thunderstorms. It occurred to me that the RF characteristics of >the 'static' we are all familiar with, especially on the lower frequencies, >when a storm is even hundreds of km away, could be differentiated from other >signals, identified and measured to give an inexpensive indication of a >storm approaching (one could also combine filtered audio and visual >detection to calculate the distance of closer storms). > >Anyone familiar with such technology? > >Andy Grudko. D.P.M., Grad I.S, (S.A.) >CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & >intelligence >Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - >Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 >11) 465 9673 - 465 1487 (Fax) - Est. 1981 >GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA >Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom >"When you need it done right - first time" -- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, The hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. ======================================================================= 2099 From: A Grudko Date: Mon Dec 18, 2000 2:22pm Subject: Re: Off topic - Lightning Thanks for the quick replies guys Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" [Non-text portions of this message have been removed] 2100 From: Charles P Date: Mon Dec 18, 2000 2:26pm Subject: Re: Off topic - Lightning Andy, One company that was done extensive work in lightning protection and related stuff is PolyPhaser www.polyphaser.com Charles Patterson Global Communications Tarrytown, NY charles@t... www.telephonesecurity.com ----- Original Message ----- From: "A Grudko" To: Sent: Monday, December 18, 2000 1:42 PM Subject: [TSCM-L] Off topic - Lightning > We conducted a sweep last thursday during one of our almost daily afternoon > summer thunder storms - which can be very violent. It was about 5 km away at > it's closest, but erring on the side of caution we deferred the 'phone line > inspection until the next morning (many years ago I was in our workshop when > our 15 Mtr high steel mast took a direct hit. The room was instantly filled > with noxious black smoke as every connected cable and circuit was > vapourised - that was a considerable insurance claim). > > Anyway, that's not my point, which is somewhat off topic, so I guess off > list replies would be appropriate. > > For personal reasons I won't go into here, I'm interested in predicting the > approach of thunderstorms. It occurred to me that the RF characteristics of > the 'static' we are all familiar with, especially on the lower frequencies, > when a storm is even hundreds of km away, could be differentiated from other > signals, identified and measured to give an inexpensive indication of a > storm approaching (one could also combine filtered audio and visual > detection to calculate the distance of closer storms). > > Anyone familiar with such technology? > > Andy Grudko. D.P.M., Grad I.S, (S.A.) > CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & > intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 > 11) 465 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom > "When you need it done right - first time" > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > 2101 From: Christopher E. Brown Date: Mon Dec 18, 2000 3:02pm Subject: Re: Off topic - Lightning On Mon, 18 Dec 2000, A Grudko wrote: > > Anyone familiar with such technology? Not directly, but it exists and is in wide spread use. I remember reading about it within the last year or so. In the Lesser^H^H^H^H^Hower 48 US there is a tracking system using wide-band RF gear feeding custom rigged DSP cards in Linux machines. System gives strength and approx bearing on strikes, as well as readings on minor discharges. IIRC the system watches from a few Khz to ~ 2Ghz, and tags any events matching the RF profile of a strike (think GODs got a spark-gap transmitter and is practicing code). All logged data is then transfered to central system via network links or sneakernet, allowing for very accurate measurement of strike location and strength (my understanding is they normally get data from a dozen or more sites for a strike). There are in fact services that constantly get retrieve this data from the NWS and will page/email/call you if any lightning events occur with a preset distance (5, 10, 20, 30 miles are normal) of the location you give them. Monthly charge per monitored location. --- The roaches seem to have survived, but they are not routing packets correctly. --About the Internet and nuclear war. From: David Alexander Date: Wed Dec 12, 2001 2:58am Subject: Re: Subject: Surveillance laundering? I agree with what appears to be the implied sub-text of Aimee's posting - don't let them get you on tape, you never know what they may do with it. As an ex-RAF pilot, I know a bit about interrogation techniques, they teach you what they will do to you and how to resist them as long as possible. Physical torture is unreliable, the 'subject' will say anything in order to get you to stop. It is also risky in that you may go too far and kill them. Psychological torture is far more effective - mess with their head and break their spirit. This can be done with fatigue - no sleep, white noise, awkward and uncomfortable positions, keep them cold and hungry, etc. You can also affect their emotions and perceptions of reality e.g. threaten to kill them if they don't talk. You don't actually have to intend to kill them, you only have to make them believe that you would. Just about anyone with no training in resistance will break in less than 36 hours to the point of telling you everything. Those with training will last longer. The strategy is to make sure that you know as little as possible, and that it is relevant and useful for as short a time as possible, so that by the time they break you the information you give them is no longer of any use. Also, never make anything up to make them stop, it causes more problems than it solves. On a TSCM note, you are taught that, apart from Name, Rank & serial number, the only thing you are allowed to say is 'I cannot answer that question' so that they can't tape your words and then 'launder' them into something they can use against you or to broadcast back at your own side. Anyone remember the TV footage of the downed aircrew during the Gulf War ? David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4323 From: Matthew Paulsen Date: Wed Dec 12, 2001 3:28am Subject: The life and the death of the franklin question United States currency notes now in production bear the following portraits: George Washington on the $1 bill, Thomas Jefferson on the $2 bill (in production apparently, but out of circulation according to the treasury department's website - there's a joke hidden here somewhere about a dog and his tail I'm sure.... http://www.ustreas.gov/opc/opc0085.html#portraits), Abraham Lincoln on the $5 bill, Alexander Hamilton on the $10 bill, Andrew Jackson on the $20 bill, Ulysses S. Grant on the $50 bill, and Benjamin Franklin on the $100 bill. For more information on the man, visit http://www.earlyamerica.com/lives/franklin/. A special coin for the man - http://www.coinworld.com/News/072301/News-4.asp. Currency coversion USD to... well.. lots of different currencies.. Multiply input/output by 100 for a Franklin. The Euro is even here. Rates as of 2001.12.11 17:00:38 GMT. Base currency is EUR Euros. Currency Unit EUR/Unit Units/EUR DZD Algeria Dinars 0.0145664 68.6513 USD United States Dollars 1.12282 0.890618 ARS Argentina Pesos 1.12834 0.886255 AUD Australia Dollars 0.578481 1.72866 ATS Austria Schillings 0.0726728 13.7603 BSD Bahamas Dollars 1.12282 0.890618 BBD Barbados Dollars 0.564229 1.77233 BEF Belgium Francs 0.0247894 40.3399 BMD Bermuda Dollars 1.12282 0.890618 BRL Brazil Reals 0.476694 2.09778 GBP United Kingdom Pounds 1.61223 0.620259 BGL Bulgaria Leva 0.512467 1.95134 CAD Canada Dollars 0.711770 1.40495 CLP Chile Pesos 0.00168680 592.840 CNY China Yuan Renminbi 0.135658 7.37147 CYP Cyprus Pounds 1.72262 0.580510 CZK Czech Republic Koruny 0.0304818 32.8065 DKK Denmark Kroner 0.134347 7.44341 XCD East Caribbean Dollars 0.415858 2.40467 EGP Egypt Pounds 0.262967 3.80276 EUR Euros 1.00000 1.00000 FJD Fiji Dollars 0.491428 2.03488 FIM Finland Markkaa 0.168188 5.94573 FRF France Francs 0.152449 6.55957 DEM Germany Deutsche Marks 0.511292 1.95583 XAU Gold Ounces 306.063 0.00326730 GRD Greece Drachmae 0.00293470 340.750 HKD Hong Kong Dollars 0.143956 6.94657 HUF Hungary Forints 0.00403556 247.797 ISK Iceland Kronur 0.0106338 94.0397 INR India Rupees 0.0234879 42.5751 IDR Indonesia Rupiahs 0.000111556 8,964.07 IEP Ireland Pounds 1.26974 0.787564 ILS Israel New Shekels 0.266033 3.75893 ITL Italy Lire 0.000516457 1,936.27 JMD Jamaica Dollars 0.0238643 41.9036 JPY Japan Yen 0.00889960 112.365 JOD Jordan Dinars 1.58411 0.631270 LBP Lebanon Pounds 0.000749493 1,334.24 LUF Luxembourg Francs 0.0247894 40.3399 MYR Malaysia Ringgits 0.295478 3.38435 MXN Mexico Pesos 0.122747 8.14687 NLG Netherlands Guilders 0.453780 2.20371 NZD New Zealand Dollars 0.467989 2.13680 NOK Norway Kroner 0.124982 8.00113 PKR Pakistan Rupees 0.0185244 53.9829 PHP Philippines Pesos 0.0216134 46.2676 XPT Platinum Ounces 510.881 0.00195740 PLN Poland Zlotych 0.276301 3.61924 PTE Portugal Escudos 0.00498798 200.482 ROL Romania Lei 0.0000357465 27,974.76 RUR Russia Rubles 0.0373276 26.7898 SAR Saudi Arabia Riyals 0.299392 3.34010 XAG Silver Ounces 4.80502 0.208116 SGD Singapore Dollars 0.612841 1.63174 SKK Slovakia Koruny 0.0231070 43.2770 ZAR South Africa Rand 0.101364 9.86539 KRW South Korea Won 0.000880833 1,135.29 ESP Spain Pesetas 0.00601012 166.386 XDR International Monetary Fund Special Drawing Rights 1.41818 0.705129 SDD Sudan Dinars 0.00434022 230.403 SEK Sweden Kronor 0.106805 9.36283 CHF Switzerland Francs 0.676940 1.47724 TWD Taiwan New Dollars 0.0325784 30.6952 THB Thailand Baht 0.0256702 38.9556 TTD Trinidad and Tobago Dollars 0.182728 5.47260 TRL Turkey Liras 0.000000797460 1,253,981.69 VEB Venezuela Bolivares 0.00149709 667.964 ZMK Zambia Kwacha 0.000289013 3,460.05 Night all. Have fun perusing the Treasury dept website. [Non-text portions of this message have been removed] 4324 From: Matthew Paulsen Date: Wed Dec 12, 2001 3:46am Subject: RE: Re: Subject: Surveillance laundering? Physical torture is unreliable, the 'subject' will say anything in order to get you to stop. It is also risky in that you may go too far and kill them. Psychological torture is far more effective - mess with their head and break their spirit. This can be done with fatigue - no sleep, white noise, awkward and uncomfortable positions, keep them cold and hungry, etc. You can also affect their emotions and perceptions of reality e.g. threaten to kill them if they don't talk. You don't actually have to intend to kill them, you only have to make them believe that you would. Just about anyone with no training in resistance will break in less than 36 hours to the point of telling you everything. Those with training will last longer. -matt starts to babble again- I disagree partially with your first sentence. Your insight is interesting yet leaves out a strategy - group torture. Too many times people only think about the individual effects of torture upon a single person, but anyone that has been involved in violent affairs in a group knows about the secondary aspects to violence that occurs against an individual that is a member of the group. Providing that the individuals view death as an unpleasent aspect of living ones life and aren't prepared for it emotionally or mentally, group torture situations can succeed where individual torture will falter. It may even expedite the individual torture process or the subversion of individuals within a group. While it may not garner any direct information from the person being physically tortured, it cannot be discounted as an effective tactic against the true target - the leader of the group. Assuming that a chain of command is evident within the group, sometimes the long torturous death of an individual outside view but not earshot over the course of 6-10 hours ending in death of the tortured victim can triple the effect of individual torture methodologies that are not used against the leader (and most likely the information holder). It can also be used to pursuade the leaders of groups to fall into line and force their subordinates to cooperate with their captor(s) to ensure future survival of the group. -incoherent babbling fades off into the distance- Ok.. that's enough morbidity for me for the moment.. I'm going to go get 3 hours of sleep since it's 2am here. Night all. 4325 From: A Grudko Date: Tue Dec 11, 2001 2:12pm Subject: Corporate TSCM Policy Guide -Original Message - > From: "James M. Atkinson" > > All I ask is that you always give me credit as the author, and if you > > plagiarize it for your own use that you slide a Franklin my way for > > each copy you distribute or use for your own versions. A Franklin here is a large torsoed, small headed short flight span bird, of the genus 'Francolinus'. I'm happy to post you one but it might be 'vrot' (rotten) by the time it gets to you. ;-) Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4326 From: A Grudko Date: Wed Dec 12, 2001 3:40am Subject: Final Report - Am I missing something? - Original Message - From: Dave Emery > Just out of curiousity, how do you know that the surveillance is > really government (FBI, DEA etc), and especially truly legal as opposed > to rogue ? A good point, but not the one I was trying to make. I was not implying that I have ever found a government surveillance operation. I was giving an example of a condition in my standard report which I feel the client should be aware of, not an actual situation. I could have cited another condition I put into every report, which is to the effect that the room is now secure to a particular level, but the moment I leave someone might enter with a transmitter, hook a phone line or bounce a laser off the window. As regards rogue use of state facilities it's obviously possible and has to be factored in. Our current government claim a very high moral ground, partly on the basis that they were 'victims' of surveillance in the past, and have been critical of invasion of privacy etc. I recall, but did not keep, a statement from Telkom, our national phone service provider, about 5 years ago, to the effect that no illegal use of state tapping facilites had taken place in x period - implying that it had at other times. > I should imagine that your policy means that you don't ever seriously > check the legality of a government bug - as I rather doubt you get to > examine the wiretap warrents involved... Partly correct - it's generally outside of my domain and ability although not impossible and I make sure that the client understands that; we get back to conditions again. If it was a government operation I suspect they would anyway follow Bill Clinton's advice and 'Deny, deny, deny' if only to protect operational integrity. There have been cases where I have detected anomalies which I have reported to the authorities and I let them follow their procedures. On some occasions I have been informed of the situation (although I've heard a rumor that people in some government departments sometimes tell little lies...) and there might be conditions - yet again - when I would pass that info. on to the client, such as 'Telkom say you were illegally tapped but the problem has been resolved'. I think that if I found a proven legal government surveillance operation and I told the client about it, I could be charged with defeating the ends of justice and I'm seriously allergic to jail time, so I'll stick to giving a conditional report. Regards from an overcast but warm Johannesburg Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time . 4327 From: David Alexander Date: Wed Dec 12, 2001 4:21am Subject: Re: group torture >-matt starts to babble again- >I disagree partially with your first sentence. Your insight is interesting >yet leaves out a strategy - group torture. Too many times people only think >about the individual effects of torture upon a single person, but anyone >that has been involved in violent affairs in a group knows about the >secondary aspects to violence that occurs against an individual that is a >member of the group. As I said: 'Psychological torture is far more effective - mess with their head and break their spirit. This can be done with fatigue - no sleep, white noise, awkward and uncomfortable positions, keep them cold and hungry, etc.' Group torture is simply another psychological technique. It works upon those not experiencing the 'direct action'. It's a very nasty can of worms. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4328 From: ledbetter84 Date: Wed Dec 12, 2001 0:51pm Subject: group harassment, etc. Here in downtown Kitchener, Ontario, Canada, we seem to have a group of perverted individuals who use broadcasting equipment, telescopes, and remote listening devices to sexually and mentally harass one another, neighbors, and random pedestrians. (And it often seems that they are hacking into phone lines in order to intercept Internet traffic.) As one credible and well-known local woman said, "Downtown Kitchener seems possessed." Although downtown Kitchener is always attempting to improve its environment (and/or image), and although it is home to a large insurance firm--Manulife--which occupies considerable office space, the downtown is a popular bar strip frequented by drunken violence and, at one end of the main street, by prostitutes. Last week, in an attempt to minimize further violence, the city police asked the bar owners to post the requirement that gang members refrain from wearing their gang colors to the bars; the bar owners refused to cooperate. In summary, a group of unknown individuals characterized by borderline personality disorders is haunting the downtown core. Max Ledbetter, Ph.D. http://www.thefishfinder.com/members/saltwater/ledbetter/ 4329 From: James M. Atkinson Date: Wed Dec 12, 2001 1:15pm Subject: 'Twas the year before Christmas JUST WAIT 'TIL NEXT YEAR! 'Twas the year before Christmas, and all through the land The tape drives were whirring with computer thefts grand. Though the codes and the passwords were prepared with great care, The embezzlers and felons popped up everywhere. While bankers and executives were snug in their beds And visions of profits danced in their heads, Computers and terminals and DP machines Were covertly used for criminal means. Commercial Trust in New Jersey received such a clatter When a keypunch mistake made a bank account fatter. One-tenth of a million was lost in a flash And a simple coin dealer had that much more cash. In Flushing, a student who knew some DP Awarded himself a Phi Beta key. His grades were altered so lively and quick That his peers were amazed and the faculty sick. Two agents in Bridgeport for the U.S. DEA Discovered that selling drug data would pay. An IBM mainframe was used for the crime, And they managed to profit for quite a long time. In Toronto, an Amdahl was used for abuse As students put CRT screens to misuse. And Hawthorne, California, saw funds fade away When a Honeywell system took part in foul play. Even NASA had its share of computer-crime men, Stolen DP directories and breached PDP-10's. And who can forget the Belmont affair, When programmer and cash were suddenly not there. In L.A., the UCB staff had a fright When one million dollars was lost overnight. And Security Pacific had its day to rue When a clever programmer took ten million-two. Now congressmen, now senators and banks of the nation, All struggle to enact preventative legislation. And Abraham Ribicoff is getting his licks. While sponsoring Senate Bill Seventeen-Sixty-and-Six. Today, for computers with data encryption, Total security is nothing but fiction. And computer criminals and crooks continue to jeer, "If we didn't get you this time, just wait 'til next year!" -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4330 From: Aimee Farr Date: Wed Dec 12, 2001 1:24pm Subject: S. 1615 107th CONGRESS 1st Session S. 1615 To provide for the sharing of certain foreign intelligence information with local law enforcement personnel, and for other purposes. IN THE SENATE OF THE UNITED STATES November 1, 2001 Mr. SCHUMER (for himself, Mrs. CLINTON, Mr. LEAHY, and Mr. HATCH) introduced the following bill; which was read twice and referred to the Committee on the Judiciary ---------------------------------------------------------------------------- ---- A BILL To provide for the sharing of certain foreign intelligence information with local law enforcement personnel, and for other purposes. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the `Federal-Local Information Sharing Partnership Act of 2001'. SEC. 2. AUTHORITY TO SHARE GRAND JURY INFORMATION. Rule 6(e)(3)(C) of the Federal Rules of Criminal Procedure is amended-- (1) in clause (i)(V), by inserting after `national security official' the following: `or to law enforcement personnel of a State or political subdivision of a State (including the chief executive officer of that State or political subdivision who has the authority to appoint or direct the chief law enforcement officer of that State or political subdivision)'; and (2) in clause (iii)-- (A) by striking `Federal'; and (B) by adding at the end the following: `Any chief executive officer or law enforcement personnel of a State or political subdivision of a State who receives information pursuant to clause (i)(V), shall only use that information consistent with such guidelines as the Attorney General shall issue to protect confidentiality.'. SEC. 3. AUTHORITY TO SHARE ELECTRONIC, WIRE, AND ORAL INTERCEPTION INFORMATION. Section 2517(6) of title 18, United States Code, is amended-- (1) in the first sentence, by inserting after `national security official' the following: `or to law enforcement personnel of a State or political subdivision of a State (including the chief executive officer of that State or political subdivision who has the authority to appoint or direct the chief law enforcement officer of that State or political subdivision)'; (2) in the second sentence, by striking `Federal'; and (3) by adding at the end the following: `Any chief executive officer or law enforcement personnel of a State or political subdivision of a State who receives information pursuant to this paragraph shall only use that information consistent with such guidelines as the Attorney General shall issue to protect confidentiality.'. SEC. 4. FOREIGN INTELLIGENCE INFORMATION. Section 203(d)(1) of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (USA PATRIOT ACT) of 2001 (Public Law 107-56) is amended-- (1) in the first sentence, by inserting after `national security official' the following: `or to law enforcement personnel of a State or political subdivision of a State (including the chief executive officer of that State or political subdivision who has the authority to appoint or direct the chief law enforcement officer of that State or political subdivision)'; (2) in the second sentence, by striking `Federal'; and (3) by adding at the end the following: `Any chief executive officer or law enforcement personnel of a State or political subdivision of a State who receives information pursuant to this paragraph shall only use that information consistent with such guidelines as the Attorney General shall issue to protect confidentiality.'. SEC. 5. DISCLOSURES TO GOVERNMENTAL AGENCIES FOR COUNTERTERRORISM PURPOSES. Section 626(a) of the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.) is amended by adding at the end the following: `The recipient of that consumer report or information may further disclose the contents of that report or information to law enforcement personnel of a State or political subdivision of a State (including the chief executive officer of that State or political subdivision who has the authority to appoint or direct the chief law enforcement officer of that State or political subdivision) to assist the official who is to receive that information in the performance of the official duties of that official. Any chief executive officer or law enforcement personnel of a State or political subdivision of a State who receives information pursuant to this subsection shall only use that information consistent with such guidelines as the Attorney General shall issue to protect confidentiality.'. SEC. 6. MULTILATERAL COOPERATION AGAINST TERRORISTS. Section 222(f) of the Immigration and Nationality Act (8 U.S.C. 1202(f)) is amended-- (1) in paragraph (1), by striking the period at the end and inserting a semicolon; (2) by redesignating paragraph (2) as paragraph (3); and (3) by inserting after paragraph (1) the following: `(2) the Secretary of State may provide copies of any record of the Department of State and of diplomatic and consular offices of the United States pertaining to the issuance or refusal of visas or permits to enter the United States, or any information contained in those records, to law enforcement personnel of a State or political subdivision of a State (including the chief executive officer of that State or political subdivision who has the authority to appoint or direct the chief law enforcement officer of that State of political subdivision), if the Secretary determines that it is necessary and appropriate, however, any chief executive officer or law enforcement personnel of a State or political subdivision of a State who receives information pursuant to this paragraph shall only use that information consistent with such guidelines as the Attorney General shall issue to protect confidentiality; and'. SEC. 7. INFORMATION ACQUIRED FROM AN ELECTRONIC SURVEILLANCE. Section 106(k)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1806) is amended by inserting after `law enforcement officers' the following: `or law enforcement personnel of a State or political subdivision of a State (including the chief executive officer of that State or political subdivision who has the authority to appoint or direct the chief law enforcement officer of that State or political subdivision)'. SEC. 8. INFORMATION ACQUIRED FROM A PHYSICAL SEARCH. Section 305(k)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1825) is amended by inserting after `law enforcement officers' the following: `or law enforcement personnel of a State or political subdivision of a State (including the chief executive officer of that State or political subdivision who has the authority to appoint or direct the chief law enforcement officer of that State or political subdivision)'. SEC. 9. DISCLOSURE OF EDUCATIONAL RECORDS. Section 444(j)(1)(B) of the General Education Provisions Act (20 U.S.C. 1232g) is amended-- (1) by inserting after `disseminate' the following: `(including disclosure of the contents of those education records to law enforcement personnel of a State or political subdivision of a State, including the chief executive officer of that State or political subdivision who has the authority to appoint or direct the chief law enforcement officer of that State or political subdivision, in the performance of the official duties of that law enforcement officer)'; and (2) by adding at the end the following: `Any chief executive officer or law enforcement personnel of a State or political subdivision of a State who receives information pursuant to this paragraph shall only use that information consistent with those guidelines.'. SEC. 10. INVESTIGATION AND PROSECUTION OF TERRORISM. Section 408(c)(1)(B) of the National Education Statistics Act of 1994 (20 U.S.C. 9007) is amended-- (1) by inserting after `disseminate' the following: `(including disclosure of the contents of those reports, records, and information to law enforcement personnel of a State or political subdivision of a State, including the chief executive officer of that State or political subdivision who has the authority to appoint or direct the chief law enforcement officer of that State or political subdivision, in the performance of the official duties of that law enforcement officer)'; and (2) by adding at the end the following: `Any chief executive officer or law enforcement personnel of a State or political subdivision of a State who receives information pursuant to this paragraph shall only use that information consistent with those guidelines.'. 4331 From: Marcel Date: Wed Dec 12, 2001 2:02pm Subject: Here is a good laugh- Catch Your Spouse In A Cyber Affair 27227] Here is a good laugh....... -------- Original Message -------- From: Subject: Catch Your Spouse In A Cyber Affair 27227 To: Do You Suspect Your Spouse Is Having A Cyber Affair On Your Computer While You Are Away? Have You Ever Lost Hours Of Hard Work... Just Because Your Computer Crashed? Do You Wonder What Your Kids Or Employees REALLY DO Online? Introducing...KeyKey 2000-Secret Keystroke Recorder & Backup Utility A Revolutionary New Secret Monitoring & Backup Utility No Computer User Should Ever Be Without! *Monitor All Day..All Night In Complete Secrecy! *Pasword Protected Activity Logs! *Completely Undetectable To The End User! *KeyKey can record start-up/shut down time of your computer *KeyKey can record windows captions of programs used. *Records Chat Room And Instant Messaging Conversations! *Record time stamp at time interval you specified. KeyKey is one of the only products on the market that can record such complete details of keyboard activity!! Be In The Know! Order Your Copy Today! Only $19.95>> Digital Delivery!! Sent to the email address of your choice! 4332 From: Peter Stone Date: Wed Dec 12, 2001 2:25pm Subject: Sony surveillance catalog? circa 1997, Sony Japan was doing a catalog of surveillance equipment. Can someone direct me to a location on the web or in the real world where information on their current audio/video offerings may be found. Thanks. -- _______________________________________________ Sign-up for your own FREE Personalized E-mail at Mail.com http://www.mail.com/?sr=signup 1 cent a minute calls anywhere in the U.S.! http://www.getpennytalk.com/cgi-bin/adforward.cgi?p_key=RG9853KJ&url=http://www.getpennytalk.com 4333 From: Andrus Aaslaid Date: Thu Dec 13, 2001 3:34am Subject: The Information Superhighway http://imbolc.ucc.ie/~pflynn/humour/highway.html The Information Superhighway? From: Jim.Kimble@E... (Jim Kimble) To: nevada@t... Date: 96-01-26 05:42:33 EST ---------------------------------------------------------------------------- ---- "Think of the Internet as a highway." There it is again. Some clueless fool talking about the "Information Superhighway." They don't know diddley about the 'Net. It's nothing like a superhighway. That's a rotten metaphor. Suppose the metaphor ran in the other direction. Suppose the highways were like the net... A highway hundreds of lanes wide. Most with pitfalls for potholes. Privately operated bridges and overpasses. No highway patrol. A couple of rent-a-cops on bicycles with broken whistles. 500-member vigilante posses with nuclear weapons. A minimum of 237 on ramps at every intersection. No signs. Wanna get to Ensenada? Holler out the window at a passing truck to ask directions. Ad hoc traffic laws. Some lanes would vote to make use by a single-occupant-vehicle a capital offense on Monday through Friday between 7:00 and 9:00 am. Other lanes would just shoot you without a trial for talking on a car phone. AOL would be a giant diesel-smoking bus with hundreds of Ebola victims on board throwing dead wombats and rotten cabbage at the other cars, most of which have been assembled at home from kits. Some are built around 2.5 horsepower lawnmower engines with a top speed of nine miles an hour. Others burn nitrogylcerin and idle at 120. No license plates. World War II bomber nose art instead. Terrifying paintings of huge teeth or vampire eagles. Bumper mounted machine guns. Flip somebody the finger on this highway and get a white phosphorus grenade up your tailpipe. Flatbed trucks cruise around with anti-aircraft missile batteries to shoot down the traffic helicopter. Little kids on tricycles with squirtguns filled with hydrochloric acid switch lanes without warning. NO OFFRAMPS. None. Now that's the way to run an Interstate Highway system... 4334 From: Matthew Paulsen Date: Thu Dec 13, 2001 6:01am Subject: RE: Sony surveillance catalog? This link is in the U.S.: http://bpgprod.sel.sony.com/bpchome.BPC.htm#top Security: http://bpgprod.sel.sony.com/bpcnav/appgroup/10001.BPC.html Sony Japan is: http://www.sony.co.jp/ Sony US: http://www.sony.com/ -----Original Message----- From: Peter Stone [mailto:clearlight@i...] Sent: Wednesday, December 12, 2001 12:25 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Sony surveillance catalog? circa 1997, Sony Japan was doing a catalog of surveillance equipment. Can someone direct me to a location on the web or in the real world where information on their current audio/video offerings may be found. Thanks. -- _______________________________________________ Sign-up for your own FREE Personalized E-mail at Mail.com http://www.mail.com/?sr=signup 1 cent a minute calls anywhere in the U.S.! http://www.getpennytalk.com/cgi-bin/adforward.cgi?p_key=RG9853KJ&url=http:// www.getpennytalk.com Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4335 From: A Grudko Date: Thu Dec 13, 2001 5:52am Subject: Re: Re: group torture - Original Message - > Group torture is simply another psychological technique. It works upon those > not experiencing the 'direct action'. It's a very nasty can of worms. I belive the Taliban constantly play tapes of the 'Gerry Springer Show' to prisoners - the eviles swines. Andy Grudko Jo'burg 4336 From: Aimee Farr Date: Thu Dec 13, 2001 11:03am Subject: RE: Re: torture (?)...was surveillance laundering > 'Psychological torture ... I didn't see any torture here, as suggested by some press accounts. I'm not sure what I think about the picture the media paints, or of this "Afghan cameraman." What I do see is an opportunity for surveillance taken out of context, or as black propaganda. I look for Net surveillance laundering from countries we don't like, activists using exposure techniques, and for political uses. Today, we've got wired soldiers running around... I've heard of two "surveillance bounties" this year in the media (one by an e-journalist in regard to a UK intelligence matter, but he crawfished when I pressed)... Flint wants his journalists on the front lines... Australia had problems with military email disclosures... activist organizations are teaching "camera combat" ...and worse. The next one will probably just whoosh! across the Internet like a comet. I predict that someday, I'll read the comments of some here as reporters ask, "Why can't we stop that?" In light of the weirdness of the last couple of months, "protecting intelligence sources and methods from unauthorized disclosure" is deserving of new dimensions. It certainly implicates your services and expertise. ~Aimee 4337 From: Richard Thieme Date: Thu Dec 13, 2001 9:34am Subject: Re: Re: group torture don't forget the effects of a Vogon poetry reading. Small men become dust and large men weep. At 01:52 PM 12/13/2001 +0200, A Grudko wrote: >- Original Message - >> Group torture is simply another psychological technique. It works upon >those >> not experiencing the 'direct action'. It's a very nasty can of worms. > >I belive the Taliban constantly play tapes of the 'Gerry Springer Show' to >prisoners - the eviles swines. > >Andy Grudko >Jo'burg > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4338 From: James M. Atkinson Date: Fri Dec 14, 2001 9:34am Subject: 'Twas the Night Before Ramadan" by Mullah Mohammed Omar 'Twas the Night Before Ramadan" by Mullah Mohammed Omar 'Twas the night before Ramadan, and all through the cave Not a creature was stirring; it felt like a grave. The turbans were hung by the firepit with care, in hopes that the Air Force would not soon be there. The soldiers were restless without any beds, While visions of air strikes flashed in their heads. Osama in his burkha and I in my goatskin cap, Had just settled down for a cold, barren winter's nap. When out on the ledge there arose such a clatter, I grabbed my Kalashnikov to see what was the matter. Away from the racket I ran like a girl, Tripped over a goat; into a ball I did curl. The moon shone down on the new-fallen snow And lit up the valley with an ominous glow, When, what to my one good eye should appear, But a dozen Apaches, and tanks in the rear. And their leader, so fearless, his troops he did push, I knew in an instant it must be George Bush. More rapid than eagles his forces they came, And they whistled, and shouted, and called out our names "Now Omar! Osama! Muhammad! Abdul! We come for you now; we've taken Kabul! To the top of the cliffs! To the back of their caves! When you chose this war, you dug your own graves!" As the dry leaves that before the assault choppers fly, When they meet with an obstacle, light up the sky. So up to the ledge his forces they flew With full magazines, and flamethrowers too. And then, in a twinkling, I heard with a thud The explosions of Tomahawks; not one was a dud. As I chambered my rifle, and was turning around, Osama was there, disguised in a gown. He was dressed all in drag, from his head to his toes, And he said he would flee while I held off his foes. A bundle of money he had stuffed in his pack, He said "I'm going to Baghdad and I'm not looking back!" His eyes were all glassy; he trembled with fear, The American bombs, they rang in his ears. He saddled his goat, then turned tail and fled, But a Marine Corps sniper got him in the head. I watched with cold fear as his body did slump, The goat threw him off; he fell with a thump. And so, there I stood, my plans all destroyed, About to suffer a fate I could not avoid. I dropped to my knees; asked Allah for help, His voice boomed in my ears, "You ignorant whelp! I gave you the Bible, the Torah and Koran, But you were too arrogant to understand. I told you to honor your neighbors and wives, Not to enslave them, or degrade their lives! You invoke My name to sanction your deeds, But you are the last thing that this world needs. And so, I'll send you and bin Laden to Hell." The last words I heard, as the bombs fell, Were from George Bush himself as he mounted the wall, "One nation, under God, with liberty and justice for all!" Written by Jack Falbey. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4339 From: Steve Uhrig Date: Fri Dec 14, 2001 11:51am Subject: Fed TSCM work available http://www.eps.gov/spg/HUD/OPC/ASDNCA/S2QNCAA0002/SynopsisP.html If you are a former federal officer of at least GS15 level, hold a current TS clearance and are willing to travel to HUD facilities all over the U.S., take a look at the above synopsis. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4340 From: ariel silverstone Date: Fri Dec 14, 2001 0:00pm Subject: Re: Fed TSCM work available I wonder why HUD would need a TS? >From: "Steve Uhrig" >Reply-To: Steve@s... >To: Tscm-l@yahoogroups.com >Subject: [TSCM-L] Fed TSCM work available >Date: Fri, 14 Dec 2001 12:51:21 -0500 > >http://www.eps.gov/spg/HUD/OPC/ASDNCA/S2QNCAA0002/SynopsisP.html > >If you are a former federal officer of at least GS15 level, hold >a current TS clearance and are willing to travel to HUD >facilities all over the U.S., take a look at the above synopsis. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* _________________________________________________________________ Send and receive Hotmail on your mobile device: http://mobile.msn.com 4341 From: e cummings Date: Fri Dec 14, 2001 3:37pm Subject: U.S. phone eavesdropping software open to spying --Fox News http://foxnews.com/story/0,2933,40824,00.html FNC Carl Cameron Friday, December 14, 2001 This partial transcript of Special Report with Brit Hume, Dec. 13, was provided by the Federal Document Clearing House. Click here to order the complete transcript. Part 3 of 4 BRIT HUME, HOST: Last time we reported on an Israeli-based company called Amdocs Ltd. that generates the computerized records and billing data for nearly every phone call made in America. As Carl Cameron reported, U.S. investigators digging into the 9/11 terrorist attacks fear that suspects may have been tipped off to what they were doing by information leaking out of Amdocs. In tonight's report, we learn that the concern about phone security extends to another company, founded in Israel, that provides the technology that the U.S. government uses for electronic eavesdropping. Here is Carl Cameron's third report. (BEGIN VIDEOTAPE) CARL CAMERON, FOX NEWS CORRESPONDENT (voice-over): The company is Comverse Infosys, a subsidiary of an Israeli-run private telecommunications firm, with offices throughout the U.S. It provides wiretapping equipment for law enforcement. Here's how wiretapping works in the U.S. Every time you make a call, it passes through the nation's elaborate network of switchers and routers run by the phone companies. Custom computers and software, made by companies like Comverse, are tied into that network to intercept, record and store the wiretapped calls, and at the same time transmit them to investigators. The manufacturers have continuing access to the computers so they can service them and keep them free of glitches. This process was authorized by the 1994 Communications Assistance for Law Enforcement Act, or CALEA. Senior government officials have now told Fox News that while CALEA made wiretapping easier, it has led to a system that is seriously vulnerable to compromise, and may have undermined the whole wiretapping system. Indeed, Fox News has learned that Attorney General John Ashcroft and FBI Director Robert Mueller were both warned Oct. 18 in a hand-delivered letter from 15 local, state and federal law enforcement officials, who complained that "law enforcement's current electronic surveillance capabilities are less effective today than they were at the time CALEA was enacted." Congress [probably means Comverse --DBM] insists the equipment it installs is secure. But the complaint about this system is that the wiretap computer programs made by Comverse have, in effect, a back door through which wiretaps themselves can be intercepted by unauthorized parties. Adding to the suspicions is the fact that in Israel, Comverse works closely with the Israeli government, and under special programs, gets reimbursed for up to 50 percent of its research and development costs by the Israeli Ministry of Industry and Trade. But investigators within the DEA, INS and FBI have all told Fox News that to pursue or even suggest Israeli spying through Comverse is considered career suicide. And sources say that while various F.B.I. inquiries into Comverse have been conducted over the years, they've been halted before the actual equipment has ever been thoroughly tested for leaks. A 1999 F.C.C. document indicates several government agencies expressed deep concerns that too many unauthorized non-law enforcement personnel can access the wiretap system. And the FBI's own nondescript office in Chantilly, Virginia that actually oversees the CALEA wiretapping program, is among the most agitated about the threat. But there is a bitter turf war internally at F.B.I. It is the FBI's office in Quantico, Virginia, that has jurisdiction over awarding contracts and buying intercept equipment. And for years, they've thrown much of the business to Comverse. A handful of former U.S. law enforcement officials involved in awarding Comverse government contracts over the years now work for the company. Numerous sources say some of those individuals were asked to leave government service under what knowledgeable sources call "troublesome circumstances" that remain under administrative review within the Justice Department. 4342 From: James M. Atkinson Date: Fri Dec 14, 2001 6:14pm Subject: Surveillance Article on MSNBC The list may find this of interest http:/www.msbc.com/news/672817.asp -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4343 From: steve_weinert Date: Fri Dec 14, 2001 9:04pm Subject: Re: Surveillance Article on MSNBC URL had a dropped letter. http://www.msnbc.com/news/672817.asp ^ And congrats on the extensive quotes by Herr Atkinson!! See: SEEN BUT NOT HEARD Two things a covert activity must have to be successful are communications and funds, says James Atkinson, owner of the Granite Island Group, a security and counterintelligence firm that works with the public and private sector. The al-Qaida cells planning the 9-11 attacks used the Internet, e-mail and cell phones for various communications. "The reason they used those is that they are relatively impervious to eavesdropping," Atkinson said. "If someone goes out and buys 12 cell phones and they use an alias for each one and they pay cash, it's going to be real ... difficult to eavesdrop on them." This low-tech, high-touch approach to covert communication plays havoc with investigations, Atkinson says. "If they communicate with pagers, [tracking becomes] real difficult," Atkinson said. "If they have DSL, [or Digital Subscriber Line, a high-speed Internet connection] it's going to be real easy to eavesdrop on them; if they have cable modems, it'll be tough," he said. "If they are going into Kinko's [to use the pay-by-the-hour Internet terminals] it's going to be a bitch to eavesdrop on them, likewise if they go to the library or public-accessible terminals." Tracking terrorists using that kind of communication scheme is difficult, but not impossible, Atkinson insists. "The good guys just have to be about three steps ahead of the mischief makers," he said, which is easier said than done, considering the hurdles law enforcement has to overcome, including massive vulnerabilities on the government's own computer networks, not enough funding for equipment and U.S. laws that forbid some of the nation's most sophisticated eavesdropping technologies, used by the National Security Agency, from being used within U.S. boundaries. Staying three steps ahead then means intense surveillance on the suspect, Atkinson said. And the high powered, expensive gadgets needed to undertake such high level surveillance? "A big sheet of paper and a Number 2 pencil," Atkinson says wryly. "Everybody wants to get intelligence the easy way," Atkinson says. "They want this equipment and that program, those things are great but they aren't worth diddley" without what law enforcement officials like to call "shoe leather" police work, Atkinson maintains. A new intelligence bill passed in the House this week seems to underscore Atkinson's view. --- In TSCM-L@y..., "James M. Atkinson" wrote: > The list may find this of interest > > http:/www.msbc.com/news/672817.asp > > -jma > > -- > > -------------------------------------------------------------------- ------------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------- ------------------------------ > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008jmatk@tscm.com > -------------------------------------------------------------------- ------------------------------ > People sleep peaceably in their beds at night only because rough > men stand ready to do violence on their behalf. - George Orwell > ------------------------------------------------------------------ -------------------------------- 4344 From: James M. Atkinson Date: Fri Dec 14, 2001 10:17pm Subject: Re: Surveillance Article on MSNBC Whoops, sorry about the bad URL. The correct URL is: http://www.msnbc.com/news/672817.asp It should be interesting to see how many people get their panties in a knot over the article, but it cuts right to the bone and digs in to the real problem. I was trying to make the point that way too many investigators and analysts depend on high-tech gear to do their job instead of using it to SUPPLEMENT their skills (they are supposed to have). The same thing hold true for TSCM, in that we have to be really careful not to rely on just the equipment alone or a dusty old college degree. Instead, we to take time to crawl around under the desk, chase and trace cabling, and pay careful attention to physical details. Sadly, there are still a few older con artists out there who scam their clients for sweep money when in fact all they are doing if farting around with a decrepit service monitor for a few hours. Of course, TSCM'ers use sophisticated equipment to tell us things, but the best instrument you can use is your own two eyes, and a flashlight... Don't be afraid to use them. By the way... when did you last have your eyes checked, and how fresh are the batteries in your torch? -jma At 3:04 AM +0000 12/15/01, steve_weinert wrote: >URL had a dropped letter. > >http://www.msnbc.com/news/672817.asp > ^ > >And congrats on the extensive quotes by Herr Atkinson!! > >See: > >SEEN BUT NOT HEARD > Two things a covert activity must have to be successful are >communications and funds, says James Atkinson, owner of the Granite >Island Group, a security and counterintelligence firm that works with >the public and private sector. > The al-Qaida cells planning the 9-11 attacks used the >Internet, e-mail and cell phones for various communications. "The >reason they used those is that they are relatively impervious to >eavesdropping," Atkinson said. "If someone goes out and buys 12 cell >phones and they use an alias for each one and they pay cash, it's >going to be real ... difficult to eavesdrop on them." > This low-tech, high-touch approach to covert communication >plays havoc with investigations, Atkinson says. > "If they communicate with pagers, [tracking becomes] real >difficult," Atkinson said. "If they have DSL, [or Digital Subscriber >Line, a high-speed Internet connection] it's going to be real easy to >eavesdrop on them; if they have cable modems, it'll be tough," he >said. "If they are going into Kinko's [to use the pay-by-the-hour >Internet terminals] it's going to be a bitch to eavesdrop on them, >likewise if they go to the library or public-accessible terminals." > Tracking terrorists using that kind of communication scheme is >difficult, but not impossible, Atkinson insists. "The good guys just >have to be about three steps ahead of the mischief makers," he said, >which is easier said than done, considering the hurdles law >enforcement has to overcome, including massive vulnerabilities on the >government's own computer networks, not enough funding for equipment >and U.S. laws that forbid some of the nation's most sophisticated >eavesdropping technologies, used by the National Security Agency, >from being used within U.S. boundaries. > Staying three steps ahead then means intense surveillance on >the suspect, Atkinson said. And the high powered, expensive gadgets >needed to undertake such high level surveillance? "A big sheet of >paper and a Number 2 pencil," Atkinson says wryly. > "Everybody wants to get intelligence the easy way," Atkinson >says. "They want this equipment and that program, those things are >great but they aren't worth diddley" without what law enforcement >officials like to call "shoe leather" police work, Atkinson >maintains. > A new intelligence bill passed in the House this week seems >to underscore Atkinson's view. > > > >--- In TSCM-L@y..., "James M. Atkinson" wrote: >> The list may find this of interest >> >> http:/www.msbc.com/news/672817.asp > > >> -jma >> >> -- >> >> -------------------------------------------------------------------- >------------------------------ >> The First, The Largest, The Most Popular, and The Most Complete >TSCM, >> Bug Sweep, Spy Hunting, and Counterintelligence Site on the >Internet. >> -------------------------------------------------------------------- >------------------------------ >> James M. AtkinsonPhone: (978) 381-9111 >> Granite Island GroupFax: >> 127 Eastern Avenue #291http://www.tscm.com/ >> Gloucester, MA 01931-8008jmatk@tscm.com >> -------------------------------------------------------------------- >------------------------------ >> People sleep peaceably in their beds at night only because >rough >> men stand ready to do violence on their behalf. - George Orwell >> ------------------------------------------------------------------ >-------------------------------- > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4346 From: David Miller Date: Fri Dec 14, 2001 10:14pm Subject: RE: Surveillance Article on MSNBC Actually it is http://www.msnbc.com/news/672817.asp -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent:Friday, December 14, 2001 6:15 PM To:TSCM-L Mailing List Subject:[TSCM-L] Surveillance Article on MSNBC The list may find this of interest http:/www.msbc.com/news/672817.asp -jma -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------- ------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4347 From: Steve Uhrig Date: Sat Dec 15, 2001 3:52pm Subject: Fluke Scopemeter For Sale Hello all, I have for sale a Fluke 99B Scopemeter, about 2 years old and used maybe ten times. It is like a complete mini-test bench all in one handheld device. Besides having a full function DVM, it also is a dual trace 100 megacycle Digital Storage Oscilloscope (DSO), sine or square wave frequency generator, capacitance meter, frequency counter, high contrast high resolution backlit display, context sensitive help key, autosetup, min/max recording, 40 nanosecond glitch detect, waveform math, zoom, memories for setups you use frequently, will record readings and time/date stamp them, direct connects to a PC or printer, DVM has DCV, ACV true RMS, Ohm, diode test, frequency 1 Hz to 5 MHz, RPM, duty cycle, pulse width, dBV, dBm, dBW, and more. Fluke had a genius do the power, and the unit runs from C size nicads for 4 hours, or if you are in the field you can replace the nicads with alkalines for about 24 hours' operation. The unit weighs 4 pounds and comes with optional carrying case which holds test leads and probes on one side and the AC charger/power supply on the other and acts as a protective case and support for field use, manual, self paced training program complete with a test circuit board referenced in the manual which generates various signals you can practice making measurements on. Excellent manual, cheat sheet card in a little pouch inside the front panel of the carrying case. Lots more features than I can remember. I bought this to use with a Riser Bond 2401 TDR which I used for all my phone line sweeping. With some Velcro, I attached the TDR and this scope to a legal sized clipboard and could hang both on a convenient hook in a telephone closet where I was working, and use it practically hands free. Very nice setup, and I wasn't hauling around a large expensive delicate CRT scope. Original cost from Fluke without accessories was $2195. I will let this go for $1000 plus shipping. If you could use a TDR as well, I will include a 2401B+ Riser Bond TDR with nicads, charger, manual, carrying case and leads for an additional $500. This is a really cheap way to get into a TDR for telephone sweeping, which is a must for that work. Anyone doing any telephone sweeping needs a TDR, and this package gives you a separate lab grade scopemeter plus many other tools all in one package. TDRs available separately, 2401B+, 2401C, 1205CX, all Riser Bond which is the only way to go with TDRs as far as I am concerned (I own a total of eight Riser Bond TDRs for my field service guys). They can read wet lines safely as well as unpowered lines. Can take credit cards for payment. Ask if questions on anything. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4348 From: Steve Uhrig Date: Sat Dec 15, 2001 5:02pm Subject: Bin Laden IDed on VHF He's down to the bottom of the barrel apparently. What the article does not mention is the band he was heard on was VHF U.S. 2 meter amateur, in the 144-148 megacycle range. Probably using a readily available amateur portable. Super easy to get, and super easy to DF, as VHF in that range is the absolute easiest to DF throughout the spectrum for ground to ground or air to ground. His voice was positively identified, so his whereabouts are known to be within the coverage area of his portable, which can be plotted with a good degree of accuracy with everything that is known about propogation in general, and especially propogation in that area of the world. ========================== http://www.washtimes.com/national/20011215-68264047.htm Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4349 From: tek492p Date: Sun Dec 16, 2001 3:31am Subject: Bin Laden Tape Thank God the Americans found "The Bin Laden Tape", so the whole world can see his guilt. Allah is great! Jack 4350 From: R W Date: Sun Dec 16, 2001 6:23am Subject: Introduction. Dear Group; Thankyou for accepting me into the group, let me introduce myself. My name is Rob Winter, ex-British Army and now I am a, British based, Security and Intelligence consultant. My main areas of concern are Counter Organised Crime, Counter Terrorism/Activists and Counter Industrial and Economic Espionage. Previous clients have included security assignments for businesses and very high ranking members of (non-British) Royal families, operating internationally, aswell as sub-contracting for British Local Authorities and Police Service surveillance operations. Specialising in protection from armed robbery, shooting/assassination, kidnap/abduction, blackmail/extortion and the protection of Intellectual Property or any other personal or business information. My services are also intended for those people or businesses travelling to volatile, unstable, high risk countries around the world; for example former Eastern Bloc countries, Middle East, African, South American or South East Asian countries where there is an increased risk of the aformentioned crimes aswell as being caught up in the countries own political and criminal conflicts with professional terrorists and criminal groups. A business may also have sensitive information or technology which rival companies, both domestic and overseas, may attempt to acquire. My Counter Economic and Industrial Espionage services are normally required by those companies wishing to maintain their business information (personnel, clients, suppliers, financial status, operating methods and procedures, future projects and contract tendering bids, etc etc) a secret from competing companies, both national and international. With a a change of roles for many countries own State Intelligence services they are now carrying out Industrial Espionage operations on foreign companies with business in their country for the benefit of their own nations industries. My services include: Consultation. (Company Security Policies; Project Management; Security Audits & Testing; Personal Security Practices; etc etc.) International Travel Threat Assessments and Risk Analysis. International Travel Security Preparations. Bodyguard services. (Undercover Bodyguards through to High Profile Bodyguards.) Business Security Assessment, Establishment and Reviews. Residential Security Assessment, Establishment and Reviews. Couriers Protective Escorts. Security Lectures. International Kidnap/Abduction Recovery. Intellectual Property Security Assessment, Establishment and Reviews. Intelligence gathering and Analysis. Personnel Profiles and Vetting. Competing Company Profiles. Surveillance (Physical, Audio, Photographic & Video.) Counter - Surveillance. Once again, thanks for accepting me into the group, I look forward to sharing information, exchanges in lively debates and hope to be of service to anyone where I can. Take care. Regards, Rob W. Executive Member, Professional Bodyguard Association - International. Member, Bodyguards International. Member, Bodyguards Standards. Member, Covert Surveillance. Member, Technical Surveillance Counter Measures. Mr R. Winter PO Box 28 Filey YO14 0YL UNITED KINGDOM. Telephone: +44 (0)7818 220985. E-mail: rjw308@h... _________________________________________________________________ Send and receive Hotmail on your mobile device: http://mobile.msn.com 4351 From: Matthew Paulsen Date: Sun Dec 16, 2001 10:08am Subject: Counter IDS for large infrastructure Hi all - I'd like to find out what other people are using on large, multinational, 1,000,000 + object/user networks that encompass the globe for counter intrusion detection systems as well as non-perimeter based intrusion detection systems. I have a few standard approaches but I'd like to see if there's anything else that might stand out. I typically use 3rd party shrinkwrap products to cover at least 2 platforms on a dual scan level ms, novell, sun, using iss, nai, etc. etc. - internal/external and breakup the various segments that way as well. Also - are there any automated processes available that can map tscm sweeps into an IDS (beyond creating a database and monitoring it over time - automated being the primary word) to set metrics up over time to determine long term potential variances in environments to alert security of potential changes in an environment that may not be seen on a case-by-case analysis? Thanks again, Matt [Non-text portions of this message have been removed] 4352 From: James M. Atkinson Date: Sun Dec 16, 2001 0:28pm Subject: Neil Young's "Let's Roll" Please pass this link around: Neil Young's "Let's Roll" pays tribute to those who died on the hijacked airline that crashed in a Pennsylvania field on September 11th. "Let's Roll" was inspired by the words reportedly spoken by United Airlines passenger Todd Beamer shortly before he and several other passengers stormed the cockpit to overpower the terrorists. http://www.npr.org/ramfiles/asc/inspired.young.ram -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- From: Brian Varine Date: Sun Dec 12, 2004 8:46pm Subject: Checking GSM Encryption Type? Does anyone know if there is a way to determine what type of encryption your GSM phone is using or is there a cheat sheet of what each provider is using? Thx, Brian 10407 From: Agent Geiger Date: Mon Dec 13, 2004 8:39am Subject: Re: Steve Wilson Update - Now is in a Mental Hosptital Who is he? --- "James M. Atkinson" wrote: > > Over the past week Steve Wilson was transfer from > Atlanta (where he spent > the past few weeks, and had his first encounter with > a real prison) to the > BOP Transit Facility in Oklahoma (via Con Air) where > he spend a few days > before being transferred to the Psych Ward of the > Lexington facility. > > He could have been attacked in Atlanta (the Aryan's > and Pagan MC just had > an incident there), or he may just of had a complete > meltdown when he > realized that his CIA buddies wer not coming to > rescue him. > > Either way, he has not been committed to the Federal > Medical Facility in > Lexington. It should be interesting to see is he > tries to escape to > facility (many others have escaped this facility > recently). > > Inmate Information for STEPHEN J WILSON > > Inmate Register Number : 20444-074 > Name : STEPHEN J WILSON > Age : 60 > Race : WHITE > Sex : MALE > > Projected Release Date : UNKNOWN > > Location : LEXINGTON FMC > 3301 LEESTOWN ROAD > LEXINGTON , KY 40511 > > Phone Number : (859)255-6812 > > > > > > > > > ----------------------------------------------------------------------------------------------------- > > > We Expertly Hunt Real Spies, Real Eavesdroppers, and > Real Wiretappers. > ----------------------------------------------------------------------------------------------------- > > > James M. Atkinson > Phone: (978) 381-9111 > Granite Island Group Fax: > > 127 Eastern Avenue #291 > Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > ----------------------------------------------------------------------------------------------------- > > > World Class, Professional, Ethical, and Competent > Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > ----------------------------------------------------------------------------------------------------- > > > > > __________________________________ Do you Yahoo!? All your favorites on one personal page ñ Try My Yahoo! http://my.yahoo.com 10408 From: fjansgmxnet Date: Mon Dec 13, 2004 8:52am Subject: Re: Checking GSM Encryption Type? --- In TSCM-L@yahoogroups.com, "Brian Varine" wrote: > > Does anyone know if there is a way to determine what type of encryption your > GSM phone is using or is there a cheat sheet of what each provider is using? You could use the network monitor mode feature of old Nokia GSM phones (51xx, 61xx, etc) to see what type of encryption your provider is using, if you call with this Nokia phone. Your GSM phone will normally use the same encryption. But of cause your GSM phone will not use any encryption, if somebody has "patched" the firmware to send "only A5/0 available" in the GSM classmark message. Regards, Frank 10409 From: savanted1© Date: Mon Dec 13, 2004 0:07pm Subject: Officials Issue Warning About Internet Fraud And Fake Money Officials Issue Warning About Internet Fraud And Fake Money Orders There's a word of warning out about a fraud scheme sweeping across the Internet. It could cost you hundreds of dollars, and land you in federal prison.... http://www.crime-research.org/news/12.12.2004/843/ Savanted1Æ Mr. Garrett Hord __|__ -@--@--(_)--@--X-- savanted1@y... savanted1@h... savanted1@n... Innovations At The Speed Of A ThoughtÆ You Cannot Do Today's Work With Yesterday's SkillsÆ It Is Wise To Educate A Child Than To Raise An AdultÆ ================================================== This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. --------------------------------- Do you Yahoo!? All your favorites on one personal page ñ Try My Yahoo! [Non-text portions of this message have been removed] 10410 From: James M. Atkinson Date: Mon Dec 13, 2004 7:28pm Subject: What I want for Christmas In case anybody on the list is interested (and is feeling generous), here is what I would like for Christmas: http://www.harley-davidson.com/PR/MOT/2005/05_template.asp?bmLocale=en_US&market=US&family=Touring&model=FLHTCU&modelSection=gallery My dog has mentioned that he would like the following for Christmas (to go with above): http://www.harley-davidson.com/PR/MOT/2005/05_sidecar_spec.asp?bmLocale=en_US&family=Touring&model=FLHTCU&market=US&markettype=DOM',%20'sidecarWindow' -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10411 From: Wizards Date: Mon Dec 13, 2004 8:27pm Subject: Re: What I want for Christmas I have a cherry, jet black, full dresser, 2003 FLHT, 100th Anniversary model, (these will go up every year) with only 3000 miles on it I need to sell for CASH soon. I'm the original owner and it runs perfect. (been riding Harleys 41 years and I take care of them) $15,000 (2004 FLHT's go for $18,500 and are identical.) Going in the paper next weekend.........won't last 2 days at that price. (Got a DUII, blew 1.0.......state law is 0.08. License suspended Jan 16th for a year, so I figure i'll sell my 2003 FLHT and spend the year building a custom chopper with a 160 cu in motor that will blow away all the rice rockets.) Also have a Ambulance, Dodge 4x4 V10 pickup, Bronco 4x4 and a Chev car hauler. Might even sell my fixer-upper 4 story, 8 bedroom Victorian overlooking Oregons NW Coast with fantastic water views, cheap. Make ya a package deal for everything $200,000 cash and i'll throw in some other goodies. Email me privately if you or anyone else is interested, Wizards ----- Original Message ----- From: James M. Atkinson To: TSCM-L Sent: Monday, December 13, 2004 5:28 PM Subject: [TSCM-L] What I want for Christmas In case anybody on the list is interested (and is feeling generous), here is what I would like for Christmas: http://www.harley-davidson.com/PR/MOT/2005/05_template.asp?bmLocale=en_US&market=US&family=Touring&model=FLHTCU&modelSection=gallery My dog has mentioned that he would like the following for Christmas (to go with above): http://www.harley-davidson.com/PR/MOT/2005/05_sidecar_spec.asp?bmLocale=en_US&family=Touring&model=FLHTCU&market=US&markettype=DOM',%20'sidecarWindow' -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10412 From: Date: Mon Dec 13, 2004 9:31pm Subject: The new AOR SR2000 Anybody have any opinions on the new AOR2000 Surveillance Receiver? This is due to be launched in the UK early 2005 no price yet but I heard about £2000. To quote ----"Spec is 25 to 3GHz am/nfm/wfm in the same cabinet as the SDU5600 the embedded radio is a cross between the AR-ONE and the AR8600 MK2". I have an excellent photo [JPEG] supplied by AOR UK if anybody wants a copy. I am not a user of AOR so anybody that is, might have some practical opinions. Regards to all Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) [Non-text portions of this message have been removed] 10413 From: Tech Sec Lab Date: Tue Dec 14, 2004 6:26am Subject: RE: What I want for Christmas Well, our weather isn't too well suited for that, so if you get me one of these then we'll call it quits... http://www.astonmartin.com/content/astonmartin/documents/Brochure_DB9_ENG_72 .pdf :) ****************************** Message: 9 Date: Mon, 13 Dec 2004 20:28:29 -0500 From: "James M. Atkinson" Subject: What I want for Christmas In case anybody on the list is interested (and is feeling generous), here is what I would like for Christmas: http://www.harley-davidson.com/PR/MOT/2005/05_template.asp?bmLocale=en_US&ma rket=US&family=Touring&model=FLHTCU&modelSection=gallery My dog has mentioned that he would like the following for Christmas (to go with above): http://www.harley-davidson.com/PR/MOT/2005/05_sidecar_spec.asp?bmLocale=en_U S&family=Touring&model=FLHTCU&market=US&markettype=DOM',%20'sidecarWindow' -jma 10414 From: savanted1© Date: Tue Dec 14, 2004 9:02am Subject: USA: Intelligence Bill Expands Watch Lists USA: Intelligence Bill Expands Watch Lists (11 December 2004) The intelligence bill just passed by Congress will greatly expand the number of people compared to the two government "watch lists" containing names of suspected terrorists and other people the government says need additional scrutiny. Cruise passengers and all airport workers including tens of thousands of restaurant workers, concession clerk, cleaners, caterers and delivery people will now be checked against government watch lists. Despite the claim that these changes add another layer of security for the traveling public, Marcia Hofman, attorney for the Electronic Privacy Information Center, notes, "To expand the use of something that's already so error-prone is shocking." http://www.pjstar.com/stories/121104/NAT_B4VQ1MKT.046.shtml Savanted1Æ Mr. Garrett Hord __|__ -@--@--(_)--@--X-- savanted1@y... savanted1@h... savanted1@n... Innovations At The Speed Of A ThoughtÆ You Cannot Do Today's Work With Yesterday's SkillsÆ It Is Wise To Educate A Child Than To Raise An AdultÆ ================================================== This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. --------------------------------- Do you Yahoo!? Yahoo! Mail - You care about security. So do we. [Non-text portions of this message have been removed] 10415 From: J. Molay Date: Tue Dec 14, 2004 5:40am Subject: Re: Checking GSM Encryption Type? On Sun, 12 Dec 2004 21:46:52 -0500 "Brian Varine" wrote: > > > Does anyone know if there is a way to determine what type of encryption your > GSM phone is using or is there a cheat sheet of what each provider is using? > Netmonitor or service mode, like nokia netmonitor http://www.nobbi.com/download/nmmanual.pdf ++++++++++++++ ############## +CIPHER :aaa + #CipherValue # +HOPPING:bbb + #HoppingValue# +DTX :ccc + #DTXValue # +IMSI :ddd + #IMSIAttach # ++++++++++++++ ############## aaa ciphering value, OFF/A51/A52 bbb hopping value, ON/OFF ccc DTX value ON/OFF ddd IMSI attach ON : IMSI attach on OFF : IMSI attach off These values are updated only on when the phone is active on a TCH. > Thx, > Brian > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > -- J. Molay 10416 From: moellerthy <1ach@g...> Date: Tue Dec 14, 2004 1:02pm Subject: Re: USA: Intelligence Bill Expands Watch Lists Hello I am watching these to proposal's carefully S. 2586 & S. 2659 Senate Kly,Dewine Andre Holmes Neptune Enterprise Security 1ach@G... --- In TSCM-L@yahoogroups.com, "savanted1©" wrote: > > USA: Intelligence Bill Expands Watch Lists > (11 December 2004) > The intelligence bill just passed by Congress will greatly expand the > number of people compared to the two government "watch lists" containing > names of suspected terrorists and other people the government says need > additional scrutiny. Cruise passengers and all airport workers > including tens of thousands of restaurant workers, concession clerk, > cleaners, caterers and delivery people will now be checked against > government watch lists. Despite the claim that these changes add > another layer of security for the traveling public, Marcia Hofman, > attorney for the Electronic Privacy Information Center, notes, "To > expand the use of something that's already so error-prone is shocking." > http://www.pjstar.com/stories/121104/NAT_B4VQ1MKT.046.shtml > > > > Savanted1Æ > Mr. Garrett Hord > __|__ > -@--@--(_)--@--X-- > savanted1@y... > savanted1@h... > savanted1@n... > Innovations At The Speed Of A ThoughtÆ > You Cannot Do Today's Work With Yesterday's SkillsÆ > It Is Wise To Educate A Child Than To Raise An AdultÆ > ================================================== > This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. > > --------------------------------- > Do you Yahoo!? > Yahoo! Mail - You care about security. So do we. > > [Non-text portions of this message have been removed] 10417 From: contranl Date: Tue Dec 14, 2004 3:15pm Subject: For your knowledge ( Logperiodic antennas ...lowcost ) . For your knowledge you may want to have a look at this website that sells a lowcost range of handheld LOGPERIODIC antennas wich are very reasonable priced and suitable for TSCM purposes: http://tinyurl.com/5vtp4 I don't know if they are any good but "hey why not" these type of antennas always have a little "magic" around them wich is not really neccesary. Logperiodic antennas are basically wideband directional antennas that will resonate over a wide range of frequencies ...the main magic comes from the fact that they are a little difficult to calculate/design. Once you have mastered the calculating you could produce them for any frequency-range. For a simple understanding you could see a logperiodic as a series of parallel connected antennas each serving it's own frequency-band. High-end (expensive) logperiodics are designed in such a way that the gain for the whole range is as flat as possible ..this is specially important for EMC/RFI-testing where exact reports about interference levels are made...for TSCM a super-flat behaviour is not a must all you want is to make shure you "catch" the signal. Anyway they come in handy if you want to do wideband measurements without having to carry around lots of antennas. ofcourse if you are only interested in a relative small frequency-range a dedicated antenna for that range would work better since it will give you more signal(gain). What is a small frequency-range ? i'd say 10~15% of the center-frequency you want to measure. Example: 2.4 Ghz-band 10~15% would be 240~360 mhz So a "normal" antenna could work fine from lets say 2.1~2.7 Ghz This is just a rough example and a rule of thumb based on practical experience ...however special wider band antennas do exist. Example: 450 Mhz 10~15% would be 45~67 Mhz So a simple whip antenna could do 400~500 mhz without to much loss. Now if you want to do more then 15% you may need a special wide-band antenna such as for example a logperiodic. We all know that varying the length of a antenna just 1% or 1 Inch or 1 cm could make a weak signal disappear completely ...a perfect solution for that does not exist...so it's either a specially designed wideband antenna for a specific (but still relative small) frequency band or you have to carry around a case full with 150 antennas wich ofcourse is very impractical. A good soulution would be a logperiodic-antenna that will cover a much wider band and do several bands at the same time. With the tendency of ever increasing frequencies in to the many Ghz range a logperiodic comes in handy ...ofcourse they are directional so you have to sweep more directions. An alternative to a LOGPERIODIC could be a DISCONE antenna wich has the advantage of being omnidirectional ...this antenna will give you some more time to drink your coffee since you don't need to beam it in all directions, they are mainly used with radio-scanners that do a very wide range (20~1000mhz),i am shure they don't have a flat response, i see them sometimes used in TSCM but i have no idea if the are really practical into the Ghz range...maybe someone can say something about that ? Anyway the prices at mentioned website are good ...compared to the exorbitant prices you see sometimes asked for these "magic" antennas. They also sell some rf-detectors and interesting screening materials...can't say anything about those(yet). Greetings Tetrascanner www.tetrascanner.com 10418 From: James M. Atkinson Date: Tue Dec 14, 2004 4:19pm Subject: Holiday Eating Tips Holiday Eating Tips 1. Avoid carrot sticks. Anyone who puts carrots on a holiday buffet table knows nothing of the holiday spirit. In fact, if you see carrots, leave immediately. Go next door, where they're serving rum balls. 2. Drink as much eggnog as you can. And quickly. Like fine single-malt scotch, it's rare. In fact, it's even rarer than single-malt scotch. You can't find it any other time of year but now. So drink up! Who cares that has 10,000 calories in every sip? It's not as if you're going to turn into an eggnog-aholic or something. It's a treat. Enjoy it. Have one for me. Have two. It's later than you think. It's Christmas! 3. If something comes with gravy, use it. That's the whole point of gravy. Gravy does not stand alone. Pour it on. Make a volcano out of your mashed potatoes. Fill it with gravy. Eat the volcano. Repeat. 4. As for mashed potatoes, always ask if they're made with skim milk or whole milk. If it's skim, pass. Why bother? It's like buying a sports car with an automatic transmission. 5. Do not have a snack before going to a party in an effort to control your eating. The whole point of going to a Holiday party is to eat other people's food for free. Lots of it. Hello? 6. Under no circumstances should you exercise between now and New Year's. You can do that in January when you have nothing else to do. (OK, OK, even I don't agree with this one!!) This is the time for long naps, which you'll need after circling the buffet table while carrying a 10-pound plate of food and that vat of eggnog. 7. If you come across something really good at a buffet table, like frosted Christmas cookies in the shape and size of Santa, position yourself near them and don't budge. Have as many as you can before becoming the center of attention. They're like a beautiful pair of shoes. If you leave them behind, you're never going to see them again. 8. Same for pies. Apple. Pumpkin. Mincemeat. Have a slice of each. Or, if you don't like mincemeat, have two apples and one pumpkin. Always have three. When else do you get to have more than one dessert? Labor Day? 9. Did someone mention fruitcake? Granted, it's loaded with the mandatory celebratory calories, but avoid it at all cost. I mean, have some standards. 10. One final tip: If you don't feel terrible when you leave the party or get up from the table, you haven't been paying attention. Reread tips; start over, but hurry, January is just around the corner. Remember this motto to live by: "Life should NOT be a journey to the grave with the intention of arriving safely in an attractive and well preserved body, but rather to skid in sideways, chocolate in one hand, martini in the other, body thoroughly used up, totally worn out and screaming "WOO HOO what a ride!" ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10419 From: James M. Atkinson Date: Tue Dec 14, 2004 4:21pm Subject: Holiday Eating Tips Holiday Eating Tips 1. Avoid carrot sticks. Anyone who puts carrots on a holiday buffet table knows nothing of the holiday spirit. In fact, if you see carrots, leave immediately. Go next door, where they're serving rum balls. 2. Drink as much eggnog as you can. And quickly. Like fine single-malt scotch, it's rare. In fact, it's even rarer than single-malt scotch. You can't find it any other time of year but now. So drink up! Who cares that has 10,000 calories in every sip? It's not as if you're going to turn into an eggnog-aholic or something. It's a treat. Enjoy it. Have one for me. Have two. It's later than you think. It's Christmas! 3. If something comes with gravy, use it. That's the whole point of gravy. Gravy does not stand alone. Pour it on. Make a volcano out of your mashed potatoes. Fill it with gravy. Eat the volcano. Repeat. 4. As for mashed potatoes, always ask if they're made with skim milk or whole milk. If it's skim, pass. Why bother? It's like buying a sports car with an automatic transmission. 5. Do not have a snack before going to a party in an effort to control your eating. The whole point of going to a Holiday party is to eat other people's food for free. Lots of it. Hello? 6. Under no circumstances should you exercise between now and New Year's. You can do that in January when you have nothing else to do. (OK, OK, even I don't agree with this one!!) This is the time for long naps, which you'll need after circling the buffet table while carrying a 10-pound plate of food and that vat of eggnog. 7. If you come across something really good at a buffet table, like frosted Christmas cookies in the shape and size of Santa, position yourself near them and don't budge. Have as many as you can before becoming the center of attention. They're like a beautiful pair of shoes. If you leave them behind, you're never going to see them again. 8. Same for pies. Apple. Pumpkin. Mincemeat. Have a slice of each. Or, if you don't like mincemeat, have two apples and one pumpkin. Always have three. When else do you get to have more than one dessert? Labor Day? 9. Did someone mention fruitcake? Granted, it's loaded with the mandatory celebratory calories, but avoid it at all cost. I mean, have some standards. 10. One final tip: If you don't feel terrible when you leave the party or get up from the table, you haven't been paying attention. Reread tips; start over, but hurry, January is just around the corner. Remember this motto to live by: "Life should NOT be a journey to the grave with the intention of arriving safely in an attractive and well preserved body, but rather to skid in sideways, chocolate in one hand, martini in the other, body thoroughly used up, totally worn out and screaming "WOO HOO what a ride!" ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 10420 From: Date: Tue Dec 14, 2004 10:16pm Subject: Re: For your knowledge ( Logperiodic antennas ...lowcost ) Thanks once again Tetrascanner for a very informative posting the website is well worth looking at Regards to all Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Lancs ENGLAND 01695558544 07866206112 [Non-text portions of this message have been removed] 10421 From: Charles Patterson Date: Thu Dec 16, 2004 7:35pm Subject: Sweep needed in Denver Colorado Hi all, I have a contact with a potential sweep needed (a business) in Denver Colorado. Contact me privately if you can cover it. Charles Patterson charles@t... 914-366-0291 10422 From: John Young Date: Thu Dec 16, 2004 10:41pm Subject: Bug Found at UN Geneva Headquarters Swiss news reports a bug has been found at the UN's Geneva HQ, reportedly hidden for several years based on the evidence of a largish device preceding miniaturization (perhaps it can be identified by someone here): http://www.swissinfo.org/sen/swissinfo.html?siteSect=143sid=5410684 There's a video which shows the device and commentary by a "surveillance" pro (very long URL which brings up a Real Player choice): http://switchboard.real.com/player/email.html?PV=6.0.12&title=%20&link=http %3A%2F%2Fa1927.v9943d.c9943.g.vr.akamaistream.net%2Framgen%2Fondemand%2F7%2F 1927%2F9943%2Fv12162004%2Fswissinfo.download.akamai.com%2F9943%2Ftsr%2Ftj%2F tj%5F12162004%2D160k.rm%3Fstart%3D00%3A00%3A34.083%26end%3D00%3A03%3A19.083 10423 From: James M. Atkinson Date: Thu Dec 16, 2004 9:18pm Subject: Re: Bug Found at UN Geneva Headquarters U.N. bugged at Geneva HQ December 16, 2004 11:00 PM U.N. bugged at Geneva HQ GENEVA (Reuters) - The United Nations says a secret listening device has been found in a posh meeting room of its European headquarters in Geneva. The room was used by ministers from major powers last year during private talks on Iraq following the U.S. invasion and occupation. Marie Heuze, chief U.N. spokeswoman in Geneva, confirmed the report by French-language Swiss Television which said the sophisticated bugging device had been uncovered in recent months in the Salon Francais of the Palais des Nations, formerly the League of Nations. "I confirm that U.N. workmen found a listening device. An inquiry was unable to determine when the device was planted or by whom," she told Reuters. Swiss Television said the device was found in wooden panels in the room, but Heuze declined to give any details. The foreign ministers of the United States, Russia, China, Britain and France met at the United Nations in Geneva in September 2003 for talks on Iraq. One delegation, probably France's, is believed to have used the Salon Francais -- also used last January during talks on global hunger organised by Brazilian President Luiz Inacio Lula da Silva and French President Jacques Chirac. "It is not a negotiating room but a prestigious room of historical interest which is put at the disposal of heads of delegations," Heuze said. The elegant Salon Francais, which has art deco furniture from the 1930s, is adjacent the room where the U.N.-sponsored Conference on Disarmament holds weekly negotiations. A Geneva-based security expert who saw photos of the device told the television the system appeared to be of Russian or Eastern European origin. Its size indicated it was three or four years old, before such circuits were miniaturised, he said. At 11:41 PM 12/16/2004, John Young wrote: >Swiss news reports a bug has been found at the UN's >Geneva HQ, reportedly hidden for several years based >on the evidence of a largish device preceding miniaturization >(perhaps it can be identified by someone here): > > >http://www.swissinfo.org/sen/swissinfo.html?siteSect=143sid=5410684 > >There's a video which shows the device and commentary >by a "surveillance" pro (very long URL which brings up a Real >Player choice): > > >http://switchboard.real.com/player/email.html?PV=6.0.12&title=%20&link=http >%3A%2F%2Fa1927.v9943d.c9943.g.vr.akamaistream.net%2Framgen%2Fondemand%2F7%2F >1927%2F9943%2Fv12162004%2Fswissinfo.download.akamai.com%2F9943%2Ftsr%2Ftj%2F >tj%5F12162004%2D160k.rm%3Fstart%3D00%3A00%3A34.083%26end%3D00%3A03%3A19.083 ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10424 From: James M. Atkinson Date: Thu Dec 16, 2004 9:33pm Subject: Acoustic Keyboard Eavesdropping Acoustic Keyboard Eavesdropping December 12, 2004 By STEPHEN MIHM http://www.nytimes.com/2004/12/12/magazine/12ACOUSTIC.html?ex=1103890604&ei=1&en=b948e2d98165de28 When it comes to computer security, do you have faith in firewalls? Think passwords will protect you? Not so fast: it is now possible to eavesdrop on a typist's keystrokes and, by exploiting minute variations in the sounds made by different keys, distinguish and decipher what is being typed. Credit for this discovery goes to Dmitri Asonov, a computer-security researcher for I.B.M. at the Almaden Research Center in San Jose, Calif., who (with Rakesh Agrawal) published his results this year. The principle is a simple one. Keyboards are a bit like drums: the keys rest atop a plastic plate; different areas of the plate yield different sounds when struck. The human ear can't tell the difference, but if the sounds are recorded and processed by a highly sophisticated computer program, the computer can, with a little bit of practice, learn to translate the sounds of keystrokes into the appropriate letters and symbols. This means that firewalls and passwords will amount to nothing if someone manages to bug a room and record the cacophony of keystrokes. Asonov managed to pull off this feat with readily available recording equipment at a short distance. Even as far away as 50 feet, and with significant background noise, he was able to replicate his success using a parabolic microphone. He also anticipated an obvious practical objection: how does a would-be eavesdropper get into a building and spend enough time to ''train'' a computer program to recognize the keystrokes of a particular keyboard? Not a problem: it seems that keyboards of the same make and model sound sufficiently alike -- regardless of who is typing -- that a computer trained on one keyboard can be unleashed on another. Having divulged this vulnerability, Asonov says he felt dutybound to come up with a countermeasure. Keyboards, he proposes, could be engineered in such a way that the sounds of different keys would be indistinguishable from one another. But even if engineers manage that, other loopholes will undoubtedly emerge. Asonov says that he has heard rumors of research into the possibility of using computers to translate the humming of ink-jet printers into the actual text being printed. Thankfully, such approaches remain relatively exotic and beyond the reach of the average eavesdropper. ''Everyone still tries to break firewalls,'' Asonov complains. ''People don't think outside the box.'' ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10425 From: Charles Patterson Date: Thu Dec 16, 2004 10:49pm Subject: Re: Acoustic Keyboard Eavesdropping That photo is funny, add appropriate captions and it could be down right hillarious! ----- Original Message ----- From: "James M. Atkinson" To: "TSCM-L" Sent: Thursday, December 16, 2004 10:33 PM Subject: [TSCM-L] Acoustic Keyboard Eavesdropping > > Acoustic Keyboard Eavesdropping > > December 12, 2004 > By STEPHEN MIHM > > http://www.nytimes.com/2004/12/12/magazine/12ACOUSTIC.html?ex=1103890604&ei=1&en=b948e2d98165de28 > > > When it comes to computer security, do you have faith in > firewalls? Think passwords will protect you? Not so fast: > it is now possible to eavesdrop on a typist's keystrokes > and, by exploiting minute variations in the sounds made by > different keys, distinguish and decipher what is being > typed. > > > Credit for this discovery goes to Dmitri Asonov, a > computer-security researcher for I.B.M. at the Almaden > Research Center in San Jose, Calif., who (with Rakesh > Agrawal) published his results this year. The principle is > a simple one. Keyboards are a bit like drums: the keys rest > atop a plastic plate; different areas of the plate yield > different sounds when struck. The human ear can't tell the > difference, but if the sounds are recorded and processed by > a highly sophisticated computer program, the computer can, > with a little bit of practice, learn to translate the > sounds of keystrokes into the appropriate letters and > symbols. > > > This means that firewalls and passwords will amount to > nothing if someone manages to bug a room and record the > cacophony of keystrokes. Asonov managed to pull off this > feat with readily available recording equipment at a short > distance. Even as far away as 50 feet, and with significant > background noise, he was able to replicate his success > using a parabolic microphone. He also anticipated an > obvious practical objection: how does a would-be > eavesdropper get into a building and spend enough time to > ''train'' a computer program to recognize the keystrokes of > a particular keyboard? Not a problem: it seems that > keyboards of the same make and model sound sufficiently > alike -- regardless of who is typing -- that a computer > trained on one keyboard can be unleashed on another. > > > Having divulged this vulnerability, Asonov says he felt > dutybound to come up with a countermeasure. Keyboards, he > proposes, could be engineered in such a way that the sounds > of different keys would be indistinguishable from one > another. But even if engineers manage that, other loopholes > will undoubtedly emerge. Asonov says that he has heard > rumors of research into the possibility of using computers > to translate the humming of ink-jet printers into the > actual text being printed. > > > Thankfully, such approaches remain relatively exotic and > beyond the reach of the average eavesdropper. ''Everyone > still tries to break firewalls,'' Asonov complains. > ''People don't think outside the box.'' > > > > > ---------------------------------------------------------------------------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: > http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > > -------------------------------------------------------------------------------- > Yahoo! Groups Links > > a.. To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > b.. To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 10426 From: Shawn Hughes (Road) Date: Fri Dec 17, 2004 5:21am Subject: Re:circuitry Its size indicated it was three or four years old, before such circuits were miniaturised, he said. HUH? That would make it circa 2000. SMT has been around a LOT longer than that....maybe they meant to say 10 - 15 years old? -Shawn ==================================== Shawn Hughes Special Projects Consultant and Subcontractor 110 Hughes Hale Lane, Harriman, TN 37748 USA (865) 335-7992 Voicemail srh@e... /////////////////////////////////////////////////////////////////////////////// Lead Instructor Explosives, WMD, and Technical Operations Tactical Response www.warriormindset.com Training at the Cutting Edge! (731) 676-2041 Main Office ////////////////////////////////////////////////////////////////////////////// ******NOTICE: Due to the age of my email account, I have to set spam filtering VERY high. If you do not receive a response in a reasonable amount of time, please try an alternate communications method. I apologize for the inconvienence. 10427 From: contranl Date: Fri Dec 17, 2004 5:33am Subject: What the F..... is this ? . What the F..... is this ? http://content.collegehumor.com/media/movies/oh-58d_-_jrtc_fun.wmv or http://tinyurl.com/3l2t7 It's a 6 min video ...takes some time to download first. Tetrascanner 10428 From: contranl Date: Fri Dec 17, 2004 6:43am Subject: Sinn Fein was also bugged this year with a huge bug (video) I don't know about if these big bugs are that old... look at this one found in september this year at a house used by Sinn Fein (the political wing of the IRA) They say it was put there by the British: video: http://www.rte.ie/news/2004/0914/6news/6news56_4a.smil audio: http://www.rte.ie/news/2004/0914/57live/57live2.smil It's even BIGGER then the one found in Switserland ! Amazing is'nt it...do they want it to run 10 years or so ? at 5 miles range ? And this is the one they found 1 week before the above one and it's a lot smaller...ok not that small but compared: video: http://www.rte.ie/news/2004/0906/6news/6news56_13a.smil And here's one they found in 1999 in a car they say it had sattelite capabilties (probably just GPS-tracking i guess) video: http://www.rte.ie/news/1999/1208/9News/9News3A.ram video: http://www.rte.ie/news/1999/1209/6News/6News6A.ram audio: http://www.rte.ie/news/2004/0914/57live/57live2.smil I have to say that 2004 is a real top-year for bug-discoveries isn't it ? And who said that size does matter :) :) By the way i am putting a collection of video's (links) online that deal with bugging/electronic spying (similar to above)...please let me know if you have any links to such online video's, i have about 30 video-links right now. Thanks ! Tetrascanner www.tetrascanner.com 10429 From: contranl Date: Fri Dec 17, 2004 8:14am Subject: Blair talks 30 min about bugging and sec serv (video) . Tony Blair talks about bugging and the security services for half an hour! .....and reveals nothing. video: http://www.bbc.co.uk/newsa/n5ctrl/events04/ukpol/lab/blair_monthly/fe b/blair26feb.ram The interview is from earlier this year (just after the Kofi Anan scandal) but was only recently posted. Tetrascanner www.tetrascanner.com 10430 From: contranl Date: Fri Dec 17, 2004 8:51am Subject: Last video for today (Laserbeam,Sweepteam places bug ?) . Keywords: Bosnia,CIA,UN peace negotiator,Laserbeam,Sweepteam places bug ? video: http://news.bbc.co.uk/olmedia/1400000/video/_1402591_rose_vi.ram Tetrascanner 10431 From: A Grudko Date: Fri Dec 17, 2004 9:08am Subject: RE: What the F..... is this ? -----Original Message----- From: contranl [mailto:contranl@y...] > (Q) What the F..... is this ? http://content.collegehumor.com/media/movies/oh-58d_-_jrtc_fun.wmv (A) It's a 6 min video ...takes some time to download first. I didn't ask the Question but I'd like to comment on the Answer. A 6 minute video will take me at least 18 minutes to download and as a pay-per-minute dial-up user could cost me the price of a major movie on the current circuit such as 'National Treasure' which I saw Wednesday and was worth the money. But before I spend my cash money on something from .collegehumor.com I'd like to know what it is. If it's about TSCM I'm happy to spend the money, but if it's about college-kids-making-drunken-crank-calls-wearing-only-their-underwear-on-thei r-heads-dude, I'd rather know first and not waste my money, no matter how funny, cute, clever etc the poster thinks it is. So the question stands Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 [Non-text portions of this message have been removed] 10432 From: James M. Atkinson Date: Fri Dec 17, 2004 11:49am Subject: RE: What the F..... is this ? Andy, Do not download the video. It is a surveillance video of a couple having sex in a car while parked under a canopy. Looks like it may have been shot with a hand held or vehicle mounted thermal camera or it may be a hoax. The voice over on the audio track indicates that either it was shot as a hoax and doctored up by some college kids, or some young Army folks had a little too much time on thier hands and access to expensive imagery equipment. Either way, save your money. -jma At 10:08 AM 12/17/2004, A Grudko wrote: > -----Original Message----- > From: contranl [mailto:contranl@y...] > > > (Q) What the F..... is this ? > http://content.collegehumor.com/media/movies/oh-58d_-_jrtc_fun.wmv > (A) It's a 6 min video ...takes some time to download first. > > I didn't ask the Question but I'd like to comment on the Answer. > > A 6 minute video will take me at least 18 minutes to download and as a >pay-per-minute dial-up user could cost me the price of a major movie on the >current circuit such as 'National Treasure' which I saw Wednesday and was >worth the money. > > But before I spend my cash money on something from .collegehumor.com I'd >like to know what it is. If it's about TSCM I'm happy to spend the money, >but if it's about >college-kids-making-drunken-crank-calls-wearing-only-their-underwear-on-thei >r-heads-dude, I'd rather know first and not waste my money, no matter how >funny, cute, clever etc the poster thinks it is. > > So the question stands > > Andy Grudko (British), DPM, Grad IS (South Africa) > MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 > www.grudko.com , agrudko@i... > Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > Mid Rand (+27 11) 318 1451 - 318 6846(Fax) > Cellular (+27) 82 778 6355 - ICQ 146498943 > SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. > "When you need it done right - first time" > >--- >Outgoing mail is certified Virus Free. >Checked by AVG anti-virus system (http://www.grisoft.com). >Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10433 From: Robert G. Ferrell Date: Fri Dec 17, 2004 10:16am Subject: RE: What the F..... is this ? At 09:08 AM 12/17/2004, A Grudko wrote: > But before I spend my cash money on something from .collegehumor.com I'd >like to know what it is. If it's about TSCM I'm happy to spend the money, >but if it's about >college-kids-making-drunken-crank-calls-wearing-only-their-underwear-on-thei >r-heads-dude, I'd rather know first and not waste my money, no matter how >funny, cute, clever etc the poster thinks it is. It's a military IR camera tape of two people having sex in a convertible under a carport or shed. RGF 10434 From: savanted1 Date: Fri Dec 17, 2004 10:46am Subject: Banks Warned Against On-Line Fraud Dangers The Federal Deposit Insurance Corporation (FDIC) has released a study, "Putting an End to Account-Hijacking Identity Theft", recommending that banks move away from single factor authentication to prevent fraud. Passwords are typically easy to steal, guess, or crack, and once compromised, they give the attacker the same access to a bank account as the account holder. As banks have expanded electronic banking systems, the potential for this sort of fraud has only increased. The FDIC estimates that two million internet users have fallen victim to online banking fraud in the twelve months leading up to April 2004. Fraudsters typically steal account data by cracking computer codes, stealing documents, looking over people's shoulders, getting the data from bank employees, and phishing attacks. The FDIC recommends implementing a multiple factor system of authentication to overcome the weaknesses of passwords and investing in software to scan websites for indications of identity theft. http://www.reuters.com/newsArticle.jhtml?storyID=7094509 10435 From: Rui Shantilal Date: Fri Dec 17, 2004 5:15pm Subject: Re: Acoustic Keyboard Eavesdropping This new just made my day ! I could laugh a bit. Try to record me typing and then my mum, and then my wife and then the a¥s will be b¥s and b¥s will be z ! Off course it is possilble if you now the person, if you can match writing with sound and then listen to the sound. Now if u haven¥t monitored this person before, it is not possible. Now saying that firewall are not use because of this discovery is totally nonsense in my opinion. Firewalls target something different than phisical environment security ! Ahhh now I know ! Maybe hearing music while typing is better then protecting my network using a packet filter ! Yah :-) rs On Thu, 16 Dec 2004 22:33:01 -0500, James M. Atkinson wrote: > > Acoustic Keyboard Eavesdropping > > December 12, 2004 > By STEPHEN MIHM > > http://www.nytimes.com/2004/12/12/magazine/12ACOUSTIC.html?ex=1103890604&ei=1&en=b948e2d98165de28 > > > When it comes to computer security, do you have faith in > firewalls? Think passwords will protect you? Not so fast: > it is now possible to eavesdrop on a typist's keystrokes > and, by exploiting minute variations in the sounds made by > different keys, distinguish and decipher what is being > typed. > > > Credit for this discovery goes to Dmitri Asonov, a > computer-security researcher for I.B.M. at the Almaden > Research Center in San Jose, Calif., who (with Rakesh > Agrawal) published his results this year. The principle is > a simple one. Keyboards are a bit like drums: the keys rest > atop a plastic plate; different areas of the plate yield > different sounds when struck. The human ear can't tell the > difference, but if the sounds are recorded and processed by > a highly sophisticated computer program, the computer can, > with a little bit of practice, learn to translate the > sounds of keystrokes into the appropriate letters and > symbols. > > > This means that firewalls and passwords will amount to > nothing if someone manages to bug a room and record the > cacophony of keystrokes. Asonov managed to pull off this > feat with readily available recording equipment at a short > distance. Even as far away as 50 feet, and with significant > background noise, he was able to replicate his success > using a parabolic microphone. He also anticipated an > obvious practical objection: how does a would-be > eavesdropper get into a building and spend enough time to > ''train'' a computer program to recognize the keystrokes of > a particular keyboard? Not a problem: it seems that > keyboards of the same make and model sound sufficiently > alike -- regardless of who is typing -- that a computer > trained on one keyboard can be unleashed on another. > > > Having divulged this vulnerability, Asonov says he felt > dutybound to come up with a countermeasure. Keyboards, he > proposes, could be engineered in such a way that the sounds > of different keys would be indistinguishable from one > another. But even if engineers manage that, other loopholes > will undoubtedly emerge. Asonov says that he has heard > rumors of research into the possibility of using computers > to translate the humming of ink-jet printers into the > actual text being printed. > > > Thankfully, such approaches remain relatively exotic and > beyond the reach of the average eavesdropper. ''Everyone > still tries to break firewalls,'' Asonov complains. > ''People don't think outside the box.'' > > > > > ---------------------------------------------------------------------------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: > http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > ________________________________ > Yahoo! Groups Links > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. From: Peter Stone Date: Sun Dec 16, 2001 11:17am Subject: RE: Sony surveillance catalog? What I'm looking for is a miniature video camera, of the type sold in spy shops and electronics outlets, for a body-worn application. The links you've given me don't have such a device, the nearest approximation is the DXCLS1/1. Do Sony manufacture such things, or is this a market they leave to other companies? -----Original Message----- This link is in the U.S.: http://bpgprod.sel.sony.com/bpchome.BPC.htm#top Security: http://bpgprod.sel.sony.com/bpcnav/appgroup/10001.BPC.html Sony Japan is: http://www.sony.co.jp/ Sony US: http://www.sony.com/ -- _______________________________________________ Sign-up for your own FREE Personalized E-mail at Mail.com http://www.mail.com/?sr=signup 1 cent a minute calls anywhere in the U.S.! http://www.getpennytalk.com/cgi-bin/adforward.cgi?p_key=RG9853KJ&url=http://www.getpennytalk.com 4354 From: A.Lizard Date: Sun Dec 16, 2001 3:12pm Subject: Details on bin Laden's radio communications system Date: Sun, 16 Dec 2001 13:10:45 -0500 To: politech@p... From: Declan McCullagh Subject: FC: Details on bin Laden's radio communications system : : Sender: owner-politech@p... : Reply-To: declan@w... X-URL: Politech is at http://www.politechbot.com/ X-Author: Declan McCullagh is at http://www.mccullagh.org/ X-News-Site: Cluebot is at http://www.cluebot.com/ : --- From: "Erich M" To: Declan McCullagh Date: Sun, 16 Dec 2001 14:33:48 +0100 Subject: Bin Laden's communications system -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Declan, Here is the gist of three stories in German linked below cu erich If Bin Ladens Voice really could be identified on intercepted radio communications as some US Media report, he most likley used used a Handset of the "High Power HF SSB System" by the Australian manufacturer Codan. These Shortwave SSB [Single Side Band modulation] radio systems [voice and data] are used by most of the UN and many NGO relief orgs [UNHCR, UNICEF, Omar, Red cross] The Codan Marketing Manager confirmed that they had to ship over one thousand additional units to resupply the losses of those organisations in Afghanistan. Taliban/Al Quaeda systematically robbed those Codan Systems and used them to hide their communications. Can you imagine how difficult it was for the US to identify a communications station as a target when it was active with a hardware id and a callsign belonging to a UN organization? In many of the cases when relief orgs were hit by US missiles a Codan station was also destroyed. Codan System typically consists of automobile transceivers, a powerful base station [up to 1 KW covering the whole shortwave spectrum] plus a number of handsets. Each base station can handle up to 400 [!] radio telephony channels, Codan also delievers radio modems Shortwave, being the dirtiest of all spectra of course does not allow reliable on- the-air voice encryption - way too much noise around. Data transmissions are very slow [1Kbit/sec is "fast"] because of high data transmission error rates. Strong encryption systems are difficult to apply - if one character ist corrupt, the whole message remains unreadable - so even embassies around the world use some kind of Baudot-like numerical Code: Information is coded in groups of five numbers. All an easy prey to ECHELON I'd say. Al Kaida did not communicate via PGP or Steganography in pornographic images - God forbid! They used stolen two way radio hardware from relief organizations with stolen callsigns. The challenge to US surveillance was to identify whether a voice speaking in Pashtu [or some other dialect] belonged to the enemy. Or not: four Afghan engineers of a UN technical aid unit were killed by a cruise missile beginning October, the building contained a Codan base station. Full text http://www.heise.de/tp/deutsch/inhalt/co/11357/1.html Abridged version http://futurezone.orf.at/futurezone.orf?read=detail&id=99932 first story http://futurezone.orf.at/futurezone.orf?read=detail&id=98032 -----BEGIN PGP SIGNATURE----- Version: PGP 6.5.8 -- QDPGP 2.61c Comment: http://community.wow.net/grt/qdpgp.html iQA/AwUBPByUrCfG0CJMDx3nEQIOrwCgjQShV/LhGNK3/NglAorcYO7OwRgAoLpR AIb+EJiXUJMZn5tGJq2JytCa =Bcui -----END PGP SIGNATURE----- ----------------------- Taeglich frische IT-Nachrichten http://futurezone.orf.at ------------------------------------------------------------------------- POLITECH -- Declan McCullagh's politics and technology mailing list You may redistribute this message freely if you include this notice. Declan McCullagh's photographs are at http://www.mccullagh.org/ To subscribe to Politech: http://www.politechbot.com/info/subscribe.html This message is archived at http://www.politechbot.com/ ------------------------------------------------------------------------- ************************************************************************ Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 4355 From: Matthew Paulsen Date: Sun Dec 16, 2001 7:34pm Subject: RE: RE: Sony surveillance catalog? To my knowledge since 1998, Sony has only been using items like GV-500 and the GV-900 in vehicled based covert operations and have avoided the type of device you're talking about. But, most likely someone else will tell me I'm wrong (wouldn't be the first time, won't be the last time.) http://www.sel.sony.com/SEL/consumer/ss5/home/handycamrtmcamcorders/mini-dvv ideowalkmanrtm/gv-d900.shtml -----Original Message----- From: Peter Stone [mailto:clearlight@i...] Sent: Sunday, December 16, 2001 9:17 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] RE: Sony surveillance catalog? What I'm looking for is a miniature video camera, of the type sold in spy shops and electronics outlets, for a body-worn application. The links you've given me don't have such a device, the nearest approximation is the DXCLS1/1. Do Sony manufacture such things, or is this a market they leave to other companies? -----Original Message----- This link is in the U.S.: http://bpgprod.sel.sony.com/bpchome.BPC.htm#top Security: http://bpgprod.sel.sony.com/bpcnav/appgroup/10001.BPC.html Sony Japan is: http://www.sony.co.jp/ Sony US: http://www.sony.com/ -- _______________________________________________ Sign-up for your own FREE Personalized E-mail at Mail.com http://www.mail.com/?sr=signup 1 cent a minute calls anywhere in the U.S.! http://www.getpennytalk.com/cgi-bin/adforward.cgi?p_key=RG9853KJ&url=http:// www.getpennytalk.com Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 4356 From: John Savage Date: Sun Dec 16, 2001 8:01pm Subject: A Soldiers Christmas Non-PI http://www.byjoy.com/SoldiersChris.html John Lee Savage (NAIS) P.O. Box 634 Old Orchard Beach, Maine 04064 TEL: 207-286-3945 FAX: 781-723-2551 ****************************************** *Licensed by the Maine State Police *Maine PI License # 373 *Maine Notary Public ****************************************** National Association of Investigative Specialists ******************************************* Maine Licensed Private Investigators Association (MLPIA) ******************************************* 4357 From: James M. Atkinson Date: Mon Dec 17, 2001 2:30pm Subject: Muslim peer claims phone was bugged Muslim peer claims phone was bugged Lucy Ward and Richard Norton-Taylor Monday December 17, 2001 The Guardian A Muslim Labour peer will today make an official complaint to surveillance watchdogs over his claim that his telephone was bugged and he was followed on the orders of the government. Lord Ahmed, who has publicly opposed the government's position on the military campaign in Afghanistan, will call for an investigation by the investigatory powers tribunal into allegations that transcripts of his phone conversations were given to ministers. The phone tapping claims were rejected yesterday by government sources, who - in a departure from policy of "neither confirm nor deny" phone tap allegations - insisted that Lord Ahmed was not under surveillance. His claims rest on inferences drawn from his account - printed in yesterday's Mail on Sunday - of a meeting in late October with foreign office minister Denis MacShane, when Lord Ahmed says the minister challenged him over his opposition to the war. He claims Mr MacShane told him: "We know what you have been saying, who you have been talking to. Everything you say is circulated to ministers," before waving a sheaf of papers, which Lord Ahmed believes to be transcripts of his phone conversations. Yesterday, the peer said Mr MacShane had known details of his reservations over the military campaign which he had disclosed only in a private mobile phone call with a journalist at Pakistan's Daily Jang newspaper. He added the minister had known he had met a particular diplomat whom he had encountered on the green opposite parliament. "Unless people are following me around, how should they know that?" he said. He was "horrified" at the implications. "It must be not only an abuse of my rights, but my parliamentary privilege. I am either a British parliamentarian or a second class enemy within." When Lord Ahmed asked Mr MacShane: "Are you saying MI5 have been bugging my phone, that people are watching me?" he claims the minister said: "They are probably listening here for all I know. Don't think that nobody fucking knows what is going on." Nazir Ahmed, a councillor and property dealer who was ennobled in 1998, comes from Rotherham, the south Yorkshire town represented by Mr MacShane, and the two know each other. The claims about surveillance were dismissed by one government source as "bollocks on stilts". "Denis probably read about Ahmed's reservations in the Daily Jang," the source said. Bugging the phone of a member of the Commons or Lords requires the consent of the prime minister and the home secretary, and could never be authorised by a foreign office minister. At the time of the meeting, Lord Ahmed was growing increasingly concerned about the military action in Afghanistan, amid reports that UNHCR, Red Cross and Red Crescent premises had been accidentally bombed and indications that the military strand of the war on terror appeared far more active than the political and diplomatic ones. The government was anxious to keep the British Muslim community on board over the action, and was keen to find leading Muslim figures speaking out in support. However, one government source yesterday suggested Lord Ahmed had hinted he would like some kind of reward, in terms of a job, for playing such a role, which the government would not provide. Anti-war Labour peer to make official complaint over 'phone taps' By Ben Russell, Political Correspondent Independent 17 December 2001 A Labour peer called for an official investigation yesterday into allegations that his telephone had been tapped by the security services. Lord Ahmed said that he had been shown documents that appeared to be transcripts of telephone calls during a stormy meeting with the Foreign Office minister Denis MacShane. Government sources took the unusual step of dismissing claims that the peer's telephone was tapped as "rubbish". They insisted he was not under surveillance. But Lord Ahmed said Liberty, the civil rights pressure group, would be submitting an official complaint to the independent Investigating Powers Tribunal about his allegation. Lord Ahmed, who has criticised the bombing of Afghanistan, said he was prepared to take the case to the European Court of Human Rights. He said he had been "horrified" at being confronted by Dr MacShane with what he took to be transcripts of telephone conversations. He also said he believed he had been followed. The Labour peer added: "I have asked Liberty to deal with this matter and take it to the Investigating Powers Tribunal. I hope we will be able to prove this is exactly what happened. If not we will take it to the European Court of Human Rights to prove my rights have been infringed. I am certainly horrified." A Home Office spokesman said: "It is a long-standing policy of successive governments not to comment on security issues." But Government sources said the decision to tap the telephone of a member of the House of Lords would require the consent of the Prime Minister and the Home Secretary, and no such consent had been given. Even if such intelligence information had existed, Dr MacShane would not have had access to it. The Prime Minister's official spokesman said the Government would not be commenting on Lord Ahmed's claims in detail. He said: "We can't get into the business of commenting on individual allegations like this, because where would it end? "I don't believe that this will turn into quite the political excitement, the political scandal which the author was predicting," the spokesman added. Asked whether Dr MacShane was challenging Lord Ahmed's conversation, the spokesman said: "People speak to one another. Whether people go away with exactly the same interpretation of a meeting after it's happened is often not the case." The Prime Minister's spokesman added: "Government ministers talk to peers. I cannot be responsible for how people interpret different conversations which might be had between them." Lord Ahmed's solicitor, John Wadham, who is also the director of Liberty, said: "He has instructed me to make an application to the Investigating Powers Tribunal, to make a complaint, because he thinks that his case should be investigated." Mr Wadham said he could not comment on the details of Dr MacShane's alleged comments to Lord Ahmed. He said: "The law regards telephone tapping as the most serious interference with privacy there is. So serious is any interference with someone's telephone privacy, that the authorities can never use evidence from telephone taps in courts of law." The Liberal Democrats' home affairs spokesman, Simon Hughes, said: "Lord Ahmed's allegations about phone tapping have been met with a very strange response. "It is normal security service and government practice never to confirm or deny whether somebody has been the subject of surveillance. The fact there has been a denial in this case is in itself unusual, worrying, and irregular. He added: "Whatever the truth is, the same rules should apply to everybody, whether they are a peer of the realm or a postman." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4358 From: James M. Atkinson Date: Tue Dec 18, 2001 1:48am Subject: That last minute Christmas gift For those of you struggling to find that last minute Christmas gift let me suggest the following items. They make good personal or business gifts, and go well in the office. I stumbled across both of these items and was very impressed. http://www.amazon.com/exec/obidos/ASIN/B00004S8FJ/graniteisland-20 Waring PCJ218 Citrus Juicer, Stainless Steel http://www.amazon.com/exec/obidos/ASIN/B00004R937/graniteisland-20 Melitta MEMB1W Mill & Brew Coffeemaker Of course if you are so moved I suppose you could wrangle one of these into your TSCM tool kit, and take it on-site. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4359 From: Date: Tue Dec 18, 2001 2:46pm Subject: Surveillance the U.S. SF(A) in Afghanistan way : ) This is from a old SF buddy of my. I think he is gettig to old to hump 200 lbs. a day, and is getting very cranky when its get cold : ) John A. John R. Angier II M-Group, Inc. P.O. Box 721388 Norman, OK 73070-8070 USA w 405.321.1015 f 405.321.1259 c 405.833.3199 e mustardcon@a... "We're not running out of targets, Afghanistan is." Donald Rumsfeld, US Secretary of Defense P.S. I ed out the Expletive : ) ************************************************************ Sent: Monday, December 7, 2001, 11: 50 GMT Subject: Informal SITREP Angier you (expletive), It's (expletive) freezing here. I'm sitting on hard, cold dirt between rocks and shrubs at the base of the Hindu Kush Mountains along the Dar 'yoi Pomir River watching a hole that leads to a tunnel that leads to a cave. Stake out, my friend, and no pizza delivery for thousands of miles. I also glance at the area around my ass every ten to fifteen seconds to avoid another scorpion sting. I've actually given up battling the chiggers and sand fleas, but them (expletive) scorpions give a jolt like a cattle prod. Hurts like a bastard. The antidote tastes like transmission fluid. The one truth the Taliban cannot escape is that, believe it or not, they are human beings, which means they have to eat food and drink water. That requires couriers and that's where an old bounty hunter like me comes in handy. I track the couriers, locate the tunnel entrances and storage facilities, type the info into the handheld, shoot the coordinates up to the satellite link that tells the air commanders where to drop the hardware, we bash some heads for a while, then I track and record the new movement. It's all about intelligence. We haven't even brought in the snipers yet. These scurrying rats have no idea what they're in for. We are but days away from cutting off supply lines and allowing the eradication to begin. I dream of bin Laden waking up to find me standing over him with my boot on his throat as I spit a bloody ear into his face and plunge my nickel plated Bowie knife through his frontal lobe. But you know me. I'm a romantic. I've said it before and Ill say it again: This country blows, man. It's not even a country. And you told me how much you love this (expletive) county! There are no roads, there's no infrastructure. This is an inhospitable, rockpit (expletive) ruled by eleventh century warring tribes. There are no jobs here like we know jobs. Afghanistan offers two ways for a man to support his family: join the opium trade or join the army. That's it. Those are your options. Oh, I forgot, you can also live in a refugee camp and eat plum-sweetened, crushed beetle paste and squirt mud like a goose with stomach flu if that's your idea of a party. But the smell alone of those "tent cities of the walking dead" is enough to hurl you into the poppy fields to cheerfully scrape bulbs for eighteen hours a day. And let me tell you something else. I've been living with these Tajiks and Uzbeks and Turkmen and even a couple of Pushtins for over a month and a half now and this much I can say for sure: These guys, all of em, are Huns. Actual, living Huns. They LIVE to fight. Its what they do. Huns (expletive) cavemen with AK 47's. Then again, maybe I'm just cranky. I'm freezing my (expletive) off on this stupid (expletive) hill because my lap warmer is running out of juice and I can't recharge it until the sun comes up in a few hours. Oh yeah! You like to write letters, right? Do me a favor. Write a letter to CNN and tell that awful, sneering, pompous Aaron Brown to stop calling the Taliban "smart." They are not smart. I suggest CNN invest in a dictionary because the word they are looking for is "cunning." The Taliban are cunning, like jackals and hyenas and wolverines. They are sneaky and ruthless and, when confronted, cowardly. They are hateful, malevolent parasites who create nothing and destroy everything else. Smart. Pfft. Yeah, they're real smart. They've spent their entire lives reading only one book and consider hygiene and indoor plumbing to be products of the devil. They're still figuring out how to work a Bic lighter. Talking to a Taliban warrior about improving his quality of life is like trying to teach an ape how to hold a pen; eventually he just gets frustrated and sticks you in the eye with it. OK, enough. Snuffle will be up soon so I have to get back to my hole. Covering my tracks in the snow takes a lot of practice but I'm getting good at it. We've got this one under control. You are a (expletive) for telling me how much you love this hell hole Angier! Saucy Jack 4360 From: Dawn Star Date: Tue Dec 18, 2001 11:45pm Subject: Art Bell's show Wed/Thu On Art Bell's radio show 12/19/01 - Wed/Thu on several am stations starting at around 10 p.m. your local time. Guest: Kevin Mitnick As the world's most famous hacker, Kevin has been the subject of countless news and magazine articles published throughout the world. With more than fifteen years of experience in exploring computer security, Kevin Mitnick is a largely self-taught expert in exposing the vulnerabilities of complex operating systems and telecommunications devices. His hobby as an adolescent consisted of studying methods, tactics, and strategies used to circumvent computer security, and to learn more about how computer systems and telecommunication systems work. Website: www.freekevin.com 4361 From: Paul Timmins Date: Tue Dec 18, 2001 8:45pm Subject: Re: Surveillance the U.S. SF(A) in Afghanistan way : ) FYI: While this is funny, it's not true. http://www.snopes2.com/rumors/freezing.htm -Paul At 08:46 PM 12/18/2001 -0500, you wrote: >This is from a old SF buddy of my. I think he is gettig to old to hump 200 >lbs. a day, and is getting very cranky when its get cold : ) > >John A. > >John R. Angier II >M-Group, Inc. >P.O. Box 721388 >Norman, OK 73070-8070 USA >w 405.321.1015 >f 405.321.1259 >c 405.833.3199 >e mustardcon@a... > > >"We're not running out of targets, Afghanistan is." >Donald Rumsfeld, US Secretary of Defense > > > >P.S. I ed out the Expletive : ) > >************************************************************ > >Sent: Monday, December 7, 2001, 11: 50 GMT >Subject: Informal SITREP > > >Angier you (expletive), > >It's (expletive) freezing here. I'm sitting on hard, cold dirt between rocks >and shrubs at the base of the Hindu Kush Mountains along the Dar 'yoi Pomir >River watching a hole that leads to a tunnel that leads to a cave. Stake >out, my friend, and no pizza delivery for thousands of miles. I also glance >at the area around my ass every ten to fifteen seconds to avoid another >scorpion sting. I've actually given up battling the chiggers and sand fleas, >but them (expletive) scorpions give a jolt like a cattle prod. Hurts like a >bastard. The antidote tastes like transmission fluid. > >The one truth the Taliban cannot escape is that, believe it or not, they are >human beings, which means they have to eat food and drink water. That >requires couriers and that's where an old bounty hunter like me comes in >handy. I track the couriers, locate the tunnel entrances and storage >facilities, type the info into the handheld, shoot the coordinates up to the >satellite link that tells the air commanders where to drop the hardware, we >bash some heads for a while, then I track and record the new movement. It's >all about intelligence. > >We haven't even brought in the snipers yet. These scurrying rats have no >idea what they're in for. We are but days away from cutting off supply lines >and allowing the eradication to begin. I dream of bin Laden waking up to >find me standing over him with my boot on his throat as I spit a bloody ear >into his face and plunge my nickel plated Bowie knife through his frontal >lobe. But you know me. I'm a romantic. > >I've said it before and Ill say it again: This country blows, man. It's not >even a country. And you told me how much you love this (expletive) county! >There are no roads, there's no infrastructure. This is an inhospitable, >rockpit >(expletive) ruled by eleventh century warring tribes. There are no jobs here >like >we know jobs. Afghanistan offers two ways for a man to support his family: >join the opium trade or join the army. That's it. Those are your options. Oh, >I forgot, you can also live in a refugee camp and eat plum-sweetened, crushed >beetle paste and squirt mud like a goose with stomach flu if that's your idea >of a party. >But the smell alone of those "tent cities of the walking dead" is enough to >hurl you into the poppy fields to cheerfully scrape bulbs for eighteen hours >a day. > >And let me tell you something else. I've been living with these Tajiks and >Uzbeks and Turkmen and even a couple of Pushtins for over a month and a half >now and this much I can say for sure: These guys, all of em, are Huns. >Actual, living Huns. They LIVE to fight. Its what they do. Huns (expletive) >cavemen with AK 47's. Then again, maybe I'm just cranky. > >I'm freezing my (expletive) off on this stupid (expletive) hill because my >lap warmer is running out of juice and I can't recharge it until the sun >comes up in a few hours. Oh yeah! You like to write letters, right? Do me a >favor. Write a letter to CNN and tell that awful, sneering, pompous >Aaron Brown to stop calling the Taliban "smart." They are not smart. I >suggest >CNN invest in a dictionary because the word they are looking for is >"cunning." >The Taliban are cunning, like jackals and hyenas and wolverines. They are >sneaky >and ruthless and, when confronted, cowardly. They are hateful, malevolent >parasites who create nothing and destroy everything else. Smart. Pfft. Yeah, >they're real smart. They've spent their entire lives reading only one book >and >consider hygiene and indoor plumbing to be products of the devil. They're >still figuring out how to work a Bic lighter. Talking to a Taliban warrior >about >improving his quality of life is like trying to teach an ape how to hold a >pen; >eventually he just gets frustrated and sticks you in the eye with it. OK, >enough. > >Snuffle will be up soon so I have to get back to my hole. Covering my tracks >in the snow takes a lot of practice but I'm getting good at it. We've got >this one >under control. > >You are a (expletive) for telling me how much you love this hell hole Angier! > >Saucy Jack > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4362 From: Director Date: Tue Dec 18, 2001 10:58pm Subject: Greetings! I don't know how we became a member of this interesting egroup? I do recognize many of your members names from other egroups, one of which is probably responsible for signing us up. Anyway, a thank you is in order to whom ever is responsible. Warm regards to all, Tom Apperson http://www.bodyguardnetwork.com/dir_apperson.htm [Non-text portions of this message have been removed] 4363 From: James M. Atkinson Date: Wed Dec 19, 2001 1:50pm Subject: Video Frequencies AM & FM 400 MHz - 3000 Mhz ManufactureModel #FrequencyAMFMAudio PowerPrice ============================= ======= ===== ===== --------------------------------------------------------------------------------------- Radio Shack12-19712.411GhzXX .25mW$99.95 2.4Ghz A/V2.434GhzXX .25mW Transmitter2.453GhzXX .25mW 2.473GhzXX .25mW ---------------------------------------------------------------------------------------- WaveCom JR2.411GhzXX .25mW 2.4Ghz A/V2.434GhzXX .25mW Transmitter2.453GhzXX .25mW 2.473GhzXX .25mW ---------------------------------------------------------------------------------------- RecTron900-SX912.875MhzXX 90dB mV/ $79.95 918.940MhzXX @3 Meters Note 900-SX: Std +4.5 Audio Shift ---------------------------------------------------------------------------------------- RamseyC2000433.250MhzXX 20mW$89.95 C2001433.250MhzXX 100mW$179.95 Note Ramsey: C2000 & C2001 Std +4.5 Audio Shift. Cable Ch 59 ---------------------------------------------------------------------------------------- DefenderAll 2.4Ghz2.413Ghz XX.25mW SecurityTransmitters2.432GhzX X.25mW Products2.451GhzX X.25mW 2.700GhzXX.25mW ---------------------------------------------------------------------------------------- Defender900Mhz?????X X???$349.00 Security?????X XH. Pwr$419.00 ProductsNote Defender 900Mhz: Low pwr. model 1000' range. High pwr ??? ---------------------------------------------------------------------------------------- AS1004T2.400GhzXX<10mW 2.427GhzXX<10mW 2.454GhzXX<10mW 2.481GhzXX<10mW Note AS1004T: Self Contained Camera & transmitter unit ----------------------------------------------------------------------------------------- ASK2008T2.400GhzXX??? 2.427GhzXX??? 2.454GhzXX??? 2.481GhzXX??? Note ASK2008T: 3" sma antenna, 59 select freqs, 400' range ----------------------------------------------------------------------------------------- ASK-3004T 2.413GhzXX50mW 2.432Ghzxx50mW 2.451GhzXX50mW 2.470GhzXX50mW Note ASK-3004T: 1000' range(law enforcement power), 3" sma antenna ------------------------------------------------------------------------------------------ ASK-5004T 2.413GhzX50mW 2.432Ghzx50mW 2.451GhzX50mW 2.470GhzX50mW Note ASK-5004T: 1000' range(law enforcement power), wire antenna ------------------------------------------------------------------------------------------ ATV-2400-T2.398GhzXX 34-38mW$159 2.412GhzXX34-38mW 2.428GhzXX34-38mW 2.442GhzXX34-38mW Note ATV-2400-T: 2000' range w/sma antenna ------------------------------------------------------------------------------------------ 1.2Ghz1.250GhzXX??? Raw Units1.255GhzXX??? 1.260GhzXX??? 1.265GhzXX??? 1.270GhzXX??? 1.275GhzXX??? 1.280GhzXX??? 1.285GhzXX??? ----------------------------------------------------------------------------------------- 2.4Ghz2.398GhzXX??? Raw Units2.405GhzXX??? 2.412GhzXX??? 2.416GhzXX??? 2.420GhzXX??? 2.428GhzXX??? 2.435GhzXX??? 2.442GhzXX??? ---------------------------------------------------------------------------------------- SG-590433.250MhzXX15mW SG-590C433.250MhzXX15mW Note SG-590(C): 300'-500' range, tiny camare & transmitter ----------------------------------------------------------------------------------------- AVX900S7910.1MhzX X450mW ----------------------------------------------------------------------------------------- HDHD142001.700Ghz toXX 10mW$1699.00 Communications1.850GhzX X10mW ----------------------------------------------------------------------------------------- HDHD142012.000Ghz toXX 10mW$1699.00 Communications2.700GhzX X10mW ----------------------------------------------------------------------------------------- Cable TV Ch56415.250MhzXX Cable TV Ch57421.250MhzXX Cable TV Ch58427.250MhzXX Cable TV Ch59433.250MhzXX Cable TV Ch60439.250MhzXX ----------------------------------------------------------------------------------------- RCA911.9Mhz - X??? Wireless913.9Mhz X??? SpeakersNote: no video, just audio ----------------------------------------------------------------------------------------- JVC911.35Mhz - X??? Cordless913.65MhzX??? HeadphonesNote: no video, just audio ---------------------------------------------------------------------------------------- RCA911.5Mhz -X??? HeadPhones913.5Mhz X??? Note: no video, just audio ----------------------------------------------------------------------------------------- -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4364 From: James M. Atkinson Date: Wed Dec 19, 2001 2:05pm Subject: Task force will work to plug leaks with technology [cough-cough, I know of a few members of Congress they can start with. -jma] http://www.gcn.com/vol1_no1/daily-updates/17648-1.html 12/18/01 Task force will work to plug leaks with technology By Wilson P. Dizard III GCN Staff Attorney General John Ashcroft last week set up an interagency task force to find administrative, legislative and advanced technological means of preventing leaks of classified information. The Justice Department will lead the effort along with the CIA; the State, Energy and Defense departments; and other federal agencies that handle classified materials. "Leaks do substantial damage to the security interests of the nation," Ashcroft said in a statement. "As a government, we must try to find more effective measures to deal with this damaging practice, including measures to prevent it." The leak probe, mandated by the fiscal 2002 Intelligence Authorization Act, calls for a report to Congress by May 1 recommending administrative changes, new legislation if necessary, and civil and criminal punishments for leaks. The act also directs the attorney general to report to Congress on whether "recent developments in technology, and anticipated developments, necessitate particular modifications of current protections against the unauthorized disclosure of classified information." The recent history of classified leaks generally indicates congressional and White House sources. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4365 From: ariel silverstone Date: Wed Dec 19, 2001 0:08pm Subject: PNG-200 and similar devices Hello, Does anyone have experience with the PNG-200 or similar devices for noise masking against "bugs" Thank you, Ariel (a new member of this forum) _________________________________________________________________ Chat with friends online, try MSN Messenger: http://messenger.msn.com 4366 From: James M. Atkinson Date: Wed Dec 19, 2001 5:51pm Subject: Audio Visual Stuff [report] Several members have asked me to re-post the following: Here is the 911 tribute: http://www.tscm.com/tribute911.html A tribute to the American Spirit - Let's Roll (listen to the words) http://www.tscm.com/letsroll.mp3 A lesson in Diplomacy, and creating a kinder and gentler world http://www.sweepgear.com/rock-the-casba/diplomacy.swf An ultimatum from President Bush and Company (sing along with it): http://www.sweepgear.com/rock-the-casba/binlaDa2.swf -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4367 From: Prokop Communications Date: Wed Dec 19, 2001 7:42pm Subject: CRIS 6000 Computer Interface System This equipment originally advertised by EEB of Vienna, VA. It appears that the company ceased operations. Is there a company with similar hardware and software? Rick Prokop Prokop Communications TSCM Video Concealments Seattle, WA (206) 378-5560 [Non-text portions of this message have been removed] 4368 From: factfind Date: Wed Dec 19, 2001 11:26pm Subject: Lessons in leadership Off Topic but a good story for this time of year. A Janitors lessons in leadership By Col. James Moschgat, 12th Operations Group Commander William "Bill" Crawford certainly was an unimpressive figure, one you could easily overlook during a hectic day at the U.S. Air Force Academy. Mr. Crawford, as most of us referred to him back in the late 1970s, was our squadron janitor. While we cadets busied ourselves preparing for academic exams, athletic events, Saturday morning parades and room inspections, or never-ending leadership classes, Bill quietly moved about the squadron mopping and buffing floors, emptying trash cans, cleaning toilets, or just tidying up the mess 100 college-age kids can leave in a dormitory. Sadly, and for many years, few of us gave him much notice, rendering little more than a passing nod or throwing a curt, "G'morning!" in his direction as we hurried off to our daily duties. Why? Perhaps it was because of the way he did his job - he always kept the squadron area spotlessly clean, even the toilets and showers gleamed. Frankly, he did his job so well, none of us had to notice or get involved. After all, cleaning toilets was his job, not ours. Maybe it was is physical appearance that made him disappear into the background. Bill didn't move very quickly and, in fact, you could say he even shuffled a bit, as if he suffered from some sort of injury. His gray hair and wrinkled face made him appear ancient to a group of young cadets. And his crooked smile, well, it looked a little funny. Face it, Bill was an old man working in a young person's world. What did he have to offer us on a personal level? Finally, maybe it was Mr. Crawford's personality that rendered him almost invisible to the young people around him. Bill was shy, almost painfully so. He seldom spoke to a cadet unless they addressed him first, and that didn't happen very often. Our janitor always buried himself in his work, moving about with stooped shoulders, a quiet gait, and an averted gaze. If he noticed the hustle and bustle of cadet life around him, it was hard to tell. So, for whatever reason, Bill blended into the woodwork and became just another fixture around the squadron. The Academy, one of our nation's premier leadership laboratories, kept us busy from dawn till dusk. And Mr. Crawford...well, he was just a janitor. That changed one fall Saturday afternoon in 1976. I was reading a book about World War II and the tough Allied ground campaign in Italy, when I stumbled across an incredible story. On September 13, 1943, a Private William Crawford from Colorado, assigned to the 36th Infantry Division, had been involved in some bloody fighting on Hill 424 near Altavilla, Italy. The words on the page leapt out at me: "in the face of intense and overwhelming hostile fire ... with no regard for personal safety ... on his own initiative, Private Crawford single-handedly attacked fortified enemy positions." It continued, "for conspicuous gallantry and intrepidity at risk of life above and beyond the call of duty, the President of the United States ..." "Holy cow," I said to my roommate, "you're not going to believe this, but I think our janitor is a Medal of Honor winner." We all knew Mr. Crawford was a WWII Army vet, but that didn't keep my friend from looking at me as if I was some sort of alien being. Nonetheless, we couldn't wait to ask Bill about the story on Monday. We met Mr. Crawford bright and early Monday and showed him the page in question from the book, anticipation and doubt in our faces. He stared at it for a few silent moments and then quietly uttered something like, "Yep, that's me." Mouths agape, my roommate and I looked at one another, then at the book, and quickly back at our janitor. Almost at once we both stuttered, "Why didn't you ever tell us about it?" He slowly replied after some thought: "That was one day in my life and it happened a long time ago." I guess we were all at a loss for words after that. We had to hurry off to class and Bill, well, he had chores to attend to. However, after that brief exchange, things were never again the same around our squadron. Word spread like wildfire among the cadets that we had a hero in our midst - Mr. Crawford, our janitor, had won the Medal! Cadets who had once passed by Bill with hardly a glance, now greeted him with a smile and a respectful, "Good morning, Mr. Crawford." Those who had before left a mess for the "janitor" to clean up started taking it upon themselves to put things in order. Most cadets routinely stopped to talk to Bill throughout the day and we even began inviting him to our formal squadron functions. He'd show up dressed in a conservative dark suit and quietly talk to those who approached him, the only sign of his heroics being a simple blue, star-spangled lapel pin. Almost overnight, Bill went from being a simple fixture in our squadron to one of our teammates. Mr. Crawford changed too, but you had to look closely to notice the difference. After that fall day in 1976, he seemed to move with more purpose, his shoulders didn't seem to be as stooped, he met our greetings with a direct gaze and a stronger "good morning" in return, and he flashed his crooked smile more often. The squadron gleamed as always, but everyone now seemed to notice it more. Bill even got to know most of us by our first names, something that didn't happen often at the Academy. While no one ever formally acknowledged the change, I think we became Bill's cadets and his squadron. As often happens in life, events sweep us away from those in our past. The last time I saw Bill was on graduation day in June 1977. As I walked out of the squadron for the last time, he shook my hand and simply said, "Good luck, young man." With that, I embarked on a career that has been truly lucky and blessed. Mr. Crawford continued to work at the Academy and eventually retired in his native Colorado where he resides today, one of four Medal of Honor winners living in a small town. A wise person once said, "It's not life that's important, but those you meet along the way that make the difference." Bill was one who made a difference for me. While I haven't seen Mr. Crawford in over twenty years, he'd probably be surprised to know I think of him often. Bill Crawford, our janitor, taught me many valuable, unforgettable leadership lessons. Here are ten I'd like to share with you. 1. Be Cautious of Labels. Labels you place on people may define your relationship to them and bound their potential. Sadly, and for a long time, we labeled Bill as just a janitor, but he was so much more. Therefore, be cautious of a leader who callously says, "Hey, he's just an Airman." Likewise, don't tolerate the O-1, who says, "I can't do that, I'm just a lieutenant." 2. Everyone Deserves Respect. Because we hung the "janitor" label on Mr. Crawford, we often wrongly treated him with less respect than others around us. He deserved much more, and not just because he was a Medal of Honor winner. Bill deserved respect because he was a janitor, walked among us, and was a part of our team. 3. Courtesy Makes a Difference. Be courteous to all around you, regardless of rank or position. Military customs, as well as common courtesies, help bond a team. When our daily words to Mr. Crawford turned from perfunctory "hellos" to heartfelt greetings, his demeanor and personality outwardly changed. It made a difference for all of us. 4. Take Time to Know Your People. Life in the military is hectic, but that's no excuse for not knowing the people you work for and with. For years a hero walked among us at the Academy and we never knew it. Who are the heroes that walk in your midst? 5. Anyone Can Be a Hero. Mr. Crawford certainly didn't fit anyone's standard definition of a hero. Moreover, he was just a private on the day he won his Medal. Don't sell your people short, for any one of them may be the hero who rises to the occasion when duty calls. On the other hand, it's easy to turn to your proven performers when the chips are down, but don't ignore the rest of the team. Today's rookie could and should be tomorrow's superstar. 6. Leaders Should Be Humble. Most modern day heroes and some leaders are anything but humble, especially if you calibrate your "hero meter" on today's athletic fields. End zone celebrations and self-aggrandizement are what we've come to expect from sports greats. Not Mr. Crawford - he was too busy working to celebrate his past heroics. Leaders would be well-served to do the same. 7. Life Won't Always Hand You What You Think You Deserve. We in the military work hard and, dang it, we deserve recognition, right? However, sometimes you just have to persevere, even when accolades don't come your way. Perhaps you weren't nominated for junior officer or airman of the quarter as you thought you should - don't let that stop you. 8. Don't Pursue Glory. Private Bill Crawford didn't pursue glory; he did his duty and then swept floors for a living. No job is beneath a leader. If Bill Crawford, a Medal of Honor winner, could clean latrines and smile, is there a job beneath your dignity? Think about it. 9. Pursue Excellence. No matter what task life hands you, do it well. Dr. Martin Luther King said, "If life makes you a street sweeper, be the best street sweeper you can be." Mr. Crawford modeled that philosophy and helped make our dormitory area a home. 10. Life is a Leadership Laboratory. All too often we look to some school or PME class to teach us about leadership when, in fact, life is a leadership laboratory. Those you meet everyday will teach you enduring lessons if you just take time to stop, look and listen. I spent four years at the Air Force Academy, took dozens of classes, read hundreds of books, and met thousands of great people. I gleaned leadership skills from all of them, but one of the people I remember most is Mr. Bill Crawford and the lessons he unknowingly taught. Don't miss your opportunity to learn. Bill Crawford was a janitor. However, he was also a teacher, friend, role model and one great American hero. Thanks, Mr. Crawford, for some valuable leadership lessons. Dale Pyeatt Comments: And now, for the "rest of the story." Pvt. William John Crawford was a platoon scout for 3rd Platoon of Company L, 142nd Regiment, 36th Division (Texas National Guard) and won the Medal Of Honor for his actions on Hill 424, just 4 days after the invasion at Salerno. You can read his citation at www.army.mil/cmh-pg/mohiia1.htm. On Hill 424, Pvt. Crawford took out 3 enemy machine guns before darkness fell, halting the platoon's advance. Pvt. Crawford could not be found and was assumed dead. The request for his MOH was quickly approved. Major General Terry Allen presented the posthumous MOH to Bill Crawford's father, George, on 11 May 1944 in Camp (now Fort) Carson, near Pueblo. Nearly two months after that, it was learned that Pvt. Crawford was alive in a POW camp in Germany. During his captivity, a German guard clubbed him with his rifle. Bill overpowered him, took the rifle away, and beat the guard unconscious. A German doctor's testimony saved him from severe punishment, perhaps death. To stay ahead of the advancing Russian army, the prisoners were marched 500 miles in 52 days in the middle of the German winter, subsisting on one potato a day. An allied tank column liberated the camp in the spring of 1945, and Pvt. Crawford took his first hot shower in 18 months on VE Day. Pvt. Crawford stayed in the army before retiring as a MSG and becoming a janitor. In 1984, President Ronald Reagan officially presented the MOH to Bill Crawford. Dale M. Pyeatt Executive Director National Guard Association of Texas 512-454-7300 Subj: Follow-up to 10 LESSONS IN LEADERSHIP Date: 12/18/2001 6:31:49 PM Central Standard Time From: saber523@b... (Bob Pahl) Received this as a follow-up and am forwarding this to quell the skeptics.... particularly Rick & Jon. Subject: Re: 10 LESSONS IN LEADERSHIP From a USAFA grad as he states.... No, I hadn't heard this story, and I was at first a little skeptical for a couple reasons. First, it sounded a little too "packaged." Second when I was at USAFA (81-85), there were no janitors in the squadron. (Unless, of course, you count the freshman. I cleaned many a toilet and shower my first year!) But I found this link http://www.mishalov.com/Crawford.html which confirms the story. Unfortunately MSG Crawford died in March of last year. I'm doubly embarrassed that I don't remember him because he was re-presented the Medal of Honor by Ronald Reagan at the 1984 graduation ceremonies which I attended. I certainly agree w/ the premise of the e-mail: every life offers lessons for those who look. The most celebrated lives are full of foibles (look no further than a recent Commander-in-Chief), and what appear to be the most modest lives have witnessed many accomplishments that go unnoticed. SSC Security and Investigations David A. Linsky President dlinsky@s... http://www.securesvc.com *************************************************** "Integrity without knowledge is weak and useless, and knowledge without integrity is dangerous and dreadful." -Samuel Johnson [Non-text portions of this message have been removed] 4369 From: Aimee Farr Date: Thu Dec 20, 2001 0:19am Subject: RE: Task force will work to plug leaks with technology > [cough-cough, I know of a few members of Congress they can start > with. -jma] ... >> The Justice Department will lead the effort along with the CIA; the >> State, Energy and Defense departments; and other federal agencies >> that handle classified materials. Lawyers are selected to guide this nation's CI strategy because of their many years of field experience in counterintelligence. Some critics feel this strategy has consisted of taking credit for other people's work, and blaming them when things go wrong -- due to lawyers' lack of understanding, the criminalization of counterintelligence, and the befuddling guidance documents that they themselves have created. I believe the DOJ should be credited for calling such public attention to counterintelligence matters, especially for highlighting our vulnerabilities, and for addressing countermeasures in an "inter-agency task force," and in "congressional hearings" -- as we seek to cloak ourselves in secrecy from our enemies. I'm sure their experience in compartmentation and need to know is being brought to bear on this matter. Indeed, when it comes to using inside information to achieve political ends, I believe DOJ has the necessary experience to speak to this issue. ~Aimee 4370 From: James M. Atkinson Date: Thu Dec 20, 2001 0:32am Subject: Re: PNG-200 and similar devices At 6:08 PM +0000 12/19/01, ariel silverstone wrote: >Hello, > >Does anyone have experience with the PNG-200 or similar devices for noise >masking against "bugs" > >Thank you, > >Ariel (a new member of this forum) I would lean more toward the ANG for protecting a room where effectiveness is the primary concern. http://www.tscm.com/specs-ANG2000.pdf I would only use the PNG for smaller areas where portability is the primary concern http://www.tscm.com/specs-PNG200.pdf We can provide either of the two units -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4371 From: James M. Atkinson Date: Thu Dec 20, 2001 0:34am Subject: Re: Lessons in leadership An excellent posting, and as list moderator I feel that it is appropriate to the group. Sometime we can improve our profession by publishing such materials. Thank you, -jma At 12:26 AM -0500 12/20/01, factfind wrote: >Off Topic but a good story for this time of year. > >A Janitors lessons in leadership > By Col. James Moschgat, 12th Operations Group Commander > > William "Bill" Crawford certainly was an unimpressive figure, one you could > easily overlook during a hectic day at the U.S. Air Force Academy. Mr. > Crawford, as most of us referred to him back in the late 1970s, was our > squadron janitor. > > While we cadets busied ourselves preparing for academic exams, athletic > events, Saturday morning parades and room inspections, or never-ending > leadership classes, Bill quietly moved about the squadron mopping and >buffing > floors, emptying trash cans, cleaning toilets, or just tidying up the mess > 100 college-age kids can leave in a dormitory. Sadly, and for many years, > few of us gave him much notice, rendering little more than a passing nod or > throwing a curt, "G'morning!" in his direction as we hurried off to our >daily > duties. > > Why? Perhaps it was because of the way he did his job - he always kept the > squadron area spotlessly clean, even the toilets and showers gleamed. > Frankly, he did his job so well, none of us had to notice or get involved. > After all, cleaning toilets was his job, not ours. Maybe it was is >physical > appearance that made him disappear into the background. Bill didn't move > very quickly and, in fact, you could say he even shuffled a bit, as if he > suffered from some sort of injury. His gray hair and wrinkled face made >him > appear ancient to a group of young cadets. And his crooked smile, well, it > looked a little funny. Face it, Bill was an old man working in a young > person's world. What did he have to offer us on a personal level? > > Finally, maybe it was Mr. Crawford's personality that rendered him almost > invisible to the young people around him. Bill was shy, almost painfully >so. > He seldom spoke to a cadet unless they addressed him first, and that didn't > happen very often. Our janitor always buried himself in his work, moving > about with stooped shoulders, a quiet gait, and an averted gaze. If he > noticed the hustle and bustle of cadet life around him, it was hard to >tell. > So, for whatever reason, Bill blended into the woodwork and became just > another fixture around the squadron. The Academy, one of our nation's >premier > leadership laboratories, kept us busy from dawn till dusk. And Mr. > Crawford...well, he was just a janitor. > > That changed one fall Saturday afternoon in 1976. I was reading a book >about > World War II and the tough Allied ground campaign in Italy, when I stumbled > across an incredible story. On September 13, 1943, a Private William >Crawford > from Colorado, assigned to the 36th Infantry Division, had been involved in > some bloody fighting on Hill 424 near Altavilla, Italy. The words on the >page > leapt out at me: "in the face of intense and overwhelming hostile fire ... > with no regard for personal safety ... on his own initiative, Private > Crawford single-handedly attacked fortified enemy positions." It continued, > "for conspicuous gallantry and intrepidity at risk of life above and beyond > the call of duty, the President of the United States ..." > > "Holy cow," I said to my roommate, "you're not going to believe this, but I > think our janitor is a Medal of Honor winner." We all knew Mr. Crawford was >a > WWII Army vet, but that didn't keep my friend from looking at me as if I >was > some sort of alien being. Nonetheless, we couldn't wait to ask Bill about >the > story on Monday. We met Mr. Crawford bright and early Monday and showed him > the page in question from the book, anticipation and doubt in our faces. He > stared at it for a few silent moments and then quietly uttered something > like, "Yep, that's me." > > Mouths agape, my roommate and I looked at one another, then at the book, >and > quickly back at our janitor. Almost at once we both stuttered, "Why didn't > you ever tell us about it?" He slowly replied after some thought: "That was > one day in my life and it happened a long time ago." > > I guess we were all at a loss for words after that. We had to hurry off to > class and Bill, well, he had chores to attend to. However, after that brief > exchange, things were never again the same around our squadron. Word spread > like wildfire among the cadets that we had a hero in our midst - Mr. > Crawford, our janitor, had won the Medal! Cadets who had once passed by >Bill > with hardly a glance, now greeted him with a smile and a respectful, "Good > morning, Mr. Crawford." Those who had before left a mess for the "janitor" >to > clean up started taking it upon themselves to put things in order. Most > cadets routinely stopped to talk to Bill throughout the day and we even >began > inviting him to our formal squadron functions. He'd show up dressed in a > conservative dark suit and quietly talk to those who approached him, the >only > sign of his heroics being a simple blue, star-spangled lapel pin. > > Almost overnight, Bill went from being a simple fixture in our squadron to > one of our teammates. Mr. Crawford changed too, but you had to look closely > to notice the difference. After that fall day in 1976, he seemed to move >with > more purpose, his shoulders didn't seem to be as stooped, he met our > greetings with a direct gaze and a stronger "good morning" in return, and >he > flashed his crooked smile more often. The squadron gleamed as always, but > everyone now seemed to notice it more. Bill even got to know most of us by > our first names, something that didn't happen often at the Academy. While >no > one ever formally acknowledged the change, I think we became Bill's cadets > and his squadron. As often happens in life, events sweep us away from those > in our past. > > The last time I saw Bill was on graduation day in June 1977. As I walked >out > of the squadron for the last time, he shook my hand and simply said, "Good > luck, young man." With that, I embarked on a career that has been truly > lucky and blessed. Mr. Crawford continued to work at the Academy and > eventually retired in his native Colorado where he resides today, one of >four > Medal of Honor winners living in a small town. > > A wise person once said, "It's not life that's important, but those you >meet > along the way that make the difference." Bill was one who made a difference > for me. While I haven't seen Mr. Crawford in over twenty years, he'd >probably > be surprised to know I think of him often. Bill Crawford, our janitor, >taught > me many valuable, unforgettable leadership lessons. Here are ten I'd like >to > share with you. > > 1. Be Cautious of Labels. Labels you place on people may define your > relationship to them and bound their potential. Sadly, and for a long time, > we labeled Bill as just a janitor, but he was so much more. Therefore, be > cautious of a leader who callously says, "Hey, he's just an Airman." > Likewise, don't tolerate the O-1, who says, "I can't do that, I'm just a > lieutenant." > > 2. Everyone Deserves Respect. Because we hung the "janitor" label on Mr. > Crawford, we often wrongly treated him with less respect than others around > us. He deserved much more, and not just because he was a Medal of Honor > winner. Bill deserved respect because he was a janitor, walked among us, >and > was a part of our team. > > 3. Courtesy Makes a Difference. Be courteous to all around you, regardless > of rank or position. Military customs, as well as common courtesies, help > bond a team. When our daily words to Mr. Crawford turned from perfunctory > "hellos" to heartfelt greetings, his demeanor and personality outwardly > changed. It made a difference for all of us. > > 4. Take Time to Know Your People. Life in the military is hectic, but >that's > no excuse for not knowing the people you work for and with. For years a >hero > walked among us at the Academy and we never knew it. Who are the heroes >that > walk in your midst? > > 5. Anyone Can Be a Hero. Mr. Crawford certainly didn't fit anyone's >standard > definition of a hero. Moreover, he was just a private on the day he won >his > Medal. Don't sell your people short, for any one of them may be the hero >who > rises to the occasion when duty calls. On the other hand, it's easy to >turn > to your proven performers when the chips are down, but don't ignore the >rest > of the team. Today's rookie could and should be tomorrow's superstar. > > 6. Leaders Should Be Humble. Most modern day heroes and some leaders are > anything but humble, especially if you calibrate your "hero meter" on >today's > athletic fields. End zone celebrations and self-aggrandizement are what >we've > come to expect from sports greats. Not Mr. Crawford - he was too busy >working > to celebrate his past heroics. Leaders would be well-served to do the same. > > 7. Life Won't Always Hand You What You Think You Deserve. We in the > military work hard and, dang it, we deserve recognition, right? However, > sometimes you just have to persevere, even when accolades don't come your > way. Perhaps you weren't nominated for junior officer or airman of the > quarter as you thought you should - don't let that stop you. > > 8. Don't Pursue Glory. Private Bill Crawford didn't pursue glory; he did > his duty and then swept floors for a living. No job is beneath a leader. If > Bill Crawford, a Medal of Honor winner, could clean latrines and smile, is > there a job beneath your dignity? Think about it. > > 9. Pursue Excellence. No matter what task life hands you, do it well. Dr. > Martin Luther King said, "If life makes you a street sweeper, be the best > street sweeper you can be." Mr. Crawford modeled that philosophy and helped > make our dormitory area a home. > > 10. Life is a Leadership Laboratory. All too often we look to some school >or > PME class to teach us about leadership when, in fact, life is a leadership > laboratory. Those you meet everyday will teach you enduring lessons if you > just take time to stop, look and listen. I spent four years at the Air >Force > Academy, took dozens of classes, read hundreds of books, and met thousands >of > great people. I gleaned leadership skills from all of them, but one of the > people I remember most is Mr. Bill Crawford and the lessons he unknowingly > taught. Don't miss your opportunity to learn. > > Bill Crawford was a janitor. However, he was also a teacher, friend, role > model and one great American hero. Thanks, Mr. Crawford, for some valuable > leadership lessons. > > > Dale Pyeatt Comments: > > And now, for the "rest of the story." > > Pvt. William John Crawford was a platoon scout for 3rd Platoon of Company >L, > 142nd Regiment, 36th Division (Texas National Guard) and won the Medal Of > Honor for his actions on Hill 424, just 4 days after the invasion at >Salerno. > You can read his citation at www.army.mil/cmh-pg/mohiia1.htm. > > On Hill 424, Pvt. Crawford took out 3 enemy machine guns before darkness > fell, halting the platoon's advance. Pvt. Crawford could not be found and > was assumed dead. The request for his MOH was quickly approved. Major > General Terry Allen presented the posthumous MOH to Bill Crawford's father, > George, on 11 May 1944 in Camp (now Fort) Carson, near Pueblo. Nearly two > months after that, it was learned that Pvt. Crawford was alive in a POW >camp > in Germany. During his captivity, a German guard clubbed him with his >rifle. > > Bill overpowered him, took the rifle away, and beat the guard unconscious. >A > German doctor's testimony saved him from severe punishment, perhaps death. >To > stay ahead of the advancing Russian army, the prisoners were marched 500 > miles in 52 days in the middle of the German winter, subsisting on one >potato > a day. An allied tank column liberated the camp in the spring of 1945, and > Pvt. Crawford took his first hot shower in 18 months on VE Day. Pvt. >Crawford > stayed in the army before retiring as a MSG and becoming a janitor. In >1984, > President Ronald Reagan officially presented the MOH to Bill Crawford. > > Dale M. Pyeatt > Executive Director > National Guard Association of Texas > 512-454-7300 > > > Subj: Follow-up to 10 LESSONS IN LEADERSHIP > Date: 12/18/2001 6:31:49 PM Central Standard Time > From: saber523@b... (Bob Pahl) > Received this as a follow-up and am forwarding this to quell the >skeptics.... > particularly Rick & Jon. > > > Subject: Re: 10 LESSONS IN LEADERSHIP > > From a USAFA grad as he states.... > > No, I hadn't heard this story, and I was at first a little skeptical for a > couple reasons. First, it sounded a little too "packaged." Second when I > was at USAFA (81-85), there were no janitors in the squadron. (Unless, of > course, you count the freshman. I cleaned many a toilet and shower my >first > year!) But I found this link http://www.mishalov.com/Crawford.html which > confirms the story. Unfortunately MSG Crawford died in March of last year. > I'm doubly embarrassed that I don't remember him because he was >re-presented > the Medal of Honor by Ronald Reagan at the 1984 graduation ceremonies which >I > attended. > > I certainly agree w/ the premise of the e-mail: every life offers lessons >for > those who look. The most celebrated lives are full of foibles (look no > further than a recent Commander-in-Chief), and what appear to be the most > modest lives have witnessed many accomplishments that go unnoticed. > > >SSC Security and Investigations >David A. Linsky >President >dlinsky@s... >http://www.securesvc.com >*************************************************** >"Integrity without knowledge is weak and useless, and knowledge >without integrity is dangerous and dreadful." -Samuel Johnson > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4372 From: James M. Atkinson Date: Thu Dec 20, 2001 0:54am Subject: State of the Onion Here is how we stand as the years pulls to a close. We have over 1100 solid subscribers on this list which makes it the largest such forum on TSCM in the entire world. Also, the http://www.tscm.com/ now has in excess of 200 MB of materials available online and in open directories available for download. Well over 75% of this 200 MB is actually textual materials, which breaks down to over 150,000 printed pages. I know of one list member who recently tried to print the entire website on a high speed laser printer but aborted after only 43,000 or so pages when he got tired of loading entire cases of paper into the printer. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4373 From: Matthew Paulsen Date: Thu Dec 20, 2001 2:57am Subject: RE: PNG-200 and similar devices Additional note - Surround protection is one ANG-2000, eleven TRN-2000, two OMS-2000's minimum. You may consider pumping the floors as well as the ceilings depending on your circumstance as well as doubling this up with a few PNG-200's. Some rooms have raised floors, some don't, perhaps your not on the 1st floor, perhaps you are. There's also good products available that are made from materials such as multi-laminates, glasses, and other combinations that provide excellent noise and vibration dampening on the market as well. http://www.owenscorning.com/around/sound/commercial_acoustics/nc-wallasmblie s.asp http://www.jm.com/insulation/commercial/com%5Fieq.shtml http://www.frostking.com/ -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Wednesday, December 19, 2001 10:33 PM To: ariel silverstone; TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] PNG-200 and similar devices At 6:08 PM +0000 12/19/01, ariel silverstone wrote: >Hello, > >Does anyone have experience with the PNG-200 or similar devices for noise >masking against "bugs" > >Thank you, > >Ariel (a new member of this forum) I would lean more toward the ANG for protecting a room where effectiveness is the primary concern. http://www.tscm.com/specs-ANG2000.pdf I would only use the PNG for smaller areas where portability is the primary concern http://www.tscm.com/specs-PNG200.pdf We can provide either of the two units -jma -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------- ------------------------ Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 4374 From: Matthew Paulsen Date: Thu Dec 20, 2001 3:33am Subject: RE: PNG-200 and similar devices Oops - hit send by accident. Other links. More tiles - http://www.usg.com/ Alesis makes great audio equipment - http://www.alesis.com/ Radio Design Labs - ST-NG1 Pink/White Noise Generator -http://www.rdlnet.com/ -----Original Message----- From: Matthew Paulsen [mailto:mpaulsen6@a...] Sent: Thursday, December 20, 2001 12:58 AM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] PNG-200 and similar devices Additional note - Surround protection is one ANG-2000, eleven TRN-2000, two OMS-2000's minimum. You may consider pumping the floors as well as the ceilings depending on your circumstance as well as doubling this up with a few PNG-200's. Some rooms have raised floors, some don't, perhaps your not on the 1st floor, perhaps you are. There's also good products available that are made from materials such as multi-laminates, glasses, and other combinations that provide excellent noise and vibration dampening on the market as well. http://www.owenscorning.com/around/sound/commercial_acoustics/nc-wallasmblie s.asp http://www.jm.com/insulation/commercial/com%5Fieq.shtml http://www.frostking.com/ -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Wednesday, December 19, 2001 10:33 PM To: ariel silverstone; TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] PNG-200 and similar devices At 6:08 PM +0000 12/19/01, ariel silverstone wrote: >Hello, > >Does anyone have experience with the PNG-200 or similar devices for noise >masking against "bugs" > >Thank you, > >Ariel (a new member of this forum) I would lean more toward the ANG for protecting a room where effectiveness is the primary concern. http://www.tscm.com/specs-ANG2000.pdf I would only use the PNG for smaller areas where portability is the primary concern http://www.tscm.com/specs-PNG200.pdf We can provide either of the two units -jma -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------- ------------------------ Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 4375 From: James M. Atkinson Date: Thu Dec 20, 2001 9:20am Subject: RE: PNG-200 and similar devices My preference when installing noise masking systems is to find "the base" in the construction materials and mount a transducer on each element. For example is the office walls and composed of sheet-rock, screw studs, and drywall plaster I place one transducer inside the wall centered on each individual piece of rock (typically 4*8 foot). I usually mount one on the door frame, one per window frame, and one on the actual glass. You will need one for each light fixture, and don't forget the thermostats, exit sign, phones/LAN wall plates, and other locations where wiring may terminate. Also, determine how the TRUE floor and TRUE ceiling is constructed, and install a transducer on each major segment. This is particularly important is the floor consists of concrete with any kind of cracks or holes (use a wet vacuum, or ultrasonic stethoscope to fink the cracks or holes). My rule of thumb is that each transducer should cover no more then 32 square feet of wall, floor. or ceiling space. -jma At 12:57 AM -0800 12/20/01, Matthew Paulsen wrote: >Additional note - Surround protection is one ANG-2000, eleven TRN-2000, two >OMS-2000's minimum. You may consider pumping the floors as well as the >ceilings depending on your circumstance as well as doubling this up with a >few PNG-200's. Some rooms have raised floors, some don't, perhaps your not >on the 1st floor, perhaps you are. > >There's also good products available that are made from materials such as >multi-laminates, glasses, and other combinations that provide excellent >noise and vibration dampening on the market as well. >http://www.owenscorning.com/around/sound/commercial_acoustics/nc-wallasmblie >s.asp >http://www.jm.com/insulation/commercial/com%5Fieq.shtml >http://www.frostking.com/ > > > > > >-----Original Message----- >From: James M. Atkinson [mailto:jmatk@tscm.com] >Sent: Wednesday, December 19, 2001 10:33 PM >To: ariel silverstone; TSCM-L@yahoogroups.com >Subject: Re: [TSCM-L] PNG-200 and similar devices > > >At 6:08 PM +0000 12/19/01, ariel silverstone wrote: >>Hello, >> >>Does anyone have experience with the PNG-200 or similar devices for noise >>masking against "bugs" >> >>Thank you, >> >>Ariel (a new member of this forum) > > >I would lean more toward the ANG for protecting a room where >effectiveness is the primary concern. > >http://www.tscm.com/specs-ANG2000.pdf > > >I would only use the PNG for smaller areas where portability is the >primary concern > >http://www.tscm.com/specs-PNG200.pdf > >We can provide either of the two units > >-jma >-- -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4376 From: tek492p Date: Thu Dec 20, 2001 2:19am Subject: Re: State of the Onion I've printed about 600 pages of www.tscm.com. It's one of the best "books" I have on the subject of TSCM. Jack 4377 From: Hawkspirit Date: Thu Dec 20, 2001 0:14pm Subject: Kevin Mitnick On Art Bell's show last night Kevin Mitnick while on the show called Art Bells private phone number and the caller ID showed a bogus name and phone number for a West Coast FBI office. Anyone know how this was done? Roger Tolces www.bugsweeps.com 4378 From: James M. Atkinson Date: Thu Dec 20, 2001 11:44am Subject: Re: Kevin Mitnick At 10:14 AM -0800 12/20/01, Hawkspirit wrote: >On Art Bell's show last night Kevin Mitnick while on the show called Art >Bells private phone number and the caller ID showed a bogus name and phone >number for a West Coast FBI office. Anyone know how this was done? > >Roger Tolces >www.bugsweeps.com Yes, the caller simply forces a buffer overflow at 1200 baud and injects his own number (which will become the "new" number). It will only work on cheaper caller ID boxes that have limited framing of the caller ID transmission. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4379 From: Date: Thu Dec 20, 2001 0:25pm Subject: Re: Kevin Mitnick Roger, There are also several ways of spoofing CID and ANI without an electronic hypodermic needle. The Winter 2000-2001 issue of 2600 Magazine does a good job of explaining these parlor tricks. Kevin > On Art Bell's show last night Kevin Mitnick while on the show called Art > Bells private phone number and the caller ID showed a bogus name and phone > number for a West Coast FBI office. Anyone know how this was done? > > Roger Tolces 4380 From: Matthew Paulsen Date: Thu Dec 20, 2001 1:18pm Subject: RE: Kevin Mitnick Other twists on the same plot... There are cheap devices that can be installed inline to the receivers phone line that will display wrong numbers randomly, make incoming calls not ring, make outgoing calls fail or call incorrect numbers. -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Thursday, December 20, 2001 9:44 AM To: Hawkspirit; TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Kevin Mitnick At 10:14 AM -0800 12/20/01, Hawkspirit wrote: >On Art Bell's show last night Kevin Mitnick while on the show called Art >Bells private phone number and the caller ID showed a bogus name and phone >number for a West Coast FBI office. Anyone know how this was done? > >Roger Tolces >www.bugsweeps.com Yes, the caller simply forces a buffer overflow at 1200 baud and injects his own number (which will become the "new" number). It will only work on cheaper caller ID boxes that have limited framing of the caller ID transmission. -jma -- -------------------------------------------------------------------------- ------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------- ------------------------ James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com -------------------------------------------------------------------------- ------------------------ People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell ------------------------------------------------------------------------ -------------------------- Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4381 From: 4phun Date: Thu Dec 20, 2001 3:05pm Subject: Kevin Mitnick I heard Kevin and Art for about three hours this AM. I too wonder how Kevin did this trick. He said it was perfectly legal and he should know because he goes back to the federal slammer if it wasn't. I found it fascinating to hear about the differences between being a federal prisoner and a states prisoner. You don't want to go down for a federal crime in this country! Vic ----- Original Message ----- From: "Hawkspirit" To: Sent: Thursday, December 20, 2001 1:14 PM Subject: [TSCM-L] Kevin Mitnick On Art Bell's show last night Kevin Mitnick while on the show called Art Bells private phone number and the caller ID showed a bogus name and phone number for a West Coast FBI office. Anyone know how this was done? Roger Tolces www.bugsweeps.com 4382 From: Justin T. Fanning Date: Thu Dec 20, 2001 0:08pm Subject: Re: Kevin Mitnick I was thinking along the same lines, I can understand how someone could inject their own 1200 baud, but would not the voice circuit already have to be in place before the audio could be transmitted end-to-end? I thought telco's stopped connecting the voice circuit before 'pickup' years ago to stop toll fraud by people lowering the resistance on the line (and thus having toll free conversations because the telco still believed the phone was ringing). Justin T. Fanning Justin@f... --- "James M. Atkinson" wrote: > Yes, the caller simply forces a buffer overflow at 1200 baud and > injects his own number (which will become the "new" number). > It will only work on cheaper caller ID boxes that have limited > framing of the caller ID transmission. > -jma --- > At 10:14 AM -0800 12/20/01, Hawkspirit wrote: >> On Art Bell's show last night Kevin Mitnick while on the show >> called Art Bells private phone number and the caller ID showed a >> bogus name and phone number for a West Coast FBI office. Anyone know >> how this was done? >> Roger Tolces >> www.bugsweeps.com From: Greg Horton Date: Fri Dec 17, 2004 8:32pm Subject: Re: What the F..... is this ? Well guys, the audio track and the url give it away. It is a military helo (OH 58 Delta) is the Kiowa recon/attack helo of the Army. The jrtc part of the url stands for the Joint Readiness Training Center located at Fort Polk, Louisiana. It appears to be a surveillance training mission and judging by the fact that they didn't get burned by the objects of the exercise is pretty impressive. Can you imagine what it must have been like in Iraq for those enemy troopers when those guys were armed and dangerous? They must have really fired up some people. Greg 10437 From: Daryl Adams, CISSP Date: Fri Dec 17, 2004 1:12pm Subject: RE: What the F..... is this ? JTF Border surveillance. San Diego sector. >From: "James M. Atkinson" >Reply-To: TSCM-L@yahoogroups.com >To: TSCM-L@yahoogroups.com >Subject: RE: [TSCM-L] What the F..... is this ? >Date: Fri, 17 Dec 2004 12:49:49 -0500 >MIME-Version: 1.0 >X-Sender: jmatk_tscm.com@p... >Received: from n8a.bulk.scd.yahoo.com ([66.94.237.42]) by >mc2-f23.hotmail.com with Microsoft SMTPSVC(6.0.3790.211); Fri, 17 Dec 2004 >10:00:42 -0800 >Received: from [66.218.69.4] by n8.bulk.scd.yahoo.com with NNFMP; 17 Dec >2004 17:58:51 -0000 >Received: from [66.218.66.27] by mailer4.bulk.scd.yahoo.com with NNFMP; 17 >Dec 2004 17:58:51 -0000 >Received: (qmail 6349 invoked from network); 17 Dec 2004 17:58:49 -0000 >Received: from unknown (66.218.66.216) by m21.grp.scd.yahoo.com with QMQP; >17 Dec 2004 17:58:49 -0000 >Received: from unknown (HELO ams002.ftl.affinity.com) (216.219.253.98) by >mta1.grp.scd.yahoo.com with SMTP; 17 Dec 2004 17:58:49 -0000 >Received: from Nikola.tscm.com ([151.199.40.138]) by >ams002.ftl.affinity.com with ESMTP id <363219-32565>; Fri, 17 Dec 2004 >12:53:54 -0500 >X-Message-Info: JGTYoYF78jE2phr46SpVbb96SRkLk8uyD8O3/lyHZQM= >X-Yahoo-Newman-Property: groups-email >X-Apparently-To: TSCM-L@yahoogroups.com >X-Mailer: QUALCOMM Windows Eudora Version 6.1.1.1 >References: > >X-eGroups-Remote-IP: 216.219.253.98 >X-Yahoo-Profile: graniteislandgroup >Mailing-List: list TSCM-L@yahoogroups.com; contact >TSCM-L-owner@yahoogroups.com >Delivered-To: mailing list TSCM-L@yahoogroups.com >Precedence: bulk >List-Unsubscribe: >Return-Path: >sentto-49964-10913-1103306331-dary1_adams=hotmail.com@r... >X-OriginalArrivalTime: 17 Dec 2004 18:00:42.0784 (UTC) >FILETIME=[533FE200:01C4E462] > > >Andy, > >Do not download the video. > >It is a surveillance video of a couple having sex in a car while parked >under a canopy. > >Looks like it may have been shot with a hand held or vehicle mounted >thermal camera or it may be a hoax. > >The voice over on the audio track indicates that either it was shot as a >hoax and doctored up by some college kids, or some young Army folks had a >little too much time on thier hands and access to expensive imagery >equipment. > >Either way, save your money. > >-jma > > > >At 10:08 AM 12/17/2004, A Grudko wrote: > > > > -----Original Message----- > > From: contranl [mailto:contranl@y...] > > > > > (Q) What the F..... is this ? > > http://content.collegehumor.com/media/movies/oh-58d_-_jrtc_fun.wmv > > (A) It's a 6 min video ...takes some time to download first. > > > > I didn't ask the Question but I'd like to comment on the Answer. > > > > A 6 minute video will take me at least 18 minutes to download and as a > >pay-per-minute dial-up user could cost me the price of a major movie on >the > >current circuit such as 'National Treasure' which I saw Wednesday and was > >worth the money. > > > > But before I spend my cash money on something from .collegehumor.com >I'd > >like to know what it is. If it's about TSCM I'm happy to spend the money, > >but if it's about > >college-kids-making-drunken-crank-calls-wearing-only-their-underwear-on-thei > >r-heads-dude, I'd rather know first and not waste my money, no matter how > >funny, cute, clever etc the poster thinks it is. > > > > So the question stands > > > > Andy Grudko (British), DPM, Grad IS (South Africa) > > MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 > > www.grudko.com , agrudko@i... > > Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: > > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > > Mid Rand (+27 11) 318 1451 - 318 6846(Fax) > > Cellular (+27) 82 778 6355 - ICQ 146498943 > > SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. > > "When you need it done right - first time" > > > >--- > >Outgoing mail is certified Virus Free. > >Checked by AVG anti-virus system (http://www.grisoft.com). > >Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 > > > > > >[Non-text portions of this message have been removed] > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > >---------------------------------------------------------------------------------------------------- >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: >http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >---------------------------------------------------------------------------------------------------- > > 10438 From: contranl Date: Sat Dec 18, 2004 6:20am Subject: Re: What the F..... is this ? . Thanks for the replies and the id-ing of what it is we're looking at what surprises me is the real bad quality that these helicopter recordings always have ...yes i know most of the time they are processed to make it hard to identify who or what and probably they are copy's of copy's..still they look bad. i also wonder where they tape this ..on the ground or at the helicopter ? If interest exists i have some links to similar but slightly better quality recordings from helicopters just they are not so funny at all...rather shocking let me know if you wanna see those. Tetrascanner 10439 From: A Grudko Date: Sat Dec 18, 2004 6:50am Subject: RE: What the F..... is this ? -----Original Message----- From: Greg Horton [mailto:sgtpelon@e...] > It appears to be a surveillance training mission and judging by the fact that they didn't get burned by the objects of the exercise is pretty impressive. Can you imagine what it must have been like in Iraq for those enemy troopers ... Hey, it's good to see those tax $$$ at work. But I'll give the download a miss 'cos if I want to see people getting screwed I'll either watch a proper XXX movie or tune to C-Span... I guess the people in the car were a little too involved in their activites to be distracted by a couple of perving flyboys, joysticks in hand (I know it's a collective, but it does not sound the same). I'd expect the Iraqi troopers to be a lot more observant whilst defending their country from invaders. I wonder if the US military are allowed to video record Americans having sex in a car (maybe they were big terrorists trying to create a little terrorist?) and presumably give it to someone who can then put it on a frat boy website? If so, can we expect stealth-mode black helicopters silently hovering over drive-ins and outside bedroom windows, webcasting on www.live-smut.gov at only $2.99 a year subscription, payable to the Dept. of Homeland Security? Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 [Non-text portions of this message have been removed] 10440 From: Tech Sec Lab Date: Sat Dec 18, 2004 9:00am Subject: RE: What the F..... is this ? Billions of dollars into defence and this is what happens!!!! I'm disgusted.... ....The picture could have at least been clearer! :D LOL ********************************** Message: 7 Date: Fri, 17 Dec 2004 12:49:49 -0500 From: "James M. Atkinson" Subject: RE: What the F..... is this ? Andy, Do not download the video. It is a surveillance video of a couple having sex in a car while parked under a canopy. Looks like it may have been shot with a hand held or vehicle mounted thermal camera or it may be a hoax. The voice over on the audio track indicates that either it was shot as a hoax and doctored up by some college kids, or some young Army folks had a little too much time on thier hands and access to expensive imagery equipment. Either way, save your money. -jma 10441 From: A Grudko Date: Sat Dec 18, 2004 0:14pm Subject: RE: What the F..... is this ? -----Original Message----- From: Tech Sec Lab [mailto:tscmteam@o...] Billions of dollars into defence and this is what happens!!!! Ooops, I forgot to quote this from JMA http://www.cnn.com/2004/LAW/12/09/video.voyeurs.ap/index.html New bill targets some peeping Toms - Hidden cameras found on warships WASHINGTON (AP) -- Camera phones may make great Christmas gifts, but people better not use them for peeping-Tom photos on federal property. In one of its last moves of the year, Congress passed a bill that would levy heavy fines and prison time for anyone who sneaks photos or videos of people in various stages of undress, a problem lawmakers and activists called the new frontier of stalking. I'm disgusted.... Andy G --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 [Non-text portions of this message have been removed] 10442 From: James M. Atkinson Date: Sat Dec 18, 2004 0:28pm Subject: U.N. Headquarters Filled with Bugs Fri December 17, 2004 09:19 AM ET By Stephanie Nebehay GENEVA (Reuters) - The United Nations European headquarters, where a listening device was discovered in a ministerial meeting room, is probably rife with secret spying equipment, a U.N. security source said on Friday. "It's like Swiss cheese," a U.N. security source told Reuters, referring to the Swiss Emmenthal cheese which contains holes. "If we had the technnical means and staff for thorough searches, I'm certain that we would find one microphone after another. The U.N. in New York and Vienna are the same," said the source, speaking on condition of anonymity. Marie Heuze, chief U.N. spokeswoman in Geneva, on Thursday confirmed the report by Swiss Television which said workmen had found a sophisticated bugging device during recent renovation of a room called the Salon Francais at the Palais des Nations. But a U.N. inquiry had not established who planted the bugging device or when, she said. The television said the device was found stashed behind wooden panels in the elegant room, known for its 1930s French art deco furniture, but Heuze declined to give further details. Patrick Daniel Eugster, a Geneva-based security expert shown photos of the device, told the television the system appeared to be of Russian or East European origin. Its size indicated it was three or four years old, before such circuits were miniaturized, he said. "It is very sophisticated piece of listening equipment," he added. The embarrassing discovery comes as the Palais des Nations, formerly the League of Nations, undergoes a security overhaul, including massive new entry gates and concrete barriers. The United Nations is spending nearly $40 million over three years to improve protection in Geneva in the wake of the August 2003 bombing of its headquarters in Baghdad, which killed 22 people including the top U.N. envoy Sergio Vieira de Mello. It also follows public charges last March by Clare Short, Britain's former international development secretary, that British intelligence spied on U.N. Secretary-General Kofi Annan ahead of the U.S.-led invasion of Iraq. U.N. officials said at the time the bugging, if true, violated international law and should be immediately stopped. The Salon Francais room was used by foreign ministers from major powers -- the United States, Russia, China, Britain and France -- during private talks on Iraq in September 2003 following the U.S. invasion and occupation. At least one delegation, including that of then French Foreign Minister Dominique de Villepin, used the Salon Francais. "Several delegations used that room," said one source. In Paris, French Foreign Ministry spokesman Herve Ladsous said: "It is the United Nations that is responsible for the inquiry, which is in progress, and like everyone we await the results." The room was also used last January during talks on global hunger attended by Annan, Brazilian President Luiz Inacio Lula da Silva and French President Jacques Chirac. Annan also met Nigerian President Olusegun Obasanjo and Cameroon President Paul Biya to discuss the disputed Bakassa Peninsula, talks during which the Salon Francais was also used. It is adjacent to the hall where the U.N.-sponsored Conference on Disarmament holds weekly negotiations and is used by ministers who address the 66-member forum and often hold separate bilateral meetings. (Additional reporting by Jon Boyle in Paris) ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10443 From: James M. Atkinson Date: Sat Dec 18, 2004 8:53pm Subject: U.N. Ends Failed Listening Device Probe http://www.sanluisobispo.com/mld/sanluisobispo/news/breaking_news/10440194.htm Posted on Fri, Dec. 17, 2004 U.N. Ends Failed Listening Device Probe SAM CAGE Associated Press GENEVA - The United Nations has ended an internal inquiry into the discovery of a secret listening device at the world body's European headquarters without finding out who planted the bug or when, officials said Friday. The listening device was found during renovation work in an art deco room known as the Salon Francais - which adjoins a main conference hall - where it could have been used to eavesdrop on any private conversations. Secretary of State Colin Powell and other foreign ministers of the U.N. Security Council discussed postwar Iraq in the main hall last year. It was not clear whether any of the ministers had used the smaller room. "I confirm that in the course of the renovation of the Salon Francais, U.N. technical workmen found what is considered to be a sophisticated listening device," said the U.N.'s spokeswoman in Geneva, Marie Heuze. "An investigation has failed to determine who could have planted the device." Although the device was only found this fall, the inquiry has already finished and will not be reopened, said a U.N. official, speaking on condition of anonymity. Heuze added that she was unable to comment further on the bugging. Well-placed security sources, however, questioned whether any major secrets could have been overheard because top government officials have security that includes electromagnetic waves to thwart eavesdropping systems. "There's not much they could get here," said a second official, who spoke on condition of anonymity. "Most of the discussions are in public and they are recorded." The listening device could be Russian or East European in origin and was made three to four years ago, according to an independent Swiss security export commenting to Swiss television. The device could have been in operation in the run-up to the U.S.-led invasion of Iraq, judging from the age of the equipment. The Salon Francais - or French Lounge - also is the venue for a weekly teleconference meeting between U.N. Secretary-General Kofi Annan and the head of the Geneva office, Sergei Ordzhonikidze. The U.N. offices in Geneva were built in the 1930s as headquarters of the League of Nations. The Salon Francais is so called because it was decorated in art deco style by French artist Jules Leleu in 1935. "Never truly renovated since this date, the room was starting to suffer from the assault of time," the French mission to the U.N. Geneva office said in a newsletter dated Monday. Renovations were carried out by two teams, one contracted by the United Nations and the other by the French government. It was the U.N.-contracted team that discovered the bug behind a wooden panel, officials said. China's ambassador to the U.N. in Geneva said Friday that his country's officials met with other delegations in any room which was assigned by the Ordzhonikidze's office. "My personal feeling is that it's really disgusting and something must be done to stop these kind of activities," Ambassador Sha Zukang said of the bugging. "I hate it." It was up to Beijing to decide if its officials will attend meetings in Geneva in the future, Sha added. "It's a very sophisticated piece of listening equipment where the sound is picked up and immediately retransmitted," Patrick Daniel Eugster, the head of Geneva-based Surveillance Consulting Group, told Swiss broadcaster Television Suisse Romande. The device was "very probably" made in Russia or Eastern Europe, he added. Associated Press correspondent Alexander G. Higgins in Geneva contributed to this report. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10444 From: contranl Date: Sat Dec 18, 2004 9:55pm Subject: UN-Geneva bug was "Burst-transmitter" . The Countersurveillance consultant that was called in to have a look at the UN-Geneva bug this week said: ------------------------ "It's a very sophisticated piece of listening equipment where the sound is picked up and immediately retransmitted," Patrick Daniel Eugster, the head of Geneva-based Surveillance Consulting Group, told TSR. TSR showed photographs of the listening device to Eugster, who said that transmissions from the device would be so short that they would be very difficult to pick up. ------------------------ Not completely correct since: This is a BURST-TRANSMITTER wich records and stores the audio first possibly compresses it and then transmits it(later)as a short burst In general i could think of 2 types of burst-transmiiters 1) A long time digital recording type wich releases it's recording on demand when it receives a remote control signal. It could record for example 1 hour and then transmit that in lets say 18 seconds...to make that possible the audio needs to be compressed or send over a very wideband-carrier similar to a 10 mhz wide video-signal. Example: By using a 10 mhz wide carrier you could send a 50 khz wide audio- signal at 200 times the original speed (10 Mhz /50 khz = 200) so 1 hour of audio can be transmitted in 1hr/200 = 18 seconds By further compressing the 50 khz signal to 10 khz you you could gain another factor 5 wich would lead to only 3,6 seconds ! You would send the remote signal to do this at a convienient or safe moment. You could also automate the process by having the transmitter send the audio every time it's memory is full Such a signal would look like a 10 mhz wide signal on on a spectrum analyzer lasting 3,6 seconds and reoccuring every hour only when it is actually in use...the rest of the time it would be in recording-only mode possibly recording over the older recordings that are empty or of no interest. You may find such a signal in the usual bands that are used for video (2400/1400/900 mhz) since it would be convienient to use existing (low cost) video-modules for that...ofcourse they could be anywhere else. Such a transmitter would have recording chips(OKI)and memory chips(RAM)and a videotransmitter-module (no camera)inside wich are easely indentifyable....batteries would be medium to big sized 2) A burst-transmitter with a short time digital recorder (1 RAM chip only) could record lets say 5 minutes...when also compression is used that will give you a transmit time of 5 Min /1000 = 0,3 seconds On a spectrumanalyzer that would look like a 0,3 seconds long and 10 Mhz wide signal reocurring every 5 minutes. In both cases FM modulation could be expected (FM-Video) so the carrier would look like a nice video kind of signal ( _-_ ) not pulses like with digital GSM or Spread Spectrum. Ofcourse additional tricks could be used to make it even less detectable (VOX/Timers/SpreadSpectrumVideo..etc) Clearly not the regular spyshop-stuff Not even in regular use by law-enforcement Eastern European Secret Services is a good guess Military is a good guess too By coincedence the same mentioned consultant sells/produces a detector for this kind of transmitters: http://www.surveillance-consult.com/describeProduct.php?pro_id=72 This detector also does GSM ...what i make of it is that it is mainly a simple wideband AM-detector with frontend filters for the desired bands...they also mention a reference antenna ...possibly you have to mount that away from the area of interest ...that antenna measures the outside-area levels,like that the unit can compare and only react to signals that were received inside the area of interest only...thus avoiding alarms from bypassers using there GSM-cellphones They don't mention it can record levels over a longer period of time so you will have to stay around at least 24 hours While the victim should be having lots of semi-interesting conversations to activate it. A longtimelevel-recorder is a good idea since you can't stare at a spectrumanalyzer for hours or miss the signal in a moment of distraction. (unless you have it connected to a PC with recording software ...i have not seen that ,a scanner type of receiver will miss the signal) A NLJD could find such a box too... provided it is not shielded. Resuming: DIFFICULT TO FIND This bug was found by coincedence (construction workers) Tetrascanner www.tetrascanner.com 10445 From: contranl Date: Sat Dec 18, 2004 10:39pm Subject: I.A.E.A. Bugged (International Atomic Energy Agency) . Looks like they've gone really wild now Here's the next one "Bush camp taps phones of top U.N. nuclear watchdog" http://www.tdn.com/articles/2004/12/12/nation_world/news01.txt "US bugged UN nuclear chief's phones in ouster bid" http://jurist.law.pitt.edu/paperchase/2004/12/us-bugged-un-nuclear- chiefs-phones-in.php This is what the IAEA said in march this year before this came out http://in.news.yahoo.com/040302/137/2bs0u.html With less then 2 weeks before the end of the year i wonder who's the next one By the way i'm looking for a Job :) Tetrascanner www.tetrascanner.com 10446 From: Paul Curtis Date: Sun Dec 19, 2004 6:37am Subject: RE: U.N. Ends Failed Listening Device Probe Analysis of the response and comments is as follows: We found out who planted the eavesdropping device but we don't want to tell anyone because it turns out that it was one of our people which we certainly don't want to admit, especially to our member countries. Not only that, we are telling you this anonymously because our credibility is so high that it is all we can get away with. Paul Curtis -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Saturday, December 18, 2004 18:53 To: TSCM-L Subject: [TSCM-L] U.N. Ends Failed Listening Device Probe http://www.sanluisobispo.com/mld/sanluisobispo/news/breaking_news/10440194.h tm Posted on Fri, Dec. 17, 2004 U.N. Ends Failed Listening Device Probe SAM CAGE Associated Press GENEVA - The United Nations has ended an internal inquiry into the discovery of a secret listening device at the world body's European headquarters without finding out who planted the bug or when, officials said Friday. The listening device was found during renovation work in an art deco room known as the Salon Francais - which adjoins a main conference hall - where it could have been used to eavesdrop on any private conversations. Secretary of State Colin Powell and other foreign ministers of the U.N. Security Council discussed postwar Iraq in the main hall last year. It was not clear whether any of the ministers had used the smaller room. "I confirm that in the course of the renovation of the Salon Francais, U.N. technical workmen found what is considered to be a sophisticated listening device," said the U.N.'s spokeswoman in Geneva, Marie Heuze. "An investigation has failed to determine who could have planted the device." Although the device was only found this fall, the inquiry has already finished and will not be reopened, said a U.N. official, speaking on condition of anonymity. Heuze added that she was unable to comment further on the bugging. Well-placed security sources, however, questioned whether any major secrets could have been overheard because top government officials have security that includes electromagnetic waves to thwart eavesdropping systems. "There's not much they could get here," said a second official, who spoke on condition of anonymity. "Most of the discussions are in public and they are recorded." The listening device could be Russian or East European in origin and was made three to four years ago, according to an independent Swiss security export commenting to Swiss television. The device could have been in operation in the run-up to the U.S.-led invasion of Iraq, judging from the age of the equipment. The Salon Francais - or French Lounge - also is the venue for a weekly teleconference meeting between U.N. Secretary-General Kofi Annan and the head of the Geneva office, Sergei Ordzhonikidze. The U.N. offices in Geneva were built in the 1930s as headquarters of the League of Nations. The Salon Francais is so called because it was decorated in art deco style by French artist Jules Leleu in 1935. "Never truly renovated since this date, the room was starting to suffer from the assault of time," the French mission to the U.N. Geneva office said in a newsletter dated Monday. Renovations were carried out by two teams, one contracted by the United Nations and the other by the French government. It was the U.N.-contracted team that discovered the bug behind a wooden panel, officials said. China's ambassador to the U.N. in Geneva said Friday that his country's officials met with other delegations in any room which was assigned by the Ordzhonikidze's office. "My personal feeling is that it's really disgusting and something must be done to stop these kind of activities," Ambassador Sha Zukang said of the bugging. "I hate it." It was up to Beijing to decide if its officials will attend meetings in Geneva in the future, Sha added. "It's a very sophisticated piece of listening equipment where the sound is picked up and immediately retransmitted," Patrick Daniel Eugster, the head of Geneva-based Surveillance Consulting Group, told Swiss broadcaster Television Suisse Romande. The device was "very probably" made in Russia or Eastern Europe, he added. Associated Press correspondent Alexander G. Higgins in Geneva contributed to this report. ---------------------------------------------------------------------------- ------------------------ We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------ James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------ World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10447 From: John Young Date: Sun Dec 19, 2004 2:21pm Subject: RE: U.N. Ends Failed Listening Device Probe Are those four strips of tape on the UN device hiding product identification data original or put there by the UN or other party? Are there public photos without the tapes applied? Is the bug discovery a diversionary from the UN more egregious failures? What with all the new intel legislation and flood of funds for covert ops it must be time for leaking secret agent names to dampen public outrage at being fleeced for never explained security. Two Associated photos of the device showing the concealing tape: http://cryptome.org/un-bug.htm 10448 From: James M. Atkinson Date: Sun Dec 19, 2004 1:16pm Subject: RE: U.N. Ends Failed Listening Device Probe The foam adhesive tape is likely there to provide an air gap between the wall of the device cavity and the electronics. This kind of tape is common when electronics has been built into a cavity and the eavesdropper is concerned that the electronics might create a heat signature. -jm At 03:21 PM 12/19/2004, John Young wrote: >Are those four strips of tape on the UN device hiding product identification >data original or put there by the UN or other party? Are there public photos >without the tapes applied? Is the bug discovery a diversionary from the >UN more egregious failures? What with all the new intel legislation and >flood of funds for covert ops it must be time for leaking secret agent names >to dampen public outrage at being fleeced for never explained security. > >Two Associated photos of the device showing the concealing tape: > > >http://cryptome.org/un-bug.htm ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10449 From: luis coimbra pinheiro Date: Sun Dec 19, 2004 7:42pm Subject: Re: BUGS, CAMERA'S, AND WIRETAPS please, what is the meaning of PI's? thanks moellerthy <1ach@g...> wrote: Spying done against the everyday citizen and corporation has no limit. Spying is done by drug lords,neighbors,gov't,police,terrorists,PI's, friends and anybody that has the money to buy surveillance equipment. Anytime someone or some organization want's intelligence against another the act can be sucessfully completed in time with money and operative's. Tscm is usually carried out after a victim recognizes that they have circome to a surveillance act. Spying is done by trash trollers, conversationalist, electronic's, and what ever your routine leads to an opening for some person to take advantage. Turn caution to the wind with your eye's on the sails protect yourself. Happy Holidays From: Neptune Enterprise Security 1ach@G... ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Yahoo! Acesso Gr·tis - Internet r·pida e gr·tis. Instale o discador do Yahoo! agora. [Non-text portions of this message have been removed] 10450 From: moellerthy <1ach@g...> Date: Sun Dec 19, 2004 11:13pm Subject: Re: BUGS, CAMERA'S, AND WIRETAPS --- In TSCM-L@yahoogroups.com, luis coimbra pinheiro wrote: > > please, what is the meaning of PI's? > thanks PRIVATE INVESTIGATOR'S that will break the law for a buck. Check out Interpol in Sat/TV sometimes they have shows on B&E by PI'S Neptune Enterprise Security http://www.nes-ets-usa.com 1ach@G... > > moellerthy <1ach@g...> wrote: > > Spying done against the everyday citizen and corporation has no > limit. > > Spying is done by drug lords,neighbors,gov't,police,terrorists,PI's, > friends and anybody that has the money to buy surveillance equipment. > > Anytime someone or some organization want's intelligence against > another the act can be sucessfully completed in time with money and > operative's. > > Tscm is usually carried out after a victim recognizes that they have > circome to a surveillance act. > > Spying is done by trash trollers, conversationalist, electronic's, > and what ever your routine leads to an opening for some person to > take advantage. > > Turn caution to the wind with your eye's on the sails protect > yourself. > > Happy Holidays From: > Neptune Enterprise Security > 1ach@G... > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > Yahoo! Groups SponsorADVERTISEMENT > > > --------------------------------- > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > > > --------------------------------- > Yahoo! Acesso Gr·tis - Internet r·pida e gr·tis. Instale o discador do Yahoo! agora. > > [Non-text portions of this message have been removed] 10451 From: James M. Atkinson Date: Mon Dec 20, 2004 8:34am Subject: Merry Chistmas Granite Island Group and James M. Atkinson wishes all a Merry Christmas! Especially to all those who serve and protect this great nation wherever they are. We hope and pray that all those away from their families will come home safe to celebrate the holidays soon! We thank you for your sacrifices and service to our country -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10452 From: James M. Atkinson Date: Mon Dec 20, 2004 8:41am Subject: Merry Christmas - The Gift of the Magi THE GIFT OF THE MAGI by O. Henry One dollar and eighty-seven cents. That was all. And sixty cents of it was in pennies. Pennies saved one and two at a time by bulldozing the grocer and the vegetable man and the butcher until one's cheeks burned with the silent imputation of parsimony that such close dealing implied. Three times Della counted it. One dollar and eighty- seven cents. And the next day would be Christmas. There was clearly nothing to do but flop down on the shabby little couch and howl. So Della did it. Which instigates the moral reflection that life is made up of sobs, sniffles, and smiles, with sniffles predominating. While the mistress of the home is gradually subsiding from the first stage to the second, take a look at the home. A furnished flat at $8 per week. It did not exactly beggar description, but it certainly had that word on the lookout for the mendicancy squad. In the vestibule below was a letter-box into which no letter would go, and an electric button from which no mortal finger could coax a ring. Also appertaining thereunto was a card bearing the name "Mr. James Dillingham Young." The "Dillingham" had been flung to the breeze during a former period of prosperity when its possessor was being paid $30 per week. Now, when the income was shrunk to $20, though, they were thinking seriously of contracting to a modest and unassuming D. But whenever Mr. James Dillingham Young came home and reached his flat above he was called "Jim" and greatly hugged by Mrs. James Dillingham Young, already introduced to you as Della. Which is all very good. Della finished her cry and attended to her cheeks with the powder rag. She stood by the window and looked out dully at a gray cat walking a gray fence in a gray backyard. Tomorrow would be Christmas Day, and she had only $1.87 with which to buy Jim a present. She had been saving every penny she could for months, with this result. Twenty dollars a week doesn't go far. Expenses had been greater than she had calculated. They always are. Only $1.87 to buy a present for Jim. Her Jim. Many a happy hour she had spent planning for something nice for him. Something fine and rare and sterling--something just a little bit near to being worthy of the honor of being owned by Jim. There was a pier-glass between the windows of the room. Perhaps you have seen a pier-glass in an $8 flat. A very thin and very agile person may, by observing his reflection in a rapid sequence of longitudinal strips, obtain a fairly accurate conception of his looks. Della, being slender, had mastered the art. Suddenly she whirled from the window and stood before the glass. her eyes were shining brilliantly, but her face had lost its color within twenty seconds. Rapidly she pulled down her hair and let it fall to its full length. Now, there were two possessions of the James Dillingham Youngs in which they both took a mighty pride. One was Jim's gold watch that had been his father's and his grandfather's. The other was Della's hair. Had the queen of Sheba lived in the flat across the airshaft, Della would have let her hair hang out the window some day to dry just to depreciate Her Majesty's jewels and gifts. Had King Solomon been the janitor, with all his treasures piled up in the basement, Jim would have pulled out his watch every time he passed, just to see him pluck at his beard from envy. So now Della's beautiful hair fell about her rippling and shining like a cascade of brown waters. It reached below her knee and made itself almost a garment for her. And then she did it up again nervously and quickly. Once she faltered for a minute and stood still while a tear or two splashed on the worn red carpet. On went her old brown jacket; on went her old brown hat. With a whirl of skirts and with the brilliant sparkle still in her eyes, she fluttered out the door and down the stairs to the street. Where she stopped the sign read: "Mne. Sofronie. Hair Goods of All Kinds." One flight up Della ran, and collected herself, panting. Madame, large, too white, chilly, hardly looked the "Sofronie." "Will you buy my hair?" asked Della. "I buy hair," said Madame. "Take yer hat off and let's have a sight at the looks of it." Down rippled the brown cascade. "Twenty dollars," said Madame, lifting the mass with a practised hand. "Give it to me quick," said Della. Oh, and the next two hours tripped by on rosy wings. Forget the hashed metaphor. She was ransacking the stores for Jim's present. She found it at last. It surely had been made for Jim and no one else. There was no other like it in any of the stores, and she had turned all of them inside out. It was a platinum fob chain simple and chaste in design, properly proclaiming its value by substance alone and not by meretricious ornamentation--as all good things should do. It was even worthy of The Watch. As soon as she saw it she knew that it must be Jim's. It was like him. Quietness and value--the description applied to both. Twenty-one dollars they took from her for it, and she hurried home with the 87 cents. With that chain on his watch Jim might be properly anxious about the time in any company. Grand as the watch was, he sometimes looked at it on the sly on account of the old leather strap that he used in place of a chain. When Della reached home her intoxication gave way a little to prudence and reason. She got out her curling irons and lighted the gas and went to work repairing the ravages made by generosity added to love. Which is always a tremendous task, dear friends--a mammoth task. Within forty minutes her head was covered with tiny, close-lying curls that made her look wonderfully like a truant schoolboy. She looked at her reflection in the mirror long, carefully, and critically. "If Jim doesn't kill me," she said to herself, "before he takes a second look at me, he'll say I look like a Coney Island chorus girl. But what could I do--oh! what could I do with a dollar and eighty- seven cents?" At 7 o'clock the coffee was made and the frying-pan was on the back of the stove hot and ready to cook the chops. Jim was never late. Della doubled the fob chain in her hand and sat on the corner of the table near the door that he always entered. Then she heard his step on the stair away down on the first flight, and she turned white for just a moment. She had a habit for saying little silent prayer about the simplest everyday things, and now she whispered: "Please God, make him think I am still pretty." The door opened and Jim stepped in and closed it. He looked thin and very serious. Poor fellow, he was only twenty-two--and to be burdened with a family! He needed a new overcoat and he was without gloves. Jim stopped inside the door, as immovable as a setter at the scent of quail. His eyes were fixed upon Della, and there was an expression in them that she could not read, and it terrified her. It was not anger, nor surprise, nor disapproval, nor horror, nor any of the sentiments that she had been prepared for. He simply stared at her fixedly with that peculiar expression on his face. Della wriggled off the table and went for him. "Jim, darling," she cried, "don't look at me that way. I had my hair cut off and sold because I couldn't have lived through Christmas without giving you a present. It'll grow out again--you won't mind, will you? I just had to do it. My hair grows awfully fast. Say `Merry Christmas!' Jim, and let's be happy. You don't know what a nice-- what a beautiful, nice gift I've got for you." "You've cut off your hair?" asked Jim, laboriously, as if he had not arrived at that patent fact yet even after the hardest mental labor. "Cut it off and sold it," said Della. "Don't you like me just as well, anyhow? I'm me without my hair, ain't I?" Jim looked about the room curiously. "You say your hair is gone?" he said, with an air almost of idiocy. "You needn't look for it," said Della. "It's sold, I tell you--sold and gone, too. It's Christmas Eve, boy. Be good to me, for it went for you. Maybe the hairs of my head were numbered," she went on with sudden serious sweetness, "but nobody could ever count my love for you. Shall I put the chops on, Jim?" Out of his trance Jim seemed quickly to wake. He enfolded his Della. For ten seconds let us regard with discreet scrutiny some inconsequential object in the other direction. Eight dollars a week or a million a year--what is the difference? A mathematician or a wit would give you the wrong answer. The magi brought valuable gifts, but that was not among them. This dark assertion will be illuminated later on. Jim drew a package from his overcoat pocket and threw it upon the table. "Don't make any mistake, Dell," he said, "about me. I don't think there's anything in the way of a haircut or a shave or a shampoo that could make me like my girl any less. But if you'll unwrap that package you may see why you had me going a while at first." White fingers and nimble tore at the string and paper. And then an ecstatic scream of joy; and then, alas! a quick feminine change to hysterical tears and wails, necessitating the immediate employment of all the comforting powers of the lord of the flat. For there lay The Combs--the set of combs, side and back, that Della had worshipped long in a Broadway window. Beautiful combs, pure tortoise shell, with jewelled rims--just the shade to wear in the beautiful vanished hair. They were expensive combs, she knew, and her heart had simply craved and yearned over them without the least hope of possession. And now, they were hers, but the tresses that should have adorned the coveted adornments were gone. But she hugged them to her bosom, and at length she was able to look up with dim eyes and a smile and say: "My hair grows so fast, Jim!" And them Della leaped up like a little singed cat and cried, "Oh, oh!" Jim had not yet seen his beautiful present. She held it out to him eagerly upon her open palm. The dull precious metal seemed to flash with a reflection of her bright and ardent spirit. "Isn't it a dandy, Jim? I hunted all over town to find it. You'll have to look at the time a hundred times a day now. Give me your watch. I want to see how it looks on it." Instead of obeying, Jim tumbled down on the couch and put his hands under the back of his head and smiled. "Dell," said he, "let's put our Christmas presents away and keep 'em a while. They're too nice to use just at present. I sold the watch to get the money to buy your combs. And now suppose you put the chops on." The magi, as you know, were wise men--wonderfully wise men--who brought gifts to the Babe in the manger. They invented the art of giving Christmas presents. Being wise, their gifts were no doubt wise ones, possibly bearing the privilege of exchange in case of duplication. And here I have lamely related to you the uneventful chronicle of two foolish children in a flat who most unwisely sacrificed for each other the greatest treasures of their house. But in a last word to the wise of these days let it be said that of all who give gifts these two were the wisest. O all who give and receive gifts, such as they are wisest. Everywhere they are wisest. They are the magi. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10453 From: huzypuzy Date: Mon Dec 20, 2004 6:25pm Subject: CCSI--need info about this company please Hello to everyone ! Maybe this is way of topic but I need help identifying this company : CCSI 8 Campus Cir Westlake , TX 76262 This company has made an inquiry on my credit report and I'm dead curious who is it or what is it. Every atempt to find out myself from various internet sources , have failed. I found some company called Sonitrol of Forth Worth listed at this address , but it turns out that is not the misterious CCSI. Is a big building I believe with many companies. Maybe someone of you , knows exactly who this is . I appreciate any help you can give. In the mean time , Merry Christmas to all TSCM-L members ! M. Huzau 10454 From: Leanardo Date: Mon Dec 20, 2004 11:30am Subject: Re: What the F..... is this ? "OH-58D": Is a small recon helicopter built by Bell. It has a mast mounted "eyeball" above the main rotors that has a thermal camera and a laser range finder/target designator. "JRTC": Used to be an abbreviation for "Joint Readiness Training Center" where the military can hold organized training invovling all branches of the military. If your question was specific to the content of the video footage, I will let someone else explain... Bruce : ) --- In TSCM-L@yahoogroups.com, "contranl" wrote: > > . > > What the F..... is this ? > > > http://content.collegehumor.com/media/movies/oh-58d_-_jrtc_fun.wmv > > or > > http://tinyurl.com/3l2t7 > > > It's a 6 min video ...takes some time to download first. > > > Tetrascanner 10455 From: James M. Atkinson Date: Mon Dec 20, 2004 8:03pm Subject: All is Well Santa All is Well Santa by Cmdr.Donald M DeWITT,USN Retired Twas the night before Christmas, he lived all alone In a one bedroom house made of plaster and stone. I had come down the chimney with presents to give, And to see just who in this home did live. I looked all about, a strange sight did I see, No tinsel, no presents, not even a tree. No stocking by the mantle, just boots filled with sand, on the wall hung pictures of far distant lands. With medals and badges, awards of all kinds, a sober thought came through my mind. For this house was different, it was dark and dreary, I found the house of a soldier, once I could see clearly. The soldier lay sleeping, silent, alone, curled upon the floor in this one bedroom home. The face was so gentle, the room in such disorder, Not how I pictured a United States soldier. Was this the hero of whom I just read? Curled up on a poncho, the floor for a bed? I realized the families I saw on this night, owed their lives to these soldiers, who were willing to fight. Soon round the world the children would play, And grownups would celebrate a bright Christmas day. They all enjoyed freedom each month of the year, Because of the soldiers, like the one lying here. I couldn't help wonder how many lay alone, on a cold Christmas Eve, in a land far from home. The very thought brought a tear to my eye, I dropped to my knees and started to cry. The soldier awakened and I heard a rough voice, "Santa, don't cry, this life is my choice; I fight for freedom, I don't ask for more, My life is my God, my country, my Corps." The soldier rolled over and drifted to sleep, I couldn't control it, I started to weep. I kept watch for hours, so silent and still And we both shivered from the cold night's chill. I didn't want to leave on that cold, dark night This Guardian of Honor so willing to fight. The soldier rolled over, with a voice soft and pure, whispered, "Carry on, Santa, It's Christmas Day, All is secure." One look at my watch and I knew he was right Merry Christmas, my friend, and to all a Good Night! Thank you solider, Merry Christmas -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10456 From: Michael Puchol Date: Tue Dec 21, 2004 2:44am Subject: Cases of industrial espionage, bugging, in pharma industries Hi all, I have to visit a local pharmaceutical company to provide consultancy services on security, basically regarding patient information protection and industrial espionage. I'd like to know if any of you can provide real examples of such activities in the pharma sector, the details can be vage and heavily sanitized, I just need a few case examples that they may know of too (I just hope they weren't the thieves in any of the cases, otherwise things could get embarrasing!). I have googled, but come up with mostly empty hands, a couple of cases reported but not much else. Best regards, Mike Happy Christmas and a Successful and Peaceful New Year to all. 10457 From: Hawkspirit Date: Tue Dec 21, 2004 8:05am Subject: Voice Print needed I need two voices on an audio tape voice printed to find out if it is the same individual. If you have this expertise please contact me. Roger Tolces Electronic Security Co. 760-329-4404 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.817 / Virus Database: 555 - Release Date: 12/15/2004 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.817 / Virus Database: 555 - Release Date: 12/15/2004 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.817 / Virus Database: 555 - Release Date: 12/15/2004 [Non-text portions of this message have been removed] 10458 From: Javier Villanueva Date: Tue Dec 21, 2004 9:14am Subject: Re: Cases of industrial espionage, bugging, in pharma industries Same problem here. I tried to offer this kind of service to one of my Clients and was put on hold for lack of convincing argumetns about the real threat. If someone produces such Cases, please let me know. On the other hand,,, next year i¥ll try to convince my reluctant client by making a real demo of phone tapping... hoping to open their eyes. Greetings. --- Michael Puchol wrote: > > Hi all, > > I have to visit a local pharmaceutical company to > provide consultancy > services on security, basically regarding patient > information protection > and industrial espionage. I'd like to know if any of > you can provide > real examples of such activities in the pharma > sector, the details can > be vage and heavily sanitized, I just need a few > case examples that they > may know of too (I just hope they weren't the > thieves in any of the > cases, otherwise things could get embarrasing!). > > I have googled, but come up with mostly empty hands, > a couple of cases > reported but not much else. > > Best regards, > > Mike > > Happy Christmas and a Successful and Peaceful New > Year to all. > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > $4.98 domain names from Yahoo!. Register anything. > http://us.click.yahoo.com/Q7_YsB/neXJAA/yQLSAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > ===== Javier Villanueva C. Vcorp & Asociados Contraespionaje ElectrÛnico y Seguridad Inform·tica Tel. 01 (33) 36 19 47 09 cel. 044 333 392 64 50 msm. javier_vc@h... __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10459 From: fjansgmxnet Date: Tue Dec 21, 2004 6:59am Subject: un-bug / VLF reception Hello! In the description of the UN bug on http://cryptome.org/un-bug.htm there is following statement: --------------- A spectrum analyzer in the hands of a skilled engineer would have also detected this device during any TSCM inspection, even if the device was not transmitting at the time as the VLF signals from the oscillator on the control board would have been immediately and easily detected. --------------- What kind of antenna has to be used for this purpose? If I try to receive the VLF signals from a PIC with a 4 MHz crystal using a simple scanner (AR8200, R10 or Yuperitu Mvt7100) with a simple teleskop antenna, I have to be really close to the device (10cm) to detect the device for sure. Therefore I am far away from "immediate and easy detection". Any clues? What is the detection range, which will be possible for the experienced people with the appropriate equipment in this group? Regards, Frank 10460 From: James M. Atkinson Date: Tue Dec 21, 2004 10:58am Subject: Re: un-bug / VLF reception Frank, A TSCM tech would typically use two different types of antenna to detect this type of device. The first is a shielded magnetic loop, where a 6-8 inch coil made of litz wire is shielded inside an closed aluminum loop. Detection range is a few feet, but it is dependent on keeping an amplifier close to the loop, and keeping the operator in line and slow moving. The second is a small shielded folded dipole. This is used after the above loop to resolve the location to within a fraction of an inch. Both antenna's will require 40+ dB of amplification and filtering. Skill of the operator is critical as is a slow moving search pattern. -jma At 07:59 AM 12/21/2004, fjansgmxnet wrote: >Hello! > >In the description of the UN bug on http://cryptome.org/un-bug.htm >there is following statement: > >--------------- >A spectrum analyzer in the hands of a skilled engineer would have >also detected this device during any TSCM inspection, even if the >device was not transmitting at the time as the VLF signals from the >oscillator on the control board would have been immediately and >easily detected. >--------------- > >What kind of antenna has to be used for this purpose? If I try to >receive the VLF signals from a PIC with a 4 MHz crystal using a >simple scanner (AR8200, R10 or Yuperitu Mvt7100) with a simple >teleskop antenna, I have to be really close to the device (10cm) to >detect the device for sure. Therefore I am far away from "immediate >and easy detection". Any clues? > >What is the detection range, which will be possible for the >experienced people with the appropriate equipment in this group? > >Regards, > Frank ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10461 From: contranl Date: Tue Dec 21, 2004 3:04pm Subject: Interesting live audio scanner feed (border patrol) . I found this (new) live scanner feed that does just one channel It's the border patrol/customs in the Tucson,Arizona area Half the time they are on clear and the other half on crypto No idea what crypto that is maybe Motorola DVP ? type ? Be patient to hear somthing it could take a few minutes before they say something...the noise is a crypto transmission but as said they will come in clear also. Some times they speak in codes about secret sensors that will detect any humans trying to (ilegally) cross the Mexican/US border When such a detector is activated you can hear the dispatch center telling a patrol to go there No idea what sensors they use probably some kind of vibration or infrared types ScannerAudiofeed: http://64.21.115.231:8200/ Homepage of this scanner: http://www.borderdash.com/ check out their forum to see a list of used codes Greetings Tetrascanner 10462 From: Michael Dever Date: Tue Dec 21, 2004 3:30pm Subject: Re: un-bug / VLF reception Jim Are the antennas you describe commercially available? Regards On 22 Dec 2004, at 03:58, James M. Atkinson wrote: > > Frank, > > A TSCM tech would typically use two different types of antenna to > detect > this type of device. > > The first is a shielded magnetic loop, where a 6-8 inch coil made of > litz > wire is shielded inside an closed aluminum loop. Detection range is a > few > feet, but it is dependent on keeping an amplifier close to the loop, > and > keeping the operator in line and slow moving. > > The second is a small shielded folded dipole. This is used after the > above > loop to resolve the location to within a fraction of an inch. > > Both antenna's will require 40+ dB of amplification and filtering. > Skill of > the operator is critical as is a slow moving search pattern. > Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Voice: (02) 6254 5337 Email: dca@b... This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 10463 From: contranl Date: Tue Dec 21, 2004 4:12pm Subject: Re: un-bug / VLF reception . Check out the GPS tracker detection discussion right in this group (search archive)...it deals with detecting harmonics emitted from GPS receivers (trackers) same principles go for detecting anything else that has oscillators/crystals Remark...they are not neccesarely VLF i'd say more in the 10 to 300 mhz range caused by the length of the wiring and pc-board tracks wich will favor the higher overtones... Example: a 10 mhz quarz generates more then only 10 mhz but also 10,20,30,40,50...200...etc Mhz depending on the length of the tracks and wiring the strongest emitted carrier could well be for example at 170 mhz If you know what to look for and what kind of crystal frequency is used you could prepare a list of frequencies in for example a scanner and scan them all ...in practice that would be 100~200 frequencies between 5 and 300 mhz ..your scanner will automatically stop on one of the strongest signals...when close enough to such an oscillator you could see a distinct pattern on a spectrum-analyzer. If you don't know what to look for wich you usually do'nt you will have to analyze every suspect signal...wich you usually have to. Also such a signal does not have to be on all the time since the specific circuit might be "sleeping" The UN-bug might very well have used a 2.4 ghz video transmitter module/endstage to transmit it's wideband signal...so you could do some research on these modules and find out what crystals are usually in there (oscillators or mixer crystals) possibly you end up with just a few Also OKI is a very popular speech chip manufacturer there is a big chance that these are used in some burst transmitters more than half the devices using speech recording use OKI chips so you might check them too...a lot of work ! Resuming: In practice you have to analyze everything one by one and "throw away" those signals that you have determined not to come from a bugging device (sleeping or not)...looking for specific signals (known frequencies from known devices) would only be usefull if you know these devices in and out,if the creator of such a device is a secret service department you never know what they are using or if they have changed their circuits,looking for specific harmonics would only be usefull when looking for mass-produced devices like for example GSM-transmitters,GPS-receivers,Video-cameras etc wich usually use the same few crystal frequencies. In your case the 4 mhz quartz in your scanner might very well generate an harmonic in a much higher band for example 40 or 80 mhz wich might very well be receivable up to 20 meters Also there are more frequency emitted from your scanner like those coming from any mixer circuits for example the current received frequency minus or plus 10.7 or 21.4 mhz depending on the brand. to find those harmonics take another scanner and have it search from 4 to 400 mhz in the smallest steps possible,you will see that there are some very strong signals there. Tetrascanner 10464 From: contranl Date: Tue Dec 21, 2004 5:34pm Subject: Part of archive (here) gone ? . Jim...maybe you have mentioned it already ...but is part of the archive gone ? did that happen a few months ago when this group was shortly offline ? Greetings Tetrascanner 10465 From: James M. Atkinson Date: Tue Dec 21, 2004 7:34pm Subject: Re: Part of archive (here) gone ? At 06:34 PM 12/21/2004, contranl wrote: >Jim...maybe you have mentioned it already ...but is part of the >archive gone ? did that happen a few months ago when this group >was shortly offline ? > >Greetings > >Tetrascanner Yes, we lost several hundred postings from the archive. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- From: Mike Date: Fri Dec 18, 2009 2:57pm Subject: Jammer Recently I picked up these units dirt cheap on Ebay in one lot. (Curiosity got me! smiles..) 1. Jammer, Hand Emplaced Smart Expendable DAAK20 - 80 - C- 0530 by Motorola 2. Local Control C-434/GRC (2 units) Signal Corps US ARMY 3. Remote Control C-433/GRC Apparently all or most of these are or can be used together. Looks like Jamming equipment as #1 has a 6 ' telescoping antenna. Any ideas about exactly what this unit does/freq range? Thanks- Mike [Non-text portions of this message have been removed] 2103 From: Talisker Date: Mon Dec 18, 2000 4:51pm Subject: Wardialing - lost it Hi all I was enquiring about wardialers a while back, I got an interesting reply about analysing data within the exchange to find modems - in fact it was so interesting I moved somewhere safe you guessed it :o) I can't find it If that certain someone could resend it with details on the technicalities I'd bet eternally grateful Cheers Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo talisker@n... The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. 2104 From: John McCain Date: Mon Dec 18, 2000 5:19pm Subject: Re: Off topic - Lightning >Anyone familiar with such technology? > > This equipment is in common use in the USA. Long ago, I played with a thunderstorm detector that worked about 50 mhz IIRC. Here are a couple of links to modern stuff... http://www.boltek.com/ http://www.stormwise.com/ Cheers, JohnM Manager, Corporate SecurityVoice: 217-352-3207 Data Comm for Business, Inc.Fax: 217-352-0350 807 PioneerWeb: http://www.dcbnet.com Champaign, IL. 61820Email: Jmccain@d... 2105 From: Bullfrog007 Date: Mon Dec 18, 2000 7:27pm Subject: Re: Jammer When you searched E-bay for your items what exactly was your search string to find these items i have tried to search E-bay for similar items and never found anything of value besides patches to EW squadron's in the military any help will be appreciated Mike 2106 From: lineone Date: Mon Dec 18, 2000 6:18pm Subject: RE: Off topic - Lightning Hey Charles Great Web site you have their buddy Really enjoyed my visit - looks very professional and a credit to TSCM jc 2107 From: Mike Date: Fri Dec 18, 2009 8:55pm Subject: Re: Jammer Often I search Military Surplus then when I find a guy selling hardware, I look at his other auctions. That's how I got this batch of goodies. ($30 smiles...) Look at this user and his Mil Surplus site. I got 5 an/pps-6 radars from him cheap (just sold one for $1000. He's sold out of this Model) and he might still have a few an/pps-15 units. murphy@c... I do a standard series of searches every few days such as ESN, PSID, Seismic, etc.. There's a lot of stuff being sold on the major auctions that is REAL interesting and cheap. I use my "Mad Money" for stuff like the Jammer that I'm only guessing at. Stuff that I can't use will get sold at my booth in July at Defcon plus some OTHER interesting items. Just ask anyone for "Bootlegs Table". I'll have my usual DMV databases for sale on cd-rom plus a bunch of cell capable scanners, etc.. I'm Tekcracker@S... on ebay. Please avoid bumping bids or email me and we might split a auction. For those of you in other parts of the US, a FANTASTIC gov auction site for Mil Surplus stuff is www.levylatham.com . I'm in Oregon and near the WA sites, but SO MUCH is at other mil sites around the US. Can find lots of surveillance/security/com stuff here. Would like the chance to buy parts of any lots you win in your area. Thanks Mike ----- Original Message ----- From: Bullfrog007 To: Sent: Monday, December 18, 2000 5:27 PM Subject: Re: [TSCM-L] Jammer > When you searched E-bay for your items what exactly was your search string > to find these items > i have tried to search E-bay for similar items and never found anything of > value besides patches to EW squadron's in the military > any help will be appreciated > Mike > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2108 From: Mike Date: Fri Dec 18, 2009 9:07pm Subject: Re: Wardialing - lost it Most of the hacker or Phreak sites have these programs. Doing a search on any search engine for the following progs should lead to sites with many similiar programs. Toneloc, Demondialer, Bluebeep, etc. are but a few of the infamous dozens available. One of the first was Catfur for the apple II plus and an applecat modem. (Yep- still have that hardware/software and similiar archives from the last 22 years of cruising underground sites. smiles.... ) The old 1200 baud applecat was a REAL interesting device years ago. May even have some current uses. Nuff Said- Bootleg ----- Original Message ----- From: Talisker To: Sent: Monday, December 18, 2000 2:51 PM Subject: [TSCM-L] Wardialing - lost it > Hi all > > I was enquiring about wardialers a while back, I got an interesting reply > about analysing data within the exchange to find modems - in fact it was so > interesting I moved somewhere safe > > you guessed it :o) I can't find it > If that certain someone could resend it with details on the technicalities > I'd bet eternally grateful > > Cheers > Andy > http://www.networkintrusion.co.uk > Talisker's Network Security Tools List > ''' > (0 0) > ----oOO----(_)---------- > | The geek shall | > | Inherit the earth | > -----------------oOO---- > |__|__| > || || > ooO Ooo > talisker@n... > > The opinions contained within this transmission are entirely my own, and do > not necessarily reflect those of my employer. > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2109 From: Jay Coote Date: Tue Dec 19, 2000 1:16am Subject: Re: Off topic - Lightning "Lowfers" (Low Freq Radio Experimenters) sometimes listen to "whistlers" and other lightning and earth radio sounds in the VLF and ELF spectrum. You might search for Longwave Club of America (LWCA) or the keyword LOWFER. One writer in the 80's, Mike Mideke published in some LOWFER newsletters, and he was quite involved in whistlers. (I've shut down my 160-190 Khz CW station in 1989, but kept my VLF upconvertors for sweeps) Jay Coote Los Angeles ---------- We conducted a sweep last thursday during one of our almost daily afternoon summer thunder storms - which can be very violent. It was about 5 km away at it's closest, but erring on the side of caution we deferred the 'phone line inspection until the next morning (many years ago I was in our workshop when our 15 Mtr high steel mast took a direct hit. The room was instantly filled with noxious black smoke as every connected cable and circuit was vapourised - that was a considerable insurance claim). Anyway, that's not my point, which is somewhat off topic, so I guess off list replies would be appropriate. For personal reasons I won't go into here, I'm interested in predicting the approach of thunderstorms. It occurred to me that the RF characteristics of the 'static' we are all familiar with, especially on the lower frequencies, when a storm is even hundreds of km away, could be differentiated from other signals, identified and measured to give an inexpensive indication of a storm approaching (one could also combine filtered audio and visual detection to calculate the distance of closer storms). Anyone familiar with such technology? Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2110 From: Jay Coote Date: Tue Dec 19, 2000 1:16am Subject: Re: Jammer Probably designed to cover the VHF tactical FM band 30-90 Mhz? If you have the NSN (National Stock Number) from the equipment, the NSN looks like 5820-00-000-0000 or similar digits, you could search info on www.drms.dla.mil or get a copy of Fedlog CD rom to research it. Also, 'Janes Military Communications' is a good reference book for military radios. Finally, you might get on armyradios@egroups.com or milsurplus@q... These lists have some knowledgeable mil and special ops radio collectors on board. Jay Coote Los Angeles ---------- Recently I picked up these units dirt cheap on Ebay in one lot. (Curiosity got me! smiles..) 1. Jammer, Hand Emplaced Smart Expendable DAAK20 - 80 - C- 0530 by Motorola 2. Local Control C-434/GRC (2 units) Signal Corps US ARMY 3. Remote Control C-433/GRC Apparently all or most of these are or can be used together. Looks like Jamming equipment as #1 has a 6 ' telescoping antenna. Any ideas about exactly what this unit does/freq range? Thanks- Mike [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2111 From: A Grudko Date: Tue Dec 19, 2000 2:44am Subject: Off topic - Lightning. On topic - VLF I just wanted to say thanks again to the too-many-to-mention list members who responded with some really useful info. on lightning detection. I think I have enough for now - not that I'm trying to close the subject...it's obviously not as far off topic as I thought. A couple of guys asked me what my application is. Briefly, I run a comprehensive emergency monitoring and response control room on a large lake in a geographical bowl, on a golf course. We are located 1144mtrs ASL so QNH variations are minimal before a storm. We have had as much as 80 mm of rain in under an hour. Our electrical storms in this area are amongst the most violent in the world and can sweep in from a blue sky in minutes. Physical damage, boats sunk and even death are not unusal. On Friday night a lighting bolt hit a chimney 200 mtrs from my house, blasting a dozen bricks off. When the storms are iminent the golf club sounds a siren to stop all play, but their warning time, because of the speed of the storm approaching is only a couple of minutes. The info. you have supplied will allow me to predict these storms well ahead of the golf club's warning. IRO VLF, my amature license is restricted to 30 megs up so I was never into SW, CW, DX, with the exception of some special spot frequencies. Today I'll be installing a VLF antenna to see what the results are. I have an old Datong (UK) VLF converter which I used to use for TSCM before we upgraded. Interestingly, in 20 years + I have never found an active VLF bug. I've found wireless intercoms and baby minders - which cause a bit of excitement for a minute or 2, music (wireless speakers), two way comms (the power company I think) and bursts of data (switching and reporting), but never a bug. I've seen VLF bugs, tested them and in one case modified a baby monitor for that use. Some may say I just missed them all! Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2112 From: Date: Tue Dec 19, 2000 2:55am Subject: RE: jammer Mike, you might try the link below. They may be able to answer your questions regarding your Jammer. The fact that your equipment in labeled Signal Corps indicates that it is some old stuff. 98J's (which fall under USAIC control) are the folks that operate jamming equipment and have since at least the 60's. I don't know the date that jamming was taken out of the Signal Corps control but it spans mine and my fathers careers. Good luck. If you don't find anything let me know and check with some of my friends that still hang around that stuff. Guppy US Army Intelligence Center & Fort Huachuca [Non-text portions of this message have been removed] 2113 From: Mike Date: Fri Dec 18, 2009 10:37pm Subject: Re: Wardialing - lost it http:/packetstorm.security.com/wardialers You should find em here. Mike ----- Original Message ----- From: Talisker To: Sent: Monday, December 18, 2000 2:51 PM Subject: [TSCM-L] Wardialing - lost it > Hi all > > I was enquiring about wardialers a while back, I got an interesting reply > about analysing data within the exchange to find modems - in fact it was so > interesting I moved somewhere safe > > you guessed it :o) I can't find it > If that certain someone could resend it with details on the technicalities > I'd bet eternally grateful > > Cheers > Andy > http://www.networkintrusion.co.uk > Talisker's Network Security Tools List > ''' > (0 0) > ----oOO----(_)---------- > | The geek shall | > | Inherit the earth | > -----------------oOO---- > |__|__| > || || > ooO Ooo > talisker@n... > > The opinions contained within this transmission are entirely my own, and do > not necessarily reflect those of my employer. > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2114 From: James M. Atkinson, Comm-Eng Date: Tue Dec 19, 2000 9:19am Subject: RULES OF THE AIR [Humor] RULES OF THE AIR 1. Every takeoff is optional. Every landing is mandatory. 2. If you push the stick forward, the houses get bigger. If you pull the stick back, they get smaller. That is, unless you keep pulling the stick all the way back, then they get bigger again. 3. Flying isn't dangerous. Crashing is what's dangerous. 4. It's always better to be down here wishing you were up there than up there wishing you were down here. 5. The ONLY time you have too much fuel is when you're on fire. 6. The propeller is just a big fan in front of the plane used to keep the pilot cool. When it stops, you can actually watch the pilot start sweating. 7. When in doubt, hold on to your altitude. No one has ever collided with the sky. 8. A 'good' landing is one from which you can walk away. A 'great' landing is one after which they can use the plane again. 9. Learn from the mistakes of others. You won't live long enough to make all of them yourself. 10. You know you've landed with the wheels up if it takes full power to taxi to the ramp. 11. The probability of survival is inversely proportional to the angle of arrival. Large angle of arrival, small probability of survival and vice versa. 12. Never let an aircraft take you somewhere your brain didn't get to five minutes earlier. 13. Stay out of clouds. The silver lining everyone keeps talking about might be another airplane going in the opposite direction. Reliable sources also report that mountains have been known to hide out in clouds. 14. Always try to keep the number of landings you make equal to the number of take offs you've made. 15. There are three simple rules for making a smooth landing. Unfortunately no one knows what they are. 16. You start with a bag full of luck and an empty bag of experience. The trick is to fill the bag of experience before you empty the bag of luck. 17. Helicopters can't fly; they're just so ugly the earth repels them. 18. If all you can see out of the window is ground that's going round and round and all you can hear is commotion coming from the passenger compartment, things are not at all as they should be. 19. In the ongoing battle between objects made of aluminum going hundreds of miles per hour and the ground going zero miles per hour, the ground has yet to lose. 20. Good judgment comes from experience. Unfortunately, the experience usually comes from bad judgment. 21. It's always a good idea to keep the pointy end going forward as much as possible. 22. Keep looking around. There's always something you've missed. 23. Remember, gravity is not just a good idea. It's the law. And it's not subject to appeal. 24. The three most useless things to a pilot are the altitude above you, runway behind you, and a tenth of a second ago. -- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, The hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. ======================================================================= 2115 From: Robert Dyk Date: Tue Dec 19, 2000 11:29am Subject: Re: Off topic - Lightning. On topic - VLF Andy In the Aviation world they use a 3M Stormscope for exactly the application you describe. This is a fairly common device in well equipped IFR capable general aviation aircraft Cheers, Robert Dyk dyk@c... 2116 From: Mike Date: Sat Dec 19, 2009 11:20am Subject: Re: RE: jammer Date of Mfg.1982 serial number 31 says it's post Nam stuff. My 93/4 Jane's Radar and EW Systems book lists a JAMMER, but it's another newer model. One of those small, fun mysteries that buggs me. smiles..... Thanks for the tips. Mike ----- Original Message ----- From: To: Sent: Tuesday, December 19, 2000 5:55 AM Subject: [TSCM-L] RE: jammer > > Mike, you might try the link below. They may be able to answer your > questions regarding your Jammer. The fact that your equipment in labeled > Signal Corps indicates that it is some old stuff. 98J's (which fall under > USAIC control) are the folks that operate jamming equipment and have since at > least the 60's. I don't know the date that jamming was taken out of the > Signal Corps control but it spans mine and my fathers careers. Good luck. > > If you don't find anything let me know and check with some of my friends that > still hang around that stuff. > Guppy > > > US Army Intelligence Center & Fort Huachuca > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2117 From: Miguel Puchol Date: Tue Dec 19, 2000 0:54pm Subject: RE: RULES OF THE AIR [Humor] > RULES OF THE AIR Another one: - Red sky in the morning, shepperd's warning, red sky at night, your engine's alight. Cheers, Mike 2118 From: Talisker Date: Tue Dec 19, 2000 0:20pm Subject: Re: Wardialing - lost it Mike I'm fine with wardialers I think I have every decent one on my site already, I'm looking for info on interrogating the exchange itself for modem traffic, this is more passive than a wardialer, and as mentioned previously the modem has to be connected for a wardialer to work Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo talisker@n... The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "Mike" To: Sent: Saturday, December 19, 2009 4:37 AM Subject: Re: [TSCM-L] Wardialing - lost it > > http:/packetstorm.security.com/wardialers > > You should find em here. > Mike > > > > ----- Original Message ----- > From: Talisker > To: > Sent: Monday, December 18, 2000 2:51 PM > Subject: [TSCM-L] Wardialing - lost it > > > > Hi all > > > > I was enquiring about wardialers a while back, I got an interesting reply > > about analysing data within the exchange to find modems - in fact it was > so > > interesting I moved somewhere safe > > > > you guessed it :o) I can't find it > > If that certain someone could resend it with details on the technicalities > > I'd bet eternally grateful > > > > Cheers > > Andy > > http://www.networkintrusion.co.uk > > Talisker's Network Security Tools List > > ''' > > (0 0) > > ----oOO----(_)---------- > > | The geek shall | > > | Inherit the earth | > > -----------------oOO---- > > |__|__| > > || || > > ooO Ooo > > talisker@n... > > > > The opinions contained within this transmission are entirely my own, and > do > > not necessarily reflect those of my employer. > > > > > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2119 From: William Knowles Date: Wed Dec 20, 2000 1:31am Subject: Mad's sporran legion http://www.megastar.co.uk/site/today/news/latest/20001220n_madge.html EXCLUSIVE by NICK GATES Wednesday, December 20, 2000 CAMERA-SHY pop superstar Madonna has ordered bodyguards to spy under her wedding guests' kilts. She is desperate to stop rogue pictures being taken of her Highland wedding to Brit film maker Guy Ritchie on Friday. So she's called in bodyguards to use anti-terrorist MIRRORS to peep up guests' kilts and peer into their sporrans for hidden cameras and recording gear. Madonna and Guy fear tiny hi-tech "Sporrancams" could be hidden in the traditional hairy pouches worn by Scotsmen. A massive security blanket has already been thrown around Skibo Castle near Dornoch where the spectacular showbiz wedding will take place. Heat-seeking gear and searchlights have also been set up to protect boundary walls. Last night a castle insider said: "We've had all kinds of stars staying here but I've never seen a security operation like this for a wedding. "We've heard that guests in kilts will have a long-handled mirror shoved between their legs by security staff. They'll be checking to see if they are hiding anything around their nether regions." He added: "Madonna's bodyguards are a pretty hard-bitten bunch. They think this idea is a hoot and are calling themselves the Sporran Legion." [...] *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 2120 From: Ray Van Staden Date: Wed Dec 20, 2000 0:05am Subject: INTRODUCTION-SOUTH AFRICA Hi I am Raymond VAN STADEN. I have a South African based company which specializes in TSCM in Southern Africa. Raymond --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.tscm-southafrica.com 2121 From: Robert G. Ferrell Date: Wed Dec 20, 2000 8:24am Subject: Re: Mad's sporran legion >She is desperate to stop rogue pictures being taken of her Highland >wedding to Brit film maker Guy Ritchie on Friday. Should've gotten hitched in a nudist colony, then... >So she's called in bodyguards to use anti-terrorist MIRRORS to peep up >guests' kilts and peer into their sporrans for hidden cameras and >recording gear. In th' Hilans, tha'll call for a wee claymore through th' gizzard. The clans dunna tak kindly tae tha sor o' muckin' aboot. :-) RGF Robert G. Ferrell, CISSP Clan Ferguson of Raith ======================================== Who goeth without humor goeth unarmed. ======================================== 2122 From: James M. Atkinson, Comm-Eng Date: Wed Dec 20, 2000 11:22am Subject: Shame Of Sex Spy Landlord Shame Of Sex Spy Landlord http://www.the-sun.co.uk/news/13250559 by Andrew Parker A PERVERT landlord set up a secret camera to film lodgers having sex, a court heard yesterday. Bachelor Christopher Phelan, 33, invited pals Tom Williams and Tracey Mullinder to rent a room in a house he bought. But before they moved in, he cut a hole in the ceiling and rigged up the camera over their bed. Phelan recorded hours of tapes of the couple's steamy romps. But his sordid spying was discovered when a telly in the room went on the blink, magistrates were told. Tom, 30, went into the loft to adjust the aerial and spotted wiring running from the camera down to a video recorder in Phelan's bedroom. He admitted harassment and was put on probation for two years yesterday. District judge Philip Browning said at Telford Court, Shropshire: "Your behavior was intrusive and disturbing for the couple." Simon Warlock, defending, said Phelan had not had sex for ten years and had a pre-occupation that he was suffering from cancer. Mr Warlock added: "He's very ashamed of his actions. He stumbled into what happened and what he did will never be repeated. "He worked at one stage with the couple and they became friends. "He suggested they move in with him in a separate bedroom." -- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= 2123 From: James M. Atkinson, Comm-Eng Date: Wed Dec 20, 2000 11:41am Subject: Landlord secretly filmed tenants having sex Landlord secretly filmed tenants having sex http://www.ananova.com/news/story/sm_149020.html A landlord has been placed on probation for two years after he admitted using a hidden camera to film a couple having sex in their bedroom. Christopher Phelan, 33, rigged up the secret spy device at his home in Telford, Shropshire, and recorded the couple having sex for his own "gratification", a court heard. The camera was only discovered when one of tenants went into the loft to adjust a television aerial, Telford magistrates court has been told. Neil Campbell, prosecuting, said Phelan befriended Thomas Williams and Tracey Mullinder and suggested they moved into his house and pay him rent. The couple moved in in June and stayed there for four months. Mr Campbell said Mr Williams discovered the hidden camera when he went into the loft to adjust the television aerial on September 7. He said: "He noticed two wires. One led to a camera which appeared to be secreted and was looking into the bedroom. He followed the wire to Christopher Phelan's bedroom where it was connected to recording equipment. He did get some degree of gratification at watching their personal behaviour." Phelan pleaded guilty at an earlier hearing to harassing the couple by filming them with a covert camera. District judge Philip Browning said Phelan's behaviour had been "intrusive and disturbing" and placed him on probation for two years. Mr Browning also issued a restraining order which prevents Phelan from communicating with Mr Williams. Simon Worlock, defending, said his client was ashamed of his behaviour and it was unlikely he would ever offend again. He said his client was a man of previous good character who had not had a sexual relationship for nine years after he became seriously ill. Last updated: 12:09 Tuesday 19th December 2000 -- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= 2124 From: St. Clair, James Date: Wed Dec 20, 2000 8:32am Subject: RE: Mad's sporran legion Aye, laddie, tha be worthy of a naked roll in tha heather! James St. Clair Clan SinClair -----Original Message----- From: Robert G. Ferrell [mailto:rferrell@r...] Sent: Wednesday, December 20, 2000 9:25 AM To: TSCM-L@egroups.com Subject: Re: [TSCM-L] Mad's sporran legion >She is desperate to stop rogue pictures being taken of her Highland >wedding to Brit film maker Guy Ritchie on Friday. Should've gotten hitched in a nudist colony, then... >So she's called in bodyguards to use anti-terrorist MIRRORS to peep up >guests' kilts and peer into their sporrans for hidden cameras and >recording gear. In th' Hilans, tha'll call for a wee claymore through th' gizzard. The clans dunna tak kindly tae tha sor o' muckin' aboot. :-) RGF Robert G. Ferrell, CISSP Clan Ferguson of Raith ======================================== Who goeth without humor goeth unarmed. ======================================== ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2125 From: David Miller Date: Wed Dec 20, 2000 8:43am Subject: new tools Lie-Detecting Phone Goes on Sale Updated: Fri, Dec 15 07:37 AM EST Related stories IZMIR, Turkey (Reuters) - Washing your hair, working late, flooded kitchen -- all these excuses may be a thing of the past if a lie-detecting telephone on sale in Turkey takes off. "This is a phone that enables you to tell if someone is telling the truth or not on the other end of the line," said Tulay Ispirli, manager of a shop called Vakkorama in the western city of Izmir which is selling the phones for $159 each. The phone has an electronic device which notes changes in frequency that the ear cannot discern. A red flight flashes if the person is lying, a yellow light means you should take their words with a pinch or salt, and a green light means you can believe what you hear. Ispirli said there had been a lot of interest in the lie-detector phone, though at first customers were doubtful about the phone's abilities. "But once they try it they enjoy it," she told Reuters Television. 2126 From: David Alexander Date: Wed Dec 20, 2000 8:50am Subject: RE: Mad's sporran legion Hmm, thanks for the very dodgy accent. Try that over here and you'll end up with a caber where the sun don't shine 8-) think of it as friendly advice from a card-carrying celt ! David Alexander Project Manager & Information Security Consultant Qualified BS7799 Lead Auditor Triskele Ltd. Office 01491 833280 Mobile 0780 308 3130 -----Original Message----- From: Robert G. Ferrell [mailto:rferrell@r...] Sent: 20 December 2000 14:25 To: TSCM-L@egroups.com Subject: Re: [TSCM-L] Mad's sporran legion >She is desperate to stop rogue pictures being taken of her Highland >wedding to Brit film maker Guy Ritchie on Friday. Should've gotten hitched in a nudist colony, then... >So she's called in bodyguards to use anti-terrorist MIRRORS to peep up >guests' kilts and peer into their sporrans for hidden cameras and >recording gear. In th' Hilans, tha'll call for a wee claymore through th' gizzard. The clans dunna tak kindly tae tha sor o' muckin' aboot. :-) RGF Robert G. Ferrell, CISSP Clan Ferguson of Raith ======================================== Who goeth without humor goeth unarmed. ======================================== eGroups Sponsor Click Here! ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS [Non-text portions of this message have been removed] 2127 From: Robert G. Ferrell Date: Wed Dec 20, 2000 0:28pm Subject: RE: Mad's sporran legion >thanks for the very dodgy accent. Try that over here and you'll end up with >a caber where the sun don't shine 8-) I suspect that may have been why my ancestors fled to the colonies... RGF 2128 From: Stuart Wachs Date: Wed Dec 20, 2000 0:40pm Subject: Re: new tools This item sounds like CCS's "TruthPhone" -----Original Message----- From: David Miller To: 'TSCM-L@egroups.com' Date: Wednesday, December 20, 2000 1:31 PM Subject: [TSCM-L] new tools > >Lie-Detecting Phone Goes on Sale >Updated: Fri, Dec 15 07:37 AM EST > > Related stories >IZMIR, Turkey (Reuters) - Washing your hair, working late, flooded kitchen >-- all these excuses may be a thing of the past if a lie-detecting telephone >on sale in Turkey takes off. > >"This is a phone that enables you to tell if someone is telling the truth or >not on the other end of the line," said Tulay Ispirli, manager of a shop >called Vakkorama in the western city of Izmir which is selling the phones >for $159 each. > >The phone has an electronic device which notes changes in frequency that the >ear cannot discern. > >A red flight flashes if the person is lying, a yellow light means you should >take their words with a pinch or salt, and a green light means you can >believe what you hear. > >Ispirli said there had been a lot of interest in the lie-detector phone, >though at first customers were doubtful about the phone's abilities. "But >once they try it they enjoy it," she told Reuters Television. > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > 2129 From: t lovato Date: Wed Dec 20, 2000 1:52pm Subject: Re: new tools Ridiculous. David Miller wrote: Lie-Detecting Phone Goes on Sale Updated: Fri, Dec 15 07:37 AM EST Related stories IZMIR, Turkey (Reuters) - Washing your hair, working late, flooded kitchen -- all these excuses may be a thing of the past if a lie-detecting telephone on sale in Turkey takes off. "This is a phone that enables you to tell if someone is telling the truth or not on the other end of the line," said Tulay Ispirli, manager of a shop called Vakkorama in the western city of Izmir which is selling the phones for $159 each. The phone has an electronic device which notes changes in frequency that the ear cannot discern. A red flight flashes if the person is lying, a yellow light means you should take their words with a pinch or salt, and a green light means you can believe what you hear. Ispirli said there had been a lot of interest in the lie-detector phone, though at first customers were doubtful about the phone's abilities. "But once they try it they enjoy it," she told Reuters Television. eGroups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Agent_Lovato --------------------------------- Do You Yahoo!? Yahoo! Shopping - Thousands of Stores. Millions of Products. [Non-text portions of this message have been removed] 2130 From: Bullfrog007 Date: Wed Dec 20, 2000 1:59pm Subject: Re: Mad's sporran legion -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Herea is a hopin we dunna die from haggus poisning afta a rotty post lie dat ...Iee laddies !!!! Need a wee drop of the Highlan dew Wetwork -----BEGIN PGP SIGNATURE----- Version: PGP 7.0 Comment: TRAUMANET iQA/AwUBOkEPgnb9nqAVG6poEQJHpwCfTuXsaqtX/JDhKcr5LQ64etgtyN4An21X OiHkSvDOX5Lp3YRGg1j7+m1O =bePJ -----END PGP SIGNATURE----- 2131 From: James M. Atkinson, Comm-Eng Date: Wed Dec 20, 2000 2:34pm Subject: SAW (Surface Acoustic Wave ) Eavesdropping Devices [update] Here is another list of popular SAW Resonator frequencies that (in my humble opinion) you should keep a VERY CAREFUL watch on when performing TSCM services. These devices are CHEAPLY available between 30 to 1000 MHz, an in some cases to over 1.5 GHz. However, the bulk of these devices seem to appear between 50 and 500 MHz, with some very heavy threats between 200 and 500 MHz. I have personally observed eavesdropping devices on several of these frequency (including both audio and video signals). Signal bandwidths/modulation can be very narrow "Sliver FM", sub-carrier audio, 3 kHz AM voice, wide-band FM video (10-35 MHz bandwidth), or even digital audio signals so examine these sections of the spectrum with caution. of course you STILL have to check "everything between DC and light", but if you know where to expect a threat it becomes much easier to find. 061.240 MHz 067.240 MHz 211.240 MHz 224.000 MHz 265.000 MHz 303.825 MHz (I have personally observed eavesdropping devices on this frequency) 303.875 MHz (I have personally observed eavesdropping devices on this frequency) 304.300 MHz 310.000 MHz (I have personally observed eavesdropping devices on this frequency) 314.500 MHz 315.000 MHz 351.000 MHz 360.000 MHz 384.050 MHz 395.000 MHz (I have personally observed eavesdropping devices on this frequency) 403.550 MHz 407.300 MHz 418.000 MHz (I have personally observed eavesdropping devices on this frequency) 423.220 MHz 433.420 MHz 433.920 MHz (I have personally observed AM video on this frequency) 479.500 MHz 480.000 MHz (I have personally observed FM video on this frequency) 567.000 MHz 809.000 MHz (I have personally observed eavesdropping devices on this frequency) 857.650 MHz 859.000 MHz 868.350 MHz 903.000 MHz 912.000 MHz (I have personally observed eavesdropping devices on this frequency) 927.000 MHz 930.000 MHz 980.000 MHz -jma -- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= From: Robert G. Ferrell Date: Wed Dec 20, 2000 2:30pm Subject: Re: Mad's sporran legion >Herea is a hopin we dunna die from haggus poisning afta a rotty post >lie dat ...Iee laddies !!!! Need a wee drop of the Highlan dew >Wetwork I swear, you people just have no appreciation for bad brogue. It's like you've never even seen the original "Star Trek" or something.... ;-) RGF 2133 From: Bullfrog007 Date: Wed Dec 20, 2000 4:17pm Subject: Re: Mad's sporran legion It was the best Scotty i could do on short notice WW 2134 From: Charles P Date: Wed Dec 20, 2000 9:29pm Subject: Voicemail hacking on the rise We have recently encountered two clients with cases of voicemail hacking. Both cases were presumably perpetrated by the same individual or group. The purpose of these hacks was to force the victims' telephone systems to make continuous international calls. The number dialed was a number in the Philippines. The owner of the Philippine number gets paid for the calls by splitting the cost with the Philippine phone company (similar to the way a 900 number works in the US). The feature that was compromised lets a user program his mailbox to notify his pager or cell phone when a message has been left. The hacker gained access to a few mailboxes that allowed this feature, or created a new box of his own, and programmed it to call the Philippine number continuously until any new message has been retrieved. Then he would leave his own message in the box and the system would start out-dialing. The first case we had, the business owner happened to stop in on a Saturday morning to pick up something from his office. He noticed two outside lines were in use on his phone system, yet no one else was in the office. The second case was discovered when the owner of a different business tried to retrieve his messages and found that his box had a new password on it (unfortunately, he never put a password on himself, thinking that none of his messages were very private). Both cases occured on Panasonic voicemail systems. One twist in the second case, was that the hacker had also programmed in a New York City number to be dialed. Upon investigation it was discovered that this number went to a different Audix voicemail system in Manhattan, which had also been hacked. The FBI said that they have recently had a surge of complaints regarding this type of incident, and ATT has been tracking a tremendous volume of calls to the Philippines. There are a number of things that can be done to help protect a system agains this type of attack, but the first and most basic is: USE GOOD PASSWORDS! If anyone wants more indepth information please let me know. Charles Charles Patterson Global Communications Tarrytown, NY charles@t... www.telephonesecurity.com 2135 From: Jay Coote Date: Wed Dec 20, 2000 9:43pm Subject: Re: RULES OF THE AIR [Humor] And let us not forget one of the more annoying cloud formations, cumulo-granite. Jay Coote Los Angeles ---------- > RULES OF THE AIR Another one: - Red sky in the morning, shepperd's warning, red sky at night, your engine's alight. Cheers, Mike ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2136 From: James M. Atkinson, Comm-Eng Date: Wed Dec 20, 2000 10:55pm Subject: NOAA TO AID NORAD IN TRACKING SANTA CLAUS NOAA Contact: Pat Viets, (301) 457-5005, pviets@n... FOR IMMEDIATE RELEASE: 12/15/00 NOAA 2000-092 NOAA TO AID NORAD IN TRACKING SANTA CLAUS On Christmas Eve this year, the National Oceanic and Atmospheric Administration will help the North American Aerospace Defense Command track Santa Claus. NOAA will maintain a satellite watch of the North Pole for weather conditions and any unusual activity. NOAA's Satellite Command and Data Acquisition Station in Fairbanks, Alaska, is ready to spot activity at the North Pole. NORAD will answer children's questions on its comprehensive, six-language Santa tracking Web site at http://www.noradsanta.org . All site material, including the live tracking event, will be available in English, Japanese, French, Spanish, Italian and Brazilian Portuguese. NORAD will also attempt to set the record straight in regards to outrageous allegations that have been made by several fifth grade students as to the existence of Santa Claus. Seeing is believing and NORAD has perfected its 46-year-old tradition of tracking Santa on Christmas Eve. Visual and audio updates will be posted hourly on the Web site from 7:00 a.m. Dec. 24 EST to 5:00 a.m. Dec. 25 EST. 2000 Program The 2000 NORAD Tracks Santa Team again includes AOL, who will host the site on an extensive network of servers, and Analytical Graphics who created the site and all supporting imagery with NORAD. In addition, Globelink Services International coordinated the extensive translation required for the Web site. All the organizations and volunteers who help make this global NORAD Christmas project possible do so at no cost to the taxpayer. For more information, call Maj Jamie Robertson at (719) 554-5816, 2608 or 6889. ***** Air Force News Service 12/13/00 NORAD readies for Santa surveillance By Master Sgt. Larry Lincoln PETERSON AIR FORCE BASE, Colo. (AFPN) -- It's beginning to look a lot like Christmas -- especially at North American Aerospace Command. NORAD is preparing to launch its 46th "NORAD Tracks Santa" program. This year's version will again feature a six-language live-tracking Web site designed to bring a touch of the season to eager Santa watchers around the globe. The site features visual and audio updates hourly from midnight EST, Dec. 23 to 5 a.m. EST, Dec. 25, said Maj. Jamie Robertson, deputy director, NORAD Public Affairs. "We'll simply pick up the information as soon as Santa's sleigh launches from the North Pole," Robertson said. "Even before we pick up Santa on radar or via visual identification, we'll be able to detect the infrared glare from the tip of Rudolph's nose. It's the same technology we use to track missiles," he added. NORAD will track the jolly old elf using digital animation, satellite/cockpit images and audio reports from the NORAD command center located in Cheyenne Mountain. NORAD is a binational United States/Canadian organization charged with maintaining aerospace warning and aerospace control for North America. The Santa tracking tradition started in 1955, by accident, thanks to a local newspaper ad for a department store's 'Santa Hotline.' The ad included a special phone number that turned out to be the operations hotline to Continental Air Defense Command (NORAD's predecessor). When the phones started to ring, military operators were surprised to hear children asking to speak to Santa. Col. Harry Shoup, senior officer on duty at the time, took the first call and quickly figured out what had happened. Shoup told the youngster he was helping Santa and added that he could see Saint Nick on the radar screen: He was heading south from the North Pole. "It was the height of the Cold War, and the only people who had that particular phone number was the CONAD commander-in-chief and me," Shoup said. "If that phone ever rang, it usually wasn't good news. "I was surprised when it rang, but even more so when I picked it up and heard a child on the other end reading a Christmas list to me," Shoup said. Halfway through the call, the now-suspicious youngster said to Shoup, "Hey, you're not Santa," to which the quick-thinking colonel replied, "Ho, Ho, Ho ... I'm one of his helpers son. Now you be a good little boy and get right to bed." Shoup remembers that as soon as he hung up, the phone immediately rang with another Santa-seeker on the line. Shoup and his fellow crewmembers spent the rest of the evening answering a non-stop barrage of calls from children wanting to talk to Santa. Local media caught wind of the calls and reported the story. The next year, calls again flooded CONAD from children who wanted to know where Santa was. By 1957, NORAD was in the Santa-tracking business. Since then, the program has gradually expanded, and today is the recipient of 43 international awards. The Web site made its internet debut in 1997 and scored approximately one million hits. In 1999, the site took 52 million hits on Christmas Eve alone, peaking at 250,000 hits per minute. This year's site will be hosted by America Online, the world's leading Internet online service, and is supported again by Analytical Graphics, the company responsible for technical support and all associated imagery. "AGI donates its services to participate on the NORAD Tracks Santa project because we feel it is a perfect fit for our Satellite Tool Kit," said Bob Hall, AGI video production services director. "STK is the best tool to use to be able to track Santa as he flies around the world," he added. "We can even integrate some of NORAD's satellite systems when Santa is near the ground to better enable NORAD to follow him. Given that fit, it was a natural extension to help NORAD create the web site." The project has grown to the point that AGI now dedicates a few months each year working to produce the entire web site, including the 'imagery' for Dec. 24-25, Hall said. All site material, including the live tracking event, will be available in English, Japanese, French, Spanish, Italian and Brazilian Portuguese. In addition, Globelink Services International, a Colorado Springs, Colo.-based company, coordinated the extensive translation required for the Web site. According to Robertson, the organizations and volunteers who help make this global Christmas project possible, do so at no cost to the taxpayer. The 2000 NORAD Tracks Santa site will debut December 15. To view the site, go to www.noradsanta.org . To reach the Santa hotline call 719-474-3980 after 4 p.m. Dec. 24. RELATED LINKS * 2000 NORAD Tracks Santa (after Dec. 15) http://www.noradsanta.org/ -- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= 2137 From: A Grudko Date: Thu Dec 21, 2000 2:58am Subject: Am I paranoid? Interesting - Original message from: > Sue Sarkis > PI 6564 > Sarkis Detective Agency > (818) 242-2505 > > 'Big Brother' Could Soon Ride Along in Back Seat > > A New York highway agency is tracking cars that have electronic tollbooth > tags for the latest on travel speeds and traffic jams. > > In the Washington region, transportation officials want to monitor drivers > talking on cell phones as they drive the Capital Beltway as a way of > measuring congestion. > > And an Alabama-based company has developed equipment that "sniffs" passing > cars to identify which radio stations motorists have chosen. > > These "intelligent transportation systems," as they've been named, may > help solve traffic problems and be a boon to marketers, but they also > raise fear of a new threat to privacy: the idea that drivers could soon be > leaving electronic footsteps whenever they leave home. > > "We could end up with an utterly pervasive monitoring of travelers' > movements," warned Phil Agre, a professor of information studies at the > University of California at Los Angeles. > > While the public has begun to confront the hazards posed by unfettered > access to information about individuals' medical profiles and Internet > use, privacy advocates say there is still little recognition of the newest > frontier: travel and location information. > > "We are moving toward a surveillance society. Soon, government and private > industry, often working in concert, will have the capability to monitor > our every movement," said Barry Steinhardt, associate director of the > American Civil Liberties Union. "While the technology is growing at light > speed, the law that governs how the data can be used is developing at the > speed of tortoises." > > At a time when traffic is outpacing efforts to expand highways, new > technologies promise a once unimagined ability to manage rush hour, > respond instantly to crashes and eliminate backups at tollbooths. They > also offer police new tools to catch scofflaws such as red-light runners > and locate witnesses, and they provide businesses with immensely > profitable ways to reach prospective customers. > > Electronic toll programs, such as E-ZPass in the Northeast and the Dulles > Toll Road's Smart Tag, are often linked to individuals' credit card > accounts and are compiling ever more data about when and where specific > drivers are traveling. Transit "smart cards" collect similar information > about riders. > > Cameras are increasingly being used to snap photos of cars that run red > lights, evade paying tolls and speed. Closed-circuit television cameras > for monitoring highway traffic continue to proliferate and, as their > resolution improves, could be combined with an evolving technology that > automatically matches individual occupants' faces to their driver's > license pictures. > > Automobile makers are introducing on-board navigation systems that allow > vehicles to be tracked, and technology is evolving for monitoring the > location of cell phones. Engineers predict that cars will soon be > manufactured with embedded transmitters that allow them to be tracked. > > The growing number of high-tech systems for tracking vehicles and > archiving information about their travel patterns "is unwittingly bringing > us closer than ever to the Orwellian vision of the ever-present Big > Brother," wrote analysts Bruce Abernethy and Andrew Kolcz in a recent > cover story for Traffic Technology International. > > "It's an issue of great concern," said Larry Leibowitz, chief executive of > Inductive Signature Technologies, who will be chairing a panel on privacy > this month sponsored by the Intelligent Transportation Society of America. > "It gives the government the ability to tell where you're sitting at > dinner." > > He said people should be concerned about whether their records would be > subpoenaed in divorce and other lawsuits, and about whether this > information would be exploited by overzealous police. > > A 1996 survey by Priscilla M. Regan, of George Mason University, found > that Americans overwhelmingly preferred that high-tech transportation > systems collect only anonymous information, such as overall traffic > counts. They cautiously accepted the collection of some personally > identifiable information, such as license plate numbers, but objected to > such measures as videotaping inside their cars. More than two-thirds were > worried about who would see the information. > > "If they start giving the information away for advertising or selling > it,that bothers me," Chuck Stievenart, 39, of Fredericksburg, Va., said > recently. "We get enough junk already. Now I'll probably be on someone > else's list for junk." > > Said Kimberly Hayek, 29, of Arlington: "As a single woman, I have to > worry. I have been stalked before. I figure I don't have any privacy. I > don't like it." > > The agencies and companies behind these high-tech systems say they use a > range of safeguards, including letting travelers choose whether to > participate. In San Antonio, for example, 53 automated readers arrayed > along city streets follow the progress of 60,000 cars with transponders. > > All the motorists are volunteers. > > Both officials of the Dulles Toll Road and the agencies that offer E-ZPass > used on highways, bridges and tunnels in six states from Massachusetts to > West Virginia ‚Äì say travelers can choose not to buy the tag and instead > pay cash at tollbooths. > > Some systems try to limit the amount of personally identifiable > information they collect. For instance, Transcom, a traffic management > organization, has set up automated roadside readers in the New York area > to track cars with E-ZPass tags. But tag numbers are scrambled so they > cannot be traced to their owners. > > Likewise, a spokesman for Mobiltrak, the Alabama company that developed > the radio "sniffer" system, said its purpose is to take a random sample of > passing cars and supply that general information to advertisers. He said > the equipment does not determine specifically which vehicle is tuned into > which station. But in low-traffic areas, it could be easier to identify > individual cars. > > A third safeguard used by some systems is the practice of collecting data > about large groups of vehicles rather than specific cars. Maryland and > Virginia officials developing the program to track cell phone use have > said, for instance, they will simply follow the energy pattern generated > by thousands of phones. They stressed that they will not be able to > monitor phone calls or identify specific callers. > > Some initiatives do not store the information at all. Transcom > officials, for instance, collect E-ZPass readings to remain abreast of > highway congestion but do not keep them. > > But other transportation agencies do store personal information, > especially those that bill travelers for using electronic payment such as > E-ZPass, Smart Tag and Chicago's I-Pass, as well as Metro's smart card. > These agencies assure their customers that the data are not provided or > sold to businesses and only released under subpoena or court order except > in emergencies. > > Police have turned to E-ZPass records several dozen times. In the most > celebrated case, investigators probing the kidnapping of New Jersey > millionaire Nelson Gross, a former state Republican chairman, used E-ZPass > information in 1997 to track his BMW across the George Washington Bridge. > His car was found in Manhattan, and his battered body was soon discovered > nearby. > > Agencies and companies developing these high-tech systems have repeatedly > guaranteed that measures for easing traffic will not be merged with those > for policing, such as red-light cameras and photo enforcement of > speed limits. They fear motorists will reject programs such as electronic > toll systems and traffic cameras if they believe these will be used to > issue tickets. > > Indeed, the deployment of red-light cameras, for instance, has met with > decidedly mixed reviews, including in Virginia. Gov. James S. Gilmore > III(R) cited privacy concerns in vetoing a bill that would have expanded > their use beyond Arlington and Fairfax counties. > > The trepidation is not universal. "It's not like they're getting your DNA > or your medical records. You're in your car, and you're in public," said > Chris Wingo, 28, of Northwest Washington. > > Others want a say over how the information is used. "There's so many > unknowns with this new burst of the information age," said Leslie Honing, > 35, of Arlington. "I feel like I need some control over that." > > Privacy advocates insist that Congress set some legal parameters. > > Regan, of GMU, said laws alone are not enough. Limits on collecting and > archiving individual information must be built into the systems themselves: > > "Once you've collected the information, you're continually trying to keep > it under wraps, and there's constant pressure to let it out." 2138 From: William Knowles Date: Thu Dec 21, 2000 3:48am Subject: Re: Am I paranoid? On Thu, 21 Dec 2000, A Grudko wrote: Paranoid? One of my favorite quotes about Paranoia is... "Paranoia is reality on a finer scale" Enjoy this one, It will make you think twice about using preferred shopper cards that track your purchases. Cheers! William Knowles wk@c... Dear Mr. Jones: Our research indicates that you have not bought condoms at SpiffyMart recently. (Your last purchase was 8 weeks ago.) Further, you have stopped buying feminine hygiene products, but have sharply increased your frozen pizza and dinners usage in the same time frame. It's clear that Ms. Jody Sanders and you are no longer "an item". (It's probably for the best -- she consistently buys inexpensive shampoo, and it was obvious that the two of you were not economically compatible.) The Postal Service database confirms that she filed a change of address form. We at Hotflicks International offer our condolences. As the number-one vender of hot XXX-rated videos, we want you to know that our products can help you through this difficult period. When you're feeling lonely, check out our unmatched catalog, there is guaranteed to be something that you'll want to purchase! Order from this catalog and we'll throw in an extra tape FREE! Yours Truly, Pat Aureilly, Hotflicks Marketing Manager ps: That "blond" at O'Dougles last Saturday for whom you bought a Strawberry Marguerita? Forget it! Her HMO database confirms that she's had three yeast infections this year and was tested for a sexually transmitted disease. Our tapes are much safer! > Interesting - > > Original message from: > > Sue Sarkis > > PI 6564 > > Sarkis Detective Agency > > (818) 242-2505 > > > > 'Big Brother' Could Soon Ride Along in Back Seat > > > > A New York highway agency is tracking cars that have electronic tollbooth > > tags for the latest on travel speeds and traffic jams. > > > > In the Washington region, transportation officials want to monitor drivers > > talking on cell phones as they drive the Capital Beltway as a way of > > measuring congestion. > > > > And an Alabama-based company has developed equipment that "sniffs" passing > > cars to identify which radio stations motorists have chosen. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 2139 From: A Grudko Date: Thu Dec 21, 2000 4:09am Subject: Voicemail hacking - and SMS ----- Original Message ----- From: Charles P We have recently encountered two clients with cases of voicemail hacking. Very interesting. We have seen cases of voicemail 'theft' or 'copying' from our cellphone system, because as Charles highlights, some people don't use passwords or fail to set up their voice mail. All our cellular phones are on the GSM system, operated by 2 networks, which offer almost identical services. Both have similar voicemail characteristics in that; 1. If you have voicemail set up without a new password (it defaults to a 1-1-1-1 password) anyone can dial your collection number and retrieve your messages 2. The default setting is to store erase the message after collecting unless you select auto delete. The latter is better because if people tell you they left a message and you didn't get it you might suspect that someone else is collecting them. 3. If you do not set up a mailbox for your number someone else can, and then collect any messages left for you. If you don't want voicemail either set it up and never collect (Send yourself a bunch of dissemination and fill it up, "Monica, this is Bill....if you come to the Oral Office we can share a cigar). I also have a question. I don't know if US cellphones have Short Message System (SMS) . Anyway, can SMS be hacked? Our networks say 'impossible' but that's what people said about the citizens of the US voting ANOTHER Bush as President. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2140 From: James M. Atkinson, Comm-Eng Date: Thu Dec 21, 2000 9:26am Subject: DEAD HORSE WISDOM DEAD HORSE WISDOM Dakota tribal wisdom says that when you discover you are riding a dead horse, the best strategy is to dismount. However, in business we often try other strategies with dead horses, including the following: 1. Buying a stronger whip 2. Changing riders 3. Saying things like "This is the way we have always ridden this horse." 4. Appointing a committee to study the horse 5. Arranging to visit other sites to see how they ride dead horses 6. Increasing the standards to ride dead horses 7. Appointing a tiger team to revive the dead horse 8. Creating a training session to increase our riding ability 9. Comparing the state of dead horses in today's environment 10. Change the requirements, declaring that "This horse is not dead." 11. Hire contractors to ride the dead horse 12. Harnessing several dead horses together for increased speed 13. Declaring that "No horse is too dead to beat." 14. Providing additional funding to increase the horse's performance 15. Do a cost analysis study to see if contractors can ride it cheaper 16. Purchase a product to make dead horses run faster 17. Declare the horse is "better, faster and cheaper" dead 18. Form a quality circle to find uses for dead horses 19. Revise the performance requirements for horses 20. Say this horse was procured with cost as an independent variable 21. Promote the dead horse to a supervisory position -- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= 2141 From: James M. Atkinson, Comm-Eng Date: Thu Dec 21, 2000 9:24am Subject: LAWYERS' SEASONAL GREETING [Humor] LAWYERS' SEASONAL GREETING ATTACHED TO CHRISTMAS CARD From us ("the wishor") to you ("hereinafter called the wishee") Please accept without obligation, implied or implicit, our best wishes for an environmentally conscious, socially responsible, politically correct, low stress, non-addictive, gender neutral, celebration of the winter solstice holiday, practiced within the most enjoyable traditions of the religious persuasion of your choice, or secular practices of your choice, with respect for the religious/secular persuasions and/or traditions of others, or their choice not to practice religious or secular traditions at all... and a financially successful, personally fulfilling and medically uncomplicated recognition of the onset of the generally accepted calendar year 2001, but with due respect for the calendars of choice of other cultures or sects, and having regard to the race, creed, colour, age, physical ability, religious faith, choice of computer platform or dietary preference of the wishee. By accepting this greeting you are bound by these terms that- * This greeting is subject to further clarification or withdrawal * This greeting is freely transferable provided that no alteration shall be made to the original greeting and that the proprietary rights of the wishor are acknowledged. * This greeting implies no promise by the wishor to actually implement any of the wishes. * This greeting may not be enforceable in certain jurisdictions and/or the restrictions herein may not be binding upon certain wishees in certain jurisdictions and is revocable at the sole discretion of the wishor. * This greeting is warranted to perform as reasonably may be expected within the usual application of good tidings, for a period of one year or until the issuance of a subsequent holiday greeting, whichever comes first. * The wishor warrants this greeting only for the limited replacement of this wish or issuance of a new wish at the sole discretion of the wishor * Any references in this greeting to "the Lord", "Father Christmas", "Our Savior", or any other festive figures, whether actual or fictitious, dead or alive, shall not imply any endorsement by or from them in respect of this greeting, and all proprietary rights in any referenced third party names and images are hereby acknowledged. -- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= 2142 From: Robert G. Ferrell Date: Thu Dec 21, 2000 10:51am Subject: End-User License Agreement for Life (Humor) Copyright © 2000 R. G. Ferrell END-USER LICENSE AGREEMENT FOR LIFE IMPORTANT-READ CAREFULLY: This End-User License Agreement ("EULA") is a legal agreement between you (either a single- or multi-celled terrestrial life form) and the manufacturer ("God") of the carbon-based biological entity ("ORGANISM") with which you acquired the operating system ("LIFE"). If LIFE is not accompanied by a carbon-based biological entity, you may not use or attempt to reproduce LIFE. LIFE includes biochemical processes, reactions to stimuli, reproductive capabilities, and energy transference; in more advanced models LIFE may also include self-awareness and knowledge of the system's eventual obsolescence. Documentation for LIFE is self-generating and may not be reproduced without permission from God. No warranty, express or implied, is provided concerning the accuracy of this documentation or its suitability for use. By participating in activities that contribute to the bioreproductive process, you agree to be bound by the terms of this EULA. If you do not agree to the terms of this EULA, God is unwilling to license LIFE to you. In that event you must cease making use of LIFE immediately, and promptly contact God for instructions on returning the unused components of LIFE for a refund. LIFE is protected by planetary and universal natural laws, many of which have yet to be elucidated. LIFE is licensed to you, not granted without restriction. 1. GRANT OF LICENSE. This EULA grants you the following rights: (a) Installation and use of LIFE. You may install and use only one instance of LIFE per ORGANISM. LIFE must be installed and operated according to God's instructions, as set forth in prior documents (see "COMMANDMENTS," et al.). (b) Storage/In Vitro Use. LIFE may not be installed, dissected, reproduced, created, disrupted, imitated, or simulated by any ORGANISM whatsoever except as outlined below. Notwithstanding the foregoing and except as otherwise provided below, any number of ORGANISMS may make use of LIFE, if compatible. If LIFE is desired in an ORGANISM manufactured using non-standard reproductive techniques ("IN VITRO"), all conditions and requirements applicable to ORGANISMS manufactured using standard ("IN VIVO") techniques apply equally to IN VITRO instantiations of LIFE. The components necessary for LIFE may be stored cryogenically, so long as their eventual use is wholly in accordance with the principles and practices set forth in this EULA. (c) Back-up Copy. God provides a back-up copy of the algorithms necessary for LIFE encoded in each fundamental component thereof ("CELL"). This copy is intended for use by the subsystems of LIFE itself and may not be reverse engineered, duplicated, or otherwise used except with the express permission of God. Storage of one or more of these back-up copies for archival purposes is permissible, so long as any use made of them is wholly in accordance with the terms of this EULA. 2. DESCRIPTION OF OTHER RIGHTS AND LIMITATIONS. (a) If LIFE is installed in a self-aware ("SENTIENT") ORGANISM, the following additional restriction(s) apply. LIFE may not be reverse engineered for the purpose of installation and operation in any ORGANISM whatsoever, except under the terms of this EULA. Doing so voids any and all warranties, express or implied, incumbent upon God, and may result in civil and/or criminal penalties being assessed against the actor, up to and including Divine Retribution by God or one of God's designated agents (you don't want this, believe me). Since God is both omniscient and omnipotent, customary preliminary legal proceedings are unnecessary and will be waived in toto. (b) ORGANISM Version Selection. The genetic information necessary for operating LIFE is stored on templates residing in each CELL ("DNA"). DNA may contain instructions for expression of a large number of functional components ("GENES"), not all of which are necessary for proper operation of any given ORGANISM. You may install and express only those GENES intended for use by the ORGANISM in which LIFE resides. (c) Language Selection. LIFE will support any number of types of ORGANISM-to-ORGANISM communication ("LANGUAGE"). Acquisition and use of these LANGUAGES is the responsibility of the individual ORGANISM, however, and no guarantee of interoperability or mutual comprehension is offered by God. God does guarantee, however, that all communications between the LIFE user and the manufacturer will be monitored and acted upon as appropriate, without limitation based on choice of LANGUAGE. (d) Limitations on Reverse Engineering, Decompilation and Disassembly. You may not reverse engineer, deconstruct, or disassemble LIFE, except and only to the extent that such activity is expressly permitted by God notwithstanding this limitation. (e) Separation of Components. LIFE is licensed as a single product. Its component parts may not be separated for use in more than one ORGANISM, except as detailed elsewhere in this EULA. (f) Single ORGANISM. LIFE is licensed with the ORGANISM as a single integrated product. LIFE may only be used with the ORGANISM as set forth in this EULA. Astral projection is a violation of this agreement, besides being downright silly. (g) Rental. You may not rent, lease or lend LIFE to any other organism, although you may contract with God or God's agents for a new lease on your own LIFE at any time, subject to availability and your past performance as a LIFE user. (h) Termination. Without prejudice to any other rights, God may terminate this EULA if you fail to comply with the terms and conditions of this EULA or for any other reason, for that matter. In such event LIFE will cease to operate immediately. (i) Trademarks. This EULA does not grant you any rights in connection with any trademarks or service marks belonging to or commonly associated with God or any of God's agents. So enough with the fish-shaped automobile emblems already. (j) Component Sharing. The ORGANISM may contain multiple redundant components, any of which may be transferred to one or more other ORGANISMS in order to sustain or enhance the quality of LIFE. This transfer must be voluntary and in accordance with all applicable provisions of this EULA. An ORGANISM that ceases to make use of LIFE may permanently transfer any or all of its LIFE components to another ORGANISM without penalty. It is the responsibility of the ORGANISM to ensure that the uninstall, transfer, and reinstall are carried out properly, although both the ORGANISM performing the transfer and the ORGANISM receiving the transferred component(s) are entitled to contact God for technical support before and/or during the procedure. 3. UPGRADES. There are no upgrades to the basic LIFE package currently authorized by God. Any addition, deletion, or modification of LIFE or any of its subsystems voids the limited warranty provided by God, and the ORGANISM bears the responsibility for all philosophical, sociological, biological, or psychological damage/injury sustained as a result of this action. Technical support will be limited to the components of LIFE supplied by God as part of the original package, although God or God's agents will, if requested by or on behalf of ORGANISM, make every reasonable effort to provide comfort and solace following said damage/injury. 4. SUPPORT. Technical support for LIFE is available toll-free at all times by contacting God or one of God's agents by whatever means is most expedient. All communications are monitored for the sake of quality control. All inquiries will be addressed as soon as possible, although the response to any given communication may not be immediately obvious to the ORGANISM. Questions regarding the proper means of contacting Technical Support or interpretation of the answers received thereof may be directed to any of God's technical representatives, conveniently located in houses of worship planetwide. 5. EXPORT RESTRICTIONS. You agree that you will not export or re-export LIFE, as there is no place outside the territorial jurisdiction of the universe to which to export it (as far as you know). If you find one, you're looking too hard. Happy holidays. RGF Robert G. Ferrell, CISSP http://rferrell.home.texas.net/rgflit.html ======================================== Who goeth without humor goeth unarmed. ======================================== 2143 From: Miguel Puchol Date: Thu Dec 21, 2000 11:23am Subject: RE: Am I paranoid? Andy, I'm afraid you don't qualify as paranoid - I think we'll have to turn our cars into Faraday cages, turn off stereos, pay at tolls in cash/coins, and wear Donkey Kong face masks.... Cheers, Mike > -----Mensaje original----- > De: A Grudko [mailto:agrudko@i...] > Enviado el: jueves, 21 de diciembre de 2000 9:58 > Para: TSCM-L@egroups.com > CC: sacipub@egroups.com > Asunto: [TSCM-L] Am I paranoid? > > > Interesting - > > Original message from: > > Sue Sarkis > > PI 6564 > > Sarkis Detective Agency > > (818) 242-2505 > > > > 'Big Brother' Could Soon Ride Along in Back Seat > > > > A New York highway agency is tracking cars that have electronic > tollbooth > > tags for the latest on travel speeds and traffic jams. Et al 2144 From: Miguel Puchol Date: Thu Dec 21, 2000 11:31am Subject: RE: Voicemail hacking - and SMS Andy, The SMS services by themselves use the same authentication and security as voice calls. However, one way to hack them would be using some of the modern macro and pseudo-HTML data formats that some telephones employ. For example, Nokia uses a form of HTML that allows an operator or third party to add services and menu commands to user's SIM cards and/or phones, and this scripting language is VERY powerful - can read IMEI numbers, phone list entries, registered cell number and network, and a whole bunch of other stuff. So, it could be possible to plant code that forwards SMS messages. In any case, we are talking high-level threat, for some of the more dangerous commands you have to 'log-on' with the phone as the operator....I wonder if the phone could be fooled. Another way would be to impersonate a cell, have the user's phone register with the phony cell, and then intercept everything going through it, with a two-way forwarding system. I belive this has been done in analog cellular systems, on criminal investigations - not aware if so with GSM. Cheers, Mike > -----Mensaje original----- > De: A Grudko [mailto:agrudko@i...] > Enviado el: jueves, 21 de diciembre de 2000 11:10 > Para: TSCM-L@egroups.com > Asunto: [TSCM-L] Voicemail hacking - and SMS > > > ----- Original Message ----- > From: Charles P > We have recently encountered two clients with cases of > voicemail hacking. > > Very interesting. We have seen cases of voicemail 'theft' or > 'copying' from > our cellphone system, because as Charles highlights, some people don't use > passwords or fail to set up their voice mail. > > All our cellular phones are on the GSM system, operated by 2 > networks, which > offer almost identical services. Both have similar voicemail > characteristics > in that; > > 1. If you have voicemail set up without a new password (it defaults to a > 1-1-1-1 password) anyone can dial your collection number and retrieve your > messages > > 2. The default setting is to store erase the message after > collecting unless > you select auto delete. The latter is better because if people > tell you they > left a message and you didn't get it you might suspect that > someone else is > collecting them. > > 3. If you do not set up a mailbox for your number someone else > can, and then > collect any messages left for you. If you don't want voicemail > either set it > up and never collect (Send yourself a bunch of dissemination and > fill it up, > "Monica, this is Bill....if you come to the Oral Office we can share a > cigar). > > I also have a question. > > I don't know if US cellphones have Short Message System (SMS) . > Anyway, can > SMS be hacked? Our networks say 'impossible' but that's what people said > about the citizens of the US voting ANOTHER Bush as President. > > Andy Grudko. D.P.M., Grad I.S, (S.A.) > CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & > intelligence > Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - > Australia - Israel - Bosnia. Agents in 41 countries - > www.grudko.com - (+27 > 11) 465 9673 - 465 1487 (Fax) - Est. 1981 > GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA > Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom > "When you need it done right - first time" > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2145 From: Robert G. Ferrell Date: Thu Dec 21, 2000 11:29am Subject: RE: Am I paranoid? >I'm afraid you don't qualify as paranoid - I think we'll have to turn our cars >into Faraday cages So this whole thing might lead to the revival of the Pontiac Tempest, eh? ;-) RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2146 From: t lovato Date: Thu Dec 21, 2000 8:54am Subject: Re: Am I paranoid? I see a large demand for, "low-tech", looming on the horizon. A Grudko wrote: Interesting - Original message from: > Sue Sarkis > PI 6564 > Sarkis Detective Agency > (818) 242-2505 > > 'Big Brother' Could Soon Ride Along in Back Seat > > A New York highway agency is tracking cars that have electronic tollbooth > tags for the latest on travel speeds and traffic jams. > > In the Washington region, transportation officials want to monitor drivers > talking on cell phones as they drive the Capital Beltway as a way of > measuring congestion. > > And an Alabama-based company has developed equipment that "sniffs" passing > cars to identify which radio stations motorists have chosen. > > These "intelligent transportation systems," as they've been named, may > help solve traffic problems and be a boon to marketers, but they also > raise fear of a new threat to privacy: the idea that drivers could soon be > leaving electronic footsteps whenever they leave home. > > "We could end up with an utterly pervasive monitoring of travelers' > movements," warned Phil Agre, a professor of information studies at the > University of California at Los Angeles. > > While the public has begun to confront the hazards posed by unfettered > access to information about individuals' medical profiles and Internet > use, privacy advocates say there is still little recognition of the newest > frontier: travel and location information. > > "We are moving toward a surveillance society. Soon, government and private > industry, often working in concert, will have the capability to monitor > our every movement," said Barry Steinhardt, associate director of the > American Civil Liberties Union. "While the technology is growing at light > speed, the law that governs how the data can be used is developing at the > speed of tortoises." > > At a time when traffic is outpacing efforts to expand highways, new > technologies promise a once unimagined ability to manage rush hour, > respond instantly to crashes and eliminate backups at tollbooths. They > also offer police new tools to catch scofflaws such as red-light runners > and locate witnesses, and they provide businesses with immensely > profitable ways to reach prospective customers. > > Electronic toll programs, such as E-ZPass in the Northeast and the Dulles > Toll Road's Smart Tag, are often linked to individuals' credit card > accounts and are compiling ever more data about when and where specific > drivers are traveling. Transit "smart cards" collect similar information > about riders. > > Cameras are increasingly being used to snap photos of cars that run red > lights, evade paying tolls and speed. Closed-circuit television cameras > for monitoring highway traffic continue to proliferate and, as their > resolution improves, could be combined with an evolving technology that > automatically matches individual occupants' faces to their driver's > license pictures. > > Automobile makers are introducing on-board navigation systems that allow > vehicles to be tracked, and technology is evolving for monitoring the > location of cell phones. Engineers predict that cars will soon be > manufactured with embedded transmitters that allow them to be tracked. > > The growing number of high-tech systems for tracking vehicles and > archiving information about their travel patterns "is unwittingly bringing > us closer than ever to the Orwellian vision of the ever-present Big > Brother," wrote analysts Bruce Abernethy and Andrew Kolcz in a recent > cover story for Traffic Technology International. > > "It's an issue of great concern," said Larry Leibowitz, chief executive of > Inductive Signature Technologies, who will be chairing a panel on privacy > this month sponsored by the Intelligent Transportation Society of America. > "It gives the government the ability to tell where you're sitting at > dinner." > > He said people should be concerned about whether their records would be > subpoenaed in divorce and other lawsuits, and about whether this > information would be exploited by overzealous police. > > A 1996 survey by Priscilla M. Regan, of George Mason University, found > that Americans overwhelmingly preferred that high-tech transportation > systems collect only anonymous information, such as overall traffic > counts. They cautiously accepted the collection of some personally > identifiable information, such as license plate numbers, but objected to > such measures as videotaping inside their cars. More than two-thirds were > worried about who would see the information. > > "If they start giving the information away for advertising or selling > it,that bothers me," Chuck Stievenart, 39, of Fredericksburg, Va., said > recently. "We get enough junk already. Now I'll probably be on someone > else's list for junk." > > Said Kimberly Hayek, 29, of Arlington: "As a single woman, I have to > worry. I have been stalked before. I figure I don't have any privacy. I > don't like it." > > The agencies and companies behind these high-tech systems say they use a > range of safeguards, including letting travelers choose whether to > participate. In San Antonio, for example, 53 automated readers arrayed > along city streets follow the progress of 60,000 cars with transponders. > > All the motorists are volunteers. > > Both officials of the Dulles Toll Road and the agencies that offer E-ZPass > used on highways, bridges and tunnels in six states from Massachusetts to > West Virginia ‚Äì say travelers can choose not to buy the tag and instead > pay cash at tollbooths. > > Some systems try to limit the amount of personally identifiable > information they collect. For instance, Transcom, a traffic management > organization, has set up automated roadside readers in the New York area > to track cars with E-ZPass tags. But tag numbers are scrambled so they > cannot be traced to their owners. > > Likewise, a spokesman for Mobiltrak, the Alabama company that developed > the radio "sniffer" system, said its purpose is to take a random sample of > passing cars and supply that general information to advertisers. He said > the equipment does not determine specifically which vehicle is tuned into > which station. But in low-traffic areas, it could be easier to identify > individual cars. > > A third safeguard used by some systems is the practice of collecting data > about large groups of vehicles rather than specific cars. Maryland and > Virginia officials developing the program to track cell phone use have > said, for instance, they will simply follow the energy pattern generated > by thousands of phones. They stressed that they will not be able to > monitor phone calls or identify specific callers. > > Some initiatives do not store the information at all. Transcom > officials, for instance, collect E-ZPass readings to remain abreast of > highway congestion but do not keep them. > > But other transportation agencies do store personal information, > especially those that bill travelers for using electronic payment such as > E-ZPass, Smart Tag and Chicago's I-Pass, as well as Metro's smart card. > These agencies assure their customers that the data are not provided or > sold to businesses and only released under subpoena or court order except > in emergencies. > > Police have turned to E-ZPass records several dozen times. In the most > celebrated case, investigators probing the kidnapping of New Jersey > millionaire Nelson Gross, a former state Republican chairman, used E-ZPass > information in 1997 to track his BMW across the George Washington Bridge. > His car was found in Manhattan, and his battered body was soon discovered > nearby. > > Agencies and companies developing these high-tech systems have repeatedly > guaranteed that measures for easing traffic will not be merged with those > for policing, such as red-light cameras and photo enforcement of > speed limits. They fear motorists will reject programs such as electronic > toll systems and traffic cameras if they believe these will be used to > issue tickets. > > Indeed, the deployment of red-light cameras, for instance, has met with > decidedly mixed reviews, including in Virginia. Gov. James S. Gilmore > III(R) cited privacy concerns in vetoing a bill that would have expanded > their use beyond Arlington and Fairfax counties. > > The trepidation is not universal. "It's not like they're getting your DNA > or your medical records. You're in your car, and you're in public," said > Chris Wingo, 28, of Northwest Washington. > > Others want a say over how the information is used. "There's so many > unknowns with this new burst of the information age," said Leslie Honing, > 35, of Arlington. "I feel like I need some control over that." > > Privacy advocates insist that Congress set some legal parameters. > > Regan, of GMU, said laws alone are not enough. Limits on collecting and > archiving individual information must be built into the systems themselves: > > "Once you've collected the information, you're continually trying to keep > it under wraps, and there's constant pressure to let it out." eGroups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS Agent_Lovato --------------------------------- Do You Yahoo!? Yahoo! Shopping - Thousands of Stores. Millions of Products. [Non-text portions of this message have been removed] 2147 From: James M. Atkinson, Comm-Eng Date: Fri Dec 22, 2000 0:07am Subject: Eyes Only: Espionage Museum Planned for D.C. Eyes Only: Espionage Museum Planned for D.C. http://www.washingtonpost.com/wp-dyn/articles/A34486-2000Dec20.html By Paul Farhi Washington Post Staff Writer Thursday, December 21, 2000; Page C01 Fans of the spy game will be stirred, not shaken by the news: A Cleveland-based company said yesterday it intends to open "the largest permanent exhibit dedicated to the history of espionage" in downtown Washington by the spring of 2002. The firm, Malrite Co., intends to house the International Spy Museum in 58,000 square feet of renovated space near the National Portrait Gallery at Eighth and F streets NW. The tourist-friendly project has the endorsement of the D.C. Council (and $6.9 million in city loans), plus an advisory board packed with historians and former spooks from both sides of the Wall. It's now in the process of pulling together exhibits from a 600-piece collection of spy memorabilia. Why a spy museum? "Spying has a resonance, a mystique about it," says Dennis Barrie, a former Smithsonian curator and founding director of the Rock and Roll Hall of Fame, who's heading the effort. "We want to peel away that surface. . . . We intend to give a historical perspective, but we also want to immerse people in a sense of time and space." Think Berlin, circa 1962. Or Bletchley Park, 1942, as British code breakers rushed to crack the German Enigma codes. Think Claus Fuchs, Kim Philby, Aldrich Ames. You could also think Bond, James Bond; the museum intends to acknowledge the influence of fake spies on the real ones at the CIA and KGB. Spying -- or at least a museum about it -- might even be a good business, Malrite thinks. Unlike most museums in Washington, the privately owned project will be a for-profit venture. Visitors will be charged admission (about $8). Malrite, which is supplying most of the financing for the $28 million project, thinks it can attract 500,000 people a year, about what the National Portrait Gallery draws in a good year. In addition to the exhibits, there will be a themed restaurant and cafe, a spy-stuff store and a role-playing game called "Spy Adventure." Some details remain, shall we say, top secret. At the moment, the most visible thing about the museum is its logo depicting a shadowy, trench-coated figure. Other than an original Enigma machine, the company isn't saying precisely which objects will be on display. Some of the items will be on loan from H. Keith Melton, an espionage-artifacts collector, historian and technical adviser on the project. "The general public really has no idea about real spying," says Melton. "Unfortunately, they've seen too many Oliver Stone movies and think the CIA's a big shooting gallery where they train assassins. . . . We want to show how the world we live in has been crafted through the work of spies." There are at least two museums of spying in America, but you have to know the password to get into them. Melton, who has a 6,000-piece collection of spy stuff, maintains a private museum in South Florida that visitors can see by invitation only. The CIA also has a small museum at its headquarters, but you have to be a CIA employee or have connections to get in. The CIA has been kept abreast of the Malrite project, but has not officially endorsed it, spokesman Mark Mansfield said yesterday. The project did, however, involve an actual CIA employee -- Carlos D. Davis, the chairman of the CIA's Fine Arts Commission (who knew?), who acted as a private consultant. The idea for a spy museum was hatched four years ago in, of all places, Cleveland. Broadcasting mogul Milton Maltz, the founder of Malrite, had been involved with the development of that city's Rock and Roll Hall of Fame, and sought to develop other specialty museums. His development company was formed after he sold off his portfolio of 35 radio and TV stations in 1996 and 1997. Originally, Maltz wasn't sure what kind of museum to develop. So he gathered together designers and finance people to brainstorm. It was Maltz, a former code breaker with the National Security Agency, who came up with the idea of a museum dedicated to spying, Barrie says. The next question was where to put it. Cleveland wasn't exactly a logical first choice. London, Berlin and Moscow seemed more natural locales, although each presented logistical or business impediments. The obvious default location: Washington. Says Barrie, "This is a great espionage town." © 2000 The Washington Post Company -- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= 2148 From: William Knowles Date: Fri Dec 22, 2000 2:03am Subject: CIA's Tree: Some Kind of Secret http://www.wired.com/news/politics/0,1283,40796,00.html Reuters 1:40 p.m. Dec. 21, 2000 PST LANGLEY, Virginia -- The hottest holiday party at CIA headquarters is put on by the masters of spy gadgetry who use Christmas ornaments to display the latest technology. It's not cameras in cigarette lighters anymore, but the tree at the Office of Technical Service party this year would thrill even fans of the fictional "Q" who produced pens that could fire bullets and cars that could swim for British agent James Bond. A manager identified only as Robert, for security reasons as he is still undercover, says step closer to the conifer bedecked with ordinary looking lights, ornaments and a star. The butterfly ornament is actually thin silver metallic wings attached to a small piece of circuit board. A piece of wire changes shape with the temperature and moves the wings up and down; the technology is useful to move tiny items. Bird ornaments chirp if a light is shone or they are touched on a certain spot on their heads. A dragonfly ornament's wings move at hummingbird speed when the tree lights are clear. The wings are made of sheer material that could be used to construct a microphone that would be almost impossible to detect. And if you put on a pair of special cardboard glasses, the words "happy holidays" appear dancing around the star, showing off a way to conceal messages. The Office of Technical Service holiday party has been a staple at the CIA for 25 years and this year's hottest item was LED lights that operate on far less power than regular lights. If made infrared, they could for example flood a landing zone detectable only with night-vision equipment. A big potted plant was adorned with a string of 250 small red bulbs that used the power of just one eight-watt Christmas tree light, lasting up to 100,000 hours. The hosts wouldn't discuss devices currently in use in the field, stating only that efforts were always being made to produce things that used less power and were smaller and lighter. But some things never change. The most fun gadgets Robert said he has seen are miniature cameras in a variety of concealment devices. "It's remarkable what you can put a camera inside and the device still works," Robert said. He would not, however, divulge what the agency currently is using. One thing that has changed, however, is the camera-in-the-cigarette-lighter of Bond's heyday. "A camera in a lighter was great 30 years ago because everybody carried a cigarette lighter. Who carries a cigarette lighter today?" Robert said. But as one might expect, even the Christmas party at the U.S. spy agency office had to be undercover, with a reporter allowed in only after revelers had departed. The 350-pound speakers that can produce sound equal to a woofer 50-feet in diameter were still belting out crisp tunes. A spy-style laser light show illuminated the empty dance floor. And on a screen the CIA seal in laser lights looked three-dimensional as it rotated. One straggler with perky short brown hair and black-frame glasses snapped into a sandy-haired corporate type by shedding her disguise. Agents in the field can don a new look in two minutes, she said. Two robots wandered the hall, under remote control, but more for effect than as an example of real use in the field. "Our business is to enable a human being to do operations. We're not in remote stuff," Robert said. But even agency operatives seemed to have something in common with office partyers nationwide -- there wasn't much food or drink left lying around. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 2149 From: James M. Atkinson, Comm-Eng Date: Fri Dec 22, 2000 10:16am Subject: I hope to work on my short game over the holiday - Golf Humor Two guys are approaching the 12th green on the golf course when suddenly a funeral procession appears, on the road right outside the course. As the hearse approaches one of the golfers removes his cap and stares solemnly. The procession moves on, the golfer puts his cap back on, and pulls his putter out of his bag. "That," says his partner, "was one of the nicest, most respectful things I have ever seen." "Yeah," says the first guy, lining up his putt, "we would've been married 33 years next Wednesday." -jma -- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= 2150 From: James M. Atkinson, Comm-Eng Date: Fri Dec 22, 2000 11:14am Subject: Why PC's make good boat anchors... Since I use PC's, Mac, SGI/IRIX, HP, and Solaris machines on a daily basis I can relate to all of the following comments about the "pain-in-the-ass" Bill's Gates little creation has become. -jma At a recent computer expo (COMDEX), Bill Gates reportedly compared the computer industry with the auto industry and stated: "If GM had kept up with technology like the computer industry has, we would all be driving twenty-five dollar cars that got 1000 miles to the gallon." In response to Bill's comments, General Motors issued a press release stating(by Mr Welch himself): If GM had developed technology like Microsoft, we would all be drivingcars with the following characteristics: 1. For no reason whatsoever your car would crash twice a day. 2. Every time they repainted the lines on the road you would have to buy a new car. 3. Occasionally your car would die on the freeway for no reason, and you would just accept this, restart and drive on. 4. Occasionally, executing a maneuver such as a left turn, would cause your car to shut down and refuse to restart, in which case you would have to reinstall the engine. 5. Only one person at a time could use the car, unless you bought"Car95" or "CarNT." But then you would have to buy more seats. 6. Macintosh would make a car that was powered by the sun, reliable, five times as fast, and twice as easy to drive, but would only run on five per cent of the roads. 7. The oil, water temperature and alternator warning lights would be replaced by a single "general car default" warning light. 8. New seats would force everyone to have the same size butt. 9. The airbag system would say "Are you sure?" before going off. 10. Occasionally, and for no reason whatsoever, your car would lock you out and refuse to let you in until you simultaneously lifted the door handle, turned the key, and grab hold of the radio antenna. 11. GM would require all car buyers to also purchase a deluxe set of Rand McNally road maps (now a GM subsidiary), even though they neither need them nor want them. Attempting to delete this option would immediately cause the car's performance to diminish by 50% or more. Moreover, GM would become a target for investigation by the Justice Department. 12. Every time GM introduced a new model car buyers would have to learn how to drive all over again because none of the controls would operate in the same manner as the old car. 13. You'd press the "start" button to shut off the engine. -- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= 2151 From: James M. Atkinson, Comm-Eng Date: Fri Dec 22, 2000 11:21am Subject: Merry Christmas, Happy Holidays, and Seasons Greetings!!! Merry Christmas, We would like to extend a holiday greeting to all of our friends, customers, subscribers, and associates. We wish you and your family a very Merry Christmas and a Happy and Joyous New Year. "There are two ways of spreading light: to be the candle or the mirror that reflects it." - Edith Wharton It is my hope that though my mailing lists, web site, articles, white papers, and so on we have been to do a little of both for the TSCM committee. -jma James M. Atkinson President and Senior Engineer ==================================================== ...and now for the obligatory Rum Cake Recipe: Granite Island Group Rum Cake Recipe (be sure to read VERY carefully) = 2 qts rum 1 cup butter 1 tsp sugar 2 large eggs 1 cup dried fruit 2 tsp baking powder 1 tsp soda 1 tsp lemon juice 1 cup brown sugar 2 cups walnuts = Before you start, sample the rum to check for quality. Good, isn't it. Now go ahead, Select a large mixing bowl, measuring cup etc. Check rum again. It must be just right. To be sure the rum is of the highest quality, pour one level cup of rum into a glass & drink it as fast as you can. Repeat. With a electric mixer beat one cip of butter in a large fluffy bowl. Add 1 seaspoon of thugar & beat again. Meanwhile, make sure that the rum is still good. Try another cup. Open a second quart if necessary. Add 2 arge leggs, 2 cups fried druit & beat till high. If druit gets stuck in beater, just pry it loose with a drewscriver. Sample the rum again, checking for sonscistici. Next sift 3 cups of pepper or salt (it really doesn't matter). Sample the plum again. Sift a half pint of lemon juice. Fold in chopped butter & strained nuts. Add 1 babblespoon of brown thugar or whatever colour you can find. Wix smell. Grease oven & turn snake pan to 350 greden. Now pour the whole mess in the doven & hake. Check the rum again & go to bed.. Enjoy, and have a happy holiday ==================================================== PROVERBS FOR THE MILLENNIUM 1. Home is where you hang your @. 2. The e-mail of the species is more deadly than the mail. 3. A journey of a thousand sites begins with a single click. 4. You can't teach a new mouse old clicks. 5. Great groups from little icons grow. 6. Speak softly and carry a cellular phone. 7. C:\ is the root of all directories. 8. Oh, what a tangled web site we weave when first we practice. 9. Pentium wise, pen and paper foolish. 10. The modem is the message. 11. Too many clicks spoil the browse. 12. The geeks shall inherit the earth. 13. There's no place like . 14. Don't byte off more than you can view. 15. Fax is stranger than fiction. 16. What boots up must come down. 17. Windows will never cease. 18. Virtual reality is its own reward. 19. Modulation in all things. 20. Give a man a fish and you feed him for a day; Teach him to use the Net and he won't bother you for weeks. -jma -- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= [Non-text portions of this message have been removed] 2152 From: James M. Atkinson, Comm-Eng Date: Fri Dec 22, 2000 11:23am Subject: Twas The Night Before Christmas 'Twas The Night Before Christmas (as written by a defense contractor) 'Twas the nocturnal segment of the diurnal period preceding the annual Yuletide celebration, and throughout our place of residence, kinetic activity was not in evidence among the possessors of this potential, including that species of domestic rodent known as Mus musculus. Hosiery was meticulously suspended from the forward edge of the wood burning caloric apparatus, pursuant to our anticipatory pleasure regarding an imminent visitation from an eccentric philanthropist among whose folkloric appellations is the honorific title of St. Nicholas. The prepubescent siblings, comfortably ensconced in their respective accommodations of repose, were experiencing subconscious visual hallucinations of variegated fruit confections moving rhythmically through their cerebrums. My conjugal partner and I, attired in our nocturnal head coverings, were about to take slumberous advantage of the hibernal darkness when upon the avenaceous exterior portion of the grounds there ascended such a cacophony of dissonance that I felt compelled to arise with alacrity from my place of repose for the purpose of ascertaining the precise source thereof. Hastening to the casement, I forthwith opened the barriers sealing this fenestration, noting thereupon that the lunar brilliance without, reflected as it was on the surface of a recent crystalline precipitation, might be said to rival that of the solar meridian itself - thus permitting my incredulous optical sensory organs to behold a miniature airborne runnered conveyance drawn by eight diminutive specimens of the genus Rangifer, piloted by a minuscule, aged chauffeur so ebullient and nimble that it became instantly apparent to me that he was indeed our anticipated caller. With his ungulate motive power travelling at what may possibly have been more vertiginous velocity than patriotic alar predators, he vociferated loudly, expelled breath musically through contracted labia, and addressed each of the octet by his or her respective cognomen - "Now Dasher, now Dancer..." et al. - guiding them to the uppermost exterior level of our abode, through which structure I could readily distinguish the concatenations of each of the 32 cloven pedal extremities. As I retracted my cranium from its erstwhile location, and was performing a 180-degree pivot, our distinguished visitant achieved - with utmost celerity and via a downward leap - entry by way of the smoke passage. He was clad entirely in animal pelts soiled by the ebony residue from oxidations of carboniferous fuels which had accumulated on the walls thereof. His resemblance to a street vendor I attributed largely to the plethora of assorted playthings which he bore dorsally in a commodious cloth receptacle. His orbs were scintillant with reflected luminosity, while his submaxillary dermal indentations gave every evidence of engaging amiability. The capillaries of his malar regions and nasal appurtenance were engorged with blood which suffused the subcutaneous layers, the former approximating the coloration of Albion's floral emblem, the latter that of the Prunus avium, or sweet cherry. His amusing sub- and supralabials resembled nothing so much as a common loop knot, and their ambient hirsute facial adornment appeared like small, tabular and columnar crystals of frozen water. Clenched firmly between his incisors was a smoking piece whose grey fumes, forming a tenuous ellipse about his occiput, were suggestive of a decorative seasonal circlet of holly. His visage was wider than it was high, and when he waxed audibly mirthful, his corpulent abdominal region undulated in the manner of impectinated fruit syrup in a hemispherical container. He was, in short, neither more nor less than an obese, jocund, multigenarian gnome, the optical perception of whom rendered me visibly frolicsome despite every effort to refrain from so being. By rapidly lowering and then elevating one eyelid and rotating his head slightly to one side, he indicated that trepidation on my part was groundless. Without utterance and with dispatch, he commenced filling the aforementioned appended hosiery with various of the aforementioned articles of merchandise extracted from his aforementioned previously dorsally transported cloth receptacle. Upon completion of this task, he executed an abrupt about-face, placed a single manual digit in lateral juxtaposition to his olfactory organ, inclined his cranium forward in a gesture of leave-taking, and forthwith effected his egress by renegotiating (in reverse) the smoke passage. He then propelled himself in a short vector onto his conveyance, directed a musical expulsion of air through his contracted oral sphincter to the antlered quadrupeds of burden, and proceeded to soar aloft in a movement hitherto observable chiefly among the seed-bearing portions of a common weed. But I overheard his parting exclamation, audible immediately prior to his vehiculation beyond the limits of visibility: "Ecstatic Yuletide to the planetary constituency, and to that self same assemblage, my sincerest wishes for a salubriously beneficial and gratifyingly pleasurable period between sunset and dawn." -jma -- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= 2153 From: James M. Atkinson, Comm-Eng Date: Fri Dec 22, 2000 11:24am Subject: Official Granite Island Group Drinking Guide for New Year Eve 2000 Official Granite Island Group Drinking Guide for New Year Eve 2000 SYMPTOM: Feet cold and wet. FAULT: Glass being held at incorrect angle. ACTION: Rotate glass so that open end points toward ceiling. SYMPTOM: Beer unusually pale and tasteless. FAULT: Glass empty. ACTION: Get someone to buy you another beer. SYMPTOM: Opposite wall covered with fluorescent lights. FAULT: You have fallen over backward. ACTION: Have yourself lashed to bar. SYMPTOM: Mouth contains cigarette butts. FAULT: You have fallen forward. ACTION: See above. SYMPTOM: Beer tasteless, front of your shirt is wet. FAULT: Mouth not open, or glass applied to wrong part of face. ACTION: Retire to restroom, practice in mirror. SYMPTOM: Feet warm and wet. FAULT: Improper bladder control. ACTION: Stand next to nearest dog, complain about her house training. SYMPTOM: Floor blurred. FAULT: You are looking through bottom of empty glass. ACTION: Get someone to buy you another beer. SYMPTOM: Floor moving. FAULT: You are being carried out. ACTION: Find out if you are being taken to another bar. SYMPTOM: Room seems unusually dark. FAULT: Bar has closed. ACTION: Confirm home address with bartender. SYMPTOM: Taxi suddenly takes on colorful aspect and textures. FAULT: Beer consumption has exceeded personal limitations. ACTION: Cover mouth Happy New Year, -jma -- ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= 2154 From: Date: Fri Dec 22, 2000 8:47am Subject: Nearly undetectable tracking device raises concern Nearly undetectable tracking device raises concern By Stefanie Olsen Staff Writer, CNET News.com July 12, 2000, 2:05 p.m. PT URL: http://news.cnet.com/news/0-1007-200-2247960.html A widely used, yet virtually undetectable, means of tracking people's Internet surfing habits is joining its better-known cousin, the cookie, as the subject of several lawsuits and a privacy initiative by the government. The technology, often called Web bugs or 1-pixel gifs, is prompting further concern that the once-freewheeling Web is becoming more like an Orwellian Big Browser. Like cookies, Web bugs are electronic tags that help Web sites and advertisers track visitors' whereabouts in cyberspace. But Web bugs are invisible on the page and are much smaller, about the size of the period at the end of this sentence. A Web bug "is like a beacon, so that every time you hit a Web page it sends a ping or call-back to the server saying 'Hi, this is who I am and this is where I am,'" said Craig Nathan, chief technology officer for privacy start-up Meconomy.com and former technical liaison for Personify. Most computers have cookies, which are placed on a person's hard drive when a banner ad is displayed or a person signs up for an online service. Savvy Web surfers know they are being tracked when they see a banner ad. But people can't see Web bugs, and anti-cookie filters won't catch them. So the Web bugs wind up tracking surfers in areas online where banner ads are not present or on sites where people may not expect to be trailed. That was the case last month when the White House ordered its drug policy office to stop using Web bugs on the government's anti-drug site Freevibe.com. Following the mandate, the Clinton administration issued strict new rules regulating federal use of the technology, which can surreptitiously collect personal information. Web bugs can "talk" to existing cookies on a computer if they are both from the same Web site or advertising company, such as DoubleClick, which uses bugs and dominates the online advertising market. That means, for example, that if a person visited Johnson & Johnson's YourBaby Web site, which uses DoubleClick Web bugs, the bug would read the visitor's DoubleClick cookie ID number, which shows the past online behavior for that computer. The information would then go back to DoubleClick. Ad networks and agencies say cookies and other tracking devices are used to help both consumers and Web sites. Under fire from privacy advocates, ad executives have consistently said the information collected is kept private and is the sole property of the company that is being advertised. The "evil" of Web bugs But privacy advocates see an insidious side to the tiny tag. "The danger of that is that if you were going to a site on yeast infections, the second it loads up, before the screen loads, somewhere in the world the fact that you visited the site is now registered. That's the evil of Web bugs," said Ira Rothken, a lawyer at the technology-oriented Rothken Law Firm, based in San Rafael, Calif. The problem is magnified, he said, when a company can tie your cookie number to personal identifying information such as a phone number and address. This became a real concern last November when DoubleClick bought Abacus Direct, a company that holds detailed consumer profiles on more than 90 percent of U.S. households. Syncing DoubleClick's database about Net surfers with personally identifiable data set off a firestorm of criticism, as well as a government inquiry. DoubleClick has since dropped plans to link the databases until there is agreement between government and the industry on appropriate standards. "Web bugs were developed to not let you know (you're being tracked) and for the simple design aspect of an invisible dot," Nathan said. Rothken filed a consumer Internet privacy suit against DoubleClick in February, and there are three other similar suits against the ad network. Also in February, the state attorney general in Michigan began legal proceedings against DoubleClick. The attorney general claimed the company had violated consumer protection laws by not telling Web visitors that DoubleClick regularly put cookies and Web bugs on their hard drives. The other side of the coin is that Web bugs, like cookies, can be useful. For consumers, cookies can store passwords and other sign-on information. For Web sites, Web bugs can help better manage content by knowing what is effective. They also give online ad agencies a way to track campaigns when a banner isn't present. Bang for their advertising buck "Using traffic-log cookies or clear gifs is a way for advertisers to learn whether they're getting the most bang for their advertising dollar," said Jules Polonetsky, chief privacy officer at DoubleClick. "It's a tool that does not provide any personal information but allows the Web site to learn how users are visiting different areas of their site and learn which ads brought them to their site. "We are contractually obligated to maintain that information solely for the use of the site; it's critically private information," Polonetsky said. Web bugs have sparked much criticism from Net experts of late. Online privacy Richard Smith, a computer security expert, said that a wide variety of medical and pornography sites are using the tags. He said there are Web bugs on such sites as Procrit, which has information about AIDS drugs, and iFriends.net, an online version of an adult peep show. Smith has set up a Web site that searches for Web bugs. A quick search on that site for such bugs issued by DoubleClick, for example, returned more than 80,000 hits. Web bugs can also be used in email. For example, companies can send a bulk HTML email newsletter that has Web bugs, which will determine how many people read the letter, how often they read it, and whether they forward it to anyone. The email "would include your email address in the URL or include a coded ID or encrypted email address to track when you opened it," Smith said. "Web bugs are like carbon monoxide for Internet privacy," said Jason Catlett, a privacy advocate with Junkbusters. "You can't see them, but they can damage your privacy anyway." 2155 From: Date: Fri Dec 22, 2000 1:10pm Subject: Dear Abby - humor Dear Abby, I am a crack dealer in New Jersey who has recently been diagnosed as a carrier of the HIV virus. My parents live in the suburb of Philadelphia and one of my sisters, who lives in Bensenville, is married to a transvestite. My father and mother have recently been arrested for growing and selling marijuana and are currently dependent on my other two sisters, who are prostitutes in Jersey City. I have two brothers, one who is currently serving a non-parole life sentence in Attica for rape and murder of a teenage boy in 1994. The other brother is currently being held in the Wellington Remand Center on charges of incest with his three children. I have recently become engaged to marry a former Thai prostitute who lives in the Bronx and indeed is still a part-time "working girl" in a brothel. However her time there is limited, as we hope to open our own brothel with her as the working manager. I am hoping my two sisters would be interested in joining our team. Although I would prefer them not to prostitute themselves, at least it would get them off the street, and hopefully the heroin. My problem is this: I love my fiance and look forward to bringing her into the family and of course I want to be totally honest with her. Should I tell her about my cousin who voted for Gore? Signed, Worried About My Reputation Ken Unsubscribe: TSCM-L-unsubscribe@egroups.com 2156 From: Date: Fri Dec 22, 2000 8:50pm Subject: Recommended: "Smile! You're on hidden camera" ------------------------------------------------------------------------- MACCFound@a... has recommended this article from The Christian Science Monitor's electronic edition. Interesting! ------------------------------------------------------------------------- Click here to email this story to a friend: http://www.csmonitor.com/cgi-bin/send-story?2000/12/22/text/p1s3.txt Click here to read this story online: http://www.csmonitor.com/durable/2000/12/22/fp1s3-csm.shtml Headline: Smile! You're on hidden camera Byline: Alexandra Marks Date: 12/22/2000 (NEW YORK)A Manhattan restaurateur thinks an employee is dipping into the till. Behind a crack in the brick facade - a little bigger than a pinhole - he installs a tiny camera with a wide-angle lens. An estranged husband wants to know who's visiting his wife's home. He puts a camera in a soccer ball and plants it in the bushes out front. Money disappears from a businessman's accounting room. He installs a smoke detector with a camera inside and discovers his wife is the one doing the pilfering. Welcome to the brave new video world, where the clock on the mantel or your neighbor's tie could easily hide a camera. In 1999, 125,000 "spy" cameras were sold in New York alone, more than triple the year before. Public use of surveillance cameras, almost unheard of a few years ago, has skyrocketed. Chicago is about to join other major cities, like Miami, Atlanta, and New York, that are giving police an extra set of eyes. Run that red light, and thanks to a hidden camera, you may get a ticket in the mail a month from now. "People should know they are being watched, and there's no getting away with anything anymore," says Arielle Jamil, of the Counter Spy Shop in New York, one of the world's leading sellers of surveillance equipment. "Big brother is definitely watching more than people think." Advocates note that cameras are inexpensive and effective crime-prevention tools. Britain, with 1.5 million closed-circuit TVs that track people from Mayfair to Trafalgar Square, is an undisputed world leader in surveillance. Studies there show the all-seeing eyes do cut crime. In 1998, after cameras were installed in one neighborhood, pickpocketing dropped 44 percent, and street crime by 20 percent. But experts contend that the trouble just moves around the corner. And as the camera craze picks up momentum in America, with 1 million cameras nationwide, critics contend that "video voyeurism" raises new questions about privacy. When you walk down the street, do you have a right to know if the police or the local deli owners are watching you? The rule of thumb has always been that, if you can see it from the street, it's fair game. But what about in your office? Or in the restaurant where you're eating? Or in your car as you're driving? "The explosion of video surveillance cameras around America has taken place without any public discussion about the pros and cons," says Norman Siegel of the New York Civil Liberties Union. While there are strict rules defining when a person may audiotape a conversation, that's not the case with video taping. Currently, the courts use the "expectation of privacy" standard. In other words, it's illegal to videotape where a person believes he or she has a right to privacy, such as a bathroom or a locker room. But what about in a fitting room or a hotel room? One hotel chain, in an effort to catch a maid suspected of stealing, reportedly planted hidden cameras in a room. When they saw her trying on a guest's negligee, she was let go. But what about the guest? "I don't think the general public has any idea about the pervasiveness, and that certainly plays into the calculation of what is an expectation of privacy," says Leslie Reis, interim director of the Center for Information Technology and Privacy Law at the John Marshall Law School in Chicago. "The courts have been struggling to figure out whether technology has been changing those expectations." Both Mr. Siegel and Ms. Reis agree that once people step outside their doors, they do forfeit their right to privacy. But the issue becomes less clear as technology becomes more intrusive. Siegel also contends that, even in a public place, there should be a right to be "anonymous" - to associate with whomever, without worrying about who's keeping an archive of your actions. Privacy activists agree, and want legal protections to be sure the police and others do not misuse the tapes they're collecting. "The courts have been very good in protecting people's constitutional rights when it involves audio surveillance and wiretaps, but cowards when it comes to video surveillance," says Bill Brown, a privacy activist. At a recent demonstration in Times Square, where 129 surveillance cameras capture the daily commotion, Mr. Brown stood on the corner of 47th and Broadway, where a camera operated by "Earthcam.com" allows anyone in the world with a computer and a modem to eavesdrop. "This camera isn't protecting anyone, it's used for voyeurism, plain and simple," says Brown. In New York, one study estimates that a person is filmed an average of 73 times a day as they wander by the more than 2,400 cameras that hang from offices, apartments, and storefronts. New York's Civil Liberties Union is lobbying for at least some kind of regulation. They'd like to see all surveillance cameras listed on a public register, warning signs to alert people they're being filmed, strict rules about who gets access to surveillance tapes, and limits on how long they can be kept around. Siegel is the first to admit that surveillance cameras can be helpful in fighting crime. He just wants to make sure the public is aware of the increasing use of cameras and that no one's rights are violated. The spike in covert camera sales started four years ago, with the trial of British nanny Louise Woodward, who was convicted of manslaughter in the death of a Massachusetts infant. "Most cameras are used for more than security purposes; they're there for peace of mind," says Ms. Jamil. "A lot of people want to see what's going on in their home when they're not there - especially if they have kids." Few would challenge a parent's right to protect their children. But some privacy experts worry about the impact of the all-seeing eyes. "It's a disturbing trend, bringing up children with the consciousness that they're going to be watched no matter what they do," says Jodi Beebe of the Privacy Rights Clearing House in San Diego. "I don't know what the impact is, but I do think we need to talk about it." (c) Copyright 2000 The Christian Science Monitor. All rights reserved. Click here to email this story to a friend: http://www.csmonitor.com/cgi-bin/send-story?2000/12/22/text/p1s3.txt The Christian Science Monitor-- an independent daily newspaper providing context and clarity on national and international news, peoples and cultures, and social trends. Online at http://www.csmonitor.com Click here to order a free sample copy of the print edition of the Monitor: http://www.csmonitor.com/advertising/order_page.html 2157 From: Date: Fri Dec 22, 2000 3:55pm Subject: Smile! You're on hidden camera USA Smile! You're on hidden camera With a million covert cameras in the US, is there any expectation of privacy anymore? By Alexandra Marks (marksa@c...) Staff writer of The Christian Science Monitor NEW YORK A Manhattan restaurateur thinks an employee is dipping into the till. Behind a crack in the brick faÁade - a little bigger than a pinhole - he installs a tiny camera with a wide-angle lens. An estranged husband wants to know who's visiting his wife's home. He puts a camera in a soccer ball and plants it in the bushes out front. Money disappears from a businessman's accounting room. He installs a smoke detector with a camera inside and discovers his wife is the one doing the pilfering. Welcome to the brave new video world, where the clock on the mantel or your neighbor's tie could easily hide a camera. In 1999, 125,000 "spy" cameras were sold in New York alone, more than triple the year before. Public use of surveillance cameras, almost unheard of a few years ago, has skyrocketed. Chicago is about to join other major cities, like Miami, Atlanta, and New York, that are giving police an extra set of eyes. Run that red light, and thanks to a hidden camera, you may get a ticket in the mail a month from now. "People should know they are being watched, and there's no getting away with anything anymore," says Arielle Jamil, of the Counter Spy Shop in New York, one of the world's leading sellers of surveillance equipment. "Big brother is definitely watching more than people think." Advocates note that cameras are inexpensive and effective crime-prevention tools. Britain, with 1.5 million closed-circuit TVs that track people from Mayfair to Trafalgar Square, is an undisputed world leader in surveillance. Studies there show the all-seeing eyes do cut crime. In 1998, after cameras were installed in one neighborhood, pickpocketing dropped 44 percent, and street crime by 20 percent. But experts contend that the trouble just moves around the corner. And as the camera craze picks up momentum in America, with 1 million cameras nationwide, critics contend that "video voyeurism" raises new questions about privacy. When you walk down the street, do you have a right to know if the police or the local deli owners are watching you? The rule of thumb has always been that, if you can see it from the street, it's fair game. But what about in your office? Or in the restaurant where you're eating? Or in your car as you're driving? "The explosion of video surveillance cameras around America has taken place without any public discussion about the pros and cons," says Norman Siegel of the New York Civil Liberties Union. While there are strict rules defining when a person may audiotape a conversation, that's not the case with video taping. Currently, the courts use the "expectation of privacy" standard. In other words, it's illegal to videotape where a person believes he or she has a right to privacy, such as a bathroom or a locker room. But what about in a fitting room or a hotel room? One hotel chain, in an effort to catch a maid suspected of stealing, reportedly planted hidden cameras in a room. When they saw her trying on a guest's negligee, she was let go. But what about the guest? "I don't think the general public has any idea about the pervasiveness, and that certainly plays into the calculation of what is an expectation of privacy," says Leslie Reis, interim director of the Center for Information Technology and Privacy Law at the John Marshall Law School in Chicago. "The courts have been struggling to figure out whether technology has been changing those expectations." Both Mr. Siegel and Ms. Reis agree that once people step outside their doors, they do forfeit their right to privacy. But the issue becomes less clear as technology becomes more intrusive. Siegel also contends that, even in a public place, there should be a right to be "anonymous" - to associate with whomever, without worrying about who's keeping an archive of your actions. Privacy activists agree, and want legal protections to be sure the police and others do not misuse the tapes they're collecting. "The courts have been very good in protecting people's constitutional rights when it involves audio surveillance and wiretaps, but cowards when it comes to video surveillance," says Bill Brown, a privacy activist. At a recent demonstration in Times Square, where 129 surveillance cameras capture the daily commotion, Mr. Brown stood on the corner of 47th and Broadway, where a camera operated by "Earthcam.com" allows anyone in the world with a computer and a modem to eavesdrop. "This camera isn't protecting anyone, it's used for voyeurism, plain and simple," says Brown. In New York, one study estimates that a person is filmed an average of 73 times a day as they wander by the more than 2,400 cameras that hang from offices, apartments, and storefronts. New York's Civil Liberties Union is lobbying for at least some kind of regulation. They'd like to see all surveillance cameras listed on a public register, warning signs to alert people they're being filmed, strict rules about who gets access to surveillance tapes, and limits on how long they can be kept around. Siegel is the first to admit that surveillance cameras can be helpful in fighting crime. He just wants to make sure the public is aware of the increasing use of cameras and that no one's rights are violated. The spike in covert camera sales started four years ago, with the trial of British nanny Louise Woodward, who was convicted of manslaughter in the death of a Massachusetts infant. "Most cameras are used for more than security purposes; they're there for peace of mind," says Ms. Jamil. "A lot of people want to see what's going on in their home when they're not there - especially if they have kids." Few would challenge a parent's right to protect their children. But some privacy experts worry about the impact of the all-seeing eyes. "It's a disturbing trend, bringing up children with the consciousness that they're going to be watched no matter what they do," says Jodi Beebe of the Privacy Rights Clearing House in San Diego. "I don't know what the impact is, but I do think we need to talk about it." 2158 From: A Grudko Date: Fri Dec 22, 2000 9:35am Subject: Fw: funnies> Yea, for 'tis written in the Book of Nostradamus... A seasonal thought "Come the millennium, month 12, In the home of greatest power, The village idiot will come forth To be acclaimed the leader." - Nostradamus, 1555 What more need be said? Seasons greetings and a safe and prosperous 2001 to all of our friends, clients and most of our enemies.... Andy Grudko Grudko Wilson Associates Johannesburg [Non-text portions of this message have been removed] 2159 From: Dragos Ruiu Date: Fri Dec 22, 2000 7:09pm Subject: season's greetings: lawyer humor (With due apologies to those with law degrees here.... :-) Have a merry holiday season and I hope you have the best of new years. Or is that new millenia? cheers, --dr :-) LAWYERS' SEASONAL GREETING From us ("the wishor") to you ("hereinafter called the wishee") Please accept without obligation, implied or implicit, our best wishes for an environmentally conscious, socially responsible, politically correct, low stress, non-addictive, gender neutral, celebration of the winter solstice holiday, practiced within the most enjoyable traditions of the religious persuasion of your choice, or secular practices of your choice, with respect for the religious/secular persuasions and/or traditions of others, or their choice not to practice religious or secular traditions at all... and a financially successful, personally fulfilling and medically uncomplicated recognition of the onset of the generally accepted calendar year 2001, but with due respect for the calendars of choice of other cultures or sects, and having regard to the race, creed, colour, age, physical ability, religious faith, choice of computer platform or dietary preference of the wishee. By accepting this greeting you are bound by these terms that: * This greeting is subject to further clarification or withdrawal * This greeting is freely transferable provided that no alteration shall be made to the original greeting and that the proprietary rights of the wishor are acknowledged. * This greeting implies no promise by the wishor to actually implement any of the wishes. * This greeting may not be enforceable in certain jurisdictions and/or the restrictions herein may not be binding upon certain wishees in certain jurisdictions and is revocable at the sole discretion of the wishor. * This greeting is warranted to perform as reasonably may be expected within the usual application of good tidings, for a period of one year or until the issuance of a subsequent holiday greeting, whichever comes first. * The wishor warrants this greeting only for the limited replacement of this wish or issuance of a new wish at the sole discretion of the wishor * Any references in this greeting to "the Lord", "Father Christmas", "Our Saviour", or any other festive figures, whether actual or fictitious, dead or alive, shall not imply any endorsement by or from them in respect of this greeting, and all proprietary rights in any referenced third party names and images are hereby acknowledged. -- Dragos Ruiu dursec.com ltd. / kyx.net - we're from the future gpg/pgp key on file at wwwkeys.pgp.net 2160 From: APL Consultants Date: Sat Dec 23, 2000 4:25am Subject: Introduction-France Hello List My name is Alain-Pierre LACLOTTE. I run a French based company specialised in TSCM (R&D and operations) We work in France, Europe, Africa, Middle East and Asia and try to get life as hard as possible for bad guys I am particuliary happy to join this list as I already know some members who are, in my opinion, hight level specialists. Meanwhile Happy Christmas and Happy New Year for all of you and your family. Alain-Pierre LACLOTTE apl@a... [Non-text portions of this message have been removed] 2161 From: Date: Sun Dec 24, 2000 0:03pm Subject: Hello Well, ahem. I have been advised that I must tell y'all a little 'bout myself. Sorry that I haven't done this sooner; however I have been availing myself of the history file. There are SO many snake - oil salesmen and self-proclaimed gurus that I wanted to see who was in here before I invested any time. The ratio of geniuses to idiots is higher here than at just about anything else I am a member of. The reason I haven't been posting is I kind of feel like I am listening in to the grown-ups conversation from the kiddie table. My background then, is this: My name is Shawn Hughes, and I am a 12 year Public Safety veteran in South East USA. For the last three years, among other duties, I have been the head of the Electronic and Technical Surveillance unit for a 1,000 man County Sheriff's Department. During this time I have assisted various local, state and Federales in intercepting and interpreting various types of intelligence. I spend in a typical time frame 70% on installs, and 10% in TSCM. The remaining 20% is in computer forensics and R&D. What kinda training got me this job? Honestly, SIGINT has always been a hobby. (When you are twelve, you haven't lived until you've whacked open a $300 dollar scanner to install a discriminator tap. Grandpa was pissed!) I spent a lotta time trying to figure out what all those beeps and boops were. Oh, formal training. I gotta commercial and amateur radio license, and I got sent to a couple of schools (yawn). What I have lacked in formal training, I have tried to augment by reading. I have burned up two printers on TSCM research. The rest has come from hacking things apart that emits RF and trying to find them with 'a screwdriver and a paperclip', to paraphrase some one. ( I read with great interest the cordless phone thread. I have a big collection of broken phones, walkee-talkees, and whatnot). In closing, I'm not too sure what I have to offer this group, but thanks to all of you in advance for the free training you are providing me ! regards, Shawn From: David Alexander Date: Fri Dec 21, 2001 3:39am Subject: Newsflash - humour UK special forces, the SAS, have just issued a press release: Afghanistan - 21 Dec 2001 New intelligence reveals more personal information about Osama Bin Laden and Mullah Omar. Laden is, apparently, 6 feet 4 inches tall and Omar is only 4 feet 9 inches tall. The SAS are now hunting high and low.... David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4384 From: ramboton Date: Thu Dec 20, 2001 9:55pm Subject: New member Hello all, My name is David Singleton, I am a Sergeant, with the Tulare County Sheriff's department, I am currently assigned to the ACTION project. (www.agcrime.net) ACTION stands for Ag Crimes Technical Investigations Operations Network. One of my primary is the research and maintenance of surveillance equipment which we loan out to investigators who specialize in agricultural crimes. Currently I support about 30 detectives in Kings, Kern, Tulare, Fresno and Madera counties. For those of you not familure with Central California, Agriculture is a big thing here, and if it is not nailed down someone will steal it. 4385 From: D. Douglas Rehman Date: Fri Dec 21, 2001 6:16am Subject: RE: Kevin Mitnick > Yes, the caller simply forces a buffer overflow at 1200 baud and > injects his own number (which will become the "new" number). Hmmm... I hope that Kevin was with someone else when he did this. I'd hate to think he would violate his probation by possessing/using a computer... Best Regards, Doug Rehman Rehman Technology Services, Inc. Specializing in Computer Forensics and Technology Related Investigations License A-9800119 Mount Dora, Florida (Orlando Area) (352)357-0500 http://www.surveil.com President Florida Association of Computer Crime Investigators http://www.facci.org 4386 From: Hawkspirit Date: Fri Dec 21, 2001 0:10pm Subject: Security software Anyone know anything about this security software, Roger http://www.gen1000.com/ 4387 From: Justin T. Fanning Date: Fri Dec 21, 2001 11:31am Subject: Budget spectrum analyser & logger I received Email from Winradio today (they make a computer controlled radios). They are offering free software called "Mini SIGINT" which I though may be of interest to the list. It's basically a spectrum analyser (150 kHz to 4.0 GHz), you punch in a bunch of parameters such as frequency range, minimum signal strength etc. and it loggs both on screen and via a text file anything it finds. It's not a pro piece of equipment, but doesn't come with the pro price tag. I thought it might be of interest to people who leave equipment on site overnight or for a period of days as its cheap (~ US$ 3 - 4k) and can also be monitored remotely, even via public IP. http://xrs.winradio.com/minisigint.htm Justin T. Fanning Justin@f... 4388 From: DrPepper Date: Fri Dec 21, 2001 11:59am Subject: Re: Budget spectrum analyser & logger You know, , , , This is just what I've been looking for , , , , , , The only thing it does not say, is what radio will it uses? And to operate as a spectrum analyzer, or panadaptor it must tap the IF of the radio. Lots of information missing here, , , , Or maybe it's just that I can't see it there, , , That happens to me more and more lately. -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ================================= "Justin T. Fanning" wrote: > I received Email from Winradio today (they make a computer controlled > radios). They are offering free software called "Mini SIGINT" which I > though may be of interest to the list. It's basically a spectrum > analyser (150 kHz to 4.0 GHz), you punch in a bunch of parameters > such as frequency range, minimum signal strength etc. and it loggs > both on screen and via a text file anything it finds. > > It's not a pro piece of equipment, but doesn't come with the pro price > tag. I thought it might be of interest to people who leave equipment > on site overnight or for a period of days as its cheap (~ US$ 3 - 4k) > and can also be monitored remotely, even via public IP. > > http://xrs.winradio.com/minisigint.htm > > Justin T. Fanning > Justin@f... > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4389 From: Charles P Date: Fri Dec 21, 2001 0:30pm Subject: Re: Budget spectrum analyser & logger If I'm correct, it is not actually acting as a spectrum analyzer but more of a spectrum "scope". Showing relative signal strength per freq as it scans. ----- Original Message ----- From: "Justin T. Fanning" To: Sent: Friday, December 21, 2001 12:31 PM Subject: [TSCM-L] Budget spectrum analyser & logger > > I received Email from Winradio today (they make a computer controlled > radios). They are offering free software called "Mini SIGINT" which I > though may be of interest to the list. It's basically a spectrum > analyser (150 kHz to 4.0 GHz), you punch in a bunch of parameters > such as frequency range, minimum signal strength etc. and it loggs > both on screen and via a text file anything it finds. > > It's not a pro piece of equipment, but doesn't come with the pro price > tag. I thought it might be of interest to people who leave equipment > on site overnight or for a period of days as its cheap (~ US$ 3 - 4k) > and can also be monitored remotely, even via public IP. > > http://xrs.winradio.com/minisigint.htm > > > Justin T. Fanning > Justin@f... > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 4390 From: Charles P Date: Fri Dec 21, 2001 0:37pm Subject: Re: Budget spectrum analyser & logger Woops, fat fingers, I didn't finish that last message: If I'm correct, it is not actually acting as a spectrum analyzer but more of a spectrum "scope". Showing relative signal strength per freq as it scans. >Note that the selection of the step size determines automatic selection of the resolution >bandwidth, which is approximately 17 kHz for step sizes between 12.5 and 25 kHz, and >approximately 230 kHz for step sizes of 200 or 250 kHz. That can still be useful as you mentioned, such as leaving it on site and logging. My AR3000A with pc control has that option but it is a bit slow for catching anything realtime unless it is a constant signal. The WinRadio seems nice in that some have suggested you can carry it with your laptop and it may not attract as much suspicion in international travel as a radio receiver would. Charles charles@t... Global Communications Tarrytown, NY www.telephonesecurity.com ----- Original Message ----- From: "Justin T. Fanning" To: Sent: Friday, December 21, 2001 12:31 PM Subject: [TSCM-L] Budget spectrum analyser & logger > > I received Email from Winradio today (they make a computer controlled > radios). They are offering free software called "Mini SIGINT" which I > though may be of interest to the list. It's basically a spectrum > analyser (150 kHz to 4.0 GHz), you punch in a bunch of parameters > such as frequency range, minimum signal strength etc. and it loggs > both on screen and via a text file anything it finds. > > It's not a pro piece of equipment, but doesn't come with the pro price > tag. I thought it might be of interest to people who leave equipment > on site overnight or for a period of days as its cheap (~ US$ 3 - 4k) > and can also be monitored remotely, even via public IP. > > http://xrs.winradio.com/minisigint.htm > > > Justin T. Fanning > Justin@f... > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 4391 From: Justin T. Fanning Date: Fri Dec 21, 2001 2:43pm Subject: Re: Budget spectrum analyser & logger Dr Pepper & Charles, The software works with winradio's own receivers, http://www.winradio.com/home/products.htm and yes, 50 freq/sec (FM) spectrum "scope" would probably be a better description. I have the old WR-1000i, it's superseded now but if anyone has any questions I'll try my best. WR-1000i specs: http://www.winradio.com/home/1000i-s.htm Justin T. Fanning Justin@f... --- DrPepper wrote: > > You know, , , , > This is just what I've been looking for , , , , , , > > The only thing it does not say, is what radio will it uses? > And to operate as a spectrum analyzer, or panadaptor it must tap the IF of > the radio. Lots of information missing here, , , , > Or maybe it's just that I can't see it there, , , That happens to me more and > more lately. > > -- > Dr Pepper aka WB6GKI > in the High Desert of California. > Check out my LIVE Hamshack Cam at: > http://www1.iwvisp.com/DrPepper/ham/ham.htm > ================================= > > "Justin T. Fanning" wrote: > > > I received Email from Winradio today (they make a computer controlled > > radios). They are offering free software called "Mini SIGINT" which I > > though may be of interest to the list. It's basically a spectrum > > analyser (150 kHz to 4.0 GHz), you punch in a bunch of parameters > > such as frequency range, minimum signal strength etc. and it loggs > > both on screen and via a text file anything it finds. > > > > It's not a pro piece of equipment, but doesn't come with the pro price > > tag. I thought it might be of interest to people who leave equipment > > on site overnight or for a period of days as its cheap (~ US$ 3 - 4k) > > and can also be monitored remotely, even via public IP. > > > > http://xrs.winradio.com/minisigint.htm > > > > Justin T. Fanning > > Justin@f... > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4392 From: James M. Atkinson Date: Fri Dec 21, 2001 9:04pm Subject: Re: Budget spectrum analyser & logger ow, ow, ow, ow, ow.... It's a great product but you can do the same thing with an Icom PCR series of receiver, it's not anything new that they are doing, it's just a cute name. If f I am reading the specs correctly your going to end up with a extremely high DANL, that while acceptable to amateur radio folks and scanner buffs does not in any way even come close to a modern spectrum analyzer... ie: your going to me able to "dig millions of times deeper" with an SA. I like the WinRadio products (I own several of them), but they really need to come out 6 GHz radio with a USB interface, and some kind of first IF capable of passing video bandwidth signals... Said radio should also be able to apply some really narrow filters to "signal hunting" -jma At 5:31 PM +0000 12/21/01, Justin T. Fanning wrote: >I received Email from Winradio today (they make a computer controlled >radios). They are offering free software called "Mini SIGINT" which I >though may be of interest to the list. It's basically a spectrum >analyser (150 kHz to 4.0 GHz), you punch in a bunch of parameters >such as frequency range, minimum signal strength etc. and it loggs >both on screen and via a text file anything it finds. > >It's not a pro piece of equipment, but doesn't come with the pro price >tag. I thought it might be of interest to people who leave equipment >on site overnight or for a period of days as its cheap (~ US$ 3 - 4k) >and can also be monitored remotely, even via public IP. > >http://xrs.winradio.com/minisigint.htm > > >Justin T. Fanning >Justin@f... -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4393 From: Paolo Sfriso Date: Fri Dec 21, 2001 9:46am Subject: Website Dear Colleagues. Sorry for the cross-posting. We have finally uploaded our corporate website www.grupposit.com . Your comments and suggestions would be greatly appreciated. Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 4394 From: J‚nis Balklavs - GrÓnhofs Date: Fri Dec 21, 2001 10:30am Subject: Greeting A Fine Print Holiday Greeting From us (hereinafter called the "Wishor") to you (hereinafter called the "Wishee"), please accept without obligation, express or implicit, our best wishes for an environmentally conscious, socially responsible, politically correct, low stress, non-addictive, gender neutral celebration of the winter solstice holiday, practiced within the most enjoyable traditions of the religious persuasion of your choice or secular practices of your choice, with respect for the religious/secular persuasions and/or traditions of others, or their choice not to practice religious or secular traditions at all... and a financially successful, personally fulfilling and medically uncomplicated recognition of the onset of the generally accepted calendar year 2002, but with due respect for the calendars of choice of other cultures or sects, and having due regard to the race, creed, color, age, physical ability, religious faith, choice of computer platform or dietary preference of the Wishee. By accepting this greeting you agree to be bound by the following terms as applicable: * This greeting is subject to further clarification or withdrawal; * This greeting is freely transferable provided that no alteration shall be made to the original greeting and that the proprietary rights of the wishor are acknowledged; *This greeting implies no promise by the wishor to actually implement any of the wishes; *This greeting may not be enforceable in certain jurisdictions and/or all or some of the restrictions herein may not be binding upon certain Wishees in certain jurisdictions and is revocable at the sole discretion of the Wishor; *This greeting is warranted to perform as reasonably may be expected within the usual application of good tidings, for a period of one year or until the issuance of a subsequent holiday greeting, whichever comes first; *The Wishor warrants this greeting only for the limited replacement of this wish or issuance of a new wish at the sole discretion of the Wishor; *Any references implied in this greeting to the a deity, to a mythical figure, or to any other traditionally festive figures, whether actual or fictitious, dead or alive, shall not imply any endorsement by or from them in respect of this greeting, and all proprietary rights in any referenced third party names and images are hereby acknowledged. 4395 From: Date: Fri Dec 21, 2001 2:17pm Subject: Fwd:xxx Countermeasures sweeps --You gotta love this (reposted from another forum) In a message dated 12/21/01 9:11:44 AM, skippporteous@a... writes: >Dear Group, >I've enjoyed considerable success locating bugs >visually in homes and vehicles. In fact, that's the >only way some of them can be found. >I live in New York City and would like to pick up some >corporate clients, but doubt that visual inspections >would fly. Can someone recommend a good source for >equipment and training? Yesterday, a guy with CCS said >he could get me started with the equipment they >manufacture for about 3 grand, including 8 hours of >training. >Advice needed and appreciated. >Skipp Porteous > >-- >People-locating, background checks >www.sherlockinvestigations.com >skippporteous@a... > [Non-text portions of this message have been removed] 4396 From: James M. Atkinson Date: Sat Dec 22, 2001 8:32am Subject: Consultants A timeless lesson on how CONSULTANTS can make a difference for an organization... Last week, we took some friends out to a new restaurant, and noticed that the waiter who took our order carried a spoon in his shirt pocket. It seemed a little strange, but I ignored it. However, when the busboy brought out water and utensils, I noticed he also had a spoon in his shirt pocket, then looked around the room and saw that all the staff had spoons in their pockets. When the waiter came back to serve our soup I asked, "Why the spoon?" "Well," he explained, "the restaurant's owners hired Anderson Consulting, experts in efficiency, in order to revamp all our processes. After several months of statistical analysis, they concluded that customers drop their spoons 73.84 percent more often than any other utensil. This represents a drop frequency of approximately 3 spoons per table per hour. If our personnel is prepared to deal with that contingency, we can reduce the number of trips back to the kitchen and save 15 man-hours per shift." As luck would have it I dropped my spoon and he was able to replace it with his spare spoon. "I'll get another spoon next time I go to the kitchen instead of making an extra trip to get it right now." I was rather impressed. The waiter served our main course and I continued to look around. I then noticed that there was a very thin string hanging out of the waiter's fly. Looking around, I noticed that all the waiters had the same string hanging from their flies. My curiosity got the better of me and before he walked off, I asked the waiter, "Excuse me, but can you tell me why you have that string right there?" "Oh, certainly!" he answered, lowering his voice. "Not everyone is as observant as you. That consulting firm I mentioned also found out that we can save time in the restroom." "How so?" "See," he continued, "by tying this string to the tip of you know what, we can pull it out over the urinal without touching it and that way eliminate the need to wash the hands, shortening the time spent in the restroom by 76.39 percent." "Okay, that makes sense, but . . . if the string helps you get it out, how do you put it back in?" "Well," he whispered, lowering his voice even further, "I don't know about the others, but I use the spoon." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4397 From: Aimee Farr Date: Sat Dec 22, 2001 11:31am Subject: Russian lawspionage? http://www.russiajournal.com/news/rj_news.shtml?nd=1506 Duma bars media terror propaganda through media MOSCOW - Russia's lower house of parliament on Thursday gave tentative approval to legal amendments intended to bar propagation of terrorism through the media. The State Duma voted 371-4 to approve the amendments to the media law in the first of three required readings. The legislation bans the use of media for "the propaganda or justification of terrorism and extremism." It specifically forbids the media to carry "statements of terrorists, extremists and other people who oppose counter-terrorist operations, popularize and, or justify the resistance to counter-terrorist operations in any form." [...] The U.S. Sedition Act (1798) http://www.earlyamerica.com/earlyamerica/milestones/sedition/s-1.html The Smith Act (1940) http://hcl.chass.ncsu.edu/garson/dye/docs/smith.htm ----- It sounds like they learned from our Church & Pike experience, and specifically outlawed that, too. ;-] Their recent political and legislative activity is concerning, but I'm mirroring our own legal precedent c. 1918 and c. 1940. I'll trust 'em when the Arabian Sea freezes over. ~Aimee 4398 From: James M. Atkinson Date: Sat Dec 22, 2001 0:30pm Subject: News: U.S. Police and Intelligence Hit by Spy Network http://www.newsmax.com/archives/articles/2001/12/18/224826.shtml Reprinted from NewsMax.com U.S. Police and Intelligence Hit by Spy Network Charles R. Smith Wednesday, Dec. 19, 2001 Spies Tap Police and Government Phones In the wake of the Sept. 11 terrorist attack, the FBI has stumbled on the largest espionage ring ever discovered inside the United States. The U.S. Justice Department is now holding nearly 100 Israeli citizens with direct ties to foreign military, criminal and intelligence services. The spy ring reportedly includes employees of two Israeli-owned companies that currently perform almost all the official wiretaps for U.S. local, state and federal law enforcement. The U.S. law enforcement wiretaps, authorized by the Communications Assistance for Law Enforcement Act (CALEA), appear to have been breached by organized crime units working inside Israel and the Israeli intelligence service, Mossad. Both Attorney General John Ashcroft and FBI Director Robert Mueller were warned on Oct. 18 in a hand-delivered letter from local, state and federal law enforcement officials. The warning stated, "Law enforcement's current electronic surveillance capabilities are less effective today than they were at the time CALEA was enacted." The spy ring enabled criminals to use reverse wiretaps against U.S. intelligence and law enforcement operations. The illegal monitoring may have resulted in the deaths of several informants and reportedly spoiled planned anti-drug raids on crime syndicates. Global Spy and Crime Network The penetration of the U.S. wiretap system has led to a giant spy hunt across the globe by American intelligence agencies. U.S. intelligence officials now suspect the spy ring shared and sold information to other nations. "Why do you think Putin so nonchalantly and with such great fanfare announced the shutdown of the Lourdes listening post in Cuba?" noted Douglas Brown, president of Multilingual Data Solutions Inc. and program director at the Nathan Hale Institute. "Besides the PR benefit right before his visit here, the Russians don't need it anymore. They've scraped together a cheaper, more effective monitoring system. Is the Israeli company an element of that system? I don't know," stated Brown. "With all the whining and crying about Echelon and Carnivore, critics, domestic and foreign, of U.S. electronic eavesdropping vastly overestimate our abilities to process and disseminate the stuff," noted Brown. "The critics also underestimated the incompetence and total ineptness of the people running our intelligence and law enforcement services during the Clinton-Gore years. One guy uses his home computer for storing top secret documents; another high-tech guru guy can't figure out how to save and retrieve his e-mail, and the guy in charge of everything is having phone sex over an open line with one of his employees," said Brown. "On the other hand, the Europeans, including the Russians, have been much more focused on the nuts and bolts of practical systems to process the information they scoop up. The stories linking German intelligence and the L&H scandal got very little play here but were widely noted in the European software community," said Brown. "Except for a few Germans and an occasional Pole, nobody can match the Russians in designing and developing algorithms. We may have some of the world's greatest programmers, but the Russians and Europeans do a better job of matching up linguists and area experts with their programmers," noted Brown. The discovery of a major spy ring inside the United States is straining the already tense relations with Israel. Although, Israel denied any involvement with the penetration of the U.S. wiretap system, the CIA and FBI are investigating the direct government ties to the former Israeli military and intelligence officials now being held by the Justice Department. Israeli Company Provides U.S. Wiretaps One company reported to be under investigation is Comverse Infosys, a subsidiary of an Israeli-run private telecommunications firm. Comverse provides almost all the wiretapping equipment and software for U.S. law enforcement. Custom computers and software made by Comverse are tied into the U.S. phone network in order to intercept, record and store wiretapped calls, and at the same time transmit them to investigators. The penetration of Comverse reportedly allowed criminals to wiretap law enforcement communications in reverse and foil authorized wiretaps with advance warning. One major drug bust operation planned by the Los Angeles police was foiled by what now appear to be reverse wiretaps placed on law enforcement phones by the criminal spy ring. Flawed laws Led to Compromise Several U.S. privacy and security advocates contend the fault actually lies in the CALEA legislation passed by Congress that allowed the spy ring to operate so effectively. Lisa Dean, vice president for technology policy at Free Congress Foundation, delivered a scathing critique of the breach of the U.S. law enforcement wiretap system. "We are exercising our 'I told you so' rights on this," said Dean. "From the beginning, both the political right and left warned Congress and the FBI that they were making a huge mistake by implementing CALEA. That it would jeopardize the security of private communications, whether it's between a mother and her son or between government officials. The statement just issued by law enforcement agencies has confirmed our worst fears," concluded Dean. "How many more 9/11s do we have to suffer?" asked Brad Jansen, deputy director for technology policy at the Free Congress Foundation. "The CALEA form of massive surveillance is a poor substitute for real law enforcement and intelligence work. It is an after-the-fact method of crime fighting. It is not designed to prevent crime. Massive wiretapping does not equal security. Instead, we have elected to jeopardize our national security in exchange for poor law enforcement," said Jansen. "For example, FINCEN monitoring of all money transactions did not detect al-Qaeda, nor did it find Mohamed Atta before he boarded his last flight. It was an ATM receipt left in his rental car that led the FBI to the bin Laden bank accounts," noted Jansen. U.S. National Security Compromised "The CALEA approach is the same approach law enforcement has been pushing for a number of years. It's the same approach that was used to push Carnivore, Magic Lantern, FINCEN and even the failed Clipper project. This approach leads to a compromise in national security and in personal security for the American public," said Jansen. "In addition, there is always government abuse of these kinds of systems," stated Jansen. "Law enforcement on all levels does a very poor job in policing itself. We need to hold our police and government officials to the highest standards." "This also hurts the U.S. economy when the whole world knows that our communication systems are not secure. We cannot compete with inferior products when other countries are exporting secure software and hardware. New Zealand, India and Chile already offer security products that actually provide real security," stated Jansen. "The current mentality of law enforcement is what failed to protect us from 9/11. CALEA wiretaps will not protect us from terror attacks in the future. The system does not provide better intelligence information. It actually leads to less security and more crime. We get the worst of both worlds," concluded Jansen. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4399 From: James M. Atkinson Date: Sat Dec 22, 2001 3:39pm Subject: Emergency Room Report Just in from the news wire: I understand that the two people in the report may also perform bug sweeps. http://www.tscm.com/armagged.wav Merry Christmas Folks, -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4400 From: Date: Sat Dec 22, 2001 11:51am Subject: Re: News: U.S. Police and Intelligence Hit by Spy Network In a message dated 12/22/01 10:33:34 AM Pacific Standard Time, jmatk@tscm.com writes: << Reprinted from NewsMax.com >> National Enquirer-ish IMO 4401 From: Marcelrf-iDEN-Test Portable Date: Mon Dec 24, 2001 0:48am Subject: "Secret Service to Expand Electronic Crimes Task Force" "Secret Service to Expand Electronic Crimes Task Force" News Factor Network (12/12/01); Bazinet, Kenneth R. The Secret Service is planning to set up crimes task forces in eight cities to combat credit card fraud. The new task forces are being modeled after a New York City program that identified credit card fraud and other criminal enterprises that may have been used by the Al Qaeda terrorist network. In addition to eavesdropping on mobile phone conversations and stealing personal information from Web sites while innocent customers make purchases, more and more criminals are also using credit cards swiped through easily obtained skimmers to steal the credit card numbers, PINs, and names of unsuspecting people. Skimmers are devices that attach to a bogus slot on ATM machines in malls, bodegas, and grocery stores and read credit card information when a card is swiped, while a miniature camera overhead films the customer typing in the PIN number. So far, the task force has helped to capture on alleged master counterfeiter who stole credit card numbers from online customer data bases and is believed to have links to Al Qaeda terror cells. The task force was also involved in apprehending a California man who attempted to get a credit card by stealing the identity of another California man who died during the terrorist attack on the World Trade Center. The new task forces, which are being established in Charlotte, N.C.; Las Vegas; Washington, D.C.; Miami; Chicago; Boston; Los Angeles; and San Francisco, will serve as the foundation for a new national program authorized by the recent anti-terrorism law signed by President Bush -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 4402 From: Date: Sun Dec 23, 2001 4:32pm Subject: new member My name is Danielle Russell... I am a Computer Security Advisor & Owner of MystikEnergy Computer Security. I am interested in learning serious security issues.. I am planning on getting a degree in the security field and am currently looking into the right colleges. You are welcome to check out our website at http://computersecurity.netfirms.com thanks 4403 From: Dragos Ruiu Date: Sun Dec 23, 2001 11:22am Subject: Re: Kevin Mitnick This may be a nitpick. But I think you mean to use the term "buffer overrun" instead of "buffer overflow" bacause I interpret your message to say that the attacker sends a lot of exceess ID data at 1200 baud so as to fill up the limited caller ID box buffer and have it show only the last data received (I.e. the bogus FBI number). A buffer "overflow" is usually a term reserved for a technical flaw in an algorithm/program that will let you write past the end of the buffer boundary in memory and overrun the stack, particularly the calling procedure stack frame and return address, thereby injecting shelcode or other control programs via user data to control the cpu and execute malicious code. They're nitpicky definitions and I can see where usage might be easily misconstrued. In the case mentioned below I am assuming that you meant the exploit was done by sending excess data, not a binary exploit to control the processor in the caller id box. Please correct me if I am in error in my assumptions here. happy holiday greetings, -- --dr pgp: http://dragos.com/dr-dursec.asc CanSecWest/core02 - May 1-3 2002 - Vancouver B.C. - http://cansecwest.com On Thu, 20 Dec 2001 12:44:02 -0500 "James M. Atkinson" wrote: > At 10:14 AM -0800 12/20/01, Hawkspirit wrote: > >On Art Bell's show last night Kevin Mitnick while on the show called Art > >Bells private phone number and the caller ID showed a bogus name and phone > >number for a West Coast FBI office. Anyone know how this was done? > Yes, the caller simply forces a buffer overflow at 1200 baud and > injects his own number (which will become the "new" number). > > It will only work on cheaper caller ID boxes that have limited > framing of the caller ID transmission. 4404 From: James M. Atkinson Date: Mon Dec 24, 2001 10:38am Subject: News: Private eyes spying on rowdy tenants http://icliverpool.icnetwork.co.uk/0100news/0100regionalnews/page.cfm?objectid=11498331&method=full Private eyes spying on rowdy tenants Dec 24 2001 By Claire Tolley, Daily Post A PRIVATE detectives are being used as "professional witnesses" in the fight against antisocial behaviour on Merseyside. Police and council officials have turned to specialist agencies to provide the service, which can cost as much as L5,000 a week. They are used to gather video surveillance evidence which can be used in court to obtain anti-social behaviour orders. Four eviction orders were recently served on Knowsley council tenants using evidence gathered by professional witnesses. Nine people were also arrested by police, as the evidence collected also showed criminal behaviour. Bert Bruffell, investigations and operations director for Bernic Security in Wirral, said: "We put in covert cameras with a video in these cases and, if necessary, we will actually put operatives in the area. "Then they appear in court instead of the residents." Professional witnesses are used by Liverpool, Wirral, Sefton, St Helens and Knowsley councils to improve safety where there has been persistent or severe trouble. They gather evidence in a variety of ways starting with surveillance. Mr Bruffell, a retired police officer with 30 years' experience, said rates could be around L27.50 an hour during the day. He said: "It does get more expensive for night-time work and depends on the amount of time needed to gather the evidence. Invariably, a lot of antisocial behaviour does occur at night. I suppose it can get quite dangerous at times but the trick is not to get caught. What you have to be very good at is being extremely sneaky." Cath Fielding, Knowsley Council's district housing officer, said some victims could be afraid to give evidence. She said: "But they can tell a professional witness who can go in and observe for themselves. We don't set anything up as such, we simply employ professional witnesses to observe behaviour. "We take this action only when it is appropriate. The council has a very positive approach to youth and we have a lot of schemes such as mentoring and schools councils to improve relationships within the community." A Liverpool City Council spokeswoman said the council used private detectives on average two or three times a month. Paid witnesses first were employed by local authorities across the country five or six years ago. Police forces become involved only if evidence collected shows criminal behaviour. Professional witnesses will collect video or photographic evidence which can be used to obtain anti-social behaviour orders. Ruth Lucas, policy officer for housing at the Local Government Association, said they were used only in exceptional cases. The witnesses can be supplied by voluntary organisations who do not charge for the service as well as specialist detective agencies. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4405 From: zack <10-33@c...> Date: Mon Dec 24, 2001 9:17am Subject: Re: Digest Number 806 Save your $59.95 , If you go to http://www.copscops.com/downloads.htm you can get most for free. If not try http://www.webattack.com/freeware/security/ Happy Holidays to each of you and your family, I enjoy the information and humor here. At 08:45 AM 12/22/2001 +0000, you wrote: > From: Hawkspirit >Subject: Security software > >Anyone know anything about this security software, Roger > >http://www.gen1000.com/ visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Our enemies have made the mistake that America's enemies always make. They saw liberty and thought they saw weakness. And now, they see defeat. " George W Bush President of the United States of America God Bless The USA http://www.copscops.com/blessusa.htm 4406 From: Marcelrf-iDEN-Test Portable Date: Mon Dec 24, 2001 11:32am Subject: DOJ Money Bill Mandates Annual 'Carnivore' Update DOJ Money Bill Mandates Annual 'Carnivore' Update Summary: The U.S. Senate has passed a reauthorization bill for the U.S. Justice Department that includes a measure requiring the agency to disclose details about its use of the e-mail surveillance tool "DCS 1000," formerly known as "Carnivore." The "Department of Justice Appropriations Authorization Act," passed late last week by the full Senate, directs the U.S. Attorney General and the FBI director to draft an annual report to Congress outlining the extent to which federal investigators rely on the e-mail snooping tool. The report will include the number of times the system was used for surveillance during the preceding year, who approved its use, the reasons given to request its use, and details on any data gathered by the device that was not authorized by a court order. -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 4407 From: kirk Date: Mon Dec 24, 2001 11:18am Subject: santa's tapping your phone www.flowgo.com/refer/redir.cfm?page_id=24088&d=12-21-01> -- Kirk Adirim President TACTRONIX LLC Tactical Electronics for Critical Missions 8497 Sunset Boulevard #28 West Hollywood, CA 90069 USA E: kirk@t... T: 310-388-5886 F: 310-388-5886 W: www.tactronix.com -- 4408 From: Craig Snedden Date: Mon Dec 24, 2001 11:19am Subject: RE: News: Private eyes spying on rowdy tenants Hi all and best wishes of the season. Not a "news" story this side of the "pond", despite it having come from a U.K. newspaper. We have been involved in "professional witness" programmes along with a number of PI firms for the past three or four years now. I'd take issue witht the headline "spying on rowdy tenants". Various pieces of recent legislation mean that anything that is used as evidence by a publice authority must be either gathered with a warrant or in such a means that a warrant is not necessary. In these cases the activity recorded for use Court must be seen and heard from a "public place" (normally, unless you can get a local resident who is willing to take a stand), otherwise there is all sorts of mess with Human Rights Laws, Restriction of Investigatory Powers Act etc., so it is harly "spying" in my book if you can see/hear from a "public place". Craig Snedden -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: 24 December 2001 16:39 To: TSCM-L Mailing List Subject: [TSCM-L] News: Private eyes spying on rowdy tenants http://icliverpool.icnetwork.co.uk/0100news/0100regionalnews/page.cfm?object id=11498331&method=full Private eyes spying on rowdy tenants Dec 24 2001 By Claire Tolley, Daily Post A PRIVATE detectives are being used as "professional witnesses" in the fight against antisocial behaviour on Merseyside. Police and council officials have turned to specialist agencies to provide the service, which can cost as much as L5,000 a week. They are used to gather video surveillance evidence which can be used in court to obtain anti-social behaviour orders. Four eviction orders were recently served on Knowsley council tenants using evidence gathered by professional witnesses. Nine people were also arrested by police, as the evidence collected also showed criminal behaviour. Bert Bruffell, investigations and operations director for Bernic Security in Wirral, said: "We put in covert cameras with a video in these cases and, if necessary, we will actually put operatives in the area. "Then they appear in court instead of the residents." Professional witnesses are used by Liverpool, Wirral, Sefton, St Helens and Knowsley councils to improve safety where there has been persistent or severe trouble. They gather evidence in a variety of ways starting with surveillance. Mr Bruffell, a retired police officer with 30 years' experience, said rates could be around L27.50 an hour during the day. He said: "It does get more expensive for night-time work and depends on the amount of time needed to gather the evidence. Invariably, a lot of antisocial behaviour does occur at night. I suppose it can get quite dangerous at times but the trick is not to get caught. What you have to be very good at is being extremely sneaky." Cath Fielding, Knowsley Council's district housing officer, said some victims could be afraid to give evidence. She said: "But they can tell a professional witness who can go in and observe for themselves. We don't set anything up as such, we simply employ professional witnesses to observe behaviour. "We take this action only when it is appropriate. The council has a very positive approach to youth and we have a lot of schemes such as mentoring and schools councils to improve relationships within the community." A Liverpool City Council spokeswoman said the council used private detectives on average two or three times a month. Paid witnesses first were employed by local authorities across the country five or six years ago. Police forces become involved only if evidence collected shows criminal behaviour. Professional witnesses will collect video or photographic evidence which can be used to obtain anti-social behaviour orders. Ruth Lucas, policy officer for housing at the Local Government Association, said they were used only in exceptional cases. The witnesses can be supplied by voluntary organisations who do not charge for the service as well as specialist detective agencies. -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------- ------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4409 From: Date: Mon Dec 24, 2001 7:22am Subject: FCC to yank Kevin Mitnick's radio license http://www.theregister.co.uk/content/55/23494.html By Our investigative reporter Posted: 22/12/2001 at 18:45 GMT In a five-page order released Friday, the US Federal Communications Commission (FCC) claims that 38-year old convicted hacker Kevin Mitnick is not morally fit to be a ham radio operator. "Mr. Mitnick's criminal background raises a substantial and material question of fact as to whether he possesses the requisite character qualifications to be and remain a commission licensee," the FCC said. "Given his propensity to engage in criminal activities, particularly those involving fraud, we have serious reservations about Mr. Mitnick's ability to comply with our rules and regulations in the future." What's more, the FCC reminds us, "Mr. Mitnick's prolific and damaging hacking career made him the most wanted computer criminal in United States history." Mitnick was convicted of hacking-related felonies and was released from prison in January of 2001. He's still on probation until January 2003. Mitnick's had a ham radio license for about 25 years, and he applied two years ago for what's normally a routine renewal. He's not accused of making any illicit radio transmissions or any offenses that fall under the FCC's jurisdiction -- it's just that official Washington firmly believes computer hacking must be an unforgivable venal sin. Under FCC regulations, Mitnick's loss of his license is probable, but not automatic. A hearing will be scheduled at some to-be-determined date before an FCC administrative law judge (who, no surprise, typically sides with the bureaucrats). Appeals go to the full commission and from there to the federal courts. "It's just another example of them trying to harass me," Mitnick said Friday evening. "Now I've got to spend money to keep a ham license. How ridiculous." "Obviously I'm going to have to fight for my right to be licensed," said Mitnick, who uses his ham radio every day. If Mitnick doesn't respond in 20 days, he automatically loses. Federal law requires amateur radio enthusiasts to obtain a license from the government. Mitnick has a "general class" license that required him to pass a five-words-per-minute Morse code test. (His callsign is N6NHG.) This action against Mitnick doesn't affect his "Dark Side of the Internet" radio show, which aired on KFI AM 640. Citing an advertising slowdown, the radio station gave it the axe on 10 December. The FCC believes it can do pretty much whatever it wants to Mitnick thanks to an enormously favorable DC Circuit Court of Appeals ruling last year. The judges said that the FCC could rescind the license of an amateur radio operator convicted of calling long distance for free via fake access codes, a felony. "There is nothing unreasonable about the FCC's conclusion that (Herbert) Schoenbohm's felony conviction was relevant to his license renewal. A conviction for fraudulent conduct plainly calls into question a licensee's ability to act in a manner consonant with FCC regulations," the panel of judges ruled three to zero. Fortunately for Mitnick, there's still a way to fight back. He can confess that, yes, he was a felonious knave -- who's completely has changed his ways. The agency's own "Policy Regarding Character Qualifications in Broadcast Licensing" admits that "rehabilitation" is a mitigating factor. Mitnick insists he's cured. "I was called to testify before Congress on federal computer security and now they're questioning my character," he says, noting that he even spent two days briefing the US Commission on National Security. The prosecutor who put him behind bars thinks otherwise. Christopher Painter, now deputy chief of the Justice Department's computer crime section, said earlier this month that Mitnick is still an unrepentant wretch. After running into his former courtroom adversary at the National Press Club, Painter said: "My problem with Mitnick these days is that he's never really accepted responsibility for his conduct... I hope he gets his life together, and I bear him no ill-will, but I think if you don't accept responsibility and you glamorize hacking and you get attention based on your former exploits, that sends the wrong message to people." (Mitnick was in town to speak at a Business Software Alliance conference.) That was on 6 December. Five days later, the FCC decided to take action against Mitnick. The decision became public on Friday. A coincidence -- or a way to strike back at the world's most famous convicted hacker? Says Mitnick: "I'm surprised that after two years they did this. Why the delay? It's very suspicious to me." 4410 From: Jack Miller Date: Mon Dec 24, 2001 1:31pm Subject: Carl Cameron report on Fox! hey, someone posted part 3 of the "U.S. phone eavesdropping software open to spying --Fox Newsreport" on the list sometime ago. Apparently Fox News has withdrawn the news series from its website for ...... reasons. Does anyone have the other 3 parts? or maybe a pointer to a cached or archived version? hereis the 3rd part for those of you who haven't seen it! ------------------------------------------------------ http://foxnews.com/story/0,2933,40824,00.html FNC Carl Cameron Friday, December 14, 2001 This partial transcript of Special Report with Brit Hume, Dec. 13, was provided by the Federal Document Clearing House. Click here to order the complete transcript. Part 3 of 4 BRIT HUME, HOST: Last time we reported on an Israeli-based company called Amdocs Ltd. that generates the computerized records and billing data for nearly every phone call made in America. As Carl Cameron reported, U.S. investigators digging into the 9/11 terrorist attacks fear that suspects may have been tipped off to what they were doing by information leaking out of Amdocs. In tonight's report, we learn that the concern about phone security extends to another company, founded in Israel, that provides the technology that the U.S. government uses for electronic eavesdropping. Here is Carl Cameron's third report. (BEGIN VIDEOTAPE) CARL CAMERON, FOX NEWS CORRESPONDENT (voice-over): The company is Comverse Infosys, a subsidiary of an Israeli-run private telecommunications firm, with offices throughout the U.S. It provides wiretapping equipment for law enforcement. Here's how wiretapping works in the U.S. Every time you make a call, it passes through the nation's elaborate network of switchers and routers run by the phone companies. Custom computers and software, made by companies like Comverse, are tied into that network to intercept, record and store the wiretapped calls, and at the same time transmit them to investigators. The manufacturers have continuing access to the computers so they can service them and keep them free of glitches. This process was authorized by the 1994 Communications Assistance for Law Enforcement Act, or CALEA. Senior government officials have now told Fox News that while CALEA made wiretapping easier, it has led to a system that is seriously vulnerable to compromise, and may have undermined the whole wiretapping system. Indeed, Fox News has learned that Attorney General John Ashcroft and FBI Director Robert Mueller were both warned Oct. 18 in a hand-delivered letter from 15 local, state and federal law enforcement officials, who complained that "law enforcement's current electronic surveillance capabilities are less effective today than they were at the time CALEA was enacted." Congress [probably means Comverse --DBM] insists the equipment it installs is secure. But the complaint about this system is that the wiretap computer programs made by Comverse have, in effect, a back door through which wiretaps themselves can be intercepted by unauthorized parties. Adding to the suspicions is the fact that in Israel, Comverse works closely with the Israeli government, and under special programs, gets reimbursed for up to 50 percent of its research and development costs by the Israeli Ministry of Industry and Trade. But investigators within the DEA, INS and FBI have all told Fox News that to pursue or even suggest Israeli spying through Comverse is considered career suicide. And sources say that while various F.B.I. inquiries into Comverse have been conducted over the years, they've been halted before the actual equipment has ever been thoroughly tested for leaks. A 1999 F.C.C. document indicates several government agencies expressed deep concerns that too many unauthorized non-law enforcement personnel can access the wiretap system. And the FBI's own nondescript office in Chantilly, Virginia that actually oversees the CALEA wiretapping program, is among the most agitated about the threat. But there is a bitter turf war internally at F.B.I. It is the FBI's office in Quantico, Virginia, that has jurisdiction over awarding contracts and buying intercept equipment. And for years, they've thrown much of the business to Comverse. A handful of former U.S. law enforcement officials involved in awarding Comverse government contracts over the years now work for the company. Numerous sources say some of those individuals were asked to leave government service under what knowledgeable sources call "troublesome circumstances" that remain under administrative review within the Justice Department. ===== =================================== Jack Miller Researcher Paython and Co. =================================== __________________________________________________ Do You Yahoo!? Send your FREE holiday greetings online! http://greetings.yahoo.com 4411 From: James M. Atkinson Date: Mon Dec 24, 2001 2:16pm Subject: Merry Christmas Happy Holidays to all, Merry Christmas, and a Prosperous and Healthy New Year !! -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4412 From: A Grudko Date: Mon Dec 24, 2001 2:49pm Subject: Phone line FM I did a sweep this afternoon with an interesting result. Here's a digest of my instruction to my technician: **Client has about lines, 15 ISDN, 5 analogue primarily for modem/fax use. One important direct analogue number has strong FM radio audio (98.55Mhz commercial station ) on it when on hook. 4 others (same exchange & instruments) do not. No measurable extra current or voltage loss. No response to tone sweep/combinations. No double jumpers or series connections on site. Pick up the 'phone and the audio is 100%, no interference. My suspicion - poor quality tap, perhaps a series relay (coil to activate a recorder or provide PD power for a TX) plus low pf capacitor (to pluck off the AC - audio) unintentionally creating a basic LC oscilator (receiver).** The only time I have come across this type of breakthrough before was on a loooong run to a crude series recorder in about '83, almost directly under a 25 KW MW commercial AM transmitter mast..... I do not have a TDR and I have no authority to ask the phone company (actually a government department) to disconnect the cable from the main frame. Am I kidding myself that this obvious interference could indicate a tap? Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time From: contranl Date: Tue Dec 21, 2004 11:44pm Subject: SPOOKS ...the real ones !!! . Check out this video trailer on "White Noise" a movie coming in januari...some "serious" stuff called E.V.P. Trailer: http://www.apple.com/trailers/universal/white_noise/large.html Source and info: http://www.celebritywonder.com/movie/2005_White_Noise.html I do'nt believe that stuff...but some do ! so you are warned...they may call you for help next month :) Tetrascanner . 10467 From: Paolo Sfriso Date: Wed Dec 22, 2004 2:53am Subject: Re: Cases of industrial espionage, bugging, in pharma industries Hi Mike. In Italy, pharmaceutical companies are one of the most frequent targets for government agency electronic surveillance (mostly telephone taps)..... Take care. Kind Regards. Your Italian Connection. Paolo Sfriso CFE, CII Director Gruppo S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY Phone +39 0422 828517 Fax +39 0422 823224 24hr GSM Cell +39 335 5257308 www.grupposit.com paulsfriso@t... info@g... Message: 1 Date: Tue, 21 Dec 2004 09:44:11 +0100 From: Michael Puchol Subject: Cases of industrial espionage, bugging, in pharma industries Hi all, I have to visit a local pharmaceutical company to provide consultancy services on security, basically regarding patient information protection and industrial espionage. I'd like to know if any of you can provide real examples of such activities in the pharma sector, the details can be vage and heavily sanitized, I just need a few case examples that they may know of too (I just hope they weren't the thieves in any of the cases, otherwise things could get embarrasing!). I have googled, but come up with mostly empty hands, a couple of cases reported but not much else. Best regards, Mike Happy Christmas and a Successful and Peaceful New Year to all. [Non-text portions of this message have been removed] 10468 From: Michael Puchol Date: Wed Dec 22, 2004 4:53am Subject: Re: Re: Cases of industrial espionage, bugging, in pharma industries Hi Paolo, Thanks a lot for your email, I will bring up this on my next meeting with them. I start to see the picture that the pharma industry is so huge that govenments do the spying for them. Best regards and merry Christmas, Mike (your Spanish connection) :-) -----Original Message----- From: "Paolo Sfriso" Date: Wed, 22 Dec 2004 09:53:03 To: Cc: Subject: [TSCM-L] Re: Cases of industrial espionage, bugging, in pharma industries Hi Mike. In Italy, pharmaceutical companies are one of the most frequent targets for government agency electronic surveillance (mostly telephone taps)..... Take care. Kind Regards. Your Italian Connection. Paolo Sfriso CFE, CII Director Gruppo S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY Phone +39 0422 828517 Fax +39 0422 823224 24hr GSM Cell +39 335 5257308 www.grupposit.com paulsfriso@t... info@g... Message: 1 Date: Tue, 21 Dec 2004 09:44:11 +0100 From: Michael Puchol Subject: Cases of industrial espionage, bugging, in pharma industries Hi all, I have to visit a local pharmaceutical company to provide consultancy services on security, basically regarding patient information protection and industrial espionage. I'd like to know if any of you can provide real examples of such activities in the pharma sector, the details can be vage and heavily sanitized, I just need a few case examples that they may know of too (I just hope they weren't the thieves in any of the cases, otherwise things could get embarrasing!). I have googled, but come up with mostly empty hands, a couple of cases reported but not much else. Best regards, Mike Happy Christmas and a Successful and Peaceful New Year to all. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links --- On the move with my Blackberry 10469 From: A Grudko Date: Wed Dec 22, 2004 8:25am Subject: RE: Re: Cases of industrial espionage, bugging, in pharma industries -----Original Message----- From: Michael Puchol [mailto:mpuchol@s...] > Thanks a lot for your email, I will bring up this on my next meeting with them. I start to see the picture that the pharma industry is so huge that govenments do the spying for them. For them and on them. A good starting point read is 'Competitive Intelligence' by Larry Kahaner - subtitled 'From Black Ops to Boardrooms', ISBN 0-684-81074-3. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 [Non-text portions of this message have been removed] 10470 From: starblue55555@n... Date: Tue Dec 21, 2004 10:36pm Subject: Re: Part of archive (here) gone ? soon talk michael 10471 From: starblue55555@n... Date: Tue Dec 21, 2004 10:45pm Subject: Re: Re: What the F..... is this ? thermal optical imaging devices on naro feed strand are currently in use also fiber borring devices for res use now useing same for gm study 10472 From: Michael Puchol Date: Wed Dec 22, 2004 0:08pm Subject: Re: Re: Cases of industrial espionage, bugging, in pharma industries Hi Andy, Thanks for that reference too, it's all good input to face the problem. Yesterday I was talking to a guy that works for this company, and he was baffled when I talked about auditing the PBX...it seems there is no security culture past computers and networks. Best regards, Mike A Grudko wrote: > > -----Original Message----- > From: Michael Puchol [mailto:mpuchol@s...] > > > Thanks a lot for your email, I will bring up this on my next meeting > with them. I start to see the picture that the pharma industry is so huge > that govenments do the spying for them. > > For them and on them. A good starting point read is 'Competitive > Intelligence' by Larry Kahaner - subtitled 'From Black Ops to Boardrooms', > ISBN 0-684-81074-3. > > Andy Grudko (British), DPM, Grad IS (South Africa) > MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 > www.grudko.com , agrudko@i... > Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > Mid Rand (+27 11) 318 1451 - 318 6846(Fax) > Cellular (+27) 82 778 6355 - ICQ 146498943 > SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. > "When you need it done right - first time" > > > --- > Outgoing mail is certified Virus Free. > Checked by AVG anti-virus system (http://www.grisoft.com). > Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > 10473 From: Fernando Martins Date: Thu Dec 23, 2004 0:12am Subject: Fw: Cases of industrial espionage, bugging, in pharma industries resending from new account ----- Original Message ----- From: "Fernando Martins" To: Sent: Tuesday, December 21, 2004 9:39 PM Subject: Re: [TSCM-L] Cases of industrial espionage, bugging, in pharma industries > 28/07/2003 - Baxter wins court order in Bayer espionage case > > A judge has ordered an employee at Bayer's US subsidiary to hand over > documents and computer files to the court in a lawsuit brought by Baxter > alleging industrial espionage. > Gopal Dasari, a former Baxter employee who joined Bayer earlier this > year, stands accused of copying trade secrets relating to the > manufacturing processes used for a number of Baxter's biopharmaceutical > products. > > Judge Jeffrey White ordered Bayer not to copy or review any files on > Dasari's computers, according to a Bloomberg report. > > Dasari worked for Baxter for approximately six years and during that > time was involved in a number of projects, including one to improve the > manufacturing process for the firm's billion-dollar haemophilia treatment > Recombinate (antihaemophilic factor). Bayer manufactures a rival product > called Kogenate (recombinant Factor VIII). > > Baxter is also seeking damages for its actual losses, plus punitive > damages and triple damages under California's trade secrets statute. > > Meantime, Baxter has been granted US approval for a new plasma- and > albumin-free formulation of recombinant antihaemophilic factor called > Advate. It is produced in genetically engineered Chinese hamster ovary > cells that have been altered to produce factor VIII. > > -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.296 / Virus Database: 265.6.3 - Release Date: 21-12-2004 10474 From: starblue55555@n... Date: Wed Dec 22, 2004 5:56pm Subject: RE: Re: Cases of industrial espionage, bugging, in pharma ind ustries thank you will pick that up from lib MICHAEL 10475 From: kondrak Date: Fri Dec 24, 2004 2:57am Subject: Re: Re: What the F..... is this ? sniff..smells like spam... At 23:45 12/21/2004, you wrote: >thermal optical imaging devices on naro feed strand are currently in use >also fiber borring devices for res use now useing same for gm study > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10476 From: G P Date: Mon Dec 27, 2004 6:14pm Subject: GnuRadio Universal Software Radio released for sale "If a daughterboard is using real sampling (i.e. not quadrature), you could attach as many as 4 receivers & antennas and 4 transmitters & antennas to the USRP. Daughterboards can also be built to use Quadrature sampling, which cuts those numbers in half, but gives better performance in high bandwidth applications. All schematics and design files will be publicly available under a GNU license." Yowza. Very sexy and unbelievably powerful hardware, everything is controlled and programmed (including the FPGA) via USB 2.0, and only $450 USD per board. Amateur SIGINT and GSM chomping coming soon to a garage near you! http://comsec.com/wiki?UniversalSoftwareRadioPeripheral and http://it.slashdot.org/it/04/12/27/1341221.shtml?tid=215&tid=159&tid=218 The USRP is on sale now, and will start shipping in early January. For more details, see [1]. The price for the motherboard is $450, with basic daughterboards costing $50 each. The UniversalSoftwareRadioPeripheral (USRP) is a low-cost, high speed implementation of GnuRadioHardware. It is currently being developed by a team led by MattEttus. --------------------------------- [bigger] --------------------------------- The Rev 1 USRP (pictured above) consists of a main board and up to four daughter boards. It has the following features: USB 2.0 interface (fast enough for HdTv!!!). 4 High-Speed AD Converters (64 MS/s, 12-bit Analog Devices AD9862) which can bandpass-sample signals of up to about 200 MHz, digitizing a band as wide as about 32 MHz. [Data sheet]. 4 High-Speed DA Converters (128 MS/s, 14-bit) to generate signals up to about 50 MHz (same chip as above). Altera EP1C12 Q240C8 "Cyclone" FieldProgrammableGateArray for high bandwidth math, and to reduce the data rates to something you can squirt over USB2. [Data sheet]. Lots of digital, serial, and low speed analog IO for controlling daughterboards 2 Daughterboard slots hold any RF receiver interface or tuner 2 Daughterboard slots hold any RF transmitter Daughterboards now in design or prototype include: dual raw coax connection (SMA connectors to external tuners or signal generators) dual 50-800 MHz RX, 8 MHz IF bandwidth (Microtune 4702 cable modem tuners) 420 - 450 MHz amateur band RX + TX (takes 1 RX + 1 TX slot) 902 - 928 MHz amateur band RX + TX (takes 1 RX + 1 TX slot) 1.24 - 1.30 GHz amateur band RX + TX (takes 1 RX + 1 TX slot) 2.30 - 2.45 GHz amateur band RX + TX (takes 1 RX + 1 TX slot) See RfSections4USRP for daughterboard interface details or breadboarding Possible PCI or PCI-X version later (for higher bus bandwidth) USB bandwidth is our limiting factor. Our standard FPGA configuration includes digital up and down converters implemented with CIC filters. We can sustain 32MB/sec across the USB. The usual i/o format is 16-bit I and 16-bit Q data (complex), resulting in 8M complex samples/sec across the USB. This provides a maximum effective total spectral bandwidth of about 6 MHz. Of course you can select much narrower ranges by changing the decimation rate. In the fully loaded system, the FPGA implements up to 4 digital up and 4 digital down converters. This allows 1, 2 or 4 separate channels to be extracted from the RF region tuned by the daughterboard. (The older Rev 0 prototypes are described at UsrpProtos and UsrpProtoIntro.) Everything (FPGA circuitry and USB Microcontroller) is programmable over the USB2 bus. The FPGA contains digital up and down converters, decimators, interpolators, and glue logic. Highly competent users will be able to reprogram the FPGA to implement other functions too. If a daughterboard is using real sampling (i.e. not quadrature), you could attach as many as 4 receivers & antennas and 4 transmitters & antennas to the USRP. Daughterboards can also be built to use Quadrature sampling, which cuts those numbers in half, but gives better performance in high bandwidth applications. All schematics and design files will be publicly available under a GNU license. Related Pages RfSections4USRP UsrpProtos UsrpProtoIntro USRPnotUSB UsrpProgress --------------------------------- CategoryHardware --------------------------------- GnuRadioWiki | RecentChanges | Preferences Edit text of this page | View other revisions Last edited December 27, 2004 11:31 by h002078c680df.ne.client2.attbi.com (diff) Search: [input] [Non-text portions of this message have been removed] 10477 From: A.Lizard Date: Mon Dec 27, 2004 6:42pm Subject: GNU Radio Project receiver now available it occurred to me that a totally software-defined radio receiver might be of interest to some of the people around here. The software is, of course, Linux www.gnu.org/software/gnuradio/ More info at the URLs. A.Lizard ======================= quote http://comsec.com/wiki?UniversalSoftwareRadioPeripheral The USRP is on sale now, and will start shipping in early January. For more details, see [1]. The price for the motherboard is $450, with basic daughterboards costing $50 each. The UniversalSoftwareRadioPeripheral (USRP) is a low-cost, high speed implementation of GnuRadioHardware. It is currently being developed by a team led by MattEttus. [bigger] The Rev 1 USRP (pictured above) consists of a main board and up to four daughter boards. It has the following features: USB 2.0 interface (fast enough for HdTv!!!). 4 High-Speed AD Converters (64 MS/s, 12-bit Analog Devices AD9862) which can bandpass-sample signals of up to about 200 MHz, digitizing a band as wide as about 32 MHz. [Data sheet]. 4 High-Speed DA Converters (128 MS/s, 14-bit) to generate signals up to about 50 MHz (same chip as above). Altera EP1C12 Q240C8 "Cyclone" FieldProgrammableGateArray for high bandwidth math, and to reduce the data rates to something you can squirt over USB2. [Data sheet]. Lots of digital, serial, and low speed analog IO for controlling daughterboards 2 Daughterboard slots hold any RF receiver interface or tuner 2 Daughterboard slots hold any RF transmitter Daughterboards now in design or prototype include: dual raw coax connection (SMA connectors to external tuners or signal generators) dual 50-800 MHz RX, 8 MHz IF bandwidth (Microtune 4702 cable modem tuners) 420 - 450 MHz amateur band RX + TX (takes 1 RX + 1 TX slot) 902 - 928 MHz amateur band RX + TX (takes 1 RX + 1 TX slot) 1.24 - 1.30 GHz amateur band RX + TX (takes 1 RX + 1 TX slot) 2.30 - 2.45 GHz amateur band RX + TX (takes 1 RX + 1 TX slot) See RfSections4USRP for daughterboard interface details or breadboarding Possible PCI or PCI-X version later (for higher bus bandwidth) USB bandwidth is our limiting factor. Our standard FPGA configuration includes digital up and down converters implemented with CIC filters. We can sustain 32MB/sec across the USB. The usual i/o format is 16-bit I and 16-bit Q data (complex), resulting in 8M complex samples/sec across the USB. This provides a maximum effective total spectral bandwidth of about 6 MHz. Of course you can select much narrower ranges by changing the decimation rate. In the fully loaded system, the FPGA implements up to 4 digital up and 4 digital down converters. This allows 1, 2 or 4 separate channels to be extracted from the RF region tuned by the daughterboard. (The older Rev 0 prototypes are described at UsrpProtos and UsrpProtoIntro.) Everything (FPGA circuitry and USB Microcontroller) is programmable over the USB2 bus. The FPGA contains digital up and down converters, decimators, interpolators, and glue logic. Highly competent users will be able to reprogram the FPGA to implement other functions too. If a daughterboard is using real sampling (i.e. not quadrature), you could attach as many as 4 receivers & antennas and 4 transmitters & antennas to the USRP. Daughterboards can also be built to use Quadrature sampling, which cuts those numbers in half, but gives better performance in high bandwidth applications. All schematics and design files will be publicly available under a GNU license. Related Pages -- member The Internet Society (ISOC), The HTML Writers Guild. "Feudal societies go broke. These top-heavy crony capitalists of the Enron ilk are nowhere near so good at business as they think they are." Bruce Sterling Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@g... PGP 8.0 key available by request or keyserver. Download PGP from: http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html ***Looking for INTELLIGENT new technology public policy alternatives?*** http://www.ecis.com/~alizard/technology.html 10478 From: A Grudko Date: Wed Dec 29, 2004 3:51am Subject: Brunei Travellers Beware Of Hidden Cameras In Hotel http://www.brudirect.com/DailyInfo/News/Archive/Dec04/281204/nite15.htm BruneiDirect.Com . Brunei Travellers Beware Of Hidden Cameras In Hotel By Rosli Abidin Yahya Sarawak - Local travellers have advised prospective holidaymakers going to Sarawak not to stay in budget hotels as "they may be secretly filmed by hidden cameras in their rooms". The finding that hidden cameras were installed in budget hotels in Sarawak was made by the police there when they crippled a syndicate that sold pornographic movies of hotel customers engaging in sexual intercourse. The Borneo Post reported that police in Sarawak believed that some of the locally-made VCDs were filmed by secret video cameras installed in some budget hotel rooms in Sarawak without the knowledge of the hotel clients. However, the police there said they have yet to identify the irresponsible budget hotels. Local travellers said unwitting victims from this country could also be blackmailed by the syndicate though such case was not reported yet. Anyone who might have been secretly filmed should contact the police in Sarawak. Last Wednesday, the Sarawak police smashed a Kuching-based syndicate believed to be behind the production and distribution of pornographic VCDs in the state. Four persons, including the ringleader were arrested and 1,100 pornographic titles were seized. Initial investigation showed that the syndicate not only distributed foreign pornographic VCDs but also used hidden cameras to secretly film guests having sex in budget hotels in Sarawak. Yesterday, the Borneo Post reported that police have advised some 100 budget hotels in Sarawak to ensure that there are no hidden cameras in their rooms. Police said that budget hotels in Sarawak needed to beef up security in order to maintain the state's tourism image. -- Courtesy of Borneo Bulletin Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 [Non-text portions of this message have been removed] 10479 From: James M. Atkinson Date: Wed Dec 29, 2004 2:10pm Subject: Top Central Intelligence analyst resigns [Warrenton and Front Royal is awash in really cheap real estate right now as career spooks are dumping and trying to list their homes during this hemorrhage of the intelligence profession -jma] Top Central Intelligence analyst resigns More than a dozen officials have quit since Goss became CIA chief By Robert Windrem and wire services Updated: 8:40 a.m. ET Dec. 29, 2004 NEW YORK - The top analyst at the CIA is resigning next year, joining more than a dozen agency officials who have stepped down since Porter Goss became the Director of Central Intelligence, NBC News has learned. Jami Miscik, deputy director for intelligence (DDI), told her workforce Tuesday she will be stepping down in February, an official said, speaking on condition of anonymity. The official refused to comment on whether she resigned voluntarily or was asked to step down. No replacement has been named yet. 'Not exactly her decision' Although her resignation did not come as a surprise, a source close to Miscik told NBC News, on condition of anonymity, that "it is not exactly her decision," implying that Goss asked her to leave as part of his house-cleaning of senior staff from the George Tenet era. The New York Times said Miscik, in a message to subordinates, described her resignation as part of a "natural evolution" and that every intelligence chief "has a desire to have his own team in place to implement his vision and to offer him counsel." Miscik is a 21-year veteran of the agency, having joined it immediately after earning her master's degree at the University of Denver. She has served as the DDI since 2002, and was the directorate's second-in-command from 2000 to 2002. As DDI, Miscik was responsible for the preparation of the president's daily intelligence briefing, and oversaw the 1,000-person analytical staff, one of three directorates in the agency. The others are the Directorate of Operations, the agency's clandestine service, and the Directorate of Science and Technology. Since Tenet resigned, two deputy directors of operations have stepped down. Altogether, more than a dozen officials have resigned since Goss, a former congressman who chaired the House Intelligence Committee, became CIA director in September. Goss has appointed his former House aides to top positions. Accusations of politicizing the CIA The changes have raised concerns among some lawmakers and others that Goss was purging intelligence professionals and replacing them with political appointees. But Goss' supporters say he is bringing needed changes to an agency that has been widely criticized for failing to prevent the Sept. 11, 2001, terror attacks and for its faulty intelligence on Saddam Hussein's weapons programs in Iraq. Among the officials who have stepped down is John McLaughlin, who served as acting director following the resignation of George Tenet. McLaughlin retired, citing personal reasons. In addition to the shake-up at the CIA, U.S. intelligence operations are being overhauled as a result of a new law creating a national intelligence center and a powerful new position of national intelligence director to oversee 15 agencies. Robert Windrem is an investigative producer for NBC News. The Associated Press contributed to this report. URL: http://www.msnbc.msn.com/id/6765173/ ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10480 From: A.Lizard Date: Thu Dec 30, 2004 3:28am Subject: metallic paint / paint additive advertised for wireless LAN security \\\\\\\\\\\\\\\\\ quote Startup Markets Wireless-Security Paint Dec. 28, 2004 http://informationweek.com/story/showArticle.jhtml?articleID=56200676 Tiny Force Field Wireless is selling paint laced with aluminum and copper that it claims will keep wireless-network traffic within company walls. By Jim Nash A small startup in Silicon Valley has an anti-intrusion tool that sells for $69 a gallon--you supply the brush. Force Field Wireless makes three products that it says can dramatically reduce the leakage of wireless signals from a room or building. The company's sales manager, Harold Wray, co-developed DefendAir Radio Shield latex paint, which contains copper filings and an aluminum compound. When spread evenly on a wall, the paint reflects signals in frequencies from 100 MHz to 5 GHz. Paint four walls, a floor, and a ceiling, and you effectively have a Faraday cage, which is a specially constructed metal room that blocks all radio signals in or out, suitable for a CIA director or a determined shut-in. "It was my concept along with my colleague, Diane Lopez," says Wray, a former network engineer with Networks Associates. "We knew of people inundated with interference on their wireless systems. In fact, Diane, in her apartment, could find eight wireless networks around her. She needed to shield herself." Pete Lindstrom, research director at Spire Security, says the idea is intriguing. It's for people who have a "mid- to high level of comfort with wireless," Lindstrom says. "The really security conscious are going to ban wireless altogether." DefendAir is nontoxic, contains no lead, and meets all U.S. Environmental Protection Agency standards, Wray says. Besides the paint, Force Field sells 32 ounces of a copper/aluminum powder that homeowners can add to their own paint for $34. The company also makes a window film that cuts down on signal leakage: A 30-inch-by-25-foot roll is priced at $45. "This wouldn't be the first thing I'd do to secure a network," says Spire Security's Lindstrom. "But in a crowded environment, in an office complex, it might be a thing to do." It's better to implement a solid authentication/encryption system, he says. Force Field's Wray says sales are going well. A paint manufacturer delivers 100 gallons once every two months or so, and the paint was sold out last quarter. Businesses make up the bulk of Force Field's customers, but Wray is pushing hard to win over consumers and looking at government sales, too. "Businesses--particularly commercial real-estate developers--see an immediate need for it," he says. Indeed, 71% of those responding to InformationWeek Research's Outlook report for the fourth quarter of '04 say they plan to implement network-security-management apps. Sixty percent say they plan to deploy intrusion-detection software, and 42% plan to fire up wireless IP-based apps. "Consider [radio-frequency identification], where not only are we talking about wireless networking but the whole value of RFID is the message emanating from the tags," says Lindstrom. DefendAir would be an attractive option to protect an RFID-enabled warehouse, he says. There are drawbacks to the paint. It doesn't just block wireless networks. In the home, it would block the one or two remaining TVs connected to rabbit ears. More important, it blocks mobile-phone signals. Wray suggests that businesses either paint only critical parts of buildings or introduce wireless callers to the smokers huddled around the front door. Convincing consumers to take wireless security seriously has been harder. "They see it like tinfoil on your head," Wray says. "They think it's kind of paranoid." Force Field has been trying to interest the Department of Homeland Security, but discussions are ongoing, Wray says. "Ironically, we have had foreign governments contact us--from the Middle East. Kind of scary." Wray says he won't sell to them. \\\\\\\\\\\\\\\\\\\\\\\\\\ end quote Can a paint additive as described in the article be effective in the strength described in the article? Can mobile phone service be enabled within the enclosure by adding a pair of antennas, one inside, one outside with a bandpass filter in-between to allow mobile frequencies to pass through and nothing else? A.Lizard -- member The Internet Society (ISOC), The HTML Writers Guild. "Feudal societies go broke. These top-heavy crony capitalists of the Enron ilk are nowhere near so good at business as they think they are." Bruce Sterling Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@g... PGP 8.0 key available by request or keyserver. Download PGP from: http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html ***Looking for INTELLIGENT new technology public policy alternatives?*** http://www.ecis.com/~alizard/technology.html 10481 From: Michael Puchol Date: Thu Dec 30, 2004 6:42am Subject: Re: metallic paint / paint additive advertised for wireless LAN security I think it would be cheaper to buy some Al or Cu bar and "grind your own" :D Besides, without proper grounding, the faraday cage concept is nonsense. You can take enable certain services inside by placing an external antenna wired to a repeater and internal antenna. Note that unless done carefully, these wires can carry compromising signals to the outside. Best regards, Mike A.Lizard wrote: > > \\\\\\\\\\\\\\\\\ quote > Startup Markets Wireless-Security Paint Dec. 28, 2004 > http://informationweek.com/story/showArticle.jhtml?articleID=56200676 > > Tiny Force Field Wireless is selling paint laced with aluminum and copper > that it claims will keep wireless-network traffic within company walls. > By Jim Nash > > > > A small startup in Silicon Valley has an anti-intrusion tool that sells for > $69 a gallon--you supply the brush. > > Force Field Wireless makes three products that it says can dramatically > reduce the leakage of wireless signals from a room or building. The > company's sales manager, Harold Wray, co-developed DefendAir Radio Shield > latex paint, which contains copper filings and an aluminum compound. When > spread evenly on a wall, the paint reflects signals in frequencies from 100 > MHz to 5 GHz. Paint four walls, a floor, and a ceiling, and you effectively > have a Faraday cage, which is a specially constructed metal room that > blocks all radio signals in or out, suitable for a CIA director or a > determined shut-in. > > "It was my concept along with my colleague, Diane Lopez," says Wray, a > former network engineer with Networks Associates. "We knew of people > inundated with interference on their wireless systems. In fact, Diane, in > her apartment, could find eight wireless networks around her. She needed to > shield herself." > > Pete Lindstrom, research director at Spire Security, says the idea is > intriguing. It's for people who have a "mid- to high level of comfort with > wireless," Lindstrom says. "The really security conscious are going to ban > wireless altogether." > > DefendAir is nontoxic, contains no lead, and meets all U.S. Environmental > Protection Agency standards, Wray says. Besides the paint, Force Field > sells 32 ounces of a copper/aluminum powder that homeowners can add to > their own paint for $34. The company also makes a window film that cuts > down on signal leakage: A 30-inch-by-25-foot roll is priced at $45. > > "This wouldn't be the first thing I'd do to secure a network," says Spire > Security's Lindstrom. "But in a crowded environment, in an office complex, > it might be a thing to do." It's better to implement a solid > authentication/encryption system, he says. > > Force Field's Wray says sales are going well. A paint manufacturer delivers > 100 gallons once every two months or so, and the paint was sold out last > quarter. Businesses make up the bulk of Force Field's customers, but Wray > is pushing hard to win over consumers and looking at government sales, too. > > "Businesses--particularly commercial real-estate developers--see an > immediate need for it," he says. > > Indeed, 71% of those responding to InformationWeek Research's Outlook > report for the fourth quarter of '04 say they plan to implement > network-security-management apps. Sixty percent say they plan to deploy > intrusion-detection software, and 42% plan to fire up wireless IP-based apps. > > "Consider [radio-frequency identification], where not only are we talking > about wireless networking but the whole value of RFID is the message > emanating from the tags," says Lindstrom. DefendAir would be an attractive > option to protect an RFID-enabled warehouse, he says. > > There are drawbacks to the paint. It doesn't just block wireless networks. > In the home, it would block the one or two remaining TVs connected to > rabbit ears. More important, it blocks mobile-phone signals. Wray suggests > that businesses either paint only critical parts of buildings or introduce > wireless callers to the smokers huddled around the front door. > > Convincing consumers to take wireless security seriously has been harder. > "They see it like tinfoil on your head," Wray says. "They think it's kind > of paranoid." > > Force Field has been trying to interest the Department of Homeland > Security, but discussions are ongoing, Wray says. "Ironically, we have had > foreign governments contact us--from the Middle East. Kind of scary." Wray > says he won't sell to them. > \\\\\\\\\\\\\\\\\\\\\\\\\\ end quote > > Can a paint additive as described in the article be effective in the > strength described in the article? > > Can mobile phone service be enabled within the enclosure by adding a pair > of antennas, one inside, one outside with a bandpass filter in-between to > allow mobile frequencies to pass through and nothing else? > > A.Lizard > -- > member The Internet Society (ISOC), The HTML Writers Guild. > "Feudal societies go broke. These top-heavy crony capitalists of the Enron > ilk are nowhere near so good at business as they think they are." Bruce > Sterling > Personal Website http://www.ecis.com/~alizard > business Website http://reptilelabs.com > backup address (if ALL else fails) alizard@g... > PGP 8.0 key available by request or keyserver. Download PGP from: > http://www.pgpi.org for e-mail privacy. > Disaster prep info: http://www.ecis.com/~alizard/y2k.html > ***Looking for INTELLIGENT new technology public policy alternatives?*** > http://www.ecis.com/~alizard/technology.html 10482 From: contranl Date: Thu Dec 30, 2004 7:49am Subject: Re: Cases of industrial espionage, bugging, in pharma industries . Ran in to this report that might be helpful: http://www.global-teck.com/english/pdfs/infolosssurvey.pdf It says it's sponsored by PriceWaterhouseCoopers ...you know those accountants. By the way have you noticed how more and more these kind of accountancy firms are going in to the secirity business including TSCM...just like for example KPMG ...those are very big companies and i guess they more and more consider this as a substantial part of there activities wich used to be accounting and numbers-cracking only. I guess the reason for that would be not becuase they are so good at it but more because they already have a good relation with a customer based on confidentiality...so getting involved in their security problems would be a small step. Best wishes and a happy newyear ! Tetrascanner . 10483 From: contranl Date: Thu Dec 30, 2004 8:00am Subject: Re: metallic paint / paint additive advertised for wireless LAN security . Might also be interesting for shielding against outside radiation from GSM,UMTS.TETRA wich is currently a hot topic in Europe. The copperpowder additive that you can mix with paint ...makes this company less credible...i don't think that such a mix could serve as a good shield simple because it's not conductive enough. But hey that's just my theory...who know's ? Tetrascanner . 10484 From: mark de Boer Date: Thu Dec 30, 2004 0:08pm Subject: Re: metallic paint / paint additive advertised for wireless LAN security Don't spend money on this type of products, i have done research for a client for building a cage of Faraday for security purpose. If not done 100% the "secured"room can function as an directional antenna. Paint won't work on doors,windows,and wires and piping. with frequencies in WLAN from 2,4 to 5,8 Hz the waves are very difficult to stop leaving the building. For a -80Db loss in a wide frequency range you need a million dollar investment. M.de Boer rrbsecurity rd@e...> wrote: \\\\\\\\\\\\\\\\\ quote Startup Markets Wireless-Security Paint Dec. 28, 2004 http://informationweek.com/story/showArticle.jhtml?articleID=56200676 Tiny Force Field Wireless is selling paint laced with aluminum and copper that it claims will keep wireless-network traffic within company walls. By Jim Nash A small startup in Silicon Valley has an anti-intrusion tool that sells for $69 a gallon--you supply the brush. Force Field Wireless makes three products that it says can dramatically reduce the leakage of wireless signals from a room or building. The company's sales manager, Harold Wray, co-developed DefendAir Radio Shield latex paint, which contains copper filings and an aluminum compound. When spread evenly on a wall, the paint reflects signals in frequencies from 100 MHz to 5 GHz. Paint four walls, a floor, and a ceiling, and you effectively have a Faraday cage, which is a specially constructed metal room that blocks all radio signals in or out, suitable for a CIA director or a determined shut-in. "It was my concept along with my colleague, Diane Lopez," says Wray, a former network engineer with Networks Associates. "We knew of people inundated with interference on their wireless systems. In fact, Diane, in her apartment, could find eight wireless networks around her. She needed to shield herself." Pete Lindstrom, research director at Spire Security, says the idea is intriguing. It's for people who have a "mid- to high level of comfort with wireless," Lindstrom says. "The really security conscious are going to ban wireless altogether." DefendAir is nontoxic, contains no lead, and meets all U.S. Environmental Protection Agency standards, Wray says. Besides the paint, Force Field sells 32 ounces of a copper/aluminum powder that homeowners can add to their own paint for $34. The company also makes a window film that cuts down on signal leakage: A 30-inch-by-25-foot roll is priced at $45. "This wouldn't be the first thing I'd do to secure a network," says Spire Security's Lindstrom. "But in a crowded environment, in an office complex, it might be a thing to do." It's better to implement a solid authentication/encryption system, he says. Force Field's Wray says sales are going well. A paint manufacturer delivers 100 gallons once every two months or so, and the paint was sold out last quarter. Businesses make up the bulk of Force Field's customers, but Wray is pushing hard to win over consumers and looking at government sales, too. "Businesses--particularly commercial real-estate developers--see an immediate need for it," he says. Indeed, 71% of those responding to InformationWeek Research's Outlook report for the fourth quarter of '04 say they plan to implement network-security-management apps. Sixty percent say they plan to deploy intrusion-detection software, and 42% plan to fire up wireless IP-based apps. "Consider [radio-frequency identification], where not only are we talking about wireless networking but the whole value of RFID is the message emanating from the tags," says Lindstrom. DefendAir would be an attractive option to protect an RFID-enabled warehouse, he says. There are drawbacks to the paint. It doesn't just block wireless networks. In the home, it would block the one or two remaining TVs connected to rabbit ears. More important, it blocks mobile-phone signals. Wray suggests that businesses either paint only critical parts of buildings or introduce wireless callers to the smokers huddled around the front door. Convincing consumers to take wireless security seriously has been harder. "They see it like tinfoil on your head," Wray says. "They think it's kind of paranoid." Force Field has been trying to interest the Department of Homeland Security, but discussions are ongoing, Wray says. "Ironically, we have had foreign governments contact us--from the Middle East. Kind of scary." Wray says he won't sell to them. \\\\\\\\\\\\\\\\\\\\\\\\\\ end quote Can a paint additive as described in the article be effective in the strength described in the article? Can mobile phone service be enabled within the enclosure by adding a pair of antennas, one inside, one outside with a bandpass filter in-between to allow mobile frequencies to pass through and nothing else? A.Lizard -- member The Internet Society (ISOC), The HTML Writers Guild. "Feudal societies go broke. These top-heavy crony capitalists of the Enron ilk are nowhere near so good at business as they think they are." Bruce Sterling Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@g... PGP 8.0 key available by request or keyserver. Download PGP from: http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html ***Looking for INTELLIGENT new technology public policy alternatives?*** http://www.ecis.com/~alizard/technology.html ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups SponsorADVERTISEMENT --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- ALL-NEW Yahoo! Messenger - all new features - even more fun! [Non-text portions of this message have been removed] 10485 From: Tech Sec Lab Date: Fri Dec 31, 2004 6:44am Subject: What I've learned as I've Matured [OT] --Thought some people might find this funny... Happy new year to all the characters on the list (Andy, Jim, Kondrak, Contra, Roger, Shaddack, Michael etc...)! -Ois ****************************** What I've learned as I've Matured I've learned that you cannot make someone love you, all you can do is stalk them and hope the panic and give in. I've learned that no matter how much I care, some people are just assholes. I've learned that it takes years to build up trust, and it only takes suspicion, not proof, to destroy it. I've learned that you can get by on charm for about 20 minutes, after that you'd better be hung like a horse or have a huge boobs. I've learned that you shouldn't compare yourself to others, they are more screwed up than you think. I've learned that you can keep vomiting long after you think you're finished. I've learned that we are responsible for what we do, unless we are celebrities or have heaps of dosh. I've learned that regardless of how hot and steamy a relationship is at first, the passion fades, and there had better be a lot of money to take it's place. I've learned that the people you care about the most in life are taken from you all too soon, and the less important ones just never go away. I've learned to say "F**k 'em if they can't take a joke!" in six different languages, thinking back on it anyway... -Anonymous(Eire) 10486 From: James M. Atkinson Date: Fri Dec 31, 2004 5:36pm Subject: Happy New Year I would like to wish everybody on the list a very Happy New Year. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10487 From: Date: Sat Jan 1, 2005 5:22am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 10488 From: J.A. Terranson Date: Thu Dec 30, 2004 9:08pm Subject: Re: Re: Cases of industrial espionage, bugging, in pharma industries On Thu, 30 Dec 2004, contranl wrote: > By the way have you noticed how more and more these kind of > accountancy firms are going in to the secirity business including > TSCM...just like for example KPMG ...those are very big companies > and i guess they more and more consider this as a substantial part > of there activities wich used to be accounting and numbers-cracking > only. > > I guess the reason for that would be not becuase they are so good at > it but more because they already have a good relation with a > customer based on confidentiality...so getting involved in their > security problems would be a small step. Interestingly, they are getting traction. Even though they sport some of the worst "talent" that certifications can buy :-/ The biggest "draw" is Sarbanes-Oxley/COBiT. Since they "need" a signature for SOX, and since accountants have had the power to "sign off" on a company's books for eons, having the accountants provide the seal of approval is seen as an easy and painless way to get past the new compliance issues as easily as possible. Unfortunately, the goal is not usually to protect the business, it's to get past the process so the business can "get on with it". The few who are serious about protecting themselves are those rare fish the rest of us end up having to swarm over :-/ -- Yours, J.A. Terranson 10489 From: James Greenwold Date: Thu Dec 30, 2004 5:13pm Subject: Re: metallic paint / paint additive advertised for wireless LAN security When we were doing emmisions test in a screen room, it was a solid metal room on all 6 sides and the cables were run out holes that were stuffed with metal penitrated rubber gaskets. Each set up had to be tested for holes where emmisions escaped. And we usually found them. It is unlikely that paint with particles would produce a solid barrier or even a consistant barrier appearing solid to microwave frequencies. -- Thank you for your time James Greenwold Bureau Of Technical Services 715-726-1400 bts@t... > From: mark de Boer > Reply-To: TSCM-L@yahoogroups.com > Date: Thu, 30 Dec 2004 18:08:15 +0000 (GMT) > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] metallic paint / paint additive advertised for wireless > LAN security > > > > Don't spend money on this type of products, i have done research for a client > for building a cage of Faraday for security purpose. > If not done 100% the "secured"room can function as an directional antenna. > Paint won't work on doors,windows,and wires and piping. > with frequencies in WLAN from 2,4 to 5,8 Hz the waves are very difficult to > stop leaving the building. > For a -80Db loss in a wide frequency range you need a million dollar > investment. > > M.de Boer > rrbsecurity > > rd@e...> wrote: > > \\\\\\\\\\\\\\\\\ quote > Startup Markets Wireless-Security Paint Dec. 28, 2004 > http://informationweek.com/story/showArticle.jhtml?articleID=56200676 > > Tiny Force Field Wireless is selling paint laced with aluminum and copper > that it claims will keep wireless-network traffic within company walls. > By Jim Nash > > > > A small startup in Silicon Valley has an anti-intrusion tool that sells for > $69 a gallon--you supply the brush. > > Force Field Wireless makes three products that it says can dramatically > reduce the leakage of wireless signals from a room or building. The > company's sales manager, Harold Wray, co-developed DefendAir Radio Shield > latex paint, which contains copper filings and an aluminum compound. When > spread evenly on a wall, the paint reflects signals in frequencies from 100 > MHz to 5 GHz. Paint four walls, a floor, and a ceiling, and you effectively > have a Faraday cage, which is a specially constructed metal room that > blocks all radio signals in or out, suitable for a CIA director or a > determined shut-in. > > "It was my concept along with my colleague, Diane Lopez," says Wray, a > former network engineer with Networks Associates. "We knew of people > inundated with interference on their wireless systems. In fact, Diane, in > her apartment, could find eight wireless networks around her. She needed to > shield herself." > > Pete Lindstrom, research director at Spire Security, says the idea is > intriguing. It's for people who have a "mid- to high level of comfort with > wireless," Lindstrom says. "The really security conscious are going to ban > wireless altogether." > > DefendAir is nontoxic, contains no lead, and meets all U.S. Environmental > Protection Agency standards, Wray says. Besides the paint, Force Field > sells 32 ounces of a copper/aluminum powder that homeowners can add to > their own paint for $34. The company also makes a window film that cuts > down on signal leakage: A 30-inch-by-25-foot roll is priced at $45. > > "This wouldn't be the first thing I'd do to secure a network," says Spire > Security's Lindstrom. "But in a crowded environment, in an office complex, > it might be a thing to do." It's better to implement a solid > authentication/encryption system, he says. > > Force Field's Wray says sales are going well. A paint manufacturer delivers > 100 gallons once every two months or so, and the paint was sold out last > quarter. Businesses make up the bulk of Force Field's customers, but Wray > is pushing hard to win over consumers and looking at government sales, too. > > "Businesses--particularly commercial real-estate developers--see an > immediate need for it," he says. > > Indeed, 71% of those responding to InformationWeek Research's Outlook > report for the fourth quarter of '04 say they plan to implement > network-security-management apps. Sixty percent say they plan to deploy > intrusion-detection software, and 42% plan to fire up wireless IP-based apps. > > "Consider [radio-frequency identification], where not only are we talking > about wireless networking but the whole value of RFID is the message > emanating from the tags," says Lindstrom. DefendAir would be an attractive > option to protect an RFID-enabled warehouse, he says. > > There are drawbacks to the paint. It doesn't just block wireless networks. > In the home, it would block the one or two remaining TVs connected to > rabbit ears. More important, it blocks mobile-phone signals. Wray suggests > that businesses either paint only critical parts of buildings or introduce > wireless callers to the smokers huddled around the front door. > > Convincing consumers to take wireless security seriously has been harder. > "They see it like tinfoil on your head," Wray says. "They think it's kind > of paranoid." > > Force Field has been trying to interest the Department of Homeland > Security, but discussions are ongoing, Wray says. "Ironically, we have had > foreign governments contact us--from the Middle East. Kind of scary." Wray > says he won't sell to them. > \\\\\\\\\\\\\\\\\\\\\\\\\\ end quote > > Can a paint additive as described in the article be effective in the > strength described in the article? > > Can mobile phone service be enabled within the enclosure by adding a pair > of antennas, one inside, one outside with a bandpass filter in-between to > allow mobile frequencies to pass through and nothing else? > > A.Lizard > -- > member The Internet Society (ISOC), The HTML Writers Guild. > "Feudal societies go broke. These top-heavy crony capitalists of the Enron > ilk are nowhere near so good at business as they think they are." Bruce > Sterling > Personal Website http://www.ecis.com/~alizard > business Website http://reptilelabs.com > backup address (if ALL else fails) alizard@g... > PGP 8.0 key available by request or keyserver. Download PGP from: > http://www.pgpi.org for e-mail privacy. > Disaster prep info: http://www.ecis.com/~alizard/y2k.html > ***Looking for INTELLIGENT new technology public policy alternatives?*** > http://www.ecis.com/~alizard/technology.html > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > Yahoo! Groups SponsorADVERTISEMENT > > > --------------------------------- > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > > > > --------------------------------- > ALL-NEW Yahoo! Messenger - all new features - even more fun! > > [Non-text portions of this message have been removed] > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10490 From: kondrak Date: Sat Jan 1, 2005 9:44pm Subject: Re: Happy New Year Same you you and yours and all the TSCM'ers... At 18:36 12/31/2004, you wrote: >I would like to wish everybody on the list a very Happy New Year. > >-jma > > > >---------------------------------------------------------------------------------------------------- >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >---------------------------------------------------------------------------------------------------- > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10491 From: littledog Date: Sun Jan 2, 2005 1:04am Subject: Re: Happy New Year And may the best be yet to come!> -----Original Message----- > From: kondrak [mailto:kondrak@s...] > Sent: Saturday, January 01, 2005, 7:43 PM > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] Happy New Year > > > > Same you you and yours and all the TSCM'ers... > > At 18:36 12/31/2004, you wrote: > > > >I would like to wish everybody on the list a very Happy New Year. > > > >-jma > > > > > > > > >----------------------------------------------------------------------------- > ----------------------- > >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > > >----------------------------------------------------------------------------- > ----------------------- > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 Web: > http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > > >----------------------------------------------------------------------------- > ----------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > > >----------------------------------------------------------------------------- > ----------------------- > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10492 From: Merl Klein Date: Sun Jan 2, 2005 11:13am Subject: Re: Re: Cases of industrial espionage, bugging, in pharma industries It comes as no surprise to me that a major Audit firm would suppport ASIS in the research and production of a report on Proprietary Information and Intellectual property loss. Most of the major Audit firms in Canada have been offering this service for many years. It Comes as part of the due diligence package provided during major audits, compliance audits, and acquisitions. Here in Western Canada, the four major audit firms usually refer or subcontract this work to our company. We place a very high priority on education in our firm were all of our operational employees are at least at the Technologist Level in Electrical Engineering. Our employees have a firm understanding of all of the communication technologies involved in clandestine surveillance operations and strive to keep up to date through formal education courses, and Law Enforcement conferences. A far cry from 2 week, 4 week or even 6 months of equipment based training. You have to understand the technology to give your customer a quality product. I have also noted that the people I deal with at these firms have a reasonable understanding of what TSCM is, and how it relates to the security product they are providing. This report is good marketing for all of us, and quality information for all of Price's customers and the chamber of Comerce members. A good deal all around. Merl ----- Original Message ----- From: J.A. Terranson To: TSCM-L@yahoogroups.com Sent: Thursday, December 30, 2004 7:08 PM Subject: Re: [TSCM-L] Re: Cases of industrial espionage, bugging, in pharma industries On Thu, 30 Dec 2004, contranl wrote: > By the way have you noticed how more and more these kind of > accountancy firms are going in to the secirity business including > TSCM...just like for example KPMG ...those are very big companies > and i guess they more and more consider this as a substantial part > of there activities wich used to be accounting and numbers-cracking > only. > > I guess the reason for that would be not becuase they are so good at > it but more because they already have a good relation with a > customer based on confidentiality...so getting involved in their > security problems would be a small step. Interestingly, they are getting traction. Even though they sport some of the worst "talent" that certifications can buy :-/ The biggest "draw" is Sarbanes-Oxley/COBiT. Since they "need" a signature for SOX, and since accountants have had the power to "sign off" on a company's books for eons, having the accountants provide the seal of approval is seen as an easy and painless way to get past the new compliance issues as easily as possible. Unfortunately, the goal is not usually to protect the business, it's to get past the process so the business can "get on with it". The few who are serious about protecting themselves are those rare fish the rest of us end up having to swarm over :-/ -- Yours, J.A. Terranson ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10493 From: kondrak Date: Sun Jan 2, 2005 7:37pm Subject: Re: Happy New Year INDEED! At 02:04 1/2/2005, you wrote: >And may the best be yet to come!> -----Original Message----- > > From: kondrak [mailto:kondrak@s...] > > Sent: Saturday, January 01, 2005, 7:43 PM > > To: TSCM-L@yahoogroups.com > > Subject: Re: [TSCM-L] Happy New Year > > > > > > > > Same you you and yours and all the TSCM'ers... > > > > At 18:36 12/31/2004, you wrote: > > > > > > >I would like to wish everybody on the list a very Happy New Year. > > > > > >-jma > > > > > > > > > > > > > >----------------------------------------------------------------------- > ------ > > ----------------------- > > >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > > > > >----------------------------------------------------------------------- > ------ > > ----------------------- > > > James M. Atkinson Phone: (978) 381-9111 > > > Granite Island Group Fax: > > > 127 Eastern Avenue #291 Web: > > http://www.tscm.com/ > > > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > > > > >----------------------------------------------------------------------- > ------ > > ----------------------- > > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > > >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > > > > >----------------------------------------------------------------------- > ------ > > ----------------------- > > > > > > > > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > the hands acquire shaking, the shaking is a warning. > > > It is by caffeine alone I set my mind in motion. > > >=================================================== TSKS > > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10494 From: Hawkspirit Date: Sun Jan 2, 2005 9:53pm Subject: Sweep needed Sweep needed in South Africa. Roger Tolces Electronic Security. Co. HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.825 / Virus Database: 563 - Release Date: 12/30/2004 [Non-text portions of this message have been removed] 10495 From: Mitch D Date: Mon Jan 3, 2005 1:02am Subject: Re: CCSI--need info about this company please Its either sonitrol or possibly something to do w Cassie Smith companies pull bureaus all the time with some BS claim for marketing you can contact the bureau and have em see who pulled it --- huzypuzy wrote: > > > Hello to everyone ! > > > Maybe this is way of topic but I need help identifying this > company : > > CCSI > 8 Campus Cir > Westlake , TX 76262 > > This company has made an inquiry on my credit report and I'm > dead > curious who is it or what is it. Every atempt to find out > myself from > various internet sources , have failed. I found some company > called > Sonitrol of Forth Worth listed at this address , but it turns > out that > is not the misterious CCSI. Is a big building I believe with > many > companies. > Maybe someone of you , knows exactly who this is . I > appreciate any > help you can give. > > In the mean time , Merry Christmas to all TSCM-L members ! > > M. Huzau > > > > > > > ===== Mitch Davis TSCM/Special Operations Group Inc. Nashville,TN.USA MitchD@t... site:www.tscmusa.com. Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 From: Date: Sun Dec 22, 2002 8:08am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6664 From: Steve Uhrig Date: Sun Dec 22, 2002 11:25am Subject: DOE still looking for TSCM services http://e-center.doe.gov/iips/busopor.nsf/Solicitation+By+Number/DE- RP08-03NV14328?OpenDocument This is a typical procurement for the U.S. government. They put it out a while back and apparently no one made an offer, or they considered no one to be qualified so they reissued it. Or, more likely, anyone qualified doesn't have the patience to deal with all the nonsense and paperwork. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6665 From: James M. Atkinson Date: Sun Dec 22, 2002 8:28pm Subject: Re: DOE still looking for TSCM services At 12:25 PM -0500 12/22/02, Steve Uhrig wrote: >http://e-center.doe.gov/iips/busopor.nsf/Solicitation+By+Number/DE- >RP08-03NV14328?OpenDocument > >This is a typical procurement for the U.S. government. > >They put it out a while back and apparently no one made an offer, or >they considered no one to be qualified so they reissued it. > >Or, more likely, anyone qualified doesn't have the patience to deal >with all the nonsense and paperwork. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* It's just a helpful hint to the list, but the DOE currently budgets just over $5,000 per day for a two man sweep detail. That works out to about $2500 per person, per day, with a typical sweep taking four days (or 64 man hours). DOE TSCM Sweeps YearNumberCostCost Per2 yr Average 1993330,00010,00010,000 199410,000 1995115,00015,00015,000 1996115,00015,00015,000 1997110,00010,00012,500 1998354,00018,00014,000 1999460,00015,00016,500 2000360,00020,00017,500 DOE TSCM Advice and Assists YearNumberCost 1993 1994 1995 1996110,000 199715,000 1998 199915,000 2000 So, according to the DOE, a typical high threat government bug sweep should cost around $20,000, and take 2 people, four days (more or less). Also, the two techs will need a cargo vehicle/van, plus $300,000 or more in equipment; a security clearance, and so on. This realistically means the contractor will need close to million in equipment, and charge $250-275 per tech, per hour, with a typical project requiring 60-80 man hours. ------ http://e-center.doe.gov/iips/busopor.nsf/Solicitation+By+Number/DE-RP08-03NV14328?OpenDocument U.S. Department of Energy Industry Interactive Procurement System SYNOPSIS INFORMATION Solicitation Number:DE-RP08-03NV14328 Title:Technical Surveillance Countermeasures Services Description:The National Nuclear Security Administration Nevada Operations Office (NNSA/NV) is seeking small business sources capable of providing Technical Surveillance Countermeasures (TSCM) services at its North Las Vegas, NV facility and others specified below. The contractor shall furnish all necessary personnel and services needed for, or incidental to, performing the required activities. The mission of the TSCM contractor is to perform surveys of NNSA/NV facilities in accordance with DOE orders specific to TSCM. These services include but are not limited to TSCM Surveys, TSCM Inspections, TSCM Monitors, TSCM Special Activities, TSCM Advice and Assistance, and TSCM Briefings. These services are defined in the Technical Surveillance Countermeasures Procedural Manual dated October 1994 (classified). TSCM work will primarily be performed at the locations listed below. However, other locations for services may arise. The NNSA/NV TSCMOM will provide information relating to additional sites as necessary. All of the locations listed below are secured facilities and only authorized personnel may gain entry. Primary work locations are: NNSA/NV, Las Vegas, NV; Nevada Test Site, Mercury, NV; Remote Sensing Laboratory - West, Las Vegas, NV; NNSA/NV Contractor facilities, Las Vegas, NV; Remote Sensing Laboratory ? East, Andrews Air Force Base, MD; Special Technologies Laboratory, Santa Barbara, CA, and other DOE and/or NNSA facilities. NNSA/NV intends to issue a 12-month firm-fixed-price contract with up to four 12-month option periods. All proposals are required to be submitted through DOE?s Industry Interactive Procurement System (IIPS) in accordance with the following instructions and the IIPS User Guide which can be obtained by going to the IIPS Secured Services site at http://doe-iips.pr.doe.gov/ and downloading the file named IIPShelp.rtf. Applicants must register in IIPS in order to submit an application as directed. Questions regarding the operation of IIPS shall be directed to the number 1-800-683-0751. Registration on the IIPS is a pre-requisite to participate in this solicitation. Only registered users will have the capability to transmit their technical proposals in a responsive manner. Once prospective offerors are registered, only NNSA evaluators will have access to proposal information. A signature on the IIPS is the typed name of the applicant. All proposals must have an IIPS transmission time stamp of not later than January 22, 2003, at 3:00 p.m. Pacific Daylight Time. Prospective offerors are responsible for checking the IIPS website at regular intervals for updates since any additional changes or amendments will only be posted to this website. No other notification will be made. If this solicitation is amended, all terms and conditions that are not amended remain unchanged. Offerors shall acknowledge receipt of any amendment to this solicitation by the date and time specified in the amendment(s). Any proposal, modification, or revision received at the IIPS website designated in the solicitation after the exact time specified for receipt of offers is "late" and will not be considered unless it is the only proposal received. All questions regarding this solicitation must be submitted in writing via fax to (702) 295-5305 or via email henderson@n..., typed, or hand scribed during the tour. There will be no responses to verbalized questions to ensure all prospective offerors receive the same information. Link to Numbered Notes Requiring Activity:AMTS Classification CodesR NAICS Codes561990 Simplified Acquisition?:no Type of Action:Set Aside - Total Small Business Contracting Officer Name:Darby Dieterich Contracting Officer Phone:702-295-1560 Contracting Officer E-mail:dieterich@n... Contract Specialist Name:Tammie Henderson Contract Specialist Phone:702-295-2298 Contract Specialist E-mail:henderson@n... -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6666 From: frost_bitten_ca Date: Fri Dec 20, 2002 5:37am Subject: Poindexter gets taste of own medicine POSTED AT 12:33 PM EDT Thursday, December 19 Poindexter gets taste of own medicine Associated Press New York ≠ Upset about his research into linking private information from various databases to glean patterns of terrorist activities, several Internet users have responded by circulating his home phone number, address and other private information. The search engine Google produced about 130 mentions of his phone number at Web sites, including ones in Spanish and Portuguese. Another 106 appeared in newsgroup postings. Internet activist John Gilmore went further and posted phone numbers for Mr. Poindexter's neighbors at one site, which also had maps and satellite images of his home in Rockville, Md. "The idea is to spread the word about what the medicine tastes like," Mr. Gilmore said. "He ought to know and his neighbors ought to know and people he associates with ought to know ... the taste is pretty bitter." Mr. Poindexter, a controversial former national security adviser, heads a program at the Defense Advanced Research Projects Agency to test tools for combing through commercial and government databases ≠ credit card transactions, motor vehicle records, purchases through supermarket discount programs. The idea is to discern patterns from people's electronic traces ≠ perhaps predict behaviour and prevent terrorist attacks. The latest protest against the Total Information Awareness project began when Matt Smith, a columnist for the San Francisco alternative paper SF Weekly, suggested that readers "band together and look for patterns in John and [his wife] Linda Poindexter's personal activity." The column, also published on-line, included the Poindexters' home number and details about their house gleaned from tax records. That number now produces a greeting: "We're sorry, the party you are calling is not available at this time." Through a spokeswoman, Mr. Poindexter declined comment. http://rtnews.globetechnology.com/servlet/ArticleNews/tech/RTGAM/20021 219/gtpoin/Technology/techBN/ 6667 From: Larry Malmberg Date: Fri Dec 20, 2002 10:25am Subject: England Address I hope this posting is appropriate. A very big THANK YOU to all that have responded to me, way too many to mention by name. This list is awesome. Upon completion of this "investigation" I will post the results, if appropriate, to all to satisfy the curious. Also, to those that are still making inquiries please keep in touch on them. I OWE all of you so don't be hesitant to ask for the favor returned. Best regards, Larry Malmberg Larry Malmberg Investigations and Security, Inc. 638 North D Street San Bernardino, CA 92401-1110 909-383-8565, 800-655-4549 Facsimile 909-383-8566 PI 15211, PPO 112446 www.larrypi.com Lead me not into temptation, I can find it myself! 6668 From: ed Date: Fri Dec 20, 2002 11:59am Subject: Re: Re: Portable phone suggestions... i concur with steve's recommendation on the engenius SN-920, which i've installed for several clients. the CDMA signal is secure against casual eavesdroppers. the newer engenius EP-436 uses TDMA and (in my opinion) has an inferior CODEC resulting in poorer voice quality than the SN-920. both systems (especially the EP-436) generate excessive RF interference to FM broadcast band receivers and computer video monitors. for that reason it's surprising to me that either was FCC type-accepted. while the EP-436 handset is smaller and kinder on batteries, the keys don't feel as good. unlike the SN-920, it uses a central single base station that accommodates up to four POTS lines and 36 addressable handsets. as steve mentioned, the EP-436 cannot choose which line your outgoing call will seize. it does have a side mounted jack for use with most common cellular/pcs headsets, while the SN-920 handset requires an klunky adapter plugged into the bottom for this. with the outdoor 900mhz discone antenna mounted at a good relative height, 1km range should be easily achievable with either system. both system's handsets can be configured as full-duplex(!) handie-talkies without the base station, which might come in handy on jobs with more than one tech. -ed At 10:39 PM 12/19/02 -0500, Steve@s... wrote: >On 18 Dec 2002 at 17:42, Ocean Group wrote: > > > I was wondering if anyone had any relevent ideas this... I have a > > client that we just installed a new isdn(euro) pbx for and he is > > looking for a cordless phone, small, ruggedised and with a -good- range > > that he can add to it. A 1km range would be fine as long as thats the > > pratical value and not the line of sight value. > >Many companies make many claims. > >My home and office are next door to each other, and I live in the >country with a fairly large place. I like cordless phones that will >work in the house, the shop, the barn, all the way up to the mailbox >and all the way back to the pond. > >I've owned perhaps 15 cordless phones. > >The ONLY one which was satisfactory was the Engenius SN-920. You can >have multiple lines and multiple handsets. The thing is 900 megacycle >CDMA, base 900 milliwatts and handset 600 milliwatts. I get 100% >coverage anywhere on my properties and in all buildings with the >stubby antenna on the handset and the built in base antennas. > >You get stubby and long antennas with the handset, and can add an >outside antenna to the base for apparently very impressive coverage. >I get totally adequate coverage with the minimum antennas. > >The Engenius system is industrial grade rugged, not consumer plastic >castings. I am very pleased with it. You also can communicate handset >to handset full duplex with CDMA security, without the need for the >base station. So you can use them in caravans or as full duplex >portable communications anywhere. They accept headsets if you need >hands-free operation. The handsets are a slight bit larger than an >average cell phone, and nearly every visitor you hand one to when >they need a phone thinks it is a cell phone. > >The cheapest place I have found, by far, to buy them is Teledynamics >www.teledynamics.com. They are a wholesaler only, so use a company >name if you talk to them. They will sell over the phone with a credit >card. You have to call them for prices, but I have their catalog and >sales flyer here and they were $30 cheaper on a spare handset then >the next cheapest place I had been dealing with. I have three lines >and four handsets on the system at work, have for a year, and have >had zero problems. > >Do a Google search to find specs (it's NOT engenius.com. That's a >different company), but you'll probably find the best prices at >Teledynamics. > >The manual is not all that great, but tech support is excellent and I >have never waited more than 30 seconds to get a real live tech who >knows the system inside and out and will tell you all sorts of secret >functions not mentioned in the manual. > >I have no doubt you would get a reliable 1km out of the system if you >used an outside antenna, and maybe not even that. I have not range >tested mine, but I'm definitely getting 500 feet through buildings >and woods long ways diagonal on my properties. > >There is a newer system than SN-920 from Engenius which I do NOT >recommend. Its only major benefits are it can handle more CO lines >and more handsets, but it has disadvantages in that you cannot choose >which outgoing line you use when you place the call. With the SN-920 >you can. > >Charles Patterson on the list here is our resident telephone commo >expert. See what he has to suggest and listen to him. I do. > >Regards ... Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6669 From: Ben Evans Date: Thu Dec 19, 2002 11:00pm Subject: TSCM Class Just a reminder to those on the list here that were interested in our TSCM class coming up 2/3/02 --> 2/7/02 -- We have 6 seats open still if you would like to register. You can find more information on the class at: http://www.cisginc.com/tscmclass.shtml It is taught by Mr. William Buchholz, a TSCM professional for the last 15 years. The hands on training is held in Tampa, FL usually twice per year. Cordially, -Ben ----------------------------------------------- Counter Intelligence Solutions Group, Inc. http://www.cisginc.com/ Corporate Website http://www.spywholesalers.com/ Covert Cameras http://www.slantback.com Just for fun 585.889.2321(v) 585.889.0823(f) ----------------------------------------------- 6670 From: Kevin Murray Date: Sun Dec 22, 2002 9:46pm Subject: Re: DOE still looking for TSCM services According to the Solicitation, the government will be supplying ALL instrumentation. It also mentions the total budget set-aside is $6.0 million. They even are allowing for joint-venturing. If you are qualified, and have some free time, this seems worthy of consideration. They have the equipment. They are looking for talent. Kevin Kevin D. Murray - CPP, CFE, BCFE Murray Associates Eavesdropping Detection and Counterespionage Consultants to Business & Government http://www.spybusters.com On Sunday, December 22, 2002, at 09:28 PM, James M. Atkinson wrote: > Also, the two techs will need a cargo vehicle/van, plus $300,000 or > more in equipment; a security clearance, and so on. > > This realistically means the contractor will need close to million in > equipment, and charge $250-275 per tech, per hour, with a typical > project requiring 60-80 man hours. 6671 From: James M. Atkinson Date: Sun Dec 22, 2002 10:14pm Subject: 25 Signs You've Grown Up 1. Your house plants are alive, and you can't smoke any of them. 2. Having sex in a twin bed is out of the question. 3. You keep more food than beer in the fridge. 4. 6:00 AM is when you get up, not when you go to bed. 5. You hear your favorite song on an elevator. 6. You watch the Weather Channel. 7. Your friends marry and divorce instead of hook up and break up. 8. You go from 130 days of vacation time to 14. 9. Jeans and a sweater no longer qualify as "dressed up." 10. You're the one calling the police because those damn kids next door won't turn down the stereo. 11. Older relatives feel comfortable telling sex jokes around you. 12. You don't know what time Taco Bell closes anymore. 13. Your car insurance goes down and your payments go up. 14. You feed your dog Science Diet instead of McDonalds leftovers. 15. Sleeping on the couch makes your back hurt. 16. You no longer take naps from noon to 6 PM. 17. Dinner and a movie is the whole date instead of the beginning of one. 18. Eating a basket of chicken wings at 3 AM would severely upset, rather than settle, your stomach. 19. You go to the drug store for ibuprofen and antacid, not condoms and pregnancy tests. 20. A $4.00 bottle of wine is no longer "pretty good stuff." 21. You actually eat breakfast food at breakfast time. 22. "I just can't drink the way I used to," replaces, "I'm never going to drink that much again." 23. 90% of the time you spend in front of a computer is for real work. 24. You no longer drink at home to save money before going to a bar. 25. You read this entire list looking desperately for one sign that this doesn't apply to you. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6672 From: Matt Paulsen Date: Sun Dec 22, 2002 11:07pm Subject: RE: DOE still looking for TSCM services >According to the Solicitation, the government will be supplying ALL >instrumentation. $.02 comment... Nothing like using someone else's weapons in combat. 6673 From: James M. Atkinson Date: Sun Dec 22, 2002 11:18pm Subject: RE: DOE still looking for TSCM services At 9:07 PM -0800 12/22/02, Matt Paulsen wrote: > >According to the Solicitation, the government will be supplying ALL >>instrumentation. >$.02 comment... Nothing like using someone else's weapons in combat. I am familiar with the equipment used by the DOE to find bugs... and most of it is worthless amateur radio crap, SpyShop toys, and outdated test equipment provided by the lowest bidder. Heck, if they were using better equipment, then perhaps they would find more bugs. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6674 From: Charles P. Date: Sun Dec 22, 2002 11:29pm Subject: TXCM -Christmas Spies- TXCM Technical Christmas Countermeasures Well, the presents are wrapped and under the tree... And the countermeasures are in place. I labeled the kids presents with a UV pen so they won't know who's getting what. I'll pull out the UV lamp Christmas morning. Happy Holidays, Charles ====================== Charles Patterson Global Communications Tarrytown, NY charles@t... 6675 From: James M. Atkinson Date: Sun Dec 22, 2002 11:48pm Subject: Seasons Greetings Merry Christmas Folks, I would like to invite the list membership to review the following animated Christmas card that is from the heart. http://www.toonedin.com/movies/WhiteTrashXmas.html -jma PS: bah humbug -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6676 From: kondrak Date: Mon Dec 23, 2002 2:29am Subject: RE: DOE still looking for TSCM services >SShhhh! THen they might not need us... > >I am familiar with the equipment used by the DOE to find bugs... and >most of it is worthless amateur radio crap, SpyShop toys, and >outdated test equipment provided by the lowest bidder. > >Heck, if they were using better equipment, then perhaps they would >find more bugs. > >-jma >-- > >-------------------------------------------------------------------------------------------------- >The First, The Largest, The Most Popular, and The Most Complete TSCM, >Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. >-------------------------------------------------------------------------------------------------- > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com >-------------------------------------------------------------------------------------------------- > Vocatus atque non vocatus deus aderit >-------------------------------------------------------------------------------------------------- > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6677 From: Date: Tue Dec 24, 2002 9:38am Subject: FLASH : NORAD Tracks Santa! : ) http://www.noradsanta.org/english/home/index.html About NORAD Santa-Tracking: This year's Santa tracking program is the 45th conducted by NORAD. NORAD's predecessor, Continental Air Defense Command (CONAD), also situated in Colorado Springs, started the tradition after a Colorado Springs store's advertisement for children to call Santa on a special "hotline" included a misprinted telephone number. Instead of Santa, the phone number put kids through to the CONAD Commander-in-Chief's operations "hotline." The Director of Operations, Colonel Harry Shoup, received the first "Santa" call. Realizing what had happened, Colonel Shoup had his staff check radar data to see if there was any indication of Santa making his way South from the North Pole. Indeed there were signs of Santa and children who called were given an update on Santa's position. Thus, the tradition was born. In 1958, the governments of Canada and the United States decided to create a bi-national air defense command for the North American continent called the North American Air Defense Command. Canada and the U.S. believed they could better defend North America together as a team instead of separately. The Command carried out its first Santa tracking in 1958 after inheriting the tradition from CONAD. Since that time, Canadian and American men and women who work at NORAD have responded to phone calls from children personally. Additionally, media from all over the world call NORAD on Christmas Eve for updates on Santa's location. Last year this Web site was visited by millions of people who wanted to know Santa's whereabouts. This year, the information is provided in six languages. NORAD relies on many volunteers to help make Santa tracking possible. Many people at Cheyenne Mountain and Peterson Air Force Base give up their own time in order to answer phones and provide Santa updates to the many thousands of children who call in. (In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.) 6678 From: Steve Uhrig Date: Thu Dec 26, 2002 5:23pm Subject: Engenius long range cordless phones This is following a thread from last week. Apparently Teledynamics is continuing their current pricing. I got another flyer from them today. Base unit & handset is $314. p/n SN-920ULTRA. Extra handset is SN-920ULTRA-HC for $141.60 SN-920-BU additional base unit for $199.40 They have the full line of Engenius. www.engeniustech.com for specs. www.teledymanics.com to purchase if you can convince them you are a wholesaler. I believe they wanted a copy of your local business license and your state's tax resale number. Teledynamics sells to many of the other dealers advertising on the web and in retail stores. They're the highest level source for the stuff I've located. Their service has been exceptional over the many years I've been dealing with them. And as previously mentioned, I've been pleased with the Engenius system. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6679 From: Matt Paulsen Date: Thu Dec 26, 2002 10:15pm Subject: RE: Engenius long range cordless phones Just a quick note.. For those in Oregon and perhaps other states that are similar, you may have to educate the company about your exemption status. Oregon has no state sales tax, ergo, no resale certificate/license or sales tax exempt certificate. http://www.dor.state.or.us/salestax.html Thanks, Matt Paulsen President/CEO Orange Networks LLC http://www.orange-networks.com P: 503.892.8786 F: 503.892.8794 Remotely Hosted Terminal Services! Don't Buy Expensive Hardware or Software! Just use ours for a low monthly fee! http://www.orange-networks.com/remoteoverview.htm -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Thursday, December 26, 2002 3:24 PM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Engenius long range cordless phones This is following a thread from last week. Apparently Teledynamics is continuing their current pricing. I got another flyer from them today. Base unit & handset is $314. p/n SN-920ULTRA. Extra handset is SN-920ULTRA-HC for $141.60 SN-920-BU additional base unit for $199.40 They have the full line of Engenius. www.engeniustech.com for specs. www.teledymanics.com to purchase if you can convince them you are a wholesaler. I believe they wanted a copy of your local business license and your state's tax resale number. Teledynamics sells to many of the other dealers advertising on the web and in retail stores. They're the highest level source for the stuff I've located. Their service has been exceptional over the many years I've been dealing with them. And as previously mentioned, I've been pleased with the Engenius system. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6680 From: Mitch D Date: Thu Dec 26, 2002 11:26pm Subject: new rat shack items Hello fellow list members, Just did a walk through at the local "rat shack",while hunting down a pc item for the mrs. New from "the shack" 900mhz wireless intercom-comes in a grey housing,half the size of a paperback novel digital handheld recorder,1"wide 3" long,holds 6 hrs of conversation,aux mike input,vox function,will work with a recorder starter. new style recorder starter, white box,line in and out,1 "mic"line to the recorder,thin,2' wide 3" long. Of course the P3 "camera detector still sits proudly collecting dust........ __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6681 From: Steve Uhrig Date: Fri Dec 27, 2002 3:25pm Subject: TSCM and surveillance items FS (SPECIAL OFFER) Last chance before year's end if you need a tax deduction. Inquire if questions. SEE END OF MESSAGE FOR A SPECIAL OFFER. ======= Hi all, I need to clean the shop, plus this is a good time to make investments in your business to get the tax deductions in before the end of the year. Please forward this message to any other pertinent lists you monitor. The following items are available, described in more detail below: 5@ ICOM VHF Portable Transceivers 4@ Motorola VHF Portable Transceivers ICOM R8500 full coverage receivers ICOM R8500 cellular blocked receivers ICOM R100 full coverage receivers Riser Bond 1270 Yellow Box TDR Riser Bond 2401b+ TDR Riser Bond 1205CX Yellow Box TDR Riser Bond 1205CXA Yellow Box TDR Riser Bond Model 1000 TDR Vanner Shottky Dual Battery Isolator for Surveillance Van Surveillance Van Power Distribution System Custom Fiberglass Surveillance Console for 1980s Chevy Van ================ Everyone needs communications on sweeps, surveillances or when in caravans traveling. Cellular is complicated to dial in a hurry, doesn't work everywhere, you can't set them down and listen to them, and is expensive. Simple, rugged, powerful two way radios are very useful. VHF radios have about 1/3 more range compared to UHF portables. Have 5@ VHF ports, ICOM F11S new in box, opened only to charge nicads. Never programmed, w/ 2 year warranty by ICOM starting when you send in the warranty card. Current production, latest models. 2 channel 5 watt portable, simple, small and rugged. Manual, nicad, drop in slow charger and belt clip included. Programming cable and original legal software available also. $750 for the lot, including programming stuff. Remember these are new with full 2 year factory warranty. Also have 4@ Motorola HT50 with new Fall 2002 nicads, 5 watt, 2 channel, exc condition, purchased as standby radios and excessed never used when fleet went to 800. Radios have good rubber ducks, DTMF pads, rapid charger. DTMF pads can be used for command uplinks or telephone interconnect. Can program or can supply with aftermarket programming cable and aftermarket RIB (Radio Interface Box) but *not* RSS (Radio Service Software). Super rugged, simple radios. $400 for radios, $500 if RIB and programming cable included. RIB of course can be used for other Motorola radios. Batteries alone were around $45 each. Both have jacks for speaker mikes. I probably have some speaker mikes for the ICOMS if interested but not the Motorolas. The above all could be programmed to talk to each other and make a fleet of nine VHF portables in excellent condition. I believe all will go down into the amateur band without problems. See batlabs for programming the HT50s on amateur. All the above will do marine channels also. ================== I've been able to come up with a few more unblocked ICOM receivers in excellent condition. Supply is limited and I never know when I will get more in. Many are familiar with the R8500. This is ICOM's newest and current production wideband HF/VHF/UHF receiver, quite common with sweepers or for surveillance listening posts. The problem is getting them with 800 megacycle coverage. All the ones sold commercially are cellular blocked, with no provision for TSCM practitioners to obtain unblocked ones legally. We do not want receivers with holes in the coverage. Here are some that don't have the holes. These are full coverage receivers originally restricted to and purchased by the government, generally used for one weekend in a surveillance, then traded in. Basic specs are 100kc to 2 gigs, AM, Wide FM, Narrow FM, CW, SSB. This is a triple conversion tabletop receiver powered by 12VDC or 110VAC with included power supply. Can be used portable or mobile or fixed station. Go here for full specs and a photo: http://www.icomamerica.com/receivers/tabletop/icr8500.html This receiver is the best one ICOM has released to date, significantly better than the R9000 and the R7100, and a later model in the series of R7000/R7100. Remember this is a full coverage receiver, and covers from 100kc (0.1 megacycles) to 2 gigs (2000 megacycles). You do not need an additional receiver to cover the HF portion of the spectrum. When not sweeping, you will use this as a lab receiver on your test bench. There is an RS232 input port as part of this receiver, so you do not need the expensive external level converter to computer control it required on other receivers. There are a number of third party software packages available to remotely operate the receiver. Rather than one of the computer -- controlled black box receivers, the R8500 can be computer controlled as well as it has a full featured front panel for standalone use. There may be times when you do not want to drag a laptop around just to run your receiver. There also is an IF and discriminator output on the rear panel for accessories. One of the standard internal features will scan and store any signals found in a special memory bank for later review. ICOM recently raised the price on these substantially, and that higher price will soon be reflected on dealers' pricing. Even then, you can't buy them full coverage without a government sponsor willing to give you a blessing. And I never know when or if I will get more. Unblocked (full coverage) $2000. One available blocked for $1200. No nonsense or risk trying to sneak one through Customs, with a nearly 100% chance of getting caught and losing the radio. Price includes insured shipping inside the U.S. I only have a few of these, so don't wait if you need a decent full coverage receiver. Practically every time I list these, every one I have sells within a few days and I have to refuse orders from people who come too late. These all are in like new condition. A wideband receiver is one of the first items in a professional sweep kit. When the other equipment sniffs a potentially hostile transmitter, you then tune this to the frequency and disassemble the signal manually. The R100 is a little brother to the R8500 receivers. The performance is basically the same as far as frequency coverage and modes, but the R100 does not have all the "soft" capabilities of the R8500, nor do they have the computer control port or ability to display alpha tags on programmed channels. These are good if you want a full coverage receiver to install in your vehicle or something a bit smaller for a portable sweep kit. These can be analog tuned with a knob and also cover the restricted 800 meg frequencies blocked on consumer receivers. Here are basic specs on the R100 mobile/portable receiver: Frequency Coverage: 100 kHz to 1856 MHz continuous Mode: AM, FM, Wide FM (WFM) Power Supply Requirement: 13.8 V DC +/-15% Current Drain (at 13.8 V DC): Less than 1.1 A The R100 was discontinued some time ago and unfortunately there is no replacement for these friendly and versatile receivers. The supply of these is dwindling, especially in the restricted unblocked (government) versions. They make excellent compact multimode demodulators for IF outputs of spectrum analyzers (I use one Velcroed to the top of my Tek 494AP for a demodulator), and can be used standalone besides. Don't use a handheld with a wide open front end which is killed by intermod. Use this R100 which has both an excellent front end as well as filtering. Price of full coverage R100 is $650 shipped and insured in the U.S. Anyone buying either model receiver is eligible to purchase a wideband discone antenna for $75, which is a $50 discount off the normal price of $125. This antenna is ideal for these receivers, and is a good universal antenna for sweeping. Mount it on a tripod or microphone stand and move the antenna around the area you are sweeping. Antenna can be used for transmit also, from 25-2000 megs. I guarantee everything for proper performance, because we personally align each and every receiver from antenna to speaker. They don't just come off the robotic assembly line 'good enough' to meet factory spec. We get the most performance each receiver is capable of suppying, which is a noticeable bit more than an out of the box receiver. Holler if interested and your receiver can ship immediately. Remember we pay the freight and insurance, which is considerable on equipment of this value. With the new heavy duty restrictions recently announced on full coverage receivers, these will become even more difficult to get. Don't miss this opportunity. As of this point, they are still legal to possess and sell used, but mere possession may be prohibited any day now, or any sales at all, new or used. You may have read about this on the newsgroups. Perhaps 30 people on this list have purchased receivers from me and use them regularly in their sweeping. Feel free to ask for references. ========================= If you need a TDR (and if you don't have one and are thinking about sweeping telephones, you need one) I have several for sale. As you all know, I am a major big time fan of Riser Bond 'yellow box' TDRs. I've owned every model they've made, used every model, and sold every model, to the tune of probably a hundred machines. They're by far the easiest to use, most logical, most capable and most rugged TDR out there, and well suited for TSCM. A TDR will become your main tool, and once you master it (a few evening's work), you'll be very confident, and a fairly wicked telephone sweeper. The latest, fanciest model is the 1270. This actually is overkill for TSCM, but nothing wrong with having the best. And if you are buying a tax deductible business tool, might as well put your money into test equipment as into some social program funded by taxes. I have one only 1270 for sale. It has new batteries, a fresh calibration, all accessories (two sets of heavy duty alligator clip lead sets, cigarette lighter charger, AC charger, coax lead set, computer interface cable, manual, accessory pouch, wallet laminated cheat sheet of velocity factors, etc.), in like new condition. This one was used once on a massive cable install, for less than a week. I don't send the software for Wave View, because Riser Bond is always updating it and you can download the latest version from their website www.riserbond.com, for free. You can run it and play with it right now without having a TDR connected to the computer, to get a feel for it. This reference to software means the yellow box TDRs can be computer controlled, trace dumped directly to a serial printer, trace digitized and stored on the computer, or the waveform info can be stored inside the TDR digitally, to be printed or transferred to the computer for your report at some later date. You do NOT have to carry a computer with you to take advantage of the digital storage. Nor do you need to feed and water weirdo internal chart printers in a Tek TDR. The 1270 will include at no extra charge a briefcase-sized padded carrying case, which is redundant because the TDR Pelican case is actually more rugged than the hard carrying case. But the hard case will keep the 1270 looking new and give you room for extra accessory cables and your lunch and stuff. They're a $100 option from Riser Bond (they fit any yellow box TDR). I never know when I will get used yellow box TDRs in, in excellent shape. Could be next week, might not be for six months. But I have only ever gotten five of these 1270s in. My tech Ron and I got two, and the two I sold recently went for $2500 for one and $2750 for another. They are $3500 new from the distributors, and there are no discounts. One is left. Do you want it? My price is $2000 with all accessories including the accessory carrying case. You can see the 1270 on www.riserbond.com. Jensen and Tessco are distributors if you want to check prices, but Riser Bond prices fixes like Fluke and no one discounts them any. Anywhere you look they will be $3500 +/- ten bucks, and the cheaper ones charge more shipping. Get it from me for a little more than half that price with maybe 8 hours of use, and my guarantee, and you can put it on a credit card. As an FYI, every used Riser Bond TDR you buy, regardless of model and without exception, will need a new battery, which costs $100.03 each for almost every type of battery as I just got a new batch in last week. Many will need a $20 charger, and all should be calibrated. Riser Bond will calibrate the newer 'yellow box' TDRs for $150. I can calibrate older ones, and they all need it. Nothing you buy on ebay is guaranteed, many being sold by pawn shops and guys who stole them from their employer and will not tell you anything about them. If they light up for ten seconds, they'll say they're working. And you get to calibrate it and buy a $100.03 battery pack and probably test leads. I put a new battery in each TDR before I sell it. You don't have to bother. Caveats not necessary here. I guarantee everything as countless TDR and other equipment buyers on this list will testify, not that I need to do anything regarding guarantees as the stuff I sell is in the condition I claim. And, unlike the Tek TDRs, you don't have to worry about fragile, antique CRTs or weirdo stripchart recorders. And the Riser Bond models are much easier to use than any others I've tried. << All TDRs include a NEW battery, recent calibration, documentation and most include test leads. The latest version of the Waveview software, which changes frequently, can be downloaded for free from www.riserbond.com, so I don't include it with the equipment. >> If you'd like a Riser Bond TDR but can't quite afford the cost of the 1270 mentioned above, I have the following other model Riser Bond machines available. All are yellow box unless otherwise indicated. 2401B+ (little ping box with digital readout; possibly one of the most common TDRs used in TSCM). Not a yellow box. Must be used with an external oscilloscope with at least 100 Megacycle frequency response. Nicad powered. Best for beginners and/or anyone who already owns a decent oscilloscope. One of the more compact units; will fit in a briefcase where most of the others will not. Takes a $100.03 battery. $400 with padded carrying case, charger and manual. 1205CX - later model than 1205C, no meaningful differences. Takes $22 battery. $1350. Overall probably the simplest and easiest to use full features 'yellow box' TDR. Does have digital storage, as to all other yellow box ones. Best investment for TSCM all considered. 1205CXA -- now uses nickel metal battery instead of lead acid like in the 1205 and 1205C and 1205CX series, for lighter weight, longer life per charge. Has sub nanosecond pulse for finding intermittents or very quick happenings on digital lines. The absolute Cadillac of TDRs, essentially the same as the 1270 except does not have separate outputs for both coax and twisted pair (and doesn't need them. An adapter from a BNC is what all other TDRs use including Riser Bond). Current model; see Riser Bond's website for details. Costs $3000 new, today, from the distributors. My price $1500. Model 1000 -- 'Line Judge', checks any type of cable, for length and faults only. Not a yellow box. Not especially suited for TSCM since there are no provisions for viewing a trace either internally or externally. Great for people who install cable and need to measure lengths or find faults but do not particularly care about TSCM. Digital readout to fault, no screen for a trace. Smallest TDR made by Riser Bond, and latest model. Uses a 9 volt battery. Not suited for TSCM except in rare cases. Cannot drive an oscilloscope. Use the 2401 if you are at this level. Price $150. This is a good TDR for installers who need the simplest piece to measure the length of a line but are not inspecting it for tampering. Contact me if you have an interest in picking up a top quality TDR that will last the rest of your career. Now is the best time since I am very serious about winter cleaning and making more space in my shop. Call me with your needs or to discuss where you are, and I will recommend the best one for your level of experience, your budget and your personal capabilities. A TDR is easy to use, can read rat piss on the lines, and separates the men from the boys. You'll need one eventually. Here's your chance to save a lot of money and probably buy a better unit than you will be able to afford in the future. Practice some with these things, get confident in it, and you will be a major reckoning force in the industry. Few professional sweepers have TDRs as nice as are described on this page. Most also come with leads, all come with manuals and chargers. All come with a padded carrying case OR a Pelican waterproof case (depending on model). Most also come with an outboard accessory pouch to hold extra sets of leads, jumper cables, the charger, etc. Most models have a place inside the lid to hold the instruction manual, a coax jumper and an alligator clip set of input leads. Call if interested in breaking through the equipment barrier from novice to journeyman. Are you going to play games all your life on telephone lines where the majority of the threats target, or are you going to equip yourself and learn to use the same silver bullet professionals use but like to keep quiet? ================ I also have a super rugged dual battery isolator, to let the alternator in your van charge both the original battery as well as a secondary battery to operate all your electronics. This is fully automatic, no manual switches. The isolator was designed for an ambulance where lives depend on it. It uses Schottky diodes for ultra low forward voltage drop. Generally most surveillance vans are wired so the original battery does nothing but start the engine, and all other loads (commo, surveillance, lighting, air conditioner, etc.) are drawn from the secondary battery. That way, you always have a fresh battery to get you home. This isolator is not a toy, and is about the size of a small shoebox. Cheap ones are much smaller. This has plenty of heatsink and can handle to 200 amps which is a lot bigger alternator than you will have in any consumer van. Manufacturer is Vanner, considered the top brand in isolators. New, never installed. Hookup is simple. There are three terminals on the isolator, in a row. You disconnect the output of your alternator and connect it to the middle terminal. A line from each outside terminal goes to the positive side of each of the two batteries. That's all there is to it. Price is $250. You'll pay that for a toy. This is a real one. If you're doing a lot of electrical work in your van, I also have a new never installed power distribution system used in police cars and ambulances, with multiple fused lines. Call if interested. And if anyone has a 1980s series Chevy van they currently or would like to use for surveillance, contact me for a custom made fiberglass surveillance console for this exact series of vans. New, made for government, never used, perfect condition. Very spiffy piece. Holler if you are interested in any of the above, or if you have any questions. I can fax info on the periscope if someone is *really* interested. I also will consider trades towards the above, and I purchase surveillance, countersurveillance and communications equipment. Email me with anything you have to sell or trade. I am willing to ship anything anywhere in the world. If you order from a country with 220VAC mains, please remember to mention this so I can include the proper charger or power supply for your equipment. SPECIAL OFFER: Free domestic shipping and insurance if ordered before the end of the year. Foreign buyers, I can't afford to throw in freight but I'll make appropriate price adjustments or throw something else in to make an equivalent deal. Credit cards accepted. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6682 From: Mitch D Date: Fri Dec 27, 2002 11:14pm Subject: SWS products FS Hi gang, I've said it before on this list,but for the sake of newer members,and some of those who need to acquire quality equipment,I just wanted to say that I've personally done business with SWS repeatedly,and every item I've gotten from Steve has been in pristine condition,calibrated and well packed for shipping.Hands down The RB TDR's are especially a bargain,and no one gets a super deal on RB TDR's as a distributor,wholesaler etc. We paid 3495.00 for our 1270A before Steve had any in stock,and I searched exhaustively for any kind of a deal on one.And I mean exhaustively. For purchasing a TDR, checking pawn shops was not an option,(Nashville's loaded with them),nor was e bay. I would not want to compromise the accuracy of a TDR waveform, by utilizing a cheap,or quality unit that had been beaten to death in the back of someones service truck,or got soaked on a pole while being used in the field.The risk of innacuracy is not worth it. Doing business with Steve has always been a pleasure for us with no BS in any way shape or form. The 2 things you will never get from SWS, is a piece of junk,or a BS story. The other items have fair prices as well..... Just my 2 cents.... Have a great weekend,and no worries if you need something that SWS has for sale! Mitch D PS: I'm not a salesman,but usually if I know of something or someone that is good,I'll tell a friend! __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6683 From: Mitch D Date: Sat Dec 28, 2002 3:07am Subject: un manned surveillance...... stumbled across this may be good for a "best caption contest"........ http://www. covert-systems.com/airborne/unmanned_airborne.html __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6684 From: Steve Uhrig Date: Sat Dec 28, 2002 2:08pm Subject: Clandestine Radio Site Hi all, This site: http://www.geocities.com/saipan59/clan_radio/intro.html is a fascinating, illustrated site of the history of clandestine communications. It is chronologically ordered, from the earliest to late model clandestine communications used by U.S. intelligence agents worldwide. Be prepared to spend some time there. Two problems: the site has numerous coding errors which may cause problems in some browsers. Netscape won't handle it. The latest IE does. And, the site is a free one on yahoo. They have a bandwidth limit, which times out the site for an hour if it gets too much traffic. I spent about 15 minutes there and it timed out. So save this message, and you'll probably have to take a number and wait in line to visit it. Remember that if you host a site on a free domain. The efforts in waterproof packaging are clever. Many radios were designed to be buried for long periods of time. Design was clever. An early one tube transmitter would operate 10 watts intermittently with a single 6L6, but the tube was mounted such that it could be immersed in a glass of oil as a heatsink to allow 50 watts power input. Another transmitter had rechargeable batteries, and the charger was powered by thermocouples. Heat can be generated in many ways in many situations when you are operating outside areas with power infrastructure. The thermocouple charger was known as the Yak Turd Burner, model YTB-1! Some old buzzards may remember thermocouple stacks which mounted on top of an Aladdin kerosene lamp chimney and provided enough power to operate a small radio. My grandmother had one. This is a bit like using human urine to activate the current MRE heaters when no other source of heat is available. People were really innovative back then, when they had to communicate with little more than earth, air, water and fire. Bet most of the designers were hams. Nowdays they just use credit cards. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6685 From: Andre Holmes <1ach@g...> Date: Sat Dec 28, 2002 8:17pm Subject: Military Importance/Home security Hello Groupt Please look at items take action if you feel its worth it. EBAY Seller Kalleb DISCOVERY CHANNEL RIGHT NOW 278 CIA SECRETS. ANDRE [Non-text portions of this message have been removed] 6686 From: kondrak Date: Sat Dec 28, 2002 9:26pm Subject: Re: Clandestine Radio Site If you like old mil stuff, radios etc. theres a nice page here as well...found it doing a search on that Delco 5300 http://solo11.abac.com/zorroab1/MRCA02.htm The page takes a long time to load, but well worth it. At 15:08 12/28/02 -0500, you wrote: >Hi all, > >This site: > >http://www.geocities.com/saipan59/clan_radio/intro.html > >is a fascinating, illustrated site of the history of clandestine >communications. > >It is chronologically ordered, from the earliest to late model >clandestine communications used by U.S. intelligence agents >worldwide. > >Be prepared to spend some time there. > >Two problems: the site has numerous coding errors which may cause >problems in some browsers. Netscape won't handle it. The latest IE >does. > >And, the site is a free one on yahoo. They have a bandwidth limit, >which times out the site for an hour if it gets too much traffic. I >spent about 15 minutes there and it timed out. So save this message, >and you'll probably have to take a number and wait in line to visit >it. Remember that if you host a site on a free domain. > >The efforts in waterproof packaging are clever. Many radios were >designed to be buried for long periods of time. > >Design was clever. An early one tube transmitter would operate 10 >watts intermittently with a single 6L6, but the tube was mounted such >that it could be immersed in a glass of oil as a heatsink to allow 50 >watts power input. > >Another transmitter had rechargeable batteries, and the charger was >powered by thermocouples. Heat can be generated in many ways in many >situations when you are operating outside areas with power >infrastructure. The thermocouple charger was known as the Yak Turd >Burner, model YTB-1! > >Some old buzzards may remember thermocouple stacks which mounted on >top of an Aladdin kerosene lamp chimney and provided enough power to >operate a small radio. My grandmother had one. > >This is a bit like using human urine to activate the current MRE >heaters when no other source of heat is available. > >People were really innovative back then, when they had to communicate >with little more than earth, air, water and fire. Bet most of the >designers were hams. Nowdays they just use credit cards. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6687 From: Marcel Date: Sun Dec 29, 2002 0:02pm Subject: Satellite locators track youngsters Next year, a start-up called Peace of Mind at Light Speed Inc. plans to sell a $100 pocket-sized device that can fit in a backpack. Service plans are expected to run $5 a month. ---------------------------------------------------------------------------- Satellite locators track youngsters Source: Copley News Service Publication date: 2002-12-24 A string of high-profile kidnappings this year has spurred some anxious parents to keep tabs on their children the same way cars and trucks are tracked: by satellite. But will satellite locators give parents much-needed peace of mind, as makers of the devices and advocates say, or will they only fuel parental paranoia, as critics contend? Those questions are at the center of an emerging debate about this new line of child-safety devices. The idea behind the devices is simple enough. Strap a wristwatch on your child, clip on a pager or toss a small device in a coat pocket, then check on your childís whereabouts any time, by phone or via the Internet. Earlier this year, Digital Angel Corp. came out with one such device, a $399 personal safety and location system that is worn like a pager. It requires a service contract that starts at $29.95 a month. This fall, Wherify Wireless Inc. introduced a $399 personal locator that looks like a watch. Its service plans start at $24.95 a month. Next year, a start-up called Peace of Mind at Light Speed Inc. plans to sell a $100 pocket-sized device that can fit in a backpack. Service plans are expected to run $5 a month. These new child-locator devices rely on cell-phone technology and the U.S. Global Positioning Systemsí two dozen satellites orbiting the Earth to pinpoint a childís location. GPS, which was once available only to the military, is generally accurate to within several yards. Today, operators of commercial vehicles use it to track their fleets. Motorists install GPS devices on their personal vehicles. Hikers and other outdoor-sports enthusiasts are beginning to carry GPS devices to keep track of their locations. Parolees are wearing GPS devices so that corrections officers can monitor their comings and goings. Increasingly, cell phones are being equipped with GPS technology. It follows, then, that the next step in satellite technology is to use it to keep track of our most precious assets - our children. Timothy Neher, founder and president of Wherify Wireless, came up with his idea for a watchlike locator device five years ago after trying to keep an eye on his young niece and nephew during a visit to a zoo in Honolulu. At one point, Neher said, he looked down and they were gone. ìI felt that panicked feeling that every parent feels,î Neher said. Advancements in technology are helping to fuel the development of GPS devices for children. Early versions were the size of microwave ovens and cost thousands of dollars. The GPS technology in Wherifyís watch is on a microchip the size of a postage stamp. Prices have dropped, too, but supporters and critics alike say prices havenít fallen enough to make GPS locator devices affordable for the average family. Still, just as the prices of DVD players, computers and other high-tech devices have dropped dramatically over the last few years, the cost of GPS devices for children is likely to come down, too. Neher said he hopes to someday be able to give away Wherifyís watches, or sell them for a nominal price and make money from the service plans. The price tag hasnít deterred some parents from getting GPS devices for their children. Neher said Wherify has sold ìthousandsî of its watches and has a backlog of orders. Digital Angel spokesman Matthew Cossolotto said the company has sold ìa few hundredî of its personal locators and has a contract to sell 1,000 to a Mexican distributor. Sales have risen in the wake of a spate of child abductions this year, including those of Danielle van Dam in California, Elizabeth Smart in Utah, Samantha Runnion in California and Cassandra Williamson in Missouri. Research shows that three out of four abducted children who are killed die within the first three hours of being kidnapped. With Digital Angelís locator or Wherifyís watch, a parent can find a childís location within minutes by placing a call to operators at Wherify or Digital Angel. If a computer is handy, a parent can log on to a Web site to call up a map showing the childís location. Wherifyís watch can be locked onto a childís wrist. It automatically calls for help if someone tries to remove or tamper with it. ìThe child abductions really seemed to raise parentsí awareness nationwide,î said Thomas Franks of the Safety and Security Center, which sells Wherify watches on the Internet. ìI think the whole bar got raised, not just here in San Diego, but everywhere.î Even so, executives at Wherify and Digital Angel are quick to point out that their devices were in the works for years. They said they do not want to be seen as capitalizing on the kidnappings. NO GUARANTEES It is too soon to tell whether the devices will revolutionize the way parents watch their children. Experts give mixed opinions on whether parents should use them. Marc Klaas, whose 12-year-old daughter, Polly, was abducted and murdered by a felon on parole in 1993, wholeheartedly endorses Wherifyís watch. The KlaasKids Foundation for Children, a nonprofit organization Klaas formed to provide national parental awareness and child-safety information, has a link on its Web site to Wherifyís site. ìIf Polly had been wearing a Wherify GPS locator, sheíd be alive today,î Klaas said. ìItís as simple as that.î Klaas said the only drawback he sees is the price. ìItís relatively expensive,î he said. The National Center for Missing & Exploited Children, a nonprofit organization that assists in finding missing children, takes a more cautious approach to the GPS devices. ìWe certainly approve of any kind of device that will help reduce the risk of a child becoming lost or abducted,î said Ben Ermini, director of the centerís Missing Childrenís Division. ìWe donít however, endorse any of these particular devices.î Ermini also offered an admonition. ìParents should not view these devices as a guarantee that their children will be kept safe or will avoid an abduction,î he said. Debra Holtzman, a child-safety advocate and author of the book ìThe Panic-Proof Parent: Creating a Safe Lifestyle for Your Family,î is equally cautious about child-locator devices. Holtzman said that as an additional layer of protection for keeping youngsters safe, the locators can be ìextraordinaryî devices to find missing children and provide peace of mind for parents. At the same time, ìI do believe these types of devices can give parents a false sense of security. Parents need to realize that no safety device is foolproof and all safety devices have their limitations.î She said she doesnít want to see the locator devices used ìas a license for parents to be more lax in their parental supervision.î In other words, a parent may mistakenly think it is OK to just look out the kitchen window every now and then when the children play outdoors while wearing their locators, Holtzman said. Others, such as Frank Furedi, author of ìParanoid Parenting,î are critical of using GPS devices to track children. ìIt makes parents even more obsessive about their childrenís security than they were beforehand,î said Furedi, a sociologist at the University of Kent in England. ìInstead of reassuring parents, it will only make them more insecure.î Furediís research on Web cameras in day-care centers found that parents spent inordinate amounts of time watching their children over the Internet, to the point that it was ìdisruptive.î ëMORE SENSITIVEí Considering the media attention to child abductions this year, it is no wonder parents are anxious. ìWe are far more sensitive to each and every one of these incidents than ever before,î Furedi said. Kidnappings by strangers actually are on the decline, according to statistics from the U.S. Department of Justice and the National Center for Missing and Exploited Children. It is far more likely that a child will die in a car accident than at the hands of kidnapper, Furedi said. ìChildren are living healthier, safer lives than ever before, yet parents are, in general, more paranoid,î he said. What does he think parents should be doing? ìChilling out a little.î Visit Copley News Service at www.copleynews.com. Publication date: 2002-12-24 http://cnniw.yellowbrix.com/pages/cnniw/Story.nsp?story_id=35414421&ID=cnniw&scategory=Telecommunications%3AWireless& -- "NEXTEL-1 IT'S NOT JUST NEXTEL" Note The New address Subscribe to Nextel-1: http://www.groups.yahoo.com/subscribe/NEXTEL-1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6688 From: Andre Holmes <1ach@g...> Date: Sun Dec 29, 2002 1:24pm Subject: CIA SECRETS Hello Id like to finish up a thread from my previous post. http://www.discovery.com is where you can buy the vhs tapes on the topic at hand. The tapes sell in a series pack for 65.95 1800-524-5338 You will be very happy upon your purchase after review of the tapes. Andre Holmes Neptune Enterprise Security The Tapes have been selling like hot cakes dont miss out. . [Non-text portions of this message have been removed] 6689 From: Greg H. Walker, Attorney At Law Date: Sun Dec 29, 2002 3:27pm Subject: Re: Satellite locators track youngsters Folks, I may be kind'a old fashioned in thought, but people need to listen to independent, experienced and technically knowledgable experts like Steve Uhrig on the viability of this type of device instead of to the hype of people whose job it is to market a device which in all probability won't work when needed the most and please understand, I'm not saying that Marcel was doing that -- I'm talking about people in general. The media just loves to run with stories like this without investigating the facts and parents are going to rely on this type of device too much and a number of children will be lost to predators because of it. My experience with GPS is that it once it loses direct line of sight with the two to three satellites needed for getting a location, such due to heavy vegetation (a favorite place to rape and kill kids), in buildings (abandoned buildings are another favorite place to rape and kill kids), in the trunk of a car (a favorite place to place kidnapped kids for transportation), etc. it simply doesn't work. Please, understand the technology before hyping it -- that is the ethical thing to do. Oh, GPS will work through some materials such as fiberglass or plastic as long as it isn't too thick, but heavy vegetation, metal, inside of a building, etc. my experience has been it doesn't work. Next, communication with the device is via cellular phone -- how many of you have missed calls even though you had your phone on, how many of you still carry pagers for real emergencies because they are more reliable, etc. In the Greater Houston, Texas area there is a city within Houston called Bellaire and it is a very upscale residential city, but good luck with cellphones -- they won't allow any cell towers to be built within the city -- and hence, cellular reception is hit and miss at best. The solution is being an involved parent, who cares and knows about where your children are going and in training your children about dangers that exist out there, not hiding the dangers from little Tommy or Sally and believing they are better off not knowing. My two cents worth. GREG -- Greg H. Walker, ARM* Attorney At Law President RisKontroL -- Risk Management, Security Consulting & Investigations Houston, Texas (713) 850-0061 * Associate in Risk Management Designation (Insurance Institute of America's Center For Advanced Risk Management Education) WARNING NOTICE BY GHW: Greg H. Walker's comments are not intended to be and should absolutely not be taken as legal advice. Unless you have entered into a specific written agreement with him for legal services, signed by both you and him, and paid him a retainer in good funds, then he is not your Attorney, does not intend to be your Attorney and you should not act nor refrain from acting based, in whole or in part, on his comments. 6690 From: Jay Coote Date: Sun Dec 29, 2002 5:46pm Subject: RE: Clandestine Radio Site It's an interesting site. The GRC-109 (AKA RS-1) is another such radio to look up on the web. Also saw a B-1 (nomenclature?) suitcase radio on the web as described in LeCarre's 'Looking Glass War' and the author's description and tuning instructions in the novel seemed accurate. A footnote- military and clandestine radio collectors are having a hard time these days. It would seem that some governments feel threatened by old radios even though Bed Linen and other terrorists use cell phones, the net, or can do a lot more with hacked off-the-shelf amateur transceivers. -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Saturday, December 28, 2002 12:08 PM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Clandestine Radio Site Hi all, This site: http://www.geocities.com/saipan59/clan_radio/intro.html is a fascinating, illustrated site of the history of clandestine communications. It is chronologically ordered, from the earliest to late model clandestine communications used by U.S. intelligence agents worldwide. Be prepared to spend some time there. Two problems: the site has numerous coding errors which may cause problems in some browsers. Netscape won't handle it. The latest IE does. And, the site is a free one on yahoo. They have a bandwidth limit, which times out the site for an hour if it gets too much traffic. I spent about 15 minutes there and it timed out. So save this message, and you'll probably have to take a number and wait in line to visit it. Remember that if you host a site on a free domain. The efforts in waterproof packaging are clever. Many radios were designed to be buried for long periods of time. Design was clever. An early one tube transmitter would operate 10 watts intermittently with a single 6L6, but the tube was mounted such that it could be immersed in a glass of oil as a heatsink to allow 50 watts power input. Another transmitter had rechargeable batteries, and the charger was powered by thermocouples. Heat can be generated in many ways in many situations when you are operating outside areas with power infrastructure. The thermocouple charger was known as the Yak Turd Burner, model YTB-1! Some old buzzards may remember thermocouple stacks which mounted on top of an Aladdin kerosene lamp chimney and provided enough power to operate a small radio. My grandmother had one. This is a bit like using human urine to activate the current MRE heaters when no other source of heat is available. People were really innovative back then, when they had to communicate with little more than earth, air, water and fire. Bet most of the designers were hams. Nowdays they just use credit cards. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6691 From: Michael Puchol Date: Mon Dec 30, 2002 1:51am Subject: Re: Satellite locators track youngsters > But will satellite locators give parents much-needed peace of mind, as > makers of the devices and advocates say, or will they only fuel parental > paranoia, as critics contend? In my humble oppinion, and I know it's harsh to say it this way, this devices (if they worked, which nobody has proved they do to this day) will only help find the body quicker. It takes very little time for a murderer to kidnap a child and kill him, so I don't see how these devices could help. The only scenario I could remotely imagine would be a traditional kidnapping, with ransom being requested, etc. - in which case the first thing that any kidnapper(s) with an IQ higher than room temperature would do is remove any form of device attached to the subject - never mind that he'll be held indoors, where GPS coverage would be unlikely. In the last few kidnappings carried out by ETA in Spain, the kidnapped person was completely stripped down, and held in small holes underground, with several layers of concrete and stell above them - it is unlikely that they would have had even GSM coverage, and certainly not GPS. > Sales have risen in the wake of a spate of child abductions this year, > including those of Danielle van Dam in California, Elizabeth Smart in Utah, > Samantha Runnion in California and Cassandra Williamson in Missouri. > > Research shows that three out of four abducted children who are killed die > within the first three hours of being kidnapped. I rest my case (very sadly, being the father of a 10-month old boy). > Wherify's watch can be locked onto a child's wrist. It automatically calls for > help if someone tries to remove or tamper with it. Can anyone say "cellphone jammer"? Sad, very sad. A very Happy New Year to you all, Mike 6692 From: ka3jgx Date: Mon Dec 23, 2002 4:09pm Subject: Merry Christmas Today is the my last day of work until after Christmas so I want to was all the group a Very Merry Christmas. And I hope that Santa brings us all the toys that we need and want because I know that we have all been good little boys and girls. Merry Christmas Don From: Date: Sun Dec 24, 2000 2:27pm Subject: Installs? Greetings. A question: Seventy percent of a (presumably) 40 hour week on installs in one county? Does that mean what (I think) it implies; installation of surveillance devices? 2163 From: Date: Sun Dec 24, 2000 5:13pm Subject: Internet Privacy Greetings, all. The first in a series of six articles on basic computer privacy is scheduled to be published in the January issue of Nuts & Volts magazine. Site is www.nutsvolts.com and the magazine is available in book and magazine stores nationwide. This is very basic stuff; you experts will not be impressed, but for beginners and non-tekkies, you may find the articles useful. They will cover: A brief history of the Internet, basic TCP/IP, addressing, cookies and single-pixel 'web bugs', Spam and ways to deal with it, using a proxy server, basics of firewalls, port scanning (how to detect and stop it), packet sniffers (which will tell you what information is entering and leaving your computer), IP Tools such as Traceroute, DNS Lookup, IP Conversion, Ping, Whois and Finger and etc. Title is Cyber-Street Survival and the articles are being rewritten into a more detailed full length book. Hope this information makes for a more secure Internet connection for everyone. 2164 From: Date: Sun Dec 24, 2000 11:40pm Subject: Merry Christmas ! Happy Holidays to all and a Prosperous and Healthy New Year !! 2165 From: William Knowles Date: Mon Dec 25, 2000 5:56am Subject: Merry Christmas! Well here it is, Christmas Day, The shopping is all done, The wrapping of presents are all finished and I am sitting here (With CNN on the TV as usual) prepping some stories for InfoSec News. Its been a busy weekend to say the least, and it seems that my one holiday wishes hasn't come true as far as parties defacing any .mil and .gov websites. So I have taken the suggestion of one ISN reader, Set the phone on vibrate, and I left it in the sock drawer for the duration of the holiday. I should mention that I'm a terribly hard person to get gifts for, I have lots of neat gadgets, and I have plenty of books, (Many I have yet to read!) I like things I get to be practical. Since I couldn't really think of any one present I really wanted I have been telling friends and family to give to charity. A couple of charities that have my attention, and some $$$ are... Juvenile Diabetes Foundation http://www.jdf.org/ Special Operations Warrior Foundation http://www.specialops.org/ Mines Advisory Group http://www.mag.org.uk/ The HALO Trust http://www.halotrust.org/ The first one is because I have a 23 month old nephew with Type I diabetes, The second charity I became aware of from working with an old former Green Beret Colonel who I am sure most of you in computer security knows or knows of, and the last two I discovered recently since I help moderate another list on various military and security issues. Of course I did drop a few toys in for the "Toys for Tots", and I dropped a message to: http://www.adoptasoldier.org/ and I am looking forward to sending boxes of Twinkies, Ho Ho's and a c4i.org shirt in the mail to a lucky serviceperson. Of all the jobs I have had over the years one of the most rewarding ones I did was playing a shopping mall Santa for two seasons mainly for the heck of it and in that time learned the true meaning of Christmas, Its something I highly recommend to everyone once in their lifetime to try to take the time from work and wear the big red suit. I leave you here with something that gave me a real grin, The local paper here published some letters to Santa Claus from 2nd and 3rd graders, (Letters that I would get all the time playing Santa) I thought I would republish some of them here to remind you of your own childhood holiday memories. Happy Holidays To You, Your Family, and Friends! William Knowles wk@c... Dear Santa, I would like the driving toy for my play statation Intendo with new games of cars. Because I want to learn how to drive right now when I am nine years old. so when I get my drier's licence I can past the test if you can please. And a scooter please if you can. Oh yea. Merry Christmas and a happy new year. Thank you. Noreidy M. Dear Santa, I wish I could have 5 boxes of sugar cookies to give out to my friends. Thank you very much, Merry Christmas. George P. Dear Santa, I wish you could send me a gold necklace for my mother. Thank you very much. Merry Christmas. Shammi M Dear Santa, Hi! How are you? I do not belive in you Sorry but I know how we get out presents. Our Mother and Dad buy presents. If you are real may you give me my bike back that got stolen please? give me Little Bow-wow CD and Nelly CD and and CD plaayser. A playstation two and could you seand a scooter please, Sorry I do not belive write back! Marniece Dear Santa I am new to this country and have just heard of you. I heard that you give kids toys. That is so cool. That makes us happy. Hope you have a Merry Christmas. Love, Van Dear Santa, I hope you bring lot's of presents for the children of the U.S.A. I hope you do. Love Khayin P.S. Santa can I have a play-station two Dear Santa, What I would like for Christmas is a nice dog the kind of dog not is a black and white dog or black and brown dog, please. The second gift is a hamster, please. The third gift is a cat for my sister, please. That is all I want. Casey C. Dear Santa, I wish everybody would be friends, The world would be a clean and fun world. Sammy. Dear Santa, I've been a very very good girl. I've been helping my mo,. Santa may I please have for Christmas. Barbi studio, computer and make up Mirde. My mom ant ring nuw makeup. My grandma wants makeuo and perfeume. My grandpa could have 1,000 dollars and a shaver. My dad wants a T-shirt. And I will give you cookie and milk. Merry Christmas! Francesca R. Dear Santa, I wish that everyone would be friends and there would be no wars. Love Adam 2166 From: Sky Date: Mon Dec 25, 2000 1:59am Subject: Re: Fw: funnies> Yea, for 'tis written in the Book of Nostradamus... That is really funny! Thanks! sky Subject: [TSCM-L] Fw: funnies> Yea, for 'tis written in the Book of Nostradamus... > A seasonal thought > > > "Come the millennium, month 12, > In the home of greatest power, > The village idiot will come forth > To be acclaimed the leader." > > - Nostradamus, 1555 > > What more need be said? > > Seasons greetings and a safe and prosperous 2001 to all of our friends, clients and most of our enemies.... > > Andy Grudko > Grudko Wilson Associates > Johannesburg > > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2167 From: Andre Holmes <1ach@g...> Date: Mon Dec 25, 2000 9:40am Subject: Re: Hello Welcome aboard. Can you tell us what types of bugs you installed, who monitored the intercept, was there A court order in these cases, How did you gain the trust of law enforcement, what were the targets example street people, business owners and what ever else. ----- Original Message ----- From: To: Sent: Sunday, December 24, 2000 1:03 PM Subject: [TSCM-L] Hello > Well, ahem. I have been advised that I must tell y'all a little 'bout > myself. Sorry that I haven't done this sooner; however I have been > availing myself of the history file. There are SO many snake - oil > salesmen and self-proclaimed gurus that I wanted to see who was in > here before I invested any time. > > The ratio of geniuses to idiots is higher here than at just about > anything else I am a member of. The reason I haven't been posting is > I kind of feel like I am listening in to the grown-ups conversation > from the kiddie table. > > My background then, is this: My name is Shawn Hughes, and I am a 12 > year Public Safety veteran in South East USA. For the last three > years, among other duties, I have been the head of the Electronic and > Technical Surveillance unit for a 1,000 man County Sheriff's > Department. During this time I have assisted various local, state and > Federales in intercepting and interpreting various types of > intelligence. I spend in a typical time frame 70% on installs, and > 10% in TSCM. The remaining 20% is in computer forensics and R&D. > > What kinda training got me this job? Honestly, SIGINT has always been > a hobby. (When you are twelve, you haven't lived until you've whacked > open a $300 dollar scanner to install a discriminator tap. Grandpa > was pissed!) I spent a lotta time trying to figure out what all those > beeps and boops were. > > Oh, formal training. I gotta commercial and amateur radio license, > and I got sent to a couple of schools (yawn). What I have lacked in > formal training, I have tried to augment by reading. I have burned up > two printers on TSCM research. The rest has come from hacking things > apart that emits RF and trying to find them with 'a screwdriver and a > paperclip', to paraphrase some one. ( I read with great interest the > cordless phone thread. I have a big collection of broken phones, > walkee-talkees, and whatnot). > > In closing, I'm not too sure what I have to offer this group, but > thanks to all of you in advance for the free training you are > providing me ! > > regards, > > Shawn > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2168 From: Shawn Hughes Date: Mon Dec 25, 2000 2:45pm Subject: Re: my work week Assuming a forty hour week - no. Lots of installs - Yes. As I said, I have been involved with several Federal Task Forces, our government's way of supplanting Federal resources without having to pay for them. For my area of the country, most of the Federal Technical Support people have to fly in from Atlanta. It's easier (and cheaper) for them to send me. What we refer to Title 3 work really stinks, though. Not like TV at all. Personally, I enjoy finding things more than hiding them. Merry Christmas, all. Shawn 2169 From: Jay Coote Date: Mon Dec 25, 2000 6:59pm Subject: Event-recording Ammeter? Greetings and Happy Holidays to the List. I am considering ways to measure current in a vehicle for long periods of time, several hours to days possibly. I'm looking for periodic jumps in current which might indicate a tracking transmitter/transceiver. Yes, a chart recorder would work- but doesn't Fluke or someone make a small meter that can make these long-term DC current measurements and be downloaded later? (disregard the date error) Jay Coote Los Angeles 2170 From: James M. Atkinson, Comm-Eng Date: Mon Dec 25, 2000 8:12pm Subject: Re: Event-recording Ammeter? At 8:01 PM -0500 12/25/00, Jay Coote wrote: >Greetings and Happy Holidays to the List. > >I am considering ways to measure current in a vehicle for long >periods of time, >several hours to days possibly. I'm looking for periodic jumps in >current which might indicate a tracking transmitter/transceiver. >Yes, a chart recorder would work- but doesn't Fluke or someone make >a small meter >that can make these long-term DC current measurements and be downloaded later? >(disregard the date error) > >Jay Coote >Los Angeles You could use a Fluke 89 DVM as it has D-E-E-P memories. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2171 From: Date: Mon Dec 25, 2000 8:20pm Subject: Re: Fw: funnies> Yea, for 'tis written in the Book of Nostradamus... --- In TSCM-L@egroups.com, "A Grudko" wrote: > A seasonal thought > >Come the millennium, month 12, > In the home of greatest power, > > The village idiot will come forth > > To be acclaimed the leader. Centurie I LXXVIII. D'vn chef vieillard naistra sens hebetÈ, Degenerant par s&cced;avoir & par armes: Le chef de France par sa soeur redoutÈ, Champs diuisez, concedez aux gendarmes. To an old leader will be born an idiot heir, weak both in knowledge and in war. The leader of France is feared by his sister, battlefields divided, conceded to the soldiers. > > > > > [Non-text portions of this message have been removed] 2172 From: James M. Atkinson, Comm-Eng Date: Mon Dec 25, 2000 8:40pm Subject: Re: Fw: funnies> Yea, for 'tis written in the Book of Nostradamus... At 2:20 AM +0000 12/26/00, writer34us@y... wrote: >--- In TSCM-L@egroups.com, "A Grudko" wrote: >> A seasonal thought >> >>Come the millennium, month 12, > > In the home of greatest power, > > > > The village idiot will come forth > > > > To be acclaimed the leader. > > > Centurie I > LXXVIII. > > D'vn chef vieillard naistra sens hebetÈ, > Degenerant par s&cced;avoir & par armes: > Le chef de France par sa soeur redoutÈ, > Champs diuisez, concedez aux gendarmes. > > To an old leader will be born an idiot heir, > weak both in knowledge and in war. > The leader of France is feared by his sister, > battlefields divided, conceded to the soldiers. Ahem, I seriously doubt that old Nostradamus ever did a bug sweep, pinged a TDR pulse down a telephone line, or rooted around in a suspended ceiling to ferret out a concealed video camera. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2173 From: Date: Mon Dec 25, 2000 11:37pm Subject: Re: Event-recording Ammeter? --- In TSCM-L@egroups.com, "Jay Coote" wrote: > Greetings and Happy Holidays to the List. > > I am considering ways to measure current in a vehicle for long periods of time, > several hours to days possibly. I'm looking for periodic jumps in > current which might indicate a tracking transmitter/transceiver. > Yes, a chart recorder would work- but doesn't Fluke or someone make a small meter > that can make these long-term DC current measurements and be downloaded later? > (disregard the date error) > > Jay Coote > Los Angeles I know little about tracking transmitters. Don't they send a periodic, rather than continuous, signal? Perhaps someone with more knowledge of electronics than I have can elaborate on this idea. A current sensing resistor placed somewhere (?) in the electrical system. Output into a 555 timer and an AND gate and a decade counter. The idea is to open a 'window' of time during which X number of fluctuations (periodic 'beeps' making a tiny increase in current) would be required to trigger yet another gate which would light an LED or whatever as an alarm indicator. Where is Steve Uhrig when I need him? :-) 2174 From: cougercat Date: Tue Dec 26, 2000 0:16am Subject: Re: Re: Event-recording Ammeter? DataQ makes data acquisition boards that will take either a digital or analog signal and record it into a computer. Last month, they were offering a free Data Acquisition Starter Kit. It includes the board and software. It can be found at www.dataq.com/tmw This may do what you are looking for. And no, I do not represent them in anyway. --jeff ----- Original Message ----- From: To: Sent: Monday, December 25, 2000 9:37 PM Subject: [TSCM-L] Re: Event-recording Ammeter? > --- In TSCM-L@egroups.com, "Jay Coote" wrote: > > Greetings and Happy Holidays to the List. > > > > I am considering ways to measure current in a vehicle for long > periods of time, > > several hours to days possibly. I'm looking for periodic jumps in > > current which might indicate a tracking transmitter/transceiver. > > Yes, a chart recorder would work- but doesn't Fluke or someone make > a small meter > > that can make these long-term DC current measurements and be > downloaded later? > > (disregard the date error) > > > > Jay Coote > > Los Angeles > > I know little about tracking transmitters. Don't they send a periodic, > rather than continuous, signal? > > Perhaps someone with more knowledge of electronics than I have can > elaborate on this idea. > A current sensing resistor placed somewhere (?) in the electrical > system. Output into a 555 timer and an AND gate and a decade counter. > The idea is to open a 'window' of time during which X number of > fluctuations (periodic 'beeps' making a tiny increase in current) > would be required to trigger yet another gate which would light an LED > or whatever as an alarm indicator. > > Where is Steve Uhrig when I need him? :-) > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 2175 From: A Grudko Date: Tue Dec 26, 2000 4:32am Subject: Re: Re: Fw: funnies> Yea, for 'tis written in the Book of Nostradamus... ----- Original Message ----- From: James M. Atkinson > I seriously doubt that old Nostradamus ever did a bug sweep, pinged a TDR pulse down a telephone line, or rooted around in a suspended ceiling to ferret out a concealed video camera. All he had to do was close his eyes and all of mans' secrets were revealed. Who needs the Agency? I often wondered how Uri Geller would compare to a Scanlock ? Incidentally, I solved part of my lightning watch problem. I monitor two 27/29 Meg. emergency freqs., most of the time, so all I did was open the squelch and lower the volume. We had a strength 7 storm Saturday night which I predicted 45 minutes ahead of arrival. Happy new year from sunny South Africa. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2176 From: Andre Holmes <1ach@g...> Date: Tue Dec 26, 2000 8:29am Subject: Re: Event-recording Ammeter? My thoughts Jay If you were to set up a logging scheme it probably would not tell you that a transmitter was drawing current,cause other electrical lights,clocks,airbag sensor will be drawing current so how would you determine what was happening with a quick check. DC current out put from the source would change do to the fact of the generator is working harder while driving. Most tracking devices were quickly installed and are around 40 mhz ,your diode detector should find the source of RF. There are two types of surveillance devices that can be used 1=Beacon steady noise 2= GPS burst type of noise. Beacon can be installed anywhere on the vehicle try the radio antenna wire GPS can be installed magnet mount under the car and usually battery is with the antenna,and it can be mounted under the battery cage. I always do physical inspect under the car when I get home daily and on occasion use SA,Kaiser 2044. The cell phone and pager that you carry on your person are better tracking devices if you were to be tailed. Im no pro at this but its better than doing nothing. ----- Original Message ----- From: "Jay Coote" To: Sent: Monday, December 25, 2000 7:59 PM Subject: [TSCM-L] Event-recording Ammeter? > Greetings and Happy Holidays to the List. > > I am considering ways to measure current in a vehicle for long periods of time, > several hours to days possibly. I'm looking for periodic jumps in > current which might indicate a tracking transmitter/transceiver. > Yes, a chart recorder would work- but doesn't Fluke or someone make a small meter > that can make these long-term DC current measurements and be downloaded later? > (disregard the date error) > > Jay Coote > Los Angeles > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2177 From: Shawn Hughes Date: Tue Dec 26, 2000 0:27pm Subject: who,what where, when, et al >Welcome aboard. Thank you for having me. An interestingly motley crew here, ay? > Can you tell us what types of bugs you installed Sure. Audio, Video, Telephone, Wireless Phone, Vehicle / Object Locating yada yada If you are interested, I could sanitize a few war stories for you. (Theres two guys around here who fancy themselves bug hunters. One guys' favorite tool is a Realistic Pro-43 with a collapsing wand; never mind.) , who >monitored the intercept, depended on the case. As a rule of thumb, I ALWAYS conducted the monitoring and recording. May not have always known who or what, because it's not relevant to me as long as my signal is 5 by 5 knowwhatimean? ;O) Usually the case manager had a receiver, and in a couple of high profile cases, I went so far as to rebroadcast A/V on a link so all the brass could watch out in the parking lot (too many fucking people in my LP, ya know) >was there A court order in these cases, sometimes, on certain long - event cases. In my region ( around Tennessee ), we are under 'one party' law, which means to legally intercept and record privileged communications, you must have the consent of one party to the conversation. If we are using an undercover agent, or a cooperating witness, then he signs my form, that, NOT under duress, it is ok for me to duct tape a mister microphone on his buttocks. Ba da bing, one party. Interestingly, in many states, there is a little - known saving clause that states if you cannot get a order, you can still record. But only the Tech guy can listen, and then the record must be sealed until a judge rules, at which time you can release to the agency, or the universal destructor. If you are continually recording the same guy, or getting intel from several products, it usually is better to obtain the order, which is (necessarily so) a MAJOR pain in the ass logistically. How did you gain the trust of law >enforcement, Ha. good question. I have a long history of being a card - carrying nerd ( I was the A/V guy in school), and on patrol, everybody loved me , cause I could install CB's and scanners, and make their lights flash in patterns (patrol people in the US have a fetish about emergency equipment. If you have a doubt, watch one of our Christmas Parades.) So, when I came to this department, I started out installing physical security features. Then I started repairing everybody's intercept gear. Then I WAS everybody's intercept gear. Like a free lunch, word spread. (got some good war stories there, too. One guy wanted to replace me, told the Sheriff he could homebrew a repeater, but couldn't explain the function of a duplexer, another guy fast talked the narcotics unit into buying some gear after I laughed him out of my shop; wound up getting a pen mic and a ham radio with RELM physically scraped off the front for $2500......) Hoo. what were >the targets example street people, business owners Oh, pretty much everybody who wasn't me; other officers, innocent children, sheep...... Once again, depended on the requesting agency. A day might have me set up a body wire and fixed video for a sting for a state investigation, then buzz over to tap a cell phone so a Drug Task Force could make calls, then take some thermal and digital imint @ 700' AGL in our helo for our narcotics unit. Hopefully, there would be a bomb call, so I could go deal with it. > and what ever else uh, well, huh. I like to talk, tell me what you want to know, and I'll tell you what I can. On the bumper beeper thing, methinks you are going about this the hard way. You are assuming this thing is running off vehicle power; may not be. Mine do not, normally. God bless the 9 volt battery! And, if it was, it would only draw about 2 - 500 mW of lectricity. I don't know if you could hear the tank coil a la carrier current devices, but I dont think the input would fluctuate that much. PLUS, it's being masked by current draw from the vehicle's car stereo memory circuit, the circuit that tells the lights to come on, the receiver for remote keyless entry, the electronic engine control, LoJack, .................. Playing devil's advocate, think about why it would be installed. Is it for unfaithful spouse detection, or what? Who would require a long - term surv on your client? I think a near field reciever, an OSCOR, and a flashlight and mirror would put you above 85% certainty. (As a side note, one of the ones I have has magnets, like a limpet mine. If I heard on the targets' phone you were coming, I'd just go get the thing, or set the chirps to random, because I am a bastard! >:o{) ) Shawn 2178 From: James M. Atkinson, Comm-Eng Date: Tue Dec 26, 2000 10:38am Subject: Re: who,what where, when, et al > >On the bumper beeper thing, methinks you are going about this the hard way. >You are assuming this thing is running off vehicle power; may not be. Mine >do not, normally. God bless the 9 volt battery! And, if it was, it would >only draw about 2 - 500 mW of lectricity. I don't know if you could hear >the tank coil a la carrier current devices, but I dont think the input >would fluctuate that much. PLUS, it's being masked by current draw from the >vehicle's car stereo memory circuit, the circuit that tells the lights to >come on, the receiver for remote keyless entry, the electronic engine >control, LoJack, .................. Playing devil's advocate, think about >why it would be installed. Is it for unfaithful spouse detection, or >what? Who would require a long - term surv on your client? I think a near >field reciever, an OSCOR, and a flashlight and mirror would put you above >85% certainty. (As a side note, one of the ones I have has magnets, like a >limpet mine. If I heard on the targets' phone you were coming, I'd just go >get the thing, or set the chirps to random, because I am a bastard! >>:o{) ) > >Shawn IMHO, The five most valuable things for a vehicle specific sweep are (in this order): 1) An old pair of Jeans and short sleeve shirt 2) A BOX (yes, a box) of strong surgical gloves (plus cleanup wipes) 3) A small mirror (1-2" round) on a small telescoping stick (no more then a foot long) 4) A small hand held mirror (about 2*3 inches) 5) A small, very strong flashlight (ie: a Surefire 6P or 9N) The regular TSCM equipment is set up near the vehicle being inspected and a allowed to run in automatic mode while the initial physical inspection is performed. However, nothing is connected to the vehicle, nor the vehicle cabin, truck, or hood entered until the external physical is complete. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2179 From: Date: Tue Dec 26, 2000 6:32am Subject: Re: who,what where, when, et al In a message dated 12/26/00 8:41:59 AM Pacific Standard Time, jmatk@tscm.com writes: << IMHO, The five most valuable things for a vehicle specific sweep are (in this order): 1) >snip< 5) A small, very strong flashlight (ie: a Surefire 6P or 9N) >> IMIO A connection for and appointment with a repair shop or auto dealer who has a lift that you can use. MACCFound 2180 From: Steve Uhrig Date: Tue Dec 26, 2000 11:36am Subject: Re: Event-recording Ammeter? Once upon a midnight dreary, Jay Coote pondered, weak and weary: > I am considering ways to measure current in a vehicle for long > periods of time, several hours to days possibly. I'm looking > for periodic jumps in current which might indicate a tracking > transmitter/transceiver. If you have the time and flexibility to do something like this, you have the ability to do a physical search. That is the way to find these things. They don't work without antennas, and very (*very*) few are smart enough to be remote controlled. A simple diode detector will find them. It has been a long time since I have seen one powered by the vehicle's mains. We do not even build external power connections into our vehicle beacons anymore. There are serious 4th Amendment legal considerations which come into play when you tap into the target's vehicle for power. When we do this, mostly outside the U.S., we still maintain an internal battery in the beacon which is recharged via the vehicle power. There would be a steady draw of a few milliamps off the vehicle's power buss, not pulses of hundreds of mils, unless the vehicle had been sitting long enough (days) to fully discharge the beacon's internal battery. Start the engine for a few minutes and you put hours' worth of power back into the beacon's batteries. And it has been a long time since I have seen a genuine tracking beacon transmitting outside the range of 155-180 megacycles, so manual tuning will work there. I assume you are talking about beacon tracking as opposed to the nearly worthless GPS-based tracking toys. Those are even easier to find as the realtime ones have two antennas instead of one, and they can't be buried deep or they wouldn't work. Bounce the car to keep any potential motion sensor tripped which increases the pulse rate. I have monitored quiescent current drain on my own vehicle trying to find a potential ultimately nonexistent problem with a Saber convertacom. Andre is right; there is a lot of crap drawing current under normal conditions in spurts which is confusing. Really confusing. And Jim is right. Lay down some cardboard, put on your grubbies and get your hands dirty. That is the most effective way to find nearly any hidden surveillance device. Would anyone have had access to the target vehicle long enough to bury the beacon that deep in the thing? The antenna either has to be exposed or duplexed on the broadcast antenna to be effective, so look there. And if the beacon is buried that deep, how will someone recover it? Few non-government agencies will be willing to sacrifice a beacon costing 10% of the value of the vehicle. For that matter, few government agencies would, either. Keep it simple. Think like a bad guy. You're trying to outsmart him, not find a piece of equipment. There are several pieces of digital test equipment which will data log readings and let you download them if you really need that capability. The most-used piece of gear in my kit is an old pair of Navy coveralls. A million pockets and little exposed flesh. Large enough (even for me, believe it or not) to slip over whatever else I am wearing. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2181 From: Andre Holmes <1ach@g...> Date: Tue Dec 26, 2000 11:46am Subject: Re: who,what where, when, et al >Why would a Tracking Device be installed= In this line of work theres Law Enforcement people wanting to see who's the new guy on the block. I once saw a guy talking into his wrist a few yrs back while I was cutting grass! > I know of a PI that uses MAFIA tactics to squeeze the competition, the PI told me that this other PI will get no TSCM business.{ I have nothing to do with this guy after I found him out, and Im seeking legal action on him at this very moment.} What was mint by that statement is that when a new client meets with the Sweeper[good guy] The bad PI will tell stories to the new client so that the new client will look elsewhere for a sweeper. The bad PI will go to all measures to get business and keep all other PI,s with in range under surv. How is the Bad PI able to finance the surv on other PI,S.. Answer is buy ripping off people that hired him and asking for additional money then funnels the new money to surv the competition. > Electronic Countermeasures is a dangerous area to be in and is exciting as well. >War stories are always welcome. ----- Original Message ----- From: "James M. Atkinson, Comm-Eng" To: Sent: Tuesday, December 26, 2000 11:38 AM Subject: Re: [TSCM-L] who,what where, when, et al > > > >On the bumper beeper thing, methinks you are going about this the hard way. > >You are assuming this thing is running off vehicle power; may not be. Mine > >do not, normally. God bless the 9 volt battery! And, if it was, it would > >only draw about 2 - 500 mW of lectricity. I don't know if you could hear > >the tank coil a la carrier current devices, but I dont think the input > >would fluctuate that much. PLUS, it's being masked by current draw from the > >vehicle's car stereo memory circuit, the circuit that tells the lights to > >come on, the receiver for remote keyless entry, the electronic engine > >control, LoJack, .................. Playing devil's advocate, think about > >why it would be installed. Is it for unfaithful spouse detection, or > >what? Who would require a long - term surv on your client? I think a near > >field reciever, an OSCOR, and a flashlight and mirror would put you above > >85% certainty. (As a side note, one of the ones I have has magnets, like a > >limpet mine. If I heard on the targets' phone you were coming, I'd just go > >get the thing, or set the chirps to random, because I am a bastard! > >>:o{) ) > > > >Shawn > > > > IMHO, > > The five most valuable things for a vehicle specific sweep are (in this order): > > 1) An old pair of Jeans and short sleeve shirt > 2) A BOX (yes, a box) of strong surgical gloves (plus cleanup wipes) > 3) A small mirror (1-2" round) on a small telescoping stick (no more > then a foot long) > 4) A small hand held mirror (about 2*3 inches) > 5) A small, very strong flashlight (ie: a Surefire 6P or 9N) > > The regular TSCM equipment is set up near the vehicle being inspected > and a allowed to run in automatic mode while the initial physical > inspection is performed. However, nothing is connected to the > vehicle, nor the vehicle cabin, truck, or hood entered until the > external physical is complete. > > -jma > -- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2182 From: James M. Atkinson, Comm-Eng Date: Tue Dec 26, 2000 3:53pm Subject: Chinese espionage handbook details ease of swiping secrets Chinese espionage handbook details ease of swiping secrets http://www.worldnews.com/?action=display&article=5009127&template=worldnews/search.txt&index=recent UPI, Tue 26 Dec 2000 The Chinese government is engaged in large-scale science and technology spying targeted primarily on gaining U.S. defense secrets for military use, The Washington Times said Tuesday. The newspaper report said the Pentagon obtained a Chinese government manual earlier this year detailing the ease in which Beijing has aggressively gathered defense intelligence for more than 30 years. The 250-page book, "Sources and Techniques of Obtaining National Defense Science and Technology Intelligence," is not classified, but Pentagon officials said its contents provide new insights on how the Chinese government obtains secrets. "The Chinese do not spy as God intended it," said Paul Moore, a former FBI intelligence analyst who specialized in Beijing spying activities. Moore said China uses a variety of collectors - students, business people, scientists and visitors abroad - instead of relying on professional intelligence officers working for the Ministry of State Security. According to the spy manual, more than 80 percent of all Chinese spying focuses on open-source material obtained from government and private sector information. The remaining 20 percent is gathered through illicit means, such as electronic eavesdropping and reconnaissance satellites. The manual states that negligence on the part of security review personnel also plays a part in obtaining valuable secrets. For example, a top secret scientific report known as "UCRL-4725 Weapons Development, June 1956" was mistakenly declassified by Los Alamos National Laboratory. It became the basis for Progressive magazine's 1979 article on the development of the hydrogen bomb. The spy manual was written by Huo Zhongwen and Wang Zonxiao, 30-year spy veterans who teach intelligence at the China National Defense, Science and Technology Information Center in Beijing. -- -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2183 From: Date: Tue Dec 26, 2000 0:02pm Subject: Re: Event-recording Ammeter? Jay, I'm interested in this a great deal. If you get any further data on this I would appreciate it if you forward Thanks Dan McGraw Dan@c... 2184 From: Jay Coote Date: Tue Dec 26, 2000 5:55pm Subject: Vehicle Sweeps Jim & Group; Thanks for the valuable comments on vehicle sweeps. About the only thing I'd add to the basics list would be some safety goggles to keep the ! #$@^+ grease, grit and metal flakes out of your eyes while under the vehicle. I'm aware of the VHF bumper-beeper/RDF stuff. There is another commercial tracking system which uses the 900 Mhz band; cellular-like technology and is a transceiver, not a transmitter. No GPS is involved. Users must have a PC, proprietary software, subscription to the service and dial up the tracking transceiver. The company will probably sell to PI's, nobodies or businesses, not only LEA's or .gov's. The operator can turn off the transceiver via the dialup or set it to fire off at any chosen rate. The transceiver has extra leads in a DB-37 or DB-25 for (presumably) other sensors or controls... motion sensor.. camera activation, whatever. It's idle or average current is 30Ma. Peak (read transmit) current is 2.3 Amps. The case is 6" x 1.5" x 4" (inches). Remove the plastic outer case and it's smaller than that. The antenna may be a whip, or coax cable leading to a "patch" about 2" x 2" x 3/8". Unlike GPS hobby-toys, this patch antenna can go under vehicles, behind plastic fenders (etc). The eavesdropper could easily whip up their own battery pack of D-cells for those "installations with time constraints", watch their airtime and track their victim for 1-2 weeks. Best wishes for the New Year, Jay Coote Los Angeles 2185 From: James M. Atkinson, Comm-Eng Date: Tue Dec 26, 2000 7:03pm Subject: Re: Vehicle Sweeps At 6:58 PM -0500 12/26/00, Jay Coote wrote: >Jim & Group; >Thanks for the valuable comments on vehicle sweeps. >About the only thing I'd add to the basics list would be some safety goggles >to keep the ! #$@^+ grease, grit and metal flakes out of your eyes >while under the >vehicle. >I'm aware of the VHF bumper-beeper/RDF stuff. >There is another commercial tracking system which uses the 900 Mhz band; >cellular-like technology and is a transceiver, not a transmitter. No >GPS is involved. >Users must have a PC, proprietary software, subscription to the service > and dial up the tracking transceiver. The company will probably sell to >PI's, nobodies or businesses, not only LEA's or .gov's. >The operator can turn off the transceiver via the dialup or set it to fire >off at any chosen rate. The transceiver has extra leads in a DB-37 or DB-25 >for (presumably) other sensors or controls... motion sensor.. camera >activation, whatever. >It's idle or average current is 30Ma. >Peak (read transmit) current is 2.3 Amps. The case is 6" x 1.5" >x 4" (inches). > >Remove the plastic outer case and it's smaller than that. >The antenna may be a whip, or coax cable leading to a "patch" about >2" x 2" x 3/8". >Unlike GPS hobby-toys, this patch antenna can go under vehicles, behind >plastic fenders (etc). >The eavesdropper could easily whip up their own battery pack of D-cells >for those "installations with time constraints", watch their airtime and >track their victim for 1-2 weeks. > > >Best wishes for the New Year, >Jay Coote >Los Angeles Bah, Goggles are for sissies... when performing vehicle sweeps real TSCM'ers wear welders goggles with their g-string and pasties. Seriously though... My personal feeling is that you should make physical and visual contact with every inch of the lower exterior of the vehicle with special emphasis to the "special places". When your checking the trunk, tail lights, rear panels, speaker panels and so on it is also important to account for every simple wire that leaves the passenger cabin as eavesdropper tend to prefer to stay away from the engine area for quick plants. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2186 From: James M. Atkinson, Comm-Eng Date: Tue Dec 26, 2000 7:31pm Subject: Chinese espionage handbook details ease of swiping secrets December 26, 2000 Chinese espionage handbook details ease of swiping secrets http://washingtontimes.com/national/default-20001226232548.htm By Bill Gertz THE WASHINGTON TIMES China's government is engaged in large-scale science and technology spying targeted primarily on gaining U.S. defense secrets for military use, according to a translated Chinese government manual. The spying handbook was obtained by the Pentagon earlier this year and reveals how Beijing gathers defense intelligence and has been doing so aggressively for more than 30 years. "A common saying has it that there are no walls which completely block the wind, nor is absolute secrecy achievable," the book by two Chinese intelligence specialists states. "And invariably there will be numerous open situations in which things are revealed, either in tangible or intangible form. By picking here and there among the vast amount of public materials and accumulating information a drop at a time, often it is possible to basically reveal the outlines of some secret intelligence, and this is particularly true in the case of Western countries. Through probability analysis, in foreign countries it is believed that 80 percent or more of intelligence can be gotten through public materials." The 250-page book, "Sources and Techniques of Obtaining National Defense Science and Technology Intelligence," is not classified. However, Pentagon officials said its contents provide new insights on how China's government obtains secrets and technology. The book was written by Huo Zhongwen and Wang Zongxiao, 30-year spy veterans who now teach intelligence at the China National Defense, Science and Technology Information Center (DSTIC) in Beijing. The center coordinates sharing of technology from some 4,000 Chinese intelligence organizations. "The Chinese do not spy as God intended it," said Paul Moore, a former FBI intelligence analyst who specialized in Beijing spying activities. China uses a variety of collectors ≠ students, business people, scientists or visitors abroad ≠ instead of relying on professional intelligence officers working for the Ministry of State Security or the People's Liberation Army Second Department, he said. Most often, Beijing's intelligence services do not pay cash for secrets and expect people friendly to the Communist government, many of whom are ethnic Chinese, to provide it free of charge, Mr. Moore said during a recent speech. The book describes Chinese information-gathering as a science. "Consider information piece by piece; place an excessive, one-sided emphasis on the absolute amount of the information collected; gauge the quality of collection work solely on the basis of the amount of information collected," it states. The book contradicts official Chinese claims that its high-technology weapons development is indigenous. Beijing has dismissed U.S. government charges that its nuclear weapons modernization program is based on stolen U.S. nuclear weapons technology, most obtained from U.S. nuclear weapons laboratories. According to the spying manual, more than 80 percent of all Chinese spying focuses on open-source material obtained from government and private-sector information. The remaining 20 percent is gathered through illicit means, including eliciting information from scientists at meetings, through documents supplied by agents or through electronic eavesdropping. Through negligence on the part of security review personnel, valuable secrets can be obtained. The book states that a "Top Secret" scientific report known as "UCRL-4725 Weapons Development, June 1956" was mistakenly declassified by Los Alamos National Laboratory. It became the basis for Progressive magazine's 1979 article on the development of a hydrogen bomb. "This incident tells us that, on one hand, absolute secrecy is not attainable, while on the other hand, there is a random element involved in the discovery of secret intelligence sources, and to turn this randomness into inevitability, it is necessary that there be those who monitor some sectors and areas with regularity and vigilance," the book states. Among the best sources for national defense intelligence material, the book lists publications from Congress, the National Defense Technical Information Center and the National Technical Information Service. As for numerous reports produced by the Energy Department, the Chinese view them as "a source of intelligence of great value." Regarding clandestine spying, the report states: "It is also necessary to stress that there is still 20 percent or less of our intelligence that must come through the collection of information using special means, such as reconnaissance satellites, electronic eavesdropping and the activities of special agents purchasing or stealing, etc." Through direct contacts with scientists and other spying targets, the report states that "this is the procedure commonly used for collecting verbal information, but it is not limited to verbal communications. Participation in consultative activities is also a person-to-person exchange procedure for collecting information." The information is gathered from people and institutions, including government agencies, research offices, corporate enterprises, colleges and universities, libraries, and information offices. A report produced by the National Counterintelligence Center, an interagency group based at CIA headquarters, called the Chinese military and defense industry's use of unclassified information "one of the most startling revelations" of the book. The two-part report, issued in the center's June and September newsletters, suggests the release of the spying manual, first reported by Far Eastern Economic Review magazine, may have been a mistake on the part of the secretive Chinese national security bureaucracy. A second theory is that "China's commitment to expropriating foreign technology is so much a part of its [research and development] culture that the book's authors simply took acceptance of this behavior for granted," the report said. The report described the book as extraordinary "detailed proof" of China's efforts to obtain foreign defense technology "by the people who helped build China's worldwide intelligence network." "Incredible as it seems, this frank account of China's long-standing program to siphon off Western military science and technology, written as a textbook for PRC intelligence officers, was sold openly in China for years," the report said. "But you will not find the book in any bookstore or Chinese library today." The book "represents the first public acknowledgment by PRC officials of China's program to collect secret and proprietary information on foreign military hardware, especially that of the United States," the report said. Chinese defense technology spying increased during the 1960s when the People's Republic of China (PRC) developed its nuclear arsenal and then fell during the turmoil of the Cultural Revolution when collected research material was put in warehouses and "consumed by mice instead of humans," the book said. Since 1978, high-technology spying grew sharply under China's national development plan. I.C. Smith, a retired FBI agent who specialized in Chinese spying, said the FBI severely curtailed its counterspy efforts ≠ Chinese counterspying in particular ≠ during the Clinton administration. "The shortsighted view of the PRC, a view held by those with little intellectual capacity for counterintelligence, is that China doesn't pose a threat," Mr. Smith said in an interview. "After all, they aren't out there making dead drops, communicating via shortwave radio, paying cash concealed in hollow rocks, et cetera, as is the expected norm for the spy business." "This view became dominant in the FBI and even to a large extent, the intelligence community, and this resulted in the FBI essentially de-emphasizing counterintelligence, in general, and the China [counterintelligence] program, in particular. This led directly to the debacle of the Wen Ho Lee investigation," Mr. Smith said. Lee, the Los Alamos nuclear-weapons designer, was suspected of passing nuclear warhead secrets to China. Earlier this year, he pleaded guilty to lesser charges of mishandling classified data on computer tapes that are missing and agreed to tell what he knew to the FBI. As part of the Lee investigation, FBI agents recently dug up computer tapes from a Los Alamos landfill, but later determined the tapes did not contain the secrets Lee took from the laboratory. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2187 From: Larry Malmberg Date: Tue Dec 26, 2000 6:12pm Subject: RE: Vehicle Sweeps Jay, are you talking about Teletrack? Larry Larry Malmberg Investigations and Security 638 North D Street San Bernardino, CA 92401-1110 P.I. 15211, P.P.O. 12466 909-383-8565, 800-655-4549 Facsimile-909-383-8566 www.larrypi.com Not everything that counts can be counted and not everything that can be counted, counts. -----Original Message----- From: sentto-49964-2647-977874919-larrypi=linkline.com@returns.onelist.com [mailto:sentto-49964-2647-977874919-larrypi=linkline.com@r... .com]On Behalf Of Jay Coote Sent: Friday, July 10, 2893 3:44 PM To: tscm-l@egroups.com Subject: [TSCM-L] Vehicle Sweeps Jim & Group; Thanks for the valuable comments on vehicle sweeps. About the only thing I'd add to the basics list would be some safety goggles to keep the ! #$@^+ grease, grit and metal flakes out of your eyes while under the vehicle. I'm aware of the VHF bumper-beeper/RDF stuff. There is another commercial tracking system which uses the 900 Mhz band; cellular-like technology and is a transceiver, not a transmitter. No GPS is involved. Users must have a PC, proprietary software, subscription to the service and dial up the tracking transceiver. The company will probably sell to PI's, nobodies or businesses, not only LEA's or .gov's. The operator can turn off the transceiver via the dialup or set it to fire off at any chosen rate. The transceiver has extra leads in a DB-37 or DB-25 for (presumably) other sensors or controls... motion sensor.. camera activation, whatever. It's idle or average current is 30Ma. Peak (read transmit) current is 2.3 Amps. The case is 6" x 1.5" x 4" (inches). Remove the plastic outer case and it's smaller than that. The antenna may be a whip, or coax cable leading to a "patch" about 2" x 2" x 3/8". Unlike GPS hobby-toys, this patch antenna can go under vehicles, behind plastic fenders (etc). The eavesdropper could easily whip up their own battery pack of D-cells for those "installations with time constraints", watch their airtime and track their victim for 1-2 weeks. Best wishes for the New Year, Jay Coote Los Angeles ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2188 From: James M. Atkinson, Comm-Eng Date: Wed Dec 27, 2000 9:22am Subject: A Few Wireless Bugs 900MHz to 3 Ghz <<<<<< ==================== Windows Should Be Resized to be at least this wide ================>>>>>>>> Video Frequencies AM & FM 900Mhz - 2500Mhz ManufactureModel # FrequencyAMFM Audio PowerPrice ============================= ======= ===== ===== --------------------------------------------------------------------------------------- Radio Shack12-19712.411GhzXX .25mW$99.95 2.4Ghz A/V2.434GhzXX .25mW Transmitter2.453GhzXX .25mW 2.473GhzXX .25mW ---------------------------------------------------------------------------------------- WaveCom JR2.411GhzXX .25mW 2.4Ghz A/V2.434GhzXX .25mW Transmitter2.453GhzXX .25mW 2.473GhzXX .25mW ---------------------------------------------------------------------------------------- RecTron900-SX912.875MhzXX 90dB mV/ $79.95 918.940MhzXX @3 Meters Note 900-SX: Std +4.5 Audio Shift ---------------------------------------------------------------------------------------- RamseyC2000433.250MhzXX 20mW$89.95 C2001433.250MhzXX 100mW$179.95 Note Ramsey: C2000 & C2001 Std +4.5 Audio Shift. Cable Ch 59 ---------------------------------------------------------------------------------------- DefenderAll 2.4Ghz2.413GhzX X.25mW SecurityTransmitters2.432GhzX X.25mW Products2.451GhzX X.25mW 2.700GhzXX .25mW ---------------------------------------------------------------------------------------- Defender900Mhz?????X X???$349.00 Security?????X XH. Pwr$419.00 ProductsNote Defender 900Mhz: Low pwr. model 1000' range. High pwr ??? ---------------------------------------------------------------------------------------- AS1004T2.400GhzXX <10mW 2.427GhzXX <10mW 2.454GhzXX <10mW 2.481GhzXX <10mW Note AS1004T: Self Contained Camera & transmitter unit ----------------------------------------------------------------------------------------- ASK2008T2.400GhzXX??? 2.427GhzXX??? 2.454GhzXX??? 2.481GhzXX??? Note ASK2008T: 3" sma antenna, 59 select freqs, 400' range ----------------------------------------------------------------------------------------- ASK-3004T 2.413GhzXX 50mW 2.432Ghzxx 50mW 2.451GhzXX 50mW 2.470GhzXX 50mW Note ASK-3004T: 1000' range(law enforcement power), 3" sma antenna ------------------------------------------------------------------------------------------ ASK-5004T 2.413GhzX 50mW 2.432Ghzx 50mW 2.451GhzX 50mW 2.470GhzX 50mW Note ASK-5004T: 1000' range(law enforcement power), wire antenna ------------------------------------------------------------------------------------------ ATV-2400-T2.398GhzXX 34-38mW$159 2.412GhzXX 34-38mW 2.428GhzXX 34-38mW 2.442GhzXX 34-38mW Note ATV-2400-T: 2000' range w/sma antenna ------------------------------------------------------------------------------------------ 1.2Ghz1.250GhzXX??? Raw Units1.255GhzXX??? 1.260GhzXX??? 1.265GhzXX??? 1.270GhzXX??? 1.275GhzXX??? 1.280GhzXX??? 1.285GhzXX??? ----------------------------------------------------------------------------------------- 2.4Ghz2.398GhzXX??? Raw Units2.405GhzXX??? 2.412GhzXX??? 2.416GhzXX??? 2.420GhzXX??? 2.428GhzXX??? 2.435GhzXX??? 2.442GhzXX??? ---------------------------------------------------------------------------------------- SG-590433.250MhzXX15mW SG-590C433.250MhzXX15mW Note SG-590(C): 300'-500' range, tiny camare & transmitter ----------------------------------------------------------------------------------------- AVX900S7910.1MhzXX 450mW ----------------------------------------------------------------------------------------- HDHD142001.700Ghz toXX 10mW$1699.00 Communications1.850GhzXX 10mW ----------------------------------------------------------------------------------------- HDHD142012.000Ghz toXX 10mW$1699.00 Communications2.700GhzXX 10mW ----------------------------------------------------------------------------------------- Cable TV Ch56415.250MhzXX Cable TV Ch57421.250MhzXX Cable TV Ch58427.250MhzXX Cable TV Ch59433.250MhzXX Cable TV Ch60439.250MhzXX ----------------------------------------------------------------------------------------- RCA911.9Mhz - X??? Wireless913.9Mhz X??? SpeakersNote: no video, just audio ----------------------------------------------------------------------------------------- JVC911.35Mhz - X??? Cordless913.65Mhz X??? HeadphonesNote: no video, just audio ---------------------------------------------------------------------------------------- RCA911.5Mhz -X??? HeadPhones913.5MhzX??? Note: no video, just audio ----------------------------------------------------------------------------------------- -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2189 From: Steve Uhrig Date: Wed Dec 27, 2000 10:41am Subject: Re: A Few Wireless Bugs 900MHz to 3 Ghz Once upon a midnight dreary, James M. Atkinson, Comm-Eng pondered, weak and weary: > ----------------------- RamseyC2000433.250MhzXX > 20mW$89.95 > C2001433.250MhzXX > 100mW$179.95 > Note Ramsey: C2000 & C2001 Std +4.5 > Audio Shift. Cable Ch 59 > ----------------------------------------------------------------- Jim, you might want to calibrate your test equipment on these. The center of channel 59 cable freq is 433.25 megs. That is a coincidence. The transmitters are at 434.0. The actual frequency marked on the SAW is 433.92 which is the actual remote control frequency assignment, but it seems as if they are hand picking ones deliberately closer to 434.0 since that is a standard amateur frequency. As wide as video is, you can be a few hundred KCs off and not notice. And SAWs are not precise in frequency. And what was your test setup to determine the RF outputs of these things? Using my best efforts I am unable to accurately measure these low levels on a spectrum analyzer. Every connector and patch cord adds attenuation. Letting the cables flop around on the bench changes the readings. Waving my hands near the bench makes a +/- 3dB difference at 2 gigs. Do you know the exact losses in your test setup and are you compensating for them, and do they never change, or are you taking the info from the manufacturer's data sheets? The levels seem too low for a calorimeter, and I see no other way than a rectum analyzer to read these low power levels and high frequencies. Info on spurs and harmonics also would be useful. Most of these toys have little filtering and plenty of crap radiating in places where it doesn't belong. That will show up on a spectrum analyzer and is worthy of comment. The power levels are meaningless without specifying suppression of garbage. On AM video, I can mess with the sync ratio and make any power output I want to. Doesn't mean I would have a usable signal though. The last Ramsey piece I played with did not even have DC restoration. I guess people still buy them though. And none of them have adjustable sync levels to where you can hang a MMIC or an SAU-4 gadget on them to boost the RF. The amps are not linear enough, and when they compress the sync you lose it on the receive end. If anything you played with (AM) had a sync stretcher, that would be good info to include also. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2190 From: James M. Atkinson, Comm-Eng Date: Wed Dec 27, 2000 11:38am Subject: Re: A Few Wireless Bugs 900MHz to 3 Ghz At 10:22 AM -0500 12/27/00, James M. Atkinson, Comm-Eng wrote: ><<<<<< ==================== Windows Should Be Resized to be at least >this wide ================>>>>>>>> > > >Video Frequencies AM & FM 900Mhz - 2500Mhz > >ManufactureModel #FrequencyAMFM >Audio PowerPrice >============================= ======= >===== ===== >--------------------------------------------------------------------------------------- > >Radio Shack12-19712.411GhzXX >.25mW$99.95 >2.4Ghz A/V2.434GhzXX >.25mW Snip, Note to the list... The posting labeled "A Few Wireless Bugs 900 MHz to 3 GHz" was not based on information that I myself collected, but was instead provided to me by another list member who wanted the data circulated but did not want it to be linked back to him. The source of the material should be considered 'Usually Reliable", and the information itself should be considered at least "Probably True". -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2191 From: James M. Atkinson, Comm-Eng Date: Wed Dec 27, 2000 1:25pm Subject: Famous Last Words Famous Last Words: -- Unfortunately I can not totally agree with comrade Stalin. -- Is this really the first time that you have traveled on the roof of a train? -- Of course you don't look fat in that dress honey. Well... maybe a little. -- Hey ya'll watch this. -- Hey, it's OK. Bungees NEVER break... -- LOOK! An old mine from world war... -- Sure, rope bridges last forever. -- Trust me, I know what I'm doing. -- Zooming is excellent with these Sony's. It's just like as if that elephant is going to... -- Do I cut the red or the blue wire? -- Oh shut up! I won't fall! -- Oh, it looks like a dolphin is swimming this way... -- Step back a bit, I can't get you in the picture. -- Listen, I'm taking a course in chemistry, I know what I'm doing. -- I wonder what happens if these two wires touch. -- It's OK, I saw them do it on TV. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From: James M. Atkinson Date: Mon Dec 24, 2001 2:43pm Subject: Christmas editorial A little "tongue-in-cheek" Christmas editorial of just what too much security can result in: http://www.tscm.com/SantaSchool.gif -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4414 From: James M. Atkinson Date: Mon Dec 24, 2001 3:02pm Subject: Re: Phone line FM What do you mean you don't have a TDR? Heck, Steve Uhrig has a snot load of them he can fix you up with for some real short money ( http://www.swssec.com/used.html ). In a pinch you can use an Oscilloscope, and a simple 555 to provide a basic pulse. Jack the signal up by about 20 dB with a 2N3904, drop in a 9 volt battery, a couple of caps, and use a 2k ohm ten turn pot to bias the circuit (we're talking maybe $5 in parts, plus the pot and battery). Just be sure to isolate the DC of the loop and ring freq or your likely to get a memorable lesson in the pyrotechnic capabilities of a 555 timer chip. Trigger the scope off the 555, and use the delay to capture both the rising side of the pulse as it bounces back. divide the delay setting by 2.025 times your Once your feeling confident with the circuit add a splitter so you can strobe two lines at once, or strobe one line, and pick it off from a second line (cross talk TDR). Actual TDR's are not expensive, and I would suggest that you lean towards something that can shoot two lines at once, AND can perform cross-talk analysis. -jma At 10:49 PM +0200 12/24/01, A Grudko wrote: >I did a sweep this afternoon with an interesting result. Here's a digest of >my instruction to my technician: > >**Client has about lines, 15 ISDN, 5 analogue primarily for modem/fax use. > >One important direct analogue number has strong FM radio audio (98.55Mhz >commercial station ) on it when on hook. 4 others (same exchange & >instruments) do not. No measurable extra current or voltage loss. No >response to tone sweep/combinations. No double jumpers or series connections >on site. > >Pick up the 'phone and the audio is 100%, no interference. > >My suspicion - poor quality tap, perhaps a series relay (coil to activate a >recorder or provide PD power for a TX) plus low pf capacitor (to pluck off >the AC - audio) unintentionally creating a basic LC oscilator (receiver).** > >The only time I have come across this type of breakthrough before was on a >loooong run to a crude series recorder in about '83, almost directly under a >25 KW MW commercial AM transmitter mast..... > >I do not have a TDR and I have no authority to ask the phone company >(actually a government department) to disconnect the cable from the main >frame. > >Am I kidding myself that this obvious interference could indicate a tap? > >Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , >Est. 1981 >International business intelligence and investigations >Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 >0255 - 244 0256 (Fax) >SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom >When you need it done right - first time > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4415 From: Matthew Paulsen Date: Mon Dec 24, 2001 7:39pm Subject: ABCNews realplayer content link Uses RealPlayer 8. Content such as: Counter-Terrorism Training - A nonlethal self-defense course teaches people what to do around criminals and terrorists at - http://www.abcnews.go.com/sections/us/MP/DailyNews/011001training_video_mp.h tml Main link: http://www.abcnews.go.com/sections/us/video_index/Video_index.html#Osama 4416 From: Aimee Farr Date: Mon Dec 24, 2001 7:48pm Subject: Domestic Repression Disorder? > Attorney General John Ashcroft last week set up an interagency task > force to find administrative, legislative and advanced technological > means of preventing leaks of classified information. [-]the following collected from public source.[-] "We want a classified memo a day to leak." * * * * ...will be remembered as the year that brought to light *** open political compromise of the American Intelligence Community and Criminal Justice System. *** the first organized effort to focus public effort to restrain further development of technofascism -- the societal form described by George Orwell in his prophetic novel "1984." *** We will do this through research, educational activities, litigation and campaigns to focus the effort of the American Public. Our philosophy is as follows: STOP THE SPYING Only a full and undisguised look into the hidden world of secret government operations can displace unwarranted fears of reaction by Big Brother and guide the public effort to end illegal and unjustified spying. END CLANDESTINE INTERVENTION History shows that clandestine intervention by our government into the sovereign affairs of other countries has only created an image for us as "Ugly Americans" and has not improved our national security. Before the foreign clandestine operations *** involve us in another national catastrophe, *** these operations must be exposed, restrained, terminated and prevented from reoccurring in the future. END DOMESTIC REPRESSION History also demonstrates that our government's foreign policies and practices often come home to become domestic policies and practices. Individuals and agencies long accustomed to clandestine espionage on a global scale will implement similar activities here at home if the political atmosphere allows them to do so. The repressive activities of the intelligence community must be fully exposed and terminated by the American people. END EXCESSIVE SECRECY Foreign and domestic espionage operates in a world of secrecy. This atmosphere of government secrecy is what will surely usher in technofascism. An atmosphere of government openness and citizen access must be created in America if we are to maintain our status as free citizens in a democratic society. END TECHNOLOGICAL HEGEMONY There must be greater citizen's access to advanced technology if that technology is to be used for the benefit of all humanity instead of being used to rain destruction on smaller nations and to fill dossiers on our families, friends, and neighbors. * * * * Each issue will present information and analysis of different aspects of the U.S. Intelligence effort. None of the information presented, no matter how embarrassing to the government, will pose a threat to national security. It has been estimated, by a committee of Congress, that over 90% of the information now classified should not be. Our information comes from publicly available sources. We welcome the comments and suggestions of our readers and supporters and incourage [sic] anyone interested in doing similar work to contact us. * * * * Propaganda with pictures of men in cloaks with long, pointy daggers. * * * * LOCAL RESEARCH/ACTION TEAMS *** Community based teams could begin to investigate the workings *** ready to help with the formation and training of such groups when help is requested. It is our hope that every intelligence unit, no matter how "small" will experience a thorough "citizens examination" of their operations. * * * * . . . From the 1976 OC-5 congressional hearings. It's a jaw-dropper. ~Aimee Then: "We're fighting Nazism, we're not fighting the German people." Later: "It's nonsense, we're not fighting against the Nazis, we're fighting against the Germans, hate your enemy, kill them." -- Montgomery. 4417 From: tek492p Date: Tue Dec 25, 2001 9:11pm Subject: Re: Phone line FM Andy -- Without a TDR, the only way I can think of to check the line is by a physical search of the entire line where you can get access to it. Also, disconnect the line at both ends, short one end, and measure the resistance. Also, disconnect the line at both ends, and measure the capacitance of the twisted pair per foot. Jack 4418 From: SEAL Date: Tue Dec 25, 2001 9:53pm Subject: Online Documents Merry Christmas to you all. I was just wondering if anybody knows of a site to download the FBI's MIOG or any other operations manual from the FBI and other agencies. Thanks. --------------------------------- Do You Yahoo!? Send your FREE holiday greetings online at Yahoo! Greetings. [Non-text portions of this message have been removed] 4419 From: SEAL Date: Wed Dec 26, 2001 4:29am Subject: Fwd: Online Documents Note: forwarded message attached. --------------------------------- Do You Yahoo!? Send your FREE holiday greetings online at Yahoo! Greetings. [Non-text portions of this message have been removed] 4420 From: James M. Atkinson Date: Wed Dec 26, 2001 6:57am Subject: Re: Phone line FM At 3:11 AM +0000 12/26/01, tek492p wrote: >Andy -- > >Without a TDR, the only way I can think of to check the line is by a >physical search of the entire line where you can get access to it. > >Also, disconnect the line at both ends, short one end, and measure >the resistance. > >Also, disconnect the line at both ends, and measure the capacitance >of the twisted pair per foot. > >Jack I have found that there are several "Must Have" instruments when performing TSCM checks of phone lines. IMHO, The most important of all of these is the TDR, and more specifically; a dual channel unit capable to both regular TDR analysis, plus cross-talk analysis. It is very important not to skimp here, and you want one that gives you a graphical display of the trace (and not just distance). As a minimum you need something that can "ping" the line and allow you to observe the line with an Oscilloscope. My personal preference is a Riser Bond 6000, and a modified set of Tektronix 1502's which drive a high speed strip chart recorder. The second most important instrument is a compact Oscilloscope, with a hand held size being a real plus. Bandwidth must be high enough to permit the clean viewing of RF signals to at least 100 MHz. You may want to add a small tunable preamplifier to punch up the signals by about 40 dB. I lean towards the Fluke 199 with my own preamp. Baing able to trigger off of the 60 Hz line frequency is a real plus. Third, you'll need a small audio amp such as the 1059, PicoAmp, uAmp, or similar unit that allows you to listen in to the line and drive the audio to the O'scope. I lean more towards the 1059, but prefer to use a set of popper clips with an tunable impedance matching network and filter for optimal results. Fourth, a very simple tunable device to allow you to tune down into the VLF, but it needs to have sub micro-volt performance between 30 kHz and 500 kHz... and generally peaked out between 80 kHz and 400 kHz. I prefer a modified SCD-5. Fifth, I prefer an "Impedance Stabilization Network/Transient Limiter" to allow the line being examined to be directly attached to a spectrum analyzer... first a low frequency unit designed to view subaudible, audible, and ultrasonic signals, and then a second unit for RF. What is of greatest interest is any kind of tones or signalling on the line, and more specifically cross-talk coming in tat may be present on nearby lines (ie: do we have a 2100 Hz or DTMF-C coming in via cross-talk on an un-terminated line) I have found it helpful to add a adjustable circuit to tune-up the line. I build my own. Sixth, a humble digital voltmeter with the ability to measure in excess of 50 mega-ohms. It doesn't have to be a fancy unit, but it does have to be dead on stable. Add to this a small box with a balanced line test circuit. I lean towards the Fluke line. Seventh, I like both a milliohm and giga-ohm test set to show the quality of the line, but watch it on those high voltage breakdown tests. Eighth, a set of "craft tools" to include a Craft Set/Butt Set, a audible tone generator, a silent tone tracer, caller ID box, Dialed Number Display, and various related odds and ends. Add to this just about anything else you want, but watch it with the "Phone Analyzers". While they are handy and time saving items to have, they should be used to supplement your basic instruments, NOT replace them. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4421 From: A Grudko Date: Wed Dec 26, 2001 4:54am Subject: Re: Re: Phone line FM - Original Message - > Without a TDR, the only way I can think of to check the line is by a > physical search of the entire line where you can get access to it. Absoloodle Jack - that's what my techie will do when he gets back from leave and if there is a device we'll find it - usually the capacitance check works best. I was more interested in the reason for the very clear 'FM radio' effect. I've heard similar signals on mains power lines a few times but they always sounded like interference from AM stations. This was like I'd connected my sterio to the line andI cant think of any other reason but an unintentional LC Osc. Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4422 From: James M. Atkinson Date: Wed Dec 26, 2001 11:41am Subject: Islands in the Clickstream: Christmas 2001 - The Base Islands in the Clickstream: Christmas 2001 - The Base It's a shame when words like "The Base" or "Homeland Defense" are associated in the first instance with Al Queda and in the second with the Third Reich, because then they're difficult to recapture. Oh well. We can still say what we mean and hope it connects. Al Queda and the Third Reich share at least one common ground, the highjacking of religion in order to twist it into something powerful but destructive. In Christian mythology, an angel of light, his stature enhanced by his formidable intellect, turns to the "dark side of the force" because he can't stand being second banana, which in a way is the same story. I think I have some insight into how official religions work. My father was a Christian and my mother was a Jew. I served as an Episcopal priest for sixteen years, not because I got drunk one night and thought it might be fun, but because it was the fullest way I could express in action a transformation that had turned me literally inside out and changed the way I thought about everything. Today I am a Jew who speaks Christianity fluently, but I hope I am more than that. My wife and I have seven children who range from Christian to Jew to Neo-Pagan to Buddhist to agnostic, and there is no more holy ground than that created by our energetic discussions about our paths. The core of spirituality does seem to be, as that splendid imposter Carlos Castaneda wrote, does your path have heart? If it does, you always find common ground with others whose paths do too. But having been in the religion "business," which all organized religion is, one way or another, I know deeply the truths that lurk in the shadows and how easily an impulse that begins with the best intentions is turned into something destructive, how easily any religion can inflate the egos of its adherents until they believe that they and they alone are right. The dehumanization of the Other is a precondition to killing the Other, regardless of which group is hated and which does the killing. So knowing we're right and justifying our evil deeds go together. The greatest evil in the world, it seems to me, is done in the name of righteousness and religion. Every banner that drips with blood has the word "God" at its center. The spirituality that makes sense to me, on the other hand, begins with knowing that I haven't got a clue. Those aren't just words. Deeply, deeply, as I have grown older, the realization that I know absolutely nothing about those "Big Truths" is the only thing I do know. I am also left knowing that in moments of genuine communion I am heard and understood and am listening at the same time in the depths of my being to the truth of the humanity of the Other. Why don't you write a "spirituality book?" I am sometimes asked. The simple answer is that I just said everything I know about that. The closer I grow to myself, others, and to what we call "God," the more of a mystery everything becomes. It's bright, but it's darkness too. In the presence of that mystery, there is nothing to do but fall down and shut up. So when I responded to recent events by suggesting a "homeland defense network" in which we practice the meaning of "be alert!" I meant above all the practice and creation of a spiritual base on which everything else rests. I meant the development of awareness by first learning to use the tools that all religions and spiritual traditions give us. I meant the day-in and day-out discipline of putting those tools to use under each others' watchful eyes so feedback helps us correct excesses. I meant sharing our wisdom and experience in a robust open-source model of life. A conversation with a former FBI computer security friend this weekend turned to the practical matters of "being alert." We agreed that his work as head of a "Tiger Team" and spiritual work are both practical efforts to build on a strong base and make things as secure as we can. Spirituality is the most practical thing in the world when it isn't distorted. It's a way to face the insecurity and uncertainty of life and build meaningful community through practical action as a way of affirming unity in the face of chaos and meaning in the face of meaninglessness, building a web or network that glows with its own inner light in the otherwise cold and lonely darkness of the Void. In the process of building that network, the distinctions that we thought defined us disappear, the boundaries that we thought were limits dissolve, and energy and information flows at the speed of light. Critical mass is achieved, then ignition, and light explodes outward in the darkness toward the receding edges of everything. The dark forces that justify creating chaos and destruction know no national boundaries. This is bigger than national boundaries. This is about a species at a critical moment of its evolution knowing the difference between the darkness and the light, not in a naive or trivial way, but deeply, from knowing ourselves intimately, then making the right choices. It begins with daring to be aware. That in essence is a spiritual task. The Homeland Defense Network in essence as well is about choosing to do what we know how to do but need reinforcement to do right and persist in doing over the long term. Awareness is transformed into action that makes flesh what is otherwise sentiment or whimsy. It means the fusion of being, knowing and doing. That's one meaning of Christmas, whether or not it's the story you tell. I like to believe it's the meaning of Ramadan and Hanukkah too. It is, at any rate, the meaning I wish for you and yours at this dark but enlightening time of year. ********************************************************************** Islands in the Clickstream is an intermittent column written by Richard Thieme exploring social and cultural dimensions of computer technology and the ultimate concerns of our lives. Comments are welcome. Richard Thieme is a professional speaker, consultant, and writer focused on the impact of computer technology on individuals and organizations - the human dimensions of technology and work - and "life on the edge." Feel free to pass along columns for personal use, retaining this signature file. If interested in publishing columns online or in print or employing Richard as a professional speaker, retreat leader or consultant, email for details. To subscribe to Islands in the Clickstream, send email to rthieme@t... with the words "subscribe islands" in the body or subject heading of the message. To unsubscribe, email with "unsubscribe islands" in the message. Or subscribe at the web site www.thiemeworks.com. To subscribe to Spirit of the Times, the newsletter of the Homeland Defense Network, send email to rt@h... with the words "subscribe HDN" in the body or subject heading of the message. To unsubscribe, email rt@h... with "unsubscribe HDN" in the message. Islands in the Clickstream (c) Richard Thieme, 2001. All rights reserved. ThiemeWorks on the Web: http://www.thiemeworks.com and http://www.richardthieme.com ThiemeWorks P. O. Box 170737 Milwaukee WI 53217-8061 414.351.2321 ********************************************************************* -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4423 From: Steve Uhrig Date: Wed Dec 26, 2001 2:04pm Subject: Re: Phone line FM - TDRs Once upon a midnight dreary, James M. Atkinson pondered, weak and weary: > What do you mean you don't have a TDR? Heck, Steve Uhrig has a > snot load of them he can fix you up with for some real short > money ( http://www.swssec.com/used.html ). > > In a pinch you can use an Oscilloscope, and a simple 555 to > provide a basic pulse. Jack the signal up by about 20 dB with a > 2N3904, drop in a 9 volt battery, a couple of caps, and use a 2k > ohm ten turn pot to bias the circuit (we're talking maybe $5 in > parts, plus the pot and battery). Just be sure to isolate the DC > of the loop and ring freq or your likely to get a memorable > lesson in the pyrotechnic capabilities of a 555 timer chip. Remember you are talking pulse typically in the 2 to 20 nanosecond region. You need to buffer the output depending on how you use the 555 so all those long antennas hanging on the thing don't cause problems. Then you need a scope with min 100 megacycle bandwidth, and usually a calculator to do the math off the scope screen. Yes, simple ping boxes are well capable of doing the job, but a proper TDR has adjustable velocity factors, variable pulse widths, auto display of the distance to the fault, indication of shorted, open or powered line, and a lot more elegant features. Higher end TDRs have adjustable impedance, horizontal and vertical magnification, digital storage of traces, automatically display faults from closest to furthest, indicate dB return loss through the fault, and lots more. A real joy to work with. I do happen to have a good number of Riser Bond TDRs here, from 2401s to 1205C and CX. Contact me for details and prices. Prices start at $550 and go to about 4 times that. All are tested, new or very recent batteries, manuals, and guaranteed. Several of these were used on Tom Clancy's job this year. They were such timesavers that I got one for every tech and assigned it to them personally. Now we have wound down that phase of the job and I don't need nearly a dozen units, especially at the end of the year when our fiscal year ends in less than a week. Can take credit cards. Email if interested. I am redoing the LAN here and having trouble distributing the satellite link around, so email will be sporadic for a few days, but we're not answering phones either. Ron will be here all week if anyone is looking for him. Good info on TDRs on www.riserbond.com, also Jim's page Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4424 From: Aimee Farr Date: Wed Dec 26, 2001 2:02pm Subject: Taking control. Final lesson. Previously, we discussed "taking control of the interview," and we examined Tom Clancy's tactics with a CNN anchor, with comments from Mr. Steve Uhrig. Today, we conclude with the final, advanced section of this lesson module. Roll film.... Intelligence Activities: Senate Resolution 21. Vol. II: Huston Plan. Hearings, September 23, 24, and 25, 1975. . . . Senator Huddleston: Now, electronic surveillance -- what all does this involve? Mr. Angleton: Pardon, sir? Senator Huddleston: Electronic surveillance -- what does this involve specifically? Mr. Angleton: We were not involved in electronic surveillance. Senator Huddleston: You know what it is, do you not? Mr. Angleton: Yes, sir. It is all forms of eavesdropping. Senator Huddleston: Is this tapping telephones? Mr. Angleton: Telephones. Senator Huddleston: That is, a wiretap. Mr. Angleton: Bugs. Senator Huddleston: Bugs in rooms, or in places where people might assemble? Mr. Angleton: Precisely. Senator Huddleston: Without their knowledge? Mr. Angleton: Hopefully. Senator Huddleston: Surreptitious entry -- what is this describing? Mr. Angleton: That is the ability to penetrate into either a building or mail -- Senator Huddleston: Break it down into a simple context that we hear in every police court in the country on Monday morning. It is breaking and entering to a great degree, is it not? It might be... Mr. Angleton: As long as there is no--I say I agree, sir. Senator Huddleston: It would be breaking into someone's home or into his office or his apartment, and in effect, taking what you consider to be important to the objective. Mr. Angleton: It is not so much taking as it is photographing. Senator Huddleston: Or photographing. Mr. Angleton: There really is not much breakage. [...] I could draw some comparisons to contemporary Senate testimony, but I have been unable to identify any bases for such comparisons. Regards, Aimee E. Farr mailto:aimfarr@p... Attorney & Counselor At Law 5400 Bosque, Suite 675 Waco, Texas 76710-4418 4425 From: Aimee Farr Date: Wed Dec 26, 2001 6:21pm Subject: RE: Islands in the Clickstream: Christmas 2001 - The Base Excellent article! > The greatest evil in the world, it seems to me, is done in the name of > righteousness and religion. Good article on "moral force." http://www.amina.com/article/finapropw.html (Chechen-Russo War of 1994-96) > So when I responded to recent events by suggesting a "homeland > defense network" > in which we practice the meaning of "be alert!" The Chinese would see this as a strength -- it's the flip-side of Mao -- the defensive model of People's War. Then again, they might think it's cover for a sleeping army of long range penetration cyber-guerrillas. ;') "Any country may be occupied in war: once the psychological barrier which seems to prevent governments from realizing this is overcome, it is a simple matter to cache arms and explosives in advance and to appoint men who can lead and hold a population's loyalty. You may be certain that Russia and China, who set the highest value on large-scale guerrilla action, have already trained powerful forces to fight behind the lines of any future invader. But if NATO's supreme commander was asked tomorrow what has been done to prepare for guerrilla warfare if Western Europe is overrun, I am equally sure that the honest answer would be: nothing. It has been left, as usual, to improvisation. Great things can be done with poor material, as we proved in Cyprus. But when proper resources are available, the horizon is boundless." -- General Grivas. Sir Colin Gubbins (SOE) set up defenses in anticipation of a German invasion. The organizations did not receive sufficient support and flopped, so they had to resort to arms race defense. This was viewed by some as a strategic error, not in the sense of active resistance....but in their greater defensive strategy in managing enemy perceptions. Seems like we face a similar situation, maybe just in the sense of our electronic/information spectrum...whatever... IW. (pronounced "eiuuuw...") I think Richard's Home Defense project is a good idea. ~Aimee (I was a PR major. Guerrilla warfare and public relations are twinned concepts.) 4426 From: Matthew Paulsen Date: Wed Dec 26, 2001 9:04pm Subject: RE: Online Documents MIOG = Manual of Investigative Operations and Guidelines, goes with Manual of Administrative Operations and Procedures (MAOP). Various searches will produce hits such as: http://www.antipolygraph.org/documents/fbi-polygraph-guidelines.shtml http://cryptome.org/carnivore-rev.htm But these are inconsistent in quality/quantity. Your best chance is to order a MIOG and MAOP through a FOIA request. The FBI index is http://foia.fbi.gov/foiaindex.htm FOIA reference is http://www.usdoj.gov/04foia/04_3.html FOIA request: http://www.usdoj.gov/04foia/referenceguidemay99.htm#how -----Original Message----- From: SEAL [mailto:vlundqvist@y...] Sent: Tuesday, December 25, 2001 7:53 PM To: vlundqvist@y... Subject: [TSCM-L] Online Documents Merry Christmas to you all. I was just wondering if anybody knows of a site to download the FBI's MIOG or any other operations manual from the FBI and other agencies. Thanks. --------------------------------- Do You Yahoo!? Send your FREE holiday greetings online at Yahoo! Greetings. [Non-text portions of this message have been removed] Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 4427 From: ariel silverstone Date: Wed Dec 26, 2001 10:37pm Subject: RE: Online Documents $425 !!! >From: "Matthew Paulsen" >Reply-To: >To: "'TSCM submissions'" >Subject: RE: [TSCM-L] Online Documents >Date: Wed, 26 Dec 2001 19:04:45 -0800 > >MIOG = Manual of Investigative Operations and Guidelines, goes with Manual >of Administrative Operations and Procedures (MAOP). Various searches will >produce hits such as: > > >http://www.antipolygraph.org/documents/fbi-polygraph-guidelines.shtml >http://cryptome.org/carnivore-rev.htm >But these are inconsistent in quality/quantity. Your best chance is to >order a MIOG and MAOP through a FOIA request. The FBI index is >http://foia.fbi.gov/foiaindex.htm >FOIA reference is http://www.usdoj.gov/04foia/04_3.html >FOIA request: http://www.usdoj.gov/04foia/referenceguidemay99.htm#how > >-----Original Message----- >From: SEAL [mailto:vlundqvist@y...] >Sent: Tuesday, December 25, 2001 7:53 PM >To: vlundqvist@y... >Subject: [TSCM-L] Online Documents > > > >Merry Christmas to you all. I was just wondering if anybody knows of a site >to download the FBI's MIOG or any other operations manual from the FBI and >other agencies. Thanks. > > > > > >--------------------------------- >Do You Yahoo!? >Send your FREE holiday greetings online at Yahoo! Greetings. > >[Non-text portions of this message have been removed] > > > >Yahoo! Groups Sponsor > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > >It is by caffeine alone I set my mind in motion. >It is by the juice of Star Bucks that thoughts acquire speed, >the hands acquire shaking, the shaking is a warning. >It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > _________________________________________________________________ Join the worldís largest e-mail service with MSN Hotmail. http://www.hotmail.com 4428 From: Steve Uhrig Date: Fri Dec 28, 2001 0:49pm Subject: Congrats to Andre Congratulations are in order to list member Andre Holmes 1ach@v.... He got an A in the college electronics class he is taking. (I saw the webpage from the college listing the grades. They don't give away As just for showing up). This is the real thing. None of us are born knowing this stuff. Most people trying to be in this business never mastered basic electronics, cannot define a volt, an amp, an ohm, do a simple Ohm's Law calculation, define a capacitor or anything like that. Yet they spend a year's salary on some fancy box with blinking lights and want to hang with the big boys. It is vital to understand basic electronic theory if you are going to be truly effective in this business. Andre has chosen to supplement his self paced learning with formal classroom electronics training. This was an excellent choice, and his top grade proves he is paying his dues to get into TSCM, or any electronics business, the right way. Good work Andre. Others who do not have a formal basic electronics background should look into courses at your local tech school or community college. You will be well rewarded for your effort in learning basic electronic theory. All the equipment in the world is no substitute for a man who understands the job he needs to do. A man with a working knowledge of electronics and communications theory would be more effective on a sweep with only a flashlight and a screwdriver than someone else with little background but a truck full of expensive electronics. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4429 From: Steve Uhrig Date: Fri Dec 28, 2001 3:56pm Subject: Tek solid state O'scopes? Hi all, Does anyone have any direct experience with the fairly recent Tek solid state oscilloscopes, like the TDS2XX series? Has anyone done a formal comparison of them to Fluke Scopemeters aka the 199? I know the Scopemeter does a lot more than the Tek, but that is not the primary concern. I need to purchase a few for a project and am looking for inputs. I own Fluke Scopemeters but have never seen a solid state Tek unit. Would appreciate any info. Tks ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4430 From: Matthew Paulsen Date: Fri Dec 28, 2001 6:19pm Subject: Australia in the "KGB Internet age" From - http://www.zdnet.com.au/newstech/communications/story/0,2000024993,20262535, 00.htm Related story: Anti-terrorist law: Australia pushes e-mail interception http://www.zdnet.com.au/newstech/security/story/0,2000024985,20262458,00.htm By Rachel Lebihan, ZDNet Australia 21 December 2001 Australiaís NSW Council for Civil Liberties has described the governmentís endorsement this week of legislation that will allow ASIO to access unread e-mails as reminiscent of the Soviet Secret Police, the KGB. Although yet to be passed by Parliament, ìCabinetís endorsement is the governmentís intention to give these powers,î NSW Council for Civil Liberties president Cameron Murphy told ZDNet Australia. ìWhen the legislation is passed should apply retrospectively from [Tuesdayís] Cabinet meeting,î he added. The raft of proposals, which include amendments to the Telecommunications (Interception) Amendment Act 1979, will give ASIO -- Australiaís internal security organisation which focuses on groups who play an important part in looking out for public interests such as Trade Union and civil liberties group Electronic Frontiers of Australia ñ additional powers to intercept unread e-mails, something that hasnít been allowed before. îLiterally thousands of people are going to have their rights infringed,î Murphy said. ìThis is like the KGB, but itís the KGB in the Internet ageÖBusinesses and individuals should be highly concerned about these moves, itís an invasion of their privacy.î Murphy identified several scenarios which he says havenít been taken into consideration under the Governmentís proposed new measures, the first being lawyer/client privilege in e-mail communication and commercial in confidence business documents sent electronically. Of concern is the fact that ASIO officers are protected under law and canít be identified, therefore they canít be prosecuted if any confidential information is leaked, according to Murphy. ìIf they did leak information there is very little an individual or an organisation could do about it,î Murphy said. The Office for the Attorney General Darryl Williams declined to comment on specific cases such as those pointed out by Murphy but the Attorney-General said in a press conference earlier this week that there are a number of safeguards in place that will prevent public rights from being abused. îMy expectation is that they would only be used in very serious cases where there is a very serious threat to life or property and there is a reasonable suspicion that a person may be able to assist by providing information that would hinder or prevent the activity occurring,î the Attorney-General said. îThe safeguards are numerous. The Director-General of Security personally signs the warrant. It has to be approved by a Minister, namely the Attorney-General, and it has to be approved by an independent judicial officer, either a federal magistrate or legal member of the Administrative Affairs Tribunal,î he added. The Attorney-General played down the move to intercept unread e-mails. ì This is just a small point in relation to telecommunications interception,î he said. ìWe have the capacity to intercept telephone exchanges and other telecommunications, including inspecting computers and recorded messages. But there is, I am advised, a small gap in the legislation that does not properly, or doubtfully authorise the reading of unread e-mails. It's only a small drafting issue,î he added. Of concerns over privacy, the Attorney-General said: ìThe exercise of protecting privacy is an important oneÖNow, what we seek to do is to balance the interests of keeping personal information private - that's something that most people in the community strongly desire - with the other public interest of ensuring that people can go about their lives safe and secure from malicious acts by others, in particular terrorists. The balancing process that we've undergone in working out the ASIO powers, I believe is a fair one and I believe that the public will strongly support it.î Sincerely, Matt Paulsen Matthew Paulsen Consulting http://mpconsulting.home.attbi.com/ The information in this email is confidential and may be legally privileged. It is intended solely for the addressee. Access to this email by anyone else is unauthorized. If you believe this method of communication to be compromised or at risk, do not contact me through this medium, instead establish a secondary method of communication with me through secure courier, personal contact, multiple encryption systems, or if not possible please do not respond to the message. -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 7.0.3 for non-commercial use mQGiBDuoDQgRBADcOOT+8bdrRTorYkI3/uFhxSCaQkSFXE0tj7oLLr+BMIc409vD n2woHrlPnhGZyYUX8JfNBe2TvFfW8EwD4L/Exd3M7ywff2sRIAoZeuQMZbNI69N5 lYMvsb/Knux7EpCY/lSSOqfT1Lo0mSEq/KmFDA+akUrBq6tXQHo+ak2h3QCg/5Cl Xyyr3zhOCP9oKc4sk2RUQvED/2HpoQt1FIXOLEUDjLVXd/IdwIZbGfxTkeJhq5vW exrjnKhDgDAFMl3kVvhsDvM0JA1AODGOa821oReca2dK+blSBpXS652k4FMzQuGc Q91H174bFjLmsL75PSRYjGo2qZC2JbLMFnAtR6k8Dhdz3EgE3ttrU5G/A05xQ9ux gUZLBADEhVxr7kXYNwYedp+Hv+xWJpBnYwrLOy9dGr1hoM0AhPtT+/L6uyv0yJmd HWYZUbhyeUy5dwWdquilLOBaF+l0BtgRdrmtl5T+20rsI+sc/aVNbtfp7GjwWriy Ygep3BCf24PPvzh8JgY3PlTmVYOE8StDBQm+Z7pBZ80ouIA4brQkTWF0dGhldyBQ YXVsc2VuIDxtcGF1bHNlbjZAaG9tZS5jb20+iQBYBBARAgAYBQI7qA0ICAsDCQgH AgEKAhkBBRsDAAAAAAoJELjYcPfEakW9IRsAoOgv510tXgAot4LI3zdV7iaVr0Io AJ4w9CSCx/t0C4lDBlZM5PgZJ0qABLkCDQQ7qA0IEAgA9kJXtwh/CBdyorrWqULz Bej5UxE5T7bxbrlLOCDaAadWoxTpj0BV89AHxstDqZSt90xkhkn4DIO9ZekX1KHT UPj1WV/cdlJPPT2N286Z4VeSWc39uK50T8X8dryDxUcwYc58yWb/Ffm7/ZFexwGq 01uejaClcjrUGvC/RgBYK+X0iP1YTknbzSC0neSRBzZrM2w4DUUdD3yIsxx8Wy2O 9vPJI8BD8KVbGI2Ou1WMuF040zT9fBdXQ6MdGGzeMyEstSr/POGxKUAYEY18hKcK ctaGxAMZyAcpesqVDNmWn6vQClCbAkbTCD1mpF1Bn5x8vYlLIhkmuquiXsNV6TIL OwACAggAvP1XSJNhkYvPiTVrM41MBBuAAPR21PxJbrMkB5z89+3KaJ7h+gEHeCDy GE8QmVYfSMpz7/sq8W2B9vNDUn2dLnKCI3VPeszMW9oN/JR3QnL2T+sThXvLY8TF 966NIIGrHIVDeb9hFoVOPrzghuWOv8Q0K0V0LquBF4IndgNy3S7s4ZjTExcMi3hn Pu/PgUXzb1gGsmFoyZFy6YYGKqQ5+27UtghHbEeOIL90+bep4xuDAZ0v3Hjh+tnI a+vIFdjVLxsTTwwB4GW3o1P1+F9wj+KfkPqWroDAYBtwV2a3YQ4MfXgTSGYysm2+ mvnyHwrE0ZnO+0KLK7pPJ/tCMagFEYkATAQYEQIADAUCO6gNCAUbDAAAAAAKCRC4 2HD3xGpFvVKWAJ9Uz57//yNxW1pmdfjcJc3rCI/FiwCeKZV8pnywou/rqlRy0Jfy 6oPOPrk= =97B9 -----END PGP PUBLIC KEY BLOCK----- 4431 From: Marcelrf-iDEN-Test Portable Date: Fri Dec 28, 2001 8:02pm Subject: Six New Airports Select Identix Fingerprint Technology To Provide Enhanced Security Six New Airports Select Identix Fingerprint Technology To Provide Enhanced Security http://prnewswire.com/cgi-bin/stories.pl?ACCT=104&STORY=/www/story/12-27-2001/0001639576&EDATE= -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.onelist.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.onelist.com/subscribe/NEXTEL2 [Non-text portions of this message have been removed] 4432 From: Aimee Farr Date: Fri Dec 28, 2001 10:24pm Subject: RE: Australia in the "KGB Internet age" I am trying to keep up with foreign surveillance laws, and I'm struggling post 9-11. In the past, the EPIC pubs have been helpful, at least as a starting point. http://www.powells.com/features/epic/epic.html Appreciate notes of changes in your country. ~Aimee 4433 From: Aimee Farr Date: Fri Dec 28, 2001 11:46pm Subject: Trulock decision - retaliation, shared computer password protected files http://laws.lp.findlaw.com/4th/002260.html PUBLISHED UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT ------------------------------------------------* NOTRA TRULOCK, III; LINDA CONRAD, Plaintiffs-Appellants, v. LOUIS J. FREEH, in his personal capacity; NEIL GALLAGHER, in his No. 00-2260 personal capacity; STEVE DILLARD, in his personal capacity; BRIAN HALPIN, in his personal capacity; STEVEN CARR, in his personal capacity; JANE DOE, I, in her personal capacity, Defendants-Appellees. ------------------------------------------------* Appeal from the United States District Court for the Eastern District of Virginia, at Alexandria. Albert V. Bryan, Jr., Senior District Judge. (CA-00-1268-A) Argued: May 7, 2001 Decided: December 28, 2001 Before MICHAEL and GREGORY, Circuit Judges, and Benson Everett LEGG, United States District Judge for the District of Maryland, sitting by designation. ____________________________________________________________ Affirmed in part, vacated in part, and remanded by published opinion. Judge Legg wrote the opinion, in which Judge Gregory joined. Judge Michael wrote an opinion concurring in part and dissenting in part. ____________________________________________________________ COUNSEL ARGUED: Larry E. Klayman, JUDICIAL WATCH, INC., Washing- ton, D.C., for Appellants. Richard Alan Olderman, Appellate Staff, Civil Division, UNITED STATES DEPARTMENT OF JUSTICE, Washington, D.C., for Appellees. ON BRIEF: Paul J. Orfanedes, Brett M. Wood, John L. Martin, JUDICIAL WATCH, INC., Wash- ington, D.C., for Appellants. Stuart E. Schiffer, Acting Assistant Attorney General, Helen F. Fahey, United States Attorney, Barbara L. Herwig, Appellate Staff, Civil Division, UNITED STATES DEPARTMENT OF JUSTICE, Washington, D.C., for Appellees. ____________________________________________________________ OPINION LEGG, District Judge: This case requires us to determine whether the Appellants' com- plaint, which the district court dismissed under FRCP 12(b)(6), alleges sufficient facts to proceed to discovery. We agree that their Fourth Amendment claims (count one), alleging an illegal interroga- tion and search of a townhouse and a computer, were properly dis- missed, primarily on the basis of qualified immunity. We conclude, however, that the complaint sufficiently pleads a claim under the First Amendment that the Defendants searched Trulock's home and com- puter in retaliation for a magazine article that Trulock wrote, criticiz- ing the White House, the Federal Bureau of Investigation ("FBI") and other departments of the federal government. Accordingly, we reverse and remand the First Amendment claim (count two) for further pro- ceedings. I. Notra Trulock served as the Director of the Office of Intelligence of the U.S. Department of Energy ("DOE") from 1994 to 1998. From 1995 to 1998, Trulock also served as the DOE's Director of the Office of Counterintelligence. Trulock alleges that he uncovered evi- dence that Chinese spies had systematically penetrated U.S. weapons laboratories, most significantly the Los Alamos Nuclear Laboratory. 2 Trulock contends that the White House, the FBI, and the Central Intelligence Agency ("CIA") ignored his repeated warnings about the espionage. Congress eventually learned of the security breach and in 1998 invited Trulock to testify, which he did on several occasions. That same year, Trulock was demoted within the DOE; he was ulti- mately forced out in 1999. In early 2000, Trulock wrote an account of his findings, which crit- icized the White House, the DOE, the FBI, and the CIA for turning a blind eye to the security breach. Trulock claims that the manuscript did not include any classified information. Nonetheless, in March of 2000, Trulock submitted the manuscript to the DOE for a security review, but the DOE declined to examine it. Afterward, Trulock sent the manuscript to the National Review, which published an excerpt in an edition that was circulated in early July of 2000. Although neither side placed the article in the record, the parties agree that it charged the administration with incompetence. Plaintiff Linda Conrad has been the Executive Assistant to the Director of the Office of Intelligence at the DOE for more than six years. During Trulock's tenure she reported to him. Conrad now reports to Trulock's successor, Lawrence Sanchez. Trulock and Con- rad live in a Falls Church, Virginia townhouse, which Conrad owns. Conrad alleges that on the morning of July 14, 2000, when she arrived at work, Sanchez took her aside to say that the FBI wanted to question her about Trulock. Sanchez warned her that the agents had a warrant to search the townhouse and would break down the front door, in the presence of the media, if she refused to cooperate. Although the Plaintiffs allege that Sanchez made this statement to Conrad "on behalf of the FBI," the complaint does not recite a factual basis for this assertion. Nor does the complaint allege that any of the five individual Defendants either directed Sanchez to make the threat or knew about it. Later that day, around 4:00 p.m., FBI Special Agents Brian Halpin and Steven Carr arrived at DOE headquarters and escorted Conrad to a conference room. Although the complaint states that they were armed, Conrad does not contend that the agents displayed their weap- 3 ons, raised their voices, or otherwise threatened her during the three hour interview. According to the complaint, Conrad was able to receive two incoming telephone calls, one of which was from Trulock, but that the agents "would not let [her] take either telephone call in private." (J.A. at 9.) The complaint further alleges that the agents refused to allow Conrad to make any outgoing calls. The complaint implies that Con- rad was not at liberty to leave the conference room. When questioned on this point during oral argument, however, Conrad's attorney could not assert that she ever tried to leave the room (e.g., to place a call in private) or that the agents told her that she was not free to terminate the interview and leave. The agents queried Conrad about Trulock's personal records and computer files. Conrad responded that she shared a computer with Trulock, but that each of them maintained separate, password- protected files on the hard drive. Conrad and Trulock did not know each other's passwords and could not, therefore, access each other's private files, Conrad stated. The agents questioned Conrad for about three hours. Towards the end of the interview, the agents gave Conrad a form, which they asked her to sign. The complaint alleges that the agents did not explain the form to Conrad and that Conrad did not read it, learning only afterwards that she had consented to a search of her house. The complaint does not allege that the agents claimed to have a search warrant, threatened to break down Conrad's door if she refused to sign, or mentioned the media. Conrad does maintain, however, that she was fearful, crying and shaking. At the end of the questioning, the agents followed Conrad to her townhouse, where Trulock was waiting. When Trulock asked to see the search warrant, the agents responded that they had no warrant but that Conrad had consented to the search. The complaint does not con- tend that Conrad tried to withdraw her consent or that Trulock tried to bar the search on the ground that his consent, as a resident of the house, was also necessary. The agents located the computer in the bedroom. Special Agent Carr and an unidentified FBI computer specialist (named in the com- 4 plaint as Jane Doe I) searched the computer's files for about ninety minutes. The complaint alleges that Agent Carr looked at Trulock's password protected files. When the search was over, the specialist, after giving Conrad a receipt, took the hard drive away. Two weeks later, Conrad and Trulock filed the instant Bivens suit.1 Count one of the complaint, brought under the Fourth Amendment, alleges that: (i) the Defendants violated Conrad's rights by seizing her during the interview; (ii) the Defendants violated Conrad and Trulock's rights by coercing Conrad's consent to search their home; and (iii) that Conrad's consent, even if voluntary, was insufficient to permit the search of Trulock's private computer files. In count two, brought under the First Amendment, Trulock contends that the FBI conducted the search and seizure in direct retaliation for the unflatter- ing magazine article. Prior to discovery, the Defendants moved under Fed. R. Civ. P 12(b)(6) to dismiss the complaint, arguing that it failed to state a con- stitutional violation either for unlawful search and seizure or for retal- iation. Each Defendant also argued that he was entitled to qualified immunity on both counts. The district court granted Defendants' motion to dismiss, holding that the Defendants, having violated no clearly established law, were entitled to qualified immunity. With respect to Trulock's retaliation claim, the district court concluded that "other than the timing of the interrogation and search, the complaint presents no indications that the actions by the defendants were other than a good faith effort to determine whether classified information was being unlawfully possessed." (J.A. at 43.) Because the district court granted Defendants' motion to dismiss, our review is de novo. Stuart Circle Hospital Corp. v. Aetna Health Management, 995 F.2d 500 (4th Cir. 1993). Like the district court, we must assume all facts plead by Appellants to be true. Mylan Labs, Inc. v. Matkari, 7 F.3d 1130, 1134 (4th Cir. 1993). ____________________________________________________________ 1 Under Bivens v. Six Unknown Named Agents of Federal Bureau of Narcotics, 403 U.S. 388 (1971), an individual may bring a civil suit against a federal officer for damages stemming from a constitutional vio- lation. 5 II. Qualified immunity shields government officials from civil liability "insofar as their conduct does not violate clearly established statutory or constitutional rights of which a reasonable person would have known." Harlow v. Fitzgerald, 457 U.S. 800, 818 (1982). This immu- nity "protects law enforcement officers from`bad guesses in gray areas' and ensures that they are liable only `for transgressing bright lines.'" Wilson v. Collins, 141 F.3d 111, 114 (4th Cir. 1998) (quoting Maciariello v. Sumner, 973 F.2d 295, 298 (4th Cir. 1992)). Immunity applies to "all but the plainly incompetent or those who knowingly violate the law." Malley v. Briggs, 475 U.S. 335, 341 (1986). Govern- ment officials performing a discretionary function are immune from liability for civil damages unless (i) the officers' conduct violates a federal statutory or constitutional right; (ii) the right was clearly established at the time of the conduct; and (iii) an objectively reason- able officer would have understood that the conduct violated that right. Milstead v. Kibler, 243 F.3d 157, 161 (4th Cir. 2001) (citing Wilson v. Layne, 526 U.S. 603, 614-15 (1999)). The first step in analyzing whether qualified immunity exists is to determine whether the plaintiff has alleged a violation of a statutory or constitutional right. Siegert v. Gilley, 500 U.S. 226, 231 (1991); see also County of Sacramento v. Lewis, 523 U.S. 833, 841 n.5 (1998) (noting that if courts were to rule on qualified immunity without determining the constitutionality of the challenged conduct, "stan- dards of official conduct would tend to remain uncertain, to the detri- ment both of officials and individuals"). Next, the trial court must assess whether the right at issue was clearly established at the time of the breach. The court should focus upon "the right [not] at its most general or abstract level, but at the level of its application to the specific conduct being challenged." Wiley v. Doory, 14 F.3d 993, 995 (4th Cir. 1994) (internal quotations omitted) (quoting Pritchett v. Alford, 973 F.2d 307, 312 (4th Cir. 1992)); see also Anderson v. Creighton, 483 U.S. 635, 639-41 (1987) ("The contours of the right must be sufficiently clear that a reasonable official would understand that what he is doing violates that right"). This does not mean, however, that an official will be protected by qualified immunity unless the very act in question has previously 6 been held unlawful. Anderson, 483 U.S. at 640. Rather, the unlawful- ness must be apparent in light of pre-existing law. Id. Only if the plaintiff has alleged a violation of a clearly established right should the court next determine whether a reasonable person in the official's position would have known that his actions violated that right. DiMeglio v. Haines, 45 F.3d 790, 794 n.1 (4th Cir. 1995). When the inquiry reaches this juncture, "the immunity defense ordinarily should fail, since a reasonably competent public official should know the law governing his conduct." Harlow, 457 U.S. at 818-19. III. A. Conrad first alleges that the agents, in violation of her Fourth Amendment rights, illegally seized her during their heavy-handed interrogation. The district court concluded that Ms. Conrad was not in custody during her interview. We agree. A person is "seized" only when, by means of physical force or a show of authority, his freedom of movement is restrained. United States v. Mendenhall, 446 U.S. 544, 553 (1980).2 A seizure has occurred if, in view of all the surrounding circumstances, a reasonable person would have believed that he was not free to leave. Id. at 554; see also Michigan v. Chesternut, 486 U.S. 567, 573 (1988). A person need not make an attempt to leave in order to be seized. Mendenhall, 446 U.S. at 554. The threatening presence of several officers, the dis- play of a weapon by an officer, some physical touching, or the use of words or a tone of voice suggesting that compliance with the officer's request might be compelled, can all translate into a seizure. Id. ____________________________________________________________ 2 The Fourth Amendment provides that "the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated . . . ." Not all interaction between a police officer and an individual, however, results in a "sei- zure" in violation of the Fourth Amendment. Terry v. Ohio, 392 U.S. 1, 19 n.16 (1968). 7 Conrad argues that a seizure took place because the agents would not allow her to call anyone during the interview, they would not allow her to take two incoming phone calls in private, and they told her not to tell anyone about the interview. Conrad also points to San- chez' statement to her that the FBI had a search warrant for her home and that "if she did not agree to cooperate, [the FBI] would break down her front door to execute the warrant, [and] the media would be present." (J.A. at 6.)3 According to Conrad, this statement made her feel as though she was not free to leave. These factors simply do not amount to a seizure. The interview transpired at a familiar setting, Conrad's workplace. The agents wore no uniforms and displayed no weapons. There are no allegations that the agents used physical force, threatening language, or an intimidat- ing tone. Concerning the phone calls, Conrad does not allege that she attempted to leave the room (to place or take a call in private) and was refused. Nor does she allege, either in the complaint or in her briefs, that the agents told her that she was not free to leave the conference room. Conrad apparently contends only that the agents would not themselves leave the room to give her privacy to talk. Moreover, Sanchez' statement, though heavy-handed, would not make a reasonable person feel that she was restricted from leaving the interview. The conversation between Conrad and Sanchez pertained to the search of her home and not the ground rules for the interview. In addition, Sanchez made the statement when Conrad first arrived at work, whereas the FBI questioning of Conrad took place several hours later at the end of the day. There is no allegation that Conrad queried the agents about the warrant or the threat. Nor does Conrad allege that the agents knew about Sanchez' statement. Accordingly, we affirm the district court's decision that Conrad was not "seized" during her interview. ____________________________________________________________ 3 The complaint alleges that Sanchez made the statement on behalf of the FBI but does not state the basis for this knowledge. Nevertheless, because we are operating under the motion to dismiss standard, we must accept this allegation as true. 8 B. Appellants next allege that the search of their computer and home was illegal because (i) the agents had no warrant, and (ii) Conrad's consent to search was involuntary. The Defendants concede that there was no warrant, but contend that the search was valid because Conrad signed a consent form. Valid consent is a well-recognized exception to the Fourth Amend- ment prohibition against warrantless searches. Schneckloth v. Busta- monte, 412 U.S. 218 (1973). Consent to search is valid only if it was knowing and voluntary and courts assess validity based on the "total- ity of the circumstances." Mendenhall, 446 U.S. at 557.4 Appellants rely primarily on Bumper v. North Carolina, 391 U.S. 543 (1968). In Bumper, the police searched a house that the defendant shared with his grandmother. When the police arrived, an officer told the defendant's grandmother that they had a search warrant. She responded, "go ahead," and opened the front door. The Supreme Court held that the police could not rely on the grandmother's con- sent, which was given only after the official conducting the search asserted that he possessed a warrant. Id. at 550. The Court observed that acquiescence to an assertion of lawful authority does not consti- tute an understanding, intentional and voluntary waiver of rights under the Fourth Amendment, concluding, "[t]he situation is instinct with coercion . . . [w]here there is coercion, there cannot be consent." Id. at 549-50. ____________________________________________________________ 4 In criminal cases, the burden is on the Government to prove the vol- untariness of an individual's consent. Schneckloth, 412 U.S. at 222. The circuit courts are not in agreement about which party bears the burden of proof in a civil suit that alleges a constitutional violation based on involuntary consent. Compare Valance v. Wisel, 110 F.3d 1269, 1278-79 (7th Cir. 1991) (burden on plaintiff to prove that consent is involuntary), and Larez v. Holcomb, 16 F.3d 1513, 1517-18 (9th Cir. 1994) (burden on plaintiff), and Ruggiero v. Krzeminski, 928 F.2d 558, 562-63 (2nd Cir. 1991) (burden on plaintiff), and Crowder v. Sinyard, 884 F.2d 804, 824-26 (5th Cir. 1989) (burden on plaintiff), with Tarter v. Raybuck, 742 F.2d 977, 980-81 (6th Cir. 1984) (burden on defendant). Given the pos- ture of this case, however, we need not decide this issue. 9 Conrad's consent is invalid under the rationale of Bumper. Although the agents who conducted the search never claimed to have a warrant, Sanchez told Conrad that the FBI had a search warrant, Conrad believed that Sanchez was conveying this information on behalf of the FBI, and the complaint alleges that Sanchez was indeed acting at the FBI's behest. Nevertheless, the district court was correct in holding that the Defendants have qualified immunity. The Defendants fall into two categories, the first of which includes Special Agents Halpin and Carr, who secured the consent and conducted the search. There is nei- ther an allegation nor any evidence that these agents directed Sanchez to misrepresent that the FBI possessed a warrant or that the agents even knew about Sanchez' statement. Conrad never mentioned the statement to them. The agents gave Conrad an explicit waiver form, which she signed. The agents truthfully told Trulock that they had no warrant, but that they had secured Conrad's consent. Based upon these facts, no reasonable officer would have believed that Conrad's consent was involuntary. Accordingly, Agents Halpin and Carr enjoy immunity. The second group of defendants include former FBI Director Freeh and two FBI supervisors, Gallagher and Dillard. In a Bivens suit, there is no respondeat superior liability. Estate of Resenberg v. Crandell, 56 F.3d 35, 37 (8th Cir. 1995). Instead, liability is personal, based upon each defendant's own constitutional violations. While the com- plaint alleges that Sanchez was speaking at the request of the FBI, there is no allegation that any of these three individuals were person- ally complicit in Sanchez' alleged misrepresentations. Accordingly, these Defendants also enjoy immunity. C. Trulock argues that the search of his password-protected files vio- lated his Fourth Amendment rights. He asserts that the search was improper because: (i) there was no warrant; (ii) neither he nor Conrad consented voluntarily to the search; and (iii) even if Conrad's consent were valid, she did not have the authority to consent to a search of his password-protected files. As we have previously stated, Bumper leads us to conclude that Conrad's consent to search was involuntary. 10 Even if her consent were voluntary, however, it would not authorize a search of Trulock's private, password-protected files. Consent to search in the absence of a warrant may, in some circum- stances, be given by a person other than the target of the search. United States v. Block, 590 F.2d 535, 539 (4th Cir. 1978). Two criteria must be met in order for third party consent to be effective. First, the third party must have authority to consent to the search. Stoner v. California, 376 U.S. 483 (1964). Second, the third party's consent must be voluntary. Bumper, 391 U.S. at 548. Authority to consent originates not from a mere property interest, but instead from "mutual use of the property by persons generally having joint access or control for most purposes, so that it is reason- able to recognize that any of the co-inhabitants has the right to permit the inspection in his own right and that others have assumed the risk that one of their number might permit the common area to be searched." United States v. Matlock, 415 U.S. 164, 171 n. 7 (1974); accord Frazier v. Cupp, 394 U.S. 731, 740 (1969) (holding that joint use of a duffel bag gave a third party authority to consent to the search of the bag). We conclude that, based on the facts in the complaint, Conrad lacked authority to consent to the search of Trulock's files. Conrad and Trulock both used a computer located in Conrad's bedroom and each had joint access to the hard drive. Conrad and Trulock, however, protected their personal files with passwords; Conrad did not have access to Trulock's passwords. Although Conrad had authority to consent to a general search of the computer, her authority did not extend to Trulock's password-protected files. See Block, 590 F.2d at 541. In United States v. Block, this Court held that the defendant's mother had authority to consent to a search of his room, which was located in the home they shared. The mother's authority did not extend to a search of a locked footlocker located within the room, however. We noted that authority to consent "cannot be thought auto- matically to extend to the interiors of every discrete enclosed space capable of search within the area . . . the rule has to be one of reason that assesses the critical circumstances indicating the presence or 11 absence of a discrete expectation of privacy with respect to the partic- ular object." Id. at 541. Trulock's password-protected files are analogous to the locked footlocker inside the bedroom. By using a password, Trulock affirma- tively intended to exclude Conrad and others from his personal files. Moreover, because he concealed his password from Conrad, it cannot be said that Trulock assumed the risk that Conrad would permit others to search his files. Thus, Trulock had a reasonable expectation of pri- vacy in the password-protected computer files and Conrad's authority to consent to the search did not extend to them. Trulock, therefore, has alleged a violation of his Fourth Amendment rights. Nevertheless, the Defendants are entitled to immunity because a reasonable officer in their position would not have known that the search would violate clearly established law.5 At the time of the search, at least one published case, although from a district court out- side this circuit, held that a third party may consent to the search of a shared computer when the third party has complete access to the computer. See United States v. Smith, 27 F. Supp. 2d 1111 (C.D. Ill. 1998). But see United States v. Barth, 26 F. Supp. 2d 929 (W.D. Tex. 1998) (holding that a computer repair technician did not have author- ity to consent to a search of the defendant's computer). Conversely, we are aware of no reported cases answering whether an individual has a reasonable expectation of privacy in password- protected files stored in a shared computer. Trulock, though conced- ing the absence of computer specific caselaw, urges us to recognize a clearly established right based upon Block and other similar cases. We decline to do this. Although cases involving computers are not sui generis, the law of computers is fast evolving, and we are reluctant ____________________________________________________________ 5 According to the allegations in the complaint, Agent Carr and the unidentified computer specialist were the only Defendants directly involved in the search and seizure of Trulock's password-protected files. Although Agent Halpin was present at the townhouse, the complaint does not allege that he participated in the search. Furthermore, there is no allegation that the supervising Defendants (Freeh, Gallagher, and Dil- lard) either ordered the search of the files or knew about the password- protection. 12 to recognize a retroactive right based on cases involving footlockers and other dissimilar objects. Thus, a reasonable officer in the Defen- dants' position would not have known that Conrad's consent did not authorize them to search Trulock's files; the Defendants are, there- fore, entitled to qualified immunity.6 D. In his final claim, Trulock alleges that the Defendants trammeled his First Amendment right to free speech by retaliating for his National Review article.7 The district court dismissed Trulock's claim, holding that "other than the timing of the interrogation and search, the complaint presents no indication that the actions by the Defendants were other than a good faith effort to determine whether classified information was being unlawfully possessed." (J.A. at 43.) We must disagree. The First Amendment guarantees an individual the right to speak freely, including the right to criticize the government and government officials.8 New York Times v. Sullivan, 376 U.S. 254, 273 (1964); accord Barrett v. Harrington, 130 F.3d 246, 264 (6th Cir. 1997). To protect that right, public officials are prohibited from retaliating against individuals who criticize them. Suarez Corp. Indus. v. McGraw, 202 F.3d 676, 685 (4th Cir. 2000). Fear of retaliation may chill an individual's speech, and, therefore, permit the government to "`produce a result which [it] could not command directly.'" Perry v. Sinderman, 408 U.S. 593, 597 (1972) (alterations in original)(citation omitted); ACLU v. Wicomico County, Md., 999 F.2d 780, 785 (4th Cir. 1993). ____________________________________________________________ 6 As previously stated, the complaint does not allege that the agents knew of Sanchez's statement about a warrant. They had no reason, there- fore, to believe that Conrad's consent was anything but voluntary. 7 It should be noted that the article itself is not part of the record. We know only that it was highly critical of the FBI and other departments of the federal government. 8 The First Amendment provides that "Congress shall make no law . . . abridging the freedom of speech." 13 To establish a First Amendment retaliation claim, a plaintiff must prove three elements: (i) that his speech was protected; (ii) that the defendant's alleged retaliatory action adversely affected his constitu- tionally protected speech; and (iii) that a causal relationship existed between his speech and the defendant's retaliatory action. Suarez, 202 F.3d at 685-86. In count two of the complaint, Trulock alleges that the Defendants retaliated against him for publishing the critical article. The Defen- dants argue that dismissal was justified because: (i) the complaint does not allege facts which, if proven, would show the causal rela- tionship between Trulock's speech and the Defendants' actions; and (ii) the Defendants are entitled to qualified immunity. Ordinarily, a complaint should not be dismissed for failure to state a claim under Federal Rule of Civil Procedure 12(b)(6) unless it appears beyond all doubt that the plaintiff can prove no set of facts in support of his claim that would entitle him to relief. See Conley v. Gibson, 355 U.S. 41, 45-46 (1957); Labram v. Havel, 43 F.3d 918, 920 (4th Cir. 1995). Under the motion to dismiss standard, factual allegations, once plead, must be accepted as true. See Jenkins v. Mc- Keithen, 395 U.S. 411, 421-22 (1969). The liberal pleading requirements of Rule 8(a) demand only a "short and plain" statement of the claim. A plaintiff often must offer more detail, however, than the bald statement that he has a valid claim of some type against the defendant. Migdal v. Rowe Price-Fleming Int'l, 248 F.3d 321, 326 (4th Cir. 2001).9 Although there is no height- ened pleading standard in qualified immunity cases, a district court has the discretion to ask a plaintiff to "put forward specific, noncon- clusory factual allegations that establish improper motive." Crawford- El v. Britton, 523 U.S. 574, 598 (1998). ____________________________________________________________ 9 "The presence [ ] of a few conclusory legal terms does not insulate a complaint from dismissal under Rule 12(b)(6) when the facts alleged in the complaint" do not support the legal conclusion. Young v. City of Mount Ranier, 238 F.3d 567, 577 (4th Cir. 2001) (dismissing Fourteenth Amendment claim where complaint alleged "deliberate indifference" but included no facts to support allegation). 14 Whether Trulock's claim can survive a motion for summary judg- ment remains to be seen, but we find that Trulock has alleged suffi- cient facts in support of his retaliation claim to withstand a motion to dismiss and proceed to discovery. The complaint contains facts that bolster Trulock's claim of improper motive. First, the timing of the search raises an inference of retaliatory motive. Stever v. Independent School District No. 625, 943 F.2d 845, 852 (8th Cir. 1991). The arti- cle was published in early July 2000 and the search occurred on July 14, 2000. The article chastised the White House, the CIA, the DOE, and the FBI, the very agency that executed the search. According to the Plaintiffs, a criminal referral is necessary for the FBI to com- mence an official investigation. The complaint alleges, however, that the FBI initiated the investigation without receiving a criminal refer- ral from the DOE. Sanchez told Conrad, on behalf of the FBI, that there was a search warrant when there was none. Finally, two weeks after the incident, Sanchez told Conrad that if she initiated a lawsuit, Sanchez, to protect the "Bureau," would deny telling Conrad that the FBI claimed to have a search warrant. All of these factors, when viewed together and accepted as true, raise a reasonable inference that the interrogation and search were retaliatory. We cannot conclude beyond all doubt that Trulock can prove no set of facts in support of his claim that would entitle him to relief. Having found that Trulock alleged the violation of a constitutional right, we must next address the Defendants' claim of qualified immu- nity. It is well established that a public official may not misuse his power to retaliate against an individual for the exercise of a valid con- stitutional right. Suarez v. McGraw, 202 F.3d 676, 685 (4th Cir. 2000); accord Block v. Ribar, 156 F.3d 673, 678 (6th Cir. 1998).10 This holds true even when the act of the public official, absent the retaliatory motive, would otherwise have been proper. ACLU, 999 F.2d at 785. Thus, we hold that it was clearly established at the time of the search that the First Amendment prohibits an officer from retal- iating against an individual for speaking critically of the government. ____________________________________________________________ 10 "[G]overnment officials in general, and police officers in particular, may not exercise their authority for personal motives, particularly in response to real or perceived slights to their dignity. Surely anyone who takes an oath of office knows - or should know - that much." Duran v. City of Douglas, 904 F.2d 1372, 1378 (9th Cir. 1990). 15 Finally, we turn to whether a reasonable officer would have known that retaliatory conduct was impermissible. The Defendants make only one contention on this issue. They argue that a reasonable officer could have believed that the magazine article, because of its content, did not enjoy First Amendment protection. The Defendants' effort to support this argument is half-hearted at best. They have not placed the article on the record. They have not stated why the contents would lack First Amendment protection. They have made no effort to show that a prudent officer of the FBI could reasonably have believed that the article did not enjoy First Amendment protection. Simply put, Defendants have done nothing more than offer their bald assertions that they are entitled to qualified immunity. Accordingly, we remand the case to the district court to proceed on the retaliation claim. IV. For the reasons stated herein, we vacate that portion of the district court's order that dismissed Trulock's First Amendment retaliation claim and remand for further proceedings consistent with this opinion. AFFIRMED IN PART, VACATED IN PART, AND REMANDED MICHAEL, Circuit Judge, concurring in part and dissenting in part: I dissent from part III.C. of the majority's opinion, but otherwise concur. The owner of password-protected computer files has a clear expectation of privacy in those files that is protected by the Fourth Amendment. Another person who does not know the passwords has no authority to consent to a search of these private files because he lacks the "joint access or control" required by United States v. Matlock, 415 U.S. 164, 171 n.7 (1974). The plaintiffs, Notra Trulock and Linda Conrad, both used Conrad's computer, but each maintained personal files that were protected by passwords. Conrad told the defendant-FBI agents that she did not know either the passwords for Trulock's files or the contents of those files. As a result, Conrad's general consent to a search of her computer could not authorize the FBI's warrantless search of Trulock's password-protected files. This should have been abundantly clear to any reasonable law enforcement officer operating in the year 2000. I therefore respectfully dissent 16 from the majority's decision to affirm the grant of qualified immunity to the FBI officials on the search of Trulock's password-protected computer files. On a separate point, I agree with the majority that the officials are entitled to qualified immunity on their warrantless search of Conrad's house, but I write independently to explain why I reach that conclusion. I. The majority holds that Conrad lacked the authority to consent to a search of Trulock's password-protected computer files. Ante at 11. I agree. I also agree with the majority's conclusion, see id., that Trulock's computer files are analogous to the locked footlocker in United States v. Block, 590 F.2d 535, 540-42 (4th Cir. 1978) (holding that a mother's consent to the search of her son's room did not extend to his locked footlocker). I respectfully disagree, however, with the majority's view that the defendants are entitled to qualified immunity because there was no clearly established law saying that one co-user's consent to search a computer does not extend to the password- protected files of another co-user when the consenting co-user does not know the other's passwords. I would reject the defendants' quali- fied immunity defense because the unlawfulness of searching Trulock's password-protected files was readily apparent in light of the principles established in Matlock and reiterated in Block. Qualified immunity shields a government official from civil liabil- ity so long as his conduct "does not violate clearly established statu- tory or constitutional rights of which a reasonable person would have known." Harlow v. Fitzgerald, 457 U.S. 800, 818 (1982). In deciding whether a right is clearly established for qualified immunity purposes, the question is not whether the general right (here, the right to be free from unreasonable searches) is clearly established. Rather, the ques- tion is whether the right is clear in relation to the specific conduct being challenged. See Wiley v. Doory, 14 F.3d 993, 995 (4th Cir. 1994). In other words, "[t]he contours of the right must be sufficiently clear that a reasonable official would understand that what he is doing violates that right." Anderson v. Creighton, 483 U.S. 635, 640 (1987). This does not mean, however, that "the very action in question [must have] previously been held unlawful." Id. Liability will attach if the unlawfulness of the conduct would be "apparent" to a reasonable offi- 17 cer "in the light of pre-existing law." Wilson v. Layne, 526 U.S. 603, 615 (1999). For the class of "clearly established" rights "includes not only already specifically adjudicated rights, but those manifestly included within more general applications of the core constitutional principle invoked." Pritchett v. Alford, 973 F.2d 307, 314 (4th Cir. 1992) (emphasis added). The central question here is whether in the light of pre-existing law it would have been apparent to a reasonable FBI agent that Conrad's general consent to search the computer she shared with Trulock did not authorize the search of Trulock's password-protected files stored in that computer. In answering this question, we look to Supreme Court cases, "`cases of controlling authority in [this] jurisdiction,' [and] the `consensus of cases of persuasive authority' from other jurisdictions" as sources of clearly established law. Amaechi v. West, 237 F.3d 356, 363 (4th Cir. 2001) (quoting Wilson, 526 U.S. at 617). No court has decided a case involving third-party consent to the search of password-protected computer files. Nevertheless, we have clearly established law that is applicable: it comes from Matlock and Block. A warrantless search can sometimes be authorized by a third party who is not the target of the search. Matlock established that third- party consent is valid only when the third party and the target have "common authority" over the area or item sought to be searched. Matlock, 415 U.S. at 171. Common authority, the Supreme Court explained, rests on "mutual use of the property by persons generally having joint access or control for most purposes." Id. at 171 n.7. When common authority exists, the target of a search has "assumed the risk" that another person with authority over a shared area or item might consent to a search. Id. The principle that valid third-party con- sent requires common authority should be sufficient to defeat the defendants' claims of qualified immunity in this case. Specifically, it should have been obvious to law enforcement officials operating in the year 2000 that common authority over password-protected com- puter files requires knowledge of the passwords.1 Even so, the govern- ____________________________________________________________ 1 Knowledge of the passwords is necessary, but not sufficient, to estab- lish common authority over password-protected files. The third party must also have "joint access" to the files "for most purposes." Matlock, 415 U.S. at 171 n.7. If Conrad had known Trulock's passwords and had enjoyed general access to his files, this would be a different case. 18 ment argues that because Conrad had common authority over the computer she shared with Trulock, the defendant-FBI agents reason- ably failed to understand that her general consent to search the com- puter did not authorize the search of all files stored in the computer. The government's argument fails because a reasonable officer who understood our decision in Block would have known that the search of Trulock's private files was unlawful. In Block we applied Matlock in deciding whether a third party's consent to the search of a general area over which she has common authority validates the search of every item within that area. The mother in Block had general access to the room in which her defendant-son's footlocker was located, and she signed a written con- sent form authorizing a "complete search" of her son's room. Block, 590 F.2d at 537 n.1. Nevertheless, we held that the mother's consent did not authorize the search of her son's footlocker. We emphasized that authority to consent to the search of a general area "cannot be thought automatically to extend to the interiors of every discrete enclosed space capable of search within the area." Id. at 541. An enclosed space or distinct item requires independent consent for a search when the circumstances indicate that the person targeted has "a discrete expectation of privacy with respect to the particular [space or item]." Id. at 541 n.8. Privacy expectations are signaled, for exam- ple, when the space or item is secured or "is commonly used for pre- serving privacy." Id. This means, in other words, that a third party's common authority ends where the target's discrete expectation of pri- vacy begins. In sum, Block announced the general principle that when a third party and the target of a search have common authority over a general area, the third party's consent to a search of the general area does not authorize the search of a specific item within that area if the circumstances indicate that the target has a discrete expectation of pri- vacy with respect to that item. This principle dictates the result in this case. The majority readily agrees that "Trulock's password-protected files are analogous to the locked footlocker inside the bedroom" in Block and that Trulock has therefore "alleged a violation of his Fourth Amendment rights." Ante at 12. That conclusion is unassailable because the factual parallels between this case and Block are striking. The mother in Block had common authority over her son's bedroom, 19 just as Conrad had common authority over the computer she shared with Trulock. The mother gave consent to search the bedroom, just as Conrad gave consent to search the computer. The mother told the police that the footlocker belonged to her son, that he kept it locked, and that she did not have the key. Block, 590 F.2d at 538. Conrad told the FBI agents that she did not know what information Trulock kept in his computer files and that she could not access those files because she did not know the passwords. Just as the mother's consent to the search of her son's bedroom did not extend to his locked footlocker inside that room, Conrad's consent to the search of her computer did not extend to Trulock's "locked" files inside that computer. Indeed, the only notable difference between the two cases is that Block involved a locked footlocker and this case involves password- protected computer files. For the majority, however, the immunity decision turns on this one difference. The majority gives qualified immunity to the defendants because of its reluctance to "recognize a retroactive right based on cases involving footlockers and other dis- similar objects." Ante at 13. In essence, the majority is hesitant to hold the FBI agents responsible for applying Block 's clearly established legal principle in a different factual context. The agents, the majority believes, could not be expected to understand that the expectations of privacy signaled by a locked footlocker and a password-protected computer file are essentially the same. While it is true that knowing a legal principle and knowing whether to apply it in a particular circumstance are two different things, see Lappe v. Loeffelholz, 815 F.2d 1173, 1180 n.7 (8th Cir. 1987), quali- fied immunity was never intended to relieve government officials from the responsibility of applying familiar legal principles to new situations. To say otherwise would ignore the Supreme Court's warn- ing that liability under ß 1983 (and Bivens) does not require "the very action in question [to have] previously been held unlawful." Wilson, 526 U.S. at 615. Whatever the physical differences between locked footlockers and password-protected computer files, the question here must be whether a reasonable officer would believe that there is a legal difference for Fourth Amendment purposes. In other words, is there any reason why a reasonable FBI agent fully apprised of the principles in Block would believe that he could lawfully search Trulock's password-protected files on the basis of Conrad's general consent to search the computer? If there is no such reason, the unlaw- 20 fulness of the agents' conduct in this case is "apparent," Wilson, 526 U.S. at 615, and qualified immunity does not apply. Cf. Lassiter v. Alabama A&M University, 28 F.3d 1146, 1150 (11th Cir. 1994) (stat- ing that qualified immunity is lost when pre-existing law "dictate[s]" or "compel[s]" the conclusion that a defendant's conduct violates fed- eral rights). Any reasonable officer should have recognized that the privacy expectations attaching to a password-protected computer file are essentially the same as those attaching to a locked footlocker. A com- puter file is a repository for information and images in electronic form, just as a footlocker is a repository for more tangible items such as papers and other personal effects. Once password protection attaches to a computer file, that protection is the electronic equivalent of the lock on a footlocker containing items that are intended to remain private. The password is an electronic key. While the medium for ensuring privacy is different, the result - a clear signal that pri- vacy is expected against all those who lack the key (or the password) - is the same. There is simply no reason why a reasonable officer who understood that a locked footlocker signals a discrete expectation of privacy would believe that a password-protected computer file does not. The physical differences between the two repositories have no legal significance. This conclusion is not undercut by the majority's observation that the law of computers is "fast evolving." Ante at 12. In fact, the case law supports my point that the differences between computer files and physical repositories of personal information and effects are legally insignificant. Courts have not hesitated to apply established Fourth Amendment principles to computers and computer files, often draw- ing analogies between computers and physical storage units such as file cabinets and closed containers. See, e.g., In re Grand Jury Sub- poena Duces Tecum, 846 F. Supp. 11, 12-13 (S.D.N.Y. 1994) (analo- gizing computer hard drives and floppy disks that contained electronic documents to file cabinets that contained paper documents in deciding that subpoena for computer-accessible data was unreason- ably broad); United States v. Chan, 830 F.Supp. 531, 534-35 (N.D. Cal. 1993) (holding that "[t]he expectation of privacy in an electronic repository for personal data is . . . analogous to that in a personal address book or other repository for such information . . . . [A]n indi- 21 vidual has the same expectation of privacy in a pager, computer or other electronic data storage and retrieval device as a closed con- tainer. . . .") (internal quotation and citation omitted); United States v. David, 756 F.Supp. 1385, 1390 (D. Nev. 1991) (recognizing that a computer memo book "is indistinguishable from any other closed container, and is entitled to the same Fourth Amendment protection"). Our circuit has also drawn analogies between computer files and physical repositories of personal information and effects, such as lockers. See United States v. Simons, 206 F.3d 392, 398 (4th Cir. 2000) (citing American Postal Workers Union v. United States Postal Serv., 871 F.2d 556, 560 (6th Cir. 1989), to compare employee lock- ers subject to random inspection under employer policy with com- puter files subject to "appropriate" inspection under employer policy allowing monitoring of employee Internet use).2 Thus, neither case ____________________________________________________________ 2 These analogies have limitations, of course. For example, the Tenth Circuit rejected an argument based on the file cabinet analogy in decid- ing that a detective exceeded the scope of a search warrant when he opened certain of the defendant's computer files. See United States v. Carey, 172 F.3d 1268 (10th Cir. 1999). In Carey the government argued that an officer with a warrant to search a file cabinet for files containing certain information can open every drawer of the file cabinet, even when the labels on the file drawers suggest that none of the files within that drawer fall within the scope of the warrant. Opening every drawer, the government insisted, is the only way to be sure that the labels on the file drawer are accurate. The government then argued by analogy that an officer executing a warrant to search files on a computer for specified information can also open all of the computer's files, including those files whose names suggest that they contain no information within the scope of the warrant. See id. at 1274-75. The court held that the file cabi- net analogy does not extend this far because in the case of a computer, officers may use key word searches and similar techniques to identify which files fall within the scope of a warrant without the need to open all of the files in the computer. See id. at 1275-76; see also Raphael Win- ick, Searches and Seizures of Computers and Computer Data, 8 Harv. J. L. & Tech. 75, 103-11 (1994) (discussing the limitations of the closed container analogy and recommending that courts adopt a version of the "intermingled documents" rule adopted in United States v. Tamura, 694 F.2d 591, 595-96 (9th Cir. 1982), to govern computer searches). The Carey court's limitation on the file cabinet analogy makes sense because the court relied on a feature of computer files unique to the electronic 22 law nor common sense suggests any reason for thinking that the prin- ciples in Block do not dictate the result in this case. While the majority bases its grant of qualified immunity primarily on the factual differences between this case and Block, it also suggests that there is no clearly established law governing the search of Trulock's protected files because at least one district court opinion from another circuit has upheld the search of a shared computer based on third-party consent. Ante at 12 (citing United States v. Smith, 27 F. Supp.2d 1111 (C.D. Ill. 1998)). Smith, however, is consistent with Block, and its reasoning actually supports the conclusion that Con- rad's consent to search the computer did not encompass Trulock's password-protected files. In Smith the court upheld a search of the defendant's computer files based on third-party consent, but the facts were significantly different from those presented here. There, the defendant's housemate con- sented to a search of the defendant's computer, which was located in an alcove in the housemate's bedroom. The court found that the housemate had the necessary joint control and access to the computer and its surrounding area because the computer was accessible to all members of the household, it had been used by the housemate's daughter, and the defendant had tried to teach the housemate to use it. Smith, 27 F.Supp.2d at 1115-16. Although there was some factual dispute about whether the defendant had used passwords to protect computer files containing images of child pornography, the court found that these files were not password protected. Id. at 1116 ("[I]t ____________________________________________________________ medium, namely, their amenability to key word searches and similar techniques. The detective's failure to use these techniques to limit the scope of his computer search made the search unreasonable. See Carey, 172 F.3d at 1276. Thus, the physical differences between computer files and file cabinets made a legal difference in Carey, and the court properly warned the uncritical acceptance of the file cabinet analogy could lead courts to sanction indiscriminate searches of computer files. Neverthe- less, no court to my knowledge has suggested that the differences between computer files and other repositories for personal information raise difficult problems in deciding whether a given repository signals a "discrete expectation of privacy." Block, 590 F.2d at 541 n.8. 23 is important to note that none of the officers who searched the com- puter found passwords on the computer. This belies Defendant's claim of exclusive and possessory control and indicates that [the housemate] could consent to the search of the home and computer and that the consent extended to the computer area and the computer itself."). At most, then, Smith stands for the proposition that a third party with shared access to a computer may consent to the search of all the files on the computer that are not protected by individualized passwords. Indeed, the court's conclusion that a lack of password pro- tection discredits claims of exclusive possession and control suggests that the presence of such protection would establish exclusive posses- sion and control, thereby placing the password-protected files outside the scope of valid third-party consent. As the majority recognizes, Smith held only that "a third party may consent to the search of a shared computer when the third party has complete access to the com- puter." Ante at 12. Certainly Conrad had general access to the com- puter, and certainly a reasonable officer would have believed that Conrad had the authority to consent to a search of all of the com- monly accessible files on the computer. But access to a computer need not - and here it did not - extend to each and every file on that computer. A reasonable officer aware of the principles in Block would not have thought otherwise. I would hold, therefore, that the search of Trulock's password- protected files violated clearly established law because the unconstitu- tionality of the search was readily apparent in light of the core princi- ples applied in Matlock and Block. This position is supported by the government's own conclusions about how Fourth Amendment princi- ples apply to computer technology. In a manual designed to educate federal agents about the law governing searches and seizures of com- puters, the Department of Justice (DOJ) explicitly acknowledges that "it appears likely that encryption and password-protection would in most cases indicate the absence of common authority to consent to a search among co-users who do not know the password or possess the encryption key." Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations, at p. 14 (2001), avail- able at www.cybercrime.gov/searchmanual.pdf.3 It is especially strik- ____________________________________________________________ 3 On this point, the contrast with Wilson v. Layne is instructive. There, the Supreme Court buttressed its finding of qualified immunity by stating 24 ing that the DOJ based its conclusion on an analysis of Block and Smith, see id., the very authorities relied upon by the majority to assert that there was no clearly established law indicating that Conrad had no authority to consent to the search of Trulock's password- protected files. In effect, the government now invites this court to find that the law governing third-party consent to computer searches is uncertain even though it has shown itself quite capable of correctly resolving the question presented in this case. I would decline this invi- tation. Qualified immunity is intended "to protect those officers who rea- sonably believe that their actions do not violate federal law," Doe v. Broderick, 225 F.3d 440, 453 (4th Cir. 2000), but it should not func- tion to give officers "one free violation" of constitutional rights every time they are asked to apply a well-established principle to a new set of facts, Wilson, 526 U.S. at 625 (Stevens, J., concurring in part and dissenting in part). The defendants in this case should have known that they had no right to search Trulock's password-protected com- puter files, and thus they should not be given qualified immunity. II. In part III.B. of its opinion the majority concludes that although Conrad did not voluntarily consent to the search of her house, the defendants are entitled to qualified immunity from any liability for that search. While I agree with the majority's conclusion, I write sep- arately because my reasons for granting the defendants qualified immunity on the house search may differ from the majority's. Although Conrad signed a written consent form authorizing the FBI to search her house, she alleges that this consent was involuntary because it was prompted by her belief that the FBI already had a search warrant and that the FBI would break down her front door and ____________________________________________________________ that the police reasonably relied on a U.S. Marshals Service policy gov- erning media ride-alongs which clearly contemplated that media mem- bers might accompany police into private homes. See Wilson, 526 U.S. at 617. In contrast, the agents' conduct here contravened the DOJ's own understanding of the legal norms governing third-party consent to com- puter searches. 25 search the house in the presence of the media and local police if she refused to cooperate. Although the voluntariness of consent for Fourth Amendment purposes is "a question of fact to be determined from the totality of all the circumstances," Schneckloth v. Bustamonte, 412 U.S. 218, 227 (1973), one factor that nearly always invalidates con- sent is an assertion by law enforcement officers that they have the authority to search with or without consent. See, e.g., Bumper v. North Carolina, 391 U.S. 543, 550 (1968) (holding that consent was invalid when given after police officers claimed authority to search home under a warrant); United States v. Lattimore, 87 F.3d 647, 652 (4th Cir. 1996) (en banc) (stating that police officer's assertion that he would "`call a drug dog'" to search suspect's car if suspect refused consent "would raise serious questions concerning the voluntariness of his consent"); Orhorhaghe v. I.N.S., 38 F.3d 488, 500 (9th Cir. 1994) (stating that "[i]t is well established that there can be no effec- tive consent to a search or seizure if that consent follows a law enforcement officer's assertion of an independent right to engage in such conduct."). Consent is also involuntary when officers threaten a person with adverse consequences if she refuses to consent to a search. See State v. Davis, 404 S.E.2d 100, 100-01 (Ga. 1991) (affirming trial court's ruling that consent was involuntary when police told defendant's mother they would break down the door if she refused to cooperate); Reyes v. Edmunds, 472 F. Supp. 1218, 1227-28 (D. Minn. 1979) (holding that consent was involuntary when welfare recipient was told that her benefits would be terminated if she refused to consent to the search of her home). Here, Conrad alleges that the FBI, acting through Lawrence Sanchez (Conrad's supervisor at the Department of Energy), claimed to have authority to search her house and threatened her with property damage and public humiliation if she refused to cooperate. Under these circumstances, her consent was not voluntary. The government claims that there are two reasons why this case is not controlled by Bumper, in which the Supreme Court held that con- sent is involuntary when given after "the official conducting the search has asserted that he possesses a warrant." Bumper, 391 U.S. at 548. First, it argues that this case is distinguishable from Bumper because the complaint fails to allege that the FBI agents who con- ducted the search claimed they had a warrant or knew that Sanchez had told Conrad that they had a warrant. Second, the government 26 argues that because Sanchez is neither a defendant nor a law enforce- ment official, what he allegedly said to Conrad does not bear on whether the defendants violated her constitutional rights. Like the majority, I refuse to read Bumper so narrowly. Bumper stands for the proposition that consent cannot be voluntary when the government has led the person consenting to "erroneous[ly] belie[ve] that [s]he cannot protect [her] privacy by refusing to give consent." 3 Wayne R. LaFave, Search and Seizure, ß 8.2(c) at 652 (3rd ed. 1996). If, as the complaint alleges, Sanchez was acting on behalf of the FBI, then the government led Conrad to believe that her only choice was between losing her privacy quietly and losing it in the glare of the media spot- light. That the government conveyed this message through Sanchez rather than through the FBI agents conducting the search does not change the result under Bumper. The majority and I may differ, however, in our reasons for con- cluding that the defendants are entitled to qualified immunity on the house search. Qualified immunity protects government officials who make reasonable mistakes of fact as well as those who make reason- able mistakes about what the law requires in a particular situation. Karnes v. Skrutski, 62 F.3d 485, 498 (3rd Cir. 1995) (stating that qualified immunity protects those who make "`mere mistakes in judg- ment, whether the mistake is one of fact or one of law'" (quoting Butz v. Economou, 438 U.S. 478, 507 (1978))). As my previous discussion of the search of Trulock's computer files illustrates, qualified immu- nity analysis usually turns on whether the illegality of the defendant's conduct was apparent in the light of clearly established law. Here, however, I believe the defendants are entitled to qualified immunity only because it is undisputed that they did not know all of the relevant facts. Because the complaint fails to allege either that the defendants told Conrad that they had a warrant or that they knew Sanchez had told Conrad that they had a warrant, we must assume that the defen- dants were unaware of Conrad's belief that they would search her house with or without her consent. Without any awareness of what Sanchez had said to Conrad, the defendants could have reasonably believed that Conrad's written consent was valid. The defendants are therefore entitled to qualified immunity. On my analysis, then, the crucial factor in explaining why the defendants should receive quali- fied immunity is that they made a reasonable mistake of fact about what Conrad believed. Because the defendants did not know what 27 Sanchez had told Conrad, they reasonably failed to recognize that Conrad believed that she could no longer protect her privacy by refus- ing to consent to the search of her house. In explaining its qualified immunity holding, the majority also emphasizes the defendants' lack of knowledge of the conversation between Sanchez and Conrad. Thus, the majority and I may agree that qualified immunity is justified only because the defendants made a reasonable mistake of fact. I wish to be explicit on the point, however, because I could not accept the proposition that the defendants in this case made a reasonable mistake of law. Specifically, I would refuse to grant the defendants qualified immunity if the complaint had alleged that any of the defendants had personally directed Sanchez to threaten Conrad or that the defendants knew that Sanchez had con- veyed threats to Conrad at the behest of someone in the FBI. On those facts, the defendants' only argument for qualified immunity would have been that the invalidity of Conrad's consent was not readily apparent in light of the factual distinctions between this case and Bumper. For example, the government might have argued that this case differs from Bumper because there the officers who claimed to possess a warrant also conducted the search, whereas here Sanchez claimed that the FBI had a warrant but the agents who conducted the search did not make that claim. I would reject such arguments for rea- sons similar to those given in part I above. Bumper clearly establishes that there can be no valid consent when the government has led a per- son to believe that her consent is irrelevant, and there is no reason why a reasonable officer would think that the factual differences between Bumper and this case are legally significant. III. In sum, I agree with the majority's disposition of this case, except that I respectfully dissent from its decision to grant the defendants qualified immunity on Trulock's claim that the warrantless search of his password-protected computer files violated his Fourth Amend- ment rights. I would therefore reverse the district court's order grant- ing the defendants' motion to dismiss that claim. 4434 From: factfind Date: Sat Dec 29, 2001 7:41am Subject: SecurityFocus home infocus Social Engineering Fundamentals, Part I Hacker T A good primer on social engineering. Security penetration by any other name, proving once again that the best defense against all security compromise is sound physical and policy security planning which is tested on a regular basis. Best wishes for a healthy and prosperous New Year. SSC, Inc. David Linsky President http://www.securesvc.com http://www.securityfocus.com/infocus/1527 [Non-text portions of this message have been removed] 4435 From: tek492p Date: Thu Dec 27, 2001 9:24pm Subject: Re: Phone line FM, Part 2 Andy -- As for the FM radio station being received on the phone line, check to see if the "tip" and "ring" have been reversed along the way, such as at the wall jack, phone closet, or inside the telephone. Or, if something that should be grounded, is not grounded, it may act as an "antenna". Jack 4436 From: J‚nis Balklavs - GrÓnhofs Date: Thu Dec 27, 2001 11:34am Subject: Microchips Under the Skin Offer ID, Raise Questions Microchips Under the Skin Offer ID, Raise Questions By Kevin Krolicki LOS ANGELES (Reuters) - Picture a chip the size of a grain of rice that can be injected into your body and give detailed information about you to anyone with the right scanning equipment. A scene from a bad science fiction film? A radical research project in some secret government laboratory? The chip is neither fiction nor obscure science, but instead it is a soon-to-be-marketed product ready to make its way to customers in the year ahead. + Full story: http://dailynews.yahoo.com/h/nm/20011222/tc/bizchips_dc_1.html 4437 From: tek492p Date: Sat Dec 29, 2001 9:08pm Subject: Re: Congrats to Andre To the group -- Good work Andre. I agree with Steve. Basic electronics, ohm's law, etc. should be required by anyone wanting to get into the TSCM business. If you don't have time to take a college course, buy a book and read it in the evenings. Jack 4438 From: James M. Atkinson Date: Sat Dec 29, 2001 9:20pm Subject: Re: Congrats to Andre Damn good show there Andre, Keep up the good work. -jma At 1:49 PM -0500 12/28/01, Steve Uhrig wrote: >Congratulations are in order to list member Andre Holmes >1ach@v.... > >He got an A in the college electronics class he is taking. (I >saw the webpage from the college listing the grades. They don't >give away As just for showing up). > >This is the real thing. > >None of us are born knowing this stuff. Most people trying to be >in this business never mastered basic electronics, cannot define >a volt, an amp, an ohm, do a simple Ohm's Law calculation, >define a capacitor or anything like that. Yet they spend a >year's salary on some fancy box with blinking lights and want to >hang with the big boys. > >It is vital to understand basic electronic theory if you are >going to be truly effective in this business. > >Andre has chosen to supplement his self paced learning with >formal classroom electronics training. This was an excellent >choice, and his top grade proves he is paying his dues to get >into TSCM, or any electronics business, the right way. > >Good work Andre. > >Others who do not have a formal basic electronics background >should look into courses at your local tech school or community >college. You will be well rewarded for your effort in learning >basic electronic theory. > >All the equipment in the world is no substitute for a man who >understands the job he needs to do. A man with a working >knowledge of electronics and communications theory would be more >effective on a sweep with only a flashlight and a screwdriver >than someone else with little background but a truck full of >expensive electronics. > >Steve -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4439 From: Miguel Puchol Date: Sun Dec 30, 2001 4:06pm Subject: Re: Microchips Under the Skin Offer ID, Raise Questions Er....they've been put in dogs & other animals for some time now...is this progress, or cattle-marking? I don't feel a particular urge to have anything implanted in my body that could give anything away to anyone... Tsk tsk... Mike ----- Original Message ----- From: "J‚nis Balklavs - GrÓnhofs" To: "TSCM-L Mailing List" Sent: Thursday, December 27, 2001 6:34 PM Subject: [TSCM-L] Microchips Under the Skin Offer ID, Raise Questions > > Microchips Under the Skin Offer ID, Raise Questions > By Kevin Krolicki > > LOS ANGELES (Reuters) - Picture a chip the size of a grain of rice that can > be injected into your body and give detailed information about you to > anyone with the right scanning equipment. > > A scene from a bad science fiction film? A radical research project in some > secret government laboratory? > > The chip is neither fiction nor obscure science, but instead it is a > soon-to-be-marketed product ready to make its way to customers in the year > ahead. > + > > Full story: > http://dailynews.yahoo.com/h/nm/20011222/tc/bizchips_dc_1.html > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4440 From: A Grudko Date: Sun Dec 30, 2001 10:59am Subject: Re: Re: Congrats to Andre - Original Message - From: tek492p > I agree with Steve. Basic electronics, ohm's law, etc. should be > required by anyone wanting to get into the TSCM business. Totally - would anyone use a surgeon who has not studied anatomy? Answer: YES - usually those companies that buy services on price alone. I had a guy working for me who could not understand the difference between series and parallel circuits, never mind the implications in sweeps. He now advertises his own TSCM services... Andy Grudko. D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4441 From: rjw308 Date: Mon Dec 31, 2001 8:38am Subject: Seasons Greeting! Hi Group! Just a quick message to say thanks for the welcome I have received both on list and off list from you guys and to wish everyone a very Happy New Year! I hope everyone stays fit, healthy and wealthy over the coming year! Take Care. Rob W. 4442 From: James M. Atkinson Date: Mon Dec 31, 2001 4:42pm Subject: Happy New Year Good Evening Folks, I would like to extend the list a very Happy New Year, and wish everybody on the list, their families, their businesses, and the entire TSCM business all the best for the next 12 months. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- From: David Rom Date: Tue Dec 24, 2002 11:42am Subject: cellular phones or telephone pbx - monitoring and cracking Hi all Do anybody have any links for web sites that shows how to monitor or crack cellular phones and telephone PBX. I need the information for a project of protecting a company. Best Regards David Rom General Manager GD INTELLIGENCE SECURITY LTD. 16 LAMED HE St., P.O.B. 6027, Kfar-Saba, ISRAEL 44641. Tel : + 972-9-7676663 Fax : + 972-9-7676665 Mobile : + 972-54-449979 E-mail: david@g... Web: www.gdis.co.il 6694 From: Date: Tue Dec 24, 2002 7:46am Subject: Very interesting detailed look at a terrorism investigation FindLaw Legal News: U.S. v. Ali Saleh Kahlah Al-Marri http://news.findlaw.com/hdocs/docs/terrorism/usalmarri1202cmp.html [Non-text portions of this message have been removed] 6695 From: AccessOneNetworkNorthwest AONNRecords Date: Thu Dec 26, 2002 3:12pm Subject: Op We have formed a new multiagency CT task force which is currently open only to active U.S. government personnel. If you are qualified and would like to get involved please call 206.666.8070. There is always someone in our office 247, therefore you may call at any time. Also, the TSCM moderator has been contacted and provided the Congressional summary in .pdf format for those interested. I can't guarantee that the file will be provided to you by the list owner, as we simply thought that we would at least try to make it available in that way. This project involves the highest conceivable level of what the TSCM group exercises. --------------------------------- Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now [Non-text portions of this message have been removed] 6696 From: Does it matter Date: Fri Dec 27, 2002 5:40am Subject: Radio Shack items I have a question for all the loyals out there. Radio Shack used to have this item that was sold as a radio transmitting device or something like that title. It was a board kit that you put together and was the size of 2 dimes put side by side. It was a transmitter and worked on 87.7 to 107.9. My question is you aren't supposed to be able to have those items if they are put together correct? But you can posses them in a box form. I appreciate all replies. Darren Sebring 6697 From: Ocean Group Date: Sat Dec 28, 2002 0:06pm Subject: ID cards... Hi, I have a client who is looking for an ID card printer. Under new security regulations their drivers are obliged to carry photo card id's. It should be full colour capability and prints plastic cards (usual PVC magnetic credit card type). No mag encoding necessary. His company is small so a high end or high capacity machine is not required, they have a limited number of employees. Judging from the high cost of the machines I have seen on the net maybe if someone knows a second hand reliable supplier then it would prove to be a better option. Open to any ideas or suggestions, Thanks again, And a happy new year to everyone on the list, Kind regards Vance Deran, Ocean Group, Technical Security Division, Ireland. -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 7.0.3 for non-commercial use mQINBD2ItiQBEADUGR+tkegYQJtSmiGVwUZW0xXtj9DeYXIFcVKywTNETPmqs1xf s6L/QP2DgoaJsxpy/Knr06QqDq8NbJdSH63cBtUcOM6TSmvei9KzaXvKTYdKyLrd kPOvXAZq+4YrwHXY5oH9tL0HdtouBnLxQjIy5OVUlohRcYBZQKusoIyeH8SQVqqZ yXTT9X7hYINYwfbEQG7rZG39QS3o7DrtKQ8zGOUlPIuSjyKVY0YU/IRm/shUOmzm FsKrtIx0+NuYZHiML+UN0XM+xX3n55i4lEiIAnCi7uCleeETJSEusQJ1FnEWFjN2 atYG6OQVWofWhzW4O3pcPfmH2vOICpG07lMe88rF2Q+JK0cTUwJbRV/LWSi5QCmU DSdL/v5/3wVnAzoZAzknsmmN09gJPT7kOpqnMdHqhwgyh4txL1MTPcOm36ncRTTv 9Wx4KanMLsyFCaLXfezwUr/sbG5qycsd1cxj/+QbaCCHcYuMg8CXh5tCUagKNwUj kQETM3qPI6hsw7fY1k9BrD3JAx0FDNektPAkoxUbl4s/bZ9+mJEit2PIIPNNnwOS infadjbkkt/7Z5ltMmgOxMFwyLjbjZJNalGUFGMD8i7HU9Anh/330H/Vd2ROiwIj DwBbclzlc3jyvUFdXsN0l2Kj4l9fXB6KQ6Qkdr2hWAMbLRvxr5/coUFQFQARAQAB tBtPY2VhbiBHcm91cCA8aW5lcnRpYUAwMi5pZT6JAi4EEAECABgFAj2ItiQICwMJ CAcCAQoCGQEFGwMAAAAACgkQDmqiVDJj1Od7Cw//YcIHVBei7u4imWX0/YpcaNlw brzNKe6Y2qXIKb4BH5HJjTNraZY47X3sWAYXXjUygztnkX9LPiRtTgGzZ5T/Hn1Q GS74SNp+0Qeuy/aMvAKZuZqiYvLIWbXLKZq3+dihoBUSQQDc19ap+H77xnfhv2DW kbfRn37MSz9Lw608NfGD3ZZmtlclI/v1hVphlaH057Imj4mh5Ycnig9kHwml6zwQ ZtAh1T6gddMuQGhvdfZVZwOTE3Xo2P3IlM2Ct2mj1FNY9No21NknaLBZs6zsAAbs VyXIdaMnfoq1zXGd1uPQjMsftX1YajPoAVPo8uBF6EASL+RkpJejzRzCVV2yh6Ro LD6jBVMeqXxzTt+ZV/f05UhyhjtECk7roYld2/S9vAecVDjHb2WLfAX8iLGXQhCo v2fwQ7QUqtc7pWqkOd3iP1mpRw41kQ/8imA9vUqLqQZQ+40QzCxDCFZ2tXGT2jHN bXqzEU2BAtulPcX0IbTLwv4GgUC7Kn++9aUBg/++lKTWkyLFP0jfaSONYKWb2mLy TZnhp4B1mEx9SDh4zBfOuagY6gpZ9DQ4vSUkRRF38YsNpqA5KibRC2But3kNssyW VTw8l6ShTg7XWvD3FNEawl2Ngo7BJOQ0D5YZPx06eje+JX5F6R2XVx+BiJ1trOuJ Y7UaLj6AtDBaSx6hXM25Ag0EPYi2qQEQAPIHSV9nSUsXnNWUFGKiSJ2+Yfbv5ibG m2DC9nXotMgRyZc/Pto0Xwr/77rgeASlMRKXlVbpCO6nwrLV5aVLib8tCg4qVQMK 3J+aX79nU1KXiFgCqos3M6eQolEjykDhtFNj3Wc2KqFy00JGgeXwj9R+OdT4mUNG aQF1w9hnzys+a9ix4eY9m4AtlUtmRG7+gCW3vWVnhJ/ABQOVOcUL2JyZZBTgpA+Q /hQiGMH24WbilwWE+XhwOkGQUE5KgKHthmCMa3tWOk+f06PEiCjVjwkv6Fc60RHW pa+5PMHdq5zKozfDQR6hQRlZ3k/7Adfsyiw/5fCLbVl2TPaFyuE/n+pJmekd4xH1 /hw2N4EMgzau7t8gIRUUVTICXLdlMeboVrxQ1kuNlK/ZOiC9pdZeO18e/jhSQemC cd+awTOUATw9qV95TD4n5l3JlzbdrZQ7Fb3oIld2cqh1jMPypM8diWPnpyGiampm bfqQbU1dloN3Ng4U+X21jPrqeafvpQT8cnURDALTNdWynDAR7ta4pivb5UjKNDk2 C9Oy7KqKYPgB5hWKSEZs7iQDfWsO9opy8bRXZlau9JQnEY9cZd9Ty0XzYQGYvc65 K1Bd6h7NB9/5URYNmQuM/13OHukVCjTbgnT5GJLvIou4qba2UczuUrSPknQPheoy j208HYitdwwpABEBAAGJAiIEGAECAAwFAj2ItqkFGwwAAAAACgkQDmqiVDJj1OfU 0RAAtdEvkcJVHH3s08uYiatNBAhJML32UIx7nQXDalqiPdM1zJ7AmQjFjWvlqke0 4Y0PS1HFVAsvy1XRWdRAChRqfRXZ2dk+eJxMzHC/KtgrQHahUtPqYozQcVwgjWRC obWh9LwgOrFcXrzvv93D0D4VrDgKLvNmiPOoxe3GW1hUWwaf412zZ3wsAI/EiTDP wol4WvB5Mxe4397HsAKzbLAXuMa1D1RQNlWaK93EgTjn/F5SUWgMVyz3L4HcNF6a qWRft48BgCy8Oj8v9zY0BopWUU7vezFtKmXpfhmxcorKjO0qnkoijFlEph/zTvJz XiKelN6japucGc1EMz5WXI1q9C6Y9Y7KQciA8ZfvXlfZo48vAnfFC8tCgEkYzDJv wO/IebYhIcb9pyFdoZzkAi6yBDZHWRx5rj83X1eAF8Xf9lTtSBWkt49spyn7Ix1q WWnx3aBCC410bQwqWTjrohDi26YltcPOf3qt8QnvL8vy1j5OQRNS3y82opoKqbbf UHyiXUxF4+WiRFJk53D9JCxvgTzQFEQU+QKnqpIXuqppxh3CjfCYtvID8LIsHc2k f0fWZiDYQ3Y86bW421LGGaHt1i4W6K3czwyZVI+I8lJtb5FiDkKnGtKEM2lUwBvU 1oq9e5ySDyaXjg1la2m0gXGVGny0kdPrTasTzJ/Jd0CH8Vw= =OyUh -----END PGP PUBLIC KEY BLOCK----- 6698 From: Thomas Habets Date: Sat Dec 28, 2002 9:02pm Subject: Low Cost and Portable GPS Jammer -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 What do you think about this? http://www.phrack-dont-give-a-shit-about-dmca.org/show.php?p=60&a=13 - ----------------------------------- - --[ 1 - Project Overview A low cost device to temporarily disable the reception of the civilian course acquisition (C/A) code used for the standard positioning service (SPS)[1] on the Global Positioning System (GPS/NAVSTAR) L1 frequency of 1575.42 MHz. This is accomplished by transmitting a narrowband Gaussian noise signal, with a deviation of +/- 1.023 MHz, on the L1 GPS frequency itself. This technique is a little more complicated than a simple continuous wave (CW) jammer, but tends to be more effective (i.e. harder to filter) against spread spectrum based radio receivers. This device will have no effect on the precise positioning service (PPS) which is transmitted on the GPS L2 frequency of 1227.6 MHz and little effect on the P-code which is also carried on the L1 frequency. There may be a problem if your particular GPS receiver needs to acquire the P(Y)-code through the C/A-code before proper operation. This device will also not work against the new upcoming GPS L5 frequency of 1176.45 MHz or the Russian GLONASS or European Galileo systems. It can be adapted to jam the new civilian C/A-code signal which is going to also be transmitted on the GPS L2 frequency. That said, it will work against the majority of consumer/OEM GPS receivers, provided they are not setup in any advanced anti-jam configuration. - --------- typedef struct me_s { char name[] = { "Thomas Habets" }; char email[] = { "thomas@h..." }; char kernel[] = { "Linux 2.4" }; char *pgpKey[] = { "http://www.habets.pp.se/pubkey.txt" }; char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; } me_t; -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE+DmW9KGrpCq1I6FQRAqv4AJ95BjM7qbvgKrCaeOhUqNFJkmazfgCg7uJo S7XYEYIq2L0XrueQTJAuILM= =hafn -----END PGP SIGNATURE----- 6699 From: kondrak Date: Mon Dec 30, 2002 2:26am Subject: Re: Merry Christmas WOW! Time warp.... At 22:09 12/23/02 +0000, you wrote: >Today is the my last day of work until after Christmas so I want to >was all the group a Very Merry Christmas. And I hope that Santa >brings us all the toys that we need and want because I know that we >have all been good little boys and girls. > >Merry Christmas > >Don > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6700 From: Michael Puchol Date: Mon Dec 30, 2002 3:31am Subject: Re: ID cards... Hi Vance, Seiko make a range of printers that use special transfer inks to print on plastic surfaces, like CD-ROMs, ID cards, etc. It is not for large volume printing, so it may suit your needs. It looks like a standard inkjet printer, but has a special support tray to feed CDs and plastic cards. From what I read, it can also use special inks such as gold and silver. Regards, Mike ----- Original Message ----- From: "Ocean Group" To: "TSCM Group" Sent: Saturday, December 28, 2002 7:06 PM Subject: [TSCM-L] ID cards... > Hi, > > I have a client who is looking for an ID card printer. Under new security > regulations their drivers are obliged to carry photo card id's. It should be > full colour capability and prints plastic cards (usual PVC magnetic credit > card type). No mag encoding necessary. His company is small so a high end or > high capacity machine is not required, they have a limited number of > employees. Judging from the high cost of the machines I have seen on the net > maybe if someone knows a second hand reliable supplier then it would prove > to be a better option. > > Open to any ideas or suggestions, > Thanks again, > > And a happy new year to everyone on the list, > > Kind regards > Vance Deran, > Ocean Group, > Technical Security Division, > Ireland. > > > -----BEGIN PGP PUBLIC KEY BLOCK----- > Version: PGPfreeware 7.0.3 for non-commercial use > > mQINBD2ItiQBEADUGR+tkegYQJtSmiGVwUZW0xXtj9DeYXIFcVKywTNETPmqs1xf > s6L/QP2DgoaJsxpy/Knr06QqDq8NbJdSH63cBtUcOM6TSmvei9KzaXvKTYdKyLrd > kPOvXAZq+4YrwHXY5oH9tL0HdtouBnLxQjIy5OVUlohRcYBZQKusoIyeH8SQVqqZ > yXTT9X7hYINYwfbEQG7rZG39QS3o7DrtKQ8zGOUlPIuSjyKVY0YU/IRm/shUOmzm > FsKrtIx0+NuYZHiML+UN0XM+xX3n55i4lEiIAnCi7uCleeETJSEusQJ1FnEWFjN2 > atYG6OQVWofWhzW4O3pcPfmH2vOICpG07lMe88rF2Q+JK0cTUwJbRV/LWSi5QCmU > DSdL/v5/3wVnAzoZAzknsmmN09gJPT7kOpqnMdHqhwgyh4txL1MTPcOm36ncRTTv > 9Wx4KanMLsyFCaLXfezwUr/sbG5qycsd1cxj/+QbaCCHcYuMg8CXh5tCUagKNwUj > kQETM3qPI6hsw7fY1k9BrD3JAx0FDNektPAkoxUbl4s/bZ9+mJEit2PIIPNNnwOS > infadjbkkt/7Z5ltMmgOxMFwyLjbjZJNalGUFGMD8i7HU9Anh/330H/Vd2ROiwIj > DwBbclzlc3jyvUFdXsN0l2Kj4l9fXB6KQ6Qkdr2hWAMbLRvxr5/coUFQFQARAQAB > tBtPY2VhbiBHcm91cCA8aW5lcnRpYUAwMi5pZT6JAi4EEAECABgFAj2ItiQICwMJ > CAcCAQoCGQEFGwMAAAAACgkQDmqiVDJj1Od7Cw//YcIHVBei7u4imWX0/YpcaNlw > brzNKe6Y2qXIKb4BH5HJjTNraZY47X3sWAYXXjUygztnkX9LPiRtTgGzZ5T/Hn1Q > GS74SNp+0Qeuy/aMvAKZuZqiYvLIWbXLKZq3+dihoBUSQQDc19ap+H77xnfhv2DW > kbfRn37MSz9Lw608NfGD3ZZmtlclI/v1hVphlaH057Imj4mh5Ycnig9kHwml6zwQ > ZtAh1T6gddMuQGhvdfZVZwOTE3Xo2P3IlM2Ct2mj1FNY9No21NknaLBZs6zsAAbs > VyXIdaMnfoq1zXGd1uPQjMsftX1YajPoAVPo8uBF6EASL+RkpJejzRzCVV2yh6Ro > LD6jBVMeqXxzTt+ZV/f05UhyhjtECk7roYld2/S9vAecVDjHb2WLfAX8iLGXQhCo > v2fwQ7QUqtc7pWqkOd3iP1mpRw41kQ/8imA9vUqLqQZQ+40QzCxDCFZ2tXGT2jHN > bXqzEU2BAtulPcX0IbTLwv4GgUC7Kn++9aUBg/++lKTWkyLFP0jfaSONYKWb2mLy > TZnhp4B1mEx9SDh4zBfOuagY6gpZ9DQ4vSUkRRF38YsNpqA5KibRC2But3kNssyW > VTw8l6ShTg7XWvD3FNEawl2Ngo7BJOQ0D5YZPx06eje+JX5F6R2XVx+BiJ1trOuJ > Y7UaLj6AtDBaSx6hXM25Ag0EPYi2qQEQAPIHSV9nSUsXnNWUFGKiSJ2+Yfbv5ibG > m2DC9nXotMgRyZc/Pto0Xwr/77rgeASlMRKXlVbpCO6nwrLV5aVLib8tCg4qVQMK > 3J+aX79nU1KXiFgCqos3M6eQolEjykDhtFNj3Wc2KqFy00JGgeXwj9R+OdT4mUNG > aQF1w9hnzys+a9ix4eY9m4AtlUtmRG7+gCW3vWVnhJ/ABQOVOcUL2JyZZBTgpA+Q > /hQiGMH24WbilwWE+XhwOkGQUE5KgKHthmCMa3tWOk+f06PEiCjVjwkv6Fc60RHW > pa+5PMHdq5zKozfDQR6hQRlZ3k/7Adfsyiw/5fCLbVl2TPaFyuE/n+pJmekd4xH1 > /hw2N4EMgzau7t8gIRUUVTICXLdlMeboVrxQ1kuNlK/ZOiC9pdZeO18e/jhSQemC > cd+awTOUATw9qV95TD4n5l3JlzbdrZQ7Fb3oIld2cqh1jMPypM8diWPnpyGiampm > bfqQbU1dloN3Ng4U+X21jPrqeafvpQT8cnURDALTNdWynDAR7ta4pivb5UjKNDk2 > C9Oy7KqKYPgB5hWKSEZs7iQDfWsO9opy8bRXZlau9JQnEY9cZd9Ty0XzYQGYvc65 > K1Bd6h7NB9/5URYNmQuM/13OHukVCjTbgnT5GJLvIou4qba2UczuUrSPknQPheoy > j208HYitdwwpABEBAAGJAiIEGAECAAwFAj2ItqkFGwwAAAAACgkQDmqiVDJj1OfU > 0RAAtdEvkcJVHH3s08uYiatNBAhJML32UIx7nQXDalqiPdM1zJ7AmQjFjWvlqke0 > 4Y0PS1HFVAsvy1XRWdRAChRqfRXZ2dk+eJxMzHC/KtgrQHahUtPqYozQcVwgjWRC > obWh9LwgOrFcXrzvv93D0D4VrDgKLvNmiPOoxe3GW1hUWwaf412zZ3wsAI/EiTDP > wol4WvB5Mxe4397HsAKzbLAXuMa1D1RQNlWaK93EgTjn/F5SUWgMVyz3L4HcNF6a > qWRft48BgCy8Oj8v9zY0BopWUU7vezFtKmXpfhmxcorKjO0qnkoijFlEph/zTvJz > XiKelN6japucGc1EMz5WXI1q9C6Y9Y7KQciA8ZfvXlfZo48vAnfFC8tCgEkYzDJv > wO/IebYhIcb9pyFdoZzkAi6yBDZHWRx5rj83X1eAF8Xf9lTtSBWkt49spyn7Ix1q > WWnx3aBCC410bQwqWTjrohDi26YltcPOf3qt8QnvL8vy1j5OQRNS3y82opoKqbbf > UHyiXUxF4+WiRFJk53D9JCxvgTzQFEQU+QKnqpIXuqppxh3CjfCYtvID8LIsHc2k > f0fWZiDYQ3Y86bW421LGGaHt1i4W6K3czwyZVI+I8lJtb5FiDkKnGtKEM2lUwBvU > 1oq9e5ySDyaXjg1la2m0gXGVGny0kdPrTasTzJ/Jd0CH8Vw= > =OyUh > -----END PGP PUBLIC KEY BLOCK----- > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 6701 From: Date: Mon Dec 30, 2002 7:03am Subject: Re: Satellite locators track youngsters Dear All I agree with the previous writers on the above subject. It would be folly to place too much trust in such a device. All the marketing hype accompanying the launch of such a product would no doubt be read by persons who carry out these type of crimes, thus negating the value. The criminals increased awareness would result in a thorough search of the victim and a subsequent discarding of any object they suspect may contain the beacon. An example from my country, (Northern Ireland) was the abduction and subsequent murder in the 1980s of two British Army signallers who unfortunately strayed into a Republican funeral cortege. Prior to their deaths they were stripped to their underwear which was neither a humiliation or they would have gone further, nor to discover any hidden firearms as they had already disarmed them both of their pistols. One can surmise they where looking for personal locating devices (PLDs), as the terrorists wrongly believed them to be Special Forces. I recently worked with some Investigative Journalists on a documentary about mugging in London and in particular the theft of mobile phones and laptop computers. An RF transmitter was placed in both the phone and laptop. Two different types of GPS/GSM tracking devices where tried in the laptop case without any success. The RF device helped us successfully 'house' the stolen phone. Unfortunately the laptop was quickly driven out of the area. Happy New Year. Tim 6702 From: Fernando Martins Date: Mon Dec 30, 2002 1:53pm Subject: Re: cellular phones or telephone pbx - monitoring and cracking This is for protection, kind of a PBX firewall http://www.sentrytelecom.com/products/index.asp?b=3 See the docs at this page, they may have the info you need for your project. Here you will find more documents about what you need http://rr.sans.org/telephone/telephone_list.php More products and info: http://www.rfcomm.harris.com/products/embeddable-security/implementation-typ ical-telephony.html Those are stories from 2000 about cracks, you need a subscription now to access the archives, for the full text version: http://cma.zdnet.com/texis/techinfobase/techinfobase/+Jwq_qr+_vXv6+/zdisplay .html http://cma.zdnet.com/texis/techinfobase/techinfobase/+wwq_qr+_+8s96/zdisplay .html Of course, nothing of this will teach you how to crack or monitor cellphones or pbx ... FM ----- Original Message ----- From: "David Rom" To: Sent: Tuesday, December 24, 2002 5:42 PM Subject: [TSCM-L] cellular phones or telephone pbx - monitoring and cracking > Hi all > > Do anybody have any links for web sites that shows how to monitor or crack cellular > phones and telephone PBX. > > I need the information for a project of protecting a company. > > > Best Regards > > David Rom > General Manager > > GD INTELLIGENCE SECURITY LTD. > 16 LAMED HE St., P.O.B. 6027, Kfar-Saba, ISRAEL 44641. > > Tel : + 972-9-7676663 > Fax : + 972-9-7676665 > Mobile : + 972-54-449979 > E-mail: david@g... > Web: www.gdis.co.il > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6703 From: gkeenan Date: Mon Dec 30, 2002 5:04pm Subject: multi purpose message Folks, I apologize for any crosspostings - and I know there's more than a few. I'm trying to sort out my mail box so I know that some of the lists I'm sending this to are undoubtedly no longer active, some I may not have posting access to, and other things. This post will enable me to clear out dead lists, and those I don't have posting access to, or from which I've been unsubscribed for various reasons (they are yahoo, after all!). Also, I want to take this opportunity to re-introduce myself to those lists that are still active, and on which I'm also still active. But first - I hope everyone had a very Happy Christmas, Happy Hannakah, a rewarding Ramadan, and Happy Holiday; and all the best for a very Happy and Prosperous New Year. As for re-intro; I specialize in only two areas - military and terrorism research. In military research I am able to access military personnel records (military info only - unless there is a signed release on a Standard Form 180 (of which I maintain a supply)) for all branches of the service. I know, the first thing some of you will say is "why do we need you? All we have to do is submit a FOIA to the National Personnel Records Center in St. Louis. Are you sure? Do you know that there are nearly 100 locations around the country where military records are stored? Some only temporarily - others indefinitely. And did you know that if you submit a FOIA to the NPRC on a Navy person who was released from active or reserve duty since 1997, you won't find them there? The Navy hasn't sent a single personnel file to St. Louis in five years. If someone tells you they're retired military, and you can't find their records at NPRC - are they lying? Probably not, because even most military personnel aren't aware of what I call "the 30 year rule". If you do 20 in the armed forces, you are NOT retired. You are transferred to the Inactive Reserve (in the Navy/Marines/Coast Guard it's referred to as the Fleet Reserve) for a further 10 years. If you do 22 years, you're obligation is another 8 years, and so on until 30 years is reached. A retiree's retirement statements also reflect this, because they are clearly labeled "Retainer/Retirement Pay". Between 20 and 30 years - you are receiving Retainer Pay. After 30 your pay is redesignated Retirement Pay. What this means is, if you're looking for someone in this category (and most people in this category don't even know it themselves), their records will be held at the relevant services' Reserve HQs which are located in five separate areas of the country. After the 30 years is satisfied, their records are then transferred to the NPRC in St. Louis. Not before. I won't bore you all with all the details because it would take a book (which, as it happens, I'm already working on!), but if anyone has any military inquiries - just let me know. I also provide military genealogical services as well as consulting and research for film companies. At this time I'm providing research to the documentary film company in CA that produces the Veterans Project for the History Channel, and am providing research on US military units based in Northern Ireland during WWII that were direct participants in the Normandy invasion to another documentary film company in Belfast, Northern Ireland, that is producing a documentary for the BBC to be screened on the 60th anniv. of D-Day - 6 June, 2004. I also can access (but very limited access) military records for Canada, Australia and the United Kingdom. Access to these records is very limited, however, due to the vastly more restrictive privacy laws in effect in these countries. Research in this area is also more costly than for US military records. As for my terrorism research - this is ongoing. I have a personal/proprietary database on terrorism consisting of literally hundreds of thousands of reports, articles, and other documents that go back (in some cases) to the mid 1960s. I'm working with company in DC that is putting together a searchable database of all known and suspected terrorist individuals worldwide - and much of the info being uploaded to this database is coming from my own files. Can't say more than that right now because it wouldn't be ethical to do so before we're ready to go. That should be in a couple of months. Anyway, once again, hope everyone had a very Happy Holiday and all the best for a very Happy, Prosperous, and Peaceful New Year. Jerry Keenan GPKeenan Co., Int'l Security Services 1005 Celia St. West Islip, NY 11795-2053 (631) 587-4020 (ph) (516) 768-9602 (cell) (530) 323-6832 (Jfax) gkeenan@s... secureops@e... [Non-text portions of this message have been removed] 6704 From: kondrak Date: Mon Dec 30, 2002 8:34pm Subject: Hmmm.. > > >Wis. Man Charged With High-Tech Stalking >Authorities Say Wisconsin Man Stalked Ex-Girlfriend With Global Positioning >Device > >The Associated Press > >KENOSHA, Wis. Dec. 30 - >A man was charged Monday with stalking his former live-in girlfriend with >help from a high-tech homing device placed under the hood of her car. > >Paul Seidler, 42, was arrested during the weekend. On Monday, he was charged >with stalking, burglary, second-degree reckless endangerment and disorderly >conduct, and ordered held on $50,000 bail. > >According to a criminal complaint, Connie Adams asked Seidler to move out of >her apartment Oct. 25 after a three-year relationship. Prosecutors say he >immediately began following her, including when she ran errands and went to >work. > >Investigators checked under the hood of Adams' vehicle and found a Global >Positioning System that uses satellite and digital cellular technology to >pinpoint a target's location. > >Seidler's attorney did not return a telephone call Monday seeking comment. > >A preliminary hearing was set Jan. 8. 6705 From: Date: Tue Dec 31, 2002 5:54pm Subject: Humor 1. A little girl, dressed in her Sunday best, was running as fast as she could, trying not to be late for Bible class. As she ran she prayed, "Dear Lord, please don't let me be late! Dear Lord, please don't let me be late!" As she was running and praying, she tripped on a curb and fell, getting her clothes dirty and tearing her dress. She got up, brushed herself off, and started running again. As she ran she once again began to pray,"Dear Lord, please don't let me be late... But please don't shove me either!" 2. A little girl became restless as the preacher's sermon dragged on and on. Finally, she leaned over to her mother and whispered, "Mommy, if we give him the money now, will he let us go?" 3. A little boy was overheard praying: "Lord, if You can't make me a better boy, don't worry about it. I'm having a real good time like I am!" 4. Three boys are in the school yard bragging about their fathers. The first boy says, "My Dad scribbles a few words on a piece of paper, he calls it a poem, they give him $50." The second boy says, "That's nothing. My Dad scribbles a few words on a piece of paper, he calls it a song, and they give him $100." The third boy says, "I got you both beat. My Dad scribbles a few words on a piece of paper, he calls it a sermon. And it takes eight people to collect all the money!" 5. Adam and Eve had an ideal marriage. He didn't have to hear about all the men she could have married, and she didn't have to hear about the way his mother cooked. 6. An elderly woman died last month. Having never married, she requested no male pallbearers. In her handwritten instructions for her memorial service, she wrote, "They wouldn't take me out while I was alive, I don't want them to take me out when I'm dead. 7. A Sunday school teacher asked the children just before she dismissed them to go to church, "And why is it necessary to be quiet in church?" Annie replied, "Because people are sleeping." 8. A Sunday School teacher asked her class why Joseph and Mary took Jesus with them to Jerusalem. A small child replied: "They couldn't get a baby-sitter." 9. A Sunday school teacher was discussing the Ten Commandments with her five and six year olds. After explaining the commandment to "honor thy father and thy mother," she asked "Is there a commandment that teaches us how to treat our brothers and sisters?" Without missing a beat one little boy answered, "Thou shall not kill." 10. At Sunday School they were teaching how God created everything, including human beings. Little Johnny seemed especially intent when they told him how Eve was created out of one of Adam's ribs. Later in the week his mother noticed him lying down as though he were ill, and said, Johnny what is the matter? Little Johnny responded, "I have a pain in my side. I think I'm going to have a wife." HAPPY NEW YEAR !! [Non-text portions of this message have been removed] 6706 From: A Grudko Date: Tue Dec 31, 2002 11:25pm Subject: 2003 I just watched the 2003 celebrations live from New York city - 7 hours after we popped our Champaign corks - and I felt I had to send our many American friends our wishes for peace in the year to come. Andy and Judy Grudko South Africa 6707 From: Matt Paulsen Date: Wed Jan 1, 2003 0:04am Subject: RE: ID cards... If cost is a concern, why not just laminate a printout from a bubblejet/inkjet and a cheap webcam? Total cost is under $125 for everything easily and if you scrounge used you can get it all less than $50. Or if that's not great... around $1400 with a cam... but why waste the cash I ask.. you can get this http://www.pricegrabber.com/search_getprod.php/masterid=466060/search=FARGO% 2520printer/ut=0ce01c8e4f1f7082 http://www.pricegrabber.com/search_getprod.php/masterid=21255/search=card%25 20printer/ut=0ce01c8e4f1f7082 -----Original Message----- From: Ocean Group [mailto:inertia@o...] Sent: Saturday, December 28, 2002 10:06 AM To: TSCM Group Subject: [TSCM-L] ID cards... Hi, I have a client who is looking for an ID card printer. Under new security regulations their drivers are obliged to carry photo card id's. It should be full colour capability and prints plastic cards (usual PVC magnetic credit card type). No mag encoding necessary. His company is small so a high end or high capacity machine is not required, they have a limited number of employees. Judging from the high cost of the machines I have seen on the net maybe if someone knows a second hand reliable supplier then it would prove to be a better option. Open to any ideas or suggestions, Thanks again, And a happy new year to everyone on the list, Kind regards Vance Deran, Ocean Group, Technical Security Division, Ireland. -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 7.0.3 for non-commercial use mQINBD2ItiQBEADUGR+tkegYQJtSmiGVwUZW0xXtj9DeYXIFcVKywTNETPmqs1xf s6L/QP2DgoaJsxpy/Knr06QqDq8NbJdSH63cBtUcOM6TSmvei9KzaXvKTYdKyLrd kPOvXAZq+4YrwHXY5oH9tL0HdtouBnLxQjIy5OVUlohRcYBZQKusoIyeH8SQVqqZ yXTT9X7hYINYwfbEQG7rZG39QS3o7DrtKQ8zGOUlPIuSjyKVY0YU/IRm/shUOmzm FsKrtIx0+NuYZHiML+UN0XM+xX3n55i4lEiIAnCi7uCleeETJSEusQJ1FnEWFjN2 atYG6OQVWofWhzW4O3pcPfmH2vOICpG07lMe88rF2Q+JK0cTUwJbRV/LWSi5QCmU DSdL/v5/3wVnAzoZAzknsmmN09gJPT7kOpqnMdHqhwgyh4txL1MTPcOm36ncRTTv 9Wx4KanMLsyFCaLXfezwUr/sbG5qycsd1cxj/+QbaCCHcYuMg8CXh5tCUagKNwUj kQETM3qPI6hsw7fY1k9BrD3JAx0FDNektPAkoxUbl4s/bZ9+mJEit2PIIPNNnwOS infadjbkkt/7Z5ltMmgOxMFwyLjbjZJNalGUFGMD8i7HU9Anh/330H/Vd2ROiwIj DwBbclzlc3jyvUFdXsN0l2Kj4l9fXB6KQ6Qkdr2hWAMbLRvxr5/coUFQFQARAQAB tBtPY2VhbiBHcm91cCA8aW5lcnRpYUAwMi5pZT6JAi4EEAECABgFAj2ItiQICwMJ CAcCAQoCGQEFGwMAAAAACgkQDmqiVDJj1Od7Cw//YcIHVBei7u4imWX0/YpcaNlw brzNKe6Y2qXIKb4BH5HJjTNraZY47X3sWAYXXjUygztnkX9LPiRtTgGzZ5T/Hn1Q GS74SNp+0Qeuy/aMvAKZuZqiYvLIWbXLKZq3+dihoBUSQQDc19ap+H77xnfhv2DW kbfRn37MSz9Lw608NfGD3ZZmtlclI/v1hVphlaH057Imj4mh5Ycnig9kHwml6zwQ ZtAh1T6gddMuQGhvdfZVZwOTE3Xo2P3IlM2Ct2mj1FNY9No21NknaLBZs6zsAAbs VyXIdaMnfoq1zXGd1uPQjMsftX1YajPoAVPo8uBF6EASL+RkpJejzRzCVV2yh6Ro LD6jBVMeqXxzTt+ZV/f05UhyhjtECk7roYld2/S9vAecVDjHb2WLfAX8iLGXQhCo v2fwQ7QUqtc7pWqkOd3iP1mpRw41kQ/8imA9vUqLqQZQ+40QzCxDCFZ2tXGT2jHN bXqzEU2BAtulPcX0IbTLwv4GgUC7Kn++9aUBg/++lKTWkyLFP0jfaSONYKWb2mLy TZnhp4B1mEx9SDh4zBfOuagY6gpZ9DQ4vSUkRRF38YsNpqA5KibRC2But3kNssyW VTw8l6ShTg7XWvD3FNEawl2Ngo7BJOQ0D5YZPx06eje+JX5F6R2XVx+BiJ1trOuJ Y7UaLj6AtDBaSx6hXM25Ag0EPYi2qQEQAPIHSV9nSUsXnNWUFGKiSJ2+Yfbv5ibG m2DC9nXotMgRyZc/Pto0Xwr/77rgeASlMRKXlVbpCO6nwrLV5aVLib8tCg4qVQMK 3J+aX79nU1KXiFgCqos3M6eQolEjykDhtFNj3Wc2KqFy00JGgeXwj9R+OdT4mUNG aQF1w9hnzys+a9ix4eY9m4AtlUtmRG7+gCW3vWVnhJ/ABQOVOcUL2JyZZBTgpA+Q /hQiGMH24WbilwWE+XhwOkGQUE5KgKHthmCMa3tWOk+f06PEiCjVjwkv6Fc60RHW pa+5PMHdq5zKozfDQR6hQRlZ3k/7Adfsyiw/5fCLbVl2TPaFyuE/n+pJmekd4xH1 /hw2N4EMgzau7t8gIRUUVTICXLdlMeboVrxQ1kuNlK/ZOiC9pdZeO18e/jhSQemC cd+awTOUATw9qV95TD4n5l3JlzbdrZQ7Fb3oIld2cqh1jMPypM8diWPnpyGiampm bfqQbU1dloN3Ng4U+X21jPrqeafvpQT8cnURDALTNdWynDAR7ta4pivb5UjKNDk2 C9Oy7KqKYPgB5hWKSEZs7iQDfWsO9opy8bRXZlau9JQnEY9cZd9Ty0XzYQGYvc65 K1Bd6h7NB9/5URYNmQuM/13OHukVCjTbgnT5GJLvIou4qba2UczuUrSPknQPheoy j208HYitdwwpABEBAAGJAiIEGAECAAwFAj2ItqkFGwwAAAAACgkQDmqiVDJj1OfU 0RAAtdEvkcJVHH3s08uYiatNBAhJML32UIx7nQXDalqiPdM1zJ7AmQjFjWvlqke0 4Y0PS1HFVAsvy1XRWdRAChRqfRXZ2dk+eJxMzHC/KtgrQHahUtPqYozQcVwgjWRC obWh9LwgOrFcXrzvv93D0D4VrDgKLvNmiPOoxe3GW1hUWwaf412zZ3wsAI/EiTDP wol4WvB5Mxe4397HsAKzbLAXuMa1D1RQNlWaK93EgTjn/F5SUWgMVyz3L4HcNF6a qWRft48BgCy8Oj8v9zY0BopWUU7vezFtKmXpfhmxcorKjO0qnkoijFlEph/zTvJz XiKelN6japucGc1EMz5WXI1q9C6Y9Y7KQciA8ZfvXlfZo48vAnfFC8tCgEkYzDJv wO/IebYhIcb9pyFdoZzkAi6yBDZHWRx5rj83X1eAF8Xf9lTtSBWkt49spyn7Ix1q WWnx3aBCC410bQwqWTjrohDi26YltcPOf3qt8QnvL8vy1j5OQRNS3y82opoKqbbf UHyiXUxF4+WiRFJk53D9JCxvgTzQFEQU+QKnqpIXuqppxh3CjfCYtvID8LIsHc2k f0fWZiDYQ3Y86bW421LGGaHt1i4W6K3czwyZVI+I8lJtb5FiDkKnGtKEM2lUwBvU 1oq9e5ySDyaXjg1la2m0gXGVGny0kdPrTasTzJ/Jd0CH8Vw= =OyUh -----END PGP PUBLIC KEY BLOCK----- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6708 From: jdobbs2001 Date: Mon Dec 30, 2002 7:20pm Subject: passive cavity resonator operation Is there any public information regarding PCR's? estimated range and companies known to manufacture them. Is a PCR a typical T3 device used by LE or your typical PD? Why would someone use such a device since its operation would be obvious on any spectrum analyser. 6709 From: Kutlin, Josh Date: Tue Dec 31, 2002 7:29am Subject: RE: cellular phones or telephone pbx - monitoring and cr acking Your best bet is to find out what kind of system they are running (through social engineering or war dialing if they will allow you to do it) and then read up on it or get a demo of the product. Then look for possible miss-configuration or other security issues in an environment that resembles that of your client. Also if the they have their PBX managed by an outside firm, they will most likely use a standard set of passwords for access and these should be checked. If you need links try reading some of the old Phrak archives at http://www.phrack.org or http://www.pbxinfo.com http://www.phreak.org/index/archive02/tsoft/tsoft.shtml http://www.tsm1.com/PBX-KTS.htm Cheers Josh Kutlin -----Original Message----- From: David Rom [mailto:david@g...] Sent: Tuesday, December 24, 2002 12:42 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] cellular phones or telephone pbx - monitoring and cracking Hi all Do anybody have any links for web sites that shows how to monitor or crack cellular phones and telephone PBX. I need the information for a project of protecting a company. Best Regards David Rom General Manager GD INTELLIGENCE SECURITY LTD. 16 LAMED HE St., P.O.B. 6027, Kfar-Saba, ISRAEL 44641. Tel : + 972-9-7676663 Fax : + 972-9-7676665 Mobile : + 972-54-449979 E-mail: david@g... Web: www.gdis.co.il ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6710 From: AccessOneNetworkNorthwest AONNRecords Date: Tue Dec 31, 2002 0:24pm Subject: For those who recall (Op Follow Up) 206.666.8078 Not: 206.666.8070 Strangely it happens --------------------------------- Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now [Non-text portions of this message have been removed] 6711 From: Thomas Shaver Date: Tue Dec 31, 2002 8:46pm Subject: Wanted: Used Wetline TDR Does anyone have a TDR that can be used on a line with voltage that they want to sell? If the sell price is not under 75% of the new retail price, I will purchase a new unit; therefore, don't waste your time sending me the specs/information (Not being a smartass, just trying to save your time.) Also, if anyone has a training course on TDR and their use related to countermeasures, please reply with information. My knowledge base is limited, but growning. If this is a foolish purchase for example due to another device having equal or better results for less money, please e-mail me. Thanks in advance for any assistance, Richard T. Gray Jr. Gray & Associates, LLC 337-319-4406 laspy1@y... 6712 From: Matt Paulsen Date: Wed Jan 1, 2003 1:03am Subject: wtb: 2.0+-6.0GHz spectrum analyzer. Just looking for suggestions on what to get at this time and ballpark costs to budget. Thanks, Matt 6713 From: Andre Holmes <1ach@g...> Date: Wed Jan 1, 2003 11:29am Subject: Re: Wanted: Used Wetline TDR Greetings A Wet line is mainly on the outside of a structure, which is likely to retain moisture meaning phone lines. A Wet power line is on the outside of a structure,which is likely to retain moisture.It contains 220/240 volts per conductor from pole to meter. You have no control to turn the power off to attach any instrument To sweep power lines you need a plan of attack. You have to have control of working voltages in all ways,you need a properly rated DMM, Current Clamp, Line Splitter, Tone & Probe kit, for starters then have knowledge of wire color codes also where are the junction boxes,how many conductors per box are you allowed which wire group is power,load,switch. A Insulation meter is a must have luxery item. What are you looking for on the line it self. Keep in mind that the installation of a power source for a bug has to have voltage protection and its design flaws is what you are looking for. You must take this message seriously you can use a dry TDR but you cannot have Voltage on the conductor I have several New un- opened Line Splitters 25.00 dollars each. Andre Holmes Neptune Enterprise Security ----- Original Message ----- From: To: Sent: 31 December, 2002 09:46 PM Subject: [TSCM-L] Wanted: Used Wetline TDR > Does anyone have a TDR that can be used on a line with voltage that > they want to sell? If the sell price is not under 75% of the new > retail price, I will purchase a new unit; therefore, don't waste your > time sending me the specs/information (Not being a smartass, just > trying to save your time.) Also, if anyone has a training course on > TDR and their use related to countermeasures, please reply with > information. > > My knowledge base is limited, but growning. If this is a foolish > purchase for example due to another device having equal or better > results for less money, please e-mail me. > > Thanks in advance for any assistance, > > Richard T. Gray Jr. > Gray & Associates, LLC > 337-319-4406 > laspy1@y... > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6714 From: Steve Uhrig Date: Wed Jan 1, 2003 0:54pm Subject: Re: Wanted: Used Wetline TDR On 1 Jan 2003 at 2:46, Thomas Shaver laspy1@y... wrote: > Does anyone have a TDR that can be used on a line with voltage that > they want to sell? If the sell price is not under 75% of the new > retail price, I will purchase a new unit; therefore, don't waste your > time sending me the specs/information Buy a new Riser Bond 1270 from anywhere. Prices are fixed so you will pay $3500 from any dealer. Jensen or Tessco are two. Tutorials are on their website www.riserbond.com. Stay away from Tektronix TDRs. They have problems on wet lines. Riser Bond products can take min of 400 volts at 400 cycles, and 10 volts at 1 gig. Steve trying not to waste your time ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6715 From: Date: Wed Jan 1, 2003 8:45am Subject: Re: Re: Wanted: Used Wetline TDR In a message dated 1/1/2003 10:56:15 AM Pacific Standard Time, steve@s... writes: > Stay away from Tektronix TDRs. They have problems on wet lines. I humbly beg to disagree. Tek was the choice of telco's way before Riser-Bond came into existence. Check your facts. [Non-text portions of this message have been removed] 6716 From: radcommtech Date: Wed Jan 1, 2003 9:57pm Subject: Pringles: Food For Thought! In the links section, there's an article that was brought to my attention by one of my Comm. Techs. Not that it should really surprise any of us though. An IC-R3, an empty Pringles can, some nuts, some washers, and about 5 minutes worth of work; people can easily spy on your 2.4G security cameras. *LOL* 6717 From: radcommtech Date: Wed Jan 1, 2003 10:00pm Subject: Pringles: Food For Thought! Pt. 2 Being that I couldn't place the link under links, here she is. http://www.memagazine.org/contents/current/features/scadavs/scadavs.ht ml 6718 From: Steve Uhrig Date: Thu Jan 2, 2003 8:45pm Subject: To one and all http://www2.incredimail.com/multimedia/flash/new_year4.swf Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6719 From: bigzerodog Date: Fri Jan 3, 2003 11:17am Subject: Industrial espionage in L.A. Folks: The FBI announced Thursday the arrest of a 19-year-old college student suspected of stealing details of Direc-TV's $25 million encryption system. The system, called "Period 4," was developed with the company NDS and is -- supposedly -- impervious to hackers. Until this happened... The teenager was a temporary employee of a legal document service brought in by a law firm to make electronic copies of thousands of pages of legal papers. The documents were part of a lawsuit filed by Direc-TV against NDS and the case was filed under seal to protect the information. The FBI says the teen made his own electronic copies (PDFs I think) and posted them to a hackers website where DBS pirates hang out. The feds found out about it through an informant and Direc-TV and traced the documents back to the 19-year-old. -- This law firm regularly has sensitive areas inspected and their computer network meticulously monitored. Lotta good that does when you trust your most secret information to unscreened temp workers. The copy service was allowed to set up their own office inside the law office and brought in their own computer network. A reminder to all. Happy new year. -Eric Leonard in Los Angeles 6720 From: Marcel Date: Fri Jan 3, 2003 0:59pm Subject: TAP TRAP Wiretap Detector This reminds me of the Highly Sensitive, RFI immune, Super Selective, Quadruple Conversion Radio Shack "Wireless Camera" detector, but at 4X the price. :) :) FOXHOUND BLACK RF Signal Detector Beeper size Camera / Mobile / Bug Detector http://www.pimall.com/nais/ttrap.html [Non-text portions of this message have been removed] 6721 From: Andre Holmes <1ach@g...> Date: Fri Jan 3, 2003 11:44pm Subject: Re: TAP TRAP Wiretap Detector Greetings This device actually works,its great for miswires on telephone lines. About 1990s the Tap Traps were high end outside of TSCM groups. Its a good kit item in my opinion. Andre Holmes Neptune Enterprise Security ----- Original Message ----- From: "Marcel" To: Sent: 03 January, 2003 01:59 PM Subject: [TSCM-L] TAP TRAP Wiretap Detector > This reminds me of the Highly Sensitive, RFI immune, Super Selective, Quadruple Conversion > Radio Shack "Wireless Camera" detector, but at 4X the price. :) :) > > FOXHOUND BLACK > RF Signal Detector > Beeper size Camera / Mobile / Bug Detector > http://www.pimall.com/nais/ttrap.html > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6722 From: Date: Thu Jan 2, 2003 0:52pm Subject: Re: Pringles: Food For Thought! Pt. 2 Here are the plans for those who are interested: http://www.oreillynet.com/cs/weblog/view/wlg/448 (Embedded image moved to file: pic18114.pcx) ********************************** N O T E ***************************************** All e-mail sent to and from this address will be received or otherwise recorded by the First Banks corporate e-mail system and is subject to archival, monitoring or review by, and/or disclosure to, someone other than the recipient. *********************************************************************************************** From: Date: Fri Dec 26, 2003 1:22pm Subject: Check out Taylor Group Click here: Taylor Group FYI RE: TAYLOR GROUP From: "Craig Meldrum" Date: Thu Jul 31, 2003 5:12:13 PM America/New_York To: "TSCM" Subject: [TSCM-L] Warning It is with great reluctance that I feel the necessity to post the following information as a possible warning to other members of this forum. I recently, through this site, advertised some excess TSCM equipment I had for sale and it was purchased by Dan Grissom trading as Taylor Group of Downers Grove Il 60515. He gave me a Fedex account on which to ship the equipment which turned out (after shipping) to be a false or non existent account. I have therefore been landed with the, not inconsiderable, international freight costs. All subsequent attempts to contact Dan Grissom have been ignored. This is an industry where integrity is not only essential but should be expected without question and I certainly did not expect to find such a recalcitrant on this list. Having given Dan Grissom several opportunities to fix this problem without result, I resorted to this naming as a last resort and on the advice of a prominent member of the list. If as a consequence he comes to his senses and does the right thing I will be more than happy to publicize that and withdraw this warning. Thank you all for your tolerance. Craig Meldrum =============================== Craig Meldrum, Managing Director Communications Security Ltd PO Box 8314, Symonds St Auckland, New Zealand Ph: 64-9-3093386 Fax: 64-9-3021148 =============================== On the bugsweeps.us website (Taylor Group) is an address in KY. Google the phone number (270-210-0860). The Google phone book listing shows... Taylor Hardwood.com, (270) 210-0860, 3859 Douglas Rd, Paducah, KY 42001 Now... Plug www.hardwood.com into your browser's URL, logical investigative progression. [Non-text portions of this message have been removed] 8105 From: Date: Fri Dec 26, 2003 1:25pm Subject: Corrected with URL Taylor group Click here: Taylor Group http://www.bugsweeps.us/ FYI RE: TAYLOR GROUP From: "Craig Meldrum" Date: Thu Jul 31, 2003 5:12:13 PM America/New_York To: "TSCM" Subject: [TSCM-L] Warning It is with great reluctance that I feel the necessity to post the following information as a possible warning to other members of this forum. I recently, through this site, advertised some excess TSCM equipment I had for sale and it was purchased by Dan Grissom trading as Taylor Group of Downers Grove Il 60515. He gave me a Fedex account on which to ship the equipment which turned out (after shipping) to be a false or non existent account. I have therefore been landed with the, not inconsiderable, international freight costs. All subsequent attempts to contact Dan Grissom have been ignored. This is an industry where integrity is not only essential but should be expected without question and I certainly did not expect to find such a recalcitrant on this list. Having given Dan Grissom several opportunities to fix this problem without result, I resorted to this naming as a last resort and on the advice of a prominent member of the list. If as a consequence he comes to his senses and does the right thing I will be more than happy to publicize that and withdraw this warning. Thank you all for your tolerance. Craig Meldrum =============================== Craig Meldrum, Managing Director Communications Security Ltd PO Box 8314, Symonds St Auckland, New Zealand Ph: 64-9-3093386 Fax: 64-9-3021148 =============================== On the bugsweeps.us website (Taylor Group) is an address in KY. Google the phone number (270-210-0860). The Google phone book listing shows... Taylor Hardwood.com, (270) 210-0860, 3859 Douglas Rd, Paducah, KY 42001 Now... Plug www.hardwood.com into your browser's URL, logical investigative progression. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ [Non-text portions of this message have been removed] 8106 From: mpaulsen6 Date: Sun Dec 28, 2003 11:36am Subject: Portable MP3 Players I was recently asked about MP3 players capabilities to export confidential information from secure sites. Recommendation - do not allow personal MP3 players in sensitive locations, just as you would not allow pagers, cell phones, and the like. MP3 players can not only record conversations, but they can export information from file systems in sensative locations via USB interfaces in many cases. File formats can be easily changed and stored in digital storage systems - simply rename that word doc to mp3 and you're off. Do not allow USB connectivity. In one case, we stopped a USB activity by simply using a NON-USB capable operating system. In another, we disabled USB in the BIOS, in another we disabled the USB controller in the OS. 8107 From: mpaulsen6 Date: Sun Dec 28, 2003 0:14pm Subject: http://www.spymuseum.org/siteintro.asp http://www.spymuseum.org/siteintro.asp 8108 From: Ocean Group Date: Mon Dec 29, 2003 4:05am Subject: France Intell Well at least they're open about it, as opposed to the state dept commerce unit! ************************ Message : 5 Date : Sun, 28 Dec 2003 22:23:01 +0800 (CST) Objet : [anglais] French Spymaster (Alain Juillet) Expected To Head Econ Intelligence Unit French Spymaster Expected To Head Econ Intelligence Unit PARIS -(Dow Jones)- A senior French intelligence official is expected to be named to head a new economic intelligence unit aimed at bringing France into line with its peers, a government official said Monday. The official said it's "probable" that Alain Juillet, current head of intelligence at France's external information-gathering agency DGSE, will be appointed to the post later this week. Prime Minister Jean-Pierre Raffarin presented a decree creating the job to cabinet ministers Monday morning. If Juillet is confirmed when the decree is officially published later this week, he will report directly to the national defense secretariat. His task will be to collect, synthesize and disseminate economic intelligence of value to French corporations, while protecting their business information from prying eyes and ears. The post is one of several proposals made in a parliamentary report. Juillet joined the DGSE a year ago after a stint in business as a corporate restructuring specialist - his last "operation" being to oversee the shut-down of Marks & Spencer Group PLC's French stores. Juillet studied at the University of Stanford and the French institute of advanced defense studies, and worked for several food companies including drinks group Pernod-Ricard SA ; Union Laitiere Normande, a leading French dairy products company; and Jacobs Suchard (NYSE:KFT - News) France, a chocolate-making affiliate company of Kraft Foods International , which itself is a part of Philip Morris Companies Inc. -By David Pearson, Dow Jones Newswires; +33140171740, david.pearson@d... 8109 From: James M. Atkinson Date: Mon Dec 29, 2003 6:50am Subject: New Weapons (Clever and Original) http://abclocal.go.com/wls/news/122703_ap_ns_drugbust.html Police to use wires to bust gangs December 28, 2003 (Chicago) - Chicago police say they're going to use a new weapon to fight gangs in the new year -- hidden microphones and wires. Police Superintendent Phil Cline says they'll put hidden microphones on cooperating gang members to help capture others. Police spokesman David Bayless says they'll use the new tactic for murder and aggravated battery cases. Cline says using a defendant's recorded words will be persuasive at trial. The superintendent's new Gang Intelligence Unit has already been successful in using an informant's wire to land murder charges. Chicago's homicide total was 589 on Friday -- putting the city on track to have the lowest total since 1967. 8110 From: Mitch D Date: Mon Dec 29, 2003 7:20am Subject: OnStar hack Courtesy of ISN By Sandeep Junnarkar New York Times Dec. 25, 2003 Ray and Elna Kawal hit the open road in the fall on an 8,000-mile trip in their 2002 Chevy Tahoe with General Motors' OnStar navigation system serving as their North Star. From their home in Sequim, Wash., across to Denver and Chicago, down to Mexico and then homeward through Arizona and California, the Kawals followed directions to tourist destinations, hotels and their friends' homes using OnStar's Global Positioning System navigation -- just the kind of business GM covets for its subscription service. But in this case, the automaker didn't make a penny from the six-week excursion. That's because Ray Kawal, a 57-year-old retired engineer, had pried the OnStar unit from behind the glove compartment and customized it to work with his laptop and commercially available mapping software. His wife read him directions right off the laptop that sat between them. The modified unit was no longer connected to the OnStar network, over which representatives could have provided the same service for a fee. ``My wife was basically doing a lot of what the OnStar service person would do,'' Kawal said. ``Many of the things OnStar wants you to pay for, you can take the unit out and do it yourself.'' Web instructions Other road warriors are quickly discovering this as Web sites and message boards spring up with step-by-step instructions on removing and personalizing OnStar's navigational and communications components. While there are no estimates on how many people have customized the device in their cars, those who are proficient at adapting the system are helping friends and family members do so, and some are beginning to parlay their skills into a weekend business. The hobbyists have OnStar peering around an unforeseen curve. Bruce Radloff, OnStar's chief technology officer, pointed out that owners who tamper with the system risk voiding the warranty on the OnStar unit -- and more critically, the warranty on the entire car. Yet he acknowledges the temptation. ``From my own perspective -- and GM may feel differently -- once someone buys the car, I guess their desire to modify it and make changes to it is up to them,'' Radloff said. ``But why would you take that kind of risk of invalidating your vehicle warranty when you can go out and buy a GPS receiver for a couple of hundred bucks these days?'' `Freedom to tinker' The question goes to the heart of a principle long embraced by technologists. Edward W. Felten, a professor of computer science at Princeton University and a leading voice for this philosophy, defines it on his Web log as the ``freedom to tinker'' ethic. This calls for the ``freedom to understand, discuss, repair and modify the technological devices you own.'' Tinkerers seek little justification to deconstruct any technology. A common reason given for fiddling with a device is simply that it's there. These technologists believe that a bit of tweaking will inevitably unearth some innovative uses. It was this curiosity that led Pete Carter, a 28-year-old computer engineer at an online brokerage in Omaha, to plug a GPS unit he had bought for his father into his own laptop just to see how it would react. To his surprise, the laptop picked up the device without requiring any additional software. He figured that the components used by OnStar's GPS unit were probably the same and resolved to put his theory to the test. After the challenge of prying the unit loose from behind the dashboard, Carter faced a more daunting task. He had to switch the unit's programming language to one accepted by commercial mapping software and then solder a connection compatible with his laptop. Once he succeeding at harnessing the GPS capabilities of his OnStar system, he created a Tap Into OnStar Web site (mem bers.cox.net/onstar) to help others modify their units. Fee for service When a driver requests directions from an OnStar representative, his GPS data is routed over an analog cellular network to OnStar computers. The agent then reads back the directions over the same cellular network. The price for this service, which also includes emergency services and hotel and restaurant recommendations and reservations, is about $420 annually, or $400 if paid upfront. For some, the success such hobbyists have had in tapping into their personal OnStar units evokes the hacker who seeks to break into a networked system simply out of curiosity. Security researchers have even raised the specter that as more cars come equipped with OnStar navigation systems, hackers will be tempted to try to exploit the technology to locate OnStar users. ===== Mitch Davis TSCM/Special Operations Group Inc. Nashville,TN.USA MitchD@t... site:www.tscmusa.com. Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 __________________________________ Do you Yahoo!? New Yahoo! Photos - easier uploading and sharing. http://photos.yahoo.com/ 8111 From: Date: Mon Dec 29, 2003 6:42am Subject: Speaking Of Cars December 29, 2003 This Car Can Talk. What It Says May Cause Concern. By JOHN SCHWARTZ ast year, Curt Dunnam bought a Chevrolet Blazer with one of the most popular new features in high-end cars: the OnStar personal security system. The heavily advertised communications and tracking feature is used nationwide by more than two million drivers, who simply push a button to connect, via a built-in cellphone, to a member of the OnStar staff. A Global Positioning System, or G.P.S., helps the employee give verbal directions to the driver or locate the car after an accident. The company can even send a signal to unlock car doors for locked-out owners, or blink the car's lights and honk the horn to help people find their cars in an endless plain of parking spaces. A big selling point for the system is its use in thwarting car thieves. Once an owner reports to the police that a car has been stolen, the company, which was started by General Motors, can track it to help intercept the thieves, a service it performs about 400 times each month. But for Mr. Dunnam, the more he learned about his car's security features, the less secure he felt. A research support specialist at Cornell University, he is concerned about privacy. He has enough technical knowledge to worry that someone else - say, law enforcement officers, or even hackers - could listen in on his phone calls, or gain control over his automotive systems without his knowledge or consent. Any gadget that can track a carjacker, he reasons, can just as readily be used to track him. "While I don't believe G.M. intentionally designed this system to facilitate Orwellian activities, they sure have made it easy," he said. OnStar is one of a growing number of automated eyes and ears that enhance driving safety and convenience but that also increase the potential for surveillance. Privacy advocates say that the rise of the automotive technologies, including electronic toll areas, location-tracking devices, "black box" data recorders like those found on airplanes and even tiny radio ID tags in tires, are changing the nature of Americans' relationship with their cars. Beth Givens, founder of the Privacy Rights Clearinghouse, said the car had long been a symbol of Kerouac-flavored freedom, and a haven. "You can talk to yourself in your car, you can scream at yourself in your car, you can go there to be alone, you can ponder the heavens, you can think deep thoughts all alone, you can sing," she said. With the growing number of monitoring systems, she said, "Now, the car is Big Brother." James E. Hall, a transportation lawyer and former chairman of the National Transportation Safety Board, said the monitoring systems presented a subtle blend of benefit and risk. "We are moving toward a kind of automobile that nobody's ever known," he said. "It's mostly good news, but there are negative things that we will have to work through." Mr. Dunnam said he had become even more concerned because of a federal appeals court case involving a criminal investigation in Nevada, in which federal authorities had demanded that a company attach a wiretap to tracking services like those installed in his car. The suit did not reveal which company was involved. A three-judge panel in San Francisco rejected the request, but not on privacy grounds; the panel said the wiretap would interfere with the operation of the safety services. OnStar has said that its equipment was not involved in that case. An OnStar spokeswoman, Geri Lama, suggested that Mr. Dunnam's worries were overblown. The signals that the company sends to unlock car doors or track location-based information can be triggered only with a secure exchange of specific identifying data, which ought to deter all but the most determined hackers, she said. As for law enforcement, the company said it released location data about customers only under a court order. "We have no choice but to be responsive to court orders," Ms. Lama said. Other information systems being added to cars can be used for tracking as well. Electronic toll systems are convenient for commuters, but the information is increasingly being used to track movements. When police were trying to track the car of Jonathan P. Luna, an assistant United States attorney who was killed earlier this month, they pulled the records of his charges on his E-ZPass account, which led them to Pennsylvania, where his body was found. Such records have also been used in civil cases like child custody disputes. Of all of the new automotive technologies, none presents a more complex set of benefits and risks than the "black box" sensors that have already been placed in millions of cars nationwide. The latest models capture the last few seconds of data - like vehicle speed, seatbelt use and whether the driver applied the brakes - before a collision. Such detailed reporting of accidents raises privacy concerns, said experts at Consumers Union, which has filed comments with the federal government warning about possible violations of privacy. Sally Greenberg, senior product safety counsel at Consumers Union, said her group recognized the potential safety benefits of the reporting but wanted the government to "proceed with caution." People's cars have already started turning their owners in. Scott E. Knight, a California man, was convicted last year for the killing of a Merced, Calif., resident in a March 2001 hit-and-run accident; police tracked him down because the OnStar system in his Chevy Tahoe alerted OnStar when the airbag was set off. Transportation experts say that if these sensor systems can provide crucial information for emergency aid workers and for vehicle research, lives will be saved. The federal government is considering rules that would standardize the information that black boxes provide, along with ways to gather the information. The Institute of Electrical and Electronics Engineers Standards Association is working to develop a worldwide standard for black boxes. Tom Kowalick, who is co-chairman of the effort, calls the program "quite simply a matter of life and death for millions of motor vehicle crash victims." Mr. Hall, the former federal official, is the other co-chairman of the effort, and he agreed that the technology should be used to detect dangerous car models. The privacy concerns can be minimized, he said, by applying the technology to commercial vehicles and fleets. "There are enough vehicles out there," he said, "to amass evidence, to provide you with the type of information you need without having to even address the subject of the privately owned vehicles right now." Surveillance technologies are easy to buy and even easier to abuse, privacy experts say. Paul A. Seidler was arrested last year in Kenosha, Wis., after he installed a tracking device in an ex-girlfriend's car. According to the police report, the ex-girlfriend, Connie Adams, complained that "she could not understand how the defendant always knew where she was in her vehicle at all times." Police inspected her 1999 Chevrolet Cavalier and found a small black box near the radiator that beamed the car's position to Mr. Seidler's computer. In June, Mr. Seidler was sentenced to nine months in jail for stalking Ms. Adams. The use of location tracking is growing. Law enforcement agents have used similar devices to chart suspects' travels, and a California company now offers a similar device so that parents can monitor their teenagers' driving. Last year a small rental car company in New Haven, Acme Rent-a-Car, angered customers by using global positioning to fine them $150 for speeding. The state's department of consumer protection declared the fines illegal - but not the tracking. The company appealed the consumer agency's action, but in July a state judge rejected the appeal. Ian Ayres of Yale University, a law professor who has examined the issue, predicted that regardless of what happened with Acme, "within a decade all our car insurance companies will be offering us discounts if we will commit to Acme-like contracts - if we agree not to speed." and the use of tracking technology will grow "even if they don't give us a discount," he said, because "all the parents will want these boxes in their cars to know whether their kids are speeding." In fact, one of the largest insurance companies in the United States, Progressive Auto Insurance, has already tested policies in Texas that tied insurance rates to car usage as monitored by global positioning. Tires, too, can tell on drivers. This year, Michelin began implanting match-head-sized chips in tires that can be read remotely. The company started using the chips to provide manufacturing information that could help spot failure trends and to comply with a federal law requiring close tracking of tires for recalls. But privacy activists fear that the chips, which can be loaded with a car's vehicle identification number, would allow yet another form of automated vehicle tracking. "You basically have Web browser 'cookies' in your tires," said Richard M. Smith, an independent privacy researcher. Aviel D. Rubin, the technical director of the Information Security Institute at Johns Hopkins University, said that every new technology with the potential to invade privacy was introduced with pledges that it would be used responsibly. But over time, he said, the desire of law enforcement and business to use the data overtook the early promises. "The only way to get real privacy," he said, "is not to collect the information in the first place." Copyright 2003 The New York Times Company | Home | Privacy Policy | Search | Corrections | Help | Back to Top [Non-text portions of this message have been removed] 8112 From: Date: Mon Dec 29, 2003 6:46am Subject: Wired for snooping and cheating Monday, December, 29, 2003 Wired for snooping and cheating Gen X'ers are more savvy than boomers at cellular deception, a poll indicates. By JIM FINKLE The Orange County Register Wireless technologies have fostered distrust, lying and cheating - especially among the post-baby-boom crowd. Just ask Jessica Dobson, a reformed cell-phone snooper from Orange who ended up breaking up with a boyfriend whose calls and voice mails from other women made her doubt his sincerity. "I would hear a message from a girl that started with something like 'Hi, cutie,' and I would just assume he was cheating," she said. "But I couldn't accuse him of anything 'cause I didn't want him to know that I was snooping." A recent poll found that about one-third of women under age 40 say they've secretly checked wireless phones to monitor the activities of loved ones. And about one-third of men in the same age group admitted to pretending to be on a mobile phone call to avoid a face-to-face conversation. The results of the poll of 802 Americans conducted by Kelton Research of Los Angeles resonate with Dobson, a 21-year-old office administrator. Her snooping career began several years ago when her then-boyfriend refused to let her answer his cell phone. She suspected that he was fooling around, confronted him with her concerns, and he shrugged them off. Things still didn't feel right, so she checked the call log on his handset to see who he was chatting with and for how long. Eventually, she figured out his voice-mail password so she could monitor his messages. The lack of trust led to fights and the relationship eventually collapsed. Long after the breakup, he confessed to having cheated, according to Dobson. Still, she wasn't completely jaded by the experience. Dobson swears she hasn't felt the need to snoop on her current boyfriend, Randy. The reason: She trusts him. Ruben Casas, 24, a creative writing major at Chapman University, admits to using his cell phone to lie about his whereabouts. He got his first wireless phone when he was a high school senior. The handset made it possible for him to convince his parents that he was at a friend's home when he was really at a party. It seemed relatively harmless. But he recently changed his view on the gravity of cell-phone deception. One of his friends ended up getting divorced after a check of her husband's cell-phone log. "It was a validation of her suspicions that he was cheating," Casas said. The new technologies have also made it more convenient to cheat on exams. Susan Guth, a freshman business major at California State University, Fullerton, says that even though cell phones are banned by all her professors, there are still plenty of scofflaws who use them, discreetly sending instant messages to friends. One professor warned that there would be serious consequences for anybody caught with a cell phone during exams after one student used a handset equipped with a tiny camera to photograph answers on a math test, then e-mail them to classmates in the same room. "Cell-phone technology adds one more layer of interesting possibilities for deception," said Carroll Straus, a Mission Viejo attorney. But wireless technologies have also given new tools to law-enforcement officials, private investigators who follow unfaithful spouses, companies monitoring employee performance, and parents trying to keep track of their kids. Thomas Investigative Publications sells a $700 GPS tracking device called the ProScout, which can be hidden under a car. With batteries that last about 18 days, it provides data on the auto's route, which investigators can access through the Internet and display on maps that show the car's comings and goings. The ProScout and other devices also can be used to let companies monitor the activities of truckers, salespeople and other workers who frequently travel to make sure they're not sloughing off. There also are new tools designed to monitor the whereabouts of children and others who are prone to wander off, or who forget to tell their parents where they're going: A $200 wristwatch called Wherify can be locked onto a child's wrist so that parents can track him down if he's lost. It has an emergency button that children can press to call police if they're in trouble. It's available at many electronics retailers. SIDSA of Spain has developed a $600 device that tracks people with Alzheimer's disease who are prone to wander off and get lost. It can be sewed into clothing so that it's tough to remove. More information is available from info.us@s.... A company called ULocate (www.ulocate.com) makes it easy to track the location of people using Motorola and Benefon GPS-enabled phones on the networks of AT&T Wireless, Cingular, Nextel and T-Mobile. The service costs $13 a month for one phone and $10 for a second handset. So, for $43 a month you could track the movements of four children by hooking up to the Internet and watching their movements on a single map. The only catch is that these devices won't work if the person being tracked doesn't cooperate or figures out that he or she is being followed. So if your kids leave their cell phones at school, there's no way to figure out that they've skipped class. And a cheating spouse who checks underneath the car can disable a tracking device by removing the batteries. CONTACT US: (714) 796-6927 or jfinkle@o... [Non-text portions of this message have been removed] 8113 From: Date: Mon Dec 29, 2003 1:07pm Subject: CIA Science and Technology Directorate Museum Opens CIA Gadget Museum Includes Robot Fish, Pigeon Camera Associated Press McLEAN, Va. -- When the CIA's secret gadget-makers invented a listening device for the Asian jungles, they disguised it so the enemy wouldn't be tempted to pick it up and examine it: The device looked like tiger droppings. The guise worked. Who would touch such a thing? The fist-sized, brown transmitter detected troop movements along the trails during fighting in Vietnam, a quiet success for a little-known group of researchers inside the world's premier intelligence agency. The Central Intelligence Agency's Directorate of Science and Technology is celebrating its 40th anniversary by revealing a few dozen of its secrets for a new museum inside its headquarters near Washington. Keith Melton, a leading historian of intelligence, calls it "the finest spy museum you'll never see." It is accessible only to CIA employees and guests admitted to those closed quarters. Besides the jungle transmitter, the exhibits include a robotic catfish, a remote-controlled dragonfly and a camera strapped to the chests of pigeons and released over enemy targets in the 1970s. The secret gadgets currently used by CIA are left to the imagination of visitors. The pigeons' missions remain classified, made possible only after the CIA secretly developed a camera weighing only as much as a few coins. An earlier test with a heavier camera in the skies over Washington failed after two days when the overburdened pigeon was forced to walk home. "People don't think of a pigeon as being anything more than a rodent on top of a building," said Pat Avery of Newalla, Okla., who runs the National Pigeon Association and loves to recount decades-old exploits by famous military pigeons such as "Spike" and "Big Tom." But as surveillance technology improved, the need for CIA pigeons diminished. "They're pretty passe now," she said. Agency lore holds that a pistol on display was so quiet that William "Wild Bill" Donovan, founder of the agency that became the CIA, pulled the trigger inside the White House to demonstrate for Franklin D. Roosevelt, who never heard a shot. For years, the .22-caliber was standard issue among CIA employees. "The president was on the phone at the time, so Donovan proceeded to fire the entire magazine, 10 rounds, into the bag of sand in the Oval Office, then placed the smoking-hot weapon on the desk and told him what he had done," said Toni Hiley, the curator for the CIA museum. In 2000, the CIA built a catfish it calls "Charlie," a remarkably realistic swimming robot. The spy agency still won't disclose much about its mission, but experts speculated it collects water samples near suspected chemical or nuclear plants. One outside scientist consulted by the Associated Press said the catfish robot was so realistic -- except for pectoral fins made slightly too large -- that it might be eaten by predators while on its cloak-and-dagger missions. The AP obtained a videotape from CIA of the catfish swimming during one test. "A lot of things in the wild like to eat those," said Jimmy Avery, an aquaculture professor at Mississippi State University who watched the video at AP's request. He said Charlie was apparently made to resemble a channel catfish commonly found in rivers worldwide. "When you look at it from above, it would be difficult to pick that out from any kind of real catfish." The CIA isn't showing off just its successes. It invented a remote-controlled dragonfly for delivering tiny listening devices outside windows: a bug carrying a bug. But the so-called "insectothopter," with a miniature engine, built by a watchmaker, couldn't fly straight in winds and didn't work out. The agency's D-21 "Tagboard" unmanned jet was kept secret until the late 1970s. Designed to fly off the back of CIA's version of the superfast SR-71 "Blackbird" surveillance jet, Tagboard cruised more than 17 miles high, taking photographs over Cold War lands at nearly 2,200 miles per hour. But over four missions, the CIA once failed to recover the drone's film canister before it dropped into the ocean. Another drone crashed in Siberia. CIA crewman Ray Torrick died in one launch attempt. "It wasn't a hugely successful program," Hiley said. The Science and Technology Directorate is among the CIA's largest units. It was held in highest esteem for more than a dozen years until 1976, but experts say its internal influence with the CIA director has declined since. "They've been very clever; they have not stuck to simply what would be the traditional and obvious means of intelligence collection," said Jeffrey T. Richelson, who wrote a book about the directorate in 2001. "If they're being successful, they'll probably have devices more clever and harder to detect than in the past." Copyright © 2003 Associated Press URL for this article: http://online.wsj.com/article/0,,SB107265041422318300,00.html Hyperlinks in this Article: (1) http://www.cia.gov/cia/dst/index.html (2) http://www.cia.gov/cia/information/artifacts/index.htm Updated December 28, 2003 5:58 p.m. [Non-text portions of this message have been removed] 8114 From: Does it matter Date: Sun Dec 28, 2003 0:08pm Subject: Re: Portable MP3 Players The newer mp3 players pride themselves on allowing data storage no matter what the extension. I worry about 1gb or 2gb thumb drives but we do the best we can to direct clients how to make their workstations more secure. Good point though Matt. --- In TSCM-L@yahoogroups.com, "mpaulsen6" wrote: > I was recently asked about MP3 players capabilities to export > confidential information from secure sites. Recommendation - do not > allow personal MP3 players in sensitive locations, just as you would > not allow pagers, cell phones, and the like. MP3 players can not > only record conversations, but they can export information from file > systems in sensative locations via USB interfaces in many cases. > File formats can be easily changed and stored in digital storage > systems - simply rename that word doc to mp3 and you're off. Do not > allow USB connectivity. In one case, we stopped a USB activity by > simply using a NON-USB capable operating system. In another, we > disabled USB in the BIOS, in another we disabled the USB controller > in the OS. 8115 From: Date: Tue Dec 30, 2003 6:16am Subject: Story with a moral. Hudson Oaks suspect arrested in Alabama By Gale M. Bradford Special to the Star-Telegram The Texas fugitive accused of dragging a Hudson Oaks police officer about 40 feet on Interstate 20 on Saturday was apprehended after a high-speed chase in Montgomery, Ala., Parker County officials said Monday. Soloavid Danyl Aba, 19, was located by electronic surveillance through cell phone usage, said Larry Fowler, who heads the Parker County district attorney's major case unit. Fowler said Texas Rangers, U.S. marshals and the Parker County Sheriff's Department assisted his unit. Aba was charged with aggravated assault of a peace officer after he sped away from a traffic stop as Hudson Oaks officer Van Delay clung to the steering wheel of the 1999 Toyota that Aba was driving. Delay was treated at a Fort Worth hospital and released. Aba also is wanted in Dallas County on a theft warrant, in Haltom City on suspicion of obstructing police, in Tarrant County for probation violation, in Dalworthington Gardens on suspcion of obstructing police/evading arrest with a vehicle, in Hudson Oaks on theft of more than $20,000 but less than $100,000 and on suspicion of unauthorized use of a motor vehicle in Parker County. Aba was located at 11:40 p.m. Sunday in Montgomery, Ala. The Montgomery County Sheriff's Department was notified that Aba was in their jurisdiction and that assistance was needed. Deputies located Aba in the Toyota on Highway 231 south out of Montgomery and began a pursuit, Fowler said. After a 20-minute chase at speeds up to 115 mph, Aba wrecked out and was apprehended. "We got a court order authorizing the tracking of his cell phone calls," Fowler said. "I contacted Kirk King with the U.S. Marshal's Service in Dallas and working with the cellular provider, we were able to track this man across the country. "Aba suffered minor injuries in the wreck and is in custody in Montgomery County Jail awaiting extradition. © 2003 DFW.com and wire service sources. All Rights Reserved. http://www.dfw.com [Non-text portions of this message have been removed] 8116 From: Steven Donnell WA1YKL Date: Tue Dec 30, 2003 0:39am Subject: Re: CIA Science and Technology Directorate Museum Opens MACCFound@a... wrote: > CIA Gadget Museum Includes Robot Fish, Pigeon Camera > > Associated Press > > McLEAN, Va. -- When the CIA's secret gadget-makers invented a listening > device for the Asian jungles, they disguised it so the enemy wouldn't be > tempted to pick it up and examine it: The device looked like tiger droppings. > > The guise worked. Who would touch such a thing? The fist-sized, brown > transmitter detected troop movements along the trails during fighting in > Vietnam, a quiet success for a little-known group of researchers inside the > world's premier intelligence agency. Hi, CIA secret huh?? Back around 1975 as young tinkerer and budding Ham I remember picking up a few of these from a local electronics surplus store(John Meshna's old place, JMA). Anyways, some were brown, some were black. They had a nipple on one end that when you pulled it off, removed a small pin that "armed" the tx. I set one in a jar of gasoline for a cple days which permited its tough rubber skin to be easily pealed off. The first layer underneath revealed a tin foil antenna. To get in further required some more digging, but I guess thats where I get my love of reverse engineering things,,. The tx was a simple L/C tuned deal that operated near the FM Brdcast band. The batteries were 3 or 4 mercury button cells(dead). The motion sensor was this tiny brass cylinder(HG sw?) about the size of a pencil eraser, which cw keyed the tx. With the sensor bypassed, the tx would emit a continuous carrier. I dont recall if I ever botherd to try and FM modulate the thing. A few yrs later I remember reading some additional info about how this whole system worked. There was even a picture of the "repeater/up link tx" that was made to look like a small palm tree. Come to think of it, I seem to recall seeing this on display at the AF museum at Wright Patterson. I gather that these "Poo Txs" were dropped by the hundreds along the Ho Chi Min trail. Steve 8117 From: cismic Date: Tue Dec 30, 2003 1:46am Subject: RE: Re: Portable MP3 Players In a windows 2000 or 2003 environment I'm not sure if you can setup a security policy to cancel out Usb functions via domain level policies. But with this article from MSDN you can Gain some pointers on this and maybe disable these files via policy http://support.microsoft.com/default.aspx?scid=kb;EN-US;Q823732 Thank you, Joseph -----Original Message----- From: Does it matter [mailto:u12armresl@y...] Sent: Sunday, December 28, 2003 10:09 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Portable MP3 Players The newer mp3 players pride themselves on allowing data storage no matter what the extension. I worry about 1gb or 2gb thumb drives but we do the best we can to direct clients how to make their workstations more secure. Good point though Matt. --- In TSCM-L@yahoogroups.com, "mpaulsen6" wrote: > I was recently asked about MP3 players capabilities to export > confidential information from secure sites. Recommendation - do not > allow personal MP3 players in sensitive locations, just as you would > not allow pagers, cell phones, and the like. MP3 players can not > only record conversations, but they can export information from file > systems in sensative locations via USB interfaces in many cases. > File formats can be easily changed and stored in digital storage > systems - simply rename that word doc to mp3 and you're off. Do not > allow USB connectivity. In one case, we stopped a USB activity by > simply using a NON-USB capable operating system. In another, we > disabled USB in the BIOS, in another we disabled the USB controller > in the OS. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ 8118 From: Date: Tue Dec 30, 2003 6:46am Subject: DVD Recorder advice Can anybody recommend a good quality portable DVD Recorder/Player 12v DC small enough to fit into a briefcase. I have a client that needs to covertly record his staff interviewing prospective clients and then review the results on a separate screen a little later. The requirement is for the recording to be made directly onto a CD [4.7gb] rather than a recorder using a hard drive. Each interview takes approx. 2 hours the disc is then physically stored without the need to record to CD via a PC DVD recorder. Thanks Regards Dave DEMTEC David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Countermeasures Specialist Electrical Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695 558544 07866206112 demtec@a... www.demtec.co.uk The manufacture and installation of custom made covert electronic audio and video devices Professional physical and electronic countermeasures [sweep] services. note: any fellow Private Investigator e-mail groups member welcome to call in or phone to discuss applications, projects or just seeking advice. Workshop located alongside the M58 junction 3 [Non-text portions of this message have been removed] 8119 From: Date: Wed Dec 31, 2003 1:18am Subject: CITY AVIATION AIDE ADDED TO FEDS' BUG LIST Posted on Wed, Dec. 31, 2003 CITY AVIATION AIDE ADDED TO FEDS' BUG LIST By JIM SMITH & DAVE DAVIES smithj@p... THE SAME DAY the feds got court authorization to bug the mayor's office as part of a wide-ranging corruption probe, they also got the green light to tap a cell phone used by a city airport executive. The tapped phone was used by deputy aviation director Jim Tyrrell. The new disclosure added Tyrrell's name to a list of those who were bugged over the past year as part of a long-running FBI-IRS probe into bond deals, vendor contracts and other matters. As usual, authorities gave no reason why Tyrrell was a subject of interest to investigators. Tyrrell is a deputy director of aviation for planning and development, making $114,000 a year. His area of responsibility includes airport concessions managed by Marketplace Redwood Inc., which has come under scrutiny in the federal probe. Marketplace Redwood's records have been subpoenaed and its president, Ricardo Dunstan, has been called to testify before a grand jury. Records show that shares of several airport concessions went to relatives and friends of attorney Ron White, whose office was raided in October as part of the investigation. Tyrrell declined to speak to a reporter at his home last night and did not answer phone messages left at his office or the cell phone that was tapped, which is still answered by his voice mail. A source said he did not believe Tyrrell had a lawyer because he had not yet been "identified as having [criminal] exposure." Tyrrell has worked for the airport since 1987 and rose through management ranks to become property manager, responsible for leasing gates to airlines as well as space for concessionaires. Tyrrell's big break came in February 2001, when current aviation director Charles Isdell made him a deputy director and gave him a 65 percent raise. Airport spokesman Mark Pesce last night referred questions to Deputy City Solicitor Milton Velez, who declined comment. Assistant U.S. Attorney Joan L. Markman, a federal prosecutor who is involved in the investigation, also refused to comment. In addition to Tyrrell and the mayor's office, others on the bugging list include lawyer and political fund-raiser White, who is a friend of the mayor; and ex-city treasurer Corey Kemp. Phones used by Shamsud-din Ali, a top Muslim cleric and friend of Mayor Street, also were bugged and his office videotaped, sources have said. And letters sent by federal authorities to parties whose conversations were overheard confirm that a phone assigned to John Christmas, an aide to the mayor, also was tapped. A federal judge in Philadelphia authorized both the tap on the cell phone used by Tyrrell and the bug in Street's executive office, Room 215 City Hall, last Sept. 18, according to federal prosecutors. The judge, who was not named, is overseeing the electronic surveillance aspects of the investigation. The bug in the mayor's office, characterized by prosecutors as a "Target Premises," was discovered in what has been described as a routine police security check 19 days later. In a letter sent by Markman earlier this month to those whose conversations were secretly intercepted in other places, the prosecutors confirmed that the bug in the mayor's office produced no evidence of wrongdoing. This official disclosure came as glad tidings to Street. "I can repeat what the mayor said very early on, which is that we have done nothing and he certainly wouldn't want anyone to think that this mayor has been involved in anything that might be investigated," said the mayor's spokeswoman, Barbara Grant. Conversations overheard on the White, Kemp and Tyrrell bugs were recorded as "relevant" and "material" to the investigation, a source said, meaning such chats could wind up as evidence at a trial or grand jury proceeding. So far, no one has been charged with any wrongdoing. The prosecution letter, dated Dec. 19, disclosed that White was the first to be bugged by the FBI. A federal judge authorized taps on White's office and home phones on Jan. 29, and later approved a bug in his law office. About every 30 days, agents got court approval to continue the electronic surveillance. The eavesdropping on White continued for about eight months, into mid-October, the prosecutors disclosed. In the past eight years, White's firm has made more than $1.6 million in city legal fees and an additional $920,000 for work on city bond issues, while funneling at least $183,500 in campaign contributions to Street, mostly from two political-action committees he controls. Also, the feds are looking into his reputed power to choose concessionaires at Philadelphia International Airport, where his wife has an ownership interest in several bars and lounges. White's lawyer, Creed C. Black Jr., yesterday declined to comment on the investigation. Authorization to tap then-city treasurer Kemp's office phone came in mid-June and continued for about two months with court permission. Kemp resigned last month. Kemp's attorney, Michael J. McGovern, declined to discuss the case. The prosecutor's letter did not mention the taps on Ali's phones. One source suggested that this might be because Ali is the subject of a separate but related investigation. A separate disclosure letter has been sent to those intercepted on Ali's phones. Federal law requires prosecutors to notify everyone who was intercepted on court-authorized electronic surveillance. The notification letters are called "inventories." Such letters disclose few facts, other than the date when the eavesdropping was authorized by a judge and whether or not conversations were recorded by agents for possible use as evidence. "These things are as general as possible," said one defense attorney, whose client received the Dec. 19 letter. The letters do not disclose the substance of conversations that were recorded. "The big unknown is, frankly, what is on" the tapes, said another defense attorney who is familiar with the disclosure letter. Staff writers Paul Davies, Erin Einhorn, Mark McDonald and Chris Brennan contributed to this report. © 2003 Philadelphia Daily News and wire service sources. All Rights Reserved. http://www.philly.com [Non-text portions of this message have been removed] 8120 From: Date: Thu Jan 1, 2004 4:48am Subject: Wiretap revealed on mobile phone of airport official Posted on Thu, Jan. 01, 2004 Wiretap revealed on mobile phone of airport official By Emilie Lounsberry and Joseph Tanfani Inquirer Staff Writers Two hidden FBI bugs. At least nine phone wiretaps. And there may be more. With the disclosure yesterday of yet another wiretap - this one on the phone of a top airport official - it has become clear that the continuing federal investigation of municipal corruption in Philadelphia has relied on perhaps the most widespread use of electronic surveillance in a local corruption inquiry since Abscam. Nearly three months since the investigation broke into public view with the discovery of an FBI bug in Mayor Street's City Hall office, white-collar legal experts say they are surprised at the number of taps and the duration of the surveillance, some of which dates to 2001. "It's very extraordinary," said Center City defense lawyer Nicholas J. Nastasi, who has represented clients in federal corruption investigations dating to the 1970s. "There's no case that compares to this even slightly." The most recently disclosed wiretap was on the mobile telephone of James Tyrrell, 48, the deputy director of aviation at Philadelphia International Airport, according to officials of the company that leases phone equipment to the airport. Tyrrell works daily with airport concessions, which have become a focus of the federal investigation. In October, federal authorities subpoenaed documents relating to airport-concession contracts involving attorney Ronald A. White. White's wife, Aruby Odom-White, is a part owner in two lucrative airport-concession operations, and two other White family members also received concession contracts. Tyrrell could not be reached for comment yesterday. The tap on Tyrrell's phone was approved by a federal judge on Sept. 18 - the same day a judge approved the placement of a bug in a "target premise" identified as the executive office of the mayor. On Oct. 7, city police found that bug hidden in the ceiling of Street's office. Since then, at least eight other telephone wiretaps have come to light, including several for phones connected to Imam Shamsud-din Ali, a longtime supporter of the mayor, and two for phones connected to White, a top Street fund-raiser. White's lawyer, Creed Black Jr., declined to comment yesterday on the electronic surveillance in the case. Ali's attorney, Tariq El-Shabazz, has not returned telephone calls. The inquiry has touched on many areas of city government as investigators seek to follow the money that drives the city's business - from the pension board to the Minority Business Enterprise Council to the Housing Authority and the airport. The investigation is expected to pick up steam in 2004 with more subpoenas, grand jury testimony, and efforts to persuade people to become witnesses for the government. No one has been charged, and authorities, citing strict grand jury secrecy rules, have refused to discuss the investigation. According to documents sent by federal prosecutors to people whose conversations were recorded, authorities received a federal judge's permission last January to place wiretaps on two of White's telephones, and by July, they were permitted to install a more invasive listening device - a "bug" - at his law office. Under the 1968 law authorizing electronic "bugging" surveillance, known as Title III, federal authorities must provide probable cause that evidence of a federal crime will be discussed, and that all other investigative options have been exhausted or that those options are too dangerous. The FBI had received court permission a year earlier to intercept Ali's phone conversations, and that surveillance went on for at least a year. Agents also were permitted to place a wiretap on the office phone of city Treasurer Corey Kemp, who resigned in November, and the cellular phone of Steven A. Vaughn, chief of staff of City Councilwoman Donna Reed Miller. "It's very unusual," said New Jersey lawyer Edwin H. Stier, a former federal and state prosecutor, who said he would not be surprised if the Philadelphia inquiry marked the most widespread use of electronic surveillance in a corruption investigation - ever. Unlike mob or drug cases, which frequently involve long-term use of electronic surveillance, Stier said that in a corruption inquiry, investigators are usually seeking more "fleeting" conversations. "People just don't sit around for eight hours a day for six months carrying on corruption conversations, in my experience. Now, it may have been different in Philadelphia... ." Stier said that under federal laws and practices, prosecutors are not permitted to embark on electronic fishing expeditions. "You've got to produce evidence that shows there's a very, very strong likelihood that conversations about a crime are going to take place," he said. Court orders generally allow 30 days of monitoring, and prosecutors must then reapply to the judge for permission to continue the surreptitious monitoring. A number of extensions were approved in the ongoing probe. "It's like a monster that feeds itself," said Nastasi, noting that prosecutors must continually show that more evidence is likely to be obtained. Electronic surveillance proved essential in the investigation of Roofers Union Local 30-30B, in which union leaders were captured on tape stuffing envelopes filled with cash as Christmas gifts for Philadelphia judges. The extensive use of electronic surveillance also marked the Abscam political-corruption investigation two decades ago. In the Abscam "sting" investigation, FBI agents, posing as representatives of a wealthy Arab sheik, paid bribes to officials, capturing the payments on hidden video cameras. That 1980 inquiry eventually resulted in convictions of 11 politicians. Contact staff writer Emilie Lounsberry at 215-854-4828 or elounsberry@p.... Contributing to this article were Inquirer staff writers Cynthia Burton, Mark Fazlollah and Craig R. McCoy. © 2004 Philadelphia Inquirer and wire service sources. All Rights Reserved. http://www.philly.com [Non-text portions of this message have been removed] 8121 From: James M. Atkinson Date: Thu Jan 1, 2004 11:36pm Subject: Resistance to CIA Coup Stiffens; Rumsfeld Says No New Troops Needed http://www.deadbrain.com/news/article_2004_01_01_4047.php Resistance to CIA Coup Stiffens; Rumsfeld Says No New Troops Needed Jan 1 2004 by Ross Bender Canadian resistance to last month's CIA-sponsored coup in Ottawa continues to grow, although US Secretary of Defense Donald "Napoleon" Rumsfeld insisted today that no additional US troops were needed. American troop levels in occupied Canada are estimated at only about 5,000, the bulk of them residual forces left over from the successful invasion of Canada in the War of 1812. Rumsfeld indicated that troop morale is high and promised that most units, some of whom have not seen their families in 200 years, would be rotated home "in the spring." Army officials reported only sporadic incidents, with about 900 attacks on US forces daily. "It's mostly disorganized and uncoordinated stuff -- these Canadian wimps don't really know how to fight," stated Lt. Colonel Weezer Ramsbottom of the 13th Infantry Division. Shortly after speaking to reporters, Ramsbottom was struck in the teeth by a high velocity hockey puck and taken to an Army hospital. Assessments of the strength of the Canadian resistance are sketchy at this point, due to its decentralized nature. Al Canuck, the largest of several guerilla organizations, may be headquartered somewhere in the Laurentian Mountains of Quebec. Its leader, Osama bin Leveque, uses no cell phones or radio communication devices, to avoid electronic surveillance. Messages are hand delivered and written only in French. On Wednesday, a donkey cart assembly plant and secret training barn operated by the Amish Druid Liberation Front in St. Jacobs, Ontario, was successfully raided by US-trained Ontario Provincial Police. In another spectacular success, three Newfie Jihad fishing boats full of mackerel and heroin were seized in the Bay of Fundy. In the Canadian Rockies, US Special Forces are hunting down renegade elements of the Royal Canadian Mounted Police believed to have driven herds of cattle infected with mad cow disease over the Alberta border into Montana. However, CIA analysts admit that their greatest concern is a large, shadowy fifth column of former Canadians now residing in the USA. "We're watching Peter Jennings very closely," said an unnamed source. "Next time he says 'eh' on national TV we're gonna nail his ass to his elbow." 8122 From: Date: Sat Jan 3, 2004 10:14am Subject: Three FBI agents on trying to prevent another 9/11 from the December 29, 2003 edition - http://www.csmonitor.com/2003/1229/p01s02-usfp.html Three FBI agents on trying to prevent another 9/11 By Faye Bowers | Staff writer of The Christian Science Monitor WASHINGTON - One of the country's top counterterrorism officials still remembers vividly the moment he lost it. It wasn't in the first few anxiety-fraught hours after the 9/11 attacks, while he and his colleagues focused incessantly on who was behind the heinous acts and whether more were in the works. It was when he finally made his way home, almost two days later, as the sun peeped over the horizon. Before falling into bed, he checked his e-mail. What popped up was a short line from a former co-worker that said simply: "IT'S NOT YOUR FAULT." Tears spilled down his cheeks. He still tears up recalling it today. The personal sense of responsibility for those attacks was - and remains - overwhelming. His response offers a rare look into the emotional world of the FBI's counterterrorism clique - a group of largely faceless bureaucrats charged with helping to protect the US in the most intense shadow war on terrorism the nation has ever known. It is a world that combines public policy and human burden to an unusual degree. While it is true that no one agency or group is entirely responsible for safeguarding a nation from attack, the 70 or so analysts who now make up the FBI's counterterrorism unit lie as close to the brainstem of the terror war as any. They are the ones, for instance, who recommended that the US raise the threat level from yellow (elevated) to orange (high) just before Christmas. They are the ones responsible for making the call to cancel the Air France flights from Paris to Los Angeles over the holidays because of safety concerns. They know that an overlooked piece of information here, or the failure to recommend some precautionary measure there, can result in thousands of deaths - as some now suggest happened in the case of the 9/11 attacks. "My biggest fear is that we will have another attack, and I will come in afterward and find something on my desk that I didn't look at," says one member of the unit. "That responsibility gnaws at you." Recently, three analysts representing different facets of the FBI's operations sat down to discuss their roles - their challenges, fears, successes, and failures. They requested anonymity because they are routinely sent on undercover assignments. The counterterrorism unit itself, of which only one of the three is a member, has grown from a small group of 18 analysts before 9/11 to 70 today, and the bureau intends to add 30 more. Yet for all the expanding cubicles and secret cables, the pressures of the job can be intensely personal and lonely: The agents can't discuss cases with anyone on the outside - including their spouses. Strong sense of mission From the interviews, it is clear that the job a ttracts people with a strong sense of mission and idealism. Agent No. 1, as we'll call him, came to the bureau about a year ago because of the 9/11 attacks. Young and hip, with slicked-back hair and a traditional dark suit, he had worked for six years as a legal aid attorney on the West Coast. But he never felt what he did made much of a difference. Now, he says, rarely a day goes by that he doesn't feel he's done "something worthwhile." The agent is responsible for assessing terror threats emanating from Europe. His job is to gauge the credibility of each tip and try to corroborate it. He's also always on the lookout for links between terror suspects in Europe and ones in the US. For instance, Agent No. 1 would have been scanning the manifests for the Air France flights from Paris to Los Angeles that were cancelled over Christmas. He would be trying to determine if anyone was on those flights who shouldn't be, or who was "suspicious," and whether they had connections to people here. As much as anything, he and his colleagues wrestle with finding that right balance between prudence and panic. They don't want to harangue the public about a possible attack, but they are steadfast in their determination to prevent another 9/11. The work is demanding. The agents put in long hours, wear pagers 24/7, and aren't able to discuss what they do with anyone outside their own clique. In addition, they are often sent on assignments on short notice. Agent No. 1, for example, recently felt a "buzz on his hip." When he checked in with headquarters, he was told to report to Baghdad within three days. His assignment: to determine if any of the terror groups attacking US soldiers and allies had connections with cells in the US. Agent No. 2, a small blonde who looks like a high school teacher, runs counterintelligence operations. In addition to trying to insert moles in other country's governments, she is responsible for ferreting out double agents. For example, she helped bust Robert Hanssen - one of the FBI's own who was arrested nearly three years ago for providing classified information, as well as the identities of American spies, to Russia for 15 years. It was "heartbreaking, heartwrenching," she says. "I was clearly distressed, but I couldn't discuss it with my husband and son." Agent No. 2 says you learn to lean on your colleagues, because they're the only ones you can speak to about cases. "I've done a complete 180," concurs Agent No. 1. "I could talk about what I did at legal aid freely, and nobody wanted to listen. Now, everybody wants to hear about what I do, and I can't talk." Agent No. 2 was also deeply affected by the 9/11 attacks. Besides the anxiety over the event itself, her assignment changed drastically. Some 80 percent of her department was reassigned to work on counterterrorism. "My entire program was closed down," she says. The bureau began to ramp up quickly. Agents No. 1 and No. 3 were brought in as a result of the new hiring campaign. Agent No. 3, a genial man in a pullover sweater and corduroys, works in the criminal division. He, too, joined the FBI because of 9/11. "I was on my way to the Pentagon when the plane struck," he says. "Seven from my former agency, including a close friend of mine, were killed.... I didn't make a difference as a military-capabilities analyst - that's the reason I am here. I wanted the challenge and to make a difference." Agent No. 3 is also an example of the FBI's closer coordination with other US agencies. He had worked at the Defense Intelligence Agency for 17 years. Before that, he worked in Air Force intelligence for seven years. Now he's helping cement links between the bureau, DIA, and other government agencies that work on counterterrorism. They do have their successes, their "eureka moments," as Agent No. 2 calls them. Some are known publicly, such as the successful spy prosecutions - the Hanssen and Aldrich Aimes (a CIA spy who went to work for the other side) cases, as well as the post-9/11 prosecutions of the terrorist cell members in Portland, Ore., and Lackawanna, N.Y. The perils of secrecy But most successes, they say, can't be discussed openly. That bothers the agents, especially given the level of public criticism they have received since 9/11. Few government agencies are now under such scrutiny. At least 16 congressional committees are asking the agents to look back, assess their mistakes, and fix them. In addition, the independent 9/11 commission will be holding additional hearings in January. Its leader, former New Jersey Gov. Thomas Kean, says he expects information presented at the hearings will show 9/11 could have been prevented. For these analysts, however, the "greatest" challenge is the caseload level. While working the 9/11 investigation, they were also probing the anthrax attacks, the shoebomber, the Danny Pearl case, and the winter Olympics in Salt Lake City. Moreover, there's been an explosion in the amount of information they need to monitor - from open sources, academics, jihadists on websites, and some 100,000 names on a watchlist. "It's difficult to read it all and winnow the chaff from the wheat," the section chief says. www.csmonitor.com | Copyright © 2003 The Christian Science Monitor. All rights reserved. [Non-text portions of this message have been removed] 8123 From: William Knowles Date: Sun Jan 4, 2004 4:42am Subject: Chinese caught trying to bug Israeli embassy http://216.26.163.62/2004/ea_china_01_04.html Special to World Tribune.com EAST-ASIA-INTEL.COM Sunday, January 4, 2004 A security officer in the Israeli Embassy in Beijing caught a group of Chinese technicians last month attempting to plant electronic eavesdropping devices in the embassy's telephone lines. The officer spotted the technicians near a telephone switch box on the street near the embassy, according to the Ma'ariv newspaper. The Chinese told the Israeli guard that they were from the Chinese Foreign Ministry information security department. The officer then asked the technicians to undo the work and leave. The Chinese are known to conduct aggressive electronic eavesdropping operations on all foreign facilities in China. This was not the first time the Chinese had tried to plant eavesdropping devices on telephone lines, which are used for encrypted communications as well as for open telephone calls. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ---------------------------------------------------------------- C4I.org - Computer Security, & Intelligence - http://www.c4i.org ================================================================ Help C4I.org with a donation: http://www.c4i.org/contribute.html *==============================================================* 8124 From: James M. Atkinson Date: Sun Jan 4, 2004 11:17am Subject: U.S. Flight To Mars Cancelled On "Specific Intelligence" http://theeschalot.com/us-cancels-flight-to-mars.html U.S. Flight To Mars Cancelled On "Specific Intelligence" WASHINGTON - NASA has been ordered to cancel its Spirit and Opportunity rover missions amid "specific intelligence" suggesting a terrorist attack is likely against the mission. "We have specific and credible intelligence suggesting that one or both of the rovers are considered targets by al-Qaida," said a spokesman for the Department of Homeland Security. "Since the threat is currently millions of miles away, we do not consider it sufficient cause to raise the National Terror Threat Level which remains at the High or Orange level." NASA officials were quick to object to the order. "This mission is going to run somewhere upwards of 600 million dollars. It would be cost prohibitive for al-Qaida to launch an attack against the rovers, and that's ignoring the technical impossibility of a group with no space experience launching an interplanetary mission," said NASA spokesman Jonathon Spears. "Even if they were able to launch an attack, the very worst they could do would be to destroy the rovers. The rovers may well be destroyed anyway. We know that, that's why we sent two. So why should the mission be aborted? It's just nuts." Tom Ridge, Secretary of Homeland Security, thinks NASA is missing the point. "In the first place, you don't have to be able fly a helicopter in order to shoot one down. So al-Qaida's lack of space experience in no way suggests they are incapable of launching an attack. Secondly, they have access to millions of dollars in drug money and other ill-gotten gain and they are very willing to spend their war chest on highly visible missions. We consider it to be much better for us to decide to abort this mission ourselves rather than give al-Qaida an opportunity to destroy it." NASA lawyers vow to get a stay on implementation of the order. Since the first rover, Spirit, is expected to touch down on the red planet within hours, the legal wrangling should allow time for at least one rover to complete its mission. 8125 From: Date: Sun Jan 4, 2004 6:54am Subject: Net phone calling is gaining traction Posted on Sun, Jan. 04, 2004 Net phone calling is gaining traction By Jon Van CHICAGO TRIBUNE To a growing number of computer users, a phone call is simply a verbal e-mail. But to traditional phone companies, it sounds more like a threat. The technology to make calls over the Internet has been available for several years. Sometimes known as Internet telephony--or Voice over Internet Protocol--it is poised to take off, and traditional phone companies and government regulators are turning up the scrutiny. Voice calls carried over computer networks can do things not possible on the networks operated by phone companies. Arranging a call-in conference among half a dozen people, for example, can be as easy as dragging the names of each person into a virtual conference room on a computer screen and pushing a button to connect everyone. Voice mail messages can be identified and ranked on the screen and even answered by e-mail. And video can be added by attaching a small camera to the mix and activating some software. While providing more features, VoIP technology usually costs less than traditional phone service because it rides on data networks and doesn't require the costly switches and other equipment necessary for a circuit-based voice network. Internet telephony also is free of the numerous regulations, fees and charges applied to regular phone calls. While traditional phone companies like SBC Communications Inc. and AT&T Corp. carry data on their networks, they make most of their money from voice traffic, said Paul Butcher, president of Mitel Networks, a company that provides integrated computer/phone systems. VoIP undermines that revenue stream, he said. "Phone companies would like to kill it, but they can't. It's like the music industry and Napster. Pirating music on the Internet is illegal, but even so the industry can't stop it," he said. "VoIP is legal, so it's even harder to stop." Several state utility boards have looked at imposing charges and fees on VoIP, and earlier this year regulators in Minnesota tried doing it. The move was blocked by a federal judge who cited federal laws that exempted Internet technology from fees and regulation. But it remains a gray area. Meanwhile, a survey released recently by CompTIA, an information technology trade association based in Oakbrook Terrace, Ill., found that about half of small- to medium-sized businesses are looking at buying integrated computer/phone systems when they replace current equipment in the next two years. Companies with multiple locations and a mobile work force are especially open to the new technology, said Edward Migut, a CompTIA executive. "It's a matter of evolution," said Migut. "Everything in information technology is moving toward the IP platform. The Internet is much more stable now than it was just a few years ago. Smaller businesses are getting more comfortable with it." Chicago attorney Thomas Stilp has embraced VoIP. Stilp, who has a law office, a real estate business and a manufacturing company, was looking to simplify his communication needs. The integrated computer/phone system he got from Mitel Networks, based in Ottawa, Ontario, enables Stilp to get calls from his 312-area phone number whether he's in his Chicago Loop office, his Evanston factory, or his North Shore home. It also gives him the same computer screen regardless of location. "I can work on a legal brief in my office, turn off the computer and go home," he said. "After dinner, I can go to my home computer and find the brief exactly as I left it at the office. People call my office phone number, and I pick up no matter where I am. "It's great because clients think I'm always working in my office." A more striking example of Internet telephony's versatility unfolded earlier this year in the Arctic Circle. Stephen Braham, of Vancouver, Canada's Simon Fraser University, was the chief field engineer on a NASA-supported project that tests equipment bound for Mars. This is done in a giant arctic crater that provides as close an approximation of Mars as can be found on Earth. In past arctic trips, Braham and his colleagues used a satellite phone to talk to the outside world, but at toll rates topping $1 a minute, it wasn't ideal for an academic program with limited funds. "Also, with a satellite phone, you have to be outside and stay in position to catch your signal," he said. This year, the researchers added Internet telephony to a high-speed broadband satellite Internet connection. "We got a dial tone that let us call anywhere," he said. "If we called others on our network, the call was free. Even if we dialed others outside our netwo rk, the calls were billed as if they originated from Southern Canada, which is way cheaper than sat-phone rates." For more mundane pursuits, VoIP is catching on as well. Mitel's Butcher said that at his firm VoIP units constituted 40 percent of his shipments in the last quarter. In the coming quarter, he expects they will comprise a majority of his sales. Legal and other issues, however, remain to be determined. One concern is how 911 emergency calls will be handled on VoIP, while another is the ability of police authorities to wiretap Internet conversations. Those sticking points, among others, assure that the Federal Communications Commission will revisit its hands-off approach to the technology. Still, the new technology won't really take off until major carriers use it to replace existing networks, said Blaik Kirby, a vice president with Adventis, a Boston consultancy. "Sprint has been an early-adopter in using VoIP in its local service networks," said Kirby, "and it's had fair success with it." Qwest Communications Inc., the dominant local carrier in the nation's Western states, said recently that it would introduce VoIP service in Minnesota. And in Illinois, while Verizon is looking to protect its traditional voice phone business, the firm is also promoting VoIP. Verizon supplies it to business customers in Chicago in competition with SBC. Dave Sherman, Verizon group marketing manager who oversees its Chicago Internet telephony business, said the firm is using Chicago and other markets to learn more about VoIP and how to market it. Because the new technology competes with traditional phone service, the company cannot ignore VoIP. "It is analogous to wireless service," Sherman said. "When wireless started, people said that it would take business away from the wireline network. Our company had to decide, 'Did we want to be in wireline or wireless?' "We decided we had to be in both." © 2004 Contra Costa Times and wire service sources. All Rights Reserved. http://www.contracostatimes.com [Non-text portions of this message have been removed] 8126 From: David Alexander Date: Mon Jan 5, 2004 4:48am Subject: FW: U.S. Flight To Mars Cancelled On "Specific Intelligence" I feel sorry for the poor b*stards sent as the 'Air Marshals' on those things, mind you, the overtime should be pretty good. David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent:04 January 2004 17:18 To:TSCM-L Subject:[TSCM-L] U.S. Flight To Mars Cancelled On "Specific Intelligence" http://theeschalot.com/us-cancels-flight-to-mars.html U.S. Flight To Mars Cancelled On "Specific Intelligence" WASHINGTON - NASA has been ordered to cancel its Spirit and Opportunity rover missions amid "specific intelligence" suggesting a terrorist attack is likely against the mission. "We have specific and credible intelligence suggesting that one or both of the rovers are considered targets by al-Qaida," said a spokesman for the Department of Homeland Security. "Since the threat is currently millions of miles away, we do not consider it sufficient cause to raise the National Terror Threat Level which remains at the High or Orange level." NASA officials were quick to object to the order. "This mission is going to run somewhere upwards of 600 million dollars. It would be cost prohibitive for al-Qaida to launch an attack against the rovers, and that's ignoring the technical impossibility of a group with no space experience launching an interplanetary mission," said NASA spokesman Jonathon Spears. "Even if they were able to launch an attack, the very worst they could do would be to destroy the rovers. The rovers may well be destroyed anyway. We know that, that's why we sent two. So why should the mission be aborted? It's just nuts." Tom Ridge, Secretary of Homeland Security, thinks NASA is missing the point. "In the first place, you don't have to be able fly a helicopter in order to shoot one down. So al-Qaida's lack of space experience in no way suggests they are incapable of launching an attack. Secondly, they have access to millions of dollars in drug money and other ill-gotten gain and they are very willing to spend their war chest on highly visible missions. We consider it to be much better for us to decide to abort this mission ourselves rather than give al-Qaida an opportunity to destroy it." NASA lawyers vow to get a stay on implementation of the order. Since the first rover, Spirit, is expected to touch down on the red planet within hours, the legal wrangling should allow time for at least one rover to complete its mission. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ 8127 From: Mitch D Date: Mon Jan 5, 2004 11:33am Subject: Gen Hawleys politically incorrect mssg Forwarded from a friend,accuracy subject to verification,enjoy: General Hawley's Politically Incorrect Message This Air Force General should have been a Marine. What a magnificent and insightful view of what this war on terrorism is actually about. Please read and pass on as you see fit. General Hawley, is a newly retired USAF 4 star general. He commanded the Air Combat Command [our front-line fighters and bombers] at Langley AFB, VA. He is now retired and no longer required to be politically correct. A true patriot! "Since the attack [9-11], I have seen, heard, and read thoughts of such surpassing stupidity that they must be addressed. You've heard them too. Here they are: 1) "We're not good, they're not evil, everything is relative." Listen carefully: We're good, they're evil, nothing is relative. Say it with me now and free yourselves. You see, folks, saying "We're good" doesn't mean, "We're perfect." Okay? The only perfect being is the bearded guy on the ceiling of the Sistine Chapel. The plain fact is that our country has, with all our mistakes and blunders, always been and always will be the greatest beacon of freedom, charity, opportunity, and affection in history. If you need proof, open all the borders on Earth and see what happens. 2) "Violence only leads to more violence." This one is so stupid you usually have to be the president of an Ivy League university to say it. Here's the truth, which you know in your heads and hearts already: Ineffective, unfocused violence leads to more violence. Limp, panicky, half measures lead to more violence. However, complete, fully thought through, professional, well executed violence never leads to more violence because, you see, afterwards, the other guys are all dead. That's right, dead. Not "on trial," not "reeducated," not "nurtured back into the bosom of love." Dead. 3) "The CIA and the rest of our intelligence community have failed us." For 25 years we have chained our spies like dogs to a stake in the ground, and now that the house has been robbed, we yell at them for not protecting us. Starting in the late seventies, under Carter appointee Stansfield Turner, the giant brains who get these giant ideas decided that the best way to gather international intelligence was to use spy satellites. "After all, (they reasoned,) you can see a license plate from 200 miles away." This is very helpful if you've been attacked by a license plate. Unfortunately, we were attacked by humans. Finding humans is not possible with satellites. You have to use other humans. When we bought all our satellites, we fired all our humans, and here's the really stupid part. It takes years, decades to infiltrate new humans into the worst places of the world. You can't just have a guy who looks like Gary Busey in a Spring Break '93 sweatshirt plop himself down in a coffee shop in Kabul and say "Hiya, boys. Gee, I sure would like to meet that bin Laden fella. "Well, you can, but all you'd be doing is giving the bad guys a story they'll be telling for years. 4) "These people are poor and helpless, and that's why they're angry at us." Uh-huh, and Jeffrey Dahmer's frozen head collection was just a desperate cry for help. The terrorists and their backers are richer than Elton John and, ironically, a good deal less annoying. The poor helpless people, you see, are the villagers they tortured and murdered to stay in power. Mohammed Atta, one of the evil scumbags who steered those planes into the killing grounds is the son of a Cairo surgeon. But you knew this, too. In the sixties and seventies, all the pinheads marching against the war were upper-middle-class college kids who grabbed any cause they could think of to get out of their final papers and spend more time drinking.. It's the same today. 5) "Any profiling is racial profiling." Who's killing us here, the Norwegians? Just days after the attack, the New York Times had an article saying dozens of extended members of the gazillionaire bin Laden family living in America were afraid of reprisals and left in a huff, never to return to studying at Harvard and using too much Drakkar. I'm crushed. Please come back. Let's all stop singing "We Are the World" for a minute and think practically. I don't want to be sitting on the floor in the back of a plane four seconds away from hitting Mt.Rushmore and turn, grinning, to the guy next to me to say, "Well, at least we didn't offend them." SO HERE'S what I resolve for the New Year: Never to forget our murdered brothers and sisters. Never to let the relativists get away with their immoral thinking. After all, no matter what your daughter's political science professor says, we didn't start this. Have you seen that bumper sticker that says, "No More Hiroshimas"? I wish I had one that says, "No More Pearl Harbors." THIS NEEDS TO STAY IN CIRCULATION FOR THOSE WHO HAVE OR WILL FALL FOR THE STUPIDITY GOING AROUND. PLEASE PASS IT ON __________________________________ Do you Yahoo!? Find out what made the Top Yahoo! Searches of 2003 http://search.yahoo.com/top2003 8128 From: Date: Mon Jan 5, 2004 5:54pm Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 8129 From: Date: Mon Jan 5, 2004 5:54pm Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 8130 From: David Alexander Date: Tue Jan 6, 2004 6:20am Subject: Re: General Hawley speech The following text is from www.snopes.com and is the truth about the 'General Hawley' speech; Yes, Gen. Richard E. Hawley is a real person, a United States Air Force general who served as commander of the USAF's Air Combat Command until his retirement in 1999, but no, he didn't write or deliver the speech quoted above. This "speech" is actually a column by humorist Larry Miller which appeared in The Daily Standard on 14 January 2002; the version circulating on the Internet omits the opening and closing paragraphs. David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 8131 From: David Alexander Date: Thu Jan 1, 2004 1:49am Subject: Re: CIA Science and Technology Directorate Museum Opens At 05:34 01/01/2004, you wrote: > Date: Tue, 30 Dec 2003 01:39:49 -0500 > From: Steven Donnell WA1YKL >Subject: Re: CIA Science and Technology Directorate Museum Opens > > > >MACCFound@a... wrote: > > > CIA Gadget Museum Includes Robot Fish, Pigeon Camera > > > > Associated Press > > > > McLEAN, Va. -- When the CIA's secret gadget-makers invented a listening > > device for the Asian jungles, they disguised it so the enemy wouldn't be > > tempted to pick it up and examine it: The device looked like tiger > droppings. > > > > The guise worked. Who would touch such a thing? The fist-sized, brown > > transmitter detected troop movements along the trails during fighting in > > Vietnam, a quiet success for a little-known group of researchers inside the > > world's premier intelligence agency. > >Hi, CIA secret huh?? Back around 1975 as young tinkerer and budding Ham >I >remember picking up a few of these from a local electronics surplus >store(John >Meshna's old place, JMA). Anyways, some were brown, some were black. >They had a >nipple on one end that when you pulled it off, removed a small pin that >"armed" >the tx. I set one in a jar of gasoline for a cple days which permited >its tough >rubber skin to be easily pealed off. The first layer underneath revealed >a tin >foil antenna. To get in further required some more digging, but I guess >thats >where I get my love of reverse engineering things,,. The tx was a simple >L/C >tuned deal that operated near the FM Brdcast band. The batteries were 3 >or 4 >mercury button cells(dead). The motion sensor was this tiny brass >cylinder(HG >sw?) about the size of a pencil eraser, which cw keyed the tx. With the >sensor >bypassed, the tx would emit a continuous carrier. I dont recall if I >ever botherd >to try and FM modulate the thing. A few yrs later I remember reading >some >additional info about how this whole system worked. There was even a >picture of >the "repeater/up link tx" that was made to look like a small palm tree. >Come to >think of it, I seem to recall seeing this on display at the AF museum at >Wright >Patterson. I gather that these "Poo Txs" were dropped by the hundreds >along the >Ho Chi Min trail. >Steve I remember a bit about this from back in my RAF days. I actually did a bit of research on their use - not into how the sensors worked, but what they were used for. The 'poo' and 'palm trees' were dropped as part of Operation igloo white, which was designed to interdict supply traffic down the HCM trail. When I trained as a pilot one of my instructors was a USAF major on an exchange tour who had flown the ELINT DC3s that stooged around listening to the sensors and vectoring the C130 Gunships to the right places. The C130s had a detector that could, at short ranges, pick up the RF generated by a vehicle's electrics and then take them out. David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB mobile 07836 332576 http://www.dbiconsulting.co.uk 8132 From: Brian Varine Date: Thu Jan 1, 2004 7:17am Subject: Re: Portable MP3 Players There is a way to lock out the USB ports on 2000/2003/XP. We did this at my last company and DoD does it as well. I'm not sure which setting you need to tweak but it can be done. I can look it up if someone is really interested. One other interesting feature is that every device that gets connected to the machine leaves a registry entry. When performing a forensic analysis you can see what they've attached. Unfortunately it doesn't tell you what they've transferred. Brian 8133 From: Brian Varine Date: Thu Jan 1, 2004 3:34pm Subject: Disabling USB Storage Devices In Windows XP Below is a link to Microsoft's support site that details how to disable the use of USB storage devices in XP. http://support.microsoft.com/default.aspx?scid=kb;en-us;823732 From: James M. Atkinson, Comm-Eng Date: Wed Dec 27, 2000 1:43pm Subject: How Much is the Monkey in the Window [Humour] A tourist visiting Los Angeles walked into a pet shop and was looking at the animals on display. While he was there, a Sgt. from LAPD walked in and said to the shopkeeper, "I'll take a Patrol monkey, please." The shopkeeper nodded, went over to a cage at the side of the shop and took out a monkey.He fit it with a collar and leash, handed it to the customer, saying, "That'll be $1,000." The Sgt. paid and walked out with his monkey. Startled, the tourist went over to the shopkeeper and said, "That was a very expensive monkey. Most of them are only a few hundred dollars. Why did it cost so much?" The shopkeeper answered, "Ah, that monkey can fire Expert with all small arms, write 20 tickets a month, and is certified in Small Unit Tactics -- well worth the money! The tourist looked at the monkey in another cage. "That one's even more expensive! $10,000! What does it do?" "Oh, that one's a POST Certified Deputy Sheriff Patrol monkey; it can instruct other monkeys in Basic Firearms Skills, Counter Terrorism Training, Physical Training, Small Unit Tactics and investigative techniques, and even type. All the really useful stuff," said the shopkeeper. The tourist looked around for a little longer and saw a third monkey in a cage of its own. The price tag around its neck read $50,000. He gasped to the shopkeeper, "That one costs more than all the others put together! What on earth does it do?" The shopkeeper replied, "Well, I haven't actually seen it do anything, but it says it's an FBI agent." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2193 From: Miguel Puchol Date: Wed Dec 27, 2000 4:58pm Subject: RE: Famous Last Words Somw others: -- Iceberg? What iceberg? -- Noise? What noise? (note: applies to MANY situations) -- Whaddaya mean number two sounds rough? Gear up!! -- Quit sweating those fuel gauges!! We've got a couple hundred gallons when they show "empty"!! > -----Mensaje original----- > De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] > Enviado el: miercoles, 27 de diciembre de 2000 20:25 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] Famous Last Words > > > > Famous Last Words: > 2194 From: A Grudko Date: Wed Dec 27, 2000 0:13pm Subject: Bumper Beepers Quote > The regular TSCM equipment is set up near the vehicle being inspected > and a allowed to run in automatic mode while the initial physical > inspection is performed.However, nothing is connected to the > vehicle, nor the vehicle cabin, truck, or hood entered until the > external physical is complete. Also take the vehicle for a 'test drive'. Even simple devices can be motion operated (a mercury switch laching in a 20 minute timed relay.....?). GPS/GSM linked tracking systems (usually built in systems) only send occasional (thirty minutes are enough) micro second bursts when stationary, and then 'condition change' milli-second bursts once moving. To be safe a minimum of 500 metres vehicle travel should be initiated with the TSCM equipment on board. Bare in mind that the thansmission will be i the busy GSM cellphone band so there will be loads of clutter. Filters and attenuators help, but maybe, as James suggests, we go back to basics. If the vehicle is a BMW, get a tame BMW mechanic to do a physical for anything that shouldn't be there. One of our BBs has a sticker on that says something like 'Static drain resistor tuned for this vehicle only - do not remove'. It's been through numerous unscheduled workshop visits, but then the hechanic was not looking for anything non-standard. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" On one of my o,H m> 2195 From: A Grudko Date: Wed Dec 27, 2000 1:01pm Subject: Re: Vehicle Sweeps Quote > When your checking the trunk, tail lights, rear panels, speaker > panels and so on it is also important to account for every simple > wire that leaves the passenger cabin as eavesdropper tend to prefer > to stay away from the engine area for quick plants. Auto wiring looms ALWAYS have extra wires for accessories and add-ons, conveniently colour coded. So that missing spot-light switch on the client's entry level VW Golf dash provides a perfect opportunity to wire a mike to the rear of the car where the spy can hook up a UHF transmitter with the VP antenna epoxied (to cosmetically match the corrosion proofing coating) inside the plastic bumper. Workshop situation installation time, nominal - 20 minutes added onto the client's normal service. PS When doing a static sweep of a vehicle have every possible circuit 'on' - all lights, sound, wipers - even activate the central locking, 'cos all you need is a momentary 12v pulse on a cheap timer (555?) chip or a zener diode to activate that well hidden bug for x minutes/hours. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2196 From: Date: Thu Dec 28, 2000 5:48am Subject: Stuff For Sale Greetings A number of people have expressed interest in the things I have to sell as posted here and is on my site, www.fusionsites.com Link is on the opening screen. If you are serious, please advise ASAP. I want to dispose of this stuff before the end of the year: As of then I am unsubscribing from this group. You can contact me direct at mls@f... M L Shannon 2197 From: A Grudko Date: Thu Dec 28, 2000 4:07am Subject: Re: Famous Last Words ----- Original Message ----- From: James M. Atkinson, Comm-Eng > -- Hey ya'll watch this. (Humour) In substantiation of our moderator's boundless knowledge, the above was no doubt a reference to the recent 6 month vehicle accident study in South Africa where every new car was fitted with a Cabin Voice Recorder'. It was discovered that the most common last words of deceased drivers were; 'Oh shit!' 63 % and 'Hey, watch this.' 27% Happy bug hunting in 2001 Andy Grudko Johannesburg 2198 From: Robert G. Ferrell Date: Thu Dec 28, 2000 9:18am Subject: Re: Famous Last Words The phrase we encounter most often here in Texas is "Hey Bubba, hold my beer for a second..." ;-) RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2199 From: Shawn Hughes Date: Thu Dec 28, 2000 5:37am Subject: bugged money PARIS, Dec 27 (Reuters) - French police said on Wednesday they had arrested six men in connection with this week's raid on two armoured vans in which thieves used explosives to get away with 30 million francs ($4.25 million). The dawn arrests in two southern Paris suburbs also netted all or part of the loot as well as about 50 weapons including assault rifles, sub-machine guns and a rocket launcher. Police did not say how they tracked down the suspects so quickly-some 16 hours after the raid in Paris-but the managing director of the armoured car van involved told French television his firm "had the means" to track down the cash in its care. Jean-Michel Houry, managing director of Brinks France, strongly hinted to France-2 television that the arrests had resulted from the use of unspecified technical aids. "Brinks has the means to trace vehicles but also to track funds," said Houry who declined to go into details about possible electronic "bugs" which might have been planted among wads of banknotes taken by the gangsters. The suspects are thought to be part of a dozen-strong gang who launched the attack in broad daylight on Tuesday on two armoured vans travelling together just 100 metres (yards) from the main Paris ring-road. Brinks said the gangsters drove a large van across the road as the vans approached, forcing one to stop, while another vehicle drove up behind. One van escaped the ambush but the other was forced to halt and its side was blasted open by a powerful explosive device attached from the outside. Three guards, separated from the cargo hold by heavy armour plate, were slightly hurt. 2200 From: Steve Uhrig Date: Thu Dec 28, 2000 2:57pm Subject: Christmas special on receiver package Hello list, The below is a repeat of an earlier message but with a special offer. Anyone purchasing this item will receive a free wideband discone antenna, the new extended frequency coverage model (25 megs to 2 gigs). Normally sells for $125. I happened across an interesting item recently, purchased from an overseas listening post. The unit is a very wideband receiving system, from 100 kc to 2036 megacycles. It receives narrow FM, wide FM, AM, CW and SSB. It consists of a compact desktop console containing an ICOM R100 receiver, 110 VAC power supply, Active Antenna/Preselector from 0-100 megacycles, and adjustable BFO for CW/SSB tuning. It can be powered by 110 VAC or 12 VDC. The entire thing is an integrated system. Make one connection to power, connections to antennas, and use it to tune anything from low frequency to AM, FM and television broadcast audio, to cellular, virtually all amateur frequencies, shortwave broadcast, military, all public safety including 800 megacycles, practically any possible surveillance frequency to low microwave. The receiver scans, has memories, and timers to turn it on and off at preset times. The Active Antenna and Preselector is a tunable antenna and amplifier section. This lets you use a small antenna and tune it for resonance at various frequencies. It provides incredible sensitivity. The Preselector removes unwanted frequencies before they even get into the receiver, allowing for a high gain preamp without overloading or generating images. It is sitting here on my desk with a clip lead for an antenna, listening to Radio Moscow strong and clear. There also is a decent front facing speaker for loud clear audio. This could have application as a surveillance listening post, TSCM receiver or general monitoring receiver for your bench, vehicle or desktop. If nothing else, it incorporates an ICOM R100 full coverage receiver (including the cellular frequencies which are restricted in all consumer equipment). Nearly worth it for that alone. The system is in nice condition. While it is relatively easy to operate, the user should have some communications expertise to get the maximum utility from this piece. Price for the package is $850 which includes the free antenna worth $125. I do take credit cards. Email me to purchase it and you could have it next week. Also have *full coverage* plain R100s and R8500s available. Inquire. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2201 From: James M. Atkinson, Comm-Eng Date: Thu Dec 28, 2000 7:35pm Subject: Reply to options Based on some very wise counsel I have just changed the lists "reply to:" option so that if you respond to a posting you will only be sending your response back to the original author of the message and not bouncing your response to the entire list. Please keep in mind that if you want to address the entire list you will actually have to direct a posting to the list itself. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2202 From: James M. Atkinson, Comm-Eng Date: Thu Dec 28, 2000 10:00pm Subject: Spies eye Canada's high-tech secrets Spies eye Canada's high-tech secrets http://www.globeandmail.ca/gam/National/20001228/USPYSN.html Covert networks, front companies used to throw off police, intelligence agencies ANDREW MITROVICA Thursday, December 28, 2000 Using front companies, crooked shipping agents, and visiting scientists and students, foreign spies have set up covert networks in Canada to obtain technology and materials illegally to produce weapons of mass destruction, secret government documents claim. "Countries [suspected of amassing weapons] have created more elaborate and deceptive methods of acquiring and developing [weapons of mass destruction], including the development of complex and often illicit international trade networks," newly released briefing notes say. This was to circumvent national and international export controls, state the notes, prepared for top-level officials at Canada's spy agency, the Canadian Security Intelligence Service. "Attempts have been made in Canada to acquire restricted technologies and material through the use of such networks and front companies." Agents working for foreign governments have "established clandestine procurement networks," which often employ bogus companies and "deceptive shipping practices" in Canada to acquire technology and parts that can be used to make chemical and biological weapons, a memo July 11, 1997, to CSIS director Ward Elcock adds. The spy agency routinely prepares reports on what it considers threats to Canada's national security. It is unclear from the documents whether any attempts to obtain either technology or weapons materials were successful. In the three-page briefing note, marked secret, an official with the agency's counterproliferation unit said Canada's aerospace, chemical, biological and information-technology industries are being targeted by foreign espionage agencies as a source of expertise and technology that may be used to manufacture chemical and biological weapons relatively cheaply. The senior CSIS officer who prepared the note said foreign students and scientists working and studying in Canada are recruited by hostile intelligence agencies to assist in covert attempts to secure so-called dual-use chemical and biological agents: substances commonly used for civilian purposes that can also be key ingredients in weapons. "The presence of foreign students and scientists from countries [suspected of amassing weapons] at our academic institutions, research organizations, international conferences and high-technology companies will remain an efficient means of acquiring technical expertise in fields of dual-use applicability," the unidentified director-general of the counterproliferation unit informed Mr. Elcock. Another CSIS briefing note, also marked secret, suggested foreign espionage agencies "use graduate students and visiting scientists to obtain restricted dual-use expertise from Canada. . . . Foreign nationals can acquire that expertise through academic study or technical exchange." That note, dated March 14, 1996, suggests unscrupulous brokers and agents in Canada are recruited and bribed by foreign spies -- or what CSIS called "non-traditional collectors" -- to engineer the covert shipment overseas of technology and material for possible use in weapons of mass destruction. (Last year, CSIS made public a highly edited report that suggested foreign governments have attempted to purchase technology for weapons use. However, the sanitized report provided little of the detail contained in the briefing notes, which were obtained by researcher Ken Rubin for The Globe and Mail through the Access to Information Act.) The 1997 note to Mr. Elcock also pointed out that while CSIS "strives to detect, monitor . . . and assist in the deterrence of clandestine procurement activities conducted on Canadian territory, or against Canadian interests," the agency often has to "rely on other government agencies . . . to develop effective means whereby clandestine procurement activities in Canada can be terminated or at least dissuaded." Indeed, in 1993, Canada Customs launched a secret study called Project Trident to track the shipment of chemical and biological material from Canada. It found that from 1980 to 1990, there were at least 61 attempts to procure substances that could be used to kill millions of people quickly. For example, in the 1980s, Dr. Bruno Schiefer, a toxicologist in Saskatoon, was approached by an Iranian who claimed to be a researcher. The man asked for a fungus that produces a powerful toxin, but Dr. Schiefer turned him down because he was suspicious of the request. Project Trident also found that more than two dozen companies in Southern Ontario have been approached by people suspected of being foreign agents seeking raw materials for weapons of mass destruction. The briefing notes suggest that CSIS is concentrating its efforts on thwarting the illicit trade by determining who the ultimate users of sensitive material and technology will be, long before the material leaves Canada. "At present, our investigations strive to accumulate sufficient intelligence to demonstrate to the export-control community that a given shipment is ultimately destined for a weapons of mass destruction project, thus enabling preventative action to be taken," they say. CSIS noted that its interdiction efforts are hampered because few rules exist governing the transfer of expertise, or what the spy service described as "intangible technology." Spokesmen for CSIS did not return calls requesting an interview. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2203 From: James M. Atkinson, Comm-Eng Date: Thu Dec 28, 2000 10:01pm Subject: Workplace Surveillance Is the Top Privacy Story of 2000 Workplace Surveillance Is the Top Privacy Story of 2000 http://news.excite.com/news/pr/001228/co-privacy-foundation Privacy Foundation's 'Top 10 List' Also Cites Medical Privacy, Carnivore and DoubleClick Updated 4:32 PM ET December 28, 2000 DENVER, Dec. 28 /PRNewswire/ -- The phenomenal rise, and technological sophistication, of workplace surveillance leads the list of the Top 10 privacy stories of the year 2000, according to a Privacy Foundation analysis released on Thursday. "The rise of the Internet has sent a flood tide of privacy concerns through business and society, and the waves are breaking big-time in the workplace," said Stephen Keating, executive director of the Privacy Foundation. Monitoring employee email, scrutiny of Web surfing behavior, and even review of voice-mail messages are now standard practices at a growing number of companies. Some of the fallout from that surveillance can be measured in jobs lost, as entities ranging from Dow Chemical to the Central Intelligence Agency have fired or disciplined employees for alleged misuse of workplace communication networks. "Employees are toast," one chief privacy officer told the Privacy Foundation, noting that employers have substantial economic, legal -- and now, technical -- clout over employees in this area. Looking ahead, the Privacy Foundation expects that some companies, particularly those in need of highly skilled, high tech workers, will tout "spy-free workplaces" as a fringe benefit. The Privacy Foundation has deployed a team of business, law and technical researchers to study workplace surveillance issues and will have more to report in the first quarter of 2001. Rounding out the list of Top 10 Privacy Stories of 2000 are: Patient Privacy Rules; Carnivore Attacked; DoubleClick Unplugged; Rise of the CPO; Amazon.com Surveys the Data Mine; The Urge to Merge Financial Information; Wireless Privacy Battles Loom; Microsoft Crumbles on Cookie-Blocking; and A New Kind of Public Record. The entire list, with descriptions, news links, and forecasts for next year, is available online at http://www.privacyfoundation.org. Headquartered at the University of Denver, the Privacy Foundation is a non-profit and non-partisan organization dedicated to research on privacy issues and efforts to educate the public. For more information, contact Stephen Keating, executive director, by email at sk@p... or by phone at 303-717-2607; or Richard Smith, chief technology officer, by email at rms@p... or by phone at 617-962-8351. Contact: Stephen Keating, executive director, 303-717-2607, sk@p..., or Richard Smith, chief technology officer, 617-962-8351, rms@p..., both of Privacy Foundation -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2204 From: James M. Atkinson, Comm-Eng Date: Thu Dec 28, 2000 10:03pm Subject: Top 10 Unintended Consequences of the Iraqi Military's PlayStation 2 Strategy Top 10 Unintended Consequences of the Iraqi Military's PlayStation 2 Strategy If you didn't get a Sony PlayStation 2 as a gift last week, maybe you should blame Saddam Hussein. According to a U.S. customs official, Iraqi groups purchased 1,400 PS2s from Detroit toy shops in order to ship them to Iraq's armed forces ( http://one.digital.cnet.com/cgi-bin1/flo?y=eBSZ0EFe40k0eAVO ). Reportedly, the PS2's powerful chips could be put to military use, but according to a Sony representative, "If somebody buys and uses PlayStations for military purposes, it is something we cannot control." What will happen once all those PS2s arrive in Baghdad? Here are a few possibilities: 1. Parts and Labor: Iraqi government at standstill while federal employees redeployed to fill out warranty cards. 2. Fitting In: PlayStation 2 now available in camouflage colors. 3. Hollywood Calls: Saddam Hussein offered the title role in next year's highly anticipated sequel, "How the Grinch Stole Detroit's Christmas." 4. Keeping Up With the Joneses: Kuwait stockpiles thousands of Atari 2600s, declares formation of elite SuperPong battalion. 5. Form Follows Function: All Iraqi tanks redesigned to include reset button. 6. Cheat Code: Pressing Triangle plus Square while pressing the Down arrow on the PS2 console annihilates Desert Shield with a roundhouse kick. 7. Fashion Sense: Iraqi armed forces required to dress like fighters in Tekken Tag Tournament. 8. Entertainment Aloft: Iraqi jets now include in-flight DVD movies. 9. Sign Me Up: Kids who didn't get a PS2 start enlisting in the Iraqi military, hoping to score a spare unit. 10. New Game: SCUD Missile Command. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2205 From: James M. Atkinson, Comm-Eng Date: Thu Dec 28, 2000 10:09pm Subject: The burglar was creeping noiselessly through the darkened home [humor] [I apologize in advance if any list member finds this offensive, or are annoyed in any way.] -jma ------------------------------------------------------------------ JESUS IS WATCHING YOU The burglar was creeping noiselessly through the darkened home, filling his bag with various valuables. As he reached his hand out to a box of jewelry, he heard a voice say, "Jesus is watching you." Shaken, the burglar stopped. For a full minute he didn't dare breathe. Finally, he switched on his flashlight and carefully played it around the room, but saw nothing. Convinced that it must have been his imagination, he turned off the flashlight and continued in his quest for another man's wealth. He was busily unhooking a stereo set when he again heard, "Jesus is watching you," This time he nearly jumped out of his skin, he was so freaked out. Beads of sweat popped out on his face, and as he switched the light on again, the beam shook violently from his terror. He looked about the room, and noticed a bird cage in the corner. Upon closer inspection, he discovered a parrot in the cage. "Are you the one that spoke to me just now?" asked the burglar. "Yes, I am," said the parrot. "Why did you say 'Jesus is watching you?'" asked the man. "Because I felt like you needed to be warned," replied the parrot. By this time, the man was over his fright and was more than a little irritated at this smart-mouthed parrot that had tried to scare the living daylights out of him. "What's your name?" asked the burglar. "Moses," the parrot said. "Ha," the man said, guffawing. "What kind of people would name their parrot Moses?" "The same kind of people that would name their Rottweiler, Jesus." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2206 From: Steve Uhrig Date: Thu Dec 28, 2000 10:25pm Subject: Re: Workplace Surveillance Is the Top Privacy Story of 2000 Once upon a midnight dreary, James M. Atkinson, Comm-Eng pondered, weak and weary: > DENVER, Dec. 28 /PRNewswire/ -- The phenomenal rise, and > technological sophistication, of workplace surveillance leads > the list of the Top 10 privacy stories of the year 2000, > according to a Privacy Foundation analysis released on > Thursday. What would you expect? Privacy stories on the list of concerns of the Privacy Foundation? What a unique concept! Without playing Chicken Little the sky is falling, places and people like this would have no reason for being, no audience, and would have to get a real job. I would be surprised if the "Privacy Foundation" was even as much as a full time job for the one individual named in the article. I have debated these types on television, and their organizations exist largely in their own minds, which in many cases would benefit from some small measure of Thorazine. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2207 From: A Grudko Date: Fri Dec 29, 2000 3:43am Subject: Re: Reply to options ----- Original Message ----- From: James M. Atkinson, Comm-Eng > Based on some very wise counsel I have just changed the lists "reply > to:" option Good move jma. I think I send more direct replies than replies to the list. This change saves me having to delete/copy/paste the sender's address - if it's shown and you don't have to hunt it out of the headers (ref. my comment 2 weeks ago) Andy Grudko Johannesburg 2208 From: James M. Atkinson, Comm-Eng Date: Fri Dec 29, 2000 7:56am Subject: Three contractors Good Morning Folks, Three contractors were visiting a tourist attraction on the same day. One was from New York, another from Texas, and the third from Florida. At the end of the tour, the guard asked them what they did for a living. When they all replied that they were contractors, the guard said, "Hey, we need one of the rear fences redone. Why don't you guys take a look at it and give me a bid?" So, to the back fence they all went to check it out. First to step up was the Florida contractor. He took out his tape measure and pencil, did some measuring and said, "Well I figure the job will run about $900. $400 for materials, $400 for my crew, and $100 profit for me." Next was the Texas contractor. He also took out his tape measure and pencil, did some quick figuring and said, "Looks like I can do this job for $700. $300 for materials, $300 for my crew, and $100 profit for me." Without so much as moving, the New York contractor said, "$2,700." The guard, incredulous, looked at him and said, "You didn't even measure like the other guys! How did you come up with such a high figure?" "Easy," he said. "$1,000 for me, $1,000 for you and we hire the guy from Texas." -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2209 From: Robert G. Ferrell Date: Fri Dec 29, 2000 10:57am Subject: Re: How Much is the Monkey in the Window [Humour] >The tourist looked around for a little longer and saw a third monkey in a cage >of its own. The price tag around its neck read $50,000. He gasped to the >shopkeeper, "That one costs more than all the others put together! >What on earth does it do?" > >The shopkeeper replied, "Well, I haven't actually seen it do anything, >but it says it's an FBI agent." It's not allowed to do anything unless the damage exceeds $10,000. ;-) RGF Robert G. Ferrell, CISSP ======================================== Who goeth without humor goeth unarmed. ======================================== 2210 From: Hoffman Date: Fri Dec 29, 2000 0:29pm Subject: Re: Re: Workplace Surveillance Is the Top Privacy Story of 2000 > Without playing Chicken Little the sky is falling, places and > people like this would have no reason for being, no audience, > and would have to get a real job. ------------------------- Hoffman replies: As long as we're in a sarcastic mood today... I feel I'm entitled to be sarcastic also... Normally, I keep my libertarian mouth shut, but I'll slip this one time. Yes, I could not agree more about those "chicken little, the sky is falling types." For instance, everytime I hear the little boy who cried wolf; Barry McCaffrey, talk about this imaginary "drug problem" which does not really exist... I can't help but think to myself, that such people need a good dose of medication to make them realize that the "problem" they perceive are merely a figment of their own imagination. As for such deluded people "getting a real job..." I couldn't agree with you more. Yes, nothing would please me more than to see the whole lot of freeloading DEA agents, out of work, and seeking new employment.... and to think that MY taxpaying dollars are funding these freeloaders.... perpetuating this "war on drugs" for the sole reason that if people ever came to their senses... they'd be out of a job. The only thing that repulses me more is the fact that these loonies (ONDCP) were actually funded enormous amounts of money by Congress; which they in turn give to a private organization; The Partnership for a Drug Free America (an organization run by Pharmaceutical companies.... gee... nothing corrupt going on there, huh..)... and now I have to see these stupid "Kids, dont take drugs" ads on TV everynight, and realize that I'm paying for it. We all are.. Speaking of organizations run by lunatics.. getting back to Partnership for a Drug Free America.... yes, I wonder how MY "organization" can get tens of millions of free taxpayer money which I can then embezzle. I think the GAO should seriously look into this matter and do some accounting of where this money is going. My guess is that these Drug-Free America commercials are somewhat akin to the $10 packages of toilet paper which the military used to pay for. It would be interesting to see how a $30,000 commercial is costing $50,000; and then figuring out who's pocket is being lined by the difference. ---------------------- > I would be surprised if the "Privacy Foundation" was even as > much as a full time job for the one individual named in the > article. I have debated these types on television, and their > organizations exist largely in their own minds, which in many > cases would benefit from some small measure of Thorazine. There are many well respected, and legitimate organizations with plenty of backing who hold such concerns. The ACLU, the Electronic Frontier Foundation (EFF), and the Electronic Privacy Information Center (EPIC); three organizations who definitely need no introduction. Such organizations are run by respected, educated, and intelligent individuals... Leaders of such organizations have spoken at hundreds of conferences and have also appeared in front of Congressional subcommittees to make statements on various subjects. I wont speak for the "Privacy Foundation", but I merely speak as devils advocate, that just because such organizations are not as prominent, as the ACLU, EFF, or EPIC, is no reason to poke fun at their leadership. I took a look at their web site, and they have a reasonable amount of material on the topic. If you wanted to have an intelligent discussion on the subject, the least you could do would be to debate the content of their web site and attempt to refute what they have available. -------------------- No, I'm not one of those "privacy loons"; on the contrary, being a libertarian.... I fully support peoples right to use technical means to protect themselves and their assets... which is something many people in this newsgroup oddly enough do not support. I've made comments numerous times that I fully support the right of individuals to utilize video AND audio surveillance. I've made the comment that I think the USC 18, Chapter 119, 2512.. is bogus and should be repealed so that people can own such equipment. If I want to tape record my business or personal meetings; then it should be my damned right to do so.. and nobody need know about it. If I want to record my phone conversations so as to mount evidence against some annoying individul who menaces society my making prank calls... then why should I not be entitled to that right... Nevertheless, I support these peoples rights to bring attention to trends regarding the proliferation of workplace surveillance. As a libertarian, I abhor any law which restricts an employer from doing anything he/she damned well pleases in his place of busines.... but I certainly don't agree that employees have to "bend over and take it." Drug test; monitoring e-mail; monitoring web useage; cameras in the bathroom; etc.. if I was an employee, I certainly would not tolerate such conduct, as it is extremely unprofessional. It's a double-edges sword; kinda like dealing with the subject of SPAM-Mail, or Telemarketing... I abhor it.... but I support their rights to do such things in a free country.. 2211 From: 1RCM <1RCM@M...> Date: Fri Dec 29, 2000 10:46pm Subject: Dead Wrong regarding TV-HV Josh O, And some who have tried this practice are DEAD wrong. In theory it will work quite well. But in practice even those who know what they are doing can experience some very unpleasant and unplanned-for side-affects. Among them are high-voltage induced cardiac/respiratory arrest, neuro-muscular damage, severe burns, damage to telephone equipment (both that owned by the home owner and the telco as well) which could lead to civil suits and/or criminal prosecution, and the winning of the Darwin award. That is an award given yearly to some of the dumbest folks on the face of the earth. I remember several years ago one of the winners was a fellow who tried to get the 'voices' (ghosts, aliens, whatever) off of his phone by doing exactly what you propose. The result was that he burnt his darn house down! There are much better ways to accomplish whatever it is that you are looking to accomplish. Avail yourself of some training and education - it's definitely safer that way. "Just another Bob" 1RCM@M... 2212 From: Steve Uhrig Date: Sat Dec 30, 2000 9:36am Subject: A lesson in reality, for Libertarians Once upon a midnight dreary, Hoffman pondered, weak and weary: Steve starts by commenting: << So the rest of the world understands, there are a minimum of two gentlemen named Hoffman/Hofmann on this list. The one whose post I am responding to is not the Rick Hofmann (note spelling of last name) from LA, a respected member of this list as well as BECCA. >> > The other Hoffman replies: As long as we're in a sarcastic > mood today... I feel I'm entitled to be sarcastic also... > Normally, I keep my libertarian mouth shut, but I'll slip this > one time. Libertarian. Yes. I see. The good Lord made all sorts of interesting animals for our amusement, like the giraffe and zebra and walrus and platypus. He also made the various political parties, including Libertarians, probably for similar purposes. God definitely has a sense of humor. > Yes, nothing would please me more than to see the > whole lot of freeloading DEA agents, out of work, and > seeking new employment.... and to think that MY > taxpaying dollars are funding these freeloaders. This statement makes it obvious you have never worked the streets, or probably even seen the Real World. > yes, I wonder how MY "organization" can get tens of millions > of free taxpayer money which I can then embezzle. Play the liberal game of providing a worthless product or service, such as "Art" or crap like that. Create organizations who place Satanic people in power who extract money from citizens at gunpoint to fund pornography like Annie Sprinkle and Andres whateverhisnameis. > My guess is that these Drug-Free America commercials are > somewhat akin to the $10 packages of toilet paper which the > military used to pay for. I make my living manufacturing products for the government and I will tell you where "$10 packages of toilet paper" come from. The bureaucracy. The toilet paper costs a buck. The 2000 pages of paperwork it takes to comply with all the applicable regulations and agencies and sanctions and certifications and programs is where the difference comes from. I am in a fortunate position to where my product has no competition, so I can afford to have an attitude. I have a price for my product. The price sheet, with options, is 2 pieces of paper. When I get a government "RFQ" (Request for Proposal) or "IFB" (Invitation For Bid), I send them the 2 pieces of paper and a data sheet. WHEN, not IF, they demand I fill out their 200 pages of paper in the RFQ, where I have to complete matrices on how many female armless legless Haitian Homosexual Hemophiliacs I employ, and have notarized signatures on forms certifying I use no South African hardwood or diamonds in my products, and comply with all current OSHA regulations for my facility, I do it real simple. I add a separate line item to the RFQ for paperwork processing, at $50 per page times however many pages beyond the single sheets where I write in the price and my company contact info. That total is added to the price of my product listed on the price sheet. If they want to pay me to push paper, they will do exactly that. I will not bury the cost of all that hogdump in the price of my product. If they then place an order for the product at the price sheet price, I refuse the order as the price is now the price sheet price plus the paperwork fee. This is the only way they will learn. And that is why I prefer to do virtually all my business with foreign governments. I have done mid 6 figure deals with South American and Pacific Rim governments with 10 pieces of paper. Then I get a request from the State of Texas for one mobile radio worth maybe $350, and it is 200 pages long, cost $3.20 to mail, and they mailed 150 copies to that many potential vendors. I used to throw all those in the trash unread. Sometimes the agency would even call all the bidders of record who received the bid package and ask why no one submitted an offer. And I would tell them. Now I just put a million dollars down for the product instead of trashing it. That should eventually send them a message. And some beancounter may award the thing to me if I am the only (the low) bidder responding. The toilet seat doesn't cost $1000. The toilet seat for the bomber jet costs $200. The bullshit costs $800. Who else is going to pay it and how else is the contractor going to recover his expenses? I can almost promise you the DOD spec for that toilet seat is a hundred pages long, and the bid package a few hundred. > It would be interesting to see how a $30,000 commercial is > costing $50,000 See paragraphs above and it should make perfect sense. > and then figuring out who's pocket is being lined by the > difference. More like whose money is being frittered. The government doesn't have to operate at a profit. That is the problem. > Leaders of such organizations have spoken at hundreds of > conferences and have also appeared in front of Congressional > subcommittees to make statements on various subjects. All of whom must create in the sheeple's minds this illusion of hobgoblins threatening murder and mayhem, so the public becomes alarmed and clamors to be led to safety thus justifying the existence and funding of these organizations or agencies. > I wont speak for the "Privacy Foundation", but I merely > speak as devils advocate, that just because such organizations > are not as prominent, as the ACLU, EFF, or EPIC, is no reason to > poke fun at their leadership. I'll poke fun at anyone who does not contribute a product or service which improves the ultimate state of the union, or the planet. I realize this point is debatable, however I will not do so beyond this message. > I took a look at their web site, and they have a reasonable > amount of material on the topic. If you wanted to have > an intelligent discussion on the subject, the least you could do > would be to debate the content of their web site and attempt to > refute what they have available. -------------------- As has been said before, "I refuse to enter into a battle of wits with an unarmed opponent." I debate these organizations frequently on radio and TV talk shows, to the tune of maybe 20-30 times a year. Recently in NJ on a cable show discussing surveillance I debated a gentleman allegedly representing the National Workers' Rights Foundation. Turns out he was a front for the ACLU, who would never have been invited to appear under their true identity. And his "Foundation" existed as no more than a few inciting press releases each year, and his business card. His "statistics" on the amount of electronic surveillance in the workplace was based on nothing more than a single NYC spy shop claim on how many covert video cameras they sold every year, some outrageous figure like 250,000. I assured him I knew the owner of the spy shop personally and that number of cameras he claimed to sell was exaggerated by several orders of magnitude. No single user, including any federal agency, buys that many cameras a year. I doubt Pelco makes that many in a year, and they are the largest U.S. manufacturer. > No, I'm not one of those "privacy loons"; on the contrary, > being a libertarian.... I fully support peoples right to use > technical means to protect themselves and their assets... which > is something many people in this newsgroup oddly enough do not > support. We support the law, and the established methods of changing it if we disagree. You also have Jury Nullification, but if you know about it you will never make it to a jury. I never have. > Nevertheless, I support these peoples rights to bring > attention to trends regarding the proliferation of workplace > surveillance. As a libertarian, I abhor any law which > restricts an employer from doing anything he/she damned well > pleases in his place of busines.... but I certainly don't > agree that employees have to "bend over and take it." They don't have to. They are very welcome to vote with their feet and seek employment elsewhere. Let union members try this and they will see what their services really are worth. > Drug test; monitoring e-mail; monitoring web useage; cameras > in the bathroom; etc.. if I was an employee, I certainly > would not tolerate such conduct, as it is extremely > unprofessional. You just said above you "abhor any law which restricts an employer from doing anything he/she damned well pleases in his place of business". NONE of these monitoring incidents would have ever been instituted had not employees FIRST abused email, wasted the time for which the employer is paying them by spending part of their working day on ebay or porn sites, or abusing the EMPLOYER'S RIGHT to get that for which he is paying. Reports of cameras in bathrooms are grossly exaggerated. By the organizations I debate on TV, and who would not exist if they did not inform the public of this "problem". Employers are in business to make a profit. They are highly unlikely to spend money on surveillance unless they are losing profits because of abuse. You should be an employer, with customers and employees, maybe in a retail environment, and you would have a total attitude adjustment regarding surveillance in the workplace. You want to take away the employer's right to surveil HIS workplace where YOU went to work VOLUNTARILY, but you want to support the employee's "right" to screw off on the company's time and with the company's resources. I bet you'd have to look a long time to find an employer who also is a Libertarian. Others are welcome to comment on the above, and anyone doing so may have the last word, because I have stated the facts of the situation as I see them, and consider myself done with the matter. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2213 From: Andre Holmes <1ach@g...> Date: Sat Dec 30, 2000 0:39pm Subject: Fw: Re: Workplace Surveillance Is the Top Privacy Story of 2000 ----- Original Message ----- From: "Andre Holmes" <1ach@g...> To: "Hoffman" Sent: Saturday, December 30, 2000 1:15 PM Subject: Re: [TSCM-L] Re: Workplace Surveillance Is the Top Privacy Story of 2000 > Drug Test; Monitoring E-mail ; Monitoring Web usage ; Cameras in the > bathrooms ha ha > go to the doctors office when you are in the exam room dig up your nose then > see if the > doctor will shack your hand. > > I work for a large company 20yrs counting. > > We have random Drug and Alcohol test every 30 days. > > Get busted the first time you will be suspended 30days or more with out pay > and the person has to see a shrink or get fired. > > The Alcohol limit is half of the legal limit for car drivers. > > > Get busted the second time the person is fired period. > > Also the person who gets busted well they then go on file with the DOD and > cannot > work for any airlines,railroad,dept of transportation for life. > > Computer monitoring goes on and we have been warned no porn. > > Cameras in the bathrooms no they are against the law. > > During drug test we blow into a tube and then take urine test no delays > allowed. > > We all should vote yes for drug testing in my opinion. > > The next time you fly on a airplane I may have inspected some parts inside > the engine. > > PEACE > ----- Original Message ----- > From: "Hoffman" > To: > Sent: Friday, December 29, 2000 1:29 PM > Subject: Re: [TSCM-L] Re: Workplace Surveillance Is the Top Privacy Story of > 2000 > > > > > Without playing Chicken Little the sky is falling, places and > > > people like this would have no reason for being, no audience, > > > and would have to get a real job. > > ------------------------- > > Hoffman replies: > > As long as we're in a sarcastic mood today... I feel I'm > > entitled to be sarcastic also... Normally, I keep my > > libertarian mouth shut, but I'll slip this one time. > > > > Yes, I could not agree more about those "chicken little, > > the sky is falling types." For instance, everytime I hear > > the little boy who cried wolf; Barry McCaffrey, talk about > > this imaginary "drug problem" which does not really exist... > > I can't help but think to myself, that such people need > > a good dose of medication to make them realize that > > the "problem" they perceive are merely a figment of > > their own imagination. As for such deluded people > > "getting a real job..." I couldn't agree with you more. > > > > Yes, nothing would please me more than to see the > > whole lot of freeloading DEA agents, out of work, and > > seeking new employment.... and to think that MY > > taxpaying dollars are funding these freeloaders.... > > perpetuating this "war on drugs" for the sole reason > > that if people ever came to their senses... they'd > > be out of a job. The only thing that repulses me > > more is the fact that these loonies (ONDCP) were actually > > funded enormous amounts of money by Congress; > > which they in turn give to a private organization; > > The Partnership for a Drug Free America (an organization > > run by Pharmaceutical companies.... gee... nothing > > corrupt going on there, huh..)... and now I have > > to see these stupid "Kids, dont take drugs" ads > > on TV everynight, and realize that I'm paying for > > it. We all are.. Speaking of organizations run > > by lunatics.. getting back to Partnership for a Drug > > Free America.... yes, I wonder how MY "organization" > > can get tens of millions of free taxpayer money > > which I can then embezzle. > > > > I think the GAO should seriously look into this matter > > and do some accounting of where this money is going. > > My guess is that these Drug-Free America commercials > > are somewhat akin to the $10 packages of toilet paper > > which the military used to pay for. It would be interesting > > to see how a $30,000 commercial is costing $50,000; > > and then figuring out who's pocket is being lined by > > the difference. > > > > ---------------------- > > > I would be surprised if the "Privacy Foundation" was even as > > > much as a full time job for the one individual named in the > > > article. I have debated these types on television, and their > > > organizations exist largely in their own minds, which in many > > > cases would benefit from some small measure of Thorazine. > > > > There are many well respected, and legitimate organizations > > with plenty of backing who hold such concerns. The > > ACLU, the Electronic Frontier Foundation (EFF), and > > the Electronic Privacy Information Center (EPIC); > > three organizations who definitely need no introduction. > > Such organizations are run by respected, educated, > > and intelligent individuals... Leaders of such organizations > > have spoken at hundreds of conferences and have > > also appeared in front of Congressional subcommittees > > to make statements on various subjects. > > > > I wont speak for the "Privacy Foundation", but I merely > > speak as devils advocate, that just because such organizations > > are not as prominent, as the ACLU, EFF, or EPIC, is no > > reason to poke fun at their leadership. > > > > I took a look at their web site, and they have a reasonable > > amount of material on the topic. If you wanted to have > > an intelligent discussion on the subject, the least you could > > do would be to debate the content of their web site and > > attempt to refute what they have available. > > -------------------- > > > > No, I'm not one of those "privacy loons"; on the contrary, > > being a libertarian.... I fully support peoples right to use > > technical means to protect themselves and their assets... > > which is something many people in this newsgroup > > oddly enough do not support. I've made comments > > numerous times that I fully support the right of individuals > > to utilize video AND audio surveillance. I've made the > > comment that I think the USC 18, Chapter 119, 2512.. > > is bogus and should be repealed so that people can > > own such equipment. If I want to tape record my business > > or personal meetings; then it should be my damned right > > to do so.. and nobody need know about it. If I want to > > record my phone conversations so as to mount evidence > > against some annoying individul who menaces society > > my making prank calls... then why should I not be > > entitled to that right... > > > > Nevertheless, I support these peoples rights to bring attention > > to trends regarding the proliferation of workplace surveillance. > > As a libertarian, I abhor any law which restricts an employer from > > doing anything he/she damned well pleases in his place of busines.... > > but I certainly don't agree that employees have to "bend over > > and take it." Drug test; monitoring e-mail; monitoring web > > useage; cameras in the bathroom; etc.. if I was an employee, > > I certainly would not tolerate such conduct, as it is extremely > > unprofessional. It's a double-edges sword; kinda like dealing > > with the subject of SPAM-Mail, or Telemarketing... I abhor > > it.... but I support their rights to do such things in a free > > country.. > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > 2214 From: Andre Holmes <1ach@g...> Date: Sun Dec 31, 2000 2:25pm Subject: Re: bugged money The tracking device was probably a GPS Receiver which only needed a min. of 15sec to track by the use of satellite language [ signal propagation]. The position of the Tracked Receiver was transmitted back to the satellites and from there to a central station. From the Central Station the exact location was plotted [ Central Station to the Receiver]. The Receiver that the Robbers did not see had a Antenna,batteries,transmitter all that may have been inside the bags or money case. A flat Antenna might have been used ! ----- Original Message ----- From: "Shawn Hughes" To: Sent: Thursday, December 28, 2000 6:37 AM Subject: [TSCM-L] bugged money > PARIS, Dec 27 (Reuters) - French police said on Wednesday they had arrested > six men in connection with this week's raid on two armoured vans in which > thieves used explosives to get away with 30 million francs ($4.25 million). > The dawn arrests in two southern Paris suburbs also netted all or part of > the loot as well as about 50 weapons including assault rifles, sub-machine > guns and a rocket launcher. > Police did not say how they tracked down the suspects so quickly-some 16 > hours after the raid in Paris-but the managing director of the armoured car > van involved told French television his firm "had the means" to track down > the cash in its care. > Jean-Michel Houry, managing director of Brinks France, strongly hinted to > France-2 television that the arrests had resulted from the use of > unspecified technical aids. > "Brinks has the means to trace vehicles but also to track funds," said > Houry who declined to go into details about possible electronic "bugs" > which might have been planted among wads of banknotes taken by the gangsters. > The suspects are thought to be part of a dozen-strong gang who launched the > attack in broad daylight on Tuesday on two armoured vans travelling > together just 100 metres (yards) from the main Paris ring-road. > Brinks said the gangsters drove a large van across the road as the vans > approached, forcing one to stop, while another vehicle drove up behind. > One van escaped the ambush but the other was forced to halt and its side > was blasted open by a powerful explosive device attached from the outside. > Three guards, separated from the cargo hold by heavy armour plate, were > slightly hurt. > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2215 From: minerva close-protection Date: Sun Dec 31, 2000 2:38pm Subject: Re: Fw: Re: Workplace Surveillance Is the Top Privacy Story of 2000 To all in the TSCM and associated "Specialsts"; thanks for all of your inputs and comments in the past year! Best wishes and a Happy New Year from all at The Minerva Group(IRL), Paul de Cogan. >From: "Andre Holmes" <1ach@g...> >Reply-To: "Andre Holmes" <1ach@g...> >To: >Subject: Fw: [TSCM-L] Re: Workplace Surveillance Is the Top Privacy Story >of 2000 >Date: Sat, 30 Dec 2000 13:39:26 -0500 > > >----- Original Message ----- >From: "Andre Holmes" <1ach@g...> >To: "Hoffman" >Sent: Saturday, December 30, 2000 1:15 PM >Subject: Re: [TSCM-L] Re: Workplace Surveillance Is the Top Privacy Story >of >2000 > > > > Drug Test; Monitoring E-mail ; Monitoring Web usage ; Cameras in the > > bathrooms ha ha > > go to the doctors office when you are in the exam room dig up your nose >then > > see if the > > doctor will shack your hand. > > > > I work for a large company 20yrs counting. > > > > We have random Drug and Alcohol test every 30 days. > > > > Get busted the first time you will be suspended 30days or more with out >pay > > and the person has to see a shrink or get fired. > > > > The Alcohol limit is half of the legal limit for car drivers. > > > > > > Get busted the second time the person is fired period. > > > > Also the person who gets busted well they then go on file with the DOD >and > > cannot > > work for any airlines,railroad,dept of transportation for life. > > > > Computer monitoring goes on and we have been warned no porn. > > > > Cameras in the bathrooms no they are against the law. > > > > During drug test we blow into a tube and then take urine test no delays > > allowed. > > > > We all should vote yes for drug testing in my opinion. > > > > The next time you fly on a airplane I may have inspected some parts >inside > > the engine. > > > > PEACE > > ----- Original Message ----- > > From: "Hoffman" > > To: > > Sent: Friday, December 29, 2000 1:29 PM > > Subject: Re: [TSCM-L] Re: Workplace Surveillance Is the Top Privacy >Story >of > > 2000 > > > > > > > > Without playing Chicken Little the sky is falling, places and > > > > people like this would have no reason for being, no audience, > > > > and would have to get a real job. > > > ------------------------- > > > Hoffman replies: > > > As long as we're in a sarcastic mood today... I feel I'm > > > entitled to be sarcastic also... Normally, I keep my > > > libertarian mouth shut, but I'll slip this one time. > > > > > > Yes, I could not agree more about those "chicken little, > > > the sky is falling types." For instance, everytime I hear > > > the little boy who cried wolf; Barry McCaffrey, talk about > > > this imaginary "drug problem" which does not really exist... > > > I can't help but think to myself, that such people need > > > a good dose of medication to make them realize that > > > the "problem" they perceive are merely a figment of > > > their own imagination. As for such deluded people > > > "getting a real job..." I couldn't agree with you more. > > > > > > Yes, nothing would please me more than to see the > > > whole lot of freeloading DEA agents, out of work, and > > > seeking new employment.... and to think that MY > > > taxpaying dollars are funding these freeloaders.... > > > perpetuating this "war on drugs" for the sole reason > > > that if people ever came to their senses... they'd > > > be out of a job. The only thing that repulses me > > > more is the fact that these loonies (ONDCP) were actually > > > funded enormous amounts of money by Congress; > > > which they in turn give to a private organization; > > > The Partnership for a Drug Free America (an organization > > > run by Pharmaceutical companies.... gee... nothing > > > corrupt going on there, huh..)... and now I have > > > to see these stupid "Kids, dont take drugs" ads > > > on TV everynight, and realize that I'm paying for > > > it. We all are.. Speaking of organizations run > > > by lunatics.. getting back to Partnership for a Drug > > > Free America.... yes, I wonder how MY "organization" > > > can get tens of millions of free taxpayer money > > > which I can then embezzle. > > > > > > I think the GAO should seriously look into this matter > > > and do some accounting of where this money is going. > > > My guess is that these Drug-Free America commercials > > > are somewhat akin to the $10 packages of toilet paper > > > which the military used to pay for. It would be interesting > > > to see how a $30,000 commercial is costing $50,000; > > > and then figuring out who's pocket is being lined by > > > the difference. > > > > > > ---------------------- > > > > I would be surprised if the "Privacy Foundation" was even as > > > > much as a full time job for the one individual named in the > > > > article. I have debated these types on television, and their > > > > organizations exist largely in their own minds, which in many > > > > cases would benefit from some small measure of Thorazine. > > > > > > There are many well respected, and legitimate organizations > > > with plenty of backing who hold such concerns. The > > > ACLU, the Electronic Frontier Foundation (EFF), and > > > the Electronic Privacy Information Center (EPIC); > > > three organizations who definitely need no introduction. > > > Such organizations are run by respected, educated, > > > and intelligent individuals... Leaders of such organizations > > > have spoken at hundreds of conferences and have > > > also appeared in front of Congressional subcommittees > > > to make statements on various subjects. > > > > > > I wont speak for the "Privacy Foundation", but I merely > > > speak as devils advocate, that just because such organizations > > > are not as prominent, as the ACLU, EFF, or EPIC, is no > > > reason to poke fun at their leadership. > > > > > > I took a look at their web site, and they have a reasonable > > > amount of material on the topic. If you wanted to have > > > an intelligent discussion on the subject, the least you could > > > do would be to debate the content of their web site and > > > attempt to refute what they have available. > > > -------------------- > > > > > > No, I'm not one of those "privacy loons"; on the contrary, > > > being a libertarian.... I fully support peoples right to use > > > technical means to protect themselves and their assets... > > > which is something many people in this newsgroup > > > oddly enough do not support. I've made comments > > > numerous times that I fully support the right of individuals > > > to utilize video AND audio surveillance. I've made the > > > comment that I think the USC 18, Chapter 119, 2512.. > > > is bogus and should be repealed so that people can > > > own such equipment. If I want to tape record my business > > > or personal meetings; then it should be my damned right > > > to do so.. and nobody need know about it. If I want to > > > record my phone conversations so as to mount evidence > > > against some annoying individul who menaces society > > > my making prank calls... then why should I not be > > > entitled to that right... > > > > > > Nevertheless, I support these peoples rights to bring attention > > > to trends regarding the proliferation of workplace surveillance. > > > As a libertarian, I abhor any law which restricts an employer from > > > doing anything he/she damned well pleases in his place of busines.... > > > but I certainly don't agree that employees have to "bend over > > > and take it." Drug test; monitoring e-mail; monitoring web > > > useage; cameras in the bathroom; etc.. if I was an employee, > > > I certainly would not tolerate such conduct, as it is extremely > > > unprofessional. It's a double-edges sword; kinda like dealing > > > with the subject of SPAM-Mail, or Telemarketing... I abhor > > > it.... but I support their rights to do such things in a free > > > country.. > > > > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > > > > _________________________________________________________________________ Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com. 2216 From: James M. Atkinson, Comm-Eng Date: Sun Dec 31, 2000 11:01pm Subject: Happy New Year I would like to wish all of the members of this list a very Happy New Year -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2217 From: Robert G. Ferrell Date: Tue Jan 2, 2001 7:18am Subject: Re: A lesson in reality... >The toilet paper costs a buck. The 2000 pages of paperwork it >takes to comply with all the applicable regulations and agencies >and sanctions and certifications and programs is where the >difference comes from. I've never seen a political discussion between extreme opposing viewpoints where either side accomplished much of anything beyond enraging their opponents, so I'm going to stay far away from the central thrust of this thread. However, I would like to point out that a great many folks are putting considerable effort into reducing or eliminating the need for paperwork when providing services to the U. S. government. My agency, for example. The National Business Center is a franchise agency of the U. S. Department of the Interior that (among other things) develops applications for paperless bidding, bid notification, invoice tracking, and payment from Treasury. If you're a potential contractor for the U.S. government, take a look at http://www.nbc.gov/products/procurement.html More and more agencies are signing up for this sort of thing every day. As a franchise agency, I might add, we're required (eventually) to "pay our own way" without any direct financial support from Congress. As H. L. Mencken once wrote, "The wheels of bureacracy grind slowly, but exceedingly fine." That doesn't have a lot of relevance here, but it's still a great quote. ;-) Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2218 From: S.GUINN Date: Tue Jan 2, 2001 4:43am Subject: SECURITY I WOULD BE INTERESTED IN LEARNING MORE ABOUT YOUR COMPANY MY OFFICE IS : DYNALECTRIC STERLING GUINN 22930 SHAW ROAD SUITE 100 DULLES, VIRGINIA 20166-9448 EMAIL IS SGUINN@D... HOME STERLING GUINN PO BOX 2175 MARTINSBURG, WEST VIRGINIA 25402 "Steve Uhrig" wrote: > --------------------------------------------- >Attachment: >MIME Type: multipart/alternative > --------------------------------------------- List member Pat Edwards pointed out that the movie "Enemy of the State" featuring Gene Hackman and Will Smith is currently showing on cable TV ,either channel 529 or channel 2 Turner Movie classics. Pat asked for some specifics on my and Marty Kaiser's part in the movie. We were technical consultants on electronic surveillance to the production. I was on set for most of the filming which was done in Baltimore, DC and Hollywood. We worked daily with Hackman and Will Smith. I trained them to install electronic surveillance so they could do it realistically in the movie, and they were quick studies so the joke around the set was I should hire them to work for me. My company also supplied most of the surveillance equipment you saw used in the movie. They used the genuine stuff, the same equipment we sell to governments worldwide. If you look closely you will see my personal Scanlock used in two different scenes, one in Hackman's screen room and again in the Senator's hotel suite after bugs were discovered. The set designer built Hackman's bug proof screen room to our specs, and they did it right. It worked so well that the wireless mikes on the actors would not radiate fifteen feet out of the screen room to the receivers. The sound guys were going crazy. They couldn't understand what was happening and why they couldn't get the signal. They kept swapping equipment in and out and could not believe it all went bad overnight. I ended up stripping out the center conductor from a piece of coax to make a crude antenna, and dropped it down inside the top of the screen room in the back. We used that as a receive antenna and that is what worked for the shooting. Except for some of the satellite info and a bit of the video networking, everything you saw was the real thing, or a simulation thereof. We do manufacture video and audio transmitters in smoke detectors, body worn video/audio cameras, the audio surveillance, tracking beacons as shown and the rest of the stuff. Any of the black and white video you saw in the movie was actual footage shot through my surveillance stuff, especially in the shootout in the restaurant near the end. We did have a camera and transmitter concealed in a Christmas tree ornament and the same in the air vent in the Senator's suite. I had a short acting part, as the merchant who sold the surveillance equipment to Hackman in the electronics shop. Curiously enough, I had been dealing with that electronics shop since high school. We worked for six weeks in the building which was blown up. 200 people for 6 weeks for the building to have 10 minutes on screen. I was by there the other day, and the former 5 story large concrete building which formerly was a Dr. Pepper bottling plant is completely gone and there is a gas station there now. Most of the good equipment scenes were cut in editing. The satellite sending CQ in CW was my doing. I tried to get them to slip my ham callsign in there in CW but it was more than they could understand. I had written the dits and dahs for CQ down on a napkin. More information on the players including Marty and me is available at: http://movieweb.com/movie/enemystate/enemy.txt Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ____________________________________________________________________ Get free email and a permanent address at http://www.netaddress.com/?N=1 2219 From: Date: Tue Jan 2, 2001 11:51am Subject: Re: Playstation 2 Anyone have ideas as to what Saddam Hussein intends to use the Sony Playstation 2 for? HAVE A GREAT DAY !!! 2220 From: C.E.A. s.l. Date: Tue Jan 2, 2001 2:55pm Subject: RE: Re: Playstation 2 jajajajajaaaaaa...muy buena :-) > Anyone have ideas as to what Saddam Hussein intends to use the Sony > Playstation 2 for? > > > > > > HAVE A GREAT DAY !!! > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 2221 From: James M. Atkinson, Comm-Eng Date: Tue Jan 2, 2001 8:26pm Subject: Re: Playstation 2 At 12:51 PM -0500 1/2/01, patedwards@w... wrote: >Anyone have ideas as to what Saddam Hussein intends to use the Sony >Playstation 2 for? Space Invaders, Quix, and Pong -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From: Andre Holmes <1ach@v...> Date: Mon Dec 31, 2001 8:40pm Subject: Grade Greetings I want you all to know that the response to my decision to gain some useful knowledge was worth all the effort and personal sacrifice. I decided to work towards a Certificate in the field of Electricity which is a four quarter course the end result is that the Certificate holder can qualify for any Electrical job out there by having the basic qualifications to get the job done, if its assembly or maintenance repair the person will know what to do. Thank you all who responded and I got with you all off list thank you. 2002 I like us as a group to pool our resources to help each other no matter where you operate or live just like before have a safe New Year all. ANDRE HOLMES Neptune Enterprise Security email 1ach@p... [Non-text portions of this message have been removed] 4444 From: steve_weinert Date: Wed Jan 2, 2002 6:32pm Subject: Thermal camera may detect lying Thermal camera may detect lying UPI Science News Published 1/2/2002 2:04 PM http://www.upi.com/view.cfm?StoryID=01012002-053506-3828r ROCHESTER, Minn., Jan. 2 (UPI) -- An experimental new lie detector that measures sudden flashes of heat from around the eyes may soon provide another line of defense against terrorism. "This is the first technology that allows lying to be measured or lying to be detected without any contact with the subject whatsoever instantaneously, in real time," said lead researcher James Levine, an endocrinologist at the Mayo Clinic in Rochester, Minn. "You don't need to hook them up to anything -- you don't need any sophisticated experts to analyze the data." The researchers say prototypes of the device may aid security operations within the next two years, in areas such as airports and border checkpoints. However, Levine also is concerned about the potential ethical ramifications of the technology if it ever becomes developed for the open market. "If this technology really becomes developed to the desktop phase, you could be sitting in front of your boss and he could ask you 'Do you think you can meet your deadline?' And you can say, 'Sure, of course,' and he'd say, 'I know you're lying,'" Levine said in an interview with United Press International. "Or, on a date, one's boyfriend could say to a person, 'Are you serious about wanting to get married?' and when she answers the question, she's being photographed." "On the other hand, when thinking about the possibility of someone with explosives in his shoes boarding a plane, given the technology's security potential, I think most of us would want this application to be accelerated as quickly as possible," Levine added. "We're making advances in science, and I think the ethical issues need to be dealt with when the advances are being made. Otherwise ethics gets left behind," he said. The device consists of a high-definition thermal imaging camera the size of a shoebox. The scientists also have developed a miniaturized version of the camera, roughly the diameter of a postage stamp. Both are hooked up to a filing cabinet's worth of computer hardware. "As people lie, there is a massive increase in blood flow around the eyes, and associated with that there is sudden warming around the eyes, where the color changes to white in the thermal imaging system," Levine explained. The researchers made their discovery accidentally three years ago while studying, of all things, gum chewing. They were using the thermal imaging device to study the facial muscles at work to analyze how physical activity affected metabolism. "We got these beautiful thermal images every time someone chewed gum, and by accident we detected the very subtle changes that occur in the face with fearfulness -- there was a loud bang when a book fell on the lab floor," Levine told UPI. "The changes in the face that came with that were very consistent with several individuals. And we thought, 'My goodness, if this can detect these very subtle changes instantaneously, perhaps we can see these same changes with lying.'" The research team had 20 volunteers commit a mock crime and then assert innocence under experimental conditions at the Department of Defense Polygraph Institute in Fort Jackson, S.C. Eight of the volunteers stabbed a mannequin and stole $20 from it, while the rest had no knowledge of the crime. The device accurately detected lying roughly 80 percent of the time, a precision level comparable to standard lie detecting polygraph tests performed by experts. "Is the method detecting stress or deceit?" commented physicist Gerry Yonas, principal scientist at Sandia National Laboratories in Albuquerque, N.M. He suggested the researchers needed to further compare this new data with other methods of stress and deceit detection. Levine agreed more evaluation was needed under a variety of conditions outside the laboratory, taking into account factors such as wind speed or what people had to eat. "If this technology has the remote possibility to do what it could do, it's mandatory to get this carefully evaluated as soon as humanly possible," Levine said. The researchers reported their findings in the journal Nature. (Reported by Charles Choi in New York.) Copyright © 2001 United Press International 4445 From: Hawkspirit Date: Thu Jan 3, 2002 5:51pm Subject: Key Stroke Logger Wiretap Order Government doesn't have to explain technology's specifics Mary P. Gallagher New Jersey Law Journal January 3, 2002 In a case of first impression, a federal judge ruled Dec. 26 that the Federal Bureau of Investigation did not need a wiretap order to attach a keystroke-recording device to a reputed mobster's computer in order to learn the password to an encrypted file. U.S. District Judge Nicholas Politan in Newark, N.J., also allowed prosecutors to keep secret the specifics of the technology, saying disclosure "would cause identifiable damage to the national security of the United States." Politan denied a motion by lawyers for Nicodemo Scarfo Jr., who was indicted on gambling and loan-sharking charges in June 2000, to suppress the gambling file obtained from his computer. The lawyers argued that the "key-logger system" violated the Fourth Amendment, by collecting more information than needed, and the federal wiretap statute, 18 U.S.C. 2510, by picking up modem transmissions without a wiretap order. Scarfo lawyers Norris Gelman and Vincent Scoca argued that they needed a detailed explanation of the logger technology to determine whether its use was improper. If the logger accessed wire transmissions, the FBI would have needed a wiretap order rather than the search warrants used, they argued. Politan originally seemed receptive. In an Aug. 7 letter opinion, he expressed concern that the FBI might have violated the wiretap statute if the logger picked up keystrokes while the computer modem was operating. He ordered the government to fully explain the device's workings. But prosecutors invoked the 1980 Classified Information Procedures Act, which establishes procedures for handling classified information in criminal cases. They contended that disclosure of the system's specifics would jeopardize ongoing and future criminal investigations and undermine national security. Politan held an in camera hearing on Sept. 26 to review what the opinion described as "top-secret, classified information" about how the logger operates in connection with a modem and how it affects national security. Only those with top-secret security clearance were allowed to attend. On Oct. 2, Politan issued a protective order, finding the classified-information act applied. He sealed the transcript of the Sept. 26 hearing but ordered the government to provide Scarfo's lawyers with an unclassified summary of the logger system, which he said gave them enough information to argue their suppression motion. Politan's opinion last week explains the reasons for his Oct. 2 ruling. "The Congress has spoken through CIPA and determined that certain classified pieces of information implicate national security concerns to such a degree that disclosure ... would seriously compromise United States' national security interests," he wrote. "CIPA strikes a balance between national security interests and a criminal defendant's right to discovery by allowing for a summary which meets the defendant's discovery needs." In rejecting Scarfo's argument that denial of more detailed information about the logger would cripple his defense, Politan wrote that the government's duty to disclose is not absolute and that CIPA creates an exception to that obligation. Politan also ruled that no special wiretap order was needed because the logger intercepted no telephonic communications. He based that finding on FBI evidence that it configured the logger so it would only record keystrokes when the modem was not transmitting. He also spurned the defense lawyers' contention that the warrants were, in effect, impermissible general warrants because they collected more data than necessary to crack the password code. Scoca, a Bloomfield solo practitioner, is troubled by the Sept. 26 closed-door hearing and by the fact that his expert witness was never heard. David Farber, a professor of telecommunications at the University of Pennsylvania, would have testified that it was unclear whether the key logger can distinguish between online and offline work, Scoca says. Scoca calls it "overkill" for the FBI to use a classified device like the logger in a "run-of-the-mill bookmaking case," like the one against Scarfo, when there are commercially available alternatives that could have broken the password. "If the government's device doesn't encroach on our rights, there is no reason to keep that from the defense," he comments. Gelman, a Philadelphia solo practitioner, thinks the Sept. 11 terrorist attacks influenced Politan's receptiveness to the government's arguments. He points to Politan's referring to the key logger issue as being of "added importance in light of recent events and potential national security implications." "I hope this is not the dawning of a new age where hearings will be conducted in secret," says Gelman. Scoca adds: "Everyone has a heightened awareness of national security as a result of Sept. 11. But we don't want to wake up six months from now and find our civil liberties gone." Scoca says the defense might move for reconsideration of Politan's ruling. Assistant U.S. Attorney Ronald Wigler, who represents the government, did not return a call seeking comment. West Orange, N.J., solo practitioner Richard Roberts, who represents Scarfo's business associate and co-defendant, Frank Paolercio, and who joined in Scarfo's motion, declined comment. 4446 From: Prokop Communications Date: Thu Jan 3, 2002 7:45pm Subject: Spectrum Analyzer Software Inteface Does anyone have software sources that interface an HP 8563E series Spectrum Analyzer with a laptop? Anything similar to the ROSE program? Or is it easier to develop my own? Rick Prokop -W9MLW Prokop Communications TSCM Video Concealments Seattle, Washington (206) 378-5560 Seattle, WA [Non-text portions of this message have been removed] 4447 From: James M. Atkinson Date: Thu Jan 3, 2002 11:21pm Subject: Re: Spectrum Analyzer Software Inteface At 5:45 PM -0800 1/3/02, Prokop Communications wrote: >Does anyone have software sources that interface an HP 8563E series >Spectrum Analyzer with a laptop? Anything similar to the ROSE >program? Or is it easier to develop my own? > >Rick Prokop -W9MLW >Prokop Communications >TSCM >Video Concealments >Seattle, Washington >(206) 378-5560 >Seattle, WA It's actually a lot more effective to simply write it yourself (or contract the SW to someone else who can crank out instrument drivers). That way you get the instrument to do exactly what you want, and in such a way that it is harmonious with your their efforts, and in harmony with your other equipment. ROSE was cute a few years back, but the bloody software misses way, way too much... and is painful to us, but it is better then twirling the knobs yourself. I have personal knowledge of ROSE operated units totally missed an eavesdropping threat that should have been easy to find (multiple times, multiple instruments, and multiple users). Try to stay with software you write yourself, -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4448 From: Tim Collins Date: Fri Jan 4, 2002 8:39am Subject: New Member Introduction Hi, A quick note to introduce myself. I am Tim Collins, Operations Manager for Inxtec Security International, based in Toronto, Canada. We cover a wide range of (mostly corporate) security services, with a particular emphasis on technology and IT based threats, attacks and vulnerabilities. We also carry out threat assessments, security audits, etc., etc. We operate internationally and have significant (10+) years of experience in the Middle East, Eastern Mediterranean and Africa. We also operate in Europe, and SE Asia, but have not worked our way down to South America yet. We also have staff (myself included) with a great deal of experience, and some education in the Oil & Gas business. we are happy to undertake sub-contract work and welcome referral business. If you are interested in learning more about Inxtec Security International, or myself, please feel free to visit our website at www.inxtec-security.com, or email me 'off-list'. Happy New Year to all Tim Collins Email. tcollins@i... Tel. +1 (905) 473-7653 Cell. +1 (416) 525-4072 Fax. +1 (905) 473-9032 Website. http://www.inxtec-security.com 4449 From: Hawkspirit Date: Fri Jan 4, 2002 8:40pm Subject: SVR bug Anyone know the nature and description of this SVR bug "Spying on America by foreign countries did not stop at the end of the Cold War," says Kalugin. "In many ways it has increased, especially in the area of economic and technical espionage." The SVR bug found in December 1999 in a State Department conference room near the Secretary's office attests to the aggressiveness of Russian intelligence in Washington ten years after the dissolution of the Soviet Union. Thanks, Roger 4450 From: Hawkspirit Date: Fri Jan 4, 2002 9:33pm Subject: Microwave battery re-charge I am reading from an old newspaper article from the 1980's about the Soviets displaying US bugs found in their embassies. One Soviet intelligence officer says " radio systems if undetected can remain active for many years. Their batteries can be recharged from outside by microwave bombardment". Anyone know if this really can be done? Roger Tolces www.bugsweeps.com 4451 From: Steve Uhrig Date: Sat Jan 5, 2002 11:32am Subject: Re: Microwave battery re-charge Once upon a midnight dreary, Hawkspirit pondered, weak and weary: > I am reading from an old newspaper article from the 1980's > about the Soviets displaying US bugs found in their embassies. > One Soviet intelligence officer says " radio systems if > undetected can remain active for many years. Their batteries > can be recharged from outside by microwave bombardment". > Anyone know if this really can be done? Absolutely it is done. Government trained sweepers look for any evidence of 'flooding' a sensitive friendly area with RF. A high level of background RF may be remote excitation of a covert transmitter. Certainly it would be possible to recharge a battery from rectified RF and charge a battery during times when the target area is unoccupied. Remember the passive RF bug in the U.S. Seal in the Soviet Union a few decades ago. I seem to recall that was excited by 300 megacycles which was microwave at the time. Nowadays, much higher frequencies can be used, which can be aimed with near laser precision and higher efficiency since the beam would be more narrow. And the equipment, skill and experience to detect this is not common. Higher frequencies also would mean smaller resonant antennas. If you planted a low powered covert device in a building with a paging system on the roof, other two way transmitter, or in the vicinity of a broadcast station, you absolutely could snag a usable amount of RF. Things would be all the more efficient if you could arrange a resonant antenna at the excitation frequency. Passive repeaters/reflectors also can be used, if there is not a direct line of sight path from the listening post or somewhere else where the excitation point may be, to the in-place covert device. A lot of background RF in an area you are sweeping should be cause for further investigation. We're probably talking frequencies higher than most of us can measure, in the multi tens of gigs I would expect, possibly considerably higher. Hey, if you get high enough in frequency, it's no longer RF, it's light, and you can use photocells instead of antennas and receivers. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4452 From: James M. Atkinson Date: Sat Jan 5, 2002 11:58am Subject: Re: Microwave battery re-charge If the eavesdropper tunes a "recharge" receive antenna to be resonant to a local high powered broadcast signal (such as a local TV station, or cell tower) he could in turn drive a Shottky array, and in turn create a considerable charge on the capacitors in the bug. In turn the caps could either drive the eavesdropping device directly, or could be used to charge a battery to keep the device operational. You could feasibly have a circuit that fed a "smart recharger" from the cap. I would suspect that something like a 1 Farard cap (typically used for PRAM BU) would be more then sufficient. With some of the ultra-low powered and digital device out there you could supply power to a fairly sophisticated device for quite a period of time just by sucking down RF from one of the local thunder-boomers.. I have knowledge of a particular eavesdropping system out of Europe where the audio transmitter only operated when there is RF activity on the 800 MHz region. While you can use an "illuminating signal" it is not required if the target gets within a few hundred yards of a cellular base station... in fact most cell phones will activate the device, as will some NLJD's (ones that sweep 750-850 MHz instead of using a fixed ISM frequency). This is why that TSCM people should consider any "ambient RF" over a certain level (of say -70 dBm or -100 dBm) to be potentially hostile and a possible illumination threat until proven otherwise. My own personal preference is to "inventory and investigate anything that rises up off the noise floor" while using extremely narrow filters (I commonly run a noise floor below -130, and sometimes below -150 dBm). If you would like some better background on the technology take a look at the inventory tags used to thwart shoplifters at your larger department stores. In those cases the frequency is much lower, the range is closer, and the powered levels are extremely weak. Not imagine the same think jacked up to 100 Watts, plus a 6-12 dB antenna, frequencies at 830 MHz or 1.7 GHz. -jma At 7:33 PM -0800 1/4/02, Hawkspirit wrote: >I am reading from an old newspaper article from the 1980's about the >Soviets displaying US bugs found in their embassies. One Soviet >intelligence officer says " radio systems if undetected can remain active >for many years. Their batteries can be recharged from outside by microwave >bombardment". >Anyone know if this really can be done? > >Roger Tolces >www.bugsweeps.com -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4453 From: Steve Uhrig Date: Sat Jan 5, 2002 0:51pm Subject: Re: SVR bug Once upon a midnight dreary, Roger Tolces pondered, weak and weary: Anyone know the nature and description of this SVR bug? > "Spying on America by foreign countries did not stop at the end > of the Cold War," says Kalugin. "In many ways it has increased, > especially in the area of economic and technical espionage." The > SVR bug found in December 1999 in a State Department conference > room near the Secretary's office attests to the aggressiveness of > Russian intelligence in Washington ten years after the > dissolution of the Soviet Union. Newspapers must not reach out there to the reservations! The bug used by the SVR agent was a store and forward, remotely triggered device. Battery operated, and apparently the uplink transmitter was on a very high frequency as a definite line of sight path was needed for the SVR agent to receive the stored data. The unit did not transmit in realtime or on a schedule; rather, it uplinked only when interrogated. It would record conversations, then transmit them on command to a mobile listening post. Most likely, a number of locations where an automobile could have parked, within direct line of sight of the bug, would previously have been identified. The bug was concealed in a strip of wall molding in the 7th floor conference room. Allegedly it had been detected by the FBI in October (prior to the officially announced discovery), but the SVR agent operating the listening post had been identified in June, involved in suspicious activities on the street in the immediate area of the bug (wearing headphones, no less, and periodically in a car bearing Russian diplomatic license plates). The potential exists there was no LOS parking spot available, and the bug was suspected to contain some important (to the SVR) data. The agent, when apprehended, may have been desperate to recover the stored information and resorted to operating the listening post on foot in the absence of an available location for the mobile listening post. Possibly/probably, the unit either would reach maximum storage capacity and start overwriting, or would simply stop recording when full. Either would mean loss of data if the information was not downloaded prior to the memory being full. A competent sweep likely would have identified the bug. A number of people on this llist would not have missed it in a sweep of that area. There are, however, some realities of life. One cannot do a maximum all out countersurveillance effort on numerous extremely large sensitive areas, numbering in the tens of thousands of square feet, on a regular schedule. The budget and manpower simply don't exist. And no, the government does not contract out for TSCM services in areas like this, at least! Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4454 From: Steve Uhrig Date: Sat Jan 5, 2002 0:57pm Subject: Re: Microwave battery re-charge I just remembered, there is an amateur 2.4 gig video/audio repeater operating with an RF power output of 2 watts, somewhere in the Pacific Northwest, powered strictly by rectified RF from a nearby broadcast station. With some of the new 'supercapacitors' up to several farads available, you don't need batteries anymore. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4455 From: Miguel Puchol Date: Sat Jan 5, 2002 2:10pm Subject: Re: Re: Microwave battery re-charge Just out of interest... > With some of the new 'supercapacitors' up to several farads > available, you don't need batteries anymore. http://www.cooperet.com/products_supercapacitors.asp Cheers, Mike 4456 From: James M. Atkinson Date: Sat Jan 5, 2002 9:08pm Subject: MD police seek law for easier wiretaps http://www.sunspot.net/news/custom/guns/bal-wiretap03.story?coll=bal-home-headlines From Thursday's Sun MD police seek law for easier wiretaps Use of technology by criminals outruns current authority By Sarah Koenig Sun Staff January 2, 2002, 9:16 PM EST Aware that police might be eavesdropping, drug dealers not only watch what they say on their cell phones. They "burn" their phones, and "bust" them. They create phantom phone numbers and treat a handset the way a tourist might treat a disposable camera, discarding it after a few good shots. As prosecutors and detectives in Baltimore increase the use of wiretaps against major drug organizations, they have discovered that their targets' phone capabilities outpace their own. To catch up, law enforcement officials from across Maryland are proposing legislative changes that would expand and simplify the use of wiretaps. A principal objective is to be able to quickly switch a wiretap from phone to phone, mirroring a suspect's maneuvers. "Over the last couple of years, as we've been doing more of these wiretap investigations, we've come face to face with what the shortcomings are," said city State's Attorney Patricia C. Jessamy, who will hold a news conference on the issue today. But efforts to streamline the wiretap application process, which is now closely re viewed by a judge, are sure to meet some opposition in the General Assembly from the American Civil Liberties Union, among others. "There is reason to be concerned that the police will become Big Brother," said Maryland ACLU spokesman Dwight Sullivan. "We want police to be aggressive in fighting crime, but we also need to have the barrier between the aggressiveness and the public, and that barrier is the judge." Wiretapping is the most intrusive and sophisticated investigative tool police have, to be used only when more conventional methods are exhausted. Maryland's wiretap laws, which require more judicial oversight and offer less flexibility than those of most other states, were last updated in 1988, back when having a pager was cool. Since then, investigators say, technology and sophistication have shot ahead. It's not unusual for drug organizations to buy cell phones in bulk, making sure not to use one line for more than a few days. In one Baltimore case, a suspect owned about 50 cell phones. Current law is geared more toward the phone than the suspect, requiring investigators to reapply for a new warrant each time they want to listen to a new line -- a process that means writing about 100 pages of affidavits explaining to a judge why the wiretap is crucial to a case. Rewriting the warrant applica tion also slows down an investigation, sometimes at a crucial moment. In July, for instance, Eric L. Buckson, 31, a now-convicted drug dealer serving a 40-year prison sentence, had just met with a cocaine source when he noticed someone following his car. He hit a parked vehicle, then another. His car burst into flames and he ran away, leaving the drugs and his tapped cell phone to get drowned by firefighters. To Buckson, the incident was probably a scare and a nuisance. To investigators it represented a significant obstacle: Within hours, Buckson was using a new phone, but it would take prosecutors much longer to apply for a new wiretap. By the end of the investigation, prosecutors would tap 15 different phones, creating 22,000 pages of evidence. Maj. Anthony G. Cannavale, commander of the Baltimore Police Department's drug enforcement unit, said changes to the law would help reduce the criminals' advantage. "It's always a game of wits with the drug dealers," he said. "We're really at a breakwater point, where if we don't get a handle on the technology, we're going to be out of business." In the past couple of years, Baltimore has greatly expanded its use of wiretaps in an effort to move from street arrests of low-level drug pushers to kingpins with international narcotics connections. The city Police Department and State's Attorney's Office have created special "technology" units, and they perform more wiretap investigations than any other jurisdiction in Maryland. Though wiretaps consume enormous amounts of time and money, their success is undeniable, as compiled in a recent report prepared by Jessamy's office: In the past two years, wiretaps have led to the dismantling of nine drug organizations -- a total of 118 defendants with links to Colombia and the Dominican Republic, and the seizure of nearly $800,000, 66 cars, 84 guns, 14 kilos of heroin and 10.5 kilos of cocaine. But criminals are becoming more savvy about wiretaps, thanks in part to the recent investigations. Cannavale said his officers have found wiretap affidavits, which include extensive surveillance details, when doing searches in drug dealers' houses -- documents probably provided by their lawyers. In wiretap transcripts, defendants routinely talk about ditching phones and getting new ones. They give out numbers of unregistered phones, and even discuss the possibility their phones are tapped. Cannavale described the ingenious ways criminals avoid surveillance. They get friends to set up phony companies, ordering a block of cell phones with similar numbers. They pay the first bill, then run up the next bill to thousands of dollars before tossing out the phones -- a practice called "busting." They also buy what they call "burners," phones with pre-paid minutes that anyone can buy cheaply, without credit, at Kmart or 7-Eleven. When the minutes are up, they throw away the phone and buy another. Drug dealers can even create phantom phones, Cannavale said. Someone working inside a wireless company will digitally program a phone on the company network without registering the number, making it impossible to track. These methods are so common, said Frank C. Meyer, chief of investigations for the Baltimore County State's Attorney's Office, that "if they're not doing it, they're not worth looking at." And then there's the technology that's difficult to tap, such as the "walkie-talkie" feature on Nextel phones, and E-pagers, which allow people to send text messages between pagers. "It's almost like how having a car revolutionized the way people got around," Cannavale said, sighing at the possibility that satellite phones would be next. Changes to the law proposed by Jill Myers, chief of the wiretap unit in Jessamy's office, would allow investigators to apply for a "roving" wiretap for suspects they know will use more than one phone -- a practice allowed federally and in some states. Sullivan said he was "almost sure" the ACLU would fight such a change in Annapolis. He worries about potential police abuses, and that more innocent conversations will be recorded than necessary. If a suspect has 50 cell phones, "then get 50 search warrants," Sullivan said. "We're familiar with 'mission creep' in the military. Well, there's a bit of this 'technology creep' in the law enforcement context." Other proposed changes include extending the deadline for when investigators have to tell a person that he or she has been the subject of a wiretap. Current law allows a maximum of 180 days, but Myers says that's often not enough time to complete a case, since surveillance ends once a suspect is notified. Myers also wants to allow a single judge to have jurisdiction over all the wiretaps in a case, regardless of where the suspect goes within the state. Existing law gives circuit judges control over wiretaps only in their counties. Sullivan said the latter proposal could encourage "judge shopping." M. Albert Figinski, a defense attorney and lobbyist who helped write the federal and state wiretap laws, agreed. He called the notification and jurisdiction suggestions "absolutely repulsive." "That's way beyond what they need," he shouted, adding that he would personally testify against those ideas. Baltimore Circuit Judge John N. Prevas, who has handled many wiretap cases, also opposes extending deadlines for when investigators must notify suspects. Although some cases might be hurt by the limits, he said, "giving the power to hide things for too long is not healthy." Other suggested changes are more technical, such as giving detectives the authority to order computer companies to preserve e-mails as evidence. America Online, for instance, deletes e-mails from its servers two days after they are read, and preserves them for 28 days if unread. In addition, Myers seeks to expand the list of 17 crimes, from murder to gambling, for which a wiretap can be granted, to include terrorism, harboring terrorism, and money laundering of narcotics proceeds and terrorist-related activities. Separate legislation already has been proposed to add offenses committed by "an international terrorist organization" to the state wiretap law. Jessamy and other Maryland prosecutors say whatever wiretap legislation they end up backing during the legislative session will not be as invasive as the new, expanded federal law regarding wiretap use, which was aimed at terrorists. Dubbed the "Patriot Act," it allows investigators to track e-mails and Internet connections without a warrant. That legislation passed in October amid protest from civil liberties groups. "We are in the business of attempting to dismantle major drug organizations," Jessamy said. "We value civil liberties. We will do everything by the book." Some defense attorneys said the proposed changes, which do not drastically reduce the court's control of wiretaps, sound reasonable. Robert C. Bonsib, a private defense attorney and former prosecutor in Prince George's County who helped write the current wiretap law and has lectured about it, said only the addition of "terrorism" worried him because the definition of such activity is unclear. As for the "roving" wiretap provision, he said, as long as it's used carefully, "That by itself doesn't give me any great heartburn." Copyright © 2002, The Baltimore Sun -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4457 From: James M. Atkinson Date: Sun Jan 6, 2002 10:34am Subject: Judge OKs FBI Keyboard Sniffing Judge OKs FBI Keyboard Sniffing By Declan McCullagh 2:00 a.m. Jan. 4, 2002 PST WASHINGTON -- The Justice Department can legally use a controversial electronic surveillance technique in its prosecution of an alleged mobster. In the first case of its kind, a federal judge in Newark, New Jersey has ruled that evidence surreptitiously gathered by the FBI about Nicodemo S. Scarfo's reputed loan shark operation can be presented in a trial later this year. U.S. District Judge Nicholas Politan said last week that it was perfectly acceptable for FBI agents armed with a court order to sneak into Scarfo's office, plant a keystroke sniffer in his PC and monitor its output. Scarfo had been using Pretty Good Privacy (PGP) encryption software to encode confidential business data -- and frustrate the government's attempts to monitor him. Politan flatly rejected the defense argument that the FBI violated both wiretap law and the Fourth Amendment, saying that the FBI's black bag jobs "suffer from no constitutional infirmity." "Each day, advanced computer technologies and the increased accessibility to the Internet means criminal behavior is becoming more sophisticated and complex.... As a result of this surge in so-called 'cyber crime,' law enforcement's ability to vigorously pursue such rogues cannot be hindered where all constitutional limitations are scrupulously observed," Politan said. Scarfo's lawyer said he was "very disappointed" but he could see no way to appeal Politan's decision before the trial takes place. "If we should be convicted, it'll come up on appeal," said Norris Gelman, a Philadelphia attorney representing Scarfo. Privacy scholars who fear that Politan's ruling will dramatically expand the government's ability to spy on Americans have closely watched the case. If Politan's decision is upheld on appeal, it will grant police broad powers to circumvent privacy-protecting encryption products. "The decision is disappointing, particularly in light of the fact that the full details of the keystroke logger were not disclosed to the defense," said David Sobel, general counsel for the Electronic Privacy Information Center. "It's an important issue that is likely to form the basis of an appeal should Scarfo be convicted." For its part, the FBI seems to want to avoid the physical breaking-and-entering that's required to implant a keystroke logger in a suspect's computer. Late last year, news leaked about an FBI project code-named "Magic Lantern" that would install surveillance software remotely using well-known backdoors in browsers, e-mail clients and operating systems. Ronald Wigler, the assistant U.S. Attorney responsible for the case, said: "There has not been another case of its kind to date that has utilized these methods in conjunction with the way in which we obtained authorization to use these tools." "(The court decision) doesn't necessarily surprise us because we've been saying all along we never violated his Fourth Amendment rights. We've been saying all along we've never captured any electronic communications that would require us to seek a wiretap order," Wigler said. The court order from the federal magistrate judge stated that the FBI could "install and leave behind software, firmware, and/or hardware equipment, which will monitor the inputted data entered on Nicodemo S. Scarfo's computer in the target location so that the FBI can capture the password necessary to decrypt computer files by recording the key related information as they are entered." Defense attorneys had said that the PGP pass-phrase snatching was akin to a telephone wiretap and pointed out that the FBI never obtained a wiretap order. Scarfo's lawyers also claimed the FBI was conducting a general search of the sort loathed by the colonists at the time of the American Revolution and thereafter outlawed by the Fourth Amendment's prohibition of "unreasonable" searches. Complicating the case is the government's unwillingness to release details on how the keystroke-capturing system works. The government calls the key-logger "a sensitive law enforcement" mechanism that's classified -- and that its details, like the secret locations of bugs and surveillance devices, may be kept from defendants. Last fall, the Justice Department invoked the Classified Information Procedures Act (CIPA), which allows prosecutors to brief the judge in a secret session from which defense attorneys and the defendant are excluded. That ex parte hearing took place on Sept. 26. "Pursuant to CIPA's regulations, the United States presented the Court with detailed and top-secret, classified information regarding the (keystroke logger), including how it operates in connection with a modem. The government also demonstrated to the Court how the (keystroke logger) affects national security," Politan said in his decision. Defense attorneys received only an "unclassified summary statement" with general information about the key-logging system. The Justice Department says that Scarfo's encrypted file, titled "Factors," contains evidence of an illegal gambling and loansharking operation. Because Politan is retiring soon, a new judge will take over the case and set a trial date, which will likely take place this year. http://www.wired.com/news/privacy/0,1848,49455,00.html -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4458 From: Shawn Hughes Date: Sun Jan 6, 2002 3:23pm Subject: Re: RF to energy Mike, Another place to look for that type of technology is NASA. They've been toying for years with the idea of having satellites in space 'harvest' solar energy, then send it back to an earthbound receiver / transmission grid. seeeya! Shawn 4459 From: Thomas Conlon Date: Sun Jan 6, 2002 10:02pm Subject: Fwd: Judge OKs FBI Keyboard Sniffing Personally, if you're a fan of the Mafia, you most likely are a bit too deep into something. But, my fear is that "sneek 'n' peek" is going to be the norm. NJ also just approved a "state secrecy" policy regarding criminal investigations as well, one would hope in the context of greater participation with federal law enforcement on legitemate business. Then again, Torricelli makes a livin' here too. And how convenient, the judge is retiring. And if it is run through Echelon, U.S. will say, *ack* no jurisdiction for that little Trojan "they" sent you. Don't forget you'll be in military court. And how sniffable is this Magic Lantern client? And Carnivore - I'm thinking BGP redirects at the Tier 1/2 ISP level, snatching DNS on UDP packets, could get a percentage of any video/data. And hey, the ISP has to cache mail for prosecution, it seems, not sure on the internals there. Can't lose with that one, I reckon. How's Quova/Inqit doing these days? Guess they're done. -tc syseng@m... __________________________________________________ Do You Yahoo!? Send FREE video emails in Yahoo! Mail! http://promo.yahoo.com/videomail/ 4460 From: James M. Atkinson Date: Mon Jan 7, 2002 8:46am Subject: Re: Fwd: Judge OKs FBI Keyboard Sniffing One of the big problems we have in the Northeast; MA, CT, RI, etc. is the State Police (and sometimes city police) developing CI's inside the phone company, who disclose details of federal wiretaps or pen registers. The trooper(s) then in turn sell the wiretap information to the mob, and pocket some hefty cash, feeding some of it back to the CI. It wasn't until several mobsters rolled over on each other that the the Fed's found out about the leaks,and indicted those responsible. -jma At 8:02 PM -0800 1/6/02, Thomas Conlon wrote: >Personally, if you're a fan of the Mafia, you most >likely are a bit too deep into something. >But, my fear is that "sneek 'n' peek" is going to be >the norm. >NJ also just approved a "state secrecy" policy >regarding criminal investigations as well, one would >hope in the context of greater participation with >federal law enforcement on legitemate business. >Then again, Torricelli makes a livin' here too. >And how convenient, the judge is retiring. >And if it is run through Echelon, U.S. will say, *ack* >no jurisdiction for that little Trojan "they" sent >you. >Don't forget you'll be in military court. >And how sniffable is this Magic Lantern client? >And Carnivore - I'm thinking BGP redirects at the Tier >1/2 ISP level, snatching DNS on UDP packets, could get >a percentage of any video/data. >And hey, the ISP has to cache mail for prosecution, it >seems, not sure on the internals there. Can't lose >with that one, I reckon. >How's Quova/Inqit doing these days? Guess they're >done. > >-tc >syseng@m... -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4461 From: Greg H. Walker, Attorney At Law Date: Mon Jan 7, 2002 11:51am Subject: FCRA, FTC CHANGES Group, The other day in "thePIgroup" someone posed the question about have there been any recent FCRA/FTC changes -- I made a comment and promised to report back. I confirmed with Ed McClain of NCISS, as well as a personal review of the FTC website, that we are still having to live with the Vail Letter that basically cut out an extremely large part of my business and I believe a lot of your business (if you're obeying the law, that is). The Vail Letter basically takes all outside consultants, including PI's, Attorneys, Human Resource Consultants and Auditors out of employment related investigations, such as internal theft/fraud, sexual harassment, workplace violence, etc. -- this is a huge market that pays very well and we are out of it unless the company has very carefully crafted its written Personnel Policies, etc. and obtained signatures from all of their employees consenting to the same -- Note also that this is filled with pitfalls for the companies as the FTC ruling is quite technical. The result is that most companies, especially the small to mid-size companies that most of us can reach, simply aren't taking the chance and using outside investigators, etc. Ed indicates that basically the FTC has said if there is to be change, then it is up to Congress to do it, because FTC isn't recinding the Vail Letter. Congress returns on January 23 and NCISS is most hopeful that the Financial Services Committee will push for passage of HR 1543 -- but the problem is that there are a lot of other distractions for the Congress and now as we are in a Congressional election year the partisan in-fighting has began in earnest. This will lead to Monday getting us Wednesday, Wednesday getting us Friday and Friday getting us Monday -- you know the old saying tomorrow never comes. We can help greatly by writing sensible letters to our Congresspersons explaining to the Republicans how this hurts businesses and to the Democrats how this makes for a more dangerous and unfair workplace for the innocent -- it is good to note that the Courts and even other Federal Regulatory Agencies have viewed a "competent" investigation as vital to workplace safety and one of the few ways a company can protect itself from liability from sexual harassment, etc. Professional Investigators who are outside parties and not part of the internal politics of a company are best qualified to protect the innocent and assist in bringing the guilty to termination or justice as appropriate. I ask of you and in fact for the sake of our industry, beg you, to take time this week to write to your own Congresspersons, including both Senators and Representatives, as well as the Chairmen of the Financial Services Committee of the House and let them know of your concern and the immediate need of the passage of HR 1543, especially in light of 9/11. If we don't assist NCISS by sending these letters then when we are cold and hungry with not much good work to do, then we have only ourselves to look at in the mirror and blame. The NCISS website is www.nciss.org -- I know that many of us are financially strapped and can't send money to NCISS, but we all can take time to write several letters. Let's help ourselves by helping NCISS, NALI, ASIS and other organizations who are trying to get HR 1543 passed. Remember, write targeted letters, i.e., stress to the Republicans how it will help business and the economy with a little info about how it will better protect the workers and provide them greater fairness and stress to the Democrats how it will better protect the workers and provide them greater fairness with a little info about how it will help business and the economy. At all times be respectful. Due to the slowness of the processing of U.S. Mail for Congress due to safety concerns, may I suggest not only writing a letter, but also sending an email and possibly even calling your Congressman's Office. Remember, at all times be respectful and calm. May I suggest that you encourage your clients to also get involved in contacting Congress. Thank you -- I know you will do our industry proud. GREG -- Greg H. Walker Attorney At Law President RisKontroL -- Risk Management, Security Consulting & Investigations Houston, Texas (713) 850-0061 WARNING NOTICE BY GHW: Greg H. Walker's comments are not intended to be and should absolutely not be taken as legal advice. Unless you have entered into a specific written agreement with him for legal services, signed by both you and him, and paid him a retainer in good funds, then he is not your Attorney, does not intend to be your Attorney and you should not act nor refrain from acting based, in whole or in part, on his comments. 4462 From: James M. Atkinson Date: Mon Jan 7, 2002 5:56pm Subject: Fwd: Bye bye bugs From: "A Grudko" Subject: Bye bye bugs Date: Mon, 7 Jan 2002 18:15:17 +0200 X-Priority: 3 Old news, new sensationalism Andy Grudko Johannesburg http://popularmechanics.com/science/military/2001/9/e-bomb/print.phtml E-BOMB In the blink of an eye, electromagnetic bombs could throw civilization back 200 years. And terrorists can build them for $400. BY JIM WILSON The next Pearl Harbor will not announce itself with a searing flash of nuclear light or with the plaintive wails of those dying of Ebola or its genetically engineered twin. You will hear a sharp crack in the distance. By the time you mistakenly identify this sound as an innocent clap of thunder, the civilized world will have become unhinged. Fluorescent lights and television sets will glow eerily bright, despite being turned off. The aroma of ozone mixed with smoldering plastic will seep from outlet covers as electric wires arc and telephone lines melt. Your Palm Pilot and MP3 player will feel warm to the touch, their batteries overloaded. Your computer, and every bit of data on it, will be toast. And then you will notice that the world sounds different too. The background music of civilization, the whirl of internal-combustion engines, will have stopped. Save a few diesels, engines will never start again. You, however, will remain unharmed, as you find yourself thrust backward 200 years, to a time when electricity meant a lightning bolt fracturing the night sky. This is not a hypothetical, son-of-Y2K scenario. It is a realistic assessment of the damage the Pentagon believes could be inflicted by a new generation of weapons--E-bombs. The first major test of an American electromagnetic bomb is scheduled for next year. Ultimately, the Army hopes to use E-bomb technology to explode artillery shells in midflight. The Navy wants to use the E-bomb's high-power microwave pulses to neutralize antiship missiles. And, the Air Force plans to equip its bombers, strike fighters, cruise missiles and unmanned aerial vehicles with E-bomb capabilities. When fielded, these will be among the most technologically sophisticated weapons the U.S. military establishment has ever built. There is, however, another part to the E-bomb story, one that military planners are reluctant to discuss. While American versions of these weapons are based on advanced technologies, terrorists could use a less expensive, low-tech approach to create the same destructive power. "Any nation with even a 1940s technology base could make them," says Carlo Kopp, an Australian-based expert on high-tech warfare. "The threat of E-bomb proliferation is very real." POPULAR MECHANICS estimates a basic weapon could be built for $400. An Old Idea Made New The theory behind the E-bomb was proposed in 1925 by physicist Arthur H. Compton--not to build weapons, but to study atoms. Compton demonstrated that firing a stream of highly energetic photons into atoms that have a low atomic number causes them to eject a stream of electrons. Physics students know this phenomenon as the Compton Effect. It became a key tool in unlocking the secrets of the atom. Ironically, this nuclear research led to an unexpected demonstration of the power of the Compton Effect, and spawned a new type of weapon. In 1958, nuclear weapons designers ignited hydrogen bombs high over the Pacific Ocean. The detonations created bursts of gamma rays that, upon striking the oxygen and nitrogen in the atmosphere, released a tsunami of electrons that spread for hundreds of miles. Street lights were blown out in Hawaii and radio navigation was disrupted for 18 hours, as far away as Australia. The United States set out to learn how to "harden" electronics against this electromagnetic pulse (EMP) and develop EMP weapons. America has remained at the forefront of EMP weapons development. Although much of this work is classified, it's believed that current efforts are based on using high-temperature superconductors to create intense magnetic fields. What worries terrorism experts is an idea the United States studied but discarded--the Flux Compression Generator (FCG). A Poor Man's E-Bomb An FCG is an astoundingly simple weapon. It consists of an explosives-packed tube placed inside a slightly larger copper coil, as shown below. The instant before the chemical explosive is detonated, the coil is energized by a bank of capacitors, creating a magnetic field. The explosive charge detonates from the rear forward. As the tube flares outward it touches the edge of the coil, thereby creating a moving short circuit. "The propagating short has the effect of compressing the magnetic field while reducing the inductance of the stator [coil]," says Kopp. "The result is that FCGs will produce a ramping current pulse, which breaks before the final disintegration of the device. Published results suggest ramp times of tens of hundreds of microseconds and peak currents of tens of millions of amps." The pulse that emerges makes a lightning bolt seem like a flashbulb by comparison. An Air Force spokesman, who describes this effect as similar to a lightning strike, points out that electronics systems can be protected by placing them in metal enclosures called Faraday Cages that divert any impinging electromagnetic energy directly to the ground. Foreign military analysts say this reassuring explanation is incomplete. The India Connection The Indian military has studied FCG devices in detail because it fears that Pakistan, with which it has ongoing conflicts, might use E-bombs against the city of Bangalore, a sort of Indian Silicon Valley. An Indian Institute for Defense Studies and Analysis study of E-bombs points to two problems that have been largely overlooked by the West. The first is that very-high-frequency pulses, in the microwave range, can worm their way around vents in Faraday Cages. The second concern is known as the "late-time EMP effect," and may be the most worrisome aspect of FCG devices. It occurs in the 15 minutes after detonation. During this period, the EMP that surged through electrical systems creates localized magnetic fields. When these magnetic fields collapse, they cause electric surges to travel through the power and telecommunication infrastructure. This string-of-firecrackers effect means that terrorists would not have to drop their homemade E-bombs directly on the targets they wish to destroy. Heavily guarded sites, such as telephone switching centers and electronic funds-transfer exchanges, could be attacked through their electric and telecommunication connections. Knock out electric power, computers and telecommunication and you've destroyed the foundation of modern society. In the age of Third World-sponsored terrorism, the E-bomb is the great equalizer. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4463 From: James M. Atkinson Date: Mon Jan 7, 2002 5:57pm Subject: Fwd: Microwave battery re-charge From: "A Grudko" Subject: Microwave battery re-charge Date: Mon, 7 Jan 2002 20:14:29 +0200 X-Priority: 3 >> I would suspect that something like a 1 Farard cap (typically used for PRAM BU) would be more then sufficient. Oops, sorry, what's a PRAM BU - Personal Radio Active Momma Back Up? I might have one in my back pocket but know it by another name. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4464 From: Thomas Conlon Date: Mon Jan 7, 2002 5:54pm Subject: Re: Fwd: Judge OKs FBI Keyboard Sniffing --- "James M. Atkinson" wrote: > > One of the big problems we have in the Northeast; > MA, CT, RI, etc. is > the State Police (and sometimes city police) > developing CI's inside > the phone company, who disclose details of federal > wiretaps or pen > registers. > > The trooper(s) then in turn sell the wiretap > information to the mob, > and pocket some hefty cash, feeding some of it back > to the CI. > > It wasn't until several mobsters rolled over on each > other that the > the Fed's found out about the leaks,and indicted > those responsible. > > -jma > Well I signed a non-competition agreement and I stand by it! It is just a {x}gov't employee syndrome equating a badge with being sublimated as a deity like Caesar or something, demanding tributes and what not. Apparently cash is good although I really don't know. I am really wondering about how common stuff like this is, lately: http://www.ri.cmu.edu/pubs/pub_2436.html -tc syseng@m... __________________________________________________ Do You Yahoo!? Send FREE video emails in Yahoo! Mail! http://promo.yahoo.com/videomail/ 4465 From: James M. Atkinson Date: Mon Jan 7, 2002 9:25pm Subject: Bungling burglar drops trousers on CCTV http://www.ananova.com/news/story/sm_488930.html?menu= Bungling burglar drops trousers on CCTV A burglar has been caught on a surveillance camera as his trousers fell down revealing his bare bottom. The tape shows how the burglar, wearing a ski mask and socks on his hands, broke through a glass door at the Texas Tavern in Roanoke, Virginia, with a piece of concrete. After failing to open an empty cash register, he bent to pick up something from the floor and his trousers fell down. He then lost a shoe as he climbed over the counter. He escaped with the equivalent of about L26. The Daytona Beach News-Journal reports after retrieving the shoe, the man left through the front door. He returned about 20 minutes later and removed the cash box with a piece of concrete. He grabbed the box, which also was empty, and left again. Co-owner Matt Bullington said: "The guy's obviously dumb as a rock." Story filed: 09:08 Monday 7th January 2002 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4466 From: James M. Atkinson Date: Mon Jan 7, 2002 9:28pm Subject: High court OKs video surveillance suit [Note the highly sophisticated manner in which the surveillance equipment was found ;--\ ] http://www.usatoday.com/life/cyber/tech/2002/01/07/court-cameras.htm 01/07/2002 - Updated 10:54 AM ET High court OKs video surveillance suit WASHINGTON (AP) - The Supreme Court cleared the way Monday for employees of a trucking company to pursue an invasion-of-privacy suit against the company, which installed video surveillance cameras in bathrooms. The court refused to be drawn directly into the case involving employees of Consolidated Freightways, one of the country's largest trucking companies. The workers claimed the cameras violated their privacy and were illegal under a state law prohibiting secret videotaping. The trucking company maintained that the cameras were intended only to stop illegal drug use or sales at a shipping terminal in Mira Loma, Calif., and that employees were on notice that they might be videotaped. The issue before the high court was not the legality of the cameras, per se, but the question of whether the unionized employees' lawsuit was prohibited under longstanding federal labor law. If so, many employers would have a stronger hand when considering various workplace surveillance or security measures. If not, union-covered employees would have a clearer avenue to the courts, where they can win money or other damages. The high court's action, in effect, cleared the way for the employees to pursue their invasion of privacy suit. A divided federal appeals court ruled for the company and then reversed course and ruled against the company last year. The 9th U.S. Circuit Court of Appeals, which covers nine western states, eventually found that the federal law on the uniformity of union-negotiated employment contracts does not trump California's own law making it a crime to place a hidden camera in a bathroom. Consolidated appealed to the Supreme Court, arguing that the Teamster union's broad collective bargaining agreement provides for some on-the-job video surveillance, and gives employees internal avenues to file grievances without going to court. "Whether a person has a reasonable expectation of privacy turns on whether he consented to the intrusion," Consolidated's lawyers wrote. The dispute arose from an incident in 1997, when an employee straightened a mirror knocked askew by a slamming door. The mirror fell, revealing a camera. Employees then discovered the same setup in the women's bathroom, and more cameras and a microphone in another men's room. The cameras were pointed into the main portion of the bathroom, and photographed anyone who entered, the employees claim. The company claims the cameras were focused away from urinals or stalls. Copyright 2002 The Associated Press. All rights reserved. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4467 From: David Alexander Date: Tue Jan 8, 2002 10:28am Subject: re: e-bombs >E-BOMB >In the blink of an eye, electromagnetic bombs could throw civilization back >200 years. And terrorists can build them for $400. BY JIM WILSON > >Old news, new sensationalism >Andy Grudko Quite right Andy. People write these sensationalist articles with no understanding of the physics. The field strength decay follows the inverse cube law. Now figure how big an impulse the bomb has to generate to give a strong enough field to do damage at 50 metres. You don't make a faraday cage, you make a faraday box out of sheet metal, and an 'airlock' door system with knife edge seals, just like those on most NMR scanner rooms in hospitals. Easy to do and I've seen plenty of them in my time. If you can design ones to stop the EMP from a 'bucket of instant sunshine' (and they have) you can stop anything. As for spikes, a huge spike suppressor (massive lump of iron works very nicely) will sort that out. Directed military weapons may be different - often you have intel on the weapons you want to hit and know what freq. They are vulnerable to, you then tune and direct your energy, rather than being broad-spectrum. Very much like the ALQ pods on Wild Weasels, etc. On average this same subject seems to come up every 9 months. The press think they have a new angle - and they do...on ignorance. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4468 From: Aimee Farr Date: Tue Jan 8, 2002 11:55am Subject: Surveillance media/transparent warfare. [In regard to my previous comments on "nasty things I can do with surveillance material." This is an interesting example of how the damage could grow exponentially, and how fluid surveillance material is in a digital culture. ~Aimee] http://www.thislife.org/ This week..... Recordings for Someone. All the stories in this show hinge on a personal recording one person makes for another person. A Gulf War soldier records a typical day for his wife back home, and ends up documenting one of the worst massacres of the conflict, on audio tape. Plus, a voice mail message that spawns a campus legend, a teenager who tapes his friends so his mother can hear what he sees in them. And, the most charming love letters ever recorded on cassette. Broadcast the weekend of January 11-13 in most markets, or available here next week via RealAudio. Photo at left © Ted Streshinsky/CORBIS. 4469 From: James M. Atkinson Date: Tue Jan 8, 2002 5:38pm Subject: Congressman's Wiretap Suit Remanded http://www.guardian.co.uk/uslatest/story/0,1282,-1434097,00.html Congressman's Wiretap Suit Remanded Tuesday January 8, 2002 10:40 PM WASHINGTON (AP) - An Ohio congressman's wiretapping lawsuit against a fellow representative has new life. A three-judge panel of the U.S. Court of Appeals for the District of Columbia has decided to allow Rep. John Boehner, R-Ohio, to amend his lawsuit against Rep. James McDermott, D-Wash., and argue it again. Boehner sued after a Florida couple used a scanner to record a December 1996 conference call in which Boehner, then-Speaker Newt Gingrich and other House leaders discussed strategy involving announcement of an ethics committee finding against Gingrich. The couple gave the tape to McDermott, and the contents soon surfaced in news stories. The couple later pleaded guilty to unlawfully intercepting the call and were fined $500 each. Boehner's lawsuit accused McDermott of leaking the tape in violation of a federal wiretapping law that bars people from disclosing information they know was obtained by illegally intercepting a ``wire, oral or electronic communication.'' McDermott argued that he did not break the law by receiving the tape, and that punishing him for making it public would violate his free-speech rights under the Constitution's First Amendment. A federal judge dismissed the lawsuit in 1998. A divided appeals court reinstated it the next year and McDermott appealed to the Supreme Court, which sent it back to the appeals court after deciding instead to hear a Pennsylvania case that raised similar issues. The appeals court issued its decision Dec. 21. Boehner's lawyer, Michael Carvin, says he plans to argue this time that McDermott's position on the House ethics committee required him to keep quiet about issues before the panel. ``I don't think there's anything to that claim, ... and if there is, that's something that should be looked into by the House,'' McDermott's lawyer, Frank Cicero, said. ``Ultimately, when we get all done with this, I don't think it will make any difference in the final outcome.'' -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4470 From: James M. Atkinson Date: Tue Jan 8, 2002 6:20pm Subject: U.S. Attorney White Leaves Office - Mary Jo White [On an interesting note, it was Mary Jo White who was the crusader against all the little spyshops over the years. She was about the only USA who didn't openly ignore the illicit eavesdropping trade, and she actually went after tons of eavesdroppers. Now that she is leaving you can expect a the little spyshops and eavesdropper to breathe a sigh of relief and start coming out of the woodwork more openly. -jma] +++++ http://www.newsday.com/news/nationworld/wire/sns-ap-prosecutors-last-day0108jan08.story?coll=sns%2Dap%2Dnationworld%2Dheadlines U.S. Attorney White Leaves Office By LARRY NEUMEISTER Associated Press Writer January 8, 2002, 12:49 PM EST NEW YORK -- Before stepping down Monday as one of the nation's top terrorism prosecutor, U.S. Attorney Mary Jo White predicted a man charged in the Sept. 11 hijackings may be the only one tried in U.S. courts for a direct role in the attacks. She also threw her support behind military tribunals, despite the success of her own office in putting away dozens of defendants in terrorism plots in the United States and abroad. White announced a month ago she was leaving her Manhattan post. James B. Comey, an assistant federal prosecutor in Richmond, Va., was sworn in Monday as U.S. attorney-designate. Comey, whose appointment is subject to Senate confirmation, will take over White's investigation of the Sept. 11 attacks. The probe has resulted in the detention of dozens of men, but terrorism charges against only Zacarias Moussaoui. "There well might not be any others," White said in an interview with The Associated Press. White, 54, supports prosecuting others arrested around the world in military tribunals -- a view at odds with some who worked for her. "We're at war. We've been at war. The primary response is a military one. It should be a military one," she said. "In that context, military tribunals -- there are advantages to them." While the interview focused on terrorism, White was also asked about the subpoena issued at her request last spring for the personal phone records of AP Washington reporter John Solomon in the investigation of leaks during an investigation of Sen. Robert Torricelli, D-N.J. "Yes, the government gets beat up, rightly so, for leaks of investigations," she responded. "Therefore we ought to be death on leaks. The office needs to be appropriately aggressive about leak investigations." White said the war on terrorism really began in February 1998 when Osama bin Laden urged his followers to kill Americans anywhere they are found. Her office obtained a sealed indictment of bin Laden from a grand jury in the summer of 1998, just before the Aug. 7, 1998, bombings of two U.S. embassies in Africa that killed 224 people, including 12 Americans. White said the secrecy was necessary because bin Laden was a fugitive and prosecutors did not want to disrupt efforts to capture him or others. Despite their concerns about bin Laden, White said prosecutors were stunned Sept. 11 when two hijacked planes crashed into the World Trade Center, another into the Pentagon and a fourth into a field in Pennsylvania. Looking back, White said she believes her office had done all it could to prevent terrorism. "Nobody anticipated the horror and extent of '9-11,'" she said. Since the 1993 bombing of the World Trade Center, which killed six people and injured more than 1,000 others, White's office successfully prosecuted five major terrorism trials. Two stemmed from the 1993 trade center bombing; one from a 1993 plot to blow up five New York City landmarks; and one from a plot to blow up a dozen U.S. airliners over the Far East in 1995. The fifth and most recent trial resulted in life sentences for four men charged in the embassy bombing plots -- including Wadih El-Hage, a U.S. citizen who was once bin Laden's personal secretary. In exiting, White said she wanted to dispel "a lot of misinformation." For instance, she said some people have a mistaken impression that evidence made public during the terrorism trials might have aided terrorists and compromised national security. She cited the so-called "terrorist manual" unveiled in the embassy bombing trial as an example. "Obviously terrorists knew what was in it because they wrote it," she said. White's success in terrorism cases has opened opportunities to write a book, provide television analysis, and take on paid speaking engagements -- options she will consider during a vacation this week. But being U.S. attorney, she said, "is the best job there is. Everybody came to work to do the right thing." Copyright © 2002, The Associated Press -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4471 From: James M. Atkinson Date: Tue Jan 8, 2002 7:01pm Subject: UNIDEN DEBUTS NEW APCO 25 DIGITAL SCANNER MODELS Title: UNIDEN DEBUTS NEW APCO 25 DIGITAL SCANNER MODELS SubTitle: Electronics Giant to Sell Software to Customize Monitoring Experience Synopsis: Uniden lifts the curtain on its long-anticipated APCO 25 digital scanner models. Body: LAS VEGAS (January 8) - Uniden America Corporation today unveiled its new digital scanner line for 2002, including the consumer electronics leader's much-anticipated base and handheld APCO 25 digital scanning models. Speaking at CES, product manager Scott Carpenter showcased the new scanner products, underscoring the company's commitment to keeping its customers at the forefront of scanning technology. "Our retailers have been pushing us for a Uniden APCO 25 product for months, and our new BC250D handheld and our BC785D base/mobile scanning unit represent the fulfillment of our promise," Carpenter said. "With the ability to monitor conventional, trunked and APCO 25 conventional and trunked systems these models are state-of-the-art radio scanners. According to Uniden representatives, the Bearcat BC250D and the Bearcat BC785D models, which are slated to hit shelves in late 2002, offer 1,100 channels, 10 banks and a frequency range of 25MHz - 1300MHz. The BC250D comprises all of the features of Uniden's market-leading BC780 XLT in a handheld model, plus adds APCO 25 capability and an additional 600 channels. Users of both models must purchase an APCO 25 card, the BCi25D, separately. "We're pleased to be bringing these great Bearcat APCO 25 units to market," Carpenter said. "We expect more big cities to migrate to the APCO 25 digital technology, like Los Angeles did this past year, to ensure agency interoperability among police, fire, EMTs and the like - and we know news organizations, businesses and consumers will want to monitor their signals." Uniden officials stressed that APCO 25 digital scanning technology simply gives users the ability to monitor the day-to-day activities and signals of standard city and government service departments - but in no way allows users to monitor encrypted signals from national and local security organizations. In a separate announcement Uniden also announced its plans to market its own easy-to-use scanner programming software, which it is demonstrating in its booth at this winter's annual Consumer Electronics Show in Las Vegas. The software will allow the users of all Uniden scanners with data ports to easily program frequencies into the channels and banks of their scanner. About Uniden Uniden America Corporation, the North American subsidiary of Japan based Uniden Corporation, manufactures and markets wireless consumer electronic products including cordless telephones, business telecommunications systems, multimedia communications devices, scanner radios, CB radios, FRS, Marine radios and other wireless personal communications products. Based in Fort Worth, Texas, Uniden sells it products through dealers and distributors throughout North, Central and South America. # # # -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4472 From: Hawkspirit Date: Tue Jan 8, 2002 9:47pm Subject: Rent A sweep Check this one out, you can now rent sweep equipment for the techno do-it-yourselfer! http://www.spyamericaonline.com/store/comersus_listcategoriesandproducts.asp?idCategory=12 Received: from [172.28.128.25] ([172.28.128.25]:30470 "EHLO ip02.ams.ftl.affinity.com") by ams023.ftl.affinity.com with ESMTP id S368199AbXFBElt; Sat, 2 Jun 2007 00:41:49 -0400 Received: from py-out-1314.google.com ([64.233.166.171]) by ip02.ams.ftl.affinity.com with ESMTP; 02 Jun 2007 00:41:59 -0400 Received: by py-out-1314.google.com with SMTP id u10so1025066pyb for ; Fri, 01 Jun 2007 21:41:59 -0700 (PDT) Received: by 10.35.36.13 with SMTP id o13mr128697pyj.1180704516734; Fri, 01 Jun 2007 06:28:36 -0700 (PDT) Received: by 10.44.88.4 with SMTP id l4gr1676hsb; Fri, 01 Jun 2007 06:28:32 -0700 (PDT) X-Sender: aredandgold@msn.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.32.3 with SMTP id k3mr949443pyj.1180699627782; Fri, 01 Jun 2007 05:07:07 -0700 (PDT) Received: from bay0-omc2-s36.bay0.hotmail.com (bay0-omc2-s36.bay0.hotmail.com [65.54.246.172]) by mx.google.com with ESMTP id v63si152865pyh.2007.06.01.05.07.06; Fri, 01 Jun 2007 05:07:07 -0700 (PDT) Received-SPF: pass (google.com: domain of aredandgold@msn.com designates 65.54.246.172 as permitted sender) Received: from hotmail.com ([65.54.224.91]) by bay0-omc2-s36.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.2668); Fri, 1 Jun 2007 05:07:06 -0700 Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Fri, 1 Jun 2007 05:07:05 -0700 Message-ID: Received: from 68.113.73.48 by BAY105-DAV19.phx.gbl with DAV; Fri, 01 Jun 2007 12:07:04 +0000 X-Originating-IP: [68.113.73.48] X-Originating-Email: [aredandgold@msn.com] X-Sender: aredandgold@msn.com From: "Its from Onion" Subject: [TSCM-L] {1676} Raid on Drug Dealer's House in Mexico Date: Fri, 1 Jun 2007 07:07:16 -0500 Mime-Version: 1.0 Content-Type: multipart/related; boundary="----=_NextPart_000_0019_01C7A41B.7D0350B0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: MSN 9 X-MimeOLE: Produced By MSN MimeOLE V9.50.0039.1900 Seal-Send-Time: Fri, 1 Jun 2007 07:07:17 -0500 X-OriginalArrivalTime: 01 Jun 2007 12:07:05.0951 (UTC) FILETIME=[5F2816F0:01C7A445] X-Google-Approved: jmatk@TSCM.com via web at 2007-06-01 13:28:31 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , To: unlisted-recipients:; (no To-header on input)
 


image00158.jpg

 

image00234.jpg

 

image00325.jpg

 

image00421.jpg

 

image00518.jpg

image00614.jpg

image00713.jpg

 

 





















 


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Embedded Content: ATT012122.jpg: 00000001,6468f875,00000000,7bb1db29 Embedded Content: ATT012152.jpg: 00000001,3b88a420,00000000,7bb1db9b Embedded Content: ATT012182.jpg: 00000001,59de5c20,00000000,7bb1dc0d Embedded Content: ATT012212.jpg: 00000001,78341420,00000000,7bb20103 Embedded Content: ATT012242.jpg: 00000001,1689cc33,00000000,7bb20175 Embedded Content: ATT012272.jpg: 00000001,34df8433,00000000,7bb201e7 Embedded Content: ATT012302.jpg: 00000001,53353c33,00000000,7bb226ddReceived: from [172.28.128.25] ([172.28.128.25]:15191 "EHLO ip02.ams.ftl.affinity.com") by ams004.ftl.affinity.com with ESMTP id S383838AbXHXW0H; Fri, 24 Aug 2007 18:26:07 -0400 Received: from nz-out-0708.google.com ([64.233.162.244]) by ip02.ams.ftl.affinity.com with ESMTP; 24 Aug 2007 18:25:52 -0400 Received: by nz-out-0708.google.com with SMTP id v21so4146277nzg for ; Fri, 24 Aug 2007 15:25:52 -0700 (PDT) Received: by 10.114.169.2 with SMTP id r2mr1250993wae.1187977612406; Fri, 24 Aug 2007 10:46:52 -0700 (PDT) Received: by 10.107.92.38 with SMTP id u38gr1888prl; Fri, 24 Aug 2007 10:46:41 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.22.10 with SMTP id 10mr3528080nzv.1187977590934; Fri, 24 Aug 2007 10:46:30 -0700 (PDT) Received: from swip004.ftl.affinity.com (lvs00-fl-swip004.ftl.affinity.com [216.219.253.14]) by mx.google.com with ESMTP id y6si1327917nzg.2007.08.24.10.46.30; Fri, 24 Aug 2007 10:46:30 -0700 (PDT) Received-SPF: neutral (google.com: 216.219.253.14 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.14; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.14 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [71.243.42.183] ([71.243.42.183]:24337 "EHLO Raphael.tscm.com") by swip004.ftl.affinity.com with ESMTP id S367383AbXHXRev (ORCPT ); Fri, 24 Aug 2007 13:34:51 -0400 Message-Id: <7.0.1.0.2.20070824132618.10be67a8@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Fri, 24 Aug 2007 13:43:18 -0400 To: Recipient list suppressed:; From: "James M. Atkinson" Subject: [TSCM-L] {1888} Transcript: Debate on the foreign intelligence surveillance act Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Here is a transcript of the "El Paso Disclosures" by Mike McConnell. Many of the things that Mr. McConnell states are false, directly contradicts government evidence already presented in court cases, contradicts purchasing and procurement evidence, contradicts budgetary numbers, contradicts equipment allocations, contradicts personnel assignments, and contradicts both classified and unclassified things which have been directly seen by witnesses who understand such things. Something is extremely fishy, -jma http://www.elpasotimes.com/news/ci_6685679 El Paso Times, August 22, 2007 Transcript: Debate on the foreign intelligence surveillance act By Chris Roberts The following is the transcript of a question and answer session with National Intelligence Director Mike McConnell. Question: How much has President Bush or members of his administration formed your response to the FISA debate? Answer: Not at all. When I came back in, remember my previous assignment was director of the NSA, so this was an area I have known a little bit about. So I came back in. I was nominated the first week of January. The administration had made a decision to put the terrorist surveillance program into the FISA court. I think that happened the 7th of Jan. So as I come in the door and I'm prepping for the hearings, this sort of all happened. So the first thing I want to know is what's this program and what's the background and I was pretty surprised at what I learned. First off, the issue was the technology had changed and we had worked ourselves into a position that we were focusing on foreign terrorist communications, and this was a terrorist foreigner in a foreign country. The issue was international communications are on a wire so all of a sudden we were in a position because of the wording in the law that we had to have a warrant to do that. So the most important thing to capture is that it's a foreigner in a foreign country, required to get a warrant. Now if it were wireless, we would not be required to get a warrant. Plus we were limited in what we were doing to terrorism only and the last time I checked we had a mission called foreign intelligence, which should be construed to mean anything of a foreign intelligence interest, North Korea, China, Russia, Syria, weapons of mass destruction proliferation, military development and it goes on and on and on. So when I engaged with the administration, I said we've gotten ourselves into a position here where we need to clarify, so the FISA issue had been debated and legislation had been passed in the house in 2006, did not pass the Senate. Two bills were introduced in the Senate, I don't know if it was co-sponsorship or two different bills, but Sen. (Dianne Feinstein, D-Calif.) had a bill and Sen. Specter had a bill and it may have been the same bill, I don't know, but the point is a lot of debate, a lot of dialogue. So, it was submitted to the FISA court and the first ruling in the FISA court was what we needed to do we could do with an approval process that was at a summary level and that was OK, we stayed in business and we're doing our mission. Well in the FISA process, you may or may not be aware ... Q: When you say summary level, do you mean the FISA court? A: The FISA court. The FISA court ruled presented the program to them and they said the program is what you say it is and it's appropriate and it's legitimate, it's not an issue and was had approval. But the FISA process has a renewal. It comes up every so many days and there are 11 FISA judges. So the second judge looked at the same data and said well wait a minute I interpret the law, which is the FISA law, differently. And it came down to, if it's on a wire and it's foreign in a foreign country, you have to have a warrant and so we found ourselves in a position of actually losing ground because it was the first review was less capability, we got a stay and that took us to the 31st of May. After the 31st of May we were in extremis because now we have significantly less capability. And meantime, the community, before I came back, had been working on a National Intelligence Estimate on terrorist threat to the homeland. And the key elements of the terrorist threat to the homeland, there were four key elements, a resilient determined adversary with senior leadership willing to die for the cause, requiring a place to train and develop, think of it as safe haven, they had discovered that in the border area between Pakistan and Afghanistan. Now the Pakistani government is pushing and pressing and attempting to do something about it, but by and large they have areas of safe haven. So leadership that can adapt, safe haven, intermediate leadership, these are think of them as trainers, facilitators, operational control guys. And the fourth part is recruits. They have them, they've taken them. This area is referred to as the FATA, federally administered tribal areas, they have the recruits and now the objective is to get them into the United States for mass casualties to conduct terrorist operations to achieve mass casualties. All of those four parts have been carried out except the fourth. They have em, but they haven't been successful. One of the major tools for us to keep them out is the FISA program, a significant tool and we're going the wrong direction. So, for me it was extremis to start talking not only to the administration, but to members of the hill. So from June until the bill was passed, I think I talked to probably 260 members, senators and congressmen. We submitted the bill in April, had an open hearing 1 May, we had a closed hearing in May, I don't remember the exact date. Chairman (U.S. Rep. Silvestre Reyes, D-Texas) had two hearings and I had a chance to brief the judiciary committee in the house, the intelligence committee in the house and I just mentioned the Senate, did not brief the full judiciary committee in the Senate, but I did meet with Sen. (Patrick Leahy, D-Vt.) and Sen. (Arlen Specter, R-Pa.), and I did have an opportunity on the Senate side, they have a tradition there of every quarter they invite the director of national intelligence in to talk to them update them on topics of interest. And that happened in (June 27). Well what they wanted to hear about was Iraq and Afghanistan and for whatever reason, I'm giving them my review and they ask questions in the order in which they arrive in the room. The second question was on FISA, so it gave me an opportunity to, here I am worrying about this problem and I have 41 senators and I said several things. The current threat is increasing, I'm worried about it. Our capability is decreasing and let me explain the problem. Q: Can't you get the warrant after the fact? A: The issue is volume and time. Think about foreign intelligence. What it presented me with an opportunity is to make the case for something current, but what I was really also trying to put a strong emphasis on is the need to do foreign intelligence in any context. My argument was that the intelligence community should not be restricted when we are conducting foreign surveillance against a foreigner in a foreign country, just by dint of the fact that it happened to touch a wire. We haven't done that in wireless for years. Q: So you end up with people tied up doing paperwork? A: It takes about 200 man hours to do one telephone number. Think about it from the judges standpoint. Well, is this foreign intelligence? Well how do you know it's foreign intelligence? Well what does Abdul calling Mohammed mean, and how do I interpret that? So, it's a very complex process, so now, I've got people speaking Urdu and Farsi and, you know, whatever, Arabic, pull them off the line have them go through this process to justify what it is they know and why and so on. And now you've got to write it all up and it goes through the signature process, take it through (the Justice Department), and take it down to the FISA court. So all that process is about 200 man hours for one number. We're going backwards, we couldn't keep up. So the issue was ... Q: How many calls? Thousands? A: Don't want to go there. Just think, lots. Too many. Now the second part of the issue was under the president's program, the terrorist surveillance program, the private sector had assisted us. Because if you're going to get access you've got to have a partner and they were being sued. Now if you play out the suits at the value they're claimed, it would bankrupt these companies. So my position was we have to provide liability protection to these private sector entities. So that was part of the request. So we went through that and we argued it. Some wanted to limit us to terrorism. My argument was, wait a minute, why would I want to limit it to terrorism. It may be that terrorists are achieving weapons of mass destruction, the only way I would know that is if I'm doing foreign intelligence by who might be providing a weapon of mass destruction. Q: And this is still all foreign to foreign communication? A: All foreign to foreign. So, in the final analysis, I was after three points, no warrant for a foreigner overseas, a foreign intelligence target located overseas, liability protection for the private sector and the third point was we must be required to have a warrant for surveillance against a U.S. person. And when I say U.S. person I want to make sure you capture what that means. That does not mean citizen. That means a foreigner, who is here, we still have to have a warrant because he's here. My view is that that's the right check and balances and it's the right protection for the country and lets us still do our mission for protection of the country. And we're trying to fend off foreign threats. Q: So are you satisfied with it the way it is now? A: I am. The issue that we did not address, which has to be addressed is the liability protection for the private sector now is proscriptive, meaning going forward. We've got a retroactive problem. When I went through and briefed the various senators and congressmen, the issue was alright, look, we don't want to work that right now, it's too hard because we want to find out about some issues of the past. So what I recommended to the administration is, 'Let's take that off the table for now and take it up when Congress reconvenes in September.' Q: With an eye toward the six-month review? A: No, the retroactive liability protection has got to be addressed. Q: And that's not in the current law? A: It is not. Now people have said that I negotiated in bad faith, or I did not keep my word or whatever... Q: That you had an agenda that you weren't honest about. A: I'll give you the facts from my point of view. When I checked on board I had my discussion with the president. I'm an apolitical figure. I'm not a Republican, I'm not a Democrat. I have voted for both. My job is as a professional to try to do this job the best way I can in terms of, from the intelligence community, protect the nation. So I made my argument that we should have the ability to do surveillance the same way we've done it for the past 50 years and not be inhibited when it's a foreigner in a foreign country. The president's guidance to me early in the process, was, 'You've got the experience. I trust your judgement. You make the right call. There's no pressure from anybody here to tell you how to do it. He did that early. He revisited with me in June. He did it again in July and he said it publicly on Friday before the bill was passed. We were at the FBI, it's an annual thing, we go to the FBI and do a homeland security kind of update. So he came out at noon and said, 'I'm requesting that Congress pass this bill. It's essential. Do it before you go on recess. I'm depending on Mike McConnell's recommendations. And that was the total sum and substance of the guidance and the involvement from the White House with regard to how I should make the call. Now, as we negotiated, we started with 66 pages, were trying to get everything cleaned up at once. When I reduced it to my three points, we went from 66 pages to 11. Now, this is a very, very complex bill. I had a team of 20 lawyers working. You can change a word in a paragraph and end up with some major catastrophe down in paragraph 27, subsection 2c, to shut yourself down, you'll be out of business. So when we send up our 11 pages, we had a lot of help in making sure we got it just right so it would come back and we'd say wait a minute we can't live with this or one of the lawyers would say, 'Wait we tried that, it won't work, here's the problem.' So we kept going back and forth, so we sent up a version like Monday, we sent up a version on Wednesday, we sent up a version on Thursday. The House leadership, or the Democratic leadership on Thursday took that bill and we talked about it. And my response was there are some things I can't live with in this bill and they said alright we're going to fix them. Now, here's the issue. I never then had a chance to read it for the fix because, again, it's so complex, if you change a word or phrase, or even a paragraph reference, you can cause unintended ... Q: You have to make sure it's all consistent? A: Right. So I can't agree to it until it's in writing and my 20 lawyers, who have been doing this for two years, can work through it. So in the final analysis, I was put in the position of making a call on something I hadn't read. So when it came down to crunch time, we got a copy and it had some of the offending language back in it. So I said, 'I can't support it.' And it played out in the House the way it played out in the House. Meantime on the Senate side, there were two versions being looked at. The Wednesday version and the Thursday version. And one side took one version and the other side took the other version. The Thursday version, we had some help, and I didn't get a chance to review it. So now, it's Friday night, the Senate's voting. They were having their debate and I still had not had a chance to review it. So, I walked over, I was up visiting some senators trying to explain some of the background. So I walked over to the chamber and as I walked into the office just off the chamber, it's the vice president's office, somebody gave me a copy. So I looked at the version and said, 'Can't do it. The same language was back in there.' Q: What was it? A: Just let me leave it, not too much detail, there were things with regard to our authorities some language around minimization. So it put us in an untenable position. So then I had another version to take a look at, which was our Wednesday version, which basically was unchanged. So I said, well certainly, I'm going to support that Wednesday version. So that's what I said and the vote happened in the Senate and that was on Friday. So now it rolled to the House on Saturday. They took up the bill, they had a spirited debate, my name was invoked several times, not in a favorable light in some cases. (laughs) And they took a vote and it passed 226 to 182, I think. So it's law. The president signed it on Sunday and here we are. Q: That's far from unanimous. There's obviously going to be more debate on this. A: There are a couple of issues to just be sensitive to. There's a claim of reverse targeting. Now what that means is we would target somebody in a foreign country who is calling into the United States and our intent is to not go after the bad guy, but to listen to somebody in the United States. That's not legal, it's, it would be a breach of the Fourth Amendment. You can go to jail for that sort of thing. And If a foreign bad guy is calling into the United States, if there's a need to have a warrant, for the person in the United States, you just get a warrant. And so if a terrorist calls in and it's another terrorist, I think the American public would want us to do surveillance of that U.S. person in this case. So we would just get a warrant and do that. It's a manageable thing. On the U.S. persons side it's 100 or less. And then the foreign side, it's in the thousands. Now there's a sense that we're doing massive data mining. In fact, what we're doing is surgical. A telephone number is surgical. So, if you know what number, you can select it out. So that's, we've got a lot of territory to make up with people believing that we're doing things we're not doing. Q: Even if it's perception, how do you deal with that? You have to do public relations, I assume. A: Well, one of the things you do is you talk to reporters. And you give them the facts the best you can. Now part of this is a classified world. The fact we're doing it this way means that some Americans are going to die, because we do this mission unknown to the bad guys because they're using a process that we can exploit and the more we talk about it, the more they will go with an alternative means and when they go to an alternative means, remember what I said, a significant portion of what we do, this is not just threats against the United States, this is war in Afghanistan and Iraq. Q. So you're saying that the reporting and the debate in Congress means that some Americans are going to die? A. That's what I mean. Because we have made it so public. We used to do these things very differently, but for whatever reason, you know, it's a democratic process and sunshine's a good thing. We need to have the debate. The reason that the FISA law was passed in 1978 was an arrangement was worked out between the Congress and the administration, we did not want to allow this community to conduct surveillance, electronic surveillance, of Americans for foreign intelligence unless you had a warrant, so that was required. So there was no warrant required for a foreign target in a foreign land. And so we are trying to get back to what was the intention of '78. Now because of the claim, counterclaim, mistrust, suspicion, the only way you could make any progress was to have this debate in an open way. Q. So you don't think there was an alternative way to do this? A. There may have been an alternative way, but we are where are ... Q. A better way, I should say. A. All of my briefs initially were very classified. But it became apparent that we were not going to be able to carry the day if we don't talk to more people. Q. Some might say that's the price you pay for living in a free society. Do you think that this is necessary that these Americans die? A. We could have gotten there a different way. We conducted intelligence since World War II and we've maintained a sensitivity as far as sources and methods. It's basically a sources and methods argument. If you don't protect sources and methods then those you target will choose alternative means, different paths. As it is today al-Qaida in Iraq is targeting Americans, specifically the coalition. There are activities supported by other nations to import electronic, or explosively formed projectiles, to do these roadside attacks and what we know about that is often out of very sensitive sources and methods. So the more public it is, then they take it away from us. So that's the tradeoff. DIVERSITY IN THE INTELLIGENCE COMMUNITY Q: I wanted to ask you about the diversity question. This has major ramifications here, we have this center of excellence program that's recruiting high school kids, many of whom wouldn't qualify if first generation American citizens weren't allowed. A: So you agree with me? Q: It does sound like something that would benefit this area that would also allow you to get people from here who are bicultural and have an openness to seeing things ... A: You're talking about Hispanics? Q: Yes. A: Hispanics are probably the most under-represented group if you think of America, what the ethic makeup of America, Hispanics are the most under-represented group in my community. Now, that said, and should increase that Hispanic population and programs like this will do that. That's why the outreach. But also we need, particularly with the current problem of terrorism, we need to have speakers of Urdu and Farsi and Arabic and people from those cultures that understand the issues of tribes and clans and all the things that go with understanding that part of the world. Varying religions and so on. Because it is, it's almost impossible, I've had the chance to live in the Middle East for years, I've studied it for years, it's impossible to understand it without having some feel for the culture and so on. So while I'm all for increasing the diversity along the lines we talked about, I'm also very much in favor of first generation Americans from the countries that are causing issues and problems. Q: What is the status of that program. A: It is not in statue. It is not in policy. It has been habit. So we've stated, as a matter of policy, that we're not going to abide by those habits. Q: And that's already the case? A: Yes, and are we making progress? Not fast enough, but we will make progress over time. Q: How do you measure that? A: Very simple, you get to measure what are you and where are you trying go and are you making progress. I wrestled with this years ago when I was NSA .... Q: You don't want quotas, though? A: Quotas are forbidden so we set goals. My way of thinking about it is what is your end state? Now some would say that federal governments should look like America, whatever that is. OK, that sounded like a reasonable metric, so I said, 'Alright, what does America look like?' So I got a bunch of numbers. I said, 'Alright, what do we look like?' and it didn't match, and as I just told you, the one place where there's the greatest mismatch is Hispanic. It's much closer, as matter of fact, people would be surprised how close it is across, at least my community among the other minorities. Now, that said, numbers don't necessarily equal positioning in the organization. So that's another feature we have to work on, is placement of women and minorities in leadership positions. Q: So, you're quantifying that as well? A: Yes. TERRORIST ACTIVITY ON THE NATION'S SOUTHWEST BORDER Q: There seems to be very little terrorist-related activity on the Southwest border, which is watched very closely because of the illegal immigration issue. Can you talk about why it's important to be alert here? A: Let me go back to my NIE, those are unclassified key judgements, pull them down and look at them. You've got committed leadership. You've got a place to train. They've got trainers and they've got recruits. The key now is getting recruits in. So if the key is getting recruits in. So, if you're key is getting recruits in, how would you do that? And so, how would you do that? Q: I'd go to the northern border where there's nobody watching. A: And that's a path. Flying in is a path. Taking a ship in is a path. Coming up through the Mexican border is a path. Now are they doing it in great numbers, no. Because we're finding them and we're identifying them and we've got watch lists and we're keeping them at bay. There are numerous situations where people are alive today because we caught them (terrorists). And my point earlier, we catch them or we prevent them because we've got the sources and methods that lets us identify them and do something about it. And you know the more sources and methods are compromised, we have that problem. Q: And in many cases we don't hear about them? A: The vast majority you don't hear about. Remember, let me give you a way to think about this. If you've got an issue, you have three potential outcomes, only three. A diplomatic success, an operational success or an intelligence failure. Because all those diplomatic successes and operations successes where there's intelligence contribution, it's not an intelligence success. It's just part of the process. But if there's an intelligence failure ... Q: Then you hear about it. A: So, are terrorists coming across the Southwest border? Not in great numbers. Q: There are some cases? A: There are some. And would they use it as a path, given it was available to them? In time they will. Q: If they're successful at it, then they'll probably repeat it. A: Sure. There were a significant number of Iraqis who came across last year. Smuggled across illegally. Q: Where was that? A: Across the Southwest border. Q: Can you give me anymore detail? A: I probably could if I had my notebook. It's significant numbers. I'll have somebody get it for you. I don't remember what it is. Q: The point is it went from a number to (triple) in a single year, because they figured it out. Now some we caught, some we didn't. The ones that get in, what are they going to do? They're going to write home. So, it's not rocket science, word will move around. There's a program now in South America, where you can, once you're in South American countries, you can move around in South America and Central America without a visa. So you get a forged passport in Lebanon or where ever that gets you to South America. Now, no visa, you can move around, and with you're forged passport, as a citizen of whatever, you could come across that border. So, what I'm highlighting is that something ... Q: Is this how it happened, the cases you're talking about? A: Yes. ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- X-Symantec-TimeoutProtection: 0 X-Symantec-TimeoutProtection: 1 X-Symantec-TimeoutProtection: 2 X-Symantec-TimeoutProtection: 3 X-Symantec-TimeoutProtection: 4 X-Symantec-TimeoutProtection: 5 X-Symantec-TimeoutProtection: 6 Received: from [172.28.128.26] ([172.28.128.26]:42569 "EHLO ip03.ams.ftl.affinity.com") by ams018.ftl.affinity.com with ESMTP id S410188AbXJDQfj; Thu, 4 Oct 2007 12:35:39 -0400 Received: from nz-out-0708.google.com ([64.233.162.247]) by ip03.ams.ftl.affinity.com with ESMTP; 04 Oct 2007 12:33:11 -0400 Received: by nz-out-0708.google.com with SMTP id q60so23704897nzb for ; Thu, 04 Oct 2007 09:33:10 -0700 (PDT) Received: by 10.36.23.7 with SMTP id 7mr1919057nzw.1191515567672; Thu, 04 Oct 2007 09:32:47 -0700 (PDT) Received: by 10.44.53.36 with SMTP id b36gr2026hsa; Thu, 04 Oct 2007 09:32:37 -0700 (PDT) X-Sender: aredandgold@msn.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.22.10 with SMTP id 10mr573371nzv.1191515543988; Thu, 04 Oct 2007 09:32:23 -0700 (PDT) Received: from bay0-omc3-s31.bay0.hotmail.com (bay0-omc3-s31.bay0.hotmail.com [65.54.246.231]) by mx.google.com with ESMTP id v36si3086125wah.2007.10.04.09.32.11; Thu, 04 Oct 2007 09:32:22 -0700 (PDT) Received-SPF: pass (google.com: domain of aredandgold@msn.com designates 65.54.246.231 as permitted sender) client-ip=65.54.246.231; Authentication-Results: mx.google.com; spf=pass (google.com: domain of aredandgold@msn.com designates 65.54.246.231 as permitted sender) smtp.mail=aredandgold@msn.com Received: from hotmail.com ([10.6.19.18]) by bay0-omc3-s31.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Thu, 4 Oct 2007 09:31:45 -0700 Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Thu, 4 Oct 2007 09:31:43 -0700 Message-ID: Received: from 68.113.73.48 by BLU116-DAV8.phx.gbl with DAV; Thu, 04 Oct 2007 16:31:38 +0000 X-Originating-IP: [68.113.73.48] X-Originating-Email: [aredandgold@msn.com] X-Sender: aredandgold@msn.com From: "Its from Onion" Subject: [TSCM-L] {2026} VIP caravans in Presidential motorcades Date: Thu, 4 Oct 2007 11:30:06 -0500 Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="----=_NextPart_000_00B8_01C80679.E9D26B70" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: MSN 9 Seal-Send-Time: Thu, 4 Oct 2007 11:30:06 -0500 X-MimeOLE: Produced By MSN MimeOLE V9.50.0039.1900 X-OriginalArrivalTime: 04 Oct 2007 16:31:43.0490 (UTC) FILETIME=[0C8B0620:01C806A4] Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , To: unlisted-recipients:; (no To-header on input)

 

These are mounted inside the Black SUV's you see in Presidential motorcades and VIP caravans.  You need the windshield wipers going to clear the spent casings. They simultaneously fire 7.62mm bullets from six barrels at up to 4000 rounds per minute. Talkin' 'bout road rage!  
 


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Attachment Converted: "c:\documents and settings\james m. atkinson\application data\qualcomm\eudora\attach\q_car.wmv"Received: from [172.28.128.25] ([172.28.128.25]:45984 "EHLO ip02.ams.ftl.affinity.com") by ams003.ftl.affinity.com with ESMTP id S418996AbXJDR0s; Thu, 4 Oct 2007 13:26:48 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAIe/BEdA6aLxkGdsb2JhbACOOAEBAgcCCCAFlRc Received: from nz-out-0708.google.com ([64.233.162.241]) by ip02.ams.ftl.affinity.com with ESMTP; 04 Oct 2007 13:26:22 -0400 Received: by nz-out-0708.google.com with SMTP id q60so23774822nzb for ; Thu, 04 Oct 2007 10:26:16 -0700 (PDT) Received: by 10.36.66.6 with SMTP id o6mr1792882nza.1191518767242; Thu, 04 Oct 2007 10:26:07 -0700 (PDT) Received: by 10.44.112.30 with SMTP id k30gr2027hsc; Thu, 04 Oct 2007 10:25:56 -0700 (PDT) X-Sender: ghicks@cadence.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.23.11 with SMTP id 11mr671649nzw.1191518748093; Thu, 04 Oct 2007 10:25:48 -0700 (PDT) Received: from mx-sanjose2.Cadence.COM (mx-sanjose2.Cadence.COM [158.140.2.61]) by mx.google.com with ESMTP id v36si3143652wah.2007.10.04.10.25.47; Thu, 04 Oct 2007 10:25:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of ghicks@cadence.com designates 158.140.2.61 as permitted sender) client-ip=158.140.2.61; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of ghicks@cadence.com designates 158.140.2.61 as permitted sender) smtp.mail=ghicks@cadence.com Received: from mailhub.Cadence.COM (localhost [127.0.0.1]) by mx-sanjose2.Cadence.COM (8.12.9/8.12.9) with ESMTP id l94HMHpM015614; Thu, 4 Oct 2007 10:22:17 -0700 (PDT) Received: from metis (localhost [127.0.0.1]) by mailhub.Cadence.COM (8.12.8/8.8.5) with SMTP id l94HPis4018268; Thu, 4 Oct 2007 10:25:44 -0700 (PDT) Message-Id: <200710041725.l94HPis4018268@mailhub.Cadence.COM> Date: Thu, 4 Oct 2007 10:25:44 -0700 (PDT) From: Gregory Hicks Reply-To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2027} Re: VIP caravans in Presidential motorcades To: TSCM-L2006@googlegroups.com Cc: aredandgold@msn.com Mime-Version: 1.0 Content-Type: TEXT/plain; charset=ISO-8859-1 Content-MD5: 1z7g5EQTUcQvsiHGsmHm6Q== X-Mailer: dtmail 1.3.0 @(#)CDE Version 1.4.8 SunOS 5.8 sun4u sparc X-Received: By mx-sanjose2.Cadence.COM as l94HMHpM015614 at Thu Oct 4 10:22:17 2007 Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , > From: "Its from Onion" > Date: Thu, 4 Oct 2007 11:30:06 -0500 > > These are mounted inside the Black SUV's you see in Presidential > motorcades and VIP caravans. You need the windshield wipers going to > clear the spent casings. They simultaneously fire 7.62mm bullets from > six barrels at up to 4000 rounds per minute. Talkin' 'bout road rage! When these are firing, they put out what looks like a "firehose" effect of rounds directed at the target. See http://www.mindfully.org/Technology/2006/M134-Gatling-Livermore3feb06.htm for a write up and a link (mid-right hand side) of the gun in action. Impressive! ------------------------------------------------------------------- I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.25] ([172.28.128.25]:18025 "EHLO ip02.ams.ftl.affinity.com") by ams002.ftl.affinity.com with ESMTP id S476370AbXJDS0e; Thu, 4 Oct 2007 14:26:34 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAI7NBEdA6aapi2dsb2JhbACCPDWLRwEBCQIGIgU Received: from py-out-1314.google.com ([64.233.166.169]) by ip02.ams.ftl.affinity.com with ESMTP; 04 Oct 2007 14:26:10 -0400 Received: by py-out-1314.google.com with SMTP id p69so37564646pyb for ; Thu, 04 Oct 2007 11:26:08 -0700 (PDT) Received: by 10.35.73.10 with SMTP id a10mr1177886pyl.1191521781820; Thu, 04 Oct 2007 11:16:21 -0700 (PDT) Received: by 10.44.13.45 with SMTP id 45gr2028hsm; Thu, 04 Oct 2007 11:16:20 -0700 (PDT) X-Sender: reginald_curtis@hotmail.com X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.35.130.15 with SMTP id h15mr7776831pyn.1191521779009; Thu, 04 Oct 2007 11:16:19 -0700 (PDT) Received: from bay0-omc3-s8.bay0.hotmail.com (bay0-omc3-s8.bay0.hotmail.com [65.54.246.208]) by mx.google.com with ESMTP id v63si1671270pyh.2007.10.04.11.16.18; Thu, 04 Oct 2007 11:16:19 -0700 (PDT) Received-SPF: pass (google.com: domain of reginald_curtis@hotmail.com designates 65.54.246.208 as permitted sender) client-ip=65.54.246.208; Authentication-Results: mx.google.com; spf=pass (google.com: domain of reginald_curtis@hotmail.com designates 65.54.246.208 as permitted sender) smtp.mail=reginald_curtis@hotmail.com Received: from BAY120-W9 ([207.46.9.172]) by bay0-omc3-s8.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Thu, 4 Oct 2007 11:13:57 -0700 Message-ID: Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="_47293182-a139-4ca2-b60d-329e7f3c0742_" X-Originating-IP: [74.106.212.207] From: Reginald Curtis To: Subject: [TSCM-L] {2028} Re: VIP caravans in Presidential motorcades Date: Thu, 4 Oct 2007 18:13:56 +0000 Importance: Normal In-Reply-To: References: X-OriginalArrivalTime: 04 Oct 2007 18:13:57.0107 (UTC) FILETIME=[5476B430:01C806B2] Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,
These things have been life-savers from the days of "Spooky" and "Puff" in the VN era. When mounted on passenger vehicles the main concern is losing your power supply. I have always thought that it would be nice if the manufacturer offered an add-on kit that would allow the gun to be man-operated like the original model. Given today's metals and machining ability, it should not be much of a problem.
 
Another point in regard to facilities like Lawrence Livermore is the threat from the air. Presumably this has always been covered by some form of missile defense system. However, the problem here is the circumference of the no-fly zome around the facility. Perhaps, given the likely small radius of the no-fly zone a better protection would be a number of these guns in 20 mm. The use of 20 mm would also add back-up to the somewhat limited protection afforded by the more mobile 7.62 mm models. It would seem that once a terrorist group realized the facility was protected by 7.62 miniguns using depleted core ammo, it would up-grade the type of vehicle it would select to breach the defences.

Reg Curtis



From: aredandgold@msn.com
Subject: [TSCM-L] {2026} VIP caravans in Presidential motorcades
Date: Thu, 4 Oct 2007 11:30:06 -0500

 

These are mounted inside the Black SUV's you see in Presidential motorcades and VIP caravans.  You need the windshield wipers going to clear the spent casings. They simultaneously fire 7.62mm bullets from six barrels at up to 4000 rounds per minute. Talkin' 'bout road rage!  
 


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.26] ([172.28.128.26]:7321 "EHLO ip03.ams.ftl.affinity.com") by ams006.ftl.affinity.com with ESMTP id S382139AbXJDVun; Thu, 4 Oct 2007 17:50:43 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAACL9BEdA6aL2i2dsb2JhbACOOAEBAQgEBCQF Received: from nz-out-0708.google.com ([64.233.162.246]) by ip03.ams.ftl.affinity.com with ESMTP; 04 Oct 2007 17:50:43 -0400 Received: by nz-out-0708.google.com with SMTP id q60so135874nzb for ; Thu, 04 Oct 2007 14:50:43 -0700 (PDT) Received: by 10.35.20.16 with SMTP id x16mr1249367pyi.1191531950510; Thu, 04 Oct 2007 14:05:50 -0700 (PDT) Received: by 10.44.53.36 with SMTP id b36gr2029hsa; Thu, 04 Oct 2007 14:04:50 -0700 (PDT) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.36.119.14 with SMTP id r14mr985798nzc.1191531888017; Thu, 04 Oct 2007 14:04:48 -0700 (PDT) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id h71si1764093nzf.2007.10.04.14.04.47; Thu, 04 Oct 2007 14:04:48 -0700 (PDT) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id AEB43502C8C64 for ; Thu, 4 Oct 2007 17:04:46 -0400 (EDT) Received: from ratbastard.strikenet.vpn (unknown [192.168.3.195]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by aacompsec.com (Postfix) with ESMTP id 0DF53502C8E8B for ; Thu, 4 Oct 2007 16:59:45 -0400 (EDT) Received: from ratbastard.strikenet.vpn (localhost [127.0.0.1]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ratbastard.strikenet.vpn (Postfix) with ESMTP id 4DA301A0BD7FC for ; Thu, 4 Oct 2007 16:59:39 -0400 (EDT) Received: from [127.0.0.1] (unknown [192.168.3.125]) by ratbastard.strikenet.vpn (Postfix) with ESMTP id ABBE81A0BD7FC for ; Thu, 4 Oct 2007 16:59:34 -0400 (EDT) Message-ID: <47055436.5080008@phreaker.net> Date: Thu, 04 Oct 2007 16:59:34 -0400 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2029} Re: VIP caravans in Presidential motorcades References: <200710041725.l94HPis4018268@mailhub.Cadence.COM> In-Reply-To: <200710041725.l94HPis4018268@mailhub.Cadence.COM> X-AAC-KTE-LTE-MailScanner-Watermark: 1192136378.06491@R7qnmZGf1mH00GNbkkjzjg X-AAC-KTE-LTE-MailScanner-Watermark: 1192136385.61435@7nYYZ8gVrweTuPDlhDBM3g Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Problem is, most of Livermore's security incidents, like Sandia are internal and the guns aren't much help there. Gregory Hicks wrote: > >> From: "Its from Onion" >> Date: Thu, 4 Oct 2007 11:30:06 -0500 >> >> These are mounted inside the Black SUV's you see in Presidential >> motorcades and VIP caravans. You need the windshield wipers going to >> clear the spent casings. They simultaneously fire 7.62mm bullets from >> six barrels at up to 4000 rounds per minute. Talkin' 'bout road rage! > > When these are firing, they put out what looks like a "firehose" effect > of rounds directed at the target. > > See > http://www.mindfully.org/Technology/2006/M134-Gatling-Livermore3feb06.htm > for a write up and a link (mid-right hand side) of the gun in action. > > Impressive! > > ------------------------------------------------------------------- > I am perfectly capable of learning from my mistakes. I will surely > learn a great deal today. > > "A democracy is a sheep and two wolves deciding on what to have for > lunch. Freedom is a well armed sheep contesting the results of the > decision." > > "The best we can hope for concerning the people at large is that they > be properly armed." --Alexander Hamilton > > > > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:44861 "EHLO ip04.ams.ftl.affinity.com") by ams003.ftl.affinity.com with ESMTP id S376514AbXJDWXX; Thu, 4 Oct 2007 18:23:23 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAF8EBUfRVZL3mGdsb2JhbACOOAEBAQEHBAYnlGI Received: from wa-out-0708.google.com ([209.85.146.247]) by ip04.ams.ftl.affinity.com with ESMTP; 04 Oct 2007 18:23:21 -0400 Received: by wa-out-0708.google.com with SMTP id j19so117448waf for ; Thu, 04 Oct 2007 15:23:20 -0700 (PDT) Received: by 10.115.61.1 with SMTP id o1mr761588wak.1191533928376; Thu, 04 Oct 2007 14:38:48 -0700 (PDT) Received: by 10.44.53.36 with SMTP id b36gr2030hsa; Thu, 04 Oct 2007 14:38:42 -0700 (PDT) X-Sender: ghicks@cadence.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.23.10 with SMTP id 10mr1030539nzw.1191533921057; Thu, 04 Oct 2007 14:38:41 -0700 (PDT) Received: from mx-sanjose.cadence.com (mx-sanjose.Cadence.COM [158.140.2.60]) by mx.google.com with ESMTP id k36si3348222waf.2007.10.04.14.38.40; Thu, 04 Oct 2007 14:38:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of ghicks@cadence.com designates 158.140.2.60 as permitted sender) client-ip=158.140.2.60; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of ghicks@cadence.com designates 158.140.2.60 as permitted sender) smtp.mail=ghicks@cadence.com Received: from mailhub.Cadence.COM (localhost [127.0.0.1]) by mx-sanjose.cadence.com (8.12.9/8.12.9) with ESMTP id l94LdGsY026012; Thu, 4 Oct 2007 14:39:16 -0700 (PDT) Received: from metis (localhost [127.0.0.1]) by mailhub.Cadence.COM (8.12.8/8.8.5) with SMTP id l94Lccs4025092; Thu, 4 Oct 2007 14:38:38 -0700 (PDT) Message-Id: <200710042138.l94Lccs4025092@mailhub.Cadence.COM> Date: Thu, 4 Oct 2007 14:38:38 -0700 (PDT) From: Gregory Hicks Reply-To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2030} Re: VIP caravans in Presidential motorcades To: TSCM-L2006@googlegroups.com, kondrak@phreaker.net Mime-Version: 1.0 Content-Type: TEXT/plain; charset=ISO-8859-1 Content-MD5: pNHG/1w5bQ3RSa5aCjR3AQ== X-Mailer: dtmail 1.3.0 @(#)CDE Version 1.4.8 SunOS 5.8 sun4u sparc X-Received: By mx-sanjose.cadence.com as l94LdGsY026012 at Thu Oct 4 14:39:16 2007 Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , > Date: Thu, 04 Oct 2007 16:59:34 -0400 > From: kondrak > To: TSCM-L2006@googlegroups.com > Subject: [TSCM-L] {2029} Re: VIP caravans in Presidential motorcades > X-AAC-KTE-LTE-MailScanner-Watermark: 1192136378.06491@R7qnmZGf1mH00GNbkkjzjg > X-AAC-KTE-LTE-MailScanner-Watermark: 1192136385.61435@7nYYZ8gVrweTuPDlhDBM3g > > > Problem is, most of Livermore's security incidents, like Sandia are > internal and the guns aren't much help there. This is true. But the main reason for the link was the reference to the video... Here (changed): http://216.140.44.191/highlight.wmv http://www.videosift.com/video/Helicopter-Gunship-Holy-crap-Thats-some-heavy-firepower http://military.discovery.com/interactives/arsenal/minigun/videoplayer.html http://www.tv.com/uservideos/?action=video_player&id=JXNglzus5bgEvT7d > Gregory Hicks wrote: > > > >> From: "Its from Onion" > >> Date: Thu, 4 Oct 2007 11:30:06 -0500 > >> > >> These are mounted inside the Black SUV's you see in Presidential > >> motorcades and VIP caravans. You need the windshield wipers going to > >> clear the spent casings. They simultaneously fire 7.62mm bullets from > >> six barrels at up to 4000 rounds per minute. Talkin' 'bout road rage! > > > > When these are firing, they put out what looks like a "firehose" effect > > of rounds directed at the target. > > > > See > > http://www.mindfully.org/Technology/2006/M134-Gatling-Livermore3feb06.htm > > for a write up and a link (mid-right hand side) of the gun in action. > > > > Impressive! > > > > ------------------------------------------------------------------- > > I am perfectly capable of learning from my mistakes. I will surely > > learn a great deal today. > > > > "A democracy is a sheep and two wolves deciding on what to have for > > lunch. Freedom is a well armed sheep contesting the results of the > > decision." > > > > "The best we can hope for concerning the people at large is that they > > be properly armed." --Alexander Hamilton > > > > > > > > > > > > > > > ------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 San Jose, CA 95134 I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:716 "EHLO ip04.ams.ftl.affinity.com") by ams014.ftl.affinity.com with ESMTP id S369607AbXJECgV; Thu, 4 Oct 2007 22:36:21 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAHY/BUdA6aL1kmdsb2JhbACOOAIBAQcEBBMW Received: from wa-out-0708.google.com ([209.85.146.247]) by ip04.ams.ftl.affinity.com with ESMTP; 04 Oct 2007 22:36:21 -0400 Received: by wa-out-0708.google.com with SMTP id j19so260281waf for ; Thu, 04 Oct 2007 19:36:20 -0700 (PDT) Received: by 10.114.107.19 with SMTP id f19mr816961wac.1191551771414; Thu, 04 Oct 2007 19:36:11 -0700 (PDT) Received: by 10.44.53.36 with SMTP id b36gr2031hsa; Thu, 04 Oct 2007 19:35:59 -0700 (PDT) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.35.37.18 with SMTP id p18mr8756137pyj.1191551757986; Thu, 04 Oct 2007 19:35:57 -0700 (PDT) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id a28si2031021pye.2007.10.04.19.35.55; Thu, 04 Oct 2007 19:35:57 -0700 (PDT) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id D34E750061E2D for ; Thu, 4 Oct 2007 22:35:54 -0400 (EDT) Received: from ratbastard.strikenet.vpn (unknown [192.168.3.195]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by aacompsec.com (Postfix) with ESMTP id E43325007C558 for ; Thu, 4 Oct 2007 22:30:51 -0400 (EDT) Received: from ratbastard.strikenet.vpn (localhost [127.0.0.1]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ratbastard.strikenet.vpn (Postfix) with ESMTP id 15E121A85DCFB for ; Thu, 4 Oct 2007 22:30:50 -0400 (EDT) Received: from [127.0.0.1] (unknown [192.168.3.125]) by ratbastard.strikenet.vpn (Postfix) with ESMTP id C0B051A85DCFB for ; Thu, 4 Oct 2007 22:30:45 -0400 (EDT) Message-ID: <4705A1D5.3010807@phreaker.net> Date: Thu, 04 Oct 2007 22:30:45 -0400 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2031} Re: VIP caravans in Presidential motorcades References: <200710042138.l94Lccs4025092@mailhub.Cadence.COM> In-Reply-To: <200710042138.l94Lccs4025092@mailhub.Cadence.COM> X-AAC-KTE-LTE-MailScanner-Watermark: 1192156248.97682@AFPGmkhZv+7MWoPuHt6Wcw X-AAC-KTE-LTE-MailScanner-Watermark: 1192156253.75184@ci0lVQt6Ubkvq0YYQVWpLQ Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Oh seen it, love it, make one hellova deer gun. hahaha.. Gregory Hicks wrote: > >> Date: Thu, 04 Oct 2007 16:59:34 -0400 >> From: kondrak >> To: TSCM-L2006@googlegroups.com >> Subject: [TSCM-L] {2029} Re: VIP caravans in Presidential motorcades >> X-AAC-KTE-LTE-MailScanner-Watermark: 1192136378.06491@R7qnmZGf1mH00GNbkkjzjg >> X-AAC-KTE-LTE-MailScanner-Watermark: 1192136385.61435@7nYYZ8gVrweTuPDlhDBM3g >> >> >> Problem is, most of Livermore's security incidents, like Sandia are >> internal and the guns aren't much help there. > > This is true. But the main reason for the link was the reference to > the video... Here (changed): > > http://216.140.44.191/highlight.wmv > > http://www.videosift.com/video/Helicopter-Gunship-Holy-crap-Thats-some-heavy-firepower > > http://military.discovery.com/interactives/arsenal/minigun/videoplayer.html > > http://www.tv.com/uservideos/?action=video_player&id=JXNglzus5bgEvT7d > >> Gregory Hicks wrote: >>>> From: "Its from Onion" >>>> Date: Thu, 4 Oct 2007 11:30:06 -0500 >>>> >>>> These are mounted inside the Black SUV's you see in Presidential >>>> motorcades and VIP caravans. You need the windshield wipers going to >>>> clear the spent casings. They simultaneously fire 7.62mm bullets from >>>> six barrels at up to 4000 rounds per minute. Talkin' 'bout road rage! >>> When these are firing, they put out what looks like a "firehose" effect >>> of rounds directed at the target. >>> >>> See >>> http://www.mindfully.org/Technology/2006/M134-Gatling-Livermore3feb06.htm >>> for a write up and a link (mid-right hand side) of the gun in action. >>> >>> Impressive! >>> >>> ------------------------------------------------------------------- >>> I am perfectly capable of learning from my mistakes. I will surely >>> learn a great deal today. >>> >>> "A democracy is a sheep and two wolves deciding on what to have for >>> lunch. Freedom is a well armed sheep contesting the results of the >>> decision." >>> >>> "The best we can hope for concerning the people at large is that they >>> be properly armed." --Alexander Hamilton >>> >>> >>> >> > > ------------------------------------------------------------------- > Gregory Hicks | Principal Systems Engineer > Cadence Design Systems | Direct: 408.576.3609 > 555 River Oaks Pkwy M/S 6B1 > San Jose, CA 95134 > > I am perfectly capable of learning from my mistakes. I will surely > learn a great deal today. > > "A democracy is a sheep and two wolves deciding on what to have for > lunch. Freedom is a well armed sheep contesting the results of the > decision." > > "The best we can hope for concerning the people at large is that they > be properly armed." --Alexander Hamilton > > > > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.24] ([172.28.128.24]:13814 "EHLO ip01.ams.ftl.affinity.com") by ams016.ftl.affinity.com with ESMTP id S415893AbXJFAmC; Fri, 5 Oct 2007 20:42:02 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAALZ2BkfRVZL6mGdsb2JhbACCcYtHAQEBAQcCCBEW Received: from wa-out-0708.google.com ([209.85.146.250]) by ip01.ams.ftl.affinity.com with ESMTP; 05 Oct 2007 20:41:56 -0400 Received: by wa-out-0708.google.com with SMTP id j19so1329383waf for ; Fri, 05 Oct 2007 17:41:58 -0700 (PDT) Received: by 10.115.16.1 with SMTP id t1mr1116910wai.1191631309915; Fri, 05 Oct 2007 17:41:49 -0700 (PDT) Received: by 10.44.187.4 with SMTP id k4gr2032hsf; Fri, 05 Oct 2007 17:41:46 -0700 (PDT) X-Sender: david_johnrobinson@hotmail.com X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.35.62.1 with SMTP id p1mr7090793pyk.1191499894344; Thu, 04 Oct 2007 05:11:34 -0700 (PDT) Received: from bay0-omc3-s8.bay0.hotmail.com (bay0-omc3-s8.bay0.hotmail.com [65.54.246.208]) by mx.google.com with ESMTP id v36si2668265wah.2007.10.04.05.11.34; Thu, 04 Oct 2007 05:11:34 -0700 (PDT) Received-SPF: pass (google.com: domain of david_johnrobinson@hotmail.com designates 65.54.246.208 as permitted sender) client-ip=65.54.246.208; Authentication-Results: mx.google.com; spf=pass (google.com: domain of david_johnrobinson@hotmail.com designates 65.54.246.208 as permitted sender) smtp.mail=david_johnrobinson@hotmail.com Received: from BAY101-W20 ([64.4.56.120]) by bay0-omc3-s8.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Thu, 4 Oct 2007 05:11:33 -0700 Message-ID: Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="_abfb8a03-5a52-4802-8f45-56765466928b_" X-Originating-IP: [82.33.73.92] From: David-john Robinson To: Subject: [TSCM-L] {2032} Re: cell phones Date: Thu, 4 Oct 2007 12:11:33 +0000 Importance: Normal X-OriginalArrivalTime: 04 Oct 2007 12:11:33.0665 (UTC) FILETIME=[B45CC110:01C8067F] X-Google-Approved: grainger01982@gmail.com via web at 2007-10-06 00:41:45 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,
Just. think about it for a second. You turn your cell phone off and go to sleep. When you wake up there is a message , missed call, so yes even when the phone is off it still sends a signal saying I am here.
I hear what people are saying about defeating it , but as soon as you use the phone , there is your location big and bold. SO best way to defeat it , don,t use a cell phone , the world still goes on , try it.
By the way, it is technically very easy to intercept the signal , hear both sides of the call and via triangulation , get a location. In USA you can do this for pennies from radio shack, here in UK a bit harder and more expensive because of rolling algorithms and high end encryption. BUT be warned , if you do it you will be caught and be imprisoned immediatly.This is not for PIs and wanabes.
If you are being tracked via your cell phone ask yourself who would do it , and is it worth upsetting them , my answer no.
Best regards David J Robinson +44 (0)1985 300 179
CEO
Department Q
 
 
 
 
 
 
 
 
Subject: [TSCM-L] {2025} Re: cell phones
Date: Thu, 4 Oct 2007 06:47:40 -0500
From: Ed.Steinmetz@compucom.com
To: TSCM-L2006@googlegroups.com


I have found the easiest way to solve a problem is to watch those most impacted by it.

 

When my techs were leaving the job ìearlyî,  they put their cell phones in a metal box to block incoming and outgoing signals (GPS & Cell)

 

Worked Well !

 

Ed

 


From: TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com] On Behalf Of Tom Valos
Sent: Wednesday, October 03, 2007 11:24 AM
To: TSCM-L2006@googlegroups.com
Subject: [TSCM-L] {2023} cell phones

 

questions;

 

i have been told that you can be followed if you have your cell phone on you or near by as someone can track you via the gps system contained within....is this correct ?

 

also if you turn off the phone and REMOVE the battery i have also been told they can still follow you somehow is this also true.......

 

is there any way to FIGHT THIS OR DISABLE THIS WITHOUT THE OTHER PARTY KNOWING IT.....

 

thanks

 

tom



--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.24] ([172.28.128.24]:60531 "EHLO ip01.ams.ftl.affinity.com") by ams016.ftl.affinity.com with ESMTP id S415923AbXJFAmX; Fri, 5 Oct 2007 20:42:23 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAALZ2BkfRVZL6mGdsb2JhbACCcYZohF8BAQEBBwIIERY Received: from wa-out-0708.google.com ([209.85.146.250]) by ip01.ams.ftl.affinity.com with ESMTP; 05 Oct 2007 20:42:18 -0400 Received: by wa-out-0708.google.com with SMTP id j19so1329383waf for ; Fri, 05 Oct 2007 17:42:21 -0700 (PDT) Received: by 10.115.16.1 with SMTP id t1mr1116975wai.1191631332153; Fri, 05 Oct 2007 17:42:12 -0700 (PDT) Received: by 10.44.112.30 with SMTP id k30gr2033hsc; Fri, 05 Oct 2007 17:42:02 -0700 (PDT) X-Sender: arriolaramon@yahoo.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.62.1 with SMTP id p1mr7213454pyk.1191503785870; Thu, 04 Oct 2007 06:16:25 -0700 (PDT) Received: from smtp125.plus.mail.mud.yahoo.com (smtp125.plus.mail.mud.yahoo.com [209.191.106.156]) by mx.google.com with SMTP id z53si1507855pyg.2007.10.04.06.16.25; Thu, 04 Oct 2007 06:16:25 -0700 (PDT) Received-SPF: pass (google.com: domain of arriolaramon@yahoo.com designates 209.191.106.156 as permitted sender) client-ip=209.191.106.156; DomainKey-Status: good (test mode) Authentication-Results: mx.google.com; spf=pass (google.com: domain of arriolaramon@yahoo.com designates 209.191.106.156 as permitted sender) smtp.mail=arriolaramon@yahoo.com; domainkeys=pass (test mode) header.From=arriolaramon@yahoo.com Received: (qmail 98420 invoked from network); 4 Oct 2007 13:16:24 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Received:X-YMail-OSG:From:To:References:In-Reply-To:Subject:Date:Message-ID:MIME-Version:Content-Type:X-Mailer:thread-index:Content-Language; b=rWOAj6EnLJwyOkUKUqnZq/e+KvxggIDhYsEdVUjGTgGA6mQASR4jRWfcV/Kyd5lNh1zOWX6QG4xlMjH2KGPJfc7pHQq5o8cLnBvU2UeW8CS5WZxyRKXsKGwW+RB7myQDZgbOljNvcTtbe+kjs4IGH09xlk1NqKndtAmdB+wnflY= ; Received: from unknown (HELO HPRAO) (arriolaramon@200.77.160.220 with login) by smtp125.plus.mail.mud.yahoo.com with SMTP; 4 Oct 2007 13:16:24 -0000 X-YMail-OSG: bbpnYP0VM1m6nAL0H2Jxvf6vWB4TqtzZ4d2HDgkU9rGZM_TEV6fXiXqxMVhL.wsjdHBSkspPmeT4D8AB5wUSc4QPVXP0FDCGvrN.V8SJ1CMtz1v5rD8- Illegal-Object: Syntax error in From: address found on ams016.ftl.affinity.com: From: Ramon F. Arriola Otero ^-missing end of mailbox From: To: References: <003e01c805d1$772757f0$6401a8c0@tom> <05226F788C3E6046B9F592CDC4995678607048@SP099EXV01.compucom.local> In-Reply-To: <05226F788C3E6046B9F592CDC4995678607048@SP099EXV01.compucom.local> Subject: [TSCM-L] {2033} Re: cell phones Date: Thu, 4 Oct 2007 08:16:18 -0500 Message-ID: <002101c80688$c09f1870$41dd4950$@com> Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0022_01C8065E.D7C91070" X-Mailer: Microsoft Office Outlook 12.0 thread-index: AcgGUEDUvnR5u2GOSLiiM6PNleTwcAAK6IRQAAMJenA= Content-Language: es-mx X-Google-Approved: grainger01982@gmail.com via web at 2007-10-06 00:42:01 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

 

 

Hello, the following product would serve to you.

Greetings

 

 

 

http://testshopsite.paraben-forensics.com//catalog/product_info.php?products_id=173&osCsid=c1df6e7207c81d0fc707e1ceb6d35c4c

 

 

Ramon Arriola

www.c3mx.com

 

 

De: TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com] En nombre de Ed.Steinmetz@compucom.com
Enviado el: Jueves, 04 de Octubre de 2007 06:48 a.m.
Para: TSCM-L2006@googlegroups.com
Asunto: [TSCM-L] {2025} Re: cell phones

 

I have found the easiest way to solve a problem is to watch those most impacted by it.

 

When my techs were leaving the job “early”,  they put their cell phones in a metal box to block incoming and outgoing signals (GPS & Cell)

 

Worked Well !

 

Ed

 


From: TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com] On Behalf Of Tom Valos
Sent: Wednesday, October 03, 2007 11:24 AM
To: TSCM-L2006@googlegroups.com
Subject: [TSCM-L] {2023} cell phones

 

questions;

 

i have been told that you can be followed if you have your cell phone on you or near by as someone can track you via the gps system contained within....is this correct ?

 

also if you turn off the phone and REMOVE the battery i have also been told they can still follow you somehow is this also true.......

 

is there any way to FIGHT THIS OR DISABLE THIS WITHOUT THE OTHER PARTY KNOWING IT.....

 

thanks

 

tom

 


 


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.24] ([172.28.128.24]:1179 "EHLO ip01.ams.ftl.affinity.com") by ams019.ftl.affinity.com with ESMTP id S969509AbXJFAmb; Fri, 5 Oct 2007 20:42:31 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAALZ2BkfRVZL1kmdsb2JhbACCPTSLRwEBAQEHBAQTFg Received: from wa-out-0708.google.com ([209.85.146.250]) by ip01.ams.ftl.affinity.com with ESMTP; 05 Oct 2007 20:42:25 -0400 Received: by wa-out-0708.google.com with SMTP id j19so1329383waf for ; Fri, 05 Oct 2007 17:42:28 -0700 (PDT) Received: by 10.114.200.2 with SMTP id x2mr1124592waf.1191631339147; Fri, 05 Oct 2007 17:42:19 -0700 (PDT) Received: by 10.44.187.4 with SMTP id k4gr2034hsf; Fri, 05 Oct 2007 17:42:16 -0700 (PDT) X-Sender: newsspy@sbcglobal.net X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.37.18 with SMTP id p18mr8634035pyj.1191548016958; Thu, 04 Oct 2007 18:33:36 -0700 (PDT) Received: from web81207.mail.mud.yahoo.com (web81207.mail.mud.yahoo.com [68.142.199.111]) by mx.google.com with SMTP id v63si1979208pyh.2007.10.04.18.33.36; Thu, 04 Oct 2007 18:33:36 -0700 (PDT) Received-SPF: neutral (google.com: 68.142.199.111 is neither permitted nor denied by domain of newsspy@sbcglobal.net) client-ip=68.142.199.111; DomainKey-Status: good (test mode) Authentication-Results: mx.google.com; spf=neutral (google.com: 68.142.199.111 is neither permitted nor denied by domain of newsspy@sbcglobal.net) smtp.mail=newsspy@sbcglobal.net; domainkeys=pass (test mode) header.From=newsspy@sbcglobal.net Received: (qmail 90885 invoked by uid 60001); 5 Oct 2007 01:33:35 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=sbcglobal.net; h=X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:MIME-Version:Content-Type:Message-ID; b=TkPftWthiN0GHeGPnVFPmgK+O52pxR6X1FGHPcsmWRsuffZuHadVlUUl2NvF/kzaoFzh/c4l5+o8kdEzIK08u70venO95wjxfmrcudeu6BKx3Lz7Jbcd2ZRv1S9El9lrjDnb4Be5+UcksBi0WFq5ldYckBF4AnRtIHTXirvfnWs=; X-YMail-OSG: 2fY_1A0VM1l28Re_VBr9uJIgqnk0OK1slXIcecOYt2bQL34006fRU2GKYPsLX5uBz6.fJATcqHoeQGxlAaJGS72rnzGI Received: from [75.214.185.12] by web81207.mail.mud.yahoo.com via HTTP; Thu, 04 Oct 2007 18:33:35 PDT X-Mailer: YahooMailRC/651.50 YahooMailWebService/0.7.134 Date: Thu, 4 Oct 2007 18:33:35 -0700 (PDT) From: Eric Leonard Subject: [TSCM-L] {2034} Re: VIP caravans in Presidential motorcades To: TSCM-L2006@googlegroups.com Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="0-182346986-1191548015=:90396" Message-ID: <700876.90396.qm@web81207.mail.mud.yahoo.com> X-Google-Approved: grainger01982@gmail.com via web at 2007-10-06 00:42:15 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

I'm not sure why I feel compelled to correct the record on this, but here goes:
 
The gun doesn't fire simultaneously from six barrels. It fires from one barrel at a time, and most have five barrels. As the barrel assembly is rotated by the electric motor each barrel is in a different state of affairs -- firing, ejecting cartridge case, loading, etc.
 
They're magical little machines and lots of fun to tinker with.
 
-EL in LA.
 


 
----- Original Message ----
From: Reginald Curtis <reginald_curtis@hotmail.com>
To: tscm-l2006@googlegroups.com
Sent: Thursday, October 4, 2007 11:13:56 AM
Subject: [TSCM-L] {2028} Re: VIP caravans in Presidential motorcades


These things have been life-savers from the days of "Spooky" and "Puff" in the VN era. When mounted on passenger vehicles the main concern is losing your power supply. I have always thought that it would be nice if the manufacturer offered an add-on kit that would allow the gun to be man-operated like the original model. Given today's metals and machining ability, it should not be much of a problem.
 
Another point in regard to facilities like Lawrence Livermore is the threat from the air. Presumably this has always been covered by some form of missile defense system. However, the problem here is the circumference of the no-fly zome around the facility. Perhaps, given the likely small radius of the no-fly zone a better protection would be a number of these guns in 20 mm. The use of 20 mm would also add back-up to the somewhat limited protection afforded by the more mobile 7.62 mm models. It would seem that once a terrorist group realized the facility was protected by 7.62 miniguns using depleted core ammo, it would up-grade the type of vehicle it would select to breach the defences.

Reg Curtis


From: aredandgold@msn.com
Subject: [TSCM-L] {2026} VIP caravans in Presidential motorcades
Date: Thu, 4 Oct 2007 11:30:06 -0500

 

These are mounted inside the Black SUV's you see in Presidential motorcades and VIP caravans.  You need the windshield wipers going to clear the spent casings. They simultaneously fire 7.62mm bullets from six barrels at up to 4000 rounds per minute. Talkin' 'bout road rage!  
 





--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.26] ([172.28.128.26]:6750 "EHLO ip03.ams.ftl.affinity.com") by ams020.ftl.affinity.com with ESMTP id S485575AbXJFAn2; Fri, 5 Oct 2007 20:43:28 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAALZ2BkdA6aaui2dsb2JhbACOOAEBAQgEBBMRBQ Received: from py-out-1314.google.com ([64.233.166.174]) by ip03.ams.ftl.affinity.com with ESMTP; 05 Oct 2007 20:43:28 -0400 Received: by py-out-1314.google.com with SMTP id p69so2995615pyb for ; Fri, 05 Oct 2007 17:43:28 -0700 (PDT) Received: by 10.35.46.11 with SMTP id y11mr1862466pyj.1191631399178; Fri, 05 Oct 2007 17:43:19 -0700 (PDT) Received: by 10.44.187.4 with SMTP id k4gr2035hsf; Fri, 05 Oct 2007 17:43:07 -0700 (PDT) X-Sender: chrishill5@hotmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.33.6 with SMTP id g6mr834630nzg.1191524986781; Thu, 04 Oct 2007 12:09:46 -0700 (PDT) Received: from bay0-omc1-s3.bay0.hotmail.com (bay0-omc1-s3.bay0.hotmail.com [65.54.246.75]) by mx.google.com with ESMTP id v36si3233581wah.2007.10.04.12.09.46; Thu, 04 Oct 2007 12:09:46 -0700 (PDT) Received-SPF: pass (google.com: domain of chrishill5@hotmail.com designates 65.54.246.75 as permitted sender) client-ip=65.54.246.75; Authentication-Results: mx.google.com; spf=pass (google.com: domain of chrishill5@hotmail.com designates 65.54.246.75 as permitted sender) smtp.mail=chrishill5@hotmail.com Received: from hotmail.com ([10.6.59.21]) by bay0-omc1-s3.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Thu, 4 Oct 2007 12:09:46 -0700 Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Thu, 4 Oct 2007 12:09:46 -0700 Message-ID: Received: from 216.9.249.116 by BLU108-DAV11.phx.gbl with DAV; Thu, 04 Oct 2007 19:09:43 +0000 X-Originating-IP: [216.9.249.116] X-Originating-Email: [chrishill5@hotmail.com] X-Sender: chrishill5@hotmail.com X-rim-org-msg-ref-id: 324003719 Message-ID: <324003719-1191524981-cardhu_decombobulator_blackberry.rim.net-1187460405-@bxe122.bisx.prod.on.blackberry> Mime-Version: 1.0 Content-Type: text/plain; charset=windows-1252 Reply-To: TSCM-L2006@googlegroups.com X-Priority: Normal References: <200710041725.l94HPis4018268@mailhub.Cadence.COM> In-Reply-To: <200710041725.l94HPis4018268@mailhub.Cadence.COM> Sensitivity: Normal Importance: Normal To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2035} Re: VIP caravans in Presidential motorcades From: chrishill5@hotmail.com Date: Thu, 4 Oct 2007 19:09:43 +0000 X-OriginalArrivalTime: 04 Oct 2007 19:09:46.0017 (UTC) FILETIME=[2091D110:01C806BA] X-Google-Approved: grainger01982@gmail.com via web at 2007-10-06 00:43:06 Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , I saw one on the history channel that was robotic. The Vans passenger controlled it via a joystick and computer in the front seat. Sent from my BlackBerryÆ wireless device -----Original Message----- From: Gregory Hicks Date: Thu, 4 Oct 2007 10:25:44 To:TSCM-L2006@googlegroups.com Cc:aredandgold@msn.com Subject: [TSCM-L] {2027} Re: VIP caravans in Presidential motorcades > From: "Its from Onion" > Date: Thu, 4 Oct 2007 11:30:06 -0500 > > These are mounted inside the Black SUV's you see in Presidential > motorcades and VIP caravans. You need the windshield wipers going to > clear the spent casings. They simultaneously fire 7.62mm bullets from > six barrels at up to 4000 rounds per minute. Talkin' 'bout road rage! When these are firing, they put out what looks like a "firehose" effect of rounds directed at the target. See http://www.mindfully.org/Technology/2006/M134-Gatling-Livermore3feb06.htm for a write up and a link (mid-right hand side) of the gun in action. Impressive! ------------------------------------------------------------------- I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:1636 "EHLO ip03.ams.ftl.affinity.com") by ams013.ftl.affinity.com with ESMTP id S367248AbXJFAnx; Fri, 5 Oct 2007 20:43:53 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAALZ2BkdA6aaui2dsb2JhbACOOAEBAQgEBBMRBQ Received: from py-out-1314.google.com ([64.233.166.174]) by ip03.ams.ftl.affinity.com with ESMTP; 05 Oct 2007 20:43:49 -0400 Received: by py-out-1314.google.com with SMTP id p69so2995615pyb for ; Fri, 05 Oct 2007 17:43:49 -0700 (PDT) Received: by 10.35.81.2 with SMTP id i2mr1830032pyl.1191631420169; Fri, 05 Oct 2007 17:43:40 -0700 (PDT) Received: by 10.44.53.36 with SMTP id b36gr2036hsa; Fri, 05 Oct 2007 17:43:28 -0700 (PDT) X-Sender: goteborgbank@goteborg.cc X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.43.10 with SMTP id v10mr1548826pyj.1191586533999; Fri, 05 Oct 2007 05:15:33 -0700 (PDT) Received: by 57g2000hsv.googlegroups.com with HTTP; Fri, 05 Oct 2007 12:15:32 +0000 (UTC) X-IP: 192.121.232.252 From: Goteborgbank To: TSCM-L Professionals List Subject: [TSCM-L] {2036} Subject: Gothenburg Manufacturing Gateway Date: Fri, 05 Oct 2007 05:15:32 -0700 Message-ID: <1191586532.906210.51800@57g2000hsv.googlegroups.com> User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; Publiq),gzip(gfe),gzip(gfe) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Google-Approved: grainger01982@gmail.com via web at 2007-10-06 00:43:23 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , From: "Mr Roger K. Olsson" Reply-To: "Mr Roger K. Olsson" Gothenburg Manufacturing Gateway 19th-21th October 2007 Skrevet av Anonym, tor, 09/13/2007 - 09:44 Global Start: 10/19/2007 - 09:00 End: 10/21/2007 - 00:42 Timezone: Etc/GMT Promotion Film Production Gothenburg Manufacturing Gateway 19th-21th October 2007 Available International Promotion Package. Within this sort of in collaborative consulted production set there may be a integrate installement, that means a promotional presentation for the company in charge for a such campaign. Promotion production prize Eur 214,000 / Company / Organization. Opportunity within a long-term marketing investment in a worldwide project and production. Call 0046 (0) 705474830 Click to join mutualfundsassociation http://groups.yahoo.com/group/economist-exquisite --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- X-Symantec-TimeoutProtection: 0 Received: from [172.28.128.27] ([172.28.128.27]:64132 "EHLO ip04.ams.ftl.affinity.com") by ams008.ftl.affinity.com with ESMTP id S416829AbXJFArA; Fri, 5 Oct 2007 20:47:00 -0400 Received: from nz-out-0708.google.com ([64.233.162.250]) by ip04.ams.ftl.affinity.com with ESMTP; 05 Oct 2007 20:46:37 -0400 Received: by nz-out-0708.google.com with SMTP id q60so1722652nzb for ; Fri, 05 Oct 2007 17:46:36 -0700 (PDT) Received: by 10.36.23.14 with SMTP id 14mr2162705nzw.1191631579639; Fri, 05 Oct 2007 17:46:19 -0700 (PDT) Received: by 10.44.13.45 with SMTP id 45gr2037hsm; Fri, 05 Oct 2007 17:46:03 -0700 (PDT) X-Sender: ejmichaels@gmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.23.10 with SMTP id 10mr1849411nzw.1191596649943; Fri, 05 Oct 2007 08:04:09 -0700 (PDT) Received: from an-out-0708.google.com (an-out-0708.google.com [209.85.132.249]) by mx.google.com with ESMTP id x35si2031882nzg.2007.10.05.08.04.02; Fri, 05 Oct 2007 08:04:09 -0700 (PDT) Received-SPF: pass (google.com: domain of ejmichaels@gmail.com designates 209.85.132.249 as permitted sender) client-ip=209.85.132.249; Authentication-Results: mx.google.com; spf=pass (google.com: domain of ejmichaels@gmail.com designates 209.85.132.249 as permitted sender) smtp.mail=ejmichaels@gmail.com; dkim=pass (test mode) header.i=@gmail.com Received: by an-out-0708.google.com with SMTP id b36so172519ana for ; Fri, 05 Oct 2007 08:04:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:mime-version:content-type; bh=A0lMtdRZpe7NZPze/CCVH8DkIjo+FTY2i58PDVA+PqM=; b=avy8iCVCribBSNpw1ItC/IloGj3nEu/PBGbUzZ2JWjqh0mgONmOoI2gUTuBUNFqDdlMbMEyGmLTiccFCgxOF9Is9m20XhAUQdVoLLyC13XQBTR5JIKG4dNHDRwZAlvN72Bgff06ojUAqzZw5efVcSWl8uNMdaYIm4R9sgeXFJx4= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:to:subject:mime-version:content-type; b=ZS6oX1UJzvgXmOPFv7y7EmzcA/LehnVPHlQNR5J7dlzmWMlNvLxjBkNTabwAIleuW8FxcxG0Zu+ono/bYiJzq4ut4i4EaaArnkfI+aglc6IzKzK15p+jq4uQI+bRu/JhhiDLbl02swNdUGBi1G/rkioTiBxnxgjyZAcDrXaSCTE= Received: by 10.142.225.11 with SMTP id x11mr2607609wfg.1191596637636; Fri, 05 Oct 2007 08:03:57 -0700 (PDT) Received: by 10.142.222.13 with HTTP; Fri, 5 Oct 2007 08:03:56 -0700 (PDT) Message-ID: <995b0f820710050803k79a33985g99da22b778fb85d@mail.gmail.com> Date: Fri, 5 Oct 2007 11:03:56 -0400 From: "Edward Michaels" To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2037} ALERT!!! STUN GUN DISGUISED AS CELL PHONE Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="----=_Part_5735_18514662.1191596637266" X-Google-Approved: grainger01982@gmail.com via web at 2007-10-06 00:45:58 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , ALL:

Came in this AM from NCIS SA John McGuire ( the same one in the book "The Cell") who is also president of the 53 year old Tri-State Association of Criminal Investigators. Tri-State meets the first Thursday of every month at 1200 in the conference room of the Burlington County, NJ  Special Services School opposite the Philadelphia, PA NOAA weather facility on Woodlane Road in Mt. Holly, NJ..

Edward J. Michaels
Regional Marketing Director
Bowles Corporate Services
Voice,toll free: 1+888-810-5188 (USA only)
FAX,toll free: 1+888-810-5189 (USA only) 
Mobile:1+609-617-7766 (All callers)
E-mail:emichaels@bcs.ws (Copies to my Blackberry)
URL: http://www.bcs.ws




-----Original Message-----
From:   McGuire, John Joseph CIV NCIS [mailto:john.j.mcguire@navy.mil]
Sent:   Fri 10/5/2007 7:52 AM
To:     Agent John R. Santora; Agent Santo Bocchinfuso; Al Cross; Andrew McKeon; Anthony T. Greski, Jr; Anthony Zak; Bonnie Apone; Charles T. McManus; CWO Vince Contreras; Dave Ziegler ; David Mitchell; David Parker; Dennis McAnulty; Dennis McGuigan (E-mail); Det. Carol J. Cooper; Det.Paul F. Kelley; Detective Dawn Cooper; Detective Harold R. Pearl; Diane Jassman; Director Robert Dunlop; Director-SIU Michael D. Dickey; Doris Wilson; Ed Michaels; Fire Marshal Robert R. Rose; Fraud Analyst Andrew P. McKeon; Henry Herrera; Investigator Gerald E. Boylr; Investigator Hugh DiMauro; Investigator Kevin C. Walsh; Investigator Michael Korablau; Investigator Robert F. Sheehan; Investigator Thomas Baals; James F. Cuzzupe; James Rosell; Ken Fechter; Ken Wilson; Laymen R. Grant; Lee Lieber; Len Indelicato; Leonard Indelicato; Lt Brian J. Kelly; Lt Gary Gubbie; Michael B. McCloskey; Mickey Kerins (E-mail); Patrolman Daryl Caufield; Peter W. VanIderstine; PO Woody Spencer; Private Investigator Christopher Halscheid; Robert J. LaRatta; Robert Sheehan; Russell Denault; SA Anthony V. Luceri Jr; SA John McGuire; SA Terri Giorgio; SA Thomas Tamburello; Senior Investigator John R. Hurst; Senior Investigator Stephen M. Cesare; Sgt George Rochelle; Special Investigator Harry Taraskus; Special Investigator Jason Merola; Sr Investigator Robert F. Kraemer; Stanley Fayer; Stephen Hemphill; Steve Politowski; Willian T. Trump
Cc:    
Subject:        FW: concealed weapon alert!




SA John J. McGuire
Naval Criminal Investigative Service
Lakehurst, NJ
(c) 215 778 9039
(o) 732 323 2383
(o) 215 897 6665
john.j.mcguire@navy.mil


-----Original Message-----
From: Graf, Paul Charles CIV NCIS [mailto:paul.c.graf@navy.mil]
Sent: Thursday, October 04, 2007 11:13
To: Graf, Paul Charles CIV NCIS
Subject: concealed weapon alert!

<<Back of Stun Gun.jpg>> <<Side of Stun Gun.jpg>> <<Stun Gun.jpg>>
Good Morning all!

Attached are photos of a stun gun recovered by US Court Security
Officers at the Eagleton, MO Federal District Court Courthouse just last
month.  The stun gun was recovered from a purse of a woman trying to
enter the court!  The stun gun is remarkably well disguised to resemble
a cell phone.  Photos provided by USMS.

Be careful!
Best!
Paul

Paul C. Graf, Special Agent
US Naval Criminal Investigative Service (NCIS)
NCIS Brunswick
5450 Fitch Avenue, Naval Air Station
Brunswick, ME 04011
(W) 207-921-2437
(F) 207-725-2503
(C) 401-265-0240
(Nites) 207-798-7274
(E) paul.c.graf@navy.mil






 



--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Content-Type: image/jpeg Content-Disposition: inline; filename="Back of Stun Gun.jpg" X-Attachment-Id: 0.1 Attachment Converted: "c:\documents and settings\james m. atkinson\application data\qualcomm\eudora\attach\Back of Stun Gun3.jpg" Content-Type: image/jpeg Content-Disposition: inline; filename="Side of Stun Gun.jpg" X-Attachment-Id: 0.2 Attachment Converted: "c:\documents and settings\james m. atkinson\application data\qualcomm\eudora\attach\Side of Stun Gun3.jpg" Content-Type: image/jpeg Content-Disposition: inline; filename="Stun Gun.jpg" X-Attachment-Id: 0.3 Attachment Converted: "c:\documents and settings\james m. atkinson\application data\qualcomm\eudora\attach\Stun Gun3.jpg"Received: from [172.28.128.24] ([172.28.128.24]:39713 "EHLO ip01.ams.ftl.affinity.com") by ams018.ftl.affinity.com with ESMTP id S377247AbXJFDIC; Fri, 5 Oct 2007 23:08:02 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAG2YBkdA6aL3i2dsb2JhbACOOAEBAQgEBBMRBQ Received: from nz-out-0708.google.com ([64.233.162.247]) by ip01.ams.ftl.affinity.com with ESMTP; 05 Oct 2007 23:08:02 -0400 Received: by nz-out-0708.google.com with SMTP id q60so1815656nzb for ; Fri, 05 Oct 2007 20:08:01 -0700 (PDT) Received: by 10.36.74.19 with SMTP id w19mr2487908nza.1191640072522; Fri, 05 Oct 2007 20:07:52 -0700 (PDT) Received: by 10.45.7.20 with SMTP id k20gr2038hsi; Fri, 05 Oct 2007 20:07:48 -0700 (PDT) X-Sender: dan@geer.org X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.23.13 with SMTP id 13mr2816814nzw.1191640067007; Fri, 05 Oct 2007 20:07:47 -0700 (PDT) Received: from absinthe.tinho.net (absinthe.tinho.net [166.84.5.228]) by mx.google.com with ESMTP id v28si2316660nzb.2007.10.05.20.07.46; Fri, 05 Oct 2007 20:07:47 -0700 (PDT) Received-SPF: neutral (google.com: 166.84.5.228 is neither permitted nor denied by best guess record for domain of dan@geer.org) client-ip=166.84.5.228; Authentication-Results: mx.google.com; spf=neutral (google.com: 166.84.5.228 is neither permitted nor denied by best guess record for domain of dan@geer.org) smtp.mail=dan@geer.org Received: by absinthe.tinho.net (Postfix, from userid 126) id 2C6E733D28; Fri, 5 Oct 2007 23:07:46 -0400 (EDT) Received: from absinthe.tinho.net (localhost [127.0.0.1]) by absinthe.tinho.net (Postfix) with ESMTP id 2AD1E33CA4 for ; Fri, 5 Oct 2007 23:07:46 -0400 (EDT) From: dan@geer.org To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2038} Re: cell phones In-Reply-To: Your message of "Thu, 04 Oct 2007 12:11:33 -0000." Date: Fri, 05 Oct 2007 23:07:46 -0400 Message-Id: <20071006030746.2C6E733D28@absinthe.tinho.net> Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , I am beginning to think that when I next rob a bank that I should do it in the late afternoon after putting several fully-charged cell phones thought to be mine in a FedEx box here, a UPS box there, and a USPS box over yonder, all addressed to various random places along major highways in directions approximately opposite of where I plan to git. Maybe slip an EZ-Pass transponder into the overhead of a Greyhound bus while I'm at it. --dan --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:46759 "EHLO ip04.ams.ftl.affinity.com") by ams012.ftl.affinity.com with ESMTP id S360912AbXJFFCT; Sat, 6 Oct 2007 01:02:19 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAB60BkdA6aL6i2dsb2JhbACOOAEBAQgCBhMRBQ Received: from nz-out-0708.google.com ([64.233.162.250]) by ip04.ams.ftl.affinity.com with ESMTP; 06 Oct 2007 01:02:19 -0400 Received: by nz-out-0708.google.com with SMTP id q60so1893650nzb for ; Fri, 05 Oct 2007 22:02:18 -0700 (PDT) Received: by 10.36.66.6 with SMTP id o6mr2245067nza.1191646929761; Fri, 05 Oct 2007 22:02:09 -0700 (PDT) Received: by 10.44.69.72 with SMTP id r72gr2039hsa; Fri, 05 Oct 2007 22:02:00 -0700 (PDT) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.36.33.8 with SMTP id g8mr2854605nzg.1191646919299; Fri, 05 Oct 2007 22:01:59 -0700 (PDT) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id 20si2304733nzu.2007.10.05.22.01.55; Fri, 05 Oct 2007 22:01:59 -0700 (PDT) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id 3C5BE502C73E1 for ; Sat, 6 Oct 2007 01:01:54 -0400 (EDT) Received: from ratbastard.strikenet.vpn (unknown [192.168.3.195]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by aacompsec.com (Postfix) with ESMTP id 2B92E502C6490 for ; Sat, 6 Oct 2007 00:56:52 -0400 (EDT) Received: from ratbastard.strikenet.vpn (localhost [127.0.0.1]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ratbastard.strikenet.vpn (Postfix) with ESMTP id 333C61A028692 for ; Sat, 6 Oct 2007 00:56:50 -0400 (EDT) Received: from [127.0.0.1] (unknown [192.168.3.125]) by ratbastard.strikenet.vpn (Postfix) with ESMTP id E2B711A028692 for ; Sat, 6 Oct 2007 00:56:46 -0400 (EDT) Message-ID: <4707158E.70403@phreaker.net> Date: Sat, 06 Oct 2007 00:56:46 -0400 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2039} Re: VIP caravans in Presidential motorcades References: <700876.90396.qm@web81207.mail.mud.yahoo.com> In-Reply-To: <700876.90396.qm@web81207.mail.mud.yahoo.com> X-AAC-KTE-LTE-MailScanner-Watermark: 1192251409.0667@UTY0+VKqGQr2OvyPQ8mMbg X-AAC-KTE-LTE-MailScanner-Watermark: 1192251413.11594@cFFFgcivMpWTlVZsPmi53w Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Theres plans to build your own with .22 rifle barrels, solenoids and a 12v battery on the internet. Eric Leonard wrote: > > I'm not sure why I feel compelled to correct the record on this, but > here goes: > > The gun doesn't fire simultaneously from six barrels. It fires from one > barrel at a time, and most have five barrels. As the barrel assembly is > rotated by the electric motor each barrel is in a different state > of affairs -- firing, ejecting cartridge case, loading, etc. > > They're magical little machines and lots of fun to tinker with. > > -EL in LA. > > > > > ----- Original Message ---- > From: Reginald Curtis > To: tscm-l2006@googlegroups.com > Sent: Thursday, October 4, 2007 11:13:56 AM > Subject: [TSCM-L] {2028} Re: VIP caravans in Presidential motorcades > > > These things have been life-savers from the days of "Spooky" and "Puff" > in the VN era. When mounted on passenger vehicles the main concern is > losing your power supply. I have always thought that it would be nice if > the manufacturer offered an add-on kit that would allow the gun to be > man-operated like the original model. Given today's metals and machining > ability, it should not be much of a problem. > > Another point in regard to facilities like Lawrence Livermore is > the threat from the air. Presumably this has always been covered by some > form of missile defense system. However, the problem here is the > circumference of the no-fly zome around the facility. Perhaps, given the > likely small radius of the no-fly zone a better protection would be a > number of these guns in 20 mm. The use of 20 mm would also add back-up > to the somewhat limited protection afforded by the more mobile 7.62 mm > models. It would seem that once a terrorist group realized the facility > was protected by 7.62 miniguns using depleted core ammo, it would > up-grade the type of vehicle it would select to breach the defences. > > *Reg Curtis* > > > From: aredandgold@msn.com > Subject: [TSCM-L] {2026} VIP caravans in Presidential motorcades > Date: Thu, 4 Oct 2007 11:30:06 -0500 > > > > These are mounted inside the Black SUV's you see in Presidential > motorcades and VIP caravans. You need the windshield wipers going > to clear the spent casings. They simultaneously fire 7.62mm bullets > from six barrels at up to 4000 rounds per minute. Talkin' 'bout road > rage! > > > > > > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:60094 "EHLO ip04.ams.ftl.affinity.com") by ams020.ftl.affinity.com with ESMTP id S360351AbXJHQ3r; Mon, 8 Oct 2007 12:29:47 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: Ao8CAHj3CUfRVZL3mGdsb2JhbACCOzaLUgIBAQcEBhEW Received: from wa-out-0708.google.com ([209.85.146.247]) by ip04.ams.ftl.affinity.com with ESMTP; 08 Oct 2007 12:29:40 -0400 Received: by wa-out-0708.google.com with SMTP id j19so3355328waf for ; Mon, 08 Oct 2007 09:29:38 -0700 (PDT) Received: by 10.114.27.20 with SMTP id a20mr1763453waa.1191860197002; Mon, 08 Oct 2007 09:16:37 -0700 (PDT) Received: by 10.44.53.36 with SMTP id b36gr2040hsa; Mon, 08 Oct 2007 09:16:35 -0700 (PDT) X-Sender: bts@charter.net X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.108.12 with SMTP id k12mr12831564pym.1191680919474; Sat, 06 Oct 2007 07:28:39 -0700 (PDT) Received: from mtao05.charter.net (mtao05.charter.net [209.225.8.179]) by mx.google.com with ESMTP id z53si468292pyg.2007.10.06.07.28.39; Sat, 06 Oct 2007 07:28:39 -0700 (PDT) Received-SPF: pass (google.com: domain of bts@charter.net designates 209.225.8.179 as permitted sender) client-ip=209.225.8.179; Authentication-Results: mx.google.com; spf=pass (google.com: domain of bts@charter.net designates 209.225.8.179 as permitted sender) smtp.mail=bts@charter.net Received: from aarprv02.charter.net ([10.20.200.72]) by mtao05.charter.net (InterMail vM.7.08.02.00 201-2186-121-20061213) with ESMTP id <20071006142839.FLUJ29426.mtao05.charter.net@aarprv02.charter.net> for ; Sat, 6 Oct 2007 10:28:39 -0400 Received: from [68.117.102.182] by aarprv02.charter.net with ESMTP id <20071006142838.KYOJ495.aarprv02.charter.net@[68.117.102.182]> for ; Sat, 6 Oct 2007 10:28:38 -0400 User-Agent: Microsoft-Outlook-Express-Macintosh-Edition/5.0.6 Date: Sat, 06 Oct 2007 09:29:01 -0500 Subject: [TSCM-L] {2040} Re: cell phones From: James Greenwold To: Message-ID: In-Reply-To: Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="MS_Mac_OE_3274507741_24303453_MIME_Part" X-Chzlrs: 0 X-Google-Approved: grainger01982@gmail.com via web at 2007-10-08 16:16:33 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Re: [TSCM-L] {2032} Re: cell phones Just to come down on the side of logic, I have to point out that if there is no battery in your phone, it is not going to do anything including give location information.  (Assuming that the phone is off the shelf and not a hidden battery in it somewhere.)

As far as the messages you may have received while the phone is off, I think you might find that the messages were kept on the server at the phone company.  And when you turn your phone on in the morning, the hand shake with the service downloads the flag that says you have messages.

Now I am sure that you know this, and this is probably just a joke, but some may think you are serious.
--

Thank you for your time

James Greenwold
Bureau Of Technical Services
715-726-1400

bts@tacticalsurveillance.com


From: David-john Robinson <david_johnrobinson@hotmail.com>

Reply-To: TSCM-L2006@googlegroups.com
Date: Thu, 4 Oct 2007 12:11:33 +0000
To: <tscm-l2006@googlegroups.com>
Subject: [TSCM-L] {2032} Re: cell phones



Just. think about it for a second. You turn your cell phone off and go to sleep. When you wake up there is a message , missed call, so yes even when the phone is off it still sends a signal saying I am here.
I hear what people are saying about defeating it , but as soon as you use the phone , there is your location big and bold. SO best way to defeat it , don,t use a cell phone , the world still goes on , try it.
By the way, it is technically very easy to intercept the signal , hear both sides of the call and via triangulation , get a location. In USA you can do this for pennies from radio shack, here in UK a bit harder and more expensive because of rolling algorithms and high end encryption. BUT be warned , if you do it you will be caught and be imprisoned immediatly.This is not for PIs and wanabes.
If you are being tracked via your cell phone ask yourself who would do it , and is it worth upsetting them , my answer no.
Best regards David J Robinson +44 (0)1985 300 179
CEO
Department Q








Subject: [TSCM-L] {2025} Re: cell phones
Date: Thu, 4 Oct 2007 06:47:40 -0500
From: Ed.Steinmetz@compucom.com
To: TSCM-L2006@googlegroups.com


.ExternalClass .EC_shape {;} .ExternalClass EC_p.MsoNormal, .ExternalClass EC_li.MsoNormal, .ExternalClass EC_div.MsoNormal {margin-bottom:.0001pt;font-size:12.0pt;font-family:'Times New Roman';} .ExternalClass a:link, .ExternalClass EC_span.MsoHyperlink {color:blue;text-decoration:underline;} .ExternalClass a:visited, .ExternalClass EC_span.MsoHyperlinkFollowed {color:purple;text-decoration:underline;} .ExternalClass p {margin-right:0in;margin-left:0in;font-size:12.0pt;font-family:'Times New Roman';} .ExternalClass EC_span.EmailStyle18 {font-family:Arial;color:navy;} @page Section1 {size:8.5in 11.0in;} .ExternalClass EC_div.Section1 {page:Section1;}
I have found the easiest way to solve a problem is to watch those most impacted by it.



When my techs were leaving the job ≥early≤,  they put their cell phones in a metal box to block incoming and outgoing signals (GPS & Cell)



Worked Well !



Ed




From: TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com] On Behalf Of Tom Valos
Sent: Wednesday, October 03, 2007 11:24 AM
To: TSCM-L2006@googlegroups.com
Subject: [TSCM-L] {2023} cell phones

questions;

i have been told that you can be followed if you have your cell phone on you or near by as someone can track you via the gps system contained within....is this correct ?

also if you turn off the phone and REMOVE the battery i have also been told they can still follow you somehow is this also true.......

is there any way to FIGHT THIS OR DISABLE THIS WITHOUT THE OTHER PARTY KNOWING IT.....

thanks

tom







--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.26] ([172.28.128.26]:16954 "EHLO ip03.ams.ftl.affinity.com") by ams006.ftl.affinity.com with ESMTP id S368388AbXJHRY5; Mon, 8 Oct 2007 13:24:57 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAANoDCkdA6aL1kmdsb2JhbACOQwIBAQcEBBMW Received: from nz-out-0708.google.com ([64.233.162.245]) by ip03.ams.ftl.affinity.com with ESMTP; 08 Oct 2007 13:24:53 -0400 Received: by nz-out-0708.google.com with SMTP id q60so4480346nzb for ; Mon, 08 Oct 2007 10:24:53 -0700 (PDT) Received: by 10.36.38.11 with SMTP id l11mr2869147nzl.1191861968480; Mon, 08 Oct 2007 09:46:08 -0700 (PDT) Received: by 10.44.187.4 with SMTP id k4gr2041hsf; Mon, 08 Oct 2007 09:46:02 -0700 (PDT) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.36.22.10 with SMTP id 10mr5577262nzv.1191861960560; Mon, 08 Oct 2007 09:46:00 -0700 (PDT) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id h71si3314022nzf.2007.10.08.09.45.58; Mon, 08 Oct 2007 09:46:00 -0700 (PDT) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id 35ADF502C7DC2 for ; Mon, 8 Oct 2007 12:45:57 -0400 (EDT) Received: from ratbastard.strikenet.vpn (unknown [192.168.3.195]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by aacompsec.com (Postfix) with ESMTP id 6C9F1502C64AC for ; Mon, 8 Oct 2007 12:40:27 -0400 (EDT) Received: from ratbastard.strikenet.vpn (localhost [127.0.0.1]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ratbastard.strikenet.vpn (Postfix) with ESMTP id A49A31A07BB09 for ; Mon, 8 Oct 2007 12:40:21 -0400 (EDT) Received: from [127.0.0.1] (unknown [192.168.3.125]) by ratbastard.strikenet.vpn (Postfix) with ESMTP id 171211A07BB09 for ; Mon, 8 Oct 2007 12:40:20 -0400 (EDT) Message-ID: <470A5D74.9060401@phreaker.net> Date: Mon, 08 Oct 2007 12:40:20 -0400 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2041} Re: cell phones References: In-Reply-To: X-AAC-KTE-LTE-MailScanner-Watermark: 1192466420.42537@ZWB6eyKnVyvrgOt0wvD8DA X-AAC-KTE-LTE-MailScanner-Watermark: 1192466455.84665@Y8gO4vj4aUj1z77UgVUz9A Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , You are correct about the messages James. They are stored on the switch, and held until the phone makes contact and handshakes with it. Obviously, one does not want his or her SMS messages lost, so if say the battery went dead, the data needs to be preserved until a proper download can be performed. And right you are, the only way to keep the phone from communications with the switch is to remove the battery. Ive had my C-phone talk to the switch even when turned off. I can see the disruption on my computer screen as it transmits. Even shutting the phone off isn't enough, it may be taking location way-points, and storing to send to the switch next time it communicates, essentially giving them the ability to track you in "near real" time. I keep a tin mint box and put the phone in it when I want it disabled but dont want to take the trouble of removing the battery, (as when Im driving). The GPS could then only have the last fix and then the next fix, as it would be shielded from satellite access, or arrival time triangularation at the base stations. Its all something to keep in mind, as ANY technology thats been developed, WILL be abused. James Greenwold wrote: > Just to come down on the side of logic, I have to point out that if > there is no battery in your phone, it is not going to do anything > including give location information. (Assuming that the phone is off > the shelf and not a hidden battery in it somewhere.) > > As far as the messages you may have received while the phone is off, I > think you might find that the messages were kept on the server at the > phone company. And when you turn your phone on in the morning, the hand > shake with the service downloads the flag that says you have messages. > > Now I am sure that you know this, and this is probably just a joke, but > some may think you are serious. > -- > > Thank you for your time > > James Greenwold > Bureau Of Technical Services > 715-726-1400 > > bts@tacticalsurveillance.com > > > *From: *David-john Robinson > > *Reply-To: *TSCM-L2006@googlegroups.com > *Date: *Thu, 4 Oct 2007 12:11:33 +0000 > *To: * > *Subject: *[TSCM-L] {2032} Re: cell phones > > > > Just. think about it for a second. You turn your cell phone off and > go to sleep. When you wake up there is a message , missed call, so > yes even when the phone is off it still sends a signal saying I am here. > I hear what people are saying about defeating it , but as soon as > you use the phone , there is your location big and bold. SO best way > to defeat it , don,t use a cell phone , the world still goes on , > try it. > By the way, it is technically very easy to intercept the signal , > hear both sides of the call and via triangulation , get a location. > In USA you can do this for pennies from radio shack, here in UK a > bit harder and more expensive because of rolling algorithms and high > end encryption. BUT be warned , if you do it you will be caught and > be imprisoned immediatly.This is not for PIs and wanabes. > If you are being tracked via your cell phone ask yourself who would > do it , and is it worth upsetting them , my answer no. > Best regards David J Robinson +44 (0)1985 300 179 > CEO > Department Q > > > > > > > > > Subject: [TSCM-L] {2025} Re: cell phones > Date: Thu, 4 Oct 2007 06:47:40 -0500 > From: Ed.Steinmetz@compucom.com > To: TSCM-L2006@googlegroups.com > > > .ExternalClass .EC_shape {;} .ExternalClass EC_p.MsoNormal, > .ExternalClass EC_li.MsoNormal, .ExternalClass EC_div.MsoNormal > {margin-bottom:.0001pt;font-size:12.0pt;font-family:'Times New > Roman';} .ExternalClass a:link, .ExternalClass EC_span.MsoHyperlink > {color:blue;text-decoration:underline;} .ExternalClass a:visited, > .ExternalClass EC_span.MsoHyperlinkFollowed > {color:purple;text-decoration:underline;} .ExternalClass p > {margin-right:0in;margin-left:0in;font-size:12.0pt;font-family:'Times > New Roman';} .ExternalClass EC_span.EmailStyle18 > {font-family:Arial;color:navy;} @page Section1 {size:8.5in 11.0in;} > .ExternalClass EC_div.Section1 {page:Section1;} > > I have found the easiest way to solve a problem is to watch > those most impacted by it. > > > > When my techs were leaving the job ≥early≤, they put their cell > phones in a metal box to block incoming and outgoing signals > (GPS & Cell) > > > > Worked Well ! > > > > Ed > > > > *From:* TSCM-L2006@googlegroups.com > [mailto:TSCM-L2006@googlegroups.com] *On Behalf Of *Tom Valos > *Sent:* Wednesday, October 03, 2007 11:24 AM > *To:* TSCM-L2006@googlegroups.com > *Subject:* [TSCM-L] {2023} cell phones > > questions; > > i have been told that you can be followed if you have your cell > phone on you or near by as someone can track you via the gps > system contained within....is this correct ? > > also if you turn off the phone and REMOVE the battery i have > also been told they can still follow you somehow is this also > true....... > > is there any way to FIGHT THIS OR DISABLE THIS WITHOUT THE OTHER > PARTY KNOWING IT..... > > thanks > > tom > > > > > > > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.24] ([172.28.128.24]:269 "EHLO ip01.ams.ftl.affinity.com") by ams015.ftl.affinity.com with ESMTP id S475324AbXJIPZ2; Tue, 9 Oct 2007 11:25:28 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAACg4C0dA6aL4kGdsb2JhbACOSAIBAQcEBhERBQ Received: from nz-out-0708.google.com ([64.233.162.248]) by ip01.ams.ftl.affinity.com with ESMTP; 09 Oct 2007 11:25:02 -0400 Received: by nz-out-0708.google.com with SMTP id q60so5796264nzb for ; Tue, 09 Oct 2007 08:25:02 -0700 (PDT) Received: by 10.36.38.11 with SMTP id l11mr3102728nzl.1191943493196; Tue, 09 Oct 2007 08:24:53 -0700 (PDT) Received: by 10.44.53.36 with SMTP id b36gr2042hsa; Tue, 09 Oct 2007 08:24:48 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.33.3 with SMTP id g3mr748465nzg.1191943487009; Tue, 09 Oct 2007 08:24:47 -0700 (PDT) Received: from swip006.ftl.affinity.com (lvs00-fl-swip006.ftl.affinity.com [216.219.253.16]) by mx.google.com with ESMTP id h71si307363nzf.2007.10.09.08.24.46; Tue, 09 Oct 2007 08:24:47 -0700 (PDT) Received-SPF: neutral (google.com: 216.219.253.16 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.16; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.16 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [71.243.30.168] ([71.243.30.168]:30480 "EHLO Raphael.tscm.com") by swip006.ftl.affinity.com with ESMTP id S364824AbXJIPYm convert rfc822-to-8bit (ORCPT ); Tue, 9 Oct 2007 11:24:42 -0400 Message-Id: <7.0.1.0.2.20071009105740.12e9a3b8@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Tue, 09 Oct 2007 11:07:59 -0400 To: TSCM-L2006@googlegroups.com From: "James M. Atkinson" Subject: [TSCM-L] {2042} Re: cell phones In-Reply-To: <470A5D74.9060401@phreaker.net> References: <470A5D74.9060401@phreaker.net> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , One of the most revealing tings to do for a client is to hardwire their cell phone directly into your spectrum analyzer and leave it hooked up for 24 hours. Also, do the same thing with a spectrum analyses inside their vehicle (one hardwired into the main inlet to the breaker panel, and the second to a broadband antenna placed in the middle of the passenger compartment). Leave both in-place for 24 hours, you will have some very troubling data sets to review. I have seen cell-phones that were turned off check in with the cell phone company every 15 minutes to 2 hours, and also a cell phone that was not on a call silently get accessed by the cell-phone company and the software in the phone replaced over the air (without the customers knowledge or consent). -jma At 12:40 PM 10/8/2007, kondrak wrote: >You are correct about the messages James. They are stored on the switch, >and held until the phone makes contact and handshakes with it. >Obviously, one does not want his or her SMS messages lost, so if say the >battery went dead, the data needs to be preserved until a proper >download can be performed. >And right you are, the only way to keep the phone from communications >with the switch is to remove the battery. Ive had my C-phone talk to the >switch even when turned off. I can see the disruption on my computer >screen as it transmits. Even shutting the phone off isn't enough, it may >be taking location way-points, and storing to send to the switch next >time it communicates, essentially giving them the ability to track you >in "near real" time. I keep a tin mint box and put the phone in it when >I want it disabled but dont want to take the trouble of removing the >battery, (as when Im driving). The GPS could then only have the last fix >and then the next fix, as it would be shielded from satellite access, or >arrival time triangularation at the base stations. >Its all something to keep in mind, as ANY technology thats been >developed, WILL be abused. > >James Greenwold wrote: > > Just to come down on the side of logic, I have to point out that if > > there is no battery in your phone, it is not going to do anything > > including give location information. (Assuming that the phone is off > > the shelf and not a hidden battery in it somewhere.) > > > > As far as the messages you may have received while the phone is off, I > > think you might find that the messages were kept on the server at the > > phone company. And when you turn your phone on in the morning, the hand > > shake with the service downloads the flag that says you have messages. > > > > Now I am sure that you know this, and this is probably just a joke, but > > some may think you are serious. > > -- > > > > Thank you for your time > > > > James Greenwold > > Bureau Of Technical Services > > 715-726-1400 > > > > bts@tacticalsurveillance.com > > > > > > *From: *David-john Robinson > > > > *Reply-To: *TSCM-L2006@googlegroups.com > > *Date: *Thu, 4 Oct 2007 12:11:33 +0000 > > *To: * > > *Subject: *[TSCM-L] {2032} Re: cell phones > > > > > > > > Just. think about it for a second. You turn your cell phone off and > > go to sleep. When you wake up there is a message , missed call, so > > yes even when the phone is off it still > sends a signal saying I am here. > > I hear what people are saying about defeating it , but as soon as > > you use the phone , there is your location big and bold. SO best way > > to defeat it , don,t use a cell phone , the world still goes on , > > try it. > > By the way, it is technically very easy to intercept the signal , > > hear both sides of the call and via triangulation , get a location. > > In USA you can do this for pennies from radio shack, here in UK a > > bit harder and more expensive because of rolling algorithms and high > > end encryption. BUT be warned , if you do it you will be caught and > > be imprisoned immediatly.This is not for PIs and wanabes. > > If you are being tracked via your cell phone ask yourself who would > > do it , and is it worth upsetting them , my answer no. > > Best regards David J Robinson +44 (0)1985 300 179 > > CEO > > Department Q > > > > > > > > > > > > > > > > > > Subject: [TSCM-L] {2025} Re: cell phones > > Date: Thu, 4 Oct 2007 06:47:40 -0500 > > From: Ed.Steinmetz@compucom.com > > To: TSCM-L2006@googlegroups.com > > > > > > .ExternalClass .EC_shape {;} .ExternalClass EC_p.MsoNormal, > > .ExternalClass EC_li.MsoNormal, .ExternalClass EC_div.MsoNormal > > {margin-bottom:.0001pt;font-size:12.0pt;font-family:'Times New > > Roman';} .ExternalClass a:link, .ExternalClass EC_span.MsoHyperlink > > {color:blue;text-decoration:underline;} .ExternalClass a:visited, > > .ExternalClass EC_span.MsoHyperlinkFollowed > > {color:purple;text-decoration:underline;} .ExternalClass p > > {margin-right:0in;margin-left:0in;font-size:12.0pt;font-family:'Times > > New Roman';} .ExternalClass EC_span.EmailStyle18 > > {font-family:Arial;color:navy;} @page Section1 {size:8.5in 11.0in;} > > .ExternalClass EC_div.Section1 {page:Section1;} > > > > I have found the easiest way to solve a problem is to watch > > those most impacted by it. > > > > > > > > When my techs were leaving the job ≥early≤, they put their cell > > phones in a metal box to block incoming and outgoing signals > > (GPS & Cell) > > > > > > > > Worked Well ! > > > > > > > > Ed > > > > > > > > *From:* TSCM-L2006@googlegroups.com > > [mailto:TSCM-L2006@googlegroups.com] *On Behalf Of *Tom Valos > > *Sent:* Wednesday, October 03, 2007 11:24 AM > > *To:* TSCM-L2006@googlegroups.com > > *Subject:* [TSCM-L] {2023} cell phones > > > > questions; > > > > i have been told that you can be followed if you have your cell > > phone on you or near by as someone can track you via the gps > > system contained within....is this correct ? > > > > also if you turn off the phone and REMOVE the battery i have > > also been told they can still follow you somehow is this also > > true....... > > > > is there any way to FIGHT THIS OR DISABLE THIS WITHOUT THE OTHER > > PARTY KNOWING IT..... > > > > thanks > > > > tom > > > > > > > > > > > > > > > > > > > > ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.25] ([172.28.128.25]:2417 "EHLO ip02.ams.ftl.affinity.com") by ams017.ftl.affinity.com with ESMTP id S366543AbXJIVEI; Tue, 9 Oct 2007 17:04:08 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAJ+JC0dA6aati2dsb2JhbACCOzaLVwIBCAQEExEF Received: from py-out-1314.google.com ([64.233.166.173]) by ip02.ams.ftl.affinity.com with ESMTP; 09 Oct 2007 17:04:01 -0400 Received: by py-out-1314.google.com with SMTP id p69so11472556pyb for ; Tue, 09 Oct 2007 14:03:54 -0700 (PDT) Received: by 10.35.81.2 with SMTP id i2mr3361270pyl.1191963818361; Tue, 09 Oct 2007 14:03:38 -0700 (PDT) Received: by 10.44.53.36 with SMTP id b36gr2043hsa; Tue, 09 Oct 2007 14:03:26 -0700 (PDT) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.36.134.3 with SMTP id h3mr1199464nzd.1191963804968; Tue, 09 Oct 2007 14:03:24 -0700 (PDT) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id y6si448561nzg.2007.10.09.14.03.24; Tue, 09 Oct 2007 14:03:24 -0700 (PDT) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id D0849502CB0A1 for ; Tue, 9 Oct 2007 17:03:23 -0400 (EDT) Received: from ratbastard.strikenet.vpn (unknown [192.168.3.195]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by aacompsec.com (Postfix) with ESMTP id 07E82502CB092 for ; Tue, 9 Oct 2007 16:57:52 -0400 (EDT) Received: from ratbastard.strikenet.vpn (localhost [127.0.0.1]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ratbastard.strikenet.vpn (Postfix) with ESMTP id 0286F1A965F07 for ; Tue, 9 Oct 2007 16:57:47 -0400 (EDT) Received: from [127.0.0.1] (unknown [192.168.3.125]) by ratbastard.strikenet.vpn (Postfix) with ESMTP id CBEDB1A965F07 for ; Tue, 9 Oct 2007 16:57:44 -0400 (EDT) Message-ID: <470BEB48.4030702@phreaker.net> Date: Tue, 09 Oct 2007 16:57:44 -0400 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="------------080908050503020103080507" To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2043} Re: cell phones References: <470A5D74.9060401@phreaker.net> <7.0.1.0.2.20071009105740.12e9a3b8@tscm.com> In-Reply-To: <7.0.1.0.2.20071009105740.12e9a3b8@tscm.com> X-AAC-KTE-LTE-MailScanner-Watermark: 1192568265.51926@P+N5F14SPnxTmaJDmdICYg X-AAC-KTE-LTE-MailScanner-Watermark: 1192568302.46653@RgD9aOVd4oxiukEkKy3+JA Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Ive seen the software replacement thing myself. Its the way they load the program that lets them spy on you by turning the mic on without lighting up the phone.
The only thing the normal consumer will notice is worse battery life.
Sprint, ATT and Versleazon can do this on most models of phones now.
Ive got a copy of one of the software hacks and as soon as I get time I'm going to dissect it.

James M. Atkinson wrote:


One of the most revealing tings to do for a 
client is to hardwire their cell phone directly 
into your spectrum analyzer and leave it hooked 
up for 24 hours. Also, do the same thing with a 
spectrum analyses inside their vehicle (one 
hardwired into the main inlet to the breaker 
panel, and the second to a broadband antenna 
placed in the middle of the passenger 
compartment). Leave both in-place for 24 hours, 
you will have some very troubling data sets to review.

I have seen cell-phones that were turned off 
check in with the cell phone company every 15 
minutes to 2 hours, and also a cell phone that 
was not on a call silently get accessed by the 
cell-phone company and the software in the phone 
replaced over the air (without the customers knowledge or consent).

-jma




At 12:40 PM 10/8/2007, kondrak wrote:

  
You are correct about the messages James. They are stored on the switch,
and held until the phone makes contact and handshakes with it.
Obviously, one does not want his or her SMS messages lost, so if say the
battery went dead, the data needs to be preserved until a proper
download can be performed.
And right you are, the only way to keep the phone from communications
with the switch is to remove the battery. Ive had my C-phone talk to the
switch even when turned off. I can see the disruption on my computer
screen as it transmits. Even shutting the phone off isn't enough, it may
be taking location way-points, and storing to send to the switch next
time it communicates, essentially giving them the ability to track you
in "near real" time. I keep a tin mint box and put the phone in it when
I want it disabled but dont want to take the trouble of removing the
battery, (as when Im driving). The GPS could then only have the last fix
and then the next fix, as it would be shielded from satellite access, or
arrival time triangularation at the base stations.
Its all something to keep in mind, as ANY technology thats been
developed, WILL be abused.

James Greenwold wrote:
    
Just to come down on the side of logic, I have to point out that if
there is no battery in your phone, it is not going to do anything
including give location information.  (Assuming that the phone is off
the shelf and not a hidden battery in it somewhere.)

As far as the messages you may have received while the phone is off, I
think you might find that the messages were kept on the server at the
phone company.  And when you turn your phone on in the morning, the hand
shake with the service downloads the flag that says you have messages.

Now I am sure that you know this, and this is probably just a joke, but
some may think you are serious.
--

Thank you for your time

James Greenwold
Bureau Of Technical Services
715-726-1400

bts@tacticalsurveillance.com


*From: *David-john Robinson <david_johnrobinson@hotmail.com>

    *Reply-To: *TSCM-L2006@googlegroups.com
    *Date: *Thu, 4 Oct 2007 12:11:33 +0000
    *To: *<tscm-l2006@googlegroups.com>
    *Subject: *[TSCM-L] {2032} Re: cell phones



    Just. think about it for a second. You turn your cell phone off and
    go to sleep. When you wake up there is a message , missed call, so
    yes even when the phone is off it still 
      
sends a signal saying I am here.
    
    I hear what people are saying about defeating it , but as soon as
    you use the phone , there is your location big and bold. SO best way
    to defeat it , don,t use a cell phone , the world still goes on ,
    try it.
    By the way, it is technically very easy to intercept the signal ,
    hear both sides of the call and via triangulation , get a location.
    In USA you can do this for pennies from radio shack, here in UK a
    bit harder and more expensive because of rolling algorithms and high
    end encryption. BUT be warned , if you do it you will be caught and
    be imprisoned immediatly.This is not for PIs and wanabes.
    If you are being tracked via your cell phone ask yourself who would
    do it , and is it worth upsetting them , my answer no.
    Best regards David J Robinson +44 (0)1985 300 179
    CEO
    Department Q








    Subject: [TSCM-L] {2025} Re: cell phones
    Date: Thu, 4 Oct 2007 06:47:40 -0500
    From: Ed.Steinmetz@compucom.com
    To: TSCM-L2006@googlegroups.com


    .ExternalClass .EC_shape {;} .ExternalClass EC_p.MsoNormal,
    .ExternalClass EC_li.MsoNormal, .ExternalClass EC_div.MsoNormal
    {margin-bottom:.0001pt;font-size:12.0pt;font-family:'Times New
    Roman';} .ExternalClass a:link, .ExternalClass EC_span.MsoHyperlink
    {color:blue;text-decoration:underline;} .ExternalClass a:visited,
    .ExternalClass EC_span.MsoHyperlinkFollowed
    {color:purple;text-decoration:underline;} .ExternalClass p
    {margin-right:0in;margin-left:0in;font-size:12.0pt;font-family:'Times
    New Roman';} .ExternalClass EC_span.EmailStyle18
    {font-family:Arial;color:navy;} @page Section1 {size:8.5in 11.0in;}
    .ExternalClass EC_div.Section1 {page:Section1;}

        I have found the easiest way to solve a problem is to watch
        those most impacted by it.



        When my techs were leaving the job ³early²,  they put their cell
        phones in a metal box to block incoming and outgoing signals
        (GPS & Cell)



        Worked Well !



        Ed



        *From:* TSCM-L2006@googlegroups.com
        [mailto:TSCM-L2006@googlegroups.com] *On Behalf Of *Tom Valos
        *Sent:* Wednesday, October 03, 2007 11:24 AM
        *To:* TSCM-L2006@googlegroups.com
        *Subject:* [TSCM-L] {2023} cell phones

        questions;

        i have been told that you can be followed if you have your cell
        phone on you or near by as someone can track you via the gps
        system contained within....is this correct ?

        also if you turn off the phone and REMOVE the battery i have
        also been told they can still follow you somehow is this also
        true.......

        is there any way to FIGHT THIS OR DISABLE THIS WITHOUT THE OTHER
        PARTY KNOWING IT.....

        thanks

        tom







      

    
----------------------------------------------------------------------------------------------------
   World Class, Professional, Ethical, and Competent Bug Sweeps, and
Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
----------------------------------------------------------------------------------------------------
  James M. Atkinson                              Phone:  (978) 381-9111
  Granite Island Group                          Fax:      
  127 Eastern Avenue #291                 Web:    http://www.tscm.com/
  Gloucester, MA 01931-8008              E-mail:  mailto:jmatk@tscm.com
----------------------------------------------------------------------------------------------------
  We perform bug sweeps like it's a full contact sport, we take no prisoners,
and we give no quarter. Our goal is to simply, and completely stop the spy.
----------------------------------------------------------------------------------------------------






  

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.27] ([172.28.128.27]:42225 "EHLO ip04.ams.ftl.affinity.com") by ams002.ftl.affinity.com with ESMTP id S369002AbXJIVaz; Tue, 9 Oct 2007 17:30:55 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAHuPC0fRVZL4kmdsb2JhbACNU3UCAQEHBAQTFg Received: from wa-out-0708.google.com ([209.85.146.248]) by ip04.ams.ftl.affinity.com with ESMTP; 09 Oct 2007 17:30:50 -0400 Received: by wa-out-0708.google.com with SMTP id j19so4781424waf for ; Tue, 09 Oct 2007 14:30:50 -0700 (PDT) Received: by 10.114.146.1 with SMTP id t1mr2082424wad.1191965441186; Tue, 09 Oct 2007 14:30:41 -0700 (PDT) Received: by 10.44.13.45 with SMTP id 45gr2044hsm; Tue, 09 Oct 2007 14:30:27 -0700 (PDT) X-Sender: ejmichaels@gmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.106.16 with SMTP id e16mr1210654nzc.1191965426382; Tue, 09 Oct 2007 14:30:26 -0700 (PDT) Received: from py-out-1112.google.com (py-out-1112.google.com [64.233.166.181]) by mx.google.com with ESMTP id v36si4694706wah.2007.10.09.14.30.25; Tue, 09 Oct 2007 14:30:26 -0700 (PDT) Received-SPF: pass (google.com: domain of ejmichaels@gmail.com designates 64.233.166.181 as permitted sender) client-ip=64.233.166.181; Authentication-Results: mx.google.com; spf=pass (google.com: domain of ejmichaels@gmail.com designates 64.233.166.181 as permitted sender) smtp.mail=ejmichaels@gmail.com; dkim=pass (test mode) header.i=@gmail.com Received: by py-out-1112.google.com with SMTP id u77so3312481pyb for ; Tue, 09 Oct 2007 14:30:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:x-rim-org-msg-ref-id:message-id:content-transfer-encoding:reply-to:x-priority:references:in-reply-to:sensitivity:importance:to:subject:from:date:content-type:mime-version; bh=VW6lkqN2Bs7ngVbVkIBIsbntVHfHuMaVQ4go4PW81f8=; b=VBJziXEP8dsm8yiFS9WXJ+RI6/cdTGGsMDBwBJy5kJwVo6OrhSVhMla6Iq8QSPYRFdtGL1T68v2kjC5j23v+OrQVCI+Sn/x/HBezJLd+X66dm3mVJLe3l4e8QFhpMMDO5pP4dxzWLEESbeIfYN7OMwnQaZOF11yGR9NxDUVR9b0= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:x-rim-org-msg-ref-id:message-id:content-transfer-encoding:reply-to:x-priority:references:in-reply-to:sensitivity:importance:to:subject:from:date:content-type:mime-version; b=ehkUIBxo9LhUmFbhPWr63dstpLVmw1cs+4Uj7U9b6ywh89nPq05o/kQiyQewJ7JMGyY6PuPjEls5C5VFJ/UWzRSW9bMLS8tacYC1uhx0cuI/AOTVsiwURSJiO63N141OfWTRMcYLb+OaV6xXM6W5Dub5cLZhrI6v/IzmKZ88w9c= Received: by 10.64.153.4 with SMTP id a4mr18187347qbe.1191965424977; Tue, 09 Oct 2007 14:30:24 -0700 (PDT) Received: from bda117-cell01.bisx.prod.on.blackberry ( [216.9.249.117]) by mx.google.com with ESMTPS id 38sm1487321nza.2007.10.09.14.30.16 (version=SSLv3 cipher=RC4-MD5); Tue, 09 Oct 2007 14:30:21 -0700 (PDT) X-rim-org-msg-ref-id: 1997023867 Message-ID: <1997023867-1191965408-cardhu_decombobulator_blackberry.rim.net-1299594583-@bxe033.bisx.prod.on.blackberry> Mime-Version: 1.0 Content-Type: text/plain; charset=windows-1252 Reply-To: TSCM-L2006@googlegroups.com X-Priority: Normal References: <470A5D74.9060401@phreaker.net> <7.0.1.0.2.20071009105740.12e9a3b8@tscm.com><470BEB48.4030702@phreaker.net> In-Reply-To: <470BEB48.4030702@phreaker.net> Sensitivity: Normal Importance: Normal To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2044} Re: cell phones From: ejmichaels@gmail.com Date: Wed, 10 Oct 2007 00:30:26 +0000 Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , A now retired deputy US Marshall I knew before he was a deputy went to school in 1984 on remote AMPS cell phone access that allowed them to listen to in car audio when the installed phone was on hook and had powe. The tech only needed the ESN, Mobile number and SID and the monitoring vehicle simply stayed within range of the 3 watt mobile phone. The inyercept never was "heard" by a cell site so anyone monitoring would not stumble on the intercept. The weak spot is/was the same as intercepting vehicle audio with OnStar or Mercedes built in phones and that is no outbound or inbound calls or signaling unless it is a CALEA portal intercept. I of course have 0 knowledge of such matters. Sent from my Verizon Wireless BlackBerry -----Original Message----- From: kondrak Date: Tue, 09 Oct 2007 16:57:44 To:TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2043} Re: cell phones Ive seen the software replacement thing myself. Its the way they load the program that lets them spy on you by turning the mic on without lighting up the phone. The only thing the normal consumer will notice is worse battery life. Sprint, ATT and Versleazon can do this on most models of phones now. Ive got a copy of one of the software hacks and as soon as I get time I'm going to dissect it. James M. Atkinson wrote: One of the most revealing tings to do for a client is to hardwire their cell phone directly into your spectrum analyzer and leave it hooked up for 24 hours. Also, do the same thing with a spectrum analyses inside their vehicle (one hardwired into the main inlet to the breaker panel, and the second to a broadband antenna placed in the middle of the passenger compartment). Leave both in-place for 24 hours, you will have some very troubling data sets to review. I have seen cell-phones that were turned off check in with the cell phone company every 15 minutes to 2 hours, and also a cell phone that was not on a call silently get accessed by the cell-phone company and the software in the phone replaced over the air (without the customers knowledge or consent). -jma At 12:40 PM 10/8/2007, kondrak wrote: You are correct about the messages James. They are stored on the switch, and held until the phone makes contact and handshakes with it. Obviously, one does not want his or her SMS messages lost, so if say the battery went dead, the data needs to be preserved until a proper download can be performed. And right you are, the only way to keep the phone from communications with the switch is to remove the battery. Ive had my C-phone talk to the switch even when turned off. I can see the disruption on my computer screen as it transmits. Even shutting the phone off isn't enough, it may be taking location way-points, and storing to send to the switch next time it communicates, essentially giving them the ability to track you in "near real" time. I keep a tin mint box and put the phone in it when I want it disabled but dont want to take the trouble of removing the battery, (as when Im driving). The GPS could then only have the last fix and then the next fix, as it would be shielded from satellite access, or arrival time triangularation at the base stations. Its all something to keep in mind, as ANY technology thats been developed, WILL be abused. James Greenwold wrote: Just to come down on the side of logic, I have to point out that if there is no battery in your phone, it is not going to do anything including give location information. (Assuming that the phone is off the shelf and not a hidden battery in it somewhere.) As far as the messages you may have received while the phone is off, I think you might find that the messages were kept on the server at the phone company. And when you turn your phone on in the morning, the hand shake with the service downloads the flag that says you have messages. Now I am sure that you know this, and this is probably just a joke, but some may think you are serious. -- Thank you for your time James Greenwold Bureau Of Technical Services 715-726-1400 bts@tacticalsurveillance.com *From: *David-john Robinson <david_johnrobinson@hotmail.com> *Reply-To: *TSCM-L2006@googlegroups.com *Date: *Thu, 4 Oct 2007 12:11:33 +0000 *To: *<tscm-l2006@googlegroups.com> *Subject: *[TSCM-L] {2032} Re: cell phones Just. think about it for a second. You turn your cell phone off and go to sleep. When you wake up there is a message , missed call, so yes even when the phone is off it still sends a signal saying I am here. I hear what people are saying about defeating it , but as soon as you use the phone , there is your location big and bold. SO best way to defeat it , don,t use a cell phone , the world still goes on , try it. By the way, it is technically very easy to intercept the signal , hear both sides of the call and via triangulation , get a location. In USA you can do this for pennies from radio shack, here in UK a bit harder and more expensive because of rolling algorithms and high end encryption. BUT be warned , if you do it you will be caught and be imprisoned immediatly.This is not for PIs and wanabes. If you are being tracked via your cell phone ask yourself who would do it , and is it worth upsetting them , my answer no. Best regards David J Robinson +44 (0)1985 300 179 CEO Department Q Subject: [TSCM-L] {2025} Re: cell phones Date: Thu, 4 Oct 2007 06:47:40 -0500 From: Ed.Steinmetz@compucom.com To: TSCM-L2006@googlegroups.com .ExternalClass .EC_shape {;} .ExternalClass EC_p.MsoNormal, .ExternalClass EC_li.MsoNormal, .ExternalClass EC_div.MsoNormal {margin-bottom:.0001pt;font-size:12.0pt;font-family:'Times New Roman';} .ExternalClass a:link, .ExternalClass EC_span.MsoHyperlink {color:blue;text-decoration:underline;} .ExternalClass a:visited, .ExternalClass EC_span.MsoHyperlinkFollowed {color:purple;text-decoration:underline;} .ExternalClass p {margin-right:0in;margin-left:0in;font-size:12.0pt;font-family:'Times New Roman';} .ExternalClass EC_span.EmailStyle18 {font-family:Arial;color:navy;} @page Section1 {size:8.5in 11.0in;} .ExternalClass EC_div.Section1 {page:Section1;} I have found the easiest way to solve a problem is to watch those most impacted by it. When my techs were leaving the job ≥early≤, they put their cell phones in a metal box to block incoming and outgoing signals (GPS & Cell) Worked Well ! Ed *From:* TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com ] *On Behalf Of *Tom Valos *Sent:* Wednesday, October 03, 2007 11:24 AM *To:* TSCM-L2006@googlegroups.com *Subject:* [TSCM-L] {2023} cell phones questions; i have been told that you can be followed if you have your cell phone on you or near by as someone can track you via the gps system contained within....is this correct ? also if you turn off the phone and REMOVE the battery i have also been told they can still follow you somehow is this also true....... is there any way to FIGHT THIS OR DISABLE THIS WITHOUT THE OTHER PARTY KNOWING IT..... thanks tom ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:8905 "EHLO ip04.ams.ftl.affinity.com") by ams020.ftl.affinity.com with ESMTP id S376042AbXJIV5c; Tue, 9 Oct 2007 17:57:32 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAL6WC0fRVZL7kmdsb2JhbACCPDaLVwIBAQcEBBMW Received: from wa-out-0708.google.com ([209.85.146.251]) by ip04.ams.ftl.affinity.com with ESMTP; 09 Oct 2007 17:57:26 -0400 Received: by wa-out-0708.google.com with SMTP id j19so4803378waf for ; Tue, 09 Oct 2007 14:57:26 -0700 (PDT) Received: by 10.114.107.19 with SMTP id f19mr2084854wac.1191966406247; Tue, 09 Oct 2007 14:46:46 -0700 (PDT) Received: by 10.44.112.30 with SMTP id k30gr2045hsc; Tue, 09 Oct 2007 14:46:34 -0700 (PDT) X-Sender: xmitman@prodigy.net X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.108.12 with SMTP id k12mr21780027pym.1191965719674; Tue, 09 Oct 2007 14:35:19 -0700 (PDT) Received: from host.hackershomepage.com (host.hackershomepage.com [72.52.208.92]) by mx.google.com with ESMTP id z53si2327049pyg.2007.10.09.14.35.19; Tue, 09 Oct 2007 14:35:19 -0700 (PDT) Received-SPF: neutral (google.com: 72.52.208.92 is neither permitted nor denied by domain of xmitman@prodigy.net) client-ip=72.52.208.92; Authentication-Results: mx.google.com; spf=neutral (google.com: 72.52.208.92 is neither permitted nor denied by domain of xmitman@prodigy.net) smtp.mail=xmitman@prodigy.net Received: from [24.241.36.56] (port=13829 helo=xmitmandelldesk) by host.hackershomepage.com with smtp (Exim 4.68) (envelope-from ) id 1IfMjU-0002Uc-3v for TSCM-L2006@googlegroups.com; Tue, 09 Oct 2007 17:35:17 -0400 From: "Mark Smith" To: Subject: [TSCM-L] {2045} Re: cell phones Date: Tue, 9 Oct 2007 17:35:11 -0400 Message-ID: Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0067_01C80A9A.BECBFCA0" X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0) X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3138 In-Reply-To: <470BEB48.4030702@phreaker.net> Importance: Normal X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - host.hackershomepage.com X-AntiAbuse: Original Domain - googlegroups.com X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - prodigy.net X-Google-Approved: grainger01982@gmail.com via web at 2007-10-09 21:46:33 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

Hi Kondrak,
 
Where can I find this software?
 
Regards,
 
Xmitman
-----Original Message-----
From: TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com]On Behalf Of kondrak
Sent: Tuesday, October 09, 2007 4:58 PM
To: TSCM-L2006@googlegroups.com
Subject: [TSCM-L] {2043} Re: cell phones

Ive seen the software replacement thing myself. Its the way they load the program that lets them spy on you by turning the mic on without lighting up the phone.
The only thing the normal consumer will notice is worse battery life.
Sprint, ATT and Versleazon can do this on most models of phones now.
Ive got a copy of one of the software hacks and as soon as I get time I'm going to dissect it.

James M. Atkinson wrote:
One of the most revealing tings to do for a 
client is to hardwire their cell phone directly 
into your spectrum analyzer and leave it hooked 
up for 24 hours. Also, do the same thing with a 
spectrum analyses inside their vehicle (one 
hardwired into the main inlet to the breaker 
panel, and the second to a broadband antenna 
placed in the middle of the passenger 
compartment). Leave both in-place for 24 hours, 
you will have some very troubling data sets to review.

I have seen cell-phones that were turned off 
check in with the cell phone company every 15 
minutes to 2 hours, and also a cell phone that 
was not on a call silently get accessed by the 
cell-phone company and the software in the phone 
replaced over the air (without the customers knowledge or consent).

-jma




At 12:40 PM 10/8/2007, kondrak wrote:

  
You are correct about the messages James. They are stored on the switch,
and held until the phone makes contact and handshakes with it.
Obviously, one does not want his or her SMS messages lost, so if say the
battery went dead, the data needs to be preserved until a proper
download can be performed.
And right you are, the only way to keep the phone from communications
with the switch is to remove the battery. Ive had my C-phone talk to the
switch even when turned off. I can see the disruption on my computer
screen as it transmits. Even shutting the phone off isn't enough, it may
be taking location way-points, and storing to send to the switch next
time it communicates, essentially giving them the ability to track you
in "near real" time. I keep a tin mint box and put the phone in it when
I want it disabled but dont want to take the trouble of removing the
battery, (as when Im driving). The GPS could then only have the last fix
and then the next fix, as it would be shielded from satellite access, or
arrival time triangularation at the base stations.
Its all something to keep in mind, as ANY technology thats been
developed, WILL be abused.

James Greenwold wrote:
    
Just to come down on the side of logic, I have to point out that if
there is no battery in your phone, it is not going to do anything
including give location information.  (Assuming that the phone is off
the shelf and not a hidden battery in it somewhere.)

As far as the messages you may have received while the phone is off, I
think you might find that the messages were kept on the server at the
phone company.  And when you turn your phone on in the morning, the hand
shake with the service downloads the flag that says you have messages.

Now I am sure that you know this, and this is probably just a joke, but
some may think you are serious.
--

Thank you for your time

James Greenwold
Bureau Of Technical Services
715-726-1400

bts@tacticalsurveillance.com


*From: *David-john Robinson <david_johnrobinson@hotmail.com>

    *Reply-To: *TSCM-L2006@googlegroups.com
    *Date: *Thu, 4 Oct 2007 12:11:33 +0000
    *To: *<tscm-l2006@googlegroups.com>
    *Subject: *[TSCM-L] {2032} Re: cell phones



    Just. think about it for a second. You turn your cell phone off and
    go to sleep. When you wake up there is a message , missed call, so
    yes even when the phone is off it still 
      
sends a signal saying I am here.
    
    I hear what people are saying about defeating it , but as soon as
    you use the phone , there is your location big and bold. SO best way
    to defeat it , don,t use a cell phone , the world still goes on ,
    try it.
    By the way, it is technically very easy to intercept the signal ,
    hear both sides of the call and via triangulation , get a location.
    In USA you can do this for pennies from radio shack, here in UK a
    bit harder and more expensive because of rolling algorithms and high
    end encryption. BUT be warned , if you do it you will be caught and
    be imprisoned immediatly.This is not for PIs and wanabes.
    If you are being tracked via your cell phone ask yourself who would
    do it , and is it worth upsetting them , my answer no.
    Best regards David J Robinson +44 (0)1985 300 179
    CEO
    Department Q








    Subject: [TSCM-L] {2025} Re: cell phones
    Date: Thu, 4 Oct 2007 06:47:40 -0500
    From: Ed.Steinmetz@compucom.com
    To: TSCM-L2006@googlegroups.com


    .ExternalClass .EC_shape {;} .ExternalClass EC_p.MsoNormal,
    .ExternalClass EC_li.MsoNormal, .ExternalClass EC_div.MsoNormal
    {margin-bottom:.0001pt;font-size:12.0pt;font-family:'Times New
    Roman';} .ExternalClass a:link, .ExternalClass EC_span.MsoHyperlink
    {color:blue;text-decoration:underline;} .ExternalClass a:visited,
    .ExternalClass EC_span.MsoHyperlinkFollowed
    {color:purple;text-decoration:underline;} .ExternalClass p
    {margin-right:0in;margin-left:0in;font-size:12.0pt;font-family:'Times
    New Roman';} .ExternalClass EC_span.EmailStyle18
    {font-family:Arial;color:navy;} @page Section1 {size:8.5in 11.0in;}
    .ExternalClass EC_div.Section1 {page:Section1;}

        I have found the easiest way to solve a problem is to watch
        those most impacted by it.



        When my techs were leaving the job ≥early≤,  they put their cell
        phones in a metal box to block incoming and outgoing signals
        (GPS & Cell)



        Worked Well !



        Ed



        *From:* TSCM-L2006@googlegroups.com
        [mailto:TSCM-L2006@googlegroups.com] *On Behalf Of *Tom Valos
        *Sent:* Wednesday, October 03, 2007 11:24 AM
        *To:* TSCM-L2006@googlegroups.com
        *Subject:* [TSCM-L] {2023} cell phones

        questions;

        i have been told that you can be followed if you have your cell
        phone on you or near by as someone can track you via the gps
        system contained within....is this correct ?

        also if you turn off the phone and REMOVE the battery i have
        also been told they can still follow you somehow is this also
        true.......

        is there any way to FIGHT THIS OR DISABLE THIS WITHOUT THE OTHER
        PARTY KNOWING IT.....

        thanks

        tom







      
    
----------------------------------------------------------------------------------------------------
   World Class, Professional, Ethical, and Competent Bug Sweeps, and
Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
----------------------------------------------------------------------------------------------------
  James M. Atkinson                              Phone:  (978) 381-9111
  Granite Island Group                          Fax:      
  127 Eastern Avenue #291                 Web:    http://www.tscm.com/
  Gloucester, MA 01931-8008              E-mail:  mailto:jmatk@tscm.com
----------------------------------------------------------------------------------------------------
  We perform bug sweeps like it's a full contact sport, we take no prisoners,
and we give no quarter. Our goal is to simply, and completely stop the spy.
----------------------------------------------------------------------------------------------------






  

NOD32 2581 (20071009) Information __________

This message was checked by NOD32 antivirus system.
http://www.eset.com


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.27] ([172.28.128.27]:28537 "EHLO ip04.ams.ftl.affinity.com") by ams003.ftl.affinity.com with ESMTP id S363018AbXJJKkY; Wed, 10 Oct 2007 06:40:24 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAN5IDEdA6aasi2dsb2JhbACCcopidAIBCAQEExEF Received: from py-out-1314.google.com ([64.233.166.172]) by ip04.ams.ftl.affinity.com with ESMTP; 10 Oct 2007 06:40:24 -0400 Received: by py-out-1314.google.com with SMTP id p69so12779144pyb for ; Wed, 10 Oct 2007 03:40:23 -0700 (PDT) Received: by 10.35.73.10 with SMTP id a10mr3553244pyl.1192012814519; Wed, 10 Oct 2007 03:40:14 -0700 (PDT) Received: by 10.45.7.20 with SMTP id k20gr2046hsi; Wed, 10 Oct 2007 03:40:01 -0700 (PDT) X-Sender: JUPITER13DIVA@aol.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.77.3 with SMTP id e3mr22834769pyl.1191999191579; Tue, 09 Oct 2007 23:53:11 -0700 (PDT) Received: from imo-m24.mx.aol.com (imo-m24.mx.aol.com [64.12.137.5]) by mx.google.com with ESMTP id v63si2542798pyh.2007.10.09.23.53.11; Tue, 09 Oct 2007 23:53:11 -0700 (PDT) Received-SPF: pass (google.com: domain of JUPITER13DIVA@aol.com designates 64.12.137.5 as permitted sender) client-ip=64.12.137.5; Authentication-Results: mx.google.com; spf=pass (google.com: domain of JUPITER13DIVA@aol.com designates 64.12.137.5 as permitted sender) smtp.mail=JUPITER13DIVA@aol.com Received: from JUPITER13DIVA@aol.com by imo-m24.mx.aol.com (mail_out_v38_r9.3.) id r.d52.16946211 (42805) for ; Wed, 10 Oct 2007 02:53:09 -0400 (EDT) From: JUPITER13DIVA@aol.com Message-ID: Date: Wed, 10 Oct 2007 02:53:09 EDT Subject: [TSCM-L] {2046} Re: cell phones To: TSCM-L2006@googlegroups.com Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="-----------------------------1191999189" X-Mailer: AOL 9.0 VR sub 165 X-Spam-Flag: NO X-Google-Approved: grainger01982@gmail.com via web at 2007-10-10 10:40:00 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

HI
I RECEIVED YOUR EMAIL-HOW IS THAT DONE AND HOW DO YOU TELL WHO IS LISTENING AND CAN YOU STOP IT SHORT OF NO CPHONE




See what's new at AOL.com and Make AOL Your Homepage.

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.24] ([172.28.128.24]:8547 "EHLO ip01.ams.ftl.affinity.com") by ams002.ftl.affinity.com with ESMTP id S371607AbXJJKwu; Wed, 10 Oct 2007 06:52:50 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAADZLDEdA6aaui2dsb2JhbACNVHQCAQgEBBMRBQ Received: from py-out-1314.google.com ([64.233.166.174]) by ip01.ams.ftl.affinity.com with ESMTP; 10 Oct 2007 06:52:49 -0400 Received: by py-out-1314.google.com with SMTP id p69so12796302pyb for ; Wed, 10 Oct 2007 03:52:30 -0700 (PDT) Received: by 10.35.46.11 with SMTP id y11mr3600122pyj.1192013540266; Wed, 10 Oct 2007 03:52:20 -0700 (PDT) Received: by 10.44.24.32 with SMTP id 32gr2047hsx; Wed, 10 Oct 2007 03:52:12 -0700 (PDT) X-Sender: ejmichaels@gmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.62.1 with SMTP id p1mr23123005pyk.1192013529929; Wed, 10 Oct 2007 03:52:09 -0700 (PDT) Received: from py-out-1112.google.com (py-out-1112.google.com [64.233.166.178]) by mx.google.com with ESMTP id k36si5240200waf.2007.10.10.03.52.08; Wed, 10 Oct 2007 03:52:09 -0700 (PDT) Received-SPF: pass (google.com: domain of ejmichaels@gmail.com designates 64.233.166.178 as permitted sender) client-ip=64.233.166.178; Authentication-Results: mx.google.com; spf=pass (google.com: domain of ejmichaels@gmail.com designates 64.233.166.178 as permitted sender) smtp.mail=ejmichaels@gmail.com; dkim=pass (test mode) header.i=@gmail.com Received: by py-out-1112.google.com with SMTP id d32so521752pye for ; Wed, 10 Oct 2007 03:52:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:x-rim-org-msg-ref-id:message-id:content-transfer-encoding:reply-to:x-priority:references:in-reply-to:sensitivity:importance:to:subject:from:date:content-type:mime-version; bh=G042OMt98rZWcFI6tqWYiOP8ZXuJzPeTkTdGqPCDLy0=; b=Vg/6t+dM6S7OC5g01QNua/XLb8Xi3KGMVtKVz9oZB3aIPyRTtzuJoUL3kCxZ66JeuM3tkG7JXT52mwHNNX9k3tSwH/6Pn6TGQLz9ngAMiPcBDYpEWCZcA5Aln/5e6Y4jQgl7ZZfM3XBxgeBVEgYWoH55sFBNBIvBj4f9fASVZZE= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:x-rim-org-msg-ref-id:message-id:content-transfer-encoding:reply-to:x-priority:references:in-reply-to:sensitivity:importance:to:subject:from:date:content-type:mime-version; b=Ry3N+Nr6Mudadru1rC6bnQFi1vasBEY7NpDfwpSctZFT/LPrudOVBqeqJ+lm/7hsWLtgtJtqrSvNt0U+ugzqIcRWMTMiZtEPUqk03yYYm5hgc7BbP2gugFvMRBeO6kI8zna2HUkWTneBVZT8D6xTeclqNLxDNHibGE2vCjJnHv8= Received: by 10.65.188.14 with SMTP id q14mr1242190qbp.1192013527190; Wed, 10 Oct 2007 03:52:07 -0700 (PDT) Received: from bda117-cell01.bisx.prod.on.blackberry ( [216.9.249.117]) by mx.google.com with ESMTPS id r15sm532999nza.2007.10.10.03.52.05 (version=SSLv3 cipher=RC4-MD5); Wed, 10 Oct 2007 03:52:05 -0700 (PDT) X-rim-org-msg-ref-id: 1380753992 Message-ID: <1380753992-1192013521-cardhu_decombobulator_blackberry.rim.net-2131133386-@bxe033.bisx.prod.on.blackberry> Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com X-Priority: Normal References: In-Reply-To: Sensitivity: Normal Importance: Normal To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2047} Re: cell phones From: ejmichaels@gmail.com Date: Wed, 10 Oct 2007 13:52:19 +0000 Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , No mobile telephony, no EZPass, old cash only, walk, live in a remote cabin, 0 wire a firepace and candles you make will suffice, farm, trap and hunt for your food, read the NSA charter:) Sent from my Verizon Wireless BlackBerry -----Original Message----- From: JUPITER13DIVA@aol.com Date: Wed, 10 Oct 2007 02:53:09 To:TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2046} Re: cell phones HI I RECEIVED YOUR EMAIL-HOW IS THAT DONE AND HOW DO YOU TELL WHO IS LISTENING AND CAN YOU STOP IT SHORT OF NO CPHONE ---------------- See what's new at AOL.com and Make AOL Your Homepage . --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:65230 "EHLO ip04.ams.ftl.affinity.com") by ams007.ftl.affinity.com with ESMTP id S362880AbXJJLUT; Wed, 10 Oct 2007 07:20:19 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAAJSDEdA6aasi2dsb2JhbACNVHQCAQgEBBMRBQ Received: from py-out-1314.google.com ([64.233.166.172]) by ip04.ams.ftl.affinity.com with ESMTP; 10 Oct 2007 07:20:19 -0400 Received: by py-out-1314.google.com with SMTP id p69so12840278pyb for ; Wed, 10 Oct 2007 04:20:19 -0700 (PDT) Received: by 10.35.16.6 with SMTP id t6mr3581063pyi.1192015210096; Wed, 10 Oct 2007 04:20:10 -0700 (PDT) Received: by 10.44.53.36 with SMTP id b36gr2048hsa; Wed, 10 Oct 2007 04:20:09 -0700 (PDT) X-Sender: dan@geer.org X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.23.6 with SMTP id 6mr1049688nzw.1192015207027; Wed, 10 Oct 2007 04:20:07 -0700 (PDT) Received: from absinthe.tinho.net (absinthe.tinho.net [166.84.5.228]) by mx.google.com with ESMTP id h71si673805nzf.2007.10.10.04.20.06; Wed, 10 Oct 2007 04:20:07 -0700 (PDT) Received-SPF: neutral (google.com: 166.84.5.228 is neither permitted nor denied by best guess record for domain of dan@geer.org) client-ip=166.84.5.228; Authentication-Results: mx.google.com; spf=neutral (google.com: 166.84.5.228 is neither permitted nor denied by best guess record for domain of dan@geer.org) smtp.mail=dan@geer.org Received: by absinthe.tinho.net (Postfix, from userid 126) id 53B6B33D1C; Wed, 10 Oct 2007 07:20:06 -0400 (EDT) Received: from absinthe.tinho.net (localhost [127.0.0.1]) by absinthe.tinho.net (Postfix) with ESMTP id 51F9633CB1 for ; Wed, 10 Oct 2007 07:20:06 -0400 (EDT) From: dan@geer.org To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2048} Re: cell phones In-Reply-To: Your message of "Wed, 10 Oct 2007 13:52:19 -0000." <1380753992-1192013521-cardhu_decombobulator_blackberry.rim.net-2131133386-@bxe033.bisx.prod.on.blackberry> Date: Wed, 10 Oct 2007 07:20:06 -0400 Message-Id: <20071010112006.53B6B33D1C@absinthe.tinho.net> Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , > No mobile telephony, no EZPass, old cash only, walk, live in a > remote cabin, 0 wire a firepace and candles you make will suffice, > farm, trap and hunt for your food, read the NSA charter :) And in the end, they will lay their freedom at our feet and say, "Make us your slaves, but feed us." "The Grand Inquisitor," Fyodor Dostoyevsky --dan --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.25] ([172.28.128.25]:27024 "EHLO ip02.ams.ftl.affinity.com") by ams013.ftl.affinity.com with ESMTP id S413199AbXJJSVI; Wed, 10 Oct 2007 14:21:08 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAIO0DEfRVZL5kmdsb2JhbACCPjSLWAEBAQEHBAQp Received: from wa-out-0708.google.com ([209.85.146.249]) by ip02.ams.ftl.affinity.com with ESMTP; 10 Oct 2007 14:21:01 -0400 Received: by wa-out-0708.google.com with SMTP id j19so5712141waf for ; Wed, 10 Oct 2007 11:21:00 -0700 (PDT) Received: by 10.35.18.18 with SMTP id v18mr3685679pyi.1192040450991; Wed, 10 Oct 2007 11:20:50 -0700 (PDT) Received: by 10.44.205.31 with SMTP id c31gr2049hsg; Wed, 10 Oct 2007 11:20:41 -0700 (PDT) X-Sender: vicfodeke@gmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.106.2 with SMTP id e2mr1886629nzc.1192026877543; Wed, 10 Oct 2007 07:34:37 -0700 (PDT) Received: from el-out-1112.google.com (el-out-1112.google.com [209.85.162.176]) by mx.google.com with ESMTP id y6si758015nzg.2007.10.10.07.34.36; Wed, 10 Oct 2007 07:34:37 -0700 (PDT) Received-SPF: pass (google.com: domain of vicfodeke@gmail.com designates 209.85.162.176 as permitted sender) client-ip=209.85.162.176; Authentication-Results: mx.google.com; spf=pass (google.com: domain of vicfodeke@gmail.com designates 209.85.162.176 as permitted sender) smtp.mail=vicfodeke@gmail.com; dkim=pass (test mode) header.i=@gmail.com Received: by el-out-1112.google.com with SMTP id v27so55744ele for ; Wed, 10 Oct 2007 07:34:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:references; bh=IQ6XajcteZ3+/AsbO4ML0DQ+QHH2aMvj9g6SMbUYxms=; b=A34f9n1eCAswIDxlFFDwb7ILRKfP/VrkoGi24egMWbcnRkt6L981ynVVZOTS22CR9k7xQaa+Sh6ZfvVKGaLtS+RR/u0WM0H6NzDRS+9Dc83i6GdmOg9RqDhnhAlgILrJfbNdBJZvR7ALwo9I6giiDldUE2JHikKNSZ8GUsgv9hM= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:references; b=K/ryXuUY3RbwyulM0oy99bN1HO0HxRWVjyCrdaxUdhkMhjoTYi5vRPosQ7Hp0oRQwH3kq87AlOcxnYPcy2dZaOeSalf+6WNfbZQY/YAn2JmjZoSV1xpQepl7iKmBva9wmfTc2ecZen/OzA6GUbvTTET+tN/CbLy06k0E4312HQU= Received: by 10.143.16.9 with SMTP id t9mr134935wfi.1192026875954; Wed, 10 Oct 2007 07:34:35 -0700 (PDT) Received: by 10.143.1.3 with HTTP; Wed, 10 Oct 2007 07:34:35 -0700 (PDT) Message-ID: <7756c6e50710100734y1bb11895od8555531987f36c3@mail.gmail.com> Date: Wed, 10 Oct 2007 15:34:35 +0100 From: "Victor Fodeke" To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2049} Re: cell phones In-Reply-To: Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_Part_11298_23793063.1192026875951" References: X-Google-Approved: grainger01982@gmail.com via web at 2007-10-10 18:20:41 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Pls what is the safest way out of this dilema called cell phone ?

On 10/10/07, JUPITER13DIVA@aol.com <JUPITER13DIVA@aol.com> wrote:
HI
I RECEIVED YOUR EMAIL-HOW IS THAT DONE AND HOW DO YOU TELL WHO IS LISTENING AND CAN YOU STOP IT SHORT OF NO CPHONE




See what's new at AOL.com and Make AOL Your Homepage.






--
Victor Fodeke,Ph.D
Hubert H.Humphrey/Ashoka Fellow
Founder, African Environmental Action Network(EANet-Africa)
www.eanet-africa.org
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.25] ([172.28.128.25]:53966 "EHLO ip02.ams.ftl.affinity.com") by ams009.ftl.affinity.com with ESMTP id S380291AbXJJSVP; Wed, 10 Oct 2007 14:21:15 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAIO0DEdA6aL5mGdsb2JhbACCPTWLWAEBAQEHAggn Received: from nz-out-0708.google.com ([64.233.162.249]) by ip02.ams.ftl.affinity.com with ESMTP; 10 Oct 2007 14:21:14 -0400 Received: by nz-out-0708.google.com with SMTP id q60so7507280nzb for ; Wed, 10 Oct 2007 11:21:14 -0700 (PDT) Received: by 10.36.127.15 with SMTP id z15mr3443418nzc.1192040465115; Wed, 10 Oct 2007 11:21:05 -0700 (PDT) Received: by 10.44.13.45 with SMTP id 45gr2050hsm; Wed, 10 Oct 2007 11:20:59 -0700 (PDT) X-Sender: vicfodeke@gmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.77.3 with SMTP id e3mr23565775pyl.1192027169151; Wed, 10 Oct 2007 07:39:29 -0700 (PDT) Received: from nz-out-0506.google.com (nz-out-0506.google.com [64.233.162.226]) by mx.google.com with ESMTP id v63si2718551pyh.2007.10.10.07.39.28; Wed, 10 Oct 2007 07:39:29 -0700 (PDT) Received-SPF: pass (google.com: domain of vicfodeke@gmail.com designates 64.233.162.226 as permitted sender) client-ip=64.233.162.226; Authentication-Results: mx.google.com; spf=pass (google.com: domain of vicfodeke@gmail.com designates 64.233.162.226 as permitted sender) smtp.mail=vicfodeke@gmail.com; dkim=pass (test mode) header.i=@gmail.com Received: by nz-out-0506.google.com with SMTP id n1so154318nzf for ; Wed, 10 Oct 2007 07:39:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:references; bh=qB9hIGgd6jr1pvnk7yvQztBh3u0tWz+omKjxbD8BvQk=; b=iIbk0boJxJBlEDBnSmOuk0x2fRbxeGMXodzota9jdS9TjqL+jeF5wGwWw1luHR2r2/gxYqAGvqNufLXrgfvkvOwuwpzYZJ2YQJJT77ZCp0oORplswC0JnA6PrspPMQooJ6cm3JCW4Dw+P9i1ewWtOelyHuUUEupKgXzNspHpOJg= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:references; b=DWX8cPXeuzATFVlzixypaLUnQfeZl0LztSV3Pss6uqs12bF1ngiTK5ezscBIoG1+xfpcNIXeG4GeWl2q/YrzjEzq0UyjAkk3opElp+X/1guGytJ466FkG+A3Ru8NymiP9wOk5jDnL5HilNS5KBPQVR0jmj6OAMPYNFJoS6vFXJ0= Received: by 10.143.17.13 with SMTP id u13mr139382wfi.1192027167684; Wed, 10 Oct 2007 07:39:27 -0700 (PDT) Received: by 10.143.1.3 with HTTP; Wed, 10 Oct 2007 07:39:27 -0700 (PDT) Message-ID: <7756c6e50710100739j5015cefdtd1d20b61a0c97026@mail.gmail.com> Date: Wed, 10 Oct 2007 15:39:27 +0100 From: "Victor Fodeke" To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2050} Re: cell phones In-Reply-To: <7.0.1.0.2.20071009105740.12e9a3b8@tscm.com> Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_Part_11331_27866134.1192027167684" References: <470A5D74.9060401@phreaker.net> <7.0.1.0.2.20071009105740.12e9a3b8@tscm.com> X-Google-Approved: grainger01982@gmail.com via web at 2007-10-10 18:20:58 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

Pls help me out James, out of this dilema called cell phone. Does anyone have practical balance of necessity and avoiding being profile and tracked through a legitimate use of cell phones. Pls forward practical steps to take-  
 
Victor writes
On 10/9/07, James M. Atkinson <jmatk@tscm.com> wrote:



One of the most revealing tings to do for a
client is to hardwire their cell phone directly
into your spectrum analyzer and leave it hooked
up for 24 hours. Also, do the same thing with a
spectrum analyses inside their vehicle (one
hardwired into the main inlet to the breaker
panel, and the second to a broadband antenna
placed in the middle of the passenger
compartment). Leave both in-place for 24 hours,
you will have some very troubling data sets to review.

I have seen cell-phones that were turned off
check in with the cell phone company every 15
minutes to 2 hours, and also a cell phone that
was not on a call silently get accessed by the
cell-phone company and the software in the phone
replaced over the air (without the customers knowledge or consent).

-jma




At 12:40 PM 10/8/2007, kondrak wrote:

>You are correct about the messages James. They are stored on the switch,
>and held until the phone makes contact and handshakes with it.
>Obviously, one does not want his or her SMS messages lost, so if say the
>battery went dead, the data needs to be preserved until a proper
>download can be performed.
>And right you are, the only way to keep the phone from communications
>with the switch is to remove the battery. Ive had my C-phone talk to the
>switch even when turned off. I can see the disruption on my computer
>screen as it transmits. Even shutting the phone off isn't enough, it may
>be taking location way-points, and storing to send to the switch next
>time it communicates, essentially giving them the ability to track you
>in "near real" time. I keep a tin mint box and put the phone in it when
>I want it disabled but dont want to take the trouble of removing the
>battery, (as when Im driving). The GPS could then only have the last fix
>and then the next fix, as it would be shielded from satellite access, or
>arrival time triangularation at the base stations.
>Its all something to keep in mind, as ANY technology thats been
>developed, WILL be abused.
>
>James Greenwold wrote:
> > Just to come down on the side of logic, I have to point out that if
> > there is no battery in your phone, it is not going to do anything
> > including give location information.  (Assuming that the phone is off
> > the shelf and not a hidden battery in it somewhere.)
> >
> > As far as the messages you may have received while the phone is off, I
> > think you might find that the messages were kept on the server at the
> > phone company.  And when you turn your phone on in the morning, the hand
> > shake with the service downloads the flag that says you have messages.
> >
> > Now I am sure that you know this, and this is probably just a joke, but
> > some may think you are serious.
> > --
> >
> > Thank you for your time
> >
> > James Greenwold
> > Bureau Of Technical Services
> > 715-726-1400
> >
> > bts@tacticalsurveillance.com
> >
> >
> > *From: *David-john Robinson <david_johnrobinson@hotmail.com>
> >
> >     *Reply-To: * TSCM-L2006@googlegroups.com
> >     *Date: *Thu, 4 Oct 2007 12:11:33 +0000
> >     *To: *<tscm-l2006@googlegroups.com >
> >     *Subject: *[TSCM-L] {2032} Re: cell phones
> >
> >
> >
> >     Just. think about it for a second. You turn your cell phone off and
> >     go to sleep. When you wake up there is a message , missed call, so
> >     yes even when the phone is off it still
> sends a signal saying I am here.
> >     I hear what people are saying about defeating it , but as soon as
> >     you use the phone , there is your location big and bold. SO best way
> >     to defeat it , don,t use a cell phone , the world still goes on ,
> >     try it.
> >     By the way, it is technically very easy to intercept the signal ,
> >     hear both sides of the call and via triangulation , get a location.
> >     In USA you can do this for pennies from radio shack, here in UK a
> >     bit harder and more expensive because of rolling algorithms and high
> >     end encryption. BUT be warned , if you do it you will be caught and
> >     be imprisoned immediatly.This is not for PIs and wanabes.
> >     If you are being tracked via your cell phone ask yourself who would
> >     do it , and is it worth upsetting them , my answer no.
> >     Best regards David J Robinson +44 (0)1985 300 179
> >     CEO
> >     Department Q
> >
> >
> >
> >
> >
> >
> >
> >
> >     Subject: [TSCM-L] {2025} Re: cell phones
> >     Date: Thu, 4 Oct 2007 06:47:40 -0500
> >     From: Ed.Steinmetz@compucom.com
> >     To: TSCM-L2006@googlegroups.com
> >
> >
> >     .ExternalClass .EC_shape {;} .ExternalClass EC_p.MsoNormal,
> >     .ExternalClass EC_li.MsoNormal, .ExternalClass EC_div.MsoNormal
> >     {margin-bottom:.0001pt;font-size:12.0pt;font-family:'Times New
> >     Roman';} .ExternalClass a:link, .ExternalClass EC_span.MsoHyperlink
> >     {color:blue;text-decoration:underline;} .ExternalClass a:visited,
> >     .ExternalClass EC_span.MsoHyperlinkFollowed
> >     {color:purple;text-decoration:underline;} .ExternalClass p
> >     {margin-right:0in;margin-left:0in;font-size:12.0pt;font-family:'Times
> >     New Roman';} .ExternalClass EC_span.EmailStyle18
> >     {font-family:Arial;color:navy;} @page Section1 {size:8.5in 11.0in;}
> >     .ExternalClass EC_div.Section1 {page:Section1;}
> >
> >         I have found the easiest way to solve a problem is to watch
> >         those most impacted by it.
> >
> >
> >
> >         When my techs were leaving the job ≥early≤,  they put their cell
> >         phones in a metal box to block incoming and outgoing signals
> >         (GPS & Cell)
> >
> >
> >
> >         Worked Well !
> >
> >
> >
> >         Ed
> >
> >
> >
> >         *From:* TSCM-L2006@googlegroups.com
> >         [mailto: TSCM-L2006@googlegroups.com] *On Behalf Of *Tom Valos
> >         *Sent:* Wednesday, October 03, 2007 11:24 AM
> >         *To:* TSCM-L2006@googlegroups.com
> >         *Subject:* [TSCM-L] {2023} cell phones
> >
> >         questions;
> >
> >         i have been told that you can be followed if you have your cell
> >         phone on you or near by as someone can track you via the gps
> >         system contained within....is this correct ?
> >
> >         also if you turn off the phone and REMOVE the battery i have
> >         also been told they can still follow you somehow is this also
> >         true.......
> >
> >         is there any way to FIGHT THIS OR DISABLE THIS WITHOUT THE OTHER
> >         PARTY KNOWING IT.....
> >
> >         thanks
> >
> >         tom
> >
> >
> >
> >
> >
> >
> >
> > >
>
>
>
----------------------------------------------------------------------------------------------------
  World Class, Professional, Ethical, and Competent Bug Sweeps, and
Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
----------------------------------------------------------------------------------------------------
James M. Atkinson                              Phone:  (978) 381-9111
Granite Island Group                          Fax:      
127 Eastern Avenue #291                 Web:     http://www.tscm.com/
Gloucester, MA 01931-8008              E-mail:  mailto:jmatk@tscm.com
----------------------------------------------------------------------------------------------------
We perform bug sweeps like it's a full contact sport, we take no prisoners,
and we give no quarter. Our goal is to simply, and completely stop the spy.
----------------------------------------------------------------------------------------------------









--

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.27] ([172.28.128.27]:6859 "EHLO ip04.ams.ftl.affinity.com") by ams009.ftl.affinity.com with ESMTP id S383588AbXJJWf6; Wed, 10 Oct 2007 18:35:58 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAFbuDEdA6aaqi2dsb2JhbACCPjQjizQBAQEIBAQkBQ Received: from nz-out-0708.google.com ([64.233.162.244]) by ip04.ams.ftl.affinity.com with ESMTP; 10 Oct 2007 18:35:57 -0400 Received: by nz-out-0708.google.com with SMTP id q60so15717nzb for ; Wed, 10 Oct 2007 15:35:57 -0700 (PDT) Received: by 10.36.127.15 with SMTP id z15mr3489388nzc.1192055748288; Wed, 10 Oct 2007 15:35:48 -0700 (PDT) Received: by 10.44.187.4 with SMTP id k4gr2051hsf; Wed, 10 Oct 2007 15:35:45 -0700 (PDT) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.36.127.19 with SMTP id z19mr2530816nzc.1192055650444; Wed, 10 Oct 2007 15:34:10 -0700 (PDT) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id h49si943086nzf.2007.10.10.15.34.09; Wed, 10 Oct 2007 15:34:10 -0700 (PDT) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id 8AAAF502CB423 for ; Wed, 10 Oct 2007 18:34:08 -0400 (EDT) Message-ID: <470D5015.1080100@phreaker.net> Date: Wed, 10 Oct 2007 18:20:05 -0400 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="------------010606090202000504050904" To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2051} Audio Forensics Experts Reveal (Some) Secrets X-AAC-KTE-LTE-MailScanner-Watermark: 1192659608.83474@1hqImycwJJDmoK1dpHMshw Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,




<http://www.wired.com/science/discoveries/news/2007/10/audio_forensics?curre
ntPage=all>
http://www.wired.com/science/discoveries/news/2007/10/audio_forensics?curren
tPage=all


Audio Forensics Experts Reveal (Some) Secrets

By Alexander Gelfand
<http://www.wired.com/services/feedback/letterstoeditor> Email 10.10.07 |
12:00 AM

<http://www.wired.com/print/science/discoveries/news/2007/10/audio_forensics
#>

<http://www.wired.com/print/science/discoveries/news/2007/10/audio_forensics
#>
Catalin Grigoras, a forensic examiner from Bucharest, works in his lab.
Photo: Courtesy of Catalin Grigoras

NEW YORK -- A car door slams. Someone sneezes. Two voices -- one male, one
female -- emerge from the din of traffic surrounding an urban parking lot,
their conversation captured by a hidden surveillance microphone.

Suddenly, the sound pops like a needle jumping its groove on an old vinyl
LP. "Anybody catch that?" Stuart Allen asks, jokingly.

Allen is a forensic-audio examiner, and the pop is only the most obvious
edit he made to a real-life recording he's brought to a workshop on digital
forensics at the 123rd Convention of the Audio
<http://www.aes.org/events/123/> Engineering Society.

None of the sharp-eared audio professionals at the Javits Convention Center
caught another edit on Allen's criminal-investigation tape. Allen digitally
hid that edit behind a speaker's cough, and it was only revealed with the
help of some sophisticated forensic software.

Allen's sneaky edit is the kind of thing that could be done to cook the
evidence in a criminal trial, and it is exactly what audio forensic
examiners like him are paid to uncover.

Typically, audio forensic examiners are asked to authenticate recordings
presented as evidence in criminal and civil court cases, such as undercover
surveillance tapes made by the police, recordings presented by feuding
parties in a divorce, or tapes from corporations seeking to prove employee
wrongdoing or industrial espionage.

Some audio forensic examiners go to extraordinary lengths to validate
recordings.

Catalin Grigoras, a forensic examiner from Bucharest, told the workshop how
he uses the frequency signatures of local electrical power sources to
pinpoint when and where recordings were made. According to Grigoras, digital
recorders that are plugged into electrical sockets capture the frequency
signature of the local power supply -- a signature that varies over time.

Working with electrical companies throughout Europe, Grigoras has compiled a
database of power signatures spanning several years. He uses a software
package called DCLive Forensics to compare the power signatures captured on
suspect recordings with the signatures stored in his database. That, in
turn, allows him to determine when (and, to some extent, where) the
recordings were actually made.

The technique can even be applied to recordings made with battery-powered
recorders, as long as they use electret
<http://en.wikipedia.org/wiki/Electret_microphone> microphones: Because they
act like capacitors, electret mikes will register the electrical signatures
of nearby devices.

In one case, Grigoras claims to have identified the date of a recording
broadcast in Europe, but made in the Middle East, "probably in the
mountains, or in a cave," he says. He didn't mention any names, but it was
hard not to think of Al Qaeda. Grigoras holds a Ph.D. in electrical
engineering and performs forensic work for the Romanian ministries of
justice and the interior.

Garrett Husveth, a court-approved forensic examiner, argued that audio
forensics experts may soon find themselves on the front lines in fighting
terrorism.

According to Husveth, child pornographers, drug dealers and terrorist groups
are starting to use aural steganography
<http://www.wired.com/politics/law/news/2001/02/41658> -- a technique of
hiding data in seemingly innocuous carrier files -- to share information
surreptitiously.

Husveth hid a Bruce Springsteen tune after the end-of-file marker on an MP3
containing James Brown's "I Feel Good." He pointed out that terrorists could
use similar techniques to distribute secret files through file-sharing
networks or e-mail.

Audio forensics was born during WWII, when acoustic scientists investigated
the possibility of identifying enemy voices on radio broadcasts. Their
efforts were made possible by the newly invented sound spectrograph, a tool
for graphing the frequency and amplitude of voice patterns over time.

The police soon began using sound spectrograms to identify voices for
investigative purposes, and spectrographic evidence became widely admissible
in courts of law.

The advent of digital audio made it far easier to tamper with recorded
evidence. But it also gave investigators a host of new and powerful tools.

Improvements in forensic-audio software have given the field a big boost.
Allen, for example, used a software package called EditTracker 2.0 to
dissect his doctored recording. First he played the audio file for the
audience and displayed its spectrogram on a projection screen. Then he
punched a key on his laptop.

Within seconds, EditTracker had scanned the file and flagged a bunch of
"feature discontinuities" -- unexpected bumps in frequency and amplitude,
miniscule gaps and other unusual events. They're undetectable to the naked
ear, but could indicate tampering.

The field has benefited from the popular glamorization of high-tech
forensics work in general. Industry insiders call it "the CSI effect."

"It's changed demand and changed expectations," said Richard Sanders, a
University of Colorado audio forensics expert who has consulted in cases
ranging from the Oklahoma City bombing to the Columbine shooting.

Still, Allen stressed that the work of the audio forensics examiner is often
slow and painstaking. An examiner may have to analyze a recording hundreds
of times in order to determine whether it was fudged -- and, if so, how.

Nonetheless, it pays well. According to his website, panel moderator Tom
Owen charges a minimum of $4,500 to authenticate an hour's worth of digital
or analog recording, and $2,500 to testify in court.

Then again, it's not the kind of thing anyone could do at home with a copy
of GarageBand or Audacity.

"This is very complex work," said Allen. "It doesn't happen with the push of
a button, like I saw on television the other night."


.
Web Bug from http://geo.yahoo.com/serv?s=97359714/grpId=412809/grpspId=1705323667/msgId=99310/stime=1192054411/nc1=3848614/nc2=4776345/nc3=4776368
__,_._,___
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.26] ([172.28.128.26]:60679 "EHLO ip03.ams.ftl.affinity.com") by ams009.ftl.affinity.com with ESMTP id S359735AbXJKF5f; Thu, 11 Oct 2007 01:57:35 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAApYDUdA6aaoi2dsb2JhbACCPTWLWAEBAQgEBAkKEQU Received: from py-out-1314.google.com ([64.233.166.168]) by ip03.ams.ftl.affinity.com with ESMTP; 11 Oct 2007 01:57:34 -0400 Received: by py-out-1314.google.com with SMTP id p69so649152pyb for ; Wed, 10 Oct 2007 22:57:33 -0700 (PDT) Received: by 10.35.102.18 with SMTP id e18mr94422pym.1192082244624; Wed, 10 Oct 2007 22:57:24 -0700 (PDT) Received: by 10.45.7.20 with SMTP id k20gr2052hsi; Wed, 10 Oct 2007 22:57:15 -0700 (PDT) X-Sender: bts@charter.net X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.126.2 with SMTP id d2mr12986453pyn.1192054935772; Wed, 10 Oct 2007 15:22:15 -0700 (PDT) Received: from mtao04.charter.net (mtao04.charter.net [209.225.8.178]) by mx.google.com with ESMTP id a28si4110pye.2007.10.10.15.22.15; Wed, 10 Oct 2007 15:22:15 -0700 (PDT) Received-SPF: pass (google.com: domain of bts@charter.net designates 209.225.8.178 as permitted sender) client-ip=209.225.8.178; Authentication-Results: mx.google.com; spf=pass (google.com: domain of bts@charter.net designates 209.225.8.178 as permitted sender) smtp.mail=bts@charter.net Received: from aarprv02.charter.net ([10.20.200.72]) by mtao04.charter.net (InterMail vM.7.08.02.00 201-2186-121-20061213) with ESMTP id <20071010222215.UITF23660.mtao04.charter.net@aarprv02.charter.net> for ; Wed, 10 Oct 2007 18:22:15 -0400 Received: from [68.117.102.182] by aarprv02.charter.net with ESMTP id <20071010222214.TDAU495.aarprv02.charter.net@[68.117.102.182]> for ; Wed, 10 Oct 2007 18:22:14 -0400 User-Agent: Microsoft-Outlook-Express-Macintosh-Edition/5.0.6 Date: Wed, 10 Oct 2007 17:22:38 -0500 Subject: [TSCM-L] {2052} Re: cell phones From: James Greenwold To: Message-ID: In-Reply-To: <7756c6e50710100739j5015cefdtd1d20b61a0c97026@mail.gmail.com> Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="MS_Mac_OE_3274881758_46824942_MIME_Part" X-Chzlrs: 0 X-Google-Approved: grainger01982@gmail.com via web at 2007-10-11 05:57:15 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Re: [TSCM-L] {2050} Re: cell phones The first question to ask is "Why would any one be interested?"  I have had cell phones since 1987 and have never limited used nor edited what I say.  The technology and expertese needed to perform this monitoring is way above 99.9 % of the people we worry about.  The Gov agencies have better things to do than to listen to what I have to say.

The gov may be sampling for keyword on up to 50% of the calls in the world, but the number that actually has some one listen would be limited to their main concern.  Terrorists.

Every once in a while when I am on the phone and someone says something that might hit a keyword, I just comment on the people listening and continue the conversation.

I spend a lot of time doing sweeps for Foil Hat Club members.  I don't intend to become one of them.
--

Thank you for your time

James Greenwold
Bureau Of Technical Services
715-726-1400

bts@tacticalsurveillance.com


From: "Victor Fodeke" <vicfodeke@gmail.com>

Reply-To: TSCM-L2006@googlegroups.com
Date: Wed, 10 Oct 2007 15:39:27 +0100
To: TSCM-L2006@googlegroups.com
Subject: [TSCM-L] {2050} Re: cell phones


Pls help me out James, out of this dilema called cell phone. Does anyone have practical balance of necessity and avoiding being profile and tracked through a legitimate use of cell phones. Pls forward practical steps to take-  

Victor writes
On 10/9/07, James M. Atkinson <jmatk@tscm.com> wrote:



One of the most revealing tings to do for a
client is to hardwire their cell phone directly
into your spectrum analyzer and leave it hooked
up for 24 hours. Also, do the same thing with a
spectrum analyses inside their vehicle (one
hardwired into the main inlet to the breaker
panel, and the second to a broadband antenna
placed in the middle of the passenger
compartment). Leave both in-place for 24 hours,
you will have some very troubling data sets to review.

I have seen cell-phones that were turned off
check in with the cell phone company every 15
minutes to 2 hours, and also a cell phone that
was not on a call silently get accessed by the
cell-phone company and the software in the phone
replaced over the air (without the customers knowledge or consent).

-jma




At 12:40 PM 10/8/2007, kondrak wrote:

>You are correct about the messages James. They are stored on the switch,
>and held until the phone makes contact and handshakes with it.
>Obviously, one does not want his or her SMS messages lost, so if say the
>battery went dead, the data needs to be preserved until a proper
>download can be performed.
>And right you are, the only way to keep the phone from communications
>with the switch is to remove the battery. Ive had my C-phone talk to the
>switch even when turned off. I can see the disruption on my computer
>screen as it transmits. Even shutting the phone off isn't enough, it may
>be taking location way-points, and storing to send to the switch next
>time it communicates, essentially giving them the ability to track you
>in "near real" time. I keep a tin mint box and put the phone in it when
>I want it disabled but dont want to take the trouble of removing the
>battery, (as when Im driving). The GPS could then only have the last fix
>and then the next fix, as it would be shielded from satellite access, or
>arrival time triangularation at the base stations.
>Its all something to keep in mind, as ANY technology thats been
>developed, WILL be abused.
>
>James Greenwold wrote:
> > Just to come down on the side of logic, I have to point out that if
> > there is no battery in your phone, it is not going to do anything
> > including give location information.  (Assuming that the phone is off
> > the shelf and not a hidden battery in it somewhere.)
> >
> > As far as the messages you may have received while the phone is off, I
> > think you might find that the messages were kept on the server at the
> > phone company.  And when you turn your phone on in the morning, the hand
> > shake with the service downloads the flag that says you have messages.
> >
> > Now I am sure that you know this, and this is probably just a joke, but
> > some may think you are serious.
> > --
> >
> > Thank you for your time
> >
> > James Greenwold
> > Bureau Of Technical Services
> > 715-726-1400
> >
> > bts@tacticalsurveillance.com
> >
> >
> > *From: *David-john Robinson <david_johnrobinson@hotmail.com>
> >
> >     *Reply-To: * TSCM-L2006@googlegroups.com
> >     *Date: *Thu, 4 Oct 2007 12:11:33 +0000
> >     *To: *<tscm-l2006@googlegroups.com  <mailto:tscm-l2006@googlegroups.com> >
> >     *Subject: *[TSCM-L] {2032} Re: cell phones
> >
> >
> >
> >     Just. think about it for a second. You turn your cell phone off and
> >     go to sleep. When you wake up there is a message , missed call, so
> >     yes even when the phone is off it still
> sends a signal saying I am here.
> >     I hear what people are saying about defeating it , but as soon as
> >     you use the phone , there is your location big and bold. SO best way
> >     to defeat it , don,t use a cell phone , the world still goes on ,
> >     try it.
> >     By the way, it is technically very easy to intercept the signal ,
> >     hear both sides of the call and via triangulation , get a location.
> >     In USA you can do this for pennies from radio shack, here in UK a
> >     bit harder and more expensive because of rolling algorithms and high
> >     end encryption. BUT be warned , if you do it you will be caught and
> >     be imprisoned immediatly.This is not for PIs and wanabes.
> >     If you are being tracked via your cell phone ask yourself who would
> >     do it , and is it worth upsetting them , my answer no.
> >     Best regards David J Robinson +44 (0)1985 300 179
> >     CEO
> >     Department Q
> >
> >
> >
> >
> >
> >
> >
> >
> >     Subject: [TSCM-L] {2025} Re: cell phones
> >     Date: Thu, 4 Oct 2007 06:47:40 -0500
> >     From: Ed.Steinmetz@compucom.com
> >     To: TSCM-L2006@googlegroups.com
> >
> >
> >     .ExternalClass .EC_shape {;} .ExternalClass EC_p.MsoNormal,
> >     .ExternalClass EC_li.MsoNormal, .ExternalClass EC_div.MsoNormal
> >     {margin-bottom:.0001pt;font-size:12.0pt;font-family:'Times New
> >     Roman';} .ExternalClass a:link, .ExternalClass EC_span.MsoHyperlink
> >     {color:blue;text-decoration:underline;} .ExternalClass a:visited,
> >     .ExternalClass EC_span.MsoHyperlinkFollowed
> >     {color:purple;text-decoration:underline;} .ExternalClass p
> >     {margin-right:0in;margin-left:0in;font-size:12.0pt;font-family:'Times
> >     New Roman';} .ExternalClass EC_span.EmailStyle18
> >     {font-family:Arial;color:navy;} @page Section1 {size:8.5in 11.0in;}
> >     .ExternalClass EC_div.Section1 {page:Section1;}
> >
> >         I have found the easiest way to solve a problem is to watch
> >         those most impacted by it.
> >
> >
> >
> >         When my techs were leaving the job ≥early≤,  they put their cell
> >         phones in a metal box to block incoming and outgoing signals
> >         (GPS & Cell)
> >
> >
> >
> >         Worked Well !
> >
> >
> >
> >         Ed
> >
> >
> >
> >         *From:* TSCM-L2006@googlegroups.com
> >         [mailto: TSCM-L2006@googlegroups.com <mailto:TSCM-L2006@googlegroups.com> ] *On Behalf Of *Tom Valos
> >         *Sent:* Wednesday, October 03, 2007 11:24 AM
> >         *To:* TSCM-L2006@googlegroups.com  <mailto:TSCM-L2006@googlegroups.com>
> >         *Subject:* [TSCM-L] {2023} cell phones
> >
> >         questions;
> >
> >         i have been told that you can be followed if you have your cell
> >         phone on you or near by as someone can track you via the gps
> >         system contained within....is this correct ?
> >
> >         also if you turn off the phone and REMOVE the battery i have
> >         also been told they can still follow you somehow is this also
> >         true.......
> >
> >         is there any way to FIGHT THIS OR DISABLE THIS WITHOUT THE OTHER
> >         PARTY KNOWING IT.....
> >
> >         thanks
> >
> >         tom
> >
> >
> >
> >
> >
> >
> >
> > >
>
>
>
----------------------------------------------------------------------------------------------------
 World Class, Professional, Ethical, and Competent Bug Sweeps, and
Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
----------------------------------------------------------------------------------------------------
James M. Atkinson                              Phone:  (978) 381-9111
Granite Island Group                          Fax:      
127 Eastern Avenue #291                 Web:    http://www.tscm.com/
Gloucester, MA 01931-8008              E-mail:  mailto:jmatk@tscm.com
----------------------------------------------------------------------------------------------------
We perform bug sweeps like it's a full contact sport, we take no prisoners,
and we give no quarter. Our goal is to simply, and completely stop the spy.
----------------------------------------------------------------------------------------------------









--





--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.27] ([172.28.128.27]:61519 "EHLO ip04.ams.ftl.affinity.com") by ams021.ftl.affinity.com with ESMTP id S369443AbXJKGPG; Thu, 11 Oct 2007 02:15:06 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAENcDUfRVZLzkmdsb2JhbACOSgEBAQEHBAQJChY Received: from wa-out-0708.google.com ([209.85.146.243]) by ip04.ams.ftl.affinity.com with ESMTP; 11 Oct 2007 02:15:05 -0400 Received: by wa-out-0708.google.com with SMTP id j19so228872waf for ; Wed, 10 Oct 2007 23:15:04 -0700 (PDT) Received: by 10.114.57.1 with SMTP id f1mr54866waa.1192083295363; Wed, 10 Oct 2007 23:14:55 -0700 (PDT) Received: by 10.44.69.72 with SMTP id r72gr2053hsa; Wed, 10 Oct 2007 23:14:53 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.33.8 with SMTP id g8mr2837060nzg.1192083292465; Wed, 10 Oct 2007 23:14:52 -0700 (PDT) Received: from swip001.ftl.affinity.com (lvs00-fl-swip001.ftl.affinity.com [216.219.253.11]) by mx.google.com with ESMTP id y6si1091299nzg.2007.10.10.23.14.51; Wed, 10 Oct 2007 23:14:52 -0700 (PDT) Received-SPF: neutral (google.com: 216.219.253.11 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.11; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.11 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [70.22.254.167] ([70.22.254.167]:27915 "EHLO Raphael.tscm.com") by swip001.ftl.affinity.com with ESMTP id S359494AbXJKGOv (ORCPT ); Thu, 11 Oct 2007 02:14:51 -0400 Message-Id: <7.0.1.0.2.20071011015729.10619ad0@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Thu, 11 Oct 2007 02:12:43 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] {2053} Knock-Knock, we're here to take out the trash... Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="=====================_71502781==_" Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , For those of you who would like one of my alternate, non-TSCM logo's... You can call this one "Knock-Knock, we're here to take out the trash..." I took the picture during one of my training courses, and yes those are real shotguns, that is a real SWAT team, and there are real bullets in those guns. Flashbangs and CS/OC was just tossed, and the dance was just getting off on a good foot. -jma ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Attachment Converted: "c:\documents and settings\james m. atkinson\application data\qualcomm\eudora\attach\gig.knock-knock.jpg"Received: from [172.28.128.26] ([172.28.128.26]:5662 "EHLO ip03.ams.ftl.affinity.com") by ams012.ftl.affinity.com with ESMTP id S381215AbXJKKR6; Thu, 11 Oct 2007 06:17:58 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAADaVDUdA6aLzi2dsb2JhbACCPDaLWAEBAQgCBgkKEQU Received: from nz-out-0708.google.com ([64.233.162.243]) by ip03.ams.ftl.affinity.com with ESMTP; 11 Oct 2007 06:17:57 -0400 Received: by nz-out-0708.google.com with SMTP id q60so507130nzb for ; Thu, 11 Oct 2007 03:17:57 -0700 (PDT) Received: by 10.36.23.7 with SMTP id 7mr84212nzw.1192097868412; Thu, 11 Oct 2007 03:17:48 -0700 (PDT) Received: by 10.44.112.30 with SMTP id k30gr2054hsc; Thu, 11 Oct 2007 03:17:38 -0700 (PDT) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.36.22.10 with SMTP id 10mr2865432nzv.1192097857214; Thu, 11 Oct 2007 03:17:37 -0700 (PDT) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id y6si1150814nzg.2007.10.11.03.17.36; Thu, 11 Oct 2007 03:17:37 -0700 (PDT) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id E4CE4502CB319 for ; Thu, 11 Oct 2007 06:17:35 -0400 (EDT) Message-ID: <470DF70C.7040103@phreaker.net> Date: Thu, 11 Oct 2007 06:12:28 -0400 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="------------090604070508040608070501" To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2054} Re: cell phones References: <20071010112006.53B6B33D1C@absinthe.tinho.net> In-Reply-To: <20071010112006.53B6B33D1C@absinthe.tinho.net> X-AAC-KTE-LTE-MailScanner-Watermark: 1192702348.77244@PhM82p23KeBVr1IbngHLlA Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Mobile telephony at MY choosing.
NO EZ pass, EVER!
Any cash is fine. Take cash out AT your local bank you do business with. Never a foreign ATM.
Any place will do, IF you're security cognizant.
A fireplace is nice, a good place to burn the junk mail for heat.
Electricity is fine for now, until they get BPL up and use it to spy on you. Then take advantage of its part 15 status, and interfere the hell outa it. Arc welders do a fine job of it.
I don't trap anymore, but I hunt and fish.
As for the NSA charter, see the part about the fireplace, the gooberment doesn't follow their own laws, but expects US to.
Live long and prosper.

You're not paranoid, they really ARE out to get you.



dan@geer.org wrote:

No mobile telephony, no EZPass, old cash only, walk, live in a
remote cabin, 0 wire a firepace and candles you make will suffice,
farm, trap and hunt for your food, read the NSA charter :)
    



And in the end, they will lay their freedom at our feet and say,
"Make us your slaves, but feed us."

	"The Grand Inquisitor," Fyodor Dostoyevsky


--dan




  

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.27] ([172.28.128.27]:39948 "EHLO ip04.ams.ftl.affinity.com") by ams008.ftl.affinity.com with ESMTP id S367923AbXJKKUB; Thu, 11 Oct 2007 06:20:01 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAADaVDUdA6aL2i2dsb2JhbACOSgEBAQgCBgkKEQU Received: from nz-out-0708.google.com ([64.233.162.246]) by ip04.ams.ftl.affinity.com with ESMTP; 11 Oct 2007 06:20:01 -0400 Received: by nz-out-0708.google.com with SMTP id q60so508202nzb for ; Thu, 11 Oct 2007 03:20:01 -0700 (PDT) Received: by 10.36.66.6 with SMTP id o6mr84970nza.1192097991979; Thu, 11 Oct 2007 03:19:51 -0700 (PDT) Received: by 10.45.7.20 with SMTP id k20gr2055hsi; Thu, 11 Oct 2007 03:19:47 -0700 (PDT) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.36.18.3 with SMTP id 3mr2881291nzr.1192097986083; Thu, 11 Oct 2007 03:19:46 -0700 (PDT) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id h49si1131205nzf.2007.10.11.03.19.45; Thu, 11 Oct 2007 03:19:46 -0700 (PDT) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id 901AD502CB52F for ; Thu, 11 Oct 2007 06:19:45 -0400 (EDT) Message-ID: <470DF793.40302@phreaker.net> Date: Thu, 11 Oct 2007 06:14:43 -0400 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2055} Re: cell phones References: <7756c6e50710100734y1bb11895od8555531987f36c3@mail.gmail.com> In-Reply-To: <7756c6e50710100734y1bb11895od8555531987f36c3@mail.gmail.com> X-AAC-KTE-LTE-MailScanner-Watermark: 1192702483.66556@mw0r+2+u0JXFut+dW9GhKw Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Remove the battery when you dont need to be available, OR store it in a tin (ferrous) box. My phone is for MY use only, not anyone else's. Victor Fodeke wrote: > Pls what is the safest way out of this dilema called cell phone ? > > On 10/10/07, *JUPITER13DIVA@aol.com * > > wrote: > > HI > I RECEIVED YOUR EMAIL-HOW IS THAT DONE AND HOW DO YOU TELL WHO IS > LISTENING AND CAN YOU STOP IT SHORT OF NO CPHONE > > > > See what's new at AOL.com > and Make AOL Your > Homepage . > > > > > > > -- > Victor Fodeke,Ph.D > Hubert H.Humphrey/Ashoka Fellow > Founder, African Environmental Action Network(EANet-Africa) > www.eanet-africa.org > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:33295 "EHLO ip03.ams.ftl.affinity.com") by ams007.ftl.affinity.com with ESMTP id S480799AbXJKTVV; Thu, 11 Oct 2007 15:21:21 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAPMUDkdA6aL1kmdsb2JhbACCOzeLWAEBAQEHBAQp Received: from nz-out-0708.google.com ([64.233.162.245]) by ip03.ams.ftl.affinity.com with ESMTP; 11 Oct 2007 15:21:14 -0400 Received: by nz-out-0708.google.com with SMTP id q60so1159764nzb for ; Thu, 11 Oct 2007 12:21:14 -0700 (PDT) Received: by 10.36.23.7 with SMTP id 7mr177322nzw.1192130465414; Thu, 11 Oct 2007 12:21:05 -0700 (PDT) Received: by 10.44.205.31 with SMTP id c31gr2056hsg; Thu, 11 Oct 2007 12:20:53 -0700 (PDT) X-Sender: eugene-buckley@hotmail.com X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.36.138.15 with SMTP id l15mr3116710nzd.1192111956313; Thu, 11 Oct 2007 07:12:36 -0700 (PDT) Received: from bay0-omc3-s5.bay0.hotmail.com (bay0-omc3-s5.bay0.hotmail.com [65.54.246.205]) by mx.google.com with ESMTP id k36si852893waf.2007.10.11.07.12.36; Thu, 11 Oct 2007 07:12:36 -0700 (PDT) Received-SPF: pass (google.com: domain of eugene-buckley@hotmail.com designates 65.54.246.205 as permitted sender) client-ip=65.54.246.205; Authentication-Results: mx.google.com; spf=pass (google.com: domain of eugene-buckley@hotmail.com designates 65.54.246.205 as permitted sender) smtp.mail=eugene-buckley@hotmail.com Received: from BAY140-W30 ([64.4.39.65]) by bay0-omc3-s5.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Thu, 11 Oct 2007 07:11:17 -0700 Message-ID: Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="_22b8928c-eead-491a-a425-82c90abc4e6b_" X-Originating-IP: [169.133.140.5] From: EUGENE BUCKLEY To: Subject: [TSCM-L] {2056} Re: Knock-Knock, we're here to take out the trash... Date: Thu, 11 Oct 2007 08:11:17 -0600 Importance: Normal In-Reply-To: <7.0.1.0.2.20071011015729.10619ad0@tscm.com> References: <7.0.1.0.2.20071011015729.10619ad0@tscm.com> X-OriginalArrivalTime: 11 Oct 2007 14:11:17.0653 (UTC) FILETIME=[973E9450:01C80C10] X-Google-Approved: grainger01982@gmail.com via web at 2007-10-11 19:20:50 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , papist

> Date: Thu, 11 Oct 2007 02:12:43 -0400
> To: TSCM-L2006@googlegroups.com
> From: jmatk@tscm.com
> Subject: [TSCM-L] {2053} Knock-Knock, we're here to take out the trash...
>
>
> For those of you who would like one of my alternate, non-TSCM logo's...
>
> You can call this one "Knock-Knock, we're here to take out the trash..."
>
> I took the picture during one of my training courses, and yes those
> are real shotguns, that is a real SWAT team, and there are real
> bullets in those guns. Flashbangs and CS/OC was just tossed, and the
> dance was just getting off on a good foot.
>
> -jma
>
>
> ----------------------------------------------------------------------------------------------------
> World Class, Professional, Ethical, and Competent Bug Sweeps, and
> Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
> ----------------------------------------------------------------------------------------------------
> James M. Atkinson Phone: (978) 381-9111
> Granite Island Group Fax:
> 127 Eastern Avenue #291 Web: http://www.tscm.com/
> Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com
> ----------------------------------------------------------------------------------------------------
> We perform bug sweeps like it's a full contact sport, we take no prisoners,
> and we give no quarter. Our goal is to simply, and completely stop the spy.
> ----------------------------------------------------------------------------------------------------
>
>
> --~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.24] ([172.28.128.24]:63703 "EHLO ip01.ams.ftl.affinity.com") by ams010.ftl.affinity.com with ESMTP id S418236AbXJLVae; Fri, 12 Oct 2007 17:30:34 -0400 Received: from wa-out-0708.google.com ([209.85.146.251]) by ip01.ams.ftl.affinity.com with ESMTP; 12 Oct 2007 17:30:29 -0400 Received: by wa-out-0708.google.com with SMTP id j19so1822076waf for ; Fri, 12 Oct 2007 14:30:28 -0700 (PDT) Received: by 10.114.146.1 with SMTP id t1mr428522wad.1192224619156; Fri, 12 Oct 2007 14:30:19 -0700 (PDT) Received: by 10.44.13.45 with SMTP id 45gr2057hsm; Fri, 12 Oct 2007 14:30:08 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.22.10 with SMTP id 10mr4715910nzv.1192224606299; Fri, 12 Oct 2007 14:30:06 -0700 (PDT) Received: from swip003.ftl.affinity.com (lvs00-fl-swip003.ftl.affinity.com [216.219.253.13]) by mx.google.com with ESMTP id v28si1863457nzb.2007.10.12.14.30.05; Fri, 12 Oct 2007 14:30:06 -0700 (PDT) Received-SPF: neutral (google.com: 216.219.253.13 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.13; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.13 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [70.22.254.167] ([70.22.254.167]:61704 "EHLO Raphael.tscm.com") by swip003.ftl.affinity.com with ESMTP id S368794AbXJLVaE (ORCPT ); Fri, 12 Oct 2007 17:30:04 -0400 Message-Id: <7.0.1.0.2.20071012171619.164cef88@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Fri, 12 Oct 2007 17:17:48 -0400 To: Recipient list suppressed:; From: "James M. Atkinson" Subject: [TSCM-L] {2057} Video Camera Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="=====================_212808203==_" Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Playboy Magazine. Middle column, toward the bottom of the page -jma ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Attachment Converted: "c:\documents and settings\james m. atkinson\application data\qualcomm\eudora\attach\PlayboyAdvisor-Jan2007.small.jpg"Received: from [172.28.128.27] ([172.28.128.27]:23275 "EHLO ip04.ams.ftl.affinity.com") by ams010.ftl.affinity.com with ESMTP id S880036AbXJNXKx; Sun, 14 Oct 2007 19:10:53 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAKo9EkdA6aL2i2dsb2JhbACORgIBCAQECQoRBYEp Received: from nz-out-0708.google.com ([64.233.162.246]) by ip04.ams.ftl.affinity.com with ESMTP; 14 Oct 2007 19:10:53 -0400 Received: by nz-out-0708.google.com with SMTP id q60so4223811nzb for ; Sun, 14 Oct 2007 16:10:53 -0700 (PDT) Received: by 10.36.38.11 with SMTP id l11mr766993nzl.1192403444249; Sun, 14 Oct 2007 16:10:44 -0700 (PDT) Received: by 10.44.112.30 with SMTP id k30gr2058hsc; Sun, 14 Oct 2007 16:10:36 -0700 (PDT) X-Sender: intspecops@gmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.81.2 with SMTP id i2mr458967pyl.1192168322808; Thu, 11 Oct 2007 22:52:02 -0700 (PDT) Received: by i38g2000prf.googlegroups.com with HTTP; Fri, 12 Oct 2007 05:52:01 +0000 (UTC) X-IP: 64.150.158.71 From: Intspecops To: TSCM-L Professionals List Subject: [TSCM-L] {2058} Extra Training Course Added Date: Fri, 12 Oct 2007 05:52:01 -0000 Message-ID: <1192168321.700364.4450@i38g2000prf.googlegroups.com> User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.8.1.7) Gecko/20070914 Firefox/2.0.0.7,gzip(gfe),gzip(gfe) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Google-Approved: grainger01982@gmail.com via web at 2007-10-14 23:10:35 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , We would like to tell you about an extra training course we are running on October 22nd through Oct 26th 2007. It will be help at out training facility in Conway, South Carolina. We will be limiting the course to ten men or woman. The course will include the following: * Basic theory of Executive Close Protection * Threat Assessment * Embus, Debus and Formations * Communications and setting up a Control-Room * Advance Reconnaissance, SAP & Surveillance Detection * Mobile Security, Driving, Vehicle Search, Route Analysis * Ambush drills and Escort procedures * Improvised Explosive Device and Electronic Counter Measures Awareness * Unarmed Combat * Firearms Training- Pistol, * Holster Drills * Testing The cost of $1995 will include all training plus hotel and food. Please call or email to reserve your seat but we will require a $500* deposit by the 15th of October. We look forward to seeing you here. Many Thanks Dominic Farley Director of Operations WWW.INTSPECOPS.COM WWW.BULLETCTCHERS.COM USA 843-331-9077 Fax: 419-745-6530 Skype: Intspecops --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:58823 "EHLO ip04.ams.ftl.affinity.com") by ams010.ftl.affinity.com with ESMTP id S880041AbXJNXLO; Sun, 14 Oct 2007 19:11:14 -0400 Received: from nz-out-0708.google.com ([64.233.162.246]) by ip04.ams.ftl.affinity.com with ESMTP; 14 Oct 2007 19:11:14 -0400 Received: by nz-out-0708.google.com with SMTP id q60so4223811nzb for ; Sun, 14 Oct 2007 16:11:13 -0700 (PDT) Received: by 10.36.127.8 with SMTP id z8mr767232nzc.1192403464800; Sun, 14 Oct 2007 16:11:04 -0700 (PDT) Received: by 10.44.24.32 with SMTP id 32gr2059hsx; Sun, 14 Oct 2007 16:10:55 -0700 (PDT) X-Sender: stetsyuk@gmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.124.20 with SMTP id b20mr7616385pyn.1192298252872; Sat, 13 Oct 2007 10:57:32 -0700 (PDT) Received: from fk-out-0910.google.com (fk-out-0910.google.com [209.85.128.187]) by mx.google.com with ESMTP id a28si1645497pye.2007.10.13.10.57.30; Sat, 13 Oct 2007 10:57:32 -0700 (PDT) Received-SPF: pass (google.com: domain of stetsyuk@gmail.com designates 209.85.128.187 as permitted sender) client-ip=209.85.128.187; Authentication-Results: mx.google.com; spf=pass (google.com: domain of stetsyuk@gmail.com designates 209.85.128.187 as permitted sender) smtp.mail=stetsyuk@gmail.com; dkim=pass (test mode) header.i=@gmail.com Received: by fk-out-0910.google.com with SMTP id 18so1096696fkq for ; Sat, 13 Oct 2007 10:57:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:references; bh=q+tsl03S/4F9C9q4WnA+QS/FqOPHla2jxhErSc59NDU=; b=BO6cXWkknz4k777vFeE5CeJYDh8ktacxmRGMJSW/wlZNIXLNmoGvDJJL6nJr8EL3i5tNM+lKPcixRUtwOheZyugwOrmHSEnhkbj8r+Ybru/Flz7IveVI6iCne6CFlFfUalfecF259Z0KhmYiGvebVXMtMG9ApZdD+P3zENxwgvM= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:references; b=gjongJUsdx8Wtqp3fKNClvU30jE98D0mn0hGucTO+MuyaLqfYPVqR0XG2OYBFd3B/T4td/HItzPIqrC8SqNinzsyy1DwUS0PNrquByRrLY7IdMXPU9PZH4Tcn/yocuJFJiCDWaC0uWZ8IldaxYP0MmK+MG6TydQyU020l/dfftY= Received: by 10.82.162.14 with SMTP id k14mr8814866bue.1192298249605; Sat, 13 Oct 2007 10:57:29 -0700 (PDT) Received: by 10.82.122.20 with HTTP; Sat, 13 Oct 2007 10:57:29 -0700 (PDT) Message-ID: <3c07793d0710131057w532b0d54r46b4002579f2ba18@mail.gmail.com> Date: Sat, 13 Oct 2007 20:57:29 +0300 From: "Sergii Stetsiuk" To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2059} ROUND TABLE - KYI V - 29.11.2007 (КРУГЛИЙ СТІЛ - КИЇВ - 29.11.2007) In-Reply-To: <53d7112d0710110723r3f931ff2xb1a8626978284bc7@mail.gmail.com> Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="----=_Part_25803_30576260.1192298249572" References: <3c07793d0710110406v26d3fccm8da9e5f2c325d50d@mail.gmail.com> <53d7112d0710110712y45907f06mb7240ce02f702737@mail.gmail.com> <53d7112d0710110716n62545ecrc4ddaee7079826b6@mail.gmail.com> <53d7112d0710110723r3f931ff2xb1a8626978284bc7@mail.gmail.com> X-Google-Approved: grainger01982@gmail.com via web at 2007-10-14 23:10:54 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,
--
******************************************
Sergii Stetsiuk
Ukrainian State University Of
Finance And International Trade
Chairman of the students and
postgraduates organization
http://www.stetsiuk.com
mailto: stetsyuk@gmail.com,
mailto: ntsa.uazt@gmail.com
Gsm:+380979001459,
Gsm: +380674406463
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Content-Type: application/msword Content-Disposition: inline; filename="Round Table 2007.doc" X-Attachment-Id: f_f7mzuiys Attachment Converted: "c:\documents and settings\james m. atkinson\application data\qualcomm\eudora\attach\Round Table 20074.doc" Content-Type: application/msword Content-Disposition: inline; filename="Круглий Стіл 2007.doc" X-Attachment-Id: f_f7mzuxgx Attachment Converted: "c:\documents and settings\james m. atkinson\application data\qualcomm\eudora\attach\Круглий Стіл 20074.doc" Content-Type: application/msword Content-Disposition: inline; filename="=?KOI8-R?B?69LVx8zZyiDz1M/MIDIwMDcuZG9j?=" X-Attachment-Id: f_f7mzv2of Attachment Converted: "c:\documents and settings\james m. atkinson\application data\qualcomm\eudora\attach\=KOI8-RB69LVx8zZyiDz1MMIDIwMDcuZG9j=4"Received: from [172.28.128.24] ([172.28.128.24]:25415 "EHLO ip01.ams.ftl.affinity.com") by ams016.ftl.affinity.com with ESMTP id S423032AbXJNXOn; Sun, 14 Oct 2007 19:14:43 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAKo9EkfRVZL0kGdsb2JhbACCOzcBIooQLXQCAQEHBAYHChEFgSkB Received: from wa-out-0708.google.com ([209.85.146.244]) by ip01.ams.ftl.affinity.com with ESMTP; 14 Oct 2007 19:14:42 -0400 Received: by wa-out-0708.google.com with SMTP id j19so3125130waf for ; Sun, 14 Oct 2007 16:14:42 -0700 (PDT) Received: by 10.115.19.16 with SMTP id w16mr801573wai.1192403673227; Sun, 14 Oct 2007 16:14:33 -0700 (PDT) Received: by 10.44.112.30 with SMTP id k30gr2060hsc; Sun, 14 Oct 2007 16:14:27 -0700 (PDT) X-Sender: 1ach@netscape.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.124.20 with SMTP id b20mr8365247pyn.1192320981398; Sat, 13 Oct 2007 17:16:21 -0700 (PDT) Received: from omta09.mta.everyone.net (sitemail2.everyone.net [216.200.145.36]) by mx.google.com with ESMTP id k36si3579994waf.2007.10.13.17.16.21; Sat, 13 Oct 2007 17:16:21 -0700 (PDT) Received-SPF: neutral (google.com: 216.200.145.36 is neither permitted nor denied by best guess record for domain of 1ach@netscape.com) client-ip=216.200.145.36; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.200.145.36 is neither permitted nor denied by best guess record for domain of 1ach@netscape.com) smtp.mail=1ach@netscape.com Received: from dm24.mta.everyone.net (bigiplb-dsnat [172.16.0.19]) by omta09.mta.everyone.net (Postfix) with ESMTP id 068904053D for ; Sat, 13 Oct 2007 17:16:18 -0700 (PDT) X-Eon-Dm: dm24 Received: by resin13.mta.everyone.net (EON-PICKUP) id resin13.470d8b40.6e08; Sat, 13 Oct 2007 17:16:17 -0700 Mime-Version: 1.0 Content-Type: text/html; charset=ISO-8859-1 Message-Id: <20071013171617.8CE6570C@resin13.mta.everyone.net> Date: Sat, 13 Oct 2007 17:16:17 -0700 From: <1ach@netscape.com> To: Subject: [TSCM-L] {2060} Re: Audio Forensics Experts Reveal (Some) Secrets X-Eon-Sig: AQK6Cg5HEV/R6DjBbQEAAAAB,b66e5ebb944d25997105555d665694d1 X-Originating-Ip: [4.224.252.254] X-Google-Approved: grainger01982@gmail.com via web at 2007-10-14 23:14:26 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

True story
 
When I was fired from my job GE tried trough a private investigator to monitor my voice tone's for truth analysis.
I turned on a fan which screwed up the voice print.
 
Keep noice source's at reach at all times when questioned.
 
Case is a U.S. Supreme level now judge was bought and caught.
 
Andre Holmes Neptune Enterprise Security

--- kondrak@phreaker.net wrote:

From: kondrak <kondrak@phreaker.net>
To: TSCM-L2006@googlegroups.com
Subject: [TSCM-L] {2051} Audio Forensics Experts Reveal (Some) Secrets
Date: Wed, 10 Oct 2007 18:20:05 -0400





<http://www.wired.com/science/discoveries/news/2007/10/audio_forensics?curre
ntPage=all>
http://www.wired.com/science/discoveries/news/2007/10/audio_forensics?curren
tPage=all


Audio Forensics Experts Reveal (Some) Secrets

By Alexander Gelfand
<http://www.wired.com/services/feedback/letterstoeditor> Email 10.10.07 |
12:00 AM

<http://www.wired.com/print/science/discoveries/news/2007/10/audio_forensics
#>

<http://www.wired.com/print/science/discoveries/news/2007/10/audio_forensics
#>
Catalin Grigoras, a forensic examiner from Bucharest, works in his lab.
Photo: Courtesy of Catalin Grigoras

NEW YORK -- A car door slams. Someone sneezes. Two voices -- one male, one
female -- emerge from the din of traffic surrounding an urban parking lot,
their conversation captured by a hidden surveillance microphone.

Suddenly, the sound pops like a needle jumping its groove on an old vinyl
LP. "Anybody catch that?" Stuart Allen asks, jokingly.

Allen is a forensic-audio examiner, and the pop is only the most obvious
edit he made to a real-life recording he's brought to a workshop on digital
forensics at the 123rd Convention of the Audio
<http://www.aes.org/events/123/> Engineering Society.

None of the sharp-eared audio professionals at the Javits Convention Center
caught another edit on Allen's criminal-investigation tape. Allen digitally
hid that edit behind a speaker's cough, and it was only revealed with the
help of some sophisticated forensic software.

Allen's sneaky edit is the kind of thing that could be done to cook the
evidence in a criminal trial, and it is exactly what audio forensic
examiners like him are paid to uncover.

Typically, audio forensic examiners are asked to authenticate recordings
presented as evidence in criminal and civil court cases, such as undercover
surveillance tapes made by the police, recordings presented by feuding
parties in a divorce, or tapes from corporations seeking to prove employee
wrongdoing or industrial espionage.

Some audio forensic examiners go to extraordinary lengths to validate
recordings.

Catalin Grigoras, a forensic examiner from Bucharest, told the workshop how
he uses the frequency signatures of local electrical power sources to
pinpoint when and where recordings were made. According to Grigoras, digital
recorders that are plugged into electrical sockets capture the frequency
signature of the local power supply -- a signature that varies over time.

Working with electrical companies throughout Europe, Grigoras has compiled a
database of power signatures spanning several years. He uses a software
package called DCLive Forensics to compare the power signatures captured on
suspect recordings with the signatures stored in his database. That, in
turn, allows him to determine when (and, to some extent, where) the
recordings were actually made.

The technique can even be applied to recordings made with battery-powered
recorders, as long as they use electret
<http://en.wikipedia.org/wiki/Electret_microphone> microphones: Because they
act like capacitors, electret mikes will register the electrical signatures
of nearby devices.

In one case, Grigoras claims to have identified the date of a recording
broadcast in Europe, but made in the Middle East, "probably in the
mountains, or in a cave," he says. He didn't mention any names, but it was
hard not to think of Al Qaeda. Grigoras holds a Ph.D. in electrical
engineering and performs forensic work for the Romanian ministries of
justice and the interior.

Garrett Husveth, a court-approved forensic examiner, argued that audio
forensics experts may soon find themselves on the front lines in fighting
terrorism.

According to Husveth, child pornographers, drug dealers and terrorist groups
are starting to use aural steganography
<http://www.wired.com/politics/law/news/2001/02/41658> -- a technique of
hiding data in seemingly innocuous carrier files -- to share information
surreptitiously.

Husveth hid a Bruce Springsteen tune after the end-of-file marker on an MP3
containing James Brown's "I Feel Good." He pointed out that terrorists could
use similar techniques to distribute secret files through file-sharing
networks or e-mail.

Audio forensics was born during WWII, when acoustic scientists investigated
the possibility of identifying enemy voices on radio broadcasts. Their
efforts were made possible by the newly invented sound spectrograph, a tool
for graphing the frequency and amplitude of voice patterns over time.

The police soon began using sound spectrograms to identify voices for
investigative purposes, and spectrographic evidence became widely admissible
in courts of law.

The advent of digital audio made it far easier to tamper with recorded
evidence. But it also gave investigators a host of new and powerful tools.

Improvements in forensic-audio software have given the field a big boost.
Allen, for example, used a software package called EditTracker 2.0 to
dissect his doctored recording. First he played the audio file for the
audience and displayed its spectrogram on a projection screen. Then he
punched a key on his laptop.

Within seconds, EditTracker had scanned the file and flagged a bunch of
"feature discontinuities" -- unexpected bumps in frequency and amplitude,
miniscule gaps and other unusual events. They're undetectable to the naked
ear, but could indicate tampering.

The field has benefited from the popular glamorization of high-tech
forensics work in general. Industry insiders call it "the CSI effect."

"It's changed demand and changed expectations," said Richard Sanders, a
University of Colorado audio forensics expert who has consulted in cases
ranging from the Oklahoma City bombing to the Columbine shooting.

Still, Allen stressed that the work of the audio forensics examiner is often
slow and painstaking. An examiner may have to analyze a recording hundreds
of times in order to determine whether it was fudged -- and, if so, how.

Nonetheless, it pays well. According to his website, panel moderator Tom
Owen charges a minimum of $4,500 to authenticate an hour's worth of digital
or analog recording, and $2,500 to testify in court.

Then again, it's not the kind of thing anyone could do at home with a copy
of GarageBand or Audacity.

"This is very complex work," said Allen. "It doesn't happen with the push of
a button, like I saw on television the other night."


.
Web Bug from http://geo.yahoo.com/serv?s=97359714/grpId=412809/grpspId=1705323667/msgId=99310/stime=1192054411/nc1=3848614/nc2=4776345/nc3=4776368
__,_._,___



 

Netscape.  Just the Net You Need. --~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.26] ([172.28.128.26]:52316 "EHLO ip03.ams.ftl.affinity.com") by ams016.ftl.affinity.com with ESMTP id S483731AbXJNXhB; Sun, 14 Oct 2007 19:37:01 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAKlEEkfRVZLzkmdsb2JhbACCcoozgSECAQEHAgYJChaBKQ Received: from wa-out-0708.google.com ([209.85.146.243]) by ip03.ams.ftl.affinity.com with ESMTP; 14 Oct 2007 19:37:01 -0400 Received: by wa-out-0708.google.com with SMTP id j19so3132412waf for ; Sun, 14 Oct 2007 16:37:00 -0700 (PDT) Received: by 10.114.200.2 with SMTP id x2mr802815waf.1192405011149; Sun, 14 Oct 2007 16:36:51 -0700 (PDT) Received: by 10.44.187.4 with SMTP id k4gr2061hsf; Sun, 14 Oct 2007 16:36:39 -0700 (PDT) X-Sender: jya@pipeline.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.119.14 with SMTP id r14mr6694577nzc.1192404949449; Sun, 14 Oct 2007 16:35:49 -0700 (PDT) Received: from pop05.mail.atl.earthlink.net (pop05.mail.atl.earthlink.net [207.69.200.58]) by mx.google.com with ESMTP id h71si2672760nzf.2007.10.14.16.35.49; Sun, 14 Oct 2007 16:35:49 -0700 (PDT) Received-SPF: neutral (google.com: 207.69.200.58 is neither permitted nor denied by best guess record for domain of jya@pipeline.com) client-ip=207.69.200.58; Authentication-Results: mx.google.com; spf=neutral (google.com: 207.69.200.58 is neither permitted nor denied by best guess record for domain of jya@pipeline.com) smtp.mail=jya@pipeline.com Received: from user-1087f36.cable.mindspring.com ([64.131.188.102] helo=JY11) by pop05.mail.atl.earthlink.net with smtp (Exim 3.36 #1) id 1IhCzs-0003ef-00 for TSCM-L2006@googlegroups.com; Sun, 14 Oct 2007 19:35:49 -0400 X-Sender: jya@pop.pipeline.com X-Mailer: QUALCOMM Windows Eudora Pro Version 4.0 Date: Sun, 14 Oct 2007 19:35:49 -0400 To: TSCM-L2006@googlegroups.com From: John Young Subject: [TSCM-L] {2061} Re: Audio Forensics Experts Reveal (Some) Secrets In-Reply-To: <20071013171617.8CE6570C@resin13.mta.everyone.net> Mime-Version: 1.0 Content-Type: text/html; charset=ISO-8859-1 Message-Id: Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

Then again, it's not the kind of thing anyone could do at home with a copy
of GarageBand or Audacity.

"This is very complex work," said Allen. "It doesn't happen with the push of
a button, like I saw on television the other night."

------

Indeed, what I tell architectural clients are the dangers of working with an
inexperienced designer, not to mention DYI design programs and shelter
assembly kits, that for example, the height of a bedroom ceiling can affect
sexual prowess, or the capability to conceive a healthy child, worse, rampant
infidelity.

Or that placement of the kitchen at a certain distance and angle to the bathroom
can most definitely lead to stomach or colon cancer.

Or a that perfectly level floor more than 10 feet square diminishes balance
faculty and is the leading cause of righteousness, in most cases the incubator
of rockheadedness.

Or pastel painted houses with catercorner windows invite predators, most of
whom cannot explain whey they were compelled to break in and rearrange the
animal heads.

After an hour of this terrorizing I am hired with grateful tears of relief, or
poleaxed, locked in the cellar, dog sicked, cat clawed, while forced to watch
looping This Old House.
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.24] ([172.28.128.24]:48035 "EHLO ip01.ams.ftl.affinity.com") by ams002.ftl.affinity.com with ESMTP id S613975AbXJPCuk; Mon, 15 Oct 2007 22:50:40 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAMbCE0fRVZL6mGdsb2JhbACCcotWAQEBAQcCCAcKFoEpjgg Received: from wa-out-0708.google.com ([209.85.146.250]) by ip01.ams.ftl.affinity.com with ESMTP; 15 Oct 2007 22:50:40 -0400 Received: by wa-out-0708.google.com with SMTP id j19so4485584waf for ; Mon, 15 Oct 2007 19:50:37 -0700 (PDT) Received: by 10.115.61.1 with SMTP id o1mr974674wak.1192473898053; Mon, 15 Oct 2007 11:44:58 -0700 (PDT) Received: by 10.44.187.4 with SMTP id k4gr2062hsf; Mon, 15 Oct 2007 11:44:52 -0700 (PDT) X-Sender: MitchD@tscmusa.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.127.16 with SMTP id z16mr7617716nzc.1192473890150; Mon, 15 Oct 2007 11:44:50 -0700 (PDT) Received: from sccrmhc12.comcast.net (sccrmhc12.comcast.net [63.240.77.82]) by mx.google.com with ESMTP id y6si3046688nzg.2007.10.15.11.44.46; Mon, 15 Oct 2007 11:44:50 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning MitchD@tscmusa.com does not designate 63.240.77.82 as permitted sender) client-ip=63.240.77.82; Authentication-Results: mx.google.com; spf=softfail (google.com: domain of transitioning MitchD@tscmusa.com does not designate 63.240.77.82 as permitted sender) smtp.mail=MitchD@tscmusa.com Received: from oem (c-69-245-41-186.hsd1.tn.comcast.net[69.245.41.186]) by comcast.net (sccrmhc12) with SMTP id <2007101518444501200ec01ae>; Mon, 15 Oct 2007 18:44:45 +0000 From: "TSCM/SO Group" To: Subject: [TSCM-L] {2062} GPS Jammer Date: Mon, 15 Oct 2007 13:44:48 -0500 Message-ID: <010e01c80f5b$76eca540$6601a8c0@oem> Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_010F_01C80F31.8E169D40" X-Mailer: Microsoft Office Outlook 11 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 Thread-Index: AcgPW3VlGjWbVWp8SVGgA9xP5KC2iw== Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

It doesn’t make sense to operate a vehicle covered in tinfoil,not the freq used on the spec info area on the site

Heres the latest and greatest<g>:

http://microvideox.com/GPS-Counter-Track.html

 

Mitch Davis
TSCM/Special Operations Group
20 Music Square West,Suite 208
Nashville,TN 37203 USA
615 251 0441
Fax 615 523 0300
mitchd@tscmusa.com
www.tscmusa.com

"maintaining a higher degree of excellence"
******************************
Tools for investigators at
www.covertworx.com

CONFIDENTIALITY NOTICE: This communication may contain privileged or other
confidential information, protected from disclosure under applicable law. If
you are not the intended recipient, or the employee or agent responsible for
delivering the message to the intended recipient, or if you believe that you
have received this communication in error, please do not print, copy,
retransmit, disseminate, or otherwise use the information contained herein.
Also, please indicate to the sender that you have received this e-mail in
error, and delete the copy you have received. Thank you.
 

 


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.24] ([172.28.128.24]:22887 "EHLO ip01.ams.ftl.affinity.com") by ams017.ftl.affinity.com with ESMTP id S1396828AbXJPDZx; Mon, 15 Oct 2007 23:25:53 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAJ/ME0dA6aL4kGdsb2JhbACCcotXAQEBAQcCCAcKEQWBKQ Received: from nz-out-0708.google.com ([64.233.162.248]) by ip01.ams.ftl.affinity.com with ESMTP; 15 Oct 2007 23:25:54 -0400 Received: by nz-out-0708.google.com with SMTP id q60so6056429nzb for ; Mon, 15 Oct 2007 20:25:52 -0700 (PDT) Received: by 10.114.107.19 with SMTP id f19mr1052582wac.1192504524362; Mon, 15 Oct 2007 20:15:24 -0700 (PDT) Received: by 10.106.195.30 with SMTP id s30gr2063prf; Mon, 15 Oct 2007 20:15:23 -0700 (PDT) X-Sender: tbarrett21@cox.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.36.18.3 with SMTP id 3mr7667842nzr.1192475907579; Mon, 15 Oct 2007 12:18:27 -0700 (PDT) Received: from eastrmmtao101.cox.net (eastrmmtao101.cox.net [68.230.240.7]) by mx.google.com with ESMTP id h71si3048557nzf.2007.10.15.12.18.27; Mon, 15 Oct 2007 12:18:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of tbarrett21@cox.net designates 68.230.240.7 as permitted sender) client-ip=68.230.240.7; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of tbarrett21@cox.net designates 68.230.240.7 as permitted sender) smtp.mail=tbarrett21@cox.net Received: from eastrmimpo01.cox.net ([68.1.16.119]) by eastrmmtao101.cox.net (InterMail vM.7.08.02.01 201-2186-121-102-20070209) with ESMTP id <20071015191825.CNPL6410.eastrmmtao101.cox.net@eastrmimpo01.cox.net> for ; Mon, 15 Oct 2007 15:18:25 -0400 Received: from Pops ([68.100.98.222]) by eastrmimpo01.cox.net with bizsmtp id 0jJP1Y0094nt6980000000; Mon, 15 Oct 2007 15:18:26 -0400 From: "Tom Barrett" To: Subject: [TSCM-L] {2063} Re: GPS Jammer Date: Mon, 15 Oct 2007 15:18:24 -0400 Message-ID: Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0002_01C80F3E.A12B0800" X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0) X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 Importance: Normal In-Reply-To: <010e01c80f5b$76eca540$6601a8c0@oem> X-Google-Approved: grainger01982@gmail.com via web at 2007-10-16 03:15:23 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

Hmm...I wonder if that gadget works as well as their "bug detector", advertised on the same site?
-----Original Message-----
From: TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com]On Behalf Of TSCM/SO Group
Sent: Monday, October 15, 2007 2:45 PM
To: TSCM-L2006@googlegroups.com
Subject: [TSCM-L] {2062} GPS Jammer

It doesnít make sense to operate a vehicle covered in tinfoil,not the freq used on the spec info area on the site

Heres the latest and greatest<g>:

http://microvideox.com/GPS-Counter-Track.html

 

Mitch Davis
TSCM/Special Operations Group
20 Music Square West,Suite 208
Nashville,TN 37203 USA
615 251 0441
Fax 615 523 0300
mitchd@tscmusa.com
www.tscmusa.com

"maintaining a higher degree of excellence"
******************************
Tools for investigators at
www.covertworx.com

CONFIDENTIALITY NOTICE: This communication may contain privileged or other
confidential information, protected from disclosure under applicable law. If
you are not the intended recipient, or the employee or agent responsible for
delivering the message to the intended recipient, or if you believe that you
have received this communication in error, please do not print, copy,
retransmit, disseminate, or otherwise use the information contained herein.
Also, please indicate to the sender that you have received this e-mail in
error, and delete the copy you have received. Thank you.
 

 

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.25] ([172.28.128.25]:8297 "EHLO ip02.ams.ftl.affinity.com") by ams008.ftl.affinity.com with ESMTP id S876221AbXJPDP7; Mon, 15 Oct 2007 23:15:59 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAJPJE0fRVZL7kmdsb2JhbACCcotXAQEBAQcEBAkKFoEpknQ Received: from wa-out-0708.google.com ([209.85.146.251]) by ip02.ams.ftl.affinity.com with ESMTP; 15 Oct 2007 23:15:58 -0400 Received: by wa-out-0708.google.com with SMTP id j19so4516014waf for ; Mon, 15 Oct 2007 20:15:57 -0700 (PDT) Received: by 10.114.171.1 with SMTP id t1mr1049337wae.1192504548199; Mon, 15 Oct 2007 20:15:48 -0700 (PDT) Received: by 10.106.220.37 with SMTP id s37gr2064prg; Mon, 15 Oct 2007 20:15:42 -0700 (PDT) X-Sender: pinochle@gte.net X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.126.2 with SMTP id d2mr13171028pyn.1192476486665; Mon, 15 Oct 2007 12:28:06 -0700 (PDT) Received: from vms042pub.verizon.net (vms042pub.verizon.net [206.46.252.42]) by mx.google.com with ESMTP id a28si2733945pye.2007.10.15.12.28.06; Mon, 15 Oct 2007 12:28:06 -0700 (PDT) Received-SPF: pass (google.com: domain of pinochle@gte.net designates 206.46.252.42 as permitted sender) client-ip=206.46.252.42; Authentication-Results: mx.google.com; spf=pass (google.com: domain of pinochle@gte.net designates 206.46.252.42 as permitted sender) smtp.mail=pinochle@gte.net Received: from tom ([207.170.40.178]) by vms042.mailsrvcs.net (Sun Java System Messaging Server 6.2-6.01 (built Apr 3 2006)) with ESMTPA id <0JPY00DU4WLGV4D1@vms042.mailsrvcs.net> for TSCM-L2006@googlegroups.com; Mon, 15 Oct 2007 14:24:57 -0500 (CDT) Date: Mon, 15 Oct 2007 14:25:05 -0500 From: "Tom Valos" Subject: [TSCM-L] {2064} Re: GPS Jammer To: Message-id: <002501c80f61$17bee550$6401a8c0@tom> Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0022_01C80F37.2E54B3A0" X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 X-Mailer: Microsoft Outlook Express 6.00.2900.3138 X-Priority: 3 X-MSMail-priority: Normal References: <010e01c80f5b$76eca540$6601a8c0@oem> X-Google-Approved: grainger01982@gmail.com via web at 2007-10-16 03:15:42 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

does this item ACTUALLY PERFORM AS STATED......... i would like your opinion please
 
thanks
 
tom
----- Original Message -----
Sent: Monday, October 15, 2007 1:44 PM
Subject: [TSCM-L] {2062} GPS Jammer

It doesnít make sense to operate a vehicle covered in tinfoil,not the freq used on the spec info area on the site

Heres the latest and greatest<g>:

http://microvideox.com/GPS-Counter-Track.html

 

Mitch Davis
TSCM/Special Operations Group
20 Music Square West,Suite 208
Nashville,TN 37203 USA
615 251 0441
Fax 615 523 0300
mitchd@tscmusa.com
www.tscmusa.com

"maintaining a higher degree of excellence"
******************************
Tools for investigators at
www.covertworx.com

CONFIDENTIALITY NOTICE: This communication may contain privileged or other
confidential information, protected from disclosure under applicable law. If
you are not the intended recipient, or the employee or agent responsible for
delivering the message to the intended recipient, or if you believe that you
have received this communication in error, please do not print, copy,
retransmit, disseminate, or otherwise use the information contained herein.
Also, please indicate to the sender that you have received this e-mail in
error, and delete the copy you have received. Thank you.
 

 

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.24] ([172.28.128.24]:57423 "EHLO ip01.ams.ftl.affinity.com") by ams003.ftl.affinity.com with ESMTP id S384977AbXJPD4E; Mon, 15 Oct 2007 23:56:04 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAKbTE0dA6aasi2dsb2JhbACCOzclizIBAQEIAgYJChEFgSkB Received: from wa-out-0708.google.com ([209.85.146.243]) by ip01.ams.ftl.affinity.com with ESMTP; 15 Oct 2007 23:56:04 -0400 Received: by wa-out-0708.google.com with SMTP id j19so4546773waf for ; Mon, 15 Oct 2007 20:56:03 -0700 (PDT) Received: by 10.114.57.1 with SMTP id f1mr1068416waa.1192506951701; Mon, 15 Oct 2007 20:55:51 -0700 (PDT) Received: by 10.106.186.38 with SMTP id j38gr2065prf; Mon, 15 Oct 2007 20:55:40 -0700 (PDT) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.36.127.16 with SMTP id z16mr8321795nzc.1192506940513; Mon, 15 Oct 2007 20:55:40 -0700 (PDT) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id v28si90435nzb.2007.10.15.20.55.40; Mon, 15 Oct 2007 20:55:40 -0700 (PDT) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id 4FF885039EF99 for ; Mon, 15 Oct 2007 23:55:39 -0400 (EDT) Message-ID: <47143509.6080400@phreaker.net> Date: Mon, 15 Oct 2007 23:50:33 -0400 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="------------020304040602050702090208" To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2065} Well, look at who's listening to your phone calls: X-AAC-KTE-LTE-MailScanner-Watermark: 1193111435.8179@ax2CVPSJvSoY7WfDpGAjpw Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

http://thehill.com/leading-the-news/gop-targeting-clinton-on-phone-call-snooping-2007-10-16.html

GOP targeting Clinton on phone-call snooping
October 16, 2007
Republicans plan to seize on an allegation from the 1992 presidential campaign to tarnish Sen. Hillary Rodham Clinton (D-N.Y.) on the red-hot issue of government surveillance.

Government surveillance will be at the forefront of the political debate this fall as congressional Democrats and President Bush square off over legislation allowing electronic spying on U.S. soil without a warrant.

Republicans are focusing on an allegation in a recent book by two Pulitzer Prize-winning reporters, which suggests Clinton listened to a secretly recorded conversation between political opponents.

In their book about Clinton’s rise to power, Her Way, Don Van Natta Jr., an investigative reporter at The New York Times, and Jeff Gerth, who spent 30 years as an investigative reporter at the paper, wrote: “Hillary’s defense activities ranged from the inspirational to the microscopic to the down and dirty. She received memos about the status of various press inquiries; she vetted senior campaign aides; and she listened to a secretly recorded audiotape of a phone conversation of Clinton critics plotting their next attack.

“The tape contained discussions of another woman who might surface with allegations about an affair with Bill,” Gerth and Van Natta wrote in reference to Clinton’s husband, former President Bill Clinton. “Bill’s supporters monitored frequencies used by cell phones, and the tape was made during one of those monitoring sessions.”

A GOP official said, “Hillary Clinton’s campaign hypocrisy continues to know no bounds. It is rather unbelievable that Clinton would listen in to conversations being conducted by political opponents, but refuse to allow our intelligence agencies to listen in to conversations being conducted by terrorists as they plot and plan to kill us. Team Clinton can expect to see and hear this over and over again over the course of the next year.”

Gerth told The Hill that he learned of the incident in 2006 when he interviewed a former campaign aide present at the tape playing. He has not revealed the aide’s identity. Clinton’s campaign has not disputed any facts reported in the final version of his book, which became public this spring, he said.

“It hasn’t been challenged,” said Gerth. “There hasn’t been one fact in the book that’s been challenged.”

Clinton’s spokesman panned the book but declined to discuss the allegation that Clinton had reviewed secretly recorded calls. “We don’t comment on books that are utter and complete failures,” said Clinton’s press secretary, Philippe Reines. 

Her Way’s Amazon.com sales rank is 43,016.

 Several legal experts said it was illegal to intercept cell phone conversations in 1992.

“It’s been clear that since 1986 it was illegal to intercept an individual cell phone call,” said Barry Steinhardt, the director of the technology and liberty program at the American Civil Liberties Union.

In 1986, Congress broadened wiretapping law to prohibit the interception of electronic communications, as well as the use or disclosure of intercepted electronic communications. Two court cases have since cited that action in ruling the interception of cell phone communications illegal: Bartnicki v. Vopper, 2001, and Company v. United States, 2003.

Clinton has made privacy an issue on the campaign trail. In July, she discussed her privacy bill of rights in a speech to the American Constitution Society. The proposed rights, ensconced in the Protect Act, include the right to sue when privacy rules have been violated; the right to protect phone records; and the right to freeze credit in the event of identity theft.

During the same speech, she addressed the controversy over government surveillance.

“Every president should save those powers for limited, critical situations,” said Clinton, according to a copy of the speech posted on her campaign website. “And when it comes to a regular program of searching for information that touches the privacy of ordinary Americans, those programs need to be monitored and reviewed as set out by Congress in cooperation with the judiciary.

“That is the essence of the compact we have with each other and with our government, and we cannot ignore it.”

In August, Clinton voted against an emergency law that temporarily expanded the government’s power to conduct surveillance on American soil without a warrant. The bill was criticized for being overly broad and sidelining the role of a special court set up by the Foreign Intelligence Surveillance Act. The Senate’s other Democratic presidential candidates, Sens. Barack Obama (Ill.), Chris Dodd (Conn.), and Joseph Biden (Del.), also voted against the bill.

Clinton’s chief political strategist, Mark Penn, became embroiled recently in a controversy over intercepted electronic communications. Mitchell Markel, a former vice president at Penn’s firm, Penn, Schoen & Berland, filed a lawsuit against Penn accusing him of intercepting e-mail. Markel claimed that the firm illegally monitored messages sent from his BlackBerry after he joined another company.
Markel dropped the suit in July after reaching a settlement with Penn, Schoen & Berland.   



--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.24] ([172.28.128.24]:50266 "EHLO ip01.ams.ftl.affinity.com") by ams021.ftl.affinity.com with ESMTP id S605043AbXJPJ74; Tue, 16 Oct 2007 05:59:56 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAAYoFEfRVZLzkmdsb2JhbACCcoYIhVQBAQEBBwIGExaBKYwS Received: from py-out-1314.google.com ([64.233.166.172]) by ip01.ams.ftl.affinity.com with ESMTP; 16 Oct 2007 05:59:54 -0400 Received: by py-out-1314.google.com with SMTP id p69so11925973pyb for ; Tue, 16 Oct 2007 02:59:54 -0700 (PDT) Received: by 10.35.18.18 with SMTP id v18mr1794477pyi.1192528785041; Tue, 16 Oct 2007 02:59:45 -0700 (PDT) Received: by 10.106.110.11 with SMTP id i11gr2066prc; Tue, 16 Oct 2007 02:59:32 -0700 (PDT) X-Sender: aredandgold@msn.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.106.17 with SMTP id e17mr8492184nzc.1192528771686; Tue, 16 Oct 2007 02:59:31 -0700 (PDT) Received: from bay0-omc1-s32.bay0.hotmail.com (bay0-omc1-s32.bay0.hotmail.com [65.54.246.104]) by mx.google.com with ESMTP id k36si6128838waf.2007.10.16.02.59.31; Tue, 16 Oct 2007 02:59:31 -0700 (PDT) Received-SPF: pass (google.com: domain of aredandgold@msn.com designates 65.54.246.104 as permitted sender) client-ip=65.54.246.104; Authentication-Results: mx.google.com; spf=pass (google.com: domain of aredandgold@msn.com designates 65.54.246.104 as permitted sender) smtp.mail=aredandgold@msn.com Received: from hotmail.com ([10.6.19.20]) by bay0-omc1-s32.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Tue, 16 Oct 2007 02:59:30 -0700 Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Tue, 16 Oct 2007 02:59:31 -0700 Message-ID: Received: from 68.113.73.48 by BLU116-DAV10.phx.gbl with DAV; Tue, 16 Oct 2007 09:59:30 +0000 X-Originating-IP: [68.113.73.48] X-Originating-Email: [aredandgold@msn.com] X-Sender: aredandgold@msn.com From: "Its from Onion" Subject: [TSCM-L] {2066} How Gmail travels the world Date: Tue, 16 Oct 2007 04:59:32 -0500 Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0070_01C80FB1.57424CD0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: MSN 9 X-MimeOLE: Produced By MSN MimeOLE V9.50.0039.1900 Seal-Send-Time: Tue, 16 Oct 2007 04:59:32 -0500 X-OriginalArrivalTime: 16 Oct 2007 09:59:31.0028 (UTC) FILETIME=[3F0F4940:01C80FDB] Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , To: unlisted-recipients:; (no To-header on input)


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.24] ([172.28.128.24]:13246 "EHLO ip01.ams.ftl.affinity.com") by ams016.ftl.affinity.com with ESMTP id S365075AbXJPSS7; Tue, 16 Oct 2007 14:18:59 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAOWcFEdA6aasi2dsb2JhbACOTgEBAQgCBhMRBYEpAQ Received: from py-out-1314.google.com ([64.233.166.172]) by ip01.ams.ftl.affinity.com with ESMTP; 16 Oct 2007 14:18:50 -0400 Received: by py-out-1314.google.com with SMTP id p69so12971729pyb for ; Tue, 16 Oct 2007 11:18:50 -0700 (PDT) Received: by 10.35.112.3 with SMTP id p3mr1911649pym.1192558163414; Tue, 16 Oct 2007 11:09:23 -0700 (PDT) Received: by 10.107.65.8 with SMTP id s8gr2067prk; Tue, 16 Oct 2007 11:09:18 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.23.13 with SMTP id 13mr9179723nzw.1192558157809; Tue, 16 Oct 2007 11:09:17 -0700 (PDT) Received: from swip001.ftl.affinity.com (lvs00-fl-swip001.ftl.affinity.com [216.219.253.11]) by mx.google.com with ESMTP id h49si362235nzf.2007.10.16.11.09.17; Tue, 16 Oct 2007 11:09:17 -0700 (PDT) Received-SPF: neutral (google.com: 216.219.253.11 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.11; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.11 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [70.22.225.92] ([70.22.225.92]:38667 "EHLO Raphael.tscm.com") by swip001.ftl.affinity.com with ESMTP id S380158AbXJPSJQ (ORCPT ); Tue, 16 Oct 2007 14:09:16 -0400 Message-Id: <7.0.1.0.2.20071016134814.163c56a8@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Tue, 16 Oct 2007 14:04:43 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] {2067} Phone Companies Muzzled On Eavesdropping Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.cbsnews.com/stories/2007/10/16/national/main3371566.shtml Phone Companies Muzzled On Eavesdropping WASHINGTON, Oct. 16, 2007 (AP) Three telecommunications companies have declined to tell Congress whether they gave U.S. intelligence agencies access to Americans' phone and computer records without court orders, citing White House objections and national security. Director of National Intelligence Mike McConnell "formally invoked the state secrets privilege to prevent AT&T from either confirming or denying" any details about intelligence programs, AT&T general counsel Wayne Watts wrote in a letter to the House Energy and Commerce Committee. Qwest and Verizon also declined to answer, saying the federal government has prohibited them from providing information, discussing or referring to any classified intelligence activities. "Our company essentially finds itself caught in the middle of an oversight dispute between the Congress and the executive relating to government surveillance activities," Watts wrote. The White House declined to comment on the matter Monday. The letter from Verizon provided some detail on the kind of information the government is seeking. Verizon has been regularly asked in subpoenas and national security letters to identify a "calling circle" for certain telephone numbers and to provide related subscriber information. The company has never complied with such a request as it does not maintain calling-circle records, according to Verizon general counsel Randal Milch. The House is about to consider a new government eavesdropping bill. The White House has threatened to veto the bill unless it includes retroactive legal immunity for telecommunications companies that assisted government investigations without court orders. The Bush administration has said the companies cooperated in good faith because of their patriotism and desire to protect the country in the wake of the Sept. 11, 2001, terrorist attacks, and should not be punished. However, last week a Colorado court unsealed documents in the case of former Qwest CEO Joseph Nacchio, who was convicted of insider trading in April. Nacchio, who is appealing his conviction, maintains the National Security Agency asked Qwest to allow it to conduct electronic surveillance without a court order in February 2001, six months before the Sept. 11 attacks. On Monday, House Judiciary Committee Chairman John Conyers, D-Mich., asked the Justice Department and McConnell for a full briefing on what he termed Nacchio's "disturbing revelation." House Democrats vowed last week not to grant immunity in the eavesdropping bill without being told exactly what the companies did that requires legal protection. Roughly 40 lawsuits have been filed against telecommunications companies for their alleged cooperation with the Terrorist Surveillance Program, the details of which are classified. U.S. intelligence agencies reportedly eavesdropped on calls and e-mails in the United States without court orders. A Senate version of the bill, scheduled for committee action on Thursday, is likely to include an immunity provision. The Bush administration has thus far refused to disclose to Congress details of the program other than classified briefings provided to a small group of House and Senate intelligence committee members. Telecommunications companies regularly and legally provide assistance to intelligence and law enforcement agencies. According to Verizon's Milch, the company received 88,000 lawful requests and demands for information from government entities - 34,000 from federal officials and 54,000 from state and local officials. Of those, 23,700 were emergency requests, 300 of them from federal officials. Verizon received more than 1,000 wiretap and other court orders in 2006, he said. It has received more than 630 court orders since last January. ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.24] ([172.28.128.24]:55451 "EHLO ip01.ams.ftl.affinity.com") by ams013.ftl.affinity.com with ESMTP id S609455AbXJPVU3; Tue, 16 Oct 2007 17:20:29 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAANjGFEfRVZL3mGdsb2JhbACOTgEBAQEHAggRFoEp Received: from wa-out-0708.google.com ([209.85.146.245]) by ip01.ams.ftl.affinity.com with ESMTP; 16 Oct 2007 17:20:19 -0400 Received: by wa-out-0708.google.com with SMTP id j19so5497824waf for ; Tue, 16 Oct 2007 14:20:12 -0700 (PDT) Received: by 10.114.171.1 with SMTP id t1mr1207538wae.1192568197920; Tue, 16 Oct 2007 13:56:37 -0700 (PDT) Received: by 10.106.220.37 with SMTP id s37gr2068prg; Tue, 16 Oct 2007 13:56:31 -0700 (PDT) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.36.145.2 with SMTP id s2mr9383123nzd.1192568190569; Tue, 16 Oct 2007 13:56:30 -0700 (PDT) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id v28si436748nzb.2007.10.16.13.56.29; Tue, 16 Oct 2007 13:56:30 -0700 (PDT) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id 0AC52503BFED5 for ; Tue, 16 Oct 2007 16:56:29 -0400 (EDT) Message-ID: <4715244C.6020003@phreaker.net> Date: Tue, 16 Oct 2007 16:51:24 -0400 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2068} [ PRIVACY Forum ] Tapping Every Phone Call in the Country -- Redux] X-AAC-KTE-LTE-MailScanner-Watermark: 1193172685.81394@pwWnln6gOv4A2nPQI0ssYA Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Tapping Every Phone Call in the Country -- Redux http://lauren.vortex.com/archive/000315.html Greetings. Now it becomes crystal clear why the phone companies have been begging to be indemnified for past participation in illegal wiretapping and subscriber transactional data disclosures -- it's obviously been going on massively for years -- as many of us have long suspected. Today's Washington Post explores Verizon's admission that they've been handing over customer calling data without court orders for ages ( http://tinyurl.com/2brmh2 ). Perhaps even more interesting is the news that the feds had also wanted the numbers being called by the people called by the targets of interest. That is, if person A was the target, and he called entity B (which might be a person or a business, of course), investigators also wanted the lists of everyone being called by entity B. When you work out the math, this is an utterly astounding way to drag vast numbers of innocent persons into such investigations. Verizon claimed not to have the necessary data to provide this secondary "community of interest" data, but the very fact that the government requested it speaks volumes. And who knows what was going on with AT&T? Actually, we do seem to know a bit more about Qwest and AT&T now -- though both are currently refusing to answer Congressional queries about their participation in the various illegal programs. Their defense? "The government prohibits us from telling you the truth." Gotta love those guys. Now it turns out that according to the former CEO of Qwest and other sources, the feds were busily laying the groundwork for these illicit operations months *before* 9/11. Fascinating. In light of all this, I can't help but wonder if my thoughts last year about "How to Tap Every Phone Call in the Country" ( http://lauren.vortex.com/archive/000177.html ) might be far less speculative than I thought at the time. We have more evidence than ever that the sensibilities behind interactions between government and telcos might have encouraged such an approach. Do I really think that wiretapping on such a scale is going on? No, I don't. But what's disturbing is that I believe that the federal government -- our federal government -- would not be unwilling to explore such an approach. That's pretty scary, in and of itself. --Lauren-- Lauren Weinstein lauren@vortex.com or lauren@pfir.org Tel: +1 (818) 225-2800 http://www.pfir.org/lauren Co-Founder, PFIR - People For Internet Responsibility - http://www.pfir.org Founder, PRIVACY Forum - http://www.vortex.com Member, ACM Committee on Computers and Public Policy Lauren's Blog: http://lauren.vortex.com _______________________________________________ privacy mailing list http://lists.vortex.com/mailman/listinfo/privacy --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.24] ([172.28.128.24]:10629 "EHLO ip01.ams.ftl.affinity.com") by ams020.ftl.affinity.com with ESMTP id S360076AbXJPV60; Tue, 16 Oct 2007 17:58:26 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAADvQFEfRVZL1kmdsb2JhbACCcotcAQEBAQcEBBMWgSmUBw Received: from wa-out-0708.google.com ([209.85.146.245]) by ip01.ams.ftl.affinity.com with ESMTP; 16 Oct 2007 17:58:20 -0400 Received: by wa-out-0708.google.com with SMTP id j19so5529096waf for ; Tue, 16 Oct 2007 14:58:08 -0700 (PDT) Received: by 10.114.171.1 with SMTP id t1mr1215916wae.1192571855192; Tue, 16 Oct 2007 14:57:35 -0700 (PDT) Received: by 10.107.65.8 with SMTP id s8gr2069prk; Tue, 16 Oct 2007 14:57:21 -0700 (PDT) X-Sender: MitchD@tscmusa.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.138.15 with SMTP id l15mr9483243nzd.1192571841473; Tue, 16 Oct 2007 14:57:21 -0700 (PDT) Received: from rwcrmhc14.comcast.net (rwcrmhc14.comcast.net [216.148.227.154]) by mx.google.com with ESMTP id y6si458597nzg.2007.10.16.14.57.20; Tue, 16 Oct 2007 14:57:21 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning MitchD@tscmusa.com does not designate 216.148.227.154 as permitted sender) client-ip=216.148.227.154; Authentication-Results: mx.google.com; spf=softfail (google.com: domain of transitioning MitchD@tscmusa.com does not designate 216.148.227.154 as permitted sender) smtp.mail=MitchD@tscmusa.com Received: from oem (c-69-245-41-186.hsd1.tn.comcast.net[69.245.41.186]) by comcast.net (rwcrmhc14) with SMTP id <20071016215719m1400p37tqe>; Tue, 16 Oct 2007 21:57:19 +0000 From: "TSCM/SO Group" To: References: <010e01c80f5b$76eca540$6601a8c0@oem> Subject: [TSCM-L] {2069} Re: GPS Jammer Date: Tue, 16 Oct 2007 16:57:23 -0500 Message-ID: <001101c8103f$8883c420$6601a8c0@oem> Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0012_01C81015.9FADBC20" X-Mailer: Microsoft Office Outlook 11 Thread-Index: AcgPotYHLmJ/Bim7RxiJznNP0OA7ZQAnFnIg In-Reply-To: X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

According to the site it appears the device causes interference around 1500 MHz

As to weather it actually works,I don’t know,I wouldn’t waste my $$ on it

 

 

Mitch Davis
TSCM/Special Operations Group
20 Music Square West,Suite 208
Nashville,TN 37203 USA
615 251 0441
Fax 615 523 0300
mitchd@tscmusa.com
www.tscmusa.com

"maintaining a higher degree of excellence"
******************************
Tools for investigators at
www.covertworx.com


From: TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com] On Behalf Of Tom Barrett
Sent: Monday, October 15, 2007 2:18 PM
To: TSCM-L2006@googlegroups.com
Subject: [TSCM-L] {2063} Re: GPS Jammer

 

Hmm...I wonder if that gadget works as well as their "bug detector", advertised on the same site?

-----Original Message-----
From: TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com]On Behalf Of TSCM/SO Group
Sent: Monday, October 15, 2007 2:45 PM
To: TSCM-L2006@googlegroups.com
Subject: [TSCM-L] {2062} GPS Jammer

It doesn’t make sense to operate a vehicle covered in tinfoil,not the freq used on the spec info area on the site

Heres the latest and greatest<g>:

http://microvideox.com/GPS-Counter-Track.html

 

Mitch Davis
TSCM/Special Operations Group
20 Music Square West,Suite 208
Nashville,TN 37203 USA
615 251 0441
Fax 615 523 0300
mitchd@tscmusa.com
www.tscmusa.com

"maintaining a higher degree of excellence"
******************************
Tools for investigators at
www.covertworx.com

CONFIDENTIALITY NOTICE: This communication may contain privileged or other
confidential information, protected from disclosure under applicable law. If
you are not the intended recipient, or the employee or agent responsible for
delivering the message to the intended recipient, or if you believe that you
have received this communication in error, please do not print, copy,
retransmit, disseminate, or otherwise use the information contained herein.
Also, please indicate to the sender that you have received this e-mail in
error, and delete the copy you have received. Thank you.
 

 

<BR


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.26] ([172.28.128.26]:19586 "EHLO ip03.ams.ftl.affinity.com") by ams007.ftl.affinity.com with ESMTP id S609266AbXJPWHG; Tue, 16 Oct 2007 18:07:06 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAB7TFEdA6aaoi2dsb2JhbACCcotcAQEBCAQEExEFgSk Received: from py-out-1314.google.com ([64.233.166.168]) by ip03.ams.ftl.affinity.com with ESMTP; 16 Oct 2007 18:07:02 -0400 Received: by py-out-1314.google.com with SMTP id p69so13459060pyb for ; Tue, 16 Oct 2007 15:07:01 -0700 (PDT) Received: by 10.35.18.18 with SMTP id v18mr1978265pyi.1192572412463; Tue, 16 Oct 2007 15:06:52 -0700 (PDT) Received: by 10.107.65.8 with SMTP id s8gr2070prk; Tue, 16 Oct 2007 15:06:46 -0700 (PDT) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.36.127.14 with SMTP id z14mr9498253nzc.1192572406133; Tue, 16 Oct 2007 15:06:46 -0700 (PDT) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id h49si460305nzf.2007.10.16.15.06.45; Tue, 16 Oct 2007 15:06:46 -0700 (PDT) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id 261A1503BFED6 for ; Tue, 16 Oct 2007 18:06:45 -0400 (EDT) Message-ID: <471534C1.4010604@phreaker.net> Date: Tue, 16 Oct 2007 18:01:37 -0400 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="------------070200070909090104030107" To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2070} Re: GPS Jammer References: <010e01c80f5b$76eca540$6601a8c0@oem> <001101c8103f$8883c420$6601a8c0@oem> In-Reply-To: <001101c8103f$8883c420$6601a8c0@oem> X-AAC-KTE-LTE-MailScanner-Watermark: 1193176898.09426@s4L/cED3tVm2DbEe+xF0dg Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , With as weak as GPS signals are in the first place, ANY broadband noise source in the 1500mhz ranges should do.


TSCM/SO Group wrote:

According to the site it appears the device causes interference around 1500 MHz

As to weather it actually works,I don’t know,I wouldn’t waste my $$ on it

 

 

Mitch Davis
TSCM/Special Operations Group
20 Music Square West,Suite 208
Nashville , TN 37203 USA
615 251 0441
Fax 615 523 0300
mitchd@tscmusa.com
www.tscmusa.com

" maintaining a higher degree of excellence"
******************************
Tools for investigators at
www.covertworx.com

From: TSCM-L2006@googlegroups.com [mailto: TSCM-L2006@googlegroups.com ] On Behalf Of Tom Barrett
Sent: Monday, October 15, 2007 2:18 PM
To: TSCM-L2006@googlegroups.com
Subject: [TSCM-L] {2063} Re: GPS Jammer

 

Hmm...I wonder if that gadget works as well as their "bug detector", advertised on the same site?

-----Original Message-----
From: TSCM-L2006@googlegroups.com [mailto: TSCM-L2006@googlegroups.com ]On Behalf Of TSCM/SO Group
Sent: Monday, October 15, 2007 2:45 PM
To: TSCM-L2006@googlegroups.com
Subject: [TSCM-L] {2062} GPS Jammer

It doesn’t make sense to operate a vehicle covered in tinfoil,not the freq used on the spec info area on the site

Heres the latest and greatest<g>:

http://microvideox.com/GPS-Counter-Track.html

 

Mitch Davis
TSCM/Special Operations Group
20 Music Square West,Suite 208
Nashville , TN 37203 USA
615 251 0441
Fax 615 523 0300
mitchd@tscmusa.com
www.tscmusa.com

" maintaining a higher degree of excellence"
******************************
Tools for investigators at
www.covertworx.com

CONFIDENTIALITY NOTICE: This communication may contain privileged or other
confidential information, protected from disclosure under applicable law. If
you are not the intended recipient, or the employee or agent responsible for
delivering the message to the intended recipient, or if you believe that you
have received this communication in error, please do not print, copy,
retransmit, disseminate, or otherwise use the information contained herein.
Also, please indicate to the sender that you have received this e-mail in
error, and delete the copy you have received. Thank you.
 

 

<BR




--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.25] ([172.28.128.25]:23325 "EHLO ip02.ams.ftl.affinity.com") by ams015.ftl.affinity.com with ESMTP id S411726AbXJQFer; Wed, 17 Oct 2007 01:34:47 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAOI7FUfRVZL5kmdsb2JhbACCPTWLXAIBAQcEBAkKFoEp Received: from wa-out-0708.google.com ([209.85.146.249]) by ip02.ams.ftl.affinity.com with ESMTP; 17 Oct 2007 01:34:46 -0400 Received: by wa-out-0708.google.com with SMTP id j19so5789064waf for ; Tue, 16 Oct 2007 22:34:46 -0700 (PDT) Received: by 10.114.81.1 with SMTP id e1mr1233317wab.1192580041288; Tue, 16 Oct 2007 17:14:01 -0700 (PDT) Received: by 10.106.227.26 with SMTP id z26gr2071prg; Tue, 16 Oct 2007 17:13:55 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.127.17 with SMTP id z17mr9674763nzc.1192580035520; Tue, 16 Oct 2007 17:13:55 -0700 (PDT) Received: from swip006.ftl.affinity.com (lvs00-fl-swip006.ftl.affinity.com [216.219.253.16]) by mx.google.com with ESMTP id y6si509753nzg.2007.10.16.17.13.54; Tue, 16 Oct 2007 17:13:55 -0700 (PDT) Received-SPF: neutral (google.com: 216.219.253.16 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.16; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.16 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [70.22.225.92] ([70.22.225.92]:57864 "EHLO Raphael.tscm.com") by swip006.ftl.affinity.com with ESMTP id S381250AbXJQANy (ORCPT ); Tue, 16 Oct 2007 20:13:54 -0400 Message-Id: <7.0.1.0.2.20071016195155.10630b90@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Tue, 16 Oct 2007 20:00:51 -0400 To: TSCM-L2006@googlegroups.com From: "James M. Atkinson" Subject: [TSCM-L] {2071} Re: GPS Jammer In-Reply-To: <471534C1.4010604@phreaker.net> References: <010e01c80f5b$76eca540$6601a8c0@oem> <001101c8103f$8883c420$6601a8c0@oem> <471534C1.4010604@phreaker.net> Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="=====================_120116109==.ALT" Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , You only need a mill-Watt or so of power within 15 feet of a GPS antenna to render most systems inoperable.

If you put a 30-50 mW transmitter on each of the bumpers, one under the dash, and one in the passenger headrest you will mask most GPS trackers.

100 mW per channel will kill GPS systems on other vehicles out to a considerable distance.

-jma



At 06:01 PM 10/16/2007, kondrak wrote:

With as weak as GPS signals are in the first place, ANY broadband noise source in the 1500mhz ranges should do.


TSCM/SO Group wrote:

According to the site it appears the device causes interference around 1500 MHz

As to weather it actually works,I donít know,I wouldnít waste my $$ on it

 

 

Mitch Davis
TSCM/Special Operations Group
20 Music Square West,Suite 208
Nashville , TN 37203 USA
615 251 0441
Fax 615 523 0300
mitchd@tscmusa.com
www.tscmusa.com

" maintaining a higher degree of excellence"
******************************
Tools for investigators at www.covertworx.com

From: TSCM-L2006@googlegroups.com [mailto: TSCM-L2006@googlegroups.com ] On Behalf Of Tom Barrett
Sent: Monday, October 15, 2007 2:18 PM
To: TSCM-L2006@googlegroups.com
Subject: [TSCM-L] {2063} Re: GPS Jammer

 

Hmm...I wonder if that gadget works as well as their "bug detector", advertised on the same site?

-----Original Message-----
From: TSCM-L2006@googlegroups.com [mailto: TSCM-L2006@googlegroups.com ]On Behalf Of TSCM/SO Group
Sent: Monday, October 15, 2007 2:45 PM
To: TSCM-L2006@googlegroups.com
Subject: [TSCM-L] {2062} GPS Jammer

It doesnít make sense to operate a vehicle covered in tinfoil,not the freq used on the spec info area on the site

Heres the latest and greatest<g>:

http://microvideox.com/GPS-Counter-Track.html

 

Mitch Davis
TSCM/Special Operations Group
20 Music Square West,Suite 208
Nashville , TN 37203 USA
615 251 0441
Fax 615 523 0300
mitchd@tscmusa.com
www.tscmusa.com

" maintaining a higher degree of excellence"
******************************
Tools for investigators at www.covertworx.com

CONFIDENTIALITY NOTICE: This communication may contain privileged or other
confidential information, protected from disclosure under applicable law. If
you are not the intended recipient, or the employee or agent responsible for
delivering the message to the intended recipient, or if you believe that you
have received this communication in error, please do not print, copy,
retransmit, disseminate, or otherwise use the information contained herein.
Also, please indicate to the sender that you have received this e-mail in
error, and delete the copy you have received. Thank you.
 

 

<BR



----------------------------------------------------------------------------------------------------
  World Class, Professional, Ethical, and Competent Bug Sweeps, and
Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
----------------------------------------------------------------------------------------------------
 James M. Atkinson                              Phone:  (978) 381-9111
 Granite Island Group                          Fax:     
 127 Eastern Avenue #291                 Web:    http://www.tscm.com/
 Gloucester, MA 01931-8008              E-mail:  mailto:jmatk@tscm.com
----------------------------------------------------------------------------------------------------
 We perform bug sweeps like it's a full contact sport, we take no prisoners,
and we give no quarter. Our goal is to simply, and completely stop the spy.
----------------------------------------------------------------------------------------------------


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.26] ([172.28.128.26]:59040 "EHLO ip03.ams.ftl.affinity.com") by ams007.ftl.affinity.com with ESMTP id S607514AbXJQDEO; Tue, 16 Oct 2007 23:04:14 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAEMYFUdA6aLzi2dsb2JhbACNWXUCAQgEBAkKEQWBKQ Received: from nz-out-0708.google.com ([64.233.162.243]) by ip03.ams.ftl.affinity.com with ESMTP; 16 Oct 2007 23:04:13 -0400 Received: by nz-out-0708.google.com with SMTP id q60so7691598nzb for ; Tue, 16 Oct 2007 20:04:12 -0700 (PDT) Received: by 10.35.43.10 with SMTP id v10mr2050796pyj.1192590240606; Tue, 16 Oct 2007 20:04:00 -0700 (PDT) Received: by 10.106.186.38 with SMTP id j38gr2072prf; Tue, 16 Oct 2007 20:03:47 -0700 (PDT) X-Sender: dan@geer.org X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.33.6 with SMTP id g6mr9803961nzg.1192590226172; Tue, 16 Oct 2007 20:03:46 -0700 (PDT) Received: from absinthe.tinho.net (absinthe.tinho.net [166.84.5.228]) by mx.google.com with ESMTP id h71si554968nzf.2007.10.16.20.03.45; Tue, 16 Oct 2007 20:03:46 -0700 (PDT) Received-SPF: neutral (google.com: 166.84.5.228 is neither permitted nor denied by best guess record for domain of dan@geer.org) client-ip=166.84.5.228; Authentication-Results: mx.google.com; spf=neutral (google.com: 166.84.5.228 is neither permitted nor denied by best guess record for domain of dan@geer.org) smtp.mail=dan@geer.org Received: by absinthe.tinho.net (Postfix, from userid 126) id E70CE33D4B; Tue, 16 Oct 2007 23:03:44 -0400 (EDT) Received: from absinthe.tinho.net (localhost [127.0.0.1]) by absinthe.tinho.net (Postfix) with ESMTP id E534E33D21 for ; Tue, 16 Oct 2007 23:03:44 -0400 (EDT) From: dan@geer.org To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2072} Re: [ PRIVACY Forum ] Tapping Every Phone Call in the Country -- Redux] In-Reply-To: Your message of "Tue, 16 Oct 2007 16:51:24 EDT." <4715244C.6020003@phreaker.net> Date: Tue, 16 Oct 2007 23:03:44 -0400 Message-Id: <20071017030344.E70CE33D4B@absinthe.tinho.net> Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , kondrak writes: | | | | Tapping Every Phone Call in the Country -- Redux | | http://lauren.vortex.com/archive/000315.html | | | Greetings. Now it becomes crystal clear why the phone companies | have been begging to be indemnified for past participation in | illegal wiretapping and subscriber transactional data disclosures -- | it's obviously been going on massively for years -- as many of us | have long suspected. | | Today's Washington Post explores Verizon's admission that they've | been handing over customer calling data without court orders for | ages ( http://tinyurl.com/2brmh2 ). | The thing to remember is that, per the law and the courts, calling records are the property of the phone company -- they are not yours and you have no statutory right to them, at least in the U.S. There is no unitary "right to privacy" but rather a patois of specific privacy-like rights. For example, by law what you watch on cable television is protected, i.e., what you watch cannot be be kept as a record. However, what you download is not specifically called out as protected and thus what you download is not information about you that you control. Rather, it is operational data that is the property of the upstream provider, and capital-intensive industrial concerns are far, far easier for a government to push around than is some small nothing. Wishful thinking about this is at once useless and vapid. A Constitutional Amendment is perhaps the only genuine answer, unless you like the continuing jingoism of this or that judge inventing a right that the Congress has never had the moral fortitude to enshrine in law. No, I don't like it. --dan --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:29999 "EHLO ip03.ams.ftl.affinity.com") by ams016.ftl.affinity.com with ESMTP id S868037AbXJQGGy; Wed, 17 Oct 2007 02:06:54 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAKlDFUdA6aLxi2dsb2JhbACOTQIBCAQECQoRBYEp Received: from nz-out-0708.google.com ([64.233.162.241]) by ip03.ams.ftl.affinity.com with ESMTP; 17 Oct 2007 02:06:54 -0400 Received: by nz-out-0708.google.com with SMTP id q60so7845695nzb for ; Tue, 16 Oct 2007 23:06:53 -0700 (PDT) Received: by 10.35.16.6 with SMTP id t6mr2079902pyi.1192601204738; Tue, 16 Oct 2007 23:06:44 -0700 (PDT) Received: by 10.106.227.26 with SMTP id z26gr2073prg; Tue, 16 Oct 2007 23:06:34 -0700 (PDT) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.36.33.8 with SMTP id g8mr9843997nzg.1192601194079; Tue, 16 Oct 2007 23:06:34 -0700 (PDT) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id 20si600407nzu.2007.10.16.23.06.31; Tue, 16 Oct 2007 23:06:34 -0700 (PDT) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id D8B4F502B8F39 for ; Wed, 17 Oct 2007 02:06:30 -0400 (EDT) Message-ID: <4715A533.1020906@phreaker.net> Date: Wed, 17 Oct 2007 02:01:23 -0400 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2073} Re: [ PRIVACY Forum ] Tapping Every Phone Call in the Country -- Redux] References: <20071017030344.E70CE33D4B@absinthe.tinho.net> In-Reply-To: <20071017030344.E70CE33D4B@absinthe.tinho.net> X-AAC-KTE-LTE-MailScanner-Watermark: 1193205684.07175@PzJ67OCGwdAEmOBD1t6nCQ Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , It really doesn't matter, as the jackbooted thugs will do anything they want any ways, and theres no hope for the courts, as they're all corrupt as well. Its finally over, liberty and freedom are over. Game over man...game over. Seig Heil big brother! dan@geer.org wrote: > kondrak writes: > | > | > | > | Tapping Every Phone Call in the Country -- Redux > | > | http://lauren.vortex.com/archive/000315.html > | > | > | Greetings. Now it becomes crystal clear why the phone companies > | have been begging to be indemnified for past participation in > | illegal wiretapping and subscriber transactional data disclosures -- > | it's obviously been going on massively for years -- as many of us > | have long suspected. > | > | Today's Washington Post explores Verizon's admission that they've > | been handing over customer calling data without court orders for > | ages ( http://tinyurl.com/2brmh2 ). > | > > The thing to remember is that, per the law and the courts, > calling records are the property of the phone company -- they > are not yours and you have no statutory right to them, at least > in the U.S. There is no unitary "right to privacy" but rather a > patois of specific privacy-like rights. For example, by law > what you watch on cable television is protected, i.e., what you > watch cannot be be kept as a record. However, what you download > is not specifically called out as protected and thus what you > download is not information about you that you control. Rather, > it is operational data that is the property of the upstream > provider, and capital-intensive industrial concerns are far, > far easier for a government to push around than is some small > nothing. > > Wishful thinking about this is at once useless and vapid. A > Constitutional Amendment is perhaps the only genuine answer, > unless you like the continuing jingoism of this or that judge > inventing a right that the Congress has never had the moral > fortitude to enshrine in law. > > No, I don't like it. > > --dan > > > > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:64861 "EHLO ip04.ams.ftl.affinity.com") by ams011.ftl.affinity.com with ESMTP id S367514AbXJSAKM; Thu, 18 Oct 2007 20:10:12 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAHuSF0dA6bj0lmdsb2JhbACOTQIBAQcCCBERB4En Received: from wr-out-0708.google.com ([64.233.184.244]) by ip04.ams.ftl.affinity.com with ESMTP; 18 Oct 2007 20:10:07 -0400 Received: by wr-out-0708.google.com with SMTP id 75so6569253wra for ; Thu, 18 Oct 2007 17:10:07 -0700 (PDT) Received: by 10.36.66.6 with SMTP id o6mr1628771nza.1192739976383; Thu, 18 Oct 2007 13:39:36 -0700 (PDT) Received: by 10.107.142.31 with SMTP id u31gr2074prn; Thu, 18 Oct 2007 13:39:35 -0700 (PDT) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.35.124.20 with SMTP id b20mr21798403pyn.1192739973978; Thu, 18 Oct 2007 13:39:33 -0700 (PDT) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id z53si5126069pyg.2007.10.18.13.39.33; Thu, 18 Oct 2007 13:39:33 -0700 (PDT) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id DD3EE501A855C for ; Thu, 18 Oct 2007 16:39:32 -0400 (EDT) Message-ID: <4717C351.6040805@phreaker.net> Date: Thu, 18 Oct 2007 16:34:25 -0400 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2074} [Fwd: [Fwd: [ PRIVACY Forum ] Democrats Continue Spineless Course on Wiretapping Bill]] X-AAC-KTE-LTE-MailScanner-Watermark: 1193344469.52295@ur7BOK8xPAAb2FYrxFnN7Q Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , I dont write 'em I only forward 'em. Democrats Continue Spineless Course on Wiretapping Bill http://lauren.vortex.com/archive/000319.html Greetings. Just to update, Democrats in Congress continue their disgraceful march toward selling the American people down the river, by rolling over and playing dead for the Bush administration on the wiretapping bill ( http://tinyurl.com/379ae6 ). I expected such attitudes and games from the GOP of course, but the Democrats' performance on this matter is abysmal, even given that their majority in the Senate is very thin. Not only are the civil liberties and basic rights of *Americans* being put at risk by these Congressional actions, in a manner more fitting of the old Soviet Union than the United States, but Congress seems ready to grant retroactive immunity to the telephone giants for their blatantly illegal handing over of customer records and related clearly illicit activities. Crafting a wiretapping bill that would be effective against foreign targets without decimating American rights is certainly possible. But Congress doesn't have the fortitude or ethical compass for protecting *our* rights any more. Just say the word "terrorist" and everything else goes out the window in a blast of political oneupmanship. I do hope that you'll remember Congress' actions in this regard come the next election. --Lauren-- Lauren Weinstein lauren@vortex.com or lauren@pfir.org Tel: +1 (818) 225-2800 http://www.pfir.org/lauren Co-Founder, PFIR - People For Internet Responsibility - http://www.pfir.org Founder, PRIVACY Forum - http://www.vortex.com Member, ACM Committee on Computers and Public Policy Lauren's Blog: http://lauren.vortex.com _______________________________________________ privacy mailing list http://lists.vortex.com/mailman/listinfo/privacy --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:20237 "EHLO ip03.ams.ftl.affinity.com") by ams021.ftl.affinity.com with ESMTP id S616931AbXJSIBK; Fri, 19 Oct 2007 04:01:10 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAGYAGEfRVZL3mGdsb2JhbACOTwIBAQcCCBEWgSkB Received: from wa-out-0708.google.com ([209.85.146.247]) by ip03.ams.ftl.affinity.com with ESMTP; 19 Oct 2007 04:01:09 -0400 Received: by wa-out-0708.google.com with SMTP id j19so326945waf for ; Fri, 19 Oct 2007 01:01:05 -0700 (PDT) Received: by 10.114.200.2 with SMTP id x2mr48996waf.1192780856349; Fri, 19 Oct 2007 01:00:56 -0700 (PDT) Received: by 10.106.220.37 with SMTP id s37gr2075prg; Fri, 19 Oct 2007 01:00:42 -0700 (PDT) X-Sender: texianranger1@sbcglobal.net X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.77.3 with SMTP id e3mr18080844pyl.1192629673566; Wed, 17 Oct 2007 07:01:13 -0700 (PDT) Received: from smtp102.sbc.mail.mud.yahoo.com (smtp102.sbc.mail.mud.yahoo.com [68.142.198.201]) by mx.google.com with SMTP id a28si3836734pye.2007.10.17.07.01.12; Wed, 17 Oct 2007 07:01:13 -0700 (PDT) Received-SPF: neutral (google.com: 68.142.198.201 is neither permitted nor denied by best guess record for domain of texianranger1@sbcglobal.net) client-ip=68.142.198.201; DomainKey-Status: good (test mode) Authentication-Results: mx.google.com; spf=neutral (google.com: 68.142.198.201 is neither permitted nor denied by best guess record for domain of texianranger1@sbcglobal.net) smtp.mail=texianranger1@sbcglobal.net; domainkeys=pass (test mode) header.From=texianranger1@sbcglobal.net Received: (qmail 31438 invoked from network); 17 Oct 2007 14:01:12 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=sbcglobal.net; h=Received:X-YMail-OSG:Message-ID:From:To:References:Subject:Date:MIME-Version:Content-Type:Content-Transfer-Encoding:X-Priority:X-MSMail-Priority:X-Mailer:Disposition-Notification-To:X-MimeOLE; b=mJyZnnLB5GjsnfoIX4eBIvypfnCE1MMfoSZXHm4uC1yckmf0sCCiTXXt3KWp7QIYdys1ZyjpdaMnlrWab+408FWIezmQE4qikM501+T3F0vtF5C4IC7Ja4vw/YBgCGFasL+8Uv6kF1dyeQ/szJBfshY5XomUckFCwyiKlazTEAM= ; Received: from unknown (HELO XP) (texianranger1@sbcglobal.net@75.53.146.189 with login) by smtp102.sbc.mail.mud.yahoo.com with SMTP; 17 Oct 2007 14:01:11 -0000 X-YMail-OSG: NJwlChYVM1kc3mH7qtPE1eTPa2mTqcJzawju3WAqtYBiux3TLb6nbqfGvuNslk2dv7mlQM2idV4Kf0mqiTWbCI3WAut5.bmu3LwUNnwOOptVojJ8q8SHTieIkB1zo16Z7zz84MMfvFVOefF4NdrgUg-- Message-ID: <002301c810c6$30693770$bd92354b@XP> From: "Wayne Blackburn" To: References: <20071017030344.E70CE33D4B@absinthe.tinho.net> <4715A533.1020906@phreaker.net> Subject: [TSCM-L] {2075} Re: [ PRIVACY Forum ] Tapping Every Phone Call in the Country -- Redux] Date: Wed, 17 Oct 2007 09:01:17 -0500 Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Priority: 1 X-MSMail-Priority: High X-Mailer: Microsoft Outlook Express 6.00.2900.3138 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 X-Google-Approved: grainger01982@gmail.com via web at 2007-10-19 08:00:40 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , The final curtain begins to close the day a new government becomes active. Our battle cry is and has always been, "Remember the Alamo". This very day we are still trying to take our Sovereign Nation away from the occupying forces. Texas, The Sovereign Nations, has never lost it identity. We are not legally a state in the USA, nor have we ever been. All Nations deal with each other by Treaty. There is no Treaty between the USA and The Sovereign Nation of Texas, signed by both parties. The cry is going out, USA and UN, get out of our Nation! The line was drawn in the sand at the Alamo. Together we prevail, divided we will all fail! I do not know where you live, but for Texians, (Correct spelling with and "i"), we will never give up. Charlton Hesston said it best, "Out of my cold dead hand". The fight has begun again for Liberty and Freedom in The Sovereign Nation of Texas with the same battle cry--Remember the Alamo Wayne Blackburn, Texian until death overtakes me. PS Law Enforcement has been notified that the US is about to introduce the AMERO Dollar and with it WE THE PEOPLE will no longer exist as the North American Union will be introduced consisting of Canada, USA, and Mexico as one nation. No more US Constitution, it will be UN Charter. For those that do not take up arms, they will die as slaves. You do have a choice. See the coins here: http://www.amerocurrency.com/amerophotos.html ----- Original Message ----- From: "kondrak" To: Sent: Wednesday, October 17, 2007 1:01 AM Subject: [TSCM-L] {2073} Re: [ PRIVACY Forum ] Tapping Every Phone Call in the Country -- Redux] > > It really doesn't matter, as the jackbooted thugs will do anything they > want any ways, and theres no hope for the courts, as they're all corrupt > as well. > Its finally over, liberty and freedom are over. > Game over man...game over. > Seig Heil big brother! > > > dan@geer.org wrote: >> kondrak writes: >> | >> | >> | >> | Tapping Every Phone Call in the Country -- Redux >> | >> | http://lauren.vortex.com/archive/000315.html >> | >> | >> | Greetings. Now it becomes crystal clear why the phone companies >> | have been begging to be indemnified for past participation in >> | illegal wiretapping and subscriber transactional data disclosures -- >> | it's obviously been going on massively for years -- as many of us >> | have long suspected. >> | >> | Today's Washington Post explores Verizon's admission that they've >> | been handing over customer calling data without court orders for >> | ages ( http://tinyurl.com/2brmh2 ). >> | >> >> The thing to remember is that, per the law and the courts, >> calling records are the property of the phone company -- they >> are not yours and you have no statutory right to them, at least >> in the U.S. There is no unitary "right to privacy" but rather a >> patois of specific privacy-like rights. For example, by law >> what you watch on cable television is protected, i.e., what you >> watch cannot be be kept as a record. However, what you download >> is not specifically called out as protected and thus what you >> download is not information about you that you control. Rather, >> it is operational data that is the property of the upstream >> provider, and capital-intensive industrial concerns are far, >> far easier for a government to push around than is some small >> nothing. >> >> Wishful thinking about this is at once useless and vapid. A >> Constitutional Amendment is perhaps the only genuine answer, >> unless you like the continuing jingoism of this or that judge >> inventing a right that the Congress has never had the moral >> fortitude to enshrine in law. >> >> No, I don't like it. >> >> --dan >> >> >> > >> >> > > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:26240 "EHLO ip04.ams.ftl.affinity.com") by ams002.ftl.affinity.com with ESMTP id S1394413AbXJSICe; Fri, 19 Oct 2007 04:02:34 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAABsBGEdA6bj7i2dsb2JhbACOTwIBCAQEExEFgSk Received: from wa-out-0708.google.com ([209.85.146.244]) by ip04.ams.ftl.affinity.com with ESMTP; 19 Oct 2007 04:02:32 -0400 Received: by wa-out-0708.google.com with SMTP id j19so328690waf for ; Fri, 19 Oct 2007 01:02:31 -0700 (PDT) Received: by 10.114.81.1 with SMTP id e1mr47237wab.1192780941109; Fri, 19 Oct 2007 01:02:21 -0700 (PDT) Received: by 10.107.114.37 with SMTP id r37gr2076prm; Fri, 19 Oct 2007 01:02:09 -0700 (PDT) X-Sender: intspecops@gmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.127.7 with SMTP id e7mr66670pyn.1192775551189; Thu, 18 Oct 2007 23:32:31 -0700 (PDT) Received: by t8g2000prg.googlegroups.com with HTTP; Fri, 19 Oct 2007 06:32:30 +0000 (UTC) X-IP: 64.150.158.176 From: Intspecops To: TSCM-L Professionals List Subject: [TSCM-L] {2076} We are hiring Date: Fri, 19 Oct 2007 06:32:30 -0000 Message-ID: <1192775550.084887.212280@t8g2000prg.googlegroups.com> User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.8.1.8) Gecko/20071008 Firefox/2.0.0.8,gzip(gfe),gzip(gfe) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Google-Approved: grainger01982@gmail.com via web at 2007-10-19 08:02:08 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , We are looking for both full and part time Sales team members for both www.Intspecops.com and www.Bulletcatchers.com . We want both Male and Female sales focused members to help push all the services both our companies offer. Great pay and you make your own hours. MUST HAVE A VERY GOOD UNDERSTANDING OF THE SECURITY INDUSTRY. Please call for details. Dominic Farley Director of Operations Jobs@Intspecops.com 843-331-9077 --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:18216 "EHLO ip04.ams.ftl.affinity.com") by ams007.ftl.affinity.com with ESMTP id S473541AbXJSLVH; Fri, 19 Oct 2007 07:21:07 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAP8vGEdA6aLykmdsb2JhbACNYXYCAQEHBAQTFoEp Received: from nz-out-0708.google.com ([64.233.162.242]) by ip04.ams.ftl.affinity.com with ESMTP; 19 Oct 2007 07:21:05 -0400 Received: by nz-out-0708.google.com with SMTP id h28so113820nzf for ; Fri, 19 Oct 2007 04:21:04 -0700 (PDT) Received: by 10.36.38.11 with SMTP id l11mr86989nzl.1192792855542; Fri, 19 Oct 2007 04:20:55 -0700 (PDT) Received: by 10.106.110.11 with SMTP id i11gr2077prc; Fri, 19 Oct 2007 04:20:46 -0700 (PDT) X-Sender: ejmichaels@gmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.23.16 with SMTP id 16mr127860nzw.1192792845222; Fri, 19 Oct 2007 04:20:45 -0700 (PDT) Received: from py-out-1112.google.com (py-out-1112.google.com [64.233.166.178]) by mx.google.com with ESMTP id y6si1129292nzg.2007.10.19.04.20.44; Fri, 19 Oct 2007 04:20:45 -0700 (PDT) Received-SPF: pass (google.com: domain of ejmichaels@gmail.com designates 64.233.166.178 as permitted sender) client-ip=64.233.166.178; Authentication-Results: mx.google.com; spf=pass (google.com: domain of ejmichaels@gmail.com designates 64.233.166.178 as permitted sender) smtp.mail=ejmichaels@gmail.com; dkim=pass (test mode) header.i=@gmail.com Received: by py-out-1112.google.com with SMTP id p76so898013pyb for ; Fri, 19 Oct 2007 04:20:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:x-rim-org-msg-ref-id:message-id:content-transfer-encoding:reply-to:x-priority:references:in-reply-to:sensitivity:importance:to:subject:from:date:content-type:mime-version; bh=UiSCMETqaKpR40HKaAD+PBhA6xujXV8lbx5h3ZvdaHU=; b=NwZknq7vbYBKSqYgqDAR5yK9bHHycl0RWPUcGgxedEkUJCwV0jvBOoRqUJuFd6Vnusf3TcRfMGwiyxQuAche4Ug+8pLJGX4eA3JkDneFUAhTbUcHFCtNGL2yR9ZB1kdpP+VKTPvu8w+Spkayb1LTMFb/6I89LTqCnB4LfxCIth0= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:x-rim-org-msg-ref-id:message-id:content-transfer-encoding:reply-to:x-priority:references:in-reply-to:sensitivity:importance:to:subject:from:date:content-type:mime-version; b=nRwNSodCW3OdcA2itlvp6PWxIAq3NF+kVK/3ZSDxV9TVKMbSuukty5yt6BhbFPOzMA+m2mn1gEtTcYLzftgIiL3RP4fcB/SapoZl2wKmukK/5Grmw6Rpb2N3Fy5eKna4dQ9GIJsZe1eM8s7JNlWJ/aEAGwRjmHbGNDQry5GdGwg= Received: by 10.65.213.4 with SMTP id p4mr3176021qbq.1192792843940; Fri, 19 Oct 2007 04:20:43 -0700 (PDT) Received: from bda117-cell01.bisx.prod.on.blackberry ( [216.9.249.117]) by mx.google.com with ESMTPS id 22sm426936nzn.2007.10.19.04.20.41 (version=SSLv3 cipher=RC4-MD5); Fri, 19 Oct 2007 04:20:42 -0700 (PDT) X-rim-org-msg-ref-id: 921392823 Message-ID: <921392823-1192792831-cardhu_decombobulator_blackberry.rim.net-2051719516-@bxe033.bisx.prod.on.blackberry> Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com X-Priority: Normal References: <1192775550.084887.212280@t8g2000prg.googlegroups.com> In-Reply-To: <1192775550.084887.212280@t8g2000prg.googlegroups.com> Sensitivity: Normal Importance: Normal To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2077} Re: We are hiring From: ejmichaels@gmail.com Date: Fri, 19 Oct 2007 11:20:27 +0000 Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , And an HR person that knows that one can not refer to males and females in help wanted advertisements in the US. It may appear legal but even the order of the sexs are named is considered prejudicial. Even tjhe conservative New Jersey State Police includes Both and Other as sex choices on certain applications. Sent from my Verizon Wireless BlackBerry -----Original Message----- From: Intspecops Date: Fri, 19 Oct 2007 06:32:30 To:TSCM-L Professionals List Subject: [TSCM-L] {2076} We are hiring We are looking for both full and part time Sales team members for both www.Intspecops.com and www.Bulletcatchers.com . We want both Male and Female sales focused members to help push all the services both our companies offer. Great pay and you make your own hours. MUST HAVE A VERY GOOD UNDERSTANDING OF THE SECURITY INDUSTRY. Please call for details. Dominic Farley Director of Operations Jobs@Intspecops.com 843-331-9077 --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.24] ([172.28.128.24]:65203 "EHLO ip01.ams.ftl.affinity.com") by ams022.ftl.affinity.com with ESMTP id S479989AbXJUFfX; Sun, 21 Oct 2007 01:35:23 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAKaBGkfRVZL1kmdsb2JhbACOVgEBAQEHAgYpgSk Received: from wa-out-0708.google.com ([209.85.146.245]) by ip01.ams.ftl.affinity.com with ESMTP; 21 Oct 2007 01:35:24 -0400 Received: by wa-out-0708.google.com with SMTP id j19so1569362waf for ; Sat, 20 Oct 2007 22:35:22 -0700 (PDT) Received: by 10.115.16.1 with SMTP id t1mr117066wai.1192804827037; Fri, 19 Oct 2007 07:40:27 -0700 (PDT) Received: by 10.106.220.37 with SMTP id s37gr2078prg; Fri, 19 Oct 2007 07:40:17 -0700 (PDT) X-Sender: supportyourlocal81@gmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.15.11 with SMTP id s11mr2720895pyi.1192737152690; Thu, 18 Oct 2007 12:52:32 -0700 (PDT) Received: by z24g2000prh.googlegroups.com with HTTP; Thu, 18 Oct 2007 19:52:31 +0000 (UTC) X-IP: 209.92.88.43 From: Chuck To: TSCM-L Professionals List Subject: [TSCM-L] {2078} Simpson 8455 Meter Date: Thu, 18 Oct 2007 12:52:31 -0700 Message-ID: <1192737151.502484.295560@z24g2000prh.googlegroups.com> User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; InfoPath.1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30),gzip(gfe),gzip(gfe) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Google-Approved: grainger01982@gmail.com via web at 2007-10-19 14:40:16 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Quick question regarding the Simpson meter as pictured in the file section..... Will this meter replicate the line imbalance tests that utilize a DMM and the paired 2700 ohm resistors as outlined in some of the phone related TSCM work that's published (i.e. the Charles Taylor book)? Does anyone in the field use this meter as an aid for determining if something unwanted is on a pair? Is the meter sensitive enough to be of reasonable value? Thanks for your comments. --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:20185 "EHLO ip03.ams.ftl.affinity.com") by ams013.ftl.affinity.com with ESMTP id S614305AbXJSPAD; Fri, 19 Oct 2007 11:00:03 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAABJjGEdA6aLxi2dsb2JhbACNYXYCAQgEBBMRBYEp Received: from nz-out-0708.google.com ([64.233.162.241]) by ip03.ams.ftl.affinity.com with ESMTP; 19 Oct 2007 11:00:01 -0400 Received: by nz-out-0708.google.com with SMTP id h28so121809nzf for ; Fri, 19 Oct 2007 08:00:01 -0700 (PDT) Received: by 10.115.61.1 with SMTP id o1mr121990wak.1192805984090; Fri, 19 Oct 2007 07:59:44 -0700 (PDT) Received: by 10.107.65.8 with SMTP id s8gr2079prk; Fri, 19 Oct 2007 07:59:31 -0700 (PDT) X-Sender: Ed.Steinmetz@compucom.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.22.10 with SMTP id 10mr429726nzv.1192805970196; Fri, 19 Oct 2007 07:59:30 -0700 (PDT) Received: from compucom.com (smtp3.compucom.com [204.214.144.124]) by mx.google.com with ESMTP id x35si1263154nzg.2007.10.19.07.59.29; Fri, 19 Oct 2007 07:59:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of Ed.Steinmetz@compucom.com designates 204.214.144.124 as permitted sender) client-ip=204.214.144.124; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of Ed.Steinmetz@compucom.com designates 204.214.144.124 as permitted sender) smtp.mail=Ed.Steinmetz@compucom.com X-SEF-Processed: 5_0_0_910__2007_10_19_09_59_26 X-SEF-F070C130-825B-46F3-B971-50832EB4867B: 1 Received: from Unknown [204.214.144.127] by CompuCom - SurfControl E-mail Filter (5.0); Fri, 19 Oct 2007 09:59:26 -0500 Received: from SP099EXV01.compucom.local ([10.17.6.220]) by SP099EXW01.compucom.local with Microsoft SMTPSVC(6.0.3790.3959); Fri, 19 Oct 2007 09:59:26 -0500 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Subject: [TSCM-L] {2079} Re: Simpson 8455 Meter Date: Fri, 19 Oct 2007 09:59:25 -0500 Message-ID: <05226F788C3E6046B9F592CDC4995678681C8D@SP099EXV01.compucom.local> In-Reply-To: <1192737151.502484.295560@z24g2000prh.googlegroups.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [TSCM-L] {2078} Simpson 8455 Meter thread-index: AcgSXgeBTvpPTuuPSDayoXnXlDFiZQAAemMg References: <1192737151.502484.295560@z24g2000prh.googlegroups.com> From: To: X-OriginalArrivalTime: 19 Oct 2007 14:59:26.0859 (UTC) FILETIME=[A4A66DB0:01C81260] Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Chuck, I have used this test with the Dektor DETA analyzer. The test will identify additional resistance on a line, as a result of a series tap. Some of the telephone industry analyzers I have used like the Riser Bond 6000 and Tek TS200 also have a line imbalance feature that saves you the math. Will not be very helpful however on an inductive attack. Sorry, have not used a Simpson, in quite a while. Hope this was helpful. Ed www.tscm-sweeps.com -----Original Message----- From: TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com] On Behalf Of Chuck Sent: Thursday, October 18, 2007 3:53 PM To: TSCM-L Professionals List Subject: [TSCM-L] {2078} Simpson 8455 Meter Quick question regarding the Simpson meter as pictured in the file section..... Will this meter replicate the line imbalance tests that utilize a DMM and the paired 2700 ohm resistors as outlined in some of the phone related TSCM work that's published (i.e. the Charles Taylor book)? Does anyone in the field use this meter as an aid for determining if something unwanted is on a pair? Is the meter sensitive enough to be of reasonable value? Thanks for your comments. --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.24] ([172.28.128.24]:3590 "EHLO ip01.ams.ftl.affinity.com") by ams006.ftl.affinity.com with ESMTP id S1394429AbXJSSSe; Fri, 19 Oct 2007 14:18:34 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAALeRGEdA6aari2dsb2JhbACOVQIBCAQEExEFgSk Received: from py-out-1314.google.com ([64.233.166.171]) by ip01.ams.ftl.affinity.com with ESMTP; 19 Oct 2007 14:18:32 -0400 Received: by py-out-1314.google.com with SMTP id p69so2311840pyb for ; Fri, 19 Oct 2007 11:18:31 -0700 (PDT) Received: by 10.35.81.2 with SMTP id i2mr292805pyl.1192817053271; Fri, 19 Oct 2007 11:04:13 -0700 (PDT) Received: by 10.106.195.30 with SMTP id s30gr2080prf; Fri, 19 Oct 2007 11:04:08 -0700 (PDT) X-Sender: rds_6@yahoo.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.106.19 with SMTP id e19mr632426nzc.1192812966380; Fri, 19 Oct 2007 09:56:06 -0700 (PDT) Received: from web52911.mail.re2.yahoo.com (web52911.mail.re2.yahoo.com [206.190.49.21]) by mx.google.com with SMTP id h49si1328251nzf.2007.10.19.09.56.05; Fri, 19 Oct 2007 09:56:06 -0700 (PDT) Received-SPF: pass (google.com: domain of rds_6@yahoo.com designates 206.190.49.21 as permitted sender) client-ip=206.190.49.21; DomainKey-Status: good (test mode) Authentication-Results: mx.google.com; spf=pass (google.com: domain of rds_6@yahoo.com designates 206.190.49.21 as permitted sender) smtp.mail=rds_6@yahoo.com; domainkeys=pass (test mode) header.From=rds_6@yahoo.com Received: (qmail 14982 invoked by uid 60001); 19 Oct 2007 16:56:05 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID; b=wsgzqhwTX5CcIy482D2ZTYGfiaODHsbjYuYmp4Yb4eDMK9Ky5xOOxKerDNQD4uOQ01dJmKe3e3JlaNMsd07Em858Tz26YpRDgIDyV86kbDXjnMIydVEJry5zgxgpd0B9TTaii7VTYY8NKDs/3QLHf/sbxpBKbeZa1efeJnxopDo=; X-YMail-OSG: no14XV0VM1kc_vMWgwbjCtXJ.xZVSFTupL4kXbGmb7yxWQe7o_juHqCl6iev7oZSh95c1QeUPDnpBrs7_khoguCndR1YGk5ukEBTwOvF7Z_4dGa9_ig- Received: from [71.155.190.162] by web52911.mail.re2.yahoo.com via HTTP; Fri, 19 Oct 2007 09:56:05 PDT Date: Fri, 19 Oct 2007 09:56:05 -0700 (PDT) From: "R. Snyder" Subject: [TSCM-L] {2080} Re: Simpson 8455 Meter To: TSCM-L2006@googlegroups.com In-Reply-To: <05226F788C3E6046B9F592CDC4995678681C8D@SP099EXV01.compucom.local> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 8bit Message-ID: <177990.13566.qm@web52911.mail.re2.yahoo.com> X-Google-Approved: grainger01982@gmail.com via web at 2007-10-19 18:04:07 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , The KS-8455 "Brownie" kick meter is old school. Once a user has become familiarized with its operation, the user intuitively interprets readings from the meter, especially when the "REV" switch is used to obtain dynamic readings indicative of capacitance (hence, the name "kick meter"). Thus, if you're familiar with an 8455, you can obtain useful information with it. If you're not, it may not be worth your time to develop a working relationship with it. The logistics of keeping fresh 45-volt batteries in stock (unless you use five 9-volt batteries in series) make the 8455 less than ideal. However, you can probably get an 8455 on eBay for $10-15 if you want to try one out. One of the main things I like about the 8455 is the much higher voltage (45 volts) for the ohmmeter than the typical very low voltages of most ohmmeters, in case I'm performing a test where the higher voltage would be beneficial. I wouldn't recommend a 8455 over a DMM for the 2700-ohm resistor imbalance measurement. Furthermore, for line imbalance, you might look into getting a Sidekick meter, which largely replaced the 8455. The Sidekick stresses the pair with a 90 dBrnC longitudinal signal that drives current through any series resistance fault on the pair. The series resistance converts the longitudinal current into voltage at the fault that produces a high stressed noise reading. --- Ed.Steinmetz@compucom.com wrote: > > Chuck, > > I have used this test with the Dektor DETA analyzer. > > The test will identify additional resistance on a > line, as a result of a > series tap. Some of the telephone industry > analyzers I have used like > the Riser Bond 6000 and Tek TS200 also have a line > imbalance feature > that saves you the math. Will not be very helpful > however on an > inductive attack. > > Sorry, have not used a Simpson, in quite a while. > Hope this was > helpful. > > Ed > www.tscm-sweeps.com > > > -----Original Message----- > From: TSCM-L2006@googlegroups.com > [mailto:TSCM-L2006@googlegroups.com] > On Behalf Of Chuck > Sent: Thursday, October 18, 2007 3:53 PM > To: TSCM-L Professionals List > Subject: [TSCM-L] {2078} Simpson 8455 Meter > > > Quick question regarding the Simpson meter as > pictured in the file > section..... Will this meter replicate the line > imbalance tests that > utilize a DMM and the paired 2700 ohm resistors as > outlined in some of > the phone related TSCM work that's published (i.e. > the Charles Taylor > book)? Does anyone in the field use this meter as > an aid for > determining if something unwanted is on a pair? Is > the meter > sensitive enough to be of reasonable value? > > Thanks for your comments. > > > > > > > > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:38300 "EHLO ip04.ams.ftl.affinity.com") by ams010.ftl.affinity.com with ESMTP id S484120AbXJVAFP; Sun, 21 Oct 2007 20:05:15 -0400 Received: from nz-out-0708.google.com ([64.233.162.246]) by ip04.ams.ftl.affinity.com with ESMTP; 21 Oct 2007 20:04:46 -0400 Received: by nz-out-0708.google.com with SMTP id h28so4579645nzf for ; Sun, 21 Oct 2007 17:04:45 -0700 (PDT) Received: by 10.36.127.3 with SMTP id z3mr592583nzc.1193011464642; Sun, 21 Oct 2007 17:04:24 -0700 (PDT) Received: by 10.107.114.37 with SMTP id r37gr2081prm; Sun, 21 Oct 2007 17:04:13 -0700 (PDT) X-Sender: aredandgold@msn.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.37.18 with SMTP id p18mr8241361pyj.1193011449859; Sun, 21 Oct 2007 17:04:09 -0700 (PDT) Received: from bay0-omc3-s14.bay0.hotmail.com (bay0-omc3-s14.bay0.hotmail.com [65.54.246.214]) by mx.google.com with ESMTP id k36si2099321waf.2007.10.21.17.04.06; Sun, 21 Oct 2007 17:04:08 -0700 (PDT) Received-SPF: pass (google.com: domain of aredandgold@msn.com designates 65.54.246.214 as permitted sender) client-ip=65.54.246.214; Authentication-Results: mx.google.com; spf=pass (google.com: domain of aredandgold@msn.com designates 65.54.246.214 as permitted sender) smtp.mail=aredandgold@msn.com Received: from hotmail.com ([10.6.19.13]) by bay0-omc3-s14.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Sun, 21 Oct 2007 17:04:01 -0700 Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Sun, 21 Oct 2007 17:04:01 -0700 Message-ID: Received: from 68.113.73.48 by BLU116-DAV3.phx.gbl with DAV; Mon, 22 Oct 2007 00:03:56 +0000 X-Originating-IP: [68.113.73.48] X-Originating-Email: [aredandgold@msn.com] X-Sender: aredandgold@msn.com From: "Its from Onion" Subject: [TSCM-L] {2081} Cellphone.wmv Date: Sun, 21 Oct 2007 19:03:23 -0500 Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="----=_NextPart_000_0050_01C81415.0D8A1100" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: MSN 9 X-MimeOLE: Produced By MSN MimeOLE V9.50.0039.1900 Seal-Send-Time: Sun, 21 Oct 2007 19:03:23 -0500 X-OriginalArrivalTime: 22 Oct 2007 00:04:01.0187 (UTC) FILETIME=[0CE4B730:01C8143F] Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , To: unlisted-recipients:; (no To-header on input)

Goes around...
Onion

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Attachment Converted: "c:\documents and settings\james m. atkinson\application data\qualcomm\eudora\attach\Cellphone.wmv"Received: from [172.28.128.27] ([172.28.128.27]:15268 "EHLO ip04.ams.ftl.affinity.com") by ams023.ftl.affinity.com with ESMTP id S361312AbXJWGMk; Tue, 23 Oct 2007 02:12:40 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAFMtHUdA6aL4kGdsb2JhbACOVgIBAQcEBiIFgSk Received: from py-out-1314.google.com ([64.233.166.175]) by ip04.ams.ftl.affinity.com with ESMTP; 23 Oct 2007 02:12:40 -0400 Received: by py-out-1314.google.com with SMTP id p69so5750621pyb for ; Mon, 22 Oct 2007 23:12:39 -0700 (PDT) Received: by 10.35.107.20 with SMTP id j20mr1549257pym.1193119950565; Mon, 22 Oct 2007 23:12:30 -0700 (PDT) Received: by 10.107.65.8 with SMTP id s8gr2082prk; Mon, 22 Oct 2007 23:12:19 -0700 (PDT) X-Sender: don@isi-usa.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.62.1 with SMTP id p1mr11503898pyk.1193110728933; Mon, 22 Oct 2007 20:38:48 -0700 (PDT) Received: from silas.a1webserver.com (silas.a1webserver.com [69.16.226.64]) by mx.google.com with ESMTP id a28si2364292pye.2007.10.22.20.38.48; Mon, 22 Oct 2007 20:38:48 -0700 (PDT) Received-SPF: neutral (google.com: 69.16.226.64 is neither permitted nor denied by best guess record for domain of don@isi-usa.com) client-ip=69.16.226.64; Authentication-Results: mx.google.com; spf=neutral (google.com: 69.16.226.64 is neither permitted nor denied by best guess record for domain of don@isi-usa.com) smtp.mail=don@isi-usa.com Received: from [71.51.155.39] (port=12518 helo=DONS) by silas.a1webserver.com with esmtp (Exim 4.63) (envelope-from ) id 1IkAjE-0000GE-Mf for TSCM-L2006@googlegroups.com; Mon, 22 Oct 2007 23:46:53 -0400 From: "don" To: References: <1192775550.084887.212280@t8g2000prg.googlegroups.com> <921392823-1192792831-cardhu_decombobulator_blackberry.rim.net-2051719516-@bxe033.bisx.prod.on.blackberry> Subject: [TSCM-L] {2082} Re: We are hiring Date: Mon, 22 Oct 2007 22:38:43 -0500 Message-ID: <006001c81526$37851bf0$0202a8c0@DONS> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Mailer: Microsoft Office Outlook 11 Thread-Index: AcgSQx2sA3pZh9idTNOt5EUGJL7uXAC4f4cg X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 In-Reply-To: <921392823-1192792831-cardhu_decombobulator_blackberry.rim.net-2051719516-@bxe033.bisx.prod.on.blackberry> X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - silas.a1webserver.com X-AntiAbuse: Original Domain - googlegroups.com X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12] X-AntiAbuse: Sender Address Domain - isi-usa.com X-Google-Approved: grainger01982@gmail.com via web at 2007-10-23 06:12:17 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , It seems there is always some individual who wants to prove how smart he/she or she/he is and proves only that in most cases no one cares. But they live up to one or more of my Uncle Charlie's sayings. Its better not to say anything and have people think your not very smart than to speak on a subject you have little knowledge of and remove all doubt. Don Roggenbauer Investigation & Security & Spartan Protection 3900 36th Ave. N Robbinsdale, MN 55422 Office:763-561-8499 ISI Defense & Legal Investigations Office:763-561-1228 Spartan Patrol & Special Operations Fax: 763-537-9059 CONFIDENTIALITY NOTICE: This E-mail (including the attachments) is covered by the Electronic Communications Privacy Act, 18 U.S.C. 2510- 521, is confidential and may be legally privileged. If you are not the intended recipient, you are hereby notified that any retention, dissemination, distribution, or copying of this communication is strictly prohibited. Please reply to the sender that you have received the message in error and contact ISI/Spartan at Info@isi-usa.com, then delete it. Thank You. -----Original Message----- From: TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com] On Behalf Of ejmichaels@gmail.com Sent: Friday, October 19, 2007 6:20 AM To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2077} Re: We are hiring And an HR person that knows that one can not refer to males and females in help wanted advertisements in the US. It may appear legal but even the order of the sexs are named is considered prejudicial. Even tjhe conservative New Jersey State Police includes Both and Other as sex choices on certain applications. Sent from my Verizon Wireless BlackBerry -----Original Message----- From: Intspecops Date: Fri, 19 Oct 2007 06:32:30 To:TSCM-L Professionals List Subject: [TSCM-L] {2076} We are hiring We are looking for both full and part time Sales team members for both www.Intspecops.com and www.Bulletcatchers.com . We want both Male and Female sales focused members to help push all the services both our companies offer. Great pay and you make your own hours. MUST HAVE A VERY GOOD UNDERSTANDING OF THE SECURITY INDUSTRY. Please call for details. Dominic Farley Director of Operations Jobs@Intspecops.com 843-331-9077 --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.24] ([172.28.128.24]:15116 "EHLO ip01.ams.ftl.affinity.com") by ams008.ftl.affinity.com with ESMTP id S410844AbXJWP3l; Tue, 23 Oct 2007 11:29:41 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAKKvHUfRVZL0kGdsb2JhbACOVgIBAQcEBiIFgSk Received: from wa-out-0708.google.com ([209.85.146.244]) by ip01.ams.ftl.affinity.com with ESMTP; 23 Oct 2007 11:29:27 -0400 Received: by wa-out-0708.google.com with SMTP id j19so4593266waf for ; Tue, 23 Oct 2007 08:29:26 -0700 (PDT) Received: by 10.35.43.10 with SMTP id v10mr1728369pyj.1193153356590; Tue, 23 Oct 2007 08:29:16 -0700 (PDT) Received: by 10.106.227.26 with SMTP id z26gr2083prg; Tue, 23 Oct 2007 08:29:07 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.23.6 with SMTP id 6mr947428nzw.1193153344767; Tue, 23 Oct 2007 08:29:04 -0700 (PDT) Received: from swip006.ftl.affinity.com (lvs00-fl-swip006.ftl.affinity.com [216.219.253.16]) by mx.google.com with ESMTP id h49si348672nzf.2007.10.23.08.29.02; Tue, 23 Oct 2007 08:29:04 -0700 (PDT) Received-SPF: neutral (google.com: 216.219.253.16 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.16; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.16 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [71.243.12.197] ([71.243.12.197]:27590 "EHLO Raphael.tscm.com") by swip006.ftl.affinity.com with ESMTP id S369100AbXJWP3B (ORCPT ); Tue, 23 Oct 2007 11:29:01 -0400 Message-Id: <7.0.1.0.2.20071023111237.1307f4b8@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Tue, 23 Oct 2007 11:15:33 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] {2083} High tech piece of sweep gear Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Note the high tech piece of sweep gear that was used to detect this bug. -jma http://www.newsday.com/news/local/crime/ny-libug1023,0,1665999.story?coll=ny_home_ugc Tenants find eavesdropping bug in cabinet BY LAURA RIVERA laura.rivera@newsday.com 9:41 PM EDT, October 22, 2007 A Shirley landlord landed in jail after he allegedly broke into his own tenants' apartment and planted a bug in their kitchen to spy on the pair, police said. John Gordon, of 43 Floyd Road North, was arraigned at First District Court in Central Islip Monday on charges of second-degree burglary and eavesdropping, Suffolk police said. His bail was set at $25,000 cash or $50,000 bond. Earlier this month, Gordon, 48, tried to evict Donna Palermo and Tracey Palagonia, who had rented an apartment in his house since August, according to court records. But the court dismissed the case, and Gordon presumably turned to illicit spying measures, buying what police described as a mini-electronic transmitter on the Internet. According to Det. Lt. Michael Diffley of the Seventh Detective Squad, one of the tenants found the device hidden under the kitchen cabinet while she cleaned. "She swept underneath the cabinet and pulled up this small FM transmitter," Diffley said. The bug, a small black box about the size of two 9-volt batteries, sends a signal to nearby FM radios, he said. "It's a continuing landlord-tenant dispute," Diffley said. "He was trying to get information to help in the eviction." In court documents, Gordon claimed that Palermo and Palagonia were in "egregious noncompliance of the rules of my home" and that they were "out of control." Palermo, Palagonia and their lawyer could not be reached for comment Monday. Gordon was taken to Riverhead County Jail Monday. Near Gordon's two-story house Monday, a neighbor who did not wish to give his name said Gordon moved in about a year and a half ago. ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:22771 "EHLO ip04.ams.ftl.affinity.com") by ams011.ftl.affinity.com with ESMTP id S481305AbXJXETj; Wed, 24 Oct 2007 00:19:39 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAM5kHkdA6bjzkGdsb2JhbACOWQEBAQEHBAQTEQeBJw Received: from wr-out-0708.google.com ([64.233.184.243]) by ip04.ams.ftl.affinity.com with ESMTP; 24 Oct 2007 00:19:39 -0400 Received: by wr-out-0708.google.com with SMTP id 75so1285034wra for ; Tue, 23 Oct 2007 21:19:38 -0700 (PDT) Received: by 10.35.46.11 with SMTP id y11mr1912431pyj.1193199569031; Tue, 23 Oct 2007 21:19:29 -0700 (PDT) Received: by 10.106.227.26 with SMTP id z26gr2084prg; Tue, 23 Oct 2007 21:19:23 -0700 (PDT) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.36.127.14 with SMTP id z14mr1871804nzc.1193199563522; Tue, 23 Oct 2007 21:19:23 -0700 (PDT) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id h71si735719nzf.2007.10.23.21.19.21; Tue, 23 Oct 2007 21:19:23 -0700 (PDT) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id E5A06502B9C4B for ; Wed, 24 Oct 2007 00:19:19 -0400 (EDT) Message-ID: <471EC693.4080605@phreaker.net> Date: Wed, 24 Oct 2007 00:14:11 -0400 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2084} Re: High tech piece of sweep gear References: <7.0.1.0.2.20071023111237.1307f4b8@tscm.com> In-Reply-To: <7.0.1.0.2.20071023111237.1307f4b8@tscm.com> X-AAC-KTE-LTE-MailScanner-Watermark: 1193804052.22407@+n8YgxgV9L6RBWz2XeWQgg Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Gives new meaning to a "bug sweep" doesn't it? James M. Atkinson wrote: > Note the high tech piece of sweep gear that was used to detect this bug. > > -jma > > > > http://www.newsday.com/news/local/crime/ny-libug1023,0,1665999.story?coll=ny_home_ugc > > Tenants find eavesdropping bug in cabinet > BY LAURA RIVERA > > laura.rivera@newsday.com > > 9:41 PM EDT, October 22, 2007 > > A Shirley landlord landed in jail after he allegedly broke into his > own tenants' apartment and planted a bug in their kitchen to spy on > the pair, police said. > > John Gordon, of 43 Floyd Road North, was arraigned at First District > Court in Central Islip Monday on charges of second-degree burglary > and eavesdropping, Suffolk police said. His bail was set at $25,000 > cash or $50,000 bond. > > Earlier this month, Gordon, 48, tried to evict Donna Palermo and > Tracey Palagonia, who had rented an apartment in his house since > August, according to court records. > > But the court dismissed the case, and Gordon presumably turned to > illicit spying measures, buying what police described as a > mini-electronic transmitter on the Internet. > > According to Det. Lt. Michael Diffley of the Seventh Detective Squad, > one of the tenants found the device hidden under the kitchen cabinet > while she cleaned. > > "She swept underneath the cabinet and pulled up this small FM > transmitter," Diffley said. The bug, a small black box about the size > of two 9-volt batteries, sends a signal to nearby FM radios, he said. > > "It's a continuing landlord-tenant dispute," Diffley said. "He was > trying to get information to help in the eviction." > > In court documents, Gordon claimed that Palermo and Palagonia were in > "egregious noncompliance of the rules of my home" and that they were > "out of control." > > Palermo, Palagonia and their lawyer could not be reached for comment Monday. > > Gordon was taken to Riverhead County Jail Monday. > > Near Gordon's two-story house Monday, a neighbor who did not wish to > give his name said Gordon moved in about a year and a half ago. > > > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > We perform bug sweeps like it's a full contact sport, we take no prisoners, > and we give no quarter. Our goal is to simply, and completely stop the spy. > ---------------------------------------------------------------------------------------------------- > > > > > > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.25] ([172.28.128.25]:4222 "EHLO ip02.ams.ftl.affinity.com") by ams002.ftl.affinity.com with ESMTP id S365599AbXJYPKc; Thu, 25 Oct 2007 11:10:32 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAONOIEdA6aL5mGdsb2JhbACCPTWLaAIBAQcEBhEWgSk Received: from nz-out-0708.google.com ([64.233.162.249]) by ip02.ams.ftl.affinity.com with ESMTP; 25 Oct 2007 11:09:59 -0400 Received: by nz-out-0708.google.com with SMTP id h28so1194515nzf for ; Thu, 25 Oct 2007 08:10:02 -0700 (PDT) Received: by 10.36.23.7 with SMTP id 7mr153955nzw.1193324992880; Thu, 25 Oct 2007 08:09:52 -0700 (PDT) Received: by 10.106.110.11 with SMTP id i11gr2085prc; Thu, 25 Oct 2007 08:09:38 -0700 (PDT) X-Sender: eugene-buckley@hotmail.com X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.36.106.2 with SMTP id e2mr2004600nzc.1193255671546; Wed, 24 Oct 2007 12:54:31 -0700 (PDT) Received: from bay0-omc3-s24.bay0.hotmail.com (bay0-omc3-s24.bay0.hotmail.com [65.54.246.224]) by mx.google.com with ESMTP id k36si5660240waf.2007.10.24.12.54.31; Wed, 24 Oct 2007 12:54:31 -0700 (PDT) Received-SPF: pass (google.com: domain of eugene-buckley@hotmail.com designates 65.54.246.224 as permitted sender) client-ip=65.54.246.224; Authentication-Results: mx.google.com; spf=pass (google.com: domain of eugene-buckley@hotmail.com designates 65.54.246.224 as permitted sender) smtp.mail=eugene-buckley@hotmail.com Received: from BAY140-W41 ([64.4.39.76]) by bay0-omc3-s24.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Wed, 24 Oct 2007 12:54:31 -0700 Message-ID: Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="_1173c37f-7951-4f61-a5a9-575b8ca7a9e3_" X-Originating-IP: [169.133.253.21] From: EUGENE BUCKLEY To: Subject: [TSCM-L] {2085} Re: GPS Jammer Date: Wed, 24 Oct 2007 13:54:30 -0600 Importance: Normal In-Reply-To: <7.0.1.0.2.20071016195155.10630b90@tscm.com> References: <010e01c80f5b$76eca540$6601a8c0@oem> <001101c8103f$8883c420$6601a8c0@oem> <471534C1.4010604@phreaker.net> <7.0.1.0.2.20071016195155.10630b90@tscm.com> X-OriginalArrivalTime: 24 Oct 2007 19:54:31.0311 (UTC) FILETIME=[B16429F0:01C81677] X-Google-Approved: grainger01982@gmail.com via web at 2007-10-25 15:09:37 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,
TO WHOM IT MAY CONCERN, MY RESPONSE TO THE LEE LAPIN QUESTION APPEARED BLOGGED ONLINE.  TRACERPILOT


Date: Tue, 16 Oct 2007 20:00:51 -0400
To: TSCM-L2006@googlegroups.com
From: jmatk@tscm.com
Subject: [TSCM-L] {2071} Re: GPS Jammer

You only need a mill-Watt or so of power within 15 feet of a GPS antenna to render most systems inoperable.

If you put a 30-50 mW transmitter on each of the bumpers, one under the dash, and one in the passenger headrest you will mask most GPS trackers.

100 mW per channel will kill GPS systems on other vehicles out to a considerable distance.

-jma



At 06:01 PM 10/16/2007, kondrak wrote:
With as weak as GPS signals are in the first place, ANY broadband noise source in the 1500mhz ranges should do.


TSCM/SO Group wrote:

According to the site it appears the device causes interference around 1500 MHz

As to weather it actually works,I donít know,I wouldnít waste my $$ on it

 

 

Mitch Davis
TSCM/Special Operations Group
20 Music Square West,Suite 208
Nashville , TN 37203 USA
615 251 0441
Fax 615 523 0300
mitchd@tscmusa.com
www.tscmusa.com

" maintaining a higher degree of excellence"
******************************
Tools for investigators at www.covertworx.com

From: TSCM-L2006@googlegroups.com [mailto: TSCM-L2006@googlegroups.com ] On Behalf Of Tom Barrett
Sent: Monday, October 15, 2007 2:18 PM
To: TSCM-L2006@googlegroups.com
Subject: [TSCM-L] {2063} Re: GPS Jammer

 

Hmm...I wonder if that gadget works as well as their "bug detector", advertised on the same site?

-----Original Message-----
From: TSCM-L2006@googlegroups.com [mailto: TSCM-L2006@googlegroups.com ]On Behalf Of TSCM/SO Group
Sent: Monday, October 15, 2007 2:45 PM
To: TSCM-L2006@googlegroups.com
Subject: [TSCM-L] {2062} GPS Jammer

It doesnít make sense to operate a vehicle covered in tinfoil,not the freq used on the spec info area on the site

Heres the latest and greatest<g>:

http://microvideox.com/GPS-Counter-Track.html

 

Mitch Davis
TSCM/Special Operations Group
20 Music Square West,Suite 208
Nashville , TN 37203 USA
615 251 0441
Fax 615 523 0300
mitchd@tscmusa.com
www.tscmusa.com

" maintaining a higher degree of excellence"
******************************
Tools for investigators at www.covertworx.com

CONFIDENTIALITY NOTICE: This communication may contain privileged or other
confidential information, protected from disclosure under applicable law. If
you are not the intended recipient, or the employee or agent responsible for
delivering the message to the intended recipient, or if you believe that you
have received this communication in error, please do not print, copy,
retransmit, disseminate, or otherwise use the information contained herein.
Also, please indicate to the sender that you have received this e-mail in
error, and delete the copy you have received. Thank you.
 

 

<BR



----------------------------------------------------------------------------------------------------
  World Class, Professional, Ethical, and Competent Bug Sweeps, and
Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
----------------------------------------------------------------------------------------------------
 James M. Atkinson                              Phone:  (978) 381-9111
 Granite Island Group                          Fax:     
 127 Eastern Avenue #291                 Web:    http://www.tscm.com/
 Gloucester, MA 01931-8008              E-mail:  mailto:jmatk@tscm.com
----------------------------------------------------------------------------------------------------
 We perform bug sweeps like it's a full contact sport, we take no prisoners,
and we give no quarter. Our goal is to simply, and completely stop the spy.
----------------------------------------------------------------------------------------------------


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.24] ([172.28.128.24]:37093 "EHLO ip01.ams.ftl.affinity.com") by ams012.ftl.affinity.com with ESMTP id S478330AbXJYPK7; Thu, 25 Oct 2007 11:10:59 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAC9OIEdC+VymmGdsb2JhbACJbIRuAgEBBwQGERaBKQ Received: from ug-out-1516.google.com ([66.249.92.166]) by ip01.ams.ftl.affinity.com with ESMTP; 25 Oct 2007 11:10:26 -0400 Received: by ug-out-1516.google.com with SMTP id n30so146694ugc for ; Thu, 25 Oct 2007 08:10:25 -0700 (PDT) Received: by 10.35.43.10 with SMTP id v10mr255504pyj.1193325015712; Thu, 25 Oct 2007 08:10:15 -0700 (PDT) Received: by 10.107.7.26 with SMTP id k26gr2086pri; Thu, 25 Oct 2007 08:10:02 -0700 (PDT) X-Sender: don@isi-usa.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.126.2 with SMTP id d2mr464310pyn.1193282366225; Wed, 24 Oct 2007 20:19:26 -0700 (PDT) Received: from silas.a1webserver.com (silas.a1webserver.com [69.16.226.64]) by mx.google.com with ESMTP id z53si70662pyg.2007.10.24.20.19.25; Wed, 24 Oct 2007 20:19:26 -0700 (PDT) Received-SPF: neutral (google.com: 69.16.226.64 is neither permitted nor denied by best guess record for domain of don@isi-usa.com) client-ip=69.16.226.64; Authentication-Results: mx.google.com; spf=neutral (google.com: 69.16.226.64 is neither permitted nor denied by best guess record for domain of don@isi-usa.com) smtp.mail=don@isi-usa.com Received: from [71.51.155.39] (port=13454 helo=DONS) by silas.a1webserver.com with esmtp (Exim 4.63) (envelope-from ) id 1IktOA-0004nQ-So for TSCM-L2006@googlegroups.com; Wed, 24 Oct 2007 23:28:07 -0400 From: "don" To: References: <1192775550.084887.212280@t8g2000prg.googlegroups.com> <921392823-1192792831-cardhu_decombobulator_blackberry.rim.net-2051719516-@bxe033.bisx.prod.on.blackberry> <006001c81526$37851bf0$0202a8c0@DONS> Subject: [TSCM-L] {2086} Re: We are hiring Date: Wed, 24 Oct 2007 22:19:22 -0500 Message-ID: <001501c816b5$d82da1e0$6400a8c0@DONS> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Mailer: Microsoft Office Outlook 11 Thread-Index: AcgSQx2sA3pZh9idTNOt5EUGJL7uXAC4f4cgAGQfTsA= X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 In-Reply-To: <006001c81526$37851bf0$0202a8c0@DONS> X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - silas.a1webserver.com X-AntiAbuse: Original Domain - googlegroups.com X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12] X-AntiAbuse: Sender Address Domain - isi-usa.com X-Google-Approved: grainger01982@gmail.com via web at 2007-10-25 15:10:01 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , I doubt you are looking for an old guy like me. Don Don Roggenbauer Investigation & Security & Spartan Protection 3900 36th Ave. N Robbinsdale, MN 55422 Office:763-561-8499 ISI Defense & Legal Investigations Office:763-561-1228 Spartan Patrol & Special Operations Fax: 763-537-9059 CONFIDENTIALITY NOTICE: This E-mail (including the attachments) is covered by the Electronic Communications Privacy Act, 18 U.S.C. 2510- 521, is confidential and may be legally privileged. If you are not the intended recipient, you are hereby notified that any retention, dissemination, distribution, or copying of this communication is strictly prohibited. Please reply to the sender that you have received the message in error and contact ISI/Spartan at Info@isi-usa.com, then delete it. Thank You. -----Original Message----- From: TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com] On Behalf Of don Sent: Monday, October 22, 2007 10:39 PM To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2082} Re: We are hiring It seems there is always some individual who wants to prove how smart he/she or she/he is and proves only that in most cases no one cares. But they live up to one or more of my Uncle Charlie's sayings. Its better not to say anything and have people think your not very smart than to speak on a subject you have little knowledge of and remove all doubt. Don Roggenbauer Investigation & Security & Spartan Protection 3900 36th Ave. N Robbinsdale, MN 55422 Office:763-561-8499 ISI Defense & Legal Investigations Office:763-561-1228 Spartan Patrol & Special Operations Fax: 763-537-9059 CONFIDENTIALITY NOTICE: This E-mail (including the attachments) is covered by the Electronic Communications Privacy Act, 18 U.S.C. 2510- 521, is confidential and may be legally privileged. If you are not the intended recipient, you are hereby notified that any retention, dissemination, distribution, or copying of this communication is strictly prohibited. Please reply to the sender that you have received the message in error and contact ISI/Spartan at Info@isi-usa.com, then delete it. Thank You. -----Original Message----- From: TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com] On Behalf Of ejmichaels@gmail.com Sent: Friday, October 19, 2007 6:20 AM To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2077} Re: We are hiring And an HR person that knows that one can not refer to males and females in help wanted advertisements in the US. It may appear legal but even the order of the sexs are named is considered prejudicial. Even tjhe conservative New Jersey State Police includes Both and Other as sex choices on certain applications. Sent from my Verizon Wireless BlackBerry -----Original Message----- From: Intspecops Date: Fri, 19 Oct 2007 06:32:30 To:TSCM-L Professionals List Subject: [TSCM-L] {2076} We are hiring We are looking for both full and part time Sales team members for both www.Intspecops.com and www.Bulletcatchers.com . We want both Male and Female sales focused members to help push all the services both our companies offer. Great pay and you make your own hours. MUST HAVE A VERY GOOD UNDERSTANDING OF THE SECURITY INDUSTRY. Please call for details. Dominic Farley Director of Operations Jobs@Intspecops.com 843-331-9077 --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:26461 "EHLO ip03.ams.ftl.affinity.com") by ams006.ftl.affinity.com with ESMTP id S2443395AbXJYPVL; Thu, 25 Oct 2007 11:21:11 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: Ao8CAMNQIEdA6bj2i2dsb2JhbACBWoEYhQSBCIVcAgEIBAQTEQWBKQ Received: from wr-out-0708.google.com ([64.233.184.246]) by ip03.ams.ftl.affinity.com with ESMTP; 25 Oct 2007 11:20:42 -0400 Received: by wr-out-0708.google.com with SMTP id 75so687644wra for ; Thu, 25 Oct 2007 08:20:42 -0700 (PDT) Received: by 10.35.102.18 with SMTP id e18mr255240pym.1193325068150; Thu, 25 Oct 2007 08:11:08 -0700 (PDT) Received: by 10.106.195.30 with SMTP id s30gr2087prf; Thu, 25 Oct 2007 08:10:53 -0700 (PDT) X-Sender: xmitman@prodigy.net X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.77.3 with SMTP id e3mr1393542pyl.1193312089896; Thu, 25 Oct 2007 04:34:49 -0700 (PDT) Received: from host.blockyourid.com (host.hackershomepage.com [72.52.208.92]) by mx.google.com with ESMTP id a28si232389pye.2007.10.25.04.34.49; Thu, 25 Oct 2007 04:34:49 -0700 (PDT) Received-SPF: neutral (google.com: 72.52.208.92 is neither permitted nor denied by best guess record for domain of xmitman@prodigy.net) client-ip=72.52.208.92; Authentication-Results: mx.google.com; spf=neutral (google.com: 72.52.208.92 is neither permitted nor denied by best guess record for domain of xmitman@prodigy.net) smtp.mail=xmitman@prodigy.net Received: from [24.241.36.56] (port=14360 helo=xmitmandelldesk) by host.hackershomepage.com with smtp (Exim 4.68) (envelope-from ) id 1Il0z9-0006pi-SB for TSCM-L2006@googlegroups.com; Thu, 25 Oct 2007 07:34:48 -0400 From: "Mark Smith" To: Subject: [TSCM-L] {2087} TSCM gear for sale on Ebay Date: Thu, 25 Oct 2007 07:34:46 -0400 Message-ID: Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0024_01C816D9.845B9D50" X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0) X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 Importance: Normal In-Reply-To: X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - host.blockyourid.com X-AntiAbuse: Original Domain - googlegroups.com X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - prodigy.net X-Google-Approved: grainger01982@gmail.com via web at 2007-10-25 15:10:48 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

For anyone interested, I have posted several items for sale at my store on Ebay, http://stores.ebay.com/Electronic-Gadgets-Devices-Gizmos_SPY-STUFF_W0QQcolZ4QQdirZ1QQfsubZ144305919QQftidZ2QQtZkm
 
 
Regards,
 
Xmitman

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.25] ([172.28.128.25]:49175 "EHLO ip02.ams.ftl.affinity.com") by ams011.ftl.affinity.com with ESMTP id S388264AbXJZDtW; Thu, 25 Oct 2007 23:49:22 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAMYAIUfRVZL2kmdsb2JhbACOXQIBAQcEBAkggSk Received: from wa-out-0708.google.com ([209.85.146.246]) by ip02.ams.ftl.affinity.com with ESMTP; 25 Oct 2007 23:49:21 -0400 Received: by wa-out-0708.google.com with SMTP id j19so1555225waf for ; Thu, 25 Oct 2007 20:49:20 -0700 (PDT) Received: by 10.114.171.1 with SMTP id t1mr253045wae.1193363992630; Thu, 25 Oct 2007 18:59:52 -0700 (PDT) Received: by 10.106.186.38 with SMTP id j38gr2088prf; Thu, 25 Oct 2007 18:59:49 -0700 (PDT) X-Sender: tagoenii@gmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.127.17 with SMTP id z17mr4419722nzc.1193356607136; Thu, 25 Oct 2007 16:56:47 -0700 (PDT) Received: from ro-out-1112.google.com (ro-out-1112.google.com [72.14.202.176]) by mx.google.com with ESMTP id v28si1685459nzb.2007.10.25.16.56.46; Thu, 25 Oct 2007 16:56:47 -0700 (PDT) Received-SPF: pass (google.com: domain of tagoenii@gmail.com designates 72.14.202.176 as permitted sender) client-ip=72.14.202.176; Authentication-Results: mx.google.com; spf=pass (google.com: domain of tagoenii@gmail.com designates 72.14.202.176 as permitted sender) smtp.mail=tagoenii@gmail.com; dkim=pass (test mode) header.i=@gmail.com Received: by ro-out-1112.google.com with SMTP id k4so49262rog for ; Thu, 25 Oct 2007 16:56:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; bh=2CAuMUHRZA0l4dLX8J+ShqWQRBTXscGS3WONvOAXXuQ=; b=nLwcCZAc6+sB4ArXCs9NjS9McDOApg82XesAHbwd74orcaSHgqDW3oPhA5NSSfIKKjlxDuPGT4YJhDa7+Oo8DGpWFVk947vwUcqfsT7FJC33QawxckEUW4moX+ju/DkHBJ62e3OyKigwaoG0qhvFkBcTJ2Q2tkZriJIJxUNlhpQ= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=GG5FdY84qx2+L/eC/1PVfbHUMeiGprCVCC4IVxKpU8/uBGOx0UfSLt/U3oQT7YJxVsqUA6mkEhmCbh4JghNvUFRRZq4vbKd85N+75txIxdy8+KBsHVKbSnQGGk/x7gJUOG7OKWP0R4Z/HwC06h3uQv8NRjRy0nWCozWjJ/ahfRg= Received: by 10.115.58.1 with SMTP id l1mr531415wak.1193356605389; Thu, 25 Oct 2007 16:56:45 -0700 (PDT) Received: by 10.114.134.16 with HTTP; Thu, 25 Oct 2007 16:56:45 -0700 (PDT) Message-ID: Date: Thu, 25 Oct 2007 23:56:45 +0000 From: "nii tagoe" To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2088} Re: TSCM gear for sale on Ebay In-Reply-To: Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 References: X-Google-Approved: grainger01982@gmail.com via web at 2007-10-26 01:59:49 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Hello Mark, I am interested in the items. Can I negotiate the prices. Please confirm if the prices could be negotiated further. Regards. Nii Armah On 10/25/07, Mark Smith wrote: > > For anyone interested, I have posted several items for sale at my store on > Ebay, > http://stores.ebay.com/Electronic-Gadgets-Devices-Gizmos_SPY-STUFF_W0QQcolZ4QQdirZ1QQfsubZ144305919QQftidZ2QQtZkm > > > Regards, > > Xmitman > > > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:53662 "EHLO ip03.ams.ftl.affinity.com") by ams015.ftl.affinity.com with ESMTP id S416776AbXJaClP; Tue, 30 Oct 2007 22:41:15 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAN6HJ0fRVZL5kmdsb2JhbACCPDaGAgyFZQIBAQcCBhMWgRU Received: from wa-out-0708.google.com ([209.85.146.249]) by ip03.ams.ftl.affinity.com with ESMTP; 30 Oct 2007 22:41:14 -0400 Received: by wa-out-0708.google.com with SMTP id j19so7371095waf for ; Tue, 30 Oct 2007 19:41:11 -0700 (PDT) Received: by 10.115.61.1 with SMTP id o1mr1427861wak.1193798462212; Tue, 30 Oct 2007 19:41:02 -0700 (PDT) Received: by 10.106.110.11 with SMTP id i11gr2089prc; Tue, 30 Oct 2007 19:40:51 -0700 (PDT) X-Sender: MNMYoung@worldnet.att.net X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.22.10 with SMTP id 10mr6868251nzv.1193520735070; Sat, 27 Oct 2007 14:32:15 -0700 (PDT) Received: from mtiwmhc13.worldnet.att.net (mtiwmhc13.worldnet.att.net [204.127.131.117]) by mx.google.com with ESMTP id 20si2551845nzu.2007.10.27.14.32.14; Sat, 27 Oct 2007 14:32:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of MNMYoung@worldnet.att.net designates 204.127.131.117 as permitted sender) client-ip=204.127.131.117; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of MNMYoung@worldnet.att.net designates 204.127.131.117 as permitted sender) smtp.mail=MNMYoung@worldnet.att.net Received: from yourxb2x7j77gn (188.phoenix-06-08rs.az.dial-access.att.net[12.72.94.188]) by worldnet.att.net (mtiwmhc13) with SMTP id <2007102721321011300ji6ree>; Sat, 27 Oct 2007 21:32:14 +0000 Message-ID: <00d901c818e0$d723d5d0$bc5e480c@yourxb2x7j77gn> From: "Mildred Young" To: Subject: [TSCM-L] {2089} Sweep needed in Phoenix, Arizona - reference required. Date: Sat, 27 Oct 2007 14:32:09 -0700 Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_00D6_01C818A6.28119DA0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3138 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 X-Google-Approved: grainger01982@gmail.com via web at 2007-10-31 02:40:50 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

please email: MNMYoung@worldnet.att.net

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.26] ([172.28.128.26]:40500 "EHLO ip03.ams.ftl.affinity.com") by ams015.ftl.affinity.com with ESMTP id S413275AbXJaEsZ; Wed, 31 Oct 2007 00:48:25 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAFamJ0fRVZL1kmdsb2JhbACIM4YyAgEBBwIGExaBFQE Received: from wa-out-0708.google.com ([209.85.146.245]) by ip03.ams.ftl.affinity.com with ESMTP; 31 Oct 2007 00:48:21 -0400 Received: by wa-out-0708.google.com with SMTP id j19so7456872waf for ; Tue, 30 Oct 2007 21:48:21 -0700 (PDT) Received: by 10.115.19.16 with SMTP id w16mr668031wai.1193802104021; Tue, 30 Oct 2007 20:41:44 -0700 (PDT) Received: by 10.107.114.37 with SMTP id r37gr2090prm; Tue, 30 Oct 2007 20:41:33 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.18.3 with SMTP id 3mr11664763nzr.1193802093259; Tue, 30 Oct 2007 20:41:33 -0700 (PDT) Received: from swip001.ftl.affinity.com (lvs00-fl-swip001.ftl.affinity.com [216.219.253.11]) by mx.google.com with ESMTP id 20si748799nzu.2007.10.30.20.41.32; Tue, 30 Oct 2007 20:41:33 -0700 (PDT) Received-SPF: neutral (google.com: 216.219.253.11 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.11; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.11 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [71.243.12.197] ([71.243.12.197]:56004 "EHLO Raphael.tscm.com") by swip001.ftl.affinity.com with ESMTP id S377247AbXJaDlc convert rfc822-to-8bit (ORCPT ); Tue, 30 Oct 2007 23:41:32 -0400 Message-Id: <7.0.1.0.2.20071030232508.12ba2650@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Tue, 30 Oct 2007 23:28:20 -0400 To: Recipient list suppressed:; From: "James M. Atkinson" Subject: [TSCM-L] {2090} The "P-Levels" - Draft Version, Please comment Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , The following "Applicant Questionares" is going live on my website on Wednesday night, and I drastically need a couple of you to read it over and see if there is anything that needs to be corrected or explained better. Many Thanks, -jma Recommended Gold List Questions Levels of TSCM Legitimacy - The "P-Levels" The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and who have legitimate TSCM training, credentials, and equipment (and are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock OSCOR, SPECTRE, ROSE, RAPHAEL, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a eight to twelve hour, one day vehicle drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. These coverage area limitations is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive laboratory grade electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, specialized antennas and other equipment, which is not easily, transported by airplane or by any method other then trucks. In a few cases, the TSCM specialist can respond to any location within a 2 or 3-day drive with a truck which contains an entire mobile electronics laboratory. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be regional). An understanding of what types of eavesdropping devices, methods, and frequencies which are being used in an area is also important, as is knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities or population centers. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you were in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example, customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. Please be patient when contacting any TSCM firm, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, considerable investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criterion as it only invites being ripped off. Legitimate TSCM professionals are not interested in, nor will they engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact, most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial 15-minute phone call usually will be billable time. Attorneys and doctors do not consult free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate or $250 in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep, and a proper sweep take days, not hours to complete. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. In addition, TSCM firms are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Magic Formula Technical Background - Cube this Formal Technical Training (1200 hours, every 5 years) - Square This Equipment and Tools - Cube This Basic Equipment/Tools Intermediate Equipment/Tools Advanced Equipment/Tools Vehicles (halve this) Basic Vehicle Intermediate Vehicle Advanced Equipment - DOT/CDL Honesty and Integrity - Divided by all Square root of (Tech3+TechTraining2+Tools+TestEquipment3+.5Vechiles) /Honesty You use the list like this. You assign each of the P-Levels a score between negative numbers and positive ten, essentially adding or subtracting points up to ten either way depending on how each of the attribute apply to the person you are talking to. In a few cases, you can subtract more then ten points for issues that provide areas of significant concern. You would hope that the person or company you are considering performing a TSCM project would attain a perfect score as that means the person is very legitimate and professional and that you feel that none of the negative attributes or levels apply to them, but in reality such, a score is impractical. Nobody is perfect, and anybody who appears to be perfect should certainly be viewed with caution and a healthy dose of skepticism. Professional - A true blue, died in the wool security expert with years of RELEVANT experience and background in their specific area of expertise. He will "walk the walk and talk the talk", and have the scars to prove it. This person will own all the necessary equipment, hundred of books (some of which he wrote or contributed to), a large number of original web pages or white papers on the subject. He (or she) will seek to illuminate the subject matter, and will be able to explain very complex topics in terms the non-technical public or layman can understand and is comfortable is discussing the matter without pushing their services too much (they let you come to them, and never gets pushy). If they are very professional they get +10 points, if they seem a little rough around the edges give them +7, but start dropping points as you get more uncomfortable with their professionalism. If they are rough around the edges, or just a little too pushy to get your business then award them zero points, and if they really get pushy or seem desperate for your business then start subtracting points quickly. Pretender - Similar to the above professional but has irrelevant or bogus credentials. They may talk the talk, but cannot walk the walk (nor have the scars). Will talk a good game, but generally lacks legitimate equipment, materials, or training. He often has not written a book but will often plagiarize others (and claim it as his own work). If the "pretender" has an online presence or web page, it is full of hype, rhetoric, and paranoia (but little science). He is quite capable of totally baffling customers, but cannot explain things in a non-technical way (or without hyping surveillance technology to death). In this case you start by awarding them -10 points, and as they convince you that they are legitimate you slowly start adding points up to as much as a +10 points. Very often the pretender will be someone who retired from government service with honorable service, but who lacks the technical background to perform a competent sweep, and thus pretend to know what they are doing. In many cases, the pretender actually has themselves convinced that they can do a good job, but sometimes their inabilities lead then into the next category. Putz - This is nothing more then a buffoon. Generally he does not know how to do the job, has virtually no equipment, training, or resources (but tries hard). He may or may not be honest, and may actually believe that he is competent. He may have a few technical toys, and may have a week or two of training in electronics, surveillance, and security (all in one). In this case, you start by awarding them -10 points, and as they convince you that they are not a putz you slowly start adding points up to as much as a +10 points. Parasite - This type leaches off of the credibility of others, generally has no expertise, knowledge, or training of their own in what they are offering. Usually someone like this walks and talks like a salesman, and they love to run their mouth about all the people they know. Name-dropping is an art form to the parasite. The parasite may be detected by the way they rattle off a list of references, customers, or contacts before anybody has really asked for them. He will usually be desperate to prove to you how legitimate he is right from the very beginning of your contact with them. You start them with zero points, and gain or loose points as you feel appropriate. The parasite is the consummate salesmen, but not an actual sweep person. One rule of the TSCM profession is that you never talk about your customers, so someone who is trying to impress you with who they know or is name-dropping is a parasite who is trying to impress you, and in turn, you should not trust them, and score the parasite accordingly. Start with awarding zero points, and each time they name drop or mention a company name with whom they have performed sweep work subtract 3 points, up to 30 points. If on the other hand the TSCM expert does not mention his customers award 3 points, then ask for references, and then when he declines to provide references award 3 more points (or if they give you references subtract 6 points). Next, you want to aggressively pressure them for client names, and for references, and then if at this point (under pressure) they keep their mouth shut you add 6 points, or if they give in and breach their client privacy, you subtract 6 points. There is nothing wrong with being involved in sales, but in the TSCM business, a "sales push" or pushing to close the transaction is a liability. Predator - This type is pure evil and the only reason they are involved in security is to victimize the customer. The predator is only interested in backstabbing, theft, betrayal, or harming the client in a serious way. The only reason this type of person is involved in TSCM or the security industry is to ferret out their customers secrets so they can be exploited for scams or for criminal purposes. If this person gives you even the slightest hint of being, a criminal hit them with -100 points and let them work their way out of it. Now, do not confuse someone who hunts spies for a living for someone who performs eavesdropping for a living, or someone who is a professional criminal who preys upon his client. A true TSCM expert is hunting spies and bugs, and is not preying off their client, they do not hunt the spy directly, but rather hunt the spies' technical toys (it is a subtle, but important difference). Poison - He has nothing good to say about anybody except himself and his associates and tends to be bitter against everybody around him. When questioned about his own credentials he will lash out at his competitors with personal attacks (instead of discussing his own credentials). This type is easily identified after five minutes of talking, and they have not said one thing specifically regarding their own merit, equipment, or credentials. It is easy to figure this one out and to award or subtract points either way. If this person only slightly lashes out against others it may be that, he has a backbone, but is not actually toxic. Be careful here and only subtract points if this person is hardcore in his angst and bitterness. Hint: Most TSCM folks have a strong moral backbone, and have a strong sense of fairness and of what are right and wrong. Most TSCM professionals will be strongly biased against eavesdroppers, felons, or wrong doers, and this bias should result in points being awarded as you discuss just "how white his hat is". On the other hand, if the TSCM expert is bitter against others, but cannot specifically tell you why, then you should subtract points. Also, be wary of any TSCM expert who is overly complementary towards other people as this may indicate a potential parasite. Puffer Fish - Typically, he has little or no credentials of his own, but knows all of the industry lingo and jargon. He will claim to be the president of a huge corporation with scores of employees, tens of millions in assets when in fact this type is a penniless mooch who is still living with their parents. If not living with his parents his (or her) spouse will be the primary breadwinner in the family, their primary income (and references) will be from close friends or family. Listen very carefully for any hint as to where the seed money came from for them to start their business, as you may find that a rich family member bought them the equipment and has been subsidizing their TSCM activities. Often this type is also a pretender and bumbling putz. Listen for any hint of grandiosity or of what this person is going to do in the future, versus what they have actually done in the past. Dream and aspirations are important; delusions and illusions are not and should be graded accordingly. Psychiatrist Bait - These people are really nothing more then con artists who will ramble on for hours with wild tales of how they were a Navy SEAL, covert CIA operative, undercover FBI agent, won the Congressional Medal of Honor, was a POW, won the war, and so on. They could tell you about their credentials, but then they would have to kill you. Often they will offer credentials, which at first appear real, but cannot be confirmed, or is suspect in another way. They will offer credentials that cannot be verified by their own admission. "It's too secret" Ask questions, get specific answers, grade as you feel is appropriate. However, step carefully, as many TSCM people will not discuss a great deal of their background initially, so this level should be considered in regards to initial contact. If the person sounds and talks a little crazy initially then subtract points, but if they seem sane and coherent then add points. Do not get too carried away on this issue though. Always remember that the TSCM person is grading you as a customer as well, and may not be too keen on disclosing too much about their background until they get to know you better, so this is a two way street. Phelons (or Felon) - This group is a real problem within the security business. Many con artists, felons, and dirt-bags try to capitalize on their criminal skills by claiming to be able to catch other criminals. Usually their only credential (which can be verified) is the criminal conviction. Often this type will claim to be a convicted hacker and computer expert when in fact he was convicted of arson, or of being a drug dealer, is a psychiatric patient, and is incapable of recovering his own hard drive or of performing the most simplistic of technical tasks. The few cases where the conviction was relevant to their field will not set your mind at ease about their now "reformed" status. Now this gets a tricky because if you become reasonably convinced that you are talking to a felon (or they brag of their crimes) you need to subtract 50 points, and not consider dealing with them unless there is some overwhelming reason to do so. If the person was involved in a crime that did not involve moral turpitude or violence (i.e.: drunk driving, disorderly conduct, etc) then perhaps subtract only 15 points. Now, on the other hand if the TSCM appears to be a good citizen, with no criminal histories then they get only a positive 10 points. Paranoids - Usually has knowledge of security because of an anti-establishment, paranoid or criminal mind-set, which compels them to constantly look over their shoulder. Of course, the government is constantly harassing them, has their phones taped, has video cameras in their house, and has legions of agents employed just to harass them specifically. They will sometimes rant on about government mind control, biological implants, electronic harassment, and so on. In some cases they have written books or articles, but the materials is published only in very narrow channels, or by paramilitary or fringe publishers. Very often, they will hear voices in their head, and/or be able to convince other that they too are hearing voices or seeing visions. If they are hearing voices, seeing visions, or claim to have any kind, of "special powers", you should subtract 30 or more points. If they seem like a normal and rational person they get zero points, but if they are "professionally cautious" add a few positive points as TSCM experts operate in a world where they assume that a place is bugged until scientifically proven otherwise, they are not paranoid, but more accurately are in touch with the eavesdropping threat. To be awarded +10 point the TSCM expert should be cautious, careful, and delicate with the project, but should not act "crazy", and should make you feel more secure, and not fearful. Police - When a TSCM expert enters the profession, they hopefully come with a multitude of prior experience, some have a technical background, and some have little or no technical background. Sadly, there are quite a few retired or fired members of the law enforcement or intelligence community who try their hands at TSCM, and who are woefully unqualified to render such services. Commonly, they run out and spend a few hundred or even a few thousand dollars in simplistic equipment and dance around with it, but really have no idea what they are doing. It is also common to see someone in law enforcement (or even security guards) purchase a $99 scanner or frequency counter and attend 3-4 days of training, then start selling their services as a TSCM expert. Con artists may also claim to be, or have been a police officer, so to err on the side of safety you should be suspect of anybody who makes a claim of a connection to the police, and automatically award them a neutral score of zero. If they have a considerably strong technical background, and have very specific training in TSCM then award then a couple of extra positive points. However, if they claim to be or to have been involved in law enforcement you should remember that quite a few fraudsters claim to have been police officers, and you should err on the side of caution and start subtracting points. Private Investigator - PI's must by the nature of their profession be generalists, and know a little bit about a whole lot of things, and must have connections to people who are actual subject matter experts. As a rule, PI's do not actually perform bug sweeps, and you need to be extremely suspicious of anybody who tells you they perform bug sweeps and that they are a private investigator. It is desirable for a PI to bring in an outside TSCM expert to perform a sweep, but when the PI themselves try to perform the sweep the customer is probably going to get fleeced. A TSCM expert on the other hand is an expert with electronics, has very specialized skills, background, and training in technical matters, and tend not to be a generalist like a Private Investigator. Granted, some TSCM people do come from an investigative or intelligence background, but you need to be on guard for any PI who is trying to come across as a TSCM expert. You start by awarding a neutral score of zero, if the person is a private investigator in a state that requires licensing, bonding, and insurance of PI's then you award a negative 10 score (-10). If they are a PI in a state that does not require a PI license then only award a negative 3 score. If they have been a PI in the past, but are not one now they get a positive 5, and if they have never been a PI they get a +10. The logic behind this is that the more of a PI someone is, the less you want them to do sweeps for you. If someone as gone to the effort and expense of becoming a licensed private investigator then in is doubtful that they are making their living performing sweeps. Professor - Heavy academic experience, but fairly light on actual field experience. This type is very hazardous to your sweep, as they can often talk about technical subjects exhaustively, and may own a smattering of equipment, but they usually (but not always) lack actual experience out in the field. They can talks for days about antenna factors, signal propagation, and "what can be done" but when it actually comes down to putting their knowledge to work things start falling apart. When a TSCM person tried to impress you with which universities they attended, or what degrees they earned you should start awarding negative points as you see fit, and if they are humble about their academic experience award positive points. In reality, the college you went to and the degree you earned is only important while you are in your 20's and are looking for work. A number of TSCM experts have Masters and Doctorates, but they rarely crow about it. Phed (or Fed) - Just how long did the TSCM person work for a federal agency, did they perform sweeps, for how long did they perform sweeps, did they serve in a technical position prior to working in TSCM. Did they attend the State Department or CIA School, or was it one of the orphan schools. Did they stay with the same agency for their entire term of service or did they job hop to various agencies. Start by awarding a neutral score of zero, if they never performed TSCM services as a full time employee of the federal government then you award -5 points. If they worked for the government performing sweeps, but "job hopped" more then twice award then -10 points, as there is some ugliness afoot (which resulted from them being fired from one agency, but being rehired by a second agency), if this happens more then twice then there is a serious problem. Now, if they served in a technical position before getting into TSCM award then +5 points, and if they performed at least 100 (7+ day) sweep projects for the federal government they get +10 points. Philby - In 1963, Harold Adrian Russell "Kim" Philby, a high-ranking British intelligence was exposed as a long term spy who was had actually been working for the Soviet Union's NKVD and KGB. This treason was particularly devastating as he was a mole planted deep inside the CIA, and his actions lead to the deaths of countless CIA and MI6 agents. When a TSCM expert tells you that they served in an intelligence agency you award -5 points, and if they retired from an intelligence agency you award then -10 points. The problem is that because of the Philby incident the CIA and other intelligence agencies are organizationally dysfunctional when it comes to sweeps, and they do not like to teach sweeps in such a way that allows the sweeper to function outside of the government. Yes, they may be quite good in TSCM, but it is very tough for them to perform sweeps as they were trained to be a "cog-in-the-machine", but not the machine itself (thanks to Philby). If someone is going to be performing sweeps for you, it is critical that they be able to provide this service solely on their own without having to bring in other people or outside agencies. Pirate - Meet Captain Hook and his merry band of pirates. Just how many people are going to be showing up for this sweep, and why are so many people required for the project? The more people involved in the sweep the more likely it is that you have a pirate on your hands, and the greater the probability that pillaging is about to happen. In addition, as the sweep team becomes larger the greater the likelihood is that the security of the project is going to be compromised and that the eavesdropper is going to be accidentally tipped off. The ideal situation is for only one or two TSCM people to be involved in a sweep, with a maximum of three people on site at any given time. Start this score at zero, and if only one person is coming out then award +10 points, if 2 people will come out then award +5 points, 3 people is -5. As the number of people increases up to six, you award -10. When a sweeper starts tells you they are going to show up with more then 2 people you need to be on guard, and ask lot of questions. Prima Dona - Does the TSCM expert seem just a little too ego driven? Do they crow on endlessly about what college they attended, and how they spent 30 years working for NASA, invented a cure for warts, heals the sick, and so on ad nauseum? Beware the Prima Dona, as they tend to want their own office for the sweep, or show up for a low key project in a Ferrari or Porsche (not that there is anything wrong with these vehicles). They wear designer suits, smoke expensive cigars, and go way overboard in trying to show or tell you how important and powerful they are when in fact they are impotent. Start with a neutral score, and as the TSCM person impresses you with how slick and important they are, start awarding negative points. If they have a little bit of "grit" to them then award +5 points, and the less polish they have the closer you can get to awarding them +10 points. You do not want a TSCM person who is flamboyant, is a fancy dresser, who is arrogant, or who feels like the World is beneath them. Pathetic - A few self-anointed sweep people have sob stories about how miserable their life has been, how they have overcome unrelenting odds, and they have a sob story for every occasion. If you give more then a few minutes of your time you will start feeling sorry for them and will want to give them the sweep project just to help them out. Unfortunately, in most cases, the person is trying to trick you, and they really are not performing sweeps, but rather confidence tricks and swindles. If a TSCM expert comes to you with stories about how pathetic their lives are, you should start adding negative numbers, and conversely if they do not start up with the pity party you should award positive numbers. Philanthropist - If the sweeps are too cheap then you have a serious problem. There are no cheap, good cigars. Real sweeps actually costs thousands of dollars or tens of thousands of dollars, not hundreds or dollars, nor do they cost hundreds of thousands of dollars. Beware of anybody who quotes you prices for a sweep that are too low. Phreaks - People get into TSCM for a range of reasons, some of these reasons are honorable, some are based on professional curiosity, but sadly, some people get involved in TSCM due to dishonorable or illegal activities. One group of folks who sometimes get involved are drug dealers, dope growers, drug users, meth cookers, tweakers and those involved in the illegal narcotics trade. In these illicit professions they tend to be extremely paranoid and feel that the government is out to get them (which is it), and they are constantly afraid of being bugged (which they should be). They frequently load up on sweep gear and learn about how to perform TSCM in an attempt to find the bugs on their own phone lines. They may Power Sweeper - If a sweeper is very good at balancing their workload they can schedule a string of sweeps in a row for different clients, so that they perform, larger sweeps intermixed with smaller sweeps. The larger multi-day sweeps (four or more days) are like the bricks or stones in a wall, and the smaller sweeps are like the mortar that is used to hold the larger stones or bricks in place. If a sweeper tells you about how they only perform large, corporate of government sweeps, and that they do not perform smaller sweeps they are likely lying to you. If they claim not to perform private, domestic, or residential sweeps, they are also lying to you. Phantom Sweeper - Claims to perform hundreds of sweeps per year. The only problem is that for them to perform as many sweeps per year that they claim they would have to be working 30 hours per day, 400 days per year, and would have to possess 8 arms, 6 eyes, and possess physic abilities (none of which is likely). A good TSCM expert can handle a single multi-day sweep per week, plus a couple of smaller single day sweeps worked around the larger project. If a sweeper claims to be performing 100 sweeps per year you should ask many questions, and if they claim to be performing "hundreds per year" you should consider finding somebody else. In reality, most corporate or government sweeps require 3-5 days for a single room, and then a day or so for each additional room. Very simple residential sweeps take only a day or so, but a more complicated residential sweep can take a week or more. As far as scoring this issue, you start by awarding zero points, and when the TSCM expert tries to convince you that they perform more then a few sweeps per week (on average) you subtract points, the more they claim, the more you subtract. On the other hand, if they explain that there are a limited number of projects they can handle per month then award them up to ten points. Watch out for people who use the words "projects", "assignments", or "engagements" and then claim to perform hundreds, or even thousands of these per year when the truth of the matter is that every time their phone rings they claim it is an assignment even though they never do any work for the client. Listen carefully, are they performing actual bug sweeps for these numbers, or are they up to something else. Phantom Equipment - This is a simple matter of the TSCM expert actually owning the equipment they are proposing using. This is not an issue of what equipment they "have access to", or what they will buy so they can perform the project for you. You do not want a TSCM person who is borrowing equipment, or who is going to run out and buy equipment he does not already possess. Instead, you want to be dealing someone who already has hundreds of thousands, if not millions of dollar invested in equipment, and they can bring that equipment to your location in very short order. You grade the equipment like thisÖ If they have $50,000 in equipment that they can bring to your project then they get a neutral score of zero. $300,000 in equipment results in +5 points, and over one million dollars of equipment (on site) results in a score of +10. On the other hand, if they can only bring less then $25,000 of equipment on site they get -3 points, under $5,000 in equipment, -6 points. If they have only a small kit of equipment involving only one or two briefcases, or a single broadband field detector (valued under $2,500) you award -10 points. If at any time they use the phrases "has access to the equipment", "can borrow the equipment", "can use their employers equipment" or other similar statements you automatically award -10 points. Add the scores up, in a perfect world it should be over 250 points, but anything over 140 points is a decent sweep person (with an average score), and over 200 points is an excellent sweep person. An overall score that is below zero means that you should be polite, but not consider having them do a sweep, or anything else for you. If they have an overall negative score, you should figure out some way to distance yourself from the person before you end up losing more then just a few dollars. ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:13413 "EHLO ip04.ams.ftl.affinity.com") by ams010.ftl.affinity.com with ESMTP id S381458AbXJaNsL; Wed, 31 Oct 2007 09:48:11 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAAUkKEdA6aL6i2dsb2JhbACCcop5eQIBCAQEExEFgRU Received: from nz-out-0708.google.com ([64.233.162.250]) by ip04.ams.ftl.affinity.com with ESMTP; 31 Oct 2007 09:48:07 -0400 Received: by nz-out-0708.google.com with SMTP id v22so5985153nzg for ; Wed, 31 Oct 2007 06:48:06 -0700 (PDT) Received: by 10.35.81.2 with SMTP id i2mr2670554pyl.1193838477694; Wed, 31 Oct 2007 06:47:57 -0700 (PDT) Received: by 10.106.110.11 with SMTP id i11gr2091prc; Wed, 31 Oct 2007 06:47:48 -0700 (PDT) X-Sender: Alwaysfavor@aol.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.8.13 with SMTP id l13mr240824pyi.1193807833538; Tue, 30 Oct 2007 22:17:13 -0700 (PDT) Received: from imo-m24.mx.aol.com (imo-m24.mx.aol.com [64.12.137.5]) by mx.google.com with ESMTP id x46si926051pyg.2007.10.30.22.17.13; Tue, 30 Oct 2007 22:17:13 -0700 (PDT) Received-SPF: pass (google.com: domain of Alwaysfavor@aol.com designates 64.12.137.5 as permitted sender) client-ip=64.12.137.5; Authentication-Results: mx.google.com; spf=pass (google.com: domain of Alwaysfavor@aol.com designates 64.12.137.5 as permitted sender) smtp.mail=Alwaysfavor@aol.com Received: from Alwaysfavor@aol.com by imo-m24.mx.aol.com (mail_out_v38_r9.3.) id r.d09.1ffccae8 (65100) for ; Wed, 31 Oct 2007 01:17:07 -0400 (EDT) From: Alwaysfavor@aol.com Message-ID: Date: Wed, 31 Oct 2007 01:17:07 EDT Subject: [TSCM-L] {2091} Re: The "P-Levels" - Draft Version, Please comment To: TSCM-L2006@googlegroups.com Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="-----------------------------1193807827" X-Mailer: 9.0 Security Edition for Windows sub 5377 X-Spam-Flag: NO X-Google-Approved: grainger01982@gmail.com via web at 2007-10-31 13:47:45 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

Message received. Very good and helpful info but I don't know to much about sweeping but I do know that my garage is bugged as well as my vehicle. When I looked at my camera, I can see laser like beams aimed at my yard light and garage door.




See what's new at AOL.com and Make AOL Your Homepage.

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.25] ([172.28.128.25]:272 "EHLO ip02.ams.ftl.affinity.com") by ams012.ftl.affinity.com with ESMTP id S1390812AbXKBB2c; Thu, 1 Nov 2007 21:28:32 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAIYZKkdA6aLxi2dsb2JhbACOaAIBCAQEExEFgRE Received: from py-out-1314.google.com ([64.233.166.169]) by ip02.ams.ftl.affinity.com with ESMTP; 01 Nov 2007 21:28:30 -0400 Received: by py-out-1314.google.com with SMTP id p69so2917134pyb for ; Thu, 01 Nov 2007 18:28:30 -0700 (PDT) Received: by 10.35.64.7 with SMTP id r7mr1044114pyk.1193966900924; Thu, 01 Nov 2007 18:28:20 -0700 (PDT) Received: by 10.107.114.37 with SMTP id r37gr2092prm; Thu, 01 Nov 2007 18:28:10 -0700 (PDT) X-Sender: rvmexico@yahoo.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.13.4 with SMTP id q4mr2079452pyi.1193927387103; Thu, 01 Nov 2007 07:29:47 -0700 (PDT) Received: from web57009.mail.re3.yahoo.com (web57009.mail.re3.yahoo.com [66.196.97.113]) by mx.google.com with SMTP id z53si1801761pyg.2007.11.01.07.29.46; Thu, 01 Nov 2007 07:29:47 -0700 (PDT) Received-SPF: pass (google.com: domain of rvmexico@yahoo.com designates 66.196.97.113 as permitted sender) client-ip=66.196.97.113; DomainKey-Status: good (test mode) Authentication-Results: mx.google.com; spf=pass (google.com: domain of rvmexico@yahoo.com designates 66.196.97.113 as permitted sender) smtp.mail=rvmexico@yahoo.com; domainkeys=pass (test mode) header.From=rvmexico@yahoo.com Received: (qmail 39649 invoked by uid 60001); 1 Nov 2007 14:29:46 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:Date:From:Subject:To:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID; b=arWi19kJK8St+tBShID6PZDZLDTsC5ler1jtxZ1QgpjLcN6kiHSXFtrui4d+jejFxUJcOXdn8VcWD9qJ2yatsUeP2O2jpnc9Q8rYZODSkWejyqNB6Gmvx4OzTIKkriLuCVKrqcO45HJNsY+IA3M+PWWFjjkHCvCSqLOQV/Pswxo=; X-YMail-OSG: 3WTv_eYVM1mVa0kHTK7a2T73P6Y8eA4CR5JePdSdgc8780QiTaAkc7eQ_6rCYxwBkBOec3ysxCbAU0X_kwZ2ucCfdqcUZkGoLabW9EftM9ykMaZ9ca8- Received: from [189.138.221.160] by web57009.mail.re3.yahoo.com via HTTP; Thu, 01 Nov 2007 07:29:45 PDT Date: Thu, 1 Nov 2007 07:29:45 -0700 (PDT) From: rogelio villarreal Subject: [TSCM-L] {2092} Fast, Low-Cost Signal Analyzer ??? To: TSCM-L2006@googlegroups.com Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Message-ID: <937242.38371.qm@web57009.mail.re3.yahoo.com> X-Google-Approved: grainger01982@gmail.com via web at 2007-11-02 01:28:10 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , COULD YOU TELL ME IF THIS WOULD BE OF USE IN SWEEPS? pERHAPPS THIS INFORMATION COULD BE OF INTEREST TO THE GROUP SALUDOS ROGER in Mexico Signal analyzer sets new performance/cost standard in signal analysis Fast, Low-Cost Signal Analyzer Claimed to make signal measurements 3◊ faster than competitive models, an economy-model signal analyzer targets design troubleshooting, complex signal analysis, and productivity gains. The analyzer uses vector signal analysis software to perform a wide range of measurements in an open Window XP Professional OS. Functions can be accessed with a USB keyboard/mouse and on the front panel Santa Clara, Calif. ó Agilent Technologies Inc. says its EXA signal analyzer is the industry's fastest economy-class signal analyzer, providing engineers with the capabilities to troubleshoot new designs, increase manufacturing throughput, or analyze complex and time-varying signals. At a lower performance point than Agilent's MXA signal analyzer, the EXA integrates the same broad range of standards-based measurements with Agilent's 89600 vector signal analysis (VSA) software in a single instrument. In addition to the use of an open Windows XP Professional operating system, the EXA also provides an advanced signal analysis user interface. All measurement features and functions are intuitively grouped and accessible from the front panel or via a USB keyboard and mouse. The EXA signal analyzer supports multiple frequency ranges from 9 kHz to 3.6, 7.0, 13.6 and 26.5 GHz, an internal fully calibrated pre-amplifier option up to 3.6 GHz, and standard analysis bandwidths of 10 MHz. This fully scalable functionality is complemented by EXA's +13 dBm third-order intercept, -146 dBm/Hz displayed average noise level (without pre-amp) and 66 dB W-CDMA ACLR dynamic range, as well as 0.4 dB total absolute amplitude accuracy, which is made possible by the all-digital, 14-bit ADC IF section. The dynamic range is maximized with an optional 2 dB mechanical step attenuator over the full frequency range and for manufacturing offers an optional 1 dB electronic attenuator to 3.6 GHz. Agilent said a breakthrough characteristic of the Agilent EXA is its intrinsic speed, unprecedented for an economy signal analyzer, which allows measurements up to 300 percent faster than other economy-class signal analyzers. The EXA returns a marker peak search result in less than 5 ms, local updates in less than 10 ms, and remote sweep and transfer (via GPIB) in less than 12 ms. Measurement mode switching speeds are typically less than 75 ms. This speed enables a fast and seamless change between WiMAX, W-CDMA, HSDPA/HSUPA, GSM/EDGE, phase noise measurements, and 89600 VSA software. Optional measurement application software provides preconfigured test routines for GSM/EDGE, 802.16e Mobile WiMAX, W-CDMA, HSDPA/HSUPA, and phase-noise applications. Running the Agilent 89600 VSA software application in the EXA enables advanced signal demodulation analysis and troubleshooting of more than 50 demodulation formats including 2G, 3G, 3.5G, WiMAX, WLAN and Private Mobile Radio. The EXA also includes a comprehensive set of standard one-button-power measurements for characterizing signal quality. These include ACPR, Channel Power, Occupied Bandwidth, Spectrum Emissions Mask, CCDF, Burst Power and Spurious Emission. It's fully compliant with the LXI Class-C specification. Connectivity is possible via 100 based-T LAN, GPIB and seven USB 2.0 ports. Pricing: ï N9010A-503 (Frequency Range, 9 kHz to 3.6 GHz): $16,900 ï N9010A-507 (Frequency Range, 9 kHz to 7.0 GHz): $25,900 ï N9010A-513 (Frequency Range, 9 kHz to 13.6 GHz): $30,900 ï N9010A-526 (Frequency Range, 9 kHz to 26.5 GHz): $35,900 ï N9010A- FSA (Fine step attenuator): $1,000 ï N9010A-PFR (Precision Frequency Reference): $2,000 ï N9010A-EA3 (Electronic Attenuator, 3.6 GHz): $3,000 ï N9010A-P03 (Preamplifier, 3.6 GHz): $1,500 ï N9010A-CPU (Instrument Security, additional CPU/HDD): $4,000 ï N9068A (Phase Noise Measurement Application): $4,700 ï N9071A (GSM/EDGE Measurement Application): $6,000 ï N9073A-1FP (W-CDMA Measurement Application): $7,400 ï N9073A-2FP (HSDPA/HSUPA Measurement Application): $4,300 ï N9075A (802.16 OFDMA Measurement Application): $10,000 ï 89601A (Vector Signal Analysis software -89600): $10,100 Product information: N9019A Agilent Technologies Inc., 1-800-829-4444, item number 8155, www.agilent.com __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.24] ([172.28.128.24]:27983 "EHLO ip01.ams.ftl.affinity.com") by ams019.ftl.affinity.com with ESMTP id S1009580AbXKBB2p; Thu, 1 Nov 2007 21:28:45 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: Ao8CADoaKkdA6aari2dsb2JhbACBR4Zzhi4CAQgCBhMRBYERAQ Received: from wa-out-0708.google.com ([209.85.146.241]) by ip01.ams.ftl.affinity.com with ESMTP; 01 Nov 2007 21:28:43 -0400 Received: by wa-out-0708.google.com with SMTP id j19so1600609waf for ; Thu, 01 Nov 2007 18:28:41 -0700 (PDT) Received: by 10.114.37.1 with SMTP id k1mr316593wak.1193966912551; Thu, 01 Nov 2007 18:28:32 -0700 (PDT) Received: by 10.106.186.38 with SMTP id j38gr2093prf; Thu, 01 Nov 2007 18:28:24 -0700 (PDT) X-Sender: aar9sm@hotmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.18.18 with SMTP id v18mr3331921pyi.1193958870422; Thu, 01 Nov 2007 16:14:30 -0700 (PDT) Received: by i13g2000prf.googlegroups.com with HTTP; Thu, 01 Nov 2007 23:14:28 +0000 (UTC) X-IP: 24.251.253.164 From: TSCM To: TSCM-L Professionals List Subject: [TSCM-L] {2093} Re: The "P-Levels" - Draft Version, Please comment Date: Thu, 01 Nov 2007 16:14:28 -0700 Message-ID: <1193958868.957908.16130@i13g2000prf.googlegroups.com> In-Reply-To: <7.0.1.0.2.20071030232508.12ba2650@tscm.com> References: <7.0.1.0.2.20071030232508.12ba2650@tscm.com> User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) ; Embedded Web Browser from: http://bsalsa.com/; .NET CLR 2.0.50727; .NET CLR 1.1.4322),gzip(gfe),gzip(gfe) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Google-Approved: grainger01982@gmail.com via web at 2007-11-02 01:28:23 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , James, Good job! Is well written with a lot of thought and detail involved very nice guide.thank you!! Mike On Oct 30, 8:28 pm, "James M. Atkinson" wrote: > The following "Applicant Questionares" is going > live on my website on Wednesday night, and I > drastically need a couple of you to read it over > and see if there is anything that needs to be corrected or explained better. > > Many Thanks, > > -jma > > Recommended Gold List Questions > Levels of TSCM Legitimacy - The "P-Levels" > > The following is a list of private TSCM firms who > specialize in "bug sweeps" and wiretap detection > and who have legitimate TSCM training, > credentials, and equipment (and are very well respected within the industry). > > While most TSCM specialists are available for > travel outside of a specific geographic area they > tend to avoid such engagements, or will limited > the services to vulnerability analysis, > pre-construction assistance, non-instrumented > inspections, simple RF checks, in-place > monitoring, or limited TSCM services involving > only a briefcase sized in-place monitoring system > (such as a single spectrum analyzer, MSS, Eagle, > ScanLock OSCOR, SPECTRE, ROSE, RAPHAEL, or similar system). > > These private TSCM firms tend to operate in a > specific geographic area limited to a few hundred > miles (usually within a eight to twelve hour, one > day vehicle drive). However, all of the TSCM > firms listed here are available for travel > anywhere in the United States or the World on > short notice, but only provide limited services > when operating outside of their normal coverage > area. These coverage area limitations is due to > the logistics involved in transporting hundreds > and often thousands of pounds of sophisticated, > highly sensitive laboratory grade electronic > instruments, equipment and tools. Bug sweeps and > wiretap detection involves the use of ladders, > pole climbing equipment, LAN analyzers, X-ray > systems, specialized antennas and other > equipment, which is not easily, transported by > airplane or by any method other then trucks. In a > few cases, the TSCM specialist can respond to any > location within a 2 or 3-day drive with a truck > which contains an entire mobile electronics laboratory. > > TSCM firms also tend to restrict their operations > to a specific geographic area to facilitate an > expert level of knowledge regarding the RF > environment, construction methods used, community > zoning, population demographics, civil > engineering, aeronautic or maritime facilities, > local military bases, and related areas. > Knowledge of such regional information is > critical for a successful TSCM project. The TSCM > specialist must also have an intimate knowledge > of the telephone systems, engineering methods, > fiber optics, major cable locations, central > office switches, test numbers, and related > communications infrastructure present or being > used in an area (which tends to be regional). > > An understanding of what types of eavesdropping > devices, methods, and frequencies which are being > used in an area is also important, as is > knowledge of what type of surveillance equipment > is being sold within that region (and other > areas). The TSCM Procedural and Protocols Guides > used by a specialist also tend to be based on > specific issues and variables present in that > specific geographic area. On a more interesting > note, many of these firms are located in, or near > major maritime port cities or population centers. > The heaviest concentrations are around major > cities on the East and West coasts with a very > limited presence in the Mid-West, Great Plains, > and Rockies. If you were in the Mid-West, Great > Plains, or Rockies area you would need to engage > a TSCM firm from one of the major port cities. > For example, customers in Chicago, St. Louis, > Memphis, Denver, Salt Lake City, Minneapolis, > Billings, etc. would need to fly a TSCM > specialist in from Boston, New York, Washington > DC, Los Angles, Lexington, or Seattle. > > Please be patient when contacting any TSCM firm, > as if they are out serving a client they may not > be able to return your call for several hours. > Rates generally are non-negotiable and reflect > the cost of the sweep practitioner's time, > considerable investment in equipment acquisition > and maintenance, several weeks of in-service > training a year, travel, administrative and > communications time and expense to coordinate the > sweep and written report, and a fair profit for > their services. It is very unwise to shop for > sweeps by using price as a criterion as it only > invites being ripped off. Legitimate TSCM > professionals are not interested in, nor will > they engage in negotiating for a lower price. > When you contact persons on this list, you are > talking with someone in the same league as an > attorney or surgeon, not a salesman. In fact, > most of the people listed on this page have more > time in their specialized training than do most > attorneys or medical professionals. Anything > beyond an initial 15-minute phone call usually > will be billable time. Attorneys and doctors do > not consult free, and neither do legitimate TSCM > specialists. If a potential client calls with a > long list of questions not pertaining directly to > hiring the practitioner, or wants to know how to > do his own sweep, or wants to know how to use the > sweep kit he purchased on his own, expect to pay > an hourly rate or $250 in advance for consulting > services. If you are considering engaging (or > have already engaged) a TSCM firm and they are > not listed in the following directory you would > do well to immediately ask some awkward > questions. It is also important you understand > that legitimate services by a competent TSCM firm > rarely start at less then several thousand > dollars for even a basic sweep, and a proper > sweep take days, not hours to complete. Keep in > mind that there only a small number of legitimate > and competent TSCM counterintelligence > specialists or "Bug Sweepers" in the U.S. private > sector. Legitimate TSCM firms are in very high > demand, hard to find, and expensive; so be > patient when trying to find one to help you. In > addition, TSCM firms are not attorneys and cannot > tell you whether it is legal or illegal for you > to monitor your own phones. Always call a > competent licensed attorney for legal advice. > > Magic Formula > Technical Background - Cube this > Formal Technical Training (1200 hours, every 5 years) - Square This > Equipment and Tools - Cube This > Basic Equipment/Tools > Intermediate Equipment/Tools > Advanced Equipment/Tools > Vehicles (halve this) > Basic Vehicle > Intermediate Vehicle > Advanced Equipment - DOT/CDL > Honesty and Integrity - Divided by all > > Square root of > (Tech3+TechTraining2+Tools+TestEquipment3+.5Vechiles) /Honesty > > You use the list like this. You assign each of > the P-Levels a score between negative numbers and > positive ten, essentially adding or subtracting > points up to ten either way depending on how each > of the attribute apply to the person you are > talking to. In a few cases, you can subtract more > then ten points for issues that provide areas of significant concern. > > You would hope that the person or company you are > considering performing a TSCM project would > attain a perfect score as that means the person > is very legitimate and professional and that you > feel that none of the negative attributes or > levels apply to them, but in reality such, a > score is impractical. Nobody is perfect, and > anybody who appears to be perfect should > certainly be viewed with caution and a healthy dose of skepticism. > > Professional - A true blue, died in the wool > security expert with years of RELEVANT experience > and background in their specific area of > expertise. He will "walk the walk and talk the > talk", and have the scars to prove it. This > person will own all the necessary equipment, > hundred of books (some of which he wrote or > contributed to), a large number of original web > pages or white papers on the subject. He (or she) > will seek to illuminate the subject matter, and > will be able to explain very complex topics in > terms the non-technical public or layman can > understand and is comfortable is discussing the > matter without pushing their services too much > (they let you come to them, and never gets > pushy). If they are very professional they get > +10 points, if they seem a little rough around > the edges give them +7, but start dropping points > as you get more uncomfortable with their > professionalism. If they are rough around the > edges, or just a little too pushy to get your > business then award them zero points, and if they > really get pushy or seem desperate for your > business then start subtracting points quickly. > > Pretender - Similar to the above professional but > has irrelevant or bogus credentials. They may > talk the talk, but cannot walk the walk (nor have > the scars). Will talk a good game, but generally > lacks legitimate equipment, materials, or > training. He often has not written a book but > will often plagiarize others (and claim it as his > own work). If the "pretender" has an online > presence or web page, it is full of hype, > rhetoric, and paranoia (but little science). He > is quite capable of totally baffling customers, > but cannot explain things in a non-technical way > (or without hyping surveillance technology to > death). In this case you start by awarding them > -10 points, and as they convince you that they > are legitimate you slowly start adding points up > to as much as a +10 points. Very often the > pretender will be someone who retired from > government service with honorable service, but > who lacks the technical background to perform a > competent sweep, and thus pretend to know what > they are doing. In many cases, the pretender > actually has themselves convinced that they can > do a good job, but sometimes their inabilities > lead then into the next category. > > Putz - This is nothing more then a buffoon. > Generally he does not know how to do the job, has > virtually no equipment, training, or resources > (but tries hard). He may or may not be honest, > and may actually believe that he is competent. He > may have a few technical toys, and may have a > week or two of training in electronics, > surveillance, and security (all in one). In this > case, you start by awarding them -10 points, and > as they convince you that they are not a putz you > slowly start adding points up to as much as a +10 points. > > Parasite - This type leaches off of the > credibility of others, generally has no > expertise, knowledge, or training of their own in > what they are offering. Usually someone like this > walks and talks like a salesman, and they love to > run their mouth about all the people they know. > Name-dropping is an art form to the parasite. The > parasite may be detected by the way they rattle > off a list of references, customers, or contacts > before anybody has really asked for them. He will > usually be desperate to prove to you how > legitimate he is right from the very beginning of > your contact with them. You start them with zero > points, and gain or loose points as you feel > appropriate. The parasite is the consummate > salesmen, but not an actual sweep person. One > rule of the TSCM profession is that you never > talk about your customers, so someone who is > trying to impress you with who they know or is > name-dropping is a parasite who is trying to > impress you, and in turn, you should not trust > them, and score the parasite accordingly. Start > with awarding zero points, and each time they > name drop or mention a company name with whom > they have performed sweep work subtract 3 points, > up to 30 points. If on the other hand the TSCM > expert does not mention his customers award 3 > points, then ask for references, and then when he > declines to provide references award 3 more > points (or if they give you references subtract 6 > points). Next, you want to aggressively pressure > them for client names, and for references, and > then if at this point (under pressure) they keep > their mouth shut you add 6 points, or if they > give in and breach their client privacy, you > subtract 6 points. There is nothing wrong with > being involved in sales, but in the TSCM > business, a "sales push" or pushing to close the transaction is a liability. > > Predator - This type is pure evil and the only > reason they are involved in security is to > victimize the customer. The predator is only > interested in backstabbing, theft, betrayal, or > harming the client in a serious way. The only > reason this type of person is involved in TSCM or > the security industry is to ferret out their > customers secrets so they can be exploited for > scams or for criminal purposes. If this person > gives you even the slightest hint of being, a > criminal hit them with -100 points and let them > work their way out of it. Now, do not confuse > someone who hunts spies for a living for someone > who performs eavesdropping for a living, or > someone who is a professional criminal who preys > upon his client. A true TSCM expert is hunting > spies and bugs, and is not preying off their > client, they do not hunt the spy directly, but > rather hunt the spies' technical toys (it is a > subtle, but important difference). > > Poison - He has nothing good to say about anybody > except himself and his associates and tends to be > bitter against everybody around him. When > questioned about his own credentials he will lash > out at his competitors with personal attacks > (instead of discussing his own credentials). This > type is easily identified after five minutes of > talking, and they have not said one thing > specifically regarding their own merit, > equipment, or credentials. It is easy to figure > this one out and to award or subtract points > either way. If this person only slightly lashes > out against others it may be that, he has a > backbone, but is not actually toxic. Be careful > here and only subtract points if this person is > hardcore in his angst and bitterness. Hint: Most > TSCM folks have a strong moral backbone, and have > a strong sense of fairness and of what are right > and wrong. Most TSCM professionals will be > strongly biased against eavesdroppers, felons, or > wrong doers, and this bias should result in > points being awarded as you discuss just "how > white his hat is". On the other hand, if the TSCM > expert is bitter against others, but cannot > specifically tell you why, then you should > subtract points. Also, be wary of any TSCM expert > who is overly complementary towards other people > as this may indicate a potential parasite. > > Puffer Fish - Typically, he has little or no > credentials of his own, but knows all of the > industry lingo and jargon. He will claim to be > the president of a huge corporation with scores > of employees, tens of millions in assets when in > fact this type is a penniless mooch who is still > living with their parents. If not living with his > parents his (or her) spouse will be the primary > breadwinner in the family, their primary income > (and references) will be from close friends or > family. Listen very carefully for any hint as to > where the seed money came from for them to start > their business, as you may find that a rich > family member bought them the equipment and has > been subsidizing their TSCM activities. Often > this type is also a pretender and bumbling putz. > Listen for any hint of grandiosity or of what > this person is going to do in the future, versus > what they have actually done in the past. Dream > and aspirations are important; delusions and > illusions are not and should be graded accordingly. > > Psychiatrist Bait - These people are really > nothing more then con artists who will ramble on > for hours with wild tales of how they were a Navy > SEAL, covert CIA operative, undercover FBI agent, > won the Congressional Medal of Honor, was a POW, > won the war, and so on. They could tell you about > their credentials, but then they would have to > kill you. Often they will offer credentials, > which at first appear real, but cannot be > confirmed, or is suspect in another way. They > will offer credentials that cannot be verified by > their own admission. "It's too secret" Ask > questions, get specific answers, grade as you > feel is appropriate. However, step carefully, as > many TSCM people will not discuss a great deal of > their background initially, so this level should > be considered in regards to initial contact. If > the person sounds and talks a little crazy > initially then subtract points, but if they seem > sane and coherent then add points. Do not get too > carried away on this issue though. Always > remember that the TSCM person is grading you as a > customer as well, and may not be too keen on > disclosing too much about their background until > they get to know you better, so this is a two way street. > > Phelons (or Felon) - This group is a real problem > within the security business. Many con artists, > felons, and dirt-bags try to capitalize on their > criminal skills by claiming to be able to catch > other criminals. Usually their only credential > (which can be verified) is the criminal > conviction. Often this type will claim to be a > convicted hacker and computer expert when in fact > he was convicted of arson, or of being a drug > dealer, is a psychiatric patient, and is > incapable of recovering his own hard drive or of > performing the most simplistic of technical > tasks. The few cases where the conviction was > relevant to their field will not set your mind at > ease about their now "reformed" status. Now this > gets a tricky because if you become reasonably > convinced that you are talking to a felon (or > they brag of their crimes) you need to subtract > 50 points, and not consider dealing with them > unless there is some overwhelming reason to do > so. If the person was involved in a crime that > did not involve moral turpitude or violence > (i.e.: drunk driving, disorderly conduct, etc) > then perhaps subtract only 15 points. Now, on the > other hand if the TSCM appears to be a good > citizen, with no criminal histories then they get only a positive 10 points. > > Paranoids - Usually has knowledge of security > because of an anti-establishment, paranoid or > criminal mind-set, which compels them to > constantly look over their shoulder. Of course, > the government is constantly harassing them, has > their phones taped, has video cameras in their > house, and has legions of agents employed just to > harass them specifically. They will sometimes > rant on about government mind control, biological > implants, electronic harassment, and so on. In > some cases they have written books or articles, > but the materials is published only in very > narrow channels, or by paramilitary or fringe > publishers. Very often, they will hear voices in > their head, and/or be able to convince other that > they too are hearing voices or seeing visions. If > they are hearing voices, seeing visions, or claim > to have any kind, of "special powers", you should > subtract 30 or more points. If they seem like a > normal and rational person they get zero points, > but if they are "professionally cautious" add a > few positive points as TSCM experts operate in a > world where they assume that a place is bugged > until scientifically proven otherwise, they are > not paranoid, but more accurately are in touch > with the eavesdropping threat. To be awarded +10 > point the TSCM expert should be cautious, > careful, and delicate with the project, but > should not act "crazy", and should make you feel more secure, and not fearful. > > Police - When a TSCM expert enters the > profession, they hopefully come with a multitude > of prior experience, some have a technical > background, and some have little or no technical > background. Sadly, there are quite a few retired > or fired members of the law enforcement or > intelligence community who try their hands at > TSCM, and who are woefully unqualified to render > such services. Commonly, they run out and spend a > few hundred or even a few thousand dollars in > simplistic equipment and dance around with it, > but really have no idea what they are doing. It > is also common to see someone in law enforcement > (or even security guards) purchase a $99 scanner > or frequency counter and attend 3-4 days of > training, then start selling their services as a > TSCM expert. Con artists may also claim to be, or > have been a police officer, so to err on the side > of safety you should be suspect of anybody who > makes a claim of a connection to the police, and > automatically award them a neutral score of zero. > If they have a considerably strong technical > background, and have very specific training in > TSCM then award then a couple of extra positive > points. However, if they claim to be or to have > been involved in law enforcement you should > remember that quite a few fraudsters claim to > have been police officers, and you should err on > the side of caution and start subtracting points. > > Private Investigator - PI's must by the nature of > their profession be generalists, and know a > little bit about a whole lot of things, and must > have connections to people who are actual subject > matter experts. As a rule, PI's do not actually > perform bug sweeps, and you need to be extremely > suspicious of anybody who tells you they perform > bug sweeps and that they are a private > investigator. It is desirable for a PI to bring > in an outside TSCM expert to perform a sweep, but > when the PI themselves try to perform the sweep > the customer is probably going to get fleeced. A > TSCM expert on the other hand is an expert with > electronics, has very specialized skills, > background, and training in technical matters, > and tend not to be a generalist like a Private > Investigator. Granted, some TSCM people do come > from an investigative or intelligence background, > but you need to be on guard for any PI who is > trying to come across as a TSCM expert. You start > by awarding a neutral score of zero, if the > person is a private investigator in a state that > requires licensing, bonding, and insurance of > PI's then you award a negative 10 score (-10). If > they are a PI in a state that does not require a > PI license then only award a negative 3 score. If > they have been a PI in the past, but are not one > now they get a positive 5, and if they have never > been a PI they get a +10. The logic behind this > is that the more of a PI someone is, the less you > want them to do sweeps for you. If someone as > gone to the effort and expense of becoming a > licensed private investigator then in is doubtful > that they are making their living performing sweeps. > > Professor - Heavy academic experience, but fairly > light on actual field experience. This type is > very hazardous to your sweep, as they can often > talk about technical subjects exhaustively, and > may own a smattering of equipment, but they > usually (but not always) lack actual experience > out in the field. They can talks for days about > antenna factors, signal propagation, and "what > can be done" but when it actually comes down to > putting their knowledge to work things start > falling apart. When a TSCM person tried to > impress you with which universities they > attended, or what degrees they earned you should > start awarding negative points as you see fit, > and if they are humble about their academic > experience award positive points. In reality, the > college you went to and the degree you earned is > only important while you are in your 20's and are > looking for work. A number of TSCM experts have > Masters and Doctorates, but they rarely crow about it. > > Phed (or Fed) - Just how long did the TSCM person > work for a federal agency, did they perform > sweeps, for how long did they perform sweeps, did > they serve in a technical position prior to > working in TSCM. Did they attend the State > Department or CIA School, or was it one of the > orphan schools. Did they stay with the same > agency for their entire term of service or did > they job hop to various agencies. Start by > awarding a neutral score of zero, if they never > performed TSCM services as a full time employee > of the federal government then you award -5 > points. If they worked for the government > performing sweeps, but "job hopped" more then > twice award then -10 points, as there is some > ugliness afoot (which resulted from them being > fired from one agency, but being rehired by a > second agency), if this happens more then twice > then there is a serious problem. Now, if they > served in a technical position before getting > into TSCM award then +5 points, and if they > performed at least 100 (7+ day) sweep projects > for the federal government they get +10 points. > > Philby - In 1963, Harold Adrian Russell "Kim" > Philby, a high-ranking British intelligence was > exposed as a long term spy who was had actually > been working for the Soviet Union's NKVD and KGB. > This treason was particularly devastating as he > was a mole planted deep inside the CIA, and his > actions lead to the deaths of countless CIA and > MI6 agents. When a TSCM expert tells you that > they served in an intelligence agency you award > -5 points, and if they retired from an > intelligence agency you award then -10 points. > The problem is that because of the Philby > incident the CIA and other intelligence agencies > are organizationally dysfunctional when it comes > to sweeps, and they do not like to teach sweeps > in such a way that allows the sweeper to function > outside of the government. Yes, they may be quite > good in TSCM, but it is very tough for them to > perform sweeps as they were trained to be a > "cog-in-the-machine", but not the machine itself > (thanks to Philby). If someone is going to be > performing sweeps for you, it is critical that > they be able to provide this service solely on > their own without having to bring in other people or outside agencies. > > Pirate - Meet Captain Hook and his merry band of > pirates. Just how many people are going to be > showing up for this sweep, and why are so many > people required for the project? The more people > involved in the sweep the more likely it is that > you have a pirate on your hands, and the greater > the probability that pillaging is about to > happen. In addition, as the sweep team becomes > larger the greater the likelihood is that the > security of the project is going to be > compromised and that the eavesdropper is going to > be accidentally tipped off. The ideal situation > is for only one or two TSCM people to be involved > in a sweep, with a maximum of three people on > site at any given time. Start this score at zero, > and if only one person is coming out then award > +10 points, if 2 people will come out then award > +5 points, 3 people is -5. As the number of > people increases up to six, you award -10. When a > sweeper starts tells you they are going to show > up with more then 2 people you need to be on guard, and ask lot of questions. > > Prima Dona - Does the TSCM expert seem just a > little too ego driven? Do they crow on endlessly > about what college they attended, and how they > spent 30 years working for NASA, invented a cure > for warts, heals the sick, and so on ad nauseum? > Beware the Prima Dona, as they tend to want their > own office for the sweep, or show up for a low > key project in a Ferrari or Porsche (not that > there is anything wrong with these vehicles). > They wear designer suits, smoke expensive cigars, > and go way overboard in trying to show or tell > you how important and powerful they are when in > fact they are impotent. Start with a neutral > score, and as the TSCM person impresses you with > how slick and important they are, start awarding > negative points. If they have a little bit of > "grit" to them then award +5 points, and the less > polish they have the closer you can get to > awarding them +10 points. You do not want a TSCM > person who is flamboyant, is a fancy dresser, who > is arrogant, or who feels like the World is beneath them. > > Pathetic - A few self-anointed sweep people have > sob stories about how miserable their life has > been, how they have overcome unrelenting odds, > and they have a sob story for every occasion. If > you give more then a few minutes of your time you > will start feeling sorry for them and will want > to give them the sweep project just to help them > out. Unfortunately, in most cases, the person is > trying to trick you, and they really are not > performing sweeps, but rather confidence tricks > and swindles. If a TSCM expert comes to you with > stories about how pathetic their lives are, you > should start adding negative numbers, and > conversely if they do not start up with the pity > party you should award positive numbers. > > Philanthropist - If the sweeps are too cheap then > you have a serious problem. There are no cheap, > good cigars. Real sweeps actually costs thousands > of dollars or tens of thousands of dollars, not > hundreds or dollars, nor do they cost hundreds of > thousands of dollars. Beware of anybody who > quotes you prices for a sweep that are too low. > > Phreaks - People get into TSCM for a range of > reasons, some of these reasons are honorable, > some are based on professional curiosity, but > sadly, some people get involved in TSCM due to > dishonorable or illegal activities. One group of > folks who sometimes get involved are drug > dealers, dope growers, drug users, meth cookers, > tweakers and those involved in the illegal > narcotics trade. In these illicit professions > they tend to be extremely paranoid and feel that > the government is out to get them (which is it), > and they are constantly afraid of being bugged > (which they should be). They frequently load up > on sweep gear and learn about how to perform TSCM > in an attempt to find the bugs on their own phone lines. They may > > Power Sweeper - If a sweeper is very good at > balancing their workload they can schedule a > string of sweeps in a row for different clients, > so that they perform, larger sweeps intermixed > with smaller sweeps. The larger multi-day sweeps > (four or more days) are like the bricks or stones > in a wall, and the smaller sweeps are like the > mortar that is used to hold the larger stones or > bricks in place. If a sweeper tells you about how > they only perform large, corporate of government > sweeps, and that they do not perform smaller > sweeps they are likely lying to you. If they > claim not to perform private, domestic, or > residential sweeps, they are also lying to you. > > Phantom Sweeper - Claims to perform hundreds of > sweeps per year. The only problem is that for > them to perform as many sweeps per year that they > claim they would have to be working 30 hours per > day, 400 days per year, and would have to possess > 8 arms, 6 eyes, and possess physic abilities > (none of which is likely). A good TSCM expert can > handle a single multi-day sweep per week, plus a > couple of smaller single day sweeps worked around > the larger project. If a sweeper claims to be > performing 100 sweeps per year you should ask > many questions, and if they claim to be > performing "hundreds per year" you should > consider finding somebody else. In reality, most > corporate or government sweeps require 3-5 days > for a single room, and then a day or so for each > additional room. Very simple residential sweeps > take only a day or so, but a more complicated > residential sweep can take a week or more. As far > as scoring this issue, you start by awarding zero > points, and when the TSCM expert tries to > convince you that they perform more then a few > sweeps per week (on average) you subtract points, > the more they claim, the more you subtract. On > the other hand, if they explain that there are a > limited number of projects they can handle per > month then award them up to ten points. Watch out > for people who use the words "projects", > "assignments", or "engagements" and then claim to > perform hundreds, or even thousands of these per > year when the truth of the matter is that every > time their phone rings they claim it is an > assignment even though they never do any work for > the client. Listen carefully, are they performing > actual bug sweeps for these numbers, or are they up to something else. > > Phantom Equipment - This is a simple matter of > the TSCM expert actually owning the equipment > they are proposing using. This is not an issue of > what equipment they "have access to", or what > they will buy so they can perform the project for > you. You do not want a TSCM person who is > borrowing equipment, or who is going to run out > and buy equipment he does not already possess. > Instead, you want to be dealing someone who > already has hundreds of thousands, if not > millions of dollar invested in equipment, and > they can bring that equipment to your location in > very short order. You grade the equipment like > this... If they have $50,000 in equipment that they > can bring to your project then they get a neutral > score of zero. $300,000 in equipment results in > +5 points, and over one million dollars of > equipment (on site) results in a score of +10. On > the other hand, if they can only bring less then > $25,000 of equipment on site they get -3 points, > under $5,000 in equipment, -6 points. If they > have only a small kit of equipment involving only > one or two briefcases, or a single broadband > field detector (valued under $2,500) you award > -10 points. If at any time they use the phrases > "has access to the equipment", "can borrow the > equipment", "can use their employers equipment" > or other similar statements you automatically award -10 points. > > Add the scores up, in a perfect world it should > be over 250 points, but anything over 140 points > is a decent sweep person (with an average score), > and over 200 points is an excellent sweep person. > An overall score that is below zero means that > you should be polite, but not consider having > them do a sweep, or anything else for you. If > they have an overall negative score, you should > figure out some way to distance yourself from the > person before you end up losing more then just a few dollars. > > ---------------------------------------------------------------------------≠------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ---------------------------------------------------------------------------≠------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 E-mail: mailto:jm...@tscm.com > ---------------------------------------------------------------------------≠------------------------- > We perform bug sweeps like it's a full contact sport, we take no prisoners, > and we give no quarter. Our goal is to simply, and completely stop the spy. > ---------------------------------------------------------------------------≠------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.24] ([172.28.128.24]:49637 "EHLO ip01.ams.ftl.affinity.com") by ams017.ftl.affinity.com with ESMTP id S2444137AbXKBB3I; Thu, 1 Nov 2007 21:29:08 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: Ao8CADoaKkdA6aaoi2dsb2JhbACBR40hAgEIAgYTEQWBEQ Received: from py-out-1314.google.com ([64.233.166.168]) by ip01.ams.ftl.affinity.com with ESMTP; 01 Nov 2007 21:29:08 -0400 Received: by py-out-1314.google.com with SMTP id p69so2918294pyb for ; Thu, 01 Nov 2007 18:29:07 -0700 (PDT) Received: by 10.35.43.10 with SMTP id v10mr3378181pyj.1193966938518; Thu, 01 Nov 2007 18:28:58 -0700 (PDT) Received: by 10.106.220.37 with SMTP id s37gr2094prg; Thu, 01 Nov 2007 18:28:52 -0700 (PDT) X-Sender: aar9sm@hotmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.20.16 with SMTP id x16mr3321256pyi.1193958941671; Thu, 01 Nov 2007 16:15:41 -0700 (PDT) Received: by q5g2000prf.googlegroups.com with HTTP; Thu, 01 Nov 2007 23:15:40 +0000 (UTC) X-IP: 24.251.253.164 From: TSCM To: TSCM-L Professionals List Subject: [TSCM-L] {2094} Phoenix Sweep Date: Thu, 01 Nov 2007 16:15:40 -0700 Message-ID: <1193958940.554939.261660@q5g2000prf.googlegroups.com> User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) ; Embedded Web Browser from: http://bsalsa.com/; .NET CLR 2.0.50727; .NET CLR 1.1.4322),gzip(gfe),gzip(gfe) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Google-Approved: grainger01982@gmail.com via web at 2007-11-02 01:28:51 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Who picked up the Phoenix sweep? Mike --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:201 "EHLO ip03.ams.ftl.affinity.com") by ams012.ftl.affinity.com with ESMTP id S2436933AbXKBPR0; Fri, 2 Nov 2007 11:17:26 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAOHbKkdA6bjwi2dsb2JhbACOagIBCAQEJAWBEQ Received: from wr-out-0708.google.com ([64.233.184.240]) by ip03.ams.ftl.affinity.com with ESMTP; 02 Nov 2007 11:17:16 -0400 Received: by wr-out-0708.google.com with SMTP id 75so2013270wra for ; Fri, 02 Nov 2007 08:17:16 -0700 (PDT) Received: by 10.35.127.7 with SMTP id e7mr3630108pyn.1194013963669; Fri, 02 Nov 2007 07:32:43 -0700 (PDT) Received: by 10.106.220.37 with SMTP id s37gr2095prg; Fri, 02 Nov 2007 07:32:29 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.119.14 with SMTP id r14mr2595122nzc.1194013947976; Fri, 02 Nov 2007 07:32:27 -0700 (PDT) Received: from swip001.ftl.affinity.com (lvs00-fl-swip001.ftl.affinity.com [216.219.253.11]) by mx.google.com with ESMTP id h71si2100253nzf.2007.11.02.07.32.27; Fri, 02 Nov 2007 07:32:27 -0700 (PDT) Received-SPF: neutral (google.com: 216.219.253.11 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.11; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.11 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [71.243.12.197] ([71.243.12.197]:38085 "EHLO Raphael.tscm.com") by swip001.ftl.affinity.com with ESMTP id S370123AbXKBOcZ convert rfc822-to-8bit (ORCPT ); Fri, 2 Nov 2007 10:32:25 -0400 Message-Id: <7.0.1.0.2.20071102094551.12b7b008@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Fri, 02 Nov 2007 10:19:36 -0400 To: TSCM-L2006@googlegroups.com From: "James M. Atkinson" Subject: [TSCM-L] {2095} Re: Fast, Low-Cost Signal Analyzer ??? In-Reply-To: <937242.38371.qm@web57009.mail.re3.yahoo.com> References: <937242.38371.qm@web57009.mail.re3.yahoo.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Roger, The EXA and MXA is Agilent first major push into the use to a software define instruments where the BWO and sweep circuits are replaced with high speed digitizers and a block convertor. You would use a EXA or MXA in a similar fashion to that of the ESA or PSA (thier flagship swept spectrum analyzers). A software defined instrument used in the format as a spectrum or vector analyzer has been around for over ten years, but most TSCM people could not justify paying $140,000 for a highly fragile, 75 pound instrument. The big benefit of a software defined instrument is that once you split the incoming signal into a I and Q signals, and then digitize them the kinds of measurements you can make with them is almost limitless. For example you can display a segment of the RF spectrum in a frequency v. amplitude as a conventional spectrum analyzer display, or as a frequency v./ time in several different formats, or as a phase or constellation display, actual data display, chips, or other data inside the signal. As a TSCM instrument the software defined instrument is quite valuable in capturing data bursts where you set up on a set of frequencies that you know that a bug is using, and you capture the spectrum only when that band lights up. For example, in September/October 1999 I purchased two Tektronix 3086 Real Time Spectrum Analyzers, and mounted them in a shock mounted anti-vibration Hardigg rack as they were not suitable for field use due to their construction and special measures had to be taken to protect them. These instruments were the very first widely produced software defined instruments and what you got was a Windows 95 PC with a modest hard drive, multiple serial ports, digitizer boards, down converters, etc. The actual digitize bandwidth was 30 MHz, and with a little mod you could tweak this up to just over 100 MHz of bandwidth. What this means is that if anything at all pops up on the air within this bandwidth the instrument will capure it without regard for how long the signal was present, so in the case of a burst device that is only in the air for a few milli-seconds every couple of hours these RTSA's will capture it, albeit with a moderately narrow bandwidth. By using two or more instruments you can monitor two or more times as much RF real estate, but you are still restricted to the "bandwidth" of the instruments so that even if you have only of the newer RTSA that goes up to 8.5 GHz you still can only watch 30 MHz or so at a time (up to 120 MHz if you are clever with equipment mods). If you are stalking digital signals that are only present for short times, or signals that create only a very small elevation of the noise floor these types of instruments are invaluable, and since they have been around for the last decade the designs have become much more refined, and the equipment reduced in size and more reliable.. -jma At 10:29 AM 11/1/2007, rogelio villarreal wrote: >COULD YOU TELL ME IF THIS WOULD BE OF USE IN SWEEPS? > >pERHAPPS THIS INFORMATION COULD BE OF INTEREST TO THE >GROUP > >SALUDOS > >ROGER in Mexico > >Signal analyzer sets new performance/cost standard in >signal analysis > >Fast, Low-Cost Signal Analyzer >Claimed to make signal measurements 3◊ faster than >competitive models, an economy-model signal analyzer >targets design troubleshooting, complex signal >analysis, and productivity gains. The analyzer uses >vector signal analysis software to perform a wide >range of measurements in an open Window XP >Professional OS. Functions can be accessed with a USB >keyboard/mouse and on the front panel > >Santa Clara, Calif. ó Agilent Technologies Inc. says >its EXA signal analyzer is the industry's fastest >economy-class signal analyzer, providing engineers >with the capabilities to troubleshoot new designs, >increase manufacturing throughput, or analyze complex >and time-varying signals. >At a lower performance point than Agilent's MXA signal >analyzer, the EXA integrates the same broad range of >standards-based measurements with Agilent's 89600 >vector signal analysis (VSA) software in a single >instrument. In addition to the use of an open Windows >XP Professional operating system, the EXA also >provides an advanced signal analysis user interface. >All measurement features and functions are intuitively >grouped and accessible from the front panel or via a >USB keyboard and mouse. >The EXA signal analyzer supports multiple frequency >ranges from 9 kHz to 3.6, 7.0, 13.6 and 26.5 GHz, an >internal fully calibrated pre-amplifier option up to >3.6 GHz, and standard analysis bandwidths of 10 MHz. >This fully scalable functionality is complemented by >EXA's +13 dBm third-order intercept, -146 dBm/Hz >displayed average noise level (without pre-amp) and 66 >dB W-CDMA ACLR dynamic range, as well as 0.4 dB total >absolute amplitude accuracy, which is made possible by >the all-digital, 14-bit ADC IF section. The dynamic >range is maximized with an optional 2 dB mechanical >step attenuator over the full frequency range and for >manufacturing offers an optional 1 dB electronic >attenuator to 3.6 GHz. >Agilent said a breakthrough characteristic of the >Agilent EXA is its intrinsic speed, unprecedented for >an economy signal analyzer, which allows measurements >up to 300 percent faster than other economy-class >signal analyzers. The EXA returns a marker peak search >result in less than 5 ms, local updates in less than >10 ms, and remote sweep and transfer (via GPIB) in >less than 12 ms. Measurement mode switching speeds are >typically less than 75 ms. This speed enables a fast >and seamless change between WiMAX, W-CDMA, >HSDPA/HSUPA, GSM/EDGE, phase noise measurements, and >89600 VSA software. >Optional measurement application software provides >preconfigured test routines for GSM/EDGE, 802.16e >Mobile WiMAX, W-CDMA, HSDPA/HSUPA, and phase-noise >applications. Running the Agilent 89600 VSA software >application in the EXA enables advanced signal >demodulation analysis and troubleshooting of more than >50 demodulation formats including 2G, 3G, 3.5G, WiMAX, >WLAN and Private Mobile Radio. >The EXA also includes a comprehensive set of standard >one-button-power measurements for characterizing >signal quality. These include ACPR, Channel Power, >Occupied Bandwidth, Spectrum Emissions Mask, CCDF, >Burst Power and Spurious Emission. It's fully >compliant with the LXI Class-C specification. >Connectivity is possible via 100 based-T LAN, GPIB and >seven USB 2.0 ports. >Pricing: >ï N9010A-503 (Frequency Range, 9 kHz to 3.6 GHz): >$16,900 >ï N9010A-507 (Frequency Range, 9 kHz to 7.0 GHz): >$25,900 >ï N9010A-513 (Frequency Range, 9 kHz to 13.6 GHz): >$30,900 >ï N9010A-526 (Frequency Range, 9 kHz to 26.5 GHz): >$35,900 >ï N9010A- FSA (Fine step attenuator): $1,000 >ï N9010A-PFR (Precision Frequency Reference): $2,000 >ï N9010A-EA3 (Electronic Attenuator, 3.6 GHz): $3,000 >ï N9010A-P03 (Preamplifier, 3.6 GHz): $1,500 >ï N9010A-CPU (Instrument Security, additional >CPU/HDD): $4,000 >ï N9068A (Phase Noise Measurement Application): $4,700 > >ï N9071A (GSM/EDGE Measurement Application): $6,000 >ï N9073A-1FP (W-CDMA Measurement Application): $7,400 >ï N9073A-2FP (HSDPA/HSUPA Measurement Application): >$4,300 >ï N9075A (802.16 OFDMA Measurement Application): >$10,000 >ï 89601A (Vector Signal Analysis software -89600): >$10,100 > >Product information: N9019A >Agilent Technologies Inc., 1-800-829-4444, item number >8155, www.agilent.com > > >__________________________________________________ >Do You Yahoo!? >Tired of spam? Yahoo! Mail has the best spam protection around >http://mail.yahoo.com > > ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.24] ([172.28.128.24]:52241 "EHLO ip01.ams.ftl.affinity.com") by ams011.ftl.affinity.com with ESMTP id S619570AbXKBSaJ; Fri, 2 Nov 2007 14:30:09 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAIsJK0dA6aLwi2dsb2JhbACCc4t3AgEIBAQkBYER Received: from nz-out-0708.google.com ([64.233.162.240]) by ip01.ams.ftl.affinity.com with ESMTP; 02 Nov 2007 14:30:04 -0400 Received: by nz-out-0708.google.com with SMTP id v22so3670971nzg for ; Fri, 02 Nov 2007 11:30:04 -0700 (PDT) Received: by 10.36.127.8 with SMTP id z8mr2187216nzc.1194028191631; Fri, 02 Nov 2007 11:29:51 -0700 (PDT) Received: by 10.107.7.26 with SMTP id k26gr2096pri; Fri, 02 Nov 2007 11:29:48 -0700 (PDT) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.36.18.3 with SMTP id 3mr16633371nzr.1194028186406; Fri, 02 Nov 2007 11:29:46 -0700 (PDT) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id y6si2239341nzg.2007.11.02.11.29.45; Fri, 02 Nov 2007 11:29:46 -0700 (PDT) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id E6607502BB54D for ; Fri, 2 Nov 2007 14:29:44 -0400 (EDT) Message-ID: <472B6B64.1000803@phreaker.net> Date: Fri, 02 Nov 2007 14:24:36 -0400 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="------------060708040302070406000009" To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2096} Re: Fast, Low-Cost Signal Analyzer ??? References: <937242.38371.qm@web57009.mail.re3.yahoo.com> <7.0.1.0.2.20071102094551.12b7b008@tscm.com> In-Reply-To: <7.0.1.0.2.20071102094551.12b7b008@tscm.com> X-AAC-KTE-LTE-MailScanner-Watermark: 1194632677.03211@x+HSfVTqOEdaNfYoFD0Xrw Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Having played with a few of these incredible machines, you are more constrained by time to learn than time on the jobsite.
Its all there, and its like anything else so complex, it takes time to get it to do what you want.
The nice thing about Software defined test instruments, is WHEN you get it right, you can save the settings to a keyfob or disk for future use.
Most have built-in presets. I like to back everything up to a CD or DVD for permanent reference. That way youve got a benchmark you can use to show a customer your calibrations, external to the machine.
You will however, be spending some serious time learning the machine. But you need not have to learn it a second time.
Marc

James M. Atkinson wrote:

Roger,

The EXA and MXA is Agilent first major push into 
the use to a software define instruments where 
the BWO and sweep circuits are replaced with high 
speed digitizers and a block convertor. You would 
use a EXA or MXA in a similar fashion to that of 
the ESA or PSA (thier flagship swept spectrum analyzers).

A software defined instrument used in the format 
as a spectrum or vector analyzer has been around 
for over ten years, but most TSCM people could 
not justify paying $140,000 for a highly fragile, 
75 pound instrument. The big benefit of a 
software defined instrument is that once you 
split the incoming signal into a I and Q signals, 
and then digitize them the kinds of measurements 
you can make with them is almost limitless.

For example you can display a segment of the RF 
spectrum in a frequency v. amplitude as a 
conventional spectrum analyzer display, or as a 
frequency v./ time in several different formats, 
or as a phase or constellation display, actual 
data display, chips, or other data inside the signal.

As a TSCM instrument the software defined 
instrument is quite valuable in capturing data 
bursts where you set up on a set of frequencies 
that you know that a bug is using, and you 
capture the spectrum only when that band lights up.

For example, in September/October 1999 I 
purchased two Tektronix 3086 Real Time Spectrum 
Analyzers, and mounted them in a shock mounted 
anti-vibration Hardigg rack as they were not 
suitable for field use due to their construction 
and special measures had to be taken to protect 
them. These instruments were the very first 
widely produced software defined instruments and 
what you got was a Windows 95 PC with a modest 
hard drive, multiple serial ports, digitizer 
boards, down converters, etc. The actual digitize 
bandwidth was 30 MHz, and with a little mod you 
could tweak this up to just over 100 MHz of 
bandwidth. What this means is that if anything at 
all pops up on the air within this bandwidth the 
instrument will capure it without regard for how 
long the signal was present, so in the case of a 
burst device that is only in the air for a few 
milli-seconds every couple of hours these RTSA's 
will capture it, albeit with a moderately narrow 
bandwidth. By using two or more instruments you 
can monitor two or more times as much RF real 
estate, but you are still restricted to the 
"bandwidth" of the instruments so that even if 
you have only of the newer RTSA that goes up to 
8.5 GHz you still can only watch 30 MHz or so at 
a time (up to 120 MHz if you are clever with equipment mods).

If you are stalking digital signals that are only 
present for short times, or signals that create 
only a very small elevation of the noise floor 
these types of instruments are invaluable, and 
since they have been around for the last decade 
the designs have become much more refined, and 
the equipment reduced in size and more reliable..

-jma







At 10:29 AM 11/1/2007, rogelio villarreal wrote:

  
COULD YOU TELL ME IF THIS WOULD BE OF USE IN SWEEPS?

pERHAPPS THIS INFORMATION COULD BE OF INTEREST TO THE
GROUP

SALUDOS

ROGER in Mexico

Signal analyzer sets new performance/cost standard in
signal analysis

Fast, Low-Cost Signal Analyzer
Claimed to make signal measurements 3× faster than
competitive models, an economy-model signal analyzer
targets design troubleshooting, complex signal
analysis, and productivity gains. The analyzer uses
vector signal analysis software to perform a wide
range of measurements in an open Window XP
Professional OS. Functions can be accessed with a USB
keyboard/mouse and on the front panel

Santa Clara, Calif. — Agilent Technologies Inc. says
its EXA signal analyzer is the industry's fastest
economy-class signal analyzer, providing engineers
with the capabilities to troubleshoot new designs,
increase manufacturing throughput, or analyze complex
and time-varying signals.
At a lower performance point than Agilent's MXA signal
analyzer, the EXA integrates the same broad range of
standards-based measurements with Agilent's 89600
vector signal analysis (VSA) software in a single
instrument. In addition to the use of an open Windows
XP Professional operating system, the EXA also
provides an advanced signal analysis user interface.
All measurement features and functions are intuitively
grouped and accessible from the front panel or via a
USB keyboard and mouse.
The EXA signal analyzer supports multiple frequency
ranges from 9 kHz to 3.6, 7.0, 13.6 and 26.5 GHz, an
internal fully calibrated pre-amplifier option up to
3.6 GHz, and standard analysis bandwidths of 10 MHz.
This fully scalable functionality is complemented by
EXA's +13 dBm third-order intercept, -146 dBm/Hz
displayed average noise level (without pre-amp) and 66
dB W-CDMA ACLR dynamic range, as well as 0.4 dB total
absolute amplitude accuracy, which is made possible by
the all-digital, 14-bit ADC IF section. The dynamic
range is maximized with an optional 2 dB mechanical
step attenuator over the full frequency range and for
manufacturing offers an optional 1 dB electronic
attenuator to 3.6 GHz.
Agilent said a breakthrough characteristic of the
Agilent EXA is its intrinsic speed, unprecedented for
an economy signal analyzer, which allows measurements
up to 300 percent faster than other economy-class
signal analyzers. The EXA returns a marker peak search
result in less than 5 ms, local updates in less than
10 ms, and remote sweep and transfer (via GPIB) in
less than 12 ms. Measurement mode switching speeds are
typically less than 75 ms. This speed enables a fast
and seamless change between WiMAX, W-CDMA,
HSDPA/HSUPA, GSM/EDGE, phase noise measurements, and
89600 VSA software.
Optional measurement application software provides
preconfigured test routines for GSM/EDGE, 802.16e
Mobile WiMAX, W-CDMA, HSDPA/HSUPA, and phase-noise
applications. Running the Agilent 89600 VSA software
application in the EXA enables advanced signal
demodulation analysis and troubleshooting of more than
50 demodulation formats including 2G, 3G, 3.5G, WiMAX,
WLAN and Private Mobile Radio.
The EXA also includes a comprehensive set of standard
one-button-power measurements for characterizing
signal quality. These include ACPR, Channel Power,
Occupied Bandwidth, Spectrum Emissions Mask, CCDF,
Burst Power and Spurious Emission. It's fully
compliant with the LXI Class-C specification.
Connectivity is possible via 100 based-T LAN, GPIB and
seven USB 2.0 ports.
Pricing:
•       N9010A-503 (Frequency Range, 9 kHz to 3.6 GHz):
$16,900
•       N9010A-507 (Frequency Range, 9 kHz to 7.0 GHz):
$25,900
•       N9010A-513 (Frequency Range, 9 kHz to 13.6 GHz):
$30,900
•       N9010A-526 (Frequency Range, 9 kHz to 26.5 GHz):
$35,900
•       N9010A- FSA (Fine step attenuator): $1,000
•       N9010A-PFR (Precision Frequency Reference): $2,000
•       N9010A-EA3 (Electronic Attenuator, 3.6 GHz): $3,000
•       N9010A-P03 (Preamplifier, 3.6 GHz): $1,500
•       N9010A-CPU (Instrument Security, additional
CPU/HDD): $4,000
•       N9068A (Phase Noise Measurement Application): $4,700

•       N9071A (GSM/EDGE Measurement Application): $6,000
•       N9073A-1FP (W-CDMA Measurement Application): $7,400
•       N9073A-2FP (HSDPA/HSUPA Measurement Application):
$4,300
•       N9075A (802.16 OFDMA Measurement Application):
$10,000
•       89601A (Vector Signal Analysis software -89600):
$10,100

Product information: N9019A
Agilent Technologies Inc., 1-800-829-4444, item number
8155, www.agilent.com


__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around
http://mail.yahoo.com


    
----------------------------------------------------------------------------------------------------
   World Class, Professional, Ethical, and Competent Bug Sweeps, and
Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
----------------------------------------------------------------------------------------------------
  James M. Atkinson                              Phone:  (978) 381-9111
  Granite Island Group                          Fax:      
  127 Eastern Avenue #291                 Web:    http://www.tscm.com/
  Gloucester, MA 01931-8008              E-mail:  mailto:jmatk@tscm.com
----------------------------------------------------------------------------------------------------
  We perform bug sweeps like it's a full contact sport, we take no prisoners,
and we give no quarter. Our goal is to simply, and completely stop the spy.
----------------------------------------------------------------------------------------------------






  

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.24] ([172.28.128.24]:45012 "EHLO ip01.ams.ftl.affinity.com") by ams023.ftl.affinity.com with ESMTP id S480242AbXKBUyv; Fri, 2 Nov 2007 16:54:51 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAIMrK0dA6aL5kmdsb2JhbACCPDeLdwIBAQcEBCmBEQ Received: from nz-out-0708.google.com ([64.233.162.249]) by ip01.ams.ftl.affinity.com with ESMTP; 02 Nov 2007 16:54:49 -0400 Received: by nz-out-0708.google.com with SMTP id v22so3919568nzg for ; Fri, 02 Nov 2007 13:54:49 -0700 (PDT) Received: by 10.36.127.3 with SMTP id z3mr2208204nzc.1194034329134; Fri, 02 Nov 2007 13:12:09 -0700 (PDT) Received: by 10.107.65.8 with SMTP id s8gr2097prk; Fri, 02 Nov 2007 13:12:06 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.106.20 with SMTP id e20mr3257954nzc.1194034323609; Fri, 02 Nov 2007 13:12:03 -0700 (PDT) Received: from swip001.ftl.affinity.com (lvs00-fl-swip001.ftl.affinity.com [216.219.253.11]) by mx.google.com with ESMTP id h49si2291175nzf.2007.11.02.13.12.02; Fri, 02 Nov 2007 13:12:03 -0700 (PDT) Received-SPF: neutral (google.com: 216.219.253.11 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.11; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.11 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [71.243.12.197] ([71.243.12.197]:28101 "EHLO Raphael.tscm.com") by swip001.ftl.affinity.com with ESMTP id S362515AbXKBUMC (ORCPT ); Fri, 2 Nov 2007 16:12:02 -0400 Message-Id: <7.0.1.0.2.20071102160053.100f63f8@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Fri, 02 Nov 2007 16:10:48 -0400 To: TSCM-L2006@googlegroups.com From: "James M. Atkinson" Subject: [TSCM-L] {2097} Re: Fast, Low-Cost Signal Analyzer ??? In-Reply-To: <472B6B64.1000803@phreaker.net> References: <937242.38371.qm@web57009.mail.re3.yahoo.com> <7.0.1.0.2.20071102094551.12b7b008@tscm.com> <472B6B64.1000803@phreaker.net> Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="=====================_841281921==.ALT" Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , What I liked about the 3086 is that the architecture of the machine was wide open so I could fully access the internals of the machine and wreak holy havoc on and eavesdropper because there was no place inside of the 3 GHz coverage band where they could hide their bugs. Since is also allowed the user to dump the spectrum directly to a SCSI hard-drive array you could use the 3086 to grab the entire spectrum to an external HD for hours, and only start collecting when an unexpected signal popped up. For example you could set the conditional acquisition up so that it watched the entire FM band, and when something popped up it grabbed the signal of interest and dumped the entire FM band to the HDD with a time stamp, which I could then off-load to a CD.

The 3086 was also totally user programmable so you could actually install a C compiler on the instrument and issue low level command to the computer that ran the thing and turn it into an extremely dangerous instrument.

-jma



At 02:24 PM 11/2/2007, kondrak wrote:

Having played with a few of these incredible machines, you are more constrained by time to learn than time on the jobsite.
Its all there, and its like anything else so complex, it takes time to get it to do what you want.
The nice thing about Software defined test instruments, is WHEN you get it right, you can save the settings to a keyfob or disk for future use.
Most have built-in presets. I like to back everything up to a CD or DVD for permanent reference. That way youve got a benchmark you can use to show a customer your calibrations, external to the machine.
You will however, be spending some serious time learning the machine. But you need not have to learn it a second time.
Marc

James M. Atkinson wrote:

Roger,

The EXA and MXA is Agilent first major push into 
the use to a software define instruments where 
the BWO and sweep circuits are replaced with high 
speed digitizers and a block convertor. You would 
use a EXA or MXA in a similar fashion to that of 
the ESA or PSA (thier flagship swept spectrum analyzers).

A software defined instrument used in the format 
as a spectrum or vector analyzer has been around 
for over ten years, but most TSCM people could 
not justify paying $140,000 for a highly fragile, 
75 pound instrument. The big benefit of a 
software defined instrument is that once you 
split the incoming signal into a I and Q signals, 
and then digitize them the kinds of measurements 
you can make with them is almost limitless.

For example you can display a segment of the RF 
spectrum in a frequency v. amplitude as a 
conventional spectrum analyzer display, or as a 
frequency v./ time in several different formats, 
or as a phase or constellation display, actual 
data display, chips, or other data inside the signal.

As a TSCM instrument the software defined 
instrument is quite valuable in capturing data 
bursts where you set up on a set of frequencies 
that you know that a bug is using, and you 
capture the spectrum only when that band lights up.

For example, in September/October 1999 I 
purchased two Tektronix 3086 Real Time Spectrum 
Analyzers, and mounted them in a shock mounted 
anti-vibration Hardigg rack as they were not 
suitable for field use due to their construction 
and special measures had to be taken to protect 
them. These instruments were the very first 
widely produced software defined instruments and 
what you got was a Windows 95 PC with a modest 
hard drive, multiple serial ports, digitizer 
boards, down converters, etc. The actual digitize 
bandwidth was 30 MHz, and with a little mod you 
could tweak this up to just over 100 MHz of 
bandwidth. What this means is that if anything at 
all pops up on the air within this bandwidth the 
instrument will capure it without regard for how 
long the signal was present, so in the case of a 
burst device that is only in the air for a few 
milli-seconds every couple of hours these RTSA's 
will capture it, albeit with a moderately narrow 
bandwidth. By using two or more instruments you 
can monitor two or more times as much RF real 
estate, but you are still restricted to the 
"bandwidth" of the instruments so that even if 
you have only of the newer RTSA that goes up to 
8.5 GHz you still can only watch 30 MHz or so at 
a time (up to 120 MHz if you are clever with equipment mods).

If you are stalking digital signals that are only 
present for short times, or signals that create 
only a very small elevation of the noise floor 
these types of instruments are invaluable, and 
since they have been around for the last decade 
the designs have become much more refined, and 
the equipment reduced in size and more reliable..

-jma







At 10:29 AM 11/1/2007, rogelio villarreal wrote:

 

COULD YOU TELL ME IF THIS WOULD BE OF USE IN SWEEPS?

pERHAPPS THIS INFORMATION COULD BE OF INTEREST TO THE
GROUP

SALUDOS

ROGER in Mexico

Signal analyzer sets new performance/cost standard in
signal analysis

Fast, Low-Cost Signal Analyzer
Claimed to make signal measurements 3  faster than
competitive models, an economy-model signal analyzer
targets design troubleshooting, complex signal
analysis, and productivity gains. The analyzer uses
vector signal analysis software to perform a wide
range of measurements in an open Window XP
Professional OS. Functions can be accessed with a USB
keyboard/mouse and on the front panel

Santa Clara, Calif. ≠ Agilent Technologies Inc. says
its EXA signal analyzer is the industry's fastest
economy-class signal analyzer, providing engineers
with the capabilities to troubleshoot new designs,
increase manufacturing throughput, or analyze complex
and time-varying signals.
At a lower performance point than Agilent's MXA signal
analyzer, the EXA integrates the same broad range of
standards-based measurements with Agilent's 89600
vector signal analysis (VSA) software in a single
instrument. In addition to the use of an open Windows
XP Professional operating system, the EXA also
provides an advanced signal analysis user interface.
All measurement features and functions are intuitively
grouped and accessible from the front panel or via a
USB keyboard and mouse.
The EXA signal analyzer supports multiple frequency
ranges from 9 kHz to 3.6, 7.0, 13.6 and 26.5 GHz, an
internal fully calibrated pre-amplifier option up to
3.6 GHz, and standard analysis bandwidths of 10 MHz.
This fully scalable functionality is complemented by
EXA's +13 dBm third-order intercept, -146 dBm/Hz
displayed average noise level (without pre-amp) and 66
dB W-CDMA ACLR dynamic range, as well as 0.4 dB total
absolute amplitude accuracy, which is made possible by
the all-digital, 14-bit ADC IF section. The dynamic
range is maximized with an optional 2 dB mechanical
step attenuator over the full frequency range and for
manufacturing offers an optional 1 dB electronic
attenuator to 3.6 GHz.
Agilent said a breakthrough characteristic of the
Agilent EXA is its intrinsic speed, unprecedented for
an economy signal analyzer, which allows measurements
up to 300 percent faster than other economy-class
signal analyzers. The EXA returns a marker peak search
result in less than 5 ms, local updates in less than
10 ms, and remote sweep and transfer (via GPIB) in
less than 12 ms. Measurement mode switching speeds are
typically less than 75 ms. This speed enables a fast
and seamless change between WiMAX, W-CDMA,
HSDPA/HSUPA, GSM/EDGE, phase noise measurements, and
89600 VSA software.
Optional measurement application software provides
preconfigured test routines for GSM/EDGE, 802.16e
Mobile WiMAX, W-CDMA, HSDPA/HSUPA, and phase-noise
applications. Running the Agilent 89600 VSA software
application in the EXA enables advanced signal
demodulation analysis and troubleshooting of more than
50 demodulation formats including 2G, 3G, 3.5G, WiMAX,
WLAN and Private Mobile Radio.
The EXA also includes a comprehensive set of standard
one-button-power measurements for characterizing
signal quality. These include ACPR, Channel Power,
Occupied Bandwidth, Spectrum Emissions Mask, CCDF,
Burst Power and Spurious Emission. It's fully
compliant with the LXI Class-C specification.
Connectivity is possible via 100 based-T LAN, GPIB and
seven USB 2.0 ports.
Pricing:
ï       N9010A-503 (Frequency Range, 9 kHz
to 3.6 GHz):
$16,900
ï       N9010A-507 (Frequency Range, 9 kHz
to 7.0 GHz):
$25,900
ï       N9010A-513 (Frequency Range, 9 kHz
to 13.6 GHz):
$30,900
ï       N9010A-526 (Frequency Range, 9 kHz
to 26.5 GHz):
$35,900
ï       N9010A- FSA (Fine step attenuator):
$1,000
ï       N9010A-PFR (Precision Frequency
Reference): $2,000
ï       N9010A-EA3 (Electronic Attenuator,
3.6 GHz): $3,000
ï       N9010A-P03 (Preamplifier, 3.6 GHz):
$1,500
ï       N9010A-CPU (Instrument Security,
additional
CPU/HDD): $4,000
ï       N9068A (Phase Noise Measurement
Application): $4,700

ï       N9071A (GSM/EDGE Measurement
Application): $6,000
ï       N9073A-1FP (W-CDMA Measurement
Application): $7,400
ï       N9073A-2FP (HSDPA/HSUPA Measurement
Application):
$4,300
ï       N9075A (802.16 OFDMA Measurement
Application):
$10,000
ï       89601A (Vector Signal Analysis
software -89600):
$10,100

Product information: N9019A
Agilent Technologies Inc., 1-800-829-4444, item number
8155, www.agilent.com


__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around
http://mail.yahoo.com


   

----------------------------------------------------------------------------------------------------
   World Class, Professional, Ethical, and Competent Bug
Sweeps, and
Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
----------------------------------------------------------------------------------------------------
  James M.
Atkinson                             
Phone:  (978) 381-9111
  Granite Island
Group                         
Fax:      
  127 Eastern Avenue
#291                
Web:   
http://www.tscm.com/
  Gloucester, MA
01931-8008             
E-mail:  mailto:jmatk@tscm.com
----------------------------------------------------------------------------------------------------
  We perform bug sweeps like it's a full contact sport, we take no
prisoners,
and we give no quarter. Our goal is to simply, and completely stop the
spy.
----------------------------------------------------------------------------------------------------






  

----------------------------------------------------------------------------------------------------
  World Class, Professional, Ethical, and Competent Bug Sweeps, and
Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
----------------------------------------------------------------------------------------------------
 James M. Atkinson                              Phone:  (978) 381-9111
 Granite Island Group                          Fax:     
 127 Eastern Avenue #291                 Web:    http://www.tscm.com/
 Gloucester, MA 01931-8008              E-mail:  mailto:jmatk@tscm.com
----------------------------------------------------------------------------------------------------
 We perform bug sweeps like it's a full contact sport, we take no prisoners,
and we give no quarter. Our goal is to simply, and completely stop the spy.
----------------------------------------------------------------------------------------------------


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.26] ([172.28.128.26]:64450 "EHLO ip03.ams.ftl.affinity.com") by ams022.ftl.affinity.com with ESMTP id S879992AbXKBU01; Fri, 2 Nov 2007 16:26:27 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAJckK0dA6aaoi2dsb2JhbACOagIBCAIGJAWBEQ Received: from py-out-1314.google.com ([64.233.166.168]) by ip03.ams.ftl.affinity.com with ESMTP; 02 Nov 2007 16:26:23 -0400 Received: by py-out-1314.google.com with SMTP id p69so5180939pyb for ; Fri, 02 Nov 2007 13:26:22 -0700 (PDT) Received: by 10.35.127.7 with SMTP id e7mr3760817pyn.1194034603990; Fri, 02 Nov 2007 13:16:43 -0700 (PDT) Received: by 10.107.114.37 with SMTP id r37gr2098prm; Fri, 02 Nov 2007 13:16:36 -0700 (PDT) X-Sender: rvg2000@prodigy.net.mx X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.106.20 with SMTP id e20mr2877491nzc.1194022334656; Fri, 02 Nov 2007 09:52:14 -0700 (PDT) Received: from nlpiport06.prodigy.net.mx (nlpiport06.prodigy.net.mx [148.235.52.43]) by mx.google.com with ESMTP id x35si2202151nzg.2007.11.02.09.52.14; Fri, 02 Nov 2007 09:52:14 -0700 (PDT) Received-SPF: pass (google.com: domain of rvg2000@prodigy.net.mx designates 148.235.52.43 as permitted sender) client-ip=148.235.52.43; Authentication-Results: mx.google.com; spf=pass (google.com: domain of rvg2000@prodigy.net.mx designates 148.235.52.43 as permitted sender) smtp.mail=rvg2000@prodigy.net.mx X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AlF4AJDyKke9itxrRmdsb2JhbAA6jiYBAQE3AYEc X-IronPort-AV: E=Sophos;i="4.21,363,1188795600"; d="scan'208";a="56237807" Received: from dsl-189-138-220-107.prod-infinitum.com.mx (HELO DADCOMPUTER) ([189.138.220.107]) by nlpiport06.prodigy.net.mx with SMTP; 02 Nov 2007 11:11:33 -0600 Message-ID: <001601c81da3$1d59fa90$4001a8c0@DADCOMPUTER> From: "Rogelio Villarreal G" To: References: <937242.38371.qm@web57009.mail.re3.yahoo.com> <7.0.1.0.2.20071102094551.12b7b008@tscm.com> Subject: [TSCM-L] {2098} Re: Fast, Low-Cost Signal Analyzer ??? Date: Fri, 2 Nov 2007 10:52:58 -1200 Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3138 X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 X-Google-Approved: grainger01982@gmail.com via web at 2007-11-02 20:16:36 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , JAMES thank you for the information best wishes Roger ----- Original Message ----- From: "James M. Atkinson" To: Sent: Friday, November 02, 2007 2:19 AM Subject: [TSCM-L] {2095} Re: Fast, Low-Cost Signal Analyzer ??? Roger, The EXA and MXA is Agilent first major push into the use to a software define instruments where the BWO and sweep circuits are replaced with high speed digitizers and a block convertor. You would use a EXA or MXA in a similar fashion to that of the ESA or PSA (thier flagship swept spectrum analyzers). A software defined instrument used in the format as a spectrum or vector analyzer has been around for over ten years, but most TSCM people could not justify paying $140,000 for a highly fragile, 75 pound instrument. The big benefit of a software defined instrument is that once you split the incoming signal into a I and Q signals, and then digitize them the kinds of measurements you can make with them is almost limitless. For example you can display a segment of the RF spectrum in a frequency v. amplitude as a conventional spectrum analyzer display, or as a frequency v./ time in several different formats, or as a phase or constellation display, actual data display, chips, or other data inside the signal. As a TSCM instrument the software defined instrument is quite valuable in capturing data bursts where you set up on a set of frequencies that you know that a bug is using, and you capture the spectrum only when that band lights up. For example, in September/October 1999 I purchased two Tektronix 3086 Real Time Spectrum Analyzers, and mounted them in a shock mounted anti-vibration Hardigg rack as they were not suitable for field use due to their construction and special measures had to be taken to protect them. These instruments were the very first widely produced software defined instruments and what you got was a Windows 95 PC with a modest hard drive, multiple serial ports, digitizer boards, down converters, etc. The actual digitize bandwidth was 30 MHz, and with a little mod you could tweak this up to just over 100 MHz of bandwidth. What this means is that if anything at all pops up on the air within this bandwidth the instrument will capure it without regard for how long the signal was present, so in the case of a burst device that is only in the air for a few milli-seconds every couple of hours these RTSA's will capture it, albeit with a moderately narrow bandwidth. By using two or more instruments you can monitor two or more times as much RF real estate, but you are still restricted to the "bandwidth" of the instruments so that even if you have only of the newer RTSA that goes up to 8.5 GHz you still can only watch 30 MHz or so at a time (up to 120 MHz if you are clever with equipment mods). If you are stalking digital signals that are only present for short times, or signals that create only a very small elevation of the noise floor these types of instruments are invaluable, and since they have been around for the last decade the designs have become much more refined, and the equipment reduced in size and more reliable.. -jma At 10:29 AM 11/1/2007, rogelio villarreal wrote: >COULD YOU TELL ME IF THIS WOULD BE OF USE IN SWEEPS? > >pERHAPPS THIS INFORMATION COULD BE OF INTEREST TO THE >GROUP > >SALUDOS > >ROGER in Mexico > >Signal analyzer sets new performance/cost standard in >signal analysis > >Fast, Low-Cost Signal Analyzer >Claimed to make signal measurements 3◊ faster than >competitive models, an economy-model signal analyzer >targets design troubleshooting, complex signal >analysis, and productivity gains. The analyzer uses >vector signal analysis software to perform a wide >range of measurements in an open Window XP >Professional OS. Functions can be accessed with a USB >keyboard/mouse and on the front panel > >Santa Clara, Calif. - Agilent Technologies Inc. says >its EXA signal analyzer is the industry's fastest >economy-class signal analyzer, providing engineers >with the capabilities to troubleshoot new designs, >increase manufacturing throughput, or analyze complex >and time-varying signals. >At a lower performance point than Agilent's MXA signal >analyzer, the EXA integrates the same broad range of >standards-based measurements with Agilent's 89600 >vector signal analysis (VSA) software in a single >instrument. In addition to the use of an open Windows >XP Professional operating system, the EXA also >provides an advanced signal analysis user interface. >All measurement features and functions are intuitively >grouped and accessible from the front panel or via a >USB keyboard and mouse. >The EXA signal analyzer supports multiple frequency >ranges from 9 kHz to 3.6, 7.0, 13.6 and 26.5 GHz, an >internal fully calibrated pre-amplifier option up to >3.6 GHz, and standard analysis bandwidths of 10 MHz. >This fully scalable functionality is complemented by >EXA's +13 dBm third-order intercept, -146 dBm/Hz >displayed average noise level (without pre-amp) and 66 >dB W-CDMA ACLR dynamic range, as well as 0.4 dB total >absolute amplitude accuracy, which is made possible by >the all-digital, 14-bit ADC IF section. The dynamic >range is maximized with an optional 2 dB mechanical >step attenuator over the full frequency range and for >manufacturing offers an optional 1 dB electronic >attenuator to 3.6 GHz. >Agilent said a breakthrough characteristic of the >Agilent EXA is its intrinsic speed, unprecedented for >an economy signal analyzer, which allows measurements >up to 300 percent faster than other economy-class >signal analyzers. The EXA returns a marker peak search >result in less than 5 ms, local updates in less than >10 ms, and remote sweep and transfer (via GPIB) in >less than 12 ms. Measurement mode switching speeds are >typically less than 75 ms. This speed enables a fast >and seamless change between WiMAX, W-CDMA, >HSDPA/HSUPA, GSM/EDGE, phase noise measurements, and >89600 VSA software. >Optional measurement application software provides >preconfigured test routines for GSM/EDGE, 802.16e >Mobile WiMAX, W-CDMA, HSDPA/HSUPA, and phase-noise >applications. Running the Agilent 89600 VSA software >application in the EXA enables advanced signal >demodulation analysis and troubleshooting of more than >50 demodulation formats including 2G, 3G, 3.5G, WiMAX, >WLAN and Private Mobile Radio. >The EXA also includes a comprehensive set of standard >one-button-power measurements for characterizing >signal quality. These include ACPR, Channel Power, >Occupied Bandwidth, Spectrum Emissions Mask, CCDF, >Burst Power and Spurious Emission. It's fully >compliant with the LXI Class-C specification. >Connectivity is possible via 100 based-T LAN, GPIB and >seven USB 2.0 ports. >Pricing: >. N9010A-503 (Frequency Range, 9 kHz to 3.6 GHz): >$16,900 >. N9010A-507 (Frequency Range, 9 kHz to 7.0 GHz): >$25,900 >. N9010A-513 (Frequency Range, 9 kHz to 13.6 GHz): >$30,900 >. N9010A-526 (Frequency Range, 9 kHz to 26.5 GHz): >$35,900 >. N9010A- FSA (Fine step attenuator): $1,000 >. N9010A-PFR (Precision Frequency Reference): $2,000 >. N9010A-EA3 (Electronic Attenuator, 3.6 GHz): $3,000 >. N9010A-P03 (Preamplifier, 3.6 GHz): $1,500 >. N9010A-CPU (Instrument Security, additional >CPU/HDD): $4,000 >. N9068A (Phase Noise Measurement Application): $4,700 > >. N9071A (GSM/EDGE Measurement Application): $6,000 >. N9073A-1FP (W-CDMA Measurement Application): $7,400 >. N9073A-2FP (HSDPA/HSUPA Measurement Application): >$4,300 >. N9075A (802.16 OFDMA Measurement Application): >$10,000 >. 89601A (Vector Signal Analysis software -89600): >$10,100 > >Product information: N9019A >Agilent Technologies Inc., 1-800-829-4444, item number >8155, www.agilent.com > > >__________________________________________________ >Do You Yahoo!? >Tired of spam? Yahoo! Mail has the best spam protection around >http://mail.yahoo.com > > ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- X-Symantec-TimeoutProtection: 0 X-Symantec-TimeoutProtection: 1 Received: from [172.28.128.26] ([172.28.128.26]:46783 "EHLO ip03.ams.ftl.affinity.com") by ams006.ftl.affinity.com with ESMTP id S2434174AbXKFRE1; Tue, 6 Nov 2007 12:04:27 -0500 Received: from wr-out-0708.google.com ([64.233.184.242]) by ip03.ams.ftl.affinity.com with ESMTP; 06 Nov 2007 12:01:47 -0500 Received: by wr-out-0708.google.com with SMTP id 28so4740877wra for ; Tue, 06 Nov 2007 09:01:46 -0800 (PST) Received: by 10.35.102.18 with SMTP id e18mr5683137pym.1194368308659; Tue, 06 Nov 2007 08:58:28 -0800 (PST) Received: by 10.106.220.37 with SMTP id s37gr2099prg; Tue, 06 Nov 2007 08:58:23 -0800 (PST) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.145.2 with SMTP id s2mr23554823nzd.1194368302581; Tue, 06 Nov 2007 08:58:22 -0800 (PST) Received: from lvs00-fl-swip005.ftl.affinity.com (lvs00-fl-swip005.ftl.affinity.com [216.219.253.15]) by mx.google.com with ESMTP id y6si4140483nzg.2007.11.06.08.57.50; Tue, 06 Nov 2007 08:58:22 -0800 (PST) Received-SPF: neutral (google.com: 216.219.253.15 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.15; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.15 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [70.22.251.121] ([70.22.251.121]:8201 "EHLO Raphael.tscm.com") by swip005.ftl.affinity.com with ESMTP id S474580AbXKFQ5t (ORCPT ); Tue, 6 Nov 2007 11:57:49 -0500 Message-Id: <7.0.1.0.2.20071106114636.17825268@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Tue, 06 Nov 2007 11:52:37 -0500 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] {2099} JENKEM Warning Mime-Version: 1.0 Content-Type: multipart/related; boundary="=====================_52134734==.REL" Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,
<snicker>

It's a bit of a hoax, but it shows just how far an "Intelligence Bulletin" will go.

-jma


Emacs!

----------------------------------------------------------------------------------------------------
  World Class, Professional, Ethical, and Competent Bug Sweeps, and
Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
----------------------------------------------------------------------------------------------------
 James M. Atkinson                              Phone:  (978) 381-9111
 Granite Island Group                          Fax:     
 127 Eastern Avenue #291                 Web:    http://www.tscm.com/
 Gloucester, MA 01931-8008              E-mail:  mailto:jmatk@tscm.com
----------------------------------------------------------------------------------------------------
 We perform bug sweeps like it's a full contact sport, we take no prisoners,
and we give no quarter. Our goal is to simply, and completely stop the spy.
----------------------------------------------------------------------------------------------------


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Embedded Content: 317d6241.jpg: 00000001,6e74714b,00000000,00000000Received: from [172.28.128.27] ([172.28.128.27]:27243 "EHLO ip04.ams.ftl.affinity.com") by ams022.ftl.affinity.com with ESMTP id S430967AbXKIAmY; Thu, 8 Nov 2007 19:42:24 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAKc7M0dC+VynmGdsb2JhbACCPDeFPIZSAQEBAQcEBieBEQE Received: from ug-out-1516.google.com ([66.249.92.167]) by ip04.ams.ftl.affinity.com with ESMTP; 08 Nov 2007 19:42:22 -0500 Received: by ug-out-1516.google.com with SMTP id g23so164126uge for ; Thu, 08 Nov 2007 16:42:21 -0800 (PST) Received: by 10.86.9.8 with SMTP id 8mr11030fgi.1194568305833; Thu, 08 Nov 2007 16:31:45 -0800 (PST) Received: by 10.107.106.6 with SMTP id i6gr2100prm; Thu, 08 Nov 2007 16:31:34 -0800 (PST) X-Sender: toofastevo@yahoo.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.16.7 with SMTP id t7mr2083645pyi.1194563710185; Thu, 08 Nov 2007 15:15:10 -0800 (PST) Received: from web58804.mail.re1.yahoo.com (web58804.mail.re1.yahoo.com [66.196.100.218]) by mx.google.com with SMTP id x46si7948627pyg.2007.11.08.15.15.09; Thu, 08 Nov 2007 15:15:10 -0800 (PST) Received-SPF: pass (google.com: domain of toofastevo@yahoo.com designates 66.196.100.218 as permitted sender) client-ip=66.196.100.218; DomainKey-Status: good (test mode) Authentication-Results: mx.google.com; spf=pass (google.com: domain of toofastevo@yahoo.com designates 66.196.100.218 as permitted sender) smtp.mail=toofastevo@yahoo.com; domainkeys=pass (test mode) header.From=toofastevo@yahoo.com Received: (qmail 59766 invoked by uid 60001); 8 Nov 2007 23:15:09 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID; b=G8TQo9AuUPC9FKFrRH2P3eVrKOEck7l7WNjhfVbaWMyyveCOFAzSoQRirmgu4bL1BYVEiN1Uxs2wxQJDRd48nGS2YH10AsHEVcA2ecb4fO/jhhlmW5UKeU69XDrmYoAMmqNVc5QWKV3DQV7rgfKpVKmRCbtIog27o+gPvCbOhoo=; X-YMail-OSG: W0n_lRAVM1nHts03OiO9_P8XzGo8lOzOq6HGajVnCJMG6keH4TpexN4hwOxXcHfXeBFVxH77DJnwxAuwyhcaLvtQZHGMR4UH.C6aEACDZkDoooyqJk21ZyU6_Jwj6Rw- Received: from [67.168.96.160] by web58804.mail.re1.yahoo.com via HTTP; Thu, 08 Nov 2007 15:15:08 PST Date: Thu, 8 Nov 2007 15:15:08 -0800 (PST) From: Julie White Subject: [TSCM-L] {2100} Re: The "P-Levels" - Draft Version, Please comment To: TSCM-L2006@googlegroups.com In-Reply-To: <1193958868.957908.16130@i13g2000prf.googlegroups.com> Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="0-488206256-1194563708=:58701" Message-ID: <951416.58701.qm@web58804.mail.re1.yahoo.com> X-Google-Approved: grainger01982@gmail.com via web at 2007-11-09 00:31:31 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , I am a single mom in desperate need of HELP. And cant get the police to help or any one else unless you have lots of money.This is criminal itsself...I am being stalked by my X he is using electroncs and only god knows what but this is unreal!He has something in my bathroom and shower around all the windows in my home so i can hear him degrade me and humiliate me only when noone is around.Now every one thinks i am crazy and cant get any help as it has kept me from working for so long i have almost lost every thing i own even my 1999 harley davidson that i refuse to part with.This would make his day and this is what he wants...PLEASE, Does anyone do pro bono sweeps in the puyallup, wa area.This could make a perfect movie I swear.ITS BEEN AN ONGOING NIGHTMARE>>>JULIE   toofastevo@yahoo.com   If ypu can even get me an e-mail as he deletes them usually.My cell # is253-205-5721.PLEASE HELP.YOU WOULD BE RITCH IN SURVAILENCE EQUIPTMENT>>>>I PROMISE.

TSCM <aar9sm@hotmail.com> wrote:


James,

Good job! Is well written with a lot of thought and detail involved
very nice guide.thank you!!

Mike

On Oct 30, 8:28 pm, "James M. Atkinson" wrote:
> The following "Applicant Questionares" is going
> live on my website on Wednesday night, and I
> drastically need a couple of you to read it over
> and see if there is anything that needs to be corrected or explained better.
>
> Many Thanks,
>
> -jma
>
> Recommended Gold List Questions
> Levels of TSCM Legitimacy - The "P-Levels"
>
> The following is a list of private TSCM firms who
> specialize in "bug sweeps" and wiretap detection
> and who have legitimate TSCM training,
> credentials, and equipment (and are very well respected within the industry).
>
> While most TSCM specialists are available for
> travel outside of a specific geographic area they
> tend to avoid such engagements, or will limited
> the services to vulnerability analysis,
> pre-construction assistance, non-instrumented
> inspections, simple RF checks, in-place
> monitoring, or limited TSCM services involving
> only a briefcase sized in-place monitoring system
> (such as a single spectrum analyzer, MSS, Eagle,
> ScanLock OSCOR, SPECTRE, ROSE, RAPHAEL, or similar system).
>
> These private TSCM firms tend to operate in a
> specific geographic area limited to a few hundred
> miles (usually within a eight to twelve hour, one
> day vehicle drive). However, all of the TSCM
> firms listed here are available for travel
> anywhere in the United States or the World on
> short notice, but only provide limited services
> when operating outside of their normal coverage
> area. These coverage area limitations is due to
> the logistics involved in transporting hundreds
> and often thousands of pounds of sophisticated,
> highly sensitive laboratory grade electronic
> instruments, equipment and tools. Bug sweeps and
> wiretap detection involves the use of ladders,
> pole climbing equipment, LAN analyzers, X-ray
> systems, specialized antennas and other
> equipment, which is not easily, transported by
> airplane or by any method other then trucks. In a
> few cases, the TSCM specialist can respond to any
> location within a 2 or 3-day drive with a truck
> which contains an entire mobile electronics laboratory.
>
> TSCM firms also tend to restrict their operations
> to a specific geographic area to facilitate an
> expert level of knowledge regarding the RF
> environment, construction methods used, community
> zoning, population demographics, civil
> engineering, aeronautic or maritime facilities,
> local military bases, and related areas.
> Knowledge of such regional information is
> critical for a successful TSCM project. The TSCM
> specialist must also have an intimate knowledge
> of the telephone systems, engineering methods,
> fiber optics, major cable locations, central
> office switches, test numbers, and related
> communications infrastructure present or being
> used in an area (which tends to be regional).
>
> An understanding of what types of eavesdropping
> devices, methods, and frequencies which are being
> used in an area is also important, as is
> knowledge of what type of surveillance equipment
> is being sold within that region (and other
> areas). The TSCM Procedural and Protocols Guides
> used by a specialist also tend to be based on
> specific issues and variables present in that
> specific geographic area. On a more interesting
> note, many of these firms are located in, or near
> major maritime port cities or population centers.
> The heaviest concentrations are around major
> cities on the East and West coasts with a very
> limited presence in the Mid-West, Great Plains,
> and Rockies. If you were in the Mid-West, Great
> Plains, or Rockies area you would need to engage
> a TSCM firm from one of the major port cities.
> For example, customers in Chicago, St. Louis,
> Memphis, Denver, Salt Lake City, Minneapolis,
> Billings, etc. would need to fly a TSCM
> specialist in from Boston, New York, Washington
> DC, Los Angles, Lexington, or Seattle.
>
> Please be patient when contacting any TSCM firm,
> as if they are out serving a client they may not
> be able to return your call for several hours.
> Rates generally are non-negotiable and reflect
> the cost of the sweep practitioner's time,
> considerable investment in equipment acquisition
> and maintenance, several weeks of in-service
> training a year, travel, administrative and
> communications time and expense to coordinate the
> sweep and written report, and a fair profit for
> their services. It is very unwise to shop for
> sweeps by using price as a criterion as it only
> invites being ripped off. Legitimate TSCM
> professionals are not interested in, nor will
> they engage in negotiating for a lower price.
> When you contact persons on this list, you are
> talking with someone in the same league as an
> attorney or surgeon, not a salesman. In fact,
> most of the people listed on this page have more
> time in their specialized training than do most
> attorneys or medical professionals. Anything
> beyond an initial 15-minute phone call usually
> will be billable time. Attorneys and doctors do
> not consult free, and neither do legitimate TSCM
> specialists. If a potential client calls with a
> long list of questions not pertaining directly to
> hiring the practitioner, or wants to know how to
> do his own sweep, or wants to know how to use the
> sweep kit he purchased on his own, expect to pay
> an hourly rate or $250 in advance for consulting
> services. If you are considering engaging (or
> have already engaged) a TSCM firm and they are
> not listed in the following directory you would
> do well to immediately ask some awkward
> questions. It is also important you understand
> that legitimate services by a competent TSCM firm
> rarely start at less then several thousand
> dollars for even a basic sweep, and a proper
> sweep take days, not hours to complete. Keep in
> mind that there only a small number of legitimate
> and competent TSCM counterintelligence
> specialists or "Bug Sweepers" in the U.S. private
> sector. Legitimate TSCM firms are in very high
> demand, hard to find, and expensive; so be
> patient when trying to find one to help you. In
> addition, TSCM firms are not attorneys and cannot
> tell you whether it is legal or illegal for you
> to monitor your own phones. Always call a
> competent licensed attorney for legal advice.
>
> Magic Formula
> Technical Background - Cube this
> Formal Technical Training (1200 hours, every 5 years) - Square This
> Equipment and Tools - Cube This
> Basic Equipment/Tools
> Intermediate Equipment/Tools
> Advanced Equipment/Tools
> Vehicles (halve this)
> Basic Vehicle
> Intermediate Vehicle
> Advanced Equipment - DOT/CDL
> Honesty and Integrity - Divided by all
>
> Square root of
> (Tech3+TechTraining2+Tools+TestEquipment3+.5Vechiles) /Honesty
>
> You use the list like this. You assign each of
> the P-Levels a score between negative numbers and
> positive ten, essentially adding or subtracting
> points up to ten either way depending on how each
> of the attribute apply to the person you are
> talking to. In a few cases, you can subtract more
> then ten points for issues that provide areas of significant concern.
>
> You would hope that the person or company you are
> considering performing a TSCM project would
> attain a perfect score as that means the person
> is very legitimate and professional and that you
> feel that none of the negative attributes or
> levels apply to them, but in reality such, a
> score is impractical. Nobody is perfect, and
> anybody who appears to be perfect should
> certainly be viewed with caution and a healthy dose of skepticism.
>
> Professional - A true blue, died in the wool
> security expert with years of RELEVANT experience
> and background in their specific area of
> expertise. He will "walk the walk and talk the
> talk", and have the scars to prove it. This
> person will own all the necessary equipment,
> hundred of books (some of which he wrote or
> contributed to), a large number of original web
> pages or white papers on the subject. He (or she)
> will seek to illuminate the subject matter, and
> will be able to explain very complex topics in
> terms the non-technical public or layman can
> understand and is comfortable is discussing the
> matter without pushing their services too much
> (they let you come to them, and never gets
> pushy). If they are very professional they get
> +10 points, if they seem a little rough around
> the edges give them +7, but start dropping points
> as you get more uncomfortable with their
> professionalism. If they are rough around the
> edges, or just a little too pushy to get your
> business then award them zero points, and if they
> really get pushy or seem desperate for your
> business then start subtracting points quickly.
>
> Pretender - Similar to the above professional but
> has irrelevant or bogus credentials. They may
> talk the talk, but cannot walk the walk (nor have
> the scars). Will talk a good game, but generally
> lacks legitimate equipment, materials, or
> training. He often has not written a book but
> will often plagiarize others (and claim it as his
> own work). If the "pretender" has an online
> presence or web page, it is full of hype,
> rhetoric, and paranoia (but little science). He
> is quite capable of totally baffling customers,
> but cannot explain things in a non-technical way
> (or without hyping surveillance technology to
> death). In this case you start by awarding them
> -10 points, and as they convince you that they
> are legitimate you slowly start adding points up
> to as much as a +10 points. Very often the
> pretender will be someone who retired from
> government service with honorable service, but
> who lacks the technical background to perform a
> competent sweep, and thus pretend to know what
> they are doing. In many cases, the pretender
> actually has themselves convinced that they can
> do a good job, but sometimes their inabilities
> lead then into the next category.
>
> Putz - This is nothing more then a buffoon.
> Generally he does not know how to do the job, has
> virtually no equipment, training, or resources
> (but tries hard). He may or may not be honest,
> and may actually believe that he is competent. He
> may have a few technical toys, and may have a
> week or two of training in electronics,
> surveillance, and security (all in one). In this
> case, you start by awarding them -10 points, and
> as they convince you that they are not a putz you
> slowly start adding points up to as much as a +10 points.
>
> Parasite - This type leaches off of the
> credibility of others, generally has no
> expertise, knowledge, or training of their own in
> what they are offering. Usually someone like this
> walks and talks like a salesman, and they love to
> run their mouth about all the people they know.
> Name-dropping is an art form to the parasite. The
> parasite may be detected by the way they rattle
> off a list of references, customers, or contacts
> before anybody has really asked for them. He will
> usually be desperate to prove to you how
> legitimate he is right from the very beginning of
> your contact with them. You start them with zero
> points, and gain or loose points as you feel
> appropriate. The parasite is the consummate
> salesmen, but not an actual sweep person. One
> rule of the TSCM profession is that you never
> talk about your customers, so someone who is
> trying to impress you with who they know or is
> name-dropping is a parasite who is trying to
> impress you, and in turn, you should not trust
> them, and score the parasite accordingly. Start
> with awarding zero points, and each time they
> name drop or mention a company name with whom
> they have performed sweep work subtract 3 points,
> up to 30 points. If on the other hand the TSCM
> expert does not mention his customers award 3
> points, then ask for references, and then when he
> declines to provide references award 3 more
> points (or if they give you references subtract 6
> points). Next, you want to aggressively pressure
> them for client names, and for references, and
> then if at this point (under pressure) they keep
> their mouth shut you add 6 points, or if they
> give in and breach their client privacy, you
> subtract 6 points. There is nothing wrong with
> being involved in sales, but in the TSCM
> business, a "sales push" or pushing to close the transaction is a liability.
>
> Predator - This type is pure evil and the only
> reason they are involved in security is to
> victimize the customer. The predator is only
> interested in backstabbing, theft, betrayal, or
> harming the client in a serious way. The only
> reason this type of person is involved in TSCM or
> the security industry is to ferret out their
> customers secrets so they can be exploited for
> scams or for criminal purposes. If this person
> gives you even the slightest hint of being, a
> criminal hit them with -100 points and let them
> work their way out of it. Now, do not confuse
> someone who hunts spies for a living for someone
> who performs eavesdropping for a living, or
> someone who is a professional criminal who preys
> upon his client. A true TSCM expert is hunting
> spies and bugs, and is not preying off their
> client, they do not hunt the spy directly, but
> rather hunt the spies' technical toys (it is a
> subtle, but important difference).
>
> Poison - He has nothing good to say about anybody
> except himself and his associates and tends to be
> bitter against everybody around him. When
> questioned about his own credentials he will lash
> out at his competitors with personal attacks
> (instead of discussing his own credentials). This
> type is easily identified after five minutes of
> talking, and they have not said one thing
> specifically regarding their own merit,
> equipment, or credentials. It is easy to figure
> this one out and to award or subtract points
> either way. If this person only slightly lashes
> out against others it may be that, he has a
> backbone, but is not actually toxic. Be careful
> here and only subtract points if this person is
> hardcore in his angst and bitterness. Hint: Most
> TSCM folks have a strong moral backbone, and have
> a strong sense of fairness and of what are right
> and wrong. Most TSCM professionals will be
> strongly biased against eavesdroppers, felons, or
> wrong doers, and this bias should result in
> points being awarded as you discuss just "how
> white his hat is". On the other hand, if the TSCM
> expert is bitter against others, but cannot
> specifically tell you why, then you should
> subtract points. Also, be wary of any TSCM expert
> who is overly complementary towards other people
> as this may indicate a potential parasite.
>
> Puffer Fish - Typically, he has little or no
> credentials of his own, but knows all of the
> industry lingo and jargon. He will claim to be
> the president of a huge corporation with scores
> of employees, tens of millions in assets when in
> fact this type is a penniless mooch who is still
> living with their parents. If not living with his
> parents his (or her) spouse will be the primary
> breadwinner in the family, their primary income
> (and references) will be from close friends or
> family. Listen very carefully for any hint as to
> where the seed money came from for them to start
> their business, as you may find that a rich
> family member bought them the equipment and has
> been subsidizing their TSCM activities. Often
> this type is also a pretender and bumbling putz.
> Listen for any hint of grandiosity or of what
> this person is going to do in the future, versus
> what they have actually done in the past. Dream
> and aspirations are important; delusions and
> illusions are not and should be graded accordingly.
>
> Psychiatrist Bait - These people are really
> nothing more then con artists who will ramble on
> for hours with wild tales of how they were a Navy
> SEAL, covert CIA operative, undercover FBI agent,
> won the Congressional Medal of Honor, was a POW,
> won the war, and so on. They could tell you about
> their credentials, but then they would have to
> kill you. Often they will offer credentials,
> which at first appear real, but cannot be
> confirmed, or is suspect in another way. They
> will offer credentials that cannot be verified by
> their own admission. "It's too secret" Ask
> questions, get specific answers, grade as you
> feel is appropriate. However, step carefully, as
> many TSCM people will not discuss a great deal of
> their background initially, so this level should
> be considered in regards to initial contact. If
> the person sounds and talks a little crazy
> initially then subtract points, but if they seem
> sane and coherent then add points. Do not get too
> carried away on this issue though. Always
> remember that the TSCM person is grading you as a
> customer as well, and may not be too keen on
> disclosing too much about their background until
> they get to know you better, so this is a two way street.
>
> Phelons (or Felon) - This group is a real problem
> within the security business. Many con artists,
> felons, and dirt-bags try to capitalize on their
> criminal skills by claiming to be able to catch
> other criminals. Usually their only credential
> (which can be verified) is the criminal
> conviction. Often this type will claim to be a
> convicted hacker and computer expert when in fact
> he was convicted of arson, or of being a drug
> dealer, is a psychiatric patient, and is
> incapable of recovering his own hard drive or of
> performing the most simplistic of technical
> tasks. The few cases where the conviction was
> relevant to their field will not set your mind at
> ease about their now "reformed" status. Now this
> gets a tricky because if you become reasonably
> convinced that you are talking to a felon (or
> they brag of their crimes) you need to subtract
> 50 points, and not consider dealing with them
> unless there is some overwhelming reason to do
> so. If the person was involved in a crime that
> did not involve moral turpitude or violence
> (i.e.: drunk driving, disorderly conduct, etc)
> then perhaps subtract only 15 points. Now, on the
> other hand if the TSCM appears to be a good
> citizen, with no criminal histories then they get only a positive 10 points.
>
> Paranoids - Usually has knowledge of security
> because of an anti-establishment, paranoid or
> criminal mind-set, which compels them to
> constantly look over their shoulder. Of course,
> the government is constantly harassing them, has
> their phones taped, has video cameras in their
> house, and has legions of agents employed just to
> harass them specifically. They will sometimes
> rant on about government mind control, biological
> implants, electronic harassment, and so on. In
> some cases they have written books or articles,
> but the materials is published only in very
> narrow channels, or by paramilitary or fringe
> publishers. Very often, they will hear voices in
> their head, and/or be able to convince other that
> they too are hearing voices or seeing visions. If
> they are hearing voices, seeing visions, or claim
> to have any kind, of "special powers", you should
> subtract 30 or more points. If they seem like a
> normal and rational person they get zero points,
> but if they are "professionally cautious" add a
> few positive points as TSCM experts operate in a
> world where they assume that a place is bugged
> until scientifically proven otherwise, they are
> not paranoid, but more accurately are in touch
> with the eavesdropping threat. To be awarded +10
> point the TSCM expert should be cautious,
> careful, and delicate with the project, but
> should not act "crazy", and should make you feel more secure, and not fearful.
>
> Police - When a TSCM expert enters the
> profession, they hopefully come with a multitude
> of prior experience, some have a technical
> background, and some have little or no technical
> background. Sadly, there are quite a few retired
> or fired members of the law enforcement or
> intelligence community who try their hands at

=== message truncated ===

__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.27] ([172.28.128.27]:5850 "EHLO ip04.ams.ftl.affinity.com") by ams020.ftl.affinity.com with ESMTP id S381902AbXKIPGe; Fri, 9 Nov 2007 10:06:34 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAANoGNEdA6aL4kGdsb2JhbACIMIVbeAIBAQcEBhERBYERAQ Received: from nz-out-0708.google.com ([64.233.162.248]) by ip04.ams.ftl.affinity.com with ESMTP; 09 Nov 2007 10:06:22 -0500 Received: by nz-out-0708.google.com with SMTP id q60so144907nzb for ; Fri, 09 Nov 2007 07:06:21 -0800 (PST) Received: by 10.86.99.9 with SMTP id w9mr99308fgb.1194620771661; Fri, 09 Nov 2007 07:06:11 -0800 (PST) Received: by 10.106.179.39 with SMTP id b39gr2101prf; Fri, 09 Nov 2007 07:06:07 -0800 (PST) X-Sender: SRS0=wK+g9M=QC=comcast.net=edmichaels@srs.bis.na.blackberry.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.16.7 with SMTP id t7mr3552764pyi.1194620765906; Fri, 09 Nov 2007 07:06:05 -0800 (PST) Received: from smtp05.bis.na.blackberry.com (smtp05.bis.na.blackberry.com [216.9.248.52]) by mx.google.com with ESMTP id h49si5625483nzf.2007.11.09.07.06.05; Fri, 09 Nov 2007 07:06:05 -0800 (PST) Received-SPF: pass (google.com: domain of SRS0=wK+g9M=QC=comcast.net=edmichaels@srs.bis.na.blackberry.com designates 216.9.248.52 as permitted sender) client-ip=216.9.248.52; Authentication-Results: mx.google.com; spf=pass (google.com: domain of SRS0=wK+g9M=QC=comcast.net=edmichaels@srs.bis.na.blackberry.com designates 216.9.248.52 as permitted sender) smtp.mail=SRS0=wK+g9M=QC=comcast.net=edmichaels@srs.bis.na.blackberry.com Received: from bxe115.bisx.prod.on.blackberry (bxe115.bisx.prod.on.blackberry [172.20.225.144]) by srs.bis.na.blackberry.com (8.13.7 TEAMON/8.13.7) with ESMTP id lA9ExDY7002182; Fri, 9 Nov 2007 15:06:04 GMT X-rim-org-msg-ref-id: 408365798 Message-ID: <408365798-1194620764-cardhu_decombobulator_blackberry.rim.net-2106894412-@bxe115.bisx.prod.on.blackberry> Mime-Version: 1.0 Content-Type: text/plain; charset=windows-1252 Reply-To: TSCM-L2006@googlegroups.com X-Priority: Normal References: <1193958868.957908.16130@i13g2000prf.googlegroups.com><951416.58701.qm@web58804.mail.re1.yahoo.com> In-Reply-To: <951416.58701.qm@web58804.mail.re1.yahoo.com> Sensitivity: Normal Importance: Normal To: TSCM-L2006@googlegroups.com, "James M. Atkinson" Subject: [TSCM-L] {2101} CRAZY TIN HATTERS Was Re: [TSCM-L] {2100} Re: The "P-Levels" - Draft Version, Please comment From: edmichaels@comcast.net Date: Fri, 9 Nov 2007 15:06:23 +0000 Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , How do these folks post on the list? I thought Jim screened all members and one had to be an approved member from an approved e-mail address to post? Sent from my Verizon Wireless BlackBerry -----Original Message----- From: Julie White Date: Thu, 8 Nov 2007 15:15:08 To:TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2100} Re: The "P-Levels" - Draft Version, Please comment I am a single mom in desperate need of HELP. And cant get the police to help or any one else unless you have lots of money.This is criminal itsself...I am being stalked by my X he is using electroncs and only god knows what but this is unreal!He has something in my bathroom and shower around all the windows in my home so i can hear him degrade me and humiliate me only when noone is around.Now every one thinks i am crazy and cant get any help as it has kept me from working for so long i have almost lost every thing i own even my 1999 harley davidson that i refuse to part with.This would make his day and this is what he wants...PLEASE, Does anyone do pro bono sweeps in the puyallup, wa area.This could make a perfect movie I swear.ITS BEEN AN ONGOING NIGHTMARE>>>JULIE†† toofastevo@yahoo.com †† If ypu can even get me an e-mail as he deletes them usually.My†cell # is253-205-5721.PLEASE HELP.YOU WOULD BE RITCH IN SURVAILENCE EQUIPTMENT>>>>I PROMISE. TSCM wrote: James, Good job! Is well written with a lot of thought and detail involved very nice guide.thank you!! Mike On Oct 30, 8:28 pm, "James M. Atkinson" wrote: > The following "Applicant Questionares" is going > live on my website on Wednesday night, and I > drastically need a couple of you to read it over > and see if there is anything that needs to be corrected or explained better. > > Many Thanks, > > -jma > > Recommended Gold List Questions > Levels of TSCM Legitimacy - The "P-Levels" > > The following is a list of private TSCM firms who > specialize in "bug sweeps" and wiretap detection > and who have legitimate TSCM training, > credentials, and equipment (and are very well respected within the industry). > > While most TSCM specialists are available for > travel outside of a specific geographic area they > tend to avoid such engagements, or will limited > the services to vulnerability analysis, > pre-construction assistance, non-instrumented > inspections, simple RF checks, in-place > monitoring, or limited TSCM services involving > only a briefcase sized in-place monitoring system > (such as a single spectrum analyzer, MSS, Eagle, > ScanLock OSCOR, SPECTRE, ROSE, RAPHAEL, or similar system). > > These private TSCM firms tend to operate in a > specific geographic area limited to a few hundred > miles (usually within a eight to twelve hour, one > day vehicle drive). However, all of the TSCM > firms listed here are available for travel > anywhere in the United States or the World on > short notice, but only provide limited services > when operating outside of their normal coverage > area. These coverage area limitations is due to > the logistics involved in transporting hundreds > and often thousands of pounds of sophisticated, > highly sensitive laboratory grade electronic > instruments, equipment and tools. Bug sweeps and > wiretap detection involves the use of ladders, > pole climbing equipment, LAN analyzers, X-ray > systems, specialized antennas and other > equipment, which is not easily, transported by > airplane or by any method other then trucks. In a > few cases, the TSCM specialist can respond to any > location within a 2 or 3-day drive with a truck > which contains an entire mobile electronics laboratory. > > TSCM firms also tend to restrict their operations > to a specific geographic area to facilitate an > expert level of knowledge regarding the RF > environment, construction methods used, community > zoning, population demographics, civil > engineering, aeronautic or maritime facilities, > local military bases, and related areas. > Knowledge of such regional information is > critical for a successful TSCM project. The TSCM > specialist must also have an intimate knowledge > of the telephone systems, engineering methods, > fiber optics, major cable locations, central > office switches, test numbers, and related > communications infrastructure present or being > used in an area (which tends to be regional). > > An understanding of what types of eavesdropping > devices, methods, and frequencies which are being > used in an area is also important, as is > knowledge of what type of surveillance equipment > is being sold within that region (and other > areas). The TSCM Procedural and Protocols Guides > used by a specialist also tend to be based on > specific issues and variables present in that > specific geographic area. On a more interesting > note, many of these firms are located in, or near > major maritime port cities or population centers. > The heaviest concentrations are around major > cities on the East and West coasts with a very > limited presence in the Mid-West, Great Plains, > and Rockies. If you were in the Mid-West, Great > Plains, or Rockies area you would need to engage > a TSCM firm from one of the major port cities. > For example, customers in Chicago, St. Louis, > Memphis, Denver, Salt Lake City, Minneapolis, > Billings, etc. would need to fly a TSCM > specialist in from Boston, New York, Washington > DC, Los Angles, Lexington, or Seattle. > > Please be patient when contacting any TSCM firm, > as if they are out serving a client they may not > be able to return your call for several hours. > Rates generally are non-negotiable and reflect > the cost of the sweep practitioner's time, > considerable investment in equipment acquisition > and maintenance, several weeks of in-service > training a year, travel, administrative and > communications time and expense to coordinate the > sweep and written report, and a fair profit for > their services. It is very unwise to shop for > sweeps by using price as a criterion as it only > invites being ripped off. Legitimate TSCM > professionals are not interested in, nor will > they engage in negotiating for a lower price. > When you contact persons on this list, you are > talking with someone in the same league as an > attorney or surgeon, not a salesman. In fact, > most of the people listed on this page have more > time in their specialized training than do most > attorneys or medical professionals. Anything > beyond an initial 15-minute phone call usually > will be billable time. Attorneys and doctors do > not consult free, and neither do legitimate TSCM > specialists. If a potential client calls with a > long list of questions not pertaining directly to > hiring the practitioner, or wants to know how to > do his own sweep, or wants to know how to use the > sweep kit he purchased on his own, expect to pay > an hourly rate or $250 in advance for consulting > services. If you are considering engaging (or > have already engaged) a TSCM firm and they are > not listed in the following directory you would > do well to immediately ask some awkward > questions. It is also important you understand > that legitimate services by a competent TSCM firm > rarely start at less then several thousand > dollars for even a basic sweep, and a proper > sweep take days, not hours to complete. Keep in > mind that there only a small number of legitimate > and competent TSCM counterintelligence > specialists or "Bug Sweepers" in the U.S. private > sector. Legitimate TSCM firms are in very high > demand, hard to find, and expensive; so be > patient when trying to find one to help you. In > addition, TSCM firms are not attorneys and cannot > tell you whether it is legal or illegal for you > to monitor your own phones. Always call a > competent licensed attorney for legal advice. > > Magic Formula > Technical Background - Cube this > Formal Technical Training (1200 hours, every 5 years) - Square This > Equipment and Tools - Cube This > Basic Equipment/Tools > Intermediate Equipment/Tools > Advanced Equipment/Tools > Vehicles (halve this) > Basic Vehicle > Intermediate Vehicle > Advanced Equipment - DOT/CDL > Honesty and Integrity - Divided by all > > Square root of > (Tech3+TechTraining2+Tools+TestEquipment3+.5Vechiles) /Honesty > > You use the list like this. You assign each of > the P-Levels a score between negative numbers and > positive ten, essentially adding or subtracting > points up to ten either way depending on how each > of the attribute apply to the person you are > talking to. In a few cases, you can subtract more > then ten points for issues that provide areas of significant concern. > > You would hope that the person or company you are > considering performing a TSCM project would > attain a perfect score as that means the person > is very legitimate and professional and that you > feel that none of the negative attributes or > levels apply to them, but in reality such, a > score is impractical. Nobody is perfect, and > anybody who appears to be perfect should > certainly be viewed with caution and a healthy dose of skepticism. > > Professional - A true blue, died in the wool > security expert with years of RELEVANT experience > and background in their specific area of > expertise. He will "walk the walk and talk the > talk", and have the scars to prove it. This > person will own all the necessary equipment, > hundred of books (some of which he wrote or > contributed to), a large number of original web > pages or white papers on the subject. He (or she) > will seek to illuminate the subject matter, and > will be able to explain very complex topics in > terms the non-technical public or layman can > understand and is comfortable is discussing the > matter without pushing their services too much > (they let you come to them, and never gets > pushy). If they are very professional they get > +10 points, if they seem a little rough around > the edges give them +7, but start dropping points > as you get more uncomfortable with their > professionalism. If they are rough around the > edges, or just a little too pushy to get your > business then award them zero points, and if they > really get pushy or seem desperate for your > business then start subtracting points quickly. > > Pretender - Similar to the above professional but > has irrelevant or bogus credentials. They may > talk the talk, but cannot walk the walk (nor have > the scars). Will talk a good game, but generally > lacks legitimate equipment, materials, or > training. He often has not written a book but > will often plagiarize others (and claim it as his > own work). If the "pretender" has an online > presence or web page, it is full of hype, > rhetoric, and paranoia (but little science). He > is quite capable of totally baffling customers, > but cannot explain things in a non-technical way > (or without hyping surveillance technology to > death). In this case you start by awarding them > -10 points, and as they convince you that they > are legitimate you slowly start adding points up > to as much as a +10 points. Very often the > pretender will be someone who retired from > government service with honorable service, but > who lacks the technical background to perform a > competent sweep, and thus pretend to know what > they are doing. In many cases, the pretender > actually has themselves convinced that they can > do a good job, but sometimes their inabilities > lead then into the next category. > > Putz - This is nothing more then a buffoon. > Generally he does not know how to do the job, has > virtually no equipment, training, or resources > (but tries hard). He may or may not be honest, > and may actually believe that he is competent. He > may have a few technical toys, and may have a > week or two of training in electronics, > surveillance, and security (all in one). In this > case, you start by awarding them -10 points, and > as they convince you that they are not a putz you > slowly start adding points up to as much as a +10 points. > > Parasite - This type leaches off of the > credibility of others, generally has no > expertise, knowledge, or training of their own in > what they are offering. Usually someone like this > walks and talks like a salesman, and they love to > run their mouth about all the people they know. > Name-dropping is an art form to the parasite. The > parasite may be detected by the way they rattle > off a list of references, customers, or contacts > before anybody has really asked for them. He will > usually be desperate to prove to you how > legitimate he is right from the very beginning of > your contact with them. You start them with zero > points, and gain or loose points as you feel > appropriate. The parasite is the consummate > salesmen, but not an actual sweep person. One > rule of the TSCM profession is that you never > talk about your customers, so someone who is > trying to impress you with who they know or is > name-dropping is a parasite who is trying to > impress you, and in turn, you should not trust > them, and score the parasite accordingly. Start > with awarding zero points, and each time they > name drop or mention a company name with whom > they have performed sweep work subtract 3 points, > up to 30 points. If on the other hand the TSCM > expert does not mention his customers award 3 > points, then ask for references, and then when he > declines to provide references award 3 more > points (or if they give you references subtract 6 > points). Next, you want to aggressively pressure > them for client names, and for references, and > then if at this point (under pressure) they keep > their mouth shut you add 6 points, or if they > give in and breach their client privacy, you > subtract 6 points. There is nothing wrong with > being involved in sales, but in the TSCM > business, a "sales push" or pushing to close the transaction is a liability. > > Predator - This type is pure evil and the only > reason they are involved in security is to > victimize the customer. The predator is only > interested in backstabbing, theft, betrayal, or > harming the client in a serious way. The only > reason this type of person is involved in TSCM or > the security industry is to ferret out their > customers secrets so they can be exploited for > scams or for criminal purposes. If this person > gives you even the slightest hint of being, a > criminal hit them with -100 points and let them > work their way out of it. Now, do not confuse > someone who hunts spies for a living for someone > who performs eavesdropping for a living, or > someone who is a professional criminal who preys > upon his client. A true TSCM expert is hunting > spies and bugs, and is not preying off their > client, they do not hunt the spy directly, but > rather hunt the spies' technical toys (it is a > subtle, but important difference). > > Poison - He has nothing good to say about anybody > except himself and his associates and tends to be > bitter against everybody around him. When > questioned about his own credentials he will lash > out at his competitors with personal attacks > (instead of discussing his own credentials). This > type is easily identified after five minutes of > talking, and they have not said one thing > specifically regarding their own merit, > equipment, or credentials. It is easy to figure > this one out and to award or subtract points > either way. If this person only slightly lashes > out against others it may be that, he has a > backbone, but is not actually toxic. Be careful > here and only subtract points if this person is > hardcore in his angst and bitterness. Hint: Most > TSCM folks have a strong moral backbone, and have > a strong sense of fairness and of what are right > and wrong. Most TSCM professionals will be > strongly biased against eavesdroppers, felons, or > wrong doers, and this bias should result in > points being awarded as you discuss just "how > white his hat is". On the other hand, if the TSCM > expert is bitter against others, but cannot > specifically tell you why, then you should > subtract points. Also, be wary of any TSCM expert > who is overly complementary towards other people > as this may indicate a potential parasite. > > Puffer Fish - Typically, he has little or no > credentials of his own, but knows all of the > industry lingo and jargon. He will claim to be > the president of a huge corporation with scores > of employees, tens of millions in assets when in > fact this type is a penniless mooch who is still > living with their parents. If not living with his > parents his (or her) spouse will be the primary > breadwinner in the family, their primary income > (and references) will be from close friends or > family. Listen very carefully for any hint as to > where the seed money came from for them to start > their business, as you may find that a rich > family member bought them the equipment and has > been subsidizing their TSCM activities. Often > this type is also a pretender and bumbling putz. > Listen for any hint of grandiosity or of what > this person is going to do in the future, versus > what they have actually done in the past. Dream > and aspirations are important; delusions and > illusions are not and should be graded accordingly. > > Psychiatrist Bait - These people are really > nothing more then con artists who will ramble on > for hours with wild tales of how they were a Navy > SEAL, covert CIA operative, undercover FBI agent, > won the Congressional Medal of Honor, was a POW, > won the war, and so on. They could tell you about > their credentials, but then they would have to > kill you. Often they will offer credentials, > which at first appear real, but cannot be > confirmed, or is suspect in another way. They > will offer credentials that cannot be verified by > their own admission. "It's too secret" Ask > questions, get specific answers, grade as you > feel is appropriate. However, step carefully, as > many TSCM people will not discuss a great deal of > their background initially, so this level should > be considered in regards to initial contact. If > the person sounds and talks a little crazy > initially then subtract points, but if they seem > sane and coherent then add points. Do not get too > carried away on this issue though. Always > remember that the TSCM person is grading you as a > customer as well, and may not be too keen on > disclosing too much about their background until > they get to know you better, so this is a two way street. > > Phelons (or Felon) - This group is a real problem > within the security business. Many con artists, > felons, and dirt-bags try to capitalize on their > criminal skills by claiming to be able to catch > other criminals. Usually their only credential > (which can be verified) is the criminal > conviction. Often this type will claim to be a > convicted hacker and computer expert when in fact > he was convicted of arson, or of being a drug > dealer, is a psychiatric patient, and is > incapable of recovering his own hard drive or of > performing the most simplistic of technical > tasks. The few cases where the conviction was > relevant to their field will not set your mind at > ease about their now "reformed" status. Now this > gets a tricky because if you become reasonably > convinced that you are talking to a felon (or > they brag of their crimes) you need to subtract > 50 points, and not consider dealing with them > unless there is some overwhelming reason to do > so. If the person was involved in a crime that > did not involve moral turpitude or violence > (i.e.: drunk driving, disorderly conduct, etc) > then perhaps subtract only 15 points. Now, on the > other hand if the TSCM appears to be a good > citizen, with no criminal histories then they get only a positive 10 points. > > Paranoids - Usually has knowledge of security > because of an anti-establishment, paranoid or > criminal mind-set, which compels them to > constantly look over their shoulder. Of course, > the government is constantly harassing them, has > their phones taped, has video cameras in their > house, and has legions of agents employed just to > harass them specifically. They will sometimes > rant on about government mind control, biological > implants, electronic harassment, and so on. In > some cases they have written books or articles, > but the materials is published only in very > narrow channels, or by paramilitary or fringe > publishers. Very often, they will hear voices in > their head, and/or be able to convince other that > they too are hearing voices or seeing visions. If > they are hearing voices, seeing visions, or claim > to have any kind, of "special powers", you should > subtract 30 or more points. If they seem like a > normal and rational person they get zero points, > but if they are "professionally cautious" add a > few positive points as TSCM experts operate in a > world where they assume that a place is bugged > until scientifically proven otherwise, they are > not paranoid, but more accurately are in touch > with the eavesdropping threat. To be awarded +10 > point the TSCM expert should be cautious, > careful, and delicate with the project, but > should not act "crazy", and should make you feel more secure, and not fearful. > > Police - When a TSCM expert enters the > profession, they hopefully come with a multitude > of prior experience, some have a technical > background, and some have little or no technical > background. Sadly, there are quite a few retired > or fired members of the law enforcement or > intelligence community who try their hands at === message truncated === __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.25] ([172.28.128.25]:16400 "EHLO ip02.ams.ftl.affinity.com") by ams009.ftl.affinity.com with ESMTP id S1615550AbXKIQxR; Fri, 9 Nov 2007 11:53:17 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAP8eNEdA6aari2dsb2JhbACPAwIBCAIGExEFgRE Received: from py-out-1314.google.com ([64.233.166.171]) by ip02.ams.ftl.affinity.com with ESMTP; 09 Nov 2007 11:53:05 -0500 Received: by py-out-1314.google.com with SMTP id p69so23564545pyb for ; Fri, 09 Nov 2007 08:53:04 -0800 (PST) Received: by 10.35.107.20 with SMTP id j20mr119495pym.1194626534183; Fri, 09 Nov 2007 08:42:14 -0800 (PST) Received: by 10.107.65.8 with SMTP id s8gr2102prk; Fri, 09 Nov 2007 08:42:04 -0800 (PST) X-Sender: counterspy@ureach.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.37.18 with SMTP id p18mr3576534pyj.1194621916803; Fri, 09 Nov 2007 07:25:16 -0800 (PST) Received: from ureach.com (mail32.ureach.com [63.236.74.68]) by mx.google.com with ESMTP id v28si5643444nzb.2007.11.09.07.25.16; Fri, 09 Nov 2007 07:25:16 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of counterspy@ureach.com designates 63.236.74.68 as permitted sender) client-ip=63.236.74.68; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of counterspy@ureach.com designates 63.236.74.68 as permitted sender) smtp.mail=counterspy@ureach.com Received: from www20.ureach.com (www20.ureach.com [172.16.2.48]) by ureach.com (8.13.6/8.13.6) with ESMTP id lA9FPG4u032373 for ; Fri, 9 Nov 2007 10:25:16 -0500 Received: (from nobody@localhost) by www20.ureach.com (8.9.3/8.9.1) id KAA07032; Fri, 9 Nov 2007 10:25:16 -0500 Date: Fri, 9 Nov 2007 10:25:16 -0500 Message-Id: <200711091525.KAA07032@www20.ureach.com> Received: from [216.49.107.238] by www20.ureach.com via HTTP; Fri, 09 Nov 2007 15:25:16 GMT To: "edmichaels@comcast.net" , TSCM-L2006@googlegroups.com From: "Steven Preflatish" Reply-To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2102} Re: CRAZY TIN HATTERS Was Re: [TSCM-L] {2100} Re: The "P-Levels" - Draft Version, Please comment Mime-Version: 1.0 Content-Type: Text/Plain; charset=ISO-8859-1 X-vsuite-type: e X-Google-Approved: grainger01982@gmail.com via web at 2007-11-09 16:42:03 Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , What you don't want to be "RITCH IN SURVAILENCE EQUIPTMENT"? ________________________________________________ Get your own "800" number Voicemail, fax, email, and a lot more http://www.ureach.com/reg/tag --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.24] ([172.28.128.24]:22054 "EHLO ip01.ams.ftl.affinity.com") by ams023.ftl.affinity.com with ESMTP id S434786AbXKJOBp; Sat, 10 Nov 2007 09:01:45 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAPdHNUfRVZLwkmdsb2JhbACPAwEBAQEHAgYJChaBEQ Received: from wa-out-0708.google.com ([209.85.146.240]) by ip01.ams.ftl.affinity.com with ESMTP; 10 Nov 2007 09:01:45 -0500 Received: by wa-out-0708.google.com with SMTP id j19so12967627waf for ; Sat, 10 Nov 2007 06:01:40 -0800 (PST) Received: by 10.115.110.6 with SMTP id n6mr173899wam.1194631361627; Fri, 09 Nov 2007 10:02:41 -0800 (PST) Received: by 10.107.65.8 with SMTP id s8gr2103prk; Fri, 09 Nov 2007 10:02:31 -0800 (PST) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.35.13.4 with SMTP id q4mr3895843pyi.1194631350959; Fri, 09 Nov 2007 10:02:30 -0800 (PST) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id x35si5733184nzg.2007.11.09.10.02.30; Fri, 09 Nov 2007 10:02:30 -0800 (PST) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id CF3645016F880 for ; Fri, 9 Nov 2007 13:02:29 -0500 (EST) Message-ID: <47349F7F.1080600@phreaker.net> Date: Fri, 09 Nov 2007 12:57:19 -0500 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2103} Re: CRAZY TIN HATTERS Was Re: [TSCM-L] {2100} Re: The "P-Levels" - Draft Version, Please comment References: <200711091525.KAA07032@www20.ureach.com> In-Reply-To: <200711091525.KAA07032@www20.ureach.com> X-AAC-KTE-LTE-MailScanner-Watermark: 1195235842.30641@ZpHHroMB+RxGh1LH0BWmAw Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Most of us are already, its finding time to maintain it, or make money off of it that eludes us . :-P Just pounding the dents out of our foil hats is a near full time job. Steven Preflatish wrote: > What you don't want to be "RITCH IN SURVAILENCE EQUIPTMENT"? > > > > ________________________________________________ > Get your own "800" number > Voicemail, fax, email, and a lot more > http://www.ureach.com/reg/tag > > > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:43999 "EHLO ip03.ams.ftl.affinity.com") by ams021.ftl.affinity.com with ESMTP id S477983AbXKKVQt; Sun, 11 Nov 2007 16:16:49 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAB+gNUdA6aaqi2dsb2JhbACCPTaMDwEBAQgEBAkKEQWBEQ Received: from py-out-1314.google.com ([64.233.166.170]) by ip03.ams.ftl.affinity.com with ESMTP; 11 Nov 2007 16:16:49 -0500 Received: by py-out-1314.google.com with SMTP id p69so29488129pyb for ; Sun, 11 Nov 2007 13:16:48 -0800 (PST) Received: by 10.35.107.20 with SMTP id j20mr556647pym.1194815799319; Sun, 11 Nov 2007 13:16:39 -0800 (PST) Received: by 10.107.100.4 with SMTP id c4gr2104prm; Sun, 11 Nov 2007 13:16:25 -0800 (PST) X-Sender: edithdinn@yahoo.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.54.19 with SMTP id g19mr6272455pyk.1194752908799; Sat, 10 Nov 2007 19:48:28 -0800 (PST) Received: from web35414.mail.mud.yahoo.com (web35414.mail.mud.yahoo.com [66.163.179.123]) by mx.google.com with SMTP id h71si6572189nzf.2007.11.10.19.48.27; Sat, 10 Nov 2007 19:48:28 -0800 (PST) Received-SPF: pass (google.com: domain of edithdinn@yahoo.com designates 66.163.179.123 as permitted sender) client-ip=66.163.179.123; DomainKey-Status: good (test mode) Authentication-Results: mx.google.com; spf=pass (google.com: domain of edithdinn@yahoo.com designates 66.163.179.123 as permitted sender) smtp.mail=edithdinn@yahoo.com; domainkeys=pass (test mode) header.From=edithdinn@yahoo.com Received: (qmail 90987 invoked by uid 60001); 11 Nov 2007 03:48:27 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID; b=fV12TXrllseJZDilG+snonXXlZtHAfFNuWtfemha47M9qV7KTGPzTdydFwheZ26luRR+sIRRZwB8bfcEKLriOj1MA/9hQQRaOUDEV9Qk3t/+BQYI/m0b8LgNV+n4vd0lKsQ8h/txNagnM42ctRHkqMgZfth4vEO0TGfHYvFZ1wk=; X-YMail-OSG: Hdl_FS0VM1nuad6NypdTcZE5sI0Zd.kZ6mswTnBs2CM7zEXyDAgP2.iAVf_pUDUEpFEnXkkSSjq5rvWX.iEds0gcTjUrt0KA3AXjQZOQuxHyBxQKMhU- Received: from [67.180.197.184] by web35414.mail.mud.yahoo.com via HTTP; Sat, 10 Nov 2007 19:48:27 PST Date: Sat, 10 Nov 2007 19:48:27 -0800 (PST) From: Edith Dinn Subject: [TSCM-L] {2104} Re: CRAZY TIN HATTERS Was Re: [TSCM-L] {2100} Re: The "P-Levels" - Draft Version, Please comment To: TSCM-L2006@googlegroups.com In-Reply-To: <47349F7F.1080600@phreaker.net> Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="0-338455944-1194752907=:90834" Message-ID: <625599.90834.qm@web35414.mail.mud.yahoo.com> X-Google-Approved: grainger01982@gmail.com via web at 2007-11-11 21:16:23 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

Hi Kondrak,
 
if making money off of it seems to be a problem, there is a real deal,
...could be helpful to some. If interested, feel free to send me a note.
I'll be glad to share info..
 
This is the way gov and big banking systems produce the majority of
their income, with foreign exchange trading revenues from the
capital markets.
 
 
Edith Dinn
private currency trader
technical forecasts
 
PS:..It took two years to get here:
works now comfortably.. among
the top five percent group.
 

kondrak <kondrak@phreaker.net> wrote:

Most of us are already, its finding time to maintain it, or make money
off of it that eludes us . :-P
Just pounding the dents out of our foil hats is a near full time job.



Steven Preflatish wrote:
> What you don't want to be "RITCH IN SURVAILENCE EQUIPTMENT"?
>
>
>
> ________________________________________________
> Get your own "800" number
> Voicemail, fax, email, and a lot more
> http://www.ureach.com/reg/tag
>
> >
>
>




--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.27] ([172.28.128.27]:24618 "EHLO ip04.ams.ftl.affinity.com") by ams021.ftl.affinity.com with ESMTP id S408397AbXKKVRX; Sun, 11 Nov 2007 16:17:23 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAKn/NkfRVZL6kmdsb2JhbACCc4wRAQEBAQcEBAkKFoER Received: from wa-out-0708.google.com ([209.85.146.250]) by ip04.ams.ftl.affinity.com with ESMTP; 11 Nov 2007 16:17:16 -0500 Received: by wa-out-0708.google.com with SMTP id j19so15159113waf for ; Sun, 11 Nov 2007 13:17:21 -0800 (PST) Received: by 10.141.132.8 with SMTP id j8mr192477rvn.1194815831983; Sun, 11 Nov 2007 13:17:11 -0800 (PST) Received: by 10.106.193.31 with SMTP id q31gr2105prf; Sun, 11 Nov 2007 13:17:01 -0800 (PST) X-Sender: omani_7@yahoo.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.16.7 with SMTP id t7mr7020415pyi.1194806940554; Sun, 11 Nov 2007 10:49:00 -0800 (PST) Received: from web52709.mail.re2.yahoo.com (web52709.mail.re2.yahoo.com [206.190.48.232]) by mx.google.com with SMTP id y6si6886179nzg.2007.11.11.10.48.59; Sun, 11 Nov 2007 10:49:00 -0800 (PST) Received-SPF: pass (google.com: domain of omani_7@yahoo.com designates 206.190.48.232 as permitted sender) client-ip=206.190.48.232; DomainKey-Status: good (test mode) Authentication-Results: mx.google.com; spf=pass (google.com: domain of omani_7@yahoo.com designates 206.190.48.232 as permitted sender) smtp.mail=omani_7@yahoo.com; domainkeys=pass (test mode) header.From=omani_7@yahoo.com Received: (qmail 26006 invoked by uid 60001); 11 Nov 2007 18:48:59 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID; b=5Xhbuz9G+hd81WJtOGjlv2cmf/5JHJv4ndj+NWiVA3ygMPLR6qRMz5W42RM23mQQti/KpeqBYRbBkZvV9epYLhhrMsoivach9WbH1xzavS3B1trggDrctehwOgtCo5d9kb6KZiZaTphr3q+5R2h3i3+5XOptQmkmJuR8kWcMnKw=; X-YMail-OSG: wgWGGk4VM1nkCRFmkW64UfBlm_Pn.Qt9eRDarOhCx2jWUEgReKxOOk4pUIVUmWvAFUqQZbpIxBxgQ7M0nH_A5zpzGKUt7yFIFHZUlDzo7tOVxmKrE3Sw9kej783n8yeTS9QiqhRF3Wg5Ooi96Jwj9ciziA-- Received: from [82.178.87.129] by web52709.mail.re2.yahoo.com via HTTP; Sun, 11 Nov 2007 10:48:59 PST Date: Sun, 11 Nov 2007 10:48:59 -0800 (PST) From: musallam said Subject: [TSCM-L] {2105} Re: Fast, Low-Cost Signal Analyzer ??? To: TSCM-L2006@googlegroups.com In-Reply-To: <937242.38371.qm@web57009.mail.re3.yahoo.com> Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="0-1047707964-1194806939=:24881" Message-ID: <357265.24881.qm@web52709.mail.re2.yahoo.com> X-Google-Approved: grainger01982@gmail.com via web at 2007-11-11 21:17:00 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , I have N9010A-526 spectrum analyzer, but it is very very heavy for portable use.

rogelio villarreal <rvmexico@yahoo.com> wrote:


COULD YOU TELL ME IF THIS WOULD BE OF USE IN SWEEPS?

pERHAPPS THIS INFORMATION COULD BE OF INTEREST TO THE
GROUP

SALUDOS

ROGER in Mexico

Signal analyzer sets new performance/cost standard in
signal analysis

Fast, Low-Cost Signal Analyzer
Claimed to make signal measurements 3◊ faster than
competitive models, an economy-model signal analyzer
targets design troubleshooting, complex signal
analysis, and productivity gains. The analyzer uses
vector signal analysis software to perform a wide
range of measurements in an open Window XP
Professional OS. Functions can be accessed with a USB
keyboard/mouse and on the front panel

Santa Clara, Calif. ó Agilent Technologies Inc. says
its EXA signal analyzer is the industry's fastest
economy-class signal analyzer, providing engineers
with the capabilities to troubleshoot new designs,
increase manufacturing throughput, or analyze complex
and time-varying signals.
At a lower performance point than Agilent's MXA signal
analyzer, the EXA integrates the same broad range of
standards-based measurements with Agilent's 89600
vector signal analysis (VSA) software in a single
instrument. In addition to the use of an open Windows
XP Professional operating system, the EXA also
provides an advanced signal analysis user interface.
All measurement features and functions are intuitively
grouped and accessible from the front panel or via a
USB keyboard and mouse.
The EXA signal analyzer supports multiple frequency
ranges from 9 kHz to 3.6, 7.0, 13.6 and 26.5 GHz, an
internal fully calibrated pre-amplifier option up to
3.6 GHz, and standard analysis bandwidths of 10 MHz.
This fully scalable functionality is complemented by
EXA's +13 dBm third-order intercept, -146 dBm/Hz
displayed average noise level (without pre-amp) and 66
dB W-CDMA ACLR dynamic range, as well as 0.4 dB total
absolute amplitude accuracy, which is made possible by
the all-digital, 14-bit ADC IF section. The dynamic
range is maximized with an optional 2 dB mechanical
step attenuator over the full frequency range and for
manufacturing offers an optional 1 dB electronic
attenuator to 3.6 GHz.
Agilent said a breakthrough characteristic of the
Agilent EXA is its intrinsic speed, unprecedented for
an economy signal analyzer, which allows measurements
up to 300 percent faster than other economy-class
signal analyzers. The EXA returns a marker peak search
result in less than 5 ms, local updates in less than
10 ms, and remote sweep and transfer (via GPIB) in
less than 12 ms. Measurement mode switching speeds are
typically less than 75 ms. This speed enables a fast
and seamless change between WiMAX, W-CDMA,
HSDPA/HSUPA, GSM/EDGE, phase noise measurements, and
89600 VSA software.
Optional measurement application software provides
preconfigured test routines for GSM/EDGE, 802.16e
Mobile WiMAX, W-CDMA, HSDPA/HSUPA, and phase-noise
applications. Running the Agilent 89600 VSA software
application in the EXA enables advanced signal
demodulation analysis and troubleshooting of more than
50 demodulation formats including 2G, 3G, 3.5G, WiMAX,
WLAN and Private Mobile Radio.
The EXA also includes a comprehensive set of standard
one-button-power measurements for characterizing
signal quality. These include ACPR, Channel Power,
Occupied Bandwidth, Spectrum Emissions Mask, CCDF,
Burst Power and Spurious Emission. It's fully
compliant with the LXI Class-C specification.
Connectivity is possible via 100 based-T LAN, GPIB and
seven USB 2.0 ports.
Pricing:
ï N9010A-503 (Frequency Range, 9 kHz to 3.6 GHz):
$16,900
ï N9010A-507 (Frequency Range, 9 kHz to 7.0 GHz):
$25,900
ï N9010A-513 (Frequency Range, 9 kHz to 13.6 GHz):
$30,900
ï N9010A-526 (Frequency Range, 9 kHz to 26.5 GHz):
$35,900
ï N9010A- FSA (Fine step attenuator): $1,000
ï N9010A-PFR (Precision Frequency Reference): $2,000
ï N9010A-EA3 (Electronic Attenuator, 3.6 GHz): $3,000
ï N9010A-P03 (Preamplifier, 3.6 GHz): $1,500
ï N9010A-CPU (Instrument Security, additional
CPU/HDD): $4,000
ï N9068A (Phase Noise Measurement Application): $4,700

ï N9071A (GSM/EDGE Measurement Application): $6,000
ï N9073A-1FP (W-CDMA Measurement Application): $7,400
ï N9073A-2FP (HSDPA/HSUPA Measurement Application):
$4,300
ï N9075A (802.16 OFDMA Measurement Application):
$10,000
ï 89601A (Vector Signal Analysis software -89600):
$10,100

Product information: N9019A
Agilent Technologies Inc., 1-800-829-4444, item number
8155, www.agilent.com


__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com




__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.26] ([172.28.128.26]:40211 "EHLO ip03.ams.ftl.affinity.com") by ams022.ftl.affinity.com with ESMTP id S616900AbXKLDDN; Sun, 11 Nov 2007 22:03:13 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAB+gNUfRVZLykmdsb2JhbACCc4U9SoR2gRIBAQEBBwIGCQoWgREB Received: from wa-out-0708.google.com ([209.85.146.242]) by ip03.ams.ftl.affinity.com with ESMTP; 11 Nov 2007 22:02:59 -0500 Received: by wa-out-0708.google.com with SMTP id j19so15568887waf for ; Sun, 11 Nov 2007 19:02:55 -0800 (PST) Received: by 10.142.254.8 with SMTP id b8mr241122wfi.1194836528706; Sun, 11 Nov 2007 19:02:08 -0800 (PST) Received: by 10.107.100.4 with SMTP id c4gr2106prm; Sun, 11 Nov 2007 19:01:56 -0800 (PST) X-Sender: aredandgold@msn.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.124.20 with SMTP id b20mr7478751pyn.1194836514505; Sun, 11 Nov 2007 19:01:54 -0800 (PST) Received: from bay0-omc1-s35.bay0.hotmail.com (bay0-omc1-s35.bay0.hotmail.com [65.54.246.107]) by mx.google.com with ESMTP id v28si7100630nzb.2007.11.11.19.01.54; Sun, 11 Nov 2007 19:01:54 -0800 (PST) Received-SPF: pass (google.com: domain of aredandgold@msn.com designates 65.54.246.107 as permitted sender) client-ip=65.54.246.107; Authentication-Results: mx.google.com; spf=pass (google.com: domain of aredandgold@msn.com designates 65.54.246.107 as permitted sender) smtp.mail=aredandgold@msn.com Received: from hotmail.com ([10.6.19.15]) by bay0-omc1-s35.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Sun, 11 Nov 2007 19:00:42 -0800 Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Sun, 11 Nov 2007 19:00:42 -0800 Message-ID: Received: from 68.113.73.48 by BLU116-DAV5.phx.gbl with DAV; Mon, 12 Nov 2007 03:00:39 +0000 X-Originating-IP: [68.113.73.48] X-Originating-Email: [aredandgold@msn.com] X-Sender: aredandgold@msn.com From: "Its from Onion" To: References: <1193958868.957908.16130@i13g2000prf.googlegroups.com><951416.58701.qm@web58804.mail.re1.yahoo.com> <408365798-1194620764-cardhu_decombobulator_blackberry.rim.net-2106894412-@bxe115.bisx.prod.on.blackberry> Subject: [TSCM-L] {2106} Re: CRAZY TIN HATTERS Was Re: [TSCM-L] {2100} Re: The "P-Levels" - Draft Version, Please comment Date: Sun, 11 Nov 2007 20:58:53 -0600 Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_00B5_01C824A5.AB2806B0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: MSN 9 X-MimeOLE: Produced By MSN MimeOLE V9.50.0039.1900 Seal-Send-Time: Sun, 11 Nov 2007 20:58:53 -0600 X-OriginalArrivalTime: 12 Nov 2007 03:00:42.0170 (UTC) FILETIME=[363F19A0:01C824D8] Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

you got in, did'nt ya?  haha  just joking. 
 
----- Original Message -----
Sent: Friday, November 09, 2007 9:06 AM
Subject: [TSCM-L] {2101} CRAZY TIN HATTERS Was Re: [TSCM-L] {2100} Re: The "P-Levels" - Draft Version, Please comment

How do these folks post on the list? I thought Jim screened all members and one had to be an approved member from an approved e-mail address to post?
Sent from my Verizon Wireless BlackBerry

-----Original Message-----
From: Julie White <toofastevo@yahoo.com>

Date: Thu, 8 Nov 2007 15:15:08
To:TSCM-L2006@googlegroups.com
Subject: [TSCM-L] {2100} Re: The "P-Levels" - Draft Version, Please comment


I am a single mom in desperate need of HELP. And cant get the police to help or any one else unless you have lots of money.This is criminal itsself...I am being stalked by my X he is using electroncs and only god knows what but this is unreal!He has something in my bathroom and shower around all the windows in my home so i can hear him degrade me and humiliate me only when noone is around.Now every one thinks i am crazy and cant get any help as it has kept me from working for so long i have almost lost every thing i own even my 1999 harley davidson that i refuse to part with.This would make his day and this is what he wants...PLEASE, Does anyone do pro bono sweeps in the puyallup, wa area.This could make a perfect movie I swear.ITS BEEN AN ONGOING NIGHTMARE>>>JULIE toofastevo@yahoo.com <mailto:toofastevo@yahoo.com> If ypu can even get me an e-mail as he deletes them usually.My cell # is253-205-5721.PLEASE HELP.YOU WOULD BE RITCH IN SURVAILENCE EQUIPTMENT>>>>I PROMISE.

TSCM <aar9sm@hotmail.com> wrote:
James,

Good job! Is well written with a lot of thought and detail involved
very nice guide.thank you!!

Mike

On Oct 30, 8:28 pm, "James M. Atkinson" wrote:
> The following "Applicant Questionares" is going
> live on my website on Wednesday night, and I
> drastically need a couple of you to read it over
> and see if there is anything that needs to be corrected or explained better.
>
> Many Thanks,
>
> -jma
>
> Recommended Gold List Questions
> Levels of TSCM Legitimacy - The "P-Levels"
>
> The following is a list of private TSCM firms who
> specialize in "bug sweeps" and wiretap detection
> and who have legitimate TSCM training,
> credentials, and equipment (and are very well respected within the industry).
>
> While most TSCM specialists are available for
> travel outside of a specific geographic area they
> tend to avoid such engagements, or will limited
> the services to vulnerability analysis,
> pre-construction assistance, non-instrumented
> inspections, simple RF checks, in-place
> monitoring, or limited TSCM services involving
> only a briefcase sized in-place monitoring system
> (such as a single spectrum analyzer, MSS, Eagle,
> ScanLock OSCOR, SPECTRE, ROSE, RAPHAEL, or similar system).
>
> These private TSCM firms tend to operate in a
> specific geographic area limited to a few hundred
> miles (usually within a eight to twelve hour, one
> day vehicle drive). However, all of the TSCM
> firms listed here are available for travel
> anywhere in the United States or the World on
> short notice, but only provide limited services
> when operating outside of their normal coverage
> area. These coverage area limitations is due to
> the logistics involved in transporting hundreds
> and often thousands of pounds of sophisticated,
> highly sensitive laboratory grade electronic
> instruments, equipment and tools. Bug sweeps and
> wiretap detection involves the use of ladders,
> pole climbing equipment, LAN analyzers, X-ray
> systems, specialized antennas and other
> equipment, which is not easily, transported by
> airplane or by any method other then trucks. In a
> few cases, the TSCM specialist can respond to any
> location within a 2 or 3-day drive with a truck
> which contains an entire mobile electronics laboratory.
>
> TSCM firms also tend to restrict their operations
> to a specific geographic area to facilitate an
> expert level of knowledge regarding the RF
> environment, construction methods used, community
> zoning, population demographics, civil
> engineering, aeronautic or maritime facilities,
> local military bases, and related areas.
> Knowledge of such regional information is
> critical for a successful TSCM project. The TSCM
> specialist must also have an intimate knowledge
> of the telephone systems, engineering methods,
> fiber optics, major cable locations, central
> office switches, test numbers, and related
> communications infrastructure present or being
> used in an area (which tends to be regional).
>
> An understanding of what types of eavesdropping
> devices, methods, and frequencies which are being
> used in an area is also important, as is
> knowledge of what type of surveillance equipment
> is being sold within that region (and other
> areas). The TSCM Procedural and Protocols Guides
> used by a specialist also tend to be based on
> specific issues and variables present in that
> specific geographic area. On a more interesting
> note, many of these firms are located in, or near
> major maritime port cities or population centers.
> The heaviest concentrations are around major
> cities on the East and West coasts with a very
> limited presence in the Mid-West, Great Plains,
> and Rockies. If you were in the Mid-West, Great
> Plains, or Rockies area you would need to engage
> a TSCM firm from one of the major port cities.
> For example, customers in Chicago, St. Louis,
> Memphis, Denver, Salt Lake City, Minneapolis,
> Billings, etc. would need to fly a TSCM
> specialist in from Boston, New York, Washington
> DC, Los Angles, Lexington, or Seattle.
>
> Please be patient when contacting any TSCM firm,
> as if they are out serving a client they may not
> be able to return your call for several hours.
> Rates generally are non-negotiable and reflect
> the cost of the sweep practitioner's time,
> considerable investment in equipment acquisition
> and maintenance, several weeks of in-service
> training a year, travel, administrative and
> communications time and expense to coordinate the
> sweep and written report, and a fair profit for
> their services. It is very unwise to shop for
> sweeps by using price as a criterion as it only
> invites being ripped off. Legitimate TSCM
> professionals are not interested in, nor will
> they engage in negotiating for a lower price.
> When you contact persons on this list, you are
> talking with someone in the same league as an
> attorney or surgeon, not a salesman. In fact,
> most of the people listed on this page have more
> time in their specialized training than do most
> attorneys or medical professionals. Anything
> beyond an initial 15-minute phone call usually
> will be billable time. Attorneys and doctors do
> not consult free, and neither do legitimate TSCM
> specialists. If a potential client calls with a
> long list of questions not pertaining directly to
> hiring the practitioner, or wants to know how to
> do his own sweep, or wants to know how to use the
> sweep kit he purchased on his own, expect to pay
> an hourly rate or $250 in advance for consulting
> services. If you are considering engaging (or
> have already engaged) a TSCM firm and they are
> not listed in the following directory you would
> do well to immediately ask some awkward
> questions. It is also important you understand
> that legitimate services by a competent TSCM firm
> rarely start at less then several thousand
> dollars for even a basic sweep, and a proper
> sweep take days, not hours to complete. Keep in
> mind that there only a small number of legitimate
> and competent TSCM counterintelligence
> specialists or "Bug Sweepers" in the U.S. private
> sector. Legitimate TSCM firms are in very high
> demand, hard to find, and expensive; so be
> patient when trying to find one to help you. In
> addition, TSCM firms are not attorneys and cannot
> tell you whether it is legal or illegal for you
> to monitor your own phones. Always call a
> competent licensed attorney for legal advice.
>
> Magic Formula
> Technical Background - Cube this
> Formal Technical Training (1200 hours, every 5 years) - Square This
> Equipment and Tools - Cube This
> Basic Equipment/Tools
> Intermediate Equipment/Tools
> Advanced Equipment/Tools
> Vehicles (halve this)
> Basic Vehicle
> Intermediate Vehicle
> Advanced Equipment - DOT/CDL
> Honesty and Integrity - Divided by all
>
> Square root of
> (Tech3+TechTraining2+Tools+TestEquipment3+.5Vechiles) /Honesty
>
> You use the list like this. You assign each of
> the P-Levels a score between negative numbers and
> positive ten, essentially adding or subtracting
> points up to ten either way depending on how each
> of the attribute apply to the person you are
> talking to. In a few cases, you can subtract more
> then ten points for issues that provide areas of significant concern.
>
> You would hope that the person or company you are
> considering performing a TSCM project would
> attain a perfect score as that means the person
> is very legitimate and professional and that you
> feel that none of the negative attributes or
> levels apply to them, but in reality such, a
> score is impractical. Nobody is perfect, and
> anybody who appears to be perfect should
> certainly be viewed with caution and a healthy dose of skepticism.
>
> Professional - A true blue, died in the wool
> security expert with years of RELEVANT experience
> and background in their specific area of
> expertise. He will "walk the walk and talk the
> talk", and have the scars to prove it. This
> person will own all the necessary equipment,
> hundred of books (some of which he wrote or
> contributed to), a large number of original web
> pages or white papers on the subject. He (or she)
> will seek to illuminate the subject matter, and
> will be able to explain very complex topics in
> terms the non-technical public or layman can
> understand and is comfortable is discussing the
> matter without pushing their services too much
> (they let you come to them, and never gets
> pushy). If they are very professional they get
> +10 points, if they seem a little rough around
> the edges give them +7, but start dropping points
> as you get more uncomfortable with their
> professionalism. If they are rough around the
> edges, or just a little too pushy to get your
> business then award them zero points, and if they
> really get pushy or seem desperate for your
> business then start subtracting points quickly.
>
> Pretender - Similar to the above professional but
> has irrelevant or bogus credentials. They may
> talk the talk, but cannot walk the walk (nor have
> the scars). Will talk a good game, but generally
> lacks legitimate equipment, materials, or
> training. He often has not written a book but
> will often plagiarize others (and claim it as his
> own work). If the "pretender" has an online
> presence or web page, it is full of hype,
> rhetoric, and paranoia (but little science). He
> is quite capable of totally baffling customers,
> but cannot explain things in a non-technical way
> (or without hyping surveillance technology to
> death). In this case you start by awarding them
> -10 points, and as they convince you that they
> are legitimate you slowly start adding points up
> to as much as a +10 points. Very often the
> pretender will be someone who retired from
> government service with honorable service, but
> who lacks the technical background to perform a
> competent sweep, and thus pretend to know what
> they are doing. In many cases, the pretender
> actually has themselves convinced that they can
> do a good job, but sometimes their inabilities
> lead then into the next category.
>
> Putz - This is nothing more then a buffoon.
> Generally he does not know how to do the job, has
> virtually no equipment, training, or resources
> (but tries hard). He may or may not be honest,
> and may actually believe that he is competent. He
> may have a few technical toys, and may have a
> week or two of training in electronics,
> surveillance, and security (all in one). In this
> case, you start by awarding them -10 points, and
> as they convince you that they are not a putz you
> slowly start adding points up to as much as a +10 points.
>
> Parasite - This type leaches off of the
> credibility of others, generally has no
> expertise, knowledge, or training of their own in
> what they are offering. Usually someone like this
> walks and talks like a salesman, and they love to
> run their mouth about all the people they know.
> Name-dropping is an art form to the parasite. The
> parasite may be detected by the way they rattle
> off a list of references, customers, or contacts
> before anybody has really asked for them. He will
> usually be desperate to prove to you how
> legitimate he is right from the very beginning of
> your contact with them. You start them with zero
> points, and gain or loose points as you feel
> appropriate. The parasite is the consummate
> salesmen, but not an actual sweep person. One
> rule of the TSCM profession is that you never
> talk about your customers, so someone who is
> trying to impress you with who they know or is
> name-dropping is a parasite who is trying to
> impress you, and in turn, you should not trust
> them, and score the parasite accordingly. Start
> with awarding zero points, and each time they
> name drop or mention a company name with whom
> they have performed sweep work subtract 3 points,
> up to 30 points. If on the other hand the TSCM
> expert does not mention his customers award 3
> points, then ask for references, and then when he
> declines to provide references award 3 more
> points (or if they give you references subtract 6
> points). Next, you want to aggressively pressure
> them for client names, and for references, and
> then if at this point (under pressure) they keep
> their mouth shut you add 6 points, or if they
> give in and breach their client privacy, you
> subtract 6 points. There is nothing wrong with
> being involved in sales, but in the TSCM
> business, a "sales push" or pushing to close the transaction is a liability.
>
> Predator - This type is pure evil and the only
> reason they are involved in security is to
> victimize the customer. The predator is only
> interested in backstabbing, theft, betrayal, or
> harming the client in a serious way. The only
> reason this type of person is involved in TSCM or
> the security industry is to ferret out their
> customers secrets so they can be exploited for
> scams or for criminal purposes. If this person
> gives you even the slightest hint of being, a
> criminal hit them with -100 points and let them
> work their way out of it. Now, do not confuse
> someone who hunts spies for a living for someone
> who performs eavesdropping for a living, or
> someone who is a professional criminal who preys
> upon his client. A true TSCM expert is hunting
> spies and bugs, and is not preying off their
> client, they do not hunt the spy directly, but
> rather hunt the spies' technical toys (it is a
> subtle, but important difference).
>
> Poison - He has nothing good to say about anybody
> except himself and his associates and tends to be
> bitter against everybody around him. When
> questioned about his own credentials he will lash
> out at his competitors with personal attacks
> (instead of discussing his own credentials). This
> type is easily identified after five minutes of
> talking, and they have not said one thing
> specifically regarding their own merit,
> equipment, or credentials. It is easy to figure
> this one out and to award or subtract points
> either way. If this person only slightly lashes
> out against others it may be that, he has a
> backbone, but is not actually toxic. Be careful
> here and only subtract points if this person is
> hardcore in his angst and bitterness. Hint: Most
> TSCM folks have a strong moral backbone, and have
> a strong sense of fairness and of what are right
> and wrong. Most TSCM professionals will be
> strongly biased against eavesdroppers, felons, or
> wrong doers, and this bias should result in
> points being awarded as you discuss just "how
> white his hat is". On the other hand, if the TSCM
> expert is bitter against others, but cannot
> specifically tell you why, then you should
> subtract points. Also, be wary of any TSCM expert
> who is overly complementary towards other people
> as this may indicate a potential parasite.
>
> Puffer Fish - Typically, he has little or no
> credentials of his own, but knows all of the
> industry lingo and jargon. He will claim to be
> the president of a huge corporation with scores
> of employees, tens of millions in assets when in
> fact this type is a penniless mooch who is still
> living with their parents. If not living with his
> parents his (or her) spouse will be the primary
> breadwinner in the family, their primary income
> (and references) will be from close friends or
> family. Listen very carefully for any hint as to
> where the seed money came from for them to start
> their business, as you may find that a rich
> family member bought them the equipment and has
> been subsidizing their TSCM activities. Often
> this type is also a pretender and bumbling putz.
> Listen for any hint of grandiosity or of what
> this person is going to do in the future, versus
> what they have actually done in the past. Dream
> and aspirations are important; delusions and
> illusions are not and should be graded accordingly.
>
> Psychiatrist Bait - These people are really
> nothing more then con artists who will ramble on
> for hours with wild tales of how they were a Navy
> SEAL, covert CIA operative, undercover FBI agent,
> won the Congressional Medal of Honor, was a POW,
> won the war, and so on. They could tell you about
> their credentials, but then they would have to
> kill you. Often they will offer credentials,
> which at first appear real, but cannot be
> confirmed, or is suspect in another way. They
> will offer credentials that cannot be verified by
> their own admission. "It's too secret" Ask
> questions, get specific answers, grade as you
> feel is appropriate. However, step carefully, as
> many TSCM people will not discuss a great deal of
> their background initially, so this level should
> be considered in regards to initial contact. If
> the person sounds and talks a little crazy
> initially then subtract points, but if they seem
> sane and coherent then add points. Do not get too
> carried away on this issue though. Always
> remember that the TSCM person is grading you as a
> customer as well, and may not be too keen on
> disclosing too much about their background until
> they get to know you better, so this is a two way street.
>
> Phelons (or Felon) - This group is a real problem
> within the security business. Many con artists,
> felons, and dirt-bags try to capitalize on their
> criminal skills by claiming to be able to catch
> other criminals. Usually their only credential
> (which can be verified) is the criminal
> conviction. Often this type will claim to be a
> convicted hacker and computer expert when in fact
> he was convicted of arson, or of being a drug
> dealer, is a psychiatric patient, and is
> incapable of recovering his own hard drive or of
> performing the most simplistic of technical
> tasks. The few cases where the conviction was
> relevant to their field will not set your mind at
> ease about their now "reformed" status. Now this
> gets a tricky because if you become reasonably
> convinced that you are talking to a felon (or
> they brag of their crimes) you need to subtract
> 50 points, and not consider dealing with them
> unless there is some overwhelming reason to do
> so. If the person was involved in a crime that
> did not involve moral turpitude or violence
> (i.e.: drunk driving, disorderly conduct, etc)
> then perhaps subtract only 15 points. Now, on the
> other hand if the TSCM appears to be a good
> citizen, with no criminal histories then they get only a positive 10 points.
>
> Paranoids - Usually has knowledge of security
> because of an anti-establishment, paranoid or
> criminal mind-set, which compels them to
> constantly look over their shoulder. Of course,
> the government is constantly harassing them, has
> their phones taped, has video cameras in their
> house, and has legions of agents employed just to
> harass them specifically. They will sometimes
> rant on about government mind control, biological
> implants, electronic harassment, and so on. In
> some cases they have written books or articles,
> but the materials is published only in very
> narrow channels, or by paramilitary or fringe
> publishers. Very often, they will hear voices in
> their head, and/or be able to convince other that
> they too are hearing voices or seeing visions. If
> they are hearing voices, seeing visions, or claim
> to have any kind, of "special powers", you should
> subtract 30 or more points. If they seem like a
> normal and rational person they get zero points,
> but if they are "professionally cautious" add a
> few positive points as TSCM experts operate in a
> world where they assume that a place is bugged
> until scientifically proven otherwise, they are
> not paranoid, but more accurately are in touch
> with the eavesdropping threat. To be awarded +10
> point the TSCM expert should be cautious,
> careful, and delicate with the project, but
> should not act "crazy", and should make you feel more secure, and not fearful.
>
> Police - When a TSCM expert enters the
> profession, they hopefully come with a multitude
> of prior experience, some have a technical
> background, and some have little or no technical
> background. Sadly, there are quite a few retired
> or fired members of the law enforcement or
> intelligence community who try their hands at

=== message truncated ===

 __________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
 
  --~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.26] ([172.28.128.26]:12810 "EHLO ip03.ams.ftl.affinity.com") by ams022.ftl.affinity.com with ESMTP id S386091AbXKLGlV; Mon, 12 Nov 2007 01:41:21 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAB+gNUdA6aL6i2dsb2JhbACCc4U9hlIBAQEIBAQJChEFgREB Received: from nz-out-0708.google.com ([64.233.162.250]) by ip03.ams.ftl.affinity.com with ESMTP; 12 Nov 2007 01:41:13 -0500 Received: by nz-out-0708.google.com with SMTP id q60so353755nzb for ; Sun, 11 Nov 2007 22:41:05 -0800 (PST) Received: by 10.86.65.11 with SMTP id n11mr299046fga.1194849640190; Sun, 11 Nov 2007 22:40:40 -0800 (PST) Received: by 10.107.65.8 with SMTP id s8gr2107prk; Sun, 11 Nov 2007 22:38:36 -0800 (PST) X-Sender: taylortscm@yahoo.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.13.4 with SMTP id q4mr7647117pyi.1194849515520; Sun, 11 Nov 2007 22:38:35 -0800 (PST) Received: from web34207.mail.mud.yahoo.com (web34207.mail.mud.yahoo.com [66.163.178.122]) by mx.google.com with SMTP id z53si10406200pyg.2007.11.11.22.38.34; Sun, 11 Nov 2007 22:38:35 -0800 (PST) Received-SPF: pass (google.com: domain of taylortscm@yahoo.com designates 66.163.178.122 as permitted sender) client-ip=66.163.178.122; DomainKey-Status: good (test mode) Authentication-Results: mx.google.com; spf=pass (google.com: domain of taylortscm@yahoo.com designates 66.163.178.122 as permitted sender) smtp.mail=taylortscm@yahoo.com; domainkeys=pass (test mode) header.From=taylortscm@yahoo.com Received: (qmail 60024 invoked by uid 60001); 12 Nov 2007 06:38:29 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID; b=q+q7OvB3kaGinw76djectvUfivd+wk6QaqExL/rESjcM8sBNgiL2ixaRM3N4ggl+gcDMUhTp+7+YogmCpIAqepZmNhzwUbPDpOODVluRg7PvSk1OmEQMnzgs3gNRqrztdyoEP5BB39KFQDhNKYFoR7QQmTXpsnet1/iOhQkZwGI=; X-YMail-OSG: Po93oFwVM1lxqs_85qfpzSZm1IdCdiXFonM.AwBw3eNERVK7PZoulB9B2ACg_FlTpKNSdM5MINdHvwTaJ.ZXP4I8yi4mWSwxRjN5RQWsAy0njO0BBgOfe5iT.r8fFA-- Received: from [24.1.70.146] by web34207.mail.mud.yahoo.com via HTTP; Sun, 11 Nov 2007 22:38:29 PST Date: Sun, 11 Nov 2007 22:38:29 -0800 (PST) From: "taylortscm@yahoo.com" Subject: [TSCM-L] {2107} Re: CRAZY TIN HATTERS Was Re: [TSCM-L] {2100} Re: The "P-Levels" - Draft Version, Please comment To: TSCM-L2006@googlegroups.com In-Reply-To: Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="0-1559710184-1194849509=:59487" Message-ID: <285524.59487.qm@web34207.mail.mud.yahoo.com> Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

looks like someone needs to raise some cash, I would suggest that she sell the Harley.
 
dan
taylor group
see I got in too.
 
 


Its from Onion <aredandgold@msn.com> wrote:
you got in, did'nt ya?  haha  just joking. 
 
----- Original Message -----
Sent: Friday, November 09, 2007 9:06 AM
Subject: [TSCM-L] {2101} CRAZY TIN HATTERS Was Re: [TSCM-L] {2100} Re: The "P-Levels" - Draft Version, Please comment

How do these folks post on the list? I thought Jim screened all members and one had to be an approved member from an approved e-mail address to post?
Sent from my Verizon Wireless BlackBerry

-----Original Message-----
From: Julie White <toofastevo@yahoo.com>

Date: Thu, 8 Nov 2007 15:15:08
To:TSCM-L2006@googlegroups.com
Subject: [TSCM-L] {2100} Re: The "P-Levels" - Draft Version, Please comment


I am a single mom in desperate need of HELP. And cant get the police to help or any one else unless you have lots of money.This is criminal itsself...I am being stalked by my X he is using electroncs and only god knows what but this is unreal!He has something in my bathroom and shower around all the windows in my home so i can hear him degrade me and humiliate me only when noone is around.Now every one thinks i am crazy and cant get any help as it has kept me from working for so long i have almost lost every thing i own even my 1999 harley davidson that i refuse to part with.This would make his day and this is what he wants...PLEASE, Does anyone do pro bono sweeps in the puyallup, wa area.This could make a perfect movie I swear.ITS BEEN AN ONGOING NIGHTMARE>>>JULIE toofastevo@yahoo.com <mailto:toofastevo@yahoo.com> If ypu can even get me an e-mail as he deletes them usually.My cell # is253-205-5721.PLEASE HELP.YOU WOULD BE RITCH IN SURVAILENCE EQUIPTMENT>>>>I PROMISE.

TSCM <aar9sm@hotmail.com> wrote:
James,

Good job! Is well written with a lot of thought and detail involved
very nice guide.thank you!!

Mike

On Oct 30, 8:28 pm, "James M. Atkinson" wrote:
> The following "Applicant Questionares" is going
> live on my website on Wednesday night, and I
> drastically need a couple of you to read it over
> and see if there is anything that needs to be corrected or explained better.
>
> Many Thanks,
>
> -jma
>
> Recommended Gold List Questions
> Levels of TSCM Legitimacy - The "P-Levels"
>
> The following is a list of private TSCM firms who
> specialize in "bug sweeps" and wiretap detection
> and who have legitimate TSCM training,
> credentials, and equipment (and are very well respected within the industry).
>
> While most TSCM specialists are available for
> travel outside of a specific geographic area they
> tend to avoid such engagements, or will limited
> the services to vulnerability analysis,
> pre-construction assistance, non-instrumented
> inspections, simple RF checks, in-place
> monitoring, or limited TSCM services involving
> only a briefcase sized in-place monitoring system
> (such as a single spectrum analyzer, MSS, Eagle,
> ScanLock OSCOR, SPECTRE, ROSE, RAPHAEL, or similar system).
>
> These private TSCM firms tend to operate in a
> specific geographic area limited to a few hundred
> miles (usually within a eight to twelve hour, one
> day vehicle drive). However, all of the TSCM
> firms listed here are available for travel
> anywhere in the United States or the World on
> short notice, but only provide limited services
> when operating outside of their normal coverage
> area. These coverage area limitations is due to
> the logistics involved in transporting hundreds
> and often thousands of pounds of sophisticated,
> highly sensitive laboratory grade electronic
> instruments, equipment and tools. Bug sweeps and
> wiretap detection involves the use of ladders,
> pole climbing equipment, LAN analyzers, X-ray
> systems, specialized antennas and other
> equipment, which is not easily, transported by
> airplane or by any method other then trucks. In a
> few cases, the TSCM specialist can respond to any
> location within a 2 or 3-day drive with a truck
> which contains an entire mobile electronics laboratory.
>
> TSCM firms also tend to restrict their operations
> to a specific geographic area to facilitate an
> expert level of knowledge regarding the RF
> environment, construction methods used, community
> zoning, population demographics, civil
> engineering, aeronautic or maritime facilities,
> local military bases, and related areas.
> Knowledge of such regional information is
> critical for a successful TSCM project. The TSCM
> specialist must also have an intimate knowledge
> of the telephone systems, engineering methods,
> fiber optics, major cable locations, central
> office switches, test numbers, and related
> communications infrastructure present or being
> used in an area (which tends to be regional).
>
> An understanding of what types of eavesdropping
> devices, methods, and frequencies which are being
> used in an area is also important, as is
> knowledge of what type of surveillance equipment
> is being sold within that region (and other
> areas). The TSCM Procedural and Protocols Guides
> used by a specialist also tend to be based on
> specific issues and variables present in that
> specific geographic area. On a more interesting
> note, many of these firms are located in, or near
> major maritime port cities or population centers.
> The heaviest concentrations are around major
> cities on the East and West coasts with a very
> limited presence in the Mid-West, Great Plains,
> and Rockies. If you were in the Mid-West, Great
> Plains, or Rockies area you would need to engage
> a TSCM firm from one of the major port cities.
> For example, customers in Chicago, St. Louis,
> Memphis, Denver, Salt Lake City, Minneapolis,
> Billings, etc. would need to fly a TSCM
> specialist in from Boston, New York, Washington
> DC, Los Angles, Lexington, or Seattle.
>
> Please be patient when contacting any TSCM firm,
> as if they are out serving a client they may not
> be able to return your call for several hours.
> Rates generally are non-negotiable and reflect
> the cost of the sweep practitioner's time,
> considerable investment in equipment acquisition
> and maintenance, several weeks of in-service
> training a year, travel, administrative and
> communications time and expense to coordinate the
> sweep and written report, and a fair profit for
> their services. It is very unwise to shop for
> sweeps by using price as a criterion as it only
> invites being ripped off. Legitimate TSCM
> professionals are not interested in, nor will
> they engage in negotiating for a lower price.
> When you contact persons on this list, you are
> talking with someone in the same league as an
> attorney or surgeon, not a salesman. In fact,
> most of the people listed on this page have more
> time in their specialized training than do most
> attorneys or medical professionals. Anything
> beyond an initial 15-minute phone call usually
> will be billable time. Attorneys and doctors do
> not consult free, and neither do legitimate TSCM
> specialists. If a potential client calls with a
> long list of questions not pertaining directly to
> hiring the practitioner, or wants to know how to
> do his own sweep, or wants to know how to use the
> sweep kit he purchased on his own, expect to pay
> an hourly rate or $250 in advance for consulting
> services. If you are considering engaging (or
> have already engaged) a TSCM firm and they are
> not listed in the following directory you would
> do well to immediately ask some awkward
> questions. It is also important you understand
> that legitimate services by a competent TSCM firm
> rarely start at less then several thousand
> dollars for even a basic sweep, and a proper
> sweep take days, not hours to complete. Keep in
> mind that there only a small number of legitimate
> and competent TSCM counterintelligence
> specialists or "Bug Sweepers" in the U.S. private
> sector. Legitimate TSCM firms are in very high
> demand, hard to find, and expensive; so be
> patient when trying to find one to help you. In
> addition, TSCM firms are not attorneys and cannot
> tell you whether it is legal or illegal for you
> to monitor your own phones. Always call a
> competent licensed attorney for legal advice.
>
> Magic Formula
> Technical Background - Cube this
> Formal Technical Training (1200 hours, every 5 years) - Square This
> Equipment and Tools - Cube This
> Basic Equipment/Tools
> Intermediate Equipment/Tools
> Advanced Equipment/Tools
> Vehicles (halve this)
> Basic Vehicle
> Intermediate Vehicle
> Advanced Equipment - DOT/CDL
> Honesty and Integrity - Divided by all
>
> Square root of
> (Tech3+TechTraining2+Tools+TestEquipment3+.5Vechiles) /Honesty
>
> You use the list like this. You assign each of
> the P-Levels a score between negative numbers and
> positive ten, essentially adding or subtracting
> points up to ten either way depending on how each
> of the attribute apply to the person you are
> talking to. In a few cases, you can subtract more
> then ten points for issues that provide areas of significant concern.
>
> You would hope that the person or company you are
> considering performing a TSCM project would
> attain a perfect score as that means the person
> is very legitimate and professional and that you
> feel that none of the negative attributes or
> levels apply to them, but in reality such, a
> score is impractical. Nobody is perfect, and
> anybody who appears to be perfect should
> certainly be viewed with caution and a healthy dose of skepticism.
>
> Professional - A true blue, died in the wool
> security expert with years of RELEVANT experience
> and background in their specific area of
> expertise. He will "walk the walk and talk the
> talk", and have the scars to prove it. This
> person will own all the necessary equipment,
> hundred of books (some of which he wrote or
> contributed to), a large number of original web
> pages or white papers on the subject. He (or she)
> will seek to illuminate the subject matter, and
> will be able to explain very complex topics in
> terms the non-technical public or layman can
> understand and is comfortable is discussing the
> matter without pushing their services too much
> (they let you come to them, and never gets
> pushy). If they are very professional they get
> +10 points, if they seem a little rough around
> the edges give them +7, but start dropping points
> as you get more uncomfortable with their
> professionalism. If they are rough around the
> edges, or just a little too pushy to get your
> business then award them zero points, and if they
> really get pushy or seem desperate for your
> business then start subtracting points quickly.
>
> Pretender - Similar to the above professional but
> has irrelevant or bogus credentials. They may
> talk the talk, but cannot walk the walk (nor have
> the scars). Will talk a good game, but generally
> lacks legitimate equipment, materials, or
> training. He often has not written a book but
> will often plagiarize others (and claim it as his
> own work). If the "pretender" has an online
> presence or web page, it is full of hype,
> rhetoric, and paranoia (but little science). He
> is quite capable of totally baffling customers,
> but cannot explain things in a non-technical way
> (or without hyping surveillance technology to
> death). In this case you start by awarding them
> -10 points, and as they convince you that they
> are legitimate you slowly start adding points up
> to as much as a +10 points. Very often the
> pretender will be someone who retired from
> government service with honorable service, but
> who lacks the technical background to perform a
> competent sweep, and thus pretend to know what
> they are doing. In many cases, the pretender
> actually has themselves convinced that they can
> do a good job, but sometimes their inabilities
> lead then into the next category.
>
> Putz - This is nothing more then a buffoon.
> Generally he does not know how to do the job, has
> virtually no equipment, training, or resources
> (but tries hard). He may or may not be honest,
> and may actually believe that he is competent. He
> may have a few technical toys, and may have a
> week or two of training in electronics,
> surveillance, and security (all in one). In this
> case, you start by awarding them -10 points, and
> as they convince you that they are not a putz you
> slowly start adding points up to as much as a +10 points.
>
> Parasite - This type leaches off of the
> credibility of others, generally has no
> expertise, knowledge, or training of their own in
> what they are offering. Usually someone like this
> walks and talks like a salesman, and they love to
> run their mouth about all the people they know.
> Name-dropping is an art form to the parasite. The
> parasite may be detected by the way they rattle
> off a list of references, customers, or contacts
> before anybody has really asked for them. He will
> usually be desperate to prove to you how
> legitimate he is right from the very beginning of
> your contact with them. You start them with zero
> points, and gain or loose points as you feel
> appropriate. The parasite is the consummate
> salesmen, but not an actual sweep person. One
> rule of the TSCM profession is that you never
> talk about your customers, so someone who is
> trying to impress you with who they know or is
> name-dropping is a parasite who is trying to
> impress you, and in turn, you should not trust
> them, and score the parasite accordingly. Start
> with awarding zero points, and each time they
> name drop or mention a company name with whom
> they have performed sweep work subtract 3 points,
> up to 30 points. If on the other hand the TSCM
> expert does not mention his customers award 3
> points, then ask for references, and then when he
> declines to provide references award 3 more
> points (or if they give you references subtract 6
> points). Next, you want to aggressively pressure
> them for client names, and for references, and
> then if at this point (under pressure) they keep
> their mouth shut you add 6 points, or if they
> give in and breach their client privacy, you
> subtract 6 points. There is nothing wrong with
> being involved in sales, but in the TSCM
> business, a "sales push" or pushing to close the transaction is a liability.
>
> Predator - This type is pure evil and the only
> reason they are involved in security is to
> victimize the customer. The predator is only
> interested in backstabbing, theft, betrayal, or
> harming the client in a serious way. The only
> reason this type of person is involved in TSCM or
> the security industry is to ferret out their
> customers secrets so they can be exploited for
> scams or for criminal purposes. If this person
> gives you even the slightest hint of being, a
> criminal hit them with -100 points and let them
> work their way out of it. Now, do not confuse
> someone who hunts spies for a living for someone
> who performs eavesdropping for a living, or
> someone who is a professional criminal who preys
> upon his client. A true TSCM expert is hunting
> spies and bugs, and is not preying off their
> client, they do not hunt the spy directly, but
> rather hunt the spies' technical toys (it is a
> subtle, but important difference).
>
> Poison - He has nothing good to say about anybody
> except himself and his associates and tends to be
> bitter against everybody around him. When
> questioned about his own credentials he will lash
> out at his competitors with personal attacks
> (instead of discussing his own credentials). This
> type is easily identified after five minutes of
> talking, and they have not said one thing
> specifically regarding their own merit,
> equipment, or credentials. It is easy to figure
> this one out and to award or subtract points
> either way. If this person only slightly lashes
> out against others it may be that, he has a
> backbone, but is not actually toxic. Be careful
> here and only subtract points if this person is
> hardcore in his angst and bitterness. Hint: Most
> TSCM folks have a strong moral backbone, and have
> a strong sense of fairness and of what are right
> and wrong. Most TSCM professionals will be
> strongly biased against eavesdroppers, felons, or
> wrong doers, and this bias should result in
> points being awarded as you discuss just "how
> white his hat is". On the other hand, if the TSCM
> expert is bitter against others, but cannot
> specifically tell you why, then you should
> subtract points. Also, be wary of any TSCM expert
> who is overly complementary towards other people
> as this may indicate a potential parasite.
>
> Puffer Fish - Typically, he has little or no
> credentials of his own, but knows all of the
> industry lingo and jargon. He will claim to be
> the president of a huge corporation with scores
> of employees, tens of millions in assets when in
> fact this type is a penniless mooch who is still
> living with their parents. If not living with his
> parents his (or her) spouse will be the primary
> breadwinner in the family, their primary income
> (and references) will be from close friends or
> family. Listen very carefully for any hint as to
> where the seed money came from for them to start
> their business, as you may find that a rich
> family member bought them the equipment and has
> been subsidizing their TSCM activities. Often
> this type is also a pretender and bumbling putz.
> Listen for any hint of grandiosity or of what
> this person is going to do in the future, versus
> what they have actually done in the past. Dream
> and aspirations are important; delusions and
> illusions are not and should be graded accordingly.
>
> Psychiatrist Bait - These people are really
> nothing more then con artists who will ramble on
> for hours with wild tales of how they were a Navy
> SEAL, covert CIA operative, undercover FBI agent,
> won the Congressional Medal of Honor, was a POW,
> won the war, and so on. They could tell you about
> their credentials, but then they would have to
> kill you. Often they will offer credentials,
> which at first appear real, but cannot be
> confirmed, or is suspect in another way. They
> will offer credentials that cannot be verified by
> their own admission. "It's too secret" Ask
> questions, get specific answers, grade as you
> feel is appropriate. However, step carefully, as
> many TSCM people will not discuss a great deal of
> their background initially, so this level should
> be considered in regards to initial contact. If
> the person sounds and talks a little crazy
> initially then subtract points, but if they seem
> sane and coherent then add points. Do not get too
> carried away on this issue though. Always
> remember that the TSCM person is grading you as a
> customer as well, and may not be too keen on
> disclosing too much about their background until
> they get to know you better, so this is a two way street.
>
> Phelons (or Felon) - This group is a real problem
> within the security business. Many con artists,
> felons, and dirt-bags try to capitalize on their
> criminal skills by claiming to be able to catch
> other criminals. Usually their only credential
> (which can be verified) is the criminal
> conviction. Often this type will claim to be a
> convicted hacker and computer expert when in fact
> he was convicted of arson, or of being a drug
> dealer, is a psychiatric patient, and is
> incapable of recovering his own hard drive or of
> performing the most simplistic of technical
> tasks. The few cases where the conviction was
> relevant to their field will not set your mind at
> ease about their now "reformed" status. Now this
> gets a tricky because if you become reasonably
> convinced that you are talking to a felon (or
> they brag of their crimes) you need to subtract
> 50 points, and not consider dealing with them
> unless there is some overwhelming reason to do
> so. If the person was involved in a crime that
> did not involve moral turpitude or violence
> (i.e.: drunk driving, disorderly conduct, etc)
> then perhaps subtract only 15 points. Now, on the
> other hand if the TSCM appears to be a good
> citizen, with no criminal histories then they get only a positive 10 points.
>
> Paranoids - Usually has knowledge of security
> because of an anti-establishment, paranoid or
> criminal mind-set, which compels them to
> constantly look over their shoulder. Of course,
> the government is constantly harassing them, has
> their phones taped, has video cameras in their
> house, and has legions of agents employed just to
> harass them specifically. They will sometimes
> rant on about government mind control, biological
> implants, electronic harassment, and so on. In
> some cases they have written books or articles,
> but the materials is published only in very
> narrow channels, or by paramilitary or fringe
> publishers. Very often, they will hear voices in
> their head, and/or be able to convince other that
> they too are hearing voices or seeing visions. If
> they are hearing voices, seeing visions, or claim
> to have any kind, of "special powers", you should
> subtract 30 or more points. If they seem like a
> normal and rational person they get zero points,
> but if they are "professionally cautious" add a
> few positive points as TSCM experts operate in a
> world where they assume that a place is bugged
> until scientifically proven otherwise, they are
> not paranoid, but more accurately are in touch
> with the eavesdropping threat. To be awarded +10
> point the TSCM expert should be cautious,
> careful, and delicate with the project, but
> should not act "crazy", and should make you feel more secure, and not fearful.
>
> Police - When a TSCM expert enters the
> profession, they hopefully come with a multitude
> of prior experience, some have a technical
> background, and some have little or no technical
> background. Sadly, there are quite a few retired
> or fired members of the law enforcement or
> intelligence community who try their hands at

=== message truncated ===

 __________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
 
 


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.25] ([172.28.128.25]:64410 "EHLO ip02.ams.ftl.affinity.com") by ams008.ftl.affinity.com with ESMTP id S370274AbXKMB2x; Mon, 12 Nov 2007 20:28:53 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAKuMOEfRVZLwkmdsb2JhbACPCQEBAQEHBAQpgRE Received: from wa-out-0708.google.com ([209.85.146.240]) by ip02.ams.ftl.affinity.com with ESMTP; 12 Nov 2007 20:28:52 -0500 Received: by wa-out-0708.google.com with SMTP id j19so3488waf for ; Mon, 12 Nov 2007 17:28:52 -0800 (PST) Received: by 10.142.133.15 with SMTP id g15mr429047wfd.1194913965904; Mon, 12 Nov 2007 16:32:45 -0800 (PST) Received: by 10.107.115.27 with SMTP id s27gr2108prm; Mon, 12 Nov 2007 16:32:33 -0800 (PST) X-Sender: astoryang@gmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.100.128.20 with SMTP id a20mr168820and.1194831885204; Sun, 11 Nov 2007 17:44:45 -0800 (PST) Received: by v29g2000prd.googlegroups.com with HTTP; Mon, 12 Nov 2007 01:44:44 +0000 (UTC) X-IP: 59.40.249.254 From: astor To: TSCM-L Professionals List Subject: [TSCM-L] {2108} SHENZHEN MIDIK TECHNOLOGY CO LTD Date: Mon, 12 Nov 2007 01:44:44 -0000 Message-ID: <1194831884.105299.152470@v29g2000prd.googlegroups.com> User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; TheWorld),gzip(gfe),gzip(gfe) Mime-Version: 1.0 Content-Type: text/plain; charset=GB2312 Content-Transfer-Encoding: 7bit X-Google-Approved: grainger01982@gmail.com via web at 2007-11-13 00:32:32 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , FLL RANGE OF GPS JAMMER IS AVAILABLE IN MIDIK TECHNOLOGY NOW. INCLUDING VEHICLE USE, PORTABLE AND DESKTOP MODELS. SHENZHEN MIDIK TECHNOLOGY CO LTD sales@chinajammer.com www.chinajammer.com --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.25] ([172.28.128.25]:57522 "EHLO ip02.ams.ftl.affinity.com") by ams010.ftl.affinity.com with ESMTP id S616223AbXKMCcU; Mon, 12 Nov 2007 21:32:20 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAALqaOEfRVZL3kmdsb2JhbACPCAEBAQEHBAQpgRE Received: from wa-out-0708.google.com ([209.85.146.247]) by ip02.ams.ftl.affinity.com with ESMTP; 12 Nov 2007 21:32:18 -0500 Received: by wa-out-0708.google.com with SMTP id j19so69212waf for ; Mon, 12 Nov 2007 18:32:14 -0800 (PST) Received: by 10.142.48.14 with SMTP id v14mr424836wfv.1194921125594; Mon, 12 Nov 2007 18:32:05 -0800 (PST) Received: by 10.107.94.14 with SMTP id w14gr2109prl; Mon, 12 Nov 2007 18:31:58 -0800 (PST) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.108.12 with SMTP id k12mr9145565pym.1194921116023; Mon, 12 Nov 2007 18:31:56 -0800 (PST) Received: from lvs00-fl-swip005.ftl.affinity.com (lvs00-fl-swip005.ftl.affinity.com [216.219.253.15]) by mx.google.com with ESMTP id x35si19144nzg.2007.11.12.18.31.55; Mon, 12 Nov 2007 18:31:56 -0800 (PST) Received-SPF: neutral (google.com: 216.219.253.15 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.15; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.15 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [70.22.240.106] ([70.22.240.106]:41734 "EHLO Raphael.tscm.com") by swip005.ftl.affinity.com with ESMTP id S418609AbXKMCbz (ORCPT ); Mon, 12 Nov 2007 21:31:55 -0500 Message-Id: <7.0.1.0.2.20071112212549.07c97b68@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Mon, 12 Nov 2007 21:30:41 -0500 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] {2109} Linked In Update Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , For those list members who would like to link their profile to my own I would like to provide my LinkedIn address. http://www.linkedin.com/in/jamesmatkinson If you are a professional, you need to set up a LinkedIn account, and link to the profiles of the people who you know who are also on the networking service. -jma ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.25] ([172.28.128.25]:33641 "EHLO ip02.ams.ftl.affinity.com") by ams014.ftl.affinity.com with ESMTP id S615358AbXKNOvg; Wed, 14 Nov 2007 09:51:36 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAOaZOkfRVZLwkmdsb2JhbACCc4wPAgEBBwQEExaBEQE Received: from wa-out-0708.google.com ([209.85.146.240]) by ip02.ams.ftl.affinity.com with ESMTP; 14 Nov 2007 09:51:30 -0500 Received: by wa-out-0708.google.com with SMTP id j19so2977353waf for ; Wed, 14 Nov 2007 06:51:27 -0800 (PST) Received: by 10.141.68.12 with SMTP id v12mr156339rvk.1195051226266; Wed, 14 Nov 2007 06:40:26 -0800 (PST) Received: by 10.107.65.8 with SMTP id s8gr2110prk; Wed, 14 Nov 2007 06:40:13 -0800 (PST) X-Sender: edithdinn@yahoo.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.11.1 with SMTP id o1mr10184253pyi.1194982801421; Tue, 13 Nov 2007 11:40:01 -0800 (PST) Received: from web35413.mail.mud.yahoo.com (web35413.mail.mud.yahoo.com [66.163.179.122]) by mx.google.com with SMTP id v63si586798pyh.2007.11.13.11.40.00; Tue, 13 Nov 2007 11:40:01 -0800 (PST) Received-SPF: pass (google.com: domain of edithdinn@yahoo.com designates 66.163.179.122 as permitted sender) client-ip=66.163.179.122; DomainKey-Status: good (test mode) Authentication-Results: mx.google.com; spf=pass (google.com: domain of edithdinn@yahoo.com designates 66.163.179.122 as permitted sender) smtp.mail=edithdinn@yahoo.com; domainkeys=pass (test mode) header.From=edithdinn@yahoo.com Received: (qmail 72721 invoked by uid 60001); 13 Nov 2007 19:40:00 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID; b=Jv53wYfYPqvBE7LQjjtmDdMeokl4yoHiLlUTGo+qgq5ULOb75SZZxNBc7Hb3Dw+SuyC5f0t1/65eaJ7+Mfrm2EXZiVek4/GK6XdnwkAn0dOX2qaA4Ft6jGaePFi+zriGxzJV1xIW4bZ/nzntbCVp3qo0nmKWsTzhDcxo2L194iE=; X-YMail-OSG: EvpDi.MVM1mJft3vfyH5R7K6zwo5dNKkcAkxpAfEwOeXvOa91c7Kpt8dvvOw5JaSQ0.CGIbNWBIFgrSzVfplvIRTE_4YGEZhUHUGbpOtoQ1T.GH0DNo- Received: from [67.180.197.184] by web35413.mail.mud.yahoo.com via HTTP; Tue, 13 Nov 2007 11:39:59 PST Date: Tue, 13 Nov 2007 11:39:59 -0800 (PST) From: Edith Dinn Subject: [TSCM-L] {2110} Re: SHENZHEN MIDIK TECHNO. CO LTD / in Honor of Veteran's Day To: TSCM-L2006@googlegroups.com In-Reply-To: <1194831884.105299.152470@v29g2000prd.googlegroups.com> Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="0-1082504807-1194982799=:72253" Message-ID: <913870.72253.qm@web35413.mail.mud.yahoo.com> X-Google-Approved: grainger01982@gmail.com via web at 2007-11-14 14:40:12 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

In Honor of Veteran's Day: hereby sharing, ..from a old friend, Hal.
 
You have to go way back to World War I to know what the Russians have done. We had about fifty soldiers and sailors taken prisoner by the Russians in battles you never studied in school.  They were sent in by our president to help fight the Bolsheviks and they were never returned.  All attempts to get the men back were stonewalled, and this became the norm for the rest of the century.
 
When Stalin came to power in the USSR, he purged the kulaks, who were people who were successful farmers and land owners, executed hundreds of thousands of the intelligentsia, and made the country a virtual police state.  Many Russians were able to flee to Europe, Canada and the United States and build a new life.  But as early as the Yalta Conference with Roosevelt, Churchill and Stalin, Stalin insisted that we return those runaway Russians.  So great was his pressure Roosevelt complied once and sent a boatload home to Russia, against their will.  They were offloaded, marched into a quarry and shot.  Roosevelt never sent any others.  Stalin warned Roosevelt and Churchill that if they didn't cooperate, we might not get all of our soldiers back. Roosevelt and Churchill had to put up with Stalin because he now was fighting the German army on the Eastern Front.  But he always suspected that the Allies had delayed the invasion at Normandy to give the Russian army and the German army time to destroy each other.  That might be true.
 
One problem often overlooked is that we, and England, had soviet agents, traitors, highly placed in our government who funneled secrets to Stalin.   Roosevelt's closest advisors, Harry Dexter White, Alger Hiss, and Harry Hopkins would later be exposed.  Some of Churchill's most trusted men were also traitors.  Kim Philby, Blount, Cairncross, and two others I can't remember right now, known as the Cambridge Five, had over the years since joining the Communist Party, worked their way into the higher echelons of British government and were sharing secrets with Stalin.
 
So, long story shorter, in the closing days of World War II, the Russian Army was pushing the Germans back and liberating POW Camps, Stalags, as they moved.  But they were pushing the POWs onto trains that went to the USSR.  They took 25,600 Americans and 36,000 British and Commonwealth soldiers and airmen to the Gulags of Siberia, never to be returned.  General Patton wanted to attack the Russians then and there, as he knew they would be our next enemy.  But he was assassinated by a former OSS agent, Douglas Bazata.  It was well known that the Russians were taking our men, and President "The Buck Stops Here'  Truman told his Intelligence chief, Colonel Corso,  to sweep it under the rug.  Now these men were known to be alive, had sent and received mail, the Red Cross had seen them, and the Germans kept meticulous records, and at war's end they didn't come home.  Within two years our government wrote them off as PFOD, Presumptive Finding of Death.  So, if no one has heard from you lately, you must be dead. Not too many years ago, Russian President Boris Yeltsin admitted that Americans were taken to the Soviet Union and kept.
 
In the Korean War, we had 8,200 men missing.  MIAs. We know some were taken to the Soviet Union. Some were used in medical and psychiatric experiments and we know that because a ranking defector,
Czech General Jan Sejna, who was in charge of the program, came here and told us.  We know that many of the men were sent to mine coal in Northern Korea and in China.  Might any still be alive?  Well, in the last ten years about six former enlisted men from the South Korean army made it out to China and they had been prisoners for more than fifty years.
 
There were many men during the Cold War who flew missions into and across the Soviet Union ferreting out the radar installations and testing their defenses.  Some were shot down and captured and never returned.
Strategic Air Command, SAC, needed to know the routes into the USSR just in case we went to war, which from time to time looked likely.  There has always been the question that KAL 007 might have been mistaken for a USAF ferreting flight that left Anchorage about the same time.
 
In Vietnam we know that the Russians wanted our technology badly.  Many men were shot down and captured by the North Vietnamese and the Russians shopped the camps looking for talent.  They wanted the BackSeaters who knew the navigation and weapons systems on our airplanes.  There is a particular picture, and I have a copy, of LCDR Kelly Patterson, USN who was shot down with CDR 'Red' McDaniel  in their A-6.  He is lying on a stretcher with probably a broken ankle. Standing on the left is Marine Captain Hugh Fanning (whose name is on the Wall as KIA) and on the right is a female nurse.  Because of his knowledge of the A-6 instruments, he was taken to the Red Army Defense Complex at Sary Sagan, Khazakistan.  He was tracked there by NSA employee Jerry Mooney.  He was never returned. Another notable case was USAF Major Brown and his co-pilot whose F-111 was shot down.  They managed to land without much damage (unfortunately) and that plane was taken to the USSR almost intact.  And the two pilots were on the manifest of a Soviet flight out of Sam Nuea, Laos to the Soviet Union.  Within a year features of that airplane appeared on the new Soviet aircraft, so I am told.  Neither of them were ever returned.
 
Then something amazing happened in the 'nineties.  A Harvard researcher, Dr. Steven Morse, had obtained permission to see some of the files of the Soviet Central Committee. By chance he found a letter written by LtGeneral Tran van Quang, Head of Enemy Proselytizing (that's us) to the Soviets telling how many Americans he was holding in eleven prison camps.  The date of the letter was September, 1972, just a few months before Operation Homecoming in which we got 591 men back. But it said he was holding 1,206.  They were broken out by camps, by rank, by the number of aviators, etc.  He goes on to say that some of the war criminals would not be released because 'they had chosen the bad path', which probably meant they gave only name, rank and serial number?  In the time between that report and Op Homecoming, sixty more airmen literally fell into their hands.  So now he has at least 1,266.  Why were the others not released, you ask?  Well, Secretary of State Henry Kissinger at a secret conference in Paris had promised $3 Billion in rebuilding aid to the North Vietnamese.  Then he couldn't deliver.  So they kept the rest for 'ransom'.  After all, they had done that with the French army that they captured at the Plain de Jars in the war with their colonial masters.  They called them 'pearls' and now and then they sold them back to France.
 
If you want to learn more, there are some really good books you might want.  "Moscow Bound" by John M.G. Brown, "The Men we Left Behind' by Sanders, and the latest 'An Enormous Crime'. 
 
Just remember that Vladimir Putin is former KGB.  Actually that is probably incorrect.  Probably still is. Don't expect him to reveal the secrets, even though President Bush says he is a good man and he has looked into his eyes and seen his soul.  
 
Hal
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~


astor <astoryang@gmail.com> wrote:

FLL RANGE OF GPS JAMMER IS AVAILABLE IN MIDIK TECHNOLOGY NOW.

INCLUDING VEHICLE USE, PORTABLE AND DESKTOP MODELS.


SHENZHEN MIDIK TECHNOLOGY CO LTD
sales@chinajammer.com
www.chinajammer.com




--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.26] ([172.28.128.26]:59646 "EHLO ip03.ams.ftl.affinity.com") by ams015.ftl.affinity.com with ESMTP id S366222AbXKNOks; Wed, 14 Nov 2007 09:40:48 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAABCYOkdC+VynmGdsb2JhbACPAgIBAQcEBhEWgRE Received: from ug-out-1516.google.com ([66.249.92.167]) by ip03.ams.ftl.affinity.com with ESMTP; 14 Nov 2007 09:40:41 -0500 Received: by ug-out-1516.google.com with SMTP id k24so633814uge for ; Wed, 14 Nov 2007 06:40:40 -0800 (PST) Received: by 10.86.3.4 with SMTP id 4mr233695fgc.1195051231334; Wed, 14 Nov 2007 06:40:31 -0800 (PST) Received: by 10.107.100.4 with SMTP id c4gr2111prm; Wed, 14 Nov 2007 06:40:27 -0800 (PST) X-Sender: douglasrolland@yahoo.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.54.19 with SMTP id g19mr10185000pyk.1194983580637; Tue, 13 Nov 2007 11:53:00 -0800 (PST) Received: from web62314.mail.re1.yahoo.com (web62314.mail.re1.yahoo.com [69.147.75.28]) by mx.google.com with SMTP id v63si596132pyh.2007.11.13.11.52.59; Tue, 13 Nov 2007 11:53:00 -0800 (PST) Received-SPF: pass (google.com: domain of douglasrolland@yahoo.com designates 69.147.75.28 as permitted sender) client-ip=69.147.75.28; DomainKey-Status: good (test mode) Authentication-Results: mx.google.com; spf=pass (google.com: domain of douglasrolland@yahoo.com designates 69.147.75.28 as permitted sender) smtp.mail=douglasrolland@yahoo.com; domainkeys=pass (test mode) header.From=douglasrolland@yahoo.com Received: (qmail 55485 invoked by uid 60001); 13 Nov 2007 19:52:59 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID; b=qoqOxoDe4SazhFyQu/cJaXsARmyJ4/Xy3K/DDB8nL0J7hjI6C3FehH3XPkD9+QaSKrIY/R/aMie5mtN3ZSlCVAvqZ95ax4twTyjNpd2SL7/gGT2lUaAmDM2TjhpJBPuTtgT8pi20BemUbRLaLE81PShUD9SNCdN8SD7V3Mhwdso=; X-YMail-OSG: ryb0XDwVM1k9.ej3jnH4MxRkoWh2hoMMpYsnh9pLldZHZVgxfb5OTzlfWcJADtVT2.wu17wUyXhCKf0DVLWpz3Kgl9efdj9qnbQ- Received: from [66.156.177.177] by web62314.mail.re1.yahoo.com via HTTP; Tue, 13 Nov 2007 11:52:59 PST Date: Tue, 13 Nov 2007 11:52:59 -0800 (PST) From: Rolland Douglas Subject: [TSCM-L] {2111} Re: SHENZHEN MIDIK TECHNOLOGY CO LTD To: TSCM-L2006@googlegroups.com In-Reply-To: <1194831884.105299.152470@v29g2000prd.googlegroups.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 8bit Message-ID: <501629.55477.qm@web62314.mail.re1.yahoo.com> X-Google-Approved: grainger01982@gmail.com via web at 2007-11-14 14:40:25 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Thanks for the link up astor. ;) --- astor wrote: > > FLL RANGE OF GPS JAMMER IS AVAILABLE IN MIDIK > TECHNOLOGY NOW. > > INCLUDING VEHICLE USE, PORTABLE AND DESKTOP MODELS. > > > SHENZHEN MIDIK TECHNOLOGY CO LTD > sales@chinajammer.com > www.chinajammer.com > > > > > ____________________________________________________________________________________ Be a better sports nut! Let your teams follow you with Yahoo Mobile. Try it now. http://mobile.yahoo.com/sports;_ylt=At9_qDKvtAbMuh1G1SQtBI7ntAcJ --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.24] ([172.28.128.24]:59228 "EHLO ip01.ams.ftl.affinity.com") by ams020.ftl.affinity.com with ESMTP id S445769AbXKPETU; Thu, 15 Nov 2007 23:19:20 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAHupPEdA6bj2kGdsb2JhbACCd4sDgQ8BAQEBBwQGIgWBEQ Received: from wr-out-0708.google.com ([64.233.184.246]) by ip01.ams.ftl.affinity.com with ESMTP; 15 Nov 2007 23:19:17 -0500 Received: by wr-out-0708.google.com with SMTP id 28so3893980wra for ; Thu, 15 Nov 2007 20:19:16 -0800 (PST) Received: by 10.90.27.13 with SMTP id a13mr87050aga.1195186744927; Thu, 15 Nov 2007 20:19:04 -0800 (PST) Received: by 10.107.65.8 with SMTP id s8gr2112prk; Thu, 15 Nov 2007 20:19:03 -0800 (PST) X-Sender: aredandgold@msn.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.114.93.17 with SMTP id q17mr992615wab.1195186738807; Thu, 15 Nov 2007 20:18:58 -0800 (PST) Received: from bay0-omc2-s29.bay0.hotmail.com (bay0-omc2-s29.bay0.hotmail.com [65.54.246.165]) by mx.google.com with ESMTP id k36si1838538waf.2007.11.15.20.18.57; Thu, 15 Nov 2007 20:18:58 -0800 (PST) Received-SPF: pass (google.com: domain of aredandgold@msn.com designates 65.54.246.165 as permitted sender) client-ip=65.54.246.165; Authentication-Results: mx.google.com; spf=pass (google.com: domain of aredandgold@msn.com designates 65.54.246.165 as permitted sender) smtp.mail=aredandgold@msn.com Received: from hotmail.com ([10.6.19.15]) by bay0-omc2-s29.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Thu, 15 Nov 2007 20:18:52 -0800 Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Thu, 15 Nov 2007 20:18:46 -0800 Message-ID: Received: from 68.113.73.48 by BLU116-DAV5.phx.gbl with DAV; Fri, 16 Nov 2007 04:18:44 +0000 X-Originating-IP: [68.113.73.48] X-Originating-Email: [aredandgold@msn.com] X-Sender: aredandgold@msn.com From: "Its from Onion" Subject: [TSCM-L] {2112} Breaking News Date: Thu, 15 Nov 2007 22:17:02 -0600 Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0042_01C827D5.3F4D0A70" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: MSN 9 X-MimeOLE: Produced By MSN MimeOLE V9.50.0039.1900 Seal-Send-Time: Thu, 15 Nov 2007 22:17:02 -0600 X-OriginalArrivalTime: 16 Nov 2007 04:18:46.0194 (UTC) FILETIME=[C7CB7120:01C82807] Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , To: unlisted-recipients:; (no To-header on input)

 
 
 
Last January, the New Orleans Times Picayune reported that a Cajun amateur archeologist having dug to a depth of 10 feet found traces of copper wire dating back 100 years.... and came to the conclusion that their ancestors already had a telephone network more than 100 years ago.
 
Not to be outdone by the Cajuns, in the weeks that followed, Texan scientists dug to a depth of 20 feet.
Shortly after, headlines in the Dallas Morning News read:
 
" Texas archaeologists have found traces of 200-year old copper wire, and have concluded that their ancestors already had an advanced high-tech communications network one hundred years earlier than the Cajuns."
 
 
One week later, The Birmingham News reported the following:
 
"After Digging as deep as 30 feet in fields just outside Bugtussle, Bubba Ledbetter, a self- taught archeologist, reported that he found absolutely nothing."
 
Bubba has therefore concluded that 300 years ago in Alabama they were already using wireless..

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.24] ([172.28.128.24]:63294 "EHLO ip01.ams.ftl.affinity.com") by ams010.ftl.affinity.com with ESMTP id S450139AbXKPFRs; Fri, 16 Nov 2007 00:17:48 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAADq2PEfRVZL0kGdsb2JhbACPCQEBAQEHBAYiBYERlAc Received: from wa-out-0708.google.com ([209.85.146.246]) by ip01.ams.ftl.affinity.com with ESMTP; 16 Nov 2007 00:17:28 -0500 Received: by wa-out-0708.google.com with SMTP id j19so2040714waf for ; Thu, 15 Nov 2007 21:17:25 -0800 (PST) Received: by 10.114.156.1 with SMTP id d1mr94487wae.1195190236262; Thu, 15 Nov 2007 21:17:16 -0800 (PST) Received: by 10.107.100.4 with SMTP id c4gr2113prm; Thu, 15 Nov 2007 21:17:05 -0800 (PST) X-Sender: mitchd@tscmusa.com X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.35.37.18 with SMTP id p18mr2118550pyj.1195190223622; Thu, 15 Nov 2007 21:17:03 -0800 (PST) Received: from QMTA09.emeryville.ca.mail.comcast.net (qmta09.emeryville.ca.mail.comcast.net [76.96.30.96]) by mx.google.com with ESMTP id 20si2035114nzu.2007.11.15.21.17.03; Thu, 15 Nov 2007 21:17:03 -0800 (PST) Received-SPF: softfail (google.com: domain of transitioning mitchd@tscmusa.com does not designate 76.96.30.96 as permitted sender) client-ip=76.96.30.96; Authentication-Results: mx.google.com; spf=softfail (google.com: domain of transitioning mitchd@tscmusa.com does not designate 76.96.30.96 as permitted sender) smtp.mail=mitchd@tscmusa.com Received: from OMTA06.emeryville.ca.mail.comcast.net ([76.96.30.51]) by QMTA09.emeryville.ca.mail.comcast.net with comcast id DHBC1Y00K16AWCU0A00Y00; Fri, 16 Nov 2007 05:17:05 +0000 Received: from oem ([69.245.41.186]) by OMTA06.emeryville.ca.mail.comcast.net with comcast id DHH41Y00B40zmf10800000; Fri, 16 Nov 2007 05:17:05 +0000 X-Authority-Analysis: v=1.0 c=1 a=bq-hYppIAAAA:8 a=qJIppwqyAAAA:8 a=HiUTmOO3AAAA:8 a=TbcuwdWr1v9QDxDAwRIA:9 a=psTE1xsAqgMsQjaYvQUA:7 a=tS-j5WTTdUegjr5-R6cZ7zwpKrUA:4 a=0jCLLnicWKQA:10 a=-YMT9ByFx74A:10 a=nmQGXI8m9vMA:10 a=C4M2EkW3NhQA:10 a=IwIrZ5zFdMAA:10 a=0HbQqGD8AL8A:10 From: "TSCM/SO Group" To: Subject: [TSCM-L] {2113} Best TSCM Tool for 07 Date: Thu, 15 Nov 2007 23:17:01 -0600 Message-ID: <002401c8280f$ebc759b0$6601a8c0@oem> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Mailer: Microsoft Office Outlook 11 Thread-Index: AcgoD+hVIU0oCG1zSI29S16/4kQ2yA== X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Ok Gang, This has to be the best tscm tool of the year (seriously) $200.00 bucks at Home Depot It does the same thing that all the hi dollar black le only super duper mil spec units do..... Only downside seems to be that the plumbing crowd breaks the cam head off of it per the rigid discussion forum. I looked at one at the depot. Best bang for the buck that ive seen in a long time Treat it like your spec a and it should last for a while. Although, I donít suggest showing a ceo how great it works in the executive bathroom, or letting the kids use it to work on fluffy..........;) BR M http://www.ridgid.com/Tools/SeeSnake-micro See it. Find it. Solve it. The new RIDGID SeeSnake microô inspection camera allows you to easily perform visual inspections in hard to reach areas. Its lightweight, handheld design means that it can be carried anywhere ñ providing solutions when and where you need them, while allowing you to offer more services and increase productivity. Click here for more information. Specifications Display: 2.4" Color LCD (160 x 234 resolution) Camera Diameter: 0.7" (17 mm) Lighting: 2 Adjustable LEDs Cable Reach: 3' (expandable to 30' w/optional extensions) Waterproof: Camera & Cable to 10' (when properly assembled) Power Source: 4 AA Batteries (3 hrs. of continuous run-time) Attachments: Mirror, Hook & Magnet Weight: 1.2 lbs (0.5 kg) Mitch Davis TSCM/Special Operations Group 20 Music Square West,Suite 208 Nashville,TN 37203 USA 615 251 0441 Fax 615 523 0300 mitchd@tscmusa.com www.tscmusa.com "maintaining a higher degree of excellence" ****************************** Tools for investigators at www.covertworx.com CONFIDENTIALITY NOTICE: This communication may contain privileged or other confidential information, protected from disclosure under applicable law. If you are not the intended recipient, or the employee or agent responsible for delivering the message to the intended recipient, or if you believe that you have received this communication in error, please do not print, copy, retransmit, disseminate, or otherwise use the information contained herein. Also, please indicate to the sender that you have received this e-mail in error, and delete the copy you have received. Thank you. † --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.24] ([172.28.128.24]:19891 "EHLO ip01.ams.ftl.affinity.com") by ams012.ftl.affinity.com with ESMTP id S2440478AbXKPMir; Fri, 16 Nov 2007 07:38:47 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAIAePUdA6bj6i2dsb2JhbACCQTaLH3UBAQEIBAQkBYER Received: from wr-out-0708.google.com ([64.233.184.250]) by ip01.ams.ftl.affinity.com with ESMTP; 16 Nov 2007 07:38:44 -0500 Received: by wr-out-0708.google.com with SMTP id 28so5218997wra for ; Fri, 16 Nov 2007 04:38:46 -0800 (PST) Received: by 10.90.87.5 with SMTP id k5mr102287agb.1195216716894; Fri, 16 Nov 2007 04:38:36 -0800 (PST) Received: by 10.107.94.14 with SMTP id w14gr2114prl; Fri, 16 Nov 2007 04:38:30 -0800 (PST) X-Sender: edwinsteinmetz@comcast.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.35.124.20 with SMTP id b20mr2499589pyn.1195216706773; Fri, 16 Nov 2007 04:38:26 -0800 (PST) Received: from QMTA06.emeryville.ca.mail.comcast.net (qmta06.emeryville.ca.mail.comcast.net [76.96.30.56]) by mx.google.com with ESMTP id y6si2190427nzg.2007.11.16.04.38.26; Fri, 16 Nov 2007 04:38:26 -0800 (PST) Received-SPF: pass (google.com: domain of edwinsteinmetz@comcast.net designates 76.96.30.56 as permitted sender) client-ip=76.96.30.56; Authentication-Results: mx.google.com; spf=pass (google.com: domain of edwinsteinmetz@comcast.net designates 76.96.30.56 as permitted sender) smtp.mail=edwinsteinmetz@comcast.net Received: from OMTA11.emeryville.ca.mail.comcast.net ([76.96.30.36]) by QMTA06.emeryville.ca.mail.comcast.net with comcast id DPbm1Y0040mlR8U0A02o00; Fri, 16 Nov 2007 12:38:28 +0000 Received: from amailcenter13.comcast.net ([204.127.225.113]) by OMTA11.emeryville.ca.mail.comcast.net with comcast id DQeU1Y00U2TRPFQ0800000; Fri, 16 Nov 2007 12:38:29 +0000 X-Authority-Analysis: v=1.0 c=1 a=qnE+UPGICEPpNaOa09UWyg==:17 a=C2CPQW4RAAAA:8 a=bq-hYppIAAAA:8 a=qJIppwqyAAAA:8 a=HiUTmOO3AAAA:8 a=I7FudsJ_OCvz6sA-GjQA:9 a=3MpAnUQ9CidnKs-vjTMA:7 a=vuNNZ-gi7qR8Z4ZO8U2bwwfeq5MA:4 a=gC5xFmjcWTQA:10 a=53WAt4nok28A:10 a=HcE-_4YsA-YA:10 a=nmQGXI8m9vMA:10 a=Bm6qEjDGwGEA:10 a=vBQbBFZzXXwA:10 a=C4M2EkW3NhQA:10 a=IwIrZ5zFdMAA:10 a=SKpDKCWXRSQA:10 a=4LSgZHcWFFPXnbX0J1kA:9 a=8NI14_QSY72aqdnDVx0A:7 a=6OXjWPsdlCVv5rShkPHWGejmCCAA:4 a=37WNUvjkh6kA:10 Received: from [204.214.145.6] by amailcenter13.comcast.net; Fri, 16 Nov 2007 12:38:24 +0000 From: EdwinSteinmetz@comcast.net To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2114} Re: Best TSCM Tool for 07 Date: Fri, 16 Nov 2007 12:38:24 +0000 Message-Id: <111620071238.11196.473D8F40000B575B00002BBC2214756402969B0A0302070A9BAC0207990BBA@comcast.net> X-Mailer: AT&T Message Center Version 1 (Oct 30 2007) X-Authenticated-Sender: RWR3aW5TdGVpbm1ldHpAY29tY2FzdC5uZXQ= Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="NextPart_Webmail_9m3u9jl4l_11196_1195216704_0" Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

Great suggestion!
 
Thanks
 
Ed Steinmetz
 
 
-------------- Original message --------------
From: "TSCM/SO Group" <MitchD@tscmusa.com>

>
> Ok Gang,
> This has to be the best tscm tool of the year (seriously)
>
> $200.00 bucks at Home Depot
> It does the same thing that all the hi dollar black le only super duper mil
> spec units do.....
> Only downside seems to be that the plumbing crowd breaks the cam head off of
> it per the rigid discussion forum.
>
> I looked at one at the depot. Best bang for the buck that ive seen in a long
> time
> Treat it like your spec a and it should last for a while.
>
> Although, I donít suggest showing a ceo how great it works in the executive
> bathroom, or letting the kids use it to work on fluffy..........;)
> BR
> M
>
> http://www.ridgid.com/Tools/SeeSna ke-micro
>
>
> See it. Find it. Solve it.
> The new RIDGID SeeSnake microô inspection camera allows you to easily
> perform visual inspections in hard to reach areas. Its lightweight, handheld
> design means that it can be carried anywhere ñ providing solutions when and
> where you need them, while allowing you to offer more services and increase
> productivity.
>
> Click here for more information.
> Specifications
>
> Display:
> 2.4" Color LCD (160 x 234 resolution)
>
> Camera Diameter:
> 0.7" (17 mm)
>
> Lighting:
> 2 Adjustable LEDs
>
> Cable Reach:
> 3' (expandable to 30' w/optional extensions)
>
> Waterproof:
> Camera & Cable to 10' (when properly assembled)
>
> Power Source:
> 4 AA Batteries (3 hrs. of continuous run-time)
>
> Attachments:
> Mirror, Ho ok & Magnet
>
> Weight:
> 1.2 lbs (0.5 kg)
>
>
>
> Mitch Davis
> TSCM/Special Operations Group
> 20 Music Square West,Suite 208
> Nashville,TN 37203 USA
> 615 251 0441
> Fax 615 523 0300
> mitchd@tscmusa.com
> www.tscmusa.com
> "maintaining a higher degree of excellence"
> ******************************
> Tools for investigators at www.covertworx.com
> CONFIDENTIALITY NOTICE: This communication may contain privileged or other
> confidential information, protected from disclosure under applicable law. If
> you are not the intended recipient, or the employee or agent responsible for
> delivering the message to the intended recipient, or if you believe that you
> have received this communication in error, please do not print, copy,
> retransmit, disseminate, or otherwise use the information contained herein.
> Also, please indicate to the sender that you have received this e-mail in
> error, and delete the copy you have received. Thank you.
>
>
>
>
>
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.25] ([172.28.128.25]:47904 "EHLO ip02.ams.ftl.affinity.com") by ams004.ftl.affinity.com with ESMTP id S365706AbXKPWgX; Fri, 16 Nov 2007 17:36:23 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAB+qPUfRVZL3kmdsb2JhbACCd4wWAQEBAQcEBCmBEQ Received: from wa-out-0708.google.com ([209.85.146.247]) by ip02.ams.ftl.affinity.com with ESMTP; 16 Nov 2007 17:36:16 -0500 Received: by wa-out-0708.google.com with SMTP id j19so1040787waf for ; Fri, 16 Nov 2007 14:36:11 -0800 (PST) Received: by 10.143.34.11 with SMTP id m11mr149534wfj.1195252562478; Fri, 16 Nov 2007 14:36:02 -0800 (PST) Received: by 10.107.65.8 with SMTP id s8gr2115prk; Fri, 16 Nov 2007 14:35:58 -0800 (PST) X-Sender: brnsike@swbell.net X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.124.20 with SMTP id b20mr2637826pyn.1195223120234; Fri, 16 Nov 2007 06:25:20 -0800 (PST) Received: from web81213.mail.mud.yahoo.com (web81213.mail.mud.yahoo.com [68.142.199.42]) by mx.google.com with SMTP id z53si1273139pyg.2007.11.16.06.25.19; Fri, 16 Nov 2007 06:25:20 -0800 (PST) Received-SPF: neutral (google.com: 68.142.199.42 is neither permitted nor denied by best guess record for domain of brnsike@swbell.net) client-ip=68.142.199.42; DomainKey-Status: good (test mode) Authentication-Results: mx.google.com; spf=neutral (google.com: 68.142.199.42 is neither permitted nor denied by best guess record for domain of brnsike@swbell.net) smtp.mail=brnsike@swbell.net; domainkeys=pass (test mode) header.From=brnsike@swbell.net Received: (qmail 77755 invoked by uid 60001); 16 Nov 2007 14:25:19 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=swbell.net; h=X-YMail-OSG:Received:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID; b=jluPdi4qFqJEGNdRWbpoHaYFQrxVK7m//loDcnC35SSzPOjJD1r3sjQdZUN4tkxFba49IICUktDzHP4Zs8z08RvfDKjp0BKzt4DNJGcTfiDNw00Pt8aqdC1pZlaVB3gRsZCXrRZRl64sdJ39V82Dw1T1Yi3XJDgXDY9a+jU6sms=; X-YMail-OSG: .KONwzIVM1l5I2jMlAIjQhQ6B8eTmy8P0yudxkdX Received: from [69.19.14.41] by web81213.mail.mud.yahoo.com via HTTP; Fri, 16 Nov 2007 06:25:18 PST Date: Fri, 16 Nov 2007 06:25:18 -0800 (PST) From: Martin Subject: [TSCM-L] {2115} Re: Best TSCM Tool for 07 To: TSCM-L2006@googlegroups.com In-Reply-To: <002401c8280f$ebc759b0$6601a8c0@oem> Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="0-1116194263-1195223118=:70945" Message-ID: <984611.70945.qm@web81213.mail.mud.yahoo.com> X-Google-Approved: grainger01982@gmail.com via web at 2007-11-16 22:35:56 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

Well, I know where I'm headed this afternoon.  Thanks for the tip, Mitch!!
 
Martin Brown
Brown & Sikes, Inc.

TSCM/SO Group <MitchD@tscmusa.com> wrote:

Ok Gang,
This has to be the best tscm tool of the year (seriously)

$200.00 bucks at Home Depot
It does the same thing that all the hi dollar black le only super duper mil
spec units do.....
Only downside seems to be that the plumbing crowd breaks the cam head off of
it per the rigid discussion forum.

I looked at one at the depot. Best bang for the buck that ive seen in a long
time
Treat it like your spec a and it should last for a while.

Although, I donít suggest showing a ceo how great it works in the executive
bathroom, or letting the kids use it to work on fluffy..........;)
BR
M

http://www.ridgid.com/Tools/SeeSnake-micro


See it. Find it. Solve it.
The new RIDGID SeeSnake microô inspection camera allows you to easily
perform visual inspections in hard to reach areas. Its lightweight, handheld
design means that it can be carried anywhere ñ providing solutions when and
where you need them, while allowing you to offer more services and increase
productivity.

Click here for more information.
Specifications

Display:
2.4" Color LCD (160 x 234 resolution)

Camera Diameter:
0.7" (17 mm)

Lighting:
2 Adjustable LEDs

Cable Reach:
3' (expandable to 30' w/optional extensions)

Waterproof:
Camera & Cable to 10' (when properly assembled)

Power Source:
4 AA Batteries (3 hrs. of continuous run-time)

Attachments:
Mirror, Hook & Magnet

Weight:
1.2 lbs (0.5 kg)



Mitch Davis
TSCM/Special Operations Group
20 Music Square West,Suite 208
Nashville,TN 37203 USA
615 251 0441
Fax 615 523 0300
mitchd@tscmusa.com
www.tscmusa.com
"maintaining a higher degree of excellence"
******************************
Tools for investigators at www.covertworx.com
CONFIDENTIALITY NOTICE: This communication may contain privileged or other
confidential information, protected from disclosure under applicable law. If
you are not the intended recipient, or the employee or agent responsible for
delivering the message to the intended recipient, or if you believe that you
have received this communication in error, please do not print, copy,
retransmit, disseminate, or otherwise use the information contained herein.
Also, please indicate to the sender that you have received this e-mail in
error, and delete the copy you have received. Thank you.
 





--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.25] ([172.28.128.25]:11027 "EHLO ip02.ams.ftl.affinity.com") by ams012.ftl.affinity.com with ESMTP id S373253AbXKPWga; Fri, 16 Nov 2007 17:36:30 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAB+qPUfRVZL3kmdsb2JhbACBX4EYiwaBEAEBAQEHBAQpgRE Received: from wa-out-0708.google.com ([209.85.146.247]) by ip02.ams.ftl.affinity.com with ESMTP; 16 Nov 2007 17:36:29 -0500 Received: by wa-out-0708.google.com with SMTP id j19so1040787waf for ; Fri, 16 Nov 2007 14:36:29 -0800 (PST) Received: by 10.142.132.2 with SMTP id f2mr149798wfd.1195252580356; Fri, 16 Nov 2007 14:36:20 -0800 (PST) Received: by 10.107.94.14 with SMTP id w14gr2116prl; Fri, 16 Nov 2007 14:36:08 -0800 (PST) X-Sender: bip@terranet.ro X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.126.2 with SMTP id d2mr2671577pyn.1195224331863; Fri, 16 Nov 2007 06:45:31 -0800 (PST) Received: from mail.terranet.ro (mx1.terranet.ro [194.176.189.7]) by mx.google.com with ESMTP id y6si2259770nzg.2007.11.16.06.45.30; Fri, 16 Nov 2007 06:45:31 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of bip@terranet.ro designates 194.176.189.7 as permitted sender) client-ip=194.176.189.7; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of bip@terranet.ro designates 194.176.189.7 as permitted sender) smtp.mail=bip@terranet.ro Message-Id: <473dad0b.06e2240a.1e73.fffffa20SMTPIN_ADDED@mx.google.com> Received: (qmail 13108 invoked from network); 16 Nov 2007 16:45:26 +0200 Received: from unknown (HELO Sony1.terranet.ro) (80.96.218.26) by 0 with (DHE-RSA-AES256-SHA encrypted) SMTP; 16 Nov 2007 16:45:26 +0200 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Fri, 16 Nov 2007 16:45:33 +0200 To: TSCM-L2006@googlegroups.com From: Cristian Subject: [TSCM-L] {2116} Re: Best TSCM Tool for 07 In-Reply-To: <111620071238.11196.473D8F40000B575B00002BBC2214756402969B0 A0302070A9BAC0207990BBA@comcast.net> References: <111620071238.11196.473D8F40000B575B00002BBC2214756402969B0A0302070A9BAC0207990BBA@comcast.net> Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="=====================_1289962638==.ALT" X-Google-Approved: grainger01982@gmail.com via web at 2007-11-16 22:36:07 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , At 02:38 PM 11/16/2007, you wrote:

Great suggestion!
 
Thanks
 
Ed Steinmetz
www.tscm-sweeps.com
 
 
-------------- Original message --------------
From: "TSCM/SO Group" <MitchD@tscmusa.com>

>
> Ok Gang,
> This has to be the best tscm tool of the year (seriously)
>

The head's diameter of 17mm is too large.
Better is a 5mm dia optical fiber.
Cristian

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

X-Symantec-TimeoutProtection: 0 X-Symantec-TimeoutProtection: 1 X-Symantec-TimeoutProtection: 2 X-Symantec-TimeoutProtection: 3 X-Symantec-TimeoutProtection: 4 X-Symantec-TimeoutProtection: 5 X-Symantec-TimeoutProtection: 6 Received: from [172.28.128.25] ([172.28.128.25]:15722 "EHLO ip02.ams.ftl.affinity.com") by ams012.ftl.affinity.com with ESMTP id S362671AbXKQFLD; Sat, 17 Nov 2007 00:11:03 -0500 Received: from wa-out-0708.google.com ([209.85.146.243]) by ip02.ams.ftl.affinity.com with ESMTP; 17 Nov 2007 00:05:12 -0500 Received: by wa-out-0708.google.com with SMTP id j19so1365608waf for ; Fri, 16 Nov 2007 21:05:08 -0800 (PST) Received: by 10.114.194.1 with SMTP id r1mr174361waf.1195275891969; Fri, 16 Nov 2007 21:04:51 -0800 (PST) Received: by 10.107.100.4 with SMTP id c4gr2117prm; Fri, 16 Nov 2007 21:04:45 -0800 (PST) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.11.1 with SMTP id o1mr3662230pyi.1195275883604; Fri, 16 Nov 2007 21:04:43 -0800 (PST) Received: from swip001.ftl.affinity.com (lvs00-fl-swip001.ftl.affinity.com [216.219.253.11]) by mx.google.com with ESMTP id v28si2663437nzb.2007.11.16.21.04.39; Fri, 16 Nov 2007 21:04:43 -0800 (PST) Received-SPF: neutral (google.com: 216.219.253.11 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.11; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.11 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [71.243.12.197] ([71.243.12.197]:60611 "EHLO Raphael.tscm.com") by swip001.ftl.affinity.com with ESMTP id S364367AbXKQFEj (ORCPT ); Sat, 17 Nov 2007 00:04:39 -0500 Message-Id: <7.0.1.0.2.20071116235237.15cb17c8@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Fri, 16 Nov 2007 23:54:58 -0500 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] {2117} New School DVM Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="=====================_247894343==_" Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , On the far left we have an "old School" brown meterer or kicker, in te middle is the classic pocket sized Simpson H/H VOM, and on the right we have the "new school" 289 digital volt meter from fluke. -jma ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Attachment Converted: "c:\documents and settings\james m. atkinson\application data\qualcomm\eudora\attach\DSCN2038.JPG"X-Symantec-TimeoutProtection: 0 X-Symantec-TimeoutProtection: 1 X-Symantec-TimeoutProtection: 2 Received: from [172.28.128.25] ([172.28.128.25]:64416 "EHLO ip02.ams.ftl.affinity.com") by ams012.ftl.affinity.com with ESMTP id S363187AbXKQFGk; Sat, 17 Nov 2007 00:06:40 -0500 Received: from py-out-1314.google.com ([64.233.166.175]) by ip02.ams.ftl.affinity.com with ESMTP; 17 Nov 2007 00:05:57 -0500 Received: by py-out-1314.google.com with SMTP id u10so4237156pyb for ; Fri, 16 Nov 2007 21:05:54 -0800 (PST) Received: by 10.142.134.17 with SMTP id h17mr158511wfd.1195275938513; Fri, 16 Nov 2007 21:05:38 -0800 (PST) Received: by 10.107.100.4 with SMTP id c4gr2118prm; Fri, 16 Nov 2007 21:05:26 -0800 (PST) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.54.19 with SMTP id g19mr3666138pyk.1195275924926; Fri, 16 Nov 2007 21:05:24 -0800 (PST) Received: from swip001.ftl.affinity.com (lvs00-fl-swip001.ftl.affinity.com [216.219.253.11]) by mx.google.com with ESMTP id x35si2654127nzg.2007.11.16.21.05.20; Fri, 16 Nov 2007 21:05:24 -0800 (PST) Received-SPF: neutral (google.com: 216.219.253.11 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.11; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.11 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [71.243.12.197] ([71.243.12.197]:60611 "EHLO Raphael.tscm.com") by swip001.ftl.affinity.com with ESMTP id S359901AbXKQFFT (ORCPT ); Sat, 17 Nov 2007 00:05:19 -0500 Message-Id: <7.0.1.0.2.20071116235502.1556ec28@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Fri, 16 Nov 2007 23:57:29 -0500 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] {2118} Automated Loop Testing Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="=====================_247894562==_" Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Here is one of the second generation MCS loop testers, as you can see I gave this one quite a work out over the years. The model 77 was four times larger, used an external controller, and building printer, all this one does is provide a LED display. -jma ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Attachment Converted: "c:\documents and settings\james m. atkinson\application data\qualcomm\eudora\attach\MCS Detected.JPG"X-Symantec-TimeoutProtection: 0 X-Symantec-TimeoutProtection: 1 Received: from [172.28.128.25] ([172.28.128.25]:33425 "EHLO ip02.ams.ftl.affinity.com") by ams006.ftl.affinity.com with ESMTP id S359433AbXKQGG5; Sat, 17 Nov 2007 01:06:57 -0500 Received: from py-out-1314.google.com ([64.233.166.174]) by ip02.ams.ftl.affinity.com with ESMTP; 17 Nov 2007 01:05:45 -0500 Received: by py-out-1314.google.com with SMTP id u10so4322616pyb for ; Fri, 16 Nov 2007 22:05:43 -0800 (PST) Received: by 10.140.188.10 with SMTP id l10mr137814rvf.1195279525856; Fri, 16 Nov 2007 22:05:25 -0800 (PST) Received: by 10.107.100.4 with SMTP id c4gr2119prm; Fri, 16 Nov 2007 22:05:11 -0800 (PST) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.124.20 with SMTP id b20mr3691179pyn.1195279505603; Fri, 16 Nov 2007 22:05:05 -0800 (PST) Received: from swip006.ftl.affinity.com (lvs00-fl-swip006.ftl.affinity.com [216.219.253.16]) by mx.google.com with ESMTP id x35si2664206nzg.2007.11.16.22.04.58; Fri, 16 Nov 2007 22:05:05 -0800 (PST) Received-SPF: neutral (google.com: 216.219.253.16 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.16; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.16 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [71.243.12.197] ([71.243.12.197]:21188 "EHLO Raphael.tscm.com") by swip006.ftl.affinity.com with ESMTP id S363238AbXKQGE5 (ORCPT ); Sat, 17 Nov 2007 01:04:57 -0500 Message-Id: <7.0.1.0.2.20071116235809.22169ce8@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Sat, 17 Nov 2007 00:58:30 -0500 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] {2119} Using a Fluke 199C Scope as an Ultra High Precision TDR Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="=====================_251495375==_" Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Located a tap located 174 feet way (524 nS is 174 feet away) resolution is about a tenth of an inch. ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Attachment Converted: "c:\documents and settings\james m. atkinson\application data\qualcomm\eudora\attach\Fault at 174 ft.JPG" Attachment Converted: "c:\documents and settings\james m. atkinson\application data\qualcomm\eudora\attach\DSCN2051.JPG"X-Symantec-TimeoutProtection: 0 Received: from [172.28.128.25] ([172.28.128.25]:50796 "EHLO ip02.ams.ftl.affinity.com") by ams008.ftl.affinity.com with ESMTP id S408700AbXKQG0v; Sat, 17 Nov 2007 01:26:51 -0500 Received: from wa-out-0708.google.com ([209.85.146.240]) by ip02.ams.ftl.affinity.com with ESMTP; 17 Nov 2007 01:20:04 -0500 Received: by wa-out-0708.google.com with SMTP id j19so1421540waf for ; Fri, 16 Nov 2007 22:20:02 -0800 (PST) Received: by 10.114.78.1 with SMTP id a1mr170657wab.1195280391740; Fri, 16 Nov 2007 22:19:51 -0800 (PST) Received: by 10.107.114.37 with SMTP id r37gr2120prm; Fri, 16 Nov 2007 22:19:42 -0800 (PST) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.11.1 with SMTP id o1mr3701527pyi.1195280380272; Fri, 16 Nov 2007 22:19:40 -0800 (PST) Received: from swip006.ftl.affinity.com (lvs00-fl-swip006.ftl.affinity.com [216.219.253.16]) by mx.google.com with ESMTP id h71si2680571nzf.2007.11.16.22.19.34; Fri, 16 Nov 2007 22:19:40 -0800 (PST) Received-SPF: neutral (google.com: 216.219.253.16 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.16; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.16 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [71.243.12.197] ([71.243.12.197]:37060 "EHLO Raphael.tscm.com") by swip006.ftl.affinity.com with ESMTP id S360114AbXKQGTc (ORCPT ); Sat, 17 Nov 2007 01:19:32 -0500 Message-Id: <7.0.1.0.2.20071117005908.13586cc0@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Sat, 17 Nov 2007 01:03:42 -0500 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] {2120} Using the Fluke 199C as a Microwave Spectrum Analyzer to 1 GHz. Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="=====================_252395812==_" Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Here is the FLuke 199C being used in SA mode after an "anomaly" was seen 174 feet away. I dropped the scope into SA mode and isolated a 168 MHz transmitter hidden in the demarcation point (174 feet away). ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Attachment Converted: "c:\documents and settings\james m. atkinson\application data\qualcomm\eudora\attach\DSCN2090.JPG" Attachment Converted: "c:\documents and settings\james m. atkinson\application data\qualcomm\eudora\attach\DSCN2091.JPG"Received: from [172.28.128.25] ([172.28.128.25]:21686 "EHLO ip02.ams.ftl.affinity.com") by ams002.ftl.affinity.com with ESMTP id S359120AbXKRCbs; Sat, 17 Nov 2007 21:31:48 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAALIyP0fRVZLxkmdsb2JhbACBX4wdgQ4BAQEBBwQEExaBEQ Received: from wa-out-0708.google.com ([209.85.146.249]) by ip02.ams.ftl.affinity.com with ESMTP; 17 Nov 2007 21:31:47 -0500 Received: by wa-out-0708.google.com with SMTP id j19so2386806waf for ; Sat, 17 Nov 2007 18:31:46 -0800 (PST) Received: by 10.115.110.6 with SMTP id n6mr260559wam.1195353097339; Sat, 17 Nov 2007 18:31:37 -0800 (PST) Received: by 10.107.94.14 with SMTP id w14gr2121prl; Sat, 17 Nov 2007 18:31:24 -0800 (PST) X-Sender: bip@terranet.ro X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.126.2 with SMTP id d2mr3785445pyn.1195289047891; Sat, 17 Nov 2007 00:44:07 -0800 (PST) Received: from mail.terranet.ro (mx1.terranet.ro [194.176.189.7]) by mx.google.com with ESMTP id x35si2697536nzg.2007.11.17.00.44.06; Sat, 17 Nov 2007 00:44:07 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of bip@terranet.ro designates 194.176.189.7 as permitted sender) client-ip=194.176.189.7; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of bip@terranet.ro designates 194.176.189.7 as permitted sender) smtp.mail=bip@terranet.ro Message-Id: <473ea9d7.23e1240a.4f1f.570cSMTPIN_ADDED@mx.google.com> Received: (qmail 8346 invoked from network); 17 Nov 2007 10:44:02 +0200 Received: from unknown (HELO Sony1.terranet.ro) (80.96.218.26) by 0 with (DHE-RSA-AES256-SHA encrypted) SMTP; 17 Nov 2007 10:44:02 +0200 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Sat, 17 Nov 2007 10:44:07 +0200 To: TSCM-L2006@googlegroups.com From: Cristian Subject: [TSCM-L] {2121} Re: Using the Fluke 199C as a Microwave Spectrum Analyzer to 1 GHz. In-Reply-To: <7.0.1.0.2.20071117005908.13586cc0@tscm.com> References: <7.0.1.0.2.20071117005908.13586cc0@tscm.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Google-Approved: grainger01982@gmail.com via web at 2007-11-18 02:31:23 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , At 08:03 AM 11/17/2007, you wrote: >Here is the FLuke 199C being used in SA mode after an "anomaly" was >seen 174 feet away. I dropped the scope into SA mode and isolated a >168 MHz transmitter hidden in the demarcation point (174 feet away). > >- No SA Mode found in its specs. Let me know more, please. Cristian --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:45021 "EHLO ip03.ams.ftl.affinity.com") by ams009.ftl.affinity.com with ESMTP id S365777AbXKRD3U; Sat, 17 Nov 2007 22:29:20 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAANI/P0fRVZL2kmdsb2JhbACPDAEBAQEHBAQpgRE Received: from wa-out-0708.google.com ([209.85.146.246]) by ip03.ams.ftl.affinity.com with ESMTP; 17 Nov 2007 22:29:19 -0500 Received: by wa-out-0708.google.com with SMTP id j19so2432981waf for ; Sat, 17 Nov 2007 19:29:18 -0800 (PST) Received: by 10.114.108.15 with SMTP id g15mr363296wac.1195355902889; Sat, 17 Nov 2007 19:18:22 -0800 (PST) Received: by 10.107.115.27 with SMTP id s27gr2122prm; Sat, 17 Nov 2007 19:18:12 -0800 (PST) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.126.2 with SMTP id d2mr4948614pyn.1195355888409; Sat, 17 Nov 2007 19:18:08 -0800 (PST) Received: from swip001.ftl.affinity.com (lvs00-fl-swip001.ftl.affinity.com [216.219.253.11]) by mx.google.com with ESMTP id h49si3103661nzf.2007.11.17.19.18.07; Sat, 17 Nov 2007 19:18:08 -0800 (PST) Received-SPF: neutral (google.com: 216.219.253.11 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.11; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.11 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [71.243.12.197] ([71.243.12.197]:33989 "EHLO Raphael.tscm.com") by swip001.ftl.affinity.com with ESMTP id S363845AbXKRDSH (ORCPT ); Sat, 17 Nov 2007 22:18:07 -0500 Message-Id: <7.0.1.0.2.20071117215132.22515d70@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Sat, 17 Nov 2007 22:04:00 -0500 To: TSCM-L2006@googlegroups.com From: "James M. Atkinson" Subject: [TSCM-L] {2122} Re: Using the Fluke 199C as a Microwave Spectrum Analyzer to 1 GHz. In-Reply-To: <473ea9d7.23e1240a.4f1f.570cSMTPIN_ADDED@mx.google.com> References: <7.0.1.0.2.20071117005908.13586cc0@tscm.com> <473ea9d7.23e1240a.4f1f.570cSMTPIN_ADDED@mx.google.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , It is under the sub-section of the manual on waveform mathematics. It may not be in the specifications, but it is in the owners manual. You may note that the voltage levels on my readings... those are the correct voltage measurments. -jma At 03:44 AM 11/17/2007, Cristian wrote: >At 08:03 AM 11/17/2007, you wrote: > > >Here is the FLuke 199C being used in SA mode after an "anomaly" was > >seen 174 feet away. I dropped the scope into SA mode and isolated a > >168 MHz transmitter hidden in the demarcation point (174 feet away). > > > >- > >No SA Mode found in its specs. Let me know more, please. >Cristian ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- X-Symantec-TimeoutProtection: 0 Received: from [172.28.128.27] ([172.28.128.27]:6909 "EHLO ip04.ams.ftl.affinity.com") by ams014.ftl.affinity.com with ESMTP id S366353AbXKRUfZ; Sun, 18 Nov 2007 15:35:25 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAEowQEfRVZL1kmdsb2JhbAAOjwEBAQEBBwQEExaBEYUp Received: from wa-out-0708.google.com ([209.85.146.245]) by ip04.ams.ftl.affinity.com with ESMTP; 18 Nov 2007 15:35:24 -0500 Received: by wa-out-0708.google.com with SMTP id j19so3253044waf for ; Sun, 18 Nov 2007 12:35:22 -0800 (PST) Received: by 10.115.110.6 with SMTP id n6mr315599wam.1195418113719; Sun, 18 Nov 2007 12:35:13 -0800 (PST) Received: by 10.107.115.27 with SMTP id s27gr2124prm; Sun, 18 Nov 2007 12:34:59 -0800 (PST) X-Sender: sanysidrosd@yahoo.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.13.4 with SMTP id q4mr5870821pyi.1195416972258; Sun, 18 Nov 2007 12:16:12 -0800 (PST) Received: from web36505.mail.mud.yahoo.com (web36505.mail.mud.yahoo.com [209.191.85.5]) by mx.google.com with SMTP id v28si3459788nzb.2007.11.18.12.16.11; Sun, 18 Nov 2007 12:16:12 -0800 (PST) Received-SPF: pass (google.com: domain of sanysidrosd@yahoo.com designates 209.191.85.5 as permitted sender) client-ip=209.191.85.5; DomainKey-Status: good (test mode) Authentication-Results: mx.google.com; spf=pass (google.com: domain of sanysidrosd@yahoo.com designates 209.191.85.5 as permitted sender) smtp.mail=sanysidrosd@yahoo.com; domainkeys=pass (test mode) header.From=sanysidrosd@yahoo.com Received: (qmail 98484 invoked by uid 60001); 18 Nov 2007 20:16:11 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID; b=LxAcNSJBAkOD561WMjJ9lYwqLIrQdT0W7W+ijJKrNOQoXqBLGIpc3qlhCxT66y64+Z/IwLkEtE3nsxFUD+VMGyoN130W/vD6fJNpPOQptlxyrjDgACSAJIgNGjHFOB/6D+dWjLR3FMT4lSY0GX+FCkr1QKclRuQz5Sf2cy+dnig=; X-YMail-OSG: Wi2GHscVM1njlLzEn65o8qxfFcrp93keGhy9Rs0H5bg1ZX3mz1Eb6r_x_Ik0S1OK9D30OydnK4k1s1nns90OxSmUTBi_A9FzHoqGfMeijTWNqdD52r4- Received: from [72.220.66.66] by web36505.mail.mud.yahoo.com via HTTP; Sun, 18 Nov 2007 12:16:10 PST Date: Sun, 18 Nov 2007 12:16:10 -0800 (PST) From: ed eduardo Subject: [TSCM-L] {2124} Re: Using the Fluke 199C as a Microwave Spectrum Analyzer to 1 GHz. To: TSCM-L2006@googlegroups.com In-Reply-To: <7.0.1.0.2.20071117215132.22515d70@tscm.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 8bit Message-ID: <67049.98477.qm@web36505.mail.mud.yahoo.com> X-Google-Approved: grainger01982@gmail.com via web at 2007-11-18 20:34:58 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , On the subject of spectrum analyzers, does anyone on the list have any experience with Aaronia products? http://www.electrosmog.com/ --- "James M. Atkinson" wrote: > > It is under the sub-section of the manual on > waveform mathematics. > > It may not be in the specifications, but it is in > the owners manual. > > You may note that the voltage levels on my > readings... those are the > correct voltage measurments. > > -jma > > > > At 03:44 AM 11/17/2007, Cristian wrote: > > >At 08:03 AM 11/17/2007, you wrote: > > > > >Here is the FLuke 199C being used in SA mode > after an "anomaly" was > > >seen 174 feet away. I dropped the scope into SA > mode and isolated a > > >168 MHz transmitter hidden in the demarcation > point (174 feet away). > > > > > >- > > > >No SA Mode found in its specs. Let me know more, > please. > >Cristian > > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent > Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson > Phone: (978) 381-9111 > Granite Island Group Fax: > > 127 Eastern Avenue #291 Web: > http://www.tscm.com/ > Gloucester, MA 01931-8008 E-mail: > mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > We perform bug sweeps like it's a full contact > sport, we take no prisoners, > and we give no quarter. Our goal is to simply, and > completely stop the spy. > ---------------------------------------------------------------------------------------------------- > > > > > > > CONFIDENTIALITY NOTICE - This e-mail transmission and any documents, files or previous e-mail messages attached to it, may contain information that is confidential or legally privileged. If you are not the intended recipient, or a person responsible for delivering it to the intended recipient, you are hereby notified that you must not read or print this transmission and that any disclosure, copying, printing, distribution or use of any of the information contained in or attached to this transmission is STRICTLY PROHIBITED. If you have received this transmission in error, please immediately notify the sender by telephone or return e-mail and delete the original transmission and its attachments without reading or saving in any manner. ____________________________________________________________________________________ Never miss a thing. Make Yahoo your home page. http://www.yahoo.com/r/hs --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- X-Symantec-TimeoutProtection: 0 Received: from [172.28.128.24] ([172.28.128.24]:18299 "EHLO ip01.ams.ftl.affinity.com") by ams008.ftl.affinity.com with ESMTP id S370029AbXKRVfM; Sun, 18 Nov 2007 16:35:12 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAA8/QEdA6bj4kGdsb2JhbACCOzWMHwEBAQEHBAYREQWBEQ Received: from wr-out-0708.google.com ([64.233.184.248]) by ip01.ams.ftl.affinity.com with ESMTP; 18 Nov 2007 16:35:12 -0500 Received: by wr-out-0708.google.com with SMTP id 28so2478352wra for ; Sun, 18 Nov 2007 13:35:11 -0800 (PST) Received: by 10.90.30.19 with SMTP id d19mr224234agd.1195421702593; Sun, 18 Nov 2007 13:35:02 -0800 (PST) Received: by 10.107.114.37 with SMTP id r37gr2125prm; Sun, 18 Nov 2007 13:34:55 -0800 (PST) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.11.1 with SMTP id o1mr5972850pyi.1195421695381; Sun, 18 Nov 2007 13:34:55 -0800 (PST) Received: from swip007.ftl.affinity.com (lvs00-fl-swip007.ftl.affinity.com [216.219.253.17]) by mx.google.com with ESMTP id v28si3490897nzb.2007.11.18.13.34.54; Sun, 18 Nov 2007 13:34:55 -0800 (PST) Received-SPF: neutral (google.com: 216.219.253.17 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.17; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.17 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [71.243.12.197] ([71.243.12.197]:19654 "EHLO Raphael.tscm.com") by swip007.ftl.affinity.com with ESMTP id S360512AbXKRVex (ORCPT ); Sun, 18 Nov 2007 16:34:53 -0500 Message-Id: <7.0.1.0.2.20071118155113.15376570@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Sun, 18 Nov 2007 16:22:21 -0500 To: TSCM-L2006@googlegroups.com From: "James M. Atkinson" Subject: [TSCM-L] {2125} Re: Using a Fluke 199C Scope as an Ultra High Precision TDR In-Reply-To: <4412F3E7-0232-4D8E-9237-3783AD48193C@bigpond.net.au> References: <7.0.1.0.2.20071116235809.22169ce8@tscm.com> <4412F3E7-0232-4D8E-9237-3783AD48193C@bigpond.net.au> Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="=====================_393717875==.ALT" Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , I used a Fluke TS100 Numeric TDR as a pulse generator for "gross" detection of items of interest, and a Pico Second Pulse Labs (PPSL) tunnel diode for "fine tuning" on the anomalies.

I suggest that you start with the TS100, they are only a couple of hundred dollars each. I prefer Fluke part number 26500500 with the right angle bed of nails)

http://www.flukenetworks.com/FNet/en-us/findit?Document=2631486


Also, the PPSL product I recommend (you need to swap modules based on what you observe with the TS100 and scope):

http://www.picosecond.com/product/product.asp?prod_id=120

I have had really good results in just using the TS100 with a high bandwidth scope like the Fluke 199C.


-jma

PS: Join my Linkedin network:
http://www.linkedin.com/in/jamesmatkinson





At 04:25 AM 11/18/2007, Michael Dever wrote:

Jim

What were you using as an pulse generator?

Regards
Mike
On 17 Nov 2007, at 16:58, James M. Atkinson wrote:


Located a tap located 174 feet way (524 nS is 174 feet away)
resolution is about a tenth of an inch.


----------------------------------------------------------------------------------------------------
   World Class, Professional, Ethical, and Competent Bug Sweeps, and
Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
----------------------------------------------------------------------------------------------------
  James M. Atkinson                              Phone:  (978) 381-9111
  Granite Island Group                          Fax:     
  127 Eastern Avenue #291                 Web:    http://www.tscm.com/
  Gloucester, MA 01931-8008              E-mail:  mailto:jmatk@tscm.com
----------------------------------------------------------------------------------------------------
  We perform bug sweeps like it's a full contact sport, we take no prisoners,
and we give no quarter. Our goal is to simply, and completely stop the spy.
----------------------------------------------------------------------------------------------------



<Fault at 174 ft.JPG>
<DSCN2051.JPG>



Michael J. Dever CPP PSP

Dever Clark + Associates
GPO Box 1163
Canberra ACT 2601
Australia

Voice: +612 6254 5337
Mobile: +61419 252 839
Email: dca@bigpond.net.au

This message is sent in strict confidence for the addressee(s) only. 
It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee.
Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission.




----------------------------------------------------------------------------------------------------
  World Class, Professional, Ethical, and Competent Bug Sweeps, and
Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
----------------------------------------------------------------------------------------------------
 James M. Atkinson                              Phone:  (978) 381-9111
 Granite Island Group                          Fax:     
 127 Eastern Avenue #291                 Web:    http://www.tscm.com/
 Gloucester, MA 01931-8008              E-mail:  mailto:jmatk@tscm.com
----------------------------------------------------------------------------------------------------
 We perform bug sweeps like it's a full contact sport, we take no prisoners,
and we give no quarter. Our goal is to simply, and completely stop the spy.
----------------------------------------------------------------------------------------------------


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.26] ([172.28.128.26]:39663 "EHLO ip03.ams.ftl.affinity.com") by ams006.ftl.affinity.com with ESMTP id S372193AbXKSBKe; Sun, 18 Nov 2007 20:10:34 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAK9xQEdA6aL7kGdsb2JhbACCOzWMHwEBAQEHBAYREQWBEQ Received: from nz-out-0708.google.com ([64.233.162.251]) by ip03.ams.ftl.affinity.com with ESMTP; 18 Nov 2007 20:10:34 -0500 Received: by nz-out-0708.google.com with SMTP id h28so837879nzf for ; Sun, 18 Nov 2007 17:10:33 -0800 (PST) Received: by 10.100.167.3 with SMTP id p3mr185071ane.1195434624224; Sun, 18 Nov 2007 17:10:24 -0800 (PST) Received: by 10.106.179.39 with SMTP id b39gr2126prf; Sun, 18 Nov 2007 17:10:18 -0800 (PST) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.35.11.1 with SMTP id o1mr6249303pyi.1195434618128; Sun, 18 Nov 2007 17:10:18 -0800 (PST) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id h71si3581809nzf.2007.11.18.17.10.17; Sun, 18 Nov 2007 17:10:18 -0800 (PST) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id 03DB6503C73F3 for ; Sun, 18 Nov 2007 20:10:17 -0500 (EST) Message-ID: <4740E149.5060509@phreaker.net> Date: Sun, 18 Nov 2007 20:05:13 -0500 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.9 (Windows/20071031) Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="------------010001040000090706040800" To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2126} Re: Using the Fluke 199C as a Microwave Spectrum Analyzer to 1 GHz. References: <67049.98477.qm@web36505.mail.mud.yahoo.com> In-Reply-To: <67049.98477.qm@web36505.mail.mud.yahoo.com> X-AAC-KTE-LTE-MailScanner-Watermark: 1196039114.59409@HcGJSwC5pxU3bI1zsmTEkw Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Who's their US outlet? Im interested.

ed eduardo wrote:

On the subject of spectrum analyzers, does anyone on
the list have any experience with Aaronia products?
http://www.electrosmog.com/


--- "James M. Atkinson" <jmatk@tscm.com> wrote:

  
It is under the sub-section of the manual on
waveform mathematics.

It may not be in the specifications, but it is in
the owners manual.

You may note that the voltage levels on my
readings... those are the 
correct voltage measurments.

-jma



At 03:44 AM 11/17/2007, Cristian wrote:

    
At 08:03 AM 11/17/2007, you wrote:

      
Here is the FLuke 199C being used in SA mode
        
after an "anomaly" was
    
seen 174 feet away. I dropped the scope into SA
        
mode and isolated a
    
168 MHz  transmitter hidden in the demarcation
        
point (174 feet away).
    
-
        
No SA Mode found in its specs. Let me know more,
      
please.
    
Cristian
      
    
----------------------------------------------------------------------------------------------------
  
   World Class, Professional, Ethical, and Competent
Bug Sweeps, and
Wiretap Detection using Sophisticated Laboratory
Grade Test Equipment.

    
----------------------------------------------------------------------------------------------------
  
  James M. Atkinson                             
Phone:  (978) 381-9111
  Granite Island Group                          Fax:
     
  127 Eastern Avenue #291                 Web:   
http://www.tscm.com/
  Gloucester, MA 01931-8008              E-mail: 
mailto:jmatk@tscm.com

    
----------------------------------------------------------------------------------------------------
  
  We perform bug sweeps like it's a full contact
sport, we take no prisoners,
and we give no quarter. Our goal is to simply, and
completely stop the spy.

    
----------------------------------------------------------------------------------------------------
  





    


CONFIDENTIALITY NOTICE - This e-mail transmission and any documents, files or previous e-mail messages attached to it, may contain information that is confidential or legally privileged.  If you are not the intended recipient, or a person responsible for delivering it to the intended recipient, you are hereby notified that you must not read or print this transmission and that any disclosure, copying, printing, distribution or use of any of the information contained in or attached to this transmission is STRICTLY PROHIBITED.  If you have received this transmission in error, please immediately notify the sender by telephone or return e-mail and delete the original transmission and its attachments without reading or saving in any manner.


      ____________________________________________________________________________________
Never miss a thing.  Make Yahoo your home page. 
http://www.yahoo.com/r/hs



  

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

X-Symantec-TimeoutProtection: 0 Received: from [172.28.128.25] ([172.28.128.25]:65084 "EHLO ip02.ams.ftl.affinity.com") by ams015.ftl.affinity.com with ESMTP id S478706AbXKSMoY; Mon, 19 Nov 2007 07:44:24 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAADoUQUdC+Vyig2dsb2JhbACOHXMBAQEIAgIGJ4ER Received: from ug-out-1516.google.com ([66.249.92.162]) by ip02.ams.ftl.affinity.com with ESMTP; 19 Nov 2007 07:44:23 -0500 Received: by ug-out-1516.google.com with SMTP id k24so348437uge for ; Mon, 19 Nov 2007 04:44:22 -0800 (PST) Received: by 10.86.28.5 with SMTP id b5mr125374fgb.1195476253040; Mon, 19 Nov 2007 04:44:13 -0800 (PST) Received: by 10.107.114.37 with SMTP id r37gr2127prm; Mon, 19 Nov 2007 04:44:06 -0800 (PST) X-Sender: Ed.Steinmetz@compucom.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.16.7 with SMTP id t7mr6885456pyi.1195476242481; Mon, 19 Nov 2007 04:44:02 -0800 (PST) Received: from compucom.com (smtp3.compucom.com [204.214.144.124]) by mx.google.com with ESMTP id h71si3790512nzf.2007.11.19.04.44.01; Mon, 19 Nov 2007 04:44:02 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of Ed.Steinmetz@compucom.com designates 204.214.144.124 as permitted sender) client-ip=204.214.144.124; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of Ed.Steinmetz@compucom.com designates 204.214.144.124 as permitted sender) smtp.mail=Ed.Steinmetz@compucom.com X-SEF-Processed: 5_0_0_910__2007_11_19_06_44_01 X-SEF-F070C130-825B-46F3-B971-50832EB4867B: 1 Received: from Unknown [204.214.144.127] by CompuCom - SurfControl E-mail Filter (5.0); Mon, 19 Nov 2007 06:44:01 -0600 Received: from SP099EXV01.compucom.local ([10.17.6.220]) by SP099EXW01.compucom.local with Microsoft SMTPSVC(6.0.3790.3959); Mon, 19 Nov 2007 06:44:01 -0600 x-mimeole: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Subject: [TSCM-L] {2127} Re: Using the Fluke 199C as a Microwave Spectrum Analyzer to 1 GHz. Date: Mon, 19 Nov 2007 06:44:00 -0600 Message-ID: <05226F788C3E6046B9F592CDC49956781BB929@SP099EXV01.compucom.local> In-Reply-To: <67049.98477.qm@web36505.mail.mud.yahoo.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [TSCM-L] {2124} Re: Using the Fluke 199C as a Microwave Spectrum Analyzer to 1 GHz. Thread-Index: AcgqKvFoDwRSgLtJQKKCWNSLZb2iQQAfSmDA From: To: X-OriginalArrivalTime: 19 Nov 2007 12:44:01.0162 (UTC) FILETIME=[DC29B6A0:01C82AA9] Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , I recently used the Biconical antenna on two sweeps with the Audiotel M2 Harmonic Receiver and their spectrum analysis software. The signal strength increased significantly over the stock whip antenna. The client (Federal Gvmt.) was impressed. I have the Log Periodic, but have not had the opportunity to test. The following is a contact that was very helpful. Keep the time difference in mind. My German is bad, however their English was better, and communications was not an issue. Mit freundlichen Gr¸flen / With best regards Manuel Pinten Aaronia AG Gewerbegebiet Aaronia AG DE-54597 Euscheid, Germany Tel./Phone: ++49(0)6556-93033 Fax: ++49(0)6556-93034 mail: MP@aaronia.de URL: www.aaronia.de Regards Ed Steinmetz www.tscm-sweeps.com -----Original Message----- From: TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com] On Behalf Of ed eduardo Sent: Sunday, November 18, 2007 3:16 PM To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2124} Re: Using the Fluke 199C as a Microwave Spectrum Analyzer to 1 GHz. On the subject of spectrum analyzers, does anyone on the list have any experience with Aaronia products? http://www.electrosmog.com/ --- "James M. Atkinson" wrote: > > It is under the sub-section of the manual on > waveform mathematics. > > It may not be in the specifications, but it is in > the owners manual. > > You may note that the voltage levels on my > readings... those are the > correct voltage measurments. > > -jma > > > > At 03:44 AM 11/17/2007, Cristian wrote: > > >At 08:03 AM 11/17/2007, you wrote: > > > > >Here is the FLuke 199C being used in SA mode > after an "anomaly" was > > >seen 174 feet away. I dropped the scope into SA > mode and isolated a > > >168 MHz transmitter hidden in the demarcation > point (174 feet away). > > > > > >- > > > >No SA Mode found in its specs. Let me know more, > please. > >Cristian > > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent > Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson > Phone: (978) 381-9111 > Granite Island Group Fax: > > 127 Eastern Avenue #291 Web: > http://www.tscm.com/ > Gloucester, MA 01931-8008 E-mail: > mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > We perform bug sweeps like it's a full contact > sport, we take no prisoners, > and we give no quarter. Our goal is to simply, and > completely stop the spy. > ---------------------------------------------------------------------------------------------------- > > > > > > > CONFIDENTIALITY NOTICE - This e-mail transmission and any documents, files or previous e-mail messages attached to it, may contain information that is confidential or legally privileged. If you are not the intended recipient, or a person responsible for delivering it to the intended recipient, you are hereby notified that you must not read or print this transmission and that any disclosure, copying, printing, distribution or use of any of the information contained in or attached to this transmission is STRICTLY PROHIBITED. If you have received this transmission in error, please immediately notify the sender by telephone or return e-mail and delete the original transmission and its attachments without reading or saving in any manner. ____________________________________________________________________________________ Never miss a thing. Make Yahoo your home page. http://www.yahoo.com/r/hs --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.25] ([172.28.128.25]:12212 "EHLO ip02.ams.ftl.affinity.com") by ams014.ftl.affinity.com with ESMTP id S373361AbXKSRH5; Mon, 19 Nov 2007 12:07:57 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAEZRQUdC+Vygkmdsb2JhbACPEQEBAQEHBAQpgRGSbA Received: from ug-out-1516.google.com ([66.249.92.160]) by ip02.ams.ftl.affinity.com with ESMTP; 19 Nov 2007 12:07:54 -0500 Received: by ug-out-1516.google.com with SMTP id k24so689645uge for ; Mon, 19 Nov 2007 09:07:53 -0800 (PST) Received: by 10.142.172.12 with SMTP id u12mr320598wfe.1195486548369; Mon, 19 Nov 2007 07:35:48 -0800 (PST) Received: by 10.107.114.37 with SMTP id r37gr2128prm; Mon, 19 Nov 2007 07:35:41 -0800 (PST) X-Sender: mitchd@tscmusa.com X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.35.11.1 with SMTP id o1mr7136119pyi.1195486540542; Mon, 19 Nov 2007 07:35:40 -0800 (PST) Received: from QMTA03.emeryville.ca.mail.comcast.net (qmta03.emeryville.ca.mail.comcast.net [76.96.30.32]) by mx.google.com with ESMTP id h49si3879341nzf.2007.11.19.07.35.40; Mon, 19 Nov 2007 07:35:40 -0800 (PST) Received-SPF: softfail (google.com: domain of transitioning mitchd@tscmusa.com does not designate 76.96.30.32 as permitted sender) client-ip=76.96.30.32; Authentication-Results: mx.google.com; spf=softfail (google.com: domain of transitioning mitchd@tscmusa.com does not designate 76.96.30.32 as permitted sender) smtp.mail=mitchd@tscmusa.com Received: from OMTA10.emeryville.ca.mail.comcast.net ([76.96.30.28]) by QMTA03.emeryville.ca.mail.comcast.net with comcast id Eej41Y00b0cQ2SL0A08o00; Mon, 19 Nov 2007 15:35:42 +0000 Received: from oem ([69.245.41.186]) by OMTA10.emeryville.ca.mail.comcast.net with comcast id Efbh1Y00C40zmf10800000; Mon, 19 Nov 2007 15:35:42 +0000 X-Authority-Analysis: v=1.0 c=1 a=qJIppwqyAAAA:8 a=5cOVQXRDPpUP5FkZ0ZEA:9 a=cfgtPtgpnb2tXpUB3e8A:7 a=24JSy_1pj4enE_vT1_n01cyAuIoA:4 a=0jCLLnicWKQA:10 a=-YMT9ByFx74A:10 a=nmQGXI8m9vMA:10 a=C4M2EkW3NhQA:10 a=IwIrZ5zFdMAA:10 a=eHaSlhIXOnoA:10 From: "TSCM/SO Group" To: Subject: [TSCM-L] {2128} Avcom PSA 65A For Sale Date: Mon, 19 Nov 2007 09:35:39 -0600 Message-ID: <006b01c82ac1$d6b88210$6501a8c0@oem> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Mailer: Microsoft Office Outlook 11 Thread-Index: Acgqwc6q1YwfE7MFQV+xpRGz5jdgew== x-mimeole: Produced By Microsoft MimeOLE V6.00.2900.3198 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Fall Cleanup: I have an Avcom PSA 65A with a 2ghz frequency extender for sale, comes with the bound original manual, soft case, has demodulation feature, is in pristine condition. This unit is a good entry level spec A. Other units one will find on a net search donít include the frequency extender which originally sold for @ 700.00 Am asking $1500.00 for The PSA 65A.Does not include shipping or insurance The Avcom PSA-65A Portable Microwave Spectrum Analyzer covers a frequency range from less than 2 MHz to 1000 MHz. The broad frequency coverage and high sensitivity of the PSA-65A make it ideal wherever a low cost, compact spectrum analyzer is needed. The lightweight, battery or line operated PSA-65A Portable Spectrum Analyzer from Avcom is the perfect instrument for field testing of RF systems, classroom instruction, satellite system alignment, electronic countermeasures, cable TV maintenance, cellular and production use ï 2 MHz to 1000 MHz in One Sweep† ï 75 KHz Resolution BW, 10 KHz included ï Battery or Line Operated with internal charger ï †Digital Center Frequency Display ï †Frequency Accurate to .1 MHz at Zero Span ï †Includes FM Demodulator ï †-95 dBm in Sensitivity Thanks! M Mitch Davis TSCM/Special Operations Group 20 Music Square West,Suite 208 Nashville,TN 37203 USA 615 251 0441 Fax 615 523 0300 mitchd@tscmusa.com www.tscmusa.com "maintaining a higher degree of excellence" ****************************** CONFIDENTIALITY NOTICE: This communication may contain privileged or other confidential information, protected from disclosure under applicable law. If you are not the intended recipient, or the employee or agent responsible for delivering the message to the intended recipient, or if you believe that you have received this communication in error, please do not print, copy, retransmit, disseminate, or otherwise use the information contained herein. Also, please indicate to the sender that you have received this e-mail in error, and delete the copy you have received. Thank you. † --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:23134 "EHLO ip04.ams.ftl.affinity.com") by ams011.ftl.affinity.com with ESMTP id S389329AbXKSPfy; Mon, 19 Nov 2007 10:35:54 -0500 Received: from wr-out-0708.google.com ([64.233.184.251]) by ip04.ams.ftl.affinity.com with ESMTP; 19 Nov 2007 10:35:54 -0500 Received: by wr-out-0708.google.com with SMTP id 28so3695611wra for ; Mon, 19 Nov 2007 07:35:53 -0800 (PST) Received: by 10.90.30.19 with SMTP id d19mr254597agd.1195486544602; Mon, 19 Nov 2007 07:35:44 -0800 (PST) Received: by 10.107.114.28 with SMTP id r28gr2129prm; Mon, 19 Nov 2007 07:35:41 -0800 (PST) X-Sender: mitchd@tscmusa.com X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.35.126.2 with SMTP id d2mr7137410pyn.1195486540796; Mon, 19 Nov 2007 07:35:40 -0800 (PST) Received: from QMTA07.emeryville.ca.mail.comcast.net (qmta07.emeryville.ca.mail.comcast.net [76.96.30.64]) by mx.google.com with ESMTP id h49si3879347nzf.2007.11.19.07.35.40; Mon, 19 Nov 2007 07:35:40 -0800 (PST) Received-SPF: softfail (google.com: domain of transitioning mitchd@tscmusa.com does not designate 76.96.30.64 as permitted sender) client-ip=76.96.30.64; Authentication-Results: mx.google.com; spf=softfail (google.com: domain of transitioning mitchd@tscmusa.com does not designate 76.96.30.64 as permitted sender) smtp.mail=mitchd@tscmusa.com Received: from OMTA10.emeryville.ca.mail.comcast.net ([76.96.30.28]) by QMTA07.emeryville.ca.mail.comcast.net with comcast id Eehv1Y00E0cQ2SL0A07u00; Mon, 19 Nov 2007 15:35:43 +0000 Received: from oem ([69.245.41.186]) by OMTA10.emeryville.ca.mail.comcast.net with comcast id Efbh1Y00C40zmf10800100; Mon, 19 Nov 2007 15:35:42 +0000 X-Authority-Analysis: v=1.0 c=1 a=yKn-mvkcAAAA:8 a=pENQs1B3B_4i9qLsZxYA:9 a=RhOnJ8zTXQFdNfd2G18A:7 a=asx7fm1Q8T5cSuvIWtK_ilCTJWwA:4 a=c5zHXd76wwQA:10 From: "TSCM/SO Group" To: Subject: [TSCM-L] {2129} Boeing bosses spy on workers Date: Mon, 19 Nov 2007 09:35:39 -0600 Message-ID: <006c01c82ac1$d704cd50$6501a8c0@oem> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Mailer: Microsoft Office Outlook 11 Thread-Index: Acgqf7qbeRvnLmTWSGyU52eh5tihiQAPvlXg x-mimeole: Produced By Microsoft MimeOLE V6.00.2900.3198 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Subject: [ISN] Boeing bosses spy on workers http://seattlepi.nwsource.com/business/339881_boeingsurveillance16.html By Andrea James P-I Reporter November 16, 2007 Within its bowels, The Boeing Co. holds volumes of proprietary information deemed so valuable that the company has entire teams dedicated to making sure that private information stays private. One such team, dubbed "enterprise" investigators, has permission to read the private e-mails of employees, follow them and collect video footage or photos of them. Investigators can also secretly watch employee computer screens in real time and reproduce every keystroke a worker makes, the Seattle P-I has learned. For years, Boeing workers have held suspicions about being surveilled, according to a long history of P-I contact with sources, but at least three people familiar with investigation tactics have recently confirmed them. One company source said some employees have raised internal inquiries about whether their rights were violated. Sometimes, instead of going to court over a grievance on an investigation, Boeing and the employee reach a financial settlement. The settlement almost always requires people involved to sign non-disclosure agreements, the source said. Boeing desires to keep investigation details under wraps. "We will not discuss specifics of internal investigations with the media," it said in a written response to P-I questions. "Issues that necessitate investigation in order to protect the company's interests and those of its employees and other stakeholders are handled consistent with all applicable laws." But the tactics used by Washington's largest employer raise questions about where an employee's rights begin and the employer's end, and how much leeway any corporation has in investigating an employee if it suspects wrongdoing. A recent case at another large company highlighted that investigations can go too far. In 2006, a scandal erupted at Hewlett-Packard after the company investigated leaks from its board of directors. The company was ordered to pay $14.5 million and to bring its internal investigations into compliance with laws in California, the company's home state. The investigation included reviews of internal e-mails and instant messages, the physical surveillance of a board member and at least one journalist, and the illegal use of deception to obtain telephone records of employees and journalists. For its part, Boeing says that it has multiple internal organizations that provide checks and balances "to ensure these investigations are conducted properly and in accordance with established company and legal guidelines. We do not comment on individual cases or specific investigation activities." An employee is tailed Recently, a Boeing investigator told a Puget Sound-area employee that he was followed off company property to a lunch spot, that investigators had footage of him "coming and going" and that investigators had accessed his personal Gmail account. The primary reason for the 2007 investigation, the employee said, was Boeing's suspicion that he had spoken with a member of the media. The employee learned the details of the investigation during a three-hour meeting, in which investigators laid out some of their findings. He has since been fired. That particular investigation was connected with a July article in the P-I that brought to light Boeing's struggles complying with a 2002 corporate reform law and cited unnamed sources and internal company documents. "I wasn't surprised, but more just disappointed in them, that instead of looking at the problems, instead of investigating that, they investigated the people that were complaining and got rid of them," said the employee, who had been an auditor in the company's Office of Internal Governance and asked that he not be named. "It's not quite indentured servitude, because you can quit, but when you look at the mortgages and car payments, especially in Seattle, you're not exactly free," said the surveilled former employee. Experts say that tailing employees -- though surprising -- is usually legal, and that corporations have many options at their disposal to monitor employees. An investigator can do most things short of breaking into someone's home. For example, under Washington's stalking law, licensed private investigators "acting within the capacity of his or her license" are allowed to repeatedly follow a person. Boeing's internal investigators are exempt under state law from having to obtain a private investigator license, but contracted investigators must hold licenses. "It's worse than you can possibly imagine," said Ed Mierzwinski, consumer program director at the federation of Public Interest Research Groups. "Employees should understand that the law generally gives employers broad authority to conduct surveillance, whether through e-mail, video cameras or other forms of tracking, including off the job in many cases." The law grants companies the right to protect themselves from employees who break the law, such as by embezzling money or using the company warehouse to run a drug-smuggling ring. The problem, Mierzwinski said, is when companies use the surveillance tactics available to them to root out whistle-blowers. "We need greater whistle-blower protections," he said. But, "if you're using the company's resources and you think it's protected because you're using Hotmail, think again." Privacy laws ask whether a reasonable person would be outraged by a particular act; reasonableness is an oft-cited concept in law, explained Bill Covington, a University of Washington professor on technology law and public policy. Washington is a "will-to-work" state, meaning employees can be fired without reason, he added. "We cannot write laws that cover every circumstance," he said. "A jury can apply a community standard of what they deem to be fair and right. There are just too many other situations." Unfortunately, the public itself does not know what it wants, he said. "I don't think we have made up our mind which way we want to go with these particular laws," Covington said. "You are having a classic clash between business ... and privacy groups." You are being watched So when does privacy begin? When an employee steps across the threshold into his or her own home, experts say. "The only thing your boss can't do is listen to personal telephone calls; that's covered by wiretapping laws," said Lewis Maltby, president of the National Workrights Institute in Princeton, N.J. Companies following workers typically do so to check on the legitimacy of workers' compensation claims. A company needs to know if a worker who claims injury is actually mowing his lawn, Maltby said. It is "completely inappropriate" to trail employees to see if they are talking to reporters, he added -- but it is legal. As one expert at the American Civil Liberties Union pointed out, just as the average Joe could trail his neighbor if he wanted to, companies are allowed to trail employees. "I can't harass the person, but there's nothing that prevents me from just following him," said Doug Klunder, privacy project director at the ACLU of Washington. Klunder said that reading private e-mails is "highly questionable." Companies should be able to know that employees are checking e-mail, but should not be able to view the contents of the e-mails. "We certainly don't believe that an employer should be able to read private e-mail content just because it's accessed on a work computer," he said. However, "it's a tricky area because there aren't a lot of legal protections in Washington and in most states where we have employment-at-will. There are some privacy rights of employees, but they are limited relative to the employer." When Boeing employees sign on to the company network, a screen pops up to tell them that "to the extent permitted by law, system use and information may be monitored, recorded or disclosed and that using the system constitutes user consent to do so," according to Boeing. Rights for whistle-blowers If a corporate investigation discovers employee wrongdoing that merits discipline or dismissal, workers have little recourse, experts say. Whistle-blowers, on the other hand, are afforded more protection, but only if an investigation is deemed retaliatory. "There are no employee rights. Employees have little negotiating power," said Bill Mateja, former point man for President Bush's Corporate Fraud Task Force, formed in 2002. "Only if they're in the position of whistle-blower do they have a little more oomph." Whistle-blower cases can be dismissed for many reasons -- the employee might not have understood the law, or the employer's retaliation is not severe enough to merit fault, "or it can be that the investigation cannot prove that the adverse action was taken for the reason that was complained about," said David Mahlum, assistant regional administrator for Region 10 of the Occupational Safety and Health Administration. That agency investigates whistle-blower complaints. Robert Ellis Smith, a lawyer and the publisher of Privacy Journal, a monthly newsletter, called whistle-blower protections the "wild card" in employee protections. "Protections against electronic surveillance are virtually non-existent in the workplace," Smith said. "The one wild card for this is federal protections for whistle-blowers. Aside from that, the privacy laws are quite weak." C 1998-2007 Seattle Post-Intelligencer --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:46700 "EHLO ip03.ams.ftl.affinity.com") by ams012.ftl.affinity.com with ESMTP id S368944AbXKUCbu; Tue, 20 Nov 2007 21:31:50 -0500 Received: from wa-out-0708.google.com ([209.85.146.240]) by ip03.ams.ftl.affinity.com with ESMTP; 20 Nov 2007 21:31:37 -0500 Received: by wa-out-0708.google.com with SMTP id j19so6237684waf for ; Tue, 20 Nov 2007 18:31:32 -0800 (PST) Received: by 10.114.136.1 with SMTP id j1mr514405wad.1195611607154; Tue, 20 Nov 2007 18:20:07 -0800 (PST) Received: by 10.107.94.14 with SMTP id w14gr2130prl; Tue, 20 Nov 2007 18:19:57 -0800 (PST) X-Sender: bernies@netaxs.com X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.35.37.18 with SMTP id p18mr9590095pyj.1195597094659; Tue, 20 Nov 2007 14:18:14 -0800 (PST) Received: from newmx2.fast.net (newmx2.fast.net [209.92.1.32]) by mx.google.com with SMTP id h49si4792735nzf.2007.11.20.14.18.14; Tue, 20 Nov 2007 14:18:14 -0800 (PST) Received-SPF: neutral (google.com: 209.92.1.32 is neither permitted nor denied by best guess record for domain of bernies@netaxs.com) client-ip=209.92.1.32; Authentication-Results: mx.google.com; spf=neutral (google.com: 209.92.1.32 is neither permitted nor denied by best guess record for domain of bernies@netaxs.com) smtp.mail=bernies@netaxs.com Message-Id: <47435d26.31b8240a.0418.ffffe779SMTPIN_ADDED@mx.google.com> Received: (qmail 15107 invoked from network); 20 Nov 2007 22:18:13 -0000 Received: from unknown (HELO DBYYRR51.netaxs.com) ([209.60.99.241]) (envelope-sender ) by newmx2.fast.net (qmail-ldap-1.03) with SMTP for ; 20 Nov 2007 22:18:13 -0000 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Tue, 20 Nov 2007 17:22:13 -0500 To: TSCM-L2006@googlegroups.com From: Ed Subject: [TSCM-L] {2130} FLETC TSCM Training RFP In-Reply-To: <006c01c82ac1$d704cd50$6501a8c0@oem> References: <006c01c82ac1$d704cd50$6501a8c0@oem> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Google-Approved: grainger01982@gmail.com via web at 2007-11-21 02:19:56 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , The Department of Homeland Security seeks qualified trainers to provide courses and seminars covering counter threat, dignitary protection, defensive driving, surveillance detection and other anti-terror subjects. The multi-faceted counter threat operations training will be conducted at the Federal Law Enforcement Training Center, in Glynco, GA, on behalf of the U.S. Air Force Office of Special Investigations. Contact: Patsy Adams-Santana at 912-267-2239. Respond by November 26. --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.24] ([172.28.128.24]:62359 "EHLO ip01.ams.ftl.affinity.com") by ams003.ftl.affinity.com with ESMTP id S414459AbXKUDsy; Tue, 20 Nov 2007 22:48:54 -0500 Received: from wa-out-0708.google.com ([209.85.146.250]) by ip01.ams.ftl.affinity.com with ESMTP; 20 Nov 2007 22:48:53 -0500 Received: by wa-out-0708.google.com with SMTP id j19so6296396waf for ; Tue, 20 Nov 2007 19:48:51 -0800 (PST) Received: by 10.114.146.1 with SMTP id t1mr544356wad.1195611756627; Tue, 20 Nov 2007 18:22:36 -0800 (PST) Received: by 10.107.114.28 with SMTP id r28gr2131prm; Tue, 20 Nov 2007 18:22:30 -0800 (PST) X-Sender: tagoenii@gmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.115.73.20 with SMTP id a20mr5274449wal.1195608647705; Tue, 20 Nov 2007 17:30:47 -0800 (PST) Received: from wa-out-1112.google.com (wa-out-1112.google.com [209.85.146.179]) by mx.google.com with ESMTP id k36si10907034waf.2007.11.20.17.30.46; Tue, 20 Nov 2007 17:30:47 -0800 (PST) Received-SPF: pass (google.com: domain of tagoenii@gmail.com designates 209.85.146.179 as permitted sender) client-ip=209.85.146.179; Authentication-Results: mx.google.com; spf=pass (google.com: domain of tagoenii@gmail.com designates 209.85.146.179 as permitted sender) smtp.mail=tagoenii@gmail.com; dkim=pass (test mode) header.i=@gmail.com Received: by wa-out-1112.google.com with SMTP id j5so2651531wah for ; Tue, 20 Nov 2007 17:30:46 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; bh=qo7rdjKPvjcYK9I05perEMcdhnsuHCzI3KwSEF1WNIw=; b=bnZKQL5GW2w++C0Ujlgf5zQnZuhmSdZjk6F7VIsFfZwlRxHYtROMfLjRLxoWeRjIMVjaxG2SlLSihxGWpyaX/wCD6GNdCl9gEicXNa5/7sfy3ncFe8DuKrotm5mUTW0ej4FfZxqhpvDRzcL3Cov5JTKFkW2YlWC+s1Vyt60dOT0= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=Br3fazMSizoxgJkrFOMXeZ9cLDOPcxCUFtZdu7bnKzIfGFOy4XfRrU7IevYm4QwQYT4r/hWd3WzDqzWATSXZxP4H1b4IWaS1qyb3K18Wq7kLadaPDl6n924Ur8D4dzHRqv9JYp24ZzqE8jN2/tOVRPscdwCxKRdjuunvdd/MtwA= Received: by 10.114.75.1 with SMTP id x1mr291893waa.1195608646003; Tue, 20 Nov 2007 17:30:46 -0800 (PST) Received: by 10.114.134.16 with HTTP; Tue, 20 Nov 2007 17:30:45 -0800 (PST) Message-ID: Date: Tue, 20 Nov 2007 17:30:45 -0800 From: "nii tagoe" To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2131} Re: Avcom PSA 65A For Sale In-Reply-To: <006b01c82ac1$d6b88210$6501a8c0@oem> Mime-Version: 1.0 Content-Type: text/plain; charset=windows-1252 References: <006b01c82ac1$d6b88210$6501a8c0@oem> X-Google-Approved: grainger01982@gmail.com via web at 2007-11-21 02:22:29 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Counter Offer, Can I offer $1000 for the PSA 65A. I assume it is in pristine condition and all the manuals and software are intact. Please let me know if the counter offer is acceptable. Best Regards Nii Armah On 11/19/07, TSCM/SO Group wrote: > > Fall Cleanup: > I have an Avcom PSA 65A with a 2ghz frequency extender for sale, comes with > the bound original manual, soft case, has demodulation feature, is in > pristine condition. > This unit is a good entry level spec A. Other units one will find on a net > search don't include the frequency extender which originally sold for @ > 700.00 > > Am asking $1500.00 for The PSA 65A.Does not include shipping or insurance > > The Avcom PSA-65A Portable Microwave Spectrum Analyzer covers a frequency > range from less than 2 MHz to 1000 MHz. The broad frequency coverage and > high sensitivity of the PSA-65A make it ideal wherever a low cost, compact > spectrum analyzer is needed. The lightweight, battery or line operated > PSA-65A Portable Spectrum Analyzer from Avcom is the perfect instrument for > field testing of RF systems, classroom instruction, satellite system > alignment, electronic countermeasures, cable TV maintenance, cellular and > production use > ï 2 MHz to 1000 MHz in One Sweep > ï 75 KHz Resolution BW, 10 KHz included > ï Battery or Line Operated with internal charger > ï Digital Center Frequency Display > ï Frequency Accurate to .1 MHz at Zero Span > ï Includes FM Demodulator > ï -95 dBm in Sensitivity > > Thanks! > M > > > Mitch Davis > TSCM/Special Operations Group > 20 Music Square West,Suite 208 > Nashville,TN 37203 USA > 615 251 0441 > Fax 615 523 0300 > mitchd@tscmusa.com > www.tscmusa.com > "maintaining a higher degree of excellence" > ****************************** > > CONFIDENTIALITY NOTICE: This communication may contain privileged or other > confidential information, protected from disclosure under applicable law. If > you are not the intended recipient, or the employee or agent responsible for > delivering the message to the intended recipient, or if you believe that you > have received this communication in error, please do not print, copy, > retransmit, disseminate, or otherwise use the information contained herein. > Also, please indicate to the sender that you have received this e-mail in > error, and delete the copy you have received. Thank you. > > > > > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.24] ([172.28.128.24]:62234 "EHLO ip01.ams.ftl.affinity.com") by ams008.ftl.affinity.com with ESMTP id S371651AbXKWTdS; Fri, 23 Nov 2007 14:33:18 -0500 Received: from wr-out-0708.google.com ([64.233.184.245]) by ip01.ams.ftl.affinity.com with ESMTP; 23 Nov 2007 14:33:18 -0500 Received: by wr-out-0708.google.com with SMTP id 28so10839472wra for ; Fri, 23 Nov 2007 11:33:18 -0800 (PST) Received: by 10.100.166.10 with SMTP id o10mr380190ane.1195846389051; Fri, 23 Nov 2007 11:33:09 -0800 (PST) Received: by 10.107.65.8 with SMTP id s8gr2132prk; Fri, 23 Nov 2007 11:32:55 -0800 (PST) X-Sender: chris.cauwood@googlemail.com X-Apparently-To: TSCM-L2006@googlegroups.com Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Message-ID: Date: Fri, 23 Nov 2007 01:49:31 -0800 (PST) Received: by 10.100.168.18 with SMTP id q18mr351082ane.1195811371750; Fri, 23 Nov 2007 01:49:31 -0800 (PST) X-IP: 217.42.214.106 User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.8.1.9) Gecko/20071025 Firefox/2.0.0.9,gzip(gfe),gzip(gfe) Subject: [TSCM-L] {2132} Intel Digest From: BDEye To: TSCM-L Professionals List X-Google-Approved: grainger01982@gmail.com via web at 2007-11-23 19:32:54 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Hi I'm looking for any company/ organisation who publishes a monthly or quarterly confidential report on TSCM threats, bugs and politics which can be sold to Middle East Law Enforcement agencies Chris --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:36050 "EHLO ip03.ams.ftl.affinity.com") by ams008.ftl.affinity.com with ESMTP id S372193AbXKWTfU; Fri, 23 Nov 2007 14:35:20 -0500 Received: from wa-out-0708.google.com ([209.85.146.241]) by ip03.ams.ftl.affinity.com with ESMTP; 23 Nov 2007 14:35:20 -0500 Received: by wa-out-0708.google.com with SMTP id j19so31569waf for ; Fri, 23 Nov 2007 11:35:07 -0800 (PST) Received: by 10.142.185.13 with SMTP id i13mr592720wff.1195846498688; Fri, 23 Nov 2007 11:34:58 -0800 (PST) Received: by 10.107.114.28 with SMTP id r28gr2133prm; Fri, 23 Nov 2007 11:34:57 -0800 (PST) X-Sender: bnsmith@cogeco.ca X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.54.19 with SMTP id g19mr14406686pyk.1195835711465; Fri, 23 Nov 2007 08:35:11 -0800 (PST) Received: from fep1.cogeco.net (smtp.cogeco.net [216.221.81.25]) by mx.google.com with ESMTP id z53si7134258pyg.2007.11.23.08.35.11; Fri, 23 Nov 2007 08:35:11 -0800 (PST) Received-SPF: pass (google.com: domain of bnsmith@cogeco.ca designates 216.221.81.25 as permitted sender) client-ip=216.221.81.25; Authentication-Results: mx.google.com; spf=pass (google.com: domain of bnsmith@cogeco.ca designates 216.221.81.25 as permitted sender) smtp.mail=bnsmith@cogeco.ca Received: from files (d39-60-250.home1.cgocable.net [72.39.60.250]) by fep1.cogeco.net (Postfix) with ESMTP id DC4D1A3 for ; Fri, 23 Nov 2007 11:35:10 -0500 (EST) Date: Fri, 23 Nov 2007 10:35:00 -0600 From: lebbatdot@cogeco.ca To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2133} Boat anchors and wiretapping ... who knew Message-ID: <20071123163459.GA24358@lebbalot> Mail-Followup-To: TSCM-L2006@googlegroups.com Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 User-Agent: Mutt/1.5.9i X-Google-Approved: grainger01982@gmail.com via web at 2007-11-23 19:34:53 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Interesting on line book http://search.live.com/results.aspx?q=&scope=books#q=wiretap%22&filter=all&start=1&t=4W0o-0XOjPaexxGvEr0asw&sq=wiretap%22 --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:55139 "EHLO ip04.ams.ftl.affinity.com") by ams015.ftl.affinity.com with ESMTP id S387038AbXKWTjz; Fri, 23 Nov 2007 14:39:55 -0500 Received: from wa-out-0708.google.com ([209.85.146.243]) by ip04.ams.ftl.affinity.com with ESMTP; 23 Nov 2007 14:39:38 -0500 Received: by wa-out-0708.google.com with SMTP id j19so35479waf for ; Fri, 23 Nov 2007 11:39:34 -0800 (PST) Received: by 10.114.103.1 with SMTP id a1mr641900wac.1195846765313; Fri, 23 Nov 2007 11:39:25 -0800 (PST) Received: by 10.107.115.27 with SMTP id s27gr2134prm; Fri, 23 Nov 2007 11:39:23 -0800 (PST) X-Sender: news@investigalorenz.it X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.126.2 with SMTP id d2mr14300707pyn.1195830809403; Fri, 23 Nov 2007 07:13:29 -0800 (PST) Received: from smtpout18.attiva.biz ([85.37.16.20]) by mx.google.com with ESMTP id a28si7097284pye.2007.11.23.07.13.14; Fri, 23 Nov 2007 07:13:29 -0800 (PST) Received-SPF: error (google.com: error in processing during lookup of news@investigalorenz.it: DNS timeout) client-ip=85.37.16.20; Authentication-Results: mx.google.com; spf=temperror (google.com: error in processing during lookup of news@investigalorenz.it: DNS timeout) smtp.mail=news@investigalorenz.it Received: from FBCMFE02B08.fbc.local ([192.168.30.96]) by smtpout18.attiva.biz with Microsoft SMTPSVC(6.0.3790.1830); Fri, 23 Nov 2007 16:11:59 +0100 Received: from MASSIMO ([87.25.93.187]) by FBCMFE02B08.fbc.local with Microsoft SMTPSVC(6.0.3790.1830); Fri, 23 Nov 2007 16:11:54 +0100 Mime-Version: 1.0 Content-Type: Multipart/related; charset=iso-8859-1; boundary="------------Boundary-00=_XZSY7TH0000000000000" Message-Id: <4746EE4D.00000C.03456@MASSIMO> Date: Fri, 23 Nov 2007 16:14:21 +0100 (ora solare Europa occidentale) X-Mailer: IncrediMail (5653017) From: "Massimo Fiorini" X-FID: 79F8FDE2-E90C-4120-9A2C-E484CCFAA091 X-Priority: 3 To: Subject: [TSCM-L] {2134} GPS on cellphone Reply-To: TSCM-L2006@googlegroups.com X-OriginalArrivalTime: 23 Nov 2007 15:11:54.0641 (UTC) FILETIME=[2ED22810:01C82DE3] X-Google-Approved: grainger01982@gmail.com via web at 2007-11-23 19:39:22 Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,
Hi at all my friends,
 
In some cellphone of new generation, like Blackberry and Hp/Qtek..., there is a gps hidden
 
 
When you buy this apparate in the box or in the instruction book, there are not information about this gps, but ...
 
 
We do an upgrade firmware, by internet site of producer and ... magic moment.. now there is a icon with GPS, and this gps turn on and is possible to know the position.
 
Yes, in the electronic circuit there is the gps antenna, and other circuit for the complete function of GPS, but not the soft for to use this
 
 
Is a funny present, free, but we hope that notting can turn on this gps circuit without our autorization, for to know where we are esacty  
 
best to all
 
Massimo
 
Lorenz Detective and TSCM
Italy
 
 
Faccine GRATIS per la vostra posta elettronica - da IncrediMail! Fare clic qui!
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Embedded Content: faint_grain2.jpg: 00000001,3ee761ff,00000000,00000000 Embedded Content: elephant_it9.gif: 00000001,6dad7d93,00000000,00000000Received: from [172.28.128.27] ([172.28.128.27]:43430 "EHLO ip04.ams.ftl.affinity.com") by ams003.ftl.affinity.com with ESMTP id S1396313AbXKWVFr; Fri, 23 Nov 2007 16:05:47 -0500 Received: from wa-out-0708.google.com ([209.85.146.240]) by ip04.ams.ftl.affinity.com with ESMTP; 23 Nov 2007 16:05:41 -0500 Received: by wa-out-0708.google.com with SMTP id j19so107860waf for ; Fri, 23 Nov 2007 13:05:36 -0800 (PST) Received: by 10.114.113.1 with SMTP id l1mr651132wac.1195851926179; Fri, 23 Nov 2007 13:05:26 -0800 (PST) Received: by 10.107.94.14 with SMTP id w14gr2135prl; Fri, 23 Nov 2007 13:05:19 -0800 (PST) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.35.16.7 with SMTP id t7mr14796889pyi.1195851918561; Fri, 23 Nov 2007 13:05:18 -0800 (PST) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id h49si2070942nzf.2007.11.23.13.05.18; Fri, 23 Nov 2007 13:05:18 -0800 (PST) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id 4C03850261E64 for ; Fri, 23 Nov 2007 16:05:17 -0500 (EST) Message-ID: <47473F58.6040909@phreaker.net> Date: Fri, 23 Nov 2007 16:00:08 -0500 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.9 (Windows/20071031) Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="------------090804000006090907040506" To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2135} Cellphone Tracking Powers on Request, Secret Warrants Granted Without Probable Cause X-AAC-KTE-LTE-MailScanner-Watermark: 1196456394.91075@y+g4gfKyVASpbJEv0cst+Q Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.washingtonpost.com/wp-dyn/content/article/2007/11/22/AR2007112201444_pf.html

Federal officials are routinely asking courts to order cellphone companies to furnish real-time tracking data so they can pinpoint the whereabouts of drug traffickers, fugitives and other criminal suspects, according to judges and industry lawyers.

In some cases, judges have granted the requests without requiring the government to demonstrate that there is probable cause to believe that a crime is taking place or that the inquiry will yield evidence of a crime. Privacy advocates fear such a practice may expose average Americans to a new level of government scrutiny of their daily lives.

Such requests run counter to the Justice Department's internal recommendation that federal prosecutors seek warrants based on probable cause to obtain precise location data in private areas. The requests and orders are sealed at the government's request, so it is difficult to know how often the orders are issued or denied.

The issue is taking on greater relevance as wireless carriers are racing to offer sleek services that allow cellphone users to know with the touch of a button where their friends or families are. The companies are hoping to recoup investments they have made to meet a federal mandate to provide enhanced 911 (E911) location tracking. Sprint Nextel, for instance, boasts that its "loopt" service even sends an alert when a friend is near, "putting an end to missed connections in the mall, at the movies or around town."

With Verizon's Chaperone service, parents can set up a "geofence" around, say, a few city blocks and receive an automatic text message if their child, holding the cellphone, travels outside that area.

"Most people don't realize it, but they're carrying a tracking device in their pocket," said Kevin Bankston of the privacy advocacy group Electronic Frontier Foundation. "Cellphones can reveal very precise information about your location, and yet legal protections are very much up in the air."

In a stinging opinion this month, a federal judge in Texas denied a request by a Drug Enforcement Administration agent for data that would identify a drug trafficker's phone location by using the carrier's E911 tracking capability. E911 tracking systems read signals sent to satellites from a phone's Global Positioning System (GPS) chip or triangulated radio signals sent from phones to cell towers. Magistrate Judge Brian L. Owsley, of the Corpus Christi division of the Southern District of Texas, said the agent's affidavit failed to focus on "specifics necessary to establish probable cause, such as relevant dates, names and places."

Owsley decided to publish his opinion, which explained that the agent failed to provide "sufficient specific information to support the assertion" that the phone was being used in "criminal" activity. Instead, Owsley wrote, the agent simply alleged that the subject trafficked in narcotics and used the phone to do so. The agent stated that the DEA had " 'identified' or 'determined' certain matters," Owsley wrote, but "these identifications, determinations or revelations are not facts, but simply conclusions by the agency."

Instead of seeking warrants based on probable cause, some federal prosecutors are applying for orders based on a standard lower than probable cause derived from two statutes: the Stored Communications Act and the Pen Register Statute, according to judges and industry lawyers. The orders are typically issued by magistrate judges in U.S. district courts, who often handle applications for search warrants.

In one case last month in a southwestern state, an FBI agent obtained precise location data with a court order based on the lower standard, citing "specific and articulable facts" showing reasonable grounds to believe the data are "relevant to an ongoing criminal investigation," said Al Gidari, a partner at Perkins Coie in Seattle, who reviews data requests for carriers.

Another magistrate judge, who has denied about a dozen such requests in the past six months, said some agents attach affidavits to their applications that merely assert that the evidence offered is "consistent with the probable cause standard" of Rule 41 of the Federal Rules of Criminal Procedure. The judge spoke on condition of anonymity because of the sensitivity of the issue.

"Law enforcement routinely now requests carriers to continuously 'ping' wireless devices of suspects to locate them when a call is not being made . . . so law enforcement can triangulate the precise location of a device and [seek] the location of all associates communicating with a target," wrote Christopher Guttman-McCabe, vice president of regulatory affairs for CTIA -- the Wireless Association, in a July comment to the Federal Communications Commission. He said the "lack of a consistent legal standard for tracking a user's location has made it difficult for carriers to comply" with law enforcement agencies' demands.

Gidari, who also represents CTIA, said he has never seen such a request that was based on probable cause.

Justice Department spokesman Dean Boyd said field attorneys should follow the department's policy. "We strongly recommend that prosecutors in the field obtain a warrant based on probable cause" to get location data "in a private area not accessible to the public," he said. "When we become aware of situations where this has not occurred, we contact the field office and discuss the matter."

The phone data can home in on a target to within about 30 feet, experts said.

Federal agents used exact real-time data in October 2006 to track a serial killer in Florida who was linked to at least six murders in four states, including that of a University of Virginia graduate student, whose body was found along the Blue Ridge Parkway. The killer died in a police shooting in Florida as he was attempting to flee.

"Law enforcement has absolutely no interest in tracking the locations of law-abiding citizens. None whatsoever," Boyd said. "What we're doing is going through the courts to lawfully obtain data that will help us locate criminal targets, sometimes in cases where lives are literally hanging in the balance, such as a child abduction or serial murderer on the loose."

In many cases, orders are being issued for cell-tower site data, which are less precise than the data derived from E911 signals. While the E911 technology could possibly tell officers what building a suspect was in, cell-tower site data give an area that could range from about three to 300 square miles.

Since 2005, federal magistrate judges in at least 17 cases have denied federal requests for the less-precise cellphone tracking data absent a demonstration of probable cause that a crime is being committed. Some went out of their way to issue published opinions in these otherwise sealed cases.

"Permitting surreptitious conversion of a cellphone into a tracking device without probable cause raises serious Fourth Amendment concerns especially when the phone is in a house or other place where privacy is reasonably expected," said Judge Stephen William Smith of the Southern District of Texas, whose 2005 opinion on the matter was among the first published.

But judges in a majority of districts have ruled otherwise on this issue, Boyd said. Shortly after Smith issued his decision, a magistrate judge in the same district approved a federal request for cell-tower data without requiring probable cause. And in December 2005, Magistrate Judge Gabriel W. Gorenstein of the Southern District of New York, approving a request for cell-site data, wrote that because the government did not install the "tracking device" and the user chose to carry the phone and permit transmission of its information to a carrier, no warrant was needed.

These judges are issuing orders based on the lower standard, requiring a showing of "specific and articulable facts" showing reasonable grounds to believe the data will be "relevant and material" to a criminal investigation.

Boyd said the government believes this standard is sufficient for cell-site data. "This type of location information, which even in the best case only narrows a suspect's location to an area of several city blocks, is routinely generated, used and retained by wireless carriers in the normal course of business," he said.

The trend's secrecy is troubling, privacy advocates said. No government body tracks the number of cellphone location orders sought or obtained. Congressional oversight in this area is lacking, they said. And precise location data will be easier to get if the Federal Communication Commission adopts a Justice Department proposal to make the most detailed GPS data available automatically.

Often, Gidari said, federal agents tell a carrier they need real-time tracking data in an emergency but fail to follow up with the required court approval. Justice Department officials said to the best of their knowledge, agents are obtaining court approval unless the carriersprovide the data voluntarily.

To guard against abuse, Congress should require comprehensive reporting to the court and to Congress about how and how often the emergency authority is used, said John Morris, senior counsel for the Center for Democracy and Technology.

Staff researcher Richard Drezen contributed to this report.



--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.26] ([172.28.128.26]:11326 "EHLO ip03.ams.ftl.affinity.com") by ams016.ftl.affinity.com with ESMTP id S417632AbXKWVqS; Fri, 23 Nov 2007 16:46:18 -0500 Received: from wr-out-0708.google.com ([64.233.184.246]) by ip03.ams.ftl.affinity.com with ESMTP; 23 Nov 2007 16:46:18 -0500 Received: by wr-out-0708.google.com with SMTP id 28so10992002wra for ; Fri, 23 Nov 2007 13:46:17 -0800 (PST) Received: by 10.100.144.18 with SMTP id r18mr387193and.1195853700991; Fri, 23 Nov 2007 13:35:00 -0800 (PST) Received: by 10.107.114.37 with SMTP id r37gr2136prm; Fri, 23 Nov 2007 13:34:58 -0800 (PST) X-Sender: rvg2000@prodigy.net.mx X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.108.12 with SMTP id k12mr14794414pym.1195851266731; Fri, 23 Nov 2007 12:54:26 -0800 (PST) Received: from nlpiport09.prodigy.net.mx (nlpproxy19.prodigy.net.mx [148.235.52.19]) by mx.google.com with ESMTP id y6si2075456nzg.2007.11.23.12.54.26; Fri, 23 Nov 2007 12:54:26 -0800 (PST) Received-SPF: pass (google.com: domain of rvg2000@prodigy.net.mx designates 148.235.52.19 as permitted sender) client-ip=148.235.52.19; Authentication-Results: mx.google.com; spf=pass (google.com: domain of rvg2000@prodigy.net.mx designates 148.235.52.19 as permitted sender) smtp.mail=rvg2000@prodigy.net.mx X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: Ah4FAEDMRkeU6zRU/2dsb2JhbAA4gjsjAo1o X-IronPort-AV: E=Sophos;i="4.21,459,1188795600"; d="scan'208,217";a="66286488" Received: from nlpiport05.prodigy.net.mx ([148.235.52.84]) by nlpiport09.prodigy.net.mx with ESMTP; 23 Nov 2007 14:48:34 -0600 Received: from dsl-189-138-231-146.prod-infinitum.com.mx (HELO DADCOMPUTER) ([189.138.231.146]) by nlpiport05.prodigy.net.mx with SMTP; 23 Nov 2007 14:54:24 -0600 Message-ID: <004a01c82e45$4aabe6e0$4001a8c0@DADCOMPUTER> From: "Rogelio Villarreal G" To: References: <4746EE4D.00000C.03456@MASSIMO> Subject: [TSCM-L] {2136} Re: GPS on cellphone Date: Fri, 23 Nov 2007 14:54:10 -1200 Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0047_01C82DE0.B4995110" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3138 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 X-Google-Approved: grainger01982@gmail.com via web at 2007-11-23 21:34:57 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

On the subject of GPS and cell phones, if you do not want to be tracked you have to put it in a faraday bag (at least) which cost $30.00 bucks. 
Forget the GPS, equipment exist (Rohde $ Schwarz) that can track you cvell phonhe based on the exact RF it uses.
they have simple and very sofisticated equipment. About 400,000 euros.
 
 
I sell Intel.equipment (besides working in TSCM for the last 14 years- not much - but a good start) and so by the way cellular intercept equipment (portable) also tracks cell phones.  So the best way to not be tracked is  > turne it off >>put in faraday bag or box and hope for the best
 
Roger
Mexico 
----- Original Message -----
Sent: Friday, November 23, 2007 3:14 AM
Subject: [TSCM-L] {2134} GPS on cellphone

Hi at all my friends,
 
In some cellphone of new generation, like Blackberry and Hp/Qtek..., there is a gps hidden
 
 
When you buy this apparate in the box or in the instruction book, there are not information about this gps, but ...
 
 
We do an upgrade firmware, by internet site of producer and ... magic moment.. now there is a icon with GPS, and this gps turn on and is possible to know the position.
 
Yes, in the electronic circuit there is the gps antenna, and other circuit for the complete function of GPS, but not the soft for to use this
 
 
Is a funny present, free, but we hope that notting can turn on this gps circuit without our autorization, for to know where we are esacty  
 
best to all
 
Massimo
 
Lorenz Detective and TSCM
Italy
 
 
Faccine GRATIS per la vostra posta elettronica - da IncrediMail! Fare clic qui! --~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.26] ([172.28.128.26]:53867 "EHLO ip03.ams.ftl.affinity.com") by ams011.ftl.affinity.com with ESMTP id S366525AbXKWVfr; Fri, 23 Nov 2007 16:35:47 -0500 Received: from wa-out-0708.google.com ([209.85.146.241]) by ip03.ams.ftl.affinity.com with ESMTP; 23 Nov 2007 16:35:46 -0500 Received: by wa-out-0708.google.com with SMTP id j19so134631waf for ; Fri, 23 Nov 2007 13:35:42 -0800 (PST) Received: by 10.114.78.1 with SMTP id a1mr648828wab.1195853733254; Fri, 23 Nov 2007 13:35:33 -0800 (PST) Received: by 10.107.114.28 with SMTP id r28gr2137prm; Fri, 23 Nov 2007 13:35:20 -0800 (PST) X-Sender: rvg2000@prodigy.net.mx X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.11.1 with SMTP id o1mr14825567pyi.1195853257379; Fri, 23 Nov 2007 13:27:37 -0800 (PST) Received: from nlpiport09.prodigy.net.mx (nlpproxy19.prodigy.net.mx [148.235.52.19]) by mx.google.com with ESMTP id y6si2094342nzg.2007.11.23.13.27.37; Fri, 23 Nov 2007 13:27:37 -0800 (PST) Received-SPF: pass (google.com: domain of rvg2000@prodigy.net.mx designates 148.235.52.19 as permitted sender) client-ip=148.235.52.19; Authentication-Results: mx.google.com; spf=pass (google.com: domain of rvg2000@prodigy.net.mx designates 148.235.52.19 as permitted sender) smtp.mail=rvg2000@prodigy.net.mx X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: Ah4FAHPURkeU6zRU/2dsb2JhbAA4kEg X-IronPort-AV: E=Sophos;i="4.21,459,1188795600"; d="scan'208";a="66312381" Received: from nlpiport05.prodigy.net.mx ([148.235.52.84]) by nlpiport09.prodigy.net.mx with ESMTP; 23 Nov 2007 15:21:44 -0600 Received: from dsl-189-138-231-146.prod-infinitum.com.mx (HELO DADCOMPUTER) ([189.138.231.146]) by nlpiport05.prodigy.net.mx with SMTP; 23 Nov 2007 15:27:35 -0600 Message-ID: <005101c82e49$ed831420$4001a8c0@DADCOMPUTER> From: "Rogelio Villarreal G" To: References: Subject: [TSCM-L] {2137} Re: Intel Digest Date: Fri, 23 Nov 2007 15:27:22 -1200 Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3138 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 X-Google-Approved: grainger01982@gmail.com via web at 2007-11-23 21:35:19 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Chris Well stated, it needs to be monthly if not weekly as new bugs come out / are developed every day by some one. What I imagine most of us do is try to stay on top of the situation by constantly researching new bugs and forms of wire taping / information collection tactics, to be able to apply counter measures. If you find a monthly confidential report please let me know. Other option, send a TSCM expert to give a one week training course on Information security as much more is required than just a sweep. A sweep is just a sweep and part of the information security plan. Many other things are required. Roger ----- Original Message ----- From: "BDEye" To: "TSCM-L Professionals List" Sent: Thursday, November 22, 2007 9:49 PM Subject: [TSCM-L] {2132} Intel Digest > > Hi > > I'm looking for any company/ organisation who publishes a monthly or > quarterly confidential report on TSCM threats, bugs and politics which > can be sold to Middle East Law Enforcement agencies > > Chris > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:11527 "EHLO ip03.ams.ftl.affinity.com") by ams015.ftl.affinity.com with ESMTP id S379283AbXKWVlN; Fri, 23 Nov 2007 16:41:13 -0500 Received: from nz-out-0708.google.com ([64.233.162.247]) by ip03.ams.ftl.affinity.com with ESMTP; 23 Nov 2007 16:41:13 -0500 Received: by nz-out-0708.google.com with SMTP id h28so751867nzf for ; Fri, 23 Nov 2007 13:41:13 -0800 (PST) Received: by 10.141.71.11 with SMTP id y11mr282623rvk.1195854063786; Fri, 23 Nov 2007 13:41:03 -0800 (PST) Received: by 10.107.106.6 with SMTP id i6gr2138prm; Fri, 23 Nov 2007 13:40:59 -0800 (PST) X-Sender: preflat@psci.net X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.54.19 with SMTP id g19mr14845295pyk.1195854057300; Fri, 23 Nov 2007 13:40:57 -0800 (PST) Received: from mailstore.psci.net (ns2.psci.net [216.49.96.2]) by mx.google.com with ESMTP id 20si2121120nzu.2007.11.23.13.40.57; Fri, 23 Nov 2007 13:40:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of preflat@psci.net designates 216.49.96.2 as permitted sender) client-ip=216.49.96.2; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of preflat@psci.net designates 216.49.96.2 as permitted sender) smtp.mail=preflat@psci.net Received: from Starbase1 (adsl399-sc-psci.psci.net [216.49.115.19]) by mailstore.psci.net (8.13.5/8.13.5) with SMTP id lANLeuEt000781 for ; Fri, 23 Nov 2007 15:40:56 -0600 Message-ID: <007501c82e19$c05c6580$1d02a8c0@Starbase1> From: "Preflatish" To: References: <4746EE4D.00000C.03456@MASSIMO> <004a01c82e45$4aabe6e0$4001a8c0@DADCOMPUTER> Subject: [TSCM-L] {2138} Re: GPS on cellphone Date: Fri, 23 Nov 2007 16:42:26 -0500 Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2800.1409 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1409 X-Scanned-By: MIMEDefang 2.55 on 216.49.96.153 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Just wondering about the 'Faraday bag', I can put my cellphone inside a .45 caliber Ammo can and it will still connect to the cell site and receive calls, even when it is grounded! ----- Original Message ----- From: "Rogelio Villarreal G" To: Sent: Friday, November 23, 2007 9:54 PM Subject: [TSCM-L] {2136} Re: GPS on cellphone On the subject of GPS and cell phones, if you do not want to be tracked you have to put it in a faraday bag (at least) which cost $30.00 bucks. Forget the GPS, equipment exist (Rohde $ Schwarz) that can track you cvell phonhe based on the exact RF it uses. they have simple and very sofisticated equipment. About 400,000 euros. I sell Intel.equipment (besides working in TSCM for the last 14 years- not much - but a good start) and so by the way cellular intercept equipment (portable) also tracks cell phones. So the best way to not be tracked is > turne it off >>put in faraday bag or box and hope for the best Roger Mexico ----- Original Message ----- From: Massimo Fiorini To: TSCM-L2006@googlegroups.com Sent: Friday, November 23, 2007 3:14 AM Subject: [TSCM-L] {2134} GPS on cellphone Hi at all my friends, In some cellphone of new generation, like Blackberry and Hp/Qtek..., there is a gps hidden When you buy this apparate in the box or in the instruction book, there are not information about this gps, but ... We do an upgrade firmware, by internet site of producer and ... magic moment.. now there is a icon with GPS, and this gps turn on and is possible to know the position. Yes, in the electronic circuit there is the gps antenna, and other circuit for the complete function of GPS, but not the soft for to use this Is a funny present, free, but we hope that notting can turn on this gps circuit without our autorization, for to know where we are esacty best to all Massimo Lorenz Detective and TSCM Italy --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:26278 "EHLO ip03.ams.ftl.affinity.com") by ams009.ftl.affinity.com with ESMTP id S364220AbXKWXXP; Fri, 23 Nov 2007 18:23:15 -0500 Received: from wa-out-0708.google.com ([209.85.146.251]) by ip03.ams.ftl.affinity.com with ESMTP; 23 Nov 2007 18:23:14 -0500 Received: by wa-out-0708.google.com with SMTP id j19so225725waf for ; Fri, 23 Nov 2007 15:23:13 -0800 (PST) Received: by 10.114.136.1 with SMTP id j1mr713901wad.1195860183757; Fri, 23 Nov 2007 15:23:03 -0800 (PST) Received: by 10.107.114.37 with SMTP id r37gr2139prm; Fri, 23 Nov 2007 15:22:58 -0800 (PST) X-Sender: NoPositiveWork@aol.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.54.19 with SMTP id g19mr14987986pyk.1195860176768; Fri, 23 Nov 2007 15:22:56 -0800 (PST) Received: from imo-d21.mx.aol.com (imo-d21.mx.aol.com [205.188.144.207]) by mx.google.com with ESMTP id h49si2144511nzf.2007.11.23.15.22.56; Fri, 23 Nov 2007 15:22:56 -0800 (PST) Received-SPF: pass (google.com: domain of NoPositiveWork@aol.com designates 205.188.144.207 as permitted sender) client-ip=205.188.144.207; Authentication-Results: mx.google.com; spf=pass (google.com: domain of NoPositiveWork@aol.com designates 205.188.144.207 as permitted sender) smtp.mail=NoPositiveWork@aol.com Received: from NoPositiveWork@aol.com by imo-d21.mx.aol.com (mail_out_v38_r9.3.) id r.c18.2343bbf5 (30739) for ; Fri, 23 Nov 2007 18:22:52 -0500 (EST) From: NoPositiveWork@aol.com Message-ID: Date: Fri, 23 Nov 2007 18:22:51 EST Subject: [TSCM-L] {2139} Re: Intel Digest To: TSCM-L2006@googlegroups.com Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="-----------------------------1195860171" X-Mailer: 9.0 for Windows sub 5132 X-Spam-Flag: NO Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

In a message dated 11/23/2007 11:33:32 AM Pacific Standard Time, chris.cauwood@googlemail.com writes:
I'm looking for any company/ organisation who publishes a monthly or
quarterly confidential report on TSCM threats, bugs and politics which
can be sold to Middle East Law Enforcement agencies
 
So you're looking for someone to do the work for you?
 
 
  Those who are evil spy on the godly,
       waiting for an excuse to kill them.
    But the LORD will not let the wicked succeed
       or let the godly be condemned when they are brought before the judge.

    Psalm 37:32-33 
    NLT
 
 




Check out AOL Money & Finance's list of the hottest products and top money wasters of 2007.

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.25] ([172.28.128.25]:7134 "EHLO ip02.ams.ftl.affinity.com") by ams012.ftl.affinity.com with ESMTP id S373130AbXKXCI4; Fri, 23 Nov 2007 21:08:56 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAOEVR0fRVZL5kmdsb2JhbACCcyOMJwEBAQEHBAQpgRE Received: from wa-out-0708.google.com ([209.85.146.249]) by ip02.ams.ftl.affinity.com with ESMTP; 23 Nov 2007 21:08:53 -0500 Received: by wa-out-0708.google.com with SMTP id j19so366629waf for ; Fri, 23 Nov 2007 18:08:53 -0800 (PST) Received: by 10.114.181.1 with SMTP id d1mr201210waf.1195870123969; Fri, 23 Nov 2007 18:08:43 -0800 (PST) Received: by 10.106.179.39 with SMTP id b39gr2140prf; Fri, 23 Nov 2007 18:08:42 -0800 (PST) X-Sender: aar9sm@hotmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.114.93.17 with SMTP id q17mr7811225wab.1195854817424; Fri, 23 Nov 2007 13:53:37 -0800 (PST) Received: from bay0-omc1-s27.bay0.hotmail.com (bay0-omc1-s27.bay0.hotmail.com [65.54.246.99]) by mx.google.com with ESMTP id k36si17524694waf.2007.11.23.13.53.37; Fri, 23 Nov 2007 13:53:37 -0800 (PST) Received-SPF: pass (google.com: domain of aar9sm@hotmail.com designates 65.54.246.99 as permitted sender) client-ip=65.54.246.99; Authentication-Results: mx.google.com; spf=pass (google.com: domain of aar9sm@hotmail.com designates 65.54.246.99 as permitted sender) smtp.mail=aar9sm@hotmail.com Received: from BAY125-DS1 ([65.55.130.28]) by bay0-omc1-s27.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Fri, 23 Nov 2007 13:47:54 -0800 X-Originating-IP: [24.251.253.164] X-Originating-Email: [aar9sm@hotmail.com] Message-ID: From: "Mike" To: References: <4746EE4D.00000C.03456@MASSIMO> <004a01c82e45$4aabe6e0$4001a8c0@DADCOMPUTER> In-Reply-To: <004a01c82e45$4aabe6e0$4001a8c0@DADCOMPUTER> Subject: [TSCM-L] {2140} Re: GPS on cellphone Date: Fri, 23 Nov 2007 14:48:16 -0700 Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0034_01C82DDF.E1DC0970" X-Mailer: Microsoft Office Outlook 12.0 Thread-Index: AcguGLdVKLAcWOzjS56PM5Etnz1LJAAAZ5fg Content-Language: en-us X-OriginalArrivalTime: 23 Nov 2007 21:47:54.0372 (UTC) FILETIME=[80B96440:01C82E1A] X-Google-Approved: grainger01982@gmail.com via web at 2007-11-24 02:08:41 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

Wouldn’t it be easier to just  pull the battery until you need to use the device.

 

Mike

 

From: TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com] On Behalf Of Rogelio Villarreal G
Sent: Friday, November 23, 2007 7:54 PM
To: TSCM-L2006@googlegroups.com
Subject: [TSCM-L] {2136} Re: GPS on cellphone

 

On the subject of GPS and cell phones, if you do not want to be tracked you have to put it in a faraday bag (at least) which cost $30.00 bucks. 

Forget the GPS, equipment exist (Rohde $ Schwarz) that can track you cvell phonhe based on the exact RF it uses.

they have simple and very sofisticated equipment. About 400,000 euros.

 

 

I sell Intel.equipment (besides working in TSCM for the last 14 years- not much - but a good start) and so by the way cellular intercept equipment (portable) also tracks cell phones.  So the best way to not be tracked is  > turne it off >>put in faraday bag or box and hope for the best

 

Roger

Mexico 

----- Original Message -----

Sent: Friday, November 23, 2007 3:14 AM

Subject: [TSCM-L] {2134} GPS on cellphone

 

Hi at all my friends,

 

In some cellphone of new generation, like Blackberry and Hp/Qtek..., there is a gps hidden

 

 

When you buy this apparate in the box or in the instruction book, there are not information about this gps, but ...

 

 

We do an upgrade firmware, by internet site of producer and ... magic moment.. now there is a icon with GPS, and this gps turn on and is possible to know the position.

 

Yes, in the electronic circuit there is the gps antenna, and other circuit for the complete function of GPS, but not the soft for to use this

 

 

Is a funny present, free, but we hope that notting can turn on this gps circuit without our autorization, for to know where we are esacty  

 

best to all

 

Massimo

 

Lorenz Detective and TSCM

Italy

 

 

Faccine GRATIS per la vostra posta elettronica - da IncrediMail! Fare clic qui!<BR


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.25] ([172.28.128.25]:19034 "EHLO ip02.ams.ftl.affinity.com") by ams007.ftl.affinity.com with ESMTP id S371650AbXKXCJ3; Fri, 23 Nov 2007 21:09:29 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAAIXR0dA6aaoi2dsb2JhbACPPQEBAQgCBiQFgRE Received: from wa-out-0708.google.com ([209.85.146.249]) by ip02.ams.ftl.affinity.com with ESMTP; 23 Nov 2007 21:09:27 -0500 Received: by wa-out-0708.google.com with SMTP id j19so367042waf for ; Fri, 23 Nov 2007 18:09:26 -0800 (PST) Received: by 10.115.16.1 with SMTP id t1mr725365wai.1195870157114; Fri, 23 Nov 2007 18:09:17 -0800 (PST) Received: by 10.107.106.6 with SMTP id i6gr2141prm; Fri, 23 Nov 2007 18:09:05 -0800 (PST) X-Sender: rvg2000@prodigy.net.mx X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.13.4 with SMTP id q4mr14885308pyi.1195856107552; Fri, 23 Nov 2007 14:15:07 -0800 (PST) Received: from nlpiport09.prodigy.net.mx (nlpproxy19.prodigy.net.mx [148.235.52.19]) by mx.google.com with ESMTP id x46si7439742pyg.2007.11.23.14.15.07; Fri, 23 Nov 2007 14:15:07 -0800 (PST) Received-SPF: pass (google.com: domain of rvg2000@prodigy.net.mx designates 148.235.52.19 as permitted sender) client-ip=148.235.52.19; Authentication-Results: mx.google.com; spf=pass (google.com: domain of rvg2000@prodigy.net.mx designates 148.235.52.19 as permitted sender) smtp.mail=rvg2000@prodigy.net.mx X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: Ah4FACrgRkeU6zRU/2dsb2JhbAA4kEg X-IronPort-AV: E=Sophos;i="4.21,459,1188795600"; d="scan'208";a="66352634" Received: from nlpiport05.prodigy.net.mx ([148.235.52.84]) by nlpiport09.prodigy.net.mx with ESMTP; 23 Nov 2007 16:09:15 -0600 Received: from dsl-189-138-231-146.prod-infinitum.com.mx (HELO DADCOMPUTER) ([189.138.231.146]) by nlpiport05.prodigy.net.mx with SMTP; 23 Nov 2007 16:15:07 -0600 Message-ID: <005e01c82e50$91793400$4001a8c0@DADCOMPUTER> From: "Rogelio Villarreal G" To: References: <4746EE4D.00000C.03456@MASSIMO> <004a01c82e45$4aabe6e0$4001a8c0@DADCOMPUTER> <007501c82e19$c05c6580$1d02a8c0@Starbase1> Subject: [TSCM-L] {2141} Re: GPS on cellphone Date: Fri, 23 Nov 2007 16:14:54 -1200 Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3138 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 X-Google-Approved: grainger01982@gmail.com via web at 2007-11-24 02:09:04 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , The faraday bag is a forensic tool to isolate cell phones confiscated by law enforcement While being taken to the forensic lab to extract all information in the phone and sim card. Check http://www.teeltech.com/tt2/faraday.asp Stronghold Faraday Bag The special tri-weave material of the Wireless StrongHold Bag is made of a Nickel, Copper, Silver Plated Nylon plain woven fabric. This fabric is key in preventing unwanted signals from your evidence. This low-cost solution is ideal for isolating devices for evidence collection and transportation. Teel Technologies recommends using the Stronghold bag when seizing a device and transporting it to a more secure RF protected environment. The Stronghold technology has been tested to block signal strength from -65 dbm to -100 dbm, and therefore, for practically all environments, the Stronghold bag proves effective. Ideally, we recommend storing devices in the Stronghold bag individually, as evidence collection bags, and further protecting the device by placing them in a secure enclosure with greater signal protection for transportation to the lab. It works well for this and avoiding ( if you have to) tracking. ----- Original Message ----- From: "Preflatish" To: Sent: Friday, November 23, 2007 9:42 AM Subject: [TSCM-L] {2138} Re: GPS on cellphone > > Just wondering about the 'Faraday bag', I can put my cellphone inside a > .45 > caliber Ammo can > and it will still connect to the cell site and receive calls, even when it > is grounded! > > ----- Original Message ----- > From: "Rogelio Villarreal G" > To: > Sent: Friday, November 23, 2007 9:54 PM > Subject: [TSCM-L] {2136} Re: GPS on cellphone > > > On the subject of GPS and cell phones, if you do not want to be tracked > you > have to put it in a faraday bag (at least) which cost $30.00 bucks. > Forget the GPS, equipment exist (Rohde $ Schwarz) that can track you cvell > phonhe based on the exact RF it uses. > they have simple and very sofisticated equipment. About 400,000 euros. > > > I sell Intel.equipment (besides working in TSCM for the last 14 years- not > much - but a good start) and so by the way cellular intercept equipment > (portable) also tracks cell phones. So the best way to not be tracked is > > > turne it off >>put in faraday bag or box and hope for the best > > Roger > Mexico > ----- Original Message ----- > From: Massimo Fiorini > To: TSCM-L2006@googlegroups.com > Sent: Friday, November 23, 2007 3:14 AM > Subject: [TSCM-L] {2134} GPS on cellphone > > > Hi at all my friends, > > In some cellphone of new generation, like Blackberry and > Hp/Qtek..., > there is a gps hidden > > > When you buy this apparate in the box or in the instruction book, > there are not information about this gps, but ... > > > We do an upgrade firmware, by internet site of producer and ... > magic moment.. now there is a icon with GPS, and this gps turn on and is > possible to know the position. > > Yes, in the electronic circuit there is the gps antenna, and other > circuit for the complete function of GPS, but not the soft for to use this > > > Is a funny present, free, but we hope that notting can turn on this > gps circuit without our autorization, for to know where we are esacty > > best to all > > Massimo > > Lorenz Detective and TSCM > Italy > > > > > > > > > > > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:17309 "EHLO ip04.ams.ftl.affinity.com") by ams011.ftl.affinity.com with ESMTP id S415676AbXKXCK0; Fri, 23 Nov 2007 21:10:26 -0500 Received: from wa-out-0708.google.com ([209.85.146.240]) by ip04.ams.ftl.affinity.com with ESMTP; 23 Nov 2007 21:10:24 -0500 Received: by wa-out-0708.google.com with SMTP id j19so367837waf for ; Fri, 23 Nov 2007 18:10:23 -0800 (PST) Received: by 10.141.2.19 with SMTP id e19mr546819rvi.1195870214577; Fri, 23 Nov 2007 18:10:14 -0800 (PST) Received: by 10.107.65.8 with SMTP id s8gr2142prk; Fri, 23 Nov 2007 18:10:08 -0800 (PST) X-Sender: aar9sm@hotmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.114.179.1 with SMTP id b1mr7951021waf.1195863922751; Fri, 23 Nov 2007 16:25:22 -0800 (PST) Received: from bay0-omc1-s22.bay0.hotmail.com (bay0-omc1-s22.bay0.hotmail.com [65.54.246.94]) by mx.google.com with ESMTP id k36si17882174waf.2007.11.23.16.25.22; Fri, 23 Nov 2007 16:25:22 -0800 (PST) Received-SPF: pass (google.com: domain of aar9sm@hotmail.com designates 65.54.246.94 as permitted sender) client-ip=65.54.246.94; Authentication-Results: mx.google.com; spf=pass (google.com: domain of aar9sm@hotmail.com designates 65.54.246.94 as permitted sender) smtp.mail=aar9sm@hotmail.com Received: from BAY125-DS1 ([65.55.130.28]) by bay0-omc1-s22.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Fri, 23 Nov 2007 16:25:21 -0800 X-Originating-IP: [24.251.253.164] X-Originating-Email: [aar9sm@hotmail.com] Message-ID: From: "Mike" To: Subject: [TSCM-L] {2142} FW: Kevin's Security Scrapbook - iPhone = imBugged Date: Fri, 23 Nov 2007 17:25:44 -0700 Mime-Version: 1.0 Content-Type: multipart/related; boundary="----=_NextPart_000_0055_01C82DF5.E1238CE0" X-Mailer: Microsoft Office Outlook 12.0 Thread-Index: AcgrZWGlHts2GwVMQO6RKaIkM7yDbQCyyBbw Content-Language: en-us X-OriginalArrivalTime: 24 Nov 2007 00:25:21.0972 (UTC) FILETIME=[7FEEBF40:01C82E30] X-Google-Approved: grainger01982@gmail.com via web at 2007-11-24 02:10:08 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Kevin's Security Scrapbook

 

Kevin's Security Scrapbook - via Spybusters.com
*** Late Edition ***
Especially prepared for aar9sm@hotmail.com


Kevin's Security Scrapbook - iPhone = imBugged

iPhone = imBugged

The Scare... (from noheat.com)
"Its always been assumed that with some amount of hacking your simple phone can help locate you through GPS and help big brother zero in on your activities. ...watch the video and you will see a security consultant undress your iPhone so far even it blushes.

He even illustrates how a simple iPhone can record phone conversations, browsing habits, email, and even record the rooms ambient noises when it appears to be off.

Suddenly every office meeting is subject to recording,
the arguments with your wife are fair game, and every word you utter could be recorded and used against you."

The Consultant Explains the Techie Stuff...
(Rik Farrow, UNIX specialist and consultant from Sedona, AZ)


Back to Reality...
"...Apple (which declined to comment), in its latest patch, inoculated the iPhone against the Metasploit that Farrow used." (more)


ï 'Smart' phones intrinsically have bugging buddy capabilities.
ï We're mere keystrokes away from the next eavesdropping hack. ï Protection requires detection.

 

 

More Recent Articles


Safely unsubscribe now from "Kevin's Security Scrapbook" or change subscription settings



Your requested content delivery powered by FeedBlitz, LLC, 9 Thoreau Way, Sudbury, MA 01776, USA. +1.978.776.9498

 


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Embedded Content: image0019.png: 00000001,226fd7c3,00000000,00000000Received: from [172.28.128.24] ([172.28.128.24]:8392 "EHLO ip01.ams.ftl.affinity.com") by ams006.ftl.affinity.com with ESMTP id S361950AbXKXLMs; Sat, 24 Nov 2007 06:12:48 -0500 Received: from nz-out-0708.google.com ([64.233.162.245]) by ip01.ams.ftl.affinity.com with ESMTP; 24 Nov 2007 06:12:46 -0500 Received: by nz-out-0708.google.com with SMTP id h28so1127318nzf for ; Sat, 24 Nov 2007 03:12:44 -0800 (PST) Received: by 10.142.173.8 with SMTP id v8mr609121wfe.1195902753714; Sat, 24 Nov 2007 03:12:33 -0800 (PST) Received: by 10.107.106.6 with SMTP id i6gr2143prm; Sat, 24 Nov 2007 03:12:22 -0800 (PST) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.35.16.7 with SMTP id t7mr15602799pyi.1195902737718; Sat, 24 Nov 2007 03:12:17 -0800 (PST) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id h49si2341124nzf.2007.11.24.03.12.15; Sat, 24 Nov 2007 03:12:17 -0800 (PST) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id 6DE0E50260AAA for ; Sat, 24 Nov 2007 06:12:14 -0500 (EST) Message-ID: <474805DB.10401@phreaker.net> Date: Sat, 24 Nov 2007 06:07:07 -0500 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.9 (Windows/20071031) Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="------------020508010507010909040102" To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2143} Re: GPS on cellphone References: <4746EE4D.00000C.03456@MASSIMO> <004a01c82e45$4aabe6e0$4001a8c0@DADCOMPUTER> In-Reply-To: <004a01c82e45$4aabe6e0$4001a8c0@DADCOMPUTER> X-AAC-KTE-LTE-MailScanner-Watermark: 1196507210.06516@+YPBSoWR7x1mAImnZ1fR3A Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Or buy a .30 cal ammo box at the surplus depot for $5.00 its air-tite and makes a good  farady shield. Removing the battery is the best of course.

Rogelio Villarreal G wrote:

On the subject of GPS and cell phones, if you do not want to be tracked you have to put it in a faraday bag (at least) which cost $30.00 bucks. 
Forget the GPS, equipment exist (Rohde $ Schwarz) that can track you cvell phonhe based on the exact RF it uses.
they have simple and very sofisticated equipment. About 400,000 euros.
 
 
I sell Intel.equipment (besides working in TSCM for the last 14 years- not much - but a good start) and so by the way cellular intercept equipment (portable) also tracks cell phones.  So the best way to not be tracked is  > turne it off >>put in faraday bag or box and hope for the best
 
Roger
Mexico  
----- Original Message -----
Sent: Friday, November 23, 2007 3:14 AM
Subject: [TSCM-L] {2134} GPS on cellphone

Hi at all my friends,
 
In some cellphone of new generation, like Blackberry and Hp/Qtek..., there is a gps hidden
 
 
When you buy this apparate in the box or in the instruction book, there are not information about this gps, but ...
 
 
We do an upgrade firmware, by internet site of producer and ... magic moment.. now there is a icon with GPS, and this gps turn on and is possible to know the position.
 
Yes, in the electronic circuit there is the gps antenna, and other circuit for the complete function of GPS, but not the soft for to use this
 
 
Is a funny present, free, but we hope that notting can turn on this gps circuit without our autorization, for to know where we are esacty  
 
best to all
 
Massimo
 
Lorenz Detective and TSCM
Italy
 
 



Faccine GRATIS per la vostra posta elettronica - da IncrediMail! Fare clic qui!



--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.27] ([172.28.128.27]:22146 "EHLO ip04.ams.ftl.affinity.com") by ams012.ftl.affinity.com with ESMTP id S381407AbXKYDjM; Sat, 24 Nov 2007 22:39:12 -0500 Received: from wa-out-0708.google.com ([209.85.146.242]) by ip04.ams.ftl.affinity.com with ESMTP; 24 Nov 2007 22:39:11 -0500 Received: by wa-out-0708.google.com with SMTP id j19so1621802waf for ; Sat, 24 Nov 2007 19:39:10 -0800 (PST) Received: by 10.140.141.15 with SMTP id o15mr608457rvd.1195961301927; Sat, 24 Nov 2007 19:28:21 -0800 (PST) Received: by 10.107.114.37 with SMTP id r37gr2144prm; Sat, 24 Nov 2007 19:28:06 -0800 (PST) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.35.11.1 with SMTP id o1mr16784449pyi.1195961286600; Sat, 24 Nov 2007 19:28:06 -0800 (PST) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id v28si131214nzb.2007.11.24.19.28.04; Sat, 24 Nov 2007 19:28:06 -0800 (PST) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id 77A27502624D5 for ; Sat, 24 Nov 2007 22:28:03 -0500 (EST) Message-ID: <4748EA92.4090801@phreaker.net> Date: Sat, 24 Nov 2007 22:22:58 -0500 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.9 (Windows/20071031) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2144} Vodafone faces court case in 'bugging' row X-AAC-KTE-LTE-MailScanner-Watermark: 1196565750.8896@kvRk1+7iMhzxUYopD+XbmA Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Vodafone faces court case in 'bugging' row Parents believe their son was murdered before he could blow the whistle Jamie Doward, home affairs editor Sunday November 25, 2007 Observer Senior British managers of Vodafone are facing a private lawsuit from the family of a former employee who claim that he was murdered to stop him revealing a major phone-tapping scandal. According to the family's lawyer, the case, which has raised troubling questions about the ability of third parties to eavesdrop on private phone conversations, threatens to highlight the actions of several senior Vodafone employees in the days leading up to the death of 38-year-old Costas Tsalikidis. The dead man's family fear that Tsalikidis, a technician with Vodafone in Greece, stumbled across a plot to listen in to private conversations of the Greek Prime Minister and a number of other top-ranking officials during the run-up to the Athens Olympics in 2004 and that those who were conducting the bugging operation took steps to silence him. Tsalikidis's family have never accepted the findings of an inquiry that found he hanged himself, apparently because of pressure of work. They suspect he was poisoned and are now petitioning to have his body exhumed for tests. The Observer has learnt that the family's lawyer, Themistokles Sofos, is set to hire forensics expert Dr Michael Baden, who gave testimony in the OJ Simpson trial, to examine the poisoning claims. 'They say he committed suicide due to his working environment,' Sofos said. 'But we have serious doubts about this.' The family say Tsalikidis was not the type to take his life and that he was, until the weeks before his death, a happy man looking forward to marrying his fiancee. They say he tried to resign 20 days before his death, but this was rejected by Vodafone. The day before he died, Tsalikidis sent two detailed emails to senior Vodafone employees, the contents of which have never been divulged. Now the family are launching a private legal action to recover all of Tsalikidis's emails, which they claim have been removed illegally by Vodafone It will also reignite interest in a story that gripped Athens in the weeks after Tsalikidis was found dead in his loft apartment on 9 March, 2005. His death triggered a public furore in Greece, with speculation that he had been silenced. In the days leading up to his death Tsalikidis had told his fiancee that something was badly wrong at the company and confided in a friend that his need to leavehad become a 'matter of life or death'. He also kept a technical diary that contained a note titled 'if something goes wrong'. Sofos says he has evidence that, several days before his death, a number of British Vodafone employees travelled to Athens to question Tsalikidis. He claims to know the executives' identities, raising the prospect that they will be named in the lawsuit, something that could prove embarrassing to the company, which has always denied colluding with third parties to bug the Vodafone network. 'We have a witness who testified to the prosecutor that British superiors of Vodafone came to Greece and met the company's management in the days before Costas died,' Sofos said. 'We asked the prosecutor's office to call them to give evidence, but they never did.' The day after Tsalikidis's death, the head of Vodafone in Greece informed the Prime Minister's office that it had discovered rogue software had been installed on its network, which allowed a third party to listen into conversations. Vodafone says it was alerted to the problem after being tipped off by engineers working for one of its technical suppliers. But despite an official inquiry the identity of those who perpetrated the phone-taps has never emerged. The inquiry found that the private conversations of some of Greece's most important politicians and officials, conducted on more than 100 mobile phones, had been sent to 'shadow' mobile phones and recorded on computers. Experts have been able to pinpoint the locations of many of the shadow phones which, it is claimed, correlate to a number of properties rented by the US government. Vodafone declined to comment. Guardian Unlimited © Guardian News and Media Limited 2007 http://observer.guardian.co.uk/print/0,,331360614-119093,00.html __._,_.___ --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:15429 "EHLO ip04.ams.ftl.affinity.com") by ams007.ftl.affinity.com with ESMTP id S422886AbXKZAsB; Sun, 25 Nov 2007 19:48:01 -0500 Received: from wa-out-0708.google.com ([209.85.146.242]) by ip04.ams.ftl.affinity.com with ESMTP; 25 Nov 2007 19:47:40 -0500 Received: by wa-out-0708.google.com with SMTP id j19so84241waf for ; Sun, 25 Nov 2007 16:47:37 -0800 (PST) Received: by 10.114.108.15 with SMTP id g15mr776550wac.1196038047868; Sun, 25 Nov 2007 16:47:27 -0800 (PST) Received: by 10.107.114.28 with SMTP id r28gr2145prm; Sun, 25 Nov 2007 16:47:17 -0800 (PST) X-Sender: MNMYoung@worldnet.att.net X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.11.1 with SMTP id o1mr16621608pyi.1195951861065; Sat, 24 Nov 2007 16:51:01 -0800 (PST) Received: from mtiwmhc11.worldnet.att.net (mtiwmhc11.worldnet.att.net [204.127.131.115]) by mx.google.com with ESMTP id a28si8270761pye.2007.11.24.16.51.00; Sat, 24 Nov 2007 16:51:01 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of MNMYoung@worldnet.att.net designates 204.127.131.115 as permitted sender) client-ip=204.127.131.115; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of MNMYoung@worldnet.att.net designates 204.127.131.115 as permitted sender) smtp.mail=MNMYoung@worldnet.att.net Received: from yourxb2x7j77gn (74.phoenix-09-10rs.az.dial-access.att.net[12.72.95.74]) by worldnet.att.net (mtiwmhc11) with SMTP id <2007112500504711100gfjbne>; Sun, 25 Nov 2007 00:50:48 +0000 Message-ID: <000401c82efd$35b1afa0$4a5f480c@yourxb2x7j77gn> From: "Mildred Young" To: References: <951416.58701.qm@web58804.mail.re1.yahoo.com> Subject: [TSCM-L] {2145} Re: The "P-Levels" - Draft Version, Please comment Date: Sat, 17 Nov 2007 19:03:16 -0700 Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_001A_01C8294C.82D32C70" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3138 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3138 X-Google-Approved: grainger01982@gmail.com via web at 2007-11-26 00:47:17 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

Julie,
I sure hope someone helps you....They have no idea what it feels like being a women, and desperate for help due to lack of funds.  I too wasn't taken serious and the police can't help???  I was told to get my head examined and if the doctor calls and says I am alright, then they may come out...they just don't to take my $ for no reason.  It makes me realize what a need their is out there for women who can help women!!! 
 
Good luck -
From:  Not nuts...and neither are you!
 
----- Original Message -----
Sent: Thursday, November 08, 2007 4:15 PM
Subject: [TSCM-L] {2100} Re: The "P-Levels" - Draft Version, Please comment

I am a single mom in desperate need of HELP. And cant get the police to help or any one else unless you have lots of money.This is criminal itsself...I am being stalked by my X he is using electroncs and only god knows what but this is unreal!He has something in my bathroom and shower around all the windows in my home so i can hear him degrade me and humiliate me only when noone is around.Now every one thinks i am crazy and cant get any help as it has kept me from working for so long i have almost lost every thing i own even my 1999 harley davidson that i refuse to part with.This would make his day and this is what he wants...PLEASE, Does anyone do pro bono sweeps in the puyallup, wa area.This could make a perfect movie I swear.ITS BEEN AN ONGOING NIGHTMARE>>>JULIE   toofastevo@yahoo.com   If ypu can even get me an e-mail as he deletes them usually.My cell # is253-205-5721.PLEASE HELP.YOU WOULD BE RITCH IN SURVAILENCE EQUIPTMENT>>>>I PROMISE.

TSCM <aar9sm@hotmail.com> wrote:

James,

Good job! Is well written with a lot of thought and detail involved
very nice guide.thank you!!

Mike

On Oct 30, 8:28 pm, "James M. Atkinson" wrote:
> The following "Applicant Questionares" is going
> live on my website on Wednesday night, and I
> drastically need a couple of you to read it over
> and see if there is anything that needs to be corrected or explained better.
>
> Many Thanks,
>
> -jma
>
> Recommended Gold List Questions
> Levels of TSCM Legitimacy - The "P-Levels"
>
> The following is a list of private TSCM firms who
> specialize in "bug sweeps" and wiretap detection
> and who have legitimate TSCM training,
> credentials, and equipment (and are very well respected within the industry).
>
> While most TSCM specialists are available for
> travel outside of a specific geographic area they
> tend to avoid such engagements, or will limited
> the services to vulnerability analysis,
> pre-construction assistance, non-instrumented
> inspections, simple RF checks, in-place
> monitoring, or limited TSCM services involving
> only a briefcase sized in-place monitoring system
> (such as a single spectrum analyzer, MSS, Eagle,
> ScanLock OSCOR, SPECTRE, ROSE, RAPHAEL, or similar system).
>
> These private TSCM firms tend to operate in a
> specific geographic area limited to a few hundred
> miles (usually within a eight to twelve hour, one
> day vehicle drive). However, all of the TSCM
> firms listed here are available for travel
> anywhere in the United States or the World on
> short notice, but only provide limited services
> when operating outside of their normal coverage
> area. These coverage area limitations is due to
> the logistics involved in transporting hundreds
> and often thousands of pounds of sophisticated,
> highly sensitive laboratory grade electronic
> instruments, equipment and tools. Bug sweeps and
> wiretap detection involves the use of ladders,
> pole climbing equipment, LAN analyzers, X-ray
> systems, specialized antennas and other
> equipment, which is not easily, transported by
> airplane or by any method other then trucks. In a
> few cases, the TSCM specialist can respond to any
> location within a 2 or 3-day drive with a truck
> which contains an entire mobile electronics laboratory.
>
> TSCM firms also tend to restrict their operations
> to a specific geographic area to facilitate an
> expert level of knowledge regarding the RF
> environment, construction methods used, community
> zoning, population demographics, civil
> engineering, aeronautic or maritime facilities,
> local military bases, and related areas.
> Knowledge of such regional information is
> critical for a successful TSCM project. The TSCM
> specialist must also have an intimate knowledge
> of the telephone systems, engineering methods,
> fiber optics, major cable locations, central
> office switches, test numbers, and related
> communications infrastructure present or being
> used in an area (which tends to be regional).
>
> An understanding of what types of eavesdropping
> devices, methods, and frequencies which are being
> used in an area is also important, as is
> knowledge of what type of surveillance equipment
> is being sold within that region (and other
> areas). The TSCM Procedural and Protocols Guides
> used by a specialist also tend to be based on
> specific issues and variables present in that
> specific geographic area. On a more interesting
> note, many of these firms are located in, or near
> major maritime port cities or population centers.
> The heaviest concentrations are around major
> cities on the East and West coasts with a very
> limited presence in the Mid-West, Great Plains,
> and Rockies. If you were in the Mid-West, Great
> Plains, or Rockies area you would need to engage
> a TSCM firm from one of the major port cities.
> For example, customers in Chicago, St. Louis,
> Memphis, Denver, Salt Lake City, Minneapolis,
> Billings, etc. would need to fly a TSCM
> specialist in from Boston, New York, Washington
> DC, Los Angles, Lexington, or Seattle.
>
> Please be patient when contacting any TSCM firm,
> as if they are out serving a client they may not
> be able to return your call for several hours.
> Rates generally are non-negotiable and reflect
> the cost of the sweep practitioner's time,
> considerable investment in equipment acquisition
> and maintenance, several weeks of in-service
> training a year, travel, administrative and
> communications time and expense to coordinate the
> sweep and written report, and a fair profit for
> their services. It is very unwise to shop for
> sweeps by using price as a criterion as it only
> invites being ripped off. Legitimate TSCM
> professionals are not interested in, nor will
> they engage in negotiating for a lower price.
> When you contact persons on this list, you are
> talking with someone in the same league as an
> attorney or surgeon, not a salesman. In fact,
> most of the people listed on this page have more
> time in their specialized training than do most
> attorneys or medical professionals. Anything
> beyond an initial 15-minute phone call usually
> will be billable time. Attorneys and doctors do
> not consult free, and neither do legitimate TSCM
> specialists. If a potential client calls with a
> long list of questions not pertaining directly to
> hiring the practitioner, or wants to know how to
> do his own sweep, or wants to know how to use the
> sweep kit he purchased on his own, expect to pay
> an hourly rate or $250 in advance for consulting
> services. If you are considering engaging (or
> have already engaged) a TSCM firm and they are
> not listed in the following directory you would
> do well to immediately ask some awkward
> questions. It is also important you understand
> that legitimate services by a competent TSCM firm
> rarely start at less then several thousand
> dollars for even a basic sweep, and a proper
> sweep take days, not hours to complete. Keep in
> mind that there only a small number of legitimate
> and competent TSCM counterintelligence
> specialists or "Bug Sweepers" in the U.S. private
> sector. Legitimate TSCM firms are in very high
> demand, hard to find, and expensive; so be
> patient when trying to find one to help you. In
> addition, TSCM firms are not attorneys and cannot
> tell you whether it is legal or illegal for you
> to monitor your own phones. Always call a
> competent licensed attorney for legal advice.
>
> Magic Formula
> Technical Background - Cube this
> Formal Technical Training (1200 hours, every 5 years) - Square This
> Equipment and Tools - Cube This
> Basic Equipment/Tools
> Intermediate Equipment/Tools
> Advanced Equipment/Tools
> Vehicles (halve this)
> Basic Vehicle
> Intermediate Vehicle
> Advanced Equipment - DOT/CDL
> Honesty and Integrity - Divided by all
>
> Square root of
> (Tech3+TechTraining2+Tools+TestEquipment3+.5Vechiles) /Honesty
>
> You use the list like this. You assign each of
> the P-Levels a score between negative numbers and
> positive ten, essentially adding or subtracting
> points up to ten either way depending on how each
> of the attribute apply to the person you are
> talking to. In a few cases, you can subtract more
> then ten points for issues that provide areas of significant concern.
>
> You would hope that the person or company you are
> considering performing a TSCM project would
> attain a perfect score as that means the person
> is very legitimate and professional and that you
> feel that none of the negative attributes or
> levels apply to them, but in reality such, a
> score is impractical. Nobody is perfect, and
> anybody who appears to be perfect should
> certainly be viewed with caution and a healthy dose of skepticism.
>
> Professional - A true blue, died in the wool
> security expert with years of RELEVANT experience
> and background in their specific area of
> expertise. He will "walk the walk and talk the
> talk", and have the scars to prove it. This
> person will own all the necessary equipment,
> hundred of books (some of which he wrote or
> contributed to), a large number of original web
> pages or white papers on the subject. He (or she)
> will seek to illuminate the subject matter, and
> will be able to explain very complex topics in
> terms the non-technical public or layman can
> understand and is comfortable is discussing the
> matter without pushing their services too much
> (they let you come to them, and never gets
> pushy). If they are very professional they get
> +10 points, if they seem a little rough around
> the edges give them +7, but start dropping points
> as you get more uncomfortable with their
> professionalism. If they are rough around the
> edges, or just a little too pushy to get your
> business then award them zero points, and if they
> really get pushy or seem desperate for your
> business then start subtracting points quickly.
>
> Pretender - Similar to the above professional but
> has irrelevant or bogus credentials. They may
> talk the talk, but cannot walk the walk (nor have
> the scars). Will talk a good game, but generally
> lacks legitimate equipment, materials, or
> training. He often has not written a book but
> will often plagiarize others (and claim it as his
> own work). If the "pretender" has an online
> presence or web page, it is full of hype,
> rhetoric, and paranoia (but little science). He
> is quite capable of totally baffling customers,
> but cannot explain things in a non-technical way
> (or without hyping surveillance technology to
> death). In this case you start by awarding them
> -10 points, and as they convince you that they
> are legitimate you slowly start adding points up
> to as much as a +10 points. Very often the
> pretender will be someone who retired from
> government service with honorable service, but
> who lacks the technical background to perform a
> competent sweep, and thus pretend to know what
> they are doing. In many cases, the pretender
> actually has themselves convinced that they can
> do a good job, but sometimes their inabilities
> lead then into the next category.
>
> Putz - This is nothing more then a buffoon.
> Generally he does not know how to do the job, has
> virtually no equipment, training, or resources
> (but tries hard). He may or may not be honest,
> and may actually believe that he is competent. He
> may have a few technical toys, and may have a
> week or two of training in electronics,
> surveillance, and security (all in one). In this
> case, you start by awarding them -10 points, and
> as they convince you that they are not a putz you
> slowly start adding points up to as much as a +10 points.
>
> Parasite - This type leaches off of the
> credibility of others, generally has no
> expertise, knowledge, or training of their own in
> what they are offering. Usually someone like this
> walks and talks like a salesman, and they love to
> run their mouth about all the people they know.
> Name-dropping is an art form to the parasite. The
> parasite may be detected by the way they rattle
> off a list of references, customers, or contacts
> before anybody has really asked for them. He will
> usually be desperate to prove to you how
> legitimate he is right from the very beginning of
> your contact with them. You start them with zero
> points, and gain or loose points as you feel
> appropriate. The parasite is the consummate
> salesmen, but not an actual sweep person. One
> rule of the TSCM profession is that you never
> talk about your customers, so someone who is
> trying to impress you with who they know or is
> name-dropping is a parasite who is trying to
> impress you, and in turn, you should not trust
> them, and score the parasite accordingly. Start
> with awarding zero points, and each time they
> name drop or mention a company name with whom
> they have performed sweep work subtract 3 points,
> up to 30 points. If on the other hand the TSCM
> expert does not mention his customers award 3
> points, then ask for references, and then when he
> declines to provide references award 3 more
> points (or if they give you references subtract 6
> points). Next, you want to aggressively pressure
> them for client names, and for references, and
> then if at this point (under pressure) they keep
> their mouth shut you add 6 points, or if they
> give in and breach their client privacy, you
> subtract 6 points. There is nothing wrong with
> being involved in sales, but in the TSCM
> business, a "sales push" or pushing to close the transaction is a liability.
>
> Predator - This type is pure evil and the only
> reason they are involved in security is to
> victimize the customer. The predator is only
> interested in backstabbing, theft, betrayal, or
> harming the client in a serious way. The only
> reason this type of person is involved in TSCM or
> the security industry is to ferret out their
> customers secrets so they can be exploited for
> scams or for criminal purposes. If this person
> gives you even the slightest hint of being, a
> criminal hit them with -100 points and let them
> work their way out of it. Now, do not confuse
> someone who hunts spies for a living for someone
> who performs eavesdropping for a living, or
> someone who is a professional criminal who preys
> upon his client. A true TSCM expert is hunting
> spies and bugs, and is not preying off their
> client, they do not hunt the spy directly, but
> rather hunt the spies' technical toys (it is a
> subtle, but important difference).
>
> Poison - He has nothing good to say about anybody
> except himself and his associates and tends to be
> bitter against everybody around him. When
> questioned about his own credentials he will lash
> out at his competitors with personal attacks
> (instead of discussing his own credentials). This
> type is easily identified after five minutes of
> talking, and they have not said one thing
> specifically regarding their own merit,
> equipment, or credentials. It is easy to figure
> this one out and to award or subtract points
> either way. If this person only slightly lashes
> out against others it may be that, he has a
> backbone, but is not actually toxic. Be careful
> here and only subtract points if this person is
> hardcore in his angst and bitterness. Hint: Most
> TSCM folks have a strong moral backbone, and have
> a strong sense of fairness and of what are right
> and wrong. Most TSCM professionals will be
> strongly biased against eavesdroppers, felons, or
> wrong doers, and this bias should result in
> points being awarded as you discuss just "how
> white his hat is". On the other hand, if the TSCM
> expert is bitter against others, but cannot
> specifically tell you why, then you should
> subtract points. Also, be wary of any TSCM expert
> who is overly complementary towards other people
> as this may indicate a potential parasite.
>
> Puffer Fish - Typically, he has little or no
> credentials of his own, but knows all of the
> industry lingo and jargon. He will claim to be
> the president of a huge corporation with scores
> of employees, tens of millions in assets when in
> fact this type is a penniless mooch who is still
> living with their parents. If not living with his
> parents his (or her) spouse will be the primary
> breadwinner in the family, their primary income
> (and references) will be from close friends or
> family. Listen very carefully for any hint as to
> where the seed money came from for them to start
> their business, as you may find that a rich
> family member bought them the equipment and has
> been subsidizing their TSCM activities. Often
> this type is also a pretender and bumbling putz.
> Listen for any hint of grandiosity or of what
> this person is going to do in the future, versus
> what they have actually done in the past. Dream
> and aspirations are important; delusions and
> illusions are not and should be graded accordingly.
>
> Psychiatrist Bait - These people are really
> nothing more then con artists who will ramble on
> for hours with wild tales of how they were a Navy
> SEAL, covert CIA operative, undercover FBI agent,
> won the Congressional Medal of Honor, was a POW,
> won the war, and so on. They could tell you about
> their credentials, but then they would have to
> kill you. Often they will offer credentials,
> which at first appear real, but cannot be
> confirmed, or is suspect in another way. They
> will offer credentials that cannot be verified by
> their own admission. "It's too secret" Ask
> questions, get specific answers, grade as you
> feel is appropriate. However, step carefully, as
> many TSCM people will not discuss a great deal of
> their background initially, so this level should
> be considered in regards to initial contact. If
> the person sounds and talks a little crazy
> initially then subtract points, but if they seem
> sane and coherent then add points. Do not get too
> carried away on this issue though. Always
> remember that the TSCM person is grading you as a
> customer as well, and may not be too keen on
> disclosing too much about their background until
> they get to know you better, so this is a two way street.
>
> Phelons (or Felon) - This group is a real problem
> within the security business. Many con artists,
> felons, and dirt-bags try to capitalize on their
> criminal skills by claiming to be able to catch
> other criminals. Usually their only credential
> (which can be verified) is the criminal
> conviction. Often this type will claim to be a
> convicted hacker and computer expert when in fact
> he was convicted of arson, or of being a drug
> dealer, is a psychiatric patient, and is
> incapable of recovering his own hard drive or of
> performing the most simplistic of technical
> tasks. The few cases where the conviction was
> relevant to their field will not set your mind at
> ease about their now "reformed" status. Now this
> gets a tricky because if you become reasonably
> convinced that you are talking to a felon (or
> they brag of their crimes) you need to subtract
> 50 points, and not consider dealing with them
> unless there is some overwhelming reason to do
> so. If the person was involved in a crime that
> did not involve moral turpitude or violence
> (i.e.: drunk driving, disorderly conduct, etc)
> then perhaps subtract only 15 points. Now, on the
> other hand if the TSCM appears to be a good
> citizen, with no criminal histories then they get only a positive 10 points.
>
> Paranoids - Usually has knowledge of security
> because of an anti-establishment, paranoid or
> criminal mind-set, which compels them to
> constantly look over their shoulder. Of course,
> the government is constantly harassing them, has
> their phones taped, has video cameras in their
> house, and has legions of agents employed just to
> harass them specifically. They will sometimes
> rant on about government mind control, biological
> implants, electronic harassment, and so on. In
> some cases they have written books or articles,
> but the materials is published only in very
> narrow channels, or by paramilitary or fringe
> publishers. Very often, they will hear voices in
> their head, and/or be able to convince other that
> they too are hearing voices or seeing visions. If
> they are hearing voices, seeing visions, or claim
> to have any kind, of "special powers", you should
> subtract 30 or more points. If they seem like a
> normal and rational person they get zero points,
> but if they are "professionally cautious" add a
> few positive points as TSCM experts operate in a
> world where they assume that a place is bugged
> until scientifically proven otherwise, they are
> not paranoid, but more accurately are in touch
> with the eavesdropping threat. To be awarded +10
> point the TSCM expert should be cautious,
> careful, and delicate with the project, but
> should not act "crazy", and should make you feel more secure, and not fearful.
>
> Police - When a TSCM expert enters the
> profession, they hopefully come with a multitude
> of prior experience, some have a technical
> background, and some have little or no technical
> background. Sadly, there are quite a few retired
> or fired members of the law enforcement or
> intelligence community who try their hands at

=== message truncated ===

__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com --~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.24] ([172.28.128.24]:3243 "EHLO ip01.ams.ftl.affinity.com") by ams012.ftl.affinity.com with ESMTP id S380147AbXKZAsC; Sun, 25 Nov 2007 19:48:02 -0500 Received: from wa-out-0708.google.com ([209.85.146.243]) by ip01.ams.ftl.affinity.com with ESMTP; 25 Nov 2007 19:48:00 -0500 Received: by wa-out-0708.google.com with SMTP id j19so84470waf for ; Sun, 25 Nov 2007 16:47:56 -0800 (PST) Received: by 10.114.25.3 with SMTP id 3mr758691way.1196038067123; Sun, 25 Nov 2007 16:47:47 -0800 (PST) Received: by 10.106.179.39 with SMTP id b39gr2146prf; Sun, 25 Nov 2007 16:47:32 -0800 (PST) X-Sender: arriolaramon@yahoo.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.126.2 with SMTP id d2mr16644610pyn.1195952595792; Sat, 24 Nov 2007 17:03:15 -0800 (PST) Received: from smtp106.plus.mail.mud.yahoo.com (smtp106.plus.mail.mud.yahoo.com [68.142.206.239]) by mx.google.com with SMTP id a28si8276600pye.2007.11.24.17.03.14; Sat, 24 Nov 2007 17:03:15 -0800 (PST) Received-SPF: pass (google.com: domain of arriolaramon@yahoo.com designates 68.142.206.239 as permitted sender) client-ip=68.142.206.239; DomainKey-Status: good (test mode) Authentication-Results: mx.google.com; spf=pass (google.com: domain of arriolaramon@yahoo.com designates 68.142.206.239 as permitted sender) smtp.mail=arriolaramon@yahoo.com; domainkeys=pass (test mode) header.From=arriolaramon@yahoo.com Received: (qmail 21918 invoked from network); 25 Nov 2007 01:03:14 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Received:X-YMail-OSG:From:To:References:In-Reply-To:Subject:Date:Message-ID:MIME-Version:Content-Type:X-Mailer:Thread-Index:Content-Language; b=rzybw3XxAv0EiHtxC1xnqcRxssbuDC3vV+S3lFVAy86xI5CCfPC1B/m/dIXjUs22DvfKFrrcDLv9/Gn8CZp2VO4cL+wrkdaiydi5wxsBcPYtisM5QiKNaw+UNZcrIpkPyH8uaH5jUgrxC4zfJCfYaOaUgUW3XRf9qhsVs0ISj74= ; Received: from unknown (HELO HPRAO) (arriolaramon@201.141.79.104 with login) by smtp106.plus.mail.mud.yahoo.com with SMTP; 25 Nov 2007 01:03:13 -0000 X-YMail-OSG: 0225izkVM1n1_lNUi.3RD65T2RmRtQOjwWMLxtchDvwAcHtXF3aXWaX7WHA8jv0gXWcFaYBgOSer5r6LwYc2BgAoS6bL5ClbBvVe5nWhBqXt_Xl42jf0GgLI.cAsjA-- Illegal-Object: Syntax error in From: address found on ams012.ftl.affinity.com: From: RamÛn F. Arriola Otero ^-missing end of mailbox From: To: References: <4746EE4D.00000C.03456@MASSIMO> <004a01c82e45$4aabe6e0$4001a8c0@DADCOMPUTER> In-Reply-To: Subject: [TSCM-L] {2146} Re: GPS on cellphone Date: Sat, 24 Nov 2007 19:03:08 -0600 Message-ID: <001801c82efe$f21c9730$d655c590$@com> Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0019_01C82ECC.A7822730" X-Mailer: Microsoft Office Outlook 12.0 Thread-Index: AcguGLdVKLAcWOzjS56PM5Etnz1LJAAAZ5fgADkBsnA= Content-Language: es-mx X-Google-Approved: grainger01982@gmail.com via web at 2007-11-26 00:47:32 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

 

 

Hello, you have another option for blocking the RF signals.

Http://www.youtube.com/watch?v=vUx1jQrueIs



 

Greetings

RamÛn Arriola

www.c3mx.com

 

 

De: TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com] En nombre de Mike
Enviado el: Viernes, 23 de Noviembre de 2007 03:48 p.m.
Para: TSCM-L2006@googlegroups.com
Asunto: [TSCM-L] {2140} Re: GPS on cellphone

 

Wouldn’t it be easier to just  pull the battery until you need to use the device.

 

Mike

 

From: TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com] On Behalf Of Rogelio Villarreal G
Sent: Friday, November 23, 2007 7:54 PM
To: TSCM-L2006@googlegroups.com
Subject: [TSCM-L] {2136} Re: GPS on cellphone

 

On the subject of GPS and cell phones, if you do not want to be tracked you have to put it in a faraday bag (at least) which cost $30.00 bucks. 

Forget the GPS, equipment exist (Rohde $ Schwarz) that can track you cvell phonhe based on the exact RF it uses.

they have simple and very sofisticated equipment. About 400,000 euros.

 

 

I sell Intel.equipment (besides working in TSCM for the last 14 years- not much - but a good start) and so by the way cellular intercept equipment (portable) also tracks cell phones.  So the best way to not be tracked is  > turne it off >>put in faraday bag or box and hope for the best

 

Roger

Mexico 

----- Original Message -----

Sent: Friday, November 23, 2007 3:14 AM

Subject: [TSCM-L] {2134} GPS on cellphone

 

Hi at all my friends,

 

In some cellphone of new generation, like Blackberry and Hp/Qtek..., there is a gps hidden

 

 

When you buy this apparate in the box or in the instruction book, there are not information about this gps, but ...

 

 

We do an upgrade firmware, by internet site of producer and ... magic moment.. now there is a icon with GPS, and this gps turn on and is possible to know the position.

 

Yes, in the electronic circuit there is the gps antenna, and other circuit for the complete function of GPS, but not the soft for to use this

 

 

Is a funny present, free, but we hope that notting can turn on this gps circuit without our autorization, for to know where we are esacty  

 

best to all

 

Massimo

 

Lorenz Detective and TSCM

Italy

 

 

Faccine GRATIS per la vostra posta elettronica - da IncrediMail! Fare clic qui!<BR


 


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.27] ([172.28.128.27]:40475 "EHLO ip04.ams.ftl.affinity.com") by ams012.ftl.affinity.com with ESMTP id S376765AbXKZAsT; Sun, 25 Nov 2007 19:48:19 -0500 Received: from wa-out-0708.google.com ([209.85.146.242]) by ip04.ams.ftl.affinity.com with ESMTP; 25 Nov 2007 19:48:17 -0500 Received: by wa-out-0708.google.com with SMTP id j19so84241waf for ; Sun, 25 Nov 2007 16:48:17 -0800 (PST) Received: by 10.114.136.1 with SMTP id j1mr828511wad.1196038088543; Sun, 25 Nov 2007 16:48:08 -0800 (PST) Received: by 10.107.106.6 with SMTP id i6gr2147prm; Sun, 25 Nov 2007 16:47:58 -0800 (PST) X-Sender: xmitman@prodigy.net X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.114.190.6 with SMTP id n6mr3150419waf.1195904866440; Sat, 24 Nov 2007 03:47:46 -0800 (PST) Received: from host.blockyourid.com (host.blockyourid.com [72.52.208.92]) by mx.google.com with ESMTP id k36si18978336waf.2007.11.24.03.47.45; Sat, 24 Nov 2007 03:47:46 -0800 (PST) Received-SPF: neutral (google.com: 72.52.208.92 is neither permitted nor denied by best guess record for domain of xmitman@prodigy.net) client-ip=72.52.208.92; Authentication-Results: mx.google.com; spf=neutral (google.com: 72.52.208.92 is neither permitted nor denied by best guess record for domain of xmitman@prodigy.net) smtp.mail=xmitman@prodigy.net Received: from [24.241.36.56] (port=57862 helo=xmitmandelldesk) by host.blockyourid.com with smtp (Exim 4.68) (envelope-from ) id 1IvtU7-0001cy-HQ for TSCM-L2006@googlegroups.com; Sat, 24 Nov 2007 06:47:43 -0500 From: "Mark Smith" To: Subject: [TSCM-L] {2147} Re: Boat anchors and wiretapping ... who knew Date: Sat, 24 Nov 2007 06:47:42 -0500 Message-ID: Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0) X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 Importance: Normal In-Reply-To: <20071123163459.GA24358@lebbalot> X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - host.blockyourid.com X-AntiAbuse: Original Domain - googlegroups.com X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - prodigy.net X-Google-Approved: grainger01982@gmail.com via web at 2007-11-26 00:47:58 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , The link is not working. Anybody have a good link? -----Original Message----- From: TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com]On Behalf Of lebbatdot@cogeco.ca Sent: Friday, November 23, 2007 11:35 AM To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2133} Boat anchors and wiretapping ... who knew Interesting on line book http://search.live.com/results.aspx?q=&scope=books#q=wiretap%22&filter=all&s tart=1&t=4W0o-0XOjPaexxGvEr0asw&sq=wiretap%22 __________ NOD32 2683 (20071124) Information __________ This message was checked by NOD32 antivirus system. http://www.eset.com --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:22416 "EHLO ip04.ams.ftl.affinity.com") by ams013.ftl.affinity.com with ESMTP id S387454AbXKZAsa; Sun, 25 Nov 2007 19:48:30 -0500 Received: from wr-out-0708.google.com ([64.233.184.247]) by ip04.ams.ftl.affinity.com with ESMTP; 25 Nov 2007 19:48:29 -0500 Received: by wr-out-0708.google.com with SMTP id 28so13461089wra for ; Sun, 25 Nov 2007 16:48:29 -0800 (PST) Received: by 10.100.143.12 with SMTP id q12mr448831and.1196038100322; Sun, 25 Nov 2007 16:48:20 -0800 (PST) Received: by 10.107.94.14 with SMTP id w14gr2148prl; Sun, 25 Nov 2007 16:48:16 -0800 (PST) X-Sender: j.nolan33@verizon.net X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.126.2 with SMTP id d2mr18075691pyn.1196032486012; Sun, 25 Nov 2007 15:14:46 -0800 (PST) Received: from vms048pub.verizon.net (vms048pub.verizon.net [206.46.252.48]) by mx.google.com with ESMTP id z53si8923860pyg.2007.11.25.15.14.45; Sun, 25 Nov 2007 15:14:46 -0800 (PST) Received-SPF: pass (google.com: domain of j.nolan33@verizon.net designates 206.46.252.48 as permitted sender) client-ip=206.46.252.48; Authentication-Results: mx.google.com; spf=pass (google.com: domain of j.nolan33@verizon.net designates 206.46.252.48 as permitted sender) smtp.mail=j.nolan33@verizon.net Received: from p4xp ([151.203.113.55]) by vms048.mailsrvcs.net (Sun Java System Messaging Server 6.2-6.01 (built Apr 3 2006)) with ESMTPA id <0JS300CHU4KIF7A1@vms048.mailsrvcs.net> for TSCM-L2006@googlegroups.com; Sun, 25 Nov 2007 17:14:45 -0600 (CST) Date: Sun, 25 Nov 2007 18:14:51 -0500 From: "J.Nolan" Subject: [TSCM-L] {2148} Re: GPS on cellphone To: Message-id: <001101c82fb8$fb762110$6401a8c0@p4xp> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 X-Mailer: Microsoft Outlook Express 6.00.2900.3138 X-Priority: 3 X-MSMail-priority: Normal X-Google-Approved: grainger01982@gmail.com via web at 2007-11-26 00:48:16 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , A cell phone can be isolated in those conducting, semi-transparent antistatic (ESD) bags used for circuit boards and computer hard drives. Two bags have sufficient attenuation to isolate a phone from the cell tower whether the phone is on or off. Conducting ESD bags made with a metalized polyester and polyethyene material offer enough transparency that if you leave the phone on and the display visible within a sealed double bag, you can test whether the phone can make or receive a call. The following vendor is offering 5x8 inch bags in a package of 100 each for $5.31. http://www.absolutesci.com/shopexd.asp?id=20567 Jim --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:12355 "EHLO ip03.ams.ftl.affinity.com") by ams013.ftl.affinity.com with ESMTP id S387456AbXKZAtP; Sun, 25 Nov 2007 19:49:15 -0500 Received: from py-out-1314.google.com ([64.233.166.175]) by ip03.ams.ftl.affinity.com with ESMTP; 25 Nov 2007 19:49:15 -0500 Received: by py-out-1314.google.com with SMTP id u10so3312853pyb for ; Sun, 25 Nov 2007 16:49:14 -0800 (PST) Received: by 10.35.81.2 with SMTP id i2mr920358pyl.1196038145508; Sun, 25 Nov 2007 16:49:05 -0800 (PST) Received: by 10.107.94.14 with SMTP id w14gr2149prl; Sun, 25 Nov 2007 16:48:50 -0800 (PST) X-Sender: chris.cauwood@googlemail.com X-Apparently-To: TSCM-L2006@googlegroups.com Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Message-ID: Date: Sat, 24 Nov 2007 02:13:54 -0800 (PST) Received: by 10.86.82.16 with SMTP id f16mr290341fgb.1195899234187; Sat, 24 Nov 2007 02:13:54 -0800 (PST) In-Reply-To: X-IP: 217.42.214.106 References: User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.8.1.9) Gecko/20071025 Firefox/2.0.0.9,gzip(gfe),gzip(gfe) Subject: [TSCM-L] {2149} Re: {2132} Intel Digest From: BDEye To: TSCM-L Professionals List X-Google-Approved: grainger01982@gmail.com via web at 2007-11-26 00:48:50 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Hi All - re Monthly Bug Report Thanks for the response. I used to sell Scanlock, SuperBroom and other TSCM gear. As you will know most people want a magic device which plots all RF threats in their location and preferably disables them at the press of a button. Questions like 'can we detect a microphone 1 km away?' (I'd like to see this microphone!) Most of the time I spent explaining why they must not have sensitive conversations in unswept rooms and why they could not listen in on spread spectrum and digital encrypted devices! This without sending them out into the desert to chat and thereby destroying all business prospects Weekly / Monthly you say? I am surprised at weekly - how many ways are they skinning this cat these days? ?Do I want someone to do the work - yes, please but through me Fly in and do a brief ? To make up a program and have some regular 'breaking news' sufficient to justify the overhead of flights and hotels into say Abu Dhabi and then get the right, busy, interested guys together - herding cats springs to mind. Perhaps an initial brief to 'make friends' followed by a digest update with nice photos - graphics of range/ frequency / technology followed by an update visit every 3/6 months would be my idea. Begs the question why they cannot get this free through international intelligence sharing. (I know there are the bugs we're not supposed to find!) As always I welcome your comments Chris On Nov 24, 12:22 am, NoPositiveW...@aol.com wrote: > In a message dated 11/23/2007 11:33:32 AM Pacific Standard Time, > > chris.cauw...@googlemail.com writes: > > I'm looking for any company/ organisation who publishes a monthly or > quarterly confidential report on TSCM threats, bugs and politics which > can be sold to Middle East Law Enforcement agencies > > So you're looking for someone to do the work for you? > > Those who are evil spy on the godly, > waiting for an excuse to kill them. > But the LORD will not let the wicked succeed > or let the godly be condemned when they are brought before the judge. > > Psalm 37:32-33 > NLT > > **************************************Check out AOL's list of 2007's hottest > products. > (http://money.aol.com/special/hot-products-2007?NCID=aoltop00030000000001) --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.24] ([172.28.128.24]:57494 "EHLO ip01.ams.ftl.affinity.com") by ams009.ftl.affinity.com with ESMTP id S461397AbXKZT5J; Mon, 26 Nov 2007 14:57:09 -0500 Received: from py-out-1314.google.com ([64.233.166.173]) by ip01.ams.ftl.affinity.com with ESMTP; 26 Nov 2007 14:57:08 -0500 Received: by py-out-1314.google.com with SMTP id u10so5377439pyb for ; Mon, 26 Nov 2007 11:57:08 -0800 (PST) Received: by 10.35.43.10 with SMTP id v10mr995646pyj.1196104725555; Mon, 26 Nov 2007 11:18:45 -0800 (PST) Received: by 10.106.179.39 with SMTP id b39gr2150prf; Mon, 26 Nov 2007 11:18:38 -0800 (PST) X-Sender: bnsmith@cogeco.ca X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.13.4 with SMTP id q4mr19047711pyi.1196088612391; Mon, 26 Nov 2007 06:50:12 -0800 (PST) Received: from fep5.cogeco.net (smtp.cogeco.net [216.221.81.25]) by mx.google.com with ESMTP id a28si9407533pye.2007.11.26.06.50.12; Mon, 26 Nov 2007 06:50:12 -0800 (PST) Received-SPF: pass (google.com: domain of bnsmith@cogeco.ca designates 216.221.81.25 as permitted sender) client-ip=216.221.81.25; Authentication-Results: mx.google.com; spf=pass (google.com: domain of bnsmith@cogeco.ca designates 216.221.81.25 as permitted sender) smtp.mail=bnsmith@cogeco.ca Received: from files (d39-60-250.home1.cgocable.net [72.39.60.250]) by fep5.cogeco.net (Postfix) with ESMTP id AD3072C6A for ; Mon, 26 Nov 2007 09:50:11 -0500 (EST) Date: Mon, 26 Nov 2007 08:50:07 -0600 From: lebbatdot@cogeco.ca To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2150} Re: Boat anchors and wiretapping ... who knew Message-ID: <20071126145007.GB24358@lebbalot> Mail-Followup-To: TSCM-L2006@googlegroups.com References: <20071123163459.GA24358@lebbalot> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 In-Reply-To: User-Agent: Mutt/1.5.9i X-Google-Approved: grainger01982@gmail.com via web at 2007-11-26 19:18:36 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , hmmmm It seems to work for me, however one can try going to live book search http://search.live.com/results.aspx?q=&scope=books look for wiretap A bunch of references come up, look for Business and Pleasure by Robert Danforth Ogg http://search.live.com/results.aspx?q=&scope=books#q=wiretap&filter=all&t=Qu7XaOIyobauTa40cBUStw Discusses electronic bugging, naval intelligence, World War II, and the invention of the Danforth Anchor, and development of anchor business, ongoing inventions, and his work with the California State Division of Communications. He also speaks of his family influences, education, physical and social aspects of life in Maine and St. Croix, the UC Berkeley Foundation and his work on behalf of UCB. * Mark Smith (xmitman@prodigy.net) wrote: > > The link is not working. Anybody have a good link? > > -----Original Message----- > From: TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com]On > Behalf Of lebbatdot@cogeco.ca > Sent: Friday, November 23, 2007 11:35 AM > To: TSCM-L2006@googlegroups.com > Subject: [TSCM-L] {2133} Boat anchors and wiretapping ... who knew > > > > Interesting on line book > > http://search.live.com/results.aspx?q=&scope=books#q=wiretap%22&filter=all&s > tart=1&t=4W0o-0XOjPaexxGvEr0asw&sq=wiretap%22 > > > > __________ NOD32 2683 (20071124) Information __________ > > This message was checked by NOD32 antivirus system. > http://www.eset.com > > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.24] ([172.28.128.24]:32341 "EHLO ip01.ams.ftl.affinity.com") by ams009.ftl.affinity.com with ESMTP id S461530AbXKZT6h; Mon, 26 Nov 2007 14:58:37 -0500 Received: from py-out-1314.google.com ([64.233.166.171]) by ip01.ams.ftl.affinity.com with ESMTP; 26 Nov 2007 14:58:36 -0500 Received: by py-out-1314.google.com with SMTP id u10so5381179pyb for ; Mon, 26 Nov 2007 11:58:35 -0800 (PST) Received: by 10.35.20.16 with SMTP id x16mr987910pyi.1196104740600; Mon, 26 Nov 2007 11:19:00 -0800 (PST) Received: by 10.106.179.39 with SMTP id b39gr2151prf; Mon, 26 Nov 2007 11:18:48 -0800 (PST) X-Sender: perry@detectiveservices.com X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.35.126.2 with SMTP id d2mr19408009pyn.1196101938302; Mon, 26 Nov 2007 10:32:18 -0800 (PST) Received: from sprout.phpwebhosting.com (cp.sprout.phpwebhosting.com [66.132.153.48]) by mx.google.com with SMTP id z53si9552169pyg.2007.11.26.10.32.11; Mon, 26 Nov 2007 10:32:18 -0800 (PST) Received-SPF: neutral (google.com: 66.132.153.48 is neither permitted nor denied by best guess record for domain of perry@detectiveservices.com) client-ip=66.132.153.48; Authentication-Results: mx.google.com; spf=neutral (google.com: 66.132.153.48 is neither permitted nor denied by best guess record for domain of perry@detectiveservices.com) smtp.mail=perry@detectiveservices.com Received: (qmail 28873 invoked from network); 26 Nov 2007 18:27:00 -0000 Received: from unknown (HELO perry-myers-computer.local) (perry%detectiveservices.com@72.16.160.172) by sprout.phpwebhosting.com with SMTP; Mon, 26 Nov 2007 13:27:00 -0500 Message-ID: <474B112A.9040407@detectiveservices.com> Date: Mon, 26 Nov 2007 12:32:10 -0600 From: Perry Myers Reply-To: TSCM-L2006@googlegroups.com Organization: MSI Detective Services User-Agent: Thunderbird 2.0.0.9 (Macintosh/20071031) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2151} Re: Boat anchors and wiretapping ... who knew References: In-Reply-To: X-Google-Approved: grainger01982@gmail.com via web at 2007-11-26 19:18:47 Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Works fine for me. Make sure to include the whole link. Sometimes it gets broken up in email. So best to cut and paste. The link ends with %22. Perry Myers, CFE President Myers Service, Inc. MSI Detective Services 3221 N Ashland Ave #2W Chicago, IL 60657 773-404-7400 x 20 perry@detectiveservices.com www.detectiveservices.com Illinois - Florida - Wisconsin Mark Smith wrote: > The link is not working. Anybody have a good link? > > -----Original Message----- > From: TSCM-L2006@googlegroups.com [mailto:TSCM-L2006@googlegroups.com]On > Behalf Of lebbatdot@cogeco.ca > Sent: Friday, November 23, 2007 11:35 AM > To: TSCM-L2006@googlegroups.com > Subject: [TSCM-L] {2133} Boat anchors and wiretapping ... who knew > > > > Interesting on line book > > http://search.live.com/results.aspx?q=&scope=books#q=wiretap%22&filter=all&s > tart=1&t=4W0o-0XOjPaexxGvEr0asw&sq=wiretap%22 > > > > __________ NOD32 2683 (20071124) Information __________ > > This message was checked by NOD32 antivirus system. > http://www.eset.com > > > > > > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:59128 "EHLO ip03.ams.ftl.affinity.com") by ams009.ftl.affinity.com with ESMTP id S462045AbXKZUNW; Mon, 26 Nov 2007 15:13:22 -0500 Received: from wa-out-0708.google.com ([209.85.146.245]) by ip03.ams.ftl.affinity.com with ESMTP; 26 Nov 2007 15:13:20 -0500 Received: by wa-out-0708.google.com with SMTP id j19so996371waf for ; Mon, 26 Nov 2007 12:13:15 -0800 (PST) Received: by 10.114.204.7 with SMTP id b7mr799434wag.1196105672473; Mon, 26 Nov 2007 11:34:32 -0800 (PST) Received: by 10.107.100.4 with SMTP id c4gr2152prm; Mon, 26 Nov 2007 11:34:27 -0800 (PST) X-Sender: dan@geer.org X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.54.19 with SMTP id g19mr19489240pyk.1196105666310; Mon, 26 Nov 2007 11:34:26 -0800 (PST) Received: from absinthe.tinho.net (absinthe.tinho.net [166.84.5.228]) by mx.google.com with ESMTP id h49si1142632nzf.2007.11.26.11.34.25; Mon, 26 Nov 2007 11:34:26 -0800 (PST) Received-SPF: neutral (google.com: 166.84.5.228 is neither permitted nor denied by best guess record for domain of dan@geer.org) client-ip=166.84.5.228; Authentication-Results: mx.google.com; spf=neutral (google.com: 166.84.5.228 is neither permitted nor denied by best guess record for domain of dan@geer.org) smtp.mail=dan@geer.org Received: by absinthe.tinho.net (Postfix, from userid 126) id 7F1E033E4B; Mon, 26 Nov 2007 14:34:25 -0500 (EST) Received: from absinthe.tinho.net (localhost [127.0.0.1]) by absinthe.tinho.net (Postfix) with ESMTP id 7D3C133E20 for ; Mon, 26 Nov 2007 14:34:25 -0500 (EST) From: dan@geer.org To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2152} Re: Boat anchors and wiretapping ... who knew In-Reply-To: Your message of "Mon, 26 Nov 2007 12:32:10 CST." <474B112A.9040407@detectiveservices.com> Date: Mon, 26 Nov 2007 14:34:25 -0500 Message-Id: <20071126193425.7F1E033E4B@absinthe.tinho.net> Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , this http://search.live.com/results.aspx?q=&scope=books#q=wiretap%22&filter=all&start=1&t=4W0o-0XOjPaexxGvEr0asw&sq=wiretap%22 displays a content-free, border-only page on my non-Microsoft platform and, no, I don't really care except to confirm the previous writer's inability to see anything at the above address --dan --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:20868 "EHLO ip03.ams.ftl.affinity.com") by ams012.ftl.affinity.com with ESMTP id S387959AbXK0Tgy; Tue, 27 Nov 2007 14:36:54 -0500 Received: from wa-out-0708.google.com ([209.85.146.247]) by ip03.ams.ftl.affinity.com with ESMTP; 27 Nov 2007 14:36:51 -0500 Received: by wa-out-0708.google.com with SMTP id j19so972207waf for ; Tue, 27 Nov 2007 11:36:48 -0800 (PST) Received: by 10.114.107.19 with SMTP id f19mr40602wac.1196189697837; Tue, 27 Nov 2007 10:54:57 -0800 (PST) Received: by 10.107.115.27 with SMTP id s27gr2153prm; Tue, 27 Nov 2007 10:54:57 -0800 (PST) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.13.4 with SMTP id q4mr1131311pyi.1196189696010; Tue, 27 Nov 2007 10:54:56 -0800 (PST) Received: from swip002.ftl.affinity.com (lvs00-fl-swip002.ftl.affinity.com [216.219.253.12]) by mx.google.com with ESMTP id h49si1795594nzf.2007.11.27.10.54.55; Tue, 27 Nov 2007 10:54:56 -0800 (PST) Received-SPF: neutral (google.com: 216.219.253.12 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.12; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.12 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [70.22.236.219] ([70.22.236.219]:34828 "EHLO Raphael.tscm.com") by swip002.ftl.affinity.com with ESMTP id S362113AbXK0Syx (ORCPT ); Tue, 27 Nov 2007 13:54:53 -0500 Message-Id: <7.0.1.0.2.20071127135257.12e7bf70@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Tue, 27 Nov 2007 13:53:38 -0500 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] {2153} Courage Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , "Courage is being scared to death and saddling up anyways" - John Wayne ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:15302 "EHLO ip03.ams.ftl.affinity.com") by ams009.ftl.affinity.com with ESMTP id S607778AbXK0Vyd; Tue, 27 Nov 2007 16:54:33 -0500 Received: from wr-out-0708.google.com ([64.233.184.247]) by ip03.ams.ftl.affinity.com with ESMTP; 27 Nov 2007 16:54:25 -0500 Received: by wr-out-0708.google.com with SMTP id 28so1365130wra for ; Tue, 27 Nov 2007 13:54:25 -0800 (PST) Received: by 10.100.125.12 with SMTP id x12mr42162anc.1196200455896; Tue, 27 Nov 2007 13:54:15 -0800 (PST) Received: by 10.107.114.37 with SMTP id r37gr2154prm; Tue, 27 Nov 2007 13:54:11 -0800 (PST) X-Sender: FaxTrac@aol.com X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.35.108.12 with SMTP id k12mr1383084pym.1196199274353; Tue, 27 Nov 2007 13:34:34 -0800 (PST) Received: from imo-m12.mail.aol.com (imo-m12.mx.aol.com [64.12.136.171]) by mx.google.com with ESMTP id h49si1885801nzf.2007.11.27.13.34.28; Tue, 27 Nov 2007 13:34:34 -0800 (PST) Received-SPF: pass (google.com: domain of FaxTrac@aol.com designates 64.12.136.171 as permitted sender) client-ip=64.12.136.171; Authentication-Results: mx.google.com; spf=pass (google.com: domain of FaxTrac@aol.com designates 64.12.136.171 as permitted sender) smtp.mail=FaxTrac@aol.com Received: from FaxTrac@aol.com by imo-m12.mx.aol.com (mail_out_v38_r9.3.) id r.bd9.22f16210 (39955) for ; Tue, 27 Nov 2007 16:32:33 -0500 (EST) From: FaxTrac@aol.com Message-ID: Date: Tue, 27 Nov 2007 16:32:33 EST Subject: [TSCM-L] {2154} (no subject) To: tscm-l2006@googlegroups.com Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="-----------------------------1196199153" X-Mailer: 9.0 Security Edition for Windows sub 5379 X-Spam-Flag: NO X-Google-Approved: grainger01982@gmail.com via web at 2007-11-27 21:54:11 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

I've got an HP 141T, 8553B, 8552B Spectrum Analyzer with the  HP5555A 18Ghz spectrum analyzer RF plug-in and a NEW CRT in VERY GOOD CONDITION!
I purchased this and do not need it. My lose is your gain. Email me with your best offers.
Jeff Warshal
FaxTrac Information Services
Atlanta, Georgia




Check out AOL Money & Finance's list of the hottest products and top money wasters of 2007.

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.26] ([172.28.128.26]:27869 "EHLO ip03.ams.ftl.affinity.com") by ams011.ftl.affinity.com with ESMTP id S476736AbXK1Auw; Tue, 27 Nov 2007 19:50:52 -0500 Received: from wr-out-0708.google.com ([64.233.184.247]) by ip03.ams.ftl.affinity.com with ESMTP; 27 Nov 2007 19:50:52 -0500 Received: by wr-out-0708.google.com with SMTP id 28so1537233wra for ; Tue, 27 Nov 2007 16:50:52 -0800 (PST) Received: by 10.100.152.19 with SMTP id z19mr46503and.1196211043351; Tue, 27 Nov 2007 16:50:43 -0800 (PST) Received: by 10.107.65.8 with SMTP id s8gr2155prk; Tue, 27 Nov 2007 16:50:38 -0800 (PST) X-Sender: reginald_curtis@hotmail.com X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.114.95.1 with SMTP id s1mr874944wab.1196211037887; Tue, 27 Nov 2007 16:50:37 -0800 (PST) Received: from bay0-omc3-s12.bay0.hotmail.com (bay0-omc3-s12.bay0.hotmail.com [65.54.246.212]) by mx.google.com with ESMTP id k36si30507819waf.2007.11.27.16.50.14; Tue, 27 Nov 2007 16:50:37 -0800 (PST) Received-SPF: pass (google.com: domain of reginald_curtis@hotmail.com designates 65.54.246.212 as permitted sender) client-ip=65.54.246.212; Authentication-Results: mx.google.com; spf=pass (google.com: domain of reginald_curtis@hotmail.com designates 65.54.246.212 as permitted sender) smtp.mail=reginald_curtis@hotmail.com Received: from BAY120-W18 ([207.46.9.181]) by bay0-omc3-s12.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Tue, 27 Nov 2007 16:50:12 -0800 Message-ID: Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="_ef0a2cf0-55bf-49fd-afc4-c90fccbd373b_" X-Originating-IP: [99.251.212.199] From: Reginald Curtis To: Subject: [TSCM-L] {2155} Re: Courage Date: Wed, 28 Nov 2007 00:50:12 +0000 Importance: Normal In-Reply-To: <7.0.1.0.2.20071127135257.12e7bf70@tscm.com> References: <7.0.1.0.2.20071127135257.12e7bf70@tscm.com> X-OriginalArrivalTime: 28 Nov 2007 00:50:12.0423 (UTC) FILETIME=[A1F68570:01C83158] Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Perfect! Those 10 words say it all.

Reg Curtis



> Date: Tue, 27 Nov 2007 13:53:38 -0500
> To: TSCM-L2006@googlegroups.com
> From: jmatk@tscm.com
> Subject: [TSCM-L] {2153} Courage
>
>
>
> "Courage is being scared to death and saddling up anyways" - John Wayne
>
>
> ----------------------------------------------------------------------------------------------------
> World Class, Professional, Ethical, and Competent Bug Sweeps, and
> Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
> ----------------------------------------------------------------------------------------------------
> James M. Atkinson Phone: (978) 381-9111
> Granite Island Group Fax:
> 127 Eastern Avenue #291 Web: http://www.tscm.com/
> Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com
> ----------------------------------------------------------------------------------------------------
> We perform bug sweeps like it's a full contact sport, we take no prisoners,
> and we give no quarter. Our goal is to simply, and completely stop the spy.
> ----------------------------------------------------------------------------------------------------
>
>
>
>
> --~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.24] ([172.28.128.24]:26167 "EHLO ip01.ams.ftl.affinity.com") by ams016.ftl.affinity.com with ESMTP id S364998AbXK1BBA; Tue, 27 Nov 2007 20:01:00 -0500 Received: from ug-out-1516.google.com ([66.249.92.165]) by ip01.ams.ftl.affinity.com with ESMTP; 27 Nov 2007 20:01:00 -0500 Received: by ug-out-1516.google.com with SMTP id z26so487211ugc for ; Tue, 27 Nov 2007 17:00:59 -0800 (PST) Received: by 10.86.28.5 with SMTP id b5mr35653fgb.1196211650077; Tue, 27 Nov 2007 17:00:50 -0800 (PST) Received: by 10.107.94.14 with SMTP id w14gr2156prl; Tue, 27 Nov 2007 17:00:41 -0800 (PST) X-Sender: walsingham@sbcglobal.net X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.126.2 with SMTP id d2mr1597400pyn.1196207567039; Tue, 27 Nov 2007 15:52:47 -0800 (PST) Received: from smtp112.sbc.mail.re2.yahoo.com (smtp112.sbc.mail.re2.yahoo.com [68.142.229.93]) by mx.google.com with SMTP id y6si1949892nzg.2007.11.27.15.52.46; Tue, 27 Nov 2007 15:52:47 -0800 (PST) Received-SPF: neutral (google.com: 68.142.229.93 is neither permitted nor denied by best guess record for domain of walsingham@sbcglobal.net) client-ip=68.142.229.93; DomainKey-Status: good (test mode) Authentication-Results: mx.google.com; spf=neutral (google.com: 68.142.229.93 is neither permitted nor denied by best guess record for domain of walsingham@sbcglobal.net) smtp.mail=walsingham@sbcglobal.net; domainkeys=pass (test mode) header.From=walsingham@sbcglobal.net Received: (qmail 50894 invoked from network); 27 Nov 2007 23:52:45 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=sbcglobal.net; h=Received:X-YMail-OSG:Mime-Version:In-Reply-To:References:Content-Type:Message-Id:From:Subject:Date:To:X-Mailer; b=e7MIt0A3CxUR1l4xKwhuQ1SXvsnYdmEetg5aIBgt/3OnDwgqUFn3a+Ebu/ElezrtV07b61pki63pLYi8wD8qxK+zsMPtY52zvWRJmMsA/+mQG//r2G5l0BwUxc7z5mfs1fgplnXggOahEdrCF9UapOfYzRrhipvhx9pgyt/TDks= ; Received: from unknown (HELO ?192.168.0.3?) (walsingham@sbcglobal.net@75.62.5.162 with plain) by smtp112.sbc.mail.re2.yahoo.com with SMTP; 27 Nov 2007 23:52:45 -0000 X-YMail-OSG: 4Cb.JqYVM1nzXrZ413vcDhyWCPpex7t9ftytStQsB_5AZCfFo8ESoIkgkq2HbdhMGrDimOnyfWnAquv0Cy.0wqLcpRQCVBFqWh8rSzNBV3_RN4IwrxZg9_1Rzz1qbvsvRSao8eOj0UyMEtM- Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="Apple-Mail-1-1004426703" In-Reply-To: References: Message-Id: <057670fa632beb025e7ef5049c7f729c@sbcglobal.net> From: Patrick Bennett Subject: [TSCM-L] {2156} Re: (no subject) Date: Tue, 27 Nov 2007 15:51:15 -0800 To: TSCM-L2006@googlegroups.com X-Mailer: Apple Mail (2.624) X-Google-Approved: grainger01982@gmail.com via web at 2007-11-28 01:00:41 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Hi Jeff Can you tell me more about the spectrum analyzer. How old? Cost new? What would want for it. Patrick On Nov 27, 2007, at 1:32 PM, FaxTrac@aol.com wrote: ArialI've got an HP 141T, 8553B, 8552B Spectrum Analyzer with the †HP5555A 18Ghz spectrum analyzer RF plug-in and†a NEW CRT in VERY GOOD CONDITION! ArialI purchased this and do not need it. My lose is your gain. Email me with your best offers. ArialJeff Warshal ArialFaxTrac Information Services ArialAtlanta, Georgia ArialCheck out AOL Money & Finance's list of the 0000,0000,EEEEhottest products and 0000,0000,EEEEtop money wasters of 2007. Arial --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.25] ([172.28.128.25]:47807 "EHLO ip02.ams.ftl.affinity.com") by ams009.ftl.affinity.com with ESMTP id S612330AbXK1Dwn; Tue, 27 Nov 2007 22:52:43 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAK90TEdA6aL3i2dsb2JhbACOHoEeAgEIBAQTEQWBEA Received: from py-out-1314.google.com ([64.233.166.168]) by ip02.ams.ftl.affinity.com with ESMTP; 27 Nov 2007 22:52:43 -0500 Received: by py-out-1314.google.com with SMTP id u10so2834663pyb for ; Tue, 27 Nov 2007 19:52:42 -0800 (PST) Received: by 10.141.12.18 with SMTP id p18mr58471rvi.1196221953545; Tue, 27 Nov 2007 19:52:33 -0800 (PST) Received: by 10.107.100.4 with SMTP id c4gr2157prm; Tue, 27 Nov 2007 19:52:29 -0800 (PST) X-Sender: SurveillanceInc@aol.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.54.19 with SMTP id g19mr1745608pyk.1196214412560; Tue, 27 Nov 2007 17:46:52 -0800 (PST) Received: from imo-m14.mx.aol.com (imo-m14.mx.aol.com [64.12.138.204]) by mx.google.com with ESMTP id x35si2001624nzg.2007.11.27.17.46.51; Tue, 27 Nov 2007 17:46:52 -0800 (PST) Received-SPF: pass (google.com: domain of SurveillanceInc@aol.com designates 64.12.138.204 as permitted sender) client-ip=64.12.138.204; Authentication-Results: mx.google.com; spf=pass (google.com: domain of SurveillanceInc@aol.com designates 64.12.138.204 as permitted sender) smtp.mail=SurveillanceInc@aol.com Received: from SurveillanceInc@aol.com by imo-m14.mx.aol.com (mail_out_v38_r9.3.) id r.c3e.22949fb3 (52421) for ; Tue, 27 Nov 2007 20:46:45 -0500 (EST) Received: from Inbox (032-301-129.area1.spcsdns.net [70.0.245.85]) by ciaaol-m06.mx.aol.com (v121.4) with ESMTP id MAILCIAAOLM064-ccc5474cc85c3c2; Tue, 27 Nov 2007 20:46:43 -0500 Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 From: "John W. Hancock" Subject: [TSCM-L] {2157} Re: (price) Date: Tue, 27 Nov 2007 17:47:33 -0800 Importance: normal X-Priority: 3 To: X-AOL-IP: 70.0.245.85 X-Mailer: Unknown (No Version) Message-ID: X-Spam-Flag: NO X-Google-Approved: grainger01982@gmail.com via web at 2007-11-28 03:52:28 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Do you have a phone number I can call you at? JohnHancock@SurveillanceInc.net 818-481-0909 -----Original Message----- From: FaxTrac@aol.com To: tscm-l2006@googlegroups.com Sent: 11/27/07 1:32 PM Subject: [TSCM-L] {2154} (no subject) I've got an HP 141T, 8553B, 8552B Spectrum Analyzer with the HP5555A 18Ghz spectrum analyzer RF plug-in and a NEW CRT in VERY GOOD CONDITION! I purchased this and do not need it. My lose is your gain. Email me with your best offers. Jeff Warshal FaxTrac Information Services Atlanta, Georgia **************************************Check out AOL's list of 2007's hottest products. (http://money.aol.com/special/hot-products-2007?NCID=aoltop00030000000001) --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:2430 "EHLO ip03.ams.ftl.affinity.com") by ams012.ftl.affinity.com with ESMTP id S382433AbXK1VMf; Wed, 28 Nov 2007 16:12:35 -0500 Received: from ug-out-1516.google.com ([66.249.92.163]) by ip03.ams.ftl.affinity.com with ESMTP; 28 Nov 2007 16:12:34 -0500 Received: by ug-out-1516.google.com with SMTP id z26so209255ugc for ; Wed, 28 Nov 2007 13:12:32 -0800 (PST) Received: by 10.86.9.8 with SMTP id 8mr60959fgi.1196284343837; Wed, 28 Nov 2007 13:12:23 -0800 (PST) Received: by 10.107.100.4 with SMTP id c4gr2158prm; Wed, 28 Nov 2007 13:12:17 -0800 (PST) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.16.7 with SMTP id t7mr3107813pyi.1196284336717; Wed, 28 Nov 2007 13:12:16 -0800 (PST) Received: from swip001.ftl.affinity.com (lvs00-fl-swip001.ftl.affinity.com [216.219.253.11]) by mx.google.com with ESMTP id h71si2508544nzf.2007.11.28.13.12.16; Wed, 28 Nov 2007 13:12:16 -0800 (PST) Received-SPF: neutral (google.com: 216.219.253.11 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.11; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.11 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [70.22.236.219] ([70.22.236.219]:18704 "EHLO Raphael.tscm.com") by swip001.ftl.affinity.com with ESMTP id S374397AbXK1VMP (ORCPT ); Wed, 28 Nov 2007 16:12:15 -0500 Message-Id: <7.0.1.0.2.20071128161339.091c72e8@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Wed, 28 Nov 2007 16:14:05 -0500 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] {2158} Life's Tough Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , "Life's tough, it's even tougher if you're stupid." -John Wayne ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.24] ([172.28.128.24]:20569 "EHLO ip01.ams.ftl.affinity.com") by ams009.ftl.affinity.com with ESMTP id S362791AbXK2CJs; Wed, 28 Nov 2007 21:09:48 -0500 Received: from wa-out-0708.google.com ([209.85.146.247]) by ip01.ams.ftl.affinity.com with ESMTP; 28 Nov 2007 21:09:47 -0500 Received: by wa-out-0708.google.com with SMTP id j19so494658waf for ; Wed, 28 Nov 2007 18:09:46 -0800 (PST) Received: by 10.114.103.1 with SMTP id a1mr110648wac.1196302177533; Wed, 28 Nov 2007 18:09:37 -0800 (PST) Received: by 10.107.100.4 with SMTP id c4gr2159prm; Wed, 28 Nov 2007 18:09:34 -0800 (PST) X-Sender: j@2ndr.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.108.12 with SMTP id k12mr3404564pym.1196295175181; Wed, 28 Nov 2007 16:12:55 -0800 (PST) Received: from fmailhost02.isp.att.net (fmailhost02.isp.att.net [204.127.217.102]) by mx.google.com with ESMTP id h49si2604545nzf.2007.11.28.16.12.54; Wed, 28 Nov 2007 16:12:55 -0800 (PST) Received-SPF: neutral (google.com: 204.127.217.102 is neither permitted nor denied by best guess record for domain of j@2ndr.com) client-ip=204.127.217.102; Authentication-Results: mx.google.com; spf=neutral (google.com: 204.127.217.102 is neither permitted nor denied by best guess record for domain of j@2ndr.com) smtp.mail=j@2ndr.com Received: from [192.168.0.6] (adsl-9-86-244.mia.bellsouth.net[65.9.86.244]) by isp.att.net (frfwmhc02) with ESMTP id <20071129001253H0200aq8sve>; Thu, 29 Nov 2007 00:12:53 +0000 X-Originating-IP: [65.9.86.244] Message-ID: <474E02C5.7020008@2ndr.com> Date: Wed, 28 Nov 2007 19:07:33 -0500 From: j Reply-To: TSCM-L2006@googlegroups.com Organization: SecReinTech User-Agent: Thunderbird 2.0.0.9 (Windows/20071031) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2159} Re: Life's Tough: Corollary References: <7.0.1.0.2.20071128161339.091c72e8@tscm.com> In-Reply-To: <7.0.1.0.2.20071128161339.091c72e8@tscm.com> X-Google-Approved: grainger01982@gmail.com via web at 2007-11-29 02:09:34 Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , And for those who think they're smart wait till you try death... James M. Atkinson wrote: > > "Life's tough, it's even tougher if you're stupid." -John Wayne > > > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > We perform bug sweeps like it's a full contact sport, we take no prisoners, > and we give no quarter. Our goal is to simply, and completely stop the spy. > ---------------------------------------------------------------------------------------------------- > > > > > > > > -- =================================================== Good sense is, of all things among men, the most equally distributed; for everyone thinks himself so abundantly provided with it, that those who are the most difficult to satisfy in everything else, do not usually desire a larger measure of this quality than they already possess. Rene Descartes ==================================================== --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.25] ([172.28.128.25]:24676 "EHLO ip02.ams.ftl.affinity.com") by ams003.ftl.affinity.com with ESMTP id S477407AbXK2QNn; Thu, 29 Nov 2007 11:13:43 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAGNzTkfRVZL6kmdsb2JhbACCPTaMTAIBAQcEBCmBEQ Received: from wa-out-0708.google.com ([209.85.146.250]) by ip02.ams.ftl.affinity.com with ESMTP; 29 Nov 2007 11:13:37 -0500 Received: by wa-out-0708.google.com with SMTP id j19so1273045waf for ; Thu, 29 Nov 2007 08:13:30 -0800 (PST) Received: by 10.114.113.1 with SMTP id l1mr135046wac.1196349466469; Thu, 29 Nov 2007 07:17:46 -0800 (PST) Received: by 10.107.100.4 with SMTP id c4gr2160prm; Thu, 29 Nov 2007 07:17:43 -0800 (PST) X-Sender: pn@pn.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.54.19 with SMTP id g19mr3583529pyk.1196303473338; Wed, 28 Nov 2007 18:31:13 -0800 (PST) Received: from smtp110.plus.mail.re1.yahoo.com (smtp110.plus.mail.re1.yahoo.com [69.147.102.73]) by mx.google.com with SMTP id a28si11546286pye.2007.11.28.18.31.12; Wed, 28 Nov 2007 18:31:13 -0800 (PST) Received-SPF: neutral (google.com: 69.147.102.73 is neither permitted nor denied by best guess record for domain of pn@pn.com) client-ip=69.147.102.73; Authentication-Results: mx.google.com; spf=neutral (google.com: 69.147.102.73 is neither permitted nor denied by best guess record for domain of pn@pn.com) smtp.mail=pn@pn.com Received: (qmail 57427 invoked from network); 29 Nov 2007 02:31:12 -0000 Received: from unknown (HELO 26327298008658) (pniedermeyer@76.109.90.227 with login) by smtp110.plus.mail.re1.yahoo.com with SMTP; 29 Nov 2007 02:31:12 -0000 X-YMail-OSG: pffreikVM1mANiJCYRjosZtG.z87aMQL5iHqrodSRSHhhfJZ7wdgACkR_kqcZNo4WTJXuInn7HA2y4wpHzNJOMUXflTBR39k4w6lAY4izaeFlOfVQaZWyZWH3p2C From: "Paul E. Niedermeyer" To: Subject: [TSCM-L] {2160} Google Service Uses Cell Towers to Locate Users [within about 1000 meters] Date: Wed, 28 Nov 2007 21:40:13 -0500 Message-ID: <005901c83231$2b985910$640aa8c0@26327298008658> Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_005A_01C83207.42C25110" X-Mailer: Microsoft Office Outlook 11 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 Thread-Index: AcgyMSrePAv3EFIFSMGVESJuU4zQQQ== X-Google-Approved: grainger01982@gmail.com via web at 2007-11-29 15:17:43 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

... "Google says the cell tower technique will locate the user within about 1000 meters. It doesn't use triangulation, which calculates a user location based on the user's distance to three nearby towers. Instead, it essentially shows the range of the tower that the user's phone is connecting to."
 

Google Service Uses Cell Towers to Locate Users

Google Maps With My Location, a service for mobile users that doesn't rely on GPS, is now in use by Google.

Nancy Gohring, IDG News Service

Wednesday, November 28, 2007 4:00 PM PST Google launched a location service for mobile users on Wednesday that doesn't rely on GPS.

Google Maps with My Location, currently in beta, locates users who don't have GPS-enabled phones based on their location to nearby cell towers. The result isn't as accurate as GPS (Global Positioning System) but works for people who lack the positioning technology in their phones.

"It helps users speed up search by showing the general neighborhood they're in," said Steve Lee, product manager at Google for the service. Without the location service, users must type in their address or neighborhood in order to find nearby businesses using Google Maps.

Google Maps with My Location will use GPS data to locate the user if the phone has the capability. But even for users of GPS-enabled phones, the cell location service might be useful, Lee said. That's because the cell tower feature works better indoors than GPS, it doesn't drain the phone battery as quickly and can bring up a result quicker, he said.

The service could be useful to a person who might be traveling in an unfamiliar city and looking for restaurants or other businesses. A user pulls up Google Maps and hits the zero key on the phone. A blue dot will appear on the map in the user's location. If the service used GPS in the phone, the blue dot will be solid. If the service used cell towers to determine the location, the blue dot will have a halo around it, indicating that the location isn't precise. The user can then search for nearby businesses.

Google says the cell tower technique will locate the user within about 1000 meters. It doesn't use triangulation, which calculates a user location based on the user's distance to three nearby towers. Instead, it essentially shows the range of the tower that the user's phone is connecting to.

But the accuracy should improve as more people use the service, Lee said. That's because Google is keeping a database of location queries, minus any personal information like individual phone numbers or names. That will allow Google to learn more precise information about the range of each tower, so that it can deliver a more accurate location area to users. The coverage area of cell towers can vary from about a quarter of a mile to several miles based on whether the tower is in an urban or rural area.

For now, Google Maps with My Location doesn't feature any advertising, but it could in the future. "This product makes a lot of sense for advertising," Lee said.

In order to use the service, phone owners must download a free application from Google. The application will work on BlackBerry, Windows Mobile and Symbian phones as well as many phones that support Java. A few notable exceptions include the Samsung Blackjack, Moto Q and Palm Treo 700W, which don't support the APIs (application programming interfaces) Google requires to find cell towers, Lee said.


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [172.28.128.24] ([172.28.128.24]:31971 "EHLO ip01.ams.ftl.affinity.com") by ams003.ftl.affinity.com with ESMTP id S1613623AbXK3UDq; Fri, 30 Nov 2007 15:03:46 -0500 Received: from wa-out-0708.google.com ([209.85.146.240]) by ip01.ams.ftl.affinity.com with ESMTP; 30 Nov 2007 15:03:44 -0500 Received: by wa-out-0708.google.com with SMTP id j19so55027waf for ; Fri, 30 Nov 2007 12:03:43 -0800 (PST) Received: by 10.114.168.1 with SMTP id q1mr199077wae.1196453014428; Fri, 30 Nov 2007 12:03:34 -0800 (PST) Received: by 10.107.115.27 with SMTP id s27gr2161prm; Fri, 30 Nov 2007 12:03:22 -0800 (PST) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.108.12 with SMTP id k12mr6701833pym.1196453002551; Fri, 30 Nov 2007 12:03:22 -0800 (PST) Received: from swip007.ftl.affinity.com (lvs00-fl-swip007.ftl.affinity.com [216.219.253.17]) by mx.google.com with ESMTP id 20si3851273nzu.2007.11.30.12.03.22; Fri, 30 Nov 2007 12:03:22 -0800 (PST) Received-SPF: neutral (google.com: 216.219.253.17 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) client-ip=216.219.253.17; Authentication-Results: mx.google.com; spf=neutral (google.com: 216.219.253.17 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) smtp.mail=jmatk@tscm.com Received: from [70.22.191.187] ([70.22.191.187]:18952 "EHLO Raphael.tscm.com") by swip007.ftl.affinity.com with ESMTP id S418707AbXK3UDV (ORCPT ); Fri, 30 Nov 2007 15:03:21 -0500 Message-Id: <7.0.1.0.2.20071130142849.09126798@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Fri, 30 Nov 2007 14:47:11 -0500 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] {2161} VOIP Fails Again Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , This is one of the reasons I have been ranting against the use of VOIP phone in secure environments. PLUS, they tend to pass room audio onto the network at all times, and it is wicked easy to re-flash the firmware in the phones remotely. Many hotels as putting VOIP phones in the rooms and typing the network into one big hotel network, but this allows any guest of the hotel to listen in to the rooms of any other guests at the hotel from anywhere inside the hotel, and in some cases room anywhere in the world. I also STRONGLY recommend the use of an in-line traffic analyzer, or a hub in parasitic mode (transmit circuit disabled) to see if you have traffic on a VOIP line BEFORE you disconnect it from the switch. -jma http://www.networkworld.com/news/2007/112907-cisco-voip-eavesdropping.html Cisco confirms ability to eavesdrop on remote calls using its VoIP phones By Linda Leung, NetworkWorld.com, 11/29/07 Sponsored by: Cisco confirmed it is possible to eavesdrop on remote conversations using Cisco VoIP phones. In its security response, Cisco says: "an attacker with valid Extension Mobility authentication credentials could cause a Cisco Unified IP Phone configured to use the Extension Mobility feature to transmit or receive a Real-Time Transport Protocol (RTP) audio stream." Cisco adds that Extension Mobility authentication credentials are not tied to individual IP phones and that "any Extension Mobility account configured on an IP phone's Cisco Unified Communications Manager/CallManager (CUCM) server can be used to perform an eavesdropping attack." The technique was described by Telindus researcher Joffrey Czarny at HACK.LU 2007 in Luxembourg in October. Cisco has published some workarounds to this problem in its security response. Also in October, two security experts at hacker conference ToorCon9 in San Diego hacked into their hotel's corporate network using a Cisco VoIP phone. The hackers, John Kindervag and Jason Ostrom said they were able to access the hotel's financial and corporate network and recorded other phone calls, according to a blog on Wired.com. The hackers used penetration tests propounded by a tool called VoIP Hopper, which mimics the Cisco data packets sent at three minute intervals and then trades a new Ethernet interface, getting the PC - which the hackers switched in place of the hotel phone - into the network running the VoIP, according to the blog post. The Avaya configuration is superior to Cisco, according to the hackers, because you have to send requests beyond a sniffer. Although it can be breached the same way, by replacing the phone with a PC. http://www.hack.lu/pres/hacklu07_Remote_wiretapping.pdf ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:38028 "EHLO ip04.ams.ftl.affinity.com") by ams007.ftl.affinity.com with ESMTP id S376889AbXLABSV; Fri, 30 Nov 2007 20:18:21 -0500 Received: from wa-out-0708.google.com ([209.85.146.243]) by ip04.ams.ftl.affinity.com with ESMTP; 30 Nov 2007 20:18:21 -0500 Received: by wa-out-0708.google.com with SMTP id j19so322953waf for ; Fri, 30 Nov 2007 17:18:20 -0800 (PST) Received: by 10.141.23.7 with SMTP id a7mr205918rvj.1196471891674; Fri, 30 Nov 2007 17:18:11 -0800 (PST) Received: by 10.107.114.37 with SMTP id r37gr2162prm; Fri, 30 Nov 2007 17:18:00 -0800 (PST) X-Sender: kondrak@phreaker.net X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.35.59.5 with SMTP id m5mr2576456pyk.1196471879858; Fri, 30 Nov 2007 17:17:59 -0800 (PST) Received: from aacompsec.com (aacompsec.com [205.134.161.162]) by mx.google.com with ESMTP id y6si3998638nzg.2007.11.30.17.17.59; Fri, 30 Nov 2007 17:17:59 -0800 (PST) Received-SPF: neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) client-ip=205.134.161.162; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.134.161.162 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) smtp.mail=kondrak@phreaker.net Received: from aacompsec.com (localhost [127.0.0.1]) by aacompsec.com (Postfix) with ESMTP id 92E2E503E8FFB for ; Fri, 30 Nov 2007 20:17:58 -0500 (EST) Message-ID: <4750B512.50104@phreaker.net> Date: Fri, 30 Nov 2007 20:12:50 -0500 From: kondrak Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 2.0.0.9 (Windows/20071031) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2162} Re: VOIP Fails Again References: <7.0.1.0.2.20071130142849.09126798@tscm.com> In-Reply-To: <7.0.1.0.2.20071130142849.09126798@tscm.com> X-AAC-KTE-LTE-MailScanner-Watermark: 1197076371.62742@swZiRfh/CFbG+LAL1mKVAQ Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Under those circumstances, I happen to concur, but it need NOT be insecure. Sounds like you got bit. tell us more. I run VOIP myself, but all my connections in the LAN are secured by crypto. Only after it hits the PSTN does it go clear. Not much we can do about it thereafter, unless you're using a STU end to end. James M. Atkinson wrote: > This is one of the reasons I have been ranting against the use of > VOIP phone in secure environments. > > PLUS, they tend to pass room audio onto the network at all times, and > it is wicked easy to re-flash the firmware in the phones remotely. > > Many hotels as putting VOIP phones in the rooms and typing the > network into one big hotel network, but this allows any guest of the > hotel to listen in to the rooms of any other guests at the hotel from > anywhere inside the hotel, and in some cases room anywhere in the world. > > I also STRONGLY recommend the use of an in-line traffic analyzer, or > a hub in parasitic mode (transmit circuit disabled) to see if you > have traffic on a VOIP line BEFORE you disconnect it from the switch. > > -jma > > > > > http://www.networkworld.com/news/2007/112907-cisco-voip-eavesdropping.html > > Cisco confirms ability to eavesdrop on remote calls using its VoIP phones > By Linda Leung, NetworkWorld.com, 11/29/07 > > Sponsored by: > Cisco confirmed it is possible to eavesdrop on remote conversations > using Cisco VoIP phones. In its security response, Cisco says: "an > attacker with valid Extension Mobility authentication credentials > could cause a Cisco Unified IP Phone configured to use the Extension > Mobility feature to transmit or receive a Real-Time Transport > Protocol (RTP) audio stream." > > Cisco adds that Extension Mobility authentication credentials are not > tied to individual IP phones and that "any Extension Mobility account > configured on an IP phone's Cisco Unified Communications > Manager/CallManager (CUCM) server can be used to perform an > eavesdropping attack." > > The technique was described by Telindus researcher Joffrey Czarny at > HACK.LU 2007 in Luxembourg in October. > > Cisco has published some workarounds to this problem in its security response. > > Also in October, two security experts at hacker conference ToorCon9 > in San Diego hacked into their hotel's corporate network using a > Cisco VoIP phone. > > The hackers, John Kindervag and Jason Ostrom said they were able to > access the hotel's financial and corporate network and recorded other > phone calls, according to a blog on Wired.com. > > The hackers used penetration tests propounded by a tool called VoIP > Hopper, which mimics the Cisco data packets sent at three minute > intervals and then trades a new Ethernet interface, getting the PC - > which the hackers switched in place of the hotel phone - into the > network running the VoIP, according to the blog post. > > The Avaya configuration is superior to Cisco, according to the > hackers, because you have to send requests beyond a sniffer. Although > it can be breached the same way, by replacing the phone with a PC. > > > http://www.hack.lu/pres/hacklu07_Remote_wiretapping.pdf > > > > > > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > We perform bug sweeps like it's a full contact sport, we take no prisoners, > and we give no quarter. Our goal is to simply, and completely stop the spy. > ---------------------------------------------------------------------------------------------------- > > > > > > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.26] ([172.28.128.26]:52386 "EHLO ip03.ams.ftl.affinity.com") by ams015.ftl.affinity.com with ESMTP id S359406AbXLABZI; Fri, 30 Nov 2007 20:25:08 -0500 Received: from wa-out-0708.google.com ([209.85.146.247]) by ip03.ams.ftl.affinity.com with ESMTP; 30 Nov 2007 20:25:07 -0500 Received: by wa-out-0708.google.com with SMTP id j19so328474waf for ; Fri, 30 Nov 2007 17:25:06 -0800 (PST) Received: by 10.140.141.15 with SMTP id o15mr207816rvd.1196472297473; Fri, 30 Nov 2007 17:24:57 -0800 (PST) Received: by 10.107.65.8 with SMTP id s8gr2163prk; Fri, 30 Nov 2007 17:24:46 -0800 (PST) X-Sender: SRS0=EnDtcD=QY=comcast.net=edmichaels@srs.bis.na.blackberry.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.37.18 with SMTP id p18mr7174155pyj.1196472285970; Fri, 30 Nov 2007 17:24:45 -0800 (PST) Received: from smtp05.bis.na.blackberry.com (smtp05.bis.na.blackberry.com [216.9.248.52]) by mx.google.com with ESMTP id h71si3990775nzf.2007.11.30.17.24.45; Fri, 30 Nov 2007 17:24:45 -0800 (PST) Received-SPF: pass (google.com: domain of SRS0=EnDtcD=QY=comcast.net=edmichaels@srs.bis.na.blackberry.com designates 216.9.248.52 as permitted sender) client-ip=216.9.248.52; Authentication-Results: mx.google.com; spf=pass (google.com: domain of SRS0=EnDtcD=QY=comcast.net=edmichaels@srs.bis.na.blackberry.com designates 216.9.248.52 as permitted sender) smtp.mail=SRS0=EnDtcD=QY=comcast.net=edmichaels@srs.bis.na.blackberry.com Received: from bxe110.bisx.prod.on.blackberry (bxe110.bisx.prod.on.blackberry [172.20.225.139]) by srs.bis.na.blackberry.com (8.13.7 TEAMON/8.13.7) with ESMTP id lB115rB5026003 for TSCM-L2006@googlegroups.com; Sat, 1 Dec 2007 01:24:42 GMT X-rim-org-msg-ref-id: 802784781 Message-ID: <802784781-1196472282-cardhu_decombobulator_blackberry.rim.net-2038975384-@bxe110.bisx.prod.on.blackberry> Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com X-Priority: Normal References: <7.0.1.0.2.20071130142849.09126798@tscm.com> In-Reply-To: <7.0.1.0.2.20071130142849.09126798@tscm.com> Sensitivity: Normal Importance: Normal To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] {2163} Re: VOIP Fails Again From: edmichaels@comcast.net Date: Sat, 1 Dec 2007 01:25:25 +0000 Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , And your point in listening for traffic on a particular instrument prior to a disco verus all instruments a particular switch or router would be? Since when does a disco order or emergent need such as in a COMSEC emergency require courtesy to traffic, voice or data??? Sent from my Verizon Wireless BlackBerry -----Original Message----- From: "James M. Atkinson" Date: Fri, 30 Nov 2007 14:47:11 To:TSCM-L Subject: [TSCM-L] {2161} VOIP Fails Again This is one of the reasons I have been ranting against the use of VOIP phone in secure environments. PLUS, they tend to pass room audio onto the network at all times, and it is wicked easy to re-flash the firmware in the phones remotely. Many hotels as putting VOIP phones in the rooms and typing the network into one big hotel network, but this allows any guest of the hotel to listen in to the rooms of any other guests at the hotel from anywhere inside the hotel, and in some cases room anywhere in the world. I also STRONGLY recommend the use of an in-line traffic analyzer, or a hub in parasitic mode (transmit circuit disabled) to see if you have traffic on a VOIP line BEFORE you disconnect it from the switch. -jma http://www.networkworld.com/news/2007/112907-cisco-voip-eavesdropping.html Cisco confirms ability to eavesdrop on remote calls using its VoIP phones By Linda Leung, NetworkWorld.com, 11/29/07 Sponsored by: Cisco confirmed it is possible to eavesdrop on remote conversations using Cisco VoIP phones. In its security response, Cisco says: "an attacker with valid Extension Mobility authentication credentials could cause a Cisco Unified IP Phone configured to use the Extension Mobility feature to transmit or receive a Real-Time Transport Protocol (RTP) audio stream." Cisco adds that Extension Mobility authentication credentials are not tied to individual IP phones and that "any Extension Mobility account configured on an IP phone's Cisco Unified Communications Manager/CallManager (CUCM) server can be used to perform an eavesdropping attack." The technique was described by Telindus researcher Joffrey Czarny at HACK.LU 2007 in Luxembourg in October. Cisco has published some workarounds to this problem in its security response. Also in October, two security experts at hacker conference ToorCon9 in San Diego hacked into their hotel's corporate network using a Cisco VoIP phone. The hackers, John Kindervag and Jason Ostrom said they were able to access the hotel's financial and corporate network and recorded other phone calls, according to a blog on Wired.com. The hackers used penetration tests propounded by a tool called VoIP Hopper, which mimics the Cisco data packets sent at three minute intervals and then trades a new Ethernet interface, getting the PC - which the hackers switched in place of the hotel phone - into the network running the VoIP, according to the blog post. The Avaya configuration is superior to Cisco, according to the hackers, because you have to send requests beyond a sniffer. Although it can be breached the same way, by replacing the phone with a PC. http://www.hack.lu/pres/hacklu07_Remote_wiretapping.pdf ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.27] ([172.28.128.27]:23748 "EHLO ip04.ams.ftl.affinity.com") by ams010.ftl.affinity.com with ESMTP id S480142AbXLCDck; Sun, 2 Dec 2007 22:32:40 -0500 Received: from wa-out-0708.google.com ([209.85.146.246]) by ip04.ams.ftl.affinity.com with ESMTP; 02 Dec 2007 22:32:39 -0500 Received: by wa-out-0708.google.com with SMTP id j19so251607waf for ; Sun, 02 Dec 2007 19:32:38 -0800 (PST) Received: by 10.114.27.20 with SMTP id a20mr299686waa.1196652182655; Sun, 02 Dec 2007 19:23:02 -0800 (PST) Received: by 10.106.179.39 with SMTP id b39gr2164prf; Sun, 02 Dec 2007 19:22:47 -0800 (PST) X-Sender: gardenberger@yahoo.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.37.18 with SMTP id p18mr4749203pyj.1196364029670; Thu, 29 Nov 2007 11:20:29 -0800 (PST) Received: from web31913.mail.mud.yahoo.com (web31913.mail.mud.yahoo.com [68.142.207.93]) by mx.google.com with SMTP id h49si3128760nzf.2007.11.29.11.20.28; Thu, 29 Nov 2007 11:20:29 -0800 (PST) Received-SPF: pass (google.com: domain of gardenberger@yahoo.com designates 68.142.207.93 as permitted sender) client-ip=68.142.207.93; DomainKey-Status: good (test mode) Authentication-Results: mx.google.com; spf=pass (google.com: domain of gardenberger@yahoo.com designates 68.142.207.93 as permitted sender) smtp.mail=gardenberger@yahoo.com; domainkeys=pass (test mode) header.From=gardenberger@yahoo.com Received: (qmail 76255 invoked by uid 60001); 29 Nov 2007 19:20:28 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID; b=dIdIGwgWWlK5ak4oSsF1JJTa6aBGoEzbuCuxQMoTxtR9Fg4lEh3gEyrIRH3fZoXvGzX8I8PU3jhDXLQ5XO2hZAulAdHcZyKaHjC2acNV7FBeH2ybe/uRj+ui5KdsnKuCUmOhRNF3P2QQx+Ga7T9RGnRTjsfpqjlqKRHfIebpSg0=; X-YMail-OSG: Yvfcv1UVM1kZsFflStZj6lqn1vHb492FKGSPQ2ZNCyykZ2Y0uPZ6xFn64Rr1w9jbosTPBz4l81F20iQ9VUTEZddw_uysU1sDWdCmvlyg4OC6M4e7KXs- Received: from [72.220.66.66] by web31913.mail.mud.yahoo.com via HTTP; Thu, 29 Nov 2007 11:20:28 PST Date: Thu, 29 Nov 2007 11:20:28 -0800 (PST) From: Randy Green Subject: [TSCM-L] {2164} Re: Life's Tough To: TSCM-L2006@googlegroups.com In-Reply-To: <7.0.1.0.2.20071128161339.091c72e8@tscm.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 8bit Message-ID: <208416.75698.qm@web31913.mail.mud.yahoo.com> X-Google-Approved: grainger01982@gmail.com via web at 2007-12-03 03:22:47 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , "All that is necessary for evil to triumph is for good men to do nothing" --- "James M. Atkinson" wrote: > > > "Life's tough, it's even tougher if you're stupid." > -John Wayne > > > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent > Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson > Phone: (978) 381-9111 > Granite Island Group Fax: > > 127 Eastern Avenue #291 Web: > http://www.tscm.com/ > Gloucester, MA 01931-8008 E-mail: > mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > We perform bug sweeps like it's a full contact > sport, we take no prisoners, > and we give no quarter. Our goal is to simply, and > completely stop the spy. > ---------------------------------------------------------------------------------------------------- > > > > > > > ____________________________________________________________________________________ Get easy, one-click access to your favorites. Make Yahoo! your homepage. http://www.yahoo.com/r/hs --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com. This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy. Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -~----------~----~----~----~------~----~------~--~--- Received: from [172.28.128.25] ([172.28.128.25]:12471 "EHLO ip02.ams.ftl.affinity.com") by ams003.ftl.affinity.com with ESMTP id S411015AbXLCDXh; Sun, 2 Dec 2007 22:23:37 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgAAAOoEU0dC+Vyhi2dsb2JhbACCc4xXAQEBCAQEJAWBFg Received: from ug-out-1516.google.com ([66.249.92.161]) by ip02.ams.ftl.affinity.com with ESMTP; 02 Dec 2007 22:23:36 -0500 Received: by ug-out-1516.google.com with SMTP id z26so590482ugc for ; Sun, 02 Dec 2007 19:23:35 -0800 (PST) Received: by 10.86.100.7 with SMTP id x7mr190162fgb.1196652206783; Sun, 02 Dec 2007 19:23:26 -0800 (PST) Received: by 10.107.114.28 with SMTP id r28gr2165prm; Sun, 02 Dec 2007 19:23:25 -0800 (PST) X-Sender: bts@charter.net X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.13.4 with SMTP id q4mr5163877pyi.1196379900464; Thu, 29 Nov 2007 15:45:00 -0800 (PST) Received: from mtai03.charter.net (mtai03.charter.net [209.225.8.183]) by mx.google.com with ESMTP id h49si3273238nzf.2007.11.29.15.45.00; Thu, 29 Nov 2007 15:45:00 -0800 (PST) Received-SPF: pass (google.com: domain of bts@charter.net designates 209.225.8.183 as permitted sender) client-ip=209.225.8.183; Authentication-Results: mx.google.com; spf=pass (google.com: domain of bts@charter.net designates 209.225.8.183 as permitted sender) smtp.mail=bts@charter.net Received: from aarprv06.charter.net ([10.20.200.76]) by mtai03.charter.net (InterMail vM.7.08.02.00 201-2186-121-20061213) with ESMTP id <20071129234500.LQNL18033.mtai03.charter.net@aarprv06.charter.net> for ; Thu, 29 Nov 2007 18:45:00 -0500 Received: from [66.188.250.69] by aarprv06.charter.net with ESMTP id <20071129234459.OIMI14098.aarprv06.charter.net@[66.188.250.69]> for ; Thu, 29 Nov 2007 18:44:59 -0500 User-Agent: Microsoft-Outlook-Express-Macintosh-Edition/5.0.6 Date: Thu, 29 Nov 2007 17:45:49 -0600 Subject: [TSCM-L] {2165} Re: Google Service Uses Cell Towers to Locate Users [within about 1000 meters] From: James Greenwold To: Message-ID: In-Reply-To: <005901c83231$2b985910$640aa8c0@26327298008658> Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="MS_Mac_OE_3279203149_48954512_MIME_Part" X-Chzlrs: 0 X-Google-Approved: grainger01982@gmail.com via web at 2007-12-03 03:23:24 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Re: [TSCM-L] {2160} Google Service Uses Cell Towers to Locate Users [within about 1000 meters] This is old tech.  Use the auto power adjust from the tower and the auto sampling from the handshake subroutine to draw a radius from each local tower and this gives a small overlap area for location.
--

Thank you for your time

James Greenwold
Bureau Of Technical Services
715-726-1400

bts@tacticalsurveillance.com


From: "Paul E. Niedermeyer" <pn@pn.com>

Reply-To: TSCM-L2006@googlegroups.com
Date: Wed, 28 Nov 2007 21:40:13 -0500
To: <TSCM-L2006@googlegroups.com>
Subject: [TSCM-L] {2160} Google Service Uses Cell Towers to Locate Users [within about 1000 meters]


... "Google says the cell tower technique will locate the user within about 1000 meters. It doesn't use triangulation, which calculates a user location based on the user's distance to three nearby towers. Instead, it essentially shows the range of the tower that the user's phone is connecting to."

http://www.pcworld.com/article/id,140080-c,webservices/article.html
Google Service Uses Cell Towers to Locate Users
Google Maps With My Location, a service for mobile users that doesn't rely on GPS, is now in use by Google.
Nancy Gohring, IDG News Service
Wednesday, November 28, 2007 4:00 PM PST

Google <http://www.pcworld.com/tags/Google+Inc..html>  launched a location service for mobile users on Wednesday that doesn't rely on GPS.
Google Maps with My Location <http://www.google.com/gmm/mylocation.html?hl=en> , currently in beta, locates users who don't have GPS-enabled phones based on their location to nearby cell towers. The result isn't as accurate as GPS (Global Positioning System) but works for people who lack the positioning technology in their phones.

"It helps users speed up search by showing the general neighborhood they're in," said Steve Lee <http://www.pcworld.com/tags/Steve+Lee.html> , product manager at Google for the service. Without the location service, users must type in their address or neighborhood in order to find nearby businesses using Google Maps <http://www.pcworld.com/tags/Google+Maps.html> .

Google Maps with My Location will use GPS data to locate the user if the phone has the capability. But even for users of GPS-enabled phones, the cell location service might be useful, Lee said. That's because the cell tower feature works better indoors than GPS, it doesn't drain the phone battery as quickly and can bring up a result quicker, he said.

The service could be useful to a person who might be traveling in an unfamiliar city and looking for restaurants or other businesses. A user pulls up Google Maps and hits the zero key on the phone. A blue dot will appear on the map in the user's location. If the service used GPS in the phone, the blue dot will be solid. If the service used cell towers to determine the location, the blue dot will have a halo around it, indicating that the location isn't precise. The user can then search for nearby businesses.

Google says the cell tower technique will locate the user within about 1000 meters. It doesn't use triangulation, which calculates a user location based on the user's distance to three nearby towers. Instead, it essentially shows the range of the tower that the user's phone is connecting to.

But the accuracy should improve as more people use the service, Lee said. That's because Google is keeping a database of location queries, minus any personal information like individual phone numbers or names. That will allow Google to learn more precise information about the range of each tower, so that it can deliver a more accurate location area to users. The coverage area of cell towers can vary from about a quarter of a mile to several miles based on whether the tower is in an urban or rural area.

For now, Google Maps with My Location doesn't feature any advertising, but it could in the future. "This product makes a lot of sense for advertising," Lee said.

In order to use the service, phone owners must download a free application from Google. The application will work on BlackBerry <http://www.pcworld.com/tags/BlackBerry+Mobile+Devices.html> , Windows Mobile <http://www.pcworld.com/tags/Microsoft+Windows+Mobile.html>  and Symbian <http://www.pcworld.com/tags/Symbian+Software+Ltd..html>  phones as well as many phones that support Java. A few notable exceptions include the Samsung Blackjack <http://www.pcworld.com/tags/Samsung+BlackJack.html> , Moto Q <http://www.pcworld.com/tags/Motorola+Q.html>  and Palm Treo 700W <http://www.pcworld.com/tags/Palm+Treo.html> , which don't support the APIs (application programming interfaces) Google requires to find cell towers, Lee said.





--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Granite Island Group "TSCM-L Professionals List" group which is the oldest, and the largest TSCM group on Earth. To post to this group, send E-Mail to TSCM-L2006@googlegroups.com, to contact the list owner and moderator please send an E-Mail message to jmatk@tscm.com.

This group is sponsored by Granite Island Group to improve the profession of hunting spies, and to educate the security industry in the craft of technical counter-intelligence. Granite Island Group performs bug sweeps like it's a full contact sport; we take no prisoners, we don't play fair, and we give no quarter. Our professional goal is to simply, and completely stop the spy.

Granite Island Group Offers World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
-~----------~----~----~----~------~----~------~--~---

Received: from [64.233.184.209] ([64.233.184.209]:4872 "EHLO wr-out-0304.google.com") by ams016.ftl.affinity.com with ESMTP id S2437970AbWFEXXz; Mon, 5 Jun 2006 19:23:55 -0400 Received: by wr-out-0304.google.com with SMTP id 63so1758592wra for ; Mon, 05 Jun 2006 16:23:55 -0700 (PDT) Received: by 10.11.58.10 with SMTP id g10mr320125cwa; Mon, 05 Jun 2006 16:22:20 -0700 (PDT) Received: by 10.11.95.7 with SMTP id s7gr628cwb; Mon, 05 Jun 2006 16:22:18 -0700 (PDT) X-Sender: alizard@ecis.com X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.54.68.13 with SMTP id q13mr143970wra; Mon, 05 Jun 2006 15:57:49 -0700 (PDT) Received: from mail5.dslextreme.com (mail5.dslextreme.com [66.51.199.81]) by mx.googlegroups.com with SMTP id v23si1524052cwb.2006.06.05.15.57.49; Mon, 05 Jun 2006 15:57:49 -0700 (PDT) Received-SPF: fail (googlegroups.com: domain of alizard@ecis.com does not designate 66.51.199.81 as permitted sender) Received: (qmail 19436 invoked from network); 5 Jun 2006 22:57:47 -0000 Received: from unknown (HELO TERRARIUM.ecis.com) (alizard@68.183.197.155) by mail5.dslextreme.com with SMTP; Mon, 05 Jun 2006 15:57:47 -0700 Message-Id: <6.0.3.0.1.20060605155410.04eab630@mail.ecis.com> X-Sender: alizard@mail.ecis.com X-Mailer: QUALCOMM Windows Eudora Version 6.0.3.0 Date: Mon, 05 Jun 2006 15:57:46 -0700 To: TSCM-L2006@googlegroups.com From: "A.Lizard" Subject: [TSCM-L] DC - 2.9 GHz universal software-defined receiver Mime-Version: 1.0 Content-Type: text/plain X-Google-Approved: jmatk@TSCM.com via web at 2006-06-05 23:22:18 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , GNU Radio Opens an Unseen World http://www.wired.com/news/technology/1,70933-0.html Story Images Click thumbnails for full-size image: By Quinn Norton| Also by this reporter 02:00 AM Jun, 05, 2006 Matt Ettus has the sly smile of someone who sees the invisible. His hands fly over the boards of his Universal Software Radio Peripheral, or USRP, snapping them together with an antenna like Lego bricks. Then he plugs in the naked boards to a USB 2 cable snaking to his Linux laptop. After few minutes of normal Linux messing around ("Takes forever to boot.... Haven't got the sound driver working yet....") he turns the laptop around to reveal a set of vibrating lines in humps and dips across the screen, like a wildly shaking wireframe mountain range. "Here," he explains, "I'm grabbing FM." "All of it?" I ask. "All of it," he says. I'm suddenly glad the soundcard isn't working. Radio is that bit of the electromagnetic spectrum that sits between brain waves and daylight. It's made of the same stuff that composes light, color, electrical hums, gamma radiation from atom bombs, the microwaves that reheat your pizza. From our perspective, radio devices behave very differently -- a global positioning system gadget doesn't look like a TV doesn't look like a CB set, even if they are all radios. They are single-purpose machines that use small bits of radio spectrum to do very specific tasks -- about as far from the general-purpose personal computer as you can get. But there's no reason they have to be. Most of the required components of a radio are the same and can be generalized. And with Moore's law making processors fast enough, much of a radio's function can be done with software. Building a general radio that can receive and transmit, and attaching it to a software system that can fill in the gaps of what we normally think of as radio, is kind of like the Enterprise's deflector dish: Give engineering 20 minutes and it can do anything the captain needs to move the plot along. One of Ettus' USRPs, with the right daughterboards and radio software, can capture FM, read GPS, decode HDTV, transmit over emergency bands and open garage doors. ---------------------- rest at the URL member The Internet Society (ISOC), The HTML Writers Guild. "You can't have in a democracy various groups with arms - you have to have the state with a monopoly on power." Condoleeza Rice, US Secretary of State Personal Website http://www.ecis.com/~alizard business Website http://www.reptilelabs.com backup address (if ALL else fails) alizard@gmail.com PGP 8.0 key available by request or keyserver. Download PGP from: http://www.pgpi.org for e-mail privacy. Disaster prep info: http://www.ecis.com/~alizard/y2k.html ***Looking for INTELLIGENT new technology public policy alternatives?*** http://www.ecis.com/~alizard/technology.html --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [216.239.56.131] ([216.239.56.131]:12250 "EHLO mproxy.googlegroups.com") by ams021.ftl.affinity.com with ESMTP id S408683AbWEPBv0; Mon, 15 May 2006 21:51:26 -0400 Received: by mproxy.googlegroups.com with SMTP id r61so6410446cwc for ; Mon, 15 May 2006 18:51:25 -0700 (PDT) Received: by 10.11.115.75 with SMTP id n75mr257100cwc; Mon, 15 May 2006 18:49:55 -0700 (PDT) Received: by 10.11.79.5 with SMTP id c5gr591cwb; Mon, 15 May 2006 18:49:53 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.54.63.12 with SMTP id l12mr101818wra; Mon, 15 May 2006 18:49:53 -0700 (PDT) Received: from ams002.useripd.ftl.affinity.com (lvs00-fl-n02.valueweb.net [216.219.253.98]) by mx.googlegroups.com with ESMTP id v23si12134cwb.2006.05.15.18.49.52; Mon, 15 May 2006 18:49:53 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.98 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [65.248.237.183] ([65.248.237.183]:35849 "EHLO nikola.tscm.com") by ams002.ftl.affinity.com with ESMTP id S369499AbWEPBtw (ORCPT ); Mon, 15 May 2006 21:49:52 -0400 Message-Id: <6.2.3.4.2.20060515214449.08428c60@pop.tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.3.4 Date: Mon, 15 May 2006 21:47:32 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] DPP says its main office was bugged Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.taipeitimes.com/News/taiwan/archives/2006/05/15/2003308275 DPP says its main office was bugged EAVESDROPPING: The party has launched a full-scale probe and search for surveillance devices after a routine security check revealed unusual signals By Jewel Huang STAFF REPORTER , WITH CNA Monday, May 15, 2006,Page 3 Advertising During a routine anti-surveillance check last week, the Democratic Progressive Party (DPP) found that the party's headquarters had been bugged, according to a Chinese-language newspaper report yesterday. The party will be tearing down part of the ceiling on the ninth floor to determine the source of signals from suspected eavesdropping devices, the report said. The Liberty Times (the Taipei Times' sister newspaper) reported that last Tuesday, the DPP detected unusual signals in its headquarters' meeting rooms and in high-ranking officials' offices on the ninth floor. DPP spokesman Tsai Huang-liang (???) confirmed yesterday that the party has launched a sweeping security check in the wake of the discovery. The party rents the eighth, ninth, 10th and 14th floors of a building on Beiping E Rd as their headquarters. All important meetings are held in conference rooms located on the ninth floor, and the offices of the chairman and secretary-general are on the same floor. "We don't rule out the possibility that it could have been done by ... the opposition parties, the news media or even a Chinese `fifth column.'" Tsai Huang-liang, a DPP spokesman According to Tsai, the DPP regularly asks a private security company to carry out security checks at its headquarters. This time around, inspectors detected strong signals emanating from bugging devices suspected to be on the ceiling of the ninth floor. The DPP has decided to dismantle part of the ceiling to find and remove the source of the signals. "We don't rule out the possibility that it could have been done by intelligence agencies, the opposition parties, the news media or even a Chinese `fifth column,'" Tsai said. "But if Chinese spies were involved in this eavesdropping, we think the national security departments should deal with it quickly." When asked about the suspected eavesdropping, DPP Chairman Yu Shyi-kun said in Ilan yesterday that it was not unusual for the DPP to be monitored, since the party was established 20 years ago during the Martial Law era and the Chinese Nationalist Party's (KMT) authoritarian rule. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [216.239.56.131] ([216.239.56.131]:25513 "EHLO mproxy.googlegroups.com") by ams008.ftl.affinity.com with ESMTP id S678056AbWDZVv5; Wed, 26 Apr 2006 17:51:57 -0400 Received: by mproxy.googlegroups.com with SMTP id r61so11115873cwc for ; Wed, 26 Apr 2006 14:51:56 -0700 (PDT) Received: by 10.11.88.27 with SMTP id l27mr5424cwb; Wed, 26 Apr 2006 14:40:39 -0700 (PDT) Received: by 10.11.79.5 with SMTP id c5gr550cwb; Wed, 26 Apr 2006 14:40:26 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.11.88.14 with SMTP id l14mr1588652cwb; Wed, 26 Apr 2006 14:40:26 -0700 (PDT) Received: from ams011.ftl.affinity.com (lvs00-fl-n11.valueweb.net [216.219.253.186]) by mx.googlegroups.com with ESMTP id v11si2207666cwb.2006.04.26.14.40.26; Wed, 26 Apr 2006 14:40:26 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.186 is neither permitted nor denied by domain of jmatk@tscm.com) Received: from [129.44.188.174] ([129.44.188.174]:49170 "EHLO nikola.tscm.com") by ams011.ftl.affinity.com with ESMTP id S558380AbWDZVkZ convert rfc822-to-8bit (ORCPT ); Wed, 26 Apr 2006 17:40:25 -0400 Message-Id: <6.2.3.4.2.20060426173259.06e8fcb0@pop.tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.3.4 Date: Wed, 26 Apr 2006 17:35:18 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] Eavesdropping made easy Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://daily.stanford.edu/tempo?page=content&id=20212&repository=0001_article Eavesdropping made easy The first article in a sporadic series exploring technology By Sam Bhagwat Desk Editor Wednesday, April 26, 2006 Recently, phone tapping has taken center stage due to the Patriot Act and the ongoing debate it spurred over civil liberties. Phone taps may be new to you, but its premise dates all the way back to the 1890ís. Its predecessor, telegraph tapping, was employed during the Civil War by Union generals at the battle of Vicksburg as well as on Shermanís March to the Sea. Union soldiers would make enterprising raids into enemy territory and relay Confederate dispatches to their commanders. These operations provided important information, but attracting men to volunteer for the position was made rather more difficult by the slim likelihood that they would live to enjoy their fame. A. W. Greely, a Union general in the Civil War, wrote that there were ìmore than three hundred casualties among the operators.î More recently, phone tapping has involved fewer battlefield heroics and more technical sophistication. A telephone can be tapped by taking an exposed point on the outside phone line it connects to and attaching a device that can translate electric current into a pattern of air-pressure fluctuations that correspond to sound waves. This could be a normal phone, if youíre willing to hang around 24/7 waiting for someone to place a call on a tapped phone; more commonly, a device is used to allow transmission of the conversation to a remote location. This is the bug of spy film fame. This part is fairly simple; there are guides on the Internet explaining how to tap phone lines with little more than alligator clips and a recording device. And official phone tapping, which previously required technicians, has been immensely simplified for all phones with digital phone exchanges (the place where phone calls are connected).The government can complete the phone-tapping operation and record the conversation with only a computer. There is no chance of detection. Phone tapping starts to get complicated when it comes to cell phones. The mobile nature of cellular phones can pose a security threat; one method for eavesdropping on a cell phone conversation is to use a device called an IMSI-catcher, which masquerades as the base station of the service provider, thus gaining access to the conversation. This method ó similar to some computer hacking techniques ó requires knowing the location of the subject that you want to eavesdrop on. But if the general vicinity of the subject is determined, he or she can be ìzoomed in onî by measuring the ìtiming advance,î an adjustment for the distance of the subject to a base station based on the speed of light. But the quest for improving cell phone security is still far from complete and always under threat from intelligence services seeking to subvert these measures. Phones that use secure encryption cannot be easily deciphered or disabled. But there are still many barriers to the spread of these phones, such as compatibility issues and price. And one doesnít have to wear a tin-foil hat to realize that the tap-happy German and Dutch governmentsí opposition to shutting down the loopholes that allow eavesdropping means that the current system is going to be here for a while. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [216.239.56.131] ([216.239.56.131]:27603 "EHLO mproxy.googlegroups.com") by ams008.ftl.affinity.com with ESMTP id S662307AbWDRR6E; Tue, 18 Apr 2006 13:58:04 -0400 Received: by mproxy.googlegroups.com with SMTP id 12so4100358cwt for ; Tue, 18 Apr 2006 10:58:04 -0700 (PDT) Received: by 10.11.11.5 with SMTP id 5mr127188cwk; Tue, 18 Apr 2006 10:56:34 -0700 (PDT) Received: by 10.11.86.25 with SMTP id j25gr534cwb; Tue, 18 Apr 2006 10:56:24 -0700 (PDT) X-Sender: lweauthors@mfx.net X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.11.61.21 with SMTP id j21mr3915435cwa; Tue, 18 Apr 2006 05:13:33 -0700 (PDT) Received: from 207.5.165.231 by g10g2000cwb.googlegroups.com with HTTP; Tue, 18 Apr 2006 12:13:33 +0000 (UTC) From: "LWEAuthors" To: "TSCM-L Professionals List" Subject: [TSCM-L] Expert needed - McGraw-Hill professional technical book author/contributor Date: Tue, 18 Apr 2006 12:13:33 -0000 Message-ID: <1145362413.065073.31850@g10g2000cwb.googlegroups.com> User-Agent: G2/0.2 X-HTTP-UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322),gzip(gfe),gzip(gfe) Mime-Version: 1.0 Content-Type: text/plain X-Google-Approved: jmatk@TSCM.com via web at 2006-04-18 17:56:24 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Hello, My name is Victoria Roberts and I am the Aquisitions Administrator for Lone Wolf Enterprises, Ltd., a book producer. McGraw-Hill has asked us to produce books on the following general topics: signal processing, emerging communications technologies, cutting edge digital design techniques, and optical engineering. The prospective author should have significant standing in his professional community and/or a strong promotional platform. If you are interested in becoming a published author, please reply with your credentials to me Thank you, Victoria Roberts Acquisitions Administrator Lone Wolf Enterprises, Ltd. 13 Gurnet Road PMB#300 Brunswick, ME 04011 Phone: 207-725-8251 Fax: 207-725-8385 Email: Web: --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- X-Persona: Received: from [64.233.162.213] ([64.233.162.213]:57115 "EHLO nz-out-0304.google.com") by ams022.ftl.affinity.com with ESMTP id S617740AbWJECAB; Wed, 4 Oct 2006 22:00:01 -0400 Received: by nz-out-0304.google.com with SMTP id h28so307364nzf for ; Wed, 04 Oct 2006 18:59:58 -0700 (PDT) Received: by 10.35.99.14 with SMTP id b14mr21375pym; Wed, 04 Oct 2006 18:59:31 -0700 (PDT) Received: by 10.11.84.22 with SMTP id h22gr906cwb; Wed, 04 Oct 2006 18:59:23 -0700 (PDT) X-Sender: jya@pipeline.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.148.15 with SMTP id v15mr182689nzd; Wed, 04 Oct 2006 18:59:23 -0700 (PDT) Received: from pop04.mail.atl.earthlink.net (pop04.mail.atl.earthlink.net [207.69.200.28]) by mx.googlegroups.com with ESMTP id y6si2652394nzg.2006.10.04.18.59.22; Wed, 04 Oct 2006 18:59:23 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 207.69.200.28 is neither permitted nor denied by best guess record for domain of jya@pipeline.com) Received: from user-1087f36.cable.mindspring.com ([64.131.188.102] helo=JY09) by pop04.mail.atl.earthlink.net with smtp (Exim 3.36 #1) id 1GVIWA-0006L6-00 for TSCM-L2006@googlegroups.com; Wed, 04 Oct 2006 21:59:22 -0400 X-Sender: jya@pop.pipeline.com X-Mailer: QUALCOMM Windows Eudora Pro Version 4.0 Date: Wed, 04 Oct 2006 21:56:46 -0700 To: TSCM-L2006@googlegroups.com From: John Young Subject: [TSCM-L] Five Indicted in HP Investigation In-Reply-To: <7.0.1.0.2.20061001143159.050e2520@phreaker.net> References: <20060926225901.12768.qmail@web60920.mail.yahoo.com> <1159242999.662027.127320@e3g2000cwe.googlegroups.com> <20060926225901.12768.qmail@web60920.mail.yahoo.com> Mime-Version: 1.0 Content-Type: text/plain Message-Id: Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , New York Times reports on the State of California indictment of five persons involved in the Hewlett Packard leak investigation: http://www.nytimes.com/2006/10/04/business/04hewlettcnd.html Indicted: Patricia C. Dunn, the former chairwoman of HP Kevin T. Hunsaker, a former senior lawyer at HP Ronald L. DeLia, a Boston-area private detective Joseph DePante, owner of Action Research Group, a Melbourne, Fla., information broker Bryan Wagner, a Littleton, Colo., man who is said to have obtained private phone records while working for Mr. DePante. The Times also offers investigative documents into the spying which were presented to Congress, along with today's indictment and supporting allegations. The investigative documents are quite detailed and informative about investigative methodologies used. All assuredly legal the parties involved confidently assert in their interviews. --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- X-Persona: Received: from [64.233.166.170] ([64.233.166.170]:16514 "EHLO py-out-1314.google.com") by ams025.ftl.affinity.com with ESMTP id S413540AbWJAGx5; Sun, 1 Oct 2006 02:53:57 -0400 Received: by py-out-1314.google.com with SMTP id b30so2953934pyb for ; Sat, 30 Sep 2006 23:53:56 -0700 (PDT) Received: by 10.35.37.18 with SMTP id p18mr442011pyj; Sat, 30 Sep 2006 23:52:25 -0700 (PDT) Received: by 10.11.40.13 with SMTP id n13gr903cwn; Sat, 30 Sep 2006 23:52:11 -0700 (PDT) X-Sender: gongogi@gmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.60.15 with SMTP id n15mr1467293pyk; Sat, 30 Sep 2006 13:10:04 -0700 (PDT) Received: from ug-out-1314.google.com (ug-out-1314.google.com [66.249.92.175]) by mx.googlegroups.com with ESMTP id c21si721249pyc.2006.09.30.13.10.03; Sat, 30 Sep 2006 13:10:04 -0700 (PDT) Received-SPF: pass (googlegroups.com: domain of gongogi@gmail.com designates 66.249.92.175 as permitted sender) DomainKey-Status: good (test mode) Received: by ug-out-1314.google.com with SMTP id z36so410564uge for ; Sat, 30 Sep 2006 13:10:02 -0700 (PDT) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:references; b=ZD8fmKGupsf7PAZFwoQwQtG1cJHSN1cgtfeD5s/xqcqFXQMHrmngYit08/NdQPCSJurDsdT5RvcWqPebhV316bL3xWtcI6jgOVzLx0ljzYuloLoW35kGnAP8OOw9KWzZA5WyNZz4NV6U9TXfrBJcjgdOFT6q3PZr7BNpcG1CLdo= Received: by 10.67.105.19 with SMTP id h19mr1232689ugm; Sat, 30 Sep 2006 13:10:02 -0700 (PDT) Received: by 10.66.222.19 with HTTP; Sat, 30 Sep 2006 13:10:01 -0700 (PDT) Message-ID: Date: Sat, 30 Sep 2006 17:10:01 -0300 From: "Wenderson, Gongogi/Ba" To: saimerda , camaranacional@googlegroups.com, fib_contabeis@googlegroups.com, midia-sem-mascara@googlegroups.com, mortimer2006@googlegroups.com, sci.electronics.design@googlegroups.com, TSCM-L2006@googlegroups.com, ccfib2003 , "gongogi grupos" , "Outras Palavras" , gongogi@googlegroups.com Subject: [TSCM-L] Fwd: En: Fwd: Anúncio banido da MTV nos USA. In-Reply-To: <20060930155936.32850.qmail@web33315.mail.mud.yahoo.com> Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="----=_Part_30027_27160824.1159647001907" References: <20060930155936.32850.qmail@web33315.mail.mud.yahoo.com> X-Google-Approved: jmatk@TSCM.com via web at 2006-10-01 06:52:10 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

---------- Forwarded message ----------
From: carlos antonio <tbantoni_br@yahoo.com.br>
Date: 30/09/2006 12:59
Subject: En: Fwd: Anúncio banido da MTV nos USA.
To: alda_fb@hotmail.com, lessa grafica <lesavio@yahoo.com.br>, wd wd < sachswd@hotmail.com>, simone simone <simonedasilio@gmail.com>, solange 622 <solange622@hotmail.com>, susy paula < susydepaula@gmail.com>, cicero siri <cicoliveira@ibest.com.br>, sara costa < sara.costasousasilva@gmail.com>, maria_recife@hotmail.com, gongogi@gmail.com, gorete jorge < gorette8@yahoo.com.br>, saorafael ponto <gfbela@hotmail.com>, glorinhavca@hotmail.com, zenia zenilda < zenilda_adelino@hotmail.com>, neta-tony@hotmail.com, arlete duarte <arleteduarte@hotmail.com>, roestrelinha1@yahoo.com.br, elena rita <elenarita48@yahoo.com.br>, "marciacomgra�a"@hotmail.com, lia < mulherfaceira@yahoo.com.br>, waninha@terra.com.br



Observação: mensagem anexa encaminhada.


O Yahoo! está de cara nova. Venha conferir!



---------- Mensagem encaminhada ----------
From: "VANEIDE FERREIRA" <vaneideferreira@gmail.com>
To: "Alcione ferreira" < blackferro@yahoo.com.br>, "EDVAN SILVA" <edvansilva76@hotmail.com>, "VANEIDE AMATO" <vaneide.amato@bol.com.br >, ZGLISON <gilsonps007@gmail.com>, "VIANA PAULO" <vianapaulos@gmail.com>, "JOÃO NETO" < passosneto@gmail.com>, "joaozinho compet" <jbatsan76@hotmail.com>, "nelson aleixo de almeida" <vaievemmm@yahoo.com.br >, "Domingos Liberio" <domingosliberio_9@hotmail.com>, ELIANO <eliano@brasiltelecom.com.br>, "CARLOS SALVADOR" < tbantoni_br@yahoo.com.br>, "Elissandro R. Silva" <erocha@ucb.br>, "FERNANDO ALISSON" < fernandoalisson@yahoo.com.br>, GERALDINHO <geramizade@yahoo.com.br>, "ALISSON FERNANDO" <alissonfernando@yahoo.com.br >, ALYSONZAGATO <alysonzagato@gmail.com>, "ANDRÉ FUMAÇINHA" <andreyongflu@yahoo.com.br>, "lillian cristian" < lilliancristian@gmail.com>, "Ricardo salles" <ricardo_salles@terra.com.br>, "FELIPE TROVÃO" < farp73@superig.com.br>, "silvia helena dias" <silviahelenadias273@hotmail.com>, "GEOVANNY MORAES" < geovanny.moraes@gmail.com>, Jaime <jaiminhopb@yahoo.com.br>, "JAPA CEZAR" < japadmart@gmail.com>, JUNIOR <ferreirasilvajunior@yahoo.com.br>, "junior NATAL" <jr_designer@hotmail.com >, "Cora Côrte" <coracor@gmail.com>, "Ines ines Marley" <missil81@hotmail.com>, "Aparecida silva" < cidamarley_@hotmail.com>, "APARECIDA MARIA" <cidasilva.aparecida@gmail.com>, "Sandro PIU" < san_piu@hotmail.com>, "kleiton santana" <kleytongato.santana@bol.com.br>, "Meriam Simoes Oliveira" < meriamso@gmail.com>, "Sergio Rangel" <sm.rangel@yahoo.com.br>, "Afonso Velez" <afonso.vs@gmail.com>, NILTON < nilton.alvarenga@trf1.gov.br>, "ADALBERTO CARLOS SP" <betoaisten@hotmail.com>
Date: Thu, 28 Sep 2006 17:27:00 -0300
Subject: Fwd: Anúncio banido da MTV nos USA.






--
Entre nestes grupos e viaje até Gongogi:

http://br.groups.yahoo.com/group/gongogi

http://groups.google.com.br/group/Gongogi


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group.
To post to this group, send email to TSCM-L2006@googlegroups.com
To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com
For more options, visit this group at http://groups.google.com/group/TSCM-L2006
-~----------~----~----~----~------~----~------~--~---

Content-Type: application/vnd.ms-powerpoint Content-Disposition: inline; filename="Anuncio_banido_da_MTV.pps" X-Attachment-Id: 0.1 Attachment Converted: "c:\documents and settings\james m. atkinson\application data\qualcomm\eudora\attach\Anuncio_banido_da_MTV1.pps"Received: from [64.233.166.175] ([64.233.166.175]:49873 "EHLO py-out-1314.google.com") by ams009.ftl.affinity.com with ESMTP id S2445559AbWFHLOc; Thu, 8 Jun 2006 07:14:32 -0400 Received: by py-out-1314.google.com with SMTP id b30so662643pyb for ; Thu, 08 Jun 2006 04:14:26 -0700 (PDT) Received: by 10.11.88.27 with SMTP id l27mr43682cwb; Thu, 08 Jun 2006 04:12:55 -0700 (PDT) Received: by 10.11.95.7 with SMTP id s7gr632cwb; Thu, 08 Jun 2006 04:12:44 -0700 (PDT) X-Sender: kondrak@phreaker.net X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.54.68.15 with SMTP id q15mr17345wra; Thu, 08 Jun 2006 04:12:43 -0700 (PDT) Received: from smtp-out.hotpop.com (smtp-out.hotpop.com [38.113.3.61]) by mx.googlegroups.com with ESMTP id v11si256910cwb.2006.06.08.04.12.42; Thu, 08 Jun 2006 04:12:43 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 38.113.3.61 is neither permitted nor denied by best guess record for domain of kondrak@phreaker.net) Received: from phreaker.net (kubrick.hotpop.com [38.113.3.105]) by smtp-out.hotpop.com (Postfix) with SMTP id 6226B3342C81 for ; Thu, 8 Jun 2006 11:12:33 +0000 (UTC) Received: from Router_4.phreaker.net (niagara-cuda1-24-52-121-144.kntnny.adelphia.net [24.52.121.144]) by smtp-1.hotpop.com (Postfix) with ESMTP id 9692614809E for ; Thu, 8 Jun 2006 11:12:32 +0000 (UTC) Message-Id: <7.0.1.0.2.20060608071149.038578a0@macronet.net> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Thu, 08 Jun 2006 07:12:41 -0400 To: TSCM-L2006@googlegroups.com From: kondrak Subject: [TSCM-L] Fwd: [ISN] Spies on the Hill: Former Capitol Police Chief Gainer Dishes About Secret Intel Unit Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="=====================_131383031==.ALT" X-HotPOP: ----------------------------------------------- Sent By HotPOP.com FREE Email Get your FREE POP email at www.HotPOP.com ----------------------------------------------- Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,


http://public.cq.com/public/20060602_homeland.html

By Jeff Stein
CQ Staff
June 2, 2006

No self-respecting federal agency goes without its own intelligence
service these days, and the U.S. Capitol Police is no exception.

The Capitol Police have a little-known intelligence unit that takes up
a whole floor of its seven-story, century-old headquarters at First
and D Streets Northeast, according to its just-retired police chief.

Terrance W. Gainer, who turned in his badge, gun and police-issued
Blackberry two months ago after four years of occasionally rough times
with protesters and headstrong lawmakers, says his unit collaborated
closely with the CIA and the FBI-led Joint Terrorism Task Force, and
had liaison officers at most of the the 16 spy agencies that make of
the U.S. intelligence community.

Gainer also says his intelligence unit - fewer than 50 in a 600-strong
corps, he indicated - often swept congressional hearing rooms and
offices for secret electronic listening devices and fielded
plainclothes officers to see who might be scouting the facilities for
a terrorist attack.

"We are a very, very full-service police department, and know for
certain that the goal we have as counterterrorism police is stopping
an attack before it starts," Gainer says.

The intelligence unit's head, Deputy Chief Mike Jarboe, could not be
reached for comment on the Capitol Police's counterintelligence and
security activities.

"I'm going to guess they're not going to be very talkative," Gainer
said in the first of two interviews over the past few weeks." As a
rule, I have a different philosophy on the press, as some might
suspect, and it got me in trouble with some of the House members.

"I think there ought to be a little open dialog," said Gainer, who was
chief of the Illinois state police before coming to Washington in
1998, "and I don't like to deny that which is obvious.

"I think in some respects you want our enemy to know that we are
capable, but you don't want them to know the specifics of our
capabilities. . . . And that's always a fine line."


"Holy Cow"

Every morning at 8:45, Gainer says he, his top officers and delegates
from the House and Senate sergeant at arms offices gathered for an
intelligence briefing in "a secure location" that he would not
identify.

That facility, as well as an area in Capitol Police headquarters, had
a so-called Secure Compartmented Intelligence Facility, or SCIF, that
prevented hostile intelligence agencies from listening in on
conversations, Gainer said.

"Our intel people would talk about threats picked up by other intel
agencies, We'd also talk about major hearings, dignitary visits to the
Hill, and so on."

At least twice a month, and sometimes weekly, the Capitol Police
intelligence unit and senior commanders got briefings from the CIA and
FBI in the Hill's SCIF.

"We had some 'holy cow' moments," Gainer said, declining to provide
details. But overall, "It would be rare, in that kind of meeting, that
I would learn something I hadn't already been briefed on."


Moles

As for finding "bugs" in Capitol facilities, Gainer would only say, "I
wouldn't comment on that, but I will tell you this, that we feel
comfortable with the meetings that are conducted in there and our
sweeps."

Gainer also revealed this little-known detail: Capitol Police carry
out what he calls "counterintelligence" activities.

"It's not putting people under cover to develop informants. We don't
do that," he said.

"We have plainclothes officers who go out and do counterintelligence
work. We're always trying to figure out what the bad guys are trying
to figure out in watching us or observing what we do."

In the spy trade, counterintelligence usually means penetrating the
opposition's spy service and looking for moles within its own.

But that's not what Capitol Police "special agents" - a designation
Gainer said he bestowed on his intelligence specialists for its
"cachet" - do, the retired chief says.

"Counterintelligence, from our perspective," Gainer explains, "is very
limited in scope. It might be something as simple as, during the State
of the Union address or the inauguration, having people out watching
the crowd.

"So we're looking at people who are watching us. If we got a phony
call on a suspicious package, the terrorists might be watching to see
how we respond - how many units, how many people, how we lay ourselves
out. So we have people in plainclothes looking at the lookers. And we
might decide to talk to someone who's doing some taping, we might tape
people who are taping us, and cross-reference that with what's going
on in other jurisdictions."

In the investigation of last summer's London subway and bus bombings,
authorities "captured tapes that showed different places in D.C. and
on the Hill," said Gainer, 58. "Maybe it was pre-operational stuff."

But the Capitol Police's intelligence unit's purview isn't necessarily
confined to Capitol Hill, he said.


Sharing

All 535 members of Congress "and their families" are under the Capitol
Police's protective wing.

"We don't go out to their home towns, but our responsibility extends
to where those men and women are, and their families. So either we or
those local police departments stay on top of what's going on."

"If there's something that is of greater scope than our area then we
work with the the FBI and the Joint Terrorism Task Forces," he says. 
And the intel unit has "connections in each of the the states, with
the local FBI field office, or places like L.A., New York, Chicago -
they all have intelligence squads."

It works the other way, too, Gainer said, with threats against members
of Congress relayed quickly to Capitol Police intelligence. It wasn't
always that way. Now the department's problem is information overload.

"I think the biggest concern we have now is everybody is sharing so
much because no one wants to be accused of not sharing. We would have
a daily intel briefing telling us what was going on in the world, and
sometimes you would say, 'Why in the world are we being told this,
because it's laughable.'"

"They might lay out a lot of information and then say the person
giving this to us is unreliable, has given us bad information in the
past and is crazy. And we'd go, 'then why share it with us?'"

Today, he says, relations with the CIA, FBI and other intelligence
agencies are tight. During the CIA and FBI briefings, there's a lot of
unprecedented give and take with Capitol Police analysts, many of whom
are drawn from the military intelligence services. Those who aren't
are sent to the military intelligence schools and the FBI for
training, Gainer said.

"At the end of those briefs, the FBI and CIA would give more details
and answer your questions. In other words, they would let those
'intellectual' discussions go on. They might say, 'This is our read of
this bit of intelligence, give us yours,' " Gainer says.

"Sometimes our analytical people would write reports that ran counter
to [theirs], which was the accumulated intel from 18 agencies. Our
guys would write theirs from our perspective and say, 'Why couldn't it
mean this?'"

Despite the new collaboration between the Capitol Police and federal
spy agencies, along with bag checks, floating security units, New
Jersey barriers and anthrax mail sniffers, a determined terrorist can
probably get through, Gainer volunteered.

"Because it's an open campus, someone can ride a bus up there - but
not a truck - a bike with saddlebags on us. That presents a challenge. 
But our concern was the smaller events. Working with our federal
intelligence agency partners, we think we have a pretty good handle on
the potential for our adversaries to do big stuff."

Big stuff?

"A 9/11, a nuclear attack, a dirty bomb - all those are possible," he
says.

But the Capitol is much better protected than when he arrived, he
maintained, despite such panicky moments as the "shooting" in the
Longworth House Office Building garage last week that shook the whole
city but most likely was a construction crew dropping pipes.

"Between us and some of the other federal brethren, I feel we have a
pretty good handle on what's in the air," Gainer said, "and which way
the wind is blowing. . . ."

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group.
To post to this group, send email to TSCM-L2006@googlegroups.com
To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com
For more options, visit this group at http://groups.google.com/group/TSCM-L2006
-~----------~----~----~----~------~----~------~--~---

Received: from [216.239.56.131] ([216.239.56.131]:47559 "EHLO mproxy.googlegroups.com") by ams008.ftl.affinity.com with ESMTP id S409471AbWEQAj7; Tue, 16 May 2006 20:39:59 -0400 Received: by mproxy.googlegroups.com with SMTP id h27so8710361cwb for ; Tue, 16 May 2006 17:39:53 -0700 (PDT) Received: by 10.11.13.12 with SMTP id 12mr328297cwm; Tue, 16 May 2006 17:38:23 -0700 (PDT) Received: by 10.11.79.5 with SMTP id c5gr594cwb; Tue, 16 May 2006 17:38:10 -0700 (PDT) X-Sender: ratlater69@yahoo.com X-Apparently-To: tscm-l2006@googlegroups.com Received: by 10.54.68.13 with SMTP id q13mr127642wra; Tue, 16 May 2006 13:35:54 -0700 (PDT) Received: from web36809.mail.mud.yahoo.com (web36809.mail.mud.yahoo.com [209.191.85.60]) by mx.googlegroups.com with SMTP id v11si358239cwb.2006.05.16.13.35.53; Tue, 16 May 2006 13:35:54 -0700 (PDT) Received-SPF: pass (googlegroups.com: domain of ratlater69@yahoo.com designates 209.191.85.60 as permitted sender) DomainKey-Status: good (test mode) Received: (qmail 65484 invoked by uid 60001); 16 May 2006 20:35:53 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Message-ID:Received:Date:From:Subject:To:MIME-Version:Content-Type:Content-Transfer-Encoding; b=cHhOw1Q1lCZYoO+s3WQ8ayPSmsgjRoP32g7BN3Ksb0YsMlHSBcNiU20PecfucfejSz+5Ju816d5Ln3C4/df6T1Ecc5SnazcTLTnXlMONguSTcDYC/aJY6/FxpXuNkmzdhm3GNyJxthXG2UOKgJHd2T1ibDVL1SDfGLa9wFYiHkk= ; Message-ID: <20060516203553.65482.qmail@web36809.mail.mud.yahoo.com> Received: from [128.95.164.27] by web36809.mail.mud.yahoo.com via HTTP; Tue, 16 May 2006 13:35:53 PDT Date: Tue, 16 May 2006 13:35:53 -0700 (PDT) From: Joo Faloopa Subject: [TSCM-L] gov't-planted bugs & TSCM professionals To: tscm-l2006@googlegroups.com Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="0-1417479355-1147811753=:64127" X-Google-Approved: jmatk@TSCM.com via web at 2006-05-17 00:38:10 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , So- and apologies if this topic has come up before, but I'm curious- if you're conducting a sweep (in the US), and you find listening devices planted (presumably legally) by LEAs, how would you handle that?

Granted, you very well might not know that it was one of theirs (at least, until they showed up at your door).   How would you handle this?  Refuse to remove it?  Not mention it?  Remove it as usual?   Try to screen your clients to avoid people potentially being surveilled by LEAs of various levels? (would that even be possible?)

Anyone have any actual experience with this?  


Love cheap thrills? Enjoy PC-to-Phone calls to 30+ countries for just 2¢/min with Yahoo! Messenger with Voice.
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group.
To post to this group, send email to TSCM-L2006@googlegroups.com
To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com
For more options, visit this group at http://groups.google.com/group/TSCM-L2006
-~----------~----~----~----~------~----~------~--~---

Received: from [64.233.184.212] ([64.233.184.212]:27248 "EHLO wr-out-0304.google.com") by ams009.ftl.affinity.com with ESMTP id S444061AbWFXUq0; Sat, 24 Jun 2006 16:46:26 -0400 Received: by wr-out-0304.google.com with SMTP id 63so2438402wra for ; Sat, 24 Jun 2006 13:46:26 -0700 (PDT) Received: by 10.11.53.59 with SMTP id b59mr63413cwa; Sat, 24 Jun 2006 13:44:55 -0700 (PDT) Received: by 10.11.79.5 with SMTP id c5gr655cwb; Sat, 24 Jun 2006 13:44:50 -0700 (PDT) X-Sender: NoPositiveWork@aol.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.46.6 with SMTP id t6mr2138518nzt; Sat, 24 Jun 2006 12:49:51 -0700 (PDT) Received: from imo-m26.mx.aol.com (imo-m26.mx.aol.com [64.12.137.7]) by mx.googlegroups.com with ESMTP id c17si393662pyc.2006.06.24.12.49.51; Sat, 24 Jun 2006 12:49:51 -0700 (PDT) Received-SPF: pass (googlegroups.com: domain of NoPositiveWork@aol.com designates 64.12.137.7 as permitted sender) Received: from NoPositiveWork@aol.com by imo-m26.mx.aol.com (mail_out_v38_r7.5.) id r.541.d6d5f6 (39331) for ; Sat, 24 Jun 2006 15:49:48 -0400 (EDT) From: NoPositiveWork@aol.com Message-ID: <541.d6d5f6.31cef15b@aol.com> Date: Sat, 24 Jun 2006 15:49:47 EDT Subject: [TSCM-L] Greenfield mayor charged with bugging employees car To: TSCM-L2006@googlegroups.com Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="-----------------------------1151178587" X-Mailer: 9.0 for Windows sub 5123 X-Spam-Flag: NO Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,
Greenfield mayor charged with bugging employees car

The mayor of Greenfield, Minnesota which is located in western Hennepin County is facing some rather bizarre charges. He's accused of 'bugging' an employee's vehicle.

Larry Plack was supposed to go on trial Friday, but confusion between judges delayed the case.

Plack is a private investigator and was elected mayor of Greenfield in 2004.

He's accused of planting a mobile tracking device on a Corcoran resident's car and with tampering with a witness in the case.

Plack admits he planted the bug, but according to a criminal complaint against him said, "she was an employee of his and he was following her due to the fact that she was meeting with middle eastern males at smoke shops and gas stations throughout the metro area attempting to establish relationships with them."

The woman he's referring to declined comment. Her lawyer says they plan to sue the city of Greenfield and the mayor.

No new date has been set for the mayor's trial.


Last Updated: 6/23/2006 5:19:29 PM


All Material Copyright 2006 KARE-11. All Rights Reserved.

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group.
To post to this group, send email to TSCM-L2006@googlegroups.com
To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com
For more options, visit this group at http://groups.google.com/group/TSCM-L2006
-~----------~----~----~----~------~----~------~--~---

X-Persona: Received: from [64.233.162.212] ([64.233.162.212]:14707 "EHLO nz-out-0304.google.com") by ams026.ftl.affinity.com with ESMTP id S378550AbWJEQZM; Thu, 5 Oct 2006 12:25:12 -0400 Received: by nz-out-0304.google.com with SMTP id h28so1576755nzf for ; Thu, 05 Oct 2006 09:24:38 -0700 (PDT) Received: by 10.36.140.2 with SMTP id n2mr35923nzd; Thu, 05 Oct 2006 09:24:11 -0700 (PDT) Received: by 10.11.8.19 with SMTP id 19gr907cwh; Thu, 05 Oct 2006 09:24:09 -0700 (PDT) X-Sender: news@investigalorenz.it X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.57.5 with SMTP id j5mr1022580pyk; Thu, 05 Oct 2006 09:12:35 -0700 (PDT) Received: from smtpout13.attiva.biz (smtpout13.attiva.biz [85.37.16.15]) by mx.googlegroups.com with ESMTP id c17si1782515pyc.2006.10.05.09.12.33; Thu, 05 Oct 2006 09:12:35 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 85.37.16.15 is neither permitted nor denied by best guess record for domain of news@investigalorenz.it) Received: from FBCMFE02B07.fbc.local ([192.168.30.95]) by smtpout13.attiva.biz with Microsoft SMTPSVC(6.0.3790.1830); Thu, 5 Oct 2006 18:12:33 +0200 Received: from MASSIMO ([87.25.93.187]) by FBCMFE02B07.fbc.local with Microsoft SMTPSVC(6.0.3790.1830); Thu, 5 Oct 2006 18:12:31 +0200 Mime-Version: 1.0 Content-Type: Multipart/related; boundary="------------Boundary-00=_RO7OQL80000000000000" Message-Id: <45252EEB.000001.00652@MASSIMO> Date: Thu, 5 Oct 2006 18:12:27 +0200 (ora solare Europa occidentale) X-Mailer: IncrediMail (4502131) From: "Massimo Italy" References: <4513CEE5.000003.03348@MASSIMO> To: Subject: [TSCM-L] GSM Hidden, a dangerous bug X-FID: BA285063-5BCE-11D4-AF8D-0050DAC67E11 X-Priority: 3 Reply-To: TSCM-L2006@googlegroups.com X-OriginalArrivalTime: 05 Oct 2006 16:12:31.0858 (UTC) FILETIME=[0FC0ED20:01C6E899] X-Google-Approved: jmatk@TSCM.com via web at 2006-10-05 16:24:06 Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,
 DIRECTLY FROM REI (thk)

Trying to find cell phones in a city type environment is a difficult task. Some of the factors making them difficult to locate are: 1. There are a great number of phones operating in a relatively small area. 2. In an unshielded room or outdoors, they use a relatively weak transmit strength. 3. In a crowded RF environment, they may switch frequency during a transmission. 4. The phone may not be actively transmitting.

When trying to find a cell phone with an OSCOR, you may tune to the cell phone band, locate a signal, and then use the locator probe to find its' location. If you are using the 5.0 OSCOR and signal peak trace collection, it may be easier to see when a phone is activated as initially its signal strength will be stronger.

When using the CPM, you will search the room as normal looking for any radiated signal.

Using the ORION, search the room as normal, looking for concealed electronics.

If a room has been previously swept and certified "clean" then preventing a phone entering the room may be easier.

In conclusion, a physical search accompanied by an ORION, will be an effective way to find a hidden device, since the device may not be actively transmitting at the time, but an actively transmitting device can be located by signal strength using either the CPM-700 or the OSCOR

 
Somethink use a different way??
 
THKS
 
MASSIMO from Italy
 
-------Messaggio originale-------
 
Data: 09/22/06 22:11:38
Oggetto: [TSCM-L] GSM Hidden, a dangerous bug
 
 
hi
Is possible to understand if there is a cellular phone gsm hidden in a room?
 
i use a dedicated system born for this from Elbi.cz, or Orion for to find....
 
but, using an Oscor how can I be SHURE if there are not gsm hidden?
 
I see a lot of trasmission in area 900/1800... gsm Umts....
 
In the country i am shure that the power of gsm hidden is the best in my area, but in tonw near a tower of comunications???
 
 
but how can I understad if is out, in street , or in my room?
 
 
in all the word this gsm bug are selling, cipper price
 
many thks
 
massimo Italy
 

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group.
To post to this group, send email to TSCM-L2006@googlegroups.com
To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com
For more options, visit this group at http://groups.google.com/group/TSCM-L2006
-~----------~----~----~----~------~----~------~--~---

Embedded Content: IMSTP1.gif: 00000001,5821bb28,00000000,00000000 Embedded Content: BackGrnd21.jpg: 00000001,2c4cf5c9,00000000,00000000X-Persona: Received: from [64.233.162.217] ([64.233.162.217]:49194 "EHLO nz-out-0304.google.com") by ams019.ftl.affinity.com with ESMTP id S965201AbWI2Gzh; Fri, 29 Sep 2006 02:55:37 -0400 Received: by nz-out-0304.google.com with SMTP id v22so2766298nzg for ; Thu, 28 Sep 2006 23:55:37 -0700 (PDT) Received: by 10.35.85.1 with SMTP id n1mr226916pyl; Thu, 28 Sep 2006 23:54:06 -0700 (PDT) Received: by 10.11.8.19 with SMTP id 19gr898cwh; Thu, 28 Sep 2006 23:53:53 -0700 (PDT) X-Sender: fernando.martins@iol.pt X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.30.17 with SMTP id h17mr613784pyj; Thu, 28 Sep 2006 23:53:52 -0700 (PDT) Received: from mx4.dc.iol.pt (mx4.dc.iol.pt [193.126.240.144]) by mx.googlegroups.com with ESMTP id c21si400476pyc.2006.09.28.23.53.51; Thu, 28 Sep 2006 23:53:52 -0700 (PDT) Received-SPF: pass (googlegroups.com: best guess record for domain of fernando.martins@iol.pt designates 193.126.240.144 as permitted sender) Received: from mailfront6-mta.dc.iol.pt (unknown [172.16.54.38]) by mx4.dc.iol.pt ((Email service for IOL isp (apoioaocliente@iol.pt))) with ESMTP id 983408C for ; Fri, 29 Sep 2006 06:53:50 +0000 (UTC) Received: from iol.pt (mstore3 [172.16.4.143]) by mailfront6.dc.iol.pt (Sun Java System Messaging Server 6.2-2.05 (built Apr 28 2005)) with ESMTP id <0J6C006LCDTQUH10@mailfront6.dc.iol.pt> for TSCM-L2006@googlegroups.com; Fri, 29 Sep 2006 07:53:50 +0100 (WEST) Received: from [172.16.54.33] (Forwarded-For: [80.251.174.86]) by mstore3.iol.pt (mshttpd); Fri, 29 Sep 2006 07:53:50 +0100 Date: Fri, 29 Sep 2006 07:53:50 +0100 From: Fernando Martins Subject: [TSCM-L] Guidance for Securing Radio Frequency Identification (RFID) Systems To: TSCM-L2006@googlegroups.com Message-id: Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="Boundary_(ID_4URK6C4kI+DCM+s5axDbww)" X-Mailer: Sun Java(tm) System Messenger Express 6.2-4.03 (built Sep 22 2005) Content-language: pt X-Accept-Language: pt Priority: normal Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Draft Special Publication 800-98, Guidance for Securing Radio Frequency Identification (RFID) Systems Zip File (1341 KB) _______________________________________________________________________________________ Credito Pessoal ? Viva mais, viva ao maximo! Saber mais em http://www.iol.pt/correio/rodape.php?dst=0607192 --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Return-path: Received: from mx1.dc.iol.pt ([172.16.54.1]) by mstore3.iol.pt (Sun Java System Messaging Server 6.2-4.03 (built Sep 22 2005)) with ESMTP id <0J6A00049VGQ0M90@mstore3.iol.pt> for fernando.martins@iol.pt; Thu, 28 Sep 2006 12:19:38 +0100 (WEST) Received: from mx1.dc.iol.pt (localhost [127.0.0.1]) by mx1-back.dc.iol.pt ((Email service for IOL isp (apoioaocliente@iol.pt))) with SMTP id 033E1280017E for ; Thu, 28 Sep 2006 12:19:38 +0100 (WEST) Received: from iwar.org.uk (unknown [212.111.49.124]) by mx1.dc.iol.pt ((Email service for IOL isp (apoioaocliente@iol.pt))) with ESMTP id 9E6222800226 for ; Thu, 28 Sep 2006 11:19:37 +0000 (UTC) Received: from iwar.org.uk (localhost [127.0.0.1]) by iwar.org.uk (Postfix) with ESMTP id 1FACF135EB; Thu, 28 Sep 2006 12:12:36 +0100 (BST) Received: from bay0-omc2-s16.bay0.hotmail.com (bay0-omc2-s16.bay0.hotmail.com [65.54.246.152]) by iwar.org.uk (Postfix) with ESMTP id 589AA135CD for ; Thu, 28 Sep 2006 12:12:31 +0100 (BST) Received: from hotmail.com ([64.4.56.81]) by bay0-omc2-s16.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.1830); Thu, 28 Sep 2006 04:16:36 -0700 Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Thu, 28 Sep 2006 04:16:27 -0700 Received: from 70.23.241.216 by BAY101-DAV9.phx.gbl with DAV; Thu, 28 Sep 2006 11:16:23 +0000 Date: Thu, 28 Sep 2006 07:14:54 -0400 From: Michael Huggins Subject: [IA-InfoSec] New NIST Documents X-Originating-IP: [70.23.241.216] Sender: ia-infosec-bounces@iwar.org.uk X-Sender: mhhuggins1@msn.com To: ia-infosec Errors-to: ia-infosec-bounces@iwar.org.uk Reply-to: "deals with international, national and regional security assurance issues,awareness, standards governance and policy." Message-id: Content-Type: text/plain; charset=iso-8859-1 X-MIMEOLE: Produced By MSN MimeOLE V9.20.0029.3000 X-Mailer: MSN 9 X-Priority: 3 X-MSMail-priority: Normal Precedence: list X-BeenThere: ia-infosec@iwar.org.uk Delivered-to: ia-infosec@iwar.org.uk Seal-Send-Time: Thu, 28 Sep 2006 07:14:54 -0400 X-Originating-Email: [mhhuggins1@msn.com] X-Content-Filtered-By: Mailman/MimeDel 2.1.1 X-Mailman-Version: 2.1.1 List-Post: List-Subscribe: , List-Unsubscribe: , List-Archive: List-Help: List-Id: deals with international, national and regional security assurance issues, these include but are not limited to education, best practices, awareness, standards governance and policy. Original-recipient: rfc822;fernando.martins@iol.pt X-OriginalArrivalTime: 28 Sep 2006 11:16:27.0639 (UTC) FILETIME=[8A8FF870:01C6E2EF] a.. September 26, 2006: Draft Special Publication 800-98, Guidance for Securing Radio Frequency Identification (RFID) Systems Adobe PDF (1657 KB) Zip File (1341 KB) NIST announces the release of draft NIST SP 800-98, Guidance for Securing Radio Frequency Identification (RFID) Systems. SP-800-98 provides an overview of RFID technology, the associated security and privacy risks, and recommended practices that will help organizations mitigate these risks, safeguard sensitive information, and protect the privacy of individuals. Please submit comments and suggestions to sp800-98@nist.gov with "Comments on Public Draft SP 800-98" in the subject line. Reviewers are kindly requested to note the page and line number of each comment. The comment period closes at 5:00 EST (US and Canada) on October 27th, 2006. -------------------------------------------------------------------------- a.. September 26, 2006: Draft Special Publication 800-82, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security Adobe PDF (2273 KB) Zip File (1726 KB) NIST announces the release of draft SP 800-82, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security. SP 800-82 provides guidance for establishing secure industrial control systems (ICS), including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other smaller control system configurations such as skid-mounted Programmable Logic Controllers (PLC). ICSs are typically used in industries such as electric, water, oil and gas, transportation, chemical, pharmaceutical, pulp and paper, food and beverage, and discrete manufacturing (automotive, aerospace, and durable goods). The document provides an overview of ICSs and typical system topologies, identifies typical threats and vulnerabilities to these systems, and provides recommended security countermeasures to mitigate the associated risks. NIST requests comments on SP 800-82 by December 22, 2006. Please submit comments to 800-82comments@nist.gov with "Comments SP800-82" in the subject line. -------------------------------------------------------------------------- a.. September 26, 2006: Draft Special Publication 800-54, Border Gateway Protocol Security Adobe PDF (1133 KB) Zip File (640 KB) NIST announces the release of draft SP 800-54, Border Gateway Protocol Security. This document introduces the Border Gateway Protocol (BGP), explains its importance to the Internet, and provides a set of best practices that can help in protecting BGP. Best practices described here are intended to be implementable on nearly all currently available BGP routers without requiring installation of new protocols. To improve the security of BGP routers, a series of recommendations are made. NIST requests public comments on SP 800-54 by November 30, 2006. Please submit comments to sp800-54comments@nist.gov with "Comments SP800-54" in the subject line _______________________________________________ IA-InfoSec mailing list IA-InfoSec@iwar.org.uk http://www.iwar.org.uk/mailman/listinfo/ia-infosec Received: from [64.233.162.210] ([64.233.162.210]:18527 "EHLO nz-out-0304.google.com") by ams023.ftl.affinity.com with ESMTP id S2437492AbWFKQ5o; Sun, 11 Jun 2006 12:57:44 -0400 Received: by nz-out-0304.google.com with SMTP id v23so507514nzg for ; Sun, 11 Jun 2006 09:57:43 -0700 (PDT) Received: by 10.11.61.21 with SMTP id j21mr270652cwa; Sun, 11 Jun 2006 09:56:12 -0700 (PDT) Received: by 10.11.95.7 with SMTP id s7gr634cwb; Sun, 11 Jun 2006 09:56:00 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.54.131.6 with SMTP id e6mr129558wrd; Sun, 11 Jun 2006 09:56:00 -0700 (PDT) Received: from ams003.useripd.ftl.affinity.com ([216.219.253.136]) by mx.googlegroups.com with ESMTP id v11si1492857cwb.2006.06.11.09.55.59; Sun, 11 Jun 2006 09:56:00 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.136 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [151.199.34.161] ([151.199.34.161]:47117 "EHLO nikola.tscm.com") by ams003.ftl.affinity.com with ESMTP id S487020AbWFKQz6 (ORCPT ); Sun, 11 Jun 2006 12:55:58 -0400 Message-Id: <7.0.1.0.2.20060611125111.0afc3aa8@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Sun, 11 Jun 2006 12:53:39 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] Hollywood private eye: Wiretapping case is bogus Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.cnn.com/2006/LAW/06/11/hollywood.wiretap.ap/index.html Hollywood private eye: Wiretapping case is bogus LOS ANGELES, California (AP) -- An imprisoned private investigator accused of eavesdropping on Hollywood celebrities called the federal wiretapping case against him bogus and reiterated a promise that he would not testify against his former clients. Anthony Pellicano spoke via telephone to the Los Angeles Times in his first interview since he was indicted by a grand jury in February. He has pleaded not guilty to more than 100 counts and is awaiting trial on charges of wiretapping such stars as Sylvester Stallone and paying two police officers to run names, including comedians Garry Shandling and Kevin Nealon, through a government database. Fourteen people, including Pellicano, have been charged with various counts, including wire fraud and conspiracy. Six people have pleaded guilty, including "Die Hard" director John McTiernan, for making false statements to an FBI agent, and former Hollywood Records president Robert Pfeifer, who admitted hiring Pellicano to wiretap the phone of his former girlfriend. Pellicano, 62, has long maintained that he would never break the trust he shared with his former clients and employees. "I am never going to besmirch a client or any other person that I gave my trust to or who gave their trust to me," Pellicano told the newspaper this week from the federal Metropolitan Detention Center in Los Angeles. "I'm never going to do that. I am going to be a man until I fall -- if, in fact, that happens." Pellicano's troubles began in 2002 when prosecutors claim he hired Alexander Proctor to threaten a former Los Angeles Times reporter, who was working on a story about actor Steven Seagal and possible links to the Mafia. The reporter found a dead fish with a rose in its mouth on her car's windshield and a note reading: stop. The FBI later raided Pellicano's office, found illegal explosives and seized documents and computers. He served a 2 1/2-year sentence on charges related to the explosives and faces state charges in connection with the alleged threats. Pellicano dismissed the assertions that he ordered the threats against the reporter. "You know the kind of guy I am. If I got a problem with you, I'm in your face," Pellicano told the newspaper, which posted the interview on its Web site Saturday. Pellicano called federal prosecutors "overzealous" and said the case has been blown out of proportion because of his famous client base that once included Elizabeth Taylor, Michael Jackson and Stallone. "The federal government has purposely tried to make this thing larger than life -- like a Hollywood movie," he said. "They are trying to use my name and reputation to build something better for themselves." He also said it was ironic that the federal government is accusing him of wiretapping at a time when it is under fire for authorizing the National Security Agency to monitor Americans' telephone calls without court warrants in search of terrorist connections. "If the American public had any idea of all the surveillance, wiretapping and illegal things that our own government actually does, they would be shocked," Pellicano said. "Chasing terrorists is what the FBI is supposed to be doing. I've got to tell you, if instead of keeping me behind bars here, they gave me the job of finding Osama bin Laden, I guarantee you I would find him." ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [64.233.166.171] ([64.233.166.171]:50703 "EHLO py-out-1314.google.com") by ams014.ftl.affinity.com with ESMTP id S880716AbWFDASr; Sat, 3 Jun 2006 20:18:47 -0400 Received: by py-out-1314.google.com with SMTP id c33so2919155pyd for ; Sat, 03 Jun 2006 17:18:46 -0700 (PDT) Received: by 10.11.13.12 with SMTP id 12mr189839cwm; Sat, 03 Jun 2006 17:17:16 -0700 (PDT) Received: by 10.11.126.51 with SMTP id y51gr627cwc; Sat, 03 Jun 2006 17:17:08 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.54.131.4 with SMTP id e4mr85201wrd; Sat, 03 Jun 2006 17:15:18 -0700 (PDT) Received: from ams004.useripd.ftl.affinity.com (lvs00-fl-n04.valueweb.net [216.219.253.138]) by mx.googlegroups.com with ESMTP id v23si737520cwb.2006.06.03.17.15.17; Sat, 03 Jun 2006 17:15:18 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.138 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [151.199.29.156] ([151.199.29.156]:15379 "EHLO nikola.tscm.com") by ams004.ftl.affinity.com with ESMTP id S478177AbWFDAPQ convert rfc822-to-8bit (ORCPT ); Sat, 3 Jun 2006 20:15:16 -0400 Message-Id: <6.2.3.4.2.20060603200629.0cab7eb0@pop.tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.3.4 Date: Sat, 03 Jun 2006 20:10:25 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] Industrial espionage made easy Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.mybroadband.co.za/nephp/?m=show&id=3022 Industrial espionage made easy By: RHYMER RIGBY, Financial Times, 2 June 2006 posted on 06-02-2006. "Last year Manchester United discovered that its dressing room talks about team tactics had been bugged during a crucial match. Tapes of the talks had been offered to The Sun newspaper." Similarly, the Japanese bank Sumitomo in London was alerted last year to its computers being physically bugged with keystroke loggers by a gang hoping to steal 220m Pounds; the bugs were thought to have been attached by cleaners. In 2003, Boeing was stripped of US Air Force contacts worth Dollars 1bn when it was discovered that it illegally obtained documents from rival Lockheed Martin. With all the worry about crime in cyberspace and tight physical security in the aftermath of terrorist attacks, businesses may sometimes forget that there are plenty of other opportunities for private information to be secretly obtained and misused. "Everyone's very keen to control who comes in and out of the building and protect cyberspace," says Crispin Sturrock, chief executive of information security company White Rock. "But there is a big hole in the middle. Far fewer companies prepare for industrial espionage." Peter Yapp, deputy director of network forensics at Control Risks Group, adds: "If people want information from you, they'll go for the weakest link. If you've got a good well-managed fire-wall, that won't be it. It might be the bins, it might be overhearing conversations in the pub, it might be (bribing) a cleaner to obtain information. It doesn't have to be sophisticated." Brian Stapleton, head of financial investigation at the risk-consulting group Kroll, says companies appear to be increasingly "actively and regularly targeted". He ascribes this to the huge amounts of money that investors can make very quickly with access to secret information. Eavesdropping on businesses has become easier as bugs have become more available, cheaper, powerful and smaller. A concealed MP3 player, for example, can record days of conversation. A phone bug can be planted in a room and dialed into from anywhere: the call often escapes detection because it resembles an ordinary mobile phone call. They are, says Mr Sturrock, "the current bug of choice". They are readily available in shops such as Spymaster in London and on the internet and cheap enough to be disposable. Other James Bond-style gadgets, small and easily concealed - a fake smoke detector with a hidden camera, for example - are also very affordable. Would-be spies are also happy to raid your rubbish. Many businesses believe a shredder takes care of sensitive information, but that faith is misplaced, Mr Sturrock explains. Shredding devices have six grades. Six is the most effective, but three is the most common. Any documents shredded by a machine below level five can be reconstructed with software or by sending the waste to be sorted in a country with cheap labour. Technology has made spying easier, but so have new employment trends. The spying device at headquarters or in a hotel room or a bar may be a person. It might be the low-paid, probably unvetted and possibly temporary cleaner. It could be a disgruntled employee. Staff can be persuaded unknowingly into giving out passwords, or they may give away information by talking loudly on a mobile phone or by mislaying a BlackBerry. Spies might operate near top-level staff's homes, looking for an open Wi-Fi ­connection or cordless phone. Industrial espionage tends to take place at times of high sensitivity and risk to a company, says Norman Bolton, a director of the security consultancy C2i International: "We usually find it happens to companies that are suffering." This often provides the combination of incentive (the company may be ripe for a takeover bid) and means (the employees are likely to be miserable or worried about job security). Commercially sensitive information may not always take the form most obvious to staff: as well as information affecting a company's area of operation, spies could be interested in the details of a joint venture or technology transfer. Many developing countries have neither the intellectual property law nor culture of information security that have developed in the west and far more is considered fair game. Bill Waite, chief executive of Risk Advisory Group, says: "It's not unknown for hotel rooms to be entered at night and entire laptop hard drives to be copied. Those who this happens to usually don't have any idea what has gone on." Spies can be defeated. On the bugging side, counter-surveillance companies can sweep the premises and throw "electronic blankets" over rooms during secure meetings. Very determined spies can use lasers to "read" the vibrations of a conversation or film videos through long lenses to be viewed by lip readers, so if the meeting is really sensitive, businesses can use secret locations with private entrances. On the staffing side, prospective employees should be checked, and staff should be encouraged to tidy away papers and anything of a sensitive nature from their desks. They should not use shared printers for sensitive documents and should be wary when carrying sensitive information on their laptops. More businesses should remember that the only way to erase information on an old hard drive is to destroy the disk. An important part of minimising risk, says Mr Stapleton, is maintaining loyalty and morale among employees. "Our view is that if you have a disgruntled and demotivated workforce, they will be far more open to approaches from outside agencies - and that is the easiest way to get information out." Industrial espionage may have replaced industrial action as a way of acting on a grievance. "Don't forget", says Mr Stapleton, "there is still a lot of sensitive information inside people's heads." ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [64.233.162.211] ([64.233.162.211]:2230 "EHLO nz-out-0304.google.com") by ams018.ftl.affinity.com with ESMTP id S1611867AbWFRSvy; Sun, 18 Jun 2006 14:51:54 -0400 Received: by nz-out-0304.google.com with SMTP id v21so702530nzg for ; Sun, 18 Jun 2006 11:51:53 -0700 (PDT) Received: by 10.11.13.12 with SMTP id 12mr276246cwm; Sun, 18 Jun 2006 11:50:23 -0700 (PDT) Received: by 10.11.79.5 with SMTP id c5gr648cwb; Sun, 18 Jun 2006 11:50:14 -0700 (PDT) X-Sender: NoPositiveWork@aol.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.22.2 with SMTP id 2mr8409132nzv; Sun, 18 Jun 2006 08:58:51 -0700 (PDT) Received: from imo-d21.mx.aol.com (imo-d21.mx.aol.com [205.188.144.207]) by mx.googlegroups.com with ESMTP id h49si166540nzf.2006.06.18.08.58.51; Sun, 18 Jun 2006 08:58:51 -0700 (PDT) Received-SPF: pass (googlegroups.com: domain of NoPositiveWork@aol.com designates 205.188.144.207 as permitted sender) Received: from NoPositiveWork@aol.com by imo-d21.mx.aol.com (mail_out_v38_r7.5.) id r.4be.2305911 (43933) for ; Sun, 18 Jun 2006 11:58:46 -0400 (EDT) From: NoPositiveWork@aol.com Message-ID: <4be.2305911.31c6d236@aol.com> Date: Sun, 18 Jun 2006 11:58:46 EDT Subject: [TSCM-L] Jackson sued for wiretapping To: TSCM-L2006@googlegroups.com Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="-----------------------------1150646326" X-Mailer: 9.0 for Windows sub 5123 X-Spam-Flag: NO X-Google-Approved: jmatk@TSCM.com via web at 2006-06-18 18:50:14 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,
Posted on Sat, Jun. 17, 2006
Jacko sued

Michael Jackson unmercifully harassed a Los Angeles woman, tampering with her food and water and threatening her life, according to a lawsuit obtained by TMZ.

The bizarre case, filed by Helen Harris-Scott, alleges that she began sending Jackson cards and letters in 1986, declaring her ''love and admiration'' for the singer.

Harris-Scott claims things turned ugly around 1987 when Jackson, who was ''connected with criminals,'' flattened her tires and tampered with her brake system. She also says a GPS tracking device was secretly installed in her car, tracking her every move. She says her phone was also wiretapped.

Harris-Scott claims it got even worse, alleging Jackson had ``organized criminals watching me inside my house in L.A. and reporting to him.''

She wants the court to order a public apology from Jackson and ``immediate disconnection of all the surveillance and wiretapping equipment.''

Oh, and $100 million.

Jackson's rep Raymone Bain says, ``Wonders never cease to amaze me.''

 

 

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group.
To post to this group, send email to TSCM-L2006@googlegroups.com
To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com
For more options, visit this group at http://groups.google.com/group/TSCM-L2006
-~----------~----~----~----~------~----~------~--~---

X-Persona: Received: from [64.233.166.168] ([64.233.166.168]:23683 "EHLO py-out-1314.google.com") by ams012.ftl.affinity.com with ESMTP id S391630AbWJKD1f; Tue, 10 Oct 2006 23:27:35 -0400 Received: by py-out-1314.google.com with SMTP id b30so8219pyb for ; Tue, 10 Oct 2006 20:27:21 -0700 (PDT) Received: by 10.35.99.5 with SMTP id b5mr922242pym; Tue, 10 Oct 2006 19:38:41 -0700 (PDT) Received: by 10.11.109.73 with SMTP id h73gr924cwc; Tue, 10 Oct 2006 19:38:27 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.114.16 with SMTP id r16mr91928pym; Tue, 10 Oct 2006 19:38:27 -0700 (PDT) Received: from lvs00-fl-n11.ftl.affinity.com (lvs00-fl-n11.ftl.affinity.com [216.219.253.186]) by mx.google.com with ESMTP id c21si1549427pyc.2006.10.10.19.38.26; Tue, 10 Oct 2006 19:38:27 -0700 (PDT) Received-SPF: neutral (google.com: 216.219.253.186 is neither permitted nor denied by domain of jmatk@tscm.com) Received: from [68.239.60.109] ([68.239.60.109]:18118 "EHLO Raphael.tscm.com") by ams011.ftl.affinity.com with ESMTP id S378304AbWJKCi0 convert rfc822-to-8bit (ORCPT ); Tue, 10 Oct 2006 22:38:26 -0400 Message-Id: <7.0.1.0.2.20061010223653.04079468@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Tue, 10 Oct 2006 22:38:18 -0400 To: TSCM-L2006@googlegroups.com From: "James M. Atkinson" Subject: [TSCM-L] Listening devices discovered in the apartment of the former chief executive of the Deutsche Bˆrse Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.securitypark.co.uk/article.asp?articleid=25937&CategoryID=1 Listening devices discovered in the apartment of the former chief executive of the Deutsche Bˆrse A complex system of listening devices has been discovered in the Frankfurt apartment belonging to Werner Seifert, former chief executive of the Deutsche Bˆrse. Seifert, who launched his bid for the London Stock Exchange in 2004, moved to Ireland a few months ago. In the meantime, another banker from a rival firm, moved into the apartment and was surprised to discover the bugs hidden in the ceilings and walls - even in the bathrooms. An investigation is under way to find out who planted the devices, what they heard and whether they may have profited. Known as "sweeping" TSCM (Technical Surveillance Counter Measures) involves the detailed checking of rooms, offices, residences and vehicles to ensure that no covert listening, secret camera or telephone bugging devices have been deployed. 'Sweeping' has now become a highly sophisticated process and has been adopted by major companies, international organisations, government departments, prominent individuals and VIPs and those with an interest in keeping their intellectual property and private lives secure. TSCM is vital for protection. There are a number of methods available to counter the illegal bugging, and interception, of private and corporate telephone calls utilising high security encryption. Whiterock 's Secure-Comm for instance offers complete protection to clients who require assurance that their mobile, landline and fax transmissions remain secure, private and confidential. --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- X-Persona: Received: from [64.233.162.211] ([64.233.162.211]:13943 "EHLO nz-out-0304.google.com") by ams027.ftl.affinity.com with ESMTP id S604914AbWJEQZM; Thu, 5 Oct 2006 12:25:12 -0400 Received: by nz-out-0304.google.com with SMTP id h28so1576743nzf for ; Thu, 05 Oct 2006 09:24:38 -0700 (PDT) Received: by 10.35.111.14 with SMTP id o14mr126085pym; Thu, 05 Oct 2006 09:24:11 -0700 (PDT) Received: by 10.11.8.19 with SMTP id 19gr908cwh; Thu, 05 Oct 2006 09:24:09 -0700 (PDT) X-Sender: bbarber743@aol.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.49.4 with SMTP id b4mr106459pyk; Thu, 05 Oct 2006 06:52:07 -0700 (PDT) Received: from 172.212.175.207 by e3g2000cwe.googlegroups.com with HTTP; Thu, 05 Oct 2006 13:52:06 +0000 (UTC) From: bbarber743@aol.com To: "TSCM-L Professionals List" Subject: [TSCM-L] London based expert needed Date: Thu, 05 Oct 2006 06:52:06 -0700 Message-ID: <1160056326.593125.177520@e3g2000cwe.googlegroups.com> User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; InfoPath.1),gzip(gfe),gzip(gfe) Mime-Version: 1.0 Content-Type: text/plain X-Google-Approved: jmatk@TSCM.com via web at 2006-10-05 16:24:07 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , I was going to be part of a panel discussing telephone bugging etc. for journalists who operate in the frontline, unfortunately I have to be in Sudan and so cannot attend. They need some one to talk about what is possible and what is not legitimate. They also would be keen to look at ways they may be listened to when on overseas assignments. Anyone able to help? The meeting is 15th of November from 7.30 till 9pm at the club. website below. Championing independent journalism www.frontlineclub.com --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [216.239.56.131] ([216.239.56.131]:48365 "EHLO mproxy.googlegroups.com") by ams014.ftl.affinity.com with ESMTP id S677150AbWDYWaz; Tue, 25 Apr 2006 18:30:55 -0400 Received: by mproxy.googlegroups.com with SMTP id r61so8819936cwc for ; Tue, 25 Apr 2006 15:30:54 -0700 (PDT) Received: by 10.11.53.23 with SMTP id b23mr207703cwa; Tue, 25 Apr 2006 15:29:24 -0700 (PDT) Received: by 10.11.79.5 with SMTP id c5gr546cwb; Tue, 25 Apr 2006 15:29:20 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.11.88.14 with SMTP id l14mr1214290cwb; Tue, 25 Apr 2006 15:29:20 -0700 (PDT) Received: from ams004.useripd.ftl.affinity.com (lvs00-fl-n04.valueweb.net [216.219.253.138]) by mx.googlegroups.com with ESMTP id v11si1844871cwb.2006.04.25.15.29.19; Tue, 25 Apr 2006 15:29:20 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.138 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [141.149.183.21] ([141.149.183.21]:56844 "EHLO nikola.tscm.com") by ams004.ftl.affinity.com with ESMTP id S556682AbWDYW3T (ORCPT ); Tue, 25 Apr 2006 18:29:19 -0400 Message-Id: <6.2.3.4.2.20060425182355.07d4d790@pop.tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.3.4 Date: Tue, 25 Apr 2006 18:28:10 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] `Long Hair' dials high-tech help in battle of the bugs Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.thestandard.com.hk/news_detail.asp?pp_cat=11&art_id=17393&sid=7664727&con_type=1 `Long Hair' dials high-tech help in battle of the bugs For years, independent legislator and self-proclaimed Marxist "Long Hair" Leung Kwok-hung has suspected the government or mainland authorities of tapping his phone lines and eavesdropping on his political activities. Jonathan Cheng Wednesday, April 26, 2006 For years, independent legislator and self-proclaimed Marxist "Long Hair" Leung Kwok-hung has suspected the government or mainland authorities of tapping his phone lines and eavesdropping on his political activities. But Tuesday, Leung said he could substantiate his allegations, picking up his office phone in the West Wing of the Central Government Offices and pointing to a small plastic device with a flashing red light - "The BugSmasher" - he had attached to his phone. "See? You can hear this faint noise on the line," he told reporters as he listened through the receiver. That noise and the red light on The BugSmasher, he said, were proof that his two office phone lines were being tapped. "I'm being bugged now, and it doesn't have to go through the courts, so there are no records," said Leung, a long-time activist. "The government needs to respond to this." The administration, which typically answers Leung's charges and complaints with silence, moved quickly Tuesday to defuse Leung's allegations. "It's not the first time that this kind of accusation has been made," said Secretary for Security Ambrose Lee Siu-kwong. Lee said the government has conducted itself within the law at all times, and insisted that law enforcement officers would not eavesdrop on anyone for political reasons. "It's nonsense," Leung said. "I don't want his official statements. What he says means absolutely nothing. "He's just repeating the proper government line." But Leung has said repeatedly that the government has never had a legal basis for wiretapping and eavesdropping on its citizens, demanding that Lee publicly apologize for what he describes as years of reckless and unlawful wiretapping on private citizens. Leung plans to demand a response from Chief Executive Donald Tsang Yam-kuen today. In February, Leung won a landmark judicial review in High Court overturning the constitutionality of the government's covert operations. The verdict, written by Justice Michael Hartmann, issued a fierce indictment of the administration's current practices but gave the government a controversial six-month "extension of validity" to grant the government time to enact a proper law. Leung will appear in the Court of Appeal today to appeal that ruling. The government has said that if Leung wins and the wiretapping is forced to stop immediately, the safety of Hong Kong citizens would be greatly compromised. But Leung says the government dragged its feet for almost a decade on the issue, insisting that its practices were constitutional, even without a law explicitly outlining the parameters of covert operations. The administration is now rushing to pass another law through Legislative Council before the "extension of validity" lapses when legislators take their summer recess. Leung has been a vocal critic of many provisions in the government's current draft bill, pushing for a notification mechanism that would inform targets after cases are closed that they had been the subject of covert operations. The government, however, has refused to budge on that suggestion. Democratic Party founder and legislator Martin Lee Chu-ming and outspoken lawmaker Albert Cheng Jing- han, have also made public their suspicions of being wiretapped. Leung also voiced suspicions that he has been followed for many years. "I admit I don't have any evidence, and it's just a feeling I have," he said. "I don't want to say this really, since it will make me seem like I'm making things up, but it's been happening, on and off, for a long time." When asked how long he thought he was being followed, Leung replied: "Twenty-odd years." Florida-based TelstarOne Communications sells The BugSmasher for US$130 (HK$1,014) on its Web site, claiming that it can "actually defeat telephone bugging and tapping attempts." ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [64.233.162.223] ([64.233.162.223]:20080 "EHLO nz-out-0304.google.com") by ams008.ftl.affinity.com with ESMTP id S1603969AbWFRSQR; Sun, 18 Jun 2006 14:16:17 -0400 Received: by nz-out-0304.google.com with SMTP id q60so736157nzb for ; Sun, 18 Jun 2006 11:16:17 -0700 (PDT) Received: by 10.11.53.25 with SMTP id b25mr291094cwa; Sun, 18 Jun 2006 11:14:44 -0700 (PDT) Received: by 10.11.79.5 with SMTP id c5gr646cwb; Sun, 18 Jun 2006 11:14:34 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.64.21.6 with SMTP id 6mr2153659qbu; Sun, 18 Jun 2006 11:14:34 -0700 (PDT) Received: from ams011.ftl.affinity.com ([216.219.253.186]) by mx.googlegroups.com with ESMTP id h71si175249nzf.2006.06.18.11.14.33; Sun, 18 Jun 2006 11:14:34 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.186 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [141.149.175.173] ([141.149.175.173]:4105 "EHLO nikola.tscm.com") by ams011.ftl.affinity.com with ESMTP id S481638AbWFRSOd (ORCPT ); Sun, 18 Jun 2006 14:14:33 -0400 Message-Id: <7.0.1.0.2.20060618135944.0b752118@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Sun, 18 Jun 2006 14:03:14 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] LPD Bugging Indictment: 3 of 4 Officers Turn in Their Badges Part II Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.klfy.com/Global/story.asp?S=5043953 June 16, 2006 LPD Bugging Indictment: 3 of 4 Officers Turn in Their Badges Part II There are new developments involving the indictment and arrests of four Lafayette police officers. The group is accused of placing and monitoring an illegal listening device in Police Chief Randy Hundley's secretary's office. One officer was cleared in the case and three others who were indicted have chosen to either retire or resign. Friday, city-parish officials tell TV 10 Sgt. Brian Butler retired and Cpl. Shannon Hundley, that's Chief Hundley's nephew, resigned. Out of the group, only Police Chief Randy Hundley remains on the police department payroll. He was placed on paid administrative leave earlier this year. Lafayette police chief Randy Hundley is the only indicted officer who has yet to step down from the force. And, his attorney, Jason Robideaux tells TV 10 when all the facts come out, his client will be vindicated. In fact, Robideaux claims the entire situation was mishandled by the city-parish government from the beginning. City-parish officials say a hearing will be held Wednesday to determine Chief Hundley's fate. They say he was served with a notice for that hearing. An arraignment on the criminal charges has been set for July 18th at 9:00am. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [64.233.162.219] ([64.233.162.219]:65266 "EHLO nz-out-0304.google.com") by ams027.ftl.affinity.com with ESMTP id S865735AbWFACop; Wed, 31 May 2006 22:44:45 -0400 Received: by nz-out-0304.google.com with SMTP id v21so1332957nzg for ; Wed, 31 May 2006 19:44:44 -0700 (PDT) Received: by 10.11.53.59 with SMTP id b59mr383523cwa; Wed, 31 May 2006 19:43:14 -0700 (PDT) Received: by 10.11.86.25 with SMTP id j25gr626cwb; Wed, 31 May 2006 19:43:12 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.54.68.14 with SMTP id q14mr165036wra; Wed, 31 May 2006 19:43:12 -0700 (PDT) Received: from ams011.ftl.affinity.com (lvs00-fl-n11.valueweb.net [216.219.253.186]) by mx.googlegroups.com with ESMTP id v11si621021cwb.2006.05.31.19.43.11; Wed, 31 May 2006 19:43:12 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.186 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [151.199.29.156] ([151.199.29.156]:50705 "EHLO nikola.tscm.com") by ams011.ftl.affinity.com with ESMTP id S417264AbWFACnK (ORCPT ); Wed, 31 May 2006 22:43:10 -0400 Message-Id: <6.2.3.4.2.20060531220909.0dfeeeb0@pop.tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.3.4 Date: Wed, 31 May 2006 22:14:32 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] LPD Bugging Investigation: Dealing with the Loss of Manpower Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.klfy.com/Global/story.asp?S=4972642 May 31, 2006 LPD Bugging Investigation: Dealing with the Loss of Manpower It's time for Lafayette police to regroup. District Attorney Mike Harson says it will probably take two to three weeks for a grand jury to consider the case against Lafayette police chief Randy Hundley and four other officers. State police investigators dropped off the results of a bugging investigation to the D.A., Tuesday. The officers are accused of using a hidden listening device to monitor conversations taking place in the office of the chief's secretary. Investigators say it was originally used as part of an internal affairs investigation. But as time went on, they say it was left in place to help determine who was loyal to Chief Hundley. Chief Hundley remains on administrative leave. Tuesday night, Lafayette Consolidated Government also placed Major Casey Fowler, Captain Michael Lavergne, Sgt. Brian Butler and Cpl. Shannon Hundley on administrative leave. Meanwhile, separate from the investigation, several high-ranking veteran officers have retired since the beginning of the year. TV 10 takes a closer look at how police are dealing with the loss of manpower. Lafayette city police officials say they're working out plans to deal with the loss of four more officers. Cpl. Mark Francis tells TV 10 the department is not making any permanent changes until the bugging case is further along. He says some officers may have additional work while this plays out. Francis also cleared up information about the five officers involved in the case. He says only Capt. Michael Lavergne worked directly with internal affairs. Capt. Lavergne is currently a supervisor over the department and served in that same capacity at the time of the alleged illegal activity in 2004. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [64.233.184.219] ([64.233.184.219]:62842 "EHLO wr-out-0304.google.com") by ams018.ftl.affinity.com with ESMTP id S2444746AbWFPFvX; Fri, 16 Jun 2006 01:51:23 -0400 Received: by wr-out-0304.google.com with SMTP id 75so324470wra for ; Thu, 15 Jun 2006 22:51:22 -0700 (PDT) Received: by 10.11.53.63 with SMTP id b63mr119400cwa; Thu, 15 Jun 2006 22:49:49 -0700 (PDT) Received: by 10.11.79.5 with SMTP id c5gr644cwb; Thu, 15 Jun 2006 22:49:46 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.54.131.4 with SMTP id e4mr1547778wrd; Thu, 15 Jun 2006 22:49:46 -0700 (PDT) Received: from ams003.useripd.ftl.affinity.com ([216.219.253.136]) by mx.googlegroups.com with ESMTP id v11si564978cwb.2006.06.15.22.49.45; Thu, 15 Jun 2006 22:49:46 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.136 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [129.44.184.205] ([129.44.184.205]:21261 "EHLO nikola.tscm.com") by ams003.ftl.affinity.com with ESMTP id S609356AbWFPFtp (ORCPT ); Fri, 16 Jun 2006 01:49:45 -0400 Message-Id: <7.0.1.0.2.20060616014606.08f93828@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Fri, 16 Jun 2006 01:47:52 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] LPD Bugging Investigation: Indictments Handed Down UPDATE Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.klfy.com/Global/story.asp?S=5038609 June 15, 2006 LPD Bugging Investigation: Indictments Handed Down UPDATE Lafayette police chief Randy Hundley, along with three other officers, have been indicted by a grand jury. Chief Hundley must report to jail after a grand jury indicted him on three counts of illegal electronic surveillance. Arrest warrants will also be issued for three other officers as part of the same case. Police Chief Randy Hundley wrapped up his testimony around 4:00. By 5:00, a grand jury returned three counts against the chief. Chief Hundley is at the heart of an investigation in which he is accused of placing a bug under his secretary's desk. Hundley's attorney, Jason Robideaux confirmed the fact that it was originally placed as part of an internal affairs case. But, police sources say it was left there as a way to find out who in the department was loyal to the chief. Robideaux says there are other major elements that will be presented in trial. Only Major Casey Fowler left the courthouse without an indictment. Captain Michael Lavergne, Sgt. Brian Butler and Cpl. Shannon Hundley also face charges in the case. At least one of the detectives involved in a state police investigation of the department was at the courthouse. Information from that report prompted the district attorney's office to send the case to the grand jury. Prosecutors say they're confident the charges fit the crime. Mike Steele, TV 10 Eyewitness News ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [64.233.162.221] ([64.233.162.221]:62293 "EHLO nz-out-0304.google.com") by ams027.ftl.affinity.com with ESMTP id S2446331AbWFPFvU; Fri, 16 Jun 2006 01:51:20 -0400 Received: by nz-out-0304.google.com with SMTP id q60so629035nzb for ; Thu, 15 Jun 2006 22:51:19 -0700 (PDT) Received: by 10.11.28.34 with SMTP id b34mr121877cwb; Thu, 15 Jun 2006 22:49:49 -0700 (PDT) Received: by 10.11.79.5 with SMTP id c5gr643cwb; Thu, 15 Jun 2006 22:49:46 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.54.156.2 with SMTP id d2mr1547564wre; Thu, 15 Jun 2006 22:49:45 -0700 (PDT) Received: from ams003.useripd.ftl.affinity.com ([216.219.253.136]) by mx.googlegroups.com with ESMTP id v11si564978cwb.2006.06.15.22.49.45; Thu, 15 Jun 2006 22:49:45 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.136 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [129.44.184.205] ([129.44.184.205]:21261 "EHLO nikola.tscm.com") by ams003.ftl.affinity.com with ESMTP id S608208AbWFPFto (ORCPT ); Fri, 16 Jun 2006 01:49:44 -0400 Message-Id: <7.0.1.0.2.20060616014346.09929a48@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Fri, 16 Jun 2006 01:46:04 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] LPD Bugging Investigation: Indictments Handed Down Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.klfy.com/Global/story.asp?S=5037852 June 15, 2006 LPD Bugging Investigation: Indictments Handed Down Lafayette's police chief and three other officers are now facing formal charges. Four of the five Lafayette police officers, including Chief Randy Hundley have been indicted by a Lafayette Parish grand jury. Mike Steele has the latest... Eyewitness News first told you in February about the hidden listening device found inside the police department. Here again is how we got to this point... About a month after our investigation, District Attorney Mike Harson received a complaint and asked state police to investigate. Consolidated government then placed Chief Hundley on paid administrative leave pending the outcome of the investigation. This month, state police finished their investigation and released it to the district attorney. That is when Harson announced a grand jury would hear the case against Chief Hundley and four other officers. Those four officers were also placed on administrative leave. Be sure to watch tonight at 10:00 for more on this developing story. We'll have a breakdown of the indictments and we'll hear from Lafayette consolidated president Joey Durel. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- X-Symantec-TimeoutProtection: 0 X-Symantec-TimeoutProtection: 1 Received: from [64.233.162.209] ([64.233.162.209]:15095 "EHLO nz-out-0304.google.com") by ams009.ftl.affinity.com with ESMTP id S866621AbWFACPL; Wed, 31 May 2006 22:15:11 -0400 Received: by nz-out-0304.google.com with SMTP id v23so1243361nzg for ; Wed, 31 May 2006 19:15:10 -0700 (PDT) Received: by 10.11.11.30 with SMTP id 30mr333675cwk; Wed, 31 May 2006 19:13:39 -0700 (PDT) Received: by 10.11.86.25 with SMTP id j25gr625cwb; Wed, 31 May 2006 19:13:34 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.54.68.5 with SMTP id q5mr164627wra; Wed, 31 May 2006 19:13:33 -0700 (PDT) Received: from ams003.useripd.ftl.affinity.com (lvs00-fl-n03.valueweb.net [216.219.253.136]) by mx.googlegroups.com with ESMTP id v23si620985cwb.2006.05.31.19.13.32; Wed, 31 May 2006 19:13:33 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.136 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [151.199.29.156] ([151.199.29.156]:19217 "EHLO nikola.tscm.com") by ams003.ftl.affinity.com with ESMTP id S423780AbWFACNc (ORCPT ); Wed, 31 May 2006 22:13:32 -0400 Message-Id: <6.2.3.4.2.20060531220322.0dfefeb0@pop.tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.3.4 Date: Wed, 31 May 2006 22:06:02 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] LPD Bugging Investigation: State Police Officially Turns Over Report to D.A., Findings to be Submitted to Grand Jury Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.klfy.com/Global/story.asp?S=4967909 May 30, 2006 LPD Bugging Investigation: State Police Officially Turns Over Report to D.A., Findings to be Submitted to Grand Jury There are new developments in the Lafayette police bugging investigation. Police Chief Randy Hundley now has company. Like Chief Hundley, four additional officers are now on paid administrative leave after being highlighted as targets of a state police investigation. The group is accused of using a bug to monitor conversations in a police department secretary's office. Lafayette Consolidated Government chief administrative officer announced Tuesday night that Major Casey Fowler, Captain Michael Lavergne, Sgt. Brian Butler and Cpl. Shannon Hundley are on leave. TV 10 broke this story back in February. A state police detective delivered the results of the investigation to the district attorney's office around 3:45. The report included several audio and video taped interviews with police officers and members of consolidated government. As TV 10 first reported, the allegations against the officers center on a bug allegedly placed under Chief Hundley's secretary's desk. He says it does not include information about wiretaps placed on phone lines. D.A. Mike Harson says the alleged deal was a listening type device placed under a desk that would hear or intercept the oral communications and then transmit it to another location. He says it's not a wiretap in the sense to where you actually go in and interfere with the line itself. Harson says he plans to send the case to a grand jury to avoid any sign of politics. Harson says he thinks it's the best way to handle this type of case with the publicity it's gotten and the public's interest in knowing about the actions of the police department to avoid an appearance of political involvement. He says he would rather just get an impartial body that will be able to hear the evidence and make a call. The district attorney says it may take a few days to review all the information in the state police report. He does say it shouldn't take long for a grand jury to convene and take up the issue. Harson says his intentions at this time are to turn the matter over to a grand jury here in Lafayette. He says there are some grand juries coming in the month of June. He says he will try his best to have the matter put on one of the dockets within the next two to three weeks. As we've previously reported, investigators believe the bug was originally planted as part of an investigation into abuse of the department's overtime policy. But, as time went on, it was left in place as a means of determining who was loyal to Chief Hundley. The specific allegations include placing, monitoring and servicing the bugging device. If indicted, the officers face charges of illegal monitoring of oral conversations and police malfeasance in office charges. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- X-Persona: Received: from [64.233.166.171] ([64.233.166.171]:45371 "EHLO py-out-1314.google.com") by ams023.ftl.affinity.com with ESMTP id S481657AbWJCX63; Tue, 3 Oct 2006 19:58:29 -0400 Received: by py-out-1314.google.com with SMTP id b30so2700100pyb for ; Tue, 03 Oct 2006 16:58:28 -0700 (PDT) Received: by 10.35.111.14 with SMTP id o14mr989547pym; Tue, 03 Oct 2006 16:44:02 -0700 (PDT) Received: by 10.11.8.19 with SMTP id 19gr905cwh; Tue, 03 Oct 2006 16:43:57 -0700 (PDT) X-Sender: a012210@sina.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.128.17 with SMTP id f17mr671717pyn; Mon, 02 Oct 2006 11:32:50 -0700 (PDT) Received: from 218.28.171.198 by i42g2000cwa.googlegroups.com with HTTP; Mon, 02 Oct 2006 18:32:49 +0000 (UTC) From: "023" To: "TSCM-L Professionals List" Subject: [TSCM-L] -- Magnetic motor 1, the static magnetic field 1) Motor Date: Mon, 02 Oct 2006 11:32:49 -0700 Message-ID: <1159813969.304521.46080@i42g2000cwa.googlegroups.com> User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1),gzip(gfe),gzip(gfe) Mime-Version: 1.0 Content-Type: text/plain X-Google-Approved: jmatk@TSCM.com via web at 2006-10-03 23:43:57 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , -- Magnetic motor 1, the static magnetic field 1) Motor, Edison is a classic -- for the motor commutator. It gave birth to a commutator Early glory and pride of Health also has its challenges by the AC motor sad and helpless. (By his own mistakes, for To the trouble : Brush Powder, for to sparks and fire the ball, did not attain a high voltage DC not lock. ) 2) unipolar machine (single-pole, low voltage, still using brush. ) 2, rotating magnetic field 1) : AC induction motor stator magnetic spin (three-phase). 2) : AC synchronous motor rotor rotary magnetic field (three-phase), its magnetic field axis in a plane Like a (watches) targets the same rotation. 3, pulsating magnetic field : Single-phase induction motor start and external started. Not spin magnetic field, not transferred. Its intensity over time cyclical changes. 4, runner field : "no single-pole motor for devices to" exclude "other" distressed, Can achieve a high voltage transformer also carried DC to DC in Step EHV transmission epoch of the trouble Thrown into the eyes. DC is essentially internal, no ripple coefficient. Waveform very straight, pure and absolute DC; Lane from the outside of DC. Motor did not like the original internal actual exchange; Is the direct external Flow. The electrical field into trouble over the use of the motor performance of the structure also has advantages : simple, easy to manufacture. Capacity can be great, but also made it very convenient to DC transformer. -- AC transformers used alternating (a) a magnetic field For high and low pressure between the media; DC transformer alternating magnetic field is not without action, with rotation (a) switch -- Sub-runner field for the high and low voltage DC media. ) Magnetic cylinder in the aspect of its work (a cylinder). 5, turntable motor is a magnetic field : the birth of the motor 10 years ago. Magnetic its work Course for a round face, or face a ball. Obiter dictum : Cancel the commutator and then invented commutator considerable efforts, the impact, but the effect is more Good. "No single-pole motor commutator device" Yong Yu Beauty Motor Motor how? ! Switch can be dispensed with. BRIDGE into stumbling justice yesterday, For contradictory to the motor. In this gifted genius who Hongzhi, I will only change; Do the British to the beliefs of sorrows Still no change to the DC motor. Following clipboard. Brochures No change to the single-pole motor device This involves the application of a new generation and distribution equipment -- Motor. It is from Shell, Cover, Stator core and stator winding, rotor, rotor core composed. Currently, the widespread use of a DC motor, "with copper commutator universal motor", "Pick Silicon device and the DC component of the electrical flow generator, "" unipolar motor, "" permanent magnet brushless DC motor " And so on. "Copper commutator with the universal motor," and its commutator manufacturing process is very complicated, so Use, easy to EDM on the commutator, even ring of fire, because of the use of the commutator, the rated voltage of motor Not too high. "Silicon Devices AC motor with a DC generator," the AC motor -- that silicon Rectifier, the voltage waveform is not straight, there is a certain element of the pulse. To reverse voltage and rated by the Silicon Devices Current restrictions make it impossible to form very high DC power generators. "Unipolar motor" from the stator magnetic yoke, a circular pole, Coil and rotor, brush and other groups %. This brush will often switch to motor liquid metal collector system, which is generally available as a liquid metal collector system Sodium and potassium alloy of mercury, mercury is toxic, liquid metal sodium-potassium alloy, very lively and chemical properties when exposed to air , With a risk of explosion. "Permanent magnet brushless DC motor," and the electronic components, with the result that not much electrical power, and more The joints and components, bringing inconvenience to the maintenance costs are high. The purpose of this is to avoid the application of a new technology of these existing deficiencies, and provide a "non - Device for single-pole motor, "and did not use the motor for the inconvenience to the maintenance of installations, but also to achieve a high Pressure, the voltage waveform directly create simple, low cost and high efficiency. The purpose of this utility model can be achieved through the following measures : Shell, Cover, stator core, Stator windings, Rotors, composed of the rotor device for no single pole motor, the rotor from the preceding (1), middle magnet (4), after paragraph (7) of which of the magnet (4), a polar ends of the show, and To the middle magnet (4) a leader in a magnetic Cover (12) axial hole and the other end in Rotors (9) round Hole (2); Shell (11) is a magnetic part (24) and non-magnetic parts (23) phase spacing was Moments Profile crossed 20% stator core (10) in the shell (11) magnetic part of the medial (24) ; In the stator core (10) and Shell (11) part of the non-magnetic material (23) the medial surface of a separate groove (22), (21). Rotor magnet in the middle (4) Magnet, Ring can be posed by Coil Winding thread arising from the electro-magnetic field. The above-mentioned Rotor shaft links can call it is the middle of the magnetic pieces. Shaft in the preceding paragraph (1) side of the magnetic Cover (12) Section magnetic materials for the other side of the Cover (8) is made from non-magnetic materials. Stator windings (6) is the introduction of two Winding (6), (6a), and the stator windings (6), (6a) thread, embedded in the side of some non-magnetic material (23), opening the groove (21), embedded in the side of the stator core (10) opened the slot (22); Adopted a set WINDING (6), only the stator windings (6), leads to one or more intermediate tap, the stator windings (6) Turns for at least one turn of thread. Shaft in the preceding paragraph (1) the open end of a cylindrical convex breaks magnets (4) The open end of a cylindrical convex enable embedded in the hole; In Rotors (9), the center opened a site linked to the ends Hole (2), the middle rotor magnets (4), and not after the end of the hole (7) hole in the side load (2). And fixed. The figure illustrates the following : Figure 1 : The utility model matrix. Figure 2 : Diagram magnet middle of the shaft. Figure 3 : rotor, rotor core matrix. Figure 4 : shell matrix. Figure 5 : shell and the stator core post-show plans. Figure 6 : Diagram the motor wiring. Figure 7, the electrical launch plans. Figure 8 : Diagram electrical magnetic fields. Figure 9 : Generator work state diagram. Figure 10 : electric motor in the state diagram. Figure 11 : Name two stator windings. Map gives a practical implementation of the new cases. The following is attached map of the utility model for further details : -- Without the application of a new device for the single pole motor, as shown in figure 1, it is caused by shell (11), the stator core (10), Rotors (9), Cover (8), magnetic Cover (12), bearing cap (13), the stator windings (6), Blade (3), rings (5), which includes the shaft, the shaft is characterized by : Points (1), middle magnet (4), after paragraph (7) composition; Rotor magnet in the middle (4) by the end of the magnetic equipment Cover the magnetic material (12) axial hole and the other end in Rotors (9) of the hole (2). Middle Magnets (4) Magnet, a polar ends of the show (shown in figure 2); From the preceding paragraph (1), middle magnet (4), after paragraph (7) of the shaft formed in the shaft portion (1) the open end of a cylindrical convex breaks magnetic CARICOM (4) the open end of a cylindrical convex embedded make holes in Rotors (9), the center is open at both ends The same hole (2), the middle rotor magnets (4), and not after the end of the hole (7) hole in the side load (2), and fixed, as shown in figure 3. Middle magnet (4) may be winding line of packet ring excitation Magnetization of the magnetic field generated by the coil from the electromagnetic body, rotor shaft can call it links only to the middle magnet. Shell (11) by the magnetic part (24) and non-magnetic parts (23) phase partitioning, and combining overlapping tooth was moments % (As shown in figure 4), Shell (11) magnetic part (24) played a magnetic effect is composed of a magnetic circuit , Shell (11) part of the non-magnetic material (23), the magnetic field plays a role in reducing beam armature reaction. Shaft Portion (1) side of the magnetic Cover (12) for magnetic materials, the other side of the Cover (8) by a non-magnetic material Made, stator core (10) is a fan-like shape silicon steel sheet from stack system, and fixed the casing (11) of the medial magnetic materials Some material (24); In the stator core (10) and Shell (11) part of the non-magnetic material (23) with the side , Each opened a groove (22), (21) (shown in Figure 5), the stator windings (6), thread embedded in the side of non-magnetic Some material (23) opened the medial surface of the groove (21), embedded in the other side of the stator core (10) opened the medial surface of the groove (22), embedded groove (22) have the potential to the starting line Hemming, embedded (21) only serves to link the line Hemming The power supply situation, that is only starting to groove (22), while the thread links up the potential role. When the stator windings (6) the thread serial wiring method, its wiring As shown in figure 6, Figure 6, S stator core (10) was Is the polarity, arrows indicate the stator windings (6) of the thread within the current direction of the relative movement in the direction of winding V said. Stator windings (6) the introduction of two windings (6), (6a) (shown in figure 7), the stator windings (6), (6a) Thread embedded in the side of the groove (21), embedded in the other side of groove (22); Equipped with two stator windings (6), (6a) with the following : First, in three different provisions of the electrical voltage value, given the same speed, in With a voltage value, given three different speed, and the third is when two sets of stator windings (6), (6a), which DC motor connected to one power supply for operation, with another winding in the rotor magnetic field rotation policy, Potential; If the two sets of stator windings (6) (6a) turns different, the internal situation -- not the same, and this structure Became DC transformer. Stator windings (6) is a winding, only the stator windings (6), or leads to a Intermediate tap the same, such a structure could pose a DC transformer. Stator windings (6) with a winding, its Line package turns at least one turn. When the stator windings (6) Turn one of the thread turns, it can save some embedded groove (21), the only play the role of the Alliance line Hemming (because of the potential side does not produce or connecting), the moment, If the line between the packages using the parallel connection, then stator windings (6) as Cage on the shape of embedded groove (22), the thread became Cage on the side of the cage, the continuous parallel lines on the package into the terminal ends of the Central cage. The utility model of the shell structure (11) part of the magnetic material science (24), the stator core (10), Rotors (9), magnetic Cover (12), have played the role of magnetic and magnetic pieces in the middle shaft (4) A polar ends of the shows, which are a form of motor internal magnetic circuit breaks magnets (4) -- Rotor Core (9) -- stator core gap -- (10) -- Shell (11) magnetic part (24) -- Magnetic Cover (12) -- middle magnet (4) (shown in Figure 8). Rotors can be seen from Figure 8 (9) in the stator core (10) showed the Unipolar cavity, which is due to magnetic Cover (12) middle magnets used in magnetic rotor and (4) the results. Principle, Figure 8 from the electrical field within the matrix can be seen Rotors (9) stator core (10) were endovascular Unipolar now, so when Rotors (9) rotation, in the stator core (10) to a cavity Unipolar The rotating magnetic field embedded in the stator core (10), opening the groove (22) of the winding line of packet will be cutting edge magnetic lines Sensors have potential in the stator core (10) and Rotors (9) gap between the shape of the magnetic field lines Radiation shape its direction from both Rotors (9) at the stator core (10), as shown in figure 8. 1, the principles of the application of a new generation >From left to right around the motor shaft, the rotor driven by an anti-clockwise rotation of the original motives, Embedding stator core (10), opening the groove (22) of the stator windings (6), son of the rotor along the lines of Hemming relatively smooth when The direction of rotation to cut magnetic needle. To the rotor shaft stator core is embedded in the top (10), opening the groove (22) The line Hemming example, in Figure 9 : Hemming line perpendicular to the direction of movement outside the paper, from the direction of magnetic field lines Under progressive, right-hand rule : thread Side judge the potential and current direction "from right to left" ; Can be judged the same way, each embedded groove (22) have both the direction of the border line packages "from right to left" -- Potential and current. Some non-magnetic materials embedded (23), opening the groove (21), the thread while not cutting magnetic field lines. (This is due to constitute a magnetic field lines are located in the magnetic loop inside the non-magnetic materials are divided (23) within a few Between nuclear magnetic line), do not have sensors potential. Thus, these have not put the potential embedded in the trough line Hemming (22), while the thread linking the potential, so that each line would have a certain numerical Hemming DC Pressure; According to the different ways of wiring, the thread may link between the serial, parallel or series first part, then the Parallel , The line will link DC voltage generated within the package. The lines used to establish the connection between the packet mode, bypassing Connection Group plans can be found in Figure 6. From the end of the first link between the two reached, will be given a certain value of DC voltage. It can be seen that this motor is not used for the device. 2, the utility model as the principle motor running When the motor's stator windings (6) DC power supply connected, in the stator windings (6), thread each side They have passed DC. Some non-magnetic materials embedded (23), opening the groove (21), while the thread, because Without magnetic field around (because gathered in the magnetic field caused the magnetic circuit Lane), which occurred with each other for the rotor magnetic field ; Embedding stator core (10), opening the groove (22) at the magnetic field lines Hemming, the rotor magnetic field phase and it -- Have a role in the interaction. Figure 20 below to above are embedded in the shaft groove (22) of the stator windings (6) the line Hemming example, the current direction of the line Hemming from left to right, upward direction of the magnetic field lines, Left-hand can determine, the line Hemming paper by the vertical direction to the outside; Similarly, we can see the shaft is below : Embedding groove (22) by a thread while the vertical direction of the paper geared Lane, each embedded groove (22) of the line Hemming Make subject to the direction and stator windings (6) to the direction of rotation. From the left-right axis ship set WINDING (6) : Inquiries by the direction it is rotating clockwise direction; According to the law, we can see action and counteraction, Make the direction of the rotor by an anti-clockwise rotation of the rotor direction, the stator windings (6) was solid stator , Not turning it clockwise rotation will be opened to the rotor, so that became a DC motor. Shown in figure 11 in the stator windings : (6) were the first two terminal P, Q, stator windings (6a) Ends at the first K, H, P and K for the two windings end of the same name. In manufacturing, in accordance with the same two sets of windings design speed (6), (6a) were rated voltage U1 and U2. In the use of a separate motor stator windings (6), rated voltage used in the motor alone will U1; WINDING (6a), will be used when U2; rated voltage motor stator windings of the two (6), (6a) in a Series Date (Q and P and K linked or connected H), the use of rated voltage (U1+U2), and can be in three different With a speed of under voltage. At the time of manufacture, stator windings (6), (6a) turns taking the same value; When the two stator Winding (6), (6a) Series (P K and H connected or associated with Q), it would be a turn numerical. When the motor alone Independence use stator windings (6), used alone or stator windings (6a), or to compare the two sets of stator windings (6), (6a) Series Even when used together, then at the same voltage, because of the three different winding turns, each packet was turn lane Voltage is not the same, according to the formula : "disk e =BLV", we can see that there will be three motor speed. This Similarly, it enables the two sets of stator windings (6), (6a) of the motor, available in three different voltage with a Speed. 3, the utility model as the principle DC transformer Motors and generators from the above principle when the stator windings can be drawn : (6) links Ruzhi Chokes, embedded groove (22) on the inside of Hemming interaction with the rotor magnetic field, will enable rotor rotation; In turn, turn Son turning Unipolar also rotating magnetic field, Unipolar embedded magnetic fields cutting groove (22), while the thread, the thread while Have potential. For the introduction of two windings (6), (6a) of the motor, and when the motor windings of a (6) then DC electrical power as empty running, the stator windings (6) Current driven rotor rotation; And the rotor Unipolar cutting the stator windings magnetic fields (6a) in the stator windings (6a), which is embedded in groove (22), the line Hemming Producing potential; Stator windings (6) and the stator windings (6a), the potential size of the circle by their respective total Series Few decisions. This change in the stator windings at the time of manufacture (6a) turn results in the stator windings (6a) obtained With the potential voltage, which aims to achieve a DC transformers. Only a stator winding winding and winding one or more intermediate tap on the leads, can be put into practice DC current transformers. The principle and we have two sets of windings (6) (6a), the DC motor lock the same principle. The practical advantages : no change to a new type of device to achieve high output, the voltage waveform Direct, simple structure, and save materials, high efficiency, low cost and easy maintenance. The two coaxial connecting utility model, No level of DC voltage regulation. [19] The People's Republic of China Patent Office [12] The application of a new patent application brochure [21] Application No. 88205221.7 [43] Notice Day April 19, 1989 [22] 88.5.6 application. [71] days Wang Wei applicants Address agricultural mechanization school in Xinxiang City of Henan Province Wong Tin-chi joint applicants [72] Wang Wei Wong Tin-chi designer [54] no name for the application of a new single-pole motor device [57] Summary This involves the application of a new-types of power generation and distribution equipment for device -- no single pole motor, it By Shell, Cover, stator core, Rotors, stator winding, rotor and other components, rotor magnet to the middle or Magnet, a polar ends of the show, the shell is part of magnetic and non-magnetic parts from the interval, was sawing Also combines diplomatic profile, - side of the magnetic Cover to Cover, Cover shaft in the middle of magnets and magnetic. Core cavity in the rotor on the stator core has to Unipolar. The practical advantages of the new maintenance is not used : For the device will be issued directly to the voltage waveform, the manufacturing process is simple and low cost, high efficiency. Book claims 1, no change to a single-pole motor installed by Shell, Cover, stator core and stator around Group; Rotors, rotor, its characteristic : But a shaft from the preceding (1), middle magnet (4), after paragraph (7), of which pieces of magnetic (4), a polar ends of the show; B, the middle rotor magnets (4) installed by the end of the magnetic properties of magnetic materials produced Cover (12) Axial hole and the other end in Rotors (9) of the hole (2); C, Shell (11) from the magnetic part (24) and non-magnetic parts (23) phase partitioning, Cross-profile moments was the formation, stator core (10) in the shell (11) magnetic part of the medial (24) ; D, in the stator core (10) and Shell (11) part of the non-magnetic material (23) in the anterior surface A separate groove (22), (21). 2, as described in the request without rights to the device for single-pole motor, the rotor is characterized Middle magnetic pieces (4) magnet. 3, as described in the request without rights to the device for single-pole motor, the rotor is characterized Middle magnet (4) is the Ring Coil Winding packet from the electro-magnetic field. 4, according to claim 1 or 2 or 3, no change to the device described in the single-pole motor, characterized in Links to the rotor shaft is a bat, middle magnet. 5, as described in the request without rights to the device for single-pole motor, characterized by lies, in turn Shaft portion (1) side of the magnetic Cover (12) for magnetic materials, the other side of the Cover (8) by the non-magnetic material Liu made. 6, as described in the request without rights to the device for single-pole motor, its characteristics is that the stator Winding (6) is the introduction of two windings (6), (6a), and the stator windings (6), (6a), while embedded thread Core elements stereotyping (10), opening the groove (22), embedded in the side of some non-magnetic material (23), opening the groove (21) Inside. 7, as described in the request without rights to the device for single-pole motor, its characteristics is that the stator Winding (6) is a winding and the stator windings (6), leads to one or more intermediate tap, the stator windings (6) the thread at least turns a circle. 8, no basis for the claim referred to the installation of two single-pole motor, its characteristics is that the shaft Portion (1) the open end of a cylindrical convex breaks magnets (4) the open end of a cylindrical convex make inlay Into the hole, Rotors (9) linked to the ends of the center opened a hole (2), the middle rotor magnet (4), and not after the end of the hole (7) hole in the side load (2), and fixed. Key words : cutting potential runner field magnetic shielding single pole DC transformer without reversing device Generalized Motor "Thermo-electrical" non-magnetic motor "Chemical-electrical" that battery "Savings-Motor" Capacitor "General Motors" that the mechanical energy into electrical energy, which the daily referred to as the Motor "Burning motor" that fuel cells, hydrogen combustion "Electrical light" Solar Cell http://xing-yang.blogbus.com/logs/2006/01/1850750.html --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [216.239.56.131] ([216.239.56.131]:8709 "EHLO mproxy.googlegroups.com") by ams016.ftl.affinity.com with ESMTP id S380326AbWEDTjI; Thu, 4 May 2006 15:39:08 -0400 Received: by mproxy.googlegroups.com with SMTP id m8so3803096cwm for ; Thu, 04 May 2006 12:39:02 -0700 (PDT) Received: by 10.11.28.34 with SMTP id b34mr75863cwb; Thu, 04 May 2006 12:37:32 -0700 (PDT) Received: by 10.11.86.25 with SMTP id j25gr577cwb; Thu, 04 May 2006 12:37:25 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.11.115.75 with SMTP id n75mr384906cwc; Thu, 04 May 2006 12:37:24 -0700 (PDT) Received: from ams006.ftl.affinity.com (lvs00-fl-n06.valueweb.net [216.219.253.152]) by mx.googlegroups.com with ESMTP id v11si740439cwb.2006.05.04.12.37.23; Thu, 04 May 2006 12:37:24 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.152 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [68.160.5.55] ([68.160.5.55]:51983 "EHLO nikola.tscm.com") by ams006.ftl.affinity.com with ESMTP id S484065AbWEDThW (ORCPT ); Thu, 4 May 2006 15:37:22 -0400 Message-Id: <6.2.3.4.2.20060504152808.0d1e6990@pop.tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.3.4 Date: Thu, 04 May 2006 15:30:03 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] Man charged in bogus CIA scam Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.al.com/news/mobileregister/index.ssf?/base/news/114664788373810.xml&coll=3 Man charged in bogus CIA scam Wednesday, May 03, 2006 By BRENDAN KIRBY Staff Reporter A Baldwin County man arrested on federal charges of posing as a CIA agent pleaded innocent Tuesday in Mobile. A federal grand jury last week indicted Robert Chance White, 26, on charges of impersonating a CIA agent, wrongful use of a government seal and transportation of a person in unlawful interstate commerce. FBI agents and Baldwin County sheriff's deputies arrested White about 10 p.m. Monday at his parent's home in Stockton, a community south of Bay Minette. According to the indictment, White tricked Sondra Maniatis of Mobile into giving him $39,000. Part of the money was purportedly for a special investment opportunity open only to CIA agents, authorities said. The rest was supposed to be a temporary payment to secure a scholarship at the American University of Paris for Maniatis' daughter, who was not named in the indictment. Assistant U.S. Attorney Maria Murphy said law enforcement investigators have cases involving the impersonation of government agents from time to time, although, she added, White is accused of defrauding his victim of a relatively high amount of money. "This one is unusual because of the amount of fraud alleged," she said. Lt. John Murphy, a spokesman with the Baldwin County Sheriff's Office, said investigators were preparing separate state charges against White stemming from the joint probe with the FBI. He said deputies charged White with possession of a forged instrument. White allegedly convinced a Bay Minette auto dealer in summer 2005 to accept a personal check for a vehicle by presenting a salesman with a phony document representing the defendant as a government officer. Murphy said White's bank account did not contain enough money to cover the check. Mobile lawyer Richard Horne, who is representing White at least temporarily, declined to comment after Tuesday's brief hearing. "I didn't know anything about these charges until about 9 o'clock this morning," Horne said. U.S. Magistrate Judge Sonja Bivins ordered White jailed until a detention hearing is held Friday. Prosecutors have asked the judge to keep White in jail until trial on the grounds that he's a risk to flee. The FBI said White tried to hide from law enforcement officers who arrested him Monday. Horne said he would oppose the move. "He's not a flight risk. He's not a danger to the community," Horne said of his client. Authorities said White, despite being married with one child and another on the way, told Maniatis' daughter that he would marry her. He also allegedly promised to get Maniatis a job in Paris as a CIA linguist. A trip the three took to Paris forms the basis of the interstate transportation charge, authorities said. The indictment describes an elaborately cultivated identity as a spy that White allegedly maintained from Jan. 1, 2005, until March of this year. Authorities said White went so far as to arrange a meeting at a Mobile coffee shop between Maniatis and a woman posing as a CIA recruiter. White used part of the money Maniatis paid him to fly her, her daughter and himself to Paris in February to search for apartments, authorities said. He also allegedly convinced Maniatis to give him frequent flyer miles for a plane ticket to Romania. The wrongful use of a government seal charge relates to allegations that White gave Maniatis and her daughter documentation with the CIA seal and a phony signature of CIA Director Porter Goss, according to authorities. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [216.239.56.131] ([216.239.56.131]:45114 "EHLO mproxy.googlegroups.com") by ams020.ftl.affinity.com with ESMTP id S691208AbWD1PZE; Fri, 28 Apr 2006 11:25:04 -0400 Received: by mproxy.googlegroups.com with SMTP id h27so15051483cwb for ; Fri, 28 Apr 2006 08:25:01 -0700 (PDT) Received: by 10.11.53.59 with SMTP id b59mr102286cwa; Fri, 28 Apr 2006 08:23:22 -0700 (PDT) Received: by 10.11.126.51 with SMTP id y51gr554cwc; Fri, 28 Apr 2006 08:23:14 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.11.88.14 with SMTP id l14mr2354765cwb; Fri, 28 Apr 2006 08:23:10 -0700 (PDT) Received: from ams002.useripd.ftl.affinity.com (lvs00-fl-n02.valueweb.net [216.219.253.98]) by mx.googlegroups.com with ESMTP id v23si2987621cwb.2006.04.28.08.23.09; Fri, 28 Apr 2006 08:23:10 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.98 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [151.199.41.22] ([151.199.41.22]:26125 "EHLO nikola.tscm.com") by ams002.ftl.affinity.com with ESMTP id S374128AbWD1PXJ (ORCPT ); Fri, 28 Apr 2006 11:23:09 -0400 Message-Id: <6.2.3.4.2.20060428111808.0f771c00@pop.tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.3.4 Date: Fri, 28 Apr 2006 11:21:13 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] Marine Respect in Photos Mime-Version: 1.0 Content-Type: multipart/related; boundary="=====================_115988046==.REL" Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,
These are separate, but related pictures...

Here are two pictures that were awarded first and second place at the picture of the year international this year.

Very very touching photos.


[]  


First Place
Todd Heisler The Rocky Mountain News
When 2nd Lt. James Cathey's body arrived at the Reno Airport, Marines climbed into the cargo hold of the plane and draped the flag over his casket as passengers watched the family gather on the tarmac. During the arrival of another Marine's casket last year at Denver International Airport, Major Steve Beck described the scene as one of the most powerful in the process: "See the people in the windows? They'll sit right there in the plane, watching those Marines. You gotta wonder what's going through their minds, knowing that they're on the plane that brought him home," he said. "They're going to remember being on that plane for the rest of their lives. They're going to remember bringing that Marine home. And they should."



----------------------------------------------------------------------



[]  


Second Place

Todd Heisler The Rocky Mountain News
The night before the burial of her husband's body, Katherine Cathey refused to leave the casket, asking to sleep next to his body for the last time. The Marines made a bed for her, tucking in the sheets below the flag. Before she fell asleep, she opened her laptop computer and played songs that reminded her of 'Cat,' and one of the Marines asked if she wanted them to continue standing watch as she slept. "I think it would be kind of nice if you kept doing it," she said. "I think that's what he would have wanted."



PLEASE KEEP THIS GOING!











----------------------------------------------------------------------------------------------------
We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers.
----------------------------------------------------------------------------------------------------
 James M. Atkinson                                Phone:  (978) 381-9111
 Granite Island Group                     Fax:     
 127 Eastern Avenue #291                           Web:    http://www.tscm.com/
 Gloucester, MA 01931-8008               Email:  mailto:jmatk@tscm.com
----------------------------------------------------------------------------------------------------
  World Class, Professional, Ethical, and Competent Bug Sweeps, and
Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
----------------------------------------------------------------------------------------------------

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group.
To post to this group, send email to TSCM-L2006@googlegroups.com
To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com
For more options, visit this group at http://groups.google.com/group/TSCM-L2006
-~----------~----~----~----~------~----~------~--~---

Embedded Content: Marine Respect in Photos2.jpg: 00000001,5cd38f1c,00000000,00000000 Embedded Content: Marine Respect in Photos11.jpg: 00000001,5cd38f1d,00000000,00000000Received: from [64.233.184.215] ([64.233.184.215]:27884 "EHLO wr-out-0304.google.com") by ams014.ftl.affinity.com with ESMTP id S610743AbWE0QNw; Sat, 27 May 2006 12:13:52 -0400 Received: by wr-out-0304.google.com with SMTP id 32so1337596wra for ; Sat, 27 May 2006 09:13:51 -0700 (PDT) Received: by 10.11.113.21 with SMTP id l21mr94257cwc; Sat, 27 May 2006 09:12:13 -0700 (PDT) Received: by 10.11.86.25 with SMTP id j25gr619cwb; Sat, 27 May 2006 09:12:08 -0700 (PDT) X-Sender: agrudko@icon.co.za X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.54.131.17 with SMTP id e17mr38327wrd; Sat, 27 May 2006 09:12:07 -0700 (PDT) Received: from ctb-mesg2.saix.net (ctb-mesg2.saix.net [196.25.240.82]) by mx.googlegroups.com with ESMTP id v11si506914cwb.2006.05.27.09.12.04; Sat, 27 May 2006 09:12:07 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 196.25.240.82 is neither permitted nor denied by best guess record for domain of agrudko@icon.co.za) Received: from NewCompaq (dsl-145-205-53.telkomadsl.co.za [165.145.205.53]) by ctb-mesg2.saix.net (Postfix) with SMTP id 3B4981989 for ; Sat, 27 May 2006 18:12:02 +0200 (SAST) Message-ID: <001701c681a8$4c793ae0$0d00000a@NewCompaq> From: "A Grudko" To: References: <6.2.3.4.2.20060515214449.08428c60@pop.tscm.com> Subject: [TSCM-L] Mugabe proposes eavesdropping law Date: Sat, 27 May 2006 18:11:55 +0200 Mime-Version: 1.0 Content-Type: multipart/related; boundary="----=_NextPart_000_000F_01C681B9.09ACCBD0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2600.0000 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

 
 
Mugabe proposes eavesdropping law
http://www.mg.co.za/articlepage.aspx?area=/breaking_news/breaking_news__africa/&articleid=272909&referrer=mgnewsflash
Harare, Zimbabwe
27 May 2006 01:26
Zimbabwe's government has published a Bill that, if passed by Parliament, would enable state agents to eavesdrop on private conversations and monitor faxes and e-mails, a state daily reported on Saturday.

"The government has gazetted the Interception of Communications Bill 2006, that seeks to establish a communication centre to intercept and monitor certain communications in the course of their transmission, through a telecommunication, postal or any other related service system," The Herald said.

The Bill, a copy of which has been circulating among the media and rights groups, was published in the Government Gazette late on Friday.

The gazette is the last stop for draft laws before reaching Parliament, where President Robert Mugabe's ruling Zimbabwe African National Union-Patriotic Front (Zanu-PF) enjoys a majority.

Under the proposed law, telecommunication service providers will be compelled to install devices to enable interception of phone conversations, faxes and e-mails.

The draft law allows the Minister of Transport and Communications to issue an interception warrant to state agents "where there are reasonable grounds for the minister to believe, among other things, that a serious offence has been, is being or
will probably be committed or that there is a threat to safety or national security".

Rights groups have slammed the proposed law as further tightening President Robert Mugabe's iron grip on the media and communications.

Zimbabwe passed a tough media law early 2002 which has been invoked to expel foreign correspondents, shut down four independent newspapers -- including a popular daily renowned for its anti-government stance -- and emasculating a once-vibrant independent press.

The country's broadcasting laws have been used to maintain the monopoly of state broadcasters, while independent media have circumvented the laws by operating pirate radio stations from abroad. - Sapa-AFP
 
Andy Grudko (British),  DPM, Grad IS (South Africa)
Consulting Investigator, Est. 1981. PSIRA reg. No. 8642
www.grudko.com , andy@grudko.com
(+27 12) 244 0255 - 244 0256 (Fax)
Cellular (+27) 82 778 6355 - Skype AndyGrudko
SACI(Pres) SASA, IPA, WAD, CALI, IWWA.
"When you need it done right - first time"
 

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group.
To post to this group, send email to TSCM-L2006@googlegroups.com
To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com
For more options, visit this group at http://groups.google.com/group/TSCM-L2006
-~----------~----~----~----~------~----~------~--~---

Embedded Content: transpix6.gif: 00000001,00000001,00000000,0e70ef01X-Persona: Received: from [64.233.162.221] ([64.233.162.221]:30115 "EHLO nz-out-0304.google.com") by ams008.ftl.affinity.com with ESMTP id S363155AbWJKTmP; Wed, 11 Oct 2006 15:42:15 -0400 Received: by nz-out-0304.google.com with SMTP id q60so5281531nzb for ; Wed, 11 Oct 2006 12:42:01 -0700 (PDT) Received: by 10.35.106.1 with SMTP id i1mr1072096pym; Wed, 11 Oct 2006 10:50:14 -0700 (PDT) Received: by 10.11.40.13 with SMTP id n13gr937cwn; Wed, 11 Oct 2006 10:50:00 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.50.5 with SMTP id c5mr1272433pyk; Wed, 11 Oct 2006 10:49:59 -0700 (PDT) Received: from lvs00-fl-n11.ftl.affinity.com (lvs00-fl-n11.ftl.affinity.com [216.219.253.186]) by mx.google.com with ESMTP id c20si103124pyc.2006.10.11.10.49.59; Wed, 11 Oct 2006 10:49:59 -0700 (PDT) Received-SPF: neutral (google.com: 216.219.253.186 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [68.239.60.109] ([68.239.60.109]:2247 "EHLO Raphael.tscm.com") by ams011.ftl.affinity.com with ESMTP id S361067AbWJKRty (ORCPT ); Wed, 11 Oct 2006 13:49:54 -0400 Message-Id: <7.0.1.0.2.20061011134133.0415d930@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Wed, 11 Oct 2006 13:47:17 -0400 To: TSCM-L2006@googlegroups.com From: "James M. Atkinson" Subject: [TSCM-L] Naked prosecutor caught on camera Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.cnn.com/2006/LAW/10/11/prosecutor.indecency.ap/index.html HAMILTON, Ohio (AP) -- A city prosecutor was charged with indecency after a security camera caught him walking around naked in a government building after business hours. Scott Blauvelt, 35, was arrested Monday and charged with two counts of indecency. He was released from jail to await a hearing in the court where he usually works. A guard monitoring a security camera spotted a nude man -- whom investigators identified as Blauvelt -- in a building that houses county offices the night of October 5, sheriff's Maj. Anthony Dwyer said. The night before, security video had captured Blauvelt naked in another area of the building, where city offices are located, Dwyer said. Dwyer said investigators don't know why Blauvelt, who was alone, wasn't wearing clothes. He faces a month in jail and a $250 fine if convicted. Blauvelt's lawyer, Michael Gmoser, said in a statement Tuesday that his client was seriously injured in a 2005 car accident, suffers from mental illness and is on medication for seizures. "Scott Blauvelt is an American with a disability," he said. --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- X-Persona: Received: from [64.233.162.218] ([64.233.162.218]:64750 "EHLO nz-out-0304.google.com") by ams029.ftl.affinity.com with ESMTP id S413298AbWJNDBw; Fri, 13 Oct 2006 23:01:52 -0400 Received: by nz-out-0304.google.com with SMTP id h28so4438217nzf for ; Fri, 13 Oct 2006 20:01:51 -0700 (PDT) Received: by 10.36.140.2 with SMTP id n2mr107719nzd; Fri, 13 Oct 2006 20:01:27 -0700 (PDT) Received: by 10.11.84.22 with SMTP id h22gr966cwb; Fri, 13 Oct 2006 20:01:16 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.106.15 with SMTP id i15mr86296pym; Fri, 13 Oct 2006 20:01:16 -0700 (PDT) Received: from lvs00-fl-n03.ftl.affinity.com (lvs00-fl-n03.ftl.affinity.com [216.219.253.136]) by mx.google.com with ESMTP id c20si507605pyc.2006.10.13.20.01.16; Fri, 13 Oct 2006 20:01:16 -0700 (PDT) Received-SPF: neutral (google.com: 216.219.253.136 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [70.19.170.202] ([70.19.170.202]:32516 "EHLO Raphael.tscm.com") by ams003.ftl.affinity.com with ESMTP id S375395AbWJNDBP (ORCPT ); Fri, 13 Oct 2006 23:01:15 -0400 Message-Id: <7.0.1.0.2.20061012185534.034649d8@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Thu, 12 Oct 2006 18:57:54 -0400 To: TSCM-L2006@googlegroups.com From: "James M. Atkinson" Subject: [TSCM-L] Nomination for the Darwin Award... at least he had a plan Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.cnn.com/2006/LAW/10/12/robber.retirement.ap/index.html COLUMBUS, Ohio (AP) -- A man who couldn't find steady work came up with a plan to make it through the next few years until he could collect Social Security: He robbed a bank, then handed the money to a guard and waited for police. On Wednesday, Timothy J. Bowers told a judge a three-year prison sentence would suit him, and the judge obliged. "At my age, the jobs available to me are minimum-wage jobs. There is age discrimination out there," Bowers, who turns 63 in a few weeks, told Judge Angela White. The judge told him: "It's unfortunate you feel this is the only way to deal with the situation." Bowers said he had been able to find only odd jobs after the drug wholesaler he made deliveries for closed in 2003. He walked to a bank and handed a teller a note demanding cash in an envelope. The teller gave him four $20 bills and pushed a silent alarm. Bowers handed the money to a security guard standing in the lobby and told him it was his day to be a hero. He pleaded guilty to robbery, and a court-ordered psychological exam found him competent. "It's a pretty sad story when someone feels that's their only alternative," said defense attorney Jeremy W. Dodgion, who described Bowers as "a charming old man." Prosecutors had considered arguing against putting Bowers in prison at taxpayer expense, but they worried he would do something more reckless to be put behind bars. "It's not the financial plan I would choose, but it's a financial plan," prosecutor Dan Cable said. --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [216.239.56.131] ([216.239.56.131]:51847 "EHLO mproxy.googlegroups.com") by ams013.ftl.affinity.com with ESMTP id S684180AbWDZSly; Wed, 26 Apr 2006 14:41:54 -0400 Received: by mproxy.googlegroups.com with SMTP id s54so10680654cwc for ; Wed, 26 Apr 2006 11:41:52 -0700 (PDT) Received: by 10.11.53.25 with SMTP id b25mr53715cwa; Wed, 26 Apr 2006 11:33:23 -0700 (PDT) Received: by 10.11.126.51 with SMTP id y51gr547cwc; Wed, 26 Apr 2006 11:33:12 -0700 (PDT) X-Sender: reginald_curtis@hotmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.11.88.14 with SMTP id l14mr1524963cwb; Wed, 26 Apr 2006 11:33:11 -0700 (PDT) Received: from 69.195.215.39 by g10g2000cwb.googlegroups.com with HTTP; Wed, 26 Apr 2006 18:33:11 +0000 (UTC) From: reginald_curtis@hotmail.com To: "TSCM-L Professionals List" Subject: [TSCM-L] OFF TOPIC - Cellphone position locators Date: Wed, 26 Apr 2006 11:33:11 -0700 Message-ID: <1146076391.399195.86860@g10g2000cwb.googlegroups.com> User-Agent: G2/0.2 X-HTTP-UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322),gzip(gfe),gzip(gfe) Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Found this in the April 20/06 edition of one of Toronto's newspapers, i.e., the National Post. "Pilot project to pinpoint 911 calls by cellphone Safety problem worsened by users' sense of security by Carly Weeks A Toronto pilot project aims to fix a cellphone safety gap: Emergency dispatchers have no way of knowing 911 callers' exact location. When a person calls 911 in most of Canada, the dispatcher receives the phone number as well as the location of the nearest cellphone tower. But the closest tower could be several kilometres away. 'It could be five to 10 kilometres in diameter,' Telus spokesman Jim Johannsson said. 'A lot of people can live in a residential area that size.' In the project, already underway, Bell Canada uses assisted global positioning technology that lets emergency dispatchers pinpoint the location of 911 callers between 50 to 150 metres. About half of all 911 calls come from cellphones, according to the Canadian Wireless Telecommunications Association. 'It's stressful for the caller and it's stressful for the call-taker,' said Judy Broomfield, 911 co-ordinator for the Toronto Police Service. 'People assume they know where they are. We do not.' If the caller can't speak or doesn't know exactly where he or she is, sending help can be challenging. Despite these problems, slick marketing campaigns have convinced most consumers that their cellphones are a catch-all security device, Ms. Broomfield said. 'There's a lot of very successful marketing done by the wireless carriers to talk about what a great safety device a cellphone can be in an emergency, which is true in some cases but there are situations where its a real struggle,' Ms. Broomfield said. Emergency response workers say one of the problems is there are no regulations or deadlines requiring companies to address the safety gaps in 911 service. 'There's no other incentive for the wireless carriers to do this if they don't want to,' says Ms. Broomfield, who is also co-chairwoman of a national working group focusing on enhanced 911 service. Mr. Johannsson said it will be at least a year before Telus can introduce improved 911 technology that will give a caller's location to an emergency dispatcher. CanWest News' Service" The End Reg Curtis - VE9RWC --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [216.239.56.131] ([216.239.56.131]:47637 "EHLO mproxy.googlegroups.com") by ams031.ftl.affinity.com with ESMTP id S489962AbWD1N1i; Fri, 28 Apr 2006 09:27:38 -0400 Received: by mproxy.googlegroups.com with SMTP id s51so12336257cwc for ; Fri, 28 Apr 2006 06:27:37 -0700 (PDT) Received: by 10.11.11.30 with SMTP id 30mr103168cwk; Fri, 28 Apr 2006 06:26:07 -0700 (PDT) Received: by 10.11.79.5 with SMTP id c5gr553cwb; Fri, 28 Apr 2006 06:25:55 -0700 (PDT) X-Sender: reginald_curtis@hotmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.11.115.75 with SMTP id n75mr1591879cwc; Wed, 26 Apr 2006 11:10:31 -0700 (PDT) Received: from 69.195.215.39 by y43g2000cwc.googlegroups.com with HTTP; Wed, 26 Apr 2006 18:10:31 +0000 (UTC) From: reginald_curtis@hotmail.com To: "TSCM-L Professionals List" Subject: [TSCM-L] OFF TOPIC - Clothing for the Paranoid Date: Wed, 26 Apr 2006 11:10:31 -0700 Message-ID: <1146075031.288928.146190@y43g2000cwc.googlegroups.com> User-Agent: G2/0.2 X-HTTP-UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322),gzip(gfe),gzip(gfe) Mime-Version: 1.0 Content-Type: text/plain X-Google-Approved: jmatk@TSCM.com via web at 2006-04-28 13:25:54 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Came across the following in the Feedback column of the April 15/06 edition of the New Scientist magazine. see feedback@newscientist.com "Clothing for the paranoid TINFOIL hats may protect the brain from dangerous radio frequencies and mind-contol rays. Or they may not, according to a group of students from the Massachusetts Institute of Technology, who tested three standard designs with equipment costing $250,000. They found the foil actually amplified some radio signals - especially those on frequencies used by the US government - by a factor of up to 100. In summing up, they say: 'It requires no stretch of the imagination to conclude that the current helmet craze is likely to have been propagated by the government, possibly with the involvement of the FCC [Federal Communications Commission]. We hope this report will encourage the paranoid community to develop improved helmet designs to avoid falling prey to these shortcomings.' (http://people.csail.mit.edu/rahimi/helmet/) Of course the real problem with the classic tinfoil hat is that wearing one makes you look like a nut. Now Less EMF, a company in Albany, New York, allows you to play safe with more style. It makes a line of clothing woven from thread with a core of copper-silver wire that provides electromagnetic shielding (www.lessemf.com/personal.html). With a baseball-style cap woven from the fabric, you can 'provide your brain a quiet place without interference to your mental process from RF radiation', the company's website says. At $29.95, it costs much more than a roll of aluminium foil, but wins hands down for style. For protection at work you can buy a shirt woven from metal-core thread for $89.95. If you budget is tight, Less EMF also offers shielded undergarments - best worn over standard cotton ones to keep the conductive fabric from touching your skin. A camisole is $38, boxer shorts and T-shirts are $64. And for a worry-free night's sleep, you can shield yourself and your bed with a $499.95 canopy woven from silver/nylon thread. It all sounds very reassuring. Just one word of advice to Less EMF coustomers: leave your metal clothing at home if you're planning a plane journey. It could play havoc with the airport security scanners." The End Reg Curtis - VE9RWC --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [64.233.166.168] ([64.233.166.168]:17507 "EHLO py-out-1314.google.com") by ams007.ftl.affinity.com with ESMTP id S1396187AbWFGBm1; Tue, 6 Jun 2006 21:42:27 -0400 Received: by py-out-1314.google.com with SMTP id b30so605526pyb for ; Tue, 06 Jun 2006 18:42:27 -0700 (PDT) Received: by 10.11.28.34 with SMTP id b34mr417499cwb; Tue, 06 Jun 2006 18:33:15 -0700 (PDT) Received: by 10.11.79.5 with SMTP id c5gr629cwb; Tue, 06 Jun 2006 18:33:10 -0700 (PDT) X-Sender: times@krr.org X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.54.131.20 with SMTP id e20mr168782wrd; Tue, 06 Jun 2006 08:37:20 -0700 (PDT) Received: from dukecmmtar01.coxmail.com (dukecmmtar01.coxmail.com [68.99.120.48]) by mx.googlegroups.com with ESMTP id v23si1858081cwb.2006.06.06.08.37.18; Tue, 06 Jun 2006 08:37:20 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 68.99.120.48 is neither permitted nor denied by best guess record for domain of times@krr.org) Received: from [127.0.0.1] (really [68.98.217.101]) by dukecmmtar01.coxmail.com (InterMail vM.6.01.05.02 201-2131-123-102-20050715) with ESMTP id <20060606153718.BHZV7572.dukecmmtar01.coxmail.com@[127.0.0.1]> for ; Tue, 6 Jun 2006 11:37:18 -0400 Message-ID: <4485A134.3030107@krr.org> Date: Tue, 06 Jun 2006 08:37:24 -0700 From: Times Enemy Organization: Key Rack Research User-Agent: Thunderbird 1.5.0.4 (Windows/20060516) Mime-Version: 1.0 Content-Type: text/plain To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] OFF-TOPIC: DVR Systems X-Google-Approved: jmatk@TSCM.com via web at 2006-06-07 01:33:09 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Greetings. Security Camera Solution Suggestions ... I have a client who has around $4k to spend on a DVR system. They want to back up to DVD, and have 8 day cameras, 2 night cameras and the ability to add more cameras as funds become available. What are some suggestions? If all that you can offer is a brand name, i can take it from there. Thank you in advance! .times enemy --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [64.233.184.218] ([64.233.184.218]:41083 "EHLO wr-out-0304.google.com") by ams007.ftl.affinity.com with ESMTP id S612215AbWE2RP3; Mon, 29 May 2006 13:15:29 -0400 Received: by wr-out-0304.google.com with SMTP id 28so556671wra for ; Mon, 29 May 2006 10:15:29 -0700 (PDT) Received: by 10.11.53.23 with SMTP id b23mr226495cwa; Mon, 29 May 2006 10:13:59 -0700 (PDT) Received: by 10.11.79.5 with SMTP id c5gr620cwb; Mon, 29 May 2006 10:13:45 -0700 (PDT) X-Sender: reginald_curtis@hotmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.11.28.34 with SMTP id b34mr23587cwb; Mon, 29 May 2006 10:13:44 -0700 (PDT) Received: from 69.195.215.39 by j73g2000cwa.googlegroups.com with HTTP; Mon, 29 May 2006 17:13:44 +0000 (UTC) From: reginald_curtis@hotmail.com To: "TSCM-L Professionals List" Subject: [TSCM-L] OFF TOPIC - World Wide Web Date: Mon, 29 May 2006 10:13:44 -0700 Message-ID: <1148922824.727612.6330@j73g2000cwa.googlegroups.com> User-Agent: G2/0.2 X-HTTP-UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322),gzip(gfe),gzip(gfe) Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , I came across this in the May 28, 2006 edition of the New York Times. ................. "EDITORIAL OBSERVER Why the Democratic Ethic of the World Wide Web May Be About to End By Adam Cohen The World Wide Web is the most democratic mass medium there has ever been. Freedom of the press, as the saying goes, belongs only to those who own one. Radio and television are controlled by those rich enough to buy a broadcast license. But anyone with an Internet-connected computer can reach out to a potential audience of billions. This democratic Web did not just happen. Sir Tim Berners-Lee, the British computer scientist who invented the Web in 1989, envisioned a platform on with everyone in the world could communicate on an equal basis. But his vision is being threatened by telecommunications and cable companies, and other Internet service providers, that want to impose a new system of fees that could create a hierarchy of Web sites. Major corporate sites would be able to pay the new fees, while little-guy sites could be shut out. Sir Tim, who keeps a low profile, has begun speaking out in favor of 'net neutrality,' rules requiring that all Web sites remain equal on the Web. Corporations that stand to make billions if they can push tiered pricing through have put together a slick lobbying and marketing campaign. But Sir Tim and other supporters of net neutrality are inspiring growing support from Internet users across the political spectrum who are demanding that Congress preserve the Web in its current form. The Web, which Sir Tim invented as a scientist at CERN, the European nuclear physics institute, is often confused with the Internet. But like e-mail, the Web runs over the system of interconnected computer networks known as the Internet. Sir Tim created the Web in a decentralized way that allowed anyone with a computer to connect to it and begin receiving and sending information. That open architecture is what has allowed for the extraordinary growth of Internet commerce and communication. Pierre Omidyar, a small-time programmer working out of his home office, was able to set up an online auction site that anyone in the world could reach - which become eBay. The blogging phenomenon is possible because individuals can create Web sites with the World Wide Web prefix, www, that can be seen by anyone with Internet access. Last year, the chief executive of what is now AT&T, sent shock waves through cyberspace when he asked why Web sites should be able to 'use my pipes free.' Internet service providers would like to be able to charge Web sites for access to their customers. Web sites that could not pay the new fees would be accessible at a slower speed, or perhaps not be accessible at all. A tiered Internet poses a threat at many levels. Service providers could, for example, shut out Web sites whose politics they dislike. Even if they did not discriminate on the basis of content, access fees would automatically marginalize smaller, poorer Web sites. Consider online video, which depends on the availability of higher-speed connections. Internet users can now watch channels, like BBC World, that are not available on their own cable systems, and they have access to video blogs and Web sites like YouTube.com, where people upload videos of their own creation. Under tiered pricing, Internet users might be able to get videos only from major corporate channels. Sir Tim expects that there are great Internet innovations yet to come, many involving video. He believes that people at the scene of an accident - or a political protests - will one day be able to take pictures with their cellphones that could be pieced together to create a three-dimensional image of what happened. That sort of innovation could be blocked by fees for high-speed connections required to relay video images. The companies fighting net neutrality have been waging a misleading campaign, with the slogan 'hands off the Internet,' that tries to look like a grass-roots effort to protect the Internet in its current form. What they actually favor is stopping the government from protecting the Internet, so they can get their own hands on it. But the other side of the debate has some large corporate backers too, like Google and Microsoft, which could be hit by access fees since they depend on the Internet service providers to put their sites on the Web. It also has support from political groups of all persuasions. The president of the Christian Coalition, which is allied with Moveon.org on this issue, recently asked, 'What if a cable company with a pro-choice board of directors decides that it doesn't like a pro-life organization using its high-speed network to encourage pro-life activities?' Forces favoring a no-fee Web have been gaining strength. One group, Savetheinternet.com, says it has collected more than 700,000 signatures on a petition. Last week, a bipartisan bill favoring net neutrality, sponsored by James Sensenbrenner, a Republican of Wisconsin, and John Conyers Jr., a Democrat of Michigan, won a surprising lopsided vote in the House Judiciary Committee. Sir Tim argues that service providers may be hurting themselves by pushing for tiered pricing. The Internet's extraordinary growth has been fueled by the limitless vistas the Web offers surfers, bloggers and downloaders. Customers who are used to a robust, democratic Web may not pay for one that is restricted to wealty corporate content prividers. 'That's not what we call the Internet at all,' says Sir Tim. "That's what we call cable TV.'" .............................. The End To all the American members of the List, Have a great Memorial Day. Reg Curtis - VE9RWC --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [216.239.56.131] ([216.239.56.131]:61731 "EHLO mproxy.googlegroups.com") by ams028.ftl.affinity.com with ESMTP id S384148AbWEFLFd; Sat, 6 May 2006 07:05:33 -0400 Received: by mproxy.googlegroups.com with SMTP id 12so6592224cwt for ; Sat, 06 May 2006 04:05:33 -0700 (PDT) Received: by 10.11.39.23 with SMTP id m23mr2889cwm; Sat, 06 May 2006 04:04:03 -0700 (PDT) Received: by 10.11.126.51 with SMTP id y51gr579cwc; Sat, 06 May 2006 04:04:01 -0700 (PDT) X-Sender: fernando.martins@iol.pt X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.54.131.7 with SMTP id e7mr7154wrd; Sat, 06 May 2006 04:04:00 -0700 (PDT) Received: from mx4.dc.iol.pt (mx4.dc.iol.pt [193.126.240.144]) by mx.googlegroups.com with ESMTP id v23si31609cwb.2006.05.06.04.03.59; Sat, 06 May 2006 04:04:00 -0700 (PDT) Received-SPF: pass (googlegroups.com: domain of fernando.martins@iol.pt designates 193.126.240.144 as permitted sender) Received: from homecomputer (unknown [193.126.166.2]) by mx4.dc.iol.pt ((Email service for IOL isp (apoioaocliente@iol.pt))) with ESMTP id 93C3D171 for ; Sat, 6 May 2006 11:03:58 +0000 (UTC) Received: from 127.0.0.1 (AVG SMTP 7.1.392 [268.5.5/333]); Sat, 06 May 2006 12:03:48 +0100 Message-ID: <001301c670fc$bff87b00$02a67ec1@homecomputer> From: "Fernando Martins" To: References: <20060505110034.49709.qmail@web34506.mail.mud.yahoo.com> Subject: [TSCM-L] [OT] Utility Security Date: Sat, 6 May 2006 12:03:15 +0100 Mime-Version: 1.0 Content-Type: text/plain X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.2869 X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.2869 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , hi2all I would like to be contacted off the list by who may be familiar with utility security, regarding experience in doing audits, and specially if based in the Sandia Labs RAM-D methodology. Thanks FM --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [216.239.56.131] ([216.239.56.131]:7949 "EHLO mproxy.googlegroups.com") by ams007.ftl.affinity.com with ESMTP id S691473AbWDZV7X; Wed, 26 Apr 2006 17:59:23 -0400 Received: by mproxy.googlegroups.com with SMTP id l23so11176656cwc for ; Wed, 26 Apr 2006 14:59:21 -0700 (PDT) Received: by 10.11.58.10 with SMTP id g10mr253170cwa; Wed, 26 Apr 2006 14:33:32 -0700 (PDT) Received: by 10.11.126.51 with SMTP id y51gr549cwc; Wed, 26 Apr 2006 14:33:23 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.11.115.75 with SMTP id n75mr1667472cwc; Wed, 26 Apr 2006 14:33:23 -0700 (PDT) Received: from ams006.ftl.affinity.com (lvs00-fl-n06.valueweb.net [216.219.253.152]) by mx.googlegroups.com with ESMTP id v11si2205866cwb.2006.04.26.14.33.22; Wed, 26 Apr 2006 14:33:23 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.152 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [129.44.188.174] ([129.44.188.174]:7954 "EHLO nikola.tscm.com") by ams006.ftl.affinity.com with ESMTP id S385224AbWDZVdW (ORCPT ); Wed, 26 Apr 2006 17:33:22 -0400 Message-Id: <6.2.3.4.2.20060426172720.06e8b0c0@pop.tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.3.4 Date: Wed, 26 Apr 2006 17:31:42 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] Outstanding Article by Mark Williams Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.technologyreview.com/read_article.aspx?id=16741&ch=infotech Wednesday, April 26, 2006 The Total Information Awareness Project Lives On Technology behind the Pentagon's controversial data-mining project has been acquired by NSA, and is probably in use. By Mark Williams In April, the Electronic Frontier Foundation (EFF), the advocacy organization for citizens' digital rights, filed evidence to support its class-action lawsuit alleging that telecom giant AT&T gave the National Security Agency (NSA), the ultra-secret U.S. agency that's the world's largest espionage organization, unfettered access to Americans' telephone and Internet communications. The lawsuit is one more episode in the public controversy that erupted in December 2005, when the New York Times revealed that, following September 11, President Bush authorized a far-reaching NSA surveillance program that included warrantless electronic eavesdropping on telephone calls and e-mails of individuals within the United States. Critics charged that the Bush administration had violated both the Constitution's Fourth Amendment, which protects citizens against unwarranted search or seizure, and the Foreign Intelligence Surveillance Act (FISA) of 1978, which requires eavesdropping warrants to be obtained from a special court of judges empowered for that purpose. In February 2006, the controversy intensified. Reports emerged that component technologies of the supposedly defunct Total Information Awareness (TIA) project -- established in 2002 by the Pentagon's Defense Advanced Research Projects Agency (DARPA) to develop advanced information technology to counter terrorists, then terminated by Congress in 2003 because of widespread criticism that it would create "Orwellian" mass surveillance -- had been acquired by the NSA. Washington's lawmakers ostensibly killed the TIA project in Section 8131 of the Department of Defense Appropriations Act for fiscal 2004. But legislators wrote a classified annex to that document which preserved funding for TIA's component technologies, if they were transferred to other government agencies, say sources who have seen the document, according to reports first published in The National Journal. Congress did stipulate that those technologies should only be used for military or foreign intelligence purposes against non-U.S. citizens. Still, while those component projects' names were changed, their funding remained intact, sometimes under the same contracts. Thus, two principal components of the overall TIA project have migrated to the Advanced Research and Development Activity (ARDA), which is housed somewhere among the 60-odd buildings of "Crypto City," as NSA headquarters in Fort Meade, MD, is nicknamed. One of the TIA components that ARDA acquired, the Information Awareness Prototype System, was the core architecture that would have integrated all the information extraction, analysis, and dissemination tools developed under TIA. According to The National Journal, it was renamed "Basketball." The other, Genoa II, used information technologies to help analysts and decision makers anticipate and pre-empt terrorist attacks. It was renamed "Topsail." Has the NSA been employing those TIA technologies in its surveillance within the United States? And what exactly is the agency doing, anyway? The hearings that the Senate Judiciary Committee convened in February to consider the NSA's surveillance gave some clues. Attorney General Alberto Gonzales, maintaining the administration's defense against charges that it violated the Fourth Amendment and FISA, told senators, firstly, that Article II of the U.S. Constitution granted a president authority to conduct such monitoring and, secondly, that the Authorization to Use Military Force (AUMF) passed after September 11 specified that the president could "use all necessary and appropriate force" to prevent future terrorist acts. Regarding FISA, Gonzalez claimed, the NSA had sidestepped its requirements to obtain warrants for electronic eavesdropping in particular cases. But, overall, the attorney general said, FISA worked well and the authorities had used it increasingly. The available facts support Gonzalez's contention: while the FISA court issued about 500 warrants per year from 1979 through 1995, in 2004 (the last year for which public records exist) 1,758 warrants were issued. But when senators asked why, given the fact that FISA had provisions by which government agents could wiretap first and seek warrants later, the Bush administration had sidestepped its requirements at all, Gonzalez claimed he couldn't elaborate for reasons of national security. Former NASA director General Michael Hayden, in charge when the NSA's surveillance program was initiated in 2002, was slightly more forthcoming. FISA wasn't applicable in certain cases, he told the senators, because the NSA's surveillance relied on what he called a "subtly softer trigger" before full-scale eavesdropping began. Hayden, who is nowadays the nation's second-highest ranking intelligence official, as deputy director of national intelligence, said he could answer further questions only in closed session. Gonzalez's testimony that the government is making increased use of FISA, together with his refusal to explain why it's inapplicable in some cases -- even though retroactive warrants can be issued -- implies that the issue isn't simply that government agents may sometimes want to act quickly. FISA rules demand that old-fashioned "probable cause" be shown before the FISA court issues warrants for electronic surveillance of a specific individual. Probable cause would be inapplicable if NSA were engaged in the automated analysis and data mining of telephone and e-mail communications in order to target possible terrorism suspects. As the Electronic Frontier Foundation's lawsuit against AT&T reveals, NSA has access to the switches and records of most or all of the nation's leading telecommunications companies. These companies' resources are extensive: AT&T's data center in Kansas, for instance, contains electronic records of 1.92 trillion telephone calls over several decades. Moreover, the majority of international telecommunications nowadays no longer travel by satellite, but by undersea fiber-optic cables, so many carriers route international calls through their domestic U.S. switches. With the telecom companies' compliance, the NSA can today tap into those international communications far more easily than in the past, and in real time (or close to it). With access to much of the world's telecom traffic, the NSA's supercomputers can digitally vacuum up every call placed on a network and apply an arsenal of data-mining tools. Traffic analysis, together with social network theory, can reveal patterns indiscernible to human analysts, possibly suggesting terrorist activity. Content filtering, applying highly sophisticated search algorithms and powerful statistical methods like Bayesian analysis in tandem with machine learning, can search for particular words or language combinations that may indicate terrorist communications. Whether the specific technologies developed under TIA and acquired by ARDA have actually been used in the NSA's domestic surveillance programs -- rather than only for intelligence gathering overseas -- has not been proved. Still, descriptions of the two former TIA programs that became Topsail and Basketball mirror descriptions of ARDA and NSA technologies for analyzing vast streams of telephone and e-mail communications. Furthermore, one project manager active in the TIA program before it was terminated has gone on record to the effect that, while TIA was still funded, its researchers communicated regularly and maintained "good coordination" with their ARDA counterparts. It's this latter fact that is most to the point. Whether or not those specific TIA technologies were deployed for domestic U.S. surveillance, technologies very much like them were. In 2002, for instance, ARDA awarded $64 million in research contracts for a new program called Novel Intelligence from Massive Data. Furthermore, overall, a 2004 survey by the U.S. General Accounting Office, an investigative arm of Congress, found federal agencies operating or developing 199 data mining projects, with more than 120 programs designed to collect and analyze large amounts of personal data on individuals to predict their behavior. Since the accounting office excluded most of the classified projects, the actual numbers would likely have been far higher. Beyond these programs, additionally, there exist all the data-mining applications currently employed in the private sector for purposes like detecting credit card fraud or predicting health risks for insurance. All the information thus generated goes into databases that, given sufficient government motivation or merely the normal momentum of future history, may sooner or later be accessible to the authorities. How should data-mining technologies like TIA be regulated in a democracy? It makes little sense to insist on rigid interpretations of FISA. This isn't only because when the law was passed by Congress 30 years ago, terrorist threats on al Qaeda's scale did not yet exist and technological developments hadn't gone so far in potentially giving unprecedented destructive power to small groups and even individuals. Today's changed technological context, additionally, invalidates FISA's basic assumptions. In an essay published next month in the New York University Review of Law and Security, titled "Whispering Wires and Warrantless Wiretaps: Data Mining and Foreign Intelligence Surveillance," K. Taipale, executive director of the Center for Advanced Studies in Science and Technology Policy, points out that in 1978, when FISA was drafted, it made sense to speak exclusively about intercepting a targeted communication, where there were usually two known ends and a dedicated communication channel that could be wiretapped. With today's networks, however, data and increasingly voice communications are broken into discrete packets. Intercepting such communications requires that filters be deployed at various communication nodes to scan all passing traffic with the hope of finding and extracting the packets of interest and reassembling them. Thus, even targeting a specific message from a known sender today generally requires scanning and filtering the entire communication flow in which it's embedded. Given that situation, FISA is clearly inadequate because, Taipale argues, were it to be "applied strictly according to its terms prior to any 'electronic surveillance' of foreign communication flows passing through the U.S. or where there is a substantial likelihood of intercepting U.S. persons, then no automated monitoring of any kind could occur." Taipale proposes not that FISA should be discarded, but that it should be modified to allow for the electronic surveillance equivalent of a Terry stop -- under U.S. law, the brief "stop and frisk" of a person by a law enforcement officer based on the legal standard of reasonable suspicion. In the context of automated data mining, it would mean that if suspicion turned out to be unjustified, after further monitoring, it would be discontinued. If, on the other hand, continued suspicion was reasonable, then it would continue, and at a certain point be escalated so that human agents would be called in to decide whether a suspicious individual's identity should be determined and a FISA warrant issued. To attempt to maintain FISA and the rest of our current laws about privacy without modifications to address today's changed technological context, Taipale insists, amounts to a kind of absolutism that is ultimately self-defeating. For example, one of the technologies in the original TIA project, the Genisys Privacy Protection program, was intended to enable greater access to data for security reasons while simultaneously protecting individuals' privacy by providing critical data to analysts via anonymized transaction data and by exposing identity only if evidence and appropriate authorization was obtained for further investigation. Ironically, Genisys was the one technology that definitely had its funding terminated and was not continued by another government agency after the public outcry over TIA. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [216.239.56.131] ([216.239.56.131]:48872 "EHLO mproxy.googlegroups.com") by ams030.ftl.affinity.com with ESMTP id S809987AbWD2BYy; Fri, 28 Apr 2006 21:24:54 -0400 Received: by mproxy.googlegroups.com with SMTP id l23so3514334cwc for ; Fri, 28 Apr 2006 18:24:53 -0700 (PDT) Received: by 10.11.28.34 with SMTP id b34mr88866cwb; Fri, 28 Apr 2006 18:23:23 -0700 (PDT) Received: by 10.11.86.25 with SMTP id j25gr560cwb; Fri, 28 Apr 2006 18:23:16 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.11.88.14 with SMTP id l14mr2512387cwb; Fri, 28 Apr 2006 18:23:15 -0700 (PDT) Received: from ams011.ftl.affinity.com (lvs00-fl-n11.valueweb.net [216.219.253.186]) by mx.googlegroups.com with ESMTP id v23si10407cwb.2006.04.28.18.23.14; Fri, 28 Apr 2006 18:23:15 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.186 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [151.199.41.22] ([151.199.41.22]:26380 "EHLO nikola.tscm.com") by ams011.ftl.affinity.com with ESMTP id S575200AbWD2BXO convert rfc822-to-8bit (ORCPT ); Fri, 28 Apr 2006 21:23:14 -0400 Message-Id: <6.2.3.4.2.20060428204729.0c5c9eb0@pop.tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.3.4 Date: Fri, 28 Apr 2006 20:55:27 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] Pellicano Gets Spanked in Vanity Fair Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.vanityfair.com/features/general/articles/060426fege01 Inside Hollywood's Big Wiretap Scandal A SNEAK PEEK FROM THE JUNE ISSUE. It looks as if the wiretapping investigation consuming L.A. may bring down some of the townís top names. From the details of Anthony Pellicanoís electronic ìWar Roomî to the P.I.ís most damaging cases, to the impact of his divorce and his delusions of Godfather grandeur, the authors have a road map to the biggest scandal in Hollywood history By BRYAN BURROUGH and JOHN CONNOLLY Back before everything went wrong, before they discovered the wiretap transcripts and the hand grenades and the plastic explosives in his office, before he spent more than two years in federal prison, before a storm of indictments sent waves of fear cascading through the Southern California entertainment and legal communities, before the investigation into the ham-fisted intimidation of a reporter helped trigger the greatest scandal in Hollywood history, Anthony Pellicano was a family man. Most every night Pellicano, the swaggering 62-year-old "private detective to the stars," the man who handled sensitive jobs for everyone from Michael Jackson and Tom Cruise to onetime Hollywood superagent Michael Ovitz, left his office on the third floor of a Sunset Boulevard high-rise and hopped into his black, two-seat Mercedes. He drove home to suburban Oak Park, where he and his fourth wife, Katherine "Kat" Pellicano, raised their childrenóthree daughters and an autistic son named Luca. Kat was expected to have dinner waiting on the table, complete with dessert. Afterward, she might give Pellicano a massage or have sex with him. For the Pellicanos, a pleasant evening might mean watching The Sopranos or one of the Godfather movies. Mafia rituals fascinated Pellicano, who grew up in Al Capone's hometown of Cicero, Illinois, and once listed the son of a reputed Chicago Mob boss as a creditor. In business, where he crafted a tough-guy persona designed to appeal to a clientele weaned on Jake Gittes and Sam Spade, he was a man who playfully brandished baseball bats, allegedly had a dead fish left on an opponent's windshield, and told clients they were joining his "family"óand no one hurt his family. He named his son after Don Corleone's favored assassin, Luca Brazzi. On occasion Kat felt he took the mafioso shtick a tad far. "There were times when he would make my children kiss his hand like he was the Godfather," she says. "He started to think he was Don Corleone." Her husband could be controlling and temperamental, according to Kat, but for years she put up with his moods, in part because he had no one else. "I was his only confidante," Kat says. "He had no friends to speak of. On the weekends we rarely, and I mean rarely, had any friends over, and they were my friends ó he had none. He just wanted to be with me. It was so bad that for years he would not let me talk on the telephone over the weekend." By 1999, after 15 years of marriage, the Pellicanos were squabbling. That December, Kat encouraged her husband to buy a condominium on Doheny Drive, near his office, telling him to sleep over there when he was working late. A few months afterward, when she threw Pellicano out of the house for good, the detective began living in the condominium full-time. The turmoil in Pellicano's private life, Kat and others speculate, made him sloppy, made him do things he wouldn't ordinarily do. "He was definitely distracted," says Rich DiSabatino, a Beverly Hills private investigator who probably qualifies as Pellicano's closest friend. "He was, in his mind, a family man, and he was losing his family." In fact, the famous incident in which that dead fish was left on the hood of Los Angeles Times reporter Anita Busch's silver Audi came as Pellicano was desperately trying to re-unite with Kat. Two months later, in August 2002, she allowed her husband to come home for a single Sunday, to see if he had really changed. In the old days, Sunday was a time of ritual in their household. Pellicano had his weekly massage promptly at six p.m., during which the children were ordered to remain silent, and afterward he would watch The Sopranos, a rite so solemnly observed "it was like he was going to church," Kat remembers. It took only a few hours for Kat to realize that her husband hadn't changed. He remained prickly and cold. Finally, she says, "my oldest daughter came to me and whispered, 'Say the magic word, Mom, say the magic word.'" The magic word was "asshole," which always caused him to leave the house when Kat called him one. "Eventually, I said that magic word that day, he left, and I have not regretted it since." That same August, Vanity Fair's Ned Zeman, who was investigating one of Pellicano's former clients, actor Steven Seagal, was driving through Laurel Canyon when a dark Mercedes displayed a flashing light in his rearview mirror. When Zeman rolled down his window, the Mercedes pulled up beside him. The passenger rolled down his window and rapped a pistol on the side of his car. Then he pointed it at Zeman. "Stop," he said, and pulled the trigger. The gun wasn't loaded. "Bang," he said. A few weeks later the aging detective's divorce went through, and he lost his family for good. Two months after that the F.B.I. raided his office, and nothing in Hollywood will ever, ever be the same. No scandal in Hollywood history can compare to the Anthony Pellicano wiretapping scandal. Not the Fatty Arbuckle murder trials, of the 1920s, not the killing of Lana Turner's lover Johnny Stompanato, in 1958, not director Roman Polanski's statutory rape of a 13-year-old girl, in 1977, not even the late-1970s Indecent Exposure embezzlement scandal involving producer David Begelman. "People out here, they're talking about this endlessly," says media magnate Barry Diller. "If you're talking to people in L.A. right now, it's the only topic." The details are being uncovered by a federal investigation into the tactics of dozens of Los Angeles attorneys, who in turn represented over the years more than a hundred directors, producers, and movie stars, from Steven Spielberg, Nicole Kidman, and Stevie Wonder to Chris Rock, Kevin Costner, and Demi Moore. History suggests that only a few are likely to be indicted, but until the case concludes, a wide swath of Hollywood's legal and entertainment establishments is living in abject fear. Why? Because every disagreement in Hollywoodóevery divorce, every baby born out of wedlock, every contract dispute, every squabble between studios and talent agenciesóinvolves attorneys, and for the last 20 years when things got nasty, L.A. lawyers turned to Anthony Pellicano, who monitored, investigated, intimidated, and in some cases wiretapped their opponents. After months of anticipation, the tip of this very dirty iceberg finally hove into view in February, when Pellicano and six of his flunkies, including two policemen, were indicted on various charges, including illegally accessing law-enforcement databases. A week later the billionaire financier Kirk Kerkorian's longtime attorney, Terry Christensen, became the first high-profile L.A. lawyer to be indicted, for allegedly paying Pellicano $100,000 to tap the phones of Kerkorian's ex-wife, Lisa Bonder, during the couple's child-custody case. In comments made after these indictments, the U.S. Attorney's Office indicated that more indictments are coming, and, several people close to the investigation say, they won't be limited to attorneys. Clients will be indicted, too. Which is why the story of Pellicano's fall is quickly changing from one man's personal and professional immolation to a broader, far more sordid exposÈ of the tactics that some of Hollywood's storied power brokers have used to stay in power. "There will always be people who'll do the bidding of powerful and wealthy people," observes Gavin DeBecker, the noted security consultant. "I'm more curious about the people who do the hiring than about the guns for hire. The book wasn't called The Luca Brazzi Story, you know. It was called The Godfather." The Pellicano scandal has been simmering since 2002, since that dead fish was thrown on Anita Busch's Audi, along with a red rose and a note bearing the single word "Stop." At the time, Busch was writing about Steven Seagal and Michael Ovitz, both Pellicano clients. By the time Ned Zeman was accosted two months later, an F.B.I. probe of Pellicano was under way. It climaxed with the raids on Pellicano's office that November, in which two hand grenades, a wedge of C-4 plastic explosive, and thousands of pages of wiretap transcripts were found, as well as recordings encrypted on computer discs. An investigation that had initially focused on the intimidation of a journalist quickly grew into a broader probe of electronic eavesdropping. Pellicano was indicted on weapons charges, copped a plea, and in 2003 was given a 30-month sentence in the Taft Correctional Institution, north of Los Angeles, while federal authorities attempted to understand his wiretapping activities. He was poised to emerge from prison in February 2006, when he was indicted again, this time with two former cops and two former employees of Pacific Bell, on 112 charges of wiretapping and of paying the policemen to illegally access law-enforcement databases. Pellicano remains in custody while rumors ricochet that he will begin "ratting out" his clients. Those attorneys who used Pellicano's services and who have cases known to be under federal examination, or who have retained their own attorneys, include some of the best-known lawyers in Southern California: Dennis Wasser, the renowned Beverly Hills divorce attorney whose clients have included Kerkorian, Spielberg, Rod Stewart, and Jennifer Lopez; Martin Singer, who has represented Jim Carrey, Eddie Murphy, Jean-Claude Van Damme, Bruce Willis, and Celine Dion, and whose office number is said to have appeared on Pellicano's speed-dial list; the late Edward Masry, best known for spearheading the class-action lawsuit that inspired the 2000 movie Erin Brockovich; Charles N. Shep≠ard, head of litigation at Greenberg Glusker Fields Claman Machtinger & Kinsella; two attorneys who have represented Pellicano, Victor Sherman and Donald Re; and Daniel G. Davis, a Beverly Hills criminal-defense attorney best known for his work in the late 1980s on the McMartin pre-school child-molestation case. (None of the attorneys or their representatives would comment for this article.) But the "whales" in this investigation, the men whose futures are now being debated every night at the Ivy, Mastro's Steakhouse, and Koi, are three of the most powerful Hollywood figures of the last half-century: Michael S. Ovitz, the onetime head of the CAA talent agency and later the president of Disney, who dominated American film deals for two decades; Brad Grey, the chairman and C.E.O. of the Paramount Motion Picture Group, previously head of the talent-management firm Brillstein-Grey, and an executive producer of The Sopranos; and Bert Fields, the 78-year-old legal legend who has played a hand in almost every significant Hollywood dispute of the last 30 years. None of these three men has been indicted, and all deny any wrongdoing, but Fields has admitted to being a subject of the investigation, and Grey and Ovitz have been questioned. The cases cited in Pellicano's February indictment suggest that all three stand squarely in the U.S. attorney's crosshairs. Pellicano, several sources say, worked for Grey off and on for years while Grey was at Brillstein-Grey. Ovitz was facing the collapse of his post-Disney start-up, Artists Management Group, when, in 2001, he reportedly hired Pellicano to probe several members of what he famously termed, in a Vanity Fair interview, a Hollywood "Gay Mafia" of his enemies, several of whom weren't in fact gay. (Ovitz has denied this, and said he hired Pellicano for other matters.) According to the indictments, Pellicano paid his cops to run background checks on several of these men. But it is Fields who may have the most to fear. According to Kat Pellicano and several of her husband's former employees, Pellicano considered Fields by far his most important client. It was Fields who, according to former Pellicano employees, brought Pellicano into DreamWorks Animation C.E.O. Jeffrey Katzenberg's litigation with Disney's Michael Eisner, Tom Cruise's defense against a gay-porn star's sex allegations, Imagine Entertainment's suit against Mike Myers, and Kevin Costner's struggle with a difficult British fan, to name but a few. "He would speak to Bert just about every day," says DiSabatino, "and if he was working one of his cases, they would talk a few times a day." Until Pellicano's indictment, in fact, Fields was probably his biggest fan, serving up adoring quotes for media profiles of him. "Time after time, Anthony comes up with the witness I'm looking for," Fields told a writer in 1992. "He gets me results, so I stick with him." Kat Pellicano discloses a measure of how tight the two men became. "Six or seven years ago," she says, "Anthony comes home one night and tells me we are going to become Jewish and that Bert Fields has arranged conversion classes for both of us. I said, 'Anthony, with all that Italian and Catholic bullshit of yours and my being an almost atheist from Oklahoma, why the hell do you want us to become Jewish?' He tells me, 'Because Bert thinks it will be good for my business. Most of the lawyers out here are Jews, so it would be a good thing.' I refused to participate, and the idea eventually went away." When Pellicano was arrested, in November 2002, Fields spearheaded an effort to raise money for Pellicano's children. Kat says of her husband, "He left us with nothing. That's why I became a real-estate agent." The president of a major studio, who says he has given testimony before the grand jury, recalls that Fields told him, "Anthony has no money, and he's not going to be able to take care of his kids. A group of us should pitch in and do something for him." "Subsequently, Anthony and I spoke," says the studio president, "[and] he gave me a list of people to call." The list, which numbered 20 to 30 people, was a Who's Who of Hollywood power players, including Ovitz and producer Jerry Bruckheimer. Several of them promised to contribute, but as word of the wiretapping probe spread, all but the studio president and a producer dropped out. When Pellicano heard about this, the studio president says, he responded, "If no one else is putting up the money, then I don't want it." As pressure grows on Pellicano to testify against his former clients, a lot of people may wish they had been more charitable. Detective agencies in America run the gamut from large international outfits such as Wackenhut and Kroll Inc., who handle security and investigations for companies worldwide, all the way down to storefront solo proprietors, typically former policemen. In size, the Pellicano Investigative Agency, which usually employed five or fewer investigators, fell low down the scale, though the publicity Pellicano drew in myriad media profiles made him seem more significant. He commanded a niche business, but that niche was Hollywood, which made him a household name in some very powerful Los Angeles households. Outside L.A., however, the few private investigators who knew of him considered Pellicano a cartoonish character. "Before this, I'd never heard of the guy," the C.E.O. of a top New York agency told me. "No, check that. I read about him in Vanity Fair. Guy seemed like a real nut job." The noted San Francisco P.I. Jack Palladino says of Pellicano, "I never took the guy seriously. The way he bragged openly about wiretaps and baseball bats, I mean, I just thought it wasn't real. I didn't understand that his Hollywood clientele lived in that same film noir world and accepted it as real." In the national investigative community, in fact, there is a sense that Pellicano could have thrived only in L.A. His mock-mafioso act was tailor-made for Hollywood, which expects a private detective to act the way detectives do in the movies, where illegal activities such as tapping telephones and bribing cops are routine. Peers who know him, like Palladino, suspect Pellicano became so wrapped up in his fantasy he lost touch with reality. The irony, they say, is that the background checks he allegedly bribed policemen to run can often now be accessed in publicly available databases. "You have to understand, a lot of what he did was unnecessary," says Palladino. "He was asking for information he could have gotten otherwise. Either he really didn't understand how much is now available or he was just too lazy. I mean, this is not how anyone else in this business does business. It's the way it is in the movies. And, unfortunately, he had this L.A. communityóthey're like politicians, they don't have much to do with regular people. They don't know much about the real world. They don't know much about bounda≠ries or rules. They're rich and spoiled and out of touch. And this was a guy who reflected their reality, which was the reality in films." Wiretapping, though prevalent in films, is almost unheard of today, several leading private detectives say. It was more common in the 1950s and 60sóthe famous San Francisco P.I. Hal Lipset bragged of bugging the olive in a suspect's martinióbut the government scandals of the 1970s led to tightened privacy laws, which can carry heavy penalties for electronic eavesdropping. None of the detectives interviewed for this article could recall a single instance in recent years of a P.I.'s being prosecuted for wiretapping. "Clients always want us to check their phones for taps, but I don't think I've ever come across a flat-out wiretap in all my years in the business," a veteran New York investigator says. "It's just not done anymore." But Pellicano was proudly old-school. He played the part of "Hollywood detective" as if in a movieódouble-breasted suits, patent-leather shoes, opera on the office speakersóand over the years any number of producers, including Brad Grey, Michael Mann, and Jerry Bruckheimer, talked of putting his life on film. Life inside the Pellicano office, however, was less Magnum P.I. than Raging Bull. Pellicano preferred his assistants young and beautiful; his executive vice president, Tarita Virtue, 36, who says she was the only employee allowed into the secret room where his wiretaps were monitored, once posed in lingerie for Maxim. Pellicano mused about arranging a Playboy layout on "The Girls of Pellicano." Yet between their boss's flirtations and his bellicose management style, few stayed long. "I always thought when people left Pellicano they should be entitled to therapy instead of severance," says Denise Ward, a P.I. who toiled six years for Pellicano and dated him as well. "He constantly screams and yells and threatens everyone who works for him. I would ask new employees, 'Are you on Prozac yet?'" Adds another former Pellicano employee, "At one point every one of us in the office was on anti-anxiety and/or anti-depression medicine." But as difficult as he could be, Pellicano got results. Celebrities preoccupied with their images found him the perfect antidote for stalkers, troublesome lovers, and the mothers of accidental children. As the Louisville Slugger he liked to fondle attests, Pellicano had no qualms about using threats and intimidation. The Hollywood Hills are teeming with ex-wives, ex-lovers, journalists, and former business managers who swear Pellicano had them followed, wiretapped, threatened, roughed up, or worse. The most common stories one hears are of people having their homes watched and being followed in their cars by large menóone or two claim to have been driven off the road by them. Pellicano was especially good at identifying an opponent's weak spot and attempting to exploit it. To cite just one example, consider how he dealt with one of Brad Grey's adversaries, a writer-producer named Bo Zenga. Zenga had sued Brillstein-Grey Entertainment, claiming they ignored a verbal producing agreement for 2000's Scary Movie. Pellicano's indictment indicates Zenga was one of the many Hollywood figures he allegedly wiretapped and investigated by paying a local policeman to run an illegal background check. With that information, Zenga believes, Pellicano learned that Zenga and his sister had co-signed a mortgage on his elderly mother's home in New Jersey. At the time, Zenga's mother, who had diabetes, was blind and confined to a wheelchair. "When Pellicano learned that I had that mortgage, he made a pretense call to that number, and my mother answered," Zenga says. "He repeatedly called my mother and would terrify her. He told her that unless her son dropped the lawsuit her daughter would lose her house; she, her daughter, and grandson would be homeless; and he would see to it that her son went to prison. When that didn't work, he tried the goombah bit. He told her that he was the father of nine children and like her always worried about them. He did everything he could to get her to convince me to drop the lawsuit. He continued until the day she died from a stroke. This guy is pure evil." The grandson of Sicilian immigrants, Pellicano was born in 1944. His grandfather Americanized the family name, Pellicano, to Pellican, but Anthony, proud of his roots, restored the name to Pellicano as an adult. A self-described "young tough" on the streets of Cicero, he was kicked out of high school for fighting. He joined the U.S. Army Signal Corps, where he was trained as a cryptographer. After his discharge he took a job with the Spiegel catalogue in Chicago and was placed in collections, where he tracked down delinquent customers. He was good at it. In 1969, at the age of 25, he decided to hang out his shingle as a private investigator. From the beginning, Pellicano had panache. He drove a huge Lincoln Continental, sealed his letters with monogrammed wax, and hung samurai swords in his office. At various times he gave his employees and family members necklaces bearing a small golden horn he said contained a strand of his hair. Much of his early work involved missing persons. A 1978 article claimed that he had found 3,968 of themówhich works out to 440 people a year, more than one a day. Hyperbole was in his blood, however, which made him a magnet for Chicago reporters, who year after year filed into his officeódone in a silver-and-blood-red color schemeóto fill their notebooks with stories. Coverage brought customers, including a celebrity or two; at one point, Yoko Ono hired Pellicano to find her missing daughter, Kyoko. From his earliest days, Pellicano had an obsession with electronic gadgetry. He kept $200,000 worth of it in a back room he called the "bat cave" and claimed to have found dozens of listening devices for clients ranging from housewives to, he said, the government. His first serious publicity, in fact, came in 1973, when he claimed to have found a bug in the phone of an aide to Illinois secretary of state Michael J. Howlett, sparking a mini-Watergate scandal that put Pellicano on the front pages. Pellicano's big break was discovering Mike Todd's body in a pile of leaves in a Chicago cemetery that police detectives had repeatedly searched. The legendary showman and producer had died at the age of 48 in a plane crash in 1958, a year after he had married the 24-year-old Elizabeth Taylor. In 1977 his grave was emptied by looters searching for a diamond ring. Pellicano was able to lead reporters directly to the body, an achievement detectives found suspicious. The resulting plaudits put Pellicano on the map in Hollywood and, in 1983, after a difficult divorce from his second wife, Angie, he made the move to Los Angeles. His rapid rise there was facilitated by his first client, Howard Weitzman, who hired Pellicano when Weitzman was defending auto magnate John DeLorean on cocaine-trafficking charges in 1984. It was Weitzman who introduced him to the world of celebrities, as did Don SimpsonóJerry Bruckheimer's partner. The wild-eyed Simp≠≠≠son, whose vast appetite for drugs and prostitutes remains a legend a decade after his death, found in Pellicano someone who could make his sins go away. (Hence, one of Pellicano's nicknames: the Sin Eater.) He used Pellicano when a former employee sued him for emotional distress, and in quieter cases, including an incident in which a doctor friend overdosed at his Bel Air mansion. "Simpson would often ramble on that 'I'm going to get Pellicano to do this' or 'get Pellicano to do that,'" says one of "Hollywood Madam" Heidi Fleiss's former girls, Alexandra Datig. "At the time, few of us took it seriously." By the early 1990s a number of lawyers were turning to Pellicano to make their celebrity clients' problems disappear. When a British tabloid linked Kevin Costner to a young fan, Pellicano helped get the story killed before it reached the U.S. media. When James Woods was being bothered by Sean Young, Pellicano helped out. When Farrah Fawcett had trouble with a boyfriend, she hired Pellicano. When Roseanne wanted to find a long-lost daughter, Pellicano. When Stevie Wonder needed information about a girlfriend, Pellicano. When O. J. Simpsonóbefore his murder trialóreportedly had a troublesome secretary, Pellicano. "Anthony is one of those people, shall we say, who is a lion at the gate," Don Simpson once said. "He is not a man to be on the wrong side of." Pellicano could be startlingly candid about his methods. On a celebrity's behalf, he found that an effective way to make an inconvenient lover go away was "counter-blackmail." A girl sues an actor for palimony? Pellicano would dig into her past and find somethingóa prostitution arrest, drugs. Men weren't so easy. "If you can't sit down with a person and reason with them," Pellicano told GQ in 1992, "there is only one thing left, and that's fear. Of course, law-enforcement authorities don't want to hear stuff like that, know what I mean? But it happens every day." He was Hollywood's best-kept secret. Until 1993. That was the year Pellicano emerged from the shadows onto the national stage, taking high-profile roles on behalf of movie executive Michael Nathanson, who hired him to show he "never did business Ö on any level" with Heidi Fleiss, and Michael Jackson, for whom he spearheaded the defense against a 13-year-old boy's allegations of child molestation, by digging up embarrassing information about the boy's family. For following and monitoring scores of witnesses and reporters, Pellicano received not only a Mercedes but a $2 million fee, his best payday ever. The Jackson case, during which Pellicano appeared at a press conference with Howard Weitzman to vilify the accuser's family, spawned profiles in The Washington Post and People. The 1992 GQ piece, by Peter Wilkinson, also fired the Pellicano legend. In it, Pellicano admitted accessing certain databases "without permission." Asked how he handled a client's cocaine-addled son, Pellicano answered, "I just used a bat." That $2 million fee, however, brought Pellicano into conflict with one of the few outfits more tenacious than he: the Internal Revenue Service. According to several people close to him, Pellicano reported only $1 million of the fee as income. The other $1 million, Denise Ward says, was reported as a loan: "I remember one morning when he opened his mail with the letter from the I.R.S., he jumped on his desk and started screaming, 'Abandon ship! Abandon ship! We're out of business!' Women were crying and screaming in the office. Fortunately, Rich DiSabatino was in the office and pulled him aside and calmed him down. I understand it took him a few years to pay off the I.R.S." No one knows when Pellicano first tried to wiretap a telephone, but by the mid-1990s he seems to have been attempting to perfect his technique. Around 1995 he hired a self-taught computer programmer named Kevin Kachikianówho was also indicted in Februaryóto create software that would intercept telephone calls. They named it Telesleuth. In November 1995, Pellicano had an attorney from Bert Fields's firm apply to trademark the name. Later, Kachikian developed another program, called Forensic Audio Sleuth, which was able to analyze and enhance audio recordings. Again using an attorney from Fields's firm, Pellicano applied for a trademark. Fields has said he didn't work on such matters, and a spokesman for his firm has said they believed the software was created to aid on cases Pellicano worked on for law-enforcement outfits. By early 1997, Pellicano was apparently ready to use Telesleuth in earnest. To arrange the wiretaps, according to the indictment, he bribed two Pacific Bell workersóone was indicted in February. A former Pellicano employee explains that additional telephone wiring was clipped inside the box at the phone company. (It was never necessary to break into a location.) When a call came in, Telesleuth automatically recorded it and relayed it to a Macintosh computer in Pellicano's Sunset Boulevard offices. His indictment suggests that Telesleuth's first use was against a Los Angeles real-estate developer, Robert Maguire. Beginning around September 1997, Pellicano allegedly used the program to wiretap Mark Hughes, the late founder of Herbalife, who was then engaged in a nasty divorce. According to former employees, the wiretapping operation became the secret heart of Pellicano's businessóthe one unique service he could market to clients. According to Pellicano's former executive vice president, Tarita Virtue, who described the wiretapping setup in a series of interviews with Vanity Fair, the single Macintosh soon became five, lined up in a small locked office Pellicano called "the War Room." Only Pellicano, Virtue, and Kachikian had access to the room, whose only other furniture was a row of filing cabinets. Pellicano and Virtue alone had codes to use the Macs. The operation had one drawback: the Macs could receive wiretap recordings only from their own, 310 area code. To tap phones in the 323, 213, 626, and 818 area codes, Virtue says, Pellicano had to rent an apartment in each where he could stash a Macintosh and a detachable hard drive. When one of these computers was used, Pellicano would switch out the hard drive every few days, bring it to his office, and download the recordings. The recordings were typically crystal clear. The problem became the sheer volume of themóthousands and thousands of telephone conversations, everything from a target's confidential discussions with his attorney to chats with his orthodontist, according to Virtue. To home in on the most promising ones, Kachikian's software could graph a recording's volume; Pellicano could then go directly to a conversation in which his subject had raised his voice, often a sign that something emotional was being discussed. Virtue did most of the initial scanning. When a wiretap yielded something especially useful, she says, she forwarded it to Pellicano's computer with the data displayed in red lettering, signifying that it was urgent. On most cases, Virtue asserts, the detective refrained from telling attorneys where the wiretapped information came from. He would begin a briefing by saying, "My sources tell me Ö " or "It's been brought to my attention Ö " But he apparently wasn't always so careful; the indictment of Terry Christensen cites numerous conversations in which Pellicano told Christensen exactly what he was doing. Besides, Pellicano liked to brag, and in time, any number of his peers and clients say, he told them he was tapping telephones. "Everyone knew that Pellicano was constantly tapping people," says Jack Palladino. "He would also illegally tape his own clients and their attorneys and then play tape recordings of those conversations to impress [them]." There are many in Hollywood who say Pellicano bragged to them of his wiretapping prowess. A woman named Corinne Clifford, a figure in a child-support case Pellicano worked on for Dennis Wasser, describes an evening in 2003 when the detective tried to seduce her at his condominium. After an unsuccessful bid to get her to watch a video of certain celebrities having sex, she says, Pellicano claimed he had bugged Nicole Kidman and Kirk Kerkorian's wifeóboth involved in cases he had also worked on. "I'm the No. 1 private eye in the world," Pellicano boasted, according to Clifford. "I made Dennis Wasser's career." In the face of his own indiscretions, Pellicano re-doubled his security systems to safeguard the War Room. There were security cameras throughout the office. Internal doors could be opened only with pass codes. "Even his own wife was not allowed into the office," one employee remembers. "I once let her and Luca into the office. Pellicano had headphones on and the kid slapped his father in the head. Pellicano went crazy, screaming, 'Who the fuck let these people in here?'" Pellicano's reliance on wiretapping is viewed by several of his peers as an admission of his greatest weakness. Modern investigators work mostly for attorneys and spend much of their time identifying, cajoling, and interviewing people who might give testimony to help an attorney's case. Yet Pellicano lacked the common touchósome say the patience and temperamentóto soothe and coddle potential witnesses. When he needed "street work," Denise Ward handled it. "Anthony hadn't been out in the field for years," says Rich DiSabatino. "He literally didn't know his way around town." Rather than work the field, Pellicano cut corners by wiretapping. First-person information could be obtained faster and was inherently more reliable than that gotten from third parties. Wiretapping also gave Pellicano ready access to a trove of personal information, including credit-card numbers and a variety of secret passwords. "We had anything we wanted," says a former employee. "We could do anything we wanted to you." The only problem, unfortunately, was that Pellicano's eavesdropping operation was 100 percent illegal. "In our business, wiretapping is a shortcut," says DiSabatino. "To suicide." Pellicano also used a second shortcut: the bribes he allegedly paid policemen to search law-enforcement databases. One, a Los Angeles cop named Mark Arnesonóalso indicted in Februaryóbecame a fixture in Pellicano's cases, according to the indictment. Arneson was "an arrogant guy, and I told Anthony just that," says DiSabatino. "Pellicano would call him, and the guy had the balls to send him information that he had illegally obtained with his name and police identification right on top. I once saw a report from Arneson to Pellicano, and it said, 'Sgt. Mark Arneson, Official Inquiry.'" (Arneson did not respond to repeated phone calls.) There in his camera-lined bunker, high above Sunset Boulevard, listening with his black headphones to wiretaps and allegedly paying bribes to policemen and Pac Bell workers, Pellicano should have been home free. If he had been smarter, he probably could have gone on wiretapping half of Hollywood for years to come. Maybe it was hubris. Maybe it was losing his family. But after Kat asked for a divorce, in early 2000, signs of carelessness crept into Pellicano's operation. On one notable occasion, he is said to have allowed a pair of outsiders into the War Room to listen to wiretaps. It was this incident, it turns outóand not the fish on Anita Busch's Audi, as previous reports suggestóthat first brought Pellicano's secret world to the F.B.I.'s attention. The saga of the Nicherie brothers and the Shafrir family is one of those "only in L.A." tales that make your head hurt. According to a lawsuit and people involved in the case, the story is a complex one, including the following allegations: Daniel and Abner Nicherie were Israeli con men, who, in the late 1990s, targeted a fellow Israeli, Ami Shafrir, who owned several Beverly Hills office buildings. Posing as legitimate businessmen, they succeeded not only in swindling Shafrir out of around $40 millionóbut also in persuading his wife, Sarit, to work alongside them, convincing her that Ami was a criminal, according to a lawsuit filed by Ami. When Ami sued, the Nicheries responded with a barrage of legal artillery, eventually hiring 40 separate Los Angeles attorneys to countersue. After a referral from one of these lawyers, Victor Sherman, they allegedly paid Pellicano $50,000 to wiretap Ami. Pellicano told the Nicheries he could use customized electronics to cause interference on Ami's cell phone, which would force him to use the wiretapped landline more often. The Nicheries understood Ami was being bugged, although Pellicano initially refused to let them listen in. But the Nicheries were eventually given access to the recordings because Ami sometimes spoke in Hebrew, and Pellicano couldn't understand a word. He made the two brothers swear that what they heard would remain confidential. On several occasions they arrived at Pellicano's office after hours, allowing themselves to be frisked and turning over their cellular phones. Unbeknownst to Pellicano, however, Daniel Nicherie had secreted a tiny cell phone in his sock, which he used to allow Ami's wife, Sarit, to listen in on the wiretap recordings. Sarit Shafrir, a stylish woman in her 50s, heard dozens of Ami's conversations this way; sometimes the Nicheries would call from Pellicano's office and play back a tape, other times they would leave a recording of the wiretap on her answering machine. In time, the Nicheries and Pellicano began speaking of ways to put Ami in jail by framing him; one involved planting cocaine in the trunk of his car and having a Beverly Hills policeman on Pellicano's payroll pull him over. It was then, people familiar with Sarit's story say, that she began having second thoughts about the Nicheries. Sensing this, the brothers threatened her, telling her she and her two children could be "barbecued" when their home went up in flames. Daniel Nicherie emphasized that there was nothing Sarit could do against them; Daniel told her that Pellicano had his offices wired with plastic explosives. If she told the authorities about the wiretapping operation, a single cell-phone call, Daniel claimed, would allow Pellicano to blow up all the evidence. (Attorneys for the Nicheries did not respond to calls for comment.) After months of worrying, Sarit decided to turn on Pellicano and the Nicheries and contact the F.B.I. But she was so afraid of Pellicano's capabilities she flew to Israel in order to telephone the bureau's L.A. office from a foreign country. When she returned, in August 2001, she met an agent in a public place: the Beverly Hills Public Library. There, hidden deep in the stacks, she told the agent everything she knew about Pellicano's wiretapping system. To her amazement, the agent appeared skeptical. "He said it was impossible," says a person familiar with the story, "that it would take a 'tremendous infrastructure' to do something like that." The agent seemed unconvinced even when Sarit described a wiretapped conversation she had heard between Ami and another F.B.I. agent, who was investigating Ami's complaints about the Nicheries. Sarit suggested that the F.B.I. send in someone undercover. "Do what I did," she insisted. "Go to Victor Shermanóhe'll get you to Pellicano and you can see the whole setup!" The agent scribbled down everything she said. But as Sarit waited for an F.B.I. raid on Pellicano's offices in the coming months, nothing happened. Nothing at all. No one is suggesting that the F.B.I. "covered up" for Pellicano, but the bureau's skepticism was probably influenced by the perception that Pellicano was in some ways "one of their own." Pellicano had been handling audio-analysis tasksócleaning up, amplifying, and identifying legal wiretapsóon F.B.I. cases since the mid-1990s. In 1997 he served as an expert witness for the federal prosecution of a murderer in Miami. As late as 2001 the F.B.I. retained Pellicano to analyze federal wiretaps during the Arizona narcotics-trafficking trial of New York Mafia hit man Sammy "the Bull" Gravano. At his home Pellicano kept a collection of plaques and glowing letters from F.B.I. officials. "We worked for the F.B.I. on a number of cases," says a onetime Pellicano employee. "I [once] told Pellicano, 'We're doing bad shit in here. Aren't you worried that [F.B.I. agents] may have slipped a bug in?' He said, 'I'm not worried about it!'" "Everyone knew what he was doing," says a person involved in the Shafrir case. "But not the feds. The feds didn't have a clue." The longer his wiretapping activities went undiscoveredóor at least unpunishedóthe more brazen Pellicano became. Kat and his closest intimates, Rich DiSabatino and Denise Ward, believe his marital troubles distracted him. "He was devastated when I asked him for the divorce," Kat asserts. "He really became unglued. He lost it." As he attempted to re-unite with Kat, Pellicano's world shrank. He ate most nights, often with Ward or DiSabatino, at one of four restaurants, including Le Dome and Mastro's. "He never traveled more than a half a mile from his office," Ward asserts. "It bothered him about his kidsóhe lost his older kids [Pellicano's five children from earlier marriages], and he didn't want to lose the four younger ones," says DiSabatino. "Once his divorce came into play, there were definitely times when he realized that, 'Hey, I'm not as young as I used to be. I can't go and hit on women.' He constantly said that, that he looked in the mirror and saw a 25-year-old and everyone else saw a 55-year-old." Pellicano's midlife crisis was gathering steam in June 2002 (nine months after Sarit Shafrir's accusations) when that fateful fish landed on Anita Busch's Audióa job, it's been shown, carried out by a Pellicano flunky named Alexander Proctor. Busch had just moved to the Los Angeles Times, after co-authoring six articles about Michael Ovitz's failing Artists Management Group for The New York Times. She believed from the outset the warning was Pellicano's handiwork. The F.B.I. quickly identified and detained Proctor, who claimed responsibility and said Pellicano had hired him. The bureau's initial interest in Pellicano was the Busch incident; only as agents began interviewing former employees and Pellicano targets did the first hints of illegal wiretapping start to interest them. Pellicano quickly caught wind of the F.B.I. investigation and did what he could to stop it. In time, though, Pellicano saw the handwriting on the wall. After being questioned by the F.B.I., he called in Rich DiSabatino and handed him $25,000 worth of electronics, including oscilloscopes. "I'm cleaning house before [the F.B.I.] comes back," he said, according to DiSabatino. He was arrested after the F.B.I. raids that uncovered the weapons in November. At a bail hearing, most of his employees showed up, as did two longtime clients, Dennis Wasser and Martin Singer. Bert Fields even wrote a letter to the judge indicating Pellicano wasn't a flight risk. By then, however, several people, including Tarita Virtue, Denise Ward, a technical expert named Wayne Reynolds, and at least two other office assistants, were cooperating with the F.B.I. Virtue went into hiding, but Pellicano phoned her parents. "I know your daughter's testifying," he told them, according to someone familiar with the conversation. "That's a damn shame." During two separate searches, F.B.I. agents had invaded Pellicano's War Room and carted out 11 computers, including the five Macs, 23 external hard drives, a Palm V digital assistant, 52 diskettes, 34 Zip drives, 92 CD-ROMs, and two DVDs. An F.B.I. agent named Elizabeth Rios assembled a team to begin inspecting and copying everything that was seized. It was an arduous task. Copying a single hard drive took at least 10 hours. Some took as long as two days. Many of the diskettes were encrypted, which made them even harder to decipher. It took months for the F.B.I. agents to digest it all, but when they did, it was obvious to everyone involved that they had found the mother lode. The indictments against Pellicano, which list more than 112 instances in which the private detective allegedly engaged in wiretapping or illegally accessing law-enforcement databases, provide a road map of the cases the U.S. attorney is investigating. Those who were wiretapped, the indictments allege, run the gamut from minnows such as Monika Zsibrita, a model who unsuccessfully claimed that the comedian Chris Rock had fathered her child, to fish as large as Sylvester Stallone. One of the most significant cases now under scrutiny involves Michael Ovitz's complaints against his "enemies," in which Pellicano began to investigate them in 2001; the indictments allege that Pellicano paid policemen to run background checks on six people, including talent agents Bryan Lourd and Kevin Huvane of CAA (motor-vehicle records searched, August 2001); New York Times reporter Bernard Weinraub (F.B.I. database, May 2002); Arthur Bernier, a former employee who had sued Ovitz for wrongful termination (F.B.I. database, May 2002); and James Casey, who had sued for a referral fee he felt he was owed by the firm. Ovitz, through his attorney, has denied any knowledge of these searches. The one Ovitz "enemy" Pellicano is known to have wiretapped was Anita Busch, whose phone remained compromised up until the month of the F.B.I. raids. However, there is no evidence that Ovitz knew of the wiretap, nor that his interest in Busch had spurred it. Prosecutors, however, are known to be examining whether Ovitz was behind the intimidation of Busch. Initially, speculation had centered on Steven Seagal, but the F.B.I. has all but cleared the actor of involvement. At least two witnesses have been questioned by the grand jury about Ovitz's links to the incident. (The U.S. attorney, Dan Saunders, declined to confirm whether Ovitz was a subject of the investigation, saying, "We do not comment about ongoing investigations.") Marshall Grossman, Ovitz's lawyer, denies that Ovitz is being investigated and says he had no connection with the crime, claiming, "At the time he allegedly hired a third party to threaten Ms. Busch, Mr. Pellicano was not in the employ of Michael Ovitz." No previous accounts of Ovitz's relationship with Pellicano suggest that the two worked together before 2001. But, according to a former Pellicano employee, Pellicano had done personal work for Ovitz since at least 1996. "When Ovitz was leaving Disney," this employee says, "he became Anthony's biggest interest, meaning most important client. They were good friends and would speak to each other on a daily basis. Ovitz would often come to the office, and Anthony helped him set up his office in Santa Monica. It went on for months, with Anthony going out to Ovitz's office almost daily. Anthony helped install the security and phone systems at Ovitz's office." One facet of Pellicano's work for Ovitz in 2001 involved the billionaire investor Ron Burkle, who was threatening to sue Ovitz over a failed Internet venture. Pellicano, who was near the height of his personal troubles at the time, turned to Rich DiSabatino for help. "Anthony called me and asked me to work on a case with him; it had come from Bert Fields," says DiSabatino. "He asked if I would help him work on three people from CAA and Ron Burkle. He told me that my end could be as much as $100,000. He indicated that he was going to tap people's phones. I passed. I didn't need that grief in my life." In fact, DiSabatino was alarmed. He was friends with Kevin Huvane, at CAA, and with one of Burkle's security men. He says he called both men and warned them that their phones might be tapped. Burkle, in turn, reached out to Pellicano via a mutual friend, the producer Steve Bing, who had reportedly hired Pellicano during a much-publicized paternity dispute with the actress Elizabeth Hurley. Bing arranged a meeting, and Pellicano agreed to refrain from wiretapping Burkle. In time the two men struck up a kind of friendship. At one point, Pellicano and his children spent a weekend at Burkle's weekend retreat in La Jolla. Their friendship suggests a possible solution to one of the case's minor mysteriesóan explanation for some of the $200,000 the F.B.I. found in Pellicano's safe. According to Burkle, Pellicano approached him with a proposal just days before he went to prison. He offered his services, promising to do "anything," if Burkle would give him money. When Burkle declined, Pellicano said his decision not to wiretap Burkle had cost him a $200,000 fee from Ovitz and Fields. He demanded that Burkle make up for the lost money. Burkle says he refused. But Bing did pay Pellicano between $100,000 and $200,000 around the same time, according to Burkle. "I didn't pay Pellicano anything," Burkle says. "I know Steven gave him $100,000 or something like that. I don't know if it was for me or for what Pellicano did for Steven in the Liz Hurley paternity case." Bing declined repeated requests to be interviewed for this story. The Pellicano indictments refer to two cases Pellicano worked on Brad Grey's behalf: legal battles involving Bo Zenga and the comedian Garry Shandling. But former associates of both men say Grey's dealings with Pellicano were far more extensive. A former Brillstein-Grey executive says Grey used Pellicano for work on behalf of any number of his clients, including Brad Pitt, Adam Sandler, and the late Chris Farley. "There wasn't a day that I didn't hear the words 'Anthony Pellicano' come out of Brad's mouth," this executive says. "He would be using him for this client or that client. This one had a problem that only Tony could solve. It was disgusting. Here is this big management firm and they're using a street thug to clean up problems for some of the biggest stars in Hollywood." An amended lawsuit filed by Zenga in Marchóagainst Grey, Pellicano, Bert Fields, and Fields's firm, Greenberg Gluskerógives a sense of how Pellicano's wiretaps might have helped Grey in business. The wiretapping had come into play in the earlier lawsuit Zenga filed against Grey over Zenga's claim that he was entitled to profits from Scary Movie. One day after Zenga's attorneys put Grey through a grueling three-day deposition, in February 2001, the new suit alleges, Pellicano began doing illegal background checks on Zenga and one of his attorneys. According to the suit, on February 14, Pellicano began circulating summaries of Zenga's private conversations with his own lawyeróinformation he presumably received from a wiretap on Zenga's telephone. The taps gave Grey a critical advantage in the litigation, the new suit alleges. When Zenga criticized his partner Stacy Codikow in one conversation, the suit alleges, Grey's attorneys were able to use the information to drive a wedge between Codikow and Zengaóa split that eventually caused Codikow to reverse critical testimony that, Zenga's attorneys say, ultimately caused Zenga to lose the lawsuit against Grey. "Pellicano appeared to be everywhere all at once," says Zenga's attorney, Gregory Dovel. "We were litigating this case, and he's brought inósuddenly he's in touch with all our witnesses. It was like living in an upside-down world. Stacy Codikow had been a friend of Bo Zenga's for years. She testified one way, and then after Pellicano's involvement she was saying the exact opposite. Much of what she was saying was so unsupported that she eventually backtracked from it." Codikow didn't return phone calls seeking comment for this article. Shandling and Grey, his longtime manager, fell out in 1998 when Shandling sued him for $100 million, alleging that Grey cheated him out of earnings from his hit comedy, The Larry Sanders Show. Grey countersued. He hired Bert Fields to handle the litigation, and Fields brought in Pellicano. Between January and March 1999, the indictment alleges, Pellicano had a policeman run unauthorized background checks on Shandling, a onetime girlfriend of his, his personal assistant, his business manager, and a friend, the actor Kevin Nealon. Several sources say Shandling and others were wiretapped as well. At the time, Shandling had hired Gavin DeBecker to aid in his defense, and DeBecker warned the actor about Fields and Pellicano. "It is pro forma for you to advise clients to conduct sweeps of their telephones in matters in which Bert Fields is involved as the opposing counsel," DeBecker said in a deposition. When asked to explain, DeBecker answered, "I advise clients of mine to look out for their overall privacy during suits with Bert Fields because he engages and is widely known to use [Pellicano], who uses extra-legal tactics. When you have him on the other side of a case you need to be concerned about your privacy. The nature of whether your garbage is being stolen. Whether or not listening devices are placed. For that reason, I recommended that [Shandling] be certain that the privacy of his home and office were assured." Unlike some Fields clients, who never dealt directly with Pellicano, Grey became personally involved. At the height of their business relationship, a former Pellicano employee says, "Grey and Pellicano would be on the telephone to each other at least once a day, every day." (A spokesman for Grey maintains that Grey was "casually acquainted with Pellicano. Mr. Grey never hired Pellicano or recommended to his clients Ö that they hire him. Mr. Grey had no knowledge of any illegal activity by Mr. Pellicano.") According to another former employee, Pellicano once gave Grey an eight-inch-long, silver-plated switchblade knife for Christmas, prompting Grey to tell a fellow executive, "That's Tony for you. You know how crazy he can be." Grey admired Pellicano so much, the former Brillstein-Grey executive says, that, when James Gandolfini briefly walked off the set of The Sopranos in a salary dispute, Grey considered replacing the hit HBO drama with a show based on Pellicano's life. A screenwriter named Ann Biderman was hired to write a script. The project died, however, when Gandolfini returned and Pellicano and Biderman fell out over writing credits and fees. The Grey-Shandling litigation was settled in July 1999, when Grey agreed to pay Shandling more than $10 million. Three years later, when the F.B.I. raided Pellicano's offices, agents found a trove of information about Shandling and his associates. Shandling and others have now testified before the Pellicano grand jury. Another name that surfaces in the investigation is Kirk Kerkorian, the 89-year-old billionaire who once owned MGM, is the largest shareholder in General Motors, and has launched unsuccessful takeover attempts against Chrysler and other major American companies. An avid tennis player, he had been dating a former tennis pro named Lisa Bonder for 11 years when, in 1997, she became pregnant. The subsequent marriage lasted 28 days. In 1999, Bonder asked a California judge for a record $320,000 a month in child support, including $6,000 a month for house flowers and $150,000 a month for private-jet travel. Her request was undermined, however, when a test indicated that Kirk was not her daughter's biological father. A judge eventually ordered Kerkorian to pay Bonder only $50,316 a month. The proceedings were still raging, however, when in early 2002 Kerkorian's attorney Terry Christensen allegedly began paying Pellicano to wiretap Bonder. Christensen was indicted in February, and the indictment alleges he knew what Pellicano was doing. It contains numerous verbatim quotations from Christensen, a sure sign that, as Pellicano is said to have done with other attorneys, he had recorded conversations with Christensen. In these talks, the indictment alleges, the two candidly discussed the wiretapping operation, with Pellicano admonishing Christensen at one point to "be very careful about this, because there is only one way for me to know this." In another talk, on April 28, 2002, Pellicano told Christensen about a recorded conversation between Bonder and her lawyers. "I'm hearing her talk to Kirk, too," Pellicano says. "That's not for attribution, I mean distribution, but I'm hearing both of them, I'm hearing all of it, the whole nine yards." After his indictment, Christensen issued a statement that didn't deny his involvement but suggested that he had resorted to extreme measures because Kerkorian had been receiving death threats. "Terry Christensen never heard wiretapped conversations," his attorney said. "He never got a transcript of a wiretapped conversation. All he had to go on was what Pellicano was telling him over the phone." hen there's Tom Cruise. Cruise was represented by Wasser (who was known to have hired Pellicano in the past) during Cruise's 2001 divorce proceedings with Nicole Kidman. Kidman used lawyer Sorrell Trope and Rich DiSabatino. DiSabatino had Kidman's telephones regularly swept for bugs, and went as far as installing an encryption device to foil wiretapping attempts. Kidman, who remained wary, took to joking during calls with friends, "So, Tom, are you listening? Am I saying what you want me to say?" According to people in the Kidman camp, Pellicano remained relatively quiet during the proceedings. "The one thing I was aware of was we started seeing articles in The National Enquirer on Nicole," says one Kidman adviser. "We assumed at the time that was Pellicano. The Enquirer was always his tabloid of choice." Several reports indicate that during their raid on Pellicano's offices F.B.I. agents found a recording of Kidman talking with Cruise. DiSabatino has said this recording must have come from Cruise's telephone, but Kidman is said to disagree. "For some reason Nicole really wants to believe her phone was tapped," says a person who worked on the case. Kidman has been questioned by the F.B.I. A senior F.B.I. agent has also interviewed Cruise, sources say. Also mentioned in the indictments is Taylor Thomson, heiress to a Canadian publishing fortune valued by Forbes in 2003 at $14 billion, who hired Bert Fields to negotiate the custody of her child with Michael Kolesa in 2001. Her daughter's nanny, a twentysomething woman named Pamela Miller, was drawn into the contentious proceedings when she aired unfavorable opinions of Thomson's child-raising habits to Kolesa. That's when Fields brought in Pellicano. "These people ruined Miller's life," her attorney, Neville Johnson, says of Pellicano and Fields. "Whenever she would get a new nanny job, she would be let go. Within weeks of her being hired by a member of the [Michael] Douglas family, she was let go. The same thing happened when she went to work for [producer] Jon Peters. Pellicano would stalk her, going so far as to sit directly behind her in a movie theater. She was wiretapped and members of her family had their private information illegally accessed, including her uncle, a minister in Bakersfield. They went so far as to take photos of her when she was with the children she had been hired to watch. Needless to say, not many wealthy [parents] want to keep a nanny who is [being photographed with] their children." Pamela Miller testified before the Pellicano grand jury. One of the best-known actors believed to have been wiretapped is Sylvester Stallone. This allegedly happened after Stallone sued Kenneth Starr, his former business manager, in February 2002, alleging that Starr's advice to hold 3.9 million shares of faltering Planet Hollywood stock cost Stallone as much as $10 million. Starr hired Bert Fields, who brought in Pellicano. The indictments allege that Pellicano began wiretapping one of Stallone's telephones within weeks of the lawsuit's filing. (Both Stallone's publicist and his attorney declined comment on the case.) The allegation is unusual because Stallone was known to have employed Pellicano on at least one case going back to the late 1980s. At some point the two had a falling-out, though what prompted it remains unclear. According to investigator Paul Barresi, a onetime porn performer who handled several freelance assignments for Pellicano, Pellicano had a vendetta against Stallone. "Pellicano hired me on two occasions to find dirt on Stallone," Barresi says. "The first time was in 1995 or '96 and then again in late 2001." "When you're a friend of his, you're family," Stallone said of Pellicano in 1993. "When you're not, you've got problems." In another twist to the already bizarre world of Anthony Pellicano, John McTiernan, director of the hit films Die Hard and The Hunt for Red October, pleaded guilty, in a criminal-information case filed by the U.S. attorney, to lying to F.B.I. agents about having had Pellicano wiretap producer Charles Roven (Three Kings, Batman Begins). Los Angeles attorney Kevin McDermott explained that, in all probability, McTiernan is cooperating with the investigation. "When you file an information as opposed to an indictment, it's a sure sign that the perp has agreed to cooperate," says McDermott, "because, legally, it's easier to work out a deal with the court." During his contentious 1997 divorce from Donna Dubrow, McTiernan was represented by Dennis Wasser, and later by Robert J. Nachshin, who has also been identified as having hired Pellicano in the past. Dubrow has stated that she believes McTiernan hired Pellicano during their divorce. A former employee of Pellicano's told Vanity Fair, "In 1997ñ98, McTiernan would often come into the office." Much of Hollywood is now holding its breath awaiting a new round of federal indictments, which could come any day. The investigation shows no sign of slowing. Late last fall, after assigning only three agents to the case for the previous two years, the F.B.I. formed a Pellicano task force. Twenty agents are now working the case full-time. Several sources say the lead agent, a dour but dogged veteran named Stan Ornellas, has actually been seen smiling of late. Many of Pellicano's former employees are now cooperating with the authorities. So is his latest girlfriend, Sandra Carradine, 58, the actor Keith Carradine's ex-wife; she was indicted in January, pleaded guilty to two counts of perjury, and is now helping the F.B.I. Mark Arneson, the Los Angeles policeman, is said to be trying to cut a deal of his own. Two years ago, Arneson met with prosecutors for a "queen for a day" (which means whatever he told them could not later be used against him). When he failed to give direct evidence about any of the lawyers under scrutiny, the prosecutors passed on a plea deal with him. More than a dozen attorneys, meanwhile, are preparing civil lawsuits against Pellicano and a number of the lawyers he worked with, as well as their firms. Anita Busch has already sued Pellicano, as has Bo Zenga, as has Keith Carradine, who alleges Pellicano harassed him during his 1993 divorce, as has a woman named Erin Finn, who was wiretapped by her ex-boyfriend Hollywood Records president Robert Pfeifer. Pfeifer pleaded guilty in April and faces up to 10 years in prison. "Lawsuits filed by Pellicano's victims will be sprouting up like tulips in springtime," predicts Kevin McDermott. "Not only will they be suing Pellicano but they will sue the L.A.P.D., the telephone company, the lawyers who hired Pellicano, and in all probability the clients. This is going to get very ugly." Much of the ugliness is likely to be directed at Bert Fields's firm, Greenberg Glusker. Already Hollywood is abuzz that an avalanche of coming lawsuits could force the firm into bankruptcy. The problem is the sheer number of conversations Pellicano may have illegally wiretapped. Bo Zenga's lawsuit, which includes Greenberg Glusker as a defendant, cites nearly 1,600 telephone calls Pellicano allegedly recorded at the behest of Fields and five other Greenberg Glusker partners. Under California law, each incident carries a minimum fine of $5,000, meaning Greenberg Glusker could face potential fines of at least $8 millionójust in the Zenga litigation. And that's before any criminal penalties. A series of talks have taken place in recent weeks among the firm, Fields, and the U.S. Attorney's Office. The firm's attorney in the case, Brian Sun, declines to comment on these talks, but several sources say they're aimed at negotiating some kind of settlement for Fields himself. (Pellicano, Ovitz, Fields, Grey, McTiernan, and the attorneys mentioned in this story declined to comment.) The wild card in all this is Pellicano, who remains behind bars at the West Valley Detention Center, in San Bernardino County. Will he incriminate Fields or other clients? The betting here is that he won't break his personal vow of omert‡óthe Sicilian vow of silence. After all, he has already served more than 30 months in prison without turning on a single client. "I could have helped myself if I had named names," Pellicano told the New York Post from prison in 2003. "But that's not me. Me, I protect my people. [The feds] wanted to get me, and because I'd never give up my client, they got me. I have to accept responsibility." Bryan Burrough is a Vanity Fair special correspondent. He is currently working on a book about Texas oil families. Investigative reporter John Connolly's book on the Pellicano case, The Sin Eater, will be published by Simon & Schuster next year. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [64.233.162.223] ([64.233.162.223]:38 "EHLO nz-out-0304.google.com") by ams024.ftl.affinity.com with ESMTP id S405352AbWFWKGT; Fri, 23 Jun 2006 06:06:19 -0400 Received: by nz-out-0304.google.com with SMTP id v22so1717467nzg for ; Fri, 23 Jun 2006 03:06:18 -0700 (PDT) Received: by 10.11.28.34 with SMTP id b34mr139349cwb; Fri, 23 Jun 2006 03:04:48 -0700 (PDT) Received: by 10.11.86.25 with SMTP id j25gr654cwb; Fri, 23 Jun 2006 03:04:34 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.22.10 with SMTP id 10mr1160207nzv; Fri, 23 Jun 2006 03:04:34 -0700 (PDT) Received: from lvs00-fl-n11.ftl.affinity.com (lvs00-fl-n11.ftl.affinity.com [216.219.253.186]) by mx.googlegroups.com with ESMTP id h49si172480nzf.2006.06.23.03.04.33; Fri, 23 Jun 2006 03:04:34 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.186 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [141.149.174.145] ([141.149.174.145]:25610 "EHLO nikola.tscm.com") by ams011.ftl.affinity.com with ESMTP id S612884AbWFWKEd (ORCPT ); Fri, 23 Jun 2006 06:04:33 -0400 Message-Id: <7.0.1.0.2.20060623055435.106ff828@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Fri, 23 Jun 2006 05:58:23 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] Phone-Tap Scandal Bugging of Nation's Leaders Points to Security Holes, Sets Off Multiple Probes Technician's Mysterious Death Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="=====================_11068062==.ALT" Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,
On the Hook

Vodafone, Ericsson Get Hung Up

In Greece's Phone-Tap Scandal Bugging of Nation's Leaders  Points to Security Holes,  Sets Off Multiple Probes Technician's Mysterious Death
http://online.wsj.com/article/SB115085571895085969.html


By CASSELL BRYAN-LOW
June 21, 2006; Page A1

ATHENS -- In early March 2005, George Koronias, Vodafone Group PLC's top executive here, contacted the Greek prime minister's office about an urgent security matter. Vodafone's network in Greece had been infiltrated by phone-tapping software targeting an elite group of cellphones: those assigned to many of the country's leaders, including senior police and defense officials, cabinet members and the prime minister himself.

The ensuing scandal -- which some investigators believe may also be linked to the death of one Vodafone worker -- has shaken this nation in the wake of one of its greatest sources of recent national pride: hosting the 2004 Olympic Summer Games. The bugging effort appears to have been active in the weeks leading up to the August games and wasn't discovered for seven months, potentially allowing eavesdropping on more than 100 cellphones, including one linked to the U.S. Embassy in Athens, according to the Greek government. The U.S. Embassy declined to comment.

It is proving to be a huge embarrassment to two of the biggest names in the global cellphone industry -- Vodafone of the U.K., the world's biggest cellphone-service provider by revenue, and its equipment supplier, Telefon AB L.M. Ericsson of Sweden. Vodafone, as the license holder, could face millions of euros in fines by Greek telecom regulators if, for instance, its safeguards are found to be lax. The case also provides a rare window into sophisticated bugging techniques and illustrates how eavesdroppers can penetrate supposedly secure networks.

Much about the affair remains a mystery. Government prosecutors, who continue to probe the matter, have yet to name any culprits. Nor have they uncovered a motive for the software's installation or confirmed that conversations were actually monitored.

It long has been possible to tap into an individual's cellphone conversation. Law-enforcement officials commonly do this to keep tabs on suspected criminals and terrorists, typically with court approval. What makes the Greek affair unusual among cases that have come to light is that the eavesdroppers apparently are unknown and the targets are government officials.

Complicating matters is that hours before Mr. Koronias contacted the government, one of his network managers, Costas Tsalikidis, was found dead in his Athens apartment, hanging from a rope tied to pipes outside the bathroom. Prosecutors believe there may be a link between Mr. Tsalikidis's death and the bugging, according to a person familiar with the investigation.

Mr. Tsalikidis's family members contend his death was not a suicide, as Greek police initially ruled. They believe it is likely that 39-year-old Mr. Tsalikidis, a technical expert, discovered the spy software. Mr. Tsalikidis had been planning for a while to quit his Vodafone job but told his fiancÈe not long before he died that it had become "a matter of life or death" that he leave, says the family's lawyer, Themis Sofos, in an interview. She pressed Mr. Tsalikidis for details, but he wouldn't expand, Mr. Sofos adds.

Newbury, England-based Vodafone, in a Feb. 3, 2006 statement, dismissed any link between Mr. Tsalikidis's death and the phone tapping. Separately, it also has denied it was involved in the bugging operation.

Ericsson, of Stockholm, which also denies any involvement, said responsibility for network security lies with the customers that provide the phone service.

For both companies, the scandal raises uncomfortable questions about the ease with which such supposedly secure networks can be penetrated. Ericsson, the world's largest maker of wireless network equipment -- roughly 40% of the world's cellphone calls pass through its gear -- is a key partner for Vodafone.

The events have caused a stir among Vodafone and Ericsson customers, leaving both companies to field questions about what happened. Vodafone has launched a recovery plan in Greece to rebuild its reputation, including advertising campaigns and other communications with customers, suppliers and the government.

Ericsson says it has checked the networks of the three other Greek cellphone-service providers that use its equipment as well as a number of other customers world-wide and hasn't found traces of this type of illegal bugging software. "As far as Ericsson knows, this is a unique incident," it said in a statement. Vodafone spokesman Ben Padovan said: "We have never discovered anything like this before or since."

Some experts and politicians say the operation appears to be the work of foreign intelligence agencies, given its sophistication. The eavesdroppers were able to gain access both to Vodafone's networks and to someone with intimate knowledge of Ericsson's software. And they had the significant resources required to develop and test the rogue software, the experts say. Technical experts probing the matter have also found links between the bugging software and various overseas telephone numbers in the U.S., the United Kingdom and elsewhere.

The 2004 Summer Games came at a time of particularly heightened concern among intelligence agencies in Greece, the U.S. and elsewhere about possible terrorist attacks.

Behind the Operation

Behind the bugging operation were two pieces of sophisticated software, according to Ericsson. One was Ericsson's own, some basic elements of which came as a preinstalled feature of the network equipment. When enabled, the feature can be used for lawful interception by government authorities, which has become increasingly common since the Sept. 11 terror attacks. But to use the interception feature, operators like Vodafone would need to pay Ericsson millions of dollars to purchase the additional hardware, software and passwords that are required to activate it. Both companies say Vodafone hadn't done that in Greece at the time.

The second element was the rogue software that the eavesdroppers implanted in parts of Vodafone's network to achieve two things: activate the Ericsson-made interception feature and at the same time hide all traces that the feature was in use. Ericsson, which analyzed the software in conjunction with Greece's independent telecom watchdog, says it didn't design, develop or install the rogue software.

The software allowed the cellphone calls of the targeted individuals to be monitored via 14 prepaid cellphones, according to the government officials and telecom experts probing the matter. They say when calls to or from one of the more than 100 targeted phones were made, the rogue software enabled one of the interceptor phones to be connected also.

The interceptor phones likely enabled conversations to be secretly recorded elsewhere, the government said during a February 2006 news conference. At least some of the prepaid cellphones were activated between June and August 2004. Such cellphones, particularly when paid for in cash, typically are harder to trace than those acquired with a monthly subscription plan.

Vodafone claims it didn't know that even the basic elements of the legal interception software were included in the equipment it bought. Ericsson never informed the service provider's top managers in Greece that the features were included nor was there a "special briefing" to the relevant technical division, according to a Vodafone statement in March.

But Ericsson's top executive in Greece, Bill Zikou, claimed during parliamentary-committee testimony that his company had informed Vodafone about the feature via its sales force and instruction manuals.

Vodafone and Ericsson discovered something was amiss in late January 2005 when some Greek cellphone users started complaining about problems sending text messages. Vodafone asked Ericsson to look into the issue. Ericsson's technicians spent several weeks trying to figure out the problem, with help from the equipment maker's technical experts at its headquarters in Sweden. In early March of that year, Ericsson's technicians told Vodafone's technology director in Greece of their unusual discovery about the cause of the problems: software that appeared to be capable of illegally monitoring calls. It's unclear exactly how the rogue software caused the text-messaging problem.

Ericsson confirmed the software was able to monitor calls, and Vodafone soon discovered that the targeted phones included those used by some of the country's most important officials. On March 8, Mr. Koronias ordered that the illegal bugging program be shut down, in a move he has said was made to protect the privacy of its customers. He called the prime minister's office the next evening.

The head of Greece's intelligence service, Ioannis Korantis, said in testimony before the parliamentary committee last month that Vodafone's disabling of the software before authorities could investigate hampered their efforts. "From the moment that the software was shut down, the string broke that could have lead us to who was behind this," he said. Separately, he distanced his own agency from the bugging effort, saying it didn't have the technical know-how to effectively monitor cellphone calls.

Hours before Mr. Koronias contacted the prime minister's office on March 9, Mr. Tsalikidis's mother discovered her son dead in his modest apartment in a residential neighborhood in northwest Athens.

His family says Mr. Tsalikidis, who liked to travel and collect vintage rock records, was a generally cheerful man with a mathematical bent who was due to be married to his long-term girlfriend just months later. Among the details of his death they consider suspicious are the lack of a suicide note and the expertly tied knots in the white rope he was found hanging from.

Mr. Tsalikidis's job entailed helping design the company's high-speed mobile network. According to Mr. Sofos, the family attorney, his work notebooks show he had been looking into a text-messaging problem on the network shortly before the bugging software was discovered. It is unclear from his notebooks if that was related to the initially reported text-messaging problem that Vodafone asked Ericsson to look into.

Ioannis Diotis, a well-respected prosecutor known for his antiterrorist work, has been investigating the death since earlier this year. As part of a broader criminal probe into whether the country's communications-privacy and espionage laws were broken, he is investigating potential links between Mr. Tsalikidis's death and the bugging, according to the person familiar with the investigation. Mr. Diotis just finished his report, this person said, which was expected to suggest there are links between the two events. It is unclear, however, whether he has found sufficient evidence to conclude it was murder.

Under Wraps

The government kept the scandal under wraps for almost a year. But in February, after the government concluded its own preliminary investigation, several government ministers held a news conference to reveal the breach. They said that in addition to Greek Prime Minister Kostas Karamanlis, the bugging also targeted Greek cabinet ministers, senior military officers and the mayor of Athens, among others. The government didn't respond to repeated requests for further comment, but has said that the highly technical nature of the case and the fact that it had to conduct its initial investigation in secrecy slowed down its efforts to find the culprit.

The disclosure sparked a massive public outcry and a number of other investigations, including one by the state-funded telecommunications watchdog, the Authority for the Information and Communication Security and Privacy, or ADAE. While it's still unclear when the spy software was installed, ADAE's experts say it was definitely in place by late January 2005, when unspecified modifications were made by the eavesdroppers via one of Vodafone's switching centers. These centers -- typically large, security-protected buildings -- house the software that connects calls.

The modifications are a key focus of a preliminary report by the telecoms watchdog. The report concludes that the changes were made by someone with authorized access to Vodafone's networks. The modifications "took place either through the internal network of Vodafone or through a physical presence" at the switching center, the report said, prompting some to suspect Vodafone employees played a part.

Based on the findings by the telecoms watchdog to date, "there is no doubt that personnel of Vodafone were involved," says Miltiades Evert, a member of parliament for the ruling New Democracy party who also sits on the committee investigating the affair. "How many there were and which rank, nobody knows."

If the ADAE finds Vodafone to be in violation of certain conditions of its license, such as securing the privacy of communications, Greek regulators could levy multimillion-euro fines and even revoke the company's license. The ADAE, which declined to comment, is continuing its probe and is expected to deliver a final report in the coming weeks.

ADAE's technical experts also note that the rogue software was so sophisticated it would have required testing in a center fitted with Ericsson equipment, which can be purchased but isn't easily set up. "Ericsson cannot be unaware of who has this special capability," said ADAE President Andreas Lambrinopoulos during parliamentary-committee testimony last month. "There are few people in the world that can do something like this."

Ericsson says there are a number of people with specialized knowledge of its systems. These include some current and former Ericsson employees, experienced consultants and specialists that are working or have worked at its customers.

ADAE's technical experts also say the interceptor phones were in contact via phone calls and text messages with various overseas destinations, namely the U.S., including Laurel, Md., the U.K., Sweden and Australia, according to the ADAE preliminary report. Some of these calls and messages were initiated and received directly from the 14 interceptor phones and some were relayed via a second group of at least three other prepaid phones that also were in contact with the 14 interceptor phones.

Some Greek politicians note that one of the U.S.'s principal spy agencies, the National Security Agency, is based near Laurel, Md. The agency recently has been in the spotlight, with some members of the U.S. Congress criticizing the Bush administration for monitoring, without a warrant, calls between people in the U.S. and suspected terrorists overseas. Agency spokesman Don Weber said the "NSA takes its legal responsibilities seriously and operates within the law." As for whether the NSA or other U.S. authorities were involved in the Greek incident, he said the agency doesn't "discuss ongoing or pending investigations."



----------------------------------------------------------------------------------------------------
We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers.
----------------------------------------------------------------------------------------------------
 James M. Atkinson                                Phone:  (978) 381-9111
 Granite Island Group                     Fax:     
 127 Eastern Avenue #291                           Web:    http://www.tscm.com/
 Gloucester, MA 01931-8008               Email:  mailto:jmatk@tscm.com
----------------------------------------------------------------------------------------------------
  World Class, Professional, Ethical, and Competent Bug Sweeps, and
Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
----------------------------------------------------------------------------------------------------

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group.
To post to this group, send email to TSCM-L2006@googlegroups.com
To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com
For more options, visit this group at http://groups.google.com/group/TSCM-L2006
-~----------~----~----~----~------~----~------~--~---

Received: from [216.239.56.131] ([216.239.56.131]:63527 "EHLO mproxy.googlegroups.com") by ams007.ftl.affinity.com with ESMTP id S423911AbWEUQvW; Sun, 21 May 2006 12:51:22 -0400 Received: by mproxy.googlegroups.com with SMTP id d8so11064369cwb for ; Sun, 21 May 2006 09:51:20 -0700 (PDT) Received: by 10.11.113.21 with SMTP id l21mr43343cwc; Sun, 21 May 2006 08:51:22 -0700 (PDT) Received: by 10.11.86.25 with SMTP id j25gr609cwb; Sun, 21 May 2006 08:51:09 -0700 (PDT) X-Sender: jya@pipeline.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.54.73.18 with SMTP id v18mr171076wra; Sun, 21 May 2006 08:51:09 -0700 (PDT) Received: from pop05.mail.atl.earthlink.net (pop05.mail.atl.earthlink.net [207.69.200.58]) by mx.googlegroups.com with ESMTP id v11si697562cwb.2006.05.21.08.51.08; Sun, 21 May 2006 08:51:09 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 207.69.200.58 is neither permitted nor denied by best guess record for domain of jya@pipeline.com) Received: from user-1087f36.cable.mindspring.com ([64.131.188.102] helo=JY09) by pop05.mail.atl.earthlink.net with smtp (Exim 3.36 #10) id 1FhqCy-0000Ty-00 for TSCM-L2006@googlegroups.com; Sun, 21 May 2006 11:51:08 -0400 X-Sender: jya@pop.pipeline.com X-Mailer: QUALCOMM Windows Eudora Pro Version 4.0 Date: Sun, 21 May 2006 11:50:03 -0700 To: TSCM-L2006@googlegroups.com From: John Young Subject: [TSCM-L] Photos of Alleged MI5 Bug In-Reply-To: <20060519232405.22846.qmail@web34204.mail.mud.yahoo.com> References: <8DD1B8E062E1B84BA934BEA3608232C99A2884@SP099EXV01.compucom.local> Mime-Version: 1.0 Content-Type: text/plain Message-Id: Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.32csm.org/newsflash.html --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- X-Persona: Received: from [64.233.184.243] ([64.233.184.243]:20700 "EHLO wr-out-0304.google.com") by ams027.ftl.affinity.com with ESMTP id S375538AbWI2I61; Fri, 29 Sep 2006 04:58:27 -0400 Received: by wr-out-0304.google.com with SMTP id 63so1464358wra for ; Fri, 29 Sep 2006 01:58:27 -0700 (PDT) Received: by 10.35.37.18 with SMTP id p18mr157511pyj; Fri, 29 Sep 2006 01:56:56 -0700 (PDT) Received: by 10.11.109.73 with SMTP id h73gr899cwc; Fri, 29 Sep 2006 01:56:53 -0700 (PDT) X-Sender: agrudko@icon.co.za X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.103.18 with SMTP id a18mr1038392nzc; Fri, 29 Sep 2006 01:56:52 -0700 (PDT) Received: from ctb-mesg9.saix.net (ctb-mesg9.saix.net [196.25.240.89]) by mx.googlegroups.com with ESMTP id y6si615699nzg.2006.09.29.01.56.51; Fri, 29 Sep 2006 01:56:52 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 196.25.240.89 is neither permitted nor denied by best guess record for domain of agrudko@icon.co.za) Received: from NewCompaq (dsl-145-255-254.telkomadsl.co.za [165.145.255.254]) by ctb-mesg9.saix.net (Postfix) with SMTP id A63B9296F for ; Fri, 29 Sep 2006 10:56:49 +0200 (SAST) Message-ID: <00b601c6e3a5$3c6c5740$0d00000a@NewCompaq> From: "A Grudko" To: References: <20060923085953.62394.qmail@web34210.mail.mud.yahoo.com> Subject: [TSCM-L] Plaxo Date: Fri, 29 Sep 2006 10:56:53 +0200 Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_00B0_01C6E3B5.F96D8D90" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2600.0000 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: ,

A bit off topic
 
A few yers ago, when 'Plaxo'  came on line, there were reports that they were trying to build a really big mailing list to sell on to the highest bidder. I stress that this was an early
alligation and as such I refused to join as I hade enough spam to deal with.
 
I am now considering using thier 'free' contact service but it is the 'no free lunch' rule that worries me. I am cautious of giving my personal data to a corperation that in thier initial agreement reserved the right to include the database to transfer to, well, anyone who wanted to buy the company.
 
I'd be interested to hear from infomation security colligues about this. Private replies are fine.
 
Andy Grudko (British),  DPM, Grad IS (South Africa)
Consulting Investigator, Est. 1981. PSIRA reg. No. 8642
www.grudko.com , andy@grudko.com
(+27) 012 244 0255 - 244 0256 (Fax)
Cellular (+27) 082 778 6355 - Skype AndyGrudko
SACI(Pres) SASA, IPA, WAD, FAPI, CALI, IWWA.
"When you need it done right - first time"
 
 

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group.
To post to this group, send email to TSCM-L2006@googlegroups.com
To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com
For more options, visit this group at http://groups.google.com/group/TSCM-L2006
-~----------~----~----~----~------~----~------~--~---

Received: from [216.239.56.131] ([216.239.56.131]:1858 "EHLO mproxy.googlegroups.com") by ams021.ftl.affinity.com with ESMTP id S359204AbWEAQdu; Mon, 1 May 2006 12:33:50 -0400 Received: by mproxy.googlegroups.com with SMTP id r56so20634779cwc for ; Mon, 01 May 2006 09:33:49 -0700 (PDT) Received: by 10.11.58.10 with SMTP id g10mr3493cwa; Mon, 01 May 2006 09:32:04 -0700 (PDT) Received: by 10.11.79.5 with SMTP id c5gr567cwb; Mon, 01 May 2006 09:31:51 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.11.88.14 with SMTP id l14mr3179464cwb; Mon, 01 May 2006 09:31:49 -0700 (PDT) Received: from ams011.ftl.affinity.com (lvs00-fl-n11.valueweb.net [216.219.253.186]) by mx.googlegroups.com with ESMTP id v23si683912cwb.2006.05.01.09.31.48; Mon, 01 May 2006 09:31:49 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.186 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [68.160.36.203] ([68.160.36.203]:24329 "EHLO nikola.tscm.com") by ams011.ftl.affinity.com with ESMTP id S359991AbWEAQbr convert rfc822-to-8bit (ORCPT ); Mon, 1 May 2006 12:31:47 -0400 Message-Id: <6.2.3.4.2.20060501122002.07f8a660@pop.tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.3.4 Date: Mon, 01 May 2006 12:23:09 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] Radio tower makes for talkative neighborhood Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , [Non-Linear Junctions Gone Wild. -jma] http://www.vvdailypress.com/2006/114648790865751.html Monday, May 1, 2006 Radio tower makes for talkative neighborhood Residents complain radio station can be heard on phones lines; demand tower be removed By LEROY STANDISH Staff Writer APPLE VALLEY ó If you give Kate O'Rourke a call on her home phone listen closely, you might be able to catch the weather report too. The radio transmission tower behind her home has been talking to her and those who call her ever since she moved in a decade ago. The tower's signal is so strong here that the radio station can be heard over the telephone lines. For that reason and more O'Rourke and some of her neighbors want it gone. "I can listen to Barb Stanton on my phone," O'Rourke said. "Evidently it is louder for me then the person calling me ... After ten years I have gotten used to it." The tower was erected in 1956, during the glory days of radio. "That is the original tower from KAVR (which stands for Apple Valley Ranchos), from way back when," Kathie Martin, town spokeswoman, said. John Charles Thomas, a famous baritone, lived in Apple Valley from the early 1950s until his death in 1962. He was coowner of the station. Thomas used to broadcast live from the Historic Apple Valley Inn's Blossom Room. Born in Pennsylvania in 1891 Thomas was a car nut, enjoyed golf, raced hydroplanes and raised chickens and hogs. He also made stage appearances from Broadway to London. He began his radio career in 1927 on NBC. The tower, which has its roots deep in town history, was recently the subject of some neighborhood controversy. Singular wanted to co-locate an antenna on the tower and build another small building next to it to improve its cellular communications network. After some neighbors objected to the plan the Apple Valley Planning Commission rejected Singular from locating on the antenna, which is now operated by the Clear Channel. Singular is now considering build an antenna on a back hole of the Apple Valley Country Club Golf Course. O'Rourke and some of her neighbors think the tower, despite its history, is inappropriate for the neighborhood. "It kind of fell through the cracks, it stayed here and all the houses built up around it," she said. "It is on a residential lot and it is a commercial venture ó it would be nice if they moved it." Other neighbors say they don't mind the free-standing antenna, besides, they say, it was here first. "It's been there since before I moved here and it's never bothered me," Pandora Patterson, whose backyard abuts the large vacant lot containing the tower, said. "It's part of Apple Valley." Patterson, who enjoys the wildlife that wanders through the field, had the telephone company install filters on her phone line. The filters to block out the radio transmissions. Other neighbors say they just make sure to use a high quality phone. Deborah Tar r, who lives across the street from the tower and has no objections to it, said the antenna is only noticeable when she's using an inexpensive phone. "Sometimes you here the radio, but it's just when there is a silence," she said. "And only when we use a cheap phone." ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- X-Persona: Received: from [64.233.162.220] ([64.233.162.220]:19000 "EHLO nz-out-0304.google.com") by ams018.ftl.affinity.com with ESMTP id S418114AbWJKDW5; Tue, 10 Oct 2006 23:22:57 -0400 Received: by nz-out-0304.google.com with SMTP id h28so108329nzf for ; Tue, 10 Oct 2006 20:22:56 -0700 (PDT) Received: by 10.35.99.14 with SMTP id b14mr916240pym; Tue, 10 Oct 2006 19:35:55 -0700 (PDT) Received: by 10.11.8.19 with SMTP id 19gr923cwh; Tue, 10 Oct 2006 19:35:39 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.106.15 with SMTP id i15mr101622pym; Tue, 10 Oct 2006 19:35:34 -0700 (PDT) Received: from lvs00-fl-n03.ftl.affinity.com (lvs00-fl-n03.ftl.affinity.com [216.219.253.136]) by mx.google.com with ESMTP id c21si1548845pyc.2006.10.10.19.35.33; Tue, 10 Oct 2006 19:35:34 -0700 (PDT) Received-SPF: neutral (google.com: 216.219.253.136 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [68.239.60.109] ([68.239.60.109]:12486 "EHLO Raphael.tscm.com") by ams003.ftl.affinity.com with ESMTP id S376587AbWJKCfc (ORCPT ); Tue, 10 Oct 2006 22:35:32 -0400 Message-Id: <7.0.1.0.2.20061010202540.040d8870@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Tue, 10 Oct 2006 22:35:20 -0400 To: TSCM-L2006@googlegroups.com From: "James M. Atkinson" Subject: [TSCM-L] Re: Silent Key: WA3SWS - Stephen Edward Uhrig In-Reply-To: <40c.7bb60fa.325d3057@aol.com> References: <40c.7bb60fa.325d3057@aol.com> Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , His obituary has not yet been published, and it is doubtful that one will be published (he wasn't important or loved enough); however, there will be a death and memorial service notification posted with a link to same in the next few days. His wife's church is having a memorial service, but the memorial is going to be closed/empty casket as it is likely that the coroner will not be finished with his efforts prior to the service (but they might get him released and cleaned up before then). Even if they release the body, the results were pretty messy and it is unlikely that there would be an open casket viewing or service. There is currently a coroners inquest underway, but it does indeed look like it was self inflicted... and it took him awhile afterwards to actually pass away after the act due to his rather bad aim and messy results due to the poor aim (Secret Service Pistol Championship Belt Buckle notwithstanding). I had been screaming for several years that he was a serious danger to himself and to others, and I guess I was right on the money... It is just fortunate that nobody else got too seriously injured and that he wasn't successful in his threats and attempts to kill federal law enforcement officer like he had previously stated he was going to do. Neighbors reported that from the time of the gun shot to the time the ambulance arrived was around 30 minutes, and that the country crime lab was there through the entire weekend removing things, and interviewing folks nearby. Seems that over the weekend the crime scene investigators removed several hundred pounds of explosives from his house, hundreds of bugs, several computers, and many, many, many boxes of business records and files. BATF, and other federal agencies was also on scene, and the confiscation included live hand grenades, parts suspected to be for illegal machine guns, and other interesting "technical things" that are likely to get a number of his business associates (including several TSCM people) unemployed and paying large sums of money to their criminal defense attorney. I should add the correction that his ham radio call-sign was WA3SWS, not KA3SWS. -jma At 01:20 PM 10/10/2006, you wrote: >Do you have the link to the news paper or any other information? > >Thanks >TJG > >In a message dated 10/10/2006 12:09:18 PM Central Daylight Time, >jmatk@tscm.com writes: >I regret to inform the list that Steve Uhrig of SWS Security killed >himself on Friday evening with a self inflicted gunshot wound to the head. > >He was a bad man, and he took the cowards way out. > >I will pray for his soul. > >-jma --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- X-Persona: Received: from [64.233.162.219] ([64.233.162.219]:37804 "EHLO nz-out-0304.google.com") by ams028.ftl.affinity.com with ESMTP id S385695AbWI1Rwb; Thu, 28 Sep 2006 13:52:31 -0400 Received: by nz-out-0304.google.com with SMTP id h28so1743423nzf for ; Thu, 28 Sep 2006 10:52:30 -0700 (PDT) Received: by 10.35.111.14 with SMTP id o14mr151044pym; Thu, 28 Sep 2006 10:50:17 -0700 (PDT) Received: by 10.11.40.13 with SMTP id n13gr897cwn; Thu, 28 Sep 2006 10:50:13 -0700 (PDT) X-Sender: reginald_curtis@hotmail.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.111.14 with SMTP id o14mr151036pym; Thu, 28 Sep 2006 10:50:10 -0700 (PDT) Received: from 74.106.212.207 by d34g2000cwd.googlegroups.com with HTTP; Thu, 28 Sep 2006 17:50:09 +0000 (UTC) From: reginald_curtis@hotmail.com To: "TSCM-L Professionals List" Subject: [TSCM-L] U.S. Investigating Pirro's Talk of Taping Spouse - Sept. 28/06 Date: Thu, 28 Sep 2006 10:50:09 -0700 Message-ID: <1159465809.043879.181650@d34g2000cwd.googlegroups.com> User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; MSN 6.1; MSNbMSFT; MSNmen-ca; MSNc00; v5m),gzip(gfe),gzip(gfe) Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Article from the Sept. 28/06 edition of the New York Times. http://www.nytimes.com/2006/09/28/nyregion/28pirro.html?_r=1&th=oref&emc.. "U.S. Investigating Pirro's Talk of Taping Spouse By Patrick Healy Federal prosecutors in New York are investigating whether Jeanine F. Pirro, the Republican candidate for state attorney general, and Bernard B. Kerik, the former New York City police commissioner, illegally taped conversations of Ms. Pirro's husband last year to determine if he was having an affair. At a hastily arranged news conference yesterday, called because of an imminent television report on the inquiry, Ms. Pirros conceded that she had her husband, Albert, followed in the summer of 2005. She said she had discussed bugging the family's boat with Mr. Kerik, an old friend who was running his own security business. But Ms, Pirro, who was the District Attorney of Westchester County at the time, said she never went through with the plan, and she insisted that she broke no laws. Seething with anger, and choking up as she laid bare her marital problems, Ms. Pirro said that two federal agents approached her at her home late one recent night and revealed that the United States attorney's office for the Southern District of New York was investigating her surveillance discussions. They had been caught on tape by Bronx authorities who were conducting a separate investigation of Mr. Kerik. With less than six weeks to go until the Nov. 7 election, Ms. Pirro said she was being hounded by authorities as part of a 'political witch hunt and smear campaign' led by the same federal lawyer who helped convict Mr. Pirro of tax evasion in 2000. But the United States attorney for the Southern District, Michael J. Garcia, a Republican appointee, issued a statement denying that the inquiry was politically motivated. ....... Ms. Pirro, a former three-term district attorney, repeatedly said her actions were not illegal. Legal experts said the law was murky, and one important factor was whether the boat, owned by Mr. Pirro, would be treated the same way as a marital home. Mr. Pirro did not return telephone calls for comment. ...... The tape recording of the Pirro-Kerik conversation was made by the Bronx district attorney's office and later provided to the F.B.I. It was made as part of the investigation into Mr. Kerik's acceptance of a free apartment renovation from a contractor doing work for the city. ........." The End Reg Curtis/VE9RWC --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [64.233.184.214] ([64.233.184.214]:45879 "EHLO wr-out-0304.google.com") by ams029.ftl.affinity.com with ESMTP id S405529AbWFTVJ4; Tue, 20 Jun 2006 17:09:56 -0400 Received: by wr-out-0304.google.com with SMTP id 56so121474wra for ; Tue, 20 Jun 2006 14:09:54 -0700 (PDT) Received: by 10.11.53.59 with SMTP id b59mr483105cwa; Tue, 20 Jun 2006 14:08:24 -0700 (PDT) Received: by 10.11.79.5 with SMTP id c5gr650cwb; Tue, 20 Jun 2006 14:08:07 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.36.22.2 with SMTP id 2mr13888829nzv; Tue, 20 Jun 2006 14:08:07 -0700 (PDT) Received: from lvs00-fl-n11.ftl.affinity.com (lvs00-fl-n11.ftl.affinity.com [216.219.253.186]) by mx.googlegroups.com with ESMTP id h71si389215nzf.2006.06.20.14.08.06; Tue, 20 Jun 2006 14:08:07 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.186 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [141.157.185.135] ([141.157.185.135]:61965 "EHLO nikola.tscm.com") by ams011.ftl.affinity.com with ESMTP id S489021AbWFTVIG convert rfc822-to-8bit (ORCPT ); Tue, 20 Jun 2006 17:08:06 -0400 Message-Id: <7.0.1.0.2.20060620165953.09f4b070@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Tue, 20 Jun 2006 17:01:55 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] U.S. unhappy over telecom clause Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.hindu.com/2006/06/19/stories/2006061904461200.htm U.S. unhappy over telecom clause Sandeep Dikshit Object to ban on foreign access to networks NEW DELHI: The United States expressed concern over a key clause in India's deals with foreign-owned telecom networks. This condition was incorporated to address the Left parties' securityconcerns after the Government decided to hike the foreign direct investment (FDI) limit from 49 to 74 per cent. The U.S. objected to the ban imposed on foreign equipment manufacturers, which prevented them from repairing faults through remote access. This was to preclude the possibility of spying or controlling networks from abroad. The Government, however, left an escape clause, under which remote access can be provided in case of 'catastrophic equipment failure' or the network being incapacitated for a long period. But, the companies would have to take the permission of the Intelligence Bureau (IB) as the remote access password would be valid only for a limited period of time. The Government also incorporated additional safeguards, including a provision to support the IB in recording transactions as part of on-line monitoring. Though the Union Cabinet had cleared the proposal to hike FDI in February last year, its notification was held up for eight months to allow for clarifications on issues such as ensuring security while repairing imported equipment. Citing its concerns vis-‡-vis the telecom sector, a U.S. trade representative brought out a paper, listing the restrictions on remote access to networks, traffic routing and re-sale of private lines. It said: "The Indian Government has put in place new requirements on how international networks are managed in India, which U.S. operators believe seriously impede their ability to do business. In the face of widespread complaints, the Indian Government agreed to delay implementation of these rules until July 2006. Whether concerns of U.S. carriers can be addressed in the interim period remains unclear." At the same time, the paper conceded that New Delhi had taken "positive steps towards liberalising and introducing private investment and competition in the telecommunication service market." The U.S. also referred to its concerns regarding India's "weak multilateral commitments" in basic telecommunication and an "apparent bias" of the telecommunication policy towards Government-owned service providers. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [216.239.56.131] ([216.239.56.131]:10940 "EHLO mproxy.googlegroups.com") by ams017.ftl.affinity.com with ESMTP id S368878AbWEDOkl; Thu, 4 May 2006 10:40:41 -0400 Received: by mproxy.googlegroups.com with SMTP id g66so2093585cwa for ; Thu, 04 May 2006 07:40:38 -0700 (PDT) Received: by 10.11.39.23 with SMTP id m23mr56223cwm; Thu, 04 May 2006 07:39:08 -0700 (PDT) Received: by 10.11.79.5 with SMTP id c5gr575cwb; Thu, 04 May 2006 07:38:53 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.11.88.14 with SMTP id l14mr288298cwb; Thu, 04 May 2006 07:38:52 -0700 (PDT) Received: from ams004.useripd.ftl.affinity.com (lvs00-fl-n04.valueweb.net [216.219.253.138]) by mx.googlegroups.com with ESMTP id v23si635198cwb.2006.05.04.07.38.52; Thu, 04 May 2006 07:38:52 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.138 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [68.160.5.55] ([68.160.5.55]:52239 "EHLO nikola.tscm.com") by ams004.ftl.affinity.com with ESMTP id S373356AbWEDOiv convert rfc822-to-8bit (ORCPT ); Thu, 4 May 2006 10:38:51 -0400 Message-Id: <6.2.3.4.2.20060504103255.0c534ca0@pop.tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.3.4 Date: Thu, 04 May 2006 10:35:46 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] U.S. wiretapping flap had sparked questions here Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.fftimes.com/index.php/3/2006-05-01/25244 U.S. wiretapping flap had sparked questions here May 01, 2006 (CP) Allegations of illegal eavesdropping by U.S. spies prompted pointed questions from the federal watchdog who oversees their Canadian counterparts, newly released records reveal. Correspondence obtained by The Canadian Press shows the public controversy about U.S. National Security Agency spying on American citizens led to a series of highly-classified exchanges in Ottawa. John Adams, chief of the ultra-secret Communications Security Establishment, was forced to respond to detailed inquiries spanning two months from the office of Antonio Lamer, the former Supreme Court chief justice who, as CSE commissioner, serves as watchdog over the spy outfit. Portions of the correspondence, including even the security classifications stamped on the letters, were blacked out due to the informationís sensitivity. But it is clear from the recordsóobtained under the Access to Information Actóthat Lamerís office wanted to ensure the CSE, a wing of the Defence Department, wasnít contravening Canadian law by conducting excessive snooping in the fight against terrorism. Joanne Weeks, executive director of the commissionerís office, said in an interview she was surprised by the Defence Departmentís release of the letters. The Ottawa-based CSE monitors foreign radio, telephone, fax, satellite, and computer traffic for information of interest to Canada. The intelligence is used in support of Canadian crime-fighting, defence, and trade policies. Military listening posts assist the agencyís efforts to eavesdrop on foreign states and organizations, as well as on suspected terrorists, drug traffickers, smugglers, and other criminals. Computer specialists and language experts use cutting-edge tools to sift the intercepted data and create thousands of secret intelligence reports each year for government agencies. The CSE works closely with the signals intelligence services of allied countries, including the massive Maryland-based National Security Agency, which boasts more than 30,000 employees. In December, the New York Times disclosed U.S. President George W. Bush had authorized the NSA to eavesdrop on Americans and others inside the United States without court-approved warrants. Despite harsh condemnation from privacy advocates, U.S. government officials have defended the program as constitutional. The CSE has long been prohibited from directing its surveillance at Canadians or anybody in Canada. However, the Anti-Terrorism Act of 2001 gave the CSE authority to tap into the conversations and messages of foreigners even if those communications began or ended in Canada. For instance, the CSE now could intercept a phone call made by an al-Qaida operative from somewhere in the Middle East to Toronto. Various safeguards, including ministerial approval, were built into the practice. Still, some critics consider this sort of eavesdropping as potentially dangerous to the civil liberties of Canadians since the CSE would not require a judge-approved warrant. This led to suggestions that the sort of controversial spying under attack in the United States also may be taking place in Canada. Weeks sent the first letter from the commissionerís office to the CSEís Adams on Jan. 10. He replied 10 days later. A meeting between Adams and the watchdog took place Jan. 26, and there were two follow-up responses from the CSE chief. Both Weeks and CSE spokesman Adrian Simpson cited national security in declining to discuss details of the written exchanges. However, one matter that appeared to pique the interest of the commissionerís office was a 2002 published reportónever confirmedóthat CSE had helped convict a U.S. man of sending illicit cash to suspected Hezbollah terrorists. On Feb. 15, Lamer evidently wrote Adams about this allegation and another media story. In his March 9 reply, Adams tried to reassure the commissioner that nothing improper had occurred, saying, ìOur legislation and public profile have driven the creation of extensive internal measures aimed at ensuring respect for the law and the rights of Canadians.î ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [64.233.162.214] ([64.233.162.214]:20104 "EHLO nz-out-0304.google.com") by ams015.ftl.affinity.com with ESMTP id S865188AbWEYRbw; Thu, 25 May 2006 13:31:52 -0400 Received: by nz-out-0304.google.com with SMTP id h28so2960595nzf for ; Thu, 25 May 2006 10:31:46 -0700 (PDT) Received: by 10.11.115.75 with SMTP id n75mr91077cwc; Thu, 25 May 2006 10:30:16 -0700 (PDT) Received: by 10.11.126.51 with SMTP id y51gr616cwc; Thu, 25 May 2006 10:30:06 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.54.157.11 with SMTP id f11mr55054wre; Thu, 25 May 2006 10:30:05 -0700 (PDT) Received: from ams002.useripd.ftl.affinity.com (lvs00-fl-n02.valueweb.net [216.219.253.98]) by mx.googlegroups.com with ESMTP id v23si312415cwb.2006.05.25.10.30.04; Thu, 25 May 2006 10:30:05 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.98 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [151.199.38.135] ([151.199.38.135]:9733 "EHLO nikola.tscm.com") by ams002.ftl.affinity.com with ESMTP id S370066AbWEYRaE convert rfc822-to-8bit (ORCPT ); Thu, 25 May 2006 13:30:04 -0400 Message-Id: <6.2.3.4.2.20060525131209.0efceeb0@pop.tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.3.4 Date: Thu, 25 May 2006 13:17:58 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] Village on spy alert as bugging device is found Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , [Note that this device was not found by a TSCM person, but instead by an electrician, and that the device had wire poking out from underneath and was affecting the voltage readings. It would have been very easy for a TSCMer to find as the operational frequency is well know, and the signal characteristics easy to identify. -jma] http://www.thisisbradford.co.uk/news/tibnews/display.var.772727.0.village_on_spy_alert_as_bugging_device_is_found.php Village on spy alert as bugging device is found RUMOURS of espionage, subterfuge and unsavoury goings-on abound in the otherwise serene surroundings of a Dales village following the discovery of a sophisticated bugging device. And speculation is rife among the bemused residents into the possible identification of the spy, who is yet to come in from the cold. The bug was found by Settle electrician Ian Preston, who was carrying out statutory safety checks on electrical equipment in Malham Village Hall. The device, said to be of a sophisticated, professional type, was hidden inside a 13amp twin socket on the wall, inside a room used by the whole community. Alan Boatwright, secretary of the Village Hall Committee, who organised the electrical checks, said the discovery had caused a great deal of amusement in the village. There is also humorous speculation as to who is actually under surveillance and who may have hidden the bug. Mr Boatwright told the Herald the electrical check was ordered so that they could obtain a safety certificate. Mr Preston had installed the original sockets just a few years ago. Mr Boatwright explained: "I went along to the village hall to see how everything was going on and Ian said something was wrong with one of the sockets because he was having trouble getting a proper reading. "We decided to take the cover off and inside there was what we discovered to be a miniature microphone and wires and other things which I assume acted as some sort of transmitting device. "We were amazed. It certainly looked like a professional, sophisticated piece of equipment," he added. The socket is at waist height and had a pinhole drilled in the bottom with a wire poking out underneath, so no-one would be able to see it without getting down and looking up. The new socket had been wired up so it could still be used by conventional electrical equipment while the bugging device remained inside. A typical surveillance device of this type with a transmitting range of between 400 and 600 metres could cost anything up to around £280, although examples advertised on the internet can be bought from as little as £40. "Finding it has led to all sorts of speculation and people can't stop laughing about it," said Mr Boatwright. "All that goes on in the hall are things like parish council and village hall meetings, toddler groups, WI meetings and a monthly whist drive. "People are joking that it must be the WI that's being spied on, although some of us have other ideas." He added that the Village Hall Committee held a meeting after the find and a member, who was a former police officer, said the bug had to be handed in to the police as placing listening devices in public places was a criminal offence. "We did this and the police were just as amazed as everyone when they saw it," he said. PC Vanessa Bateson, of Grassington Police, quipped that perhaps a notice should be put in the Herald suggesting the owner contact the police station if they wanted the device back. 5:10pm today By Viv Mason ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [216.239.56.131] ([216.239.56.131]:52174 "EHLO mproxy.googlegroups.com") by ams035.ftl.affinity.com with ESMTP id S444319AbWDUSDb; Fri, 21 Apr 2006 14:03:31 -0400 Received: by mproxy.googlegroups.com with SMTP id s51so1454698cwc for ; Fri, 21 Apr 2006 11:03:30 -0700 (PDT) Received: by 10.11.88.27 with SMTP id l27mr39222cwb; Fri, 21 Apr 2006 11:02:00 -0700 (PDT) Received: by 10.11.126.51 with SMTP id y51gr543cwc; Fri, 21 Apr 2006 11:01:59 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.11.88.14 with SMTP id l14mr339099cwb; Fri, 21 Apr 2006 11:01:58 -0700 (PDT) Received: from ams011.ftl.affinity.com (lvs00-fl-n11.valueweb.net [216.219.253.186]) by mx.googlegroups.com with ESMTP id v11si355758cwb.2006.04.21.11.01.58; Fri, 21 Apr 2006 11:01:58 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 216.219.253.186 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [68.160.2.231] ([68.160.2.231]:52234 "EHLO nikola.tscm.com") by ams011.ftl.affinity.com with ESMTP id S532287AbWDUSB5 (ORCPT ); Fri, 21 Apr 2006 14:01:57 -0400 Message-Id: <6.2.3.4.2.20060421133932.093ccd60@pop.tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.3.4 Date: Fri, 21 Apr 2006 13:56:18 -0400 To: TSCM-L From: "James M. Atkinson" Subject: [TSCM-L] Winston Arrington, RIP Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , It looks like Winston Arrington has passed away. I have not yet need able to find an obituary. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- Received: from [216.239.56.131] ([216.239.56.131]:24947 "EHLO mproxy.googlegroups.com") by ams018.ftl.affinity.com with ESMTP id S710783AbWD2A6q; Fri, 28 Apr 2006 20:58:46 -0400 Received: by mproxy.googlegroups.com with SMTP id l23so3494116cwc for ; Fri, 28 Apr 2006 17:58:45 -0700 (PDT) Received: by 10.11.88.27 with SMTP id l27mr85351cwb; Fri, 28 Apr 2006 17:57:15 -0700 (PDT) Received: by 10.11.79.5 with SMTP id c5gr559cwb; Fri, 28 Apr 2006 17:57:05 -0700 (PDT) X-Sender: newsspy@sbcglobal.net X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.11.88.14 with SMTP id l14mr2413678cwb; Fri, 28 Apr 2006 11:12:47 -0700 (PDT) Received: from smtp101.sbc.mail.mud.yahoo.com (smtp101.sbc.mail.mud.yahoo.com [68.142.198.200]) by mx.googlegroups.com with SMTP id v23si3043766cwb.2006.04.28.11.12.47; Fri, 28 Apr 2006 11:12:47 -0700 (PDT) Received-SPF: neutral (googlegroups.com: 68.142.198.200 is neither permitted nor denied by domain of newsspy@sbcglobal.net) Received: (qmail 331 invoked from network); 28 Apr 2006 18:12:44 -0000 Received: from unknown (HELO ?192.168.1.145?) (newsspy@sbcglobal.net@69.235.134.74 with plain) by smtp101.sbc.mail.mud.yahoo.com with SMTP; 28 Apr 2006 18:12:43 -0000 Message-ID: <44525B1D.8070008@sbcglobal.net> Date: Fri, 28 Apr 2006 11:12:45 -0700 From: Eric Leonard Reply-To: TSCM-L2006@googlegroups.com User-Agent: Thunderbird 1.5.0.2 (Windows/20060308) Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="------------060703040907030304040500" To: TSCM-L2006@googlegroups.com Subject: [TSCM-L] Wiretap info from Pellicano story X-Google-Approved: jmatk@TSCM.com via web at 2006-04-29 00:57:05 Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Vanity Fair has posted a preview of a story in the June issue that provides the most detail to date on P.I. Anthony Pellicano's alleged wiretapping empire. Here's a relevant section, and you can read the entire piece at: http://www.vanityfair.com/features/general/articles/060426fege01

So much for all our careful wire work...


----------------------------------------------------------------------------------------------------------------------------------

No one knows when Pellicano first tried to wiretap a telephone, but by the mid-1990s he seems to have been attempting to perfect his technique. Around 1995 he hired a self-taught computer programmer named Kevin Kachikian—who was also indicted in February—to create software that would intercept telephone calls. They named it Telesleuth. In November 1995, Pellicano had an attorney from Bert Fields's firm apply to trademark the name. Later, Kachikian developed another program, called Forensic Audio Sleuth, which was able to analyze and enhance audio recordings. Again using an attorney from Fields's firm, Pellicano applied for a trademark. Fields has said he didn't work on such matters, and a spokesman for his firm has said they believed the software was created to aid on cases Pellicano worked on for law-enforcement outfits.

By early 1997, Pellicano was apparently ready to use Telesleuth in earnest. To arrange the wiretaps, according to the indictment, he bribed two Pacific Bell workers—one was indicted in February. A former Pellicano employee explains that additional telephone wiring was clipped inside the box at the phone company. (It was never necessary to break into a location.) When a call came in, Telesleuth automatically recorded it and relayed it to a Macintosh computer in Pellicano's Sunset Boulevard offices. His indictment suggests that Telesleuth's first use was against a Los Angeles real-estate developer, Robert Maguire. Beginning around September 1997, Pellicano allegedly used the program to wiretap Mark Hughes, the late founder of Herbalife, who was then engaged in a nasty divorce.

According to former employees, the wiretapping operation became the secret heart of Pellicano's business—the one unique service he could market to clients. According to Pellicano's former executive vice president, Tarita Virtue, who described the wiretapping setup in a series of interviews with Vanity Fair, the single Macintosh soon became five, lined up in a small locked office Pellicano called "the War Room." Only Pellicano, Virtue, and Kachikian had access to the room, whose only other furniture was a row of filing cabinets. Pellicano and Virtue alone had codes to use the Macs. The operation had one drawback: the Macs could receive wiretap recordings only from their own, 310 area code. To tap phones in the 323, 213, 626, and 818 area codes, Virtue says, Pellicano had to rent an apartment in each where he could stash a Macintosh and a detachable hard drive. When one of these computers was used, Pellicano would switch out the hard drive every few days, bring it to his office, and download the recordings.

The recordings were typically crystal clear. The problem became the sheer volume of them—thousands and thousands of telephone conversations, everything from a target's confidential discussions with his attorney to chats with his orthodontist, according to Virtue. To home in on the most promising ones, Kachikian's software could graph a recording's volume; Pellicano could then go directly to a conversation in which his subject had raised his voice, often a sign that something emotional was being discussed. Virtue did most of the initial scanning. When a wiretap yielded something especially useful, she says, she forwarded it to Pellicano's computer with the data displayed in red lettering, signifying that it was urgent.



--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group.
To post to this group, send email to TSCM-L2006@googlegroups.com
To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com
For more options, visit this group at http://groups.google.com/group/TSCM-L2006
-~----------~----~----~----~------~----~------~--~---

X-Persona: Received: from [64.233.166.168] ([64.233.166.168]:53550 "EHLO py-out-1314.google.com") by ams026.ftl.affinity.com with ESMTP id S388620AbWJJSFx; Tue, 10 Oct 2006 14:05:53 -0400 Received: by py-out-1314.google.com with SMTP id b30so1925964pyb for ; Tue, 10 Oct 2006 11:05:52 -0700 (PDT) Received: by 10.35.49.4 with SMTP id b4mr850899pyk; Tue, 10 Oct 2006 10:52:37 -0700 (PDT) Received: by 10.11.40.13 with SMTP id n13gr913cwn; Tue, 10 Oct 2006 10:52:22 -0700 (PDT) X-Sender: eglemont@yahoo.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.99.5 with SMTP id b5mr564192pym; Sun, 08 Oct 2006 19:17:59 -0700 (PDT) Received: from 67.159.26.65 by k70g2000cwa.googlegroups.com with HTTP; Mon, 09 Oct 2006 02:17:58 +0000 (UTC) From: eglemont@yahoo.com To: "TSCM-L Professionals List" Subject: [TSCM-L] xray devices Date: Sun, 08 Oct 2006 19:17:58 -0700 Message-ID: <1160360278.004716.83730@k70g2000cwa.googlegroups.com> User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; www.cotse.net),gzip(gfe),gzip(gfe) Mime-Version: 1.0 Content-Type: text/plain X-Google-Approved: jmatk@TSCM.com via web at 2006-10-10 17:52:22 Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , Looking at; http://www.pwallen.com/Catalogue/XR/604/46142.html it describes a portable xray system which can look into walls. I am specifically looking for a device which can xray walls, either from both sides of the wall or with access to one side of the wall only. Are there other companies which manufacture such a device? I am particularly worried about optical fibres or small holes drilled into a wall to give visual on the other side. These are commercially available from a number of sources. Would there be private invesigators in the UK who would have such a portable xray device in their kit for TSCM sweeps? --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~--- X-Persona: Received: from [64.233.162.219] ([64.233.162.219]:58420 "EHLO nz-out-0304.google.com") by ams015.ftl.affinity.com with ESMTP id S418543AbWJNDDG; Fri, 13 Oct 2006 23:03:06 -0400 Received: by nz-out-0304.google.com with SMTP id h28so4438779nzf for ; Fri, 13 Oct 2006 20:03:06 -0700 (PDT) Received: by 10.36.159.15 with SMTP id h15mr112497nze; Fri, 13 Oct 2006 20:01:24 -0700 (PDT) Received: by 10.11.8.19 with SMTP id 19gr967cwh; Fri, 13 Oct 2006 20:01:18 -0700 (PDT) X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L2006@googlegroups.com Received: by 10.35.37.18 with SMTP id p18mr90713pyj; Fri, 13 Oct 2006 20:01:18 -0700 (PDT) Received: from lvs00-fl-n03.ftl.affinity.com (lvs00-fl-n03.ftl.affinity.com [216.219.253.136]) by mx.google.com with ESMTP id c17si506610pyc.2006.10.13.20.01.17; Fri, 13 Oct 2006 20:01:18 -0700 (PDT) Received-SPF: neutral (google.com: 216.219.253.136 is neither permitted nor denied by best guess record for domain of jmatk@tscm.com) Received: from [70.19.170.202] ([70.19.170.202]:32516 "EHLO Raphael.tscm.com") by ams003.ftl.affinity.com with ESMTP id S375060AbWJNDBR (ORCPT ); Fri, 13 Oct 2006 23:01:17 -0400 Message-Id: <7.0.1.0.2.20061013113834.0352a338@tscm.com> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Fri, 13 Oct 2006 11:40:15 -0400 To: TSCM-L2006@googlegroups.com From: "James M. Atkinson" Subject: [TSCM-L] 'Youth pastor' pleads guilty to eavesdropping Mime-Version: 1.0 Content-Type: text/plain Reply-To: TSCM-L2006@googlegroups.com Sender: TSCM-L2006@googlegroups.com Precedence: bulk X-Google-Loop: groups Mailing-List: list TSCM-L2006@googlegroups.com; contact TSCM-L2006-owner@googlegroups.com List-Id: List-Post: List-Help: List-Unsubscribe: , http://www.mlive.com/news/fljournal/index.ssf?/base/news-39/1160747970299440.xml&coll=5 'Youth pastor' pleads guilty to eavesdropping FLINT THE FLINT JOURNAL FIRST EDITION Friday, October 13, 2006 By Paul Janczewski FLINT - He called himself "Pastor Paul." But Paul L. Gagnon will soon be called an inmate after pleading guilty Thursday to an eavesdropping charge for spying on a male roommate and the roommate's girlfriend. Gagnon, 51, of Flint, a former self-described youth pastor, also pleaded guilty to eight additional charges for using his computer to possess and manufacture child pornography pictures. "It was in everyone's best interest that this matter was resolved," said attorney Erwin F. Meiers III, who represents Gagnon. "There was a possibility other things could surface that would have led to him being charged with life offenses." Assistant Genesee County Prosecutor Gladys Christopherson said police uncovered thousands of pictures of child pornography on Gagnon's computer, which could have led to thousands of additional charges. She said Gagnon had a short window Thursday in which to accept the plea deal or reject it and face additional charges. While his original eavesdropping charge is a 2-year felony, several new charges added after testimony began in a preliminary examination carry up to 20 years in prison. Because Gagnon has a federal bank fraud conviction in 1994, he faces a longer prison sentence because he is considered a habitual offender. He waived the conclusion of the preliminary examination before Flint District Judge Michael D. McAra and now faces an Oct. 23 circuit court arraignment, where he is expected to plead guilty to nine charges. In exchange for his plea, prosecutors will end a forensic examination of his computer and equipment and not add new charges. Christopherson said police and prosecutors are not prohibited from trying to identify and notify possible past victims seen in the multitude of pictures already discovered. The case began when a teen who lived with Gagnon found an elaborate spy camera system that led to Gagnon's bedroom. He later found pictures of himself getting dressed, of Gagnon standing over him and taking pictures as he slept nude, and pictures of the teen's girlfriend using the toilet. Court records indicate Gagnon and the boy were partners for Christian Custom Home, a repair service they began several years ago. Police and prosecutors learned that Gagnon worked as a youth pastor at the boy's church in the past. While later cleaning out Gagnon's residence, relatives found computer equipment containing child pornography and turned that over to police, which led to the new charges. *** --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TSCM-L Professionals List" group. To post to this group, send email to TSCM-L2006@googlegroups.com To unsubscribe from this group, send email to TSCM-L2006-unsubscribe@googlegroups.com For more options, visit this group at http://groups.google.com/group/TSCM-L2006 -~----------~----~----~----~------~----~------~--~---
Hi Andy,

Well...

> "Only people who have something to hide should be worried," said a
> spokesperson at the Department of Trade and Industry. "The government will
> only have cause to browse emails if they have their suspicions about a
> user.

That's what they always say, isn't it? I don't mind CCTV cameras in public
spaces, I agree that I've no expectation of privacy out on the street - just
the same as if I started shouting my bank details.

But, when it comes to conversations or exchanges that I want to perform with
other people, and I use a method with which I want to have some expectation
of privacy (I know a lot of people say that email is the analogy of shouting
in the street, but I'll take some liberties here...), then I think that
nobody has the right to snoop into them, at least without a court order,
even if 'random' checking is used.

The only thing I foresee with all this is increased use of strong
cryptography, a lot more snake oil, and so much more government spending in
technology to crack the increasing amount of encrypted traffic.

Just my two cent's worth, all the best,

Mike











Yahoo! Groups Sponsor







Yahoo! Domains Yahoo! Domains






========================================================
         TSCM-L Technical Security Mailing List
    "In a multitude of counselors there is strength"

     To subscribe to the TSCM-L mailing list visit:
        
http://www.onelist.com/community/TSCM-L

     or email your subscription request to:
           subTSCM-L@t...
=================================================== TSKS


Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service.